@@ -14,7 +14,7 @@ use openssl::x509::{CrlStatus, X509Crl, X509Req, X509StoreContext, X509};
1414
1515use rcgen:: {
1616 BasicConstraints , Certificate , CertificateParams , DnType , DnValue , GeneralSubtree , IsCa ,
17- KeyPair , NameConstraints ,
17+ Issuer , KeyPair , NameConstraints ,
1818} ;
1919
2020mod util;
@@ -312,6 +312,7 @@ fn test_openssl_separate_ca() {
312312 ca_params. is_ca = IsCa :: Ca ( BasicConstraints :: Unconstrained ) ;
313313 let ca_cert = ca_params. self_signed ( & ca_key) . unwrap ( ) ;
314314 let ca_cert_pem = ca_cert. pem ( ) ;
315+ let ca = Issuer :: new ( ca_params, ca_key) ;
315316
316317 let mut params = CertificateParams :: new ( vec ! [ "crabs.crabs" . to_string( ) ] ) . unwrap ( ) ;
317318 params
@@ -321,7 +322,7 @@ fn test_openssl_separate_ca() {
321322 . distinguished_name
322323 . push ( DnType :: CommonName , "Dev domain" ) ;
323324 let cert_key = KeyPair :: generate ( ) . unwrap ( ) ;
324- let cert = params. signed_by ( & cert_key, & ca_params , & ca_key ) . unwrap ( ) ;
325+ let cert = params. signed_by ( & cert_key, & ca ) . unwrap ( ) ;
325326 let key = cert_key. serialize_der ( ) ;
326327
327328 verify_cert_ca ( & cert. pem ( ) , & key, & ca_cert_pem) ;
@@ -345,7 +346,8 @@ fn test_openssl_separate_ca_with_printable_string() {
345346 . distinguished_name
346347 . push ( DnType :: CommonName , "Dev domain" ) ;
347348 let cert_key = KeyPair :: generate ( ) . unwrap ( ) ;
348- let cert = params. signed_by ( & cert_key, & ca_params, & ca_key) . unwrap ( ) ;
349+ let ca = Issuer :: new ( ca_params, ca_key) ;
350+ let cert = params. signed_by ( & cert_key, & ca) . unwrap ( ) ;
349351 let key = cert_key. serialize_der ( ) ;
350352
351353 verify_cert_ca ( & cert. pem ( ) , & key, & ca_cert. pem ( ) ) ;
@@ -357,6 +359,7 @@ fn test_openssl_separate_ca_with_other_signing_alg() {
357359 ca_params. is_ca = IsCa :: Ca ( BasicConstraints :: Unconstrained ) ;
358360 let ca_key = KeyPair :: generate_for ( & rcgen:: PKCS_ECDSA_P256_SHA256 ) . unwrap ( ) ;
359361 let ca_cert = ca_params. self_signed ( & ca_key) . unwrap ( ) ;
362+ let ca = Issuer :: new ( ca_params, ca_key) ;
360363
361364 let mut params = CertificateParams :: new ( vec ! [ "crabs.crabs" . to_string( ) ] ) . unwrap ( ) ;
362365 params
@@ -366,7 +369,7 @@ fn test_openssl_separate_ca_with_other_signing_alg() {
366369 . distinguished_name
367370 . push ( DnType :: CommonName , "Dev domain" ) ;
368371 let cert_key = KeyPair :: generate_for ( & rcgen:: PKCS_ECDSA_P384_SHA384 ) . unwrap ( ) ;
369- let cert = params. signed_by ( & cert_key, & ca_params , & ca_key ) . unwrap ( ) ;
372+ let cert = params. signed_by ( & cert_key, & ca ) . unwrap ( ) ;
370373 let key = cert_key. serialize_der ( ) ;
371374
372375 verify_cert_ca ( & cert. pem ( ) , & key, & ca_cert. pem ( ) ) ;
@@ -387,6 +390,7 @@ fn test_openssl_separate_ca_name_constraints() {
387390 excluded_subtrees : Vec :: new ( ) ,
388391 } ) ;
389392 let ca_cert = ca_params. self_signed ( & ca_key) . unwrap ( ) ;
393+ let ca = Issuer :: new ( ca_params, ca_key) ;
390394
391395 let mut params = CertificateParams :: new ( vec ! [ "crabs.crabs" . to_string( ) ] ) . unwrap ( ) ;
392396 params
@@ -396,7 +400,7 @@ fn test_openssl_separate_ca_name_constraints() {
396400 . distinguished_name
397401 . push ( DnType :: CommonName , "Dev domain" ) ;
398402 let cert_key = KeyPair :: generate ( ) . unwrap ( ) ;
399- let cert = params. signed_by ( & cert_key, & ca_params , & ca_key ) . unwrap ( ) ;
403+ let cert = params. signed_by ( & cert_key, & ca ) . unwrap ( ) ;
400404 let key = cert_key. serialize_der ( ) ;
401405
402406 verify_cert_ca ( & cert. pem ( ) , & key, & ca_cert. pem ( ) ) ;
0 commit comments