@@ -21,7 +21,7 @@ use rcgen::{generate_simple_self_signed, KeyPair};
21
21
let subject_alt_names = vec!["hello.world.example".to_string(),
22
22
"localhost".to_string()];
23
23
24
- let key_pair = KeyPair::generate_for(&rcgen::PKCS_ECDSA_P256_SHA256 ).unwrap();
24
+ let key_pair = KeyPair::generate( ).unwrap();
25
25
let cert = generate_simple_self_signed(subject_alt_names, &key_pair).unwrap();
26
26
println!("{}", cert.pem());
27
27
println!("{}", key_pair.serialize_pem());
@@ -98,7 +98,7 @@ use rcgen::{generate_simple_self_signed, KeyPair};
98
98
let subject_alt_names = vec!["hello.world.example".to_string(),
99
99
"localhost".to_string()];
100
100
101
- let key_pair = KeyPair::generate_for(&rcgen::PKCS_ECDSA_P256_SHA256 ).unwrap();
101
+ let key_pair = KeyPair::generate( ).unwrap();
102
102
let cert = generate_simple_self_signed(subject_alt_names, &key_pair).unwrap();
103
103
104
104
// The certificate is now valid for localhost and the domain "hello.world.example"
@@ -1802,7 +1802,7 @@ mod tests {
1802
1802
params. is_ca = IsCa :: Ca ( BasicConstraints :: Constrained ( 0 ) ) ;
1803
1803
1804
1804
// Make the cert
1805
- let key_pair = KeyPair :: generate_for ( & PKCS_ECDSA_P256_SHA256 ) . unwrap ( ) ;
1805
+ let key_pair = KeyPair :: generate ( ) . unwrap ( ) ;
1806
1806
let cert = Certificate :: generate_self_signed ( params, & key_pair) . unwrap ( ) ;
1807
1807
1808
1808
// Parse it
@@ -1840,7 +1840,7 @@ mod tests {
1840
1840
params. is_ca = IsCa :: Ca ( BasicConstraints :: Constrained ( 0 ) ) ;
1841
1841
1842
1842
// Make the cert
1843
- let key_pair = KeyPair :: generate_for ( & PKCS_ECDSA_P256_SHA256 ) . unwrap ( ) ;
1843
+ let key_pair = KeyPair :: generate ( ) . unwrap ( ) ;
1844
1844
let cert = Certificate :: generate_self_signed ( params, & key_pair) . unwrap ( ) ;
1845
1845
1846
1846
// Parse it
@@ -1875,7 +1875,7 @@ mod tests {
1875
1875
params. extended_key_usages = vec ! [ ExtendedKeyUsagePurpose :: Any ] ;
1876
1876
1877
1877
// Make the cert
1878
- let key_pair = KeyPair :: generate_for ( & PKCS_ECDSA_P256_SHA256 ) . unwrap ( ) ;
1878
+ let key_pair = KeyPair :: generate ( ) . unwrap ( ) ;
1879
1879
let cert = Certificate :: generate_self_signed ( params, & key_pair) . unwrap ( ) ;
1880
1880
1881
1881
// Parse it
@@ -1901,7 +1901,7 @@ mod tests {
1901
1901
] ;
1902
1902
1903
1903
// Make the cert
1904
- let key_pair = KeyPair :: generate_for ( & PKCS_ECDSA_P256_SHA256 ) . unwrap ( ) ;
1904
+ let key_pair = KeyPair :: generate ( ) . unwrap ( ) ;
1905
1905
let cert = Certificate :: generate_self_signed ( params, & key_pair) . unwrap ( ) ;
1906
1906
1907
1907
// Parse it
@@ -1935,12 +1935,12 @@ mod tests {
1935
1935
1936
1936
#[ cfg( feature = "pem" ) ]
1937
1937
mod test_pem_serialization {
1938
- use crate :: { Certificate , CertificateParams , KeyPair , PKCS_ECDSA_P256_SHA256 } ;
1938
+ use crate :: { Certificate , CertificateParams , KeyPair } ;
1939
1939
1940
1940
#[ test]
1941
1941
#[ cfg( windows) ]
1942
1942
fn test_windows_line_endings ( ) {
1943
- let key_pair = KeyPair :: generate_for ( & PKCS_ECDSA_P256_SHA256 ) . unwrap ( ) ;
1943
+ let key_pair = KeyPair :: generate ( ) . unwrap ( ) ;
1944
1944
let cert =
1945
1945
Certificate :: generate_self_signed ( CertificateParams :: default ( ) , & key_pair) . unwrap ( ) ;
1946
1946
assert ! ( cert. pem( ) . contains( "\r \n " ) ) ;
@@ -1949,7 +1949,7 @@ mod tests {
1949
1949
#[ test]
1950
1950
#[ cfg( not( windows) ) ]
1951
1951
fn test_not_windows_line_endings ( ) {
1952
- let key_pair = KeyPair :: generate_for ( & PKCS_ECDSA_P256_SHA256 ) . unwrap ( ) ;
1952
+ let key_pair = KeyPair :: generate ( ) . unwrap ( ) ;
1953
1953
let cert =
1954
1954
Certificate :: generate_self_signed ( CertificateParams :: default ( ) , & key_pair) . unwrap ( ) ;
1955
1955
assert ! ( !cert. pem( ) . contains( '\r' ) ) ;
0 commit comments