@@ -34,7 +34,7 @@ impl PemCertifiedKey {
34
34
#[ derive( Default ) ]
35
35
pub struct CertificateBuilder {
36
36
params : CertificateParams ,
37
- alg : KeypairAlgorithm ,
37
+ alg : KeyPairAlgorithm ,
38
38
}
39
39
40
40
impl CertificateBuilder {
@@ -50,11 +50,11 @@ impl CertificateBuilder {
50
50
params. distinguished_name = DistinguishedName :: new ( ) ;
51
51
Self {
52
52
params,
53
- alg : KeypairAlgorithm :: EcdsaP256 ,
53
+ alg : KeyPairAlgorithm :: EcdsaP256 ,
54
54
}
55
55
}
56
56
/// Set signature algorithm (instead of default).
57
- pub fn signature_algorithm ( mut self , alg : KeypairAlgorithm ) -> anyhow:: Result < Self > {
57
+ pub fn signature_algorithm ( mut self , alg : KeyPairAlgorithm ) -> anyhow:: Result < Self > {
58
58
self . alg = alg;
59
59
Ok ( self )
60
60
}
@@ -76,12 +76,12 @@ impl CertificateBuilder {
76
76
/// [CertificateParams] from which an [Ca] [Certificate] can be built
77
77
pub struct CaBuilder {
78
78
params : CertificateParams ,
79
- alg : KeypairAlgorithm ,
79
+ alg : KeyPairAlgorithm ,
80
80
}
81
81
82
82
impl CaBuilder {
83
83
/// Initialize `CaBuilder`
84
- pub fn new ( mut params : CertificateParams , alg : KeypairAlgorithm ) -> Self {
84
+ pub fn new ( mut params : CertificateParams , alg : KeyPairAlgorithm ) -> Self {
85
85
params. is_ca = IsCa :: Ca ( BasicConstraints :: Unconstrained ) ;
86
86
params. key_usages . push ( KeyUsagePurpose :: DigitalSignature ) ;
87
87
params. key_usages . push ( KeyUsagePurpose :: KeyCertSign ) ;
@@ -106,7 +106,7 @@ impl CaBuilder {
106
106
}
107
107
/// build `Ca` Certificate.
108
108
pub fn build ( self ) -> Result < Ca , rcgen:: Error > {
109
- let key_pair = self . alg . to_keypair ( ) ?;
109
+ let key_pair = self . alg . to_key_pair ( ) ?;
110
110
let cert = Certificate :: generate_self_signed ( self . params , & key_pair) ?;
111
111
Ok ( Ca { cert, key_pair } )
112
112
}
@@ -152,12 +152,12 @@ impl EndEntity {
152
152
/// [CertificateParams] from which an [EndEntity] [Certificate] can be built
153
153
pub struct EndEntityBuilder {
154
154
params : CertificateParams ,
155
- alg : KeypairAlgorithm ,
155
+ alg : KeyPairAlgorithm ,
156
156
}
157
157
158
158
impl EndEntityBuilder {
159
159
/// Initialize `EndEntityBuilder`
160
- pub fn new ( mut params : CertificateParams , alg : KeypairAlgorithm ) -> Self {
160
+ pub fn new ( mut params : CertificateParams , alg : KeyPairAlgorithm ) -> Self {
161
161
params. is_ca = IsCa :: NoCa ;
162
162
params. use_authority_key_identifier_extension = true ;
163
163
params. key_usages . push ( KeyUsagePurpose :: DigitalSignature ) ;
@@ -196,36 +196,36 @@ impl EndEntityBuilder {
196
196
}
197
197
/// build `EndEntity` Certificate.
198
198
pub fn build ( self , issuer : & Ca ) -> Result < EndEntity , rcgen:: Error > {
199
- let key_pair = self . alg . to_keypair ( ) ?;
199
+ let key_pair = self . alg . to_key_pair ( ) ?;
200
200
let cert = Certificate :: generate ( self . params , & issuer. cert , & key_pair, & issuer. key_pair ) ?;
201
201
Ok ( EndEntity { cert, key_pair } )
202
202
}
203
203
}
204
204
205
205
/// Supported Keypair Algorithms
206
206
#[ derive( Clone , Copy , Debug , Default , Bpaf , PartialEq ) ]
207
- pub enum KeypairAlgorithm {
207
+ pub enum KeyPairAlgorithm {
208
208
Ed25519 ,
209
209
#[ default]
210
210
EcdsaP256 ,
211
211
EcdsaP384 ,
212
212
}
213
213
214
- impl fmt:: Display for KeypairAlgorithm {
214
+ impl fmt:: Display for KeyPairAlgorithm {
215
215
fn fmt ( & self , f : & mut fmt:: Formatter ) -> fmt:: Result {
216
216
match self {
217
- KeypairAlgorithm :: Ed25519 => write ! ( f, "ed25519" ) ,
218
- KeypairAlgorithm :: EcdsaP256 => write ! ( f, "ecdsa-p256" ) ,
219
- KeypairAlgorithm :: EcdsaP384 => write ! ( f, "ecdsa-p384" ) ,
217
+ KeyPairAlgorithm :: Ed25519 => write ! ( f, "ed25519" ) ,
218
+ KeyPairAlgorithm :: EcdsaP256 => write ! ( f, "ecdsa-p256" ) ,
219
+ KeyPairAlgorithm :: EcdsaP384 => write ! ( f, "ecdsa-p384" ) ,
220
220
}
221
221
}
222
222
}
223
223
224
- impl KeypairAlgorithm {
224
+ impl KeyPairAlgorithm {
225
225
/// Return an `rcgen::KeyPair` for the given varient
226
- fn to_keypair ( & self ) -> Result < rcgen:: KeyPair , rcgen:: Error > {
226
+ fn to_key_pair ( & self ) -> Result < rcgen:: KeyPair , rcgen:: Error > {
227
227
match self {
228
- KeypairAlgorithm :: Ed25519 => {
228
+ KeyPairAlgorithm :: Ed25519 => {
229
229
use ring:: signature:: Ed25519KeyPair ;
230
230
231
231
let rng = ring:: rand:: SystemRandom :: new ( ) ;
@@ -235,7 +235,7 @@ impl KeypairAlgorithm {
235
235
236
236
rcgen:: KeyPair :: from_der_and_sign_algo ( pkcs8_bytes. as_ref ( ) , alg)
237
237
} ,
238
- KeypairAlgorithm :: EcdsaP256 => {
238
+ KeyPairAlgorithm :: EcdsaP256 => {
239
239
use ring:: signature:: EcdsaKeyPair ;
240
240
use ring:: signature:: ECDSA_P256_SHA256_ASN1_SIGNING ;
241
241
@@ -246,7 +246,7 @@ impl KeypairAlgorithm {
246
246
. or ( Err ( rcgen:: Error :: RingUnspecified ) ) ?;
247
247
rcgen:: KeyPair :: from_der_and_sign_algo ( pkcs8_bytes. as_ref ( ) , alg)
248
248
} ,
249
- KeypairAlgorithm :: EcdsaP384 => {
249
+ KeyPairAlgorithm :: EcdsaP384 => {
250
250
use ring:: signature:: EcdsaKeyPair ;
251
251
use ring:: signature:: ECDSA_P384_SHA384_ASN1_SIGNING ;
252
252
@@ -298,7 +298,7 @@ mod tests {
298
298
fn with_sig_algo_default ( ) -> anyhow:: Result < ( ) > {
299
299
let end_entity = CertificateBuilder :: new ( ) . end_entity ( ) ;
300
300
301
- assert_eq ! ( end_entity. alg, KeypairAlgorithm :: EcdsaP256 ) ;
301
+ assert_eq ! ( end_entity. alg, KeyPairAlgorithm :: EcdsaP256 ) ;
302
302
Ok ( ( ) )
303
303
}
304
304
#[ test]
@@ -324,7 +324,7 @@ mod tests {
324
324
fn serialize_end_entity_ecdsa_p384_sha384_sig ( ) -> anyhow:: Result < ( ) > {
325
325
let ca = CertificateBuilder :: new ( ) . certificate_authority ( ) . build ( ) ?;
326
326
let end_entity = CertificateBuilder :: new ( )
327
- . signature_algorithm ( KeypairAlgorithm :: EcdsaP384 ) ?
327
+ . signature_algorithm ( KeyPairAlgorithm :: EcdsaP384 ) ?
328
328
. end_entity ( )
329
329
. build ( & ca) ?
330
330
. serialize_pem ( ) ;
@@ -343,7 +343,7 @@ mod tests {
343
343
fn serialize_end_entity_ed25519_sig ( ) -> anyhow:: Result < ( ) > {
344
344
let ca = CertificateBuilder :: new ( ) . certificate_authority ( ) . build ( ) ?;
345
345
let end_entity = CertificateBuilder :: new ( )
346
- . signature_algorithm ( KeypairAlgorithm :: Ed25519 ) ?
346
+ . signature_algorithm ( KeyPairAlgorithm :: Ed25519 ) ?
347
347
. end_entity ( )
348
348
. build ( & ca) ?
349
349
. serialize_pem ( ) ;
@@ -365,7 +365,7 @@ mod tests {
365
365
#[ test]
366
366
fn init_end_endity ( ) {
367
367
let params = CertificateParams :: default ( ) ;
368
- let cert = EndEntityBuilder :: new ( params, KeypairAlgorithm :: default ( ) ) ;
368
+ let cert = EndEntityBuilder :: new ( params, KeyPairAlgorithm :: default ( ) ) ;
369
369
assert_eq ! ( cert. params. is_ca, IsCa :: NoCa )
370
370
}
371
371
#[ test]
@@ -375,7 +375,7 @@ mod tests {
375
375
. build ( )
376
376
. unwrap ( ) ;
377
377
let params = CertificateParams :: default ( ) ;
378
- let mut cert = EndEntityBuilder :: new ( params, KeypairAlgorithm :: default ( ) ) ;
378
+ let mut cert = EndEntityBuilder :: new ( params, KeyPairAlgorithm :: default ( ) ) ;
379
379
assert_eq ! ( cert. params. is_ca, IsCa :: NoCa ) ;
380
380
assert_eq ! (
381
381
cert. client_auth( ) . params. extended_key_usages,
@@ -389,7 +389,7 @@ mod tests {
389
389
. build ( )
390
390
. unwrap ( ) ;
391
391
let params = CertificateParams :: default ( ) ;
392
- let mut cert = EndEntityBuilder :: new ( params, KeypairAlgorithm :: default ( ) ) ;
392
+ let mut cert = EndEntityBuilder :: new ( params, KeyPairAlgorithm :: default ( ) ) ;
393
393
assert_eq ! ( cert. params. is_ca, IsCa :: NoCa ) ;
394
394
assert_eq ! (
395
395
cert. server_auth( ) . params. extended_key_usages,
@@ -405,7 +405,7 @@ mod tests {
405
405
let name = "unexpected.oomyoo.xyz" ;
406
406
let names = vec ! [ SanType :: DnsName ( name. into( ) ) ] ;
407
407
let params = CertificateParams :: default ( ) ;
408
- let cert = EndEntityBuilder :: new ( params, KeypairAlgorithm :: default ( ) )
408
+ let cert = EndEntityBuilder :: new ( params, KeyPairAlgorithm :: default ( ) )
409
409
. subject_alternative_names ( names) ;
410
410
assert_eq ! (
411
411
cert. params. subject_alt_names,
@@ -420,21 +420,21 @@ mod tests {
420
420
. unwrap ( ) ;
421
421
let names = vec ! [ ] ;
422
422
let params = CertificateParams :: default ( ) ;
423
- let cert = EndEntityBuilder :: new ( params, KeypairAlgorithm :: default ( ) )
423
+ let cert = EndEntityBuilder :: new ( params, KeyPairAlgorithm :: default ( ) )
424
424
. subject_alternative_names ( names) ;
425
425
assert_eq ! ( cert. params. subject_alt_names, vec![ ] ) ;
426
426
}
427
427
428
428
#[ test]
429
- fn keypair_algorithm_to_keypair ( ) -> anyhow:: Result < ( ) > {
430
- let keypair = KeypairAlgorithm :: Ed25519 . to_keypair ( ) ?;
429
+ fn key_pair_algorithm_to_keypair ( ) -> anyhow:: Result < ( ) > {
430
+ let keypair = KeyPairAlgorithm :: Ed25519 . to_key_pair ( ) ?;
431
431
assert_eq ! ( format!( "{:?}" , keypair. algorithm( ) ) , "PKCS_ED25519" ) ;
432
- let keypair = KeypairAlgorithm :: EcdsaP256 . to_keypair ( ) ?;
432
+ let keypair = KeyPairAlgorithm :: EcdsaP256 . to_key_pair ( ) ?;
433
433
assert_eq ! (
434
434
format!( "{:?}" , keypair. algorithm( ) ) ,
435
435
"PKCS_ECDSA_P256_SHA256"
436
436
) ;
437
- let keypair = KeypairAlgorithm :: EcdsaP384 . to_keypair ( ) ?;
437
+ let keypair = KeyPairAlgorithm :: EcdsaP384 . to_key_pair ( ) ?;
438
438
assert_eq ! (
439
439
format!( "{:?}" , keypair. algorithm( ) ) ,
440
440
"PKCS_ECDSA_P384_SHA384"
0 commit comments