diff options
| author | Steven Fackler <[email protected]> | 2016-08-05 20:55:05 -0700 |
|---|---|---|
| committer | Steven Fackler <[email protected]> | 2016-08-05 20:55:05 -0700 |
| commit | b4145c6fa51ad59b0df2e0f48f67b8a0e56e1863 (patch) | |
| tree | 5da4891856d6c6f305d8bc77eb1635c6913a272b /openssl/src/ssl | |
| parent | Make x509 constructors unsafe (diff) | |
| download | rust-openssl-b4145c6fa51ad59b0df2e0f48f67b8a0e56e1863.tar.xz rust-openssl-b4145c6fa51ad59b0df2e0f48f67b8a0e56e1863.zip | |
Clean up x509
Diffstat (limited to 'openssl/src/ssl')
| -rw-r--r-- | openssl/src/ssl/mod.rs | 12 | ||||
| -rw-r--r-- | openssl/src/ssl/tests/mod.rs | 6 |
2 files changed, 9 insertions, 9 deletions
diff --git a/openssl/src/ssl/mod.rs b/openssl/src/ssl/mod.rs index 8cfc209a..c95f2646 100644 --- a/openssl/src/ssl/mod.rs +++ b/openssl/src/ssl/mod.rs @@ -21,7 +21,7 @@ use std::marker::PhantomData; use ffi; use dh::DH; -use x509::{X509StoreContext, X509FileType, X509}; +use x509::{X509StoreContext, X509FileType, X509, X509Ref}; use crypto::pkey::PKey; use error::ErrorStack; @@ -577,15 +577,15 @@ impl SslContext { } /// Specifies the certificate - pub fn set_certificate(&mut self, cert: &X509) -> Result<(), ErrorStack> { - wrap_ssl_result(unsafe { ffi::SSL_CTX_use_certificate(self.ctx, cert.get_handle()) }) + pub fn set_certificate(&mut self, cert: &X509Ref) -> Result<(), ErrorStack> { + wrap_ssl_result(unsafe { ffi::SSL_CTX_use_certificate(self.ctx, cert.handle()) }) } /// Adds a certificate to the certificate chain presented together with the /// certificate specified using set_certificate() - pub fn add_extra_chain_cert(&mut self, cert: &X509) -> Result<(), ErrorStack> { + pub fn add_extra_chain_cert(&mut self, cert: &X509Ref) -> Result<(), ErrorStack> { wrap_ssl_result(unsafe { - ffi::SSL_CTX_add_extra_chain_cert(self.ctx, cert.get_handle()) as c_int + ffi::SSL_CTX_add_extra_chain_cert(self.ctx, cert.handle()) as c_int }) } @@ -910,7 +910,7 @@ impl Ssl { if ptr.is_null() { None } else { - Some(X509::new(ptr, true)) + Some(X509::new(ptr)) } } } diff --git a/openssl/src/ssl/tests/mod.rs b/openssl/src/ssl/tests/mod.rs index b774b383..b89517da 100644 --- a/openssl/src/ssl/tests/mod.rs +++ b/openssl/src/ssl/tests/mod.rs @@ -300,7 +300,7 @@ run_test!(verify_trusted_callback_override_bad, |method, stream| { run_test!(verify_callback_load_certs, |method, stream| { let mut ctx = SslContext::new(method).unwrap(); ctx.set_verify_callback(SSL_VERIFY_PEER, |_, x509_ctx| { - assert!(x509_ctx.get_current_cert().is_some()); + assert!(x509_ctx.current_cert().is_some()); true }); @@ -341,7 +341,7 @@ run_test!(verify_callback_data, |method, stream| { let node_hash_str = "E19427DAC79FBE758394945276A6E4F15F0BEBE6"; let node_id = node_hash_str.from_hex().unwrap(); ctx.set_verify_callback(SSL_VERIFY_PEER, move |_preverify_ok, x509_ctx| { - let cert = x509_ctx.get_current_cert(); + let cert = x509_ctx.current_cert(); match cert { None => false, Some(cert) => { @@ -371,7 +371,7 @@ run_test!(ssl_verify_callback, |method, stream| { let node_id = node_hash_str.from_hex().unwrap(); ssl.set_verify_callback(SSL_VERIFY_PEER, move |_, x509| { CHECKED.store(1, Ordering::SeqCst); - match x509.get_current_cert() { + match x509.current_cert() { None => false, Some(cert) => { let fingerprint = cert.fingerprint(SHA1).unwrap(); |