--- Begin Message ---
Package: rust-rustls-0.21
I hope to update rustls-pemfile to version 2 and rustls-native-certs to
version 0.8 in unstable after the new rust-rustls migrates to testing.
The new versions have been in experimental
for some time.
rustls-0.21 uses these crates for it's examples and tests,
I looked into backporting the upstream changes for rustls-pemfile
but it was mixed up with other changes, so I just fixed the
tests/examples myself.
rustls-native-certs is only used because of a debian patch, so there
was nothing to backport and again I fixed it myself.
diff -Nru rust-rustls-0.21-0.21.12/debian/changelog
rust-rustls-0.21-0.21.12/debian/changelog
--- rust-rustls-0.21-0.21.12/debian/changelog 2025-02-16 20:06:41.000000000
+0000
+++ rust-rustls-0.21-0.21.12/debian/changelog 2025-02-18 04:46:26.000000000
+0000
@@ -1,3 +1,11 @@
+rust-rustls-0.21 (0.21.12-13.1) UNRELEASED; urgency=medium
+
+ * Non-maintainer upload.
+ * Add patch for rustls-pemfile 2.
+ * Add patch for rustls-native-certs 0.8
+
+ -- Peter Michael Green <plugw...@debian.org> Tue, 18 Feb 2025 04:46:26 +0000
+
rust-rustls-0.21 (0.21.12-13) unstable; urgency=medium
* install tests to versioned directory;
diff -Nru rust-rustls-0.21-0.21.12/debian/control
rust-rustls-0.21-0.21.12/debian/control
--- rust-rustls-0.21-0.21.12/debian/control 2025-02-16 20:04:20.000000000
+0000
+++ rust-rustls-0.21-0.21.12/debian/control 2025-02-18 04:46:26.000000000
+0000
@@ -13,8 +13,8 @@
librust-mio-1+os-poll-dev,
librust-regex-1+default-dev,
librust-ring-0.17+default-dev,
- librust-rustls-native-certs-0.6+default-dev,
- librust-rustls-pemfile-1+default-dev,
+ librust-rustls-native-certs-0.8+default-dev,
+ librust-rustls-pemfile-2+default-dev,
librust-rustls-webpki-0.101+alloc-dev,
librust-rustls-webpki-0.101+default-dev (>= 0.101.7),
librust-rustls-webpki-0.101+std-dev,
diff -Nru rust-rustls-0.21-0.21.12/debian/patches/2005_rustls_pemfile_2.patch
rust-rustls-0.21-0.21.12/debian/patches/2005_rustls_pemfile_2.patch
--- rust-rustls-0.21-0.21.12/debian/patches/2005_rustls_pemfile_2.patch
1970-01-01 00:00:00.000000000 +0000
+++ rust-rustls-0.21-0.21.12/debian/patches/2005_rustls_pemfile_2.patch
2025-02-18 04:46:26.000000000 +0000
@@ -0,0 +1,291 @@
+Description: Support rustls-pemfile 2.
+ I looked through the upstream commits, but the switch to rustls-pemfile
+ 2 was done as part of a larger change, so I just fixed the compatibility
+ issues with rustls-pemfile 2 myself.
+Author: Peter Michael Green <plugw...@debian.org>
+Last-Update: 2025-02-18
+
+Index: rust-rustls-0.21-0.21.12/examples/Cargo.toml
+===================================================================
+--- rust-rustls-0.21-0.21.12.orig/examples/Cargo.toml
++++ rust-rustls-0.21-0.21.12/examples/Cargo.toml
+@@ -16,7 +16,7 @@ env_logger = ">= 0.10, <= 0.11"
+ log = { version = "0.4.4" }
+ mio = { version = ">= 0.8, <= 1", features = ["net", "os-poll"] }
+ rustls = { path = "../rustls", features = [ "logging" ]}
+-rustls-pemfile = "1.0.3"
++rustls-pemfile = "2"
+ sct = "0.7"
+ serde = "1.0"
+ serde_derive = "1.0"
+Index: rust-rustls-0.21-0.21.12/examples/src/bin/tlsclient-mio.rs
+===================================================================
+--- rust-rustls-0.21-0.21.12.orig/examples/src/bin/tlsclient-mio.rs
++++ rust-rustls-0.21-0.21.12/examples/src/bin/tlsclient-mio.rs
+@@ -307,9 +307,7 @@ fn load_certs(filename: &str) -> Vec<rus
+ let certfile = fs::File::open(filename).expect("cannot open certificate
file");
+ let mut reader = BufReader::new(certfile);
+ rustls_pemfile::certs(&mut reader)
+- .unwrap()
+- .iter()
+- .map(|v| rustls::Certificate(v.clone()))
++ .map(|v| rustls::Certificate(v.unwrap().to_vec()))
+ .collect()
+ }
+
+@@ -319,9 +317,9 @@ fn load_private_key(filename: &str) -> r
+
+ loop {
+ match rustls_pemfile::read_one(&mut reader).expect("cannot parse
private key .pem file") {
+- Some(rustls_pemfile::Item::RSAKey(key)) => return
rustls::PrivateKey(key),
+- Some(rustls_pemfile::Item::PKCS8Key(key)) => return
rustls::PrivateKey(key),
+- Some(rustls_pemfile::Item::ECKey(key)) => return
rustls::PrivateKey(key),
++ Some(rustls_pemfile::Item::Pkcs1Key(key)) => return
rustls::PrivateKey(key.secret_pkcs1_der().to_vec()),
++ Some(rustls_pemfile::Item::Pkcs8Key(key)) => return
rustls::PrivateKey(key.secret_pkcs8_der().to_vec()),
++ Some(rustls_pemfile::Item::Sec1Key(key)) => return
rustls::PrivateKey(key.secret_sec1_der().to_vec()),
+ None => break,
+ _ => {}
+ }
+@@ -376,7 +374,7 @@ fn make_config(args: &Args) -> Arc<rustl
+
+ let certfile = fs::File::open(cafile).expect("Cannot open CA file");
+ let mut reader = BufReader::new(certfile);
+- root_store.add_parsable_certificates(&rustls_pemfile::certs(&mut
reader).unwrap());
++ root_store.add_parsable_certificates(&rustls_pemfile::certs(&mut
reader).map(|x| x.unwrap().to_vec()).collect::<Vec<_>>());
+ } else {
+ for cert in rustls_native_certs::load_native_certs().expect("could
not load platform certs") {
+ root_store
+Index: rust-rustls-0.21-0.21.12/examples/src/bin/tlsserver-mio.rs
+===================================================================
+--- rust-rustls-0.21-0.21.12.orig/examples/src/bin/tlsserver-mio.rs
++++ rust-rustls-0.21-0.21.12/examples/src/bin/tlsserver-mio.rs
+@@ -515,9 +515,7 @@ fn load_certs(filename: &str) -> Vec<rus
+ let certfile = fs::File::open(filename).expect("cannot open certificate
file");
+ let mut reader = BufReader::new(certfile);
+ rustls_pemfile::certs(&mut reader)
+- .unwrap()
+- .iter()
+- .map(|v| rustls::Certificate(v.clone()))
++ .map(|v| rustls::Certificate(v.unwrap().to_vec()))
+ .collect()
+ }
+
+@@ -527,9 +525,9 @@ fn load_private_key(filename: &str) -> r
+
+ loop {
+ match rustls_pemfile::read_one(&mut reader).expect("cannot parse
private key .pem file") {
+- Some(rustls_pemfile::Item::RSAKey(key)) => return
rustls::PrivateKey(key),
+- Some(rustls_pemfile::Item::PKCS8Key(key)) => return
rustls::PrivateKey(key),
+- Some(rustls_pemfile::Item::ECKey(key)) => return
rustls::PrivateKey(key),
++ Some(rustls_pemfile::Item::Pkcs1Key(key)) => return
rustls::PrivateKey(key.secret_pkcs1_der().to_vec()),
++ Some(rustls_pemfile::Item::Pkcs8Key(key)) => return
rustls::PrivateKey(key.secret_pkcs8_der().to_vec()),
++ Some(rustls_pemfile::Item::Sec1Key(key)) => return
rustls::PrivateKey(key.secret_sec1_der().to_vec()),
+ None => break,
+ _ => {}
+ }
+Index: rust-rustls-0.21-0.21.12/rustls/Cargo.toml
+===================================================================
+--- rust-rustls-0.21-0.21.12.orig/rustls/Cargo.toml
++++ rust-rustls-0.21-0.21.12/rustls/Cargo.toml
+@@ -33,1 +33,1 @@
+-rustls-pemfile = "1.0.3"
++rustls-pemfile = "2"
+Index: rust-rustls-0.21-0.21.12/rustls/examples/internal/bench.rs
+===================================================================
+--- rust-rustls-0.21-0.21.12.orig/rustls/examples/internal/bench.rs
++++ rust-rustls-0.21-0.21.12/rustls/examples/internal/bench.rs
+@@ -254,9 +254,7 @@ impl KeyType {
+ rustls_pemfile::certs(&mut io::BufReader::new(
+ fs::File::open(self.path_for("end.fullchain")).unwrap(),
+ ))
+- .unwrap()
+- .iter()
+- .map(|v| rustls::Certificate(v.clone()))
++ .map(|v| rustls::Certificate(v.unwrap().to_vec()))
+ .collect()
+ }
+
+@@ -265,8 +263,8 @@ impl KeyType {
+ rustls_pemfile::pkcs8_private_keys(&mut io::BufReader::new(
+ fs::File::open(self.path_for("end.key")).unwrap(),
+ ))
+- .unwrap()[0]
+- .clone(),
++ .next().unwrap().unwrap()
++ .secret_pkcs8_der().to_vec(),
+ )
+ }
+
+@@ -274,9 +272,7 @@ impl KeyType {
+ rustls_pemfile::certs(&mut io::BufReader::new(
+ fs::File::open(self.path_for("client.fullchain")).unwrap(),
+ ))
+- .unwrap()
+- .iter()
+- .map(|v| rustls::Certificate(v.clone()))
++ .map(|v| rustls::Certificate(v.unwrap().to_vec()))
+ .collect()
+ }
+
+@@ -285,8 +281,8 @@ impl KeyType {
+ rustls_pemfile::pkcs8_private_keys(&mut io::BufReader::new(
+ fs::File::open(self.path_for("client.key")).unwrap(),
+ ))
+- .unwrap()[0]
+- .clone(),
++ .next().unwrap().unwrap()
++ .secret_pkcs8_der().to_vec(),
+ )
+ }
+ }
+@@ -338,7 +334,7 @@ fn make_client_config(
+ let mut root_store = RootCertStore::empty();
+ let mut rootbuf =
+
io::BufReader::new(fs::File::open(params.key_type.path_for("ca.cert")).unwrap());
+- root_store.add_parsable_certificates(&rustls_pemfile::certs(&mut
rootbuf).unwrap());
++ root_store.add_parsable_certificates(&rustls_pemfile::certs(&mut
rootbuf).map(|x| x.unwrap()).collect::<Vec<_>>());
+
+ let cfg = ClientConfig::builder()
+ .with_cipher_suites(&[params.ciphersuite])
+Index: rust-rustls-0.21-0.21.12/rustls/examples/internal/bogo_shim.rs
+===================================================================
+--- rust-rustls-0.21-0.21.12.orig/rustls/examples/internal/bogo_shim.rs
++++ rust-rustls-0.21-0.21.12/rustls/examples/internal/bogo_shim.rs
+@@ -159,18 +159,17 @@ fn load_cert(filename: &str) -> Vec<Cert
+ let certfile = fs::File::open(filename).expect("cannot open certificate
file");
+ let mut reader = BufReader::new(certfile);
+ rustls_pemfile::certs(&mut reader)
+- .unwrap()
+- .iter()
+- .map(|v| Certificate(v.clone()))
++ .map(|v| Certificate(v.unwrap().to_vec()))
+ .collect()
+ }
+
+ fn load_key(filename: &str) -> PrivateKey {
+ let keyfile = fs::File::open(filename).expect("cannot open private key
file");
+ let mut reader = BufReader::new(keyfile);
+- let keys = rustls_pemfile::pkcs8_private_keys(&mut reader).unwrap();
+- assert!(keys.len() == 1);
+- PrivateKey(keys[0].clone())
++ let mut keys = rustls_pemfile::pkcs8_private_keys(&mut reader);
++ let first = keys.next().unwrap();
++ assert!(keys.next().is_none());
++ PrivateKey(first.unwrap().secret_pkcs8_der().to_vec())
+ }
+
+ fn split_protocols(protos: &str) -> Vec<String> {
+Index: rust-rustls-0.21-0.21.12/rustls/tests/common/mod.rs
+===================================================================
+--- rust-rustls-0.21-0.21.12.orig/rustls/tests/common/mod.rs
++++ rust-rustls-0.21-0.21.12/rustls/tests/common/mod.rs
+@@ -210,25 +210,21 @@ impl KeyType {
+
+ pub fn get_chain(&self) -> Vec<Certificate> {
+ rustls_pemfile::certs(&mut
io::BufReader::new(self.bytes_for("end.fullchain")))
+- .unwrap()
+- .iter()
+- .map(|v| Certificate(v.clone()))
++ .map(|v| Certificate(v.unwrap().to_vec()))
+ .collect()
+ }
+
+ pub fn get_key(&self) -> PrivateKey {
+ PrivateKey(
+ rustls_pemfile::pkcs8_private_keys(&mut
io::BufReader::new(self.bytes_for("end.key")))
+- .unwrap()[0]
+- .clone(),
++ .next().unwrap().unwrap()
++ .secret_pkcs8_der().to_vec(),
+ )
+ }
+
+ pub fn get_client_chain(&self) -> Vec<Certificate> {
+ rustls_pemfile::certs(&mut
io::BufReader::new(self.bytes_for("client.fullchain")))
+- .unwrap()
+- .iter()
+- .map(|v| Certificate(v.clone()))
++ .map(|v| Certificate(v.unwrap().to_vec()))
+ .collect()
+ }
+
+@@ -237,10 +233,11 @@ impl KeyType {
+ rustls_pemfile::crls(&mut io::BufReader::new(
+ self.bytes_for("client.revoked.crl.pem"),
+ ))
+- .unwrap()
+ .into_iter()
+ .next() // We only expect one CRL.
+- .unwrap(),
++ .unwrap()
++ .unwrap()
++ .to_vec(),
+ )
+ }
+
+@@ -249,8 +246,8 @@ impl KeyType {
+ rustls_pemfile::pkcs8_private_keys(&mut io::BufReader::new(
+ self.bytes_for("client.key"),
+ ))
+- .unwrap()[0]
+- .clone(),
++ .next().unwrap().unwrap()
++ .secret_pkcs8_der().to_vec(),
+ )
+ }
+ }
+@@ -351,7 +348,7 @@ pub fn finish_client_config(
+ ) -> ClientConfig {
+ let mut root_store = RootCertStore::empty();
+ let mut rootbuf = io::BufReader::new(kt.bytes_for("ca.cert"));
+- root_store.add_parsable_certificates(&rustls_pemfile::certs(&mut
rootbuf).unwrap());
++ root_store.add_parsable_certificates(&rustls_pemfile::certs(&mut
rootbuf).map(|x| x.unwrap()).collect::<Vec<_>>());
+
+ config
+ .with_root_certificates(root_store)
+@@ -364,7 +361,7 @@ pub fn finish_client_config_with_creds(
+ ) -> ClientConfig {
+ let mut root_store = RootCertStore::empty();
+ let mut rootbuf = io::BufReader::new(kt.bytes_for("ca.cert"));
+- root_store.add_parsable_certificates(&rustls_pemfile::certs(&mut
rootbuf).unwrap());
++ root_store.add_parsable_certificates(&rustls_pemfile::certs(&mut
rootbuf).map(|x| x.unwrap()).collect::<Vec<_>>());
+
+ config
+ .with_root_certificates(root_store)
+Index: rust-rustls-0.21-0.21.12/rustls/src/key.rs
+===================================================================
+--- rust-rustls-0.21-0.21.12.orig/rustls/src/key.rs
++++ rust-rustls-0.21-0.21.12/rustls/src/key.rs
+@@ -33,13 +33,15 @@ use crate::Error;
+ /// fn load_private_key_from_file(path: &str) -> Result<PrivateKey, Box<dyn
std::error::Error>> {
+ /// let file = File::open(&path)?;
+ /// let mut reader = BufReader::new(file);
+-/// let mut keys = rustls_pemfile::pkcs8_private_keys(&mut reader)?;
++/// let mut keys = rustls_pemfile::pkcs8_private_keys(&mut reader);
+ ///
+-/// match keys.len() {
+-/// 0 => Err(format!("No PKCS8-encoded private key found in
{path}").into()),
+-/// 1 => Ok(PrivateKey(keys.remove(0))),
+-/// _ => Err(format!("More than one PKCS8-encoded private key found
in {path}").into()),
++/// let Some(key) = keys.next() else {
++/// return Err(format!("No PKCS8-encoded private key found in
{path}").into());
++/// };
++/// if keys.next().is_some() {
++/// return Err(format!("More than one PKCS8-encoded private key found
in {path}").into());
+ /// }
++/// Ok(PrivateKey(key?.secret_pkcs8_der().to_vec()))
+ /// }
+ /// ```
+ #[derive(Debug, Clone, Eq, PartialEq)]
+@@ -76,9 +78,9 @@ pub struct PrivateKey(pub Vec<u8>);
+ /// fn load_certificates_from_pem(path: &str) ->
std::io::Result<Vec<Certificate>> {
+ /// let file = File::open(path)?;
+ /// let mut reader = BufReader::new(file);
+-/// let certs = rustls_pemfile::certs(&mut reader)?;
++/// let certs = rustls_pemfile::certs(&mut reader);
+ ///
+-/// Ok(certs.into_iter().map(Certificate).collect())
++/// Ok(certs.map(|x| Certificate(x.unwrap().to_vec())).collect())
+ /// }
+ /// ```
+ #[derive(Clone, Eq, Hash, Ord, PartialEq, PartialOrd)]
diff -Nru
rust-rustls-0.21-0.21.12/debian/patches/2006_rustls_native_certs_0.8.patch
rust-rustls-0.21-0.21.12/debian/patches/2006_rustls_native_certs_0.8.patch
--- rust-rustls-0.21-0.21.12/debian/patches/2006_rustls_native_certs_0.8.patch
1970-01-01 00:00:00.000000000 +0000
+++ rust-rustls-0.21-0.21.12/debian/patches/2006_rustls_native_certs_0.8.patch
2025-02-18 04:46:26.000000000 +0000
@@ -0,0 +1,111 @@
+Description: use rustls-native-certs 0.8
+Author: Peter Michael Green <plugw...@debian.org>
+Last-Update: 2025-02-18
+
+Index: rust-rustls-0.21-0.21.12/examples/Cargo.toml
+===================================================================
+--- rust-rustls-0.21-0.21.12.orig/examples/Cargo.toml
++++ rust-rustls-0.21-0.21.12/examples/Cargo.toml
+@@ -20,7 +20,7 @@ rustls-pemfile = "1.0.3"
+ sct = "0.7"
+ serde = "1.0"
+ serde_derive = "1.0"
+-rustls-native-certs = "0.6"
++rustls-native-certs = "0.8"
+
+ [dev-dependencies]
+ regex = "1.0"
+Index: rust-rustls-0.21-0.21.12/examples/src/bin/limitedclient.rs
+===================================================================
+--- rust-rustls-0.21-0.21.12.orig/examples/src/bin/limitedclient.rs
++++ rust-rustls-0.21-0.21.12/examples/src/bin/limitedclient.rs
+@@ -10,7 +10,7 @@ fn main() {
+ let mut root_store = rustls::RootCertStore::empty();
+ for cert in rustls_native_certs::load_native_certs().expect("could not
load platform certs") {
+ root_store
+- .add(&rustls::Certificate(cert.0))
++ .add(&rustls::Certificate(cert.to_vec()))
+ .unwrap();
+ }
+
+Index: rust-rustls-0.21-0.21.12/examples/src/bin/simple_0rtt_client.rs
+===================================================================
+--- rust-rustls-0.21-0.21.12.orig/examples/src/bin/simple_0rtt_client.rs
++++ rust-rustls-0.21-0.21.12/examples/src/bin/simple_0rtt_client.rs
+@@ -60,7 +60,7 @@ fn main() {
+ let mut root_store = RootCertStore::empty();
+ for cert in rustls_native_certs::load_native_certs().expect("could not
load platform certs") {
+ root_store
+- .add(&rustls::Certificate(cert.0))
++ .add(&rustls::Certificate(cert.to_vec()))
+ .unwrap();
+ }
+
+Index: rust-rustls-0.21-0.21.12/examples/src/bin/simpleclient.rs
+===================================================================
+--- rust-rustls-0.21-0.21.12.orig/examples/src/bin/simpleclient.rs
++++ rust-rustls-0.21-0.21.12/examples/src/bin/simpleclient.rs
+@@ -18,7 +18,7 @@ fn main() {
+ let mut root_store = RootCertStore::empty();
+ for cert in rustls_native_certs::load_native_certs().expect("could not
load platform certs") {
+ root_store
+- .add(&rustls::Certificate(cert.0))
++ .add(&rustls::Certificate(cert.to_vec()))
+ .unwrap();
+ }
+ let config = rustls::ClientConfig::builder()
+Index: rust-rustls-0.21-0.21.12/examples/src/bin/tlsclient-mio.rs
+===================================================================
+--- rust-rustls-0.21-0.21.12.orig/examples/src/bin/tlsclient-mio.rs
++++ rust-rustls-0.21-0.21.12/examples/src/bin/tlsclient-mio.rs
+@@ -380,7 +380,7 @@ fn make_config(args: &Args) -> Arc<rustl
+ } else {
+ for cert in rustls_native_certs::load_native_certs().expect("could
not load platform certs") {
+ root_store
+- .add(&rustls::Certificate(cert.0))
++ .add(&rustls::Certificate(cert.to_vec()))
+ .unwrap();
+ }
+ }
+Index: rust-rustls-0.21-0.21.12/rustls/Cargo.toml
+===================================================================
+--- rust-rustls-0.21-0.21.12.orig/rustls/Cargo.toml
++++ rust-rustls-0.21-0.21.12/rustls/Cargo.toml
+@@ -32,1 +32,1 @@
+-rustls-native-certs = "0.6"
++rustls-native-certs = "0.8"
+Index: rust-rustls-0.21-0.21.12/rustls/src/verifybench.rs
+===================================================================
+--- rust-rustls-0.21-0.21.12.orig/rustls/src/verifybench.rs
++++ rust-rustls-0.21-0.21.12/rustls/src/verifybench.rs
+@@ -199,7 +199,7 @@ impl Context {
+ let mut roots = anchors::RootCertStore::empty();
+ for cert in rustls_native_certs::load_native_certs().expect("could
not load platform certs") {
+ roots
+- .add(&crate::Certificate(cert.0))
++ .add(&crate::Certificate(cert.to_vec()))
+ .unwrap();
+ }
+ Self {
+Index: rust-rustls-0.21-0.21.12/rustls/src/lib.rs
+===================================================================
+--- rust-rustls-0.21-0.21.12.orig/rustls/src/lib.rs
++++ rust-rustls-0.21-0.21.12/rustls/src/lib.rs
+@@ -111,7 +111,7 @@
+ //! let mut root_store = rustls::RootCertStore::empty();
+ //! for cert in rustls_native_certs::load_native_certs().expect("could not
load platform certs") {
+ //! root_store
+-//! .add(&rustls::Certificate(cert.0))
++//! .add(&rustls::Certificate(cert.to_vec()))
+ //! .unwrap();
+ //! }
+ //! ```
+@@ -136,7 +136,7 @@
+ //! # let mut root_store = rustls::RootCertStore::empty();
+ //! # for cert in rustls_native_certs::load_native_certs().expect("could not
load platform certs") {
+ //! # root_store
+-//! # .add(&rustls::Certificate(cert.0))
++//! # .add(&rustls::Certificate(cert.to_vec()))
+ //! # .unwrap();
+ //! # }
+ //! # let config = rustls::ClientConfig::builder()
diff -Nru rust-rustls-0.21-0.21.12/debian/patches/series
rust-rustls-0.21-0.21.12/debian/patches/series
--- rust-rustls-0.21-0.21.12/debian/patches/series 2025-02-16
20:04:20.000000000 +0000
+++ rust-rustls-0.21-0.21.12/debian/patches/series 2025-02-18
04:46:26.000000000 +0000
@@ -6,3 +6,5 @@
2001_native_certs.patch
2003_network_access.patch
2004_no_feature_read_buf.patch
+2005_rustls_pemfile_2.patch
+2006_rustls_native_certs_0.8.patch
diff -Nru rust-rustls-0.21-0.21.12/debian/tests/control
rust-rustls-0.21-0.21.12/debian/tests/control
--- rust-rustls-0.21-0.21.12/debian/tests/control 2025-02-16
20:04:20.000000000 +0000
+++ rust-rustls-0.21-0.21.12/debian/tests/control 2025-02-18
04:46:26.000000000 +0000
@@ -13,8 +13,8 @@
librust-mio-1+os-poll-dev,
librust-regex-1+default-dev,
librust-rustls-0.21+default-dev,
- librust-rustls-native-certs-0.6+default-dev,
- librust-rustls-pemfile-1+default-dev,
+ librust-rustls-native-certs-0.8+default-dev,
+ librust-rustls-pemfile-2+default-dev,
librust-serde-1+default-dev,
librust-serde-derive-1+default-dev,
Restrictions: allow-stderr
@@ -33,8 +33,8 @@
librust-mio-1+os-poll-dev,
librust-regex-1+default-dev,
librust-rustls-0.21-dev,
- librust-rustls-native-certs-0.6+default-dev,
- librust-rustls-pemfile-1+default-dev,
+ librust-rustls-native-certs-0.8+default-dev,
+ librust-rustls-pemfile-2+default-dev,
librust-rustversion-1-dev,
librust-serde-1+default-dev,
librust-serde-derive-1+default-dev,
@@ -53,8 +53,8 @@
librust-mio-1+os-poll-dev,
librust-regex-1+default-dev,
librust-rustls-0.21-dev,
- librust-rustls-native-certs-0.6+default-dev,
- librust-rustls-pemfile-1+default-dev,
+ librust-rustls-native-certs-0.8+default-dev,
+ librust-rustls-pemfile-2+default-dev,
librust-serde-1+default-dev,
librust-serde-derive-1+default-dev,
Restrictions: allow-stderr
@@ -72,8 +72,8 @@
librust-mio-1+os-poll-dev,
librust-regex-1+default-dev,
librust-rustls-0.21+dangerous-configuration-dev,
- librust-rustls-native-certs-0.6+default-dev,
- librust-rustls-pemfile-1+default-dev,
+ librust-rustls-native-certs-0.8+default-dev,
+ librust-rustls-pemfile-2+default-dev,
librust-serde-1+default-dev,
librust-serde-derive-1+default-dev,
Restrictions: allow-stderr
@@ -93,8 +93,8 @@
librust-mio-1+os-poll-dev,
librust-regex-1+default-dev,
librust-rustls-0.21+logging-dev,
- librust-rustls-native-certs-0.6+default-dev,
- librust-rustls-pemfile-1+default-dev,
+ librust-rustls-native-certs-0.8+default-dev,
+ librust-rustls-pemfile-2+default-dev,
librust-serde-1+default-dev,
librust-serde-derive-1+default-dev,
Restrictions: allow-stderr
@@ -113,8 +113,8 @@
librust-mio-1+os-poll-dev,
librust-regex-1+default-dev,
librust-rustls-0.21+quic-dev,
- librust-rustls-native-certs-0.6+default-dev,
- librust-rustls-pemfile-1+default-dev,
+ librust-rustls-native-certs-0.8+default-dev,
+ librust-rustls-pemfile-2+default-dev,
librust-serde-1+default-dev,
librust-serde-derive-1+default-dev,
Restrictions: allow-stderr
@@ -133,7 +133,7 @@
librust-mio-1+os-poll-dev,
librust-regex-1+default-dev,
librust-rustls-0.21+secret-extraction-dev,
- librust-rustls-native-certs-0.6+default-dev,
+ librust-rustls-native-certs-0.8+default-dev,
librust-rustls-pemfile-dev,
librust-serde-1+default-dev,
librust-serde-derive-1+default-dev,
@@ -153,7 +153,7 @@
librust-mio-1+os-poll-dev,
librust-regex-1+default-dev,
librust-rustls-0.21+tls12-dev,
- librust-rustls-native-certs-0.6+default-dev,
+ librust-rustls-native-certs-0.8+default-dev,
librust-rustls-pemfile-dev,
librust-serde-1+default-dev,
librust-serde-derive-1+default-dev,
--- End Message ---