Go the other way - use aws_lc_rs instead of ring

This commit is contained in:
asonix 2024-05-12 15:04:52 -05:00
parent 6b669136f3
commit 94cf15f977
3 changed files with 4 additions and 4 deletions

View File

@ -127,7 +127,7 @@ futures-util = { version = "0.3.17", default-features = false, features = ["sink
itertools = "0.12" itertools = "0.12"
rcgen = "0.12" rcgen = "0.12"
rustls-pemfile = "2" rustls-pemfile = "2"
tokio-rustls-026 = { package = "tokio-rustls", version = "0.26", default-features = false, features = ["ring"] } tokio-rustls-026 = { package = "tokio-rustls", version = "0.26" }
trust-dns-resolver = "0.23" trust-dns-resolver = "0.23"
[[example]] [[example]]

View File

@ -88,7 +88,7 @@ mod danger {
} }
fn supported_verify_schemes(&self) -> Vec<rustls::SignatureScheme> { fn supported_verify_schemes(&self) -> Vec<rustls::SignatureScheme> {
rustls::crypto::ring::default_provider() rustls::crypto::aws_lc_rs::default_provider()
.signature_verification_algorithms .signature_verification_algorithms
.supported_schemes() .supported_schemes()
} }
@ -111,7 +111,7 @@ fn rustls_connector(_cert: String, _key: String) -> ClientConfig {
#[actix_rt::test] #[actix_rt::test]
async fn accepts_connections() { async fn accepts_connections() {
tokio_rustls_026::rustls::crypto::ring::default_provider() tokio_rustls_026::rustls::crypto::aws_lc_rs::default_provider()
.install_default() .install_default()
.unwrap(); .unwrap();

View File

@ -73,7 +73,7 @@ fn openssl_connector(cert: String, key: String) -> SslConnector {
#[actix_rt::test] #[actix_rt::test]
async fn accepts_connections() { async fn accepts_connections() {
tokio_rustls_026::rustls::crypto::ring::default_provider() tokio_rustls_026::rustls::crypto::aws_lc_rs::default_provider()
.install_default() .install_default()
.unwrap(); .unwrap();