Package: rust-rustls-0.21

I hope to update rustls-pemfile to version 2 and rustls-native-certs to
version 0.8 in unstable after the new rust-rustls migrates to testing.
The new versions have been in experimental
for some time.

rustls-0.21 uses these crates for it's examples and tests,

I looked into backporting the upstream changes for rustls-pemfile
but it was mixed up with other changes, so I just fixed the
tests/examples myself.

rustls-native-certs is only used because of a debian patch, so there
was nothing to backport and again I fixed it myself.

diff -Nru rust-rustls-0.21-0.21.12/debian/changelog 
rust-rustls-0.21-0.21.12/debian/changelog
--- rust-rustls-0.21-0.21.12/debian/changelog   2025-02-16 20:06:41.000000000 
+0000
+++ rust-rustls-0.21-0.21.12/debian/changelog   2025-02-18 04:46:26.000000000 
+0000
@@ -1,3 +1,11 @@
+rust-rustls-0.21 (0.21.12-13.1) UNRELEASED; urgency=medium
+
+  * Non-maintainer upload.
+  * Add patch for rustls-pemfile 2.
+  * Add patch for rustls-native-certs 0.8
+
+ -- Peter Michael Green <plugw...@debian.org>  Tue, 18 Feb 2025 04:46:26 +0000
+
 rust-rustls-0.21 (0.21.12-13) unstable; urgency=medium
 
   * install tests to versioned directory;
diff -Nru rust-rustls-0.21-0.21.12/debian/control 
rust-rustls-0.21-0.21.12/debian/control
--- rust-rustls-0.21-0.21.12/debian/control     2025-02-16 20:04:20.000000000 
+0000
+++ rust-rustls-0.21-0.21.12/debian/control     2025-02-18 04:46:26.000000000 
+0000
@@ -13,8 +13,8 @@
  librust-mio-1+os-poll-dev,
  librust-regex-1+default-dev,
  librust-ring-0.17+default-dev,
- librust-rustls-native-certs-0.6+default-dev,
- librust-rustls-pemfile-1+default-dev,
+ librust-rustls-native-certs-0.8+default-dev,
+ librust-rustls-pemfile-2+default-dev,
  librust-rustls-webpki-0.101+alloc-dev,
  librust-rustls-webpki-0.101+default-dev (>= 0.101.7),
  librust-rustls-webpki-0.101+std-dev,
diff -Nru rust-rustls-0.21-0.21.12/debian/patches/2005_rustls_pemfile_2.patch 
rust-rustls-0.21-0.21.12/debian/patches/2005_rustls_pemfile_2.patch
--- rust-rustls-0.21-0.21.12/debian/patches/2005_rustls_pemfile_2.patch 
1970-01-01 00:00:00.000000000 +0000
+++ rust-rustls-0.21-0.21.12/debian/patches/2005_rustls_pemfile_2.patch 
2025-02-18 04:46:26.000000000 +0000
@@ -0,0 +1,291 @@
+Description: Support rustls-pemfile 2.
+ I looked through the upstream commits, but the switch to rustls-pemfile
+ 2 was done as part of a larger change, so I just fixed the compatibility
+ issues with rustls-pemfile 2 myself.
+Author: Peter Michael Green <plugw...@debian.org>
+Last-Update: 2025-02-18
+
+Index: rust-rustls-0.21-0.21.12/examples/Cargo.toml
+===================================================================
+--- rust-rustls-0.21-0.21.12.orig/examples/Cargo.toml
++++ rust-rustls-0.21-0.21.12/examples/Cargo.toml
+@@ -16,7 +16,7 @@ env_logger = ">= 0.10, <= 0.11"
+ log = { version = "0.4.4" }
+ mio = { version = ">= 0.8, <= 1", features = ["net", "os-poll"] }
+ rustls = { path = "../rustls", features = [ "logging" ]}
+-rustls-pemfile = "1.0.3"
++rustls-pemfile = "2"
+ sct = "0.7"
+ serde = "1.0"
+ serde_derive = "1.0"
+Index: rust-rustls-0.21-0.21.12/examples/src/bin/tlsclient-mio.rs
+===================================================================
+--- rust-rustls-0.21-0.21.12.orig/examples/src/bin/tlsclient-mio.rs
++++ rust-rustls-0.21-0.21.12/examples/src/bin/tlsclient-mio.rs
+@@ -307,9 +307,7 @@ fn load_certs(filename: &str) -> Vec<rus
+     let certfile = fs::File::open(filename).expect("cannot open certificate 
file");
+     let mut reader = BufReader::new(certfile);
+     rustls_pemfile::certs(&mut reader)
+-        .unwrap()
+-        .iter()
+-        .map(|v| rustls::Certificate(v.clone()))
++        .map(|v| rustls::Certificate(v.unwrap().to_vec()))
+         .collect()
+ }
+ 
+@@ -319,9 +317,9 @@ fn load_private_key(filename: &str) -> r
+ 
+     loop {
+         match rustls_pemfile::read_one(&mut reader).expect("cannot parse 
private key .pem file") {
+-            Some(rustls_pemfile::Item::RSAKey(key)) => return 
rustls::PrivateKey(key),
+-            Some(rustls_pemfile::Item::PKCS8Key(key)) => return 
rustls::PrivateKey(key),
+-            Some(rustls_pemfile::Item::ECKey(key)) => return 
rustls::PrivateKey(key),
++            Some(rustls_pemfile::Item::Pkcs1Key(key)) => return 
rustls::PrivateKey(key.secret_pkcs1_der().to_vec()),
++            Some(rustls_pemfile::Item::Pkcs8Key(key)) => return 
rustls::PrivateKey(key.secret_pkcs8_der().to_vec()),
++            Some(rustls_pemfile::Item::Sec1Key(key)) => return 
rustls::PrivateKey(key.secret_sec1_der().to_vec()),
+             None => break,
+             _ => {}
+         }
+@@ -376,7 +374,7 @@ fn make_config(args: &Args) -> Arc<rustl
+ 
+         let certfile = fs::File::open(cafile).expect("Cannot open CA file");
+         let mut reader = BufReader::new(certfile);
+-        root_store.add_parsable_certificates(&rustls_pemfile::certs(&mut 
reader).unwrap());
++        root_store.add_parsable_certificates(&rustls_pemfile::certs(&mut 
reader).map(|x| x.unwrap().to_vec()).collect::<Vec<_>>());
+     } else {
+         for cert in rustls_native_certs::load_native_certs().expect("could 
not load platform certs") {
+             root_store
+Index: rust-rustls-0.21-0.21.12/examples/src/bin/tlsserver-mio.rs
+===================================================================
+--- rust-rustls-0.21-0.21.12.orig/examples/src/bin/tlsserver-mio.rs
++++ rust-rustls-0.21-0.21.12/examples/src/bin/tlsserver-mio.rs
+@@ -515,9 +515,7 @@ fn load_certs(filename: &str) -> Vec<rus
+     let certfile = fs::File::open(filename).expect("cannot open certificate 
file");
+     let mut reader = BufReader::new(certfile);
+     rustls_pemfile::certs(&mut reader)
+-        .unwrap()
+-        .iter()
+-        .map(|v| rustls::Certificate(v.clone()))
++        .map(|v| rustls::Certificate(v.unwrap().to_vec()))
+         .collect()
+ }
+ 
+@@ -527,9 +525,9 @@ fn load_private_key(filename: &str) -> r
+ 
+     loop {
+         match rustls_pemfile::read_one(&mut reader).expect("cannot parse 
private key .pem file") {
+-            Some(rustls_pemfile::Item::RSAKey(key)) => return 
rustls::PrivateKey(key),
+-            Some(rustls_pemfile::Item::PKCS8Key(key)) => return 
rustls::PrivateKey(key),
+-            Some(rustls_pemfile::Item::ECKey(key)) => return 
rustls::PrivateKey(key),
++            Some(rustls_pemfile::Item::Pkcs1Key(key)) => return 
rustls::PrivateKey(key.secret_pkcs1_der().to_vec()),
++            Some(rustls_pemfile::Item::Pkcs8Key(key)) => return 
rustls::PrivateKey(key.secret_pkcs8_der().to_vec()),
++            Some(rustls_pemfile::Item::Sec1Key(key)) => return 
rustls::PrivateKey(key.secret_sec1_der().to_vec()),
+             None => break,
+             _ => {}
+         }
+Index: rust-rustls-0.21-0.21.12/rustls/Cargo.toml
+===================================================================
+--- rust-rustls-0.21-0.21.12.orig/rustls/Cargo.toml
++++ rust-rustls-0.21-0.21.12/rustls/Cargo.toml
+@@ -33,1 +33,1 @@
+-rustls-pemfile = "1.0.3"
++rustls-pemfile = "2"
+Index: rust-rustls-0.21-0.21.12/rustls/examples/internal/bench.rs
+===================================================================
+--- rust-rustls-0.21-0.21.12.orig/rustls/examples/internal/bench.rs
++++ rust-rustls-0.21-0.21.12/rustls/examples/internal/bench.rs
+@@ -254,9 +254,7 @@ impl KeyType {
+         rustls_pemfile::certs(&mut io::BufReader::new(
+             fs::File::open(self.path_for("end.fullchain")).unwrap(),
+         ))
+-        .unwrap()
+-        .iter()
+-        .map(|v| rustls::Certificate(v.clone()))
++        .map(|v| rustls::Certificate(v.unwrap().to_vec()))
+         .collect()
+     }
+ 
+@@ -265,8 +263,8 @@ impl KeyType {
+             rustls_pemfile::pkcs8_private_keys(&mut io::BufReader::new(
+                 fs::File::open(self.path_for("end.key")).unwrap(),
+             ))
+-            .unwrap()[0]
+-                .clone(),
++            .next().unwrap().unwrap()
++                .secret_pkcs8_der().to_vec(),
+         )
+     }
+ 
+@@ -274,9 +272,7 @@ impl KeyType {
+         rustls_pemfile::certs(&mut io::BufReader::new(
+             fs::File::open(self.path_for("client.fullchain")).unwrap(),
+         ))
+-        .unwrap()
+-        .iter()
+-        .map(|v| rustls::Certificate(v.clone()))
++        .map(|v| rustls::Certificate(v.unwrap().to_vec()))
+         .collect()
+     }
+ 
+@@ -285,8 +281,8 @@ impl KeyType {
+             rustls_pemfile::pkcs8_private_keys(&mut io::BufReader::new(
+                 fs::File::open(self.path_for("client.key")).unwrap(),
+             ))
+-            .unwrap()[0]
+-                .clone(),
++            .next().unwrap().unwrap()
++                .secret_pkcs8_der().to_vec(),
+         )
+     }
+ }
+@@ -338,7 +334,7 @@ fn make_client_config(
+     let mut root_store = RootCertStore::empty();
+     let mut rootbuf =
+         
io::BufReader::new(fs::File::open(params.key_type.path_for("ca.cert")).unwrap());
+-    root_store.add_parsable_certificates(&rustls_pemfile::certs(&mut 
rootbuf).unwrap());
++    root_store.add_parsable_certificates(&rustls_pemfile::certs(&mut 
rootbuf).map(|x| x.unwrap()).collect::<Vec<_>>());
+ 
+     let cfg = ClientConfig::builder()
+         .with_cipher_suites(&[params.ciphersuite])
+Index: rust-rustls-0.21-0.21.12/rustls/examples/internal/bogo_shim.rs
+===================================================================
+--- rust-rustls-0.21-0.21.12.orig/rustls/examples/internal/bogo_shim.rs
++++ rust-rustls-0.21-0.21.12/rustls/examples/internal/bogo_shim.rs
+@@ -159,18 +159,17 @@ fn load_cert(filename: &str) -> Vec<Cert
+     let certfile = fs::File::open(filename).expect("cannot open certificate 
file");
+     let mut reader = BufReader::new(certfile);
+     rustls_pemfile::certs(&mut reader)
+-        .unwrap()
+-        .iter()
+-        .map(|v| Certificate(v.clone()))
++        .map(|v| Certificate(v.unwrap().to_vec()))
+         .collect()
+ }
+ 
+ fn load_key(filename: &str) -> PrivateKey {
+     let keyfile = fs::File::open(filename).expect("cannot open private key 
file");
+     let mut reader = BufReader::new(keyfile);
+-    let keys = rustls_pemfile::pkcs8_private_keys(&mut reader).unwrap();
+-    assert!(keys.len() == 1);
+-    PrivateKey(keys[0].clone())
++    let mut keys = rustls_pemfile::pkcs8_private_keys(&mut reader);
++    let first = keys.next().unwrap();
++    assert!(keys.next().is_none());
++    PrivateKey(first.unwrap().secret_pkcs8_der().to_vec())
+ }
+ 
+ fn split_protocols(protos: &str) -> Vec<String> {
+Index: rust-rustls-0.21-0.21.12/rustls/tests/common/mod.rs
+===================================================================
+--- rust-rustls-0.21-0.21.12.orig/rustls/tests/common/mod.rs
++++ rust-rustls-0.21-0.21.12/rustls/tests/common/mod.rs
+@@ -210,25 +210,21 @@ impl KeyType {
+ 
+     pub fn get_chain(&self) -> Vec<Certificate> {
+         rustls_pemfile::certs(&mut 
io::BufReader::new(self.bytes_for("end.fullchain")))
+-            .unwrap()
+-            .iter()
+-            .map(|v| Certificate(v.clone()))
++            .map(|v| Certificate(v.unwrap().to_vec()))
+             .collect()
+     }
+ 
+     pub fn get_key(&self) -> PrivateKey {
+         PrivateKey(
+             rustls_pemfile::pkcs8_private_keys(&mut 
io::BufReader::new(self.bytes_for("end.key")))
+-                .unwrap()[0]
+-                .clone(),
++                .next().unwrap().unwrap()
++                .secret_pkcs8_der().to_vec(),
+         )
+     }
+ 
+     pub fn get_client_chain(&self) -> Vec<Certificate> {
+         rustls_pemfile::certs(&mut 
io::BufReader::new(self.bytes_for("client.fullchain")))
+-            .unwrap()
+-            .iter()
+-            .map(|v| Certificate(v.clone()))
++            .map(|v| Certificate(v.unwrap().to_vec()))
+             .collect()
+     }
+ 
+@@ -237,10 +233,11 @@ impl KeyType {
+             rustls_pemfile::crls(&mut io::BufReader::new(
+                 self.bytes_for("client.revoked.crl.pem"),
+             ))
+-            .unwrap()
+             .into_iter()
+             .next() // We only expect one CRL.
+-            .unwrap(),
++            .unwrap()
++            .unwrap()
++            .to_vec(),
+         )
+     }
+ 
+@@ -249,8 +246,8 @@ impl KeyType {
+             rustls_pemfile::pkcs8_private_keys(&mut io::BufReader::new(
+                 self.bytes_for("client.key"),
+             ))
+-            .unwrap()[0]
+-                .clone(),
++            .next().unwrap().unwrap()
++                .secret_pkcs8_der().to_vec(),
+         )
+     }
+ }
+@@ -351,7 +348,7 @@ pub fn finish_client_config(
+ ) -> ClientConfig {
+     let mut root_store = RootCertStore::empty();
+     let mut rootbuf = io::BufReader::new(kt.bytes_for("ca.cert"));
+-    root_store.add_parsable_certificates(&rustls_pemfile::certs(&mut 
rootbuf).unwrap());
++    root_store.add_parsable_certificates(&rustls_pemfile::certs(&mut 
rootbuf).map(|x| x.unwrap()).collect::<Vec<_>>());
+ 
+     config
+         .with_root_certificates(root_store)
+@@ -364,7 +361,7 @@ pub fn finish_client_config_with_creds(
+ ) -> ClientConfig {
+     let mut root_store = RootCertStore::empty();
+     let mut rootbuf = io::BufReader::new(kt.bytes_for("ca.cert"));
+-    root_store.add_parsable_certificates(&rustls_pemfile::certs(&mut 
rootbuf).unwrap());
++    root_store.add_parsable_certificates(&rustls_pemfile::certs(&mut 
rootbuf).map(|x| x.unwrap()).collect::<Vec<_>>());
+ 
+     config
+         .with_root_certificates(root_store)
+Index: rust-rustls-0.21-0.21.12/rustls/src/key.rs
+===================================================================
+--- rust-rustls-0.21-0.21.12.orig/rustls/src/key.rs
++++ rust-rustls-0.21-0.21.12/rustls/src/key.rs
+@@ -33,13 +33,15 @@ use crate::Error;
+ /// fn load_private_key_from_file(path: &str) -> Result<PrivateKey, Box<dyn 
std::error::Error>> {
+ ///     let file = File::open(&path)?;
+ ///     let mut reader = BufReader::new(file);
+-///     let mut keys = rustls_pemfile::pkcs8_private_keys(&mut reader)?;
++///     let mut keys = rustls_pemfile::pkcs8_private_keys(&mut reader);
+ ///
+-///     match keys.len() {
+-///         0 => Err(format!("No PKCS8-encoded private key found in 
{path}").into()),
+-///         1 => Ok(PrivateKey(keys.remove(0))),
+-///         _ => Err(format!("More than one PKCS8-encoded private key found 
in {path}").into()),
++///     let Some(key) = keys.next() else {
++///         return Err(format!("No PKCS8-encoded private key found in 
{path}").into());
++///     };
++///     if keys.next().is_some() {
++///         return Err(format!("More than one PKCS8-encoded private key found 
in {path}").into());
+ ///     }
++///     Ok(PrivateKey(key?.secret_pkcs8_der().to_vec()))
+ /// }
+ /// ```
+ #[derive(Debug, Clone, Eq, PartialEq)]
+@@ -76,9 +78,9 @@ pub struct PrivateKey(pub Vec<u8>);
+ /// fn load_certificates_from_pem(path: &str) -> 
std::io::Result<Vec<Certificate>> {
+ ///     let file = File::open(path)?;
+ ///     let mut reader = BufReader::new(file);
+-///     let certs = rustls_pemfile::certs(&mut reader)?;
++///     let certs = rustls_pemfile::certs(&mut reader);
+ ///
+-///     Ok(certs.into_iter().map(Certificate).collect())
++///     Ok(certs.map(|x| Certificate(x.unwrap().to_vec())).collect())
+ /// }
+ /// ```
+ #[derive(Clone, Eq, Hash, Ord, PartialEq, PartialOrd)]
diff -Nru 
rust-rustls-0.21-0.21.12/debian/patches/2006_rustls_native_certs_0.8.patch 
rust-rustls-0.21-0.21.12/debian/patches/2006_rustls_native_certs_0.8.patch
--- rust-rustls-0.21-0.21.12/debian/patches/2006_rustls_native_certs_0.8.patch  
1970-01-01 00:00:00.000000000 +0000
+++ rust-rustls-0.21-0.21.12/debian/patches/2006_rustls_native_certs_0.8.patch  
2025-02-18 04:46:26.000000000 +0000
@@ -0,0 +1,111 @@
+Description: use rustls-native-certs 0.8
+Author: Peter Michael Green <plugw...@debian.org>
+Last-Update: 2025-02-18
+
+Index: rust-rustls-0.21-0.21.12/examples/Cargo.toml
+===================================================================
+--- rust-rustls-0.21-0.21.12.orig/examples/Cargo.toml
++++ rust-rustls-0.21-0.21.12/examples/Cargo.toml
+@@ -20,7 +20,7 @@ rustls-pemfile = "1.0.3"
+ sct = "0.7"
+ serde = "1.0"
+ serde_derive = "1.0"
+-rustls-native-certs = "0.6"
++rustls-native-certs = "0.8"
+ 
+ [dev-dependencies]
+ regex = "1.0"
+Index: rust-rustls-0.21-0.21.12/examples/src/bin/limitedclient.rs
+===================================================================
+--- rust-rustls-0.21-0.21.12.orig/examples/src/bin/limitedclient.rs
++++ rust-rustls-0.21-0.21.12/examples/src/bin/limitedclient.rs
+@@ -10,7 +10,7 @@ fn main() {
+     let mut root_store = rustls::RootCertStore::empty();
+     for cert in rustls_native_certs::load_native_certs().expect("could not 
load platform certs") {
+         root_store
+-            .add(&rustls::Certificate(cert.0))
++            .add(&rustls::Certificate(cert.to_vec()))
+             .unwrap();
+     }
+ 
+Index: rust-rustls-0.21-0.21.12/examples/src/bin/simple_0rtt_client.rs
+===================================================================
+--- rust-rustls-0.21-0.21.12.orig/examples/src/bin/simple_0rtt_client.rs
++++ rust-rustls-0.21-0.21.12/examples/src/bin/simple_0rtt_client.rs
+@@ -60,7 +60,7 @@ fn main() {
+     let mut root_store = RootCertStore::empty();
+     for cert in rustls_native_certs::load_native_certs().expect("could not 
load platform certs") {
+         root_store
+-            .add(&rustls::Certificate(cert.0))
++            .add(&rustls::Certificate(cert.to_vec()))
+             .unwrap();
+     }
+ 
+Index: rust-rustls-0.21-0.21.12/examples/src/bin/simpleclient.rs
+===================================================================
+--- rust-rustls-0.21-0.21.12.orig/examples/src/bin/simpleclient.rs
++++ rust-rustls-0.21-0.21.12/examples/src/bin/simpleclient.rs
+@@ -18,7 +18,7 @@ fn main() {
+     let mut root_store = RootCertStore::empty();
+     for cert in rustls_native_certs::load_native_certs().expect("could not 
load platform certs") {
+         root_store
+-            .add(&rustls::Certificate(cert.0))
++            .add(&rustls::Certificate(cert.to_vec()))
+             .unwrap();
+     }
+     let config = rustls::ClientConfig::builder()
+Index: rust-rustls-0.21-0.21.12/examples/src/bin/tlsclient-mio.rs
+===================================================================
+--- rust-rustls-0.21-0.21.12.orig/examples/src/bin/tlsclient-mio.rs
++++ rust-rustls-0.21-0.21.12/examples/src/bin/tlsclient-mio.rs
+@@ -380,7 +380,7 @@ fn make_config(args: &Args) -> Arc<rustl
+     } else {
+         for cert in rustls_native_certs::load_native_certs().expect("could 
not load platform certs") {
+             root_store
+-                .add(&rustls::Certificate(cert.0))
++                .add(&rustls::Certificate(cert.to_vec()))
+                 .unwrap();
+         }
+     }
+Index: rust-rustls-0.21-0.21.12/rustls/Cargo.toml
+===================================================================
+--- rust-rustls-0.21-0.21.12.orig/rustls/Cargo.toml
++++ rust-rustls-0.21-0.21.12/rustls/Cargo.toml
+@@ -32,1 +32,1 @@
+-rustls-native-certs = "0.6"
++rustls-native-certs = "0.8"
+Index: rust-rustls-0.21-0.21.12/rustls/src/verifybench.rs
+===================================================================
+--- rust-rustls-0.21-0.21.12.orig/rustls/src/verifybench.rs
++++ rust-rustls-0.21-0.21.12/rustls/src/verifybench.rs
+@@ -199,7 +199,7 @@ impl Context {
+         let mut roots = anchors::RootCertStore::empty();
+         for cert in rustls_native_certs::load_native_certs().expect("could 
not load platform certs") {
+             roots
+-                .add(&crate::Certificate(cert.0))
++                .add(&crate::Certificate(cert.to_vec()))
+                 .unwrap();
+         }
+         Self {
+Index: rust-rustls-0.21-0.21.12/rustls/src/lib.rs
+===================================================================
+--- rust-rustls-0.21-0.21.12.orig/rustls/src/lib.rs
++++ rust-rustls-0.21-0.21.12/rustls/src/lib.rs
+@@ -111,7 +111,7 @@
+ //! let mut root_store = rustls::RootCertStore::empty();
+ //! for cert in rustls_native_certs::load_native_certs().expect("could not 
load platform certs") {
+ //!     root_store
+-//!         .add(&rustls::Certificate(cert.0))
++//!         .add(&rustls::Certificate(cert.to_vec()))
+ //!         .unwrap();
+ //! }
+ //! ```
+@@ -136,7 +136,7 @@
+ //! # let mut root_store = rustls::RootCertStore::empty();
+ //! # for cert in rustls_native_certs::load_native_certs().expect("could not 
load platform certs") {
+ //! #     root_store
+-//! #         .add(&rustls::Certificate(cert.0))
++//! #         .add(&rustls::Certificate(cert.to_vec()))
+ //! #         .unwrap();
+ //! # }
+ //! # let config = rustls::ClientConfig::builder()
diff -Nru rust-rustls-0.21-0.21.12/debian/patches/series 
rust-rustls-0.21-0.21.12/debian/patches/series
--- rust-rustls-0.21-0.21.12/debian/patches/series      2025-02-16 
20:04:20.000000000 +0000
+++ rust-rustls-0.21-0.21.12/debian/patches/series      2025-02-18 
04:46:26.000000000 +0000
@@ -6,3 +6,5 @@
 2001_native_certs.patch
 2003_network_access.patch
 2004_no_feature_read_buf.patch
+2005_rustls_pemfile_2.patch
+2006_rustls_native_certs_0.8.patch
diff -Nru rust-rustls-0.21-0.21.12/debian/tests/control 
rust-rustls-0.21-0.21.12/debian/tests/control
--- rust-rustls-0.21-0.21.12/debian/tests/control       2025-02-16 
20:04:20.000000000 +0000
+++ rust-rustls-0.21-0.21.12/debian/tests/control       2025-02-18 
04:46:26.000000000 +0000
@@ -13,8 +13,8 @@
  librust-mio-1+os-poll-dev,
  librust-regex-1+default-dev,
  librust-rustls-0.21+default-dev,
- librust-rustls-native-certs-0.6+default-dev,
- librust-rustls-pemfile-1+default-dev,
+ librust-rustls-native-certs-0.8+default-dev,
+ librust-rustls-pemfile-2+default-dev,
  librust-serde-1+default-dev,
  librust-serde-derive-1+default-dev,
 Restrictions: allow-stderr
@@ -33,8 +33,8 @@
  librust-mio-1+os-poll-dev,
  librust-regex-1+default-dev,
  librust-rustls-0.21-dev,
- librust-rustls-native-certs-0.6+default-dev,
- librust-rustls-pemfile-1+default-dev,
+ librust-rustls-native-certs-0.8+default-dev,
+ librust-rustls-pemfile-2+default-dev,
  librust-rustversion-1-dev,
  librust-serde-1+default-dev,
  librust-serde-derive-1+default-dev,
@@ -53,8 +53,8 @@
  librust-mio-1+os-poll-dev,
  librust-regex-1+default-dev,
  librust-rustls-0.21-dev,
- librust-rustls-native-certs-0.6+default-dev,
- librust-rustls-pemfile-1+default-dev,
+ librust-rustls-native-certs-0.8+default-dev,
+ librust-rustls-pemfile-2+default-dev,
  librust-serde-1+default-dev,
  librust-serde-derive-1+default-dev,
 Restrictions: allow-stderr
@@ -72,8 +72,8 @@
  librust-mio-1+os-poll-dev,
  librust-regex-1+default-dev,
  librust-rustls-0.21+dangerous-configuration-dev,
- librust-rustls-native-certs-0.6+default-dev,
- librust-rustls-pemfile-1+default-dev,
+ librust-rustls-native-certs-0.8+default-dev,
+ librust-rustls-pemfile-2+default-dev,
  librust-serde-1+default-dev,
  librust-serde-derive-1+default-dev,
 Restrictions: allow-stderr
@@ -93,8 +93,8 @@
  librust-mio-1+os-poll-dev,
  librust-regex-1+default-dev,
  librust-rustls-0.21+logging-dev,
- librust-rustls-native-certs-0.6+default-dev,
- librust-rustls-pemfile-1+default-dev,
+ librust-rustls-native-certs-0.8+default-dev,
+ librust-rustls-pemfile-2+default-dev,
  librust-serde-1+default-dev,
  librust-serde-derive-1+default-dev,
 Restrictions: allow-stderr
@@ -113,8 +113,8 @@
  librust-mio-1+os-poll-dev,
  librust-regex-1+default-dev,
  librust-rustls-0.21+quic-dev,
- librust-rustls-native-certs-0.6+default-dev,
- librust-rustls-pemfile-1+default-dev,
+ librust-rustls-native-certs-0.8+default-dev,
+ librust-rustls-pemfile-2+default-dev,
  librust-serde-1+default-dev,
  librust-serde-derive-1+default-dev,
 Restrictions: allow-stderr
@@ -133,7 +133,7 @@
  librust-mio-1+os-poll-dev,
  librust-regex-1+default-dev,
  librust-rustls-0.21+secret-extraction-dev,
- librust-rustls-native-certs-0.6+default-dev,
+ librust-rustls-native-certs-0.8+default-dev,
  librust-rustls-pemfile-dev,
  librust-serde-1+default-dev,
  librust-serde-derive-1+default-dev,
@@ -153,7 +153,7 @@
  librust-mio-1+os-poll-dev,
  librust-regex-1+default-dev,
  librust-rustls-0.21+tls12-dev,
- librust-rustls-native-certs-0.6+default-dev,
+ librust-rustls-native-certs-0.8+default-dev,
  librust-rustls-pemfile-dev,
  librust-serde-1+default-dev,
  librust-serde-derive-1+default-dev,

Reply via email to