--- Begin Message ---
Package: rust-rustls
I have prepared a debdiff to make rust-rustls use rustls-native-certs 0.8
instead of 0.6.
diff -Nru rust-rustls-0.23.26+ds/debian/changelog
rust-rustls-0.23.26+ds/debian/changelog
--- rust-rustls-0.23.26+ds/debian/changelog 2025-04-10 18:06:09.000000000
+0000
+++ rust-rustls-0.23.26+ds/debian/changelog 2025-07-12 13:46:24.000000000
+0000
@@ -1,3 +1,10 @@
+rust-rustls (0.23.26+ds-1.1) UNRELEASED; urgency=medium
+
+ * Non-maintainer upload.
+ * Update patch and dependencies for rustls-native-certs 0.8
+
+ -- Peter Michael Green <[email protected]> Sat, 12 Jul 2025 13:46:24 +0000
+
rust-rustls (0.23.26+ds-1) unstable; urgency=medium
[ upstream ]
diff -Nru rust-rustls-0.23.26+ds/debian/control
rust-rustls-0.23.26+ds/debian/control
--- rust-rustls-0.23.26+ds/debian/control 2025-04-10 18:00:04.000000000
+0000
+++ rust-rustls-0.23.26+ds/debian/control 2025-07-12 13:43:37.000000000
+0000
@@ -31,7 +31,7 @@
librust-ring-0.17+default-dev,
librust-rustls-pki-types-1+alloc-dev,
librust-rustls-pki-types-1+default-dev,
- librust-rustls-native-certs-0.6+default-dev,
+ librust-rustls-native-certs-0.8+default-dev,
librust-rustls-webpki-0.102+alloc-dev,
librust-serde-1+default-dev,
librust-serde-1+derive-dev,
diff -Nru rust-rustls-0.23.26+ds/debian/patches/2001_native_certs.patch
rust-rustls-0.23.26+ds/debian/patches/2001_native_certs.patch
--- rust-rustls-0.23.26+ds/debian/patches/2001_native_certs.patch
2025-04-10 18:00:29.000000000 +0000
+++ rust-rustls-0.23.26+ds/debian/patches/2001_native_certs.patch
2025-07-12 13:46:24.000000000 +0000
@@ -1,31 +1,38 @@
Description: use crate rustls-native-certs (not webpki-roots)
Author: Jonas Smedegaard <[email protected]>
+Author: Peter Michael Green <[email protected]>
Forwarded: not-needed
-Last-Update: 2023-08-14
+Last-Update: 2025-07-12
---
This patch header follows DEP-3: http://dep.debian.net/deps/dep3/
---- a/Cargo.toml
-+++ b/Cargo.toml
-@@ -87,7 +87,7 @@
+Index: rust-rustls-0.23.26+ds/Cargo.toml
+===================================================================
+--- rust-rustls-0.23.26+ds.orig/Cargo.toml
++++ rust-rustls-0.23.26+ds/Cargo.toml
+@@ -87,7 +87,7 @@ time = { version = "0.3.6", default-feat
tikv-jemallocator = "0.6"
tokio = { version = "1.34", features = ["io-util", "macros", "net", "rt"] }
webpki = { package = "rustls-webpki", version = "0.103", features =
["alloc"], default-features = false }
-webpki-roots = "0.26"
-+rustls-native-certs = "0.6"
++rustls-native-certs = "0.8"
x25519-dalek = "2"
x509-parser = "0.17"
zeroize = "1.7"
---- a/examples/Cargo.toml
-+++ b/examples/Cargo.toml
-@@ -17,4 +17,4 @@
+Index: rust-rustls-0.23.26+ds/examples/Cargo.toml
+===================================================================
+--- rust-rustls-0.23.26+ds.orig/examples/Cargo.toml
++++ rust-rustls-0.23.26+ds/examples/Cargo.toml
+@@ -17,4 +17,4 @@ rcgen = { workspace = true }
rustls = { path = "../rustls", features = ["logging"] }
serde = { workspace = true }
tokio = { workspace = true }
-webpki-roots = { workspace = true }
+rustls-native-certs = { workspace = true }
---- a/examples/src/bin/ech-client.rs
-+++ b/examples/src/bin/ech-client.rs
-@@ -48,6 +48,7 @@
+Index: rust-rustls-0.23.26+ds/examples/src/bin/ech-client.rs
+===================================================================
+--- rust-rustls-0.23.26+ds.orig/examples/src/bin/ech-client.rs
++++ rust-rustls-0.23.26+ds/examples/src/bin/ech-client.rs
+@@ -48,6 +48,7 @@ use rustls::crypto::aws_lc_rs::hpke::ALL
use rustls::crypto::hpke::Hpke;
use rustls::pki_types::pem::PemObject;
use rustls::pki_types::{CertificateDer, EchConfigListBytes, ServerName};
@@ -33,23 +40,27 @@
#[tokio::main]
async fn main() -> Result<(), Box<dyn Error>> {
-@@ -109,7 +110,12 @@
+@@ -108,8 +109,13 @@ async fn main() -> Result<(), Box<dyn Er
+ );
root_store
}
- None => RootCertStore {
+- None => RootCertStore {
- roots: webpki_roots::TLS_SERVER_ROOTS.into(),
++ None => {
+ let mut root_store = rustls::RootCertStore::empty();
+ for cert in load_native_certs().expect("could not load platform
certs") {
-+ root_store.add(CertificateDer::from_slice(&cert.0))
++ root_store.add(CertificateDer::from_slice(&cert.to_vec()))
+ .expect("could not add certificate");
+ };
+ root_store
},
};
---- a/examples/src/bin/limitedclient.rs
-+++ b/examples/src/bin/limitedclient.rs
-@@ -7,13 +7,15 @@
+Index: rust-rustls-0.23.26+ds/examples/src/bin/limitedclient.rs
+===================================================================
+--- rust-rustls-0.23.26+ds.orig/examples/src/bin/limitedclient.rs
++++ rust-rustls-0.23.26+ds/examples/src/bin/limitedclient.rs
+@@ -7,13 +7,15 @@ use std::net::TcpStream;
use std::sync::Arc;
use rustls::crypto::{CryptoProvider, aws_lc_rs as provider};
@@ -64,15 +75,17 @@
- );
+ let mut root_store = rustls::RootCertStore::empty();
+ for cert in load_native_certs().expect("could not load platform certs") {
-+ root_store.add(CertificateDer::from_slice(&cert.0))
++ root_store.add(CertificateDer::from_slice(&cert.to_vec()))
+ .expect("could not add certificate");
+ };
let config = rustls::ClientConfig::builder_with_provider(
CryptoProvider {
---- a/examples/src/bin/simple_0rtt_client.rs
-+++ b/examples/src/bin/simple_0rtt_client.rs
-@@ -22,6 +22,7 @@
+Index: rust-rustls-0.23.26+ds/examples/src/bin/simple_0rtt_client.rs
+===================================================================
+--- rust-rustls-0.23.26+ds.orig/examples/src/bin/simple_0rtt_client.rs
++++ rust-rustls-0.23.26+ds/examples/src/bin/simple_0rtt_client.rs
+@@ -22,6 +22,7 @@ use std::sync::Arc;
use rustls::RootCertStore;
use rustls::pki_types::pem::PemObject;
use rustls::pki_types::{CertificateDer, ServerName};
@@ -80,7 +93,7 @@
fn start_connection(config: &Arc<rustls::ClientConfig>, domain_name: &str,
port: u16) {
let server_name = ServerName::try_from(domain_name)
-@@ -93,11 +94,10 @@
+@@ -93,11 +94,10 @@ fn main() {
.map(|result| result.unwrap()),
);
} else {
@@ -90,15 +103,17 @@
- .cloned(),
- )
+ for cert in load_native_certs().expect("could not load platform
certs") {
-+ root_store.add(CertificateDer::from_slice(&cert.0))
++ root_store.add(CertificateDer::from_slice(&cert.to_vec()))
+ .expect("could not add certificate");
+ };
}
let mut config = rustls::ClientConfig::builder()
---- a/examples/src/bin/simpleclient.rs
-+++ b/examples/src/bin/simpleclient.rs
-@@ -12,11 +12,15 @@
+Index: rust-rustls-0.23.26+ds/examples/src/bin/simpleclient.rs
+===================================================================
+--- rust-rustls-0.23.26+ds.orig/examples/src/bin/simpleclient.rs
++++ rust-rustls-0.23.26+ds/examples/src/bin/simpleclient.rs
+@@ -12,11 +12,15 @@ use std::io::{Read, Write, stdout};
use std::net::TcpStream;
use std::sync::Arc;
@@ -111,14 +126,16 @@
- roots: webpki_roots::TLS_SERVER_ROOTS.into(),
+ let mut root_store = RootCertStore::empty();
+ for cert in load_native_certs().expect("could not load platform certs") {
-+ root_store.add(CertificateDer::from_slice(&cert.0))
++ root_store.add(CertificateDer::from_slice(&cert.to_vec()))
+ .expect("could not add certificate");
};
let mut config = rustls::ClientConfig::builder()
.with_root_certificates(root_store)
---- a/examples/src/bin/tlsclient-mio.rs
-+++ b/examples/src/bin/tlsclient-mio.rs
-@@ -30,6 +30,7 @@
+Index: rust-rustls-0.23.26+ds/examples/src/bin/tlsclient-mio.rs
+===================================================================
+--- rust-rustls-0.23.26+ds.orig/examples/src/bin/tlsclient-mio.rs
++++ rust-rustls-0.23.26+ds/examples/src/bin/tlsclient-mio.rs
+@@ -30,6 +30,7 @@ use rustls::RootCertStore;
use rustls::crypto::{CryptoProvider, aws_lc_rs as provider};
use rustls::pki_types::pem::PemObject;
use rustls::pki_types::{CertificateDer, PrivateKeyDer, ServerName};
@@ -126,7 +143,7 @@
const CLIENT: mio::Token = mio::Token(0);
-@@ -207,7 +208,7 @@
+@@ -207,7 +208,7 @@ impl io::Read for TlsClient {
/// basic HTTP GET request for /.
///
/// If --cafile is not supplied, a built-in set of CA certificates
@@ -135,7 +152,7 @@
#[derive(Debug, Parser)]
struct Args {
/// Connect to this port
-@@ -402,11 +403,10 @@
+@@ -402,11 +403,10 @@ fn make_config(args: &Args) -> Arc<rustl
.map(|result| result.unwrap()),
);
} else {
@@ -145,15 +162,17 @@
- .cloned(),
- );
+ for cert in load_native_certs().expect("could not load platform
certs") {
-+ root_store.add(CertificateDer::from_slice(&cert.0))
++ root_store.add(CertificateDer::from_slice(&cert.to_vec()))
+ .expect("could not add certificate");
+ };
}
let suites = if !args.suite.is_empty() {
---- a/examples/src/bin/unbuffered-async-client.rs
-+++ b/examples/src/bin/unbuffered-async-client.rs
-@@ -10,12 +10,14 @@
+Index: rust-rustls-0.23.26+ds/examples/src/bin/unbuffered-async-client.rs
+===================================================================
+--- rust-rustls-0.23.26+ds.orig/examples/src/bin/unbuffered-async-client.rs
++++ rust-rustls-0.23.26+ds/examples/src/bin/unbuffered-async-client.rs
+@@ -10,12 +10,14 @@ use async_std::io::{ReadExt, WriteExt};
#[cfg(feature = "async-std")]
use async_std::net::TcpStream;
use rustls::client::{ClientConnectionData, UnbufferedClientConnection};
@@ -168,7 +187,7 @@
#[cfg(not(feature = "async-std"))]
use tokio::io::{AsyncReadExt, AsyncWriteExt};
#[cfg(not(feature = "async-std"))]
-@@ -24,8 +26,10 @@
+@@ -24,8 +26,10 @@ use tokio::net::TcpStream;
#[cfg_attr(not(feature = "async-std"), tokio::main(flavor =
"current_thread"))]
#[cfg_attr(feature = "async-std", async_std::main)]
async fn main() -> Result<(), Box<dyn Error>> {
@@ -176,14 +195,16 @@
- roots: webpki_roots::TLS_SERVER_ROOTS.into(),
+ let mut root_store = RootCertStore::empty();
+ for cert in load_native_certs().expect("could not load platform certs") {
-+ root_store.add(CertificateDer::from_slice(&cert.0))
++ root_store.add(CertificateDer::from_slice(&cert.to_vec()))
+ .expect("could not add certificate");
};
let config = ClientConfig::builder_with_protocol_versions(&[&TLS13])
---- a/examples/src/bin/unbuffered-client.rs
-+++ b/examples/src/bin/unbuffered-client.rs
-@@ -11,12 +11,16 @@
+Index: rust-rustls-0.23.26+ds/examples/src/bin/unbuffered-client.rs
+===================================================================
+--- rust-rustls-0.23.26+ds.orig/examples/src/bin/unbuffered-client.rs
++++ rust-rustls-0.23.26+ds/examples/src/bin/unbuffered-client.rs
+@@ -11,12 +11,16 @@ use rustls::unbuffered::{
AppDataRecord, ConnectionState, EncodeError, EncryptError,
InsufficientSizeError,
UnbufferedStatus, WriteTraffic,
};
@@ -197,14 +218,16 @@
- roots: webpki_roots::TLS_SERVER_ROOTS.into(),
+ let mut root_store = RootCertStore::empty();
+ for cert in load_native_certs().expect("could not load platform certs") {
-+ root_store.add(CertificateDer::from_slice(&cert.0))
++ root_store.add(CertificateDer::from_slice(&cert.to_vec()))
+ .expect("could not add certificate");
};
let mut config = ClientConfig::builder_with_protocol_versions(&[&TLS13])
---- a/provider-example/Cargo.toml
-+++ b/provider-example/Cargo.toml
-@@ -26,7 +26,7 @@
+Index: rust-rustls-0.23.26+ds/provider-example/Cargo.toml
+===================================================================
+--- rust-rustls-0.23.26+ds.orig/provider-example/Cargo.toml
++++ rust-rustls-0.23.26+ds/provider-example/Cargo.toml
+@@ -26,7 +26,7 @@ x25519-dalek = { workspace = true }
[dev-dependencies]
env_logger = { workspace = true }
rcgen = { workspace = true }
@@ -213,13 +236,16 @@
[features]
default = ["std"]
---- a/provider-example/examples/client.rs
-+++ b/provider-example/examples/client.rs
-@@ -2,14 +2,16 @@
+Index: rust-rustls-0.23.26+ds/provider-example/examples/client.rs
+===================================================================
+--- rust-rustls-0.23.26+ds.orig/provider-example/examples/client.rs
++++ rust-rustls-0.23.26+ds/provider-example/examples/client.rs
+@@ -2,14 +2,17 @@ use std::io::{Read, Write, stdout};
use std::net::TcpStream;
use std::sync::Arc;
+use rustls_native_certs::load_native_certs;
++use rustls::pki_types::CertificateDer;
+
fn main() {
env_logger::init();
@@ -231,15 +257,17 @@
- );
+ let mut root_store = rustls::RootCertStore::empty();
+ for cert in load_native_certs().expect("could not load platform certs") {
-+ root_store.add(CertificateDer::from_slice(&cert.0))
++ root_store.add(CertificateDer::from_slice(&cert.to_vec()))
+ .expect("could not add certificate");
+ };
let config =
rustls::ClientConfig::builder_with_provider(rustls_provider_example::provider().into())
---- a/rustls/Cargo.toml
-+++ b/rustls/Cargo.toml
-@@ -57,10 +57,10 @@
+Index: rust-rustls-0.23.26+ds/rustls/Cargo.toml
+===================================================================
+--- rust-rustls-0.23.26+ds.orig/rustls/Cargo.toml
++++ rust-rustls-0.23.26+ds/rustls/Cargo.toml
+@@ -57,10 +57,10 @@ log = { workspace = true }
macro_rules_attribute = { workspace = true }
num-bigint = { workspace = true }
rcgen = { workspace = true }
@@ -251,8 +279,10 @@
x509-parser = { workspace = true }
[[bench]]
---- a/rustls/src/lib.rs
-+++ b/rustls/src/lib.rs
+Index: rust-rustls-0.23.26+ds/rustls/src/lib.rs
+===================================================================
+--- rust-rustls-0.23.26+ds.orig/rustls/src/lib.rs
++++ rust-rustls-0.23.26+ds/rustls/src/lib.rs
@@ -170,14 +170,15 @@
//! ```rust
//! # #[cfg(feature = "aws_lc_rs")] {
@@ -268,15 +298,17 @@
-//! # );
+//! # let mut root_store = rustls::RootCertStore::empty();
+//! # for cert in load_native_certs().expect("could not load platform certs")
{
-+//! # root_store.add(CertificateDer::from_slice(&cert.0))
++//! # root_store.add(CertificateDer::from_slice(&cert.to_vec()))
+//! # .expect("could not add certificate");
+//! # };
//! # let config = rustls::ClientConfig::builder()
//! # .with_root_certificates(root_store)
//! # .with_no_client_auth();
---- a/rustls/src/verifybench.rs
-+++ b/rustls/src/verifybench.rs
-@@ -7,7 +7,7 @@
+Index: rust-rustls-0.23.26+ds/rustls/src/verifybench.rs
+===================================================================
+--- rust-rustls-0.23.26+ds.orig/rustls/src/verifybench.rs
++++ rust-rustls-0.23.26+ds/rustls/src/verifybench.rs
+@@ -7,7 +7,7 @@ use core::time::Duration;
use std::prelude::v1::*;
use pki_types::{CertificateDer, ServerName, UnixTime};
@@ -285,7 +317,7 @@
use crate::crypto::CryptoProvider;
use crate::verify::ServerCertVerifier;
-@@ -187,11 +187,10 @@
+@@ -187,11 +187,10 @@ struct Context {
impl Context {
fn new(provider: CryptoProvider, domain: &'static str, certs: &[&'static
[u8]]) -> Self {
let mut roots = RootCertStore::empty();
@@ -295,7 +327,7 @@
- .cloned(),
- );
+ for cert in load_native_certs().expect("could not load platform
certs") {
-+ roots.add(CertificateDer::from_slice(&cert.0))
++ roots.add(CertificateDer::from_slice(&cert.to_vec()))
+ .expect("could not add certificate");
+ };
Self {
diff -Nru rust-rustls-0.23.26+ds/debian/patches/2002_hickory-resolver.patch
rust-rustls-0.23.26+ds/debian/patches/2002_hickory-resolver.patch
--- rust-rustls-0.23.26+ds/debian/patches/2002_hickory-resolver.patch
2025-04-10 18:02:45.000000000 +0000
+++ rust-rustls-0.23.26+ds/debian/patches/2002_hickory-resolver.patch
2025-07-12 13:41:45.000000000 +0000
@@ -4,9 +4,11 @@
Last-Update: 2024-12-17
---
This patch header follows DEP-3: http://dep.debian.net/deps/dep3/
---- a/examples/Cargo.toml
-+++ b/examples/Cargo.toml
-@@ -10,7 +10,6 @@
+Index: rust-rustls-0.23.26+ds/examples/Cargo.toml
+===================================================================
+--- rust-rustls-0.23.26+ds.orig/examples/Cargo.toml
++++ rust-rustls-0.23.26+ds/examples/Cargo.toml
+@@ -10,7 +10,6 @@ publish = false
async-std = { workspace = true, optional = true }
clap = { workspace = true }
env_logger = { workspace = true }
@@ -14,7 +16,9 @@
log = { workspace = true }
mio = { workspace = true }
rcgen = { workspace = true }
---- a/examples/src/bin/ech-client.rs
+Index: rust-rustls-0.23.26+ds/examples/src/bin/ech-client.rs
+===================================================================
+--- rust-rustls-0.23.26+ds.orig/examples/src/bin/ech-client.rs
+++ /dev/null
@@ -1,284 +0,0 @@
-//! This is a simple example demonstrating how to use Encrypted Client Hello
(ECH) with
@@ -128,10 +132,10 @@
- );
- root_store
- }
-- None => RootCertStore {
+- None => {
- let mut root_store = rustls::RootCertStore::empty();
- for cert in load_native_certs().expect("could not load platform
certs") {
-- root_store.add(CertificateDer::from_slice(&cert.0))
+- root_store.add(CertificateDer::from_slice(&cert.to_vec()))
- .expect("could not add certificate");
- };
- root_store
@@ -301,9 +305,11 @@
-///
-/// A real implementation should vary this suite across all of the suites
that are supported.
-static GREASE_HPKE_SUITE: &dyn Hpke =
aws_lc_rs::hpke::DH_KEM_X25519_HKDF_SHA256_AES_128;
---- a/connect-tests/Cargo.toml
-+++ b/connect-tests/Cargo.toml
-@@ -10,7 +10,6 @@
+Index: rust-rustls-0.23.26+ds/connect-tests/Cargo.toml
+===================================================================
+--- rust-rustls-0.23.26+ds.orig/connect-tests/Cargo.toml
++++ rust-rustls-0.23.26+ds/connect-tests/Cargo.toml
+@@ -10,7 +10,6 @@ publish = false
rustls = { path = "../rustls", features = ["logging"] }
[dev-dependencies]
@@ -311,7 +317,9 @@
regex = { workspace = true }
ring = { workspace = true }
tokio = { workspace = true }
---- a/connect-tests/tests/ech.rs
+Index: rust-rustls-0.23.26+ds/connect-tests/tests/ech.rs
+===================================================================
+--- rust-rustls-0.23.26+ds.orig/connect-tests/tests/ech.rs
+++ /dev/null
@@ -1,67 +0,0 @@
-mod ech_config {
@@ -381,9 +389,11 @@
- .into()
- }
-}
---- a/Cargo.toml
-+++ b/Cargo.toml
-@@ -54,7 +54,6 @@
+Index: rust-rustls-0.23.26+ds/Cargo.toml
+===================================================================
+--- rust-rustls-0.23.26+ds.orig/Cargo.toml
++++ rust-rustls-0.23.26+ds/Cargo.toml
+@@ -54,7 +54,6 @@ env_logger = "0.11"
fxhash = "0.2.1"
hashbrown = { version = "0.14", default-features = false, features =
["ahash", "inline-more"] }
hex = "0.4"
diff -Nru rust-rustls-0.23.26+ds/debian/patches/2002_rustls-webpki.patch
rust-rustls-0.23.26+ds/debian/patches/2002_rustls-webpki.patch
--- rust-rustls-0.23.26+ds/debian/patches/2002_rustls-webpki.patch
2025-04-10 18:02:51.000000000 +0000
+++ rust-rustls-0.23.26+ds/debian/patches/2002_rustls-webpki.patch
2025-07-12 13:42:41.000000000 +0000
@@ -12,7 +12,7 @@
tokio = { version = "1.34", features = ["io-util", "macros", "net", "rt"] }
-webpki = { package = "rustls-webpki", version = "0.103", features =
["alloc"], default-features = false }
+webpki = { package = "rustls-webpki", version = "0.102.8", features =
["alloc"], default-features = false }
- rustls-native-certs = "0.6"
+ rustls-native-certs = "0.8"
x25519-dalek = "2"
x509-parser = "0.17"
--- a/rustls/src/webpki/mod.rs
diff -Nru rust-rustls-0.23.26+ds/debian/tests/control
rust-rustls-0.23.26+ds/debian/tests/control
--- rust-rustls-0.23.26+ds/debian/tests/control 2025-04-10 18:00:10.000000000
+0000
+++ rust-rustls-0.23.26+ds/debian/tests/control 2025-07-12 13:46:24.000000000
+0000
@@ -22,7 +22,7 @@
# librust-rcgen-0.13+pem-dev,
# librust-regex-1+default-dev,
# librust-rustls-0.23+default-dev,
-# librust-rustls-native-certs-0.6+default-dev,
+# librust-rustls-native-certs-0.8+default-dev,
# librust-serde-1+default-dev,
# librust-serde-1+derive-dev,
# librust-serde-json-1+default-dev,
@@ -52,7 +52,7 @@
librust-rcgen-0.13+pem-dev,
librust-regex-1+default-dev,
librust-rustls-0.23-dev,
- librust-rustls-native-certs-0.6+default-dev,
+ librust-rustls-native-certs-0.8+default-dev,
librust-serde-1+default-dev,
librust-serde-1+derive-dev,
librust-serde-json-1+default-dev,
@@ -82,7 +82,7 @@
librust-rcgen-0.13+pem-dev,
librust-regex-1+default-dev,
librust-rustls-0.23-dev,
- librust-rustls-native-certs-0.6+default-dev,
+ librust-rustls-native-certs-0.8+default-dev,
librust-serde-1+default-dev,
librust-serde-1+derive-dev,
librust-serde-json-1+default-dev,
@@ -112,7 +112,7 @@
librust-rcgen-0.13+pem-dev,
librust-regex-1+default-dev,
librust-rustls-0.23+brotli-dev,
- librust-rustls-native-certs-0.6+default-dev,
+ librust-rustls-native-certs-0.8+default-dev,
librust-serde-1+default-dev,
librust-serde-1+derive-dev,
librust-serde-json-1+default-dev,
@@ -143,7 +143,7 @@
librust-rcgen-0.13+pem-dev,
librust-regex-1+default-dev,
librust-rustls-0.23+custom-provider-dev,
- librust-rustls-native-certs-0.6+default-dev,
+ librust-rustls-native-certs-0.8+default-dev,
librust-serde-1+default-dev,
librust-serde-1+derive-dev,
librust-serde-json-1+default-dev,
@@ -174,7 +174,7 @@
librust-rcgen-0.13+pem-dev,
librust-regex-1+default-dev,
librust-rustls-0.23+hashbrown-dev,
- librust-rustls-native-certs-0.6+default-dev,
+ librust-rustls-native-certs-0.8+default-dev,
librust-serde-1+default-dev,
librust-serde-1+derive-dev,
librust-serde-json-1+default-dev,
@@ -205,7 +205,7 @@
librust-rcgen-0.13+pem-dev,
librust-regex-1+default-dev,
librust-rustls-0.23+logging-dev,
- librust-rustls-native-certs-0.6+default-dev,
+ librust-rustls-native-certs-0.8+default-dev,
librust-serde-1+default-dev,
librust-serde-1+derive-dev,
librust-serde-json-1+default-dev,
@@ -236,7 +236,7 @@
librust-rcgen-0.13+pem-dev,
librust-regex-1+default-dev,
librust-rustls-0.23+ring-dev,
- librust-rustls-native-certs-0.6+default-dev,
+ librust-rustls-native-certs-0.8+default-dev,
librust-serde-1+default-dev,
librust-serde-1+derive-dev,
librust-serde-json-1+default-dev,
@@ -267,7 +267,7 @@
librust-rcgen-0.13+pem-dev,
librust-regex-1+default-dev,
librust-rustls-0.23+std-dev,
- librust-rustls-native-certs-0.6+default-dev,
+ librust-rustls-native-certs-0.8+default-dev,
librust-serde-1+default-dev,
librust-serde-1+derive-dev,
librust-serde-json-1+default-dev,
@@ -299,7 +299,7 @@
librust-rcgen-0.13+pem-dev,
librust-regex-1+default-dev,
librust-rustls-0.23+tls12-dev,
- librust-rustls-native-certs-0.6+default-dev,
+ librust-rustls-native-certs-0.8+default-dev,
librust-serde-1+default-dev,
librust-serde-1+derive-dev,
librust-serde-json-1+default-dev,
--- End Message ---