bump up rustls to 0.19 and ring to 0.16.19
diff --git a/samplecode/mutual-ra/enclave/src/lib.rs b/samplecode/mutual-ra/enclave/src/lib.rs
index 68a9a42..847052c 100644
--- a/samplecode/mutual-ra/enclave/src/lib.rs
+++ b/samplecode/mutual-ra/enclave/src/lib.rs
@@ -515,11 +515,11 @@
}
impl rustls::ClientCertVerifier for ClientAuth {
- fn client_auth_root_subjects(&self) -> rustls::DistinguishedNames {
- rustls::DistinguishedNames::new()
+ fn client_auth_root_subjects(&self, _sni: Option<&webpki::DNSName>) -> Option<rustls::DistinguishedNames> {
+ Some(rustls::DistinguishedNames::new())
}
- fn verify_client_cert(&self, _certs: &[rustls::Certificate])
+ fn verify_client_cert(&self, _certs: &[rustls::Certificate], _sni: Option<&webpki::DNSName>)
-> Result<rustls::ClientCertVerified, rustls::TLSError> {
println!("client cert: {:?}", _certs);
// This call will automatically verify cert is properly signed
@@ -667,7 +667,7 @@
certs.push(rustls::Certificate(cert_der));
let privkey = rustls::PrivateKey(key_der);
- cfg.set_single_client_cert(certs, privkey);
+ cfg.set_single_client_cert(certs, privkey).unwrap();
cfg.dangerous().set_certificate_verifier(Arc::new(ServerAuth::new(true)));
cfg.versions.clear();
cfg.versions.push(rustls::ProtocolVersion::TLSv1_2);
diff --git a/samplecode/pcl/encrypted-hello/enclave/Enclave.edl b/samplecode/pcl/encrypted-hello/enclave/Enclave.edl
index 4ffc40f..c5fd7a4 100644
--- a/samplecode/pcl/encrypted-hello/enclave/Enclave.edl
+++ b/samplecode/pcl/encrypted-hello/enclave/Enclave.edl
@@ -18,6 +18,7 @@
enclave {
from "sgx_tstd.edl" import *;
from "sgx_stdio.edl" import *;
+ from "sgx_file.edl" import *;
trusted {
/* define ECALLs here. */
diff --git a/samplecode/pcl/pcl-seal/enclave/src/lib.rs b/samplecode/pcl/pcl-seal/enclave/src/lib.rs
index 6f65cd9..5898d74 100644
--- a/samplecode/pcl/pcl-seal/enclave/src/lib.rs
+++ b/samplecode/pcl/pcl-seal/enclave/src/lib.rs
@@ -207,7 +207,7 @@
let certs = load_certs("client.crt");
let privkey = load_private_key("client.key");
- config.set_single_client_cert(certs, privkey);
+ config.set_single_client_cert(certs, privkey).unwrap();
config
}
diff --git a/samplecode/pcl/pcl-user/Cargo.toml b/samplecode/pcl/pcl-user/Cargo.toml
index 065ae12..08427e7 100644
--- a/samplecode/pcl/pcl-user/Cargo.toml
+++ b/samplecode/pcl/pcl-user/Cargo.toml
@@ -7,7 +7,7 @@
[dependencies]
chrono = "0.4.5"
webpki = "0.21"
-rustls = { version = "0.16", features = ["dangerous_configuration"] }
+rustls = { version = "0.19", features = ["dangerous_configuration"] }
itertools = "*"
sgx_types = { git = "https://github.com/apache/teaclave-sgx-sdk" }
base64 = "0.9.2"
diff --git a/samplecode/pcl/pcl-user/src/main.rs b/samplecode/pcl/pcl-user/src/main.rs
index ff83909..64c3310 100644
--- a/samplecode/pcl/pcl-user/src/main.rs
+++ b/samplecode/pcl/pcl-user/src/main.rs
@@ -73,7 +73,7 @@
let certs = rustls::internal::pemfile::certs(&mut cc_reader).unwrap();
let privk = rustls::internal::pemfile::pkcs8_private_keys(&mut client_key_reader);
- config.set_single_client_cert(certs, privk.unwrap()[0].clone());
+ config.set_single_client_cert(certs, privk.unwrap()[0].clone()).unwrap();
config.dangerous().set_certificate_verifier(Arc::new(ServerAuth::new(true)));
config.versions.clear();
diff --git a/samplecode/pcl/pcl-user/ue_send_recv/Cargo.toml b/samplecode/pcl/pcl-user/ue_send_recv/Cargo.toml
index 376955d..bf2ec4c 100644
--- a/samplecode/pcl/pcl-user/ue_send_recv/Cargo.toml
+++ b/samplecode/pcl/pcl-user/ue_send_recv/Cargo.toml
@@ -8,5 +8,5 @@
enclave = []
[dependencies]
-rustls = "0.16.0"
+rustls = "0.19.0"
cfg-if = "*"
diff --git a/samplecode/tr-mpc/tr-mpc-client/Cargo.toml b/samplecode/tr-mpc/tr-mpc-client/Cargo.toml
index 3895477..bbe3da5 100644
--- a/samplecode/tr-mpc/tr-mpc-client/Cargo.toml
+++ b/samplecode/tr-mpc/tr-mpc-client/Cargo.toml
@@ -6,7 +6,7 @@
[dependencies]
chrono = "0.4.5"
webpki = "0.21"
-rustls = { version = "0.16",features = ["dangerous_configuration"] }
+rustls = { version = "0.19", features = ["dangerous_configuration"] }
itertools = "*"
sgx_types = { git = "https://github.com/apache/teaclave-sgx-sdk.git" }
base64 = "0.9.2"
diff --git a/samplecode/ue-ra/ue-ra-client/Cargo.toml b/samplecode/ue-ra/ue-ra-client/Cargo.toml
index 760e047..4235f3f 100644
--- a/samplecode/ue-ra/ue-ra-client/Cargo.toml
+++ b/samplecode/ue-ra/ue-ra-client/Cargo.toml
@@ -6,7 +6,7 @@
[dependencies]
chrono = "0.4.5"
webpki = "0.21"
-rustls = { version = "0.16", features = ["dangerous_configuration"] }
+rustls = { version = "0.19", features = ["dangerous_configuration"] }
itertools = "*"
sgx_types = { git = "https://github.com/apache/teaclave-sgx-sdk" }
base64 = "0.9.2"
diff --git a/samplecode/ue-ra/ue-ra-client/src/main.rs b/samplecode/ue-ra/ue-ra-client/src/main.rs
index 62e2968..1bf9712 100644
--- a/samplecode/ue-ra/ue-ra-client/src/main.rs
+++ b/samplecode/ue-ra/ue-ra-client/src/main.rs
@@ -70,7 +70,7 @@
let certs = rustls::internal::pemfile::certs(&mut cc_reader).unwrap();
let privk = rustls::internal::pemfile::pkcs8_private_keys(&mut client_key_reader);
- config.set_single_client_cert(certs, privk.unwrap()[0].clone());
+ config.set_single_client_cert(certs, privk.unwrap()[0].clone()).unwrap();
config.dangerous().set_certificate_verifier(Arc::new(ServerAuth::new(true)));
config.versions.clear();