@@ -137,8 +137,7 @@ async fn run_nts_ke(
137137 }
138138
139139 let private_key =
140- ntp_proto:: tls_utils:: pemfile:: private_key ( & mut std:: io:: BufReader :: new ( private_key_file) ) ?
141- . ok_or ( io_error ( "could not parse private key" ) ) ?;
140+ ntp_proto:: tls_utils:: pemfile:: private_key ( & mut std:: io:: BufReader :: new ( private_key_file) ) ?;
142141
143142 key_exchange_server ( keyset, nts_ke_config, cert_chain, pool_certs, private_key) . await
144143}
@@ -630,33 +629,23 @@ mod tests {
630629 #[ test]
631630 fn parse_private_keys ( ) {
632631 let input = include_bytes ! ( "../../test-keys/end.key" ) ;
633- let _ = ntp_proto:: tls_utils:: pemfile:: private_key ( & mut input. as_slice ( ) )
634- . unwrap ( )
635- . unwrap ( ) ;
632+ let _ = ntp_proto:: tls_utils:: pemfile:: private_key ( & mut input. as_slice ( ) ) . unwrap ( ) ;
636633
637634 let input = include_bytes ! ( "../../test-keys/testca.key" ) ;
638- let _ = ntp_proto:: tls_utils:: pemfile:: private_key ( & mut input. as_slice ( ) )
639- . unwrap ( )
640- . unwrap ( ) ;
635+ let _ = ntp_proto:: tls_utils:: pemfile:: private_key ( & mut input. as_slice ( ) ) . unwrap ( ) ;
641636
642637 // openssl does no longer seem to want to generate this format
643638 // so we use https://github.com/rustls/pemfile/blob/main/tests/data/rsa1024.pkcs1.pem
644639 let input = include_bytes ! ( "../../test-keys/rsa_key.pem" ) ;
645- let _ = ntp_proto:: tls_utils:: pemfile:: private_key ( & mut input. as_slice ( ) )
646- . unwrap ( )
647- . unwrap ( ) ;
640+ let _ = ntp_proto:: tls_utils:: pemfile:: private_key ( & mut input. as_slice ( ) ) . unwrap ( ) ;
648641
649642 // openssl ecparam -name prime256v1 -genkey -noout -out ec_key.pem
650643 let input = include_bytes ! ( "../../test-keys/ec_key.pem" ) ;
651- let _ = ntp_proto:: tls_utils:: pemfile:: private_key ( & mut input. as_slice ( ) )
652- . unwrap ( )
653- . unwrap ( ) ;
644+ let _ = ntp_proto:: tls_utils:: pemfile:: private_key ( & mut input. as_slice ( ) ) . unwrap ( ) ;
654645
655646 // openssl genpkey -algorithm EC -out pkcs8_key.pem -pkeyopt ec_paramgen_curve:prime256v1
656647 let input = include_bytes ! ( "../../test-keys/pkcs8_key.pem" ) ;
657- let _ = ntp_proto:: tls_utils:: pemfile:: private_key ( & mut input. as_slice ( ) )
658- . unwrap ( )
659- . unwrap ( ) ;
648+ let _ = ntp_proto:: tls_utils:: pemfile:: private_key ( & mut input. as_slice ( ) ) . unwrap ( ) ;
660649 }
661650
662651 #[ tokio:: test]
@@ -958,9 +947,8 @@ mod tests {
958947 certificates_from_bufread ( BufReader :: new ( Cursor :: new ( cc) ) ) . unwrap ( ) ;
959948
960949 let pk = include_bytes ! ( "../../test-keys/end.key" ) ;
961- let private_key = ntp_proto:: tls_utils:: pemfile:: private_key ( & mut pk. as_slice ( ) )
962- . unwrap ( )
963- . unwrap ( ) ;
950+ let private_key =
951+ ntp_proto:: tls_utils:: pemfile:: private_key ( & mut pk. as_slice ( ) ) . unwrap ( ) ;
964952
965953 let config = build_server_config ( certificate_chain, private_key) . unwrap ( ) ;
966954
@@ -993,9 +981,7 @@ mod tests {
993981 let certificate_chain = certificates_from_bufread ( BufReader :: new ( Cursor :: new ( cc) ) ) ?;
994982
995983 let pk = include_bytes ! ( "../../test-keys/end.key" ) ;
996- let private_key = ntp_proto:: tls_utils:: pemfile:: private_key ( & mut pk. as_slice ( ) )
997- . unwrap ( )
998- . unwrap ( ) ;
984+ let private_key = ntp_proto:: tls_utils:: pemfile:: private_key ( & mut pk. as_slice ( ) ) . unwrap ( ) ;
999985
1000986 let config = build_server_config ( certificate_chain, private_key) . unwrap ( ) ;
1001987 let pool_certs = Arc :: < [ _ ] > :: from ( vec ! [ ] ) ;
0 commit comments