Expand description
Items for use in a client.
Structs§
- Certificate
Transparency Policy  - Policy for enforcing Certificate Transparency.
 - Client
Config  - Common configuration for (typically) all connections made by a program.
 - Client
Connection  - This represents a single TLS client connection.
 - Client
Connection Data  - State associated with a client connection.
 - Client
Session Memory Cache  - An implementer of 
ClientSessionStorethat stores everything in memory. - Dangerous
Client Config  - Accessor for dangerous configuration options.
 - Handshake
Signature Valid  - Zero-sized marker type representing verification of a signature.
 - Invalid
DnsName Error  - The provided input could not be parsed because it is not a syntactically-valid DNS Name.
 - Resumption
 - Configuration for how/when a client is allowed to resume a previous session.
 - Server
Cert Verified  - Zero-sized marker type representing verification of a server cert chain.
 - Tls12
Client Session Value  - Tls13
Client Session Value  - Wants
Client Cert  - A config builder state where the caller needs to supply whether and how to provide a client certificate.
 - Wants
Transparency Policy OrClient Cert  - A config builder state where the caller needs to supply a certificate transparency policy or client certificate resolver.
 - WebPki
Verifier  - Default 
ServerCertVerifier, see the trait impl for more information. - Write
Early Data  - Stub that implements io::Write and dispatches to 
write_early_data. 
Enums§
- Server
Name  - Encodes ways a client can know the expected name of the server.
 - Tls12
Resumption  - What mechanisms to support for resuming a TLS 1.2 session.
 
Traits§
- Client
Session Store  - A trait for the ability to store client session data, so that sessions can be resumed in future connections.
 - Resolves
Client Cert  - A trait for the ability to choose a certificate chain and private key for the purposes of client authentication.
 - Server
Cert Verifier  - Something that can verify a server certificate chain, and verify signatures made by certificates.
 
Functions§
- verify_
server_ cert_ signed_ by_ trust_ anchor  - Verify that the end-entity certificate 
end_entityis a valid server cert and chains to at least one of the OwnedTrustAnchor in therootsRootCertStore. - verify_
server_ name  - Verify that the 
end_entityhas a name or alternative name matching theserver_namenote: this only verifies the name and should be used in conjuction with more verification like verify_server_cert_signed_by_trust_anchor