Expand description
Items for use in a client.
Structs§
- Certificate
Transparency Policy - Policy for enforcing Certificate Transparency.
- Client
Config - Common configuration for (typically) all connections made by a program.
- Client
Connection - This represents a single TLS client connection.
- Client
Connection Data - State associated with a client connection.
- Client
Session Memory Cache - An implementer of
ClientSessionStore
that stores everything in memory. - Dangerous
Client Config - Accessor for dangerous configuration options.
- Handshake
Signature Valid - Zero-sized marker type representing verification of a signature.
- Invalid
DnsName Error - The provided input could not be parsed because it is not a syntactically-valid DNS Name.
- Resumption
- Configuration for how/when a client is allowed to resume a previous session.
- Server
Cert Verified - Zero-sized marker type representing verification of a server cert chain.
- Tls12
Client Session Value - Tls13
Client Session Value - Wants
Client Cert - A config builder state where the caller needs to supply whether and how to provide a client certificate.
- Wants
Transparency Policy OrClient Cert - A config builder state where the caller needs to supply a certificate transparency policy or client certificate resolver.
- WebPki
Verifier - Default
ServerCertVerifier
, see the trait impl for more information. - Write
Early Data - Stub that implements io::Write and dispatches to
write_early_data
.
Enums§
- Server
Name - Encodes ways a client can know the expected name of the server.
- Tls12
Resumption - What mechanisms to support for resuming a TLS 1.2 session.
Traits§
- Client
Session Store - A trait for the ability to store client session data, so that sessions can be resumed in future connections.
- Resolves
Client Cert - A trait for the ability to choose a certificate chain and private key for the purposes of client authentication.
- Server
Cert Verifier - Something that can verify a server certificate chain, and verify signatures made by certificates.
Functions§
- verify_
server_ cert_ signed_ by_ trust_ anchor - Verify that the end-entity certificate
end_entity
is a valid server cert and chains to at least one of the OwnedTrustAnchor in theroots
RootCertStore. - verify_
server_ name - Verify that the
end_entity
has a name or alternative name matching theserver_name
note: this only verifies the name and should be used in conjuction with more verification like verify_server_cert_signed_by_trust_anchor