pub struct WebPkiServerVerifier { /* private fields */ }Expand description
Default ServerVerifier, see the trait impl for more information.
Implementations§
Source§impl WebPkiServerVerifier
impl WebPkiServerVerifier
Sourcepub fn builder(
roots: Arc<RootCertStore>,
provider: &CryptoProvider,
) -> ServerVerifierBuilder
pub fn builder( roots: Arc<RootCertStore>, provider: &CryptoProvider, ) -> ServerVerifierBuilder
Create a builder for the webpki server certificate verifier configuration using
a specified CryptoProvider.
Server certificates will be verified using the trust anchors found in the provided roots.
The cryptography used comes from the specified CryptoProvider.
For more information, see the ServerVerifierBuilder documentation.
Trait Implementations§
Source§impl Debug for WebPkiServerVerifier
impl Debug for WebPkiServerVerifier
Source§impl Hash for WebPkiServerVerifier
impl Hash for WebPkiServerVerifier
Source§impl ServerVerifier for WebPkiServerVerifier
impl ServerVerifier for WebPkiServerVerifier
Source§fn verify_identity(
&self,
identity: &ServerIdentity<'_>,
) -> Result<PeerVerified, Error>
fn verify_identity( &self, identity: &ServerIdentity<'_>, ) -> Result<PeerVerified, Error>
Will verify the certificate is valid in the following ways:
- Signed by a trusted
RootCertStoreCA - Not Expired
- Valid for DNS entry
- Valid revocation status (if applicable).
Depending on the verifier’s configuration revocation status checking may be performed for each certificate in the chain to a root CA (excluding the root itself), or only the end entity certificate. Similarly, unknown revocation status may be treated as an error or allowed based on configuration.
Source§fn verify_tls12_signature(
&self,
input: &SignatureVerificationInput<'_>,
) -> Result<HandshakeSignatureValid, Error>
fn verify_tls12_signature( &self, input: &SignatureVerificationInput<'_>, ) -> Result<HandshakeSignatureValid, Error>
Verify a signature allegedly by the given server certificate. Read more
Source§fn verify_tls13_signature(
&self,
input: &SignatureVerificationInput<'_>,
) -> Result<HandshakeSignatureValid, Error>
fn verify_tls13_signature( &self, input: &SignatureVerificationInput<'_>, ) -> Result<HandshakeSignatureValid, Error>
Verify a signature allegedly by the given server certificate. Read more
Source§fn supported_verify_schemes(&self) -> Vec<SignatureScheme>
fn supported_verify_schemes(&self) -> Vec<SignatureScheme>
Return the list of SignatureSchemes that this verifier will handle,
in
verify_tls12_signature and verify_tls13_signature calls. Read moreSource§fn request_ocsp_response(&self) -> bool
fn request_ocsp_response(&self) -> bool
Return true if this verifier will process stapled OCSP responses. Read more
Source§fn hash_config(&self, h: &mut dyn Hasher)
fn hash_config(&self, h: &mut dyn Hasher)
Instance configuration should be input to
h.Source§fn supported_certificate_types(&self) -> &'static [CertificateType]
fn supported_certificate_types(&self) -> &'static [CertificateType]
Returns which
CertificateTypes this verifier supports. Read moreSource§fn root_hint_subjects(&self) -> Option<Arc<[DistinguishedName]>>
fn root_hint_subjects(&self) -> Option<Arc<[DistinguishedName]>>
Return the
DistinguishedNames of certificate authorities that this verifier trusts. Read moreAuto Trait Implementations§
impl Freeze for WebPkiServerVerifier
impl !RefUnwindSafe for WebPkiServerVerifier
impl Send for WebPkiServerVerifier
impl Sync for WebPkiServerVerifier
impl Unpin for WebPkiServerVerifier
impl !UnwindSafe for WebPkiServerVerifier
Blanket Implementations§
Source§impl<T> BorrowMut<T> for Twhere
T: ?Sized,
impl<T> BorrowMut<T> for Twhere
T: ?Sized,
Source§fn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
Mutably borrows from an owned value. Read more