pub struct WebPkiServerVerifier { /* private fields */ }
Expand description
Default ServerVerifier
, see the trait impl for more information.
Implementations§
Source§impl WebPkiServerVerifier
impl WebPkiServerVerifier
Sourcepub fn builder(roots: Arc<RootCertStore>) -> ServerVerifierBuilder
pub fn builder(roots: Arc<RootCertStore>) -> ServerVerifierBuilder
Create a builder for the webpki
server certificate verifier configuration using
the process-default CryptoProvider
.
Server certificates will be verified using the trust anchors found in the provided roots
.
Use Self::builder_with_provider
if you wish to specify an explicit provider.
For more information, see the ServerVerifierBuilder
documentation.
Sourcepub fn builder_with_provider(
roots: Arc<RootCertStore>,
provider: &CryptoProvider,
) -> ServerVerifierBuilder
pub fn builder_with_provider( roots: Arc<RootCertStore>, provider: &CryptoProvider, ) -> ServerVerifierBuilder
Create a builder for the webpki
server certificate verifier configuration using
a specified CryptoProvider
.
Server certificates will be verified using the trust anchors found in the provided roots
.
The cryptography used comes from the specified CryptoProvider
.
For more information, see the ServerVerifierBuilder
documentation.
Trait Implementations§
Source§impl Debug for WebPkiServerVerifier
impl Debug for WebPkiServerVerifier
Source§impl ServerVerifier for WebPkiServerVerifier
impl ServerVerifier for WebPkiServerVerifier
Source§fn verify_identity(
&self,
identity: &ServerIdentity<'_>,
) -> Result<PeerVerified, Error>
fn verify_identity( &self, identity: &ServerIdentity<'_>, ) -> Result<PeerVerified, Error>
Will verify the certificate is valid in the following ways:
- Signed by a trusted
RootCertStore
CA - Not Expired
- Valid for DNS entry
- Valid revocation status (if applicable).
Depending on the verifier’s configuration revocation status checking may be performed for each certificate in the chain to a root CA (excluding the root itself), or only the end entity certificate. Similarly, unknown revocation status may be treated as an error or allowed based on configuration.
Source§fn verify_tls12_signature(
&self,
input: &SignatureVerificationInput<'_>,
) -> Result<HandshakeSignatureValid, Error>
fn verify_tls12_signature( &self, input: &SignatureVerificationInput<'_>, ) -> Result<HandshakeSignatureValid, Error>
Source§fn verify_tls13_signature(
&self,
input: &SignatureVerificationInput<'_>,
) -> Result<HandshakeSignatureValid, Error>
fn verify_tls13_signature( &self, input: &SignatureVerificationInput<'_>, ) -> Result<HandshakeSignatureValid, Error>
Source§fn supported_verify_schemes(&self) -> Vec<SignatureScheme>
fn supported_verify_schemes(&self) -> Vec<SignatureScheme>
verify_tls12_signature
and verify_tls13_signature
calls. Read moreSource§fn request_ocsp_response(&self) -> bool
fn request_ocsp_response(&self) -> bool
Source§fn supported_certificate_types(&self) -> &'static [CertificateType]
fn supported_certificate_types(&self) -> &'static [CertificateType]
CertificateType
s this verifier supports. Read moreSource§fn root_hint_subjects(&self) -> Option<Arc<[DistinguishedName]>>
fn root_hint_subjects(&self) -> Option<Arc<[DistinguishedName]>>
DistinguishedName
s of certificate authorities that this verifier trusts. Read more