Module client

Source
Expand description

Items for use in a client.

Modules§

danger
Dangerous configuration that should be audited and used with extreme care.

Structs§

AlwaysResolvesClientRawPublicKeys
An exemplar ResolvesClientCert implementation that always resolves to a single RFC 7250 raw public key.
ClientConfig
Common configuration for (typically) all connections made by a program.
ClientConnectionstd
This represents a single TLS client connection.
ClientConnectionData
State associated with a client connection.
ClientSessionMemoryCachestd or hashbrown
An implementer of ClientSessionStore that stores everything in memory.
EchConfig
Configuration for performing encrypted client hello.
EchGreaseConfig
Configuration for GREASE Encrypted Client Hello.
Resumption
Configuration for how/when a client is allowed to resume a previous session.
ServerCertVerifierBuilder
A builder for configuring a webpki server certificate verifier.
Tls12ClientSessionValue
Tls13ClientSessionValue
UnbufferedClientConnection
Unbuffered version of ClientConnection
WantsClientCert
A config builder state where the caller needs to supply whether and how to provide a client certificate.
WebPkiServerVerifier
Default ServerCertVerifier, see the trait impl for more information.
WriteEarlyDatastd
Stub that implements io::Write and dispatches to write_early_data.

Enums§

EarlyDataError
Errors that may arise when encrypting early (RTT-0) data
EchMode
Controls how Encrypted Client Hello (ECH) is used in a client handshake.
EchStatus
An enum representing ECH offer status.
Tls12Resumption
What mechanisms to support for resuming a TLS 1.2 session.
VerifierBuilderError
An error that can occur when building a certificate verifier.

Traits§

ClientSessionStore
A trait for the ability to store client session data, so that sessions can be resumed in future connections.
ResolvesClientCert
A trait for the ability to choose a certificate chain and private key for the purposes of client authentication.

Functions§

verify_server_cert_signed_by_trust_anchor
Verify that the end-entity certificate end_entity is a valid server cert and chains to at least one of the trust anchors in the roots RootCertStore.
verify_server_name
Verify that the end_entity has an alternative name matching the server_name.