pub struct WebPkiClientVerifier { /* private fields */ }
Expand description
A client certificate verifier that uses the webpki
crate1 to perform client certificate
validation.
It must be created via the WebPkiClientVerifier::builder()
or
WebPkiClientVerifier::builder_with_provider()
functions.
Once built, the provided Arc<dyn ClientCertVerifier>
can be used with a Rustls ServerConfig
to configure client certificate validation using with_client_cert_verifier
.
Example:
To require all clients present a client certificate issued by a trusted CA:
let client_verifier = WebPkiClientVerifier::builder(roots.into())
.build()
.unwrap();
Or, to allow clients presenting a client certificate authenticated by a trusted CA, or anonymous clients that present no client certificate:
let client_verifier = WebPkiClientVerifier::builder(roots.into())
.allow_unauthenticated()
.build()
.unwrap();
If you wish to disable advertising client authentication:
let client_verifier = WebPkiClientVerifier::no_client_auth();
You can also configure the client verifier to check for certificate revocation with client certificate revocation lists (CRLs):
let client_verifier = WebPkiClientVerifier::builder(roots.into())
.with_crls(crls)
.build()
.unwrap();
Implementations§
Source§impl WebPkiClientVerifier
impl WebPkiClientVerifier
Sourcepub fn builder(roots: Arc<RootCertStore>) -> ClientCertVerifierBuilder
pub fn builder(roots: Arc<RootCertStore>) -> ClientCertVerifierBuilder
Create a builder for the webpki
client certificate verifier configuration using
the process-default CryptoProvider
.
Client certificate authentication will be offered by the server, and client certificates
will be verified using the trust anchors found in the provided roots
. If you
wish to disable client authentication use WebPkiClientVerifier::no_client_auth()
instead.
Use Self::builder_with_provider
if you wish to specify an explicit provider.
For more information, see the ClientCertVerifierBuilder
documentation.
Sourcepub fn builder_with_provider(
roots: Arc<RootCertStore>,
provider: Arc<CryptoProvider>,
) -> ClientCertVerifierBuilder
pub fn builder_with_provider( roots: Arc<RootCertStore>, provider: Arc<CryptoProvider>, ) -> ClientCertVerifierBuilder
Create a builder for the webpki
client certificate verifier configuration using
a specified CryptoProvider
.
Client certificate authentication will be offered by the server, and client certificates
will be verified using the trust anchors found in the provided roots
. If you
wish to disable client authentication use WebPkiClientVerifier::no_client_auth() instead.
The cryptography used comes from the specified CryptoProvider
.
For more information, see the ClientCertVerifierBuilder
documentation.
Sourcepub fn no_client_auth() -> Arc<dyn ClientCertVerifier>
pub fn no_client_auth() -> Arc<dyn ClientCertVerifier>
Create a new WebPkiClientVerifier
that disables client authentication. The server will
not offer client authentication and anonymous clients will be accepted.
This is in contrast to using WebPkiClientVerifier::builder().allow_unauthenticated().build()
,
which will produce a verifier that will offer client authentication, but not require it.
Trait Implementations§
Source§impl ClientCertVerifier for WebPkiClientVerifier
impl ClientCertVerifier for WebPkiClientVerifier
Source§fn offer_client_auth(&self) -> bool
fn offer_client_auth(&self) -> bool
true
to enable the server to request a client certificate and
false
to skip requesting a client certificate. Defaults to true
.Source§fn client_auth_mandatory(&self) -> bool
fn client_auth_mandatory(&self) -> bool
true
to require a client certificate and false
to make
client authentication optional.
Defaults to self.offer_client_auth()
.Source§fn root_hint_subjects(&self) -> &[DistinguishedName]
fn root_hint_subjects(&self) -> &[DistinguishedName]
DistinguishedName
subjects that the server will hint to clients to
identify acceptable authentication trust anchors. Read moreSource§fn verify_client_cert(
&self,
end_entity: &CertificateDer<'_>,
intermediates: &[CertificateDer<'_>],
now: UnixTime,
) -> Result<ClientCertVerified, Error>
fn verify_client_cert( &self, end_entity: &CertificateDer<'_>, intermediates: &[CertificateDer<'_>], now: UnixTime, ) -> Result<ClientCertVerified, Error>
end_entity
is valid, acceptable,
and chains to at least one of the trust anchors trusted by
this verifier. Read moreSource§fn verify_tls12_signature(
&self,
message: &[u8],
cert: &CertificateDer<'_>,
dss: &DigitallySignedStruct,
) -> Result<HandshakeSignatureValid, Error>
fn verify_tls12_signature( &self, message: &[u8], cert: &CertificateDer<'_>, dss: &DigitallySignedStruct, ) -> Result<HandshakeSignatureValid, Error>
Source§fn verify_tls13_signature(
&self,
message: &[u8],
cert: &CertificateDer<'_>,
dss: &DigitallySignedStruct,
) -> Result<HandshakeSignatureValid, Error>
fn verify_tls13_signature( &self, message: &[u8], cert: &CertificateDer<'_>, dss: &DigitallySignedStruct, ) -> Result<HandshakeSignatureValid, Error>
Source§fn supported_verify_schemes(&self) -> Vec<SignatureScheme>
fn supported_verify_schemes(&self) -> Vec<SignatureScheme>
verify_tls12_signature
and verify_tls13_signature
calls. Read moreSource§fn requires_raw_public_keys(&self) -> bool
fn requires_raw_public_keys(&self) -> bool
Auto Trait Implementations§
impl Freeze for WebPkiClientVerifier
impl !RefUnwindSafe for WebPkiClientVerifier
impl Send for WebPkiClientVerifier
impl Sync for WebPkiClientVerifier
impl Unpin for WebPkiClientVerifier
impl !UnwindSafe for WebPkiClientVerifier
Blanket Implementations§
Source§impl<T> BorrowMut<T> for Twhere
T: ?Sized,
impl<T> BorrowMut<T> for Twhere
T: ?Sized,
Source§fn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
Layout§
Note: Most layout information is completely unstable and may even differ between compilations. The only exception is types with certain repr(...)
attributes. Please see the Rust Reference's “Type Layout” chapter for details on type layout guarantees.
Size: 96 bytes