Struct rustls::sign::CertifiedKey [−][src]
pub struct CertifiedKey {
pub cert: Vec<Certificate>,
pub key: Arc<Box<dyn SigningKey>>,
pub ocsp: Option<Vec<u8>>,
pub sct_list: Option<Vec<u8>>,
}Expand description
A packaged-together certificate chain, matching SigningKey and
optional stapled OCSP response and/or SCT.
Fields
cert: Vec<Certificate>The certificate chain.
key: Arc<Box<dyn SigningKey>>The certified key.
ocsp: Option<Vec<u8>>An optional OCSP response from the certificate issuer, attesting to its continued validity.
sct_list: Option<Vec<u8>>An optional collection of SCTs from CT logs, proving the
certificate is included on those logs. This must be
a SignedCertificateTimestampList encoding; see RFC6962.
Implementations
impl CertifiedKey[src]
impl CertifiedKey[src]pub fn new(
cert: Vec<Certificate>,
key: Arc<Box<dyn SigningKey>>
) -> CertifiedKey[src]
pub fn new(
cert: Vec<Certificate>,
key: Arc<Box<dyn SigningKey>>
) -> CertifiedKey[src]Make a new CertifiedKey, with the given chain and key.
The cert chain must not be empty. The first certificate in the chain must be the end-entity certificate.
pub fn end_entity_cert(&self) -> Result<&Certificate, ()>[src]
pub fn end_entity_cert(&self) -> Result<&Certificate, ()>[src]The end-entity certificate.
pub fn take_cert(&mut self) -> Vec<Certificate>[src]
pub fn take_cert(&mut self) -> Vec<Certificate>[src]Steal ownership of the certificate chain.
pub fn has_sct_list(&self) -> bool[src]
pub fn has_sct_list(&self) -> bool[src]Return true if there’s an SCT list.
pub fn take_sct_list(&mut self) -> Option<Vec<u8>>[src]
pub fn take_sct_list(&mut self) -> Option<Vec<u8>>[src]Steal ownership of the SCT list.
pub fn cross_check_end_entity_cert(
&self,
name: Option<DNSNameRef<'_>>
) -> Result<(), TLSError>[src]
pub fn cross_check_end_entity_cert(
&self,
name: Option<DNSNameRef<'_>>
) -> Result<(), TLSError>[src]Check the certificate chain for validity:
- it should be non-empty list
- the first certificate should be parsable as a x509v3,
- the first certificate should quote the given server name (if provided)
These checks are not security-sensitive. They are the server attempting to detect accidental misconfiguration.
Trait Implementations
impl Clone for CertifiedKey[src]
impl Clone for CertifiedKey[src]fn clone(&self) -> CertifiedKey[src]
fn clone(&self) -> CertifiedKey[src]Returns a copy of the value. Read more
fn clone_from(&mut self, source: &Self)1.0.0[src]
fn clone_from(&mut self, source: &Self)1.0.0[src]Performs copy-assignment from source. Read more
Auto Trait Implementations
impl !RefUnwindSafe for CertifiedKey
impl Send for CertifiedKey
impl Sync for CertifiedKey
impl Unpin for CertifiedKey
impl !UnwindSafe for CertifiedKey
Blanket Implementations
impl<T> BorrowMut<T> for T where
T: ?Sized, [src]
impl<T> BorrowMut<T> for T where
T: ?Sized, [src]pub fn borrow_mut(&mut self) -> &mut T[src]
pub fn borrow_mut(&mut self) -> &mut T[src]Mutably borrows from an owned value. Read more
impl<T> ToOwned for T where
T: Clone, [src]
impl<T> ToOwned for T where
T: Clone, [src]type Owned = T
type Owned = TThe resulting type after obtaining ownership.
pub fn to_owned(&self) -> T[src]
pub fn to_owned(&self) -> T[src]Creates owned data from borrowed data, usually by cloning. Read more
pub fn clone_into(&self, target: &mut T)[src]
pub fn clone_into(&self, target: &mut T)[src]🔬 This is a nightly-only experimental API. (toowned_clone_into)
recently added
Uses borrowed data to replace owned data, usually by cloning. Read more