Expand description

webpki: Web PKI X.509 Certificate Validation.

See EndEntityCert’s documentation for a description of the certificate processing steps necessary for a TLS connection.

Features

FeatureDescription
allocEnable features that require use of the heap. Currently all RSA signature algorithms require this feature.
stdEnable features that require libstd. Implies alloc.

Structs

An error indicating that an IpAddrRef could not built because the input could not be parsed as an IP address.
Borrowed representation of a RFC 52801 profile Certificate Revocation List (CRL).
Borrowed representation of a RFC 52801 profile Certificate Revocation List (CRL) revoked certificate entry.
A parsed X509 certificate.
A DNS Name suitable for use in the TLS Server Name Indication (SNI) extension and/or for use as the reference hostname for which to verify a certificate.
A reference to a DNS Name suitable for use in the TLS Server Name Indication (SNI) extension and/or for use as the reference hostname for which to verify a certificate.
An end-entity certificate.
An error indicating that a DnsNameRef could not built because the input is not a syntactically-valid DNS Name.
An error indicating that a SubjectNameRef could not built because the input is not a syntactically-valid DNS Name or IP address.
Owned representation of a RFC 52801 profile Certificate Revocation List (CRL).
Owned representation of a RFC 52801 profile Certificate Revocation List (CRL) revoked certificate entry.
A signature algorithm.
The time type.
Trust anchors which may be used for authenticating clients.
Trust anchors which may be used for authenticating servers.
A trust anchor (a.k.a. root CA).

Enums

An enumeration indicating whether a Cert is a leaf end-entity cert, or a linked list node from the CA Cert to a child Cert it issued.
An error that occurs during certificate validation or name validation.
Either a IPv4 or IPv6 address, plus its owned string representation
Either a IPv4 or IPv6 address, plus its borrowed string representation
Identifies the reason a certificate was revoked. See RFC 5280 §5.3.11
A DNS name or IP address, which borrows its text representation.

Statics

ECDSA signatures using the P-256 curve and SHA-256.
ECDSA signatures using the P-256 curve and SHA-384. Deprecated.
ECDSA signatures using the P-384 curve and SHA-256. Deprecated.
ECDSA signatures using the P-384 curve and SHA-384.
ED25519 signatures according to RFC 8410
RSA PKCS#1 1.5 signatures using SHA-256 for keys of 2048-8192 bits.
RSA PKCS#1 1.5 signatures using SHA-384 for keys of 2048-8192 bits.
RSA PKCS#1 1.5 signatures using SHA-512 for keys of 2048-8192 bits.
RSA PKCS#1 1.5 signatures using SHA-384 for keys of 3072-8192 bits.
RSA PSS signatures using SHA-256 for keys of 2048-8192 bits and of type rsaEncryption; see RFC 4055 Section 1.2.
RSA PSS signatures using SHA-384 for keys of 2048-8192 bits and of type rsaEncryption; see RFC 4055 Section 1.2.
RSA PSS signatures using SHA-512 for keys of 2048-8192 bits and of type rsaEncryption; see RFC 4055 Section 1.2.

Traits

Operations over a RFC 52801 profile Certificate Revocation List (CRL) required for revocation checking. Implemented by OwnedCertRevocationList and BorrowedCertRevocationList.