Struct rustls::server::NoClientAuth  
source · pub struct NoClientAuth;Expand description
Turns off client authentication. In contrast to using
WebPkiClientVerifier::builder(roots).allow_unauthenticated().build(), the NoClientAuth
ClientCertVerifier will not offer client authentication at all, vs offering but not
requiring it.
Trait Implementations§
source§impl ClientCertVerifier for NoClientAuth
 
impl ClientCertVerifier for NoClientAuth
source§fn offer_client_auth(&self) -> bool
 
fn offer_client_auth(&self) -> bool
Returns 
true to enable the server to request a client certificate and
false to skip requesting a client certificate. Defaults to true.source§fn root_hint_subjects(&self) -> &[DistinguishedName]
 
fn root_hint_subjects(&self) -> &[DistinguishedName]
Returns the 
DistinguishedName subjects that the server will hint to clients to
identify acceptable authentication trust anchors. Read moresource§fn verify_client_cert(
    &self,
    _end_entity: &CertificateDer<'_>,
    _intermediates: &[CertificateDer<'_>],
    _now: UnixTime
) -> Result<ClientCertVerified, Error>
 
fn verify_client_cert( &self, _end_entity: &CertificateDer<'_>, _intermediates: &[CertificateDer<'_>], _now: UnixTime ) -> Result<ClientCertVerified, Error>
Verify the end-entity certificate 
end_entity is valid, acceptable,
and chains to at least one of the trust anchors trusted by
this verifier. Read moresource§fn verify_tls12_signature(
    &self,
    _message: &[u8],
    _cert: &CertificateDer<'_>,
    _dss: &DigitallySignedStruct
) -> Result<HandshakeSignatureValid, Error>
 
fn verify_tls12_signature( &self, _message: &[u8], _cert: &CertificateDer<'_>, _dss: &DigitallySignedStruct ) -> Result<HandshakeSignatureValid, Error>
Verify a signature allegedly by the given client certificate. Read more
source§fn verify_tls13_signature(
    &self,
    _message: &[u8],
    _cert: &CertificateDer<'_>,
    _dss: &DigitallySignedStruct
) -> Result<HandshakeSignatureValid, Error>
 
fn verify_tls13_signature( &self, _message: &[u8], _cert: &CertificateDer<'_>, _dss: &DigitallySignedStruct ) -> Result<HandshakeSignatureValid, Error>
Verify a signature allegedly by the given client certificate. Read more
source§fn supported_verify_schemes(&self) -> Vec<SignatureScheme>
 
fn supported_verify_schemes(&self) -> Vec<SignatureScheme>
Return the list of SignatureSchemes that this verifier will handle,
in 
verify_tls12_signature and verify_tls13_signature calls. Read moresource§fn client_auth_mandatory(&self) -> bool
 
fn client_auth_mandatory(&self) -> bool
Return 
true to require a client certificate and false to make
client authentication optional.
Defaults to self.offer_client_auth().Auto Trait Implementations§
impl Freeze for NoClientAuth
impl RefUnwindSafe for NoClientAuth
impl Send for NoClientAuth
impl Sync for NoClientAuth
impl Unpin for NoClientAuth
impl UnwindSafe for NoClientAuth
Blanket Implementations§
source§impl<T> BorrowMut<T> for Twhere
    T: ?Sized,
 
impl<T> BorrowMut<T> for Twhere
    T: ?Sized,
source§fn borrow_mut(&mut self) -> &mut T
 
fn borrow_mut(&mut self) -> &mut T
Mutably borrows from an owned value. Read more