latticearc 0.6.2

Production-ready post-quantum cryptography. Hybrid ML-KEM+X25519 by default, all 4 NIST standards (FIPS 203–206), post-quantum TLS, and FIPS 140-3 backend — one crate, zero unsafe.
Documentation
//! Test rustls 0.23 compatibility example.
#![allow(clippy::print_stdout)]
#![allow(unused_qualifications)]

use latticearc::tls::*;

#[tokio::main]
async fn main() -> Result<(), Box<dyn std::error::Error>> {
    println!("Testing rustls 0.23 compatibility...");

    match latticearc::tls::basic_features::load_certificates("test_certs/server.crt") {
        Ok(certs) => println!("✅ Loaded {} certificates", certs.len()),
        Err(e) => println!("⚠️ Certificate loading test: {}", e),
    }

    println!("Testing TLS configuration...");
    let config = TlsConfig::default();
    let info = get_config_info(&config);
    println!("✅ TLS config: {}", info);

    println!("Testing client connector...");
    match latticearc::tls::basic_features::create_client_connector(&config) {
        Ok(_) => println!("✅ Client connector created"),
        Err(e) => println!("⚠️ Client connector test: {}", e),
    }

    println!("Testing PQ support...");
    println!("PQ enabled: {}", pq_enabled());

    let kex_info = get_kex_info(config.mode, PqKexMode::RustlsPq);
    println!("Key exchange: {}", kex_info.method);

    println!("✅ All rustls 0.23 compatibility tests passed!");
    Ok(())
}