Struct tor_cert::KeyUnknownCert
source · pub struct KeyUnknownCert { /* private fields */ }
Expand description
A parsed Ed25519 certificate. Maybe it includes its signing key; maybe it doesn’t.
To validate this cert, either it must contain its signing key,
or the caller must know the signing key. In the first case, call
should_have_signing_key
;
in the latter, call
should_be_signed_with
.
Implementations§
source§impl KeyUnknownCert
impl KeyUnknownCert
sourcepub fn peek_cert_type(&self) -> CertType
pub fn peek_cert_type(&self) -> CertType
Return the certificate type of the underling cert.
sourcepub fn peek_subject_key(&self) -> &CertifiedKey
pub fn peek_subject_key(&self) -> &CertifiedKey
Return subject key of the underlying cert.
sourcepub fn check_key(
self,
pkey: Option<&Ed25519Identity>
) -> Result<UncheckedCert, CertError>
👎Deprecated since 0.7.1: Use should_have_signing_key or should_be_signed_with instead.
pub fn check_key( self, pkey: Option<&Ed25519Identity> ) -> Result<UncheckedCert, CertError>
Check whether a given pkey is (or might be) a key that has correctly signed this certificate.
If pkey is None, this certificate must contain its signing key.
On success, we can check whether the certificate is well-signed; otherwise, we can’t check the certificate.
sourcepub fn should_have_signing_key(self) -> Result<UncheckedCert, CertError>
pub fn should_have_signing_key(self) -> Result<UncheckedCert, CertError>
Declare that this should be a self-contained certificate that contains its own signing key.
On success, this certificate did indeed turn out to be self-contained, and so we can validate it. On failure, this certificate was not self-contained.
sourcepub fn should_be_signed_with(
self,
pkey: &Ed25519Identity
) -> Result<UncheckedCert, CertError>
pub fn should_be_signed_with( self, pkey: &Ed25519Identity ) -> Result<UncheckedCert, CertError>
Declare that this should be a certificate signed with a given key.
On success, this certificate either listed the provided key, or did not list any key: in either case, we can validate it. On failure, this certificate claims to be signed with a different key.
Trait Implementations§
source§impl Clone for KeyUnknownCert
impl Clone for KeyUnknownCert
source§fn clone(&self) -> KeyUnknownCert
fn clone(&self) -> KeyUnknownCert
1.0.0 · source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source
. Read more