Async TLS for the Tokio runtime
Go to file
2018-07-16 21:20:30 +08:00
examples Use reexported rustls deps in examples 2018-07-16 14:05:38 +02:00
src Reexport deps 2018-07-16 12:50:05 +02:00
tests Fix warnings now set_single_cert yields a Result 2018-07-15 15:02:42 +01:00
.gitignore [Added] init 2017-02-21 11:59:05 +08:00
.gitjournal.toml [Added] init 2017-02-21 11:59:05 +08:00
.travis.yml change: update tokio 2018-03-24 11:20:48 +08:00
appveyor.yml change: update tokio 2018-03-24 11:20:48 +08:00
Cargo.toml Update dependencies 2018-07-15 12:28:56 +01:00
LICENSE-APACHE [Changed] update dev dependencies 2017-05-09 12:28:32 +08:00
LICENSE-MIT [Changed] update dev dependencies 2017-05-09 12:28:32 +08:00
README.md Use reexported rustls deps in examples 2018-07-16 14:05:38 +02:00

tokio-rustls

travis-ci appveyor crates license license docs.rs

Asynchronous TLS/SSL streams for Tokio using Rustls.

Basic Structure of a Client

use webpki::DNSNameRef;
use tokio_rustls::{ClientConfigExt, rustls::ClientConfig};

// ...

let mut config = ClientConfig::new();
config.root_store.add_server_trust_anchors(&webpki_roots::TLS_SERVER_ROOTS);
let config = Arc::new(config);
let domain = DNSNameRef::try_from_ascii_str("www.rust-lang.org").unwrap();

TcpStream::connect(&addr)
	.and_then(|socket| config.connect_async(domain, socket))

// ...

Client Example Program

See examples/client. You can run it with:

cd examples/client
cargo run -- hsts.badssl.com

Currently on Windows the example client reads from stdin and writes to stdout using blocking I/O. Until this is fixed, do something this on Windows:

cd examples/client
echo | cargo run -- hsts.badssl.com

Server Example Program

See examples/server. You can run it with:

cd examples/server
cargo run -- 127.0.0.1 --cert mycert.der --key mykey.der

License & Origin

tokio-rustls is primarily distributed under the terms of both the MIT license and the Apache License (Version 2.0), with portions covered by various BSD-like licenses.

This started as a fork of tokio-tls.