#trust #certificate #self-signed #trusted #ca #mozilla #root

webpki-root-certs

Mozilla trusted certificate authorities in self-signed X.509 format for use with crates other than webpki

3 releases

0.26.6 Sep 18, 2024
0.26.5 Aug 30, 2024
0.26.4 Aug 7, 2024

#679 in Cryptography

Download history 186/week @ 2024-08-06 456/week @ 2024-08-13 424/week @ 2024-08-20 1152/week @ 2024-08-27 374/week @ 2024-09-03 271/week @ 2024-09-10 932/week @ 2024-09-17 1344/week @ 2024-09-24 1036/week @ 2024-10-01 2768/week @ 2024-10-08 2309/week @ 2024-10-15 2534/week @ 2024-10-22 2263/week @ 2024-10-29

10,022 downloads per month
Used in 11 crates (3 directly)

MPL-2.0 license

660KB
164 lines

webpki-root-certs

This is a crate containing Mozilla's trusted root certificates in self-signed X.509 certificate format.

If you are using webpki or rustls you should prefer webpki-roots - it is more space efficient and easier to use.

This crate is inspired by certifi.io and uses the data provided by the Common CA Database (CCADB).

About

The webpki and rustls ecosystem represent trust anchors with the webpki::TrustAnchor type, containing only the data used as inputs for the RFC 5280 certificate path validation algorithm. In some instances (e.g. when interacting with native platform certificate verifiers) it may be required to provide trust anchors as full X.509 self-signed certificates.

Compared to webpki-roots this crate contains the full self-signed certificate DER data for each trust anchor is included in webpki_roots.

License

The underlying data is MPL-licensed, and src/lib.rs is therefore a derived work.

Regenerating sources

Sources are generated in an integration test, in tests/codegen.rs. The test will fail if the sources are out of date relative to upstream, and update src/lib.rs if so. The code is generated in deterministic order so changes to the source should only result from upstream changes.

Dependencies