Coverage Report

Created: 2025-02-25 06:39

/rust/registry/src/index.crates.io-6f17d22bba15001f/rustls-0.23.22/src/crypto/mod.rs
Line
Count
Source (jump to first uncovered line)
1
use alloc::boxed::Box;
2
use alloc::vec::Vec;
3
use core::fmt::Debug;
4
5
use pki_types::PrivateKeyDer;
6
use zeroize::Zeroize;
7
8
use crate::msgs::ffdhe_groups::FfdheGroup;
9
use crate::sign::SigningKey;
10
use crate::sync::Arc;
11
pub use crate::webpki::{
12
    verify_tls12_signature, verify_tls13_signature, verify_tls13_signature_with_raw_key,
13
    WebPkiSupportedAlgorithms,
14
};
15
#[cfg(all(doc, feature = "tls12"))]
16
use crate::Tls12CipherSuite;
17
#[cfg(doc)]
18
use crate::{
19
    client, crypto, server, sign, ClientConfig, ConfigBuilder, ServerConfig, SupportedCipherSuite,
20
    Tls13CipherSuite,
21
};
22
use crate::{suites, Error, NamedGroup, ProtocolVersion, SupportedProtocolVersion};
23
24
/// *ring* based CryptoProvider.
25
#[cfg(feature = "ring")]
26
pub mod ring;
27
28
/// aws-lc-rs-based CryptoProvider.
29
#[cfg(feature = "aws_lc_rs")]
30
pub mod aws_lc_rs;
31
32
/// TLS message encryption/decryption interfaces.
33
pub mod cipher;
34
35
/// Hashing interfaces.
36
pub mod hash;
37
38
/// HMAC interfaces.
39
pub mod hmac;
40
41
#[cfg(feature = "tls12")]
42
/// Cryptography specific to TLS1.2.
43
pub mod tls12;
44
45
/// Cryptography specific to TLS1.3.
46
pub mod tls13;
47
48
/// Hybrid public key encryption (RFC 9180).
49
pub mod hpke;
50
51
// Message signing interfaces. Re-exported under rustls::sign. Kept crate-internal here to
52
// avoid having two import paths to the same types.
53
pub(crate) mod signer;
54
55
pub use crate::msgs::handshake::KeyExchangeAlgorithm;
56
pub use crate::rand::GetRandomFailed;
57
pub use crate::suites::CipherSuiteCommon;
58
59
/// Controls core cryptography used by rustls.
60
///
61
/// This crate comes with two built-in options, provided as
62
/// `CryptoProvider` structures:
63
///
64
/// - [`crypto::aws_lc_rs::default_provider`]: (behind the `aws_lc_rs` feature,
65
///   which is enabled by default).  This provider uses the [aws-lc-rs](https://github.com/aws/aws-lc-rs)
66
///   crate.  The `fips` crate feature makes this option use FIPS140-3-approved cryptography.
67
/// - [`crypto::ring::default_provider`]: (behind the `ring` crate feature, which
68
///   is optional).  This provider uses the [*ring*](https://github.com/briansmith/ring)
69
///   crate.
70
///
71
/// This structure provides defaults. Everything in it can be overridden at
72
/// runtime by replacing field values as needed.
73
///
74
/// # Using the per-process default `CryptoProvider`
75
///
76
/// There is the concept of an implicit default provider, configured at run-time once in
77
/// a given process.
78
///
79
/// It is used for functions like [`ClientConfig::builder()`] and [`ServerConfig::builder()`].
80
///
81
/// The intention is that an application can specify the [`CryptoProvider`] they wish to use
82
/// once, and have that apply to the variety of places where their application does TLS
83
/// (which may be wrapped inside other libraries).
84
/// They should do this by calling [`CryptoProvider::install_default()`] early on.
85
///
86
/// To achieve this goal:
87
///
88
/// - _libraries_ should use [`ClientConfig::builder()`]/[`ServerConfig::builder()`]
89
///   or otherwise rely on the [`CryptoProvider::get_default()`] provider.
90
/// - _applications_ should call [`CryptoProvider::install_default()`] early
91
///   in their `fn main()`. If _applications_ uses a custom provider based on the one built-in,
92
///   they can activate the `custom-provider` feature to ensure its usage.
93
///
94
/// # Using a specific `CryptoProvider`
95
///
96
/// Supply the provider when constructing your [`ClientConfig`] or [`ServerConfig`]:
97
///
98
/// - [`ClientConfig::builder_with_provider()`]
99
/// - [`ServerConfig::builder_with_provider()`]
100
///
101
/// When creating and configuring a webpki-backed client or server certificate verifier, a choice of
102
/// provider is also needed to start the configuration process:
103
///
104
/// - [`client::WebPkiServerVerifier::builder_with_provider()`]
105
/// - [`server::WebPkiClientVerifier::builder_with_provider()`]
106
///
107
/// If you install a custom provider and want to avoid any accidental use of a built-in provider, the feature
108
/// `custom-provider` can be activated to ensure your custom provider is used everywhere
109
/// and not a built-in one. This will disable any implicit use of a built-in provider.
110
///
111
/// # Making a custom `CryptoProvider`
112
///
113
/// Your goal will be to populate a [`crypto::CryptoProvider`] struct instance.
114
///
115
/// ## Which elements are required?
116
///
117
/// There is no requirement that the individual elements (`SupportedCipherSuite`, `SupportedKxGroup`,
118
/// `SigningKey`, etc.) come from the same crate.  It is allowed and expected that uninteresting
119
/// elements would be delegated back to one of the default providers (statically) or a parent
120
/// provider (dynamically).
121
///
122
/// For example, if we want to make a provider that just overrides key loading in the config builder
123
/// API ([`ConfigBuilder::with_single_cert`] etc.), it might look like this:
124
///
125
/// ```
126
/// # #[cfg(feature = "aws_lc_rs")] {
127
/// # use std::sync::Arc;
128
/// # mod fictious_hsm_api { pub fn load_private_key(key_der: pki_types::PrivateKeyDer<'static>) -> ! { unreachable!(); } }
129
/// use rustls::crypto::aws_lc_rs;
130
///
131
/// pub fn provider() -> rustls::crypto::CryptoProvider {
132
///   rustls::crypto::CryptoProvider{
133
///     key_provider: &HsmKeyLoader,
134
///     ..aws_lc_rs::default_provider()
135
///   }
136
/// }
137
///
138
/// #[derive(Debug)]
139
/// struct HsmKeyLoader;
140
///
141
/// impl rustls::crypto::KeyProvider for HsmKeyLoader {
142
///     fn load_private_key(&self, key_der: pki_types::PrivateKeyDer<'static>) -> Result<Arc<dyn rustls::sign::SigningKey>, rustls::Error> {
143
///          fictious_hsm_api::load_private_key(key_der)
144
///     }
145
/// }
146
/// # }
147
/// ```
148
///
149
/// ## References to the individual elements
150
///
151
/// The elements are documented separately:
152
///
153
/// - **Random** - see [`crypto::SecureRandom::fill()`].
154
/// - **Cipher suites** - see [`SupportedCipherSuite`], [`Tls12CipherSuite`], and
155
///   [`Tls13CipherSuite`].
156
/// - **Key exchange groups** - see [`crypto::SupportedKxGroup`].
157
/// - **Signature verification algorithms** - see [`crypto::WebPkiSupportedAlgorithms`].
158
/// - **Authentication key loading** - see [`crypto::KeyProvider::load_private_key()`] and
159
///   [`sign::SigningKey`].
160
///
161
/// # Example code
162
///
163
/// See [provider-example/] for a full client and server example that uses
164
/// cryptography from the [rust-crypto] and [dalek-cryptography] projects.
165
///
166
/// ```shell
167
/// $ cargo run --example client | head -3
168
/// Current ciphersuite: TLS13_CHACHA20_POLY1305_SHA256
169
/// HTTP/1.1 200 OK
170
/// Content-Type: text/html; charset=utf-8
171
/// Content-Length: 19899
172
/// ```
173
///
174
/// [provider-example/]: https://github.com/rustls/rustls/tree/main/provider-example/
175
/// [rust-crypto]: https://github.com/rustcrypto
176
/// [dalek-cryptography]: https://github.com/dalek-cryptography
177
///
178
/// # FIPS-approved cryptography
179
/// The `fips` crate feature enables use of the `aws-lc-rs` crate in FIPS mode.
180
///
181
/// You can verify the configuration at runtime by checking
182
/// [`ServerConfig::fips()`]/[`ClientConfig::fips()`] return `true`.
183
#[derive(Debug, Clone)]
184
pub struct CryptoProvider {
185
    /// List of supported ciphersuites, in preference order -- the first element
186
    /// is the highest priority.
187
    ///
188
    /// The `SupportedCipherSuite` type carries both configuration and implementation.
189
    ///
190
    /// A valid `CryptoProvider` must ensure that all cipher suites are accompanied by at least
191
    /// one matching key exchange group in [`CryptoProvider::kx_groups`].
192
    pub cipher_suites: Vec<suites::SupportedCipherSuite>,
193
194
    /// List of supported key exchange groups, in preference order -- the
195
    /// first element is the highest priority.
196
    ///
197
    /// The first element in this list is the _default key share algorithm_,
198
    /// and in TLS1.3 a key share for it is sent in the client hello.
199
    ///
200
    /// The `SupportedKxGroup` type carries both configuration and implementation.
201
    pub kx_groups: Vec<&'static dyn SupportedKxGroup>,
202
203
    /// List of signature verification algorithms for use with webpki.
204
    ///
205
    /// These are used for both certificate chain verification and handshake signature verification.
206
    ///
207
    /// This is called by [`ConfigBuilder::with_root_certificates()`],
208
    /// [`server::WebPkiClientVerifier::builder_with_provider()`] and
209
    /// [`client::WebPkiServerVerifier::builder_with_provider()`].
210
    pub signature_verification_algorithms: WebPkiSupportedAlgorithms,
211
212
    /// Source of cryptographically secure random numbers.
213
    pub secure_random: &'static dyn SecureRandom,
214
215
    /// Provider for loading private [SigningKey]s from [PrivateKeyDer].
216
    pub key_provider: &'static dyn KeyProvider,
217
}
218
219
impl CryptoProvider {
220
    /// Sets this `CryptoProvider` as the default for this process.
221
    ///
222
    /// This can be called successfully at most once in any process execution.
223
    ///
224
    /// Call this early in your process to configure which provider is used for
225
    /// the provider.  The configuration should happen before any use of
226
    /// [`ClientConfig::builder()`] or [`ServerConfig::builder()`].
227
0
    pub fn install_default(self) -> Result<(), Arc<Self>> {
228
0
        static_default::install_default(self)
229
0
    }
230
231
    /// Returns the default `CryptoProvider` for this process.
232
    ///
233
    /// This will be `None` if no default has been set yet.
234
0
    pub fn get_default() -> Option<&'static Arc<Self>> {
235
0
        static_default::get_default()
236
0
    }
237
238
    /// An internal function that:
239
    ///
240
    /// - gets the pre-installed default, or
241
    /// - installs one `from_crate_features()`, or else
242
    /// - panics about the need to call [`CryptoProvider::install_default()`]
243
0
    pub(crate) fn get_default_or_install_from_crate_features() -> &'static Arc<Self> {
244
0
        if let Some(provider) = Self::get_default() {
245
0
            return provider;
246
0
        }
247
0
248
0
        let provider = Self::from_crate_features()
249
0
            .expect("no process-level CryptoProvider available -- call CryptoProvider::install_default() before this point");
250
0
        // Ignore the error resulting from us losing a race, and accept the outcome.
251
0
        let _ = provider.install_default();
252
0
        Self::get_default().unwrap()
253
0
    }
254
255
    /// Returns a provider named unambiguously by rustls crate features.
256
    ///
257
    /// This function returns `None` if the crate features are ambiguous (ie, specify two
258
    /// providers), or specify no providers, or the feature `custom-provider` is activated.
259
    /// In all cases the application should explicitly specify the provider to use
260
    /// with [`CryptoProvider::install_default`].
261
0
    fn from_crate_features() -> Option<Self> {
262
0
        #[cfg(all(
263
0
            feature = "ring",
264
0
            not(feature = "aws_lc_rs"),
265
0
            not(feature = "custom-provider")
266
0
        ))]
267
0
        {
268
0
            return Some(ring::default_provider());
269
0
        }
270
0
271
0
        #[cfg(all(
272
0
            feature = "aws_lc_rs",
273
0
            not(feature = "ring"),
274
0
            not(feature = "custom-provider")
275
0
        ))]
276
0
        {
277
0
            return Some(aws_lc_rs::default_provider());
278
0
        }
279
0
280
0
        #[allow(unreachable_code)]
281
0
        None
282
0
    }
283
284
    /// Returns `true` if this `CryptoProvider` is operating in FIPS mode.
285
    ///
286
    /// This covers only the cryptographic parts of FIPS approval.  There are
287
    /// also TLS protocol-level recommendations made by NIST.  You should
288
    /// prefer to call [`ClientConfig::fips()`] or [`ServerConfig::fips()`]
289
    /// which take these into account.
290
0
    pub fn fips(&self) -> bool {
291
0
        let Self {
292
0
            cipher_suites,
293
0
            kx_groups,
294
0
            signature_verification_algorithms,
295
0
            secure_random,
296
0
            key_provider,
297
0
        } = self;
298
0
        cipher_suites.iter().all(|cs| cs.fips())
299
0
            && kx_groups.iter().all(|kx| kx.fips())
300
0
            && signature_verification_algorithms.fips()
301
0
            && secure_random.fips()
302
0
            && key_provider.fips()
303
0
    }
304
}
305
306
/// A source of cryptographically secure randomness.
307
pub trait SecureRandom: Send + Sync + Debug {
308
    /// Fill the given buffer with random bytes.
309
    ///
310
    /// The bytes must be sourced from a cryptographically secure random number
311
    /// generator seeded with good quality, secret entropy.
312
    ///
313
    /// This is used for all randomness required by rustls, but not necessarily
314
    /// randomness required by the underlying cryptography library.  For example:
315
    /// [`SupportedKxGroup::start()`] requires random material to generate
316
    /// an ephemeral key exchange key, but this is not included in the interface with
317
    /// rustls: it is assumed that the cryptography library provides for this itself.
318
    fn fill(&self, buf: &mut [u8]) -> Result<(), GetRandomFailed>;
319
320
    /// Return `true` if this is backed by a FIPS-approved implementation.
321
0
    fn fips(&self) -> bool {
322
0
        false
323
0
    }
324
}
325
326
/// A mechanism for loading private [SigningKey]s from [PrivateKeyDer].
327
///
328
/// This trait is intended to be used with private key material that is sourced from DER,
329
/// such as a private-key that may be present on-disk. It is not intended to be used with
330
/// keys held in hardware security modules (HSMs) or physical tokens. For these use-cases
331
/// see the Rustls manual section on [customizing private key usage].
332
///
333
/// [customizing private key usage]: <https://docs.rs/rustls/latest/rustls/manual/_03_howto/index.html#customising-private-key-usage>
334
pub trait KeyProvider: Send + Sync + Debug {
335
    /// Decode and validate a private signing key from `key_der`.
336
    ///
337
    /// This is used by [`ConfigBuilder::with_client_auth_cert()`], [`ConfigBuilder::with_single_cert()`],
338
    /// and [`ConfigBuilder::with_single_cert_with_ocsp()`].  The key types and formats supported by this
339
    /// function directly defines the key types and formats supported in those APIs.
340
    ///
341
    /// Return an error if the key type encoding is not supported, or if the key fails validation.
342
    fn load_private_key(
343
        &self,
344
        key_der: PrivateKeyDer<'static>,
345
    ) -> Result<Arc<dyn SigningKey>, Error>;
346
347
    /// Return `true` if this is backed by a FIPS-approved implementation.
348
    ///
349
    /// If this returns `true`, that must be the case for all possible key types
350
    /// supported by [`KeyProvider::load_private_key()`].
351
0
    fn fips(&self) -> bool {
352
0
        false
353
0
    }
354
}
355
356
/// A supported key exchange group.
357
///
358
/// This type carries both configuration and implementation. Specifically,
359
/// it has a TLS-level name expressed using the [`NamedGroup`] enum, and
360
/// a function which produces a [`ActiveKeyExchange`].
361
///
362
/// Compare with [`NamedGroup`], which carries solely a protocol identifier.
363
pub trait SupportedKxGroup: Send + Sync + Debug {
364
    /// Start a key exchange.
365
    ///
366
    /// This will prepare an ephemeral secret key in the supported group, and a corresponding
367
    /// public key. The key exchange can be completed by calling [ActiveKeyExchange#complete]
368
    /// or discarded.
369
    ///
370
    /// # Errors
371
    ///
372
    /// This can fail if the random source fails during ephemeral key generation.
373
    fn start(&self) -> Result<Box<dyn ActiveKeyExchange>, Error>;
374
375
    /// Start and complete a key exchange, in one operation.
376
    ///
377
    /// The default implementation for this calls `start()` and then calls
378
    /// `complete()` on the result.  This is suitable for Diffie-Hellman-like
379
    /// key exchange algorithms, where there is not a data dependency between
380
    /// our key share (named "pub_key" in this API) and the peer's (`peer_pub_key`).
381
    ///
382
    /// If there is such a data dependency (like key encapsulation mechanisms), this
383
    /// function should be implemented.
384
0
    fn start_and_complete(&self, peer_pub_key: &[u8]) -> Result<CompletedKeyExchange, Error> {
385
0
        let kx = self.start()?;
386
387
        Ok(CompletedKeyExchange {
388
0
            group: kx.group(),
389
0
            pub_key: kx.pub_key().to_vec(),
390
0
            secret: kx.complete(peer_pub_key)?,
391
        })
392
0
    }
393
394
    /// FFDHE group the `SupportedKxGroup` operates in.
395
    ///
396
    /// Return `None` if this group is not a FFDHE one.
397
    ///
398
    /// The default implementation calls `FfdheGroup::from_named_group`: this function
399
    /// is extremely linker-unfriendly so it is recommended all key exchange implementers
400
    /// provide this function.
401
    ///
402
    /// `rustls::ffdhe_groups` contains suitable values to return from this,
403
    /// for example [`rustls::ffdhe_groups::FFDHE2048`][crate::ffdhe_groups::FFDHE2048].
404
0
    fn ffdhe_group(&self) -> Option<FfdheGroup<'static>> {
405
0
        #[allow(deprecated)]
406
0
        FfdheGroup::from_named_group(self.name())
407
0
    }
408
409
    /// Named group the SupportedKxGroup operates in.
410
    ///
411
    /// If the `NamedGroup` enum does not have a name for the algorithm you are implementing,
412
    /// you can use [`NamedGroup::Unknown`].
413
    fn name(&self) -> NamedGroup;
414
415
    /// Return `true` if this is backed by a FIPS-approved implementation.
416
0
    fn fips(&self) -> bool {
417
0
        false
418
0
    }
419
420
    /// Return `true` if this should be offered/selected with the given version.
421
    ///
422
    /// The default implementation returns true for all versions.
423
0
    fn usable_for_version(&self, _version: ProtocolVersion) -> bool {
424
0
        true
425
0
    }
426
}
427
428
/// An in-progress key exchange originating from a [`SupportedKxGroup`].
429
pub trait ActiveKeyExchange: Send + Sync {
430
    /// Completes the key exchange, given the peer's public key.
431
    ///
432
    /// This method must return an error if `peer_pub_key` is invalid: either
433
    /// mis-encoded, or an invalid public key (such as, but not limited to, being
434
    /// in a small order subgroup).
435
    ///
436
    /// If the key exchange algorithm is FFDHE, the result must be left-padded with zeros,
437
    /// as required by [RFC 8446](https://www.rfc-editor.org/rfc/rfc8446#section-7.4.1)
438
    /// (see [`complete_for_tls_version()`](Self::complete_for_tls_version) for more details).
439
    ///
440
    /// The shared secret is returned as a [`SharedSecret`] which can be constructed
441
    /// from a `&[u8]`.
442
    ///
443
    /// This consumes and so terminates the [`ActiveKeyExchange`].
444
    fn complete(self: Box<Self>, peer_pub_key: &[u8]) -> Result<SharedSecret, Error>;
445
446
    /// Completes the key exchange for the given TLS version, given the peer's public key.
447
    ///
448
    /// Note that finite-field Diffie–Hellman key exchange has different requirements for the derived
449
    /// shared secret in TLS 1.2 and TLS 1.3 (ECDHE key exchange is the same in TLS 1.2 and TLS 1.3):
450
    ///
451
    /// In TLS 1.2, the calculated secret is required to be stripped of leading zeros
452
    /// [(RFC 5246)](https://www.rfc-editor.org/rfc/rfc5246#section-8.1.2).
453
    ///
454
    /// In TLS 1.3, the calculated secret is required to be padded with leading zeros to be the same
455
    /// byte-length as the group modulus [(RFC 8446)](https://www.rfc-editor.org/rfc/rfc8446#section-7.4.1).
456
    ///
457
    /// The default implementation of this method delegates to [`complete()`](Self::complete) assuming it is
458
    /// implemented for TLS 1.3 (i.e., for FFDHE KX, removes padding as needed). Implementers of this trait
459
    /// are encouraged to just implement [`complete()`](Self::complete) assuming TLS 1.3, and let the default
460
    /// implementation of this method handle TLS 1.2-specific requirements.
461
    ///
462
    /// This method must return an error if `peer_pub_key` is invalid: either
463
    /// mis-encoded, or an invalid public key (such as, but not limited to, being
464
    /// in a small order subgroup).
465
    ///
466
    /// The shared secret is returned as a [`SharedSecret`] which can be constructed
467
    /// from a `&[u8]`.
468
    ///
469
    /// This consumes and so terminates the [`ActiveKeyExchange`].
470
0
    fn complete_for_tls_version(
471
0
        self: Box<Self>,
472
0
        peer_pub_key: &[u8],
473
0
        tls_version: &SupportedProtocolVersion,
474
0
    ) -> Result<SharedSecret, Error> {
475
0
        if tls_version.version != ProtocolVersion::TLSv1_2 {
476
0
            return self.complete(peer_pub_key);
477
0
        }
478
0
479
0
        let group = self.group();
480
0
        let mut complete_res = self.complete(peer_pub_key)?;
481
0
        if group.key_exchange_algorithm() == KeyExchangeAlgorithm::DHE {
482
0
            complete_res.strip_leading_zeros();
483
0
        }
484
0
        Ok(complete_res)
485
0
    }
486
487
    /// For hybrid key exchanges, returns the [`NamedGroup`] and key share
488
    /// for the classical half of this key exchange.
489
    ///
490
    /// There is no requirement for a hybrid scheme (or any other!) to implement
491
    /// `hybrid_component()`. It only enables an optimization; described below.
492
    ///
493
    /// "Hybrid" means a key exchange algorithm which is constructed from two
494
    /// (or more) independent component algorithms. Usually one is post-quantum-secure,
495
    /// and the other is "classical".  See
496
    /// <https://datatracker.ietf.org/doc/draft-ietf-tls-hybrid-design/11/>
497
    ///
498
    /// # Background
499
    /// Rustls always sends a presumptive key share in its `ClientHello`, using
500
    /// (absent any other information) the first item in [`CryptoProvider::kx_groups`].
501
    /// If the server accepts the client's selection, it can complete the handshake
502
    /// using that key share.  If not, the server sends a `HelloRetryRequest` instructing
503
    /// the client to send a different key share instead.
504
    ///
505
    /// This request costs an extra round trip, and wastes the key exchange computation
506
    /// (in [`SupportedKxGroup::start()`]) the client already did.  We would
507
    /// like to avoid those wastes if possible.
508
    ///
509
    /// It is early days for post-quantum-secure hybrid key exchange deployment.
510
    /// This means (commonly) continuing to offer both the hybrid and classical
511
    /// key exchanges, so the handshake can be completed without a `HelloRetryRequest`
512
    /// for servers that support the offered hybrid or classical schemes.
513
    ///
514
    /// Implementing `hybrid_component()` enables two optimizations:
515
    ///
516
    /// 1. Sending both the hybrid and classical key shares in the `ClientHello`.
517
    ///
518
    /// 2. Performing the classical key exchange setup only once.  This is important
519
    ///    because the classical key exchange setup is relatively expensive.
520
    ///    This optimization is permitted and described in
521
    ///    <https://www.ietf.org/archive/id/draft-ietf-tls-hybrid-design-11.html#section-3.2>
522
    ///
523
    /// Both of these only happen if the classical algorithm appears separately in
524
    /// the client's [`CryptoProvider::kx_groups`], and if the hybrid algorithm appears
525
    /// first in that list.
526
    ///
527
    /// # How it works
528
    /// This function is only called by rustls for clients.  It is called when
529
    /// constructing the initial `ClientHello`.  rustls follows these steps:
530
    ///
531
    /// 1. If the return value is `None`, nothing further happens.
532
    /// 2. If the given [`NamedGroup`] does not appear in
533
    ///    [`CryptoProvider::kx_groups`], nothing further happens.
534
    /// 3. The given key share is added to the `ClientHello`, after the hybrid entry.
535
    ///
536
    /// Then, one of three things may happen when the server replies to the `ClientHello`:
537
    ///
538
    /// 1. The server sends a `HelloRetryRequest`.  Everything is thrown away and
539
    ///    we start again.
540
    /// 2. The server agrees to our hybrid key exchange: rustls calls
541
    ///    [`ActiveKeyExchange::complete()`] consuming `self`.
542
    /// 3. The server agrees to our classical key exchange: rustls calls
543
    ///    [`ActiveKeyExchange::complete_hybrid_component()`] which
544
    ///    discards the hybrid key data, and completes just the classical key exchange.
545
0
    fn hybrid_component(&self) -> Option<(NamedGroup, &[u8])> {
546
0
        None
547
0
    }
548
549
    /// Completes the classical component of the key exchange, given the peer's public key.
550
    ///
551
    /// This is only called if `hybrid_component` returns `Some(_)`.
552
    ///
553
    /// This method must return an error if `peer_pub_key` is invalid: either
554
    /// mis-encoded, or an invalid public key (such as, but not limited to, being
555
    /// in a small order subgroup).
556
    ///
557
    /// The shared secret is returned as a [`SharedSecret`] which can be constructed
558
    /// from a `&[u8]`.
559
    ///
560
    /// See the documentation on [`Self::hybrid_component()`] for explanation.
561
0
    fn complete_hybrid_component(
562
0
        self: Box<Self>,
563
0
        _peer_pub_key: &[u8],
564
0
    ) -> Result<SharedSecret, Error> {
565
0
        unreachable!("only called if `hybrid_component()` implemented")
566
    }
567
568
    /// Return the public key being used.
569
    ///
570
    /// For ECDHE, the encoding required is defined in
571
    /// [RFC8446 section 4.2.8.2](https://www.rfc-editor.org/rfc/rfc8446#section-4.2.8.2).
572
    ///
573
    /// For FFDHE, the encoding required is defined in
574
    /// [RFC8446 section 4.2.8.1](https://www.rfc-editor.org/rfc/rfc8446#section-4.2.8.1).
575
    fn pub_key(&self) -> &[u8];
576
577
    /// FFDHE group the `ActiveKeyExchange` is operating in.
578
    ///
579
    /// Return `None` if this group is not a FFDHE one.
580
    ///
581
    /// The default implementation calls `FfdheGroup::from_named_group`: this function
582
    /// is extremely linker-unfriendly so it is recommended all key exchange implementers
583
    /// provide this function.
584
    ///
585
    /// `rustls::ffdhe_groups` contains suitable values to return from this,
586
    /// for example [`rustls::ffdhe_groups::FFDHE2048`][crate::ffdhe_groups::FFDHE2048].
587
0
    fn ffdhe_group(&self) -> Option<FfdheGroup<'static>> {
588
0
        #[allow(deprecated)]
589
0
        FfdheGroup::from_named_group(self.group())
590
0
    }
591
592
    /// Return the group being used.
593
    fn group(&self) -> NamedGroup;
594
}
595
596
/// The result from [`SupportedKxGroup::start_and_complete()`].
597
pub struct CompletedKeyExchange {
598
    /// Which group was used.
599
    pub group: NamedGroup,
600
601
    /// Our key share (sometimes a public key).
602
    pub pub_key: Vec<u8>,
603
604
    /// The computed shared secret.
605
    pub secret: SharedSecret,
606
}
607
608
/// The result from [`ActiveKeyExchange::complete`] or [`ActiveKeyExchange::complete_hybrid_component`].
609
pub struct SharedSecret {
610
    buf: Vec<u8>,
611
    offset: usize,
612
}
613
614
impl SharedSecret {
615
    /// Returns the shared secret as a slice of bytes.
616
0
    pub fn secret_bytes(&self) -> &[u8] {
617
0
        &self.buf[self.offset..]
618
0
    }
619
620
    /// Removes leading zeros from `secret_bytes()` by adjusting the `offset`.
621
    ///
622
    /// This function does not re-allocate.
623
0
    fn strip_leading_zeros(&mut self) {
624
0
        let start = self
625
0
            .secret_bytes()
626
0
            .iter()
627
0
            .enumerate()
628
0
            .find(|(_i, x)| **x != 0)
629
0
            .map(|(i, _x)| i)
630
0
            .unwrap_or(self.secret_bytes().len());
631
0
        self.offset += start;
632
0
    }
633
}
634
635
impl Drop for SharedSecret {
636
0
    fn drop(&mut self) {
637
0
        self.buf.zeroize();
638
0
    }
639
}
640
641
impl From<&[u8]> for SharedSecret {
642
0
    fn from(source: &[u8]) -> Self {
643
0
        Self {
644
0
            buf: source.to_vec(),
645
0
            offset: 0,
646
0
        }
647
0
    }
648
}
649
650
impl From<Vec<u8>> for SharedSecret {
651
0
    fn from(buf: Vec<u8>) -> Self {
652
0
        Self { buf, offset: 0 }
653
0
    }
654
}
655
656
/// This function returns a [`CryptoProvider`] that uses
657
/// FIPS140-3-approved cryptography.
658
///
659
/// Using this function expresses in your code that you require
660
/// FIPS-approved cryptography, and will not compile if you make
661
/// a mistake with cargo features.
662
///
663
/// See our [FIPS documentation](crate::manual::_06_fips) for
664
/// more detail.
665
///
666
/// Install this as the process-default provider, like:
667
///
668
/// ```rust
669
/// # #[cfg(feature = "fips")] {
670
/// rustls::crypto::default_fips_provider().install_default()
671
///     .expect("default provider already set elsewhere");
672
/// # }
673
/// ```
674
///
675
/// You can also use this explicitly, like:
676
///
677
/// ```rust
678
/// # #[cfg(feature = "fips")] {
679
/// # let root_store = rustls::RootCertStore::empty();
680
/// let config = rustls::ClientConfig::builder_with_provider(
681
///         rustls::crypto::default_fips_provider().into()
682
///     )
683
///     .with_safe_default_protocol_versions()
684
///     .unwrap()
685
///     .with_root_certificates(root_store)
686
///     .with_no_client_auth();
687
/// # }
688
/// ```
689
#[cfg(all(feature = "aws_lc_rs", any(feature = "fips", docsrs)))]
690
#[cfg_attr(docsrs, doc(cfg(feature = "fips")))]
691
pub fn default_fips_provider() -> CryptoProvider {
692
    aws_lc_rs::default_provider()
693
}
694
695
mod static_default {
696
    #[cfg(not(feature = "std"))]
697
    use alloc::boxed::Box;
698
    #[cfg(feature = "std")]
699
    use std::sync::OnceLock;
700
701
    #[cfg(not(feature = "std"))]
702
    use once_cell::race::OnceBox;
703
704
    use super::CryptoProvider;
705
    use crate::sync::Arc;
706
707
    #[cfg(feature = "std")]
708
0
    pub(crate) fn install_default(
709
0
        default_provider: CryptoProvider,
710
0
    ) -> Result<(), Arc<CryptoProvider>> {
711
0
        PROCESS_DEFAULT_PROVIDER.set(Arc::new(default_provider))
712
0
    }
713
714
    #[cfg(not(feature = "std"))]
715
    pub(crate) fn install_default(
716
        default_provider: CryptoProvider,
717
    ) -> Result<(), Arc<CryptoProvider>> {
718
        PROCESS_DEFAULT_PROVIDER
719
            .set(Box::new(Arc::new(default_provider)))
720
            .map_err(|e| *e)
721
    }
722
723
0
    pub(crate) fn get_default() -> Option<&'static Arc<CryptoProvider>> {
724
0
        PROCESS_DEFAULT_PROVIDER.get()
725
0
    }
726
727
    #[cfg(feature = "std")]
728
    static PROCESS_DEFAULT_PROVIDER: OnceLock<Arc<CryptoProvider>> = OnceLock::new();
729
    #[cfg(not(feature = "std"))]
730
    static PROCESS_DEFAULT_PROVIDER: OnceBox<Arc<CryptoProvider>> = OnceBox::new();
731
}
732
733
#[cfg(test)]
734
mod tests {
735
    use std::vec;
736
737
    use super::SharedSecret;
738
739
    #[test]
740
    fn test_shared_secret_strip_leading_zeros() {
741
        let test_cases = [
742
            (vec![0, 1], vec![1]),
743
            (vec![1], vec![1]),
744
            (vec![1, 0, 2], vec![1, 0, 2]),
745
            (vec![0, 0, 1, 2], vec![1, 2]),
746
            (vec![0, 0, 0], vec![]),
747
            (vec![], vec![]),
748
        ];
749
        for (buf, expected) in test_cases {
750
            let mut secret = SharedSecret::from(&buf[..]);
751
            assert_eq!(secret.secret_bytes(), buf);
752
            secret.strip_leading_zeros();
753
            assert_eq!(secret.secret_bytes(), expected);
754
        }
755
    }
756
}