Coverage Report

Created: 2026-01-30 06:08

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/rust/registry/src/index.crates.io-1949cf8c6b5b557f/rustls-0.23.35/src/common_state.rs
Line
Count
Source
1
use alloc::boxed::Box;
2
use alloc::vec::Vec;
3
4
use pki_types::CertificateDer;
5
6
use crate::conn::kernel::KernelState;
7
use crate::crypto::SupportedKxGroup;
8
use crate::enums::{AlertDescription, ContentType, HandshakeType, ProtocolVersion};
9
use crate::error::{Error, InvalidMessage, PeerMisbehaved};
10
use crate::hash_hs::HandshakeHash;
11
use crate::log::{debug, error, warn};
12
use crate::msgs::alert::AlertMessagePayload;
13
use crate::msgs::base::Payload;
14
use crate::msgs::codec::Codec;
15
use crate::msgs::enums::{AlertLevel, KeyUpdateRequest};
16
use crate::msgs::fragmenter::MessageFragmenter;
17
use crate::msgs::handshake::{CertificateChain, HandshakeMessagePayload, ProtocolName};
18
use crate::msgs::message::{
19
    Message, MessagePayload, OutboundChunks, OutboundOpaqueMessage, OutboundPlainMessage,
20
    PlainMessage,
21
};
22
use crate::record_layer::PreEncryptAction;
23
use crate::suites::{PartiallyExtractedSecrets, SupportedCipherSuite};
24
#[cfg(feature = "tls12")]
25
use crate::tls12::ConnectionSecrets;
26
use crate::unbuffered::{EncryptError, InsufficientSizeError};
27
use crate::vecbuf::ChunkVecBuffer;
28
use crate::{quic, record_layer};
29
30
/// Connection state common to both client and server connections.
31
pub struct CommonState {
32
    pub(crate) negotiated_version: Option<ProtocolVersion>,
33
    pub(crate) handshake_kind: Option<HandshakeKind>,
34
    pub(crate) side: Side,
35
    pub(crate) record_layer: record_layer::RecordLayer,
36
    pub(crate) suite: Option<SupportedCipherSuite>,
37
    pub(crate) kx_state: KxState,
38
    pub(crate) alpn_protocol: Option<ProtocolName>,
39
    pub(crate) aligned_handshake: bool,
40
    pub(crate) may_send_application_data: bool,
41
    pub(crate) may_receive_application_data: bool,
42
    pub(crate) early_traffic: bool,
43
    sent_fatal_alert: bool,
44
    /// If we signaled end of stream.
45
    pub(crate) has_sent_close_notify: bool,
46
    /// If the peer has signaled end of stream.
47
    pub(crate) has_received_close_notify: bool,
48
    #[cfg(feature = "std")]
49
    pub(crate) has_seen_eof: bool,
50
    pub(crate) peer_certificates: Option<CertificateChain<'static>>,
51
    message_fragmenter: MessageFragmenter,
52
    pub(crate) received_plaintext: ChunkVecBuffer,
53
    pub(crate) sendable_tls: ChunkVecBuffer,
54
    queued_key_update_message: Option<Vec<u8>>,
55
56
    /// Protocol whose key schedule should be used. Unused for TLS < 1.3.
57
    pub(crate) protocol: Protocol,
58
    pub(crate) quic: quic::Quic,
59
    pub(crate) enable_secret_extraction: bool,
60
    temper_counters: TemperCounters,
61
    pub(crate) refresh_traffic_keys_pending: bool,
62
    pub(crate) fips: bool,
63
    pub(crate) tls13_tickets_received: u32,
64
}
65
66
impl CommonState {
67
0
    pub(crate) fn new(side: Side) -> Self {
68
0
        Self {
69
0
            negotiated_version: None,
70
0
            handshake_kind: None,
71
0
            side,
72
0
            record_layer: record_layer::RecordLayer::new(),
73
0
            suite: None,
74
0
            kx_state: KxState::default(),
75
0
            alpn_protocol: None,
76
0
            aligned_handshake: true,
77
0
            may_send_application_data: false,
78
0
            may_receive_application_data: false,
79
0
            early_traffic: false,
80
0
            sent_fatal_alert: false,
81
0
            has_sent_close_notify: false,
82
0
            has_received_close_notify: false,
83
0
            #[cfg(feature = "std")]
84
0
            has_seen_eof: false,
85
0
            peer_certificates: None,
86
0
            message_fragmenter: MessageFragmenter::default(),
87
0
            received_plaintext: ChunkVecBuffer::new(Some(DEFAULT_RECEIVED_PLAINTEXT_LIMIT)),
88
0
            sendable_tls: ChunkVecBuffer::new(Some(DEFAULT_BUFFER_LIMIT)),
89
0
            queued_key_update_message: None,
90
0
            protocol: Protocol::Tcp,
91
0
            quic: quic::Quic::default(),
92
0
            enable_secret_extraction: false,
93
0
            temper_counters: TemperCounters::default(),
94
0
            refresh_traffic_keys_pending: false,
95
0
            fips: false,
96
0
            tls13_tickets_received: 0,
97
0
        }
98
0
    }
99
100
    /// Returns true if the caller should call [`Connection::write_tls`] as soon as possible.
101
    ///
102
    /// [`Connection::write_tls`]: crate::Connection::write_tls
103
0
    pub fn wants_write(&self) -> bool {
104
0
        !self.sendable_tls.is_empty()
105
0
    }
106
107
    /// Returns true if the connection is currently performing the TLS handshake.
108
    ///
109
    /// During this time plaintext written to the connection is buffered in memory. After
110
    /// [`Connection::process_new_packets()`] has been called, this might start to return `false`
111
    /// while the final handshake packets still need to be extracted from the connection's buffers.
112
    ///
113
    /// [`Connection::process_new_packets()`]: crate::Connection::process_new_packets
114
0
    pub fn is_handshaking(&self) -> bool {
115
0
        !(self.may_send_application_data && self.may_receive_application_data)
116
0
    }
117
118
    /// Retrieves the certificate chain or the raw public key used by the peer to authenticate.
119
    ///
120
    /// The order of the certificate chain is as it appears in the TLS
121
    /// protocol: the first certificate relates to the peer, the
122
    /// second certifies the first, the third certifies the second, and
123
    /// so on.
124
    ///
125
    /// When using raw public keys, the first and only element is the raw public key.
126
    ///
127
    /// This is made available for both full and resumed handshakes.
128
    ///
129
    /// For clients, this is the certificate chain or the raw public key of the server.
130
    ///
131
    /// For servers, this is the certificate chain or the raw public key of the client,
132
    /// if client authentication was completed.
133
    ///
134
    /// The return value is None until this value is available.
135
    ///
136
    /// Note: the return type of the 'certificate', when using raw public keys is `CertificateDer<'static>`
137
    /// even though this should technically be a `SubjectPublicKeyInfoDer<'static>`.
138
    /// This choice simplifies the API and ensures backwards compatibility.
139
0
    pub fn peer_certificates(&self) -> Option<&[CertificateDer<'static>]> {
140
0
        self.peer_certificates.as_deref()
141
0
    }
142
143
    /// Retrieves the protocol agreed with the peer via ALPN.
144
    ///
145
    /// A return value of `None` after handshake completion
146
    /// means no protocol was agreed (because no protocols
147
    /// were offered or accepted by the peer).
148
0
    pub fn alpn_protocol(&self) -> Option<&[u8]> {
149
0
        self.get_alpn_protocol()
150
0
    }
151
152
    /// Retrieves the ciphersuite agreed with the peer.
153
    ///
154
    /// This returns None until the ciphersuite is agreed.
155
0
    pub fn negotiated_cipher_suite(&self) -> Option<SupportedCipherSuite> {
156
0
        self.suite
157
0
    }
158
159
    /// Retrieves the key exchange group agreed with the peer.
160
    ///
161
    /// This function may return `None` depending on the state of the connection,
162
    /// the type of handshake, and the protocol version.
163
    ///
164
    /// If [`CommonState::is_handshaking()`] is true this function will return `None`.
165
    /// Similarly, if the [`CommonState::handshake_kind()`] is [`HandshakeKind::Resumed`]
166
    /// and the [`CommonState::protocol_version()`] is TLS 1.2, then no key exchange will have
167
    /// occurred and this function will return `None`.
168
0
    pub fn negotiated_key_exchange_group(&self) -> Option<&'static dyn SupportedKxGroup> {
169
0
        match self.kx_state {
170
0
            KxState::Complete(group) => Some(group),
171
0
            _ => None,
172
        }
173
0
    }
174
175
    /// Retrieves the protocol version agreed with the peer.
176
    ///
177
    /// This returns `None` until the version is agreed.
178
0
    pub fn protocol_version(&self) -> Option<ProtocolVersion> {
179
0
        self.negotiated_version
180
0
    }
181
182
    /// Which kind of handshake was performed.
183
    ///
184
    /// This tells you whether the handshake was a resumption or not.
185
    ///
186
    /// This will return `None` before it is known which sort of
187
    /// handshake occurred.
188
0
    pub fn handshake_kind(&self) -> Option<HandshakeKind> {
189
0
        self.handshake_kind
190
0
    }
191
192
0
    pub(crate) fn is_tls13(&self) -> bool {
193
0
        matches!(self.negotiated_version, Some(ProtocolVersion::TLSv1_3))
194
0
    }
195
196
0
    pub(crate) fn process_main_protocol<Data>(
197
0
        &mut self,
198
0
        msg: Message<'_>,
199
0
        mut state: Box<dyn State<Data>>,
200
0
        data: &mut Data,
201
0
        sendable_plaintext: Option<&mut ChunkVecBuffer>,
202
0
    ) -> Result<Box<dyn State<Data>>, Error> {
203
        // For TLS1.2, outside of the handshake, send rejection alerts for
204
        // renegotiation requests.  These can occur any time.
205
0
        if self.may_receive_application_data && !self.is_tls13() {
206
0
            let reject_ty = match self.side {
207
0
                Side::Client => HandshakeType::HelloRequest,
208
0
                Side::Server => HandshakeType::ClientHello,
209
            };
210
0
            if msg.is_handshake_type(reject_ty) {
211
0
                self.temper_counters
212
0
                    .received_renegotiation_request()?;
213
0
                self.send_warning_alert(AlertDescription::NoRenegotiation);
214
0
                return Ok(state);
215
0
            }
216
0
        }
217
218
0
        let mut cx = Context {
219
0
            common: self,
220
0
            data,
221
0
            sendable_plaintext,
222
0
        };
223
0
        match state.handle(&mut cx, msg) {
224
0
            Ok(next) => {
225
0
                state = next.into_owned();
226
0
                Ok(state)
227
            }
228
0
            Err(e @ Error::InappropriateMessage { .. })
229
0
            | Err(e @ Error::InappropriateHandshakeMessage { .. }) => {
230
0
                Err(self.send_fatal_alert(AlertDescription::UnexpectedMessage, e))
231
            }
232
0
            Err(e) => Err(e),
233
        }
234
0
    }
Unexecuted instantiation: <rustls::common_state::CommonState>::process_main_protocol::<rustls::client::client_conn::ClientConnectionData>
Unexecuted instantiation: <rustls::common_state::CommonState>::process_main_protocol::<rustls::server::server_conn::ServerConnectionData>
235
236
0
    pub(crate) fn write_plaintext(
237
0
        &mut self,
238
0
        payload: OutboundChunks<'_>,
239
0
        outgoing_tls: &mut [u8],
240
0
    ) -> Result<usize, EncryptError> {
241
0
        if payload.is_empty() {
242
0
            return Ok(0);
243
0
        }
244
245
0
        let fragments = self
246
0
            .message_fragmenter
247
0
            .fragment_payload(
248
0
                ContentType::ApplicationData,
249
0
                ProtocolVersion::TLSv1_2,
250
0
                payload.clone(),
251
            );
252
253
0
        for f in 0..fragments.len() {
254
0
            match self
255
0
                .record_layer
256
0
                .pre_encrypt_action(f as u64)
257
            {
258
0
                PreEncryptAction::Nothing => {}
259
0
                PreEncryptAction::RefreshOrClose => match self.negotiated_version {
260
0
                    Some(ProtocolVersion::TLSv1_3) => {
261
0
                        // driven by caller, as we don't have the `State` here
262
0
                        self.refresh_traffic_keys_pending = true;
263
0
                    }
264
                    _ => {
265
0
                        error!(
266
                            "traffic keys exhausted, closing connection to prevent security failure"
267
                        );
268
0
                        self.send_close_notify();
269
0
                        return Err(EncryptError::EncryptExhausted);
270
                    }
271
                },
272
                PreEncryptAction::Refuse => {
273
0
                    return Err(EncryptError::EncryptExhausted);
274
                }
275
            }
276
        }
277
278
0
        self.perhaps_write_key_update();
279
280
0
        self.check_required_size(outgoing_tls, fragments)?;
281
282
0
        let fragments = self
283
0
            .message_fragmenter
284
0
            .fragment_payload(
285
0
                ContentType::ApplicationData,
286
0
                ProtocolVersion::TLSv1_2,
287
0
                payload,
288
            );
289
290
0
        Ok(self.write_fragments(outgoing_tls, fragments))
291
0
    }
292
293
    // Changing the keys must not span any fragmented handshake
294
    // messages.  Otherwise the defragmented messages will have
295
    // been protected with two different record layer protections,
296
    // which is illegal.  Not mentioned in RFC.
297
0
    pub(crate) fn check_aligned_handshake(&mut self) -> Result<(), Error> {
298
0
        if !self.aligned_handshake {
299
0
            Err(self.send_fatal_alert(
300
0
                AlertDescription::UnexpectedMessage,
301
0
                PeerMisbehaved::KeyEpochWithPendingFragment,
302
0
            ))
303
        } else {
304
0
            Ok(())
305
        }
306
0
    }
307
308
    /// Fragment `m`, encrypt the fragments, and then queue
309
    /// the encrypted fragments for sending.
310
0
    pub(crate) fn send_msg_encrypt(&mut self, m: PlainMessage) {
311
0
        let iter = self
312
0
            .message_fragmenter
313
0
            .fragment_message(&m);
314
0
        for m in iter {
315
0
            self.send_single_fragment(m);
316
0
        }
317
0
    }
318
319
    /// Like send_msg_encrypt, but operate on an appdata directly.
320
0
    fn send_appdata_encrypt(&mut self, payload: OutboundChunks<'_>, limit: Limit) -> usize {
321
        // Here, the limit on sendable_tls applies to encrypted data,
322
        // but we're respecting it for plaintext data -- so we'll
323
        // be out by whatever the cipher+record overhead is.  That's a
324
        // constant and predictable amount, so it's not a terrible issue.
325
0
        let len = match limit {
326
            #[cfg(feature = "std")]
327
0
            Limit::Yes => self
328
0
                .sendable_tls
329
0
                .apply_limit(payload.len()),
330
0
            Limit::No => payload.len(),
331
        };
332
333
0
        let iter = self
334
0
            .message_fragmenter
335
0
            .fragment_payload(
336
0
                ContentType::ApplicationData,
337
0
                ProtocolVersion::TLSv1_2,
338
0
                payload.split_at(len).0,
339
            );
340
0
        for m in iter {
341
0
            self.send_single_fragment(m);
342
0
        }
343
344
0
        len
345
0
    }
346
347
0
    fn send_single_fragment(&mut self, m: OutboundPlainMessage<'_>) {
348
0
        if m.typ == ContentType::Alert {
349
            // Alerts are always sendable -- never quashed by a PreEncryptAction.
350
0
            let em = self.record_layer.encrypt_outgoing(m);
351
0
            self.queue_tls_message(em);
352
0
            return;
353
0
        }
354
355
0
        match self
356
0
            .record_layer
357
0
            .next_pre_encrypt_action()
358
        {
359
0
            PreEncryptAction::Nothing => {}
360
361
            // Close connection once we start to run out of
362
            // sequence space.
363
            PreEncryptAction::RefreshOrClose => {
364
0
                match self.negotiated_version {
365
0
                    Some(ProtocolVersion::TLSv1_3) => {
366
0
                        // driven by caller, as we don't have the `State` here
367
0
                        self.refresh_traffic_keys_pending = true;
368
0
                    }
369
                    _ => {
370
0
                        error!(
371
                            "traffic keys exhausted, closing connection to prevent security failure"
372
                        );
373
0
                        self.send_close_notify();
374
0
                        return;
375
                    }
376
                }
377
            }
378
379
            // Refuse to wrap counter at all costs.  This
380
            // is basically untestable unfortunately.
381
            PreEncryptAction::Refuse => {
382
0
                return;
383
            }
384
        };
385
386
0
        let em = self.record_layer.encrypt_outgoing(m);
387
0
        self.queue_tls_message(em);
388
0
    }
389
390
0
    fn send_plain_non_buffering(&mut self, payload: OutboundChunks<'_>, limit: Limit) -> usize {
391
0
        debug_assert!(self.may_send_application_data);
392
0
        debug_assert!(self.record_layer.is_encrypting());
393
394
0
        if payload.is_empty() {
395
            // Don't send empty fragments.
396
0
            return 0;
397
0
        }
398
399
0
        self.send_appdata_encrypt(payload, limit)
400
0
    }
401
402
    /// Mark the connection as ready to send application data.
403
    ///
404
    /// Also flush `sendable_plaintext` if it is `Some`.
405
0
    pub(crate) fn start_outgoing_traffic(
406
0
        &mut self,
407
0
        sendable_plaintext: &mut Option<&mut ChunkVecBuffer>,
408
0
    ) {
409
0
        self.may_send_application_data = true;
410
0
        if let Some(sendable_plaintext) = sendable_plaintext {
411
0
            self.flush_plaintext(sendable_plaintext);
412
0
        }
413
0
    }
414
415
    /// Mark the connection as ready to send and receive application data.
416
    ///
417
    /// Also flush `sendable_plaintext` if it is `Some`.
418
0
    pub(crate) fn start_traffic(&mut self, sendable_plaintext: &mut Option<&mut ChunkVecBuffer>) {
419
0
        self.may_receive_application_data = true;
420
0
        self.start_outgoing_traffic(sendable_plaintext);
421
0
    }
422
423
    /// Send any buffered plaintext.  Plaintext is buffered if
424
    /// written during handshake.
425
0
    fn flush_plaintext(&mut self, sendable_plaintext: &mut ChunkVecBuffer) {
426
0
        if !self.may_send_application_data {
427
0
            return;
428
0
        }
429
430
0
        while let Some(buf) = sendable_plaintext.pop() {
431
0
            self.send_plain_non_buffering(buf.as_slice().into(), Limit::No);
432
0
        }
433
0
    }
434
435
    // Put m into sendable_tls for writing.
436
0
    fn queue_tls_message(&mut self, m: OutboundOpaqueMessage) {
437
0
        self.perhaps_write_key_update();
438
0
        self.sendable_tls.append(m.encode());
439
0
    }
440
441
0
    pub(crate) fn perhaps_write_key_update(&mut self) {
442
0
        if let Some(message) = self.queued_key_update_message.take() {
443
0
            self.sendable_tls.append(message);
444
0
        }
445
0
    }
446
447
    /// Send a raw TLS message, fragmenting it if needed.
448
0
    pub(crate) fn send_msg(&mut self, m: Message<'_>, must_encrypt: bool) {
449
        {
450
0
            if let Protocol::Quic = self.protocol {
451
0
                if let MessagePayload::Alert(alert) = m.payload {
452
0
                    self.quic.alert = Some(alert.description);
453
0
                } else {
454
0
                    debug_assert!(
455
0
                        matches!(
456
0
                            m.payload,
457
                            MessagePayload::Handshake { .. } | MessagePayload::HandshakeFlight(_)
458
                        ),
459
0
                        "QUIC uses TLS for the cryptographic handshake only"
460
                    );
461
0
                    let mut bytes = Vec::new();
462
0
                    m.payload.encode(&mut bytes);
463
0
                    self.quic
464
0
                        .hs_queue
465
0
                        .push_back((must_encrypt, bytes));
466
                }
467
0
                return;
468
0
            }
469
        }
470
0
        if !must_encrypt {
471
0
            let msg = &m.into();
472
0
            let iter = self
473
0
                .message_fragmenter
474
0
                .fragment_message(msg);
475
0
            for m in iter {
476
0
                self.queue_tls_message(m.to_unencrypted_opaque());
477
0
            }
478
0
        } else {
479
0
            self.send_msg_encrypt(m.into());
480
0
        }
481
0
    }
482
483
0
    pub(crate) fn take_received_plaintext(&mut self, bytes: Payload<'_>) {
484
0
        self.temper_counters.received_app_data();
485
0
        self.received_plaintext
486
0
            .append(bytes.into_vec());
487
0
    }
488
489
    #[cfg(feature = "tls12")]
490
0
    pub(crate) fn start_encryption_tls12(&mut self, secrets: &ConnectionSecrets, side: Side) {
491
0
        let (dec, enc) = secrets.make_cipher_pair(side);
492
0
        self.record_layer
493
0
            .prepare_message_encrypter(
494
0
                enc,
495
0
                secrets
496
0
                    .suite()
497
0
                    .common
498
0
                    .confidentiality_limit,
499
            );
500
0
        self.record_layer
501
0
            .prepare_message_decrypter(dec);
502
0
    }
503
504
0
    pub(crate) fn missing_extension(&mut self, why: PeerMisbehaved) -> Error {
505
0
        self.send_fatal_alert(AlertDescription::MissingExtension, why)
506
0
    }
507
508
0
    fn send_warning_alert(&mut self, desc: AlertDescription) {
509
0
        warn!("Sending warning alert {desc:?}");
510
0
        self.send_warning_alert_no_log(desc);
511
0
    }
512
513
0
    pub(crate) fn process_alert(&mut self, alert: &AlertMessagePayload) -> Result<(), Error> {
514
        // Reject unknown AlertLevels.
515
0
        if let AlertLevel::Unknown(_) = alert.level {
516
0
            return Err(self.send_fatal_alert(
517
0
                AlertDescription::IllegalParameter,
518
0
                Error::AlertReceived(alert.description),
519
0
            ));
520
0
        }
521
522
        // If we get a CloseNotify, make a note to declare EOF to our
523
        // caller.  But do not treat unauthenticated alerts like this.
524
0
        if self.may_receive_application_data && alert.description == AlertDescription::CloseNotify {
525
0
            self.has_received_close_notify = true;
526
0
            return Ok(());
527
0
        }
528
529
        // Warnings are nonfatal for TLS1.2, but outlawed in TLS1.3
530
        // (except, for no good reason, user_cancelled).
531
0
        let err = Error::AlertReceived(alert.description);
532
0
        if alert.level == AlertLevel::Warning {
533
0
            self.temper_counters
534
0
                .received_warning_alert()?;
535
0
            if self.is_tls13() && alert.description != AlertDescription::UserCanceled {
536
0
                return Err(self.send_fatal_alert(AlertDescription::DecodeError, err));
537
0
            }
538
539
            // Some implementations send pointless `user_canceled` alerts, don't log them
540
            // in release mode (https://bugs.openjdk.org/browse/JDK-8323517).
541
0
            if alert.description != AlertDescription::UserCanceled || cfg!(debug_assertions) {
542
0
                warn!("TLS alert warning received: {alert:?}");
543
0
            }
544
545
0
            return Ok(());
546
0
        }
547
548
0
        Err(err)
549
0
    }
550
551
0
    pub(crate) fn send_cert_verify_error_alert(&mut self, err: Error) -> Error {
552
0
        self.send_fatal_alert(
553
0
            match &err {
554
0
                Error::InvalidCertificate(e) => e.clone().into(),
555
0
                Error::PeerMisbehaved(_) => AlertDescription::IllegalParameter,
556
0
                _ => AlertDescription::HandshakeFailure,
557
            },
558
0
            err,
559
        )
560
0
    }
561
562
0
    pub(crate) fn send_fatal_alert(
563
0
        &mut self,
564
0
        desc: AlertDescription,
565
0
        err: impl Into<Error>,
566
0
    ) -> Error {
567
0
        debug_assert!(!self.sent_fatal_alert);
568
0
        let m = Message::build_alert(AlertLevel::Fatal, desc);
569
0
        self.send_msg(m, self.record_layer.is_encrypting());
570
0
        self.sent_fatal_alert = true;
571
0
        err.into()
572
0
    }
Unexecuted instantiation: <rustls::common_state::CommonState>::send_fatal_alert::<rustls::error::InvalidMessage>
Unexecuted instantiation: <rustls::common_state::CommonState>::send_fatal_alert::<rustls::error::PeerMisbehaved>
Unexecuted instantiation: <rustls::common_state::CommonState>::send_fatal_alert::<rustls::error::PeerIncompatible>
Unexecuted instantiation: <rustls::common_state::CommonState>::send_fatal_alert::<rustls::error::Error>
573
574
    /// Queues a `close_notify` warning alert to be sent in the next
575
    /// [`Connection::write_tls`] call.  This informs the peer that the
576
    /// connection is being closed.
577
    ///
578
    /// Does nothing if any `close_notify` or fatal alert was already sent.
579
    ///
580
    /// [`Connection::write_tls`]: crate::Connection::write_tls
581
0
    pub fn send_close_notify(&mut self) {
582
0
        if self.sent_fatal_alert {
583
0
            return;
584
0
        }
585
0
        debug!("Sending warning alert {:?}", AlertDescription::CloseNotify);
586
0
        self.sent_fatal_alert = true;
587
0
        self.has_sent_close_notify = true;
588
0
        self.send_warning_alert_no_log(AlertDescription::CloseNotify);
589
0
    }
590
591
0
    pub(crate) fn eager_send_close_notify(
592
0
        &mut self,
593
0
        outgoing_tls: &mut [u8],
594
0
    ) -> Result<usize, EncryptError> {
595
0
        self.send_close_notify();
596
0
        self.check_required_size(outgoing_tls, [].into_iter())?;
597
0
        Ok(self.write_fragments(outgoing_tls, [].into_iter()))
598
0
    }
599
600
0
    fn send_warning_alert_no_log(&mut self, desc: AlertDescription) {
601
0
        let m = Message::build_alert(AlertLevel::Warning, desc);
602
0
        self.send_msg(m, self.record_layer.is_encrypting());
603
0
    }
604
605
0
    fn check_required_size<'a>(
606
0
        &self,
607
0
        outgoing_tls: &mut [u8],
608
0
        fragments: impl Iterator<Item = OutboundPlainMessage<'a>>,
609
0
    ) -> Result<(), EncryptError> {
610
0
        let mut required_size = self.sendable_tls.len();
611
612
0
        for m in fragments {
613
0
            required_size += m.encoded_len(&self.record_layer);
614
0
        }
615
616
0
        if required_size > outgoing_tls.len() {
617
0
            return Err(EncryptError::InsufficientSize(InsufficientSizeError {
618
0
                required_size,
619
0
            }));
620
0
        }
621
622
0
        Ok(())
623
0
    }
Unexecuted instantiation: <rustls::common_state::CommonState>::check_required_size::<core::array::iter::IntoIter<rustls::msgs::message::outbound::OutboundPlainMessage, 0>>
Unexecuted instantiation: <rustls::common_state::CommonState>::check_required_size::<core::iter::adapters::map::Map<rustls::msgs::fragmenter::Chunker, <rustls::msgs::fragmenter::MessageFragmenter>::fragment_payload::{closure#0}>>
624
625
0
    fn write_fragments<'a>(
626
0
        &mut self,
627
0
        outgoing_tls: &mut [u8],
628
0
        fragments: impl Iterator<Item = OutboundPlainMessage<'a>>,
629
0
    ) -> usize {
630
0
        let mut written = 0;
631
632
        // Any pre-existing encrypted messages in `sendable_tls` must
633
        // be output before encrypting any of the `fragments`.
634
0
        while let Some(message) = self.sendable_tls.pop() {
635
0
            let len = message.len();
636
0
            outgoing_tls[written..written + len].copy_from_slice(&message);
637
0
            written += len;
638
0
        }
639
640
0
        for m in fragments {
641
0
            let em = self
642
0
                .record_layer
643
0
                .encrypt_outgoing(m)
644
0
                .encode();
645
0
646
0
            let len = em.len();
647
0
            outgoing_tls[written..written + len].copy_from_slice(&em);
648
0
            written += len;
649
0
        }
650
651
0
        written
652
0
    }
Unexecuted instantiation: <rustls::common_state::CommonState>::write_fragments::<core::array::iter::IntoIter<rustls::msgs::message::outbound::OutboundPlainMessage, 0>>
Unexecuted instantiation: <rustls::common_state::CommonState>::write_fragments::<core::iter::adapters::map::Map<rustls::msgs::fragmenter::Chunker, <rustls::msgs::fragmenter::MessageFragmenter>::fragment_payload::{closure#0}>>
653
654
0
    pub(crate) fn set_max_fragment_size(&mut self, new: Option<usize>) -> Result<(), Error> {
655
0
        self.message_fragmenter
656
0
            .set_max_fragment_size(new)
657
0
    }
658
659
0
    pub(crate) fn get_alpn_protocol(&self) -> Option<&[u8]> {
660
0
        self.alpn_protocol
661
0
            .as_ref()
662
0
            .map(AsRef::as_ref)
663
0
    }
664
665
    /// Returns true if the caller should call [`Connection::read_tls`] as soon
666
    /// as possible.
667
    ///
668
    /// If there is pending plaintext data to read with [`Connection::reader`],
669
    /// this returns false.  If your application respects this mechanism,
670
    /// only one full TLS message will be buffered by rustls.
671
    ///
672
    /// [`Connection::reader`]: crate::Connection::reader
673
    /// [`Connection::read_tls`]: crate::Connection::read_tls
674
0
    pub fn wants_read(&self) -> bool {
675
        // We want to read more data all the time, except when we have unprocessed plaintext.
676
        // This provides back-pressure to the TCP buffers. We also don't want to read more after
677
        // the peer has sent us a close notification.
678
        //
679
        // In the handshake case we don't have readable plaintext before the handshake has
680
        // completed, but also don't want to read if we still have sendable tls.
681
0
        self.received_plaintext.is_empty()
682
0
            && !self.has_received_close_notify
683
0
            && (self.may_send_application_data || self.sendable_tls.is_empty())
684
0
    }
685
686
0
    pub(crate) fn current_io_state(&self) -> IoState {
687
0
        IoState {
688
0
            tls_bytes_to_write: self.sendable_tls.len(),
689
0
            plaintext_bytes_to_read: self.received_plaintext.len(),
690
0
            peer_has_closed: self.has_received_close_notify,
691
0
        }
692
0
    }
693
694
0
    pub(crate) fn is_quic(&self) -> bool {
695
0
        self.protocol == Protocol::Quic
696
0
    }
697
698
0
    pub(crate) fn should_update_key(
699
0
        &mut self,
700
0
        key_update_request: &KeyUpdateRequest,
701
0
    ) -> Result<bool, Error> {
702
0
        self.temper_counters
703
0
            .received_key_update_request()?;
704
705
0
        match key_update_request {
706
0
            KeyUpdateRequest::UpdateNotRequested => Ok(false),
707
0
            KeyUpdateRequest::UpdateRequested => Ok(self.queued_key_update_message.is_none()),
708
0
            _ => Err(self.send_fatal_alert(
709
0
                AlertDescription::IllegalParameter,
710
0
                InvalidMessage::InvalidKeyUpdate,
711
0
            )),
712
        }
713
0
    }
714
715
0
    pub(crate) fn enqueue_key_update_notification(&mut self) {
716
0
        let message = PlainMessage::from(Message::build_key_update_notify());
717
0
        self.queued_key_update_message = Some(
718
0
            self.record_layer
719
0
                .encrypt_outgoing(message.borrow_outbound())
720
0
                .encode(),
721
0
        );
722
0
    }
723
724
0
    pub(crate) fn received_tls13_change_cipher_spec(&mut self) -> Result<(), Error> {
725
0
        self.temper_counters
726
0
            .received_tls13_change_cipher_spec()
727
0
    }
728
}
729
730
#[cfg(feature = "std")]
731
impl CommonState {
732
    /// Send plaintext application data, fragmenting and
733
    /// encrypting it as it goes out.
734
    ///
735
    /// If internal buffers are too small, this function will not accept
736
    /// all the data.
737
0
    pub(crate) fn buffer_plaintext(
738
0
        &mut self,
739
0
        payload: OutboundChunks<'_>,
740
0
        sendable_plaintext: &mut ChunkVecBuffer,
741
0
    ) -> usize {
742
0
        self.perhaps_write_key_update();
743
0
        self.send_plain(payload, Limit::Yes, sendable_plaintext)
744
0
    }
745
746
0
    pub(crate) fn send_early_plaintext(&mut self, data: &[u8]) -> usize {
747
0
        debug_assert!(self.early_traffic);
748
0
        debug_assert!(self.record_layer.is_encrypting());
749
750
0
        if data.is_empty() {
751
            // Don't send empty fragments.
752
0
            return 0;
753
0
        }
754
755
0
        self.send_appdata_encrypt(data.into(), Limit::Yes)
756
0
    }
757
758
    /// Encrypt and send some plaintext `data`.  `limit` controls
759
    /// whether the per-connection buffer limits apply.
760
    ///
761
    /// Returns the number of bytes written from `data`: this might
762
    /// be less than `data.len()` if buffer limits were exceeded.
763
0
    fn send_plain(
764
0
        &mut self,
765
0
        payload: OutboundChunks<'_>,
766
0
        limit: Limit,
767
0
        sendable_plaintext: &mut ChunkVecBuffer,
768
0
    ) -> usize {
769
0
        if !self.may_send_application_data {
770
            // If we haven't completed handshaking, buffer
771
            // plaintext to send once we do.
772
0
            let len = match limit {
773
0
                Limit::Yes => sendable_plaintext.append_limited_copy(payload),
774
0
                Limit::No => sendable_plaintext.append(payload.to_vec()),
775
            };
776
0
            return len;
777
0
        }
778
779
0
        self.send_plain_non_buffering(payload, limit)
780
0
    }
781
}
782
783
/// Describes which sort of handshake happened.
784
#[derive(Debug, PartialEq, Clone, Copy)]
785
pub enum HandshakeKind {
786
    /// A full handshake.
787
    ///
788
    /// This is the typical TLS connection initiation process when resumption is
789
    /// not yet unavailable, and the initial `ClientHello` was accepted by the server.
790
    Full,
791
792
    /// A full TLS1.3 handshake, with an extra round-trip for a `HelloRetryRequest`.
793
    ///
794
    /// The server can respond with a `HelloRetryRequest` if the initial `ClientHello`
795
    /// is unacceptable for several reasons, the most likely if no supported key
796
    /// shares were offered by the client.
797
    FullWithHelloRetryRequest,
798
799
    /// A resumed handshake.
800
    ///
801
    /// Resumed handshakes involve fewer round trips and less cryptography than
802
    /// full ones, but can only happen when the peers have previously done a full
803
    /// handshake together, and then remember data about it.
804
    Resumed,
805
}
806
807
/// Values of this structure are returned from [`Connection::process_new_packets`]
808
/// and tell the caller the current I/O state of the TLS connection.
809
///
810
/// [`Connection::process_new_packets`]: crate::Connection::process_new_packets
811
#[derive(Debug, Eq, PartialEq)]
812
pub struct IoState {
813
    tls_bytes_to_write: usize,
814
    plaintext_bytes_to_read: usize,
815
    peer_has_closed: bool,
816
}
817
818
impl IoState {
819
    /// How many bytes could be written by [`Connection::write_tls`] if called
820
    /// right now.  A non-zero value implies [`CommonState::wants_write`].
821
    ///
822
    /// [`Connection::write_tls`]: crate::Connection::write_tls
823
0
    pub fn tls_bytes_to_write(&self) -> usize {
824
0
        self.tls_bytes_to_write
825
0
    }
826
827
    /// How many plaintext bytes could be obtained via [`std::io::Read`]
828
    /// without further I/O.
829
0
    pub fn plaintext_bytes_to_read(&self) -> usize {
830
0
        self.plaintext_bytes_to_read
831
0
    }
832
833
    /// True if the peer has sent us a close_notify alert.  This is
834
    /// the TLS mechanism to securely half-close a TLS connection,
835
    /// and signifies that the peer will not send any further data
836
    /// on this connection.
837
    ///
838
    /// This is also signalled via returning `Ok(0)` from
839
    /// [`std::io::Read`], after all the received bytes have been
840
    /// retrieved.
841
0
    pub fn peer_has_closed(&self) -> bool {
842
0
        self.peer_has_closed
843
0
    }
844
}
845
846
pub(crate) trait State<Data>: Send + Sync {
847
    fn handle<'m>(
848
        self: Box<Self>,
849
        cx: &mut Context<'_, Data>,
850
        message: Message<'m>,
851
    ) -> Result<Box<dyn State<Data> + 'm>, Error>
852
    where
853
        Self: 'm;
854
855
0
    fn export_keying_material(
856
0
        &self,
857
0
        _output: &mut [u8],
858
0
        _label: &[u8],
859
0
        _context: Option<&[u8]>,
860
0
    ) -> Result<(), Error> {
861
0
        Err(Error::HandshakeNotComplete)
862
0
    }
Unexecuted instantiation: <rustls::client::hs::ExpectServerHello as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::export_keying_material
Unexecuted instantiation: <rustls::client::hs::ExpectServerHelloOrHelloRetryRequest as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::export_keying_material
Unexecuted instantiation: <rustls::server::hs::ExpectClientHello as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::export_keying_material
Unexecuted instantiation: <rustls::server::server_conn::Accepting as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::export_keying_material
Unexecuted instantiation: <rustls::client::tls12::ExpectFinished as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::export_keying_material
Unexecuted instantiation: <rustls::client::tls12::ExpectServerKx as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::export_keying_material
Unexecuted instantiation: <rustls::client::tls12::ExpectNewTicket as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::export_keying_material
Unexecuted instantiation: <rustls::client::tls12::ExpectServerDone as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::export_keying_material
Unexecuted instantiation: <rustls::client::tls12::ExpectCertificate as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::export_keying_material
Unexecuted instantiation: <rustls::client::tls12::ExpectCertificateStatus as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::export_keying_material
Unexecuted instantiation: <rustls::client::tls12::ExpectCertificateRequest as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::export_keying_material
Unexecuted instantiation: <rustls::client::tls12::ExpectServerDoneOrCertReq as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::export_keying_material
Unexecuted instantiation: <rustls::client::tls12::ExpectCertificateStatusOrServerKx as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::export_keying_material
Unexecuted instantiation: <rustls::client::tls12::ExpectCcs as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::export_keying_material
Unexecuted instantiation: <rustls::client::tls13::ExpectFinished as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::export_keying_material
Unexecuted instantiation: <rustls::client::tls13::ExpectCertificate as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::export_keying_material
Unexecuted instantiation: <rustls::client::tls13::ExpectCertificateVerify as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::export_keying_material
Unexecuted instantiation: <rustls::client::tls13::ExpectCertificateRequest as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::export_keying_material
Unexecuted instantiation: <rustls::client::tls13::ExpectEncryptedExtensions as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::export_keying_material
Unexecuted instantiation: <rustls::client::tls13::ExpectCertificateOrCertReq as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::export_keying_material
Unexecuted instantiation: <rustls::client::tls13::ExpectCompressedCertificate as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::export_keying_material
Unexecuted instantiation: <rustls::client::tls13::ExpectCertificateOrCompressedCertificate as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::export_keying_material
Unexecuted instantiation: <rustls::client::tls13::ExpectCertificateOrCompressedCertificateOrCertReq as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::export_keying_material
Unexecuted instantiation: <rustls::server::tls12::ExpectClientKx as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::export_keying_material
Unexecuted instantiation: <rustls::server::tls12::ExpectFinished as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::export_keying_material
Unexecuted instantiation: <rustls::server::tls12::ExpectCertificate as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::export_keying_material
Unexecuted instantiation: <rustls::server::tls12::ExpectCertificateVerify as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::export_keying_material
Unexecuted instantiation: <rustls::server::tls12::ExpectCcs as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::export_keying_material
Unexecuted instantiation: <rustls::server::tls13::ExpectFinished as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::export_keying_material
Unexecuted instantiation: <rustls::server::tls13::ExpectEarlyData as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::export_keying_material
Unexecuted instantiation: <rustls::server::tls13::ExpectCertificate as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::export_keying_material
Unexecuted instantiation: <rustls::server::tls13::ExpectCertificateVerify as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::export_keying_material
Unexecuted instantiation: <rustls::server::tls13::ExpectCompressedCertificate as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::export_keying_material
Unexecuted instantiation: <rustls::server::tls13::ExpectAndSkipRejectedEarlyData as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::export_keying_material
Unexecuted instantiation: <rustls::server::tls13::ExpectCertificateOrCompressedCertificate as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::export_keying_material
863
864
0
    fn extract_secrets(&self) -> Result<PartiallyExtractedSecrets, Error> {
865
0
        Err(Error::HandshakeNotComplete)
866
0
    }
Unexecuted instantiation: <rustls::client::hs::ExpectServerHello as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::extract_secrets
Unexecuted instantiation: <rustls::client::hs::ExpectServerHelloOrHelloRetryRequest as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::extract_secrets
Unexecuted instantiation: <rustls::server::hs::ExpectClientHello as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::extract_secrets
Unexecuted instantiation: <rustls::server::server_conn::Accepting as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::extract_secrets
Unexecuted instantiation: <rustls::client::tls12::ExpectFinished as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::extract_secrets
Unexecuted instantiation: <rustls::client::tls12::ExpectServerKx as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::extract_secrets
Unexecuted instantiation: <rustls::client::tls12::ExpectNewTicket as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::extract_secrets
Unexecuted instantiation: <rustls::client::tls12::ExpectServerDone as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::extract_secrets
Unexecuted instantiation: <rustls::client::tls12::ExpectCertificate as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::extract_secrets
Unexecuted instantiation: <rustls::client::tls12::ExpectCertificateStatus as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::extract_secrets
Unexecuted instantiation: <rustls::client::tls12::ExpectCertificateRequest as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::extract_secrets
Unexecuted instantiation: <rustls::client::tls12::ExpectServerDoneOrCertReq as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::extract_secrets
Unexecuted instantiation: <rustls::client::tls12::ExpectCertificateStatusOrServerKx as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::extract_secrets
Unexecuted instantiation: <rustls::client::tls12::ExpectCcs as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::extract_secrets
Unexecuted instantiation: <rustls::client::tls13::ExpectFinished as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::extract_secrets
Unexecuted instantiation: <rustls::client::tls13::ExpectCertificate as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::extract_secrets
Unexecuted instantiation: <rustls::client::tls13::ExpectQuicTraffic as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::extract_secrets
Unexecuted instantiation: <rustls::client::tls13::ExpectCertificateVerify as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::extract_secrets
Unexecuted instantiation: <rustls::client::tls13::ExpectCertificateRequest as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::extract_secrets
Unexecuted instantiation: <rustls::client::tls13::ExpectEncryptedExtensions as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::extract_secrets
Unexecuted instantiation: <rustls::client::tls13::ExpectCertificateOrCertReq as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::extract_secrets
Unexecuted instantiation: <rustls::client::tls13::ExpectCompressedCertificate as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::extract_secrets
Unexecuted instantiation: <rustls::client::tls13::ExpectCertificateOrCompressedCertificate as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::extract_secrets
Unexecuted instantiation: <rustls::client::tls13::ExpectCertificateOrCompressedCertificateOrCertReq as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::extract_secrets
Unexecuted instantiation: <rustls::server::tls12::ExpectClientKx as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::extract_secrets
Unexecuted instantiation: <rustls::server::tls12::ExpectFinished as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::extract_secrets
Unexecuted instantiation: <rustls::server::tls12::ExpectCertificate as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::extract_secrets
Unexecuted instantiation: <rustls::server::tls12::ExpectCertificateVerify as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::extract_secrets
Unexecuted instantiation: <rustls::server::tls12::ExpectCcs as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::extract_secrets
Unexecuted instantiation: <rustls::server::tls13::ExpectFinished as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::extract_secrets
Unexecuted instantiation: <rustls::server::tls13::ExpectEarlyData as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::extract_secrets
Unexecuted instantiation: <rustls::server::tls13::ExpectCertificate as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::extract_secrets
Unexecuted instantiation: <rustls::server::tls13::ExpectQuicTraffic as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::extract_secrets
Unexecuted instantiation: <rustls::server::tls13::ExpectCertificateVerify as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::extract_secrets
Unexecuted instantiation: <rustls::server::tls13::ExpectCompressedCertificate as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::extract_secrets
Unexecuted instantiation: <rustls::server::tls13::ExpectAndSkipRejectedEarlyData as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::extract_secrets
Unexecuted instantiation: <rustls::server::tls13::ExpectCertificateOrCompressedCertificate as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::extract_secrets
867
868
0
    fn send_key_update_request(&mut self, _common: &mut CommonState) -> Result<(), Error> {
869
0
        Err(Error::HandshakeNotComplete)
870
0
    }
Unexecuted instantiation: <rustls::client::hs::ExpectServerHello as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::send_key_update_request
Unexecuted instantiation: <rustls::client::hs::ExpectServerHelloOrHelloRetryRequest as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::send_key_update_request
Unexecuted instantiation: <rustls::server::hs::ExpectClientHello as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::send_key_update_request
Unexecuted instantiation: <rustls::server::server_conn::Accepting as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::send_key_update_request
Unexecuted instantiation: <rustls::client::tls12::ExpectTraffic as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::send_key_update_request
Unexecuted instantiation: <rustls::client::tls12::ExpectFinished as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::send_key_update_request
Unexecuted instantiation: <rustls::client::tls12::ExpectServerKx as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::send_key_update_request
Unexecuted instantiation: <rustls::client::tls12::ExpectNewTicket as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::send_key_update_request
Unexecuted instantiation: <rustls::client::tls12::ExpectServerDone as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::send_key_update_request
Unexecuted instantiation: <rustls::client::tls12::ExpectCertificate as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::send_key_update_request
Unexecuted instantiation: <rustls::client::tls12::ExpectCertificateStatus as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::send_key_update_request
Unexecuted instantiation: <rustls::client::tls12::ExpectCertificateRequest as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::send_key_update_request
Unexecuted instantiation: <rustls::client::tls12::ExpectServerDoneOrCertReq as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::send_key_update_request
Unexecuted instantiation: <rustls::client::tls12::ExpectCertificateStatusOrServerKx as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::send_key_update_request
Unexecuted instantiation: <rustls::client::tls12::ExpectCcs as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::send_key_update_request
Unexecuted instantiation: <rustls::client::tls13::ExpectFinished as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::send_key_update_request
Unexecuted instantiation: <rustls::client::tls13::ExpectCertificate as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::send_key_update_request
Unexecuted instantiation: <rustls::client::tls13::ExpectQuicTraffic as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::send_key_update_request
Unexecuted instantiation: <rustls::client::tls13::ExpectCertificateVerify as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::send_key_update_request
Unexecuted instantiation: <rustls::client::tls13::ExpectCertificateRequest as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::send_key_update_request
Unexecuted instantiation: <rustls::client::tls13::ExpectEncryptedExtensions as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::send_key_update_request
Unexecuted instantiation: <rustls::client::tls13::ExpectCertificateOrCertReq as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::send_key_update_request
Unexecuted instantiation: <rustls::client::tls13::ExpectCompressedCertificate as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::send_key_update_request
Unexecuted instantiation: <rustls::client::tls13::ExpectCertificateOrCompressedCertificate as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::send_key_update_request
Unexecuted instantiation: <rustls::client::tls13::ExpectCertificateOrCompressedCertificateOrCertReq as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::send_key_update_request
Unexecuted instantiation: <rustls::server::tls12::ExpectTraffic as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::send_key_update_request
Unexecuted instantiation: <rustls::server::tls12::ExpectClientKx as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::send_key_update_request
Unexecuted instantiation: <rustls::server::tls12::ExpectFinished as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::send_key_update_request
Unexecuted instantiation: <rustls::server::tls12::ExpectCertificate as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::send_key_update_request
Unexecuted instantiation: <rustls::server::tls12::ExpectCertificateVerify as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::send_key_update_request
Unexecuted instantiation: <rustls::server::tls12::ExpectCcs as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::send_key_update_request
Unexecuted instantiation: <rustls::server::tls13::ExpectFinished as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::send_key_update_request
Unexecuted instantiation: <rustls::server::tls13::ExpectEarlyData as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::send_key_update_request
Unexecuted instantiation: <rustls::server::tls13::ExpectCertificate as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::send_key_update_request
Unexecuted instantiation: <rustls::server::tls13::ExpectQuicTraffic as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::send_key_update_request
Unexecuted instantiation: <rustls::server::tls13::ExpectCertificateVerify as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::send_key_update_request
Unexecuted instantiation: <rustls::server::tls13::ExpectCompressedCertificate as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::send_key_update_request
Unexecuted instantiation: <rustls::server::tls13::ExpectAndSkipRejectedEarlyData as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::send_key_update_request
Unexecuted instantiation: <rustls::server::tls13::ExpectCertificateOrCompressedCertificate as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::send_key_update_request
871
872
0
    fn handle_decrypt_error(&self) {}
Unexecuted instantiation: <rustls::client::hs::ExpectServerHello as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::handle_decrypt_error
Unexecuted instantiation: <rustls::client::hs::ExpectServerHelloOrHelloRetryRequest as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::handle_decrypt_error
Unexecuted instantiation: <rustls::server::hs::ExpectClientHello as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::handle_decrypt_error
Unexecuted instantiation: <rustls::server::server_conn::Accepting as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::handle_decrypt_error
Unexecuted instantiation: <rustls::client::tls12::ExpectTraffic as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::handle_decrypt_error
Unexecuted instantiation: <rustls::client::tls12::ExpectServerKx as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::handle_decrypt_error
Unexecuted instantiation: <rustls::client::tls12::ExpectNewTicket as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::handle_decrypt_error
Unexecuted instantiation: <rustls::client::tls12::ExpectServerDone as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::handle_decrypt_error
Unexecuted instantiation: <rustls::client::tls12::ExpectCertificate as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::handle_decrypt_error
Unexecuted instantiation: <rustls::client::tls12::ExpectCertificateStatus as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::handle_decrypt_error
Unexecuted instantiation: <rustls::client::tls12::ExpectCertificateRequest as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::handle_decrypt_error
Unexecuted instantiation: <rustls::client::tls12::ExpectServerDoneOrCertReq as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::handle_decrypt_error
Unexecuted instantiation: <rustls::client::tls12::ExpectCertificateStatusOrServerKx as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::handle_decrypt_error
Unexecuted instantiation: <rustls::client::tls12::ExpectCcs as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::handle_decrypt_error
Unexecuted instantiation: <rustls::client::tls13::ExpectTraffic as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::handle_decrypt_error
Unexecuted instantiation: <rustls::client::tls13::ExpectFinished as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::handle_decrypt_error
Unexecuted instantiation: <rustls::client::tls13::ExpectCertificate as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::handle_decrypt_error
Unexecuted instantiation: <rustls::client::tls13::ExpectQuicTraffic as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::handle_decrypt_error
Unexecuted instantiation: <rustls::client::tls13::ExpectCertificateVerify as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::handle_decrypt_error
Unexecuted instantiation: <rustls::client::tls13::ExpectCertificateRequest as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::handle_decrypt_error
Unexecuted instantiation: <rustls::client::tls13::ExpectEncryptedExtensions as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::handle_decrypt_error
Unexecuted instantiation: <rustls::client::tls13::ExpectCertificateOrCertReq as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::handle_decrypt_error
Unexecuted instantiation: <rustls::client::tls13::ExpectCompressedCertificate as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::handle_decrypt_error
Unexecuted instantiation: <rustls::client::tls13::ExpectCertificateOrCompressedCertificate as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::handle_decrypt_error
Unexecuted instantiation: <rustls::client::tls13::ExpectCertificateOrCompressedCertificateOrCertReq as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::handle_decrypt_error
Unexecuted instantiation: <rustls::server::tls12::ExpectTraffic as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::handle_decrypt_error
Unexecuted instantiation: <rustls::server::tls12::ExpectClientKx as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::handle_decrypt_error
Unexecuted instantiation: <rustls::server::tls12::ExpectFinished as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::handle_decrypt_error
Unexecuted instantiation: <rustls::server::tls12::ExpectCertificate as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::handle_decrypt_error
Unexecuted instantiation: <rustls::server::tls12::ExpectCertificateVerify as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::handle_decrypt_error
Unexecuted instantiation: <rustls::server::tls12::ExpectCcs as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::handle_decrypt_error
Unexecuted instantiation: <rustls::server::tls13::ExpectTraffic as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::handle_decrypt_error
Unexecuted instantiation: <rustls::server::tls13::ExpectFinished as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::handle_decrypt_error
Unexecuted instantiation: <rustls::server::tls13::ExpectEarlyData as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::handle_decrypt_error
Unexecuted instantiation: <rustls::server::tls13::ExpectCertificate as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::handle_decrypt_error
Unexecuted instantiation: <rustls::server::tls13::ExpectQuicTraffic as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::handle_decrypt_error
Unexecuted instantiation: <rustls::server::tls13::ExpectCertificateVerify as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::handle_decrypt_error
Unexecuted instantiation: <rustls::server::tls13::ExpectCompressedCertificate as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::handle_decrypt_error
Unexecuted instantiation: <rustls::server::tls13::ExpectAndSkipRejectedEarlyData as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::handle_decrypt_error
Unexecuted instantiation: <rustls::server::tls13::ExpectCertificateOrCompressedCertificate as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::handle_decrypt_error
873
874
0
    fn into_external_state(self: Box<Self>) -> Result<Box<dyn KernelState + 'static>, Error> {
875
0
        Err(Error::HandshakeNotComplete)
876
0
    }
Unexecuted instantiation: <rustls::client::hs::ExpectServerHello as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::into_external_state
Unexecuted instantiation: <rustls::client::hs::ExpectServerHelloOrHelloRetryRequest as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::into_external_state
Unexecuted instantiation: <rustls::server::hs::ExpectClientHello as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::into_external_state
Unexecuted instantiation: <rustls::server::server_conn::Accepting as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::into_external_state
Unexecuted instantiation: <rustls::client::tls12::ExpectFinished as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::into_external_state
Unexecuted instantiation: <rustls::client::tls12::ExpectServerKx as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::into_external_state
Unexecuted instantiation: <rustls::client::tls12::ExpectNewTicket as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::into_external_state
Unexecuted instantiation: <rustls::client::tls12::ExpectServerDone as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::into_external_state
Unexecuted instantiation: <rustls::client::tls12::ExpectCertificate as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::into_external_state
Unexecuted instantiation: <rustls::client::tls12::ExpectCertificateStatus as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::into_external_state
Unexecuted instantiation: <rustls::client::tls12::ExpectCertificateRequest as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::into_external_state
Unexecuted instantiation: <rustls::client::tls12::ExpectServerDoneOrCertReq as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::into_external_state
Unexecuted instantiation: <rustls::client::tls12::ExpectCertificateStatusOrServerKx as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::into_external_state
Unexecuted instantiation: <rustls::client::tls12::ExpectCcs as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::into_external_state
Unexecuted instantiation: <rustls::client::tls13::ExpectFinished as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::into_external_state
Unexecuted instantiation: <rustls::client::tls13::ExpectCertificate as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::into_external_state
Unexecuted instantiation: <rustls::client::tls13::ExpectCertificateVerify as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::into_external_state
Unexecuted instantiation: <rustls::client::tls13::ExpectCertificateRequest as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::into_external_state
Unexecuted instantiation: <rustls::client::tls13::ExpectEncryptedExtensions as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::into_external_state
Unexecuted instantiation: <rustls::client::tls13::ExpectCertificateOrCertReq as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::into_external_state
Unexecuted instantiation: <rustls::client::tls13::ExpectCompressedCertificate as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::into_external_state
Unexecuted instantiation: <rustls::client::tls13::ExpectCertificateOrCompressedCertificate as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::into_external_state
Unexecuted instantiation: <rustls::client::tls13::ExpectCertificateOrCompressedCertificateOrCertReq as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::into_external_state
Unexecuted instantiation: <rustls::server::tls12::ExpectClientKx as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::into_external_state
Unexecuted instantiation: <rustls::server::tls12::ExpectFinished as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::into_external_state
Unexecuted instantiation: <rustls::server::tls12::ExpectCertificate as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::into_external_state
Unexecuted instantiation: <rustls::server::tls12::ExpectCertificateVerify as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::into_external_state
Unexecuted instantiation: <rustls::server::tls12::ExpectCcs as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::into_external_state
Unexecuted instantiation: <rustls::server::tls13::ExpectFinished as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::into_external_state
Unexecuted instantiation: <rustls::server::tls13::ExpectEarlyData as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::into_external_state
Unexecuted instantiation: <rustls::server::tls13::ExpectCertificate as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::into_external_state
Unexecuted instantiation: <rustls::server::tls13::ExpectQuicTraffic as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::into_external_state
Unexecuted instantiation: <rustls::server::tls13::ExpectCertificateVerify as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::into_external_state
Unexecuted instantiation: <rustls::server::tls13::ExpectCompressedCertificate as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::into_external_state
Unexecuted instantiation: <rustls::server::tls13::ExpectAndSkipRejectedEarlyData as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::into_external_state
Unexecuted instantiation: <rustls::server::tls13::ExpectCertificateOrCompressedCertificate as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::into_external_state
877
878
    fn into_owned(self: Box<Self>) -> Box<dyn State<Data> + 'static>;
879
}
880
881
pub(crate) struct Context<'a, Data> {
882
    pub(crate) common: &'a mut CommonState,
883
    pub(crate) data: &'a mut Data,
884
    /// Buffered plaintext. This is `Some` if any plaintext was written during handshake and `None`
885
    /// otherwise.
886
    pub(crate) sendable_plaintext: Option<&'a mut ChunkVecBuffer>,
887
}
888
889
/// Side of the connection.
890
#[derive(Clone, Copy, Debug, PartialEq)]
891
pub enum Side {
892
    /// A client initiates the connection.
893
    Client,
894
    /// A server waits for a client to connect.
895
    Server,
896
}
897
898
impl Side {
899
0
    pub(crate) fn peer(&self) -> Self {
900
0
        match self {
901
0
            Self::Client => Self::Server,
902
0
            Self::Server => Self::Client,
903
        }
904
0
    }
905
}
906
907
#[derive(Copy, Clone, Eq, PartialEq, Debug)]
908
pub(crate) enum Protocol {
909
    Tcp,
910
    Quic,
911
}
912
913
enum Limit {
914
    #[cfg(feature = "std")]
915
    Yes,
916
    No,
917
}
918
919
/// Tracking technically-allowed protocol actions
920
/// that we limit to avoid denial-of-service vectors.
921
struct TemperCounters {
922
    allowed_warning_alerts: u8,
923
    allowed_renegotiation_requests: u8,
924
    allowed_key_update_requests: u8,
925
    allowed_middlebox_ccs: u8,
926
}
927
928
impl TemperCounters {
929
0
    fn received_warning_alert(&mut self) -> Result<(), Error> {
930
0
        match self.allowed_warning_alerts {
931
0
            0 => Err(PeerMisbehaved::TooManyWarningAlertsReceived.into()),
932
            _ => {
933
0
                self.allowed_warning_alerts -= 1;
934
0
                Ok(())
935
            }
936
        }
937
0
    }
938
939
0
    fn received_renegotiation_request(&mut self) -> Result<(), Error> {
940
0
        match self.allowed_renegotiation_requests {
941
0
            0 => Err(PeerMisbehaved::TooManyRenegotiationRequests.into()),
942
            _ => {
943
0
                self.allowed_renegotiation_requests -= 1;
944
0
                Ok(())
945
            }
946
        }
947
0
    }
948
949
0
    fn received_key_update_request(&mut self) -> Result<(), Error> {
950
0
        match self.allowed_key_update_requests {
951
0
            0 => Err(PeerMisbehaved::TooManyKeyUpdateRequests.into()),
952
            _ => {
953
0
                self.allowed_key_update_requests -= 1;
954
0
                Ok(())
955
            }
956
        }
957
0
    }
958
959
0
    fn received_tls13_change_cipher_spec(&mut self) -> Result<(), Error> {
960
0
        match self.allowed_middlebox_ccs {
961
0
            0 => Err(PeerMisbehaved::IllegalMiddleboxChangeCipherSpec.into()),
962
            _ => {
963
0
                self.allowed_middlebox_ccs -= 1;
964
0
                Ok(())
965
            }
966
        }
967
0
    }
968
969
0
    fn received_app_data(&mut self) {
970
0
        self.allowed_key_update_requests = Self::INITIAL_KEY_UPDATE_REQUESTS;
971
0
    }
972
973
    // cf. BoringSSL `kMaxKeyUpdates`
974
    // <https://github.com/google/boringssl/blob/dec5989b793c56ad4dd32173bd2d8595ca78b398/ssl/tls13_both.cc#L35-L38>
975
    const INITIAL_KEY_UPDATE_REQUESTS: u8 = 32;
976
}
977
978
impl Default for TemperCounters {
979
0
    fn default() -> Self {
980
0
        Self {
981
0
            // cf. BoringSSL `kMaxWarningAlerts`
982
0
            // <https://github.com/google/boringssl/blob/dec5989b793c56ad4dd32173bd2d8595ca78b398/ssl/tls_record.cc#L137-L139>
983
0
            allowed_warning_alerts: 4,
984
0
985
0
            // we rebuff renegotiation requests with a `NoRenegotiation` warning alerts.
986
0
            // a second request after this is fatal.
987
0
            allowed_renegotiation_requests: 1,
988
0
989
0
            allowed_key_update_requests: Self::INITIAL_KEY_UPDATE_REQUESTS,
990
0
991
0
            // At most two CCS are allowed: one after each ClientHello (recall a second
992
0
            // ClientHello happens after a HelloRetryRequest).
993
0
            //
994
0
            // note BoringSSL allows up to 32.
995
0
            allowed_middlebox_ccs: 2,
996
0
        }
997
0
    }
998
}
999
1000
#[derive(Debug, Default)]
1001
pub(crate) enum KxState {
1002
    #[default]
1003
    None,
1004
    Start(&'static dyn SupportedKxGroup),
1005
    Complete(&'static dyn SupportedKxGroup),
1006
}
1007
1008
impl KxState {
1009
0
    pub(crate) fn complete(&mut self) {
1010
0
        debug_assert!(matches!(self, Self::Start(_)));
1011
0
        if let Self::Start(group) = self {
1012
0
            *self = Self::Complete(*group);
1013
0
        }
1014
0
    }
1015
}
1016
1017
pub(crate) struct HandshakeFlight<'a, const TLS13: bool> {
1018
    pub(crate) transcript: &'a mut HandshakeHash,
1019
    body: Vec<u8>,
1020
}
1021
1022
impl<'a, const TLS13: bool> HandshakeFlight<'a, TLS13> {
1023
0
    pub(crate) fn new(transcript: &'a mut HandshakeHash) -> Self {
1024
0
        Self {
1025
0
            transcript,
1026
0
            body: Vec::new(),
1027
0
        }
1028
0
    }
Unexecuted instantiation: <rustls::common_state::HandshakeFlight<false>>::new
Unexecuted instantiation: <rustls::common_state::HandshakeFlight<true>>::new
1029
1030
0
    pub(crate) fn add(&mut self, hs: HandshakeMessagePayload<'_>) {
1031
0
        let start_len = self.body.len();
1032
0
        hs.encode(&mut self.body);
1033
0
        self.transcript
1034
0
            .add(&self.body[start_len..]);
1035
0
    }
Unexecuted instantiation: <rustls::common_state::HandshakeFlight<false>>::add
Unexecuted instantiation: <rustls::common_state::HandshakeFlight<true>>::add
1036
1037
0
    pub(crate) fn finish(self, common: &mut CommonState) {
1038
0
        common.send_msg(
1039
            Message {
1040
0
                version: match TLS13 {
1041
0
                    true => ProtocolVersion::TLSv1_3,
1042
0
                    false => ProtocolVersion::TLSv1_2,
1043
                },
1044
0
                payload: MessagePayload::HandshakeFlight(Payload::new(self.body)),
1045
            },
1046
            TLS13,
1047
        );
1048
0
    }
Unexecuted instantiation: <rustls::common_state::HandshakeFlight<false>>::finish
Unexecuted instantiation: <rustls::common_state::HandshakeFlight<true>>::finish
1049
}
1050
1051
#[cfg(feature = "tls12")]
1052
pub(crate) type HandshakeFlightTls12<'a> = HandshakeFlight<'a, false>;
1053
pub(crate) type HandshakeFlightTls13<'a> = HandshakeFlight<'a, true>;
1054
1055
const DEFAULT_RECEIVED_PLAINTEXT_LIMIT: usize = 16 * 1024;
1056
pub(crate) const DEFAULT_BUFFER_LIMIT: usize = 64 * 1024;