/rust/registry/src/index.crates.io-1949cf8c6b5b557f/rustls-0.23.35/src/common_state.rs
Line | Count | Source |
1 | | use alloc::boxed::Box; |
2 | | use alloc::vec::Vec; |
3 | | |
4 | | use pki_types::CertificateDer; |
5 | | |
6 | | use crate::conn::kernel::KernelState; |
7 | | use crate::crypto::SupportedKxGroup; |
8 | | use crate::enums::{AlertDescription, ContentType, HandshakeType, ProtocolVersion}; |
9 | | use crate::error::{Error, InvalidMessage, PeerMisbehaved}; |
10 | | use crate::hash_hs::HandshakeHash; |
11 | | use crate::log::{debug, error, warn}; |
12 | | use crate::msgs::alert::AlertMessagePayload; |
13 | | use crate::msgs::base::Payload; |
14 | | use crate::msgs::codec::Codec; |
15 | | use crate::msgs::enums::{AlertLevel, KeyUpdateRequest}; |
16 | | use crate::msgs::fragmenter::MessageFragmenter; |
17 | | use crate::msgs::handshake::{CertificateChain, HandshakeMessagePayload, ProtocolName}; |
18 | | use crate::msgs::message::{ |
19 | | Message, MessagePayload, OutboundChunks, OutboundOpaqueMessage, OutboundPlainMessage, |
20 | | PlainMessage, |
21 | | }; |
22 | | use crate::record_layer::PreEncryptAction; |
23 | | use crate::suites::{PartiallyExtractedSecrets, SupportedCipherSuite}; |
24 | | #[cfg(feature = "tls12")] |
25 | | use crate::tls12::ConnectionSecrets; |
26 | | use crate::unbuffered::{EncryptError, InsufficientSizeError}; |
27 | | use crate::vecbuf::ChunkVecBuffer; |
28 | | use crate::{quic, record_layer}; |
29 | | |
30 | | /// Connection state common to both client and server connections. |
31 | | pub struct CommonState { |
32 | | pub(crate) negotiated_version: Option<ProtocolVersion>, |
33 | | pub(crate) handshake_kind: Option<HandshakeKind>, |
34 | | pub(crate) side: Side, |
35 | | pub(crate) record_layer: record_layer::RecordLayer, |
36 | | pub(crate) suite: Option<SupportedCipherSuite>, |
37 | | pub(crate) kx_state: KxState, |
38 | | pub(crate) alpn_protocol: Option<ProtocolName>, |
39 | | pub(crate) aligned_handshake: bool, |
40 | | pub(crate) may_send_application_data: bool, |
41 | | pub(crate) may_receive_application_data: bool, |
42 | | pub(crate) early_traffic: bool, |
43 | | sent_fatal_alert: bool, |
44 | | /// If we signaled end of stream. |
45 | | pub(crate) has_sent_close_notify: bool, |
46 | | /// If the peer has signaled end of stream. |
47 | | pub(crate) has_received_close_notify: bool, |
48 | | #[cfg(feature = "std")] |
49 | | pub(crate) has_seen_eof: bool, |
50 | | pub(crate) peer_certificates: Option<CertificateChain<'static>>, |
51 | | message_fragmenter: MessageFragmenter, |
52 | | pub(crate) received_plaintext: ChunkVecBuffer, |
53 | | pub(crate) sendable_tls: ChunkVecBuffer, |
54 | | queued_key_update_message: Option<Vec<u8>>, |
55 | | |
56 | | /// Protocol whose key schedule should be used. Unused for TLS < 1.3. |
57 | | pub(crate) protocol: Protocol, |
58 | | pub(crate) quic: quic::Quic, |
59 | | pub(crate) enable_secret_extraction: bool, |
60 | | temper_counters: TemperCounters, |
61 | | pub(crate) refresh_traffic_keys_pending: bool, |
62 | | pub(crate) fips: bool, |
63 | | pub(crate) tls13_tickets_received: u32, |
64 | | } |
65 | | |
66 | | impl CommonState { |
67 | 0 | pub(crate) fn new(side: Side) -> Self { |
68 | 0 | Self { |
69 | 0 | negotiated_version: None, |
70 | 0 | handshake_kind: None, |
71 | 0 | side, |
72 | 0 | record_layer: record_layer::RecordLayer::new(), |
73 | 0 | suite: None, |
74 | 0 | kx_state: KxState::default(), |
75 | 0 | alpn_protocol: None, |
76 | 0 | aligned_handshake: true, |
77 | 0 | may_send_application_data: false, |
78 | 0 | may_receive_application_data: false, |
79 | 0 | early_traffic: false, |
80 | 0 | sent_fatal_alert: false, |
81 | 0 | has_sent_close_notify: false, |
82 | 0 | has_received_close_notify: false, |
83 | 0 | #[cfg(feature = "std")] |
84 | 0 | has_seen_eof: false, |
85 | 0 | peer_certificates: None, |
86 | 0 | message_fragmenter: MessageFragmenter::default(), |
87 | 0 | received_plaintext: ChunkVecBuffer::new(Some(DEFAULT_RECEIVED_PLAINTEXT_LIMIT)), |
88 | 0 | sendable_tls: ChunkVecBuffer::new(Some(DEFAULT_BUFFER_LIMIT)), |
89 | 0 | queued_key_update_message: None, |
90 | 0 | protocol: Protocol::Tcp, |
91 | 0 | quic: quic::Quic::default(), |
92 | 0 | enable_secret_extraction: false, |
93 | 0 | temper_counters: TemperCounters::default(), |
94 | 0 | refresh_traffic_keys_pending: false, |
95 | 0 | fips: false, |
96 | 0 | tls13_tickets_received: 0, |
97 | 0 | } |
98 | 0 | } |
99 | | |
100 | | /// Returns true if the caller should call [`Connection::write_tls`] as soon as possible. |
101 | | /// |
102 | | /// [`Connection::write_tls`]: crate::Connection::write_tls |
103 | 0 | pub fn wants_write(&self) -> bool { |
104 | 0 | !self.sendable_tls.is_empty() |
105 | 0 | } |
106 | | |
107 | | /// Returns true if the connection is currently performing the TLS handshake. |
108 | | /// |
109 | | /// During this time plaintext written to the connection is buffered in memory. After |
110 | | /// [`Connection::process_new_packets()`] has been called, this might start to return `false` |
111 | | /// while the final handshake packets still need to be extracted from the connection's buffers. |
112 | | /// |
113 | | /// [`Connection::process_new_packets()`]: crate::Connection::process_new_packets |
114 | 0 | pub fn is_handshaking(&self) -> bool { |
115 | 0 | !(self.may_send_application_data && self.may_receive_application_data) |
116 | 0 | } |
117 | | |
118 | | /// Retrieves the certificate chain or the raw public key used by the peer to authenticate. |
119 | | /// |
120 | | /// The order of the certificate chain is as it appears in the TLS |
121 | | /// protocol: the first certificate relates to the peer, the |
122 | | /// second certifies the first, the third certifies the second, and |
123 | | /// so on. |
124 | | /// |
125 | | /// When using raw public keys, the first and only element is the raw public key. |
126 | | /// |
127 | | /// This is made available for both full and resumed handshakes. |
128 | | /// |
129 | | /// For clients, this is the certificate chain or the raw public key of the server. |
130 | | /// |
131 | | /// For servers, this is the certificate chain or the raw public key of the client, |
132 | | /// if client authentication was completed. |
133 | | /// |
134 | | /// The return value is None until this value is available. |
135 | | /// |
136 | | /// Note: the return type of the 'certificate', when using raw public keys is `CertificateDer<'static>` |
137 | | /// even though this should technically be a `SubjectPublicKeyInfoDer<'static>`. |
138 | | /// This choice simplifies the API and ensures backwards compatibility. |
139 | 0 | pub fn peer_certificates(&self) -> Option<&[CertificateDer<'static>]> { |
140 | 0 | self.peer_certificates.as_deref() |
141 | 0 | } |
142 | | |
143 | | /// Retrieves the protocol agreed with the peer via ALPN. |
144 | | /// |
145 | | /// A return value of `None` after handshake completion |
146 | | /// means no protocol was agreed (because no protocols |
147 | | /// were offered or accepted by the peer). |
148 | 0 | pub fn alpn_protocol(&self) -> Option<&[u8]> { |
149 | 0 | self.get_alpn_protocol() |
150 | 0 | } |
151 | | |
152 | | /// Retrieves the ciphersuite agreed with the peer. |
153 | | /// |
154 | | /// This returns None until the ciphersuite is agreed. |
155 | 0 | pub fn negotiated_cipher_suite(&self) -> Option<SupportedCipherSuite> { |
156 | 0 | self.suite |
157 | 0 | } |
158 | | |
159 | | /// Retrieves the key exchange group agreed with the peer. |
160 | | /// |
161 | | /// This function may return `None` depending on the state of the connection, |
162 | | /// the type of handshake, and the protocol version. |
163 | | /// |
164 | | /// If [`CommonState::is_handshaking()`] is true this function will return `None`. |
165 | | /// Similarly, if the [`CommonState::handshake_kind()`] is [`HandshakeKind::Resumed`] |
166 | | /// and the [`CommonState::protocol_version()`] is TLS 1.2, then no key exchange will have |
167 | | /// occurred and this function will return `None`. |
168 | 0 | pub fn negotiated_key_exchange_group(&self) -> Option<&'static dyn SupportedKxGroup> { |
169 | 0 | match self.kx_state { |
170 | 0 | KxState::Complete(group) => Some(group), |
171 | 0 | _ => None, |
172 | | } |
173 | 0 | } |
174 | | |
175 | | /// Retrieves the protocol version agreed with the peer. |
176 | | /// |
177 | | /// This returns `None` until the version is agreed. |
178 | 0 | pub fn protocol_version(&self) -> Option<ProtocolVersion> { |
179 | 0 | self.negotiated_version |
180 | 0 | } |
181 | | |
182 | | /// Which kind of handshake was performed. |
183 | | /// |
184 | | /// This tells you whether the handshake was a resumption or not. |
185 | | /// |
186 | | /// This will return `None` before it is known which sort of |
187 | | /// handshake occurred. |
188 | 0 | pub fn handshake_kind(&self) -> Option<HandshakeKind> { |
189 | 0 | self.handshake_kind |
190 | 0 | } |
191 | | |
192 | 0 | pub(crate) fn is_tls13(&self) -> bool { |
193 | 0 | matches!(self.negotiated_version, Some(ProtocolVersion::TLSv1_3)) |
194 | 0 | } |
195 | | |
196 | 0 | pub(crate) fn process_main_protocol<Data>( |
197 | 0 | &mut self, |
198 | 0 | msg: Message<'_>, |
199 | 0 | mut state: Box<dyn State<Data>>, |
200 | 0 | data: &mut Data, |
201 | 0 | sendable_plaintext: Option<&mut ChunkVecBuffer>, |
202 | 0 | ) -> Result<Box<dyn State<Data>>, Error> { |
203 | | // For TLS1.2, outside of the handshake, send rejection alerts for |
204 | | // renegotiation requests. These can occur any time. |
205 | 0 | if self.may_receive_application_data && !self.is_tls13() { |
206 | 0 | let reject_ty = match self.side { |
207 | 0 | Side::Client => HandshakeType::HelloRequest, |
208 | 0 | Side::Server => HandshakeType::ClientHello, |
209 | | }; |
210 | 0 | if msg.is_handshake_type(reject_ty) { |
211 | 0 | self.temper_counters |
212 | 0 | .received_renegotiation_request()?; |
213 | 0 | self.send_warning_alert(AlertDescription::NoRenegotiation); |
214 | 0 | return Ok(state); |
215 | 0 | } |
216 | 0 | } |
217 | | |
218 | 0 | let mut cx = Context { |
219 | 0 | common: self, |
220 | 0 | data, |
221 | 0 | sendable_plaintext, |
222 | 0 | }; |
223 | 0 | match state.handle(&mut cx, msg) { |
224 | 0 | Ok(next) => { |
225 | 0 | state = next.into_owned(); |
226 | 0 | Ok(state) |
227 | | } |
228 | 0 | Err(e @ Error::InappropriateMessage { .. }) |
229 | 0 | | Err(e @ Error::InappropriateHandshakeMessage { .. }) => { |
230 | 0 | Err(self.send_fatal_alert(AlertDescription::UnexpectedMessage, e)) |
231 | | } |
232 | 0 | Err(e) => Err(e), |
233 | | } |
234 | 0 | } Unexecuted instantiation: <rustls::common_state::CommonState>::process_main_protocol::<rustls::client::client_conn::ClientConnectionData> Unexecuted instantiation: <rustls::common_state::CommonState>::process_main_protocol::<rustls::server::server_conn::ServerConnectionData> |
235 | | |
236 | 0 | pub(crate) fn write_plaintext( |
237 | 0 | &mut self, |
238 | 0 | payload: OutboundChunks<'_>, |
239 | 0 | outgoing_tls: &mut [u8], |
240 | 0 | ) -> Result<usize, EncryptError> { |
241 | 0 | if payload.is_empty() { |
242 | 0 | return Ok(0); |
243 | 0 | } |
244 | | |
245 | 0 | let fragments = self |
246 | 0 | .message_fragmenter |
247 | 0 | .fragment_payload( |
248 | 0 | ContentType::ApplicationData, |
249 | 0 | ProtocolVersion::TLSv1_2, |
250 | 0 | payload.clone(), |
251 | | ); |
252 | | |
253 | 0 | for f in 0..fragments.len() { |
254 | 0 | match self |
255 | 0 | .record_layer |
256 | 0 | .pre_encrypt_action(f as u64) |
257 | | { |
258 | 0 | PreEncryptAction::Nothing => {} |
259 | 0 | PreEncryptAction::RefreshOrClose => match self.negotiated_version { |
260 | 0 | Some(ProtocolVersion::TLSv1_3) => { |
261 | 0 | // driven by caller, as we don't have the `State` here |
262 | 0 | self.refresh_traffic_keys_pending = true; |
263 | 0 | } |
264 | | _ => { |
265 | 0 | error!( |
266 | | "traffic keys exhausted, closing connection to prevent security failure" |
267 | | ); |
268 | 0 | self.send_close_notify(); |
269 | 0 | return Err(EncryptError::EncryptExhausted); |
270 | | } |
271 | | }, |
272 | | PreEncryptAction::Refuse => { |
273 | 0 | return Err(EncryptError::EncryptExhausted); |
274 | | } |
275 | | } |
276 | | } |
277 | | |
278 | 0 | self.perhaps_write_key_update(); |
279 | | |
280 | 0 | self.check_required_size(outgoing_tls, fragments)?; |
281 | | |
282 | 0 | let fragments = self |
283 | 0 | .message_fragmenter |
284 | 0 | .fragment_payload( |
285 | 0 | ContentType::ApplicationData, |
286 | 0 | ProtocolVersion::TLSv1_2, |
287 | 0 | payload, |
288 | | ); |
289 | | |
290 | 0 | Ok(self.write_fragments(outgoing_tls, fragments)) |
291 | 0 | } |
292 | | |
293 | | // Changing the keys must not span any fragmented handshake |
294 | | // messages. Otherwise the defragmented messages will have |
295 | | // been protected with two different record layer protections, |
296 | | // which is illegal. Not mentioned in RFC. |
297 | 0 | pub(crate) fn check_aligned_handshake(&mut self) -> Result<(), Error> { |
298 | 0 | if !self.aligned_handshake { |
299 | 0 | Err(self.send_fatal_alert( |
300 | 0 | AlertDescription::UnexpectedMessage, |
301 | 0 | PeerMisbehaved::KeyEpochWithPendingFragment, |
302 | 0 | )) |
303 | | } else { |
304 | 0 | Ok(()) |
305 | | } |
306 | 0 | } |
307 | | |
308 | | /// Fragment `m`, encrypt the fragments, and then queue |
309 | | /// the encrypted fragments for sending. |
310 | 0 | pub(crate) fn send_msg_encrypt(&mut self, m: PlainMessage) { |
311 | 0 | let iter = self |
312 | 0 | .message_fragmenter |
313 | 0 | .fragment_message(&m); |
314 | 0 | for m in iter { |
315 | 0 | self.send_single_fragment(m); |
316 | 0 | } |
317 | 0 | } |
318 | | |
319 | | /// Like send_msg_encrypt, but operate on an appdata directly. |
320 | 0 | fn send_appdata_encrypt(&mut self, payload: OutboundChunks<'_>, limit: Limit) -> usize { |
321 | | // Here, the limit on sendable_tls applies to encrypted data, |
322 | | // but we're respecting it for plaintext data -- so we'll |
323 | | // be out by whatever the cipher+record overhead is. That's a |
324 | | // constant and predictable amount, so it's not a terrible issue. |
325 | 0 | let len = match limit { |
326 | | #[cfg(feature = "std")] |
327 | 0 | Limit::Yes => self |
328 | 0 | .sendable_tls |
329 | 0 | .apply_limit(payload.len()), |
330 | 0 | Limit::No => payload.len(), |
331 | | }; |
332 | | |
333 | 0 | let iter = self |
334 | 0 | .message_fragmenter |
335 | 0 | .fragment_payload( |
336 | 0 | ContentType::ApplicationData, |
337 | 0 | ProtocolVersion::TLSv1_2, |
338 | 0 | payload.split_at(len).0, |
339 | | ); |
340 | 0 | for m in iter { |
341 | 0 | self.send_single_fragment(m); |
342 | 0 | } |
343 | | |
344 | 0 | len |
345 | 0 | } |
346 | | |
347 | 0 | fn send_single_fragment(&mut self, m: OutboundPlainMessage<'_>) { |
348 | 0 | if m.typ == ContentType::Alert { |
349 | | // Alerts are always sendable -- never quashed by a PreEncryptAction. |
350 | 0 | let em = self.record_layer.encrypt_outgoing(m); |
351 | 0 | self.queue_tls_message(em); |
352 | 0 | return; |
353 | 0 | } |
354 | | |
355 | 0 | match self |
356 | 0 | .record_layer |
357 | 0 | .next_pre_encrypt_action() |
358 | | { |
359 | 0 | PreEncryptAction::Nothing => {} |
360 | | |
361 | | // Close connection once we start to run out of |
362 | | // sequence space. |
363 | | PreEncryptAction::RefreshOrClose => { |
364 | 0 | match self.negotiated_version { |
365 | 0 | Some(ProtocolVersion::TLSv1_3) => { |
366 | 0 | // driven by caller, as we don't have the `State` here |
367 | 0 | self.refresh_traffic_keys_pending = true; |
368 | 0 | } |
369 | | _ => { |
370 | 0 | error!( |
371 | | "traffic keys exhausted, closing connection to prevent security failure" |
372 | | ); |
373 | 0 | self.send_close_notify(); |
374 | 0 | return; |
375 | | } |
376 | | } |
377 | | } |
378 | | |
379 | | // Refuse to wrap counter at all costs. This |
380 | | // is basically untestable unfortunately. |
381 | | PreEncryptAction::Refuse => { |
382 | 0 | return; |
383 | | } |
384 | | }; |
385 | | |
386 | 0 | let em = self.record_layer.encrypt_outgoing(m); |
387 | 0 | self.queue_tls_message(em); |
388 | 0 | } |
389 | | |
390 | 0 | fn send_plain_non_buffering(&mut self, payload: OutboundChunks<'_>, limit: Limit) -> usize { |
391 | 0 | debug_assert!(self.may_send_application_data); |
392 | 0 | debug_assert!(self.record_layer.is_encrypting()); |
393 | | |
394 | 0 | if payload.is_empty() { |
395 | | // Don't send empty fragments. |
396 | 0 | return 0; |
397 | 0 | } |
398 | | |
399 | 0 | self.send_appdata_encrypt(payload, limit) |
400 | 0 | } |
401 | | |
402 | | /// Mark the connection as ready to send application data. |
403 | | /// |
404 | | /// Also flush `sendable_plaintext` if it is `Some`. |
405 | 0 | pub(crate) fn start_outgoing_traffic( |
406 | 0 | &mut self, |
407 | 0 | sendable_plaintext: &mut Option<&mut ChunkVecBuffer>, |
408 | 0 | ) { |
409 | 0 | self.may_send_application_data = true; |
410 | 0 | if let Some(sendable_plaintext) = sendable_plaintext { |
411 | 0 | self.flush_plaintext(sendable_plaintext); |
412 | 0 | } |
413 | 0 | } |
414 | | |
415 | | /// Mark the connection as ready to send and receive application data. |
416 | | /// |
417 | | /// Also flush `sendable_plaintext` if it is `Some`. |
418 | 0 | pub(crate) fn start_traffic(&mut self, sendable_plaintext: &mut Option<&mut ChunkVecBuffer>) { |
419 | 0 | self.may_receive_application_data = true; |
420 | 0 | self.start_outgoing_traffic(sendable_plaintext); |
421 | 0 | } |
422 | | |
423 | | /// Send any buffered plaintext. Plaintext is buffered if |
424 | | /// written during handshake. |
425 | 0 | fn flush_plaintext(&mut self, sendable_plaintext: &mut ChunkVecBuffer) { |
426 | 0 | if !self.may_send_application_data { |
427 | 0 | return; |
428 | 0 | } |
429 | | |
430 | 0 | while let Some(buf) = sendable_plaintext.pop() { |
431 | 0 | self.send_plain_non_buffering(buf.as_slice().into(), Limit::No); |
432 | 0 | } |
433 | 0 | } |
434 | | |
435 | | // Put m into sendable_tls for writing. |
436 | 0 | fn queue_tls_message(&mut self, m: OutboundOpaqueMessage) { |
437 | 0 | self.perhaps_write_key_update(); |
438 | 0 | self.sendable_tls.append(m.encode()); |
439 | 0 | } |
440 | | |
441 | 0 | pub(crate) fn perhaps_write_key_update(&mut self) { |
442 | 0 | if let Some(message) = self.queued_key_update_message.take() { |
443 | 0 | self.sendable_tls.append(message); |
444 | 0 | } |
445 | 0 | } |
446 | | |
447 | | /// Send a raw TLS message, fragmenting it if needed. |
448 | 0 | pub(crate) fn send_msg(&mut self, m: Message<'_>, must_encrypt: bool) { |
449 | | { |
450 | 0 | if let Protocol::Quic = self.protocol { |
451 | 0 | if let MessagePayload::Alert(alert) = m.payload { |
452 | 0 | self.quic.alert = Some(alert.description); |
453 | 0 | } else { |
454 | 0 | debug_assert!( |
455 | 0 | matches!( |
456 | 0 | m.payload, |
457 | | MessagePayload::Handshake { .. } | MessagePayload::HandshakeFlight(_) |
458 | | ), |
459 | 0 | "QUIC uses TLS for the cryptographic handshake only" |
460 | | ); |
461 | 0 | let mut bytes = Vec::new(); |
462 | 0 | m.payload.encode(&mut bytes); |
463 | 0 | self.quic |
464 | 0 | .hs_queue |
465 | 0 | .push_back((must_encrypt, bytes)); |
466 | | } |
467 | 0 | return; |
468 | 0 | } |
469 | | } |
470 | 0 | if !must_encrypt { |
471 | 0 | let msg = &m.into(); |
472 | 0 | let iter = self |
473 | 0 | .message_fragmenter |
474 | 0 | .fragment_message(msg); |
475 | 0 | for m in iter { |
476 | 0 | self.queue_tls_message(m.to_unencrypted_opaque()); |
477 | 0 | } |
478 | 0 | } else { |
479 | 0 | self.send_msg_encrypt(m.into()); |
480 | 0 | } |
481 | 0 | } |
482 | | |
483 | 0 | pub(crate) fn take_received_plaintext(&mut self, bytes: Payload<'_>) { |
484 | 0 | self.temper_counters.received_app_data(); |
485 | 0 | self.received_plaintext |
486 | 0 | .append(bytes.into_vec()); |
487 | 0 | } |
488 | | |
489 | | #[cfg(feature = "tls12")] |
490 | 0 | pub(crate) fn start_encryption_tls12(&mut self, secrets: &ConnectionSecrets, side: Side) { |
491 | 0 | let (dec, enc) = secrets.make_cipher_pair(side); |
492 | 0 | self.record_layer |
493 | 0 | .prepare_message_encrypter( |
494 | 0 | enc, |
495 | 0 | secrets |
496 | 0 | .suite() |
497 | 0 | .common |
498 | 0 | .confidentiality_limit, |
499 | | ); |
500 | 0 | self.record_layer |
501 | 0 | .prepare_message_decrypter(dec); |
502 | 0 | } |
503 | | |
504 | 0 | pub(crate) fn missing_extension(&mut self, why: PeerMisbehaved) -> Error { |
505 | 0 | self.send_fatal_alert(AlertDescription::MissingExtension, why) |
506 | 0 | } |
507 | | |
508 | 0 | fn send_warning_alert(&mut self, desc: AlertDescription) { |
509 | 0 | warn!("Sending warning alert {desc:?}"); |
510 | 0 | self.send_warning_alert_no_log(desc); |
511 | 0 | } |
512 | | |
513 | 0 | pub(crate) fn process_alert(&mut self, alert: &AlertMessagePayload) -> Result<(), Error> { |
514 | | // Reject unknown AlertLevels. |
515 | 0 | if let AlertLevel::Unknown(_) = alert.level { |
516 | 0 | return Err(self.send_fatal_alert( |
517 | 0 | AlertDescription::IllegalParameter, |
518 | 0 | Error::AlertReceived(alert.description), |
519 | 0 | )); |
520 | 0 | } |
521 | | |
522 | | // If we get a CloseNotify, make a note to declare EOF to our |
523 | | // caller. But do not treat unauthenticated alerts like this. |
524 | 0 | if self.may_receive_application_data && alert.description == AlertDescription::CloseNotify { |
525 | 0 | self.has_received_close_notify = true; |
526 | 0 | return Ok(()); |
527 | 0 | } |
528 | | |
529 | | // Warnings are nonfatal for TLS1.2, but outlawed in TLS1.3 |
530 | | // (except, for no good reason, user_cancelled). |
531 | 0 | let err = Error::AlertReceived(alert.description); |
532 | 0 | if alert.level == AlertLevel::Warning { |
533 | 0 | self.temper_counters |
534 | 0 | .received_warning_alert()?; |
535 | 0 | if self.is_tls13() && alert.description != AlertDescription::UserCanceled { |
536 | 0 | return Err(self.send_fatal_alert(AlertDescription::DecodeError, err)); |
537 | 0 | } |
538 | | |
539 | | // Some implementations send pointless `user_canceled` alerts, don't log them |
540 | | // in release mode (https://bugs.openjdk.org/browse/JDK-8323517). |
541 | 0 | if alert.description != AlertDescription::UserCanceled || cfg!(debug_assertions) { |
542 | 0 | warn!("TLS alert warning received: {alert:?}"); |
543 | 0 | } |
544 | | |
545 | 0 | return Ok(()); |
546 | 0 | } |
547 | | |
548 | 0 | Err(err) |
549 | 0 | } |
550 | | |
551 | 0 | pub(crate) fn send_cert_verify_error_alert(&mut self, err: Error) -> Error { |
552 | 0 | self.send_fatal_alert( |
553 | 0 | match &err { |
554 | 0 | Error::InvalidCertificate(e) => e.clone().into(), |
555 | 0 | Error::PeerMisbehaved(_) => AlertDescription::IllegalParameter, |
556 | 0 | _ => AlertDescription::HandshakeFailure, |
557 | | }, |
558 | 0 | err, |
559 | | ) |
560 | 0 | } |
561 | | |
562 | 0 | pub(crate) fn send_fatal_alert( |
563 | 0 | &mut self, |
564 | 0 | desc: AlertDescription, |
565 | 0 | err: impl Into<Error>, |
566 | 0 | ) -> Error { |
567 | 0 | debug_assert!(!self.sent_fatal_alert); |
568 | 0 | let m = Message::build_alert(AlertLevel::Fatal, desc); |
569 | 0 | self.send_msg(m, self.record_layer.is_encrypting()); |
570 | 0 | self.sent_fatal_alert = true; |
571 | 0 | err.into() |
572 | 0 | } Unexecuted instantiation: <rustls::common_state::CommonState>::send_fatal_alert::<rustls::error::InvalidMessage> Unexecuted instantiation: <rustls::common_state::CommonState>::send_fatal_alert::<rustls::error::PeerMisbehaved> Unexecuted instantiation: <rustls::common_state::CommonState>::send_fatal_alert::<rustls::error::PeerIncompatible> Unexecuted instantiation: <rustls::common_state::CommonState>::send_fatal_alert::<rustls::error::Error> |
573 | | |
574 | | /// Queues a `close_notify` warning alert to be sent in the next |
575 | | /// [`Connection::write_tls`] call. This informs the peer that the |
576 | | /// connection is being closed. |
577 | | /// |
578 | | /// Does nothing if any `close_notify` or fatal alert was already sent. |
579 | | /// |
580 | | /// [`Connection::write_tls`]: crate::Connection::write_tls |
581 | 0 | pub fn send_close_notify(&mut self) { |
582 | 0 | if self.sent_fatal_alert { |
583 | 0 | return; |
584 | 0 | } |
585 | 0 | debug!("Sending warning alert {:?}", AlertDescription::CloseNotify); |
586 | 0 | self.sent_fatal_alert = true; |
587 | 0 | self.has_sent_close_notify = true; |
588 | 0 | self.send_warning_alert_no_log(AlertDescription::CloseNotify); |
589 | 0 | } |
590 | | |
591 | 0 | pub(crate) fn eager_send_close_notify( |
592 | 0 | &mut self, |
593 | 0 | outgoing_tls: &mut [u8], |
594 | 0 | ) -> Result<usize, EncryptError> { |
595 | 0 | self.send_close_notify(); |
596 | 0 | self.check_required_size(outgoing_tls, [].into_iter())?; |
597 | 0 | Ok(self.write_fragments(outgoing_tls, [].into_iter())) |
598 | 0 | } |
599 | | |
600 | 0 | fn send_warning_alert_no_log(&mut self, desc: AlertDescription) { |
601 | 0 | let m = Message::build_alert(AlertLevel::Warning, desc); |
602 | 0 | self.send_msg(m, self.record_layer.is_encrypting()); |
603 | 0 | } |
604 | | |
605 | 0 | fn check_required_size<'a>( |
606 | 0 | &self, |
607 | 0 | outgoing_tls: &mut [u8], |
608 | 0 | fragments: impl Iterator<Item = OutboundPlainMessage<'a>>, |
609 | 0 | ) -> Result<(), EncryptError> { |
610 | 0 | let mut required_size = self.sendable_tls.len(); |
611 | | |
612 | 0 | for m in fragments { |
613 | 0 | required_size += m.encoded_len(&self.record_layer); |
614 | 0 | } |
615 | | |
616 | 0 | if required_size > outgoing_tls.len() { |
617 | 0 | return Err(EncryptError::InsufficientSize(InsufficientSizeError { |
618 | 0 | required_size, |
619 | 0 | })); |
620 | 0 | } |
621 | | |
622 | 0 | Ok(()) |
623 | 0 | } Unexecuted instantiation: <rustls::common_state::CommonState>::check_required_size::<core::array::iter::IntoIter<rustls::msgs::message::outbound::OutboundPlainMessage, 0>> Unexecuted instantiation: <rustls::common_state::CommonState>::check_required_size::<core::iter::adapters::map::Map<rustls::msgs::fragmenter::Chunker, <rustls::msgs::fragmenter::MessageFragmenter>::fragment_payload::{closure#0}>> |
624 | | |
625 | 0 | fn write_fragments<'a>( |
626 | 0 | &mut self, |
627 | 0 | outgoing_tls: &mut [u8], |
628 | 0 | fragments: impl Iterator<Item = OutboundPlainMessage<'a>>, |
629 | 0 | ) -> usize { |
630 | 0 | let mut written = 0; |
631 | | |
632 | | // Any pre-existing encrypted messages in `sendable_tls` must |
633 | | // be output before encrypting any of the `fragments`. |
634 | 0 | while let Some(message) = self.sendable_tls.pop() { |
635 | 0 | let len = message.len(); |
636 | 0 | outgoing_tls[written..written + len].copy_from_slice(&message); |
637 | 0 | written += len; |
638 | 0 | } |
639 | | |
640 | 0 | for m in fragments { |
641 | 0 | let em = self |
642 | 0 | .record_layer |
643 | 0 | .encrypt_outgoing(m) |
644 | 0 | .encode(); |
645 | 0 |
|
646 | 0 | let len = em.len(); |
647 | 0 | outgoing_tls[written..written + len].copy_from_slice(&em); |
648 | 0 | written += len; |
649 | 0 | } |
650 | | |
651 | 0 | written |
652 | 0 | } Unexecuted instantiation: <rustls::common_state::CommonState>::write_fragments::<core::array::iter::IntoIter<rustls::msgs::message::outbound::OutboundPlainMessage, 0>> Unexecuted instantiation: <rustls::common_state::CommonState>::write_fragments::<core::iter::adapters::map::Map<rustls::msgs::fragmenter::Chunker, <rustls::msgs::fragmenter::MessageFragmenter>::fragment_payload::{closure#0}>> |
653 | | |
654 | 0 | pub(crate) fn set_max_fragment_size(&mut self, new: Option<usize>) -> Result<(), Error> { |
655 | 0 | self.message_fragmenter |
656 | 0 | .set_max_fragment_size(new) |
657 | 0 | } |
658 | | |
659 | 0 | pub(crate) fn get_alpn_protocol(&self) -> Option<&[u8]> { |
660 | 0 | self.alpn_protocol |
661 | 0 | .as_ref() |
662 | 0 | .map(AsRef::as_ref) |
663 | 0 | } |
664 | | |
665 | | /// Returns true if the caller should call [`Connection::read_tls`] as soon |
666 | | /// as possible. |
667 | | /// |
668 | | /// If there is pending plaintext data to read with [`Connection::reader`], |
669 | | /// this returns false. If your application respects this mechanism, |
670 | | /// only one full TLS message will be buffered by rustls. |
671 | | /// |
672 | | /// [`Connection::reader`]: crate::Connection::reader |
673 | | /// [`Connection::read_tls`]: crate::Connection::read_tls |
674 | 0 | pub fn wants_read(&self) -> bool { |
675 | | // We want to read more data all the time, except when we have unprocessed plaintext. |
676 | | // This provides back-pressure to the TCP buffers. We also don't want to read more after |
677 | | // the peer has sent us a close notification. |
678 | | // |
679 | | // In the handshake case we don't have readable plaintext before the handshake has |
680 | | // completed, but also don't want to read if we still have sendable tls. |
681 | 0 | self.received_plaintext.is_empty() |
682 | 0 | && !self.has_received_close_notify |
683 | 0 | && (self.may_send_application_data || self.sendable_tls.is_empty()) |
684 | 0 | } |
685 | | |
686 | 0 | pub(crate) fn current_io_state(&self) -> IoState { |
687 | 0 | IoState { |
688 | 0 | tls_bytes_to_write: self.sendable_tls.len(), |
689 | 0 | plaintext_bytes_to_read: self.received_plaintext.len(), |
690 | 0 | peer_has_closed: self.has_received_close_notify, |
691 | 0 | } |
692 | 0 | } |
693 | | |
694 | 0 | pub(crate) fn is_quic(&self) -> bool { |
695 | 0 | self.protocol == Protocol::Quic |
696 | 0 | } |
697 | | |
698 | 0 | pub(crate) fn should_update_key( |
699 | 0 | &mut self, |
700 | 0 | key_update_request: &KeyUpdateRequest, |
701 | 0 | ) -> Result<bool, Error> { |
702 | 0 | self.temper_counters |
703 | 0 | .received_key_update_request()?; |
704 | | |
705 | 0 | match key_update_request { |
706 | 0 | KeyUpdateRequest::UpdateNotRequested => Ok(false), |
707 | 0 | KeyUpdateRequest::UpdateRequested => Ok(self.queued_key_update_message.is_none()), |
708 | 0 | _ => Err(self.send_fatal_alert( |
709 | 0 | AlertDescription::IllegalParameter, |
710 | 0 | InvalidMessage::InvalidKeyUpdate, |
711 | 0 | )), |
712 | | } |
713 | 0 | } |
714 | | |
715 | 0 | pub(crate) fn enqueue_key_update_notification(&mut self) { |
716 | 0 | let message = PlainMessage::from(Message::build_key_update_notify()); |
717 | 0 | self.queued_key_update_message = Some( |
718 | 0 | self.record_layer |
719 | 0 | .encrypt_outgoing(message.borrow_outbound()) |
720 | 0 | .encode(), |
721 | 0 | ); |
722 | 0 | } |
723 | | |
724 | 0 | pub(crate) fn received_tls13_change_cipher_spec(&mut self) -> Result<(), Error> { |
725 | 0 | self.temper_counters |
726 | 0 | .received_tls13_change_cipher_spec() |
727 | 0 | } |
728 | | } |
729 | | |
730 | | #[cfg(feature = "std")] |
731 | | impl CommonState { |
732 | | /// Send plaintext application data, fragmenting and |
733 | | /// encrypting it as it goes out. |
734 | | /// |
735 | | /// If internal buffers are too small, this function will not accept |
736 | | /// all the data. |
737 | 0 | pub(crate) fn buffer_plaintext( |
738 | 0 | &mut self, |
739 | 0 | payload: OutboundChunks<'_>, |
740 | 0 | sendable_plaintext: &mut ChunkVecBuffer, |
741 | 0 | ) -> usize { |
742 | 0 | self.perhaps_write_key_update(); |
743 | 0 | self.send_plain(payload, Limit::Yes, sendable_plaintext) |
744 | 0 | } |
745 | | |
746 | 0 | pub(crate) fn send_early_plaintext(&mut self, data: &[u8]) -> usize { |
747 | 0 | debug_assert!(self.early_traffic); |
748 | 0 | debug_assert!(self.record_layer.is_encrypting()); |
749 | | |
750 | 0 | if data.is_empty() { |
751 | | // Don't send empty fragments. |
752 | 0 | return 0; |
753 | 0 | } |
754 | | |
755 | 0 | self.send_appdata_encrypt(data.into(), Limit::Yes) |
756 | 0 | } |
757 | | |
758 | | /// Encrypt and send some plaintext `data`. `limit` controls |
759 | | /// whether the per-connection buffer limits apply. |
760 | | /// |
761 | | /// Returns the number of bytes written from `data`: this might |
762 | | /// be less than `data.len()` if buffer limits were exceeded. |
763 | 0 | fn send_plain( |
764 | 0 | &mut self, |
765 | 0 | payload: OutboundChunks<'_>, |
766 | 0 | limit: Limit, |
767 | 0 | sendable_plaintext: &mut ChunkVecBuffer, |
768 | 0 | ) -> usize { |
769 | 0 | if !self.may_send_application_data { |
770 | | // If we haven't completed handshaking, buffer |
771 | | // plaintext to send once we do. |
772 | 0 | let len = match limit { |
773 | 0 | Limit::Yes => sendable_plaintext.append_limited_copy(payload), |
774 | 0 | Limit::No => sendable_plaintext.append(payload.to_vec()), |
775 | | }; |
776 | 0 | return len; |
777 | 0 | } |
778 | | |
779 | 0 | self.send_plain_non_buffering(payload, limit) |
780 | 0 | } |
781 | | } |
782 | | |
783 | | /// Describes which sort of handshake happened. |
784 | | #[derive(Debug, PartialEq, Clone, Copy)] |
785 | | pub enum HandshakeKind { |
786 | | /// A full handshake. |
787 | | /// |
788 | | /// This is the typical TLS connection initiation process when resumption is |
789 | | /// not yet unavailable, and the initial `ClientHello` was accepted by the server. |
790 | | Full, |
791 | | |
792 | | /// A full TLS1.3 handshake, with an extra round-trip for a `HelloRetryRequest`. |
793 | | /// |
794 | | /// The server can respond with a `HelloRetryRequest` if the initial `ClientHello` |
795 | | /// is unacceptable for several reasons, the most likely if no supported key |
796 | | /// shares were offered by the client. |
797 | | FullWithHelloRetryRequest, |
798 | | |
799 | | /// A resumed handshake. |
800 | | /// |
801 | | /// Resumed handshakes involve fewer round trips and less cryptography than |
802 | | /// full ones, but can only happen when the peers have previously done a full |
803 | | /// handshake together, and then remember data about it. |
804 | | Resumed, |
805 | | } |
806 | | |
807 | | /// Values of this structure are returned from [`Connection::process_new_packets`] |
808 | | /// and tell the caller the current I/O state of the TLS connection. |
809 | | /// |
810 | | /// [`Connection::process_new_packets`]: crate::Connection::process_new_packets |
811 | | #[derive(Debug, Eq, PartialEq)] |
812 | | pub struct IoState { |
813 | | tls_bytes_to_write: usize, |
814 | | plaintext_bytes_to_read: usize, |
815 | | peer_has_closed: bool, |
816 | | } |
817 | | |
818 | | impl IoState { |
819 | | /// How many bytes could be written by [`Connection::write_tls`] if called |
820 | | /// right now. A non-zero value implies [`CommonState::wants_write`]. |
821 | | /// |
822 | | /// [`Connection::write_tls`]: crate::Connection::write_tls |
823 | 0 | pub fn tls_bytes_to_write(&self) -> usize { |
824 | 0 | self.tls_bytes_to_write |
825 | 0 | } |
826 | | |
827 | | /// How many plaintext bytes could be obtained via [`std::io::Read`] |
828 | | /// without further I/O. |
829 | 0 | pub fn plaintext_bytes_to_read(&self) -> usize { |
830 | 0 | self.plaintext_bytes_to_read |
831 | 0 | } |
832 | | |
833 | | /// True if the peer has sent us a close_notify alert. This is |
834 | | /// the TLS mechanism to securely half-close a TLS connection, |
835 | | /// and signifies that the peer will not send any further data |
836 | | /// on this connection. |
837 | | /// |
838 | | /// This is also signalled via returning `Ok(0)` from |
839 | | /// [`std::io::Read`], after all the received bytes have been |
840 | | /// retrieved. |
841 | 0 | pub fn peer_has_closed(&self) -> bool { |
842 | 0 | self.peer_has_closed |
843 | 0 | } |
844 | | } |
845 | | |
846 | | pub(crate) trait State<Data>: Send + Sync { |
847 | | fn handle<'m>( |
848 | | self: Box<Self>, |
849 | | cx: &mut Context<'_, Data>, |
850 | | message: Message<'m>, |
851 | | ) -> Result<Box<dyn State<Data> + 'm>, Error> |
852 | | where |
853 | | Self: 'm; |
854 | | |
855 | 0 | fn export_keying_material( |
856 | 0 | &self, |
857 | 0 | _output: &mut [u8], |
858 | 0 | _label: &[u8], |
859 | 0 | _context: Option<&[u8]>, |
860 | 0 | ) -> Result<(), Error> { |
861 | 0 | Err(Error::HandshakeNotComplete) |
862 | 0 | } Unexecuted instantiation: <rustls::client::hs::ExpectServerHello as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::export_keying_material Unexecuted instantiation: <rustls::client::hs::ExpectServerHelloOrHelloRetryRequest as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::export_keying_material Unexecuted instantiation: <rustls::server::hs::ExpectClientHello as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::export_keying_material Unexecuted instantiation: <rustls::server::server_conn::Accepting as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::export_keying_material Unexecuted instantiation: <rustls::client::tls12::ExpectFinished as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::export_keying_material Unexecuted instantiation: <rustls::client::tls12::ExpectServerKx as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::export_keying_material Unexecuted instantiation: <rustls::client::tls12::ExpectNewTicket as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::export_keying_material Unexecuted instantiation: <rustls::client::tls12::ExpectServerDone as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::export_keying_material Unexecuted instantiation: <rustls::client::tls12::ExpectCertificate as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::export_keying_material Unexecuted instantiation: <rustls::client::tls12::ExpectCertificateStatus as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::export_keying_material Unexecuted instantiation: <rustls::client::tls12::ExpectCertificateRequest as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::export_keying_material Unexecuted instantiation: <rustls::client::tls12::ExpectServerDoneOrCertReq as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::export_keying_material Unexecuted instantiation: <rustls::client::tls12::ExpectCertificateStatusOrServerKx as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::export_keying_material Unexecuted instantiation: <rustls::client::tls12::ExpectCcs as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::export_keying_material Unexecuted instantiation: <rustls::client::tls13::ExpectFinished as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::export_keying_material Unexecuted instantiation: <rustls::client::tls13::ExpectCertificate as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::export_keying_material Unexecuted instantiation: <rustls::client::tls13::ExpectCertificateVerify as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::export_keying_material Unexecuted instantiation: <rustls::client::tls13::ExpectCertificateRequest as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::export_keying_material Unexecuted instantiation: <rustls::client::tls13::ExpectEncryptedExtensions as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::export_keying_material Unexecuted instantiation: <rustls::client::tls13::ExpectCertificateOrCertReq as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::export_keying_material Unexecuted instantiation: <rustls::client::tls13::ExpectCompressedCertificate as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::export_keying_material Unexecuted instantiation: <rustls::client::tls13::ExpectCertificateOrCompressedCertificate as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::export_keying_material Unexecuted instantiation: <rustls::client::tls13::ExpectCertificateOrCompressedCertificateOrCertReq as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::export_keying_material Unexecuted instantiation: <rustls::server::tls12::ExpectClientKx as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::export_keying_material Unexecuted instantiation: <rustls::server::tls12::ExpectFinished as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::export_keying_material Unexecuted instantiation: <rustls::server::tls12::ExpectCertificate as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::export_keying_material Unexecuted instantiation: <rustls::server::tls12::ExpectCertificateVerify as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::export_keying_material Unexecuted instantiation: <rustls::server::tls12::ExpectCcs as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::export_keying_material Unexecuted instantiation: <rustls::server::tls13::ExpectFinished as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::export_keying_material Unexecuted instantiation: <rustls::server::tls13::ExpectEarlyData as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::export_keying_material Unexecuted instantiation: <rustls::server::tls13::ExpectCertificate as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::export_keying_material Unexecuted instantiation: <rustls::server::tls13::ExpectCertificateVerify as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::export_keying_material Unexecuted instantiation: <rustls::server::tls13::ExpectCompressedCertificate as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::export_keying_material Unexecuted instantiation: <rustls::server::tls13::ExpectAndSkipRejectedEarlyData as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::export_keying_material Unexecuted instantiation: <rustls::server::tls13::ExpectCertificateOrCompressedCertificate as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::export_keying_material |
863 | | |
864 | 0 | fn extract_secrets(&self) -> Result<PartiallyExtractedSecrets, Error> { |
865 | 0 | Err(Error::HandshakeNotComplete) |
866 | 0 | } Unexecuted instantiation: <rustls::client::hs::ExpectServerHello as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::extract_secrets Unexecuted instantiation: <rustls::client::hs::ExpectServerHelloOrHelloRetryRequest as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::extract_secrets Unexecuted instantiation: <rustls::server::hs::ExpectClientHello as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::extract_secrets Unexecuted instantiation: <rustls::server::server_conn::Accepting as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::extract_secrets Unexecuted instantiation: <rustls::client::tls12::ExpectFinished as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::extract_secrets Unexecuted instantiation: <rustls::client::tls12::ExpectServerKx as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::extract_secrets Unexecuted instantiation: <rustls::client::tls12::ExpectNewTicket as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::extract_secrets Unexecuted instantiation: <rustls::client::tls12::ExpectServerDone as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::extract_secrets Unexecuted instantiation: <rustls::client::tls12::ExpectCertificate as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::extract_secrets Unexecuted instantiation: <rustls::client::tls12::ExpectCertificateStatus as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::extract_secrets Unexecuted instantiation: <rustls::client::tls12::ExpectCertificateRequest as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::extract_secrets Unexecuted instantiation: <rustls::client::tls12::ExpectServerDoneOrCertReq as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::extract_secrets Unexecuted instantiation: <rustls::client::tls12::ExpectCertificateStatusOrServerKx as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::extract_secrets Unexecuted instantiation: <rustls::client::tls12::ExpectCcs as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::extract_secrets Unexecuted instantiation: <rustls::client::tls13::ExpectFinished as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::extract_secrets Unexecuted instantiation: <rustls::client::tls13::ExpectCertificate as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::extract_secrets Unexecuted instantiation: <rustls::client::tls13::ExpectQuicTraffic as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::extract_secrets Unexecuted instantiation: <rustls::client::tls13::ExpectCertificateVerify as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::extract_secrets Unexecuted instantiation: <rustls::client::tls13::ExpectCertificateRequest as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::extract_secrets Unexecuted instantiation: <rustls::client::tls13::ExpectEncryptedExtensions as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::extract_secrets Unexecuted instantiation: <rustls::client::tls13::ExpectCertificateOrCertReq as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::extract_secrets Unexecuted instantiation: <rustls::client::tls13::ExpectCompressedCertificate as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::extract_secrets Unexecuted instantiation: <rustls::client::tls13::ExpectCertificateOrCompressedCertificate as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::extract_secrets Unexecuted instantiation: <rustls::client::tls13::ExpectCertificateOrCompressedCertificateOrCertReq as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::extract_secrets Unexecuted instantiation: <rustls::server::tls12::ExpectClientKx as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::extract_secrets Unexecuted instantiation: <rustls::server::tls12::ExpectFinished as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::extract_secrets Unexecuted instantiation: <rustls::server::tls12::ExpectCertificate as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::extract_secrets Unexecuted instantiation: <rustls::server::tls12::ExpectCertificateVerify as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::extract_secrets Unexecuted instantiation: <rustls::server::tls12::ExpectCcs as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::extract_secrets Unexecuted instantiation: <rustls::server::tls13::ExpectFinished as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::extract_secrets Unexecuted instantiation: <rustls::server::tls13::ExpectEarlyData as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::extract_secrets Unexecuted instantiation: <rustls::server::tls13::ExpectCertificate as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::extract_secrets Unexecuted instantiation: <rustls::server::tls13::ExpectQuicTraffic as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::extract_secrets Unexecuted instantiation: <rustls::server::tls13::ExpectCertificateVerify as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::extract_secrets Unexecuted instantiation: <rustls::server::tls13::ExpectCompressedCertificate as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::extract_secrets Unexecuted instantiation: <rustls::server::tls13::ExpectAndSkipRejectedEarlyData as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::extract_secrets Unexecuted instantiation: <rustls::server::tls13::ExpectCertificateOrCompressedCertificate as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::extract_secrets |
867 | | |
868 | 0 | fn send_key_update_request(&mut self, _common: &mut CommonState) -> Result<(), Error> { |
869 | 0 | Err(Error::HandshakeNotComplete) |
870 | 0 | } Unexecuted instantiation: <rustls::client::hs::ExpectServerHello as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::send_key_update_request Unexecuted instantiation: <rustls::client::hs::ExpectServerHelloOrHelloRetryRequest as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::send_key_update_request Unexecuted instantiation: <rustls::server::hs::ExpectClientHello as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::send_key_update_request Unexecuted instantiation: <rustls::server::server_conn::Accepting as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::send_key_update_request Unexecuted instantiation: <rustls::client::tls12::ExpectTraffic as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::send_key_update_request Unexecuted instantiation: <rustls::client::tls12::ExpectFinished as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::send_key_update_request Unexecuted instantiation: <rustls::client::tls12::ExpectServerKx as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::send_key_update_request Unexecuted instantiation: <rustls::client::tls12::ExpectNewTicket as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::send_key_update_request Unexecuted instantiation: <rustls::client::tls12::ExpectServerDone as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::send_key_update_request Unexecuted instantiation: <rustls::client::tls12::ExpectCertificate as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::send_key_update_request Unexecuted instantiation: <rustls::client::tls12::ExpectCertificateStatus as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::send_key_update_request Unexecuted instantiation: <rustls::client::tls12::ExpectCertificateRequest as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::send_key_update_request Unexecuted instantiation: <rustls::client::tls12::ExpectServerDoneOrCertReq as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::send_key_update_request Unexecuted instantiation: <rustls::client::tls12::ExpectCertificateStatusOrServerKx as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::send_key_update_request Unexecuted instantiation: <rustls::client::tls12::ExpectCcs as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::send_key_update_request Unexecuted instantiation: <rustls::client::tls13::ExpectFinished as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::send_key_update_request Unexecuted instantiation: <rustls::client::tls13::ExpectCertificate as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::send_key_update_request Unexecuted instantiation: <rustls::client::tls13::ExpectQuicTraffic as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::send_key_update_request Unexecuted instantiation: <rustls::client::tls13::ExpectCertificateVerify as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::send_key_update_request Unexecuted instantiation: <rustls::client::tls13::ExpectCertificateRequest as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::send_key_update_request Unexecuted instantiation: <rustls::client::tls13::ExpectEncryptedExtensions as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::send_key_update_request Unexecuted instantiation: <rustls::client::tls13::ExpectCertificateOrCertReq as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::send_key_update_request Unexecuted instantiation: <rustls::client::tls13::ExpectCompressedCertificate as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::send_key_update_request Unexecuted instantiation: <rustls::client::tls13::ExpectCertificateOrCompressedCertificate as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::send_key_update_request Unexecuted instantiation: <rustls::client::tls13::ExpectCertificateOrCompressedCertificateOrCertReq as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::send_key_update_request Unexecuted instantiation: <rustls::server::tls12::ExpectTraffic as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::send_key_update_request Unexecuted instantiation: <rustls::server::tls12::ExpectClientKx as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::send_key_update_request Unexecuted instantiation: <rustls::server::tls12::ExpectFinished as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::send_key_update_request Unexecuted instantiation: <rustls::server::tls12::ExpectCertificate as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::send_key_update_request Unexecuted instantiation: <rustls::server::tls12::ExpectCertificateVerify as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::send_key_update_request Unexecuted instantiation: <rustls::server::tls12::ExpectCcs as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::send_key_update_request Unexecuted instantiation: <rustls::server::tls13::ExpectFinished as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::send_key_update_request Unexecuted instantiation: <rustls::server::tls13::ExpectEarlyData as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::send_key_update_request Unexecuted instantiation: <rustls::server::tls13::ExpectCertificate as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::send_key_update_request Unexecuted instantiation: <rustls::server::tls13::ExpectQuicTraffic as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::send_key_update_request Unexecuted instantiation: <rustls::server::tls13::ExpectCertificateVerify as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::send_key_update_request Unexecuted instantiation: <rustls::server::tls13::ExpectCompressedCertificate as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::send_key_update_request Unexecuted instantiation: <rustls::server::tls13::ExpectAndSkipRejectedEarlyData as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::send_key_update_request Unexecuted instantiation: <rustls::server::tls13::ExpectCertificateOrCompressedCertificate as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::send_key_update_request |
871 | | |
872 | 0 | fn handle_decrypt_error(&self) {}Unexecuted instantiation: <rustls::client::hs::ExpectServerHello as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::handle_decrypt_error Unexecuted instantiation: <rustls::client::hs::ExpectServerHelloOrHelloRetryRequest as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::handle_decrypt_error Unexecuted instantiation: <rustls::server::hs::ExpectClientHello as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::handle_decrypt_error Unexecuted instantiation: <rustls::server::server_conn::Accepting as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::handle_decrypt_error Unexecuted instantiation: <rustls::client::tls12::ExpectTraffic as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::handle_decrypt_error Unexecuted instantiation: <rustls::client::tls12::ExpectServerKx as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::handle_decrypt_error Unexecuted instantiation: <rustls::client::tls12::ExpectNewTicket as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::handle_decrypt_error Unexecuted instantiation: <rustls::client::tls12::ExpectServerDone as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::handle_decrypt_error Unexecuted instantiation: <rustls::client::tls12::ExpectCertificate as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::handle_decrypt_error Unexecuted instantiation: <rustls::client::tls12::ExpectCertificateStatus as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::handle_decrypt_error Unexecuted instantiation: <rustls::client::tls12::ExpectCertificateRequest as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::handle_decrypt_error Unexecuted instantiation: <rustls::client::tls12::ExpectServerDoneOrCertReq as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::handle_decrypt_error Unexecuted instantiation: <rustls::client::tls12::ExpectCertificateStatusOrServerKx as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::handle_decrypt_error Unexecuted instantiation: <rustls::client::tls12::ExpectCcs as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::handle_decrypt_error Unexecuted instantiation: <rustls::client::tls13::ExpectTraffic as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::handle_decrypt_error Unexecuted instantiation: <rustls::client::tls13::ExpectFinished as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::handle_decrypt_error Unexecuted instantiation: <rustls::client::tls13::ExpectCertificate as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::handle_decrypt_error Unexecuted instantiation: <rustls::client::tls13::ExpectQuicTraffic as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::handle_decrypt_error Unexecuted instantiation: <rustls::client::tls13::ExpectCertificateVerify as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::handle_decrypt_error Unexecuted instantiation: <rustls::client::tls13::ExpectCertificateRequest as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::handle_decrypt_error Unexecuted instantiation: <rustls::client::tls13::ExpectEncryptedExtensions as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::handle_decrypt_error Unexecuted instantiation: <rustls::client::tls13::ExpectCertificateOrCertReq as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::handle_decrypt_error Unexecuted instantiation: <rustls::client::tls13::ExpectCompressedCertificate as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::handle_decrypt_error Unexecuted instantiation: <rustls::client::tls13::ExpectCertificateOrCompressedCertificate as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::handle_decrypt_error Unexecuted instantiation: <rustls::client::tls13::ExpectCertificateOrCompressedCertificateOrCertReq as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::handle_decrypt_error Unexecuted instantiation: <rustls::server::tls12::ExpectTraffic as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::handle_decrypt_error Unexecuted instantiation: <rustls::server::tls12::ExpectClientKx as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::handle_decrypt_error Unexecuted instantiation: <rustls::server::tls12::ExpectFinished as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::handle_decrypt_error Unexecuted instantiation: <rustls::server::tls12::ExpectCertificate as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::handle_decrypt_error Unexecuted instantiation: <rustls::server::tls12::ExpectCertificateVerify as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::handle_decrypt_error Unexecuted instantiation: <rustls::server::tls12::ExpectCcs as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::handle_decrypt_error Unexecuted instantiation: <rustls::server::tls13::ExpectTraffic as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::handle_decrypt_error Unexecuted instantiation: <rustls::server::tls13::ExpectFinished as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::handle_decrypt_error Unexecuted instantiation: <rustls::server::tls13::ExpectEarlyData as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::handle_decrypt_error Unexecuted instantiation: <rustls::server::tls13::ExpectCertificate as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::handle_decrypt_error Unexecuted instantiation: <rustls::server::tls13::ExpectQuicTraffic as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::handle_decrypt_error Unexecuted instantiation: <rustls::server::tls13::ExpectCertificateVerify as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::handle_decrypt_error Unexecuted instantiation: <rustls::server::tls13::ExpectCompressedCertificate as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::handle_decrypt_error Unexecuted instantiation: <rustls::server::tls13::ExpectAndSkipRejectedEarlyData as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::handle_decrypt_error Unexecuted instantiation: <rustls::server::tls13::ExpectCertificateOrCompressedCertificate as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::handle_decrypt_error |
873 | | |
874 | 0 | fn into_external_state(self: Box<Self>) -> Result<Box<dyn KernelState + 'static>, Error> { |
875 | 0 | Err(Error::HandshakeNotComplete) |
876 | 0 | } Unexecuted instantiation: <rustls::client::hs::ExpectServerHello as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::into_external_state Unexecuted instantiation: <rustls::client::hs::ExpectServerHelloOrHelloRetryRequest as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::into_external_state Unexecuted instantiation: <rustls::server::hs::ExpectClientHello as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::into_external_state Unexecuted instantiation: <rustls::server::server_conn::Accepting as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::into_external_state Unexecuted instantiation: <rustls::client::tls12::ExpectFinished as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::into_external_state Unexecuted instantiation: <rustls::client::tls12::ExpectServerKx as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::into_external_state Unexecuted instantiation: <rustls::client::tls12::ExpectNewTicket as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::into_external_state Unexecuted instantiation: <rustls::client::tls12::ExpectServerDone as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::into_external_state Unexecuted instantiation: <rustls::client::tls12::ExpectCertificate as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::into_external_state Unexecuted instantiation: <rustls::client::tls12::ExpectCertificateStatus as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::into_external_state Unexecuted instantiation: <rustls::client::tls12::ExpectCertificateRequest as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::into_external_state Unexecuted instantiation: <rustls::client::tls12::ExpectServerDoneOrCertReq as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::into_external_state Unexecuted instantiation: <rustls::client::tls12::ExpectCertificateStatusOrServerKx as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::into_external_state Unexecuted instantiation: <rustls::client::tls12::ExpectCcs as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::into_external_state Unexecuted instantiation: <rustls::client::tls13::ExpectFinished as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::into_external_state Unexecuted instantiation: <rustls::client::tls13::ExpectCertificate as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::into_external_state Unexecuted instantiation: <rustls::client::tls13::ExpectCertificateVerify as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::into_external_state Unexecuted instantiation: <rustls::client::tls13::ExpectCertificateRequest as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::into_external_state Unexecuted instantiation: <rustls::client::tls13::ExpectEncryptedExtensions as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::into_external_state Unexecuted instantiation: <rustls::client::tls13::ExpectCertificateOrCertReq as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::into_external_state Unexecuted instantiation: <rustls::client::tls13::ExpectCompressedCertificate as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::into_external_state Unexecuted instantiation: <rustls::client::tls13::ExpectCertificateOrCompressedCertificate as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::into_external_state Unexecuted instantiation: <rustls::client::tls13::ExpectCertificateOrCompressedCertificateOrCertReq as rustls::common_state::State<rustls::client::client_conn::ClientConnectionData>>::into_external_state Unexecuted instantiation: <rustls::server::tls12::ExpectClientKx as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::into_external_state Unexecuted instantiation: <rustls::server::tls12::ExpectFinished as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::into_external_state Unexecuted instantiation: <rustls::server::tls12::ExpectCertificate as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::into_external_state Unexecuted instantiation: <rustls::server::tls12::ExpectCertificateVerify as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::into_external_state Unexecuted instantiation: <rustls::server::tls12::ExpectCcs as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::into_external_state Unexecuted instantiation: <rustls::server::tls13::ExpectFinished as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::into_external_state Unexecuted instantiation: <rustls::server::tls13::ExpectEarlyData as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::into_external_state Unexecuted instantiation: <rustls::server::tls13::ExpectCertificate as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::into_external_state Unexecuted instantiation: <rustls::server::tls13::ExpectQuicTraffic as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::into_external_state Unexecuted instantiation: <rustls::server::tls13::ExpectCertificateVerify as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::into_external_state Unexecuted instantiation: <rustls::server::tls13::ExpectCompressedCertificate as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::into_external_state Unexecuted instantiation: <rustls::server::tls13::ExpectAndSkipRejectedEarlyData as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::into_external_state Unexecuted instantiation: <rustls::server::tls13::ExpectCertificateOrCompressedCertificate as rustls::common_state::State<rustls::server::server_conn::ServerConnectionData>>::into_external_state |
877 | | |
878 | | fn into_owned(self: Box<Self>) -> Box<dyn State<Data> + 'static>; |
879 | | } |
880 | | |
881 | | pub(crate) struct Context<'a, Data> { |
882 | | pub(crate) common: &'a mut CommonState, |
883 | | pub(crate) data: &'a mut Data, |
884 | | /// Buffered plaintext. This is `Some` if any plaintext was written during handshake and `None` |
885 | | /// otherwise. |
886 | | pub(crate) sendable_plaintext: Option<&'a mut ChunkVecBuffer>, |
887 | | } |
888 | | |
889 | | /// Side of the connection. |
890 | | #[derive(Clone, Copy, Debug, PartialEq)] |
891 | | pub enum Side { |
892 | | /// A client initiates the connection. |
893 | | Client, |
894 | | /// A server waits for a client to connect. |
895 | | Server, |
896 | | } |
897 | | |
898 | | impl Side { |
899 | 0 | pub(crate) fn peer(&self) -> Self { |
900 | 0 | match self { |
901 | 0 | Self::Client => Self::Server, |
902 | 0 | Self::Server => Self::Client, |
903 | | } |
904 | 0 | } |
905 | | } |
906 | | |
907 | | #[derive(Copy, Clone, Eq, PartialEq, Debug)] |
908 | | pub(crate) enum Protocol { |
909 | | Tcp, |
910 | | Quic, |
911 | | } |
912 | | |
913 | | enum Limit { |
914 | | #[cfg(feature = "std")] |
915 | | Yes, |
916 | | No, |
917 | | } |
918 | | |
919 | | /// Tracking technically-allowed protocol actions |
920 | | /// that we limit to avoid denial-of-service vectors. |
921 | | struct TemperCounters { |
922 | | allowed_warning_alerts: u8, |
923 | | allowed_renegotiation_requests: u8, |
924 | | allowed_key_update_requests: u8, |
925 | | allowed_middlebox_ccs: u8, |
926 | | } |
927 | | |
928 | | impl TemperCounters { |
929 | 0 | fn received_warning_alert(&mut self) -> Result<(), Error> { |
930 | 0 | match self.allowed_warning_alerts { |
931 | 0 | 0 => Err(PeerMisbehaved::TooManyWarningAlertsReceived.into()), |
932 | | _ => { |
933 | 0 | self.allowed_warning_alerts -= 1; |
934 | 0 | Ok(()) |
935 | | } |
936 | | } |
937 | 0 | } |
938 | | |
939 | 0 | fn received_renegotiation_request(&mut self) -> Result<(), Error> { |
940 | 0 | match self.allowed_renegotiation_requests { |
941 | 0 | 0 => Err(PeerMisbehaved::TooManyRenegotiationRequests.into()), |
942 | | _ => { |
943 | 0 | self.allowed_renegotiation_requests -= 1; |
944 | 0 | Ok(()) |
945 | | } |
946 | | } |
947 | 0 | } |
948 | | |
949 | 0 | fn received_key_update_request(&mut self) -> Result<(), Error> { |
950 | 0 | match self.allowed_key_update_requests { |
951 | 0 | 0 => Err(PeerMisbehaved::TooManyKeyUpdateRequests.into()), |
952 | | _ => { |
953 | 0 | self.allowed_key_update_requests -= 1; |
954 | 0 | Ok(()) |
955 | | } |
956 | | } |
957 | 0 | } |
958 | | |
959 | 0 | fn received_tls13_change_cipher_spec(&mut self) -> Result<(), Error> { |
960 | 0 | match self.allowed_middlebox_ccs { |
961 | 0 | 0 => Err(PeerMisbehaved::IllegalMiddleboxChangeCipherSpec.into()), |
962 | | _ => { |
963 | 0 | self.allowed_middlebox_ccs -= 1; |
964 | 0 | Ok(()) |
965 | | } |
966 | | } |
967 | 0 | } |
968 | | |
969 | 0 | fn received_app_data(&mut self) { |
970 | 0 | self.allowed_key_update_requests = Self::INITIAL_KEY_UPDATE_REQUESTS; |
971 | 0 | } |
972 | | |
973 | | // cf. BoringSSL `kMaxKeyUpdates` |
974 | | // <https://github.com/google/boringssl/blob/dec5989b793c56ad4dd32173bd2d8595ca78b398/ssl/tls13_both.cc#L35-L38> |
975 | | const INITIAL_KEY_UPDATE_REQUESTS: u8 = 32; |
976 | | } |
977 | | |
978 | | impl Default for TemperCounters { |
979 | 0 | fn default() -> Self { |
980 | 0 | Self { |
981 | 0 | // cf. BoringSSL `kMaxWarningAlerts` |
982 | 0 | // <https://github.com/google/boringssl/blob/dec5989b793c56ad4dd32173bd2d8595ca78b398/ssl/tls_record.cc#L137-L139> |
983 | 0 | allowed_warning_alerts: 4, |
984 | 0 |
|
985 | 0 | // we rebuff renegotiation requests with a `NoRenegotiation` warning alerts. |
986 | 0 | // a second request after this is fatal. |
987 | 0 | allowed_renegotiation_requests: 1, |
988 | 0 |
|
989 | 0 | allowed_key_update_requests: Self::INITIAL_KEY_UPDATE_REQUESTS, |
990 | 0 |
|
991 | 0 | // At most two CCS are allowed: one after each ClientHello (recall a second |
992 | 0 | // ClientHello happens after a HelloRetryRequest). |
993 | 0 | // |
994 | 0 | // note BoringSSL allows up to 32. |
995 | 0 | allowed_middlebox_ccs: 2, |
996 | 0 | } |
997 | 0 | } |
998 | | } |
999 | | |
1000 | | #[derive(Debug, Default)] |
1001 | | pub(crate) enum KxState { |
1002 | | #[default] |
1003 | | None, |
1004 | | Start(&'static dyn SupportedKxGroup), |
1005 | | Complete(&'static dyn SupportedKxGroup), |
1006 | | } |
1007 | | |
1008 | | impl KxState { |
1009 | 0 | pub(crate) fn complete(&mut self) { |
1010 | 0 | debug_assert!(matches!(self, Self::Start(_))); |
1011 | 0 | if let Self::Start(group) = self { |
1012 | 0 | *self = Self::Complete(*group); |
1013 | 0 | } |
1014 | 0 | } |
1015 | | } |
1016 | | |
1017 | | pub(crate) struct HandshakeFlight<'a, const TLS13: bool> { |
1018 | | pub(crate) transcript: &'a mut HandshakeHash, |
1019 | | body: Vec<u8>, |
1020 | | } |
1021 | | |
1022 | | impl<'a, const TLS13: bool> HandshakeFlight<'a, TLS13> { |
1023 | 0 | pub(crate) fn new(transcript: &'a mut HandshakeHash) -> Self { |
1024 | 0 | Self { |
1025 | 0 | transcript, |
1026 | 0 | body: Vec::new(), |
1027 | 0 | } |
1028 | 0 | } Unexecuted instantiation: <rustls::common_state::HandshakeFlight<false>>::new Unexecuted instantiation: <rustls::common_state::HandshakeFlight<true>>::new |
1029 | | |
1030 | 0 | pub(crate) fn add(&mut self, hs: HandshakeMessagePayload<'_>) { |
1031 | 0 | let start_len = self.body.len(); |
1032 | 0 | hs.encode(&mut self.body); |
1033 | 0 | self.transcript |
1034 | 0 | .add(&self.body[start_len..]); |
1035 | 0 | } Unexecuted instantiation: <rustls::common_state::HandshakeFlight<false>>::add Unexecuted instantiation: <rustls::common_state::HandshakeFlight<true>>::add |
1036 | | |
1037 | 0 | pub(crate) fn finish(self, common: &mut CommonState) { |
1038 | 0 | common.send_msg( |
1039 | | Message { |
1040 | 0 | version: match TLS13 { |
1041 | 0 | true => ProtocolVersion::TLSv1_3, |
1042 | 0 | false => ProtocolVersion::TLSv1_2, |
1043 | | }, |
1044 | 0 | payload: MessagePayload::HandshakeFlight(Payload::new(self.body)), |
1045 | | }, |
1046 | | TLS13, |
1047 | | ); |
1048 | 0 | } Unexecuted instantiation: <rustls::common_state::HandshakeFlight<false>>::finish Unexecuted instantiation: <rustls::common_state::HandshakeFlight<true>>::finish |
1049 | | } |
1050 | | |
1051 | | #[cfg(feature = "tls12")] |
1052 | | pub(crate) type HandshakeFlightTls12<'a> = HandshakeFlight<'a, false>; |
1053 | | pub(crate) type HandshakeFlightTls13<'a> = HandshakeFlight<'a, true>; |
1054 | | |
1055 | | const DEFAULT_RECEIVED_PLAINTEXT_LIMIT: usize = 16 * 1024; |
1056 | | pub(crate) const DEFAULT_BUFFER_LIMIT: usize = 64 * 1024; |