| <!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><meta name="viewport" content="width=device-width, initial-scale=1.0"><meta name="generator" content="rustdoc"><meta name="description" content="Source of the Rust file `/root/.cargo/git/checkouts/incubator-teaclave-crates-c8106113f74feefc/ede1f68/rustls-0.19.1/rustls/src/server/tls13.rs`."><meta name="keywords" content="rust, rustlang, rust-lang"><title>tls13.rs - source</title><link rel="preload" as="font" type="font/woff2" crossorigin href="../../../SourceSerif4-Regular.ttf.woff2"><link rel="preload" as="font" type="font/woff2" crossorigin href="../../../FiraSans-Regular.woff2"><link rel="preload" as="font" type="font/woff2" crossorigin href="../../../FiraSans-Medium.woff2"><link rel="preload" as="font" type="font/woff2" crossorigin href="../../../SourceCodePro-Regular.ttf.woff2"><link rel="preload" as="font" type="font/woff2" crossorigin href="../../../SourceSerif4-Bold.ttf.woff2"><link rel="preload" as="font" type="font/woff2" crossorigin href="../../../SourceCodePro-Semibold.ttf.woff2"><link rel="stylesheet" href="../../../normalize.css"><link rel="stylesheet" href="../../../rustdoc.css" id="mainThemeStyle"><link rel="stylesheet" href="../../../ayu.css" disabled><link rel="stylesheet" href="../../../dark.css" disabled><link rel="stylesheet" href="../../../light.css" id="themeStyle"><script id="default-settings" ></script><script src="../../../storage.js"></script><script defer src="../../../source-script.js"></script><script defer src="../../../source-files.js"></script><script defer src="../../../main.js"></script><noscript><link rel="stylesheet" href="../../../noscript.css"></noscript><link rel="alternate icon" type="image/png" href="../../../favicon-16x16.png"><link rel="alternate icon" type="image/png" href="../../../favicon-32x32.png"><link rel="icon" type="image/svg+xml" href="../../../favicon.svg"></head><body class="rustdoc source"><!--[if lte IE 11]><div class="warning">This old browser is unsupported and will most likely display funky things.</div><![endif]--><nav class="sidebar"><a class="sidebar-logo" href="../../../rustls/index.html"><div class="logo-container"><img class="rust-logo" src="../../../rust-logo.svg" alt="logo"></div></a></nav><main><div class="width-limiter"><nav class="sub"><a class="sub-logo-container" href="../../../rustls/index.html"><img class="rust-logo" src="../../../rust-logo.svg" alt="logo"></a><form class="search-form"><div class="search-container"><span></span><input class="search-input" name="search" autocomplete="off" spellcheck="false" placeholder="Click or press ‘S’ to search, ‘?’ for more options…" type="search"><div id="help-button" title="help" tabindex="-1"><a href="../../../help.html">?</a></div><div id="settings-menu" tabindex="-1"><a href="../../../settings.html" title="settings"><img width="22" height="22" alt="Change settings" src="../../../wheel.svg"></a></div></div></form></nav><section id="main-content" class="content"><div class="example-wrap"><pre class="src-line-numbers"><span id="1">1</span> |
| <span id="2">2</span> |
| <span id="3">3</span> |
| <span id="4">4</span> |
| <span id="5">5</span> |
| <span id="6">6</span> |
| <span id="7">7</span> |
| <span id="8">8</span> |
| <span id="9">9</span> |
| <span id="10">10</span> |
| <span id="11">11</span> |
| <span id="12">12</span> |
| <span id="13">13</span> |
| <span id="14">14</span> |
| <span id="15">15</span> |
| <span id="16">16</span> |
| <span id="17">17</span> |
| <span id="18">18</span> |
| <span id="19">19</span> |
| <span id="20">20</span> |
| <span id="21">21</span> |
| <span id="22">22</span> |
| <span id="23">23</span> |
| <span id="24">24</span> |
| <span id="25">25</span> |
| <span id="26">26</span> |
| <span id="27">27</span> |
| <span id="28">28</span> |
| <span id="29">29</span> |
| <span id="30">30</span> |
| <span id="31">31</span> |
| <span id="32">32</span> |
| <span id="33">33</span> |
| <span id="34">34</span> |
| <span id="35">35</span> |
| <span id="36">36</span> |
| <span id="37">37</span> |
| <span id="38">38</span> |
| <span id="39">39</span> |
| <span id="40">40</span> |
| <span id="41">41</span> |
| <span id="42">42</span> |
| <span id="43">43</span> |
| <span id="44">44</span> |
| <span id="45">45</span> |
| <span id="46">46</span> |
| <span id="47">47</span> |
| <span id="48">48</span> |
| <span id="49">49</span> |
| <span id="50">50</span> |
| <span id="51">51</span> |
| <span id="52">52</span> |
| <span id="53">53</span> |
| <span id="54">54</span> |
| <span id="55">55</span> |
| <span id="56">56</span> |
| <span id="57">57</span> |
| <span id="58">58</span> |
| <span id="59">59</span> |
| <span id="60">60</span> |
| <span id="61">61</span> |
| <span id="62">62</span> |
| <span id="63">63</span> |
| <span id="64">64</span> |
| <span id="65">65</span> |
| <span id="66">66</span> |
| <span id="67">67</span> |
| <span id="68">68</span> |
| <span id="69">69</span> |
| <span id="70">70</span> |
| <span id="71">71</span> |
| <span id="72">72</span> |
| <span id="73">73</span> |
| <span id="74">74</span> |
| <span id="75">75</span> |
| <span id="76">76</span> |
| <span id="77">77</span> |
| <span id="78">78</span> |
| <span id="79">79</span> |
| <span id="80">80</span> |
| <span id="81">81</span> |
| <span id="82">82</span> |
| <span id="83">83</span> |
| <span id="84">84</span> |
| <span id="85">85</span> |
| <span id="86">86</span> |
| <span id="87">87</span> |
| <span id="88">88</span> |
| <span id="89">89</span> |
| <span id="90">90</span> |
| <span id="91">91</span> |
| <span id="92">92</span> |
| <span id="93">93</span> |
| <span id="94">94</span> |
| <span id="95">95</span> |
| <span id="96">96</span> |
| <span id="97">97</span> |
| <span id="98">98</span> |
| <span id="99">99</span> |
| <span id="100">100</span> |
| <span id="101">101</span> |
| <span id="102">102</span> |
| <span id="103">103</span> |
| <span id="104">104</span> |
| <span id="105">105</span> |
| <span id="106">106</span> |
| <span id="107">107</span> |
| <span id="108">108</span> |
| <span id="109">109</span> |
| <span id="110">110</span> |
| <span id="111">111</span> |
| <span id="112">112</span> |
| <span id="113">113</span> |
| <span id="114">114</span> |
| <span id="115">115</span> |
| <span id="116">116</span> |
| <span id="117">117</span> |
| <span id="118">118</span> |
| <span id="119">119</span> |
| <span id="120">120</span> |
| <span id="121">121</span> |
| <span id="122">122</span> |
| <span id="123">123</span> |
| <span id="124">124</span> |
| <span id="125">125</span> |
| <span id="126">126</span> |
| <span id="127">127</span> |
| <span id="128">128</span> |
| <span id="129">129</span> |
| <span id="130">130</span> |
| <span id="131">131</span> |
| <span id="132">132</span> |
| <span id="133">133</span> |
| <span id="134">134</span> |
| <span id="135">135</span> |
| <span id="136">136</span> |
| <span id="137">137</span> |
| <span id="138">138</span> |
| <span id="139">139</span> |
| <span id="140">140</span> |
| <span id="141">141</span> |
| <span id="142">142</span> |
| <span id="143">143</span> |
| <span id="144">144</span> |
| <span id="145">145</span> |
| <span id="146">146</span> |
| <span id="147">147</span> |
| <span id="148">148</span> |
| <span id="149">149</span> |
| <span id="150">150</span> |
| <span id="151">151</span> |
| <span id="152">152</span> |
| <span id="153">153</span> |
| <span id="154">154</span> |
| <span id="155">155</span> |
| <span id="156">156</span> |
| <span id="157">157</span> |
| <span id="158">158</span> |
| <span id="159">159</span> |
| <span id="160">160</span> |
| <span id="161">161</span> |
| <span id="162">162</span> |
| <span id="163">163</span> |
| <span id="164">164</span> |
| <span id="165">165</span> |
| <span id="166">166</span> |
| <span id="167">167</span> |
| <span id="168">168</span> |
| <span id="169">169</span> |
| <span id="170">170</span> |
| <span id="171">171</span> |
| <span id="172">172</span> |
| <span id="173">173</span> |
| <span id="174">174</span> |
| <span id="175">175</span> |
| <span id="176">176</span> |
| <span id="177">177</span> |
| <span id="178">178</span> |
| <span id="179">179</span> |
| <span id="180">180</span> |
| <span id="181">181</span> |
| <span id="182">182</span> |
| <span id="183">183</span> |
| <span id="184">184</span> |
| <span id="185">185</span> |
| <span id="186">186</span> |
| <span id="187">187</span> |
| <span id="188">188</span> |
| <span id="189">189</span> |
| <span id="190">190</span> |
| <span id="191">191</span> |
| <span id="192">192</span> |
| <span id="193">193</span> |
| <span id="194">194</span> |
| <span id="195">195</span> |
| <span id="196">196</span> |
| <span id="197">197</span> |
| <span id="198">198</span> |
| <span id="199">199</span> |
| <span id="200">200</span> |
| <span id="201">201</span> |
| <span id="202">202</span> |
| <span id="203">203</span> |
| <span id="204">204</span> |
| <span id="205">205</span> |
| <span id="206">206</span> |
| <span id="207">207</span> |
| <span id="208">208</span> |
| <span id="209">209</span> |
| <span id="210">210</span> |
| <span id="211">211</span> |
| <span id="212">212</span> |
| <span id="213">213</span> |
| <span id="214">214</span> |
| <span id="215">215</span> |
| <span id="216">216</span> |
| <span id="217">217</span> |
| <span id="218">218</span> |
| <span id="219">219</span> |
| <span id="220">220</span> |
| <span id="221">221</span> |
| <span id="222">222</span> |
| <span id="223">223</span> |
| <span id="224">224</span> |
| <span id="225">225</span> |
| <span id="226">226</span> |
| <span id="227">227</span> |
| <span id="228">228</span> |
| <span id="229">229</span> |
| <span id="230">230</span> |
| <span id="231">231</span> |
| <span id="232">232</span> |
| <span id="233">233</span> |
| <span id="234">234</span> |
| <span id="235">235</span> |
| <span id="236">236</span> |
| <span id="237">237</span> |
| <span id="238">238</span> |
| <span id="239">239</span> |
| <span id="240">240</span> |
| <span id="241">241</span> |
| <span id="242">242</span> |
| <span id="243">243</span> |
| <span id="244">244</span> |
| <span id="245">245</span> |
| <span id="246">246</span> |
| <span id="247">247</span> |
| <span id="248">248</span> |
| <span id="249">249</span> |
| <span id="250">250</span> |
| <span id="251">251</span> |
| <span id="252">252</span> |
| <span id="253">253</span> |
| <span id="254">254</span> |
| <span id="255">255</span> |
| <span id="256">256</span> |
| <span id="257">257</span> |
| <span id="258">258</span> |
| <span id="259">259</span> |
| <span id="260">260</span> |
| <span id="261">261</span> |
| <span id="262">262</span> |
| <span id="263">263</span> |
| <span id="264">264</span> |
| <span id="265">265</span> |
| <span id="266">266</span> |
| <span id="267">267</span> |
| <span id="268">268</span> |
| <span id="269">269</span> |
| <span id="270">270</span> |
| <span id="271">271</span> |
| <span id="272">272</span> |
| <span id="273">273</span> |
| <span id="274">274</span> |
| <span id="275">275</span> |
| <span id="276">276</span> |
| <span id="277">277</span> |
| <span id="278">278</span> |
| <span id="279">279</span> |
| <span id="280">280</span> |
| <span id="281">281</span> |
| <span id="282">282</span> |
| <span id="283">283</span> |
| <span id="284">284</span> |
| <span id="285">285</span> |
| <span id="286">286</span> |
| <span id="287">287</span> |
| <span id="288">288</span> |
| <span id="289">289</span> |
| <span id="290">290</span> |
| <span id="291">291</span> |
| <span id="292">292</span> |
| <span id="293">293</span> |
| <span id="294">294</span> |
| <span id="295">295</span> |
| <span id="296">296</span> |
| <span id="297">297</span> |
| <span id="298">298</span> |
| <span id="299">299</span> |
| <span id="300">300</span> |
| <span id="301">301</span> |
| <span id="302">302</span> |
| <span id="303">303</span> |
| <span id="304">304</span> |
| <span id="305">305</span> |
| <span id="306">306</span> |
| <span id="307">307</span> |
| <span id="308">308</span> |
| <span id="309">309</span> |
| <span id="310">310</span> |
| <span id="311">311</span> |
| <span id="312">312</span> |
| <span id="313">313</span> |
| <span id="314">314</span> |
| <span id="315">315</span> |
| <span id="316">316</span> |
| <span id="317">317</span> |
| <span id="318">318</span> |
| <span id="319">319</span> |
| <span id="320">320</span> |
| <span id="321">321</span> |
| <span id="322">322</span> |
| <span id="323">323</span> |
| <span id="324">324</span> |
| <span id="325">325</span> |
| <span id="326">326</span> |
| <span id="327">327</span> |
| <span id="328">328</span> |
| <span id="329">329</span> |
| <span id="330">330</span> |
| <span id="331">331</span> |
| <span id="332">332</span> |
| <span id="333">333</span> |
| <span id="334">334</span> |
| <span id="335">335</span> |
| <span id="336">336</span> |
| <span id="337">337</span> |
| <span id="338">338</span> |
| <span id="339">339</span> |
| <span id="340">340</span> |
| <span id="341">341</span> |
| <span id="342">342</span> |
| <span id="343">343</span> |
| <span id="344">344</span> |
| <span id="345">345</span> |
| <span id="346">346</span> |
| <span id="347">347</span> |
| <span id="348">348</span> |
| <span id="349">349</span> |
| <span id="350">350</span> |
| <span id="351">351</span> |
| <span id="352">352</span> |
| <span id="353">353</span> |
| <span id="354">354</span> |
| <span id="355">355</span> |
| <span id="356">356</span> |
| <span id="357">357</span> |
| <span id="358">358</span> |
| <span id="359">359</span> |
| <span id="360">360</span> |
| <span id="361">361</span> |
| <span id="362">362</span> |
| <span id="363">363</span> |
| <span id="364">364</span> |
| <span id="365">365</span> |
| <span id="366">366</span> |
| <span id="367">367</span> |
| <span id="368">368</span> |
| <span id="369">369</span> |
| <span id="370">370</span> |
| <span id="371">371</span> |
| <span id="372">372</span> |
| <span id="373">373</span> |
| <span id="374">374</span> |
| <span id="375">375</span> |
| <span id="376">376</span> |
| <span id="377">377</span> |
| <span id="378">378</span> |
| <span id="379">379</span> |
| <span id="380">380</span> |
| <span id="381">381</span> |
| <span id="382">382</span> |
| <span id="383">383</span> |
| <span id="384">384</span> |
| <span id="385">385</span> |
| <span id="386">386</span> |
| <span id="387">387</span> |
| <span id="388">388</span> |
| <span id="389">389</span> |
| <span id="390">390</span> |
| <span id="391">391</span> |
| <span id="392">392</span> |
| <span id="393">393</span> |
| <span id="394">394</span> |
| <span id="395">395</span> |
| <span id="396">396</span> |
| <span id="397">397</span> |
| <span id="398">398</span> |
| <span id="399">399</span> |
| <span id="400">400</span> |
| <span id="401">401</span> |
| <span id="402">402</span> |
| <span id="403">403</span> |
| <span id="404">404</span> |
| <span id="405">405</span> |
| <span id="406">406</span> |
| <span id="407">407</span> |
| <span id="408">408</span> |
| <span id="409">409</span> |
| <span id="410">410</span> |
| <span id="411">411</span> |
| <span id="412">412</span> |
| <span id="413">413</span> |
| <span id="414">414</span> |
| <span id="415">415</span> |
| <span id="416">416</span> |
| <span id="417">417</span> |
| <span id="418">418</span> |
| <span id="419">419</span> |
| <span id="420">420</span> |
| <span id="421">421</span> |
| <span id="422">422</span> |
| <span id="423">423</span> |
| <span id="424">424</span> |
| <span id="425">425</span> |
| <span id="426">426</span> |
| <span id="427">427</span> |
| <span id="428">428</span> |
| <span id="429">429</span> |
| <span id="430">430</span> |
| <span id="431">431</span> |
| <span id="432">432</span> |
| <span id="433">433</span> |
| <span id="434">434</span> |
| <span id="435">435</span> |
| <span id="436">436</span> |
| <span id="437">437</span> |
| <span id="438">438</span> |
| <span id="439">439</span> |
| <span id="440">440</span> |
| <span id="441">441</span> |
| <span id="442">442</span> |
| <span id="443">443</span> |
| <span id="444">444</span> |
| <span id="445">445</span> |
| <span id="446">446</span> |
| <span id="447">447</span> |
| <span id="448">448</span> |
| <span id="449">449</span> |
| <span id="450">450</span> |
| <span id="451">451</span> |
| <span id="452">452</span> |
| <span id="453">453</span> |
| <span id="454">454</span> |
| <span id="455">455</span> |
| <span id="456">456</span> |
| <span id="457">457</span> |
| <span id="458">458</span> |
| <span id="459">459</span> |
| <span id="460">460</span> |
| <span id="461">461</span> |
| <span id="462">462</span> |
| <span id="463">463</span> |
| <span id="464">464</span> |
| <span id="465">465</span> |
| <span id="466">466</span> |
| <span id="467">467</span> |
| <span id="468">468</span> |
| <span id="469">469</span> |
| <span id="470">470</span> |
| <span id="471">471</span> |
| <span id="472">472</span> |
| <span id="473">473</span> |
| <span id="474">474</span> |
| <span id="475">475</span> |
| <span id="476">476</span> |
| <span id="477">477</span> |
| <span id="478">478</span> |
| <span id="479">479</span> |
| <span id="480">480</span> |
| <span id="481">481</span> |
| <span id="482">482</span> |
| <span id="483">483</span> |
| <span id="484">484</span> |
| <span id="485">485</span> |
| <span id="486">486</span> |
| <span id="487">487</span> |
| <span id="488">488</span> |
| <span id="489">489</span> |
| <span id="490">490</span> |
| <span id="491">491</span> |
| <span id="492">492</span> |
| <span id="493">493</span> |
| <span id="494">494</span> |
| <span id="495">495</span> |
| <span id="496">496</span> |
| <span id="497">497</span> |
| <span id="498">498</span> |
| <span id="499">499</span> |
| <span id="500">500</span> |
| <span id="501">501</span> |
| <span id="502">502</span> |
| <span id="503">503</span> |
| <span id="504">504</span> |
| <span id="505">505</span> |
| <span id="506">506</span> |
| <span id="507">507</span> |
| <span id="508">508</span> |
| <span id="509">509</span> |
| <span id="510">510</span> |
| <span id="511">511</span> |
| <span id="512">512</span> |
| <span id="513">513</span> |
| <span id="514">514</span> |
| <span id="515">515</span> |
| <span id="516">516</span> |
| <span id="517">517</span> |
| <span id="518">518</span> |
| <span id="519">519</span> |
| <span id="520">520</span> |
| <span id="521">521</span> |
| <span id="522">522</span> |
| <span id="523">523</span> |
| <span id="524">524</span> |
| <span id="525">525</span> |
| <span id="526">526</span> |
| <span id="527">527</span> |
| <span id="528">528</span> |
| <span id="529">529</span> |
| <span id="530">530</span> |
| <span id="531">531</span> |
| <span id="532">532</span> |
| <span id="533">533</span> |
| <span id="534">534</span> |
| <span id="535">535</span> |
| <span id="536">536</span> |
| <span id="537">537</span> |
| <span id="538">538</span> |
| <span id="539">539</span> |
| <span id="540">540</span> |
| <span id="541">541</span> |
| <span id="542">542</span> |
| <span id="543">543</span> |
| <span id="544">544</span> |
| <span id="545">545</span> |
| <span id="546">546</span> |
| <span id="547">547</span> |
| <span id="548">548</span> |
| <span id="549">549</span> |
| <span id="550">550</span> |
| <span id="551">551</span> |
| <span id="552">552</span> |
| <span id="553">553</span> |
| <span id="554">554</span> |
| <span id="555">555</span> |
| <span id="556">556</span> |
| <span id="557">557</span> |
| <span id="558">558</span> |
| <span id="559">559</span> |
| <span id="560">560</span> |
| <span id="561">561</span> |
| <span id="562">562</span> |
| <span id="563">563</span> |
| <span id="564">564</span> |
| <span id="565">565</span> |
| <span id="566">566</span> |
| <span id="567">567</span> |
| <span id="568">568</span> |
| <span id="569">569</span> |
| <span id="570">570</span> |
| <span id="571">571</span> |
| <span id="572">572</span> |
| <span id="573">573</span> |
| <span id="574">574</span> |
| <span id="575">575</span> |
| <span id="576">576</span> |
| <span id="577">577</span> |
| <span id="578">578</span> |
| <span id="579">579</span> |
| <span id="580">580</span> |
| <span id="581">581</span> |
| <span id="582">582</span> |
| <span id="583">583</span> |
| <span id="584">584</span> |
| <span id="585">585</span> |
| <span id="586">586</span> |
| <span id="587">587</span> |
| <span id="588">588</span> |
| <span id="589">589</span> |
| <span id="590">590</span> |
| <span id="591">591</span> |
| <span id="592">592</span> |
| <span id="593">593</span> |
| <span id="594">594</span> |
| <span id="595">595</span> |
| <span id="596">596</span> |
| <span id="597">597</span> |
| <span id="598">598</span> |
| <span id="599">599</span> |
| <span id="600">600</span> |
| <span id="601">601</span> |
| <span id="602">602</span> |
| <span id="603">603</span> |
| <span id="604">604</span> |
| <span id="605">605</span> |
| <span id="606">606</span> |
| <span id="607">607</span> |
| <span id="608">608</span> |
| <span id="609">609</span> |
| <span id="610">610</span> |
| <span id="611">611</span> |
| <span id="612">612</span> |
| <span id="613">613</span> |
| <span id="614">614</span> |
| <span id="615">615</span> |
| <span id="616">616</span> |
| <span id="617">617</span> |
| <span id="618">618</span> |
| <span id="619">619</span> |
| <span id="620">620</span> |
| <span id="621">621</span> |
| <span id="622">622</span> |
| <span id="623">623</span> |
| <span id="624">624</span> |
| <span id="625">625</span> |
| <span id="626">626</span> |
| <span id="627">627</span> |
| <span id="628">628</span> |
| <span id="629">629</span> |
| <span id="630">630</span> |
| <span id="631">631</span> |
| <span id="632">632</span> |
| <span id="633">633</span> |
| <span id="634">634</span> |
| <span id="635">635</span> |
| <span id="636">636</span> |
| <span id="637">637</span> |
| <span id="638">638</span> |
| <span id="639">639</span> |
| <span id="640">640</span> |
| <span id="641">641</span> |
| <span id="642">642</span> |
| <span id="643">643</span> |
| <span id="644">644</span> |
| <span id="645">645</span> |
| <span id="646">646</span> |
| <span id="647">647</span> |
| <span id="648">648</span> |
| <span id="649">649</span> |
| <span id="650">650</span> |
| <span id="651">651</span> |
| <span id="652">652</span> |
| <span id="653">653</span> |
| <span id="654">654</span> |
| <span id="655">655</span> |
| <span id="656">656</span> |
| <span id="657">657</span> |
| <span id="658">658</span> |
| <span id="659">659</span> |
| <span id="660">660</span> |
| <span id="661">661</span> |
| <span id="662">662</span> |
| <span id="663">663</span> |
| <span id="664">664</span> |
| <span id="665">665</span> |
| <span id="666">666</span> |
| <span id="667">667</span> |
| <span id="668">668</span> |
| <span id="669">669</span> |
| <span id="670">670</span> |
| <span id="671">671</span> |
| <span id="672">672</span> |
| <span id="673">673</span> |
| <span id="674">674</span> |
| <span id="675">675</span> |
| <span id="676">676</span> |
| <span id="677">677</span> |
| <span id="678">678</span> |
| <span id="679">679</span> |
| <span id="680">680</span> |
| <span id="681">681</span> |
| <span id="682">682</span> |
| <span id="683">683</span> |
| <span id="684">684</span> |
| <span id="685">685</span> |
| <span id="686">686</span> |
| <span id="687">687</span> |
| <span id="688">688</span> |
| <span id="689">689</span> |
| <span id="690">690</span> |
| <span id="691">691</span> |
| <span id="692">692</span> |
| <span id="693">693</span> |
| <span id="694">694</span> |
| <span id="695">695</span> |
| <span id="696">696</span> |
| <span id="697">697</span> |
| <span id="698">698</span> |
| <span id="699">699</span> |
| <span id="700">700</span> |
| <span id="701">701</span> |
| <span id="702">702</span> |
| <span id="703">703</span> |
| <span id="704">704</span> |
| <span id="705">705</span> |
| <span id="706">706</span> |
| <span id="707">707</span> |
| <span id="708">708</span> |
| <span id="709">709</span> |
| <span id="710">710</span> |
| <span id="711">711</span> |
| <span id="712">712</span> |
| <span id="713">713</span> |
| <span id="714">714</span> |
| <span id="715">715</span> |
| <span id="716">716</span> |
| <span id="717">717</span> |
| <span id="718">718</span> |
| <span id="719">719</span> |
| <span id="720">720</span> |
| <span id="721">721</span> |
| <span id="722">722</span> |
| <span id="723">723</span> |
| <span id="724">724</span> |
| <span id="725">725</span> |
| <span id="726">726</span> |
| <span id="727">727</span> |
| <span id="728">728</span> |
| <span id="729">729</span> |
| <span id="730">730</span> |
| <span id="731">731</span> |
| <span id="732">732</span> |
| <span id="733">733</span> |
| <span id="734">734</span> |
| <span id="735">735</span> |
| <span id="736">736</span> |
| <span id="737">737</span> |
| <span id="738">738</span> |
| <span id="739">739</span> |
| <span id="740">740</span> |
| <span id="741">741</span> |
| <span id="742">742</span> |
| <span id="743">743</span> |
| <span id="744">744</span> |
| <span id="745">745</span> |
| <span id="746">746</span> |
| <span id="747">747</span> |
| <span id="748">748</span> |
| <span id="749">749</span> |
| <span id="750">750</span> |
| <span id="751">751</span> |
| <span id="752">752</span> |
| <span id="753">753</span> |
| <span id="754">754</span> |
| <span id="755">755</span> |
| <span id="756">756</span> |
| <span id="757">757</span> |
| <span id="758">758</span> |
| <span id="759">759</span> |
| <span id="760">760</span> |
| <span id="761">761</span> |
| <span id="762">762</span> |
| <span id="763">763</span> |
| <span id="764">764</span> |
| <span id="765">765</span> |
| <span id="766">766</span> |
| <span id="767">767</span> |
| <span id="768">768</span> |
| <span id="769">769</span> |
| <span id="770">770</span> |
| <span id="771">771</span> |
| <span id="772">772</span> |
| <span id="773">773</span> |
| <span id="774">774</span> |
| <span id="775">775</span> |
| <span id="776">776</span> |
| <span id="777">777</span> |
| <span id="778">778</span> |
| <span id="779">779</span> |
| <span id="780">780</span> |
| <span id="781">781</span> |
| <span id="782">782</span> |
| <span id="783">783</span> |
| <span id="784">784</span> |
| <span id="785">785</span> |
| <span id="786">786</span> |
| <span id="787">787</span> |
| <span id="788">788</span> |
| <span id="789">789</span> |
| <span id="790">790</span> |
| <span id="791">791</span> |
| <span id="792">792</span> |
| <span id="793">793</span> |
| <span id="794">794</span> |
| <span id="795">795</span> |
| <span id="796">796</span> |
| <span id="797">797</span> |
| <span id="798">798</span> |
| <span id="799">799</span> |
| <span id="800">800</span> |
| <span id="801">801</span> |
| <span id="802">802</span> |
| <span id="803">803</span> |
| <span id="804">804</span> |
| <span id="805">805</span> |
| <span id="806">806</span> |
| <span id="807">807</span> |
| <span id="808">808</span> |
| <span id="809">809</span> |
| <span id="810">810</span> |
| <span id="811">811</span> |
| <span id="812">812</span> |
| <span id="813">813</span> |
| <span id="814">814</span> |
| <span id="815">815</span> |
| <span id="816">816</span> |
| <span id="817">817</span> |
| <span id="818">818</span> |
| <span id="819">819</span> |
| <span id="820">820</span> |
| <span id="821">821</span> |
| <span id="822">822</span> |
| <span id="823">823</span> |
| <span id="824">824</span> |
| <span id="825">825</span> |
| <span id="826">826</span> |
| <span id="827">827</span> |
| <span id="828">828</span> |
| <span id="829">829</span> |
| <span id="830">830</span> |
| <span id="831">831</span> |
| <span id="832">832</span> |
| <span id="833">833</span> |
| <span id="834">834</span> |
| <span id="835">835</span> |
| <span id="836">836</span> |
| <span id="837">837</span> |
| <span id="838">838</span> |
| <span id="839">839</span> |
| <span id="840">840</span> |
| <span id="841">841</span> |
| <span id="842">842</span> |
| <span id="843">843</span> |
| <span id="844">844</span> |
| <span id="845">845</span> |
| <span id="846">846</span> |
| <span id="847">847</span> |
| <span id="848">848</span> |
| <span id="849">849</span> |
| <span id="850">850</span> |
| <span id="851">851</span> |
| <span id="852">852</span> |
| <span id="853">853</span> |
| <span id="854">854</span> |
| <span id="855">855</span> |
| <span id="856">856</span> |
| <span id="857">857</span> |
| <span id="858">858</span> |
| <span id="859">859</span> |
| <span id="860">860</span> |
| <span id="861">861</span> |
| <span id="862">862</span> |
| <span id="863">863</span> |
| <span id="864">864</span> |
| <span id="865">865</span> |
| <span id="866">866</span> |
| <span id="867">867</span> |
| <span id="868">868</span> |
| <span id="869">869</span> |
| <span id="870">870</span> |
| <span id="871">871</span> |
| <span id="872">872</span> |
| <span id="873">873</span> |
| <span id="874">874</span> |
| <span id="875">875</span> |
| <span id="876">876</span> |
| <span id="877">877</span> |
| <span id="878">878</span> |
| <span id="879">879</span> |
| <span id="880">880</span> |
| <span id="881">881</span> |
| <span id="882">882</span> |
| <span id="883">883</span> |
| <span id="884">884</span> |
| <span id="885">885</span> |
| <span id="886">886</span> |
| <span id="887">887</span> |
| <span id="888">888</span> |
| <span id="889">889</span> |
| <span id="890">890</span> |
| <span id="891">891</span> |
| <span id="892">892</span> |
| <span id="893">893</span> |
| <span id="894">894</span> |
| <span id="895">895</span> |
| <span id="896">896</span> |
| <span id="897">897</span> |
| <span id="898">898</span> |
| <span id="899">899</span> |
| <span id="900">900</span> |
| <span id="901">901</span> |
| <span id="902">902</span> |
| <span id="903">903</span> |
| <span id="904">904</span> |
| <span id="905">905</span> |
| <span id="906">906</span> |
| <span id="907">907</span> |
| <span id="908">908</span> |
| <span id="909">909</span> |
| <span id="910">910</span> |
| <span id="911">911</span> |
| <span id="912">912</span> |
| <span id="913">913</span> |
| <span id="914">914</span> |
| <span id="915">915</span> |
| <span id="916">916</span> |
| <span id="917">917</span> |
| <span id="918">918</span> |
| <span id="919">919</span> |
| <span id="920">920</span> |
| <span id="921">921</span> |
| <span id="922">922</span> |
| <span id="923">923</span> |
| <span id="924">924</span> |
| <span id="925">925</span> |
| <span id="926">926</span> |
| <span id="927">927</span> |
| <span id="928">928</span> |
| <span id="929">929</span> |
| <span id="930">930</span> |
| <span id="931">931</span> |
| <span id="932">932</span> |
| <span id="933">933</span> |
| <span id="934">934</span> |
| <span id="935">935</span> |
| <span id="936">936</span> |
| <span id="937">937</span> |
| <span id="938">938</span> |
| <span id="939">939</span> |
| <span id="940">940</span> |
| <span id="941">941</span> |
| <span id="942">942</span> |
| <span id="943">943</span> |
| <span id="944">944</span> |
| <span id="945">945</span> |
| <span id="946">946</span> |
| <span id="947">947</span> |
| <span id="948">948</span> |
| <span id="949">949</span> |
| <span id="950">950</span> |
| <span id="951">951</span> |
| <span id="952">952</span> |
| <span id="953">953</span> |
| <span id="954">954</span> |
| <span id="955">955</span> |
| <span id="956">956</span> |
| <span id="957">957</span> |
| <span id="958">958</span> |
| <span id="959">959</span> |
| <span id="960">960</span> |
| <span id="961">961</span> |
| <span id="962">962</span> |
| <span id="963">963</span> |
| <span id="964">964</span> |
| <span id="965">965</span> |
| <span id="966">966</span> |
| <span id="967">967</span> |
| <span id="968">968</span> |
| <span id="969">969</span> |
| <span id="970">970</span> |
| <span id="971">971</span> |
| <span id="972">972</span> |
| <span id="973">973</span> |
| <span id="974">974</span> |
| <span id="975">975</span> |
| <span id="976">976</span> |
| <span id="977">977</span> |
| <span id="978">978</span> |
| <span id="979">979</span> |
| <span id="980">980</span> |
| <span id="981">981</span> |
| <span id="982">982</span> |
| <span id="983">983</span> |
| <span id="984">984</span> |
| <span id="985">985</span> |
| <span id="986">986</span> |
| <span id="987">987</span> |
| <span id="988">988</span> |
| <span id="989">989</span> |
| <span id="990">990</span> |
| <span id="991">991</span> |
| <span id="992">992</span> |
| <span id="993">993</span> |
| <span id="994">994</span> |
| <span id="995">995</span> |
| <span id="996">996</span> |
| <span id="997">997</span> |
| <span id="998">998</span> |
| <span id="999">999</span> |
| <span id="1000">1000</span> |
| <span id="1001">1001</span> |
| <span id="1002">1002</span> |
| <span id="1003">1003</span> |
| <span id="1004">1004</span> |
| <span id="1005">1005</span> |
| <span id="1006">1006</span> |
| <span id="1007">1007</span> |
| <span id="1008">1008</span> |
| <span id="1009">1009</span> |
| <span id="1010">1010</span> |
| <span id="1011">1011</span> |
| <span id="1012">1012</span> |
| <span id="1013">1013</span> |
| <span id="1014">1014</span> |
| <span id="1015">1015</span> |
| <span id="1016">1016</span> |
| <span id="1017">1017</span> |
| <span id="1018">1018</span> |
| <span id="1019">1019</span> |
| <span id="1020">1020</span> |
| <span id="1021">1021</span> |
| <span id="1022">1022</span> |
| <span id="1023">1023</span> |
| <span id="1024">1024</span> |
| <span id="1025">1025</span> |
| <span id="1026">1026</span> |
| <span id="1027">1027</span> |
| <span id="1028">1028</span> |
| <span id="1029">1029</span> |
| <span id="1030">1030</span> |
| <span id="1031">1031</span> |
| <span id="1032">1032</span> |
| <span id="1033">1033</span> |
| <span id="1034">1034</span> |
| <span id="1035">1035</span> |
| <span id="1036">1036</span> |
| <span id="1037">1037</span> |
| <span id="1038">1038</span> |
| <span id="1039">1039</span> |
| <span id="1040">1040</span> |
| <span id="1041">1041</span> |
| <span id="1042">1042</span> |
| <span id="1043">1043</span> |
| <span id="1044">1044</span> |
| <span id="1045">1045</span> |
| <span id="1046">1046</span> |
| <span id="1047">1047</span> |
| <span id="1048">1048</span> |
| <span id="1049">1049</span> |
| <span id="1050">1050</span> |
| <span id="1051">1051</span> |
| <span id="1052">1052</span> |
| <span id="1053">1053</span> |
| <span id="1054">1054</span> |
| <span id="1055">1055</span> |
| <span id="1056">1056</span> |
| <span id="1057">1057</span> |
| <span id="1058">1058</span> |
| <span id="1059">1059</span> |
| <span id="1060">1060</span> |
| <span id="1061">1061</span> |
| <span id="1062">1062</span> |
| <span id="1063">1063</span> |
| <span id="1064">1064</span> |
| <span id="1065">1065</span> |
| <span id="1066">1066</span> |
| <span id="1067">1067</span> |
| <span id="1068">1068</span> |
| <span id="1069">1069</span> |
| <span id="1070">1070</span> |
| <span id="1071">1071</span> |
| <span id="1072">1072</span> |
| <span id="1073">1073</span> |
| <span id="1074">1074</span> |
| <span id="1075">1075</span> |
| <span id="1076">1076</span> |
| <span id="1077">1077</span> |
| <span id="1078">1078</span> |
| <span id="1079">1079</span> |
| <span id="1080">1080</span> |
| <span id="1081">1081</span> |
| <span id="1082">1082</span> |
| <span id="1083">1083</span> |
| <span id="1084">1084</span> |
| <span id="1085">1085</span> |
| <span id="1086">1086</span> |
| <span id="1087">1087</span> |
| <span id="1088">1088</span> |
| <span id="1089">1089</span> |
| <span id="1090">1090</span> |
| <span id="1091">1091</span> |
| <span id="1092">1092</span> |
| <span id="1093">1093</span> |
| <span id="1094">1094</span> |
| <span id="1095">1095</span> |
| <span id="1096">1096</span> |
| <span id="1097">1097</span> |
| <span id="1098">1098</span> |
| <span id="1099">1099</span> |
| <span id="1100">1100</span> |
| <span id="1101">1101</span> |
| <span id="1102">1102</span> |
| <span id="1103">1103</span> |
| <span id="1104">1104</span> |
| <span id="1105">1105</span> |
| <span id="1106">1106</span> |
| <span id="1107">1107</span> |
| <span id="1108">1108</span> |
| <span id="1109">1109</span> |
| <span id="1110">1110</span> |
| <span id="1111">1111</span> |
| <span id="1112">1112</span> |
| <span id="1113">1113</span> |
| <span id="1114">1114</span> |
| <span id="1115">1115</span> |
| <span id="1116">1116</span> |
| <span id="1117">1117</span> |
| <span id="1118">1118</span> |
| <span id="1119">1119</span> |
| <span id="1120">1120</span> |
| <span id="1121">1121</span> |
| <span id="1122">1122</span> |
| <span id="1123">1123</span> |
| <span id="1124">1124</span> |
| <span id="1125">1125</span> |
| <span id="1126">1126</span> |
| <span id="1127">1127</span> |
| <span id="1128">1128</span> |
| <span id="1129">1129</span> |
| <span id="1130">1130</span> |
| <span id="1131">1131</span> |
| <span id="1132">1132</span> |
| <span id="1133">1133</span> |
| <span id="1134">1134</span> |
| <span id="1135">1135</span> |
| <span id="1136">1136</span> |
| <span id="1137">1137</span> |
| <span id="1138">1138</span> |
| <span id="1139">1139</span> |
| <span id="1140">1140</span> |
| <span id="1141">1141</span> |
| <span id="1142">1142</span> |
| <span id="1143">1143</span> |
| <span id="1144">1144</span> |
| <span id="1145">1145</span> |
| <span id="1146">1146</span> |
| <span id="1147">1147</span> |
| <span id="1148">1148</span> |
| <span id="1149">1149</span> |
| <span id="1150">1150</span> |
| <span id="1151">1151</span> |
| <span id="1152">1152</span> |
| <span id="1153">1153</span> |
| <span id="1154">1154</span> |
| <span id="1155">1155</span> |
| <span id="1156">1156</span> |
| <span id="1157">1157</span> |
| <span id="1158">1158</span> |
| <span id="1159">1159</span> |
| <span id="1160">1160</span> |
| <span id="1161">1161</span> |
| <span id="1162">1162</span> |
| <span id="1163">1163</span> |
| <span id="1164">1164</span> |
| <span id="1165">1165</span> |
| <span id="1166">1166</span> |
| <span id="1167">1167</span> |
| <span id="1168">1168</span> |
| <span id="1169">1169</span> |
| <span id="1170">1170</span> |
| <span id="1171">1171</span> |
| <span id="1172">1172</span> |
| <span id="1173">1173</span> |
| <span id="1174">1174</span> |
| <span id="1175">1175</span> |
| <span id="1176">1176</span> |
| <span id="1177">1177</span> |
| <span id="1178">1178</span> |
| <span id="1179">1179</span> |
| <span id="1180">1180</span> |
| <span id="1181">1181</span> |
| <span id="1182">1182</span> |
| <span id="1183">1183</span> |
| <span id="1184">1184</span> |
| <span id="1185">1185</span> |
| <span id="1186">1186</span> |
| <span id="1187">1187</span> |
| <span id="1188">1188</span> |
| <span id="1189">1189</span> |
| <span id="1190">1190</span> |
| <span id="1191">1191</span> |
| <span id="1192">1192</span> |
| <span id="1193">1193</span> |
| <span id="1194">1194</span> |
| <span id="1195">1195</span> |
| <span id="1196">1196</span> |
| <span id="1197">1197</span> |
| <span id="1198">1198</span> |
| </pre><pre class="rust"><code><span class="kw">use </span><span class="kw">crate</span>::check::check_message; |
| <span class="kw">use </span><span class="kw">crate</span>::cipher; |
| <span class="kw">use </span><span class="kw">crate</span>::error::TLSError; |
| <span class="kw">use </span><span class="kw">crate</span>::key_schedule::{ |
| KeyScheduleEarly, KeyScheduleHandshake, KeyScheduleNonSecret, KeyScheduleTraffic, |
| KeyScheduleTrafficWithClientFinishedPending, |
| }; |
| <span class="attribute">#[cfg(feature = <span class="string">"logging"</span>)] |
| </span><span class="kw">use </span><span class="kw">crate</span>::log::{debug, trace, warn}; |
| <span class="kw">use </span><span class="kw">crate</span>::msgs::base::{Payload, PayloadU8}; |
| <span class="kw">use </span><span class="kw">crate</span>::msgs::ccs::ChangeCipherSpecPayload; |
| <span class="kw">use </span><span class="kw">crate</span>::msgs::codec::Codec; |
| <span class="kw">use </span><span class="kw">crate</span>::msgs::enums::KeyUpdateRequest; |
| <span class="kw">use </span><span class="kw">crate</span>::msgs::enums::{AlertDescription, NamedGroup, SignatureScheme}; |
| <span class="kw">use </span><span class="kw">crate</span>::msgs::enums::{Compression, PSKKeyExchangeMode}; |
| <span class="kw">use </span><span class="kw">crate</span>::msgs::enums::{ContentType, HandshakeType, ProtocolVersion}; |
| <span class="kw">use </span><span class="kw">crate</span>::msgs::handshake::CertReqExtension; |
| <span class="kw">use </span><span class="kw">crate</span>::msgs::handshake::CertificateEntry; |
| <span class="kw">use </span><span class="kw">crate</span>::msgs::handshake::CertificateExtension; |
| <span class="kw">use </span><span class="kw">crate</span>::msgs::handshake::CertificatePayloadTLS13; |
| <span class="kw">use </span><span class="kw">crate</span>::msgs::handshake::CertificateRequestPayloadTLS13; |
| <span class="kw">use </span><span class="kw">crate</span>::msgs::handshake::CertificateStatus; |
| <span class="kw">use </span><span class="kw">crate</span>::msgs::handshake::ClientHelloPayload; |
| <span class="kw">use </span><span class="kw">crate</span>::msgs::handshake::DigitallySignedStruct; |
| <span class="kw">use </span><span class="kw">crate</span>::msgs::handshake::HandshakeMessagePayload; |
| <span class="kw">use </span><span class="kw">crate</span>::msgs::handshake::HandshakePayload; |
| <span class="kw">use </span><span class="kw">crate</span>::msgs::handshake::HelloRetryExtension; |
| <span class="kw">use </span><span class="kw">crate</span>::msgs::handshake::HelloRetryRequest; |
| <span class="kw">use </span><span class="kw">crate</span>::msgs::handshake::KeyShareEntry; |
| <span class="kw">use </span><span class="kw">crate</span>::msgs::handshake::NewSessionTicketPayloadTLS13; |
| <span class="kw">use </span><span class="kw">crate</span>::msgs::handshake::Random; |
| <span class="kw">use </span><span class="kw">crate</span>::msgs::handshake::ServerExtension; |
| <span class="kw">use </span><span class="kw">crate</span>::msgs::handshake::ServerHelloPayload; |
| <span class="kw">use </span><span class="kw">crate</span>::msgs::handshake::SessionID; |
| <span class="kw">use </span><span class="kw">crate</span>::msgs::message::{Message, MessagePayload}; |
| <span class="kw">use </span><span class="kw">crate</span>::msgs::persist; |
| <span class="kw">use </span><span class="kw">crate</span>::rand; |
| <span class="kw">use </span><span class="kw">crate</span>::server::ServerSessionImpl; |
| <span class="kw">use </span><span class="kw">crate</span>::sign; |
| <span class="kw">use </span><span class="kw">crate</span>::suites; |
| <span class="kw">use </span><span class="kw">crate</span>::verify; |
| <span class="attribute">#[cfg(feature = <span class="string">"quic"</span>)] |
| </span><span class="kw">use crate</span>::{msgs::handshake::NewSessionTicketExtension, quic, session::Protocol}; |
| |
| <span class="kw">use </span><span class="kw">crate</span>::server::common::{ClientCertDetails, HandshakeDetails}; |
| <span class="kw">use </span><span class="kw">crate</span>::server::hs; |
| |
| <span class="kw">use </span>ring::constant_time; |
| |
| <span class="kw">pub struct </span>CompleteClientHelloHandling { |
| <span class="kw">pub </span>handshake: HandshakeDetails, |
| <span class="kw">pub </span>done_retry: bool, |
| <span class="kw">pub </span>send_cert_status: bool, |
| <span class="kw">pub </span>send_sct: bool, |
| <span class="kw">pub </span>send_ticket: bool, |
| } |
| |
| <span class="kw">impl </span>CompleteClientHelloHandling { |
| <span class="kw">fn </span>check_binder( |
| <span class="kw-2">&</span><span class="self">self</span>, |
| sess: <span class="kw-2">&mut </span>ServerSessionImpl, |
| client_hello: <span class="kw-2">&</span>Message, |
| psk: <span class="kw-2">&</span>[u8], |
| binder: <span class="kw-2">&</span>[u8], |
| ) -> bool { |
| <span class="kw">let </span>binder_plaintext = <span class="kw">match </span>client_hello.payload { |
| MessagePayload::Handshake(<span class="kw-2">ref </span>hmp) => hmp.get_encoding_for_binder_signing(), |
| <span class="kw">_ </span>=> <span class="macro">unreachable!</span>(), |
| }; |
| |
| <span class="kw">let </span>suite = sess.common.get_suite_assert(); |
| <span class="kw">let </span>suite_hash = suite.get_hash(); |
| <span class="kw">let </span>handshake_hash = <span class="self">self |
| </span>.handshake |
| .transcript |
| .get_hash_given(suite_hash, <span class="kw-2">&</span>binder_plaintext); |
| |
| <span class="kw">let </span>key_schedule = KeyScheduleEarly::new(suite.hkdf_algorithm, <span class="kw-2">&</span>psk); |
| <span class="kw">let </span>real_binder = |
| key_schedule.resumption_psk_binder_key_and_sign_verify_data(<span class="kw-2">&</span>handshake_hash); |
| |
| constant_time::verify_slices_are_equal(<span class="kw-2">&</span>real_binder, binder).is_ok() |
| } |
| |
| <span class="kw">fn </span>into_expect_retried_client_hello(<span class="self">self</span>) -> hs::NextState { |
| Box::new(hs::ExpectClientHello { |
| handshake: <span class="self">self</span>.handshake, |
| done_retry: <span class="bool-val">true</span>, |
| send_cert_status: <span class="self">self</span>.send_cert_status, |
| send_sct: <span class="self">self</span>.send_sct, |
| send_ticket: <span class="self">self</span>.send_ticket, |
| }) |
| } |
| |
| <span class="kw">fn </span>into_expect_certificate( |
| <span class="self">self</span>, |
| key_schedule: KeyScheduleTrafficWithClientFinishedPending, |
| ) -> hs::NextState { |
| Box::new(ExpectCertificate { |
| handshake: <span class="self">self</span>.handshake, |
| key_schedule, |
| send_ticket: <span class="self">self</span>.send_ticket, |
| }) |
| } |
| |
| <span class="kw">fn </span>into_expect_finished( |
| <span class="self">self</span>, |
| key_schedule: KeyScheduleTrafficWithClientFinishedPending, |
| ) -> hs::NextState { |
| Box::new(ExpectFinished { |
| handshake: <span class="self">self</span>.handshake, |
| key_schedule, |
| send_ticket: <span class="self">self</span>.send_ticket, |
| }) |
| } |
| |
| <span class="kw">fn </span>emit_server_hello( |
| <span class="kw-2">&mut </span><span class="self">self</span>, |
| sess: <span class="kw-2">&mut </span>ServerSessionImpl, |
| session_id: <span class="kw-2">&</span>SessionID, |
| share: <span class="kw-2">&</span>KeyShareEntry, |
| chosen_psk_idx: <span class="prelude-ty">Option</span><usize>, |
| resuming_psk: <span class="prelude-ty">Option</span><<span class="kw-2">&</span>[u8]>, |
| ) -> <span class="prelude-ty">Result</span><KeyScheduleHandshake, TLSError> { |
| <span class="kw">let </span><span class="kw-2">mut </span>extensions = Vec::new(); |
| |
| <span class="comment">// Do key exchange |
| </span><span class="kw">let </span>kxr = suites::KeyExchange::start_ecdhe(share.group) |
| .and_then(|kx| kx.complete(<span class="kw-2">&</span>share.payload.<span class="number">0</span>)) |
| .ok_or_else(|| TLSError::PeerMisbehavedError(<span class="string">"key exchange failed"</span>.to_string()))<span class="question-mark">?</span>; |
| |
| <span class="kw">let </span>kse = KeyShareEntry::new(share.group, kxr.pubkey.as_ref()); |
| extensions.push(ServerExtension::KeyShare(kse)); |
| extensions.push(ServerExtension::SupportedVersions(ProtocolVersion::TLSv1_3)); |
| |
| <span class="kw">if let </span><span class="prelude-val">Some</span>(psk_idx) = chosen_psk_idx { |
| extensions.push(ServerExtension::PresharedKey(psk_idx <span class="kw">as </span>u16)); |
| } |
| |
| <span class="kw">let </span>sh = Message { |
| typ: ContentType::Handshake, |
| version: ProtocolVersion::TLSv1_2, |
| payload: MessagePayload::Handshake(HandshakeMessagePayload { |
| typ: HandshakeType::ServerHello, |
| payload: HandshakePayload::ServerHello(ServerHelloPayload { |
| legacy_version: ProtocolVersion::TLSv1_2, |
| random: Random::from_slice(<span class="kw-2">&</span><span class="self">self</span>.handshake.randoms.server), |
| session_id: <span class="kw-2">*</span>session_id, |
| cipher_suite: sess.common.get_suite_assert().suite, |
| compression_method: Compression::Null, |
| extensions, |
| }), |
| }), |
| }; |
| |
| hs::check_aligned_handshake(sess)<span class="question-mark">?</span>; |
| |
| <span class="attribute">#[cfg(feature = <span class="string">"quic"</span>)] |
| </span><span class="kw">let </span>client_hello_hash = <span class="self">self |
| </span>.handshake |
| .transcript |
| .get_hash_given( |
| sess.common |
| .get_suite_assert() |
| .get_hash(), |
| <span class="kw-2">&</span>[], |
| ); |
| |
| <span class="macro">trace!</span>(<span class="string">"sending server hello {:?}"</span>, sh); |
| <span class="self">self</span>.handshake |
| .transcript |
| .add_message(<span class="kw-2">&</span>sh); |
| sess.common.send_msg(sh, <span class="bool-val">false</span>); |
| |
| <span class="comment">// Start key schedule |
| </span><span class="kw">let </span>suite = sess.common.get_suite_assert(); |
| <span class="kw">let </span><span class="kw-2">mut </span>key_schedule = <span class="kw">if let </span><span class="prelude-val">Some</span>(psk) = resuming_psk { |
| <span class="kw">let </span>early_key_schedule = KeyScheduleEarly::new(suite.hkdf_algorithm, psk); |
| |
| <span class="attribute">#[cfg(feature = <span class="string">"quic"</span>)] |
| </span>{ |
| <span class="kw">if </span>sess.common.protocol == Protocol::Quic { |
| <span class="kw">let </span>client_early_traffic_secret = early_key_schedule |
| .client_early_traffic_secret( |
| <span class="kw-2">&</span>client_hello_hash, |
| <span class="kw-2">&*</span>sess.config.key_log, |
| <span class="kw-2">&</span><span class="self">self</span>.handshake.randoms.client, |
| ); |
| <span class="comment">// If 0-RTT should be rejected, this will be clobbered by ExtensionProcessing |
| // before the application can see. |
| </span>sess.common.quic.early_secret = <span class="prelude-val">Some</span>(client_early_traffic_secret); |
| } |
| } |
| |
| early_key_schedule.into_handshake(<span class="kw-2">&</span>kxr.shared_secret) |
| } <span class="kw">else </span>{ |
| KeyScheduleNonSecret::new(suite.hkdf_algorithm).into_handshake(<span class="kw-2">&</span>kxr.shared_secret) |
| }; |
| |
| <span class="kw">let </span>handshake_hash = <span class="self">self |
| </span>.handshake |
| .transcript |
| .get_current_hash(); |
| <span class="kw">let </span>write_key = key_schedule.server_handshake_traffic_secret( |
| <span class="kw-2">&</span>handshake_hash, |
| <span class="kw-2">&*</span>sess.config.key_log, |
| <span class="kw-2">&</span><span class="self">self</span>.handshake.randoms.client, |
| ); |
| sess.common |
| .record_layer |
| .set_message_encrypter(cipher::new_tls13_write(suite, <span class="kw-2">&</span>write_key)); |
| |
| <span class="kw">let </span>read_key = key_schedule.client_handshake_traffic_secret( |
| <span class="kw-2">&</span>handshake_hash, |
| <span class="kw-2">&*</span>sess.config.key_log, |
| <span class="kw-2">&</span><span class="self">self</span>.handshake.randoms.client, |
| ); |
| sess.common |
| .record_layer |
| .set_message_decrypter(cipher::new_tls13_read(suite, <span class="kw-2">&</span>read_key)); |
| |
| <span class="attribute">#[cfg(feature = <span class="string">"quic"</span>)] |
| </span>{ |
| sess.common.quic.hs_secrets = <span class="prelude-val">Some</span>(quic::Secrets { |
| client: read_key, |
| server: write_key, |
| }); |
| } |
| |
| <span class="prelude-val">Ok</span>(key_schedule) |
| } |
| |
| <span class="kw">fn </span>emit_fake_ccs(<span class="kw-2">&mut </span><span class="self">self</span>, sess: <span class="kw-2">&mut </span>ServerSessionImpl) { |
| <span class="kw">if </span>sess.common.is_quic() { |
| <span class="kw">return</span>; |
| } |
| <span class="kw">let </span>m = Message { |
| typ: ContentType::ChangeCipherSpec, |
| version: ProtocolVersion::TLSv1_2, |
| payload: MessagePayload::ChangeCipherSpec(ChangeCipherSpecPayload {}), |
| }; |
| sess.common.send_msg(m, <span class="bool-val">false</span>); |
| } |
| |
| <span class="kw">fn </span>emit_hello_retry_request(<span class="kw-2">&mut </span><span class="self">self</span>, sess: <span class="kw-2">&mut </span>ServerSessionImpl, group: NamedGroup) { |
| <span class="kw">let </span><span class="kw-2">mut </span>req = HelloRetryRequest { |
| legacy_version: ProtocolVersion::TLSv1_2, |
| session_id: SessionID::empty(), |
| cipher_suite: sess.common.get_suite_assert().suite, |
| extensions: Vec::new(), |
| }; |
| |
| req.extensions |
| .push(HelloRetryExtension::KeyShare(group)); |
| req.extensions |
| .push(HelloRetryExtension::SupportedVersions( |
| ProtocolVersion::TLSv1_3, |
| )); |
| |
| <span class="kw">let </span>m = Message { |
| typ: ContentType::Handshake, |
| version: ProtocolVersion::TLSv1_2, |
| payload: MessagePayload::Handshake(HandshakeMessagePayload { |
| typ: HandshakeType::HelloRetryRequest, |
| payload: HandshakePayload::HelloRetryRequest(req), |
| }), |
| }; |
| |
| <span class="macro">trace!</span>(<span class="string">"Requesting retry {:?}"</span>, m); |
| <span class="self">self</span>.handshake |
| .transcript |
| .rollup_for_hrr(); |
| <span class="self">self</span>.handshake |
| .transcript |
| .add_message(<span class="kw-2">&</span>m); |
| sess.common.send_msg(m, <span class="bool-val">false</span>); |
| } |
| |
| <span class="kw">fn </span>emit_encrypted_extensions( |
| <span class="kw-2">&mut </span><span class="self">self</span>, |
| sess: <span class="kw-2">&mut </span>ServerSessionImpl, |
| server_key: <span class="kw-2">&mut </span>sign::CertifiedKey, |
| hello: <span class="kw-2">&</span>ClientHelloPayload, |
| resumedata: <span class="prelude-ty">Option</span><<span class="kw-2">&</span>persist::ServerSessionValue>, |
| ) -> <span class="prelude-ty">Result</span><(), TLSError> { |
| <span class="kw">let </span><span class="kw-2">mut </span>ep = hs::ExtensionProcessing::new(); |
| ep.process_common(sess, <span class="prelude-val">Some</span>(server_key), hello, resumedata, <span class="kw-2">&</span><span class="self">self</span>.handshake)<span class="question-mark">?</span>; |
| |
| <span class="self">self</span>.send_cert_status = ep.send_cert_status; |
| <span class="self">self</span>.send_sct = ep.send_sct; |
| |
| <span class="kw">let </span>ee = Message { |
| typ: ContentType::Handshake, |
| version: ProtocolVersion::TLSv1_3, |
| payload: MessagePayload::Handshake(HandshakeMessagePayload { |
| typ: HandshakeType::EncryptedExtensions, |
| payload: HandshakePayload::EncryptedExtensions(ep.exts), |
| }), |
| }; |
| |
| <span class="macro">trace!</span>(<span class="string">"sending encrypted extensions {:?}"</span>, ee); |
| <span class="self">self</span>.handshake |
| .transcript |
| .add_message(<span class="kw-2">&</span>ee); |
| sess.common.send_msg(ee, <span class="bool-val">true</span>); |
| <span class="prelude-val">Ok</span>(()) |
| } |
| |
| <span class="kw">fn </span>emit_certificate_req_tls13( |
| <span class="kw-2">&mut </span><span class="self">self</span>, |
| sess: <span class="kw-2">&mut </span>ServerSessionImpl, |
| ) -> <span class="prelude-ty">Result</span><bool, TLSError> { |
| <span class="kw">if </span>!sess.config.verifier.offer_client_auth() { |
| <span class="kw">return </span><span class="prelude-val">Ok</span>(<span class="bool-val">false</span>); |
| } |
| |
| <span class="kw">let </span><span class="kw-2">mut </span>cr = CertificateRequestPayloadTLS13 { |
| context: PayloadU8::empty(), |
| extensions: Vec::new(), |
| }; |
| |
| <span class="kw">let </span>schemes = sess |
| .config |
| .get_verifier() |
| .supported_verify_schemes(); |
| cr.extensions |
| .push(CertReqExtension::SignatureAlgorithms(schemes.to_vec())); |
| |
| <span class="kw">let </span>names = sess |
| .config |
| .verifier |
| .client_auth_root_subjects(sess.get_sni()) |
| .ok_or_else(|| { |
| <span class="macro">debug!</span>(<span class="string">"could not determine root subjects based on SNI"</span>); |
| sess.common |
| .send_fatal_alert(AlertDescription::AccessDenied); |
| TLSError::General(<span class="string">"client rejected by client_auth_root_subjects"</span>.into()) |
| })<span class="question-mark">?</span>; |
| |
| <span class="kw">if </span>!names.is_empty() { |
| cr.extensions |
| .push(CertReqExtension::AuthorityNames(names)); |
| } |
| |
| <span class="kw">let </span>m = Message { |
| typ: ContentType::Handshake, |
| version: ProtocolVersion::TLSv1_3, |
| payload: MessagePayload::Handshake(HandshakeMessagePayload { |
| typ: HandshakeType::CertificateRequest, |
| payload: HandshakePayload::CertificateRequestTLS13(cr), |
| }), |
| }; |
| |
| <span class="macro">trace!</span>(<span class="string">"Sending CertificateRequest {:?}"</span>, m); |
| <span class="self">self</span>.handshake |
| .transcript |
| .add_message(<span class="kw-2">&</span>m); |
| sess.common.send_msg(m, <span class="bool-val">true</span>); |
| <span class="prelude-val">Ok</span>(<span class="bool-val">true</span>) |
| } |
| |
| <span class="kw">fn </span>emit_certificate_tls13( |
| <span class="kw-2">&mut </span><span class="self">self</span>, |
| sess: <span class="kw-2">&mut </span>ServerSessionImpl, |
| server_key: <span class="kw-2">&mut </span>sign::CertifiedKey, |
| ) { |
| <span class="kw">let </span><span class="kw-2">mut </span>cert_entries = <span class="macro">vec!</span>[]; |
| <span class="kw">for </span>cert <span class="kw">in </span>server_key.take_cert() { |
| <span class="kw">let </span>entry = CertificateEntry { |
| cert, |
| exts: Vec::new(), |
| }; |
| |
| cert_entries.push(entry); |
| } |
| |
| <span class="kw">if let </span><span class="prelude-val">Some</span>(end_entity_cert) = cert_entries.first_mut() { |
| <span class="comment">// Apply OCSP response to first certificate (we don't support OCSP |
| // except for leaf certs). |
| </span><span class="kw">if </span><span class="self">self</span>.send_cert_status { |
| <span class="kw">if let </span><span class="prelude-val">Some</span>(ocsp) = server_key.take_ocsp() { |
| <span class="kw">let </span>cst = CertificateStatus::new(ocsp); |
| end_entity_cert |
| .exts |
| .push(CertificateExtension::CertificateStatus(cst)); |
| } |
| } |
| |
| <span class="comment">// Likewise, SCT |
| </span><span class="kw">if </span><span class="self">self</span>.send_sct { |
| <span class="kw">if let </span><span class="prelude-val">Some</span>(sct_list) = server_key.take_sct_list() { |
| end_entity_cert |
| .exts |
| .push(CertificateExtension::make_sct(sct_list)); |
| } |
| } |
| } |
| |
| <span class="kw">let </span>cert_body = CertificatePayloadTLS13::new(cert_entries); |
| <span class="kw">let </span>c = Message { |
| typ: ContentType::Handshake, |
| version: ProtocolVersion::TLSv1_3, |
| payload: MessagePayload::Handshake(HandshakeMessagePayload { |
| typ: HandshakeType::Certificate, |
| payload: HandshakePayload::CertificateTLS13(cert_body), |
| }), |
| }; |
| |
| <span class="macro">trace!</span>(<span class="string">"sending certificate {:?}"</span>, c); |
| <span class="self">self</span>.handshake |
| .transcript |
| .add_message(<span class="kw-2">&</span>c); |
| sess.common.send_msg(c, <span class="bool-val">true</span>); |
| } |
| |
| <span class="kw">fn </span>emit_certificate_verify_tls13( |
| <span class="kw-2">&mut </span><span class="self">self</span>, |
| sess: <span class="kw-2">&mut </span>ServerSessionImpl, |
| server_key: <span class="kw-2">&mut </span>sign::CertifiedKey, |
| schemes: <span class="kw-2">&</span>[SignatureScheme], |
| ) -> <span class="prelude-ty">Result</span><(), TLSError> { |
| <span class="kw">let </span>message = verify::construct_tls13_server_verify_message( |
| <span class="kw-2">&</span><span class="self">self |
| </span>.handshake |
| .transcript |
| .get_current_hash(), |
| ); |
| |
| <span class="kw">let </span>signing_key = <span class="kw-2">&</span>server_key.key; |
| <span class="kw">let </span>signer = signing_key |
| .choose_scheme(schemes) |
| .ok_or_else(|| hs::incompatible(sess, <span class="string">"no overlapping sigschemes"</span>))<span class="question-mark">?</span>; |
| |
| <span class="kw">let </span>scheme = signer.get_scheme(); |
| <span class="kw">let </span>sig = signer.sign(<span class="kw-2">&</span>message)<span class="question-mark">?</span>; |
| |
| <span class="kw">let </span>cv = DigitallySignedStruct::new(scheme, sig); |
| |
| <span class="kw">let </span>m = Message { |
| typ: ContentType::Handshake, |
| version: ProtocolVersion::TLSv1_3, |
| payload: MessagePayload::Handshake(HandshakeMessagePayload { |
| typ: HandshakeType::CertificateVerify, |
| payload: HandshakePayload::CertificateVerify(cv), |
| }), |
| }; |
| |
| <span class="macro">trace!</span>(<span class="string">"sending certificate-verify {:?}"</span>, m); |
| <span class="self">self</span>.handshake |
| .transcript |
| .add_message(<span class="kw-2">&</span>m); |
| sess.common.send_msg(m, <span class="bool-val">true</span>); |
| <span class="prelude-val">Ok</span>(()) |
| } |
| |
| <span class="kw">fn </span>emit_finished_tls13( |
| <span class="kw-2">&mut </span><span class="self">self</span>, |
| sess: <span class="kw-2">&mut </span>ServerSessionImpl, |
| key_schedule: KeyScheduleHandshake, |
| ) -> KeyScheduleTrafficWithClientFinishedPending { |
| <span class="kw">let </span>handshake_hash = <span class="self">self |
| </span>.handshake |
| .transcript |
| .get_current_hash(); |
| <span class="kw">let </span>verify_data = key_schedule.sign_server_finish(<span class="kw-2">&</span>handshake_hash); |
| <span class="kw">let </span>verify_data_payload = Payload::new(verify_data); |
| |
| <span class="kw">let </span>m = Message { |
| typ: ContentType::Handshake, |
| version: ProtocolVersion::TLSv1_3, |
| payload: MessagePayload::Handshake(HandshakeMessagePayload { |
| typ: HandshakeType::Finished, |
| payload: HandshakePayload::Finished(verify_data_payload), |
| }), |
| }; |
| |
| <span class="macro">trace!</span>(<span class="string">"sending finished {:?}"</span>, m); |
| <span class="self">self</span>.handshake |
| .transcript |
| .add_message(<span class="kw-2">&</span>m); |
| <span class="self">self</span>.handshake.hash_at_server_fin = <span class="self">self |
| </span>.handshake |
| .transcript |
| .get_current_hash(); |
| sess.common.send_msg(m, <span class="bool-val">true</span>); |
| |
| <span class="comment">// Now move to application data keys. Read key change is deferred until |
| // the Finish message is received & validated. |
| </span><span class="kw">let </span><span class="kw-2">mut </span>key_schedule_traffic = key_schedule.into_traffic_with_client_finished_pending(); |
| <span class="kw">let </span>suite = sess.common.get_suite_assert(); |
| <span class="kw">let </span>write_key = key_schedule_traffic.server_application_traffic_secret( |
| <span class="kw-2">&</span><span class="self">self</span>.handshake.hash_at_server_fin, |
| <span class="kw-2">&*</span>sess.config.key_log, |
| <span class="kw-2">&</span><span class="self">self</span>.handshake.randoms.client, |
| ); |
| sess.common |
| .record_layer |
| .set_message_encrypter(cipher::new_tls13_write(suite, <span class="kw-2">&</span>write_key)); |
| |
| key_schedule_traffic.exporter_master_secret( |
| <span class="kw-2">&</span><span class="self">self</span>.handshake.hash_at_server_fin, |
| <span class="kw-2">&*</span>sess.config.key_log, |
| <span class="kw-2">&</span><span class="self">self</span>.handshake.randoms.client, |
| ); |
| |
| <span class="kw">let </span>_read_key = key_schedule_traffic.client_application_traffic_secret( |
| <span class="kw-2">&</span><span class="self">self</span>.handshake.hash_at_server_fin, |
| <span class="kw-2">&*</span>sess.config.key_log, |
| <span class="kw-2">&</span><span class="self">self</span>.handshake.randoms.client, |
| ); |
| |
| <span class="attribute">#[cfg(feature = <span class="string">"quic"</span>)] |
| </span>{ |
| sess.common.quic.traffic_secrets = <span class="prelude-val">Some</span>(quic::Secrets { |
| client: _read_key, |
| server: write_key, |
| }); |
| } |
| |
| key_schedule_traffic |
| } |
| |
| <span class="kw">fn </span>attempt_tls13_ticket_decryption( |
| <span class="kw-2">&mut </span><span class="self">self</span>, |
| sess: <span class="kw-2">&mut </span>ServerSessionImpl, |
| ticket: <span class="kw-2">&</span>[u8], |
| ) -> <span class="prelude-ty">Option</span><persist::ServerSessionValue> { |
| <span class="kw">if </span>sess.config.ticketer.enabled() { |
| sess.config |
| .ticketer |
| .decrypt(ticket) |
| .and_then(|plain| persist::ServerSessionValue::read_bytes(<span class="kw-2">&</span>plain)) |
| } <span class="kw">else </span>{ |
| sess.config |
| .session_storage |
| .take(ticket) |
| .and_then(|plain| persist::ServerSessionValue::read_bytes(<span class="kw-2">&</span>plain)) |
| } |
| } |
| |
| <span class="kw">pub fn </span>handle_client_hello( |
| <span class="kw-2">mut </span><span class="self">self</span>, |
| sess: <span class="kw-2">&mut </span>ServerSessionImpl, |
| <span class="kw-2">mut </span>server_key: sign::CertifiedKey, |
| chm: <span class="kw-2">&</span>Message, |
| ) -> hs::NextStateOrError { |
| <span class="kw">let </span>client_hello = <span class="macro">require_handshake_msg!</span>( |
| chm, |
| HandshakeType::ClientHello, |
| HandshakePayload::ClientHello |
| )<span class="question-mark">?</span>; |
| |
| <span class="kw">if </span>client_hello.compression_methods.len() != <span class="number">1 </span>{ |
| <span class="kw">return </span><span class="prelude-val">Err</span>(hs::illegal_param(sess, <span class="string">"client offered wrong compressions"</span>)); |
| } |
| |
| <span class="kw">let </span>groups_ext = client_hello |
| .get_namedgroups_extension() |
| .ok_or_else(|| hs::incompatible(sess, <span class="string">"client didn't describe groups"</span>))<span class="question-mark">?</span>; |
| |
| <span class="kw">let </span><span class="kw-2">mut </span>sigschemes_ext = client_hello |
| .get_sigalgs_extension() |
| .ok_or_else(|| hs::incompatible(sess, <span class="string">"client didn't describe sigschemes"</span>))<span class="question-mark">? |
| </span>.clone(); |
| |
| <span class="kw">let </span>tls13_schemes = sign::supported_sign_tls13(); |
| sigschemes_ext.retain(|scheme| tls13_schemes.contains(scheme)); |
| |
| <span class="kw">let </span>shares_ext = client_hello |
| .get_keyshare_extension() |
| .ok_or_else(|| hs::incompatible(sess, <span class="string">"client didn't send keyshares"</span>))<span class="question-mark">?</span>; |
| |
| <span class="kw">if </span>client_hello.has_keyshare_extension_with_duplicates() { |
| <span class="kw">return </span><span class="prelude-val">Err</span>(hs::illegal_param(sess, <span class="string">"client sent duplicate keyshares"</span>)); |
| } |
| |
| <span class="kw">let </span>share_groups: Vec<NamedGroup> = shares_ext |
| .iter() |
| .map(|share| share.group) |
| .collect(); |
| |
| <span class="kw">let </span>supported_groups = suites::KeyExchange::supported_groups(); |
| <span class="kw">let </span>chosen_group = supported_groups |
| .iter() |
| .filter(|group| share_groups.contains(group)) |
| .nth(<span class="number">0</span>) |
| .cloned(); |
| |
| <span class="kw">if </span>chosen_group.is_none() { |
| <span class="comment">// We don't have a suitable key share. Choose a suitable group and |
| // send a HelloRetryRequest. |
| </span><span class="kw">let </span>retry_group_maybe = supported_groups |
| .iter() |
| .filter(|group| groups_ext.contains(group)) |
| .nth(<span class="number">0</span>) |
| .cloned(); |
| <span class="self">self</span>.handshake |
| .transcript |
| .add_message(chm); |
| |
| <span class="kw">if let </span><span class="prelude-val">Some</span>(group) = retry_group_maybe { |
| <span class="kw">if </span><span class="self">self</span>.done_retry { |
| <span class="kw">return </span><span class="prelude-val">Err</span>(hs::illegal_param(sess, <span class="string">"did not follow retry request"</span>)); |
| } |
| |
| <span class="self">self</span>.emit_hello_retry_request(sess, group); |
| <span class="self">self</span>.emit_fake_ccs(sess); |
| <span class="kw">return </span><span class="prelude-val">Ok</span>(<span class="self">self</span>.into_expect_retried_client_hello()); |
| } |
| |
| <span class="kw">return </span><span class="prelude-val">Err</span>(hs::incompatible(sess, <span class="string">"no kx group overlap with client"</span>)); |
| } |
| |
| <span class="kw">let </span>chosen_group = chosen_group.unwrap(); |
| <span class="kw">let </span>chosen_share = shares_ext |
| .iter() |
| .find(|share| share.group == chosen_group) |
| .unwrap(); |
| |
| <span class="kw">let </span><span class="kw-2">mut </span>chosen_psk_index = <span class="prelude-val">None</span>; |
| <span class="kw">let </span><span class="kw-2">mut </span>resumedata = <span class="prelude-val">None</span>; |
| <span class="kw">if let </span><span class="prelude-val">Some</span>(psk_offer) = client_hello.get_psk() { |
| <span class="kw">if </span>!client_hello.check_psk_ext_is_last() { |
| <span class="kw">return </span><span class="prelude-val">Err</span>(hs::illegal_param(sess, <span class="string">"psk extension in wrong position"</span>)); |
| } |
| |
| <span class="kw">if </span>psk_offer.binders.is_empty() { |
| <span class="kw">return </span><span class="prelude-val">Err</span>(hs::decode_error(sess, <span class="string">"psk extension missing binder"</span>)); |
| } |
| |
| <span class="kw">if </span>psk_offer.binders.len() != psk_offer.identities.len() { |
| <span class="kw">return </span><span class="prelude-val">Err</span>(hs::illegal_param( |
| sess, |
| <span class="string">"psk extension mismatched ids/binders"</span>, |
| )); |
| } |
| |
| <span class="kw">for </span>(i, psk_id) <span class="kw">in </span>psk_offer.identities.iter().enumerate() { |
| <span class="kw">let </span>maybe_resume = <span class="self">self</span>.attempt_tls13_ticket_decryption(sess, <span class="kw-2">&</span>psk_id.identity.<span class="number">0</span>); |
| |
| <span class="kw">if </span>!hs::can_resume(sess, <span class="kw-2">&</span><span class="self">self</span>.handshake, <span class="kw-2">&</span>maybe_resume) { |
| <span class="kw">continue</span>; |
| } |
| |
| <span class="kw">let </span>resume = maybe_resume.unwrap(); |
| |
| <span class="kw">if </span>!<span class="self">self</span>.check_binder(sess, chm, <span class="kw-2">&</span>resume.master_secret.<span class="number">0</span>, <span class="kw-2">&</span>psk_offer.binders[i].<span class="number">0</span>) { |
| sess.common |
| .send_fatal_alert(AlertDescription::DecryptError); |
| <span class="kw">return </span><span class="prelude-val">Err</span>(TLSError::PeerMisbehavedError( |
| <span class="string">"client sent wrong binder"</span>.to_string(), |
| )); |
| } |
| |
| chosen_psk_index = <span class="prelude-val">Some</span>(i); |
| resumedata = <span class="prelude-val">Some</span>(resume); |
| <span class="kw">break</span>; |
| } |
| } |
| |
| <span class="kw">if </span>!client_hello.psk_mode_offered(PSKKeyExchangeMode::PSK_DHE_KE) { |
| <span class="macro">debug!</span>(<span class="string">"Client unwilling to resume, DHE_KE not offered"</span>); |
| <span class="self">self</span>.send_ticket = <span class="bool-val">false</span>; |
| chosen_psk_index = <span class="prelude-val">None</span>; |
| resumedata = <span class="prelude-val">None</span>; |
| } <span class="kw">else </span>{ |
| <span class="self">self</span>.send_ticket = <span class="bool-val">true</span>; |
| } |
| |
| <span class="kw">if let </span><span class="prelude-val">Some</span>(<span class="kw-2">ref </span>resume) = resumedata { |
| sess.received_resumption_data = <span class="prelude-val">Some</span>(resume.application_data.<span class="number">0</span>.clone()); |
| sess.client_cert_chain = resume.client_cert_chain.clone(); |
| } |
| |
| <span class="kw">let </span>full_handshake = resumedata.is_none(); |
| <span class="self">self</span>.handshake |
| .transcript |
| .add_message(chm); |
| <span class="kw">let </span>key_schedule = <span class="self">self</span>.emit_server_hello( |
| sess, |
| <span class="kw-2">&</span>client_hello.session_id, |
| chosen_share, |
| chosen_psk_index, |
| resumedata |
| .as_ref() |
| .map(|x| <span class="kw-2">&</span>x.master_secret.<span class="number">0</span>[..]), |
| )<span class="question-mark">?</span>; |
| <span class="kw">if </span>!<span class="self">self</span>.done_retry { |
| <span class="self">self</span>.emit_fake_ccs(sess); |
| } |
| <span class="self">self</span>.emit_encrypted_extensions(sess, <span class="kw-2">&mut </span>server_key, client_hello, resumedata.as_ref())<span class="question-mark">?</span>; |
| |
| <span class="kw">let </span>doing_client_auth = <span class="kw">if </span>full_handshake { |
| <span class="kw">let </span>client_auth = <span class="self">self</span>.emit_certificate_req_tls13(sess)<span class="question-mark">?</span>; |
| <span class="self">self</span>.emit_certificate_tls13(sess, <span class="kw-2">&mut </span>server_key); |
| <span class="self">self</span>.emit_certificate_verify_tls13(sess, <span class="kw-2">&mut </span>server_key, <span class="kw-2">&</span>sigschemes_ext)<span class="question-mark">?</span>; |
| client_auth |
| } <span class="kw">else </span>{ |
| <span class="bool-val">false |
| </span>}; |
| |
| hs::check_aligned_handshake(sess)<span class="question-mark">?</span>; |
| <span class="kw">let </span>key_schedule_traffic = <span class="self">self</span>.emit_finished_tls13(sess, key_schedule); |
| |
| <span class="kw">if </span>doing_client_auth { |
| <span class="prelude-val">Ok</span>(<span class="self">self</span>.into_expect_certificate(key_schedule_traffic)) |
| } <span class="kw">else </span>{ |
| <span class="prelude-val">Ok</span>(<span class="self">self</span>.into_expect_finished(key_schedule_traffic)) |
| } |
| } |
| } |
| |
| <span class="kw">pub struct </span>ExpectCertificate { |
| <span class="kw">pub </span>handshake: HandshakeDetails, |
| <span class="kw">pub </span>key_schedule: KeyScheduleTrafficWithClientFinishedPending, |
| <span class="kw">pub </span>send_ticket: bool, |
| } |
| |
| <span class="kw">impl </span>ExpectCertificate { |
| <span class="kw">fn </span>into_expect_finished(<span class="self">self</span>) -> hs::NextState { |
| Box::new(ExpectFinished { |
| key_schedule: <span class="self">self</span>.key_schedule, |
| handshake: <span class="self">self</span>.handshake, |
| send_ticket: <span class="self">self</span>.send_ticket, |
| }) |
| } |
| |
| <span class="kw">fn </span>into_expect_certificate_verify(<span class="self">self</span>, cert: ClientCertDetails) -> hs::NextState { |
| Box::new(ExpectCertificateVerify { |
| handshake: <span class="self">self</span>.handshake, |
| key_schedule: <span class="self">self</span>.key_schedule, |
| client_cert: cert, |
| send_ticket: <span class="self">self</span>.send_ticket, |
| }) |
| } |
| } |
| |
| <span class="kw">impl </span>hs::State <span class="kw">for </span>ExpectCertificate { |
| <span class="kw">fn </span>handle( |
| <span class="kw-2">mut </span><span class="self">self</span>: Box<<span class="self">Self</span>>, |
| sess: <span class="kw-2">&mut </span>ServerSessionImpl, |
| m: Message, |
| ) -> hs::NextStateOrError { |
| <span class="kw">let </span>certp = <span class="macro">require_handshake_msg!</span>( |
| m, |
| HandshakeType::Certificate, |
| HandshakePayload::CertificateTLS13 |
| )<span class="question-mark">?</span>; |
| <span class="self">self</span>.handshake |
| .transcript |
| .add_message(<span class="kw-2">&</span>m); |
| |
| <span class="comment">// We don't send any CertificateRequest extensions, so any extensions |
| // here are illegal. |
| </span><span class="kw">if </span>certp.any_entry_has_extension() { |
| <span class="kw">return </span><span class="prelude-val">Err</span>(TLSError::PeerMisbehavedError( |
| <span class="string">"client sent unsolicited cert extension"</span>.to_string(), |
| )); |
| } |
| |
| <span class="kw">let </span>cert_chain = certp.convert(); |
| |
| <span class="kw">let </span>mandatory = sess |
| .config |
| .verifier |
| .client_auth_mandatory(sess.get_sni()) |
| .ok_or_else(|| { |
| <span class="macro">debug!</span>(<span class="string">"could not determine if client auth is mandatory based on SNI"</span>); |
| sess.common |
| .send_fatal_alert(AlertDescription::AccessDenied); |
| TLSError::General(<span class="string">"client rejected by client_auth_mandatory"</span>.into()) |
| })<span class="question-mark">?</span>; |
| |
| <span class="kw">if </span>cert_chain.is_empty() { |
| <span class="kw">if </span>!mandatory { |
| <span class="macro">debug!</span>(<span class="string">"client auth requested but no certificate supplied"</span>); |
| <span class="self">self</span>.handshake |
| .transcript |
| .abandon_client_auth(); |
| <span class="kw">return </span><span class="prelude-val">Ok</span>(<span class="self">self</span>.into_expect_finished()); |
| } |
| |
| sess.common |
| .send_fatal_alert(AlertDescription::CertificateRequired); |
| <span class="kw">return </span><span class="prelude-val">Err</span>(TLSError::NoCertificatesPresented); |
| } |
| |
| sess.config |
| .get_verifier() |
| .verify_client_cert(<span class="kw-2">&</span>cert_chain, sess.get_sni()) |
| .or_else(|err| { |
| hs::incompatible(sess, <span class="string">"certificate invalid"</span>); |
| <span class="prelude-val">Err</span>(err) |
| })<span class="question-mark">?</span>; |
| |
| <span class="kw">let </span>cert = ClientCertDetails::new(cert_chain); |
| <span class="prelude-val">Ok</span>(<span class="self">self</span>.into_expect_certificate_verify(cert)) |
| } |
| } |
| |
| <span class="kw">pub struct </span>ExpectCertificateVerify { |
| handshake: HandshakeDetails, |
| key_schedule: KeyScheduleTrafficWithClientFinishedPending, |
| client_cert: ClientCertDetails, |
| send_ticket: bool, |
| } |
| |
| <span class="kw">impl </span>ExpectCertificateVerify { |
| <span class="kw">fn </span>into_expect_finished(<span class="self">self</span>) -> hs::NextState { |
| Box::new(ExpectFinished { |
| key_schedule: <span class="self">self</span>.key_schedule, |
| handshake: <span class="self">self</span>.handshake, |
| send_ticket: <span class="self">self</span>.send_ticket, |
| }) |
| } |
| } |
| |
| <span class="kw">impl </span>hs::State <span class="kw">for </span>ExpectCertificateVerify { |
| <span class="kw">fn </span>handle( |
| <span class="kw-2">mut </span><span class="self">self</span>: Box<<span class="self">Self</span>>, |
| sess: <span class="kw-2">&mut </span>ServerSessionImpl, |
| m: Message, |
| ) -> hs::NextStateOrError { |
| <span class="kw">let </span>rc = { |
| <span class="kw">let </span>sig = <span class="macro">require_handshake_msg!</span>( |
| m, |
| HandshakeType::CertificateVerify, |
| HandshakePayload::CertificateVerify |
| )<span class="question-mark">?</span>; |
| <span class="kw">let </span>handshake_hash = <span class="self">self |
| </span>.handshake |
| .transcript |
| .get_current_hash(); |
| <span class="self">self</span>.handshake |
| .transcript |
| .abandon_client_auth(); |
| <span class="kw">let </span>certs = <span class="kw-2">&</span><span class="self">self</span>.client_cert.cert_chain; |
| <span class="kw">let </span>msg = verify::construct_tls13_client_verify_message(<span class="kw-2">&</span>handshake_hash); |
| |
| sess.config |
| .get_verifier() |
| .verify_tls13_signature(<span class="kw-2">&</span>msg, <span class="kw-2">&</span>certs[<span class="number">0</span>], sig) |
| }; |
| |
| <span class="kw">if let </span><span class="prelude-val">Err</span>(e) = rc { |
| sess.common |
| .send_fatal_alert(AlertDescription::AccessDenied); |
| <span class="kw">return </span><span class="prelude-val">Err</span>(e); |
| } |
| |
| <span class="macro">trace!</span>(<span class="string">"client CertificateVerify OK"</span>); |
| sess.client_cert_chain = <span class="prelude-val">Some</span>(<span class="self">self</span>.client_cert.take_chain()); |
| |
| <span class="self">self</span>.handshake |
| .transcript |
| .add_message(<span class="kw-2">&</span>m); |
| <span class="prelude-val">Ok</span>(<span class="self">self</span>.into_expect_finished()) |
| } |
| } |
| |
| <span class="comment">// --- Process client's Finished --- |
| </span><span class="kw">fn </span>get_server_session_value( |
| handshake: <span class="kw-2">&mut </span>HandshakeDetails, |
| key_schedule: <span class="kw-2">&</span>KeyScheduleTraffic, |
| sess: <span class="kw-2">&</span>ServerSessionImpl, |
| nonce: <span class="kw-2">&</span>[u8], |
| ) -> persist::ServerSessionValue { |
| <span class="kw">let </span>scs = sess.common.get_suite_assert(); |
| <span class="kw">let </span>version = ProtocolVersion::TLSv1_3; |
| |
| <span class="kw">let </span>handshake_hash = handshake.transcript.get_current_hash(); |
| <span class="kw">let </span>secret = |
| key_schedule.resumption_master_secret_and_derive_ticket_psk(<span class="kw-2">&</span>handshake_hash, nonce); |
| |
| persist::ServerSessionValue::new( |
| sess.get_sni(), |
| version, |
| scs.suite, |
| secret, |
| <span class="kw-2">&</span>sess.client_cert_chain, |
| sess.alpn_protocol.clone(), |
| sess.resumption_data.clone(), |
| ) |
| } |
| |
| <span class="kw">pub struct </span>ExpectFinished { |
| <span class="kw">pub </span>handshake: HandshakeDetails, |
| <span class="kw">pub </span>key_schedule: KeyScheduleTrafficWithClientFinishedPending, |
| <span class="kw">pub </span>send_ticket: bool, |
| } |
| |
| <span class="kw">impl </span>ExpectFinished { |
| <span class="kw">fn </span>into_expect_traffic( |
| fin: verify::FinishedMessageVerified, |
| ks: KeyScheduleTraffic, |
| ) -> hs::NextState { |
| Box::new(ExpectTraffic { |
| key_schedule: ks, |
| want_write_key_update: <span class="bool-val">false</span>, |
| _fin_verified: fin, |
| }) |
| } |
| |
| <span class="kw">fn </span>emit_stateless_ticket( |
| handshake: <span class="kw-2">&mut </span>HandshakeDetails, |
| sess: <span class="kw-2">&mut </span>ServerSessionImpl, |
| key_schedule: <span class="kw-2">&</span>KeyScheduleTraffic, |
| ) { |
| <span class="kw">let </span>nonce = rand::random_vec(<span class="number">32</span>); |
| <span class="kw">let </span>plain = get_server_session_value(handshake, key_schedule, sess, <span class="kw-2">&</span>nonce).get_encoding(); |
| <span class="kw">let </span>maybe_ticket = sess.config.ticketer.encrypt(<span class="kw-2">&</span>plain); |
| <span class="kw">let </span>ticket_lifetime = sess.config.ticketer.get_lifetime(); |
| |
| <span class="kw">if </span>maybe_ticket.is_none() { |
| <span class="kw">return</span>; |
| } |
| |
| <span class="kw">let </span>ticket = maybe_ticket.unwrap(); |
| <span class="kw">let </span>age_add = rand::random_u32(); <span class="comment">// nb, we don't do 0-RTT data, so whatever |
| </span><span class="attribute">#[allow(unused_mut)] |
| </span><span class="kw">let </span><span class="kw-2">mut </span>payload = |
| NewSessionTicketPayloadTLS13::new(ticket_lifetime, age_add, nonce, ticket); |
| <span class="attribute">#[cfg(feature = <span class="string">"quic"</span>)] |
| </span>{ |
| <span class="kw">if </span>sess.config.max_early_data_size > <span class="number">0 </span>&& sess.common.protocol == Protocol::Quic { |
| payload |
| .exts |
| .push(NewSessionTicketExtension::EarlyData( |
| sess.config.max_early_data_size, |
| )); |
| } |
| } |
| <span class="kw">let </span>m = Message { |
| typ: ContentType::Handshake, |
| version: ProtocolVersion::TLSv1_3, |
| payload: MessagePayload::Handshake(HandshakeMessagePayload { |
| typ: HandshakeType::NewSessionTicket, |
| payload: HandshakePayload::NewSessionTicketTLS13(payload), |
| }), |
| }; |
| |
| <span class="macro">trace!</span>(<span class="string">"sending new ticket {:?}"</span>, m); |
| handshake.transcript.add_message(<span class="kw-2">&</span>m); |
| sess.common.send_msg(m, <span class="bool-val">true</span>); |
| } |
| |
| <span class="kw">fn </span>emit_stateful_ticket( |
| handshake: <span class="kw-2">&mut </span>HandshakeDetails, |
| sess: <span class="kw-2">&mut </span>ServerSessionImpl, |
| key_schedule: <span class="kw-2">&</span>KeyScheduleTraffic, |
| ) { |
| <span class="kw">let </span>nonce = rand::random_vec(<span class="number">32</span>); |
| <span class="kw">let </span>id = rand::random_vec(<span class="number">32</span>); |
| <span class="kw">let </span>plain = get_server_session_value(handshake, key_schedule, sess, <span class="kw-2">&</span>nonce).get_encoding(); |
| |
| <span class="kw">if </span>sess |
| .config |
| .session_storage |
| .put(id.clone(), plain) |
| { |
| <span class="kw">let </span>stateful_lifetime = <span class="number">24 </span>* <span class="number">60 </span>* <span class="number">60</span>; <span class="comment">// this is a bit of a punt |
| </span><span class="kw">let </span>age_add = rand::random_u32(); |
| <span class="attribute">#[allow(unused_mut)] |
| </span><span class="kw">let </span><span class="kw-2">mut </span>payload = |
| NewSessionTicketPayloadTLS13::new(stateful_lifetime, age_add, nonce, id); |
| <span class="attribute">#[cfg(feature = <span class="string">"quic"</span>)] |
| </span>{ |
| <span class="kw">if </span>sess.config.max_early_data_size > <span class="number">0 </span>&& sess.common.protocol == Protocol::Quic { |
| payload |
| .exts |
| .push(NewSessionTicketExtension::EarlyData( |
| sess.config.max_early_data_size, |
| )); |
| } |
| } |
| <span class="kw">let </span>m = Message { |
| typ: ContentType::Handshake, |
| version: ProtocolVersion::TLSv1_3, |
| payload: MessagePayload::Handshake(HandshakeMessagePayload { |
| typ: HandshakeType::NewSessionTicket, |
| payload: HandshakePayload::NewSessionTicketTLS13(payload), |
| }), |
| }; |
| |
| <span class="macro">trace!</span>(<span class="string">"sending new stateful ticket {:?}"</span>, m); |
| handshake.transcript.add_message(<span class="kw-2">&</span>m); |
| sess.common.send_msg(m, <span class="bool-val">true</span>); |
| } <span class="kw">else </span>{ |
| <span class="macro">trace!</span>(<span class="string">"resumption not available; not issuing ticket"</span>); |
| } |
| } |
| } |
| |
| <span class="kw">impl </span>hs::State <span class="kw">for </span>ExpectFinished { |
| <span class="kw">fn </span>handle( |
| <span class="kw-2">mut </span><span class="self">self</span>: Box<<span class="self">Self</span>>, |
| sess: <span class="kw-2">&mut </span>ServerSessionImpl, |
| m: Message, |
| ) -> hs::NextStateOrError { |
| <span class="kw">let </span>finished = |
| <span class="macro">require_handshake_msg!</span>(m, HandshakeType::Finished, HandshakePayload::Finished)<span class="question-mark">?</span>; |
| |
| <span class="kw">let </span>handshake_hash = <span class="self">self |
| </span>.handshake |
| .transcript |
| .get_current_hash(); |
| <span class="kw">let </span>expect_verify_data = <span class="self">self |
| </span>.key_schedule |
| .sign_client_finish(<span class="kw-2">&</span>handshake_hash); |
| |
| <span class="kw">let </span>fin = constant_time::verify_slices_are_equal(<span class="kw-2">&</span>expect_verify_data, <span class="kw-2">&</span>finished.<span class="number">0</span>) |
| .map_err(|<span class="kw">_</span>| { |
| sess.common |
| .send_fatal_alert(AlertDescription::DecryptError); |
| <span class="macro">warn!</span>(<span class="string">"Finished wrong"</span>); |
| TLSError::DecryptError |
| }) |
| .map(|<span class="kw">_</span>| verify::FinishedMessageVerified::assertion())<span class="question-mark">?</span>; |
| |
| <span class="comment">// nb. future derivations include Client Finished, but not the |
| // main application data keying. |
| </span><span class="self">self</span>.handshake |
| .transcript |
| .add_message(<span class="kw-2">&</span>m); |
| |
| hs::check_aligned_handshake(sess)<span class="question-mark">?</span>; |
| |
| <span class="kw">let </span>suite = sess.common.get_suite_assert(); |
| |
| <span class="comment">// Install keying to read future messages. |
| </span><span class="kw">let </span>read_key = <span class="self">self |
| </span>.key_schedule |
| .client_application_traffic_secret( |
| <span class="kw-2">&</span><span class="self">self</span>.handshake.hash_at_server_fin, |
| <span class="kw-2">&*</span>sess.config.key_log, |
| <span class="kw-2">&</span><span class="self">self</span>.handshake.randoms.client, |
| ); |
| sess.common |
| .record_layer |
| .set_message_decrypter(cipher::new_tls13_read(suite, <span class="kw-2">&</span>read_key)); |
| |
| <span class="kw">let </span>key_schedule_traffic = <span class="self">self</span>.key_schedule.into_traffic(); |
| |
| <span class="kw">if </span><span class="self">self</span>.send_ticket { |
| <span class="kw">if </span>sess.config.ticketer.enabled() { |
| <span class="self">Self</span>::emit_stateless_ticket(<span class="kw-2">&mut </span><span class="self">self</span>.handshake, sess, <span class="kw-2">&</span>key_schedule_traffic); |
| } <span class="kw">else </span>{ |
| <span class="self">Self</span>::emit_stateful_ticket(<span class="kw-2">&mut </span><span class="self">self</span>.handshake, sess, <span class="kw-2">&</span>key_schedule_traffic); |
| } |
| } |
| |
| sess.common.start_traffic(); |
| |
| <span class="attribute">#[cfg(feature = <span class="string">"quic"</span>)] |
| </span>{ |
| <span class="kw">if </span>sess.common.protocol == Protocol::Quic { |
| <span class="kw">return </span><span class="prelude-val">Ok</span>(Box::new(ExpectQUICTraffic { |
| key_schedule: key_schedule_traffic, |
| _fin_verified: fin, |
| })); |
| } |
| } |
| |
| <span class="prelude-val">Ok</span>(<span class="self">Self</span>::into_expect_traffic(fin, key_schedule_traffic)) |
| } |
| } |
| |
| <span class="comment">// --- Process traffic --- |
| </span><span class="kw">pub struct </span>ExpectTraffic { |
| key_schedule: KeyScheduleTraffic, |
| want_write_key_update: bool, |
| _fin_verified: verify::FinishedMessageVerified, |
| } |
| |
| <span class="kw">impl </span>ExpectTraffic { |
| <span class="kw">fn </span>handle_traffic(<span class="kw-2">&</span><span class="self">self</span>, sess: <span class="kw-2">&mut </span>ServerSessionImpl, <span class="kw-2">mut </span>m: Message) -> <span class="prelude-ty">Result</span><(), TLSError> { |
| sess.common |
| .take_received_plaintext(m.take_opaque_payload().unwrap()); |
| <span class="prelude-val">Ok</span>(()) |
| } |
| |
| <span class="kw">fn </span>handle_key_update( |
| <span class="kw-2">&mut </span><span class="self">self</span>, |
| sess: <span class="kw-2">&mut </span>ServerSessionImpl, |
| kur: <span class="kw-2">&</span>KeyUpdateRequest, |
| ) -> <span class="prelude-ty">Result</span><(), TLSError> { |
| <span class="attribute">#[cfg(feature = <span class="string">"quic"</span>)] |
| </span>{ |
| <span class="kw">if let </span>Protocol::Quic = sess.common.protocol { |
| sess.common |
| .send_fatal_alert(AlertDescription::UnexpectedMessage); |
| <span class="kw">let </span>msg = <span class="string">"KeyUpdate received in QUIC connection"</span>.to_string(); |
| <span class="macro">warn!</span>(<span class="string">"{}"</span>, msg); |
| <span class="kw">return </span><span class="prelude-val">Err</span>(TLSError::PeerMisbehavedError(msg)); |
| } |
| } |
| |
| hs::check_aligned_handshake(sess)<span class="question-mark">?</span>; |
| |
| <span class="kw">match </span>kur { |
| KeyUpdateRequest::UpdateNotRequested => {} |
| KeyUpdateRequest::UpdateRequested => { |
| <span class="self">self</span>.want_write_key_update = <span class="bool-val">true</span>; |
| } |
| <span class="kw">_ </span>=> { |
| sess.common |
| .send_fatal_alert(AlertDescription::IllegalParameter); |
| <span class="kw">return </span><span class="prelude-val">Err</span>(TLSError::CorruptMessagePayload(ContentType::Handshake)); |
| } |
| } |
| |
| <span class="comment">// Update our read-side keys. |
| </span><span class="kw">let </span>new_read_key = <span class="self">self |
| </span>.key_schedule |
| .next_client_application_traffic_secret(); |
| <span class="kw">let </span>suite = sess.common.get_suite_assert(); |
| sess.common |
| .record_layer |
| .set_message_decrypter(cipher::new_tls13_read(suite, <span class="kw-2">&</span>new_read_key)); |
| |
| <span class="prelude-val">Ok</span>(()) |
| } |
| } |
| |
| <span class="kw">impl </span>hs::State <span class="kw">for </span>ExpectTraffic { |
| <span class="kw">fn </span>handle( |
| <span class="kw-2">mut </span><span class="self">self</span>: Box<<span class="self">Self</span>>, |
| sess: <span class="kw-2">&mut </span>ServerSessionImpl, |
| m: Message, |
| ) -> hs::NextStateOrError { |
| <span class="kw">if </span>m.is_content_type(ContentType::ApplicationData) { |
| <span class="self">self</span>.handle_traffic(sess, m)<span class="question-mark">?</span>; |
| } <span class="kw">else if let </span><span class="prelude-val">Ok</span>(key_update) = |
| <span class="macro">require_handshake_msg!</span>(m, HandshakeType::KeyUpdate, HandshakePayload::KeyUpdate) |
| { |
| <span class="self">self</span>.handle_key_update(sess, key_update)<span class="question-mark">?</span>; |
| } <span class="kw">else </span>{ |
| check_message( |
| <span class="kw-2">&</span>m, |
| <span class="kw-2">&</span>[ContentType::ApplicationData, ContentType::Handshake], |
| <span class="kw-2">&</span>[HandshakeType::KeyUpdate], |
| )<span class="question-mark">?</span>; |
| } |
| |
| <span class="prelude-val">Ok</span>(<span class="self">self</span>) |
| } |
| |
| <span class="kw">fn </span>export_keying_material( |
| <span class="kw-2">&</span><span class="self">self</span>, |
| output: <span class="kw-2">&mut </span>[u8], |
| label: <span class="kw-2">&</span>[u8], |
| context: <span class="prelude-ty">Option</span><<span class="kw-2">&</span>[u8]>, |
| ) -> <span class="prelude-ty">Result</span><(), TLSError> { |
| <span class="self">self</span>.key_schedule |
| .export_keying_material(output, label, context) |
| } |
| |
| <span class="kw">fn </span>perhaps_write_key_update(<span class="kw-2">&mut </span><span class="self">self</span>, sess: <span class="kw-2">&mut </span>ServerSessionImpl) { |
| <span class="kw">if </span><span class="self">self</span>.want_write_key_update { |
| <span class="self">self</span>.want_write_key_update = <span class="bool-val">false</span>; |
| sess.common |
| .send_msg_encrypt(Message::build_key_update_notify()); |
| |
| <span class="kw">let </span>write_key = <span class="self">self |
| </span>.key_schedule |
| .next_server_application_traffic_secret(); |
| <span class="kw">let </span>scs = sess.common.get_suite_assert(); |
| sess.common |
| .record_layer |
| .set_message_encrypter(cipher::new_tls13_write(scs, <span class="kw-2">&</span>write_key)); |
| } |
| } |
| } |
| |
| <span class="attribute">#[cfg(feature = <span class="string">"quic"</span>)] |
| </span><span class="kw">pub struct </span>ExpectQUICTraffic { |
| key_schedule: KeyScheduleTraffic, |
| _fin_verified: verify::FinishedMessageVerified, |
| } |
| |
| <span class="attribute">#[cfg(feature = <span class="string">"quic"</span>)] |
| </span><span class="kw">impl </span>hs::State <span class="kw">for </span>ExpectQUICTraffic { |
| <span class="kw">fn </span>handle(<span class="self">self</span>: Box<<span class="self">Self</span>>, <span class="kw">_</span>: <span class="kw-2">&mut </span>ServerSessionImpl, m: Message) -> hs::NextStateOrError { |
| <span class="comment">// reject all messages |
| </span>check_message(<span class="kw-2">&</span>m, <span class="kw-2">&</span>[], <span class="kw-2">&</span>[])<span class="question-mark">?</span>; |
| <span class="macro">unreachable!</span>(); |
| } |
| |
| <span class="kw">fn </span>export_keying_material( |
| <span class="kw-2">&</span><span class="self">self</span>, |
| output: <span class="kw-2">&mut </span>[u8], |
| label: <span class="kw-2">&</span>[u8], |
| context: <span class="prelude-ty">Option</span><<span class="kw-2">&</span>[u8]>, |
| ) -> <span class="prelude-ty">Result</span><(), TLSError> { |
| <span class="self">self</span>.key_schedule |
| .export_keying_material(output, label, context) |
| } |
| } |
| </code></pre></div> |
| </section></div></main><div id="rustdoc-vars" data-root-path="../../../" data-current-crate="rustls" data-themes="ayu,dark,light" data-resource-suffix="" data-rustdoc-version="1.66.0-nightly (5c8bff74b 2022-10-21)" ></div></body></html> |