1 | //! Unbuffered connection API |
2 | |
3 | use alloc::vec::Vec; |
4 | use core::num::NonZeroUsize; |
5 | use core::{fmt, mem}; |
6 | #[cfg (feature = "std" )] |
7 | use std::error::Error as StdError; |
8 | |
9 | use super::UnbufferedConnectionCommon; |
10 | use crate::Error; |
11 | use crate::client::ClientConnectionData; |
12 | use crate::msgs::deframer::buffers::DeframerSliceBuffer; |
13 | use crate::server::ServerConnectionData; |
14 | |
15 | impl UnbufferedConnectionCommon<ClientConnectionData> { |
16 | /// Processes the TLS records in `incoming_tls` buffer until a new [`UnbufferedStatus`] is |
17 | /// reached. |
18 | pub fn process_tls_records<'c, 'i>( |
19 | &'c mut self, |
20 | incoming_tls: &'i mut [u8], |
21 | ) -> UnbufferedStatus<'c, 'i, ClientConnectionData> { |
22 | self.process_tls_records_common(incoming_tls, |_| false, |_, _| unreachable!()) |
23 | } |
24 | } |
25 | |
26 | impl UnbufferedConnectionCommon<ServerConnectionData> { |
27 | /// Processes the TLS records in `incoming_tls` buffer until a new [`UnbufferedStatus`] is |
28 | /// reached. |
29 | pub fn process_tls_records<'c, 'i>( |
30 | &'c mut self, |
31 | incoming_tls: &'i mut [u8], |
32 | ) -> UnbufferedStatus<'c, 'i, ServerConnectionData> { |
33 | self.process_tls_records_common( |
34 | incoming_tls, |
35 | |conn| conn.peek_early_data().is_some(), |
36 | |conn: &mut UnbufferedConnectionCommon<…>, incoming_tls: &mut [u8]| ReadEarlyData::new(conn, incoming_tls).into(), |
37 | ) |
38 | } |
39 | } |
40 | |
41 | impl<Data> UnbufferedConnectionCommon<Data> { |
42 | fn process_tls_records_common<'c, 'i>( |
43 | &'c mut self, |
44 | incoming_tls: &'i mut [u8], |
45 | mut early_data_available: impl FnMut(&mut Self) -> bool, |
46 | early_data_state: impl FnOnce(&'c mut Self, &'i mut [u8]) -> ConnectionState<'c, 'i, Data>, |
47 | ) -> UnbufferedStatus<'c, 'i, Data> { |
48 | let mut buffer = DeframerSliceBuffer::new(incoming_tls); |
49 | let mut buffer_progress = self.core.hs_deframer.progress(); |
50 | |
51 | let (discard, state) = loop { |
52 | if early_data_available(self) { |
53 | break ( |
54 | buffer.pending_discard(), |
55 | early_data_state(self, incoming_tls), |
56 | ); |
57 | } |
58 | |
59 | if !self |
60 | .core |
61 | .common_state |
62 | .received_plaintext |
63 | .is_empty() |
64 | { |
65 | break ( |
66 | buffer.pending_discard(), |
67 | ReadTraffic::new(self, incoming_tls).into(), |
68 | ); |
69 | } |
70 | |
71 | if let Some(chunk) = self |
72 | .core |
73 | .common_state |
74 | .sendable_tls |
75 | .pop() |
76 | { |
77 | break ( |
78 | buffer.pending_discard(), |
79 | EncodeTlsData::new(self, chunk).into(), |
80 | ); |
81 | } |
82 | |
83 | let deframer_output = |
84 | match self |
85 | .core |
86 | .deframe(None, buffer.filled_mut(), &mut buffer_progress) |
87 | { |
88 | Err(err) => { |
89 | buffer.queue_discard(buffer_progress.take_discard()); |
90 | return UnbufferedStatus { |
91 | discard: buffer.pending_discard(), |
92 | state: Err(err), |
93 | }; |
94 | } |
95 | Ok(r) => r, |
96 | }; |
97 | |
98 | if let Some(msg) = deframer_output { |
99 | let mut state = |
100 | match mem::replace(&mut self.core.state, Err(Error::HandshakeNotComplete)) { |
101 | Ok(state) => state, |
102 | Err(e) => { |
103 | buffer.queue_discard(buffer_progress.take_discard()); |
104 | self.core.state = Err(e.clone()); |
105 | return UnbufferedStatus { |
106 | discard: buffer.pending_discard(), |
107 | state: Err(e), |
108 | }; |
109 | } |
110 | }; |
111 | |
112 | match self.core.process_msg(msg, state, None) { |
113 | Ok(new) => state = new, |
114 | |
115 | Err(e) => { |
116 | buffer.queue_discard(buffer_progress.take_discard()); |
117 | self.core.state = Err(e.clone()); |
118 | return UnbufferedStatus { |
119 | discard: buffer.pending_discard(), |
120 | state: Err(e), |
121 | }; |
122 | } |
123 | } |
124 | |
125 | buffer.queue_discard(buffer_progress.take_discard()); |
126 | |
127 | self.core.state = Ok(state); |
128 | } else if self.wants_write { |
129 | break ( |
130 | buffer.pending_discard(), |
131 | TransmitTlsData { conn: self }.into(), |
132 | ); |
133 | } else if self |
134 | .core |
135 | .common_state |
136 | .has_received_close_notify |
137 | && !self.emitted_peer_closed_state |
138 | { |
139 | self.emitted_peer_closed_state = true; |
140 | break (buffer.pending_discard(), ConnectionState::PeerClosed); |
141 | } else if self |
142 | .core |
143 | .common_state |
144 | .has_received_close_notify |
145 | && self |
146 | .core |
147 | .common_state |
148 | .has_sent_close_notify |
149 | { |
150 | break (buffer.pending_discard(), ConnectionState::Closed); |
151 | } else if self |
152 | .core |
153 | .common_state |
154 | .may_send_application_data |
155 | { |
156 | break ( |
157 | buffer.pending_discard(), |
158 | ConnectionState::WriteTraffic(WriteTraffic { conn: self }), |
159 | ); |
160 | } else { |
161 | break (buffer.pending_discard(), ConnectionState::BlockedHandshake); |
162 | } |
163 | }; |
164 | |
165 | UnbufferedStatus { |
166 | discard, |
167 | state: Ok(state), |
168 | } |
169 | } |
170 | } |
171 | |
172 | /// The current status of the `UnbufferedConnection*` |
173 | #[must_use ] |
174 | #[derive (Debug)] |
175 | pub struct UnbufferedStatus<'c, 'i, Data> { |
176 | /// Number of bytes to discard |
177 | /// |
178 | /// After the `state` field of this object has been handled, `discard` bytes must be |
179 | /// removed from the *front* of the `incoming_tls` buffer that was passed to |
180 | /// the [`UnbufferedConnectionCommon::process_tls_records`] call that returned this object. |
181 | /// |
182 | /// This discard operation MUST happen *before* |
183 | /// [`UnbufferedConnectionCommon::process_tls_records`] is called again. |
184 | pub discard: usize, |
185 | |
186 | /// The current state of the handshake process |
187 | /// |
188 | /// This value MUST be handled prior to calling |
189 | /// [`UnbufferedConnectionCommon::process_tls_records`] again. See the documentation on the |
190 | /// variants of [`ConnectionState`] for more details. |
191 | pub state: Result<ConnectionState<'c, 'i, Data>, Error>, |
192 | } |
193 | |
194 | /// The state of the [`UnbufferedConnectionCommon`] object |
195 | #[non_exhaustive ] // for forwards compatibility; to support caller-side certificate verification |
196 | pub enum ConnectionState<'c, 'i, Data> { |
197 | /// One, or more, application data records are available |
198 | /// |
199 | /// See [`ReadTraffic`] for more details on how to use the enclosed object to access |
200 | /// the received data. |
201 | ReadTraffic(ReadTraffic<'c, 'i, Data>), |
202 | |
203 | /// Connection has been cleanly closed by the peer. |
204 | /// |
205 | /// This state is encountered at most once by each connection -- it is |
206 | /// "edge" triggered, rather than "level" triggered. |
207 | /// |
208 | /// It delimits the data received from the peer, meaning you can be sure you |
209 | /// have received all the data the peer sent. |
210 | /// |
211 | /// No further application data will be received from the peer, so no further |
212 | /// `ReadTraffic` states will be produced. |
213 | /// |
214 | /// However, it is possible to _send_ further application data via `WriteTraffic` |
215 | /// states, or close the connection cleanly by calling |
216 | /// [`WriteTraffic::queue_close_notify()`]. |
217 | PeerClosed, |
218 | |
219 | /// Connection has been cleanly closed by both us and the peer. |
220 | /// |
221 | /// This is a terminal state. No other states will be produced for this |
222 | /// connection. |
223 | Closed, |
224 | |
225 | /// One, or more, early (RTT-0) data records are available |
226 | ReadEarlyData(ReadEarlyData<'c, 'i, Data>), |
227 | |
228 | /// A Handshake record is ready for encoding |
229 | /// |
230 | /// Call [`EncodeTlsData::encode`] on the enclosed object, providing an `outgoing_tls` |
231 | /// buffer to store the encoding |
232 | EncodeTlsData(EncodeTlsData<'c, Data>), |
233 | |
234 | /// Previously encoded handshake records need to be transmitted |
235 | /// |
236 | /// Transmit the contents of the `outgoing_tls` buffer that was passed to previous |
237 | /// [`EncodeTlsData::encode`] calls to the peer. |
238 | /// |
239 | /// After transmitting the contents, call [`TransmitTlsData::done`] on the enclosed object. |
240 | /// The transmitted contents MUST not be sent to the peer more than once so they SHOULD be |
241 | /// discarded at this point. |
242 | /// |
243 | /// At some stages of the handshake process, it's possible to send application-data alongside |
244 | /// handshake records. Call [`TransmitTlsData::may_encrypt_app_data`] on the enclosed |
245 | /// object to probe if that's allowed. |
246 | TransmitTlsData(TransmitTlsData<'c, Data>), |
247 | |
248 | /// More TLS data is needed to continue with the handshake |
249 | /// |
250 | /// Request more data from the peer and append the contents to the `incoming_tls` buffer that |
251 | /// was passed to [`UnbufferedConnectionCommon::process_tls_records`]. |
252 | BlockedHandshake, |
253 | |
254 | /// The handshake process has been completed. |
255 | /// |
256 | /// [`WriteTraffic::encrypt`] can be called on the enclosed object to encrypt application |
257 | /// data into an `outgoing_tls` buffer. Similarly, [`WriteTraffic::queue_close_notify`] can |
258 | /// be used to encrypt a close_notify alert message into a buffer to signal the peer that the |
259 | /// connection is being closed. Data written into `outgoing_buffer` by either method MAY be |
260 | /// transmitted to the peer during this state. |
261 | /// |
262 | /// Once this state has been reached, data MAY be requested from the peer and appended to an |
263 | /// `incoming_tls` buffer that will be passed to a future |
264 | /// [`UnbufferedConnectionCommon::process_tls_records`] invocation. When enough data has been |
265 | /// appended to `incoming_tls`, [`UnbufferedConnectionCommon::process_tls_records`] will yield |
266 | /// the [`ConnectionState::ReadTraffic`] state. |
267 | WriteTraffic(WriteTraffic<'c, Data>), |
268 | } |
269 | |
270 | impl<'c, 'i, Data> From<ReadTraffic<'c, 'i, Data>> for ConnectionState<'c, 'i, Data> { |
271 | fn from(v: ReadTraffic<'c, 'i, Data>) -> Self { |
272 | Self::ReadTraffic(v) |
273 | } |
274 | } |
275 | |
276 | impl<'c, 'i, Data> From<ReadEarlyData<'c, 'i, Data>> for ConnectionState<'c, 'i, Data> { |
277 | fn from(v: ReadEarlyData<'c, 'i, Data>) -> Self { |
278 | Self::ReadEarlyData(v) |
279 | } |
280 | } |
281 | |
282 | impl<'c, Data> From<EncodeTlsData<'c, Data>> for ConnectionState<'c, '_, Data> { |
283 | fn from(v: EncodeTlsData<'c, Data>) -> Self { |
284 | Self::EncodeTlsData(v) |
285 | } |
286 | } |
287 | |
288 | impl<'c, Data> From<TransmitTlsData<'c, Data>> for ConnectionState<'c, '_, Data> { |
289 | fn from(v: TransmitTlsData<'c, Data>) -> Self { |
290 | Self::TransmitTlsData(v) |
291 | } |
292 | } |
293 | |
294 | impl<Data> fmt::Debug for ConnectionState<'_, '_, Data> { |
295 | fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result { |
296 | match self { |
297 | Self::ReadTraffic(..) => f.debug_tuple("ReadTraffic" ).finish(), |
298 | |
299 | Self::PeerClosed => write!(f, "PeerClosed" ), |
300 | |
301 | Self::Closed => write!(f, "Closed" ), |
302 | |
303 | Self::ReadEarlyData(..) => f.debug_tuple("ReadEarlyData" ).finish(), |
304 | |
305 | Self::EncodeTlsData(..) => f.debug_tuple("EncodeTlsData" ).finish(), |
306 | |
307 | Self::TransmitTlsData(..) => f |
308 | .debug_tuple("TransmitTlsData" ) |
309 | .finish(), |
310 | |
311 | Self::BlockedHandshake => f |
312 | .debug_tuple("BlockedHandshake" ) |
313 | .finish(), |
314 | |
315 | Self::WriteTraffic(..) => f.debug_tuple("WriteTraffic" ).finish(), |
316 | } |
317 | } |
318 | } |
319 | |
320 | /// Application data is available |
321 | pub struct ReadTraffic<'c, 'i, Data> { |
322 | conn: &'c mut UnbufferedConnectionCommon<Data>, |
323 | // for forwards compatibility; to support in-place decryption in the future |
324 | _incoming_tls: &'i mut [u8], |
325 | |
326 | // owner of the latest chunk obtained in `next_record`, as borrowed by |
327 | // `AppDataRecord` |
328 | chunk: Option<Vec<u8>>, |
329 | } |
330 | |
331 | impl<'c, 'i, Data> ReadTraffic<'c, 'i, Data> { |
332 | fn new(conn: &'c mut UnbufferedConnectionCommon<Data>, _incoming_tls: &'i mut [u8]) -> Self { |
333 | Self { |
334 | conn, |
335 | _incoming_tls, |
336 | chunk: None, |
337 | } |
338 | } |
339 | |
340 | /// Decrypts and returns the next available app-data record |
341 | // TODO deprecate in favor of `Iterator` implementation, which requires in-place decryption |
342 | pub fn next_record(&mut self) -> Option<Result<AppDataRecord<'_>, Error>> { |
343 | self.chunk = self |
344 | .conn |
345 | .core |
346 | .common_state |
347 | .received_plaintext |
348 | .pop(); |
349 | self.chunk.as_ref().map(|chunk| { |
350 | Ok(AppDataRecord { |
351 | discard: 0, |
352 | payload: chunk, |
353 | }) |
354 | }) |
355 | } |
356 | |
357 | /// Returns the payload size of the next app-data record *without* decrypting it |
358 | /// |
359 | /// Returns `None` if there are no more app-data records |
360 | pub fn peek_len(&self) -> Option<NonZeroUsize> { |
361 | self.conn |
362 | .core |
363 | .common_state |
364 | .received_plaintext |
365 | .peek() |
366 | .and_then(|ch| NonZeroUsize::new(ch.len())) |
367 | } |
368 | } |
369 | |
370 | /// Early application-data is available. |
371 | pub struct ReadEarlyData<'c, 'i, Data> { |
372 | conn: &'c mut UnbufferedConnectionCommon<Data>, |
373 | |
374 | // for forwards compatibility; to support in-place decryption in the future |
375 | _incoming_tls: &'i mut [u8], |
376 | |
377 | // owner of the latest chunk obtained in `next_record`, as borrowed by |
378 | // `AppDataRecord` |
379 | chunk: Option<Vec<u8>>, |
380 | } |
381 | |
382 | impl<'c, 'i> ReadEarlyData<'c, 'i, ServerConnectionData> { |
383 | fn new( |
384 | conn: &'c mut UnbufferedConnectionCommon<ServerConnectionData>, |
385 | _incoming_tls: &'i mut [u8], |
386 | ) -> Self { |
387 | Self { |
388 | conn, |
389 | _incoming_tls, |
390 | chunk: None, |
391 | } |
392 | } |
393 | |
394 | /// decrypts and returns the next available app-data record |
395 | // TODO deprecate in favor of `Iterator` implementation, which requires in-place decryption |
396 | pub fn next_record(&mut self) -> Option<Result<AppDataRecord<'_>, Error>> { |
397 | self.chunk = self.conn.pop_early_data(); |
398 | self.chunk.as_ref().map(|chunk| { |
399 | Ok(AppDataRecord { |
400 | discard: 0, |
401 | payload: chunk, |
402 | }) |
403 | }) |
404 | } |
405 | |
406 | /// returns the payload size of the next app-data record *without* decrypting it |
407 | /// |
408 | /// returns `None` if there are no more app-data records |
409 | pub fn peek_len(&self) -> Option<NonZeroUsize> { |
410 | self.conn |
411 | .peek_early_data() |
412 | .and_then(|ch| NonZeroUsize::new(ch.len())) |
413 | } |
414 | } |
415 | |
416 | /// A decrypted application-data record |
417 | pub struct AppDataRecord<'i> { |
418 | /// Number of additional bytes to discard |
419 | /// |
420 | /// This number MUST be added to the value of [`UnbufferedStatus.discard`] *prior* to the |
421 | /// discard operation. See [`UnbufferedStatus.discard`] for more details |
422 | pub discard: usize, |
423 | |
424 | /// The payload of the app-data record |
425 | pub payload: &'i [u8], |
426 | } |
427 | |
428 | /// Allows encrypting app-data |
429 | pub struct WriteTraffic<'c, Data> { |
430 | conn: &'c mut UnbufferedConnectionCommon<Data>, |
431 | } |
432 | |
433 | impl<Data> WriteTraffic<'_, Data> { |
434 | /// Encrypts `application_data` into the `outgoing_tls` buffer |
435 | /// |
436 | /// Returns the number of bytes that were written into `outgoing_tls`, or an error if |
437 | /// the provided buffer is too small. In the error case, `outgoing_tls` is not modified |
438 | pub fn encrypt( |
439 | &mut self, |
440 | application_data: &[u8], |
441 | outgoing_tls: &mut [u8], |
442 | ) -> Result<usize, EncryptError> { |
443 | self.conn |
444 | .core |
445 | .maybe_refresh_traffic_keys(); |
446 | self.conn |
447 | .core |
448 | .common_state |
449 | .write_plaintext(application_data.into(), outgoing_tls) |
450 | } |
451 | |
452 | /// Encrypts a close_notify warning alert in `outgoing_tls` |
453 | /// |
454 | /// Returns the number of bytes that were written into `outgoing_tls`, or an error if |
455 | /// the provided buffer is too small. In the error case, `outgoing_tls` is not modified |
456 | pub fn queue_close_notify(&mut self, outgoing_tls: &mut [u8]) -> Result<usize, EncryptError> { |
457 | self.conn |
458 | .core |
459 | .common_state |
460 | .eager_send_close_notify(outgoing_tls) |
461 | } |
462 | |
463 | /// Arranges for a TLS1.3 `key_update` to be sent. |
464 | /// |
465 | /// This consumes the `WriteTraffic` state: to actually send the message, |
466 | /// call [`UnbufferedConnectionCommon::process_tls_records`] again which will |
467 | /// return a `ConnectionState::EncodeTlsData` that emits the `key_update` |
468 | /// message. |
469 | /// |
470 | /// See [`ConnectionCommon::refresh_traffic_keys()`] for full documentation, |
471 | /// including why you might call this and in what circumstances it will fail. |
472 | /// |
473 | /// [`ConnectionCommon::refresh_traffic_keys()`]: crate::ConnectionCommon::refresh_traffic_keys |
474 | pub fn refresh_traffic_keys(self) -> Result<(), Error> { |
475 | self.conn.core.refresh_traffic_keys() |
476 | } |
477 | } |
478 | |
479 | /// A handshake record must be encoded |
480 | pub struct EncodeTlsData<'c, Data> { |
481 | conn: &'c mut UnbufferedConnectionCommon<Data>, |
482 | chunk: Option<Vec<u8>>, |
483 | } |
484 | |
485 | impl<'c, Data> EncodeTlsData<'c, Data> { |
486 | fn new(conn: &'c mut UnbufferedConnectionCommon<Data>, chunk: Vec<u8>) -> Self { |
487 | Self { |
488 | conn, |
489 | chunk: Some(chunk), |
490 | } |
491 | } |
492 | |
493 | /// Encodes a handshake record into the `outgoing_tls` buffer |
494 | /// |
495 | /// Returns the number of bytes that were written into `outgoing_tls`, or an error if |
496 | /// the provided buffer is too small. In the error case, `outgoing_tls` is not modified |
497 | pub fn encode(&mut self, outgoing_tls: &mut [u8]) -> Result<usize, EncodeError> { |
498 | let Some(chunk) = self.chunk.take() else { |
499 | return Err(EncodeError::AlreadyEncoded); |
500 | }; |
501 | |
502 | let required_size = chunk.len(); |
503 | |
504 | if required_size > outgoing_tls.len() { |
505 | self.chunk = Some(chunk); |
506 | Err(InsufficientSizeError { required_size }.into()) |
507 | } else { |
508 | let written = chunk.len(); |
509 | outgoing_tls[..written].copy_from_slice(&chunk); |
510 | |
511 | self.conn.wants_write = true; |
512 | |
513 | Ok(written) |
514 | } |
515 | } |
516 | } |
517 | |
518 | /// Previously encoded TLS data must be transmitted |
519 | pub struct TransmitTlsData<'c, Data> { |
520 | pub(crate) conn: &'c mut UnbufferedConnectionCommon<Data>, |
521 | } |
522 | |
523 | impl<Data> TransmitTlsData<'_, Data> { |
524 | /// Signals that the previously encoded TLS data has been transmitted |
525 | pub fn done(self) { |
526 | self.conn.wants_write = false; |
527 | } |
528 | |
529 | /// Returns an adapter that allows encrypting application data |
530 | /// |
531 | /// If allowed at this stage of the handshake process |
532 | pub fn may_encrypt_app_data(&mut self) -> Option<WriteTraffic<'_, Data>> { |
533 | if self |
534 | .conn |
535 | .core |
536 | .common_state |
537 | .may_send_application_data |
538 | { |
539 | Some(WriteTraffic { conn: self.conn }) |
540 | } else { |
541 | None |
542 | } |
543 | } |
544 | } |
545 | |
546 | /// Errors that may arise when encoding a handshake record |
547 | #[derive (Debug)] |
548 | pub enum EncodeError { |
549 | /// Provided buffer was too small |
550 | InsufficientSize(InsufficientSizeError), |
551 | |
552 | /// The handshake record has already been encoded; do not call `encode` again |
553 | AlreadyEncoded, |
554 | } |
555 | |
556 | impl From<InsufficientSizeError> for EncodeError { |
557 | fn from(v: InsufficientSizeError) -> Self { |
558 | Self::InsufficientSize(v) |
559 | } |
560 | } |
561 | |
562 | impl fmt::Display for EncodeError { |
563 | fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result { |
564 | match self { |
565 | Self::InsufficientSize(InsufficientSizeError { required_size: &usize }) => write!( |
566 | f, |
567 | "cannot encode due to insufficient size, {} bytes are required" , |
568 | required_size |
569 | ), |
570 | Self::AlreadyEncoded => "cannot encode, data has already been encoded" .fmt(f), |
571 | } |
572 | } |
573 | } |
574 | |
575 | #[cfg (feature = "std" )] |
576 | impl StdError for EncodeError {} |
577 | |
578 | /// Errors that may arise when encrypting application data |
579 | #[derive (Debug)] |
580 | pub enum EncryptError { |
581 | /// Provided buffer was too small |
582 | InsufficientSize(InsufficientSizeError), |
583 | |
584 | /// Encrypter has been exhausted |
585 | EncryptExhausted, |
586 | } |
587 | |
588 | impl From<InsufficientSizeError> for EncryptError { |
589 | fn from(v: InsufficientSizeError) -> Self { |
590 | Self::InsufficientSize(v) |
591 | } |
592 | } |
593 | |
594 | impl fmt::Display for EncryptError { |
595 | fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result { |
596 | match self { |
597 | Self::InsufficientSize(InsufficientSizeError { required_size: &usize }) => write!( |
598 | f, |
599 | "cannot encrypt due to insufficient size, {required_size} bytes are required" |
600 | ), |
601 | Self::EncryptExhausted => f.write_str(data:"encrypter has been exhausted" ), |
602 | } |
603 | } |
604 | } |
605 | |
606 | #[cfg (feature = "std" )] |
607 | impl StdError for EncryptError {} |
608 | |
609 | /// Provided buffer was too small |
610 | #[derive (Clone, Copy, Debug)] |
611 | pub struct InsufficientSizeError { |
612 | /// buffer must be at least this size |
613 | pub required_size: usize, |
614 | } |
615 | |