#[non_exhaustive]pub enum Error {
Show 25 variants
InappropriateMessage {
expect_types: Vec<ContentType>,
got_type: ContentType,
},
InappropriateHandshakeMessage {
expect_types: Vec<HandshakeType>,
got_type: HandshakeType,
},
InvalidEncryptedClientHello(EncryptedClientHelloError),
InvalidMessage(InvalidMessage),
UnsupportedNameType,
DecryptError,
EncryptError,
PeerIncompatible(PeerIncompatible),
PeerMisbehaved(PeerMisbehaved),
AlertReceived(AlertDescription),
InvalidCertificate(CertificateError),
InvalidCertRevocationList(CertRevocationListError),
General(String),
FailedToGetCurrentTime,
FailedToGetRandomBytes,
HandshakeNotComplete,
PeerSentOversizedRecord,
NoApplicationProtocol,
NoSuitableCertificate,
BadMaxFragmentSize,
InconsistentKeys(InconsistentKeys),
RejectedEch(RejectedEch),
Unreachable(&'static str),
ApiMisuse(ApiMisuse),
Other(OtherError),
}
Expand description
rustls reports protocol errors using this type.
Variants (Non-exhaustive)§
This enum is marked as non-exhaustive
InappropriateMessage
We received a TLS message that isn’t valid right now.
expect_types
lists the message types we can expect right now.
got_type
is the type we found. This error is typically
caused by a buggy TLS stack (the peer or this one), a broken
network, or an attack.
Fields
expect_types: Vec<ContentType>
Which types we expected
got_type: ContentType
What type we received
InappropriateHandshakeMessage
We received a TLS handshake message that isn’t valid right now.
expect_types
lists the handshake message types we can expect
right now. got_type
is the type we found.
Fields
expect_types: Vec<HandshakeType>
Which handshake type we expected
got_type: HandshakeType
What handshake type we received
InvalidEncryptedClientHello(EncryptedClientHelloError)
An error occurred while handling Encrypted Client Hello (ECH).
InvalidMessage(InvalidMessage)
The peer sent us a TLS message with invalid contents.
UnsupportedNameType
The certificate verifier doesn’t support the given type of name.
DecryptError
We couldn’t decrypt a message. This is invariably fatal.
EncryptError
We couldn’t encrypt a message because it was larger than the allowed message size. This should never happen if the application is using valid record sizes.
PeerIncompatible(PeerIncompatible)
The peer doesn’t support a protocol version/feature we require. The parameter gives a hint as to what version/feature it is.
PeerMisbehaved(PeerMisbehaved)
The peer deviated from the standard TLS protocol. The parameter gives a hint where.
AlertReceived(AlertDescription)
We received a fatal alert. This means the peer is unhappy.
InvalidCertificate(CertificateError)
We saw an invalid certificate.
The contained error is from the certificate validation trait implementation.
InvalidCertRevocationList(CertRevocationListError)
A provided certificate revocation list (CRL) was invalid.
General(String)
A catch-all error for unlikely errors.
FailedToGetCurrentTime
We failed to figure out what time it currently is.
FailedToGetRandomBytes
We failed to acquire random bytes from the system.
HandshakeNotComplete
This function doesn’t work until the TLS handshake is complete.
PeerSentOversizedRecord
The peer sent an oversized record/fragment.
NoApplicationProtocol
An incoming connection did not support any known application protocol.
NoSuitableCertificate
The server certificate resolver didn’t find an appropriate certificate.
BadMaxFragmentSize
The max_fragment_size
value supplied in configuration was too small,
or too large.
InconsistentKeys(InconsistentKeys)
Specific failure cases from Credentials::new()
or a
crate::crypto::SigningKey
that cannot produce a corresponding public key.
If encountered while building a Credentials
, consider if
Credentials::new_unchecked()
might be appropriate for your use case.
RejectedEch(RejectedEch)
The server rejected encrypted client hello (ECH) negotiation
It may have returned new ECH configurations that could be used to retry negotiation with a fresh connection.
See RejectedEch::can_retry()
and crate::client::EchConfig::for_retry()
.
Unreachable(&'static str)
Errors of this variant should never be produced by the library.
Please file a bug if you see one.
ApiMisuse(ApiMisuse)
The caller misused the API
Generally we try to make error cases like this unnecessary by embedding the constraints in the type system, so misuses simply do not compile. But, for cases where that is not possible or exceptionally costly, we return errors of this variant.
This only results from the ordering, dependencies or parameter values of calls, so (assuming parameter values are fixed) these can be determined and fixed by reading the code. They are never caused by the values of untrusted data, or other non-determinism.
Other(OtherError)
Any other error.
This variant should only be used when the error is not better described by a more specific variant. For example, if a custom crypto provider returns a provider specific error.
Enums holding this variant will never compare equal to each other.
Trait Implementations§
Source§impl Error for Error
impl Error for Error
1.30.0 · Source§fn source(&self) -> Option<&(dyn Error + 'static)>
fn source(&self) -> Option<&(dyn Error + 'static)>
1.0.0 · Source§fn description(&self) -> &str
fn description(&self) -> &str
Source§impl From<CertRevocationListError> for Error
impl From<CertRevocationListError> for Error
Source§fn from(e: CertRevocationListError) -> Self
fn from(e: CertRevocationListError) -> Self
Source§impl From<CertificateError> for Error
impl From<CertificateError> for Error
Source§fn from(e: CertificateError) -> Self
fn from(e: CertificateError) -> Self
Source§impl From<EncryptedClientHelloError> for Error
impl From<EncryptedClientHelloError> for Error
Source§fn from(e: EncryptedClientHelloError) -> Self
fn from(e: EncryptedClientHelloError) -> Self
Source§impl From<GetRandomFailed> for Error
impl From<GetRandomFailed> for Error
Source§fn from(_: GetRandomFailed) -> Self
fn from(_: GetRandomFailed) -> Self
Source§impl From<InconsistentKeys> for Error
impl From<InconsistentKeys> for Error
Source§fn from(e: InconsistentKeys) -> Self
fn from(e: InconsistentKeys) -> Self
Source§impl From<InvalidMessage> for Error
impl From<InvalidMessage> for Error
Source§fn from(e: InvalidMessage) -> Self
fn from(e: InvalidMessage) -> Self
Source§impl From<OtherError> for Error
impl From<OtherError> for Error
Source§fn from(value: OtherError) -> Self
fn from(value: OtherError) -> Self
Source§impl From<PeerIncompatible> for Error
impl From<PeerIncompatible> for Error
Source§fn from(e: PeerIncompatible) -> Self
fn from(e: PeerIncompatible) -> Self
Source§impl From<PeerMisbehaved> for Error
impl From<PeerMisbehaved> for Error
Source§fn from(e: PeerMisbehaved) -> Self
fn from(e: PeerMisbehaved) -> Self
Source§impl From<RejectedEch> for Error
impl From<RejectedEch> for Error
Source§fn from(rejected_error: RejectedEch) -> Self
fn from(rejected_error: RejectedEch) -> Self
Source§impl From<SystemTimeError> for Error
Available on crate feature std
only.
impl From<SystemTimeError> for Error
std
only.