Enum rustls::Error [−][src]
pub enum Error {
Show 23 variants
InappropriateMessage {
expect_types: Vec<ContentType>,
got_type: ContentType,
},
InappropriateHandshakeMessage {
expect_types: Vec<HandshakeType>,
got_type: HandshakeType,
},
CorruptMessage,
CorruptMessagePayload(ContentType),
NoCertificatesPresented,
UnsupportedNameType,
DecryptError,
EncryptError,
PeerIncompatibleError(String),
PeerMisbehavedError(String),
AlertReceived(AlertDescription),
InvalidCertificateEncoding,
InvalidCertificateSignatureType,
InvalidCertificateSignature,
InvalidCertificateData(String),
InvalidSct(Error),
General(String),
FailedToGetCurrentTime,
FailedToGetRandomBytes,
HandshakeNotComplete,
PeerSentOversizedRecord,
NoApplicationProtocol,
BadMaxFragmentSize,
}
Expand description
rustls reports protocol errors using this type.
Variants
InappropriateMessage
Fields
expect_types: Vec<ContentType>
Which types we expected
got_type: ContentType
What type we received
We received a TLS message that isn’t valid right now.
expect_types
lists the message types we can expect right now.
got_type
is the type we found. This error is typically
caused by a buggy TLS stack (the peer or this one), a broken
network, or an attack.
InappropriateHandshakeMessage
Fields
expect_types: Vec<HandshakeType>
Which handshake type we expected
got_type: HandshakeType
What handshake type we received
We received a TLS handshake message that isn’t valid right now.
expect_types
lists the handshake message types we can expect
right now. got_type
is the type we found.
CorruptMessage
The peer sent us a syntactically incorrect TLS message.
CorruptMessagePayload(ContentType)
Tuple Fields
0: ContentType
The peer sent us a TLS message with invalid contents.
NoCertificatesPresented
The peer didn’t give us any certificates.
UnsupportedNameType
The certificate verifier doesn’t support the given type of name.
DecryptError
We couldn’t decrypt a message. This is invariably fatal.
EncryptError
We couldn’t encrypt a message because it was larger than the allowed message size. This should never happen if the application is using valid record sizes.
PeerIncompatibleError(String)
Tuple Fields
0: String
The peer doesn’t support a protocol version/feature we require. The parameter gives a hint as to what version/feature it is.
PeerMisbehavedError(String)
Tuple Fields
0: String
The peer deviated from the standard TLS protocol. The parameter gives a hint where.
AlertReceived(AlertDescription)
Tuple Fields
We received a fatal alert. This means the peer is unhappy.
InvalidCertificateEncoding
We received an invalidly encoded certificate from the peer.
InvalidCertificateSignatureType
We received a certificate with invalid signature type.
InvalidCertificateSignature
We received a certificate with invalid signature.
InvalidCertificateData(String)
Tuple Fields
0: String
We received a certificate which includes invalid data.
InvalidSct(Error)
Tuple Fields
0: Error
The presented SCT(s) were invalid.
General(String)
Tuple Fields
0: String
A catch-all error for unlikely errors.
FailedToGetCurrentTime
We failed to figure out what time it currently is.
FailedToGetRandomBytes
We failed to acquire random bytes from the system.
HandshakeNotComplete
This function doesn’t work until the TLS handshake is complete.
PeerSentOversizedRecord
The peer sent an oversized record/fragment.
NoApplicationProtocol
An incoming connection did not support any known application protocol.
BadMaxFragmentSize
The max_fragment_size
value supplied in configuration was too small,
or too large.
Trait Implementations
Performs the conversion.
Auto Trait Implementations
impl RefUnwindSafe for Error
impl UnwindSafe for Error
Blanket Implementations
Mutably borrows from an owned value. Read more