use alloc::vec::Vec;
use core::convert::TryInto;
use core::fmt;
use core::ops::Deref;
use nom::branch::alt;
use nom::bytes::streaming::take;
use nom::combinator::{complete, cond, map, map_parser, opt, verify};
use nom::error::{make_error, ErrorKind};
use nom::multi::{length_count, length_data, many0};
use nom::number::streaming::{be_u16, be_u24, be_u32, be_u8};
use nom::{Err, IResult};
use nom_derive::{NomBE, Parse};
use rusticata_macros::newtype_enum;
use crate::tls_ciphers::*;
use crate::tls_ec::*;
use crate::tls_message::TlsMessage;
#[derive(Clone, Copy, PartialEq, Eq, NomBE)]
pub struct TlsHandshakeType(pub u8);
newtype_enum! {
impl debug TlsHandshakeType {
HelloRequest = 0x00,
ClientHello = 0x01,
ServerHello = 0x02,
HelloVerifyRequest = 0x03,
NewSessionTicket = 0x04,
EndOfEarlyData = 0x05,
HelloRetryRequest = 0x06,
EncryptedExtensions = 0x08,
Certificate = 0x0b,
ServerKeyExchange = 0x0c,
CertificateRequest = 0x0d,
ServerDone = 0x0e,
CertificateVerify = 0x0f,
ClientKeyExchange = 0x10,
Finished = 0x14,
CertificateURL = 0x15,
CertificateStatus = 0x16,
KeyUpdate = 0x18,
NextProtocol = 0x43,
}
}
impl From<TlsHandshakeType> for u8 {
fn from(v: TlsHandshakeType) -> u8 {
v.0
}
}
#[derive(Clone, Copy, Default, PartialEq, Eq, NomBE)]
pub struct TlsVersion(pub u16);
impl TlsVersion {
pub const fn to_be_bytes(&self) -> [u8; 2] {
self.0.to_be_bytes()
}
}
newtype_enum! {
impl debug TlsVersion {
Ssl30 = 0x0300,
Tls10 = 0x0301,
Tls11 = 0x0302,
Tls12 = 0x0303,
Tls13 = 0x0304,
Tls13Draft18 = 0x7f12,
Tls13Draft19 = 0x7f13,
Tls13Draft20 = 0x7f14,
Tls13Draft21 = 0x7f15,
Tls13Draft22 = 0x7f16,
Tls13Draft23 = 0x7f17,
DTls10 = 0xfeff,
DTls11 = 0xfefe,
DTls12 = 0xfefd,
}
}
impl From<TlsVersion> for u16 {
fn from(v: TlsVersion) -> u16 {
v.0
}
}
impl fmt::LowerHex for TlsVersion {
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
write!(f, "{:x}", self.0)
}
}
#[derive(Clone, Copy, PartialEq, Eq, NomBE)]
pub struct TlsHeartbeatMessageType(pub u8);
newtype_enum! {
impl debug TlsHeartbeatMessageType {
HeartBeatRequest = 0x1,
HeartBeatResponse = 0x2,
}
}
impl From<TlsHeartbeatMessageType> for u8 {
fn from(v: TlsHeartbeatMessageType) -> u8 {
v.0
}
}
#[derive(Clone, Copy, Default, PartialEq, Eq, NomBE)]
pub struct TlsCompressionID(pub u8);
newtype_enum! {
impl debug TlsCompressionID {
Null = 0x00,
Deflate = 0x01,
}
}
impl From<TlsCompressionID> for u8 {
fn from(c: TlsCompressionID) -> u8 {
c.0
}
}
impl Deref for TlsCompressionID {
type Target = u8;
fn deref(&self) -> &Self::Target {
&self.0
}
}
impl AsRef<u8> for TlsCompressionID {
fn as_ref(&self) -> &u8 {
&self.0
}
}
#[derive(Clone, Copy, Default, PartialEq, Eq, NomBE)]
pub struct TlsCipherSuiteID(pub u16);
impl TlsCipherSuiteID {
pub fn get_ciphersuite(self) -> Option<&'static TlsCipherSuite> {
TlsCipherSuite::from_id(self.0)
}
}
impl From<TlsCipherSuiteID> for u16 {
fn from(c: TlsCipherSuiteID) -> u16 {
c.0
}
}
impl Deref for TlsCipherSuiteID {
type Target = u16;
fn deref(&self) -> &Self::Target {
&self.0
}
}
impl AsRef<u16> for TlsCipherSuiteID {
fn as_ref(&self) -> &u16 {
&self.0
}
}
impl fmt::Display for TlsCipherSuiteID {
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
write!(f, "{}", self.0)
}
}
impl fmt::Debug for TlsCipherSuiteID {
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
match TlsCipherSuite::from_id(self.0) {
Some(c) => write!(f, "0x{:04x}({})", self.0, c.name),
None => write!(f, "0x{:04x}(Unknown cipher)", self.0),
}
}
}
impl fmt::LowerHex for TlsCipherSuiteID {
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
write!(f, "{:x}", self.0)
}
}
pub trait ClientHello<'a> {
fn version(&self) -> TlsVersion;
fn random(&self) -> &'a [u8];
fn rand_time(&self) -> u32 {
self.random()
.try_into()
.map(u32::from_be_bytes)
.unwrap_or(0)
}
fn rand_bytes(&self) -> &'a [u8] {
self.random().get(4..).unwrap_or(&[])
}
fn session_id(&self) -> Option<&'a [u8]>;
fn ciphers(&self) -> &Vec<TlsCipherSuiteID>;
fn cipher_suites(&self) -> Vec<Option<&'static TlsCipherSuite>> {
self.ciphers()
.iter()
.map(|&x| x.get_ciphersuite())
.collect()
}
fn comp(&self) -> &Vec<TlsCompressionID>;
fn ext(&self) -> Option<&'a [u8]>;
}
#[derive(Clone, PartialEq)]
pub struct TlsClientHelloContents<'a> {
pub version: TlsVersion,
pub random: &'a [u8],
pub session_id: Option<&'a [u8]>,
pub ciphers: Vec<TlsCipherSuiteID>,
pub comp: Vec<TlsCompressionID>,
pub ext: Option<&'a [u8]>,
}
impl<'a> TlsClientHelloContents<'a> {
pub fn new(
v: u16,
random: &'a [u8],
sid: Option<&'a [u8]>,
c: Vec<TlsCipherSuiteID>,
co: Vec<TlsCompressionID>,
e: Option<&'a [u8]>,
) -> Self {
TlsClientHelloContents {
version: TlsVersion(v),
random,
session_id: sid,
ciphers: c,
comp: co,
ext: e,
}
}
pub fn get_version(&self) -> TlsVersion {
self.version
}
pub fn get_ciphers(&self) -> Vec<Option<&'static TlsCipherSuite>> {
self.ciphers.iter().map(|&x| x.get_ciphersuite()).collect()
}
}
impl<'a> ClientHello<'a> for TlsClientHelloContents<'a> {
fn version(&self) -> TlsVersion {
self.version
}
fn random(&self) -> &'a [u8] {
self.random
}
fn session_id(&self) -> Option<&'a [u8]> {
self.session_id
}
fn ciphers(&self) -> &Vec<TlsCipherSuiteID> {
&self.ciphers
}
fn comp(&self) -> &Vec<TlsCompressionID> {
&self.comp
}
fn ext(&self) -> Option<&'a [u8]> {
self.ext
}
}
#[derive(Clone, PartialEq)]
pub struct TlsServerHelloContents<'a> {
pub version: TlsVersion,
pub random: &'a [u8],
pub session_id: Option<&'a [u8]>,
pub cipher: TlsCipherSuiteID,
pub compression: TlsCompressionID,
pub ext: Option<&'a [u8]>,
}
#[derive(Clone, PartialEq)]
pub struct TlsServerHelloV13Draft18Contents<'a> {
pub version: TlsVersion,
pub random: &'a [u8],
pub cipher: TlsCipherSuiteID,
pub ext: Option<&'a [u8]>,
}
#[derive(Clone, PartialEq)]
pub struct TlsHelloRetryRequestContents<'a> {
pub version: TlsVersion,
pub cipher: TlsCipherSuiteID,
pub ext: Option<&'a [u8]>,
}
impl<'a> TlsServerHelloContents<'a> {
pub fn new(
v: u16,
random: &'a [u8],
sid: Option<&'a [u8]>,
c: u16,
co: u8,
e: Option<&'a [u8]>,
) -> Self {
TlsServerHelloContents {
version: TlsVersion(v),
random,
session_id: sid,
cipher: TlsCipherSuiteID(c),
compression: TlsCompressionID(co),
ext: e,
}
}
pub fn get_version(&self) -> TlsVersion {
self.version
}
pub fn get_cipher(&self) -> Option<&'static TlsCipherSuite> {
self.cipher.get_ciphersuite()
}
}
#[derive(Clone, Debug, PartialEq)]
pub struct TlsNewSessionTicketContent<'a> {
pub ticket_lifetime_hint: u32,
pub ticket: &'a [u8],
}
#[derive(Clone, PartialEq)]
pub struct RawCertificate<'a> {
pub data: &'a [u8],
}
#[derive(Clone, Debug, PartialEq)]
pub struct TlsCertificateContents<'a> {
pub cert_chain: Vec<RawCertificate<'a>>,
}
#[derive(Clone, Debug, PartialEq)]
pub struct TlsCertificateRequestContents<'a> {
pub cert_types: Vec<u8>,
pub sig_hash_algs: Option<Vec<u16>>,
pub unparsed_ca: Vec<&'a [u8]>,
}
#[derive(Clone, PartialEq)]
pub struct TlsServerKeyExchangeContents<'a> {
pub parameters: &'a [u8],
}
#[derive(Clone, PartialEq)]
pub enum TlsClientKeyExchangeContents<'a> {
Dh(&'a [u8]),
Ecdh(ECPoint<'a>),
Unknown(&'a [u8]),
}
#[derive(Clone, Debug, PartialEq)]
pub struct TlsCertificateStatusContents<'a> {
pub status_type: u8,
pub blob: &'a [u8],
}
#[derive(Clone, Debug, PartialEq)]
pub struct TlsNextProtocolContent<'a> {
pub selected_protocol: &'a [u8],
pub padding: &'a [u8],
}
#[derive(Copy, Clone, PartialEq, Eq)]
pub struct KeyUpdateRequest(pub u8);
newtype_enum! {
impl KeyUpdateRequest {
NotRequested = 0x0,
Requested = 0x1,
}
}
#[derive(Clone, Debug, PartialEq)]
pub enum TlsMessageHandshake<'a> {
HelloRequest,
ClientHello(TlsClientHelloContents<'a>),
ServerHello(TlsServerHelloContents<'a>),
ServerHelloV13Draft18(TlsServerHelloV13Draft18Contents<'a>),
NewSessionTicket(TlsNewSessionTicketContent<'a>),
EndOfEarlyData,
HelloRetryRequest(TlsHelloRetryRequestContents<'a>),
Certificate(TlsCertificateContents<'a>),
ServerKeyExchange(TlsServerKeyExchangeContents<'a>),
CertificateRequest(TlsCertificateRequestContents<'a>),
ServerDone(&'a [u8]),
CertificateVerify(&'a [u8]),
ClientKeyExchange(TlsClientKeyExchangeContents<'a>),
Finished(&'a [u8]),
CertificateStatus(TlsCertificateStatusContents<'a>),
NextProtocol(TlsNextProtocolContent<'a>),
KeyUpdate(u8),
}
pub fn parse_tls_handshake_msg_hello_request(i: &[u8]) -> IResult<&[u8], TlsMessageHandshake> {
Ok((i, TlsMessageHandshake::HelloRequest))
}
pub fn parse_tls_handshake_client_hello(i: &[u8]) -> IResult<&[u8], TlsClientHelloContents> {
let (i, version) = be_u16(i)?;
let (i, random) = take(32usize)(i)?;
let (i, sidlen) = verify(be_u8, |&n| n <= 32)(i)?;
let (i, sid) = cond(sidlen > 0, take(sidlen as usize))(i)?;
let (i, ciphers_len) = be_u16(i)?;
let (i, ciphers) = parse_cipher_suites(i, ciphers_len as usize)?;
let (i, comp_len) = be_u8(i)?;
let (i, comp) = parse_compressions_algs(i, comp_len as usize)?;
let (i, ext) = opt(complete(length_data(be_u16)))(i)?;
let content = TlsClientHelloContents::new(version, random, sid, ciphers, comp, ext);
Ok((i, content))
}
pub fn parse_tls_handshake_msg_client_hello(i: &[u8]) -> IResult<&[u8], TlsMessageHandshake> {
map(
parse_tls_handshake_client_hello,
TlsMessageHandshake::ClientHello,
)(i)
}
pub(crate) fn parse_cipher_suites(i: &[u8], len: usize) -> IResult<&[u8], Vec<TlsCipherSuiteID>> {
if len == 0 {
return Ok((i, Vec::new()));
}
if len % 2 == 1 || len > i.len() {
return Err(Err::Error(make_error(i, ErrorKind::LengthValue)));
}
let v = (i[..len])
.chunks(2)
.map(|chunk| TlsCipherSuiteID((chunk[0] as u16) << 8 | chunk[1] as u16))
.collect();
Ok((&i[len..], v))
}
pub(crate) fn parse_compressions_algs(
i: &[u8],
len: usize,
) -> IResult<&[u8], Vec<TlsCompressionID>> {
if len == 0 {
return Ok((i, Vec::new()));
}
if len > i.len() {
return Err(Err::Error(make_error(i, ErrorKind::LengthValue)));
}
let v = (i[..len]).iter().map(|&it| TlsCompressionID(it)).collect();
Ok((&i[len..], v))
}
pub(crate) fn parse_tls_versions(i: &[u8]) -> IResult<&[u8], Vec<TlsVersion>> {
let len = i.len();
if len == 0 {
return Ok((i, Vec::new()));
}
if len % 2 == 1 || len > i.len() {
return Err(Err::Error(make_error(i, ErrorKind::LengthValue)));
}
let v = (i[..len])
.chunks(2)
.map(|chunk| TlsVersion((chunk[0] as u16) << 8 | chunk[1] as u16))
.collect();
Ok((&i[len..], v))
}
fn parse_certs(i: &[u8]) -> IResult<&[u8], Vec<RawCertificate>> {
many0(complete(map(length_data(be_u24), |data| RawCertificate {
data,
})))(i)
}
fn parse_tls_handshake_msg_server_hello_tlsv12<const HAS_EXT: bool>(
i: &[u8],
) -> IResult<&[u8], TlsMessageHandshake> {
map(
parse_tls_server_hello_tlsv12::<HAS_EXT>,
TlsMessageHandshake::ServerHello,
)(i)
}
pub(crate) fn parse_tls_server_hello_tlsv12<const HAS_EXT: bool>(
i: &[u8],
) -> IResult<&[u8], TlsServerHelloContents> {
let (i, version) = be_u16(i)?;
let (i, random) = take(32usize)(i)?;
let (i, sidlen) = verify(be_u8, |&n| n <= 32)(i)?;
let (i, sid) = cond(sidlen > 0, take(sidlen as usize))(i)?;
let (i, cipher) = be_u16(i)?;
let (i, comp) = be_u8(i)?;
let (i, ext) = if HAS_EXT {
opt(complete(length_data(be_u16)))(i)?
} else {
(i, None)
};
let content = TlsServerHelloContents::new(version, random, sid, cipher, comp, ext);
Ok((i, content))
}
fn parse_tls_handshake_msg_server_hello_tlsv13draft18(
i: &[u8],
) -> IResult<&[u8], TlsMessageHandshake> {
let (i, version) = TlsVersion::parse(i)?;
let (i, random) = take(32usize)(i)?;
let (i, cipher) = map(be_u16, TlsCipherSuiteID)(i)?;
let (i, ext) = opt(complete(length_data(be_u16)))(i)?;
let content = TlsServerHelloV13Draft18Contents {
version,
random,
cipher,
ext,
};
Ok((i, TlsMessageHandshake::ServerHelloV13Draft18(content)))
}
pub fn parse_tls_handshake_server_hello(i: &[u8]) -> IResult<&[u8], TlsServerHelloContents> {
let (_, version) = be_u16(i)?;
match version {
0x0303 => parse_tls_server_hello_tlsv12::<true>(i),
0x0302 => parse_tls_server_hello_tlsv12::<true>(i),
0x0301 => parse_tls_server_hello_tlsv12::<true>(i),
0x0300 => parse_tls_server_hello_tlsv12::<false>(i),
_ => Err(Err::Error(make_error(i, ErrorKind::Tag))),
}
}
pub fn parse_tls_handshake_msg_server_hello(i: &[u8]) -> IResult<&[u8], TlsMessageHandshake> {
let (_, version) = be_u16(i)?;
match version {
0x7f12 => parse_tls_handshake_msg_server_hello_tlsv13draft18(i),
0x0303 => parse_tls_handshake_msg_server_hello_tlsv12::<true>(i),
0x0302 => parse_tls_handshake_msg_server_hello_tlsv12::<true>(i),
0x0301 => parse_tls_handshake_msg_server_hello_tlsv12::<true>(i),
0x0300 => parse_tls_handshake_msg_server_hello_tlsv12::<false>(i),
_ => Err(Err::Error(make_error(i, ErrorKind::Tag))),
}
}
pub fn parse_tls_handshake_msg_newsessionticket(
i: &[u8],
len: usize,
) -> IResult<&[u8], TlsMessageHandshake> {
if len < 4 {
return Err(Err::Error(make_error(i, ErrorKind::Verify)));
}
let (i, ticket_lifetime_hint) = be_u32(i)?;
let (i, ticket) = take(len - 4)(i)?;
let content = TlsNewSessionTicketContent {
ticket_lifetime_hint,
ticket,
};
Ok((i, TlsMessageHandshake::NewSessionTicket(content)))
}
pub fn parse_tls_handshake_msg_hello_retry_request(
i: &[u8],
) -> IResult<&[u8], TlsMessageHandshake> {
let (i, version) = TlsVersion::parse(i)?;
let (i, cipher) = map(be_u16, TlsCipherSuiteID)(i)?;
let (i, ext) = opt(complete(length_data(be_u16)))(i)?;
let content = TlsHelloRetryRequestContents {
version,
cipher,
ext,
};
Ok((i, TlsMessageHandshake::HelloRetryRequest(content)))
}
pub(crate) fn parse_tls_certificate(i: &[u8]) -> IResult<&[u8], TlsCertificateContents> {
let (i, cert_len) = be_u24(i)?;
let (i, cert_chain) = map_parser(take(cert_len as usize), parse_certs)(i)?;
let content = TlsCertificateContents { cert_chain };
Ok((i, content))
}
pub fn parse_tls_handshake_msg_certificate(i: &[u8]) -> IResult<&[u8], TlsMessageHandshake> {
map(parse_tls_certificate, TlsMessageHandshake::Certificate)(i)
}
pub fn parse_tls_handshake_msg_serverkeyexchange(
i: &[u8],
len: usize,
) -> IResult<&[u8], TlsMessageHandshake> {
map(take(len), |ext| {
TlsMessageHandshake::ServerKeyExchange(TlsServerKeyExchangeContents { parameters: ext })
})(i)
}
pub fn parse_tls_handshake_msg_serverdone(
i: &[u8],
len: usize,
) -> IResult<&[u8], TlsMessageHandshake> {
map(take(len), TlsMessageHandshake::ServerDone)(i)
}
pub fn parse_tls_handshake_msg_certificateverify(
i: &[u8],
len: usize,
) -> IResult<&[u8], TlsMessageHandshake> {
map(take(len), TlsMessageHandshake::CertificateVerify)(i)
}
pub(crate) fn parse_tls_clientkeyexchange(
len: usize,
) -> impl FnMut(&[u8]) -> IResult<&[u8], TlsClientKeyExchangeContents> {
move |i| map(take(len), TlsClientKeyExchangeContents::Unknown)(i)
}
pub fn parse_tls_handshake_msg_clientkeyexchange(
i: &[u8],
len: usize,
) -> IResult<&[u8], TlsMessageHandshake> {
map(
parse_tls_clientkeyexchange(len),
TlsMessageHandshake::ClientKeyExchange,
)(i)
}
fn parse_certrequest_nosigalg(i: &[u8]) -> IResult<&[u8], TlsCertificateRequestContents> {
let (i, cert_types) = length_count(be_u8, be_u8)(i)?;
let (i, ca_len) = be_u16(i)?;
let (i, unparsed_ca) =
map_parser(take(ca_len as usize), many0(complete(length_data(be_u16))))(i)?;
let content = TlsCertificateRequestContents {
cert_types,
sig_hash_algs: None,
unparsed_ca,
};
Ok((i, content))
}
fn parse_certrequest_full(i: &[u8]) -> IResult<&[u8], TlsCertificateRequestContents> {
let (i, cert_types) = length_count(be_u8, be_u8)(i)?;
let (i, sig_hash_algs_len) = be_u16(i)?;
let (i, sig_hash_algs) =
map_parser(take(sig_hash_algs_len as usize), many0(complete(be_u16)))(i)?;
let (i, ca_len) = be_u16(i)?;
let (i, unparsed_ca) =
map_parser(take(ca_len as usize), many0(complete(length_data(be_u16))))(i)?;
let content = TlsCertificateRequestContents {
cert_types,
sig_hash_algs: Some(sig_hash_algs),
unparsed_ca,
};
Ok((i, content))
}
pub fn parse_tls_handshake_certificaterequest(
i: &[u8],
) -> IResult<&[u8], TlsCertificateRequestContents> {
alt((
complete(parse_certrequest_full),
complete(parse_certrequest_nosigalg),
))(i)
}
pub fn parse_tls_handshake_msg_certificaterequest(i: &[u8]) -> IResult<&[u8], TlsMessageHandshake> {
map(
parse_tls_handshake_certificaterequest,
TlsMessageHandshake::CertificateRequest,
)(i)
}
pub fn parse_tls_handshake_msg_finished(
i: &[u8],
len: usize,
) -> IResult<&[u8], TlsMessageHandshake> {
map(take(len), TlsMessageHandshake::Finished)(i)
}
pub fn parse_tls_handshake_certificatestatus(
i: &[u8],
) -> IResult<&[u8], TlsCertificateStatusContents> {
let (i, status_type) = be_u8(i)?;
let (i, blob) = length_data(be_u24)(i)?;
let content = TlsCertificateStatusContents { status_type, blob };
Ok((i, content))
}
pub fn parse_tls_handshake_msg_certificatestatus(i: &[u8]) -> IResult<&[u8], TlsMessageHandshake> {
map(
parse_tls_handshake_certificatestatus,
TlsMessageHandshake::CertificateStatus,
)(i)
}
pub fn parse_tls_handshake_next_protocol(i: &[u8]) -> IResult<&[u8], TlsNextProtocolContent> {
let (i, selected_protocol) = length_data(be_u8)(i)?;
let (i, padding) = length_data(be_u8)(i)?;
let next_proto = TlsNextProtocolContent {
selected_protocol,
padding,
};
Ok((i, next_proto))
}
pub fn parse_tls_handshake_msg_next_protocol(i: &[u8]) -> IResult<&[u8], TlsMessageHandshake> {
map(
parse_tls_handshake_next_protocol,
TlsMessageHandshake::NextProtocol,
)(i)
}
pub fn parse_tls_handshake_msg_key_update(i: &[u8]) -> IResult<&[u8], TlsMessageHandshake> {
map(be_u8, TlsMessageHandshake::KeyUpdate)(i)
}
pub fn parse_tls_message_handshake(i: &[u8]) -> IResult<&[u8], TlsMessage> {
let (i, ht) = be_u8(i)?;
let (i, hl) = be_u24(i)?;
let (i, raw_msg) = take(hl)(i)?;
let (_, msg) = match TlsHandshakeType(ht) {
TlsHandshakeType::HelloRequest => parse_tls_handshake_msg_hello_request(raw_msg),
TlsHandshakeType::ClientHello => parse_tls_handshake_msg_client_hello(raw_msg),
TlsHandshakeType::ServerHello => parse_tls_handshake_msg_server_hello(raw_msg),
TlsHandshakeType::NewSessionTicket => {
parse_tls_handshake_msg_newsessionticket(raw_msg, hl as usize)
}
TlsHandshakeType::EndOfEarlyData => Ok((raw_msg, TlsMessageHandshake::EndOfEarlyData)),
TlsHandshakeType::HelloRetryRequest => parse_tls_handshake_msg_hello_retry_request(raw_msg),
TlsHandshakeType::Certificate => parse_tls_handshake_msg_certificate(raw_msg),
TlsHandshakeType::ServerKeyExchange => {
parse_tls_handshake_msg_serverkeyexchange(raw_msg, hl as usize)
}
TlsHandshakeType::CertificateRequest => parse_tls_handshake_msg_certificaterequest(raw_msg),
TlsHandshakeType::ServerDone => parse_tls_handshake_msg_serverdone(raw_msg, hl as usize),
TlsHandshakeType::CertificateVerify => {
parse_tls_handshake_msg_certificateverify(raw_msg, hl as usize)
}
TlsHandshakeType::ClientKeyExchange => {
parse_tls_handshake_msg_clientkeyexchange(raw_msg, hl as usize)
}
TlsHandshakeType::Finished => parse_tls_handshake_msg_finished(raw_msg, hl as usize),
TlsHandshakeType::CertificateStatus => parse_tls_handshake_msg_certificatestatus(raw_msg),
TlsHandshakeType::KeyUpdate => parse_tls_handshake_msg_key_update(raw_msg),
TlsHandshakeType::NextProtocol => parse_tls_handshake_msg_next_protocol(raw_msg),
_ => Err(Err::Error(make_error(i, ErrorKind::Switch))),
}?;
Ok((i, TlsMessage::Handshake(msg)))
}