Skip to content

Commit ed59485

Browse files
jaredwolffclaude
andcommitted
Fix CI failures: formatting, line width, feature gates, and dead code
- Run cargo fmt to fix long lines in PSK tests and other files - Shorten 114-char comment lines in validation/mod.rs to fit 110-char limit - Add #[cfg(feature = "rcgen")] to context tests using generate_self_signed_certificate - Remove duplicate DrainedOutputs/drain_outputs/deliver_packets from edge.rs (use common module) Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
1 parent 892326b commit ed59485

11 files changed

Lines changed: 78 additions & 73 deletions

File tree

src/config.rs

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,10 @@ impl fmt::Debug for Config {
5656
.field("mtu", &self.mtu)
5757
.field("max_queue_rx", &self.max_queue_rx)
5858
.field("max_queue_tx", &self.max_queue_tx)
59-
.field("require_client_certificate", &self.require_client_certificate)
59+
.field(
60+
"require_client_certificate",
61+
&self.require_client_certificate,
62+
)
6063
.field("use_server_cookie", &self.use_server_cookie)
6164
.field("flight_start_rto", &self.flight_start_rto)
6265
.field("flight_retries", &self.flight_retries)
@@ -292,7 +295,10 @@ impl fmt::Debug for ConfigBuilder {
292295
.field("mtu", &self.mtu)
293296
.field("max_queue_rx", &self.max_queue_rx)
294297
.field("max_queue_tx", &self.max_queue_tx)
295-
.field("require_client_certificate", &self.require_client_certificate)
298+
.field(
299+
"require_client_certificate",
300+
&self.require_client_certificate,
301+
)
296302
.field("use_server_cookie", &self.use_server_cookie)
297303
.field("flight_start_rto", &self.flight_start_rto)
298304
.field("flight_retries", &self.flight_retries)

src/crypto/aws_lc_rs/cipher_suite.rs

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -258,7 +258,9 @@ impl SupportedDtls12CipherSuite for PskAes128Ccm8 {
258258
}
259259

260260
fn create_cipher(&self, key: &[u8]) -> Result<Box<dyn Cipher>, String> {
261-
Ok(Box::new(crate::crypto::ccm_cipher::AesCcm8Cipher::new(key)?))
261+
Ok(Box::new(crate::crypto::ccm_cipher::AesCcm8Cipher::new(
262+
key,
263+
)?))
262264
}
263265
}
264266

src/crypto/rust_crypto/cipher_suite.rs

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -308,7 +308,9 @@ impl SupportedDtls12CipherSuite for PskAes128Ccm8 {
308308
}
309309

310310
fn create_cipher(&self, key: &[u8]) -> Result<Box<dyn Cipher>, String> {
311-
Ok(Box::new(crate::crypto::ccm_cipher::AesCcm8Cipher::new(key)?))
311+
Ok(Box::new(crate::crypto::ccm_cipher::AesCcm8Cipher::new(
312+
key,
313+
)?))
312314
}
313315
}
314316

src/crypto/validation/mod.rs

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -696,7 +696,9 @@ mod tests_aws_lc_rs {
696696
fn test_default_provider_has_cipher_suites() {
697697
let provider = aws_lc_rs::default_provider();
698698
let count = provider.supported_cipher_suites().count();
699-
assert_eq!(count, 7); // ECDHE: AES-128, AES-256, ChaCha20; PSK: CCM-8, AES-128-GCM, AES-256-GCM, ChaCha20
699+
// ECDHE: AES-128, AES-256, ChaCha20
700+
// PSK: CCM-8, AES-128-GCM, AES-256-GCM, ChaCha20
701+
assert_eq!(count, 7);
700702
}
701703

702704
#[test]
@@ -744,7 +746,9 @@ mod tests_rust_crypto {
744746
fn test_default_provider_has_cipher_suites() {
745747
let provider = rust_crypto::default_provider();
746748
let count = provider.supported_cipher_suites().count();
747-
assert_eq!(count, 7); // ECDHE: AES-128, AES-256, ChaCha20; PSK: CCM-8, AES-128-GCM, AES-256-GCM, ChaCha20
749+
// ECDHE: AES-128, AES-256, ChaCha20
750+
// PSK: CCM-8, AES-128-GCM, AES-256-GCM, ChaCha20
751+
assert_eq!(count, 7);
748752
}
749753

750754
#[test]

src/dtls12/client.rs

Lines changed: 2 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -714,9 +714,7 @@ impl State {
714714
};
715715

716716
let hint_range = match &ske.params {
717-
crate::dtls12::message::ServerKeyExchangeParams::Psk(psk) => {
718-
psk.hint_range.clone()
719-
}
717+
crate::dtls12::message::ServerKeyExchangeParams::Psk(psk) => psk.hint_range.clone(),
720718
_ => {
721719
return Err(Error::UnexpectedMessage(
722720
"ECDHE ServerKeyExchange in PSK path".to_string(),
@@ -1238,9 +1236,7 @@ fn handshake_create_client_key_exchange(body: &mut Buf, engine: &mut Engine) ->
12381236
.psk_resolver()
12391237
.ok_or_else(|| Error::SecurityError("No PSK resolver configured".to_string()))?
12401238
.resolve(&identity)
1241-
.ok_or_else(|| {
1242-
Error::SecurityError("PSK resolver returned no key".to_string())
1243-
})?;
1239+
.ok_or_else(|| Error::SecurityError("PSK resolver returned no key".to_string()))?;
12441240

12451241
// Set the PSK and compute pre-master secret
12461242
let crypto = engine.crypto_context_mut();

src/dtls12/context.rs

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -621,6 +621,7 @@ mod tests {
621621
use crate::Config;
622622

623623
#[test]
624+
#[cfg(feature = "rcgen")]
624625
fn certificate_mode_rejects_psk_suites() {
625626
let cert = crate::certificate::generate_self_signed_certificate().expect("generate cert");
626627
let config = Arc::new(Config::default());
@@ -638,6 +639,7 @@ mod tests {
638639
}
639640

640641
#[test]
642+
#[cfg(feature = "rcgen")]
641643
fn certificate_mode_accepts_ecdhe_suites() {
642644
let cert = crate::certificate::generate_self_signed_certificate().expect("generate cert");
643645
let config = Arc::new(Config::default());

src/dtls12/message/client_key_exchange.rs

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -115,12 +115,16 @@ impl ClientPskKeys {
115115
let (input, identity_len) = nom::number::complete::be_u16(input)?;
116116
let (input, identity_slice) = take(identity_len as usize)(input)?;
117117

118-
let relative_offset =
119-
identity_slice.as_ptr() as usize - original_input.as_ptr() as usize;
118+
let relative_offset = identity_slice.as_ptr() as usize - original_input.as_ptr() as usize;
120119
let start = base_offset + relative_offset;
121120
let end = start + identity_slice.len();
122121

123-
Ok((input, ClientPskKeys { identity_range: start..end }))
122+
Ok((
123+
input,
124+
ClientPskKeys {
125+
identity_range: start..end,
126+
},
127+
))
124128
}
125129

126130
pub fn serialize(&self, buf: &[u8], output: &mut Buf) {

src/dtls12/message/server_key_exchange.rs

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -43,9 +43,7 @@ impl ServerKeyExchange {
4343
ServerKeyExchangeParams::Ecdh(ecdh_params) => {
4444
ecdh_params.serialize(buf, output, with_signature)
4545
}
46-
ServerKeyExchangeParams::Psk(psk_params) => {
47-
psk_params.serialize(buf, output)
48-
}
46+
ServerKeyExchangeParams::Psk(psk_params) => psk_params.serialize(buf, output),
4947
}
5048
}
5149

@@ -140,12 +138,16 @@ impl PskParams {
140138
let (input, hint_len) = nom::number::complete::be_u16(input)?;
141139
let (input, hint_slice) = take(hint_len as usize)(input)?;
142140

143-
let relative_offset =
144-
hint_slice.as_ptr() as usize - original_input.as_ptr() as usize;
141+
let relative_offset = hint_slice.as_ptr() as usize - original_input.as_ptr() as usize;
145142
let start = base_offset + relative_offset;
146143
let end = start + hint_slice.len();
147144

148-
Ok((input, PskParams { hint_range: start..end }))
145+
Ok((
146+
input,
147+
PskParams {
148+
hint_range: start..end,
149+
},
150+
))
149151
}
150152

151153
pub fn serialize(&self, buf: &[u8], output: &mut Buf) {

src/dtls12/server.rs

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,9 @@ use crate::dtls12::client::LocalEvent;
2626
use crate::dtls12::engine::Engine;
2727
use crate::dtls12::message::{Body, CertificateRequest, CertificateTypeVec, Dtls12CipherSuite};
2828
use crate::dtls12::message::{ClientCertificateType, CompressionMethod, ContentType};
29-
use crate::dtls12::message::{Cookie, CurveType, DistinguishedName, ExchangeKeys, ExtensionType, PskParams};
29+
use crate::dtls12::message::{
30+
Cookie, CurveType, DistinguishedName, ExchangeKeys, ExtensionType, PskParams,
31+
};
3032
use crate::dtls12::message::{HashAlgorithm, HelloVerifyRequest, KeyExchangeAlgorithm};
3133
use crate::dtls12::message::{MessageType, NamedGroup, NamedGroupVec, ProtocolVersion, Random};
3234
use crate::dtls12::message::{ServerHello, SessionId, SignatureAlgorithm};
@@ -522,7 +524,11 @@ impl State {
522524
// unwrap: ServerKeyExchange signature only needed for certificate-based suites
523525
let selected_signature = select_ske_signature_algorithm(
524526
server.client_signature_algorithms.as_ref(),
525-
server.engine.crypto_context().signature_algorithm().unwrap(),
527+
server
528+
.engine
529+
.crypto_context()
530+
.signature_algorithm()
531+
.unwrap(),
526532
);
527533

528534
debug!(

tests/dtls12/edge.rs

Lines changed: 1 addition & 37 deletions
Original file line numberDiff line numberDiff line change
@@ -3,46 +3,10 @@
33
use std::sync::Arc;
44
use std::time::{Duration, Instant};
55

6-
use dimpl::{Dtls, Output};
6+
use dimpl::Dtls;
77

88
use crate::common::*;
99

10-
/// Collected outputs from polling a DTLS 1.2 endpoint to `Timeout`.
11-
#[derive(Default, Debug)]
12-
struct DrainedOutputs {
13-
packets: Vec<Vec<u8>>,
14-
connected: bool,
15-
app_data: Vec<Vec<u8>>,
16-
timeout: Option<Instant>,
17-
}
18-
19-
/// Poll until `Timeout`, collecting everything.
20-
fn drain_outputs(endpoint: &mut Dtls) -> DrainedOutputs {
21-
let mut result = DrainedOutputs::default();
22-
let mut buf = vec![0u8; 2048];
23-
loop {
24-
match endpoint.poll_output(&mut buf) {
25-
Output::Packet(p) => result.packets.push(p.to_vec()),
26-
Output::Connected => result.connected = true,
27-
Output::ApplicationData(data) => result.app_data.push(data.to_vec()),
28-
Output::Timeout(t) => {
29-
result.timeout = Some(t);
30-
break;
31-
}
32-
_ => {}
33-
}
34-
}
35-
result
36-
}
37-
38-
/// Deliver a slice of packets to a destination endpoint.
39-
fn deliver_packets(packets: &[Vec<u8>], dest: &mut Dtls) {
40-
for p in packets {
41-
// Ignore errors - they may be expected for duplicates/replays
42-
let _ = dest.handle_packet(p);
43-
}
44-
}
45-
4610
/// Complete a full DTLS 1.2 handshake between client and server.
4711
///
4812
/// Returns the final `Instant` (time advanced during the handshake).

0 commit comments

Comments
 (0)