Coverage Report

Created: 2025-07-14 07:05

/rust/registry/src/index.crates.io-6f17d22bba15001f/rustls-0.23.29/src/conn.rs
Line
Count
Source (jump to first uncovered line)
1
use alloc::boxed::Box;
2
use core::fmt::Debug;
3
use core::mem;
4
use core::ops::{Deref, DerefMut, Range};
5
#[cfg(feature = "std")]
6
use std::io;
7
8
use kernel::KernelConnection;
9
10
use crate::common_state::{CommonState, Context, DEFAULT_BUFFER_LIMIT, IoState, State};
11
use crate::enums::{AlertDescription, ContentType, ProtocolVersion};
12
use crate::error::{Error, PeerMisbehaved};
13
use crate::log::trace;
14
use crate::msgs::deframer::DeframerIter;
15
use crate::msgs::deframer::buffers::{BufferProgress, DeframerVecBuffer, Delocator, Locator};
16
use crate::msgs::deframer::handshake::HandshakeDeframer;
17
use crate::msgs::handshake::Random;
18
use crate::msgs::message::{InboundPlainMessage, Message, MessagePayload};
19
use crate::record_layer::Decrypted;
20
use crate::suites::ExtractedSecrets;
21
use crate::vecbuf::ChunkVecBuffer;
22
23
// pub so that it can be re-exported from the crate root
24
pub mod kernel;
25
pub(crate) mod unbuffered;
26
27
#[cfg(feature = "std")]
28
mod connection {
29
    use alloc::vec::Vec;
30
    use core::fmt::Debug;
31
    use core::ops::{Deref, DerefMut};
32
    use std::io::{self, BufRead, Read};
33
34
    use crate::ConnectionCommon;
35
    use crate::common_state::{CommonState, IoState};
36
    use crate::error::Error;
37
    use crate::msgs::message::OutboundChunks;
38
    use crate::suites::ExtractedSecrets;
39
    use crate::vecbuf::ChunkVecBuffer;
40
41
    /// A client or server connection.
42
    #[derive(Debug)]
43
    pub enum Connection {
44
        /// A client connection
45
        Client(crate::client::ClientConnection),
46
        /// A server connection
47
        Server(crate::server::ServerConnection),
48
    }
49
50
    impl Connection {
51
        /// Read TLS content from `rd`.
52
        ///
53
        /// See [`ConnectionCommon::read_tls()`] for more information.
54
        pub fn read_tls(&mut self, rd: &mut dyn Read) -> Result<usize, io::Error> {
55
            match self {
56
                Self::Client(conn) => conn.read_tls(rd),
57
                Self::Server(conn) => conn.read_tls(rd),
58
            }
59
        }
60
61
        /// Writes TLS messages to `wr`.
62
        ///
63
        /// See [`ConnectionCommon::write_tls()`] for more information.
64
        pub fn write_tls(&mut self, wr: &mut dyn io::Write) -> Result<usize, io::Error> {
65
            self.sendable_tls.write_to(wr)
66
        }
67
68
        /// Returns an object that allows reading plaintext.
69
        pub fn reader(&mut self) -> Reader<'_> {
70
            match self {
71
                Self::Client(conn) => conn.reader(),
72
                Self::Server(conn) => conn.reader(),
73
            }
74
        }
75
76
        /// Returns an object that allows writing plaintext.
77
        pub fn writer(&mut self) -> Writer<'_> {
78
            match self {
79
                Self::Client(conn) => Writer::new(&mut **conn),
80
                Self::Server(conn) => Writer::new(&mut **conn),
81
            }
82
        }
83
84
        /// Processes any new packets read by a previous call to [`Connection::read_tls`].
85
        ///
86
        /// See [`ConnectionCommon::process_new_packets()`] for more information.
87
        pub fn process_new_packets(&mut self) -> Result<IoState, Error> {
88
            match self {
89
                Self::Client(conn) => conn.process_new_packets(),
90
                Self::Server(conn) => conn.process_new_packets(),
91
            }
92
        }
93
94
        /// Derives key material from the agreed connection secrets.
95
        ///
96
        /// See [`ConnectionCommon::export_keying_material()`] for more information.
97
        pub fn export_keying_material<T: AsMut<[u8]>>(
98
            &self,
99
            output: T,
100
            label: &[u8],
101
            context: Option<&[u8]>,
102
        ) -> Result<T, Error> {
103
            match self {
104
                Self::Client(conn) => conn.export_keying_material(output, label, context),
105
                Self::Server(conn) => conn.export_keying_material(output, label, context),
106
            }
107
        }
108
109
        /// This function uses `io` to complete any outstanding IO for this connection.
110
        ///
111
        /// See [`ConnectionCommon::complete_io()`] for more information.
112
        pub fn complete_io<T>(&mut self, io: &mut T) -> Result<(usize, usize), io::Error>
113
        where
114
            Self: Sized,
115
            T: Read + io::Write,
116
        {
117
            match self {
118
                Self::Client(conn) => conn.complete_io(io),
119
                Self::Server(conn) => conn.complete_io(io),
120
            }
121
        }
122
123
        /// Extract secrets, so they can be used when configuring kTLS, for example.
124
        /// Should be used with care as it exposes secret key material.
125
        pub fn dangerous_extract_secrets(self) -> Result<ExtractedSecrets, Error> {
126
            match self {
127
                Self::Client(client) => client.dangerous_extract_secrets(),
128
                Self::Server(server) => server.dangerous_extract_secrets(),
129
            }
130
        }
131
132
        /// Sets a limit on the internal buffers
133
        ///
134
        /// See [`ConnectionCommon::set_buffer_limit()`] for more information.
135
        pub fn set_buffer_limit(&mut self, limit: Option<usize>) {
136
            match self {
137
                Self::Client(client) => client.set_buffer_limit(limit),
138
                Self::Server(server) => server.set_buffer_limit(limit),
139
            }
140
        }
141
142
        /// Sends a TLS1.3 `key_update` message to refresh a connection's keys
143
        ///
144
        /// See [`ConnectionCommon::refresh_traffic_keys()`] for more information.
145
        pub fn refresh_traffic_keys(&mut self) -> Result<(), Error> {
146
            match self {
147
                Self::Client(client) => client.refresh_traffic_keys(),
148
                Self::Server(server) => server.refresh_traffic_keys(),
149
            }
150
        }
151
    }
152
153
    impl Deref for Connection {
154
        type Target = CommonState;
155
156
        fn deref(&self) -> &Self::Target {
157
            match self {
158
                Self::Client(conn) => &conn.core.common_state,
159
                Self::Server(conn) => &conn.core.common_state,
160
            }
161
        }
162
    }
163
164
    impl DerefMut for Connection {
165
        fn deref_mut(&mut self) -> &mut Self::Target {
166
            match self {
167
                Self::Client(conn) => &mut conn.core.common_state,
168
                Self::Server(conn) => &mut conn.core.common_state,
169
            }
170
        }
171
    }
172
173
    /// A structure that implements [`std::io::Read`] for reading plaintext.
174
    pub struct Reader<'a> {
175
        pub(super) received_plaintext: &'a mut ChunkVecBuffer,
176
        pub(super) has_received_close_notify: bool,
177
        pub(super) has_seen_eof: bool,
178
    }
179
180
    impl<'a> Reader<'a> {
181
        /// Check the connection's state if no bytes are available for reading.
182
        fn check_no_bytes_state(&self) -> io::Result<()> {
183
            match (self.has_received_close_notify, self.has_seen_eof) {
184
                // cleanly closed; don't care about TCP EOF: express this as Ok(0)
185
                (true, _) => Ok(()),
186
                // unclean closure
187
                (false, true) => Err(io::Error::new(
188
                    io::ErrorKind::UnexpectedEof,
189
                    UNEXPECTED_EOF_MESSAGE,
190
                )),
191
                // connection still going, but needs more data: signal `WouldBlock` so that
192
                // the caller knows this
193
                (false, false) => Err(io::ErrorKind::WouldBlock.into()),
194
            }
195
        }
196
197
        /// Obtain a chunk of plaintext data received from the peer over this TLS connection.
198
        ///
199
        /// This method consumes `self` so that it can return a slice whose lifetime is bounded by
200
        /// the [`ConnectionCommon`] that created this `Reader`.
201
        pub fn into_first_chunk(self) -> io::Result<&'a [u8]> {
202
            match self.received_plaintext.chunk() {
203
                Some(chunk) => Ok(chunk),
204
                None => {
205
                    self.check_no_bytes_state()?;
206
                    Ok(&[])
207
                }
208
            }
209
        }
210
    }
211
212
    impl Read for Reader<'_> {
213
        /// Obtain plaintext data received from the peer over this TLS connection.
214
        ///
215
        /// If the peer closes the TLS session cleanly, this returns `Ok(0)`  once all
216
        /// the pending data has been read. No further data can be received on that
217
        /// connection, so the underlying TCP connection should be half-closed too.
218
        ///
219
        /// If the peer closes the TLS session uncleanly (a TCP EOF without sending a
220
        /// `close_notify` alert) this function returns a `std::io::Error` of type
221
        /// `ErrorKind::UnexpectedEof` once any pending data has been read.
222
        ///
223
        /// Note that support for `close_notify` varies in peer TLS libraries: many do not
224
        /// support it and uncleanly close the TCP connection (this might be
225
        /// vulnerable to truncation attacks depending on the application protocol).
226
        /// This means applications using rustls must both handle EOF
227
        /// from this function, *and* unexpected EOF of the underlying TCP connection.
228
        ///
229
        /// If there are no bytes to read, this returns `Err(ErrorKind::WouldBlock.into())`.
230
        ///
231
        /// You may learn the number of bytes available at any time by inspecting
232
        /// the return of [`Connection::process_new_packets`].
233
        fn read(&mut self, buf: &mut [u8]) -> io::Result<usize> {
234
            let len = self.received_plaintext.read(buf)?;
235
            if len > 0 || buf.is_empty() {
236
                return Ok(len);
237
            }
238
239
            self.check_no_bytes_state()
240
                .map(|()| len)
241
        }
242
243
        /// Obtain plaintext data received from the peer over this TLS connection.
244
        ///
245
        /// If the peer closes the TLS session, this returns `Ok(())` without filling
246
        /// any more of the buffer once all the pending data has been read. No further
247
        /// data can be received on that connection, so the underlying TCP connection
248
        /// should be half-closed too.
249
        ///
250
        /// If the peer closes the TLS session uncleanly (a TCP EOF without sending a
251
        /// `close_notify` alert) this function returns a `std::io::Error` of type
252
        /// `ErrorKind::UnexpectedEof` once any pending data has been read.
253
        ///
254
        /// Note that support for `close_notify` varies in peer TLS libraries: many do not
255
        /// support it and uncleanly close the TCP connection (this might be
256
        /// vulnerable to truncation attacks depending on the application protocol).
257
        /// This means applications using rustls must both handle EOF
258
        /// from this function, *and* unexpected EOF of the underlying TCP connection.
259
        ///
260
        /// If there are no bytes to read, this returns `Err(ErrorKind::WouldBlock.into())`.
261
        ///
262
        /// You may learn the number of bytes available at any time by inspecting
263
        /// the return of [`Connection::process_new_packets`].
264
        #[cfg(read_buf)]
265
        fn read_buf(&mut self, mut cursor: core::io::BorrowedCursor<'_>) -> io::Result<()> {
266
            let before = cursor.written();
267
            self.received_plaintext
268
                .read_buf(cursor.reborrow())?;
269
            let len = cursor.written() - before;
270
            if len > 0 || cursor.capacity() == 0 {
271
                return Ok(());
272
            }
273
274
            self.check_no_bytes_state()
275
        }
276
    }
277
278
    impl BufRead for Reader<'_> {
279
        /// Obtain a chunk of plaintext data received from the peer over this TLS connection.
280
        /// This reads the same data as [`Reader::read()`], but returns a reference instead of
281
        /// copying the data.
282
        ///
283
        /// The caller should call [`Reader::consume()`] afterward to advance the buffer.
284
        ///
285
        /// See [`Reader::into_first_chunk()`] for a version of this function that returns a
286
        /// buffer with a longer lifetime.
287
        fn fill_buf(&mut self) -> io::Result<&[u8]> {
288
            Reader {
289
                // reborrow
290
                received_plaintext: self.received_plaintext,
291
                ..*self
292
            }
293
            .into_first_chunk()
294
        }
295
296
        fn consume(&mut self, amt: usize) {
297
            self.received_plaintext
298
                .consume_first_chunk(amt)
299
        }
300
    }
301
302
    const UNEXPECTED_EOF_MESSAGE: &str = "peer closed connection without sending TLS close_notify: \
303
https://docs.rs/rustls/latest/rustls/manual/_03_howto/index.html#unexpected-eof";
304
305
    /// A structure that implements [`std::io::Write`] for writing plaintext.
306
    pub struct Writer<'a> {
307
        sink: &'a mut dyn PlaintextSink,
308
    }
309
310
    impl<'a> Writer<'a> {
311
        /// Create a new Writer.
312
        ///
313
        /// This is not an external interface.  Get one of these objects
314
        /// from [`Connection::writer`].
315
        pub(crate) fn new(sink: &'a mut dyn PlaintextSink) -> Self {
316
            Writer { sink }
317
        }
318
    }
319
320
    impl io::Write for Writer<'_> {
321
        /// Send the plaintext `buf` to the peer, encrypting
322
        /// and authenticating it.  Once this function succeeds
323
        /// you should call [`Connection::write_tls`] which will output the
324
        /// corresponding TLS records.
325
        ///
326
        /// This function buffers plaintext sent before the
327
        /// TLS handshake completes, and sends it as soon
328
        /// as it can.  See [`ConnectionCommon::set_buffer_limit`] to control
329
        /// the size of this buffer.
330
        fn write(&mut self, buf: &[u8]) -> io::Result<usize> {
331
            self.sink.write(buf)
332
        }
333
334
        fn write_vectored(&mut self, bufs: &[io::IoSlice<'_>]) -> io::Result<usize> {
335
            self.sink.write_vectored(bufs)
336
        }
337
338
        fn flush(&mut self) -> io::Result<()> {
339
            self.sink.flush()
340
        }
341
    }
342
343
    /// Internal trait implemented by the [`ServerConnection`]/[`ClientConnection`]
344
    /// allowing them to be the subject of a [`Writer`].
345
    ///
346
    /// [`ServerConnection`]: crate::ServerConnection
347
    /// [`ClientConnection`]: crate::ClientConnection
348
    pub(crate) trait PlaintextSink {
349
        fn write(&mut self, buf: &[u8]) -> io::Result<usize>;
350
        fn write_vectored(&mut self, bufs: &[io::IoSlice<'_>]) -> io::Result<usize>;
351
        fn flush(&mut self) -> io::Result<()>;
352
    }
353
354
    impl<T> PlaintextSink for ConnectionCommon<T> {
355
        fn write(&mut self, buf: &[u8]) -> io::Result<usize> {
356
            let len = self
357
                .core
358
                .common_state
359
                .buffer_plaintext(buf.into(), &mut self.sendable_plaintext);
360
            self.core.maybe_refresh_traffic_keys();
361
            Ok(len)
362
        }
363
364
        fn write_vectored(&mut self, bufs: &[io::IoSlice<'_>]) -> io::Result<usize> {
365
            let payload_owner: Vec<&[u8]>;
366
            let payload = match bufs.len() {
367
                0 => return Ok(0),
368
                1 => OutboundChunks::Single(bufs[0].deref()),
369
                _ => {
370
                    payload_owner = bufs
371
                        .iter()
372
                        .map(|io_slice| io_slice.deref())
373
                        .collect();
374
375
                    OutboundChunks::new(&payload_owner)
376
                }
377
            };
378
            let len = self
379
                .core
380
                .common_state
381
                .buffer_plaintext(payload, &mut self.sendable_plaintext);
382
            self.core.maybe_refresh_traffic_keys();
383
            Ok(len)
384
        }
385
386
        fn flush(&mut self) -> io::Result<()> {
387
            Ok(())
388
        }
389
    }
390
}
391
392
#[cfg(feature = "std")]
393
pub use connection::{Connection, Reader, Writer};
394
395
#[derive(Debug)]
396
pub(crate) struct ConnectionRandoms {
397
    pub(crate) client: [u8; 32],
398
    pub(crate) server: [u8; 32],
399
}
400
401
impl ConnectionRandoms {
402
0
    pub(crate) fn new(client: Random, server: Random) -> Self {
403
0
        Self {
404
0
            client: client.0,
405
0
            server: server.0,
406
0
        }
407
0
    }
Unexecuted instantiation: <rustls::conn::ConnectionRandoms>::new
Unexecuted instantiation: <rustls::conn::ConnectionRandoms>::new
408
}
409
410
/// Interface shared by client and server connections.
411
pub struct ConnectionCommon<Data> {
412
    pub(crate) core: ConnectionCore<Data>,
413
    deframer_buffer: DeframerVecBuffer,
414
    sendable_plaintext: ChunkVecBuffer,
415
}
416
417
impl<Data> ConnectionCommon<Data> {
418
    /// Processes any new packets read by a previous call to
419
    /// [`Connection::read_tls`].
420
    ///
421
    /// Errors from this function relate to TLS protocol errors, and
422
    /// are fatal to the connection.  Future calls after an error will do
423
    /// no new work and will return the same error. After an error is
424
    /// received from [`process_new_packets`], you should not call [`read_tls`]
425
    /// any more (it will fill up buffers to no purpose). However, you
426
    /// may call the other methods on the connection, including `write`,
427
    /// `send_close_notify`, and `write_tls`. Most likely you will want to
428
    /// call `write_tls` to send any alerts queued by the error and then
429
    /// close the underlying connection.
430
    ///
431
    /// Success from this function comes with some sundry state data
432
    /// about the connection.
433
    ///
434
    /// [`read_tls`]: Connection::read_tls
435
    /// [`process_new_packets`]: Connection::process_new_packets
436
    #[inline]
437
0
    pub fn process_new_packets(&mut self) -> Result<IoState, Error> {
438
0
        self.core
439
0
            .process_new_packets(&mut self.deframer_buffer, &mut self.sendable_plaintext)
440
0
    }
Unexecuted instantiation: <rustls::conn::ConnectionCommon<_>>::process_new_packets
Unexecuted instantiation: <rustls::conn::ConnectionCommon<_>>::process_new_packets
441
442
    /// Derives key material from the agreed connection secrets.
443
    ///
444
    /// This function fills in `output` with `output.len()` bytes of key
445
    /// material derived from the master session secret using `label`
446
    /// and `context` for diversification. Ownership of the buffer is taken
447
    /// by the function and returned via the Ok result to ensure no key
448
    /// material leaks if the function fails.
449
    ///
450
    /// See RFC5705 for more details on what this does and is for.
451
    ///
452
    /// For TLS1.3 connections, this function does not use the
453
    /// "early" exporter at any point.
454
    ///
455
    /// This function fails if called prior to the handshake completing;
456
    /// check with [`CommonState::is_handshaking`] first.
457
    ///
458
    /// This function fails if `output.len()` is zero.
459
    #[inline]
460
0
    pub fn export_keying_material<T: AsMut<[u8]>>(
461
0
        &self,
462
0
        output: T,
463
0
        label: &[u8],
464
0
        context: Option<&[u8]>,
465
0
    ) -> Result<T, Error> {
466
0
        self.core
467
0
            .export_keying_material(output, label, context)
468
0
    }
Unexecuted instantiation: <rustls::conn::ConnectionCommon<_>>::export_keying_material::<_>
Unexecuted instantiation: <rustls::conn::ConnectionCommon<_>>::export_keying_material::<_>
469
470
    /// Extract secrets, so they can be used when configuring kTLS, for example.
471
    /// Should be used with care as it exposes secret key material.
472
0
    pub fn dangerous_extract_secrets(self) -> Result<ExtractedSecrets, Error> {
473
0
        self.core.dangerous_extract_secrets()
474
0
    }
Unexecuted instantiation: <rustls::conn::ConnectionCommon<_>>::dangerous_extract_secrets
Unexecuted instantiation: <rustls::conn::ConnectionCommon<_>>::dangerous_extract_secrets
475
476
    /// Sets a limit on the internal buffers used to buffer
477
    /// unsent plaintext (prior to completing the TLS handshake)
478
    /// and unsent TLS records.  This limit acts only on application
479
    /// data written through [`Connection::writer`].
480
    ///
481
    /// By default the limit is 64KB.  The limit can be set
482
    /// at any time, even if the current buffer use is higher.
483
    ///
484
    /// [`None`] means no limit applies, and will mean that written
485
    /// data is buffered without bound -- it is up to the application
486
    /// to appropriately schedule its plaintext and TLS writes to bound
487
    /// memory usage.
488
    ///
489
    /// For illustration: `Some(1)` means a limit of one byte applies:
490
    /// [`Connection::writer`] will accept only one byte, encrypt it and
491
    /// add a TLS header.  Once this is sent via [`Connection::write_tls`],
492
    /// another byte may be sent.
493
    ///
494
    /// # Internal write-direction buffering
495
    /// rustls has two buffers whose size are bounded by this setting:
496
    ///
497
    /// ## Buffering of unsent plaintext data prior to handshake completion
498
    ///
499
    /// Calls to [`Connection::writer`] before or during the handshake
500
    /// are buffered (up to the limit specified here).  Once the
501
    /// handshake completes this data is encrypted and the resulting
502
    /// TLS records are added to the outgoing buffer.
503
    ///
504
    /// ## Buffering of outgoing TLS records
505
    ///
506
    /// This buffer is used to store TLS records that rustls needs to
507
    /// send to the peer.  It is used in these two circumstances:
508
    ///
509
    /// - by [`Connection::process_new_packets`] when a handshake or alert
510
    ///   TLS record needs to be sent.
511
    /// - by [`Connection::writer`] post-handshake: the plaintext is
512
    ///   encrypted and the resulting TLS record is buffered.
513
    ///
514
    /// This buffer is emptied by [`Connection::write_tls`].
515
    ///
516
    /// [`Connection::writer`]: crate::Connection::writer
517
    /// [`Connection::write_tls`]: crate::Connection::write_tls
518
    /// [`Connection::process_new_packets`]: crate::Connection::process_new_packets
519
0
    pub fn set_buffer_limit(&mut self, limit: Option<usize>) {
520
0
        self.sendable_plaintext.set_limit(limit);
521
0
        self.sendable_tls.set_limit(limit);
522
0
    }
Unexecuted instantiation: <rustls::conn::ConnectionCommon<_>>::set_buffer_limit
Unexecuted instantiation: <rustls::conn::ConnectionCommon<_>>::set_buffer_limit
523
524
    /// Sends a TLS1.3 `key_update` message to refresh a connection's keys.
525
    ///
526
    /// This call refreshes our encryption keys. Once the peer receives the message,
527
    /// it refreshes _its_ encryption and decryption keys and sends a response.
528
    /// Once we receive that response, we refresh our decryption keys to match.
529
    /// At the end of this process, keys in both directions have been refreshed.
530
    ///
531
    /// Note that this process does not happen synchronously: this call just
532
    /// arranges that the `key_update` message will be included in the next
533
    /// `write_tls` output.
534
    ///
535
    /// This fails with `Error::HandshakeNotComplete` if called before the initial
536
    /// handshake is complete, or if a version prior to TLS1.3 is negotiated.
537
    ///
538
    /// # Usage advice
539
    /// Note that other implementations (including rustls) may enforce limits on
540
    /// the number of `key_update` messages allowed on a given connection to prevent
541
    /// denial of service.  Therefore, this should be called sparingly.
542
    ///
543
    /// rustls implicitly and automatically refreshes traffic keys when needed
544
    /// according to the selected cipher suite's cryptographic constraints.  There
545
    /// is therefore no need to call this manually to avoid cryptographic keys
546
    /// "wearing out".
547
    ///
548
    /// The main reason to call this manually is to roll keys when it is known
549
    /// a connection will be idle for a long period.
550
0
    pub fn refresh_traffic_keys(&mut self) -> Result<(), Error> {
551
0
        self.core.refresh_traffic_keys()
552
0
    }
Unexecuted instantiation: <rustls::conn::ConnectionCommon<_>>::refresh_traffic_keys
Unexecuted instantiation: <rustls::conn::ConnectionCommon<_>>::refresh_traffic_keys
553
}
554
555
#[cfg(feature = "std")]
556
impl<Data> ConnectionCommon<Data> {
557
    /// Returns an object that allows reading plaintext.
558
    pub fn reader(&mut self) -> Reader<'_> {
559
        let common = &mut self.core.common_state;
560
        Reader {
561
            received_plaintext: &mut common.received_plaintext,
562
            // Are we done? i.e., have we processed all received messages, and received a
563
            // close_notify to indicate that no new messages will arrive?
564
            has_received_close_notify: common.has_received_close_notify,
565
            has_seen_eof: common.has_seen_eof,
566
        }
567
    }
568
569
    /// Returns an object that allows writing plaintext.
570
    pub fn writer(&mut self) -> Writer<'_> {
571
        Writer::new(self)
572
    }
573
574
    /// This function uses `io` to complete any outstanding IO for
575
    /// this connection.
576
    ///
577
    /// This is a convenience function which solely uses other parts
578
    /// of the public API.
579
    ///
580
    /// What this means depends on the connection  state:
581
    ///
582
    /// - If the connection [`is_handshaking`], then IO is performed until
583
    ///   the handshake is complete.
584
    /// - Otherwise, if [`wants_write`] is true, [`write_tls`] is invoked
585
    ///   until it is all written.
586
    /// - Otherwise, if [`wants_read`] is true, [`read_tls`] is invoked
587
    ///   once.
588
    ///
589
    /// The return value is the number of bytes read from and written
590
    /// to `io`, respectively.
591
    ///
592
    /// This function will block if `io` blocks.
593
    ///
594
    /// Errors from TLS record handling (i.e., from [`process_new_packets`])
595
    /// are wrapped in an `io::ErrorKind::InvalidData`-kind error.
596
    ///
597
    /// [`is_handshaking`]: CommonState::is_handshaking
598
    /// [`wants_read`]: CommonState::wants_read
599
    /// [`wants_write`]: CommonState::wants_write
600
    /// [`write_tls`]: ConnectionCommon::write_tls
601
    /// [`read_tls`]: ConnectionCommon::read_tls
602
    /// [`process_new_packets`]: ConnectionCommon::process_new_packets
603
    pub fn complete_io<T>(&mut self, io: &mut T) -> Result<(usize, usize), io::Error>
604
    where
605
        Self: Sized,
606
        T: io::Read + io::Write,
607
    {
608
        let mut eof = false;
609
        let mut wrlen = 0;
610
        let mut rdlen = 0;
611
612
        loop {
613
            let until_handshaked = self.is_handshaking();
614
615
            if !self.wants_write() && !self.wants_read() {
616
                // We will make no further progress.
617
                return Ok((rdlen, wrlen));
618
            }
619
620
            while self.wants_write() {
621
                match self.write_tls(io)? {
622
                    0 => {
623
                        io.flush()?;
624
                        return Ok((rdlen, wrlen)); // EOF.
625
                    }
626
                    n => wrlen += n,
627
                }
628
            }
629
            io.flush()?;
630
631
            if !until_handshaked && wrlen > 0 {
632
                return Ok((rdlen, wrlen));
633
            }
634
635
            while !eof && self.wants_read() {
636
                let read_size = match self.read_tls(io) {
637
                    Ok(0) => {
638
                        eof = true;
639
                        Some(0)
640
                    }
641
                    Ok(n) => {
642
                        rdlen += n;
643
                        Some(n)
644
                    }
645
                    Err(err) if err.kind() == io::ErrorKind::Interrupted => None, // nothing to do
646
                    Err(err) => return Err(err),
647
                };
648
                if read_size.is_some() {
649
                    break;
650
                }
651
            }
652
653
            match self.process_new_packets() {
654
                Ok(_) => {}
655
                Err(e) => {
656
                    // In case we have an alert to send describing this error,
657
                    // try a last-gasp write -- but don't predate the primary
658
                    // error.
659
                    let _ignored = self.write_tls(io);
660
                    let _ignored = io.flush();
661
662
                    return Err(io::Error::new(io::ErrorKind::InvalidData, e));
663
                }
664
            };
665
666
            // if we're doing IO until handshaked, and we believe we've finished handshaking,
667
            // but process_new_packets() has queued TLS data to send, loop around again to write
668
            // the queued messages.
669
            if until_handshaked && !self.is_handshaking() && self.wants_write() {
670
                continue;
671
            }
672
673
            match (eof, until_handshaked, self.is_handshaking()) {
674
                (_, true, false) => return Ok((rdlen, wrlen)),
675
                (_, false, _) => return Ok((rdlen, wrlen)),
676
                (true, true, true) => return Err(io::Error::from(io::ErrorKind::UnexpectedEof)),
677
                (..) => {}
678
            }
679
        }
680
    }
681
682
    /// Extract the first handshake message.
683
    ///
684
    /// This is a shortcut to the `process_new_packets()` -> `process_msg()` ->
685
    /// `process_handshake_messages()` path, specialized for the first handshake message.
686
    pub(crate) fn first_handshake_message(&mut self) -> Result<Option<Message<'static>>, Error> {
687
        let mut buffer_progress = self.core.hs_deframer.progress();
688
689
        let res = self
690
            .core
691
            .deframe(
692
                None,
693
                self.deframer_buffer.filled_mut(),
694
                &mut buffer_progress,
695
            )
696
            .map(|opt| opt.map(|pm| Message::try_from(pm).map(|m| m.into_owned())));
697
698
        match res? {
699
            Some(Ok(msg)) => {
700
                self.deframer_buffer
701
                    .discard(buffer_progress.take_discard());
702
                Ok(Some(msg))
703
            }
704
            Some(Err(err)) => Err(self.send_fatal_alert(AlertDescription::DecodeError, err)),
705
            None => Ok(None),
706
        }
707
    }
708
709
    pub(crate) fn replace_state(&mut self, new: Box<dyn State<Data>>) {
710
        self.core.state = Ok(new);
711
    }
712
713
    /// Read TLS content from `rd` into the internal buffer.
714
    ///
715
    /// Due to the internal buffering, `rd` can supply TLS messages in arbitrary-sized chunks (like
716
    /// a socket or pipe might).
717
    ///
718
    /// You should call [`process_new_packets()`] each time a call to this function succeeds in order
719
    /// to empty the incoming TLS data buffer.
720
    ///
721
    /// This function returns `Ok(0)` when the underlying `rd` does so. This typically happens when
722
    /// a socket is cleanly closed, or a file is at EOF. Errors may result from the IO done through
723
    /// `rd`; additionally, errors of `ErrorKind::Other` are emitted to signal backpressure:
724
    ///
725
    /// * In order to empty the incoming TLS data buffer, you should call [`process_new_packets()`]
726
    ///   each time a call to this function succeeds.
727
    /// * In order to empty the incoming plaintext data buffer, you should empty it through
728
    ///   the [`reader()`] after the call to [`process_new_packets()`].
729
    ///
730
    /// This function also returns `Ok(0)` once a `close_notify` alert has been successfully
731
    /// received.  No additional data is ever read in this state.
732
    ///
733
    /// [`process_new_packets()`]: ConnectionCommon::process_new_packets
734
    /// [`reader()`]: ConnectionCommon::reader
735
    pub fn read_tls(&mut self, rd: &mut dyn io::Read) -> Result<usize, io::Error> {
736
        if self.received_plaintext.is_full() {
737
            return Err(io::Error::new(
738
                io::ErrorKind::Other,
739
                "received plaintext buffer full",
740
            ));
741
        }
742
743
        if self.has_received_close_notify {
744
            return Ok(0);
745
        }
746
747
        let res = self
748
            .deframer_buffer
749
            .read(rd, self.core.hs_deframer.is_active());
750
        if let Ok(0) = res {
751
            self.has_seen_eof = true;
752
        }
753
        res
754
    }
755
756
    /// Writes TLS messages to `wr`.
757
    ///
758
    /// On success, this function returns `Ok(n)` where `n` is a number of bytes written to `wr`
759
    /// (after encoding and encryption).
760
    ///
761
    /// After this function returns, the connection buffer may not yet be fully flushed. The
762
    /// [`CommonState::wants_write`] function can be used to check if the output buffer is empty.
763
    pub fn write_tls(&mut self, wr: &mut dyn io::Write) -> Result<usize, io::Error> {
764
        self.sendable_tls.write_to(wr)
765
    }
766
}
767
768
impl<'a, Data> From<&'a mut ConnectionCommon<Data>> for Context<'a, Data> {
769
0
    fn from(conn: &'a mut ConnectionCommon<Data>) -> Self {
770
0
        Self {
771
0
            common: &mut conn.core.common_state,
772
0
            data: &mut conn.core.data,
773
0
            sendable_plaintext: Some(&mut conn.sendable_plaintext),
774
0
        }
775
0
    }
Unexecuted instantiation: <rustls::common_state::Context<_> as core::convert::From<&mut rustls::conn::ConnectionCommon<_>>>::from
Unexecuted instantiation: <rustls::common_state::Context<_> as core::convert::From<&mut rustls::conn::ConnectionCommon<_>>>::from
776
}
777
778
impl<T> Deref for ConnectionCommon<T> {
779
    type Target = CommonState;
780
781
0
    fn deref(&self) -> &Self::Target {
782
0
        &self.core.common_state
783
0
    }
Unexecuted instantiation: <rustls::conn::ConnectionCommon<_> as core::ops::deref::Deref>::deref
Unexecuted instantiation: <rustls::conn::ConnectionCommon<_> as core::ops::deref::Deref>::deref
784
}
785
786
impl<T> DerefMut for ConnectionCommon<T> {
787
0
    fn deref_mut(&mut self) -> &mut Self::Target {
788
0
        &mut self.core.common_state
789
0
    }
Unexecuted instantiation: <rustls::conn::ConnectionCommon<_> as core::ops::deref::DerefMut>::deref_mut
Unexecuted instantiation: <rustls::conn::ConnectionCommon<_> as core::ops::deref::DerefMut>::deref_mut
790
}
791
792
impl<Data> From<ConnectionCore<Data>> for ConnectionCommon<Data> {
793
0
    fn from(core: ConnectionCore<Data>) -> Self {
794
0
        Self {
795
0
            core,
796
0
            deframer_buffer: DeframerVecBuffer::default(),
797
0
            sendable_plaintext: ChunkVecBuffer::new(Some(DEFAULT_BUFFER_LIMIT)),
798
0
        }
799
0
    }
Unexecuted instantiation: <rustls::conn::ConnectionCommon<_> as core::convert::From<rustls::conn::ConnectionCore<_>>>::from
Unexecuted instantiation: <rustls::conn::ConnectionCommon<_> as core::convert::From<rustls::conn::ConnectionCore<_>>>::from
800
}
801
802
/// Interface shared by unbuffered client and server connections.
803
pub struct UnbufferedConnectionCommon<Data> {
804
    pub(crate) core: ConnectionCore<Data>,
805
    wants_write: bool,
806
    emitted_peer_closed_state: bool,
807
}
808
809
impl<Data> From<ConnectionCore<Data>> for UnbufferedConnectionCommon<Data> {
810
0
    fn from(core: ConnectionCore<Data>) -> Self {
811
0
        Self {
812
0
            core,
813
0
            wants_write: false,
814
0
            emitted_peer_closed_state: false,
815
0
        }
816
0
    }
Unexecuted instantiation: <rustls::conn::UnbufferedConnectionCommon<rustls::client::client_conn::ClientConnectionData> as core::convert::From<rustls::conn::ConnectionCore<rustls::client::client_conn::ClientConnectionData>>>::from
Unexecuted instantiation: <rustls::conn::UnbufferedConnectionCommon<rustls::server::server_conn::ServerConnectionData> as core::convert::From<rustls::conn::ConnectionCore<rustls::server::server_conn::ServerConnectionData>>>::from
Unexecuted instantiation: <rustls::conn::UnbufferedConnectionCommon<rustls::client::client_conn::ClientConnectionData> as core::convert::From<rustls::conn::ConnectionCore<rustls::client::client_conn::ClientConnectionData>>>::from
Unexecuted instantiation: <rustls::conn::UnbufferedConnectionCommon<rustls::server::server_conn::ServerConnectionData> as core::convert::From<rustls::conn::ConnectionCore<rustls::server::server_conn::ServerConnectionData>>>::from
817
}
818
819
impl<Data> UnbufferedConnectionCommon<Data> {
820
    /// Extract secrets, so they can be used when configuring kTLS, for example.
821
    /// Should be used with care as it exposes secret key material.
822
0
    pub fn dangerous_extract_secrets(self) -> Result<ExtractedSecrets, Error> {
823
0
        self.core.dangerous_extract_secrets()
824
0
    }
Unexecuted instantiation: <rustls::conn::UnbufferedConnectionCommon<rustls::client::client_conn::ClientConnectionData>>::dangerous_extract_secrets
Unexecuted instantiation: <rustls::conn::UnbufferedConnectionCommon<rustls::server::server_conn::ServerConnectionData>>::dangerous_extract_secrets
Unexecuted instantiation: <rustls::conn::UnbufferedConnectionCommon<rustls::client::client_conn::ClientConnectionData>>::dangerous_extract_secrets
Unexecuted instantiation: <rustls::conn::UnbufferedConnectionCommon<rustls::server::server_conn::ServerConnectionData>>::dangerous_extract_secrets
825
}
826
827
impl<T> Deref for UnbufferedConnectionCommon<T> {
828
    type Target = CommonState;
829
830
0
    fn deref(&self) -> &Self::Target {
831
0
        &self.core.common_state
832
0
    }
Unexecuted instantiation: <rustls::conn::UnbufferedConnectionCommon<rustls::client::client_conn::ClientConnectionData> as core::ops::deref::Deref>::deref
Unexecuted instantiation: <rustls::conn::UnbufferedConnectionCommon<rustls::client::client_conn::ClientConnectionData> as core::ops::deref::Deref>::deref
833
}
834
835
pub(crate) struct ConnectionCore<Data> {
836
    pub(crate) state: Result<Box<dyn State<Data>>, Error>,
837
    pub(crate) data: Data,
838
    pub(crate) common_state: CommonState,
839
    pub(crate) hs_deframer: HandshakeDeframer,
840
841
    /// We limit consecutive empty fragments to avoid a route for the peer to send
842
    /// us significant but fruitless traffic.
843
    seen_consecutive_empty_fragments: u8,
844
}
845
846
impl<Data> ConnectionCore<Data> {
847
0
    pub(crate) fn new(state: Box<dyn State<Data>>, data: Data, common_state: CommonState) -> Self {
848
0
        Self {
849
0
            state: Ok(state),
850
0
            data,
851
0
            common_state,
852
0
            hs_deframer: HandshakeDeframer::default(),
853
0
            seen_consecutive_empty_fragments: 0,
854
0
        }
855
0
    }
Unexecuted instantiation: <rustls::conn::ConnectionCore<rustls::client::client_conn::ClientConnectionData>>::new
Unexecuted instantiation: <rustls::conn::ConnectionCore<rustls::server::server_conn::ServerConnectionData>>::new
Unexecuted instantiation: <rustls::conn::ConnectionCore<rustls::client::client_conn::ClientConnectionData>>::new
Unexecuted instantiation: <rustls::conn::ConnectionCore<rustls::server::server_conn::ServerConnectionData>>::new
856
857
0
    pub(crate) fn process_new_packets(
858
0
        &mut self,
859
0
        deframer_buffer: &mut DeframerVecBuffer,
860
0
        sendable_plaintext: &mut ChunkVecBuffer,
861
0
    ) -> Result<IoState, Error> {
862
0
        let mut state = match mem::replace(&mut self.state, Err(Error::HandshakeNotComplete)) {
863
0
            Ok(state) => state,
864
0
            Err(e) => {
865
0
                self.state = Err(e.clone());
866
0
                return Err(e);
867
            }
868
        };
869
870
0
        let mut buffer_progress = self.hs_deframer.progress();
871
872
        loop {
873
0
            let res = self.deframe(
874
0
                Some(&*state),
875
0
                deframer_buffer.filled_mut(),
876
0
                &mut buffer_progress,
877
0
            );
878
879
0
            let opt_msg = match res {
880
0
                Ok(opt_msg) => opt_msg,
881
0
                Err(e) => {
882
0
                    self.state = Err(e.clone());
883
0
                    deframer_buffer.discard(buffer_progress.take_discard());
884
0
                    return Err(e);
885
                }
886
            };
887
888
0
            let Some(msg) = opt_msg else {
889
0
                break;
890
            };
891
892
0
            match self.process_msg(msg, state, Some(sendable_plaintext)) {
893
0
                Ok(new) => state = new,
894
0
                Err(e) => {
895
0
                    self.state = Err(e.clone());
896
0
                    deframer_buffer.discard(buffer_progress.take_discard());
897
0
                    return Err(e);
898
                }
899
            }
900
901
0
            if self
902
0
                .common_state
903
0
                .has_received_close_notify
904
            {
905
                // "Any data received after a closure alert has been received MUST be ignored."
906
                // -- <https://datatracker.ietf.org/doc/html/rfc8446#section-6.1>
907
                // This is data that has already been accepted in `read_tls`.
908
0
                buffer_progress.add_discard(deframer_buffer.filled().len());
909
0
                break;
910
0
            }
911
0
912
0
            deframer_buffer.discard(buffer_progress.take_discard());
913
        }
914
915
0
        deframer_buffer.discard(buffer_progress.take_discard());
916
0
        self.state = Ok(state);
917
0
        Ok(self.common_state.current_io_state())
918
0
    }
Unexecuted instantiation: <rustls::conn::ConnectionCore<_>>::process_new_packets
Unexecuted instantiation: <rustls::conn::ConnectionCore<_>>::process_new_packets
919
920
    /// Pull a message out of the deframer and send any messages that need to be sent as a result.
921
0
    fn deframe<'b>(
922
0
        &mut self,
923
0
        state: Option<&dyn State<Data>>,
924
0
        buffer: &'b mut [u8],
925
0
        buffer_progress: &mut BufferProgress,
926
0
    ) -> Result<Option<InboundPlainMessage<'b>>, Error> {
927
0
        // before processing any more of `buffer`, return any extant messages from `hs_deframer`
928
0
        if self.hs_deframer.has_message_ready() {
929
0
            Ok(self.take_handshake_message(buffer, buffer_progress))
930
        } else {
931
0
            self.process_more_input(state, buffer, buffer_progress)
932
        }
933
0
    }
Unexecuted instantiation: <rustls::conn::ConnectionCore<rustls::client::client_conn::ClientConnectionData>>::deframe
Unexecuted instantiation: <rustls::conn::ConnectionCore<rustls::server::server_conn::ServerConnectionData>>::deframe
Unexecuted instantiation: <rustls::conn::ConnectionCore<rustls::client::client_conn::ClientConnectionData>>::deframe
Unexecuted instantiation: <rustls::conn::ConnectionCore<rustls::server::server_conn::ServerConnectionData>>::deframe
934
935
0
    fn take_handshake_message<'b>(
936
0
        &mut self,
937
0
        buffer: &'b mut [u8],
938
0
        buffer_progress: &mut BufferProgress,
939
0
    ) -> Option<InboundPlainMessage<'b>> {
940
0
        self.hs_deframer
941
0
            .iter(buffer)
942
0
            .next()
943
0
            .map(|(message, discard)| {
944
0
                buffer_progress.add_discard(discard);
945
0
                message
946
0
            })
Unexecuted instantiation: <rustls::conn::ConnectionCore<rustls::client::client_conn::ClientConnectionData>>::take_handshake_message::{closure#0}
Unexecuted instantiation: <rustls::conn::ConnectionCore<rustls::server::server_conn::ServerConnectionData>>::take_handshake_message::{closure#0}
Unexecuted instantiation: <rustls::conn::ConnectionCore<rustls::client::client_conn::ClientConnectionData>>::take_handshake_message::{closure#0}
Unexecuted instantiation: <rustls::conn::ConnectionCore<rustls::server::server_conn::ServerConnectionData>>::take_handshake_message::{closure#0}
947
0
    }
Unexecuted instantiation: <rustls::conn::ConnectionCore<rustls::client::client_conn::ClientConnectionData>>::take_handshake_message
Unexecuted instantiation: <rustls::conn::ConnectionCore<rustls::server::server_conn::ServerConnectionData>>::take_handshake_message
Unexecuted instantiation: <rustls::conn::ConnectionCore<rustls::client::client_conn::ClientConnectionData>>::take_handshake_message
Unexecuted instantiation: <rustls::conn::ConnectionCore<rustls::server::server_conn::ServerConnectionData>>::take_handshake_message
948
949
0
    fn process_more_input<'b>(
950
0
        &mut self,
951
0
        state: Option<&dyn State<Data>>,
952
0
        buffer: &'b mut [u8],
953
0
        buffer_progress: &mut BufferProgress,
954
0
    ) -> Result<Option<InboundPlainMessage<'b>>, Error> {
955
0
        let version_is_tls13 = matches!(
956
0
            self.common_state.negotiated_version,
957
            Some(ProtocolVersion::TLSv1_3)
958
        );
959
960
0
        let locator = Locator::new(buffer);
961
962
        loop {
963
0
            let mut iter = DeframerIter::new(&mut buffer[buffer_progress.processed()..]);
964
965
0
            let (message, processed) = loop {
966
0
                let message = match iter.next().transpose() {
967
0
                    Ok(Some(message)) => message,
968
0
                    Ok(None) => return Ok(None),
969
0
                    Err(err) => return Err(self.handle_deframe_error(err, state)),
970
                };
971
972
0
                let allowed_plaintext = match message.typ {
973
                    // CCS messages are always plaintext.
974
0
                    ContentType::ChangeCipherSpec => true,
975
                    // Alerts are allowed to be plaintext if-and-only-if:
976
                    // * The negotiated protocol version is TLS 1.3. - In TLS 1.2 it is unambiguous when
977
                    //   keying changes based on the CCS message. Only TLS 1.3 requires these heuristics.
978
                    // * We have not yet decrypted any messages from the peer - if we have we don't
979
                    //   expect any plaintext.
980
                    // * The payload size is indicative of a plaintext alert message.
981
                    ContentType::Alert
982
0
                        if version_is_tls13
983
0
                            && !self
984
0
                                .common_state
985
0
                                .record_layer
986
0
                                .has_decrypted()
987
0
                            && message.payload.len() <= 2 =>
988
0
                    {
989
0
                        true
990
                    }
991
                    // In other circumstances, we expect all messages to be encrypted.
992
0
                    _ => false,
993
                };
994
995
0
                if allowed_plaintext && !self.hs_deframer.is_active() {
996
0
                    break (message.into_plain_message(), iter.bytes_consumed());
997
0
                }
998
999
0
                let message = match self
1000
0
                    .common_state
1001
0
                    .record_layer
1002
0
                    .decrypt_incoming(message)
1003
                {
1004
                    // failed decryption during trial decryption is not allowed to be
1005
                    // interleaved with partial handshake data.
1006
0
                    Ok(None) if !self.hs_deframer.is_aligned() => {
1007
0
                        return Err(
1008
0
                            PeerMisbehaved::RejectedEarlyDataInterleavedWithHandshakeMessage.into(),
1009
0
                        );
1010
                    }
1011
1012
                    // failed decryption during trial decryption.
1013
0
                    Ok(None) => continue,
1014
1015
0
                    Ok(Some(message)) => message,
1016
1017
0
                    Err(err) => return Err(self.handle_deframe_error(err, state)),
1018
                };
1019
1020
                let Decrypted {
1021
0
                    want_close_before_decrypt,
1022
0
                    plaintext,
1023
0
                } = message;
1024
0
1025
0
                if want_close_before_decrypt {
1026
0
                    self.common_state.send_close_notify();
1027
0
                }
1028
1029
0
                break (plaintext, iter.bytes_consumed());
1030
            };
1031
1032
0
            if !self.hs_deframer.is_aligned() && message.typ != ContentType::Handshake {
1033
                // "Handshake messages MUST NOT be interleaved with other record
1034
                // types.  That is, if a handshake message is split over two or more
1035
                // records, there MUST NOT be any other records between them."
1036
                // https://www.rfc-editor.org/rfc/rfc8446#section-5.1
1037
0
                return Err(PeerMisbehaved::MessageInterleavedWithHandshakeMessage.into());
1038
0
            }
1039
0
1040
0
            match message.payload.len() {
1041
                0 => {
1042
0
                    if self.seen_consecutive_empty_fragments
1043
0
                        == ALLOWED_CONSECUTIVE_EMPTY_FRAGMENTS_MAX
1044
                    {
1045
0
                        return Err(PeerMisbehaved::TooManyEmptyFragments.into());
1046
0
                    }
1047
0
                    self.seen_consecutive_empty_fragments += 1;
1048
                }
1049
0
                _ => {
1050
0
                    self.seen_consecutive_empty_fragments = 0;
1051
0
                }
1052
            };
1053
1054
0
            buffer_progress.add_processed(processed);
1055
0
1056
0
            // do an end-run around the borrow checker, converting `message` (containing
1057
0
            // a borrowed slice) to an unborrowed one (containing a `Range` into the
1058
0
            // same buffer).  the reborrow happens inside the branch that returns the
1059
0
            // message.
1060
0
            //
1061
0
            // is fixed by -Zpolonius
1062
0
            // https://github.com/rust-lang/rfcs/blob/master/text/2094-nll.md#problem-case-3-conditional-control-flow-across-functions
1063
0
            let unborrowed = InboundUnborrowedMessage::unborrow(&locator, message);
1064
0
1065
0
            if unborrowed.typ != ContentType::Handshake {
1066
0
                let message = unborrowed.reborrow(&Delocator::new(buffer));
1067
0
                buffer_progress.add_discard(processed);
1068
0
                return Ok(Some(message));
1069
0
            }
1070
0
1071
0
            let message = unborrowed.reborrow(&Delocator::new(buffer));
1072
0
            self.hs_deframer
1073
0
                .input_message(message, &locator, buffer_progress.processed());
1074
0
            self.hs_deframer.coalesce(buffer)?;
1075
1076
0
            self.common_state.aligned_handshake = self.hs_deframer.is_aligned();
1077
0
1078
0
            if self.hs_deframer.has_message_ready() {
1079
                // trial decryption finishes with the first handshake message after it started.
1080
0
                self.common_state
1081
0
                    .record_layer
1082
0
                    .finish_trial_decryption();
1083
0
1084
0
                return Ok(self.take_handshake_message(buffer, buffer_progress));
1085
0
            }
1086
        }
1087
0
    }
Unexecuted instantiation: <rustls::conn::ConnectionCore<rustls::client::client_conn::ClientConnectionData>>::process_more_input
Unexecuted instantiation: <rustls::conn::ConnectionCore<rustls::server::server_conn::ServerConnectionData>>::process_more_input
Unexecuted instantiation: <rustls::conn::ConnectionCore<rustls::client::client_conn::ClientConnectionData>>::process_more_input
Unexecuted instantiation: <rustls::conn::ConnectionCore<rustls::server::server_conn::ServerConnectionData>>::process_more_input
1088
1089
0
    fn handle_deframe_error(&mut self, error: Error, state: Option<&dyn State<Data>>) -> Error {
1090
0
        match error {
1091
0
            error @ Error::InvalidMessage(_) => {
1092
0
                if self.common_state.is_quic() {
1093
0
                    self.common_state.quic.alert = Some(AlertDescription::DecodeError);
1094
0
                    error
1095
                } else {
1096
0
                    self.common_state
1097
0
                        .send_fatal_alert(AlertDescription::DecodeError, error)
1098
                }
1099
            }
1100
0
            Error::PeerSentOversizedRecord => self
1101
0
                .common_state
1102
0
                .send_fatal_alert(AlertDescription::RecordOverflow, error),
1103
            Error::DecryptError => {
1104
0
                if let Some(state) = state {
1105
0
                    state.handle_decrypt_error();
1106
0
                }
1107
0
                self.common_state
1108
0
                    .send_fatal_alert(AlertDescription::BadRecordMac, error)
1109
            }
1110
1111
0
            error => error,
1112
        }
1113
0
    }
Unexecuted instantiation: <rustls::conn::ConnectionCore<rustls::client::client_conn::ClientConnectionData>>::handle_deframe_error
Unexecuted instantiation: <rustls::conn::ConnectionCore<rustls::server::server_conn::ServerConnectionData>>::handle_deframe_error
Unexecuted instantiation: <rustls::conn::ConnectionCore<rustls::client::client_conn::ClientConnectionData>>::handle_deframe_error
Unexecuted instantiation: <rustls::conn::ConnectionCore<rustls::server::server_conn::ServerConnectionData>>::handle_deframe_error
1114
1115
0
    fn process_msg(
1116
0
        &mut self,
1117
0
        msg: InboundPlainMessage<'_>,
1118
0
        state: Box<dyn State<Data>>,
1119
0
        sendable_plaintext: Option<&mut ChunkVecBuffer>,
1120
0
    ) -> Result<Box<dyn State<Data>>, Error> {
1121
0
        // Drop CCS messages during handshake in TLS1.3
1122
0
        if msg.typ == ContentType::ChangeCipherSpec
1123
0
            && !self
1124
0
                .common_state
1125
0
                .may_receive_application_data
1126
0
            && self.common_state.is_tls13()
1127
        {
1128
0
            if !msg.is_valid_ccs() {
1129
                // "An implementation which receives any other change_cipher_spec value or
1130
                //  which receives a protected change_cipher_spec record MUST abort the
1131
                //  handshake with an "unexpected_message" alert."
1132
0
                return Err(self.common_state.send_fatal_alert(
1133
0
                    AlertDescription::UnexpectedMessage,
1134
0
                    PeerMisbehaved::IllegalMiddleboxChangeCipherSpec,
1135
0
                ));
1136
0
            }
1137
0
1138
0
            self.common_state
1139
0
                .received_tls13_change_cipher_spec()?;
1140
0
            trace!("Dropping CCS");
1141
0
            return Ok(state);
1142
0
        }
1143
1144
        // Now we can fully parse the message payload.
1145
0
        let msg = match Message::try_from(msg) {
1146
0
            Ok(msg) => msg,
1147
0
            Err(err) => {
1148
0
                return Err(self
1149
0
                    .common_state
1150
0
                    .send_fatal_alert(AlertDescription::from(err), err));
1151
            }
1152
        };
1153
1154
        // For alerts, we have separate logic.
1155
0
        if let MessagePayload::Alert(alert) = &msg.payload {
1156
0
            self.common_state.process_alert(alert)?;
1157
0
            return Ok(state);
1158
0
        }
1159
0
1160
0
        self.common_state
1161
0
            .process_main_protocol(msg, state, &mut self.data, sendable_plaintext)
1162
0
    }
Unexecuted instantiation: <rustls::conn::ConnectionCore<rustls::client::client_conn::ClientConnectionData>>::process_msg
Unexecuted instantiation: <rustls::conn::ConnectionCore<rustls::server::server_conn::ServerConnectionData>>::process_msg
Unexecuted instantiation: <rustls::conn::ConnectionCore<rustls::client::client_conn::ClientConnectionData>>::process_msg
Unexecuted instantiation: <rustls::conn::ConnectionCore<rustls::server::server_conn::ServerConnectionData>>::process_msg
1163
1164
0
    pub(crate) fn dangerous_extract_secrets(self) -> Result<ExtractedSecrets, Error> {
1165
0
        Ok(self
1166
0
            .dangerous_into_kernel_connection()?
1167
            .0)
1168
0
    }
Unexecuted instantiation: <rustls::conn::ConnectionCore<rustls::client::client_conn::ClientConnectionData>>::dangerous_extract_secrets
Unexecuted instantiation: <rustls::conn::ConnectionCore<rustls::server::server_conn::ServerConnectionData>>::dangerous_extract_secrets
Unexecuted instantiation: <rustls::conn::ConnectionCore<rustls::client::client_conn::ClientConnectionData>>::dangerous_extract_secrets
Unexecuted instantiation: <rustls::conn::ConnectionCore<rustls::server::server_conn::ServerConnectionData>>::dangerous_extract_secrets
1169
1170
0
    pub(crate) fn dangerous_into_kernel_connection(
1171
0
        self,
1172
0
    ) -> Result<(ExtractedSecrets, KernelConnection<Data>), Error> {
1173
0
        if !self
1174
0
            .common_state
1175
0
            .enable_secret_extraction
1176
        {
1177
0
            return Err(Error::General("Secret extraction is disabled".into()));
1178
0
        }
1179
0
1180
0
        if self.common_state.is_handshaking() {
1181
0
            return Err(Error::HandshakeNotComplete);
1182
0
        }
1183
0
1184
0
        if !self
1185
0
            .common_state
1186
0
            .sendable_tls
1187
0
            .is_empty()
1188
        {
1189
0
            return Err(Error::General(
1190
0
                "cannot convert into an KernelConnection while there are still buffered TLS records to send"
1191
0
                    .into()
1192
0
            ));
1193
0
        }
1194
1195
0
        let state = self.state?;
1196
1197
0
        let record_layer = &self.common_state.record_layer;
1198
0
        let secrets = state.extract_secrets()?;
1199
0
        let secrets = ExtractedSecrets {
1200
0
            tx: (record_layer.write_seq(), secrets.tx),
1201
0
            rx: (record_layer.read_seq(), secrets.rx),
1202
0
        };
1203
1204
0
        let state = state.into_external_state()?;
1205
0
        let external = KernelConnection::new(state, self.common_state)?;
1206
1207
0
        Ok((secrets, external))
1208
0
    }
Unexecuted instantiation: <rustls::conn::ConnectionCore<rustls::client::client_conn::ClientConnectionData>>::dangerous_into_kernel_connection
Unexecuted instantiation: <rustls::conn::ConnectionCore<rustls::server::server_conn::ServerConnectionData>>::dangerous_into_kernel_connection
Unexecuted instantiation: <rustls::conn::ConnectionCore<rustls::client::client_conn::ClientConnectionData>>::dangerous_into_kernel_connection
Unexecuted instantiation: <rustls::conn::ConnectionCore<rustls::server::server_conn::ServerConnectionData>>::dangerous_into_kernel_connection
1209
1210
0
    pub(crate) fn export_keying_material<T: AsMut<[u8]>>(
1211
0
        &self,
1212
0
        mut output: T,
1213
0
        label: &[u8],
1214
0
        context: Option<&[u8]>,
1215
0
    ) -> Result<T, Error> {
1216
0
        if output.as_mut().is_empty() {
1217
0
            return Err(Error::General(
1218
0
                "export_keying_material with zero-length output".into(),
1219
0
            ));
1220
0
        }
1221
0
1222
0
        match self.state.as_ref() {
1223
0
            Ok(st) => st
1224
0
                .export_keying_material(output.as_mut(), label, context)
1225
0
                .map(|_| output),
Unexecuted instantiation: <rustls::conn::ConnectionCore<_>>::export_keying_material::<_>::{closure#0}
Unexecuted instantiation: <rustls::conn::ConnectionCore<_>>::export_keying_material::<_>::{closure#0}
1226
0
            Err(e) => Err(e.clone()),
1227
        }
1228
0
    }
Unexecuted instantiation: <rustls::conn::ConnectionCore<_>>::export_keying_material::<_>
Unexecuted instantiation: <rustls::conn::ConnectionCore<_>>::export_keying_material::<_>
1229
1230
    /// Trigger a `refresh_traffic_keys` if required by `CommonState`.
1231
0
    fn maybe_refresh_traffic_keys(&mut self) {
1232
0
        if mem::take(
1233
0
            &mut self
1234
0
                .common_state
1235
0
                .refresh_traffic_keys_pending,
1236
0
        ) {
1237
0
            let _ = self.refresh_traffic_keys();
1238
0
        }
1239
0
    }
Unexecuted instantiation: <rustls::conn::ConnectionCore<_>>::maybe_refresh_traffic_keys
Unexecuted instantiation: <rustls::conn::ConnectionCore<_>>::maybe_refresh_traffic_keys
1240
1241
0
    fn refresh_traffic_keys(&mut self) -> Result<(), Error> {
1242
0
        match &mut self.state {
1243
0
            Ok(st) => st.send_key_update_request(&mut self.common_state),
1244
0
            Err(e) => Err(e.clone()),
1245
        }
1246
0
    }
Unexecuted instantiation: <rustls::conn::ConnectionCore<_>>::refresh_traffic_keys
Unexecuted instantiation: <rustls::conn::ConnectionCore<_>>::refresh_traffic_keys
1247
}
1248
1249
/// Data specific to the peer's side (client or server).
1250
pub trait SideData: Debug {}
1251
1252
/// An InboundPlainMessage which does not borrow its payload, but
1253
/// references a range that can later be borrowed.
1254
struct InboundUnborrowedMessage {
1255
    typ: ContentType,
1256
    version: ProtocolVersion,
1257
    bounds: Range<usize>,
1258
}
1259
1260
impl InboundUnborrowedMessage {
1261
0
    fn unborrow(locator: &Locator, msg: InboundPlainMessage<'_>) -> Self {
1262
0
        Self {
1263
0
            typ: msg.typ,
1264
0
            version: msg.version,
1265
0
            bounds: locator.locate(msg.payload),
1266
0
        }
1267
0
    }
Unexecuted instantiation: <rustls::conn::InboundUnborrowedMessage>::unborrow
Unexecuted instantiation: <rustls::conn::InboundUnborrowedMessage>::unborrow
1268
1269
0
    fn reborrow<'b>(self, delocator: &Delocator<'b>) -> InboundPlainMessage<'b> {
1270
0
        InboundPlainMessage {
1271
0
            typ: self.typ,
1272
0
            version: self.version,
1273
0
            payload: delocator.slice_from_range(&self.bounds),
1274
0
        }
1275
0
    }
Unexecuted instantiation: <rustls::conn::InboundUnborrowedMessage>::reborrow
Unexecuted instantiation: <rustls::conn::InboundUnborrowedMessage>::reborrow
1276
}
1277
1278
/// cf. BoringSSL's `kMaxEmptyRecords`
1279
/// <https://github.com/google/boringssl/blob/dec5989b793c56ad4dd32173bd2d8595ca78b398/ssl/tls_record.cc#L124-L128>
1280
const ALLOWED_CONSECUTIVE_EMPTY_FRAGMENTS_MAX: u8 = 32;