Coverage Report

Created: 2025-08-28 07:07

/src/openssl33/ssl/quic/quic_rx_depack.c
Line
Count
Source (jump to first uncovered line)
1
/*
2
 * Copyright 2022-2024 The OpenSSL Project Authors. All Rights Reserved.
3
 *
4
 * Licensed under the Apache License 2.0 (the "License").  You may not use
5
 * this file except in compliance with the License.  You can obtain a copy
6
 * in the file LICENSE in the source distribution or at
7
 * https://www.openssl.org/source/license.html
8
 */
9
10
#include "internal/packet_quic.h"
11
#include "internal/nelem.h"
12
#include "internal/quic_wire.h"
13
#include "internal/quic_record_rx.h"
14
#include "internal/quic_ackm.h"
15
#include "internal/quic_rx_depack.h"
16
#include "internal/quic_error.h"
17
#include "internal/quic_fc.h"
18
#include "internal/quic_channel.h"
19
#include "internal/sockets.h"
20
21
#include "quic_local.h"
22
#include "quic_channel_local.h"
23
#include "../ssl_local.h"
24
25
/*
26
 * Helper functions to process different frame types.
27
 *
28
 * Typically, those that are ACK eliciting will take an OSSL_ACKM_RX_PKT
29
 * pointer argument, the few that aren't ACK eliciting will not.  This makes
30
 * them a verifiable pattern against tables where this is specified.
31
 */
32
static int depack_do_implicit_stream_create(QUIC_CHANNEL *ch,
33
                                            uint64_t stream_id,
34
                                            uint64_t frame_type,
35
                                            QUIC_STREAM **result);
36
37
static int depack_do_frame_padding(PACKET *pkt)
38
349k
{
39
    /* We ignore this frame */
40
349k
    ossl_quic_wire_decode_padding(pkt);
41
349k
    return 1;
42
349k
}
43
44
static int depack_do_frame_ping(PACKET *pkt, QUIC_CHANNEL *ch,
45
                                uint32_t enc_level,
46
                                OSSL_ACKM_RX_PKT *ackm_data)
47
1.88M
{
48
    /* We ignore this frame, apart from eliciting an ACK */
49
1.88M
    if (!ossl_quic_wire_decode_frame_ping(pkt)) {
50
0
        ossl_quic_channel_raise_protocol_error(ch,
51
0
                                               OSSL_QUIC_ERR_FRAME_ENCODING_ERROR,
52
0
                                               OSSL_QUIC_FRAME_TYPE_PING,
53
0
                                               "decode error");
54
0
        return 0;
55
0
    }
56
57
1.88M
    ossl_quic_tx_packetiser_schedule_ack_eliciting(ch->txp, enc_level);
58
1.88M
    return 1;
59
1.88M
}
60
61
static int depack_do_frame_ack(PACKET *pkt, QUIC_CHANNEL *ch,
62
                               int packet_space, OSSL_TIME received,
63
                               uint64_t frame_type,
64
                               OSSL_QRX_PKT *qpacket)
65
187k
{
66
187k
    OSSL_QUIC_FRAME_ACK ack;
67
187k
    OSSL_QUIC_ACK_RANGE *p;
68
187k
    uint64_t total_ranges = 0;
69
187k
    uint32_t ack_delay_exp = ch->rx_ack_delay_exp;
70
71
187k
    if (!ossl_quic_wire_peek_frame_ack_num_ranges(pkt, &total_ranges)
72
        /* In case sizeof(uint64_t) > sizeof(size_t) */
73
187k
        || total_ranges > SIZE_MAX / sizeof(OSSL_QUIC_ACK_RANGE))
74
885
        goto malformed;
75
76
186k
    if (ch->num_ack_range_scratch < (size_t)total_ranges) {
77
37.2k
        if ((p = OPENSSL_realloc(ch->ack_range_scratch,
78
37.2k
                                 sizeof(OSSL_QUIC_ACK_RANGE)
79
37.2k
                                 * (size_t)total_ranges)) == NULL)
80
0
            goto malformed;
81
82
37.2k
        ch->ack_range_scratch       = p;
83
37.2k
        ch->num_ack_range_scratch   = (size_t)total_ranges;
84
37.2k
    }
85
86
186k
    ack.ack_ranges = ch->ack_range_scratch;
87
186k
    ack.num_ack_ranges = (size_t)total_ranges;
88
89
186k
    if (!ossl_quic_wire_decode_frame_ack(pkt, ack_delay_exp, &ack, NULL))
90
1.24k
        goto malformed;
91
92
185k
    if (qpacket->hdr->type == QUIC_PKT_TYPE_1RTT
93
185k
        && (qpacket->key_epoch < ossl_qrx_get_key_epoch(ch->qrx)
94
37.9k
            || ch->rxku_expected)
95
185k
        && ack.ack_ranges[0].end >= ch->txku_pn) {
96
        /*
97
         * RFC 9001 s. 6.2: An endpoint that receives an acknowledgment that is
98
         * carried in a packet protected with old keys where any acknowledged
99
         * packet was protected with newer keys MAY treat that as a connection
100
         * error of type KEY_UPDATE_ERROR.
101
         *
102
         * Two cases to handle here:
103
         *
104
         *   - We did spontaneous TXKU, the peer has responded in kind and we
105
         *     have detected RXKU; !ch->rxku_expected, but then it sent a packet
106
         *     with old keys acknowledging a packet in the new key epoch.
107
         *
108
         *     This also covers the case where we got RXKU and triggered
109
         *     solicited TXKU, and then for some reason the peer sent an ACK of
110
         *     a PN in our new TX key epoch with old keys.
111
         *
112
         *   - We did spontaneous TXKU; ch->txku_pn is the starting PN of our
113
         *     new TX key epoch; the peer has not initiated a solicited TXKU in
114
         *     response (so we have not detected RXKU); in this case the RX key
115
         *     epoch has not incremented and ch->rxku_expected is still 1.
116
         */
117
54
        ossl_quic_channel_raise_protocol_error(ch,
118
54
                                               OSSL_QUIC_ERR_KEY_UPDATE_ERROR,
119
54
                                               frame_type,
120
54
                                               "acked packet which initiated a "
121
54
                                               "key update without a "
122
54
                                               "corresponding key update");
123
54
        return 0;
124
54
    }
125
126
185k
    if (!ossl_ackm_on_rx_ack_frame(ch->ackm, &ack,
127
185k
                                   packet_space, received))
128
0
        goto malformed;
129
130
185k
    ++ch->diag_num_rx_ack;
131
185k
    return 1;
132
133
2.12k
malformed:
134
2.12k
    ossl_quic_channel_raise_protocol_error(ch,
135
2.12k
                                           OSSL_QUIC_ERR_FRAME_ENCODING_ERROR,
136
2.12k
                                           frame_type,
137
2.12k
                                           "decode error");
138
2.12k
    return 0;
139
185k
}
140
141
static int depack_do_frame_reset_stream(PACKET *pkt,
142
                                        QUIC_CHANNEL *ch,
143
                                        OSSL_ACKM_RX_PKT *ackm_data)
144
4.21k
{
145
4.21k
    OSSL_QUIC_FRAME_RESET_STREAM frame_data;
146
4.21k
    QUIC_STREAM *stream = NULL;
147
4.21k
    uint64_t fce;
148
149
4.21k
    if (!ossl_quic_wire_decode_frame_reset_stream(pkt, &frame_data)) {
150
69
        ossl_quic_channel_raise_protocol_error(ch,
151
69
                                               OSSL_QUIC_ERR_FRAME_ENCODING_ERROR,
152
69
                                               OSSL_QUIC_FRAME_TYPE_RESET_STREAM,
153
69
                                               "decode error");
154
69
        return 0;
155
69
    }
156
157
4.14k
    if (!depack_do_implicit_stream_create(ch, frame_data.stream_id,
158
4.14k
                                          OSSL_QUIC_FRAME_TYPE_RESET_STREAM,
159
4.14k
                                          &stream))
160
195
        return 0; /* error already raised for us */
161
162
3.95k
    if (stream == NULL)
163
0
        return 1; /* old deleted stream, not a protocol violation, ignore */
164
165
3.95k
    if (!ossl_quic_stream_has_recv(stream)) {
166
0
        ossl_quic_channel_raise_protocol_error(ch,
167
0
                                               OSSL_QUIC_ERR_STREAM_STATE_ERROR,
168
0
                                               OSSL_QUIC_FRAME_TYPE_RESET_STREAM,
169
0
                                               "RESET_STREAM frame for "
170
0
                                               "TX only stream");
171
0
        return 0;
172
0
    }
173
174
    /*
175
     * The final size field of the RESET_STREAM frame must be used to determine
176
     * how much flow control credit the aborted stream was considered to have
177
     * consumed.
178
     *
179
     * We also need to ensure that if we already have a final size for the
180
     * stream, the RESET_STREAM frame's Final Size field matches this; we SHOULD
181
     * terminate the connection otherwise (RFC 9000 s. 4.5). The RXFC takes care
182
     * of this for us.
183
     */
184
3.95k
    if (!ossl_quic_rxfc_on_rx_stream_frame(&stream->rxfc,
185
3.95k
                                           frame_data.final_size, /*is_fin=*/1)) {
186
0
        ossl_quic_channel_raise_protocol_error(ch,
187
0
                                               OSSL_QUIC_ERR_INTERNAL_ERROR,
188
0
                                               OSSL_QUIC_FRAME_TYPE_RESET_STREAM,
189
0
                                               "internal error (flow control)");
190
0
        return 0;
191
0
    }
192
193
    /* Has a flow control error occurred? */
194
3.95k
    fce = ossl_quic_rxfc_get_error(&stream->rxfc, 0);
195
3.95k
    if (fce != OSSL_QUIC_ERR_NO_ERROR) {
196
142
        ossl_quic_channel_raise_protocol_error(ch,
197
142
                                               fce,
198
142
                                               OSSL_QUIC_FRAME_TYPE_RESET_STREAM,
199
142
                                               "flow control violation");
200
142
        return 0;
201
142
    }
202
203
    /*
204
     * Depending on the receive part state this is handled either as a reset
205
     * transition or a no-op (e.g. if a reset has already been received before,
206
     * or the application already retired a FIN). Best effort - there are no
207
     * protocol error conditions we need to check for here.
208
     */
209
3.81k
    ossl_quic_stream_map_notify_reset_recv_part(&ch->qsm, stream,
210
3.81k
                                                frame_data.app_error_code,
211
3.81k
                                                frame_data.final_size);
212
213
3.81k
    ossl_quic_stream_map_update_state(&ch->qsm, stream);
214
3.81k
    return 1;
215
3.95k
}
216
217
static int depack_do_frame_stop_sending(PACKET *pkt,
218
                                        QUIC_CHANNEL *ch,
219
                                        OSSL_ACKM_RX_PKT *ackm_data)
220
58.0k
{
221
58.0k
    OSSL_QUIC_FRAME_STOP_SENDING frame_data;
222
58.0k
    QUIC_STREAM *stream = NULL;
223
224
58.0k
    if (!ossl_quic_wire_decode_frame_stop_sending(pkt, &frame_data)) {
225
48
        ossl_quic_channel_raise_protocol_error(ch,
226
48
                                               OSSL_QUIC_ERR_FRAME_ENCODING_ERROR,
227
48
                                               OSSL_QUIC_FRAME_TYPE_STOP_SENDING,
228
48
                                               "decode error");
229
48
        return 0;
230
48
    }
231
232
57.9k
    if (!depack_do_implicit_stream_create(ch, frame_data.stream_id,
233
57.9k
                                          OSSL_QUIC_FRAME_TYPE_STOP_SENDING,
234
57.9k
                                          &stream))
235
190
        return 0; /* error already raised for us */
236
237
57.7k
    if (stream == NULL)
238
0
        return 1; /* old deleted stream, not a protocol violation, ignore */
239
240
57.7k
    if (!ossl_quic_stream_has_send(stream)) {
241
26
        ossl_quic_channel_raise_protocol_error(ch,
242
26
                                               OSSL_QUIC_ERR_STREAM_STATE_ERROR,
243
26
                                               OSSL_QUIC_FRAME_TYPE_STOP_SENDING,
244
26
                                               "STOP_SENDING frame for "
245
26
                                               "RX only stream");
246
26
        return 0;
247
26
    }
248
249
57.7k
    stream->peer_stop_sending       = 1;
250
57.7k
    stream->peer_stop_sending_aec   = frame_data.app_error_code;
251
252
    /*
253
     * RFC 9000 s. 3.5: Receiving a STOP_SENDING frame means we must respond in
254
     * turn with a RESET_STREAM frame for the same part of the stream. The other
255
     * part is unaffected.
256
     */
257
57.7k
    ossl_quic_stream_map_reset_stream_send_part(&ch->qsm, stream,
258
57.7k
                                                frame_data.app_error_code);
259
57.7k
    return 1;
260
57.7k
}
261
262
static int depack_do_frame_crypto(PACKET *pkt, QUIC_CHANNEL *ch,
263
                                  OSSL_QRX_PKT *parent_pkt,
264
                                  OSSL_ACKM_RX_PKT *ackm_data,
265
                                  uint64_t *datalen)
266
271k
{
267
271k
    OSSL_QUIC_FRAME_CRYPTO f;
268
271k
    QUIC_RSTREAM *rstream;
269
271k
    QUIC_RXFC *rxfc;
270
271
271k
    *datalen = 0;
272
273
271k
    if (!ossl_quic_wire_decode_frame_crypto(pkt, 0, &f)) {
274
791
        ossl_quic_channel_raise_protocol_error(ch,
275
791
                                               OSSL_QUIC_ERR_FRAME_ENCODING_ERROR,
276
791
                                               OSSL_QUIC_FRAME_TYPE_CRYPTO,
277
791
                                               "decode error");
278
791
        return 0;
279
791
    }
280
281
271k
    if (f.len == 0)
282
61.0k
        return 1; /* nothing to do */
283
284
210k
    rstream = ch->crypto_recv[ackm_data->pkt_space];
285
210k
    if (!ossl_assert(rstream != NULL))
286
        /*
287
         * This should not happen; we should only have a NULL stream here if
288
         * the EL has been discarded, and if the EL has been discarded we
289
         * shouldn't be here.
290
         */
291
0
        return 0;
292
293
210k
    rxfc = &ch->crypto_rxfc[ackm_data->pkt_space];
294
295
210k
    if (!ossl_quic_rxfc_on_rx_stream_frame(rxfc, f.offset + f.len,
296
210k
                                           /*is_fin=*/0)) {
297
0
        ossl_quic_channel_raise_protocol_error(ch,
298
0
                                               OSSL_QUIC_ERR_INTERNAL_ERROR,
299
0
                                               OSSL_QUIC_FRAME_TYPE_CRYPTO,
300
0
                                               "internal error (crypto RXFC)");
301
0
        return 0;
302
0
    }
303
304
210k
    if (ossl_quic_rxfc_get_error(rxfc, 0) != OSSL_QUIC_ERR_NO_ERROR) {
305
274
        ossl_quic_channel_raise_protocol_error(ch, OSSL_QUIC_ERR_CRYPTO_BUFFER_EXCEEDED,
306
274
                                               OSSL_QUIC_FRAME_TYPE_CRYPTO,
307
274
                                               "exceeded maximum crypto buffer");
308
274
        return 0;
309
274
    }
310
311
209k
    if (!ossl_quic_rstream_queue_data(rstream, parent_pkt,
312
209k
                                      f.offset, f.data, f.len, 0)) {
313
0
        ossl_quic_channel_raise_protocol_error(ch,
314
0
                                               OSSL_QUIC_ERR_INTERNAL_ERROR,
315
0
                                               OSSL_QUIC_FRAME_TYPE_CRYPTO,
316
0
                                               "internal error (rstream queue)");
317
0
        return 0;
318
0
    }
319
320
209k
    ch->did_crypto_frame = 1;
321
209k
    *datalen = f.len;
322
323
209k
    return 1;
324
209k
}
325
326
static int depack_do_frame_new_token(PACKET *pkt, QUIC_CHANNEL *ch,
327
                                     OSSL_ACKM_RX_PKT *ackm_data)
328
2.20k
{
329
2.20k
    const uint8_t *token;
330
2.20k
    size_t token_len;
331
332
2.20k
    if (!ossl_quic_wire_decode_frame_new_token(pkt, &token, &token_len)) {
333
167
        ossl_quic_channel_raise_protocol_error(ch,
334
167
                                               OSSL_QUIC_ERR_FRAME_ENCODING_ERROR,
335
167
                                               OSSL_QUIC_FRAME_TYPE_NEW_TOKEN,
336
167
                                               "decode error");
337
167
        return 0;
338
167
    }
339
340
2.03k
    if (token_len == 0) {
341
        /*
342
         * RFC 9000 s. 19.7: "A client MUST treat receipt of a NEW_TOKEN frame
343
         * with an empty Token field as a connection error of type
344
         * FRAME_ENCODING_ERROR."
345
         */
346
10
        ossl_quic_channel_raise_protocol_error(ch,
347
10
                                               OSSL_QUIC_ERR_FRAME_ENCODING_ERROR,
348
10
                                               OSSL_QUIC_FRAME_TYPE_NEW_TOKEN,
349
10
                                               "zero-length NEW_TOKEN");
350
10
        return 0;
351
10
    }
352
353
    /* TODO(QUIC FUTURE): ADD CODE to send |token| to the session manager */
354
355
2.02k
    return 1;
356
2.03k
}
357
358
/*
359
 * Returns 1 if no protocol violation has occurred. In this case *result will be
360
 * non-NULL unless this is an old deleted stream and we should ignore the frame
361
 * causing this function to be called. Returns 0 on protocol violation.
362
 */
363
static int depack_do_implicit_stream_create(QUIC_CHANNEL *ch,
364
                                            uint64_t stream_id,
365
                                            uint64_t frame_type,
366
                                            QUIC_STREAM **result)
367
112k
{
368
112k
    QUIC_STREAM *stream;
369
112k
    uint64_t peer_role, stream_ordinal;
370
112k
    uint64_t *p_next_ordinal_local, *p_next_ordinal_remote;
371
112k
    QUIC_RXFC *max_streams_fc;
372
112k
    int is_uni, is_remote_init;
373
374
112k
    stream = ossl_quic_stream_map_get_by_id(&ch->qsm, stream_id);
375
112k
    if (stream != NULL) {
376
97.0k
        *result = stream;
377
97.0k
        return 1;
378
97.0k
    }
379
380
    /*
381
     * If we do not yet have a stream with the given ID, there are three
382
     * possibilities:
383
     *
384
     *   (a) The stream ID is for a remotely-created stream and the peer
385
     *       is creating a stream.
386
     *
387
     *   (b) The stream ID is for a locally-created stream which has
388
     *       previously been deleted.
389
     *
390
     *   (c) The stream ID is for a locally-created stream which does
391
     *       not exist yet. This is a protocol violation and we must
392
     *       terminate the connection in this case.
393
     *
394
     * We distinguish between (b) and (c) using the stream ID allocator
395
     * variable. Since stream ordinals are allocated monotonically, we
396
     * simply determine if the stream ordinal is in the future.
397
     */
398
15.3k
    peer_role = ch->is_server
399
15.3k
        ? QUIC_STREAM_INITIATOR_CLIENT
400
15.3k
        : QUIC_STREAM_INITIATOR_SERVER;
401
402
15.3k
    is_remote_init = ((stream_id & QUIC_STREAM_INITIATOR_MASK) == peer_role);
403
15.3k
    is_uni = ((stream_id & QUIC_STREAM_DIR_MASK) == QUIC_STREAM_DIR_UNI);
404
405
15.3k
    stream_ordinal = stream_id >> 2;
406
407
15.3k
    if (is_remote_init) {
408
        /*
409
         * Peer-created stream which does not yet exist. Create it. QUIC stream
410
         * ordinals within a given stream type MUST be used in sequence and
411
         * receiving a STREAM frame for ordinal n must implicitly create streams
412
         * with ordinals [0, n) within that stream type even if no explicit
413
         * STREAM frames are received for those ordinals.
414
         */
415
14.5k
        p_next_ordinal_remote = is_uni
416
14.5k
            ? &ch->next_remote_stream_ordinal_uni
417
14.5k
            : &ch->next_remote_stream_ordinal_bidi;
418
419
        /* Check this isn't violating stream count flow control. */
420
14.5k
        max_streams_fc = is_uni
421
14.5k
            ? &ch->max_streams_uni_rxfc
422
14.5k
            : &ch->max_streams_bidi_rxfc;
423
424
14.5k
        if (!ossl_quic_rxfc_on_rx_stream_frame(max_streams_fc,
425
14.5k
                                               stream_ordinal + 1,
426
14.5k
                                               /*is_fin=*/0)) {
427
0
            ossl_quic_channel_raise_protocol_error(ch,
428
0
                                                   OSSL_QUIC_ERR_INTERNAL_ERROR,
429
0
                                                   frame_type,
430
0
                                                   "internal error (stream count RXFC)");
431
0
            return 0;
432
0
        }
433
434
14.5k
        if (ossl_quic_rxfc_get_error(max_streams_fc, 0) != OSSL_QUIC_ERR_NO_ERROR) {
435
94
            ossl_quic_channel_raise_protocol_error(ch, OSSL_QUIC_ERR_STREAM_LIMIT_ERROR,
436
94
                                                   frame_type,
437
94
                                                   "exceeded maximum allowed streams");
438
94
            return 0;
439
94
        }
440
441
        /*
442
         * Create the named stream and any streams coming before it yet to be
443
         * created.
444
         */
445
110k
        while (*p_next_ordinal_remote <= stream_ordinal) {
446
95.6k
            uint64_t cur_stream_id = (*p_next_ordinal_remote << 2) |
447
95.6k
                (stream_id
448
95.6k
                 & (QUIC_STREAM_DIR_MASK | QUIC_STREAM_INITIATOR_MASK));
449
450
95.6k
            stream = ossl_quic_channel_new_stream_remote(ch, cur_stream_id);
451
95.6k
            if (stream == NULL) {
452
0
                ossl_quic_channel_raise_protocol_error(ch,
453
0
                                                       OSSL_QUIC_ERR_INTERNAL_ERROR,
454
0
                                                       frame_type,
455
0
                                                       "internal error (stream allocation)");
456
0
                return 0;
457
0
            }
458
459
95.6k
            ++*p_next_ordinal_remote;
460
95.6k
        }
461
462
14.4k
        *result = stream;
463
14.4k
    } else {
464
        /* Locally-created stream which does not yet exist. */
465
836
        p_next_ordinal_local = is_uni
466
836
            ? &ch->next_local_stream_ordinal_uni
467
836
            : &ch->next_local_stream_ordinal_bidi;
468
469
836
        if (stream_ordinal >= *p_next_ordinal_local) {
470
            /*
471
             * We never created this stream yet, this is a protocol
472
             * violation.
473
             */
474
836
            ossl_quic_channel_raise_protocol_error(ch,
475
836
                                                   OSSL_QUIC_ERR_STREAM_STATE_ERROR,
476
836
                                                   frame_type,
477
836
                                                   "STREAM frame for nonexistent "
478
836
                                                   "stream");
479
836
            return 0;
480
836
        }
481
482
        /*
483
         * Otherwise this is for an old locally-initiated stream which we
484
         * have subsequently deleted. Ignore the data; it may simply be a
485
         * retransmission. We already take care of notifying the peer of the
486
         * termination of the stream during the stream deletion lifecycle.
487
         */
488
0
        *result = NULL;
489
0
    }
490
491
14.4k
    return 1;
492
15.3k
}
493
494
static int depack_do_frame_stream(PACKET *pkt, QUIC_CHANNEL *ch,
495
                                  OSSL_QRX_PKT *parent_pkt,
496
                                  OSSL_ACKM_RX_PKT *ackm_data,
497
                                  uint64_t frame_type,
498
                                  uint64_t *datalen)
499
35.6k
{
500
35.6k
    OSSL_QUIC_FRAME_STREAM frame_data;
501
35.6k
    QUIC_STREAM *stream;
502
35.6k
    uint64_t fce;
503
35.6k
    size_t rs_avail;
504
35.6k
    int rs_fin = 0;
505
506
35.6k
    *datalen = 0;
507
508
35.6k
    if (!ossl_quic_wire_decode_frame_stream(pkt, 0, &frame_data)) {
509
360
        ossl_quic_channel_raise_protocol_error(ch,
510
360
                                               OSSL_QUIC_ERR_FRAME_ENCODING_ERROR,
511
360
                                               frame_type,
512
360
                                               "decode error");
513
360
        return 0;
514
360
    }
515
516
35.2k
    if (!depack_do_implicit_stream_create(ch, frame_data.stream_id,
517
35.2k
                                          frame_type, &stream))
518
334
        return 0; /* protocol error raised by above call */
519
520
34.9k
    if (stream == NULL)
521
        /*
522
         * Data for old stream which is not a protocol violation but should be
523
         * ignored, so stop here.
524
         */
525
0
        return 1;
526
527
34.9k
    if (!ossl_quic_stream_has_recv(stream)) {
528
0
        ossl_quic_channel_raise_protocol_error(ch,
529
0
                                               OSSL_QUIC_ERR_STREAM_STATE_ERROR,
530
0
                                               frame_type,
531
0
                                               "STREAM frame for TX only "
532
0
                                               "stream");
533
0
        return 0;
534
0
    }
535
536
    /* Notify stream flow controller. */
537
34.9k
    if (!ossl_quic_rxfc_on_rx_stream_frame(&stream->rxfc,
538
34.9k
                                           frame_data.offset + frame_data.len,
539
34.9k
                                           frame_data.is_fin)) {
540
0
        ossl_quic_channel_raise_protocol_error(ch,
541
0
                                               OSSL_QUIC_ERR_INTERNAL_ERROR,
542
0
                                               frame_type,
543
0
                                               "internal error (flow control)");
544
0
        return 0;
545
0
    }
546
547
    /* Has a flow control error occurred? */
548
34.9k
    fce = ossl_quic_rxfc_get_error(&stream->rxfc, 0);
549
34.9k
    if (fce != OSSL_QUIC_ERR_NO_ERROR) {
550
273
        ossl_quic_channel_raise_protocol_error(ch,
551
273
                                               fce,
552
273
                                               frame_type,
553
273
                                               "flow control violation");
554
273
        return 0;
555
273
    }
556
557
34.6k
    switch (stream->recv_state) {
558
13.2k
    case QUIC_RSTREAM_STATE_RECV:
559
30.2k
    case QUIC_RSTREAM_STATE_SIZE_KNOWN:
560
        /*
561
         * It only makes sense to process incoming STREAM frames in these
562
         * states.
563
         */
564
30.2k
        break;
565
566
4.29k
    case QUIC_RSTREAM_STATE_DATA_RECVD:
567
4.39k
    case QUIC_RSTREAM_STATE_DATA_READ:
568
4.42k
    case QUIC_RSTREAM_STATE_RESET_RECVD:
569
4.42k
    case QUIC_RSTREAM_STATE_RESET_READ:
570
4.42k
    default:
571
        /*
572
         * We have no use for STREAM frames once the receive part reaches any of
573
         * these states, so just ignore.
574
         */
575
4.42k
        return 1;
576
34.6k
    }
577
578
    /* If we are in RECV, auto-transition to SIZE_KNOWN on FIN. */
579
30.2k
    if (frame_data.is_fin
580
30.2k
        && !ossl_quic_stream_recv_get_final_size(stream, NULL)) {
581
582
        /* State was already checked above, so can't fail. */
583
5.28k
        ossl_quic_stream_map_notify_size_known_recv_part(&ch->qsm, stream,
584
5.28k
                                                         frame_data.offset
585
5.28k
                                                         + frame_data.len);
586
5.28k
    }
587
588
    /*
589
     * If we requested STOP_SENDING do not bother buffering the data. Note that
590
     * this must happen after RXFC checks above as even if we sent STOP_SENDING
591
     * we must still enforce correct flow control (RFC 9000 s. 3.5).
592
     */
593
30.2k
    if (stream->stop_sending)
594
0
        return 1; /* not an error - packet reordering, etc. */
595
596
    /*
597
     * The receive stream buffer may or may not choose to consume the data
598
     * without copying by reffing the OSSL_QRX_PKT. In this case
599
     * ossl_qrx_pkt_release() will be eventually called when the data is no
600
     * longer needed.
601
     *
602
     * It is OK for the peer to send us a zero-length non-FIN STREAM frame,
603
     * which is a no-op, aside from the fact that it ensures the stream exists.
604
     * In this case we have nothing to report to the receive buffer.
605
     */
606
30.2k
    if ((frame_data.len > 0 || frame_data.is_fin)
607
30.2k
        && !ossl_quic_rstream_queue_data(stream->rstream, parent_pkt,
608
29.6k
                                      frame_data.offset,
609
29.6k
                                      frame_data.data,
610
29.6k
                                      frame_data.len,
611
29.6k
                                      frame_data.is_fin)) {
612
0
        ossl_quic_channel_raise_protocol_error(ch,
613
0
                                               OSSL_QUIC_ERR_INTERNAL_ERROR,
614
0
                                               frame_type,
615
0
                                               "internal error (rstream queue)");
616
0
        return 0;
617
0
    }
618
619
    /*
620
     * rs_fin will be 1 only if we can read all data up to and including the FIN
621
     * without any gaps before it; this implies we have received all data. Avoid
622
     * calling ossl_quic_rstream_available() where it is not necessary as it is
623
     * more expensive.
624
     */
625
30.2k
    if (stream->recv_state == QUIC_RSTREAM_STATE_SIZE_KNOWN
626
30.2k
        && !ossl_quic_rstream_available(stream->rstream, &rs_avail, &rs_fin)) {
627
0
        ossl_quic_channel_raise_protocol_error(ch,
628
0
                                               OSSL_QUIC_ERR_INTERNAL_ERROR,
629
0
                                               frame_type,
630
0
                                               "internal error (rstream available)");
631
0
        return 0;
632
0
    }
633
634
30.2k
    if (rs_fin)
635
2.32k
        ossl_quic_stream_map_notify_totally_received(&ch->qsm, stream);
636
637
30.2k
    *datalen = frame_data.len;
638
639
30.2k
    return 1;
640
30.2k
}
641
642
static void update_streams(QUIC_STREAM *s, void *arg)
643
356k
{
644
356k
    QUIC_CHANNEL *ch = arg;
645
646
356k
    ossl_quic_stream_map_update_state(&ch->qsm, s);
647
356k
}
648
649
static void update_streams_bidi(QUIC_STREAM *s, void *arg)
650
48.2k
{
651
48.2k
    QUIC_CHANNEL *ch = arg;
652
653
48.2k
    if (!ossl_quic_stream_is_bidi(s))
654
11.6k
        return;
655
656
36.6k
    ossl_quic_stream_map_update_state(&ch->qsm, s);
657
36.6k
}
658
659
static void update_streams_uni(QUIC_STREAM *s, void *arg)
660
388k
{
661
388k
    QUIC_CHANNEL *ch = arg;
662
663
388k
    if (ossl_quic_stream_is_bidi(s))
664
81.2k
        return;
665
666
307k
    ossl_quic_stream_map_update_state(&ch->qsm, s);
667
307k
}
668
669
static int depack_do_frame_max_data(PACKET *pkt, QUIC_CHANNEL *ch,
670
                                    OSSL_ACKM_RX_PKT *ackm_data)
671
72.1k
{
672
72.1k
    uint64_t max_data = 0;
673
674
72.1k
    if (!ossl_quic_wire_decode_frame_max_data(pkt, &max_data)) {
675
31
        ossl_quic_channel_raise_protocol_error(ch,
676
31
                                               OSSL_QUIC_ERR_FRAME_ENCODING_ERROR,
677
31
                                               OSSL_QUIC_FRAME_TYPE_MAX_DATA,
678
31
                                               "decode error");
679
31
        return 0;
680
31
    }
681
682
72.1k
    ossl_quic_txfc_bump_cwm(&ch->conn_txfc, max_data);
683
72.1k
    ossl_quic_stream_map_visit(&ch->qsm, update_streams, ch);
684
72.1k
    return 1;
685
72.1k
}
686
687
static int depack_do_frame_max_stream_data(PACKET *pkt,
688
                                           QUIC_CHANNEL *ch,
689
                                           OSSL_ACKM_RX_PKT *ackm_data)
690
10.4k
{
691
10.4k
    uint64_t stream_id = 0;
692
10.4k
    uint64_t max_stream_data = 0;
693
10.4k
    QUIC_STREAM *stream;
694
695
10.4k
    if (!ossl_quic_wire_decode_frame_max_stream_data(pkt, &stream_id,
696
10.4k
                                                     &max_stream_data)) {
697
38
        ossl_quic_channel_raise_protocol_error(ch,
698
38
                                               OSSL_QUIC_ERR_FRAME_ENCODING_ERROR,
699
38
                                               OSSL_QUIC_FRAME_TYPE_MAX_STREAM_DATA,
700
38
                                               "decode error");
701
38
        return 0;
702
38
    }
703
704
10.4k
    if (!depack_do_implicit_stream_create(ch, stream_id,
705
10.4k
                                          OSSL_QUIC_FRAME_TYPE_MAX_STREAM_DATA,
706
10.4k
                                          &stream))
707
134
        return 0; /* error already raised for us */
708
709
10.3k
    if (stream == NULL)
710
0
        return 1; /* old deleted stream, not a protocol violation, ignore */
711
712
10.3k
    if (!ossl_quic_stream_has_send(stream)) {
713
22
        ossl_quic_channel_raise_protocol_error(ch,
714
22
                                               OSSL_QUIC_ERR_STREAM_STATE_ERROR,
715
22
                                               OSSL_QUIC_FRAME_TYPE_MAX_STREAM_DATA,
716
22
                                               "MAX_STREAM_DATA for TX only "
717
22
                                               "stream");
718
22
        return 0;
719
22
    }
720
721
10.2k
    ossl_quic_txfc_bump_cwm(&stream->txfc, max_stream_data);
722
10.2k
    ossl_quic_stream_map_update_state(&ch->qsm, stream);
723
10.2k
    return 1;
724
10.3k
}
725
726
static int depack_do_frame_max_streams(PACKET *pkt,
727
                                       QUIC_CHANNEL *ch,
728
                                       OSSL_ACKM_RX_PKT *ackm_data,
729
                                       uint64_t frame_type)
730
41.7k
{
731
41.7k
    uint64_t max_streams = 0;
732
733
41.7k
    if (!ossl_quic_wire_decode_frame_max_streams(pkt, &max_streams)) {
734
31
        ossl_quic_channel_raise_protocol_error(ch,
735
31
                                               OSSL_QUIC_ERR_FRAME_ENCODING_ERROR,
736
31
                                               frame_type,
737
31
                                               "decode error");
738
31
        return 0;
739
31
    }
740
741
41.6k
    if (max_streams > (((uint64_t)1) << 60)) {
742
122
        ossl_quic_channel_raise_protocol_error(ch,
743
122
                                               OSSL_QUIC_ERR_FRAME_ENCODING_ERROR,
744
122
                                               frame_type,
745
122
                                               "invalid max streams value");
746
122
        return 0;
747
122
    }
748
749
41.5k
    switch (frame_type) {
750
17.9k
    case OSSL_QUIC_FRAME_TYPE_MAX_STREAMS_BIDI:
751
17.9k
        if (max_streams > ch->max_local_streams_bidi)
752
564
            ch->max_local_streams_bidi = max_streams;
753
754
        /* Some streams may now be able to send. */
755
17.9k
        ossl_quic_stream_map_visit(&ch->qsm, update_streams_bidi, ch);
756
17.9k
        break;
757
23.6k
    case OSSL_QUIC_FRAME_TYPE_MAX_STREAMS_UNI:
758
23.6k
        if (max_streams > ch->max_local_streams_uni)
759
910
            ch->max_local_streams_uni = max_streams;
760
761
        /* Some streams may now be able to send. */
762
23.6k
        ossl_quic_stream_map_visit(&ch->qsm, update_streams_uni, ch);
763
23.6k
        break;
764
0
    default:
765
0
        ossl_quic_channel_raise_protocol_error(ch,
766
0
                                               OSSL_QUIC_ERR_FRAME_ENCODING_ERROR,
767
0
                                               frame_type,
768
0
                                               "decode error");
769
0
        return 0;
770
41.5k
    }
771
772
41.5k
    return 1;
773
41.5k
}
774
775
static int depack_do_frame_data_blocked(PACKET *pkt,
776
                                        QUIC_CHANNEL *ch,
777
                                        OSSL_ACKM_RX_PKT *ackm_data)
778
19.8k
{
779
19.8k
    uint64_t max_data = 0;
780
781
19.8k
    if (!ossl_quic_wire_decode_frame_data_blocked(pkt, &max_data)) {
782
20
        ossl_quic_channel_raise_protocol_error(ch,
783
20
                                               OSSL_QUIC_ERR_FRAME_ENCODING_ERROR,
784
20
                                               OSSL_QUIC_FRAME_TYPE_DATA_BLOCKED,
785
20
                                               "decode error");
786
20
        return 0;
787
20
    }
788
789
    /* No-op - informative/debugging frame. */
790
19.8k
    return 1;
791
19.8k
}
792
793
static int depack_do_frame_stream_data_blocked(PACKET *pkt,
794
                                               QUIC_CHANNEL *ch,
795
                                               OSSL_ACKM_RX_PKT *ackm_data)
796
4.56k
{
797
4.56k
    uint64_t stream_id = 0;
798
4.56k
    uint64_t max_data = 0;
799
4.56k
    QUIC_STREAM *stream;
800
801
4.56k
    if (!ossl_quic_wire_decode_frame_stream_data_blocked(pkt, &stream_id,
802
4.56k
                                                         &max_data)) {
803
49
        ossl_quic_channel_raise_protocol_error(ch,
804
49
                                               OSSL_QUIC_ERR_FRAME_ENCODING_ERROR,
805
49
                                               OSSL_QUIC_FRAME_TYPE_STREAM_DATA_BLOCKED,
806
49
                                               "decode error");
807
49
        return 0;
808
49
    }
809
810
    /*
811
     * This is an informative/debugging frame, so we don't have to do anything,
812
     * but it does trigger stream creation.
813
     */
814
4.51k
    if (!depack_do_implicit_stream_create(ch, stream_id,
815
4.51k
                                          OSSL_QUIC_FRAME_TYPE_STREAM_DATA_BLOCKED,
816
4.51k
                                          &stream))
817
77
        return 0; /* error already raised for us */
818
819
4.44k
    if (stream == NULL)
820
0
        return 1; /* old deleted stream, not a protocol violation, ignore */
821
822
4.44k
    if (!ossl_quic_stream_has_recv(stream)) {
823
        /*
824
         * RFC 9000 s. 19.14: "An endpoint that receives a STREAM_DATA_BLOCKED
825
         * frame for a send-only stream MUST terminate the connection with error
826
         * STREAM_STATE_ERROR."
827
         */
828
0
        ossl_quic_channel_raise_protocol_error(ch,
829
0
                                               OSSL_QUIC_ERR_STREAM_STATE_ERROR,
830
0
                                               OSSL_QUIC_FRAME_TYPE_STREAM_DATA_BLOCKED,
831
0
                                               "STREAM_DATA_BLOCKED frame for "
832
0
                                               "TX only stream");
833
0
        return 0;
834
0
    }
835
836
    /* No-op - informative/debugging frame. */
837
4.44k
    return 1;
838
4.44k
}
839
840
static int depack_do_frame_streams_blocked(PACKET *pkt,
841
                                           QUIC_CHANNEL *ch,
842
                                           OSSL_ACKM_RX_PKT *ackm_data,
843
                                           uint64_t frame_type)
844
61.6k
{
845
61.6k
    uint64_t max_data = 0;
846
847
61.6k
    if (!ossl_quic_wire_decode_frame_streams_blocked(pkt, &max_data)) {
848
26
        ossl_quic_channel_raise_protocol_error(ch,
849
26
                                               OSSL_QUIC_ERR_FRAME_ENCODING_ERROR,
850
26
                                               frame_type,
851
26
                                               "decode error");
852
26
        return 0;
853
26
    }
854
855
61.5k
    if (max_data > (((uint64_t)1) << 60)) {
856
        /*
857
         * RFC 9000 s. 19.14: "This value cannot exceed 2**60, as it is not
858
         * possible to encode stream IDs larger than 2**62 - 1. Receipt of a
859
         * frame that encodes a larger stream ID MUST be treated as a connection
860
         * error of type STREAM_LIMIT_ERROR or FRAME_ENCODING_ERROR."
861
         */
862
103
        ossl_quic_channel_raise_protocol_error(ch,
863
103
                                               OSSL_QUIC_ERR_STREAM_LIMIT_ERROR,
864
103
                                               frame_type,
865
103
                                               "invalid stream count limit");
866
103
        return 0;
867
103
    }
868
869
    /* No-op - informative/debugging frame. */
870
61.4k
    return 1;
871
61.5k
}
872
873
static int depack_do_frame_new_conn_id(PACKET *pkt,
874
                                       QUIC_CHANNEL *ch,
875
                                       OSSL_ACKM_RX_PKT *ackm_data)
876
13.9k
{
877
13.9k
    OSSL_QUIC_FRAME_NEW_CONN_ID frame_data;
878
879
13.9k
    if (!ossl_quic_wire_decode_frame_new_conn_id(pkt, &frame_data)) {
880
620
        ossl_quic_channel_raise_protocol_error(ch,
881
620
                                               OSSL_QUIC_ERR_FRAME_ENCODING_ERROR,
882
620
                                               OSSL_QUIC_FRAME_TYPE_NEW_CONN_ID,
883
620
                                               "decode error");
884
620
        return 0;
885
620
    }
886
887
13.3k
    ossl_quic_channel_on_new_conn_id(ch, &frame_data);
888
889
13.3k
    return 1;
890
13.9k
}
891
892
static int depack_do_frame_retire_conn_id(PACKET *pkt,
893
                                          QUIC_CHANNEL *ch,
894
                                          OSSL_ACKM_RX_PKT *ackm_data)
895
62
{
896
62
    uint64_t seq_num;
897
898
62
    if (!ossl_quic_wire_decode_frame_retire_conn_id(pkt, &seq_num)) {
899
10
        ossl_quic_channel_raise_protocol_error(ch,
900
10
                                               OSSL_QUIC_ERR_FRAME_ENCODING_ERROR,
901
10
                                               OSSL_QUIC_FRAME_TYPE_RETIRE_CONN_ID,
902
10
                                               "decode error");
903
10
        return 0;
904
10
    }
905
906
    /*
907
     * RFC 9000 s. 19.16: "An endpoint cannot send this frame if it was provided
908
     * with a zero-length connection ID by its peer. An endpoint that provides a
909
     * zero-length connection ID MUST treat receipt of a RETIRE_CONNECTION_ID
910
     * frame as a connection error of type PROTOCOL_VIOLATION."
911
     *
912
     * Since we always use a zero-length SCID as a client, there is no case
913
     * where it is valid for a server to send this. Our server support is
914
     * currently non-conformant and for internal testing use; simply handle it
915
     * as a no-op in this case.
916
     *
917
     * TODO(QUIC SERVER): Revise and implement correctly for server support.
918
     */
919
52
    if (!ch->is_server) {
920
52
        ossl_quic_channel_raise_protocol_error(ch,
921
52
                                               OSSL_QUIC_ERR_PROTOCOL_VIOLATION,
922
52
                                               OSSL_QUIC_FRAME_TYPE_RETIRE_CONN_ID,
923
52
                                               "conn has zero-length CID");
924
52
        return 0;
925
52
    }
926
927
0
    return 1;
928
52
}
929
930
static void free_path_response(unsigned char *buf, size_t buf_len, void *arg)
931
199k
{
932
199k
    OPENSSL_free(buf);
933
199k
}
934
935
static int depack_do_frame_path_challenge(PACKET *pkt,
936
                                          QUIC_CHANNEL *ch,
937
                                          OSSL_ACKM_RX_PKT *ackm_data)
938
199k
{
939
199k
    uint64_t frame_data = 0;
940
199k
    unsigned char *encoded = NULL;
941
199k
    size_t encoded_len;
942
199k
    WPACKET wpkt;
943
944
199k
    if (!ossl_quic_wire_decode_frame_path_challenge(pkt, &frame_data)) {
945
80
        ossl_quic_channel_raise_protocol_error(ch,
946
80
                                               OSSL_QUIC_ERR_FRAME_ENCODING_ERROR,
947
80
                                               OSSL_QUIC_FRAME_TYPE_PATH_CHALLENGE,
948
80
                                               "decode error");
949
80
        return 0;
950
80
    }
951
952
    /*
953
     * RFC 9000 s. 8.2.2: On receiving a PATH_CHALLENGE frame, an endpoint MUST
954
     * respond by echoing the data contained in the PATH_CHALLENGE frame in a
955
     * PATH_RESPONSE frame.
956
     *
957
     * TODO(QUIC FUTURE): We should try to avoid allocation here in the future.
958
     */
959
199k
    encoded_len = sizeof(uint64_t) + 1;
960
199k
    if ((encoded = OPENSSL_malloc(encoded_len)) == NULL)
961
0
        goto err;
962
963
199k
    if (!WPACKET_init_static_len(&wpkt, encoded, encoded_len, 0))
964
0
        goto err;
965
966
199k
    if (!ossl_quic_wire_encode_frame_path_response(&wpkt, frame_data)) {
967
0
        WPACKET_cleanup(&wpkt);
968
0
        goto err;
969
0
    }
970
971
199k
    WPACKET_finish(&wpkt);
972
973
199k
    if (!ossl_quic_cfq_add_frame(ch->cfq, 0, QUIC_PN_SPACE_APP,
974
199k
                                 OSSL_QUIC_FRAME_TYPE_PATH_RESPONSE,
975
199k
                                 QUIC_CFQ_ITEM_FLAG_UNRELIABLE,
976
199k
                                 encoded, encoded_len,
977
199k
                                 free_path_response, NULL))
978
0
        goto err;
979
980
199k
    return 1;
981
982
0
err:
983
0
    OPENSSL_free(encoded);
984
0
    ossl_quic_channel_raise_protocol_error(ch, OSSL_QUIC_ERR_INTERNAL_ERROR,
985
0
                                           OSSL_QUIC_FRAME_TYPE_PATH_CHALLENGE,
986
0
                                           "internal error");
987
0
    return 0;
988
199k
}
989
990
static int depack_do_frame_path_response(PACKET *pkt,
991
                                         QUIC_CHANNEL *ch,
992
                                         OSSL_ACKM_RX_PKT *ackm_data)
993
18.7k
{
994
18.7k
    uint64_t frame_data = 0;
995
996
18.7k
    if (!ossl_quic_wire_decode_frame_path_response(pkt, &frame_data)) {
997
19
        ossl_quic_channel_raise_protocol_error(ch,
998
19
                                               OSSL_QUIC_ERR_FRAME_ENCODING_ERROR,
999
19
                                               OSSL_QUIC_FRAME_TYPE_PATH_RESPONSE,
1000
19
                                               "decode error");
1001
19
        return 0;
1002
19
    }
1003
1004
    /* TODO(QUIC MULTIPATH): ADD CODE to send |frame_data| to the ch manager */
1005
1006
18.7k
    return 1;
1007
18.7k
}
1008
1009
static int depack_do_frame_conn_close(PACKET *pkt, QUIC_CHANNEL *ch,
1010
                                      uint64_t frame_type)
1011
2.26k
{
1012
2.26k
    OSSL_QUIC_FRAME_CONN_CLOSE frame_data;
1013
1014
2.26k
    if (!ossl_quic_wire_decode_frame_conn_close(pkt, &frame_data)) {
1015
408
        ossl_quic_channel_raise_protocol_error(ch,
1016
408
                                               OSSL_QUIC_ERR_FRAME_ENCODING_ERROR,
1017
408
                                               frame_type,
1018
408
                                               "decode error");
1019
408
        return 0;
1020
408
    }
1021
1022
1.85k
    ossl_quic_channel_on_remote_conn_close(ch, &frame_data);
1023
1.85k
    return 1;
1024
2.26k
}
1025
1026
static int depack_do_frame_handshake_done(PACKET *pkt,
1027
                                          QUIC_CHANNEL *ch,
1028
                                          OSSL_ACKM_RX_PKT *ackm_data)
1029
226k
{
1030
226k
    if (!ossl_quic_wire_decode_frame_handshake_done(pkt)) {
1031
        /* This can fail only with an internal error. */
1032
0
        ossl_quic_channel_raise_protocol_error(ch,
1033
0
                                               OSSL_QUIC_ERR_INTERNAL_ERROR,
1034
0
                                               OSSL_QUIC_FRAME_TYPE_HANDSHAKE_DONE,
1035
0
                                               "internal error (decode frame handshake done)");
1036
0
        return 0;
1037
0
    }
1038
1039
226k
    ossl_quic_channel_on_handshake_confirmed(ch);
1040
226k
    return 1;
1041
226k
}
1042
1043
/* Main frame processor */
1044
1045
static int depack_process_frames(QUIC_CHANNEL *ch, PACKET *pkt,
1046
                                 OSSL_QRX_PKT *parent_pkt, uint32_t enc_level,
1047
                                 OSSL_TIME received, OSSL_ACKM_RX_PKT *ackm_data)
1048
248k
{
1049
248k
    uint32_t pkt_type = parent_pkt->hdr->type;
1050
248k
    uint32_t packet_space = ossl_quic_enc_level_to_pn_space(enc_level);
1051
1052
248k
    if (PACKET_remaining(pkt) == 0) {
1053
        /*
1054
         * RFC 9000 s. 12.4: An endpoint MUST treat receipt of a packet
1055
         * containing no frames as a connection error of type
1056
         * PROTOCOL_VIOLATION.
1057
         */
1058
0
        ossl_quic_channel_raise_protocol_error(ch,
1059
0
                                               OSSL_QUIC_ERR_PROTOCOL_VIOLATION,
1060
0
                                               0,
1061
0
                                               "empty packet payload");
1062
0
        return 0;
1063
0
    }
1064
1065
2.13M
    while (PACKET_remaining(pkt) > 0) {
1066
1.89M
        int was_minimal;
1067
1.89M
        uint64_t frame_type;
1068
1.89M
        const unsigned char *sof = NULL;
1069
1.89M
        uint64_t datalen = 0;
1070
1071
1.89M
        if (ch->msg_callback != NULL)
1072
0
            sof = PACKET_data(pkt);
1073
1074
1.89M
        if (!ossl_quic_wire_peek_frame_header(pkt, &frame_type, &was_minimal)) {
1075
486
            ossl_quic_channel_raise_protocol_error(ch,
1076
486
                                                   OSSL_QUIC_ERR_PROTOCOL_VIOLATION,
1077
486
                                                   0,
1078
486
                                                   "malformed frame header");
1079
486
            return 0;
1080
486
        }
1081
1082
1.89M
        if (!was_minimal) {
1083
123
            ossl_quic_channel_raise_protocol_error(ch,
1084
123
                                                   OSSL_QUIC_ERR_PROTOCOL_VIOLATION,
1085
123
                                                   frame_type,
1086
123
                                                   "non-minimal frame type encoding");
1087
123
            return 0;
1088
123
        }
1089
1090
        /*
1091
         * There are only a few frame types which are not ACK-eliciting. Handle
1092
         * these centrally to make error handling cases more resilient, as we
1093
         * should tell the ACKM about an ACK-eliciting frame even if it was not
1094
         * successfully handled.
1095
         */
1096
1.89M
        switch (frame_type) {
1097
181k
        case OSSL_QUIC_FRAME_TYPE_PADDING:
1098
248k
        case OSSL_QUIC_FRAME_TYPE_ACK_WITHOUT_ECN:
1099
291k
        case OSSL_QUIC_FRAME_TYPE_ACK_WITH_ECN:
1100
292k
        case OSSL_QUIC_FRAME_TYPE_CONN_CLOSE_TRANSPORT:
1101
292k
        case OSSL_QUIC_FRAME_TYPE_CONN_CLOSE_APP:
1102
292k
            break;
1103
1.60M
        default:
1104
1.60M
            ackm_data->is_ack_eliciting = 1;
1105
1.60M
            break;
1106
1.89M
        }
1107
1108
1.89M
        switch (frame_type) {
1109
1.05M
        case OSSL_QUIC_FRAME_TYPE_PING:
1110
            /* Allowed in all packet types */
1111
1.05M
            if (!depack_do_frame_ping(pkt, ch, enc_level, ackm_data))
1112
0
                return 0;
1113
1.05M
            break;
1114
1.05M
        case OSSL_QUIC_FRAME_TYPE_PADDING:
1115
            /* Allowed in all packet types */
1116
181k
            if (!depack_do_frame_padding(pkt))
1117
0
                return 0;
1118
181k
            break;
1119
1120
181k
        case OSSL_QUIC_FRAME_TYPE_ACK_WITHOUT_ECN:
1121
109k
        case OSSL_QUIC_FRAME_TYPE_ACK_WITH_ECN:
1122
            /* ACK frames are valid everywhere except in 0RTT packets */
1123
109k
            if (pkt_type == QUIC_PKT_TYPE_0RTT) {
1124
0
                ossl_quic_channel_raise_protocol_error(ch,
1125
0
                                                       OSSL_QUIC_ERR_PROTOCOL_VIOLATION,
1126
0
                                                       frame_type,
1127
0
                                                       "ACK not valid in 0-RTT");
1128
0
                return 0;
1129
0
            }
1130
109k
            if (!depack_do_frame_ack(pkt, ch, packet_space, received,
1131
109k
                                     frame_type, parent_pkt))
1132
1.31k
                return 0;
1133
108k
            break;
1134
1135
108k
        case OSSL_QUIC_FRAME_TYPE_RESET_STREAM:
1136
            /* RESET_STREAM frames are valid in 0RTT and 1RTT packets */
1137
2.09k
            if (pkt_type != QUIC_PKT_TYPE_0RTT
1138
2.09k
                && pkt_type != QUIC_PKT_TYPE_1RTT) {
1139
102
                ossl_quic_channel_raise_protocol_error(ch,
1140
102
                                                       OSSL_QUIC_ERR_PROTOCOL_VIOLATION,
1141
102
                                                       frame_type,
1142
102
                                                       "RESET_STREAM not valid in "
1143
102
                                                       "INITIAL/HANDSHAKE");
1144
102
                return 0;
1145
102
            }
1146
1.99k
            if (!depack_do_frame_reset_stream(pkt, ch, ackm_data))
1147
253
                return 0;
1148
1.74k
            break;
1149
34.0k
        case OSSL_QUIC_FRAME_TYPE_STOP_SENDING:
1150
            /* STOP_SENDING frames are valid in 0RTT and 1RTT packets */
1151
34.0k
            if (pkt_type != QUIC_PKT_TYPE_0RTT
1152
34.0k
                && pkt_type != QUIC_PKT_TYPE_1RTT) {
1153
25
                ossl_quic_channel_raise_protocol_error(ch,
1154
25
                                                       OSSL_QUIC_ERR_PROTOCOL_VIOLATION,
1155
25
                                                       frame_type,
1156
25
                                                       "STOP_SENDING not valid in "
1157
25
                                                       "INITIAL/HANDSHAKE");
1158
25
                return 0;
1159
25
            }
1160
33.9k
            if (!depack_do_frame_stop_sending(pkt, ch, ackm_data))
1161
174
                return 0;
1162
33.8k
            break;
1163
154k
        case OSSL_QUIC_FRAME_TYPE_CRYPTO:
1164
            /* CRYPTO frames are valid everywhere except in 0RTT packets */
1165
154k
            if (pkt_type == QUIC_PKT_TYPE_0RTT) {
1166
0
                ossl_quic_channel_raise_protocol_error(ch,
1167
0
                                                       OSSL_QUIC_ERR_PROTOCOL_VIOLATION,
1168
0
                                                       frame_type,
1169
0
                                                       "CRYPTO frame not valid in 0-RTT");
1170
0
                return 0;
1171
0
            }
1172
154k
            if (!depack_do_frame_crypto(pkt, ch, parent_pkt, ackm_data, &datalen))
1173
652
                return 0;
1174
154k
            break;
1175
154k
        case OSSL_QUIC_FRAME_TYPE_NEW_TOKEN:
1176
            /* NEW_TOKEN frames are valid in 1RTT packets */
1177
2.24k
            if (pkt_type != QUIC_PKT_TYPE_1RTT) {
1178
45
                ossl_quic_channel_raise_protocol_error(ch,
1179
45
                                                       OSSL_QUIC_ERR_PROTOCOL_VIOLATION,
1180
45
                                                       frame_type,
1181
45
                                                       "NEW_TOKEN valid only in 1-RTT");
1182
45
                return 0;
1183
45
            }
1184
2.20k
            if (!depack_do_frame_new_token(pkt, ch, ackm_data))
1185
177
                return 0;
1186
2.02k
            break;
1187
1188
4.12k
        case OSSL_QUIC_FRAME_TYPE_STREAM:
1189
5.69k
        case OSSL_QUIC_FRAME_TYPE_STREAM_FIN:
1190
6.34k
        case OSSL_QUIC_FRAME_TYPE_STREAM_LEN:
1191
8.12k
        case OSSL_QUIC_FRAME_TYPE_STREAM_LEN_FIN:
1192
8.61k
        case OSSL_QUIC_FRAME_TYPE_STREAM_OFF:
1193
10.8k
        case OSSL_QUIC_FRAME_TYPE_STREAM_OFF_FIN:
1194
11.2k
        case OSSL_QUIC_FRAME_TYPE_STREAM_OFF_LEN:
1195
18.6k
        case OSSL_QUIC_FRAME_TYPE_STREAM_OFF_LEN_FIN:
1196
            /* STREAM frames are valid in 0RTT and 1RTT packets */
1197
18.6k
            if (pkt_type != QUIC_PKT_TYPE_0RTT
1198
18.6k
                && pkt_type != QUIC_PKT_TYPE_1RTT) {
1199
196
                ossl_quic_channel_raise_protocol_error(ch,
1200
196
                                                       OSSL_QUIC_ERR_PROTOCOL_VIOLATION,
1201
196
                                                       frame_type,
1202
196
                                                       "STREAM valid only in 0/1-RTT");
1203
196
                return 0;
1204
196
            }
1205
18.4k
            if (!depack_do_frame_stream(pkt, ch, parent_pkt, ackm_data,
1206
18.4k
                                        frame_type, &datalen))
1207
580
                return 0;
1208
17.8k
            break;
1209
1210
34.4k
        case OSSL_QUIC_FRAME_TYPE_MAX_DATA:
1211
            /* MAX_DATA frames are valid in 0RTT and 1RTT packets */
1212
34.4k
            if (pkt_type != QUIC_PKT_TYPE_0RTT
1213
34.4k
                && pkt_type != QUIC_PKT_TYPE_1RTT) {
1214
57
                ossl_quic_channel_raise_protocol_error(ch,
1215
57
                                                       OSSL_QUIC_ERR_PROTOCOL_VIOLATION,
1216
57
                                                       frame_type,
1217
57
                                                       "MAX_DATA valid only in 0/1-RTT");
1218
57
                return 0;
1219
57
            }
1220
34.4k
            if (!depack_do_frame_max_data(pkt, ch, ackm_data))
1221
13
                return 0;
1222
34.4k
            break;
1223
34.4k
        case OSSL_QUIC_FRAME_TYPE_MAX_STREAM_DATA:
1224
            /* MAX_STREAM_DATA frames are valid in 0RTT and 1RTT packets */
1225
7.03k
            if (pkt_type != QUIC_PKT_TYPE_0RTT
1226
7.03k
                && pkt_type != QUIC_PKT_TYPE_1RTT) {
1227
12
                ossl_quic_channel_raise_protocol_error(ch,
1228
12
                                                       OSSL_QUIC_ERR_PROTOCOL_VIOLATION,
1229
12
                                                       frame_type,
1230
12
                                                       "MAX_STREAM_DATA valid only in 0/1-RTT");
1231
12
                return 0;
1232
12
            }
1233
7.02k
            if (!depack_do_frame_max_stream_data(pkt, ch, ackm_data))
1234
126
                return 0;
1235
6.90k
            break;
1236
1237
15.1k
        case OSSL_QUIC_FRAME_TYPE_MAX_STREAMS_BIDI:
1238
31.9k
        case OSSL_QUIC_FRAME_TYPE_MAX_STREAMS_UNI:
1239
            /* MAX_STREAMS frames are valid in 0RTT and 1RTT packets */
1240
31.9k
            if (pkt_type != QUIC_PKT_TYPE_0RTT
1241
31.9k
                && pkt_type != QUIC_PKT_TYPE_1RTT) {
1242
35
                ossl_quic_channel_raise_protocol_error(ch,
1243
35
                                                       OSSL_QUIC_ERR_PROTOCOL_VIOLATION,
1244
35
                                                       frame_type,
1245
35
                                                       "MAX_STREAMS valid only in 0/1-RTT");
1246
35
                return 0;
1247
35
            }
1248
31.9k
            if (!depack_do_frame_max_streams(pkt, ch, ackm_data,
1249
31.9k
                                             frame_type))
1250
109
                return 0;
1251
31.8k
            break;
1252
1253
31.8k
        case OSSL_QUIC_FRAME_TYPE_DATA_BLOCKED:
1254
            /* DATA_BLOCKED frames are valid in 0RTT and 1RTT packets */
1255
12.1k
            if (pkt_type != QUIC_PKT_TYPE_0RTT
1256
12.1k
                && pkt_type != QUIC_PKT_TYPE_1RTT) {
1257
18
                ossl_quic_channel_raise_protocol_error(ch,
1258
18
                                                       OSSL_QUIC_ERR_PROTOCOL_VIOLATION,
1259
18
                                                       frame_type,
1260
18
                                                       "DATA_BLOCKED valid only in 0/1-RTT");
1261
18
                return 0;
1262
18
            }
1263
12.1k
            if (!depack_do_frame_data_blocked(pkt, ch, ackm_data))
1264
14
                return 0;
1265
12.1k
            break;
1266
12.1k
        case OSSL_QUIC_FRAME_TYPE_STREAM_DATA_BLOCKED:
1267
            /* STREAM_DATA_BLOCKED frames are valid in 0RTT and 1RTT packets */
1268
2.43k
            if (pkt_type != QUIC_PKT_TYPE_0RTT
1269
2.43k
                && pkt_type != QUIC_PKT_TYPE_1RTT) {
1270
15
                ossl_quic_channel_raise_protocol_error(ch,
1271
15
                                                       OSSL_QUIC_ERR_PROTOCOL_VIOLATION,
1272
15
                                                       frame_type,
1273
15
                                                       "STREAM_DATA_BLOCKED valid only in 0/1-RTT");
1274
15
                return 0;
1275
15
            }
1276
2.42k
            if (!depack_do_frame_stream_data_blocked(pkt, ch, ackm_data))
1277
84
                return 0;
1278
2.34k
            break;
1279
1280
2.84k
        case OSSL_QUIC_FRAME_TYPE_STREAMS_BLOCKED_BIDI:
1281
25.2k
        case OSSL_QUIC_FRAME_TYPE_STREAMS_BLOCKED_UNI:
1282
            /* STREAMS_BLOCKED frames are valid in 0RTT and 1RTT packets */
1283
25.2k
            if (pkt_type != QUIC_PKT_TYPE_0RTT
1284
25.2k
                && pkt_type != QUIC_PKT_TYPE_1RTT) {
1285
50
                ossl_quic_channel_raise_protocol_error(ch,
1286
50
                                                       OSSL_QUIC_ERR_PROTOCOL_VIOLATION,
1287
50
                                                       frame_type,
1288
50
                                                       "STREAMS valid only in 0/1-RTT");
1289
50
                return 0;
1290
50
            }
1291
25.2k
            if (!depack_do_frame_streams_blocked(pkt, ch, ackm_data,
1292
25.2k
                                                 frame_type))
1293
71
                return 0;
1294
25.1k
            break;
1295
1296
25.1k
        case OSSL_QUIC_FRAME_TYPE_NEW_CONN_ID:
1297
            /* NEW_CONN_ID frames are valid in 0RTT and 1RTT packets */
1298
7.62k
            if (pkt_type != QUIC_PKT_TYPE_0RTT
1299
7.62k
                && pkt_type != QUIC_PKT_TYPE_1RTT) {
1300
525
                ossl_quic_channel_raise_protocol_error(ch,
1301
525
                                                       OSSL_QUIC_ERR_PROTOCOL_VIOLATION,
1302
525
                                                       frame_type,
1303
525
                                                       "NEW_CONN_ID valid only in 0/1-RTT");
1304
525
            }
1305
7.62k
            if (!depack_do_frame_new_conn_id(pkt, ch, ackm_data))
1306
385
                return 0;
1307
7.24k
            break;
1308
7.24k
        case OSSL_QUIC_FRAME_TYPE_RETIRE_CONN_ID:
1309
            /* RETIRE_CONN_ID frames are valid in 0RTT and 1RTT packets */
1310
50
            if (pkt_type != QUIC_PKT_TYPE_0RTT
1311
50
                && pkt_type != QUIC_PKT_TYPE_1RTT) {
1312
10
                ossl_quic_channel_raise_protocol_error(ch,
1313
10
                                                       OSSL_QUIC_ERR_PROTOCOL_VIOLATION,
1314
10
                                                       frame_type,
1315
10
                                                       "RETIRE_CONN_ID valid only in 0/1-RTT");
1316
10
                return 0;
1317
10
            }
1318
40
            if (!depack_do_frame_retire_conn_id(pkt, ch, ackm_data))
1319
40
                return 0;
1320
0
            break;
1321
124k
        case OSSL_QUIC_FRAME_TYPE_PATH_CHALLENGE:
1322
            /* PATH_CHALLENGE frames are valid in 0RTT and 1RTT packets */
1323
124k
            if (pkt_type != QUIC_PKT_TYPE_0RTT
1324
124k
                && pkt_type != QUIC_PKT_TYPE_1RTT) {
1325
17
                ossl_quic_channel_raise_protocol_error(ch,
1326
17
                                                       OSSL_QUIC_ERR_PROTOCOL_VIOLATION,
1327
17
                                                       frame_type,
1328
17
                                                       "PATH_CHALLENGE valid only in 0/1-RTT");
1329
17
                return 0;
1330
17
            }
1331
124k
            if (!depack_do_frame_path_challenge(pkt, ch, ackm_data))
1332
52
                return 0;
1333
1334
124k
            break;
1335
124k
        case OSSL_QUIC_FRAME_TYPE_PATH_RESPONSE:
1336
            /* PATH_RESPONSE frames are valid in 1RTT packets */
1337
8.84k
            if (pkt_type != QUIC_PKT_TYPE_1RTT) {
1338
12
                ossl_quic_channel_raise_protocol_error(ch,
1339
12
                                                       OSSL_QUIC_ERR_PROTOCOL_VIOLATION,
1340
12
                                                       frame_type,
1341
12
                                                       "PATH_CHALLENGE valid only in 1-RTT");
1342
12
                return 0;
1343
12
            }
1344
8.82k
            if (!depack_do_frame_path_response(pkt, ch, ackm_data))
1345
12
                return 0;
1346
8.81k
            break;
1347
1348
8.81k
        case OSSL_QUIC_FRAME_TYPE_CONN_CLOSE_APP:
1349
            /* CONN_CLOSE_APP frames are valid in 0RTT and 1RTT packets */
1350
430
            if (pkt_type != QUIC_PKT_TYPE_0RTT
1351
430
                && pkt_type != QUIC_PKT_TYPE_1RTT) {
1352
11
                ossl_quic_channel_raise_protocol_error(ch,
1353
11
                                                       OSSL_QUIC_ERR_PROTOCOL_VIOLATION,
1354
11
                                                       frame_type,
1355
11
                                                       "CONN_CLOSE (APP) valid only in 0/1-RTT");
1356
11
                return 0;
1357
11
            }
1358
            /* FALLTHRU */
1359
1.30k
        case OSSL_QUIC_FRAME_TYPE_CONN_CLOSE_TRANSPORT:
1360
            /* CONN_CLOSE_TRANSPORT frames are valid in all packets */
1361
1.30k
            if (!depack_do_frame_conn_close(pkt, ch, frame_type))
1362
228
                return 0;
1363
1.08k
            break;
1364
1365
74.1k
        case OSSL_QUIC_FRAME_TYPE_HANDSHAKE_DONE:
1366
            /* HANDSHAKE_DONE frames are valid in 1RTT packets */
1367
74.1k
            if (pkt_type != QUIC_PKT_TYPE_1RTT) {
1368
20
                ossl_quic_channel_raise_protocol_error(ch,
1369
20
                                                       OSSL_QUIC_ERR_PROTOCOL_VIOLATION,
1370
20
                                                       frame_type,
1371
20
                                                       "HANDSHAKE_DONE valid only in 1-RTT");
1372
20
                return 0;
1373
20
            }
1374
74.0k
            if (!depack_do_frame_handshake_done(pkt, ch, ackm_data))
1375
0
                return 0;
1376
74.0k
            break;
1377
1378
74.0k
        default:
1379
            /* Unknown frame type */
1380
3.37k
            ossl_quic_channel_raise_protocol_error(ch,
1381
3.37k
                                                   OSSL_QUIC_ERR_FRAME_ENCODING_ERROR,
1382
3.37k
                                                   frame_type,
1383
3.37k
                                                   "Unknown frame type received");
1384
3.37k
            return 0;
1385
1.89M
        }
1386
1387
1.88M
        if (ch->msg_callback != NULL) {
1388
0
            int ctype = SSL3_RT_QUIC_FRAME_FULL;
1389
1390
0
            size_t framelen = PACKET_data(pkt) - sof;
1391
1392
0
            if (frame_type == OSSL_QUIC_FRAME_TYPE_PADDING) {
1393
0
                ctype = SSL3_RT_QUIC_FRAME_PADDING;
1394
0
            } else if (OSSL_QUIC_FRAME_TYPE_IS_STREAM(frame_type)
1395
0
                    || frame_type == OSSL_QUIC_FRAME_TYPE_CRYPTO) {
1396
0
                ctype = SSL3_RT_QUIC_FRAME_HEADER;
1397
0
                framelen -= (size_t)datalen;
1398
0
            }
1399
1400
0
            ch->msg_callback(0, OSSL_QUIC1_VERSION, ctype, sof, framelen,
1401
0
                             ch->msg_callback_ssl, ch->msg_callback_arg);
1402
0
        }
1403
1.88M
    }
1404
1405
239k
    return 1;
1406
248k
}
1407
1408
QUIC_NEEDS_LOCK
1409
int ossl_quic_handle_frames(QUIC_CHANNEL *ch, OSSL_QRX_PKT *qpacket)
1410
248k
{
1411
248k
    PACKET pkt;
1412
248k
    OSSL_ACKM_RX_PKT ackm_data;
1413
248k
    uint32_t enc_level;
1414
1415
248k
    if (ch == NULL)
1416
0
        return 0;
1417
1418
248k
    ch->did_crypto_frame = 0;
1419
1420
    /* Initialize |ackm_data| (and reinitialize |ok|)*/
1421
248k
    memset(&ackm_data, 0, sizeof(ackm_data));
1422
    /*
1423
     * ASSUMPTION: All packets that aren't special case have a
1424
     * packet number.
1425
     */
1426
248k
    ackm_data.pkt_num = qpacket->pn;
1427
248k
    ackm_data.time = qpacket->time;
1428
248k
    enc_level = ossl_quic_pkt_type_to_enc_level(qpacket->hdr->type);
1429
248k
    if (enc_level >= QUIC_ENC_LEVEL_NUM)
1430
        /*
1431
         * Retry and Version Negotiation packets should not be passed to this
1432
         * function.
1433
         */
1434
0
        return 0;
1435
1436
248k
    ackm_data.pkt_space = ossl_quic_enc_level_to_pn_space(enc_level);
1437
1438
    /* Now that special cases are out of the way, parse frames */
1439
248k
    if (!PACKET_buf_init(&pkt, qpacket->hdr->data, qpacket->hdr->len)
1440
248k
        || !depack_process_frames(ch, &pkt, qpacket,
1441
248k
                                  enc_level,
1442
248k
                                  qpacket->time,
1443
248k
                                  &ackm_data))
1444
8.89k
        return 0;
1445
1446
239k
    ossl_ackm_on_rx_packet(ch->ackm, &ackm_data);
1447
1448
239k
    return 1;
1449
248k
}