Coverage Report

Created: 2025-12-14 06:48

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/openssl/ssl/quic/quic_rx_depack.c
Line
Count
Source
1
/*
2
 * Copyright 2022-2025 The OpenSSL Project Authors. All Rights Reserved.
3
 *
4
 * Licensed under the Apache License 2.0 (the "License").  You may not use
5
 * this file except in compliance with the License.  You can obtain a copy
6
 * in the file LICENSE in the source distribution or at
7
 * https://www.openssl.org/source/license.html
8
 */
9
10
#include "internal/packet_quic.h"
11
#include "internal/nelem.h"
12
#include "internal/quic_wire.h"
13
#include "internal/quic_record_rx.h"
14
#include "internal/quic_ackm.h"
15
#include "internal/quic_rx_depack.h"
16
#include "internal/quic_error.h"
17
#include "internal/quic_fc.h"
18
#include "internal/quic_channel.h"
19
#include "internal/sockets.h"
20
21
#include "quic_local.h"
22
#include "quic_channel_local.h"
23
#include "../ssl_local.h"
24
25
/*
26
 * Helper functions to process different frame types.
27
 *
28
 * Typically, those that are ACK eliciting will take an OSSL_ACKM_RX_PKT
29
 * pointer argument, the few that aren't ACK eliciting will not.  This makes
30
 * them a verifiable pattern against tables where this is specified.
31
 */
32
static int depack_do_implicit_stream_create(QUIC_CHANNEL *ch,
33
    uint64_t stream_id,
34
    uint64_t frame_type,
35
    QUIC_STREAM **result);
36
37
static int depack_do_frame_padding(PACKET *pkt)
38
0
{
39
    /* We ignore this frame */
40
0
    ossl_quic_wire_decode_padding(pkt);
41
0
    return 1;
42
0
}
43
44
static int depack_do_frame_ping(PACKET *pkt, QUIC_CHANNEL *ch,
45
    uint32_t enc_level,
46
    OSSL_ACKM_RX_PKT *ackm_data)
47
0
{
48
    /* We ignore this frame, apart from eliciting an ACK */
49
0
    if (!ossl_quic_wire_decode_frame_ping(pkt)) {
50
0
        ossl_quic_channel_raise_protocol_error(ch,
51
0
            OSSL_QUIC_ERR_FRAME_ENCODING_ERROR,
52
0
            OSSL_QUIC_FRAME_TYPE_PING,
53
0
            "decode error");
54
0
        return 0;
55
0
    }
56
57
0
    ossl_quic_tx_packetiser_schedule_ack_eliciting(ch->txp, enc_level);
58
0
    return 1;
59
0
}
60
61
static int depack_do_frame_ack(PACKET *pkt, QUIC_CHANNEL *ch,
62
    int packet_space, OSSL_TIME received,
63
    uint64_t frame_type,
64
    OSSL_QRX_PKT *qpacket)
65
0
{
66
0
    OSSL_QUIC_FRAME_ACK ack;
67
0
    OSSL_QUIC_ACK_RANGE *p;
68
0
    uint64_t total_ranges = 0;
69
0
    uint32_t ack_delay_exp = ch->rx_ack_delay_exp;
70
71
0
    if (!ossl_quic_wire_peek_frame_ack_num_ranges(pkt, &total_ranges)
72
        /* In case sizeof(uint64_t) > sizeof(size_t) */
73
0
        || total_ranges > SIZE_MAX / sizeof(OSSL_QUIC_ACK_RANGE))
74
0
        goto malformed;
75
76
0
    if (ch->num_ack_range_scratch < (size_t)total_ranges) {
77
0
        if ((p = OPENSSL_realloc(ch->ack_range_scratch,
78
0
                 sizeof(OSSL_QUIC_ACK_RANGE)
79
0
                     * (size_t)total_ranges))
80
0
            == NULL)
81
0
            goto malformed;
82
83
0
        ch->ack_range_scratch = p;
84
0
        ch->num_ack_range_scratch = (size_t)total_ranges;
85
0
    }
86
87
0
    ack.ack_ranges = ch->ack_range_scratch;
88
0
    ack.num_ack_ranges = (size_t)total_ranges;
89
90
0
    if (!ossl_quic_wire_decode_frame_ack(pkt, ack_delay_exp, &ack, NULL))
91
0
        goto malformed;
92
93
0
    if (qpacket->hdr->type == QUIC_PKT_TYPE_1RTT
94
0
        && (qpacket->key_epoch < ossl_qrx_get_key_epoch(ch->qrx)
95
0
            || ch->rxku_expected)
96
0
        && ack.ack_ranges[0].end >= ch->txku_pn) {
97
        /*
98
         * RFC 9001 s. 6.2: An endpoint that receives an acknowledgment that is
99
         * carried in a packet protected with old keys where any acknowledged
100
         * packet was protected with newer keys MAY treat that as a connection
101
         * error of type KEY_UPDATE_ERROR.
102
         *
103
         * Two cases to handle here:
104
         *
105
         *   - We did spontaneous TXKU, the peer has responded in kind and we
106
         *     have detected RXKU; !ch->rxku_expected, but then it sent a packet
107
         *     with old keys acknowledging a packet in the new key epoch.
108
         *
109
         *     This also covers the case where we got RXKU and triggered
110
         *     solicited TXKU, and then for some reason the peer sent an ACK of
111
         *     a PN in our new TX key epoch with old keys.
112
         *
113
         *   - We did spontaneous TXKU; ch->txku_pn is the starting PN of our
114
         *     new TX key epoch; the peer has not initiated a solicited TXKU in
115
         *     response (so we have not detected RXKU); in this case the RX key
116
         *     epoch has not incremented and ch->rxku_expected is still 1.
117
         */
118
0
        ossl_quic_channel_raise_protocol_error(ch,
119
0
            OSSL_QUIC_ERR_KEY_UPDATE_ERROR,
120
0
            frame_type,
121
0
            "acked packet which initiated a "
122
0
            "key update without a "
123
0
            "corresponding key update");
124
0
        return 0;
125
0
    }
126
127
0
    if (!ossl_ackm_on_rx_ack_frame(ch->ackm, &ack,
128
0
            packet_space, received))
129
0
        goto malformed;
130
131
0
    ++ch->diag_num_rx_ack;
132
0
    return 1;
133
134
0
malformed:
135
0
    ossl_quic_channel_raise_protocol_error(ch,
136
0
        OSSL_QUIC_ERR_FRAME_ENCODING_ERROR,
137
0
        frame_type,
138
0
        "decode error");
139
0
    return 0;
140
0
}
141
142
static int depack_do_frame_reset_stream(PACKET *pkt,
143
    QUIC_CHANNEL *ch,
144
    OSSL_ACKM_RX_PKT *ackm_data)
145
0
{
146
0
    OSSL_QUIC_FRAME_RESET_STREAM frame_data;
147
0
    QUIC_STREAM *stream = NULL;
148
0
    uint64_t fce;
149
150
0
    if (!ossl_quic_wire_decode_frame_reset_stream(pkt, &frame_data)) {
151
0
        ossl_quic_channel_raise_protocol_error(ch,
152
0
            OSSL_QUIC_ERR_FRAME_ENCODING_ERROR,
153
0
            OSSL_QUIC_FRAME_TYPE_RESET_STREAM,
154
0
            "decode error");
155
0
        return 0;
156
0
    }
157
158
0
    if (!depack_do_implicit_stream_create(ch, frame_data.stream_id,
159
0
            OSSL_QUIC_FRAME_TYPE_RESET_STREAM,
160
0
            &stream))
161
0
        return 0; /* error already raised for us */
162
163
0
    if (stream == NULL)
164
0
        return 1; /* old deleted stream, not a protocol violation, ignore */
165
166
0
    if (!ossl_quic_stream_has_recv(stream)) {
167
0
        ossl_quic_channel_raise_protocol_error(ch,
168
0
            OSSL_QUIC_ERR_STREAM_STATE_ERROR,
169
0
            OSSL_QUIC_FRAME_TYPE_RESET_STREAM,
170
0
            "RESET_STREAM frame for "
171
0
            "TX only stream");
172
0
        return 0;
173
0
    }
174
175
    /*
176
     * The final size field of the RESET_STREAM frame must be used to determine
177
     * how much flow control credit the aborted stream was considered to have
178
     * consumed.
179
     *
180
     * We also need to ensure that if we already have a final size for the
181
     * stream, the RESET_STREAM frame's Final Size field matches this; we SHOULD
182
     * terminate the connection otherwise (RFC 9000 s. 4.5). The RXFC takes care
183
     * of this for us.
184
     */
185
0
    if (!ossl_quic_rxfc_on_rx_stream_frame(&stream->rxfc,
186
0
            frame_data.final_size, /*is_fin=*/1)) {
187
0
        ossl_quic_channel_raise_protocol_error(ch,
188
0
            OSSL_QUIC_ERR_INTERNAL_ERROR,
189
0
            OSSL_QUIC_FRAME_TYPE_RESET_STREAM,
190
0
            "internal error (flow control)");
191
0
        return 0;
192
0
    }
193
194
    /* Has a flow control error occurred? */
195
0
    fce = ossl_quic_rxfc_get_error(&stream->rxfc, 0);
196
0
    if (fce != OSSL_QUIC_ERR_NO_ERROR) {
197
0
        ossl_quic_channel_raise_protocol_error(ch,
198
0
            fce,
199
0
            OSSL_QUIC_FRAME_TYPE_RESET_STREAM,
200
0
            "flow control violation");
201
0
        return 0;
202
0
    }
203
204
    /*
205
     * Depending on the receive part state this is handled either as a reset
206
     * transition or a no-op (e.g. if a reset has already been received before,
207
     * or the application already retired a FIN). Best effort - there are no
208
     * protocol error conditions we need to check for here.
209
     */
210
0
    ossl_quic_stream_map_notify_reset_recv_part(&ch->qsm, stream,
211
0
        frame_data.app_error_code,
212
0
        frame_data.final_size);
213
214
0
    ossl_quic_stream_map_update_state(&ch->qsm, stream);
215
0
    return 1;
216
0
}
217
218
static int depack_do_frame_stop_sending(PACKET *pkt,
219
    QUIC_CHANNEL *ch,
220
    OSSL_ACKM_RX_PKT *ackm_data)
221
0
{
222
0
    OSSL_QUIC_FRAME_STOP_SENDING frame_data;
223
0
    QUIC_STREAM *stream = NULL;
224
225
0
    if (!ossl_quic_wire_decode_frame_stop_sending(pkt, &frame_data)) {
226
0
        ossl_quic_channel_raise_protocol_error(ch,
227
0
            OSSL_QUIC_ERR_FRAME_ENCODING_ERROR,
228
0
            OSSL_QUIC_FRAME_TYPE_STOP_SENDING,
229
0
            "decode error");
230
0
        return 0;
231
0
    }
232
233
0
    if (!depack_do_implicit_stream_create(ch, frame_data.stream_id,
234
0
            OSSL_QUIC_FRAME_TYPE_STOP_SENDING,
235
0
            &stream))
236
0
        return 0; /* error already raised for us */
237
238
0
    if (stream == NULL)
239
0
        return 1; /* old deleted stream, not a protocol violation, ignore */
240
241
0
    if (!ossl_quic_stream_has_send(stream)) {
242
0
        ossl_quic_channel_raise_protocol_error(ch,
243
0
            OSSL_QUIC_ERR_STREAM_STATE_ERROR,
244
0
            OSSL_QUIC_FRAME_TYPE_STOP_SENDING,
245
0
            "STOP_SENDING frame for "
246
0
            "RX only stream");
247
0
        return 0;
248
0
    }
249
250
0
    stream->peer_stop_sending = 1;
251
0
    stream->peer_stop_sending_aec = frame_data.app_error_code;
252
253
    /*
254
     * RFC 9000 s. 3.5: Receiving a STOP_SENDING frame means we must respond in
255
     * turn with a RESET_STREAM frame for the same part of the stream. The other
256
     * part is unaffected.
257
     */
258
0
    ossl_quic_stream_map_reset_stream_send_part(&ch->qsm, stream,
259
0
        frame_data.app_error_code);
260
0
    return 1;
261
0
}
262
263
static int depack_do_frame_crypto(PACKET *pkt, QUIC_CHANNEL *ch,
264
    OSSL_QRX_PKT *parent_pkt,
265
    OSSL_ACKM_RX_PKT *ackm_data,
266
    uint64_t *datalen)
267
0
{
268
0
    OSSL_QUIC_FRAME_CRYPTO f;
269
0
    QUIC_RSTREAM *rstream;
270
0
    QUIC_RXFC *rxfc;
271
272
0
    *datalen = 0;
273
274
0
    if (!ossl_quic_wire_decode_frame_crypto(pkt, 0, &f)) {
275
0
        ossl_quic_channel_raise_protocol_error(ch,
276
0
            OSSL_QUIC_ERR_FRAME_ENCODING_ERROR,
277
0
            OSSL_QUIC_FRAME_TYPE_CRYPTO,
278
0
            "decode error");
279
0
        return 0;
280
0
    }
281
282
0
    if (f.len == 0)
283
0
        return 1; /* nothing to do */
284
285
0
    rstream = ch->crypto_recv[ackm_data->pkt_space];
286
0
    if (!ossl_assert(rstream != NULL))
287
        /*
288
         * This should not happen; we should only have a NULL stream here if
289
         * the EL has been discarded, and if the EL has been discarded we
290
         * shouldn't be here.
291
         */
292
0
        return 0;
293
294
0
    rxfc = &ch->crypto_rxfc[ackm_data->pkt_space];
295
296
0
    if (!ossl_quic_rxfc_on_rx_stream_frame(rxfc, f.offset + f.len,
297
0
            /*is_fin=*/0)) {
298
0
        ossl_quic_channel_raise_protocol_error(ch,
299
0
            OSSL_QUIC_ERR_INTERNAL_ERROR,
300
0
            OSSL_QUIC_FRAME_TYPE_CRYPTO,
301
0
            "internal error (crypto RXFC)");
302
0
        return 0;
303
0
    }
304
305
0
    if (ossl_quic_rxfc_get_error(rxfc, 0) != OSSL_QUIC_ERR_NO_ERROR) {
306
0
        ossl_quic_channel_raise_protocol_error(ch, OSSL_QUIC_ERR_CRYPTO_BUFFER_EXCEEDED,
307
0
            OSSL_QUIC_FRAME_TYPE_CRYPTO,
308
0
            "exceeded maximum crypto buffer");
309
0
        return 0;
310
0
    }
311
312
0
    if (!ossl_quic_rstream_queue_data(rstream, parent_pkt,
313
0
            f.offset, f.data, f.len, 0)) {
314
0
        ossl_quic_channel_raise_protocol_error(ch,
315
0
            OSSL_QUIC_ERR_INTERNAL_ERROR,
316
0
            OSSL_QUIC_FRAME_TYPE_CRYPTO,
317
0
            "internal error (rstream queue)");
318
0
        return 0;
319
0
    }
320
321
0
    ch->did_crypto_frame = 1;
322
0
    *datalen = f.len;
323
324
0
    return 1;
325
0
}
326
327
static int depack_do_frame_new_token(PACKET *pkt, QUIC_CHANNEL *ch,
328
    OSSL_ACKM_RX_PKT *ackm_data)
329
0
{
330
0
    const uint8_t *token;
331
0
    size_t token_len;
332
333
0
    if (!ossl_quic_wire_decode_frame_new_token(pkt, &token, &token_len)) {
334
0
        ossl_quic_channel_raise_protocol_error(ch,
335
0
            OSSL_QUIC_ERR_FRAME_ENCODING_ERROR,
336
0
            OSSL_QUIC_FRAME_TYPE_NEW_TOKEN,
337
0
            "decode error");
338
0
        return 0;
339
0
    }
340
341
0
    if (token_len == 0) {
342
        /*
343
         * RFC 9000 s. 19.7: "A client MUST treat receipt of a NEW_TOKEN frame
344
         * with an empty Token field as a connection error of type
345
         * FRAME_ENCODING_ERROR."
346
         */
347
0
        ossl_quic_channel_raise_protocol_error(ch,
348
0
            OSSL_QUIC_ERR_FRAME_ENCODING_ERROR,
349
0
            OSSL_QUIC_FRAME_TYPE_NEW_TOKEN,
350
0
            "zero-length NEW_TOKEN");
351
0
        return 0;
352
0
    }
353
354
    /* store the new token in our token cache */
355
0
    if (!ossl_quic_set_peer_token(ossl_quic_port_get_channel_ctx(ch->port),
356
0
            &ch->cur_peer_addr, token, token_len))
357
0
        return 0;
358
359
0
    return 1;
360
0
}
361
362
/*
363
 * Returns 1 if no protocol violation has occurred. In this case *result will be
364
 * non-NULL unless this is an old deleted stream and we should ignore the frame
365
 * causing this function to be called. Returns 0 on protocol violation.
366
 */
367
static int depack_do_implicit_stream_create(QUIC_CHANNEL *ch,
368
    uint64_t stream_id,
369
    uint64_t frame_type,
370
    QUIC_STREAM **result)
371
0
{
372
0
    QUIC_STREAM *stream;
373
0
    uint64_t peer_role, stream_ordinal;
374
0
    uint64_t *p_next_ordinal_local, *p_next_ordinal_remote;
375
0
    QUIC_RXFC *max_streams_fc;
376
0
    int is_uni, is_remote_init;
377
378
0
    stream = ossl_quic_stream_map_get_by_id(&ch->qsm, stream_id);
379
0
    if (stream != NULL) {
380
0
        *result = stream;
381
0
        return 1;
382
0
    }
383
384
    /*
385
     * If we do not yet have a stream with the given ID, there are three
386
     * possibilities:
387
     *
388
     *   (a) The stream ID is for a remotely-created stream and the peer
389
     *       is creating a stream.
390
     *
391
     *   (b) The stream ID is for a locally-created stream which has
392
     *       previously been deleted.
393
     *
394
     *   (c) The stream ID is for a locally-created stream which does
395
     *       not exist yet. This is a protocol violation and we must
396
     *       terminate the connection in this case.
397
     *
398
     * We distinguish between (b) and (c) using the stream ID allocator
399
     * variable. Since stream ordinals are allocated monotonically, we
400
     * simply determine if the stream ordinal is in the future.
401
     */
402
0
    peer_role = ch->is_server
403
0
        ? QUIC_STREAM_INITIATOR_CLIENT
404
0
        : QUIC_STREAM_INITIATOR_SERVER;
405
406
0
    is_remote_init = ((stream_id & QUIC_STREAM_INITIATOR_MASK) == peer_role);
407
0
    is_uni = ((stream_id & QUIC_STREAM_DIR_MASK) == QUIC_STREAM_DIR_UNI);
408
409
0
    stream_ordinal = stream_id >> 2;
410
411
0
    if (is_remote_init) {
412
        /*
413
         * Peer-created stream which does not yet exist. Create it. QUIC stream
414
         * ordinals within a given stream type MUST be used in sequence and
415
         * receiving a STREAM frame for ordinal n must implicitly create streams
416
         * with ordinals [0, n) within that stream type even if no explicit
417
         * STREAM frames are received for those ordinals.
418
         */
419
0
        p_next_ordinal_remote = is_uni
420
0
            ? &ch->next_remote_stream_ordinal_uni
421
0
            : &ch->next_remote_stream_ordinal_bidi;
422
423
        /* Check this isn't violating stream count flow control. */
424
0
        max_streams_fc = is_uni
425
0
            ? &ch->max_streams_uni_rxfc
426
0
            : &ch->max_streams_bidi_rxfc;
427
428
0
        if (!ossl_quic_rxfc_on_rx_stream_frame(max_streams_fc,
429
0
                stream_ordinal + 1,
430
0
                /*is_fin=*/0)) {
431
0
            ossl_quic_channel_raise_protocol_error(ch,
432
0
                OSSL_QUIC_ERR_INTERNAL_ERROR,
433
0
                frame_type,
434
0
                "internal error (stream count RXFC)");
435
0
            return 0;
436
0
        }
437
438
0
        if (ossl_quic_rxfc_get_error(max_streams_fc, 0) != OSSL_QUIC_ERR_NO_ERROR) {
439
0
            ossl_quic_channel_raise_protocol_error(ch, OSSL_QUIC_ERR_STREAM_LIMIT_ERROR,
440
0
                frame_type,
441
0
                "exceeded maximum allowed streams");
442
0
            return 0;
443
0
        }
444
445
        /*
446
         * Create the named stream and any streams coming before it yet to be
447
         * created.
448
         */
449
0
        while (*p_next_ordinal_remote <= stream_ordinal) {
450
0
            uint64_t cur_stream_id = (*p_next_ordinal_remote << 2) | (stream_id & (QUIC_STREAM_DIR_MASK | QUIC_STREAM_INITIATOR_MASK));
451
452
0
            stream = ossl_quic_channel_new_stream_remote(ch, cur_stream_id);
453
0
            if (stream == NULL) {
454
0
                ossl_quic_channel_raise_protocol_error(ch,
455
0
                    OSSL_QUIC_ERR_INTERNAL_ERROR,
456
0
                    frame_type,
457
0
                    "internal error (stream allocation)");
458
0
                return 0;
459
0
            }
460
461
0
            ++*p_next_ordinal_remote;
462
0
        }
463
464
0
        *result = stream;
465
0
    } else {
466
        /* Locally-created stream which does not yet exist. */
467
0
        p_next_ordinal_local = is_uni
468
0
            ? &ch->next_local_stream_ordinal_uni
469
0
            : &ch->next_local_stream_ordinal_bidi;
470
471
0
        if (stream_ordinal >= *p_next_ordinal_local) {
472
            /*
473
             * We never created this stream yet, this is a protocol
474
             * violation.
475
             */
476
0
            ossl_quic_channel_raise_protocol_error(ch,
477
0
                OSSL_QUIC_ERR_STREAM_STATE_ERROR,
478
0
                frame_type,
479
0
                "STREAM frame for nonexistent "
480
0
                "stream");
481
0
            return 0;
482
0
        }
483
484
        /*
485
         * Otherwise this is for an old locally-initiated stream which we
486
         * have subsequently deleted. Ignore the data; it may simply be a
487
         * retransmission. We already take care of notifying the peer of the
488
         * termination of the stream during the stream deletion lifecycle.
489
         */
490
0
        *result = NULL;
491
0
    }
492
493
0
    return 1;
494
0
}
495
496
static int depack_do_frame_stream(PACKET *pkt, QUIC_CHANNEL *ch,
497
    OSSL_QRX_PKT *parent_pkt,
498
    OSSL_ACKM_RX_PKT *ackm_data,
499
    uint64_t frame_type,
500
    uint64_t *datalen)
501
0
{
502
0
    OSSL_QUIC_FRAME_STREAM frame_data;
503
0
    QUIC_STREAM *stream;
504
0
    uint64_t fce;
505
0
    size_t rs_avail;
506
0
    int rs_fin = 0;
507
508
0
    *datalen = 0;
509
510
0
    if (!ossl_quic_wire_decode_frame_stream(pkt, 0, &frame_data)) {
511
0
        ossl_quic_channel_raise_protocol_error(ch,
512
0
            OSSL_QUIC_ERR_FRAME_ENCODING_ERROR,
513
0
            frame_type,
514
0
            "decode error");
515
0
        return 0;
516
0
    }
517
518
0
    if (!depack_do_implicit_stream_create(ch, frame_data.stream_id,
519
0
            frame_type, &stream))
520
0
        return 0; /* protocol error raised by above call */
521
522
0
    if (stream == NULL)
523
        /*
524
         * Data for old stream which is not a protocol violation but should be
525
         * ignored, so stop here.
526
         */
527
0
        return 1;
528
529
0
    if (!ossl_quic_stream_has_recv(stream)) {
530
0
        ossl_quic_channel_raise_protocol_error(ch,
531
0
            OSSL_QUIC_ERR_STREAM_STATE_ERROR,
532
0
            frame_type,
533
0
            "STREAM frame for TX only "
534
0
            "stream");
535
0
        return 0;
536
0
    }
537
538
    /* Notify stream flow controller. */
539
0
    if (!ossl_quic_rxfc_on_rx_stream_frame(&stream->rxfc,
540
0
            frame_data.offset + frame_data.len,
541
0
            frame_data.is_fin)) {
542
0
        ossl_quic_channel_raise_protocol_error(ch,
543
0
            OSSL_QUIC_ERR_INTERNAL_ERROR,
544
0
            frame_type,
545
0
            "internal error (flow control)");
546
0
        return 0;
547
0
    }
548
549
    /* Has a flow control error occurred? */
550
0
    fce = ossl_quic_rxfc_get_error(&stream->rxfc, 0);
551
0
    if (fce != OSSL_QUIC_ERR_NO_ERROR) {
552
0
        ossl_quic_channel_raise_protocol_error(ch,
553
0
            fce,
554
0
            frame_type,
555
0
            "flow control violation");
556
0
        return 0;
557
0
    }
558
559
0
    switch (stream->recv_state) {
560
0
    case QUIC_RSTREAM_STATE_RECV:
561
0
    case QUIC_RSTREAM_STATE_SIZE_KNOWN:
562
        /*
563
         * It only makes sense to process incoming STREAM frames in these
564
         * states.
565
         */
566
0
        break;
567
568
0
    case QUIC_RSTREAM_STATE_DATA_RECVD:
569
0
    case QUIC_RSTREAM_STATE_DATA_READ:
570
0
    case QUIC_RSTREAM_STATE_RESET_RECVD:
571
0
    case QUIC_RSTREAM_STATE_RESET_READ:
572
0
    default:
573
        /*
574
         * We have no use for STREAM frames once the receive part reaches any of
575
         * these states, so just ignore.
576
         */
577
0
        return 1;
578
0
    }
579
580
    /* If we are in RECV, auto-transition to SIZE_KNOWN on FIN. */
581
0
    if (frame_data.is_fin
582
0
        && !ossl_quic_stream_recv_get_final_size(stream, NULL)) {
583
584
        /* State was already checked above, so can't fail. */
585
0
        ossl_quic_stream_map_notify_size_known_recv_part(&ch->qsm, stream,
586
0
            frame_data.offset
587
0
                + frame_data.len);
588
0
    }
589
590
    /*
591
     * If we requested STOP_SENDING do not bother buffering the data. Note that
592
     * this must happen after RXFC checks above as even if we sent STOP_SENDING
593
     * we must still enforce correct flow control (RFC 9000 s. 3.5).
594
     */
595
0
    if (stream->stop_sending)
596
0
        return 1; /* not an error - packet reordering, etc. */
597
598
    /*
599
     * The receive stream buffer may or may not choose to consume the data
600
     * without copying by reffing the OSSL_QRX_PKT. In this case
601
     * ossl_qrx_pkt_release() will be eventually called when the data is no
602
     * longer needed.
603
     *
604
     * It is OK for the peer to send us a zero-length non-FIN STREAM frame,
605
     * which is a no-op, aside from the fact that it ensures the stream exists.
606
     * In this case we have nothing to report to the receive buffer.
607
     */
608
0
    if ((frame_data.len > 0 || frame_data.is_fin)
609
0
        && !ossl_quic_rstream_queue_data(stream->rstream, parent_pkt,
610
0
            frame_data.offset,
611
0
            frame_data.data,
612
0
            frame_data.len,
613
0
            frame_data.is_fin)) {
614
0
        ossl_quic_channel_raise_protocol_error(ch,
615
0
            OSSL_QUIC_ERR_INTERNAL_ERROR,
616
0
            frame_type,
617
0
            "internal error (rstream queue)");
618
0
        return 0;
619
0
    }
620
621
    /*
622
     * rs_fin will be 1 only if we can read all data up to and including the FIN
623
     * without any gaps before it; this implies we have received all data. Avoid
624
     * calling ossl_quic_rstream_available() where it is not necessary as it is
625
     * more expensive.
626
     */
627
0
    if (stream->recv_state == QUIC_RSTREAM_STATE_SIZE_KNOWN
628
0
        && !ossl_quic_rstream_available(stream->rstream, &rs_avail, &rs_fin)) {
629
0
        ossl_quic_channel_raise_protocol_error(ch,
630
0
            OSSL_QUIC_ERR_INTERNAL_ERROR,
631
0
            frame_type,
632
0
            "internal error (rstream available)");
633
0
        return 0;
634
0
    }
635
636
0
    if (rs_fin)
637
0
        ossl_quic_stream_map_notify_totally_received(&ch->qsm, stream);
638
639
0
    *datalen = frame_data.len;
640
641
0
    return 1;
642
0
}
643
644
static void update_streams(QUIC_STREAM *s, void *arg)
645
0
{
646
0
    QUIC_CHANNEL *ch = arg;
647
648
0
    ossl_quic_stream_map_update_state(&ch->qsm, s);
649
0
}
650
651
static void update_streams_bidi(QUIC_STREAM *s, void *arg)
652
0
{
653
0
    QUIC_CHANNEL *ch = arg;
654
655
0
    if (!ossl_quic_stream_is_bidi(s))
656
0
        return;
657
658
0
    ossl_quic_stream_map_update_state(&ch->qsm, s);
659
0
}
660
661
static void update_streams_uni(QUIC_STREAM *s, void *arg)
662
0
{
663
0
    QUIC_CHANNEL *ch = arg;
664
665
0
    if (ossl_quic_stream_is_bidi(s))
666
0
        return;
667
668
0
    ossl_quic_stream_map_update_state(&ch->qsm, s);
669
0
}
670
671
static int depack_do_frame_max_data(PACKET *pkt, QUIC_CHANNEL *ch,
672
    OSSL_ACKM_RX_PKT *ackm_data)
673
0
{
674
0
    uint64_t max_data = 0;
675
676
0
    if (!ossl_quic_wire_decode_frame_max_data(pkt, &max_data)) {
677
0
        ossl_quic_channel_raise_protocol_error(ch,
678
0
            OSSL_QUIC_ERR_FRAME_ENCODING_ERROR,
679
0
            OSSL_QUIC_FRAME_TYPE_MAX_DATA,
680
0
            "decode error");
681
0
        return 0;
682
0
    }
683
684
0
    ossl_quic_txfc_bump_cwm(&ch->conn_txfc, max_data);
685
0
    ossl_quic_stream_map_visit(&ch->qsm, update_streams, ch);
686
0
    return 1;
687
0
}
688
689
static int depack_do_frame_max_stream_data(PACKET *pkt,
690
    QUIC_CHANNEL *ch,
691
    OSSL_ACKM_RX_PKT *ackm_data)
692
0
{
693
0
    uint64_t stream_id = 0;
694
0
    uint64_t max_stream_data = 0;
695
0
    QUIC_STREAM *stream;
696
697
0
    if (!ossl_quic_wire_decode_frame_max_stream_data(pkt, &stream_id,
698
0
            &max_stream_data)) {
699
0
        ossl_quic_channel_raise_protocol_error(ch,
700
0
            OSSL_QUIC_ERR_FRAME_ENCODING_ERROR,
701
0
            OSSL_QUIC_FRAME_TYPE_MAX_STREAM_DATA,
702
0
            "decode error");
703
0
        return 0;
704
0
    }
705
706
0
    if (!depack_do_implicit_stream_create(ch, stream_id,
707
0
            OSSL_QUIC_FRAME_TYPE_MAX_STREAM_DATA,
708
0
            &stream))
709
0
        return 0; /* error already raised for us */
710
711
0
    if (stream == NULL)
712
0
        return 1; /* old deleted stream, not a protocol violation, ignore */
713
714
0
    if (!ossl_quic_stream_has_send(stream)) {
715
0
        ossl_quic_channel_raise_protocol_error(ch,
716
0
            OSSL_QUIC_ERR_STREAM_STATE_ERROR,
717
0
            OSSL_QUIC_FRAME_TYPE_MAX_STREAM_DATA,
718
0
            "MAX_STREAM_DATA for TX only "
719
0
            "stream");
720
0
        return 0;
721
0
    }
722
723
0
    ossl_quic_txfc_bump_cwm(&stream->txfc, max_stream_data);
724
0
    ossl_quic_stream_map_update_state(&ch->qsm, stream);
725
0
    return 1;
726
0
}
727
728
static int depack_do_frame_max_streams(PACKET *pkt,
729
    QUIC_CHANNEL *ch,
730
    OSSL_ACKM_RX_PKT *ackm_data,
731
    uint64_t frame_type)
732
0
{
733
0
    uint64_t max_streams = 0;
734
735
0
    if (!ossl_quic_wire_decode_frame_max_streams(pkt, &max_streams)) {
736
0
        ossl_quic_channel_raise_protocol_error(ch,
737
0
            OSSL_QUIC_ERR_FRAME_ENCODING_ERROR,
738
0
            frame_type,
739
0
            "decode error");
740
0
        return 0;
741
0
    }
742
743
0
    if (max_streams > (((uint64_t)1) << 60)) {
744
0
        ossl_quic_channel_raise_protocol_error(ch,
745
0
            OSSL_QUIC_ERR_FRAME_ENCODING_ERROR,
746
0
            frame_type,
747
0
            "invalid max streams value");
748
0
        return 0;
749
0
    }
750
751
0
    switch (frame_type) {
752
0
    case OSSL_QUIC_FRAME_TYPE_MAX_STREAMS_BIDI:
753
0
        if (max_streams > ch->max_local_streams_bidi)
754
0
            ch->max_local_streams_bidi = max_streams;
755
756
        /* Some streams may now be able to send. */
757
0
        ossl_quic_stream_map_visit(&ch->qsm, update_streams_bidi, ch);
758
0
        break;
759
0
    case OSSL_QUIC_FRAME_TYPE_MAX_STREAMS_UNI:
760
0
        if (max_streams > ch->max_local_streams_uni)
761
0
            ch->max_local_streams_uni = max_streams;
762
763
        /* Some streams may now be able to send. */
764
0
        ossl_quic_stream_map_visit(&ch->qsm, update_streams_uni, ch);
765
0
        break;
766
0
    default:
767
0
        ossl_quic_channel_raise_protocol_error(ch,
768
0
            OSSL_QUIC_ERR_FRAME_ENCODING_ERROR,
769
0
            frame_type,
770
0
            "decode error");
771
0
        return 0;
772
0
    }
773
774
0
    return 1;
775
0
}
776
777
static int depack_do_frame_data_blocked(PACKET *pkt,
778
    QUIC_CHANNEL *ch,
779
    OSSL_ACKM_RX_PKT *ackm_data)
780
0
{
781
0
    uint64_t max_data = 0;
782
783
0
    if (!ossl_quic_wire_decode_frame_data_blocked(pkt, &max_data)) {
784
0
        ossl_quic_channel_raise_protocol_error(ch,
785
0
            OSSL_QUIC_ERR_FRAME_ENCODING_ERROR,
786
0
            OSSL_QUIC_FRAME_TYPE_DATA_BLOCKED,
787
0
            "decode error");
788
0
        return 0;
789
0
    }
790
791
    /* No-op - informative/debugging frame. */
792
0
    return 1;
793
0
}
794
795
static int depack_do_frame_stream_data_blocked(PACKET *pkt,
796
    QUIC_CHANNEL *ch,
797
    OSSL_ACKM_RX_PKT *ackm_data)
798
0
{
799
0
    uint64_t stream_id = 0;
800
0
    uint64_t max_data = 0;
801
0
    QUIC_STREAM *stream;
802
803
0
    if (!ossl_quic_wire_decode_frame_stream_data_blocked(pkt, &stream_id,
804
0
            &max_data)) {
805
0
        ossl_quic_channel_raise_protocol_error(ch,
806
0
            OSSL_QUIC_ERR_FRAME_ENCODING_ERROR,
807
0
            OSSL_QUIC_FRAME_TYPE_STREAM_DATA_BLOCKED,
808
0
            "decode error");
809
0
        return 0;
810
0
    }
811
812
    /*
813
     * This is an informative/debugging frame, so we don't have to do anything,
814
     * but it does trigger stream creation.
815
     */
816
0
    if (!depack_do_implicit_stream_create(ch, stream_id,
817
0
            OSSL_QUIC_FRAME_TYPE_STREAM_DATA_BLOCKED,
818
0
            &stream))
819
0
        return 0; /* error already raised for us */
820
821
0
    if (stream == NULL)
822
0
        return 1; /* old deleted stream, not a protocol violation, ignore */
823
824
0
    if (!ossl_quic_stream_has_recv(stream)) {
825
        /*
826
         * RFC 9000 s. 19.14: "An endpoint that receives a STREAM_DATA_BLOCKED
827
         * frame for a send-only stream MUST terminate the connection with error
828
         * STREAM_STATE_ERROR."
829
         */
830
0
        ossl_quic_channel_raise_protocol_error(ch,
831
0
            OSSL_QUIC_ERR_STREAM_STATE_ERROR,
832
0
            OSSL_QUIC_FRAME_TYPE_STREAM_DATA_BLOCKED,
833
0
            "STREAM_DATA_BLOCKED frame for "
834
0
            "TX only stream");
835
0
        return 0;
836
0
    }
837
838
    /* No-op - informative/debugging frame. */
839
0
    return 1;
840
0
}
841
842
static int depack_do_frame_streams_blocked(PACKET *pkt,
843
    QUIC_CHANNEL *ch,
844
    OSSL_ACKM_RX_PKT *ackm_data,
845
    uint64_t frame_type)
846
0
{
847
0
    uint64_t max_data = 0;
848
849
0
    if (!ossl_quic_wire_decode_frame_streams_blocked(pkt, &max_data)) {
850
0
        ossl_quic_channel_raise_protocol_error(ch,
851
0
            OSSL_QUIC_ERR_FRAME_ENCODING_ERROR,
852
0
            frame_type,
853
0
            "decode error");
854
0
        return 0;
855
0
    }
856
857
0
    if (max_data > (((uint64_t)1) << 60)) {
858
        /*
859
         * RFC 9000 s. 19.14: "This value cannot exceed 2**60, as it is not
860
         * possible to encode stream IDs larger than 2**62 - 1. Receipt of a
861
         * frame that encodes a larger stream ID MUST be treated as a connection
862
         * error of type STREAM_LIMIT_ERROR or FRAME_ENCODING_ERROR."
863
         */
864
0
        ossl_quic_channel_raise_protocol_error(ch,
865
0
            OSSL_QUIC_ERR_STREAM_LIMIT_ERROR,
866
0
            frame_type,
867
0
            "invalid stream count limit");
868
0
        return 0;
869
0
    }
870
871
    /* No-op - informative/debugging frame. */
872
0
    return 1;
873
0
}
874
875
static int depack_do_frame_new_conn_id(PACKET *pkt,
876
    QUIC_CHANNEL *ch,
877
    OSSL_ACKM_RX_PKT *ackm_data)
878
0
{
879
0
    OSSL_QUIC_FRAME_NEW_CONN_ID frame_data;
880
881
0
    if (!ossl_quic_wire_decode_frame_new_conn_id(pkt, &frame_data)) {
882
0
        ossl_quic_channel_raise_protocol_error(ch,
883
0
            OSSL_QUIC_ERR_FRAME_ENCODING_ERROR,
884
0
            OSSL_QUIC_FRAME_TYPE_NEW_CONN_ID,
885
0
            "decode error");
886
0
        return 0;
887
0
    }
888
889
0
    ossl_quic_channel_on_new_conn_id(ch, &frame_data);
890
891
0
    return 1;
892
0
}
893
894
static int depack_do_frame_retire_conn_id(PACKET *pkt,
895
    QUIC_CHANNEL *ch,
896
    OSSL_ACKM_RX_PKT *ackm_data)
897
0
{
898
0
    uint64_t seq_num;
899
900
0
    if (!ossl_quic_wire_decode_frame_retire_conn_id(pkt, &seq_num)) {
901
0
        ossl_quic_channel_raise_protocol_error(ch,
902
0
            OSSL_QUIC_ERR_FRAME_ENCODING_ERROR,
903
0
            OSSL_QUIC_FRAME_TYPE_RETIRE_CONN_ID,
904
0
            "decode error");
905
0
        return 0;
906
0
    }
907
908
    /*
909
     * RFC 9000 s. 19.16: "An endpoint cannot send this frame if it was provided
910
     * with a zero-length connection ID by its peer. An endpoint that provides a
911
     * zero-length connection ID MUST treat receipt of a RETIRE_CONNECTION_ID
912
     * frame as a connection error of type PROTOCOL_VIOLATION."
913
     *
914
     * Since we always use a zero-length SCID as a client, there is no case
915
     * where it is valid for a server to send this. Our server support is
916
     * currently non-conformant and for internal testing use; simply handle it
917
     * as a no-op in this case.
918
     *
919
     * TODO(QUIC FUTURE): Revise and implement correctly for server support.
920
     */
921
0
    if (!ch->is_server) {
922
0
        ossl_quic_channel_raise_protocol_error(ch,
923
0
            OSSL_QUIC_ERR_PROTOCOL_VIOLATION,
924
0
            OSSL_QUIC_FRAME_TYPE_RETIRE_CONN_ID,
925
0
            "conn has zero-length CID");
926
0
        return 0;
927
0
    }
928
929
0
    return 1;
930
0
}
931
932
static void free_path_response(unsigned char *buf, size_t buf_len, void *arg)
933
0
{
934
0
    OPENSSL_free(buf);
935
0
}
936
937
static int depack_do_frame_path_challenge(PACKET *pkt,
938
    QUIC_CHANNEL *ch,
939
    OSSL_ACKM_RX_PKT *ackm_data)
940
0
{
941
0
    uint64_t frame_data = 0;
942
0
    unsigned char *encoded = NULL;
943
0
    size_t encoded_len;
944
0
    WPACKET wpkt;
945
946
0
    if (!ossl_quic_wire_decode_frame_path_challenge(pkt, &frame_data)) {
947
0
        ossl_quic_channel_raise_protocol_error(ch,
948
0
            OSSL_QUIC_ERR_FRAME_ENCODING_ERROR,
949
0
            OSSL_QUIC_FRAME_TYPE_PATH_CHALLENGE,
950
0
            "decode error");
951
0
        return 0;
952
0
    }
953
954
    /*
955
     * RFC 9000 s. 8.2.2: On receiving a PATH_CHALLENGE frame, an endpoint MUST
956
     * respond by echoing the data contained in the PATH_CHALLENGE frame in a
957
     * PATH_RESPONSE frame.
958
     *
959
     * TODO(QUIC FUTURE): We should try to avoid allocation here in the future.
960
     */
961
0
    encoded_len = sizeof(uint64_t) + 1;
962
0
    if ((encoded = OPENSSL_malloc(encoded_len)) == NULL)
963
0
        goto err;
964
965
0
    if (!WPACKET_init_static_len(&wpkt, encoded, encoded_len, 0))
966
0
        goto err;
967
968
0
    if (!ossl_quic_wire_encode_frame_path_response(&wpkt, frame_data)) {
969
0
        WPACKET_cleanup(&wpkt);
970
0
        goto err;
971
0
    }
972
973
0
    WPACKET_finish(&wpkt);
974
975
0
    if (!ossl_quic_cfq_add_frame(ch->cfq, 0, QUIC_PN_SPACE_APP,
976
0
            OSSL_QUIC_FRAME_TYPE_PATH_RESPONSE,
977
0
            QUIC_CFQ_ITEM_FLAG_UNRELIABLE,
978
0
            encoded, encoded_len,
979
0
            free_path_response, NULL))
980
0
        goto err;
981
982
0
    return 1;
983
984
0
err:
985
0
    OPENSSL_free(encoded);
986
0
    ossl_quic_channel_raise_protocol_error(ch, OSSL_QUIC_ERR_INTERNAL_ERROR,
987
0
        OSSL_QUIC_FRAME_TYPE_PATH_CHALLENGE,
988
0
        "internal error");
989
0
    return 0;
990
0
}
991
992
static int depack_do_frame_path_response(PACKET *pkt,
993
    QUIC_CHANNEL *ch,
994
    OSSL_ACKM_RX_PKT *ackm_data)
995
0
{
996
0
    uint64_t frame_data = 0;
997
998
0
    if (!ossl_quic_wire_decode_frame_path_response(pkt, &frame_data)) {
999
0
        ossl_quic_channel_raise_protocol_error(ch,
1000
0
            OSSL_QUIC_ERR_FRAME_ENCODING_ERROR,
1001
0
            OSSL_QUIC_FRAME_TYPE_PATH_RESPONSE,
1002
0
            "decode error");
1003
0
        return 0;
1004
0
    }
1005
1006
    /* TODO(QUIC MULTIPATH): ADD CODE to send |frame_data| to the ch manager */
1007
1008
0
    return 1;
1009
0
}
1010
1011
static int depack_do_frame_conn_close(PACKET *pkt, QUIC_CHANNEL *ch,
1012
    uint64_t frame_type)
1013
0
{
1014
0
    OSSL_QUIC_FRAME_CONN_CLOSE frame_data;
1015
1016
0
    if (!ossl_quic_wire_decode_frame_conn_close(pkt, &frame_data)) {
1017
0
        ossl_quic_channel_raise_protocol_error(ch,
1018
0
            OSSL_QUIC_ERR_FRAME_ENCODING_ERROR,
1019
0
            frame_type,
1020
0
            "decode error");
1021
0
        return 0;
1022
0
    }
1023
1024
0
    ossl_quic_channel_on_remote_conn_close(ch, &frame_data);
1025
0
    return 1;
1026
0
}
1027
1028
static int depack_do_frame_handshake_done(PACKET *pkt,
1029
    QUIC_CHANNEL *ch,
1030
    OSSL_ACKM_RX_PKT *ackm_data)
1031
0
{
1032
0
    if (!ossl_quic_wire_decode_frame_handshake_done(pkt)) {
1033
        /* This can fail only with an internal error. */
1034
0
        ossl_quic_channel_raise_protocol_error(ch,
1035
0
            OSSL_QUIC_ERR_INTERNAL_ERROR,
1036
0
            OSSL_QUIC_FRAME_TYPE_HANDSHAKE_DONE,
1037
0
            "internal error (decode frame handshake done)");
1038
0
        return 0;
1039
0
    }
1040
1041
0
    ossl_quic_channel_on_handshake_confirmed(ch);
1042
0
    return 1;
1043
0
}
1044
1045
/* Main frame processor */
1046
1047
static int depack_process_frames(QUIC_CHANNEL *ch, PACKET *pkt,
1048
    OSSL_QRX_PKT *parent_pkt, uint32_t enc_level,
1049
    OSSL_TIME received, OSSL_ACKM_RX_PKT *ackm_data)
1050
0
{
1051
0
    uint32_t pkt_type = parent_pkt->hdr->type;
1052
0
    uint32_t packet_space = ossl_quic_enc_level_to_pn_space(enc_level);
1053
1054
0
    if (PACKET_remaining(pkt) == 0) {
1055
        /*
1056
         * RFC 9000 s. 12.4: An endpoint MUST treat receipt of a packet
1057
         * containing no frames as a connection error of type
1058
         * PROTOCOL_VIOLATION.
1059
         */
1060
0
        ossl_quic_channel_raise_protocol_error(ch,
1061
0
            OSSL_QUIC_ERR_PROTOCOL_VIOLATION,
1062
0
            0,
1063
0
            "empty packet payload");
1064
0
        return 0;
1065
0
    }
1066
1067
0
    while (PACKET_remaining(pkt) > 0) {
1068
0
        int was_minimal;
1069
0
        uint64_t frame_type;
1070
0
        const unsigned char *sof = NULL;
1071
0
        uint64_t datalen = 0;
1072
1073
0
        if (ch->msg_callback != NULL)
1074
0
            sof = PACKET_data(pkt);
1075
1076
0
        if (!ossl_quic_wire_peek_frame_header(pkt, &frame_type, &was_minimal)) {
1077
0
            ossl_quic_channel_raise_protocol_error(ch,
1078
0
                OSSL_QUIC_ERR_PROTOCOL_VIOLATION,
1079
0
                0,
1080
0
                "malformed frame header");
1081
0
            return 0;
1082
0
        }
1083
1084
0
        if (!was_minimal) {
1085
0
            ossl_quic_channel_raise_protocol_error(ch,
1086
0
                OSSL_QUIC_ERR_PROTOCOL_VIOLATION,
1087
0
                frame_type,
1088
0
                "non-minimal frame type encoding");
1089
0
            return 0;
1090
0
        }
1091
1092
        /*
1093
         * There are only a few frame types which are not ACK-eliciting. Handle
1094
         * these centrally to make error handling cases more resilient, as we
1095
         * should tell the ACKM about an ACK-eliciting frame even if it was not
1096
         * successfully handled.
1097
         */
1098
0
        switch (frame_type) {
1099
0
        case OSSL_QUIC_FRAME_TYPE_PADDING:
1100
0
        case OSSL_QUIC_FRAME_TYPE_ACK_WITHOUT_ECN:
1101
0
        case OSSL_QUIC_FRAME_TYPE_ACK_WITH_ECN:
1102
0
        case OSSL_QUIC_FRAME_TYPE_CONN_CLOSE_TRANSPORT:
1103
0
        case OSSL_QUIC_FRAME_TYPE_CONN_CLOSE_APP:
1104
0
            break;
1105
0
        default:
1106
0
            ackm_data->is_ack_eliciting = 1;
1107
0
            break;
1108
0
        }
1109
1110
0
        switch (frame_type) {
1111
0
        case OSSL_QUIC_FRAME_TYPE_PING:
1112
            /* Allowed in all packet types */
1113
0
            if (!depack_do_frame_ping(pkt, ch, enc_level, ackm_data))
1114
0
                return 0;
1115
0
            break;
1116
0
        case OSSL_QUIC_FRAME_TYPE_PADDING:
1117
            /* Allowed in all packet types */
1118
0
            if (!depack_do_frame_padding(pkt))
1119
0
                return 0;
1120
0
            break;
1121
1122
0
        case OSSL_QUIC_FRAME_TYPE_ACK_WITHOUT_ECN:
1123
0
        case OSSL_QUIC_FRAME_TYPE_ACK_WITH_ECN:
1124
            /* ACK frames are valid everywhere except in 0RTT packets */
1125
0
            if (pkt_type == QUIC_PKT_TYPE_0RTT) {
1126
0
                ossl_quic_channel_raise_protocol_error(ch,
1127
0
                    OSSL_QUIC_ERR_PROTOCOL_VIOLATION,
1128
0
                    frame_type,
1129
0
                    "ACK not valid in 0-RTT");
1130
0
                return 0;
1131
0
            }
1132
0
            if (!depack_do_frame_ack(pkt, ch, packet_space, received,
1133
0
                    frame_type, parent_pkt))
1134
0
                return 0;
1135
0
            break;
1136
1137
0
        case OSSL_QUIC_FRAME_TYPE_RESET_STREAM:
1138
            /* RESET_STREAM frames are valid in 0RTT and 1RTT packets */
1139
0
            if (pkt_type != QUIC_PKT_TYPE_0RTT
1140
0
                && pkt_type != QUIC_PKT_TYPE_1RTT) {
1141
0
                ossl_quic_channel_raise_protocol_error(ch,
1142
0
                    OSSL_QUIC_ERR_PROTOCOL_VIOLATION,
1143
0
                    frame_type,
1144
0
                    "RESET_STREAM not valid in "
1145
0
                    "INITIAL/HANDSHAKE");
1146
0
                return 0;
1147
0
            }
1148
0
            if (!depack_do_frame_reset_stream(pkt, ch, ackm_data))
1149
0
                return 0;
1150
0
            break;
1151
0
        case OSSL_QUIC_FRAME_TYPE_STOP_SENDING:
1152
            /* STOP_SENDING frames are valid in 0RTT and 1RTT packets */
1153
0
            if (pkt_type != QUIC_PKT_TYPE_0RTT
1154
0
                && pkt_type != QUIC_PKT_TYPE_1RTT) {
1155
0
                ossl_quic_channel_raise_protocol_error(ch,
1156
0
                    OSSL_QUIC_ERR_PROTOCOL_VIOLATION,
1157
0
                    frame_type,
1158
0
                    "STOP_SENDING not valid in "
1159
0
                    "INITIAL/HANDSHAKE");
1160
0
                return 0;
1161
0
            }
1162
0
            if (!depack_do_frame_stop_sending(pkt, ch, ackm_data))
1163
0
                return 0;
1164
0
            break;
1165
0
        case OSSL_QUIC_FRAME_TYPE_CRYPTO:
1166
            /* CRYPTO frames are valid everywhere except in 0RTT packets */
1167
0
            if (pkt_type == QUIC_PKT_TYPE_0RTT) {
1168
0
                ossl_quic_channel_raise_protocol_error(ch,
1169
0
                    OSSL_QUIC_ERR_PROTOCOL_VIOLATION,
1170
0
                    frame_type,
1171
0
                    "CRYPTO frame not valid in 0-RTT");
1172
0
                return 0;
1173
0
            }
1174
0
            if (!depack_do_frame_crypto(pkt, ch, parent_pkt, ackm_data, &datalen))
1175
0
                return 0;
1176
0
            break;
1177
0
        case OSSL_QUIC_FRAME_TYPE_NEW_TOKEN:
1178
            /* NEW_TOKEN frames are valid in 1RTT packets */
1179
0
            if (pkt_type != QUIC_PKT_TYPE_1RTT) {
1180
0
                ossl_quic_channel_raise_protocol_error(ch,
1181
0
                    OSSL_QUIC_ERR_PROTOCOL_VIOLATION,
1182
0
                    frame_type,
1183
0
                    "NEW_TOKEN valid only in 1-RTT");
1184
0
                return 0;
1185
0
            }
1186
1187
            /*
1188
             * RFC 9000 s. 19.7: "A server MUST treat receipt of a NEW_TOKEN
1189
             * frame as a connection error of type PROTOCOL_VIOLATION."
1190
             */
1191
0
            if (ch->is_server) {
1192
0
                ossl_quic_channel_raise_protocol_error(ch,
1193
0
                    OSSL_QUIC_ERR_PROTOCOL_VIOLATION,
1194
0
                    frame_type,
1195
0
                    "NEW_TOKEN can only be sent by a server");
1196
0
                return 0;
1197
0
            }
1198
1199
0
            if (!depack_do_frame_new_token(pkt, ch, ackm_data))
1200
0
                return 0;
1201
0
            break;
1202
1203
0
        case OSSL_QUIC_FRAME_TYPE_STREAM:
1204
0
        case OSSL_QUIC_FRAME_TYPE_STREAM_FIN:
1205
0
        case OSSL_QUIC_FRAME_TYPE_STREAM_LEN:
1206
0
        case OSSL_QUIC_FRAME_TYPE_STREAM_LEN_FIN:
1207
0
        case OSSL_QUIC_FRAME_TYPE_STREAM_OFF:
1208
0
        case OSSL_QUIC_FRAME_TYPE_STREAM_OFF_FIN:
1209
0
        case OSSL_QUIC_FRAME_TYPE_STREAM_OFF_LEN:
1210
0
        case OSSL_QUIC_FRAME_TYPE_STREAM_OFF_LEN_FIN:
1211
            /* STREAM frames are valid in 0RTT and 1RTT packets */
1212
0
            if (pkt_type != QUIC_PKT_TYPE_0RTT
1213
0
                && pkt_type != QUIC_PKT_TYPE_1RTT) {
1214
0
                ossl_quic_channel_raise_protocol_error(ch,
1215
0
                    OSSL_QUIC_ERR_PROTOCOL_VIOLATION,
1216
0
                    frame_type,
1217
0
                    "STREAM valid only in 0/1-RTT");
1218
0
                return 0;
1219
0
            }
1220
0
            if (!depack_do_frame_stream(pkt, ch, parent_pkt, ackm_data,
1221
0
                    frame_type, &datalen))
1222
0
                return 0;
1223
0
            break;
1224
1225
0
        case OSSL_QUIC_FRAME_TYPE_MAX_DATA:
1226
            /* MAX_DATA frames are valid in 0RTT and 1RTT packets */
1227
0
            if (pkt_type != QUIC_PKT_TYPE_0RTT
1228
0
                && pkt_type != QUIC_PKT_TYPE_1RTT) {
1229
0
                ossl_quic_channel_raise_protocol_error(ch,
1230
0
                    OSSL_QUIC_ERR_PROTOCOL_VIOLATION,
1231
0
                    frame_type,
1232
0
                    "MAX_DATA valid only in 0/1-RTT");
1233
0
                return 0;
1234
0
            }
1235
0
            if (!depack_do_frame_max_data(pkt, ch, ackm_data))
1236
0
                return 0;
1237
0
            break;
1238
0
        case OSSL_QUIC_FRAME_TYPE_MAX_STREAM_DATA:
1239
            /* MAX_STREAM_DATA frames are valid in 0RTT and 1RTT packets */
1240
0
            if (pkt_type != QUIC_PKT_TYPE_0RTT
1241
0
                && pkt_type != QUIC_PKT_TYPE_1RTT) {
1242
0
                ossl_quic_channel_raise_protocol_error(ch,
1243
0
                    OSSL_QUIC_ERR_PROTOCOL_VIOLATION,
1244
0
                    frame_type,
1245
0
                    "MAX_STREAM_DATA valid only in 0/1-RTT");
1246
0
                return 0;
1247
0
            }
1248
0
            if (!depack_do_frame_max_stream_data(pkt, ch, ackm_data))
1249
0
                return 0;
1250
0
            break;
1251
1252
0
        case OSSL_QUIC_FRAME_TYPE_MAX_STREAMS_BIDI:
1253
0
        case OSSL_QUIC_FRAME_TYPE_MAX_STREAMS_UNI:
1254
            /* MAX_STREAMS frames are valid in 0RTT and 1RTT packets */
1255
0
            if (pkt_type != QUIC_PKT_TYPE_0RTT
1256
0
                && pkt_type != QUIC_PKT_TYPE_1RTT) {
1257
0
                ossl_quic_channel_raise_protocol_error(ch,
1258
0
                    OSSL_QUIC_ERR_PROTOCOL_VIOLATION,
1259
0
                    frame_type,
1260
0
                    "MAX_STREAMS valid only in 0/1-RTT");
1261
0
                return 0;
1262
0
            }
1263
0
            if (!depack_do_frame_max_streams(pkt, ch, ackm_data,
1264
0
                    frame_type))
1265
0
                return 0;
1266
0
            break;
1267
1268
0
        case OSSL_QUIC_FRAME_TYPE_DATA_BLOCKED:
1269
            /* DATA_BLOCKED frames are valid in 0RTT and 1RTT packets */
1270
0
            if (pkt_type != QUIC_PKT_TYPE_0RTT
1271
0
                && pkt_type != QUIC_PKT_TYPE_1RTT) {
1272
0
                ossl_quic_channel_raise_protocol_error(ch,
1273
0
                    OSSL_QUIC_ERR_PROTOCOL_VIOLATION,
1274
0
                    frame_type,
1275
0
                    "DATA_BLOCKED valid only in 0/1-RTT");
1276
0
                return 0;
1277
0
            }
1278
0
            if (!depack_do_frame_data_blocked(pkt, ch, ackm_data))
1279
0
                return 0;
1280
0
            break;
1281
0
        case OSSL_QUIC_FRAME_TYPE_STREAM_DATA_BLOCKED:
1282
            /* STREAM_DATA_BLOCKED frames are valid in 0RTT and 1RTT packets */
1283
0
            if (pkt_type != QUIC_PKT_TYPE_0RTT
1284
0
                && pkt_type != QUIC_PKT_TYPE_1RTT) {
1285
0
                ossl_quic_channel_raise_protocol_error(ch,
1286
0
                    OSSL_QUIC_ERR_PROTOCOL_VIOLATION,
1287
0
                    frame_type,
1288
0
                    "STREAM_DATA_BLOCKED valid only in 0/1-RTT");
1289
0
                return 0;
1290
0
            }
1291
0
            if (!depack_do_frame_stream_data_blocked(pkt, ch, ackm_data))
1292
0
                return 0;
1293
0
            break;
1294
1295
0
        case OSSL_QUIC_FRAME_TYPE_STREAMS_BLOCKED_BIDI:
1296
0
        case OSSL_QUIC_FRAME_TYPE_STREAMS_BLOCKED_UNI:
1297
            /* STREAMS_BLOCKED frames are valid in 0RTT and 1RTT packets */
1298
0
            if (pkt_type != QUIC_PKT_TYPE_0RTT
1299
0
                && pkt_type != QUIC_PKT_TYPE_1RTT) {
1300
0
                ossl_quic_channel_raise_protocol_error(ch,
1301
0
                    OSSL_QUIC_ERR_PROTOCOL_VIOLATION,
1302
0
                    frame_type,
1303
0
                    "STREAMS valid only in 0/1-RTT");
1304
0
                return 0;
1305
0
            }
1306
0
            if (!depack_do_frame_streams_blocked(pkt, ch, ackm_data,
1307
0
                    frame_type))
1308
0
                return 0;
1309
0
            break;
1310
1311
0
        case OSSL_QUIC_FRAME_TYPE_NEW_CONN_ID:
1312
            /* NEW_CONN_ID frames are valid in 0RTT and 1RTT packets */
1313
0
            if (pkt_type != QUIC_PKT_TYPE_0RTT
1314
0
                && pkt_type != QUIC_PKT_TYPE_1RTT) {
1315
0
                ossl_quic_channel_raise_protocol_error(ch,
1316
0
                    OSSL_QUIC_ERR_PROTOCOL_VIOLATION,
1317
0
                    frame_type,
1318
0
                    "NEW_CONN_ID valid only in 0/1-RTT");
1319
0
            }
1320
0
            if (!depack_do_frame_new_conn_id(pkt, ch, ackm_data))
1321
0
                return 0;
1322
0
            break;
1323
0
        case OSSL_QUIC_FRAME_TYPE_RETIRE_CONN_ID:
1324
            /* RETIRE_CONN_ID frames are valid in 0RTT and 1RTT packets */
1325
0
            if (pkt_type != QUIC_PKT_TYPE_0RTT
1326
0
                && pkt_type != QUIC_PKT_TYPE_1RTT) {
1327
0
                ossl_quic_channel_raise_protocol_error(ch,
1328
0
                    OSSL_QUIC_ERR_PROTOCOL_VIOLATION,
1329
0
                    frame_type,
1330
0
                    "RETIRE_CONN_ID valid only in 0/1-RTT");
1331
0
                return 0;
1332
0
            }
1333
0
            if (!depack_do_frame_retire_conn_id(pkt, ch, ackm_data))
1334
0
                return 0;
1335
0
            break;
1336
0
        case OSSL_QUIC_FRAME_TYPE_PATH_CHALLENGE:
1337
            /* PATH_CHALLENGE frames are valid in 0RTT and 1RTT packets */
1338
0
            if (pkt_type != QUIC_PKT_TYPE_0RTT
1339
0
                && pkt_type != QUIC_PKT_TYPE_1RTT) {
1340
0
                ossl_quic_channel_raise_protocol_error(ch,
1341
0
                    OSSL_QUIC_ERR_PROTOCOL_VIOLATION,
1342
0
                    frame_type,
1343
0
                    "PATH_CHALLENGE valid only in 0/1-RTT");
1344
0
                return 0;
1345
0
            }
1346
0
            if (!depack_do_frame_path_challenge(pkt, ch, ackm_data))
1347
0
                return 0;
1348
1349
0
            break;
1350
0
        case OSSL_QUIC_FRAME_TYPE_PATH_RESPONSE:
1351
            /* PATH_RESPONSE frames are valid in 1RTT packets */
1352
0
            if (pkt_type != QUIC_PKT_TYPE_1RTT) {
1353
0
                ossl_quic_channel_raise_protocol_error(ch,
1354
0
                    OSSL_QUIC_ERR_PROTOCOL_VIOLATION,
1355
0
                    frame_type,
1356
0
                    "PATH_CHALLENGE valid only in 1-RTT");
1357
0
                return 0;
1358
0
            }
1359
0
            if (!depack_do_frame_path_response(pkt, ch, ackm_data))
1360
0
                return 0;
1361
0
            break;
1362
1363
0
        case OSSL_QUIC_FRAME_TYPE_CONN_CLOSE_APP:
1364
            /* CONN_CLOSE_APP frames are valid in 0RTT and 1RTT packets */
1365
0
            if (pkt_type != QUIC_PKT_TYPE_0RTT
1366
0
                && pkt_type != QUIC_PKT_TYPE_1RTT) {
1367
0
                ossl_quic_channel_raise_protocol_error(ch,
1368
0
                    OSSL_QUIC_ERR_PROTOCOL_VIOLATION,
1369
0
                    frame_type,
1370
0
                    "CONN_CLOSE (APP) valid only in 0/1-RTT");
1371
0
                return 0;
1372
0
            }
1373
            /* FALLTHRU */
1374
0
        case OSSL_QUIC_FRAME_TYPE_CONN_CLOSE_TRANSPORT:
1375
            /* CONN_CLOSE_TRANSPORT frames are valid in all packets */
1376
0
            if (!depack_do_frame_conn_close(pkt, ch, frame_type))
1377
0
                return 0;
1378
0
            break;
1379
1380
0
        case OSSL_QUIC_FRAME_TYPE_HANDSHAKE_DONE:
1381
            /* HANDSHAKE_DONE frames are valid in 1RTT packets */
1382
0
            if (pkt_type != QUIC_PKT_TYPE_1RTT) {
1383
0
                ossl_quic_channel_raise_protocol_error(ch,
1384
0
                    OSSL_QUIC_ERR_PROTOCOL_VIOLATION,
1385
0
                    frame_type,
1386
0
                    "HANDSHAKE_DONE valid only in 1-RTT");
1387
0
                return 0;
1388
0
            }
1389
0
            if (!depack_do_frame_handshake_done(pkt, ch, ackm_data))
1390
0
                return 0;
1391
0
            break;
1392
1393
0
        default:
1394
            /* Unknown frame type */
1395
0
            ossl_quic_channel_raise_protocol_error(ch,
1396
0
                OSSL_QUIC_ERR_FRAME_ENCODING_ERROR,
1397
0
                frame_type,
1398
0
                "Unknown frame type received");
1399
0
            return 0;
1400
0
        }
1401
1402
0
        if (ch->msg_callback != NULL) {
1403
0
            int ctype = SSL3_RT_QUIC_FRAME_FULL;
1404
1405
0
            size_t framelen = PACKET_data(pkt) - sof;
1406
1407
0
            if (frame_type == OSSL_QUIC_FRAME_TYPE_PADDING) {
1408
0
                ctype = SSL3_RT_QUIC_FRAME_PADDING;
1409
0
            } else if (OSSL_QUIC_FRAME_TYPE_IS_STREAM(frame_type)
1410
0
                || frame_type == OSSL_QUIC_FRAME_TYPE_CRYPTO) {
1411
0
                ctype = SSL3_RT_QUIC_FRAME_HEADER;
1412
0
                framelen -= (size_t)datalen;
1413
0
            }
1414
1415
0
            ch->msg_callback(0, OSSL_QUIC1_VERSION, ctype, sof, framelen,
1416
0
                ch->msg_callback_ssl, ch->msg_callback_arg);
1417
0
        }
1418
0
    }
1419
1420
0
    return 1;
1421
0
}
1422
1423
QUIC_NEEDS_LOCK
1424
int ossl_quic_handle_frames(QUIC_CHANNEL *ch, OSSL_QRX_PKT *qpacket)
1425
0
{
1426
0
    PACKET pkt;
1427
0
    OSSL_ACKM_RX_PKT ackm_data;
1428
0
    uint32_t enc_level;
1429
0
    size_t dgram_len = qpacket->datagram_len;
1430
1431
0
    if (ch == NULL)
1432
0
        return 0;
1433
1434
0
    ch->did_crypto_frame = 0;
1435
1436
    /* Initialize |ackm_data| (and reinitialize |ok|)*/
1437
0
    memset(&ackm_data, 0, sizeof(ackm_data));
1438
    /*
1439
     * ASSUMPTION: All packets that aren't special case have a
1440
     * packet number.
1441
     */
1442
0
    ackm_data.pkt_num = qpacket->pn;
1443
0
    ackm_data.time = qpacket->time;
1444
0
    enc_level = ossl_quic_pkt_type_to_enc_level(qpacket->hdr->type);
1445
0
    if (enc_level >= QUIC_ENC_LEVEL_NUM)
1446
        /*
1447
         * Retry and Version Negotiation packets should not be passed to this
1448
         * function.
1449
         */
1450
0
        return 0;
1451
1452
0
    ackm_data.pkt_space = ossl_quic_enc_level_to_pn_space(enc_level);
1453
1454
    /*
1455
     * RFC 9000 s. 8.1
1456
     * We can consider the connection to be validated, if we receive a packet
1457
     * from the client protected via handshake keys, meaning that the
1458
     * amplification limit no longer applies (i.e. we can set it as validated.
1459
     * Otherwise, add the size of this packet to the unvalidated credit for
1460
     * the connection.
1461
     */
1462
0
    if (enc_level == QUIC_ENC_LEVEL_HANDSHAKE)
1463
0
        ossl_quic_tx_packetiser_set_validated(ch->txp);
1464
0
    else
1465
0
        ossl_quic_tx_packetiser_add_unvalidated_credit(ch->txp, dgram_len);
1466
1467
    /* Now that special cases are out of the way, parse frames */
1468
0
    if (!PACKET_buf_init(&pkt, qpacket->hdr->data, qpacket->hdr->len)
1469
0
        || !depack_process_frames(ch, &pkt, qpacket,
1470
0
            enc_level,
1471
0
            qpacket->time,
1472
0
            &ackm_data))
1473
0
        return 0;
1474
1475
0
    ossl_ackm_on_rx_packet(ch->ackm, &ackm_data);
1476
1477
0
    return 1;
1478
0
}