Skip to main content

rustls_jls/server/
server_conn.rs

1use alloc::boxed::Box;
2use alloc::vec::Vec;
3use core::fmt;
4use core::fmt::{Debug, Formatter};
5use core::marker::PhantomData;
6use core::ops::{Deref, DerefMut};
7#[cfg(feature = "std")]
8use std::io;
9
10use pki_types::{DnsName, UnixTime};
11
12use super::hs;
13#[cfg(feature = "std")]
14use crate::WantsVerifier;
15use crate::builder::ConfigBuilder;
16use crate::common_state::{CommonState, Side};
17#[cfg(feature = "std")]
18use crate::common_state::{Protocol, State};
19use crate::conn::{ConnectionCommon, ConnectionCore, UnbufferedConnectionCommon};
20#[cfg(doc)]
21use crate::crypto;
22use crate::crypto::CryptoProvider;
23use crate::enums::{CertificateType, CipherSuite, ProtocolVersion, SignatureScheme};
24use crate::error::Error;
25use crate::kernel::KernelConnection;
26use crate::log::trace;
27use crate::msgs::base::Payload;
28use crate::msgs::handshake::{ClientHelloPayload, ProtocolName, ServerExtensionsInput};
29use crate::msgs::message::Message;
30use crate::suites::ExtractedSecrets;
31use crate::sync::Arc;
32#[cfg(feature = "std")]
33use crate::time_provider::DefaultTimeProvider;
34use crate::time_provider::TimeProvider;
35use crate::vecbuf::ChunkVecBuffer;
36use crate::{
37    DistinguishedName, KeyLog, NamedGroup, WantsVersions, compress, sign, verify, versions,
38};
39
40/// A trait for the ability to store server session data.
41///
42/// The keys and values are opaque.
43///
44/// Inserted keys are randomly chosen by the library and have
45/// no internal structure (in other words, you may rely on all
46/// bits being uniformly random).  Queried keys are untrusted data.
47///
48/// Both the keys and values should be treated as
49/// **highly sensitive data**, containing enough key material
50/// to break all security of the corresponding sessions.
51///
52/// Implementations can be lossy (in other words, forgetting
53/// key/value pairs) without any negative security consequences.
54///
55/// However, note that `take` **must** reliably delete a returned
56/// value.  If it does not, there may be security consequences.
57///
58/// `put` and `take` are mutating operations; this isn't expressed
59/// in the type system to allow implementations freedom in
60/// how to achieve interior mutability.  `Mutex` is a common
61/// choice.
62pub trait StoresServerSessions: Debug + Send + Sync {
63    /// Store session secrets encoded in `value` against `key`,
64    /// overwrites any existing value against `key`.  Returns `true`
65    /// if the value was stored.
66    fn put(&self, key: Vec<u8>, value: Vec<u8>) -> bool;
67
68    /// Find a value with the given `key`.  Return it, or None
69    /// if it doesn't exist.
70    fn get(&self, key: &[u8]) -> Option<Vec<u8>>;
71
72    /// Find a value with the given `key`.  Return it and delete it;
73    /// or None if it doesn't exist.
74    fn take(&self, key: &[u8]) -> Option<Vec<u8>>;
75
76    /// Whether the store can cache another session. This is used to indicate to clients
77    /// whether their session can be resumed; the implementation is not required to remember
78    /// a session even if it returns `true` here.
79    fn can_cache(&self) -> bool;
80}
81
82/// A trait for the ability to encrypt and decrypt tickets.
83pub trait ProducesTickets: Debug + Send + Sync {
84    /// Returns true if this implementation will encrypt/decrypt
85    /// tickets.  Should return false if this is a dummy
86    /// implementation: the server will not send the SessionTicket
87    /// extension and will not call the other functions.
88    fn enabled(&self) -> bool;
89
90    /// Returns the lifetime in seconds of tickets produced now.
91    /// The lifetime is provided as a hint to clients that the
92    /// ticket will not be useful after the given time.
93    ///
94    /// This lifetime must be implemented by key rolling and
95    /// erasure, *not* by storing a lifetime in the ticket.
96    ///
97    /// The objective is to limit damage to forward secrecy caused
98    /// by tickets, not just limiting their lifetime.
99    fn lifetime(&self) -> u32;
100
101    /// Encrypt and authenticate `plain`, returning the resulting
102    /// ticket.  Return None if `plain` cannot be encrypted for
103    /// some reason: an empty ticket will be sent and the connection
104    /// will continue.
105    fn encrypt(&self, plain: &[u8]) -> Option<Vec<u8>>;
106
107    /// Decrypt `cipher`, validating its authenticity protection
108    /// and recovering the plaintext.  `cipher` is fully attacker
109    /// controlled, so this decryption must be side-channel free,
110    /// panic-proof, and otherwise bullet-proof.  If the decryption
111    /// fails, return None.
112    fn decrypt(&self, cipher: &[u8]) -> Option<Vec<u8>>;
113}
114
115/// How to choose a certificate chain and signing key for use
116/// in server authentication.
117///
118/// This is suitable when selecting a certificate does not require
119/// I/O or when the application is using blocking I/O anyhow.
120///
121/// For applications that use async I/O and need to do I/O to choose
122/// a certificate (for instance, fetching a certificate from a data store),
123/// the [`Acceptor`] interface is more suitable.
124pub trait ResolvesServerCert: Debug + Send + Sync {
125    /// Choose a certificate chain and matching key given simplified
126    /// ClientHello information.
127    ///
128    /// Return `None` to abort the handshake.
129    fn resolve(&self, client_hello: ClientHello<'_>) -> Option<Arc<sign::CertifiedKey>>;
130
131    /// Return true when the server only supports raw public keys.
132    fn only_raw_public_keys(&self) -> bool {
133        false
134    }
135}
136
137/// A struct representing the received Client Hello
138#[derive(Debug)]
139pub struct ClientHello<'a> {
140    pub(super) server_name: &'a Option<DnsName<'a>>,
141    pub(super) signature_schemes: &'a [SignatureScheme],
142    pub(super) alpn: Option<&'a Vec<ProtocolName>>,
143    pub(super) server_cert_types: Option<&'a [CertificateType]>,
144    pub(super) client_cert_types: Option<&'a [CertificateType]>,
145    pub(super) cipher_suites: &'a [CipherSuite],
146    /// The [certificate_authorities] extension, if it was sent by the client.
147    ///
148    /// [certificate_authorities]: https://datatracker.ietf.org/doc/html/rfc8446#section-4.2.4
149    pub(super) certificate_authorities: Option<&'a [DistinguishedName]>,
150    pub(super) named_groups: Option<&'a [NamedGroup]>,
151}
152
153impl<'a> ClientHello<'a> {
154    /// Get the server name indicator.
155    ///
156    /// Returns `None` if the client did not supply a SNI.
157    pub fn server_name(&self) -> Option<&str> {
158        self.server_name
159            .as_ref()
160            .map(<DnsName<'_> as AsRef<str>>::as_ref)
161    }
162
163    /// Get the compatible signature schemes.
164    ///
165    /// Returns standard-specified default if the client omitted this extension.
166    pub fn signature_schemes(&self) -> &[SignatureScheme] {
167        self.signature_schemes
168    }
169
170    /// Get the ALPN protocol identifiers submitted by the client.
171    ///
172    /// Returns `None` if the client did not include an ALPN extension.
173    ///
174    /// Application Layer Protocol Negotiation (ALPN) is a TLS extension that lets a client
175    /// submit a set of identifiers that each a represent an application-layer protocol.
176    /// The server will then pick its preferred protocol from the set submitted by the client.
177    /// Each identifier is represented as a byte array, although common values are often ASCII-encoded.
178    /// See the official RFC-7301 specifications at <https://datatracker.ietf.org/doc/html/rfc7301>
179    /// for more information on ALPN.
180    ///
181    /// For example, a HTTP client might specify "http/1.1" and/or "h2". Other well-known values
182    /// are listed in the at IANA registry at
183    /// <https://www.iana.org/assignments/tls-extensiontype-values/tls-extensiontype-values.xhtml#alpn-protocol-ids>.
184    ///
185    /// The server can specify supported ALPN protocols by setting [`ServerConfig::alpn_protocols`].
186    /// During the handshake, the server will select the first protocol configured that the client supports.
187    pub fn alpn(&self) -> Option<impl Iterator<Item = &'a [u8]>> {
188        self.alpn.map(|protocols| {
189            protocols
190                .iter()
191                .map(|proto| proto.as_ref())
192        })
193    }
194
195    /// Get cipher suites.
196    pub fn cipher_suites(&self) -> &[CipherSuite] {
197        self.cipher_suites
198    }
199
200    /// Get the server certificate types offered in the ClientHello.
201    ///
202    /// Returns `None` if the client did not include a certificate type extension.
203    pub fn server_cert_types(&self) -> Option<&'a [CertificateType]> {
204        self.server_cert_types
205    }
206
207    /// Get the client certificate types offered in the ClientHello.
208    ///
209    /// Returns `None` if the client did not include a certificate type extension.
210    pub fn client_cert_types(&self) -> Option<&'a [CertificateType]> {
211        self.client_cert_types
212    }
213
214    /// Get the [certificate_authorities] extension sent by the client.
215    ///
216    /// Returns `None` if the client did not send this extension.
217    ///
218    /// [certificate_authorities]: https://datatracker.ietf.org/doc/html/rfc8446#section-4.2.4
219    pub fn certificate_authorities(&self) -> Option<&'a [DistinguishedName]> {
220        self.certificate_authorities
221    }
222
223    /// Get the [`named_groups`] extension sent by the client.
224    ///
225    /// This means different things in different versions of TLS:
226    ///
227    /// Originally it was introduced as the "[`elliptic_curves`]" extension for TLS1.2.
228    /// It described the elliptic curves supported by a client for all purposes: key
229    /// exchange, signature verification (for server authentication), and signing (for
230    /// client auth).  Later [RFC7919] extended this to include FFDHE "named groups",
231    /// but FFDHE groups in this context only relate to key exchange.
232    ///
233    /// In TLS1.3 it was renamed to "[`named_groups`]" and now describes all types
234    /// of key exchange mechanisms, and does not relate at all to elliptic curves
235    /// used for signatures.
236    ///
237    /// [`elliptic_curves`]: https://datatracker.ietf.org/doc/html/rfc4492#section-5.1.1
238    /// [RFC7919]: https://datatracker.ietf.org/doc/html/rfc7919#section-2
239    /// [`named_groups`]:https://datatracker.ietf.org/doc/html/rfc8446#section-4.2.7
240    pub fn named_groups(&self) -> Option<&'a [NamedGroup]> {
241        self.named_groups
242    }
243}
244
245/// Common configuration for a set of server sessions.
246///
247/// Making one of these is cheap, though one of the inputs may be expensive: gathering trust roots
248/// from the operating system to add to the [`RootCertStore`] passed to a `ClientCertVerifier`
249/// builder may take on the order of a few hundred milliseconds.
250///
251/// These must be created via the [`ServerConfig::builder()`] or [`ServerConfig::builder_with_provider()`]
252/// function.
253///
254/// # Defaults
255///
256/// * [`ServerConfig::max_fragment_size`]: the default is `None` (meaning 16kB).
257/// * [`ServerConfig::session_storage`]: if the `std` feature is enabled, the default stores 256
258///   sessions in memory. If the `std` feature is not enabled, the default is to not store any
259///   sessions. In a no-std context, by enabling the `hashbrown` feature you may provide your
260///   own `session_storage` using [`ServerSessionMemoryCache`] and a `crate::lock::MakeMutex`
261///   implementation.
262/// * [`ServerConfig::alpn_protocols`]: the default is empty -- no ALPN protocol is negotiated.
263/// * [`ServerConfig::key_log`]: key material is not logged.
264/// * [`ServerConfig::send_tls13_tickets`]: 2 tickets are sent.
265/// * [`ServerConfig::cert_compressors`]: depends on the crate features, see [`compress::default_cert_compressors()`].
266/// * [`ServerConfig::cert_compression_cache`]: caches the most recently used 4 compressions
267/// * [`ServerConfig::cert_decompressors`]: depends on the crate features, see [`compress::default_cert_decompressors()`].
268///
269/// # Sharing resumption storage between `ServerConfig`s
270///
271/// In a program using many `ServerConfig`s it may improve resumption rates
272/// (which has a significant impact on connection performance) if those
273/// configs share [`ServerConfig::session_storage`] or [`ServerConfig::ticketer`].
274///
275/// However, caution is needed: other fields influence the security of a session
276/// and resumption between them can be surprising.  If sharing
277/// [`ServerConfig::session_storage`] or [`ServerConfig::ticketer`] between two
278/// `ServerConfig`s, you should also evaluate the following fields and ensure
279/// they are equivalent:
280///
281/// * `ServerConfig::verifier` -- client authentication requirements,
282/// * [`ServerConfig::cert_resolver`] -- server identities.
283///
284/// To illustrate, imagine two `ServerConfig`s `A` and `B`.  `A` requires
285/// client authentication, `B` does not.  If `A` and `B` shared a resumption store,
286/// it would be possible for a session originated by `B` (that is, an unauthenticated client)
287/// to be inserted into the store, and then resumed by `A`.  This would give a false
288/// impression to the user of `A` that the client was authenticated.  This is possible
289/// whether the resumption is performed statefully (via [`ServerConfig::session_storage`])
290/// or statelessly (via [`ServerConfig::ticketer`]).
291///
292/// _Unlike_ `ClientConfig`, rustls does not enforce any policy here.
293///
294/// [`RootCertStore`]: crate::RootCertStore
295/// [`ServerSessionMemoryCache`]: crate::server::handy::ServerSessionMemoryCache
296#[derive(Clone, Debug)]
297pub struct ServerConfig {
298    /// Source of randomness and other crypto.
299    pub(super) provider: Arc<CryptoProvider>,
300
301    /// Ignore the client's ciphersuite order. Instead,
302    /// choose the top ciphersuite in the server list
303    /// which is supported by the client.
304    pub ignore_client_order: bool,
305
306    /// The maximum size of plaintext input to be emitted in a single TLS record.
307    /// A value of None is equivalent to the [TLS maximum] of 16 kB.
308    ///
309    /// rustls enforces an arbitrary minimum of 32 bytes for this field.
310    /// Out of range values are reported as errors from [ServerConnection::new].
311    ///
312    /// Setting this value to a little less than the TCP MSS may improve latency
313    /// for stream-y workloads.
314    ///
315    /// [TLS maximum]: https://datatracker.ietf.org/doc/html/rfc8446#section-5.1
316    /// [ServerConnection::new]: crate::server::ServerConnection::new
317    pub max_fragment_size: Option<usize>,
318
319    /// How to store client sessions.
320    ///
321    /// See [ServerConfig#sharing-resumption-storage-between-serverconfigs]
322    /// for a warning related to this field.
323    pub session_storage: Arc<dyn StoresServerSessions>,
324
325    /// How to produce tickets.
326    ///
327    /// See [ServerConfig#sharing-resumption-storage-between-serverconfigs]
328    /// for a warning related to this field.
329    pub ticketer: Arc<dyn ProducesTickets>,
330
331    /// How to choose a server cert and key. This is usually set by
332    /// [ConfigBuilder::with_single_cert] or [ConfigBuilder::with_cert_resolver].
333    /// For async applications, see also [Acceptor].
334    pub cert_resolver: Arc<dyn ResolvesServerCert>,
335
336    /// Protocol names we support, most preferred first.
337    /// If empty we don't do ALPN at all.
338    pub alpn_protocols: Vec<Vec<u8>>,
339
340    /// Supported protocol versions, in no particular order.
341    /// The default is all supported versions.
342    pub(super) versions: versions::EnabledVersions,
343
344    /// How to verify client certificates.
345    pub(super) verifier: Arc<dyn verify::ClientCertVerifier>,
346
347    /// How to output key material for debugging.  The default
348    /// does nothing.
349    pub key_log: Arc<dyn KeyLog>,
350
351    /// Allows traffic secrets to be extracted after the handshake,
352    /// e.g. for kTLS setup.
353    pub enable_secret_extraction: bool,
354
355    /// Amount of early data to accept for sessions created by
356    /// this config.  Specify 0 to disable early data.  The
357    /// default is 0.
358    ///
359    /// Read the early data via [`ServerConnection::early_data`].
360    ///
361    /// The units for this are _both_ plaintext bytes, _and_ ciphertext
362    /// bytes, depending on whether the server accepts a client's early_data
363    /// or not.  It is therefore recommended to include some slop in
364    /// this value to account for the unknown amount of ciphertext
365    /// expansion in the latter case.
366    pub max_early_data_size: u32,
367
368    /// Whether the server should send "0.5RTT" data.  This means the server
369    /// sends data after its first flight of handshake messages, without
370    /// waiting for the client to complete the handshake.
371    ///
372    /// This can improve TTFB latency for either server-speaks-first protocols,
373    /// or client-speaks-first protocols when paired with "0RTT" data.  This
374    /// comes at the cost of a subtle weakening of the normal handshake
375    /// integrity guarantees that TLS provides.  Note that the initial
376    /// `ClientHello` is indirectly authenticated because it is included
377    /// in the transcript used to derive the keys used to encrypt the data.
378    ///
379    /// This only applies to TLS1.3 connections.  TLS1.2 connections cannot
380    /// do this optimisation and this setting is ignored for them.  It is
381    /// also ignored for TLS1.3 connections that even attempt client
382    /// authentication.
383    ///
384    /// This defaults to false.  This means the first application data
385    /// sent by the server comes after receiving and validating the client's
386    /// handshake up to the `Finished` message.  This is the safest option.
387    pub send_half_rtt_data: bool,
388
389    /// How many TLS1.3 tickets to send immediately after a successful
390    /// handshake.
391    ///
392    /// Because TLS1.3 tickets are single-use, this allows
393    /// a client to perform multiple resumptions.
394    ///
395    /// The default is 2.
396    ///
397    /// If this is 0, no tickets are sent and clients will not be able to
398    /// do any resumption.
399    pub send_tls13_tickets: usize,
400
401    /// JLS server configuration
402    pub jls_config: Arc<crate::jls::JlsServerConfig>,
403
404    /// If set to `true`, requires the client to support the extended
405    /// master secret extraction method defined in [RFC 7627].
406    ///
407    /// The default is `true` if the "fips" crate feature is enabled,
408    /// `false` otherwise.
409    ///
410    /// It must be set to `true` to meet FIPS requirement mentioned in section
411    /// **D.Q Transition of the TLS 1.2 KDF to Support the Extended Master
412    /// Secret** from [FIPS 140-3 IG.pdf].
413    ///
414    /// [RFC 7627]: https://datatracker.ietf.org/doc/html/rfc7627
415    /// [FIPS 140-3 IG.pdf]: https://csrc.nist.gov/csrc/media/Projects/cryptographic-module-validation-program/documents/fips%20140-3/FIPS%20140-3%20IG.pdf
416    #[cfg(feature = "tls12")]
417    pub require_ems: bool,
418
419    /// Provides the current system time
420    pub time_provider: Arc<dyn TimeProvider>,
421
422    /// How to compress the server's certificate chain.
423    ///
424    /// If a client supports this extension, and advertises support
425    /// for one of the compression algorithms included here, the
426    /// server certificate will be compressed according to [RFC8779].
427    ///
428    /// This only applies to TLS1.3 connections.  It is ignored for
429    /// TLS1.2 connections.
430    ///
431    /// [RFC8779]: https://datatracker.ietf.org/doc/rfc8879/
432    pub cert_compressors: Vec<&'static dyn compress::CertCompressor>,
433
434    /// Caching for compressed certificates.
435    ///
436    /// This is optional: [`compress::CompressionCache::Disabled`] gives
437    /// a cache that does no caching.
438    pub cert_compression_cache: Arc<compress::CompressionCache>,
439
440    /// How to decompress the clients's certificate chain.
441    ///
442    /// If this is non-empty, the [RFC8779] certificate compression
443    /// extension is offered when requesting client authentication,
444    /// and any compressed certificates are transparently decompressed
445    /// during the handshake.
446    ///
447    /// This only applies to TLS1.3 connections.  It is ignored for
448    /// TLS1.2 connections.
449    ///
450    /// [RFC8779]: https://datatracker.ietf.org/doc/rfc8879/
451    pub cert_decompressors: Vec<&'static dyn compress::CertDecompressor>,
452}
453
454impl ServerConfig {
455    /// Create a builder for a server configuration with
456    /// [the process-default `CryptoProvider`][CryptoProvider#using-the-per-process-default-cryptoprovider]
457    /// and safe protocol version defaults.
458    ///
459    /// For more information, see the [`ConfigBuilder`] documentation.
460    #[cfg(feature = "std")]
461    pub fn builder() -> ConfigBuilder<Self, WantsVerifier> {
462        Self::builder_with_protocol_versions(versions::DEFAULT_VERSIONS)
463    }
464
465    /// Create a builder for a server configuration with
466    /// [the process-default `CryptoProvider`][CryptoProvider#using-the-per-process-default-cryptoprovider]
467    /// and the provided protocol versions.
468    ///
469    /// Panics if
470    /// - the supported versions are not compatible with the provider (eg.
471    ///   the combination of ciphersuites supported by the provider and supported
472    ///   versions lead to zero cipher suites being usable),
473    /// - if a `CryptoProvider` cannot be resolved using a combination of
474    ///   the crate features and process default.
475    ///
476    /// For more information, see the [`ConfigBuilder`] documentation.
477    #[cfg(feature = "std")]
478    pub fn builder_with_protocol_versions(
479        versions: &[&'static versions::SupportedProtocolVersion],
480    ) -> ConfigBuilder<Self, WantsVerifier> {
481        // Safety assumptions:
482        // 1. that the provider has been installed (explicitly or implicitly)
483        // 2. that the process-level default provider is usable with the supplied protocol versions.
484        Self::builder_with_provider(
485            CryptoProvider::get_default_or_install_from_crate_features().clone(),
486        )
487        .with_protocol_versions(versions)
488        .unwrap()
489    }
490
491    /// Create a builder for a server configuration with a specific [`CryptoProvider`].
492    ///
493    /// This will use the provider's configured ciphersuites. You must additionally choose
494    /// which protocol versions to enable, using `with_protocol_versions` or
495    /// `with_safe_default_protocol_versions` and handling the `Result` in case a protocol
496    /// version is not supported by the provider's ciphersuites.
497    ///
498    /// For more information, see the [`ConfigBuilder`] documentation.
499    #[cfg(feature = "std")]
500    pub fn builder_with_provider(
501        provider: Arc<CryptoProvider>,
502    ) -> ConfigBuilder<Self, WantsVersions> {
503        ConfigBuilder {
504            state: WantsVersions {},
505            provider,
506            time_provider: Arc::new(DefaultTimeProvider),
507            side: PhantomData,
508        }
509    }
510
511    /// Create a builder for a server configuration with no default implementation details.
512    ///
513    /// This API must be used by `no_std` users.
514    ///
515    /// You must provide a specific [`TimeProvider`].
516    ///
517    /// You must provide a specific [`CryptoProvider`].
518    ///
519    /// This will use the provider's configured ciphersuites. You must additionally choose
520    /// which protocol versions to enable, using `with_protocol_versions` or
521    /// `with_safe_default_protocol_versions` and handling the `Result` in case a protocol
522    /// version is not supported by the provider's ciphersuites.
523    ///
524    /// For more information, see the [`ConfigBuilder`] documentation.
525    pub fn builder_with_details(
526        provider: Arc<CryptoProvider>,
527        time_provider: Arc<dyn TimeProvider>,
528    ) -> ConfigBuilder<Self, WantsVersions> {
529        ConfigBuilder {
530            state: WantsVersions {},
531            provider,
532            time_provider,
533            side: PhantomData,
534        }
535    }
536
537    /// Return `true` if connections made with this `ServerConfig` will
538    /// operate in FIPS mode.
539    ///
540    /// This is different from [`CryptoProvider::fips()`]: [`CryptoProvider::fips()`]
541    /// is concerned only with cryptography, whereas this _also_ covers TLS-level
542    /// configuration that NIST recommends.
543    pub fn fips(&self) -> bool {
544        #[cfg(feature = "tls12")]
545        {
546            self.provider.fips() && self.require_ems
547        }
548
549        #[cfg(not(feature = "tls12"))]
550        {
551            self.provider.fips()
552        }
553    }
554
555    /// Return the crypto provider used to construct this client configuration.
556    pub fn crypto_provider(&self) -> &Arc<CryptoProvider> {
557        &self.provider
558    }
559
560    /// We support a given TLS version if it's quoted in the configured
561    /// versions *and* at least one ciphersuite for this version is
562    /// also configured.
563    pub(crate) fn supports_version(&self, v: ProtocolVersion) -> bool {
564        self.versions.contains(v)
565            && self
566                .provider
567                .cipher_suites
568                .iter()
569                .any(|cs| cs.version().version == v)
570    }
571
572    #[cfg(feature = "std")]
573    pub(crate) fn supports_protocol(&self, proto: Protocol) -> bool {
574        self.provider
575            .cipher_suites
576            .iter()
577            .any(|cs| cs.usable_for_protocol(proto))
578    }
579
580    pub(super) fn current_time(&self) -> Result<UnixTime, Error> {
581        self.time_provider
582            .current_time()
583            .ok_or(Error::FailedToGetCurrentTime)
584    }
585}
586
587#[cfg(feature = "std")]
588mod connection {
589    use alloc::boxed::Box;
590    use core::fmt;
591    use core::fmt::{Debug, Formatter};
592    use core::ops::{Deref, DerefMut};
593    use std::io;
594
595    use super::{
596        Accepted, Accepting, EarlyDataState, ServerConfig, ServerConnectionData,
597        ServerExtensionsInput,
598    };
599    use crate::common_state::{CommonState, Context, Side};
600    use crate::conn::{ConnectionCommon, ConnectionCore};
601    use crate::error::Error;
602    use crate::server::hs;
603    use crate::suites::ExtractedSecrets;
604    use crate::sync::Arc;
605    use crate::vecbuf::ChunkVecBuffer;
606
607    /// Allows reading of early data in resumed TLS1.3 connections.
608    ///
609    /// "Early data" is also known as "0-RTT data".
610    ///
611    /// This structure implements [`std::io::Read`].
612    pub struct ReadEarlyData<'a> {
613        early_data: &'a mut EarlyDataState,
614    }
615
616    impl<'a> ReadEarlyData<'a> {
617        fn new(early_data: &'a mut EarlyDataState) -> Self {
618            ReadEarlyData { early_data }
619        }
620    }
621
622    impl io::Read for ReadEarlyData<'_> {
623        fn read(&mut self, buf: &mut [u8]) -> io::Result<usize> {
624            self.early_data.read(buf)
625        }
626
627        #[cfg(read_buf)]
628        fn read_buf(&mut self, cursor: core::io::BorrowedCursor<'_>) -> io::Result<()> {
629            self.early_data.read_buf(cursor)
630        }
631    }
632
633    /// This represents a single TLS server connection.
634    ///
635    /// Send TLS-protected data to the peer using the `io::Write` trait implementation.
636    /// Read data from the peer using the `io::Read` trait implementation.
637    pub struct ServerConnection {
638        pub(super) inner: ConnectionCommon<ServerConnectionData>,
639    }
640
641    impl ServerConnection {
642        /// Make a new ServerConnection.  `config` controls how
643        /// we behave in the TLS protocol.
644        pub fn new(config: Arc<ServerConfig>) -> Result<Self, Error> {
645            Ok(Self {
646                inner: ConnectionCommon::from(ConnectionCore::for_server(
647                    config,
648                    ServerExtensionsInput::default(),
649                )?),
650            })
651        }
652
653        /// Retrieves the server name, if any, used to select the certificate and
654        /// private key.
655        ///
656        /// This returns `None` until some time after the client's server name indication
657        /// (SNI) extension value is processed during the handshake. It will never be
658        /// `None` when the connection is ready to send or process application data,
659        /// unless the client does not support SNI.
660        ///
661        /// This is useful for application protocols that need to enforce that the
662        /// server name matches an application layer protocol hostname. For
663        /// example, HTTP/1.1 servers commonly expect the `Host:` header field of
664        /// every request on a connection to match the hostname in the SNI extension
665        /// when the client provides the SNI extension.
666        ///
667        /// The server name is also used to match sessions during session resumption.
668        pub fn server_name(&self) -> Option<&str> {
669            self.inner.core.get_sni_str()
670        }
671
672        /// Application-controlled portion of the resumption ticket supplied by the client, if any.
673        ///
674        /// Recovered from the prior session's `set_resumption_data`. Integrity is guaranteed by rustls.
675        ///
676        /// Returns `Some` if and only if a valid resumption ticket has been received from the client.
677        pub fn received_resumption_data(&self) -> Option<&[u8]> {
678            self.inner
679                .core
680                .data
681                .received_resumption_data
682                .as_ref()
683                .map(|x| &x[..])
684        }
685
686        /// Set the resumption data to embed in future resumption tickets supplied to the client.
687        ///
688        /// Defaults to the empty byte string. Must be less than 2^15 bytes to allow room for other
689        /// data. Should be called while `is_handshaking` returns true to ensure all transmitted
690        /// resumption tickets are affected.
691        ///
692        /// Integrity will be assured by rustls, but the data will be visible to the client. If secrecy
693        /// from the client is desired, encrypt the data separately.
694        pub fn set_resumption_data(&mut self, data: &[u8]) {
695            assert!(data.len() < 2usize.pow(15));
696            self.inner.core.data.resumption_data = data.into();
697        }
698
699        /// Explicitly discard early data, notifying the client
700        ///
701        /// Useful if invariants encoded in `received_resumption_data()` cannot be respected.
702        ///
703        /// Must be called while `is_handshaking` is true.
704        pub fn reject_early_data(&mut self) {
705            self.inner.core.reject_early_data()
706        }
707
708        /// Returns an `io::Read` implementer you can read bytes from that are
709        /// received from a client as TLS1.3 0RTT/"early" data, during the handshake.
710        ///
711        /// This returns `None` in many circumstances, such as :
712        ///
713        /// - Early data is disabled if [`ServerConfig::max_early_data_size`] is zero (the default).
714        /// - The session negotiated with the client is not TLS1.3.
715        /// - The client just doesn't support early data.
716        /// - The connection doesn't resume an existing session.
717        /// - The client hasn't sent a full ClientHello yet.
718        pub fn early_data(&mut self) -> Option<ReadEarlyData<'_>> {
719            let data = &mut self.inner.core.data;
720            if data.early_data.was_accepted() {
721                Some(ReadEarlyData::new(&mut data.early_data))
722            } else {
723                None
724            }
725        }
726
727        /// Return true if the connection was made with a `ServerConfig` that is FIPS compatible.
728        ///
729        /// This is different from [`crate::crypto::CryptoProvider::fips()`]:
730        /// it is concerned only with cryptography, whereas this _also_ covers TLS-level
731        /// configuration that NIST recommends, as well as ECH HPKE suites if applicable.
732        pub fn fips(&self) -> bool {
733            self.inner.core.common_state.fips
734        }
735
736        /// Extract secrets, so they can be used when configuring kTLS, for example.
737        /// Should be used with care as it exposes secret key material.
738        pub fn dangerous_extract_secrets(self) -> Result<ExtractedSecrets, Error> {
739            self.inner.dangerous_extract_secrets()
740        }
741    }
742
743    impl Debug for ServerConnection {
744        fn fmt(&self, f: &mut Formatter<'_>) -> fmt::Result {
745            f.debug_struct("ServerConnection")
746                .finish()
747        }
748    }
749
750    impl Deref for ServerConnection {
751        type Target = ConnectionCommon<ServerConnectionData>;
752
753        fn deref(&self) -> &Self::Target {
754            &self.inner
755        }
756    }
757
758    impl DerefMut for ServerConnection {
759        fn deref_mut(&mut self) -> &mut Self::Target {
760            &mut self.inner
761        }
762    }
763
764    impl From<ServerConnection> for crate::Connection {
765        fn from(conn: ServerConnection) -> Self {
766            Self::Server(conn)
767        }
768    }
769
770    /// Handle a server-side connection before configuration is available.
771    ///
772    /// `Acceptor` allows the caller to choose a [`ServerConfig`] after reading
773    /// the [`super::ClientHello`] of an incoming connection. This is useful for servers
774    /// that choose different certificates or cipher suites based on the
775    /// characteristics of the `ClientHello`. In particular it is useful for
776    /// servers that need to do some I/O to load a certificate and its private key
777    /// and don't want to use the blocking interface provided by
778    /// [`super::ResolvesServerCert`].
779    ///
780    /// Create an Acceptor with [`Acceptor::default()`].
781    ///
782    /// # Example
783    ///
784    /// ```no_run
785    /// # #[cfg(feature = "aws_lc_rs")] {
786    /// # fn choose_server_config(
787    /// #     _: rustls::server::ClientHello,
788    /// # ) -> std::sync::Arc<rustls::ServerConfig> {
789    /// #     unimplemented!();
790    /// # }
791    /// # #[allow(unused_variables)]
792    /// # fn main() {
793    /// use rustls::server::{Acceptor, ServerConfig};
794    /// let listener = std::net::TcpListener::bind("127.0.0.1:0").unwrap();
795    /// for stream in listener.incoming() {
796    ///     let mut stream = stream.unwrap();
797    ///     let mut acceptor = Acceptor::default();
798    ///     let accepted = loop {
799    ///         acceptor.read_tls(&mut stream).unwrap();
800    ///         if let Some(accepted) = acceptor.accept().unwrap() {
801    ///             break accepted;
802    ///         }
803    ///     };
804    ///
805    ///     // For some user-defined choose_server_config:
806    ///     let config = choose_server_config(accepted.client_hello());
807    ///     let conn = accepted
808    ///         .into_connection(config)
809    ///         .unwrap();
810    ///
811    ///     // Proceed with handling the ServerConnection.
812    /// }
813    /// # }
814    /// # }
815    /// ```
816    pub struct Acceptor {
817        inner: Option<ConnectionCommon<ServerConnectionData>>,
818    }
819
820    impl Default for Acceptor {
821        /// Return an empty Acceptor, ready to receive bytes from a new client connection.
822        fn default() -> Self {
823            Self {
824                inner: Some(
825                    ConnectionCore::new(
826                        Box::new(Accepting),
827                        ServerConnectionData::default(),
828                        CommonState::new(Side::Server),
829                    )
830                    .into(),
831                ),
832            }
833        }
834    }
835
836    impl Acceptor {
837        /// Read TLS content from `rd`.
838        ///
839        /// Returns an error if this `Acceptor` has already yielded an [`Accepted`]. For more details,
840        /// refer to [`Connection::read_tls()`].
841        ///
842        /// [`Connection::read_tls()`]: crate::Connection::read_tls
843        pub fn read_tls(&mut self, rd: &mut dyn io::Read) -> Result<usize, io::Error> {
844            match &mut self.inner {
845                Some(conn) => conn.read_tls(rd),
846                None => Err(io::Error::new(
847                    io::ErrorKind::Other,
848                    "acceptor cannot read after successful acceptance",
849                )),
850            }
851        }
852
853        /// Check if a `ClientHello` message has been received.
854        ///
855        /// Returns `Ok(None)` if the complete `ClientHello` has not yet been received.
856        /// Do more I/O and then call this function again.
857        ///
858        /// Returns `Ok(Some(accepted))` if the connection has been accepted. Call
859        /// `accepted.into_connection()` to continue. Do not call this function again.
860        ///
861        /// Returns `Err((err, alert))` if an error occurred. If an alert is returned, the
862        /// application should call `alert.write()` to send the alert to the client. It should
863        /// not call `accept()` again.
864        pub fn accept(&mut self) -> Result<Option<Accepted>, (Error, AcceptedAlert)> {
865            let Some(mut connection) = self.inner.take() else {
866                return Err((
867                    Error::General("Acceptor polled after completion".into()),
868                    AcceptedAlert::empty(),
869                ));
870            };
871
872            let message = match connection.first_handshake_message() {
873                Ok(Some(msg)) => msg,
874                Ok(None) => {
875                    self.inner = Some(connection);
876                    return Ok(None);
877                }
878                Err(err) => return Err((err, AcceptedAlert::from(connection))),
879            };
880
881            let mut cx = Context::from(&mut connection);
882            let sig_schemes = match hs::process_client_hello(&message, false, &mut cx) {
883                Ok((_, sig_schemes)) => sig_schemes,
884                Err(err) => {
885                    return Err((err, AcceptedAlert::from(connection)));
886                }
887            };
888
889            Ok(Some(Accepted {
890                connection,
891                message,
892                sig_schemes,
893            }))
894        }
895    }
896
897    /// Represents a TLS alert resulting from handling the client's `ClientHello` message.
898    ///
899    /// When [`Acceptor::accept()`] returns an error, it yields an `AcceptedAlert` such that the
900    /// application can communicate failure to the client via [`AcceptedAlert::write()`].
901    pub struct AcceptedAlert(ChunkVecBuffer);
902
903    impl AcceptedAlert {
904        pub(super) fn empty() -> Self {
905            Self(ChunkVecBuffer::new(None))
906        }
907
908        /// Send the alert to the client.
909        ///
910        /// To account for short writes this function should be called repeatedly until it
911        /// returns `Ok(0)` or an error.
912        pub fn write(&mut self, wr: &mut dyn io::Write) -> Result<usize, io::Error> {
913            self.0.write_to(wr)
914        }
915
916        /// Send the alert to the client.
917        ///
918        /// This function will invoke the writer until the buffer is empty.
919        pub fn write_all(&mut self, wr: &mut dyn io::Write) -> Result<(), io::Error> {
920            while self.write(wr)? != 0 {}
921            Ok(())
922        }
923    }
924
925    impl From<ConnectionCommon<ServerConnectionData>> for AcceptedAlert {
926        fn from(conn: ConnectionCommon<ServerConnectionData>) -> Self {
927            Self(conn.core.common_state.sendable_tls)
928        }
929    }
930
931    impl Debug for AcceptedAlert {
932        fn fmt(&self, f: &mut Formatter<'_>) -> fmt::Result {
933            f.debug_struct("AcceptedAlert").finish()
934        }
935    }
936}
937
938#[cfg(feature = "std")]
939pub use connection::{AcceptedAlert, Acceptor, ReadEarlyData, ServerConnection};
940
941/// Unbuffered version of `ServerConnection`
942///
943/// See the [`crate::unbuffered`] module docs for more details
944pub struct UnbufferedServerConnection {
945    inner: UnbufferedConnectionCommon<ServerConnectionData>,
946}
947
948impl UnbufferedServerConnection {
949    /// Make a new ServerConnection. `config` controls how we behave in the TLS protocol.
950    pub fn new(config: Arc<ServerConfig>) -> Result<Self, Error> {
951        Ok(Self {
952            inner: UnbufferedConnectionCommon::from(ConnectionCore::for_server(
953                config,
954                ServerExtensionsInput::default(),
955            )?),
956        })
957    }
958
959    /// Extract secrets, so they can be used when configuring kTLS, for example.
960    /// Should be used with care as it exposes secret key material.
961    #[deprecated = "dangerous_extract_secrets() does not support session tickets or \
962                    key updates, use dangerous_into_kernel_connection() instead"]
963    pub fn dangerous_extract_secrets(self) -> Result<ExtractedSecrets, Error> {
964        self.inner.dangerous_extract_secrets()
965    }
966
967    /// Extract secrets and an [`KernelConnection`] object.
968    ///
969    /// This allows you use rustls to manage keys and then manage encryption and
970    /// decryption yourself (e.g. for kTLS).
971    ///
972    /// Should be used with care as it exposes secret key material.
973    ///
974    /// See the [`crate::kernel`] documentations for details on prerequisites
975    /// for calling this method.
976    pub fn dangerous_into_kernel_connection(
977        self,
978    ) -> Result<(ExtractedSecrets, KernelConnection<ServerConnectionData>), Error> {
979        self.inner
980            .core
981            .dangerous_into_kernel_connection()
982    }
983    /// Get upstream address
984    pub fn get_upstream_addr(&self) -> Option<std::string::String> {
985        match &self.inner.core.common_state.jls_authed {
986            crate::jls::JlsState::AuthFailed(upstream_addr ) => upstream_addr.clone(),
987            _ => None,
988        }
989    }
990}
991
992impl Deref for UnbufferedServerConnection {
993    type Target = UnbufferedConnectionCommon<ServerConnectionData>;
994
995    fn deref(&self) -> &Self::Target {
996        &self.inner
997    }
998}
999
1000impl DerefMut for UnbufferedServerConnection {
1001    fn deref_mut(&mut self) -> &mut Self::Target {
1002        &mut self.inner
1003    }
1004}
1005
1006impl UnbufferedConnectionCommon<ServerConnectionData> {
1007    pub(crate) fn pop_early_data(&mut self) -> Option<Vec<u8>> {
1008        self.core.data.early_data.pop()
1009    }
1010
1011    pub(crate) fn peek_early_data(&self) -> Option<&[u8]> {
1012        self.core.data.early_data.peek()
1013    }
1014}
1015
1016/// Represents a `ClientHello` message received through the [`Acceptor`].
1017///
1018/// Contains the state required to resume the connection through [`Accepted::into_connection()`].
1019pub struct Accepted {
1020    connection: ConnectionCommon<ServerConnectionData>,
1021    message: Message<'static>,
1022    sig_schemes: Vec<SignatureScheme>,
1023}
1024
1025impl Accepted {
1026    /// Get the [`ClientHello`] for this connection.
1027    pub fn client_hello(&self) -> ClientHello<'_> {
1028        let payload = Self::client_hello_payload(&self.message);
1029        let ch = ClientHello {
1030            server_name: &self.connection.core.data.sni,
1031            signature_schemes: &self.sig_schemes,
1032            alpn: payload.protocols.as_ref(),
1033            server_cert_types: payload
1034                .server_certificate_types
1035                .as_deref(),
1036            client_cert_types: payload
1037                .client_certificate_types
1038                .as_deref(),
1039            cipher_suites: &payload.cipher_suites,
1040            certificate_authorities: payload
1041                .certificate_authority_names
1042                .as_deref(),
1043            named_groups: payload.named_groups.as_deref(),
1044        };
1045
1046        trace!("Accepted::client_hello(): {ch:#?}");
1047        ch
1048    }
1049
1050    /// Convert the [`Accepted`] into a [`ServerConnection`].
1051    ///
1052    /// Takes the state returned from [`Acceptor::accept()`] as well as the [`ServerConfig`] and
1053    /// [`sign::CertifiedKey`] that should be used for the session. Returns an error if
1054    /// configuration-dependent validation of the received `ClientHello` message fails.
1055    #[cfg(feature = "std")]
1056    pub fn into_connection(
1057        mut self,
1058        config: Arc<ServerConfig>,
1059    ) -> Result<ServerConnection, (Error, AcceptedAlert)> {
1060        if let Err(err) = self
1061            .connection
1062            .set_max_fragment_size(config.max_fragment_size)
1063        {
1064            // We have a connection here, but it won't contain an alert since the error
1065            // is with the fragment size configured in the `ServerConfig`.
1066            return Err((err, AcceptedAlert::empty()));
1067        }
1068
1069        self.connection.enable_secret_extraction = config.enable_secret_extraction;
1070
1071        let state = hs::ExpectClientHello::new(config, ServerExtensionsInput::default());
1072        let mut cx = hs::ServerContext::from(&mut self.connection);
1073
1074        let ch = Self::client_hello_payload(&self.message);
1075        let new = match state.with_certified_key(self.sig_schemes, ch, &self.message, &mut cx) {
1076            Ok(new) => new,
1077            Err(err) => return Err((err, AcceptedAlert::from(self.connection))),
1078        };
1079
1080        self.connection.replace_state(new);
1081        Ok(ServerConnection {
1082            inner: self.connection,
1083        })
1084    }
1085
1086    fn client_hello_payload<'a>(message: &'a Message<'_>) -> &'a ClientHelloPayload {
1087        match &message.payload {
1088            crate::msgs::message::MessagePayload::Handshake { parsed, .. } => match &parsed.0 {
1089                crate::msgs::handshake::HandshakePayload::ClientHello(ch) => ch,
1090                _ => unreachable!(),
1091            },
1092            _ => unreachable!(),
1093        }
1094    }
1095}
1096
1097impl Debug for Accepted {
1098    fn fmt(&self, f: &mut Formatter<'_>) -> fmt::Result {
1099        f.debug_struct("Accepted").finish()
1100    }
1101}
1102
1103#[cfg(feature = "std")]
1104struct Accepting;
1105
1106#[cfg(feature = "std")]
1107impl State<ServerConnectionData> for Accepting {
1108    fn handle<'m>(
1109        self: Box<Self>,
1110        _cx: &mut hs::ServerContext<'_>,
1111        _m: Message<'m>,
1112    ) -> Result<Box<dyn State<ServerConnectionData> + 'm>, Error>
1113    where
1114        Self: 'm,
1115    {
1116        Err(Error::General("unreachable state".into()))
1117    }
1118
1119    fn into_owned(self: Box<Self>) -> hs::NextState<'static> {
1120        self
1121    }
1122}
1123
1124#[derive(Default)]
1125pub(super) enum EarlyDataState {
1126    #[default]
1127    New,
1128    Accepted {
1129        received: ChunkVecBuffer,
1130        left: usize,
1131    },
1132    Rejected,
1133}
1134
1135impl EarlyDataState {
1136    pub(super) fn reject(&mut self) {
1137        *self = Self::Rejected;
1138    }
1139
1140    pub(super) fn accept(&mut self, max_size: usize) {
1141        *self = Self::Accepted {
1142            received: ChunkVecBuffer::new(Some(max_size)),
1143            left: max_size,
1144        };
1145    }
1146
1147    #[cfg(feature = "std")]
1148    fn was_accepted(&self) -> bool {
1149        matches!(self, Self::Accepted { .. })
1150    }
1151
1152    pub(super) fn was_rejected(&self) -> bool {
1153        matches!(self, Self::Rejected)
1154    }
1155
1156    fn peek(&self) -> Option<&[u8]> {
1157        match self {
1158            Self::Accepted { received, .. } => received.peek(),
1159            _ => None,
1160        }
1161    }
1162
1163    fn pop(&mut self) -> Option<Vec<u8>> {
1164        match self {
1165            Self::Accepted { received, .. } => received.pop(),
1166            _ => None,
1167        }
1168    }
1169
1170    #[cfg(feature = "std")]
1171    fn read(&mut self, buf: &mut [u8]) -> io::Result<usize> {
1172        match self {
1173            Self::Accepted { received, .. } => received.read(buf),
1174            _ => Err(io::Error::from(io::ErrorKind::BrokenPipe)),
1175        }
1176    }
1177
1178    #[cfg(read_buf)]
1179    fn read_buf(&mut self, cursor: core::io::BorrowedCursor<'_>) -> io::Result<()> {
1180        match self {
1181            Self::Accepted { received, .. } => received.read_buf(cursor),
1182            _ => Err(io::Error::from(io::ErrorKind::BrokenPipe)),
1183        }
1184    }
1185
1186    pub(super) fn take_received_plaintext(&mut self, bytes: Payload<'_>) -> bool {
1187        let available = bytes.bytes().len();
1188        let Self::Accepted { received, left } = self else {
1189            return false;
1190        };
1191
1192        if received.apply_limit(available) != available || available > *left {
1193            return false;
1194        }
1195
1196        received.append(bytes.into_vec());
1197        *left -= available;
1198        true
1199    }
1200}
1201
1202impl Debug for EarlyDataState {
1203    fn fmt(&self, f: &mut Formatter<'_>) -> fmt::Result {
1204        match self {
1205            Self::New => write!(f, "EarlyDataState::New"),
1206            Self::Accepted { received, left } => write!(
1207                f,
1208                "EarlyDataState::Accepted {{ received: {}, left: {} }}",
1209                received.len(),
1210                left
1211            ),
1212            Self::Rejected => write!(f, "EarlyDataState::Rejected"),
1213        }
1214    }
1215}
1216
1217impl ConnectionCore<ServerConnectionData> {
1218    pub(crate) fn for_server(
1219        config: Arc<ServerConfig>,
1220        extra_exts: ServerExtensionsInput<'static>,
1221    ) -> Result<Self, Error> {
1222        let mut common = CommonState::new(Side::Server);
1223        common.set_max_fragment_size(config.max_fragment_size)?;
1224        common.enable_secret_extraction = config.enable_secret_extraction;
1225        common.fips = config.fips();
1226        common.jls_authed = if config.jls_config.enable {
1227            crate::jls::JlsState::NotAuthed
1228        } else {
1229            crate::jls::JlsState::Disabled
1230        };
1231        Ok(Self::new(
1232            Box::new(hs::ExpectClientHello::new(config.clone(), extra_exts)),
1233            ServerConnectionData {
1234                ..Default::default()
1235            },
1236            common,
1237        ))
1238    }
1239
1240    #[cfg(feature = "std")]
1241    pub(crate) fn reject_early_data(&mut self) {
1242        assert!(
1243            self.common_state.is_handshaking(),
1244            "cannot retroactively reject early data"
1245        );
1246        self.data.early_data.reject();
1247    }
1248
1249    #[cfg(feature = "std")]
1250    pub(crate) fn get_sni_str(&self) -> Option<&str> {
1251        self.data.get_sni_str()
1252    }
1253}
1254
1255/// State associated with a server connection.
1256#[derive(Default, Debug)]
1257pub struct ServerConnectionData {
1258    pub(super) sni: Option<DnsName<'static>>,
1259    pub(super) received_resumption_data: Option<Vec<u8>>,
1260    pub(super) resumption_data: Vec<u8>,
1261    pub(super) early_data: EarlyDataState,
1262}
1263
1264impl ServerConnectionData {
1265    #[cfg(feature = "std")]
1266    pub(super) fn get_sni_str(&self) -> Option<&str> {
1267        self.sni.as_ref().map(AsRef::as_ref)
1268    }
1269}
1270
1271impl crate::conn::SideData for ServerConnectionData {}
1272
1273#[cfg(feature = "std")]
1274#[cfg(test)]
1275mod tests {
1276    use std::format;
1277
1278    use super::*;
1279
1280    // these branches not reachable externally, unless something else goes wrong.
1281    #[test]
1282    fn test_read_in_new_state() {
1283        assert_eq!(
1284            format!("{:?}", EarlyDataState::default().read(&mut [0u8; 5])),
1285            "Err(Kind(BrokenPipe))"
1286        );
1287    }
1288
1289    #[cfg(read_buf)]
1290    #[test]
1291    fn test_read_buf_in_new_state() {
1292        use core::io::BorrowedBuf;
1293
1294        let mut buf = [0u8; 5];
1295        let mut buf: BorrowedBuf<'_> = buf.as_mut_slice().into();
1296        assert_eq!(
1297            format!("{:?}", EarlyDataState::default().read_buf(buf.unfilled())),
1298            "Err(Kind(BrokenPipe))"
1299        );
1300    }
1301}