1 | use core::mem; |
2 | |
3 | use crate::error::{Error, InvalidMessage}; |
4 | use crate::msgs::codec::Reader; |
5 | use crate::msgs::message::{ |
6 | HEADER_SIZE, InboundOpaqueMessage, MessageError, read_opaque_message_header, |
7 | }; |
8 | |
9 | pub(crate) mod buffers; |
10 | pub(crate) mod handshake; |
11 | |
12 | /// A deframer of TLS wire messages. |
13 | /// |
14 | /// Returns `Some(Ok(_))` containing each `InboundOpaqueMessage` deframed |
15 | /// from the buffer. |
16 | /// |
17 | /// Returns `None` if no further messages can be deframed from the |
18 | /// buffer. More data is required for further progress. |
19 | /// |
20 | /// Returns `Some(Err(_))` if the peer is not talking TLS, but some |
21 | /// other protocol. The caller should abort the connection, because |
22 | /// the deframer cannot recover. |
23 | /// |
24 | /// Call `bytes_consumed()` to learn how many bytes the iterator has |
25 | /// processed from the front of the original buffer. This is only updated |
26 | /// when a message is successfully deframed (ie. `Some(Ok(_))` is returned). |
27 | pub(crate) struct DeframerIter<'a> { |
28 | buf: &'a mut [u8], |
29 | consumed: usize, |
30 | } |
31 | |
32 | impl<'a> DeframerIter<'a> { |
33 | /// Make a new `DeframerIter` |
34 | pub(crate) fn new(buf: &'a mut [u8]) -> Self { |
35 | Self { buf, consumed: 0 } |
36 | } |
37 | |
38 | /// How many bytes were processed successfully from the front |
39 | /// of the buffer passed to `new()`? |
40 | pub(crate) fn bytes_consumed(&self) -> usize { |
41 | self.consumed |
42 | } |
43 | } |
44 | |
45 | impl<'a> Iterator for DeframerIter<'a> { |
46 | type Item = Result<InboundOpaqueMessage<'a>, Error>; |
47 | |
48 | fn next(&mut self) -> Option<Self::Item> { |
49 | let mut reader = Reader::init(self.buf); |
50 | |
51 | let (typ, version, len) = match read_opaque_message_header(&mut reader) { |
52 | Ok(header) => header, |
53 | Err(err) => { |
54 | let err = match err { |
55 | MessageError::TooShortForHeader | MessageError::TooShortForLength => { |
56 | return None; |
57 | } |
58 | MessageError::InvalidEmptyPayload => InvalidMessage::InvalidEmptyPayload, |
59 | MessageError::MessageTooLarge => InvalidMessage::MessageTooLarge, |
60 | MessageError::InvalidContentType => InvalidMessage::InvalidContentType, |
61 | MessageError::UnknownProtocolVersion => InvalidMessage::UnknownProtocolVersion, |
62 | }; |
63 | return Some(Err(err.into())); |
64 | } |
65 | }; |
66 | |
67 | let end = HEADER_SIZE + len as usize; |
68 | |
69 | self.buf.get(HEADER_SIZE..end)?; |
70 | |
71 | // we now have a TLS header and body on the front of `self.buf`. remove |
72 | // it from the front. |
73 | let (consumed, remainder) = mem::take(&mut self.buf).split_at_mut(end); |
74 | self.buf = remainder; |
75 | self.consumed += end; |
76 | |
77 | Some(Ok(InboundOpaqueMessage::new( |
78 | typ, |
79 | version, |
80 | &mut consumed[HEADER_SIZE..], |
81 | ))) |
82 | } |
83 | } |
84 | |
85 | pub fn fuzz_deframer(data: &[u8]) { |
86 | let mut buf: Vec = data.to_vec(); |
87 | let mut iter: DeframerIter<'_> = DeframerIter::new(&mut buf); |
88 | |
89 | for message: Result, …> in iter.by_ref() { |
90 | if message.is_err() { |
91 | break; |
92 | } |
93 | } |
94 | |
95 | assert!(iter.bytes_consumed() <= buf.len()); |
96 | } |
97 | |
98 | #[cfg (feature = "std" )] |
99 | #[cfg (test)] |
100 | mod tests { |
101 | use alloc::vec::Vec; |
102 | use std::prelude::v1::*; |
103 | |
104 | use super::*; |
105 | use crate::ContentType; |
106 | |
107 | #[test ] |
108 | fn iterator_empty_before_header_received() { |
109 | assert!( |
110 | DeframerIter::new(&mut []) |
111 | .next() |
112 | .is_none() |
113 | ); |
114 | assert!( |
115 | DeframerIter::new(&mut [0x16]) |
116 | .next() |
117 | .is_none() |
118 | ); |
119 | assert!( |
120 | DeframerIter::new(&mut [0x16, 0x03]) |
121 | .next() |
122 | .is_none() |
123 | ); |
124 | assert!( |
125 | DeframerIter::new(&mut [0x16, 0x03, 0x03]) |
126 | .next() |
127 | .is_none() |
128 | ); |
129 | assert!( |
130 | DeframerIter::new(&mut [0x16, 0x03, 0x03, 0x00]) |
131 | .next() |
132 | .is_none() |
133 | ); |
134 | assert!( |
135 | DeframerIter::new(&mut [0x16, 0x03, 0x03, 0x00, 0x01]) |
136 | .next() |
137 | .is_none() |
138 | ); |
139 | } |
140 | |
141 | #[test ] |
142 | fn iterate_one_message() { |
143 | let mut buffer = [0x17, 0x03, 0x03, 0x00, 0x01, 0x00]; |
144 | let mut iter = DeframerIter::new(&mut buffer); |
145 | assert_eq!( |
146 | iter.next().unwrap().unwrap().typ, |
147 | ContentType::ApplicationData |
148 | ); |
149 | assert_eq!(iter.bytes_consumed(), 6); |
150 | assert!(iter.next().is_none()); |
151 | } |
152 | |
153 | #[test ] |
154 | fn iterate_two_messages() { |
155 | let mut buffer = [ |
156 | 0x16, 0x03, 0x03, 0x00, 0x01, 0x00, 0x17, 0x03, 0x03, 0x00, 0x01, 0x00, |
157 | ]; |
158 | let mut iter = DeframerIter::new(&mut buffer); |
159 | assert_eq!(iter.next().unwrap().unwrap().typ, ContentType::Handshake); |
160 | assert_eq!(iter.bytes_consumed(), 6); |
161 | assert_eq!( |
162 | iter.next().unwrap().unwrap().typ, |
163 | ContentType::ApplicationData |
164 | ); |
165 | assert_eq!(iter.bytes_consumed(), 12); |
166 | assert!(iter.next().is_none()); |
167 | } |
168 | |
169 | #[test ] |
170 | fn iterator_invalid_protocol_version_rejected() { |
171 | let mut buffer = include_bytes!("../../testdata/deframer-invalid-version.bin" ).to_vec(); |
172 | let mut iter = DeframerIter::new(&mut buffer); |
173 | assert_eq!( |
174 | iter.next().unwrap().err(), |
175 | Some(Error::InvalidMessage( |
176 | InvalidMessage::UnknownProtocolVersion |
177 | )) |
178 | ); |
179 | } |
180 | |
181 | #[test ] |
182 | fn iterator_invalid_content_type_rejected() { |
183 | let mut buffer = include_bytes!("../../testdata/deframer-invalid-contenttype.bin" ).to_vec(); |
184 | let mut iter = DeframerIter::new(&mut buffer); |
185 | assert_eq!( |
186 | iter.next().unwrap().err(), |
187 | Some(Error::InvalidMessage(InvalidMessage::InvalidContentType)) |
188 | ); |
189 | } |
190 | |
191 | #[test ] |
192 | fn iterator_excess_message_length_rejected() { |
193 | let mut buffer = include_bytes!("../../testdata/deframer-invalid-length.bin" ).to_vec(); |
194 | let mut iter = DeframerIter::new(&mut buffer); |
195 | assert_eq!( |
196 | iter.next().unwrap().err(), |
197 | Some(Error::InvalidMessage(InvalidMessage::MessageTooLarge)) |
198 | ); |
199 | } |
200 | |
201 | #[test ] |
202 | fn iterator_zero_message_length_rejected() { |
203 | let mut buffer = include_bytes!("../../testdata/deframer-invalid-empty.bin" ).to_vec(); |
204 | let mut iter = DeframerIter::new(&mut buffer); |
205 | assert_eq!( |
206 | iter.next().unwrap().err(), |
207 | Some(Error::InvalidMessage(InvalidMessage::InvalidEmptyPayload)) |
208 | ); |
209 | } |
210 | |
211 | #[test ] |
212 | fn iterator_over_many_messages() { |
213 | let client_hello = include_bytes!("../../testdata/deframer-test.1.bin" ); |
214 | let mut buffer = Vec::with_capacity(3 * client_hello.len()); |
215 | buffer.extend(client_hello); |
216 | buffer.extend(client_hello); |
217 | buffer.extend(client_hello); |
218 | let mut iter = DeframerIter::new(&mut buffer); |
219 | let mut count = 0; |
220 | |
221 | for message in iter.by_ref() { |
222 | let message = message.unwrap(); |
223 | assert_eq!(ContentType::Handshake, message.typ); |
224 | count += 1; |
225 | } |
226 | |
227 | assert_eq!(count, 3); |
228 | assert_eq!(client_hello.len() * 3, iter.bytes_consumed()); |
229 | } |
230 | |
231 | #[test ] |
232 | fn exercise_fuzz_deframer() { |
233 | fuzz_deframer(&[0xff, 0xff, 0xff, 0xff, 0xff]); |
234 | for prefix in 0..7 { |
235 | fuzz_deframer(&[0x16, 0x03, 0x03, 0x00, 0x01, 0xff][..prefix]); |
236 | } |
237 | } |
238 | } |
239 | |