rustls::quic::connection

Enum Connection

Source
pub enum Connection {
    Client(ClientConnection),
    Server(ServerConnection),
}
Expand description

A QUIC client or server connection.

Variants§

§

Client(ClientConnection)

A client connection

§

Server(ServerConnection)

A server connection

Implementations§

Source§

impl Connection

Source

pub fn quic_transport_parameters(&self) -> Option<&[u8]>

Return the TLS-encoded transport parameters for the session’s peer.

See ConnectionCommon::quic_transport_parameters() for more details.

Source

pub fn zero_rtt_keys(&self) -> Option<DirectionalKeys>

Compute the keys for encrypting/decrypting 0-RTT packets, if available

Source

pub fn read_hs(&mut self, plaintext: &[u8]) -> Result<(), Error>

Consume unencrypted TLS handshake data.

Handshake data obtained from separate encryption levels should be supplied in separate calls.

Source

pub fn write_hs(&mut self, buf: &mut Vec<u8>) -> Option<KeyChange>

Emit unencrypted TLS handshake data.

When this returns Some(_), the new keys must be used for future handshake data.

Source

pub fn alert(&self) -> Option<AlertDescription>

Emit the TLS description code of a fatal alert, if one has arisen.

Check after read_hs returns Err(_).

Source

pub fn export_keying_material<T: AsMut<[u8]>>( &self, output: T, label: &[u8], context: Option<&[u8]>, ) -> Result<T, Error>

Derives key material from the agreed connection secrets.

This function fills in output with output.len() bytes of key material derived from the master session secret using label and context for diversification. Ownership of the buffer is taken by the function and returned via the Ok result to ensure no key material leaks if the function fails.

See RFC5705 for more details on what this does and is for.

For TLS1.3 connections, this function does not use the “early” exporter at any point.

This function fails if called prior to the handshake completing; check with CommonState::is_handshaking first.

Methods from Deref<Target = CommonState>§

Source

pub fn wants_write(&self) -> bool

Returns true if the caller should call Connection::write_tls as soon as possible.

Source

pub fn is_handshaking(&self) -> bool

Returns true if the connection is currently performing the TLS handshake.

During this time plaintext written to the connection is buffered in memory. After Connection::process_new_packets() has been called, this might start to return false while the final handshake packets still need to be extracted from the connection’s buffers.

Source

pub fn peer_certificates(&self) -> Option<&[CertificateDer<'static>]>

Retrieves the certificate chain or the raw public key used by the peer to authenticate.

The order of the certificate chain is as it appears in the TLS protocol: the first certificate relates to the peer, the second certifies the first, the third certifies the second, and so on.

When using raw public keys, the first and only element is the raw public key.

This is made available for both full and resumed handshakes.

For clients, this is the certificate chain or the raw public key of the server.

For servers, this is the certificate chain or the raw public key of the client, if client authentication was completed.

The return value is None until this value is available.

Note: the return type of the ‘certificate’, when using raw public keys is CertificateDer<'static> even though this should technically be a SubjectPublicKeyInfoDer<'static>. This choice simplifies the API and ensures backwards compatibility.

Source

pub fn alpn_protocol(&self) -> Option<&[u8]>

Retrieves the protocol agreed with the peer via ALPN.

A return value of None after handshake completion means no protocol was agreed (because no protocols were offered or accepted by the peer).

Source

pub fn negotiated_cipher_suite(&self) -> Option<SupportedCipherSuite>

Retrieves the ciphersuite agreed with the peer.

This returns None until the ciphersuite is agreed.

Source

pub fn negotiated_key_exchange_group( &self, ) -> Option<&'static dyn SupportedKxGroup>

Retrieves the key exchange group agreed with the peer.

This function may return None depending on the state of the connection, the type of handshake, and the protocol version.

If CommonState::is_handshaking() is true this function will return None. Similarly, if the CommonState::handshake_kind() is HandshakeKind::Resumed and the CommonState::protocol_version() is TLS 1.2, then no key exchange will have occurred and this function will return None.

Source

pub fn protocol_version(&self) -> Option<ProtocolVersion>

Retrieves the protocol version agreed with the peer.

This returns None until the version is agreed.

Source

pub fn handshake_kind(&self) -> Option<HandshakeKind>

Which kind of handshake was performed.

This tells you whether the handshake was a resumption or not.

This will return None before it is known which sort of handshake occurred.

Source

pub(crate) fn is_tls13(&self) -> bool

Source

pub(crate) fn process_main_protocol<Data>( &mut self, msg: Message<'_>, state: Box<dyn State<Data>>, data: &mut Data, sendable_plaintext: Option<&mut ChunkVecBuffer>, ) -> Result<Box<dyn State<Data>>, Error>

Source

pub(crate) fn write_plaintext( &mut self, payload: OutboundChunks<'_>, outgoing_tls: &mut [u8], ) -> Result<usize, EncryptError>

Source

pub(crate) fn check_aligned_handshake(&mut self) -> Result<(), Error>

Source

pub(crate) fn send_msg_encrypt(&mut self, m: PlainMessage)

Fragment m, encrypt the fragments, and then queue the encrypted fragments for sending.

Source

fn send_appdata_encrypt( &mut self, payload: OutboundChunks<'_>, limit: Limit, ) -> usize

Like send_msg_encrypt, but operate on an appdata directly.

Source

fn send_single_fragment(&mut self, m: OutboundPlainMessage<'_>)

Source

fn send_plain_non_buffering( &mut self, payload: OutboundChunks<'_>, limit: Limit, ) -> usize

Source

pub(crate) fn start_outgoing_traffic( &mut self, sendable_plaintext: &mut Option<&mut ChunkVecBuffer>, )

Mark the connection as ready to send application data.

Also flush sendable_plaintext if it is Some.

Source

pub(crate) fn start_traffic( &mut self, sendable_plaintext: &mut Option<&mut ChunkVecBuffer>, )

Mark the connection as ready to send and receive application data.

Also flush sendable_plaintext if it is Some.

Source

fn flush_plaintext(&mut self, sendable_plaintext: &mut ChunkVecBuffer)

Send any buffered plaintext. Plaintext is buffered if written during handshake.

Source

fn queue_tls_message(&mut self, m: OutboundOpaqueMessage)

Source

pub(crate) fn perhaps_write_key_update(&mut self)

Source

pub(crate) fn send_msg(&mut self, m: Message<'_>, must_encrypt: bool)

Send a raw TLS message, fragmenting it if needed.

Source

pub(crate) fn take_received_plaintext(&mut self, bytes: Payload<'_>)

Source

pub(crate) fn start_encryption_tls12( &mut self, secrets: &ConnectionSecrets, side: Side, )

Source

pub(crate) fn missing_extension(&mut self, why: PeerMisbehaved) -> Error

Source

fn send_warning_alert(&mut self, desc: AlertDescription)

Source

pub(crate) fn process_alert( &mut self, alert: &AlertMessagePayload, ) -> Result<(), Error>

Source

pub(crate) fn send_cert_verify_error_alert(&mut self, err: Error) -> Error

Source

pub(crate) fn send_fatal_alert( &mut self, desc: AlertDescription, err: impl Into<Error>, ) -> Error

Source

pub fn send_close_notify(&mut self)

Queues a close_notify warning alert to be sent in the next Connection::write_tls call. This informs the peer that the connection is being closed.

Does nothing if any close_notify or fatal alert was already sent.

Source

pub(crate) fn eager_send_close_notify( &mut self, outgoing_tls: &mut [u8], ) -> Result<usize, EncryptError>

Source

fn send_warning_alert_no_log(&mut self, desc: AlertDescription)

Source

fn check_required_size<'a>( &self, outgoing_tls: &mut [u8], fragments: impl Iterator<Item = OutboundPlainMessage<'a>>, ) -> Result<(), EncryptError>

Source

fn write_fragments<'a>( &mut self, outgoing_tls: &mut [u8], fragments: impl Iterator<Item = OutboundPlainMessage<'a>>, ) -> usize

Source

pub(crate) fn set_max_fragment_size( &mut self, new: Option<usize>, ) -> Result<(), Error>

Source

pub(crate) fn get_alpn_protocol(&self) -> Option<&[u8]>

Source

pub fn wants_read(&self) -> bool

Returns true if the caller should call Connection::read_tls as soon as possible.

If there is pending plaintext data to read with Connection::reader, this returns false. If your application respects this mechanism, only one full TLS message will be buffered by rustls.

Source

pub(crate) fn current_io_state(&self) -> IoState

Source

pub(crate) fn is_quic(&self) -> bool

Source

pub(crate) fn should_update_key( &mut self, key_update_request: &KeyUpdateRequest, ) -> Result<bool, Error>

Source

pub(crate) fn enqueue_key_update_notification(&mut self)

Source

pub(crate) fn received_tls13_change_cipher_spec(&mut self) -> Result<(), Error>

Source

pub(crate) fn buffer_plaintext( &mut self, payload: OutboundChunks<'_>, sendable_plaintext: &mut ChunkVecBuffer, ) -> usize

Send plaintext application data, fragmenting and encrypting it as it goes out.

If internal buffers are too small, this function will not accept all the data.

Source

pub(crate) fn send_early_plaintext(&mut self, data: &[u8]) -> usize

Source

fn send_plain( &mut self, payload: OutboundChunks<'_>, limit: Limit, sendable_plaintext: &mut ChunkVecBuffer, ) -> usize

Encrypt and send some plaintext data. limit controls whether the per-connection buffer limits apply.

Returns the number of bytes written from data: this might be less than data.len() if buffer limits were exceeded.

Trait Implementations§

Source§

impl Debug for Connection

Source§

fn fmt(&self, f: &mut Formatter<'_>) -> Result

Formats the value using the given formatter. Read more
Source§

impl Deref for Connection

Source§

type Target = CommonState

The resulting type after dereferencing.
Source§

fn deref(&self) -> &Self::Target

Dereferences the value.
Source§

impl DerefMut for Connection

Source§

fn deref_mut(&mut self) -> &mut Self::Target

Mutably dereferences the value.
Source§

impl From<ClientConnection> for Connection

Source§

fn from(c: ClientConnection) -> Self

Converts to this type from the input type.
Source§

impl From<ServerConnection> for Connection

Source§

fn from(c: ServerConnection) -> Self

Converts to this type from the input type.

Auto Trait Implementations§

Blanket Implementations§

Source§

impl<T> Any for T
where T: 'static + ?Sized,

Source§

fn type_id(&self) -> TypeId

Gets the TypeId of self. Read more
Source§

impl<T> Borrow<T> for T
where T: ?Sized,

Source§

fn borrow(&self) -> &T

Immutably borrows from an owned value. Read more
Source§

impl<T> BorrowMut<T> for T
where T: ?Sized,

Source§

fn borrow_mut(&mut self) -> &mut T

Mutably borrows from an owned value. Read more
Source§

impl<T> From<T> for T

Source§

fn from(t: T) -> T

Returns the argument unchanged.

Source§

impl<T, U> Into<U> for T
where U: From<T>,

Source§

fn into(self) -> U

Calls U::from(self).

That is, this conversion is whatever the implementation of From<T> for U chooses to do.

Source§

impl<P, T> Receiver for P
where P: Deref<Target = T> + ?Sized, T: ?Sized,

Source§

type Target = T

🔬This is a nightly-only experimental API. (arbitrary_self_types)
The target type on which the method may be called.
Source§

impl<T, U> TryFrom<U> for T
where U: Into<T>,

Source§

type Error = Infallible

The type returned in the event of a conversion error.
Source§

fn try_from(value: U) -> Result<T, <T as TryFrom<U>>::Error>

Performs the conversion.
Source§

impl<T, U> TryInto<U> for T
where U: TryFrom<T>,

Source§

type Error = <U as TryFrom<T>>::Error

The type returned in the event of a conversion error.
Source§

fn try_into(self) -> Result<U, <U as TryFrom<T>>::Error>

Performs the conversion.