Struct rustls::ServerSession
source · [−]pub struct ServerSession { /* private fields */ }
Expand description
This represents a single TLS server session.
Send TLS-protected data to the peer using the io::Write
trait implementation.
Read data from the peer using the io::Read
trait implementation.
Implementations
sourceimpl ServerSession
impl ServerSession
sourcepub fn new(config: &Arc<ServerConfig>) -> ServerSession
pub fn new(config: &Arc<ServerConfig>) -> ServerSession
Make a new ServerSession. config
controls how
we behave in the TLS protocol.
sourcepub fn get_sni_hostname(&self) -> Option<&str>
pub fn get_sni_hostname(&self) -> Option<&str>
Retrieves the SNI hostname, if any, used to select the certificate and private key.
This returns None
until some time after the client’s SNI extension
value is processed during the handshake. It will never be None
when
the connection is ready to send or process application data, unless the
client does not support SNI.
This is useful for application protocols that need to enforce that the
SNI hostname matches an application layer protocol hostname. For
example, HTTP/1.1 servers commonly expect the Host:
header field of
every request on a connection to match the hostname in the SNI extension
when the client provides the SNI extension.
The SNI hostname is also used to match sessions during session resumption.
sourcepub fn received_resumption_data(&self) -> Option<&[u8]>
pub fn received_resumption_data(&self) -> Option<&[u8]>
Application-controlled portion of the resumption ticket supplied by the client, if any.
Recovered from the prior session’s set_resumption_data
. Integrity is guaranteed by rustls.
Returns Some
iff a valid resumption ticket has been received from the client.
sourcepub fn set_resumption_data(&mut self, data: &[u8])
pub fn set_resumption_data(&mut self, data: &[u8])
Set the resumption data to embed in future resumption tickets supplied to the client.
Defaults to the empty byte string. Must be less than 2^15 bytes to allow room for other
data. Should be called while is_handshaking
returns true to ensure all transmitted
resumption tickets are affected.
Integrity will be assured by rustls, but the data will be visible to the client. If secrecy from the client is desired, encrypt the data separately.
sourcepub fn reject_early_data(&mut self)
pub fn reject_early_data(&mut self)
Explicitly discard early data, notifying the client
Useful if invariants encoded in received_resumption_data()
cannot be respected.
Must be called while is_handshaking
is true.
Trait Implementations
sourceimpl Debug for ServerSession
impl Debug for ServerSession
sourceimpl Read for ServerSession
impl Read for ServerSession
sourcefn read(&mut self, buf: &mut [u8]) -> Result<usize>
fn read(&mut self, buf: &mut [u8]) -> Result<usize>
Obtain plaintext data received from the peer over this TLS connection.
If the peer closes the TLS session cleanly, this fails with an error of kind ErrorKind::ConnectionAborted once all the pending data has been read. No further data can be received on that connection, so the underlying TCP connection should closed too.
Note that support close notify varies in peer TLS libraries: many do not support it and uncleanly close the TCP connection (this might be vulnerable to truncation attacks depending on the application protocol). This means applications using rustls must both handle ErrorKind::ConnectionAborted from this function, and unexpected closure of the underlying TCP connection.
fn read_vectored(&mut self, bufs: &mut [IoSliceMut<'_>]) -> Result<usize, Error>
fn read_vectored(&mut self, bufs: &mut [IoSliceMut<'_>]) -> Result<usize, Error>
read
, except that it reads into a slice of buffers. Read morefn is_read_vectored(&self) -> bool
fn is_read_vectored(&self) -> bool
fn read_to_end(&mut self, buf: &mut Vec<u8, Global>) -> Result<usize, Error>
fn read_to_end(&mut self, buf: &mut Vec<u8, Global>) -> Result<usize, Error>
buf
. Read morefn read_to_string(&mut self, buf: &mut String) -> Result<usize, Error>
fn read_to_string(&mut self, buf: &mut String) -> Result<usize, Error>
buf
. Read morefn read_exact(&mut self, buf: &mut [u8]) -> Result<(), Error>
fn read_exact(&mut self, buf: &mut [u8]) -> Result<(), Error>
buf
. Read morefn read_buf(&mut self, buf: BorrowedCursor<'_>) -> Result<(), Error>
fn read_buf(&mut self, buf: BorrowedCursor<'_>) -> Result<(), Error>
fn read_buf_exact(&mut self, cursor: BorrowedCursor<'_>) -> Result<(), Error>
fn read_buf_exact(&mut self, cursor: BorrowedCursor<'_>) -> Result<(), Error>
cursor
. Read morefn by_ref(&mut self) -> &mut Self
fn by_ref(&mut self) -> &mut Self
Read
. Read morefn bytes(self) -> Bytes<Self>
fn bytes(self) -> Bytes<Self>
sourceimpl Session for ServerSession
impl Session for ServerSession
sourcefn read_tls(&mut self, rd: &mut dyn Read) -> Result<usize>
fn read_tls(&mut self, rd: &mut dyn Read) -> Result<usize>
rd
. This method does internal
buffering, so rd
can supply TLS messages in arbitrary-
sized chunks (like a socket or pipe might). Read moresourcefn process_new_packets(&mut self) -> Result<(), TLSError>
fn process_new_packets(&mut self) -> Result<(), TLSError>
read_tls
.
Errors from this function relate to TLS protocol errors, and
are fatal to the session. Future calls after an error will do
no new work and will return the same error. Read moresourcefn wants_read(&self) -> bool
fn wants_read(&self) -> bool
read_tls
as soon
as possible. Read moresourcefn wants_write(&self) -> bool
fn wants_write(&self) -> bool
write_tls
as soon
as possible. Read moresourcefn is_handshaking(&self) -> bool
fn is_handshaking(&self) -> bool
sourcefn set_buffer_limit(&mut self, len: usize)
fn set_buffer_limit(&mut self, len: usize)
sourcefn send_close_notify(&mut self)
fn send_close_notify(&mut self)
write_tls
call. This informs the peer that the
connection is being closed. Read moresourcefn get_peer_certificates(&self) -> Option<Vec<Certificate>>
fn get_peer_certificates(&self) -> Option<Vec<Certificate>>
sourcefn get_alpn_protocol(&self) -> Option<&[u8]>
fn get_alpn_protocol(&self) -> Option<&[u8]>
sourcefn get_protocol_version(&self) -> Option<ProtocolVersion>
fn get_protocol_version(&self) -> Option<ProtocolVersion>
sourcefn export_keying_material(
&self,
output: &mut [u8],
label: &[u8],
context: Option<&[u8]>
) -> Result<(), TLSError>
fn export_keying_material(
&self,
output: &mut [u8],
label: &[u8],
context: Option<&[u8]>
) -> Result<(), TLSError>
sourcefn get_negotiated_ciphersuite(&self) -> Option<&'static SupportedCipherSuite>
fn get_negotiated_ciphersuite(&self) -> Option<&'static SupportedCipherSuite>
sourcefn complete_io<T>(&mut self, io: &mut T) -> Result<(usize, usize), Error>where
Self: Sized,
T: Read + Write,
fn complete_io<T>(&mut self, io: &mut T) -> Result<(usize, usize), Error>where
Self: Sized,
T: Read + Write,
io
to complete any outstanding IO for
this session. Read moresourceimpl Write for ServerSession
impl Write for ServerSession
sourcefn write(&mut self, buf: &[u8]) -> Result<usize>
fn write(&mut self, buf: &[u8]) -> Result<usize>
Send the plaintext buf
to the peer, encrypting
and authenticating it. Once this function succeeds
you should call write_tls
which will output the
corresponding TLS records.
This function buffers plaintext sent before the TLS handshake completes, and sends it as soon as it can. This buffer is of unlimited size so writing much data before it can be sent will cause excess memory usage.