blob: 3026f865f67f8ec9c85c796d0ca27144f88c13b7 [file]
// Copyright 2026 The BoringSSL Authors
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// https://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//! TLS Session support for BoringSSL.
use alloc::vec::Vec;
use core::ptr::{
NonNull,
null_mut, //
};
use crate::{
call_slice_getter,
config::ProtocolVersion,
context::TlsContext,
errors::Error,
ffi::{
Alloc,
sanitize_slice,
slice_into_ffi_raw_parts, //
}, //
};
/// A TLS session.
///
/// See [RFC 8446 Section 2.2](https://datatracker.ietf.org/doc/html/rfc8446#section-2.2).
///
/// # Example
///
/// ```rust,no_run
/// # use bssl_tls::{context::TlsContext, sessions::TlsSession};
/// # use bssl_tls::context::{Client, TlsMode};
/// # use bssl_tls::connection::lifecycle::EstablishedTlsConnection;
/// // Assuming `conn` is an `EstablishedTlsConnection`
/// # let conn: EstablishedTlsConnection<'_, Client, TlsMode> = todo!();
/// # let ctx: TlsContext = todo!();
/// if let Some(session) = conn.get_session() {
/// // Serialize the session to store it
/// let session_bytes = session.to_bytes().unwrap();
///
/// // Deserialize the session to resume it later
/// let recovered_session = TlsSession::from_bytes(&session_bytes, &ctx).unwrap();
/// }
/// ```
pub struct TlsSession(pub(crate) NonNull<bssl_sys::SSL_SESSION>);
// Safety: once constructed an `SSL_SESSION` is immutable and has no thread-local data.
unsafe impl Send for TlsSession {}
unsafe impl Sync for TlsSession {}
impl Drop for TlsSession {
fn drop(&mut self) {
unsafe {
// Safety: self.ptr() is valid and we own a reference.
bssl_sys::SSL_SESSION_free(self.ptr());
}
}
}
impl Clone for TlsSession {
fn clone(&self) -> Self {
unsafe {
// Safety: self.ptr() is valid.
bssl_sys::SSL_SESSION_up_ref(self.ptr());
}
Self(self.0)
}
}
impl TlsSession {
pub(crate) fn ptr(&self) -> *mut bssl_sys::SSL_SESSION {
self.0.as_ptr()
}
/// Serializes the session into a newly allocated buffer.
pub fn to_bytes(&self) -> Result<Vec<u8>, Error> {
let mut out_data: *mut u8 = core::ptr::null_mut();
let mut out_len: usize = 0;
let rc = unsafe {
// Safety: `self.ptr()` is still valid.
bssl_sys::SSL_SESSION_to_bytes(self.ptr(), &raw mut out_data, &raw mut out_len)
};
if rc != 1 {
return Err(Error::extract_lib_err());
}
let out_data = Alloc(out_data);
let slice = unsafe {
// Safety: out_data.0 and out_len are returned by BoringSSL and are valid.
sanitize_slice(out_data.0, out_len).unwrap()
};
Ok(slice.to_vec())
}
/// Serializes the session for a ticket, excluding the session ID.
pub fn to_bytes_for_ticket(&self) -> Result<Vec<u8>, Error> {
let mut out_data: *mut u8 = core::ptr::null_mut();
let mut out_len: usize = 0;
let rc = unsafe {
// Safety: `self.ptr()` is still valid.
bssl_sys::SSL_SESSION_to_bytes_for_ticket(self.ptr(), &mut out_data, &mut out_len)
};
if rc != 1 {
return Err(Error::extract_lib_err());
}
let out_data = Alloc(out_data);
let slice = unsafe {
// Safety: out_data.0 and out_len are returned by BoringSSL and are valid.
sanitize_slice(out_data.0, out_len).unwrap()
};
Ok(slice.to_vec())
}
/// Parses a serialized session from bytes.
pub fn from_bytes<M>(bytes: &[u8], ctx: &TlsContext<M>) -> Result<Self, Error> {
let (ptr, len) = slice_into_ffi_raw_parts(bytes);
let ptr = unsafe {
// Safety: bytes is a valid slice and the context is still valid.
bssl_sys::SSL_SESSION_from_bytes(ptr, len, ctx.ptr())
};
let ptr = NonNull::new(ptr).ok_or_else(|| Error::extract_lib_err())?;
Ok(Self(ptr))
}
/// Get the protocol version of the session.
pub fn get_protocol_version(&self) -> Option<ProtocolVersion> {
let version = unsafe {
// Safety: self.ptr() is valid.
bssl_sys::SSL_SESSION_get_protocol_version(self.ptr())
};
version.try_into().ok()
}
/// Get the session creation time in seconds since the epoch.
pub fn get_time(&self) -> u64 {
unsafe {
// Safety: self.ptr() is valid.
bssl_sys::SSL_SESSION_get_time(self.ptr())
}
}
/// Get the session timeout in seconds.
pub fn get_timeout(&self) -> u64 {
unsafe {
// Safety: self.ptr() is valid.
bssl_sys::SSL_SESSION_get_timeout(self.ptr()).into()
}
}
/// Get the peer certificates as a list of DER-encoded certificates.
pub fn get_peer_certificates(&self) -> Result<Vec<Vec<u8>>, Error> {
let sk = unsafe {
// Safety: self.ptr() is valid.
bssl_sys::SSL_SESSION_get0_peer_certificates(self.ptr())
};
if sk.is_null() {
return Ok(Vec::new());
}
let len = unsafe {
// Safety: `sk` is valid.
bssl_sys::sk_CRYPTO_BUFFER_num(sk)
};
let mut res = Vec::new();
for i in 0..len {
let buf = unsafe {
// Safety: `sk` is valid and `i` is in bounds.
bssl_sys::sk_CRYPTO_BUFFER_value(sk, i)
};
if buf.is_null() {
continue;
}
let (data, len) = unsafe {
// Safety: `buf` is valid.
(
bssl_sys::CRYPTO_BUFFER_data(buf),
bssl_sys::CRYPTO_BUFFER_len(buf),
)
};
let Some(slice) = (unsafe {
// Safety: data and len are valid.
sanitize_slice(data, len)
}) else {
continue;
};
res.push(slice.to_vec());
}
Ok(res)
}
// TODO(@xfding): Implement SSL_SESSION_get0_peer_rpk when needed.
/// Get the signed certificate timestamp list, if any.
pub fn get0_signed_cert_timestamp_list(&self) -> Option<&[u8]> {
call_slice_getter!(
bssl_sys::SSL_SESSION_get0_signed_cert_timestamp_list,
self.ptr()
)
}
/// Get the OCSP response, if any.
///
/// See [RFC 8446 §4.4.2.1](https://datatracker.ietf.org/doc/html/rfc8446#section-4.4.2.1).
pub fn get_ocsp_response(&self) -> Option<&[u8]> {
call_slice_getter!(bssl_sys::SSL_SESSION_get0_ocsp_response, self.ptr())
}
/// Get the master key.
///
/// In TLS 1.3, this returns the **Resumption Master Secret**.
/// See [RFC 8446 §7.1](https://datatracker.ietf.org/doc/html/rfc8446#section-7.1).
///
/// BoringSSL uses this secret to automatically derive the Pre-Shared Key (PSK) for
/// session resumption. Users should not attempt to manually expand this secret or
/// perform manual cryptography; BoringSSL handles the key expansion internally when
/// a session is configured for resumption.
///
/// # Example
///
/// If you need to derive a PSK for external use (e.g. for external PSK resumption),
/// you can use `bssl_crypto::hkdf`:
///
/// ```rust,no_run
/// # use bssl_tls::sessions::TlsSession;
/// # // Assuming `session` is a `TlsSession`
/// # let session: TlsSession = todo!();
/// let master_key = session.get_master_key();
///
/// // Treat the master key as a PRK in HKDF
/// let prk = bssl_crypto::hkdf::Prk::new::<bssl_crypto::digest::Sha256>(&master_key)
/// .expect("Invalid master key length");
///
/// // Expand it to derive a PSK
/// let mut psk = vec![0u8; 32];
/// prk.expand_into(b"resumption psk", &mut psk)
/// .expect("HKDF expansion failed");
/// ```
pub fn get_master_key(&self) -> Vec<u8> {
let len = unsafe {
// Safety: self.ptr() is valid.
bssl_sys::SSL_SESSION_get_master_key(self.ptr(), null_mut(), 0)
};
let mut out = vec![0u8; len];
let len = unsafe {
// Safety: self.ptr() is valid.
bssl_sys::SSL_SESSION_get_master_key(self.ptr(), out.as_mut_ptr(), out.len())
};
out.truncate(len);
out
}
/// Check if the session should be single use.
pub fn should_be_single_use(&self) -> bool {
unsafe {
// Safety: self.ptr() is valid.
bssl_sys::SSL_SESSION_should_be_single_use(self.ptr()) == 1
}
}
/// Check if the session is resumable.
pub fn is_resumable(&self) -> bool {
unsafe {
// Safety: self.ptr() is valid.
bssl_sys::SSL_SESSION_is_resumable(self.ptr()) == 1
}
}
/// Check if the session has a ticket.
pub fn has_ticket(&self) -> bool {
unsafe {
// Safety: self.ptr() is valid.
bssl_sys::SSL_SESSION_has_ticket(self.ptr()) == 1
}
}
/// Get the ticket, if any.
pub fn get_ticket(&self) -> Option<&[u8]> {
call_slice_getter!(bssl_sys::SSL_SESSION_get0_ticket, self.ptr())
}
/// Check if the session has a peer SHA256.
pub fn has_peer_sha256(&self) -> bool {
unsafe {
// Safety: self.ptr() is valid.
bssl_sys::SSL_SESSION_has_peer_sha256(self.ptr()) == 1
}
}
/// Get the peer SHA256, if any.
pub fn get_peer_sha256(&self) -> Option<&[u8]> {
call_slice_getter!(bssl_sys::SSL_SESSION_get0_peer_sha256, self.ptr())
}
/// Check if the session is resumable across names.
pub fn is_resumable_across_names(&self) -> bool {
unsafe {
// Safety: self.ptr() is valid.
bssl_sys::SSL_SESSION_is_resumable_across_names(self.ptr()) == 1
}
}
/// Check if the session is early data capable.
pub fn early_data_capable(&self) -> bool {
unsafe {
// Safety: self.ptr() is valid.
bssl_sys::SSL_SESSION_early_data_capable(self.ptr()) == 1
}
}
}
#[cfg(test)]
mod tests {
use core::pin::Pin;
use futures::future::try_join;
use super::*;
use crate::tests::create_mock_pipe;
use crate::{
context::TlsContextBuilder,
credentials::{
PskHash,
TlsCredential, //
}, //
};
const TEST_KEY: &[u8; 32] = b"0123456789abcdef0123456789abcdef";
const TEST_IDENTITY: &[u8] = b"test-identity";
const TEST_CONTEXT: &[u8] = b"test-context";
#[test]
fn test_session_ops() {
let ctx = TlsContextBuilder::new_tls().build();
let dummy_bytes = vec![0u8; 32];
let res = TlsSession::from_bytes(&dummy_bytes, &ctx);
assert!(res.is_err());
}
#[test]
fn test_psk_resumption() {
let cred_client = TlsCredential::new_pre_shared_key(
TEST_KEY,
TEST_IDENTITY,
PskHash::Sha256,
TEST_CONTEXT,
)
.unwrap();
let cred_server = TlsCredential::new_pre_shared_key(
TEST_KEY,
TEST_IDENTITY,
PskHash::Sha256,
TEST_CONTEXT,
)
.unwrap();
let mut ctx_client = TlsContextBuilder::new_tls();
ctx_client.with_credential(cred_client).unwrap();
let ctx_client = ctx_client.build();
let mut ctx_server = TlsContextBuilder::new_tls();
ctx_server.with_credential(cred_server).unwrap();
let ctx_server = ctx_server.build();
let mut conn_client = ctx_client.new_client_connection(None).unwrap().build();
let mut conn_server = ctx_server.new_server_connection(None).unwrap().build();
let (sock_client, sock_server, mut executor) = create_mock_pipe();
conn_client.set_io(sock_client).unwrap();
conn_server.set_io(sock_server).unwrap();
executor
.run(try_join(
conn_client.in_handshake().unwrap().async_handshake(),
conn_server.in_handshake().unwrap().async_handshake(),
))
.unwrap();
let est_client = conn_client.established().unwrap();
let session = est_client.get_session().unwrap();
let session_bytes = session.to_bytes().unwrap();
assert!(!session_bytes.is_empty());
let session_recovered = TlsSession::from_bytes(&session_bytes, &ctx_client).unwrap();
let session_bytes_2 = session_recovered.to_bytes().unwrap();
assert_eq!(session_bytes, session_bytes_2);
}
#[test]
fn test_ticket_based_resumption() {
let cred_client = TlsCredential::new_pre_shared_key(
TEST_KEY,
TEST_IDENTITY,
PskHash::Sha256,
TEST_CONTEXT,
)
.unwrap();
let cred_server = TlsCredential::new_pre_shared_key(
TEST_KEY,
TEST_IDENTITY,
PskHash::Sha256,
TEST_CONTEXT,
)
.unwrap();
let mut ctx_client = TlsContextBuilder::new_tls();
ctx_client.with_credential(cred_client).unwrap();
let ctx_client = ctx_client.build();
let mut ctx_server = TlsContextBuilder::new_tls();
ctx_server.with_credential(cred_server).unwrap();
let ctx_server = ctx_server.build();
let mut conn_client = ctx_client.new_client_connection(None).unwrap().build();
let mut conn_server = ctx_server.new_server_connection(None).unwrap().build();
let (sock_client, sock_server, mut executor) = create_mock_pipe();
conn_client.set_io(sock_client).unwrap();
conn_server.set_io(sock_server).unwrap();
executor
.run(try_join(
conn_client.in_handshake().unwrap().async_handshake(),
conn_server.in_handshake().unwrap().async_handshake(),
))
.unwrap();
let est_client = conn_client.established().unwrap();
let session = est_client.get_session().unwrap();
let peer = session.get_peer_sha256().unwrap();
// === SESSION RESUMPTION ===
// Use the session for a new connection
let (sock_client_2, sock_server_2, mut executor) = create_mock_pipe();
let mut builder_client_2 = ctx_client.new_client_connection(None).unwrap();
builder_client_2.with_session(&session);
let mut conn_client_2 = builder_client_2.build();
let builder_server_2 = ctx_server.new_server_connection(None).unwrap();
let mut conn_server_2 = builder_server_2.build();
conn_client_2.set_io(sock_client_2).unwrap();
conn_server_2.set_io(sock_server_2).unwrap();
executor
.run(try_join(
Pin::new(&mut conn_client_2).async_write(b"hello"),
Pin::new(&mut conn_server_2).async_write(b"world"),
))
.unwrap();
// The peer identity should be the same as before
assert_eq!(
conn_client_2
.established()
.unwrap()
.get_session()
.unwrap()
.get_peer_sha256()
.unwrap(),
peer
);
}
}