Botan 3.10.0
Crypto and TLS for C&
Botan::TLS::Channel_Impl_13 Class Referenceabstract

#include <tls_channel_impl_13.h>

Inheritance diagram for Botan::TLS::Channel_Impl_13:
Botan::TLS::Channel_Impl Botan::TLS::Secret_Logger Botan::TLS::Client_Impl_13 Botan::TLS::Server_Impl_13

Classes

class  AggregatedHandshakeMessages
class  AggregatedMessages
class  AggregatedPostHandshakeMessages

Public Member Functions

virtual std::string application_protocol () const =0
 Channel_Impl_13 (Channel_Impl_13 &&other)=delete
 Channel_Impl_13 (const Channel_Impl_13 &other)=delete
 Channel_Impl_13 (const std::shared_ptr< Callbacks > &callbacks, const std::shared_ptr< Session_Manager > &session_manager, const std::shared_ptr< Credentials_Manager > &credentials_manager, const std::shared_ptr< RandomNumberGenerator > &rng, const std::shared_ptr< const Policy > &policy, bool is_server)
void close ()
bool expects_downgrade () const
virtual std::optional< std::string > external_psk_identity () const =0
std::unique_ptr< Downgrade_Informationextract_downgrade_info ()
size_t from_peer (std::span< const uint8_t > data) override
bool is_active () const override
bool is_closed () const override
bool is_closed_for_reading () const override
bool is_closed_for_writing () const override
bool is_downgrading () const
virtual bool is_handshake_complete () const =0
SymmetricKey key_material_export (std::string_view label, std::string_view context, size_t length) const override
virtual bool new_session_ticket_supported () const
Channel_Impl_13operator= (Channel_Impl_13 &&other)=delete
Channel_Impl_13operator= (const Channel_Impl_13 &other)=delete
virtual std::vector< X509_Certificatepeer_cert_chain () const =0
virtual std::shared_ptr< const Public_Keypeer_raw_public_key () const =0
void renegotiate (bool) override
bool secure_renegotiation_supported () const override
void send_alert (const Alert &alert) override
void send_fatal_alert (Alert::Type type)
virtual size_t send_new_session_tickets (const size_t)
void send_warning_alert (Alert::Type type)
bool timeout_check () override
void to_peer (std::span< const uint8_t > data) override
void update_traffic_keys (bool request_peer_update=false) override
 ~Channel_Impl_13 () override

Protected Member Functions

AggregatedHandshakeMessages aggregate_handshake_messages ()
AggregatedPostHandshakeMessages aggregate_post_handshake_messages ()
Callbackscallbacks () const
Credentials_Managercredentials_manager ()
void expect_downgrade (const Server_Information &server_info, const std::vector< std::string > &next_protocols)
void handle (const Key_Update &key_update)
virtual void maybe_log_secret (std::string_view label, std::span< const uint8_t > secret) const =0
void opportunistically_update_traffic_keys ()
const Policypolicy () const
virtual bool prepend_ccs ()
void preserve_client_hello (std::span< const uint8_t > msg)
void preserve_peer_transcript (std::span< const uint8_t > input)
virtual void process_dummy_change_cipher_spec ()=0
virtual void process_handshake_msg (Handshake_Message_13 msg)=0
virtual void process_post_handshake_msg (Post_Handshake_Message_13 msg)=0
void request_downgrade ()
void request_downgrade_for_resumption (Session_with_Handle session)
RandomNumberGeneratorrng ()
void send_dummy_change_cipher_spec ()
template<typename... MsgTs>
std::vector< uint8_t > send_handshake_message (const std::variant< MsgTs... > &message)
template<typename MsgT>
std::vector< uint8_t > send_handshake_message (std::reference_wrapper< MsgT > message)
std::vector< uint8_t > send_post_handshake_message (Post_Handshake_Message_13 message)
Session_Managersession_manager ()
void set_io_buffer_size (size_t io_buf_sz)
void set_record_size_limits (uint16_t outgoing_limit, uint16_t incoming_limit)
void set_selected_certificate_type (Certificate_Type cert_type)

Protected Attributes

std::unique_ptr< Cipher_Statem_cipher_state
std::unique_ptr< Downgrade_Informationm_downgrade_info
const Connection_Side m_side
Transcript_Hash_State m_transcript_hash

Detailed Description

Generic interface for TLS 1.3 endpoint

Definition at line 48 of file tls_channel_impl_13.h.

Constructor & Destructor Documentation

◆ Channel_Impl_13() [1/3]

Botan::TLS::Channel_Impl_13::Channel_Impl_13 ( const std::shared_ptr< Callbacks > & callbacks,
const std::shared_ptr< Session_Manager > & session_manager,
const std::shared_ptr< Credentials_Manager > & credentials_manager,
const std::shared_ptr< RandomNumberGenerator > & rng,
const std::shared_ptr< const Policy > & policy,
bool is_server )
explicit

Set up a new TLS 1.3 session

Parameters
callbackscontains a set of callback function references required by the TLS endpoint.
session_managermanages session state
credentials_managermanages application/user credentials
rnga random number generator
policyspecifies other connection policy information
is_serverwhether this is a server session or not

Definition at line 38 of file tls_channel_impl_13.cpp.

43 :
45 m_callbacks(callbacks),
46 m_session_manager(session_manager),
47 m_credentials_manager(credentials_manager),
48 m_rng(rng),
49 m_policy(policy),
50 m_record_layer(m_side),
51 m_handshake_layer(m_side),
52 m_can_read(true),
53 m_can_write(true),
54 m_opportunistic_key_update(false),
55 m_first_message_sent(false),
56 m_first_message_received(false) {
57 BOTAN_ASSERT_NONNULL(m_callbacks);
58 BOTAN_ASSERT_NONNULL(m_session_manager);
59 BOTAN_ASSERT_NONNULL(m_credentials_manager);
61 BOTAN_ASSERT_NONNULL(m_policy);
62}
#define BOTAN_ASSERT_NONNULL(ptr)
Definition assert.h:114
const Policy & policy() const
Credentials_Manager & credentials_manager()
RandomNumberGenerator & rng()
Session_Manager & session_manager()

References BOTAN_ASSERT_NONNULL, callbacks(), Botan::TLS::Channel_Impl::Client, credentials_manager(), m_side, policy(), rng(), Botan::TLS::Channel_Impl::Server, and session_manager().

Referenced by Botan::TLS::Channel_Impl_13::AggregatedHandshakeMessages::AggregatedHandshakeMessages(), Botan::TLS::Channel_Impl_13::AggregatedMessages::AggregatedMessages(), Channel_Impl_13(), Channel_Impl_13(), Botan::TLS::Client_Impl_13::Client_Impl_13(), operator=(), operator=(), and Botan::TLS::Server_Impl_13::Server_Impl_13().

◆ Channel_Impl_13() [2/3]

Botan::TLS::Channel_Impl_13::Channel_Impl_13 ( const Channel_Impl_13 & other)
delete

References Channel_Impl_13().

◆ Channel_Impl_13() [3/3]

Botan::TLS::Channel_Impl_13::Channel_Impl_13 ( Channel_Impl_13 && other)
delete

References Channel_Impl_13().

◆ ~Channel_Impl_13()

Botan::TLS::Channel_Impl_13::~Channel_Impl_13 ( )
overridedefault

Member Function Documentation

◆ aggregate_handshake_messages()

AggregatedHandshakeMessages Botan::TLS::Channel_Impl_13::aggregate_handshake_messages ( )
inlineprotected

Definition at line 257 of file tls_channel_impl_13.h.

References m_transcript_hash.

Referenced by send_handshake_message().

◆ aggregate_post_handshake_messages()

AggregatedPostHandshakeMessages Botan::TLS::Channel_Impl_13::aggregate_post_handshake_messages ( )
inlineprotected

◆ application_protocol()

virtual std::string Botan::TLS::Channel_Impl::application_protocol ( ) const
pure virtualinherited

Return the protocol notification set for this connection, if any (ALPN). This value is not tied to the session and a later renegotiation of the same session can choose a new protocol.

Implemented in Botan::TLS::Client_Impl_12, Botan::TLS::Client_Impl_13, and Botan::TLS::Server_Impl_13.

◆ callbacks()

Callbacks & Botan::TLS::Channel_Impl_13::callbacks ( ) const
inlineprotected

◆ close()

void Botan::TLS::Channel_Impl::close ( )
inlineinherited

Send a close notification alert

Definition at line 86 of file tls_channel_impl.h.

86{ send_warning_alert(Alert::CloseNotify); }
void send_warning_alert(Alert::Type type)

References send_warning_alert().

◆ credentials_manager()

Credentials_Manager & Botan::TLS::Channel_Impl_13::credentials_manager ( )
inlineprotected

Definition at line 269 of file tls_channel_impl_13.h.

269{ return *m_credentials_manager; }

Referenced by Channel_Impl_13(), and Botan::TLS::Server_Impl_13::Server_Impl_13().

◆ expect_downgrade()

void Botan::TLS::Channel_Impl_13::expect_downgrade ( const Server_Information & server_info,
const std::vector< std::string > & next_protocols )
protected

Indicate that we have to expect a downgrade to TLS 1.2. In which case the current implementation (i.e. Client_Impl_13 or Server_Impl_13) will need to be replaced by their respective counter parts.

This will prepare an internal structure where any information required to downgrade can be preserved.

See also
Channel_Impl::Downgrade_Information

Definition at line 400 of file tls_channel_impl_13.cpp.

401 {
403 {},
404 {},
405 {},
406 server_info,
407 next_protocols,
409 m_callbacks,
410 m_session_manager,
411 m_credentials_manager,
412 m_rng,
413 m_policy,
414 false, // received_tls_13_error_alert
415 false // will_downgrade
416 };
417 m_downgrade_info = std::make_unique<Downgrade_Information>(std::move(di));
418}
std::unique_ptr< Downgrade_Information > m_downgrade_info
static constexpr size_t IO_BUF_DEFAULT_SIZE
Definition tls_channel.h:32

References Botan::TLS::Channel::IO_BUF_DEFAULT_SIZE, and Botan::TLS::Channel_Impl::m_downgrade_info.

◆ expects_downgrade()

bool Botan::TLS::Channel_Impl::expects_downgrade ( ) const
inlineinherited

Definition at line 286 of file tls_channel_impl.h.

286{ return m_downgrade_info != nullptr; }

References m_downgrade_info.

Referenced by Botan::TLS::Client_Impl_13::Client_Impl_13(), and Botan::TLS::Channel_Impl_13::from_peer().

◆ external_psk_identity()

virtual std::optional< std::string > Botan::TLS::Channel_Impl::external_psk_identity ( ) const
pure virtualinherited
Returns
identity of the PSK used for this connection or std::nullopt if no PSK was used.

Implemented in Botan::TLS::Channel_Impl_12, Botan::TLS::Client_Impl_13, and Botan::TLS::Server_Impl_13.

◆ extract_downgrade_info()

std::unique_ptr< Downgrade_Information > Botan::TLS::Channel_Impl::extract_downgrade_info ( )
inlineinherited
See also
Downgrade_Information

Definition at line 284 of file tls_channel_impl.h.

284{ return std::exchange(m_downgrade_info, {}); }

References m_downgrade_info.

◆ from_peer()

size_t Botan::TLS::Channel_Impl_13::from_peer ( std::span< const uint8_t > data)
overridevirtual

Inject TLS traffic received from counterparty

Returns
a hint as the how many more bytes we need to q the current record (this may be 0 if on a record boundary)

Implements Botan::TLS::Channel_Impl.

Definition at line 66 of file tls_channel_impl_13.cpp.

66 {
68
69 // RFC 8446 6.1
70 // Any data received after a closure alert has been received MUST be ignored.
71 if(!m_can_read) {
72 return 0;
73 }
74
75 try {
76 if(expects_downgrade()) {
78 }
79
80 m_record_layer.copy_data(data);
81
82 while(true) {
83 // RFC 8446 6.1
84 // Any data received after a closure alert has been received MUST be ignored.
85 //
86 // ... this data might already be in the record layer's read buffer.
87 if(!m_can_read) {
88 return 0;
89 }
90
91 auto result = m_record_layer.next_record(m_cipher_state.get());
92
93 if(std::holds_alternative<BytesNeeded>(result)) {
94 return std::get<BytesNeeded>(result);
95 }
96
97 const auto& record = std::get<Record>(result);
98
99 // RFC 8446 5.1
100 // Handshake messages MUST NOT be interleaved with other record types.
101 if(record.type != Record_Type::Handshake && m_handshake_layer.has_pending_data()) {
102 throw Unexpected_Message("Expected remainder of a handshake message");
103 }
104
105 if(record.type == Record_Type::Handshake) {
106 m_handshake_layer.copy_data(record.fragment);
107
108 if(!is_handshake_complete()) {
109 while(auto handshake_msg = m_handshake_layer.next_message(policy(), m_transcript_hash)) {
110 // RFC 8446 5.1
111 // Handshake messages MUST NOT span key changes. Implementations
112 // MUST verify that all messages immediately preceding a key change
113 // align with a record boundary; if not, then they MUST terminate the
114 // connection with an "unexpected_message" alert. Because the
115 // ClientHello, EndOfEarlyData, ServerHello, Finished, and KeyUpdate
116 // messages can immediately precede a key change, implementations
117 // MUST send these messages in alignment with a record boundary.
118 //
119 // Note: Hello_Retry_Request was added to the list below although it cannot immediately precede a key change.
120 // However, there cannot be any further sensible messages in the record after HRR.
121 //
122 // Note: Server_Hello_12 was deliberately not included in the check below because in TLS 1.2 Server Hello and
123 // other handshake messages can be legally coalesced in a single record.
124 //
125 if(holds_any_of<Client_Hello_12,
126 Client_Hello_13 /*, EndOfEarlyData,*/,
127 Server_Hello_13,
128 Hello_Retry_Request,
129 Finished_13>(handshake_msg.value()) &&
130 m_handshake_layer.has_pending_data()) {
131 throw Unexpected_Message("Unexpected additional handshake message data found in record");
132 }
133
134 process_handshake_msg(std::move(handshake_msg.value()));
135
136 if(is_downgrading()) {
137 // Downgrade to TLS 1.2 was detected. Stop everything we do and await being replaced by a 1.2 implementation.
138 return 0;
139 } else if(m_downgrade_info != nullptr) {
140 // We received a TLS 1.3 error alert that could have been a TLS 1.2 warning alert.
141 // Now that we know that we are talking to a TLS 1.3 server, shut down.
142 if(m_downgrade_info->received_tls_13_error_alert) {
143 shutdown();
144 }
145
146 // Downgrade can only be indicated in the first received peer message. This was not the case.
147 m_downgrade_info.reset();
148 }
149
150 // After the initial handshake message is received, the record
151 // layer must be more restrictive.
152 // See RFC 8446 5.1 regarding "legacy_record_version"
153 if(!m_first_message_received) {
154 m_record_layer.disable_receiving_compat_mode();
155 m_first_message_received = true;
156 }
157 }
158 } else {
159 while(auto handshake_msg = m_handshake_layer.next_post_handshake_message(policy())) {
160 process_post_handshake_msg(std::move(handshake_msg.value()));
161 }
162 }
163 } else if(record.type == Record_Type::ChangeCipherSpec) {
165 } else if(record.type == Record_Type::ApplicationData) {
166 BOTAN_ASSERT(record.seq_no.has_value(), "decrypted application traffic had a sequence number");
167 callbacks().tls_record_received(record.seq_no.value(), record.fragment);
168 } else if(record.type == Record_Type::Alert) {
169 process_alert(record.fragment);
170 } else {
171 throw Unexpected_Message("Unexpected record type " + std::to_string(static_cast<size_t>(record.type)) +
172 " from counterparty");
173 }
174 }
175 } catch(TLS_Exception& e) {
176 send_fatal_alert(e.type());
177 throw;
178 } catch(Invalid_Authentication_Tag&) {
179 // RFC 8446 5.2
180 // If the decryption fails, the receiver MUST terminate the connection
181 // with a "bad_record_mac" alert.
182 send_fatal_alert(Alert::BadRecordMac);
183 throw;
184 } catch(Decoding_Error&) {
185 send_fatal_alert(Alert::DecodeError);
186 throw;
187 } catch(...) {
188 send_fatal_alert(Alert::InternalError);
189 throw;
190 }
191}
#define BOTAN_STATE_CHECK(expr)
Definition assert.h:49
#define BOTAN_ASSERT(expr, assertion_made)
Definition assert.h:62
virtual void tls_record_received(uint64_t seq_no, std::span< const uint8_t > data)=0
virtual void process_post_handshake_msg(Post_Handshake_Message_13 msg)=0
virtual void process_handshake_msg(Handshake_Message_13 msg)=0
virtual void process_dummy_change_cipher_spec()=0
std::unique_ptr< Cipher_State > m_cipher_state
void preserve_peer_transcript(std::span< const uint8_t > input)
void send_fatal_alert(Alert::Type type)
virtual bool is_handshake_complete() const =0
constexpr bool holds_any_of(const std::variant< Ts... > &v) noexcept
Definition stl_util.h:284

References Botan::TLS::Alert, Botan::TLS::ApplicationData, BOTAN_ASSERT, BOTAN_STATE_CHECK, callbacks(), Botan::TLS::ChangeCipherSpec, Botan::TLS::Channel_Impl::expects_downgrade(), Botan::TLS::Handshake, Botan::holds_any_of(), Botan::TLS::Channel_Impl::is_downgrading(), Botan::TLS::Channel_Impl::is_handshake_complete(), m_cipher_state, Botan::TLS::Channel_Impl::m_downgrade_info, m_transcript_hash, policy(), Botan::TLS::Channel_Impl::preserve_peer_transcript(), process_dummy_change_cipher_spec(), process_handshake_msg(), process_post_handshake_msg(), Botan::TLS::Channel_Impl::send_fatal_alert(), Botan::TLS::Callbacks::tls_record_received(), and Botan::TLS::TLS_Exception::type().

◆ handle()

void Botan::TLS::Channel_Impl_13::handle ( const Key_Update & key_update)
protected

Definition at line 193 of file tls_channel_impl_13.cpp.

193 {
194 // make sure Key_Update appears only at the end of a record; see description above
195 if(m_handshake_layer.has_pending_data()) {
196 throw Unexpected_Message("Unexpected additional post-handshake message data found in record");
197 }
198
199 m_cipher_state->update_read_keys(*this);
200
201 // TODO: introduce some kind of rate limit of key updates, otherwise we
202 // might be forced into an endless loop of key updates.
203
204 // RFC 8446 4.6.3
205 // If the request_update field is set to "update_requested", then the
206 // receiver MUST send a KeyUpdate of its own with request_update set to
207 // "update_not_requested" prior to sending its next Application Data
208 // record.
209 if(key_update.expects_reciprocation()) {
210 // RFC 8446 4.6.3
211 // This mechanism allows either side to force an update to the
212 // multiple KeyUpdates while it is silent to respond with a single
213 // update.
215 }
216}

References Botan::TLS::Key_Update::expects_reciprocation(), m_cipher_state, and opportunistically_update_traffic_keys().

◆ is_active()

bool Botan::TLS::Channel_Impl_13::is_active ( ) const
overridevirtual
Returns
true iff the connection is active for sending application data

Note that the connection is active until the application has called close(), even if a CloseNotify has been received from the peer.

Implements Botan::TLS::Channel_Impl.

Definition at line 302 of file tls_channel_impl_13.cpp.

302 {
303 return m_cipher_state != nullptr && m_cipher_state->can_encrypt_application_traffic() // handshake done
304 && m_can_write; // close() hasn't been called
305}

References m_cipher_state.

Referenced by to_peer().

◆ is_closed()

bool Botan::TLS::Channel_Impl_13::is_closed ( ) const
inlineoverridevirtual
Returns
true iff the connection has been closed, i.e. CloseNotify has been received from the peer.

Implements Botan::TLS::Channel_Impl.

Definition at line 168 of file tls_channel_impl_13.h.

bool is_closed_for_reading() const override
bool is_closed_for_writing() const override

References is_closed_for_reading(), and is_closed_for_writing().

◆ is_closed_for_reading()

bool Botan::TLS::Channel_Impl_13::is_closed_for_reading ( ) const
inlineoverridevirtual
Returns
true iff the connection is active for sending application data

Implements Botan::TLS::Channel_Impl.

Definition at line 170 of file tls_channel_impl_13.h.

170{ return !m_can_read; }

Referenced by is_closed().

◆ is_closed_for_writing()

bool Botan::TLS::Channel_Impl_13::is_closed_for_writing ( ) const
inlineoverridevirtual
Returns
true iff the connection has been definitely closed

Implements Botan::TLS::Channel_Impl.

Definition at line 172 of file tls_channel_impl_13.h.

172{ return !m_can_write; }

Referenced by is_closed().

◆ is_downgrading()

bool Botan::TLS::Channel_Impl::is_downgrading ( ) const
inlineinherited

Indicates whether a downgrade to TLS 1.2 or lower is in progress

See also
Downgrade_Information

Definition at line 279 of file tls_channel_impl.h.

279{ return m_downgrade_info && m_downgrade_info->will_downgrade; }

References m_downgrade_info.

Referenced by Botan::TLS::Channel_Impl_13::from_peer(), Botan::TLS::Channel_Impl_13::key_material_export(), and Botan::TLS::Channel_Impl_13::update_traffic_keys().

◆ is_handshake_complete()

virtual bool Botan::TLS::Channel_Impl::is_handshake_complete ( ) const
pure virtualinherited

◆ key_material_export()

SymmetricKey Botan::TLS::Channel_Impl_13::key_material_export ( std::string_view label,
std::string_view context,
size_t length ) const
overridevirtual

Key material export (RFC 5705)

Parameters
labela disambiguating label string
contexta per-association context value
lengththe length of the desired key in bytes
Returns
key of length bytes

Implements Botan::TLS::Channel_Impl.

Definition at line 307 of file tls_channel_impl_13.cpp.

309 {
311 BOTAN_STATE_CHECK(m_cipher_state != nullptr && m_cipher_state->can_export_keys());
312 return SymmetricKey(m_cipher_state->export_key(label, context, length));
313}
OctetString SymmetricKey
Definition symkey.h:140

References BOTAN_STATE_CHECK, Botan::TLS::Channel_Impl::is_downgrading(), and m_cipher_state.

◆ maybe_log_secret()

virtual void Botan::TLS::Secret_Logger::maybe_log_secret ( std::string_view label,
std::span< const uint8_t > secret ) const
protectedpure virtualinherited

◆ new_session_ticket_supported()

virtual bool Botan::TLS::Channel_Impl::new_session_ticket_supported ( ) const
inlinevirtualinherited
Returns
true if this channel can issue TLS 1.3 style session tickets.

Reimplemented in Botan::TLS::Server_Impl_13.

Definition at line 150 of file tls_channel_impl.h.

150{ return false; }

◆ operator=() [1/2]

Channel_Impl_13 & Botan::TLS::Channel_Impl_13::operator= ( Channel_Impl_13 && other)
delete

References Channel_Impl_13().

◆ operator=() [2/2]

Channel_Impl_13 & Botan::TLS::Channel_Impl_13::operator= ( const Channel_Impl_13 & other)
delete

References Channel_Impl_13().

◆ opportunistically_update_traffic_keys()

void Botan::TLS::Channel_Impl_13::opportunistically_update_traffic_keys ( )
inlineprotected

Schedule a traffic key update to opportunistically happen before the channel sends application data the next time. Such a key update will never request a reciprocal key update from the peer.

Definition at line 239 of file tls_channel_impl_13.h.

239{ m_opportunistic_key_update = true; }

Referenced by handle().

◆ peer_cert_chain()

virtual std::vector< X509_Certificate > Botan::TLS::Channel_Impl::peer_cert_chain ( ) const
pure virtualinherited
Returns
certificate chain of the peer (may be empty)

Implemented in Botan::TLS::Channel_Impl_12, Botan::TLS::Client_Impl_13, and Botan::TLS::Server_Impl_13.

◆ peer_raw_public_key()

virtual std::shared_ptr< const Public_Key > Botan::TLS::Channel_Impl::peer_raw_public_key ( ) const
pure virtualinherited
Returns
raw public key of the peer (may be nullptr)

Implemented in Botan::TLS::Channel_Impl_12, Botan::TLS::Client_Impl_13, and Botan::TLS::Server_Impl_13.

◆ policy()

const Policy & Botan::TLS::Channel_Impl_13::policy ( ) const
inlineprotected

◆ prepend_ccs()

virtual bool Botan::TLS::Channel_Impl_13::prepend_ccs ( )
inlineprotectedvirtual
Returns
whether a change cipher spec record should be prepended now

This method can be used by subclasses to indicate that send_record should prepend a CCS before the actual record. This is useful for middlebox compatibility mode. See RFC 8446 D.4.

Definition at line 230 of file tls_channel_impl_13.h.

230{ return false; }

◆ preserve_client_hello()

void Botan::TLS::Channel_Impl::preserve_client_hello ( std::span< const uint8_t > msg)
inlineprotectedinherited

Definition at line 239 of file tls_channel_impl.h.

239 {
241 m_downgrade_info->client_hello_message.assign(msg.begin(), msg.end());
242 }

References BOTAN_STATE_CHECK, and m_downgrade_info.

Referenced by Botan::TLS::Client_Impl_13::Client_Impl_13().

◆ preserve_peer_transcript()

void Botan::TLS::Channel_Impl::preserve_peer_transcript ( std::span< const uint8_t > input)
inlineprotectedinherited

Definition at line 234 of file tls_channel_impl.h.

234 {
236 m_downgrade_info->peer_transcript.insert(m_downgrade_info->peer_transcript.end(), input.begin(), input.end());
237 }

References BOTAN_STATE_CHECK, and m_downgrade_info.

Referenced by Botan::TLS::Channel_Impl_13::from_peer().

◆ process_dummy_change_cipher_spec()

virtual void Botan::TLS::Channel_Impl_13::process_dummy_change_cipher_spec ( )
protectedpure virtual

Referenced by from_peer().

◆ process_handshake_msg()

virtual void Botan::TLS::Channel_Impl_13::process_handshake_msg ( Handshake_Message_13 msg)
protectedpure virtual

Referenced by from_peer().

◆ process_post_handshake_msg()

virtual void Botan::TLS::Channel_Impl_13::process_post_handshake_msg ( Post_Handshake_Message_13 msg)
protectedpure virtual

Referenced by from_peer().

◆ renegotiate()

void Botan::TLS::Channel_Impl_13::renegotiate ( bool )
inlineoverridevirtual

Attempt to renegotiate the session

Implements Botan::TLS::Channel_Impl.

Definition at line 186 of file tls_channel_impl_13.h.

186 {
187 throw Invalid_Argument("renegotiation is not allowed in TLS 1.3");
188 }

◆ request_downgrade()

void Botan::TLS::Channel_Impl::request_downgrade ( )
inlineprotectedinherited

Implementations use this to signal that the peer indicated a protocol version downgrade. After calling request_downgrade() no further state changes must be performed by the implementation. Particularly, no further handshake messages must be emitted. Instead, they must yield control flow back to the underlying Channel implementation to perform the protocol version downgrade.

Definition at line 260 of file tls_channel_impl.h.

260 {
262 m_downgrade_info->will_downgrade = true;
263 }

References BOTAN_STATE_CHECK, and m_downgrade_info.

Referenced by request_downgrade_for_resumption().

◆ request_downgrade_for_resumption()

void Botan::TLS::Channel_Impl::request_downgrade_for_resumption ( Session_with_Handle session)
inlineprotectedinherited

Definition at line 265 of file tls_channel_impl.h.

265 {
266 BOTAN_STATE_CHECK(m_downgrade_info && m_downgrade_info->client_hello_message.empty() &&
267 m_downgrade_info->peer_transcript.empty() && !m_downgrade_info->tls12_session.has_value());
268 BOTAN_ASSERT_NOMSG(session.session.version().is_pre_tls_13());
269 m_downgrade_info->tls12_session = std::move(session);
271 }
#define BOTAN_ASSERT_NOMSG(expr)
Definition assert.h:75

References BOTAN_ASSERT_NOMSG, BOTAN_STATE_CHECK, Botan::TLS::Protocol_Version::is_pre_tls_13(), m_downgrade_info, request_downgrade(), Botan::TLS::Session_with_Handle::session, and Botan::TLS::Session_Base::version().

Referenced by Botan::TLS::Client_Impl_13::Client_Impl_13().

◆ rng()

◆ secure_renegotiation_supported()

bool Botan::TLS::Channel_Impl_13::secure_renegotiation_supported ( ) const
inlineoverridevirtual
Returns
true iff the counterparty supports the secure renegotiation extensions.

Implements Botan::TLS::Channel_Impl.

Definition at line 202 of file tls_channel_impl_13.h.

202 {
203 // Secure renegotiation is not supported in TLS 1.3, though BoGo
204 // tests expect us to claim that it is available.
205 return true;
206 }

◆ send_alert()

void Botan::TLS::Channel_Impl_13::send_alert ( const Alert & alert)
overridevirtual

Send a TLS alert message. If the alert is fatal, the internal state (keys, etc) will be reset.

Parameters
alertthe Alert to send

Implements Botan::TLS::Channel_Impl.

Definition at line 277 of file tls_channel_impl_13.cpp.

277 {
278 if(alert.is_valid() && m_can_write) {
279 try {
280 send_record(Record_Type::Alert, alert.serialize());
281 } catch(...) { /* swallow it */
282 }
283 }
284
285 // Note: In TLS 1.3 sending a CloseNotify must not immediately lead to closing the reading end.
286 // RFC 8446 6.1
287 // Each party MUST send a "close_notify" alert before closing its write
288 // side of the connection, unless it has already sent some error alert.
289 // This does not have any effect on its read side of the connection.
290 if(is_close_notify_alert(alert) && m_can_write) {
291 m_can_write = false;
292 if(m_cipher_state) {
293 m_cipher_state->clear_write_keys();
294 }
295 }
296
297 if(is_error_alert(alert)) {
298 shutdown();
299 }
300}

References Botan::TLS::Alert, Botan::TLS::Alert::is_valid(), m_cipher_state, and Botan::TLS::Alert::serialize().

◆ send_dummy_change_cipher_spec()

void Botan::TLS::Channel_Impl_13::send_dummy_change_cipher_spec ( )
protected

Definition at line 246 of file tls_channel_impl_13.cpp.

246 {
247 // RFC 8446 5.
248 // The change_cipher_spec record is used only for compatibility purposes
249 // (see Appendix D.4).
250 //
251 // The only allowed CCS message content is 0x01, all other CCS records MUST
252 // be rejected by TLS 1.3 implementations.
253 send_record(Record_Type::ChangeCipherSpec, {0x01});
254}

References Botan::TLS::ChangeCipherSpec.

◆ send_fatal_alert()

void Botan::TLS::Channel_Impl::send_fatal_alert ( Alert::Type type)
inlineinherited

Send a fatal alert

Definition at line 81 of file tls_channel_impl.h.

81{ send_alert(Alert(type, true)); }
virtual void send_alert(const Alert &alert)=0

References Botan::TLS::Alert, and send_alert().

Referenced by Botan::TLS::Channel_Impl_12::from_peer(), and Botan::TLS::Channel_Impl_13::from_peer().

◆ send_handshake_message() [1/2]

template<typename... MsgTs>
std::vector< uint8_t > Botan::TLS::Channel_Impl_13::send_handshake_message ( const std::variant< MsgTs... > & message)
inlineprotected

Definition at line 242 of file tls_channel_impl_13.h.

242 {
244 }
AggregatedHandshakeMessages & add(Handshake_Message_13_Ref message)
AggregatedHandshakeMessages aggregate_handshake_messages()
constexpr GeneralVariantT generalize_to(SpecialT &&specific)
Converts a given variant into another variant-ish whose type states are a super set of the given vari...
Definition stl_util.h:306

References Botan::TLS::Channel_Impl_13::AggregatedHandshakeMessages::add(), aggregate_handshake_messages(), Botan::generalize_to(), and Botan::TLS::Channel_Impl_13::AggregatedMessages::send().

Referenced by Botan::TLS::Client_Impl_13::Client_Impl_13(), and send_handshake_message().

◆ send_handshake_message() [2/2]

template<typename MsgT>
std::vector< uint8_t > Botan::TLS::Channel_Impl_13::send_handshake_message ( std::reference_wrapper< MsgT > message)
inlineprotected

Definition at line 247 of file tls_channel_impl_13.h.

247 {
249 }
std::vector< uint8_t > send_handshake_message(const std::variant< MsgTs... > &message)

References Botan::generalize_to(), and send_handshake_message().

◆ send_new_session_tickets()

virtual size_t Botan::TLS::Channel_Impl::send_new_session_tickets ( const size_t )
inlinevirtualinherited

Send tickets new session tickets to the peer. This is only supported on TLS 1.3 servers.

If the server's Session_Manager does not accept the generated Session objects, the server implementation won't be able to send new tickets. Additionally, anything but TLS 1.3 servers will return 0 (because they don't support sending such session tickets).

Returns
the number of session tickets successfully sent to the client

Reimplemented in Botan::TLS::Server_Impl_13.

Definition at line 163 of file tls_channel_impl.h.

163{ return 0; }

◆ send_post_handshake_message()

std::vector< uint8_t > Botan::TLS::Channel_Impl_13::send_post_handshake_message ( Post_Handshake_Message_13 message)
inlineprotected

Definition at line 251 of file tls_channel_impl_13.h.

251 {
252 return aggregate_post_handshake_messages().add(std::move(message)).send();
253 }
AggregatedPostHandshakeMessages & add(Post_Handshake_Message_13 message)
AggregatedPostHandshakeMessages aggregate_post_handshake_messages()

References Botan::TLS::Channel_Impl_13::AggregatedPostHandshakeMessages::add(), aggregate_post_handshake_messages(), and Botan::TLS::Channel_Impl_13::AggregatedMessages::send().

Referenced by update_traffic_keys().

◆ send_warning_alert()

void Botan::TLS::Channel_Impl::send_warning_alert ( Alert::Type type)
inlineinherited

Send a warning alert

Definition at line 76 of file tls_channel_impl.h.

76{ send_alert(Alert(type, false)); }

References Botan::TLS::Alert, and send_alert().

Referenced by close().

◆ session_manager()

Session_Manager & Botan::TLS::Channel_Impl_13::session_manager ( )
inlineprotected

◆ set_io_buffer_size()

void Botan::TLS::Channel_Impl::set_io_buffer_size ( size_t io_buf_sz)
inlineprotectedinherited

Definition at line 247 of file tls_channel_impl.h.

247 {
249 m_downgrade_info->io_buffer_size = io_buf_sz;
250 }

References BOTAN_STATE_CHECK, and m_downgrade_info.

◆ set_record_size_limits()

void Botan::TLS::Channel_Impl_13::set_record_size_limits ( uint16_t outgoing_limit,
uint16_t incoming_limit )
protected

Set the record size limits as negotiated by the "record_size_limit" extension (RFC 8449).

Parameters
outgoing_limitthe maximal number of plaintext bytes to be sent in a protected record
incoming_limitthe maximal number of plaintext bytes to be accepted in a received protected record

Definition at line 420 of file tls_channel_impl_13.cpp.

420 {
421 m_record_layer.set_record_size_limits(outgoing_limit, incoming_limit);
422}

◆ set_selected_certificate_type()

void Botan::TLS::Channel_Impl_13::set_selected_certificate_type ( Certificate_Type cert_type)
protected

Set the expected certificate type needed to parse Certificate messages in the handshake layer. See RFC 7250 and 8446 4.4.2 for further details.

Definition at line 424 of file tls_channel_impl_13.cpp.

424 {
425 m_handshake_layer.set_selected_certificate_type(cert_type);
426}

◆ timeout_check()

bool Botan::TLS::Channel_Impl_13::timeout_check ( )
inlineoverridevirtual

Perform a handshake timeout check. This does nothing unless this is a DTLS channel with a pending handshake state, in which case we check for timeout and potentially retransmit handshake packets.

In the TLS 1.3 implementation, this always returns false.

Implements Botan::TLS::Channel_Impl.

Definition at line 216 of file tls_channel_impl_13.h.

216{ return false; }

◆ to_peer()

void Botan::TLS::Channel_Impl_13::to_peer ( std::span< const uint8_t > data)
overridevirtual

Inject plaintext intended for counterparty Throws an exception if is_active() is false

Implements Botan::TLS::Channel_Impl.

Definition at line 256 of file tls_channel_impl_13.cpp.

256 {
257 if(!is_active()) {
258 throw Invalid_State("Data cannot be sent on inactive TLS connection");
259 }
260
261 // RFC 8446 4.6.3
262 // If the request_update field [of a received KeyUpdate] is set to
263 // "update_requested", then the receiver MUST send a KeyUpdate of its own
264 // with request_update set to "update_not_requested" prior to sending its
265 // next Application Data record.
266 // This mechanism allows either side to force an update to the entire
267 // connection, but causes an implementation which receives multiple
268 // KeyUpdates while it is silent to respond with a single update.
269 if(m_opportunistic_key_update) {
270 update_traffic_keys(false /* update_requested */);
271 m_opportunistic_key_update = false;
272 }
273
274 send_record(Record_Type::ApplicationData, {data.begin(), data.end()});
275}
void update_traffic_keys(bool request_peer_update=false) override

References Botan::TLS::ApplicationData, is_active(), and update_traffic_keys().

◆ update_traffic_keys()

void Botan::TLS::Channel_Impl_13::update_traffic_keys ( bool request_peer_update = false)
overridevirtual

Attempt to update the session's traffic key material Note that this is possible with a TLS 1.3 channel, only.

Parameters
request_peer_updateif true, require a reciprocal key update

Implements Botan::TLS::Channel_Impl.

Definition at line 315 of file tls_channel_impl_13.cpp.

315 {
319 send_post_handshake_message(Key_Update(request_peer_update));
320 m_cipher_state->update_write_keys(*this);
321}
std::vector< uint8_t > send_post_handshake_message(Post_Handshake_Message_13 message)

References BOTAN_ASSERT_NONNULL, BOTAN_STATE_CHECK, Botan::TLS::Channel_Impl::is_downgrading(), Botan::TLS::Channel_Impl::is_handshake_complete(), m_cipher_state, and send_post_handshake_message().

Referenced by to_peer().

Member Data Documentation

◆ m_cipher_state

std::unique_ptr<Cipher_State> Botan::TLS::Channel_Impl_13::m_cipher_state
protected

◆ m_downgrade_info

◆ m_side

const Connection_Side Botan::TLS::Channel_Impl_13::m_side
protected

Definition at line 287 of file tls_channel_impl_13.h.

Referenced by Channel_Impl_13().

◆ m_transcript_hash

Transcript_Hash_State Botan::TLS::Channel_Impl_13::m_transcript_hash
protected

Definition at line 288 of file tls_channel_impl_13.h.

Referenced by aggregate_handshake_messages(), and from_peer().


The documentation for this class was generated from the following files: