Botan 3.11.0
Crypto and TLS for C&
Botan::TLS::Client_Hello_13 Class Referencefinal

#include <tls_messages_13.h>

Inheritance diagram for Botan::TLS::Client_Hello_13:
Botan::TLS::Client_Hello Botan::TLS::Handshake_Message

Public Member Functions

std::vector< Signature_Schemecertificate_signature_schemes () const
const std::vector< uint16_t > & ciphersuites () const
 Client_Hello_13 (const Policy &policy, Callbacks &cb, RandomNumberGenerator &rng, std::string_view hostname, const std::vector< std::string > &next_protocols, std::optional< Session_with_Handle > &session, std::vector< ExternalPSK > psks)
const std::vector< uint8_t > & cookie () const
std::vector< uint8_t > cookie_input_data () const
std::set< Extension_Codeextension_types () const
const Extensionsextensions () const
std::optional< Protocol_Versionhighest_supported_version (const Policy &policy) const
Protocol_Version legacy_version () const
std::vector< std::string > next_protocols () const
bool offered_suite (uint16_t ciphersuite) const
const std::vector< uint8_t > & random () const
void retry (const Hello_Retry_Request &hrr, const Transcript_Hash_State &transcript_hash_state, Callbacks &cb, RandomNumberGenerator &rng)
bool sent_signature_algorithms () const
std::vector< uint8_t > serialize () const override
const Session_IDsession_id () const
std::vector< Signature_Schemesignature_schemes () const
std::string sni_hostname () const
std::vector< uint16_t > srtp_profiles () const
std::vector< Group_Paramssupported_dh_groups () const
std::vector< Group_Paramssupported_ecc_curves () const
std::vector< Protocol_Versionsupported_versions () const
bool supports_alpn () const
Handshake_Type type () const override
std::string type_string () const
void validate_updates (const Client_Hello_13 &new_ch)
virtual Handshake_Type wire_type () const

Static Public Member Functions

static std::variant< Client_Hello_13, Client_Hello_12_Shimparse (const std::vector< uint8_t > &buf)

Protected Member Functions

const std::vector< uint8_t > & compression_methods () const

Protected Attributes

std::unique_ptr< Client_Hello_Internalm_data

Detailed Description

Definition at line 29 of file tls_messages_13.h.

Constructor & Destructor Documentation

◆ Client_Hello_13()

Botan::TLS::Client_Hello_13::Client_Hello_13 ( const Policy & policy,
Callbacks & cb,
RandomNumberGenerator & rng,
std::string_view hostname,
const std::vector< std::string > & next_protocols,
std::optional< Session_with_Handle > & session,
std::vector< ExternalPSK > psks )

Creates a client hello which might optionally use the passed-in session for resumption. In that case, this will "extract" the master secret from the passed-in session.

Definition at line 155 of file msg_client_hello_13.cpp.

161 {
162 // RFC 8446 4.1.2
163 // In TLS 1.3, the client indicates its version preferences in the
164 // "supported_versions" extension (Section 4.2.1) and the
165 // legacy_version field MUST be set to 0x0303, which is the version
166 // number for TLS 1.2.
167 m_data->m_legacy_version = Protocol_Version::TLS_V12;
168 m_data->m_random = make_hello_random(rng, cb, policy);
169 m_data->m_suites = policy.ciphersuite_list(Protocol_Version::TLS_V13);
170
171 if(policy.allow_tls12()) {
172 // Note: DTLS 1.3 is NYI, hence dtls_12 is not checked
173 const auto legacy_suites = policy.ciphersuite_list(Protocol_Version::TLS_V12);
174 m_data->m_suites.insert(m_data->m_suites.end(), legacy_suites.cbegin(), legacy_suites.cend());
175 }
176
177 if(policy.tls_13_middlebox_compatibility_mode()) {
178 // RFC 8446 4.1.2
179 // In compatibility mode (see Appendix D.4), this field MUST be non-empty,
180 // so a client not offering a pre-TLS 1.3 session MUST generate a new
181 // 32-byte value.
182 //
183 // Note: we won't ever offer a TLS 1.2 session. In such a case we would
184 // have instantiated a TLS 1.2 client in the first place.
185 m_data->m_session_id = Session_ID(make_hello_random(rng, cb, policy));
186 }
187
188 // NOLINTBEGIN(*-owning-memory)
190 m_data->extensions().add(new Server_Name_Indicator(hostname));
191 }
192
193 m_data->extensions().add(new Supported_Groups(policy.key_exchange_groups()));
194
195 m_data->extensions().add(new Key_Share(policy, cb, rng));
196
197 m_data->extensions().add(new Supported_Versions(Protocol_Version::TLS_V13, policy));
198
199 m_data->extensions().add(new Signature_Algorithms(policy.acceptable_signature_schemes()));
200 if(auto cert_signing_prefs = policy.acceptable_certificate_signature_schemes()) {
201 // RFC 8446 4.2.3
202 // Implementations which have the same policy in both cases MAY omit
203 // the "signature_algorithms_cert" extension.
204 m_data->extensions().add(new Signature_Algorithms_Cert(std::move(cert_signing_prefs.value())));
205 }
206
207 // TODO: Support for PSK-only mode without a key exchange.
208 // This should be configurable in TLS::Policy and should allow no PSK
209 // support at all (e.g. to disable support for session resumption).
210 m_data->extensions().add(new PSK_Key_Exchange_Modes({PSK_Key_Exchange_Mode::PSK_DHE_KE}));
211
212 if(policy.support_cert_status_message()) {
213 m_data->extensions().add(new Certificate_Status_Request({}, {}));
214 }
215
216 // We currently support "record_size_limit" for TLS 1.3 exclusively. Hence,
217 // when TLS 1.2 is advertised as a supported protocol, we must not offer this
218 // extension.
219 if(policy.record_size_limit().has_value() && !policy.allow_tls12()) {
220 m_data->extensions().add(new Record_Size_Limit(policy.record_size_limit().value()));
221 }
222
223 if(!next_protocols.empty()) {
224 m_data->extensions().add(new Application_Layer_Protocol_Notification(next_protocols));
225 }
226
227 // RFC 7250 4.1
228 // In order to indicate the support of raw public keys, clients include
229 // the client_certificate_type and/or the server_certificate_type
230 // extensions in an extended client hello message.
231 m_data->extensions().add(new Client_Certificate_Type(policy.accepted_client_certificate_types()));
232 m_data->extensions().add(new Server_Certificate_Type(policy.accepted_server_certificate_types()));
233
234#if defined(BOTAN_HAS_TLS_12)
235 if(policy.allow_tls12()) {
236 m_data->extensions().add(new Renegotiation_Extension());
237 m_data->extensions().add(new Session_Ticket_Extension());
238
239 // EMS must always be used with TLS 1.2, regardless of the policy
240 m_data->extensions().add(new Extended_Master_Secret);
241
242 if(policy.negotiate_encrypt_then_mac()) {
243 m_data->extensions().add(new Encrypt_then_MAC);
244 }
245
246 if(m_data->extensions().has<Supported_Groups>() &&
247 !m_data->extensions().get<Supported_Groups>()->ec_groups().empty()) {
248 m_data->extensions().add(new Supported_Point_Formats(policy.use_ecc_point_compression()));
249 }
250 }
251#endif
252
253 if(session.has_value() || !psks.empty()) {
254 m_data->extensions().add(new PSK(session, std::move(psks), cb));
255 }
256 // NOLINTEND(*-owning-memory)
257
258 cb.tls_modify_extensions(m_data->extensions(), Connection_Side::Client, type());
259
260 if(m_data->extensions().has<PSK>()) {
261 // RFC 8446 4.2.11
262 // The "pre_shared_key" extension MUST be the last extension in the
263 // ClientHello (this facilitates implementation [...]).
264 if(m_data->extensions().all().back()->type() != Extension_Code::PresharedKey) {
265 throw TLS_Exception(Alert::InternalError,
266 "Application modified extensions of Client Hello, PSK is not last anymore");
267 }
268 calculate_psk_binders({});
269 }
270}
std::unique_ptr< Client_Hello_Internal > m_data
std::vector< std::string > next_protocols() const
virtual Handshake_Type type() const =0
static bool hostname_acceptable_for_sni(std::string_view hostname)
std::vector< uint8_t > make_hello_random(RandomNumberGenerator &rng, Callbacks &cb, const Policy &policy)
Strong< std::vector< uint8_t >, struct Session_ID_ > Session_ID
holds a TLS 1.2 session ID for stateful resumption

References Botan::TLS::Policy::acceptable_certificate_signature_schemes(), Botan::TLS::Policy::acceptable_signature_schemes(), Botan::TLS::Policy::accepted_client_certificate_types(), Botan::TLS::Policy::accepted_server_certificate_types(), Botan::TLS::Policy::allow_tls12(), Botan::TLS::Policy::ciphersuite_list(), Botan::TLS::Client, Client_Hello_13(), Botan::TLS::Supported_Groups::ec_groups(), Botan::TLS::Server_Name_Indicator::hostname_acceptable_for_sni(), Botan::TLS::Policy::key_exchange_groups(), Botan::TLS::Client_Hello::m_data, Botan::TLS::make_hello_random(), Botan::TLS::Policy::negotiate_encrypt_then_mac(), Botan::TLS::Client_Hello::next_protocols(), Botan::TLS::PresharedKey, Botan::TLS::PSK_DHE_KE, Botan::TLS::Policy::record_size_limit(), Botan::TLS::Policy::support_cert_status_message(), Botan::TLS::Policy::tls_13_middlebox_compatibility_mode(), Botan::TLS::Callbacks::tls_modify_extensions(), Botan::TLS::Client_Hello::type(), and Botan::TLS::Policy::use_ecc_point_compression().

Referenced by Client_Hello_13(), parse(), and validate_updates().

Member Function Documentation

◆ certificate_signature_schemes()

std::vector< Signature_Scheme > Botan::TLS::Client_Hello::certificate_signature_schemes ( ) const
inherited

Definition at line 202 of file msg_client_hello.cpp.

202 {
203 // RFC 8446 4.2.3
204 // If no "signature_algorithms_cert" extension is present, then the
205 // "signature_algorithms" extension also applies to signatures appearing
206 // in certificates.
207 if(const Signature_Algorithms_Cert* sigs = m_data->extensions().get<Signature_Algorithms_Cert>()) {
208 return sigs->supported_schemes();
209 } else {
210 return signature_schemes();
211 }
212}
std::vector< Signature_Scheme > signature_schemes() const

References m_data, and signature_schemes().

Referenced by Botan::TLS::Certificate_13::Certificate_13(), and ~Client_Hello().

◆ ciphersuites()

const std::vector< uint16_t > & Botan::TLS::Client_Hello::ciphersuites ( ) const
inherited

Definition at line 138 of file msg_client_hello.cpp.

138 {
139 return m_data->ciphersuites();
140}

References m_data.

Referenced by ~Client_Hello().

◆ compression_methods()

const std::vector< uint8_t > & Botan::TLS::Client_Hello::compression_methods ( ) const
protectedinherited

Definition at line 134 of file msg_client_hello.cpp.

134 {
135 return m_data->comp_methods();
136}

References m_data.

Referenced by ~Client_Hello().

◆ cookie()

const std::vector< uint8_t > & Botan::TLS::Client_Hello::cookie ( ) const
inherited

Definition at line 264 of file msg_client_hello.cpp.

264 {
265 return m_data->hello_cookie();
266}

References m_data.

Referenced by ~Client_Hello().

◆ cookie_input_data()

std::vector< uint8_t > Botan::TLS::Client_Hello::cookie_input_data ( ) const
inherited

Definition at line 181 of file msg_client_hello.cpp.

181 {
182 BOTAN_STATE_CHECK(!m_data->hello_cookie_input_bits().empty());
183
184 return m_data->hello_cookie_input_bits();
185}
#define BOTAN_STATE_CHECK(expr)
Definition assert.h:49

References BOTAN_STATE_CHECK, and m_data.

Referenced by ~Client_Hello().

◆ extension_types()

std::set< Extension_Code > Botan::TLS::Client_Hello::extension_types ( ) const
inherited

Definition at line 142 of file msg_client_hello.cpp.

142 {
143 return m_data->extensions().extension_types();
144}

Referenced by Botan::TLS::Server_Hello_12::Server_Hello_12(), Botan::TLS::Client_Hello_13::validate_updates(), and ~Client_Hello().

◆ extensions()

◆ highest_supported_version()

std::optional< Protocol_Version > Botan::TLS::Client_Hello_13::highest_supported_version ( const Policy & policy) const

Select the highest protocol version from the list of versions supported by the client. If no such version can be determined this returns std::nullopt.

Definition at line 450 of file msg_client_hello_13.cpp.

450 {
451 // RFC 8446 4.2.1
452 // The "supported_versions" extension is used by the client to indicate
453 // which versions of TLS it supports and by the server to indicate which
454 // version it is using. The extension contains a list of supported
455 // versions in preference order, with the most preferred version first.
456 auto* const supvers = m_data->extensions().get<Supported_Versions>();
457 BOTAN_ASSERT_NONNULL(supvers);
458
459 std::optional<Protocol_Version> result;
460
461 for(const auto& v : supvers->versions()) {
462 // RFC 8446 4.2.1
463 // Servers MUST only select a version of TLS present in that extension
464 // and MUST ignore any unknown versions that are present in that
465 // extension.
466 if(!v.known_version() || !policy.acceptable_protocol_version(v)) {
467 continue;
468 }
469
470 result = (result.has_value()) ? std::optional(std::max(result.value(), v)) : std::optional(v);
471 }
472
473 return result;
474}
#define BOTAN_ASSERT_NONNULL(ptr)
Definition assert.h:114

References Botan::TLS::Policy::acceptable_protocol_version(), BOTAN_ASSERT_NONNULL, highest_supported_version(), and Botan::TLS::Client_Hello::m_data.

Referenced by highest_supported_version().

◆ legacy_version()

Protocol_Version Botan::TLS::Client_Hello::legacy_version ( ) const
inherited

Return the version indicated in the ClientHello. This may differ from the version indicated in the supported_versions extension.

See RFC 8446 4.1.2: TLS 1.3, the client indicates its version preferences in the "supported_versions" extension (Section 4.2.1) and the legacy_version field MUST be set to 0x0303, which is the version number for TLS 1.2.

Definition at line 122 of file msg_client_hello.cpp.

122 {
123 return m_data->legacy_version();
124}

References m_data.

Referenced by ~Client_Hello().

◆ next_protocols()

std::vector< std::string > Botan::TLS::Client_Hello::next_protocols ( ) const
inherited

Definition at line 250 of file msg_client_hello.cpp.

250 {
251 if(auto* alpn = m_data->extensions().get<Application_Layer_Protocol_Notification>()) {
252 return alpn->protocols();
253 }
254 return {};
255}

References m_data.

Referenced by Botan::TLS::Client_Hello_12::Client_Hello_12(), Botan::TLS::Client_Hello_12::Client_Hello_12(), Botan::TLS::Client_Hello_13::Client_Hello_13(), and ~Client_Hello().

◆ offered_suite()

bool Botan::TLS::Client_Hello::offered_suite ( uint16_t ciphersuite) const
inherited

Definition at line 190 of file msg_client_hello.cpp.

190 {
191 return std::find(m_data->ciphersuites().cbegin(), m_data->ciphersuites().cend(), ciphersuite) !=
192 m_data->ciphersuites().cend();
193}

References m_data.

Referenced by ~Client_Hello().

◆ parse()

std::variant< Client_Hello_13, Client_Hello_12_Shim > Botan::TLS::Client_Hello_13::parse ( const std::vector< uint8_t > & buf)
static

Definition at line 272 of file msg_client_hello_13.cpp.

272 {
273 auto data = std::make_unique<Client_Hello_Internal>(buf);
274 const auto version = data->version();
275
276 if(version.is_pre_tls_13()) {
277 return Client_Hello_12_Shim(std::move(data));
278 } else {
279 return Client_Hello_13(std::move(data));
280 }
281}
Client_Hello_13(const Policy &policy, Callbacks &cb, RandomNumberGenerator &rng, std::string_view hostname, const std::vector< std::string > &next_protocols, std::optional< Session_with_Handle > &session, std::vector< ExternalPSK > psks)

References Client_Hello_13(), and parse().

Referenced by parse().

◆ random()

const std::vector< uint8_t > & Botan::TLS::Client_Hello::random ( ) const
inherited

Definition at line 126 of file msg_client_hello.cpp.

126 {
127 return m_data->random();
128}

References m_data.

Referenced by ~Client_Hello().

◆ retry()

void Botan::TLS::Client_Hello_13::retry ( const Hello_Retry_Request & hrr,
const Transcript_Hash_State & transcript_hash_state,
Callbacks & cb,
RandomNumberGenerator & rng )

Definition at line 283 of file msg_client_hello_13.cpp.

286 {
287 BOTAN_STATE_CHECK(m_data->extensions().has<Supported_Groups>());
288 BOTAN_STATE_CHECK(m_data->extensions().has<Key_Share>());
289
290 auto* hrr_ks = hrr.extensions().get<Key_Share>();
291 const auto& supported_groups = m_data->extensions().get<Supported_Groups>()->groups();
292
293 if(hrr.extensions().has<Key_Share>()) {
294 m_data->extensions().get<Key_Share>()->retry_offer(*hrr_ks, supported_groups, cb, rng);
295 }
296
297 // RFC 8446 4.2.2
298 // When sending the new ClientHello, the client MUST copy
299 // the contents of the extension received in the HelloRetryRequest into
300 // a "cookie" extension in the new ClientHello.
301 //
302 // RFC 8446 4.2.2
303 // Clients MUST NOT use cookies in their initial ClientHello in subsequent
304 // connections.
305 if(hrr.extensions().has<Cookie>()) {
306 BOTAN_STATE_CHECK(!m_data->extensions().has<Cookie>());
307 m_data->extensions().add(new Cookie(hrr.extensions().get<Cookie>()->get_cookie())); // NOLINT(*-owning-memory)
308 }
309
310 // Note: the consumer of the TLS implementation won't be able to distinguish
311 // invocations to this callback due to the first Client_Hello or the
312 // retried Client_Hello after receiving a Hello_Retry_Request. We assume
313 // that the user keeps and detects this state themselves.
314 cb.tls_modify_extensions(m_data->extensions(), Connection_Side::Client, type());
315
316 auto* psk = m_data->extensions().get<PSK>();
317 if(psk != nullptr) {
318 // Cipher suite should always be a known suite as this is checked upstream
319 const auto cipher = Ciphersuite::by_id(hrr.ciphersuite());
320 BOTAN_ASSERT_NOMSG(cipher.has_value());
321
322 // RFC 8446 4.1.4
323 // In [...] its updated ClientHello, the client SHOULD NOT offer
324 // any pre-shared keys associated with a hash other than that of the
325 // selected cipher suite.
326 psk->filter(cipher.value());
327
328 // RFC 8446 4.2.11.2
329 // If the server responds with a HelloRetryRequest and the client
330 // then sends ClientHello2, its binder will be computed over: [...].
331 calculate_psk_binders(transcript_hash_state.clone());
332 }
333}
#define BOTAN_ASSERT_NOMSG(expr)
Definition assert.h:75
static std::optional< Ciphersuite > by_id(uint16_t suite)

References BOTAN_ASSERT_NOMSG, BOTAN_STATE_CHECK, Botan::TLS::Ciphersuite::by_id(), Botan::TLS::Server_Hello::ciphersuite(), Botan::TLS::Client, Botan::TLS::Transcript_Hash_State::clone(), Botan::TLS::Server_Hello::extensions(), Botan::TLS::Extensions::get(), Botan::TLS::Cookie::get_cookie(), Botan::TLS::Extensions::has(), Botan::TLS::Client_Hello::m_data, retry(), Botan::TLS::Callbacks::tls_modify_extensions(), and Botan::TLS::Client_Hello::type().

Referenced by retry().

◆ sent_signature_algorithms()

bool Botan::TLS::Client_Hello::sent_signature_algorithms ( ) const
inherited

Definition at line 246 of file msg_client_hello.cpp.

246 {
247 return m_data->extensions().has<Signature_Algorithms>();
248}

References m_data.

Referenced by ~Client_Hello().

◆ serialize()

std::vector< uint8_t > Botan::TLS::Client_Hello::serialize ( ) const
overridevirtualinherited
Returns
DER representation of this message

Implements Botan::TLS::Handshake_Message.

Definition at line 153 of file msg_client_hello.cpp.

153 {
154 std::vector<uint8_t> buf;
155 buf.reserve(1024); // working around GCC warning
156
157 buf.push_back(m_data->legacy_version().major_version());
158 buf.push_back(m_data->legacy_version().minor_version());
159 buf += m_data->random();
160
161 append_tls_length_value(buf, m_data->session_id().get(), 1);
162
163 if(m_data->legacy_version().is_datagram_protocol()) {
164 append_tls_length_value(buf, m_data->hello_cookie(), 1);
165 }
166
167 append_tls_length_value(buf, m_data->ciphersuites(), 2);
168 append_tls_length_value(buf, m_data->comp_methods(), 1);
169
170 /*
171 * May not want to send extensions at all in some cases. If so,
172 * should include SCSV value (if reneg info is empty, if not we are
173 * renegotiating with a modern server)
174 */
175
176 buf += m_data->extensions().serialize(Connection_Side::Client);
177
178 return buf;
179}
void append_tls_length_value(std::vector< uint8_t, Alloc > &buf, const T *vals, size_t vals_size, size_t tag_size)
Definition tls_reader.h:177

References Botan::TLS::append_tls_length_value(), Botan::TLS::Client, and m_data.

Referenced by ~Client_Hello().

◆ session_id()

const Session_ID & Botan::TLS::Client_Hello::session_id ( ) const
inherited

Definition at line 130 of file msg_client_hello.cpp.

130 {
131 return m_data->session_id();
132}

References m_data.

Referenced by Botan::TLS::Client_Hello_12::session_handle(), and ~Client_Hello().

◆ signature_schemes()

std::vector< Signature_Scheme > Botan::TLS::Client_Hello::signature_schemes ( ) const
inherited

Definition at line 195 of file msg_client_hello.cpp.

195 {
196 if(const Signature_Algorithms* sigs = m_data->extensions().get<Signature_Algorithms>()) {
197 return sigs->supported_schemes();
198 }
199 return {};
200}

References m_data.

Referenced by Botan::TLS::Certificate_13::Certificate_13(), certificate_signature_schemes(), Botan::TLS::Handshake_State::choose_sig_format(), and ~Client_Hello().

◆ sni_hostname()

std::string Botan::TLS::Client_Hello::sni_hostname ( ) const
inherited

Definition at line 228 of file msg_client_hello.cpp.

228 {
229 if(const Server_Name_Indicator* sni = m_data->extensions().get<Server_Name_Indicator>()) {
230 return sni->host_name();
231 }
232 return "";
233}

References m_data.

Referenced by Botan::TLS::Certificate_13::Certificate_13(), Botan::TLS::Certificate_Request_13::maybe_create(), and ~Client_Hello().

◆ srtp_profiles()

std::vector< uint16_t > Botan::TLS::Client_Hello::srtp_profiles ( ) const
inherited

Definition at line 257 of file msg_client_hello.cpp.

257 {
258 if(const SRTP_Protection_Profiles* srtp = m_data->extensions().get<SRTP_Protection_Profiles>()) {
259 return srtp->profiles();
260 }
261 return {};
262}

References m_data.

Referenced by ~Client_Hello().

◆ supported_dh_groups()

std::vector< Group_Params > Botan::TLS::Client_Hello::supported_dh_groups ( ) const
inherited

Definition at line 221 of file msg_client_hello.cpp.

221 {
222 if(const Supported_Groups* groups = m_data->extensions().get<Supported_Groups>()) {
223 return groups->dh_groups();
224 }
225 return std::vector<Group_Params>();
226}

References m_data.

Referenced by ~Client_Hello().

◆ supported_ecc_curves()

std::vector< Group_Params > Botan::TLS::Client_Hello::supported_ecc_curves ( ) const
inherited

Definition at line 214 of file msg_client_hello.cpp.

214 {
215 if(const Supported_Groups* groups = m_data->extensions().get<Supported_Groups>()) {
216 return groups->ec_groups();
217 }
218 return {};
219}

References m_data.

Referenced by ~Client_Hello().

◆ supported_versions()

std::vector< Protocol_Version > Botan::TLS::Client_Hello::supported_versions ( ) const
inherited

Definition at line 235 of file msg_client_hello.cpp.

235 {
236 if(const Supported_Versions* versions = m_data->extensions().get<Supported_Versions>()) {
237 return versions->versions();
238 }
239 return {};
240}

References m_data.

Referenced by ~Client_Hello().

◆ supports_alpn()

bool Botan::TLS::Client_Hello::supports_alpn ( ) const
inherited

Definition at line 242 of file msg_client_hello.cpp.

242 {
243 return m_data->extensions().has<Application_Layer_Protocol_Notification>();
244}

References m_data.

Referenced by Botan::TLS::Server_Hello_12::Server_Hello_12(), Botan::TLS::Server_Hello_12::Server_Hello_12(), and ~Client_Hello().

◆ type()

◆ type_string()

std::string Botan::TLS::Handshake_Message::type_string ( ) const
inherited
Returns
string representation of this message type

Definition at line 21 of file tls_handshake_state.cpp.

21 {
23}
const char * handshake_type_to_string(Handshake_Type type)
Definition tls_magic.cpp:15

References Botan::TLS::handshake_type_to_string(), and type().

◆ validate_updates()

void Botan::TLS::Client_Hello_13::validate_updates ( const Client_Hello_13 & new_ch)

This validates that a Client Hello received after sending a Hello Retry Request was updated in accordance with RFC 8446 4.1.2. If issues are found, this method throws accordingly.

Definition at line 335 of file msg_client_hello_13.cpp.

335 {
336 // RFC 8446 4.1.2
337 // The client will also send a ClientHello when the server has responded
338 // to its ClientHello with a HelloRetryRequest. In that case, the client
339 // MUST send the same ClientHello without modification, except as follows:
340
341 if(m_data->session_id() != new_ch.m_data->session_id() || m_data->random() != new_ch.m_data->random() ||
342 m_data->ciphersuites() != new_ch.m_data->ciphersuites() ||
343 m_data->comp_methods() != new_ch.m_data->comp_methods()) {
344 throw TLS_Exception(Alert::IllegalParameter, "Client Hello core values changed after Hello Retry Request");
345 }
346
347 const auto oldexts = extension_types();
348 const auto newexts = new_ch.extension_types();
349
350 // Check that extension omissions are justified
351 for(const auto oldext : oldexts) {
352 if(!newexts.contains(oldext)) {
353 auto* const ext = extensions().get(oldext);
354
355 // We don't make any assumptions about unimplemented extensions.
356 if(!ext->is_implemented()) {
357 continue;
358 }
359
360 // RFC 8446 4.1.2
361 // Removing the "early_data" extension (Section 4.2.10) if one was
362 // present. Early data is not permitted after a HelloRetryRequest.
363 if(oldext == EarlyDataIndication::static_type()) {
364 continue;
365 }
366
367 // RFC 8446 4.1.2
368 // Optionally adding, removing, or changing the length of the
369 // "padding" extension.
370 //
371 // TODO: implement the Padding extension
372 // if(oldext == Padding::static_type())
373 // continue;
374
375 throw TLS_Exception(Alert::IllegalParameter, "Extension removed in updated Client Hello");
376 }
377 }
378
379 // Check that extension additions are justified
380 for(const auto newext : newexts) {
381 if(!oldexts.contains(newext)) {
382 auto* const ext = new_ch.extensions().get(newext);
383
384 // We don't make any assumptions about unimplemented extensions.
385 if(!ext->is_implemented()) {
386 continue;
387 }
388
389 // RFC 8446 4.1.2
390 // Including a "cookie" extension if one was provided in the
391 // HelloRetryRequest.
392 if(newext == Cookie::static_type()) {
393 continue;
394 }
395
396 // RFC 8446 4.1.2
397 // Optionally adding, removing, or changing the length of the
398 // "padding" extension.
399 //
400 // TODO: implement the Padding extension
401 // if(newext == Padding::static_type())
402 // continue;
403
404 throw TLS_Exception(Alert::UnsupportedExtension, "Added an extension in updated Client Hello");
405 }
406 }
407
408 // RFC 8446 4.1.2
409 // Removing the "early_data" extension (Section 4.2.10) if one was
410 // present. Early data is not permitted after a HelloRetryRequest.
411 if(new_ch.extensions().has<EarlyDataIndication>()) {
412 throw TLS_Exception(Alert::IllegalParameter, "Updated Client Hello indicates early data");
413 }
414
415 // TODO: Contents of extensions are not checked for update compatibility, see:
416 //
417 // RFC 8446 4.1.2
418 // If a "key_share" extension was supplied in the HelloRetryRequest,
419 // replacing the list of shares with a list containing a single
420 // KeyShareEntry from the indicated group.
421 //
422 // Updating the "pre_shared_key" extension if present by recomputing
423 // the "obfuscated_ticket_age" and binder values and (optionally)
424 // removing any PSKs which are incompatible with the server's
425 // indicated cipher suite.
426 //
427 // Optionally adding, removing, or changing the length of the
428 // "padding" extension.
429}
const Extensions & extensions() const
std::set< Extension_Code > extension_types() const
static Extension_Code static_type()
static Extension_Code static_type()

References Client_Hello_13(), Botan::TLS::Client_Hello::extension_types(), Botan::TLS::Client_Hello::extensions(), Botan::TLS::Extensions::get(), Botan::TLS::Extensions::has(), Botan::TLS::Client_Hello::m_data, Botan::TLS::Cookie::static_type(), Botan::TLS::EarlyDataIndication::static_type(), and validate_updates().

Referenced by validate_updates().

◆ wire_type()

virtual Handshake_Type Botan::TLS::Handshake_Message::wire_type ( ) const
inlinevirtualinherited
Returns
the wire representation of the message's type

Reimplemented in Botan::TLS::Hello_Retry_Request.

Definition at line 39 of file tls_handshake_msg.h.

39 {
40 // Usually equal to the Handshake_Type enum value,
41 // with the exception of TLS 1.3 Hello Retry Request.
42 return type();
43 }

References type().

Referenced by Botan::TLS::Stream_Handshake_IO::send().

Member Data Documentation

◆ m_data


The documentation for this class was generated from the following files: