Botan 3.11.0
Crypto and TLS for C&
Botan::TLS::Handshake_State Class Reference

#include <tls_handshake_state.h>

Public Member Functions

Callbackscallbacks () const
const Certificate_Request_12cert_req () const
void cert_req (std::unique_ptr< Certificate_Request_12 > cert_req)
std::pair< std::string, Signature_Formatchoose_sig_format (const Private_Key &key, Signature_Scheme &scheme, bool for_client_auth, const Policy &policy) const
const Ciphersuiteciphersuite () const
const Certificate_12client_certs () const
void client_certs (std::unique_ptr< Certificate_12 > client_certs)
const Finished_12client_finished () const
void client_finished (std::unique_ptr< Finished_12 > client_finished)
const Client_Hello_12client_hello () const
void client_hello (std::unique_ptr< Client_Hello_12 > client_hello)
const Client_Key_Exchangeclient_kex () const
void client_kex (std::unique_ptr< Client_Key_Exchange > client_kex)
const Certificate_Verify_12client_verify () const
void client_verify (std::unique_ptr< Certificate_Verify_12 > client_verify)
void compute_session_keys ()
void compute_session_keys (const secure_vector< uint8_t > &resume_master_secret)
void confirm_transition_to (Handshake_Type msg_type)
std::pair< Handshake_Type, std::vector< uint8_t > > get_next_handshake_msg ()
Handshake_IOhandshake_io ()
 Handshake_State (const Handshake_State &other)=delete
 Handshake_State (Handshake_State &&other)=delete
 Handshake_State (std::unique_ptr< Handshake_IO > io, Callbacks &callbacks)
Handshake_Hashhash ()
const Handshake_Hashhash () const
void hello_verify_request (const Hello_Verify_Request &hello_verify)
const New_Session_Ticket_12new_session_ticket () const
void new_session_ticket (std::unique_ptr< New_Session_Ticket_12 > new_session_ticket)
void note_message (const Handshake_Message &msg)
Handshake_Stateoperator= (const Handshake_State &other)=delete
Handshake_Stateoperator= (Handshake_State &&other)=delete
std::pair< std::string, Signature_Formatparse_sig_format (const Public_Key &key, Signature_Scheme scheme, const std::vector< Signature_Scheme > &offered_schemes, bool for_client_auth, const Policy &policy) const
std::unique_ptr< KDFprotocol_specific_prf () const
std::optional< std::string > psk_identity () const
bool received_handshake_msg (Handshake_Type msg_type) const
const Certificate_Statusserver_cert_status () const
void server_cert_status (std::unique_ptr< Certificate_Status > server_cert_status)
const Certificate_12server_certs () const
void server_certs (std::unique_ptr< Certificate_12 > server_certs)
const Finished_12server_finished () const
void server_finished (std::unique_ptr< Finished_12 > server_finished)
const Server_Hello_12server_hello () const
void server_hello (std::unique_ptr< Server_Hello_12 > server_hello)
const Server_Hello_Doneserver_hello_done () const
void server_hello_done (std::unique_ptr< Server_Hello_Done > server_hello_done)
const Server_Key_Exchangeserver_kex () const
void server_kex (std::unique_ptr< Server_Key_Exchange > server_kex)
const Certificate_Verify_12server_verify () const
void server_verify (std::unique_ptr< Certificate_Verify_12 > server_verify)
const Session_Keyssession_keys () const
Session_Ticket session_ticket () const
void set_expected_next (Handshake_Type msg_type)
void set_version (const Protocol_Version &version)
Protocol_Version version () const
virtual ~Handshake_State ()

Detailed Description

SSL/TLS Handshake State

This is a data holder object for all state aggregated during the handshake, both on client and server side and across protocol versions. It does not implement any logic and offers no guarantees regarding state consistency and legal TLS state transitions.

TODO: currently it implements some logic for TLS 1.2, which should be removed TODO: investigate moving the handshake_io to the channel

Definition at line 59 of file tls_handshake_state.h.

Constructor & Destructor Documentation

◆ Handshake_State() [1/3]

Botan::TLS::Handshake_State::Handshake_State ( std::unique_ptr< Handshake_IO > io,
Callbacks & callbacks )

Definition at line 30 of file tls_handshake_state.cpp.

30 :
31 m_callbacks(cb), m_handshake_io(std::move(io)), m_version(m_handshake_io->initial_record_version()) {}

Referenced by Handshake_State(), Handshake_State(), operator=(), and operator=().

◆ ~Handshake_State()

Botan::TLS::Handshake_State::~Handshake_State ( )
virtualdefault

◆ Handshake_State() [2/3]

Botan::TLS::Handshake_State::Handshake_State ( const Handshake_State & other)
delete

References Handshake_State().

◆ Handshake_State() [3/3]

Botan::TLS::Handshake_State::Handshake_State ( Handshake_State && other)
delete

References Handshake_State().

Member Function Documentation

◆ callbacks()

◆ cert_req() [1/2]

const Certificate_Request_12 * Botan::TLS::Handshake_State::cert_req ( ) const
inline

Definition at line 139 of file tls_handshake_state.h.

139{ return m_cert_req.get(); }

Referenced by choose_sig_format(), and parse_sig_format().

◆ cert_req() [2/2]

void Botan::TLS::Handshake_State::cert_req ( std::unique_ptr< Certificate_Request_12 > cert_req)

Definition at line 83 of file tls_handshake_state.cpp.

83 {
85 m_cert_req = std::move(cert_req);
86 note_message(*m_cert_req);
87}
#define BOTAN_ASSERT_NONNULL(ptr)
Definition assert.h:114
void note_message(const Handshake_Message &msg)
void cert_req(std::unique_ptr< Certificate_Request_12 > cert_req)

References BOTAN_ASSERT_NONNULL, cert_req(), and note_message().

Referenced by cert_req().

◆ choose_sig_format()

std::pair< std::string, Signature_Format > Botan::TLS::Handshake_State::choose_sig_format ( const Private_Key & key,
Signature_Scheme & scheme,
bool for_client_auth,
const Policy & policy ) const

Definition at line 196 of file tls_handshake_state.cpp.

199 {
200 const std::string sig_algo = key.algo_name();
201
202 const std::vector<Signature_Scheme> allowed = policy.allowed_signature_schemes();
203
204 if(for_client_auth) {
206 } else {
208 }
209
210 std::vector<Signature_Scheme> requested =
211 (for_client_auth) ? cert_req()->signature_schemes() : client_hello()->signature_schemes();
212
213 for(const Signature_Scheme scheme : allowed) {
214 if(!scheme.is_available()) {
215 continue;
216 }
217
218 if(scheme.algorithm_name() == sig_algo) {
219 if(std::find(requested.begin(), requested.end(), scheme) != requested.end()) {
220 chosen_scheme = scheme;
221 break;
222 }
223 }
224 }
225
226 const std::string hash = chosen_scheme.hash_function_name();
227
228 if(!policy.allowed_signature_hash(hash)) {
229 throw TLS_Exception(Alert::HandshakeFailure, "Policy refuses to accept signing with any hash supported by peer");
230 }
231
232 if(!chosen_scheme.format().has_value()) {
233 throw Invalid_Argument(sig_algo + " is invalid/unknown for TLS signatures");
234 }
235
236 return std::make_pair(chosen_scheme.padding_string(), chosen_scheme.format().value());
237}
const std::vector< Signature_Scheme > & signature_schemes() const
std::vector< Signature_Scheme > signature_schemes() const
const Client_Hello_12 * client_hello() const
const Certificate_Request_12 * cert_req() const

References Botan::Asymmetric_Key::algo_name(), Botan::TLS::Policy::allowed_signature_hash(), Botan::TLS::Policy::allowed_signature_schemes(), BOTAN_ASSERT_NONNULL, cert_req(), client_hello(), Botan::TLS::Signature_Scheme::format(), hash(), Botan::TLS::Signature_Scheme::hash_function_name(), Botan::TLS::Signature_Scheme::padding_string(), Botan::TLS::Certificate_Request_12::signature_schemes(), and Botan::TLS::Client_Hello::signature_schemes().

Referenced by Botan::TLS::Certificate_Verify_12::Certificate_Verify_12(), and Botan::TLS::Server_Key_Exchange::Server_Key_Exchange().

◆ ciphersuite()

const Ciphersuite & Botan::TLS::Handshake_State::ciphersuite ( ) const

Definition at line 137 of file tls_handshake_state.cpp.

137 {
138 if(!m_ciphersuite.has_value()) {
139 throw Invalid_State("Cipher suite is not set");
140 }
141 return m_ciphersuite.value();
142}

Referenced by Botan::TLS::Client_Key_Exchange::Client_Key_Exchange(), Botan::TLS::Client_Key_Exchange::Client_Key_Exchange(), protocol_specific_prf(), Botan::TLS::Server_Key_Exchange::Server_Key_Exchange(), and Botan::TLS::Session_Keys::Session_Keys().

◆ client_certs() [1/2]

const Certificate_12 * Botan::TLS::Handshake_State::client_certs ( ) const
inline

Definition at line 143 of file tls_handshake_state.h.

143{ return m_client_certs.get(); }

◆ client_certs() [2/2]

void Botan::TLS::Handshake_State::client_certs ( std::unique_ptr< Certificate_12 > client_certs)

Definition at line 95 of file tls_handshake_state.cpp.

95 {
97 m_client_certs = std::move(client_certs);
98 note_message(*m_client_certs);
99}
void client_certs(std::unique_ptr< Certificate_12 > client_certs)

References BOTAN_ASSERT_NONNULL, client_certs(), and note_message().

Referenced by client_certs().

◆ client_finished() [1/2]

const Finished_12 * Botan::TLS::Handshake_State::client_finished ( ) const
inline

Definition at line 157 of file tls_handshake_state.h.

157{ return m_client_finished.get(); }

◆ client_finished() [2/2]

void Botan::TLS::Handshake_State::client_finished ( std::unique_ptr< Finished_12 > client_finished)

Definition at line 131 of file tls_handshake_state.cpp.

131 {
133 m_client_finished = std::move(client_finished);
134 note_message(*m_client_finished);
135}
void client_finished(std::unique_ptr< Finished_12 > client_finished)

References BOTAN_ASSERT_NONNULL, client_finished(), and note_message().

Referenced by client_finished().

◆ client_hello() [1/2]

const Client_Hello_12 * Botan::TLS::Handshake_State::client_hello ( ) const
inline

Definition at line 131 of file tls_handshake_state.h.

131{ return m_client_hello.get(); }

Referenced by choose_sig_format(), and session_ticket().

◆ client_hello() [2/2]

void Botan::TLS::Handshake_State::client_hello ( std::unique_ptr< Client_Hello_12 > client_hello)

Definition at line 47 of file tls_handshake_state.cpp.

47 {
48 // Legacy behavior (exception to the rule): Allow client_hello to be nullptr to reset state.
49 if(client_hello == nullptr) {
50 m_client_hello.reset();
51 hash().reset();
52 } else {
53 m_client_hello = std::move(client_hello);
54 note_message(*m_client_hello);
55 }
56}
void client_hello(std::unique_ptr< Client_Hello_12 > client_hello)

References client_hello(), hash(), note_message(), and Botan::TLS::Handshake_Hash::reset().

Referenced by client_hello(), Botan::TLS::Client_Impl_12::Client_Impl_12(), Botan::TLS::Client_Key_Exchange::Client_Key_Exchange(), Botan::TLS::Client_Key_Exchange::Client_Key_Exchange(), Botan::TLS::Server_Key_Exchange::Server_Key_Exchange(), Botan::TLS::Session_Keys::Session_Keys(), Botan::TLS::Certificate_Verify_12::verify(), and Botan::TLS::Server_Key_Exchange::verify().

◆ client_kex() [1/2]

const Client_Key_Exchange * Botan::TLS::Handshake_State::client_kex ( ) const
inline

Definition at line 145 of file tls_handshake_state.h.

145{ return m_client_kex.get(); }

Referenced by compute_session_keys().

◆ client_kex() [2/2]

void Botan::TLS::Handshake_State::client_kex ( std::unique_ptr< Client_Key_Exchange > client_kex)

Definition at line 101 of file tls_handshake_state.cpp.

101 {
103 m_client_kex = std::move(client_kex);
104 note_message(*m_client_kex);
105}
void client_kex(std::unique_ptr< Client_Key_Exchange > client_kex)

References BOTAN_ASSERT_NONNULL, client_kex(), and note_message().

Referenced by client_kex().

◆ client_verify() [1/2]

const Certificate_Verify_12 * Botan::TLS::Handshake_State::client_verify ( ) const
inline

Definition at line 147 of file tls_handshake_state.h.

147{ return m_client_verify.get(); }

◆ client_verify() [2/2]

void Botan::TLS::Handshake_State::client_verify ( std::unique_ptr< Certificate_Verify_12 > client_verify)

Definition at line 107 of file tls_handshake_state.cpp.

107 {
109 m_client_verify = std::move(client_verify);
110 note_message(*m_client_verify);
111}
void client_verify(std::unique_ptr< Certificate_Verify_12 > client_verify)

References BOTAN_ASSERT_NONNULL, client_verify(), and note_message().

Referenced by client_verify().

◆ compute_session_keys() [1/2]

void Botan::TLS::Handshake_State::compute_session_keys ( )

Definition at line 155 of file tls_handshake_state.cpp.

155 {
157 m_session_keys = Session_Keys(this, client_kex()->pre_master_secret(), false);
158}
const Client_Key_Exchange * client_kex() const

References BOTAN_ASSERT_NONNULL, and client_kex().

◆ compute_session_keys() [2/2]

void Botan::TLS::Handshake_State::compute_session_keys ( const secure_vector< uint8_t > & resume_master_secret)

Definition at line 160 of file tls_handshake_state.cpp.

160 {
161 m_session_keys = Session_Keys(this, resume_master_secret, true);
162}

◆ confirm_transition_to()

void Botan::TLS::Handshake_State::confirm_transition_to ( Handshake_Type msg_type)

Confirm that we were expecting this message type

Parameters
msg_typethe message type

Definition at line 164 of file tls_handshake_state.cpp.

164 {
165 m_transitions.confirm_transition_to(handshake_msg);
166}

◆ get_next_handshake_msg()

std::pair< Handshake_Type, std::vector< uint8_t > > Botan::TLS::Handshake_State::get_next_handshake_msg ( )

Definition at line 176 of file tls_handshake_state.cpp.

176 {
177 return m_handshake_io->get_next_record(m_transitions.change_cipher_spec_expected());
178}

◆ handshake_io()

Handshake_IO & Botan::TLS::Handshake_State::handshake_io ( )
inline

Definition at line 69 of file tls_handshake_state.h.

69{ return *m_handshake_io; }

Referenced by hello_verify_request().

◆ hash() [1/2]

◆ hash() [2/2]

const Handshake_Hash & Botan::TLS::Handshake_State::hash ( ) const
inline

Definition at line 173 of file tls_handshake_state.h.

173{ return m_handshake_hash; }

◆ hello_verify_request()

void Botan::TLS::Handshake_State::hello_verify_request ( const Hello_Verify_Request & hello_verify)

Definition at line 37 of file tls_handshake_state.cpp.

37 {
38 note_message(hello_verify);
39
40 BOTAN_ASSERT_NONNULL(m_client_hello);
41 m_client_hello->update_hello_cookie(hello_verify);
42 hash().reset();
43 hash().update(handshake_io().send(*m_client_hello));
44 note_message(*m_client_hello);
45}
void update(const uint8_t in[], size_t length)

References BOTAN_ASSERT_NONNULL, handshake_io(), hash(), note_message(), Botan::TLS::Handshake_Hash::reset(), and Botan::TLS::Handshake_Hash::update().

◆ new_session_ticket() [1/2]

const New_Session_Ticket_12 * Botan::TLS::Handshake_State::new_session_ticket ( ) const
inline

Definition at line 153 of file tls_handshake_state.h.

153{ return m_new_session_ticket.get(); }

Referenced by session_ticket().

◆ new_session_ticket() [2/2]

void Botan::TLS::Handshake_State::new_session_ticket ( std::unique_ptr< New_Session_Ticket_12 > new_session_ticket)

Definition at line 119 of file tls_handshake_state.cpp.

119 {
121 m_new_session_ticket = std::move(new_session_ticket);
122 note_message(*m_new_session_ticket);
123}
void new_session_ticket(std::unique_ptr< New_Session_Ticket_12 > new_session_ticket)

References BOTAN_ASSERT_NONNULL, new_session_ticket(), and note_message().

Referenced by new_session_ticket().

◆ note_message()

void Botan::TLS::Handshake_State::note_message ( const Handshake_Message & msg)

◆ operator=() [1/2]

Handshake_State & Botan::TLS::Handshake_State::operator= ( const Handshake_State & other)
delete

References Handshake_State().

◆ operator=() [2/2]

Handshake_State & Botan::TLS::Handshake_State::operator= ( Handshake_State && other)
delete

References Handshake_State().

◆ parse_sig_format()

std::pair< std::string, Signature_Format > Botan::TLS::Handshake_State::parse_sig_format ( const Public_Key & key,
Signature_Scheme scheme,
const std::vector< Signature_Scheme > & offered_schemes,
bool for_client_auth,
const Policy & policy ) const

Definition at line 255 of file tls_handshake_state.cpp.

260 {
261 const std::string key_type = key.algo_name();
262
263 if(!policy.allowed_signature_method(key_type)) {
264 throw TLS_Exception(Alert::HandshakeFailure, "Rejecting " + key_type + " signature");
265 }
266
267 if(!scheme.is_available()) {
268 throw TLS_Exception(Alert::IllegalParameter, "Peer sent unknown signature scheme");
269 }
270
271 if(key_type != scheme.algorithm_name()) {
272 throw Decoding_Error("Counterparty sent inconsistent key and sig types");
273 }
274
275 if(for_client_auth && cert_req() == nullptr) {
276 throw TLS_Exception(Alert::HandshakeFailure, "No CertificateVerify message received");
277 }
278
279 /*
280 Confirm the signature type we just received against the
281 supported_algos list that we sent; it better be there.
282 */
283
284 const std::vector<Signature_Scheme> supported_algos =
285 for_client_auth ? cert_req()->signature_schemes() : offered_schemes;
286
287 const std::string hash_algo = scheme.hash_function_name();
288
289 if(!scheme.is_compatible_with(Protocol_Version::TLS_V12)) {
290 throw TLS_Exception(Alert::IllegalParameter, "Peer sent unexceptable signature scheme");
291 }
292
293 if(!supported_algos_include(supported_algos, key_type, hash_algo)) {
294 throw TLS_Exception(Alert::IllegalParameter,
295 "TLS signature extension did not allow for " + key_type + "/" + hash_algo + " signature");
296 }
297
298 if(!scheme.format().has_value()) {
299 throw Invalid_Argument(key_type + " is invalid/unknown for TLS signatures");
300 }
301
302 return std::make_pair(scheme.padding_string(), scheme.format().value());
303}

References Botan::Asymmetric_Key::algo_name(), Botan::TLS::Signature_Scheme::algorithm_name(), Botan::TLS::Policy::allowed_signature_method(), cert_req(), Botan::TLS::Signature_Scheme::format(), Botan::TLS::Signature_Scheme::hash_function_name(), Botan::TLS::Signature_Scheme::is_available(), Botan::TLS::Signature_Scheme::is_compatible_with(), Botan::TLS::Signature_Scheme::padding_string(), and Botan::TLS::Certificate_Request_12::signature_schemes().

Referenced by Botan::TLS::Certificate_Verify_12::verify(), and Botan::TLS::Server_Key_Exchange::verify().

◆ protocol_specific_prf()

std::unique_ptr< KDF > Botan::TLS::Handshake_State::protocol_specific_prf ( ) const

Definition at line 192 of file tls_handshake_state.cpp.

192 {
193 return m_callbacks.tls12_protocol_specific_kdf(ciphersuite().prf_algo());
194}
const Ciphersuite & ciphersuite() const

References ciphersuite().

Referenced by Botan::TLS::Session_Keys::Session_Keys().

◆ psk_identity()

std::optional< std::string > Botan::TLS::Handshake_State::psk_identity ( ) const

Definition at line 144 of file tls_handshake_state.cpp.

144 {
145 if(!m_client_kex) {
146 return std::nullopt;
147 }
148 return m_client_kex->psk_identity();
149}

◆ received_handshake_msg()

bool Botan::TLS::Handshake_State::received_handshake_msg ( Handshake_Type msg_type) const

Return true iff we have received a particular message already

Parameters
msg_typethe message type

Definition at line 172 of file tls_handshake_state.cpp.

172 {
173 return m_transitions.received_handshake_msg(handshake_msg);
174}

◆ server_cert_status() [1/2]

const Certificate_Status * Botan::TLS::Handshake_State::server_cert_status ( ) const
inline

Definition at line 151 of file tls_handshake_state.h.

151{ return m_server_cert_status.get(); }

◆ server_cert_status() [2/2]

void Botan::TLS::Handshake_State::server_cert_status ( std::unique_ptr< Certificate_Status > server_cert_status)

Definition at line 71 of file tls_handshake_state.cpp.

71 {
73 m_server_cert_status = std::move(server_cert_status);
74 note_message(*m_server_cert_status);
75}
void server_cert_status(std::unique_ptr< Certificate_Status > server_cert_status)

References BOTAN_ASSERT_NONNULL, note_message(), and server_cert_status().

Referenced by server_cert_status().

◆ server_certs() [1/2]

const Certificate_12 * Botan::TLS::Handshake_State::server_certs ( ) const
inline

Definition at line 135 of file tls_handshake_state.h.

135{ return m_server_certs.get(); }

◆ server_certs() [2/2]

void Botan::TLS::Handshake_State::server_certs ( std::unique_ptr< Certificate_12 > server_certs)

Definition at line 65 of file tls_handshake_state.cpp.

65 {
67 m_server_certs = std::move(server_certs);
68 note_message(*m_server_certs);
69}
void server_certs(std::unique_ptr< Certificate_12 > server_certs)

References BOTAN_ASSERT_NONNULL, note_message(), and server_certs().

Referenced by Botan::TLS::Client_Key_Exchange::Client_Key_Exchange(), and server_certs().

◆ server_finished() [1/2]

const Finished_12 * Botan::TLS::Handshake_State::server_finished ( ) const
inline

Definition at line 155 of file tls_handshake_state.h.

155{ return m_server_finished.get(); }

◆ server_finished() [2/2]

void Botan::TLS::Handshake_State::server_finished ( std::unique_ptr< Finished_12 > server_finished)

Definition at line 125 of file tls_handshake_state.cpp.

125 {
127 m_server_finished = std::move(server_finished);
128 note_message(*m_server_finished);
129}
void server_finished(std::unique_ptr< Finished_12 > server_finished)

References BOTAN_ASSERT_NONNULL, note_message(), and server_finished().

Referenced by server_finished().

◆ server_hello() [1/2]

const Server_Hello_12 * Botan::TLS::Handshake_State::server_hello ( ) const
inline

Definition at line 133 of file tls_handshake_state.h.

133{ return m_server_hello.get(); }

◆ server_hello() [2/2]

void Botan::TLS::Handshake_State::server_hello ( std::unique_ptr< Server_Hello_12 > server_hello)

Definition at line 58 of file tls_handshake_state.cpp.

58 {
60 m_server_hello = std::move(server_hello);
61 m_ciphersuite = Ciphersuite::by_id(m_server_hello->ciphersuite());
62 note_message(*m_server_hello);
63}
static std::optional< Ciphersuite > by_id(uint16_t suite)
void server_hello(std::unique_ptr< Server_Hello_12 > server_hello)

References BOTAN_ASSERT_NONNULL, Botan::TLS::Ciphersuite::by_id(), note_message(), and server_hello().

Referenced by Botan::TLS::Client_Key_Exchange::Client_Key_Exchange(), server_hello(), Botan::TLS::Server_Key_Exchange::Server_Key_Exchange(), Botan::TLS::Session_Keys::Session_Keys(), and Botan::TLS::Server_Key_Exchange::verify().

◆ server_hello_done() [1/2]

const Server_Hello_Done * Botan::TLS::Handshake_State::server_hello_done ( ) const
inline

Definition at line 141 of file tls_handshake_state.h.

141{ return m_server_hello_done.get(); }

◆ server_hello_done() [2/2]

void Botan::TLS::Handshake_State::server_hello_done ( std::unique_ptr< Server_Hello_Done > server_hello_done)

Definition at line 89 of file tls_handshake_state.cpp.

89 {
91 m_server_hello_done = std::move(server_hello_done);
92 note_message(*m_server_hello_done);
93}
void server_hello_done(std::unique_ptr< Server_Hello_Done > server_hello_done)

References BOTAN_ASSERT_NONNULL, note_message(), and server_hello_done().

Referenced by server_hello_done().

◆ server_kex() [1/2]

const Server_Key_Exchange * Botan::TLS::Handshake_State::server_kex ( ) const
inline

Definition at line 137 of file tls_handshake_state.h.

137{ return m_server_kex.get(); }

◆ server_kex() [2/2]

void Botan::TLS::Handshake_State::server_kex ( std::unique_ptr< Server_Key_Exchange > server_kex)

Definition at line 77 of file tls_handshake_state.cpp.

77 {
79 m_server_kex = std::move(server_kex);
80 note_message(*m_server_kex);
81}
void server_kex(std::unique_ptr< Server_Key_Exchange > server_kex)

References BOTAN_ASSERT_NONNULL, note_message(), and server_kex().

Referenced by Botan::TLS::Client_Key_Exchange::Client_Key_Exchange(), Botan::TLS::Client_Key_Exchange::Client_Key_Exchange(), and server_kex().

◆ server_verify() [1/2]

const Certificate_Verify_12 * Botan::TLS::Handshake_State::server_verify ( ) const
inline

Definition at line 149 of file tls_handshake_state.h.

149{ return m_server_verify.get(); }

◆ server_verify() [2/2]

void Botan::TLS::Handshake_State::server_verify ( std::unique_ptr< Certificate_Verify_12 > server_verify)

Definition at line 113 of file tls_handshake_state.cpp.

113 {
115 m_server_verify = std::move(server_verify);
116 note_message(*m_server_verify);
117}
void server_verify(std::unique_ptr< Certificate_Verify_12 > server_verify)

References BOTAN_ASSERT_NONNULL, note_message(), and server_verify().

Referenced by server_verify().

◆ session_keys()

const Session_Keys & Botan::TLS::Handshake_State::session_keys ( ) const
inline

Definition at line 163 of file tls_handshake_state.h.

163{ return m_session_keys; }

◆ session_ticket()

Session_Ticket Botan::TLS::Handshake_State::session_ticket ( ) const

Definition at line 180 of file tls_handshake_state.cpp.

180 {
181 if(const auto* nst = new_session_ticket()) {
182 const auto& ticket = nst->ticket();
183 if(!ticket.empty()) {
184 return ticket;
185 }
186 }
187
189 return client_hello()->session_ticket();
190}
Session_Ticket session_ticket() const
const New_Session_Ticket_12 * new_session_ticket() const

References BOTAN_ASSERT_NONNULL, client_hello(), new_session_ticket(), and Botan::TLS::Client_Hello_12::session_ticket().

◆ set_expected_next()

void Botan::TLS::Handshake_State::set_expected_next ( Handshake_Type msg_type)

Record that we are expecting a particular message type next

Parameters
msg_typethe message type

Definition at line 168 of file tls_handshake_state.cpp.

168 {
169 m_transitions.set_expected_next(handshake_msg);
170}

Referenced by Botan::TLS::Client_Impl_12::Client_Impl_12().

◆ set_version()

void Botan::TLS::Handshake_State::set_version ( const Protocol_Version & version)

Definition at line 151 of file tls_handshake_state.cpp.

151 {
152 m_version = version;
153}
Protocol_Version version() const

References version().

◆ version()

Protocol_Version Botan::TLS::Handshake_State::version ( ) const
inline

Definition at line 106 of file tls_handshake_state.h.

106{ return m_version; }

Referenced by set_version().


The documentation for this class was generated from the following files: