Botan 3.10.0
Crypto and TLS for C&
Botan::TLS::Server_Hello_12 Class Referencefinal

#include <tls_messages.h>

Inheritance diagram for Botan::TLS::Server_Hello_12:
Botan::TLS::Server_Hello Botan::TLS::Handshake_Message

Classes

class  Settings

Public Member Functions

uint16_t ciphersuite () const
uint8_t compression_method () const
std::set< Extension_Codeextension_types () const
const Extensionsextensions () const
Protocol_Version legacy_version () const
std::string next_protocol () const
bool prefers_compressed_ec_points () const
const std::vector< uint8_t > & random () const
std::optional< Protocol_Versionrandom_signals_downgrade () const
std::vector< uint8_t > renegotiation_info () const
bool secure_renegotiation () const
Protocol_Version selected_version () const override
std::vector< uint8_t > serialize () const override
 Server_Hello_12 (const std::vector< uint8_t > &buf)
 Server_Hello_12 (Handshake_IO &io, Handshake_Hash &hash, const Policy &policy, Callbacks &cb, RandomNumberGenerator &rng, const std::vector< uint8_t > &secure_reneg_info, const Client_Hello_12 &client_hello, const Session &resumed_session, bool offer_session_ticket, std::string_view next_protocol)
 Server_Hello_12 (Handshake_IO &io, Handshake_Hash &hash, const Policy &policy, Callbacks &cb, RandomNumberGenerator &rng, const std::vector< uint8_t > &secure_reneg_info, const Client_Hello_12 &client_hello, const Settings &settings, std::string_view next_protocol)
const Session_IDsession_id () const
uint16_t srtp_profile () const
bool supports_certificate_status_message () const
bool supports_encrypt_then_mac () const
bool supports_extended_master_secret () const
bool supports_session_ticket () const
Handshake_Type type () const override
std::string type_string () const
virtual Handshake_Type wire_type () const

Protected Member Functions

 Server_Hello_12 (std::unique_ptr< Server_Hello_Internal > data)

Protected Attributes

std::unique_ptr< Server_Hello_Internal > m_data

Friends

class Server_Hello_13

Detailed Description

Definition at line 307 of file tls_messages.h.

Constructor & Destructor Documentation

◆ Server_Hello_12() [1/4]

Botan::TLS::Server_Hello_12::Server_Hello_12 ( Handshake_IO & io,
Handshake_Hash & hash,
const Policy & policy,
Callbacks & cb,
RandomNumberGenerator & rng,
const std::vector< uint8_t > & secure_reneg_info,
const Client_Hello_12 & client_hello,
const Settings & settings,
std::string_view next_protocol )

Definition at line 228 of file msg_server_hello.cpp.

236 :
237 Server_Hello(std::make_unique<Server_Hello_Internal>(
238 server_settings.protocol_version(),
239 server_settings.session_id(),
240 make_server_hello_random(rng, server_settings.protocol_version(), cb, policy),
241 server_settings.ciphersuite(),
242 uint8_t(0))) {
243 // NOLINTBEGIN(*-owning-memory)
244 if(client_hello.supports_extended_master_secret()) {
245 m_data->extensions().add(new Extended_Master_Secret);
246 }
247
248 // Sending the extension back does not commit us to sending a stapled response
249 if(client_hello.supports_cert_status_message() && policy.support_cert_status_message()) {
250 m_data->extensions().add(new Certificate_Status_Request);
251 }
252
253 if(!next_protocol.empty() && client_hello.supports_alpn()) {
254 m_data->extensions().add(new Application_Layer_Protocol_Notification(next_protocol));
255 }
256
257 const auto c = Ciphersuite::by_id(m_data->ciphersuite());
258
259 if(c && c->cbc_ciphersuite() && client_hello.supports_encrypt_then_mac() && policy.negotiate_encrypt_then_mac()) {
260 m_data->extensions().add(new Encrypt_then_MAC);
261 }
262
263 if(c && c->ecc_ciphersuite() && client_hello.extension_types().contains(Extension_Code::EcPointFormats)) {
264 m_data->extensions().add(new Supported_Point_Formats(policy.use_ecc_point_compression()));
265 }
266
267 if(client_hello.secure_renegotiation()) {
268 m_data->extensions().add(new Renegotiation_Extension(reneg_info));
269 }
270
271 if(client_hello.supports_session_ticket() && server_settings.offer_session_ticket()) {
272 m_data->extensions().add(new Session_Ticket_Extension());
273 }
274
275 if(m_data->legacy_version().is_datagram_protocol()) {
276 const std::vector<uint16_t> server_srtp = policy.srtp_profiles();
277 const std::vector<uint16_t> client_srtp = client_hello.srtp_profiles();
278
279 if(!server_srtp.empty() && !client_srtp.empty()) {
280 uint16_t shared = 0;
281 // always using server preferences for now
282 for(auto s_srtp : server_srtp) {
283 for(auto c_srtp : client_srtp) {
284 if(shared == 0 && s_srtp == c_srtp) {
285 shared = s_srtp;
286 }
287 }
288 }
289
290 if(shared != 0) {
291 m_data->extensions().add(new SRTP_Protection_Profiles(shared));
292 }
293 }
294 }
295 // NOLINTEND(*-owning-memory)
296
297 cb.tls_modify_extensions(m_data->extensions(), Connection_Side::Server, type());
298
299 hash.update(io.send(*this));
300}
static std::optional< Ciphersuite > by_id(uint16_t suite)
virtual Handshake_Type type() const =0
std::string next_protocol() const
Server_Hello(const Server_Hello &)=delete
std::unique_ptr< Server_Hello_Internal > m_data

References Botan::TLS::Ciphersuite::by_id(), Botan::TLS::Server_Hello::ciphersuite(), Botan::TLS::EcPointFormats, Botan::TLS::Client_Hello::extension_types(), Botan::TLS::Server_Hello::m_data, Botan::TLS::Policy::negotiate_encrypt_then_mac(), next_protocol(), Botan::TLS::Server_Hello_12::Settings::offer_session_ticket(), Botan::TLS::Client_Hello_12::secure_renegotiation(), Botan::TLS::Server_Hello::Server_Hello(), Botan::TLS::Server_Hello::session_id(), Botan::TLS::Policy::support_cert_status_message(), Botan::TLS::Client_Hello::supports_alpn(), Botan::TLS::Client_Hello_12::supports_cert_status_message(), Botan::TLS::Client_Hello_12::supports_encrypt_then_mac(), Botan::TLS::Client_Hello_12::supports_extended_master_secret(), and Botan::TLS::Client_Hello_12::supports_session_ticket().

Referenced by Server_Hello_12(), Server_Hello_12(), and Server_Hello_13.

◆ Server_Hello_12() [2/4]

Botan::TLS::Server_Hello_12::Server_Hello_12 ( Handshake_IO & io,
Handshake_Hash & hash,
const Policy & policy,
Callbacks & cb,
RandomNumberGenerator & rng,
const std::vector< uint8_t > & secure_reneg_info,
const Client_Hello_12 & client_hello,
const Session & resumed_session,
bool offer_session_ticket,
std::string_view next_protocol )

Definition at line 303 of file msg_server_hello.cpp.

312 :
313 Server_Hello(std::make_unique<Server_Hello_Internal>(resumed_session.version(),
314 client_hello.session_id(),
315 make_hello_random(rng, cb, policy),
316 resumed_session.ciphersuite_code(),
317 uint8_t(0))) {
318 // NOLINTBEGIN(*-owning-memory)
319 if(client_hello.supports_extended_master_secret()) {
320 m_data->extensions().add(new Extended_Master_Secret);
321 }
322
323 if(!next_protocol.empty() && client_hello.supports_alpn()) {
324 m_data->extensions().add(new Application_Layer_Protocol_Notification(next_protocol));
325 }
326
327 if(client_hello.supports_encrypt_then_mac() && policy.negotiate_encrypt_then_mac()) {
328 Ciphersuite c = resumed_session.ciphersuite();
329 if(c.cbc_ciphersuite()) {
330 m_data->extensions().add(new Encrypt_then_MAC);
331 }
332 }
333
334 if(resumed_session.ciphersuite().ecc_ciphersuite() &&
335 client_hello.extension_types().contains(Extension_Code::EcPointFormats)) {
336 m_data->extensions().add(new Supported_Point_Formats(policy.use_ecc_point_compression()));
337 }
338
339 if(client_hello.secure_renegotiation()) {
340 m_data->extensions().add(new Renegotiation_Extension(reneg_info));
341 }
342
343 if(client_hello.supports_session_ticket() && offer_session_ticket) {
344 m_data->extensions().add(new Session_Ticket_Extension());
345 }
346 // NOLINTEND(*-owning-memory)
347
348 cb.tls_modify_extensions(m_data->extensions(), Connection_Side::Server, type());
349
350 hash.update(io.send(*this));
351}
std::vector< uint8_t > make_hello_random(RandomNumberGenerator &rng, Callbacks &cb, const Policy &policy)

References Botan::TLS::make_hello_random(), Botan::TLS::Policy::negotiate_encrypt_then_mac(), next_protocol(), Botan::TLS::Server_Hello::Server_Hello(), Server_Hello_12(), Botan::TLS::Server_Hello::session_id(), Botan::TLS::Client_Hello::supports_alpn(), Botan::TLS::Client_Hello_12::supports_encrypt_then_mac(), and Botan::TLS::Client_Hello_12::supports_extended_master_secret().

◆ Server_Hello_12() [3/4]

Botan::TLS::Server_Hello_12::Server_Hello_12 ( const std::vector< uint8_t > & buf)
explicit

Definition at line 353 of file msg_server_hello.cpp.

353 :
354 Server_Hello_12(std::make_unique<Server_Hello_Internal>(buf)) {}
Server_Hello_12(Handshake_IO &io, Handshake_Hash &hash, const Policy &policy, Callbacks &cb, RandomNumberGenerator &rng, const std::vector< uint8_t > &secure_reneg_info, const Client_Hello_12 &client_hello, const Settings &settings, std::string_view next_protocol)

References Server_Hello_12().

◆ Server_Hello_12() [4/4]

Botan::TLS::Server_Hello_12::Server_Hello_12 ( std::unique_ptr< Server_Hello_Internal > data)
explicitprotected

Definition at line 356 of file msg_server_hello.cpp.

356 : Server_Hello(std::move(data)) {
357 if(!m_data->version().is_pre_tls_13()) {
358 throw TLS_Exception(Alert::ProtocolVersion, "Expected server hello of (D)TLS 1.2 or lower");
359 }
360}

References Botan::TLS::Server_Hello::m_data, and Botan::TLS::Server_Hello::Server_Hello().

Member Function Documentation

◆ ciphersuite()

uint16_t Botan::TLS::Server_Hello::ciphersuite ( ) const
inherited

Definition at line 215 of file msg_server_hello.cpp.

215 {
216 return m_data->ciphersuite();
217}

References m_data.

Referenced by Botan::TLS::Client_Hello_13::retry(), Botan::TLS::Server_Hello_12::Server_Hello_12(), and ~Server_Hello().

◆ compression_method()

Definition at line 300 of file msg_server_hello.cpp.

207 {
208 return m_data->comp_method();
209}

◆ extension_types()

Definition at line 298 of file msg_server_hello.cpp.

219 {
220 return m_data->extensions().extension_types();
221}

◆ extensions()

const Extensions & Botan::TLS::Server_Hello::extensions ( ) const
inherited

◆ legacy_version()

Definition at line 301 of file msg_server_hello.cpp.

199 {
200 return m_data->legacy_version();
201}

Referenced by selected_version().

◆ next_protocol()

std::string Botan::TLS::Server_Hello_12::next_protocol ( ) const

Definition at line 405 of file msg_server_hello.cpp.

405 {
406 if(auto* alpn = m_data->extensions().get<Application_Layer_Protocol_Notification>()) {
407 return alpn->single_protocol();
408 }
409 return "";
410}

References Botan::TLS::Server_Hello::m_data.

Referenced by Server_Hello_12(), Server_Hello_12(), and Server_Hello_13.

◆ prefers_compressed_ec_points()

bool Botan::TLS::Server_Hello_12::prefers_compressed_ec_points ( ) const

Definition at line 412 of file msg_server_hello.cpp.

412 {
413 if(auto* ecc_formats = m_data->extensions().get<Supported_Point_Formats>()) {
414 return ecc_formats->prefers_compressed();
415 }
416 return false;
417}

References Botan::TLS::Server_Hello::m_data.

Referenced by Server_Hello_13.

◆ random()

const std::vector< uint8_t > & Botan::TLS::Server_Hello::random ( ) const

Definition at line 299 of file msg_server_hello.cpp.

203 {
204 return m_data->random();
205}

◆ random_signals_downgrade()

std::optional< Protocol_Version > Botan::TLS::Server_Hello_12::random_signals_downgrade ( ) const

Return desired downgrade version indicated by hello random, if any.

Definition at line 419 of file msg_server_hello.cpp.

419 {
420 const uint64_t last8 = load_be<uint64_t>(m_data->random().data(), 3);
421 if(last8 == DOWNGRADE_TLS11) {
422 return Protocol_Version::TLS_V11;
423 }
424 if(last8 == DOWNGRADE_TLS12) {
425 return Protocol_Version::TLS_V12;
426 }
427
428 return std::nullopt;
429}
constexpr auto load_be(ParamTs &&... params)
Definition loadstor.h:504

References Botan::load_be(), and Botan::TLS::Server_Hello::m_data.

Referenced by Server_Hello_13.

◆ renegotiation_info()

std::vector< uint8_t > Botan::TLS::Server_Hello_12::renegotiation_info ( ) const

Definition at line 370 of file msg_server_hello.cpp.

370 {
371 if(Renegotiation_Extension* reneg = m_data->extensions().get<Renegotiation_Extension>()) {
372 return reneg->renegotiation_info();
373 }
374 return std::vector<uint8_t>();
375}

References Botan::TLS::Server_Hello::m_data.

Referenced by Botan::TLS::Channel_Impl_12::secure_renegotiation_check(), and Server_Hello_13.

◆ secure_renegotiation()

bool Botan::TLS::Server_Hello_12::secure_renegotiation ( ) const

Definition at line 366 of file msg_server_hello.cpp.

366 {
367 return m_data->extensions().has<Renegotiation_Extension>();
368}

References Botan::TLS::Server_Hello::m_data.

Referenced by Botan::TLS::Channel_Impl_12::secure_renegotiation_check(), and Server_Hello_13.

◆ selected_version()

Protocol_Version Botan::TLS::Server_Hello_12::selected_version ( ) const
overridevirtual
Returns
the selected version as indicated in the legacy_version field

Implements Botan::TLS::Server_Hello.

Definition at line 362 of file msg_server_hello.cpp.

362 {
363 return legacy_version();
364}
Protocol_Version legacy_version() const

References legacy_version().

Referenced by Server_Hello_13.

◆ serialize()

std::vector< uint8_t > Botan::TLS::Server_Hello::serialize ( ) const
overridevirtualinherited
Returns
DER representation of this message

Implements Botan::TLS::Handshake_Message.

Definition at line 175 of file msg_server_hello.cpp.

175 {
176 std::vector<uint8_t> buf;
177 buf.reserve(1024); // working around GCC warning
178
179 buf.push_back(m_data->legacy_version().major_version());
180 buf.push_back(m_data->legacy_version().minor_version());
181 buf += m_data->random();
182
183 append_tls_length_value(buf, m_data->session_id().get(), 1);
184
185 buf.push_back(get_byte<0>(m_data->ciphersuite()));
186 buf.push_back(get_byte<1>(m_data->ciphersuite()));
187
188 buf.push_back(m_data->comp_method());
189
190 buf += m_data->extensions().serialize(Connection_Side::Server);
191
192 return buf;
193}
void append_tls_length_value(std::vector< uint8_t, Alloc > &buf, const T *vals, size_t vals_size, size_t tag_size)
Definition tls_reader.h:184
constexpr uint8_t get_byte(T input)
Definition loadstor.h:79

References Botan::TLS::append_tls_length_value(), Botan::get_byte(), m_data, serialize(), Botan::TLS::Server, and Server_Hello().

Referenced by serialize(), and ~Server_Hello().

◆ session_id()

const Session_ID & Botan::TLS::Server_Hello::session_id ( ) const
inherited

◆ srtp_profile()

uint16_t Botan::TLS::Server_Hello_12::srtp_profile ( ) const

Definition at line 393 of file msg_server_hello.cpp.

393 {
394 if(auto* srtp = m_data->extensions().get<SRTP_Protection_Profiles>()) {
395 auto prof = srtp->profiles();
396 if(prof.size() != 1 || prof[0] == 0) {
397 throw Decoding_Error("Server sent malformed DTLS-SRTP extension");
398 }
399 return prof[0];
400 }
401
402 return 0;
403}

References Botan::TLS::Server_Hello::m_data.

Referenced by Server_Hello_13.

◆ supports_certificate_status_message()

bool Botan::TLS::Server_Hello_12::supports_certificate_status_message ( ) const

Definition at line 385 of file msg_server_hello.cpp.

385 {
386 return m_data->extensions().has<Certificate_Status_Request>();
387}

References Botan::TLS::Server_Hello::m_data.

Referenced by Server_Hello_13.

◆ supports_encrypt_then_mac()

bool Botan::TLS::Server_Hello_12::supports_encrypt_then_mac ( ) const

Definition at line 381 of file msg_server_hello.cpp.

381 {
382 return m_data->extensions().has<Encrypt_then_MAC>();
383}

References Botan::TLS::Server_Hello::m_data.

Referenced by Server_Hello_13.

◆ supports_extended_master_secret()

bool Botan::TLS::Server_Hello_12::supports_extended_master_secret ( ) const

Definition at line 377 of file msg_server_hello.cpp.

377 {
378 return m_data->extensions().has<Extended_Master_Secret>();
379}

References Botan::TLS::Server_Hello::m_data.

Referenced by Server_Hello_13.

◆ supports_session_ticket()

bool Botan::TLS::Server_Hello_12::supports_session_ticket ( ) const

Definition at line 389 of file msg_server_hello.cpp.

389 {
390 return m_data->extensions().has<Session_Ticket_Extension>();
391}

References Botan::TLS::Server_Hello::m_data.

Referenced by Server_Hello_13.

◆ type()

Handshake_Type Botan::TLS::Server_Hello::type ( ) const
overridevirtualinherited
Returns
the message type

Implements Botan::TLS::Handshake_Message.

Definition at line 195 of file msg_server_hello.cpp.

References Botan::TLS::ServerHello.

Referenced by ~Server_Hello().

◆ type_string()

std::string Botan::TLS::Handshake_Message::type_string ( ) const
inherited
Returns
string representation of this message type

Definition at line 18 of file tls_handshake_state.cpp.

18 {
20}
const char * handshake_type_to_string(Handshake_Type type)

References Botan::TLS::handshake_type_to_string(), and type().

◆ wire_type()

virtual Handshake_Type Botan::TLS::Handshake_Message::wire_type ( ) const
inlinevirtualinherited
Returns
the wire representation of the message's type

Reimplemented in Botan::TLS::Hello_Retry_Request.

Definition at line 39 of file tls_handshake_msg.h.

39 {
40 // Usually equal to the Handshake_Type enum value,
41 // with the exception of TLS 1.3 Hello Retry Request.
42 return type();
43 }

References type().

Referenced by Botan::TLS::Stream_Handshake_IO::send().

◆ Server_Hello_13

Member Data Documentation

◆ m_data


The documentation for this class was generated from the following files: