8#include <botan/internal/tls_handshake_io.h>
10#include <botan/exceptn.h>
11#include <botan/tls_exceptn.h>
12#include <botan/tls_handshake_msg.h>
13#include <botan/internal/fmt.h>
14#include <botan/internal/loadstor.h>
15#include <botan/internal/tls_record.h>
16#include <botan/internal/tls_seq_numbers.h>
23inline size_t load_be24(
const uint8_t q[3]) {
33 throw TLS_Exception(Alert::UnexpectedMessage,
"Invalid handshake message type");
39void store_be24(uint8_t out[3],
size_t val) {
45uint64_t steady_clock_ms() {
46 return std::chrono::duration_cast<std::chrono::milliseconds>(std::chrono::steady_clock::now().time_since_epoch())
53 return Protocol_Version::TLS_V12;
61 m_queue.insert(m_queue.end(), record, record + record_len);
63 if(record_len != 1 || record[0] != 1) {
69 m_queue.insert(m_queue.end(), ccs_hs, ccs_hs +
sizeof(ccs_hs));
71 throw Decoding_Error(
"Unknown message type " + std::to_string(
static_cast<size_t>(record_type)) +
72 " in handshake processing");
77 size_t max_message_size) {
78 if(m_queue.size() >= 4) {
81 const size_t rec_length =
make_uint32(0, m_queue[1], m_queue[2], m_queue[3]);
90 throw TLS_Exception(Alert::UnexpectedMessage,
"Expected ChangeCipherSpec but got a handshake message");
93 verify_is_expected_wire_handshake_type(type);
95 if(max_message_size > 0 && rec_length > max_message_size) {
97 Alert::HandshakeFailure,
98 Botan::fmt(
"Handshake message is {} bytes, policy maximum is {}", rec_length, max_message_size));
102 const size_t length = 4 + rec_length;
104 if(m_queue.size() >= length) {
105 const std::vector<uint8_t> contents(m_queue.begin() + 4, m_queue.begin() + length);
107 m_queue.erase(m_queue.begin(), m_queue.begin() + length);
109 return std::make_pair(type, contents);
117 std::vector<uint8_t> send_buf(4 + msg.size());
119 const size_t buf_size = msg.size();
121 send_buf[0] =
static_cast<uint8_t
>(type);
123 store_be24(&send_buf[1], buf_size);
126 copy_mem(&send_buf[4], msg.data(), msg.size());
133 throw Invalid_State(
"Not possible to send under arbitrary epoch with stream based TLS");
137 const std::vector<uint8_t> msg_bits = msg.
serialize();
141 return std::vector<uint8_t>();
150 return Protocol_Version::DTLS_V12;
153void Datagram_Handshake_IO::retransmit_last_flight() {
154 const size_t flight_idx = (m_flights.size() == 1) ? 0 : (m_flights.size() - 2);
155 retransmit_flight(flight_idx);
158void Datagram_Handshake_IO::retransmit_flight(
size_t flight_idx) {
159 const std::vector<uint16_t>& flight = m_flights.at(flight_idx);
161 BOTAN_ASSERT(!flight.empty(),
"Nonempty flight to retransmit");
163 uint16_t epoch = m_flight_data[flight[0]].epoch;
165 for(
auto msg_seq : flight) {
166 auto& msg = m_flight_data[msg_seq];
168 if(msg.epoch != epoch) {
170 const std::vector<uint8_t> ccs(1, 1);
174 send_message(msg_seq, msg.epoch, msg.msg_type, msg.msg_bits);
184 if(m_last_write == 0 || (m_flights.size() > 1 && !m_flights.rbegin()->empty())) {
192 const uint64_t ms_since_write = steady_clock_ms() - m_last_write;
194 if(ms_since_write < m_next_timeout) {
198 retransmit_last_flight();
200 m_next_timeout = std::min(2 * m_next_timeout, m_max_timeout);
207 uint64_t record_sequence) {
208 const uint16_t epoch =
static_cast<uint16_t
>(record_sequence >> 48);
211 if(record_len != 1 || record[0] != 1) {
216 m_ccs_epochs.insert(epoch);
220 const size_t DTLS_HANDSHAKE_HEADER_LEN = 12;
222 while(record_len > 0) {
223 if(record_len < DTLS_HANDSHAKE_HEADER_LEN) {
229 verify_is_expected_wire_handshake_type(msg_type);
231 const size_t msg_len = load_be24(&record[1]);
233 if(m_max_handshake_msg_size > 0 && msg_len > m_max_handshake_msg_size) {
235 Alert::HandshakeFailure,
236 Botan::fmt(
"Handshake message is {} bytes, policy maximum is {}", msg_len, m_max_handshake_msg_size));
240 const size_t fragment_offset = load_be24(&record[6]);
241 const size_t fragment_length = load_be24(&record[9]);
243 const size_t total_size = DTLS_HANDSHAKE_HEADER_LEN + fragment_length;
245 if(record_len < total_size) {
250 constexpr uint16_t reassembly_window = 16;
253 const size_t max_pending = 4 * m_max_handshake_msg_size;
255 if(message_seq >= m_in_message_seq && (message_seq - m_in_message_seq) < reassembly_window) {
256 auto [it, inserted] = m_messages.try_emplace(message_seq);
258 if(m_max_handshake_msg_size > 0 && m_pending_reassembly_bytes + msg_len > max_pending) {
259 m_messages.erase(it);
260 record += total_size;
261 record_len -= total_size;
264 m_pending_reassembly_bytes += msg_len;
266 it->second.add_fragment(
267 &record[DTLS_HANDSHAKE_HEADER_LEN], fragment_length, fragment_offset, epoch, msg_type, msg_len);
272 record += total_size;
273 record_len -= total_size;
280 if(!m_flights.rbegin()->empty()) {
281 m_flights.push_back(std::vector<uint16_t>());
285 if(!m_messages.empty()) {
286 const uint16_t current_epoch = m_messages.begin()->second.epoch();
288 if(m_ccs_epochs.contains(current_epoch)) {
295 auto i = m_messages.find(m_in_message_seq);
297 if(i == m_messages.end() || !i->second.complete()) {
301 m_in_message_seq += 1;
303 auto result = i->second.message();
310 m_pending_reassembly_bytes -= i->second.msg_length();
311 i->second.release_buffers();
316void Datagram_Handshake_IO::Handshake_Reassembly::release_buffers() {
317 m_received_mask.clear();
318 m_received_mask.shrink_to_fit();
320 m_message.shrink_to_fit();
323void Datagram_Handshake_IO::Handshake_Reassembly::add_fragment(
const uint8_t fragment[],
324 size_t fragment_length,
325 size_t fragment_offset,
332 m_msg_type = msg_type;
333 m_msg_length = msg_length;
334 m_message.resize(msg_length);
335 m_received_mask.assign(msg_length, 0);
337 if(msg_type != m_msg_type || msg_length != m_msg_length || epoch != m_epoch) {
338 throw Decoding_Error(
"Inconsistent values in fragmented DTLS handshake header");
346 if(fragment_offset > m_msg_length) {
347 throw Decoding_Error(
"Fragment offset past end of message");
350 if(fragment_offset + fragment_length > m_msg_length) {
351 throw Decoding_Error(
"Fragment overlaps past end of message");
356 for(
size_t i = 0; i != fragment_length; ++i) {
357 const size_t off = fragment_offset + i;
358 if(m_received_mask[off] != 0) {
361 if(m_message[off] != fragment[i]) {
362 throw Decoding_Error(
"Inconsistent overlapping DTLS handshake fragment");
365 m_message[off] = fragment[i];
366 m_received_mask[off] = 1;
372bool Datagram_Handshake_IO::Handshake_Reassembly::complete()
const {
376std::pair<Handshake_Type, std::vector<uint8_t>> Datagram_Handshake_IO::Handshake_Reassembly::message()
const {
378 throw Internal_Error(
"Datagram_Handshake_IO - message not complete");
381 return std::make_pair(m_msg_type, m_message);
384std::vector<uint8_t> Datagram_Handshake_IO::format_fragment(
const uint8_t fragment[],
386 uint32_t frag_offset,
389 uint16_t msg_sequence)
const {
390 std::vector<uint8_t> send_buf(12 + frag_len);
392 send_buf[0] =
static_cast<uint8_t
>(type);
394 store_be24(&send_buf[1], msg_len);
396 store_be(msg_sequence, &send_buf[4]);
398 store_be24(&send_buf[6], frag_offset);
399 store_be24(&send_buf[9], frag_len);
402 copy_mem(&send_buf[12], fragment, frag_len);
408std::vector<uint8_t> Datagram_Handshake_IO::format_w_seq(
const std::vector<uint8_t>& msg,
410 uint16_t msg_sequence)
const {
411 return format_fragment(msg.data(), msg.size(), 0,
static_cast<uint32_t
>(msg.size()), type, msg_sequence);
416 return format_w_seq(msg, type, m_in_message_seq - 1);
424 const std::vector<uint8_t> msg_bits = msg.
serialize();
429 return std::vector<uint8_t>();
432 send_message(m_out_message_seq, epoch, msg_type, msg_bits);
433 m_out_message_seq += 1;
434 return std::vector<uint8_t>();
438 m_flights.rbegin()->push_back(m_out_message_seq);
439 m_flight_data[m_out_message_seq] = Message_Info(epoch, msg_type, msg_bits);
441 m_out_message_seq += 1;
442 m_last_write = steady_clock_ms();
443 m_next_timeout = m_initial_timeout;
445 return send_message(m_out_message_seq - 1, epoch, msg_type, msg_bits);
448std::vector<uint8_t> Datagram_Handshake_IO::send_message(uint16_t msg_seq,
451 const std::vector<uint8_t>& msg_bits) {
452 const size_t DTLS_HANDSHAKE_HEADER_LEN = 12;
454 auto no_fragment = format_w_seq(msg_bits, msg_type, msg_seq);
459 size_t frag_offset = 0;
468 const size_t ciphersuite_overhead = (epoch > 0) ? 128 : 0;
469 const size_t header_overhead =
DTLS_HEADER_SIZE + DTLS_HANDSHAKE_HEADER_LEN;
471 if(m_mtu <= (header_overhead + ciphersuite_overhead)) {
475 const size_t max_rec_size = m_mtu - (header_overhead + ciphersuite_overhead);
477 while(frag_offset != msg_bits.size()) {
478 const size_t frag_len = std::min<size_t>(msg_bits.size() - frag_offset, max_rec_size);
480 const std::vector<uint8_t> frag = format_fragment(&msg_bits[frag_offset],
482 static_cast<uint32_t
>(frag_offset),
483 static_cast<uint32_t
>(msg_bits.size()),
489 frag_offset += frag_len;
#define BOTAN_ASSERT_NOMSG(expr)
#define BOTAN_ASSERT(expr, assertion_made)
std::vector< uint8_t > send_under_epoch(const Handshake_Message &msg, uint16_t epoch) override
std::pair< Handshake_Type, std::vector< uint8_t > > get_next_record(bool expecting_ccs, size_t max_message_size) override
bool timeout_check() override
void add_record(const uint8_t record[], size_t record_len, Record_Type type, uint64_t sequence_number) override
std::vector< uint8_t > format(const std::vector< uint8_t > &handshake_msg, Handshake_Type handshake_type) const override
Protocol_Version initial_record_version() const override
std::vector< uint8_t > send(const Handshake_Message &msg) override
bool have_more_data() const override
virtual Handshake_Type type() const =0
virtual std::vector< uint8_t > serialize() const =0
virtual Handshake_Type wire_type() const
std::vector< uint8_t > send_under_epoch(const Handshake_Message &msg, uint16_t epoch) override
std::vector< uint8_t > format(const std::vector< uint8_t > &handshake_msg, Handshake_Type handshake_type) const override
Protocol_Version initial_record_version() const override
std::vector< uint8_t > send(const Handshake_Message &msg) override
std::pair< Handshake_Type, std::vector< uint8_t > > get_next_record(bool expecting_ccs, size_t max_message_size) override
void add_record(const uint8_t record[], size_t record_len, Record_Type type, uint64_t sequence_number) override
constexpr uint8_t get_byte(T input)
std::string fmt(std::string_view format, const T &... args)
constexpr void copy_mem(T *out, const T *in, size_t n)
constexpr uint32_t make_uint32(uint8_t i0, uint8_t i1, uint8_t i2, uint8_t i3)
constexpr auto store_be(ParamTs &&... params)
constexpr auto load_be(ParamTs &&... params)