Botan 2.19.1
Crypto and TLS for C&
tls_record.h
Go to the documentation of this file.
1/*
2* TLS Record Handling
3* (C) 2004-2012 Jack Lloyd
4* 2016 Matthias Gierlings
5*
6* Botan is released under the Simplified BSD License (see license.txt)
7*/
8
9#ifndef BOTAN_TLS_RECORDS_H_
10#define BOTAN_TLS_RECORDS_H_
11
12#include <botan/tls_algos.h>
13#include <botan/tls_magic.h>
14#include <botan/tls_version.h>
15#include <botan/aead.h>
16#include <vector>
17#include <chrono>
18#include <functional>
19
20namespace Botan {
21
22namespace TLS {
23
24class Ciphersuite;
25class Session_Keys;
26
27class Connection_Sequence_Numbers;
28
29/**
30* TLS Cipher State
31*/
33 {
34 public:
35 /**
36 * Initialize a new cipher state
37 */
39 Connection_Side which_side,
40 bool is_our_side,
41 const Ciphersuite& suite,
42 const Session_Keys& keys,
43 bool uses_encrypt_then_mac);
44
46 {
47 BOTAN_ASSERT_NONNULL(m_aead.get());
48 return *m_aead.get();
49 }
50
51 std::vector<uint8_t> aead_nonce(uint64_t seq, RandomNumberGenerator& rng);
52
53 std::vector<uint8_t> aead_nonce(const uint8_t record[], size_t record_len, uint64_t seq);
54
55 std::vector<uint8_t> format_ad(uint64_t seq, uint8_t type,
56 Protocol_Version version,
57 uint16_t ptext_length);
58
59 size_t nonce_bytes_from_handshake() const { return m_nonce_bytes_from_handshake; }
60 size_t nonce_bytes_from_record() const { return m_nonce_bytes_from_record; }
61
62 Nonce_Format nonce_format() const { return m_nonce_format; }
63
64 std::chrono::seconds age() const
65 {
66 return std::chrono::duration_cast<std::chrono::seconds>(
67 std::chrono::system_clock::now() - m_start_time);
68 }
69
70 private:
71 std::chrono::system_clock::time_point m_start_time;
72 std::unique_ptr<AEAD_Mode> m_aead;
73
74 std::vector<uint8_t> m_nonce;
75 Nonce_Format m_nonce_format;
76 size_t m_nonce_bytes_from_handshake;
77 size_t m_nonce_bytes_from_record;
78 };
79
81 {
82 public:
86 m_needed(0),
87 m_sequence(sequence),
88 m_version(version),
89 m_type(type)
90 {}
91
93 m_needed(needed),
94 m_sequence(0),
95 m_version(Protocol_Version()),
96 m_type(NO_RECORD)
97 {}
98
99 size_t needed() const { return m_needed; }
100
102 {
103 BOTAN_ASSERT_NOMSG(m_needed == 0);
104 return m_version;
105 }
106
107 uint64_t sequence() const
108 {
109 BOTAN_ASSERT_NOMSG(m_needed == 0);
110 return m_sequence;
111 }
112
113 uint16_t epoch() const
114 {
115 return static_cast<uint16_t>(sequence() >> 48);
116 }
117
119 {
120 BOTAN_ASSERT_NOMSG(m_needed == 0);
121 return m_type;
122 }
123
124 private:
125 size_t m_needed;
126 uint64_t m_sequence;
127 Protocol_Version m_version;
128 Record_Type m_type;
129 };
130
131/**
132* Create an initial (unencrypted) TLS handshake record
133* @param write_buffer the output record is placed here
134* @param record_type the record layer type
135* @param record_version the record layer version
136* @param record_sequence the record layer sequence number
137* @param message the record contents
138* @param message_len is size of message
139*/
141 uint8_t record_type,
142 Protocol_Version record_version,
143 uint64_t record_sequence,
144 const uint8_t* message,
145 size_t message_len);
146
147/**
148* Create a TLS record
149* @param write_buffer the output record is placed here
150* @param record_type the record layer type
151* @param record_version the record layer version
152* @param record_sequence the record layer sequence number
153* @param message the record contents
154* @param message_len is size of message
155* @param cipherstate is the writing cipher state
156* @param rng is a random number generator
157*/
158void write_record(secure_vector<uint8_t>& write_buffer,
159 uint8_t record_type,
160 Protocol_Version record_version,
161 uint64_t record_sequence,
162 const uint8_t* message,
163 size_t message_len,
164 Connection_Cipher_State& cipherstate,
166
167// epoch -> cipher state
168typedef std::function<std::shared_ptr<Connection_Cipher_State> (uint16_t)> get_cipherstate_fn;
169
170/**
171* Decode a TLS record
172* @return zero if full message, else number of bytes still needed
173*/
174Record_Header read_record(bool is_datagram,
175 secure_vector<uint8_t>& read_buffer,
176 const uint8_t input[],
177 size_t input_len,
178 size_t& consumed,
179 secure_vector<uint8_t>& record_buf,
180 Connection_Sequence_Numbers* sequence_numbers,
181 get_cipherstate_fn get_cipherstate,
182 bool allow_epoch0_restart);
183
184}
185
186}
187
188#endif
#define BOTAN_ASSERT_NOMSG(expr)
Definition: assert.h:68
#define BOTAN_ASSERT_NONNULL(ptr)
Definition: assert.h:107
std::chrono::seconds age() const
Definition: tls_record.h:64
size_t nonce_bytes_from_record() const
Definition: tls_record.h:60
Nonce_Format nonce_format() const
Definition: tls_record.h:62
size_t nonce_bytes_from_handshake() const
Definition: tls_record.h:59
Connection_Cipher_State(Protocol_Version version, Connection_Side which_side, bool is_our_side, const Ciphersuite &suite, const Session_Keys &keys, bool uses_encrypt_then_mac)
Definition: tls_record.cpp:28
std::vector< uint8_t > aead_nonce(uint64_t seq, RandomNumberGenerator &rng)
Definition: tls_record.cpp:86
std::vector< uint8_t > format_ad(uint64_t seq, uint8_t type, Protocol_Version version, uint16_t ptext_length)
Definition: tls_record.cpp:163
Protocol_Version version() const
Definition: tls_record.h:101
Record_Type type() const
Definition: tls_record.h:118
Record_Header(size_t needed)
Definition: tls_record.h:92
uint64_t sequence() const
Definition: tls_record.h:107
size_t needed() const
Definition: tls_record.h:99
uint16_t epoch() const
Definition: tls_record.h:113
Record_Header(uint64_t sequence, Protocol_Version version, Record_Type type)
Definition: tls_record.h:83
int(* final)(unsigned char *, CTX *)
void write_record(secure_vector< uint8_t > &output, uint8_t record_type, Protocol_Version version, uint64_t record_sequence, const uint8_t *message, size_t message_len, Connection_Cipher_State &cs, RandomNumberGenerator &rng)
Definition: tls_record.cpp:224
void write_unencrypted_record(secure_vector< uint8_t > &output, uint8_t record_type, Protocol_Version version, uint64_t record_sequence, const uint8_t *message, size_t message_len)
Definition: tls_record.cpp:210
std::function< std::shared_ptr< Connection_Cipher_State >(uint16_t)> get_cipherstate_fn
Definition: tls_record.h:168
Record_Header read_record(bool is_datagram, secure_vector< uint8_t > &readbuf, const uint8_t input[], size_t input_len, size_t &consumed, secure_vector< uint8_t > &recbuf, Connection_Sequence_Numbers *sequence_numbers, get_cipherstate_fn get_cipherstate, bool allow_epoch0_restart)
Definition: tls_record.cpp:514
Definition: alg_id.cpp:13
std::vector< T, secure_allocator< T > > secure_vector
Definition: secmem.h:65
MechanismType type