9#include <botan/internal/tls_record_layer_13.h>
11#include <botan/tls_alert.h>
12#include <botan/tls_exceptn.h>
13#include <botan/tls_version.h>
14#include <botan/internal/ct_utils.h>
15#include <botan/internal/loadstor.h>
16#include <botan/internal/tls_cipher_state.h>
23template <
typename IteratorT>
24bool verify_change_cipher_spec(
const IteratorT data,
const size_t size) {
31 const size_t expected_fragment_length = 1;
32 const uint8_t expected_fragment_byte = 0x01;
33 return (size == expected_fragment_length && *data == expected_fragment_byte);
36Record_Type read_record_type(
const uint8_t type_byte) {
44 throw TLS_Exception(Alert::UnexpectedMessage,
"TLS record type had unexpected value");
53class TLSPlaintext_Header final {
55 TLSPlaintext_Header(std::vector<uint8_t> hdr,
const bool check_tls13_version) {
57 m_type = read_record_type(hdr[0]);
58 m_legacy_version = Protocol_Version(
make_uint16(hdr[1], hdr[2]));
60 m_serialized = std::move(hdr);
65 if(m_legacy_version.major_version() != 0x03) {
66 throw TLS_Exception(Alert::IllegalParameter,
"Received unexpected record version");
72 if(check_tls13_version && m_legacy_version.version_code() != 0x0303) {
73 throw TLS_Exception(Alert::IllegalParameter,
"Received unexpected record version");
83 throw TLS_Exception(Alert::DecodeError,
"empty record received");
97 throw TLS_Exception(Alert::RecordOverflow,
"Received an encrypted record that exceeds maximum size");
110 throw TLS_Exception(Alert::RecordOverflow,
"Received a record that exceeds maximum size");
116 const size_t frgmnt_length,
117 const bool use_compatibility_version) :
119 m_legacy_version(use_compatibility_version ? 0x0301 : 0x0303)
121 m_fragment_length(static_cast<uint16_t>(frgmnt_length)),
123 static_cast<uint8_t
>(m_type),
124 m_legacy_version.major_version(),
125 m_legacy_version.minor_version(),
132 uint16_t fragment_length()
const {
return m_fragment_length; }
134 Protocol_Version legacy_version()
const {
return m_legacy_version; }
136 const std::vector<uint8_t>& serialized()
const {
return m_serialized; }
140 Protocol_Version m_legacy_version;
141 uint16_t m_fragment_length;
142 std::vector<uint8_t> m_serialized;
172 m_receiving_compat_mode(true) {}
177 if(m_read_offset > 0) {
178 m_read_buffer.erase(m_read_buffer.begin(), m_read_buffer.begin() + m_read_offset);
182 m_read_buffer.insert(m_read_buffer.end(), data.begin(), data.end());
186 std::span<const uint8_t> data,
202 "Application Data records MUST NOT be written to the wire unprotected");
209 "zero-length fragments of types other than application data are not allowed");
215 std::vector<uint8_t> output;
219 constexpr size_t content_type_tag_length = 1;
226 const size_t max_plaintext_size =
227 (protect) ? m_outgoing_record_size_limit - content_type_tag_length :
static_cast<uint16_t
>(
MAX_PLAINTEXT_SIZE);
229 const auto records = std::max((data.size() + max_plaintext_size - 1) / max_plaintext_size,
size_t(1));
236 output_length += cipher_state->
encrypt_output_length(data.size() - ((records - 1) * max_plaintext_size) +
237 content_type_tag_length);
239 output_length += data.size();
241 output.reserve(output_length);
243 size_t pt_offset = 0;
244 size_t to_process = data.size();
252 const size_t pt_size = std::min<size_t>(to_process, max_plaintext_size);
253 const size_t ct_size =
261 const auto record_header = TLSPlaintext_Header(pt_type, ct_size, m_sending_compat_mode).serialized();
263 output.insert(output.end(), record_header.cbegin(), record_header.cend());
265 auto pt_fragment = data.subspan(pt_offset, pt_size);
268 fragment.reserve(ct_size);
271 fragment.insert(fragment.end(), pt_fragment.begin(), pt_fragment.end());
272 fragment.push_back(
static_cast<uint8_t
>(type));
278 output.insert(output.end(), fragment.cbegin(), fragment.cend());
280 output.insert(output.end(), pt_fragment.begin(), pt_fragment.end());
283 pt_offset += pt_size;
284 to_process -= pt_size;
285 }
while(to_process > 0);
292 const auto remaining = m_read_buffer.size() - m_read_offset;
298 const auto header_begin = m_read_buffer.cbegin() + m_read_offset;
304 const TLSPlaintext_Header plaintext_header({header_begin, header_end}, !m_receiving_compat_mode);
318 throw TLS_Exception(Alert::UnexpectedMessage,
"unprotected record received where protected traffic was expected");
322 return TLS_HEADER_SIZE + plaintext_header.fragment_length() - remaining;
325 const auto fragment_begin = header_end;
326 const auto fragment_end = fragment_begin + plaintext_header.fragment_length();
329 !verify_change_cipher_spec(fragment_begin, plaintext_header.fragment_length())) {
330 throw TLS_Exception(Alert::UnexpectedMessage,
"malformed change cipher spec record received");
338 if(m_read_offset == m_read_buffer.size()) {
344 if(cipher_state ==
nullptr) {
347 throw TLS_Exception(Alert::UnexpectedMessage,
"premature Application Data received");
351 throw TLS_Exception(Alert::BadRecordMac,
"incomplete record mac received");
355 throw TLS_Exception(Alert::RecordOverflow,
"Received an encrypted record that exceeds maximum plaintext size");
363 uint8_t content_type_byte = 0;
364 size_t content_index = 0;
365 for(
size_t i = record.
fragment.size(); i-- > 0;) {
366 const uint8_t b = record.
fragment[i];
369 const auto first_nonzero = byte_is_nonzero & ~seen_nonzero;
370 content_type_byte = first_nonzero.select(b, content_type_byte);
372 seen_nonzero |= byte_is_nonzero;
375 if(!seen_nonzero.as_bool()) {
380 throw TLS_Exception(Alert::UnexpectedMessage,
"No content type found in encrypted record");
384 record.
type = read_record_type(content_type_byte);
390 throw TLS_Exception(Alert::UnexpectedMessage,
"protected change cipher spec received");
396 record.
fragment.resize(content_index);
405 "Received a protected record with empty TLSInnerPlaintext content");
413 BOTAN_ARG_CHECK(outgoing_limit >= 64,
"Invalid outgoing record size limit");
415 "Invalid incoming record size limit");
421 m_outgoing_record_size_limit = std::min(outgoing_limit,
static_cast<uint16_t
>(
MAX_PLAINTEXT_SIZE + 1));
422 m_incoming_record_size_limit = incoming_limit;
#define BOTAN_ASSERT_NOMSG(expr)
#define BOTAN_ARG_CHECK(expr, msg)
#define BOTAN_ASSERT(expr, assertion_made)
static constexpr Mask< T > expand(T v)
static constexpr Mask< T > cleared()
uint64_t decrypt_record_fragment(const std::vector< uint8_t > &header, secure_vector< uint8_t > &encrypted_fragment)
size_t minimum_decryption_input_length() const
bool must_expect_unprotected_alert_traffic() const
uint64_t encrypt_record_fragment(const std::vector< uint8_t > &header, secure_vector< uint8_t > &fragment)
size_t encrypt_output_length(size_t input_length) const
size_t decrypt_output_length(size_t input_length) const
std::variant< BytesNeeded, ResT > ReadResult
Record_Layer(Connection_Side side)
void copy_data(std::span< const uint8_t > data_from_peer)
std::vector< uint8_t > prepare_records(Record_Type type, std::span< const uint8_t > data, Cipher_State *cipher_state=nullptr) const
void set_record_size_limits(uint16_t outgoing_limit, uint16_t incoming_limit)
ReadResult< Record > next_record(Cipher_State *cipher_state=nullptr)
@ MAX_CIPHERTEXT_SIZE_TLS13
constexpr uint8_t get_byte(T input)
void zap(std::vector< T, Alloc > &vec)
std::vector< T, secure_allocator< T > > secure_vector
constexpr uint16_t make_uint16(uint8_t i0, uint8_t i1)
std::optional< uint64_t > seq_no
secure_vector< uint8_t > fragment