diff options
Diffstat (limited to 'src')
-rw-r--r-- | src/tls/tls_blocking.cpp | 85 | ||||
-rw-r--r-- | src/tls/tls_blocking.h | 89 |
2 files changed, 174 insertions, 0 deletions
diff --git a/src/tls/tls_blocking.cpp b/src/tls/tls_blocking.cpp new file mode 100644 index 000000000..e0f31b1ca --- /dev/null +++ b/src/tls/tls_blocking.cpp @@ -0,0 +1,85 @@ +/* +* TLS Blocking API +* (C) 2013 Jack Lloyd +* +* Released under the terms of the Botan license +*/ + +#include <botan/tls_blocking.h> + +namespace Botan { + +namespace TLS { + +using namespace std::placeholders; + +Blocking_Client::Blocking_Client(std::function<size_t (byte[], size_t)> read_fn, + std::function<void (const byte[], size_t)> write_fn, + Session_Manager& session_manager, + Credentials_Manager& creds, + const Policy& policy, + RandomNumberGenerator& rng, + const Server_Information& server_info, + const Protocol_Version offer_version, + std::function<std::string (std::vector<std::string>)> next_protocol) : + m_read_fn(read_fn), + m_channel(write_fn, + std::bind(&Blocking_Client::process_data, this, _1, _2, _3), + std::bind(&Blocking_Client::handshake_complete, this, _1, _2, _3), + session_manager, + creds, + policy, + rng, + server_info, + offer_version, + next_protocol) + { + } + +#if 0 +Blocking_Client::Blocking_Client(std::function<size_t (byte[], size_t)> read_fn, + std::function<void (const byte[], size_t)> write_fn, + const TLS_Policy& policy, + RandomNumberGenerator& rng) : + m_read_fn(read_fn) +#endif + +bool Blocking_Client::handshake_complete_cb(const Session& session) + { + return this->handshake_complete(session); + } + +void Blocking_Client::process_data(const byte data[], size_t data_len, + const Alert& alert) + { + m_plaintext.insert(m_plaintext.end(), data, data + data_len); + + if(alert.is_valid()) + alert_notification(alert); + } + +size_t Blocking_Client::read(byte buf[], size_t buf_len) + { + secure_vector<byte> readbuf(4096); + + while(m_plaintext.empty()) + { + const size_t readbuf_size = 4096; + byte readbuf[readbuf_size] = { 0 }; + + const size_t from_socket = m_read_fn(&readbuf[0], readbuf_size); + m_channel.received_data(&readbuf[0], from_socket); + } + + const size_t returned = std::min(buf_len, m_plaintext.size()); + + for(size_t i = 0; i != returned; ++i) + buf[i] = m_plaintext[i]; + m_plaintext.erase(m_plaintext.begin(), m_plaintext.begin() + returned); + + return returned; + } + +} + +} diff --git a/src/tls/tls_blocking.h b/src/tls/tls_blocking.h new file mode 100644 index 000000000..d024cf894 --- /dev/null +++ b/src/tls/tls_blocking.h @@ -0,0 +1,89 @@ +/* +* TLS Blocking API +* (C) 2013 Jack Lloyd +* +* Released under the terms of the Botan license +*/ + +#ifndef BOTAN_TLS_BLOCKING_CHANNELS_H__ +#define BOTAN_TLS_BLOCKING_CHANNELS_H__ + +#include <botan/tls_client.h> +#include <botan/tls_server.h> +#include <deque> + +namespace Botan { + +template<typename T> using secure_deque = std::vector<T, secure_allocator<T>>; + +namespace TLS { + +/** +* Blocking TLS Client +*/ +class BOTAN_DLL Blocking_Client + { + public: + + Blocking_Client(std::function<size_t (byte[], size_t)> read_fn, + std::function<void (const byte[], size_t)> write_fn, + Session_Manager& session_manager, + Credentials_Manager& creds, + const Policy& policy, + RandomNumberGenerator& rng, + const Server_Information& server_info = Server_Information(), + const Protocol_Version offer_version = Protocol_Version::latest_tls_version(), + std::function<std::string (std::vector<std::string>)> next_protocol = + std::function<std::string (std::vector<std::string>)>()); + + // Constructor like the 1.10 Client API + Blocking_Client(std::function<size_t (byte[], size_t)> read_fn, + std::function<void (const byte[], size_t)> write_fn, + const Policy& policy, + RandomNumberGenerator& rng); + + size_t currently_readable() const { return m_plaintext.size(); } + + size_t read(byte buf[], size_t buf_len); // blocking read + + void write(const byte buf[], size_t buf_len) { m_channel.send(buf, buf_len); } + + const TLS::Channel& underlying_channel() const { return m_channel; } + TLS::Channel& underlying_channel() { return m_channel; } + + void close() { m_channel.close(); } + + bool is_closed() const { return m_channel.is_closed(); } + + std::vector<X509_Certificate> peer_cert_chain() const + { return m_channel.peer_cert_chain(); } + + virtual ~Blocking_Client() {} + + protected: + /** + * Can override to get the handshake complete notification + */ + virtual bool handshake_complete(const Session&) { return true; } + + /** + * Can override to get notification of alerts + */ + virtual void alert_notification(const Alert&) {} + private: + + bool handshake_complete_cb(const Session&); + + void process_data(const byte data[], size_t data_len, + const Alert& alert); + + std::function<size_t (byte[], size_t)> m_read_fn; + TLS::Client m_channel; + secure_deque<byte> m_plaintext; + }; + +} + +} + +#endif |