/* * Client Key Exchange Message * (C) 2004-2010 Jack Lloyd * * Released under the terms of the Botan license */ #include #include #include #include #include #include #include #include namespace Botan { /** * Create a new Client Key Exchange message */ Client_Key_Exchange::Client_Key_Exchange(RandomNumberGenerator& rng, Record_Writer& writer, HandshakeHash& hash, const Public_Key* pub_key, Version_Code using_version, Version_Code pref_version) { include_length = true; if(const DH_PublicKey* dh_pub = dynamic_cast(pub_key)) { DH_PrivateKey priv_key(rng, dh_pub->get_domain()); PK_Key_Agreement ka(priv_key, "Raw"); pre_master = ka.derive_key(0, dh_pub->public_value()).bits_of(); key_material = priv_key.public_value(); } else if(const RSA_PublicKey* rsa_pub = dynamic_cast(pub_key)) { pre_master.resize(48); rng.randomize(pre_master, 48); pre_master[0] = (pref_version >> 8) & 0xFF; pre_master[1] = (pref_version ) & 0xFF; PK_Encryptor_EME encryptor(*rsa_pub, "PKCS1v15"); key_material = encryptor.encrypt(pre_master, rng); if(using_version == SSL_V3) include_length = false; } else throw Invalid_Argument("Client_Key_Exchange: Key not RSA or DH"); send(writer, hash); } /** * Read a Client Key Exchange message */ Client_Key_Exchange::Client_Key_Exchange(const MemoryRegion& contents, const CipherSuite& suite, Version_Code using_version) { include_length = true; if(using_version == SSL_V3 && (suite.kex_type() == TLS_ALGO_KEYEXCH_RSA)) include_length = false; deserialize(contents); } /** * Serialize a Client Key Exchange message */ SecureVector Client_Key_Exchange::serialize() const { SecureVector buf; if(include_length) { u16bit key_size = key_material.size(); buf.append(get_byte(0, key_size)); buf.append(get_byte(1, key_size)); } buf.append(key_material); return buf; } /** * Deserialize a Client Key Exchange message */ void Client_Key_Exchange::deserialize(const MemoryRegion& buf) { if(include_length) { TLS_Data_Reader reader(buf); key_material = reader.get_range(2, 0, 65535); } else key_material = buf; } /** * Return the pre_master_secret */ SecureVector Client_Key_Exchange::pre_master_secret(RandomNumberGenerator& rng, const Private_Key* priv_key, Version_Code version) { if(const DH_PrivateKey* dh_priv = dynamic_cast(priv_key)) { try { PK_Key_Agreement ka(*dh_priv, "Raw"); pre_master = ka.derive_key(0, key_material).bits_of(); } catch(...) { pre_master.resize(dh_priv->public_value().size()); rng.randomize(pre_master, pre_master.size()); } return pre_master; } else if(const RSA_PrivateKey* rsa_priv = dynamic_cast(priv_key)) { PK_Decryptor_EME decryptor(*rsa_priv, "PKCS1v15"); try { pre_master = decryptor.decrypt(key_material); if(pre_master.size() != 48 || make_u16bit(pre_master[0], pre_master[1]) != version) throw Decoding_Error("Client_Key_Exchange: Secret corrupted"); } catch(...) { pre_master.resize(48); rng.randomize(pre_master, pre_master.size()); pre_master[0] = (version >> 8) & 0xFF; pre_master[1] = (version ) & 0xFF; } return pre_master; } else throw Invalid_Argument("Client_Key_Exchange: Bad key for decrypt"); } /** * Return the pre_master_secret */ SecureVector Client_Key_Exchange::pre_master_secret() const { return pre_master; } }