/* * TLS Channel * (C) 2011 Jack Lloyd * * Released under the terms of the Botan license */ #ifndef BOTAN_TLS_CHANNEL_H__ #define BOTAN_TLS_CHANNEL_H__ #include #include #include #include #include namespace Botan { /** * Generic interface for TLS endpoint */ class BOTAN_DLL TLS_Channel { public: /** * Inject TLS traffic received from counterparty * @return a hint as the how many more bytes we need to process the * current record (this may be 0 if on a record boundary) */ virtual size_t received_data(const byte buf[], size_t buf_size); /** * Inject plaintext intended for counterparty */ virtual void queue_for_sending(const byte buf[], size_t buf_size); /** * Send a close notification alert */ void close() { alert(WARNING, CLOSE_NOTIFY); } /** * Send a TLS alert message. If the alert is fatal, the * internal state (keys, etc) will be reset * @param level is warning or fatal * @param type is the type of alert */ void alert(Alert_Level level, Alert_Type type); /** * @return true iff the connection is active for sending application data */ bool is_active() const { return handshake_completed && !is_closed(); } /** * @return true iff the connection has been definitely closed */ bool is_closed() const { return connection_closed; } /** * @return negotiated version (if session is currently active) */ Version_Code protocol_version() const; /** * Attempt to renegotiate the session */ virtual void renegotiate() = 0; /** * @return certificate chain of the peer (may be empty) */ std::vector peer_cert_chain() const { return peer_certs; } TLS_Channel(std::tr1::function socket_output_fn, std::tr1::function proc_fn, std::tr1::function handshake_complete); virtual ~TLS_Channel(); protected: virtual void read_handshake(byte rec_type, const MemoryRegion& rec_buf); virtual void process_handshake_msg(Handshake_Type type, const MemoryRegion& contents) = 0; virtual void alert_notify(bool fatal_alert, Alert_Type type) = 0; std::tr1::function proc_fn; std::tr1::function handshake_fn; Record_Writer writer; Record_Reader reader; std::vector peer_certs; class Handshake_State* state; class Secure_Renegotiation_State { public: Secure_Renegotiation_State() : initial_handshake(true), secure_renegotiation(false) {} void update(class Client_Hello* client_hello); void update(class Server_Hello* server_hello); void update(class Finished* client_finished, class Finished* server_finished); const MemoryVector& for_client_hello() const { return client_verify; } MemoryVector for_server_hello() const { MemoryVector buf = client_verify; buf += server_verify; return buf; } bool supported() const { return secure_renegotiation; } bool renegotiation() const { return !initial_handshake; } private: bool initial_handshake; bool secure_renegotiation; MemoryVector client_verify, server_verify; }; Secure_Renegotiation_State secure_renegotiation; bool handshake_completed; bool connection_closed; }; } #endif