/* * TLS Messages * (C) 2004-2011 Jack Lloyd * * Released under the terms of the Botan license */ #ifndef BOTAN_TLS_MESSAGES_H__ #define BOTAN_TLS_MESSAGES_H__ #include #include #include #include #include #include #include #include #include namespace Botan { class Credentials_Manager; namespace TLS { class Record_Writer; class Record_Reader; /** * TLS Handshake Message Base Class */ class Handshake_Message { public: void send(Record_Writer& writer, Handshake_Hash& hash) const; virtual Handshake_Type type() const = 0; virtual ~Handshake_Message() {} private: Handshake_Message& operator=(const Handshake_Message&) { return (*this); } virtual MemoryVector serialize() const = 0; }; MemoryVector make_hello_random(RandomNumberGenerator& rng); /** * Client Hello Message */ class Client_Hello : public Handshake_Message { public: Handshake_Type type() const { return CLIENT_HELLO; } Protocol_Version version() const { return m_version; } const MemoryVector& session_id() const { return m_session_id; } std::vector session_id_vector() const { std::vector v; v.insert(v.begin(), &m_session_id[0], &m_session_id[m_session_id.size()]); return v; } const std::vector >& supported_algos() const { return m_supported_algos; } const std::vector& supported_ecc_curves() const { return m_supported_curves; } std::vector ciphersuites() const { return m_suites; } std::vector compression_methods() const { return m_comp_methods; } const MemoryVector& random() const { return m_random; } std::string sni_hostname() const { return m_hostname; } std::string srp_identifier() const { return m_srp_identifier; } bool secure_renegotiation() const { return m_secure_renegotiation; } const MemoryVector& renegotiation_info() { return m_renegotiation_info; } bool offered_suite(u16bit ciphersuite) const; bool next_protocol_notification() const { return m_next_protocol; } size_t fragment_size() const { return m_fragment_size; } Client_Hello(Record_Writer& writer, Handshake_Hash& hash, const Policy& policy, RandomNumberGenerator& rng, const MemoryRegion& reneg_info, bool next_protocol = false, const std::string& hostname = "", const std::string& srp_identifier = ""); Client_Hello(Record_Writer& writer, Handshake_Hash& hash, RandomNumberGenerator& rng, const Session& resumed_session, bool next_protocol = false); Client_Hello(const MemoryRegion& buf, Handshake_Type type); private: MemoryVector serialize() const; void deserialize(const MemoryRegion& buf); void deserialize_sslv2(const MemoryRegion& buf); Protocol_Version m_version; MemoryVector m_session_id, m_random; std::vector m_suites; std::vector m_comp_methods; std::string m_hostname; std::string m_srp_identifier; bool m_next_protocol; size_t m_fragment_size; bool m_secure_renegotiation; MemoryVector m_renegotiation_info; std::vector > m_supported_algos; std::vector m_supported_curves; }; /** * Server Hello Message */ class Server_Hello : public Handshake_Message { public: Handshake_Type type() const { return SERVER_HELLO; } Protocol_Version version() { return s_version; } const MemoryVector& session_id() const { return m_session_id; } u16bit ciphersuite() const { return suite; } byte compression_method() const { return comp_method; } std::vector session_id_vector() const { std::vector v; v.insert(v.begin(), &m_session_id[0], &m_session_id[m_session_id.size()]); return v; } bool secure_renegotiation() const { return m_secure_renegotiation; } bool next_protocol_notification() const { return m_next_protocol; } const std::vector& next_protocols() const { return m_next_protocols; } size_t fragment_size() const { return m_fragment_size; } const MemoryVector& renegotiation_info() { return m_renegotiation_info; } const MemoryVector& random() const { return s_random; } Server_Hello(Record_Writer& writer, Handshake_Hash& hash, Protocol_Version version, const Client_Hello& other, const std::vector& available_cert_types, const Policy& policies, bool client_has_secure_renegotiation, const MemoryRegion& reneg_info, bool client_has_npn, const std::vector& next_protocols, RandomNumberGenerator& rng); Server_Hello(Record_Writer& writer, Handshake_Hash& hash, const MemoryRegion& session_id, Protocol_Version ver, u16bit ciphersuite, byte compression, size_t max_fragment_size, bool client_has_secure_renegotiation, const MemoryRegion& reneg_info, bool client_has_npn, const std::vector& next_protocols, RandomNumberGenerator& rng); Server_Hello(const MemoryRegion& buf); private: MemoryVector serialize() const; Protocol_Version s_version; MemoryVector m_session_id, s_random; u16bit suite; byte comp_method; size_t m_fragment_size; bool m_secure_renegotiation; MemoryVector m_renegotiation_info; bool m_next_protocol; std::vector m_next_protocols; }; /** * Client Key Exchange Message */ class Client_Key_Exchange : public Handshake_Message { public: Handshake_Type type() const { return CLIENT_KEX; } const SecureVector& pre_master_secret() const { return pre_master; } Client_Key_Exchange(Record_Writer& output, Handshake_State* state, Credentials_Manager& creds, const std::vector& peer_certs, RandomNumberGenerator& rng); Client_Key_Exchange(const MemoryRegion& buf, const Handshake_State* state, Credentials_Manager& creds, const Policy& policy, RandomNumberGenerator& rng); private: MemoryVector serialize() const { return key_material; } SecureVector key_material, pre_master; }; /** * Certificate Message */ class Certificate : public Handshake_Message { public: Handshake_Type type() const { return CERTIFICATE; } const std::vector& cert_chain() const { return certs; } size_t count() const { return certs.size(); } bool empty() const { return certs.empty(); } Certificate(Record_Writer& writer, Handshake_Hash& hash, const std::vector& certs); Certificate(const MemoryRegion& buf); private: MemoryVector serialize() const; std::vector certs; }; /** * Certificate Request Message */ class Certificate_Req : public Handshake_Message { public: Handshake_Type type() const { return CERTIFICATE_REQUEST; } const std::vector& acceptable_cert_types() const { return cert_key_types; } std::vector acceptable_CAs() const { return names; } std::vector > supported_algos() const { return m_supported_algos; } Certificate_Req(Record_Writer& writer, Handshake_Hash& hash, const Policy& policy, const std::vector& allowed_cas, Protocol_Version version); Certificate_Req(const MemoryRegion& buf, Protocol_Version version); private: MemoryVector serialize() const; std::vector names; std::vector cert_key_types; std::vector > m_supported_algos; }; /** * Certificate Verify Message */ class Certificate_Verify : public Handshake_Message { public: Handshake_Type type() const { return CERTIFICATE_VERIFY; } /** * Check the signature on a certificate verify message * @param cert the purported certificate * @param state the handshake state */ bool verify(const X509_Certificate& cert, Handshake_State* state); Certificate_Verify(Record_Writer& writer, Handshake_State* state, RandomNumberGenerator& rng, const Private_Key* key); Certificate_Verify(const MemoryRegion& buf, Protocol_Version version); private: MemoryVector serialize() const; std::string sig_algo; // sig algo used to create signature std::string hash_algo; // hash used to create signature MemoryVector signature; }; /** * Finished Message */ class Finished : public Handshake_Message { public: Handshake_Type type() const { return FINISHED; } MemoryVector verify_data() const { return verification_data; } bool verify(Handshake_State* state, Connection_Side side); Finished(Record_Writer& writer, Handshake_State* state, Connection_Side side); Finished(const MemoryRegion& buf); private: MemoryVector serialize() const; Connection_Side side; MemoryVector verification_data; }; /** * Hello Request Message */ class Hello_Request : public Handshake_Message { public: Handshake_Type type() const { return HELLO_REQUEST; } Hello_Request(Record_Writer& writer); Hello_Request(const MemoryRegion& buf); private: MemoryVector serialize() const; }; /** * Server Key Exchange Message */ class Server_Key_Exchange : public Handshake_Message { public: Handshake_Type type() const { return SERVER_KEX; } const MemoryVector& params() const { return m_params; } bool verify(const X509_Certificate& cert, Handshake_State* state) const; // Only valid for certain kex types const Private_Key& server_kex_key() const; Server_Key_Exchange(Record_Writer& writer, Handshake_State* state, const Policy& policy, Credentials_Manager& creds, RandomNumberGenerator& rng, const Private_Key* signing_key = 0); Server_Key_Exchange(const MemoryRegion& buf, const std::string& kex_alg, const std::string& sig_alg, Protocol_Version version); ~Server_Key_Exchange() { delete m_kex_key; } private: MemoryVector serialize() const; Private_Key* m_kex_key; MemoryVector m_params; std::string m_sig_algo; // sig algo used to create signature std::string m_hash_algo; // hash used to create signature MemoryVector m_signature; }; /** * Server Hello Done Message */ class Server_Hello_Done : public Handshake_Message { public: Handshake_Type type() const { return SERVER_HELLO_DONE; } Server_Hello_Done(Record_Writer& writer, Handshake_Hash& hash); Server_Hello_Done(const MemoryRegion& buf); private: MemoryVector serialize() const; }; /** * Next Protocol Message */ class Next_Protocol : public Handshake_Message { public: Handshake_Type type() const { return NEXT_PROTOCOL; } std::string protocol() const { return m_protocol; } Next_Protocol(Record_Writer& writer, Handshake_Hash& hash, const std::string& protocol); Next_Protocol(const MemoryRegion& buf); private: MemoryVector serialize() const; std::string m_protocol; }; } } #endif