/* * TLS Messages * (C) 2004-2011 Jack Lloyd * * Released under the terms of the Botan license */ #ifndef BOTAN_TLS_MESSAGES_H__ #define BOTAN_TLS_MESSAGES_H__ #include #include #include #include #include #include #include #include #include #include namespace Botan { class Credentials_Manager; class SRP6_Server_Session; namespace TLS { class Handshake_IO; /** * TLS Handshake Message Base Class */ class Handshake_Message { public: virtual std::vector serialize() const = 0; virtual Handshake_Type type() const = 0; Handshake_Message() {} virtual ~Handshake_Message() {} }; std::vector make_hello_random(RandomNumberGenerator& rng); /** * DTLS Hello Verify Request */ class Hello_Verify_Request : public Handshake_Message { public: std::vector serialize() const; Handshake_Type type() const { return HELLO_VERIFY_REQUEST; } std::vector cookie() const { return m_cookie; } Hello_Verify_Request(const std::vector& buf); Hello_Verify_Request(const std::vector& client_hello_bits, const std::string& client_identity, const SymmetricKey& secret_key); private: std::vector m_cookie; }; /** * Client Hello Message */ class Client_Hello : public Handshake_Message { public: Handshake_Type type() const { return CLIENT_HELLO; } Protocol_Version version() const { return m_version; } const std::vector& session_id() const { return m_session_id; } const std::vector >& supported_algos() const { return m_supported_algos; } const std::vector& supported_ecc_curves() const { return m_supported_curves; } std::vector ciphersuites() const { return m_suites; } std::vector compression_methods() const { return m_comp_methods; } const std::vector& random() const { return m_random; } std::string sni_hostname() const { return m_hostname; } std::string srp_identifier() const { return m_srp_identifier; } bool secure_renegotiation() const { return m_secure_renegotiation; } const std::vector& renegotiation_info() const { return m_renegotiation_info; } bool offered_suite(u16bit ciphersuite) const; bool next_protocol_notification() const { return m_next_protocol; } size_t fragment_size() const { return m_fragment_size; } bool supports_session_ticket() const { return m_supports_session_ticket; } const std::vector& session_ticket() const { return m_session_ticket; } bool supports_heartbeats() const { return m_supports_heartbeats; } bool peer_can_send_heartbeats() const { return m_peer_can_send_heartbeats; } Client_Hello(Handshake_IO& io, Handshake_Hash& hash, Protocol_Version version, const Policy& policy, RandomNumberGenerator& rng, const std::vector& reneg_info, bool next_protocol = false, const std::string& hostname = "", const std::string& srp_identifier = ""); Client_Hello(Handshake_IO& io, Handshake_Hash& hash, const Policy& policy, RandomNumberGenerator& rng, const std::vector& reneg_info, const Session& resumed_session, bool next_protocol = false); Client_Hello(Handshake_IO& io, Handshake_Hash& hash, const Client_Hello& initial_hello, const Hello_Verify_Request& hello_verify); Client_Hello(const std::vector& buf, Handshake_Type type); private: std::vector serialize() const; void deserialize(const std::vector& buf); void deserialize_sslv2(const std::vector& buf); Protocol_Version m_version; std::vector m_session_id, m_random; std::vector m_suites; std::vector m_comp_methods; std::string m_hostname; std::string m_srp_identifier; bool m_next_protocol; size_t m_fragment_size; bool m_secure_renegotiation; std::vector m_renegotiation_info; std::vector > m_supported_algos; std::vector m_supported_curves; bool m_supports_session_ticket; std::vector m_session_ticket; std::vector m_hello_cookie; bool m_supports_heartbeats; bool m_peer_can_send_heartbeats; }; /** * Server Hello Message */ class Server_Hello : public Handshake_Message { public: Handshake_Type type() const { return SERVER_HELLO; } Protocol_Version version() const { return m_version; } const std::vector& random() const { return m_random; } const std::vector& session_id() const { return m_session_id; } u16bit ciphersuite() const { return m_ciphersuite; } byte compression_method() const { return m_comp_method; } bool secure_renegotiation() const { return m_secure_renegotiation; } bool next_protocol_notification() const { return m_next_protocol; } bool supports_session_ticket() const { return m_supports_session_ticket; } const std::vector& next_protocols() const { return m_next_protocols; } size_t fragment_size() const { return m_fragment_size; } const std::vector& renegotiation_info() const { return m_renegotiation_info; } bool supports_heartbeats() const { return m_supports_heartbeats; } bool peer_can_send_heartbeats() const { return m_peer_can_send_heartbeats; } Server_Hello(Handshake_IO& io, Handshake_Hash& hash, const std::vector& session_id, Protocol_Version ver, u16bit ciphersuite, byte compression, size_t max_fragment_size, bool client_has_secure_renegotiation, const std::vector& reneg_info, bool offer_session_ticket, bool client_has_npn, const std::vector& next_protocols, bool client_has_heartbeat, RandomNumberGenerator& rng); Server_Hello(const std::vector& buf); private: std::vector serialize() const; Protocol_Version m_version; std::vector m_session_id, m_random; u16bit m_ciphersuite; byte m_comp_method; size_t m_fragment_size; bool m_secure_renegotiation; std::vector m_renegotiation_info; bool m_next_protocol; std::vector m_next_protocols; bool m_supports_session_ticket; bool m_supports_heartbeats; bool m_peer_can_send_heartbeats; }; /** * Client Key Exchange Message */ class Client_Key_Exchange : public Handshake_Message { public: Handshake_Type type() const { return CLIENT_KEX; } const secure_vector& pre_master_secret() const { return m_pre_master; } Client_Key_Exchange(Handshake_IO& io, Handshake_State* state, const Policy& policy, Credentials_Manager& creds, const std::vector& peer_certs, const std::string& hostname, RandomNumberGenerator& rng); Client_Key_Exchange(const std::vector& buf, const Handshake_State* state, Credentials_Manager& creds, const Policy& policy, RandomNumberGenerator& rng); private: std::vector serialize() const { return m_key_material; } std::vector m_key_material; secure_vector m_pre_master; }; /** * Certificate Message */ class Certificate : public Handshake_Message { public: Handshake_Type type() const { return CERTIFICATE; } const std::vector& cert_chain() const { return m_certs; } size_t count() const { return m_certs.size(); } bool empty() const { return m_certs.empty(); } Certificate(Handshake_IO& io, Handshake_Hash& hash, const std::vector& certs); Certificate(const std::vector& buf); private: std::vector serialize() const; std::vector m_certs; }; /** * Certificate Request Message */ class Certificate_Req : public Handshake_Message { public: Handshake_Type type() const { return CERTIFICATE_REQUEST; } const std::vector& acceptable_cert_types() const { return m_cert_key_types; } std::vector acceptable_CAs() const { return m_names; } std::vector > supported_algos() const { return m_supported_algos; } Certificate_Req(Handshake_IO& io, Handshake_Hash& hash, const Policy& policy, const std::vector& allowed_cas, Protocol_Version version); Certificate_Req(const std::vector& buf, Protocol_Version version); private: std::vector serialize() const; std::vector m_names; std::vector m_cert_key_types; std::vector > m_supported_algos; }; /** * Certificate Verify Message */ class Certificate_Verify : public Handshake_Message { public: Handshake_Type type() const { return CERTIFICATE_VERIFY; } /** * Check the signature on a certificate verify message * @param cert the purported certificate * @param state the handshake state */ bool verify(const X509_Certificate& cert, const Handshake_State* state) const; Certificate_Verify(Handshake_IO& io, Handshake_State* state, const Policy& policy, RandomNumberGenerator& rng, const Private_Key* key); Certificate_Verify(const std::vector& buf, Protocol_Version version); private: std::vector serialize() const; std::string m_sig_algo; // sig algo used to create signature std::string m_hash_algo; // hash used to create signature std::vector m_signature; }; /** * Finished Message */ class Finished : public Handshake_Message { public: Handshake_Type type() const { return FINISHED; } std::vector verify_data() const { return m_verification_data; } bool verify(const Handshake_State* state, Connection_Side side) const; Finished(Handshake_IO& io, Handshake_State* state, Connection_Side side); Finished(const std::vector& buf); private: std::vector serialize() const; Connection_Side m_side; std::vector m_verification_data; }; /** * Hello Request Message */ class Hello_Request : public Handshake_Message { public: Handshake_Type type() const { return HELLO_REQUEST; } Hello_Request(Handshake_IO& io); Hello_Request(const std::vector& buf); private: std::vector serialize() const; }; /** * Server Key Exchange Message */ class Server_Key_Exchange : public Handshake_Message { public: Handshake_Type type() const { return SERVER_KEX; } const std::vector& params() const { return m_params; } bool verify(const X509_Certificate& cert, const Handshake_State* state) const; // Only valid for certain kex types const Private_Key& server_kex_key() const; // Only valid for SRP negotiation SRP6_Server_Session& server_srp_params() const; Server_Key_Exchange(Handshake_IO& io, Handshake_State* state, const Policy& policy, Credentials_Manager& creds, RandomNumberGenerator& rng, const Private_Key* signing_key = nullptr); Server_Key_Exchange(const std::vector& buf, const std::string& kex_alg, const std::string& sig_alg, Protocol_Version version); ~Server_Key_Exchange(); private: std::vector serialize() const; std::unique_ptr m_kex_key; std::unique_ptr m_srp_params; std::vector m_params; std::string m_sig_algo; // sig algo used to create signature std::string m_hash_algo; // hash used to create signature std::vector m_signature; }; /** * Server Hello Done Message */ class Server_Hello_Done : public Handshake_Message { public: Handshake_Type type() const { return SERVER_HELLO_DONE; } Server_Hello_Done(Handshake_IO& io, Handshake_Hash& hash); Server_Hello_Done(const std::vector& buf); private: std::vector serialize() const; }; /** * Next Protocol Message */ class Next_Protocol : public Handshake_Message { public: Handshake_Type type() const { return NEXT_PROTOCOL; } std::string protocol() const { return m_protocol; } Next_Protocol(Handshake_IO& io, Handshake_Hash& hash, const std::string& protocol); Next_Protocol(const std::vector& buf); private: std::vector serialize() const; std::string m_protocol; }; class New_Session_Ticket : public Handshake_Message { public: Handshake_Type type() const { return NEW_SESSION_TICKET; } u32bit ticket_lifetime_hint() const { return m_ticket_lifetime_hint; } const std::vector& ticket() const { return m_ticket; } New_Session_Ticket(Handshake_IO& io, Handshake_Hash& hash, const std::vector& ticket, u32bit lifetime); New_Session_Ticket(Handshake_IO& io, Handshake_Hash& hash); New_Session_Ticket(const std::vector& buf); private: std::vector serialize() const; u32bit m_ticket_lifetime_hint; std::vector m_ticket; }; } } #endif