aboutsummaryrefslogtreecommitdiffstats
path: root/src/tls/tls_blocking.cpp
blob: aa213518d1035520a5bbda5db2200c8a5027adcf (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
/*
* TLS Blocking API
* (C) 2013 Jack Lloyd
*
* Released under the terms of the Botan license
*/

#include <botan/tls_blocking.h>

namespace Botan {

namespace TLS {

using namespace std::placeholders;

Blocking_Client::Blocking_Client(std::function<size_t (byte[], size_t)> read_fn,
                                 std::function<void (const byte[], size_t)> write_fn,
                                 Session_Manager& session_manager,
                                 Credentials_Manager& creds,
                                 const Policy& policy,
                                 RandomNumberGenerator& rng,
                                 const Server_Information& server_info,
                                 const Protocol_Version offer_version,
                                 std::function<std::string (std::vector<std::string>)> next_protocol) :
   m_read_fn(read_fn),
   m_channel(write_fn,
             std::bind(&Blocking_Client::process_data, this, _1, _2, _3),
             std::bind(&Blocking_Client::handshake_complete, this, _1),
             session_manager,
             creds,
             policy,
             rng,
             server_info,
             offer_version,
             next_protocol)
   {
   }

bool Blocking_Client::handshake_complete_cb(const Session& session)
   {
   return this->handshake_complete(session);
   }

void Blocking_Client::process_data(const byte data[], size_t data_len,
                                   const Alert& alert)
   {
   m_plaintext.insert(m_plaintext.end(), data, data + data_len);

   if(alert.is_valid())
      alert_notification(alert);
   }

void Blocking_Client::do_handshake()
   {
   std::vector<byte> readbuf(4096);

   while(!m_channel.is_closed() && !m_channel.is_active())
      {
      const size_t from_socket = m_read_fn(&readbuf[0], readbuf.size());
      m_channel.received_data(&readbuf[0], from_socket);
      }
   }

size_t Blocking_Client::read(byte buf[], size_t buf_len)
   {
   std::vector<byte> readbuf(4096);

   while(m_plaintext.empty() && !m_channel.is_closed())
      {
      const size_t from_socket = m_read_fn(&readbuf[0], readbuf.size());
      m_channel.received_data(&readbuf[0], from_socket);
      }

   const size_t returned = std::min(buf_len, m_plaintext.size());

   for(size_t i = 0; i != returned; ++i)
      buf[i] = m_plaintext[i];
   m_plaintext.erase(m_plaintext.begin(), m_plaintext.begin() + returned);

   BOTAN_ASSERT_IMPLICATION(returned == 0, m_channel.is_closed(),
                            "Only return zero if channel is closed");

   return returned;
   }

}

}