aboutsummaryrefslogtreecommitdiffstats
path: root/src/tls/tls_handshake_state.h
blob: f57538478b7152cb0524f9d1259aa7f2667637e3 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
/*
* TLS Handshake State
* (C) 2004-2006 Jack Lloyd
*
* Released under the terms of the Botan license
*/

#ifndef BOTAN_TLS_HANDSHAKE_STATE_H__
#define BOTAN_TLS_HANDSHAKE_STATE_H__

#include <botan/internal/tls_messages.h>
#include <botan/internal/tls_session_key.h>
#include <botan/secqueue.h>

namespace Botan {

/**
* SSL/TLS Handshake State
*/
class Handshake_State
   {
   public:
      Handshake_State();
      ~Handshake_State();

      bool received_handshake_msg(Handshake_Type handshake_msg) const;

      void confirm_transition_to(Handshake_Type handshake_msg);
      void set_expected_next(Handshake_Type handshake_msg);

      Client_Hello* client_hello;
      Server_Hello* server_hello;
      Certificate* server_certs;
      Server_Key_Exchange* server_kex;
      Certificate_Req* cert_req;
      Server_Hello_Done* server_hello_done;

      Certificate* client_certs;
      Client_Key_Exchange* client_kex;
      Certificate_Verify* client_verify;
      Finished* client_finished;
      Finished* server_finished;

      Public_Key* kex_pub;
      Private_Key* kex_priv;

      TLS_Cipher_Suite suite;
      SessionKeys keys;
      TLS_Handshake_Hash hash;

      SecureQueue queue;

      /*
      * Only used by clients for session resumption
      */
      SecureVector<byte> resume_master_secret;

      Version_Code version;
   private:
      u32bit hand_expecting_mask, hand_received_mask;
   };

}

#endif