aboutsummaryrefslogtreecommitdiffstats
path: root/src/tls/tls_session_state.cpp
blob: 1423ac09d71d61b773f0bfe3aed84b5c647a41cc (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
/*
* TLS Session Management
* (C) 2011 Jack Lloyd
*
* Released under the terms of the Botan license
*/

#include <botan/tls_session_state.h>
#include <botan/der_enc.h>
#include <botan/ber_dec.h>
#include <botan/asn1_str.h>
#include <botan/bigint.h>
#include <ctime>

namespace Botan {

TLS_Session_Params::TLS_Session_Params(const MemoryRegion<byte>& session_id,
                                       const MemoryRegion<byte>& master_secret,
                                       Version_Code version,
                                       u16bit ciphersuite,
                                       byte compression_method,
                                       Connection_Side side,
                                       const X509_Certificate* cert,
                                       const std::string& sni_hostname,
                                       const std::string& srp_identity) :
   session_start_time(time(0)),
   session_id(session_id),
   master_secret(master_secret),
   version(version),
   ciphersuite(ciphersuite),
   compression_method(compression_method),
   connection_side(side),
   sni_hostname(sni_hostname),
   srp_identity(srp_identity)
   {
   if(cert)
      peer_certificate = cert->BER_encode();
   }

TLS_Session_Params::TLS_Session_Params(const byte ber[], size_t ber_len)
   {
   // todo
   }

SecureVector<byte> TLS_Session_Params::BER_encode() const
   {
   return DER_Encoder()
      .start_cons(SEQUENCE)
         .encode(static_cast<size_t>(TLS_SESSION_PARAM_STRUCT_VERSION))
         .encode(session_id, OCTET_STRING)
         .encode(BigInt(session_start_time))
         .encode(static_cast<size_t>(version))
         .encode(static_cast<size_t>(ciphersuite))
         .encode(static_cast<size_t>(compression_method))
         .encode(static_cast<size_t>((connection_side == SERVER) ? 1 : 2))
         .encode(master_secret, OCTET_STRING)
         .encode(peer_certificate, OCTET_STRING)
         .encode(ASN1_String(sni_hostname, UTF8_STRING))
         .encode(ASN1_String(srp_identity, UTF8_STRING))
      .end_cons()
   .get_contents();
   }

bool TLS_Session_Manager_In_Memory::find(const MemoryVector<byte>& session_id,
                                         TLS_Session_Params& params,
                                         Connection_Side side)
   {
   std::map<std::string, TLS_Session_Params>::const_iterator i =
      sessions.find(hex_encode(session_id));

   if(i != sessions.end() && i->second.connection_side == side)
      {
      params = i->second;
      return true;
      }

   return false;
   }

void TLS_Session_Manager_In_Memory::prohibit_resumption(const MemoryVector<byte>& session_id)
   {
   std::map<std::string, TLS_Session_Params>::iterator i =
      sessions.find(hex_encode(session_id));

   if(i != sessions.end())
      sessions.erase(i);
   }

void TLS_Session_Manager_In_Memory::save(const TLS_Session_Params& session_data)
   {
   if(max_sessions != 0)
      {
      while(sessions.size() >= max_sessions)
         sessions.erase(sessions.begin());
      }

   sessions[hex_encode(session_data.session_id)] = session_data;
   }

}