/usr/include/botan-2/botan/tls_blocking.h is in libbotan-2-dev 2.4.0-5ubuntu1.
This file is owned by root:root, with mode 0o644.
The actual contents of the file can be viewed below.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 | /*
* TLS Blocking API
* (C) 2013 Jack Lloyd
* 2016 Matthias Gierlings
*
* Botan is released under the Simplified BSD License (see license.txt)
*/
#ifndef BOTAN_TLS_BLOCKING_CHANNELS_H_
#define BOTAN_TLS_BLOCKING_CHANNELS_H_
#include <botan/tls_client.h>
namespace Botan {
namespace TLS {
/**
* Blocking TLS Client
* Can be used directly, or subclass to get handshake and alert notifications
*/
class BOTAN_PUBLIC_API(2,0) Blocking_Client
{
public:
/*
* These functions are expected to block until completing entirely, or
* fail by throwing an exception.
*/
typedef std::function<size_t (uint8_t[], size_t)> read_fn;
typedef std::function<void (const uint8_t[], size_t)> write_fn;
BOTAN_DEPRECATED("Use the regular TLS::Client interface")
Blocking_Client(read_fn reader,
write_fn writer,
Session_Manager& session_manager,
Credentials_Manager& creds,
const Policy& policy,
RandomNumberGenerator& rng,
const Server_Information& server_info = Server_Information(),
const Protocol_Version& offer_version = Protocol_Version::latest_tls_version(),
const std::vector<std::string>& next_protos = {});
/**
* Completes full handshake then returns
*/
void do_handshake();
/**
* Number of bytes pending read in the plaintext buffer (bytes
* readable without blocking)
*/
size_t pending() const { return m_plaintext.size(); }
/**
* Blocking read, will return at least 1 byte (eventually) or else 0 if the connection
* is closed.
*/
size_t read(uint8_t buf[], size_t buf_len);
void write(const uint8_t buf[], size_t buf_len) { m_channel.send(buf, buf_len); }
const TLS::Channel& underlying_channel() const { return m_channel; }
TLS::Channel& underlying_channel() { return m_channel; }
void close() { m_channel.close(); }
bool is_closed() const { return m_channel.is_closed(); }
std::vector<X509_Certificate> peer_cert_chain() const
{ return m_channel.peer_cert_chain(); }
virtual ~Blocking_Client() = default;
protected:
/**
* Application can override to get the handshake complete notification
*/
virtual bool handshake_complete(const Session&) { return true; }
/**
* Application can override to get notification of alerts
*/
virtual void alert_notification(const Alert&) {}
private:
bool handshake_cb(const Session&);
void data_cb(const uint8_t data[], size_t data_len);
void alert_cb(const Alert& alert);
read_fn m_read;
std::unique_ptr<Compat_Callbacks> m_callbacks;
TLS::Client m_channel;
secure_vector<uint8_t> m_plaintext;
};
}
}
#endif
|