-
Notifications
You must be signed in to change notification settings - Fork 1
Expand file tree
/
Copy pathTLSrecord.py
More file actions
44 lines (34 loc) · 1.26 KB
/
TLSrecord.py
File metadata and controls
44 lines (34 loc) · 1.26 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
import struct
import socket
def tls_header(content_type: int, data_len: int):
version = 0x0303 # TLS 1.2 or 1.3 (use the same record version for both)
if data_len > 2**14:
raise ValueError("Data too large for a single TLS record.")
header = struct.pack('!BHH', content_type, version, data_len)
return header
def separate_tls_msg(tls_msg: bytes):
content_type = tls_msg[0]
version = tls_msg[1:3]
data_len = tls_msg[3:5]
data = tls_msg[5:]
return content_type, version, data_len, data
class TLSrecord:
def __init__(self, sock: socket.socket):
self.sock = sock
def send(self, tls_msg: bytes):
self.sock.sendall(tls_msg)
def recv(self):
header = self._recv_exact(5)
content_type, version, length = struct.unpack('!BHH', header)
if length > 2**14:
raise ValueError("Received record exceeds maximum allowed length.")
data = self._recv_exact(length)
return header + data
def _recv_exact(self, n: int) -> bytes:
buffer = b''
while len(buffer) < n:
chunk = self.sock.recv(n - len(buffer))
if not chunk:
raise ConnectionError("Socket connection broken.")
buffer += chunk
return buffer