wtls_state-decl.h
字号:
/* * Macro calls to generate rows of the state table. See the documentation for * guidance how to use and update these. * * by Nick Clarey <nclarey@3glab.com> */STATE_NAME(NULL_STATE)STATE_NAME(CREATING)STATE_NAME(CREATED)STATE_NAME(EXCHANGE)STATE_NAME(COMMIT)STATE_NAME(OPENING)STATE_NAME(OPEN)/* If the packet is a ClientHello *//* We only include this case in state NULL; the others are handled by the wtls_find_or_create function */ROW(NULL_STATE, T_Unitdata_Ind, 1, { /* The Wap event we have to dispatch */ WAPEvent *res; wtls_Payload* tempPayload; wtls_PDU* clientHelloPDU; CipherSuite* ciphersuite; int randomCounter; tempPayload = (wtls_Payload*) list_search (event->u.T_Unitdata_Ind.pdu_list, (void*) client_hello, match_handshake_type); clientHelloPDU = wtls_pdu_unpack(tempPayload,wtls_machine); /* Store the client's random value - use pack for simplicity */ wtls_machine->client_random = octstr_create(""); randomCounter = pack_int32(wtls_machine->client_random,0, clientHelloPDU->u.handshake.client_hello->random->gmt_unix_time); octstr_insert(wtls_machine->client_random, clientHelloPDU->u.handshake.client_hello->random->random_bytes, randomCounter); /* Generate a SEC_Create_Res event, and pass it back into the queue */ res = wap_event_create(SEC_Create_Res); res->u.SEC_Create_Res.addr_tuple = wap_addr_tuple_duplicate(event->u.T_Unitdata_Ind.addr_tuple); /* Select the ciphersuite from the supplied list */ ciphersuite = wtls_choose_ciphersuite(clientHelloPDU->u.handshake.client_hello->ciphersuites); /* Set the relevant values in the wtls_machine and PDU structure */ wtls_machine->bulk_cipher_algorithm = ciphersuite->bulk_cipher_algo; wtls_machine->mac_algorithm = ciphersuite->mac_algo; res->u.SEC_Create_Res.bulk_cipher_algo = ciphersuite->bulk_cipher_algo; res->u.SEC_Create_Res.mac_algo = ciphersuite->mac_algo; res->u.SEC_Create_Res.client_key_id = wtls_choose_clientkeyid(clientHelloPDU->u.handshake.client_hello->client_key_ids); /* Set the sequence number mode in both the machine and the outgoing packet */ res->u.SEC_Create_Res.snmode = wtls_choose_snmode(clientHelloPDU->u.handshake.client_hello->snmode); wtls_machine->sequence_number_mode = res->u.SEC_Create_Res.snmode; /* Set the key refresh mode in both the machine and the outgoing packet */ res->u.SEC_Create_Res.krefresh = wtls_choose_krefresh(clientHelloPDU->u.handshake.client_hello->krefresh); wtls_machine->key_refresh = res->u.SEC_Create_Res.krefresh; /* Keep the data so we can send it back in EXCHANGE */ // temporary - needs to delete old one if exists ! //wtls_machine->handshake_data = octstr_create(""); octstr_append(wtls_machine->handshake_data, tempPayload->data); debug("wtls:handle_event", 0,"Dispatching SEC_Create_Res event"); wtls_dispatch_event(res);}, CREATING)/* Creating State *//* Termination */ROW(CREATING, SEC_Terminate_Req, 1, {/* Send off a T_Unitdata_Req containing an alert as specified */ send_alert(event->u.SEC_Terminate_Req.alert_level, event->u.SEC_Terminate_Req.alert_desc, wtls_machine); }, NULL_STATE)/* Exception */ROW(CREATING, SEC_Exception_Req, 1, { /* Send off a T_Unitdata_Req containing an exception as specified */ send_alert(event->u.SEC_Exception_Req.alert_level, event->u.SEC_Exception_Req.alert_desc, wtls_machine); }, CREATING)/* Create Response - create a buffer with a "ServerHello" and possibly a Certificate or something else */ROW(CREATING, SEC_Create_Res, 1, { WAPEvent *req; wtls_PDU* serverHelloPDU; Random* tempRandom; int randomCounter = 0; /* Our serverHello */ serverHelloPDU = wtls_pdu_create(Handshake_PDU); serverHelloPDU->u.handshake.msg_type = server_hello; serverHelloPDU->u.handshake.server_hello = (ServerHello*) gw_malloc(sizeof(ServerHello)); /* Set our server version */ serverHelloPDU->u.handshake.server_hello->serverversion = 1; /* Get a suitably random number - store it in both the machine structure and outgoing PDU */ tempRandom = wtls_get_random(); wtls_machine->server_random = octstr_create(""); randomCounter = pack_int32(wtls_machine->server_random,0,tempRandom->gmt_unix_time); octstr_insert(wtls_machine->server_random,tempRandom->random_bytes,octstr_len(wtls_machine->server_random)); serverHelloPDU->u.handshake.server_hello->random = tempRandom; /* At the moment, we don't support session caching, so tell them to forget about caching us */ serverHelloPDU->u.handshake.server_hello->session_id = octstr_create(""); /* We need to select an appropriate mechanism here from the ones listed */ serverHelloPDU->u.handshake.server_hello->client_key_id = event->u.SEC_Create_Res.client_key_id; /* Get our ciphersuite details */ serverHelloPDU->u.handshake.server_hello->ciphersuite = (CipherSuite*) gw_malloc(sizeof(CipherSuite)); serverHelloPDU->u.handshake.server_hello->ciphersuite->bulk_cipher_algo = event->u.SEC_Create_Res.bulk_cipher_algo; serverHelloPDU->u.handshake.server_hello->ciphersuite->mac_algo = event->u.SEC_Create_Res.mac_algo; serverHelloPDU->u.handshake.server_hello->comp_method = null_comp; /* We need to confirm the client's choice, or if they haven't specified one, select one ourselves */ serverHelloPDU->u.handshake.server_hello->snmode = event->u.SEC_Create_Res.snmode; /* We need to either confirm the client's choice of key refresh rate, or choose a lower rate */ serverHelloPDU->u.handshake.server_hello->krefresh = event->u.SEC_Create_Res.krefresh; /* Add the PDUsto the server's outgoing list */ add_pdu(wtls_machine, serverHelloPDU); /* Generate and dispatch a SEC_Exchange_Req or maybe a SEC_Commit_Req */ req = wap_event_create(SEC_Exchange_Req); req->u.SEC_Exchange_Req.addr_tuple = wap_addr_tuple_duplicate(event->u.T_Unitdata_Ind.addr_tuple); wtls_dispatch_event(req); debug("wtls: handle_event", 0,"Dispatching SEC_Exchange_Req event"); }, CREATED)/* Created State *//* Exchange Request - Full Handshake will be performed */ROW(CREATED, SEC_Exchange_Req, 1, { wtls_PDU* serverKeyXchgPDU; wtls_PDU* serverHelloDonePDU; /* Assert that the PDU list is valid */ gw_assert(wtls_machine->packet_to_send != NULL); /* We'll also need a Server Key Exchange message */ serverKeyXchgPDU = wtls_pdu_create(Handshake_PDU); serverKeyXchgPDU->u.handshake.msg_type = server_key_exchange; serverKeyXchgPDU->u.handshake.server_key_exchange = (ServerKeyExchange*) gw_malloc(sizeof(ServerKeyExchange)); serverKeyXchgPDU->u.handshake.server_key_exchange->param_spec = NULL; /* Allocate memory for the RSA component */ debug("wtls: ", 0,"Going to get the RSA public key..."); serverKeyXchgPDU->u.handshake.server_key_exchange->rsa_params = wtls_get_rsapublickey(); debug("wtls: ", 0,"...got it."); add_pdu(wtls_machine, serverKeyXchgPDU); debug("wtls: ", 0,"in CREATED - just added pdu..."); /* Add some more PDUs to the List - potentially a ServerKeyExchange, a CertificateRequest and a ServerHelloDone */ /* Just a ServerHelloDone for now */ serverHelloDonePDU = wtls_pdu_create(Handshake_PDU); serverHelloDonePDU->u.handshake.msg_type = server_hello_done; add_pdu(wtls_machine, serverHelloDonePDU); /* Translate the buffer and address details into a T_Unitdata_Req * and send it winging it's way across the network */ send_queuedpdus(wtls_machine); }, EXCHANGE)/* Commit Request - Abbreviated Handshake will be performed */ROW(CREATED, SEC_Commit_Req, 1,{ /* Assert that the PDU list is valid */ /* Add some more PDUs to the List - a ChangeCipherSpec and a Finished */ /* Translate the buffer and address details into a T_Unitdata_Req */ /* And send it winging it's way across the network */}, COMMIT)/* Terminate Request */ROW(CREATED, SEC_Terminate_Req, 1, { /* Send off a T_Unitdata_Req containing an alert as specified */ send_alert(event->u.SEC_Terminate_Req.alert_level, event->u.SEC_Terminate_Req.alert_desc, wtls_machine); }, NULL_STATE)/* Exception Request */ROW(CREATED, SEC_Exception_Req, 1, { /* Send off a T_Unitdata_Req containing an exception as specified */ send_alert(event->u.SEC_Exception_Req.alert_level, event->u.SEC_Exception_Req.alert_desc, wtls_machine); }, CREATED)/* Exchange State *//* Unitdata arrival - identical ClientHello record */ROW(EXCHANGE, T_Unitdata_Ind, clienthellos_are_identical(event->u.T_Unitdata_Ind.pdu_list, wtls_machine->last_received_packet) == 1, { /* It appears as though someone has sent us an identical ClientHello to the last one */ /* Make ourselves a T_Unitdata_Req with the last_transmitted_packet */ /* And send it on it's merry */ }, EXCHANGE)/* Unitdata arrival - non-identical ClientHello record *///ROW(EXCHANGE,// T_Unitdata_Ind,// clienthellos_are_identical(event->u.T_Unitdata_Ind.pdu_list, wtls_machine->last_received_packet) != 1,// {/* So, this one's different. They must have changed their mind about something, so try a CREATING again *//* Do the necessary SEC_Create_Ind stuff */// },// CREATING)/* Unitdata arrival - good packet */ROW(EXCHANGE, T_Unitdata_Ind, 1, { RSAPublicKey *public_key = NULL; Octstr* key_block; Octstr* final_client_write_enc_key = NULL; Octstr* final_server_write_enc_key = NULL; Octstr* final_client_write_IV = NULL; Octstr* final_server_write_IV = NULL; Octstr* emptySecret = NULL; Octstr* checking_data = NULL; // packet_contains_changecipherspec (event->u.T_Unitdata_Ind.pdu_list) == 1 && // packet_contains_finished (event->u.T_Unitdata_Ind.pdu_list) == 1 && // packet_contains_optional_stuff (event->u.T_Unitdata_Ind.pdu_list) == 1, /* The Wap PDUs we have to dispatch */ wtls_PDU* changeCipherSpecPDU; wtls_PDU* finishedPDU; /* The PDUs we have to process */ wtls_Payload* tempPayload; wtls_PDU* clientKeyXchgPDU; wtls_PDU* changeCipherSpec_incoming_PDU; wtls_PDU* finished_incoming_PDU; /* For decrypting/encrypting data */ Octstr* concatenatedRandoms=0; Octstr* encryptedData=0; Octstr* decryptedData=0; Octstr* labelVerify=0; Octstr* labelMaster=0; /* Process the incoming event : ClientKeyExchange*/ tempPayload = (wtls_Payload*) list_search (event->u.T_Unitdata_Ind.pdu_list, (void*) client_key_exchange, match_handshake_type); /* Keep the data so we can send it back */ octstr_insert(wtls_machine->handshake_data, tempPayload->data, octstr_len(wtls_machine->handshake_data)); clientKeyXchgPDU = wtls_pdu_unpack(tempPayload,wtls_machine); wtls_pdu_dump(clientKeyXchgPDU,0); /* Decrypt the client key exchange PDU */ encryptedData = clientKeyXchgPDU->u.handshake.client_key_exchange->rsa_params->encrypted_secret; decryptedData = wtls_decrypt_rsa(encryptedData); public_key = wtls_get_rsapublickey(); pack_int16(decryptedData, octstr_len(decryptedData), octstr_len(public_key->rsa_exponent)); octstr_insert(decryptedData, public_key->rsa_exponent, octstr_len(decryptedData)); pack_int16(decryptedData, octstr_len(decryptedData), octstr_len(public_key->rsa_modulus)); octstr_insert(decryptedData, public_key->rsa_modulus, octstr_len(decryptedData)); /* Concatenate our random data */ concatenatedRandoms = octstr_cat(wtls_machine->client_random, wtls_machine->server_random); /* Generate our master secret */ labelMaster = octstr_create("master secret"); wtls_machine->master_secret = wtls_calculate_prf(decryptedData, labelMaster, concatenatedRandoms,20, wtls_machine ); octstr_destroy(labelMaster); labelMaster = NULL; /* calculate the key blocks */ calculate_server_key_block(wtls_machine); calculate_client_key_block(wtls_machine); /* Process the incoming event : ChangeCipherSpec*/ tempPayload = (wtls_Payload*) list_search (event->u.T_Unitdata_Ind.pdu_list, (void*) ChangeCipher_PDU, match_pdu_type); changeCipherSpec_incoming_PDU = wtls_pdu_unpack(tempPayload, wtls_machine); if(changeCipherSpec_incoming_PDU->u.cc.change == 1) { debug("wtls", 0,"Need to decrypt the PDUs from now on..."); wtls_machine->encrypted = 1; wtls_decrypt_pdu_list(wtls_machine, event->u.T_Unitdata_Ind.pdu_list); } octstr_dump(wtls_machine->client_write_MAC_secret,0); wtls_pdu_dump(changeCipherSpec_incoming_PDU,0); /* Process the incoming event : Finished*/ tempPayload = (wtls_Payload*) list_search (event->u.T_Unitdata_Ind.pdu_list, (void*) finished, match_handshake_type); if(tempPayload == NULL) debug("wtls", 0, "null finished !!!"); finished_incoming_PDU = wtls_pdu_unpack(tempPayload,wtls_machine); debug("wtls", 0, "Client Finished PDU:"); wtls_pdu_dump(finished_incoming_PDU,0); /* Check the verify_data */ labelVerify = octstr_create("client finished"); checking_data = wtls_calculate_prf(wtls_machine->master_secret, labelVerify, (Octstr *)wtls_hash(wtls_machine->handshake_data, wtls_machine), 12, wtls_machine); octstr_destroy(labelVerify); labelVerify = NULL; if(octstr_compare(finished_incoming_PDU->u.handshake.finished->verify_data, checking_data)==0) { debug("wtls", 0, "DATA VERIFICATION OK"); } /* Keep the data so we can send it back in the next message */ /*octstr_insert(wtls_machine->handshake_data, tempPayload->data, octstr_len(wtls_machine->handshake_data)); */ // temporary fix octstr_truncate(tempPayload->data, 15); octstr_insert(wtls_machine->handshake_data, tempPayload->data, octstr_len(wtls_machine->handshake_data)); /* Create a new PDU List containing a ChangeCipherSpec and a Finished */ changeCipherSpecPDU = wtls_pdu_create(ChangeCipher_PDU); changeCipherSpecPDU->u.cc.change = 1; /* Generate our verify data */ finishedPDU = wtls_pdu_create(Handshake_PDU); finishedPDU->u.handshake.msg_type = finished; finishedPDU->cipher = 1; finishedPDU->u.handshake.finished = gw_malloc(sizeof(Finished)); labelVerify = octstr_create("server finished");
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -