⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 wtls_state-decl.h

📁 The Kannel Open Source WAP and SMS gateway works as both an SMS gateway, for implementing keyword b
💻 H
📖 第 1 页 / 共 3 页
字号:
/* ====================================================================  * The Kannel Software License, Version 1.0  *  * Copyright (c) 2001-2004 Kannel Group   * Copyright (c) 1998-2001 WapIT Ltd.    * All rights reserved.  *  * Redistribution and use in source and binary forms, with or without  * modification, are permitted provided that the following conditions  * are met:  *  * 1. Redistributions of source code must retain the above copyright  *    notice, this list of conditions and the following disclaimer.  *  * 2. Redistributions in binary form must reproduce the above copyright  *    notice, this list of conditions and the following disclaimer in  *    the documentation and/or other materials provided with the  *    distribution.  *  * 3. The end-user documentation included with the redistribution,  *    if any, must include the following acknowledgment:  *       "This product includes software developed by the  *        Kannel Group (http://www.kannel.org/)."  *    Alternately, this acknowledgment may appear in the software itself,  *    if and wherever such third-party acknowledgments normally appear.  *  * 4. The names "Kannel" and "Kannel Group" must not be used to  *    endorse or promote products derived from this software without  *    prior written permission. For written permission, please   *    contact org@kannel.org.  *  * 5. Products derived from this software may not be called "Kannel",  *    nor may "Kannel" appear in their name, without prior written  *    permission of the Kannel Group.  *  * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED  * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES  * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE  * DISCLAIMED.  IN NO EVENT SHALL THE KANNEL GROUP OR ITS CONTRIBUTORS  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,   * OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT   * OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR   * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,   * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE   * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,   * EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.  * ====================================================================  *  * This software consists of voluntary contributions made by many  * individuals on behalf of the Kannel Group.  For more information on   * the Kannel Group, please see <http://www.kannel.org/>.  *  * Portions of this software are based upon software originally written at   * WapIT Ltd., Helsinki, Finland for the Kannel project.   */ /* * Macro calls to generate rows of the state table. See the documentation for * guidance how to use and update these.  * * by Nick Clarey <nclarey@3glab.com> */STATE_NAME(NULL_STATE)STATE_NAME(CREATING)STATE_NAME(CREATED)STATE_NAME(EXCHANGE)STATE_NAME(COMMIT)STATE_NAME(OPENING)STATE_NAME(OPEN)/* If the packet is a ClientHello *//* We only include this case in state NULL; the others are handled by the   wtls_find_or_create function */ROW(NULL_STATE,    T_Unitdata_Ind,    1,    {        /* The Wap event we have to dispatch */        WAPEvent *res;        wtls_Payload* tempPayload;        wtls_PDU* clientHelloPDU;        CipherSuite* ciphersuite;        int randomCounter;                    tempPayload = (wtls_Payload*) list_search (event->u.T_Unitdata_Ind.pdu_list,                                                   (void*) client_hello,                                                   match_handshake_type);        clientHelloPDU = wtls_pdu_unpack(tempPayload,wtls_machine);                    /* Store the client's random value - use pack for simplicity */        wtls_machine->client_random = octstr_create("");        randomCounter = pack_int32(wtls_machine->client_random,0,                                   clientHelloPDU->u.handshake.client_hello->random->gmt_unix_time);        octstr_insert(wtls_machine->client_random,                      clientHelloPDU->u.handshake.client_hello->random->random_bytes,                      randomCounter);                    /* Generate a SEC_Create_Res event, and pass it back into the queue */        res = wap_event_create(SEC_Create_Res);        res->u.SEC_Create_Res.addr_tuple =                wap_addr_tuple_duplicate(event->u.T_Unitdata_Ind.addr_tuple);        /* Select the ciphersuite from the supplied list */        ciphersuite = wtls_choose_ciphersuite(clientHelloPDU->u.handshake.client_hello->ciphersuites);        /* Set the relevant values in the wtls_machine and PDU structure */        wtls_machine->bulk_cipher_algorithm = ciphersuite->bulk_cipher_algo;        wtls_machine->mac_algorithm = ciphersuite->mac_algo;        res->u.SEC_Create_Res.bulk_cipher_algo = ciphersuite->bulk_cipher_algo;        res->u.SEC_Create_Res.mac_algo = ciphersuite->mac_algo;        res->u.SEC_Create_Res.client_key_id =                wtls_choose_clientkeyid(clientHelloPDU->u.handshake.client_hello->client_key_ids);        /* Set the sequence number mode in both the machine and the outgoing packet */        res->u.SEC_Create_Res.snmode = wtls_choose_snmode(clientHelloPDU->u.handshake.client_hello->snmode);        wtls_machine->sequence_number_mode = res->u.SEC_Create_Res.snmode;        /* Set the key refresh mode in both the machine and the outgoing packet */        res->u.SEC_Create_Res.krefresh = wtls_choose_krefresh(clientHelloPDU->u.handshake.client_hello->krefresh);        wtls_machine->key_refresh = res->u.SEC_Create_Res.krefresh;                    /* Keep the data so we can send it back in EXCHANGE */        // temporary - needs to delete old one if exists !        //wtls_machine->handshake_data = octstr_create("");        octstr_append(wtls_machine->handshake_data, tempPayload->data);                    debug("wtls:handle_event", 0,"Dispatching SEC_Create_Res event");        wtls_dispatch_event(res);},    CREATING)/* Creating State *//* Termination */ROW(CREATING,    SEC_Terminate_Req,    1,    {/* Send off a T_Unitdata_Req containing an alert as specified */            send_alert(event->u.SEC_Terminate_Req.alert_level,                       event->u.SEC_Terminate_Req.alert_desc,                       wtls_machine);    },    NULL_STATE)/* Exception */ROW(CREATING,    SEC_Exception_Req,    1,    {            /* Send off a T_Unitdata_Req containing an exception as specified */            send_alert(event->u.SEC_Exception_Req.alert_level,                       event->u.SEC_Exception_Req.alert_desc, wtls_machine);    },    CREATING)/* Create Response - create a buffer with a "ServerHello" and possibly a Certificate or something else */ROW(CREATING,    SEC_Create_Res,    1,    {            WAPEvent *req;            wtls_PDU* serverHelloPDU;            Random* tempRandom;            int randomCounter = 0;                        /* Our serverHello */            serverHelloPDU = wtls_pdu_create(Handshake_PDU);            serverHelloPDU->u.handshake.msg_type = server_hello;            serverHelloPDU->u.handshake.server_hello = (ServerHello*) gw_malloc(sizeof(ServerHello));                        /* Set our server version */            serverHelloPDU->u.handshake.server_hello->serverversion = 1;                        /* Get a suitably random number - store it in both the machine structure and outgoing PDU */            tempRandom = wtls_get_random();            wtls_machine->server_random = octstr_create("");            randomCounter = pack_int32(wtls_machine->server_random,0,tempRandom->gmt_unix_time);            octstr_insert(wtls_machine->server_random,tempRandom->random_bytes,octstr_len(wtls_machine->server_random));                        serverHelloPDU->u.handshake.server_hello->random = tempRandom;                        /* At the moment, we don't support session caching, so tell them to forget about caching us */            serverHelloPDU->u.handshake.server_hello->session_id = octstr_create("");                        /* We need to select an appropriate mechanism here from the ones listed */            serverHelloPDU->u.handshake.server_hello->client_key_id = event->u.SEC_Create_Res.client_key_id;                        /* Get our ciphersuite details */            serverHelloPDU->u.handshake.server_hello->ciphersuite = (CipherSuite*) gw_malloc(sizeof(CipherSuite));            serverHelloPDU->u.handshake.server_hello->ciphersuite->bulk_cipher_algo = event->u.SEC_Create_Res.bulk_cipher_algo;            serverHelloPDU->u.handshake.server_hello->ciphersuite->mac_algo = event->u.SEC_Create_Res.mac_algo;                        serverHelloPDU->u.handshake.server_hello->comp_method = null_comp;                        /* We need to confirm the client's choice, or if they haven't specified one, select               one ourselves */            serverHelloPDU->u.handshake.server_hello->snmode = event->u.SEC_Create_Res.snmode;                        /* We need to either confirm the client's choice of key refresh rate, or choose a lower rate */            serverHelloPDU->u.handshake.server_hello->krefresh = event->u.SEC_Create_Res.krefresh;                        /* Add the PDUsto the server's outgoing list  */            add_pdu(wtls_machine, serverHelloPDU);                                    /* Generate and dispatch a SEC_Exchange_Req or maybe a SEC_Commit_Req */            req = wap_event_create(SEC_Exchange_Req);            req->u.SEC_Exchange_Req.addr_tuple =                    wap_addr_tuple_duplicate(event->u.T_Unitdata_Ind.addr_tuple);            wtls_dispatch_event(req);            debug("wtls: handle_event", 0,"Dispatching SEC_Exchange_Req event");                },    CREATED)/* Created State *//* Exchange Request - Full Handshake will be performed */ROW(CREATED,    SEC_Exchange_Req,    1,    {            wtls_PDU* serverKeyXchgPDU;            wtls_PDU* serverHelloDonePDU;                        /* Assert that the PDU list is valid */            gw_assert(wtls_machine->packet_to_send != NULL);                        /* We'll also need a Server Key Exchange message */            serverKeyXchgPDU = wtls_pdu_create(Handshake_PDU);            serverKeyXchgPDU->u.handshake.msg_type = server_key_exchange;            serverKeyXchgPDU->u.handshake.server_key_exchange = (ServerKeyExchange*) gw_malloc(sizeof(ServerKeyExchange));            serverKeyXchgPDU->u.handshake.server_key_exchange->param_spec = NULL;                        /* Allocate memory for the RSA component */            debug("wtls: ", 0,"Going to get the RSA public key...");            serverKeyXchgPDU->u.handshake.server_key_exchange->rsa_params = wtls_get_rsapublickey();            debug("wtls: ", 0,"...got it.");            add_pdu(wtls_machine, serverKeyXchgPDU);                        debug("wtls: ", 0,"in CREATED - just added pdu...");            /* Add some more PDUs to the List - potentially a ServerKeyExchange,               a CertificateRequest and a ServerHelloDone */            /* Just a ServerHelloDone for now */            serverHelloDonePDU = wtls_pdu_create(Handshake_PDU);            serverHelloDonePDU->u.handshake.msg_type = server_hello_done;            add_pdu(wtls_machine, serverHelloDonePDU);                        /* Translate the buffer and address details into a T_Unitdata_Req             * and send it winging it's way across the network */            send_queuedpdus(wtls_machine);    },    EXCHANGE)/* Commit Request - Abbreviated Handshake will be performed */ROW(CREATED,    SEC_Commit_Req,    1,{        /* Assert that the PDU list is valid */        /* Add some more PDUs to the List - a ChangeCipherSpec and a Finished */        /* Translate the buffer and address details into a T_Unitdata_Req */        /* And send it winging it's way across the network */},        COMMIT)/* Terminate Request */ROW(CREATED,    SEC_Terminate_Req,    1,    {            /* Send off a T_Unitdata_Req containing an alert as specified */            send_alert(event->u.SEC_Terminate_Req.alert_level,                       event->u.SEC_Terminate_Req.alert_desc, wtls_machine);    },

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -