diff options
author | Andreas Schultz <[email protected]> | 2016-01-07 15:29:22 +0100 |
---|---|---|
committer | Ingela Anderton Andin <[email protected]> | 2016-06-13 22:24:14 +0200 |
commit | 1e967711800a38575f78dd9f82373fa1b39c8f76 (patch) | |
tree | 32350cfdf6563d1a39c0bf5f54383e79baa47178 | |
parent | e919adc2411718514419ea91034a911a08d1605d (diff) | |
download | otp-1e967711800a38575f78dd9f82373fa1b39c8f76.tar.gz otp-1e967711800a38575f78dd9f82373fa1b39c8f76.tar.bz2 otp-1e967711800a38575f78dd9f82373fa1b39c8f76.zip |
dtls: add support first packet and HelloVerifyRequest
The actual user of this API is the UDP socket multiplexer which will
be added later.
Conflicts:
lib/ssl/src/dtls_connection.erl
-rw-r--r-- | lib/ssl/src/dtls_connection.erl | 57 |
1 files changed, 53 insertions, 4 deletions
diff --git a/lib/ssl/src/dtls_connection.erl b/lib/ssl/src/dtls_connection.erl index 8d7763c7cb..0864b2143a 100644 --- a/lib/ssl/src/dtls_connection.erl +++ b/lib/ssl/src/dtls_connection.erl @@ -52,12 +52,12 @@ ]). %% Data handling + -export([%%write_application_data/3, read_application_data/2, - passive_receive/2, - next_record_if_active/1 %%, - %%handle_common_event/4 - ]). + passive_receive/2, next_record_if_active/1, + %%handle_common_event/4, + handle_packet/3]). %% gen_statem state functions -export([init/3, error/3, downgrade/3, %% Initiation and take down states @@ -586,6 +586,55 @@ handle_own_alert(_,_,_, State) -> %% Place holder handle_normal_shutdown(_, _, _State) -> %% Place holder ok. + sequence(_) -> %%TODO real imp 1. + +handle_packet(Address, Port, Packet) -> + try dtls_record:get_dtls_records(Packet, <<>>) of + %% expect client hello + {[#ssl_tls{type = ?HANDSHAKE, version = {254, _}} = Record], <<>>} -> + handle_dtls_client_hello(Address, Port, Record); + _Other -> + {error, not_dtls} + catch + _Class:_Error -> + {error, not_dtls} + end. + +handle_dtls_client_hello(Address, Port, + #ssl_tls{epoch = Epoch, sequence_number = Seq, + version = Version} = Record) -> + {[{Hello, _}], _} = + dtls_handshake:get_dtls_handshake(Record, + dtls_handshake:dtls_handshake_new_flight(undefined)), + #client_hello{client_version = {Major, Minor}, + random = Random, + session_id = SessionId, + cipher_suites = CipherSuites, + compression_methods = CompressionMethods} = Hello, + CookieData = [address_to_bin(Address, Port), + <<?BYTE(Major), ?BYTE(Minor)>>, + Random, SessionId, CipherSuites, CompressionMethods], + Cookie = crypto:hmac(sha, <<"secret">>, CookieData), + + case Hello of + #client_hello{cookie = Cookie} -> + accept; + + _ -> + %% generate HelloVerifyRequest + {RequestFragment, _} = dtls_handshake:encode_handshake( + dtls_handshake:hello_verify_request(Cookie), + Version, 0), + HelloVerifyRequest = + dtls_record:encode_tls_cipher_text(?HANDSHAKE, Version, Epoch, Seq, RequestFragment), + {reply, HelloVerifyRequest} + end. + +address_to_bin({A,B,C,D}, Port) -> + <<0:80,16#ffff:16,A,B,C,D,Port:16>>; +address_to_bin({A,B,C,D,E,F,G,H}, Port) -> + <<A:16,B:16,C:16,D:16,E:16,F:16,G:16,H:16,Port:16>>. + |