Introduce enoise_connection
This will put the control into a (gen_server) process that wraps the functionality in much the same way as ssl does for gen_tcp, etc. Some features are still missing (like setopts)
This commit is contained in:
parent
0d38f56d6a
commit
d81f1eb32e
165
src/enoise.erl
165
src/enoise.erl
@ -18,73 +18,144 @@
|
|||||||
%% , shutdown/2 ]).
|
%% , shutdown/2 ]).
|
||||||
-compile([export_all, nowarn_export_all]).
|
-compile([export_all, nowarn_export_all]).
|
||||||
|
|
||||||
-include("enoise.hrl").
|
-record(enoise, { pid }).
|
||||||
|
|
||||||
-record(enoise, { tcp_sock, rx, tx }).
|
-type noise_options() :: [{atom(), term()}].
|
||||||
|
-opaque noise_socket() :: #enoise{}.
|
||||||
|
|
||||||
%% -type noise_hs_pattern() :: noiseNN | noiseKN.
|
-export_type([noise_socket/0]).
|
||||||
%% -type noise_dh() :: dh448 | dh25519.
|
|
||||||
%% -type noise_cipher() :: 'AESGCM' | 'ChaChaPoly'.
|
|
||||||
%% -type noise_hash() :: sha256 | sha512 | blake2s | blake2b.
|
|
||||||
|
|
||||||
%% -type noise_protocol() :: #noise_protocol{}.
|
|
||||||
|
|
||||||
%%====================================================================
|
%%====================================================================
|
||||||
%% API functions
|
%% API functions
|
||||||
%%====================================================================
|
%%====================================================================
|
||||||
|
|
||||||
|
%% @doc Upgrades a gen_tcp, or equivalent, connected socket to a Noise socket,
|
||||||
|
%% that is, performs the client-side noise handshake.
|
||||||
|
%% @end
|
||||||
|
-spec connect(TcpSock :: gen_tcp:socket(),
|
||||||
|
Options :: noise_options()) ->
|
||||||
|
{ok, noise_socket()} | {error, term()}.
|
||||||
connect(TcpSock, Options) ->
|
connect(TcpSock, Options) ->
|
||||||
do_handshake(TcpSock, initiator, Options).
|
start_handshake(TcpSock, initiator, Options).
|
||||||
|
|
||||||
|
%% @doc Upgrades a gen_tcp, or equivalent, connected socket to a Noise socket,
|
||||||
|
%% that is, performs the server-side noise handshake.
|
||||||
|
%% @end
|
||||||
|
-spec accept(TcpSock :: gen_tcp:socket(),
|
||||||
|
Options :: noise_options()) ->
|
||||||
|
{ok, noise_socket()} | {error, term()}.
|
||||||
accept(TcpSock, Options) ->
|
accept(TcpSock, Options) ->
|
||||||
do_handshake(TcpSock, responder, Options).
|
start_handshake(TcpSock, responder, Options).
|
||||||
|
|
||||||
send(E = #enoise{ tcp_sock = TcpSock, tx = TX0 }, Msg0) ->
|
%% @doc Writes `Data` to `Socket`
|
||||||
{ok, TX1, Msg1} = enoise_cipher_state:encrypt_with_ad(TX0, <<>>, Msg0),
|
%% @end
|
||||||
gen_tcp:send(TcpSock, <<(byte_size(Msg1)):16, Msg1/binary>>),
|
-spec send(Socket :: noise_socket(), Data :: binary()) -> ok | {error, term()}.
|
||||||
E#enoise{ tx = TX1 }.
|
send(#enoise{ pid = Pid }, Data) ->
|
||||||
|
enoise_connection:send(Pid, Data).
|
||||||
|
|
||||||
recv(E = #enoise{ tcp_sock = TcpSock, rx = RX0 }) ->
|
%% @doc Receives a packet from a socket in passive mode. A closed socket is
|
||||||
receive {tcp, TcpSock, <<Size:16, Data/binary>>} ->
|
%% indicated by return value `{error, closed}`.
|
||||||
Size = byte_size(Data),
|
%%
|
||||||
{ok, RX1, Msg1} = enoise_cipher_state:decrypt_with_ad(RX0, <<>>, Data),
|
%% Argument `Length` denotes the number of bytes to read. If Length = 0, all
|
||||||
{E#enoise{ rx = RX1 }, Msg1}
|
%% available bytes are returned. If Length > 0, exactly Length bytes are
|
||||||
after 5000 -> error(timeout) end.
|
%% returned, or an error; possibly discarding less than Length bytes of data
|
||||||
|
%% when the socket gets closed from the other side.
|
||||||
|
%%
|
||||||
|
%% Optional argument `Timeout` specifies a time-out in milliseconds. The
|
||||||
|
%% default value is `infinity`.
|
||||||
|
%% @end
|
||||||
|
-spec recv(Socket :: noise_socket(), Length :: integer()) ->
|
||||||
|
{ok, binary()} | {error, term()}.
|
||||||
|
recv(Socket, Length) ->
|
||||||
|
recv(Socket, Length, infinity).
|
||||||
|
|
||||||
close(#enoise{ tcp_sock = TcpSock }) ->
|
-spec recv(Socket :: noise_socket(), Length :: integer(),
|
||||||
gen_tcp:close(TcpSock).
|
Timeout :: integer() | infinity) ->
|
||||||
|
{ok, binary()} | {error, term()}.
|
||||||
|
recv(#enoise{ pid = Pid }, Length, Timeout) ->
|
||||||
|
enoise_connection:recv(Pid, Length, Timeout).
|
||||||
|
|
||||||
|
%% @doc Closes a Noise connection.
|
||||||
|
%% @end
|
||||||
|
-spec close(NoiseSock :: noise_socket()) -> ok | {error, term()}.
|
||||||
|
close(#enoise{ pid = Pid }) ->
|
||||||
|
enoise_connection:close(Pid).
|
||||||
|
|
||||||
|
%% @doc Assigns a new controlling process to the Noise socket. A controlling
|
||||||
|
%% process is the owner of an Noise socket, and receives all messages from the
|
||||||
|
%% socket.
|
||||||
|
%% @end
|
||||||
|
-spec controlling_process(Socket :: noise_socket(), Pid :: pid()) ->
|
||||||
|
ok | {error, term()}.
|
||||||
|
controlling_process(#enoise{ pid = Pid }, NewPid) ->
|
||||||
|
enoise_connection:controlling_process(Pid, NewPid).
|
||||||
|
|
||||||
%%====================================================================
|
%%====================================================================
|
||||||
%% Internal functions
|
%% Internal functions
|
||||||
%%====================================================================
|
%%====================================================================
|
||||||
do_handshake(TcpSock, Role, Options) ->
|
start_handshake(TcpSock, Role, Options) ->
|
||||||
Prologue = proplists:get_value(prologue, Options, <<>>),
|
case check_tcp(TcpSock) of
|
||||||
NoiseProtocol = proplists:get_value(noise, Options),
|
{ok, WasActive} ->
|
||||||
|
inet:setopts(TcpSock, [{active, false}]), %% False for handshake
|
||||||
|
Prologue = proplists:get_value(prologue, Options, <<>>),
|
||||||
|
NoiseProtocol = proplists:get_value(noise, Options),
|
||||||
|
|
||||||
S = proplists:get_value(s, Options, undefined),
|
S = proplists:get_value(s, Options, undefined),
|
||||||
E = proplists:get_value(e, Options, undefined),
|
E = proplists:get_value(e, Options, undefined),
|
||||||
RS = proplists:get_value(rs, Options, undefined),
|
RS = proplists:get_value(rs, Options, undefined),
|
||||||
RE = proplists:get_value(re, Options, undefined),
|
RE = proplists:get_value(re, Options, undefined),
|
||||||
|
|
||||||
HSState = enoise_hs_state:init(NoiseProtocol, Role, Prologue, {S, E, RS, RE}),
|
HSState = enoise_hs_state:init(NoiseProtocol, Role,
|
||||||
do_handshake(TcpSock, HSState).
|
Prologue, {S, E, RS, RE}),
|
||||||
|
|
||||||
do_handshake(TcpSock, HState) ->
|
do_handshake(TcpSock, HSState, WasActive);
|
||||||
case enoise_hs_state:next_message(HState) of
|
Err = {error, _} ->
|
||||||
in ->
|
Err
|
||||||
receive {tcp, TcpSock, Data} ->
|
|
||||||
{ok, HState1, _Msg} = enoise_hs_state:read_message(HState, Data),
|
|
||||||
do_handshake(TcpSock, HState1)
|
|
||||||
after 1000 -> error(timeout) end;
|
|
||||||
out ->
|
|
||||||
{ok, HState1, Msg} = enoise_hs_state:write_message(HState, <<>>),
|
|
||||||
gen_tcp:send(TcpSock, add_len(Msg)),
|
|
||||||
do_handshake(TcpSock, HState1);
|
|
||||||
done ->
|
|
||||||
{ok, #{ rx := Rx, tx := Tx }} = enoise_hs_state:finalize(HState),
|
|
||||||
{ok, #enoise{ tcp_sock = TcpSock, rx = Rx, tx = Tx }}
|
|
||||||
end.
|
end.
|
||||||
|
|
||||||
add_len(Msg) ->
|
do_handshake(TcpSock, HState, WasActive) ->
|
||||||
|
case enoise_hs_state:next_message(HState) of
|
||||||
|
in ->
|
||||||
|
case hs_recv(TcpSock) of
|
||||||
|
{ok, Data} ->
|
||||||
|
{ok, HState1, _Msg} = enoise_hs_state:read_message(HState, Data),
|
||||||
|
do_handshake(TcpSock, HState1, WasActive);
|
||||||
|
Err = {error, _} ->
|
||||||
|
Err
|
||||||
|
end;
|
||||||
|
out ->
|
||||||
|
{ok, HState1, Msg} = enoise_hs_state:write_message(HState, <<>>),
|
||||||
|
hs_send(TcpSock, Msg),
|
||||||
|
do_handshake(TcpSock, HState1, WasActive);
|
||||||
|
done ->
|
||||||
|
{ok, #{ rx := Rx, tx := Tx }} = enoise_hs_state:finalize(HState),
|
||||||
|
{ok, Pid} = enoise_connection:start_link(TcpSock, Rx, Tx, self(), WasActive),
|
||||||
|
{ok, #enoise{ pid = Pid }}
|
||||||
|
end.
|
||||||
|
|
||||||
|
check_tcp(TcpSock) ->
|
||||||
|
{ok, TcpOpts} = inet:getopts(TcpSock, [mode, packet, active, header, packet_size]),
|
||||||
|
Packet = proplists:get_value(packet, TcpOpts, 0),
|
||||||
|
Header = proplists:get_value(header, TcpOpts, 0),
|
||||||
|
Active = proplists:get_value(active, TcpOpts, true),
|
||||||
|
PSize = proplists:get_value(packet_size, TcpOpts, undefined),
|
||||||
|
Mode = proplists:get_value(mode, TcpOpts, binary),
|
||||||
|
case (Packet == 0 orelse Packet == raw)
|
||||||
|
andalso Header == 0 andalso PSize == 0 andalso Mode == binary of
|
||||||
|
true ->
|
||||||
|
case gen_tcp:controlling_process(TcpSock, self()) of
|
||||||
|
ok -> {ok, Active};
|
||||||
|
Err = {error, _} -> Err
|
||||||
|
end;
|
||||||
|
false ->
|
||||||
|
{error, {invalid_tcp_options, proplists:delete(active, TcpOpts)}}
|
||||||
|
end.
|
||||||
|
|
||||||
|
hs_send(TcpSock, Msg) ->
|
||||||
Len = byte_size(Msg),
|
Len = byte_size(Msg),
|
||||||
<<Len:16, Msg/binary>>.
|
gen_tcp:send(TcpSock, <<Len:16, Msg/binary>>).
|
||||||
|
|
||||||
|
hs_recv(TcpSock) ->
|
||||||
|
{ok, <<Len:16>>} = gen_tcp:recv(TcpSock, 2, 1000),
|
||||||
|
gen_tcp:recv(TcpSock, Len, 1000).
|
||||||
|
|
||||||
|
129
src/enoise_connection.erl
Normal file
129
src/enoise_connection.erl
Normal file
@ -0,0 +1,129 @@
|
|||||||
|
%%%-------------------------------------------------------------------
|
||||||
|
%%% @copyright (C) 2018, Aeternity Anstalt
|
||||||
|
%%%-------------------------------------------------------------------
|
||||||
|
|
||||||
|
-module(enoise_connection).
|
||||||
|
|
||||||
|
-export([ close/1
|
||||||
|
, recv/3
|
||||||
|
, send/2
|
||||||
|
, start_link/5
|
||||||
|
]).
|
||||||
|
|
||||||
|
%% gen_server callbacks
|
||||||
|
-export([init/1, handle_call/3, handle_cast/2, handle_info/2,
|
||||||
|
terminate/2, code_change/3]).
|
||||||
|
|
||||||
|
-record(enoise, { pid }).
|
||||||
|
-record(state, {rx, tx, owner, tcp_sock, active, buf = <<>>, rawbuf = <<>>}).
|
||||||
|
|
||||||
|
%% -- API --------------------------------------------------------------------
|
||||||
|
start_link(TcpSock, Rx, Tx, Owner, Active) ->
|
||||||
|
inet:setopts(TcpSock, [{active, Active}]),
|
||||||
|
State = #state{ rx = Rx, tx = Tx, owner = Owner,
|
||||||
|
tcp_sock = TcpSock, active = Active },
|
||||||
|
case gen_server:start_link(?MODULE, [State], []) of
|
||||||
|
{ok, Pid} ->
|
||||||
|
ok = gen_tcp:controlling_process(TcpSock, Pid),
|
||||||
|
{ok, Pid};
|
||||||
|
Err = {error, _} ->
|
||||||
|
Err
|
||||||
|
end.
|
||||||
|
|
||||||
|
send(Noise, Data) ->
|
||||||
|
gen_server:call(Noise, {send, Data}).
|
||||||
|
|
||||||
|
recv(Noise, Length, Timeout) ->
|
||||||
|
gen_server:call(Noise, {recv, Length, Timeout}, Timeout + 100).
|
||||||
|
|
||||||
|
close(Noise) ->
|
||||||
|
gen_server:call(Noise, close).
|
||||||
|
|
||||||
|
%% -- gen_server callbacks ---------------------------------------------------
|
||||||
|
init([State]) ->
|
||||||
|
{ok, State}.
|
||||||
|
|
||||||
|
handle_call({send, Data}, _From, S) ->
|
||||||
|
{Res, S1} = handle_send(S, Data),
|
||||||
|
{reply, Res, S1};
|
||||||
|
handle_call({recv, _Length, _Timeout}, _From, S = #state{ active = true }) ->
|
||||||
|
{reply, {error, active_socket}, S};
|
||||||
|
handle_call({recv, Length, Timeout}, _From, S) ->
|
||||||
|
{Res, S1} = handle_recv(S, Length, Timeout),
|
||||||
|
{reply, Res, S1};
|
||||||
|
handle_call(close, _From, S) ->
|
||||||
|
{stop, normal, ok, S}.
|
||||||
|
|
||||||
|
handle_cast(_Msg, S) ->
|
||||||
|
{noreply, S}.
|
||||||
|
|
||||||
|
handle_info({tcp, TS, Data}, S = #state{ tcp_sock = TS }) ->
|
||||||
|
{S1, Msgs} = handle_data(S, Data),
|
||||||
|
S2 = handle_msgs(S1, Msgs),
|
||||||
|
{noreply, S2};
|
||||||
|
handle_info({tcp_closed, TS}, S = #state{ tcp_sock = TS, active = A, owner = O }) ->
|
||||||
|
[ O ! {tcp_closed, TS} || A ],
|
||||||
|
{stop, tcp_closed, S};
|
||||||
|
handle_info(Msg, S) ->
|
||||||
|
io:format("Unexpected info: ~p\n", [Msg]),
|
||||||
|
{noreply, S}.
|
||||||
|
|
||||||
|
terminate(Reason, #state{ tcp_sock = TcpSock }) ->
|
||||||
|
[ gen_tcp:close(TcpSock) || Reason /= tcp_closed ],
|
||||||
|
ok.
|
||||||
|
|
||||||
|
code_change(_OldVsn, State, _Extra) ->
|
||||||
|
{ok, State}.
|
||||||
|
|
||||||
|
|
||||||
|
%% -- Local functions --------------------------------------------------------
|
||||||
|
handle_data(S = #state{ rawbuf = Buf, rx = Rx }, Data) ->
|
||||||
|
case <<Buf/binary, Data/binary>> of
|
||||||
|
B = <<Len:16, Rest/binary>> when Len < byte_size(Rest) ->
|
||||||
|
{S#state{ rawbuf = B }, []}; %% Not a full message - save it
|
||||||
|
<<Len:16, Rest/binary>> ->
|
||||||
|
<<Msg:Len/binary, Rest2/binary>> = Rest,
|
||||||
|
case enoise_cipher_state:decrypt_with_ad(Rx, <<>>, Msg) of
|
||||||
|
{ok, Rx1, Msg1} ->
|
||||||
|
{S1, Msgs} = handle_data(S#state{ rawbuf = Rest2, rx = Rx1 }, <<>>),
|
||||||
|
{S1, [Msg1 | Msgs]};
|
||||||
|
{error, _} ->
|
||||||
|
error({enoise_error, decrypt_input_failed})
|
||||||
|
end;
|
||||||
|
EmptyOrSingleByte ->
|
||||||
|
{S#state{ rawbuf = EmptyOrSingleByte }, []}
|
||||||
|
end.
|
||||||
|
|
||||||
|
handle_msgs(S, []) ->
|
||||||
|
S;
|
||||||
|
handle_msgs(S = #state{ active = true, owner = Owner, buf = <<>> }, Msgs) ->
|
||||||
|
[ Owner ! {noise, #enoise{ pid = self() }, Msg} || Msg <- Msgs ],
|
||||||
|
S;
|
||||||
|
handle_msgs(S = #state{ active = true, owner = Owner, buf = Buf }, Msgs) ->
|
||||||
|
%% First send stuff in buffer (only when switching to active true)
|
||||||
|
Owner ! {noise, #enoise{ pid = self() }, Buf},
|
||||||
|
handle_msgs(S#state{ buf = <<>> }, Msgs);
|
||||||
|
handle_msgs(S = #state{ buf = Buf }, Msgs) ->
|
||||||
|
NewBuf = lists:foldl(fun(Msg, B) -> <<B/binary, Msg/binary>> end, Buf, Msgs),
|
||||||
|
S#state{ buf = NewBuf }.
|
||||||
|
|
||||||
|
handle_send(S = #state{ tcp_sock = TcpSock, tx = Tx }, Data) ->
|
||||||
|
{ok, Tx1, Msg} = enoise_cipher_state:encrypt_with_ad(Tx, <<>>, Data),
|
||||||
|
gen_tcp:send(TcpSock, <<(byte_size(Msg)):16, Msg/binary>>),
|
||||||
|
{ok, S#state{ tx = Tx1 }}.
|
||||||
|
|
||||||
|
handle_recv(S = #state{ buf = Buf, rx = Rx, tcp_sock = TcpSock }, Len, TO)
|
||||||
|
when byte_size(Buf) < Len ->
|
||||||
|
{ok, <<MsgLen:16>>} = gen_tcp:recv(TcpSock, 2, TO),
|
||||||
|
{ok, Data} = gen_tcp:recv(TcpSock, MsgLen, TO),
|
||||||
|
case enoise_cipher_state:decrypt_with_ad(Rx, <<>>, Data) of
|
||||||
|
{ok, Rx1, Msg1} ->
|
||||||
|
handle_recv(S#state{ buf = <<Buf/binary, Msg1/binary>>, rx = Rx1 }, Len, TO);
|
||||||
|
{error, _} ->
|
||||||
|
error({enoise_error, decrypt_input_failed})
|
||||||
|
end;
|
||||||
|
handle_recv(S = #state{ buf = Buf }, Len, _TO) ->
|
||||||
|
<<Data:Len/binary, NewBuf/binary>> = Buf,
|
||||||
|
{{ok, Data}, S#state{ buf = Buf }}.
|
||||||
|
|
||||||
|
|
@ -17,7 +17,7 @@
|
|||||||
, e :: enoise_crypto:key_pair() | undefined
|
, e :: enoise_crypto:key_pair() | undefined
|
||||||
, rs :: binary() | undefined
|
, rs :: binary() | undefined
|
||||||
, re :: binary() | undefined
|
, re :: binary() | undefined
|
||||||
, role = initiatior :: noise_role()
|
, role = initiator :: noise_role()
|
||||||
, dh = dh25519 :: noise_dh()
|
, dh = dh25519 :: noise_dh()
|
||||||
, msgs = [] :: [enoise_protocol:noise_msg()] }).
|
, msgs = [] :: [enoise_protocol:noise_msg()] }).
|
||||||
|
|
||||||
@ -61,8 +61,7 @@ write_message(HS = #noise_hs{ msgs = [{out, Msg} | Msgs] }, PayLoad) ->
|
|||||||
MsgBuf = <<MsgBuf1/binary, MsgBuf2/binary>>,
|
MsgBuf = <<MsgBuf1/binary, MsgBuf2/binary>>,
|
||||||
{ok, HS2, MsgBuf}.
|
{ok, HS2, MsgBuf}.
|
||||||
|
|
||||||
read_message(HS = #noise_hs{ msgs = [{in, Msg} | Msgs] }, <<Size:16, Message/binary>>) ->
|
read_message(HS = #noise_hs{ msgs = [{in, Msg} | Msgs] }, Message) ->
|
||||||
Size = byte_size(Message),
|
|
||||||
{HS1, RestBuf1} = read_message(HS#noise_hs{ msgs = Msgs }, Msg, Message),
|
{HS1, RestBuf1} = read_message(HS#noise_hs{ msgs = Msgs }, Msg, Message),
|
||||||
decrypt_and_hash(HS1, RestBuf1).
|
decrypt_and_hash(HS1, RestBuf1).
|
||||||
|
|
||||||
|
@ -12,7 +12,7 @@
|
|||||||
, pattern/1
|
, pattern/1
|
||||||
, pre_msgs/2
|
, pre_msgs/2
|
||||||
, to_name/1]).
|
, to_name/1]).
|
||||||
-compile(export_all).
|
|
||||||
-type noise_pattern() :: nn | xk.
|
-type noise_pattern() :: nn | xk.
|
||||||
-type noise_msg() :: {in | out, [enoise_hs_state:noise_token()]}.
|
-type noise_msg() :: {in | out, [enoise_hs_state:noise_token()]}.
|
||||||
|
|
||||||
|
@ -74,7 +74,7 @@ noise_test([M = #{ payload := PL0, ciphertext := CT0 } | Msgs], SendHS, RecvHS,
|
|||||||
{out, in} ->
|
{out, in} ->
|
||||||
{ok, SendHS1, Message} = enoise_hs_state:write_message(SendHS, PL),
|
{ok, SendHS1, Message} = enoise_hs_state:write_message(SendHS, PL),
|
||||||
?assertEqual(CT, Message),
|
?assertEqual(CT, Message),
|
||||||
{ok, RecvHS1, PL1} = enoise_hs_state:read_message(RecvHS, <<(byte_size(Message)):16, Message/binary>>),
|
{ok, RecvHS1, PL1} = enoise_hs_state:read_message(RecvHS, Message),
|
||||||
?assertEqual(PL, PL1),
|
?assertEqual(PL, PL1),
|
||||||
noise_test(Msgs, RecvHS1, SendHS1, HSHash);
|
noise_test(Msgs, RecvHS1, SendHS1, HSHash);
|
||||||
{done, done} ->
|
{done, done} ->
|
||||||
@ -104,7 +104,7 @@ client_test() ->
|
|||||||
ClientPubKey = <<115,39,86,77,44,85,192,176,202,11,4,6,194,144,127,123, 34,67,62,180,190,232,251,5,216,168,192,190,134,65,13,64>>,
|
ClientPubKey = <<115,39,86,77,44,85,192,176,202,11,4,6,194,144,127,123, 34,67,62,180,190,232,251,5,216,168,192,190,134,65,13,64>>,
|
||||||
ServerPubKey = <<112,91,141,253,183,66,217,102,211,40,13,249,238,51,77,114,163,159,32,1,162,219,76,106,89,164,34,71,149,2,103,59>>,
|
ServerPubKey = <<112,91,141,253,183,66,217,102,211,40,13,249,238,51,77,114,163,159,32,1,162,219,76,106,89,164,34,71,149,2,103,59>>,
|
||||||
|
|
||||||
{ok, TcpSock} = gen_tcp:connect("localhost", 7890, [{active, true}, binary, {reuseaddr, true}], 1000),
|
{ok, TcpSock} = gen_tcp:connect("localhost", 7890, [{active, false}, binary, {reuseaddr, true}], 1000),
|
||||||
gen_tcp:send(TcpSock, <<0,8,0,0,3>>), %% "Noise_XK_25519_ChaChaPoly_Blake2b"
|
gen_tcp:send(TcpSock, <<0,8,0,0,3>>), %% "Noise_XK_25519_ChaChaPoly_Blake2b"
|
||||||
|
|
||||||
Opts = [ {noise, TestProtocol}
|
Opts = [ {noise, TestProtocol}
|
||||||
@ -113,9 +113,12 @@ client_test() ->
|
|||||||
, {prologue, <<0,8,0,0,3>>}],
|
, {prologue, <<0,8,0,0,3>>}],
|
||||||
|
|
||||||
{ok, EConn} = enoise:connect(TcpSock, Opts),
|
{ok, EConn} = enoise:connect(TcpSock, Opts),
|
||||||
EConn1 = enoise:send(EConn, <<"ok\n">>),
|
ok = enoise:send(EConn, <<"ok\n">>),
|
||||||
{EConn2, <<"ok\n">>} = enoise:recv(EConn1),
|
%% receive
|
||||||
enoise:close(EConn2).
|
%% {noise, EConn, <<"ok\n">>} -> ok
|
||||||
|
%% after 1000 -> error(timeout) end,
|
||||||
|
{ok, <<"ok\n">>} = enoise:recv(EConn, 3, 1000),
|
||||||
|
enoise:close(EConn).
|
||||||
|
|
||||||
|
|
||||||
%% Expects a call-in from a local echo-client (noise-c)
|
%% Expects a call-in from a local echo-client (noise-c)
|
||||||
|
Loading…
x
Reference in New Issue
Block a user