mirror of
https://github.com/refraction-networking/uquic.git
synced 2025-04-04 12:47:36 +03:00
add support for the key_updated event for TLS key updates
This commit is contained in:
parent
d53c75f05f
commit
273a320f98
8 changed files with 168 additions and 1 deletions
|
@ -14,6 +14,7 @@ import (
|
||||||
"github.com/lucas-clemente/quic-go/internal/protocol"
|
"github.com/lucas-clemente/quic-go/internal/protocol"
|
||||||
"github.com/lucas-clemente/quic-go/internal/qerr"
|
"github.com/lucas-clemente/quic-go/internal/qerr"
|
||||||
"github.com/lucas-clemente/quic-go/internal/utils"
|
"github.com/lucas-clemente/quic-go/internal/utils"
|
||||||
|
"github.com/lucas-clemente/quic-go/qlog"
|
||||||
"github.com/marten-seemann/qtls"
|
"github.com/marten-seemann/qtls"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -90,7 +91,8 @@ type cryptoSetup struct {
|
||||||
|
|
||||||
rttStats *congestion.RTTStats
|
rttStats *congestion.RTTStats
|
||||||
|
|
||||||
logger utils.Logger
|
qlogger qlog.Tracer
|
||||||
|
logger utils.Logger
|
||||||
|
|
||||||
perspective protocol.Perspective
|
perspective protocol.Perspective
|
||||||
|
|
||||||
|
@ -132,6 +134,7 @@ func NewCryptoSetupClient(
|
||||||
tlsConf *tls.Config,
|
tlsConf *tls.Config,
|
||||||
enable0RTT bool,
|
enable0RTT bool,
|
||||||
rttStats *congestion.RTTStats,
|
rttStats *congestion.RTTStats,
|
||||||
|
qlogger qlog.Tracer,
|
||||||
logger utils.Logger,
|
logger utils.Logger,
|
||||||
) (CryptoSetup, <-chan *TransportParameters /* ClientHello written. Receive nil for non-0-RTT */) {
|
) (CryptoSetup, <-chan *TransportParameters /* ClientHello written. Receive nil for non-0-RTT */) {
|
||||||
cs, clientHelloWritten := newCryptoSetup(
|
cs, clientHelloWritten := newCryptoSetup(
|
||||||
|
@ -143,6 +146,7 @@ func NewCryptoSetupClient(
|
||||||
tlsConf,
|
tlsConf,
|
||||||
enable0RTT,
|
enable0RTT,
|
||||||
rttStats,
|
rttStats,
|
||||||
|
qlogger,
|
||||||
logger,
|
logger,
|
||||||
protocol.PerspectiveClient,
|
protocol.PerspectiveClient,
|
||||||
)
|
)
|
||||||
|
@ -162,6 +166,7 @@ func NewCryptoSetupServer(
|
||||||
tlsConf *tls.Config,
|
tlsConf *tls.Config,
|
||||||
enable0RTT bool,
|
enable0RTT bool,
|
||||||
rttStats *congestion.RTTStats,
|
rttStats *congestion.RTTStats,
|
||||||
|
qlogger qlog.Tracer,
|
||||||
logger utils.Logger,
|
logger utils.Logger,
|
||||||
) CryptoSetup {
|
) CryptoSetup {
|
||||||
cs, _ := newCryptoSetup(
|
cs, _ := newCryptoSetup(
|
||||||
|
@ -173,6 +178,7 @@ func NewCryptoSetupServer(
|
||||||
tlsConf,
|
tlsConf,
|
||||||
enable0RTT,
|
enable0RTT,
|
||||||
rttStats,
|
rttStats,
|
||||||
|
qlogger,
|
||||||
logger,
|
logger,
|
||||||
protocol.PerspectiveServer,
|
protocol.PerspectiveServer,
|
||||||
)
|
)
|
||||||
|
@ -189,10 +195,16 @@ func newCryptoSetup(
|
||||||
tlsConf *tls.Config,
|
tlsConf *tls.Config,
|
||||||
enable0RTT bool,
|
enable0RTT bool,
|
||||||
rttStats *congestion.RTTStats,
|
rttStats *congestion.RTTStats,
|
||||||
|
qlogger qlog.Tracer,
|
||||||
logger utils.Logger,
|
logger utils.Logger,
|
||||||
perspective protocol.Perspective,
|
perspective protocol.Perspective,
|
||||||
) (*cryptoSetup, <-chan *TransportParameters /* ClientHello written. Receive nil for non-0-RTT */) {
|
) (*cryptoSetup, <-chan *TransportParameters /* ClientHello written. Receive nil for non-0-RTT */) {
|
||||||
initialSealer, initialOpener := NewInitialAEAD(connID, perspective)
|
initialSealer, initialOpener := NewInitialAEAD(connID, perspective)
|
||||||
|
if qlogger != nil {
|
||||||
|
now := time.Now()
|
||||||
|
qlogger.UpdatedKeyFromTLS(now, protocol.EncryptionInitial, protocol.PerspectiveClient)
|
||||||
|
qlogger.UpdatedKeyFromTLS(now, protocol.EncryptionInitial, protocol.PerspectiveServer)
|
||||||
|
}
|
||||||
extHandler := newExtensionHandler(tp.Marshal(), perspective)
|
extHandler := newExtensionHandler(tp.Marshal(), perspective)
|
||||||
cs := &cryptoSetup{
|
cs := &cryptoSetup{
|
||||||
initialStream: initialStream,
|
initialStream: initialStream,
|
||||||
|
@ -206,6 +218,7 @@ func newCryptoSetup(
|
||||||
ourParams: tp,
|
ourParams: tp,
|
||||||
paramsChan: extHandler.TransportParameters(),
|
paramsChan: extHandler.TransportParameters(),
|
||||||
rttStats: rttStats,
|
rttStats: rttStats,
|
||||||
|
qlogger: qlogger,
|
||||||
logger: logger,
|
logger: logger,
|
||||||
perspective: perspective,
|
perspective: perspective,
|
||||||
handshakeDone: make(chan struct{}),
|
handshakeDone: make(chan struct{}),
|
||||||
|
@ -226,6 +239,11 @@ func (h *cryptoSetup) ChangeConnectionID(id protocol.ConnectionID) {
|
||||||
initialSealer, initialOpener := NewInitialAEAD(id, h.perspective)
|
initialSealer, initialOpener := NewInitialAEAD(id, h.perspective)
|
||||||
h.initialSealer = initialSealer
|
h.initialSealer = initialSealer
|
||||||
h.initialOpener = initialOpener
|
h.initialOpener = initialOpener
|
||||||
|
if h.qlogger != nil {
|
||||||
|
now := time.Now()
|
||||||
|
h.qlogger.UpdatedKeyFromTLS(now, protocol.EncryptionInitial, protocol.PerspectiveClient)
|
||||||
|
h.qlogger.UpdatedKeyFromTLS(now, protocol.EncryptionInitial, protocol.PerspectiveServer)
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (h *cryptoSetup) SetLargest1RTTAcked(pn protocol.PacketNumber) {
|
func (h *cryptoSetup) SetLargest1RTTAcked(pn protocol.PacketNumber) {
|
||||||
|
@ -563,6 +581,9 @@ func (h *cryptoSetup) SetReadKey(encLevel qtls.EncryptionLevel, suite *qtls.Ciph
|
||||||
)
|
)
|
||||||
h.mutex.Unlock()
|
h.mutex.Unlock()
|
||||||
h.logger.Debugf("Installed 0-RTT Read keys (using %s)", qtls.CipherSuiteName(suite.ID))
|
h.logger.Debugf("Installed 0-RTT Read keys (using %s)", qtls.CipherSuiteName(suite.ID))
|
||||||
|
if h.qlogger != nil {
|
||||||
|
h.qlogger.UpdatedKeyFromTLS(time.Now(), protocol.Encryption0RTT, h.perspective.Opposite())
|
||||||
|
}
|
||||||
return
|
return
|
||||||
case qtls.EncryptionHandshake:
|
case qtls.EncryptionHandshake:
|
||||||
h.readEncLevel = protocol.EncryptionHandshake
|
h.readEncLevel = protocol.EncryptionHandshake
|
||||||
|
@ -582,6 +603,9 @@ func (h *cryptoSetup) SetReadKey(encLevel qtls.EncryptionLevel, suite *qtls.Ciph
|
||||||
panic("unexpected read encryption level")
|
panic("unexpected read encryption level")
|
||||||
}
|
}
|
||||||
h.mutex.Unlock()
|
h.mutex.Unlock()
|
||||||
|
if h.qlogger != nil {
|
||||||
|
h.qlogger.UpdatedKeyFromTLS(time.Now(), h.readEncLevel, h.perspective.Opposite())
|
||||||
|
}
|
||||||
h.receivedReadKey <- struct{}{}
|
h.receivedReadKey <- struct{}{}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -598,6 +622,9 @@ func (h *cryptoSetup) SetWriteKey(encLevel qtls.EncryptionLevel, suite *qtls.Cip
|
||||||
)
|
)
|
||||||
h.mutex.Unlock()
|
h.mutex.Unlock()
|
||||||
h.logger.Debugf("Installed 0-RTT Write keys (using %s)", qtls.CipherSuiteName(suite.ID))
|
h.logger.Debugf("Installed 0-RTT Write keys (using %s)", qtls.CipherSuiteName(suite.ID))
|
||||||
|
if h.qlogger != nil {
|
||||||
|
h.qlogger.UpdatedKeyFromTLS(time.Now(), protocol.Encryption0RTT, h.perspective)
|
||||||
|
}
|
||||||
return
|
return
|
||||||
case qtls.EncryptionHandshake:
|
case qtls.EncryptionHandshake:
|
||||||
h.writeEncLevel = protocol.EncryptionHandshake
|
h.writeEncLevel = protocol.EncryptionHandshake
|
||||||
|
@ -621,6 +648,9 @@ func (h *cryptoSetup) SetWriteKey(encLevel qtls.EncryptionLevel, suite *qtls.Cip
|
||||||
panic("unexpected write encryption level")
|
panic("unexpected write encryption level")
|
||||||
}
|
}
|
||||||
h.mutex.Unlock()
|
h.mutex.Unlock()
|
||||||
|
if h.qlogger != nil {
|
||||||
|
h.qlogger.UpdatedKeyFromTLS(time.Now(), h.writeEncLevel, h.perspective)
|
||||||
|
}
|
||||||
h.receivedWriteKey <- struct{}{}
|
h.receivedWriteKey <- struct{}{}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -95,6 +95,7 @@ var _ = Describe("Crypto Setup TLS", func() {
|
||||||
tlsConf,
|
tlsConf,
|
||||||
false,
|
false,
|
||||||
&congestion.RTTStats{},
|
&congestion.RTTStats{},
|
||||||
|
nil,
|
||||||
utils.DefaultLogger.WithPrefix("server"),
|
utils.DefaultLogger.WithPrefix("server"),
|
||||||
)
|
)
|
||||||
qtlsConf := server.(*cryptoSetup).tlsConf
|
qtlsConf := server.(*cryptoSetup).tlsConf
|
||||||
|
@ -127,6 +128,7 @@ var _ = Describe("Crypto Setup TLS", func() {
|
||||||
testdata.GetTLSConfig(),
|
testdata.GetTLSConfig(),
|
||||||
false,
|
false,
|
||||||
&congestion.RTTStats{},
|
&congestion.RTTStats{},
|
||||||
|
nil,
|
||||||
utils.DefaultLogger.WithPrefix("server"),
|
utils.DefaultLogger.WithPrefix("server"),
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -165,6 +167,7 @@ var _ = Describe("Crypto Setup TLS", func() {
|
||||||
testdata.GetTLSConfig(),
|
testdata.GetTLSConfig(),
|
||||||
false,
|
false,
|
||||||
&congestion.RTTStats{},
|
&congestion.RTTStats{},
|
||||||
|
nil,
|
||||||
utils.DefaultLogger.WithPrefix("server"),
|
utils.DefaultLogger.WithPrefix("server"),
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -206,6 +209,7 @@ var _ = Describe("Crypto Setup TLS", func() {
|
||||||
serverConf,
|
serverConf,
|
||||||
false,
|
false,
|
||||||
&congestion.RTTStats{},
|
&congestion.RTTStats{},
|
||||||
|
nil,
|
||||||
utils.DefaultLogger.WithPrefix("server"),
|
utils.DefaultLogger.WithPrefix("server"),
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -240,6 +244,7 @@ var _ = Describe("Crypto Setup TLS", func() {
|
||||||
serverConf,
|
serverConf,
|
||||||
false,
|
false,
|
||||||
&congestion.RTTStats{},
|
&congestion.RTTStats{},
|
||||||
|
nil,
|
||||||
utils.DefaultLogger.WithPrefix("server"),
|
utils.DefaultLogger.WithPrefix("server"),
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -334,6 +339,7 @@ var _ = Describe("Crypto Setup TLS", func() {
|
||||||
clientConf,
|
clientConf,
|
||||||
enable0RTT,
|
enable0RTT,
|
||||||
&congestion.RTTStats{},
|
&congestion.RTTStats{},
|
||||||
|
nil,
|
||||||
utils.DefaultLogger.WithPrefix("client"),
|
utils.DefaultLogger.WithPrefix("client"),
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -356,6 +362,7 @@ var _ = Describe("Crypto Setup TLS", func() {
|
||||||
serverConf,
|
serverConf,
|
||||||
enable0RTT,
|
enable0RTT,
|
||||||
&congestion.RTTStats{},
|
&congestion.RTTStats{},
|
||||||
|
nil,
|
||||||
utils.DefaultLogger.WithPrefix("server"),
|
utils.DefaultLogger.WithPrefix("server"),
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -409,6 +416,7 @@ var _ = Describe("Crypto Setup TLS", func() {
|
||||||
&tls.Config{InsecureSkipVerify: true},
|
&tls.Config{InsecureSkipVerify: true},
|
||||||
false,
|
false,
|
||||||
&congestion.RTTStats{},
|
&congestion.RTTStats{},
|
||||||
|
nil,
|
||||||
utils.DefaultLogger.WithPrefix("client"),
|
utils.DefaultLogger.WithPrefix("client"),
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -450,6 +458,7 @@ var _ = Describe("Crypto Setup TLS", func() {
|
||||||
clientConf,
|
clientConf,
|
||||||
false,
|
false,
|
||||||
&congestion.RTTStats{},
|
&congestion.RTTStats{},
|
||||||
|
nil,
|
||||||
utils.DefaultLogger.WithPrefix("client"),
|
utils.DefaultLogger.WithPrefix("client"),
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -473,6 +482,7 @@ var _ = Describe("Crypto Setup TLS", func() {
|
||||||
serverConf,
|
serverConf,
|
||||||
false,
|
false,
|
||||||
&congestion.RTTStats{},
|
&congestion.RTTStats{},
|
||||||
|
nil,
|
||||||
utils.DefaultLogger.WithPrefix("server"),
|
utils.DefaultLogger.WithPrefix("server"),
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -505,6 +515,7 @@ var _ = Describe("Crypto Setup TLS", func() {
|
||||||
clientConf,
|
clientConf,
|
||||||
false,
|
false,
|
||||||
&congestion.RTTStats{},
|
&congestion.RTTStats{},
|
||||||
|
nil,
|
||||||
utils.DefaultLogger.WithPrefix("client"),
|
utils.DefaultLogger.WithPrefix("client"),
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -523,6 +534,7 @@ var _ = Describe("Crypto Setup TLS", func() {
|
||||||
serverConf,
|
serverConf,
|
||||||
false,
|
false,
|
||||||
&congestion.RTTStats{},
|
&congestion.RTTStats{},
|
||||||
|
nil,
|
||||||
utils.DefaultLogger.WithPrefix("server"),
|
utils.DefaultLogger.WithPrefix("server"),
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -562,6 +574,7 @@ var _ = Describe("Crypto Setup TLS", func() {
|
||||||
clientConf,
|
clientConf,
|
||||||
false,
|
false,
|
||||||
&congestion.RTTStats{},
|
&congestion.RTTStats{},
|
||||||
|
nil,
|
||||||
utils.DefaultLogger.WithPrefix("client"),
|
utils.DefaultLogger.WithPrefix("client"),
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -580,6 +593,7 @@ var _ = Describe("Crypto Setup TLS", func() {
|
||||||
serverConf,
|
serverConf,
|
||||||
false,
|
false,
|
||||||
&congestion.RTTStats{},
|
&congestion.RTTStats{},
|
||||||
|
nil,
|
||||||
utils.DefaultLogger.WithPrefix("server"),
|
utils.DefaultLogger.WithPrefix("server"),
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -691,6 +705,7 @@ var _ = Describe("Crypto Setup TLS", func() {
|
||||||
clientConf,
|
clientConf,
|
||||||
true,
|
true,
|
||||||
&congestion.RTTStats{},
|
&congestion.RTTStats{},
|
||||||
|
nil,
|
||||||
utils.DefaultLogger.WithPrefix("client"),
|
utils.DefaultLogger.WithPrefix("client"),
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -709,6 +724,7 @@ var _ = Describe("Crypto Setup TLS", func() {
|
||||||
serverConf,
|
serverConf,
|
||||||
true,
|
true,
|
||||||
&congestion.RTTStats{},
|
&congestion.RTTStats{},
|
||||||
|
nil,
|
||||||
utils.DefaultLogger.WithPrefix("server"),
|
utils.DefaultLogger.WithPrefix("server"),
|
||||||
)
|
)
|
||||||
|
|
||||||
|
|
|
@ -196,3 +196,20 @@ func (e eventPacketLost) MarshalJSONObject(enc *gojay.Encoder) {
|
||||||
enc.StringKey("packet_number", toString(int64(e.PacketNumber)))
|
enc.StringKey("packet_number", toString(int64(e.PacketNumber)))
|
||||||
enc.StringKey("trigger", e.Trigger.String())
|
enc.StringKey("trigger", e.Trigger.String())
|
||||||
}
|
}
|
||||||
|
|
||||||
|
type eventKeyUpdated struct {
|
||||||
|
Trigger string
|
||||||
|
KeyType keyType
|
||||||
|
Generation uint64
|
||||||
|
// we don't log the keys here, so we don't need `old` and `new`.
|
||||||
|
}
|
||||||
|
|
||||||
|
func (e eventKeyUpdated) Category() category { return categorySecurity }
|
||||||
|
func (e eventKeyUpdated) Name() string { return "key_updated" }
|
||||||
|
func (e eventKeyUpdated) IsNil() bool { return false }
|
||||||
|
|
||||||
|
func (e eventKeyUpdated) MarshalJSONObject(enc *gojay.Encoder) {
|
||||||
|
enc.StringKey("trigger", e.Trigger)
|
||||||
|
enc.StringKey("key_type", e.KeyType.String())
|
||||||
|
enc.Uint64KeyOmitEmpty("generation", e.Generation)
|
||||||
|
}
|
||||||
|
|
11
qlog/qlog.go
11
qlog/qlog.go
|
@ -21,6 +21,7 @@ type Tracer interface {
|
||||||
ReceivedPacket(t time.Time, hdr *wire.ExtendedHeader, packetSize protocol.ByteCount, frames []wire.Frame)
|
ReceivedPacket(t time.Time, hdr *wire.ExtendedHeader, packetSize protocol.ByteCount, frames []wire.Frame)
|
||||||
UpdatedMetrics(t time.Time, rttStats *congestion.RTTStats, cwnd protocol.ByteCount, bytesInFLight protocol.ByteCount, packetsInFlight int)
|
UpdatedMetrics(t time.Time, rttStats *congestion.RTTStats, cwnd protocol.ByteCount, bytesInFLight protocol.ByteCount, packetsInFlight int)
|
||||||
LostPacket(time.Time, protocol.EncryptionLevel, protocol.PacketNumber, PacketLossReason)
|
LostPacket(time.Time, protocol.EncryptionLevel, protocol.PacketNumber, PacketLossReason)
|
||||||
|
UpdatedKeyFromTLS(time.Time, protocol.EncryptionLevel, protocol.Perspective)
|
||||||
}
|
}
|
||||||
|
|
||||||
type tracer struct {
|
type tracer struct {
|
||||||
|
@ -159,3 +160,13 @@ func (t *tracer) LostPacket(time time.Time, encLevel protocol.EncryptionLevel, p
|
||||||
},
|
},
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (t *tracer) UpdatedKeyFromTLS(time time.Time, encLevel protocol.EncryptionLevel, pers protocol.Perspective) {
|
||||||
|
t.events = append(t.events, event{
|
||||||
|
Time: time,
|
||||||
|
eventDetails: eventKeyUpdated{
|
||||||
|
Trigger: "tls",
|
||||||
|
KeyType: encLevelToKeyType(encLevel, pers),
|
||||||
|
},
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
|
@ -263,5 +263,19 @@ var _ = Describe("Tracer", func() {
|
||||||
Expect(ev).To(HaveKeyWithValue("packet_number", "42"))
|
Expect(ev).To(HaveKeyWithValue("packet_number", "42"))
|
||||||
Expect(ev).To(HaveKeyWithValue("trigger", "reordering_threshold"))
|
Expect(ev).To(HaveKeyWithValue("trigger", "reordering_threshold"))
|
||||||
})
|
})
|
||||||
|
|
||||||
|
It("records TLS key updates", func() {
|
||||||
|
now := time.Now()
|
||||||
|
tracer.UpdatedKeyFromTLS(now, protocol.EncryptionHandshake, protocol.PerspectiveClient)
|
||||||
|
t, category, eventName, ev := exportAndParse()
|
||||||
|
Expect(t).To(BeTemporally("~", now, time.Millisecond))
|
||||||
|
Expect(category).To(Equal("security"))
|
||||||
|
Expect(eventName).To(Equal("key_updated"))
|
||||||
|
Expect(ev).To(HaveKeyWithValue("key_type", "client_handshake_secret"))
|
||||||
|
Expect(ev).To(HaveKeyWithValue("trigger", "tls"))
|
||||||
|
Expect(ev).ToNot(HaveKey("generation"))
|
||||||
|
Expect(ev).ToNot(HaveKey("old"))
|
||||||
|
Expect(ev).ToNot(HaveKey("new"))
|
||||||
|
})
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
|
|
|
@ -110,3 +110,68 @@ func (r PacketLossReason) String() string {
|
||||||
panic("unknown loss reason")
|
panic("unknown loss reason")
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
type keyType uint8
|
||||||
|
|
||||||
|
const (
|
||||||
|
keyTypeServerInitial keyType = iota
|
||||||
|
keyTypeClientInitial
|
||||||
|
keyTypeServerHandshake
|
||||||
|
keyTypeClientHandshake
|
||||||
|
keyTypeServer0RTT
|
||||||
|
keyTypeClient0RTT
|
||||||
|
keyTypeServer1RTT
|
||||||
|
keyTypeClient1RTT
|
||||||
|
)
|
||||||
|
|
||||||
|
func encLevelToKeyType(encLevel protocol.EncryptionLevel, pers protocol.Perspective) keyType {
|
||||||
|
if pers == protocol.PerspectiveServer {
|
||||||
|
switch encLevel {
|
||||||
|
case protocol.EncryptionInitial:
|
||||||
|
return keyTypeServerInitial
|
||||||
|
case protocol.EncryptionHandshake:
|
||||||
|
return keyTypeServerHandshake
|
||||||
|
case protocol.Encryption0RTT:
|
||||||
|
return keyTypeServer0RTT
|
||||||
|
case protocol.Encryption1RTT:
|
||||||
|
return keyTypeServer1RTT
|
||||||
|
default:
|
||||||
|
panic("unknown encryption level")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
switch encLevel {
|
||||||
|
case protocol.EncryptionInitial:
|
||||||
|
return keyTypeClientInitial
|
||||||
|
case protocol.EncryptionHandshake:
|
||||||
|
return keyTypeClientHandshake
|
||||||
|
case protocol.Encryption0RTT:
|
||||||
|
return keyTypeClient0RTT
|
||||||
|
case protocol.Encryption1RTT:
|
||||||
|
return keyTypeClient1RTT
|
||||||
|
default:
|
||||||
|
panic("unknown encryption level")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (t keyType) String() string {
|
||||||
|
switch t {
|
||||||
|
case keyTypeServerInitial:
|
||||||
|
return "server_initial_secret"
|
||||||
|
case keyTypeClientInitial:
|
||||||
|
return "client_initial_secret"
|
||||||
|
case keyTypeServerHandshake:
|
||||||
|
return "server_handshake_secret"
|
||||||
|
case keyTypeClientHandshake:
|
||||||
|
return "client_handshake_secret"
|
||||||
|
case keyTypeServer0RTT:
|
||||||
|
return "server_0rtt_secret"
|
||||||
|
case keyTypeClient0RTT:
|
||||||
|
return "client_0rtt_secret"
|
||||||
|
case keyTypeServer1RTT:
|
||||||
|
return "server_1rtt_secret"
|
||||||
|
case keyTypeClient1RTT:
|
||||||
|
return "client_1rtt_secret"
|
||||||
|
default:
|
||||||
|
panic("unknown key type")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
|
@ -1,6 +1,7 @@
|
||||||
package qlog
|
package qlog
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"github.com/lucas-clemente/quic-go/internal/protocol"
|
||||||
. "github.com/onsi/ginkgo"
|
. "github.com/onsi/ginkgo"
|
||||||
. "github.com/onsi/gomega"
|
. "github.com/onsi/gomega"
|
||||||
)
|
)
|
||||||
|
@ -21,4 +22,15 @@ var _ = Describe("Types", func() {
|
||||||
Expect(packetTypeRetry.String()).To(Equal("retry"))
|
Expect(packetTypeRetry.String()).To(Equal("retry"))
|
||||||
Expect(packetTypeVersionNegotiation.String()).To(Equal("version_negotiation"))
|
Expect(packetTypeVersionNegotiation.String()).To(Equal("version_negotiation"))
|
||||||
})
|
})
|
||||||
|
|
||||||
|
It("has a string representation for the key type", func() {
|
||||||
|
Expect(encLevelToKeyType(protocol.EncryptionInitial, protocol.PerspectiveClient).String()).To(Equal("client_initial_secret"))
|
||||||
|
Expect(encLevelToKeyType(protocol.EncryptionInitial, protocol.PerspectiveServer).String()).To(Equal("server_initial_secret"))
|
||||||
|
Expect(encLevelToKeyType(protocol.EncryptionHandshake, protocol.PerspectiveClient).String()).To(Equal("client_handshake_secret"))
|
||||||
|
Expect(encLevelToKeyType(protocol.EncryptionHandshake, protocol.PerspectiveServer).String()).To(Equal("server_handshake_secret"))
|
||||||
|
Expect(encLevelToKeyType(protocol.Encryption0RTT, protocol.PerspectiveClient).String()).To(Equal("client_0rtt_secret"))
|
||||||
|
Expect(encLevelToKeyType(protocol.Encryption0RTT, protocol.PerspectiveServer).String()).To(Equal("server_0rtt_secret"))
|
||||||
|
Expect(encLevelToKeyType(protocol.Encryption1RTT, protocol.PerspectiveClient).String()).To(Equal("client_1rtt_secret"))
|
||||||
|
Expect(encLevelToKeyType(protocol.Encryption1RTT, protocol.PerspectiveServer).String()).To(Equal("server_1rtt_secret"))
|
||||||
|
})
|
||||||
})
|
})
|
||||||
|
|
|
@ -294,6 +294,7 @@ var newSession = func(
|
||||||
tlsConf,
|
tlsConf,
|
||||||
enable0RTT,
|
enable0RTT,
|
||||||
s.rttStats,
|
s.rttStats,
|
||||||
|
qlogger,
|
||||||
logger,
|
logger,
|
||||||
)
|
)
|
||||||
s.cryptoStreamHandler = cs
|
s.cryptoStreamHandler = cs
|
||||||
|
@ -402,6 +403,7 @@ var newClientSession = func(
|
||||||
tlsConf,
|
tlsConf,
|
||||||
enable0RTT,
|
enable0RTT,
|
||||||
s.rttStats,
|
s.rttStats,
|
||||||
|
qlogger,
|
||||||
logger,
|
logger,
|
||||||
)
|
)
|
||||||
s.clientHelloWritten = clientHelloWritten
|
s.clientHelloWritten = clientHelloWritten
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue