mirror of
https://github.com/refraction-networking/uquic.git
synced 2025-04-05 13:17:36 +03:00
Merge pull request #3174 from lucas-clemente/use-tls-cipher-suite-name
use tls.CipherSuiteName, instead of wrapping it in the qtls package
This commit is contained in:
commit
540c6ec074
5 changed files with 9 additions and 20 deletions
|
@ -5,10 +5,10 @@ import (
|
||||||
"crypto/aes"
|
"crypto/aes"
|
||||||
"crypto/cipher"
|
"crypto/cipher"
|
||||||
"crypto/rand"
|
"crypto/rand"
|
||||||
|
"crypto/tls"
|
||||||
"fmt"
|
"fmt"
|
||||||
|
|
||||||
"github.com/lucas-clemente/quic-go/internal/protocol"
|
"github.com/lucas-clemente/quic-go/internal/protocol"
|
||||||
"github.com/lucas-clemente/quic-go/internal/qtls"
|
|
||||||
|
|
||||||
. "github.com/onsi/ginkgo"
|
. "github.com/onsi/ginkgo"
|
||||||
. "github.com/onsi/gomega"
|
. "github.com/onsi/gomega"
|
||||||
|
@ -18,7 +18,7 @@ var _ = Describe("Long Header AEAD", func() {
|
||||||
for i := range cipherSuites {
|
for i := range cipherSuites {
|
||||||
cs := cipherSuites[i]
|
cs := cipherSuites[i]
|
||||||
|
|
||||||
Context(fmt.Sprintf("using %s", qtls.CipherSuiteName(cs.ID)), func() {
|
Context(fmt.Sprintf("using %s", tls.CipherSuiteName(cs.ID)), func() {
|
||||||
getSealerAndOpener := func() (LongHeaderSealer, LongHeaderOpener) {
|
getSealerAndOpener := func() (LongHeaderSealer, LongHeaderOpener) {
|
||||||
key := make([]byte, 16)
|
key := make([]byte, 16)
|
||||||
hpKey := make([]byte, 16)
|
hpKey := make([]byte, 16)
|
||||||
|
|
|
@ -558,7 +558,7 @@ func (h *cryptoSetup) SetReadKey(encLevel qtls.EncryptionLevel, suite *qtls.Ciph
|
||||||
newHeaderProtector(suite, trafficSecret, true),
|
newHeaderProtector(suite, trafficSecret, true),
|
||||||
)
|
)
|
||||||
h.mutex.Unlock()
|
h.mutex.Unlock()
|
||||||
h.logger.Debugf("Installed 0-RTT Read keys (using %s)", qtls.CipherSuiteName(suite.ID))
|
h.logger.Debugf("Installed 0-RTT Read keys (using %s)", tls.CipherSuiteName(suite.ID))
|
||||||
if h.tracer != nil {
|
if h.tracer != nil {
|
||||||
h.tracer.UpdatedKeyFromTLS(protocol.Encryption0RTT, h.perspective.Opposite())
|
h.tracer.UpdatedKeyFromTLS(protocol.Encryption0RTT, h.perspective.Opposite())
|
||||||
}
|
}
|
||||||
|
@ -571,12 +571,12 @@ func (h *cryptoSetup) SetReadKey(encLevel qtls.EncryptionLevel, suite *qtls.Ciph
|
||||||
h.dropInitialKeys,
|
h.dropInitialKeys,
|
||||||
h.perspective,
|
h.perspective,
|
||||||
)
|
)
|
||||||
h.logger.Debugf("Installed Handshake Read keys (using %s)", qtls.CipherSuiteName(suite.ID))
|
h.logger.Debugf("Installed Handshake Read keys (using %s)", tls.CipherSuiteName(suite.ID))
|
||||||
case qtls.EncryptionApplication:
|
case qtls.EncryptionApplication:
|
||||||
h.readEncLevel = protocol.Encryption1RTT
|
h.readEncLevel = protocol.Encryption1RTT
|
||||||
h.aead.SetReadKey(suite, trafficSecret)
|
h.aead.SetReadKey(suite, trafficSecret)
|
||||||
h.has1RTTOpener = true
|
h.has1RTTOpener = true
|
||||||
h.logger.Debugf("Installed 1-RTT Read keys (using %s)", qtls.CipherSuiteName(suite.ID))
|
h.logger.Debugf("Installed 1-RTT Read keys (using %s)", tls.CipherSuiteName(suite.ID))
|
||||||
default:
|
default:
|
||||||
panic("unexpected read encryption level")
|
panic("unexpected read encryption level")
|
||||||
}
|
}
|
||||||
|
@ -598,7 +598,7 @@ func (h *cryptoSetup) SetWriteKey(encLevel qtls.EncryptionLevel, suite *qtls.Cip
|
||||||
newHeaderProtector(suite, trafficSecret, true),
|
newHeaderProtector(suite, trafficSecret, true),
|
||||||
)
|
)
|
||||||
h.mutex.Unlock()
|
h.mutex.Unlock()
|
||||||
h.logger.Debugf("Installed 0-RTT Write keys (using %s)", qtls.CipherSuiteName(suite.ID))
|
h.logger.Debugf("Installed 0-RTT Write keys (using %s)", tls.CipherSuiteName(suite.ID))
|
||||||
if h.tracer != nil {
|
if h.tracer != nil {
|
||||||
h.tracer.UpdatedKeyFromTLS(protocol.Encryption0RTT, h.perspective)
|
h.tracer.UpdatedKeyFromTLS(protocol.Encryption0RTT, h.perspective)
|
||||||
}
|
}
|
||||||
|
@ -611,12 +611,12 @@ func (h *cryptoSetup) SetWriteKey(encLevel qtls.EncryptionLevel, suite *qtls.Cip
|
||||||
h.dropInitialKeys,
|
h.dropInitialKeys,
|
||||||
h.perspective,
|
h.perspective,
|
||||||
)
|
)
|
||||||
h.logger.Debugf("Installed Handshake Write keys (using %s)", qtls.CipherSuiteName(suite.ID))
|
h.logger.Debugf("Installed Handshake Write keys (using %s)", tls.CipherSuiteName(suite.ID))
|
||||||
case qtls.EncryptionApplication:
|
case qtls.EncryptionApplication:
|
||||||
h.writeEncLevel = protocol.Encryption1RTT
|
h.writeEncLevel = protocol.Encryption1RTT
|
||||||
h.aead.SetWriteKey(suite, trafficSecret)
|
h.aead.SetWriteKey(suite, trafficSecret)
|
||||||
h.has1RTTSealer = true
|
h.has1RTTSealer = true
|
||||||
h.logger.Debugf("Installed 1-RTT Write keys (using %s)", qtls.CipherSuiteName(suite.ID))
|
h.logger.Debugf("Installed 1-RTT Write keys (using %s)", tls.CipherSuiteName(suite.ID))
|
||||||
if h.zeroRTTSealer != nil {
|
if h.zeroRTTSealer != nil {
|
||||||
h.zeroRTTSealer = nil
|
h.zeroRTTSealer = nil
|
||||||
h.logger.Debugf("Dropping 0-RTT keys.")
|
h.logger.Debugf("Dropping 0-RTT keys.")
|
||||||
|
|
|
@ -11,7 +11,6 @@ import (
|
||||||
mocklogging "github.com/lucas-clemente/quic-go/internal/mocks/logging"
|
mocklogging "github.com/lucas-clemente/quic-go/internal/mocks/logging"
|
||||||
"github.com/lucas-clemente/quic-go/internal/protocol"
|
"github.com/lucas-clemente/quic-go/internal/protocol"
|
||||||
"github.com/lucas-clemente/quic-go/internal/qerr"
|
"github.com/lucas-clemente/quic-go/internal/qerr"
|
||||||
"github.com/lucas-clemente/quic-go/internal/qtls"
|
|
||||||
"github.com/lucas-clemente/quic-go/internal/utils"
|
"github.com/lucas-clemente/quic-go/internal/utils"
|
||||||
|
|
||||||
. "github.com/onsi/ginkgo"
|
. "github.com/onsi/ginkgo"
|
||||||
|
@ -39,7 +38,7 @@ var _ = Describe("Updatable AEAD", func() {
|
||||||
for i := range cipherSuites {
|
for i := range cipherSuites {
|
||||||
cs := cipherSuites[i]
|
cs := cipherSuites[i]
|
||||||
|
|
||||||
Context(fmt.Sprintf("using %s", qtls.CipherSuiteName(cs.ID)), func() {
|
Context(fmt.Sprintf("using %s", tls.CipherSuiteName(cs.ID)), func() {
|
||||||
var (
|
var (
|
||||||
client, server *updatableAEAD
|
client, server *updatableAEAD
|
||||||
serverTracer *mocklogging.MockConnectionTracer
|
serverTracer *mocklogging.MockConnectionTracer
|
||||||
|
|
|
@ -53,11 +53,6 @@ const (
|
||||||
EncryptionApplication = qtls.EncryptionApplication
|
EncryptionApplication = qtls.EncryptionApplication
|
||||||
)
|
)
|
||||||
|
|
||||||
// CipherSuiteName gets the name of a cipher suite.
|
|
||||||
func CipherSuiteName(id uint16) string {
|
|
||||||
return qtls.CipherSuiteName(id)
|
|
||||||
}
|
|
||||||
|
|
||||||
// HkdfExtract generates a pseudorandom key for use with Expand from an input secret and an optional independent salt.
|
// HkdfExtract generates a pseudorandom key for use with Expand from an input secret and an optional independent salt.
|
||||||
func HkdfExtract(hash crypto.Hash, newSecret, currentSecret []byte) []byte {
|
func HkdfExtract(hash crypto.Hash, newSecret, currentSecret []byte) []byte {
|
||||||
return qtls.HkdfExtract(hash, newSecret, currentSecret)
|
return qtls.HkdfExtract(hash, newSecret, currentSecret)
|
||||||
|
|
|
@ -53,11 +53,6 @@ const (
|
||||||
EncryptionApplication = qtls.EncryptionApplication
|
EncryptionApplication = qtls.EncryptionApplication
|
||||||
)
|
)
|
||||||
|
|
||||||
// CipherSuiteName gets the name of a cipher suite.
|
|
||||||
func CipherSuiteName(id uint16) string {
|
|
||||||
return qtls.CipherSuiteName(id)
|
|
||||||
}
|
|
||||||
|
|
||||||
// HkdfExtract generates a pseudorandom key for use with Expand from an input secret and an optional independent salt.
|
// HkdfExtract generates a pseudorandom key for use with Expand from an input secret and an optional independent salt.
|
||||||
func HkdfExtract(hash crypto.Hash, newSecret, currentSecret []byte) []byte {
|
func HkdfExtract(hash crypto.Hash, newSecret, currentSecret []byte) []byte {
|
||||||
return qtls.HkdfExtract(hash, newSecret, currentSecret)
|
return qtls.HkdfExtract(hash, newSecret, currentSecret)
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue