diff --git a/internal/handshake/aead_test.go b/internal/handshake/aead_test.go index 20110737..922f068d 100644 --- a/internal/handshake/aead_test.go +++ b/internal/handshake/aead_test.go @@ -5,10 +5,10 @@ import ( "crypto/aes" "crypto/cipher" "crypto/rand" + "crypto/tls" "fmt" "github.com/lucas-clemente/quic-go/internal/protocol" - "github.com/lucas-clemente/quic-go/internal/qtls" . "github.com/onsi/ginkgo" . "github.com/onsi/gomega" @@ -18,7 +18,7 @@ var _ = Describe("Long Header AEAD", func() { for i := range cipherSuites { cs := cipherSuites[i] - Context(fmt.Sprintf("using %s", qtls.CipherSuiteName(cs.ID)), func() { + Context(fmt.Sprintf("using %s", tls.CipherSuiteName(cs.ID)), func() { getSealerAndOpener := func() (LongHeaderSealer, LongHeaderOpener) { key := make([]byte, 16) hpKey := make([]byte, 16) diff --git a/internal/handshake/crypto_setup.go b/internal/handshake/crypto_setup.go index 319d3318..7543be99 100644 --- a/internal/handshake/crypto_setup.go +++ b/internal/handshake/crypto_setup.go @@ -558,7 +558,7 @@ func (h *cryptoSetup) SetReadKey(encLevel qtls.EncryptionLevel, suite *qtls.Ciph newHeaderProtector(suite, trafficSecret, true), ) h.mutex.Unlock() - h.logger.Debugf("Installed 0-RTT Read keys (using %s)", qtls.CipherSuiteName(suite.ID)) + h.logger.Debugf("Installed 0-RTT Read keys (using %s)", tls.CipherSuiteName(suite.ID)) if h.tracer != nil { h.tracer.UpdatedKeyFromTLS(protocol.Encryption0RTT, h.perspective.Opposite()) } @@ -571,12 +571,12 @@ func (h *cryptoSetup) SetReadKey(encLevel qtls.EncryptionLevel, suite *qtls.Ciph h.dropInitialKeys, h.perspective, ) - h.logger.Debugf("Installed Handshake Read keys (using %s)", qtls.CipherSuiteName(suite.ID)) + h.logger.Debugf("Installed Handshake Read keys (using %s)", tls.CipherSuiteName(suite.ID)) case qtls.EncryptionApplication: h.readEncLevel = protocol.Encryption1RTT h.aead.SetReadKey(suite, trafficSecret) h.has1RTTOpener = true - h.logger.Debugf("Installed 1-RTT Read keys (using %s)", qtls.CipherSuiteName(suite.ID)) + h.logger.Debugf("Installed 1-RTT Read keys (using %s)", tls.CipherSuiteName(suite.ID)) default: panic("unexpected read encryption level") } @@ -598,7 +598,7 @@ func (h *cryptoSetup) SetWriteKey(encLevel qtls.EncryptionLevel, suite *qtls.Cip newHeaderProtector(suite, trafficSecret, true), ) h.mutex.Unlock() - h.logger.Debugf("Installed 0-RTT Write keys (using %s)", qtls.CipherSuiteName(suite.ID)) + h.logger.Debugf("Installed 0-RTT Write keys (using %s)", tls.CipherSuiteName(suite.ID)) if h.tracer != nil { h.tracer.UpdatedKeyFromTLS(protocol.Encryption0RTT, h.perspective) } @@ -611,12 +611,12 @@ func (h *cryptoSetup) SetWriteKey(encLevel qtls.EncryptionLevel, suite *qtls.Cip h.dropInitialKeys, h.perspective, ) - h.logger.Debugf("Installed Handshake Write keys (using %s)", qtls.CipherSuiteName(suite.ID)) + h.logger.Debugf("Installed Handshake Write keys (using %s)", tls.CipherSuiteName(suite.ID)) case qtls.EncryptionApplication: h.writeEncLevel = protocol.Encryption1RTT h.aead.SetWriteKey(suite, trafficSecret) h.has1RTTSealer = true - h.logger.Debugf("Installed 1-RTT Write keys (using %s)", qtls.CipherSuiteName(suite.ID)) + h.logger.Debugf("Installed 1-RTT Write keys (using %s)", tls.CipherSuiteName(suite.ID)) if h.zeroRTTSealer != nil { h.zeroRTTSealer = nil h.logger.Debugf("Dropping 0-RTT keys.") diff --git a/internal/handshake/updatable_aead_test.go b/internal/handshake/updatable_aead_test.go index df49a0dc..3e6b8ad2 100644 --- a/internal/handshake/updatable_aead_test.go +++ b/internal/handshake/updatable_aead_test.go @@ -11,7 +11,6 @@ import ( mocklogging "github.com/lucas-clemente/quic-go/internal/mocks/logging" "github.com/lucas-clemente/quic-go/internal/protocol" "github.com/lucas-clemente/quic-go/internal/qerr" - "github.com/lucas-clemente/quic-go/internal/qtls" "github.com/lucas-clemente/quic-go/internal/utils" . "github.com/onsi/ginkgo" @@ -39,7 +38,7 @@ var _ = Describe("Updatable AEAD", func() { for i := range cipherSuites { cs := cipherSuites[i] - Context(fmt.Sprintf("using %s", qtls.CipherSuiteName(cs.ID)), func() { + Context(fmt.Sprintf("using %s", tls.CipherSuiteName(cs.ID)), func() { var ( client, server *updatableAEAD serverTracer *mocklogging.MockConnectionTracer diff --git a/internal/qtls/go115.go b/internal/qtls/go115.go index bd11d017..9a441f76 100644 --- a/internal/qtls/go115.go +++ b/internal/qtls/go115.go @@ -10,7 +10,7 @@ import ( "net" "unsafe" - qtls "github.com/marten-seemann/qtls-go1-15" + "github.com/marten-seemann/qtls-go1-15" ) type ( @@ -53,11 +53,6 @@ const ( EncryptionApplication = qtls.EncryptionApplication ) -// CipherSuiteName gets the name of a cipher suite. -func CipherSuiteName(id uint16) string { - return qtls.CipherSuiteName(id) -} - // HkdfExtract generates a pseudorandom key for use with Expand from an input secret and an optional independent salt. func HkdfExtract(hash crypto.Hash, newSecret, currentSecret []byte) []byte { return qtls.HkdfExtract(hash, newSecret, currentSecret) diff --git a/internal/qtls/go116.go b/internal/qtls/go116.go index 5e64a6fb..ca84570c 100644 --- a/internal/qtls/go116.go +++ b/internal/qtls/go116.go @@ -52,11 +52,6 @@ const ( EncryptionApplication = qtls.EncryptionApplication ) -// CipherSuiteName gets the name of a cipher suite. -func CipherSuiteName(id uint16) string { - return qtls.CipherSuiteName(id) -} - // HkdfExtract generates a pseudorandom key for use with Expand from an input secret and an optional independent salt. func HkdfExtract(hash crypto.Hash, newSecret, currentSecret []byte) []byte { return qtls.HkdfExtract(hash, newSecret, currentSecret)