package qtls import ( "bytes" "fmt" tls "github.com/refraction-networking/utls" "github.com/refraction-networking/uquic/internal/protocol" ) func SetupConfigForServer(qconf *tls.QUICConfig, _ bool, getData func() []byte, handleSessionTicket func([]byte, bool) bool) { conf := qconf.TLSConfig // Workaround for https://github.com/golang/go/issues/60506. // This initializes the session tickets _before_ cloning the config. _, _ = conf.DecryptTicket(nil, tls.ConnectionState{}) conf = conf.Clone() conf.MinVersion = tls.VersionTLS13 qconf.TLSConfig = conf // add callbacks to save transport parameters into the session ticket origWrapSession := conf.WrapSession conf.WrapSession = func(cs tls.ConnectionState, state *tls.SessionState) ([]byte, error) { // Add QUIC session ticket state.Extra = append(state.Extra, addExtraPrefix(getData())) if origWrapSession != nil { return origWrapSession(cs, state) } b, err := conf.EncryptTicket(cs, state) return b, err } origUnwrapSession := conf.UnwrapSession // UnwrapSession might be called multiple times, as the client can use multiple session tickets. // However, using 0-RTT is only possible with the first session ticket. // crypto/tls guarantees that this callback is called in the same order as the session ticket in the ClientHello. var unwrapCount int conf.UnwrapSession = func(identity []byte, connState tls.ConnectionState) (*tls.SessionState, error) { unwrapCount++ var state *tls.SessionState var err error if origUnwrapSession != nil { state, err = origUnwrapSession(identity, connState) } else { state, err = conf.DecryptTicket(identity, connState) } if err != nil || state == nil { return nil, err } extra := findExtraData(state.Extra) if extra != nil { state.EarlyData = handleSessionTicket(extra, state.EarlyData && unwrapCount == 1) } else { state.EarlyData = false } return state, nil } } func SetupConfigForClient( qconf *tls.QUICConfig, getData func(earlyData bool) []byte, setData func(data []byte, earlyData bool) (allowEarlyData bool), ) { conf := qconf.TLSConfig if conf.ClientSessionCache != nil { origCache := conf.ClientSessionCache conf.ClientSessionCache = &clientSessionCache{ wrapped: origCache, getData: getData, setData: setData, } } } func ToTLSEncryptionLevel(e protocol.EncryptionLevel) tls.QUICEncryptionLevel { switch e { case protocol.EncryptionInitial: return tls.QUICEncryptionLevelInitial case protocol.EncryptionHandshake: return tls.QUICEncryptionLevelHandshake case protocol.Encryption1RTT: return tls.QUICEncryptionLevelApplication case protocol.Encryption0RTT: return tls.QUICEncryptionLevelEarly default: panic(fmt.Sprintf("unexpected encryption level: %s", e)) } } func FromTLSEncryptionLevel(e tls.QUICEncryptionLevel) protocol.EncryptionLevel { switch e { case tls.QUICEncryptionLevelInitial: return protocol.EncryptionInitial case tls.QUICEncryptionLevelHandshake: return protocol.EncryptionHandshake case tls.QUICEncryptionLevelApplication: return protocol.Encryption1RTT case tls.QUICEncryptionLevelEarly: return protocol.Encryption0RTT default: panic(fmt.Sprintf("unexpect encryption level: %s", e)) } } const extraPrefix = "quic-go1" func addExtraPrefix(b []byte) []byte { return append([]byte(extraPrefix), b...) } func findExtraData(extras [][]byte) []byte { prefix := []byte(extraPrefix) for _, extra := range extras { if len(extra) < len(prefix) || !bytes.Equal(prefix, extra[:len(prefix)]) { continue } return extra[len(prefix):] } return nil }