mirror of
https://github.com/refraction-networking/uquic.git
synced 2025-04-05 13:17:36 +03:00
51 lines
1.8 KiB
Go
51 lines
1.8 KiB
Go
package handshake
|
|
|
|
import (
|
|
"crypto"
|
|
|
|
"github.com/lucas-clemente/quic-go/internal/protocol"
|
|
"github.com/marten-seemann/qtls"
|
|
)
|
|
|
|
var quicVersion1Salt = []byte{0xaf, 0xbf, 0xec, 0x28, 0x99, 0x93, 0xd2, 0x4c, 0x9e, 0x97, 0x86, 0xf1, 0x9c, 0x61, 0x11, 0xe0, 0x43, 0x90, 0xa8, 0x99}
|
|
|
|
var initialSuite = &qtls.CipherSuiteTLS13{
|
|
ID: qtls.TLS_AES_128_GCM_SHA256,
|
|
KeyLen: 16,
|
|
AEAD: qtls.AEADAESGCMTLS13,
|
|
Hash: crypto.SHA256,
|
|
}
|
|
|
|
// NewInitialAEAD creates a new AEAD for Initial encryption / decryption.
|
|
func NewInitialAEAD(connID protocol.ConnectionID, pers protocol.Perspective) (LongHeaderSealer, LongHeaderOpener) {
|
|
clientSecret, serverSecret := computeSecrets(connID)
|
|
var mySecret, otherSecret []byte
|
|
if pers == protocol.PerspectiveClient {
|
|
mySecret = clientSecret
|
|
otherSecret = serverSecret
|
|
} else {
|
|
mySecret = serverSecret
|
|
otherSecret = clientSecret
|
|
}
|
|
myKey, myIV := computeInitialKeyAndIV(mySecret)
|
|
otherKey, otherIV := computeInitialKeyAndIV(otherSecret)
|
|
|
|
encrypter := qtls.AEADAESGCMTLS13(myKey, myIV)
|
|
decrypter := qtls.AEADAESGCMTLS13(otherKey, otherIV)
|
|
|
|
return newLongHeaderSealer(encrypter, newHeaderProtector(initialSuite, mySecret, true)),
|
|
newLongHeaderOpener(decrypter, newAESHeaderProtector(initialSuite, otherSecret, true))
|
|
}
|
|
|
|
func computeSecrets(connID protocol.ConnectionID) (clientSecret, serverSecret []byte) {
|
|
initialSecret := qtls.HkdfExtract(crypto.SHA256, connID, quicVersion1Salt)
|
|
clientSecret = hkdfExpandLabel(crypto.SHA256, initialSecret, []byte{}, "client in", crypto.SHA256.Size())
|
|
serverSecret = hkdfExpandLabel(crypto.SHA256, initialSecret, []byte{}, "server in", crypto.SHA256.Size())
|
|
return
|
|
}
|
|
|
|
func computeInitialKeyAndIV(secret []byte) (key, iv []byte) {
|
|
key = hkdfExpandLabel(crypto.SHA256, secret, []byte{}, "quic key", 16)
|
|
iv = hkdfExpandLabel(crypto.SHA256, secret, []byte{}, "quic iv", 12)
|
|
return
|
|
}
|