mirror of
https://github.com/refraction-networking/uquic.git
synced 2025-04-05 05:07:36 +03:00
164 lines
5.6 KiB
Go
164 lines
5.6 KiB
Go
package qtls
|
|
|
|
import (
|
|
"crypto"
|
|
"crypto/cipher"
|
|
"crypto/tls"
|
|
"net"
|
|
"unsafe"
|
|
|
|
"github.com/marten-seemann/qtls"
|
|
)
|
|
|
|
type (
|
|
// Alert is a TLS alert
|
|
Alert = qtls.Alert
|
|
// A Certificate is qtls.Certificate.
|
|
Certificate = qtls.Certificate
|
|
// CertificateRequestInfo contains inforamtion about a certificate request.
|
|
CertificateRequestInfo = qtls.CertificateRequestInfo
|
|
// A CipherSuiteTLS13 is a cipher suite for TLS 1.3
|
|
CipherSuiteTLS13 = qtls.CipherSuiteTLS13
|
|
// ClientHelloInfo contains information about a ClientHello.
|
|
ClientHelloInfo = qtls.ClientHelloInfo
|
|
// ClientSessionCache is a cache used for session resumption.
|
|
ClientSessionCache = qtls.ClientSessionCache
|
|
// ClientSessionState is a state needed for session resumption.
|
|
ClientSessionState = qtls.ClientSessionState
|
|
// A Config is a qtls.Config.
|
|
Config = qtls.Config
|
|
// A Conn is a qtls.Conn.
|
|
Conn = qtls.Conn
|
|
// ConnectionState contains information about the state of the connection.
|
|
ConnectionState = qtls.ConnectionState
|
|
// EncryptionLevel is the encryption level of a message.
|
|
EncryptionLevel = qtls.EncryptionLevel
|
|
// Extension is a TLS extension
|
|
Extension = qtls.Extension
|
|
// RecordLayer is a qtls RecordLayer.
|
|
RecordLayer = qtls.RecordLayer
|
|
)
|
|
|
|
type ExtraConfig struct {
|
|
// GetExtensions, if not nil, is called before a message that allows
|
|
// sending of extensions is sent.
|
|
// Currently only implemented for the ClientHello message (for the client)
|
|
// and for the EncryptedExtensions message (for the server).
|
|
// Only valid for TLS 1.3.
|
|
GetExtensions func(handshakeMessageType uint8) []Extension
|
|
|
|
// ReceivedExtensions, if not nil, is called when a message that allows the
|
|
// inclusion of extensions is received.
|
|
// It is called with an empty slice of extensions, if the message didn't
|
|
// contain any extensions.
|
|
// Currently only implemented for the ClientHello message (sent by the
|
|
// client) and for the EncryptedExtensions message (sent by the server).
|
|
// Only valid for TLS 1.3.
|
|
ReceivedExtensions func(handshakeMessageType uint8, exts []Extension)
|
|
|
|
// AlternativeRecordLayer is used by QUIC
|
|
AlternativeRecordLayer RecordLayer
|
|
|
|
// Enforce the selection of a supported application protocol.
|
|
// Only works for TLS 1.3.
|
|
// If enabled, client and server have to agree on an application protocol.
|
|
// Otherwise, connection establishment fails.
|
|
EnforceNextProtoSelection bool
|
|
|
|
// If MaxEarlyData is greater than 0, the client will be allowed to send early
|
|
// data when resuming a session.
|
|
// Requires the AlternativeRecordLayer to be set.
|
|
//
|
|
// It has no meaning on the client.
|
|
MaxEarlyData uint32
|
|
|
|
// The Accept0RTT callback is called when the client offers 0-RTT.
|
|
// The server then has to decide if it wants to accept or reject 0-RTT.
|
|
// It is only used for servers.
|
|
Accept0RTT func(appData []byte) bool
|
|
|
|
// 0RTTRejected is called when the server rejectes 0-RTT.
|
|
// It is only used for clients.
|
|
Rejected0RTT func()
|
|
|
|
// If set, the client will export the 0-RTT key when resuming a session that
|
|
// allows sending of early data.
|
|
// Requires the AlternativeRecordLayer to be set.
|
|
//
|
|
// It has no meaning to the server.
|
|
Enable0RTT bool
|
|
|
|
// Is called when the client saves a session ticket to the session ticket.
|
|
// This gives the application the opportunity to save some data along with the ticket,
|
|
// which can be restored when the session ticket is used.
|
|
GetAppDataForSessionState func() []byte
|
|
|
|
// Is called when the client uses a session ticket.
|
|
// Restores the application data that was saved earlier on GetAppDataForSessionTicket.
|
|
SetAppDataFromSessionState func([]byte)
|
|
}
|
|
|
|
const (
|
|
// EncryptionHandshake is the Handshake encryption level
|
|
EncryptionHandshake = qtls.EncryptionHandshake
|
|
// Encryption0RTT is the 0-RTT encryption level
|
|
Encryption0RTT = qtls.Encryption0RTT
|
|
// EncryptionApplication is the application data encryption level
|
|
EncryptionApplication = qtls.EncryptionApplication
|
|
)
|
|
|
|
// CipherSuiteName gets the name of a cipher suite.
|
|
func CipherSuiteName(id uint16) string {
|
|
return qtls.CipherSuiteName(id)
|
|
}
|
|
|
|
// HkdfExtract generates a pseudorandom key for use with Expand from an input secret and an optional independent salt.
|
|
func HkdfExtract(hash crypto.Hash, newSecret, currentSecret []byte) []byte {
|
|
return qtls.HkdfExtract(hash, newSecret, currentSecret)
|
|
}
|
|
|
|
// HkdfExpandLabel HKDF expands a label
|
|
func HkdfExpandLabel(hash crypto.Hash, secret, hashValue []byte, label string, L int) []byte {
|
|
return qtls.HkdfExpandLabel(hash, secret, hashValue, label, L)
|
|
}
|
|
|
|
// AEADAESGCMTLS13 creates a new AES-GCM AEAD for TLS 1.3
|
|
func AEADAESGCMTLS13(key, fixedNonce []byte) cipher.AEAD {
|
|
return qtls.AEADAESGCMTLS13(key, fixedNonce)
|
|
}
|
|
|
|
// Client returns a new TLS client side connection.
|
|
func Client(conn net.Conn, config *tls.Config, extraConfig *ExtraConfig) *Conn {
|
|
return qtls.Client(conn, tlsConfigToQtlsConfig(config, extraConfig))
|
|
}
|
|
|
|
// Server returns a new TLS server side connection.
|
|
func Server(conn net.Conn, config *tls.Config, extraConfig *ExtraConfig) *Conn {
|
|
return qtls.Server(conn, tlsConfigToQtlsConfig(config, extraConfig))
|
|
}
|
|
|
|
func GetConnectionState(conn *Conn) ConnectionState {
|
|
return conn.ConnectionState()
|
|
}
|
|
|
|
type cipherSuiteTLS13 struct {
|
|
ID uint16
|
|
KeyLen int
|
|
AEAD func(key, fixedNonce []byte) cipher.AEAD
|
|
Hash crypto.Hash
|
|
}
|
|
|
|
//go:linkname cipherSuiteTLS13ByID github.com/marten-seemann/qtls.cipherSuiteTLS13ByID
|
|
func cipherSuiteTLS13ByID(id uint16) *cipherSuiteTLS13
|
|
|
|
// CipherSuiteTLS13ByID gets a TLS 1.3 cipher suite.
|
|
func CipherSuiteTLS13ByID(id uint16) *CipherSuiteTLS13 {
|
|
val := cipherSuiteTLS13ByID(id)
|
|
cs := (*cipherSuiteTLS13)(unsafe.Pointer(val))
|
|
return &qtls.CipherSuiteTLS13{
|
|
ID: cs.ID,
|
|
KeyLen: cs.KeyLen,
|
|
AEAD: cs.AEAD,
|
|
Hash: cs.Hash,
|
|
}
|
|
}
|