mirror of
https://github.com/refraction-networking/utls.git
synced 2025-04-03 03:57:36 +03:00
Implement GetOutKeystream()
This commit is contained in:
parent
004572df2e
commit
08a039c453
2 changed files with 12 additions and 0 deletions
|
@ -3,6 +3,7 @@
|
|||
## Low-level access to handshake
|
||||
* Read/write access to all bits of client hello message.
|
||||
* Read access to fields of ClientHandshakeState, which, among other things, includes ServerHello and MasterSecret.
|
||||
* Read keystream. Can be used to "write" something in ciphertext.
|
||||
## ClientHello fingerprinting resistance
|
||||
Golang's ClientHello has a very unique fingerprint, which especially sticks out on mobile clients,
|
||||
where Golang is not too popular yet.
|
||||
|
|
11
u_conn.go
11
u_conn.go
|
@ -435,3 +435,14 @@ func (uconn *UConn) MarshalClientHello() error {
|
|||
hello.Raw = helloBuffer.Bytes()
|
||||
return nil
|
||||
}
|
||||
|
||||
// get current state of cipher and encrypt zeros to get keystream
|
||||
func (uconn *UConn) GetOutKeystream(length int) ([]byte, error) {
|
||||
zeros := make([]byte, length)
|
||||
|
||||
if outCipher, ok := uconn.out.cipher.(cipher.AEAD); ok {
|
||||
// AEAD.Seal() does not mutate internal state, other ciphers might
|
||||
return outCipher.Seal(nil, uconn.out.seq[:], zeros, nil), nil
|
||||
}
|
||||
return nil, errors.New("Could not convert OutCipher to cipher.AEAD")
|
||||
}
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue