mirror of
https://github.com/refraction-networking/utls.git
synced 2025-04-04 12:37:35 +03:00
add TODO
- Function `MakeConnWithCompleteHandshake` needs revision to support TLS 1.3
This commit is contained in:
parent
4e8fa06059
commit
135e28202e
2 changed files with 57 additions and 49 deletions
|
@ -308,6 +308,10 @@ func forgeConn() {
|
||||||
// TODO: Redesign this part to use TLS 1.3
|
// TODO: Redesign this part to use TLS 1.3
|
||||||
serverTls := tls.MakeConnWithCompleteHandshake(serverConn, hs.ServerHello.Vers, hs.ServerHello.CipherSuite,
|
serverTls := tls.MakeConnWithCompleteHandshake(serverConn, hs.ServerHello.Vers, hs.ServerHello.CipherSuite,
|
||||||
hs.MasterSecret, hs.Hello.Random, hs.ServerHello.Random, false)
|
hs.MasterSecret, hs.Hello.Random, hs.ServerHello.Random, false)
|
||||||
|
if serverTls == nil {
|
||||||
|
fmt.Printf("tls.MakeConnWithCompleteHandshake error, unsupported TLS protocol?")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
go func() {
|
go func() {
|
||||||
clientUtls.Write([]byte("Hello, world!"))
|
clientUtls.Write([]byte("Hello, world!"))
|
||||||
|
|
102
u_conn.go
102
u_conn.go
|
@ -58,11 +58,14 @@ func UClient(conn net.Conn, config *Config, clientHelloID ClientHelloID) *UConn
|
||||||
// BuildHandshakeState behavior varies based on ClientHelloID and
|
// BuildHandshakeState behavior varies based on ClientHelloID and
|
||||||
// whether it was already called before.
|
// whether it was already called before.
|
||||||
// If HelloGolang:
|
// If HelloGolang:
|
||||||
// [only once] make default ClientHello and overwrite existing state
|
//
|
||||||
|
// [only once] make default ClientHello and overwrite existing state
|
||||||
|
//
|
||||||
// If any other mimicking ClientHelloID is used:
|
// If any other mimicking ClientHelloID is used:
|
||||||
// [only once] make ClientHello based on ID and overwrite existing state
|
//
|
||||||
// [each call] apply uconn.Extensions config to internal crypto/tls structures
|
// [only once] make ClientHello based on ID and overwrite existing state
|
||||||
// [each call] marshal ClientHello.
|
// [each call] apply uconn.Extensions config to internal crypto/tls structures
|
||||||
|
// [each call] marshal ClientHello.
|
||||||
//
|
//
|
||||||
// BuildHandshakeState is automatically called before uTLS performs handshake,
|
// BuildHandshakeState is automatically called before uTLS performs handshake,
|
||||||
// amd should only be called explicitly to inspect/change fields of
|
// amd should only be called explicitly to inspect/change fields of
|
||||||
|
@ -575,9 +578,9 @@ func (uconn *UConn) GetOutKeystream(length int) ([]byte, error) {
|
||||||
|
|
||||||
// SetTLSVers sets min and max TLS version in all appropriate places.
|
// SetTLSVers sets min and max TLS version in all appropriate places.
|
||||||
// Function will use first non-zero version parsed in following order:
|
// Function will use first non-zero version parsed in following order:
|
||||||
// 1) Provided minTLSVers, maxTLSVers
|
// 1. Provided minTLSVers, maxTLSVers
|
||||||
// 2) specExtensions may have SupportedVersionsExtension
|
// 2. specExtensions may have SupportedVersionsExtension
|
||||||
// 3) [default] min = TLS 1.0, max = TLS 1.2
|
// 3. [default] min = TLS 1.0, max = TLS 1.2
|
||||||
//
|
//
|
||||||
// Error is only returned if things are in clearly undesirable state
|
// Error is only returned if things are in clearly undesirable state
|
||||||
// to help user fix them.
|
// to help user fix them.
|
||||||
|
@ -653,50 +656,51 @@ func (uconn *UConn) GetUnderlyingConn() net.Conn {
|
||||||
func MakeConnWithCompleteHandshake(tcpConn net.Conn, version uint16, cipherSuite uint16, masterSecret []byte, clientRandom []byte, serverRandom []byte, isClient bool) *Conn {
|
func MakeConnWithCompleteHandshake(tcpConn net.Conn, version uint16, cipherSuite uint16, masterSecret []byte, clientRandom []byte, serverRandom []byte, isClient bool) *Conn {
|
||||||
tlsConn := &Conn{conn: tcpConn, config: &Config{}, isClient: isClient}
|
tlsConn := &Conn{conn: tcpConn, config: &Config{}, isClient: isClient}
|
||||||
cs := cipherSuiteByID(cipherSuite)
|
cs := cipherSuiteByID(cipherSuite)
|
||||||
if cs == nil {
|
if cs != nil {
|
||||||
|
// This is mostly borrowed from establishKeys()
|
||||||
|
clientMAC, serverMAC, clientKey, serverKey, clientIV, serverIV :=
|
||||||
|
keysFromMasterSecret(version, cs, masterSecret, clientRandom, serverRandom,
|
||||||
|
cs.macLen, cs.keyLen, cs.ivLen)
|
||||||
|
|
||||||
|
var clientCipher, serverCipher interface{}
|
||||||
|
var clientHash, serverHash hash.Hash
|
||||||
|
if cs.cipher != nil {
|
||||||
|
clientCipher = cs.cipher(clientKey, clientIV, true /* for reading */)
|
||||||
|
clientHash = cs.mac(clientMAC)
|
||||||
|
serverCipher = cs.cipher(serverKey, serverIV, false /* not for reading */)
|
||||||
|
serverHash = cs.mac(serverMAC)
|
||||||
|
} else {
|
||||||
|
clientCipher = cs.aead(clientKey, clientIV)
|
||||||
|
serverCipher = cs.aead(serverKey, serverIV)
|
||||||
|
}
|
||||||
|
|
||||||
|
if isClient {
|
||||||
|
tlsConn.in.prepareCipherSpec(version, serverCipher, serverHash)
|
||||||
|
tlsConn.out.prepareCipherSpec(version, clientCipher, clientHash)
|
||||||
|
} else {
|
||||||
|
tlsConn.in.prepareCipherSpec(version, clientCipher, clientHash)
|
||||||
|
tlsConn.out.prepareCipherSpec(version, serverCipher, serverHash)
|
||||||
|
}
|
||||||
|
|
||||||
|
// skip the handshake states
|
||||||
|
atomic.StoreUint32(&tlsConn.handshakeStatus, 1)
|
||||||
|
tlsConn.cipherSuite = cipherSuite
|
||||||
|
tlsConn.haveVers = true
|
||||||
|
tlsConn.vers = version
|
||||||
|
|
||||||
|
// Update to the new cipher specs
|
||||||
|
// and consume the finished messages
|
||||||
|
tlsConn.in.changeCipherSpec()
|
||||||
|
tlsConn.out.changeCipherSpec()
|
||||||
|
|
||||||
|
tlsConn.in.incSeq()
|
||||||
|
tlsConn.out.incSeq()
|
||||||
|
|
||||||
|
return tlsConn
|
||||||
|
} else {
|
||||||
|
// TODO: Support TLS 1.3 Cipher Suites
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// This is mostly borrowed from establishKeys()
|
|
||||||
clientMAC, serverMAC, clientKey, serverKey, clientIV, serverIV :=
|
|
||||||
keysFromMasterSecret(version, cs, masterSecret, clientRandom, serverRandom,
|
|
||||||
cs.macLen, cs.keyLen, cs.ivLen)
|
|
||||||
|
|
||||||
var clientCipher, serverCipher interface{}
|
|
||||||
var clientHash, serverHash hash.Hash
|
|
||||||
if cs.cipher != nil {
|
|
||||||
clientCipher = cs.cipher(clientKey, clientIV, true /* for reading */)
|
|
||||||
clientHash = cs.mac(clientMAC)
|
|
||||||
serverCipher = cs.cipher(serverKey, serverIV, false /* not for reading */)
|
|
||||||
serverHash = cs.mac(serverMAC)
|
|
||||||
} else {
|
|
||||||
clientCipher = cs.aead(clientKey, clientIV)
|
|
||||||
serverCipher = cs.aead(serverKey, serverIV)
|
|
||||||
}
|
|
||||||
|
|
||||||
if isClient {
|
|
||||||
tlsConn.in.prepareCipherSpec(version, serverCipher, serverHash)
|
|
||||||
tlsConn.out.prepareCipherSpec(version, clientCipher, clientHash)
|
|
||||||
} else {
|
|
||||||
tlsConn.in.prepareCipherSpec(version, clientCipher, clientHash)
|
|
||||||
tlsConn.out.prepareCipherSpec(version, serverCipher, serverHash)
|
|
||||||
}
|
|
||||||
|
|
||||||
// skip the handshake states
|
|
||||||
atomic.StoreUint32(&tlsConn.handshakeStatus, 1)
|
|
||||||
tlsConn.cipherSuite = cipherSuite
|
|
||||||
tlsConn.haveVers = true
|
|
||||||
tlsConn.vers = version
|
|
||||||
|
|
||||||
// Update to the new cipher specs
|
|
||||||
// and consume the finished messages
|
|
||||||
tlsConn.in.changeCipherSpec()
|
|
||||||
tlsConn.out.changeCipherSpec()
|
|
||||||
|
|
||||||
tlsConn.in.incSeq()
|
|
||||||
tlsConn.out.incSeq()
|
|
||||||
|
|
||||||
return tlsConn
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func makeSupportedVersions(minVers, maxVers uint16) []uint16 {
|
func makeSupportedVersions(minVers, maxVers uint16) []uint16 {
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue