mirror of
https://github.com/refraction-networking/utls.git
synced 2025-04-04 12:37:35 +03:00
refactor: eliminate duplicate extension
- `DelegatedCredentialsExtension` duplicates `FakeDelegatedCredentialsExtension`. - We will stick to `FakeDelegatedCredentialsExtension` since its functions are not implemented and will break handshake if server echoes it. - Moving the enum `extensionDelegatedCredentials` out from `common.go`, since upstream `crypto/tls` does not implement it nor provide any definition for it.
This commit is contained in:
parent
d5cdf5dbe1
commit
1ac304ca71
4 changed files with 20 additions and 52 deletions
|
@ -91,7 +91,6 @@ const (
|
||||||
extensionALPN uint16 = 16
|
extensionALPN uint16 = 16
|
||||||
extensionStatusRequestV2 uint16 = 17
|
extensionStatusRequestV2 uint16 = 17
|
||||||
extensionSCT uint16 = 18
|
extensionSCT uint16 = 18
|
||||||
extensionDelegatedCredentials uint16 = 34
|
|
||||||
extensionSessionTicket uint16 = 35
|
extensionSessionTicket uint16 = 35
|
||||||
extensionPreSharedKey uint16 = 41
|
extensionPreSharedKey uint16 = 41
|
||||||
extensionEarlyData uint16 = 42
|
extensionEarlyData uint16 = 42
|
||||||
|
|
|
@ -30,13 +30,14 @@ const (
|
||||||
utlsExtensionExtendedMasterSecret uint16 = 23 // https://tools.ietf.org/html/rfc7627
|
utlsExtensionExtendedMasterSecret uint16 = 23 // https://tools.ietf.org/html/rfc7627
|
||||||
utlsExtensionCompressCertificate uint16 = 27 // https://datatracker.ietf.org/doc/html/rfc8879#section-7.1
|
utlsExtensionCompressCertificate uint16 = 27 // https://datatracker.ietf.org/doc/html/rfc8879#section-7.1
|
||||||
utlsExtensionApplicationSettings uint16 = 17513 // not IANA assigned
|
utlsExtensionApplicationSettings uint16 = 17513 // not IANA assigned
|
||||||
utlsFakeExtensionCustom uint16 = 1234 // not IANA assigned, for ALPS
|
|
||||||
|
utlsFakeExtensionCustom uint16 = 1234 // not IANA assigned, for ALPS
|
||||||
|
|
||||||
// extensions with 'fake' prefix break connection, if server echoes them back
|
// extensions with 'fake' prefix break connection, if server echoes them back
|
||||||
fakeExtensionTokenBinding uint16 = 24
|
fakeExtensionTokenBinding uint16 = 24
|
||||||
|
fakeExtensionDelegatedCredentials uint16 = 34 // https://tools.ietf.org/html/draft-ietf-tls-subcerts-09
|
||||||
fakeOldExtensionChannelID uint16 = 30031 // not IANA assigned
|
fakeOldExtensionChannelID uint16 = 30031 // not IANA assigned
|
||||||
fakeExtensionChannelID uint16 = 30032 // not IANA assigned
|
fakeExtensionChannelID uint16 = 30032 // not IANA assigned
|
||||||
fakeExtensionDelegatedCredentials uint16 = 34
|
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
|
|
|
@ -680,8 +680,8 @@ func utlsIdToSpec(id ClientHelloID) (ClientHelloSpec, error) {
|
||||||
&SessionTicketExtension{},
|
&SessionTicketExtension{},
|
||||||
&ALPNExtension{AlpnProtocols: []string{"h2", "http/1.1"}}, //application_layer_protocol_negotiation
|
&ALPNExtension{AlpnProtocols: []string{"h2", "http/1.1"}}, //application_layer_protocol_negotiation
|
||||||
&StatusRequestExtension{},
|
&StatusRequestExtension{},
|
||||||
&DelegatedCredentialsExtension{
|
&FakeDelegatedCredentialsExtension{
|
||||||
AlgorithmsSignature: []SignatureScheme{ //signature_algorithms
|
SupportedSignatureAlgorithms: []SignatureScheme{ //signature_algorithms
|
||||||
ECDSAWithP256AndSHA256,
|
ECDSAWithP256AndSHA256,
|
||||||
ECDSAWithP384AndSHA384,
|
ECDSAWithP384AndSHA384,
|
||||||
ECDSAWithP521AndSHA512,
|
ECDSAWithP521AndSHA512,
|
||||||
|
@ -761,8 +761,8 @@ func utlsIdToSpec(id ClientHelloID) (ClientHelloSpec, error) {
|
||||||
&SessionTicketExtension{},
|
&SessionTicketExtension{},
|
||||||
&ALPNExtension{AlpnProtocols: []string{"h2"}}, //application_layer_protocol_negotiation
|
&ALPNExtension{AlpnProtocols: []string{"h2"}}, //application_layer_protocol_negotiation
|
||||||
&StatusRequestExtension{},
|
&StatusRequestExtension{},
|
||||||
&DelegatedCredentialsExtension{
|
&FakeDelegatedCredentialsExtension{
|
||||||
AlgorithmsSignature: []SignatureScheme{ //signature_algorithms
|
SupportedSignatureAlgorithms: []SignatureScheme{ //signature_algorithms
|
||||||
ECDSAWithP256AndSHA256,
|
ECDSAWithP256AndSHA256,
|
||||||
ECDSAWithP384AndSHA384,
|
ECDSAWithP384AndSHA384,
|
||||||
ECDSAWithP521AndSHA512,
|
ECDSAWithP521AndSHA512,
|
||||||
|
|
|
@ -891,29 +891,29 @@ func (e *FakeRecordSizeLimitExtension) Read(b []byte) (int, error) {
|
||||||
return e.Len(), io.EOF
|
return e.Len(), io.EOF
|
||||||
}
|
}
|
||||||
|
|
||||||
type DelegatedCredentialsExtension struct {
|
type FakeDelegatedCredentialsExtension struct {
|
||||||
AlgorithmsSignature []SignatureScheme
|
SupportedSignatureAlgorithms []SignatureScheme
|
||||||
}
|
}
|
||||||
|
|
||||||
func (e *DelegatedCredentialsExtension) writeToUConn(uc *UConn) error {
|
func (e *FakeDelegatedCredentialsExtension) writeToUConn(uc *UConn) error {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (e *DelegatedCredentialsExtension) Len() int {
|
func (e *FakeDelegatedCredentialsExtension) Len() int {
|
||||||
return 6 + 2*len(e.AlgorithmsSignature)
|
return 6 + 2*len(e.SupportedSignatureAlgorithms)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (e *DelegatedCredentialsExtension) Read(b []byte) (int, error) {
|
func (e *FakeDelegatedCredentialsExtension) Read(b []byte) (int, error) {
|
||||||
if len(b) < e.Len() {
|
if len(b) < e.Len() {
|
||||||
return 0, io.ErrShortBuffer
|
return 0, io.ErrShortBuffer
|
||||||
}
|
}
|
||||||
b[0] = byte(extensionDelegatedCredentials >> 8)
|
b[0] = byte(fakeExtensionDelegatedCredentials >> 8)
|
||||||
b[1] = byte(extensionDelegatedCredentials)
|
b[1] = byte(fakeExtensionDelegatedCredentials)
|
||||||
b[2] = byte((2 + 2*len(e.AlgorithmsSignature)) >> 8)
|
b[2] = byte((2 + 2*len(e.SupportedSignatureAlgorithms)) >> 8)
|
||||||
b[3] = byte(2 + 2*len(e.AlgorithmsSignature))
|
b[3] = byte(2 + 2*len(e.SupportedSignatureAlgorithms))
|
||||||
b[4] = byte((2 * len(e.AlgorithmsSignature)) >> 8)
|
b[4] = byte((2 * len(e.SupportedSignatureAlgorithms)) >> 8)
|
||||||
b[5] = byte(2 * len(e.AlgorithmsSignature))
|
b[5] = byte(2 * len(e.SupportedSignatureAlgorithms))
|
||||||
for i, sigAndHash := range e.AlgorithmsSignature {
|
for i, sigAndHash := range e.SupportedSignatureAlgorithms {
|
||||||
b[6+2*i] = byte(sigAndHash >> 8)
|
b[6+2*i] = byte(sigAndHash >> 8)
|
||||||
b[7+2*i] = byte(sigAndHash)
|
b[7+2*i] = byte(sigAndHash)
|
||||||
}
|
}
|
||||||
|
@ -953,35 +953,3 @@ func (e *FakeTokenBindingExtension) Read(b []byte) (int, error) {
|
||||||
}
|
}
|
||||||
return e.Len(), io.EOF
|
return e.Len(), io.EOF
|
||||||
}
|
}
|
||||||
|
|
||||||
// https://datatracker.ietf.org/doc/html/draft-ietf-tls-subcerts-15#section-4.1.1
|
|
||||||
|
|
||||||
type FakeDelegatedCredentialsExtension struct {
|
|
||||||
SupportedSignatureAlgorithms []SignatureScheme
|
|
||||||
}
|
|
||||||
|
|
||||||
func (e *FakeDelegatedCredentialsExtension) writeToUConn(uc *UConn) error {
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func (e *FakeDelegatedCredentialsExtension) Len() int {
|
|
||||||
return 6 + 2*len(e.SupportedSignatureAlgorithms)
|
|
||||||
}
|
|
||||||
|
|
||||||
func (e *FakeDelegatedCredentialsExtension) Read(b []byte) (int, error) {
|
|
||||||
if len(b) < e.Len() {
|
|
||||||
return 0, io.ErrShortBuffer
|
|
||||||
}
|
|
||||||
// https://datatracker.ietf.org/doc/html/draft-ietf-tls-subcerts-15#section-4.1.1
|
|
||||||
b[0] = byte(fakeExtensionDelegatedCredentials >> 8)
|
|
||||||
b[1] = byte(fakeExtensionDelegatedCredentials)
|
|
||||||
b[2] = byte((2 + 2*len(e.SupportedSignatureAlgorithms)) >> 8)
|
|
||||||
b[3] = byte((2 + 2*len(e.SupportedSignatureAlgorithms)))
|
|
||||||
b[4] = byte((2 * len(e.SupportedSignatureAlgorithms)) >> 8)
|
|
||||||
b[5] = byte((2 * len(e.SupportedSignatureAlgorithms)))
|
|
||||||
for i, sigAndHash := range e.SupportedSignatureAlgorithms {
|
|
||||||
b[6+2*i] = byte(sigAndHash >> 8)
|
|
||||||
b[7+2*i] = byte(sigAndHash)
|
|
||||||
}
|
|
||||||
return e.Len(), io.EOF
|
|
||||||
}
|
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue