mirror of
https://github.com/refraction-networking/utls.git
synced 2025-04-04 12:37:35 +03:00
crypto/tls: marshal sessionState using cryptobyte
Change-Id: I95a60b837e19d0c4bf45ea74baa5843a8244a186 Reviewed-on: https://go-review.googlesource.com/c/go/+/231218 Run-TryBot: Katie Hockman <katie@golang.org> TryBot-Result: Gobot Gobot <gobot@golang.org> Reviewed-by: Filippo Valsorda <filippo@golang.org>
This commit is contained in:
parent
b65e9fa492
commit
24d8c7c748
2 changed files with 43 additions and 76 deletions
|
@ -308,11 +308,9 @@ func (*sessionState) Generate(rand *rand.Rand, size int) reflect.Value {
|
||||||
s := &sessionState{}
|
s := &sessionState{}
|
||||||
s.vers = uint16(rand.Intn(10000))
|
s.vers = uint16(rand.Intn(10000))
|
||||||
s.cipherSuite = uint16(rand.Intn(10000))
|
s.cipherSuite = uint16(rand.Intn(10000))
|
||||||
s.masterSecret = randomBytes(rand.Intn(100), rand)
|
s.masterSecret = randomBytes(rand.Intn(100)+1, rand)
|
||||||
numCerts := rand.Intn(20)
|
for i := 0; i < rand.Intn(20); i++ {
|
||||||
s.certificates = make([][]byte, numCerts)
|
s.certificates = append(s.certificates, randomBytes(rand.Intn(500)+1, rand))
|
||||||
for i := 0; i < numCerts; i++ {
|
|
||||||
s.certificates[i] = randomBytes(rand.Intn(10)+1, rand)
|
|
||||||
}
|
}
|
||||||
return reflect.ValueOf(s)
|
return reflect.ValueOf(s)
|
||||||
}
|
}
|
||||||
|
|
111
ticket.go
111
ticket.go
|
@ -12,8 +12,9 @@ import (
|
||||||
"crypto/sha256"
|
"crypto/sha256"
|
||||||
"crypto/subtle"
|
"crypto/subtle"
|
||||||
"errors"
|
"errors"
|
||||||
"golang.org/x/crypto/cryptobyte"
|
|
||||||
"io"
|
"io"
|
||||||
|
|
||||||
|
"golang.org/x/crypto/cryptobyte"
|
||||||
)
|
)
|
||||||
|
|
||||||
// sessionState contains the information that is serialized into a session
|
// sessionState contains the information that is serialized into a session
|
||||||
|
@ -21,88 +22,56 @@ import (
|
||||||
type sessionState struct {
|
type sessionState struct {
|
||||||
vers uint16
|
vers uint16
|
||||||
cipherSuite uint16
|
cipherSuite uint16
|
||||||
masterSecret []byte
|
masterSecret []byte // opaque master_secret<1..2^16-1>;
|
||||||
certificates [][]byte
|
// struct { opaque certificate<1..2^32-1> } Certificate;
|
||||||
|
certificates [][]byte // Certificate certificate_list<0..2^16-1>;
|
||||||
|
|
||||||
// usedOldKey is true if the ticket from which this session came from
|
// usedOldKey is true if the ticket from which this session came from
|
||||||
// was encrypted with an older key and thus should be refreshed.
|
// was encrypted with an older key and thus should be refreshed.
|
||||||
usedOldKey bool
|
usedOldKey bool
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *sessionState) marshal() []byte {
|
func (m *sessionState) marshal() []byte {
|
||||||
length := 2 + 2 + 2 + len(s.masterSecret) + 2
|
var b cryptobyte.Builder
|
||||||
for _, cert := range s.certificates {
|
b.AddUint16(m.vers)
|
||||||
length += 4 + len(cert)
|
b.AddUint16(m.cipherSuite)
|
||||||
}
|
b.AddUint16LengthPrefixed(func(b *cryptobyte.Builder) {
|
||||||
|
b.AddBytes(m.masterSecret)
|
||||||
ret := make([]byte, length)
|
})
|
||||||
x := ret
|
b.AddUint16LengthPrefixed(func(b *cryptobyte.Builder) {
|
||||||
x[0] = byte(s.vers >> 8)
|
for _, cert := range m.certificates {
|
||||||
x[1] = byte(s.vers)
|
b.AddUint32LengthPrefixed(func(b *cryptobyte.Builder) {
|
||||||
x[2] = byte(s.cipherSuite >> 8)
|
b.AddBytes(cert)
|
||||||
x[3] = byte(s.cipherSuite)
|
})
|
||||||
x[4] = byte(len(s.masterSecret) >> 8)
|
}
|
||||||
x[5] = byte(len(s.masterSecret))
|
})
|
||||||
x = x[6:]
|
return b.BytesOrPanic()
|
||||||
copy(x, s.masterSecret)
|
|
||||||
x = x[len(s.masterSecret):]
|
|
||||||
|
|
||||||
x[0] = byte(len(s.certificates) >> 8)
|
|
||||||
x[1] = byte(len(s.certificates))
|
|
||||||
x = x[2:]
|
|
||||||
|
|
||||||
for _, cert := range s.certificates {
|
|
||||||
x[0] = byte(len(cert) >> 24)
|
|
||||||
x[1] = byte(len(cert) >> 16)
|
|
||||||
x[2] = byte(len(cert) >> 8)
|
|
||||||
x[3] = byte(len(cert))
|
|
||||||
copy(x[4:], cert)
|
|
||||||
x = x[4+len(cert):]
|
|
||||||
}
|
|
||||||
|
|
||||||
return ret
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *sessionState) unmarshal(data []byte) bool {
|
func (m *sessionState) unmarshal(data []byte) bool {
|
||||||
if len(data) < 8 {
|
*m = sessionState{usedOldKey: m.usedOldKey}
|
||||||
|
s := cryptobyte.String(data)
|
||||||
|
if ok := s.ReadUint16(&m.vers) &&
|
||||||
|
m.vers != VersionTLS13 &&
|
||||||
|
s.ReadUint16(&m.cipherSuite) &&
|
||||||
|
readUint16LengthPrefixed(&s, &m.masterSecret) &&
|
||||||
|
len(m.masterSecret) != 0; !ok {
|
||||||
return false
|
return false
|
||||||
}
|
}
|
||||||
|
var certList cryptobyte.String
|
||||||
s.vers = uint16(data[0])<<8 | uint16(data[1])
|
if !s.ReadUint16LengthPrefixed(&certList) {
|
||||||
s.cipherSuite = uint16(data[2])<<8 | uint16(data[3])
|
|
||||||
masterSecretLen := int(data[4])<<8 | int(data[5])
|
|
||||||
data = data[6:]
|
|
||||||
if len(data) < masterSecretLen {
|
|
||||||
return false
|
return false
|
||||||
}
|
}
|
||||||
|
for !certList.Empty() {
|
||||||
s.masterSecret = data[:masterSecretLen]
|
var certLen uint32
|
||||||
data = data[masterSecretLen:]
|
certList.ReadUint32(&certLen)
|
||||||
|
var cert []byte
|
||||||
if len(data) < 2 {
|
if certLen == 0 || !certList.ReadBytes(&cert, int(certLen)) {
|
||||||
return false
|
return false
|
||||||
|
}
|
||||||
|
m.certificates = append(m.certificates, cert)
|
||||||
}
|
}
|
||||||
|
return s.Empty()
|
||||||
numCerts := int(data[0])<<8 | int(data[1])
|
|
||||||
data = data[2:]
|
|
||||||
|
|
||||||
s.certificates = make([][]byte, numCerts)
|
|
||||||
for i := range s.certificates {
|
|
||||||
if len(data) < 4 {
|
|
||||||
return false
|
|
||||||
}
|
|
||||||
certLen := int(data[0])<<24 | int(data[1])<<16 | int(data[2])<<8 | int(data[3])
|
|
||||||
data = data[4:]
|
|
||||||
if certLen < 0 {
|
|
||||||
return false
|
|
||||||
}
|
|
||||||
if len(data) < certLen {
|
|
||||||
return false
|
|
||||||
}
|
|
||||||
s.certificates[i] = data[:certLen]
|
|
||||||
data = data[certLen:]
|
|
||||||
}
|
|
||||||
|
|
||||||
return len(data) == 0
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// sessionStateTLS13 is the content of a TLS 1.3 session ticket. Its first
|
// sessionStateTLS13 is the content of a TLS 1.3 session ticket. Its first
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue