crypto/tls: marshal sessionState using cryptobyte

Change-Id: I95a60b837e19d0c4bf45ea74baa5843a8244a186
Reviewed-on: https://go-review.googlesource.com/c/go/+/231218
Run-TryBot: Katie Hockman <katie@golang.org>
TryBot-Result: Gobot Gobot <gobot@golang.org>
Reviewed-by: Filippo Valsorda <filippo@golang.org>
This commit is contained in:
Katie Hockman 2020-04-30 16:01:19 -04:00
parent b65e9fa492
commit 24d8c7c748
2 changed files with 43 additions and 76 deletions

View file

@ -308,11 +308,9 @@ func (*sessionState) Generate(rand *rand.Rand, size int) reflect.Value {
s := &sessionState{} s := &sessionState{}
s.vers = uint16(rand.Intn(10000)) s.vers = uint16(rand.Intn(10000))
s.cipherSuite = uint16(rand.Intn(10000)) s.cipherSuite = uint16(rand.Intn(10000))
s.masterSecret = randomBytes(rand.Intn(100), rand) s.masterSecret = randomBytes(rand.Intn(100)+1, rand)
numCerts := rand.Intn(20) for i := 0; i < rand.Intn(20); i++ {
s.certificates = make([][]byte, numCerts) s.certificates = append(s.certificates, randomBytes(rand.Intn(500)+1, rand))
for i := 0; i < numCerts; i++ {
s.certificates[i] = randomBytes(rand.Intn(10)+1, rand)
} }
return reflect.ValueOf(s) return reflect.ValueOf(s)
} }

111
ticket.go
View file

@ -12,8 +12,9 @@ import (
"crypto/sha256" "crypto/sha256"
"crypto/subtle" "crypto/subtle"
"errors" "errors"
"golang.org/x/crypto/cryptobyte"
"io" "io"
"golang.org/x/crypto/cryptobyte"
) )
// sessionState contains the information that is serialized into a session // sessionState contains the information that is serialized into a session
@ -21,88 +22,56 @@ import (
type sessionState struct { type sessionState struct {
vers uint16 vers uint16
cipherSuite uint16 cipherSuite uint16
masterSecret []byte masterSecret []byte // opaque master_secret<1..2^16-1>;
certificates [][]byte // struct { opaque certificate<1..2^32-1> } Certificate;
certificates [][]byte // Certificate certificate_list<0..2^16-1>;
// usedOldKey is true if the ticket from which this session came from // usedOldKey is true if the ticket from which this session came from
// was encrypted with an older key and thus should be refreshed. // was encrypted with an older key and thus should be refreshed.
usedOldKey bool usedOldKey bool
} }
func (s *sessionState) marshal() []byte { func (m *sessionState) marshal() []byte {
length := 2 + 2 + 2 + len(s.masterSecret) + 2 var b cryptobyte.Builder
for _, cert := range s.certificates { b.AddUint16(m.vers)
length += 4 + len(cert) b.AddUint16(m.cipherSuite)
} b.AddUint16LengthPrefixed(func(b *cryptobyte.Builder) {
b.AddBytes(m.masterSecret)
ret := make([]byte, length) })
x := ret b.AddUint16LengthPrefixed(func(b *cryptobyte.Builder) {
x[0] = byte(s.vers >> 8) for _, cert := range m.certificates {
x[1] = byte(s.vers) b.AddUint32LengthPrefixed(func(b *cryptobyte.Builder) {
x[2] = byte(s.cipherSuite >> 8) b.AddBytes(cert)
x[3] = byte(s.cipherSuite) })
x[4] = byte(len(s.masterSecret) >> 8) }
x[5] = byte(len(s.masterSecret)) })
x = x[6:] return b.BytesOrPanic()
copy(x, s.masterSecret)
x = x[len(s.masterSecret):]
x[0] = byte(len(s.certificates) >> 8)
x[1] = byte(len(s.certificates))
x = x[2:]
for _, cert := range s.certificates {
x[0] = byte(len(cert) >> 24)
x[1] = byte(len(cert) >> 16)
x[2] = byte(len(cert) >> 8)
x[3] = byte(len(cert))
copy(x[4:], cert)
x = x[4+len(cert):]
}
return ret
} }
func (s *sessionState) unmarshal(data []byte) bool { func (m *sessionState) unmarshal(data []byte) bool {
if len(data) < 8 { *m = sessionState{usedOldKey: m.usedOldKey}
s := cryptobyte.String(data)
if ok := s.ReadUint16(&m.vers) &&
m.vers != VersionTLS13 &&
s.ReadUint16(&m.cipherSuite) &&
readUint16LengthPrefixed(&s, &m.masterSecret) &&
len(m.masterSecret) != 0; !ok {
return false return false
} }
var certList cryptobyte.String
s.vers = uint16(data[0])<<8 | uint16(data[1]) if !s.ReadUint16LengthPrefixed(&certList) {
s.cipherSuite = uint16(data[2])<<8 | uint16(data[3])
masterSecretLen := int(data[4])<<8 | int(data[5])
data = data[6:]
if len(data) < masterSecretLen {
return false return false
} }
for !certList.Empty() {
s.masterSecret = data[:masterSecretLen] var certLen uint32
data = data[masterSecretLen:] certList.ReadUint32(&certLen)
var cert []byte
if len(data) < 2 { if certLen == 0 || !certList.ReadBytes(&cert, int(certLen)) {
return false return false
}
m.certificates = append(m.certificates, cert)
} }
return s.Empty()
numCerts := int(data[0])<<8 | int(data[1])
data = data[2:]
s.certificates = make([][]byte, numCerts)
for i := range s.certificates {
if len(data) < 4 {
return false
}
certLen := int(data[0])<<24 | int(data[1])<<16 | int(data[2])<<8 | int(data[3])
data = data[4:]
if certLen < 0 {
return false
}
if len(data) < certLen {
return false
}
s.certificates[i] = data[:certLen]
data = data[certLen:]
}
return len(data) == 0
} }
// sessionStateTLS13 is the content of a TLS 1.3 session ticket. Its first // sessionStateTLS13 is the content of a TLS 1.3 session ticket. Its first