mirror of
https://github.com/refraction-networking/utls.git
synced 2025-04-04 12:37:35 +03:00
[dev.boringcrypto] all: merge master into dev.boringcrypto
Change-Id: I1aa33cabd0c55fe64994b08f8a3f7b6bbfb3282c
This commit is contained in:
commit
4eb4b1adce
7 changed files with 21 additions and 18 deletions
|
@ -659,7 +659,7 @@ type Config struct {
|
||||||
// cipher suite based on logic that takes into account inferred client
|
// cipher suite based on logic that takes into account inferred client
|
||||||
// hardware, server hardware, and security.
|
// hardware, server hardware, and security.
|
||||||
//
|
//
|
||||||
// Deprected: PreferServerCipherSuites is ignored.
|
// Deprecated: PreferServerCipherSuites is ignored.
|
||||||
PreferServerCipherSuites bool
|
PreferServerCipherSuites bool
|
||||||
|
|
||||||
// SessionTicketsDisabled may be set to true to disable session ticket and
|
// SessionTicketsDisabled may be set to true to disable session ticket and
|
||||||
|
|
7
conn.go
7
conn.go
|
@ -151,6 +151,13 @@ func (c *Conn) SetWriteDeadline(t time.Time) error {
|
||||||
return c.conn.SetWriteDeadline(t)
|
return c.conn.SetWriteDeadline(t)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// NetConn returns the underlying connection that is wrapped by c.
|
||||||
|
// Note that writing to or reading from this connection directly will corrupt the
|
||||||
|
// TLS session.
|
||||||
|
func (c *Conn) NetConn() net.Conn {
|
||||||
|
return c.conn
|
||||||
|
}
|
||||||
|
|
||||||
// A halfConn represents one direction of the record layer
|
// A halfConn represents one direction of the record layer
|
||||||
// connection, either sending or receiving.
|
// connection, either sending or receiving.
|
||||||
type halfConn struct {
|
type halfConn struct {
|
||||||
|
|
|
@ -3,7 +3,6 @@
|
||||||
// license that can be found in the LICENSE file.
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
//go:build ignore
|
//go:build ignore
|
||||||
// +build ignore
|
|
||||||
|
|
||||||
// Generate a self-signed X.509 certificate for a TLS server. Outputs to
|
// Generate a self-signed X.509 certificate for a TLS server. Outputs to
|
||||||
// 'cert.pem' and 'key.pem' and will overwrite existing files.
|
// 'cert.pem' and 'key.pem' and will overwrite existing files.
|
||||||
|
|
|
@ -97,18 +97,18 @@ func (o *opensslOutputSink) Write(data []byte) (n int, err error) {
|
||||||
o.all = append(o.all, data...)
|
o.all = append(o.all, data...)
|
||||||
|
|
||||||
for {
|
for {
|
||||||
i := bytes.IndexByte(o.line, '\n')
|
line, next, ok := bytes.Cut(o.line, []byte("\n"))
|
||||||
if i < 0 {
|
if !ok {
|
||||||
break
|
break
|
||||||
}
|
}
|
||||||
|
|
||||||
if bytes.Equal([]byte(opensslEndOfHandshake), o.line[:i]) {
|
if bytes.Equal([]byte(opensslEndOfHandshake), line) {
|
||||||
o.handshakeComplete <- struct{}{}
|
o.handshakeComplete <- struct{}{}
|
||||||
}
|
}
|
||||||
if bytes.Equal([]byte(opensslReadKeyUpdate), o.line[:i]) {
|
if bytes.Equal([]byte(opensslReadKeyUpdate), line) {
|
||||||
o.readKeyUpdate <- struct{}{}
|
o.readKeyUpdate <- struct{}{}
|
||||||
}
|
}
|
||||||
o.line = o.line[i+1:]
|
o.line = next
|
||||||
}
|
}
|
||||||
|
|
||||||
return len(data), nil
|
return len(data), nil
|
||||||
|
|
|
@ -329,8 +329,7 @@ func (m *clientHelloMsg) updateBinders(pskBinders [][]byte) {
|
||||||
m.pskBinders = pskBinders
|
m.pskBinders = pskBinders
|
||||||
if m.raw != nil {
|
if m.raw != nil {
|
||||||
lenWithoutBinders := len(m.marshalWithoutBinders())
|
lenWithoutBinders := len(m.marshalWithoutBinders())
|
||||||
// TODO(filippo): replace with NewFixedBuilder once CL 148882 is imported.
|
b := cryptobyte.NewFixedBuilder(m.raw[:lenWithoutBinders])
|
||||||
b := cryptobyte.NewBuilder(m.raw[:lenWithoutBinders])
|
|
||||||
b.AddUint16LengthPrefixed(func(b *cryptobyte.Builder) {
|
b.AddUint16LengthPrefixed(func(b *cryptobyte.Builder) {
|
||||||
for _, binder := range m.pskBinders {
|
for _, binder := range m.pskBinders {
|
||||||
b.AddUint8LengthPrefixed(func(b *cryptobyte.Builder) {
|
b.AddUint8LengthPrefixed(func(b *cryptobyte.Builder) {
|
||||||
|
@ -338,7 +337,7 @@ func (m *clientHelloMsg) updateBinders(pskBinders [][]byte) {
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
})
|
})
|
||||||
if len(b.BytesOrPanic()) != len(m.raw) {
|
if out, err := b.Bytes(); err != nil || len(out) != len(m.raw) {
|
||||||
panic("tls: internal error: failed to update binders")
|
panic("tls: internal error: failed to update binders")
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -191,18 +191,17 @@ func parseTestData(r io.Reader) (flows [][]byte, err error) {
|
||||||
// Otherwise the line is a line of hex dump that looks like:
|
// Otherwise the line is a line of hex dump that looks like:
|
||||||
// 00000170 fc f5 06 bf (...) |.....X{&?......!|
|
// 00000170 fc f5 06 bf (...) |.....X{&?......!|
|
||||||
// (Some bytes have been omitted from the middle section.)
|
// (Some bytes have been omitted from the middle section.)
|
||||||
|
_, after, ok := strings.Cut(line, " ")
|
||||||
if i := strings.IndexByte(line, ' '); i >= 0 {
|
if !ok {
|
||||||
line = line[i:]
|
|
||||||
} else {
|
|
||||||
return nil, errors.New("invalid test data")
|
return nil, errors.New("invalid test data")
|
||||||
}
|
}
|
||||||
|
line = after
|
||||||
|
|
||||||
if i := strings.IndexByte(line, '|'); i >= 0 {
|
before, _, ok := strings.Cut(line, "|")
|
||||||
line = line[:i]
|
if !ok {
|
||||||
} else {
|
|
||||||
return nil, errors.New("invalid test data")
|
return nil, errors.New("invalid test data")
|
||||||
}
|
}
|
||||||
|
line = before
|
||||||
|
|
||||||
hexBytes := strings.Fields(line)
|
hexBytes := strings.Fields(line)
|
||||||
for _, hexByte := range hexBytes {
|
for _, hexByte := range hexBytes {
|
||||||
|
|
|
@ -3,7 +3,6 @@
|
||||||
// license that can be found in the LICENSE file.
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
//go:build aix || darwin || dragonfly || freebsd || linux || netbsd || openbsd || solaris
|
//go:build aix || darwin || dragonfly || freebsd || linux || netbsd || openbsd || solaris
|
||||||
// +build aix darwin dragonfly freebsd linux netbsd openbsd solaris
|
|
||||||
|
|
||||||
package tls
|
package tls
|
||||||
|
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue