mirror of
https://github.com/refraction-networking/utls.git
synced 2025-04-04 20:47:36 +03:00
new: enable PQ parrots (#225)
* Redesign KeySharesEcdheParameters into KeySharesParameters which supports multiple types of keys. * Optimize program logic to prevent using unwanted keys
This commit is contained in:
parent
6c1a910019
commit
6663294864
5 changed files with 192 additions and 97 deletions
|
@ -138,7 +138,7 @@ func (c *Conn) makeClientHello() (*clientHelloMsg, clientKeySharePrivate, error)
|
||||||
hello.supportedSignatureAlgorithms = testingOnlyForceClientHelloSignatureAlgorithms
|
hello.supportedSignatureAlgorithms = testingOnlyForceClientHelloSignatureAlgorithms
|
||||||
}
|
}
|
||||||
|
|
||||||
var secret clientKeySharePrivate
|
var secret clientKeySharePrivate // [UTLS]
|
||||||
if hello.supportedVersions[0] == VersionTLS13 {
|
if hello.supportedVersions[0] == VersionTLS13 {
|
||||||
// Reset the list of ciphers when the client only supports TLS 1.3.
|
// Reset the list of ciphers when the client only supports TLS 1.3.
|
||||||
if len(hello.supportedVersions) == 1 {
|
if len(hello.supportedVersions) == 1 {
|
||||||
|
@ -280,7 +280,7 @@ func (c *Conn) clientHandshake(ctx context.Context) (err error) {
|
||||||
earlySecret: earlySecret,
|
earlySecret: earlySecret,
|
||||||
binderKey: binderKey,
|
binderKey: binderKey,
|
||||||
|
|
||||||
keySharesEcdheParams: make(KeySharesEcdheParameters, 2), // [uTLS]
|
keySharesParams: NewKeySharesParameters(), // [uTLS]
|
||||||
}
|
}
|
||||||
|
|
||||||
if ecdheKey, ok := keySharePrivate.(*ecdh.PrivateKey); ok {
|
if ecdheKey, ok := keySharePrivate.(*ecdh.PrivateKey); ok {
|
||||||
|
|
|
@ -15,20 +15,61 @@ import (
|
||||||
"fmt"
|
"fmt"
|
||||||
"hash"
|
"hash"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
|
"github.com/cloudflare/circl/kem"
|
||||||
)
|
)
|
||||||
|
|
||||||
// [uTLS SECTION START]
|
// [uTLS SECTION START]
|
||||||
type KeySharesEcdheParameters map[CurveID]*ecdh.PrivateKey
|
// KeySharesParameters serves as a in-memory storage for generated keypairs by UTLS when generating
|
||||||
|
// ClientHello. It is used to store both ecdhe and kem keypairs.
|
||||||
|
type KeySharesParameters struct {
|
||||||
|
ecdhePrivKeymap map[CurveID]*ecdh.PrivateKey
|
||||||
|
ecdhePubKeymap map[CurveID]*ecdh.PublicKey
|
||||||
|
|
||||||
func (keymap KeySharesEcdheParameters) AddEcdheParams(curveID CurveID, ecdheKey *ecdh.PrivateKey) {
|
// based on cloudflare/go
|
||||||
keymap[curveID] = ecdheKey
|
kemPrivKeymap map[CurveID]kem.PrivateKey
|
||||||
|
kemPubKeymap map[CurveID]kem.PublicKey
|
||||||
}
|
}
|
||||||
func (keymap KeySharesEcdheParameters) GetEcdheParams(curveID CurveID) (ecdheKey *ecdh.PrivateKey, ok bool) {
|
|
||||||
ecdheKey, ok = keymap[curveID]
|
func NewKeySharesParameters() *KeySharesParameters {
|
||||||
|
return &KeySharesParameters{
|
||||||
|
ecdhePrivKeymap: make(map[CurveID]*ecdh.PrivateKey),
|
||||||
|
ecdhePubKeymap: make(map[CurveID]*ecdh.PublicKey),
|
||||||
|
|
||||||
|
kemPrivKeymap: make(map[CurveID]kem.PrivateKey),
|
||||||
|
kemPubKeymap: make(map[CurveID]kem.PublicKey),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (ksp *KeySharesParameters) AddEcdheKeypair(curveID CurveID, ecdheKey *ecdh.PrivateKey, ecdhePubKey *ecdh.PublicKey) {
|
||||||
|
ksp.ecdhePrivKeymap[curveID] = ecdheKey
|
||||||
|
ksp.ecdhePubKeymap[curveID] = ecdhePubKey
|
||||||
|
}
|
||||||
|
|
||||||
|
func (ksp *KeySharesParameters) GetEcdheKey(curveID CurveID) (ecdheKey *ecdh.PrivateKey, ok bool) {
|
||||||
|
ecdheKey, ok = ksp.ecdhePrivKeymap[curveID]
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
func (keymap KeySharesEcdheParameters) GetPublicEcdheParams(curveID CurveID) (params *ecdh.PrivateKey, ok bool) {
|
|
||||||
params, ok = keymap[curveID]
|
func (ksp *KeySharesParameters) GetEcdhePubkey(curveID CurveID) (params *ecdh.PublicKey, ok bool) {
|
||||||
|
params, ok = ksp.ecdhePubKeymap[curveID]
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
func (ksp *KeySharesParameters) AddKemKeypair(curveID CurveID, kemKey kem.PrivateKey, kemPubKey kem.PublicKey) {
|
||||||
|
if curveIdToCirclScheme(curveID) != nil { // only store for circl schemes
|
||||||
|
ksp.kemPrivKeymap[curveID] = kemKey
|
||||||
|
ksp.kemPubKeymap[curveID] = kemPubKey
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (ksp *KeySharesParameters) GetKemKey(curveID CurveID) (kemKey kem.PrivateKey, ok bool) {
|
||||||
|
kemKey, ok = ksp.kemPrivKeymap[curveID]
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
func (ksp *KeySharesParameters) GetKemPubkey(curveID CurveID) (params kem.PublicKey, ok bool) {
|
||||||
|
params, ok = ksp.kemPubKeymap[curveID]
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -40,9 +81,8 @@ type clientHandshakeStateTLS13 struct {
|
||||||
serverHello *serverHelloMsg
|
serverHello *serverHelloMsg
|
||||||
hello *clientHelloMsg
|
hello *clientHelloMsg
|
||||||
ecdheKey *ecdh.PrivateKey
|
ecdheKey *ecdh.PrivateKey
|
||||||
keySharesEcdheParams KeySharesEcdheParameters // [uTLS]
|
kemKey *kemPrivateKey // [uTLS] ported from cloudflare/go
|
||||||
kemKey *kemPrivateKey // [uTLS]
|
keySharesParams *KeySharesParameters // [uTLS] support both ecdhe and kem
|
||||||
// keySharesCirclParams KeySharesCirclParameters // [uTLS] TODO: perhaps implement?
|
|
||||||
|
|
||||||
session *SessionState
|
session *SessionState
|
||||||
earlySecret []byte
|
earlySecret []byte
|
||||||
|
@ -77,10 +117,18 @@ func (hs *clientHandshakeStateTLS13) handshake() error {
|
||||||
}
|
}
|
||||||
|
|
||||||
// [uTLS SECTION START]
|
// [uTLS SECTION START]
|
||||||
|
|
||||||
// set echdheParams to what we received from server
|
// set echdheParams to what we received from server
|
||||||
if ecdheKey, ok := hs.keySharesEcdheParams.GetEcdheParams(hs.serverHello.serverShare.group); ok {
|
if ecdheKey, ok := hs.keySharesParams.GetEcdheKey(hs.serverHello.serverShare.group); ok {
|
||||||
hs.ecdheKey = ecdheKey
|
hs.ecdheKey = ecdheKey
|
||||||
|
hs.kemKey = nil // unset kemKey if any
|
||||||
|
}
|
||||||
|
// set kemParams to what we received from server
|
||||||
|
if kemKey, ok := hs.keySharesParams.GetKemKey(hs.serverHello.serverShare.group); ok {
|
||||||
|
hs.kemKey = &kemPrivateKey{
|
||||||
|
secretKey: kemKey,
|
||||||
|
curveID: hs.serverHello.serverShare.group,
|
||||||
|
}
|
||||||
|
hs.ecdheKey = nil // unset ecdheKey if any
|
||||||
}
|
}
|
||||||
// [uTLS SECTION END]
|
// [uTLS SECTION END]
|
||||||
|
|
||||||
|
@ -466,20 +514,22 @@ func (hs *clientHandshakeStateTLS13) processServerHello() error {
|
||||||
c.sendAlert(alertIllegalParameter)
|
c.sendAlert(alertIllegalParameter)
|
||||||
return errors.New("tls: server did not send a key share")
|
return errors.New("tls: server did not send a key share")
|
||||||
}
|
}
|
||||||
if hs.ecdheKey != nil {
|
|
||||||
if sentID, _ := curveIDForCurve(hs.ecdheKey.Curve()); hs.serverHello.serverShare.group != sentID {
|
// [UTLS SECTION BEGINS]
|
||||||
|
var supportedGroupCompatible bool
|
||||||
|
if hs.ecdheKey != nil { // if we did send ECDHE KeyShare
|
||||||
|
if sentID, _ := curveIDForCurve(hs.ecdheKey.Curve()); hs.serverHello.serverShare.group == sentID { // and server selected ECDHE KeyShare
|
||||||
|
supportedGroupCompatible = true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if hs.kemKey != nil && clientKeySharePrivateCurveID(hs.kemKey) == hs.serverHello.serverShare.group { // we did send KEM KeyShare and server selected KEM KeyShare
|
||||||
|
supportedGroupCompatible = true
|
||||||
|
}
|
||||||
|
if !supportedGroupCompatible { // none matched
|
||||||
c.sendAlert(alertIllegalParameter)
|
c.sendAlert(alertIllegalParameter)
|
||||||
return errors.New("tls: server selected unsupported group")
|
return errors.New("tls: server selected unsupported group")
|
||||||
}
|
}
|
||||||
} else if hs.kemKey != nil {
|
// [UTLS SECTION ENDS]
|
||||||
if clientKeySharePrivateCurveID(hs.kemKey) != hs.serverHello.serverShare.group {
|
|
||||||
c.sendAlert(alertIllegalParameter)
|
|
||||||
return errors.New("tls: server selected unsupported group")
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
c.sendAlert(alertInternalError)
|
|
||||||
return errors.New("tls: ecdheKey and kemKey are both nil")
|
|
||||||
}
|
|
||||||
|
|
||||||
if !hs.serverHello.selectedIdentityPresent {
|
if !hs.serverHello.selectedIdentityPresent {
|
||||||
return nil
|
return nil
|
||||||
|
@ -521,6 +571,7 @@ func (hs *clientHandshakeStateTLS13) establishHandshakeKeys() error {
|
||||||
var err error
|
var err error
|
||||||
|
|
||||||
if hs.ecdheKey != nil {
|
if hs.ecdheKey != nil {
|
||||||
|
if ecdheCurveID, _ := curveIDForCurve(hs.ecdheKey.Curve()); ecdheCurveID == hs.serverHello.serverShare.group {
|
||||||
peerKey, err := hs.ecdheKey.Curve().NewPublicKey(hs.serverHello.serverShare.data)
|
peerKey, err := hs.ecdheKey.Curve().NewPublicKey(hs.serverHello.serverShare.data)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
c.sendAlert(alertIllegalParameter)
|
c.sendAlert(alertIllegalParameter)
|
||||||
|
@ -531,14 +582,17 @@ func (hs *clientHandshakeStateTLS13) establishHandshakeKeys() error {
|
||||||
c.sendAlert(alertIllegalParameter)
|
c.sendAlert(alertIllegalParameter)
|
||||||
return errors.New("tls: invalid server key share")
|
return errors.New("tls: invalid server key share")
|
||||||
}
|
}
|
||||||
} else if hs.kemKey != nil {
|
}
|
||||||
|
}
|
||||||
|
if sharedKey == nil && hs.kemKey != nil && clientKeySharePrivateCurveID(hs.kemKey) == hs.serverHello.serverShare.group {
|
||||||
sk := hs.kemKey.secretKey
|
sk := hs.kemKey.secretKey
|
||||||
sharedKey, err = sk.Scheme().Decapsulate(sk, hs.serverHello.serverShare.data)
|
sharedKey, err = sk.Scheme().Decapsulate(sk, hs.serverHello.serverShare.data)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
c.sendAlert(alertIllegalParameter)
|
c.sendAlert(alertIllegalParameter)
|
||||||
return fmt.Errorf("%s decaps: %w", sk.Scheme().Name(), err)
|
return fmt.Errorf("%s decaps: %w", sk.Scheme().Name(), err)
|
||||||
}
|
}
|
||||||
} else {
|
}
|
||||||
|
if sharedKey == nil {
|
||||||
c.sendAlert(alertInternalError)
|
c.sendAlert(alertInternalError)
|
||||||
return errors.New("tls: ecdheKey and circlKey are both nil")
|
return errors.New("tls: ecdheKey and circlKey are both nil")
|
||||||
}
|
}
|
||||||
|
|
|
@ -7,7 +7,6 @@ package tls
|
||||||
import (
|
import (
|
||||||
"bytes"
|
"bytes"
|
||||||
"compress/zlib"
|
"compress/zlib"
|
||||||
"crypto/ecdh"
|
|
||||||
"errors"
|
"errors"
|
||||||
"fmt"
|
"fmt"
|
||||||
"io"
|
"io"
|
||||||
|
@ -164,7 +163,7 @@ func (hs *clientHandshakeStateTLS13) utlsReadServerParameters(encryptedExtension
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *Conn) makeClientHelloForApplyPreset() (*clientHelloMsg, *ecdh.PrivateKey, error) {
|
func (c *Conn) makeClientHelloForApplyPreset() (*clientHelloMsg, clientKeySharePrivate, error) {
|
||||||
config := c.config
|
config := c.config
|
||||||
|
|
||||||
// [UTLS SECTION START]
|
// [UTLS SECTION START]
|
||||||
|
@ -261,7 +260,7 @@ func (c *Conn) makeClientHelloForApplyPreset() (*clientHelloMsg, *ecdh.PrivateKe
|
||||||
hello.supportedSignatureAlgorithms = testingOnlyForceClientHelloSignatureAlgorithms
|
hello.supportedSignatureAlgorithms = testingOnlyForceClientHelloSignatureAlgorithms
|
||||||
}
|
}
|
||||||
|
|
||||||
var key *ecdh.PrivateKey
|
var secret clientKeySharePrivate // [UTLS]
|
||||||
if hello.supportedVersions[0] == VersionTLS13 {
|
if hello.supportedVersions[0] == VersionTLS13 {
|
||||||
// Reset the list of ciphers when the client only supports TLS 1.3.
|
// Reset the list of ciphers when the client only supports TLS 1.3.
|
||||||
if len(hello.supportedVersions) == 1 {
|
if len(hello.supportedVersions) == 1 {
|
||||||
|
@ -273,15 +272,32 @@ func (c *Conn) makeClientHelloForApplyPreset() (*clientHelloMsg, *ecdh.PrivateKe
|
||||||
hello.cipherSuites = append(hello.cipherSuites, defaultCipherSuitesTLS13NoAES...)
|
hello.cipherSuites = append(hello.cipherSuites, defaultCipherSuitesTLS13NoAES...)
|
||||||
}
|
}
|
||||||
|
|
||||||
curveID := config.curvePreferences()[0]
|
// curveID := config.curvePreferences()[0]
|
||||||
if _, ok := curveForCurveID(curveID); !ok {
|
// // [UTLS SECTION BEGINS]
|
||||||
return nil, nil, errors.New("tls: CurvePreferences includes unsupported curve")
|
// // Ported from cloudflare/go with modifications to preserve crypto/tls compatibility
|
||||||
}
|
// if scheme := curveIdToCirclScheme(curveID); scheme != nil {
|
||||||
key, err = generateECDHEKey(config.rand(), curveID)
|
// pk, sk, err := generateKemKeyPair(scheme, curveID, config.rand())
|
||||||
if err != nil {
|
// if err != nil {
|
||||||
return nil, nil, err
|
// return nil, nil, fmt.Errorf("generateKemKeyPair %s: %w", scheme.Name(), err)
|
||||||
}
|
// }
|
||||||
hello.keyShares = []keyShare{{group: curveID, data: key.PublicKey().Bytes()}}
|
// packedPk, err := pk.MarshalBinary()
|
||||||
|
// if err != nil {
|
||||||
|
// return nil, nil, fmt.Errorf("pack circl public key %s: %w", scheme.Name(), err)
|
||||||
|
// }
|
||||||
|
// hello.keyShares = []keyShare{{group: curveID, data: packedPk}}
|
||||||
|
// secret = sk
|
||||||
|
// } else {
|
||||||
|
// if _, ok := curveForCurveID(curveID); !ok {
|
||||||
|
// return nil, nil, errors.New("tls: CurvePreferences includes unsupported curve")
|
||||||
|
// }
|
||||||
|
// key, err := generateECDHEKey(config.rand(), curveID)
|
||||||
|
// if err != nil {
|
||||||
|
// return nil, nil, err
|
||||||
|
// }
|
||||||
|
// hello.keyShares = []keyShare{{group: curveID, data: key.PublicKey().Bytes()}}
|
||||||
|
// secret = key
|
||||||
|
// }
|
||||||
|
// // [UTLS SECTION ENDS]
|
||||||
}
|
}
|
||||||
|
|
||||||
// [UTLS] We don't need this, since it is not ready yet
|
// [UTLS] We don't need this, since it is not ready yet
|
||||||
|
@ -296,5 +312,5 @@ func (c *Conn) makeClientHelloForApplyPreset() (*clientHelloMsg, *ecdh.PrivateKe
|
||||||
// hello.quicTransportParameters = p
|
// hello.quicTransportParameters = p
|
||||||
// }
|
// }
|
||||||
|
|
||||||
return hello, key, nil
|
return hello, secret, nil
|
||||||
}
|
}
|
||||||
|
|
31
u_parrots.go
31
u_parrots.go
|
@ -5,6 +5,7 @@
|
||||||
package tls
|
package tls
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"crypto/ecdh"
|
||||||
"crypto/sha256"
|
"crypto/sha256"
|
||||||
"encoding/binary"
|
"encoding/binary"
|
||||||
"errors"
|
"errors"
|
||||||
|
@ -2013,13 +2014,17 @@ func (uconn *UConn) ApplyPreset(p *ClientHelloSpec) error {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
privateHello, ecdheKey, err := uconn.makeClientHelloForApplyPreset()
|
privateHello, clientKeySharePrivate, err := uconn.makeClientHelloForApplyPreset()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
uconn.HandshakeState.Hello = privateHello.getPublicPtr()
|
uconn.HandshakeState.Hello = privateHello.getPublicPtr()
|
||||||
|
if ecdheKey, ok := clientKeySharePrivate.(*ecdh.PrivateKey); ok {
|
||||||
uconn.HandshakeState.State13.EcdheKey = ecdheKey
|
uconn.HandshakeState.State13.EcdheKey = ecdheKey
|
||||||
uconn.HandshakeState.State13.KeySharesEcdheParams = make(KeySharesEcdheParameters, 2)
|
} else if kemKey, ok := clientKeySharePrivate.(*kemPrivateKey); ok {
|
||||||
|
uconn.HandshakeState.State13.KEMKey = kemKey.ToPublic()
|
||||||
|
}
|
||||||
|
uconn.HandshakeState.State13.KeySharesParams = NewKeySharesParameters()
|
||||||
hello := uconn.HandshakeState.Hello
|
hello := uconn.HandshakeState.Hello
|
||||||
session := uconn.HandshakeState.Session
|
session := uconn.HandshakeState.Session
|
||||||
|
|
||||||
|
@ -2119,12 +2124,31 @@ func (uconn *UConn) ApplyPreset(p *ClientHelloSpec) error {
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if scheme := curveIdToCirclScheme(curveID); scheme != nil {
|
||||||
|
pk, sk, err := generateKemKeyPair(scheme, curveID, uconn.config.rand())
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("HRR generateKemKeyPair %s: %w",
|
||||||
|
scheme.Name(), err)
|
||||||
|
}
|
||||||
|
packedPk, err := pk.MarshalBinary()
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("HRR pack circl public key %s: %w",
|
||||||
|
scheme.Name(), err)
|
||||||
|
}
|
||||||
|
uconn.HandshakeState.State13.KeySharesParams.AddKemKeypair(curveID, sk.secretKey, pk)
|
||||||
|
ext.KeyShares[i].Data = packedPk
|
||||||
|
if !preferredCurveIsSet {
|
||||||
|
// only do this once for the first non-grease curve
|
||||||
|
uconn.HandshakeState.State13.KEMKey = sk.ToPublic()
|
||||||
|
preferredCurveIsSet = true
|
||||||
|
}
|
||||||
|
} else {
|
||||||
ecdheKey, err := generateECDHEKey(uconn.config.rand(), curveID)
|
ecdheKey, err := generateECDHEKey(uconn.config.rand(), curveID)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("unsupported Curve in KeyShareExtension: %v."+
|
return fmt.Errorf("unsupported Curve in KeyShareExtension: %v."+
|
||||||
"To mimic it, fill the Data(key) field manually", curveID)
|
"To mimic it, fill the Data(key) field manually", curveID)
|
||||||
}
|
}
|
||||||
uconn.HandshakeState.State13.KeySharesEcdheParams.AddEcdheParams(curveID, ecdheKey)
|
uconn.HandshakeState.State13.KeySharesParams.AddEcdheKeypair(curveID, ecdheKey, ecdheKey.PublicKey())
|
||||||
ext.KeyShares[i].Data = ecdheKey.PublicKey().Bytes()
|
ext.KeyShares[i].Data = ecdheKey.PublicKey().Bytes()
|
||||||
if !preferredCurveIsSet {
|
if !preferredCurveIsSet {
|
||||||
// only do this once for the first non-grease curve
|
// only do this once for the first non-grease curve
|
||||||
|
@ -2132,6 +2156,7 @@ func (uconn *UConn) ApplyPreset(p *ClientHelloSpec) error {
|
||||||
preferredCurveIsSet = true
|
preferredCurveIsSet = true
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
}
|
||||||
case *SupportedVersionsExtension:
|
case *SupportedVersionsExtension:
|
||||||
for i := range ext.Versions {
|
for i := range ext.Versions {
|
||||||
if isGREASEUint16(ext.Versions[i]) { // just in case the user set a GREASE value instead of unGREASEd
|
if isGREASEUint16(ext.Versions[i]) { // just in case the user set a GREASE value instead of unGREASEd
|
||||||
|
|
|
@ -40,7 +40,7 @@ type PubClientHandshakeState struct {
|
||||||
type TLS13OnlyState struct {
|
type TLS13OnlyState struct {
|
||||||
Suite *PubCipherSuiteTLS13
|
Suite *PubCipherSuiteTLS13
|
||||||
EcdheKey *ecdh.PrivateKey
|
EcdheKey *ecdh.PrivateKey
|
||||||
KeySharesEcdheParams KeySharesEcdheParameters
|
KeySharesParams *KeySharesParameters
|
||||||
KEMKey *KemPrivateKey
|
KEMKey *KemPrivateKey
|
||||||
EarlySecret []byte
|
EarlySecret []byte
|
||||||
BinderKey []byte
|
BinderKey []byte
|
||||||
|
@ -66,7 +66,7 @@ func (chs *PubClientHandshakeState) toPrivate13() *clientHandshakeStateTLS13 {
|
||||||
serverHello: chs.ServerHello.getPrivatePtr(),
|
serverHello: chs.ServerHello.getPrivatePtr(),
|
||||||
hello: chs.Hello.getPrivatePtr(),
|
hello: chs.Hello.getPrivatePtr(),
|
||||||
ecdheKey: chs.State13.EcdheKey,
|
ecdheKey: chs.State13.EcdheKey,
|
||||||
keySharesEcdheParams: chs.State13.KeySharesEcdheParams,
|
keySharesParams: chs.State13.KeySharesParams,
|
||||||
kemKey: chs.State13.KEMKey.ToPrivate(),
|
kemKey: chs.State13.KEMKey.ToPrivate(),
|
||||||
|
|
||||||
session: chs.Session,
|
session: chs.Session,
|
||||||
|
@ -91,7 +91,7 @@ func (chs13 *clientHandshakeStateTLS13) toPublic13() *PubClientHandshakeState {
|
||||||
return nil
|
return nil
|
||||||
} else {
|
} else {
|
||||||
tls13State := TLS13OnlyState{
|
tls13State := TLS13OnlyState{
|
||||||
KeySharesEcdheParams: chs13.keySharesEcdheParams,
|
KeySharesParams: chs13.keySharesParams,
|
||||||
EcdheKey: chs13.ecdheKey,
|
EcdheKey: chs13.ecdheKey,
|
||||||
KEMKey: chs13.kemKey.ToPublic(),
|
KEMKey: chs13.kemKey.ToPublic(),
|
||||||
EarlySecret: chs13.earlySecret,
|
EarlySecret: chs13.earlySecret,
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue