mirror of
https://github.com/refraction-networking/utls.git
synced 2025-04-03 20:17:36 +03:00
* fix for tls13 when server selects a keyshare with index > 0 * Update handshake_client_tls13.go * resolved [uTLS section] problems --------- Co-authored-by: Chaos Pjeles <chaos@fqr.us>
This commit is contained in:
parent
17e2929ff7
commit
6d2506f52f
4 changed files with 67 additions and 35 deletions
|
@ -219,14 +219,15 @@ func (c *Conn) clientHandshake(ctx context.Context) (err error) {
|
||||||
|
|
||||||
if c.vers == VersionTLS13 {
|
if c.vers == VersionTLS13 {
|
||||||
hs := &clientHandshakeStateTLS13{
|
hs := &clientHandshakeStateTLS13{
|
||||||
c: c,
|
c: c,
|
||||||
ctx: ctx,
|
ctx: ctx,
|
||||||
serverHello: serverHello,
|
serverHello: serverHello,
|
||||||
hello: hello,
|
hello: hello,
|
||||||
ecdheParams: ecdheParams,
|
ecdheParams: ecdheParams,
|
||||||
session: session,
|
keySharesEcdheParams: make(KeySharesEcdheParameters, 2), // [uTLS]
|
||||||
earlySecret: earlySecret,
|
session: session,
|
||||||
binderKey: binderKey,
|
earlySecret: earlySecret,
|
||||||
|
binderKey: binderKey,
|
||||||
}
|
}
|
||||||
|
|
||||||
// In TLS 1.3, session tickets are delivered after the handshake.
|
// In TLS 1.3, session tickets are delivered after the handshake.
|
||||||
|
|
|
@ -17,12 +17,30 @@ import (
|
||||||
"time"
|
"time"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
// [uTLS SECTION START]
|
||||||
|
type KeySharesEcdheParameters map[CurveID]ecdheParameters
|
||||||
|
|
||||||
|
func (keymap KeySharesEcdheParameters) AddEcdheParams(curveID CurveID, params ecdheParameters) {
|
||||||
|
keymap[curveID] = params
|
||||||
|
}
|
||||||
|
func (keymap KeySharesEcdheParameters) GetEcdheParams(curveID CurveID) (params ecdheParameters, ok bool) {
|
||||||
|
params, ok = keymap[curveID]
|
||||||
|
return
|
||||||
|
}
|
||||||
|
func (keymap KeySharesEcdheParameters) GetPublicEcdheParams(curveID CurveID) (params EcdheParameters, ok bool) {
|
||||||
|
params, ok = keymap[curveID]
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// [uTLS SECTION END]
|
||||||
|
|
||||||
type clientHandshakeStateTLS13 struct {
|
type clientHandshakeStateTLS13 struct {
|
||||||
c *Conn
|
c *Conn
|
||||||
ctx context.Context
|
ctx context.Context
|
||||||
serverHello *serverHelloMsg
|
serverHello *serverHelloMsg
|
||||||
hello *clientHelloMsg
|
hello *clientHelloMsg
|
||||||
ecdheParams ecdheParameters
|
ecdheParams ecdheParameters
|
||||||
|
keySharesEcdheParams KeySharesEcdheParameters // [uTLS]
|
||||||
|
|
||||||
session *ClientSessionState
|
session *ClientSessionState
|
||||||
earlySecret []byte
|
earlySecret []byte
|
||||||
|
@ -55,6 +73,14 @@ func (hs *clientHandshakeStateTLS13) handshake() error {
|
||||||
return errors.New("tls: server selected TLS 1.3 in a renegotiation")
|
return errors.New("tls: server selected TLS 1.3 in a renegotiation")
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// [uTLS SECTION START]
|
||||||
|
|
||||||
|
// set echdheParams to what we received from server
|
||||||
|
if ecdheParams, ok := hs.keySharesEcdheParams.GetEcdheParams(hs.serverHello.serverShare.group); ok {
|
||||||
|
hs.ecdheParams = ecdheParams
|
||||||
|
}
|
||||||
|
// [uTLS SECTION END]
|
||||||
|
|
||||||
// Consistency check on the presence of a keyShare and its parameters.
|
// Consistency check on the presence of a keyShare and its parameters.
|
||||||
if hs.ecdheParams == nil || len(hs.hello.keyShares) < 1 { // [uTLS]
|
if hs.ecdheParams == nil || len(hs.hello.keyShares) < 1 { // [uTLS]
|
||||||
// keyshares "< 1" instead of "!= 1", as uTLS may send multiple
|
// keyshares "< 1" instead of "!= 1", as uTLS may send multiple
|
||||||
|
|
|
@ -1948,6 +1948,7 @@ func (uconn *UConn) ApplyPreset(p *ClientHelloSpec) error {
|
||||||
}
|
}
|
||||||
uconn.HandshakeState.Hello = privateHello.getPublicPtr()
|
uconn.HandshakeState.Hello = privateHello.getPublicPtr()
|
||||||
uconn.HandshakeState.State13.EcdheParams = ecdheParams
|
uconn.HandshakeState.State13.EcdheParams = ecdheParams
|
||||||
|
uconn.HandshakeState.State13.KeySharesEcdheParams = make(KeySharesEcdheParameters, 2)
|
||||||
hello := uconn.HandshakeState.Hello
|
hello := uconn.HandshakeState.Hello
|
||||||
session := uconn.HandshakeState.Session
|
session := uconn.HandshakeState.Session
|
||||||
|
|
||||||
|
@ -2050,6 +2051,7 @@ func (uconn *UConn) ApplyPreset(p *ClientHelloSpec) error {
|
||||||
return fmt.Errorf("unsupported Curve in KeyShareExtension: %v."+
|
return fmt.Errorf("unsupported Curve in KeyShareExtension: %v."+
|
||||||
"To mimic it, fill the Data(key) field manually", curveID)
|
"To mimic it, fill the Data(key) field manually", curveID)
|
||||||
}
|
}
|
||||||
|
uconn.HandshakeState.State13.KeySharesEcdheParams.AddEcdheParams(curveID, ecdheParams)
|
||||||
ext.KeyShares[i].Data = ecdheParams.PublicKey()
|
ext.KeyShares[i].Data = ecdheParams.PublicKey()
|
||||||
if !preferredCurveIsSet {
|
if !preferredCurveIsSet {
|
||||||
// only do this once for the first non-grease curve
|
// only do this once for the first non-grease curve
|
||||||
|
|
47
u_public.go
47
u_public.go
|
@ -34,15 +34,16 @@ type PubClientHandshakeState struct {
|
||||||
|
|
||||||
// TLS 1.3 only
|
// TLS 1.3 only
|
||||||
type TLS13OnlyState struct {
|
type TLS13OnlyState struct {
|
||||||
Suite *PubCipherSuiteTLS13
|
Suite *PubCipherSuiteTLS13
|
||||||
EcdheParams EcdheParameters
|
EcdheParams EcdheParameters
|
||||||
EarlySecret []byte
|
KeySharesEcdheParams KeySharesEcdheParameters
|
||||||
BinderKey []byte
|
EarlySecret []byte
|
||||||
CertReq *CertificateRequestMsgTLS13
|
BinderKey []byte
|
||||||
UsingPSK bool
|
CertReq *CertificateRequestMsgTLS13
|
||||||
SentDummyCCS bool
|
UsingPSK bool
|
||||||
Transcript hash.Hash
|
SentDummyCCS bool
|
||||||
TrafficSecret []byte // client_application_traffic_secret_0
|
Transcript hash.Hash
|
||||||
|
TrafficSecret []byte // client_application_traffic_secret_0
|
||||||
}
|
}
|
||||||
|
|
||||||
// TLS 1.2 and before only
|
// TLS 1.2 and before only
|
||||||
|
@ -56,10 +57,11 @@ func (chs *PubClientHandshakeState) toPrivate13() *clientHandshakeStateTLS13 {
|
||||||
return nil
|
return nil
|
||||||
} else {
|
} else {
|
||||||
return &clientHandshakeStateTLS13{
|
return &clientHandshakeStateTLS13{
|
||||||
c: chs.C,
|
c: chs.C,
|
||||||
serverHello: chs.ServerHello.getPrivatePtr(),
|
serverHello: chs.ServerHello.getPrivatePtr(),
|
||||||
hello: chs.Hello.getPrivatePtr(),
|
hello: chs.Hello.getPrivatePtr(),
|
||||||
ecdheParams: chs.State13.EcdheParams,
|
ecdheParams: chs.State13.EcdheParams,
|
||||||
|
keySharesEcdheParams: chs.State13.KeySharesEcdheParams,
|
||||||
|
|
||||||
session: chs.Session,
|
session: chs.Session,
|
||||||
earlySecret: chs.State13.EarlySecret,
|
earlySecret: chs.State13.EarlySecret,
|
||||||
|
@ -83,15 +85,16 @@ func (chs13 *clientHandshakeStateTLS13) toPublic13() *PubClientHandshakeState {
|
||||||
return nil
|
return nil
|
||||||
} else {
|
} else {
|
||||||
tls13State := TLS13OnlyState{
|
tls13State := TLS13OnlyState{
|
||||||
EcdheParams: chs13.ecdheParams,
|
KeySharesEcdheParams: chs13.keySharesEcdheParams,
|
||||||
EarlySecret: chs13.earlySecret,
|
EcdheParams: chs13.ecdheParams,
|
||||||
BinderKey: chs13.binderKey,
|
EarlySecret: chs13.earlySecret,
|
||||||
CertReq: chs13.certReq.toPublic(),
|
BinderKey: chs13.binderKey,
|
||||||
UsingPSK: chs13.usingPSK,
|
CertReq: chs13.certReq.toPublic(),
|
||||||
SentDummyCCS: chs13.sentDummyCCS,
|
UsingPSK: chs13.usingPSK,
|
||||||
Suite: chs13.suite.toPublic(),
|
SentDummyCCS: chs13.sentDummyCCS,
|
||||||
TrafficSecret: chs13.trafficSecret,
|
Suite: chs13.suite.toPublic(),
|
||||||
Transcript: chs13.transcript,
|
TrafficSecret: chs13.trafficSecret,
|
||||||
|
Transcript: chs13.transcript,
|
||||||
}
|
}
|
||||||
return &PubClientHandshakeState{
|
return &PubClientHandshakeState{
|
||||||
C: chs13.c,
|
C: chs13.c,
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue