[dev.boringcrypto] all: merge master into dev.boringcrypto

Change-Id: Ic5f71c04f08c03319c043f35be501875adb0a3b0
This commit is contained in:
Chressie Himpel 2022-04-27 20:09:28 +02:00
commit 707ce18f5e
4 changed files with 34 additions and 15 deletions

View file

@ -18,7 +18,6 @@ import (
"crypto/x509" "crypto/x509"
"errors" "errors"
"fmt" "fmt"
"internal/godebug"
"io" "io"
"net" "net"
"strings" "strings"
@ -977,9 +976,6 @@ var supportedVersions = []uint16{
VersionTLS10, VersionTLS10,
} }
// debugEnableTLS10 enables TLS 1.0. See issue 45428.
var debugEnableTLS10 = godebug.Get("tls10default") == "1"
// roleClient and roleServer are meant to call supportedVersions and parents // roleClient and roleServer are meant to call supportedVersions and parents
// with more readability at the callsite. // with more readability at the callsite.
const roleClient = true const roleClient = true
@ -991,7 +987,7 @@ func (c *Config) supportedVersions(isClient bool) []uint16 {
if needFIPS() && (v < fipsMinVersion(c) || v > fipsMaxVersion(c)) { if needFIPS() && (v < fipsMinVersion(c) || v > fipsMaxVersion(c)) {
continue continue
} }
if (c == nil || c.MinVersion == 0) && !debugEnableTLS10 && if (c == nil || c.MinVersion == 0) &&
isClient && v < VersionTLS12 { isClient && v < VersionTLS12 {
continue continue
} }

View file

@ -384,6 +384,7 @@ func (m *clientHelloMsg) unmarshal(data []byte) bool {
return false return false
} }
seenExts := make(map[uint16]bool)
for !extensions.Empty() { for !extensions.Empty() {
var extension uint16 var extension uint16
var extData cryptobyte.String var extData cryptobyte.String
@ -392,6 +393,11 @@ func (m *clientHelloMsg) unmarshal(data []byte) bool {
return false return false
} }
if seenExts[extension] {
return false
}
seenExts[extension] = true
switch extension { switch extension {
case extensionServerName: case extensionServerName:
// RFC 6066, Section 3 // RFC 6066, Section 3
@ -750,6 +756,7 @@ func (m *serverHelloMsg) unmarshal(data []byte) bool {
return false return false
} }
seenExts := make(map[uint16]bool)
for !extensions.Empty() { for !extensions.Empty() {
var extension uint16 var extension uint16
var extData cryptobyte.String var extData cryptobyte.String
@ -758,6 +765,11 @@ func (m *serverHelloMsg) unmarshal(data []byte) bool {
return false return false
} }
if seenExts[extension] {
return false
}
seenExts[extension] = true
switch extension { switch extension {
case extensionStatusRequest: case extensionStatusRequest:
m.ocspStapling = true m.ocspStapling = true

View file

@ -6,6 +6,7 @@ package tls
import ( import (
"bytes" "bytes"
"encoding/hex"
"math/rand" "math/rand"
"reflect" "reflect"
"strings" "strings"
@ -463,3 +464,23 @@ func TestRejectEmptySCT(t *testing.T) {
t.Fatal("Unmarshaled ServerHello with zero-length SCT") t.Fatal("Unmarshaled ServerHello with zero-length SCT")
} }
} }
func TestRejectDuplicateExtensions(t *testing.T) {
clientHelloBytes, err := hex.DecodeString("010000440303000000000000000000000000000000000000000000000000000000000000000000000000001c0000000a000800000568656c6c6f0000000a000800000568656c6c6f")
if err != nil {
t.Fatalf("failed to decode test ClientHello: %s", err)
}
var clientHelloCopy clientHelloMsg
if clientHelloCopy.unmarshal(clientHelloBytes) {
t.Error("Unmarshaled ClientHello with duplicate extensions")
}
serverHelloBytes, err := hex.DecodeString("02000030030300000000000000000000000000000000000000000000000000000000000000000000000000080005000000050000")
if err != nil {
t.Fatalf("failed to decode test ServerHello: %s", err)
}
var serverHelloCopy serverHelloMsg
if serverHelloCopy.unmarshal(serverHelloBytes) {
t.Fatal("Unmarshaled ServerHello with duplicate extensions")
}
}

View file

@ -400,16 +400,6 @@ func TestVersion(t *testing.T) {
if err == nil { if err == nil {
t.Fatalf("expected failure to connect with TLS 1.0/1.1") t.Fatalf("expected failure to connect with TLS 1.0/1.1")
} }
defer func(old bool) { debugEnableTLS10 = old }(debugEnableTLS10)
debugEnableTLS10 = true
_, _, err = testHandshake(t, clientConfig, serverConfig)
if err != nil {
t.Fatalf("handshake failed: %s", err)
}
if state.Version != VersionTLS11 {
t.Fatalf("incorrect version %x, should be %x", state.Version, VersionTLS11)
}
} }
func TestCipherSuitePreference(t *testing.T) { func TestCipherSuitePreference(t *testing.T) {