mirror of
https://github.com/refraction-networking/utls.git
synced 2025-04-03 20:17:36 +03:00
sync: merge changes from go 1.23.4
This commit is contained in:
commit
cefe226467
98 changed files with 8089 additions and 4530 deletions
25
conn.go
25
conn.go
|
@ -47,7 +47,9 @@ type Conn struct {
|
|||
handshakes int
|
||||
extMasterSecret bool
|
||||
didResume bool // whether this connection was a session resumption
|
||||
didHRR bool // whether a HelloRetryRequest was sent/received
|
||||
cipherSuite uint16
|
||||
curveID CurveID
|
||||
ocspResponse []byte // stapled OCSP response
|
||||
scts [][]byte // signed certificate timestamps from server
|
||||
peerCertificates []*x509.Certificate
|
||||
|
@ -68,6 +70,7 @@ type Conn struct {
|
|||
// resumptionSecret is the resumption_master_secret for handling
|
||||
// or sending NewSessionTicket messages.
|
||||
resumptionSecret []byte
|
||||
echAccepted bool
|
||||
|
||||
// ticketKeys is the set of active session ticket keys for this
|
||||
// connection. The first one is used to encrypt new tickets and
|
||||
|
@ -1041,7 +1044,7 @@ func (c *Conn) writeRecordLocked(typ recordType, data []byte) (int, error) {
|
|||
}
|
||||
|
||||
// writeHandshakeRecord writes a handshake message to the connection and updates
|
||||
// the record layer state. If transcript is non-nil the marshalled message is
|
||||
// the record layer state. If transcript is non-nil the marshaled message is
|
||||
// written to it.
|
||||
func (c *Conn) writeHandshakeRecord(msg handshakeMessage, transcript transcriptHash) (int, error) {
|
||||
c.out.Lock()
|
||||
|
@ -1088,10 +1091,22 @@ func (c *Conn) readHandshake(transcript transcriptHash) (any, error) {
|
|||
return nil, err
|
||||
}
|
||||
data := c.hand.Bytes()
|
||||
|
||||
maxHandshakeSize := maxHandshake
|
||||
// hasVers indicates we're past the first message, forcing someone trying to
|
||||
// make us just allocate a large buffer to at least do the initial part of
|
||||
// the handshake first.
|
||||
if c.haveVers && data[0] == typeCertificate {
|
||||
// Since certificate messages are likely to be the only messages that
|
||||
// can be larger than maxHandshake, we use a special limit for just
|
||||
// those messages.
|
||||
maxHandshakeSize = maxHandshakeCertificateMsg
|
||||
}
|
||||
|
||||
n := int(data[1])<<16 | int(data[2])<<8 | int(data[3])
|
||||
if n > maxHandshake {
|
||||
if n > maxHandshakeSize {
|
||||
c.sendAlertLocked(alertInternalError)
|
||||
return nil, c.in.setErrorLocked(fmt.Errorf("tls: handshake message of length %d bytes exceeds maximum of %d bytes", n, maxHandshake))
|
||||
return nil, c.in.setErrorLocked(fmt.Errorf("tls: handshake message of length %d bytes exceeds maximum of %d bytes", n, maxHandshakeSize))
|
||||
}
|
||||
if err := c.readHandshakeBytes(4 + n); err != nil {
|
||||
return nil, err
|
||||
|
@ -1618,6 +1633,9 @@ func (c *Conn) connectionStateLocked() ConnectionState {
|
|||
state.Version = c.vers
|
||||
state.NegotiatedProtocol = c.clientProtocol
|
||||
state.DidResume = c.didResume
|
||||
state.testingOnlyDidHRR = c.didHRR
|
||||
// c.curveID is not set on TLS 1.0–1.2 resumptions. Fix that before exposing it.
|
||||
state.testingOnlyCurveID = c.curveID
|
||||
state.NegotiatedProtocolIsMutual = true
|
||||
state.ServerName = c.serverName
|
||||
state.CipherSuite = c.cipherSuite
|
||||
|
@ -1648,6 +1666,7 @@ func (c *Conn) connectionStateLocked() ConnectionState {
|
|||
} else {
|
||||
state.ekm = c.ekm
|
||||
}
|
||||
state.ECHAccepted = c.echAccepted
|
||||
// [UTLS SECTION START]
|
||||
c.utlsConnectionStateLocked(&state)
|
||||
// [UTLS SECTION END]
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue