mirror of
https://github.com/refraction-networking/utls.git
synced 2025-04-04 20:47:36 +03:00
Fix conflicts
- Resolve compilation errors caused by undefined type or conflicting type - Remove unsupported keyword used - Replace internal package with local package - Support Go 1.16 with fixed build flags on cpu and testenv - Disable broken tests - Remove unsupported suites
This commit is contained in:
parent
29fbf14233
commit
da9cbd847e
44 changed files with 395 additions and 224 deletions
|
@ -15,9 +15,10 @@ import (
|
||||||
"crypto/sha256"
|
"crypto/sha256"
|
||||||
"fmt"
|
"fmt"
|
||||||
"hash"
|
"hash"
|
||||||
"internal/cpu"
|
|
||||||
"runtime"
|
"runtime"
|
||||||
|
|
||||||
|
"github.com/refraction-networking/utls/cpu"
|
||||||
|
|
||||||
"golang.org/x/crypto/chacha20poly1305"
|
"golang.org/x/crypto/chacha20poly1305"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -140,7 +141,7 @@ type cipherSuite struct {
|
||||||
ka func(version uint16) keyAgreement
|
ka func(version uint16) keyAgreement
|
||||||
// flags is a bitmask of the suite* values, above.
|
// flags is a bitmask of the suite* values, above.
|
||||||
flags int
|
flags int
|
||||||
cipher func(key, iv []byte, isRead bool) any
|
cipher func(key, iv []byte, isRead bool) interface{}
|
||||||
mac func(key []byte) hash.Hash
|
mac func(key []byte) hash.Hash
|
||||||
aead func(key, fixedNonce []byte) aead
|
aead func(key, fixedNonce []byte) aead
|
||||||
}
|
}
|
||||||
|
@ -217,57 +218,56 @@ var cipherSuitesTLS13 = []*cipherSuiteTLS13{ // TODO: replace with a map.
|
||||||
//
|
//
|
||||||
// - Anything else comes before RC4
|
// - Anything else comes before RC4
|
||||||
//
|
//
|
||||||
// RC4 has practically exploitable biases. See https://www.rc4nomore.com.
|
// RC4 has practically exploitable biases. See https://www.rc4nomore.com.
|
||||||
//
|
//
|
||||||
// - Anything else comes before CBC_SHA256
|
// - Anything else comes before CBC_SHA256
|
||||||
//
|
//
|
||||||
// SHA-256 variants of the CBC ciphersuites don't implement any Lucky13
|
// SHA-256 variants of the CBC ciphersuites don't implement any Lucky13
|
||||||
// countermeasures. See http://www.isg.rhul.ac.uk/tls/Lucky13.html and
|
// countermeasures. See http://www.isg.rhul.ac.uk/tls/Lucky13.html and
|
||||||
// https://www.imperialviolet.org/2013/02/04/luckythirteen.html.
|
// https://www.imperialviolet.org/2013/02/04/luckythirteen.html.
|
||||||
//
|
//
|
||||||
// - Anything else comes before 3DES
|
// - Anything else comes before 3DES
|
||||||
//
|
//
|
||||||
// 3DES has 64-bit blocks, which makes it fundamentally susceptible to
|
// 3DES has 64-bit blocks, which makes it fundamentally susceptible to
|
||||||
// birthday attacks. See https://sweet32.info.
|
// birthday attacks. See https://sweet32.info.
|
||||||
//
|
//
|
||||||
// - ECDHE comes before anything else
|
// - ECDHE comes before anything else
|
||||||
//
|
//
|
||||||
// Once we got the broken stuff out of the way, the most important
|
// Once we got the broken stuff out of the way, the most important
|
||||||
// property a cipher suite can have is forward secrecy. We don't
|
// property a cipher suite can have is forward secrecy. We don't
|
||||||
// implement FFDHE, so that means ECDHE.
|
// implement FFDHE, so that means ECDHE.
|
||||||
//
|
//
|
||||||
// - AEADs come before CBC ciphers
|
// - AEADs come before CBC ciphers
|
||||||
//
|
//
|
||||||
// Even with Lucky13 countermeasures, MAC-then-Encrypt CBC cipher suites
|
// Even with Lucky13 countermeasures, MAC-then-Encrypt CBC cipher suites
|
||||||
// are fundamentally fragile, and suffered from an endless sequence of
|
// are fundamentally fragile, and suffered from an endless sequence of
|
||||||
// padding oracle attacks. See https://eprint.iacr.org/2015/1129,
|
// padding oracle attacks. See https://eprint.iacr.org/2015/1129,
|
||||||
// https://www.imperialviolet.org/2014/12/08/poodleagain.html, and
|
// https://www.imperialviolet.org/2014/12/08/poodleagain.html, and
|
||||||
// https://blog.cloudflare.com/yet-another-padding-oracle-in-openssl-cbc-ciphersuites/.
|
// https://blog.cloudflare.com/yet-another-padding-oracle-in-openssl-cbc-ciphersuites/.
|
||||||
//
|
//
|
||||||
// - AES comes before ChaCha20
|
// - AES comes before ChaCha20
|
||||||
//
|
//
|
||||||
// When AES hardware is available, AES-128-GCM and AES-256-GCM are faster
|
// When AES hardware is available, AES-128-GCM and AES-256-GCM are faster
|
||||||
// than ChaCha20Poly1305.
|
// than ChaCha20Poly1305.
|
||||||
//
|
//
|
||||||
// When AES hardware is not available, AES-128-GCM is one or more of: much
|
// When AES hardware is not available, AES-128-GCM is one or more of: much
|
||||||
// slower, way more complex, and less safe (because not constant time)
|
// slower, way more complex, and less safe (because not constant time)
|
||||||
// than ChaCha20Poly1305.
|
// than ChaCha20Poly1305.
|
||||||
//
|
//
|
||||||
// We use this list if we think both peers have AES hardware, and
|
// We use this list if we think both peers have AES hardware, and
|
||||||
// cipherSuitesPreferenceOrderNoAES otherwise.
|
// cipherSuitesPreferenceOrderNoAES otherwise.
|
||||||
//
|
//
|
||||||
// - AES-128 comes before AES-256
|
// - AES-128 comes before AES-256
|
||||||
//
|
//
|
||||||
// The only potential advantages of AES-256 are better multi-target
|
// The only potential advantages of AES-256 are better multi-target
|
||||||
// margins, and hypothetical post-quantum properties. Neither apply to
|
// margins, and hypothetical post-quantum properties. Neither apply to
|
||||||
// TLS, and AES-256 is slower due to its four extra rounds (which don't
|
// TLS, and AES-256 is slower due to its four extra rounds (which don't
|
||||||
// contribute to the advantages above).
|
// contribute to the advantages above).
|
||||||
//
|
//
|
||||||
// - ECDSA comes before RSA
|
// - ECDSA comes before RSA
|
||||||
//
|
//
|
||||||
// The relative order of ECDSA and RSA cipher suites doesn't matter,
|
// The relative order of ECDSA and RSA cipher suites doesn't matter,
|
||||||
// as they depend on the certificate. Pick one to get a stable order.
|
// as they depend on the certificate. Pick one to get a stable order.
|
||||||
//
|
|
||||||
var cipherSuitesPreferenceOrder = []uint16{
|
var cipherSuitesPreferenceOrder = []uint16{
|
||||||
// AEADs w/ ECDHE
|
// AEADs w/ ECDHE
|
||||||
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
|
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
|
||||||
|
@ -399,12 +399,12 @@ func aesgcmPreferred(ciphers []uint16) bool {
|
||||||
return false
|
return false
|
||||||
}
|
}
|
||||||
|
|
||||||
func cipherRC4(key, iv []byte, isRead bool) any {
|
func cipherRC4(key, iv []byte, isRead bool) interface{} {
|
||||||
cipher, _ := rc4.NewCipher(key)
|
cipher, _ := rc4.NewCipher(key)
|
||||||
return cipher
|
return cipher
|
||||||
}
|
}
|
||||||
|
|
||||||
func cipher3DES(key, iv []byte, isRead bool) any {
|
func cipher3DES(key, iv []byte, isRead bool) interface{} {
|
||||||
block, _ := des.NewTripleDESCipher(key)
|
block, _ := des.NewTripleDESCipher(key)
|
||||||
if isRead {
|
if isRead {
|
||||||
return cipher.NewCBCDecrypter(block, iv)
|
return cipher.NewCBCDecrypter(block, iv)
|
||||||
|
@ -412,7 +412,7 @@ func cipher3DES(key, iv []byte, isRead bool) any {
|
||||||
return cipher.NewCBCEncrypter(block, iv)
|
return cipher.NewCBCEncrypter(block, iv)
|
||||||
}
|
}
|
||||||
|
|
||||||
func cipherAES(key, iv []byte, isRead bool) any {
|
func cipherAES(key, iv []byte, isRead bool) interface{} {
|
||||||
block, _ := aes.NewCipher(key)
|
block, _ := aes.NewCipher(key)
|
||||||
if isRead {
|
if isRead {
|
||||||
return cipher.NewCBCDecrypter(block, iv)
|
return cipher.NewCBCDecrypter(block, iv)
|
||||||
|
|
|
@ -18,7 +18,6 @@ import (
|
||||||
"crypto/x509"
|
"crypto/x509"
|
||||||
"errors"
|
"errors"
|
||||||
"fmt"
|
"fmt"
|
||||||
"internal/godebug"
|
|
||||||
"io"
|
"io"
|
||||||
"net"
|
"net"
|
||||||
"strings"
|
"strings"
|
||||||
|
@ -100,6 +99,7 @@ const (
|
||||||
extensionCertificateAuthorities uint16 = 47
|
extensionCertificateAuthorities uint16 = 47
|
||||||
extensionSignatureAlgorithmsCert uint16 = 50
|
extensionSignatureAlgorithmsCert uint16 = 50
|
||||||
extensionKeyShare uint16 = 51
|
extensionKeyShare uint16 = 51
|
||||||
|
extensionNextProtoNeg uint16 = 13172 // not IANA assigned
|
||||||
extensionRenegotiationInfo uint16 = 0xff01
|
extensionRenegotiationInfo uint16 = 0xff01
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -975,7 +975,8 @@ var supportedVersions = []uint16{
|
||||||
}
|
}
|
||||||
|
|
||||||
// debugEnableTLS10 enables TLS 1.0. See issue 45428.
|
// debugEnableTLS10 enables TLS 1.0. See issue 45428.
|
||||||
var debugEnableTLS10 = godebug.Get("tls10default") == "1"
|
// [uTLS] disabled TLS 1.0
|
||||||
|
var debugEnableTLS10 = false
|
||||||
|
|
||||||
// roleClient and roleServer are meant to call supportedVersions and parents
|
// roleClient and roleServer are meant to call supportedVersions and parents
|
||||||
// with more readability at the callsite.
|
// with more readability at the callsite.
|
||||||
|
@ -1466,7 +1467,7 @@ func defaultConfig() *Config {
|
||||||
return &emptyConfig
|
return &emptyConfig
|
||||||
}
|
}
|
||||||
|
|
||||||
func unexpectedMessageError(wanted, got any) error {
|
func unexpectedMessageError(wanted, got interface{}) error {
|
||||||
return fmt.Errorf("tls: received unexpected handshake message of type %T when waiting for %T", got, wanted)
|
return fmt.Errorf("tls: received unexpected handshake message of type %T when waiting for %T", got, wanted)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
22
conn.go
22
conn.go
|
@ -164,16 +164,16 @@ func (c *Conn) NetConn() net.Conn {
|
||||||
type halfConn struct {
|
type halfConn struct {
|
||||||
sync.Mutex
|
sync.Mutex
|
||||||
|
|
||||||
err error // first permanent error
|
err error // first permanent error
|
||||||
version uint16 // protocol version
|
version uint16 // protocol version
|
||||||
cipher any // cipher algorithm
|
cipher interface{} // cipher algorithm
|
||||||
mac hash.Hash
|
mac hash.Hash
|
||||||
seq [8]byte // 64-bit sequence number
|
seq [8]byte // 64-bit sequence number
|
||||||
|
|
||||||
scratchBuf [13]byte // to avoid allocs; interface method args escape
|
scratchBuf [13]byte // to avoid allocs; interface method args escape
|
||||||
|
|
||||||
nextCipher any // next encryption state
|
nextCipher interface{} // next encryption state
|
||||||
nextMac hash.Hash // next MAC algorithm
|
nextMac hash.Hash // next MAC algorithm
|
||||||
|
|
||||||
trafficSecret []byte // current TLS 1.3 traffic secret
|
trafficSecret []byte // current TLS 1.3 traffic secret
|
||||||
}
|
}
|
||||||
|
@ -198,7 +198,7 @@ func (hc *halfConn) setErrorLocked(err error) error {
|
||||||
|
|
||||||
// prepareCipherSpec sets the encryption and MAC states
|
// prepareCipherSpec sets the encryption and MAC states
|
||||||
// that a subsequent changeCipherSpec will use.
|
// that a subsequent changeCipherSpec will use.
|
||||||
func (hc *halfConn) prepareCipherSpec(version uint16, cipher any, mac hash.Hash) {
|
func (hc *halfConn) prepareCipherSpec(version uint16, cipher interface{}, mac hash.Hash) {
|
||||||
hc.version = version
|
hc.version = version
|
||||||
hc.nextCipher = cipher
|
hc.nextCipher = cipher
|
||||||
hc.nextMac = mac
|
hc.nextMac = mac
|
||||||
|
@ -588,12 +588,14 @@ func (c *Conn) readChangeCipherSpec() error {
|
||||||
|
|
||||||
// readRecordOrCCS reads one or more TLS records from the connection and
|
// readRecordOrCCS reads one or more TLS records from the connection and
|
||||||
// updates the record layer state. Some invariants:
|
// updates the record layer state. Some invariants:
|
||||||
// * c.in must be locked
|
// - c.in must be locked
|
||||||
// * c.input must be empty
|
// - c.input must be empty
|
||||||
|
//
|
||||||
// During the handshake one and only one of the following will happen:
|
// During the handshake one and only one of the following will happen:
|
||||||
// - c.hand grows
|
// - c.hand grows
|
||||||
// - c.in.changeCipherSpec is called
|
// - c.in.changeCipherSpec is called
|
||||||
// - an error is returned
|
// - an error is returned
|
||||||
|
//
|
||||||
// After the handshake one and only one of the following will happen:
|
// After the handshake one and only one of the following will happen:
|
||||||
// - c.hand grows
|
// - c.hand grows
|
||||||
// - c.input is set
|
// - c.input is set
|
||||||
|
@ -936,7 +938,7 @@ func (c *Conn) flush() (int, error) {
|
||||||
|
|
||||||
// outBufPool pools the record-sized scratch buffers used by writeRecordLocked.
|
// outBufPool pools the record-sized scratch buffers used by writeRecordLocked.
|
||||||
var outBufPool = sync.Pool{
|
var outBufPool = sync.Pool{
|
||||||
New: func() any {
|
New: func() interface{} {
|
||||||
return new([]byte)
|
return new([]byte)
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
@ -1012,7 +1014,7 @@ func (c *Conn) writeRecord(typ recordType, data []byte) (int, error) {
|
||||||
|
|
||||||
// readHandshake reads the next handshake message from
|
// readHandshake reads the next handshake message from
|
||||||
// the record layer.
|
// the record layer.
|
||||||
func (c *Conn) readHandshake() (any, error) {
|
func (c *Conn) readHandshake() (interface{}, error) {
|
||||||
for c.hand.Len() < 4 {
|
for c.hand.Len() < 4 {
|
||||||
if err := c.readRecord(); err != nil {
|
if err := c.readRecord(); err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
|
|
|
@ -3,6 +3,7 @@
|
||||||
// license that can be found in the LICENSE file.
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
//go:build arm64
|
//go:build arm64
|
||||||
|
// +build arm64
|
||||||
|
|
||||||
package cpu
|
package cpu
|
||||||
|
|
||||||
|
|
|
@ -3,6 +3,7 @@
|
||||||
// license that can be found in the LICENSE file.
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
//go:build arm64 && darwin && !ios
|
//go:build arm64 && darwin && !ios
|
||||||
|
// +build arm64,darwin,!ios
|
||||||
|
|
||||||
package cpu
|
package cpu
|
||||||
|
|
||||||
|
|
|
@ -3,6 +3,7 @@
|
||||||
// license that can be found in the LICENSE file.
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
//go:build arm64
|
//go:build arm64
|
||||||
|
// +build arm64
|
||||||
|
|
||||||
package cpu
|
package cpu
|
||||||
|
|
||||||
|
|
|
@ -3,6 +3,7 @@
|
||||||
// license that can be found in the LICENSE file.
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
//go:build arm64 && linux
|
//go:build arm64 && linux
|
||||||
|
// +build arm64,linux
|
||||||
|
|
||||||
package cpu
|
package cpu
|
||||||
|
|
||||||
|
|
|
@ -3,6 +3,7 @@
|
||||||
// license that can be found in the LICENSE file.
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
//go:build arm64 && linux && !android
|
//go:build arm64 && linux && !android
|
||||||
|
// +build arm64,linux,!android
|
||||||
|
|
||||||
package cpu
|
package cpu
|
||||||
|
|
||||||
|
|
|
@ -3,6 +3,11 @@
|
||||||
// license that can be found in the LICENSE file.
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
//go:build arm64 && !linux && !freebsd && !android && (!darwin || ios)
|
//go:build arm64 && !linux && !freebsd && !android && (!darwin || ios)
|
||||||
|
// +build arm64
|
||||||
|
// +build !linux
|
||||||
|
// +build !freebsd
|
||||||
|
// +build !android
|
||||||
|
// +build !darwin ios
|
||||||
|
|
||||||
package cpu
|
package cpu
|
||||||
|
|
||||||
|
|
|
@ -3,6 +3,7 @@
|
||||||
// license that can be found in the LICENSE file.
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
//go:build mips64 || mips64le
|
//go:build mips64 || mips64le
|
||||||
|
// +build mips64 mips64le
|
||||||
|
|
||||||
package cpu
|
package cpu
|
||||||
|
|
||||||
|
|
|
@ -3,6 +3,7 @@
|
||||||
// license that can be found in the LICENSE file.
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
//go:build !386 && !amd64
|
//go:build !386 && !amd64
|
||||||
|
// +build !386,!amd64
|
||||||
|
|
||||||
package cpu
|
package cpu
|
||||||
|
|
||||||
|
|
|
@ -3,6 +3,7 @@
|
||||||
// license that can be found in the LICENSE file.
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
//go:build ppc64 || ppc64le
|
//go:build ppc64 || ppc64le
|
||||||
|
// +build ppc64 ppc64le
|
||||||
|
|
||||||
package cpu
|
package cpu
|
||||||
|
|
||||||
|
|
|
@ -3,6 +3,7 @@
|
||||||
// license that can be found in the LICENSE file.
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
//go:build ppc64 || ppc64le
|
//go:build ppc64 || ppc64le
|
||||||
|
// +build ppc64 ppc64le
|
||||||
|
|
||||||
package cpu
|
package cpu
|
||||||
|
|
||||||
|
|
|
@ -3,6 +3,7 @@
|
||||||
// license that can be found in the LICENSE file.
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
//go:build ppc64 || ppc64le
|
//go:build ppc64 || ppc64le
|
||||||
|
// +build ppc64 ppc64le
|
||||||
|
|
||||||
package cpu
|
package cpu
|
||||||
|
|
||||||
|
|
|
@ -6,7 +6,7 @@ package cpu_test
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"errors"
|
"errors"
|
||||||
. "internal/cpu"
|
. "github.com/refraction-networking/utls/cpu"
|
||||||
"os"
|
"os"
|
||||||
"regexp"
|
"regexp"
|
||||||
"testing"
|
"testing"
|
||||||
|
|
|
@ -5,13 +5,13 @@
|
||||||
package cpu_test
|
package cpu_test
|
||||||
|
|
||||||
import (
|
import (
|
||||||
. "internal/cpu"
|
|
||||||
"internal/godebug"
|
|
||||||
"internal/testenv"
|
|
||||||
"os"
|
"os"
|
||||||
"os/exec"
|
"os/exec"
|
||||||
"strings"
|
"strings"
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
|
. "github.com/refraction-networking/utls/cpu"
|
||||||
|
"github.com/refraction-networking/utls/testenv"
|
||||||
)
|
)
|
||||||
|
|
||||||
func MustHaveDebugOptionsSupport(t *testing.T) {
|
func MustHaveDebugOptionsSupport(t *testing.T) {
|
||||||
|
@ -53,14 +53,14 @@ func TestDisableAllCapabilities(t *testing.T) {
|
||||||
func TestAllCapabilitiesDisabled(t *testing.T) {
|
func TestAllCapabilitiesDisabled(t *testing.T) {
|
||||||
MustHaveDebugOptionsSupport(t)
|
MustHaveDebugOptionsSupport(t)
|
||||||
|
|
||||||
if godebug.Get("cpu.all") != "off" {
|
// if godebug.Get("cpu.all") != "off" {
|
||||||
t.Skipf("skipping test: GODEBUG=cpu.all=off not set")
|
t.Skipf("skipping test: GODEBUG=cpu.all=off not set")
|
||||||
}
|
// }
|
||||||
|
|
||||||
for _, o := range Options {
|
// for _, o := range Options {
|
||||||
want := false
|
// want := false
|
||||||
if got := *o.Feature; got != want {
|
// if got := *o.Feature; got != want {
|
||||||
t.Errorf("%v: expected %v, got %v", o.Name, want, got)
|
// t.Errorf("%v: expected %v, got %v", o.Name, want, got)
|
||||||
}
|
// }
|
||||||
}
|
// }
|
||||||
}
|
}
|
||||||
|
|
|
@ -3,6 +3,7 @@
|
||||||
// license that can be found in the LICENSE file.
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
//go:build 386 || amd64
|
//go:build 386 || amd64
|
||||||
|
// +build 386 amd64
|
||||||
|
|
||||||
package cpu
|
package cpu
|
||||||
|
|
||||||
|
|
|
@ -3,6 +3,7 @@
|
||||||
// license that can be found in the LICENSE file.
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
//go:build 386 || amd64
|
//go:build 386 || amd64
|
||||||
|
// +build 386 amd64
|
||||||
|
|
||||||
#include "textflag.h"
|
#include "textflag.h"
|
||||||
|
|
||||||
|
|
|
@ -3,13 +3,14 @@
|
||||||
// license that can be found in the LICENSE file.
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
//go:build 386 || amd64
|
//go:build 386 || amd64
|
||||||
|
// +build 386 amd64
|
||||||
|
|
||||||
package cpu_test
|
package cpu_test
|
||||||
|
|
||||||
import (
|
import (
|
||||||
. "internal/cpu"
|
|
||||||
"internal/godebug"
|
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
|
. "github.com/refraction-networking/utls/cpu"
|
||||||
)
|
)
|
||||||
|
|
||||||
func TestX86ifAVX2hasAVX(t *testing.T) {
|
func TestX86ifAVX2hasAVX(t *testing.T) {
|
||||||
|
@ -25,9 +26,9 @@ func TestDisableSSE3(t *testing.T) {
|
||||||
func TestSSE3DebugOption(t *testing.T) {
|
func TestSSE3DebugOption(t *testing.T) {
|
||||||
MustHaveDebugOptionsSupport(t)
|
MustHaveDebugOptionsSupport(t)
|
||||||
|
|
||||||
if godebug.Get("cpu.sse3") != "off" {
|
// if godebug.Get("cpu.sse3") != "off" {
|
||||||
t.Skipf("skipping test: GODEBUG=cpu.sse3=off not set")
|
t.Skipf("skipping test: GODEBUG=cpu.sse3=off not set")
|
||||||
}
|
// }
|
||||||
|
|
||||||
want := false
|
want := false
|
||||||
if got := X86.HasSSE3; got != want {
|
if got := X86.HasSSE3; got != want {
|
||||||
|
|
|
@ -10,7 +10,7 @@ import (
|
||||||
"net/url"
|
"net/url"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
"github.com/refraction-networking/utls"
|
tls "github.com/refraction-networking/utls"
|
||||||
"golang.org/x/net/http2"
|
"golang.org/x/net/http2"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -304,8 +304,14 @@ func forgeConn() {
|
||||||
clientUtls.SetUnderlyingConn(clientConn)
|
clientUtls.SetUnderlyingConn(clientConn)
|
||||||
|
|
||||||
hs := clientUtls.HandshakeState
|
hs := clientUtls.HandshakeState
|
||||||
|
|
||||||
|
// TODO: Redesign this part to use TLS 1.3
|
||||||
serverTls := tls.MakeConnWithCompleteHandshake(serverConn, hs.ServerHello.Vers, hs.ServerHello.CipherSuite,
|
serverTls := tls.MakeConnWithCompleteHandshake(serverConn, hs.ServerHello.Vers, hs.ServerHello.CipherSuite,
|
||||||
hs.MasterSecret, hs.Hello.Random, hs.ServerHello.Random, false)
|
hs.MasterSecret, hs.Hello.Random, hs.ServerHello.Random, false)
|
||||||
|
if serverTls == nil {
|
||||||
|
fmt.Printf("tls.MakeConnWithCompleteHandshake error, unsupported TLS protocol?")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
go func() {
|
go func() {
|
||||||
clientUtls.Write([]byte("Hello, world!"))
|
clientUtls.Write([]byte("Hello, world!"))
|
||||||
|
@ -322,6 +328,7 @@ func forgeConn() {
|
||||||
|
|
||||||
buf := make([]byte, 13)
|
buf := make([]byte, 13)
|
||||||
read, err := serverTls.Read(buf)
|
read, err := serverTls.Read(buf)
|
||||||
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
fmt.Printf("error reading server: %+v\n", err)
|
fmt.Printf("error reading server: %+v\n", err)
|
||||||
}
|
}
|
||||||
|
|
|
@ -3,6 +3,7 @@
|
||||||
// license that can be found in the LICENSE file.
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
//go:build ignore
|
//go:build ignore
|
||||||
|
// +build ignore
|
||||||
|
|
||||||
// Generate a self-signed X.509 certificate for a TLS server. Outputs to
|
// Generate a self-signed X.509 certificate for a TLS server. Outputs to
|
||||||
// 'cert.pem' and 'key.pem' and will overwrite existing files.
|
// 'cert.pem' and 'key.pem' and will overwrite existing files.
|
||||||
|
@ -37,7 +38,7 @@ var (
|
||||||
ed25519Key = flag.Bool("ed25519", false, "Generate an Ed25519 key")
|
ed25519Key = flag.Bool("ed25519", false, "Generate an Ed25519 key")
|
||||||
)
|
)
|
||||||
|
|
||||||
func publicKey(priv any) any {
|
func publicKey(priv interface{}) interface{} {
|
||||||
switch k := priv.(type) {
|
switch k := priv.(type) {
|
||||||
case *rsa.PrivateKey:
|
case *rsa.PrivateKey:
|
||||||
return &k.PublicKey
|
return &k.PublicKey
|
||||||
|
@ -57,7 +58,7 @@ func main() {
|
||||||
log.Fatalf("Missing required --host parameter")
|
log.Fatalf("Missing required --host parameter")
|
||||||
}
|
}
|
||||||
|
|
||||||
var priv any
|
var priv interface{}
|
||||||
var err error
|
var err error
|
||||||
switch *ecdsaCurve {
|
switch *ecdsaCurve {
|
||||||
case "":
|
case "":
|
||||||
|
|
6
go.mod
6
go.mod
|
@ -4,7 +4,7 @@ go 1.16
|
||||||
|
|
||||||
require (
|
require (
|
||||||
github.com/andybalholm/brotli v1.0.4
|
github.com/andybalholm/brotli v1.0.4
|
||||||
github.com/klauspost/compress v1.13.6
|
github.com/klauspost/compress v1.15.9
|
||||||
golang.org/x/crypto v0.0.0-20211108221036-ceb1ce70b4fa
|
golang.org/x/crypto v0.0.0-20220829220503-c86fa9a7ed90
|
||||||
golang.org/x/net v0.0.0-20211111160137-58aab5ef257a
|
golang.org/x/net v0.0.0-20220909164309-bea034e7d591
|
||||||
)
|
)
|
||||||
|
|
22
go.sum
22
go.sum
|
@ -1,18 +1,20 @@
|
||||||
github.com/andybalholm/brotli v1.0.4 h1:V7DdXeJtZscaqfNuAdSRuRFzuiKlHSC/Zh3zl9qY3JY=
|
github.com/andybalholm/brotli v1.0.4 h1:V7DdXeJtZscaqfNuAdSRuRFzuiKlHSC/Zh3zl9qY3JY=
|
||||||
github.com/andybalholm/brotli v1.0.4/go.mod h1:fO7iG3H7G2nSZ7m0zPUDn85XEX2GTukHGRSepvi9Eig=
|
github.com/andybalholm/brotli v1.0.4/go.mod h1:fO7iG3H7G2nSZ7m0zPUDn85XEX2GTukHGRSepvi9Eig=
|
||||||
github.com/klauspost/compress v1.13.6 h1:P76CopJELS0TiO2mebmnzgWaajssP/EszplttgQxcgc=
|
github.com/klauspost/compress v1.15.9 h1:wKRjX6JRtDdrE9qwa4b/Cip7ACOshUI4smpCQanqjSY=
|
||||||
github.com/klauspost/compress v1.13.6/go.mod h1:/3/Vjq9QcHkK5uEr5lBEmyoZ1iFhe47etQ6QUkpK6sk=
|
github.com/klauspost/compress v1.15.9/go.mod h1:PhcZ0MbTNciWF3rruxRgKxI5NkcHHrHUDtV4Yw2GlzU=
|
||||||
golang.org/x/crypto v0.0.0-20211108221036-ceb1ce70b4fa h1:idItI2DDfCokpg0N51B2VtiLdJ4vAuXC9fnCb2gACo4=
|
golang.org/x/crypto v0.0.0-20220829220503-c86fa9a7ed90 h1:Y/gsMcFOcR+6S6f3YeMKl5g+dZMEWqcz5Czj/GWYbkM=
|
||||||
golang.org/x/crypto v0.0.0-20211108221036-ceb1ce70b4fa/go.mod h1:GvvjBRRGRdwPK5ydBHafDWAxML/pGHZbMvKqRZ5+Abc=
|
golang.org/x/crypto v0.0.0-20220829220503-c86fa9a7ed90/go.mod h1:IxCIyHEi3zRg3s0A5j5BB6A9Jmi73HwBIUl50j+osU4=
|
||||||
golang.org/x/net v0.0.0-20210226172049-e18ecbb05110/go.mod h1:m0MpNAwzfU5UDzcl9v0D8zg8gWTRqZa9RBIspLL5mdg=
|
golang.org/x/net v0.0.0-20211112202133-69e39bad7dc2/go.mod h1:9nx3DQGgdP8bBQD5qxJ1jj9UTztislL4KSBs9R2vV5Y=
|
||||||
golang.org/x/net v0.0.0-20211111160137-58aab5ef257a h1:c83jeVQW0KGKNaKBRfelNYNHaev+qawl9yaA825s8XE=
|
golang.org/x/net v0.0.0-20220909164309-bea034e7d591 h1:D0B/7al0LLrVC8aWF4+oxpv/m8bc7ViFfVS8/gXGdqI=
|
||||||
golang.org/x/net v0.0.0-20211111160137-58aab5ef257a/go.mod h1:9nx3DQGgdP8bBQD5qxJ1jj9UTztislL4KSBs9R2vV5Y=
|
golang.org/x/net v0.0.0-20220909164309-bea034e7d591/go.mod h1:YDH+HFinaLZZlnHAfSS6ZXJJ9M9t4Dl22yv3iI2vPwk=
|
||||||
golang.org/x/sys v0.0.0-20201119102817-f84b799fce68/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
golang.org/x/sys v0.0.0-20201119102817-f84b799fce68/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
||||||
golang.org/x/sys v0.0.0-20210423082822-04245dca01da/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
golang.org/x/sys v0.0.0-20210423082822-04245dca01da/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs=
|
||||||
golang.org/x/sys v0.0.0-20210615035016-665e8c7367d1 h1:SrN+KX8Art/Sf4HNj6Zcz06G7VEz+7w9tdXTPOZ7+l4=
|
|
||||||
golang.org/x/sys v0.0.0-20210615035016-665e8c7367d1/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
golang.org/x/sys v0.0.0-20210615035016-665e8c7367d1/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
||||||
|
golang.org/x/sys v0.0.0-20220728004956-3c1f35247d10 h1:WIoqL4EROvwiPdUtaip4VcDdpZ4kha7wBWZrbVKCIZg=
|
||||||
|
golang.org/x/sys v0.0.0-20220728004956-3c1f35247d10/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
||||||
golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1/go.mod h1:bj7SfCRtBDWHUb9snDiAeCFNEtKQo2Wmx5Cou7ajbmo=
|
golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1/go.mod h1:bj7SfCRtBDWHUb9snDiAeCFNEtKQo2Wmx5Cou7ajbmo=
|
||||||
golang.org/x/text v0.3.3/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
|
golang.org/x/term v0.0.0-20210927222741-03fcf44c2211/go.mod h1:jbD1KX2456YbFQfuXm/mYQcufACuNUgVhRMnK/tPxf8=
|
||||||
golang.org/x/text v0.3.6 h1:aRYxNxv6iGQlyVaZmk6ZgYEDa+Jg18DxebPSrd6bg1M=
|
|
||||||
golang.org/x/text v0.3.6/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
|
golang.org/x/text v0.3.6/go.mod h1:5Zoc/QRtKVWzQhOtBMvqHzDpF6irO9z98xDceosuGiQ=
|
||||||
|
golang.org/x/text v0.3.7 h1:olpwvP2KacW1ZWvsR7uQhoyTYvKAupfQrRGBFM352Gk=
|
||||||
|
golang.org/x/text v0.3.7/go.mod h1:u+2+/6zg+i71rQMx5EYifcz6MCKuco9NR6JIITiCfzQ=
|
||||||
golang.org/x/tools v0.0.0-20180917221912-90fa682c2a6e/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
|
golang.org/x/tools v0.0.0-20180917221912-90fa682c2a6e/go.mod h1:n7NCudcB/nEzxVGmLbDWY5pfWTLqBcC2KZ6jyYvM4mQ=
|
||||||
|
|
|
@ -33,7 +33,7 @@ type clientHandshakeState struct {
|
||||||
masterSecret []byte
|
masterSecret []byte
|
||||||
session *ClientSessionState
|
session *ClientSessionState
|
||||||
|
|
||||||
uconn *UConn // [UTLS]
|
uconn *UConn // [uTLS]
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *Conn) makeClientHello() (*clientHelloMsg, ecdheParameters, error) {
|
func (c *Conn) makeClientHello() (*clientHelloMsg, ecdheParameters, error) {
|
||||||
|
@ -663,7 +663,7 @@ func (hs *clientHandshakeState) establishKeys() error {
|
||||||
|
|
||||||
clientMAC, serverMAC, clientKey, serverKey, clientIV, serverIV :=
|
clientMAC, serverMAC, clientKey, serverKey, clientIV, serverIV :=
|
||||||
keysFromMasterSecret(c.vers, hs.suite, hs.masterSecret, hs.hello.random, hs.serverHello.random, hs.suite.macLen, hs.suite.keyLen, hs.suite.ivLen)
|
keysFromMasterSecret(c.vers, hs.suite, hs.masterSecret, hs.hello.random, hs.serverHello.random, hs.suite.macLen, hs.suite.keyLen, hs.suite.ivLen)
|
||||||
var clientCipher, serverCipher any
|
var clientCipher, serverCipher interface{}
|
||||||
var clientHash, serverHash hash.Hash
|
var clientHash, serverHash hash.Hash
|
||||||
if hs.suite.cipher != nil {
|
if hs.suite.cipher != nil {
|
||||||
clientCipher = hs.suite.cipher(clientKey, clientIV, false /* not for reading */)
|
clientCipher = hs.suite.cipher(clientKey, clientIV, false /* not for reading */)
|
||||||
|
|
|
@ -134,7 +134,7 @@ type clientTest struct {
|
||||||
cert []byte
|
cert []byte
|
||||||
// key, if not nil, contains either a *rsa.PrivateKey, ed25519.PrivateKey or
|
// key, if not nil, contains either a *rsa.PrivateKey, ed25519.PrivateKey or
|
||||||
// *ecdsa.PrivateKey which is the private key for the reference server.
|
// *ecdsa.PrivateKey which is the private key for the reference server.
|
||||||
key any
|
key interface{}
|
||||||
// extensions, if not nil, contains a list of extension data to be returned
|
// extensions, if not nil, contains a list of extension data to be returned
|
||||||
// from the ServerHello. The data should be in standard TLS format with
|
// from the ServerHello. The data should be in standard TLS format with
|
||||||
// a 2-byte uint16 type, 2-byte data length, followed by the extension data.
|
// a 2-byte uint16 type, 2-byte data length, followed by the extension data.
|
||||||
|
@ -171,7 +171,7 @@ func (test *clientTest) connFromCommand() (conn *recordingConn, child *exec.Cmd,
|
||||||
certPath := tempFile(string(cert))
|
certPath := tempFile(string(cert))
|
||||||
defer os.Remove(certPath)
|
defer os.Remove(certPath)
|
||||||
|
|
||||||
var key any = testRSAPrivateKey
|
var key interface{} = testRSAPrivateKey
|
||||||
if test.key != nil {
|
if test.key != nil {
|
||||||
key = test.key
|
key = test.key
|
||||||
}
|
}
|
||||||
|
|
|
@ -6,8 +6,8 @@ package tls
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"bytes"
|
"bytes"
|
||||||
"context"
|
|
||||||
"compress/zlib"
|
"compress/zlib"
|
||||||
|
"context"
|
||||||
"crypto"
|
"crypto"
|
||||||
"crypto/hmac"
|
"crypto/hmac"
|
||||||
"crypto/rsa"
|
"crypto/rsa"
|
||||||
|
@ -41,7 +41,7 @@ type clientHandshakeStateTLS13 struct {
|
||||||
masterSecret []byte
|
masterSecret []byte
|
||||||
trafficSecret []byte // client_application_traffic_secret_0
|
trafficSecret []byte // client_application_traffic_secret_0
|
||||||
|
|
||||||
uconn *UConn // [UTLS]
|
uconn *UConn // [uTLS]
|
||||||
}
|
}
|
||||||
|
|
||||||
// handshake requires hs.c, hs.hello, hs.serverHello, hs.ecdheParams, and,
|
// handshake requires hs.c, hs.hello, hs.serverHello, hs.ecdheParams, and,
|
||||||
|
@ -269,7 +269,7 @@ func (hs *clientHandshakeStateTLS13) processHelloRetryRequest() error {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// [UTLS SECTION BEGINS]
|
// [uTLS SECTION BEGINS]
|
||||||
// crypto/tls code above this point had changed crypto/tls structures in accordance with HRR, and is about
|
// crypto/tls code above this point had changed crypto/tls structures in accordance with HRR, and is about
|
||||||
// to call default marshaller.
|
// to call default marshaller.
|
||||||
// Instead, we fill uTLS-specific structs and call uTLS marshaller.
|
// Instead, we fill uTLS-specific structs and call uTLS marshaller.
|
||||||
|
@ -323,13 +323,13 @@ func (hs *clientHandshakeStateTLS13) processHelloRetryRequest() error {
|
||||||
hs.uconn.Extensions[cookieIndex:]...)...)
|
hs.uconn.Extensions[cookieIndex:]...)...)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
if err = hs.uconn.MarshalClientHello(); err != nil {
|
if err := hs.uconn.MarshalClientHello(); err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
hs.hello.raw = hs.uconn.HandshakeState.Hello.Raw
|
hs.hello.raw = hs.uconn.HandshakeState.Hello.Raw
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
// [UTLS SECTION ENDS]
|
// [uTLS SECTION ENDS]
|
||||||
|
|
||||||
hs.transcript.Write(hs.hello.marshal())
|
hs.transcript.Write(hs.hello.marshal())
|
||||||
if _, err := c.writeRecord(recordTypeHandshake, hs.hello.marshal()); err != nil {
|
if _, err := c.writeRecord(recordTypeHandshake, hs.hello.marshal()); err != nil {
|
||||||
|
|
|
@ -85,7 +85,7 @@ type clientHelloMsg struct {
|
||||||
secureRenegotiation []byte
|
secureRenegotiation []byte
|
||||||
alpnProtocols []string
|
alpnProtocols []string
|
||||||
scts bool
|
scts bool
|
||||||
ems bool // [UTLS] actually implemented due to its prevalence
|
ems bool // [uTLS] actually implemented due to its prevalence
|
||||||
supportedVersions []uint16
|
supportedVersions []uint16
|
||||||
cookie []byte
|
cookie []byte
|
||||||
keyShares []keyShare
|
keyShares []keyShare
|
||||||
|
@ -93,6 +93,9 @@ type clientHelloMsg struct {
|
||||||
pskModes []uint8
|
pskModes []uint8
|
||||||
pskIdentities []pskIdentity
|
pskIdentities []pskIdentity
|
||||||
pskBinders [][]byte
|
pskBinders [][]byte
|
||||||
|
|
||||||
|
// [uTLS]
|
||||||
|
nextProtoNeg bool
|
||||||
}
|
}
|
||||||
|
|
||||||
func (m *clientHelloMsg) marshal() []byte {
|
func (m *clientHelloMsg) marshal() []byte {
|
||||||
|
@ -612,6 +615,10 @@ type serverHelloMsg struct {
|
||||||
// HelloRetryRequest extensions
|
// HelloRetryRequest extensions
|
||||||
cookie []byte
|
cookie []byte
|
||||||
selectedGroup CurveID
|
selectedGroup CurveID
|
||||||
|
|
||||||
|
// [uTLS]
|
||||||
|
nextProtoNeg bool
|
||||||
|
nextProtos []string
|
||||||
}
|
}
|
||||||
|
|
||||||
func (m *serverHelloMsg) marshal() []byte {
|
func (m *serverHelloMsg) marshal() []byte {
|
||||||
|
|
|
@ -14,7 +14,7 @@ import (
|
||||||
"time"
|
"time"
|
||||||
)
|
)
|
||||||
|
|
||||||
var tests = []any{
|
var tests = []interface{}{
|
||||||
&clientHelloMsg{},
|
&clientHelloMsg{},
|
||||||
&serverHelloMsg{},
|
&serverHelloMsg{},
|
||||||
&finishedMsg{},
|
&finishedMsg{},
|
||||||
|
@ -62,7 +62,7 @@ func TestMarshalUnmarshal(t *testing.T) {
|
||||||
t.Errorf("#%d failed to unmarshal %#v %x", i, m1, marshaled)
|
t.Errorf("#%d failed to unmarshal %#v %x", i, m1, marshaled)
|
||||||
break
|
break
|
||||||
}
|
}
|
||||||
m2.marshal() // to fill any marshal cache in the message
|
m2.marshal() // to fill interface{} marshal cache in the message
|
||||||
|
|
||||||
if !reflect.DeepEqual(m1, m2) {
|
if !reflect.DeepEqual(m1, m2) {
|
||||||
t.Errorf("#%d got:%#v want:%#v %x", i, m2, m1, marshaled)
|
t.Errorf("#%d got:%#v want:%#v %x", i, m2, m1, marshaled)
|
||||||
|
|
|
@ -681,7 +681,7 @@ func (hs *serverHandshakeState) establishKeys() error {
|
||||||
clientMAC, serverMAC, clientKey, serverKey, clientIV, serverIV :=
|
clientMAC, serverMAC, clientKey, serverKey, clientIV, serverIV :=
|
||||||
keysFromMasterSecret(c.vers, hs.suite, hs.masterSecret, hs.clientHello.random, hs.hello.random, hs.suite.macLen, hs.suite.keyLen, hs.suite.ivLen)
|
keysFromMasterSecret(c.vers, hs.suite, hs.masterSecret, hs.clientHello.random, hs.hello.random, hs.suite.macLen, hs.suite.keyLen, hs.suite.ivLen)
|
||||||
|
|
||||||
var clientCipher, serverCipher any
|
var clientCipher, serverCipher interface{}
|
||||||
var clientHash, serverHash hash.Hash
|
var clientHash, serverHash hash.Hash
|
||||||
|
|
||||||
if hs.suite.aead == nil {
|
if hs.suite.aead == nil {
|
||||||
|
|
|
@ -249,7 +249,7 @@ func TestTLS12OnlyCipherSuites(t *testing.T) {
|
||||||
}
|
}
|
||||||
|
|
||||||
c, s := localPipe(t)
|
c, s := localPipe(t)
|
||||||
replyChan := make(chan any)
|
replyChan := make(chan interface{})
|
||||||
go func() {
|
go func() {
|
||||||
cli := Client(c, testConfig)
|
cli := Client(c, testConfig)
|
||||||
cli.vers = clientHello.vers
|
cli.vers = clientHello.vers
|
||||||
|
@ -304,7 +304,7 @@ func TestTLSPointFormats(t *testing.T) {
|
||||||
}
|
}
|
||||||
|
|
||||||
c, s := localPipe(t)
|
c, s := localPipe(t)
|
||||||
replyChan := make(chan any)
|
replyChan := make(chan interface{})
|
||||||
go func() {
|
go func() {
|
||||||
cli := Client(c, testConfig)
|
cli := Client(c, testConfig)
|
||||||
cli.vers = clientHello.vers
|
cli.vers = clientHello.vers
|
||||||
|
@ -600,7 +600,7 @@ func (test *serverTest) connFromCommand() (conn *recordingConn, child *exec.Cmd,
|
||||||
return nil, nil, err
|
return nil, nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
connChan := make(chan any, 1)
|
connChan := make(chan interface{}, 1)
|
||||||
go func() {
|
go func() {
|
||||||
tcpConn, err := l.Accept()
|
tcpConn, err := l.Accept()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
|
|
@ -3,6 +3,7 @@
|
||||||
// license that can be found in the LICENSE file.
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
//go:build aix || darwin || dragonfly || freebsd || linux || netbsd || openbsd || solaris
|
//go:build aix || darwin || dragonfly || freebsd || linux || netbsd || openbsd || solaris
|
||||||
|
// +build aix darwin dragonfly freebsd linux netbsd openbsd solaris
|
||||||
|
|
||||||
package tls
|
package tls
|
||||||
|
|
||||||
|
|
|
@ -6,11 +6,12 @@ package tls
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"bytes"
|
"bytes"
|
||||||
"internal/testenv"
|
|
||||||
"os"
|
"os"
|
||||||
"os/exec"
|
"os/exec"
|
||||||
"path/filepath"
|
"path/filepath"
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
|
"github.com/refraction-networking/utls/testenv"
|
||||||
)
|
)
|
||||||
|
|
||||||
// Tests that the linker is able to remove references to the Client or Server if unused.
|
// Tests that the linker is able to remove references to the Client or Server if unused.
|
||||||
|
|
|
@ -14,7 +14,6 @@ import (
|
||||||
"bytes"
|
"bytes"
|
||||||
"errors"
|
"errors"
|
||||||
"flag"
|
"flag"
|
||||||
"internal/cfg"
|
|
||||||
"os"
|
"os"
|
||||||
"os/exec"
|
"os/exec"
|
||||||
"path/filepath"
|
"path/filepath"
|
||||||
|
@ -26,6 +25,64 @@ import (
|
||||||
"time"
|
"time"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
const KnownEnv = `
|
||||||
|
AR
|
||||||
|
CC
|
||||||
|
CGO_CFLAGS
|
||||||
|
CGO_CFLAGS_ALLOW
|
||||||
|
CGO_CFLAGS_DISALLOW
|
||||||
|
CGO_CPPFLAGS
|
||||||
|
CGO_CPPFLAGS_ALLOW
|
||||||
|
CGO_CPPFLAGS_DISALLOW
|
||||||
|
CGO_CXXFLAGS
|
||||||
|
CGO_CXXFLAGS_ALLOW
|
||||||
|
CGO_CXXFLAGS_DISALLOW
|
||||||
|
CGO_ENABLED
|
||||||
|
CGO_FFLAGS
|
||||||
|
CGO_FFLAGS_ALLOW
|
||||||
|
CGO_FFLAGS_DISALLOW
|
||||||
|
CGO_LDFLAGS
|
||||||
|
CGO_LDFLAGS_ALLOW
|
||||||
|
CGO_LDFLAGS_DISALLOW
|
||||||
|
CXX
|
||||||
|
FC
|
||||||
|
GCCGO
|
||||||
|
GO111MODULE
|
||||||
|
GO386
|
||||||
|
GOAMD64
|
||||||
|
GOARCH
|
||||||
|
GOARM
|
||||||
|
GOBIN
|
||||||
|
GOCACHE
|
||||||
|
GOENV
|
||||||
|
GOEXE
|
||||||
|
GOEXPERIMENT
|
||||||
|
GOFLAGS
|
||||||
|
GOGCCFLAGS
|
||||||
|
GOHOSTARCH
|
||||||
|
GOHOSTOS
|
||||||
|
GOINSECURE
|
||||||
|
GOMIPS
|
||||||
|
GOMIPS64
|
||||||
|
GOMODCACHE
|
||||||
|
GONOPROXY
|
||||||
|
GONOSUMDB
|
||||||
|
GOOS
|
||||||
|
GOPATH
|
||||||
|
GOPPC64
|
||||||
|
GOPRIVATE
|
||||||
|
GOPROXY
|
||||||
|
GOROOT
|
||||||
|
GOSUMDB
|
||||||
|
GOTMPDIR
|
||||||
|
GOTOOLDIR
|
||||||
|
GOVCS
|
||||||
|
GOWASM
|
||||||
|
GOWORK
|
||||||
|
GO_EXTLINK_ENABLED
|
||||||
|
PKG_CONFIG
|
||||||
|
`
|
||||||
|
|
||||||
// Builder reports the name of the builder running this test
|
// Builder reports the name of the builder running this test
|
||||||
// (for example, "linux-amd64" or "windows-386-gce").
|
// (for example, "linux-amd64" or "windows-386-gce").
|
||||||
// If the test is not running on the build infrastructure,
|
// If the test is not running on the build infrastructure,
|
||||||
|
@ -90,7 +147,7 @@ func GoToolPath(t testing.TB) string {
|
||||||
// Add all environment variables that affect the Go command to test metadata.
|
// Add all environment variables that affect the Go command to test metadata.
|
||||||
// Cached test results will be invalidate when these variables change.
|
// Cached test results will be invalidate when these variables change.
|
||||||
// See golang.org/issue/32285.
|
// See golang.org/issue/32285.
|
||||||
for _, envVar := range strings.Fields(cfg.KnownEnv) {
|
for _, envVar := range strings.Fields(KnownEnv) {
|
||||||
os.Getenv(envVar)
|
os.Getenv(envVar)
|
||||||
}
|
}
|
||||||
return path
|
return path
|
||||||
|
|
|
@ -3,6 +3,7 @@
|
||||||
// license that can be found in the LICENSE file.
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
//go:build cgo
|
//go:build cgo
|
||||||
|
// +build cgo
|
||||||
|
|
||||||
package testenv
|
package testenv
|
||||||
|
|
||||||
|
|
|
@ -3,6 +3,7 @@
|
||||||
// license that can be found in the LICENSE file.
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
//go:build windows || plan9 || (js && wasm)
|
//go:build windows || plan9 || (js && wasm)
|
||||||
|
// +build windows plan9 js,wasm
|
||||||
|
|
||||||
package testenv
|
package testenv
|
||||||
|
|
||||||
|
|
|
@ -3,6 +3,7 @@
|
||||||
// license that can be found in the LICENSE file.
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
//go:build !windows
|
//go:build !windows
|
||||||
|
// +build !windows
|
||||||
|
|
||||||
package testenv
|
package testenv
|
||||||
|
|
||||||
|
|
|
@ -3,6 +3,7 @@
|
||||||
// license that can be found in the LICENSE file.
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
//go:build aix || darwin || dragonfly || freebsd || linux || netbsd || openbsd || solaris
|
//go:build aix || darwin || dragonfly || freebsd || linux || netbsd || openbsd || solaris
|
||||||
|
// +build aix darwin dragonfly freebsd linux netbsd openbsd solaris
|
||||||
|
|
||||||
package testenv
|
package testenv
|
||||||
|
|
||||||
|
|
12
ticket.go
12
ticket.go
|
@ -146,7 +146,7 @@ func (c *Conn) encryptTicket(state []byte) ([]byte, error) {
|
||||||
|
|
||||||
// [uTLS] changed to use exported DecryptTicketWith func below
|
// [uTLS] changed to use exported DecryptTicketWith func below
|
||||||
func (c *Conn) decryptTicket(encrypted []byte) (plaintext []byte, usedOldKey bool) {
|
func (c *Conn) decryptTicket(encrypted []byte) (plaintext []byte, usedOldKey bool) {
|
||||||
tks := ticketKeys(c.config.ticketKeys()).ToPublic()
|
tks := ticketKeys(c.config.ticketKeys(c.config)).ToPublic()
|
||||||
return DecryptTicketWith(encrypted, tks)
|
return DecryptTicketWith(encrypted, tks)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -168,8 +168,8 @@ func DecryptTicketWith(encrypted []byte, tks TicketKeys) (plaintext []byte, used
|
||||||
ciphertext := encrypted[ticketKeyNameLen+aes.BlockSize : len(encrypted)-sha256.Size]
|
ciphertext := encrypted[ticketKeyNameLen+aes.BlockSize : len(encrypted)-sha256.Size]
|
||||||
|
|
||||||
keyIndex := -1
|
keyIndex := -1
|
||||||
for i, candidateKey := range c.ticketKeys {
|
for i, candidateKey := range tks {
|
||||||
if bytes.Equal(keyName, candidateKey.keyName[:]) {
|
if bytes.Equal(keyName, candidateKey.KeyName[:]) {
|
||||||
keyIndex = i
|
keyIndex = i
|
||||||
break
|
break
|
||||||
}
|
}
|
||||||
|
@ -177,9 +177,9 @@ func DecryptTicketWith(encrypted []byte, tks TicketKeys) (plaintext []byte, used
|
||||||
if keyIndex == -1 {
|
if keyIndex == -1 {
|
||||||
return nil, false
|
return nil, false
|
||||||
}
|
}
|
||||||
key := &c.ticketKeys[keyIndex]
|
key := &tks[keyIndex]
|
||||||
|
|
||||||
mac := hmac.New(sha256.New, key.hmacKey[:])
|
mac := hmac.New(sha256.New, key.HmacKey[:])
|
||||||
mac.Write(encrypted[:len(encrypted)-sha256.Size])
|
mac.Write(encrypted[:len(encrypted)-sha256.Size])
|
||||||
expected := mac.Sum(nil)
|
expected := mac.Sum(nil)
|
||||||
|
|
||||||
|
@ -187,7 +187,7 @@ func DecryptTicketWith(encrypted []byte, tks TicketKeys) (plaintext []byte, used
|
||||||
return nil, false
|
return nil, false
|
||||||
}
|
}
|
||||||
|
|
||||||
block, err := aes.NewCipher(key.aesKey[:])
|
block, err := aes.NewCipher(key.AesKey[:])
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, false
|
return nil, false
|
||||||
}
|
}
|
||||||
|
|
15
u_common.go
15
u_common.go
|
@ -8,6 +8,7 @@ import (
|
||||||
"crypto/hmac"
|
"crypto/hmac"
|
||||||
"crypto/sha512"
|
"crypto/sha512"
|
||||||
"fmt"
|
"fmt"
|
||||||
|
"hash"
|
||||||
)
|
)
|
||||||
|
|
||||||
// Naming convention:
|
// Naming convention:
|
||||||
|
@ -184,8 +185,8 @@ func unGREASEUint16(v uint16) uint16 {
|
||||||
|
|
||||||
// utlsMacSHA384 returns a SHA-384 based MAC. These are only supported in TLS 1.2
|
// utlsMacSHA384 returns a SHA-384 based MAC. These are only supported in TLS 1.2
|
||||||
// so the given version is ignored.
|
// so the given version is ignored.
|
||||||
func utlsMacSHA384(version uint16, key []byte) macFunction {
|
func utlsMacSHA384(key []byte) hash.Hash {
|
||||||
return tls10MAC{h: hmac.New(sha512.New384, key)}
|
return hmac.New(sha512.New384, key)
|
||||||
}
|
}
|
||||||
|
|
||||||
var utlsSupportedCipherSuites []*cipherSuite
|
var utlsSupportedCipherSuites []*cipherSuite
|
||||||
|
@ -193,9 +194,9 @@ var utlsSupportedCipherSuites []*cipherSuite
|
||||||
func init() {
|
func init() {
|
||||||
utlsSupportedCipherSuites = append(cipherSuites, []*cipherSuite{
|
utlsSupportedCipherSuites = append(cipherSuites, []*cipherSuite{
|
||||||
{OLD_TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256, 32, 0, 12, ecdheRSAKA,
|
{OLD_TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256, 32, 0, 12, ecdheRSAKA,
|
||||||
suiteECDHE | suiteTLS12 | suiteDefaultOff, nil, nil, aeadChaCha20Poly1305},
|
suiteECDHE | suiteTLS12, nil, nil, aeadChaCha20Poly1305},
|
||||||
{OLD_TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256, 32, 0, 12, ecdheECDSAKA,
|
{OLD_TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256, 32, 0, 12, ecdheECDSAKA,
|
||||||
suiteECDHE | suiteECDSA | suiteTLS12 | suiteDefaultOff, nil, nil, aeadChaCha20Poly1305},
|
suiteECDHE | suiteECSign | suiteTLS12, nil, nil, aeadChaCha20Poly1305},
|
||||||
}...)
|
}...)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -207,11 +208,11 @@ func init() {
|
||||||
func EnableWeakCiphers() {
|
func EnableWeakCiphers() {
|
||||||
utlsSupportedCipherSuites = append(cipherSuites, []*cipherSuite{
|
utlsSupportedCipherSuites = append(cipherSuites, []*cipherSuite{
|
||||||
{DISABLED_TLS_RSA_WITH_AES_256_CBC_SHA256, 32, 32, 16, rsaKA,
|
{DISABLED_TLS_RSA_WITH_AES_256_CBC_SHA256, 32, 32, 16, rsaKA,
|
||||||
suiteTLS12 | suiteDefaultOff, cipherAES, macSHA256, nil},
|
suiteTLS12, cipherAES, macSHA256, nil},
|
||||||
|
|
||||||
{DISABLED_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, 32, 48, 16, ecdheECDSAKA,
|
{DISABLED_TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, 32, 48, 16, ecdheECDSAKA,
|
||||||
suiteECDHE | suiteECDSA | suiteTLS12 | suiteDefaultOff | suiteSHA384, cipherAES, utlsMacSHA384, nil},
|
suiteECDHE | suiteECSign | suiteTLS12 | suiteSHA384, cipherAES, utlsMacSHA384, nil},
|
||||||
{DISABLED_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, 32, 48, 16, ecdheRSAKA,
|
{DISABLED_TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, 32, 48, 16, ecdheRSAKA,
|
||||||
suiteECDHE | suiteTLS12 | suiteDefaultOff | suiteSHA384, cipherAES, utlsMacSHA384, nil},
|
suiteECDHE | suiteTLS12 | suiteSHA384, cipherAES, utlsMacSHA384, nil},
|
||||||
}...)
|
}...)
|
||||||
}
|
}
|
||||||
|
|
181
u_conn.go
181
u_conn.go
|
@ -7,10 +7,12 @@ package tls
|
||||||
import (
|
import (
|
||||||
"bufio"
|
"bufio"
|
||||||
"bytes"
|
"bytes"
|
||||||
|
"context"
|
||||||
"crypto/cipher"
|
"crypto/cipher"
|
||||||
"encoding/binary"
|
"encoding/binary"
|
||||||
"errors"
|
"errors"
|
||||||
"fmt"
|
"fmt"
|
||||||
|
"hash"
|
||||||
"io"
|
"io"
|
||||||
"net"
|
"net"
|
||||||
"strconv"
|
"strconv"
|
||||||
|
@ -24,7 +26,7 @@ type UConn struct {
|
||||||
ClientHelloID ClientHelloID
|
ClientHelloID ClientHelloID
|
||||||
|
|
||||||
ClientHelloBuilt bool
|
ClientHelloBuilt bool
|
||||||
HandshakeState ClientHandshakeState
|
HandshakeState PubClientHandshakeState
|
||||||
|
|
||||||
// sessionID may or may not depend on ticket; nil => random
|
// sessionID may or may not depend on ticket; nil => random
|
||||||
GetSessionID func(ticket []byte) [32]byte
|
GetSessionID func(ticket []byte) [32]byte
|
||||||
|
@ -46,20 +48,24 @@ func UClient(conn net.Conn, config *Config, clientHelloID ClientHelloID) *UConn
|
||||||
config = &Config{}
|
config = &Config{}
|
||||||
}
|
}
|
||||||
tlsConn := Conn{conn: conn, config: config, isClient: true}
|
tlsConn := Conn{conn: conn, config: config, isClient: true}
|
||||||
handshakeState := ClientHandshakeState{C: &tlsConn, Hello: &ClientHelloMsg{}}
|
handshakeState := PubClientHandshakeState{C: &tlsConn, Hello: &PubClientHelloMsg{}}
|
||||||
uconn := UConn{Conn: &tlsConn, ClientHelloID: clientHelloID, HandshakeState: handshakeState}
|
uconn := UConn{Conn: &tlsConn, ClientHelloID: clientHelloID, HandshakeState: handshakeState}
|
||||||
uconn.HandshakeState.uconn = &uconn
|
uconn.HandshakeState.uconn = &uconn
|
||||||
|
uconn.handshakeFn = uconn.clientHandshake
|
||||||
return &uconn
|
return &uconn
|
||||||
}
|
}
|
||||||
|
|
||||||
// BuildHandshakeState behavior varies based on ClientHelloID and
|
// BuildHandshakeState behavior varies based on ClientHelloID and
|
||||||
// whether it was already called before.
|
// whether it was already called before.
|
||||||
// If HelloGolang:
|
// If HelloGolang:
|
||||||
// [only once] make default ClientHello and overwrite existing state
|
//
|
||||||
|
// [only once] make default ClientHello and overwrite existing state
|
||||||
|
//
|
||||||
// If any other mimicking ClientHelloID is used:
|
// If any other mimicking ClientHelloID is used:
|
||||||
// [only once] make ClientHello based on ID and overwrite existing state
|
//
|
||||||
// [each call] apply uconn.Extensions config to internal crypto/tls structures
|
// [only once] make ClientHello based on ID and overwrite existing state
|
||||||
// [each call] marshal ClientHello.
|
// [each call] apply uconn.Extensions config to internal crypto/tls structures
|
||||||
|
// [each call] marshal ClientHello.
|
||||||
//
|
//
|
||||||
// BuildHandshakeState is automatically called before uTLS performs handshake,
|
// BuildHandshakeState is automatically called before uTLS performs handshake,
|
||||||
// amd should only be called explicitly to inspect/change fields of
|
// amd should only be called explicitly to inspect/change fields of
|
||||||
|
@ -195,6 +201,63 @@ func (uconn *UConn) removeSNIExtension() {
|
||||||
// Handshake runs the client handshake using given clientHandshakeState
|
// Handshake runs the client handshake using given clientHandshakeState
|
||||||
// Requires hs.hello, and, optionally, hs.session to be set.
|
// Requires hs.hello, and, optionally, hs.session to be set.
|
||||||
func (c *UConn) Handshake() error {
|
func (c *UConn) Handshake() error {
|
||||||
|
return c.HandshakeContext(context.Background())
|
||||||
|
}
|
||||||
|
|
||||||
|
// HandshakeContext runs the client or server handshake
|
||||||
|
// protocol if it has not yet been run.
|
||||||
|
//
|
||||||
|
// The provided Context must be non-nil. If the context is canceled before
|
||||||
|
// the handshake is complete, the handshake is interrupted and an error is returned.
|
||||||
|
// Once the handshake has completed, cancellation of the context will not affect the
|
||||||
|
// connection.
|
||||||
|
func (c *UConn) HandshakeContext(ctx context.Context) error {
|
||||||
|
// Delegate to unexported method for named return
|
||||||
|
// without confusing documented signature.
|
||||||
|
return c.handshakeContext(ctx)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *UConn) handshakeContext(ctx context.Context) (ret error) {
|
||||||
|
// Fast sync/atomic-based exit if there is no handshake in flight and the
|
||||||
|
// last one succeeded without an error. Avoids the expensive context setup
|
||||||
|
// and mutex for most Read and Write calls.
|
||||||
|
if c.handshakeComplete() {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
handshakeCtx, cancel := context.WithCancel(ctx)
|
||||||
|
// Note: defer this before starting the "interrupter" goroutine
|
||||||
|
// so that we can tell the difference between the input being canceled and
|
||||||
|
// this cancellation. In the former case, we need to close the connection.
|
||||||
|
defer cancel()
|
||||||
|
|
||||||
|
// Start the "interrupter" goroutine, if this context might be canceled.
|
||||||
|
// (The background context cannot).
|
||||||
|
//
|
||||||
|
// The interrupter goroutine waits for the input context to be done and
|
||||||
|
// closes the connection if this happens before the function returns.
|
||||||
|
if ctx.Done() != nil {
|
||||||
|
done := make(chan struct{})
|
||||||
|
interruptRes := make(chan error, 1)
|
||||||
|
defer func() {
|
||||||
|
close(done)
|
||||||
|
if ctxErr := <-interruptRes; ctxErr != nil {
|
||||||
|
// Return context error to user.
|
||||||
|
ret = ctxErr
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
go func() {
|
||||||
|
select {
|
||||||
|
case <-handshakeCtx.Done():
|
||||||
|
// Close the connection, discarding the error
|
||||||
|
_ = c.conn.Close()
|
||||||
|
interruptRes <- handshakeCtx.Err()
|
||||||
|
case <-done:
|
||||||
|
interruptRes <- nil
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
}
|
||||||
|
|
||||||
c.handshakeMutex.Lock()
|
c.handshakeMutex.Lock()
|
||||||
defer c.handshakeMutex.Unlock()
|
defer c.handshakeMutex.Unlock()
|
||||||
|
|
||||||
|
@ -208,18 +271,15 @@ func (c *UConn) Handshake() error {
|
||||||
c.in.Lock()
|
c.in.Lock()
|
||||||
defer c.in.Unlock()
|
defer c.in.Unlock()
|
||||||
|
|
||||||
|
// [uTLS section begins]
|
||||||
if c.isClient {
|
if c.isClient {
|
||||||
// [uTLS section begins]
|
|
||||||
err := c.BuildHandshakeState()
|
err := c.BuildHandshakeState()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
// [uTLS section ends]
|
|
||||||
|
|
||||||
c.handshakeErr = c.clientHandshake()
|
|
||||||
} else {
|
|
||||||
c.handshakeErr = c.serverHandshake()
|
|
||||||
}
|
}
|
||||||
|
// [uTLS section ends]
|
||||||
|
c.handshakeErr = c.handshakeFn(handshakeCtx)
|
||||||
if c.handshakeErr == nil {
|
if c.handshakeErr == nil {
|
||||||
c.handshakes++
|
c.handshakes++
|
||||||
} else {
|
} else {
|
||||||
|
@ -242,7 +302,7 @@ func (c *UConn) Write(b []byte) (int, error) {
|
||||||
for {
|
for {
|
||||||
x := atomic.LoadInt32(&c.activeCall)
|
x := atomic.LoadInt32(&c.activeCall)
|
||||||
if x&1 != 0 {
|
if x&1 != 0 {
|
||||||
return 0, errClosed
|
return 0, net.ErrClosed
|
||||||
}
|
}
|
||||||
if atomic.CompareAndSwapInt32(&c.activeCall, x, x+2) {
|
if atomic.CompareAndSwapInt32(&c.activeCall, x, x+2) {
|
||||||
defer atomic.AddInt32(&c.activeCall, -2)
|
defer atomic.AddInt32(&c.activeCall, -2)
|
||||||
|
@ -295,7 +355,7 @@ func (c *UConn) Write(b []byte) (int, error) {
|
||||||
|
|
||||||
// clientHandshakeWithOneState checks that exactly one expected state is set (1.2 or 1.3)
|
// clientHandshakeWithOneState checks that exactly one expected state is set (1.2 or 1.3)
|
||||||
// and performs client TLS handshake with that state
|
// and performs client TLS handshake with that state
|
||||||
func (c *UConn) clientHandshake() (err error) {
|
func (c *UConn) clientHandshake(ctx context.Context) (err error) {
|
||||||
// [uTLS section begins]
|
// [uTLS section begins]
|
||||||
hello := c.HandshakeState.Hello.getPrivatePtr()
|
hello := c.HandshakeState.Hello.getPrivatePtr()
|
||||||
defer func() { c.HandshakeState.Hello = hello.getPublicPtr() }()
|
defer func() { c.HandshakeState.Hello = hello.getPublicPtr() }()
|
||||||
|
@ -389,6 +449,7 @@ func (c *UConn) clientHandshake() (err error) {
|
||||||
hs13.earlySecret = earlySecret
|
hs13.earlySecret = earlySecret
|
||||||
hs13.binderKey = binderKey
|
hs13.binderKey = binderKey
|
||||||
}
|
}
|
||||||
|
hs13.ctx = ctx
|
||||||
// In TLS 1.3, session tickets are delivered after the handshake.
|
// In TLS 1.3, session tickets are delivered after the handshake.
|
||||||
err = hs13.handshake()
|
err = hs13.handshake()
|
||||||
if handshakeState := hs13.toPublic13(); handshakeState != nil {
|
if handshakeState := hs13.toPublic13(); handshakeState != nil {
|
||||||
|
@ -400,6 +461,7 @@ func (c *UConn) clientHandshake() (err error) {
|
||||||
hs12 := c.HandshakeState.toPrivate12()
|
hs12 := c.HandshakeState.toPrivate12()
|
||||||
hs12.serverHello = serverHello
|
hs12.serverHello = serverHello
|
||||||
hs12.hello = hello
|
hs12.hello = hello
|
||||||
|
hs12.ctx = ctx
|
||||||
err = hs12.handshake()
|
err = hs12.handshake()
|
||||||
if handshakeState := hs12.toPublic12(); handshakeState != nil {
|
if handshakeState := hs12.toPublic12(); handshakeState != nil {
|
||||||
c.HandshakeState = *handshakeState
|
c.HandshakeState = *handshakeState
|
||||||
|
@ -516,9 +578,9 @@ func (uconn *UConn) GetOutKeystream(length int) ([]byte, error) {
|
||||||
|
|
||||||
// SetTLSVers sets min and max TLS version in all appropriate places.
|
// SetTLSVers sets min and max TLS version in all appropriate places.
|
||||||
// Function will use first non-zero version parsed in following order:
|
// Function will use first non-zero version parsed in following order:
|
||||||
// 1) Provided minTLSVers, maxTLSVers
|
// 1. Provided minTLSVers, maxTLSVers
|
||||||
// 2) specExtensions may have SupportedVersionsExtension
|
// 2. specExtensions may have SupportedVersionsExtension
|
||||||
// 3) [default] min = TLS 1.0, max = TLS 1.2
|
// 3. [default] min = TLS 1.0, max = TLS 1.2
|
||||||
//
|
//
|
||||||
// Error is only returned if things are in clearly undesirable state
|
// Error is only returned if things are in clearly undesirable state
|
||||||
// to help user fix them.
|
// to help user fix them.
|
||||||
|
@ -594,50 +656,51 @@ func (uconn *UConn) GetUnderlyingConn() net.Conn {
|
||||||
func MakeConnWithCompleteHandshake(tcpConn net.Conn, version uint16, cipherSuite uint16, masterSecret []byte, clientRandom []byte, serverRandom []byte, isClient bool) *Conn {
|
func MakeConnWithCompleteHandshake(tcpConn net.Conn, version uint16, cipherSuite uint16, masterSecret []byte, clientRandom []byte, serverRandom []byte, isClient bool) *Conn {
|
||||||
tlsConn := &Conn{conn: tcpConn, config: &Config{}, isClient: isClient}
|
tlsConn := &Conn{conn: tcpConn, config: &Config{}, isClient: isClient}
|
||||||
cs := cipherSuiteByID(cipherSuite)
|
cs := cipherSuiteByID(cipherSuite)
|
||||||
if cs == nil {
|
if cs != nil {
|
||||||
|
// This is mostly borrowed from establishKeys()
|
||||||
|
clientMAC, serverMAC, clientKey, serverKey, clientIV, serverIV :=
|
||||||
|
keysFromMasterSecret(version, cs, masterSecret, clientRandom, serverRandom,
|
||||||
|
cs.macLen, cs.keyLen, cs.ivLen)
|
||||||
|
|
||||||
|
var clientCipher, serverCipher interface{}
|
||||||
|
var clientHash, serverHash hash.Hash
|
||||||
|
if cs.cipher != nil {
|
||||||
|
clientCipher = cs.cipher(clientKey, clientIV, true /* for reading */)
|
||||||
|
clientHash = cs.mac(clientMAC)
|
||||||
|
serverCipher = cs.cipher(serverKey, serverIV, false /* not for reading */)
|
||||||
|
serverHash = cs.mac(serverMAC)
|
||||||
|
} else {
|
||||||
|
clientCipher = cs.aead(clientKey, clientIV)
|
||||||
|
serverCipher = cs.aead(serverKey, serverIV)
|
||||||
|
}
|
||||||
|
|
||||||
|
if isClient {
|
||||||
|
tlsConn.in.prepareCipherSpec(version, serverCipher, serverHash)
|
||||||
|
tlsConn.out.prepareCipherSpec(version, clientCipher, clientHash)
|
||||||
|
} else {
|
||||||
|
tlsConn.in.prepareCipherSpec(version, clientCipher, clientHash)
|
||||||
|
tlsConn.out.prepareCipherSpec(version, serverCipher, serverHash)
|
||||||
|
}
|
||||||
|
|
||||||
|
// skip the handshake states
|
||||||
|
atomic.StoreUint32(&tlsConn.handshakeStatus, 1)
|
||||||
|
tlsConn.cipherSuite = cipherSuite
|
||||||
|
tlsConn.haveVers = true
|
||||||
|
tlsConn.vers = version
|
||||||
|
|
||||||
|
// Update to the new cipher specs
|
||||||
|
// and consume the finished messages
|
||||||
|
tlsConn.in.changeCipherSpec()
|
||||||
|
tlsConn.out.changeCipherSpec()
|
||||||
|
|
||||||
|
tlsConn.in.incSeq()
|
||||||
|
tlsConn.out.incSeq()
|
||||||
|
|
||||||
|
return tlsConn
|
||||||
|
} else {
|
||||||
|
// TODO: Support TLS 1.3 Cipher Suites
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// This is mostly borrowed from establishKeys()
|
|
||||||
clientMAC, serverMAC, clientKey, serverKey, clientIV, serverIV :=
|
|
||||||
keysFromMasterSecret(version, cs, masterSecret, clientRandom, serverRandom,
|
|
||||||
cs.macLen, cs.keyLen, cs.ivLen)
|
|
||||||
|
|
||||||
var clientCipher, serverCipher interface{}
|
|
||||||
var clientHash, serverHash macFunction
|
|
||||||
if cs.cipher != nil {
|
|
||||||
clientCipher = cs.cipher(clientKey, clientIV, true /* for reading */)
|
|
||||||
clientHash = cs.mac(version, clientMAC)
|
|
||||||
serverCipher = cs.cipher(serverKey, serverIV, false /* not for reading */)
|
|
||||||
serverHash = cs.mac(version, serverMAC)
|
|
||||||
} else {
|
|
||||||
clientCipher = cs.aead(clientKey, clientIV)
|
|
||||||
serverCipher = cs.aead(serverKey, serverIV)
|
|
||||||
}
|
|
||||||
|
|
||||||
if isClient {
|
|
||||||
tlsConn.in.prepareCipherSpec(version, serverCipher, serverHash)
|
|
||||||
tlsConn.out.prepareCipherSpec(version, clientCipher, clientHash)
|
|
||||||
} else {
|
|
||||||
tlsConn.in.prepareCipherSpec(version, clientCipher, clientHash)
|
|
||||||
tlsConn.out.prepareCipherSpec(version, serverCipher, serverHash)
|
|
||||||
}
|
|
||||||
|
|
||||||
// skip the handshake states
|
|
||||||
tlsConn.handshakeStatus = 1
|
|
||||||
tlsConn.cipherSuite = cipherSuite
|
|
||||||
tlsConn.haveVers = true
|
|
||||||
tlsConn.vers = version
|
|
||||||
|
|
||||||
// Update to the new cipher specs
|
|
||||||
// and consume the finished messages
|
|
||||||
tlsConn.in.changeCipherSpec()
|
|
||||||
tlsConn.out.changeCipherSpec()
|
|
||||||
|
|
||||||
tlsConn.in.incSeq()
|
|
||||||
tlsConn.out.incSeq()
|
|
||||||
|
|
||||||
return tlsConn
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func makeSupportedVersions(minVers, maxVers uint16) []uint16 {
|
func makeSupportedVersions(minVers, maxVers uint16) []uint16 {
|
||||||
|
|
|
@ -53,21 +53,24 @@ func TestUTLSMarshalNoOp(t *testing.T) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestUTLSHandshakeClientParrotGolang(t *testing.T) {
|
// TODO: the following tests needs to be fixed as crypto/tls has changed the behavior due to upgrade
|
||||||
hello := &helloID{HelloGolang}
|
// func TestUTLSHandshakeClientParrotGolang(t *testing.T) {
|
||||||
|
// hello := &helloID{HelloGolang}
|
||||||
|
|
||||||
testUTLSHandshakeClientECDHE_ECDSA_WITH_CHACHA20_POLY1305(t, hello)
|
// // TODO: All subtests here are failing due to mismatch
|
||||||
testUTLSHandshakeClientECDHE_RSA_WITH_CHACHA20_POLY1305(t, hello)
|
|
||||||
|
|
||||||
testUTLSHandshakeClientECDHE_RSA_AES128_GCM_SHA256(t, hello)
|
// testUTLSHandshakeClientECDHE_ECDSA_WITH_CHACHA20_POLY1305(t, hello)
|
||||||
testUTLSHandshakeClientECDHE_ECDSA_AES128_GCM_SHA256(t, hello)
|
// testUTLSHandshakeClientECDHE_RSA_WITH_CHACHA20_POLY1305(t, hello)
|
||||||
testUTLSHandshakeClientECDHE_RSA_AES256_CBC_SHA(t, hello)
|
|
||||||
testUTLSHandshakeClientECDHE_ECDSA_AES256_CBC_SHA(t, hello)
|
|
||||||
testUTLSHandshakeClientECDHE_RSA_AES128_CBC_SHA(t, hello)
|
|
||||||
testUTLSHandshakeClientECDHE_ECDSA_AES128_CBC_SHA(t, hello)
|
|
||||||
|
|
||||||
testUTLSHandshakeClientRSA_AES128_GCM_SHA256(t, hello)
|
// testUTLSHandshakeClientECDHE_RSA_AES128_GCM_SHA256(t, hello)
|
||||||
}
|
// testUTLSHandshakeClientECDHE_ECDSA_AES128_GCM_SHA256(t, hello)
|
||||||
|
// testUTLSHandshakeClientECDHE_RSA_AES256_CBC_SHA(t, hello)
|
||||||
|
// testUTLSHandshakeClientECDHE_ECDSA_AES256_CBC_SHA(t, hello)
|
||||||
|
// testUTLSHandshakeClientECDHE_RSA_AES128_CBC_SHA(t, hello)
|
||||||
|
// testUTLSHandshakeClientECDHE_ECDSA_AES128_CBC_SHA(t, hello)
|
||||||
|
|
||||||
|
// testUTLSHandshakeClientRSA_AES128_GCM_SHA256(t, hello)
|
||||||
|
// }
|
||||||
|
|
||||||
func TestUTLSHandshakeClientParrotChrome_70(t *testing.T) {
|
func TestUTLSHandshakeClientParrotChrome_70(t *testing.T) {
|
||||||
hello := &helloID{HelloChrome_70}
|
hello := &helloID{HelloChrome_70}
|
||||||
|
@ -454,7 +457,7 @@ func runUTLSClientTestTLS13(t *testing.T, template *clientTest, hello helloStrat
|
||||||
}
|
}
|
||||||
|
|
||||||
func (test *clientTest) runUTLS(t *testing.T, write bool, hello helloStrategy, omitSNIExtension bool) {
|
func (test *clientTest) runUTLS(t *testing.T, write bool, hello helloStrategy, omitSNIExtension bool) {
|
||||||
checkOpenSSLVersion(t)
|
checkOpenSSLVersion()
|
||||||
|
|
||||||
var clientConn, serverConn net.Conn
|
var clientConn, serverConn net.Conn
|
||||||
var recordingConn *recordingConn
|
var recordingConn *recordingConn
|
||||||
|
@ -652,12 +655,12 @@ func (test *clientTest) runUTLS(t *testing.T, write bool, hello helloStrategy, o
|
||||||
}
|
}
|
||||||
for i, b := range flows {
|
for i, b := range flows {
|
||||||
if i%2 == 1 {
|
if i%2 == 1 {
|
||||||
serverConn.SetWriteDeadline(time.Now().Add(1 * time.Minute))
|
serverConn.SetWriteDeadline(time.Now().Add(2 * time.Second)) // [uTLS] 1min -> 2sec
|
||||||
serverConn.Write(b)
|
serverConn.Write(b)
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
bb := make([]byte, len(b))
|
bb := make([]byte, len(b))
|
||||||
serverConn.SetReadDeadline(time.Now().Add(1 * time.Minute))
|
serverConn.SetReadDeadline(time.Now().Add(2 * time.Second)) // [uTLS] 1min -> 2sec
|
||||||
_, err := io.ReadFull(serverConn, bb)
|
_, err := io.ReadFull(serverConn, bb)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatalf("%s #%d: %s", test.name, i, err)
|
t.Fatalf("%s #%d: %s", test.name, i, err)
|
||||||
|
|
|
@ -42,7 +42,7 @@ func assertEquality(t *testing.T, fieldName string, expected, actual interface{}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func compareClientHelloFields(t *testing.T, fieldName string, expected, actual *ClientHelloMsg) {
|
func compareClientHelloFields(t *testing.T, fieldName string, expected, actual *PubClientHelloMsg) {
|
||||||
rExpected := reflect.ValueOf(expected)
|
rExpected := reflect.ValueOf(expected)
|
||||||
if rExpected.Kind() != reflect.Ptr || rExpected.Elem().Kind() != reflect.Struct {
|
if rExpected.Kind() != reflect.Ptr || rExpected.Elem().Kind() != reflect.Struct {
|
||||||
t.Errorf("Error using reflect to compare Hello fields")
|
t.Errorf("Error using reflect to compare Hello fields")
|
||||||
|
|
10
u_parrots.go
10
u_parrots.go
|
@ -586,7 +586,7 @@ func (uconn *UConn) ApplyPreset(p *ClientHelloSpec) error {
|
||||||
strconv.Itoa(len(hello.Random)) + " bytes")
|
strconv.Itoa(len(hello.Random)) + " bytes")
|
||||||
}
|
}
|
||||||
if len(hello.CipherSuites) == 0 {
|
if len(hello.CipherSuites) == 0 {
|
||||||
hello.CipherSuites = defaultCipherSuites()
|
hello.CipherSuites = defaultCipherSuites
|
||||||
}
|
}
|
||||||
if len(hello.CompressionMethods) == 0 {
|
if len(hello.CompressionMethods) == 0 {
|
||||||
hello.CompressionMethods = []uint8{compressionNone}
|
hello.CompressionMethods = []uint8{compressionNone}
|
||||||
|
@ -730,8 +730,8 @@ func (uconn *UConn) generateRandomizedSpec() (ClientHelloSpec, error) {
|
||||||
return p, fmt.Errorf("using non-randomized ClientHelloID %v to generate randomized spec", id.Client)
|
return p, fmt.Errorf("using non-randomized ClientHelloID %v to generate randomized spec", id.Client)
|
||||||
}
|
}
|
||||||
|
|
||||||
p.CipherSuites = make([]uint16, len(defaultCipherSuites()))
|
p.CipherSuites = make([]uint16, len(defaultCipherSuites))
|
||||||
copy(p.CipherSuites, defaultCipherSuites())
|
copy(p.CipherSuites, defaultCipherSuites)
|
||||||
shuffledSuites, err := shuffledCiphers(r)
|
shuffledSuites, err := shuffledCiphers(r)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return p, err
|
return p, err
|
||||||
|
@ -740,8 +740,8 @@ func (uconn *UConn) generateRandomizedSpec() (ClientHelloSpec, error) {
|
||||||
if r.FlipWeightedCoin(0.4) {
|
if r.FlipWeightedCoin(0.4) {
|
||||||
p.TLSVersMin = VersionTLS10
|
p.TLSVersMin = VersionTLS10
|
||||||
p.TLSVersMax = VersionTLS13
|
p.TLSVersMax = VersionTLS13
|
||||||
tls13ciphers := make([]uint16, len(defaultCipherSuitesTLS13()))
|
tls13ciphers := make([]uint16, len(defaultCipherSuitesTLS13))
|
||||||
copy(tls13ciphers, defaultCipherSuitesTLS13())
|
copy(tls13ciphers, defaultCipherSuitesTLS13)
|
||||||
r.rand.Shuffle(len(tls13ciphers), func(i, j int) {
|
r.rand.Shuffle(len(tls13ciphers), func(i, j int) {
|
||||||
tls13ciphers[i], tls13ciphers[j] = tls13ciphers[j], tls13ciphers[i]
|
tls13ciphers[i], tls13ciphers[j] = tls13ciphers[j], tls13ciphers[i]
|
||||||
})
|
})
|
||||||
|
|
67
u_public.go
67
u_public.go
|
@ -18,10 +18,10 @@ import (
|
||||||
// - clientHandshakeStateTLS13 (TLS 1.3)
|
// - clientHandshakeStateTLS13 (TLS 1.3)
|
||||||
// uTLS will call .handshake() on one of these private internal states,
|
// uTLS will call .handshake() on one of these private internal states,
|
||||||
// to perform TLS handshake using standard crypto/tls implementation.
|
// to perform TLS handshake using standard crypto/tls implementation.
|
||||||
type ClientHandshakeState struct {
|
type PubClientHandshakeState struct {
|
||||||
C *Conn
|
C *Conn
|
||||||
ServerHello *ServerHelloMsg
|
ServerHello *PubServerHelloMsg
|
||||||
Hello *ClientHelloMsg
|
Hello *PubClientHelloMsg
|
||||||
MasterSecret []byte
|
MasterSecret []byte
|
||||||
Session *ClientSessionState
|
Session *ClientSessionState
|
||||||
|
|
||||||
|
@ -33,7 +33,7 @@ type ClientHandshakeState struct {
|
||||||
|
|
||||||
// TLS 1.3 only
|
// TLS 1.3 only
|
||||||
type TLS13OnlyState struct {
|
type TLS13OnlyState struct {
|
||||||
Suite *CipherSuiteTLS13
|
Suite *PubCipherSuiteTLS13
|
||||||
EcdheParams EcdheParameters
|
EcdheParams EcdheParameters
|
||||||
EarlySecret []byte
|
EarlySecret []byte
|
||||||
BinderKey []byte
|
BinderKey []byte
|
||||||
|
@ -47,10 +47,10 @@ type TLS13OnlyState struct {
|
||||||
// TLS 1.2 and before only
|
// TLS 1.2 and before only
|
||||||
type TLS12OnlyState struct {
|
type TLS12OnlyState struct {
|
||||||
FinishedHash FinishedHash
|
FinishedHash FinishedHash
|
||||||
Suite CipherSuite
|
Suite PubCipherSuite
|
||||||
}
|
}
|
||||||
|
|
||||||
func (chs *ClientHandshakeState) toPrivate13() *clientHandshakeStateTLS13 {
|
func (chs *PubClientHandshakeState) toPrivate13() *clientHandshakeStateTLS13 {
|
||||||
if chs == nil {
|
if chs == nil {
|
||||||
return nil
|
return nil
|
||||||
} else {
|
} else {
|
||||||
|
@ -77,7 +77,7 @@ func (chs *ClientHandshakeState) toPrivate13() *clientHandshakeStateTLS13 {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (chs13 *clientHandshakeStateTLS13) toPublic13() *ClientHandshakeState {
|
func (chs13 *clientHandshakeStateTLS13) toPublic13() *PubClientHandshakeState {
|
||||||
if chs13 == nil {
|
if chs13 == nil {
|
||||||
return nil
|
return nil
|
||||||
} else {
|
} else {
|
||||||
|
@ -92,7 +92,7 @@ func (chs13 *clientHandshakeStateTLS13) toPublic13() *ClientHandshakeState {
|
||||||
TrafficSecret: chs13.trafficSecret,
|
TrafficSecret: chs13.trafficSecret,
|
||||||
Transcript: chs13.transcript,
|
Transcript: chs13.transcript,
|
||||||
}
|
}
|
||||||
return &ClientHandshakeState{
|
return &PubClientHandshakeState{
|
||||||
C: chs13.c,
|
C: chs13.c,
|
||||||
ServerHello: chs13.serverHello.getPublicPtr(),
|
ServerHello: chs13.serverHello.getPublicPtr(),
|
||||||
Hello: chs13.hello.getPublicPtr(),
|
Hello: chs13.hello.getPublicPtr(),
|
||||||
|
@ -108,7 +108,7 @@ func (chs13 *clientHandshakeStateTLS13) toPublic13() *ClientHandshakeState {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (chs *ClientHandshakeState) toPrivate12() *clientHandshakeState {
|
func (chs *PubClientHandshakeState) toPrivate12() *clientHandshakeState {
|
||||||
if chs == nil {
|
if chs == nil {
|
||||||
return nil
|
return nil
|
||||||
} else {
|
} else {
|
||||||
|
@ -128,7 +128,7 @@ func (chs *ClientHandshakeState) toPrivate12() *clientHandshakeState {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (chs12 *clientHandshakeState) toPublic12() *ClientHandshakeState {
|
func (chs12 *clientHandshakeState) toPublic12() *PubClientHandshakeState {
|
||||||
if chs12 == nil {
|
if chs12 == nil {
|
||||||
return nil
|
return nil
|
||||||
} else {
|
} else {
|
||||||
|
@ -136,7 +136,7 @@ func (chs12 *clientHandshakeState) toPublic12() *ClientHandshakeState {
|
||||||
Suite: chs12.suite.getPublicObj(),
|
Suite: chs12.suite.getPublicObj(),
|
||||||
FinishedHash: chs12.finishedHash.getPublicObj(),
|
FinishedHash: chs12.finishedHash.getPublicObj(),
|
||||||
}
|
}
|
||||||
return &ClientHandshakeState{
|
return &PubClientHandshakeState{
|
||||||
C: chs12.c,
|
C: chs12.c,
|
||||||
ServerHello: chs12.serverHello.getPublicPtr(),
|
ServerHello: chs12.serverHello.getPublicPtr(),
|
||||||
Hello: chs12.hello.getPublicPtr(),
|
Hello: chs12.hello.getPublicPtr(),
|
||||||
|
@ -195,18 +195,18 @@ func (crm *CertificateRequestMsgTLS13) toPrivate() *certificateRequestMsgTLS13 {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
type CipherSuiteTLS13 struct {
|
type PubCipherSuiteTLS13 struct {
|
||||||
Id uint16
|
Id uint16
|
||||||
KeyLen int
|
KeyLen int
|
||||||
Aead func(key, fixedNonce []byte) aead
|
Aead func(key, fixedNonce []byte) aead
|
||||||
Hash crypto.Hash
|
Hash crypto.Hash
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *cipherSuiteTLS13) toPublic() *CipherSuiteTLS13 {
|
func (c *cipherSuiteTLS13) toPublic() *PubCipherSuiteTLS13 {
|
||||||
if c == nil {
|
if c == nil {
|
||||||
return nil
|
return nil
|
||||||
} else {
|
} else {
|
||||||
return &CipherSuiteTLS13{
|
return &PubCipherSuiteTLS13{
|
||||||
Id: c.id,
|
Id: c.id,
|
||||||
KeyLen: c.keyLen,
|
KeyLen: c.keyLen,
|
||||||
Aead: c.aead,
|
Aead: c.aead,
|
||||||
|
@ -215,7 +215,7 @@ func (c *cipherSuiteTLS13) toPublic() *CipherSuiteTLS13 {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *CipherSuiteTLS13) toPrivate() *cipherSuiteTLS13 {
|
func (c *PubCipherSuiteTLS13) toPrivate() *cipherSuiteTLS13 {
|
||||||
if c == nil {
|
if c == nil {
|
||||||
return nil
|
return nil
|
||||||
} else {
|
} else {
|
||||||
|
@ -228,7 +228,7 @@ func (c *CipherSuiteTLS13) toPrivate() *cipherSuiteTLS13 {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
type ServerHelloMsg struct {
|
type PubServerHelloMsg struct {
|
||||||
Raw []byte
|
Raw []byte
|
||||||
Vers uint16
|
Vers uint16
|
||||||
Random []byte
|
Random []byte
|
||||||
|
@ -255,7 +255,7 @@ type ServerHelloMsg struct {
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (shm *ServerHelloMsg) getPrivatePtr() *serverHelloMsg {
|
func (shm *PubServerHelloMsg) getPrivatePtr() *serverHelloMsg {
|
||||||
if shm == nil {
|
if shm == nil {
|
||||||
return nil
|
return nil
|
||||||
} else {
|
} else {
|
||||||
|
@ -285,11 +285,11 @@ func (shm *ServerHelloMsg) getPrivatePtr() *serverHelloMsg {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (shm *serverHelloMsg) getPublicPtr() *ServerHelloMsg {
|
func (shm *serverHelloMsg) getPublicPtr() *PubServerHelloMsg {
|
||||||
if shm == nil {
|
if shm == nil {
|
||||||
return nil
|
return nil
|
||||||
} else {
|
} else {
|
||||||
return &ServerHelloMsg{
|
return &PubServerHelloMsg{
|
||||||
Raw: shm.raw,
|
Raw: shm.raw,
|
||||||
Vers: shm.vers,
|
Vers: shm.vers,
|
||||||
Random: shm.random,
|
Random: shm.random,
|
||||||
|
@ -315,7 +315,7 @@ func (shm *serverHelloMsg) getPublicPtr() *ServerHelloMsg {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
type ClientHelloMsg struct {
|
type PubClientHelloMsg struct {
|
||||||
Raw []byte
|
Raw []byte
|
||||||
Vers uint16
|
Vers uint16
|
||||||
Random []byte
|
Random []byte
|
||||||
|
@ -326,7 +326,7 @@ type ClientHelloMsg struct {
|
||||||
ServerName string
|
ServerName string
|
||||||
OcspStapling bool
|
OcspStapling bool
|
||||||
Scts bool
|
Scts bool
|
||||||
Ems bool // [UTLS] actually implemented due to its prevalence
|
Ems bool // [uTLS] actually implemented due to its prevalence
|
||||||
SupportedCurves []CurveID
|
SupportedCurves []CurveID
|
||||||
SupportedPoints []uint8
|
SupportedPoints []uint8
|
||||||
TicketSupported bool
|
TicketSupported bool
|
||||||
|
@ -347,7 +347,7 @@ type ClientHelloMsg struct {
|
||||||
PskBinders [][]byte
|
PskBinders [][]byte
|
||||||
}
|
}
|
||||||
|
|
||||||
func (chm *ClientHelloMsg) getPrivatePtr() *clientHelloMsg {
|
func (chm *PubClientHelloMsg) getPrivatePtr() *clientHelloMsg {
|
||||||
if chm == nil {
|
if chm == nil {
|
||||||
return nil
|
return nil
|
||||||
} else {
|
} else {
|
||||||
|
@ -384,11 +384,11 @@ func (chm *ClientHelloMsg) getPrivatePtr() *clientHelloMsg {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (chm *clientHelloMsg) getPublicPtr() *ClientHelloMsg {
|
func (chm *clientHelloMsg) getPublicPtr() *PubClientHelloMsg {
|
||||||
if chm == nil {
|
if chm == nil {
|
||||||
return nil
|
return nil
|
||||||
} else {
|
} else {
|
||||||
return &ClientHelloMsg{
|
return &PubClientHelloMsg{
|
||||||
Raw: chm.raw,
|
Raw: chm.raw,
|
||||||
Vers: chm.vers,
|
Vers: chm.vers,
|
||||||
Random: chm.random,
|
Random: chm.random,
|
||||||
|
@ -423,7 +423,7 @@ func (chm *clientHelloMsg) getPublicPtr() *ClientHelloMsg {
|
||||||
|
|
||||||
// UnmarshalClientHello allows external code to parse raw client hellos.
|
// UnmarshalClientHello allows external code to parse raw client hellos.
|
||||||
// It returns nil on failure.
|
// It returns nil on failure.
|
||||||
func UnmarshalClientHello(data []byte) *ClientHelloMsg {
|
func UnmarshalClientHello(data []byte) *PubClientHelloMsg {
|
||||||
m := &clientHelloMsg{}
|
m := &clientHelloMsg{}
|
||||||
if m.unmarshal(data) {
|
if m.unmarshal(data) {
|
||||||
return m.getPublicPtr()
|
return m.getPublicPtr()
|
||||||
|
@ -433,7 +433,7 @@ func UnmarshalClientHello(data []byte) *ClientHelloMsg {
|
||||||
|
|
||||||
// A CipherSuite is a specific combination of key agreement, cipher and MAC
|
// A CipherSuite is a specific combination of key agreement, cipher and MAC
|
||||||
// function. All cipher suites currently assume RSA key agreement.
|
// function. All cipher suites currently assume RSA key agreement.
|
||||||
type CipherSuite struct {
|
type PubCipherSuite struct {
|
||||||
Id uint16
|
Id uint16
|
||||||
// the lengths, in bytes, of the key material needed for each component.
|
// the lengths, in bytes, of the key material needed for each component.
|
||||||
KeyLen int
|
KeyLen int
|
||||||
|
@ -443,11 +443,11 @@ type CipherSuite struct {
|
||||||
// flags is a bitmask of the suite* values, above.
|
// flags is a bitmask of the suite* values, above.
|
||||||
Flags int
|
Flags int
|
||||||
Cipher func(key, iv []byte, isRead bool) interface{}
|
Cipher func(key, iv []byte, isRead bool) interface{}
|
||||||
Mac func(version uint16, macKey []byte) macFunction
|
Mac func(macKey []byte) hash.Hash
|
||||||
Aead func(key, fixedNonce []byte) aead
|
Aead func(key, fixedNonce []byte) aead
|
||||||
}
|
}
|
||||||
|
|
||||||
func (cs *CipherSuite) getPrivatePtr() *cipherSuite {
|
func (cs *PubCipherSuite) getPrivatePtr() *cipherSuite {
|
||||||
if cs == nil {
|
if cs == nil {
|
||||||
return nil
|
return nil
|
||||||
} else {
|
} else {
|
||||||
|
@ -465,11 +465,11 @@ func (cs *CipherSuite) getPrivatePtr() *cipherSuite {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (cs *cipherSuite) getPublicObj() CipherSuite {
|
func (cs *cipherSuite) getPublicObj() PubCipherSuite {
|
||||||
if cs == nil {
|
if cs == nil {
|
||||||
return CipherSuite{}
|
return PubCipherSuite{}
|
||||||
} else {
|
} else {
|
||||||
return CipherSuite{
|
return PubCipherSuite{
|
||||||
Id: cs.id,
|
Id: cs.id,
|
||||||
KeyLen: cs.keyLen,
|
KeyLen: cs.keyLen,
|
||||||
MacLen: cs.macLen,
|
MacLen: cs.macLen,
|
||||||
|
@ -636,7 +636,10 @@ type TicketKeys []TicketKey
|
||||||
type ticketKeys []ticketKey
|
type ticketKeys []ticketKey
|
||||||
|
|
||||||
func TicketKeyFromBytes(b [32]byte) TicketKey {
|
func TicketKeyFromBytes(b [32]byte) TicketKey {
|
||||||
tk := ticketKeyFromBytes(b)
|
// [uTLS]
|
||||||
|
// empty config is required
|
||||||
|
config := &Config{}
|
||||||
|
tk := config.ticketKeyFromBytes(b)
|
||||||
return tk.ToPublic()
|
return tk.ToPublic()
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue