From eb3c8be9a11ecb4be6a222dbab6d6088de1921a4 Mon Sep 17 00:00:00 2001 From: Sergey Frolov Date: Wed, 16 Aug 2017 11:55:39 -0400 Subject: [PATCH] Revert "Remove appendToGlobalCipherSuites" This reverts commit 0af497570ec7f3a7f69f04fd5766158b236788ec. --- u_common.go | 11 +++++++++++ u_conn_test.go | 9 +++++++++ u_parrots.go | 8 ++++++++ 3 files changed, 28 insertions(+) diff --git a/u_common.go b/u_common.go index a869643..721034a 100644 --- a/u_common.go +++ b/u_common.go @@ -99,6 +99,17 @@ var ( HelloAndroid_5_1_Browser ClientHelloID = ClientHelloID{helloAndroid, 22} ) +// Appends newCipher to cipherSuites, if not there already +// Used to add old cipher ids +func appendToGlobalCipherSuites(newCipher *cipherSuite) { + for _, c := range cipherSuites { + if c.id == newCipher.id { + return + } + } + cipherSuites = append(cipherSuites, newCipher) +} + // Appends {hash, sig} to supportedSignatureAlgorithms, if not there already // Used to enable already supported but disabled signatures func appendToGlobalSigAlgs(hash uint8, sig uint8) { diff --git a/u_conn_test.go b/u_conn_test.go index aa04311..a905813 100644 --- a/u_conn_test.go +++ b/u_conn_test.go @@ -210,9 +210,12 @@ func TestUTLSHandshakeClientParrotAndroid_5_1(t *testing.T) { // As this package sometimes has to modify global vars cipherSuites and supportedSignatureAlgorithms, // we'll back them up and restore after running the tests. + cipherSuitesBackup := make([]*cipherSuite, len(cipherSuites)) supportedSignatureAlgorithmsBackup := make([]signatureAndHash, len(supportedSignatureAlgorithms)) + copy(cipherSuitesBackup, cipherSuites) copy(supportedSignatureAlgorithmsBackup, supportedSignatureAlgorithms) defer func() { + cipherSuites = cipherSuitesBackup supportedSignatureAlgorithms = supportedSignatureAlgorithmsBackup }() @@ -235,9 +238,12 @@ func TestUTLSHandshakeClientParrotAndroid_6_0(t *testing.T) { // As this package sometimes has to modify global vars cipherSuites and supportedSignatureAlgorithms, // we'll back them up and restore after running the tests. + cipherSuitesBackup := make([]*cipherSuite, len(cipherSuites)) supportedSignatureAlgorithmsBackup := make([]signatureAndHash, len(supportedSignatureAlgorithms)) + copy(cipherSuitesBackup, cipherSuites) copy(supportedSignatureAlgorithmsBackup, supportedSignatureAlgorithms) defer func() { + cipherSuites = cipherSuitesBackup supportedSignatureAlgorithms = supportedSignatureAlgorithmsBackup }() @@ -260,9 +266,12 @@ func TestUTLSHandshakeClientParrotChrome_58(t *testing.T) { // As this package sometimes has to modify global vars cipherSuites and supportedSignatureAlgorithms, // we'll back them up and restore after running the tests. + cipherSuitesBackup := make([]*cipherSuite, len(cipherSuites)) supportedSignatureAlgorithmsBackup := make([]signatureAndHash, len(supportedSignatureAlgorithms)) + copy(cipherSuitesBackup, cipherSuites) copy(supportedSignatureAlgorithmsBackup, supportedSignatureAlgorithms) defer func() { + cipherSuites = cipherSuitesBackup supportedSignatureAlgorithms = supportedSignatureAlgorithmsBackup }() diff --git a/u_parrots.go b/u_parrots.go index 072c44d..eda5ede 100644 --- a/u_parrots.go +++ b/u_parrots.go @@ -163,6 +163,10 @@ func (uconn *UConn) parrotAndroid_6_0() error { hello := uconn.HandshakeState.Hello session := uconn.HandshakeState.Session + appendToGlobalCipherSuites(&cipherSuite{OLD_TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256, 32, 0, 12, + ecdheRSAKA, suiteECDHE | suiteTLS12, nil, nil, aeadChaCha20Poly1305}) + appendToGlobalCipherSuites(&cipherSuite{OLD_TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256, 32, 0, 12, + ecdheECDSAKA, suiteECDHE | suiteECDSA | suiteTLS12, nil, nil, aeadChaCha20Poly1305}) hello.CipherSuites = []uint16{ OLD_TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256, OLD_TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256, @@ -238,6 +242,10 @@ func (uconn *UConn) parrotAndroid_5_1() error { hello := uconn.HandshakeState.Hello session := uconn.HandshakeState.Session + appendToGlobalCipherSuites(&cipherSuite{OLD_TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256, 32, 0, 12, + ecdheRSAKA, suiteECDHE | suiteTLS12, nil, nil, aeadChaCha20Poly1305}) + appendToGlobalCipherSuites(&cipherSuite{OLD_TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256, 32, 0, 12, + ecdheECDSAKA, suiteECDHE | suiteECDSA | suiteTLS12, nil, nil, aeadChaCha20Poly1305}) hello.CipherSuites = []uint16{ OLD_TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256, OLD_TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256,