mirror of
https://github.com/refraction-networking/utls.git
synced 2025-04-04 20:47:36 +03:00
[dev.boringcrypto] all: merge master into dev.boringcrypto
Change-Id: I18dbf4f9fa7e2334fccedd862a523126cf38164e
This commit is contained in:
commit
fe7952ca1d
9 changed files with 23 additions and 23 deletions
|
@ -142,7 +142,7 @@ type cipherSuite struct {
|
||||||
ka func(version uint16) keyAgreement
|
ka func(version uint16) keyAgreement
|
||||||
// flags is a bitmask of the suite* values, above.
|
// flags is a bitmask of the suite* values, above.
|
||||||
flags int
|
flags int
|
||||||
cipher func(key, iv []byte, isRead bool) interface{}
|
cipher func(key, iv []byte, isRead bool) any
|
||||||
mac func(key []byte) hash.Hash
|
mac func(key []byte) hash.Hash
|
||||||
aead func(key, fixedNonce []byte) aead
|
aead func(key, fixedNonce []byte) aead
|
||||||
}
|
}
|
||||||
|
@ -401,12 +401,12 @@ func aesgcmPreferred(ciphers []uint16) bool {
|
||||||
return false
|
return false
|
||||||
}
|
}
|
||||||
|
|
||||||
func cipherRC4(key, iv []byte, isRead bool) interface{} {
|
func cipherRC4(key, iv []byte, isRead bool) any {
|
||||||
cipher, _ := rc4.NewCipher(key)
|
cipher, _ := rc4.NewCipher(key)
|
||||||
return cipher
|
return cipher
|
||||||
}
|
}
|
||||||
|
|
||||||
func cipher3DES(key, iv []byte, isRead bool) interface{} {
|
func cipher3DES(key, iv []byte, isRead bool) any {
|
||||||
block, _ := des.NewTripleDESCipher(key)
|
block, _ := des.NewTripleDESCipher(key)
|
||||||
if isRead {
|
if isRead {
|
||||||
return cipher.NewCBCDecrypter(block, iv)
|
return cipher.NewCBCDecrypter(block, iv)
|
||||||
|
@ -414,7 +414,7 @@ func cipher3DES(key, iv []byte, isRead bool) interface{} {
|
||||||
return cipher.NewCBCEncrypter(block, iv)
|
return cipher.NewCBCEncrypter(block, iv)
|
||||||
}
|
}
|
||||||
|
|
||||||
func cipherAES(key, iv []byte, isRead bool) interface{} {
|
func cipherAES(key, iv []byte, isRead bool) any {
|
||||||
block, _ := aes.NewCipher(key)
|
block, _ := aes.NewCipher(key)
|
||||||
if isRead {
|
if isRead {
|
||||||
return cipher.NewCBCDecrypter(block, iv)
|
return cipher.NewCBCDecrypter(block, iv)
|
||||||
|
|
|
@ -1475,7 +1475,7 @@ func defaultConfig() *Config {
|
||||||
return &emptyConfig
|
return &emptyConfig
|
||||||
}
|
}
|
||||||
|
|
||||||
func unexpectedMessageError(wanted, got interface{}) error {
|
func unexpectedMessageError(wanted, got any) error {
|
||||||
return fmt.Errorf("tls: received unexpected handshake message of type %T when waiting for %T", got, wanted)
|
return fmt.Errorf("tls: received unexpected handshake message of type %T when waiting for %T", got, wanted)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
16
conn.go
16
conn.go
|
@ -163,16 +163,16 @@ func (c *Conn) NetConn() net.Conn {
|
||||||
type halfConn struct {
|
type halfConn struct {
|
||||||
sync.Mutex
|
sync.Mutex
|
||||||
|
|
||||||
err error // first permanent error
|
err error // first permanent error
|
||||||
version uint16 // protocol version
|
version uint16 // protocol version
|
||||||
cipher interface{} // cipher algorithm
|
cipher any // cipher algorithm
|
||||||
mac hash.Hash
|
mac hash.Hash
|
||||||
seq [8]byte // 64-bit sequence number
|
seq [8]byte // 64-bit sequence number
|
||||||
|
|
||||||
scratchBuf [13]byte // to avoid allocs; interface method args escape
|
scratchBuf [13]byte // to avoid allocs; interface method args escape
|
||||||
|
|
||||||
nextCipher interface{} // next encryption state
|
nextCipher any // next encryption state
|
||||||
nextMac hash.Hash // next MAC algorithm
|
nextMac hash.Hash // next MAC algorithm
|
||||||
|
|
||||||
trafficSecret []byte // current TLS 1.3 traffic secret
|
trafficSecret []byte // current TLS 1.3 traffic secret
|
||||||
}
|
}
|
||||||
|
@ -197,7 +197,7 @@ func (hc *halfConn) setErrorLocked(err error) error {
|
||||||
|
|
||||||
// prepareCipherSpec sets the encryption and MAC states
|
// prepareCipherSpec sets the encryption and MAC states
|
||||||
// that a subsequent changeCipherSpec will use.
|
// that a subsequent changeCipherSpec will use.
|
||||||
func (hc *halfConn) prepareCipherSpec(version uint16, cipher interface{}, mac hash.Hash) {
|
func (hc *halfConn) prepareCipherSpec(version uint16, cipher any, mac hash.Hash) {
|
||||||
hc.version = version
|
hc.version = version
|
||||||
hc.nextCipher = cipher
|
hc.nextCipher = cipher
|
||||||
hc.nextMac = mac
|
hc.nextMac = mac
|
||||||
|
@ -935,7 +935,7 @@ func (c *Conn) flush() (int, error) {
|
||||||
|
|
||||||
// outBufPool pools the record-sized scratch buffers used by writeRecordLocked.
|
// outBufPool pools the record-sized scratch buffers used by writeRecordLocked.
|
||||||
var outBufPool = sync.Pool{
|
var outBufPool = sync.Pool{
|
||||||
New: func() interface{} {
|
New: func() any {
|
||||||
return new([]byte)
|
return new([]byte)
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
@ -1011,7 +1011,7 @@ func (c *Conn) writeRecord(typ recordType, data []byte) (int, error) {
|
||||||
|
|
||||||
// readHandshake reads the next handshake message from
|
// readHandshake reads the next handshake message from
|
||||||
// the record layer.
|
// the record layer.
|
||||||
func (c *Conn) readHandshake() (interface{}, error) {
|
func (c *Conn) readHandshake() (any, error) {
|
||||||
for c.hand.Len() < 4 {
|
for c.hand.Len() < 4 {
|
||||||
if err := c.readRecord(); err != nil {
|
if err := c.readRecord(); err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
|
|
|
@ -37,7 +37,7 @@ var (
|
||||||
ed25519Key = flag.Bool("ed25519", false, "Generate an Ed25519 key")
|
ed25519Key = flag.Bool("ed25519", false, "Generate an Ed25519 key")
|
||||||
)
|
)
|
||||||
|
|
||||||
func publicKey(priv interface{}) interface{} {
|
func publicKey(priv any) any {
|
||||||
switch k := priv.(type) {
|
switch k := priv.(type) {
|
||||||
case *rsa.PrivateKey:
|
case *rsa.PrivateKey:
|
||||||
return &k.PublicKey
|
return &k.PublicKey
|
||||||
|
@ -57,7 +57,7 @@ func main() {
|
||||||
log.Fatalf("Missing required --host parameter")
|
log.Fatalf("Missing required --host parameter")
|
||||||
}
|
}
|
||||||
|
|
||||||
var priv interface{}
|
var priv any
|
||||||
var err error
|
var err error
|
||||||
switch *ecdsaCurve {
|
switch *ecdsaCurve {
|
||||||
case "":
|
case "":
|
||||||
|
|
|
@ -660,7 +660,7 @@ func (hs *clientHandshakeState) establishKeys() error {
|
||||||
|
|
||||||
clientMAC, serverMAC, clientKey, serverKey, clientIV, serverIV :=
|
clientMAC, serverMAC, clientKey, serverKey, clientIV, serverIV :=
|
||||||
keysFromMasterSecret(c.vers, hs.suite, hs.masterSecret, hs.hello.random, hs.serverHello.random, hs.suite.macLen, hs.suite.keyLen, hs.suite.ivLen)
|
keysFromMasterSecret(c.vers, hs.suite, hs.masterSecret, hs.hello.random, hs.serverHello.random, hs.suite.macLen, hs.suite.keyLen, hs.suite.ivLen)
|
||||||
var clientCipher, serverCipher interface{}
|
var clientCipher, serverCipher any
|
||||||
var clientHash, serverHash hash.Hash
|
var clientHash, serverHash hash.Hash
|
||||||
if hs.suite.cipher != nil {
|
if hs.suite.cipher != nil {
|
||||||
clientCipher = hs.suite.cipher(clientKey, clientIV, false /* not for reading */)
|
clientCipher = hs.suite.cipher(clientKey, clientIV, false /* not for reading */)
|
||||||
|
|
|
@ -134,7 +134,7 @@ type clientTest struct {
|
||||||
cert []byte
|
cert []byte
|
||||||
// key, if not nil, contains either a *rsa.PrivateKey, ed25519.PrivateKey or
|
// key, if not nil, contains either a *rsa.PrivateKey, ed25519.PrivateKey or
|
||||||
// *ecdsa.PrivateKey which is the private key for the reference server.
|
// *ecdsa.PrivateKey which is the private key for the reference server.
|
||||||
key interface{}
|
key any
|
||||||
// extensions, if not nil, contains a list of extension data to be returned
|
// extensions, if not nil, contains a list of extension data to be returned
|
||||||
// from the ServerHello. The data should be in standard TLS format with
|
// from the ServerHello. The data should be in standard TLS format with
|
||||||
// a 2-byte uint16 type, 2-byte data length, followed by the extension data.
|
// a 2-byte uint16 type, 2-byte data length, followed by the extension data.
|
||||||
|
@ -171,7 +171,7 @@ func (test *clientTest) connFromCommand() (conn *recordingConn, child *exec.Cmd,
|
||||||
certPath := tempFile(string(cert))
|
certPath := tempFile(string(cert))
|
||||||
defer os.Remove(certPath)
|
defer os.Remove(certPath)
|
||||||
|
|
||||||
var key interface{} = testRSAPrivateKey
|
var key any = testRSAPrivateKey
|
||||||
if test.key != nil {
|
if test.key != nil {
|
||||||
key = test.key
|
key = test.key
|
||||||
}
|
}
|
||||||
|
|
|
@ -14,7 +14,7 @@ import (
|
||||||
"time"
|
"time"
|
||||||
)
|
)
|
||||||
|
|
||||||
var tests = []interface{}{
|
var tests = []any{
|
||||||
&clientHelloMsg{},
|
&clientHelloMsg{},
|
||||||
&serverHelloMsg{},
|
&serverHelloMsg{},
|
||||||
&finishedMsg{},
|
&finishedMsg{},
|
||||||
|
|
|
@ -681,7 +681,7 @@ func (hs *serverHandshakeState) establishKeys() error {
|
||||||
clientMAC, serverMAC, clientKey, serverKey, clientIV, serverIV :=
|
clientMAC, serverMAC, clientKey, serverKey, clientIV, serverIV :=
|
||||||
keysFromMasterSecret(c.vers, hs.suite, hs.masterSecret, hs.clientHello.random, hs.hello.random, hs.suite.macLen, hs.suite.keyLen, hs.suite.ivLen)
|
keysFromMasterSecret(c.vers, hs.suite, hs.masterSecret, hs.clientHello.random, hs.hello.random, hs.suite.macLen, hs.suite.keyLen, hs.suite.ivLen)
|
||||||
|
|
||||||
var clientCipher, serverCipher interface{}
|
var clientCipher, serverCipher any
|
||||||
var clientHash, serverHash hash.Hash
|
var clientHash, serverHash hash.Hash
|
||||||
|
|
||||||
if hs.suite.aead == nil {
|
if hs.suite.aead == nil {
|
||||||
|
|
|
@ -249,7 +249,7 @@ func TestTLS12OnlyCipherSuites(t *testing.T) {
|
||||||
}
|
}
|
||||||
|
|
||||||
c, s := localPipe(t)
|
c, s := localPipe(t)
|
||||||
replyChan := make(chan interface{})
|
replyChan := make(chan any)
|
||||||
go func() {
|
go func() {
|
||||||
cli := Client(c, testConfig)
|
cli := Client(c, testConfig)
|
||||||
cli.vers = clientHello.vers
|
cli.vers = clientHello.vers
|
||||||
|
@ -304,7 +304,7 @@ func TestTLSPointFormats(t *testing.T) {
|
||||||
}
|
}
|
||||||
|
|
||||||
c, s := localPipe(t)
|
c, s := localPipe(t)
|
||||||
replyChan := make(chan interface{})
|
replyChan := make(chan any)
|
||||||
go func() {
|
go func() {
|
||||||
cli := Client(c, testConfig)
|
cli := Client(c, testConfig)
|
||||||
cli.vers = clientHello.vers
|
cli.vers = clientHello.vers
|
||||||
|
@ -600,7 +600,7 @@ func (test *serverTest) connFromCommand() (conn *recordingConn, child *exec.Cmd,
|
||||||
return nil, nil, err
|
return nil, nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
connChan := make(chan interface{}, 1)
|
connChan := make(chan any, 1)
|
||||||
go func() {
|
go func() {
|
||||||
tcpConn, err := l.Accept()
|
tcpConn, err := l.Accept()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue