Commit graph

387 commits

Author SHA1 Message Date
Carl Mastrangelo
90f8fc90bd archive/zip, crypto/tls: use rand.Read instead of casting ints to bytes
Makes tests run ~1ms faster.

Change-Id: Ida509952469540280996d2bd9266724829e53c91
Reviewed-on: https://go-review.googlesource.com/47359
Reviewed-by: Filippo Valsorda <hi@filippo.io>
Run-TryBot: Filippo Valsorda <hi@filippo.io>
TryBot-Result: Gobot Gobot <gobot@golang.org>
2017-11-01 05:51:30 +00:00
Joe Kyo
fd917e14e0 crypto/tls: remove bookkeeping code from pHash function
Since copy function can figure out how many bytes of data to copy when
two slices have different length, it is not necessary to check how many
bytes need to copy each time before copying the data.

Change-Id: I5151ddfe46af5575566fe9c9a2648e111575ec3d
Reviewed-on: https://go-review.googlesource.com/71090
Reviewed-by: Filippo Valsorda <hi@filippo.io>
Run-TryBot: Filippo Valsorda <hi@filippo.io>
Run-TryBot: Tobias Klauser <tobias.klauser@gmail.com>
TryBot-Result: Gobot Gobot <gobot@golang.org>
2017-10-31 19:11:03 +00:00
Peter Wu
b3caca679b crypto/tls: replace signatureAndHash by SignatureScheme.
Consolidate the signature and hash fields (SignatureAndHashAlgorithm in
TLS 1.2) into a single uint16 (SignatureScheme in TLS 1.3 draft 21).
This makes it easier to add RSASSA-PSS for TLS 1.2 in the future.

Fields were named like "signatureAlgorithm" rather than
"signatureScheme" since that name is also used throughout the 1.3 draft.

The only new public symbol is ECDSAWithSHA1, other than that this is an
internal change with no new functionality.

Change-Id: Iba63d262ab1af895420583ac9e302d9705a7e0f0
Reviewed-on: https://go-review.googlesource.com/62210
Reviewed-by: Adam Langley <agl@golang.org>
2017-10-13 23:25:03 +00:00
Peter Wu
e3522a12ad crypto/tls: fix first byte test for 255 CBC padding bytes
The BadCBCPadding255 test from bogo failed because at most 255 trailing
bytes were checked, but for a padding of 255 there are 255 padding bytes
plus 1 length byte with value 255.

Change-Id: I7dd237c013d2c7c8599067246e31b7ba93106cf7
Reviewed-on: https://go-review.googlesource.com/68070
Reviewed-by: Adam Langley <agl@golang.org>
Run-TryBot: Adam Langley <agl@golang.org>
TryBot-Result: Gobot Gobot <gobot@golang.org>
2017-10-06 18:07:04 +00:00
Marvin Stenger
53c5404836 all: revert "all: prefer strings.LastIndexByte over strings.LastIndex"
This reverts https://golang.org/cl/66372.

Updates #22148

Change-Id: I3e94af3dfc11a2883bf28e1d5e1f32f98760b3ee
Reviewed-on: https://go-review.googlesource.com/68431
Reviewed-by: Ian Lance Taylor <iant@golang.org>
2017-10-05 23:19:42 +00:00
Marvin Stenger
61ea6f3dce all: prefer bytes.IndexByte over bytes.Index
bytes.IndexByte can be used wherever the second argument to
strings.Index is exactly one byte long, so we do that with this change.

This avoids generating unnecessary string symbols/converison and saves
a few calls to bytes.Index.

Change-Id: If31c775790e01edfece1169e398ad6a754fb4428
Reviewed-on: https://go-review.googlesource.com/66373
Run-TryBot: Brad Fitzpatrick <bradfitz@golang.org>
Reviewed-by: Ian Lance Taylor <iant@golang.org>
2017-09-27 01:09:13 +00:00
Marvin Stenger
6e1bd19dc7 all: prefer strings.LastIndexByte over strings.LastIndex
strings.LastIndexByte was introduced in go1.5 and it can be used
effectively wherever the second argument to strings.LastIndex is
exactly one byte long.

This avoids generating unnecessary string symbols and saves
a few calls to strings.LastIndex.

Change-Id: I7b5679d616197b055cffe6882a8675d24a98b574
Reviewed-on: https://go-review.googlesource.com/66372
Run-TryBot: Ian Lance Taylor <iant@golang.org>
TryBot-Result: Gobot Gobot <gobot@golang.org>
Reviewed-by: Ian Lance Taylor <iant@golang.org>
2017-09-27 00:54:24 +00:00
Kunpei Sakai
fca29fbd02 all: fix article typos
a -> an

Change-Id: I7362bdc199e83073a712be657f5d9ba16df3077e
Reviewed-on: https://go-review.googlesource.com/63850
Reviewed-by: Rob Pike <r@golang.org>
2017-09-15 02:39:16 +00:00
sergeyfrolov
4a02beebd9 Update README 2017-09-12 21:05:37 -06:00
EKR
c00813cb77 crypto/tls: fix clientHelloMsg fuzzer not to generate the RI SCSV
It was causing mysterious fuzzing failure because it affects the
unmarshaling of the secureNegotiationSupported field.

Change-Id: Id396b84eab90a3b22fb6e306b10bdd7e39707012
Reviewed-on: https://go-review.googlesource.com/60912
Run-TryBot: Filippo Valsorda <hi@filippo.io>
TryBot-Result: Gobot Gobot <gobot@golang.org>
Reviewed-by: Adam Langley <agl@golang.org>
2017-09-09 19:24:12 +00:00
Filippo Valsorda
ff8dfbaa19 crypto/tls: fix and expand TestVerifyPeerCertificate and TestGetClientCertificate
TestGetClientCertificate had disabled verification, and was only passing
because it was mistakenly checking for empty verifiedChains.

Change-Id: Iea0ddbdbbdf8ac34b499569820a2e4ce543a69c7
Reviewed-on: https://go-review.googlesource.com/47430
Run-TryBot: Filippo Valsorda <hi@filippo.io>
Run-TryBot: Ian Lance Taylor <iant@golang.org>
TryBot-Result: Gobot Gobot <gobot@golang.org>
Reviewed-by: Adam Langley <agl@golang.org>
2017-09-09 19:23:45 +00:00
sergeyfrolov
8d58a32e44 README: add build status 2017-09-08 19:26:55 -06:00
Sergey Frolov
dea429d0f0 Add Travis CI integration 2017-09-08 15:59:13 -06:00
Sergey Frolov
3b53b610a6 go vet fixes 2017-09-08 15:59:05 -06:00
sergeyfrolov
f6ecfa941c Update README 2017-09-08 12:53:50 -06:00
sergeyfrolov
048fc50c2d Merge pull request #2 from refraction-networking/getoutkeystream
Implement GetOutKeystream()
2017-09-07 11:40:08 -06:00
Sergey Frolov
08a039c453 Implement GetOutKeystream() 2017-09-07 09:03:04 -06:00
Sergey Frolov
004572df2e Make ApplyConfig() and MarshalClientHello() public 2017-09-06 19:26:38 -06:00
Sergey Frolov
5893031118 RandomizedHello: fix cipherSuite' shuffling 2017-09-06 19:26:16 -06:00
Benjamin M. Schwartz
21fd80b8b6 Merge pull request #11 from Jigsaw-Code/readme-update
Update README.md
2017-09-05 23:35:13 +02:00
Justin Henck
769571a451 Update README.md 2017-09-05 16:36:58 -04:00
Artyom Pervukhin
fe92b81ca1 crypto/tls: fix docstring of Config.ClientSessionCache
Closes #21519

Change-Id: I1247e9435de93aae7e4db2b6e8e5be1b010c296b
Reviewed-on: https://go-review.googlesource.com/56832
Reviewed-by: Avelino <t@avelino.xxx>
Reviewed-by: Adam Langley <agl@golang.org>
2017-08-25 22:37:26 +00:00
Benjamin M. Schwartz
a6b7d98736 Merge pull request #10 from Jigsaw-Code/utls-write
Add utls.Write(). Fixes #3
2017-08-18 20:11:18 +02:00
Sergey Frolov
853deec862 Add utls.Write(). Fixes #3 2017-08-18 14:08:51 -04:00
Sergey Frolov
b36d51a64c Merge branch 'master' of github.com:Jigsaw-Code/utls 2017-08-18 14:06:07 -04:00
Sergey Frolov
e797c80048 Update README 2017-08-18 14:05:48 -04:00
sergeyfrolov
a83ace6117 Merge pull request #8 from Jigsaw-Code/fix-races
Fixes #5
2017-08-16 17:22:35 -04:00
Sergey Frolov
fd96e317e6 Fixes #5
The root cause of races is that global variables supportedSignatureAlgorithms and
cipherSuites are used both to form handshake and to check whether or not
peer responded with supported algorithm.
In this patch I create separate variables for this purpose.
Updated tests for kicks.
Finally, go fmt.
2017-08-16 16:12:27 -04:00
Sergey Frolov
09f732cdd6 Update and add new tests 2017-08-16 14:34:06 -04:00
Sergey Frolov
a07d9bc87d Added global cipherSuites are disabled by default
Makes sure that old cipher suite ids, added to global cipherSuites,
are now disabled by default, and, thus, do not affect default Golang
handshake.
2017-08-16 11:56:58 -04:00
Sergey Frolov
eb3c8be9a1 Revert "Remove appendToGlobalCipherSuites"
This reverts commit 0af497570e.
2017-08-16 11:55:39 -04:00
Sergey Frolov
ab61409e7d Add ems 2017-08-16 11:54:20 -04:00
Filippo Valsorda
f3b1bbce00 crypto/tls: disallow handshake messages fragmented across CCS
Detected by BoGo test FragmentAcrossChangeCipherSpec-Server-Packed.

Change-Id: I9a76697b9cdeb010642766041971de5c7e533481
Reviewed-on: https://go-review.googlesource.com/48811
Reviewed-by: Adam Langley <agl@golang.org>
Run-TryBot: Adam Langley <agl@golang.org>
2017-08-15 18:45:06 +00:00
Filippo Valsorda
b1d5de15f4 crypto/tls: add BenchmarkHandshakeServer
name                                       time/op
HandshakeServer/RSA-4                      1.10ms ± 0%
HandshakeServer/ECDHE-P256-RSA-4           1.23ms ± 1%
HandshakeServer/ECDHE-P256-ECDSA-P256-4     178µs ± 1%
HandshakeServer/ECDHE-X25519-ECDSA-P256-4   180µs ± 2%
HandshakeServer/ECDHE-P521-ECDSA-P521-4    19.8ms ± 1%

Change-Id: I6b2c79392995d259cfdfc5199be44cc7cc40e155
Reviewed-on: https://go-review.googlesource.com/44730
Reviewed-by: Adam Langley <agl@golang.org>
Run-TryBot: Adam Langley <agl@golang.org>
2017-08-15 18:44:38 +00:00
Andreas Auernhammer
a3bb151457 crypto/tls: don't check whether an ec point is on a curve twice
The processClientKeyExchange and processServerKeyExchange functions unmarshal an
encoded EC point and explicitly check whether the point is on the curve. The explicit
check can be omitted because elliptic.Unmarshal fails if the point is not on the curve
and the returned error would always be the same.

Fixes #20496

Change-Id: I5231a655eace79acee2737dd036a0c255ed42dbb
Reviewed-on: https://go-review.googlesource.com/44311
Reviewed-by: Adam Langley <agl@golang.org>
Reviewed-by: Avelino <t@avelino.xxx>
Run-TryBot: Adam Langley <agl@golang.org>
2017-08-15 18:44:20 +00:00
Sergey Frolov
6890f3e435 Finish Firefox 55 fignerprint. Implements #4 2017-08-15 12:50:40 -04:00
Sergey Frolov
0af497570e Remove appendToGlobalCipherSuites
This function is not needed anymore, since check for whether ciphersuite is
supported is done against per-tls.Config, not against global variable.
One of needed changes for fixing data races, see #5
2017-08-15 12:48:48 -04:00
sergeyfrolov
1e0af1a3f4 Add upstream merge instruction 2017-08-11 16:12:45 -04:00
Sergey Frolov
3ab65b623c Merge branch 'master' of github.com:Jigsaw-Code/utls 2017-08-11 16:10:40 -04:00
Sergey Frolov
0f64b078aa Merge branch 'golang-tls-upstream' 2017-08-11 16:09:09 -04:00
Sergey Frolov
4419452644 crypto/tls: split clientHandshake into multiple methods
Change-Id: I23bfaa7e03a21aad4e85baa3bf52bb00c09b75d0
Reviewed-on: https://go-review.googlesource.com/44354
Reviewed-by: Adam Langley <agl@golang.org>
2017-08-09 22:24:19 +00:00
sergeyfrolov
494ea0e9d5 Fix typo + increase size of all subsubtitles 2017-08-09 17:26:28 -04:00
Sergey Frolov
120bf80363 parrotChrome_58: add SHA512 globally 2017-08-09 14:00:00 -04:00
Sergey Frolov
e96789aa6a parrotChrome_58: fix panic 2017-08-09 13:59:43 -04:00
Sergey Frolov
e66d491f21 Add BSD LICENSE headers 2017-08-07 18:33:59 -04:00
Sergey Frolov
44127316da Add CONTRIBUTING.md 2017-08-07 18:33:38 -04:00
Sergey Frolov
bfc60ea5a4 README: add note about Handshake() being mandatory 2017-07-31 18:20:09 -04:00
Sergey Frolov
37f7eb6d8a Add LICENSE 2017-07-07 11:35:15 -04:00
sergeyfrolov
736a2caf18 Merge pull request #2 from Jigsaw-Code/utls
uTLS: initial commit
2017-07-07 11:05:17 -04:00
Sergey Frolov
cd3d1c4656 uTLS: initial commit 2017-07-07 11:02:48 -04:00