TUN-5623: Configure quic max datagram frame size to 1350 bytes for none Windows platforms
This commit is contained in:
parent
ef3152f334
commit
6fa58aadba
|
@ -560,8 +560,7 @@ func serveSession(ctx context.Context, qc *QUICConnection, edgeQUICSession quic.
|
||||||
}()
|
}()
|
||||||
|
|
||||||
// Send a message to the quic session on edge side, it should be deumx to this datagram session
|
// Send a message to the quic session on edge side, it should be deumx to this datagram session
|
||||||
muxedPayload, err := quicpogs.SuffixSessionID(sessionID, payload)
|
muxedPayload := append(payload, sessionID[:]...)
|
||||||
require.NoError(t, err)
|
|
||||||
err = edgeQUICSession.SendMessage(muxedPayload)
|
err = edgeQUICSession.SendMessage(muxedPayload)
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
|
|
||||||
|
|
|
@ -114,7 +114,7 @@ func (s *Session) dstToTransport(buffer []byte) error {
|
||||||
s.log.Debug().
|
s.log.Debug().
|
||||||
Str("session", s.ID.String()).
|
Str("session", s.ID.String()).
|
||||||
Int("len", n).
|
Int("len", n).
|
||||||
Uint("mtu", s.transport.MTU()).
|
Int("mtu", s.transport.MTU()).
|
||||||
Msg("dropped packet exceeding MTU")
|
Msg("dropped packet exceeding MTU")
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -9,5 +9,5 @@ type transport interface {
|
||||||
// ReceiveFrom reads the next datagram from the transport
|
// ReceiveFrom reads the next datagram from the transport
|
||||||
ReceiveFrom() (uuid.UUID, []byte, error)
|
ReceiveFrom() (uuid.UUID, []byte, error)
|
||||||
// Max transmission unit to receive from the transport
|
// Max transmission unit to receive from the transport
|
||||||
MTU() uint
|
MTU() int
|
||||||
}
|
}
|
||||||
|
|
|
@ -22,8 +22,8 @@ func (mt *mockQUICTransport) ReceiveFrom() (uuid.UUID, []byte, error) {
|
||||||
return mt.reqChan.Receive(context.Background())
|
return mt.reqChan.Receive(context.Background())
|
||||||
}
|
}
|
||||||
|
|
||||||
func (mt *mockQUICTransport) MTU() uint {
|
func (mt *mockQUICTransport) MTU() int {
|
||||||
return 1217
|
return 1280
|
||||||
}
|
}
|
||||||
|
|
||||||
func (mt *mockQUICTransport) newRequest(ctx context.Context, sessionID uuid.UUID, payload []byte) error {
|
func (mt *mockQUICTransport) newRequest(ctx context.Context, sessionID uuid.UUID, payload []byte) error {
|
||||||
|
|
3
go.mod
3
go.mod
|
@ -78,6 +78,7 @@ require (
|
||||||
github.com/lucasb-eyer/go-colorful v1.0.3 // indirect
|
github.com/lucasb-eyer/go-colorful v1.0.3 // indirect
|
||||||
github.com/marten-seemann/qtls-go1-16 v0.1.4 // indirect
|
github.com/marten-seemann/qtls-go1-16 v0.1.4 // indirect
|
||||||
github.com/marten-seemann/qtls-go1-17 v0.1.0 // indirect
|
github.com/marten-seemann/qtls-go1-17 v0.1.0 // indirect
|
||||||
|
github.com/marten-seemann/qtls-go1-18 v0.1.0-beta.1 // indirect
|
||||||
github.com/mattn/go-isatty v0.0.12 // indirect
|
github.com/mattn/go-isatty v0.0.12 // indirect
|
||||||
github.com/mattn/go-runewidth v0.0.8 // indirect
|
github.com/mattn/go-runewidth v0.0.8 // indirect
|
||||||
github.com/matttproud/golang_protobuf_extensions v1.0.1 // indirect
|
github.com/matttproud/golang_protobuf_extensions v1.0.1 // indirect
|
||||||
|
@ -98,3 +99,5 @@ require (
|
||||||
)
|
)
|
||||||
|
|
||||||
replace github.com/urfave/cli/v2 => github.com/ipostelnik/cli/v2 v2.3.1-0.20210324024421-b6ea8234fe3d
|
replace github.com/urfave/cli/v2 => github.com/ipostelnik/cli/v2 v2.3.1-0.20210324024421-b6ea8234fe3d
|
||||||
|
|
||||||
|
replace github.com/lucas-clemente/quic-go => github.com/chungthuang/quic-go v0.24.1-0.20220110095058-981dc498cb62
|
||||||
|
|
8
go.sum
8
go.sum
|
@ -125,6 +125,12 @@ github.com/cespare/xxhash/v2 v2.1.1 h1:6MnRN8NT7+YBpUIWxHtefFZOKTAPgGjpQSxqLNn0+
|
||||||
github.com/cespare/xxhash/v2 v2.1.1/go.mod h1:VGX0DQ3Q6kWi7AoAeZDth3/j3BFtOZR5XLFGgcrjCOs=
|
github.com/cespare/xxhash/v2 v2.1.1/go.mod h1:VGX0DQ3Q6kWi7AoAeZDth3/j3BFtOZR5XLFGgcrjCOs=
|
||||||
github.com/cheekybits/genny v1.0.0 h1:uGGa4nei+j20rOSeDeP5Of12XVm7TGUd4dJA9RDitfE=
|
github.com/cheekybits/genny v1.0.0 h1:uGGa4nei+j20rOSeDeP5Of12XVm7TGUd4dJA9RDitfE=
|
||||||
github.com/cheekybits/genny v1.0.0/go.mod h1:+tQajlRqAUrPI7DOSpB0XAqZYtQakVtB7wXkRAgjxjQ=
|
github.com/cheekybits/genny v1.0.0/go.mod h1:+tQajlRqAUrPI7DOSpB0XAqZYtQakVtB7wXkRAgjxjQ=
|
||||||
|
github.com/chungthuang/quic-go v0.24.1-0.20220106111256-154e7d8a89a9 h1:sHrAhwM2NHkb/5z7+cxDFMCvG3WnSAPbjqSbujLB3nU=
|
||||||
|
github.com/chungthuang/quic-go v0.24.1-0.20220106111256-154e7d8a89a9/go.mod h1:YtzP8bxRVCBlO77yRanE264+fY/T2U9ZlW1AaHOsMOg=
|
||||||
|
github.com/chungthuang/quic-go v0.24.1-0.20220106164320-fc99d36b9daa h1:QSi2gWSBtNtCH2/8Y6zFs4H5bnrHQQxFCzl7zJsPp28=
|
||||||
|
github.com/chungthuang/quic-go v0.24.1-0.20220106164320-fc99d36b9daa/go.mod h1:YtzP8bxRVCBlO77yRanE264+fY/T2U9ZlW1AaHOsMOg=
|
||||||
|
github.com/chungthuang/quic-go v0.24.1-0.20220110095058-981dc498cb62 h1:PLTB4iA6sOgAItzQY642tYdcGKfG/7i2gu93JQGgUcM=
|
||||||
|
github.com/chungthuang/quic-go v0.24.1-0.20220110095058-981dc498cb62/go.mod h1:YtzP8bxRVCBlO77yRanE264+fY/T2U9ZlW1AaHOsMOg=
|
||||||
github.com/chzyer/logex v1.1.10/go.mod h1:+Ywpsq7O8HXn0nuIou7OrIPyXbp3wmkHB+jjWRnGsAI=
|
github.com/chzyer/logex v1.1.10/go.mod h1:+Ywpsq7O8HXn0nuIou7OrIPyXbp3wmkHB+jjWRnGsAI=
|
||||||
github.com/chzyer/readline v0.0.0-20180603132655-2972be24d48e/go.mod h1:nSuG5e5PlCu98SY8svDHJxuZscDgtXS6KTTbou5AhLI=
|
github.com/chzyer/readline v0.0.0-20180603132655-2972be24d48e/go.mod h1:nSuG5e5PlCu98SY8svDHJxuZscDgtXS6KTTbou5AhLI=
|
||||||
github.com/chzyer/test v0.0.0-20180213035817-a1ea475d72b1/go.mod h1:Q3SI9o4m/ZMnBNeIyt5eFwwo7qiLfzFZmjNmxjkiQlU=
|
github.com/chzyer/test v0.0.0-20180213035817-a1ea475d72b1/go.mod h1:Q3SI9o4m/ZMnBNeIyt5eFwwo7qiLfzFZmjNmxjkiQlU=
|
||||||
|
@ -440,6 +446,8 @@ github.com/marten-seemann/qtls-go1-16 v0.1.4 h1:xbHbOGGhrenVtII6Co8akhLEdrawwB2i
|
||||||
github.com/marten-seemann/qtls-go1-16 v0.1.4/go.mod h1:gNpI2Ol+lRS3WwSOtIUUtRwZEQMXjYK+dQSBFbethAk=
|
github.com/marten-seemann/qtls-go1-16 v0.1.4/go.mod h1:gNpI2Ol+lRS3WwSOtIUUtRwZEQMXjYK+dQSBFbethAk=
|
||||||
github.com/marten-seemann/qtls-go1-17 v0.1.0 h1:P9ggrs5xtwiqXv/FHNwntmuLMNq3KaSIG93AtAZ48xk=
|
github.com/marten-seemann/qtls-go1-17 v0.1.0 h1:P9ggrs5xtwiqXv/FHNwntmuLMNq3KaSIG93AtAZ48xk=
|
||||||
github.com/marten-seemann/qtls-go1-17 v0.1.0/go.mod h1:fz4HIxByo+LlWcreM4CZOYNuz3taBQ8rN2X6FqvaWo8=
|
github.com/marten-seemann/qtls-go1-17 v0.1.0/go.mod h1:fz4HIxByo+LlWcreM4CZOYNuz3taBQ8rN2X6FqvaWo8=
|
||||||
|
github.com/marten-seemann/qtls-go1-18 v0.1.0-beta.1 h1:EnzzN9fPUkUck/1CuY1FlzBaIYMoiBsdwTNmNGkwUUM=
|
||||||
|
github.com/marten-seemann/qtls-go1-18 v0.1.0-beta.1/go.mod h1:PUhIQk19LoFt2174H4+an8TYvWOGjb/hHwphBeaDHwI=
|
||||||
github.com/mattn/go-colorable v0.0.9/go.mod h1:9vuHe8Xs5qXnSaW/c/ABM9alt+Vo+STaOChaDxuIBZU=
|
github.com/mattn/go-colorable v0.0.9/go.mod h1:9vuHe8Xs5qXnSaW/c/ABM9alt+Vo+STaOChaDxuIBZU=
|
||||||
github.com/mattn/go-colorable v0.1.8 h1:c1ghPdyEDarC70ftn0y+A/Ee++9zz8ljHG1b13eJ0s8=
|
github.com/mattn/go-colorable v0.1.8 h1:c1ghPdyEDarC70ftn0y+A/Ee++9zz8ljHG1b13eJ0s8=
|
||||||
github.com/mattn/go-colorable v0.1.8/go.mod h1:u6P/XSegPjTcexA+o6vUJrdnUu04hMope9wVRipJSqc=
|
github.com/mattn/go-colorable v0.1.8/go.mod h1:u6P/XSegPjTcexA+o6vUJrdnUu04hMope9wVRipJSqc=
|
||||||
|
|
|
@ -526,6 +526,7 @@ func ServeQUIC(
|
||||||
MaxIncomingUniStreams: connection.MaxConcurrentStreams,
|
MaxIncomingUniStreams: connection.MaxConcurrentStreams,
|
||||||
KeepAlive: true,
|
KeepAlive: true,
|
||||||
EnableDatagrams: true,
|
EnableDatagrams: true,
|
||||||
|
MaxDatagramFrameSize: quicpogs.MaxDatagramFrameSize,
|
||||||
Tracer: quicpogs.NewClientTracer(connLogger.Logger(), connIndex),
|
Tracer: quicpogs.NewClientTracer(connLogger.Logger(), connIndex),
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -9,10 +9,7 @@ import (
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
// Max datagram frame size is limited to 1220 https://github.com/lucas-clemente/quic-go/blob/v0.24.0/internal/protocol/params.go#L138
|
sessionIDLen = len(uuid.UUID{})
|
||||||
// However, 3 more bytes are reserved https://github.com/lucas-clemente/quic-go/blob/v0.24.0/internal/wire/datagram_frame.go#L61
|
|
||||||
MaxDatagramFrameSize = 1217
|
|
||||||
sessionIDLen = len(uuid.UUID{})
|
|
||||||
)
|
)
|
||||||
|
|
||||||
type DatagramMuxer struct {
|
type DatagramMuxer struct {
|
||||||
|
@ -34,11 +31,11 @@ func NewDatagramMuxer(quicSession quic.Session) (*DatagramMuxer, error) {
|
||||||
// SendTo suffix the session ID to the payload so the other end of the QUIC session can demultiplex
|
// SendTo suffix the session ID to the payload so the other end of the QUIC session can demultiplex
|
||||||
// the payload from multiple datagram sessions
|
// the payload from multiple datagram sessions
|
||||||
func (dm *DatagramMuxer) SendTo(sessionID uuid.UUID, payload []byte) error {
|
func (dm *DatagramMuxer) SendTo(sessionID uuid.UUID, payload []byte) error {
|
||||||
if len(payload) > MaxDatagramFrameSize-sessionIDLen {
|
if len(payload) > maxDatagramPayloadSize {
|
||||||
// TODO: TUN-5302 return ICMP packet too big message
|
// TODO: TUN-5302 return ICMP packet too big message
|
||||||
return fmt.Errorf("origin UDP payload has %d bytes, which exceeds transport MTU %d", len(payload), dm.MTU())
|
return fmt.Errorf("origin UDP payload has %d bytes, which exceeds transport MTU %d", len(payload), dm.MTU())
|
||||||
}
|
}
|
||||||
msgWithID, err := SuffixSessionID(sessionID, payload)
|
msgWithID, err := suffixSessionID(sessionID, payload)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return errors.Wrap(err, "Failed to suffix session ID to datagram, it will be dropped")
|
return errors.Wrap(err, "Failed to suffix session ID to datagram, it will be dropped")
|
||||||
}
|
}
|
||||||
|
@ -56,17 +53,17 @@ func (dm *DatagramMuxer) ReceiveFrom() (uuid.UUID, []byte, error) {
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return uuid.Nil, nil, err
|
return uuid.Nil, nil, err
|
||||||
}
|
}
|
||||||
return ExtractSessionID(msg)
|
return extractSessionID(msg)
|
||||||
}
|
}
|
||||||
|
|
||||||
// Maximum application payload to send to / receive from QUIC datagram frame
|
// Maximum application payload to send to / receive from QUIC datagram frame
|
||||||
func (dm *DatagramMuxer) MTU() uint {
|
func (dm *DatagramMuxer) MTU() int {
|
||||||
return uint(MaxDatagramFrameSize - sessionIDLen)
|
return maxDatagramPayloadSize
|
||||||
}
|
}
|
||||||
|
|
||||||
// Each QUIC datagram should be suffixed with session ID.
|
// Each QUIC datagram should be suffixed with session ID.
|
||||||
// ExtractSessionID extracts the session ID and a slice with only the payload
|
// extractSessionID extracts the session ID and a slice with only the payload
|
||||||
func ExtractSessionID(b []byte) (uuid.UUID, []byte, error) {
|
func extractSessionID(b []byte) (uuid.UUID, []byte, error) {
|
||||||
msgLen := len(b)
|
msgLen := len(b)
|
||||||
if msgLen < sessionIDLen {
|
if msgLen < sessionIDLen {
|
||||||
return uuid.Nil, nil, fmt.Errorf("session ID has %d bytes, but data only has %d", sessionIDLen, len(b))
|
return uuid.Nil, nil, fmt.Errorf("session ID has %d bytes, but data only has %d", sessionIDLen, len(b))
|
||||||
|
@ -82,7 +79,7 @@ func ExtractSessionID(b []byte) (uuid.UUID, []byte, error) {
|
||||||
|
|
||||||
// SuffixSessionID appends the session ID at the end of the payload. Suffix is more performant than prefix because
|
// SuffixSessionID appends the session ID at the end of the payload. Suffix is more performant than prefix because
|
||||||
// the payload slice might already have enough capacity to append the session ID at the end
|
// the payload slice might already have enough capacity to append the session ID at the end
|
||||||
func SuffixSessionID(sessionID uuid.UUID, b []byte) ([]byte, error) {
|
func suffixSessionID(sessionID uuid.UUID, b []byte) ([]byte, error) {
|
||||||
if len(b)+len(sessionID) > MaxDatagramFrameSize {
|
if len(b)+len(sessionID) > MaxDatagramFrameSize {
|
||||||
return nil, fmt.Errorf("datagram size exceed %d", MaxDatagramFrameSize)
|
return nil, fmt.Errorf("datagram size exceed %d", MaxDatagramFrameSize)
|
||||||
}
|
}
|
||||||
|
|
|
@ -10,6 +10,7 @@ import (
|
||||||
"encoding/pem"
|
"encoding/pem"
|
||||||
"math/big"
|
"math/big"
|
||||||
"testing"
|
"testing"
|
||||||
|
"time"
|
||||||
|
|
||||||
"github.com/google/uuid"
|
"github.com/google/uuid"
|
||||||
"github.com/lucas-clemente/quic-go"
|
"github.com/lucas-clemente/quic-go"
|
||||||
|
@ -23,11 +24,11 @@ var (
|
||||||
|
|
||||||
func TestSuffixThenRemoveSessionID(t *testing.T) {
|
func TestSuffixThenRemoveSessionID(t *testing.T) {
|
||||||
msg := []byte(t.Name())
|
msg := []byte(t.Name())
|
||||||
msgWithID, err := SuffixSessionID(testSessionID, msg)
|
msgWithID, err := suffixSessionID(testSessionID, msg)
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
require.Len(t, msgWithID, len(msg)+sessionIDLen)
|
require.Len(t, msgWithID, len(msg)+sessionIDLen)
|
||||||
|
|
||||||
sessionID, msgWithoutID, err := ExtractSessionID(msgWithID)
|
sessionID, msgWithoutID, err := extractSessionID(msgWithID)
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
require.Equal(t, msg, msgWithoutID)
|
require.Equal(t, msg, msgWithoutID)
|
||||||
require.Equal(t, testSessionID, sessionID)
|
require.Equal(t, testSessionID, sessionID)
|
||||||
|
@ -36,26 +37,27 @@ func TestSuffixThenRemoveSessionID(t *testing.T) {
|
||||||
func TestRemoveSessionIDError(t *testing.T) {
|
func TestRemoveSessionIDError(t *testing.T) {
|
||||||
// message is too short to contain session ID
|
// message is too short to contain session ID
|
||||||
msg := []byte("test")
|
msg := []byte("test")
|
||||||
_, _, err := ExtractSessionID(msg)
|
_, _, err := extractSessionID(msg)
|
||||||
require.Error(t, err)
|
require.Error(t, err)
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestSuffixSessionIDError(t *testing.T) {
|
func TestSuffixSessionIDError(t *testing.T) {
|
||||||
msg := make([]byte, MaxDatagramFrameSize-sessionIDLen)
|
msg := make([]byte, MaxDatagramFrameSize-sessionIDLen)
|
||||||
_, err := SuffixSessionID(testSessionID, msg)
|
_, err := suffixSessionID(testSessionID, msg)
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
|
|
||||||
msg = make([]byte, MaxDatagramFrameSize-sessionIDLen+1)
|
msg = make([]byte, MaxDatagramFrameSize-sessionIDLen+1)
|
||||||
_, err = SuffixSessionID(testSessionID, msg)
|
_, err = suffixSessionID(testSessionID, msg)
|
||||||
require.Error(t, err)
|
require.Error(t, err)
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestMaxDatagramPayload(t *testing.T) {
|
func TestMaxDatagramPayload(t *testing.T) {
|
||||||
payload := make([]byte, MaxDatagramFrameSize-sessionIDLen)
|
payload := make([]byte, maxDatagramPayloadSize)
|
||||||
|
|
||||||
quicConfig := &quic.Config{
|
quicConfig := &quic.Config{
|
||||||
KeepAlive: true,
|
KeepAlive: true,
|
||||||
EnableDatagrams: true,
|
EnableDatagrams: true,
|
||||||
|
MaxDatagramFrameSize: MaxDatagramFrameSize,
|
||||||
}
|
}
|
||||||
quicListener := newQUICListener(t, quicConfig)
|
quicListener := newQUICListener(t, quicConfig)
|
||||||
defer quicListener.Close()
|
defer quicListener.Close()
|
||||||
|
@ -65,13 +67,19 @@ func TestMaxDatagramPayload(t *testing.T) {
|
||||||
errGroup.Go(func() error {
|
errGroup.Go(func() error {
|
||||||
// Accept quic connection
|
// Accept quic connection
|
||||||
quicSession, err := quicListener.Accept(ctx)
|
quicSession, err := quicListener.Accept(ctx)
|
||||||
require.NoError(t, err)
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
muxer, err := NewDatagramMuxer(quicSession)
|
muxer, err := NewDatagramMuxer(quicSession)
|
||||||
require.NoError(t, err)
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
sessionID, receivedPayload, err := muxer.ReceiveFrom()
|
sessionID, receivedPayload, err := muxer.ReceiveFrom()
|
||||||
require.NoError(t, err)
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
require.Equal(t, testSessionID, sessionID)
|
require.Equal(t, testSessionID, sessionID)
|
||||||
require.True(t, bytes.Equal(payload, receivedPayload))
|
require.True(t, bytes.Equal(payload, receivedPayload))
|
||||||
|
|
||||||
|
@ -89,13 +97,19 @@ func TestMaxDatagramPayload(t *testing.T) {
|
||||||
require.NoError(t, err)
|
require.NoError(t, err)
|
||||||
|
|
||||||
muxer, err := NewDatagramMuxer(quicSession)
|
muxer, err := NewDatagramMuxer(quicSession)
|
||||||
require.NoError(t, err)
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Wait a few milliseconds for MTU discovery to take place
|
||||||
|
time.Sleep(time.Millisecond * 100)
|
||||||
err = muxer.SendTo(testSessionID, payload)
|
err = muxer.SendTo(testSessionID, payload)
|
||||||
require.NoError(t, err)
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
// Payload larger than transport MTU, should return an error
|
// Payload larger than transport MTU, should return an error
|
||||||
largePayload := append(payload, byte(1))
|
largePayload := make([]byte, MaxDatagramFrameSize)
|
||||||
err = muxer.SendTo(testSessionID, largePayload)
|
err = muxer.SendTo(testSessionID, largePayload)
|
||||||
require.Error(t, err)
|
require.Error(t, err)
|
||||||
|
|
||||||
|
|
|
@ -0,0 +1,9 @@
|
||||||
|
//go:build !windows
|
||||||
|
|
||||||
|
package quic
|
||||||
|
|
||||||
|
const (
|
||||||
|
MaxDatagramFrameSize = 1350
|
||||||
|
// maxDatagramPayloadSize is the maximum packet size allowed by warp client
|
||||||
|
maxDatagramPayloadSize = 1280
|
||||||
|
)
|
|
@ -0,0 +1,11 @@
|
||||||
|
//go:build windows
|
||||||
|
|
||||||
|
package quic
|
||||||
|
|
||||||
|
const (
|
||||||
|
// Due to https://github.com/lucas-clemente/quic-go/issues/3273, MTU discovery is disabled on Windows
|
||||||
|
// 1220 is the default value https://github.com/lucas-clemente/quic-go/blob/84e03e59760ceee37359688871bb0688fcc4e98f/internal/protocol/params.go#L138
|
||||||
|
MaxDatagramFrameSize = 1220
|
||||||
|
// 3 more bytes are reserved at https://github.com/lucas-clemente/quic-go/blob/v0.24.0/internal/wire/datagram_frame.go#L61
|
||||||
|
maxDatagramPayloadSize = MaxDatagramFrameSize - 3 - sessionIDLen
|
||||||
|
)
|
|
@ -99,6 +99,10 @@ func populateConfig(config *Config) *Config {
|
||||||
} else if maxIncomingUniStreams < 0 {
|
} else if maxIncomingUniStreams < 0 {
|
||||||
maxIncomingUniStreams = 0
|
maxIncomingUniStreams = 0
|
||||||
}
|
}
|
||||||
|
maxDatagrameFrameSize := config.MaxDatagramFrameSize
|
||||||
|
if maxDatagrameFrameSize == 0 {
|
||||||
|
maxDatagrameFrameSize = int64(protocol.DefaultMaxDatagramFrameSize)
|
||||||
|
}
|
||||||
|
|
||||||
return &Config{
|
return &Config{
|
||||||
Versions: versions,
|
Versions: versions,
|
||||||
|
@ -116,6 +120,7 @@ func populateConfig(config *Config) *Config {
|
||||||
StatelessResetKey: config.StatelessResetKey,
|
StatelessResetKey: config.StatelessResetKey,
|
||||||
TokenStore: config.TokenStore,
|
TokenStore: config.TokenStore,
|
||||||
EnableDatagrams: config.EnableDatagrams,
|
EnableDatagrams: config.EnableDatagrams,
|
||||||
|
MaxDatagramFrameSize: maxDatagrameFrameSize,
|
||||||
DisablePathMTUDiscovery: config.DisablePathMTUDiscovery,
|
DisablePathMTUDiscovery: config.DisablePathMTUDiscovery,
|
||||||
DisableVersionNegotiationPackets: config.DisableVersionNegotiationPackets,
|
DisableVersionNegotiationPackets: config.DisableVersionNegotiationPackets,
|
||||||
Tracer: config.Tracer,
|
Tracer: config.Tracer,
|
||||||
|
|
|
@ -1,6 +1,8 @@
|
||||||
package quic
|
package quic
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"fmt"
|
||||||
|
|
||||||
"github.com/lucas-clemente/quic-go/internal/protocol"
|
"github.com/lucas-clemente/quic-go/internal/protocol"
|
||||||
"github.com/lucas-clemente/quic-go/internal/utils"
|
"github.com/lucas-clemente/quic-go/internal/utils"
|
||||||
"github.com/lucas-clemente/quic-go/internal/wire"
|
"github.com/lucas-clemente/quic-go/internal/wire"
|
||||||
|
@ -15,7 +17,7 @@ type datagramQueue struct {
|
||||||
|
|
||||||
hasData func()
|
hasData func()
|
||||||
|
|
||||||
dequeued chan struct{}
|
dequeued chan error
|
||||||
|
|
||||||
logger utils.Logger
|
logger utils.Logger
|
||||||
}
|
}
|
||||||
|
@ -25,7 +27,7 @@ func newDatagramQueue(hasData func(), logger utils.Logger) *datagramQueue {
|
||||||
hasData: hasData,
|
hasData: hasData,
|
||||||
sendQueue: make(chan *wire.DatagramFrame, 1),
|
sendQueue: make(chan *wire.DatagramFrame, 1),
|
||||||
rcvQueue: make(chan []byte, protocol.DatagramRcvQueueLen),
|
rcvQueue: make(chan []byte, protocol.DatagramRcvQueueLen),
|
||||||
dequeued: make(chan struct{}),
|
dequeued: make(chan error),
|
||||||
closed: make(chan struct{}),
|
closed: make(chan struct{}),
|
||||||
logger: logger,
|
logger: logger,
|
||||||
}
|
}
|
||||||
|
@ -42,18 +44,23 @@ func (h *datagramQueue) AddAndWait(f *wire.DatagramFrame) error {
|
||||||
}
|
}
|
||||||
|
|
||||||
select {
|
select {
|
||||||
case <-h.dequeued:
|
case err := <-h.dequeued:
|
||||||
return nil
|
return err
|
||||||
case <-h.closed:
|
case <-h.closed:
|
||||||
return h.closeErr
|
return h.closeErr
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// Get dequeues a DATAGRAM frame for sending.
|
// Get dequeues a DATAGRAM frame for sending.
|
||||||
func (h *datagramQueue) Get() *wire.DatagramFrame {
|
func (h *datagramQueue) Get(maxDatagramSize protocol.ByteCount, version protocol.VersionNumber) *wire.DatagramFrame {
|
||||||
select {
|
select {
|
||||||
case f := <-h.sendQueue:
|
case f := <-h.sendQueue:
|
||||||
h.dequeued <- struct{}{}
|
datagramSize := f.Length(version)
|
||||||
|
if datagramSize > maxDatagramSize {
|
||||||
|
h.dequeued <- fmt.Errorf("datagram size %d exceed current limit of %d", datagramSize, maxDatagramSize)
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
h.dequeued <- nil
|
||||||
return f
|
return f
|
||||||
default:
|
default:
|
||||||
return nil
|
return nil
|
||||||
|
|
|
@ -291,8 +291,9 @@ type Config struct {
|
||||||
DisableVersionNegotiationPackets bool
|
DisableVersionNegotiationPackets bool
|
||||||
// See https://datatracker.ietf.org/doc/draft-ietf-quic-datagram/.
|
// See https://datatracker.ietf.org/doc/draft-ietf-quic-datagram/.
|
||||||
// Datagrams will only be available when both peers enable datagram support.
|
// Datagrams will only be available when both peers enable datagram support.
|
||||||
EnableDatagrams bool
|
EnableDatagrams bool
|
||||||
Tracer logging.Tracer
|
MaxDatagramFrameSize int64
|
||||||
|
Tracer logging.Tracer
|
||||||
}
|
}
|
||||||
|
|
||||||
// ConnectionState records basic details about a QUIC connection
|
// ConnectionState records basic details about a QUIC connection
|
||||||
|
|
|
@ -41,7 +41,7 @@ type cubicSender struct {
|
||||||
// Used for stats collection of slowstartPacketsLost
|
// Used for stats collection of slowstartPacketsLost
|
||||||
lastCutbackExitedSlowstart bool
|
lastCutbackExitedSlowstart bool
|
||||||
|
|
||||||
// Congestion window in packets.
|
// Congestion window in bytes.
|
||||||
congestionWindow protocol.ByteCount
|
congestionWindow protocol.ByteCount
|
||||||
|
|
||||||
// Slow start congestion window in bytes, aka ssthresh.
|
// Slow start congestion window in bytes, aka ssthresh.
|
||||||
|
|
|
@ -132,10 +132,10 @@ const MaxPostHandshakeCryptoFrameSize = 1000
|
||||||
// but must ensure that a maximum size ACK frame fits into one packet.
|
// but must ensure that a maximum size ACK frame fits into one packet.
|
||||||
const MaxAckFrameSize ByteCount = 1000
|
const MaxAckFrameSize ByteCount = 1000
|
||||||
|
|
||||||
// MaxDatagramFrameSize is the maximum size of a DATAGRAM frame as defined in
|
// DefaultMaxDatagramFrameSize is the maximum size of a DATAGRAM frame as defined in
|
||||||
// https://datatracker.ietf.org/doc/draft-pauly-quic-datagram/.
|
// https://datatracker.ietf.org/doc/draft-pauly-quic-datagram/.
|
||||||
// The size is chosen such that a DATAGRAM frame fits into a QUIC packet.
|
// The size is chosen such that a DATAGRAM frame fits into a QUIC packet.
|
||||||
const MaxDatagramFrameSize ByteCount = 1220
|
const DefaultMaxDatagramFrameSize ByteCount = 1220
|
||||||
|
|
||||||
// DatagramRcvQueueLen is the length of the receive queue for DATAGRAM frames.
|
// DatagramRcvQueueLen is the length of the receive queue for DATAGRAM frames.
|
||||||
// See https://datatracker.ietf.org/doc/draft-pauly-quic-datagram/.
|
// See https://datatracker.ietf.org/doc/draft-pauly-quic-datagram/.
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
//go:build go1.17
|
//go:build go1.17 && !go1.18
|
||||||
// +build go1.17
|
// +build go1.17,!go1.18
|
||||||
|
|
||||||
package qtls
|
package qtls
|
||||||
|
|
||||||
|
|
|
@ -3,4 +3,98 @@
|
||||||
|
|
||||||
package qtls
|
package qtls
|
||||||
|
|
||||||
var _ int = "quic-go doesn't build on Go 1.18 yet."
|
import (
|
||||||
|
"crypto"
|
||||||
|
"crypto/cipher"
|
||||||
|
"crypto/tls"
|
||||||
|
"net"
|
||||||
|
"unsafe"
|
||||||
|
|
||||||
|
"github.com/marten-seemann/qtls-go1-18"
|
||||||
|
)
|
||||||
|
|
||||||
|
type (
|
||||||
|
// Alert is a TLS alert
|
||||||
|
Alert = qtls.Alert
|
||||||
|
// A Certificate is qtls.Certificate.
|
||||||
|
Certificate = qtls.Certificate
|
||||||
|
// CertificateRequestInfo contains inforamtion about a certificate request.
|
||||||
|
CertificateRequestInfo = qtls.CertificateRequestInfo
|
||||||
|
// A CipherSuiteTLS13 is a cipher suite for TLS 1.3
|
||||||
|
CipherSuiteTLS13 = qtls.CipherSuiteTLS13
|
||||||
|
// ClientHelloInfo contains information about a ClientHello.
|
||||||
|
ClientHelloInfo = qtls.ClientHelloInfo
|
||||||
|
// ClientSessionCache is a cache used for session resumption.
|
||||||
|
ClientSessionCache = qtls.ClientSessionCache
|
||||||
|
// ClientSessionState is a state needed for session resumption.
|
||||||
|
ClientSessionState = qtls.ClientSessionState
|
||||||
|
// A Config is a qtls.Config.
|
||||||
|
Config = qtls.Config
|
||||||
|
// A Conn is a qtls.Conn.
|
||||||
|
Conn = qtls.Conn
|
||||||
|
// ConnectionState contains information about the state of the connection.
|
||||||
|
ConnectionState = qtls.ConnectionStateWith0RTT
|
||||||
|
// EncryptionLevel is the encryption level of a message.
|
||||||
|
EncryptionLevel = qtls.EncryptionLevel
|
||||||
|
// Extension is a TLS extension
|
||||||
|
Extension = qtls.Extension
|
||||||
|
// ExtraConfig is the qtls.ExtraConfig
|
||||||
|
ExtraConfig = qtls.ExtraConfig
|
||||||
|
// RecordLayer is a qtls RecordLayer.
|
||||||
|
RecordLayer = qtls.RecordLayer
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
// EncryptionHandshake is the Handshake encryption level
|
||||||
|
EncryptionHandshake = qtls.EncryptionHandshake
|
||||||
|
// Encryption0RTT is the 0-RTT encryption level
|
||||||
|
Encryption0RTT = qtls.Encryption0RTT
|
||||||
|
// EncryptionApplication is the application data encryption level
|
||||||
|
EncryptionApplication = qtls.EncryptionApplication
|
||||||
|
)
|
||||||
|
|
||||||
|
// AEADAESGCMTLS13 creates a new AES-GCM AEAD for TLS 1.3
|
||||||
|
func AEADAESGCMTLS13(key, fixedNonce []byte) cipher.AEAD {
|
||||||
|
return qtls.AEADAESGCMTLS13(key, fixedNonce)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Client returns a new TLS client side connection.
|
||||||
|
func Client(conn net.Conn, config *Config, extraConfig *ExtraConfig) *Conn {
|
||||||
|
return qtls.Client(conn, config, extraConfig)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Server returns a new TLS server side connection.
|
||||||
|
func Server(conn net.Conn, config *Config, extraConfig *ExtraConfig) *Conn {
|
||||||
|
return qtls.Server(conn, config, extraConfig)
|
||||||
|
}
|
||||||
|
|
||||||
|
func GetConnectionState(conn *Conn) ConnectionState {
|
||||||
|
return conn.ConnectionStateWith0RTT()
|
||||||
|
}
|
||||||
|
|
||||||
|
// ToTLSConnectionState extracts the tls.ConnectionState
|
||||||
|
func ToTLSConnectionState(cs ConnectionState) tls.ConnectionState {
|
||||||
|
return cs.ConnectionState
|
||||||
|
}
|
||||||
|
|
||||||
|
type cipherSuiteTLS13 struct {
|
||||||
|
ID uint16
|
||||||
|
KeyLen int
|
||||||
|
AEAD func(key, fixedNonce []byte) cipher.AEAD
|
||||||
|
Hash crypto.Hash
|
||||||
|
}
|
||||||
|
|
||||||
|
//go:linkname cipherSuiteTLS13ByID github.com/marten-seemann/qtls-go1-18.cipherSuiteTLS13ByID
|
||||||
|
func cipherSuiteTLS13ByID(id uint16) *cipherSuiteTLS13
|
||||||
|
|
||||||
|
// CipherSuiteTLS13ByID gets a TLS 1.3 cipher suite.
|
||||||
|
func CipherSuiteTLS13ByID(id uint16) *CipherSuiteTLS13 {
|
||||||
|
val := cipherSuiteTLS13ByID(id)
|
||||||
|
cs := (*cipherSuiteTLS13)(unsafe.Pointer(val))
|
||||||
|
return &qtls.CipherSuiteTLS13{
|
||||||
|
ID: cs.ID,
|
||||||
|
KeyLen: cs.KeyLen,
|
||||||
|
AEAD: cs.AEAD,
|
||||||
|
Hash: cs.Hash,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
|
@ -0,0 +1,6 @@
|
||||||
|
//go:build go1.19
|
||||||
|
// +build go1.19
|
||||||
|
|
||||||
|
package qtls
|
||||||
|
|
||||||
|
var _ int = "quic-go doesn't build on Go 1.19 yet."
|
|
@ -1,4 +1,4 @@
|
||||||
package logging
|
package logging
|
||||||
|
|
||||||
//go:generate sh -c "mockgen -package logging -self_package github.com/lucas-clemente/quic-go/logging -destination mock_connection_tracer_test.go github.com/lucas-clemente/quic-go/logging ConnectionTracer && goimports -w mock_connection_tracer_test.go"
|
//go:generate sh -c "mockgen -package logging -self_package github.com/lucas-clemente/quic-go/logging -destination mock_connection_tracer_test.go github.com/lucas-clemente/quic-go/logging ConnectionTracer"
|
||||||
//go:generate sh -c "mockgen -package logging -self_package github.com/lucas-clemente/quic-go/logging -destination mock_tracer_test.go github.com/lucas-clemente/quic-go/logging Tracer && goimports -w mock_tracer_test.go"
|
//go:generate sh -c "mockgen -package logging -self_package github.com/lucas-clemente/quic-go/logging -destination mock_tracer_test.go github.com/lucas-clemente/quic-go/logging Tracer"
|
||||||
|
|
|
@ -23,5 +23,5 @@ package quic
|
||||||
//go:generate sh -c "./mockgen_private.sh quic mock_packet_handler_manager_test.go github.com/lucas-clemente/quic-go packetHandlerManager"
|
//go:generate sh -c "./mockgen_private.sh quic mock_packet_handler_manager_test.go github.com/lucas-clemente/quic-go packetHandlerManager"
|
||||||
//go:generate sh -c "./mockgen_private.sh quic mock_multiplexer_test.go github.com/lucas-clemente/quic-go multiplexer"
|
//go:generate sh -c "./mockgen_private.sh quic mock_multiplexer_test.go github.com/lucas-clemente/quic-go multiplexer"
|
||||||
//go:generate sh -c "./mockgen_private.sh quic mock_batch_conn_test.go github.com/lucas-clemente/quic-go batchConn"
|
//go:generate sh -c "./mockgen_private.sh quic mock_batch_conn_test.go github.com/lucas-clemente/quic-go batchConn"
|
||||||
//go:generate sh -c "mockgen -package quic -self_package github.com/lucas-clemente/quic-go -destination mock_token_store_test.go github.com/lucas-clemente/quic-go TokenStore && goimports -w mock_token_store_test.go"
|
//go:generate sh -c "mockgen -package quic -self_package github.com/lucas-clemente/quic-go -destination mock_token_store_test.go github.com/lucas-clemente/quic-go TokenStore"
|
||||||
//go:generate sh -c "mockgen -package quic -self_package github.com/lucas-clemente/quic-go -destination mock_packetconn_test.go net PacketConn && goimports -w mock_packetconn_test.go"
|
//go:generate sh -c "mockgen -package quic -self_package github.com/lucas-clemente/quic-go -destination mock_packetconn_test.go net PacketConn"
|
||||||
|
|
|
@ -44,8 +44,6 @@ AUX_FILES=$(IFS=, ; echo "${AUX[*]}")
|
||||||
## create a public alias for the interface, so that mockgen can process it
|
## create a public alias for the interface, so that mockgen can process it
|
||||||
echo -e "package $1\n" > $TMPFILE
|
echo -e "package $1\n" > $TMPFILE
|
||||||
echo "$INTERFACE" | sed "s/$ORIG_INTERFACE_NAME/$INTERFACE_NAME/" >> $TMPFILE
|
echo "$INTERFACE" | sed "s/$ORIG_INTERFACE_NAME/$INTERFACE_NAME/" >> $TMPFILE
|
||||||
goimports -w $TMPFILE
|
|
||||||
mockgen -package $1 -self_package $3 -destination $DEST -source=$TMPFILE -aux_files $AUX_FILES
|
mockgen -package $1 -self_package $3 -destination $DEST -source=$TMPFILE -aux_files $AUX_FILES
|
||||||
goimports -w $DEST
|
|
||||||
sed "s/$TMPFILE/$SRC/" "$DEST" > "$DEST.new" && mv "$DEST.new" "$DEST"
|
sed "s/$TMPFILE/$SRC/" "$DEST" > "$DEST.new" && mv "$DEST.new" "$DEST"
|
||||||
rm "$TMPFILE"
|
rm "$TMPFILE"
|
||||||
|
|
|
@ -596,7 +596,7 @@ func (p *packetPacker) composeNextPacket(maxFrameSize protocol.ByteCount, ackAll
|
||||||
|
|
||||||
var hasDatagram bool
|
var hasDatagram bool
|
||||||
if p.datagramQueue != nil {
|
if p.datagramQueue != nil {
|
||||||
if datagram := p.datagramQueue.Get(); datagram != nil {
|
if datagram := p.datagramQueue.Get(maxFrameSize, p.version); datagram != nil {
|
||||||
payload.frames = append(payload.frames, ackhandler.Frame{
|
payload.frames = append(payload.frames, ackhandler.Frame{
|
||||||
Frame: datagram,
|
Frame: datagram,
|
||||||
// set it to a no-op. Then we won't set the default callback, which would retransmit the frame.
|
// set it to a no-op. Then we won't set the default callback, which would retransmit the frame.
|
||||||
|
|
|
@ -316,7 +316,10 @@ var newSession = func(
|
||||||
RetrySourceConnectionID: retrySrcConnID,
|
RetrySourceConnectionID: retrySrcConnID,
|
||||||
}
|
}
|
||||||
if s.config.EnableDatagrams {
|
if s.config.EnableDatagrams {
|
||||||
params.MaxDatagramFrameSize = protocol.MaxDatagramFrameSize
|
params.MaxDatagramFrameSize = protocol.ByteCount(s.config.MaxDatagramFrameSize)
|
||||||
|
if params.MaxDatagramFrameSize == 0 {
|
||||||
|
params.MaxDatagramFrameSize = protocol.DefaultMaxDatagramFrameSize
|
||||||
|
}
|
||||||
}
|
}
|
||||||
if s.tracer != nil {
|
if s.tracer != nil {
|
||||||
s.tracer.SentTransportParameters(params)
|
s.tracer.SentTransportParameters(params)
|
||||||
|
@ -440,7 +443,7 @@ var newClientSession = func(
|
||||||
InitialSourceConnectionID: srcConnID,
|
InitialSourceConnectionID: srcConnID,
|
||||||
}
|
}
|
||||||
if s.config.EnableDatagrams {
|
if s.config.EnableDatagrams {
|
||||||
params.MaxDatagramFrameSize = protocol.MaxDatagramFrameSize
|
params.MaxDatagramFrameSize = protocol.ByteCount(s.config.MaxDatagramFrameSize)
|
||||||
}
|
}
|
||||||
if s.tracer != nil {
|
if s.tracer != nil {
|
||||||
s.tracer.SentTransportParameters(params)
|
s.tracer.SentTransportParameters(params)
|
||||||
|
@ -1409,7 +1412,7 @@ func (s *session) handleAckFrame(frame *wire.AckFrame, encLevel protocol.Encrypt
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *session) handleDatagramFrame(f *wire.DatagramFrame) error {
|
func (s *session) handleDatagramFrame(f *wire.DatagramFrame) error {
|
||||||
if f.Length(s.version) > protocol.MaxDatagramFrameSize {
|
if f.Length(s.version) > protocol.ByteCount(s.config.MaxDatagramFrameSize) {
|
||||||
return &qerr.TransportError{
|
return &qerr.TransportError{
|
||||||
ErrorCode: qerr.ProtocolViolation,
|
ErrorCode: qerr.ProtocolViolation,
|
||||||
ErrorMessage: "DATAGRAM frame too large",
|
ErrorMessage: "DATAGRAM frame too large",
|
||||||
|
|
|
@ -0,0 +1,27 @@
|
||||||
|
Copyright (c) 2009 The Go Authors. All rights reserved.
|
||||||
|
|
||||||
|
Redistribution and use in source and binary forms, with or without
|
||||||
|
modification, are permitted provided that the following conditions are
|
||||||
|
met:
|
||||||
|
|
||||||
|
* Redistributions of source code must retain the above copyright
|
||||||
|
notice, this list of conditions and the following disclaimer.
|
||||||
|
* Redistributions in binary form must reproduce the above
|
||||||
|
copyright notice, this list of conditions and the following disclaimer
|
||||||
|
in the documentation and/or other materials provided with the
|
||||||
|
distribution.
|
||||||
|
* Neither the name of Google Inc. nor the names of its
|
||||||
|
contributors may be used to endorse or promote products derived from
|
||||||
|
this software without specific prior written permission.
|
||||||
|
|
||||||
|
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
||||||
|
"AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
||||||
|
LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
|
||||||
|
A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
|
||||||
|
OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
||||||
|
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
||||||
|
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
||||||
|
DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
||||||
|
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
||||||
|
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
||||||
|
OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
@ -0,0 +1,6 @@
|
||||||
|
# qtls
|
||||||
|
|
||||||
|
[![Go Reference](https://pkg.go.dev/badge/github.com/marten-seemann/qtls-go1-17.svg)](https://pkg.go.dev/github.com/marten-seemann/qtls-go1-17)
|
||||||
|
[![.github/workflows/go-test.yml](https://github.com/marten-seemann/qtls-go1-17/actions/workflows/go-test.yml/badge.svg)](https://github.com/marten-seemann/qtls-go1-17/actions/workflows/go-test.yml)
|
||||||
|
|
||||||
|
This repository contains a modified version of the standard library's TLS implementation, modified for the QUIC protocol. It is used by [quic-go](https://github.com/lucas-clemente/quic-go).
|
|
@ -0,0 +1,102 @@
|
||||||
|
// Copyright 2009 The Go Authors. All rights reserved.
|
||||||
|
// Use of this source code is governed by a BSD-style
|
||||||
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
|
package qtls
|
||||||
|
|
||||||
|
import "strconv"
|
||||||
|
|
||||||
|
type alert uint8
|
||||||
|
|
||||||
|
// Alert is a TLS alert
|
||||||
|
type Alert = alert
|
||||||
|
|
||||||
|
const (
|
||||||
|
// alert level
|
||||||
|
alertLevelWarning = 1
|
||||||
|
alertLevelError = 2
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
alertCloseNotify alert = 0
|
||||||
|
alertUnexpectedMessage alert = 10
|
||||||
|
alertBadRecordMAC alert = 20
|
||||||
|
alertDecryptionFailed alert = 21
|
||||||
|
alertRecordOverflow alert = 22
|
||||||
|
alertDecompressionFailure alert = 30
|
||||||
|
alertHandshakeFailure alert = 40
|
||||||
|
alertBadCertificate alert = 42
|
||||||
|
alertUnsupportedCertificate alert = 43
|
||||||
|
alertCertificateRevoked alert = 44
|
||||||
|
alertCertificateExpired alert = 45
|
||||||
|
alertCertificateUnknown alert = 46
|
||||||
|
alertIllegalParameter alert = 47
|
||||||
|
alertUnknownCA alert = 48
|
||||||
|
alertAccessDenied alert = 49
|
||||||
|
alertDecodeError alert = 50
|
||||||
|
alertDecryptError alert = 51
|
||||||
|
alertExportRestriction alert = 60
|
||||||
|
alertProtocolVersion alert = 70
|
||||||
|
alertInsufficientSecurity alert = 71
|
||||||
|
alertInternalError alert = 80
|
||||||
|
alertInappropriateFallback alert = 86
|
||||||
|
alertUserCanceled alert = 90
|
||||||
|
alertNoRenegotiation alert = 100
|
||||||
|
alertMissingExtension alert = 109
|
||||||
|
alertUnsupportedExtension alert = 110
|
||||||
|
alertCertificateUnobtainable alert = 111
|
||||||
|
alertUnrecognizedName alert = 112
|
||||||
|
alertBadCertificateStatusResponse alert = 113
|
||||||
|
alertBadCertificateHashValue alert = 114
|
||||||
|
alertUnknownPSKIdentity alert = 115
|
||||||
|
alertCertificateRequired alert = 116
|
||||||
|
alertNoApplicationProtocol alert = 120
|
||||||
|
)
|
||||||
|
|
||||||
|
var alertText = map[alert]string{
|
||||||
|
alertCloseNotify: "close notify",
|
||||||
|
alertUnexpectedMessage: "unexpected message",
|
||||||
|
alertBadRecordMAC: "bad record MAC",
|
||||||
|
alertDecryptionFailed: "decryption failed",
|
||||||
|
alertRecordOverflow: "record overflow",
|
||||||
|
alertDecompressionFailure: "decompression failure",
|
||||||
|
alertHandshakeFailure: "handshake failure",
|
||||||
|
alertBadCertificate: "bad certificate",
|
||||||
|
alertUnsupportedCertificate: "unsupported certificate",
|
||||||
|
alertCertificateRevoked: "revoked certificate",
|
||||||
|
alertCertificateExpired: "expired certificate",
|
||||||
|
alertCertificateUnknown: "unknown certificate",
|
||||||
|
alertIllegalParameter: "illegal parameter",
|
||||||
|
alertUnknownCA: "unknown certificate authority",
|
||||||
|
alertAccessDenied: "access denied",
|
||||||
|
alertDecodeError: "error decoding message",
|
||||||
|
alertDecryptError: "error decrypting message",
|
||||||
|
alertExportRestriction: "export restriction",
|
||||||
|
alertProtocolVersion: "protocol version not supported",
|
||||||
|
alertInsufficientSecurity: "insufficient security level",
|
||||||
|
alertInternalError: "internal error",
|
||||||
|
alertInappropriateFallback: "inappropriate fallback",
|
||||||
|
alertUserCanceled: "user canceled",
|
||||||
|
alertNoRenegotiation: "no renegotiation",
|
||||||
|
alertMissingExtension: "missing extension",
|
||||||
|
alertUnsupportedExtension: "unsupported extension",
|
||||||
|
alertCertificateUnobtainable: "certificate unobtainable",
|
||||||
|
alertUnrecognizedName: "unrecognized name",
|
||||||
|
alertBadCertificateStatusResponse: "bad certificate status response",
|
||||||
|
alertBadCertificateHashValue: "bad certificate hash value",
|
||||||
|
alertUnknownPSKIdentity: "unknown PSK identity",
|
||||||
|
alertCertificateRequired: "certificate required",
|
||||||
|
alertNoApplicationProtocol: "no application protocol",
|
||||||
|
}
|
||||||
|
|
||||||
|
func (e alert) String() string {
|
||||||
|
s, ok := alertText[e]
|
||||||
|
if ok {
|
||||||
|
return "tls: " + s
|
||||||
|
}
|
||||||
|
return "tls: alert(" + strconv.Itoa(int(e)) + ")"
|
||||||
|
}
|
||||||
|
|
||||||
|
func (e alert) Error() string {
|
||||||
|
return e.String()
|
||||||
|
}
|
|
@ -0,0 +1,289 @@
|
||||||
|
// Copyright 2017 The Go Authors. All rights reserved.
|
||||||
|
// Use of this source code is governed by a BSD-style
|
||||||
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
|
package qtls
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bytes"
|
||||||
|
"crypto"
|
||||||
|
"crypto/ecdsa"
|
||||||
|
"crypto/ed25519"
|
||||||
|
"crypto/elliptic"
|
||||||
|
"crypto/rsa"
|
||||||
|
"errors"
|
||||||
|
"fmt"
|
||||||
|
"hash"
|
||||||
|
"io"
|
||||||
|
)
|
||||||
|
|
||||||
|
// verifyHandshakeSignature verifies a signature against pre-hashed
|
||||||
|
// (if required) handshake contents.
|
||||||
|
func verifyHandshakeSignature(sigType uint8, pubkey crypto.PublicKey, hashFunc crypto.Hash, signed, sig []byte) error {
|
||||||
|
switch sigType {
|
||||||
|
case signatureECDSA:
|
||||||
|
pubKey, ok := pubkey.(*ecdsa.PublicKey)
|
||||||
|
if !ok {
|
||||||
|
return fmt.Errorf("expected an ECDSA public key, got %T", pubkey)
|
||||||
|
}
|
||||||
|
if !ecdsa.VerifyASN1(pubKey, signed, sig) {
|
||||||
|
return errors.New("ECDSA verification failure")
|
||||||
|
}
|
||||||
|
case signatureEd25519:
|
||||||
|
pubKey, ok := pubkey.(ed25519.PublicKey)
|
||||||
|
if !ok {
|
||||||
|
return fmt.Errorf("expected an Ed25519 public key, got %T", pubkey)
|
||||||
|
}
|
||||||
|
if !ed25519.Verify(pubKey, signed, sig) {
|
||||||
|
return errors.New("Ed25519 verification failure")
|
||||||
|
}
|
||||||
|
case signaturePKCS1v15:
|
||||||
|
pubKey, ok := pubkey.(*rsa.PublicKey)
|
||||||
|
if !ok {
|
||||||
|
return fmt.Errorf("expected an RSA public key, got %T", pubkey)
|
||||||
|
}
|
||||||
|
if err := rsa.VerifyPKCS1v15(pubKey, hashFunc, signed, sig); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
case signatureRSAPSS:
|
||||||
|
pubKey, ok := pubkey.(*rsa.PublicKey)
|
||||||
|
if !ok {
|
||||||
|
return fmt.Errorf("expected an RSA public key, got %T", pubkey)
|
||||||
|
}
|
||||||
|
signOpts := &rsa.PSSOptions{SaltLength: rsa.PSSSaltLengthEqualsHash}
|
||||||
|
if err := rsa.VerifyPSS(pubKey, hashFunc, signed, sig, signOpts); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
default:
|
||||||
|
return errors.New("internal error: unknown signature type")
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
const (
|
||||||
|
serverSignatureContext = "TLS 1.3, server CertificateVerify\x00"
|
||||||
|
clientSignatureContext = "TLS 1.3, client CertificateVerify\x00"
|
||||||
|
)
|
||||||
|
|
||||||
|
var signaturePadding = []byte{
|
||||||
|
0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20,
|
||||||
|
0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20,
|
||||||
|
0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20,
|
||||||
|
0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20,
|
||||||
|
0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20,
|
||||||
|
0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20,
|
||||||
|
0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20,
|
||||||
|
0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20, 0x20,
|
||||||
|
}
|
||||||
|
|
||||||
|
// signedMessage returns the pre-hashed (if necessary) message to be signed by
|
||||||
|
// certificate keys in TLS 1.3. See RFC 8446, Section 4.4.3.
|
||||||
|
func signedMessage(sigHash crypto.Hash, context string, transcript hash.Hash) []byte {
|
||||||
|
if sigHash == directSigning {
|
||||||
|
b := &bytes.Buffer{}
|
||||||
|
b.Write(signaturePadding)
|
||||||
|
io.WriteString(b, context)
|
||||||
|
b.Write(transcript.Sum(nil))
|
||||||
|
return b.Bytes()
|
||||||
|
}
|
||||||
|
h := sigHash.New()
|
||||||
|
h.Write(signaturePadding)
|
||||||
|
io.WriteString(h, context)
|
||||||
|
h.Write(transcript.Sum(nil))
|
||||||
|
return h.Sum(nil)
|
||||||
|
}
|
||||||
|
|
||||||
|
// typeAndHashFromSignatureScheme returns the corresponding signature type and
|
||||||
|
// crypto.Hash for a given TLS SignatureScheme.
|
||||||
|
func typeAndHashFromSignatureScheme(signatureAlgorithm SignatureScheme) (sigType uint8, hash crypto.Hash, err error) {
|
||||||
|
switch signatureAlgorithm {
|
||||||
|
case PKCS1WithSHA1, PKCS1WithSHA256, PKCS1WithSHA384, PKCS1WithSHA512:
|
||||||
|
sigType = signaturePKCS1v15
|
||||||
|
case PSSWithSHA256, PSSWithSHA384, PSSWithSHA512:
|
||||||
|
sigType = signatureRSAPSS
|
||||||
|
case ECDSAWithSHA1, ECDSAWithP256AndSHA256, ECDSAWithP384AndSHA384, ECDSAWithP521AndSHA512:
|
||||||
|
sigType = signatureECDSA
|
||||||
|
case Ed25519:
|
||||||
|
sigType = signatureEd25519
|
||||||
|
default:
|
||||||
|
return 0, 0, fmt.Errorf("unsupported signature algorithm: %v", signatureAlgorithm)
|
||||||
|
}
|
||||||
|
switch signatureAlgorithm {
|
||||||
|
case PKCS1WithSHA1, ECDSAWithSHA1:
|
||||||
|
hash = crypto.SHA1
|
||||||
|
case PKCS1WithSHA256, PSSWithSHA256, ECDSAWithP256AndSHA256:
|
||||||
|
hash = crypto.SHA256
|
||||||
|
case PKCS1WithSHA384, PSSWithSHA384, ECDSAWithP384AndSHA384:
|
||||||
|
hash = crypto.SHA384
|
||||||
|
case PKCS1WithSHA512, PSSWithSHA512, ECDSAWithP521AndSHA512:
|
||||||
|
hash = crypto.SHA512
|
||||||
|
case Ed25519:
|
||||||
|
hash = directSigning
|
||||||
|
default:
|
||||||
|
return 0, 0, fmt.Errorf("unsupported signature algorithm: %v", signatureAlgorithm)
|
||||||
|
}
|
||||||
|
return sigType, hash, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// legacyTypeAndHashFromPublicKey returns the fixed signature type and crypto.Hash for
|
||||||
|
// a given public key used with TLS 1.0 and 1.1, before the introduction of
|
||||||
|
// signature algorithm negotiation.
|
||||||
|
func legacyTypeAndHashFromPublicKey(pub crypto.PublicKey) (sigType uint8, hash crypto.Hash, err error) {
|
||||||
|
switch pub.(type) {
|
||||||
|
case *rsa.PublicKey:
|
||||||
|
return signaturePKCS1v15, crypto.MD5SHA1, nil
|
||||||
|
case *ecdsa.PublicKey:
|
||||||
|
return signatureECDSA, crypto.SHA1, nil
|
||||||
|
case ed25519.PublicKey:
|
||||||
|
// RFC 8422 specifies support for Ed25519 in TLS 1.0 and 1.1,
|
||||||
|
// but it requires holding on to a handshake transcript to do a
|
||||||
|
// full signature, and not even OpenSSL bothers with the
|
||||||
|
// complexity, so we can't even test it properly.
|
||||||
|
return 0, 0, fmt.Errorf("tls: Ed25519 public keys are not supported before TLS 1.2")
|
||||||
|
default:
|
||||||
|
return 0, 0, fmt.Errorf("tls: unsupported public key: %T", pub)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
var rsaSignatureSchemes = []struct {
|
||||||
|
scheme SignatureScheme
|
||||||
|
minModulusBytes int
|
||||||
|
maxVersion uint16
|
||||||
|
}{
|
||||||
|
// RSA-PSS is used with PSSSaltLengthEqualsHash, and requires
|
||||||
|
// emLen >= hLen + sLen + 2
|
||||||
|
{PSSWithSHA256, crypto.SHA256.Size()*2 + 2, VersionTLS13},
|
||||||
|
{PSSWithSHA384, crypto.SHA384.Size()*2 + 2, VersionTLS13},
|
||||||
|
{PSSWithSHA512, crypto.SHA512.Size()*2 + 2, VersionTLS13},
|
||||||
|
// PKCS #1 v1.5 uses prefixes from hashPrefixes in crypto/rsa, and requires
|
||||||
|
// emLen >= len(prefix) + hLen + 11
|
||||||
|
// TLS 1.3 dropped support for PKCS #1 v1.5 in favor of RSA-PSS.
|
||||||
|
{PKCS1WithSHA256, 19 + crypto.SHA256.Size() + 11, VersionTLS12},
|
||||||
|
{PKCS1WithSHA384, 19 + crypto.SHA384.Size() + 11, VersionTLS12},
|
||||||
|
{PKCS1WithSHA512, 19 + crypto.SHA512.Size() + 11, VersionTLS12},
|
||||||
|
{PKCS1WithSHA1, 15 + crypto.SHA1.Size() + 11, VersionTLS12},
|
||||||
|
}
|
||||||
|
|
||||||
|
// signatureSchemesForCertificate returns the list of supported SignatureSchemes
|
||||||
|
// for a given certificate, based on the public key and the protocol version,
|
||||||
|
// and optionally filtered by its explicit SupportedSignatureAlgorithms.
|
||||||
|
//
|
||||||
|
// This function must be kept in sync with supportedSignatureAlgorithms.
|
||||||
|
func signatureSchemesForCertificate(version uint16, cert *Certificate) []SignatureScheme {
|
||||||
|
priv, ok := cert.PrivateKey.(crypto.Signer)
|
||||||
|
if !ok {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
var sigAlgs []SignatureScheme
|
||||||
|
switch pub := priv.Public().(type) {
|
||||||
|
case *ecdsa.PublicKey:
|
||||||
|
if version != VersionTLS13 {
|
||||||
|
// In TLS 1.2 and earlier, ECDSA algorithms are not
|
||||||
|
// constrained to a single curve.
|
||||||
|
sigAlgs = []SignatureScheme{
|
||||||
|
ECDSAWithP256AndSHA256,
|
||||||
|
ECDSAWithP384AndSHA384,
|
||||||
|
ECDSAWithP521AndSHA512,
|
||||||
|
ECDSAWithSHA1,
|
||||||
|
}
|
||||||
|
break
|
||||||
|
}
|
||||||
|
switch pub.Curve {
|
||||||
|
case elliptic.P256():
|
||||||
|
sigAlgs = []SignatureScheme{ECDSAWithP256AndSHA256}
|
||||||
|
case elliptic.P384():
|
||||||
|
sigAlgs = []SignatureScheme{ECDSAWithP384AndSHA384}
|
||||||
|
case elliptic.P521():
|
||||||
|
sigAlgs = []SignatureScheme{ECDSAWithP521AndSHA512}
|
||||||
|
default:
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
case *rsa.PublicKey:
|
||||||
|
size := pub.Size()
|
||||||
|
sigAlgs = make([]SignatureScheme, 0, len(rsaSignatureSchemes))
|
||||||
|
for _, candidate := range rsaSignatureSchemes {
|
||||||
|
if size >= candidate.minModulusBytes && version <= candidate.maxVersion {
|
||||||
|
sigAlgs = append(sigAlgs, candidate.scheme)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
case ed25519.PublicKey:
|
||||||
|
sigAlgs = []SignatureScheme{Ed25519}
|
||||||
|
default:
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
if cert.SupportedSignatureAlgorithms != nil {
|
||||||
|
var filteredSigAlgs []SignatureScheme
|
||||||
|
for _, sigAlg := range sigAlgs {
|
||||||
|
if isSupportedSignatureAlgorithm(sigAlg, cert.SupportedSignatureAlgorithms) {
|
||||||
|
filteredSigAlgs = append(filteredSigAlgs, sigAlg)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return filteredSigAlgs
|
||||||
|
}
|
||||||
|
return sigAlgs
|
||||||
|
}
|
||||||
|
|
||||||
|
// selectSignatureScheme picks a SignatureScheme from the peer's preference list
|
||||||
|
// that works with the selected certificate. It's only called for protocol
|
||||||
|
// versions that support signature algorithms, so TLS 1.2 and 1.3.
|
||||||
|
func selectSignatureScheme(vers uint16, c *Certificate, peerAlgs []SignatureScheme) (SignatureScheme, error) {
|
||||||
|
supportedAlgs := signatureSchemesForCertificate(vers, c)
|
||||||
|
if len(supportedAlgs) == 0 {
|
||||||
|
return 0, unsupportedCertificateError(c)
|
||||||
|
}
|
||||||
|
if len(peerAlgs) == 0 && vers == VersionTLS12 {
|
||||||
|
// For TLS 1.2, if the client didn't send signature_algorithms then we
|
||||||
|
// can assume that it supports SHA1. See RFC 5246, Section 7.4.1.4.1.
|
||||||
|
peerAlgs = []SignatureScheme{PKCS1WithSHA1, ECDSAWithSHA1}
|
||||||
|
}
|
||||||
|
// Pick signature scheme in the peer's preference order, as our
|
||||||
|
// preference order is not configurable.
|
||||||
|
for _, preferredAlg := range peerAlgs {
|
||||||
|
if isSupportedSignatureAlgorithm(preferredAlg, supportedAlgs) {
|
||||||
|
return preferredAlg, nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return 0, errors.New("tls: peer doesn't support any of the certificate's signature algorithms")
|
||||||
|
}
|
||||||
|
|
||||||
|
// unsupportedCertificateError returns a helpful error for certificates with
|
||||||
|
// an unsupported private key.
|
||||||
|
func unsupportedCertificateError(cert *Certificate) error {
|
||||||
|
switch cert.PrivateKey.(type) {
|
||||||
|
case rsa.PrivateKey, ecdsa.PrivateKey:
|
||||||
|
return fmt.Errorf("tls: unsupported certificate: private key is %T, expected *%T",
|
||||||
|
cert.PrivateKey, cert.PrivateKey)
|
||||||
|
case *ed25519.PrivateKey:
|
||||||
|
return fmt.Errorf("tls: unsupported certificate: private key is *ed25519.PrivateKey, expected ed25519.PrivateKey")
|
||||||
|
}
|
||||||
|
|
||||||
|
signer, ok := cert.PrivateKey.(crypto.Signer)
|
||||||
|
if !ok {
|
||||||
|
return fmt.Errorf("tls: certificate private key (%T) does not implement crypto.Signer",
|
||||||
|
cert.PrivateKey)
|
||||||
|
}
|
||||||
|
|
||||||
|
switch pub := signer.Public().(type) {
|
||||||
|
case *ecdsa.PublicKey:
|
||||||
|
switch pub.Curve {
|
||||||
|
case elliptic.P256():
|
||||||
|
case elliptic.P384():
|
||||||
|
case elliptic.P521():
|
||||||
|
default:
|
||||||
|
return fmt.Errorf("tls: unsupported certificate curve (%s)", pub.Curve.Params().Name)
|
||||||
|
}
|
||||||
|
case *rsa.PublicKey:
|
||||||
|
return fmt.Errorf("tls: certificate RSA key size too small for supported signature algorithms")
|
||||||
|
case ed25519.PublicKey:
|
||||||
|
default:
|
||||||
|
return fmt.Errorf("tls: unsupported certificate key (%T)", pub)
|
||||||
|
}
|
||||||
|
|
||||||
|
if cert.SupportedSignatureAlgorithms != nil {
|
||||||
|
return fmt.Errorf("tls: peer doesn't support the certificate custom signature algorithms")
|
||||||
|
}
|
||||||
|
|
||||||
|
return fmt.Errorf("tls: internal error: unsupported key (%T)", cert.PrivateKey)
|
||||||
|
}
|
|
@ -0,0 +1,705 @@
|
||||||
|
// Copyright 2010 The Go Authors. All rights reserved.
|
||||||
|
// Use of this source code is governed by a BSD-style
|
||||||
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
|
package qtls
|
||||||
|
|
||||||
|
import (
|
||||||
|
"crypto"
|
||||||
|
"crypto/aes"
|
||||||
|
"crypto/cipher"
|
||||||
|
"crypto/des"
|
||||||
|
"crypto/hmac"
|
||||||
|
"crypto/rc4"
|
||||||
|
"crypto/sha1"
|
||||||
|
"crypto/sha256"
|
||||||
|
"fmt"
|
||||||
|
"hash"
|
||||||
|
"runtime"
|
||||||
|
|
||||||
|
"golang.org/x/crypto/chacha20poly1305"
|
||||||
|
"golang.org/x/sys/cpu"
|
||||||
|
)
|
||||||
|
|
||||||
|
// CipherSuite is a TLS cipher suite. Note that most functions in this package
|
||||||
|
// accept and expose cipher suite IDs instead of this type.
|
||||||
|
type CipherSuite struct {
|
||||||
|
ID uint16
|
||||||
|
Name string
|
||||||
|
|
||||||
|
// Supported versions is the list of TLS protocol versions that can
|
||||||
|
// negotiate this cipher suite.
|
||||||
|
SupportedVersions []uint16
|
||||||
|
|
||||||
|
// Insecure is true if the cipher suite has known security issues
|
||||||
|
// due to its primitives, design, or implementation.
|
||||||
|
Insecure bool
|
||||||
|
}
|
||||||
|
|
||||||
|
var (
|
||||||
|
supportedUpToTLS12 = []uint16{VersionTLS10, VersionTLS11, VersionTLS12}
|
||||||
|
supportedOnlyTLS12 = []uint16{VersionTLS12}
|
||||||
|
supportedOnlyTLS13 = []uint16{VersionTLS13}
|
||||||
|
)
|
||||||
|
|
||||||
|
// CipherSuites returns a list of cipher suites currently implemented by this
|
||||||
|
// package, excluding those with security issues, which are returned by
|
||||||
|
// InsecureCipherSuites.
|
||||||
|
//
|
||||||
|
// The list is sorted by ID. Note that the default cipher suites selected by
|
||||||
|
// this package might depend on logic that can't be captured by a static list,
|
||||||
|
// and might not match those returned by this function.
|
||||||
|
func CipherSuites() []*CipherSuite {
|
||||||
|
return []*CipherSuite{
|
||||||
|
{TLS_RSA_WITH_AES_128_CBC_SHA, "TLS_RSA_WITH_AES_128_CBC_SHA", supportedUpToTLS12, false},
|
||||||
|
{TLS_RSA_WITH_AES_256_CBC_SHA, "TLS_RSA_WITH_AES_256_CBC_SHA", supportedUpToTLS12, false},
|
||||||
|
{TLS_RSA_WITH_AES_128_GCM_SHA256, "TLS_RSA_WITH_AES_128_GCM_SHA256", supportedOnlyTLS12, false},
|
||||||
|
{TLS_RSA_WITH_AES_256_GCM_SHA384, "TLS_RSA_WITH_AES_256_GCM_SHA384", supportedOnlyTLS12, false},
|
||||||
|
|
||||||
|
{TLS_AES_128_GCM_SHA256, "TLS_AES_128_GCM_SHA256", supportedOnlyTLS13, false},
|
||||||
|
{TLS_AES_256_GCM_SHA384, "TLS_AES_256_GCM_SHA384", supportedOnlyTLS13, false},
|
||||||
|
{TLS_CHACHA20_POLY1305_SHA256, "TLS_CHACHA20_POLY1305_SHA256", supportedOnlyTLS13, false},
|
||||||
|
|
||||||
|
{TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA", supportedUpToTLS12, false},
|
||||||
|
{TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA", supportedUpToTLS12, false},
|
||||||
|
{TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA", supportedUpToTLS12, false},
|
||||||
|
{TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA", supportedUpToTLS12, false},
|
||||||
|
{TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256", supportedOnlyTLS12, false},
|
||||||
|
{TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384", supportedOnlyTLS12, false},
|
||||||
|
{TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256", supportedOnlyTLS12, false},
|
||||||
|
{TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384", supportedOnlyTLS12, false},
|
||||||
|
{TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256, "TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256", supportedOnlyTLS12, false},
|
||||||
|
{TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256, "TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256", supportedOnlyTLS12, false},
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// InsecureCipherSuites returns a list of cipher suites currently implemented by
|
||||||
|
// this package and which have security issues.
|
||||||
|
//
|
||||||
|
// Most applications should not use the cipher suites in this list, and should
|
||||||
|
// only use those returned by CipherSuites.
|
||||||
|
func InsecureCipherSuites() []*CipherSuite {
|
||||||
|
// This list includes RC4, CBC_SHA256, and 3DES cipher suites. See
|
||||||
|
// cipherSuitesPreferenceOrder for details.
|
||||||
|
return []*CipherSuite{
|
||||||
|
{TLS_RSA_WITH_RC4_128_SHA, "TLS_RSA_WITH_RC4_128_SHA", supportedUpToTLS12, true},
|
||||||
|
{TLS_RSA_WITH_3DES_EDE_CBC_SHA, "TLS_RSA_WITH_3DES_EDE_CBC_SHA", supportedUpToTLS12, true},
|
||||||
|
{TLS_RSA_WITH_AES_128_CBC_SHA256, "TLS_RSA_WITH_AES_128_CBC_SHA256", supportedOnlyTLS12, true},
|
||||||
|
{TLS_ECDHE_ECDSA_WITH_RC4_128_SHA, "TLS_ECDHE_ECDSA_WITH_RC4_128_SHA", supportedUpToTLS12, true},
|
||||||
|
{TLS_ECDHE_RSA_WITH_RC4_128_SHA, "TLS_ECDHE_RSA_WITH_RC4_128_SHA", supportedUpToTLS12, true},
|
||||||
|
{TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, "TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA", supportedUpToTLS12, true},
|
||||||
|
{TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256", supportedOnlyTLS12, true},
|
||||||
|
{TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256", supportedOnlyTLS12, true},
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// CipherSuiteName returns the standard name for the passed cipher suite ID
|
||||||
|
// (e.g. "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256"), or a fallback representation
|
||||||
|
// of the ID value if the cipher suite is not implemented by this package.
|
||||||
|
func CipherSuiteName(id uint16) string {
|
||||||
|
for _, c := range CipherSuites() {
|
||||||
|
if c.ID == id {
|
||||||
|
return c.Name
|
||||||
|
}
|
||||||
|
}
|
||||||
|
for _, c := range InsecureCipherSuites() {
|
||||||
|
if c.ID == id {
|
||||||
|
return c.Name
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return fmt.Sprintf("0x%04X", id)
|
||||||
|
}
|
||||||
|
|
||||||
|
const (
|
||||||
|
// suiteECDHE indicates that the cipher suite involves elliptic curve
|
||||||
|
// Diffie-Hellman. This means that it should only be selected when the
|
||||||
|
// client indicates that it supports ECC with a curve and point format
|
||||||
|
// that we're happy with.
|
||||||
|
suiteECDHE = 1 << iota
|
||||||
|
// suiteECSign indicates that the cipher suite involves an ECDSA or
|
||||||
|
// EdDSA signature and therefore may only be selected when the server's
|
||||||
|
// certificate is ECDSA or EdDSA. If this is not set then the cipher suite
|
||||||
|
// is RSA based.
|
||||||
|
suiteECSign
|
||||||
|
// suiteTLS12 indicates that the cipher suite should only be advertised
|
||||||
|
// and accepted when using TLS 1.2.
|
||||||
|
suiteTLS12
|
||||||
|
// suiteSHA384 indicates that the cipher suite uses SHA384 as the
|
||||||
|
// handshake hash.
|
||||||
|
suiteSHA384
|
||||||
|
)
|
||||||
|
|
||||||
|
// A cipherSuite is a TLS 1.0–1.2 cipher suite, and defines the key exchange
|
||||||
|
// mechanism, as well as the cipher+MAC pair or the AEAD.
|
||||||
|
type cipherSuite struct {
|
||||||
|
id uint16
|
||||||
|
// the lengths, in bytes, of the key material needed for each component.
|
||||||
|
keyLen int
|
||||||
|
macLen int
|
||||||
|
ivLen int
|
||||||
|
ka func(version uint16) keyAgreement
|
||||||
|
// flags is a bitmask of the suite* values, above.
|
||||||
|
flags int
|
||||||
|
cipher func(key, iv []byte, isRead bool) any
|
||||||
|
mac func(key []byte) hash.Hash
|
||||||
|
aead func(key, fixedNonce []byte) aead
|
||||||
|
}
|
||||||
|
|
||||||
|
var cipherSuites = []*cipherSuite{ // TODO: replace with a map, since the order doesn't matter.
|
||||||
|
{TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305, 32, 0, 12, ecdheRSAKA, suiteECDHE | suiteTLS12, nil, nil, aeadChaCha20Poly1305},
|
||||||
|
{TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305, 32, 0, 12, ecdheECDSAKA, suiteECDHE | suiteECSign | suiteTLS12, nil, nil, aeadChaCha20Poly1305},
|
||||||
|
{TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, 16, 0, 4, ecdheRSAKA, suiteECDHE | suiteTLS12, nil, nil, aeadAESGCM},
|
||||||
|
{TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, 16, 0, 4, ecdheECDSAKA, suiteECDHE | suiteECSign | suiteTLS12, nil, nil, aeadAESGCM},
|
||||||
|
{TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, 32, 0, 4, ecdheRSAKA, suiteECDHE | suiteTLS12 | suiteSHA384, nil, nil, aeadAESGCM},
|
||||||
|
{TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, 32, 0, 4, ecdheECDSAKA, suiteECDHE | suiteECSign | suiteTLS12 | suiteSHA384, nil, nil, aeadAESGCM},
|
||||||
|
{TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, 16, 32, 16, ecdheRSAKA, suiteECDHE | suiteTLS12, cipherAES, macSHA256, nil},
|
||||||
|
{TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, 16, 20, 16, ecdheRSAKA, suiteECDHE, cipherAES, macSHA1, nil},
|
||||||
|
{TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, 16, 32, 16, ecdheECDSAKA, suiteECDHE | suiteECSign | suiteTLS12, cipherAES, macSHA256, nil},
|
||||||
|
{TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, 16, 20, 16, ecdheECDSAKA, suiteECDHE | suiteECSign, cipherAES, macSHA1, nil},
|
||||||
|
{TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, 32, 20, 16, ecdheRSAKA, suiteECDHE, cipherAES, macSHA1, nil},
|
||||||
|
{TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, 32, 20, 16, ecdheECDSAKA, suiteECDHE | suiteECSign, cipherAES, macSHA1, nil},
|
||||||
|
{TLS_RSA_WITH_AES_128_GCM_SHA256, 16, 0, 4, rsaKA, suiteTLS12, nil, nil, aeadAESGCM},
|
||||||
|
{TLS_RSA_WITH_AES_256_GCM_SHA384, 32, 0, 4, rsaKA, suiteTLS12 | suiteSHA384, nil, nil, aeadAESGCM},
|
||||||
|
{TLS_RSA_WITH_AES_128_CBC_SHA256, 16, 32, 16, rsaKA, suiteTLS12, cipherAES, macSHA256, nil},
|
||||||
|
{TLS_RSA_WITH_AES_128_CBC_SHA, 16, 20, 16, rsaKA, 0, cipherAES, macSHA1, nil},
|
||||||
|
{TLS_RSA_WITH_AES_256_CBC_SHA, 32, 20, 16, rsaKA, 0, cipherAES, macSHA1, nil},
|
||||||
|
{TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, 24, 20, 8, ecdheRSAKA, suiteECDHE, cipher3DES, macSHA1, nil},
|
||||||
|
{TLS_RSA_WITH_3DES_EDE_CBC_SHA, 24, 20, 8, rsaKA, 0, cipher3DES, macSHA1, nil},
|
||||||
|
{TLS_RSA_WITH_RC4_128_SHA, 16, 20, 0, rsaKA, 0, cipherRC4, macSHA1, nil},
|
||||||
|
{TLS_ECDHE_RSA_WITH_RC4_128_SHA, 16, 20, 0, ecdheRSAKA, suiteECDHE, cipherRC4, macSHA1, nil},
|
||||||
|
{TLS_ECDHE_ECDSA_WITH_RC4_128_SHA, 16, 20, 0, ecdheECDSAKA, suiteECDHE | suiteECSign, cipherRC4, macSHA1, nil},
|
||||||
|
}
|
||||||
|
|
||||||
|
// selectCipherSuite returns the first TLS 1.0–1.2 cipher suite from ids which
|
||||||
|
// is also in supportedIDs and passes the ok filter.
|
||||||
|
func selectCipherSuite(ids, supportedIDs []uint16, ok func(*cipherSuite) bool) *cipherSuite {
|
||||||
|
for _, id := range ids {
|
||||||
|
candidate := cipherSuiteByID(id)
|
||||||
|
if candidate == nil || !ok(candidate) {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, suppID := range supportedIDs {
|
||||||
|
if id == suppID {
|
||||||
|
return candidate
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// A cipherSuiteTLS13 defines only the pair of the AEAD algorithm and hash
|
||||||
|
// algorithm to be used with HKDF. See RFC 8446, Appendix B.4.
|
||||||
|
type cipherSuiteTLS13 struct {
|
||||||
|
id uint16
|
||||||
|
keyLen int
|
||||||
|
aead func(key, fixedNonce []byte) aead
|
||||||
|
hash crypto.Hash
|
||||||
|
}
|
||||||
|
|
||||||
|
type CipherSuiteTLS13 struct {
|
||||||
|
ID uint16
|
||||||
|
KeyLen int
|
||||||
|
Hash crypto.Hash
|
||||||
|
AEAD func(key, fixedNonce []byte) cipher.AEAD
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *CipherSuiteTLS13) IVLen() int {
|
||||||
|
return aeadNonceLength
|
||||||
|
}
|
||||||
|
|
||||||
|
var cipherSuitesTLS13 = []*cipherSuiteTLS13{ // TODO: replace with a map.
|
||||||
|
{TLS_AES_128_GCM_SHA256, 16, aeadAESGCMTLS13, crypto.SHA256},
|
||||||
|
{TLS_CHACHA20_POLY1305_SHA256, 32, aeadChaCha20Poly1305, crypto.SHA256},
|
||||||
|
{TLS_AES_256_GCM_SHA384, 32, aeadAESGCMTLS13, crypto.SHA384},
|
||||||
|
}
|
||||||
|
|
||||||
|
// cipherSuitesPreferenceOrder is the order in which we'll select (on the
|
||||||
|
// server) or advertise (on the client) TLS 1.0–1.2 cipher suites.
|
||||||
|
//
|
||||||
|
// Cipher suites are filtered but not reordered based on the application and
|
||||||
|
// peer's preferences, meaning we'll never select a suite lower in this list if
|
||||||
|
// any higher one is available. This makes it more defensible to keep weaker
|
||||||
|
// cipher suites enabled, especially on the server side where we get the last
|
||||||
|
// word, since there are no known downgrade attacks on cipher suites selection.
|
||||||
|
//
|
||||||
|
// The list is sorted by applying the following priority rules, stopping at the
|
||||||
|
// first (most important) applicable one:
|
||||||
|
//
|
||||||
|
// - Anything else comes before RC4
|
||||||
|
//
|
||||||
|
// RC4 has practically exploitable biases. See https://www.rc4nomore.com.
|
||||||
|
//
|
||||||
|
// - Anything else comes before CBC_SHA256
|
||||||
|
//
|
||||||
|
// SHA-256 variants of the CBC ciphersuites don't implement any Lucky13
|
||||||
|
// countermeasures. See http://www.isg.rhul.ac.uk/tls/Lucky13.html and
|
||||||
|
// https://www.imperialviolet.org/2013/02/04/luckythirteen.html.
|
||||||
|
//
|
||||||
|
// - Anything else comes before 3DES
|
||||||
|
//
|
||||||
|
// 3DES has 64-bit blocks, which makes it fundamentally susceptible to
|
||||||
|
// birthday attacks. See https://sweet32.info.
|
||||||
|
//
|
||||||
|
// - ECDHE comes before anything else
|
||||||
|
//
|
||||||
|
// Once we got the broken stuff out of the way, the most important
|
||||||
|
// property a cipher suite can have is forward secrecy. We don't
|
||||||
|
// implement FFDHE, so that means ECDHE.
|
||||||
|
//
|
||||||
|
// - AEADs come before CBC ciphers
|
||||||
|
//
|
||||||
|
// Even with Lucky13 countermeasures, MAC-then-Encrypt CBC cipher suites
|
||||||
|
// are fundamentally fragile, and suffered from an endless sequence of
|
||||||
|
// padding oracle attacks. See https://eprint.iacr.org/2015/1129,
|
||||||
|
// https://www.imperialviolet.org/2014/12/08/poodleagain.html, and
|
||||||
|
// https://blog.cloudflare.com/yet-another-padding-oracle-in-openssl-cbc-ciphersuites/.
|
||||||
|
//
|
||||||
|
// - AES comes before ChaCha20
|
||||||
|
//
|
||||||
|
// When AES hardware is available, AES-128-GCM and AES-256-GCM are faster
|
||||||
|
// than ChaCha20Poly1305.
|
||||||
|
//
|
||||||
|
// When AES hardware is not available, AES-128-GCM is one or more of: much
|
||||||
|
// slower, way more complex, and less safe (because not constant time)
|
||||||
|
// than ChaCha20Poly1305.
|
||||||
|
//
|
||||||
|
// We use this list if we think both peers have AES hardware, and
|
||||||
|
// cipherSuitesPreferenceOrderNoAES otherwise.
|
||||||
|
//
|
||||||
|
// - AES-128 comes before AES-256
|
||||||
|
//
|
||||||
|
// The only potential advantages of AES-256 are better multi-target
|
||||||
|
// margins, and hypothetical post-quantum properties. Neither apply to
|
||||||
|
// TLS, and AES-256 is slower due to its four extra rounds (which don't
|
||||||
|
// contribute to the advantages above).
|
||||||
|
//
|
||||||
|
// - ECDSA comes before RSA
|
||||||
|
//
|
||||||
|
// The relative order of ECDSA and RSA cipher suites doesn't matter,
|
||||||
|
// as they depend on the certificate. Pick one to get a stable order.
|
||||||
|
//
|
||||||
|
var cipherSuitesPreferenceOrder = []uint16{
|
||||||
|
// AEADs w/ ECDHE
|
||||||
|
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
|
||||||
|
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
|
||||||
|
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305, TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,
|
||||||
|
|
||||||
|
// CBC w/ ECDHE
|
||||||
|
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,
|
||||||
|
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,
|
||||||
|
|
||||||
|
// AEADs w/o ECDHE
|
||||||
|
TLS_RSA_WITH_AES_128_GCM_SHA256,
|
||||||
|
TLS_RSA_WITH_AES_256_GCM_SHA384,
|
||||||
|
|
||||||
|
// CBC w/o ECDHE
|
||||||
|
TLS_RSA_WITH_AES_128_CBC_SHA,
|
||||||
|
TLS_RSA_WITH_AES_256_CBC_SHA,
|
||||||
|
|
||||||
|
// 3DES
|
||||||
|
TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,
|
||||||
|
TLS_RSA_WITH_3DES_EDE_CBC_SHA,
|
||||||
|
|
||||||
|
// CBC_SHA256
|
||||||
|
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,
|
||||||
|
TLS_RSA_WITH_AES_128_CBC_SHA256,
|
||||||
|
|
||||||
|
// RC4
|
||||||
|
TLS_ECDHE_ECDSA_WITH_RC4_128_SHA, TLS_ECDHE_RSA_WITH_RC4_128_SHA,
|
||||||
|
TLS_RSA_WITH_RC4_128_SHA,
|
||||||
|
}
|
||||||
|
|
||||||
|
var cipherSuitesPreferenceOrderNoAES = []uint16{
|
||||||
|
// ChaCha20Poly1305
|
||||||
|
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305, TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,
|
||||||
|
|
||||||
|
// AES-GCM w/ ECDHE
|
||||||
|
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
|
||||||
|
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
|
||||||
|
|
||||||
|
// The rest of cipherSuitesPreferenceOrder.
|
||||||
|
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,
|
||||||
|
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,
|
||||||
|
TLS_RSA_WITH_AES_128_GCM_SHA256,
|
||||||
|
TLS_RSA_WITH_AES_256_GCM_SHA384,
|
||||||
|
TLS_RSA_WITH_AES_128_CBC_SHA,
|
||||||
|
TLS_RSA_WITH_AES_256_CBC_SHA,
|
||||||
|
TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,
|
||||||
|
TLS_RSA_WITH_3DES_EDE_CBC_SHA,
|
||||||
|
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,
|
||||||
|
TLS_RSA_WITH_AES_128_CBC_SHA256,
|
||||||
|
TLS_ECDHE_ECDSA_WITH_RC4_128_SHA, TLS_ECDHE_RSA_WITH_RC4_128_SHA,
|
||||||
|
TLS_RSA_WITH_RC4_128_SHA,
|
||||||
|
}
|
||||||
|
|
||||||
|
// disabledCipherSuites are not used unless explicitly listed in
|
||||||
|
// Config.CipherSuites. They MUST be at the end of cipherSuitesPreferenceOrder.
|
||||||
|
var disabledCipherSuites = []uint16{
|
||||||
|
// CBC_SHA256
|
||||||
|
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,
|
||||||
|
TLS_RSA_WITH_AES_128_CBC_SHA256,
|
||||||
|
|
||||||
|
// RC4
|
||||||
|
TLS_ECDHE_ECDSA_WITH_RC4_128_SHA, TLS_ECDHE_RSA_WITH_RC4_128_SHA,
|
||||||
|
TLS_RSA_WITH_RC4_128_SHA,
|
||||||
|
}
|
||||||
|
|
||||||
|
var (
|
||||||
|
defaultCipherSuitesLen = len(cipherSuitesPreferenceOrder) - len(disabledCipherSuites)
|
||||||
|
defaultCipherSuites = cipherSuitesPreferenceOrder[:defaultCipherSuitesLen]
|
||||||
|
)
|
||||||
|
|
||||||
|
// defaultCipherSuitesTLS13 is also the preference order, since there are no
|
||||||
|
// disabled by default TLS 1.3 cipher suites. The same AES vs ChaCha20 logic as
|
||||||
|
// cipherSuitesPreferenceOrder applies.
|
||||||
|
var defaultCipherSuitesTLS13 = []uint16{
|
||||||
|
TLS_AES_128_GCM_SHA256,
|
||||||
|
TLS_AES_256_GCM_SHA384,
|
||||||
|
TLS_CHACHA20_POLY1305_SHA256,
|
||||||
|
}
|
||||||
|
|
||||||
|
var defaultCipherSuitesTLS13NoAES = []uint16{
|
||||||
|
TLS_CHACHA20_POLY1305_SHA256,
|
||||||
|
TLS_AES_128_GCM_SHA256,
|
||||||
|
TLS_AES_256_GCM_SHA384,
|
||||||
|
}
|
||||||
|
|
||||||
|
var (
|
||||||
|
hasGCMAsmAMD64 = cpu.X86.HasAES && cpu.X86.HasPCLMULQDQ
|
||||||
|
hasGCMAsmARM64 = cpu.ARM64.HasAES && cpu.ARM64.HasPMULL
|
||||||
|
// Keep in sync with crypto/aes/cipher_s390x.go.
|
||||||
|
hasGCMAsmS390X = cpu.S390X.HasAES && cpu.S390X.HasAESCBC && cpu.S390X.HasAESCTR &&
|
||||||
|
(cpu.S390X.HasGHASH || cpu.S390X.HasAESGCM)
|
||||||
|
|
||||||
|
hasAESGCMHardwareSupport = runtime.GOARCH == "amd64" && hasGCMAsmAMD64 ||
|
||||||
|
runtime.GOARCH == "arm64" && hasGCMAsmARM64 ||
|
||||||
|
runtime.GOARCH == "s390x" && hasGCMAsmS390X
|
||||||
|
)
|
||||||
|
|
||||||
|
var aesgcmCiphers = map[uint16]bool{
|
||||||
|
// TLS 1.2
|
||||||
|
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: true,
|
||||||
|
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: true,
|
||||||
|
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: true,
|
||||||
|
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: true,
|
||||||
|
// TLS 1.3
|
||||||
|
TLS_AES_128_GCM_SHA256: true,
|
||||||
|
TLS_AES_256_GCM_SHA384: true,
|
||||||
|
}
|
||||||
|
|
||||||
|
var nonAESGCMAEADCiphers = map[uint16]bool{
|
||||||
|
// TLS 1.2
|
||||||
|
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305: true,
|
||||||
|
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305: true,
|
||||||
|
// TLS 1.3
|
||||||
|
TLS_CHACHA20_POLY1305_SHA256: true,
|
||||||
|
}
|
||||||
|
|
||||||
|
// aesgcmPreferred returns whether the first known cipher in the preference list
|
||||||
|
// is an AES-GCM cipher, implying the peer has hardware support for it.
|
||||||
|
func aesgcmPreferred(ciphers []uint16) bool {
|
||||||
|
for _, cID := range ciphers {
|
||||||
|
if c := cipherSuiteByID(cID); c != nil {
|
||||||
|
return aesgcmCiphers[cID]
|
||||||
|
}
|
||||||
|
if c := cipherSuiteTLS13ByID(cID); c != nil {
|
||||||
|
return aesgcmCiphers[cID]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
func cipherRC4(key, iv []byte, isRead bool) any {
|
||||||
|
cipher, _ := rc4.NewCipher(key)
|
||||||
|
return cipher
|
||||||
|
}
|
||||||
|
|
||||||
|
func cipher3DES(key, iv []byte, isRead bool) any {
|
||||||
|
block, _ := des.NewTripleDESCipher(key)
|
||||||
|
if isRead {
|
||||||
|
return cipher.NewCBCDecrypter(block, iv)
|
||||||
|
}
|
||||||
|
return cipher.NewCBCEncrypter(block, iv)
|
||||||
|
}
|
||||||
|
|
||||||
|
func cipherAES(key, iv []byte, isRead bool) any {
|
||||||
|
block, _ := aes.NewCipher(key)
|
||||||
|
if isRead {
|
||||||
|
return cipher.NewCBCDecrypter(block, iv)
|
||||||
|
}
|
||||||
|
return cipher.NewCBCEncrypter(block, iv)
|
||||||
|
}
|
||||||
|
|
||||||
|
// macSHA1 returns a SHA-1 based constant time MAC.
|
||||||
|
func macSHA1(key []byte) hash.Hash {
|
||||||
|
return hmac.New(newConstantTimeHash(sha1.New), key)
|
||||||
|
}
|
||||||
|
|
||||||
|
// macSHA256 returns a SHA-256 based MAC. This is only supported in TLS 1.2 and
|
||||||
|
// is currently only used in disabled-by-default cipher suites.
|
||||||
|
func macSHA256(key []byte) hash.Hash {
|
||||||
|
return hmac.New(sha256.New, key)
|
||||||
|
}
|
||||||
|
|
||||||
|
type aead interface {
|
||||||
|
cipher.AEAD
|
||||||
|
|
||||||
|
// explicitNonceLen returns the number of bytes of explicit nonce
|
||||||
|
// included in each record. This is eight for older AEADs and
|
||||||
|
// zero for modern ones.
|
||||||
|
explicitNonceLen() int
|
||||||
|
}
|
||||||
|
|
||||||
|
const (
|
||||||
|
aeadNonceLength = 12
|
||||||
|
noncePrefixLength = 4
|
||||||
|
)
|
||||||
|
|
||||||
|
// prefixNonceAEAD wraps an AEAD and prefixes a fixed portion of the nonce to
|
||||||
|
// each call.
|
||||||
|
type prefixNonceAEAD struct {
|
||||||
|
// nonce contains the fixed part of the nonce in the first four bytes.
|
||||||
|
nonce [aeadNonceLength]byte
|
||||||
|
aead cipher.AEAD
|
||||||
|
}
|
||||||
|
|
||||||
|
func (f *prefixNonceAEAD) NonceSize() int { return aeadNonceLength - noncePrefixLength }
|
||||||
|
func (f *prefixNonceAEAD) Overhead() int { return f.aead.Overhead() }
|
||||||
|
func (f *prefixNonceAEAD) explicitNonceLen() int { return f.NonceSize() }
|
||||||
|
|
||||||
|
func (f *prefixNonceAEAD) Seal(out, nonce, plaintext, additionalData []byte) []byte {
|
||||||
|
copy(f.nonce[4:], nonce)
|
||||||
|
return f.aead.Seal(out, f.nonce[:], plaintext, additionalData)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (f *prefixNonceAEAD) Open(out, nonce, ciphertext, additionalData []byte) ([]byte, error) {
|
||||||
|
copy(f.nonce[4:], nonce)
|
||||||
|
return f.aead.Open(out, f.nonce[:], ciphertext, additionalData)
|
||||||
|
}
|
||||||
|
|
||||||
|
// xoredNonceAEAD wraps an AEAD by XORing in a fixed pattern to the nonce
|
||||||
|
// before each call.
|
||||||
|
type xorNonceAEAD struct {
|
||||||
|
nonceMask [aeadNonceLength]byte
|
||||||
|
aead cipher.AEAD
|
||||||
|
}
|
||||||
|
|
||||||
|
func (f *xorNonceAEAD) NonceSize() int { return 8 } // 64-bit sequence number
|
||||||
|
func (f *xorNonceAEAD) Overhead() int { return f.aead.Overhead() }
|
||||||
|
func (f *xorNonceAEAD) explicitNonceLen() int { return 0 }
|
||||||
|
|
||||||
|
func (f *xorNonceAEAD) Seal(out, nonce, plaintext, additionalData []byte) []byte {
|
||||||
|
for i, b := range nonce {
|
||||||
|
f.nonceMask[4+i] ^= b
|
||||||
|
}
|
||||||
|
result := f.aead.Seal(out, f.nonceMask[:], plaintext, additionalData)
|
||||||
|
for i, b := range nonce {
|
||||||
|
f.nonceMask[4+i] ^= b
|
||||||
|
}
|
||||||
|
|
||||||
|
return result
|
||||||
|
}
|
||||||
|
|
||||||
|
func (f *xorNonceAEAD) Open(out, nonce, ciphertext, additionalData []byte) ([]byte, error) {
|
||||||
|
for i, b := range nonce {
|
||||||
|
f.nonceMask[4+i] ^= b
|
||||||
|
}
|
||||||
|
result, err := f.aead.Open(out, f.nonceMask[:], ciphertext, additionalData)
|
||||||
|
for i, b := range nonce {
|
||||||
|
f.nonceMask[4+i] ^= b
|
||||||
|
}
|
||||||
|
|
||||||
|
return result, err
|
||||||
|
}
|
||||||
|
|
||||||
|
func aeadAESGCM(key, noncePrefix []byte) aead {
|
||||||
|
if len(noncePrefix) != noncePrefixLength {
|
||||||
|
panic("tls: internal error: wrong nonce length")
|
||||||
|
}
|
||||||
|
aes, err := aes.NewCipher(key)
|
||||||
|
if err != nil {
|
||||||
|
panic(err)
|
||||||
|
}
|
||||||
|
aead, err := cipher.NewGCM(aes)
|
||||||
|
if err != nil {
|
||||||
|
panic(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
ret := &prefixNonceAEAD{aead: aead}
|
||||||
|
copy(ret.nonce[:], noncePrefix)
|
||||||
|
return ret
|
||||||
|
}
|
||||||
|
|
||||||
|
// AEADAESGCMTLS13 creates a new AES-GCM AEAD for TLS 1.3
|
||||||
|
func AEADAESGCMTLS13(key, fixedNonce []byte) cipher.AEAD {
|
||||||
|
return aeadAESGCMTLS13(key, fixedNonce)
|
||||||
|
}
|
||||||
|
|
||||||
|
func aeadAESGCMTLS13(key, nonceMask []byte) aead {
|
||||||
|
if len(nonceMask) != aeadNonceLength {
|
||||||
|
panic("tls: internal error: wrong nonce length")
|
||||||
|
}
|
||||||
|
aes, err := aes.NewCipher(key)
|
||||||
|
if err != nil {
|
||||||
|
panic(err)
|
||||||
|
}
|
||||||
|
aead, err := cipher.NewGCM(aes)
|
||||||
|
if err != nil {
|
||||||
|
panic(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
ret := &xorNonceAEAD{aead: aead}
|
||||||
|
copy(ret.nonceMask[:], nonceMask)
|
||||||
|
return ret
|
||||||
|
}
|
||||||
|
|
||||||
|
func aeadChaCha20Poly1305(key, nonceMask []byte) aead {
|
||||||
|
if len(nonceMask) != aeadNonceLength {
|
||||||
|
panic("tls: internal error: wrong nonce length")
|
||||||
|
}
|
||||||
|
aead, err := chacha20poly1305.New(key)
|
||||||
|
if err != nil {
|
||||||
|
panic(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
ret := &xorNonceAEAD{aead: aead}
|
||||||
|
copy(ret.nonceMask[:], nonceMask)
|
||||||
|
return ret
|
||||||
|
}
|
||||||
|
|
||||||
|
type constantTimeHash interface {
|
||||||
|
hash.Hash
|
||||||
|
ConstantTimeSum(b []byte) []byte
|
||||||
|
}
|
||||||
|
|
||||||
|
// cthWrapper wraps any hash.Hash that implements ConstantTimeSum, and replaces
|
||||||
|
// with that all calls to Sum. It's used to obtain a ConstantTimeSum-based HMAC.
|
||||||
|
type cthWrapper struct {
|
||||||
|
h constantTimeHash
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *cthWrapper) Size() int { return c.h.Size() }
|
||||||
|
func (c *cthWrapper) BlockSize() int { return c.h.BlockSize() }
|
||||||
|
func (c *cthWrapper) Reset() { c.h.Reset() }
|
||||||
|
func (c *cthWrapper) Write(p []byte) (int, error) { return c.h.Write(p) }
|
||||||
|
func (c *cthWrapper) Sum(b []byte) []byte { return c.h.ConstantTimeSum(b) }
|
||||||
|
|
||||||
|
func newConstantTimeHash(h func() hash.Hash) func() hash.Hash {
|
||||||
|
return func() hash.Hash {
|
||||||
|
return &cthWrapper{h().(constantTimeHash)}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// tls10MAC implements the TLS 1.0 MAC function. RFC 2246, Section 6.2.3.
|
||||||
|
func tls10MAC(h hash.Hash, out, seq, header, data, extra []byte) []byte {
|
||||||
|
h.Reset()
|
||||||
|
h.Write(seq)
|
||||||
|
h.Write(header)
|
||||||
|
h.Write(data)
|
||||||
|
res := h.Sum(out)
|
||||||
|
if extra != nil {
|
||||||
|
h.Write(extra)
|
||||||
|
}
|
||||||
|
return res
|
||||||
|
}
|
||||||
|
|
||||||
|
func rsaKA(version uint16) keyAgreement {
|
||||||
|
return rsaKeyAgreement{}
|
||||||
|
}
|
||||||
|
|
||||||
|
func ecdheECDSAKA(version uint16) keyAgreement {
|
||||||
|
return &ecdheKeyAgreement{
|
||||||
|
isRSA: false,
|
||||||
|
version: version,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func ecdheRSAKA(version uint16) keyAgreement {
|
||||||
|
return &ecdheKeyAgreement{
|
||||||
|
isRSA: true,
|
||||||
|
version: version,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// mutualCipherSuite returns a cipherSuite given a list of supported
|
||||||
|
// ciphersuites and the id requested by the peer.
|
||||||
|
func mutualCipherSuite(have []uint16, want uint16) *cipherSuite {
|
||||||
|
for _, id := range have {
|
||||||
|
if id == want {
|
||||||
|
return cipherSuiteByID(id)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func cipherSuiteByID(id uint16) *cipherSuite {
|
||||||
|
for _, cipherSuite := range cipherSuites {
|
||||||
|
if cipherSuite.id == id {
|
||||||
|
return cipherSuite
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func mutualCipherSuiteTLS13(have []uint16, want uint16) *cipherSuiteTLS13 {
|
||||||
|
for _, id := range have {
|
||||||
|
if id == want {
|
||||||
|
return cipherSuiteTLS13ByID(id)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func cipherSuiteTLS13ByID(id uint16) *cipherSuiteTLS13 {
|
||||||
|
for _, cipherSuite := range cipherSuitesTLS13 {
|
||||||
|
if cipherSuite.id == id {
|
||||||
|
return cipherSuite
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// A list of cipher suite IDs that are, or have been, implemented by this
|
||||||
|
// package.
|
||||||
|
//
|
||||||
|
// See https://www.iana.org/assignments/tls-parameters/tls-parameters.xml
|
||||||
|
const (
|
||||||
|
// TLS 1.0 - 1.2 cipher suites.
|
||||||
|
TLS_RSA_WITH_RC4_128_SHA uint16 = 0x0005
|
||||||
|
TLS_RSA_WITH_3DES_EDE_CBC_SHA uint16 = 0x000a
|
||||||
|
TLS_RSA_WITH_AES_128_CBC_SHA uint16 = 0x002f
|
||||||
|
TLS_RSA_WITH_AES_256_CBC_SHA uint16 = 0x0035
|
||||||
|
TLS_RSA_WITH_AES_128_CBC_SHA256 uint16 = 0x003c
|
||||||
|
TLS_RSA_WITH_AES_128_GCM_SHA256 uint16 = 0x009c
|
||||||
|
TLS_RSA_WITH_AES_256_GCM_SHA384 uint16 = 0x009d
|
||||||
|
TLS_ECDHE_ECDSA_WITH_RC4_128_SHA uint16 = 0xc007
|
||||||
|
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA uint16 = 0xc009
|
||||||
|
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA uint16 = 0xc00a
|
||||||
|
TLS_ECDHE_RSA_WITH_RC4_128_SHA uint16 = 0xc011
|
||||||
|
TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA uint16 = 0xc012
|
||||||
|
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA uint16 = 0xc013
|
||||||
|
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA uint16 = 0xc014
|
||||||
|
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 uint16 = 0xc023
|
||||||
|
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 uint16 = 0xc027
|
||||||
|
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 uint16 = 0xc02f
|
||||||
|
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 uint16 = 0xc02b
|
||||||
|
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 uint16 = 0xc030
|
||||||
|
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 uint16 = 0xc02c
|
||||||
|
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 uint16 = 0xcca8
|
||||||
|
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 uint16 = 0xcca9
|
||||||
|
|
||||||
|
// TLS 1.3 cipher suites.
|
||||||
|
TLS_AES_128_GCM_SHA256 uint16 = 0x1301
|
||||||
|
TLS_AES_256_GCM_SHA384 uint16 = 0x1302
|
||||||
|
TLS_CHACHA20_POLY1305_SHA256 uint16 = 0x1303
|
||||||
|
|
||||||
|
// TLS_FALLBACK_SCSV isn't a standard cipher suite but an indicator
|
||||||
|
// that the client is doing version fallback. See RFC 7507.
|
||||||
|
TLS_FALLBACK_SCSV uint16 = 0x5600
|
||||||
|
|
||||||
|
// Legacy names for the corresponding cipher suites with the correct _SHA256
|
||||||
|
// suffix, retained for backward compatibility.
|
||||||
|
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305 = TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
|
||||||
|
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305 = TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
|
||||||
|
)
|
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
|
@ -0,0 +1,172 @@
|
||||||
|
// Copyright 2009 The Go Authors. All rights reserved.
|
||||||
|
// Use of this source code is governed by a BSD-style
|
||||||
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
|
//go:build ignore
|
||||||
|
|
||||||
|
// Generate a self-signed X.509 certificate for a TLS server. Outputs to
|
||||||
|
// 'cert.pem' and 'key.pem' and will overwrite existing files.
|
||||||
|
|
||||||
|
package main
|
||||||
|
|
||||||
|
import (
|
||||||
|
"crypto/ecdsa"
|
||||||
|
"crypto/ed25519"
|
||||||
|
"crypto/elliptic"
|
||||||
|
"crypto/rand"
|
||||||
|
"crypto/rsa"
|
||||||
|
"crypto/x509"
|
||||||
|
"crypto/x509/pkix"
|
||||||
|
"encoding/pem"
|
||||||
|
"flag"
|
||||||
|
"log"
|
||||||
|
"math/big"
|
||||||
|
"net"
|
||||||
|
"os"
|
||||||
|
"strings"
|
||||||
|
"time"
|
||||||
|
)
|
||||||
|
|
||||||
|
var (
|
||||||
|
host = flag.String("host", "", "Comma-separated hostnames and IPs to generate a certificate for")
|
||||||
|
validFrom = flag.String("start-date", "", "Creation date formatted as Jan 1 15:04:05 2011")
|
||||||
|
validFor = flag.Duration("duration", 365*24*time.Hour, "Duration that certificate is valid for")
|
||||||
|
isCA = flag.Bool("ca", false, "whether this cert should be its own Certificate Authority")
|
||||||
|
rsaBits = flag.Int("rsa-bits", 2048, "Size of RSA key to generate. Ignored if --ecdsa-curve is set")
|
||||||
|
ecdsaCurve = flag.String("ecdsa-curve", "", "ECDSA curve to use to generate a key. Valid values are P224, P256 (recommended), P384, P521")
|
||||||
|
ed25519Key = flag.Bool("ed25519", false, "Generate an Ed25519 key")
|
||||||
|
)
|
||||||
|
|
||||||
|
func publicKey(priv any) any {
|
||||||
|
switch k := priv.(type) {
|
||||||
|
case *rsa.PrivateKey:
|
||||||
|
return &k.PublicKey
|
||||||
|
case *ecdsa.PrivateKey:
|
||||||
|
return &k.PublicKey
|
||||||
|
case ed25519.PrivateKey:
|
||||||
|
return k.Public().(ed25519.PublicKey)
|
||||||
|
default:
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func main() {
|
||||||
|
flag.Parse()
|
||||||
|
|
||||||
|
if len(*host) == 0 {
|
||||||
|
log.Fatalf("Missing required --host parameter")
|
||||||
|
}
|
||||||
|
|
||||||
|
var priv any
|
||||||
|
var err error
|
||||||
|
switch *ecdsaCurve {
|
||||||
|
case "":
|
||||||
|
if *ed25519Key {
|
||||||
|
_, priv, err = ed25519.GenerateKey(rand.Reader)
|
||||||
|
} else {
|
||||||
|
priv, err = rsa.GenerateKey(rand.Reader, *rsaBits)
|
||||||
|
}
|
||||||
|
case "P224":
|
||||||
|
priv, err = ecdsa.GenerateKey(elliptic.P224(), rand.Reader)
|
||||||
|
case "P256":
|
||||||
|
priv, err = ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
|
||||||
|
case "P384":
|
||||||
|
priv, err = ecdsa.GenerateKey(elliptic.P384(), rand.Reader)
|
||||||
|
case "P521":
|
||||||
|
priv, err = ecdsa.GenerateKey(elliptic.P521(), rand.Reader)
|
||||||
|
default:
|
||||||
|
log.Fatalf("Unrecognized elliptic curve: %q", *ecdsaCurve)
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
log.Fatalf("Failed to generate private key: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// ECDSA, ED25519 and RSA subject keys should have the DigitalSignature
|
||||||
|
// KeyUsage bits set in the x509.Certificate template
|
||||||
|
keyUsage := x509.KeyUsageDigitalSignature
|
||||||
|
// Only RSA subject keys should have the KeyEncipherment KeyUsage bits set. In
|
||||||
|
// the context of TLS this KeyUsage is particular to RSA key exchange and
|
||||||
|
// authentication.
|
||||||
|
if _, isRSA := priv.(*rsa.PrivateKey); isRSA {
|
||||||
|
keyUsage |= x509.KeyUsageKeyEncipherment
|
||||||
|
}
|
||||||
|
|
||||||
|
var notBefore time.Time
|
||||||
|
if len(*validFrom) == 0 {
|
||||||
|
notBefore = time.Now()
|
||||||
|
} else {
|
||||||
|
notBefore, err = time.Parse("Jan 2 15:04:05 2006", *validFrom)
|
||||||
|
if err != nil {
|
||||||
|
log.Fatalf("Failed to parse creation date: %v", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
notAfter := notBefore.Add(*validFor)
|
||||||
|
|
||||||
|
serialNumberLimit := new(big.Int).Lsh(big.NewInt(1), 128)
|
||||||
|
serialNumber, err := rand.Int(rand.Reader, serialNumberLimit)
|
||||||
|
if err != nil {
|
||||||
|
log.Fatalf("Failed to generate serial number: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
template := x509.Certificate{
|
||||||
|
SerialNumber: serialNumber,
|
||||||
|
Subject: pkix.Name{
|
||||||
|
Organization: []string{"Acme Co"},
|
||||||
|
},
|
||||||
|
NotBefore: notBefore,
|
||||||
|
NotAfter: notAfter,
|
||||||
|
|
||||||
|
KeyUsage: keyUsage,
|
||||||
|
ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth},
|
||||||
|
BasicConstraintsValid: true,
|
||||||
|
}
|
||||||
|
|
||||||
|
hosts := strings.Split(*host, ",")
|
||||||
|
for _, h := range hosts {
|
||||||
|
if ip := net.ParseIP(h); ip != nil {
|
||||||
|
template.IPAddresses = append(template.IPAddresses, ip)
|
||||||
|
} else {
|
||||||
|
template.DNSNames = append(template.DNSNames, h)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if *isCA {
|
||||||
|
template.IsCA = true
|
||||||
|
template.KeyUsage |= x509.KeyUsageCertSign
|
||||||
|
}
|
||||||
|
|
||||||
|
derBytes, err := x509.CreateCertificate(rand.Reader, &template, &template, publicKey(priv), priv)
|
||||||
|
if err != nil {
|
||||||
|
log.Fatalf("Failed to create certificate: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
certOut, err := os.Create("cert.pem")
|
||||||
|
if err != nil {
|
||||||
|
log.Fatalf("Failed to open cert.pem for writing: %v", err)
|
||||||
|
}
|
||||||
|
if err := pem.Encode(certOut, &pem.Block{Type: "CERTIFICATE", Bytes: derBytes}); err != nil {
|
||||||
|
log.Fatalf("Failed to write data to cert.pem: %v", err)
|
||||||
|
}
|
||||||
|
if err := certOut.Close(); err != nil {
|
||||||
|
log.Fatalf("Error closing cert.pem: %v", err)
|
||||||
|
}
|
||||||
|
log.Print("wrote cert.pem\n")
|
||||||
|
|
||||||
|
keyOut, err := os.OpenFile("key.pem", os.O_WRONLY|os.O_CREATE|os.O_TRUNC, 0600)
|
||||||
|
if err != nil {
|
||||||
|
log.Fatalf("Failed to open key.pem for writing: %v", err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
privBytes, err := x509.MarshalPKCS8PrivateKey(priv)
|
||||||
|
if err != nil {
|
||||||
|
log.Fatalf("Unable to marshal private key: %v", err)
|
||||||
|
}
|
||||||
|
if err := pem.Encode(keyOut, &pem.Block{Type: "PRIVATE KEY", Bytes: privBytes}); err != nil {
|
||||||
|
log.Fatalf("Failed to write data to key.pem: %v", err)
|
||||||
|
}
|
||||||
|
if err := keyOut.Close(); err != nil {
|
||||||
|
log.Fatalf("Error closing key.pem: %v", err)
|
||||||
|
}
|
||||||
|
log.Print("wrote key.pem\n")
|
||||||
|
}
|
1111
vendor/github.com/marten-seemann/qtls-go1-18/handshake_client.go
generated
vendored
Normal file
1111
vendor/github.com/marten-seemann/qtls-go1-18/handshake_client.go
generated
vendored
Normal file
File diff suppressed because it is too large
Load Diff
732
vendor/github.com/marten-seemann/qtls-go1-18/handshake_client_tls13.go
generated
vendored
Normal file
732
vendor/github.com/marten-seemann/qtls-go1-18/handshake_client_tls13.go
generated
vendored
Normal file
|
@ -0,0 +1,732 @@
|
||||||
|
// Copyright 2018 The Go Authors. All rights reserved.
|
||||||
|
// Use of this source code is governed by a BSD-style
|
||||||
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
|
package qtls
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bytes"
|
||||||
|
"context"
|
||||||
|
"crypto"
|
||||||
|
"crypto/hmac"
|
||||||
|
"crypto/rsa"
|
||||||
|
"encoding/binary"
|
||||||
|
"errors"
|
||||||
|
"hash"
|
||||||
|
"sync/atomic"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"golang.org/x/crypto/cryptobyte"
|
||||||
|
)
|
||||||
|
|
||||||
|
type clientHandshakeStateTLS13 struct {
|
||||||
|
c *Conn
|
||||||
|
ctx context.Context
|
||||||
|
serverHello *serverHelloMsg
|
||||||
|
hello *clientHelloMsg
|
||||||
|
ecdheParams ecdheParameters
|
||||||
|
|
||||||
|
session *clientSessionState
|
||||||
|
earlySecret []byte
|
||||||
|
binderKey []byte
|
||||||
|
|
||||||
|
certReq *certificateRequestMsgTLS13
|
||||||
|
usingPSK bool
|
||||||
|
sentDummyCCS bool
|
||||||
|
suite *cipherSuiteTLS13
|
||||||
|
transcript hash.Hash
|
||||||
|
masterSecret []byte
|
||||||
|
trafficSecret []byte // client_application_traffic_secret_0
|
||||||
|
}
|
||||||
|
|
||||||
|
// handshake requires hs.c, hs.hello, hs.serverHello, hs.ecdheParams, and,
|
||||||
|
// optionally, hs.session, hs.earlySecret and hs.binderKey to be set.
|
||||||
|
func (hs *clientHandshakeStateTLS13) handshake() error {
|
||||||
|
c := hs.c
|
||||||
|
|
||||||
|
// The server must not select TLS 1.3 in a renegotiation. See RFC 8446,
|
||||||
|
// sections 4.1.2 and 4.1.3.
|
||||||
|
if c.handshakes > 0 {
|
||||||
|
c.sendAlert(alertProtocolVersion)
|
||||||
|
return errors.New("tls: server selected TLS 1.3 in a renegotiation")
|
||||||
|
}
|
||||||
|
|
||||||
|
// Consistency check on the presence of a keyShare and its parameters.
|
||||||
|
if hs.ecdheParams == nil || len(hs.hello.keyShares) != 1 {
|
||||||
|
return c.sendAlert(alertInternalError)
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := hs.checkServerHelloOrHRR(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
hs.transcript = hs.suite.hash.New()
|
||||||
|
hs.transcript.Write(hs.hello.marshal())
|
||||||
|
|
||||||
|
if bytes.Equal(hs.serverHello.random, helloRetryRequestRandom) {
|
||||||
|
if err := hs.sendDummyChangeCipherSpec(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := hs.processHelloRetryRequest(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
hs.transcript.Write(hs.serverHello.marshal())
|
||||||
|
|
||||||
|
c.buffering = true
|
||||||
|
if err := hs.processServerHello(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := hs.sendDummyChangeCipherSpec(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := hs.establishHandshakeKeys(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := hs.readServerParameters(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := hs.readServerCertificate(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := hs.readServerFinished(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := hs.sendClientCertificate(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := hs.sendClientFinished(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if _, err := c.flush(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
atomic.StoreUint32(&c.handshakeStatus, 1)
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// checkServerHelloOrHRR does validity checks that apply to both ServerHello and
|
||||||
|
// HelloRetryRequest messages. It sets hs.suite.
|
||||||
|
func (hs *clientHandshakeStateTLS13) checkServerHelloOrHRR() error {
|
||||||
|
c := hs.c
|
||||||
|
|
||||||
|
if hs.serverHello.supportedVersion == 0 {
|
||||||
|
c.sendAlert(alertMissingExtension)
|
||||||
|
return errors.New("tls: server selected TLS 1.3 using the legacy version field")
|
||||||
|
}
|
||||||
|
|
||||||
|
if hs.serverHello.supportedVersion != VersionTLS13 {
|
||||||
|
c.sendAlert(alertIllegalParameter)
|
||||||
|
return errors.New("tls: server selected an invalid version after a HelloRetryRequest")
|
||||||
|
}
|
||||||
|
|
||||||
|
if hs.serverHello.vers != VersionTLS12 {
|
||||||
|
c.sendAlert(alertIllegalParameter)
|
||||||
|
return errors.New("tls: server sent an incorrect legacy version")
|
||||||
|
}
|
||||||
|
|
||||||
|
if hs.serverHello.ocspStapling ||
|
||||||
|
hs.serverHello.ticketSupported ||
|
||||||
|
hs.serverHello.secureRenegotiationSupported ||
|
||||||
|
len(hs.serverHello.secureRenegotiation) != 0 ||
|
||||||
|
len(hs.serverHello.alpnProtocol) != 0 ||
|
||||||
|
len(hs.serverHello.scts) != 0 {
|
||||||
|
c.sendAlert(alertUnsupportedExtension)
|
||||||
|
return errors.New("tls: server sent a ServerHello extension forbidden in TLS 1.3")
|
||||||
|
}
|
||||||
|
|
||||||
|
if !bytes.Equal(hs.hello.sessionId, hs.serverHello.sessionId) {
|
||||||
|
c.sendAlert(alertIllegalParameter)
|
||||||
|
return errors.New("tls: server did not echo the legacy session ID")
|
||||||
|
}
|
||||||
|
|
||||||
|
if hs.serverHello.compressionMethod != compressionNone {
|
||||||
|
c.sendAlert(alertIllegalParameter)
|
||||||
|
return errors.New("tls: server selected unsupported compression format")
|
||||||
|
}
|
||||||
|
|
||||||
|
selectedSuite := mutualCipherSuiteTLS13(hs.hello.cipherSuites, hs.serverHello.cipherSuite)
|
||||||
|
if hs.suite != nil && selectedSuite != hs.suite {
|
||||||
|
c.sendAlert(alertIllegalParameter)
|
||||||
|
return errors.New("tls: server changed cipher suite after a HelloRetryRequest")
|
||||||
|
}
|
||||||
|
if selectedSuite == nil {
|
||||||
|
c.sendAlert(alertIllegalParameter)
|
||||||
|
return errors.New("tls: server chose an unconfigured cipher suite")
|
||||||
|
}
|
||||||
|
hs.suite = selectedSuite
|
||||||
|
c.cipherSuite = hs.suite.id
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// sendDummyChangeCipherSpec sends a ChangeCipherSpec record for compatibility
|
||||||
|
// with middleboxes that didn't implement TLS correctly. See RFC 8446, Appendix D.4.
|
||||||
|
func (hs *clientHandshakeStateTLS13) sendDummyChangeCipherSpec() error {
|
||||||
|
if hs.sentDummyCCS {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
hs.sentDummyCCS = true
|
||||||
|
|
||||||
|
_, err := hs.c.writeRecord(recordTypeChangeCipherSpec, []byte{1})
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// processHelloRetryRequest handles the HRR in hs.serverHello, modifies and
|
||||||
|
// resends hs.hello, and reads the new ServerHello into hs.serverHello.
|
||||||
|
func (hs *clientHandshakeStateTLS13) processHelloRetryRequest() error {
|
||||||
|
c := hs.c
|
||||||
|
|
||||||
|
// The first ClientHello gets double-hashed into the transcript upon a
|
||||||
|
// HelloRetryRequest. (The idea is that the server might offload transcript
|
||||||
|
// storage to the client in the cookie.) See RFC 8446, Section 4.4.1.
|
||||||
|
chHash := hs.transcript.Sum(nil)
|
||||||
|
hs.transcript.Reset()
|
||||||
|
hs.transcript.Write([]byte{typeMessageHash, 0, 0, uint8(len(chHash))})
|
||||||
|
hs.transcript.Write(chHash)
|
||||||
|
hs.transcript.Write(hs.serverHello.marshal())
|
||||||
|
|
||||||
|
// The only HelloRetryRequest extensions we support are key_share and
|
||||||
|
// cookie, and clients must abort the handshake if the HRR would not result
|
||||||
|
// in any change in the ClientHello.
|
||||||
|
if hs.serverHello.selectedGroup == 0 && hs.serverHello.cookie == nil {
|
||||||
|
c.sendAlert(alertIllegalParameter)
|
||||||
|
return errors.New("tls: server sent an unnecessary HelloRetryRequest message")
|
||||||
|
}
|
||||||
|
|
||||||
|
if hs.serverHello.cookie != nil {
|
||||||
|
hs.hello.cookie = hs.serverHello.cookie
|
||||||
|
}
|
||||||
|
|
||||||
|
if hs.serverHello.serverShare.group != 0 {
|
||||||
|
c.sendAlert(alertDecodeError)
|
||||||
|
return errors.New("tls: received malformed key_share extension")
|
||||||
|
}
|
||||||
|
|
||||||
|
// If the server sent a key_share extension selecting a group, ensure it's
|
||||||
|
// a group we advertised but did not send a key share for, and send a key
|
||||||
|
// share for it this time.
|
||||||
|
if curveID := hs.serverHello.selectedGroup; curveID != 0 {
|
||||||
|
curveOK := false
|
||||||
|
for _, id := range hs.hello.supportedCurves {
|
||||||
|
if id == curveID {
|
||||||
|
curveOK = true
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if !curveOK {
|
||||||
|
c.sendAlert(alertIllegalParameter)
|
||||||
|
return errors.New("tls: server selected unsupported group")
|
||||||
|
}
|
||||||
|
if hs.ecdheParams.CurveID() == curveID {
|
||||||
|
c.sendAlert(alertIllegalParameter)
|
||||||
|
return errors.New("tls: server sent an unnecessary HelloRetryRequest key_share")
|
||||||
|
}
|
||||||
|
if _, ok := curveForCurveID(curveID); curveID != X25519 && !ok {
|
||||||
|
c.sendAlert(alertInternalError)
|
||||||
|
return errors.New("tls: CurvePreferences includes unsupported curve")
|
||||||
|
}
|
||||||
|
params, err := generateECDHEParameters(c.config.rand(), curveID)
|
||||||
|
if err != nil {
|
||||||
|
c.sendAlert(alertInternalError)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
hs.ecdheParams = params
|
||||||
|
hs.hello.keyShares = []keyShare{{group: curveID, data: params.PublicKey()}}
|
||||||
|
}
|
||||||
|
|
||||||
|
hs.hello.raw = nil
|
||||||
|
if len(hs.hello.pskIdentities) > 0 {
|
||||||
|
pskSuite := cipherSuiteTLS13ByID(hs.session.cipherSuite)
|
||||||
|
if pskSuite == nil {
|
||||||
|
return c.sendAlert(alertInternalError)
|
||||||
|
}
|
||||||
|
if pskSuite.hash == hs.suite.hash {
|
||||||
|
// Update binders and obfuscated_ticket_age.
|
||||||
|
ticketAge := uint32(c.config.time().Sub(hs.session.receivedAt) / time.Millisecond)
|
||||||
|
hs.hello.pskIdentities[0].obfuscatedTicketAge = ticketAge + hs.session.ageAdd
|
||||||
|
|
||||||
|
transcript := hs.suite.hash.New()
|
||||||
|
transcript.Write([]byte{typeMessageHash, 0, 0, uint8(len(chHash))})
|
||||||
|
transcript.Write(chHash)
|
||||||
|
transcript.Write(hs.serverHello.marshal())
|
||||||
|
transcript.Write(hs.hello.marshalWithoutBinders())
|
||||||
|
pskBinders := [][]byte{hs.suite.finishedHash(hs.binderKey, transcript)}
|
||||||
|
hs.hello.updateBinders(pskBinders)
|
||||||
|
} else {
|
||||||
|
// Server selected a cipher suite incompatible with the PSK.
|
||||||
|
hs.hello.pskIdentities = nil
|
||||||
|
hs.hello.pskBinders = nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if hs.hello.earlyData && c.extraConfig != nil && c.extraConfig.Rejected0RTT != nil {
|
||||||
|
c.extraConfig.Rejected0RTT()
|
||||||
|
}
|
||||||
|
hs.hello.earlyData = false // disable 0-RTT
|
||||||
|
|
||||||
|
hs.transcript.Write(hs.hello.marshal())
|
||||||
|
if _, err := c.writeRecord(recordTypeHandshake, hs.hello.marshal()); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
msg, err := c.readHandshake()
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
serverHello, ok := msg.(*serverHelloMsg)
|
||||||
|
if !ok {
|
||||||
|
c.sendAlert(alertUnexpectedMessage)
|
||||||
|
return unexpectedMessageError(serverHello, msg)
|
||||||
|
}
|
||||||
|
hs.serverHello = serverHello
|
||||||
|
|
||||||
|
if err := hs.checkServerHelloOrHRR(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (hs *clientHandshakeStateTLS13) processServerHello() error {
|
||||||
|
c := hs.c
|
||||||
|
|
||||||
|
if bytes.Equal(hs.serverHello.random, helloRetryRequestRandom) {
|
||||||
|
c.sendAlert(alertUnexpectedMessage)
|
||||||
|
return errors.New("tls: server sent two HelloRetryRequest messages")
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(hs.serverHello.cookie) != 0 {
|
||||||
|
c.sendAlert(alertUnsupportedExtension)
|
||||||
|
return errors.New("tls: server sent a cookie in a normal ServerHello")
|
||||||
|
}
|
||||||
|
|
||||||
|
if hs.serverHello.selectedGroup != 0 {
|
||||||
|
c.sendAlert(alertDecodeError)
|
||||||
|
return errors.New("tls: malformed key_share extension")
|
||||||
|
}
|
||||||
|
|
||||||
|
if hs.serverHello.serverShare.group == 0 {
|
||||||
|
c.sendAlert(alertIllegalParameter)
|
||||||
|
return errors.New("tls: server did not send a key share")
|
||||||
|
}
|
||||||
|
if hs.serverHello.serverShare.group != hs.ecdheParams.CurveID() {
|
||||||
|
c.sendAlert(alertIllegalParameter)
|
||||||
|
return errors.New("tls: server selected unsupported group")
|
||||||
|
}
|
||||||
|
|
||||||
|
if !hs.serverHello.selectedIdentityPresent {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
if int(hs.serverHello.selectedIdentity) >= len(hs.hello.pskIdentities) {
|
||||||
|
c.sendAlert(alertIllegalParameter)
|
||||||
|
return errors.New("tls: server selected an invalid PSK")
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(hs.hello.pskIdentities) != 1 || hs.session == nil {
|
||||||
|
return c.sendAlert(alertInternalError)
|
||||||
|
}
|
||||||
|
pskSuite := cipherSuiteTLS13ByID(hs.session.cipherSuite)
|
||||||
|
if pskSuite == nil {
|
||||||
|
return c.sendAlert(alertInternalError)
|
||||||
|
}
|
||||||
|
if pskSuite.hash != hs.suite.hash {
|
||||||
|
c.sendAlert(alertIllegalParameter)
|
||||||
|
return errors.New("tls: server selected an invalid PSK and cipher suite pair")
|
||||||
|
}
|
||||||
|
|
||||||
|
hs.usingPSK = true
|
||||||
|
c.didResume = true
|
||||||
|
c.peerCertificates = hs.session.serverCertificates
|
||||||
|
c.verifiedChains = hs.session.verifiedChains
|
||||||
|
c.ocspResponse = hs.session.ocspResponse
|
||||||
|
c.scts = hs.session.scts
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (hs *clientHandshakeStateTLS13) establishHandshakeKeys() error {
|
||||||
|
c := hs.c
|
||||||
|
|
||||||
|
sharedKey := hs.ecdheParams.SharedKey(hs.serverHello.serverShare.data)
|
||||||
|
if sharedKey == nil {
|
||||||
|
c.sendAlert(alertIllegalParameter)
|
||||||
|
return errors.New("tls: invalid server key share")
|
||||||
|
}
|
||||||
|
|
||||||
|
earlySecret := hs.earlySecret
|
||||||
|
if !hs.usingPSK {
|
||||||
|
earlySecret = hs.suite.extract(nil, nil)
|
||||||
|
}
|
||||||
|
handshakeSecret := hs.suite.extract(sharedKey,
|
||||||
|
hs.suite.deriveSecret(earlySecret, "derived", nil))
|
||||||
|
|
||||||
|
clientSecret := hs.suite.deriveSecret(handshakeSecret,
|
||||||
|
clientHandshakeTrafficLabel, hs.transcript)
|
||||||
|
c.out.exportKey(EncryptionHandshake, hs.suite, clientSecret)
|
||||||
|
c.out.setTrafficSecret(hs.suite, clientSecret)
|
||||||
|
serverSecret := hs.suite.deriveSecret(handshakeSecret,
|
||||||
|
serverHandshakeTrafficLabel, hs.transcript)
|
||||||
|
c.in.exportKey(EncryptionHandshake, hs.suite, serverSecret)
|
||||||
|
c.in.setTrafficSecret(hs.suite, serverSecret)
|
||||||
|
|
||||||
|
err := c.config.writeKeyLog(keyLogLabelClientHandshake, hs.hello.random, clientSecret)
|
||||||
|
if err != nil {
|
||||||
|
c.sendAlert(alertInternalError)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
err = c.config.writeKeyLog(keyLogLabelServerHandshake, hs.hello.random, serverSecret)
|
||||||
|
if err != nil {
|
||||||
|
c.sendAlert(alertInternalError)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
hs.masterSecret = hs.suite.extract(nil,
|
||||||
|
hs.suite.deriveSecret(handshakeSecret, "derived", nil))
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (hs *clientHandshakeStateTLS13) readServerParameters() error {
|
||||||
|
c := hs.c
|
||||||
|
|
||||||
|
msg, err := c.readHandshake()
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
encryptedExtensions, ok := msg.(*encryptedExtensionsMsg)
|
||||||
|
if !ok {
|
||||||
|
c.sendAlert(alertUnexpectedMessage)
|
||||||
|
return unexpectedMessageError(encryptedExtensions, msg)
|
||||||
|
}
|
||||||
|
// Notify the caller if 0-RTT was rejected.
|
||||||
|
if !encryptedExtensions.earlyData && hs.hello.earlyData && c.extraConfig != nil && c.extraConfig.Rejected0RTT != nil {
|
||||||
|
c.extraConfig.Rejected0RTT()
|
||||||
|
}
|
||||||
|
c.used0RTT = encryptedExtensions.earlyData
|
||||||
|
if hs.c.extraConfig != nil && hs.c.extraConfig.ReceivedExtensions != nil {
|
||||||
|
hs.c.extraConfig.ReceivedExtensions(typeEncryptedExtensions, encryptedExtensions.additionalExtensions)
|
||||||
|
}
|
||||||
|
hs.transcript.Write(encryptedExtensions.marshal())
|
||||||
|
|
||||||
|
if err := checkALPN(hs.hello.alpnProtocols, encryptedExtensions.alpnProtocol); err != nil {
|
||||||
|
c.sendAlert(alertUnsupportedExtension)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
c.clientProtocol = encryptedExtensions.alpnProtocol
|
||||||
|
|
||||||
|
if c.extraConfig != nil && c.extraConfig.EnforceNextProtoSelection {
|
||||||
|
if len(encryptedExtensions.alpnProtocol) == 0 {
|
||||||
|
// the server didn't select an ALPN
|
||||||
|
c.sendAlert(alertNoApplicationProtocol)
|
||||||
|
return errors.New("ALPN negotiation failed. Server didn't offer any protocols")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (hs *clientHandshakeStateTLS13) readServerCertificate() error {
|
||||||
|
c := hs.c
|
||||||
|
|
||||||
|
// Either a PSK or a certificate is always used, but not both.
|
||||||
|
// See RFC 8446, Section 4.1.1.
|
||||||
|
if hs.usingPSK {
|
||||||
|
// Make sure the connection is still being verified whether or not this
|
||||||
|
// is a resumption. Resumptions currently don't reverify certificates so
|
||||||
|
// they don't call verifyServerCertificate. See Issue 31641.
|
||||||
|
if c.config.VerifyConnection != nil {
|
||||||
|
if err := c.config.VerifyConnection(c.connectionStateLocked()); err != nil {
|
||||||
|
c.sendAlert(alertBadCertificate)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
msg, err := c.readHandshake()
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
certReq, ok := msg.(*certificateRequestMsgTLS13)
|
||||||
|
if ok {
|
||||||
|
hs.transcript.Write(certReq.marshal())
|
||||||
|
|
||||||
|
hs.certReq = certReq
|
||||||
|
|
||||||
|
msg, err = c.readHandshake()
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
certMsg, ok := msg.(*certificateMsgTLS13)
|
||||||
|
if !ok {
|
||||||
|
c.sendAlert(alertUnexpectedMessage)
|
||||||
|
return unexpectedMessageError(certMsg, msg)
|
||||||
|
}
|
||||||
|
if len(certMsg.certificate.Certificate) == 0 {
|
||||||
|
c.sendAlert(alertDecodeError)
|
||||||
|
return errors.New("tls: received empty certificates message")
|
||||||
|
}
|
||||||
|
hs.transcript.Write(certMsg.marshal())
|
||||||
|
|
||||||
|
c.scts = certMsg.certificate.SignedCertificateTimestamps
|
||||||
|
c.ocspResponse = certMsg.certificate.OCSPStaple
|
||||||
|
|
||||||
|
if err := c.verifyServerCertificate(certMsg.certificate.Certificate); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
msg, err = c.readHandshake()
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
certVerify, ok := msg.(*certificateVerifyMsg)
|
||||||
|
if !ok {
|
||||||
|
c.sendAlert(alertUnexpectedMessage)
|
||||||
|
return unexpectedMessageError(certVerify, msg)
|
||||||
|
}
|
||||||
|
|
||||||
|
// See RFC 8446, Section 4.4.3.
|
||||||
|
if !isSupportedSignatureAlgorithm(certVerify.signatureAlgorithm, supportedSignatureAlgorithms) {
|
||||||
|
c.sendAlert(alertIllegalParameter)
|
||||||
|
return errors.New("tls: certificate used with invalid signature algorithm")
|
||||||
|
}
|
||||||
|
sigType, sigHash, err := typeAndHashFromSignatureScheme(certVerify.signatureAlgorithm)
|
||||||
|
if err != nil {
|
||||||
|
return c.sendAlert(alertInternalError)
|
||||||
|
}
|
||||||
|
if sigType == signaturePKCS1v15 || sigHash == crypto.SHA1 {
|
||||||
|
c.sendAlert(alertIllegalParameter)
|
||||||
|
return errors.New("tls: certificate used with invalid signature algorithm")
|
||||||
|
}
|
||||||
|
signed := signedMessage(sigHash, serverSignatureContext, hs.transcript)
|
||||||
|
if err := verifyHandshakeSignature(sigType, c.peerCertificates[0].PublicKey,
|
||||||
|
sigHash, signed, certVerify.signature); err != nil {
|
||||||
|
c.sendAlert(alertDecryptError)
|
||||||
|
return errors.New("tls: invalid signature by the server certificate: " + err.Error())
|
||||||
|
}
|
||||||
|
|
||||||
|
hs.transcript.Write(certVerify.marshal())
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (hs *clientHandshakeStateTLS13) readServerFinished() error {
|
||||||
|
c := hs.c
|
||||||
|
|
||||||
|
msg, err := c.readHandshake()
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
finished, ok := msg.(*finishedMsg)
|
||||||
|
if !ok {
|
||||||
|
c.sendAlert(alertUnexpectedMessage)
|
||||||
|
return unexpectedMessageError(finished, msg)
|
||||||
|
}
|
||||||
|
|
||||||
|
expectedMAC := hs.suite.finishedHash(c.in.trafficSecret, hs.transcript)
|
||||||
|
if !hmac.Equal(expectedMAC, finished.verifyData) {
|
||||||
|
c.sendAlert(alertDecryptError)
|
||||||
|
return errors.New("tls: invalid server finished hash")
|
||||||
|
}
|
||||||
|
|
||||||
|
hs.transcript.Write(finished.marshal())
|
||||||
|
|
||||||
|
// Derive secrets that take context through the server Finished.
|
||||||
|
|
||||||
|
hs.trafficSecret = hs.suite.deriveSecret(hs.masterSecret,
|
||||||
|
clientApplicationTrafficLabel, hs.transcript)
|
||||||
|
serverSecret := hs.suite.deriveSecret(hs.masterSecret,
|
||||||
|
serverApplicationTrafficLabel, hs.transcript)
|
||||||
|
c.in.exportKey(EncryptionApplication, hs.suite, serverSecret)
|
||||||
|
c.in.setTrafficSecret(hs.suite, serverSecret)
|
||||||
|
|
||||||
|
err = c.config.writeKeyLog(keyLogLabelClientTraffic, hs.hello.random, hs.trafficSecret)
|
||||||
|
if err != nil {
|
||||||
|
c.sendAlert(alertInternalError)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
err = c.config.writeKeyLog(keyLogLabelServerTraffic, hs.hello.random, serverSecret)
|
||||||
|
if err != nil {
|
||||||
|
c.sendAlert(alertInternalError)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
c.ekm = hs.suite.exportKeyingMaterial(hs.masterSecret, hs.transcript)
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (hs *clientHandshakeStateTLS13) sendClientCertificate() error {
|
||||||
|
c := hs.c
|
||||||
|
|
||||||
|
if hs.certReq == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
cert, err := c.getClientCertificate(toCertificateRequestInfo(&certificateRequestInfo{
|
||||||
|
AcceptableCAs: hs.certReq.certificateAuthorities,
|
||||||
|
SignatureSchemes: hs.certReq.supportedSignatureAlgorithms,
|
||||||
|
Version: c.vers,
|
||||||
|
ctx: hs.ctx,
|
||||||
|
}))
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
certMsg := new(certificateMsgTLS13)
|
||||||
|
|
||||||
|
certMsg.certificate = *cert
|
||||||
|
certMsg.scts = hs.certReq.scts && len(cert.SignedCertificateTimestamps) > 0
|
||||||
|
certMsg.ocspStapling = hs.certReq.ocspStapling && len(cert.OCSPStaple) > 0
|
||||||
|
|
||||||
|
hs.transcript.Write(certMsg.marshal())
|
||||||
|
if _, err := c.writeRecord(recordTypeHandshake, certMsg.marshal()); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// If we sent an empty certificate message, skip the CertificateVerify.
|
||||||
|
if len(cert.Certificate) == 0 {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
certVerifyMsg := new(certificateVerifyMsg)
|
||||||
|
certVerifyMsg.hasSignatureAlgorithm = true
|
||||||
|
|
||||||
|
certVerifyMsg.signatureAlgorithm, err = selectSignatureScheme(c.vers, cert, hs.certReq.supportedSignatureAlgorithms)
|
||||||
|
if err != nil {
|
||||||
|
// getClientCertificate returned a certificate incompatible with the
|
||||||
|
// CertificateRequestInfo supported signature algorithms.
|
||||||
|
c.sendAlert(alertHandshakeFailure)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
sigType, sigHash, err := typeAndHashFromSignatureScheme(certVerifyMsg.signatureAlgorithm)
|
||||||
|
if err != nil {
|
||||||
|
return c.sendAlert(alertInternalError)
|
||||||
|
}
|
||||||
|
|
||||||
|
signed := signedMessage(sigHash, clientSignatureContext, hs.transcript)
|
||||||
|
signOpts := crypto.SignerOpts(sigHash)
|
||||||
|
if sigType == signatureRSAPSS {
|
||||||
|
signOpts = &rsa.PSSOptions{SaltLength: rsa.PSSSaltLengthEqualsHash, Hash: sigHash}
|
||||||
|
}
|
||||||
|
sig, err := cert.PrivateKey.(crypto.Signer).Sign(c.config.rand(), signed, signOpts)
|
||||||
|
if err != nil {
|
||||||
|
c.sendAlert(alertInternalError)
|
||||||
|
return errors.New("tls: failed to sign handshake: " + err.Error())
|
||||||
|
}
|
||||||
|
certVerifyMsg.signature = sig
|
||||||
|
|
||||||
|
hs.transcript.Write(certVerifyMsg.marshal())
|
||||||
|
if _, err := c.writeRecord(recordTypeHandshake, certVerifyMsg.marshal()); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (hs *clientHandshakeStateTLS13) sendClientFinished() error {
|
||||||
|
c := hs.c
|
||||||
|
|
||||||
|
finished := &finishedMsg{
|
||||||
|
verifyData: hs.suite.finishedHash(c.out.trafficSecret, hs.transcript),
|
||||||
|
}
|
||||||
|
|
||||||
|
hs.transcript.Write(finished.marshal())
|
||||||
|
if _, err := c.writeRecord(recordTypeHandshake, finished.marshal()); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
c.out.exportKey(EncryptionApplication, hs.suite, hs.trafficSecret)
|
||||||
|
c.out.setTrafficSecret(hs.suite, hs.trafficSecret)
|
||||||
|
|
||||||
|
if !c.config.SessionTicketsDisabled && c.config.ClientSessionCache != nil {
|
||||||
|
c.resumptionSecret = hs.suite.deriveSecret(hs.masterSecret,
|
||||||
|
resumptionLabel, hs.transcript)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *Conn) handleNewSessionTicket(msg *newSessionTicketMsgTLS13) error {
|
||||||
|
if !c.isClient {
|
||||||
|
c.sendAlert(alertUnexpectedMessage)
|
||||||
|
return errors.New("tls: received new session ticket from a client")
|
||||||
|
}
|
||||||
|
|
||||||
|
if c.config.SessionTicketsDisabled || c.config.ClientSessionCache == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// See RFC 8446, Section 4.6.1.
|
||||||
|
if msg.lifetime == 0 {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
lifetime := time.Duration(msg.lifetime) * time.Second
|
||||||
|
if lifetime > maxSessionTicketLifetime {
|
||||||
|
c.sendAlert(alertIllegalParameter)
|
||||||
|
return errors.New("tls: received a session ticket with invalid lifetime")
|
||||||
|
}
|
||||||
|
|
||||||
|
cipherSuite := cipherSuiteTLS13ByID(c.cipherSuite)
|
||||||
|
if cipherSuite == nil || c.resumptionSecret == nil {
|
||||||
|
return c.sendAlert(alertInternalError)
|
||||||
|
}
|
||||||
|
|
||||||
|
// We need to save the max_early_data_size that the server sent us, in order
|
||||||
|
// to decide if we're going to try 0-RTT with this ticket.
|
||||||
|
// However, at the same time, the qtls.ClientSessionTicket needs to be equal to
|
||||||
|
// the tls.ClientSessionTicket, so we can't just add a new field to the struct.
|
||||||
|
// We therefore abuse the nonce field (which is a byte slice)
|
||||||
|
nonceWithEarlyData := make([]byte, len(msg.nonce)+4)
|
||||||
|
binary.BigEndian.PutUint32(nonceWithEarlyData, msg.maxEarlyData)
|
||||||
|
copy(nonceWithEarlyData[4:], msg.nonce)
|
||||||
|
|
||||||
|
var appData []byte
|
||||||
|
if c.extraConfig != nil && c.extraConfig.GetAppDataForSessionState != nil {
|
||||||
|
appData = c.extraConfig.GetAppDataForSessionState()
|
||||||
|
}
|
||||||
|
var b cryptobyte.Builder
|
||||||
|
b.AddUint16(clientSessionStateVersion) // revision
|
||||||
|
b.AddUint32(msg.maxEarlyData)
|
||||||
|
b.AddUint16LengthPrefixed(func(b *cryptobyte.Builder) {
|
||||||
|
b.AddBytes(appData)
|
||||||
|
})
|
||||||
|
b.AddUint16LengthPrefixed(func(b *cryptobyte.Builder) {
|
||||||
|
b.AddBytes(msg.nonce)
|
||||||
|
})
|
||||||
|
|
||||||
|
// Save the resumption_master_secret and nonce instead of deriving the PSK
|
||||||
|
// to do the least amount of work on NewSessionTicket messages before we
|
||||||
|
// know if the ticket will be used. Forward secrecy of resumed connections
|
||||||
|
// is guaranteed by the requirement for pskModeDHE.
|
||||||
|
session := &clientSessionState{
|
||||||
|
sessionTicket: msg.label,
|
||||||
|
vers: c.vers,
|
||||||
|
cipherSuite: c.cipherSuite,
|
||||||
|
masterSecret: c.resumptionSecret,
|
||||||
|
serverCertificates: c.peerCertificates,
|
||||||
|
verifiedChains: c.verifiedChains,
|
||||||
|
receivedAt: c.config.time(),
|
||||||
|
nonce: b.BytesOrPanic(),
|
||||||
|
useBy: c.config.time().Add(lifetime),
|
||||||
|
ageAdd: msg.ageAdd,
|
||||||
|
ocspResponse: c.ocspResponse,
|
||||||
|
scts: c.scts,
|
||||||
|
}
|
||||||
|
|
||||||
|
cacheKey := clientSessionCacheKey(c.conn.RemoteAddr(), c.config)
|
||||||
|
c.config.ClientSessionCache.Put(cacheKey, toClientSessionState(session))
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
1831
vendor/github.com/marten-seemann/qtls-go1-18/handshake_messages.go
generated
vendored
Normal file
1831
vendor/github.com/marten-seemann/qtls-go1-18/handshake_messages.go
generated
vendored
Normal file
File diff suppressed because it is too large
Load Diff
|
@ -0,0 +1,905 @@
|
||||||
|
// Copyright 2009 The Go Authors. All rights reserved.
|
||||||
|
// Use of this source code is governed by a BSD-style
|
||||||
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
|
package qtls
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"crypto"
|
||||||
|
"crypto/ecdsa"
|
||||||
|
"crypto/ed25519"
|
||||||
|
"crypto/rsa"
|
||||||
|
"crypto/subtle"
|
||||||
|
"crypto/x509"
|
||||||
|
"errors"
|
||||||
|
"fmt"
|
||||||
|
"hash"
|
||||||
|
"io"
|
||||||
|
"sync/atomic"
|
||||||
|
"time"
|
||||||
|
)
|
||||||
|
|
||||||
|
// serverHandshakeState contains details of a server handshake in progress.
|
||||||
|
// It's discarded once the handshake has completed.
|
||||||
|
type serverHandshakeState struct {
|
||||||
|
c *Conn
|
||||||
|
ctx context.Context
|
||||||
|
clientHello *clientHelloMsg
|
||||||
|
hello *serverHelloMsg
|
||||||
|
suite *cipherSuite
|
||||||
|
ecdheOk bool
|
||||||
|
ecSignOk bool
|
||||||
|
rsaDecryptOk bool
|
||||||
|
rsaSignOk bool
|
||||||
|
sessionState *sessionState
|
||||||
|
finishedHash finishedHash
|
||||||
|
masterSecret []byte
|
||||||
|
cert *Certificate
|
||||||
|
}
|
||||||
|
|
||||||
|
// serverHandshake performs a TLS handshake as a server.
|
||||||
|
func (c *Conn) serverHandshake(ctx context.Context) error {
|
||||||
|
c.setAlternativeRecordLayer()
|
||||||
|
|
||||||
|
clientHello, err := c.readClientHello(ctx)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if c.vers == VersionTLS13 {
|
||||||
|
hs := serverHandshakeStateTLS13{
|
||||||
|
c: c,
|
||||||
|
ctx: ctx,
|
||||||
|
clientHello: clientHello,
|
||||||
|
}
|
||||||
|
return hs.handshake()
|
||||||
|
} else if c.extraConfig.usesAlternativeRecordLayer() {
|
||||||
|
// This should already have been caught by the check that the ClientHello doesn't
|
||||||
|
// offer any (supported) versions older than TLS 1.3.
|
||||||
|
// Check again to make sure we can't be tricked into using an older version.
|
||||||
|
c.sendAlert(alertProtocolVersion)
|
||||||
|
return errors.New("tls: negotiated TLS < 1.3 when using QUIC")
|
||||||
|
}
|
||||||
|
|
||||||
|
hs := serverHandshakeState{
|
||||||
|
c: c,
|
||||||
|
ctx: ctx,
|
||||||
|
clientHello: clientHello,
|
||||||
|
}
|
||||||
|
return hs.handshake()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (hs *serverHandshakeState) handshake() error {
|
||||||
|
c := hs.c
|
||||||
|
|
||||||
|
if err := hs.processClientHello(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// For an overview of TLS handshaking, see RFC 5246, Section 7.3.
|
||||||
|
c.buffering = true
|
||||||
|
if hs.checkForResumption() {
|
||||||
|
// The client has included a session ticket and so we do an abbreviated handshake.
|
||||||
|
c.didResume = true
|
||||||
|
if err := hs.doResumeHandshake(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := hs.establishKeys(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := hs.sendSessionTicket(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := hs.sendFinished(c.serverFinished[:]); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if _, err := c.flush(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
c.clientFinishedIsFirst = false
|
||||||
|
if err := hs.readFinished(nil); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
// The client didn't include a session ticket, or it wasn't
|
||||||
|
// valid so we do a full handshake.
|
||||||
|
if err := hs.pickCipherSuite(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := hs.doFullHandshake(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := hs.establishKeys(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := hs.readFinished(c.clientFinished[:]); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
c.clientFinishedIsFirst = true
|
||||||
|
c.buffering = true
|
||||||
|
if err := hs.sendSessionTicket(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := hs.sendFinished(nil); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if _, err := c.flush(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
c.ekm = ekmFromMasterSecret(c.vers, hs.suite, hs.masterSecret, hs.clientHello.random, hs.hello.random)
|
||||||
|
atomic.StoreUint32(&c.handshakeStatus, 1)
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// readClientHello reads a ClientHello message and selects the protocol version.
|
||||||
|
func (c *Conn) readClientHello(ctx context.Context) (*clientHelloMsg, error) {
|
||||||
|
msg, err := c.readHandshake()
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
clientHello, ok := msg.(*clientHelloMsg)
|
||||||
|
if !ok {
|
||||||
|
c.sendAlert(alertUnexpectedMessage)
|
||||||
|
return nil, unexpectedMessageError(clientHello, msg)
|
||||||
|
}
|
||||||
|
|
||||||
|
var configForClient *config
|
||||||
|
originalConfig := c.config
|
||||||
|
if c.config.GetConfigForClient != nil {
|
||||||
|
chi := newClientHelloInfo(ctx, c, clientHello)
|
||||||
|
if cfc, err := c.config.GetConfigForClient(chi); err != nil {
|
||||||
|
c.sendAlert(alertInternalError)
|
||||||
|
return nil, err
|
||||||
|
} else if cfc != nil {
|
||||||
|
configForClient = fromConfig(cfc)
|
||||||
|
c.config = configForClient
|
||||||
|
}
|
||||||
|
}
|
||||||
|
c.ticketKeys = originalConfig.ticketKeys(configForClient)
|
||||||
|
|
||||||
|
clientVersions := clientHello.supportedVersions
|
||||||
|
if len(clientHello.supportedVersions) == 0 {
|
||||||
|
clientVersions = supportedVersionsFromMax(clientHello.vers)
|
||||||
|
}
|
||||||
|
if c.extraConfig.usesAlternativeRecordLayer() {
|
||||||
|
// In QUIC, the client MUST NOT offer any old TLS versions.
|
||||||
|
// Here, we can only check that none of the other supported versions of this library
|
||||||
|
// (TLS 1.0 - TLS 1.2) is offered. We don't check for any SSL versions here.
|
||||||
|
for _, ver := range clientVersions {
|
||||||
|
if ver == VersionTLS13 {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
for _, v := range supportedVersions {
|
||||||
|
if ver == v {
|
||||||
|
c.sendAlert(alertProtocolVersion)
|
||||||
|
return nil, fmt.Errorf("tls: client offered old TLS version %#x", ver)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
// Make the config we're using allows us to use TLS 1.3.
|
||||||
|
if c.config.maxSupportedVersion(roleServer) < VersionTLS13 {
|
||||||
|
c.sendAlert(alertInternalError)
|
||||||
|
return nil, errors.New("tls: MaxVersion prevents QUIC from using TLS 1.3")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
c.vers, ok = c.config.mutualVersion(roleServer, clientVersions)
|
||||||
|
if !ok {
|
||||||
|
c.sendAlert(alertProtocolVersion)
|
||||||
|
return nil, fmt.Errorf("tls: client offered only unsupported versions: %x", clientVersions)
|
||||||
|
}
|
||||||
|
c.haveVers = true
|
||||||
|
c.in.version = c.vers
|
||||||
|
c.out.version = c.vers
|
||||||
|
|
||||||
|
return clientHello, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (hs *serverHandshakeState) processClientHello() error {
|
||||||
|
c := hs.c
|
||||||
|
|
||||||
|
hs.hello = new(serverHelloMsg)
|
||||||
|
hs.hello.vers = c.vers
|
||||||
|
|
||||||
|
foundCompression := false
|
||||||
|
// We only support null compression, so check that the client offered it.
|
||||||
|
for _, compression := range hs.clientHello.compressionMethods {
|
||||||
|
if compression == compressionNone {
|
||||||
|
foundCompression = true
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if !foundCompression {
|
||||||
|
c.sendAlert(alertHandshakeFailure)
|
||||||
|
return errors.New("tls: client does not support uncompressed connections")
|
||||||
|
}
|
||||||
|
|
||||||
|
hs.hello.random = make([]byte, 32)
|
||||||
|
serverRandom := hs.hello.random
|
||||||
|
// Downgrade protection canaries. See RFC 8446, Section 4.1.3.
|
||||||
|
maxVers := c.config.maxSupportedVersion(roleServer)
|
||||||
|
if maxVers >= VersionTLS12 && c.vers < maxVers || testingOnlyForceDowngradeCanary {
|
||||||
|
if c.vers == VersionTLS12 {
|
||||||
|
copy(serverRandom[24:], downgradeCanaryTLS12)
|
||||||
|
} else {
|
||||||
|
copy(serverRandom[24:], downgradeCanaryTLS11)
|
||||||
|
}
|
||||||
|
serverRandom = serverRandom[:24]
|
||||||
|
}
|
||||||
|
_, err := io.ReadFull(c.config.rand(), serverRandom)
|
||||||
|
if err != nil {
|
||||||
|
c.sendAlert(alertInternalError)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(hs.clientHello.secureRenegotiation) != 0 {
|
||||||
|
c.sendAlert(alertHandshakeFailure)
|
||||||
|
return errors.New("tls: initial handshake had non-empty renegotiation extension")
|
||||||
|
}
|
||||||
|
|
||||||
|
hs.hello.secureRenegotiationSupported = hs.clientHello.secureRenegotiationSupported
|
||||||
|
hs.hello.compressionMethod = compressionNone
|
||||||
|
if len(hs.clientHello.serverName) > 0 {
|
||||||
|
c.serverName = hs.clientHello.serverName
|
||||||
|
}
|
||||||
|
|
||||||
|
selectedProto, err := negotiateALPN(c.config.NextProtos, hs.clientHello.alpnProtocols)
|
||||||
|
if err != nil {
|
||||||
|
c.sendAlert(alertNoApplicationProtocol)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
hs.hello.alpnProtocol = selectedProto
|
||||||
|
c.clientProtocol = selectedProto
|
||||||
|
|
||||||
|
hs.cert, err = c.config.getCertificate(newClientHelloInfo(hs.ctx, c, hs.clientHello))
|
||||||
|
if err != nil {
|
||||||
|
if err == errNoCertificates {
|
||||||
|
c.sendAlert(alertUnrecognizedName)
|
||||||
|
} else {
|
||||||
|
c.sendAlert(alertInternalError)
|
||||||
|
}
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if hs.clientHello.scts {
|
||||||
|
hs.hello.scts = hs.cert.SignedCertificateTimestamps
|
||||||
|
}
|
||||||
|
|
||||||
|
hs.ecdheOk = supportsECDHE(c.config, hs.clientHello.supportedCurves, hs.clientHello.supportedPoints)
|
||||||
|
|
||||||
|
if hs.ecdheOk {
|
||||||
|
// Although omitting the ec_point_formats extension is permitted, some
|
||||||
|
// old OpenSSL version will refuse to handshake if not present.
|
||||||
|
//
|
||||||
|
// Per RFC 4492, section 5.1.2, implementations MUST support the
|
||||||
|
// uncompressed point format. See golang.org/issue/31943.
|
||||||
|
hs.hello.supportedPoints = []uint8{pointFormatUncompressed}
|
||||||
|
}
|
||||||
|
|
||||||
|
if priv, ok := hs.cert.PrivateKey.(crypto.Signer); ok {
|
||||||
|
switch priv.Public().(type) {
|
||||||
|
case *ecdsa.PublicKey:
|
||||||
|
hs.ecSignOk = true
|
||||||
|
case ed25519.PublicKey:
|
||||||
|
hs.ecSignOk = true
|
||||||
|
case *rsa.PublicKey:
|
||||||
|
hs.rsaSignOk = true
|
||||||
|
default:
|
||||||
|
c.sendAlert(alertInternalError)
|
||||||
|
return fmt.Errorf("tls: unsupported signing key type (%T)", priv.Public())
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if priv, ok := hs.cert.PrivateKey.(crypto.Decrypter); ok {
|
||||||
|
switch priv.Public().(type) {
|
||||||
|
case *rsa.PublicKey:
|
||||||
|
hs.rsaDecryptOk = true
|
||||||
|
default:
|
||||||
|
c.sendAlert(alertInternalError)
|
||||||
|
return fmt.Errorf("tls: unsupported decryption key type (%T)", priv.Public())
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// negotiateALPN picks a shared ALPN protocol that both sides support in server
|
||||||
|
// preference order. If ALPN is not configured or the peer doesn't support it,
|
||||||
|
// it returns "" and no error.
|
||||||
|
func negotiateALPN(serverProtos, clientProtos []string) (string, error) {
|
||||||
|
if len(serverProtos) == 0 || len(clientProtos) == 0 {
|
||||||
|
return "", nil
|
||||||
|
}
|
||||||
|
var http11fallback bool
|
||||||
|
for _, s := range serverProtos {
|
||||||
|
for _, c := range clientProtos {
|
||||||
|
if s == c {
|
||||||
|
return s, nil
|
||||||
|
}
|
||||||
|
if s == "h2" && c == "http/1.1" {
|
||||||
|
http11fallback = true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
// As a special case, let http/1.1 clients connect to h2 servers as if they
|
||||||
|
// didn't support ALPN. We used not to enforce protocol overlap, so over
|
||||||
|
// time a number of HTTP servers were configured with only "h2", but
|
||||||
|
// expected to accept connections from "http/1.1" clients. See Issue 46310.
|
||||||
|
if http11fallback {
|
||||||
|
return "", nil
|
||||||
|
}
|
||||||
|
return "", fmt.Errorf("tls: client requested unsupported application protocols (%s)", clientProtos)
|
||||||
|
}
|
||||||
|
|
||||||
|
// supportsECDHE returns whether ECDHE key exchanges can be used with this
|
||||||
|
// pre-TLS 1.3 client.
|
||||||
|
func supportsECDHE(c *config, supportedCurves []CurveID, supportedPoints []uint8) bool {
|
||||||
|
supportsCurve := false
|
||||||
|
for _, curve := range supportedCurves {
|
||||||
|
if c.supportsCurve(curve) {
|
||||||
|
supportsCurve = true
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
supportsPointFormat := false
|
||||||
|
for _, pointFormat := range supportedPoints {
|
||||||
|
if pointFormat == pointFormatUncompressed {
|
||||||
|
supportsPointFormat = true
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return supportsCurve && supportsPointFormat
|
||||||
|
}
|
||||||
|
|
||||||
|
func (hs *serverHandshakeState) pickCipherSuite() error {
|
||||||
|
c := hs.c
|
||||||
|
|
||||||
|
preferenceOrder := cipherSuitesPreferenceOrder
|
||||||
|
if !hasAESGCMHardwareSupport || !aesgcmPreferred(hs.clientHello.cipherSuites) {
|
||||||
|
preferenceOrder = cipherSuitesPreferenceOrderNoAES
|
||||||
|
}
|
||||||
|
|
||||||
|
configCipherSuites := c.config.cipherSuites()
|
||||||
|
preferenceList := make([]uint16, 0, len(configCipherSuites))
|
||||||
|
for _, suiteID := range preferenceOrder {
|
||||||
|
for _, id := range configCipherSuites {
|
||||||
|
if id == suiteID {
|
||||||
|
preferenceList = append(preferenceList, id)
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
hs.suite = selectCipherSuite(preferenceList, hs.clientHello.cipherSuites, hs.cipherSuiteOk)
|
||||||
|
if hs.suite == nil {
|
||||||
|
c.sendAlert(alertHandshakeFailure)
|
||||||
|
return errors.New("tls: no cipher suite supported by both client and server")
|
||||||
|
}
|
||||||
|
c.cipherSuite = hs.suite.id
|
||||||
|
|
||||||
|
for _, id := range hs.clientHello.cipherSuites {
|
||||||
|
if id == TLS_FALLBACK_SCSV {
|
||||||
|
// The client is doing a fallback connection. See RFC 7507.
|
||||||
|
if hs.clientHello.vers < c.config.maxSupportedVersion(roleServer) {
|
||||||
|
c.sendAlert(alertInappropriateFallback)
|
||||||
|
return errors.New("tls: client using inappropriate protocol fallback")
|
||||||
|
}
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (hs *serverHandshakeState) cipherSuiteOk(c *cipherSuite) bool {
|
||||||
|
if c.flags&suiteECDHE != 0 {
|
||||||
|
if !hs.ecdheOk {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
if c.flags&suiteECSign != 0 {
|
||||||
|
if !hs.ecSignOk {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
} else if !hs.rsaSignOk {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
} else if !hs.rsaDecryptOk {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
if hs.c.vers < VersionTLS12 && c.flags&suiteTLS12 != 0 {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
|
||||||
|
// checkForResumption reports whether we should perform resumption on this connection.
|
||||||
|
func (hs *serverHandshakeState) checkForResumption() bool {
|
||||||
|
c := hs.c
|
||||||
|
|
||||||
|
if c.config.SessionTicketsDisabled {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
plaintext, usedOldKey := c.decryptTicket(hs.clientHello.sessionTicket)
|
||||||
|
if plaintext == nil {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
hs.sessionState = &sessionState{usedOldKey: usedOldKey}
|
||||||
|
ok := hs.sessionState.unmarshal(plaintext)
|
||||||
|
if !ok {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
createdAt := time.Unix(int64(hs.sessionState.createdAt), 0)
|
||||||
|
if c.config.time().Sub(createdAt) > maxSessionTicketLifetime {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
// Never resume a session for a different TLS version.
|
||||||
|
if c.vers != hs.sessionState.vers {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
cipherSuiteOk := false
|
||||||
|
// Check that the client is still offering the ciphersuite in the session.
|
||||||
|
for _, id := range hs.clientHello.cipherSuites {
|
||||||
|
if id == hs.sessionState.cipherSuite {
|
||||||
|
cipherSuiteOk = true
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if !cipherSuiteOk {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
// Check that we also support the ciphersuite from the session.
|
||||||
|
hs.suite = selectCipherSuite([]uint16{hs.sessionState.cipherSuite},
|
||||||
|
c.config.cipherSuites(), hs.cipherSuiteOk)
|
||||||
|
if hs.suite == nil {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
sessionHasClientCerts := len(hs.sessionState.certificates) != 0
|
||||||
|
needClientCerts := requiresClientCert(c.config.ClientAuth)
|
||||||
|
if needClientCerts && !sessionHasClientCerts {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
if sessionHasClientCerts && c.config.ClientAuth == NoClientCert {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
|
||||||
|
func (hs *serverHandshakeState) doResumeHandshake() error {
|
||||||
|
c := hs.c
|
||||||
|
|
||||||
|
hs.hello.cipherSuite = hs.suite.id
|
||||||
|
c.cipherSuite = hs.suite.id
|
||||||
|
// We echo the client's session ID in the ServerHello to let it know
|
||||||
|
// that we're doing a resumption.
|
||||||
|
hs.hello.sessionId = hs.clientHello.sessionId
|
||||||
|
hs.hello.ticketSupported = hs.sessionState.usedOldKey
|
||||||
|
hs.finishedHash = newFinishedHash(c.vers, hs.suite)
|
||||||
|
hs.finishedHash.discardHandshakeBuffer()
|
||||||
|
hs.finishedHash.Write(hs.clientHello.marshal())
|
||||||
|
hs.finishedHash.Write(hs.hello.marshal())
|
||||||
|
if _, err := c.writeRecord(recordTypeHandshake, hs.hello.marshal()); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := c.processCertsFromClient(Certificate{
|
||||||
|
Certificate: hs.sessionState.certificates,
|
||||||
|
}); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if c.config.VerifyConnection != nil {
|
||||||
|
if err := c.config.VerifyConnection(c.connectionStateLocked()); err != nil {
|
||||||
|
c.sendAlert(alertBadCertificate)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
hs.masterSecret = hs.sessionState.masterSecret
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (hs *serverHandshakeState) doFullHandshake() error {
|
||||||
|
c := hs.c
|
||||||
|
|
||||||
|
if hs.clientHello.ocspStapling && len(hs.cert.OCSPStaple) > 0 {
|
||||||
|
hs.hello.ocspStapling = true
|
||||||
|
}
|
||||||
|
|
||||||
|
hs.hello.ticketSupported = hs.clientHello.ticketSupported && !c.config.SessionTicketsDisabled
|
||||||
|
hs.hello.cipherSuite = hs.suite.id
|
||||||
|
|
||||||
|
hs.finishedHash = newFinishedHash(hs.c.vers, hs.suite)
|
||||||
|
if c.config.ClientAuth == NoClientCert {
|
||||||
|
// No need to keep a full record of the handshake if client
|
||||||
|
// certificates won't be used.
|
||||||
|
hs.finishedHash.discardHandshakeBuffer()
|
||||||
|
}
|
||||||
|
hs.finishedHash.Write(hs.clientHello.marshal())
|
||||||
|
hs.finishedHash.Write(hs.hello.marshal())
|
||||||
|
if _, err := c.writeRecord(recordTypeHandshake, hs.hello.marshal()); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
certMsg := new(certificateMsg)
|
||||||
|
certMsg.certificates = hs.cert.Certificate
|
||||||
|
hs.finishedHash.Write(certMsg.marshal())
|
||||||
|
if _, err := c.writeRecord(recordTypeHandshake, certMsg.marshal()); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if hs.hello.ocspStapling {
|
||||||
|
certStatus := new(certificateStatusMsg)
|
||||||
|
certStatus.response = hs.cert.OCSPStaple
|
||||||
|
hs.finishedHash.Write(certStatus.marshal())
|
||||||
|
if _, err := c.writeRecord(recordTypeHandshake, certStatus.marshal()); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
keyAgreement := hs.suite.ka(c.vers)
|
||||||
|
skx, err := keyAgreement.generateServerKeyExchange(c.config, hs.cert, hs.clientHello, hs.hello)
|
||||||
|
if err != nil {
|
||||||
|
c.sendAlert(alertHandshakeFailure)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if skx != nil {
|
||||||
|
hs.finishedHash.Write(skx.marshal())
|
||||||
|
if _, err := c.writeRecord(recordTypeHandshake, skx.marshal()); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
var certReq *certificateRequestMsg
|
||||||
|
if c.config.ClientAuth >= RequestClientCert {
|
||||||
|
// Request a client certificate
|
||||||
|
certReq = new(certificateRequestMsg)
|
||||||
|
certReq.certificateTypes = []byte{
|
||||||
|
byte(certTypeRSASign),
|
||||||
|
byte(certTypeECDSASign),
|
||||||
|
}
|
||||||
|
if c.vers >= VersionTLS12 {
|
||||||
|
certReq.hasSignatureAlgorithm = true
|
||||||
|
certReq.supportedSignatureAlgorithms = supportedSignatureAlgorithms
|
||||||
|
}
|
||||||
|
|
||||||
|
// An empty list of certificateAuthorities signals to
|
||||||
|
// the client that it may send any certificate in response
|
||||||
|
// to our request. When we know the CAs we trust, then
|
||||||
|
// we can send them down, so that the client can choose
|
||||||
|
// an appropriate certificate to give to us.
|
||||||
|
if c.config.ClientCAs != nil {
|
||||||
|
certReq.certificateAuthorities = c.config.ClientCAs.Subjects()
|
||||||
|
}
|
||||||
|
hs.finishedHash.Write(certReq.marshal())
|
||||||
|
if _, err := c.writeRecord(recordTypeHandshake, certReq.marshal()); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
helloDone := new(serverHelloDoneMsg)
|
||||||
|
hs.finishedHash.Write(helloDone.marshal())
|
||||||
|
if _, err := c.writeRecord(recordTypeHandshake, helloDone.marshal()); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if _, err := c.flush(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
var pub crypto.PublicKey // public key for client auth, if any
|
||||||
|
|
||||||
|
msg, err := c.readHandshake()
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// If we requested a client certificate, then the client must send a
|
||||||
|
// certificate message, even if it's empty.
|
||||||
|
if c.config.ClientAuth >= RequestClientCert {
|
||||||
|
certMsg, ok := msg.(*certificateMsg)
|
||||||
|
if !ok {
|
||||||
|
c.sendAlert(alertUnexpectedMessage)
|
||||||
|
return unexpectedMessageError(certMsg, msg)
|
||||||
|
}
|
||||||
|
hs.finishedHash.Write(certMsg.marshal())
|
||||||
|
|
||||||
|
if err := c.processCertsFromClient(Certificate{
|
||||||
|
Certificate: certMsg.certificates,
|
||||||
|
}); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if len(certMsg.certificates) != 0 {
|
||||||
|
pub = c.peerCertificates[0].PublicKey
|
||||||
|
}
|
||||||
|
|
||||||
|
msg, err = c.readHandshake()
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if c.config.VerifyConnection != nil {
|
||||||
|
if err := c.config.VerifyConnection(c.connectionStateLocked()); err != nil {
|
||||||
|
c.sendAlert(alertBadCertificate)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Get client key exchange
|
||||||
|
ckx, ok := msg.(*clientKeyExchangeMsg)
|
||||||
|
if !ok {
|
||||||
|
c.sendAlert(alertUnexpectedMessage)
|
||||||
|
return unexpectedMessageError(ckx, msg)
|
||||||
|
}
|
||||||
|
hs.finishedHash.Write(ckx.marshal())
|
||||||
|
|
||||||
|
preMasterSecret, err := keyAgreement.processClientKeyExchange(c.config, hs.cert, ckx, c.vers)
|
||||||
|
if err != nil {
|
||||||
|
c.sendAlert(alertHandshakeFailure)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
hs.masterSecret = masterFromPreMasterSecret(c.vers, hs.suite, preMasterSecret, hs.clientHello.random, hs.hello.random)
|
||||||
|
if err := c.config.writeKeyLog(keyLogLabelTLS12, hs.clientHello.random, hs.masterSecret); err != nil {
|
||||||
|
c.sendAlert(alertInternalError)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// If we received a client cert in response to our certificate request message,
|
||||||
|
// the client will send us a certificateVerifyMsg immediately after the
|
||||||
|
// clientKeyExchangeMsg. This message is a digest of all preceding
|
||||||
|
// handshake-layer messages that is signed using the private key corresponding
|
||||||
|
// to the client's certificate. This allows us to verify that the client is in
|
||||||
|
// possession of the private key of the certificate.
|
||||||
|
if len(c.peerCertificates) > 0 {
|
||||||
|
msg, err = c.readHandshake()
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
certVerify, ok := msg.(*certificateVerifyMsg)
|
||||||
|
if !ok {
|
||||||
|
c.sendAlert(alertUnexpectedMessage)
|
||||||
|
return unexpectedMessageError(certVerify, msg)
|
||||||
|
}
|
||||||
|
|
||||||
|
var sigType uint8
|
||||||
|
var sigHash crypto.Hash
|
||||||
|
if c.vers >= VersionTLS12 {
|
||||||
|
if !isSupportedSignatureAlgorithm(certVerify.signatureAlgorithm, certReq.supportedSignatureAlgorithms) {
|
||||||
|
c.sendAlert(alertIllegalParameter)
|
||||||
|
return errors.New("tls: client certificate used with invalid signature algorithm")
|
||||||
|
}
|
||||||
|
sigType, sigHash, err = typeAndHashFromSignatureScheme(certVerify.signatureAlgorithm)
|
||||||
|
if err != nil {
|
||||||
|
return c.sendAlert(alertInternalError)
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
sigType, sigHash, err = legacyTypeAndHashFromPublicKey(pub)
|
||||||
|
if err != nil {
|
||||||
|
c.sendAlert(alertIllegalParameter)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
signed := hs.finishedHash.hashForClientCertificate(sigType, sigHash, hs.masterSecret)
|
||||||
|
if err := verifyHandshakeSignature(sigType, pub, sigHash, signed, certVerify.signature); err != nil {
|
||||||
|
c.sendAlert(alertDecryptError)
|
||||||
|
return errors.New("tls: invalid signature by the client certificate: " + err.Error())
|
||||||
|
}
|
||||||
|
|
||||||
|
hs.finishedHash.Write(certVerify.marshal())
|
||||||
|
}
|
||||||
|
|
||||||
|
hs.finishedHash.discardHandshakeBuffer()
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (hs *serverHandshakeState) establishKeys() error {
|
||||||
|
c := hs.c
|
||||||
|
|
||||||
|
clientMAC, serverMAC, clientKey, serverKey, clientIV, serverIV :=
|
||||||
|
keysFromMasterSecret(c.vers, hs.suite, hs.masterSecret, hs.clientHello.random, hs.hello.random, hs.suite.macLen, hs.suite.keyLen, hs.suite.ivLen)
|
||||||
|
|
||||||
|
var clientCipher, serverCipher any
|
||||||
|
var clientHash, serverHash hash.Hash
|
||||||
|
|
||||||
|
if hs.suite.aead == nil {
|
||||||
|
clientCipher = hs.suite.cipher(clientKey, clientIV, true /* for reading */)
|
||||||
|
clientHash = hs.suite.mac(clientMAC)
|
||||||
|
serverCipher = hs.suite.cipher(serverKey, serverIV, false /* not for reading */)
|
||||||
|
serverHash = hs.suite.mac(serverMAC)
|
||||||
|
} else {
|
||||||
|
clientCipher = hs.suite.aead(clientKey, clientIV)
|
||||||
|
serverCipher = hs.suite.aead(serverKey, serverIV)
|
||||||
|
}
|
||||||
|
|
||||||
|
c.in.prepareCipherSpec(c.vers, clientCipher, clientHash)
|
||||||
|
c.out.prepareCipherSpec(c.vers, serverCipher, serverHash)
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (hs *serverHandshakeState) readFinished(out []byte) error {
|
||||||
|
c := hs.c
|
||||||
|
|
||||||
|
if err := c.readChangeCipherSpec(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
msg, err := c.readHandshake()
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
clientFinished, ok := msg.(*finishedMsg)
|
||||||
|
if !ok {
|
||||||
|
c.sendAlert(alertUnexpectedMessage)
|
||||||
|
return unexpectedMessageError(clientFinished, msg)
|
||||||
|
}
|
||||||
|
|
||||||
|
verify := hs.finishedHash.clientSum(hs.masterSecret)
|
||||||
|
if len(verify) != len(clientFinished.verifyData) ||
|
||||||
|
subtle.ConstantTimeCompare(verify, clientFinished.verifyData) != 1 {
|
||||||
|
c.sendAlert(alertHandshakeFailure)
|
||||||
|
return errors.New("tls: client's Finished message is incorrect")
|
||||||
|
}
|
||||||
|
|
||||||
|
hs.finishedHash.Write(clientFinished.marshal())
|
||||||
|
copy(out, verify)
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (hs *serverHandshakeState) sendSessionTicket() error {
|
||||||
|
// ticketSupported is set in a resumption handshake if the
|
||||||
|
// ticket from the client was encrypted with an old session
|
||||||
|
// ticket key and thus a refreshed ticket should be sent.
|
||||||
|
if !hs.hello.ticketSupported {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
c := hs.c
|
||||||
|
m := new(newSessionTicketMsg)
|
||||||
|
|
||||||
|
createdAt := uint64(c.config.time().Unix())
|
||||||
|
if hs.sessionState != nil {
|
||||||
|
// If this is re-wrapping an old key, then keep
|
||||||
|
// the original time it was created.
|
||||||
|
createdAt = hs.sessionState.createdAt
|
||||||
|
}
|
||||||
|
|
||||||
|
var certsFromClient [][]byte
|
||||||
|
for _, cert := range c.peerCertificates {
|
||||||
|
certsFromClient = append(certsFromClient, cert.Raw)
|
||||||
|
}
|
||||||
|
state := sessionState{
|
||||||
|
vers: c.vers,
|
||||||
|
cipherSuite: hs.suite.id,
|
||||||
|
createdAt: createdAt,
|
||||||
|
masterSecret: hs.masterSecret,
|
||||||
|
certificates: certsFromClient,
|
||||||
|
}
|
||||||
|
var err error
|
||||||
|
m.ticket, err = c.encryptTicket(state.marshal())
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
hs.finishedHash.Write(m.marshal())
|
||||||
|
if _, err := c.writeRecord(recordTypeHandshake, m.marshal()); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (hs *serverHandshakeState) sendFinished(out []byte) error {
|
||||||
|
c := hs.c
|
||||||
|
|
||||||
|
if _, err := c.writeRecord(recordTypeChangeCipherSpec, []byte{1}); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
finished := new(finishedMsg)
|
||||||
|
finished.verifyData = hs.finishedHash.serverSum(hs.masterSecret)
|
||||||
|
hs.finishedHash.Write(finished.marshal())
|
||||||
|
if _, err := c.writeRecord(recordTypeHandshake, finished.marshal()); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
copy(out, finished.verifyData)
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// processCertsFromClient takes a chain of client certificates either from a
|
||||||
|
// Certificates message or from a sessionState and verifies them. It returns
|
||||||
|
// the public key of the leaf certificate.
|
||||||
|
func (c *Conn) processCertsFromClient(certificate Certificate) error {
|
||||||
|
certificates := certificate.Certificate
|
||||||
|
certs := make([]*x509.Certificate, len(certificates))
|
||||||
|
var err error
|
||||||
|
for i, asn1Data := range certificates {
|
||||||
|
if certs[i], err = x509.ParseCertificate(asn1Data); err != nil {
|
||||||
|
c.sendAlert(alertBadCertificate)
|
||||||
|
return errors.New("tls: failed to parse client certificate: " + err.Error())
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(certs) == 0 && requiresClientCert(c.config.ClientAuth) {
|
||||||
|
c.sendAlert(alertBadCertificate)
|
||||||
|
return errors.New("tls: client didn't provide a certificate")
|
||||||
|
}
|
||||||
|
|
||||||
|
if c.config.ClientAuth >= VerifyClientCertIfGiven && len(certs) > 0 {
|
||||||
|
opts := x509.VerifyOptions{
|
||||||
|
Roots: c.config.ClientCAs,
|
||||||
|
CurrentTime: c.config.time(),
|
||||||
|
Intermediates: x509.NewCertPool(),
|
||||||
|
KeyUsages: []x509.ExtKeyUsage{x509.ExtKeyUsageClientAuth},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, cert := range certs[1:] {
|
||||||
|
opts.Intermediates.AddCert(cert)
|
||||||
|
}
|
||||||
|
|
||||||
|
chains, err := certs[0].Verify(opts)
|
||||||
|
if err != nil {
|
||||||
|
c.sendAlert(alertBadCertificate)
|
||||||
|
return errors.New("tls: failed to verify client certificate: " + err.Error())
|
||||||
|
}
|
||||||
|
|
||||||
|
c.verifiedChains = chains
|
||||||
|
}
|
||||||
|
|
||||||
|
c.peerCertificates = certs
|
||||||
|
c.ocspResponse = certificate.OCSPStaple
|
||||||
|
c.scts = certificate.SignedCertificateTimestamps
|
||||||
|
|
||||||
|
if len(certs) > 0 {
|
||||||
|
switch certs[0].PublicKey.(type) {
|
||||||
|
case *ecdsa.PublicKey, *rsa.PublicKey, ed25519.PublicKey:
|
||||||
|
default:
|
||||||
|
c.sendAlert(alertUnsupportedCertificate)
|
||||||
|
return fmt.Errorf("tls: client certificate contains an unsupported public key of type %T", certs[0].PublicKey)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if c.config.VerifyPeerCertificate != nil {
|
||||||
|
if err := c.config.VerifyPeerCertificate(certificates, c.verifiedChains); err != nil {
|
||||||
|
c.sendAlert(alertBadCertificate)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func newClientHelloInfo(ctx context.Context, c *Conn, clientHello *clientHelloMsg) *ClientHelloInfo {
|
||||||
|
supportedVersions := clientHello.supportedVersions
|
||||||
|
if len(clientHello.supportedVersions) == 0 {
|
||||||
|
supportedVersions = supportedVersionsFromMax(clientHello.vers)
|
||||||
|
}
|
||||||
|
|
||||||
|
return toClientHelloInfo(&clientHelloInfo{
|
||||||
|
CipherSuites: clientHello.cipherSuites,
|
||||||
|
ServerName: clientHello.serverName,
|
||||||
|
SupportedCurves: clientHello.supportedCurves,
|
||||||
|
SupportedPoints: clientHello.supportedPoints,
|
||||||
|
SignatureSchemes: clientHello.supportedSignatureAlgorithms,
|
||||||
|
SupportedProtos: clientHello.alpnProtocols,
|
||||||
|
SupportedVersions: supportedVersions,
|
||||||
|
Conn: c.conn,
|
||||||
|
config: toConfig(c.config),
|
||||||
|
ctx: ctx,
|
||||||
|
})
|
||||||
|
}
|
895
vendor/github.com/marten-seemann/qtls-go1-18/handshake_server_tls13.go
generated
vendored
Normal file
895
vendor/github.com/marten-seemann/qtls-go1-18/handshake_server_tls13.go
generated
vendored
Normal file
|
@ -0,0 +1,895 @@
|
||||||
|
// Copyright 2018 The Go Authors. All rights reserved.
|
||||||
|
// Use of this source code is governed by a BSD-style
|
||||||
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
|
package qtls
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bytes"
|
||||||
|
"context"
|
||||||
|
"crypto"
|
||||||
|
"crypto/hmac"
|
||||||
|
"crypto/rsa"
|
||||||
|
"errors"
|
||||||
|
"hash"
|
||||||
|
"io"
|
||||||
|
"sync/atomic"
|
||||||
|
"time"
|
||||||
|
)
|
||||||
|
|
||||||
|
// maxClientPSKIdentities is the number of client PSK identities the server will
|
||||||
|
// attempt to validate. It will ignore the rest not to let cheap ClientHello
|
||||||
|
// messages cause too much work in session ticket decryption attempts.
|
||||||
|
const maxClientPSKIdentities = 5
|
||||||
|
|
||||||
|
type serverHandshakeStateTLS13 struct {
|
||||||
|
c *Conn
|
||||||
|
ctx context.Context
|
||||||
|
clientHello *clientHelloMsg
|
||||||
|
hello *serverHelloMsg
|
||||||
|
alpnNegotiationErr error
|
||||||
|
encryptedExtensions *encryptedExtensionsMsg
|
||||||
|
sentDummyCCS bool
|
||||||
|
usingPSK bool
|
||||||
|
suite *cipherSuiteTLS13
|
||||||
|
cert *Certificate
|
||||||
|
sigAlg SignatureScheme
|
||||||
|
earlySecret []byte
|
||||||
|
sharedKey []byte
|
||||||
|
handshakeSecret []byte
|
||||||
|
masterSecret []byte
|
||||||
|
trafficSecret []byte // client_application_traffic_secret_0
|
||||||
|
transcript hash.Hash
|
||||||
|
clientFinished []byte
|
||||||
|
}
|
||||||
|
|
||||||
|
func (hs *serverHandshakeStateTLS13) handshake() error {
|
||||||
|
c := hs.c
|
||||||
|
|
||||||
|
// For an overview of the TLS 1.3 handshake, see RFC 8446, Section 2.
|
||||||
|
if err := hs.processClientHello(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := hs.checkForResumption(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := hs.pickCertificate(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
c.buffering = true
|
||||||
|
if err := hs.sendServerParameters(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := hs.sendServerCertificate(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := hs.sendServerFinished(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
// Note that at this point we could start sending application data without
|
||||||
|
// waiting for the client's second flight, but the application might not
|
||||||
|
// expect the lack of replay protection of the ClientHello parameters.
|
||||||
|
if _, err := c.flush(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := hs.readClientCertificate(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := hs.readClientFinished(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
atomic.StoreUint32(&c.handshakeStatus, 1)
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (hs *serverHandshakeStateTLS13) processClientHello() error {
|
||||||
|
c := hs.c
|
||||||
|
|
||||||
|
hs.hello = new(serverHelloMsg)
|
||||||
|
hs.encryptedExtensions = new(encryptedExtensionsMsg)
|
||||||
|
|
||||||
|
// TLS 1.3 froze the ServerHello.legacy_version field, and uses
|
||||||
|
// supported_versions instead. See RFC 8446, sections 4.1.3 and 4.2.1.
|
||||||
|
hs.hello.vers = VersionTLS12
|
||||||
|
hs.hello.supportedVersion = c.vers
|
||||||
|
|
||||||
|
if len(hs.clientHello.supportedVersions) == 0 {
|
||||||
|
c.sendAlert(alertIllegalParameter)
|
||||||
|
return errors.New("tls: client used the legacy version field to negotiate TLS 1.3")
|
||||||
|
}
|
||||||
|
|
||||||
|
// Abort if the client is doing a fallback and landing lower than what we
|
||||||
|
// support. See RFC 7507, which however does not specify the interaction
|
||||||
|
// with supported_versions. The only difference is that with
|
||||||
|
// supported_versions a client has a chance to attempt a [TLS 1.2, TLS 1.4]
|
||||||
|
// handshake in case TLS 1.3 is broken but 1.2 is not. Alas, in that case,
|
||||||
|
// it will have to drop the TLS_FALLBACK_SCSV protection if it falls back to
|
||||||
|
// TLS 1.2, because a TLS 1.3 server would abort here. The situation before
|
||||||
|
// supported_versions was not better because there was just no way to do a
|
||||||
|
// TLS 1.4 handshake without risking the server selecting TLS 1.3.
|
||||||
|
for _, id := range hs.clientHello.cipherSuites {
|
||||||
|
if id == TLS_FALLBACK_SCSV {
|
||||||
|
// Use c.vers instead of max(supported_versions) because an attacker
|
||||||
|
// could defeat this by adding an arbitrary high version otherwise.
|
||||||
|
if c.vers < c.config.maxSupportedVersion(roleServer) {
|
||||||
|
c.sendAlert(alertInappropriateFallback)
|
||||||
|
return errors.New("tls: client using inappropriate protocol fallback")
|
||||||
|
}
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(hs.clientHello.compressionMethods) != 1 ||
|
||||||
|
hs.clientHello.compressionMethods[0] != compressionNone {
|
||||||
|
c.sendAlert(alertIllegalParameter)
|
||||||
|
return errors.New("tls: TLS 1.3 client supports illegal compression methods")
|
||||||
|
}
|
||||||
|
|
||||||
|
hs.hello.random = make([]byte, 32)
|
||||||
|
if _, err := io.ReadFull(c.config.rand(), hs.hello.random); err != nil {
|
||||||
|
c.sendAlert(alertInternalError)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(hs.clientHello.secureRenegotiation) != 0 {
|
||||||
|
c.sendAlert(alertHandshakeFailure)
|
||||||
|
return errors.New("tls: initial handshake had non-empty renegotiation extension")
|
||||||
|
}
|
||||||
|
|
||||||
|
hs.hello.sessionId = hs.clientHello.sessionId
|
||||||
|
hs.hello.compressionMethod = compressionNone
|
||||||
|
|
||||||
|
if hs.suite == nil {
|
||||||
|
var preferenceList []uint16
|
||||||
|
for _, suiteID := range c.config.CipherSuites {
|
||||||
|
for _, suite := range cipherSuitesTLS13 {
|
||||||
|
if suite.id == suiteID {
|
||||||
|
preferenceList = append(preferenceList, suiteID)
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if len(preferenceList) == 0 {
|
||||||
|
preferenceList = defaultCipherSuitesTLS13
|
||||||
|
if !hasAESGCMHardwareSupport || !aesgcmPreferred(hs.clientHello.cipherSuites) {
|
||||||
|
preferenceList = defaultCipherSuitesTLS13NoAES
|
||||||
|
}
|
||||||
|
}
|
||||||
|
for _, suiteID := range preferenceList {
|
||||||
|
hs.suite = mutualCipherSuiteTLS13(hs.clientHello.cipherSuites, suiteID)
|
||||||
|
if hs.suite != nil {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if hs.suite == nil {
|
||||||
|
c.sendAlert(alertHandshakeFailure)
|
||||||
|
return errors.New("tls: no cipher suite supported by both client and server")
|
||||||
|
}
|
||||||
|
c.cipherSuite = hs.suite.id
|
||||||
|
hs.hello.cipherSuite = hs.suite.id
|
||||||
|
hs.transcript = hs.suite.hash.New()
|
||||||
|
|
||||||
|
// Pick the ECDHE group in server preference order, but give priority to
|
||||||
|
// groups with a key share, to avoid a HelloRetryRequest round-trip.
|
||||||
|
var selectedGroup CurveID
|
||||||
|
var clientKeyShare *keyShare
|
||||||
|
GroupSelection:
|
||||||
|
for _, preferredGroup := range c.config.curvePreferences() {
|
||||||
|
for _, ks := range hs.clientHello.keyShares {
|
||||||
|
if ks.group == preferredGroup {
|
||||||
|
selectedGroup = ks.group
|
||||||
|
clientKeyShare = &ks
|
||||||
|
break GroupSelection
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if selectedGroup != 0 {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
for _, group := range hs.clientHello.supportedCurves {
|
||||||
|
if group == preferredGroup {
|
||||||
|
selectedGroup = group
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if selectedGroup == 0 {
|
||||||
|
c.sendAlert(alertHandshakeFailure)
|
||||||
|
return errors.New("tls: no ECDHE curve supported by both client and server")
|
||||||
|
}
|
||||||
|
if clientKeyShare == nil {
|
||||||
|
if err := hs.doHelloRetryRequest(selectedGroup); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
clientKeyShare = &hs.clientHello.keyShares[0]
|
||||||
|
}
|
||||||
|
|
||||||
|
if _, ok := curveForCurveID(selectedGroup); selectedGroup != X25519 && !ok {
|
||||||
|
c.sendAlert(alertInternalError)
|
||||||
|
return errors.New("tls: CurvePreferences includes unsupported curve")
|
||||||
|
}
|
||||||
|
params, err := generateECDHEParameters(c.config.rand(), selectedGroup)
|
||||||
|
if err != nil {
|
||||||
|
c.sendAlert(alertInternalError)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
hs.hello.serverShare = keyShare{group: selectedGroup, data: params.PublicKey()}
|
||||||
|
hs.sharedKey = params.SharedKey(clientKeyShare.data)
|
||||||
|
if hs.sharedKey == nil {
|
||||||
|
c.sendAlert(alertIllegalParameter)
|
||||||
|
return errors.New("tls: invalid client key share")
|
||||||
|
}
|
||||||
|
|
||||||
|
c.serverName = hs.clientHello.serverName
|
||||||
|
|
||||||
|
if c.extraConfig != nil && c.extraConfig.ReceivedExtensions != nil {
|
||||||
|
c.extraConfig.ReceivedExtensions(typeClientHello, hs.clientHello.additionalExtensions)
|
||||||
|
}
|
||||||
|
|
||||||
|
selectedProto, err := negotiateALPN(c.config.NextProtos, hs.clientHello.alpnProtocols)
|
||||||
|
if err != nil {
|
||||||
|
hs.alpnNegotiationErr = err
|
||||||
|
}
|
||||||
|
hs.encryptedExtensions.alpnProtocol = selectedProto
|
||||||
|
c.clientProtocol = selectedProto
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (hs *serverHandshakeStateTLS13) checkForResumption() error {
|
||||||
|
c := hs.c
|
||||||
|
|
||||||
|
if c.config.SessionTicketsDisabled {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
modeOK := false
|
||||||
|
for _, mode := range hs.clientHello.pskModes {
|
||||||
|
if mode == pskModeDHE {
|
||||||
|
modeOK = true
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if !modeOK {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(hs.clientHello.pskIdentities) != len(hs.clientHello.pskBinders) {
|
||||||
|
c.sendAlert(alertIllegalParameter)
|
||||||
|
return errors.New("tls: invalid or missing PSK binders")
|
||||||
|
}
|
||||||
|
if len(hs.clientHello.pskIdentities) == 0 {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
for i, identity := range hs.clientHello.pskIdentities {
|
||||||
|
if i >= maxClientPSKIdentities {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
|
||||||
|
plaintext, _ := c.decryptTicket(identity.label)
|
||||||
|
if plaintext == nil {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
sessionState := new(sessionStateTLS13)
|
||||||
|
if ok := sessionState.unmarshal(plaintext); !ok {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
if hs.clientHello.earlyData {
|
||||||
|
if sessionState.maxEarlyData == 0 {
|
||||||
|
c.sendAlert(alertUnsupportedExtension)
|
||||||
|
return errors.New("tls: client sent unexpected early data")
|
||||||
|
}
|
||||||
|
|
||||||
|
if hs.alpnNegotiationErr == nil && sessionState.alpn == c.clientProtocol &&
|
||||||
|
c.extraConfig != nil && c.extraConfig.MaxEarlyData > 0 &&
|
||||||
|
c.extraConfig.Accept0RTT != nil && c.extraConfig.Accept0RTT(sessionState.appData) {
|
||||||
|
hs.encryptedExtensions.earlyData = true
|
||||||
|
c.used0RTT = true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
createdAt := time.Unix(int64(sessionState.createdAt), 0)
|
||||||
|
if c.config.time().Sub(createdAt) > maxSessionTicketLifetime {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
// We don't check the obfuscated ticket age because it's affected by
|
||||||
|
// clock skew and it's only a freshness signal useful for shrinking the
|
||||||
|
// window for replay attacks, which don't affect us as we don't do 0-RTT.
|
||||||
|
|
||||||
|
pskSuite := cipherSuiteTLS13ByID(sessionState.cipherSuite)
|
||||||
|
if pskSuite == nil || pskSuite.hash != hs.suite.hash {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
// PSK connections don't re-establish client certificates, but carry
|
||||||
|
// them over in the session ticket. Ensure the presence of client certs
|
||||||
|
// in the ticket is consistent with the configured requirements.
|
||||||
|
sessionHasClientCerts := len(sessionState.certificate.Certificate) != 0
|
||||||
|
needClientCerts := requiresClientCert(c.config.ClientAuth)
|
||||||
|
if needClientCerts && !sessionHasClientCerts {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
if sessionHasClientCerts && c.config.ClientAuth == NoClientCert {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
psk := hs.suite.expandLabel(sessionState.resumptionSecret, "resumption",
|
||||||
|
nil, hs.suite.hash.Size())
|
||||||
|
hs.earlySecret = hs.suite.extract(psk, nil)
|
||||||
|
binderKey := hs.suite.deriveSecret(hs.earlySecret, resumptionBinderLabel, nil)
|
||||||
|
// Clone the transcript in case a HelloRetryRequest was recorded.
|
||||||
|
transcript := cloneHash(hs.transcript, hs.suite.hash)
|
||||||
|
if transcript == nil {
|
||||||
|
c.sendAlert(alertInternalError)
|
||||||
|
return errors.New("tls: internal error: failed to clone hash")
|
||||||
|
}
|
||||||
|
transcript.Write(hs.clientHello.marshalWithoutBinders())
|
||||||
|
pskBinder := hs.suite.finishedHash(binderKey, transcript)
|
||||||
|
if !hmac.Equal(hs.clientHello.pskBinders[i], pskBinder) {
|
||||||
|
c.sendAlert(alertDecryptError)
|
||||||
|
return errors.New("tls: invalid PSK binder")
|
||||||
|
}
|
||||||
|
|
||||||
|
c.didResume = true
|
||||||
|
if err := c.processCertsFromClient(sessionState.certificate); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
h := cloneHash(hs.transcript, hs.suite.hash)
|
||||||
|
h.Write(hs.clientHello.marshal())
|
||||||
|
if hs.encryptedExtensions.earlyData {
|
||||||
|
clientEarlySecret := hs.suite.deriveSecret(hs.earlySecret, "c e traffic", h)
|
||||||
|
c.in.exportKey(Encryption0RTT, hs.suite, clientEarlySecret)
|
||||||
|
if err := c.config.writeKeyLog(keyLogLabelEarlyTraffic, hs.clientHello.random, clientEarlySecret); err != nil {
|
||||||
|
c.sendAlert(alertInternalError)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
hs.hello.selectedIdentityPresent = true
|
||||||
|
hs.hello.selectedIdentity = uint16(i)
|
||||||
|
hs.usingPSK = true
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// cloneHash uses the encoding.BinaryMarshaler and encoding.BinaryUnmarshaler
|
||||||
|
// interfaces implemented by standard library hashes to clone the state of in
|
||||||
|
// to a new instance of h. It returns nil if the operation fails.
|
||||||
|
func cloneHash(in hash.Hash, h crypto.Hash) hash.Hash {
|
||||||
|
// Recreate the interface to avoid importing encoding.
|
||||||
|
type binaryMarshaler interface {
|
||||||
|
MarshalBinary() (data []byte, err error)
|
||||||
|
UnmarshalBinary(data []byte) error
|
||||||
|
}
|
||||||
|
marshaler, ok := in.(binaryMarshaler)
|
||||||
|
if !ok {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
state, err := marshaler.MarshalBinary()
|
||||||
|
if err != nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
out := h.New()
|
||||||
|
unmarshaler, ok := out.(binaryMarshaler)
|
||||||
|
if !ok {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
if err := unmarshaler.UnmarshalBinary(state); err != nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
func (hs *serverHandshakeStateTLS13) pickCertificate() error {
|
||||||
|
c := hs.c
|
||||||
|
|
||||||
|
// Only one of PSK and certificates are used at a time.
|
||||||
|
if hs.usingPSK {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// signature_algorithms is required in TLS 1.3. See RFC 8446, Section 4.2.3.
|
||||||
|
if len(hs.clientHello.supportedSignatureAlgorithms) == 0 {
|
||||||
|
return c.sendAlert(alertMissingExtension)
|
||||||
|
}
|
||||||
|
|
||||||
|
certificate, err := c.config.getCertificate(newClientHelloInfo(hs.ctx, c, hs.clientHello))
|
||||||
|
if err != nil {
|
||||||
|
if err == errNoCertificates {
|
||||||
|
c.sendAlert(alertUnrecognizedName)
|
||||||
|
} else {
|
||||||
|
c.sendAlert(alertInternalError)
|
||||||
|
}
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
hs.sigAlg, err = selectSignatureScheme(c.vers, certificate, hs.clientHello.supportedSignatureAlgorithms)
|
||||||
|
if err != nil {
|
||||||
|
// getCertificate returned a certificate that is unsupported or
|
||||||
|
// incompatible with the client's signature algorithms.
|
||||||
|
c.sendAlert(alertHandshakeFailure)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
hs.cert = certificate
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// sendDummyChangeCipherSpec sends a ChangeCipherSpec record for compatibility
|
||||||
|
// with middleboxes that didn't implement TLS correctly. See RFC 8446, Appendix D.4.
|
||||||
|
func (hs *serverHandshakeStateTLS13) sendDummyChangeCipherSpec() error {
|
||||||
|
if hs.sentDummyCCS {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
hs.sentDummyCCS = true
|
||||||
|
|
||||||
|
_, err := hs.c.writeRecord(recordTypeChangeCipherSpec, []byte{1})
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
func (hs *serverHandshakeStateTLS13) doHelloRetryRequest(selectedGroup CurveID) error {
|
||||||
|
c := hs.c
|
||||||
|
|
||||||
|
// The first ClientHello gets double-hashed into the transcript upon a
|
||||||
|
// HelloRetryRequest. See RFC 8446, Section 4.4.1.
|
||||||
|
hs.transcript.Write(hs.clientHello.marshal())
|
||||||
|
chHash := hs.transcript.Sum(nil)
|
||||||
|
hs.transcript.Reset()
|
||||||
|
hs.transcript.Write([]byte{typeMessageHash, 0, 0, uint8(len(chHash))})
|
||||||
|
hs.transcript.Write(chHash)
|
||||||
|
|
||||||
|
helloRetryRequest := &serverHelloMsg{
|
||||||
|
vers: hs.hello.vers,
|
||||||
|
random: helloRetryRequestRandom,
|
||||||
|
sessionId: hs.hello.sessionId,
|
||||||
|
cipherSuite: hs.hello.cipherSuite,
|
||||||
|
compressionMethod: hs.hello.compressionMethod,
|
||||||
|
supportedVersion: hs.hello.supportedVersion,
|
||||||
|
selectedGroup: selectedGroup,
|
||||||
|
}
|
||||||
|
|
||||||
|
hs.transcript.Write(helloRetryRequest.marshal())
|
||||||
|
if _, err := c.writeRecord(recordTypeHandshake, helloRetryRequest.marshal()); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := hs.sendDummyChangeCipherSpec(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
msg, err := c.readHandshake()
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
clientHello, ok := msg.(*clientHelloMsg)
|
||||||
|
if !ok {
|
||||||
|
c.sendAlert(alertUnexpectedMessage)
|
||||||
|
return unexpectedMessageError(clientHello, msg)
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(clientHello.keyShares) != 1 || clientHello.keyShares[0].group != selectedGroup {
|
||||||
|
c.sendAlert(alertIllegalParameter)
|
||||||
|
return errors.New("tls: client sent invalid key share in second ClientHello")
|
||||||
|
}
|
||||||
|
|
||||||
|
if clientHello.earlyData {
|
||||||
|
c.sendAlert(alertIllegalParameter)
|
||||||
|
return errors.New("tls: client indicated early data in second ClientHello")
|
||||||
|
}
|
||||||
|
|
||||||
|
if illegalClientHelloChange(clientHello, hs.clientHello) {
|
||||||
|
c.sendAlert(alertIllegalParameter)
|
||||||
|
return errors.New("tls: client illegally modified second ClientHello")
|
||||||
|
}
|
||||||
|
|
||||||
|
if clientHello.earlyData {
|
||||||
|
c.sendAlert(alertIllegalParameter)
|
||||||
|
return errors.New("tls: client offered 0-RTT data in second ClientHello")
|
||||||
|
}
|
||||||
|
|
||||||
|
hs.clientHello = clientHello
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// illegalClientHelloChange reports whether the two ClientHello messages are
|
||||||
|
// different, with the exception of the changes allowed before and after a
|
||||||
|
// HelloRetryRequest. See RFC 8446, Section 4.1.2.
|
||||||
|
func illegalClientHelloChange(ch, ch1 *clientHelloMsg) bool {
|
||||||
|
if len(ch.supportedVersions) != len(ch1.supportedVersions) ||
|
||||||
|
len(ch.cipherSuites) != len(ch1.cipherSuites) ||
|
||||||
|
len(ch.supportedCurves) != len(ch1.supportedCurves) ||
|
||||||
|
len(ch.supportedSignatureAlgorithms) != len(ch1.supportedSignatureAlgorithms) ||
|
||||||
|
len(ch.supportedSignatureAlgorithmsCert) != len(ch1.supportedSignatureAlgorithmsCert) ||
|
||||||
|
len(ch.alpnProtocols) != len(ch1.alpnProtocols) {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
for i := range ch.supportedVersions {
|
||||||
|
if ch.supportedVersions[i] != ch1.supportedVersions[i] {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
for i := range ch.cipherSuites {
|
||||||
|
if ch.cipherSuites[i] != ch1.cipherSuites[i] {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
for i := range ch.supportedCurves {
|
||||||
|
if ch.supportedCurves[i] != ch1.supportedCurves[i] {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
for i := range ch.supportedSignatureAlgorithms {
|
||||||
|
if ch.supportedSignatureAlgorithms[i] != ch1.supportedSignatureAlgorithms[i] {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
for i := range ch.supportedSignatureAlgorithmsCert {
|
||||||
|
if ch.supportedSignatureAlgorithmsCert[i] != ch1.supportedSignatureAlgorithmsCert[i] {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
for i := range ch.alpnProtocols {
|
||||||
|
if ch.alpnProtocols[i] != ch1.alpnProtocols[i] {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return ch.vers != ch1.vers ||
|
||||||
|
!bytes.Equal(ch.random, ch1.random) ||
|
||||||
|
!bytes.Equal(ch.sessionId, ch1.sessionId) ||
|
||||||
|
!bytes.Equal(ch.compressionMethods, ch1.compressionMethods) ||
|
||||||
|
ch.serverName != ch1.serverName ||
|
||||||
|
ch.ocspStapling != ch1.ocspStapling ||
|
||||||
|
!bytes.Equal(ch.supportedPoints, ch1.supportedPoints) ||
|
||||||
|
ch.ticketSupported != ch1.ticketSupported ||
|
||||||
|
!bytes.Equal(ch.sessionTicket, ch1.sessionTicket) ||
|
||||||
|
ch.secureRenegotiationSupported != ch1.secureRenegotiationSupported ||
|
||||||
|
!bytes.Equal(ch.secureRenegotiation, ch1.secureRenegotiation) ||
|
||||||
|
ch.scts != ch1.scts ||
|
||||||
|
!bytes.Equal(ch.cookie, ch1.cookie) ||
|
||||||
|
!bytes.Equal(ch.pskModes, ch1.pskModes)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (hs *serverHandshakeStateTLS13) sendServerParameters() error {
|
||||||
|
c := hs.c
|
||||||
|
|
||||||
|
hs.transcript.Write(hs.clientHello.marshal())
|
||||||
|
hs.transcript.Write(hs.hello.marshal())
|
||||||
|
if _, err := c.writeRecord(recordTypeHandshake, hs.hello.marshal()); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := hs.sendDummyChangeCipherSpec(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
earlySecret := hs.earlySecret
|
||||||
|
if earlySecret == nil {
|
||||||
|
earlySecret = hs.suite.extract(nil, nil)
|
||||||
|
}
|
||||||
|
hs.handshakeSecret = hs.suite.extract(hs.sharedKey,
|
||||||
|
hs.suite.deriveSecret(earlySecret, "derived", nil))
|
||||||
|
|
||||||
|
clientSecret := hs.suite.deriveSecret(hs.handshakeSecret,
|
||||||
|
clientHandshakeTrafficLabel, hs.transcript)
|
||||||
|
c.in.exportKey(EncryptionHandshake, hs.suite, clientSecret)
|
||||||
|
c.in.setTrafficSecret(hs.suite, clientSecret)
|
||||||
|
serverSecret := hs.suite.deriveSecret(hs.handshakeSecret,
|
||||||
|
serverHandshakeTrafficLabel, hs.transcript)
|
||||||
|
c.out.exportKey(EncryptionHandshake, hs.suite, serverSecret)
|
||||||
|
c.out.setTrafficSecret(hs.suite, serverSecret)
|
||||||
|
|
||||||
|
err := c.config.writeKeyLog(keyLogLabelClientHandshake, hs.clientHello.random, clientSecret)
|
||||||
|
if err != nil {
|
||||||
|
c.sendAlert(alertInternalError)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
err = c.config.writeKeyLog(keyLogLabelServerHandshake, hs.clientHello.random, serverSecret)
|
||||||
|
if err != nil {
|
||||||
|
c.sendAlert(alertInternalError)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if hs.alpnNegotiationErr != nil {
|
||||||
|
c.sendAlert(alertNoApplicationProtocol)
|
||||||
|
return hs.alpnNegotiationErr
|
||||||
|
}
|
||||||
|
if hs.c.extraConfig != nil && hs.c.extraConfig.GetExtensions != nil {
|
||||||
|
hs.encryptedExtensions.additionalExtensions = hs.c.extraConfig.GetExtensions(typeEncryptedExtensions)
|
||||||
|
}
|
||||||
|
|
||||||
|
hs.transcript.Write(hs.encryptedExtensions.marshal())
|
||||||
|
if _, err := c.writeRecord(recordTypeHandshake, hs.encryptedExtensions.marshal()); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (hs *serverHandshakeStateTLS13) requestClientCert() bool {
|
||||||
|
return hs.c.config.ClientAuth >= RequestClientCert && !hs.usingPSK
|
||||||
|
}
|
||||||
|
|
||||||
|
func (hs *serverHandshakeStateTLS13) sendServerCertificate() error {
|
||||||
|
c := hs.c
|
||||||
|
|
||||||
|
// Only one of PSK and certificates are used at a time.
|
||||||
|
if hs.usingPSK {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
if hs.requestClientCert() {
|
||||||
|
// Request a client certificate
|
||||||
|
certReq := new(certificateRequestMsgTLS13)
|
||||||
|
certReq.ocspStapling = true
|
||||||
|
certReq.scts = true
|
||||||
|
certReq.supportedSignatureAlgorithms = supportedSignatureAlgorithms
|
||||||
|
if c.config.ClientCAs != nil {
|
||||||
|
certReq.certificateAuthorities = c.config.ClientCAs.Subjects()
|
||||||
|
}
|
||||||
|
|
||||||
|
hs.transcript.Write(certReq.marshal())
|
||||||
|
if _, err := c.writeRecord(recordTypeHandshake, certReq.marshal()); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
certMsg := new(certificateMsgTLS13)
|
||||||
|
|
||||||
|
certMsg.certificate = *hs.cert
|
||||||
|
certMsg.scts = hs.clientHello.scts && len(hs.cert.SignedCertificateTimestamps) > 0
|
||||||
|
certMsg.ocspStapling = hs.clientHello.ocspStapling && len(hs.cert.OCSPStaple) > 0
|
||||||
|
|
||||||
|
hs.transcript.Write(certMsg.marshal())
|
||||||
|
if _, err := c.writeRecord(recordTypeHandshake, certMsg.marshal()); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
certVerifyMsg := new(certificateVerifyMsg)
|
||||||
|
certVerifyMsg.hasSignatureAlgorithm = true
|
||||||
|
certVerifyMsg.signatureAlgorithm = hs.sigAlg
|
||||||
|
|
||||||
|
sigType, sigHash, err := typeAndHashFromSignatureScheme(hs.sigAlg)
|
||||||
|
if err != nil {
|
||||||
|
return c.sendAlert(alertInternalError)
|
||||||
|
}
|
||||||
|
|
||||||
|
signed := signedMessage(sigHash, serverSignatureContext, hs.transcript)
|
||||||
|
signOpts := crypto.SignerOpts(sigHash)
|
||||||
|
if sigType == signatureRSAPSS {
|
||||||
|
signOpts = &rsa.PSSOptions{SaltLength: rsa.PSSSaltLengthEqualsHash, Hash: sigHash}
|
||||||
|
}
|
||||||
|
sig, err := hs.cert.PrivateKey.(crypto.Signer).Sign(c.config.rand(), signed, signOpts)
|
||||||
|
if err != nil {
|
||||||
|
public := hs.cert.PrivateKey.(crypto.Signer).Public()
|
||||||
|
if rsaKey, ok := public.(*rsa.PublicKey); ok && sigType == signatureRSAPSS &&
|
||||||
|
rsaKey.N.BitLen()/8 < sigHash.Size()*2+2 { // key too small for RSA-PSS
|
||||||
|
c.sendAlert(alertHandshakeFailure)
|
||||||
|
} else {
|
||||||
|
c.sendAlert(alertInternalError)
|
||||||
|
}
|
||||||
|
return errors.New("tls: failed to sign handshake: " + err.Error())
|
||||||
|
}
|
||||||
|
certVerifyMsg.signature = sig
|
||||||
|
|
||||||
|
hs.transcript.Write(certVerifyMsg.marshal())
|
||||||
|
if _, err := c.writeRecord(recordTypeHandshake, certVerifyMsg.marshal()); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (hs *serverHandshakeStateTLS13) sendServerFinished() error {
|
||||||
|
c := hs.c
|
||||||
|
|
||||||
|
finished := &finishedMsg{
|
||||||
|
verifyData: hs.suite.finishedHash(c.out.trafficSecret, hs.transcript),
|
||||||
|
}
|
||||||
|
|
||||||
|
hs.transcript.Write(finished.marshal())
|
||||||
|
if _, err := c.writeRecord(recordTypeHandshake, finished.marshal()); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Derive secrets that take context through the server Finished.
|
||||||
|
|
||||||
|
hs.masterSecret = hs.suite.extract(nil,
|
||||||
|
hs.suite.deriveSecret(hs.handshakeSecret, "derived", nil))
|
||||||
|
|
||||||
|
hs.trafficSecret = hs.suite.deriveSecret(hs.masterSecret,
|
||||||
|
clientApplicationTrafficLabel, hs.transcript)
|
||||||
|
serverSecret := hs.suite.deriveSecret(hs.masterSecret,
|
||||||
|
serverApplicationTrafficLabel, hs.transcript)
|
||||||
|
c.out.exportKey(EncryptionApplication, hs.suite, serverSecret)
|
||||||
|
c.out.setTrafficSecret(hs.suite, serverSecret)
|
||||||
|
|
||||||
|
err := c.config.writeKeyLog(keyLogLabelClientTraffic, hs.clientHello.random, hs.trafficSecret)
|
||||||
|
if err != nil {
|
||||||
|
c.sendAlert(alertInternalError)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
err = c.config.writeKeyLog(keyLogLabelServerTraffic, hs.clientHello.random, serverSecret)
|
||||||
|
if err != nil {
|
||||||
|
c.sendAlert(alertInternalError)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
c.ekm = hs.suite.exportKeyingMaterial(hs.masterSecret, hs.transcript)
|
||||||
|
|
||||||
|
// If we did not request client certificates, at this point we can
|
||||||
|
// precompute the client finished and roll the transcript forward to send
|
||||||
|
// session tickets in our first flight.
|
||||||
|
if !hs.requestClientCert() {
|
||||||
|
if err := hs.sendSessionTickets(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (hs *serverHandshakeStateTLS13) shouldSendSessionTickets() bool {
|
||||||
|
if hs.c.config.SessionTicketsDisabled {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
// Don't send tickets the client wouldn't use. See RFC 8446, Section 4.2.9.
|
||||||
|
for _, pskMode := range hs.clientHello.pskModes {
|
||||||
|
if pskMode == pskModeDHE {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
func (hs *serverHandshakeStateTLS13) sendSessionTickets() error {
|
||||||
|
c := hs.c
|
||||||
|
|
||||||
|
hs.clientFinished = hs.suite.finishedHash(c.in.trafficSecret, hs.transcript)
|
||||||
|
finishedMsg := &finishedMsg{
|
||||||
|
verifyData: hs.clientFinished,
|
||||||
|
}
|
||||||
|
hs.transcript.Write(finishedMsg.marshal())
|
||||||
|
|
||||||
|
if !hs.shouldSendSessionTickets() {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
c.resumptionSecret = hs.suite.deriveSecret(hs.masterSecret,
|
||||||
|
resumptionLabel, hs.transcript)
|
||||||
|
|
||||||
|
// Don't send session tickets when the alternative record layer is set.
|
||||||
|
// Instead, save the resumption secret on the Conn.
|
||||||
|
// Session tickets can then be generated by calling Conn.GetSessionTicket().
|
||||||
|
if hs.c.extraConfig != nil && hs.c.extraConfig.AlternativeRecordLayer != nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
m, err := hs.c.getSessionTicketMsg(nil)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if _, err := c.writeRecord(recordTypeHandshake, m.marshal()); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (hs *serverHandshakeStateTLS13) readClientCertificate() error {
|
||||||
|
c := hs.c
|
||||||
|
|
||||||
|
if !hs.requestClientCert() {
|
||||||
|
// Make sure the connection is still being verified whether or not
|
||||||
|
// the server requested a client certificate.
|
||||||
|
if c.config.VerifyConnection != nil {
|
||||||
|
if err := c.config.VerifyConnection(c.connectionStateLocked()); err != nil {
|
||||||
|
c.sendAlert(alertBadCertificate)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// If we requested a client certificate, then the client must send a
|
||||||
|
// certificate message. If it's empty, no CertificateVerify is sent.
|
||||||
|
|
||||||
|
msg, err := c.readHandshake()
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
certMsg, ok := msg.(*certificateMsgTLS13)
|
||||||
|
if !ok {
|
||||||
|
c.sendAlert(alertUnexpectedMessage)
|
||||||
|
return unexpectedMessageError(certMsg, msg)
|
||||||
|
}
|
||||||
|
hs.transcript.Write(certMsg.marshal())
|
||||||
|
|
||||||
|
if err := c.processCertsFromClient(certMsg.certificate); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if c.config.VerifyConnection != nil {
|
||||||
|
if err := c.config.VerifyConnection(c.connectionStateLocked()); err != nil {
|
||||||
|
c.sendAlert(alertBadCertificate)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(certMsg.certificate.Certificate) != 0 {
|
||||||
|
msg, err = c.readHandshake()
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
certVerify, ok := msg.(*certificateVerifyMsg)
|
||||||
|
if !ok {
|
||||||
|
c.sendAlert(alertUnexpectedMessage)
|
||||||
|
return unexpectedMessageError(certVerify, msg)
|
||||||
|
}
|
||||||
|
|
||||||
|
// See RFC 8446, Section 4.4.3.
|
||||||
|
if !isSupportedSignatureAlgorithm(certVerify.signatureAlgorithm, supportedSignatureAlgorithms) {
|
||||||
|
c.sendAlert(alertIllegalParameter)
|
||||||
|
return errors.New("tls: client certificate used with invalid signature algorithm")
|
||||||
|
}
|
||||||
|
sigType, sigHash, err := typeAndHashFromSignatureScheme(certVerify.signatureAlgorithm)
|
||||||
|
if err != nil {
|
||||||
|
return c.sendAlert(alertInternalError)
|
||||||
|
}
|
||||||
|
if sigType == signaturePKCS1v15 || sigHash == crypto.SHA1 {
|
||||||
|
c.sendAlert(alertIllegalParameter)
|
||||||
|
return errors.New("tls: client certificate used with invalid signature algorithm")
|
||||||
|
}
|
||||||
|
signed := signedMessage(sigHash, clientSignatureContext, hs.transcript)
|
||||||
|
if err := verifyHandshakeSignature(sigType, c.peerCertificates[0].PublicKey,
|
||||||
|
sigHash, signed, certVerify.signature); err != nil {
|
||||||
|
c.sendAlert(alertDecryptError)
|
||||||
|
return errors.New("tls: invalid signature by the client certificate: " + err.Error())
|
||||||
|
}
|
||||||
|
|
||||||
|
hs.transcript.Write(certVerify.marshal())
|
||||||
|
}
|
||||||
|
|
||||||
|
// If we waited until the client certificates to send session tickets, we
|
||||||
|
// are ready to do it now.
|
||||||
|
if err := hs.sendSessionTickets(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (hs *serverHandshakeStateTLS13) readClientFinished() error {
|
||||||
|
c := hs.c
|
||||||
|
|
||||||
|
msg, err := c.readHandshake()
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
finished, ok := msg.(*finishedMsg)
|
||||||
|
if !ok {
|
||||||
|
c.sendAlert(alertUnexpectedMessage)
|
||||||
|
return unexpectedMessageError(finished, msg)
|
||||||
|
}
|
||||||
|
|
||||||
|
if !hmac.Equal(hs.clientFinished, finished.verifyData) {
|
||||||
|
c.sendAlert(alertDecryptError)
|
||||||
|
return errors.New("tls: invalid client finished hash")
|
||||||
|
}
|
||||||
|
|
||||||
|
c.in.exportKey(EncryptionApplication, hs.suite, hs.trafficSecret)
|
||||||
|
c.in.setTrafficSecret(hs.suite, hs.trafficSecret)
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
|
@ -0,0 +1,357 @@
|
||||||
|
// Copyright 2010 The Go Authors. All rights reserved.
|
||||||
|
// Use of this source code is governed by a BSD-style
|
||||||
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
|
package qtls
|
||||||
|
|
||||||
|
import (
|
||||||
|
"crypto"
|
||||||
|
"crypto/md5"
|
||||||
|
"crypto/rsa"
|
||||||
|
"crypto/sha1"
|
||||||
|
"crypto/x509"
|
||||||
|
"errors"
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
)
|
||||||
|
|
||||||
|
// a keyAgreement implements the client and server side of a TLS key agreement
|
||||||
|
// protocol by generating and processing key exchange messages.
|
||||||
|
type keyAgreement interface {
|
||||||
|
// On the server side, the first two methods are called in order.
|
||||||
|
|
||||||
|
// In the case that the key agreement protocol doesn't use a
|
||||||
|
// ServerKeyExchange message, generateServerKeyExchange can return nil,
|
||||||
|
// nil.
|
||||||
|
generateServerKeyExchange(*config, *Certificate, *clientHelloMsg, *serverHelloMsg) (*serverKeyExchangeMsg, error)
|
||||||
|
processClientKeyExchange(*config, *Certificate, *clientKeyExchangeMsg, uint16) ([]byte, error)
|
||||||
|
|
||||||
|
// On the client side, the next two methods are called in order.
|
||||||
|
|
||||||
|
// This method may not be called if the server doesn't send a
|
||||||
|
// ServerKeyExchange message.
|
||||||
|
processServerKeyExchange(*config, *clientHelloMsg, *serverHelloMsg, *x509.Certificate, *serverKeyExchangeMsg) error
|
||||||
|
generateClientKeyExchange(*config, *clientHelloMsg, *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error)
|
||||||
|
}
|
||||||
|
|
||||||
|
var errClientKeyExchange = errors.New("tls: invalid ClientKeyExchange message")
|
||||||
|
var errServerKeyExchange = errors.New("tls: invalid ServerKeyExchange message")
|
||||||
|
|
||||||
|
// rsaKeyAgreement implements the standard TLS key agreement where the client
|
||||||
|
// encrypts the pre-master secret to the server's public key.
|
||||||
|
type rsaKeyAgreement struct{}
|
||||||
|
|
||||||
|
func (ka rsaKeyAgreement) generateServerKeyExchange(config *config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg) (*serverKeyExchangeMsg, error) {
|
||||||
|
return nil, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (ka rsaKeyAgreement) processClientKeyExchange(config *config, cert *Certificate, ckx *clientKeyExchangeMsg, version uint16) ([]byte, error) {
|
||||||
|
if len(ckx.ciphertext) < 2 {
|
||||||
|
return nil, errClientKeyExchange
|
||||||
|
}
|
||||||
|
ciphertextLen := int(ckx.ciphertext[0])<<8 | int(ckx.ciphertext[1])
|
||||||
|
if ciphertextLen != len(ckx.ciphertext)-2 {
|
||||||
|
return nil, errClientKeyExchange
|
||||||
|
}
|
||||||
|
ciphertext := ckx.ciphertext[2:]
|
||||||
|
|
||||||
|
priv, ok := cert.PrivateKey.(crypto.Decrypter)
|
||||||
|
if !ok {
|
||||||
|
return nil, errors.New("tls: certificate private key does not implement crypto.Decrypter")
|
||||||
|
}
|
||||||
|
// Perform constant time RSA PKCS #1 v1.5 decryption
|
||||||
|
preMasterSecret, err := priv.Decrypt(config.rand(), ciphertext, &rsa.PKCS1v15DecryptOptions{SessionKeyLen: 48})
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
// We don't check the version number in the premaster secret. For one,
|
||||||
|
// by checking it, we would leak information about the validity of the
|
||||||
|
// encrypted pre-master secret. Secondly, it provides only a small
|
||||||
|
// benefit against a downgrade attack and some implementations send the
|
||||||
|
// wrong version anyway. See the discussion at the end of section
|
||||||
|
// 7.4.7.1 of RFC 4346.
|
||||||
|
return preMasterSecret, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (ka rsaKeyAgreement) processServerKeyExchange(config *config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, skx *serverKeyExchangeMsg) error {
|
||||||
|
return errors.New("tls: unexpected ServerKeyExchange")
|
||||||
|
}
|
||||||
|
|
||||||
|
func (ka rsaKeyAgreement) generateClientKeyExchange(config *config, clientHello *clientHelloMsg, cert *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) {
|
||||||
|
preMasterSecret := make([]byte, 48)
|
||||||
|
preMasterSecret[0] = byte(clientHello.vers >> 8)
|
||||||
|
preMasterSecret[1] = byte(clientHello.vers)
|
||||||
|
_, err := io.ReadFull(config.rand(), preMasterSecret[2:])
|
||||||
|
if err != nil {
|
||||||
|
return nil, nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
rsaKey, ok := cert.PublicKey.(*rsa.PublicKey)
|
||||||
|
if !ok {
|
||||||
|
return nil, nil, errors.New("tls: server certificate contains incorrect key type for selected ciphersuite")
|
||||||
|
}
|
||||||
|
encrypted, err := rsa.EncryptPKCS1v15(config.rand(), rsaKey, preMasterSecret)
|
||||||
|
if err != nil {
|
||||||
|
return nil, nil, err
|
||||||
|
}
|
||||||
|
ckx := new(clientKeyExchangeMsg)
|
||||||
|
ckx.ciphertext = make([]byte, len(encrypted)+2)
|
||||||
|
ckx.ciphertext[0] = byte(len(encrypted) >> 8)
|
||||||
|
ckx.ciphertext[1] = byte(len(encrypted))
|
||||||
|
copy(ckx.ciphertext[2:], encrypted)
|
||||||
|
return preMasterSecret, ckx, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// sha1Hash calculates a SHA1 hash over the given byte slices.
|
||||||
|
func sha1Hash(slices [][]byte) []byte {
|
||||||
|
hsha1 := sha1.New()
|
||||||
|
for _, slice := range slices {
|
||||||
|
hsha1.Write(slice)
|
||||||
|
}
|
||||||
|
return hsha1.Sum(nil)
|
||||||
|
}
|
||||||
|
|
||||||
|
// md5SHA1Hash implements TLS 1.0's hybrid hash function which consists of the
|
||||||
|
// concatenation of an MD5 and SHA1 hash.
|
||||||
|
func md5SHA1Hash(slices [][]byte) []byte {
|
||||||
|
md5sha1 := make([]byte, md5.Size+sha1.Size)
|
||||||
|
hmd5 := md5.New()
|
||||||
|
for _, slice := range slices {
|
||||||
|
hmd5.Write(slice)
|
||||||
|
}
|
||||||
|
copy(md5sha1, hmd5.Sum(nil))
|
||||||
|
copy(md5sha1[md5.Size:], sha1Hash(slices))
|
||||||
|
return md5sha1
|
||||||
|
}
|
||||||
|
|
||||||
|
// hashForServerKeyExchange hashes the given slices and returns their digest
|
||||||
|
// using the given hash function (for >= TLS 1.2) or using a default based on
|
||||||
|
// the sigType (for earlier TLS versions). For Ed25519 signatures, which don't
|
||||||
|
// do pre-hashing, it returns the concatenation of the slices.
|
||||||
|
func hashForServerKeyExchange(sigType uint8, hashFunc crypto.Hash, version uint16, slices ...[]byte) []byte {
|
||||||
|
if sigType == signatureEd25519 {
|
||||||
|
var signed []byte
|
||||||
|
for _, slice := range slices {
|
||||||
|
signed = append(signed, slice...)
|
||||||
|
}
|
||||||
|
return signed
|
||||||
|
}
|
||||||
|
if version >= VersionTLS12 {
|
||||||
|
h := hashFunc.New()
|
||||||
|
for _, slice := range slices {
|
||||||
|
h.Write(slice)
|
||||||
|
}
|
||||||
|
digest := h.Sum(nil)
|
||||||
|
return digest
|
||||||
|
}
|
||||||
|
if sigType == signatureECDSA {
|
||||||
|
return sha1Hash(slices)
|
||||||
|
}
|
||||||
|
return md5SHA1Hash(slices)
|
||||||
|
}
|
||||||
|
|
||||||
|
// ecdheKeyAgreement implements a TLS key agreement where the server
|
||||||
|
// generates an ephemeral EC public/private key pair and signs it. The
|
||||||
|
// pre-master secret is then calculated using ECDH. The signature may
|
||||||
|
// be ECDSA, Ed25519 or RSA.
|
||||||
|
type ecdheKeyAgreement struct {
|
||||||
|
version uint16
|
||||||
|
isRSA bool
|
||||||
|
params ecdheParameters
|
||||||
|
|
||||||
|
// ckx and preMasterSecret are generated in processServerKeyExchange
|
||||||
|
// and returned in generateClientKeyExchange.
|
||||||
|
ckx *clientKeyExchangeMsg
|
||||||
|
preMasterSecret []byte
|
||||||
|
}
|
||||||
|
|
||||||
|
func (ka *ecdheKeyAgreement) generateServerKeyExchange(config *config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg) (*serverKeyExchangeMsg, error) {
|
||||||
|
var curveID CurveID
|
||||||
|
for _, c := range clientHello.supportedCurves {
|
||||||
|
if config.supportsCurve(c) {
|
||||||
|
curveID = c
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if curveID == 0 {
|
||||||
|
return nil, errors.New("tls: no supported elliptic curves offered")
|
||||||
|
}
|
||||||
|
if _, ok := curveForCurveID(curveID); curveID != X25519 && !ok {
|
||||||
|
return nil, errors.New("tls: CurvePreferences includes unsupported curve")
|
||||||
|
}
|
||||||
|
|
||||||
|
params, err := generateECDHEParameters(config.rand(), curveID)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
ka.params = params
|
||||||
|
|
||||||
|
// See RFC 4492, Section 5.4.
|
||||||
|
ecdhePublic := params.PublicKey()
|
||||||
|
serverECDHEParams := make([]byte, 1+2+1+len(ecdhePublic))
|
||||||
|
serverECDHEParams[0] = 3 // named curve
|
||||||
|
serverECDHEParams[1] = byte(curveID >> 8)
|
||||||
|
serverECDHEParams[2] = byte(curveID)
|
||||||
|
serverECDHEParams[3] = byte(len(ecdhePublic))
|
||||||
|
copy(serverECDHEParams[4:], ecdhePublic)
|
||||||
|
|
||||||
|
priv, ok := cert.PrivateKey.(crypto.Signer)
|
||||||
|
if !ok {
|
||||||
|
return nil, fmt.Errorf("tls: certificate private key of type %T does not implement crypto.Signer", cert.PrivateKey)
|
||||||
|
}
|
||||||
|
|
||||||
|
var signatureAlgorithm SignatureScheme
|
||||||
|
var sigType uint8
|
||||||
|
var sigHash crypto.Hash
|
||||||
|
if ka.version >= VersionTLS12 {
|
||||||
|
signatureAlgorithm, err = selectSignatureScheme(ka.version, cert, clientHello.supportedSignatureAlgorithms)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
sigType, sigHash, err = typeAndHashFromSignatureScheme(signatureAlgorithm)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
sigType, sigHash, err = legacyTypeAndHashFromPublicKey(priv.Public())
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if (sigType == signaturePKCS1v15 || sigType == signatureRSAPSS) != ka.isRSA {
|
||||||
|
return nil, errors.New("tls: certificate cannot be used with the selected cipher suite")
|
||||||
|
}
|
||||||
|
|
||||||
|
signed := hashForServerKeyExchange(sigType, sigHash, ka.version, clientHello.random, hello.random, serverECDHEParams)
|
||||||
|
|
||||||
|
signOpts := crypto.SignerOpts(sigHash)
|
||||||
|
if sigType == signatureRSAPSS {
|
||||||
|
signOpts = &rsa.PSSOptions{SaltLength: rsa.PSSSaltLengthEqualsHash, Hash: sigHash}
|
||||||
|
}
|
||||||
|
sig, err := priv.Sign(config.rand(), signed, signOpts)
|
||||||
|
if err != nil {
|
||||||
|
return nil, errors.New("tls: failed to sign ECDHE parameters: " + err.Error())
|
||||||
|
}
|
||||||
|
|
||||||
|
skx := new(serverKeyExchangeMsg)
|
||||||
|
sigAndHashLen := 0
|
||||||
|
if ka.version >= VersionTLS12 {
|
||||||
|
sigAndHashLen = 2
|
||||||
|
}
|
||||||
|
skx.key = make([]byte, len(serverECDHEParams)+sigAndHashLen+2+len(sig))
|
||||||
|
copy(skx.key, serverECDHEParams)
|
||||||
|
k := skx.key[len(serverECDHEParams):]
|
||||||
|
if ka.version >= VersionTLS12 {
|
||||||
|
k[0] = byte(signatureAlgorithm >> 8)
|
||||||
|
k[1] = byte(signatureAlgorithm)
|
||||||
|
k = k[2:]
|
||||||
|
}
|
||||||
|
k[0] = byte(len(sig) >> 8)
|
||||||
|
k[1] = byte(len(sig))
|
||||||
|
copy(k[2:], sig)
|
||||||
|
|
||||||
|
return skx, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (ka *ecdheKeyAgreement) processClientKeyExchange(config *config, cert *Certificate, ckx *clientKeyExchangeMsg, version uint16) ([]byte, error) {
|
||||||
|
if len(ckx.ciphertext) == 0 || int(ckx.ciphertext[0]) != len(ckx.ciphertext)-1 {
|
||||||
|
return nil, errClientKeyExchange
|
||||||
|
}
|
||||||
|
|
||||||
|
preMasterSecret := ka.params.SharedKey(ckx.ciphertext[1:])
|
||||||
|
if preMasterSecret == nil {
|
||||||
|
return nil, errClientKeyExchange
|
||||||
|
}
|
||||||
|
|
||||||
|
return preMasterSecret, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (ka *ecdheKeyAgreement) processServerKeyExchange(config *config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, skx *serverKeyExchangeMsg) error {
|
||||||
|
if len(skx.key) < 4 {
|
||||||
|
return errServerKeyExchange
|
||||||
|
}
|
||||||
|
if skx.key[0] != 3 { // named curve
|
||||||
|
return errors.New("tls: server selected unsupported curve")
|
||||||
|
}
|
||||||
|
curveID := CurveID(skx.key[1])<<8 | CurveID(skx.key[2])
|
||||||
|
|
||||||
|
publicLen := int(skx.key[3])
|
||||||
|
if publicLen+4 > len(skx.key) {
|
||||||
|
return errServerKeyExchange
|
||||||
|
}
|
||||||
|
serverECDHEParams := skx.key[:4+publicLen]
|
||||||
|
publicKey := serverECDHEParams[4:]
|
||||||
|
|
||||||
|
sig := skx.key[4+publicLen:]
|
||||||
|
if len(sig) < 2 {
|
||||||
|
return errServerKeyExchange
|
||||||
|
}
|
||||||
|
|
||||||
|
if _, ok := curveForCurveID(curveID); curveID != X25519 && !ok {
|
||||||
|
return errors.New("tls: server selected unsupported curve")
|
||||||
|
}
|
||||||
|
|
||||||
|
params, err := generateECDHEParameters(config.rand(), curveID)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
ka.params = params
|
||||||
|
|
||||||
|
ka.preMasterSecret = params.SharedKey(publicKey)
|
||||||
|
if ka.preMasterSecret == nil {
|
||||||
|
return errServerKeyExchange
|
||||||
|
}
|
||||||
|
|
||||||
|
ourPublicKey := params.PublicKey()
|
||||||
|
ka.ckx = new(clientKeyExchangeMsg)
|
||||||
|
ka.ckx.ciphertext = make([]byte, 1+len(ourPublicKey))
|
||||||
|
ka.ckx.ciphertext[0] = byte(len(ourPublicKey))
|
||||||
|
copy(ka.ckx.ciphertext[1:], ourPublicKey)
|
||||||
|
|
||||||
|
var sigType uint8
|
||||||
|
var sigHash crypto.Hash
|
||||||
|
if ka.version >= VersionTLS12 {
|
||||||
|
signatureAlgorithm := SignatureScheme(sig[0])<<8 | SignatureScheme(sig[1])
|
||||||
|
sig = sig[2:]
|
||||||
|
if len(sig) < 2 {
|
||||||
|
return errServerKeyExchange
|
||||||
|
}
|
||||||
|
|
||||||
|
if !isSupportedSignatureAlgorithm(signatureAlgorithm, clientHello.supportedSignatureAlgorithms) {
|
||||||
|
return errors.New("tls: certificate used with invalid signature algorithm")
|
||||||
|
}
|
||||||
|
sigType, sigHash, err = typeAndHashFromSignatureScheme(signatureAlgorithm)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
sigType, sigHash, err = legacyTypeAndHashFromPublicKey(cert.PublicKey)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if (sigType == signaturePKCS1v15 || sigType == signatureRSAPSS) != ka.isRSA {
|
||||||
|
return errServerKeyExchange
|
||||||
|
}
|
||||||
|
|
||||||
|
sigLen := int(sig[0])<<8 | int(sig[1])
|
||||||
|
if sigLen+2 != len(sig) {
|
||||||
|
return errServerKeyExchange
|
||||||
|
}
|
||||||
|
sig = sig[2:]
|
||||||
|
|
||||||
|
signed := hashForServerKeyExchange(sigType, sigHash, ka.version, clientHello.random, serverHello.random, serverECDHEParams)
|
||||||
|
if err := verifyHandshakeSignature(sigType, cert.PublicKey, sigHash, signed, sig); err != nil {
|
||||||
|
return errors.New("tls: invalid signature by the server certificate: " + err.Error())
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (ka *ecdheKeyAgreement) generateClientKeyExchange(config *config, clientHello *clientHelloMsg, cert *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) {
|
||||||
|
if ka.ckx == nil {
|
||||||
|
return nil, nil, errors.New("tls: missing ServerKeyExchange message")
|
||||||
|
}
|
||||||
|
|
||||||
|
return ka.preMasterSecret, ka.ckx, nil
|
||||||
|
}
|
|
@ -0,0 +1,199 @@
|
||||||
|
// Copyright 2018 The Go Authors. All rights reserved.
|
||||||
|
// Use of this source code is governed by a BSD-style
|
||||||
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
|
package qtls
|
||||||
|
|
||||||
|
import (
|
||||||
|
"crypto/elliptic"
|
||||||
|
"crypto/hmac"
|
||||||
|
"errors"
|
||||||
|
"hash"
|
||||||
|
"io"
|
||||||
|
"math/big"
|
||||||
|
|
||||||
|
"golang.org/x/crypto/cryptobyte"
|
||||||
|
"golang.org/x/crypto/curve25519"
|
||||||
|
"golang.org/x/crypto/hkdf"
|
||||||
|
)
|
||||||
|
|
||||||
|
// This file contains the functions necessary to compute the TLS 1.3 key
|
||||||
|
// schedule. See RFC 8446, Section 7.
|
||||||
|
|
||||||
|
const (
|
||||||
|
resumptionBinderLabel = "res binder"
|
||||||
|
clientHandshakeTrafficLabel = "c hs traffic"
|
||||||
|
serverHandshakeTrafficLabel = "s hs traffic"
|
||||||
|
clientApplicationTrafficLabel = "c ap traffic"
|
||||||
|
serverApplicationTrafficLabel = "s ap traffic"
|
||||||
|
exporterLabel = "exp master"
|
||||||
|
resumptionLabel = "res master"
|
||||||
|
trafficUpdateLabel = "traffic upd"
|
||||||
|
)
|
||||||
|
|
||||||
|
// expandLabel implements HKDF-Expand-Label from RFC 8446, Section 7.1.
|
||||||
|
func (c *cipherSuiteTLS13) expandLabel(secret []byte, label string, context []byte, length int) []byte {
|
||||||
|
var hkdfLabel cryptobyte.Builder
|
||||||
|
hkdfLabel.AddUint16(uint16(length))
|
||||||
|
hkdfLabel.AddUint8LengthPrefixed(func(b *cryptobyte.Builder) {
|
||||||
|
b.AddBytes([]byte("tls13 "))
|
||||||
|
b.AddBytes([]byte(label))
|
||||||
|
})
|
||||||
|
hkdfLabel.AddUint8LengthPrefixed(func(b *cryptobyte.Builder) {
|
||||||
|
b.AddBytes(context)
|
||||||
|
})
|
||||||
|
out := make([]byte, length)
|
||||||
|
n, err := hkdf.Expand(c.hash.New, secret, hkdfLabel.BytesOrPanic()).Read(out)
|
||||||
|
if err != nil || n != length {
|
||||||
|
panic("tls: HKDF-Expand-Label invocation failed unexpectedly")
|
||||||
|
}
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// deriveSecret implements Derive-Secret from RFC 8446, Section 7.1.
|
||||||
|
func (c *cipherSuiteTLS13) deriveSecret(secret []byte, label string, transcript hash.Hash) []byte {
|
||||||
|
if transcript == nil {
|
||||||
|
transcript = c.hash.New()
|
||||||
|
}
|
||||||
|
return c.expandLabel(secret, label, transcript.Sum(nil), c.hash.Size())
|
||||||
|
}
|
||||||
|
|
||||||
|
// extract implements HKDF-Extract with the cipher suite hash.
|
||||||
|
func (c *cipherSuiteTLS13) extract(newSecret, currentSecret []byte) []byte {
|
||||||
|
if newSecret == nil {
|
||||||
|
newSecret = make([]byte, c.hash.Size())
|
||||||
|
}
|
||||||
|
return hkdf.Extract(c.hash.New, newSecret, currentSecret)
|
||||||
|
}
|
||||||
|
|
||||||
|
// nextTrafficSecret generates the next traffic secret, given the current one,
|
||||||
|
// according to RFC 8446, Section 7.2.
|
||||||
|
func (c *cipherSuiteTLS13) nextTrafficSecret(trafficSecret []byte) []byte {
|
||||||
|
return c.expandLabel(trafficSecret, trafficUpdateLabel, nil, c.hash.Size())
|
||||||
|
}
|
||||||
|
|
||||||
|
// trafficKey generates traffic keys according to RFC 8446, Section 7.3.
|
||||||
|
func (c *cipherSuiteTLS13) trafficKey(trafficSecret []byte) (key, iv []byte) {
|
||||||
|
key = c.expandLabel(trafficSecret, "key", nil, c.keyLen)
|
||||||
|
iv = c.expandLabel(trafficSecret, "iv", nil, aeadNonceLength)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// finishedHash generates the Finished verify_data or PskBinderEntry according
|
||||||
|
// to RFC 8446, Section 4.4.4. See sections 4.4 and 4.2.11.2 for the baseKey
|
||||||
|
// selection.
|
||||||
|
func (c *cipherSuiteTLS13) finishedHash(baseKey []byte, transcript hash.Hash) []byte {
|
||||||
|
finishedKey := c.expandLabel(baseKey, "finished", nil, c.hash.Size())
|
||||||
|
verifyData := hmac.New(c.hash.New, finishedKey)
|
||||||
|
verifyData.Write(transcript.Sum(nil))
|
||||||
|
return verifyData.Sum(nil)
|
||||||
|
}
|
||||||
|
|
||||||
|
// exportKeyingMaterial implements RFC5705 exporters for TLS 1.3 according to
|
||||||
|
// RFC 8446, Section 7.5.
|
||||||
|
func (c *cipherSuiteTLS13) exportKeyingMaterial(masterSecret []byte, transcript hash.Hash) func(string, []byte, int) ([]byte, error) {
|
||||||
|
expMasterSecret := c.deriveSecret(masterSecret, exporterLabel, transcript)
|
||||||
|
return func(label string, context []byte, length int) ([]byte, error) {
|
||||||
|
secret := c.deriveSecret(expMasterSecret, label, nil)
|
||||||
|
h := c.hash.New()
|
||||||
|
h.Write(context)
|
||||||
|
return c.expandLabel(secret, "exporter", h.Sum(nil), length), nil
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// ecdheParameters implements Diffie-Hellman with either NIST curves or X25519,
|
||||||
|
// according to RFC 8446, Section 4.2.8.2.
|
||||||
|
type ecdheParameters interface {
|
||||||
|
CurveID() CurveID
|
||||||
|
PublicKey() []byte
|
||||||
|
SharedKey(peerPublicKey []byte) []byte
|
||||||
|
}
|
||||||
|
|
||||||
|
func generateECDHEParameters(rand io.Reader, curveID CurveID) (ecdheParameters, error) {
|
||||||
|
if curveID == X25519 {
|
||||||
|
privateKey := make([]byte, curve25519.ScalarSize)
|
||||||
|
if _, err := io.ReadFull(rand, privateKey); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
publicKey, err := curve25519.X25519(privateKey, curve25519.Basepoint)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return &x25519Parameters{privateKey: privateKey, publicKey: publicKey}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
curve, ok := curveForCurveID(curveID)
|
||||||
|
if !ok {
|
||||||
|
return nil, errors.New("tls: internal error: unsupported curve")
|
||||||
|
}
|
||||||
|
|
||||||
|
p := &nistParameters{curveID: curveID}
|
||||||
|
var err error
|
||||||
|
p.privateKey, p.x, p.y, err = elliptic.GenerateKey(curve, rand)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return p, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func curveForCurveID(id CurveID) (elliptic.Curve, bool) {
|
||||||
|
switch id {
|
||||||
|
case CurveP256:
|
||||||
|
return elliptic.P256(), true
|
||||||
|
case CurveP384:
|
||||||
|
return elliptic.P384(), true
|
||||||
|
case CurveP521:
|
||||||
|
return elliptic.P521(), true
|
||||||
|
default:
|
||||||
|
return nil, false
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
type nistParameters struct {
|
||||||
|
privateKey []byte
|
||||||
|
x, y *big.Int // public key
|
||||||
|
curveID CurveID
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *nistParameters) CurveID() CurveID {
|
||||||
|
return p.curveID
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *nistParameters) PublicKey() []byte {
|
||||||
|
curve, _ := curveForCurveID(p.curveID)
|
||||||
|
return elliptic.Marshal(curve, p.x, p.y)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *nistParameters) SharedKey(peerPublicKey []byte) []byte {
|
||||||
|
curve, _ := curveForCurveID(p.curveID)
|
||||||
|
// Unmarshal also checks whether the given point is on the curve.
|
||||||
|
x, y := elliptic.Unmarshal(curve, peerPublicKey)
|
||||||
|
if x == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
xShared, _ := curve.ScalarMult(x, y, p.privateKey)
|
||||||
|
sharedKey := make([]byte, (curve.Params().BitSize+7)/8)
|
||||||
|
return xShared.FillBytes(sharedKey)
|
||||||
|
}
|
||||||
|
|
||||||
|
type x25519Parameters struct {
|
||||||
|
privateKey []byte
|
||||||
|
publicKey []byte
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *x25519Parameters) CurveID() CurveID {
|
||||||
|
return X25519
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *x25519Parameters) PublicKey() []byte {
|
||||||
|
return p.publicKey[:]
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *x25519Parameters) SharedKey(peerPublicKey []byte) []byte {
|
||||||
|
sharedKey, err := curve25519.X25519(p.privateKey, peerPublicKey)
|
||||||
|
if err != nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
return sharedKey
|
||||||
|
}
|
|
@ -0,0 +1,283 @@
|
||||||
|
// Copyright 2009 The Go Authors. All rights reserved.
|
||||||
|
// Use of this source code is governed by a BSD-style
|
||||||
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
|
package qtls
|
||||||
|
|
||||||
|
import (
|
||||||
|
"crypto"
|
||||||
|
"crypto/hmac"
|
||||||
|
"crypto/md5"
|
||||||
|
"crypto/sha1"
|
||||||
|
"crypto/sha256"
|
||||||
|
"crypto/sha512"
|
||||||
|
"errors"
|
||||||
|
"fmt"
|
||||||
|
"hash"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Split a premaster secret in two as specified in RFC 4346, Section 5.
|
||||||
|
func splitPreMasterSecret(secret []byte) (s1, s2 []byte) {
|
||||||
|
s1 = secret[0 : (len(secret)+1)/2]
|
||||||
|
s2 = secret[len(secret)/2:]
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// pHash implements the P_hash function, as defined in RFC 4346, Section 5.
|
||||||
|
func pHash(result, secret, seed []byte, hash func() hash.Hash) {
|
||||||
|
h := hmac.New(hash, secret)
|
||||||
|
h.Write(seed)
|
||||||
|
a := h.Sum(nil)
|
||||||
|
|
||||||
|
j := 0
|
||||||
|
for j < len(result) {
|
||||||
|
h.Reset()
|
||||||
|
h.Write(a)
|
||||||
|
h.Write(seed)
|
||||||
|
b := h.Sum(nil)
|
||||||
|
copy(result[j:], b)
|
||||||
|
j += len(b)
|
||||||
|
|
||||||
|
h.Reset()
|
||||||
|
h.Write(a)
|
||||||
|
a = h.Sum(nil)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// prf10 implements the TLS 1.0 pseudo-random function, as defined in RFC 2246, Section 5.
|
||||||
|
func prf10(result, secret, label, seed []byte) {
|
||||||
|
hashSHA1 := sha1.New
|
||||||
|
hashMD5 := md5.New
|
||||||
|
|
||||||
|
labelAndSeed := make([]byte, len(label)+len(seed))
|
||||||
|
copy(labelAndSeed, label)
|
||||||
|
copy(labelAndSeed[len(label):], seed)
|
||||||
|
|
||||||
|
s1, s2 := splitPreMasterSecret(secret)
|
||||||
|
pHash(result, s1, labelAndSeed, hashMD5)
|
||||||
|
result2 := make([]byte, len(result))
|
||||||
|
pHash(result2, s2, labelAndSeed, hashSHA1)
|
||||||
|
|
||||||
|
for i, b := range result2 {
|
||||||
|
result[i] ^= b
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// prf12 implements the TLS 1.2 pseudo-random function, as defined in RFC 5246, Section 5.
|
||||||
|
func prf12(hashFunc func() hash.Hash) func(result, secret, label, seed []byte) {
|
||||||
|
return func(result, secret, label, seed []byte) {
|
||||||
|
labelAndSeed := make([]byte, len(label)+len(seed))
|
||||||
|
copy(labelAndSeed, label)
|
||||||
|
copy(labelAndSeed[len(label):], seed)
|
||||||
|
|
||||||
|
pHash(result, secret, labelAndSeed, hashFunc)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
const (
|
||||||
|
masterSecretLength = 48 // Length of a master secret in TLS 1.1.
|
||||||
|
finishedVerifyLength = 12 // Length of verify_data in a Finished message.
|
||||||
|
)
|
||||||
|
|
||||||
|
var masterSecretLabel = []byte("master secret")
|
||||||
|
var keyExpansionLabel = []byte("key expansion")
|
||||||
|
var clientFinishedLabel = []byte("client finished")
|
||||||
|
var serverFinishedLabel = []byte("server finished")
|
||||||
|
|
||||||
|
func prfAndHashForVersion(version uint16, suite *cipherSuite) (func(result, secret, label, seed []byte), crypto.Hash) {
|
||||||
|
switch version {
|
||||||
|
case VersionTLS10, VersionTLS11:
|
||||||
|
return prf10, crypto.Hash(0)
|
||||||
|
case VersionTLS12:
|
||||||
|
if suite.flags&suiteSHA384 != 0 {
|
||||||
|
return prf12(sha512.New384), crypto.SHA384
|
||||||
|
}
|
||||||
|
return prf12(sha256.New), crypto.SHA256
|
||||||
|
default:
|
||||||
|
panic("unknown version")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func prfForVersion(version uint16, suite *cipherSuite) func(result, secret, label, seed []byte) {
|
||||||
|
prf, _ := prfAndHashForVersion(version, suite)
|
||||||
|
return prf
|
||||||
|
}
|
||||||
|
|
||||||
|
// masterFromPreMasterSecret generates the master secret from the pre-master
|
||||||
|
// secret. See RFC 5246, Section 8.1.
|
||||||
|
func masterFromPreMasterSecret(version uint16, suite *cipherSuite, preMasterSecret, clientRandom, serverRandom []byte) []byte {
|
||||||
|
seed := make([]byte, 0, len(clientRandom)+len(serverRandom))
|
||||||
|
seed = append(seed, clientRandom...)
|
||||||
|
seed = append(seed, serverRandom...)
|
||||||
|
|
||||||
|
masterSecret := make([]byte, masterSecretLength)
|
||||||
|
prfForVersion(version, suite)(masterSecret, preMasterSecret, masterSecretLabel, seed)
|
||||||
|
return masterSecret
|
||||||
|
}
|
||||||
|
|
||||||
|
// keysFromMasterSecret generates the connection keys from the master
|
||||||
|
// secret, given the lengths of the MAC key, cipher key and IV, as defined in
|
||||||
|
// RFC 2246, Section 6.3.
|
||||||
|
func keysFromMasterSecret(version uint16, suite *cipherSuite, masterSecret, clientRandom, serverRandom []byte, macLen, keyLen, ivLen int) (clientMAC, serverMAC, clientKey, serverKey, clientIV, serverIV []byte) {
|
||||||
|
seed := make([]byte, 0, len(serverRandom)+len(clientRandom))
|
||||||
|
seed = append(seed, serverRandom...)
|
||||||
|
seed = append(seed, clientRandom...)
|
||||||
|
|
||||||
|
n := 2*macLen + 2*keyLen + 2*ivLen
|
||||||
|
keyMaterial := make([]byte, n)
|
||||||
|
prfForVersion(version, suite)(keyMaterial, masterSecret, keyExpansionLabel, seed)
|
||||||
|
clientMAC = keyMaterial[:macLen]
|
||||||
|
keyMaterial = keyMaterial[macLen:]
|
||||||
|
serverMAC = keyMaterial[:macLen]
|
||||||
|
keyMaterial = keyMaterial[macLen:]
|
||||||
|
clientKey = keyMaterial[:keyLen]
|
||||||
|
keyMaterial = keyMaterial[keyLen:]
|
||||||
|
serverKey = keyMaterial[:keyLen]
|
||||||
|
keyMaterial = keyMaterial[keyLen:]
|
||||||
|
clientIV = keyMaterial[:ivLen]
|
||||||
|
keyMaterial = keyMaterial[ivLen:]
|
||||||
|
serverIV = keyMaterial[:ivLen]
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
func newFinishedHash(version uint16, cipherSuite *cipherSuite) finishedHash {
|
||||||
|
var buffer []byte
|
||||||
|
if version >= VersionTLS12 {
|
||||||
|
buffer = []byte{}
|
||||||
|
}
|
||||||
|
|
||||||
|
prf, hash := prfAndHashForVersion(version, cipherSuite)
|
||||||
|
if hash != 0 {
|
||||||
|
return finishedHash{hash.New(), hash.New(), nil, nil, buffer, version, prf}
|
||||||
|
}
|
||||||
|
|
||||||
|
return finishedHash{sha1.New(), sha1.New(), md5.New(), md5.New(), buffer, version, prf}
|
||||||
|
}
|
||||||
|
|
||||||
|
// A finishedHash calculates the hash of a set of handshake messages suitable
|
||||||
|
// for including in a Finished message.
|
||||||
|
type finishedHash struct {
|
||||||
|
client hash.Hash
|
||||||
|
server hash.Hash
|
||||||
|
|
||||||
|
// Prior to TLS 1.2, an additional MD5 hash is required.
|
||||||
|
clientMD5 hash.Hash
|
||||||
|
serverMD5 hash.Hash
|
||||||
|
|
||||||
|
// In TLS 1.2, a full buffer is sadly required.
|
||||||
|
buffer []byte
|
||||||
|
|
||||||
|
version uint16
|
||||||
|
prf func(result, secret, label, seed []byte)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (h *finishedHash) Write(msg []byte) (n int, err error) {
|
||||||
|
h.client.Write(msg)
|
||||||
|
h.server.Write(msg)
|
||||||
|
|
||||||
|
if h.version < VersionTLS12 {
|
||||||
|
h.clientMD5.Write(msg)
|
||||||
|
h.serverMD5.Write(msg)
|
||||||
|
}
|
||||||
|
|
||||||
|
if h.buffer != nil {
|
||||||
|
h.buffer = append(h.buffer, msg...)
|
||||||
|
}
|
||||||
|
|
||||||
|
return len(msg), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (h finishedHash) Sum() []byte {
|
||||||
|
if h.version >= VersionTLS12 {
|
||||||
|
return h.client.Sum(nil)
|
||||||
|
}
|
||||||
|
|
||||||
|
out := make([]byte, 0, md5.Size+sha1.Size)
|
||||||
|
out = h.clientMD5.Sum(out)
|
||||||
|
return h.client.Sum(out)
|
||||||
|
}
|
||||||
|
|
||||||
|
// clientSum returns the contents of the verify_data member of a client's
|
||||||
|
// Finished message.
|
||||||
|
func (h finishedHash) clientSum(masterSecret []byte) []byte {
|
||||||
|
out := make([]byte, finishedVerifyLength)
|
||||||
|
h.prf(out, masterSecret, clientFinishedLabel, h.Sum())
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// serverSum returns the contents of the verify_data member of a server's
|
||||||
|
// Finished message.
|
||||||
|
func (h finishedHash) serverSum(masterSecret []byte) []byte {
|
||||||
|
out := make([]byte, finishedVerifyLength)
|
||||||
|
h.prf(out, masterSecret, serverFinishedLabel, h.Sum())
|
||||||
|
return out
|
||||||
|
}
|
||||||
|
|
||||||
|
// hashForClientCertificate returns the handshake messages so far, pre-hashed if
|
||||||
|
// necessary, suitable for signing by a TLS client certificate.
|
||||||
|
func (h finishedHash) hashForClientCertificate(sigType uint8, hashAlg crypto.Hash, masterSecret []byte) []byte {
|
||||||
|
if (h.version >= VersionTLS12 || sigType == signatureEd25519) && h.buffer == nil {
|
||||||
|
panic("tls: handshake hash for a client certificate requested after discarding the handshake buffer")
|
||||||
|
}
|
||||||
|
|
||||||
|
if sigType == signatureEd25519 {
|
||||||
|
return h.buffer
|
||||||
|
}
|
||||||
|
|
||||||
|
if h.version >= VersionTLS12 {
|
||||||
|
hash := hashAlg.New()
|
||||||
|
hash.Write(h.buffer)
|
||||||
|
return hash.Sum(nil)
|
||||||
|
}
|
||||||
|
|
||||||
|
if sigType == signatureECDSA {
|
||||||
|
return h.server.Sum(nil)
|
||||||
|
}
|
||||||
|
|
||||||
|
return h.Sum()
|
||||||
|
}
|
||||||
|
|
||||||
|
// discardHandshakeBuffer is called when there is no more need to
|
||||||
|
// buffer the entirety of the handshake messages.
|
||||||
|
func (h *finishedHash) discardHandshakeBuffer() {
|
||||||
|
h.buffer = nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// noExportedKeyingMaterial is used as a value of
|
||||||
|
// ConnectionState.ekm when renegotiation is enabled and thus
|
||||||
|
// we wish to fail all key-material export requests.
|
||||||
|
func noExportedKeyingMaterial(label string, context []byte, length int) ([]byte, error) {
|
||||||
|
return nil, errors.New("crypto/tls: ExportKeyingMaterial is unavailable when renegotiation is enabled")
|
||||||
|
}
|
||||||
|
|
||||||
|
// ekmFromMasterSecret generates exported keying material as defined in RFC 5705.
|
||||||
|
func ekmFromMasterSecret(version uint16, suite *cipherSuite, masterSecret, clientRandom, serverRandom []byte) func(string, []byte, int) ([]byte, error) {
|
||||||
|
return func(label string, context []byte, length int) ([]byte, error) {
|
||||||
|
switch label {
|
||||||
|
case "client finished", "server finished", "master secret", "key expansion":
|
||||||
|
// These values are reserved and may not be used.
|
||||||
|
return nil, fmt.Errorf("crypto/tls: reserved ExportKeyingMaterial label: %s", label)
|
||||||
|
}
|
||||||
|
|
||||||
|
seedLen := len(serverRandom) + len(clientRandom)
|
||||||
|
if context != nil {
|
||||||
|
seedLen += 2 + len(context)
|
||||||
|
}
|
||||||
|
seed := make([]byte, 0, seedLen)
|
||||||
|
|
||||||
|
seed = append(seed, clientRandom...)
|
||||||
|
seed = append(seed, serverRandom...)
|
||||||
|
|
||||||
|
if context != nil {
|
||||||
|
if len(context) >= 1<<16 {
|
||||||
|
return nil, fmt.Errorf("crypto/tls: ExportKeyingMaterial context too long")
|
||||||
|
}
|
||||||
|
seed = append(seed, byte(len(context)>>8), byte(len(context)))
|
||||||
|
seed = append(seed, context...)
|
||||||
|
}
|
||||||
|
|
||||||
|
keyMaterial := make([]byte, length)
|
||||||
|
prfForVersion(version, suite)(keyMaterial, masterSecret, []byte(label), seed)
|
||||||
|
return keyMaterial, nil
|
||||||
|
}
|
||||||
|
}
|
|
@ -0,0 +1,259 @@
|
||||||
|
// Copyright 2012 The Go Authors. All rights reserved.
|
||||||
|
// Use of this source code is governed by a BSD-style
|
||||||
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
|
package qtls
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bytes"
|
||||||
|
"crypto/aes"
|
||||||
|
"crypto/cipher"
|
||||||
|
"crypto/hmac"
|
||||||
|
"crypto/sha256"
|
||||||
|
"crypto/subtle"
|
||||||
|
"errors"
|
||||||
|
"io"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"golang.org/x/crypto/cryptobyte"
|
||||||
|
)
|
||||||
|
|
||||||
|
// sessionState contains the information that is serialized into a session
|
||||||
|
// ticket in order to later resume a connection.
|
||||||
|
type sessionState struct {
|
||||||
|
vers uint16
|
||||||
|
cipherSuite uint16
|
||||||
|
createdAt uint64
|
||||||
|
masterSecret []byte // opaque master_secret<1..2^16-1>;
|
||||||
|
// struct { opaque certificate<1..2^24-1> } Certificate;
|
||||||
|
certificates [][]byte // Certificate certificate_list<0..2^24-1>;
|
||||||
|
|
||||||
|
// usedOldKey is true if the ticket from which this session came from
|
||||||
|
// was encrypted with an older key and thus should be refreshed.
|
||||||
|
usedOldKey bool
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *sessionState) marshal() []byte {
|
||||||
|
var b cryptobyte.Builder
|
||||||
|
b.AddUint16(m.vers)
|
||||||
|
b.AddUint16(m.cipherSuite)
|
||||||
|
addUint64(&b, m.createdAt)
|
||||||
|
b.AddUint16LengthPrefixed(func(b *cryptobyte.Builder) {
|
||||||
|
b.AddBytes(m.masterSecret)
|
||||||
|
})
|
||||||
|
b.AddUint24LengthPrefixed(func(b *cryptobyte.Builder) {
|
||||||
|
for _, cert := range m.certificates {
|
||||||
|
b.AddUint24LengthPrefixed(func(b *cryptobyte.Builder) {
|
||||||
|
b.AddBytes(cert)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
})
|
||||||
|
return b.BytesOrPanic()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *sessionState) unmarshal(data []byte) bool {
|
||||||
|
*m = sessionState{usedOldKey: m.usedOldKey}
|
||||||
|
s := cryptobyte.String(data)
|
||||||
|
if ok := s.ReadUint16(&m.vers) &&
|
||||||
|
s.ReadUint16(&m.cipherSuite) &&
|
||||||
|
readUint64(&s, &m.createdAt) &&
|
||||||
|
readUint16LengthPrefixed(&s, &m.masterSecret) &&
|
||||||
|
len(m.masterSecret) != 0; !ok {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
var certList cryptobyte.String
|
||||||
|
if !s.ReadUint24LengthPrefixed(&certList) {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
for !certList.Empty() {
|
||||||
|
var cert []byte
|
||||||
|
if !readUint24LengthPrefixed(&certList, &cert) {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
m.certificates = append(m.certificates, cert)
|
||||||
|
}
|
||||||
|
return s.Empty()
|
||||||
|
}
|
||||||
|
|
||||||
|
// sessionStateTLS13 is the content of a TLS 1.3 session ticket. Its first
|
||||||
|
// version (revision = 0) doesn't carry any of the information needed for 0-RTT
|
||||||
|
// validation and the nonce is always empty.
|
||||||
|
// version (revision = 1) carries the max_early_data_size sent in the ticket.
|
||||||
|
// version (revision = 2) carries the ALPN sent in the ticket.
|
||||||
|
type sessionStateTLS13 struct {
|
||||||
|
// uint8 version = 0x0304;
|
||||||
|
// uint8 revision = 2;
|
||||||
|
cipherSuite uint16
|
||||||
|
createdAt uint64
|
||||||
|
resumptionSecret []byte // opaque resumption_master_secret<1..2^8-1>;
|
||||||
|
certificate Certificate // CertificateEntry certificate_list<0..2^24-1>;
|
||||||
|
maxEarlyData uint32
|
||||||
|
alpn string
|
||||||
|
|
||||||
|
appData []byte
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *sessionStateTLS13) marshal() []byte {
|
||||||
|
var b cryptobyte.Builder
|
||||||
|
b.AddUint16(VersionTLS13)
|
||||||
|
b.AddUint8(2) // revision
|
||||||
|
b.AddUint16(m.cipherSuite)
|
||||||
|
addUint64(&b, m.createdAt)
|
||||||
|
b.AddUint8LengthPrefixed(func(b *cryptobyte.Builder) {
|
||||||
|
b.AddBytes(m.resumptionSecret)
|
||||||
|
})
|
||||||
|
marshalCertificate(&b, m.certificate)
|
||||||
|
b.AddUint32(m.maxEarlyData)
|
||||||
|
b.AddUint8LengthPrefixed(func(b *cryptobyte.Builder) {
|
||||||
|
b.AddBytes([]byte(m.alpn))
|
||||||
|
})
|
||||||
|
b.AddUint16LengthPrefixed(func(b *cryptobyte.Builder) {
|
||||||
|
b.AddBytes(m.appData)
|
||||||
|
})
|
||||||
|
return b.BytesOrPanic()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (m *sessionStateTLS13) unmarshal(data []byte) bool {
|
||||||
|
*m = sessionStateTLS13{}
|
||||||
|
s := cryptobyte.String(data)
|
||||||
|
var version uint16
|
||||||
|
var revision uint8
|
||||||
|
var alpn []byte
|
||||||
|
ret := s.ReadUint16(&version) &&
|
||||||
|
version == VersionTLS13 &&
|
||||||
|
s.ReadUint8(&revision) &&
|
||||||
|
revision == 2 &&
|
||||||
|
s.ReadUint16(&m.cipherSuite) &&
|
||||||
|
readUint64(&s, &m.createdAt) &&
|
||||||
|
readUint8LengthPrefixed(&s, &m.resumptionSecret) &&
|
||||||
|
len(m.resumptionSecret) != 0 &&
|
||||||
|
unmarshalCertificate(&s, &m.certificate) &&
|
||||||
|
s.ReadUint32(&m.maxEarlyData) &&
|
||||||
|
readUint8LengthPrefixed(&s, &alpn) &&
|
||||||
|
readUint16LengthPrefixed(&s, &m.appData) &&
|
||||||
|
s.Empty()
|
||||||
|
m.alpn = string(alpn)
|
||||||
|
return ret
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *Conn) encryptTicket(state []byte) ([]byte, error) {
|
||||||
|
if len(c.ticketKeys) == 0 {
|
||||||
|
return nil, errors.New("tls: internal error: session ticket keys unavailable")
|
||||||
|
}
|
||||||
|
|
||||||
|
encrypted := make([]byte, ticketKeyNameLen+aes.BlockSize+len(state)+sha256.Size)
|
||||||
|
keyName := encrypted[:ticketKeyNameLen]
|
||||||
|
iv := encrypted[ticketKeyNameLen : ticketKeyNameLen+aes.BlockSize]
|
||||||
|
macBytes := encrypted[len(encrypted)-sha256.Size:]
|
||||||
|
|
||||||
|
if _, err := io.ReadFull(c.config.rand(), iv); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
key := c.ticketKeys[0]
|
||||||
|
copy(keyName, key.keyName[:])
|
||||||
|
block, err := aes.NewCipher(key.aesKey[:])
|
||||||
|
if err != nil {
|
||||||
|
return nil, errors.New("tls: failed to create cipher while encrypting ticket: " + err.Error())
|
||||||
|
}
|
||||||
|
cipher.NewCTR(block, iv).XORKeyStream(encrypted[ticketKeyNameLen+aes.BlockSize:], state)
|
||||||
|
|
||||||
|
mac := hmac.New(sha256.New, key.hmacKey[:])
|
||||||
|
mac.Write(encrypted[:len(encrypted)-sha256.Size])
|
||||||
|
mac.Sum(macBytes[:0])
|
||||||
|
|
||||||
|
return encrypted, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *Conn) decryptTicket(encrypted []byte) (plaintext []byte, usedOldKey bool) {
|
||||||
|
if len(encrypted) < ticketKeyNameLen+aes.BlockSize+sha256.Size {
|
||||||
|
return nil, false
|
||||||
|
}
|
||||||
|
|
||||||
|
keyName := encrypted[:ticketKeyNameLen]
|
||||||
|
iv := encrypted[ticketKeyNameLen : ticketKeyNameLen+aes.BlockSize]
|
||||||
|
macBytes := encrypted[len(encrypted)-sha256.Size:]
|
||||||
|
ciphertext := encrypted[ticketKeyNameLen+aes.BlockSize : len(encrypted)-sha256.Size]
|
||||||
|
|
||||||
|
keyIndex := -1
|
||||||
|
for i, candidateKey := range c.ticketKeys {
|
||||||
|
if bytes.Equal(keyName, candidateKey.keyName[:]) {
|
||||||
|
keyIndex = i
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if keyIndex == -1 {
|
||||||
|
return nil, false
|
||||||
|
}
|
||||||
|
key := &c.ticketKeys[keyIndex]
|
||||||
|
|
||||||
|
mac := hmac.New(sha256.New, key.hmacKey[:])
|
||||||
|
mac.Write(encrypted[:len(encrypted)-sha256.Size])
|
||||||
|
expected := mac.Sum(nil)
|
||||||
|
|
||||||
|
if subtle.ConstantTimeCompare(macBytes, expected) != 1 {
|
||||||
|
return nil, false
|
||||||
|
}
|
||||||
|
|
||||||
|
block, err := aes.NewCipher(key.aesKey[:])
|
||||||
|
if err != nil {
|
||||||
|
return nil, false
|
||||||
|
}
|
||||||
|
plaintext = make([]byte, len(ciphertext))
|
||||||
|
cipher.NewCTR(block, iv).XORKeyStream(plaintext, ciphertext)
|
||||||
|
|
||||||
|
return plaintext, keyIndex > 0
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *Conn) getSessionTicketMsg(appData []byte) (*newSessionTicketMsgTLS13, error) {
|
||||||
|
m := new(newSessionTicketMsgTLS13)
|
||||||
|
|
||||||
|
var certsFromClient [][]byte
|
||||||
|
for _, cert := range c.peerCertificates {
|
||||||
|
certsFromClient = append(certsFromClient, cert.Raw)
|
||||||
|
}
|
||||||
|
state := sessionStateTLS13{
|
||||||
|
cipherSuite: c.cipherSuite,
|
||||||
|
createdAt: uint64(c.config.time().Unix()),
|
||||||
|
resumptionSecret: c.resumptionSecret,
|
||||||
|
certificate: Certificate{
|
||||||
|
Certificate: certsFromClient,
|
||||||
|
OCSPStaple: c.ocspResponse,
|
||||||
|
SignedCertificateTimestamps: c.scts,
|
||||||
|
},
|
||||||
|
appData: appData,
|
||||||
|
alpn: c.clientProtocol,
|
||||||
|
}
|
||||||
|
if c.extraConfig != nil {
|
||||||
|
state.maxEarlyData = c.extraConfig.MaxEarlyData
|
||||||
|
}
|
||||||
|
var err error
|
||||||
|
m.label, err = c.encryptTicket(state.marshal())
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
m.lifetime = uint32(maxSessionTicketLifetime / time.Second)
|
||||||
|
if c.extraConfig != nil {
|
||||||
|
m.maxEarlyData = c.extraConfig.MaxEarlyData
|
||||||
|
}
|
||||||
|
return m, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// GetSessionTicket generates a new session ticket.
|
||||||
|
// It should only be called after the handshake completes.
|
||||||
|
// It can only be used for servers, and only if the alternative record layer is set.
|
||||||
|
// The ticket may be nil if config.SessionTicketsDisabled is set,
|
||||||
|
// or if the client isn't able to receive session tickets.
|
||||||
|
func (c *Conn) GetSessionTicket(appData []byte) ([]byte, error) {
|
||||||
|
if c.isClient || !c.handshakeComplete() || c.extraConfig == nil || c.extraConfig.AlternativeRecordLayer == nil {
|
||||||
|
return nil, errors.New("GetSessionTicket is only valid for servers after completion of the handshake, and if an alternative record layer is set.")
|
||||||
|
}
|
||||||
|
if c.config.SessionTicketsDisabled {
|
||||||
|
return nil, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
m, err := c.getSessionTicketMsg(appData)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return m.marshal(), nil
|
||||||
|
}
|
|
@ -0,0 +1,362 @@
|
||||||
|
// Copyright 2009 The Go Authors. All rights reserved.
|
||||||
|
// Use of this source code is governed by a BSD-style
|
||||||
|
// license that can be found in the LICENSE file.
|
||||||
|
|
||||||
|
// package qtls partially implements TLS 1.2, as specified in RFC 5246,
|
||||||
|
// and TLS 1.3, as specified in RFC 8446.
|
||||||
|
package qtls
|
||||||
|
|
||||||
|
// BUG(agl): The crypto/tls package only implements some countermeasures
|
||||||
|
// against Lucky13 attacks on CBC-mode encryption, and only on SHA1
|
||||||
|
// variants. See http://www.isg.rhul.ac.uk/tls/TLStiming.pdf and
|
||||||
|
// https://www.imperialviolet.org/2013/02/04/luckythirteen.html.
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bytes"
|
||||||
|
"context"
|
||||||
|
"crypto"
|
||||||
|
"crypto/ecdsa"
|
||||||
|
"crypto/ed25519"
|
||||||
|
"crypto/rsa"
|
||||||
|
"crypto/x509"
|
||||||
|
"encoding/pem"
|
||||||
|
"errors"
|
||||||
|
"fmt"
|
||||||
|
"net"
|
||||||
|
"os"
|
||||||
|
"strings"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Server returns a new TLS server side connection
|
||||||
|
// using conn as the underlying transport.
|
||||||
|
// The configuration config must be non-nil and must include
|
||||||
|
// at least one certificate or else set GetCertificate.
|
||||||
|
func Server(conn net.Conn, config *Config, extraConfig *ExtraConfig) *Conn {
|
||||||
|
c := &Conn{
|
||||||
|
conn: conn,
|
||||||
|
config: fromConfig(config),
|
||||||
|
extraConfig: extraConfig,
|
||||||
|
}
|
||||||
|
c.handshakeFn = c.serverHandshake
|
||||||
|
return c
|
||||||
|
}
|
||||||
|
|
||||||
|
// Client returns a new TLS client side connection
|
||||||
|
// using conn as the underlying transport.
|
||||||
|
// The config cannot be nil: users must set either ServerName or
|
||||||
|
// InsecureSkipVerify in the config.
|
||||||
|
func Client(conn net.Conn, config *Config, extraConfig *ExtraConfig) *Conn {
|
||||||
|
c := &Conn{
|
||||||
|
conn: conn,
|
||||||
|
config: fromConfig(config),
|
||||||
|
extraConfig: extraConfig,
|
||||||
|
isClient: true,
|
||||||
|
}
|
||||||
|
c.handshakeFn = c.clientHandshake
|
||||||
|
return c
|
||||||
|
}
|
||||||
|
|
||||||
|
// A listener implements a network listener (net.Listener) for TLS connections.
|
||||||
|
type listener struct {
|
||||||
|
net.Listener
|
||||||
|
config *Config
|
||||||
|
extraConfig *ExtraConfig
|
||||||
|
}
|
||||||
|
|
||||||
|
// Accept waits for and returns the next incoming TLS connection.
|
||||||
|
// The returned connection is of type *Conn.
|
||||||
|
func (l *listener) Accept() (net.Conn, error) {
|
||||||
|
c, err := l.Listener.Accept()
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return Server(c, l.config, l.extraConfig), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewListener creates a Listener which accepts connections from an inner
|
||||||
|
// Listener and wraps each connection with Server.
|
||||||
|
// The configuration config must be non-nil and must include
|
||||||
|
// at least one certificate or else set GetCertificate.
|
||||||
|
func NewListener(inner net.Listener, config *Config, extraConfig *ExtraConfig) net.Listener {
|
||||||
|
l := new(listener)
|
||||||
|
l.Listener = inner
|
||||||
|
l.config = config
|
||||||
|
l.extraConfig = extraConfig
|
||||||
|
return l
|
||||||
|
}
|
||||||
|
|
||||||
|
// Listen creates a TLS listener accepting connections on the
|
||||||
|
// given network address using net.Listen.
|
||||||
|
// The configuration config must be non-nil and must include
|
||||||
|
// at least one certificate or else set GetCertificate.
|
||||||
|
func Listen(network, laddr string, config *Config, extraConfig *ExtraConfig) (net.Listener, error) {
|
||||||
|
if config == nil || len(config.Certificates) == 0 &&
|
||||||
|
config.GetCertificate == nil && config.GetConfigForClient == nil {
|
||||||
|
return nil, errors.New("tls: neither Certificates, GetCertificate, nor GetConfigForClient set in Config")
|
||||||
|
}
|
||||||
|
l, err := net.Listen(network, laddr)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return NewListener(l, config, extraConfig), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
type timeoutError struct{}
|
||||||
|
|
||||||
|
func (timeoutError) Error() string { return "tls: DialWithDialer timed out" }
|
||||||
|
func (timeoutError) Timeout() bool { return true }
|
||||||
|
func (timeoutError) Temporary() bool { return true }
|
||||||
|
|
||||||
|
// DialWithDialer connects to the given network address using dialer.Dial and
|
||||||
|
// then initiates a TLS handshake, returning the resulting TLS connection. Any
|
||||||
|
// timeout or deadline given in the dialer apply to connection and TLS
|
||||||
|
// handshake as a whole.
|
||||||
|
//
|
||||||
|
// DialWithDialer interprets a nil configuration as equivalent to the zero
|
||||||
|
// configuration; see the documentation of Config for the defaults.
|
||||||
|
//
|
||||||
|
// DialWithDialer uses context.Background internally; to specify the context,
|
||||||
|
// use Dialer.DialContext with NetDialer set to the desired dialer.
|
||||||
|
func DialWithDialer(dialer *net.Dialer, network, addr string, config *Config, extraConfig *ExtraConfig) (*Conn, error) {
|
||||||
|
return dial(context.Background(), dialer, network, addr, config, extraConfig)
|
||||||
|
}
|
||||||
|
|
||||||
|
func dial(ctx context.Context, netDialer *net.Dialer, network, addr string, config *Config, extraConfig *ExtraConfig) (*Conn, error) {
|
||||||
|
if netDialer.Timeout != 0 {
|
||||||
|
var cancel context.CancelFunc
|
||||||
|
ctx, cancel = context.WithTimeout(ctx, netDialer.Timeout)
|
||||||
|
defer cancel()
|
||||||
|
}
|
||||||
|
|
||||||
|
if !netDialer.Deadline.IsZero() {
|
||||||
|
var cancel context.CancelFunc
|
||||||
|
ctx, cancel = context.WithDeadline(ctx, netDialer.Deadline)
|
||||||
|
defer cancel()
|
||||||
|
}
|
||||||
|
|
||||||
|
rawConn, err := netDialer.DialContext(ctx, network, addr)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
colonPos := strings.LastIndex(addr, ":")
|
||||||
|
if colonPos == -1 {
|
||||||
|
colonPos = len(addr)
|
||||||
|
}
|
||||||
|
hostname := addr[:colonPos]
|
||||||
|
|
||||||
|
if config == nil {
|
||||||
|
config = defaultConfig()
|
||||||
|
}
|
||||||
|
// If no ServerName is set, infer the ServerName
|
||||||
|
// from the hostname we're connecting to.
|
||||||
|
if config.ServerName == "" {
|
||||||
|
// Make a copy to avoid polluting argument or default.
|
||||||
|
c := config.Clone()
|
||||||
|
c.ServerName = hostname
|
||||||
|
config = c
|
||||||
|
}
|
||||||
|
|
||||||
|
conn := Client(rawConn, config, extraConfig)
|
||||||
|
if err := conn.HandshakeContext(ctx); err != nil {
|
||||||
|
rawConn.Close()
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return conn, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Dial connects to the given network address using net.Dial
|
||||||
|
// and then initiates a TLS handshake, returning the resulting
|
||||||
|
// TLS connection.
|
||||||
|
// Dial interprets a nil configuration as equivalent to
|
||||||
|
// the zero configuration; see the documentation of Config
|
||||||
|
// for the defaults.
|
||||||
|
func Dial(network, addr string, config *Config, extraConfig *ExtraConfig) (*Conn, error) {
|
||||||
|
return DialWithDialer(new(net.Dialer), network, addr, config, extraConfig)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Dialer dials TLS connections given a configuration and a Dialer for the
|
||||||
|
// underlying connection.
|
||||||
|
type Dialer struct {
|
||||||
|
// NetDialer is the optional dialer to use for the TLS connections'
|
||||||
|
// underlying TCP connections.
|
||||||
|
// A nil NetDialer is equivalent to the net.Dialer zero value.
|
||||||
|
NetDialer *net.Dialer
|
||||||
|
|
||||||
|
// Config is the TLS configuration to use for new connections.
|
||||||
|
// A nil configuration is equivalent to the zero
|
||||||
|
// configuration; see the documentation of Config for the
|
||||||
|
// defaults.
|
||||||
|
Config *Config
|
||||||
|
|
||||||
|
ExtraConfig *ExtraConfig
|
||||||
|
}
|
||||||
|
|
||||||
|
// Dial connects to the given network address and initiates a TLS
|
||||||
|
// handshake, returning the resulting TLS connection.
|
||||||
|
//
|
||||||
|
// The returned Conn, if any, will always be of type *Conn.
|
||||||
|
//
|
||||||
|
// Dial uses context.Background internally; to specify the context,
|
||||||
|
// use DialContext.
|
||||||
|
func (d *Dialer) Dial(network, addr string) (net.Conn, error) {
|
||||||
|
return d.DialContext(context.Background(), network, addr)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (d *Dialer) netDialer() *net.Dialer {
|
||||||
|
if d.NetDialer != nil {
|
||||||
|
return d.NetDialer
|
||||||
|
}
|
||||||
|
return new(net.Dialer)
|
||||||
|
}
|
||||||
|
|
||||||
|
// DialContext connects to the given network address and initiates a TLS
|
||||||
|
// handshake, returning the resulting TLS connection.
|
||||||
|
//
|
||||||
|
// The provided Context must be non-nil. If the context expires before
|
||||||
|
// the connection is complete, an error is returned. Once successfully
|
||||||
|
// connected, any expiration of the context will not affect the
|
||||||
|
// connection.
|
||||||
|
//
|
||||||
|
// The returned Conn, if any, will always be of type *Conn.
|
||||||
|
func (d *Dialer) DialContext(ctx context.Context, network, addr string) (net.Conn, error) {
|
||||||
|
c, err := dial(ctx, d.netDialer(), network, addr, d.Config, d.ExtraConfig)
|
||||||
|
if err != nil {
|
||||||
|
// Don't return c (a typed nil) in an interface.
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return c, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// LoadX509KeyPair reads and parses a public/private key pair from a pair
|
||||||
|
// of files. The files must contain PEM encoded data. The certificate file
|
||||||
|
// may contain intermediate certificates following the leaf certificate to
|
||||||
|
// form a certificate chain. On successful return, Certificate.Leaf will
|
||||||
|
// be nil because the parsed form of the certificate is not retained.
|
||||||
|
func LoadX509KeyPair(certFile, keyFile string) (Certificate, error) {
|
||||||
|
certPEMBlock, err := os.ReadFile(certFile)
|
||||||
|
if err != nil {
|
||||||
|
return Certificate{}, err
|
||||||
|
}
|
||||||
|
keyPEMBlock, err := os.ReadFile(keyFile)
|
||||||
|
if err != nil {
|
||||||
|
return Certificate{}, err
|
||||||
|
}
|
||||||
|
return X509KeyPair(certPEMBlock, keyPEMBlock)
|
||||||
|
}
|
||||||
|
|
||||||
|
// X509KeyPair parses a public/private key pair from a pair of
|
||||||
|
// PEM encoded data. On successful return, Certificate.Leaf will be nil because
|
||||||
|
// the parsed form of the certificate is not retained.
|
||||||
|
func X509KeyPair(certPEMBlock, keyPEMBlock []byte) (Certificate, error) {
|
||||||
|
fail := func(err error) (Certificate, error) { return Certificate{}, err }
|
||||||
|
|
||||||
|
var cert Certificate
|
||||||
|
var skippedBlockTypes []string
|
||||||
|
for {
|
||||||
|
var certDERBlock *pem.Block
|
||||||
|
certDERBlock, certPEMBlock = pem.Decode(certPEMBlock)
|
||||||
|
if certDERBlock == nil {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
if certDERBlock.Type == "CERTIFICATE" {
|
||||||
|
cert.Certificate = append(cert.Certificate, certDERBlock.Bytes)
|
||||||
|
} else {
|
||||||
|
skippedBlockTypes = append(skippedBlockTypes, certDERBlock.Type)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(cert.Certificate) == 0 {
|
||||||
|
if len(skippedBlockTypes) == 0 {
|
||||||
|
return fail(errors.New("tls: failed to find any PEM data in certificate input"))
|
||||||
|
}
|
||||||
|
if len(skippedBlockTypes) == 1 && strings.HasSuffix(skippedBlockTypes[0], "PRIVATE KEY") {
|
||||||
|
return fail(errors.New("tls: failed to find certificate PEM data in certificate input, but did find a private key; PEM inputs may have been switched"))
|
||||||
|
}
|
||||||
|
return fail(fmt.Errorf("tls: failed to find \"CERTIFICATE\" PEM block in certificate input after skipping PEM blocks of the following types: %v", skippedBlockTypes))
|
||||||
|
}
|
||||||
|
|
||||||
|
skippedBlockTypes = skippedBlockTypes[:0]
|
||||||
|
var keyDERBlock *pem.Block
|
||||||
|
for {
|
||||||
|
keyDERBlock, keyPEMBlock = pem.Decode(keyPEMBlock)
|
||||||
|
if keyDERBlock == nil {
|
||||||
|
if len(skippedBlockTypes) == 0 {
|
||||||
|
return fail(errors.New("tls: failed to find any PEM data in key input"))
|
||||||
|
}
|
||||||
|
if len(skippedBlockTypes) == 1 && skippedBlockTypes[0] == "CERTIFICATE" {
|
||||||
|
return fail(errors.New("tls: found a certificate rather than a key in the PEM for the private key"))
|
||||||
|
}
|
||||||
|
return fail(fmt.Errorf("tls: failed to find PEM block with type ending in \"PRIVATE KEY\" in key input after skipping PEM blocks of the following types: %v", skippedBlockTypes))
|
||||||
|
}
|
||||||
|
if keyDERBlock.Type == "PRIVATE KEY" || strings.HasSuffix(keyDERBlock.Type, " PRIVATE KEY") {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
skippedBlockTypes = append(skippedBlockTypes, keyDERBlock.Type)
|
||||||
|
}
|
||||||
|
|
||||||
|
// We don't need to parse the public key for TLS, but we so do anyway
|
||||||
|
// to check that it looks sane and matches the private key.
|
||||||
|
x509Cert, err := x509.ParseCertificate(cert.Certificate[0])
|
||||||
|
if err != nil {
|
||||||
|
return fail(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
cert.PrivateKey, err = parsePrivateKey(keyDERBlock.Bytes)
|
||||||
|
if err != nil {
|
||||||
|
return fail(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
switch pub := x509Cert.PublicKey.(type) {
|
||||||
|
case *rsa.PublicKey:
|
||||||
|
priv, ok := cert.PrivateKey.(*rsa.PrivateKey)
|
||||||
|
if !ok {
|
||||||
|
return fail(errors.New("tls: private key type does not match public key type"))
|
||||||
|
}
|
||||||
|
if pub.N.Cmp(priv.N) != 0 {
|
||||||
|
return fail(errors.New("tls: private key does not match public key"))
|
||||||
|
}
|
||||||
|
case *ecdsa.PublicKey:
|
||||||
|
priv, ok := cert.PrivateKey.(*ecdsa.PrivateKey)
|
||||||
|
if !ok {
|
||||||
|
return fail(errors.New("tls: private key type does not match public key type"))
|
||||||
|
}
|
||||||
|
if pub.X.Cmp(priv.X) != 0 || pub.Y.Cmp(priv.Y) != 0 {
|
||||||
|
return fail(errors.New("tls: private key does not match public key"))
|
||||||
|
}
|
||||||
|
case ed25519.PublicKey:
|
||||||
|
priv, ok := cert.PrivateKey.(ed25519.PrivateKey)
|
||||||
|
if !ok {
|
||||||
|
return fail(errors.New("tls: private key type does not match public key type"))
|
||||||
|
}
|
||||||
|
if !bytes.Equal(priv.Public().(ed25519.PublicKey), pub) {
|
||||||
|
return fail(errors.New("tls: private key does not match public key"))
|
||||||
|
}
|
||||||
|
default:
|
||||||
|
return fail(errors.New("tls: unknown public key algorithm"))
|
||||||
|
}
|
||||||
|
|
||||||
|
return cert, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Attempt to parse the given private key DER block. OpenSSL 0.9.8 generates
|
||||||
|
// PKCS #1 private keys by default, while OpenSSL 1.0.0 generates PKCS #8 keys.
|
||||||
|
// OpenSSL ecparam generates SEC1 EC private keys for ECDSA. We try all three.
|
||||||
|
func parsePrivateKey(der []byte) (crypto.PrivateKey, error) {
|
||||||
|
if key, err := x509.ParsePKCS1PrivateKey(der); err == nil {
|
||||||
|
return key, nil
|
||||||
|
}
|
||||||
|
if key, err := x509.ParsePKCS8PrivateKey(der); err == nil {
|
||||||
|
switch key := key.(type) {
|
||||||
|
case *rsa.PrivateKey, *ecdsa.PrivateKey, ed25519.PrivateKey:
|
||||||
|
return key, nil
|
||||||
|
default:
|
||||||
|
return nil, errors.New("tls: found unknown private key type in PKCS#8 wrapping")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if key, err := x509.ParseECPrivateKey(der); err == nil {
|
||||||
|
return key, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil, errors.New("tls: failed to parse private key")
|
||||||
|
}
|
|
@ -0,0 +1,96 @@
|
||||||
|
package qtls
|
||||||
|
|
||||||
|
import (
|
||||||
|
"crypto/tls"
|
||||||
|
"reflect"
|
||||||
|
"unsafe"
|
||||||
|
)
|
||||||
|
|
||||||
|
func init() {
|
||||||
|
if !structsEqual(&tls.ConnectionState{}, &connectionState{}) {
|
||||||
|
panic("qtls.ConnectionState doesn't match")
|
||||||
|
}
|
||||||
|
if !structsEqual(&tls.ClientSessionState{}, &clientSessionState{}) {
|
||||||
|
panic("qtls.ClientSessionState doesn't match")
|
||||||
|
}
|
||||||
|
if !structsEqual(&tls.CertificateRequestInfo{}, &certificateRequestInfo{}) {
|
||||||
|
panic("qtls.CertificateRequestInfo doesn't match")
|
||||||
|
}
|
||||||
|
if !structsEqual(&tls.Config{}, &config{}) {
|
||||||
|
panic("qtls.Config doesn't match")
|
||||||
|
}
|
||||||
|
if !structsEqual(&tls.ClientHelloInfo{}, &clientHelloInfo{}) {
|
||||||
|
panic("qtls.ClientHelloInfo doesn't match")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func toConnectionState(c connectionState) ConnectionState {
|
||||||
|
return *(*ConnectionState)(unsafe.Pointer(&c))
|
||||||
|
}
|
||||||
|
|
||||||
|
func toClientSessionState(s *clientSessionState) *ClientSessionState {
|
||||||
|
return (*ClientSessionState)(unsafe.Pointer(s))
|
||||||
|
}
|
||||||
|
|
||||||
|
func fromClientSessionState(s *ClientSessionState) *clientSessionState {
|
||||||
|
return (*clientSessionState)(unsafe.Pointer(s))
|
||||||
|
}
|
||||||
|
|
||||||
|
func toCertificateRequestInfo(i *certificateRequestInfo) *CertificateRequestInfo {
|
||||||
|
return (*CertificateRequestInfo)(unsafe.Pointer(i))
|
||||||
|
}
|
||||||
|
|
||||||
|
func toConfig(c *config) *Config {
|
||||||
|
return (*Config)(unsafe.Pointer(c))
|
||||||
|
}
|
||||||
|
|
||||||
|
func fromConfig(c *Config) *config {
|
||||||
|
return (*config)(unsafe.Pointer(c))
|
||||||
|
}
|
||||||
|
|
||||||
|
func toClientHelloInfo(chi *clientHelloInfo) *ClientHelloInfo {
|
||||||
|
return (*ClientHelloInfo)(unsafe.Pointer(chi))
|
||||||
|
}
|
||||||
|
|
||||||
|
func structsEqual(a, b interface{}) bool {
|
||||||
|
return compare(reflect.ValueOf(a), reflect.ValueOf(b))
|
||||||
|
}
|
||||||
|
|
||||||
|
func compare(a, b reflect.Value) bool {
|
||||||
|
sa := a.Elem()
|
||||||
|
sb := b.Elem()
|
||||||
|
if sa.NumField() != sb.NumField() {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
for i := 0; i < sa.NumField(); i++ {
|
||||||
|
fa := sa.Type().Field(i)
|
||||||
|
fb := sb.Type().Field(i)
|
||||||
|
if !reflect.DeepEqual(fa.Index, fb.Index) || fa.Name != fb.Name || fa.Anonymous != fb.Anonymous || fa.Offset != fb.Offset || !reflect.DeepEqual(fa.Type, fb.Type) {
|
||||||
|
if fa.Type.Kind() != fb.Type.Kind() {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
if fa.Type.Kind() == reflect.Slice {
|
||||||
|
if !compareStruct(fa.Type.Elem(), fb.Type.Elem()) {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
|
||||||
|
func compareStruct(a, b reflect.Type) bool {
|
||||||
|
if a.NumField() != b.NumField() {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
for i := 0; i < a.NumField(); i++ {
|
||||||
|
fa := a.Field(i)
|
||||||
|
fb := b.Field(i)
|
||||||
|
if !reflect.DeepEqual(fa.Index, fb.Index) || fa.Name != fb.Name || fa.Anonymous != fb.Anonymous || fa.Offset != fb.Offset || !reflect.DeepEqual(fa.Type, fb.Type) {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return true
|
||||||
|
}
|
|
@ -194,7 +194,7 @@ github.com/json-iterator/go
|
||||||
## explicit
|
## explicit
|
||||||
# github.com/kylelemons/godebug v1.1.0
|
# github.com/kylelemons/godebug v1.1.0
|
||||||
## explicit; go 1.11
|
## explicit; go 1.11
|
||||||
# github.com/lucas-clemente/quic-go v0.24.0
|
# github.com/lucas-clemente/quic-go v0.24.0 => github.com/chungthuang/quic-go v0.24.1-0.20220110095058-981dc498cb62
|
||||||
## explicit; go 1.16
|
## explicit; go 1.16
|
||||||
github.com/lucas-clemente/quic-go
|
github.com/lucas-clemente/quic-go
|
||||||
github.com/lucas-clemente/quic-go/internal/ackhandler
|
github.com/lucas-clemente/quic-go/internal/ackhandler
|
||||||
|
@ -219,6 +219,9 @@ github.com/marten-seemann/qtls-go1-16
|
||||||
# github.com/marten-seemann/qtls-go1-17 v0.1.0
|
# github.com/marten-seemann/qtls-go1-17 v0.1.0
|
||||||
## explicit; go 1.17
|
## explicit; go 1.17
|
||||||
github.com/marten-seemann/qtls-go1-17
|
github.com/marten-seemann/qtls-go1-17
|
||||||
|
# github.com/marten-seemann/qtls-go1-18 v0.1.0-beta.1
|
||||||
|
## explicit; go 1.18
|
||||||
|
github.com/marten-seemann/qtls-go1-18
|
||||||
# github.com/mattn/go-colorable v0.1.8
|
# github.com/mattn/go-colorable v0.1.8
|
||||||
## explicit; go 1.13
|
## explicit; go 1.13
|
||||||
github.com/mattn/go-colorable
|
github.com/mattn/go-colorable
|
||||||
|
@ -554,3 +557,4 @@ zombiezen.com/go/capnproto2/schemas
|
||||||
zombiezen.com/go/capnproto2/server
|
zombiezen.com/go/capnproto2/server
|
||||||
zombiezen.com/go/capnproto2/std/capnp/rpc
|
zombiezen.com/go/capnproto2/std/capnp/rpc
|
||||||
# github.com/urfave/cli/v2 => github.com/ipostelnik/cli/v2 v2.3.1-0.20210324024421-b6ea8234fe3d
|
# github.com/urfave/cli/v2 => github.com/ipostelnik/cli/v2 v2.3.1-0.20210324024421-b6ea8234fe3d
|
||||||
|
# github.com/lucas-clemente/quic-go => github.com/chungthuang/quic-go v0.24.1-0.20220110095058-981dc498cb62
|
||||||
|
|
Loading…
Reference in New Issue