Add negotiated group to ConnectionState

This commit is contained in:
Henry Case 2019-05-12 20:22:21 +01:00
父節點 54bbc0bf29
當前提交 70a7cea10b
共有 7 個檔案被更改,包括 20 行新增5 行删除

4
13.go
查看文件

@ -351,6 +351,7 @@ CurvePreferenceLoop:
c.phase = waitingClientFinished
}
hs.c.Group = hs.hello.keyShare.group
return nil
}
@ -459,6 +460,7 @@ func (hs *serverHandshakeState) readClientFinished13(hasConfirmLock bool) error
c.in.traceErr, c.out.traceErr = nil, nil
c.phase = handshakeConfirmed
atomic.StoreInt32(&c.handshakeConfirmed, 1)
hs.c.Group = hs.hello.keyShare.group
// Any read operation after handshakeRunning and before handshakeConfirmed
// will be holding this lock, which we release as soon as the confirmation
@ -470,7 +472,6 @@ func (hs *serverHandshakeState) readClientFinished13(hasConfirmLock bool) error
if hasConfirmLock {
c.confirmMutex.Unlock()
}
return hs.sendSessionTicket13() // TODO: do in a goroutine
}
@ -532,7 +533,6 @@ func (hs *serverHandshakeState) sendCertificate13() error {
if _, err := c.writeRecord(recordTypeHandshake, verifyMsg.marshal()); err != nil {
return err
}
return nil
}

查看文件

@ -35,6 +35,9 @@ type keyAgreement interface {
// ServerKeyExchange message.
processServerKeyExchange(*Config, *clientHelloMsg, *serverHelloMsg, crypto.PublicKey, *serverKeyExchangeMsg) error
generateClientKeyExchange(*Config, *clientHelloMsg, crypto.PublicKey) ([]byte, *clientKeyExchangeMsg, error)
// Returns ID of negotiated group
NegotiatedGroup() CurveID
}
const (

查看文件

@ -241,7 +241,8 @@ type ConnectionState struct {
// Unique0RTTToken is only present if HandshakeConfirmed is false.
Unique0RTTToken []byte
ClientHello []byte // ClientHello packet
ClientHello []byte // ClientHello packet
Group CurveID // ECDH group used
}
// ClientAuthType declares the policy the server will follow for

查看文件

@ -130,6 +130,8 @@ type Conn struct {
// accept the 0-RTT data. Exposed as ConnectionState.Unique0RTTToken.
binder []byte
Group CurveID // ECDH group used
tmp [16]byte
}
@ -1698,6 +1700,7 @@ func (c *Conn) ConnectionState() ConnectionState {
state.TLSUnique = c.serverFinished[:]
}
}
state.Group = c.Group
}
return state

查看文件

@ -638,7 +638,7 @@ func (hs *clientHandshakeState) doFullHandshake() error {
return err
}
}
c.Group = keyAgreement.NegotiatedGroup()
hs.finishedHash.discardHandshakeBuffer()
return nil

查看文件

@ -647,7 +647,7 @@ func (hs *serverHandshakeState) doFullHandshake() error {
hs.finishedHash.Write(certVerify.marshal())
}
c.Group = keyAgreement.NegotiatedGroup()
hs.finishedHash.discardHandshakeBuffer()
return nil

查看文件

@ -24,6 +24,10 @@ var errServerKeyExchange = errors.New("tls: invalid ServerKeyExchange message")
// encrypts the pre-master secret to the server's public key.
type rsaKeyAgreement struct{}
func (ka rsaKeyAgreement) NegotiatedGroup() CurveID {
return CurveID(0)
}
func (ka rsaKeyAgreement) generateServerKeyExchange(config *Config, sk crypto.PrivateKey, clientHello *clientHelloMsg, hello *serverHelloMsg) (*serverKeyExchangeMsg, error) {
return nil, nil
}
@ -155,6 +159,10 @@ type ecdheKeyAgreement struct {
x, y *big.Int
}
func (ka *ecdheKeyAgreement) NegotiatedGroup() CurveID {
return ka.curveid
}
func (ka *ecdheKeyAgreement) generateServerKeyExchange(config *Config, sk crypto.PrivateKey, clientHello *clientHelloMsg, hello *serverHelloMsg) (*serverKeyExchangeMsg, error) {
preferredCurves := config.curvePreferences()