tris: implement D19 and D20 changes for secrets

D19 added an additional pre-extract Derive-Secret stage. D20 shortened
labels. Bump from D18 to D21 with no backwards compat option for now
since older drafts are considered undeployable.
This commit is contained in:
Peter Wu 2017-11-11 04:41:25 +00:00 committed by Peter Wu
parent ac01048c5e
commit fd93e9ecf6
3 changed files with 18 additions and 12 deletions

27
13.go
View File

@ -67,6 +67,10 @@ func newKeySchedule13(suite *cipherSuite, config *Config, clientRandom []byte) *
func (ks *keySchedule13) setSecret(secret []byte) { func (ks *keySchedule13) setSecret(secret []byte) {
hash := hashForSuite(ks.suite) hash := hashForSuite(ks.suite)
salt := ks.secret salt := ks.secret
if salt != nil {
h0 := hash.New().Sum(nil)
salt = hkdfExpandLabel(hash, salt, h0, "derived", hash.Size())
}
ks.secret = hkdfExtract(hash, secret, salt) ks.secret = hkdfExtract(hash, secret, salt)
} }
@ -79,24 +83,24 @@ func (ks *keySchedule13) write(data []byte) {
func (ks *keySchedule13) getLabel(secretLabel secretLabel) (label, keylogType string) { func (ks *keySchedule13) getLabel(secretLabel secretLabel) (label, keylogType string) {
switch secretLabel { switch secretLabel {
case secretResumptionPskBinder: case secretResumptionPskBinder:
label = "resumption psk binder key" label = "res binder"
case secretEarlyClient: case secretEarlyClient:
label = "client early traffic secret" label = "c e traffic"
keylogType = "CLIENT_EARLY_TRAFFIC_SECRET" keylogType = "CLIENT_EARLY_TRAFFIC_SECRET"
case secretHandshakeClient: case secretHandshakeClient:
label = "client handshake traffic secret" label = "c hs traffic"
keylogType = "CLIENT_HANDSHAKE_TRAFFIC_SECRET" keylogType = "CLIENT_HANDSHAKE_TRAFFIC_SECRET"
case secretHandshakeServer: case secretHandshakeServer:
label = "server handshake traffic secret" label = "s hs traffic"
keylogType = "SERVER_HANDSHAKE_TRAFFIC_SECRET" keylogType = "SERVER_HANDSHAKE_TRAFFIC_SECRET"
case secretApplicationClient: case secretApplicationClient:
label = "client application traffic secret" label = "c ap traffic"
keylogType = "CLIENT_TRAFFIC_SECRET_0" keylogType = "CLIENT_TRAFFIC_SECRET_0"
case secretApplicationServer: case secretApplicationServer:
label = "server application traffic secret" label = "s ap traffic"
keylogType = "SERVER_TRAFFIC_SECRET_0" keylogType = "SERVER_TRAFFIC_SECRET_0"
case secretResumption: case secretResumption:
label = "resumption master secret" label = "res master"
} }
return return
} }
@ -518,12 +522,13 @@ func deriveECDHESecret(ks keyShare, secretKey []byte) []byte {
} }
func hkdfExpandLabel(hash crypto.Hash, secret, hashValue []byte, label string, L int) []byte { func hkdfExpandLabel(hash crypto.Hash, secret, hashValue []byte, label string, L int) []byte {
hkdfLabel := make([]byte, 4+len("TLS 1.3, ")+len(label)+len(hashValue)) prefix := "tls13 "
hkdfLabel := make([]byte, 4+len(prefix)+len(label)+len(hashValue))
hkdfLabel[0] = byte(L >> 8) hkdfLabel[0] = byte(L >> 8)
hkdfLabel[1] = byte(L) hkdfLabel[1] = byte(L)
hkdfLabel[2] = byte(len("TLS 1.3, ") + len(label)) hkdfLabel[2] = byte(len(prefix) + len(label))
copy(hkdfLabel[3:], "TLS 1.3, ") copy(hkdfLabel[3:], prefix)
z := hkdfLabel[3+len("TLS 1.3, "):] z := hkdfLabel[3+len(prefix):]
copy(z, label) copy(z, label)
z = z[len(label):] z = z[len(label):]
z[0] = byte(len(hashValue)) z[0] = byte(len(hashValue))

View File

@ -17,6 +17,7 @@ var tlsVersionToName = map[uint16]string{
tls.VersionTLS12: "1.2", tls.VersionTLS12: "1.2",
tls.VersionTLS13: "1.3", tls.VersionTLS13: "1.3",
tls.VersionTLS13Draft18: "1.3 (draft 18)", tls.VersionTLS13Draft18: "1.3 (draft 18)",
tls.VersionTLS13Draft21: "1.3 (draft 21)",
} }
func startServer(addr string, rsa, offer0RTT, accept0RTT bool) { func startServer(addr string, rsa, offer0RTT, accept0RTT bool) {

View File

@ -855,7 +855,7 @@ var configSuppVersArray = [...]uint16{VersionTLS13, VersionTLS12, VersionTLS11,
// with TLS 1.3 draft versions included. // with TLS 1.3 draft versions included.
// //
// TODO: remove once TLS 1.3 is finalised. // TODO: remove once TLS 1.3 is finalised.
var tls13DraftSuppVersArray = [...]uint16{VersionTLS13Draft18, VersionTLS12, VersionTLS11, VersionTLS10, VersionSSL30} var tls13DraftSuppVersArray = [...]uint16{VersionTLS13Draft21, VersionTLS12, VersionTLS11, VersionTLS10, VersionSSL30}
// getSupportedVersions returns the protocol versions that are supported by the // getSupportedVersions returns the protocol versions that are supported by the
// current configuration. // current configuration.