81 líneas
3.1 KiB
Go
81 líneas
3.1 KiB
Go
package tlshandshake
|
|
|
|
import (
|
|
"fmt"
|
|
"os"
|
|
|
|
"github.com/henrydcase/th5"
|
|
)
|
|
|
|
type Client struct {
|
|
TLS th5.Config
|
|
Addr string
|
|
}
|
|
|
|
var TlsVersionToName = map[uint16]string{
|
|
th5.VersionTLS10: "1.0",
|
|
th5.VersionTLS11: "1.1",
|
|
th5.VersionTLS12: "1.2",
|
|
th5.VersionTLS13: "1.3",
|
|
}
|
|
|
|
var CipherSuiteIdToName = map[uint16]string{
|
|
th5.TLS_AES_128_GCM_SHA256: "TLS_AES_128_GCM_SHA256",
|
|
th5.TLS_AES_256_GCM_SHA384: "TLS_AES_256_GCM_SHA384",
|
|
th5.TLS_CHACHA20_POLY1305_SHA256: "TLS_CHACHA20_POLY1305_SHA256",
|
|
th5.TLS_RSA_WITH_RC4_128_SHA: "TLS_RSA_WITH_RC4_128_SHA",
|
|
th5.TLS_RSA_WITH_3DES_EDE_CBC_SHA: "TLS_RSA_WITH_3DES_EDE_CBC_SHA",
|
|
th5.TLS_RSA_WITH_AES_128_CBC_SHA: "TLS_RSA_WITH_AES_128_CBC_SHA",
|
|
th5.TLS_RSA_WITH_AES_256_CBC_SHA: "TLS_RSA_WITH_AES_256_CBC_SHA",
|
|
th5.TLS_RSA_WITH_AES_128_CBC_SHA256: "TLS_RSA_WITH_AES_128_CBC_SHA256",
|
|
th5.TLS_RSA_WITH_AES_128_GCM_SHA256: "TLS_RSA_WITH_AES_128_GCM_SHA256",
|
|
th5.TLS_RSA_WITH_AES_256_GCM_SHA384: "TLS_RSA_WITH_AES_256_GCM_SHA384",
|
|
th5.TLS_ECDHE_ECDSA_WITH_RC4_128_SHA: "TLS_ECDHE_ECDSA_WITH_RC4_128_SHA",
|
|
th5.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA",
|
|
th5.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA",
|
|
th5.TLS_ECDHE_RSA_WITH_RC4_128_SHA: "TLS_ECDHE_RSA_WITH_RC4_128_SHA",
|
|
th5.TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA: "TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA",
|
|
th5.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA",
|
|
th5.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA",
|
|
th5.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256",
|
|
th5.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256",
|
|
th5.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256",
|
|
th5.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256",
|
|
th5.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384",
|
|
th5.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384",
|
|
th5.TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305: "TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305",
|
|
th5.TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305: "TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305",
|
|
}
|
|
|
|
var NamedGroupsToName = map[uint16]string{
|
|
uint16(th5.HybridSIDHp503Curve25519): "X25519-SIDHp503",
|
|
uint16(th5.HybridSIKEp503Curve25519): "X25519-SIKEp503",
|
|
uint16(th5.X25519): "X25519",
|
|
uint16(th5.CurveP256): "P-256",
|
|
uint16(th5.CurveP384): "P-384",
|
|
uint16(th5.CurveP521): "P-521",
|
|
}
|
|
|
|
func NewClient() *Client {
|
|
var c Client
|
|
c.TLS.InsecureSkipVerify = true
|
|
return &c
|
|
}
|
|
|
|
func (c *Client) Run() {
|
|
con, err := th5.Dial("tcp", c.Addr, &c.TLS)
|
|
if err != nil {
|
|
fmt.Printf("handshake failed: %v\n\n", err)
|
|
os.Exit(1)
|
|
}
|
|
defer con.Close()
|
|
printTlsState(con)
|
|
}
|
|
|
|
func (c *Client) Clone() *Client {
|
|
var clone Client
|
|
clone.TLS = *c.TLS.Clone()
|
|
clone.Addr = c.Addr
|
|
return &clone
|
|
}
|