Mirror of BoringSSL (grpc依赖)
https://boringssl.googlesource.com/boringssl
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
201 lines
5.0 KiB
201 lines
5.0 KiB
// Copyright 2012 The Go Authors. All rights reserved. |
|
// Use of this source code is governed by a BSD-style |
|
// license that can be found in the LICENSE file. |
|
|
|
package runner |
|
|
|
import ( |
|
"crypto/aes" |
|
"crypto/cipher" |
|
"crypto/hmac" |
|
"crypto/sha256" |
|
"crypto/subtle" |
|
"errors" |
|
"io" |
|
"time" |
|
) |
|
|
|
// sessionState contains the information that is serialized into a session |
|
// ticket in order to later resume a connection. |
|
type sessionState struct { |
|
vers uint16 |
|
cipherSuite uint16 |
|
secret []byte |
|
handshakeHash []byte |
|
certificates [][]byte |
|
extendedMasterSecret bool |
|
earlyALPN []byte |
|
ticketCreationTime time.Time |
|
ticketExpiration time.Time |
|
ticketFlags uint32 |
|
ticketAgeAdd uint32 |
|
hasApplicationSettings bool |
|
localApplicationSettings []byte |
|
peerApplicationSettings []byte |
|
} |
|
|
|
func (s *sessionState) marshal() []byte { |
|
msg := newByteBuilder() |
|
msg.addU16(s.vers) |
|
msg.addU16(s.cipherSuite) |
|
secret := msg.addU16LengthPrefixed() |
|
secret.addBytes(s.secret) |
|
handshakeHash := msg.addU16LengthPrefixed() |
|
handshakeHash.addBytes(s.handshakeHash) |
|
msg.addU16(uint16(len(s.certificates))) |
|
for _, cert := range s.certificates { |
|
certMsg := msg.addU32LengthPrefixed() |
|
certMsg.addBytes(cert) |
|
} |
|
|
|
if s.extendedMasterSecret { |
|
msg.addU8(1) |
|
} else { |
|
msg.addU8(0) |
|
} |
|
|
|
if s.vers >= VersionTLS13 { |
|
msg.addU64(uint64(s.ticketCreationTime.UnixNano())) |
|
msg.addU64(uint64(s.ticketExpiration.UnixNano())) |
|
msg.addU32(s.ticketFlags) |
|
msg.addU32(s.ticketAgeAdd) |
|
} |
|
|
|
earlyALPN := msg.addU16LengthPrefixed() |
|
earlyALPN.addBytes(s.earlyALPN) |
|
|
|
if s.hasApplicationSettings { |
|
msg.addU8(1) |
|
msg.addU16LengthPrefixed().addBytes(s.localApplicationSettings) |
|
msg.addU16LengthPrefixed().addBytes(s.peerApplicationSettings) |
|
} else { |
|
msg.addU8(0) |
|
} |
|
|
|
return msg.finish() |
|
} |
|
|
|
func readBool(reader *byteReader, out *bool) bool { |
|
var value uint8 |
|
if !reader.readU8(&value) { |
|
return false |
|
} |
|
if value == 0 { |
|
*out = false |
|
return true |
|
} |
|
if value == 1 { |
|
*out = true |
|
return true |
|
} |
|
return false |
|
} |
|
|
|
func (s *sessionState) unmarshal(data []byte) bool { |
|
reader := byteReader(data) |
|
var numCerts uint16 |
|
if !reader.readU16(&s.vers) || |
|
!reader.readU16(&s.cipherSuite) || |
|
!reader.readU16LengthPrefixedBytes(&s.secret) || |
|
!reader.readU16LengthPrefixedBytes(&s.handshakeHash) || |
|
!reader.readU16(&numCerts) { |
|
return false |
|
} |
|
|
|
s.certificates = make([][]byte, int(numCerts)) |
|
for i := range s.certificates { |
|
if !reader.readU32LengthPrefixedBytes(&s.certificates[i]) { |
|
return false |
|
} |
|
} |
|
|
|
if !readBool(&reader, &s.extendedMasterSecret) { |
|
return false |
|
} |
|
|
|
if s.vers >= VersionTLS13 { |
|
var ticketCreationTime, ticketExpiration uint64 |
|
if !reader.readU64(&ticketCreationTime) || |
|
!reader.readU64(&ticketExpiration) || |
|
!reader.readU32(&s.ticketFlags) || |
|
!reader.readU32(&s.ticketAgeAdd) { |
|
return false |
|
} |
|
s.ticketCreationTime = time.Unix(0, int64(ticketCreationTime)) |
|
s.ticketExpiration = time.Unix(0, int64(ticketExpiration)) |
|
} |
|
|
|
if !reader.readU16LengthPrefixedBytes(&s.earlyALPN) || |
|
!readBool(&reader, &s.hasApplicationSettings) { |
|
return false |
|
} |
|
|
|
if s.hasApplicationSettings { |
|
if !reader.readU16LengthPrefixedBytes(&s.localApplicationSettings) || |
|
!reader.readU16LengthPrefixedBytes(&s.peerApplicationSettings) { |
|
return false |
|
} |
|
} |
|
|
|
if len(reader) > 0 { |
|
return false |
|
} |
|
|
|
return true |
|
} |
|
|
|
func (c *Conn) encryptTicket(state *sessionState) ([]byte, error) { |
|
key := c.config.SessionTicketKey[:] |
|
if c.config.Bugs.EncryptSessionTicketKey != nil { |
|
key = c.config.Bugs.EncryptSessionTicketKey[:] |
|
} |
|
|
|
serialized := state.marshal() |
|
encrypted := make([]byte, aes.BlockSize+len(serialized)+sha256.Size) |
|
iv := encrypted[:aes.BlockSize] |
|
macBytes := encrypted[len(encrypted)-sha256.Size:] |
|
|
|
if _, err := io.ReadFull(c.config.rand(), iv); err != nil { |
|
return nil, err |
|
} |
|
block, err := aes.NewCipher(key[:16]) |
|
if err != nil { |
|
return nil, errors.New("tls: failed to create cipher while encrypting ticket: " + err.Error()) |
|
} |
|
cipher.NewCTR(block, iv).XORKeyStream(encrypted[aes.BlockSize:], serialized) |
|
|
|
mac := hmac.New(sha256.New, key[16:32]) |
|
mac.Write(encrypted[:len(encrypted)-sha256.Size]) |
|
mac.Sum(macBytes[:0]) |
|
|
|
return encrypted, nil |
|
} |
|
|
|
func (c *Conn) decryptTicket(encrypted []byte) (*sessionState, bool) { |
|
if len(encrypted) < aes.BlockSize+sha256.Size { |
|
return nil, false |
|
} |
|
|
|
iv := encrypted[:aes.BlockSize] |
|
macBytes := encrypted[len(encrypted)-sha256.Size:] |
|
|
|
mac := hmac.New(sha256.New, c.config.SessionTicketKey[16:32]) |
|
mac.Write(encrypted[:len(encrypted)-sha256.Size]) |
|
expected := mac.Sum(nil) |
|
|
|
if subtle.ConstantTimeCompare(macBytes, expected) != 1 { |
|
return nil, false |
|
} |
|
|
|
block, err := aes.NewCipher(c.config.SessionTicketKey[:16]) |
|
if err != nil { |
|
return nil, false |
|
} |
|
ciphertext := encrypted[aes.BlockSize : len(encrypted)-sha256.Size] |
|
plaintext := make([]byte, len(ciphertext)) |
|
cipher.NewCTR(block, iv).XORKeyStream(plaintext, ciphertext) |
|
|
|
state := new(sessionState) |
|
ok := state.unmarshal(plaintext) |
|
return state, ok |
|
}
|
|
|