handshake_messages.go 49 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925
  1. // Copyright 2009 The Go Authors. All rights reserved.
  2. // Use of this source code is governed by a BSD-style
  3. // license that can be found in the LICENSE file.
  4. package tls
  5. import (
  6. "errors"
  7. "fmt"
  8. "strings"
  9. "golang.org/x/crypto/cryptobyte"
  10. )
  11. // The marshalingFunction type is an adapter to allow the use of ordinary
  12. // functions as cryptobyte.MarshalingValue.
  13. type marshalingFunction func(b *cryptobyte.Builder) error
  14. func (f marshalingFunction) Marshal(b *cryptobyte.Builder) error {
  15. return f(b)
  16. }
  17. // addBytesWithLength appends a sequence of bytes to the cryptobyte.Builder. If
  18. // the length of the sequence is not the value specified, it produces an error.
  19. func addBytesWithLength(b *cryptobyte.Builder, v []byte, n int) {
  20. b.AddValue(marshalingFunction(func(b *cryptobyte.Builder) error {
  21. if len(v) != n {
  22. return fmt.Errorf("invalid value length: expected %d, got %d", n, len(v))
  23. }
  24. b.AddBytes(v)
  25. return nil
  26. }))
  27. }
  28. // addUint64 appends a big-endian, 64-bit value to the cryptobyte.Builder.
  29. func addUint64(b *cryptobyte.Builder, v uint64) {
  30. b.AddUint32(uint32(v >> 32))
  31. b.AddUint32(uint32(v))
  32. }
  33. // readUint64 decodes a big-endian, 64-bit value into out and advances over it.
  34. // It reports whether the read was successful.
  35. func readUint64(s *cryptobyte.String, out *uint64) bool {
  36. var hi, lo uint32
  37. if !s.ReadUint32(&hi) || !s.ReadUint32(&lo) {
  38. return false
  39. }
  40. *out = uint64(hi)<<32 | uint64(lo)
  41. return true
  42. }
  43. // readUint8LengthPrefixed acts like s.ReadUint8LengthPrefixed, but targets a
  44. // []byte instead of a cryptobyte.String.
  45. func readUint8LengthPrefixed(s *cryptobyte.String, out *[]byte) bool {
  46. return s.ReadUint8LengthPrefixed((*cryptobyte.String)(out))
  47. }
  48. // readUint16LengthPrefixed acts like s.ReadUint16LengthPrefixed, but targets a
  49. // []byte instead of a cryptobyte.String.
  50. func readUint16LengthPrefixed(s *cryptobyte.String, out *[]byte) bool {
  51. return s.ReadUint16LengthPrefixed((*cryptobyte.String)(out))
  52. }
  53. // readUint24LengthPrefixed acts like s.ReadUint24LengthPrefixed, but targets a
  54. // []byte instead of a cryptobyte.String.
  55. func readUint24LengthPrefixed(s *cryptobyte.String, out *[]byte) bool {
  56. return s.ReadUint24LengthPrefixed((*cryptobyte.String)(out))
  57. }
  58. type clientHelloMsg struct {
  59. raw []byte
  60. vers uint16
  61. random []byte
  62. sessionId []byte
  63. cipherSuites []uint16
  64. compressionMethods []uint8
  65. serverName string
  66. ocspStapling bool
  67. supportedCurves []CurveID
  68. supportedPoints []uint8
  69. ticketSupported bool
  70. sessionTicket []uint8
  71. supportedSignatureAlgorithms []SignatureScheme
  72. supportedSignatureAlgorithmsCert []SignatureScheme
  73. secureRenegotiationSupported bool
  74. secureRenegotiation []byte
  75. extendedMasterSecret bool
  76. alpnProtocols []string
  77. scts bool
  78. // ems bool // [uTLS] actually implemented due to its prevalence // removed since crypto/tls implements it
  79. supportedVersions []uint16
  80. cookie []byte
  81. keyShares []keyShare
  82. earlyData bool
  83. pskModes []uint8
  84. pskIdentities []pskIdentity
  85. pskBinders [][]byte
  86. quicTransportParameters []byte
  87. // [uTLS]
  88. nextProtoNeg bool
  89. }
  90. func (m *clientHelloMsg) marshal() ([]byte, error) {
  91. if m.raw != nil {
  92. return m.raw, nil
  93. }
  94. var exts cryptobyte.Builder
  95. if len(m.serverName) > 0 {
  96. // RFC 6066, Section 3
  97. exts.AddUint16(extensionServerName)
  98. exts.AddUint16LengthPrefixed(func(exts *cryptobyte.Builder) {
  99. exts.AddUint16LengthPrefixed(func(exts *cryptobyte.Builder) {
  100. exts.AddUint8(0) // name_type = host_name
  101. exts.AddUint16LengthPrefixed(func(exts *cryptobyte.Builder) {
  102. exts.AddBytes([]byte(m.serverName))
  103. })
  104. })
  105. })
  106. }
  107. if m.ocspStapling {
  108. // RFC 4366, Section 3.6
  109. exts.AddUint16(extensionStatusRequest)
  110. exts.AddUint16LengthPrefixed(func(exts *cryptobyte.Builder) {
  111. exts.AddUint8(1) // status_type = ocsp
  112. exts.AddUint16(0) // empty responder_id_list
  113. exts.AddUint16(0) // empty request_extensions
  114. })
  115. }
  116. if len(m.supportedCurves) > 0 {
  117. // RFC 4492, sections 5.1.1 and RFC 8446, Section 4.2.7
  118. exts.AddUint16(extensionSupportedCurves)
  119. exts.AddUint16LengthPrefixed(func(exts *cryptobyte.Builder) {
  120. exts.AddUint16LengthPrefixed(func(exts *cryptobyte.Builder) {
  121. for _, curve := range m.supportedCurves {
  122. exts.AddUint16(uint16(curve))
  123. }
  124. })
  125. })
  126. }
  127. if len(m.supportedPoints) > 0 {
  128. // RFC 4492, Section 5.1.2
  129. exts.AddUint16(extensionSupportedPoints)
  130. exts.AddUint16LengthPrefixed(func(exts *cryptobyte.Builder) {
  131. exts.AddUint8LengthPrefixed(func(exts *cryptobyte.Builder) {
  132. exts.AddBytes(m.supportedPoints)
  133. })
  134. })
  135. }
  136. if m.ticketSupported {
  137. // RFC 5077, Section 3.2
  138. exts.AddUint16(extensionSessionTicket)
  139. exts.AddUint16LengthPrefixed(func(exts *cryptobyte.Builder) {
  140. exts.AddBytes(m.sessionTicket)
  141. })
  142. }
  143. if len(m.supportedSignatureAlgorithms) > 0 {
  144. // RFC 5246, Section 7.4.1.4.1
  145. exts.AddUint16(extensionSignatureAlgorithms)
  146. exts.AddUint16LengthPrefixed(func(exts *cryptobyte.Builder) {
  147. exts.AddUint16LengthPrefixed(func(exts *cryptobyte.Builder) {
  148. for _, sigAlgo := range m.supportedSignatureAlgorithms {
  149. exts.AddUint16(uint16(sigAlgo))
  150. }
  151. })
  152. })
  153. }
  154. if len(m.supportedSignatureAlgorithmsCert) > 0 {
  155. // RFC 8446, Section 4.2.3
  156. exts.AddUint16(extensionSignatureAlgorithmsCert)
  157. exts.AddUint16LengthPrefixed(func(exts *cryptobyte.Builder) {
  158. exts.AddUint16LengthPrefixed(func(exts *cryptobyte.Builder) {
  159. for _, sigAlgo := range m.supportedSignatureAlgorithmsCert {
  160. exts.AddUint16(uint16(sigAlgo))
  161. }
  162. })
  163. })
  164. }
  165. if m.secureRenegotiationSupported {
  166. // RFC 5746, Section 3.2
  167. exts.AddUint16(extensionRenegotiationInfo)
  168. exts.AddUint16LengthPrefixed(func(exts *cryptobyte.Builder) {
  169. exts.AddUint8LengthPrefixed(func(exts *cryptobyte.Builder) {
  170. exts.AddBytes(m.secureRenegotiation)
  171. })
  172. })
  173. }
  174. if m.extendedMasterSecret {
  175. // RFC 7627
  176. exts.AddUint16(extensionExtendedMasterSecret)
  177. exts.AddUint16(0) // empty extension_data
  178. }
  179. if len(m.alpnProtocols) > 0 {
  180. // RFC 7301, Section 3.1
  181. exts.AddUint16(extensionALPN)
  182. exts.AddUint16LengthPrefixed(func(exts *cryptobyte.Builder) {
  183. exts.AddUint16LengthPrefixed(func(exts *cryptobyte.Builder) {
  184. for _, proto := range m.alpnProtocols {
  185. exts.AddUint8LengthPrefixed(func(exts *cryptobyte.Builder) {
  186. exts.AddBytes([]byte(proto))
  187. })
  188. }
  189. })
  190. })
  191. }
  192. if m.scts {
  193. // RFC 6962, Section 3.3.1
  194. exts.AddUint16(extensionSCT)
  195. exts.AddUint16(0) // empty extension_data
  196. }
  197. if len(m.supportedVersions) > 0 {
  198. // RFC 8446, Section 4.2.1
  199. exts.AddUint16(extensionSupportedVersions)
  200. exts.AddUint16LengthPrefixed(func(exts *cryptobyte.Builder) {
  201. exts.AddUint8LengthPrefixed(func(exts *cryptobyte.Builder) {
  202. for _, vers := range m.supportedVersions {
  203. exts.AddUint16(vers)
  204. }
  205. })
  206. })
  207. }
  208. if len(m.cookie) > 0 {
  209. // RFC 8446, Section 4.2.2
  210. exts.AddUint16(extensionCookie)
  211. exts.AddUint16LengthPrefixed(func(exts *cryptobyte.Builder) {
  212. exts.AddUint16LengthPrefixed(func(exts *cryptobyte.Builder) {
  213. exts.AddBytes(m.cookie)
  214. })
  215. })
  216. }
  217. if len(m.keyShares) > 0 {
  218. // RFC 8446, Section 4.2.8
  219. exts.AddUint16(extensionKeyShare)
  220. exts.AddUint16LengthPrefixed(func(exts *cryptobyte.Builder) {
  221. exts.AddUint16LengthPrefixed(func(exts *cryptobyte.Builder) {
  222. for _, ks := range m.keyShares {
  223. exts.AddUint16(uint16(ks.group))
  224. exts.AddUint16LengthPrefixed(func(exts *cryptobyte.Builder) {
  225. exts.AddBytes(ks.data)
  226. })
  227. }
  228. })
  229. })
  230. }
  231. if m.earlyData {
  232. // RFC 8446, Section 4.2.10
  233. exts.AddUint16(extensionEarlyData)
  234. exts.AddUint16(0) // empty extension_data
  235. }
  236. if len(m.pskModes) > 0 {
  237. // RFC 8446, Section 4.2.9
  238. exts.AddUint16(extensionPSKModes)
  239. exts.AddUint16LengthPrefixed(func(exts *cryptobyte.Builder) {
  240. exts.AddUint8LengthPrefixed(func(exts *cryptobyte.Builder) {
  241. exts.AddBytes(m.pskModes)
  242. })
  243. })
  244. }
  245. if m.quicTransportParameters != nil { // marshal zero-length parameters when present
  246. // RFC 9001, Section 8.2
  247. exts.AddUint16(extensionQUICTransportParameters)
  248. exts.AddUint16LengthPrefixed(func(exts *cryptobyte.Builder) {
  249. exts.AddBytes(m.quicTransportParameters)
  250. })
  251. }
  252. if len(m.pskIdentities) > 0 { // pre_shared_key must be the last extension
  253. // RFC 8446, Section 4.2.11
  254. exts.AddUint16(extensionPreSharedKey)
  255. exts.AddUint16LengthPrefixed(func(exts *cryptobyte.Builder) {
  256. exts.AddUint16LengthPrefixed(func(exts *cryptobyte.Builder) {
  257. for _, psk := range m.pskIdentities {
  258. exts.AddUint16LengthPrefixed(func(exts *cryptobyte.Builder) {
  259. exts.AddBytes(psk.label)
  260. })
  261. exts.AddUint32(psk.obfuscatedTicketAge)
  262. }
  263. })
  264. exts.AddUint16LengthPrefixed(func(exts *cryptobyte.Builder) {
  265. for _, binder := range m.pskBinders {
  266. exts.AddUint8LengthPrefixed(func(exts *cryptobyte.Builder) {
  267. exts.AddBytes(binder)
  268. })
  269. }
  270. })
  271. })
  272. }
  273. extBytes, err := exts.Bytes()
  274. if err != nil {
  275. return nil, err
  276. }
  277. var b cryptobyte.Builder
  278. b.AddUint8(typeClientHello)
  279. b.AddUint24LengthPrefixed(func(b *cryptobyte.Builder) {
  280. b.AddUint16(m.vers)
  281. addBytesWithLength(b, m.random, 32)
  282. b.AddUint8LengthPrefixed(func(b *cryptobyte.Builder) {
  283. b.AddBytes(m.sessionId)
  284. })
  285. b.AddUint16LengthPrefixed(func(b *cryptobyte.Builder) {
  286. for _, suite := range m.cipherSuites {
  287. b.AddUint16(suite)
  288. }
  289. })
  290. b.AddUint8LengthPrefixed(func(b *cryptobyte.Builder) {
  291. b.AddBytes(m.compressionMethods)
  292. })
  293. if len(extBytes) > 0 {
  294. b.AddUint16LengthPrefixed(func(b *cryptobyte.Builder) {
  295. b.AddBytes(extBytes)
  296. })
  297. }
  298. })
  299. m.raw, err = b.Bytes()
  300. return m.raw, err
  301. }
  302. // marshalWithoutBinders returns the ClientHello through the
  303. // PreSharedKeyExtension.identities field, according to RFC 8446, Section
  304. // 4.2.11.2. Note that m.pskBinders must be set to slices of the correct length.
  305. func (m *clientHelloMsg) marshalWithoutBinders() ([]byte, error) {
  306. bindersLen := 2 // uint16 length prefix
  307. for _, binder := range m.pskBinders {
  308. bindersLen += 1 // uint8 length prefix
  309. bindersLen += len(binder)
  310. }
  311. fullMessage, err := m.marshal()
  312. if err != nil {
  313. return nil, err
  314. }
  315. return fullMessage[:len(fullMessage)-bindersLen], nil
  316. }
  317. // updateBinders updates the m.pskBinders field, if necessary updating the
  318. // cached marshaled representation. The supplied binders must have the same
  319. // length as the current m.pskBinders.
  320. func (m *clientHelloMsg) updateBinders(pskBinders [][]byte) error {
  321. if len(pskBinders) != len(m.pskBinders) {
  322. return errors.New("tls: internal error: pskBinders length mismatch")
  323. }
  324. for i := range m.pskBinders {
  325. if len(pskBinders[i]) != len(m.pskBinders[i]) {
  326. return errors.New("tls: internal error: pskBinders length mismatch")
  327. }
  328. }
  329. m.pskBinders = pskBinders
  330. if m.raw != nil {
  331. helloBytes, err := m.marshalWithoutBinders()
  332. if err != nil {
  333. return err
  334. }
  335. lenWithoutBinders := len(helloBytes)
  336. b := cryptobyte.NewFixedBuilder(m.raw[:lenWithoutBinders])
  337. b.AddUint16LengthPrefixed(func(b *cryptobyte.Builder) {
  338. for _, binder := range m.pskBinders {
  339. b.AddUint8LengthPrefixed(func(b *cryptobyte.Builder) {
  340. b.AddBytes(binder)
  341. })
  342. }
  343. })
  344. if out, err := b.Bytes(); err != nil || len(out) != len(m.raw) {
  345. return errors.New("tls: internal error: failed to update binders")
  346. }
  347. }
  348. return nil
  349. }
  350. func (m *clientHelloMsg) unmarshal(data []byte) bool {
  351. *m = clientHelloMsg{raw: data}
  352. s := cryptobyte.String(data)
  353. if !s.Skip(4) || // message type and uint24 length field
  354. !s.ReadUint16(&m.vers) || !s.ReadBytes(&m.random, 32) ||
  355. !readUint8LengthPrefixed(&s, &m.sessionId) {
  356. return false
  357. }
  358. var cipherSuites cryptobyte.String
  359. if !s.ReadUint16LengthPrefixed(&cipherSuites) {
  360. return false
  361. }
  362. m.cipherSuites = []uint16{}
  363. m.secureRenegotiationSupported = false
  364. for !cipherSuites.Empty() {
  365. var suite uint16
  366. if !cipherSuites.ReadUint16(&suite) {
  367. return false
  368. }
  369. if suite == scsvRenegotiation {
  370. m.secureRenegotiationSupported = true
  371. }
  372. m.cipherSuites = append(m.cipherSuites, suite)
  373. }
  374. if !readUint8LengthPrefixed(&s, &m.compressionMethods) {
  375. return false
  376. }
  377. if s.Empty() {
  378. // ClientHello is optionally followed by extension data
  379. return true
  380. }
  381. var extensions cryptobyte.String
  382. if !s.ReadUint16LengthPrefixed(&extensions) || !s.Empty() {
  383. return false
  384. }
  385. seenExts := make(map[uint16]bool)
  386. for !extensions.Empty() {
  387. var extension uint16
  388. var extData cryptobyte.String
  389. if !extensions.ReadUint16(&extension) ||
  390. !extensions.ReadUint16LengthPrefixed(&extData) {
  391. return false
  392. }
  393. if seenExts[extension] {
  394. return false
  395. }
  396. seenExts[extension] = true
  397. switch extension {
  398. case extensionServerName:
  399. // RFC 6066, Section 3
  400. var nameList cryptobyte.String
  401. if !extData.ReadUint16LengthPrefixed(&nameList) || nameList.Empty() {
  402. return false
  403. }
  404. for !nameList.Empty() {
  405. var nameType uint8
  406. var serverName cryptobyte.String
  407. if !nameList.ReadUint8(&nameType) ||
  408. !nameList.ReadUint16LengthPrefixed(&serverName) ||
  409. serverName.Empty() {
  410. return false
  411. }
  412. if nameType != 0 {
  413. continue
  414. }
  415. if len(m.serverName) != 0 {
  416. // Multiple names of the same name_type are prohibited.
  417. return false
  418. }
  419. m.serverName = string(serverName)
  420. // An SNI value may not include a trailing dot.
  421. if strings.HasSuffix(m.serverName, ".") {
  422. return false
  423. }
  424. }
  425. case extensionStatusRequest:
  426. // RFC 4366, Section 3.6
  427. var statusType uint8
  428. var ignored cryptobyte.String
  429. if !extData.ReadUint8(&statusType) ||
  430. !extData.ReadUint16LengthPrefixed(&ignored) ||
  431. !extData.ReadUint16LengthPrefixed(&ignored) {
  432. return false
  433. }
  434. m.ocspStapling = statusType == statusTypeOCSP
  435. case extensionSupportedCurves:
  436. // RFC 4492, sections 5.1.1 and RFC 8446, Section 4.2.7
  437. var curves cryptobyte.String
  438. if !extData.ReadUint16LengthPrefixed(&curves) || curves.Empty() {
  439. return false
  440. }
  441. for !curves.Empty() {
  442. var curve uint16
  443. if !curves.ReadUint16(&curve) {
  444. return false
  445. }
  446. m.supportedCurves = append(m.supportedCurves, CurveID(curve))
  447. }
  448. case extensionSupportedPoints:
  449. // RFC 4492, Section 5.1.2
  450. if !readUint8LengthPrefixed(&extData, &m.supportedPoints) ||
  451. len(m.supportedPoints) == 0 {
  452. return false
  453. }
  454. case extensionSessionTicket:
  455. // RFC 5077, Section 3.2
  456. m.ticketSupported = true
  457. extData.ReadBytes(&m.sessionTicket, len(extData))
  458. case extensionSignatureAlgorithms:
  459. // RFC 5246, Section 7.4.1.4.1
  460. var sigAndAlgs cryptobyte.String
  461. if !extData.ReadUint16LengthPrefixed(&sigAndAlgs) || sigAndAlgs.Empty() {
  462. return false
  463. }
  464. for !sigAndAlgs.Empty() {
  465. var sigAndAlg uint16
  466. if !sigAndAlgs.ReadUint16(&sigAndAlg) {
  467. return false
  468. }
  469. m.supportedSignatureAlgorithms = append(
  470. m.supportedSignatureAlgorithms, SignatureScheme(sigAndAlg))
  471. }
  472. case extensionSignatureAlgorithmsCert:
  473. // RFC 8446, Section 4.2.3
  474. var sigAndAlgs cryptobyte.String
  475. if !extData.ReadUint16LengthPrefixed(&sigAndAlgs) || sigAndAlgs.Empty() {
  476. return false
  477. }
  478. for !sigAndAlgs.Empty() {
  479. var sigAndAlg uint16
  480. if !sigAndAlgs.ReadUint16(&sigAndAlg) {
  481. return false
  482. }
  483. m.supportedSignatureAlgorithmsCert = append(
  484. m.supportedSignatureAlgorithmsCert, SignatureScheme(sigAndAlg))
  485. }
  486. case extensionRenegotiationInfo:
  487. // RFC 5746, Section 3.2
  488. if !readUint8LengthPrefixed(&extData, &m.secureRenegotiation) {
  489. return false
  490. }
  491. m.secureRenegotiationSupported = true
  492. case extensionExtendedMasterSecret:
  493. // RFC 7627
  494. m.extendedMasterSecret = true
  495. case extensionALPN:
  496. // RFC 7301, Section 3.1
  497. var protoList cryptobyte.String
  498. if !extData.ReadUint16LengthPrefixed(&protoList) || protoList.Empty() {
  499. return false
  500. }
  501. for !protoList.Empty() {
  502. var proto cryptobyte.String
  503. if !protoList.ReadUint8LengthPrefixed(&proto) || proto.Empty() {
  504. return false
  505. }
  506. m.alpnProtocols = append(m.alpnProtocols, string(proto))
  507. }
  508. case extensionSCT:
  509. // RFC 6962, Section 3.3.1
  510. m.scts = true
  511. case extensionSupportedVersions:
  512. // RFC 8446, Section 4.2.1
  513. var versList cryptobyte.String
  514. if !extData.ReadUint8LengthPrefixed(&versList) || versList.Empty() {
  515. return false
  516. }
  517. for !versList.Empty() {
  518. var vers uint16
  519. if !versList.ReadUint16(&vers) {
  520. return false
  521. }
  522. m.supportedVersions = append(m.supportedVersions, vers)
  523. }
  524. case extensionCookie:
  525. // RFC 8446, Section 4.2.2
  526. if !readUint16LengthPrefixed(&extData, &m.cookie) ||
  527. len(m.cookie) == 0 {
  528. return false
  529. }
  530. case extensionKeyShare:
  531. // RFC 8446, Section 4.2.8
  532. var clientShares cryptobyte.String
  533. if !extData.ReadUint16LengthPrefixed(&clientShares) {
  534. return false
  535. }
  536. for !clientShares.Empty() {
  537. var ks keyShare
  538. if !clientShares.ReadUint16((*uint16)(&ks.group)) ||
  539. !readUint16LengthPrefixed(&clientShares, &ks.data) ||
  540. len(ks.data) == 0 {
  541. return false
  542. }
  543. m.keyShares = append(m.keyShares, ks)
  544. }
  545. case extensionEarlyData:
  546. // RFC 8446, Section 4.2.10
  547. m.earlyData = true
  548. case extensionPSKModes:
  549. // RFC 8446, Section 4.2.9
  550. if !readUint8LengthPrefixed(&extData, &m.pskModes) {
  551. return false
  552. }
  553. case extensionQUICTransportParameters:
  554. m.quicTransportParameters = make([]byte, len(extData))
  555. if !extData.CopyBytes(m.quicTransportParameters) {
  556. return false
  557. }
  558. case extensionPreSharedKey:
  559. // RFC 8446, Section 4.2.11
  560. if !extensions.Empty() {
  561. return false // pre_shared_key must be the last extension
  562. }
  563. var identities cryptobyte.String
  564. if !extData.ReadUint16LengthPrefixed(&identities) || identities.Empty() {
  565. return false
  566. }
  567. for !identities.Empty() {
  568. var psk pskIdentity
  569. if !readUint16LengthPrefixed(&identities, &psk.label) ||
  570. !identities.ReadUint32(&psk.obfuscatedTicketAge) ||
  571. len(psk.label) == 0 {
  572. return false
  573. }
  574. m.pskIdentities = append(m.pskIdentities, psk)
  575. }
  576. var binders cryptobyte.String
  577. if !extData.ReadUint16LengthPrefixed(&binders) || binders.Empty() {
  578. return false
  579. }
  580. for !binders.Empty() {
  581. var binder []byte
  582. if !readUint8LengthPrefixed(&binders, &binder) ||
  583. len(binder) == 0 {
  584. return false
  585. }
  586. m.pskBinders = append(m.pskBinders, binder)
  587. }
  588. default:
  589. // Ignore unknown extensions.
  590. continue
  591. }
  592. if !extData.Empty() {
  593. return false
  594. }
  595. }
  596. return true
  597. }
  598. type serverHelloMsg struct {
  599. raw []byte
  600. vers uint16
  601. random []byte
  602. sessionId []byte
  603. cipherSuite uint16
  604. compressionMethod uint8
  605. ocspStapling bool
  606. ticketSupported bool
  607. secureRenegotiationSupported bool
  608. secureRenegotiation []byte
  609. extendedMasterSecret bool
  610. alpnProtocol string
  611. scts [][]byte
  612. supportedVersion uint16
  613. serverShare keyShare
  614. selectedIdentityPresent bool
  615. selectedIdentity uint16
  616. supportedPoints []uint8
  617. // HelloRetryRequest extensions
  618. cookie []byte
  619. selectedGroup CurveID
  620. // [uTLS]
  621. nextProtoNeg bool
  622. nextProtos []string
  623. }
  624. func (m *serverHelloMsg) marshal() ([]byte, error) {
  625. if m.raw != nil {
  626. return m.raw, nil
  627. }
  628. var exts cryptobyte.Builder
  629. if m.ocspStapling {
  630. exts.AddUint16(extensionStatusRequest)
  631. exts.AddUint16(0) // empty extension_data
  632. }
  633. if m.ticketSupported {
  634. exts.AddUint16(extensionSessionTicket)
  635. exts.AddUint16(0) // empty extension_data
  636. }
  637. if m.secureRenegotiationSupported {
  638. exts.AddUint16(extensionRenegotiationInfo)
  639. exts.AddUint16LengthPrefixed(func(exts *cryptobyte.Builder) {
  640. exts.AddUint8LengthPrefixed(func(exts *cryptobyte.Builder) {
  641. exts.AddBytes(m.secureRenegotiation)
  642. })
  643. })
  644. }
  645. if m.extendedMasterSecret {
  646. exts.AddUint16(extensionExtendedMasterSecret)
  647. exts.AddUint16(0) // empty extension_data
  648. }
  649. if len(m.alpnProtocol) > 0 {
  650. exts.AddUint16(extensionALPN)
  651. exts.AddUint16LengthPrefixed(func(exts *cryptobyte.Builder) {
  652. exts.AddUint16LengthPrefixed(func(exts *cryptobyte.Builder) {
  653. exts.AddUint8LengthPrefixed(func(exts *cryptobyte.Builder) {
  654. exts.AddBytes([]byte(m.alpnProtocol))
  655. })
  656. })
  657. })
  658. }
  659. if len(m.scts) > 0 {
  660. exts.AddUint16(extensionSCT)
  661. exts.AddUint16LengthPrefixed(func(exts *cryptobyte.Builder) {
  662. exts.AddUint16LengthPrefixed(func(exts *cryptobyte.Builder) {
  663. for _, sct := range m.scts {
  664. exts.AddUint16LengthPrefixed(func(exts *cryptobyte.Builder) {
  665. exts.AddBytes(sct)
  666. })
  667. }
  668. })
  669. })
  670. }
  671. if m.supportedVersion != 0 {
  672. exts.AddUint16(extensionSupportedVersions)
  673. exts.AddUint16LengthPrefixed(func(exts *cryptobyte.Builder) {
  674. exts.AddUint16(m.supportedVersion)
  675. })
  676. }
  677. if m.serverShare.group != 0 {
  678. exts.AddUint16(extensionKeyShare)
  679. exts.AddUint16LengthPrefixed(func(exts *cryptobyte.Builder) {
  680. exts.AddUint16(uint16(m.serverShare.group))
  681. exts.AddUint16LengthPrefixed(func(exts *cryptobyte.Builder) {
  682. exts.AddBytes(m.serverShare.data)
  683. })
  684. })
  685. }
  686. if m.selectedIdentityPresent {
  687. exts.AddUint16(extensionPreSharedKey)
  688. exts.AddUint16LengthPrefixed(func(exts *cryptobyte.Builder) {
  689. exts.AddUint16(m.selectedIdentity)
  690. })
  691. }
  692. if len(m.cookie) > 0 {
  693. exts.AddUint16(extensionCookie)
  694. exts.AddUint16LengthPrefixed(func(exts *cryptobyte.Builder) {
  695. exts.AddUint16LengthPrefixed(func(exts *cryptobyte.Builder) {
  696. exts.AddBytes(m.cookie)
  697. })
  698. })
  699. }
  700. if m.selectedGroup != 0 {
  701. exts.AddUint16(extensionKeyShare)
  702. exts.AddUint16LengthPrefixed(func(exts *cryptobyte.Builder) {
  703. exts.AddUint16(uint16(m.selectedGroup))
  704. })
  705. }
  706. if len(m.supportedPoints) > 0 {
  707. exts.AddUint16(extensionSupportedPoints)
  708. exts.AddUint16LengthPrefixed(func(exts *cryptobyte.Builder) {
  709. exts.AddUint8LengthPrefixed(func(exts *cryptobyte.Builder) {
  710. exts.AddBytes(m.supportedPoints)
  711. })
  712. })
  713. }
  714. extBytes, err := exts.Bytes()
  715. if err != nil {
  716. return nil, err
  717. }
  718. var b cryptobyte.Builder
  719. b.AddUint8(typeServerHello)
  720. b.AddUint24LengthPrefixed(func(b *cryptobyte.Builder) {
  721. b.AddUint16(m.vers)
  722. addBytesWithLength(b, m.random, 32)
  723. b.AddUint8LengthPrefixed(func(b *cryptobyte.Builder) {
  724. b.AddBytes(m.sessionId)
  725. })
  726. b.AddUint16(m.cipherSuite)
  727. b.AddUint8(m.compressionMethod)
  728. if len(extBytes) > 0 {
  729. b.AddUint16LengthPrefixed(func(b *cryptobyte.Builder) {
  730. b.AddBytes(extBytes)
  731. })
  732. }
  733. })
  734. m.raw, err = b.Bytes()
  735. return m.raw, err
  736. }
  737. func (m *serverHelloMsg) unmarshal(data []byte) bool {
  738. *m = serverHelloMsg{raw: data}
  739. s := cryptobyte.String(data)
  740. if !s.Skip(4) || // message type and uint24 length field
  741. !s.ReadUint16(&m.vers) || !s.ReadBytes(&m.random, 32) ||
  742. !readUint8LengthPrefixed(&s, &m.sessionId) ||
  743. !s.ReadUint16(&m.cipherSuite) ||
  744. !s.ReadUint8(&m.compressionMethod) {
  745. return false
  746. }
  747. if s.Empty() {
  748. // ServerHello is optionally followed by extension data
  749. return true
  750. }
  751. var extensions cryptobyte.String
  752. if !s.ReadUint16LengthPrefixed(&extensions) || !s.Empty() {
  753. return false
  754. }
  755. seenExts := make(map[uint16]bool)
  756. for !extensions.Empty() {
  757. var extension uint16
  758. var extData cryptobyte.String
  759. if !extensions.ReadUint16(&extension) ||
  760. !extensions.ReadUint16LengthPrefixed(&extData) {
  761. return false
  762. }
  763. if seenExts[extension] {
  764. return false
  765. }
  766. seenExts[extension] = true
  767. switch extension {
  768. case extensionStatusRequest:
  769. m.ocspStapling = true
  770. case extensionSessionTicket:
  771. m.ticketSupported = true
  772. // [UTLS] crypto/tls finally supports EMS! Now we don't do anything special here.
  773. // case utlsExtensionExtendedMasterSecret:
  774. // // No sanity check for this extension: pretending not to know it.
  775. // // if length > 0 {
  776. // // return false
  777. // // }
  778. // m.ems = true
  779. case extensionRenegotiationInfo:
  780. if !readUint8LengthPrefixed(&extData, &m.secureRenegotiation) {
  781. return false
  782. }
  783. m.secureRenegotiationSupported = true
  784. case extensionExtendedMasterSecret:
  785. m.extendedMasterSecret = true
  786. case extensionALPN:
  787. var protoList cryptobyte.String
  788. if !extData.ReadUint16LengthPrefixed(&protoList) || protoList.Empty() {
  789. return false
  790. }
  791. var proto cryptobyte.String
  792. if !protoList.ReadUint8LengthPrefixed(&proto) ||
  793. proto.Empty() || !protoList.Empty() {
  794. return false
  795. }
  796. m.alpnProtocol = string(proto)
  797. case extensionSCT:
  798. var sctList cryptobyte.String
  799. if !extData.ReadUint16LengthPrefixed(&sctList) || sctList.Empty() {
  800. return false
  801. }
  802. for !sctList.Empty() {
  803. var sct []byte
  804. if !readUint16LengthPrefixed(&sctList, &sct) ||
  805. len(sct) == 0 {
  806. return false
  807. }
  808. m.scts = append(m.scts, sct)
  809. }
  810. case extensionSupportedVersions:
  811. if !extData.ReadUint16(&m.supportedVersion) {
  812. return false
  813. }
  814. case extensionCookie:
  815. if !readUint16LengthPrefixed(&extData, &m.cookie) ||
  816. len(m.cookie) == 0 {
  817. return false
  818. }
  819. case extensionKeyShare:
  820. // This extension has different formats in SH and HRR, accept either
  821. // and let the handshake logic decide. See RFC 8446, Section 4.2.8.
  822. if len(extData) == 2 {
  823. if !extData.ReadUint16((*uint16)(&m.selectedGroup)) {
  824. return false
  825. }
  826. } else {
  827. if !extData.ReadUint16((*uint16)(&m.serverShare.group)) ||
  828. !readUint16LengthPrefixed(&extData, &m.serverShare.data) {
  829. return false
  830. }
  831. }
  832. case extensionPreSharedKey:
  833. m.selectedIdentityPresent = true
  834. if !extData.ReadUint16(&m.selectedIdentity) {
  835. return false
  836. }
  837. case extensionSupportedPoints:
  838. // RFC 4492, Section 5.1.2
  839. if !readUint8LengthPrefixed(&extData, &m.supportedPoints) ||
  840. len(m.supportedPoints) == 0 {
  841. return false
  842. }
  843. default:
  844. // Ignore unknown extensions.
  845. continue
  846. }
  847. if !extData.Empty() {
  848. return false
  849. }
  850. }
  851. return true
  852. }
  853. type encryptedExtensionsMsg struct {
  854. raw []byte
  855. alpnProtocol string
  856. quicTransportParameters []byte
  857. earlyData bool
  858. utls utlsEncryptedExtensionsMsgExtraFields // [uTLS]
  859. }
  860. func (m *encryptedExtensionsMsg) marshal() ([]byte, error) {
  861. if m.raw != nil {
  862. return m.raw, nil
  863. }
  864. var b cryptobyte.Builder
  865. b.AddUint8(typeEncryptedExtensions)
  866. b.AddUint24LengthPrefixed(func(b *cryptobyte.Builder) {
  867. b.AddUint16LengthPrefixed(func(b *cryptobyte.Builder) {
  868. if len(m.alpnProtocol) > 0 {
  869. b.AddUint16(extensionALPN)
  870. b.AddUint16LengthPrefixed(func(b *cryptobyte.Builder) {
  871. b.AddUint16LengthPrefixed(func(b *cryptobyte.Builder) {
  872. b.AddUint8LengthPrefixed(func(b *cryptobyte.Builder) {
  873. b.AddBytes([]byte(m.alpnProtocol))
  874. })
  875. })
  876. })
  877. }
  878. if m.quicTransportParameters != nil { // marshal zero-length parameters when present
  879. // draft-ietf-quic-tls-32, Section 8.2
  880. b.AddUint16(extensionQUICTransportParameters)
  881. b.AddUint16LengthPrefixed(func(b *cryptobyte.Builder) {
  882. b.AddBytes(m.quicTransportParameters)
  883. })
  884. }
  885. if m.earlyData {
  886. // RFC 8446, Section 4.2.10
  887. b.AddUint16(extensionEarlyData)
  888. b.AddUint16(0) // empty extension_data
  889. }
  890. })
  891. })
  892. var err error
  893. m.raw, err = b.Bytes()
  894. return m.raw, err
  895. }
  896. func (m *encryptedExtensionsMsg) unmarshal(data []byte) bool {
  897. *m = encryptedExtensionsMsg{raw: data}
  898. s := cryptobyte.String(data)
  899. var extensions cryptobyte.String
  900. if !s.Skip(4) || // message type and uint24 length field
  901. !s.ReadUint16LengthPrefixed(&extensions) || !s.Empty() {
  902. return false
  903. }
  904. for !extensions.Empty() {
  905. var extension uint16
  906. var extData cryptobyte.String
  907. if !extensions.ReadUint16(&extension) ||
  908. !extensions.ReadUint16LengthPrefixed(&extData) {
  909. return false
  910. }
  911. switch extension {
  912. case extensionALPN:
  913. var protoList cryptobyte.String
  914. if !extData.ReadUint16LengthPrefixed(&protoList) || protoList.Empty() {
  915. return false
  916. }
  917. var proto cryptobyte.String
  918. if !protoList.ReadUint8LengthPrefixed(&proto) ||
  919. proto.Empty() || !protoList.Empty() {
  920. return false
  921. }
  922. m.alpnProtocol = string(proto)
  923. case extensionQUICTransportParameters:
  924. m.quicTransportParameters = make([]byte, len(extData))
  925. if !extData.CopyBytes(m.quicTransportParameters) {
  926. return false
  927. }
  928. case extensionEarlyData:
  929. // RFC 8446, Section 4.2.10
  930. m.earlyData = true
  931. default:
  932. // [UTLS SECTION START]
  933. if !m.utlsUnmarshal(extension, extData) {
  934. return false // return false when ERROR
  935. }
  936. // [UTLS SECTION END]
  937. // Ignore unknown extensions.
  938. continue
  939. }
  940. if !extData.Empty() {
  941. return false
  942. }
  943. }
  944. return true
  945. }
  946. type endOfEarlyDataMsg struct{}
  947. func (m *endOfEarlyDataMsg) marshal() ([]byte, error) {
  948. x := make([]byte, 4)
  949. x[0] = typeEndOfEarlyData
  950. return x, nil
  951. }
  952. func (m *endOfEarlyDataMsg) unmarshal(data []byte) bool {
  953. return len(data) == 4
  954. }
  955. type keyUpdateMsg struct {
  956. raw []byte
  957. updateRequested bool
  958. }
  959. func (m *keyUpdateMsg) marshal() ([]byte, error) {
  960. if m.raw != nil {
  961. return m.raw, nil
  962. }
  963. var b cryptobyte.Builder
  964. b.AddUint8(typeKeyUpdate)
  965. b.AddUint24LengthPrefixed(func(b *cryptobyte.Builder) {
  966. if m.updateRequested {
  967. b.AddUint8(1)
  968. } else {
  969. b.AddUint8(0)
  970. }
  971. })
  972. var err error
  973. m.raw, err = b.Bytes()
  974. return m.raw, err
  975. }
  976. func (m *keyUpdateMsg) unmarshal(data []byte) bool {
  977. m.raw = data
  978. s := cryptobyte.String(data)
  979. var updateRequested uint8
  980. if !s.Skip(4) || // message type and uint24 length field
  981. !s.ReadUint8(&updateRequested) || !s.Empty() {
  982. return false
  983. }
  984. switch updateRequested {
  985. case 0:
  986. m.updateRequested = false
  987. case 1:
  988. m.updateRequested = true
  989. default:
  990. return false
  991. }
  992. return true
  993. }
  994. type newSessionTicketMsgTLS13 struct {
  995. raw []byte
  996. lifetime uint32
  997. ageAdd uint32
  998. nonce []byte
  999. label []byte
  1000. maxEarlyData uint32
  1001. }
  1002. func (m *newSessionTicketMsgTLS13) marshal() ([]byte, error) {
  1003. if m.raw != nil {
  1004. return m.raw, nil
  1005. }
  1006. var b cryptobyte.Builder
  1007. b.AddUint8(typeNewSessionTicket)
  1008. b.AddUint24LengthPrefixed(func(b *cryptobyte.Builder) {
  1009. b.AddUint32(m.lifetime)
  1010. b.AddUint32(m.ageAdd)
  1011. b.AddUint8LengthPrefixed(func(b *cryptobyte.Builder) {
  1012. b.AddBytes(m.nonce)
  1013. })
  1014. b.AddUint16LengthPrefixed(func(b *cryptobyte.Builder) {
  1015. b.AddBytes(m.label)
  1016. })
  1017. b.AddUint16LengthPrefixed(func(b *cryptobyte.Builder) {
  1018. if m.maxEarlyData > 0 {
  1019. b.AddUint16(extensionEarlyData)
  1020. b.AddUint16LengthPrefixed(func(b *cryptobyte.Builder) {
  1021. b.AddUint32(m.maxEarlyData)
  1022. })
  1023. }
  1024. })
  1025. })
  1026. var err error
  1027. m.raw, err = b.Bytes()
  1028. return m.raw, err
  1029. }
  1030. func (m *newSessionTicketMsgTLS13) unmarshal(data []byte) bool {
  1031. *m = newSessionTicketMsgTLS13{raw: data}
  1032. s := cryptobyte.String(data)
  1033. var extensions cryptobyte.String
  1034. if !s.Skip(4) || // message type and uint24 length field
  1035. !s.ReadUint32(&m.lifetime) ||
  1036. !s.ReadUint32(&m.ageAdd) ||
  1037. !readUint8LengthPrefixed(&s, &m.nonce) ||
  1038. !readUint16LengthPrefixed(&s, &m.label) ||
  1039. !s.ReadUint16LengthPrefixed(&extensions) ||
  1040. !s.Empty() {
  1041. return false
  1042. }
  1043. for !extensions.Empty() {
  1044. var extension uint16
  1045. var extData cryptobyte.String
  1046. if !extensions.ReadUint16(&extension) ||
  1047. !extensions.ReadUint16LengthPrefixed(&extData) {
  1048. return false
  1049. }
  1050. switch extension {
  1051. case extensionEarlyData:
  1052. if !extData.ReadUint32(&m.maxEarlyData) {
  1053. return false
  1054. }
  1055. default:
  1056. // Ignore unknown extensions.
  1057. continue
  1058. }
  1059. if !extData.Empty() {
  1060. return false
  1061. }
  1062. }
  1063. return true
  1064. }
  1065. type certificateRequestMsgTLS13 struct {
  1066. raw []byte
  1067. ocspStapling bool
  1068. scts bool
  1069. supportedSignatureAlgorithms []SignatureScheme
  1070. supportedSignatureAlgorithmsCert []SignatureScheme
  1071. certificateAuthorities [][]byte
  1072. }
  1073. func (m *certificateRequestMsgTLS13) marshal() ([]byte, error) {
  1074. if m.raw != nil {
  1075. return m.raw, nil
  1076. }
  1077. var b cryptobyte.Builder
  1078. b.AddUint8(typeCertificateRequest)
  1079. b.AddUint24LengthPrefixed(func(b *cryptobyte.Builder) {
  1080. // certificate_request_context (SHALL be zero length unless used for
  1081. // post-handshake authentication)
  1082. b.AddUint8(0)
  1083. b.AddUint16LengthPrefixed(func(b *cryptobyte.Builder) {
  1084. if m.ocspStapling {
  1085. b.AddUint16(extensionStatusRequest)
  1086. b.AddUint16(0) // empty extension_data
  1087. }
  1088. if m.scts {
  1089. // RFC 8446, Section 4.4.2.1 makes no mention of
  1090. // signed_certificate_timestamp in CertificateRequest, but
  1091. // "Extensions in the Certificate message from the client MUST
  1092. // correspond to extensions in the CertificateRequest message
  1093. // from the server." and it appears in the table in Section 4.2.
  1094. b.AddUint16(extensionSCT)
  1095. b.AddUint16(0) // empty extension_data
  1096. }
  1097. if len(m.supportedSignatureAlgorithms) > 0 {
  1098. b.AddUint16(extensionSignatureAlgorithms)
  1099. b.AddUint16LengthPrefixed(func(b *cryptobyte.Builder) {
  1100. b.AddUint16LengthPrefixed(func(b *cryptobyte.Builder) {
  1101. for _, sigAlgo := range m.supportedSignatureAlgorithms {
  1102. b.AddUint16(uint16(sigAlgo))
  1103. }
  1104. })
  1105. })
  1106. }
  1107. if len(m.supportedSignatureAlgorithmsCert) > 0 {
  1108. b.AddUint16(extensionSignatureAlgorithmsCert)
  1109. b.AddUint16LengthPrefixed(func(b *cryptobyte.Builder) {
  1110. b.AddUint16LengthPrefixed(func(b *cryptobyte.Builder) {
  1111. for _, sigAlgo := range m.supportedSignatureAlgorithmsCert {
  1112. b.AddUint16(uint16(sigAlgo))
  1113. }
  1114. })
  1115. })
  1116. }
  1117. if len(m.certificateAuthorities) > 0 {
  1118. b.AddUint16(extensionCertificateAuthorities)
  1119. b.AddUint16LengthPrefixed(func(b *cryptobyte.Builder) {
  1120. b.AddUint16LengthPrefixed(func(b *cryptobyte.Builder) {
  1121. for _, ca := range m.certificateAuthorities {
  1122. b.AddUint16LengthPrefixed(func(b *cryptobyte.Builder) {
  1123. b.AddBytes(ca)
  1124. })
  1125. }
  1126. })
  1127. })
  1128. }
  1129. })
  1130. })
  1131. var err error
  1132. m.raw, err = b.Bytes()
  1133. return m.raw, err
  1134. }
  1135. func (m *certificateRequestMsgTLS13) unmarshal(data []byte) bool {
  1136. *m = certificateRequestMsgTLS13{raw: data}
  1137. s := cryptobyte.String(data)
  1138. var context, extensions cryptobyte.String
  1139. if !s.Skip(4) || // message type and uint24 length field
  1140. !s.ReadUint8LengthPrefixed(&context) || !context.Empty() ||
  1141. !s.ReadUint16LengthPrefixed(&extensions) ||
  1142. !s.Empty() {
  1143. return false
  1144. }
  1145. for !extensions.Empty() {
  1146. var extension uint16
  1147. var extData cryptobyte.String
  1148. if !extensions.ReadUint16(&extension) ||
  1149. !extensions.ReadUint16LengthPrefixed(&extData) {
  1150. return false
  1151. }
  1152. switch extension {
  1153. case extensionStatusRequest:
  1154. m.ocspStapling = true
  1155. case extensionSCT:
  1156. m.scts = true
  1157. case extensionSignatureAlgorithms:
  1158. var sigAndAlgs cryptobyte.String
  1159. if !extData.ReadUint16LengthPrefixed(&sigAndAlgs) || sigAndAlgs.Empty() {
  1160. return false
  1161. }
  1162. for !sigAndAlgs.Empty() {
  1163. var sigAndAlg uint16
  1164. if !sigAndAlgs.ReadUint16(&sigAndAlg) {
  1165. return false
  1166. }
  1167. m.supportedSignatureAlgorithms = append(
  1168. m.supportedSignatureAlgorithms, SignatureScheme(sigAndAlg))
  1169. }
  1170. case extensionSignatureAlgorithmsCert:
  1171. var sigAndAlgs cryptobyte.String
  1172. if !extData.ReadUint16LengthPrefixed(&sigAndAlgs) || sigAndAlgs.Empty() {
  1173. return false
  1174. }
  1175. for !sigAndAlgs.Empty() {
  1176. var sigAndAlg uint16
  1177. if !sigAndAlgs.ReadUint16(&sigAndAlg) {
  1178. return false
  1179. }
  1180. m.supportedSignatureAlgorithmsCert = append(
  1181. m.supportedSignatureAlgorithmsCert, SignatureScheme(sigAndAlg))
  1182. }
  1183. case extensionCertificateAuthorities:
  1184. var auths cryptobyte.String
  1185. if !extData.ReadUint16LengthPrefixed(&auths) || auths.Empty() {
  1186. return false
  1187. }
  1188. for !auths.Empty() {
  1189. var ca []byte
  1190. if !readUint16LengthPrefixed(&auths, &ca) || len(ca) == 0 {
  1191. return false
  1192. }
  1193. m.certificateAuthorities = append(m.certificateAuthorities, ca)
  1194. }
  1195. default:
  1196. // Ignore unknown extensions.
  1197. continue
  1198. }
  1199. if !extData.Empty() {
  1200. return false
  1201. }
  1202. }
  1203. return true
  1204. }
  1205. type certificateMsg struct {
  1206. raw []byte
  1207. certificates [][]byte
  1208. }
  1209. func (m *certificateMsg) marshal() ([]byte, error) {
  1210. if m.raw != nil {
  1211. return m.raw, nil
  1212. }
  1213. var i int
  1214. for _, slice := range m.certificates {
  1215. i += len(slice)
  1216. }
  1217. length := 3 + 3*len(m.certificates) + i
  1218. x := make([]byte, 4+length)
  1219. x[0] = typeCertificate
  1220. x[1] = uint8(length >> 16)
  1221. x[2] = uint8(length >> 8)
  1222. x[3] = uint8(length)
  1223. certificateOctets := length - 3
  1224. x[4] = uint8(certificateOctets >> 16)
  1225. x[5] = uint8(certificateOctets >> 8)
  1226. x[6] = uint8(certificateOctets)
  1227. y := x[7:]
  1228. for _, slice := range m.certificates {
  1229. y[0] = uint8(len(slice) >> 16)
  1230. y[1] = uint8(len(slice) >> 8)
  1231. y[2] = uint8(len(slice))
  1232. copy(y[3:], slice)
  1233. y = y[3+len(slice):]
  1234. }
  1235. m.raw = x
  1236. return m.raw, nil
  1237. }
  1238. func (m *certificateMsg) unmarshal(data []byte) bool {
  1239. if len(data) < 7 {
  1240. return false
  1241. }
  1242. m.raw = data
  1243. certsLen := uint32(data[4])<<16 | uint32(data[5])<<8 | uint32(data[6])
  1244. if uint32(len(data)) != certsLen+7 {
  1245. return false
  1246. }
  1247. numCerts := 0
  1248. d := data[7:]
  1249. for certsLen > 0 {
  1250. if len(d) < 4 {
  1251. return false
  1252. }
  1253. certLen := uint32(d[0])<<16 | uint32(d[1])<<8 | uint32(d[2])
  1254. if uint32(len(d)) < 3+certLen {
  1255. return false
  1256. }
  1257. d = d[3+certLen:]
  1258. certsLen -= 3 + certLen
  1259. numCerts++
  1260. }
  1261. m.certificates = make([][]byte, numCerts)
  1262. d = data[7:]
  1263. for i := 0; i < numCerts; i++ {
  1264. certLen := uint32(d[0])<<16 | uint32(d[1])<<8 | uint32(d[2])
  1265. m.certificates[i] = d[3 : 3+certLen]
  1266. d = d[3+certLen:]
  1267. }
  1268. return true
  1269. }
  1270. type certificateMsgTLS13 struct {
  1271. raw []byte
  1272. certificate Certificate
  1273. ocspStapling bool
  1274. scts bool
  1275. }
  1276. func (m *certificateMsgTLS13) marshal() ([]byte, error) {
  1277. if m.raw != nil {
  1278. return m.raw, nil
  1279. }
  1280. var b cryptobyte.Builder
  1281. b.AddUint8(typeCertificate)
  1282. b.AddUint24LengthPrefixed(func(b *cryptobyte.Builder) {
  1283. b.AddUint8(0) // certificate_request_context
  1284. certificate := m.certificate
  1285. if !m.ocspStapling {
  1286. certificate.OCSPStaple = nil
  1287. }
  1288. if !m.scts {
  1289. certificate.SignedCertificateTimestamps = nil
  1290. }
  1291. marshalCertificate(b, certificate)
  1292. })
  1293. var err error
  1294. m.raw, err = b.Bytes()
  1295. return m.raw, err
  1296. }
  1297. func marshalCertificate(b *cryptobyte.Builder, certificate Certificate) {
  1298. b.AddUint24LengthPrefixed(func(b *cryptobyte.Builder) {
  1299. for i, cert := range certificate.Certificate {
  1300. b.AddUint24LengthPrefixed(func(b *cryptobyte.Builder) {
  1301. b.AddBytes(cert)
  1302. })
  1303. b.AddUint16LengthPrefixed(func(b *cryptobyte.Builder) {
  1304. if i > 0 {
  1305. // This library only supports OCSP and SCT for leaf certificates.
  1306. return
  1307. }
  1308. if certificate.OCSPStaple != nil {
  1309. b.AddUint16(extensionStatusRequest)
  1310. b.AddUint16LengthPrefixed(func(b *cryptobyte.Builder) {
  1311. b.AddUint8(statusTypeOCSP)
  1312. b.AddUint24LengthPrefixed(func(b *cryptobyte.Builder) {
  1313. b.AddBytes(certificate.OCSPStaple)
  1314. })
  1315. })
  1316. }
  1317. if certificate.SignedCertificateTimestamps != nil {
  1318. b.AddUint16(extensionSCT)
  1319. b.AddUint16LengthPrefixed(func(b *cryptobyte.Builder) {
  1320. b.AddUint16LengthPrefixed(func(b *cryptobyte.Builder) {
  1321. for _, sct := range certificate.SignedCertificateTimestamps {
  1322. b.AddUint16LengthPrefixed(func(b *cryptobyte.Builder) {
  1323. b.AddBytes(sct)
  1324. })
  1325. }
  1326. })
  1327. })
  1328. }
  1329. })
  1330. }
  1331. })
  1332. }
  1333. func (m *certificateMsgTLS13) unmarshal(data []byte) bool {
  1334. *m = certificateMsgTLS13{raw: data}
  1335. s := cryptobyte.String(data)
  1336. var context cryptobyte.String
  1337. if !s.Skip(4) || // message type and uint24 length field
  1338. !s.ReadUint8LengthPrefixed(&context) || !context.Empty() ||
  1339. !unmarshalCertificate(&s, &m.certificate) ||
  1340. !s.Empty() {
  1341. return false
  1342. }
  1343. m.scts = m.certificate.SignedCertificateTimestamps != nil
  1344. m.ocspStapling = m.certificate.OCSPStaple != nil
  1345. return true
  1346. }
  1347. func unmarshalCertificate(s *cryptobyte.String, certificate *Certificate) bool {
  1348. var certList cryptobyte.String
  1349. if !s.ReadUint24LengthPrefixed(&certList) {
  1350. return false
  1351. }
  1352. for !certList.Empty() {
  1353. var cert []byte
  1354. var extensions cryptobyte.String
  1355. if !readUint24LengthPrefixed(&certList, &cert) ||
  1356. !certList.ReadUint16LengthPrefixed(&extensions) {
  1357. return false
  1358. }
  1359. certificate.Certificate = append(certificate.Certificate, cert)
  1360. for !extensions.Empty() {
  1361. var extension uint16
  1362. var extData cryptobyte.String
  1363. if !extensions.ReadUint16(&extension) ||
  1364. !extensions.ReadUint16LengthPrefixed(&extData) {
  1365. return false
  1366. }
  1367. if len(certificate.Certificate) > 1 {
  1368. // This library only supports OCSP and SCT for leaf certificates.
  1369. continue
  1370. }
  1371. switch extension {
  1372. case extensionStatusRequest:
  1373. var statusType uint8
  1374. if !extData.ReadUint8(&statusType) || statusType != statusTypeOCSP ||
  1375. !readUint24LengthPrefixed(&extData, &certificate.OCSPStaple) ||
  1376. len(certificate.OCSPStaple) == 0 {
  1377. return false
  1378. }
  1379. case extensionSCT:
  1380. var sctList cryptobyte.String
  1381. if !extData.ReadUint16LengthPrefixed(&sctList) || sctList.Empty() {
  1382. return false
  1383. }
  1384. for !sctList.Empty() {
  1385. var sct []byte
  1386. if !readUint16LengthPrefixed(&sctList, &sct) ||
  1387. len(sct) == 0 {
  1388. return false
  1389. }
  1390. certificate.SignedCertificateTimestamps = append(
  1391. certificate.SignedCertificateTimestamps, sct)
  1392. }
  1393. default:
  1394. // Ignore unknown extensions.
  1395. continue
  1396. }
  1397. if !extData.Empty() {
  1398. return false
  1399. }
  1400. }
  1401. }
  1402. return true
  1403. }
  1404. type serverKeyExchangeMsg struct {
  1405. raw []byte
  1406. key []byte
  1407. }
  1408. func (m *serverKeyExchangeMsg) marshal() ([]byte, error) {
  1409. if m.raw != nil {
  1410. return m.raw, nil
  1411. }
  1412. length := len(m.key)
  1413. x := make([]byte, length+4)
  1414. x[0] = typeServerKeyExchange
  1415. x[1] = uint8(length >> 16)
  1416. x[2] = uint8(length >> 8)
  1417. x[3] = uint8(length)
  1418. copy(x[4:], m.key)
  1419. m.raw = x
  1420. return x, nil
  1421. }
  1422. func (m *serverKeyExchangeMsg) unmarshal(data []byte) bool {
  1423. m.raw = data
  1424. if len(data) < 4 {
  1425. return false
  1426. }
  1427. m.key = data[4:]
  1428. return true
  1429. }
  1430. type certificateStatusMsg struct {
  1431. raw []byte
  1432. response []byte
  1433. }
  1434. func (m *certificateStatusMsg) marshal() ([]byte, error) {
  1435. if m.raw != nil {
  1436. return m.raw, nil
  1437. }
  1438. var b cryptobyte.Builder
  1439. b.AddUint8(typeCertificateStatus)
  1440. b.AddUint24LengthPrefixed(func(b *cryptobyte.Builder) {
  1441. b.AddUint8(statusTypeOCSP)
  1442. b.AddUint24LengthPrefixed(func(b *cryptobyte.Builder) {
  1443. b.AddBytes(m.response)
  1444. })
  1445. })
  1446. var err error
  1447. m.raw, err = b.Bytes()
  1448. return m.raw, err
  1449. }
  1450. func (m *certificateStatusMsg) unmarshal(data []byte) bool {
  1451. m.raw = data
  1452. s := cryptobyte.String(data)
  1453. var statusType uint8
  1454. if !s.Skip(4) || // message type and uint24 length field
  1455. !s.ReadUint8(&statusType) || statusType != statusTypeOCSP ||
  1456. !readUint24LengthPrefixed(&s, &m.response) ||
  1457. len(m.response) == 0 || !s.Empty() {
  1458. return false
  1459. }
  1460. return true
  1461. }
  1462. type serverHelloDoneMsg struct{}
  1463. func (m *serverHelloDoneMsg) marshal() ([]byte, error) {
  1464. x := make([]byte, 4)
  1465. x[0] = typeServerHelloDone
  1466. return x, nil
  1467. }
  1468. func (m *serverHelloDoneMsg) unmarshal(data []byte) bool {
  1469. return len(data) == 4
  1470. }
  1471. type clientKeyExchangeMsg struct {
  1472. raw []byte
  1473. ciphertext []byte
  1474. }
  1475. func (m *clientKeyExchangeMsg) marshal() ([]byte, error) {
  1476. if m.raw != nil {
  1477. return m.raw, nil
  1478. }
  1479. length := len(m.ciphertext)
  1480. x := make([]byte, length+4)
  1481. x[0] = typeClientKeyExchange
  1482. x[1] = uint8(length >> 16)
  1483. x[2] = uint8(length >> 8)
  1484. x[3] = uint8(length)
  1485. copy(x[4:], m.ciphertext)
  1486. m.raw = x
  1487. return x, nil
  1488. }
  1489. func (m *clientKeyExchangeMsg) unmarshal(data []byte) bool {
  1490. m.raw = data
  1491. if len(data) < 4 {
  1492. return false
  1493. }
  1494. l := int(data[1])<<16 | int(data[2])<<8 | int(data[3])
  1495. if l != len(data)-4 {
  1496. return false
  1497. }
  1498. m.ciphertext = data[4:]
  1499. return true
  1500. }
  1501. type finishedMsg struct {
  1502. raw []byte
  1503. verifyData []byte
  1504. }
  1505. func (m *finishedMsg) marshal() ([]byte, error) {
  1506. if m.raw != nil {
  1507. return m.raw, nil
  1508. }
  1509. var b cryptobyte.Builder
  1510. b.AddUint8(typeFinished)
  1511. b.AddUint24LengthPrefixed(func(b *cryptobyte.Builder) {
  1512. b.AddBytes(m.verifyData)
  1513. })
  1514. var err error
  1515. m.raw, err = b.Bytes()
  1516. return m.raw, err
  1517. }
  1518. func (m *finishedMsg) unmarshal(data []byte) bool {
  1519. m.raw = data
  1520. s := cryptobyte.String(data)
  1521. return s.Skip(1) &&
  1522. readUint24LengthPrefixed(&s, &m.verifyData) &&
  1523. s.Empty()
  1524. }
  1525. type certificateRequestMsg struct {
  1526. raw []byte
  1527. // hasSignatureAlgorithm indicates whether this message includes a list of
  1528. // supported signature algorithms. This change was introduced with TLS 1.2.
  1529. hasSignatureAlgorithm bool
  1530. certificateTypes []byte
  1531. supportedSignatureAlgorithms []SignatureScheme
  1532. certificateAuthorities [][]byte
  1533. }
  1534. func (m *certificateRequestMsg) marshal() ([]byte, error) {
  1535. if m.raw != nil {
  1536. return m.raw, nil
  1537. }
  1538. // See RFC 4346, Section 7.4.4.
  1539. length := 1 + len(m.certificateTypes) + 2
  1540. casLength := 0
  1541. for _, ca := range m.certificateAuthorities {
  1542. casLength += 2 + len(ca)
  1543. }
  1544. length += casLength
  1545. if m.hasSignatureAlgorithm {
  1546. length += 2 + 2*len(m.supportedSignatureAlgorithms)
  1547. }
  1548. x := make([]byte, 4+length)
  1549. x[0] = typeCertificateRequest
  1550. x[1] = uint8(length >> 16)
  1551. x[2] = uint8(length >> 8)
  1552. x[3] = uint8(length)
  1553. x[4] = uint8(len(m.certificateTypes))
  1554. copy(x[5:], m.certificateTypes)
  1555. y := x[5+len(m.certificateTypes):]
  1556. if m.hasSignatureAlgorithm {
  1557. n := len(m.supportedSignatureAlgorithms) * 2
  1558. y[0] = uint8(n >> 8)
  1559. y[1] = uint8(n)
  1560. y = y[2:]
  1561. for _, sigAlgo := range m.supportedSignatureAlgorithms {
  1562. y[0] = uint8(sigAlgo >> 8)
  1563. y[1] = uint8(sigAlgo)
  1564. y = y[2:]
  1565. }
  1566. }
  1567. y[0] = uint8(casLength >> 8)
  1568. y[1] = uint8(casLength)
  1569. y = y[2:]
  1570. for _, ca := range m.certificateAuthorities {
  1571. y[0] = uint8(len(ca) >> 8)
  1572. y[1] = uint8(len(ca))
  1573. y = y[2:]
  1574. copy(y, ca)
  1575. y = y[len(ca):]
  1576. }
  1577. m.raw = x
  1578. return m.raw, nil
  1579. }
  1580. func (m *certificateRequestMsg) unmarshal(data []byte) bool {
  1581. m.raw = data
  1582. if len(data) < 5 {
  1583. return false
  1584. }
  1585. length := uint32(data[1])<<16 | uint32(data[2])<<8 | uint32(data[3])
  1586. if uint32(len(data))-4 != length {
  1587. return false
  1588. }
  1589. numCertTypes := int(data[4])
  1590. data = data[5:]
  1591. if numCertTypes == 0 || len(data) <= numCertTypes {
  1592. return false
  1593. }
  1594. m.certificateTypes = make([]byte, numCertTypes)
  1595. if copy(m.certificateTypes, data) != numCertTypes {
  1596. return false
  1597. }
  1598. data = data[numCertTypes:]
  1599. if m.hasSignatureAlgorithm {
  1600. if len(data) < 2 {
  1601. return false
  1602. }
  1603. sigAndHashLen := uint16(data[0])<<8 | uint16(data[1])
  1604. data = data[2:]
  1605. if sigAndHashLen&1 != 0 {
  1606. return false
  1607. }
  1608. if len(data) < int(sigAndHashLen) {
  1609. return false
  1610. }
  1611. numSigAlgos := sigAndHashLen / 2
  1612. m.supportedSignatureAlgorithms = make([]SignatureScheme, numSigAlgos)
  1613. for i := range m.supportedSignatureAlgorithms {
  1614. m.supportedSignatureAlgorithms[i] = SignatureScheme(data[0])<<8 | SignatureScheme(data[1])
  1615. data = data[2:]
  1616. }
  1617. }
  1618. if len(data) < 2 {
  1619. return false
  1620. }
  1621. casLength := uint16(data[0])<<8 | uint16(data[1])
  1622. data = data[2:]
  1623. if len(data) < int(casLength) {
  1624. return false
  1625. }
  1626. cas := make([]byte, casLength)
  1627. copy(cas, data)
  1628. data = data[casLength:]
  1629. m.certificateAuthorities = nil
  1630. for len(cas) > 0 {
  1631. if len(cas) < 2 {
  1632. return false
  1633. }
  1634. caLen := uint16(cas[0])<<8 | uint16(cas[1])
  1635. cas = cas[2:]
  1636. if len(cas) < int(caLen) {
  1637. return false
  1638. }
  1639. m.certificateAuthorities = append(m.certificateAuthorities, cas[:caLen])
  1640. cas = cas[caLen:]
  1641. }
  1642. return len(data) == 0
  1643. }
  1644. type certificateVerifyMsg struct {
  1645. raw []byte
  1646. hasSignatureAlgorithm bool // format change introduced in TLS 1.2
  1647. signatureAlgorithm SignatureScheme
  1648. signature []byte
  1649. }
  1650. func (m *certificateVerifyMsg) marshal() ([]byte, error) {
  1651. if m.raw != nil {
  1652. return m.raw, nil
  1653. }
  1654. var b cryptobyte.Builder
  1655. b.AddUint8(typeCertificateVerify)
  1656. b.AddUint24LengthPrefixed(func(b *cryptobyte.Builder) {
  1657. if m.hasSignatureAlgorithm {
  1658. b.AddUint16(uint16(m.signatureAlgorithm))
  1659. }
  1660. b.AddUint16LengthPrefixed(func(b *cryptobyte.Builder) {
  1661. b.AddBytes(m.signature)
  1662. })
  1663. })
  1664. var err error
  1665. m.raw, err = b.Bytes()
  1666. return m.raw, err
  1667. }
  1668. func (m *certificateVerifyMsg) unmarshal(data []byte) bool {
  1669. m.raw = data
  1670. s := cryptobyte.String(data)
  1671. if !s.Skip(4) { // message type and uint24 length field
  1672. return false
  1673. }
  1674. if m.hasSignatureAlgorithm {
  1675. if !s.ReadUint16((*uint16)(&m.signatureAlgorithm)) {
  1676. return false
  1677. }
  1678. }
  1679. return readUint16LengthPrefixed(&s, &m.signature) && s.Empty()
  1680. }
  1681. type newSessionTicketMsg struct {
  1682. raw []byte
  1683. ticket []byte
  1684. }
  1685. func (m *newSessionTicketMsg) marshal() ([]byte, error) {
  1686. if m.raw != nil {
  1687. return m.raw, nil
  1688. }
  1689. // See RFC 5077, Section 3.3.
  1690. ticketLen := len(m.ticket)
  1691. length := 2 + 4 + ticketLen
  1692. x := make([]byte, 4+length)
  1693. x[0] = typeNewSessionTicket
  1694. x[1] = uint8(length >> 16)
  1695. x[2] = uint8(length >> 8)
  1696. x[3] = uint8(length)
  1697. x[8] = uint8(ticketLen >> 8)
  1698. x[9] = uint8(ticketLen)
  1699. copy(x[10:], m.ticket)
  1700. m.raw = x
  1701. return m.raw, nil
  1702. }
  1703. func (m *newSessionTicketMsg) unmarshal(data []byte) bool {
  1704. m.raw = data
  1705. if len(data) < 10 {
  1706. return false
  1707. }
  1708. length := uint32(data[1])<<16 | uint32(data[2])<<8 | uint32(data[3])
  1709. if uint32(len(data))-4 != length {
  1710. return false
  1711. }
  1712. ticketLen := int(data[8])<<8 + int(data[9])
  1713. if len(data)-10 != ticketLen {
  1714. return false
  1715. }
  1716. m.ticket = data[10:]
  1717. return true
  1718. }
  1719. type helloRequestMsg struct {
  1720. }
  1721. func (*helloRequestMsg) marshal() ([]byte, error) {
  1722. return []byte{typeHelloRequest, 0, 0, 0}, nil
  1723. }
  1724. func (*helloRequestMsg) unmarshal(data []byte) bool {
  1725. return len(data) == 4
  1726. }
  1727. type transcriptHash interface {
  1728. Write([]byte) (int, error)
  1729. }
  1730. // transcriptMsg is a helper used to marshal and hash messages which typically
  1731. // are not written to the wire, and as such aren't hashed during Conn.writeRecord.
  1732. func transcriptMsg(msg handshakeMessage, h transcriptHash) error {
  1733. data, err := msg.marshal()
  1734. if err != nil {
  1735. return err
  1736. }
  1737. h.Write(data)
  1738. return nil
  1739. }