ticket.go 5.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214
  1. // Copyright 2012 The Go Authors. All rights reserved.
  2. // Use of this source code is governed by a BSD-style
  3. // license that can be found in the LICENSE file.
  4. package tls
  5. import (
  6. "bytes"
  7. "crypto/aes"
  8. "crypto/cipher"
  9. "crypto/hmac"
  10. "crypto/sha256"
  11. "crypto/subtle"
  12. "errors"
  13. "golang.org/x/crypto/cryptobyte"
  14. "io"
  15. )
  16. // sessionState contains the information that is serialized into a session
  17. // ticket in order to later resume a connection.
  18. type sessionState struct {
  19. vers uint16
  20. cipherSuite uint16
  21. masterSecret []byte
  22. certificates [][]byte
  23. // usedOldKey is true if the ticket from which this session came from
  24. // was encrypted with an older key and thus should be refreshed.
  25. usedOldKey bool
  26. }
  27. func (s *sessionState) marshal() []byte {
  28. length := 2 + 2 + 2 + len(s.masterSecret) + 2
  29. for _, cert := range s.certificates {
  30. length += 4 + len(cert)
  31. }
  32. ret := make([]byte, length)
  33. x := ret
  34. x[0] = byte(s.vers >> 8)
  35. x[1] = byte(s.vers)
  36. x[2] = byte(s.cipherSuite >> 8)
  37. x[3] = byte(s.cipherSuite)
  38. x[4] = byte(len(s.masterSecret) >> 8)
  39. x[5] = byte(len(s.masterSecret))
  40. x = x[6:]
  41. copy(x, s.masterSecret)
  42. x = x[len(s.masterSecret):]
  43. x[0] = byte(len(s.certificates) >> 8)
  44. x[1] = byte(len(s.certificates))
  45. x = x[2:]
  46. for _, cert := range s.certificates {
  47. x[0] = byte(len(cert) >> 24)
  48. x[1] = byte(len(cert) >> 16)
  49. x[2] = byte(len(cert) >> 8)
  50. x[3] = byte(len(cert))
  51. copy(x[4:], cert)
  52. x = x[4+len(cert):]
  53. }
  54. return ret
  55. }
  56. func (s *sessionState) unmarshal(data []byte) bool {
  57. if len(data) < 8 {
  58. return false
  59. }
  60. s.vers = uint16(data[0])<<8 | uint16(data[1])
  61. s.cipherSuite = uint16(data[2])<<8 | uint16(data[3])
  62. masterSecretLen := int(data[4])<<8 | int(data[5])
  63. data = data[6:]
  64. if len(data) < masterSecretLen {
  65. return false
  66. }
  67. s.masterSecret = data[:masterSecretLen]
  68. data = data[masterSecretLen:]
  69. if len(data) < 2 {
  70. return false
  71. }
  72. numCerts := int(data[0])<<8 | int(data[1])
  73. data = data[2:]
  74. s.certificates = make([][]byte, numCerts)
  75. for i := range s.certificates {
  76. if len(data) < 4 {
  77. return false
  78. }
  79. certLen := int(data[0])<<24 | int(data[1])<<16 | int(data[2])<<8 | int(data[3])
  80. data = data[4:]
  81. if certLen < 0 {
  82. return false
  83. }
  84. if len(data) < certLen {
  85. return false
  86. }
  87. s.certificates[i] = data[:certLen]
  88. data = data[certLen:]
  89. }
  90. return len(data) == 0
  91. }
  92. // sessionStateTLS13 is the content of a TLS 1.3 session ticket. Its first
  93. // version (revision = 0) doesn't carry any of the information needed for 0-RTT
  94. // validation and the nonce is always empty.
  95. type sessionStateTLS13 struct {
  96. // uint8 version = 0x0304;
  97. // uint8 revision = 0;
  98. cipherSuite uint16
  99. createdAt uint64
  100. resumptionSecret []byte // opaque resumption_master_secret<1..2^8-1>;
  101. certificate Certificate // CertificateEntry certificate_list<0..2^24-1>;
  102. }
  103. func (m *sessionStateTLS13) marshal() []byte {
  104. var b cryptobyte.Builder
  105. b.AddUint16(VersionTLS13)
  106. b.AddUint8(0) // revision
  107. b.AddUint16(m.cipherSuite)
  108. addUint64(&b, m.createdAt)
  109. b.AddUint8LengthPrefixed(func(b *cryptobyte.Builder) {
  110. b.AddBytes(m.resumptionSecret)
  111. })
  112. marshalCertificate(&b, m.certificate)
  113. return b.BytesOrPanic()
  114. }
  115. func (m *sessionStateTLS13) unmarshal(data []byte) bool {
  116. *m = sessionStateTLS13{}
  117. s := cryptobyte.String(data)
  118. var version uint16
  119. var revision uint8
  120. return s.ReadUint16(&version) &&
  121. version == VersionTLS13 &&
  122. s.ReadUint8(&revision) &&
  123. revision == 0 &&
  124. s.ReadUint16(&m.cipherSuite) &&
  125. readUint64(&s, &m.createdAt) &&
  126. readUint8LengthPrefixed(&s, &m.resumptionSecret) &&
  127. len(m.resumptionSecret) != 0 &&
  128. unmarshalCertificate(&s, &m.certificate) &&
  129. s.Empty()
  130. }
  131. func (c *Conn) encryptTicket(state []byte) ([]byte, error) {
  132. encrypted := make([]byte, ticketKeyNameLen+aes.BlockSize+len(state)+sha256.Size)
  133. keyName := encrypted[:ticketKeyNameLen]
  134. iv := encrypted[ticketKeyNameLen : ticketKeyNameLen+aes.BlockSize]
  135. macBytes := encrypted[len(encrypted)-sha256.Size:]
  136. if _, err := io.ReadFull(c.config.rand(), iv); err != nil {
  137. return nil, err
  138. }
  139. key := c.config.ticketKeys()[0]
  140. copy(keyName, key.keyName[:])
  141. block, err := aes.NewCipher(key.aesKey[:])
  142. if err != nil {
  143. return nil, errors.New("tls: failed to create cipher while encrypting ticket: " + err.Error())
  144. }
  145. cipher.NewCTR(block, iv).XORKeyStream(encrypted[ticketKeyNameLen+aes.BlockSize:], state)
  146. mac := hmac.New(sha256.New, key.hmacKey[:])
  147. mac.Write(encrypted[:len(encrypted)-sha256.Size])
  148. mac.Sum(macBytes[:0])
  149. return encrypted, nil
  150. }
  151. func (c *Conn) decryptTicket(encrypted []byte) (plaintext []byte, usedOldKey bool) {
  152. if len(encrypted) < ticketKeyNameLen+aes.BlockSize+sha256.Size {
  153. return nil, false
  154. }
  155. keyName := encrypted[:ticketKeyNameLen]
  156. iv := encrypted[ticketKeyNameLen : ticketKeyNameLen+aes.BlockSize]
  157. macBytes := encrypted[len(encrypted)-sha256.Size:]
  158. ciphertext := encrypted[ticketKeyNameLen+aes.BlockSize : len(encrypted)-sha256.Size]
  159. keys := c.config.ticketKeys()
  160. keyIndex := -1
  161. for i, candidateKey := range keys {
  162. if bytes.Equal(keyName, candidateKey.keyName[:]) {
  163. keyIndex = i
  164. break
  165. }
  166. }
  167. if keyIndex == -1 {
  168. return nil, false
  169. }
  170. key := &keys[keyIndex]
  171. mac := hmac.New(sha256.New, key.hmacKey[:])
  172. mac.Write(encrypted[:len(encrypted)-sha256.Size])
  173. expected := mac.Sum(nil)
  174. if subtle.ConstantTimeCompare(macBytes, expected) != 1 {
  175. return nil, false
  176. }
  177. block, err := aes.NewCipher(key.aesKey[:])
  178. if err != nil {
  179. return nil, false
  180. }
  181. plaintext = make([]byte, len(ciphertext))
  182. cipher.NewCTR(block, iv).XORKeyStream(plaintext, ciphertext)
  183. return plaintext, keyIndex > 0
  184. }