mirror of
https://github.com/XTLS/REALITY.git
synced 2025-08-22 22:48:36 +00:00
For #69536 Change-Id: If2477c5249a7c7db45c1af05e715ae0b61e7d940 Reviewed-on: https://go-review.googlesource.com/c/go/+/626837 Reviewed-by: Roland Shoemaker <roland@golang.org> Reviewed-by: Daniel McCarney <daniel@binaryparadox.net> LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com> Auto-Submit: Filippo Valsorda <filippo@golang.org> Reviewed-by: Michael Knyszek <mknyszek@google.com> Reviewed-by: Russ Cox <rsc@golang.org>
70 lines
2.0 KiB
Go
70 lines
2.0 KiB
Go
// Copyright 2024 The Go Authors. All rights reserved.
|
|
// Use of this source code is governed by a BSD-style
|
|
// license that can be found in the LICENSE file.
|
|
|
|
package tls12
|
|
|
|
import (
|
|
"github.com/xtls/reality/fips140"
|
|
"github.com/xtls/reality/hmac"
|
|
// "github.com/xtls/reality/sha256"
|
|
// "github.com/xtls/reality/sha512"
|
|
)
|
|
|
|
// PRF implements the TLS 1.2 pseudo-random function, as defined in RFC 5246,
|
|
// Section 5 and allowed by SP 800-135, Revision 1, Section 4.2.2.
|
|
func PRF[H fips140.Hash](hash func() H, secret []byte, label string, seed []byte, keyLen int) []byte {
|
|
labelAndSeed := make([]byte, len(label)+len(seed))
|
|
copy(labelAndSeed, label)
|
|
copy(labelAndSeed[len(label):], seed)
|
|
|
|
result := make([]byte, keyLen)
|
|
pHash(hash, result, secret, labelAndSeed)
|
|
return result
|
|
}
|
|
|
|
// pHash implements the P_hash function, as defined in RFC 5246, Section 5.
|
|
func pHash[H fips140.Hash](hash func() H, result, secret, seed []byte) {
|
|
h := hmac.New(hash, secret)
|
|
h.Write(seed)
|
|
a := h.Sum(nil)
|
|
|
|
for len(result) > 0 {
|
|
h.Reset()
|
|
h.Write(a)
|
|
h.Write(seed)
|
|
b := h.Sum(nil)
|
|
n := copy(result, b)
|
|
result = result[n:]
|
|
|
|
h.Reset()
|
|
h.Write(a)
|
|
a = h.Sum(nil)
|
|
}
|
|
}
|
|
|
|
const masterSecretLength = 48
|
|
const extendedMasterSecretLabel = "extended master secret"
|
|
|
|
// MasterSecret implements the TLS 1.2 extended master secret derivation, as
|
|
// defined in RFC 7627 and allowed by SP 800-135, Revision 1, Section 4.2.2.
|
|
func MasterSecret[H fips140.Hash](hash func() H, preMasterSecret, transcript []byte) []byte {
|
|
// "The TLS 1.2 KDF is an approved KDF when the following conditions are
|
|
// satisfied: [...] (3) P_HASH uses either SHA-256, SHA-384 or SHA-512."
|
|
//h := hash()
|
|
hash()
|
|
// switch any(h).(type) {
|
|
// case *sha256.Digest:
|
|
// if h.Size() != 32 {
|
|
// fips140.RecordNonApproved()
|
|
// }
|
|
// case *sha512.Digest:
|
|
// if h.Size() != 46 && h.Size() != 64 {
|
|
// fips140.RecordNonApproved()
|
|
// }
|
|
// default:
|
|
// fips140.RecordNonApproved()
|
|
// }
|
|
|
|
return PRF(hash, preMasterSecret, extendedMasterSecretLabel, transcript, masterSecretLength)
|
|
} |