blob: 8c2da0dd500fb3b84704ed71aa33ddb976d57c41 [file] [log] [blame]
Adam Langley95c29f32014-06-20 12:00:00 -07001// Copyright 2009 The Go Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style
3// license that can be found in the LICENSE file.
4
Adam Langleydc7e9c42015-09-29 15:21:04 -07005package runner
Adam Langley95c29f32014-06-20 12:00:00 -07006
7import (
Nick Harperb41d2e42016-07-01 17:50:32 -04008 "crypto"
Adam Langley95c29f32014-06-20 12:00:00 -07009 "crypto/hmac"
10 "crypto/md5"
11 "crypto/sha1"
12 "crypto/sha256"
Adam Langley95c29f32014-06-20 12:00:00 -070013 "hash"
14)
15
16// Split a premaster secret in two as specified in RFC 4346, section 5.
17func splitPreMasterSecret(secret []byte) (s1, s2 []byte) {
18 s1 = secret[0 : (len(secret)+1)/2]
19 s2 = secret[len(secret)/2:]
20 return
21}
22
23// pHash implements the P_hash function, as defined in RFC 4346, section 5.
24func pHash(result, secret, seed []byte, hash func() hash.Hash) {
25 h := hmac.New(hash, secret)
26 h.Write(seed)
27 a := h.Sum(nil)
28
29 j := 0
30 for j < len(result) {
31 h.Reset()
32 h.Write(a)
33 h.Write(seed)
34 b := h.Sum(nil)
35 todo := len(b)
36 if j+todo > len(result) {
37 todo = len(result) - j
38 }
39 copy(result[j:j+todo], b)
40 j += todo
41
42 h.Reset()
43 h.Write(a)
44 a = h.Sum(nil)
45 }
46}
47
48// prf10 implements the TLS 1.0 pseudo-random function, as defined in RFC 2246, section 5.
49func prf10(result, secret, label, seed []byte) {
50 hashSHA1 := sha1.New
51 hashMD5 := md5.New
52
53 labelAndSeed := make([]byte, len(label)+len(seed))
54 copy(labelAndSeed, label)
55 copy(labelAndSeed[len(label):], seed)
56
57 s1, s2 := splitPreMasterSecret(secret)
58 pHash(result, s1, labelAndSeed, hashMD5)
59 result2 := make([]byte, len(result))
60 pHash(result2, s2, labelAndSeed, hashSHA1)
61
62 for i, b := range result2 {
63 result[i] ^= b
64 }
65}
66
67// prf12 implements the TLS 1.2 pseudo-random function, as defined in RFC 5246, section 5.
68func prf12(hashFunc func() hash.Hash) func(result, secret, label, seed []byte) {
69 return func(result, secret, label, seed []byte) {
70 labelAndSeed := make([]byte, len(label)+len(seed))
71 copy(labelAndSeed, label)
72 copy(labelAndSeed[len(label):], seed)
73
74 pHash(result, secret, labelAndSeed, hashFunc)
75 }
76}
77
78// prf30 implements the SSL 3.0 pseudo-random function, as defined in
79// www.mozilla.org/projects/security/pki/nss/ssl/draft302.txt section 6.
80func prf30(result, secret, label, seed []byte) {
81 hashSHA1 := sha1.New()
82 hashMD5 := md5.New()
83
84 done := 0
85 i := 0
86 // RFC5246 section 6.3 says that the largest PRF output needed is 128
87 // bytes. Since no more ciphersuites will be added to SSLv3, this will
88 // remain true. Each iteration gives us 16 bytes so 10 iterations will
89 // be sufficient.
90 var b [11]byte
91 for done < len(result) {
92 for j := 0; j <= i; j++ {
93 b[j] = 'A' + byte(i)
94 }
95
96 hashSHA1.Reset()
97 hashSHA1.Write(b[:i+1])
98 hashSHA1.Write(secret)
99 hashSHA1.Write(seed)
100 digest := hashSHA1.Sum(nil)
101
102 hashMD5.Reset()
103 hashMD5.Write(secret)
104 hashMD5.Write(digest)
105
106 done += copy(result[done:], hashMD5.Sum(nil))
107 i++
108 }
109}
110
111const (
112 tlsRandomLength = 32 // Length of a random nonce in TLS 1.1.
113 masterSecretLength = 48 // Length of a master secret in TLS 1.1.
114 finishedVerifyLength = 12 // Length of verify_data in a Finished message.
115)
116
117var masterSecretLabel = []byte("master secret")
Adam Langley75712922014-10-10 16:23:43 -0700118var extendedMasterSecretLabel = []byte("extended master secret")
Adam Langley95c29f32014-06-20 12:00:00 -0700119var keyExpansionLabel = []byte("key expansion")
120var clientFinishedLabel = []byte("client finished")
121var serverFinishedLabel = []byte("server finished")
Steven Valdezc4aa7272016-10-03 12:25:56 -0400122var finishedLabel = []byte("finished")
David Benjamind30a9902014-08-24 01:44:23 -0400123var channelIDLabel = []byte("TLS Channel ID signature\x00")
124var channelIDResumeLabel = []byte("Resumption\x00")
Adam Langley95c29f32014-06-20 12:00:00 -0700125
126func prfForVersion(version uint16, suite *cipherSuite) func(result, secret, label, seed []byte) {
127 switch version {
128 case VersionSSL30:
129 return prf30
130 case VersionTLS10, VersionTLS11:
131 return prf10
Nick Harperdfec1822016-12-06 13:45:45 -0800132 case VersionTLS12:
133 return prf12(suite.hash().New)
Adam Langley95c29f32014-06-20 12:00:00 -0700134 }
Nick Harperb41d2e42016-07-01 17:50:32 -0400135 panic("unknown version")
Adam Langley95c29f32014-06-20 12:00:00 -0700136}
137
138// masterFromPreMasterSecret generates the master secret from the pre-master
139// secret. See http://tools.ietf.org/html/rfc5246#section-8.1
140func masterFromPreMasterSecret(version uint16, suite *cipherSuite, preMasterSecret, clientRandom, serverRandom []byte) []byte {
141 var seed [tlsRandomLength * 2]byte
142 copy(seed[0:len(clientRandom)], clientRandom)
143 copy(seed[len(clientRandom):], serverRandom)
144 masterSecret := make([]byte, masterSecretLength)
145 prfForVersion(version, suite)(masterSecret, preMasterSecret, masterSecretLabel, seed[0:])
146 return masterSecret
147}
148
Adam Langley75712922014-10-10 16:23:43 -0700149// extendedMasterFromPreMasterSecret generates the master secret from the
150// pre-master secret when the Triple Handshake fix is in effect. See
David Benjamin43946d42016-02-01 08:42:19 -0500151// https://tools.ietf.org/html/rfc7627
Adam Langley75712922014-10-10 16:23:43 -0700152func extendedMasterFromPreMasterSecret(version uint16, suite *cipherSuite, preMasterSecret []byte, h finishedHash) []byte {
153 masterSecret := make([]byte, masterSecretLength)
154 prfForVersion(version, suite)(masterSecret, preMasterSecret, extendedMasterSecretLabel, h.Sum())
155 return masterSecret
156}
157
Adam Langley95c29f32014-06-20 12:00:00 -0700158// keysFromMasterSecret generates the connection keys from the master
159// secret, given the lengths of the MAC key, cipher key and IV, as defined in
160// RFC 2246, section 6.3.
161func keysFromMasterSecret(version uint16, suite *cipherSuite, masterSecret, clientRandom, serverRandom []byte, macLen, keyLen, ivLen int) (clientMAC, serverMAC, clientKey, serverKey, clientIV, serverIV []byte) {
162 var seed [tlsRandomLength * 2]byte
163 copy(seed[0:len(clientRandom)], serverRandom)
164 copy(seed[len(serverRandom):], clientRandom)
165
166 n := 2*macLen + 2*keyLen + 2*ivLen
167 keyMaterial := make([]byte, n)
168 prfForVersion(version, suite)(keyMaterial, masterSecret, keyExpansionLabel, seed[0:])
169 clientMAC = keyMaterial[:macLen]
170 keyMaterial = keyMaterial[macLen:]
171 serverMAC = keyMaterial[:macLen]
172 keyMaterial = keyMaterial[macLen:]
173 clientKey = keyMaterial[:keyLen]
174 keyMaterial = keyMaterial[keyLen:]
175 serverKey = keyMaterial[:keyLen]
176 keyMaterial = keyMaterial[keyLen:]
177 clientIV = keyMaterial[:ivLen]
178 keyMaterial = keyMaterial[ivLen:]
179 serverIV = keyMaterial[:ivLen]
180 return
181}
182
Steven Valdezcd8470f2017-10-11 12:29:36 -0400183func newFinishedHash(wireVersion uint16, isDTLS bool, cipherSuite *cipherSuite) finishedHash {
Nick Harperb41d2e42016-07-01 17:50:32 -0400184 var ret finishedHash
Adam Langley95c29f32014-06-20 12:00:00 -0700185
Steven Valdezcd8470f2017-10-11 12:29:36 -0400186 version, ok := wireToVersion(wireVersion, isDTLS)
187 if !ok {
188 panic("unknown version")
189 }
190
Nick Harperb41d2e42016-07-01 17:50:32 -0400191 if version >= VersionTLS12 {
192 ret.hash = cipherSuite.hash()
193
194 ret.client = ret.hash.New()
195 ret.server = ret.hash.New()
196
David Benjamin8d315d72016-07-18 01:03:18 +0200197 if version == VersionTLS12 {
Nick Harperb41d2e42016-07-01 17:50:32 -0400198 ret.prf = prf12(ret.hash.New)
David Benjamin48891ad2016-12-04 00:02:43 -0500199 } else {
200 ret.secret = make([]byte, ret.hash.Size())
Nick Harperb41d2e42016-07-01 17:50:32 -0400201 }
202 } else {
203 ret.hash = crypto.MD5SHA1
204
205 ret.client = sha1.New()
206 ret.server = sha1.New()
207 ret.clientMD5 = md5.New()
208 ret.serverMD5 = md5.New()
209
210 ret.prf = prf10
Adam Langley95c29f32014-06-20 12:00:00 -0700211 }
Nick Harperb41d2e42016-07-01 17:50:32 -0400212
213 ret.buffer = []byte{}
214 ret.version = version
Steven Valdezcd8470f2017-10-11 12:29:36 -0400215 ret.wireVersion = wireVersion
Nick Harperb41d2e42016-07-01 17:50:32 -0400216 return ret
Adam Langley95c29f32014-06-20 12:00:00 -0700217}
218
219// A finishedHash calculates the hash of a set of handshake messages suitable
220// for including in a Finished message.
221type finishedHash struct {
Nick Harperb41d2e42016-07-01 17:50:32 -0400222 hash crypto.Hash
223
Adam Langley95c29f32014-06-20 12:00:00 -0700224 client hash.Hash
225 server hash.Hash
226
227 // Prior to TLS 1.2, an additional MD5 hash is required.
228 clientMD5 hash.Hash
229 serverMD5 hash.Hash
230
David Benjamine098ec22014-08-27 23:13:20 -0400231 // In TLS 1.2 (and SSL 3 for implementation convenience), a
232 // full buffer is required.
233 buffer []byte
234
Steven Valdezcd8470f2017-10-11 12:29:36 -0400235 version uint16
236 wireVersion uint16
237 prf func(result, secret, label, seed []byte)
David Benjamin48891ad2016-12-04 00:02:43 -0500238
239 // secret, in TLS 1.3, is the running input secret.
240 secret []byte
Adam Langley95c29f32014-06-20 12:00:00 -0700241}
242
Steven Valdezcd8470f2017-10-11 12:29:36 -0400243func (h *finishedHash) UpdateForHelloRetryRequest() (err error) {
244 data := newByteBuilder()
245 data.addU8(typeMessageHash)
246 data.addU24(h.hash.Size())
247 data.addBytes(h.Sum())
248 h.client = h.hash.New()
249 h.server = h.hash.New()
250 if h.buffer != nil {
251 h.buffer = []byte{}
252 }
253 h.Write(data.finish())
254 return nil
255}
256
David Benjamine098ec22014-08-27 23:13:20 -0400257func (h *finishedHash) Write(msg []byte) (n int, err error) {
Adam Langley95c29f32014-06-20 12:00:00 -0700258 h.client.Write(msg)
259 h.server.Write(msg)
260
261 if h.version < VersionTLS12 {
262 h.clientMD5.Write(msg)
263 h.serverMD5.Write(msg)
264 }
David Benjamine098ec22014-08-27 23:13:20 -0400265
266 if h.buffer != nil {
267 h.buffer = append(h.buffer, msg...)
268 }
269
Adam Langley95c29f32014-06-20 12:00:00 -0700270 return len(msg), nil
271}
272
Adam Langley75712922014-10-10 16:23:43 -0700273func (h finishedHash) Sum() []byte {
274 if h.version >= VersionTLS12 {
275 return h.client.Sum(nil)
276 }
277
278 out := make([]byte, 0, md5.Size+sha1.Size)
279 out = h.clientMD5.Sum(out)
280 return h.client.Sum(out)
281}
282
Adam Langley95c29f32014-06-20 12:00:00 -0700283// finishedSum30 calculates the contents of the verify_data member of a SSLv3
284// Finished message given the MD5 and SHA1 hashes of a set of handshake
285// messages.
David Benjamine098ec22014-08-27 23:13:20 -0400286func finishedSum30(md5, sha1 hash.Hash, masterSecret []byte, magic []byte) []byte {
287 md5.Write(magic)
Adam Langley95c29f32014-06-20 12:00:00 -0700288 md5.Write(masterSecret)
289 md5.Write(ssl30Pad1[:])
290 md5Digest := md5.Sum(nil)
291
292 md5.Reset()
293 md5.Write(masterSecret)
294 md5.Write(ssl30Pad2[:])
295 md5.Write(md5Digest)
296 md5Digest = md5.Sum(nil)
297
David Benjamine098ec22014-08-27 23:13:20 -0400298 sha1.Write(magic)
Adam Langley95c29f32014-06-20 12:00:00 -0700299 sha1.Write(masterSecret)
300 sha1.Write(ssl30Pad1[:40])
301 sha1Digest := sha1.Sum(nil)
302
303 sha1.Reset()
304 sha1.Write(masterSecret)
305 sha1.Write(ssl30Pad2[:40])
306 sha1.Write(sha1Digest)
307 sha1Digest = sha1.Sum(nil)
308
309 ret := make([]byte, len(md5Digest)+len(sha1Digest))
310 copy(ret, md5Digest)
311 copy(ret[len(md5Digest):], sha1Digest)
312 return ret
313}
314
315var ssl3ClientFinishedMagic = [4]byte{0x43, 0x4c, 0x4e, 0x54}
316var ssl3ServerFinishedMagic = [4]byte{0x53, 0x52, 0x56, 0x52}
317
318// clientSum returns the contents of the verify_data member of a client's
319// Finished message.
Nick Harperb41d2e42016-07-01 17:50:32 -0400320func (h finishedHash) clientSum(baseKey []byte) []byte {
Adam Langley95c29f32014-06-20 12:00:00 -0700321 if h.version == VersionSSL30 {
Nick Harperb41d2e42016-07-01 17:50:32 -0400322 return finishedSum30(h.clientMD5, h.client, baseKey, ssl3ClientFinishedMagic[:])
Adam Langley95c29f32014-06-20 12:00:00 -0700323 }
324
David Benjamin8d315d72016-07-18 01:03:18 +0200325 if h.version < VersionTLS13 {
Nick Harperb41d2e42016-07-01 17:50:32 -0400326 out := make([]byte, finishedVerifyLength)
327 h.prf(out, baseKey, clientFinishedLabel, h.Sum())
328 return out
329 }
330
Steven Valdez7e5dd252018-01-22 15:20:31 -0500331 clientFinishedKey := hkdfExpandLabel(h.hash, baseKey, finishedLabel, nil, h.hash.Size())
Nick Harperb41d2e42016-07-01 17:50:32 -0400332 finishedHMAC := hmac.New(h.hash.New, clientFinishedKey)
333 finishedHMAC.Write(h.appendContextHashes(nil))
334 return finishedHMAC.Sum(nil)
Adam Langley95c29f32014-06-20 12:00:00 -0700335}
336
337// serverSum returns the contents of the verify_data member of a server's
338// Finished message.
Nick Harperb41d2e42016-07-01 17:50:32 -0400339func (h finishedHash) serverSum(baseKey []byte) []byte {
Adam Langley95c29f32014-06-20 12:00:00 -0700340 if h.version == VersionSSL30 {
Nick Harperb41d2e42016-07-01 17:50:32 -0400341 return finishedSum30(h.serverMD5, h.server, baseKey, ssl3ServerFinishedMagic[:])
Adam Langley95c29f32014-06-20 12:00:00 -0700342 }
343
David Benjamin8d315d72016-07-18 01:03:18 +0200344 if h.version < VersionTLS13 {
Nick Harperb41d2e42016-07-01 17:50:32 -0400345 out := make([]byte, finishedVerifyLength)
346 h.prf(out, baseKey, serverFinishedLabel, h.Sum())
347 return out
348 }
349
Steven Valdez7e5dd252018-01-22 15:20:31 -0500350 serverFinishedKey := hkdfExpandLabel(h.hash, baseKey, finishedLabel, nil, h.hash.Size())
Nick Harperb41d2e42016-07-01 17:50:32 -0400351 finishedHMAC := hmac.New(h.hash.New, serverFinishedKey)
352 finishedHMAC.Write(h.appendContextHashes(nil))
353 return finishedHMAC.Sum(nil)
Adam Langley95c29f32014-06-20 12:00:00 -0700354}
355
Nick Harper60edffd2016-06-21 15:19:24 -0700356// hashForClientCertificateSSL3 returns the hash to be signed for client
357// certificates in SSL 3.0.
358func (h finishedHash) hashForClientCertificateSSL3(masterSecret []byte) []byte {
359 md5Hash := md5.New()
360 md5Hash.Write(h.buffer)
361 sha1Hash := sha1.New()
362 sha1Hash.Write(h.buffer)
363 return finishedSum30(md5Hash, sha1Hash, masterSecret, nil)
Adam Langley95c29f32014-06-20 12:00:00 -0700364}
David Benjamind30a9902014-08-24 01:44:23 -0400365
366// hashForChannelID returns the hash to be signed for TLS Channel
367// ID. If a resumption, resumeHash has the previous handshake
368// hash. Otherwise, it is nil.
369func (h finishedHash) hashForChannelID(resumeHash []byte) []byte {
370 hash := sha256.New()
371 hash.Write(channelIDLabel)
372 if resumeHash != nil {
373 hash.Write(channelIDResumeLabel)
374 hash.Write(resumeHash)
375 }
Nick Harperc9846112016-10-17 15:05:35 -0700376 hash.Write(h.Sum())
David Benjamind30a9902014-08-24 01:44:23 -0400377 return hash.Sum(nil)
378}
David Benjamine098ec22014-08-27 23:13:20 -0400379
380// discardHandshakeBuffer is called when there is no more need to
381// buffer the entirety of the handshake messages.
382func (h *finishedHash) discardHandshakeBuffer() {
383 h.buffer = nil
384}
Nick Harperb41d2e42016-07-01 17:50:32 -0400385
386// zeroSecretTLS13 returns the default all zeros secret for TLS 1.3, used when a
David Benjamina128a552016-10-13 14:26:33 -0400387// given secret is not available in the handshake. See draft-ietf-tls-tls13-16,
Nick Harperb41d2e42016-07-01 17:50:32 -0400388// section 7.1.
389func (h *finishedHash) zeroSecret() []byte {
390 return make([]byte, h.hash.Size())
391}
392
David Benjamin48891ad2016-12-04 00:02:43 -0500393// addEntropy incorporates ikm into the running TLS 1.3 secret with HKDF-Expand.
394func (h *finishedHash) addEntropy(ikm []byte) {
395 h.secret = hkdfExtract(h.hash.New, h.secret, ikm)
Nick Harperb41d2e42016-07-01 17:50:32 -0400396}
397
Steven Valdezcd8470f2017-10-11 12:29:36 -0400398func (h *finishedHash) nextSecret() {
Steven Valdez7e5dd252018-01-22 15:20:31 -0500399 h.secret = hkdfExpandLabel(h.hash, h.secret, []byte("derived"), h.hash.New().Sum(nil), h.hash.Size())
Steven Valdezcd8470f2017-10-11 12:29:36 -0400400}
401
Nick Harperb41d2e42016-07-01 17:50:32 -0400402// hkdfExpandLabel implements TLS 1.3's HKDF-Expand-Label function, as defined
David Benjamina128a552016-10-13 14:26:33 -0400403// in section 7.1 of draft-ietf-tls-tls13-16.
Steven Valdez7e5dd252018-01-22 15:20:31 -0500404func hkdfExpandLabel(hash crypto.Hash, secret, label, hashValue []byte, length int) []byte {
Nick Harperb41d2e42016-07-01 17:50:32 -0400405 if len(label) > 255 || len(hashValue) > 255 {
406 panic("hkdfExpandLabel: label or hashValue too long")
407 }
Steven Valdezcd8470f2017-10-11 12:29:36 -0400408
Steven Valdez7e5dd252018-01-22 15:20:31 -0500409 versionLabel := []byte("tls13 ")
Steven Valdezcd8470f2017-10-11 12:29:36 -0400410 hkdfLabel := make([]byte, 3+len(versionLabel)+len(label)+1+len(hashValue))
Nick Harperb41d2e42016-07-01 17:50:32 -0400411 x := hkdfLabel
412 x[0] = byte(length >> 8)
413 x[1] = byte(length)
Steven Valdezcd8470f2017-10-11 12:29:36 -0400414 x[2] = byte(len(versionLabel) + len(label))
Nick Harperb41d2e42016-07-01 17:50:32 -0400415 x = x[3:]
Steven Valdezcd8470f2017-10-11 12:29:36 -0400416 copy(x, versionLabel)
417 x = x[len(versionLabel):]
Nick Harperb41d2e42016-07-01 17:50:32 -0400418 copy(x, label)
419 x = x[len(label):]
420 x[0] = byte(len(hashValue))
421 copy(x[1:], hashValue)
422 return hkdfExpand(hash.New, secret, hkdfLabel, length)
423}
424
425// appendContextHashes returns the concatenation of the handshake hash and the
426// resumption context hash, as used in TLS 1.3.
427func (h *finishedHash) appendContextHashes(b []byte) []byte {
428 b = h.client.Sum(b)
Nick Harperb41d2e42016-07-01 17:50:32 -0400429 return b
430}
431
432// The following are labels for traffic secret derivation in TLS 1.3.
433var (
Steven Valdez7e5dd252018-01-22 15:20:31 -0500434 externalPSKBinderLabel = []byte("ext binder")
435 resumptionPSKBinderLabel = []byte("res binder")
436 earlyTrafficLabel = []byte("c e traffic")
437 clientHandshakeTrafficLabel = []byte("c hs traffic")
438 serverHandshakeTrafficLabel = []byte("s hs traffic")
439 clientApplicationTrafficLabel = []byte("c ap traffic")
440 serverApplicationTrafficLabel = []byte("s ap traffic")
441 applicationTrafficLabel = []byte("traffic upd")
442 earlyExporterLabel = []byte("e exp master")
443 exporterLabel = []byte("exp master")
444 resumptionLabel = []byte("res master")
Steven Valdezcd8470f2017-10-11 12:29:36 -0400445
446 resumptionPSKLabel = []byte("resumption")
Nick Harperb41d2e42016-07-01 17:50:32 -0400447)
448
449// deriveSecret implements TLS 1.3's Derive-Secret function, as defined in
David Benjamina128a552016-10-13 14:26:33 -0400450// section 7.1 of draft ietf-tls-tls13-16.
David Benjamin48891ad2016-12-04 00:02:43 -0500451func (h *finishedHash) deriveSecret(label []byte) []byte {
Steven Valdez7e5dd252018-01-22 15:20:31 -0500452 return hkdfExpandLabel(h.hash, h.secret, label, h.appendContextHashes(nil), h.hash.Size())
Nick Harperb41d2e42016-07-01 17:50:32 -0400453}
454
455// The following are context strings for CertificateVerify in TLS 1.3.
456var (
457 clientCertificateVerifyContextTLS13 = []byte("TLS 1.3, client CertificateVerify")
458 serverCertificateVerifyContextTLS13 = []byte("TLS 1.3, server CertificateVerify")
Nick Harper60a85cb2016-09-23 16:25:11 -0700459 channelIDContextTLS13 = []byte("TLS 1.3, Channel ID")
Nick Harperb41d2e42016-07-01 17:50:32 -0400460)
461
462// certificateVerifyMessage returns the input to be signed for CertificateVerify
463// in TLS 1.3.
464func (h *finishedHash) certificateVerifyInput(context []byte) []byte {
465 const paddingLen = 64
466 b := make([]byte, paddingLen, paddingLen+len(context)+1+2*h.hash.Size())
467 for i := 0; i < paddingLen; i++ {
468 b[i] = 32
469 }
470 b = append(b, context...)
471 b = append(b, 0)
472 b = h.appendContextHashes(b)
473 return b
474}
475
Nick Harperb41d2e42016-07-01 17:50:32 -0400476type trafficDirection int
477
478const (
479 clientWrite trafficDirection = iota
480 serverWrite
481)
482
Steven Valdeza833c352016-11-01 13:39:36 -0400483var (
484 keyTLS13 = []byte("key")
485 ivTLS13 = []byte("iv")
486)
487
Nick Harperb41d2e42016-07-01 17:50:32 -0400488// deriveTrafficAEAD derives traffic keys and constructs an AEAD given a traffic
489// secret.
Steven Valdeza833c352016-11-01 13:39:36 -0400490func deriveTrafficAEAD(version uint16, suite *cipherSuite, secret []byte, side trafficDirection) interface{} {
Steven Valdez7e5dd252018-01-22 15:20:31 -0500491 key := hkdfExpandLabel(suite.hash(), secret, keyTLS13, nil, suite.keyLen)
492 iv := hkdfExpandLabel(suite.hash(), secret, ivTLS13, nil, suite.ivLen(version))
Nick Harperb41d2e42016-07-01 17:50:32 -0400493
494 return suite.aead(version, key, iv)
495}
David Benjamin21c00282016-07-18 21:56:23 +0200496
Steven Valdezcd8470f2017-10-11 12:29:36 -0400497func updateTrafficSecret(hash crypto.Hash, version uint16, secret []byte) []byte {
Steven Valdez7e5dd252018-01-22 15:20:31 -0500498 return hkdfExpandLabel(hash, secret, applicationTrafficLabel, nil, hash.Size())
David Benjamin21c00282016-07-18 21:56:23 +0200499}
Nick Harper0b3625b2016-07-25 16:16:28 -0700500
Steven Valdezcd8470f2017-10-11 12:29:36 -0400501func computePSKBinder(psk []byte, version uint16, label []byte, cipherSuite *cipherSuite, clientHello, helloRetryRequest, truncatedHello []byte) []byte {
502 finishedHash := newFinishedHash(version, false, cipherSuite)
David Benjamin48891ad2016-12-04 00:02:43 -0500503 finishedHash.addEntropy(psk)
504 binderKey := finishedHash.deriveSecret(label)
Steven Valdezcd8470f2017-10-11 12:29:36 -0400505 finishedHash.Write(clientHello)
Steven Valdez7e5dd252018-01-22 15:20:31 -0500506 if len(helloRetryRequest) != 0 {
Steven Valdezcd8470f2017-10-11 12:29:36 -0400507 finishedHash.UpdateForHelloRetryRequest()
508 }
509 finishedHash.Write(helloRetryRequest)
Steven Valdeza833c352016-11-01 13:39:36 -0400510 finishedHash.Write(truncatedHello)
511 return finishedHash.clientSum(binderKey)
Nick Harper0b3625b2016-07-25 16:16:28 -0700512}
Steven Valdezcd8470f2017-10-11 12:29:36 -0400513
514func deriveSessionPSK(suite *cipherSuite, version uint16, masterSecret []byte, nonce []byte) []byte {
515 hash := suite.hash()
Steven Valdez7e5dd252018-01-22 15:20:31 -0500516 return hkdfExpandLabel(hash, masterSecret, resumptionPSKLabel, nonce, hash.Size())
Steven Valdezcd8470f2017-10-11 12:29:36 -0400517}