Skip to content

Commit fd0be4b

Browse files
committed
Add mTLS flag support
1 parent b5dcb56 commit fd0be4b

File tree

2 files changed

+26
-4
lines changed

2 files changed

+26
-4
lines changed

src/crypto/tls/handshake_messages.go

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -236,7 +236,9 @@ func (m *clientHelloMsg) marshal() ([]byte, error) {
236236
if len(m.tlsFlags) > 0 {
237237
exts.AddUint16(extensionTLSFlags)
238238
exts.AddUint16LengthPrefixed(func(exts *cryptobyte.Builder) {
239-
exts.AddBytes(m.tlsFlags)
239+
exts.AddUint8LengthPrefixed(func(exts *cryptobyte.Builder) {
240+
exts.AddBytes(m.tlsFlags)
241+
})
240242
})
241243
}
242244
if len(m.cookie) > 0 {
@@ -568,9 +570,13 @@ func (m *clientHelloMsg) unmarshal(data []byte) bool {
568570
m.supportedVersions = append(m.supportedVersions, vers)
569571
}
570572
case extensionTLSFlags:
571-
for !extData.Empty() {
573+
var flagsList cryptobyte.String
574+
if !extData.ReadUint8LengthPrefixed(&flagsList) || flagsList.Empty() {
575+
return false
576+
}
577+
for !flagsList.Empty() {
572578
var flagByte uint8
573-
if !extData.ReadUint8(&flagByte) {
579+
if !flagsList.ReadUint8(&flagByte) {
574580
return false
575581
}
576582
m.tlsFlags = append(m.tlsFlags, flagByte)

src/crypto/tls/handshake_server_tls13.go

Lines changed: 17 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -314,7 +314,18 @@ GroupSelection:
314314
return errors.New("tls: invalid client key share")
315315
}
316316
if len(hs.clientHello.tlsFlags) != 0 {
317-
tlsFlags, err := decodeFlags(hs.clientHello.tlsFlags)
317+
supportedFlags, err := encodeFlags(hs.c.config.TLSFlagsSupported)
318+
if err != nil {
319+
return errors.New("tls: invalid server flags")
320+
}
321+
var mutuallySupportedFlags []byte
322+
for i, sFB := range supportedFlags {
323+
if i >= len(hs.clientHello.tlsFlags) {
324+
break
325+
}
326+
mutuallySupportedFlags = append(mutuallySupportedFlags, hs.clientHello.tlsFlags[i]&sFB)
327+
}
328+
tlsFlags, err := decodeFlags(mutuallySupportedFlags)
318329
if err == nil {
319330
hs.tlsFlags = tlsFlags
320331
}
@@ -838,6 +849,11 @@ func (hs *serverHandshakeStateTLS13) sendServerParameters() error {
838849
}
839850

840851
func (hs *serverHandshakeStateTLS13) requestClientCert() bool {
852+
for _, flag := range hs.tlsFlags {
853+
if flag == FlagSupportMTLS {
854+
return true
855+
}
856+
}
841857
return hs.c.config.ClientAuth >= RequestClientCert && !hs.usingPSK
842858
}
843859

0 commit comments

Comments
 (0)