Xray-core/transport/internet/tls/tls.go

69 lines
1.5 KiB
Go
Raw Normal View History

2020-11-25 14:01:53 +03:00
package tls
import (
"crypto/tls"
2021-03-29 13:08:29 +03:00
utls "github.com/refraction-networking/utls"
2020-12-04 04:36:16 +03:00
"github.com/xtls/xray-core/common/buf"
"github.com/xtls/xray-core/common/net"
2020-11-25 14:01:53 +03:00
)
2020-12-04 04:36:16 +03:00
//go:generate go run github.com/xtls/xray-core/common/errors/errorgen
2020-11-25 14:01:53 +03:00
var (
_ buf.Writer = (*Conn)(nil)
)
type Conn struct {
*tls.Conn
}
func (c *Conn) WriteMultiBuffer(mb buf.MultiBuffer) error {
mb = buf.Compact(mb)
mb, err := buf.WriteMultiBuffer(c, mb)
buf.ReleaseMulti(mb)
return err
}
func (c *Conn) HandshakeAddress() net.Address {
if err := c.Handshake(); err != nil {
return nil
}
state := c.ConnectionState()
if state.ServerName == "" {
return nil
}
return net.ParseAddress(state.ServerName)
}
// Client initiates a TLS client handshake on the given connection.
func Client(c net.Conn, config *tls.Config) net.Conn {
tlsConn := tls.Client(c, config)
return &Conn{Conn: tlsConn}
}
2021-03-29 13:08:29 +03:00
var Fingerprints = map[string]utls.ClientHelloID{
"chrome": utls.HelloChrome_Auto,
"firefox": utls.HelloFirefox_Auto,
"safari": utls.HelloIOS_Auto,
"randomized": utls.HelloRandomized,
}
func CopyConfig(c *tls.Config) *utls.Config {
2020-11-25 14:01:53 +03:00
return &utls.Config{
2021-03-29 13:08:29 +03:00
RootCAs: c.RootCAs,
2020-11-25 14:01:53 +03:00
NextProtos: c.NextProtos,
ServerName: c.ServerName,
InsecureSkipVerify: c.InsecureSkipVerify,
2021-03-29 13:08:29 +03:00
MinVersion: c.MinVersion,
MaxVersion: c.MaxVersion,
2020-11-25 14:01:53 +03:00
}
}
// Server initiates a TLS server handshake on the given connection.
func Server(c net.Conn, config *tls.Config) net.Conn {
tlsConn := tls.Server(c, config)
return &Conn{Conn: tlsConn}
}