| 1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768 |
- package tls
- import (
- "crypto/tls"
- utls "github.com/refraction-networking/utls"
- "github.com/xtls/xray-core/common/buf"
- "github.com/xtls/xray-core/common/net"
- )
- //go:generate go run github.com/xtls/xray-core/common/errors/errorgen
- var (
- _ buf.Writer = (*Conn)(nil)
- )
- type Conn struct {
- *tls.Conn
- }
- func (c *Conn) WriteMultiBuffer(mb buf.MultiBuffer) error {
- mb = buf.Compact(mb)
- mb, err := buf.WriteMultiBuffer(c, mb)
- buf.ReleaseMulti(mb)
- return err
- }
- func (c *Conn) HandshakeAddress() net.Address {
- if err := c.Handshake(); err != nil {
- return nil
- }
- state := c.ConnectionState()
- if state.ServerName == "" {
- return nil
- }
- return net.ParseAddress(state.ServerName)
- }
- // Client initiates a TLS client handshake on the given connection.
- func Client(c net.Conn, config *tls.Config) net.Conn {
- tlsConn := tls.Client(c, config)
- return &Conn{Conn: tlsConn}
- }
- var Fingerprints = map[string]utls.ClientHelloID{
- "chrome": utls.HelloChrome_Auto,
- "firefox": utls.HelloFirefox_Auto,
- "safari": utls.HelloIOS_Auto,
- "randomized": utls.HelloRandomized,
- }
- func CopyConfig(c *tls.Config) *utls.Config {
- return &utls.Config{
- RootCAs: c.RootCAs,
- NextProtos: c.NextProtos,
- ServerName: c.ServerName,
- InsecureSkipVerify: c.InsecureSkipVerify,
- MinVersion: c.MinVersion,
- MaxVersion: c.MaxVersion,
- }
- }
- // Server initiates a TLS server handshake on the given connection.
- func Server(c net.Conn, config *tls.Config) net.Conn {
- tlsConn := tls.Server(c, config)
- return &Conn{Conn: tlsConn}
- }
|