tls.go 1.5 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768
  1. package tls
  2. import (
  3. "crypto/tls"
  4. utls "github.com/refraction-networking/utls"
  5. "github.com/xtls/xray-core/common/buf"
  6. "github.com/xtls/xray-core/common/net"
  7. )
  8. //go:generate go run github.com/xtls/xray-core/common/errors/errorgen
  9. var (
  10. _ buf.Writer = (*Conn)(nil)
  11. )
  12. type Conn struct {
  13. *tls.Conn
  14. }
  15. func (c *Conn) WriteMultiBuffer(mb buf.MultiBuffer) error {
  16. mb = buf.Compact(mb)
  17. mb, err := buf.WriteMultiBuffer(c, mb)
  18. buf.ReleaseMulti(mb)
  19. return err
  20. }
  21. func (c *Conn) HandshakeAddress() net.Address {
  22. if err := c.Handshake(); err != nil {
  23. return nil
  24. }
  25. state := c.ConnectionState()
  26. if state.ServerName == "" {
  27. return nil
  28. }
  29. return net.ParseAddress(state.ServerName)
  30. }
  31. // Client initiates a TLS client handshake on the given connection.
  32. func Client(c net.Conn, config *tls.Config) net.Conn {
  33. tlsConn := tls.Client(c, config)
  34. return &Conn{Conn: tlsConn}
  35. }
  36. var Fingerprints = map[string]utls.ClientHelloID{
  37. "chrome": utls.HelloChrome_Auto,
  38. "firefox": utls.HelloFirefox_Auto,
  39. "safari": utls.HelloIOS_Auto,
  40. "randomized": utls.HelloRandomized,
  41. }
  42. func CopyConfig(c *tls.Config) *utls.Config {
  43. return &utls.Config{
  44. RootCAs: c.RootCAs,
  45. NextProtos: c.NextProtos,
  46. ServerName: c.ServerName,
  47. InsecureSkipVerify: c.InsecureSkipVerify,
  48. MinVersion: c.MinVersion,
  49. MaxVersion: c.MaxVersion,
  50. }
  51. }
  52. // Server initiates a TLS server handshake on the given connection.
  53. func Server(c net.Conn, config *tls.Config) net.Conn {
  54. tlsConn := tls.Server(c, config)
  55. return &Conn{Conn: tlsConn}
  56. }