mihomo/transport/vless/xtls.go

47 lines
1 KiB
Go
Raw Normal View History

2021-07-06 23:55:34 +08:00
package vless
import (
2022-01-18 10:05:06 +08:00
"context"
2023-02-25 13:12:19 +08:00
"errors"
2021-07-06 23:55:34 +08:00
"net"
tlsC "github.com/Dreamacro/clash/component/tls"
2022-01-18 10:05:06 +08:00
C "github.com/Dreamacro/clash/constant"
2021-07-06 23:55:34 +08:00
xtls "github.com/xtls/go"
)
2023-02-25 13:12:19 +08:00
var (
ErrNotTLS13 = errors.New("XTLS Vision based on TLS 1.3 outer connection")
)
2021-07-06 23:55:34 +08:00
type XTLSConfig struct {
Host string
SkipCertVerify bool
Fingerprint string
2021-07-06 23:55:34 +08:00
NextProtos []string
}
func StreamXTLSConn(conn net.Conn, cfg *XTLSConfig) (net.Conn, error) {
xtlsConfig := &xtls.Config{
ServerName: cfg.Host,
InsecureSkipVerify: cfg.SkipCertVerify,
NextProtos: cfg.NextProtos,
}
if len(cfg.Fingerprint) == 0 {
xtlsConfig = tlsC.GetGlobalXTLSConfig(xtlsConfig)
2022-07-11 13:42:28 +08:00
} else {
var err error
if xtlsConfig, err = tlsC.GetSpecifiedFingerprintXTLSConfig(xtlsConfig, cfg.Fingerprint); err != nil {
2022-07-11 13:42:28 +08:00
return nil, err
}
}
2021-07-06 23:55:34 +08:00
xtlsConn := xtls.Client(conn, xtlsConfig)
2022-01-18 10:05:06 +08:00
2022-02-23 01:00:27 +08:00
// fix xtls handshake not timeout
2022-01-18 10:05:06 +08:00
ctx, cancel := context.WithTimeout(context.Background(), C.DefaultTLSTimeout)
defer cancel()
err := xtlsConn.HandshakeContext(ctx)
2021-07-06 23:55:34 +08:00
return xtlsConn, err
}