Clash.Meta/transport/vmess/tls.go

62 lines
1.5 KiB
Go
Raw Normal View History

2020-04-03 16:04:24 +08:00
package vmess
import (
"context"
2020-04-03 16:04:24 +08:00
"crypto/tls"
2023-03-08 17:18:46 +08:00
"errors"
2020-04-03 16:04:24 +08:00
"net"
2023-11-03 21:01:45 +08:00
"github.com/metacubex/mihomo/component/ca"
tlsC "github.com/metacubex/mihomo/component/tls"
2020-04-03 16:04:24 +08:00
)
type TLSConfig struct {
Host string
SkipCertVerify bool
FingerPrint string
ClientFingerprint string
NextProtos []string
2023-03-08 17:18:46 +08:00
Reality *tlsC.RealityConfig
2020-04-03 16:04:24 +08:00
}
func StreamTLSConn(ctx context.Context, conn net.Conn, cfg *TLSConfig) (net.Conn, error) {
2022-07-11 13:42:28 +08:00
tlsConfig := &tls.Config{
2020-04-03 16:04:24 +08:00
ServerName: cfg.Host,
InsecureSkipVerify: cfg.SkipCertVerify,
NextProtos: cfg.NextProtos,
2022-07-11 13:42:28 +08:00
}
2023-09-22 14:45:34 +08:00
var err error
tlsConfig, err = ca.GetSpecifiedFingerprintTLSConfig(tlsConfig, cfg.FingerPrint)
if err != nil {
return nil, err
2022-07-11 13:42:28 +08:00
}
2020-04-03 16:04:24 +08:00
clientFingerprint := cfg.ClientFingerprint
if tlsC.HaveGlobalFingerprint() && len(clientFingerprint) == 0 {
clientFingerprint = tlsC.GetGlobalFingerprint()
}
if len(clientFingerprint) != 0 {
2023-03-08 17:18:46 +08:00
if cfg.Reality == nil {
if fingerprint, exists := tlsC.GetFingerprint(clientFingerprint); exists {
2025-04-21 12:07:33 +08:00
utlsConn := tlsC.UClient(conn, tlsC.UConfig(tlsConfig), fingerprint)
2025-02-17 19:43:58 +08:00
err = utlsConn.HandshakeContext(ctx)
if err != nil {
return nil, err
}
return utlsConn, nil
2023-03-08 17:18:46 +08:00
}
} else {
return tlsC.GetRealityConn(ctx, conn, clientFingerprint, tlsConfig, cfg.Reality)
}
}
2023-03-08 17:18:46 +08:00
if cfg.Reality != nil {
return nil, errors.New("REALITY is based on uTLS, please set a client-fingerprint")
}
2020-04-03 16:04:24 +08:00
tlsConn := tls.Client(conn, tlsConfig)
2023-09-22 14:45:34 +08:00
err = tlsConn.HandshakeContext(ctx)
2020-04-03 16:04:24 +08:00
return tlsConn, err
}