-
Notifications
You must be signed in to change notification settings - Fork 19
/
client.go
74 lines (65 loc) · 2.16 KB
/
client.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
// Copyright (C) 2020, IrineSistiana
//
// This file is part of simple-tls.
//
// simple-tls is free software: you can redistribute it and/or modify
// it under the terms of the GNU General Public License as published by
// the Free Software Foundation, either version 3 of the License, or
// (at your option) any later version.
//
// simple-tls is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU General Public License for more details.
//
// You should have received a copy of the GNU General Public License
// along with this program. If not, see <https://www.gnu.org/licenses/>.
package core
import (
"crypto/tls"
"crypto/x509"
"fmt"
"log"
"net"
"time"
)
func DoClient(l net.Listener, serverAddr, hostName string, caPool *x509.CertPool, insecureSkipVerify, sendPaddingData bool, timeout time.Duration, vpnMode, tfo bool) error {
dialer := net.Dialer{
Timeout: time.Second * 5,
Control: GetControlFunc(&TcpConfig{AndroidVPN: vpnMode, EnableTFO: tfo}),
}
tlsConfig := new(tls.Config)
tlsConfig.ClientSessionCache = tls.NewLRUClientSessionCache(64)
tlsConfig.ServerName = hostName
tlsConfig.RootCAs = caPool
tlsConfig.InsecureSkipVerify = insecureSkipVerify
for {
localConn, err := l.Accept()
if err != nil {
return fmt.Errorf("l.Accept(): %w", err)
}
go func() {
defer localConn.Close()
serverRawConn, err := dialer.Dial("tcp", serverAddr)
if err != nil {
log.Printf("ERROR: DoClient: dialer.Dial: %v", err)
return
}
defer serverRawConn.Close()
serverTLSConn := tls.Client(serverRawConn, tlsConfig)
if err := tls13HandshakeWithTimeout(serverTLSConn, time.Second*5); err != nil {
log.Printf("ERROR: DoClient: tlsHandshakeTimeout: %v", err)
return
}
var serverConn net.Conn
if sendPaddingData {
serverConn = newPaddingConn(serverTLSConn, true, false)
} else {
serverConn = serverTLSConn
}
if err := openTunnel(localConn, serverConn, timeout); err != nil {
log.Printf("ERROR: DoClient: openTunnel: %v", err)
}
}()
}
}