clash/component/vmess/vmess.go

118 lines
2.2 KiB
Go
Raw Normal View History

2018-09-06 10:53:29 +08:00
package vmess
import (
2018-09-08 19:53:24 +08:00
"crypto/tls"
2018-09-06 10:53:29 +08:00
"fmt"
"math/rand"
"net"
"runtime"
"github.com/gofrs/uuid"
)
// Version of vmess
const Version byte = 1
// Request Options
const (
OptionChunkStream byte = 1
OptionChunkMasking byte = 4
)
// Security type vmess
type Security = byte
// Cipher types
const (
SecurityAES128GCM Security = 3
SecurityCHACHA20POLY1305 Security = 4
SecurityNone Security = 5
)
// CipherMapping return
var CipherMapping = map[string]byte{
"none": SecurityNone,
"aes-128-gcm": SecurityAES128GCM,
"chacha20-poly1305": SecurityCHACHA20POLY1305,
}
2018-09-08 19:53:24 +08:00
var tlsConfig = &tls.Config{
InsecureSkipVerify: true,
}
2018-09-06 10:53:29 +08:00
// Command types
const (
CommandTCP byte = 1
CommandUDP byte = 2
)
// Addr types
const (
AtypIPv4 byte = 1
AtypDomainName byte = 2
AtypIPv6 byte = 3
)
// DstAddr store destination address
type DstAddr struct {
AddrType byte
Addr []byte
Port uint
}
// Client is vmess connection generator
type Client struct {
user []*ID
uuid *uuid.UUID
security Security
2018-09-08 19:53:24 +08:00
tls bool
2018-09-06 10:53:29 +08:00
}
// Config of vmess
type Config struct {
UUID string
AlterID uint16
Security string
2018-09-08 19:53:24 +08:00
TLS bool
2018-09-06 10:53:29 +08:00
}
// New return a Conn with net.Conn and DstAddr
func (c *Client) New(conn net.Conn, dst *DstAddr) net.Conn {
r := rand.Intn(len(c.user))
2018-09-08 19:53:24 +08:00
if c.tls {
conn = tls.Client(conn, tlsConfig)
}
2018-09-06 10:53:29 +08:00
return newConn(conn, c.user[r], dst, c.security)
}
// NewClient return Client instance
func NewClient(config Config) (*Client, error) {
uid, err := uuid.FromString(config.UUID)
if err != nil {
return nil, err
}
var security Security
switch config.Security {
case "aes-128-gcm":
security = SecurityAES128GCM
case "chacha20-poly1305":
security = SecurityCHACHA20POLY1305
case "none":
security = SecurityNone
case "auto":
security = SecurityCHACHA20POLY1305
if runtime.GOARCH == "amd64" || runtime.GOARCH == "s390x" || runtime.GOARCH == "arm64" {
security = SecurityAES128GCM
}
default:
return nil, fmt.Errorf("Unknown security type: %s", config.Security)
}
return &Client{
user: newAlterIDs(newID(&uid), config.AlterID),
uuid: &uid,
security: security,
2018-09-08 19:53:24 +08:00
tls: config.TLS,
2018-09-06 10:53:29 +08:00
}, nil
}