mirror of
https://github.com/refraction-networking/utls.git
synced 2025-04-04 04:27:36 +03:00
Merge branch 'master' into add-tls-psk-support
This commit is contained in:
commit
fdcc16392c
3 changed files with 24 additions and 4 deletions
11
SECURITY.md
Normal file
11
SECURITY.md
Normal file
|
@ -0,0 +1,11 @@
|
|||
# Security Policy
|
||||
|
||||
## Supported Versions
|
||||
|
||||
We will only maintain one branch which is the master branch. Unless otherwise requested, no security patches will be applied to older Major/Minor versions.
|
||||
|
||||
## Reporting a Vulnerability
|
||||
|
||||
For a vulnerability of low to no severity, which causing no threats to security, you may report it openly to us by [opening an issue](https://github.com/refraction-networking/utls/issues/new)
|
||||
|
||||
If the vulnerability you are reporting inflicts some security impact, please [do so privately](https://github.com/refraction-networking/utls/security/advisories/new).
|
|
@ -47,13 +47,13 @@ type UConn struct {
|
|||
|
||||
// UClient returns a new uTLS client, with behavior depending on clientHelloID.
|
||||
// Config CAN be nil, but make sure to eventually specify ServerName.
|
||||
func UClient(conn net.Conn, config *Config, clientHelloID ClientHelloID) *UConn {
|
||||
func UClient(conn net.Conn, config *Config, clientHelloID ClientHelloID, pskExtension ...*FakePreSharedKeyExtension) *UConn {
|
||||
if config == nil {
|
||||
config = &Config{}
|
||||
}
|
||||
tlsConn := Conn{conn: conn, config: config, isClient: true}
|
||||
handshakeState := PubClientHandshakeState{C: &tlsConn, Hello: &PubClientHelloMsg{}}
|
||||
uconn := UConn{Conn: &tlsConn, ClientHelloID: clientHelloID, HandshakeState: handshakeState}
|
||||
uconn := UConn{Conn: &tlsConn, ClientHelloID: clientHelloID, pskExtension: pskExtension, HandshakeState: handshakeState}
|
||||
uconn.HandshakeState.uconn = &uconn
|
||||
uconn.handshakeFn = uconn.clientHandshake
|
||||
uconn.sessionController = newSessionController(&uconn)
|
||||
|
|
13
u_parrots.go
13
u_parrots.go
|
@ -21,8 +21,17 @@ var ErrUnknownClientHelloID = errors.New("tls: unknown ClientHelloID")
|
|||
// UTLSIdToSpec converts a ClientHelloID to a corresponding ClientHelloSpec.
|
||||
//
|
||||
// Exported internal function utlsIdToSpec per request.
|
||||
func UTLSIdToSpec(id ClientHelloID) (ClientHelloSpec, error) {
|
||||
return utlsIdToSpec(id)
|
||||
func UTLSIdToSpec(id ClientHelloID, pskExtension ...*FakePreSharedKeyExtension) (ClientHelloSpec, error) {
|
||||
if len(pskExtension) > 1 {
|
||||
return ClientHelloSpec{}, errors.New("tls: at most one FakePreSharedKeyExtensions is allowed")
|
||||
}
|
||||
|
||||
chs, err := utlsIdToSpec(id)
|
||||
if err != nil && errors.Is(err, ErrUnknownClientHelloID) {
|
||||
chs, err = utlsIdToSpecWithPSK(id, pskExtension...)
|
||||
}
|
||||
|
||||
return chs, err
|
||||
}
|
||||
|
||||
func utlsIdToSpec(id ClientHelloID) (ClientHelloSpec, error) {
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue