mirror of
https://github.com/XTLS/Xray-core.git
synced 2024-11-09 16:43:03 +00:00
e93da4bd02
* Increase some tls test timeout * Fix TestUserValidator * Change all tests to VMessAEAD Old VMess MD5 tests will be rejected and fail in 2022 * Chore: auto format code
100 lines
2.6 KiB
Go
100 lines
2.6 KiB
Go
package kcp
|
|
|
|
import (
|
|
"context"
|
|
"io"
|
|
"sync/atomic"
|
|
|
|
"github.com/xtls/xray-core/common"
|
|
"github.com/xtls/xray-core/common/buf"
|
|
"github.com/xtls/xray-core/common/dice"
|
|
"github.com/xtls/xray-core/common/net"
|
|
"github.com/xtls/xray-core/transport/internet"
|
|
"github.com/xtls/xray-core/transport/internet/stat"
|
|
"github.com/xtls/xray-core/transport/internet/tls"
|
|
"github.com/xtls/xray-core/transport/internet/xtls"
|
|
)
|
|
|
|
var globalConv = uint32(dice.RollUint16())
|
|
|
|
func fetchInput(_ context.Context, input io.Reader, reader PacketReader, conn *Connection) {
|
|
cache := make(chan *buf.Buffer, 1024)
|
|
go func() {
|
|
for {
|
|
payload := buf.New()
|
|
if _, err := payload.ReadFrom(input); err != nil {
|
|
payload.Release()
|
|
close(cache)
|
|
return
|
|
}
|
|
select {
|
|
case cache <- payload:
|
|
default:
|
|
payload.Release()
|
|
}
|
|
}
|
|
}()
|
|
|
|
for payload := range cache {
|
|
segments := reader.Read(payload.Bytes())
|
|
payload.Release()
|
|
if len(segments) > 0 {
|
|
conn.Input(segments)
|
|
}
|
|
}
|
|
}
|
|
|
|
// DialKCP dials a new KCP connections to the specific destination.
|
|
func DialKCP(ctx context.Context, dest net.Destination, streamSettings *internet.MemoryStreamConfig) (stat.Connection, error) {
|
|
dest.Network = net.Network_UDP
|
|
newError("dialing mKCP to ", dest).WriteToLog()
|
|
|
|
rawConn, err := internet.DialSystem(ctx, dest, streamSettings.SocketSettings)
|
|
if err != nil {
|
|
return nil, newError("failed to dial to dest: ", err).AtWarning().Base(err)
|
|
}
|
|
|
|
kcpSettings := streamSettings.ProtocolSettings.(*Config)
|
|
|
|
header, err := kcpSettings.GetPackerHeader()
|
|
if err != nil {
|
|
return nil, newError("failed to create packet header").Base(err)
|
|
}
|
|
security, err := kcpSettings.GetSecurity()
|
|
if err != nil {
|
|
return nil, newError("failed to create security").Base(err)
|
|
}
|
|
reader := &KCPPacketReader{
|
|
Header: header,
|
|
Security: security,
|
|
}
|
|
writer := &KCPPacketWriter{
|
|
Header: header,
|
|
Security: security,
|
|
Writer: rawConn,
|
|
}
|
|
|
|
conv := uint16(atomic.AddUint32(&globalConv, 1))
|
|
session := NewConnection(ConnMetadata{
|
|
LocalAddr: rawConn.LocalAddr(),
|
|
RemoteAddr: rawConn.RemoteAddr(),
|
|
Conversation: conv,
|
|
}, writer, rawConn, kcpSettings)
|
|
|
|
go fetchInput(ctx, rawConn, reader, session)
|
|
|
|
var iConn stat.Connection = session
|
|
|
|
if config := tls.ConfigFromStreamSettings(streamSettings); config != nil {
|
|
iConn = tls.Client(iConn, config.GetTLSConfig(tls.WithDestination(dest)))
|
|
} else if config := xtls.ConfigFromStreamSettings(streamSettings); config != nil {
|
|
iConn = xtls.Client(iConn, config.GetXTLSConfig(xtls.WithDestination(dest)))
|
|
}
|
|
|
|
return iConn, nil
|
|
}
|
|
|
|
func init() {
|
|
common.Must(internet.RegisterTransportDialer(protocolName, DialKCP))
|
|
}
|