1
0
mirror of https://github.com/v2fly/v2ray-core.git synced 2024-12-23 10:37:09 -05:00
v2fly/transport/internet/tls/config.go

44 lines
915 B
Go
Raw Normal View History

2016-10-02 17:43:58 -04:00
package tls
import (
"crypto/tls"
2017-02-01 15:35:40 -05:00
"v2ray.com/core/app/log"
2016-10-02 17:43:58 -04:00
)
var (
globalSessionCache = tls.NewLRUClientSessionCache(128)
)
2016-11-27 15:39:09 -05:00
func (v *Config) BuildCertificates() []tls.Certificate {
certs := make([]tls.Certificate, 0, len(v.Certificate))
for _, entry := range v.Certificate {
2016-10-02 17:43:58 -04:00
keyPair, err := tls.X509KeyPair(entry.Certificate, entry.Key)
if err != nil {
2017-04-09 09:04:04 -04:00
log.Trace(newError("ignoring invalid X509 key pair").Base(err).AtWarning())
2016-10-02 17:43:58 -04:00
continue
}
certs = append(certs, keyPair)
}
return certs
}
2016-11-27 15:39:09 -05:00
func (v *Config) GetTLSConfig() *tls.Config {
2016-10-02 17:43:58 -04:00
config := &tls.Config{
ClientSessionCache: globalSessionCache,
2016-12-31 17:22:26 -05:00
NextProtos: []string{"http/1.1"},
2016-10-02 17:43:58 -04:00
}
2016-11-27 15:39:09 -05:00
if v == nil {
2016-10-02 17:43:58 -04:00
return config
}
2016-11-27 15:39:09 -05:00
config.InsecureSkipVerify = v.AllowInsecure
config.Certificates = v.BuildCertificates()
2016-10-02 17:43:58 -04:00
config.BuildNameToCertificate()
2016-12-11 17:58:37 -05:00
if len(v.ServerName) > 0 {
config.ServerName = v.ServerName
}
2016-10-02 17:43:58 -04:00
return config
}