@push.rocks/smartproxy 21.0.0 → 21.1.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (146) hide show
  1. package/changelog.md +9 -0
  2. package/dist_ts/core/utils/proxy-protocol.d.ts +5 -17
  3. package/dist_ts/core/utils/proxy-protocol.js +13 -97
  4. package/dist_ts/core/utils/websocket-utils.d.ts +6 -7
  5. package/dist_ts/core/utils/websocket-utils.js +10 -66
  6. package/dist_ts/detection/detectors/http-detector-v2.d.ts +33 -0
  7. package/dist_ts/detection/detectors/http-detector-v2.js +87 -0
  8. package/dist_ts/detection/detectors/http-detector.d.ts +33 -0
  9. package/dist_ts/detection/detectors/http-detector.js +89 -0
  10. package/dist_ts/detection/detectors/quick-detector.d.ts +28 -0
  11. package/dist_ts/detection/detectors/quick-detector.js +131 -0
  12. package/dist_ts/detection/detectors/routing-extractor.d.ts +28 -0
  13. package/dist_ts/detection/detectors/routing-extractor.js +122 -0
  14. package/dist_ts/detection/detectors/tls-detector-v2.d.ts +33 -0
  15. package/dist_ts/detection/detectors/tls-detector-v2.js +80 -0
  16. package/dist_ts/detection/detectors/tls-detector.d.ts +33 -0
  17. package/dist_ts/detection/detectors/tls-detector.js +106 -0
  18. package/dist_ts/detection/index.d.ts +17 -0
  19. package/dist_ts/detection/index.js +22 -0
  20. package/dist_ts/detection/models/detection-types.d.ts +87 -0
  21. package/dist_ts/detection/models/detection-types.js +5 -0
  22. package/dist_ts/detection/models/interfaces.d.ts +97 -0
  23. package/dist_ts/detection/models/interfaces.js +5 -0
  24. package/dist_ts/detection/protocol-detector-v2.d.ts +46 -0
  25. package/dist_ts/detection/protocol-detector-v2.js +116 -0
  26. package/dist_ts/detection/protocol-detector.d.ts +74 -0
  27. package/dist_ts/detection/protocol-detector.js +173 -0
  28. package/dist_ts/detection/utils/buffer-utils.d.ts +61 -0
  29. package/dist_ts/detection/utils/buffer-utils.js +127 -0
  30. package/dist_ts/detection/utils/fragment-manager.d.ts +31 -0
  31. package/dist_ts/detection/utils/fragment-manager.js +53 -0
  32. package/dist_ts/detection/utils/parser-utils.d.ts +42 -0
  33. package/dist_ts/detection/utils/parser-utils.js +63 -0
  34. package/dist_ts/index.d.ts +2 -0
  35. package/dist_ts/index.js +3 -1
  36. package/dist_ts/protocols/common/fragment-handler.d.ts +73 -0
  37. package/dist_ts/protocols/common/fragment-handler.js +117 -0
  38. package/dist_ts/protocols/common/index.d.ts +7 -0
  39. package/dist_ts/protocols/common/index.js +8 -0
  40. package/dist_ts/protocols/common/types.d.ts +68 -0
  41. package/dist_ts/protocols/common/types.js +7 -0
  42. package/dist_ts/protocols/http/constants.d.ts +119 -0
  43. package/dist_ts/protocols/http/constants.js +200 -0
  44. package/dist_ts/protocols/http/index.d.ts +7 -0
  45. package/dist_ts/protocols/http/index.js +8 -0
  46. package/dist_ts/protocols/http/parser.d.ts +58 -0
  47. package/dist_ts/protocols/http/parser.js +184 -0
  48. package/dist_ts/protocols/http/types.d.ts +62 -0
  49. package/dist_ts/protocols/http/types.js +5 -0
  50. package/dist_ts/protocols/index.d.ts +11 -0
  51. package/dist_ts/protocols/index.js +12 -0
  52. package/dist_ts/protocols/proxy/index.d.ts +6 -0
  53. package/dist_ts/protocols/proxy/index.js +7 -0
  54. package/dist_ts/protocols/proxy/parser.d.ts +44 -0
  55. package/dist_ts/protocols/proxy/parser.js +153 -0
  56. package/dist_ts/protocols/proxy/types.d.ts +47 -0
  57. package/dist_ts/protocols/proxy/types.js +6 -0
  58. package/dist_ts/protocols/tls/alerts/index.d.ts +4 -0
  59. package/dist_ts/protocols/tls/alerts/index.js +5 -0
  60. package/dist_ts/protocols/tls/alerts/tls-alert.d.ts +150 -0
  61. package/dist_ts/protocols/tls/alerts/tls-alert.js +226 -0
  62. package/dist_ts/protocols/tls/constants.d.ts +122 -0
  63. package/dist_ts/protocols/tls/constants.js +135 -0
  64. package/dist_ts/protocols/tls/index.d.ts +12 -0
  65. package/dist_ts/protocols/tls/index.js +27 -0
  66. package/dist_ts/protocols/tls/parser.d.ts +53 -0
  67. package/dist_ts/protocols/tls/parser.js +294 -0
  68. package/dist_ts/protocols/tls/sni/client-hello-parser.d.ts +100 -0
  69. package/dist_ts/protocols/tls/sni/client-hello-parser.js +463 -0
  70. package/dist_ts/protocols/tls/sni/index.d.ts +5 -0
  71. package/dist_ts/protocols/tls/sni/index.js +6 -0
  72. package/dist_ts/protocols/tls/sni/sni-extraction.d.ts +58 -0
  73. package/dist_ts/protocols/tls/sni/sni-extraction.js +275 -0
  74. package/dist_ts/protocols/tls/types.d.ts +65 -0
  75. package/dist_ts/protocols/tls/types.js +5 -0
  76. package/dist_ts/protocols/tls/utils/index.d.ts +4 -0
  77. package/dist_ts/protocols/tls/utils/index.js +5 -0
  78. package/dist_ts/protocols/tls/utils/tls-utils.d.ts +158 -0
  79. package/dist_ts/protocols/tls/utils/tls-utils.js +187 -0
  80. package/dist_ts/protocols/websocket/constants.d.ts +55 -0
  81. package/dist_ts/protocols/websocket/constants.js +58 -0
  82. package/dist_ts/protocols/websocket/index.d.ts +7 -0
  83. package/dist_ts/protocols/websocket/index.js +8 -0
  84. package/dist_ts/protocols/websocket/types.d.ts +47 -0
  85. package/dist_ts/protocols/websocket/types.js +5 -0
  86. package/dist_ts/protocols/websocket/utils.d.ts +25 -0
  87. package/dist_ts/protocols/websocket/utils.js +103 -0
  88. package/dist_ts/proxies/http-proxy/models/http-types.d.ts +25 -27
  89. package/dist_ts/proxies/http-proxy/models/http-types.js +24 -44
  90. package/dist_ts/proxies/smart-proxy/models/interfaces.d.ts +5 -0
  91. package/dist_ts/proxies/smart-proxy/route-connection-handler.js +81 -61
  92. package/dist_ts/proxies/smart-proxy/tls-manager.js +2 -1
  93. package/dist_ts/proxies/smart-proxy/utils/route-helpers.d.ts +2 -0
  94. package/dist_ts/proxies/smart-proxy/utils/route-helpers.js +61 -52
  95. package/dist_ts/tls/index.d.ts +5 -7
  96. package/dist_ts/tls/index.js +8 -11
  97. package/dist_ts/tls/sni/client-hello-parser.js +3 -2
  98. package/dist_ts/tls/sni/sni-handler.js +4 -4
  99. package/dist_ts/tls/utils/tls-utils.d.ts +1 -110
  100. package/dist_ts/tls/utils/tls-utils.js +4 -116
  101. package/package.json +17 -8
  102. package/readme.plan.md +0 -0
  103. package/ts/core/utils/proxy-protocol.ts +14 -131
  104. package/ts/core/utils/websocket-utils.ts +12 -60
  105. package/ts/detection/detectors/http-detector.ts +114 -0
  106. package/ts/detection/detectors/quick-detector.ts +148 -0
  107. package/ts/detection/detectors/routing-extractor.ts +147 -0
  108. package/ts/detection/detectors/tls-detector.ts +120 -0
  109. package/ts/detection/index.ts +25 -0
  110. package/ts/detection/models/detection-types.ts +102 -0
  111. package/ts/detection/models/interfaces.ts +115 -0
  112. package/ts/detection/protocol-detector.ts +230 -0
  113. package/ts/detection/utils/buffer-utils.ts +141 -0
  114. package/ts/detection/utils/fragment-manager.ts +64 -0
  115. package/ts/detection/utils/parser-utils.ts +77 -0
  116. package/ts/index.ts +3 -1
  117. package/ts/protocols/common/fragment-handler.ts +163 -0
  118. package/ts/protocols/common/index.ts +8 -0
  119. package/ts/protocols/common/types.ts +76 -0
  120. package/ts/protocols/http/constants.ts +219 -0
  121. package/ts/protocols/http/index.ts +8 -0
  122. package/ts/protocols/http/parser.ts +219 -0
  123. package/ts/protocols/http/types.ts +70 -0
  124. package/ts/protocols/index.ts +12 -0
  125. package/ts/protocols/proxy/index.ts +7 -0
  126. package/ts/protocols/proxy/parser.ts +183 -0
  127. package/ts/protocols/proxy/types.ts +53 -0
  128. package/ts/{tls → protocols/tls}/alerts/tls-alert.ts +1 -1
  129. package/ts/protocols/tls/index.ts +37 -0
  130. package/ts/protocols/tls/sni/index.ts +6 -0
  131. package/ts/{tls → protocols/tls}/utils/tls-utils.ts +1 -1
  132. package/ts/protocols/websocket/constants.ts +60 -0
  133. package/ts/protocols/websocket/index.ts +8 -0
  134. package/ts/protocols/websocket/types.ts +53 -0
  135. package/ts/protocols/websocket/utils.ts +98 -0
  136. package/ts/proxies/http-proxy/models/http-types.ts +29 -46
  137. package/ts/proxies/smart-proxy/models/interfaces.ts +7 -0
  138. package/ts/proxies/smart-proxy/route-connection-handler.ts +91 -68
  139. package/ts/proxies/smart-proxy/tls-manager.ts +1 -0
  140. package/ts/proxies/smart-proxy/utils/route-helpers.ts +72 -56
  141. package/ts/tls/index.ts +8 -12
  142. package/ts/tls/sni/sni-handler.ts +3 -3
  143. /package/ts/{tls → protocols/tls}/alerts/index.ts +0 -0
  144. /package/ts/{tls → protocols/tls}/sni/client-hello-parser.ts +0 -0
  145. /package/ts/{tls → protocols/tls}/sni/sni-extraction.ts +0 -0
  146. /package/ts/{tls → protocols/tls}/utils/index.ts +0 -0
@@ -0,0 +1,275 @@
1
+ import { Buffer } from 'buffer';
2
+ import { TlsExtensionType, TlsUtils } from '../utils/tls-utils.js';
3
+ import { ClientHelloParser } from './client-hello-parser.js';
4
+ /**
5
+ * Utilities for extracting SNI information from TLS handshakes
6
+ */
7
+ export class SniExtraction {
8
+ /**
9
+ * Extracts the SNI (Server Name Indication) from a TLS ClientHello message.
10
+ *
11
+ * @param buffer The buffer containing the TLS ClientHello message
12
+ * @param logger Optional logging function
13
+ * @returns The extracted server name or undefined if not found
14
+ */
15
+ static extractSNI(buffer, logger) {
16
+ const log = logger || (() => { });
17
+ try {
18
+ // Parse the ClientHello
19
+ const parseResult = ClientHelloParser.parseClientHello(buffer, logger);
20
+ if (!parseResult.isValid) {
21
+ log(`Failed to parse ClientHello: ${parseResult.error}`);
22
+ return undefined;
23
+ }
24
+ // Check if ServerName extension was found
25
+ if (parseResult.serverNameList && parseResult.serverNameList.length > 0) {
26
+ // Use the first hostname (most common case)
27
+ const serverName = parseResult.serverNameList[0];
28
+ log(`Found SNI: ${serverName}`);
29
+ return serverName;
30
+ }
31
+ log('No SNI extension found in ClientHello');
32
+ return undefined;
33
+ }
34
+ catch (error) {
35
+ log(`Error extracting SNI: ${error instanceof Error ? error.message : String(error)}`);
36
+ return undefined;
37
+ }
38
+ }
39
+ /**
40
+ * Attempts to extract SNI from the PSK extension in a TLS 1.3 ClientHello.
41
+ *
42
+ * In TLS 1.3, when a client attempts to resume a session, it may include
43
+ * the server name in the PSK identity hint rather than in the SNI extension.
44
+ *
45
+ * @param buffer The buffer containing the TLS ClientHello message
46
+ * @param logger Optional logging function
47
+ * @returns The extracted server name or undefined if not found
48
+ */
49
+ static extractSNIFromPSKExtension(buffer, logger) {
50
+ const log = logger || (() => { });
51
+ try {
52
+ // Ensure this is a ClientHello
53
+ if (!TlsUtils.isClientHello(buffer)) {
54
+ log('Not a ClientHello message');
55
+ return undefined;
56
+ }
57
+ // Parse the ClientHello to find PSK extension
58
+ const parseResult = ClientHelloParser.parseClientHello(buffer, logger);
59
+ if (!parseResult.isValid || !parseResult.extensions) {
60
+ return undefined;
61
+ }
62
+ // Find the PSK extension
63
+ const pskExtension = parseResult.extensions.find(ext => ext.type === TlsExtensionType.PRE_SHARED_KEY);
64
+ if (!pskExtension) {
65
+ log('No PSK extension found');
66
+ return undefined;
67
+ }
68
+ // Parse the PSK extension data
69
+ const data = pskExtension.data;
70
+ // PSK extension structure:
71
+ // 2 bytes: identities list length
72
+ if (data.length < 2)
73
+ return undefined;
74
+ const identitiesLength = (data[0] << 8) + data[1];
75
+ let pos = 2;
76
+ // End of identities list
77
+ const identitiesEnd = pos + identitiesLength;
78
+ if (identitiesEnd > data.length)
79
+ return undefined;
80
+ // Process each PSK identity
81
+ while (pos + 2 <= identitiesEnd) {
82
+ // Identity length (2 bytes)
83
+ if (pos + 2 > identitiesEnd)
84
+ break;
85
+ const identityLength = (data[pos] << 8) + data[pos + 1];
86
+ pos += 2;
87
+ if (pos + identityLength > identitiesEnd)
88
+ break;
89
+ // Try to extract hostname from identity
90
+ // Chrome often embeds the hostname in the PSK identity
91
+ // This is a heuristic as there's no standard format
92
+ if (identityLength > 0) {
93
+ const identity = data.slice(pos, pos + identityLength);
94
+ // Skip identity bytes
95
+ pos += identityLength;
96
+ // Skip obfuscated ticket age (4 bytes)
97
+ if (pos + 4 <= identitiesEnd) {
98
+ pos += 4;
99
+ }
100
+ else {
101
+ break;
102
+ }
103
+ // Try to parse the identity as UTF-8
104
+ try {
105
+ const identityStr = identity.toString('utf8');
106
+ log(`PSK identity: ${identityStr}`);
107
+ // Check if the identity contains hostname hints
108
+ // Chrome often embeds the hostname in a known format
109
+ // Try to extract using common patterns
110
+ // Pattern 1: Look for domain name pattern
111
+ const domainPattern = /([a-z0-9]([a-z0-9-]{0,61}[a-z0-9])?\.)+[a-z0-9]([a-z0-9-]{0,61}[a-z0-9])?/i;
112
+ const domainMatch = identityStr.match(domainPattern);
113
+ if (domainMatch && domainMatch[0]) {
114
+ log(`Found domain in PSK identity: ${domainMatch[0]}`);
115
+ return domainMatch[0];
116
+ }
117
+ // Pattern 2: Chrome sometimes uses a specific format with delimiters
118
+ // This is a heuristic approach since the format isn't standardized
119
+ const parts = identityStr.split('|');
120
+ if (parts.length > 1) {
121
+ for (const part of parts) {
122
+ if (part.includes('.') && !part.includes('/')) {
123
+ const possibleDomain = part.trim();
124
+ if (/^[a-z0-9.-]+$/i.test(possibleDomain)) {
125
+ log(`Found possible domain in PSK delimiter format: ${possibleDomain}`);
126
+ return possibleDomain;
127
+ }
128
+ }
129
+ }
130
+ }
131
+ }
132
+ catch (e) {
133
+ log('Failed to parse PSK identity as UTF-8');
134
+ }
135
+ }
136
+ }
137
+ log('No hostname found in PSK extension');
138
+ return undefined;
139
+ }
140
+ catch (error) {
141
+ log(`Error parsing PSK: ${error instanceof Error ? error.message : String(error)}`);
142
+ return undefined;
143
+ }
144
+ }
145
+ /**
146
+ * Main entry point for SNI extraction with support for fragmented messages
147
+ * and session resumption edge cases.
148
+ *
149
+ * @param buffer The buffer containing TLS data
150
+ * @param connectionInfo Connection tracking information
151
+ * @param logger Optional logging function
152
+ * @param cachedSni Optional previously cached SNI value
153
+ * @returns The extracted server name or undefined
154
+ */
155
+ static extractSNIWithResumptionSupport(buffer, connectionInfo, logger, cachedSni) {
156
+ const log = logger || (() => { });
157
+ // Log buffer details for debugging
158
+ if (logger) {
159
+ log(`Buffer size: ${buffer.length} bytes`);
160
+ log(`Buffer starts with: ${buffer.slice(0, Math.min(10, buffer.length)).toString('hex')}`);
161
+ if (buffer.length >= 5) {
162
+ const recordType = buffer[0];
163
+ const majorVersion = buffer[1];
164
+ const minorVersion = buffer[2];
165
+ const recordLength = (buffer[3] << 8) + buffer[4];
166
+ log(`TLS Record: type=${recordType}, version=${majorVersion}.${minorVersion}, length=${recordLength}`);
167
+ }
168
+ }
169
+ // Check if we need to handle fragmented packets
170
+ let processBuffer = buffer;
171
+ if (connectionInfo) {
172
+ const connectionId = TlsUtils.createConnectionId(connectionInfo);
173
+ const reassembledBuffer = ClientHelloParser.handleFragmentedClientHello(buffer, connectionId, logger);
174
+ if (!reassembledBuffer) {
175
+ log(`Waiting for more fragments on connection ${connectionId}`);
176
+ return undefined; // Need more fragments to complete ClientHello
177
+ }
178
+ processBuffer = reassembledBuffer;
179
+ log(`Using reassembled buffer of length ${processBuffer.length}`);
180
+ }
181
+ // First try the standard SNI extraction
182
+ const standardSni = this.extractSNI(processBuffer, logger);
183
+ if (standardSni) {
184
+ log(`Found standard SNI: ${standardSni}`);
185
+ return standardSni;
186
+ }
187
+ // Check for session resumption when standard SNI extraction fails
188
+ if (TlsUtils.isClientHello(processBuffer)) {
189
+ const resumptionInfo = ClientHelloParser.hasSessionResumption(processBuffer, logger);
190
+ if (resumptionInfo.isResumption) {
191
+ log(`Detected session resumption in ClientHello without standard SNI`);
192
+ // Try to extract SNI from PSK extension
193
+ const pskSni = this.extractSNIFromPSKExtension(processBuffer, logger);
194
+ if (pskSni) {
195
+ log(`Extracted SNI from PSK extension: ${pskSni}`);
196
+ return pskSni;
197
+ }
198
+ }
199
+ }
200
+ // If cached SNI was provided, use it for application data packets
201
+ if (cachedSni && TlsUtils.isTlsApplicationData(buffer)) {
202
+ log(`Using provided cached SNI for application data: ${cachedSni}`);
203
+ return cachedSni;
204
+ }
205
+ return undefined;
206
+ }
207
+ /**
208
+ * Unified method for processing a TLS packet and extracting SNI.
209
+ * Main entry point for SNI extraction that handles all edge cases.
210
+ *
211
+ * @param buffer The buffer containing TLS data
212
+ * @param connectionInfo Connection tracking information
213
+ * @param logger Optional logging function
214
+ * @param cachedSni Optional previously cached SNI value
215
+ * @returns The extracted server name or undefined
216
+ */
217
+ static processTlsPacket(buffer, connectionInfo, logger, cachedSni) {
218
+ const log = logger || (() => { });
219
+ // Add timestamp if not provided
220
+ if (!connectionInfo.timestamp) {
221
+ connectionInfo.timestamp = Date.now();
222
+ }
223
+ // Check if this is a TLS handshake or application data
224
+ if (!TlsUtils.isTlsHandshake(buffer) && !TlsUtils.isTlsApplicationData(buffer)) {
225
+ log('Not a TLS handshake or application data packet');
226
+ return undefined;
227
+ }
228
+ // Create connection ID for tracking
229
+ const connectionId = TlsUtils.createConnectionId(connectionInfo);
230
+ log(`Processing TLS packet for connection ${connectionId}, buffer length: ${buffer.length}`);
231
+ // Handle application data with cached SNI (for connection racing)
232
+ if (TlsUtils.isTlsApplicationData(buffer)) {
233
+ // If explicit cachedSni was provided, use it
234
+ if (cachedSni) {
235
+ log(`Using provided cached SNI for application data: ${cachedSni}`);
236
+ return cachedSni;
237
+ }
238
+ log('Application data packet without cached SNI, cannot determine hostname');
239
+ return undefined;
240
+ }
241
+ // Enhanced session resumption detection
242
+ if (TlsUtils.isClientHello(buffer)) {
243
+ const resumptionInfo = ClientHelloParser.hasSessionResumption(buffer, logger);
244
+ if (resumptionInfo.isResumption) {
245
+ log(`Session resumption detected in TLS packet`);
246
+ // Always try standard SNI extraction first
247
+ const standardSni = this.extractSNI(buffer, logger);
248
+ if (standardSni) {
249
+ log(`Found standard SNI in session resumption: ${standardSni}`);
250
+ return standardSni;
251
+ }
252
+ // Enhanced session resumption SNI extraction
253
+ // Try extracting from PSK identity
254
+ const pskSni = this.extractSNIFromPSKExtension(buffer, logger);
255
+ if (pskSni) {
256
+ log(`Extracted SNI from PSK extension: ${pskSni}`);
257
+ return pskSni;
258
+ }
259
+ log(`Session resumption without extractable SNI`);
260
+ }
261
+ }
262
+ // For handshake messages, try the full extraction process
263
+ const sni = this.extractSNIWithResumptionSupport(buffer, connectionInfo, logger);
264
+ if (sni) {
265
+ log(`Successfully extracted SNI: ${sni}`);
266
+ return sni;
267
+ }
268
+ // If we couldn't extract an SNI, check if this is a valid ClientHello
269
+ if (TlsUtils.isClientHello(buffer)) {
270
+ log('Valid ClientHello detected, but no SNI extracted - might need more data');
271
+ }
272
+ return undefined;
273
+ }
274
+ }
275
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"sni-extraction.js","sourceRoot":"","sources":["../../../../ts/protocols/tls/sni/sni-extraction.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,MAAM,EAAE,MAAM,QAAQ,CAAC;AAChC,OAAO,EAAE,gBAAgB,EAAE,QAAQ,EAAE,MAAM,uBAAuB,CAAC;AACnE,OAAO,EACL,iBAAiB,EAElB,MAAM,0BAA0B,CAAC;AAalC;;GAEG;AACH,MAAM,OAAO,aAAa;IACxB;;;;;;OAMG;IACI,MAAM,CAAC,UAAU,CAAC,MAAc,EAAE,MAAuB;QAC9D,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,GAAG,EAAE,GAAE,CAAC,CAAC,CAAC;QAEjC,IAAI,CAAC;YACH,wBAAwB;YACxB,MAAM,WAAW,GAAG,iBAAiB,CAAC,gBAAgB,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC;YACvE,IAAI,CAAC,WAAW,CAAC,OAAO,EAAE,CAAC;gBACzB,GAAG,CAAC,gCAAgC,WAAW,CAAC,KAAK,EAAE,CAAC,CAAC;gBACzD,OAAO,SAAS,CAAC;YACnB,CAAC;YAED,0CAA0C;YAC1C,IAAI,WAAW,CAAC,cAAc,IAAI,WAAW,CAAC,cAAc,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;gBACxE,4CAA4C;gBAC5C,MAAM,UAAU,GAAG,WAAW,CAAC,cAAc,CAAC,CAAC,CAAC,CAAC;gBACjD,GAAG,CAAC,cAAc,UAAU,EAAE,CAAC,CAAC;gBAChC,OAAO,UAAU,CAAC;YACpB,CAAC;YAED,GAAG,CAAC,uCAAuC,CAAC,CAAC;YAC7C,OAAO,SAAS,CAAC;QACnB,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,GAAG,CAAC,yBAAyB,KAAK,YAAY,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC,CAAC;YACvF,OAAO,SAAS,CAAC;QACnB,CAAC;IACH,CAAC;IAED;;;;;;;;;OASG;IACI,MAAM,CAAC,0BAA0B,CACtC,MAAc,EACd,MAAuB;QAEvB,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,GAAG,EAAE,GAAE,CAAC,CAAC,CAAC;QAEjC,IAAI,CAAC;YACH,+BAA+B;YAC/B,IAAI,CAAC,QAAQ,CAAC,aAAa,CAAC,MAAM,CAAC,EAAE,CAAC;gBACpC,GAAG,CAAC,2BAA2B,CAAC,CAAC;gBACjC,OAAO,SAAS,CAAC;YACnB,CAAC;YAED,8CAA8C;YAC9C,MAAM,WAAW,GAAG,iBAAiB,CAAC,gBAAgB,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC;YACvE,IAAI,CAAC,WAAW,CAAC,OAAO,IAAI,CAAC,WAAW,CAAC,UAAU,EAAE,CAAC;gBACpD,OAAO,SAAS,CAAC;YACnB,CAAC;YAED,yBAAyB;YACzB,MAAM,YAAY,GAAG,WAAW,CAAC,UAAU,CAAC,IAAI,CAAC,GAAG,CAAC,EAAE,CACrD,GAAG,CAAC,IAAI,KAAK,gBAAgB,CAAC,cAAc,CAAC,CAAC;YAEhD,IAAI,CAAC,YAAY,EAAE,CAAC;gBAClB,GAAG,CAAC,wBAAwB,CAAC,CAAC;gBAC9B,OAAO,SAAS,CAAC;YACnB,CAAC;YAED,+BAA+B;YAC/B,MAAM,IAAI,GAAG,YAAY,CAAC,IAAI,CAAC;YAE/B,2BAA2B;YAC3B,kCAAkC;YAClC,IAAI,IAAI,CAAC,MAAM,GAAG,CAAC;gBAAE,OAAO,SAAS,CAAC;YAEtC,MAAM,gBAAgB,GAAG,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,CAAC;YAClD,IAAI,GAAG,GAAG,CAAC,CAAC;YAEZ,yBAAyB;YACzB,MAAM,aAAa,GAAG,GAAG,GAAG,gBAAgB,CAAC;YAC7C,IAAI,aAAa,GAAG,IAAI,CAAC,MAAM;gBAAE,OAAO,SAAS,CAAC;YAElD,4BAA4B;YAC5B,OAAO,GAAG,GAAG,CAAC,IAAI,aAAa,EAAE,CAAC;gBAChC,4BAA4B;gBAC5B,IAAI,GAAG,GAAG,CAAC,GAAG,aAAa;oBAAE,MAAM;gBAEnC,MAAM,cAAc,GAAG,CAAC,IAAI,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,GAAG,IAAI,CAAC,GAAG,GAAG,CAAC,CAAC,CAAC;gBACxD,GAAG,IAAI,CAAC,CAAC;gBAET,IAAI,GAAG,GAAG,cAAc,GAAG,aAAa;oBAAE,MAAM;gBAEhD,wCAAwC;gBACxC,uDAAuD;gBACvD,oDAAoD;gBACpD,IAAI,cAAc,GAAG,CAAC,EAAE,CAAC;oBACvB,MAAM,QAAQ,GAAG,IAAI,CAAC,KAAK,CAAC,GAAG,EAAE,GAAG,GAAG,cAAc,CAAC,CAAC;oBAEvD,sBAAsB;oBACtB,GAAG,IAAI,cAAc,CAAC;oBAEtB,uCAAuC;oBACvC,IAAI,GAAG,GAAG,CAAC,IAAI,aAAa,EAAE,CAAC;wBAC7B,GAAG,IAAI,CAAC,CAAC;oBACX,CAAC;yBAAM,CAAC;wBACN,MAAM;oBACR,CAAC;oBAED,qCAAqC;oBACrC,IAAI,CAAC;wBACH,MAAM,WAAW,GAAG,QAAQ,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;wBAC9C,GAAG,CAAC,iBAAiB,WAAW,EAAE,CAAC,CAAC;wBAEpC,gDAAgD;wBAChD,qDAAqD;wBACrD,uCAAuC;wBAEvC,0CAA0C;wBAC1C,MAAM,aAAa,GACjB,4EAA4E,CAAC;wBAC/E,MAAM,WAAW,GAAG,WAAW,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC;wBACrD,IAAI,WAAW,IAAI,WAAW,CAAC,CAAC,CAAC,EAAE,CAAC;4BAClC,GAAG,CAAC,iCAAiC,WAAW,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC;4BACvD,OAAO,WAAW,CAAC,CAAC,CAAC,CAAC;wBACxB,CAAC;wBAED,qEAAqE;wBACrE,mEAAmE;wBACnE,MAAM,KAAK,GAAG,WAAW,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC;wBACrC,IAAI,KAAK,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;4BACrB,KAAK,MAAM,IAAI,IAAI,KAAK,EAAE,CAAC;gCACzB,IAAI,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,EAAE,CAAC;oCAC9C,MAAM,cAAc,GAAG,IAAI,CAAC,IAAI,EAAE,CAAC;oCACnC,IAAI,gBAAgB,CAAC,IAAI,CAAC,cAAc,CAAC,EAAE,CAAC;wCAC1C,GAAG,CAAC,kDAAkD,cAAc,EAAE,CAAC,CAAC;wCACxE,OAAO,cAAc,CAAC;oCACxB,CAAC;gCACH,CAAC;4BACH,CAAC;wBACH,CAAC;oBACH,CAAC;oBAAC,OAAO,CAAC,EAAE,CAAC;wBACX,GAAG,CAAC,uCAAuC,CAAC,CAAC;oBAC/C,CAAC;gBACH,CAAC;YACH,CAAC;YAED,GAAG,CAAC,oCAAoC,CAAC,CAAC;YAC1C,OAAO,SAAS,CAAC;QACnB,CAAC;QAAC,OAAO,KAAK,EAAE,CAAC;YACf,GAAG,CAAC,sBAAsB,KAAK,YAAY,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC,CAAC;YACpF,OAAO,SAAS,CAAC;QACnB,CAAC;IACH,CAAC;IAED;;;;;;;;;OASG;IACI,MAAM,CAAC,+BAA+B,CAC3C,MAAc,EACd,cAA+B,EAC/B,MAAuB,EACvB,SAAkB;QAElB,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,GAAG,EAAE,GAAE,CAAC,CAAC,CAAC;QAEjC,mCAAmC;QACnC,IAAI,MAAM,EAAE,CAAC;YACX,GAAG,CAAC,gBAAgB,MAAM,CAAC,MAAM,QAAQ,CAAC,CAAC;YAC3C,GAAG,CAAC,uBAAuB,MAAM,CAAC,KAAK,CAAC,CAAC,EAAE,IAAI,CAAC,GAAG,CAAC,EAAE,EAAE,MAAM,CAAC,MAAM,CAAC,CAAC,CAAC,QAAQ,CAAC,KAAK,CAAC,EAAE,CAAC,CAAC;YAE3F,IAAI,MAAM,CAAC,MAAM,IAAI,CAAC,EAAE,CAAC;gBACvB,MAAM,UAAU,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;gBAC7B,MAAM,YAAY,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;gBAC/B,MAAM,YAAY,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;gBAC/B,MAAM,YAAY,GAAG,CAAC,MAAM,CAAC,CAAC,CAAC,IAAI,CAAC,CAAC,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;gBAElD,GAAG,CACD,oBAAoB,UAAU,aAAa,YAAY,IAAI,YAAY,YAAY,YAAY,EAAE,CAClG,CAAC;YACJ,CAAC;QACH,CAAC;QAED,gDAAgD;QAChD,IAAI,aAAa,GAAG,MAAM,CAAC;QAC3B,IAAI,cAAc,EAAE,CAAC;YACnB,MAAM,YAAY,GAAG,QAAQ,CAAC,kBAAkB,CAAC,cAAc,CAAC,CAAC;YACjE,MAAM,iBAAiB,GAAG,iBAAiB,CAAC,2BAA2B,CACrE,MAAM,EACN,YAAY,EACZ,MAAM,CACP,CAAC;YAEF,IAAI,CAAC,iBAAiB,EAAE,CAAC;gBACvB,GAAG,CAAC,4CAA4C,YAAY,EAAE,CAAC,CAAC;gBAChE,OAAO,SAAS,CAAC,CAAC,8CAA8C;YAClE,CAAC;YAED,aAAa,GAAG,iBAAiB,CAAC;YAClC,GAAG,CAAC,sCAAsC,aAAa,CAAC,MAAM,EAAE,CAAC,CAAC;QACpE,CAAC;QAED,wCAAwC;QACxC,MAAM,WAAW,GAAG,IAAI,CAAC,UAAU,CAAC,aAAa,EAAE,MAAM,CAAC,CAAC;QAC3D,IAAI,WAAW,EAAE,CAAC;YAChB,GAAG,CAAC,uBAAuB,WAAW,EAAE,CAAC,CAAC;YAC1C,OAAO,WAAW,CAAC;QACrB,CAAC;QAED,kEAAkE;QAClE,IAAI,QAAQ,CAAC,aAAa,CAAC,aAAa,CAAC,EAAE,CAAC;YAC1C,MAAM,cAAc,GAAG,iBAAiB,CAAC,oBAAoB,CAAC,aAAa,EAAE,MAAM,CAAC,CAAC;YAErF,IAAI,cAAc,CAAC,YAAY,EAAE,CAAC;gBAChC,GAAG,CAAC,iEAAiE,CAAC,CAAC;gBAEvE,wCAAwC;gBACxC,MAAM,MAAM,GAAG,IAAI,CAAC,0BAA0B,CAAC,aAAa,EAAE,MAAM,CAAC,CAAC;gBACtE,IAAI,MAAM,EAAE,CAAC;oBACX,GAAG,CAAC,qCAAqC,MAAM,EAAE,CAAC,CAAC;oBACnD,OAAO,MAAM,CAAC;gBAChB,CAAC;YACH,CAAC;QACH,CAAC;QAED,kEAAkE;QAClE,IAAI,SAAS,IAAI,QAAQ,CAAC,oBAAoB,CAAC,MAAM,CAAC,EAAE,CAAC;YACvD,GAAG,CAAC,mDAAmD,SAAS,EAAE,CAAC,CAAC;YACpE,OAAO,SAAS,CAAC;QACnB,CAAC;QAED,OAAO,SAAS,CAAC;IACnB,CAAC;IAED;;;;;;;;;OASG;IACI,MAAM,CAAC,gBAAgB,CAC5B,MAAc,EACd,cAA8B,EAC9B,MAAuB,EACvB,SAAkB;QAElB,MAAM,GAAG,GAAG,MAAM,IAAI,CAAC,GAAG,EAAE,GAAE,CAAC,CAAC,CAAC;QAEjC,gCAAgC;QAChC,IAAI,CAAC,cAAc,CAAC,SAAS,EAAE,CAAC;YAC9B,cAAc,CAAC,SAAS,GAAG,IAAI,CAAC,GAAG,EAAE,CAAC;QACxC,CAAC;QAED,uDAAuD;QACvD,IAAI,CAAC,QAAQ,CAAC,cAAc,CAAC,MAAM,CAAC,IAAI,CAAC,QAAQ,CAAC,oBAAoB,CAAC,MAAM,CAAC,EAAE,CAAC;YAC/E,GAAG,CAAC,gDAAgD,CAAC,CAAC;YACtD,OAAO,SAAS,CAAC;QACnB,CAAC;QAED,oCAAoC;QACpC,MAAM,YAAY,GAAG,QAAQ,CAAC,kBAAkB,CAAC,cAAc,CAAC,CAAC;QACjE,GAAG,CAAC,wCAAwC,YAAY,oBAAoB,MAAM,CAAC,MAAM,EAAE,CAAC,CAAC;QAE7F,kEAAkE;QAClE,IAAI,QAAQ,CAAC,oBAAoB,CAAC,MAAM,CAAC,EAAE,CAAC;YAC1C,6CAA6C;YAC7C,IAAI,SAAS,EAAE,CAAC;gBACd,GAAG,CAAC,mDAAmD,SAAS,EAAE,CAAC,CAAC;gBACpE,OAAO,SAAS,CAAC;YACnB,CAAC;YAED,GAAG,CAAC,uEAAuE,CAAC,CAAC;YAC7E,OAAO,SAAS,CAAC;QACnB,CAAC;QAED,wCAAwC;QACxC,IAAI,QAAQ,CAAC,aAAa,CAAC,MAAM,CAAC,EAAE,CAAC;YACnC,MAAM,cAAc,GAAG,iBAAiB,CAAC,oBAAoB,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC;YAE9E,IAAI,cAAc,CAAC,YAAY,EAAE,CAAC;gBAChC,GAAG,CAAC,2CAA2C,CAAC,CAAC;gBAEjD,2CAA2C;gBAC3C,MAAM,WAAW,GAAG,IAAI,CAAC,UAAU,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC;gBACpD,IAAI,WAAW,EAAE,CAAC;oBAChB,GAAG,CAAC,6CAA6C,WAAW,EAAE,CAAC,CAAC;oBAChE,OAAO,WAAW,CAAC;gBACrB,CAAC;gBAED,6CAA6C;gBAC7C,mCAAmC;gBACnC,MAAM,MAAM,GAAG,IAAI,CAAC,0BAA0B,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC;gBAC/D,IAAI,MAAM,EAAE,CAAC;oBACX,GAAG,CAAC,qCAAqC,MAAM,EAAE,CAAC,CAAC;oBACnD,OAAO,MAAM,CAAC;gBAChB,CAAC;gBAED,GAAG,CAAC,4CAA4C,CAAC,CAAC;YACpD,CAAC;QACH,CAAC;QAED,0DAA0D;QAC1D,MAAM,GAAG,GAAG,IAAI,CAAC,+BAA+B,CAAC,MAAM,EAAE,cAAc,EAAE,MAAM,CAAC,CAAC;QAEjF,IAAI,GAAG,EAAE,CAAC;YACR,GAAG,CAAC,+BAA+B,GAAG,EAAE,CAAC,CAAC;YAC1C,OAAO,GAAG,CAAC;QACb,CAAC;QAED,sEAAsE;QACtE,IAAI,QAAQ,CAAC,aAAa,CAAC,MAAM,CAAC,EAAE,CAAC;YACnC,GAAG,CAAC,yEAAyE,CAAC,CAAC;QACjF,CAAC;QAED,OAAO,SAAS,CAAC;IACnB,CAAC;CACF"}
@@ -0,0 +1,65 @@
1
+ /**
2
+ * TLS Protocol Type Definitions
3
+ */
4
+ import type { TTlsVersionString } from './constants.js';
5
+ /**
6
+ * TLS record header structure
7
+ */
8
+ export interface ITlsRecordHeader {
9
+ type: number;
10
+ version: {
11
+ major: number;
12
+ minor: number;
13
+ };
14
+ length: number;
15
+ }
16
+ /**
17
+ * TLS handshake header structure
18
+ */
19
+ export interface ITlsHandshakeHeader {
20
+ type: number;
21
+ length: number;
22
+ }
23
+ /**
24
+ * TLS extension structure
25
+ */
26
+ export interface ITlsExtension {
27
+ type: number;
28
+ data: Buffer;
29
+ }
30
+ /**
31
+ * Server Name Indication (SNI) hostname
32
+ */
33
+ export interface ISniHostname {
34
+ type: number;
35
+ hostname: string;
36
+ }
37
+ /**
38
+ * Parsed ClientHello information
39
+ */
40
+ export interface IClientHelloInfo {
41
+ version: TTlsVersionString | null;
42
+ sessionId: Buffer | null;
43
+ cipherSuites: number[];
44
+ compressionMethods: number[];
45
+ extensions: ITlsExtension[];
46
+ sni?: string;
47
+ alpn?: string[];
48
+ supportedVersions?: TTlsVersionString[];
49
+ }
50
+ /**
51
+ * TLS alert structure
52
+ */
53
+ export interface ITlsAlert {
54
+ level: number;
55
+ description: number;
56
+ }
57
+ /**
58
+ * Connection information for TLS tracking
59
+ */
60
+ export interface ITlsConnectionInfo {
61
+ sourceIp?: string;
62
+ sourcePort?: number;
63
+ destIp?: string;
64
+ destPort?: number;
65
+ }
@@ -0,0 +1,5 @@
1
+ /**
2
+ * TLS Protocol Type Definitions
3
+ */
4
+ export {};
5
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoidHlwZXMuanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi90cy9wcm90b2NvbHMvdGxzL3R5cGVzLnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiJBQUFBOztHQUVHIn0=
@@ -0,0 +1,4 @@
1
+ export {};
2
+ /**
3
+ * TLS utilities
4
+ */
@@ -0,0 +1,5 @@
1
+ export {};
2
+ /**
3
+ * TLS utilities
4
+ */
5
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi8uLi90cy9wcm90b2NvbHMvdGxzL3V0aWxzL2luZGV4LnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiI7QUFBQTs7R0FFRyJ9
@@ -0,0 +1,158 @@
1
+ /**
2
+ * TLS record types as defined in various RFCs
3
+ */
4
+ export declare enum TlsRecordType {
5
+ CHANGE_CIPHER_SPEC = 20,
6
+ ALERT = 21,
7
+ HANDSHAKE = 22,
8
+ APPLICATION_DATA = 23,
9
+ HEARTBEAT = 24
10
+ }
11
+ /**
12
+ * TLS handshake message types
13
+ */
14
+ export declare enum TlsHandshakeType {
15
+ HELLO_REQUEST = 0,
16
+ CLIENT_HELLO = 1,
17
+ SERVER_HELLO = 2,
18
+ NEW_SESSION_TICKET = 4,
19
+ ENCRYPTED_EXTENSIONS = 8,// TLS 1.3
20
+ CERTIFICATE = 11,
21
+ SERVER_KEY_EXCHANGE = 12,
22
+ CERTIFICATE_REQUEST = 13,
23
+ SERVER_HELLO_DONE = 14,
24
+ CERTIFICATE_VERIFY = 15,
25
+ CLIENT_KEY_EXCHANGE = 16,
26
+ FINISHED = 20
27
+ }
28
+ /**
29
+ * TLS extension types
30
+ */
31
+ export declare enum TlsExtensionType {
32
+ SERVER_NAME = 0,// SNI
33
+ MAX_FRAGMENT_LENGTH = 1,
34
+ CLIENT_CERTIFICATE_URL = 2,
35
+ TRUSTED_CA_KEYS = 3,
36
+ TRUNCATED_HMAC = 4,
37
+ STATUS_REQUEST = 5,// OCSP
38
+ SUPPORTED_GROUPS = 10,// Previously named "elliptic_curves"
39
+ EC_POINT_FORMATS = 11,
40
+ SIGNATURE_ALGORITHMS = 13,
41
+ APPLICATION_LAYER_PROTOCOL_NEGOTIATION = 16,// ALPN
42
+ SIGNED_CERTIFICATE_TIMESTAMP = 18,// Certificate Transparency
43
+ PADDING = 21,
44
+ SESSION_TICKET = 35,
45
+ PRE_SHARED_KEY = 41,// TLS 1.3
46
+ EARLY_DATA = 42,// TLS 1.3 0-RTT
47
+ SUPPORTED_VERSIONS = 43,// TLS 1.3
48
+ COOKIE = 44,// TLS 1.3
49
+ PSK_KEY_EXCHANGE_MODES = 45,// TLS 1.3
50
+ CERTIFICATE_AUTHORITIES = 47,// TLS 1.3
51
+ POST_HANDSHAKE_AUTH = 49,// TLS 1.3
52
+ SIGNATURE_ALGORITHMS_CERT = 50,// TLS 1.3
53
+ KEY_SHARE = 51
54
+ }
55
+ /**
56
+ * TLS alert levels
57
+ */
58
+ export declare enum TlsAlertLevel {
59
+ WARNING = 1,
60
+ FATAL = 2
61
+ }
62
+ /**
63
+ * TLS alert description codes
64
+ */
65
+ export declare enum TlsAlertDescription {
66
+ CLOSE_NOTIFY = 0,
67
+ UNEXPECTED_MESSAGE = 10,
68
+ BAD_RECORD_MAC = 20,
69
+ DECRYPTION_FAILED = 21,// TLS 1.0 only
70
+ RECORD_OVERFLOW = 22,
71
+ DECOMPRESSION_FAILURE = 30,// TLS 1.2 and below
72
+ HANDSHAKE_FAILURE = 40,
73
+ NO_CERTIFICATE = 41,// SSLv3 only
74
+ BAD_CERTIFICATE = 42,
75
+ UNSUPPORTED_CERTIFICATE = 43,
76
+ CERTIFICATE_REVOKED = 44,
77
+ CERTIFICATE_EXPIRED = 45,
78
+ CERTIFICATE_UNKNOWN = 46,
79
+ ILLEGAL_PARAMETER = 47,
80
+ UNKNOWN_CA = 48,
81
+ ACCESS_DENIED = 49,
82
+ DECODE_ERROR = 50,
83
+ DECRYPT_ERROR = 51,
84
+ EXPORT_RESTRICTION = 60,// TLS 1.0 only
85
+ PROTOCOL_VERSION = 70,
86
+ INSUFFICIENT_SECURITY = 71,
87
+ INTERNAL_ERROR = 80,
88
+ INAPPROPRIATE_FALLBACK = 86,
89
+ USER_CANCELED = 90,
90
+ NO_RENEGOTIATION = 100,// TLS 1.2 and below
91
+ MISSING_EXTENSION = 109,// TLS 1.3
92
+ UNSUPPORTED_EXTENSION = 110,// TLS 1.3
93
+ CERTIFICATE_REQUIRED = 111,// TLS 1.3
94
+ UNRECOGNIZED_NAME = 112,
95
+ BAD_CERTIFICATE_STATUS_RESPONSE = 113,
96
+ BAD_CERTIFICATE_HASH_VALUE = 114,// TLS 1.2 and below
97
+ UNKNOWN_PSK_IDENTITY = 115,
98
+ CERTIFICATE_REQUIRED_1_3 = 116,// TLS 1.3
99
+ NO_APPLICATION_PROTOCOL = 120
100
+ }
101
+ /**
102
+ * TLS version codes (major.minor)
103
+ */
104
+ export declare const TlsVersion: {
105
+ SSL3: number[];
106
+ TLS1_0: number[];
107
+ TLS1_1: number[];
108
+ TLS1_2: number[];
109
+ TLS1_3: number[];
110
+ };
111
+ /**
112
+ * Utility functions for TLS protocol operations
113
+ */
114
+ export declare class TlsUtils {
115
+ /**
116
+ * Checks if a buffer contains a TLS handshake record
117
+ * @param buffer The buffer to check
118
+ * @returns true if the buffer starts with a TLS handshake record
119
+ */
120
+ static isTlsHandshake(buffer: Buffer): boolean;
121
+ /**
122
+ * Checks if a buffer contains TLS application data
123
+ * @param buffer The buffer to check
124
+ * @returns true if the buffer starts with a TLS application data record
125
+ */
126
+ static isTlsApplicationData(buffer: Buffer): boolean;
127
+ /**
128
+ * Checks if a buffer contains a TLS alert record
129
+ * @param buffer The buffer to check
130
+ * @returns true if the buffer starts with a TLS alert record
131
+ */
132
+ static isTlsAlert(buffer: Buffer): boolean;
133
+ /**
134
+ * Checks if a buffer contains a TLS ClientHello message
135
+ * @param buffer The buffer to check
136
+ * @returns true if the buffer appears to be a ClientHello message
137
+ */
138
+ static isClientHello(buffer: Buffer): boolean;
139
+ /**
140
+ * Gets the record length from a TLS record header
141
+ * @param buffer Buffer containing a TLS record
142
+ * @returns The record length if the buffer is valid, -1 otherwise
143
+ */
144
+ static getTlsRecordLength(buffer: Buffer): number;
145
+ /**
146
+ * Creates a connection ID based on source/destination information
147
+ * Used to track fragmented ClientHello messages across multiple packets
148
+ *
149
+ * @param connectionInfo Object containing connection identifiers
150
+ * @returns A string ID for the connection
151
+ */
152
+ static createConnectionId(connectionInfo: {
153
+ sourceIp?: string;
154
+ sourcePort?: number;
155
+ destIp?: string;
156
+ destPort?: number;
157
+ }): string;
158
+ }