|
|
@@ -93,10 +93,6 @@ func (h *SessionHistory) run() {
|
|
|
}
|
|
|
}
|
|
|
|
|
|
-func getSizeMask(b []byte) crypto.Uint16Generator {
|
|
|
- return crypto.NewShakeUint16Generator(b)
|
|
|
-}
|
|
|
-
|
|
|
type ServerSession struct {
|
|
|
userValidator protocol.UserValidator
|
|
|
sessionHistory *SessionHistory
|
|
|
@@ -239,23 +235,19 @@ func (v *ServerSession) DecodeRequestHeader(reader io.Reader) (*protocol.Request
|
|
|
}
|
|
|
|
|
|
func (v *ServerSession) DecodeRequestBody(request *protocol.RequestHeader, reader io.Reader) buf.Reader {
|
|
|
- var authReader io.Reader
|
|
|
- var sizeMask crypto.Uint16Generator = crypto.StaticUint16Generator(0)
|
|
|
+ var sizeParser crypto.ChunkSizeDecoder = crypto.PlainChunkSizeParser{}
|
|
|
if request.Option.Has(protocol.RequestOptionChunkMasking) {
|
|
|
- sizeMask = getSizeMask(v.requestBodyIV)
|
|
|
+ sizeParser = NewShakeSizeParser(v.requestBodyIV)
|
|
|
}
|
|
|
if request.Security.Is(protocol.SecurityType_NONE) {
|
|
|
if request.Option.Has(protocol.RequestOptionChunkStream) {
|
|
|
- auth := &crypto.AEADAuthenticator{
|
|
|
- AEAD: NoOpAuthenticator{},
|
|
|
- NonceGenerator: crypto.NoOpBytesGenerator{},
|
|
|
- AdditionalDataGenerator: crypto.NoOpBytesGenerator{},
|
|
|
- }
|
|
|
- authReader = crypto.NewAuthenticationReader(auth, reader, sizeMask)
|
|
|
- } else {
|
|
|
- authReader = reader
|
|
|
+ return crypto.NewChunkStreamReader(sizeParser, reader)
|
|
|
}
|
|
|
- } else if request.Security.Is(protocol.SecurityType_LEGACY) {
|
|
|
+
|
|
|
+ return buf.NewReader(reader)
|
|
|
+ }
|
|
|
+
|
|
|
+ if request.Security.Is(protocol.SecurityType_LEGACY) {
|
|
|
aesStream := crypto.NewAesDecryptionStream(v.requestBodyKey, v.requestBodyIV)
|
|
|
cryptionReader := crypto.NewCryptionReader(aesStream, reader)
|
|
|
if request.Option.Has(protocol.RequestOptionChunkStream) {
|
|
|
@@ -264,11 +256,13 @@ func (v *ServerSession) DecodeRequestBody(request *protocol.RequestHeader, reade
|
|
|
NonceGenerator: crypto.NoOpBytesGenerator{},
|
|
|
AdditionalDataGenerator: crypto.NoOpBytesGenerator{},
|
|
|
}
|
|
|
- authReader = crypto.NewAuthenticationReader(auth, cryptionReader, sizeMask)
|
|
|
- } else {
|
|
|
- authReader = cryptionReader
|
|
|
+ return crypto.NewAuthenticationReader(auth, sizeParser, cryptionReader)
|
|
|
}
|
|
|
- } else if request.Security.Is(protocol.SecurityType_AES128_GCM) {
|
|
|
+
|
|
|
+ return buf.NewReader(cryptionReader)
|
|
|
+ }
|
|
|
+
|
|
|
+ if request.Security.Is(protocol.SecurityType_AES128_GCM) {
|
|
|
block, _ := aes.NewCipher(v.requestBodyKey)
|
|
|
aead, _ := cipher.NewGCM(block)
|
|
|
|
|
|
@@ -280,8 +274,10 @@ func (v *ServerSession) DecodeRequestBody(request *protocol.RequestHeader, reade
|
|
|
},
|
|
|
AdditionalDataGenerator: crypto.NoOpBytesGenerator{},
|
|
|
}
|
|
|
- authReader = crypto.NewAuthenticationReader(auth, reader, sizeMask)
|
|
|
- } else if request.Security.Is(protocol.SecurityType_CHACHA20_POLY1305) {
|
|
|
+ return crypto.NewAuthenticationReader(auth, sizeParser, reader)
|
|
|
+ }
|
|
|
+
|
|
|
+ if request.Security.Is(protocol.SecurityType_CHACHA20_POLY1305) {
|
|
|
aead, _ := chacha20poly1305.New(GenerateChacha20Poly1305Key(v.requestBodyKey))
|
|
|
|
|
|
auth := &crypto.AEADAuthenticator{
|
|
|
@@ -292,10 +288,10 @@ func (v *ServerSession) DecodeRequestBody(request *protocol.RequestHeader, reade
|
|
|
},
|
|
|
AdditionalDataGenerator: crypto.NoOpBytesGenerator{},
|
|
|
}
|
|
|
- authReader = crypto.NewAuthenticationReader(auth, reader, sizeMask)
|
|
|
+ return crypto.NewAuthenticationReader(auth, sizeParser, reader)
|
|
|
}
|
|
|
|
|
|
- return buf.NewReader(authReader)
|
|
|
+ panic("Unknown security type.")
|
|
|
}
|
|
|
|
|
|
func (v *ServerSession) EncodeResponseHeader(header *protocol.ResponseHeader, writer io.Writer) {
|
|
|
@@ -316,34 +312,32 @@ func (v *ServerSession) EncodeResponseHeader(header *protocol.ResponseHeader, wr
|
|
|
}
|
|
|
|
|
|
func (v *ServerSession) EncodeResponseBody(request *protocol.RequestHeader, writer io.Writer) buf.Writer {
|
|
|
- var authWriter io.Writer
|
|
|
- var sizeMask crypto.Uint16Generator = crypto.StaticUint16Generator(0)
|
|
|
+ var sizeParser crypto.ChunkSizeEncoder = crypto.PlainChunkSizeParser{}
|
|
|
if request.Option.Has(protocol.RequestOptionChunkMasking) {
|
|
|
- sizeMask = getSizeMask(v.responseBodyIV)
|
|
|
+ sizeParser = NewShakeSizeParser(v.responseBodyIV)
|
|
|
}
|
|
|
if request.Security.Is(protocol.SecurityType_NONE) {
|
|
|
if request.Option.Has(protocol.RequestOptionChunkStream) {
|
|
|
- auth := &crypto.AEADAuthenticator{
|
|
|
- AEAD: NoOpAuthenticator{},
|
|
|
- NonceGenerator: crypto.NoOpBytesGenerator{},
|
|
|
- AdditionalDataGenerator: crypto.NoOpBytesGenerator{},
|
|
|
- }
|
|
|
- authWriter = crypto.NewAuthenticationWriter(auth, writer, sizeMask)
|
|
|
- } else {
|
|
|
- authWriter = writer
|
|
|
+ return crypto.NewChunkStreamWriter(sizeParser, writer)
|
|
|
}
|
|
|
- } else if request.Security.Is(protocol.SecurityType_LEGACY) {
|
|
|
+
|
|
|
+ return buf.NewWriter(writer)
|
|
|
+ }
|
|
|
+
|
|
|
+ if request.Security.Is(protocol.SecurityType_LEGACY) {
|
|
|
if request.Option.Has(protocol.RequestOptionChunkStream) {
|
|
|
auth := &crypto.AEADAuthenticator{
|
|
|
AEAD: new(FnvAuthenticator),
|
|
|
NonceGenerator: crypto.NoOpBytesGenerator{},
|
|
|
AdditionalDataGenerator: crypto.NoOpBytesGenerator{},
|
|
|
}
|
|
|
- authWriter = crypto.NewAuthenticationWriter(auth, v.responseWriter, sizeMask)
|
|
|
- } else {
|
|
|
- authWriter = v.responseWriter
|
|
|
+ return crypto.NewAuthenticationWriter(auth, sizeParser, v.responseWriter)
|
|
|
}
|
|
|
- } else if request.Security.Is(protocol.SecurityType_AES128_GCM) {
|
|
|
+
|
|
|
+ return buf.NewWriter(v.responseWriter)
|
|
|
+ }
|
|
|
+
|
|
|
+ if request.Security.Is(protocol.SecurityType_AES128_GCM) {
|
|
|
block, _ := aes.NewCipher(v.responseBodyKey)
|
|
|
aead, _ := cipher.NewGCM(block)
|
|
|
|
|
|
@@ -355,8 +349,10 @@ func (v *ServerSession) EncodeResponseBody(request *protocol.RequestHeader, writ
|
|
|
},
|
|
|
AdditionalDataGenerator: crypto.NoOpBytesGenerator{},
|
|
|
}
|
|
|
- authWriter = crypto.NewAuthenticationWriter(auth, writer, sizeMask)
|
|
|
- } else if request.Security.Is(protocol.SecurityType_CHACHA20_POLY1305) {
|
|
|
+ return crypto.NewAuthenticationWriter(auth, sizeParser, writer)
|
|
|
+ }
|
|
|
+
|
|
|
+ if request.Security.Is(protocol.SecurityType_CHACHA20_POLY1305) {
|
|
|
aead, _ := chacha20poly1305.New(GenerateChacha20Poly1305Key(v.responseBodyKey))
|
|
|
|
|
|
auth := &crypto.AEADAuthenticator{
|
|
|
@@ -367,8 +363,8 @@ func (v *ServerSession) EncodeResponseBody(request *protocol.RequestHeader, writ
|
|
|
},
|
|
|
AdditionalDataGenerator: crypto.NoOpBytesGenerator{},
|
|
|
}
|
|
|
- authWriter = crypto.NewAuthenticationWriter(auth, writer, sizeMask)
|
|
|
+ return crypto.NewAuthenticationWriter(auth, sizeParser, writer)
|
|
|
}
|
|
|
|
|
|
- return buf.NewWriter(authWriter)
|
|
|
+ panic("Unknown security type.")
|
|
|
}
|