| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139 | 
							- package shadowsocks
 
- import (
 
- 	"bytes"
 
- 	"crypto/hmac"
 
- 	"crypto/sha1"
 
- 	"io"
 
- 	"v2ray.com/core/common"
 
- 	"v2ray.com/core/common/buf"
 
- 	"v2ray.com/core/common/errors"
 
- 	"v2ray.com/core/common/serial"
 
- )
 
- const (
 
- 	// AuthSize is the number of extra bytes for Shadowsocks OTA.
 
- 	AuthSize = 10
 
- )
 
- type KeyGenerator func() []byte
 
- type Authenticator struct {
 
- 	key KeyGenerator
 
- }
 
- func NewAuthenticator(keygen KeyGenerator) *Authenticator {
 
- 	return &Authenticator{
 
- 		key: keygen,
 
- 	}
 
- }
 
- func (v *Authenticator) Authenticate(data []byte) buf.Supplier {
 
- 	hasher := hmac.New(sha1.New, v.key())
 
- 	hasher.Write(data)
 
- 	res := hasher.Sum(nil)
 
- 	return func(b []byte) (int, error) {
 
- 		return copy(b, res[:AuthSize]), nil
 
- 	}
 
- }
 
- func HeaderKeyGenerator(key []byte, iv []byte) func() []byte {
 
- 	return func() []byte {
 
- 		newKey := make([]byte, 0, len(key)+len(iv))
 
- 		newKey = append(newKey, iv...)
 
- 		newKey = append(newKey, key...)
 
- 		return newKey
 
- 	}
 
- }
 
- func ChunkKeyGenerator(iv []byte) func() []byte {
 
- 	chunkID := 0
 
- 	return func() []byte {
 
- 		newKey := make([]byte, 0, len(iv)+4)
 
- 		newKey = append(newKey, iv...)
 
- 		newKey = serial.IntToBytes(chunkID, newKey)
 
- 		chunkID++
 
- 		return newKey
 
- 	}
 
- }
 
- type ChunkReader struct {
 
- 	reader io.Reader
 
- 	auth   *Authenticator
 
- }
 
- func NewChunkReader(reader io.Reader, auth *Authenticator) *ChunkReader {
 
- 	return &ChunkReader{
 
- 		reader: reader,
 
- 		auth:   auth,
 
- 	}
 
- }
 
- func (v *ChunkReader) Release() {
 
- 	common.Release(v.reader)
 
- 	common.Release(v.auth)
 
- }
 
- func (v *ChunkReader) Read() (*buf.Buffer, error) {
 
- 	buffer := buf.New()
 
- 	if err := buffer.AppendSupplier(buf.ReadFullFrom(v.reader, 2)); err != nil {
 
- 		buffer.Release()
 
- 		return nil, err
 
- 	}
 
- 	// There is a potential buffer overflow here. Large buffer is 64K bytes,
 
- 	// while uin16 + 10 will be more than that
 
- 	length := serial.BytesToUint16(buffer.BytesTo(2)) + AuthSize
 
- 	if length > buf.Size {
 
- 		// Theoretically the size of a chunk is 64K, but most Shadowsocks implementations used <4K buffer.
 
- 		buffer.Release()
 
- 		buffer = buf.NewLocal(int(length) + 128)
 
- 	}
 
- 	buffer.Clear()
 
- 	if err := buffer.AppendSupplier(buf.ReadFullFrom(v.reader, int(length))); err != nil {
 
- 		buffer.Release()
 
- 		return nil, err
 
- 	}
 
- 	authBytes := buffer.BytesTo(AuthSize)
 
- 	payload := buffer.BytesFrom(AuthSize)
 
- 	actualAuthBytes := make([]byte, AuthSize)
 
- 	v.auth.Authenticate(payload)(actualAuthBytes)
 
- 	if !bytes.Equal(authBytes, actualAuthBytes) {
 
- 		buffer.Release()
 
- 		return nil, errors.New("Shadowsocks|AuthenticationReader: Invalid auth.")
 
- 	}
 
- 	buffer.SliceFrom(AuthSize)
 
- 	return buffer, nil
 
- }
 
- type ChunkWriter struct {
 
- 	writer io.Writer
 
- 	auth   *Authenticator
 
- 	buffer []byte
 
- }
 
- func NewChunkWriter(writer io.Writer, auth *Authenticator) *ChunkWriter {
 
- 	return &ChunkWriter{
 
- 		writer: writer,
 
- 		auth:   auth,
 
- 		buffer: make([]byte, 32*1024),
 
- 	}
 
- }
 
- func (v *ChunkWriter) Release() {
 
- 	common.Release(v.writer)
 
- 	common.Release(v.auth)
 
- }
 
- func (v *ChunkWriter) Write(payload *buf.Buffer) error {
 
- 	totalLength := payload.Len()
 
- 	serial.Uint16ToBytes(uint16(totalLength), v.buffer[:0])
 
- 	v.auth.Authenticate(payload.Bytes())(v.buffer[2:])
 
- 	copy(v.buffer[2+AuthSize:], payload.Bytes())
 
- 	_, err := v.writer.Write(v.buffer[:2+AuthSize+payload.Len()])
 
- 	return err
 
- }
 
 
  |