| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153 |
- package kcp
- import (
- "context"
- "crypto/cipher"
- "crypto/tls"
- "net"
- "sync"
- "sync/atomic"
- "v2ray.com/core/app/log"
- "v2ray.com/core/common"
- "v2ray.com/core/common/buf"
- "v2ray.com/core/common/dice"
- v2net "v2ray.com/core/common/net"
- "v2ray.com/core/transport/internet"
- v2tls "v2ray.com/core/transport/internet/tls"
- )
- var (
- globalConv = uint32(dice.RandomUint16())
- )
- type ClientConnection struct {
- sync.RWMutex
- net.Conn
- input func([]Segment)
- reader PacketReader
- writer PacketWriter
- }
- func (c *ClientConnection) Overhead() int {
- c.RLock()
- defer c.RUnlock()
- if c.writer == nil {
- return 0
- }
- return c.writer.Overhead()
- }
- // Write implements io.Writer.
- func (c *ClientConnection) Write(b []byte) (int, error) {
- c.RLock()
- defer c.RUnlock()
- if c.writer == nil {
- return len(b), nil
- }
- return c.writer.Write(b)
- }
- func (*ClientConnection) Read([]byte) (int, error) {
- panic("KCP|ClientConnection: Read should not be called.")
- }
- func (c *ClientConnection) Close() error {
- return c.Conn.Close()
- }
- func (c *ClientConnection) Reset(inputCallback func([]Segment)) {
- c.Lock()
- c.input = inputCallback
- c.Unlock()
- }
- func (c *ClientConnection) ResetSecurity(header internet.PacketHeader, security cipher.AEAD) {
- c.Lock()
- if c.reader == nil {
- c.reader = new(KCPPacketReader)
- }
- c.reader.(*KCPPacketReader).Header = header
- c.reader.(*KCPPacketReader).Security = security
- if c.writer == nil {
- c.writer = new(KCPPacketWriter)
- }
- c.writer.(*KCPPacketWriter).Header = header
- c.writer.(*KCPPacketWriter).Security = security
- c.writer.(*KCPPacketWriter).Writer = c.Conn
- c.Unlock()
- }
- func (c *ClientConnection) Run() {
- payload := buf.New()
- defer payload.Release()
- for {
- err := payload.Reset(buf.ReadFrom(c.Conn))
- if err != nil {
- payload.Release()
- return
- }
- c.RLock()
- if c.input != nil {
- segments := c.reader.Read(payload.Bytes())
- if len(segments) > 0 {
- c.input(segments)
- }
- }
- c.RUnlock()
- }
- }
- func DialKCP(ctx context.Context, dest v2net.Destination) (internet.Connection, error) {
- dest.Network = v2net.Network_UDP
- log.Trace(newError("dialing mKCP to ", dest))
- src := internet.DialerSourceFromContext(ctx)
- rawConn, err := internet.DialSystem(ctx, src, dest)
- if err != nil {
- return nil, newError("failed to dial to dest: ", err).AtWarning().Base(err)
- }
- conn := &ClientConnection{
- Conn: rawConn,
- }
- go conn.Run()
- kcpSettings := internet.TransportSettingsFromContext(ctx).(*Config)
- header, err := kcpSettings.GetPackerHeader()
- if err != nil {
- return nil, newError("failed to create packet header").Base(err)
- }
- security, err := kcpSettings.GetSecurity()
- if err != nil {
- return nil, newError("failed to create security").Base(err)
- }
- conn.ResetSecurity(header, security)
- conv := uint16(atomic.AddUint32(&globalConv, 1))
- session := NewConnection(conv, conn, kcpSettings)
- var iConn internet.Connection
- iConn = session
- if securitySettings := internet.SecuritySettingsFromContext(ctx); securitySettings != nil {
- switch securitySettings := securitySettings.(type) {
- case *v2tls.Config:
- config := securitySettings.GetTLSConfig()
- if dest.Address.Family().IsDomain() {
- config.ServerName = dest.Address.Domain()
- }
- tlsConn := tls.Client(iConn, config)
- iConn = tlsConn
- }
- }
- return iConn, nil
- }
- func init() {
- common.Must(internet.RegisterTransportDialer(internet.TransportProtocol_MKCP, DialKCP))
- }
|