encrypt.go 3.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141
  1. package aead
  2. import (
  3. "bytes"
  4. "crypto/aes"
  5. "crypto/cipher"
  6. "crypto/hmac"
  7. "crypto/rand"
  8. "encoding/binary"
  9. "errors"
  10. "io"
  11. "time"
  12. "v2ray.com/core/common"
  13. )
  14. func SealVMessAEADHeader(key [16]byte, data []byte) []byte {
  15. authid := CreateAuthID(key[:], time.Now().Unix())
  16. nonce := make([]byte, 8)
  17. if _, err := io.ReadFull(rand.Reader, nonce); err != nil {
  18. panic(err.Error())
  19. }
  20. lengthbuf := bytes.NewBuffer(nil)
  21. var HeaderDataLen uint16
  22. HeaderDataLen = uint16(len(data))
  23. common.Must(binary.Write(lengthbuf, binary.BigEndian, HeaderDataLen))
  24. authidCheck := KDF16(key[:], "VMess AuthID Check Value", string(authid[:]), string(lengthbuf.Bytes()), string(nonce))
  25. lengthbufb := lengthbuf.Bytes()
  26. LengthMask := KDF16(key[:], "VMess AuthID Mask Value", string(authid[:]), string(nonce[:]))[:2]
  27. lengthbufb[0] = lengthbufb[0] ^ LengthMask[0]
  28. lengthbufb[1] = lengthbufb[1] ^ LengthMask[1]
  29. HeaderAEADKey := KDF16(key[:], "VMess Header AEAD Key", string(authid[:]), string(nonce))
  30. HeaderAEADNonce := KDF(key[:], "VMess Header AEAD Nonce", string(authid[:]), string(nonce))[:12]
  31. block, err := aes.NewCipher(HeaderAEADKey)
  32. if err != nil {
  33. panic(err.Error())
  34. }
  35. headerAEAD, err := cipher.NewGCM(block)
  36. if err != nil {
  37. panic(err.Error())
  38. }
  39. headerSealed := headerAEAD.Seal(nil, HeaderAEADNonce, data, authid[:])
  40. var outPutBuf = bytes.NewBuffer(nil)
  41. common.Must2(outPutBuf.Write(authid[:])) //16
  42. common.Must2(outPutBuf.Write(authidCheck)) //16
  43. common.Must2(outPutBuf.Write(lengthbufb)) //2
  44. common.Must2(outPutBuf.Write(nonce)) //8
  45. common.Must2(outPutBuf.Write(headerSealed))
  46. return outPutBuf.Bytes()
  47. }
  48. func OpenVMessAEADHeader(key [16]byte, authid [16]byte, data io.Reader) ([]byte, bool, error, int) {
  49. var authidCheck [16]byte
  50. var lengthbufb [2]byte
  51. var nonce [8]byte
  52. n, err := io.ReadFull(data, authidCheck[:])
  53. if err != nil {
  54. return nil, false, err, n
  55. }
  56. n2, err := io.ReadFull(data, lengthbufb[:])
  57. if err != nil {
  58. return nil, false, err, n + n2
  59. }
  60. n4, err := io.ReadFull(data, nonce[:])
  61. if err != nil {
  62. return nil, false, err, n + n2 + n4
  63. }
  64. //Unmask Length
  65. LengthMask := KDF16(key[:], "VMess AuthID Mask Value", string(authid[:]), string(nonce[:]))[:2]
  66. lengthbufb[0] = lengthbufb[0] ^ LengthMask[0]
  67. lengthbufb[1] = lengthbufb[1] ^ LengthMask[1]
  68. authidCheckV := KDF16(key[:], "VMess AuthID Check Value", string(authid[:]), string(lengthbufb[:]), string(nonce[:]))
  69. if !hmac.Equal(authidCheckV, authidCheck[:]) {
  70. return nil, true, errCheckMismatch, n + n2 + n4
  71. }
  72. var length uint16
  73. common.Must(binary.Read(bytes.NewReader(lengthbufb[:]), binary.BigEndian, &length))
  74. HeaderAEADKey := KDF16(key[:], "VMess Header AEAD Key", string(authid[:]), string(nonce[:]))
  75. HeaderAEADNonce := KDF(key[:], "VMess Header AEAD Nonce", string(authid[:]), string(nonce[:]))[:12]
  76. //16 == AEAD Tag size
  77. header := make([]byte, length+16)
  78. n3, err := io.ReadFull(data, header)
  79. if err != nil {
  80. return nil, false, err, n + n2 + n3 + n4
  81. }
  82. block, err := aes.NewCipher(HeaderAEADKey)
  83. if err != nil {
  84. panic(err.Error())
  85. }
  86. headerAEAD, err := cipher.NewGCM(block)
  87. if err != nil {
  88. panic(err.Error())
  89. }
  90. out, erropenAEAD := headerAEAD.Open(nil, HeaderAEADNonce, header, authid[:])
  91. if erropenAEAD != nil {
  92. return nil, true, erropenAEAD, n + n2 + n3 + n4
  93. }
  94. return out, false, nil, n + n2 + n3 + n4
  95. }
  96. var errCheckMismatch = errors.New("check verify failed")