ota.go 3.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138
  1. package shadowsocks
  2. import (
  3. "bytes"
  4. "crypto/hmac"
  5. "crypto/sha1"
  6. "io"
  7. "v2ray.com/core/common/buf"
  8. "v2ray.com/core/common/errors"
  9. "v2ray.com/core/common/serial"
  10. )
  11. const (
  12. AuthSize = 10
  13. )
  14. type KeyGenerator func() []byte
  15. type Authenticator struct {
  16. key KeyGenerator
  17. }
  18. func NewAuthenticator(keygen KeyGenerator) *Authenticator {
  19. return &Authenticator{
  20. key: keygen,
  21. }
  22. }
  23. func (v *Authenticator) Authenticate(data []byte) buf.BytesWriter {
  24. hasher := hmac.New(sha1.New, v.key())
  25. hasher.Write(data)
  26. res := hasher.Sum(nil)
  27. return func(b []byte) int {
  28. copy(b, res[:AuthSize])
  29. return AuthSize
  30. }
  31. }
  32. func HeaderKeyGenerator(key []byte, iv []byte) func() []byte {
  33. return func() []byte {
  34. newKey := make([]byte, 0, len(key)+len(iv))
  35. newKey = append(newKey, iv...)
  36. newKey = append(newKey, key...)
  37. return newKey
  38. }
  39. }
  40. func ChunkKeyGenerator(iv []byte) func() []byte {
  41. chunkId := 0
  42. return func() []byte {
  43. newKey := make([]byte, 0, len(iv)+4)
  44. newKey = append(newKey, iv...)
  45. newKey = serial.IntToBytes(chunkId, newKey)
  46. chunkId++
  47. return newKey
  48. }
  49. }
  50. type ChunkReader struct {
  51. reader io.Reader
  52. auth *Authenticator
  53. }
  54. func NewChunkReader(reader io.Reader, auth *Authenticator) *ChunkReader {
  55. return &ChunkReader{
  56. reader: reader,
  57. auth: auth,
  58. }
  59. }
  60. func (v *ChunkReader) Release() {
  61. v.reader = nil
  62. v.auth = nil
  63. }
  64. func (v *ChunkReader) Read() (*buf.Buffer, error) {
  65. buffer := buf.NewBuffer()
  66. if _, err := buffer.FillFullFrom(v.reader, 2); err != nil {
  67. buffer.Release()
  68. return nil, err
  69. }
  70. // There is a potential buffer overflow here. Large buffer is 64K bytes,
  71. // while uin16 + 10 will be more than that
  72. length := serial.BytesToUint16(buffer.BytesTo(2)) + AuthSize
  73. if length > buf.BufferSize {
  74. // Theoretically the size of a chunk is 64K, but most Shadowsocks implementations used <4K buffer.
  75. buffer.Release()
  76. buffer = buf.NewLocalBuffer(int(length) + 128)
  77. }
  78. buffer.Clear()
  79. if _, err := buffer.FillFullFrom(v.reader, int(length)); err != nil {
  80. buffer.Release()
  81. return nil, err
  82. }
  83. authBytes := buffer.BytesTo(AuthSize)
  84. payload := buffer.BytesFrom(AuthSize)
  85. actualAuthBytes := make([]byte, AuthSize)
  86. v.auth.Authenticate(payload)(actualAuthBytes)
  87. if !bytes.Equal(authBytes, actualAuthBytes) {
  88. buffer.Release()
  89. return nil, errors.New("Shadowsocks|AuthenticationReader: Invalid auth.")
  90. }
  91. buffer.SliceFrom(AuthSize)
  92. return buffer, nil
  93. }
  94. type ChunkWriter struct {
  95. writer io.Writer
  96. auth *Authenticator
  97. buffer []byte
  98. }
  99. func NewChunkWriter(writer io.Writer, auth *Authenticator) *ChunkWriter {
  100. return &ChunkWriter{
  101. writer: writer,
  102. auth: auth,
  103. buffer: make([]byte, 32*1024),
  104. }
  105. }
  106. func (v *ChunkWriter) Release() {
  107. v.writer = nil
  108. v.auth = nil
  109. }
  110. func (v *ChunkWriter) Write(payload *buf.Buffer) error {
  111. totalLength := payload.Len()
  112. serial.Uint16ToBytes(uint16(totalLength), v.buffer[:0])
  113. v.auth.Authenticate(payload.Bytes())(v.buffer[2:])
  114. copy(v.buffer[2+AuthSize:], payload.Bytes())
  115. _, err := v.writer.Write(v.buffer[:2+AuthSize+payload.Len()])
  116. return err
  117. }