| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111 | package vmessimport (	"bytes"	"crypto/md5"	"net"	"github.com/v2ray/v2ray-core/common/alloc"	v2crypto "github.com/v2ray/v2ray-core/common/crypto"	"github.com/v2ray/v2ray-core/common/log"	v2net "github.com/v2ray/v2ray-core/common/net"	"github.com/v2ray/v2ray-core/proxy/vmess/protocol")const (	bufferSize = 2 * 1024)func (handler *VMessInboundHandler) ListenUDP(port uint16) error {	addr := &net.UDPAddr{		IP:   net.IP{0, 0, 0, 0},		Port: int(port),		Zone: "",	}	conn, err := net.ListenUDP("udp", addr)	if err != nil {		log.Error("VMessIn failed to listen UDP on port %d: %v", port, err)		return err	}	go handler.AcceptPackets(conn)	return nil}func (handler *VMessInboundHandler) AcceptPackets(conn *net.UDPConn) {	for {		buffer := alloc.NewBuffer()		nBytes, addr, err := conn.ReadFromUDP(buffer.Value)		if err != nil {			log.Error("VMessIn failed to read UDP packets: %v", err)			buffer.Release()			continue		}		reader := bytes.NewReader(buffer.Value[:nBytes])		requestReader := protocol.NewVMessRequestReader(handler.clients)		request, err := requestReader.Read(reader)		if err != nil {			log.Access(addr.String(), "", log.AccessRejected, err.Error())			log.Warning("VMessIn: Invalid request from (%s): %v", addr.String(), err)			buffer.Release()			continue		}		log.Access(addr.String(), request.Address.String(), log.AccessAccepted, "")		aesStream, err := v2crypto.NewAesDecryptionStream(request.RequestKey, request.RequestIV)		if err != nil {			log.Error("VMessIn: Failed to AES decryption stream: %v", err)			buffer.Release()			continue		}		cryptReader := v2crypto.NewCryptionReader(aesStream, reader)		data := alloc.NewBuffer()		nBytes, err = cryptReader.Read(data.Value)		buffer.Release()		if err != nil {			log.Warning("VMessIn: Unable to decrypt data: %v", err)			data.Release()			continue		}		data.Slice(0, nBytes)		packet := v2net.NewPacket(request.Destination(), data, false)		go handler.handlePacket(conn, request, packet, addr)	}}func (handler *VMessInboundHandler) handlePacket(conn *net.UDPConn, request *protocol.VMessRequest, packet v2net.Packet, clientAddr *net.UDPAddr) {	ray := handler.dispatcher.DispatchToOutbound(packet)	close(ray.InboundInput())	responseKey := md5.Sum(request.RequestKey)	responseIV := md5.Sum(request.RequestIV)	buffer := alloc.NewBuffer().Clear()	defer buffer.Release()	aesStream, err := v2crypto.NewAesEncryptionStream(responseKey[:], responseIV[:])	if err != nil {		log.Error("VMessIn: Failed to create AES encryption stream: %v", err)		return	}	responseWriter := v2crypto.NewCryptionWriter(aesStream, buffer)	responseWriter.Write(request.ResponseHeader)	hasData := false	if data, ok := <-ray.InboundOutput(); ok {		hasData = true		responseWriter.Write(data.Value)		data.Release()	}	if hasData {		conn.WriteToUDP(buffer.Value, clientAddr)		log.Info("VMessIn sending %d bytes to %s", buffer.Len(), clientAddr.String())	}}
 |