auth.go 3.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170
  1. package crypto
  2. import (
  3. "crypto/cipher"
  4. "io"
  5. "v2ray.com/core/common/buf"
  6. )
  7. type BytesGenerator interface {
  8. Next() []byte
  9. }
  10. type NoOpBytesGenerator struct {
  11. buffer [1]byte
  12. }
  13. func (v NoOpBytesGenerator) Next() []byte {
  14. return v.buffer[:0]
  15. }
  16. type StaticBytesGenerator struct {
  17. Content []byte
  18. }
  19. func (v StaticBytesGenerator) Next() []byte {
  20. return v.Content
  21. }
  22. type Authenticator interface {
  23. NonceSize() int
  24. Overhead() int
  25. Open(dst, cipherText []byte) ([]byte, error)
  26. Seal(dst, plainText []byte) ([]byte, error)
  27. }
  28. type AEADAuthenticator struct {
  29. cipher.AEAD
  30. NonceGenerator BytesGenerator
  31. AdditionalDataGenerator BytesGenerator
  32. }
  33. func (v *AEADAuthenticator) Open(dst, cipherText []byte) ([]byte, error) {
  34. iv := v.NonceGenerator.Next()
  35. if len(iv) != v.AEAD.NonceSize() {
  36. return nil, newError("invalid AEAD nonce size: ", len(iv))
  37. }
  38. additionalData := v.AdditionalDataGenerator.Next()
  39. return v.AEAD.Open(dst, iv, cipherText, additionalData)
  40. }
  41. func (v *AEADAuthenticator) Seal(dst, plainText []byte) ([]byte, error) {
  42. iv := v.NonceGenerator.Next()
  43. if len(iv) != v.AEAD.NonceSize() {
  44. return nil, newError("invalid AEAD nonce size: ", len(iv))
  45. }
  46. additionalData := v.AdditionalDataGenerator.Next()
  47. return v.AEAD.Seal(dst, iv, plainText, additionalData), nil
  48. }
  49. type AuthenticationReader struct {
  50. auth Authenticator
  51. buffer *buf.Buffer
  52. reader io.Reader
  53. sizeParser ChunkSizeDecoder
  54. }
  55. const (
  56. readerBufferSize = 32 * 1024
  57. )
  58. func NewAuthenticationReader(auth Authenticator, sizeParser ChunkSizeDecoder, reader io.Reader) *AuthenticationReader {
  59. return &AuthenticationReader{
  60. auth: auth,
  61. buffer: buf.NewLocal(readerBufferSize),
  62. reader: reader,
  63. sizeParser: sizeParser,
  64. }
  65. }
  66. func (r *AuthenticationReader) readChunk() error {
  67. if err := r.buffer.Reset(buf.ReadFullFrom(r.reader, r.sizeParser.SizeBytes())); err != nil {
  68. return err
  69. }
  70. size, err := r.sizeParser.Decode(r.buffer.Bytes())
  71. if err != nil {
  72. return err
  73. }
  74. if size > readerBufferSize {
  75. return newError("size too large ", size).AtWarning()
  76. }
  77. if int(size) == r.auth.Overhead() {
  78. return io.EOF
  79. }
  80. if err := r.buffer.Reset(buf.ReadFullFrom(r.reader, int(size))); err != nil {
  81. return err
  82. }
  83. b, err := r.auth.Open(r.buffer.BytesTo(0), r.buffer.Bytes())
  84. if err != nil {
  85. return err
  86. }
  87. r.buffer.Slice(0, len(b))
  88. return nil
  89. }
  90. func (r *AuthenticationReader) Read() (buf.MultiBuffer, error) {
  91. if r.buffer.IsEmpty() {
  92. if err := r.readChunk(); err != nil {
  93. return nil, err
  94. }
  95. }
  96. mb := buf.NewMultiBuffer()
  97. for !r.buffer.IsEmpty() {
  98. b := buf.New()
  99. b.AppendSupplier(buf.ReadFrom(r.buffer))
  100. mb.Append(b)
  101. }
  102. return mb, nil
  103. }
  104. type AuthenticationWriter struct {
  105. auth Authenticator
  106. buffer []byte
  107. writer io.Writer
  108. sizeParser ChunkSizeEncoder
  109. }
  110. func NewAuthenticationWriter(auth Authenticator, sizeParser ChunkSizeEncoder, writer io.Writer) *AuthenticationWriter {
  111. return &AuthenticationWriter{
  112. auth: auth,
  113. buffer: make([]byte, 32*1024),
  114. writer: writer,
  115. sizeParser: sizeParser,
  116. }
  117. }
  118. func (w *AuthenticationWriter) writeInternal(b []byte) error {
  119. sizeBytes := w.sizeParser.SizeBytes()
  120. cipherChunk, err := w.auth.Seal(w.buffer[sizeBytes:sizeBytes], b)
  121. if err != nil {
  122. return err
  123. }
  124. w.sizeParser.Encode(uint16(len(cipherChunk)), w.buffer[:0])
  125. _, err = w.writer.Write(w.buffer[:sizeBytes+len(cipherChunk)])
  126. return err
  127. }
  128. func (w *AuthenticationWriter) Write(mb buf.MultiBuffer) error {
  129. defer mb.Release()
  130. const StartIndex = 17 * 1024
  131. for {
  132. payloadLen, _ := mb.Read(w.buffer[StartIndex:])
  133. err := w.writeInternal(w.buffer[StartIndex : StartIndex+payloadLen])
  134. if err != nil {
  135. return err
  136. }
  137. if mb.IsEmpty() {
  138. break
  139. }
  140. }
  141. return nil
  142. }