ota.go 3.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139
  1. package shadowsocks
  2. import (
  3. "bytes"
  4. "crypto/hmac"
  5. "crypto/sha1"
  6. "io"
  7. "v2ray.com/core/common"
  8. "v2ray.com/core/common/buf"
  9. "v2ray.com/core/common/errors"
  10. "v2ray.com/core/common/serial"
  11. )
  12. const (
  13. // AuthSize is the number of extra bytes for Shadowsocks OTA.
  14. AuthSize = 10
  15. )
  16. type KeyGenerator func() []byte
  17. type Authenticator struct {
  18. key KeyGenerator
  19. }
  20. func NewAuthenticator(keygen KeyGenerator) *Authenticator {
  21. return &Authenticator{
  22. key: keygen,
  23. }
  24. }
  25. func (v *Authenticator) Authenticate(data []byte) buf.Supplier {
  26. hasher := hmac.New(sha1.New, v.key())
  27. hasher.Write(data)
  28. res := hasher.Sum(nil)
  29. return func(b []byte) (int, error) {
  30. return copy(b, res[:AuthSize]), nil
  31. }
  32. }
  33. func HeaderKeyGenerator(key []byte, iv []byte) func() []byte {
  34. return func() []byte {
  35. newKey := make([]byte, 0, len(key)+len(iv))
  36. newKey = append(newKey, iv...)
  37. newKey = append(newKey, key...)
  38. return newKey
  39. }
  40. }
  41. func ChunkKeyGenerator(iv []byte) func() []byte {
  42. chunkID := 0
  43. return func() []byte {
  44. newKey := make([]byte, 0, len(iv)+4)
  45. newKey = append(newKey, iv...)
  46. newKey = serial.IntToBytes(chunkID, newKey)
  47. chunkID++
  48. return newKey
  49. }
  50. }
  51. type ChunkReader struct {
  52. reader io.Reader
  53. auth *Authenticator
  54. }
  55. func NewChunkReader(reader io.Reader, auth *Authenticator) *ChunkReader {
  56. return &ChunkReader{
  57. reader: reader,
  58. auth: auth,
  59. }
  60. }
  61. func (v *ChunkReader) Release() {
  62. common.Release(v.reader)
  63. common.Release(v.auth)
  64. }
  65. func (v *ChunkReader) Read() (*buf.Buffer, error) {
  66. buffer := buf.New()
  67. if err := buffer.AppendSupplier(buf.ReadFullFrom(v.reader, 2)); err != nil {
  68. buffer.Release()
  69. return nil, err
  70. }
  71. // There is a potential buffer overflow here. Large buffer is 64K bytes,
  72. // while uin16 + 10 will be more than that
  73. length := serial.BytesToUint16(buffer.BytesTo(2)) + AuthSize
  74. if length > buf.Size {
  75. // Theoretically the size of a chunk is 64K, but most Shadowsocks implementations used <4K buffer.
  76. buffer.Release()
  77. buffer = buf.NewLocal(int(length) + 128)
  78. }
  79. buffer.Clear()
  80. if err := buffer.AppendSupplier(buf.ReadFullFrom(v.reader, int(length))); err != nil {
  81. buffer.Release()
  82. return nil, err
  83. }
  84. authBytes := buffer.BytesTo(AuthSize)
  85. payload := buffer.BytesFrom(AuthSize)
  86. actualAuthBytes := make([]byte, AuthSize)
  87. v.auth.Authenticate(payload)(actualAuthBytes)
  88. if !bytes.Equal(authBytes, actualAuthBytes) {
  89. buffer.Release()
  90. return nil, errors.New("Shadowsocks|AuthenticationReader: Invalid auth.")
  91. }
  92. buffer.SliceFrom(AuthSize)
  93. return buffer, nil
  94. }
  95. type ChunkWriter struct {
  96. writer io.Writer
  97. auth *Authenticator
  98. buffer []byte
  99. }
  100. func NewChunkWriter(writer io.Writer, auth *Authenticator) *ChunkWriter {
  101. return &ChunkWriter{
  102. writer: writer,
  103. auth: auth,
  104. buffer: make([]byte, 32*1024),
  105. }
  106. }
  107. func (v *ChunkWriter) Release() {
  108. common.Release(v.writer)
  109. common.Release(v.auth)
  110. }
  111. func (v *ChunkWriter) Write(payload *buf.Buffer) error {
  112. totalLength := payload.Len()
  113. serial.Uint16ToBytes(uint16(totalLength), v.buffer[:0])
  114. v.auth.Authenticate(payload.Bytes())(v.buffer[2:])
  115. copy(v.buffer[2+AuthSize:], payload.Bytes())
  116. _, err := v.writer.Write(v.buffer[:2+AuthSize+payload.Len()])
  117. return err
  118. }