config.go 1.1 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849
  1. package quic
  2. import (
  3. "crypto/aes"
  4. "crypto/cipher"
  5. "crypto/sha256"
  6. "golang.org/x/crypto/chacha20poly1305"
  7. "github.com/v2fly/v2ray-core/v5/common"
  8. "github.com/v2fly/v2ray-core/v5/common/protocol"
  9. "github.com/v2fly/v2ray-core/v5/common/serial"
  10. "github.com/v2fly/v2ray-core/v5/transport/internet"
  11. )
  12. func getAuth(config *Config) (cipher.AEAD, error) {
  13. security := config.Security.GetSecurityType()
  14. if security == protocol.SecurityType_NONE {
  15. return nil, nil
  16. }
  17. salted := []byte(config.Key + "v2ray-quic-salt")
  18. key := sha256.Sum256(salted)
  19. if security == protocol.SecurityType_AES128_GCM {
  20. block, err := aes.NewCipher(key[:16])
  21. common.Must(err)
  22. return cipher.NewGCM(block)
  23. }
  24. if security == protocol.SecurityType_CHACHA20_POLY1305 {
  25. return chacha20poly1305.New(key[:])
  26. }
  27. return nil, newError("unsupported security type")
  28. }
  29. func getHeader(config *Config) (internet.PacketHeader, error) {
  30. if config.Header == nil {
  31. return nil, nil
  32. }
  33. msg, err := serial.GetInstanceOf(config.Header)
  34. if err != nil {
  35. return nil, err
  36. }
  37. return internet.CreatePacketHeader(msg)
  38. }