| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227 | // Package vmess contains protocol definition, io lib for VMess.package protocolimport (	"crypto/md5"	"encoding/binary"	"hash/fnv"	"io"	"github.com/v2ray/v2ray-core/common/alloc"	v2crypto "github.com/v2ray/v2ray-core/common/crypto"	"github.com/v2ray/v2ray-core/common/log"	v2net "github.com/v2ray/v2ray-core/common/net"	"github.com/v2ray/v2ray-core/proxy"	"github.com/v2ray/v2ray-core/proxy/vmess"	"github.com/v2ray/v2ray-core/transport")const (	addrTypeIPv4   = byte(0x01)	addrTypeIPv6   = byte(0x03)	addrTypeDomain = byte(0x02)	CmdTCP = byte(0x01)	CmdUDP = byte(0x02)	Version = byte(0x01)	blockSize = 16)// VMessRequest implements the request message of VMess protocol. It only contains the header of a// request message. The data part will be handled by conection handler directly, in favor of data// streaming.type VMessRequest struct {	Version        byte	User           *vmess.User	RequestIV      []byte	RequestKey     []byte	ResponseHeader []byte	Command        byte	Address        v2net.Address	Port           v2net.Port}// Destination is the final destination of this request.func (this *VMessRequest) Destination() v2net.Destination {	if this.Command == CmdTCP {		return v2net.TCPDestination(this.Address, this.Port)	} else {		return v2net.UDPDestination(this.Address, this.Port)	}}// VMessRequestReader is a parser to read VMessRequest from a byte stream.type VMessRequestReader struct {	vUserSet UserSet}// NewVMessRequestReader creates a new VMessRequestReader with a given UserSetfunc NewVMessRequestReader(vUserSet UserSet) *VMessRequestReader {	return &VMessRequestReader{		vUserSet: vUserSet,	}}// Read reads a VMessRequest from a byte stream.func (this *VMessRequestReader) Read(reader io.Reader) (*VMessRequest, error) {	buffer := alloc.NewSmallBuffer()	defer buffer.Release()	nBytes, err := v2net.ReadAllBytes(reader, buffer.Value[:vmess.IDBytesLen])	if err != nil {		log.Debug("VMess: Failed to read request ID (", nBytes, " bytes): ", err)		return nil, err	}	userObj, timeSec, valid := this.vUserSet.GetUser(buffer.Value[:nBytes])	if !valid {		return nil, proxy.InvalidAuthentication	}	timestampHash := TimestampHash()	timestampHash.Write(timeSec.HashBytes())	iv := timestampHash.Sum(nil)	aesStream, err := v2crypto.NewAesDecryptionStream(userObj.ID.CmdKey(), iv)	if err != nil {		log.Debug("VMess: Failed to create AES stream: ", err)		return nil, err	}	decryptor := v2crypto.NewCryptionReader(aesStream, reader)	nBytes, err = v2net.ReadAllBytes(decryptor, buffer.Value[:41])	if err != nil {		log.Debug("VMess: Failed to read request header (", nBytes, " bytes): ", err)		return nil, err	}	bufferLen := nBytes	request := &VMessRequest{		User:    userObj,		Version: buffer.Value[0],	}	if request.Version != Version {		log.Warning("VMess: Invalid protocol version ", request.Version)		return nil, proxy.InvalidProtocolVersion	}	request.RequestIV = append([]byte(nil), buffer.Value[1:17]...)       // 16 bytes	request.RequestKey = append([]byte(nil), buffer.Value[17:33]...)     // 16 bytes	request.ResponseHeader = append([]byte(nil), buffer.Value[33:37]...) // 4 bytes	request.Command = buffer.Value[37]	request.Port = v2net.PortFromBytes(buffer.Value[38:40])	switch buffer.Value[40] {	case addrTypeIPv4:		nBytes, err = v2net.ReadAllBytes(decryptor, buffer.Value[41:45]) // 4 bytes		bufferLen += 4		if err != nil {			log.Debug("VMess: Failed to read target IPv4 (", nBytes, " bytes): ", err)			return nil, err		}		request.Address = v2net.IPAddress(buffer.Value[41:45])	case addrTypeIPv6:		nBytes, err = v2net.ReadAllBytes(decryptor, buffer.Value[41:57]) // 16 bytes		bufferLen += 16		if err != nil {			log.Debug("VMess: Failed to read target IPv6 (", nBytes, " bytes): ", nBytes, err)			return nil, err		}		request.Address = v2net.IPAddress(buffer.Value[41:57])	case addrTypeDomain:		nBytes, err = v2net.ReadAllBytes(decryptor, buffer.Value[41:42])		if err != nil {			log.Debug("VMess: Failed to read target domain (", nBytes, " bytes): ", nBytes, err)			return nil, err		}		domainLength := int(buffer.Value[41])		if domainLength == 0 {			return nil, transport.CorruptedPacket		}		nBytes, err = v2net.ReadAllBytes(decryptor, buffer.Value[42:42+domainLength])		if err != nil {			log.Debug("VMess: Failed to read target domain (", nBytes, " bytes): ", nBytes, err)			return nil, err		}		bufferLen += 1 + domainLength		domainBytes := append([]byte(nil), buffer.Value[42:42+domainLength]...)		request.Address = v2net.DomainAddress(string(domainBytes))	}	nBytes, err = v2net.ReadAllBytes(decryptor, buffer.Value[bufferLen:bufferLen+4])	if err != nil {		log.Debug("VMess: Failed to read checksum (", nBytes, " bytes): ", nBytes, err)		return nil, err	}	fnv1a := fnv.New32a()	fnv1a.Write(buffer.Value[:bufferLen])	actualHash := fnv1a.Sum32()	expectedHash := binary.BigEndian.Uint32(buffer.Value[bufferLen : bufferLen+4])	if actualHash != expectedHash {		return nil, transport.CorruptedPacket	}	return request, nil}// ToBytes returns a VMessRequest in the form of byte array.func (this *VMessRequest) ToBytes(timestampGenerator RandomTimestampGenerator, buffer *alloc.Buffer) (*alloc.Buffer, error) {	if buffer == nil {		buffer = alloc.NewSmallBuffer().Clear()	}	timestamp := timestampGenerator.Next()	idHash := IDHash(this.User.AnyValidID().Bytes())	idHash.Write(timestamp.Bytes())	hashStart := buffer.Len()	buffer.Slice(0, hashStart+16)	idHash.Sum(buffer.Value[hashStart:hashStart])	encryptionBegin := buffer.Len()	buffer.AppendBytes(this.Version)	buffer.Append(this.RequestIV)	buffer.Append(this.RequestKey)	buffer.Append(this.ResponseHeader)	buffer.AppendBytes(this.Command)	buffer.Append(this.Port.Bytes())	switch {	case this.Address.IsIPv4():		buffer.AppendBytes(addrTypeIPv4)		buffer.Append(this.Address.IP())	case this.Address.IsIPv6():		buffer.AppendBytes(addrTypeIPv6)		buffer.Append(this.Address.IP())	case this.Address.IsDomain():		buffer.AppendBytes(addrTypeDomain, byte(len(this.Address.Domain())))		buffer.Append([]byte(this.Address.Domain()))	}	encryptionEnd := buffer.Len()	fnv1a := fnv.New32a()	fnv1a.Write(buffer.Value[encryptionBegin:encryptionEnd])	fnvHash := fnv1a.Sum32()	buffer.AppendBytes(byte(fnvHash>>24), byte(fnvHash>>16), byte(fnvHash>>8), byte(fnvHash))	encryptionEnd += 4	timestampHash := md5.New()	timestampHash.Write(timestamp.HashBytes())	iv := timestampHash.Sum(nil)	aesStream, err := v2crypto.NewAesEncryptionStream(this.User.ID.CmdKey(), iv)	if err != nil {		return nil, err	}	aesStream.XORKeyStream(buffer.Value[encryptionBegin:encryptionEnd], buffer.Value[encryptionBegin:encryptionEnd])	return buffer, nil}
 |