mirror of
https://github.com/XTLS/Xray-core.git
synced 2024-11-22 20:59:19 +02:00
Refactor: Add Shadowsocks Validator (#233)
This commit is contained in:
parent
1b87264c53
commit
df39991bb3
|
@ -7,6 +7,8 @@ import (
|
||||||
"crypto/md5"
|
"crypto/md5"
|
||||||
"crypto/sha1"
|
"crypto/sha1"
|
||||||
"io"
|
"io"
|
||||||
|
"reflect"
|
||||||
|
"strconv"
|
||||||
|
|
||||||
"golang.org/x/crypto/chacha20poly1305"
|
"golang.org/x/crypto/chacha20poly1305"
|
||||||
"golang.org/x/crypto/hkdf"
|
"golang.org/x/crypto/hkdf"
|
||||||
|
@ -31,6 +33,31 @@ func (a *MemoryAccount) Equals(another protocol.Account) bool {
|
||||||
return false
|
return false
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (a *MemoryAccount) GetCipherName() string {
|
||||||
|
switch a.Cipher.(type) {
|
||||||
|
case *AesCfb:
|
||||||
|
keyBytes := a.Cipher.(*AesCfb).KeyBytes
|
||||||
|
return "AES_" + strconv.FormatInt(int64(keyBytes*8), 10) + "_CFB"
|
||||||
|
case *ChaCha20:
|
||||||
|
if a.Cipher.(*ChaCha20).IVBytes == 8 {
|
||||||
|
return "CHACHA20"
|
||||||
|
}
|
||||||
|
return "CHACHA20_IETF"
|
||||||
|
case *AEADCipher:
|
||||||
|
switch reflect.ValueOf(a.Cipher.(*AEADCipher).AEADAuthCreator).Pointer() {
|
||||||
|
case reflect.ValueOf(createAesGcm).Pointer():
|
||||||
|
keyBytes := a.Cipher.(*AEADCipher).KeyBytes
|
||||||
|
return "AES_" + strconv.FormatInt(int64(keyBytes*8), 10) + "_GCM"
|
||||||
|
case reflect.ValueOf(createChacha20Poly1305).Pointer():
|
||||||
|
return "CHACHA20_POLY1305"
|
||||||
|
}
|
||||||
|
case *NoneCipher:
|
||||||
|
return "NONE"
|
||||||
|
}
|
||||||
|
|
||||||
|
return ""
|
||||||
|
}
|
||||||
|
|
||||||
func createAesGcm(key []byte) cipher.AEAD {
|
func createAesGcm(key []byte) cipher.AEAD {
|
||||||
block, err := aes.NewCipher(key)
|
block, err := aes.NewCipher(key)
|
||||||
common.Must(err)
|
common.Must(err)
|
||||||
|
|
|
@ -54,12 +54,9 @@ func (r *FullReader) Read(p []byte) (n int, err error) {
|
||||||
}
|
}
|
||||||
|
|
||||||
// ReadTCPSession reads a Shadowsocks TCP session from the given reader, returns its header and remaining parts.
|
// ReadTCPSession reads a Shadowsocks TCP session from the given reader, returns its header and remaining parts.
|
||||||
func ReadTCPSession(users []*protocol.MemoryUser, reader io.Reader) (*protocol.RequestHeader, buf.Reader, error) {
|
func ReadTCPSession(validator *Validator, reader io.Reader) (*protocol.RequestHeader, buf.Reader, error) {
|
||||||
user := users[0]
|
|
||||||
account := user.Account.(*MemoryAccount)
|
|
||||||
|
|
||||||
hashkdf := hmac.New(sha256.New, []byte("SSBSKDF"))
|
hashkdf := hmac.New(sha256.New, []byte("SSBSKDF"))
|
||||||
hashkdf.Write(account.Key)
|
|
||||||
|
|
||||||
behaviorSeed := crc32.ChecksumIEEE(hashkdf.Sum(nil))
|
behaviorSeed := crc32.ChecksumIEEE(hashkdf.Sum(nil))
|
||||||
|
|
||||||
|
@ -71,11 +68,21 @@ func ReadTCPSession(users []*protocol.MemoryUser, reader io.Reader) (*protocol.R
|
||||||
readSizeRemain := DrainSize
|
readSizeRemain := DrainSize
|
||||||
|
|
||||||
var r2 buf.Reader
|
var r2 buf.Reader
|
||||||
|
|
||||||
if len(users) > 1 {
|
|
||||||
buffer := buf.New()
|
buffer := buf.New()
|
||||||
defer buffer.Release()
|
defer buffer.Release()
|
||||||
|
|
||||||
|
var user *protocol.MemoryUser
|
||||||
|
var ivLen int32
|
||||||
|
var err error
|
||||||
|
|
||||||
|
count := validator.Count()
|
||||||
|
if count == 0 {
|
||||||
|
readSizeRemain -= int(buffer.Len())
|
||||||
|
DrainConnN(reader, readSizeRemain)
|
||||||
|
return nil, nil, newError("invalid user")
|
||||||
|
} else if count > 1 {
|
||||||
|
var aead cipher.AEAD
|
||||||
|
|
||||||
if _, err := buffer.ReadFullFrom(reader, 50); err != nil {
|
if _, err := buffer.ReadFullFrom(reader, 50); err != nil {
|
||||||
readSizeRemain -= int(buffer.Len())
|
readSizeRemain -= int(buffer.Len())
|
||||||
DrainConnN(reader, readSizeRemain)
|
DrainConnN(reader, readSizeRemain)
|
||||||
|
@ -83,22 +90,9 @@ func ReadTCPSession(users []*protocol.MemoryUser, reader io.Reader) (*protocol.R
|
||||||
}
|
}
|
||||||
|
|
||||||
bs := buffer.Bytes()
|
bs := buffer.Bytes()
|
||||||
|
user, aead, _, ivLen, err = validator.Get(bs, protocol.RequestCommandTCP)
|
||||||
|
|
||||||
var aeadCipher *AEADCipher
|
if user != nil {
|
||||||
var ivLen int32
|
|
||||||
subkey := make([]byte, 32)
|
|
||||||
length := make([]byte, 16)
|
|
||||||
var aead cipher.AEAD
|
|
||||||
var err error
|
|
||||||
for _, user = range users {
|
|
||||||
account = user.Account.(*MemoryAccount)
|
|
||||||
aeadCipher = account.Cipher.(*AEADCipher)
|
|
||||||
ivLen = aeadCipher.IVSize()
|
|
||||||
subkey = subkey[:aeadCipher.KeyBytes]
|
|
||||||
hkdfSHA1(account.Key, bs[:ivLen], subkey)
|
|
||||||
aead = aeadCipher.AEADAuthCreator(subkey)
|
|
||||||
_, err = aead.Open(length[:0], length[4:16], bs[ivLen:ivLen+18], nil)
|
|
||||||
if err == nil {
|
|
||||||
reader = &FullReader{reader, bs[ivLen:]}
|
reader = &FullReader{reader, bs[ivLen:]}
|
||||||
auth := &crypto.AEADAuthenticator{
|
auth := &crypto.AEADAuthenticator{
|
||||||
AEAD: aead,
|
AEAD: aead,
|
||||||
|
@ -107,21 +101,15 @@ func ReadTCPSession(users []*protocol.MemoryUser, reader io.Reader) (*protocol.R
|
||||||
r2 = crypto.NewAuthenticationReader(auth, &crypto.AEADChunkSizeParser{
|
r2 = crypto.NewAuthenticationReader(auth, &crypto.AEADChunkSizeParser{
|
||||||
Auth: auth,
|
Auth: auth,
|
||||||
}, reader, protocol.TransferTypeStream, nil)
|
}, reader, protocol.TransferTypeStream, nil)
|
||||||
break
|
} else {
|
||||||
}
|
|
||||||
}
|
|
||||||
if err != nil {
|
|
||||||
readSizeRemain -= int(buffer.Len())
|
readSizeRemain -= int(buffer.Len())
|
||||||
DrainConnN(reader, readSizeRemain)
|
DrainConnN(reader, readSizeRemain)
|
||||||
return nil, nil, newError("failed to match an user").Base(err)
|
return nil, nil, newError("failed to match an user").Base(err)
|
||||||
}
|
}
|
||||||
}
|
} else {
|
||||||
|
user, ivLen = validator.GetOnlyUser()
|
||||||
buffer := buf.New()
|
account := user.Account.(*MemoryAccount)
|
||||||
defer buffer.Release()
|
hashkdf.Write(account.Key)
|
||||||
|
|
||||||
if r2 == nil {
|
|
||||||
ivLen := account.Cipher.IVSize()
|
|
||||||
var iv []byte
|
var iv []byte
|
||||||
if ivLen > 0 {
|
if ivLen > 0 {
|
||||||
if _, err := buffer.ReadFullFrom(reader, ivLen); err != nil {
|
if _, err := buffer.ReadFullFrom(reader, ivLen); err != nil {
|
||||||
|
@ -261,40 +249,31 @@ func EncodeUDPPacket(request *protocol.RequestHeader, payload []byte) (*buf.Buff
|
||||||
return buffer, nil
|
return buffer, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func DecodeUDPPacket(users []*protocol.MemoryUser, payload *buf.Buffer) (*protocol.RequestHeader, *buf.Buffer, error) {
|
func DecodeUDPPacket(validator *Validator, payload *buf.Buffer) (*protocol.RequestHeader, *buf.Buffer, error) {
|
||||||
var user *protocol.MemoryUser
|
|
||||||
var account *MemoryAccount
|
|
||||||
var err error
|
|
||||||
|
|
||||||
if len(users) > 1 {
|
|
||||||
bs := payload.Bytes()
|
bs := payload.Bytes()
|
||||||
if len(bs) <= 32 {
|
if len(bs) <= 32 {
|
||||||
return nil, nil, newError("len(bs) <= 32")
|
return nil, nil, newError("len(bs) <= 32")
|
||||||
}
|
}
|
||||||
|
|
||||||
var aeadCipher *AEADCipher
|
var user *protocol.MemoryUser
|
||||||
var ivLen int32
|
var err error
|
||||||
subkey := make([]byte, 32)
|
|
||||||
data := make([]byte, 8192)
|
count := validator.Count()
|
||||||
var aead cipher.AEAD
|
if count == 0 {
|
||||||
|
return nil, nil, newError("invalid user")
|
||||||
|
} else if count > 1 {
|
||||||
var d []byte
|
var d []byte
|
||||||
for _, user = range users {
|
user, _, d, _, err = validator.Get(bs, protocol.RequestCommandUDP)
|
||||||
account = user.Account.(*MemoryAccount)
|
|
||||||
aeadCipher = account.Cipher.(*AEADCipher)
|
if user != nil {
|
||||||
ivLen = aeadCipher.IVSize()
|
|
||||||
subkey = subkey[:aeadCipher.KeyBytes]
|
|
||||||
hkdfSHA1(account.Key, bs[:ivLen], subkey)
|
|
||||||
aead = aeadCipher.AEADAuthCreator(subkey)
|
|
||||||
d, err = aead.Open(data[:0], data[8180:8192], bs[ivLen:], nil)
|
|
||||||
if err == nil {
|
|
||||||
payload.Clear()
|
payload.Clear()
|
||||||
payload.Write(d)
|
payload.Write(d)
|
||||||
break
|
} else {
|
||||||
}
|
return nil, nil, newError("failed to decrypt UDP payload").Base(err)
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
user = users[0]
|
user, _ = validator.GetOnlyUser()
|
||||||
account = user.Account.(*MemoryAccount)
|
account := user.Account.(*MemoryAccount)
|
||||||
|
|
||||||
var iv []byte
|
var iv []byte
|
||||||
if !account.Cipher.IsAEAD() && account.Cipher.IVSize() > 0 {
|
if !account.Cipher.IsAEAD() && account.Cipher.IVSize() > 0 {
|
||||||
|
@ -302,13 +281,10 @@ func DecodeUDPPacket(users []*protocol.MemoryUser, payload *buf.Buffer) (*protoc
|
||||||
iv = make([]byte, account.Cipher.IVSize())
|
iv = make([]byte, account.Cipher.IVSize())
|
||||||
copy(iv, payload.BytesTo(account.Cipher.IVSize()))
|
copy(iv, payload.BytesTo(account.Cipher.IVSize()))
|
||||||
}
|
}
|
||||||
|
if err = account.Cipher.DecodePacket(account.Key, payload); err != nil {
|
||||||
err = account.Cipher.DecodePacket(account.Key, payload)
|
|
||||||
}
|
|
||||||
|
|
||||||
if err != nil {
|
|
||||||
return nil, nil, newError("failed to decrypt UDP payload").Base(err)
|
return nil, nil, newError("failed to decrypt UDP payload").Base(err)
|
||||||
}
|
}
|
||||||
|
}
|
||||||
|
|
||||||
request := &protocol.RequestHeader{
|
request := &protocol.RequestHeader{
|
||||||
Version: Version,
|
Version: Version,
|
||||||
|
@ -341,7 +317,10 @@ func (v *UDPReader) ReadMultiBuffer() (buf.MultiBuffer, error) {
|
||||||
buffer.Release()
|
buffer.Release()
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
u, payload, err := DecodeUDPPacket([]*protocol.MemoryUser{v.User}, buffer)
|
validator := new(Validator)
|
||||||
|
validator.Add(v.User)
|
||||||
|
|
||||||
|
u, payload, err := DecodeUDPPacket(validator, buffer)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
buffer.Release()
|
buffer.Release()
|
||||||
return nil, err
|
return nil, err
|
||||||
|
|
|
@ -38,7 +38,9 @@ func TestUDPEncoding(t *testing.T) {
|
||||||
encodedData, err := EncodeUDPPacket(request, data.Bytes())
|
encodedData, err := EncodeUDPPacket(request, data.Bytes())
|
||||||
common.Must(err)
|
common.Must(err)
|
||||||
|
|
||||||
decodedRequest, decodedData, err := DecodeUDPPacket([]*protocol.MemoryUser{request.User}, encodedData)
|
validator := new(Validator)
|
||||||
|
validator.Add(request.User)
|
||||||
|
decodedRequest, decodedData, err := DecodeUDPPacket(validator, encodedData)
|
||||||
common.Must(err)
|
common.Must(err)
|
||||||
|
|
||||||
if r := cmp.Diff(decodedData.Bytes(), data.Bytes()); r != "" {
|
if r := cmp.Diff(decodedData.Bytes(), data.Bytes()); r != "" {
|
||||||
|
@ -117,7 +119,9 @@ func TestTCPRequest(t *testing.T) {
|
||||||
|
|
||||||
common.Must(writer.WriteMultiBuffer(buf.MultiBuffer{data}))
|
common.Must(writer.WriteMultiBuffer(buf.MultiBuffer{data}))
|
||||||
|
|
||||||
decodedRequest, reader, err := ReadTCPSession([]*protocol.MemoryUser{request.User}, cache)
|
validator := new(Validator)
|
||||||
|
validator.Add(request.User)
|
||||||
|
decodedRequest, reader, err := ReadTCPSession(validator, cache)
|
||||||
common.Must(err)
|
common.Must(err)
|
||||||
if r := cmp.Diff(decodedRequest, request, cmp.Comparer(func(a1, a2 protocol.Account) bool { return a1.Equals(a2) })); r != "" {
|
if r := cmp.Diff(decodedRequest, request, cmp.Comparer(func(a1, a2 protocol.Account) bool { return a1.Equals(a2) })); r != "" {
|
||||||
t.Error("request: ", r)
|
t.Error("request: ", r)
|
||||||
|
|
|
@ -22,33 +22,44 @@ import (
|
||||||
|
|
||||||
type Server struct {
|
type Server struct {
|
||||||
config *ServerConfig
|
config *ServerConfig
|
||||||
users []*protocol.MemoryUser
|
validator *Validator
|
||||||
policyManager policy.Manager
|
policyManager policy.Manager
|
||||||
cone bool
|
cone bool
|
||||||
}
|
}
|
||||||
|
|
||||||
// NewServer create a new Shadowsocks server.
|
// NewServer create a new Shadowsocks server.
|
||||||
func NewServer(ctx context.Context, config *ServerConfig) (*Server, error) {
|
func NewServer(ctx context.Context, config *ServerConfig) (*Server, error) {
|
||||||
if config.Users == nil {
|
validator := new(Validator)
|
||||||
return nil, newError("empty users")
|
for _, user := range config.Users {
|
||||||
|
u, err := user.ToMemoryUser()
|
||||||
|
if err != nil {
|
||||||
|
return nil, newError("failed to get shadowsocks user").Base(err).AtError()
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := validator.Add(u); err != nil {
|
||||||
|
return nil, newError("failed to add user").Base(err).AtError()
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
v := core.MustFromContext(ctx)
|
v := core.MustFromContext(ctx)
|
||||||
s := &Server{
|
s := &Server{
|
||||||
config: config,
|
config: config,
|
||||||
|
validator: validator,
|
||||||
policyManager: v.GetFeature(policy.ManagerType()).(policy.Manager),
|
policyManager: v.GetFeature(policy.ManagerType()).(policy.Manager),
|
||||||
cone: ctx.Value("cone").(bool),
|
cone: ctx.Value("cone").(bool),
|
||||||
}
|
}
|
||||||
|
|
||||||
for _, user := range config.Users {
|
return s, nil
|
||||||
u, err := user.ToMemoryUser()
|
|
||||||
if err != nil {
|
|
||||||
return nil, newError("failed to parse user account").Base(err)
|
|
||||||
}
|
|
||||||
s.users = append(s.users, u)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
return s, nil
|
// AddUser implements proxy.UserManager.AddUser().
|
||||||
|
func (s *Server) AddUser(ctx context.Context, u *protocol.MemoryUser) error {
|
||||||
|
return s.validator.Add(u)
|
||||||
|
}
|
||||||
|
|
||||||
|
// RemoveUser implements proxy.UserManager.RemoveUser().
|
||||||
|
func (s *Server) RemoveUser(ctx context.Context, e string) error {
|
||||||
|
return s.validator.Del(e)
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *Server) Network() []net.Network {
|
func (s *Server) Network() []net.Network {
|
||||||
|
@ -102,8 +113,9 @@ func (s *Server) handleUDPPayload(ctx context.Context, conn internet.Connection,
|
||||||
if inbound == nil {
|
if inbound == nil {
|
||||||
panic("no inbound metadata")
|
panic("no inbound metadata")
|
||||||
}
|
}
|
||||||
if len(s.users) == 1 {
|
|
||||||
inbound.User = s.users[0]
|
if s.validator.Count() == 1 {
|
||||||
|
inbound.User, _ = s.validator.GetOnlyUser()
|
||||||
}
|
}
|
||||||
|
|
||||||
var dest *net.Destination
|
var dest *net.Destination
|
||||||
|
@ -121,9 +133,11 @@ func (s *Server) handleUDPPayload(ctx context.Context, conn internet.Connection,
|
||||||
var err error
|
var err error
|
||||||
|
|
||||||
if inbound.User != nil {
|
if inbound.User != nil {
|
||||||
request, data, err = DecodeUDPPacket([]*protocol.MemoryUser{inbound.User}, payload)
|
validator := new(Validator)
|
||||||
|
validator.Add(inbound.User)
|
||||||
|
request, data, err = DecodeUDPPacket(validator, payload)
|
||||||
} else {
|
} else {
|
||||||
request, data, err = DecodeUDPPacket(s.users, payload)
|
request, data, err = DecodeUDPPacket(s.validator, payload)
|
||||||
if err == nil {
|
if err == nil {
|
||||||
inbound.User = request.User
|
inbound.User = request.User
|
||||||
}
|
}
|
||||||
|
@ -178,7 +192,7 @@ func (s *Server) handleConnection(ctx context.Context, conn internet.Connection,
|
||||||
}
|
}
|
||||||
|
|
||||||
bufferedReader := buf.BufferedReader{Reader: buf.NewReader(conn)}
|
bufferedReader := buf.BufferedReader{Reader: buf.NewReader(conn)}
|
||||||
request, bodyReader, err := ReadTCPSession(s.users, &bufferedReader)
|
request, bodyReader, err := ReadTCPSession(s.validator, &bufferedReader)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Record(&log.AccessMessage{
|
log.Record(&log.AccessMessage{
|
||||||
From: conn.RemoteAddr(),
|
From: conn.RemoteAddr(),
|
||||||
|
|
|
@ -0,0 +1,113 @@
|
||||||
|
package shadowsocks
|
||||||
|
|
||||||
|
import (
|
||||||
|
"crypto/cipher"
|
||||||
|
"strings"
|
||||||
|
"sync"
|
||||||
|
|
||||||
|
"github.com/xtls/xray-core/common/protocol"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Validator stores valid Shadowsocks users.
|
||||||
|
type Validator struct {
|
||||||
|
// Considering email's usage here, map + sync.Mutex/RWMutex may have better performance.
|
||||||
|
email sync.Map
|
||||||
|
users sync.Map
|
||||||
|
}
|
||||||
|
|
||||||
|
// Add a Shadowsocks user, Email must be empty or unique.
|
||||||
|
func (v *Validator) Add(u *protocol.MemoryUser) error {
|
||||||
|
account := u.Account.(*MemoryAccount)
|
||||||
|
|
||||||
|
if !account.Cipher.IsAEAD() && v.Count() > 0 {
|
||||||
|
return newError("The cipher do not support Single-port Multi-user")
|
||||||
|
}
|
||||||
|
|
||||||
|
if u.Email != "" {
|
||||||
|
_, loaded := v.email.LoadOrStore(strings.ToLower(u.Email), u)
|
||||||
|
if loaded {
|
||||||
|
return newError("User ", u.Email, " already exists.")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
v.users.Store(string(account.Key)+"&"+account.GetCipherName(), u)
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Del a Shadowsocks user with a non-empty Email.
|
||||||
|
func (v *Validator) Del(e string) error {
|
||||||
|
if e == "" {
|
||||||
|
return newError("Email must not be empty.")
|
||||||
|
}
|
||||||
|
le := strings.ToLower(e)
|
||||||
|
u, _ := v.email.Load(le)
|
||||||
|
if u == nil {
|
||||||
|
return newError("User ", e, " not found.")
|
||||||
|
}
|
||||||
|
account := u.(*protocol.MemoryUser).Account.(*MemoryAccount)
|
||||||
|
v.email.Delete(le)
|
||||||
|
v.users.Delete(string(account.Key) + "&" + account.GetCipherName())
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Count the number of Shadowsocks users
|
||||||
|
func (v *Validator) Count() int {
|
||||||
|
length := 0
|
||||||
|
v.users.Range(func(_, _ interface{}) bool {
|
||||||
|
length++
|
||||||
|
|
||||||
|
return true
|
||||||
|
})
|
||||||
|
return length
|
||||||
|
}
|
||||||
|
|
||||||
|
// Get a Shadowsocks user and the user's cipher.
|
||||||
|
func (v *Validator) Get(bs []byte, command protocol.RequestCommand) (u *protocol.MemoryUser, aead cipher.AEAD, ret []byte, ivLen int32, err error) {
|
||||||
|
var dataSize int
|
||||||
|
|
||||||
|
switch command {
|
||||||
|
case protocol.RequestCommandTCP:
|
||||||
|
dataSize = 16
|
||||||
|
case protocol.RequestCommandUDP:
|
||||||
|
dataSize = 8192
|
||||||
|
}
|
||||||
|
|
||||||
|
var aeadCipher *AEADCipher
|
||||||
|
subkey := make([]byte, 32)
|
||||||
|
data := make([]byte, dataSize)
|
||||||
|
|
||||||
|
v.users.Range(func(key, user interface{}) bool {
|
||||||
|
account := user.(*protocol.MemoryUser).Account.(*MemoryAccount)
|
||||||
|
aeadCipher = account.Cipher.(*AEADCipher)
|
||||||
|
ivLen = aeadCipher.IVSize()
|
||||||
|
subkey = subkey[:aeadCipher.KeyBytes]
|
||||||
|
hkdfSHA1(account.Key, bs[:ivLen], subkey)
|
||||||
|
aead = aeadCipher.AEADAuthCreator(subkey)
|
||||||
|
|
||||||
|
switch command {
|
||||||
|
case protocol.RequestCommandTCP:
|
||||||
|
ret, err = aead.Open(data[:0], data[4:16], bs[ivLen:ivLen+18], nil)
|
||||||
|
case protocol.RequestCommandUDP:
|
||||||
|
ret, err = aead.Open(data[:0], data[8180:8192], bs[ivLen:], nil)
|
||||||
|
}
|
||||||
|
|
||||||
|
if err == nil {
|
||||||
|
u = user.(*protocol.MemoryUser)
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
return true
|
||||||
|
})
|
||||||
|
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
// Get the only user without authentication
|
||||||
|
func (v *Validator) GetOnlyUser() (u *protocol.MemoryUser, ivLen int32) {
|
||||||
|
v.users.Range(func(_, user interface{}) bool {
|
||||||
|
u = user.(*protocol.MemoryUser)
|
||||||
|
return false
|
||||||
|
})
|
||||||
|
ivLen = u.Account.(*MemoryAccount).Cipher.IVSize()
|
||||||
|
|
||||||
|
return
|
||||||
|
}
|
Loading…
Reference in New Issue