2015-10-08 23:11:07 +08:00
|
|
|
|
package tscipher
|
2015-10-08 20:40:36 +08:00
|
|
|
|
|
|
|
|
|
|
import (
|
2015-10-22 15:07:51 +08:00
|
|
|
|
"bytes"
|
2015-11-18 20:24:39 +08:00
|
|
|
|
"fmt"
|
2016-01-10 13:44:02 +08:00
|
|
|
|
"github.com/TransX/cache"
|
2015-10-22 15:07:51 +08:00
|
|
|
|
"github.com/TransX/log"
|
|
|
|
|
|
"github.com/TransX/utils"
|
2015-10-26 23:07:08 +08:00
|
|
|
|
"io"
|
2015-10-08 20:40:36 +08:00
|
|
|
|
"net"
|
2015-10-31 22:51:29 +08:00
|
|
|
|
"strconv"
|
|
|
|
|
|
"strings"
|
2015-10-08 20:40:36 +08:00
|
|
|
|
)
|
|
|
|
|
|
|
2015-10-22 15:07:51 +08:00
|
|
|
|
var StartMark = []byte("#2v!") //should be constant
|
|
|
|
|
|
var EndMark = []byte("_=1z") //should be constant
|
|
|
|
|
|
|
2015-10-26 23:07:08 +08:00
|
|
|
|
type LackDataError struct {
|
|
|
|
|
|
e string
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
type NotPackageError struct {
|
|
|
|
|
|
e string
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
func (this *LackDataError) Error() string {
|
|
|
|
|
|
return this.e
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
func (this *NotPackageError) Error() string {
|
|
|
|
|
|
return this.e
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2015-10-08 20:40:36 +08:00
|
|
|
|
type Cipher interface {
|
|
|
|
|
|
Decrypt(data []byte) (decrypted []byte, err error)
|
|
|
|
|
|
Encrypt(data []byte) (encryped []byte, err error)
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
type Carrier struct {
|
2015-11-23 13:50:34 +08:00
|
|
|
|
Conn net.Conn
|
|
|
|
|
|
Cipher Cipher
|
|
|
|
|
|
// Cache []byte
|
2016-01-10 13:44:02 +08:00
|
|
|
|
Cache *cache.UnblockingQueueCache
|
|
|
|
|
|
Msg *cache.BlockingQueueCache
|
2015-10-24 20:25:30 +08:00
|
|
|
|
AttachedTunnelID string
|
2015-10-31 22:51:29 +08:00
|
|
|
|
receiveBuff []byte
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2016-01-10 13:44:02 +08:00
|
|
|
|
func NewCarrier(conn net.Conn, cipher Cipher, queCache *cache.UnblockingQueueCache, msg *cache.BlockingQueueCache, id string) *Carrier {
|
2015-10-31 22:51:29 +08:00
|
|
|
|
t := new(Carrier)
|
|
|
|
|
|
t.Conn = conn
|
|
|
|
|
|
t.Cipher = cipher
|
2015-11-23 13:50:34 +08:00
|
|
|
|
t.Cache = queCache
|
2016-01-10 13:44:02 +08:00
|
|
|
|
t.Msg = msg
|
2015-10-31 22:51:29 +08:00
|
|
|
|
t.AttachedTunnelID = id
|
2015-11-23 13:50:34 +08:00
|
|
|
|
t.receiveBuff = make([]byte, 0, 1024*4)
|
2015-10-31 22:51:29 +08:00
|
|
|
|
return t
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
func (this *Carrier) GetReceiveBuff() []byte {
|
2015-11-02 17:15:56 +08:00
|
|
|
|
buff := this.receiveBuff
|
2015-11-19 21:50:06 +08:00
|
|
|
|
_b := make([]byte, len(buff), cap(buff)) //必须这样写,没错。
|
2015-11-02 17:15:56 +08:00
|
|
|
|
copy(_b, buff)
|
|
|
|
|
|
return _b
|
2015-10-31 22:51:29 +08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
func (this *Carrier) SetReceiveBuff(buff []byte) {
|
|
|
|
|
|
this.receiveBuff = buff
|
2015-10-08 20:40:36 +08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
func NewCipher(cipherName string) (cipher Cipher) {
|
|
|
|
|
|
if cipherName == "default" {
|
|
|
|
|
|
return NewChaCha()
|
|
|
|
|
|
}
|
2015-10-15 21:30:52 +08:00
|
|
|
|
if cipherName == "AES" {
|
|
|
|
|
|
return NewAES()
|
|
|
|
|
|
}
|
|
|
|
|
|
if cipherName == "XOR" {
|
2015-10-18 17:44:56 +08:00
|
|
|
|
return NewXOR([]byte("fasdfasdf!3297!jfsl12*&!HHHFds"))
|
2015-10-15 21:30:52 +08:00
|
|
|
|
}
|
2015-10-08 20:40:36 +08:00
|
|
|
|
return nil //TODO:临时这样处理
|
|
|
|
|
|
}
|
2015-10-08 23:11:07 +08:00
|
|
|
|
|
2015-10-22 15:07:51 +08:00
|
|
|
|
func WrapPackage(data []byte) []byte { //把要加密传输的数据打包成一定的格式,避免发送了100自己,只收到90字节的问题。
|
|
|
|
|
|
sizeOfData := len(data)
|
|
|
|
|
|
binSize := utils.Int2binary(sizeOfData, 10)
|
|
|
|
|
|
header := append(append(StartMark, binSize...), EndMark...)
|
|
|
|
|
|
//加密
|
2015-11-18 20:24:39 +08:00
|
|
|
|
key := []byte("#2GD+.>dt`Qdp")
|
2015-10-26 23:07:08 +08:00
|
|
|
|
key = key
|
2015-10-22 15:07:51 +08:00
|
|
|
|
cipheredHeader := make([]byte, len(header))
|
|
|
|
|
|
for i, v := range header {
|
2015-11-01 23:03:23 +08:00
|
|
|
|
cipheredHeader[i] = v ^ key[i%len(key)]
|
2015-10-22 15:07:51 +08:00
|
|
|
|
}
|
|
|
|
|
|
return append(cipheredHeader, data...)
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2015-10-26 23:07:08 +08:00
|
|
|
|
func UnwrapPackage(pacakge []byte) (data []byte, rest []byte, err error) {
|
2015-10-22 15:07:51 +08:00
|
|
|
|
//前14个字节是header
|
|
|
|
|
|
cipheredHeader := pacakge[:18]
|
|
|
|
|
|
header := make([]byte, len(cipheredHeader))
|
2015-11-18 20:24:39 +08:00
|
|
|
|
key := []byte("#2GD+.>dt`Qdp")
|
2015-10-26 23:07:08 +08:00
|
|
|
|
key = key
|
2015-10-22 15:07:51 +08:00
|
|
|
|
for i, v := range cipheredHeader {
|
2015-11-01 23:03:23 +08:00
|
|
|
|
header[i] = v ^ key[i%len(key)]
|
2015-10-22 15:07:51 +08:00
|
|
|
|
}
|
|
|
|
|
|
start := header[:4]
|
|
|
|
|
|
end := header[14:]
|
|
|
|
|
|
binSize := header[4:14]
|
2015-10-26 23:07:08 +08:00
|
|
|
|
packageSize := 0
|
2015-10-22 15:07:51 +08:00
|
|
|
|
if bytes.Compare(start, StartMark) == 0 && bytes.Compare(end, EndMark) == 0 {
|
|
|
|
|
|
packageSize = utils.Binary2Int(binSize)
|
2015-10-26 23:07:08 +08:00
|
|
|
|
if len(pacakge[18:]) < packageSize {
|
|
|
|
|
|
packageSize = 0
|
|
|
|
|
|
data = nil
|
|
|
|
|
|
rest = nil
|
|
|
|
|
|
err = &LackDataError{"LackDataError"}
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
data = pacakge[18 : 18+packageSize]
|
|
|
|
|
|
rest = pacakge[18+len(data):]
|
2015-10-22 15:07:51 +08:00
|
|
|
|
err = nil
|
|
|
|
|
|
} else {
|
|
|
|
|
|
packageSize = 0
|
2015-10-26 23:07:08 +08:00
|
|
|
|
data = nil
|
|
|
|
|
|
rest = nil
|
2015-10-31 22:51:29 +08:00
|
|
|
|
if strings.Contains(string(pacakge), "#2v!") && strings.Contains(string(pacakge), "_=1z") {
|
|
|
|
|
|
a := strings.Index(string(pacakge), "#2v!")
|
|
|
|
|
|
b := strings.Index(string(pacakge), "_=1z")
|
|
|
|
|
|
err = &NotPackageError{"NotPackageError(contains)" + "start:" + string(start) + " end:" + string(end) + "pacakge " + strconv.Itoa(len(pacakge)) + "start" + strconv.Itoa(a) + "end" + strconv.Itoa(b)}
|
|
|
|
|
|
} else {
|
2015-11-18 20:24:39 +08:00
|
|
|
|
err = &NotPackageError{fmt.Sprintf("NotPackageError start: %s end: %s whole %x", string(start), string(end), header)}
|
2015-10-31 22:51:29 +08:00
|
|
|
|
}
|
2015-10-22 15:07:51 +08:00
|
|
|
|
}
|
|
|
|
|
|
return
|
|
|
|
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2015-11-23 13:50:34 +08:00
|
|
|
|
func SendData(carrier *Carrier) (n int, err error) {
|
2016-01-10 13:44:02 +08:00
|
|
|
|
msg, nByte := carrier.Msg.Get()
|
|
|
|
|
|
if len(msg) < nByte {
|
2015-10-24 16:07:23 +08:00
|
|
|
|
log.Panic("Cache of send is too small")
|
|
|
|
|
|
}
|
2015-10-18 17:44:56 +08:00
|
|
|
|
if carrier.Cipher == nil {
|
2016-01-10 13:44:02 +08:00
|
|
|
|
n, err = carrier.Conn.Write(msg[:nByte])
|
2015-10-18 17:44:56 +08:00
|
|
|
|
return
|
|
|
|
|
|
}
|
2016-01-10 13:44:02 +08:00
|
|
|
|
encrypedByte, err := carrier.Cipher.Encrypt(msg[:nByte])
|
2015-10-15 21:30:52 +08:00
|
|
|
|
if err != nil {
|
|
|
|
|
|
n = 0
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
2015-10-22 15:07:51 +08:00
|
|
|
|
//打包
|
|
|
|
|
|
wraped := WrapPackage(encrypedByte[:nByte])
|
|
|
|
|
|
n, err = carrier.Conn.Write(wraped)
|
2016-01-10 13:44:02 +08:00
|
|
|
|
carrier.Cache.Put(make([]byte, 1024*4), 1024*4)
|
2015-10-08 23:11:07 +08:00
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2015-10-26 23:07:08 +08:00
|
|
|
|
func RowReceiveData(carrier *Carrier) (n int, err error) {
|
2016-01-10 13:44:02 +08:00
|
|
|
|
cache, _ := carrier.Cache.Get()
|
2015-11-23 13:50:34 +08:00
|
|
|
|
n, err = carrier.Conn.Read(cache)
|
2015-10-15 21:30:52 +08:00
|
|
|
|
if err != nil {
|
|
|
|
|
|
n = 0
|
2015-10-18 17:44:56 +08:00
|
|
|
|
}
|
2016-01-10 13:44:02 +08:00
|
|
|
|
carrier.Msg.Put(cache, n)
|
2015-10-26 23:07:08 +08:00
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
func ReceiveData(carrier *Carrier) (n int, err error) {
|
2015-11-18 20:24:39 +08:00
|
|
|
|
// defer func() {
|
|
|
|
|
|
// if r := recover(); r != nil {
|
|
|
|
|
|
// log.Error("ReceiveData err %s", r)
|
|
|
|
|
|
// }
|
|
|
|
|
|
// }()
|
2016-01-10 13:44:02 +08:00
|
|
|
|
// log.Debug("id %s wrapedPackage := carrier.GetReceiveBuff()", carrier.AttachedTunnelID)
|
2015-10-31 22:51:29 +08:00
|
|
|
|
wrapedPackage := carrier.GetReceiveBuff() //make([]byte, 0, cap(carrier.Cache))
|
2015-10-26 23:07:08 +08:00
|
|
|
|
var packageData []byte
|
|
|
|
|
|
var _rest []byte
|
2016-01-10 13:44:02 +08:00
|
|
|
|
cache, _ := carrier.Cache.Get()
|
2015-10-26 23:07:08 +08:00
|
|
|
|
for {
|
|
|
|
|
|
//首先检查这个是不是完整的包,是就返回好了,免得被阻塞
|
2015-11-05 15:20:05 +08:00
|
|
|
|
data, rest, err := UnwrapPackage(wrapedPackage)
|
|
|
|
|
|
packageData = data
|
|
|
|
|
|
_rest = rest
|
2015-11-18 20:24:39 +08:00
|
|
|
|
if err, ok := err.(*NotPackageError); len(wrapedPackage) >= 18 && ok {
|
|
|
|
|
|
log.Debug("return NotPackageError %s", carrier.AttachedTunnelID)
|
2015-11-05 15:20:05 +08:00
|
|
|
|
return 0, err
|
|
|
|
|
|
}
|
|
|
|
|
|
if err == nil {
|
|
|
|
|
|
//够一个完整的包
|
|
|
|
|
|
capBuff := cap(carrier.GetReceiveBuff())
|
|
|
|
|
|
_buff := make([]byte, 0, capBuff) //释放
|
|
|
|
|
|
_buff = append(_buff, _rest...)
|
|
|
|
|
|
carrier.SetReceiveBuff(_buff)
|
|
|
|
|
|
break
|
|
|
|
|
|
}
|
|
|
|
|
|
//如果读到的数据不够一个完整的包
|
|
|
|
|
|
if len(wrapedPackage) > 0 {
|
2015-11-23 13:50:34 +08:00
|
|
|
|
n, err = carrier.Conn.Read(cache)
|
2015-10-22 15:07:51 +08:00
|
|
|
|
if err != nil {
|
2015-11-05 15:20:05 +08:00
|
|
|
|
log.Error("ERROR %s", err)
|
2015-10-22 15:07:51 +08:00
|
|
|
|
}
|
2015-11-05 15:20:05 +08:00
|
|
|
|
} else {
|
2015-11-23 13:50:34 +08:00
|
|
|
|
n, err = io.ReadAtLeast(carrier.Conn, cache, 18)
|
2015-11-05 15:20:05 +08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
|
|
n = 0
|
|
|
|
|
|
return n, err
|
2015-10-22 15:07:51 +08:00
|
|
|
|
}
|
2015-11-23 13:50:34 +08:00
|
|
|
|
wrapedPackage = append(wrapedPackage, cache[:n]...)
|
2015-10-26 23:07:08 +08:00
|
|
|
|
}
|
|
|
|
|
|
decrypted, err := carrier.Cipher.Decrypt(packageData)
|
2015-10-15 21:30:52 +08:00
|
|
|
|
if err != nil {
|
|
|
|
|
|
n = 0
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
2015-10-26 23:07:08 +08:00
|
|
|
|
n = len(decrypted)
|
2016-01-10 13:44:02 +08:00
|
|
|
|
carrier.Msg.Put(decrypted, n)
|
2015-10-08 23:11:07 +08:00
|
|
|
|
return
|
|
|
|
|
|
}
|