transx/tscipher/cipher.go

233 lines
5.9 KiB
Go
Raw Normal View History

package tscipher
import (
"bytes"
"fmt"
2016-01-10 13:44:02 +08:00
"github.com/TransX/cache"
"github.com/TransX/log"
"github.com/TransX/utils"
"io"
"net"
"strconv"
"strings"
)
var StartMark = []byte("#2v!") //should be constant
var EndMark = []byte("_=1z") //should be constant
type LackDataError struct {
e string
}
type NotPackageError struct {
e string
}
func (this *LackDataError) Error() string {
return this.e
}
func (this *NotPackageError) Error() string {
return this.e
}
type Cipher interface {
Decrypt(data []byte) (decrypted []byte, err error)
Encrypt(data []byte) (encryped []byte, err error)
}
type Carrier struct {
Conn net.Conn
Cipher Cipher
2016-01-10 13:44:02 +08:00
Cache *cache.UnblockingQueueCache
Msg *cache.BlockingQueueCache
AttachedTunnelID string
receiveBuff []byte
}
2016-01-10 13:44:02 +08:00
func NewCarrier(conn net.Conn, cipher Cipher, queCache *cache.UnblockingQueueCache, msg *cache.BlockingQueueCache, id string) *Carrier {
t := new(Carrier)
t.Conn = conn
t.Cipher = cipher
2015-11-23 13:50:34 +08:00
t.Cache = queCache
2016-01-10 13:44:02 +08:00
t.Msg = msg
t.AttachedTunnelID = id
2015-11-23 13:50:34 +08:00
t.receiveBuff = make([]byte, 0, 1024*4)
return t
}
func (this *Carrier) GetReceiveBuff() []byte {
buff := this.receiveBuff
2015-11-19 21:50:06 +08:00
_b := make([]byte, len(buff), cap(buff)) //必须这样写,没错。
copy(_b, buff)
return _b
}
func (this *Carrier) SetReceiveBuff(buff []byte) {
this.receiveBuff = buff
}
func NewCipher(cipherName string) (cipher Cipher) {
if cipherName == "default" {
return NewChaCha()
}
if cipherName == "AES" {
return NewAES()
}
if cipherName == "XOR" {
return NewXOR([]byte("fasdfasdf!3297!jfsl12*&!HHHFds"))
}
return nil //TODO:临时这样处理
}
func WrapPackage(data []byte) []byte { //把要加密传输的数据打包成一定的格式避免发送了100自己只收到90字节的问题。
sizeOfData := len(data)
binSize := utils.Int2binary(sizeOfData, 10)
header := append(append(StartMark, binSize...), EndMark...)
//加密
key := []byte("#2GD+.>dt`Qdp")
key = key
cipheredHeader := make([]byte, len(header))
for i, v := range header {
cipheredHeader[i] = v ^ key[i%len(key)]
}
return append(cipheredHeader, data...)
}
func UnwrapPackage(pacakge []byte) (data []byte, rest []byte, err error) {
//前14个字节是header
cipheredHeader := pacakge[:18]
header := make([]byte, len(cipheredHeader))
key := []byte("#2GD+.>dt`Qdp")
key = key
for i, v := range cipheredHeader {
header[i] = v ^ key[i%len(key)]
}
start := header[:4]
end := header[14:]
binSize := header[4:14]
packageSize := 0
if bytes.Compare(start, StartMark) == 0 && bytes.Compare(end, EndMark) == 0 {
packageSize = utils.Binary2Int(binSize)
if len(pacakge[18:]) < packageSize {
packageSize = 0
data = nil
rest = nil
err = &LackDataError{"LackDataError"}
return
}
data = pacakge[18 : 18+packageSize]
rest = pacakge[18+len(data):]
err = nil
} else {
packageSize = 0
data = nil
rest = nil
if strings.Contains(string(pacakge), "#2v!") && strings.Contains(string(pacakge), "_=1z") {
a := strings.Index(string(pacakge), "#2v!")
b := strings.Index(string(pacakge), "_=1z")
err = &NotPackageError{"NotPackageError(contains)" + "start:" + string(start) + " end:" + string(end) + "pacakge " + strconv.Itoa(len(pacakge)) + "start" + strconv.Itoa(a) + "end" + strconv.Itoa(b)}
} else {
err = &NotPackageError{fmt.Sprintf("NotPackageError start: %s end: %s whole %x", string(start), string(end), header)}
}
}
return
}
2015-11-23 13:50:34 +08:00
func SendData(carrier *Carrier) (n int, err error) {
2016-01-10 13:44:02 +08:00
msg, nByte := carrier.Msg.Get()
id := carrier.AttachedTunnelID
log.Info("id %s Get Msg", id)
2016-01-10 13:44:02 +08:00
if len(msg) < nByte {
log.Panic("Cache of send is too small")
}
if carrier.Cipher == nil {
2016-01-10 13:44:02 +08:00
n, err = carrier.Conn.Write(msg[:nByte])
carrier.Cache.Put(make([]byte, 1024*4), 1024*4)
return
}
log.Info("id %s AAAAAAAaaa", id)
2016-01-10 13:44:02 +08:00
encrypedByte, err := carrier.Cipher.Encrypt(msg[:nByte])
if err != nil {
n = 0
return
}
//打包
wraped := WrapPackage(encrypedByte[:nByte])
n, err = carrier.Conn.Write(wraped)
2016-01-10 13:44:02 +08:00
carrier.Cache.Put(make([]byte, 1024*4), 1024*4)
log.Info("id %s give back cache", id)
return
}
func RowReceiveData(carrier *Carrier) (n int, err error) {
2016-01-10 13:44:02 +08:00
cache, _ := carrier.Cache.Get()
log.Info("id %s get Cache", carrier.AttachedTunnelID)
2015-11-23 13:50:34 +08:00
n, err = carrier.Conn.Read(cache)
if err != nil {
n = 0
}
2016-01-10 13:44:02 +08:00
carrier.Msg.Put(cache, n)
id := carrier.AttachedTunnelID
log.Info("id %s put Msg", id)
return
}
func ReceiveData(carrier *Carrier) (n int, err error) {
// defer func() {
// if r := recover(); r != nil {
// log.Error("ReceiveData err %s", r)
// }
// }()
2016-01-10 13:44:02 +08:00
// log.Debug("id %s wrapedPackage := carrier.GetReceiveBuff()", carrier.AttachedTunnelID)
wrapedPackage := carrier.GetReceiveBuff() //make([]byte, 0, cap(carrier.Cache))
var packageData []byte
var _rest []byte
2016-01-10 13:44:02 +08:00
cache, _ := carrier.Cache.Get()
log.Info("id %s get Cache", carrier.AttachedTunnelID)
for {
//首先检查这个是不是完整的包,是就返回好了,免得被阻塞
data, rest, err := UnwrapPackage(wrapedPackage)
packageData = data
_rest = rest
if err, ok := err.(*NotPackageError); len(wrapedPackage) >= 18 && ok {
log.Debug("return NotPackageError %s", carrier.AttachedTunnelID)
return 0, err
}
if err == nil {
//够一个完整的包
capBuff := cap(carrier.GetReceiveBuff())
_buff := make([]byte, 0, capBuff) //释放
_buff = append(_buff, _rest...)
carrier.SetReceiveBuff(_buff)
break
}
//如果读到的数据不够一个完整的包
if len(wrapedPackage) > 0 {
2015-11-23 13:50:34 +08:00
n, err = carrier.Conn.Read(cache)
if err != nil {
log.Error("ERROR %s", err)
}
} else {
2015-11-23 13:50:34 +08:00
n, err = io.ReadAtLeast(carrier.Conn, cache, 18)
}
if err != nil {
n = 0
return n, err
}
2015-11-23 13:50:34 +08:00
wrapedPackage = append(wrapedPackage, cache[:n]...)
}
decrypted, err := carrier.Cipher.Decrypt(packageData)
if err != nil {
n = 0
return
}
n = len(decrypted)
2016-01-10 13:44:02 +08:00
carrier.Msg.Put(decrypted, n)
id := carrier.AttachedTunnelID
log.Info("id %s put Msg", id)
return
}