package tscipher import ( "bytes" "fmt" "github.com/TransX/cache" "github.com/TransX/log" "github.com/TransX/utils" "io" "net" "strconv" "strings" ) var StartMark = []byte("#2v!") //should be constant var EndMark = []byte("_=1z") //should be constant type LackDataError struct { e string } type NotPackageError struct { e string } func (this *LackDataError) Error() string { return this.e } func (this *NotPackageError) Error() string { return this.e } type Cipher interface { Decrypt(data []byte) (decrypted []byte, err error) Encrypt(data []byte) (encryped []byte, err error) } type Carrier struct { Conn net.Conn Cipher Cipher Cache *cache.BlockingQueueCache Msg *cache.BlockingQueueCache AttachedTunnelID string receiveBuff []byte } func NewCarrier(conn net.Conn, cipher Cipher, queCache *cache.BlockingQueueCache, msg *cache.BlockingQueueCache, id string) *Carrier { t := new(Carrier) t.Conn = conn t.Cipher = cipher t.Cache = queCache t.Msg = msg t.AttachedTunnelID = id t.receiveBuff = make([]byte, 0, 1024*4) return t } func (this *Carrier) GetReceiveBuff() []byte { buff := this.receiveBuff _b := make([]byte, len(buff), cap(buff)) //必须这样写,没错。 copy(_b, buff) return _b } func (this *Carrier) SetReceiveBuff(buff []byte) { this.receiveBuff = buff } func NewCipher(cipherName string) (cipher Cipher) { if cipherName == "default" { return NewChaCha() } if cipherName == "AES" { return NewAES() } if cipherName == "XOR" { return NewXOR([]byte("fasdfasdf!3297!jfsl12*&!HHHFds")) } return nil //TODO:临时这样处理 } func WrapPackage(data []byte) []byte { //把要加密传输的数据打包成一定的格式,避免发送了100自己,只收到90字节的问题。 sizeOfData := len(data) binSize := utils.Int2binary(sizeOfData, 10) header := append(append(StartMark, binSize...), EndMark...) //加密 key := []byte("#2GD+.>dt`Qdp") key = key cipheredHeader := make([]byte, len(header)) for i, v := range header { cipheredHeader[i] = v ^ key[i%len(key)] } return append(cipheredHeader, data...) } func UnwrapPackage(pacakge []byte) (data []byte, rest []byte, err error) { //前14个字节是header cipheredHeader := pacakge[:18] header := make([]byte, len(cipheredHeader)) key := []byte("#2GD+.>dt`Qdp") key = key for i, v := range cipheredHeader { header[i] = v ^ key[i%len(key)] } start := header[:4] end := header[14:] binSize := header[4:14] packageSize := 0 if bytes.Compare(start, StartMark) == 0 && bytes.Compare(end, EndMark) == 0 { packageSize = utils.Binary2Int(binSize) if len(pacakge[18:]) < packageSize { packageSize = 0 data = nil rest = nil err = &LackDataError{"LackDataError"} return } data = pacakge[18 : 18+packageSize] rest = pacakge[18+len(data):] err = nil } else { packageSize = 0 data = nil rest = nil if strings.Contains(string(pacakge), "#2v!") && strings.Contains(string(pacakge), "_=1z") { a := strings.Index(string(pacakge), "#2v!") b := strings.Index(string(pacakge), "_=1z") err = &NotPackageError{"NotPackageError(contains)" + "start:" + string(start) + " end:" + string(end) + "pacakge " + strconv.Itoa(len(pacakge)) + "start" + strconv.Itoa(a) + "end" + strconv.Itoa(b)} } else { err = &NotPackageError{fmt.Sprintf("NotPackageError start: %s end: %s whole %x", string(start), string(end), header)} } } return } func SendData(carrier *Carrier) (n int, err error) { msg, nByte := carrier.Msg.Get() if len(msg) < nByte { log.Panic("Cache of send is too small") } if carrier.Cipher == nil { n, err = carrier.Conn.Write(msg[:nByte]) carrier.Cache.Put(make([]byte, 1024*4), 1024*4) return } encrypedByte, err := carrier.Cipher.Encrypt(msg[:nByte]) if err != nil { n = 0 return } //打包 wraped := WrapPackage(encrypedByte[:nByte]) n, err = carrier.Conn.Write(wraped) carrier.Cache.Put(make([]byte, 1024*4), 1024*4) return } func RowReceiveData(carrier *Carrier) (n int, err error) { cache, _ := carrier.Cache.Get() n, err = carrier.Conn.Read(cache) if err != nil { n = 0 } carrier.Msg.Put(cache, n) return } func ReceiveData(carrier *Carrier) (n int, err error) { wrapedPackage := carrier.GetReceiveBuff() //make([]byte, 0, cap(carrier.Cache)) var packageData []byte var _rest []byte cache, _ := carrier.Cache.Get() for { //首先检查这个是不是完整的包,是就返回好了,免得被阻塞 data, rest, err := UnwrapPackage(wrapedPackage) packageData = data _rest = rest if err, ok := err.(*NotPackageError); len(wrapedPackage) >= 18 && ok { log.Debug("return NotPackageError %s", carrier.AttachedTunnelID) return 0, err } if err == nil { //够一个完整的包 capBuff := cap(carrier.GetReceiveBuff()) _buff := make([]byte, 0, capBuff) //释放 _buff = append(_buff, _rest...) carrier.SetReceiveBuff(_buff) break } //如果读到的数据不够一个完整的包 if len(wrapedPackage) > 0 { n, err = carrier.Conn.Read(cache) if err != nil { log.Error("ERROR %s", err) } } else { n, err = io.ReadAtLeast(carrier.Conn, cache, 18) } if err != nil { n = 0 return n, err } wrapedPackage = append(wrapedPackage, cache[:n]...) } decrypted, err := carrier.Cipher.Decrypt(packageData) if err != nil { n = 0 return } n = len(decrypted) carrier.Msg.Put(decrypted, n) return }