Cloak/internal/util/util.go

119 lines
2.9 KiB
Go
Raw Normal View History

2018-10-07 17:09:45 +00:00
package util
import (
2018-10-20 20:41:01 +00:00
"crypto/aes"
"crypto/cipher"
2018-10-07 17:09:45 +00:00
"encoding/binary"
"errors"
"io"
"net"
2018-10-16 20:13:19 +00:00
"strconv"
2019-08-19 22:23:41 +00:00
"time"
2018-10-07 17:09:45 +00:00
)
2019-06-09 14:03:28 +00:00
func AESGCMEncrypt(nonce []byte, key []byte, plaintext []byte) ([]byte, error) {
block, err := aes.NewCipher(key)
if err != nil {
return nil, err
}
aesgcm, err := cipher.NewGCM(block)
if err != nil {
return nil, err
}
return aesgcm.Seal(nil, nonce, plaintext, nil), nil
2018-10-20 20:41:01 +00:00
}
2019-06-09 14:03:28 +00:00
func AESGCMDecrypt(nonce []byte, key []byte, ciphertext []byte) ([]byte, error) {
block, err := aes.NewCipher(key)
if err != nil {
return nil, err
}
aesgcm, err := cipher.NewGCM(block)
if err != nil {
return nil, err
}
plain, err := aesgcm.Open(nil, nonce, ciphertext, nil)
if err != nil {
return nil, err
}
return plain, nil
2018-10-20 20:41:01 +00:00
}
2018-11-07 21:16:13 +00:00
// ReadTLS reads TLS data according to its record layer
func ReadTLS(conn net.Conn, buffer []byte) (n int, err error) {
2018-10-07 17:09:45 +00:00
// TCP is a stream. Multiple TLS messages can arrive at the same time,
// a single message can also be segmented due to MTU of the IP layer.
// This function guareentees a single TLS message to be read and everything
// else is left in the buffer.
i, err := io.ReadFull(conn, buffer[:5])
if err != nil {
return
}
2019-01-13 22:22:55 +00:00
dataLength := int(binary.BigEndian.Uint16(buffer[3:5]))
2018-10-16 20:13:19 +00:00
if dataLength > len(buffer) {
err = errors.New("Reading TLS message: message size greater than buffer. message size: " + strconv.Itoa(dataLength))
return
}
2018-10-07 17:09:45 +00:00
left := dataLength
readPtr := 5
2019-08-20 21:43:04 +00:00
// TODO: Deadline here?
2018-10-07 17:09:45 +00:00
for left != 0 {
// If left > buffer size (i.e. our message got segmented), the entire MTU is read
// if left = buffer size, the entire buffer is all there left to read
// if left < buffer size (i.e. multiple messages came together),
// only the message we want is read
2019-08-20 21:43:04 +00:00
// TODO: Why ReadFull here? Shouldn't it be just normal read since we adjust left and readPtr according to read amount?
2018-10-07 17:09:45 +00:00
i, err = io.ReadFull(conn, buffer[readPtr:readPtr+left])
if err != nil {
return
}
left -= i
readPtr += i
}
n = 5 + dataLength
return
}
// AddRecordLayer adds record layer to data
func AddRecordLayer(input []byte, typ []byte, ver []byte) []byte {
length := make([]byte, 2)
binary.BigEndian.PutUint16(length, uint16(len(input)))
ret := make([]byte, 5+len(input))
copy(ret[0:1], typ)
copy(ret[1:3], ver)
copy(ret[3:5], length)
copy(ret[5:], input)
return ret
}
2019-08-03 13:58:48 +00:00
2019-08-19 22:23:41 +00:00
func Pipe(dst net.Conn, src net.Conn, srcReadTimeout time.Duration) {
2019-08-03 13:58:48 +00:00
// The maximum size of TLS message will be 16380+12+16. 12 because of the stream header and 16
// because of the salt/mac
// 16408 is the max TLS message size on Firefox
buf := make([]byte, 16380)
2019-08-19 22:23:41 +00:00
if srcReadTimeout != 0 {
src.SetReadDeadline(time.Now().Add(srcReadTimeout))
}
2019-08-03 13:58:48 +00:00
for {
2019-08-19 22:23:41 +00:00
if srcReadTimeout != 0 {
src.SetReadDeadline(time.Now().Add(srcReadTimeout))
}
2019-08-03 13:58:48 +00:00
i, err := io.ReadAtLeast(src, buf, 1)
if err != nil {
2019-08-19 22:23:41 +00:00
dst.Close()
src.Close()
2019-08-03 13:58:48 +00:00
return
}
i, err = dst.Write(buf[:i])
if err != nil {
2019-08-19 22:23:41 +00:00
dst.Close()
src.Close()
2019-08-03 13:58:48 +00:00
return
}
}
}