|
|
@@ -5,12 +5,20 @@ import (
|
|
5
|
5
|
"crypto/subtle"
|
|
6
|
6
|
"encoding/hex"
|
|
7
|
7
|
"fmt"
|
|
|
8
|
+ "io"
|
|
8
|
9
|
)
|
|
9
|
10
|
|
|
10
|
11
|
// Connection Type secure. We support only fake tls.
|
|
11
|
12
|
var clientHandshakeMagic = []byte{0xdd, 0xdd, 0xdd, 0xdd}
|
|
12
|
13
|
|
|
13
|
|
-func ClientHandshake(secret []byte, handshakeFrame *HandhakeFrame) (int16, cipher.Stream, cipher.Stream, error) {
|
|
|
14
|
+func ClientHandshake(secret []byte, reader io.Reader) (int16, cipher.Stream, cipher.Stream, error) {
|
|
|
15
|
+ handshakeFrame := acquireHandshakeFrame()
|
|
|
16
|
+ defer releaseHandshakeFrame(handshakeFrame)
|
|
|
17
|
+
|
|
|
18
|
+ if _, err := io.ReadFull(reader, handshakeFrame.data[:]); err != nil {
|
|
|
19
|
+ return 0, nil, nil, fmt.Errorf("cannot read frame: %w", err)
|
|
|
20
|
+ }
|
|
|
21
|
+
|
|
14
|
22
|
decHasher := acquireSha256Hasher()
|
|
15
|
23
|
defer releaseSha256Hasher(decHasher)
|
|
16
|
24
|
|
|
|
@@ -21,17 +29,22 @@ func ClientHandshake(secret []byte, handshakeFrame *HandhakeFrame) (int16, ciphe
|
|
21
|
29
|
encHasher := acquireSha256Hasher()
|
|
22
|
30
|
defer releaseSha256Hasher(encHasher)
|
|
23
|
31
|
|
|
24
|
|
- invertedFrame := handshakeFrame.invert()
|
|
|
32
|
+ invertedFrame := acquireHandshakeFrame()
|
|
|
33
|
+ defer releaseHandshakeFrame(invertedFrame)
|
|
|
34
|
+
|
|
|
35
|
+ for i, v := range handshakeFrame.data {
|
|
|
36
|
+ invertedFrame.data[handshakeFrameLen-1-i] = v
|
|
|
37
|
+ }
|
|
|
38
|
+
|
|
25
|
39
|
encHasher.Write(invertedFrame.key()) // nolint: errcheck
|
|
26
|
|
- encHasher.Write(secret) // nolint: errcheck
|
|
|
40
|
+ encHasher.Write(secret) // nolint: errcheck
|
|
27
|
41
|
encryptor := makeAesCtr(encHasher.Sum(nil), invertedFrame.iv())
|
|
28
|
42
|
|
|
29
|
|
- decryptedFrame := HandhakeFrame{}
|
|
30
|
|
- decryptor.XORKeyStream(decryptedFrame.data[:], handshakeFrame.data[:])
|
|
|
43
|
+ decryptor.XORKeyStream(handshakeFrame.data[:], handshakeFrame.data[:])
|
|
31
|
44
|
|
|
32
|
|
- if magic := decryptedFrame.magic(); subtle.ConstantTimeCompare(clientHandshakeMagic, magic) != 1 {
|
|
|
45
|
+ if magic := handshakeFrame.magic(); subtle.ConstantTimeCompare(clientHandshakeMagic, magic) != 1 {
|
|
33
|
46
|
return 0, nil, nil, fmt.Errorf("unsupported connection type: %s", hex.EncodeToString(magic))
|
|
34
|
47
|
}
|
|
35
|
48
|
|
|
36
|
|
- return decryptedFrame.dc(), encryptor, decryptor, nil
|
|
|
49
|
+ return handshakeFrame.dc(), encryptor, decryptor, nil
|
|
37
|
50
|
}
|