1
0
mirror of https://github.com/v2fly/v2ray-core.git synced 2024-11-10 06:16:53 -05:00
v2fly/common/protocol/headers.go

109 lines
2.6 KiB
Go
Raw Normal View History

2016-02-15 18:42:52 -05:00
package protocol
import (
2016-12-11 08:58:53 -05:00
"runtime"
"golang.org/x/sys/cpu"
"github.com/v2fly/v2ray-core/v5/common/bitmask"
"github.com/v2fly/v2ray-core/v5/common/net"
"github.com/v2fly/v2ray-core/v5/common/uuid"
2016-02-15 18:42:52 -05:00
)
2017-02-20 05:25:05 -05:00
// RequestCommand is a custom command in a proxy request.
2016-02-15 18:42:52 -05:00
type RequestCommand byte
const (
RequestCommandTCP = RequestCommand(0x01)
RequestCommandUDP = RequestCommand(0x02)
2017-05-17 15:13:01 -04:00
RequestCommandMux = RequestCommand(0x03)
2016-02-15 18:42:52 -05:00
)
2017-05-02 16:23:07 -04:00
func (c RequestCommand) TransferType() TransferType {
2018-02-09 16:29:30 -05:00
switch c {
case RequestCommandTCP, RequestCommandMux:
return TransferTypeStream
case RequestCommandUDP:
return TransferTypePacket
default:
2017-05-02 16:23:07 -04:00
return TransferTypeStream
}
}
2016-02-15 18:42:52 -05:00
const (
2016-12-21 06:53:31 -05:00
// RequestOptionChunkStream indicates request payload is chunked. Each chunk consists of length, authentication and payload.
2017-10-21 15:04:24 -04:00
RequestOptionChunkStream bitmask.Byte = 0x01
2016-12-21 06:53:31 -05:00
// RequestOptionConnectionReuse indicates client side expects to reuse the connection.
2017-10-21 15:04:24 -04:00
RequestOptionConnectionReuse bitmask.Byte = 0x02
2016-12-21 06:53:31 -05:00
2017-10-21 15:04:24 -04:00
RequestOptionChunkMasking bitmask.Byte = 0x04
2018-07-07 09:42:24 -04:00
RequestOptionGlobalPadding bitmask.Byte = 0x08
2021-04-28 18:29:42 -04:00
RequestOptionAuthenticatedLength bitmask.Byte = 0x10
2016-02-15 18:42:52 -05:00
)
type RequestHeader struct {
2016-12-07 11:32:40 -05:00
Version byte
Command RequestCommand
2017-10-21 15:04:24 -04:00
Option bitmask.Byte
Security SecurityType
2017-01-13 18:27:45 -05:00
Port net.Port
Address net.Address
2018-08-26 18:11:32 -04:00
User *MemoryUser
2016-02-15 18:42:52 -05:00
}
2017-10-06 15:17:55 -04:00
func (h *RequestHeader) Destination() net.Destination {
if h.Command == RequestCommandUDP {
return net.UDPDestination(h.Address, h.Port)
2016-02-27 11:28:21 -05:00
}
2017-10-06 15:17:55 -04:00
return net.TCPDestination(h.Address, h.Port)
2016-02-27 11:28:21 -05:00
}
2016-07-11 09:54:19 -04:00
const (
2017-10-21 15:04:24 -04:00
ResponseOptionConnectionReuse bitmask.Byte = 0x01
2016-06-02 15:34:25 -04:00
)
2016-02-15 18:42:52 -05:00
type ResponseCommand interface{}
type ResponseHeader struct {
2017-10-21 15:04:24 -04:00
Option bitmask.Byte
2016-02-15 18:42:52 -05:00
Command ResponseCommand
}
2016-02-26 18:05:53 -05:00
type CommandSwitchAccount struct {
2017-01-13 18:27:45 -05:00
Host net.Address
Port net.Port
2018-01-18 17:25:48 -05:00
ID uuid.UUID
2016-09-17 18:41:21 -04:00
Level uint32
2017-10-22 16:45:05 -04:00
AlterIds uint16
2016-02-26 18:05:53 -05:00
ValidMin byte
}
2016-12-11 08:58:53 -05:00
var (
hasGCMAsmAMD64 = cpu.X86.HasAES && cpu.X86.HasPCLMULQDQ
hasGCMAsmARM64 = cpu.ARM64.HasAES && cpu.ARM64.HasPMULL
// Keep in sync with crypto/aes/cipher_s390x.go.
hasGCMAsmS390X = cpu.S390X.HasAES && cpu.S390X.HasAESCBC && cpu.S390X.HasAESCTR &&
(cpu.S390X.HasGHASH || cpu.S390X.HasAESGCM)
hasAESGCMHardwareSupport = runtime.GOARCH == "amd64" && hasGCMAsmAMD64 ||
runtime.GOARCH == "arm64" && hasGCMAsmARM64 ||
runtime.GOARCH == "s390x" && hasGCMAsmS390X
)
func (sc *SecurityConfig) GetSecurityType() SecurityType {
2017-10-30 16:14:04 -04:00
if sc == nil || sc.Type == SecurityType_AUTO {
if hasAESGCMHardwareSupport {
return SecurityType_AES128_GCM
2016-12-11 08:58:53 -05:00
}
return SecurityType_CHACHA20_POLY1305
2016-12-11 08:58:53 -05:00
}
return sc.Type
2016-12-11 08:58:53 -05:00
}
func IsDomainTooLong(domain string) bool {
return len(domain) > 255
}