github.com/igoogolx/clash@v1.19.8/transport/shadowsocks/shadowaead/cipher.go (about)

     1  package shadowaead
     2  
     3  import (
     4  	"crypto/aes"
     5  	"crypto/cipher"
     6  	"crypto/sha1"
     7  	"io"
     8  	"strconv"
     9  
    10  	"golang.org/x/crypto/chacha20poly1305"
    11  	"golang.org/x/crypto/hkdf"
    12  )
    13  
    14  type Cipher interface {
    15  	KeySize() int
    16  	SaltSize() int
    17  	Encrypter(salt []byte) (cipher.AEAD, error)
    18  	Decrypter(salt []byte) (cipher.AEAD, error)
    19  }
    20  
    21  type KeySizeError int
    22  
    23  func (e KeySizeError) Error() string {
    24  	return "key size error: need " + strconv.Itoa(int(e)) + " bytes"
    25  }
    26  
    27  func hkdfSHA1(secret, salt, info, outkey []byte) {
    28  	r := hkdf.New(sha1.New, secret, salt, info)
    29  	if _, err := io.ReadFull(r, outkey); err != nil {
    30  		panic(err) // should never happen
    31  	}
    32  }
    33  
    34  type metaCipher struct {
    35  	psk      []byte
    36  	makeAEAD func(key []byte) (cipher.AEAD, error)
    37  }
    38  
    39  func (a *metaCipher) KeySize() int { return len(a.psk) }
    40  func (a *metaCipher) SaltSize() int {
    41  	if ks := a.KeySize(); ks > 16 {
    42  		return ks
    43  	}
    44  	return 16
    45  }
    46  
    47  func (a *metaCipher) Encrypter(salt []byte) (cipher.AEAD, error) {
    48  	subkey := make([]byte, a.KeySize())
    49  	hkdfSHA1(a.psk, salt, []byte("ss-subkey"), subkey)
    50  	return a.makeAEAD(subkey)
    51  }
    52  
    53  func (a *metaCipher) Decrypter(salt []byte) (cipher.AEAD, error) {
    54  	subkey := make([]byte, a.KeySize())
    55  	hkdfSHA1(a.psk, salt, []byte("ss-subkey"), subkey)
    56  	return a.makeAEAD(subkey)
    57  }
    58  
    59  func aesGCM(key []byte) (cipher.AEAD, error) {
    60  	blk, err := aes.NewCipher(key)
    61  	if err != nil {
    62  		return nil, err
    63  	}
    64  	return cipher.NewGCM(blk)
    65  }
    66  
    67  // AESGCM creates a new Cipher with a pre-shared key. len(psk) must be
    68  // one of 16, 24, or 32 to select AES-128/196/256-GCM.
    69  func AESGCM(psk []byte) (Cipher, error) {
    70  	switch l := len(psk); l {
    71  	case 16, 24, 32: // AES 128/196/256
    72  	default:
    73  		return nil, aes.KeySizeError(l)
    74  	}
    75  	return &metaCipher{psk: psk, makeAEAD: aesGCM}, nil
    76  }
    77  
    78  // Chacha20Poly1305 creates a new Cipher with a pre-shared key. len(psk)
    79  // must be 32.
    80  func Chacha20Poly1305(psk []byte) (Cipher, error) {
    81  	if len(psk) != chacha20poly1305.KeySize {
    82  		return nil, KeySizeError(chacha20poly1305.KeySize)
    83  	}
    84  	return &metaCipher{psk: psk, makeAEAD: chacha20poly1305.New}, nil
    85  }
    86  
    87  // XChacha20Poly1305 creates a new Cipher with a pre-shared key. len(psk)
    88  // must be 32.
    89  func XChacha20Poly1305(psk []byte) (Cipher, error) {
    90  	if len(psk) != chacha20poly1305.KeySize {
    91  		return nil, KeySizeError(chacha20poly1305.KeySize)
    92  	}
    93  	return &metaCipher{psk: psk, makeAEAD: chacha20poly1305.NewX}, nil
    94  }