mirror of
https://github.com/wangyu-/udp2raw.git
synced 2025-09-16 04:04:27 +08:00
Compare commits
5 Commits
20180830.0
...
20180830.2
Author | SHA1 | Date | |
---|---|---|---|
|
e5584c73be | ||
|
c855a14ae8 | ||
|
d77271540f | ||
|
6b8852f269 | ||
|
f0e36d7d7c |
@@ -513,7 +513,8 @@ int client_on_udp_recv(conn_info_t &conn_info)
|
||||
socklen_t udp_new_addr_len = sizeof(address_t::storage_t);
|
||||
if ((recv_len = recvfrom(udp_fd, buf, max_data_len+1, 0,
|
||||
(struct sockaddr *) &udp_new_addr_in, &udp_new_addr_len)) == -1) {
|
||||
mylog(log_warn,"recv_from error,%s\n",get_sock_error());
|
||||
mylog(log_debug,"recv_from error,%s\n",get_sock_error());
|
||||
return -1;
|
||||
//myexit(1);
|
||||
};
|
||||
|
||||
|
@@ -418,6 +418,7 @@ int recv_bare(raw_info_t &raw_info,char* & data,int & len)//recv function with e
|
||||
//printf("recv_raw_fail in recv bare\n");
|
||||
return -1;
|
||||
}
|
||||
mylog(log_trace,"data len=%d\n",len);
|
||||
if ((raw_mode == mode_faketcp && (recv_info.syn == 1 || recv_info.ack != 1)))
|
||||
{
|
||||
mylog(log_debug,"unexpect packet type recv_info.syn=%d recv_info.ack=%d \n",recv_info.syn,recv_info.ack);
|
||||
|
36
encrypt.cpp
36
encrypt.cpp
@@ -294,46 +294,33 @@ int de_padding(const char *data ,int &data_len,int padding_num)
|
||||
int cipher_aes128cbc_encrypt(const char *data,char *output,int &len,char * key)
|
||||
{
|
||||
static int first_time=1;
|
||||
|
||||
char buf[buf_len];
|
||||
memcpy(buf,data,len);//TODO inefficient code
|
||||
|
||||
if(padding(buf,len,16)<0) return -1;
|
||||
|
||||
if(aes_key_optimize)
|
||||
{
|
||||
if(first_time==0) key=0;
|
||||
else first_time=0;
|
||||
}
|
||||
|
||||
char buf[buf_len];
|
||||
memcpy(buf,data,len);//TODO inefficient code
|
||||
|
||||
|
||||
/*
|
||||
int ori_len=len;
|
||||
len+=2;//length
|
||||
if(len%16!=0)
|
||||
{
|
||||
len= (len/16)*16+16;
|
||||
}
|
||||
//if(len>max_data_len) return -1;
|
||||
|
||||
buf[len-2]= (unsigned char)( (uint16_t(ori_len))>>8);
|
||||
buf[len-1]=(unsigned char)( ((uint16_t(ori_len))<<8)>>8) ;*/
|
||||
if(padding(buf,len,16)<0) return -1;
|
||||
|
||||
AES_CBC_encrypt_buffer((unsigned char *)output,(unsigned char *)buf,len,(unsigned char *)key,(unsigned char *)zero_iv);
|
||||
return 0;
|
||||
}
|
||||
int cipher_aes128cfb_encrypt(const char *data,char *output,int &len,char * key)
|
||||
{
|
||||
static int first_time=1;
|
||||
|
||||
char buf[buf_len];
|
||||
memcpy(buf,data,len);//TODO inefficient code
|
||||
if(aes_key_optimize)
|
||||
{
|
||||
if(first_time==0) key=0;
|
||||
else first_time=0;
|
||||
}
|
||||
|
||||
char buf[buf_len];
|
||||
memcpy(buf,data,len);//TODO inefficient code
|
||||
|
||||
//if(padding(buf,len,16)<0) return -1;
|
||||
|
||||
AES_CFB_encrypt_buffer((unsigned char *)output,(unsigned char *)buf,len,(unsigned char *)key,(unsigned char *)zero_iv);
|
||||
return 0;
|
||||
}
|
||||
@@ -363,13 +350,12 @@ int cipher_none_encrypt(const char *data,char *output,int &len,char * key)
|
||||
int cipher_aes128cbc_decrypt(const char *data,char *output,int &len,char * key)
|
||||
{
|
||||
static int first_time=1;
|
||||
if(len%16 !=0) {mylog(log_debug,"len%%16!=0\n");return -1;}
|
||||
if(aes_key_optimize)
|
||||
{
|
||||
if(first_time==0) key=0;
|
||||
else first_time=0;
|
||||
}
|
||||
if(len%16 !=0) {mylog(log_debug,"len%%16!=0\n");return -1;}
|
||||
//if(len<0) {mylog(log_debug,"len <0\n");return -1;}
|
||||
AES_CBC_decrypt_buffer((unsigned char *)output,(unsigned char *)data,len,(unsigned char *)key,(unsigned char *)zero_iv);
|
||||
if(de_padding(output,len,16)<0) return -1;
|
||||
return 0;
|
||||
@@ -382,8 +368,6 @@ int cipher_aes128cfb_decrypt(const char *data,char *output,int &len,char * key)
|
||||
if(first_time==0) key=0;
|
||||
else first_time=0;
|
||||
}
|
||||
//if(len%16 !=0) {mylog(log_debug,"len%%16!=0\n");return -1;}
|
||||
//if(len<0) {mylog(log_debug,"len <0\n");return -1;}
|
||||
AES_CFB_decrypt_buffer((unsigned char *)output,(unsigned char *)data,len,(unsigned char *)key,(unsigned char *)zero_iv);
|
||||
//if(de_padding(output,len,16)<0) return -1;
|
||||
return 0;
|
||||
|
11
misc.cpp
11
misc.cpp
@@ -769,6 +769,16 @@ void process_arg(int argc, char *argv[]) //process all options
|
||||
raw_ip_version=local_addr.get_type();
|
||||
}
|
||||
|
||||
if(auto_add_iptables_rule&& use_tcp_dummy_socket)
|
||||
{
|
||||
mylog(log_error,"-a,--auto-rule is not supposed to be used with easyfaketcp mode, you are likely making a mistake, but we can try to continue\n");
|
||||
}
|
||||
|
||||
if(keep_rule&& use_tcp_dummy_socket)
|
||||
{
|
||||
mylog(log_error,"--keep-rule is not supposed to be used with easyfaketcp mode, you are likely making a mistake, but we can try to continue\n");
|
||||
}
|
||||
|
||||
mylog(log_info,"important variables: ");
|
||||
|
||||
log_bare(log_info,"log_level=%d:%s ",log_level,log_text[log_level]);
|
||||
@@ -790,6 +800,7 @@ void process_arg(int argc, char *argv[]) //process all options
|
||||
log_bare(log_info,"socket_buf_size=%d ",socket_buf_size);
|
||||
|
||||
log_bare(log_info,"\n");
|
||||
|
||||
}
|
||||
|
||||
void pre_process_arg(int argc, char *argv[])//mainly for load conf file
|
||||
|
@@ -1562,6 +1562,7 @@ int recv_raw_icmp(raw_info_t &raw_info, char *&payload, int &payloadlen)
|
||||
mylog(log_debug,"recv_raw_ip error\n");
|
||||
return -1;
|
||||
}
|
||||
mylog(log_trace,"ip_payloadlen=%d\n",ip_payloadlen);
|
||||
if(raw_ip_version==AF_INET)
|
||||
{
|
||||
if(recv_info.protocol!=IPPROTO_ICMP)
|
||||
@@ -1580,6 +1581,13 @@ int recv_raw_icmp(raw_info_t &raw_info, char *&payload, int &payloadlen)
|
||||
}
|
||||
}
|
||||
|
||||
if(ip_payloadlen<int( sizeof(my_icmphdr) ))
|
||||
{
|
||||
mylog(log_debug,"too short to hold icmp header\n");
|
||||
return -1;
|
||||
}
|
||||
|
||||
|
||||
|
||||
my_icmphdr *icmph=(struct my_icmphdr *) (ip_payload);
|
||||
|
||||
|
Reference in New Issue
Block a user