Browse Source

use OpenSSL directly

tags/2.3
clowwindy 10 years ago
parent
commit
421554f8ec
14 changed files with 110 additions and 5386 deletions
  1. BIN
      openssl/libeay32.dll
  2. +0
    -4929
      openssl/openssl-net-0.5/ManagedOpenSsl.XML
  3. BIN
      openssl/openssl-net-0.5/ManagedOpenSsl.dll
  4. BIN
      openssl/openssl-net-0.5/libeay32.dll
  5. BIN
      openssl/openssl-net-0.5/ssleay32.dll
  6. +0
    -5
      shadowsocks-csharp/Encrypt/EncryptorFactory.cs
  7. +44
    -0
      shadowsocks-csharp/Encrypt/OpenSSL.cs
  8. +63
    -59
      shadowsocks-csharp/Encrypt/OpensslEncryptor.cs
  9. +0
    -81
      shadowsocks-csharp/Encrypt/RC4Encryptor.cs
  10. +0
    -277
      shadowsocks-csharp/Encryptor.cs
  11. +1
    -2
      shadowsocks-csharp/Form1.Designer.cs
  12. +1
    -1
      shadowsocks-csharp/Properties/AssemblyInfo.cs
  13. +0
    -26
      shadowsocks-csharp/Test.cs
  14. +1
    -6
      shadowsocks-csharp/shadowsocks-csharp.csproj

BIN
openssl/libeay32.dll View File


+ 0
- 4929
openssl/openssl-net-0.5/ManagedOpenSsl.XML
File diff suppressed because it is too large
View File


BIN
openssl/openssl-net-0.5/ManagedOpenSsl.dll View File


BIN
openssl/openssl-net-0.5/libeay32.dll View File


BIN
openssl/openssl-net-0.5/ssleay32.dll View File


+ 0
- 5
shadowsocks-csharp/Encrypt/EncryptorFactory.cs View File

@@ -10,11 +10,6 @@ namespace shadowsocks_csharp.Encrypt
return new TableEncryptor(method, password);
}

if (method.ToLowerInvariant() == "rc4")
{
return new Rc4Encryptor(method, password);
}

return new OpensslEncryptor(method, password);
}
}


+ 44
- 0
shadowsocks-csharp/Encrypt/OpenSSL.cs View File

@@ -0,0 +1,44 @@
using System;
using System.Collections.Generic;
using System.Runtime.InteropServices;
using System.Text;
namespace shadowsocks_csharp.Encrypt
{
public class OpenSSL
{
const string DLLNAME = "libeay32";
[DllImport(DLLNAME, CallingConvention = CallingConvention.Cdecl)]
public extern static void OpenSSL_add_all_ciphers();
[DllImport(DLLNAME, CallingConvention = CallingConvention.Cdecl)]
public extern static IntPtr EVP_md5();
[DllImport(DLLNAME, CallingConvention = CallingConvention.Cdecl)]
public extern static int EVP_BytesToKey(IntPtr type, IntPtr md, IntPtr salt, byte[] data, int datal, int count, byte[] key, byte[] iv);
[DllImport(DLLNAME, CallingConvention = CallingConvention.Cdecl)]
public extern static int RAND_bytes(byte[] buf, int num);
[DllImport(DLLNAME, CallingConvention = CallingConvention.Cdecl)]
public extern static IntPtr EVP_get_cipherbyname(byte[] name);
[DllImport(DLLNAME, CallingConvention = CallingConvention.Cdecl)]
public extern static IntPtr EVP_CIPHER_CTX_new();
[DllImport(DLLNAME, CallingConvention = CallingConvention.Cdecl)]
public extern static int EVP_CipherInit_ex(IntPtr ctx, IntPtr type, IntPtr impl, byte[] key, byte[] iv, int enc);
[DllImport(DLLNAME, CallingConvention = CallingConvention.Cdecl)]
public extern static int EVP_CIPHER_CTX_cleanup(IntPtr a);
[DllImport(DLLNAME, CallingConvention = CallingConvention.Cdecl)]
public extern static int EVP_CIPHER_CTX_free(IntPtr a);
[DllImport(DLLNAME, CallingConvention = CallingConvention.Cdecl)]
public extern static int EVP_CipherUpdate(IntPtr ctx, byte[] outb, out int outl, byte[] inb, int inl);
}
}

+ 63
- 59
shadowsocks-csharp/Encrypt/OpensslEncryptor.cs View File

@@ -1,6 +1,4 @@
using OpenSSL.Core;
using OpenSSL.Crypto;
using System;
using System;
using System.Collections.Generic;
using System.Runtime.InteropServices;
using System.Text;
@@ -9,7 +7,14 @@ namespace shadowsocks_csharp.Encrypt
{
public class OpensslEncryptor
: EncryptorBase, IDisposable
{
{
static Dictionary<string, int[]> ciphers = new Dictionary<string, int[]> {
{"aes-128-cfb", new int[]{16, 16}},
{"aes-192-cfb", new int[]{24, 16}},
{"aes-256-cfb", new int[]{32, 16}},
{"bf-cfb", new int[]{16, 8}},
{"rc4", new int[]{16, 0}},
};
public OpensslEncryptor(string method, string password)
: base(method, password)
{
@@ -20,23 +25,22 @@ namespace shadowsocks_csharp.Encrypt
{
if (_encryptCtx == IntPtr.Zero)
{
int ivLen = _cipher.IVLength;
byte[] iv = new byte[ivLen];
Native.RAND_bytes(iv, iv.Length);
OpenSSL.RAND_bytes(iv, iv.Length);
InitCipher(ref _encryptCtx, iv, true);
int outLen = length + _cipher.BlockSize;
byte[] cipherText = new byte[outLen];
Native.EVP_CipherUpdate(_encryptCtx, cipherText, out outLen, buf, length);
int outLen = length + ivLen;
byte[] cipherText = new byte[outLen];
OpenSSL.EVP_CipherUpdate(_encryptCtx, cipherText, out outLen, buf, length);
byte[] result = new byte[outLen + ivLen];
Buffer.BlockCopy(iv, 0, result, 0, ivLen);
Buffer.BlockCopy(cipherText, 0, result, ivLen, outLen);
return result;
}
else
{
int outLen = length + _cipher.BlockSize;
byte[] cipherText = new byte[outLen];
Native.EVP_CipherUpdate(_encryptCtx, cipherText, out outLen, buf, length);
{
int outLen = length + ivLen;
byte[] cipherText = new byte[outLen];
OpenSSL.EVP_CipherUpdate(_encryptCtx, cipherText, out outLen, buf, length);
byte[] result = new byte[outLen];
Buffer.BlockCopy(cipherText, 0, result, 0, outLen);
return result;
@@ -47,25 +51,24 @@ namespace shadowsocks_csharp.Encrypt
{
if (_decryptCtx == IntPtr.Zero)
{
int ivLen = _cipher.IVLength;
byte[] iv = new byte[ivLen];
Buffer.BlockCopy(buf, 0, iv, 0, ivLen);
InitCipher(ref _decryptCtx, iv, false);
int outLen = length + _cipher.BlockSize;
InitCipher(ref _decryptCtx, iv, false);
int outLen = length + ivLen;
outLen -= ivLen;
byte[] cipherText = new byte[outLen];
byte[] subset = new byte[length - ivLen];
Buffer.BlockCopy(buf, ivLen, subset, 0, length - ivLen);
Native.EVP_CipherUpdate(_decryptCtx, cipherText, out outLen, subset, length - ivLen);
Buffer.BlockCopy(buf, ivLen, subset, 0, length - ivLen);
OpenSSL.EVP_CipherUpdate(_decryptCtx, cipherText, out outLen, subset, length - ivLen);
byte[] result = new byte[outLen];
Buffer.BlockCopy(cipherText, 0, result, 0, outLen);
return result;
}
else
{
int outLen = length + _cipher.BlockSize;
byte[] cipherText = new byte[outLen];
Native.EVP_CipherUpdate(_decryptCtx, cipherText, out outLen, buf, length);
{
int outLen = length + ivLen;
byte[] cipherText = new byte[outLen];
OpenSSL.EVP_CipherUpdate(_decryptCtx, cipherText, out outLen, buf, length);
byte[] result = new byte[outLen];
Buffer.BlockCopy(cipherText, 0, result, 0, outLen);
return result;
@@ -73,43 +76,44 @@ namespace shadowsocks_csharp.Encrypt
}

private static readonly Dictionary<string, byte[]> CachedKeys = new Dictionary<string, byte[]>();
private static readonly Dictionary<string, Cipher> CachedCiphers = new Dictionary<string, Cipher>();
private byte[] _key;
private Cipher _cipher;
private IntPtr _encryptCtx;
private IntPtr _decryptCtx;
private IntPtr _encryptCtx;
private IntPtr _decryptCtx;
private IntPtr _cipher;
private int keyLen;
private int ivLen;

private void InitKey(string method, string password)
{
string k = method + ":" + password;
if (CachedKeys.ContainsKey(k))
{
_key = CachedKeys[k];
_cipher = CachedCiphers[k];
return;
}
_cipher = Cipher.CreateByName(method);
if (_cipher == null)
{
throw new NullReferenceException();
private void InitKey(string method, string password)
{
OpenSSL.OpenSSL_add_all_ciphers();
method = method.ToLower();
string k = method + ":" + password;
_cipher = OpenSSL.EVP_get_cipherbyname(System.Text.Encoding.UTF8.GetBytes(method));
if (_cipher == null)
{
throw new Exception("method not found");
}
keyLen = ciphers[method][0];
ivLen = ciphers[method][1];
if (CachedKeys.ContainsKey(k))
{
_key = CachedKeys[k];
}
else
{
byte[] passbuf = Encoding.UTF8.GetBytes(password);
_key = new byte[32];
byte[] iv = new byte[16];
OpenSSL.EVP_BytesToKey(_cipher, OpenSSL.EVP_md5(), IntPtr.Zero, passbuf, passbuf.Length, 1, _key, iv);
CachedKeys[k] = _key;
}
byte[] passbuf = Encoding.UTF8.GetBytes(password);
_key = new byte[_cipher.KeyLength];
byte[] iv = new byte[_cipher.IVLength];
Native.EVP_BytesToKey(_cipher.Handle, MessageDigest.MD5.Handle, null, passbuf, passbuf.Length, 1, _key, iv);
CachedKeys[k] = _key;
CachedCiphers[k] = _cipher;
}

private void InitCipher(ref IntPtr ctx, byte[] iv, bool isCipher)
{
ctx = Native.OPENSSL_malloc(Marshal.SizeOf(typeof(CipherContext.EVP_CIPHER_CTX)));
int enc = isCipher ? 1 : 0;
Native.EVP_CIPHER_CTX_init(ctx);
Native.ExpectSuccess(Native.EVP_CipherInit_ex(ctx, _cipher.Handle, IntPtr.Zero, null, null, enc));
Native.ExpectSuccess(Native.EVP_CIPHER_CTX_set_key_length(ctx, _key.Length));
Native.ExpectSuccess(Native.EVP_CIPHER_CTX_set_padding(ctx, 1));
Native.ExpectSuccess(Native.EVP_CipherInit_ex(ctx, _cipher.Handle, IntPtr.Zero, _key, iv, enc));
{
ctx = OpenSSL.EVP_CIPHER_CTX_new();
int enc = isCipher ? 1 : 0;
OpenSSL.EVP_CipherInit_ex(ctx, _cipher, IntPtr.Zero, _key, iv, enc);
}

#region IDisposable
@@ -136,15 +140,15 @@ namespace shadowsocks_csharp.Encrypt
}

if (_encryptCtx != IntPtr.Zero)
{
Native.EVP_CIPHER_CTX_cleanup(_encryptCtx);
Native.OPENSSL_free(_encryptCtx);
{
OpenSSL.EVP_CIPHER_CTX_cleanup(_encryptCtx);
OpenSSL.EVP_CIPHER_CTX_free(_encryptCtx);
_encryptCtx = IntPtr.Zero;
}
if (_decryptCtx != IntPtr.Zero)
{
Native.EVP_CIPHER_CTX_cleanup(_decryptCtx);
Native.OPENSSL_free(_decryptCtx);
{
OpenSSL.EVP_CIPHER_CTX_cleanup(_decryptCtx);
OpenSSL.EVP_CIPHER_CTX_free(_decryptCtx);
_decryptCtx = IntPtr.Zero;
}



+ 0
- 81
shadowsocks-csharp/Encrypt/RC4Encryptor.cs View File

@@ -1,81 +0,0 @@

namespace shadowsocks_csharp.Encrypt
{
public class Rc4Encryptor
: EncryptorBase
{
public Rc4Encryptor(string method, string password)
: base(method, password)
{
byte[] hash = GetPasswordHash();
_encryptTable = EncryptInitalize(hash);
_decryptTable = EncryptInitalize(hash);
}

public override byte[] Encrypt(byte[] buf, int length)
{
return EncryptOutput(enc_ctx, _encryptTable, buf, length);
}

public override byte[] Decrypt(byte[] buf, int length)
{
return EncryptOutput(dec_ctx, _decryptTable, buf, length);
}

private readonly byte[] _encryptTable = new byte[256];
private readonly byte[] _decryptTable = new byte[256];

private Context enc_ctx = new Context();
private Context dec_ctx = new Context();

private byte[] EncryptOutput(Context ctx, byte[] s, byte[] data, int length)
{
byte[] result = new byte[length];
for (int n = 0; n < length; n++)
{
byte b = data[n];

ctx.Index1 = (ctx.Index1 + 1) & 255;
ctx.Index2 = (ctx.Index2 + s[ctx.Index1]) & 255;

Swap(s, ctx.Index1, ctx.Index2);

result[n] = (byte)(b ^ s[(s[ctx.Index1] + s[ctx.Index2]) & 255]);
}
return result;
}

private byte[] EncryptInitalize(byte[] key)
{
var s = new byte[256];

for (int i = 0; i < 256; i++)
{
s[i] = (byte)i;
}

for (int i = 0, j = 0; i < 256; i++)
{
j = (j + key[i % key.Length] + s[i]) & 255;

Swap(s, i, j);
}

return s;
}

private static void Swap(byte[] s, int i, int j)
{
byte c = s[i];

s[i] = s[j];
s[j] = c;
}

class Context
{
public int Index1;
public int Index2;
}
}
}

+ 0
- 277
shadowsocks-csharp/Encryptor.cs View File

@@ -1,277 +0,0 @@
using System;
using System.Collections.Generic;
using System.Text;
using System.Security.Cryptography;
using OpenSSL.Core;
using OpenSSL.Crypto;
using System.Runtime.InteropServices;
namespace shadowsocks_csharp
{
class Encryptor : IDisposable
{
public static string[] encryption_names = new string[] {
"table",
"rc4",
"aes-256-cfb",
"aes-192-cfb",
"aes-128-cfb",
"bf-cfb"
};
public byte[] encryptTable = new byte[256];
public byte[] decryptTable = new byte[256];
public string method = "table";
public string password;
public byte[] key;
private RC4 rc4 = null;
private Cipher cipher = null;
private IntPtr encryptCTX;
private IntPtr decryptCTX;
private static Dictionary<string, byte[]> cachedKeys = new Dictionary<string, byte[]>();
private static Dictionary<string, Cipher> cachedCiphers = new Dictionary<string, Cipher>();
public void Dispose()
{
if (encryptCTX != IntPtr.Zero)
{
Native.EVP_CIPHER_CTX_cleanup(encryptCTX);
Native.OPENSSL_free(encryptCTX);
encryptCTX = IntPtr.Zero;
}
if (decryptCTX != IntPtr.Zero)
{
Native.EVP_CIPHER_CTX_cleanup(decryptCTX);
Native.OPENSSL_free(decryptCTX);
decryptCTX = IntPtr.Zero;
}
}
~Encryptor() {
Dispose();
}
private long compare(byte x, byte y, ulong a, int i)
{
return (long)(a % (ulong)(x + i)) - (long)(a % (ulong)(y + i));
}
private byte[] mergeSort(byte[] array, ulong a, int j)
{
if (array.Length == 1)
return array;
int middle = array.Length / 2;
byte[] left = new byte[middle];
for (int i = 0; i < middle; i++)
{
left[i] = array[i];
}
byte[] right = new byte[array.Length - middle];
for (int i = 0; i < array.Length - middle; i++)
{
right[i] = array[i + middle];
}
left = mergeSort(left, a, j);
right = mergeSort(right, a, j);
int leftptr = 0;
int rightptr = 0;
byte[] sorted = new byte[array.Length];
for (int k = 0; k < array.Length; k++)
{
if (rightptr == right.Length || ((leftptr < left.Length) && (compare(left[leftptr], right[rightptr], a, j) <= 0)))
{
sorted[k] = left[leftptr];
leftptr++;
}
else if (leftptr == left.Length || ((rightptr < right.Length) && (compare(right[rightptr], left[leftptr], a, j)) <= 0))
{
sorted[k] = right[rightptr];
rightptr++;
}
}
return sorted;
}
public Encryptor(string method, string password)
{
MD5 md5 = System.Security.Cryptography.MD5.Create();
byte[] inputBytes = System.Text.Encoding.UTF8.GetBytes(password);
byte[] hash = md5.ComputeHash(inputBytes);
encryptCTX = IntPtr.Zero;
decryptCTX = IntPtr.Zero;
this.method = method;
this.password = password;
if (method != null && method.ToLowerInvariant().Equals("rc4")) {
Console.WriteLine("init rc4");
rc4 = new RC4();
encryptTable = rc4.EncryptInitalize(hash);
decryptTable = rc4.EncryptInitalize(hash);
}
else if (method == "table" || method == "" || method == null)
{
Console.WriteLine("init table");
// TODO endian
var a = BitConverter.ToUInt64(hash, 0);
for (int i = 0; i < 256; i++)
{
encryptTable[i] = (byte)i;
}
for (int i = 1; i < 1024; i++)
{
encryptTable = mergeSort(encryptTable, a, i);
}
for (int i = 0; i < 256; i++)
{
decryptTable[encryptTable[i]] = (byte)i;
}
}
else
{
initKey(password, method);
}
}
private void initCipher(ref IntPtr ctx, byte[] iv, bool isCipher)
{
ctx = Native.OPENSSL_malloc(Marshal.SizeOf(typeof(CipherContext.EVP_CIPHER_CTX)));
int enc = isCipher ? 1 : 0;
Native.EVP_CIPHER_CTX_init(ctx);
Native.ExpectSuccess(Native.EVP_CipherInit_ex(
ctx, this.cipher.Handle, IntPtr.Zero, null, null, enc));
Native.ExpectSuccess(Native.EVP_CIPHER_CTX_set_key_length(ctx, key.Length));
Native.ExpectSuccess(Native.EVP_CIPHER_CTX_set_padding(ctx, 1));
Native.ExpectSuccess(Native.EVP_CipherInit_ex(
ctx, this.cipher.Handle, IntPtr.Zero, key, iv, enc));
}
private void initKey(string password, string method)
{
string k = method + ":" + password;
if (cachedKeys.ContainsKey(k))
{
key = cachedKeys[k];
cipher = cachedCiphers[k];
return;
}
cipher = Cipher.CreateByName(method);
if (cipher == null)
{
throw new NullReferenceException();
}
byte[] passbuf = System.Text.Encoding.UTF8.GetBytes(password); ;
key = new byte[cipher.KeyLength];
byte[] iv = new byte[cipher.IVLength];
Native.EVP_BytesToKey(cipher.Handle, MessageDigest.MD5.Handle, null, passbuf, passbuf.Length, 1, key, iv);
cachedKeys[k] = key;
cachedCiphers[k] = cipher;
}
private byte[] sslEncrypt(byte[] buf, int length)
{
if (encryptCTX == IntPtr.Zero)
{
int ivLen = cipher.IVLength;
byte[] iv = new byte[ivLen];
Native.RAND_bytes(iv, iv.Length);
initCipher(ref encryptCTX, iv, true);
int outLen = length + cipher.BlockSize;
byte[] cipherText = new byte[outLen];
Native.EVP_CipherUpdate(encryptCTX, cipherText, out outLen, buf, length);
byte[] result = new byte[outLen + ivLen];
System.Buffer.BlockCopy(iv, 0, result, 0, ivLen);
System.Buffer.BlockCopy(cipherText, 0, result, ivLen, outLen);
return result;
}
else
{
int outLen = length + cipher.BlockSize;
byte[] cipherText = new byte[outLen];
Native.EVP_CipherUpdate(encryptCTX, cipherText, out outLen, buf, length);
byte[] result = new byte[outLen];
System.Buffer.BlockCopy(cipherText, 0, result, 0, outLen);
return result;
}
}
private byte[] sslDecrypt(byte[] buf, int length)
{
if (decryptCTX == IntPtr.Zero)
{
int ivLen = cipher.IVLength;
byte[] iv = new byte[ivLen];
System.Buffer.BlockCopy(buf, 0, iv, 0, ivLen);
initCipher(ref decryptCTX, iv, false);
int outLen = length + cipher.BlockSize;
outLen -= ivLen;
byte[] cipherText = new byte[outLen];
byte[] subset = new byte[length - ivLen];
System.Buffer.BlockCopy(buf, ivLen, subset, 0, length - ivLen);
Native.EVP_CipherUpdate(decryptCTX, cipherText, out outLen, subset, length - ivLen);
byte[] result = new byte[outLen];
System.Buffer.BlockCopy(cipherText, 0, result, 0, outLen);
return result;
}
else
{
int outLen = length + cipher.BlockSize;
byte[] cipherText = new byte[outLen];
Native.EVP_CipherUpdate(decryptCTX, cipherText, out outLen, buf, length);
byte[] result = new byte[outLen];
System.Buffer.BlockCopy(cipherText, 0, result, 0, outLen);
return result;
}
}
public byte[] byteArrayWith(byte[] buf, int length)
{
if (buf.Length == length)
{
return buf;
}
byte[] result = new byte[length];
System.Buffer.BlockCopy(buf, 0, result, 0, length);
return result;
}
public byte[] Encrypt(byte[] buf, int length)
{
switch (method)
{
case "table":
for (int i = 0; i < length; i++)
buf[i] = encryptTable[buf[i]];
return byteArrayWith(buf, length);
break;
case "rc4":
rc4.Encrypt(encryptTable, buf, length);
return byteArrayWith(buf, length);
break;
default:
return sslEncrypt(buf, length);
}
}
public byte[] Decrypt(byte[] buf, int length)
{
switch (method)
{
case "table":
for (int i = 0; i < length; i++)
buf[i] = decryptTable[buf[i]];
return byteArrayWith(buf, length);
break;
case "rc4":
rc4.Decrypt(decryptTable, buf, length);
return byteArrayWith(buf, length);
break;
default:
return sslDecrypt(buf, length);
}
}
}
}

+ 1
- 2
shadowsocks-csharp/Form1.Designer.cs View File

@@ -122,12 +122,11 @@
this.comboBox1.ItemHeight = 13;
this.comboBox1.Items.AddRange(new object[] {
"table",
"rc4-md5",
"aes-256-cfb",
"aes-192-cfb",
"aes-128-cfb",
"bf-cfb",
"cast5-cfb",
"des-cfb",
"rc4"});
this.comboBox1.Location = new System.Drawing.Point(69, 107);
this.comboBox1.Name = "comboBox1";


+ 1
- 1
shadowsocks-csharp/Properties/AssemblyInfo.cs View File

@@ -10,7 +10,7 @@ using System.Runtime.InteropServices;
[assembly: AssemblyConfiguration("")]
[assembly: AssemblyCompany("")]
[assembly: AssemblyProduct("shadowsocks-csharp")]
[assembly: AssemblyCopyright("Copyright © 2013")]
[assembly: AssemblyCopyright("Copyright © 2014")]
[assembly: AssemblyTrademark("")]
[assembly: AssemblyCulture("")]


+ 0
- 26
shadowsocks-csharp/Test.cs View File

@@ -1,26 +0,0 @@
using System;
using System.Collections.Generic;
using System.Text;
using System.Diagnostics;
namespace shadowsocks_csharp
{
class Test
{
private static byte[][] target = new byte[][] {new byte[]{60, 53, 84, 138, 217, 94, 88, 23, 39, 242, 219, 35, 12, 157, 165, 181, 255, 143, 83, 247, 162, 16, 31, 209, 190, 171, 115, 65, 38, 41, 21, 245, 236, 46, 121, 62, 166, 233, 44, 154, 153, 145, 230, 49, 128, 216, 173, 29, 241, 119, 64, 229, 194, 103, 131, 110, 26, 197, 218, 59, 204, 56, 27, 34, 141, 221, 149, 239, 192, 195, 24, 155, 170, 183, 11, 254, 213, 37, 137, 226, 75, 203, 55, 19, 72, 248, 22, 129, 33, 175, 178, 10, 198, 71, 77, 36, 113, 167, 48, 2, 117, 140, 142, 66, 199, 232, 243, 32, 123, 54, 51, 82, 57, 177, 87, 251, 150, 196, 133, 5, 253, 130, 8, 184, 14, 152, 231, 3, 186, 159, 76, 89, 228, 205, 156, 96, 163, 146, 18, 91, 132, 85, 80, 109, 172, 176, 105, 13, 50, 235, 127, 0, 189, 95, 98, 136, 250, 200, 108, 179, 211, 214, 106, 168, 78, 79, 74, 210, 30, 73, 201, 151, 208, 114, 101, 174, 92, 52, 120, 240, 15, 169, 220, 182, 81, 224, 43, 185, 40, 99, 180, 17, 212, 158, 42, 90, 9, 191, 45, 6, 25, 4, 222, 67, 126, 1, 116, 124, 206, 69, 61, 7, 68, 97, 202, 63, 244, 20, 28, 58, 93, 134, 104, 144, 227, 147, 102, 118, 135, 148, 47, 238, 86, 112, 122, 70, 107, 215, 100, 139, 223, 225, 164, 237, 111, 125, 207, 160, 187, 246, 234, 161, 188, 193, 249, 252},
new byte[]{151, 205, 99, 127, 201, 119, 199, 211, 122, 196, 91, 74, 12, 147, 124, 180, 21, 191, 138, 83, 217, 30, 86, 7, 70, 200, 56, 62, 218, 47, 168, 22, 107, 88, 63, 11, 95, 77, 28, 8, 188, 29, 194, 186, 38, 198, 33, 230, 98, 43, 148, 110, 177, 1, 109, 82, 61, 112, 219, 59, 0, 210, 35, 215, 50, 27, 103, 203, 212, 209, 235, 93, 84, 169, 166, 80, 130, 94, 164, 165, 142, 184, 111, 18, 2, 141, 232, 114, 6, 131, 195, 139, 176, 220, 5, 153, 135, 213, 154, 189, 238, 174, 226, 53, 222, 146, 162, 236, 158, 143, 55, 244, 233, 96, 173, 26, 206, 100, 227, 49, 178, 34, 234, 108, 207, 245, 204, 150, 44, 87, 121, 54, 140, 118, 221, 228, 155, 78, 3, 239, 101, 64, 102, 17, 223, 41, 137, 225, 229, 66, 116, 171, 125, 40, 39, 71, 134, 13, 193, 129, 247, 251, 20, 136, 242, 14, 36, 97, 163, 181, 72, 25, 144, 46, 175, 89, 145, 113, 90, 159, 190, 15, 183, 73, 123, 187, 128, 248, 252, 152, 24, 197, 68, 253, 52, 69, 117, 57, 92, 104, 157, 170, 214, 81, 60, 133, 208, 246, 172, 23, 167, 160, 192, 76, 161, 237, 45, 4, 58, 10, 182, 65, 202, 240, 185, 241, 79, 224, 132, 51, 42, 126, 105, 37, 250, 149, 32, 243, 231, 67, 179, 48, 9, 106, 216, 31, 249, 19, 85, 254, 156, 115, 255, 120, 75, 16}};
public static void Test1()
{
Encryptor encryptor = new Encryptor("table", "foobar!");
for (int i = 0; i < 256; i++)
{
Debug.Assert(encryptor.encryptTable[i] == target[0][i]);
Debug.Assert(encryptor.decryptTable[i] == target[1][i]);
}
}
}
}

+ 1
- 6
shadowsocks-csharp/shadowsocks-csharp.csproj View File

@@ -76,9 +76,6 @@
<CodeAnalysisRuleSet>ManagedMinimumRules.ruleset</CodeAnalysisRuleSet>
</PropertyGroup>
<ItemGroup>
<Reference Include="ManagedOpenSsl">
<HintPath>..\openssl\openssl-net-0.5\ManagedOpenSsl.dll</HintPath>
</Reference>
<Reference Include="System" />
<Reference Include="System.Drawing" />
<Reference Include="System.Windows.Forms" />
@@ -86,13 +83,12 @@
<ItemGroup>
<Compile Include="Encrypt\EncryptorBase.cs" />
<Compile Include="Encrypt\EncryptorFactory.cs" />
<Compile Include="Encrypt\OpenSSL.cs" />
<Compile Include="Encrypt\OpensslEncryptor.cs" />
<Compile Include="Encrypt\Rc4Encryptor.cs" />
<Compile Include="Encrypt\TableEncryptor.cs" />
<Compile Include="Encrypt\IEncryptor.cs" />
<Compile Include="RC4.cs" />
<Compile Include="Config.cs" />
<Compile Include="Encryptor.cs" />
<Compile Include="Form1.cs">
<SubType>Form</SubType>
</Compile>
@@ -127,7 +123,6 @@
<DesignTimeSharedInput>True</DesignTimeSharedInput>
</Compile>
<Compile Include="simple-json\src\SimpleJson\SimpleJson.cs" />
<Compile Include="Test.cs" />
</ItemGroup>
<ItemGroup>
<Content Include="icon144.ico" />


Loading…
Cancel
Save