forked from RoliSoft/Obfuscation-Tunnel
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathfactory.cpp
137 lines (121 loc) · 3.88 KB
/
factory.cpp
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
#pragma once
#include "shared.cpp"
#include "forwarders.cpp"
#include "udp_client.cpp"
#include "udp_server.cpp"
#include "dtls_server.cpp"
#include "tcp_client.cpp"
#include "tcp_server.cpp"
#include "icmp_client.cpp"
#include "icmp_server.cpp"
#include "icmp6_client.cpp"
#include "icmp6_server.cpp"
#include "simple_obfuscator.cpp"
#include "xor_obfuscator.cpp"
#include "dns_mocker.cpp"
#include "http_ws_mocker.cpp"
#include "socks5_proxy.cpp"
transport_base* create_transport(int protocol, struct sockaddr_in *address, bool server, struct session *session)
{
switch (protocol)
{
case PROTO_UDP:
if (server) return new udp_server(*address, session);
else return new udp_client(*address, false, session);
case PROTO_TCP:
if (server) return new tcp_server(*address, false, session);
else return new tcp_client(*address, false, session);
case PROTO_TLS:
#if HAVE_TLS
if (server) return new tcp_server(*address, true, session);
else return new tcp_client(*address, true, session);
#else
fprintf(stderr, "This version was not compiled with OpenSSL support.\n");
return nullptr;
#endif
case PROTO_DTLS:
#if HAVE_TLS
if (server) return new dtls_server(*address, session);
else return new udp_client(*address, true, session);
#else
fprintf(stderr, "This version was not compiled with OpenSSL support.\n");
return nullptr;
#endif
case PROTO_ICMP:
if (server) return new icmp_server(*address, session);
else return new icmp_client(*address, session);
case PROTO_ICMP6:
if (server) return new icmp6_server(*(struct sockaddr_in6*)address, session);
else return new icmp6_client(*(struct sockaddr_in6*)address, session);
default:
fprintf(stderr, "Protocol %d is not supported.\n", protocol);
return nullptr;
}
}
obfuscate_base* create_obfuscator(struct session *session)
{
if (session->obfuscator == nullptr)
{
return nullptr;
}
else if (strcmp(session->obfuscator, "header") == 0)
{
return new simple_obfuscator(session);
}
else if (strcmp(session->obfuscator, "xor") == 0)
{
return new xor_obfuscator(session);
}
else
{
fprintf(stderr, "'%s' is not a supported obfuscator.\n", session->obfuscator);
return nullptr;
}
}
mocker_base* create_mocker(struct session *session)
{
if (session->mocker == nullptr)
{
return nullptr;
}
else if (strcmp(session->mocker, "dns_client") == 0 || strcmp(session->mocker, "dns_server") == 0)
{
return new dns_mocker(session);
}
else if (strcmp(session->mocker, "http_ws_client") == 0 || strcmp(session->mocker, "http_ws_server") == 0)
{
return new http_ws_mocker(session);
}
else if (strprefix(session->mocker, "socks5"))
{
return new socks5_proxy(session);
}
else
{
fprintf(stderr, "'%s' is not a supported mocker.\n", session->mocker);
return nullptr;
}
}
int run_session(struct session *session)
{
transport_base *local = create_transport(session->local_proto, &session->local_addr, true, session);
transport_base *remote = create_transport(session->remote_proto, &session->remote_addr, false, session);
if (local == nullptr || remote == nullptr)
{
return EXIT_FAILURE;
}
obfuscate_base *obfuscator = create_obfuscator(session);
mocker_base *mocker = create_mocker(session);
int res;
if (session->no_threading)
{
res = loop_transports_select(local, remote, obfuscator, mocker);
}
else
{
res = loop_transports_thread(local, remote, obfuscator, mocker);
}
//free(local);
//free(remote);
return res;
}