docstring_tokens
stringlengths
0
76.5k
code_tokens
stringlengths
75
1.81M
label_window
listlengths
4
2.12k
html_url
stringlengths
74
116
file_name
stringlengths
3
311
"github.com/Dreamacro/clash/common/pool" "github.com/Dreamacro/clash/component/ssr/tools"
<mask> "math/rand" <mask> "net" <mask> "strconv" <mask> "strings" <mask> ) <mask> <mask> func init() { <mask> register("http_simple", newHTTPSimple, 0) <mask> } </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove type httpObfs struct { *Base firstRequest bool firstResponse bool post bool </s> add func init() { register("http_simple", newHTTPSimple, 0) </s> remove import ( "bytes" "crypto/aes" "crypto/cipher" "encoding/base64" "encoding/binary" "math/rand" "strconv" "strings" "time" "github.com/Dreamacro/clash/common/pool" "github.com/Dreamacro/clash/component/ssr/tools" "github.com/Dreamacro/go-shadowsocks2/core" ) type authAES128 struct { *Base *recvInfo *authData hasSentHeader bool packID uint32 userKey []byte uid [4]byte salt string hmac hmacMethod hashDigest hashDigestMethod } </s> add import "github.com/Dreamacro/clash/component/ssr/tools" </s> remove type randomHead struct { *Base firstRequest bool firstResponse bool headerSent bool buffer []byte </s> add func init() { register("random_head", newRandomHead, 0)
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/obfs/http_simple.go
func init() { register("http_simple", newHTTPSimple, 0)
<mask> "math/rand" <mask> "strings" <mask> ) <mask> <mask> type httpObfs struct { <mask> *Base <mask> firstRequest bool <mask> firstResponse bool <mask> post bool <mask> } <mask> <mask> func init() { <mask> register("http_simple", newHTTPSimple) <mask> } </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove func init() { register("http_simple", newHTTPSimple) </s> add type httpObfs struct { *Base post bool </s> remove type randomHead struct { *Base firstRequest bool firstResponse bool headerSent bool buffer []byte </s> add func init() { register("random_head", newRandomHead, 0) </s> remove import ( "bytes" "crypto/aes" "crypto/cipher" "encoding/base64" "encoding/binary" "math/rand" "strconv" "strings" "time" "github.com/Dreamacro/clash/common/pool" "github.com/Dreamacro/clash/component/ssr/tools" "github.com/Dreamacro/go-shadowsocks2/core" ) type authAES128 struct { *Base *recvInfo *authData hasSentHeader bool packID uint32 userKey []byte uid [4]byte salt string hmac hmacMethod hashDigest hashDigestMethod } </s> add import "github.com/Dreamacro/clash/component/ssr/tools" </s> remove headerSent bool buffer bytes.Buffer } func init() { register("auth_sha1_v4", newAuthSHA1V4) </s> add iv []byte hasSentHeader bool rawTrans bool </s> remove register("auth_aes128_sha1", newAuthAES128SHA1) </s> add register("auth_aes128_sha1", newAuthAES128SHA1, 9) } type authAES128Function struct { salt string hmac hmacMethod hashDigest hashDigestMethod } type authAES128 struct { *Base *authData *authAES128Function *userData iv []byte hasSentHeader bool rawTrans bool packID uint32 recvID uint32
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/obfs/http_simple.go
type httpObfs struct { *Base post bool
<mask> firstResponse bool <mask> post bool <mask> } <mask> <mask> func init() { <mask> register("http_simple", newHTTPSimple) <mask> } <mask> <mask> func newHTTPSimple(b *Base) Obfs { <mask> return &httpObfs{Base: b} <mask> } </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove type httpObfs struct { *Base firstRequest bool firstResponse bool post bool </s> add func init() { register("http_simple", newHTTPSimple, 0) </s> remove func (h *httpObfs) initForConn() Obfs { return &httpObfs{ Base: h.Base, firstRequest: true, firstResponse: true, post: h.post, } </s> add type httpConn struct { net.Conn *httpObfs hasSentHeader bool hasRecvHeader bool buf []byte </s> remove func init() { register("random_head", newRandomHead) </s> add type randomHead struct { *Base </s> remove func (r *randomHead) initForConn() Obfs { return &randomHead{ Base: r.Base, firstRequest: true, firstResponse: true, } </s> add type randomHeadConn struct { net.Conn *randomHead hasSentHeader bool rawTransSent bool rawTransRecv bool buf []byte </s> remove type randomHead struct { *Base firstRequest bool firstResponse bool headerSent bool buffer []byte </s> add func init() { register("random_head", newRandomHead, 0)
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/obfs/http_simple.go
type httpConn struct { net.Conn *httpObfs hasSentHeader bool hasRecvHeader bool buf []byte
<mask> func newHTTPSimple(b *Base) Obfs { <mask> return &httpObfs{Base: b} <mask> } <mask> <mask> func (h *httpObfs) initForConn() Obfs { <mask> return &httpObfs{ <mask> Base: h.Base, <mask> firstRequest: true, <mask> firstResponse: true, <mask> post: h.post, <mask> } <mask> } <mask> <mask> func (h *httpObfs) GetObfsOverhead() int { <mask> return 0 <mask> } </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove func (r *randomHead) initForConn() Obfs { return &randomHead{ Base: r.Base, firstRequest: true, firstResponse: true, } </s> add type randomHeadConn struct { net.Conn *randomHead hasSentHeader bool rawTransSent bool rawTransRecv bool buf []byte </s> remove func (h *httpObfs) GetObfsOverhead() int { return 0 </s> add func (h *httpObfs) StreamConn(c net.Conn) net.Conn { return &httpConn{Conn: c, httpObfs: h} </s> remove func init() { register("http_simple", newHTTPSimple) </s> add type httpObfs struct { *Base post bool </s> remove func (h *httpObfs) Decode(b []byte) ([]byte, bool, error) { if h.firstResponse { idx := bytes.Index(b, []byte("\r\n\r\n")) if idx == -1 { return nil, false, io.EOF </s> add func (c *httpConn) Read(b []byte) (int, error) { if c.buf != nil { n := copy(b, c.buf) if n == len(c.buf) { c.buf = nil } else { c.buf = c.buf[n:] </s> remove func (p *plain) initForConn() Obfs { return &plain{} } func (p *plain) GetObfsOverhead() int { return 0 } func (p *plain) Encode(b []byte) ([]byte, error) { return b, nil } func (p *plain) Decode(b []byte) ([]byte, bool, error) { return b, false, nil } </s> add func (p *plain) StreamConn(c net.Conn) net.Conn { return c }
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/obfs/http_simple.go
func (h *httpObfs) StreamConn(c net.Conn) net.Conn { return &httpConn{Conn: c, httpObfs: h}
<mask> post: h.post, <mask> } <mask> } <mask> <mask> func (h *httpObfs) GetObfsOverhead() int { <mask> return 0 <mask> } <mask> <mask> func (h *httpObfs) Decode(b []byte) ([]byte, bool, error) { <mask> if h.firstResponse { <mask> idx := bytes.Index(b, []byte("\r\n\r\n")) </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove func (h *httpObfs) Decode(b []byte) ([]byte, bool, error) { if h.firstResponse { idx := bytes.Index(b, []byte("\r\n\r\n")) if idx == -1 { return nil, false, io.EOF </s> add func (c *httpConn) Read(b []byte) (int, error) { if c.buf != nil { n := copy(b, c.buf) if n == len(c.buf) { c.buf = nil } else { c.buf = c.buf[n:] </s> remove h.firstResponse = false return b[idx+4:], false, nil </s> add return n, nil </s> remove func (h *httpObfs) initForConn() Obfs { return &httpObfs{ Base: h.Base, firstRequest: true, firstResponse: true, post: h.post, } </s> add type httpConn struct { net.Conn *httpObfs hasSentHeader bool hasRecvHeader bool buf []byte </s> remove return b, false, nil } </s> add </s> remove func (h *httpObfs) Encode(b []byte) ([]byte, error) { if h.firstRequest { bSize := len(b) var headData []byte </s> add if c.hasRecvHeader { return c.Conn.Read(b) }
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/obfs/http_simple.go
func (c *httpConn) Read(b []byte) (int, error) { if c.buf != nil { n := copy(b, c.buf) if n == len(c.buf) { c.buf = nil } else { c.buf = c.buf[n:]
<mask> func (h *httpObfs) GetObfsOverhead() int { <mask> return 0 <mask> } <mask> <mask> func (h *httpObfs) Decode(b []byte) ([]byte, bool, error) { <mask> if h.firstResponse { <mask> idx := bytes.Index(b, []byte("\r\n\r\n")) <mask> if idx == -1 { <mask> return nil, false, io.EOF <mask> } <mask> h.firstResponse = false <mask> return b[idx+4:], false, nil <mask> } <mask> return b, false, nil </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove h.firstResponse = false return b[idx+4:], false, nil </s> add return n, nil </s> remove func (h *httpObfs) GetObfsOverhead() int { return 0 </s> add func (h *httpObfs) StreamConn(c net.Conn) net.Conn { return &httpConn{Conn: c, httpObfs: h} </s> remove return b, false, nil } </s> add </s> remove func (h *httpObfs) Encode(b []byte) ([]byte, error) { if h.firstRequest { bSize := len(b) var headData []byte </s> add if c.hasRecvHeader { return c.Conn.Read(b) } </s> remove func (p *plain) initForConn() Obfs { return &plain{} } func (p *plain) GetObfsOverhead() int { return 0 } func (p *plain) Encode(b []byte) ([]byte, error) { return b, nil } func (p *plain) Decode(b []byte) ([]byte, bool, error) { return b, false, nil } </s> add func (p *plain) StreamConn(c net.Conn) net.Conn { return c }
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/obfs/http_simple.go
return n, nil
<mask> idx := bytes.Index(b, []byte("\r\n\r\n")) <mask> if idx == -1 { <mask> return nil, false, io.EOF <mask> } <mask> h.firstResponse = false <mask> return b[idx+4:], false, nil <mask> } <mask> return b, false, nil <mask> } <mask> <mask> func (h *httpObfs) Encode(b []byte) ([]byte, error) { </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove func (h *httpObfs) Decode(b []byte) ([]byte, bool, error) { if h.firstResponse { idx := bytes.Index(b, []byte("\r\n\r\n")) if idx == -1 { return nil, false, io.EOF </s> add func (c *httpConn) Read(b []byte) (int, error) { if c.buf != nil { n := copy(b, c.buf) if n == len(c.buf) { c.buf = nil } else { c.buf = c.buf[n:] </s> remove return b, false, nil } </s> add </s> remove func (h *httpObfs) GetObfsOverhead() int { return 0 </s> add func (h *httpObfs) StreamConn(c net.Conn) net.Conn { return &httpConn{Conn: c, httpObfs: h} </s> remove func (h *httpObfs) Encode(b []byte) ([]byte, error) { if h.firstRequest { bSize := len(b) var headData []byte </s> add if c.hasRecvHeader { return c.Conn.Read(b) } </s> remove func (p *plain) initForConn() Obfs { return &plain{} } func (p *plain) GetObfsOverhead() int { return 0 } func (p *plain) Encode(b []byte) ([]byte, error) { return b, nil } func (p *plain) Decode(b []byte) ([]byte, bool, error) { return b, false, nil } </s> add func (p *plain) StreamConn(c net.Conn) net.Conn { return c }
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/obfs/http_simple.go
<mask> } <mask> h.firstResponse = false <mask> return b[idx+4:], false, nil <mask> } <mask> return b, false, nil <mask> } <mask> <mask> func (h *httpObfs) Encode(b []byte) ([]byte, error) { <mask> if h.firstRequest { <mask> bSize := len(b) <mask> var headData []byte </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove h.firstResponse = false return b[idx+4:], false, nil </s> add return n, nil </s> remove func (h *httpObfs) Encode(b []byte) ([]byte, error) { if h.firstRequest { bSize := len(b) var headData []byte </s> add if c.hasRecvHeader { return c.Conn.Read(b) } </s> remove func (h *httpObfs) Decode(b []byte) ([]byte, bool, error) { if h.firstResponse { idx := bytes.Index(b, []byte("\r\n\r\n")) if idx == -1 { return nil, false, io.EOF </s> add func (c *httpConn) Read(b []byte) (int, error) { if c.buf != nil { n := copy(b, c.buf) if n == len(c.buf) { c.buf = nil } else { c.buf = c.buf[n:] </s> remove func (h *httpObfs) GetObfsOverhead() int { return 0 </s> add func (h *httpObfs) StreamConn(c net.Conn) net.Conn { return &httpConn{Conn: c, httpObfs: h} </s> remove func (p *plain) initForConn() Obfs { return &plain{} } func (p *plain) GetObfsOverhead() int { return 0 } func (p *plain) Encode(b []byte) ([]byte, error) { return b, nil } func (p *plain) Decode(b []byte) ([]byte, bool, error) { return b, false, nil } </s> add func (p *plain) StreamConn(c net.Conn) net.Conn { return c }
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/obfs/http_simple.go
if c.hasRecvHeader { return c.Conn.Read(b) }
<mask> } <mask> return b, false, nil <mask> } <mask> <mask> func (h *httpObfs) Encode(b []byte) ([]byte, error) { <mask> if h.firstRequest { <mask> bSize := len(b) <mask> var headData []byte <mask> <mask> if headSize := h.IVSize + h.HeadLen; bSize-headSize > 64 { <mask> headData = make([]byte, headSize+rand.Intn(64)) <mask> } else { <mask> headData = make([]byte, bSize) </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove if headSize := h.IVSize + h.HeadLen; bSize-headSize > 64 { headData = make([]byte, headSize+rand.Intn(64)) } else { headData = make([]byte, bSize) } copy(headData, b[:len(headData)]) host := h.Host var customHead string </s> add buf := pool.Get(pool.RelayBufferSize) defer pool.Put(buf) n, err := c.Conn.Read(buf) if err != nil { return 0, err } pos := bytes.Index(buf[:n], []byte("\r\n\r\n")) if pos == -1 { return 0, io.EOF } c.hasRecvHeader = true dataLength := n - pos - 4 n = copy(b, buf[4+pos:n]) if dataLength > n { c.buf = append(c.buf, buf[4+pos+n:4+pos+dataLength]...) } return n, nil } </s> remove return b, false, nil } </s> add </s> remove func (r *randomHead) Encode(b []byte) (encoded []byte, err error) { if !r.firstRequest { return b, nil } bSize := len(b) if r.headerSent { if bSize > 0 { d := make([]byte, len(r.buffer)+bSize) copy(d, r.buffer) copy(d[len(r.buffer):], b) r.buffer = d } else { encoded = r.buffer r.buffer = nil r.firstRequest = false } } else { size := rand.Intn(96) + 8 encoded = make([]byte, size) rand.Read(encoded) crc := (0xFFFFFFFF - crc32.ChecksumIEEE(encoded[:size-4])) & 0xFFFFFFFF binary.LittleEndian.PutUint32(encoded[size-4:], crc) d := make([]byte, bSize) copy(d, b) r.buffer = d </s> add func (c *randomHeadConn) Read(b []byte) (int, error) { if c.rawTransRecv { return c.Conn.Read(b) </s> remove func (h *httpObfs) Decode(b []byte) ([]byte, bool, error) { if h.firstResponse { idx := bytes.Index(b, []byte("\r\n\r\n")) if idx == -1 { return nil, false, io.EOF </s> add func (c *httpConn) Read(b []byte) (int, error) { if c.buf != nil { n := copy(b, c.buf) if n == len(c.buf) { c.buf = nil } else { c.buf = c.buf[n:] </s> remove h.firstResponse = false return b[idx+4:], false, nil </s> add return n, nil
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/obfs/http_simple.go
buf := pool.Get(pool.RelayBufferSize) defer pool.Put(buf) n, err := c.Conn.Read(buf) if err != nil { return 0, err } pos := bytes.Index(buf[:n], []byte("\r\n\r\n")) if pos == -1 { return 0, io.EOF } c.hasRecvHeader = true dataLength := n - pos - 4 n = copy(b, buf[4+pos:n]) if dataLength > n { c.buf = append(c.buf, buf[4+pos+n:4+pos+dataLength]...) } return n, nil }
<mask> if h.firstRequest { <mask> bSize := len(b) <mask> var headData []byte <mask> <mask> if headSize := h.IVSize + h.HeadLen; bSize-headSize > 64 { <mask> headData = make([]byte, headSize+rand.Intn(64)) <mask> } else { <mask> headData = make([]byte, bSize) <mask> } <mask> copy(headData, b[:len(headData)]) <mask> host := h.Host <mask> var customHead string <mask> <mask> if len(h.Param) > 0 { <mask> customHeads := strings.Split(h.Param, "#") <mask> if len(customHeads) > 2 { <mask> customHeads = customHeads[:2] </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove func (h *httpObfs) Encode(b []byte) ([]byte, error) { if h.firstRequest { bSize := len(b) var headData []byte </s> add if c.hasRecvHeader { return c.Conn.Read(b) } </s> remove if len(h.Param) > 0 { customHeads := strings.Split(h.Param, "#") if len(customHeads) > 2 { customHeads = customHeads[:2] } customHosts := h.Param if len(customHeads) > 1 { customHosts = customHeads[0] customHead = customHeads[1] } hosts := strings.Split(customHosts, ",") if len(hosts) > 0 { host = strings.TrimSpace(hosts[rand.Intn(len(hosts))]) } } </s> add func (c *httpConn) Write(b []byte) (int, error) { if c.hasSentHeader { return c.Conn.Write(b) } // 30: head length headLength := c.IVSize + 30 </s> remove method := "GET /" if h.post { method = "POST /" } requestPathIndex := rand.Intn(len(requestPath)/2) * 2 httpBuf := fmt.Sprintf("%s%s%s%s HTTP/1.1\r\nHost: %s:%d\r\n", method, requestPath[requestPathIndex], data2URLEncode(headData), requestPath[requestPathIndex+1], host, h.Port) if len(customHead) > 0 { httpBuf = httpBuf + strings.Replace(customHead, "\\n", "\r\n", -1) + "\r\n\r\n" } else { var contentType string if h.post { contentType = "Content-Type: multipart/form-data; boundary=" + boundary() + "\r\n" } httpBuf = httpBuf + "User-agent: " + requestUserAgent[rand.Intn(len(requestUserAgent))] + "\r\n" + "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\n" + "Accept-Language: en-US,en;q=0.8\r\n" + "Accept-Encoding: gzip, deflate\r\n" + contentType + "DNT: 1\r\n" + "Connection: keep-alive\r\n" + "\r\n" } </s> add bLength := len(b) headDataLength := bLength if bLength-headLength > 64 { headDataLength = headLength + rand.Intn(65) } headData := b[:headDataLength] b = b[headDataLength:] </s> remove var encoded []byte if len(headData) < bSize { encoded = make([]byte, len(httpBuf)+(bSize-len(headData))) copy(encoded, []byte(httpBuf)) copy(encoded[len(httpBuf):], b[len(headData):]) </s> add var body string host := c.Host if len(c.Param) > 0 { pos := strings.Index(c.Param, "#") if pos != -1 { body = strings.ReplaceAll(c.Param[pos+1:], "\n", "\r\n") body = strings.ReplaceAll(body, "\\n", "\r\n") host = c.Param[:pos] </s> remove return b, false, nil } </s> add
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/obfs/http_simple.go
func (c *httpConn) Write(b []byte) (int, error) { if c.hasSentHeader { return c.Conn.Write(b) } // 30: head length headLength := c.IVSize + 30
<mask> copy(headData, b[:len(headData)]) <mask> host := h.Host <mask> var customHead string <mask> <mask> if len(h.Param) > 0 { <mask> customHeads := strings.Split(h.Param, "#") <mask> if len(customHeads) > 2 { <mask> customHeads = customHeads[:2] <mask> } <mask> customHosts := h.Param <mask> if len(customHeads) > 1 { <mask> customHosts = customHeads[0] <mask> customHead = customHeads[1] <mask> } <mask> hosts := strings.Split(customHosts, ",") <mask> if len(hosts) > 0 { <mask> host = strings.TrimSpace(hosts[rand.Intn(len(hosts))]) <mask> } <mask> } <mask> <mask> method := "GET /" <mask> if h.post { <mask> method = "POST /" <mask> } </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove if headSize := h.IVSize + h.HeadLen; bSize-headSize > 64 { headData = make([]byte, headSize+rand.Intn(64)) } else { headData = make([]byte, bSize) } copy(headData, b[:len(headData)]) host := h.Host var customHead string </s> add buf := pool.Get(pool.RelayBufferSize) defer pool.Put(buf) n, err := c.Conn.Read(buf) if err != nil { return 0, err } pos := bytes.Index(buf[:n], []byte("\r\n\r\n")) if pos == -1 { return 0, io.EOF } c.hasRecvHeader = true dataLength := n - pos - 4 n = copy(b, buf[4+pos:n]) if dataLength > n { c.buf = append(c.buf, buf[4+pos+n:4+pos+dataLength]...) } return n, nil } </s> remove method := "GET /" if h.post { method = "POST /" } requestPathIndex := rand.Intn(len(requestPath)/2) * 2 httpBuf := fmt.Sprintf("%s%s%s%s HTTP/1.1\r\nHost: %s:%d\r\n", method, requestPath[requestPathIndex], data2URLEncode(headData), requestPath[requestPathIndex+1], host, h.Port) if len(customHead) > 0 { httpBuf = httpBuf + strings.Replace(customHead, "\\n", "\r\n", -1) + "\r\n\r\n" } else { var contentType string if h.post { contentType = "Content-Type: multipart/form-data; boundary=" + boundary() + "\r\n" } httpBuf = httpBuf + "User-agent: " + requestUserAgent[rand.Intn(len(requestUserAgent))] + "\r\n" + "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\n" + "Accept-Language: en-US,en;q=0.8\r\n" + "Accept-Encoding: gzip, deflate\r\n" + contentType + "DNT: 1\r\n" + "Connection: keep-alive\r\n" + "\r\n" } </s> add bLength := len(b) headDataLength := bLength if bLength-headLength > 64 { headDataLength = headLength + rand.Intn(65) } headData := b[:headDataLength] b = b[headDataLength:] </s> remove var encoded []byte if len(headData) < bSize { encoded = make([]byte, len(httpBuf)+(bSize-len(headData))) copy(encoded, []byte(httpBuf)) copy(encoded[len(httpBuf):], b[len(headData):]) </s> add var body string host := c.Host if len(c.Param) > 0 { pos := strings.Index(c.Param, "#") if pos != -1 { body = strings.ReplaceAll(c.Param[pos+1:], "\n", "\r\n") body = strings.ReplaceAll(body, "\\n", "\r\n") host = c.Param[:pos] </s> remove var dataPos int if dataLen > 0 && randLen > 0 { dataPos = 2 + getRandStartPos(&a.randomServer, randLen) } else { dataPos = 2 </s> add a.lastServerHash = serverHash pos := 2 if dataLength > 0 && randDataLength > 0 { pos += getRandStartPos(randDataLength, &a.randomServer) </s> remove hash := a.hmac(key, b[:length-2]) if !bytes.Equal(hash[:2], b[length-2:length]) { return nil, 0, errAuthChainHMACError </s> add serverHash := tools.HmacMD5(macKey, src.Bytes()[:length+2]) if !bytes.Equal(serverHash[:2], src.Bytes()[length+2:length+4]) { a.rawTrans = true src.Reset() return errAuthChainChksumError
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/obfs/http_simple.go
bLength := len(b) headDataLength := bLength if bLength-headLength > 64 { headDataLength = headLength + rand.Intn(65) } headData := b[:headDataLength] b = b[headDataLength:]
<mask> host = strings.TrimSpace(hosts[rand.Intn(len(hosts))]) <mask> } <mask> } <mask> <mask> method := "GET /" <mask> if h.post { <mask> method = "POST /" <mask> } <mask> requestPathIndex := rand.Intn(len(requestPath)/2) * 2 <mask> httpBuf := fmt.Sprintf("%s%s%s%s HTTP/1.1\r\nHost: %s:%d\r\n", <mask> method, <mask> requestPath[requestPathIndex], <mask> data2URLEncode(headData), <mask> requestPath[requestPathIndex+1], <mask> host, h.Port) <mask> if len(customHead) > 0 { <mask> httpBuf = httpBuf + strings.Replace(customHead, "\\n", "\r\n", -1) + "\r\n\r\n" <mask> } else { <mask> var contentType string <mask> if h.post { <mask> contentType = "Content-Type: multipart/form-data; boundary=" + boundary() + "\r\n" <mask> } <mask> httpBuf = httpBuf + "User-agent: " + requestUserAgent[rand.Intn(len(requestUserAgent))] + "\r\n" + <mask> "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\n" + <mask> "Accept-Language: en-US,en;q=0.8\r\n" + <mask> "Accept-Encoding: gzip, deflate\r\n" + <mask> contentType + <mask> "DNT: 1\r\n" + <mask> "Connection: keep-alive\r\n" + <mask> "\r\n" <mask> } <mask> <mask> var encoded []byte <mask> if len(headData) < bSize { <mask> encoded = make([]byte, len(httpBuf)+(bSize-len(headData))) <mask> copy(encoded, []byte(httpBuf)) </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove var encoded []byte if len(headData) < bSize { encoded = make([]byte, len(httpBuf)+(bSize-len(headData))) copy(encoded, []byte(httpBuf)) copy(encoded[len(httpBuf):], b[len(headData):]) </s> add var body string host := c.Host if len(c.Param) > 0 { pos := strings.Index(c.Param, "#") if pos != -1 { body = strings.ReplaceAll(c.Param[pos+1:], "\n", "\r\n") body = strings.ReplaceAll(body, "\\n", "\r\n") host = c.Param[:pos] </s> remove if len(h.Param) > 0 { customHeads := strings.Split(h.Param, "#") if len(customHeads) > 2 { customHeads = customHeads[:2] } customHosts := h.Param if len(customHeads) > 1 { customHosts = customHeads[0] customHead = customHeads[1] } hosts := strings.Split(customHosts, ",") if len(hosts) > 0 { host = strings.TrimSpace(hosts[rand.Intn(len(hosts))]) } } </s> add func (c *httpConn) Write(b []byte) (int, error) { if c.hasSentHeader { return c.Conn.Write(b) } // 30: head length headLength := c.IVSize + 30 </s> remove func (a *authSHA1V4) packAuthData(data []byte) (ret []byte) { dataSize := len(data) randSize := 1 if dataSize <= 1300 { if dataSize > 400 { randSize += rand.Intn(128) } else { randSize += rand.Intn(1024) } } dataOffset := randSize + 4 + 2 retSize := dataOffset + dataSize + 12 + tools.HmacSHA1Len ret = make([]byte, retSize) a.mutex.Lock() defer a.mutex.Unlock() a.connectionID++ if a.connectionID > 0xFF000000 { a.clientID = nil </s> add func (a *authSHA1V4) packAuthData(poolBuf *bytes.Buffer, data []byte) { dataLength := len(data) randDataLength := a.getRandDataLength(12 + dataLength) /* 2: uint16 BigEndian packedAuthDataLength 4: uint32 LittleEndian crc32Data 3: maxRandDataLengthPrefix (min: 1) 12: authDataLength 10: hmacSHA1DataLength */ packedAuthDataLength := 2 + 4 + 3 + randDataLength + 12 + dataLength + 10 if randDataLength < 128 { packedAuthDataLength -= 2 </s> remove return b, nil </s> add buf := tools.BufPool.Get().(*bytes.Buffer) defer tools.BufPool.Put(buf) defer buf.Reset() if c.post { buf.WriteString("POST /") } else { buf.WriteString("GET /") } packURLEncodedHeadData(buf, headData) buf.WriteString(" HTTP/1.1\r\nHost: " + host) if c.Port != 80 { buf.WriteString(":" + strconv.Itoa(c.Port)) } buf.WriteString("\r\n") if len(body) > 0 { buf.WriteString(body + "\r\n\r\n") } else { buf.WriteString("User-Agent: ") buf.WriteString(userAgent[rand.Intn(len(userAgent))]) buf.WriteString("\r\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\nAccept-Language: en-US,en;q=0.8\r\nAccept-Encoding: gzip, deflate\r\n") if c.post { packBoundary(buf) } buf.WriteString("DNT: 1\r\nConnection: keep-alive\r\n\r\n") } buf.Write(b) _, err := c.Conn.Write(buf.Bytes()) if err != nil { return 0, nil } c.hasSentHeader = true return bLength, nil </s> remove func (a *authChain) packData(outData []byte, data []byte, randLength int) { dataLength := len(data) outLength := randLength + dataLength + 2 outData[0] = byte(dataLength) ^ a.lastClientHash[14] outData[1] = byte(dataLength>>8) ^ a.lastClientHash[15] { if dataLength > 0 { randPart1Length := getRandStartPos(&a.randomClient, randLength) rand.Read(outData[2 : 2+randPart1Length]) a.enc.XORKeyStream(outData[2+randPart1Length:], data) rand.Read(outData[2+randPart1Length+dataLength : outLength]) } else { rand.Read(outData[2 : 2+randLength]) } } userKeyLen := uint8(len(a.userKey)) key := pool.Get(int(userKeyLen + 4)) defer pool.Put(key) copy(key, a.userKey) a.chunkID++ binary.LittleEndian.PutUint32(key[userKeyLen:], a.chunkID) a.lastClientHash = a.hmac(key, outData[:outLength]) copy(outData[outLength:], a.lastClientHash[:2]) </s> add originalLength := poolBuf.Len() binary.Write(poolBuf, binary.LittleEndian, length) a.putMixedRandDataAndData(poolBuf, data) a.lastClientHash = tools.HmacMD5(macKey, poolBuf.Bytes()[originalLength:]) poolBuf.Write(a.lastClientHash[:2])
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "re...
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/obfs/http_simple.go
var body string host := c.Host if len(c.Param) > 0 { pos := strings.Index(c.Param, "#") if pos != -1 { body = strings.ReplaceAll(c.Param[pos+1:], "\n", "\r\n") body = strings.ReplaceAll(body, "\\n", "\r\n") host = c.Param[:pos]
<mask> "Connection: keep-alive\r\n" + <mask> "\r\n" <mask> } <mask> <mask> var encoded []byte <mask> if len(headData) < bSize { <mask> encoded = make([]byte, len(httpBuf)+(bSize-len(headData))) <mask> copy(encoded, []byte(httpBuf)) <mask> copy(encoded[len(httpBuf):], b[len(headData):]) <mask> } else { <mask> encoded = []byte(httpBuf) <mask> } <mask> h.firstRequest = false <mask> return encoded, nil </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove encoded = []byte(httpBuf) </s> add host = c.Param </s> remove h.firstRequest = false return encoded, nil </s> add </s> remove method := "GET /" if h.post { method = "POST /" } requestPathIndex := rand.Intn(len(requestPath)/2) * 2 httpBuf := fmt.Sprintf("%s%s%s%s HTTP/1.1\r\nHost: %s:%d\r\n", method, requestPath[requestPathIndex], data2URLEncode(headData), requestPath[requestPathIndex+1], host, h.Port) if len(customHead) > 0 { httpBuf = httpBuf + strings.Replace(customHead, "\\n", "\r\n", -1) + "\r\n\r\n" } else { var contentType string if h.post { contentType = "Content-Type: multipart/form-data; boundary=" + boundary() + "\r\n" } httpBuf = httpBuf + "User-agent: " + requestUserAgent[rand.Intn(len(requestUserAgent))] + "\r\n" + "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\n" + "Accept-Language: en-US,en;q=0.8\r\n" + "Accept-Encoding: gzip, deflate\r\n" + contentType + "DNT: 1\r\n" + "Connection: keep-alive\r\n" + "\r\n" } </s> add bLength := len(b) headDataLength := bLength if bLength-headLength > 64 { headDataLength = headLength + rand.Intn(65) } headData := b[:headDataLength] b = b[headDataLength:] </s> remove func (r *randomHead) Encode(b []byte) (encoded []byte, err error) { if !r.firstRequest { return b, nil } bSize := len(b) if r.headerSent { if bSize > 0 { d := make([]byte, len(r.buffer)+bSize) copy(d, r.buffer) copy(d[len(r.buffer):], b) r.buffer = d } else { encoded = r.buffer r.buffer = nil r.firstRequest = false } } else { size := rand.Intn(96) + 8 encoded = make([]byte, size) rand.Read(encoded) crc := (0xFFFFFFFF - crc32.ChecksumIEEE(encoded[:size-4])) & 0xFFFFFFFF binary.LittleEndian.PutUint32(encoded[size-4:], crc) d := make([]byte, bSize) copy(d, b) r.buffer = d </s> add func (c *randomHeadConn) Read(b []byte) (int, error) { if c.rawTransRecv { return c.Conn.Read(b) </s> remove func (h *httpObfs) Encode(b []byte) ([]byte, error) { if h.firstRequest { bSize := len(b) var headData []byte </s> add if c.hasRecvHeader { return c.Conn.Read(b) }
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/obfs/http_simple.go
host = c.Param
<mask> encoded = make([]byte, len(httpBuf)+(bSize-len(headData))) <mask> copy(encoded, []byte(httpBuf)) <mask> copy(encoded[len(httpBuf):], b[len(headData):]) <mask> } else { <mask> encoded = []byte(httpBuf) <mask> } <mask> h.firstRequest = false <mask> return encoded, nil <mask> } <mask> </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove var encoded []byte if len(headData) < bSize { encoded = make([]byte, len(httpBuf)+(bSize-len(headData))) copy(encoded, []byte(httpBuf)) copy(encoded[len(httpBuf):], b[len(headData):]) </s> add var body string host := c.Host if len(c.Param) > 0 { pos := strings.Index(c.Param, "#") if pos != -1 { body = strings.ReplaceAll(c.Param[pos+1:], "\n", "\r\n") body = strings.ReplaceAll(body, "\\n", "\r\n") host = c.Param[:pos] </s> remove h.firstRequest = false return encoded, nil </s> add </s> remove func (r *randomHead) Encode(b []byte) (encoded []byte, err error) { if !r.firstRequest { return b, nil } bSize := len(b) if r.headerSent { if bSize > 0 { d := make([]byte, len(r.buffer)+bSize) copy(d, r.buffer) copy(d[len(r.buffer):], b) r.buffer = d } else { encoded = r.buffer r.buffer = nil r.firstRequest = false } } else { size := rand.Intn(96) + 8 encoded = make([]byte, size) rand.Read(encoded) crc := (0xFFFFFFFF - crc32.ChecksumIEEE(encoded[:size-4])) & 0xFFFFFFFF binary.LittleEndian.PutUint32(encoded[size-4:], crc) d := make([]byte, bSize) copy(d, b) r.buffer = d </s> add func (c *randomHeadConn) Read(b []byte) (int, error) { if c.rawTransRecv { return c.Conn.Read(b) </s> remove method := "GET /" if h.post { method = "POST /" } requestPathIndex := rand.Intn(len(requestPath)/2) * 2 httpBuf := fmt.Sprintf("%s%s%s%s HTTP/1.1\r\nHost: %s:%d\r\n", method, requestPath[requestPathIndex], data2URLEncode(headData), requestPath[requestPathIndex+1], host, h.Port) if len(customHead) > 0 { httpBuf = httpBuf + strings.Replace(customHead, "\\n", "\r\n", -1) + "\r\n\r\n" } else { var contentType string if h.post { contentType = "Content-Type: multipart/form-data; boundary=" + boundary() + "\r\n" } httpBuf = httpBuf + "User-agent: " + requestUserAgent[rand.Intn(len(requestUserAgent))] + "\r\n" + "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\n" + "Accept-Language: en-US,en;q=0.8\r\n" + "Accept-Encoding: gzip, deflate\r\n" + contentType + "DNT: 1\r\n" + "Connection: keep-alive\r\n" + "\r\n" } </s> add bLength := len(b) headDataLength := bLength if bLength-headLength > 64 { headDataLength = headLength + rand.Intn(65) } headData := b[:headDataLength] b = b[headDataLength:] </s> remove return b, nil </s> add buf := tools.BufPool.Get().(*bytes.Buffer) defer tools.BufPool.Put(buf) defer buf.Reset() if c.post { buf.WriteString("POST /") } else { buf.WriteString("GET /") } packURLEncodedHeadData(buf, headData) buf.WriteString(" HTTP/1.1\r\nHost: " + host) if c.Port != 80 { buf.WriteString(":" + strconv.Itoa(c.Port)) } buf.WriteString("\r\n") if len(body) > 0 { buf.WriteString(body + "\r\n\r\n") } else { buf.WriteString("User-Agent: ") buf.WriteString(userAgent[rand.Intn(len(userAgent))]) buf.WriteString("\r\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\nAccept-Language: en-US,en;q=0.8\r\nAccept-Encoding: gzip, deflate\r\n") if c.post { packBoundary(buf) } buf.WriteString("DNT: 1\r\nConnection: keep-alive\r\n\r\n") } buf.Write(b) _, err := c.Conn.Write(buf.Bytes()) if err != nil { return 0, nil } c.hasSentHeader = true return bLength, nil
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/obfs/http_simple.go
<mask> copy(encoded[len(httpBuf):], b[len(headData):]) <mask> } else { <mask> encoded = []byte(httpBuf) <mask> } <mask> h.firstRequest = false <mask> return encoded, nil <mask> } <mask> <mask> return b, nil <mask> } <mask> </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove encoded = []byte(httpBuf) </s> add host = c.Param </s> remove var encoded []byte if len(headData) < bSize { encoded = make([]byte, len(httpBuf)+(bSize-len(headData))) copy(encoded, []byte(httpBuf)) copy(encoded[len(httpBuf):], b[len(headData):]) </s> add var body string host := c.Host if len(c.Param) > 0 { pos := strings.Index(c.Param, "#") if pos != -1 { body = strings.ReplaceAll(c.Param[pos+1:], "\n", "\r\n") body = strings.ReplaceAll(body, "\\n", "\r\n") host = c.Param[:pos] </s> remove func (r *randomHead) Encode(b []byte) (encoded []byte, err error) { if !r.firstRequest { return b, nil } bSize := len(b) if r.headerSent { if bSize > 0 { d := make([]byte, len(r.buffer)+bSize) copy(d, r.buffer) copy(d[len(r.buffer):], b) r.buffer = d } else { encoded = r.buffer r.buffer = nil r.firstRequest = false } } else { size := rand.Intn(96) + 8 encoded = make([]byte, size) rand.Read(encoded) crc := (0xFFFFFFFF - crc32.ChecksumIEEE(encoded[:size-4])) & 0xFFFFFFFF binary.LittleEndian.PutUint32(encoded[size-4:], crc) d := make([]byte, bSize) copy(d, b) r.buffer = d </s> add func (c *randomHeadConn) Read(b []byte) (int, error) { if c.rawTransRecv { return c.Conn.Read(b) </s> remove return b, nil </s> add buf := tools.BufPool.Get().(*bytes.Buffer) defer tools.BufPool.Put(buf) defer buf.Reset() if c.post { buf.WriteString("POST /") } else { buf.WriteString("GET /") } packURLEncodedHeadData(buf, headData) buf.WriteString(" HTTP/1.1\r\nHost: " + host) if c.Port != 80 { buf.WriteString(":" + strconv.Itoa(c.Port)) } buf.WriteString("\r\n") if len(body) > 0 { buf.WriteString(body + "\r\n\r\n") } else { buf.WriteString("User-Agent: ") buf.WriteString(userAgent[rand.Intn(len(userAgent))]) buf.WriteString("\r\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\nAccept-Language: en-US,en;q=0.8\r\nAccept-Encoding: gzip, deflate\r\n") if c.post { packBoundary(buf) } buf.WriteString("DNT: 1\r\nConnection: keep-alive\r\n\r\n") } buf.Write(b) _, err := c.Conn.Write(buf.Bytes()) if err != nil { return 0, nil } c.hasSentHeader = true return bLength, nil </s> remove return b, false, nil } </s> add
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/obfs/http_simple.go
hosts := strings.Split(host, ",") host = hosts[rand.Intn(len(hosts))]
<mask> } <mask> } <mask> <mask> buf := tools.BufPool.Get().(*bytes.Buffer) <mask> defer tools.BufPool.Put(buf) <mask> defer buf.Reset() </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove buf := pool.Get(pool.RelayBufferSize) defer pool.Put(buf) buf, err := c.EncodePacket(b) </s> add buf := tools.BufPool.Get().(*bytes.Buffer) defer tools.BufPool.Put(buf) defer buf.Reset() err := c.EncodePacket(buf, b) </s> remove encoded, err := c.Encode(b) </s> add bLength := len(b) buf := tools.BufPool.Get().(*bytes.Buffer) defer tools.BufPool.Put(buf) defer buf.Reset() err := c.Encode(buf, b) </s> remove return b, nil </s> add buf := tools.BufPool.Get().(*bytes.Buffer) defer tools.BufPool.Put(buf) defer buf.Reset() if c.post { buf.WriteString("POST /") } else { buf.WriteString("GET /") } packURLEncodedHeadData(buf, headData) buf.WriteString(" HTTP/1.1\r\nHost: " + host) if c.Port != 80 { buf.WriteString(":" + strconv.Itoa(c.Port)) } buf.WriteString("\r\n") if len(body) > 0 { buf.WriteString(body + "\r\n\r\n") } else { buf.WriteString("User-Agent: ") buf.WriteString(userAgent[rand.Intn(len(userAgent))]) buf.WriteString("\r\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\nAccept-Language: en-US,en;q=0.8\r\nAccept-Encoding: gzip, deflate\r\n") if c.post { packBoundary(buf) } buf.WriteString("DNT: 1\r\nConnection: keep-alive\r\n\r\n") } buf.Write(b) _, err := c.Conn.Write(buf.Bytes()) if err != nil { return 0, nil } c.hasSentHeader = true return bLength, nil </s> remove hash := a.hmac(a.Key, authData) uid := pool.Get(4) defer pool.Put(uid) for i := 0; i < 4; i++ { uid[i] = a.uid[i] ^ hash[i] } </s> add </s> remove r.headerSent = true return encoded, nil </s> add buf := pool.Get(pool.RelayBufferSize) defer pool.Put(buf) c.Conn.Read(buf) c.rawTransRecv = true c.Write(nil) return 0, nil
[ "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/obfs/http_simple.go
buf := tools.BufPool.Get().(*bytes.Buffer) defer tools.BufPool.Put(buf) defer buf.Reset() if c.post { buf.WriteString("POST /") } else { buf.WriteString("GET /") } packURLEncodedHeadData(buf, headData) buf.WriteString(" HTTP/1.1\r\nHost: " + host) if c.Port != 80 { buf.WriteString(":" + strconv.Itoa(c.Port)) } buf.WriteString("\r\n") if len(body) > 0 { buf.WriteString(body + "\r\n\r\n") } else { buf.WriteString("User-Agent: ") buf.WriteString(userAgent[rand.Intn(len(userAgent))]) buf.WriteString("\r\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\nAccept-Language: en-US,en;q=0.8\r\nAccept-Encoding: gzip, deflate\r\n") if c.post { packBoundary(buf) } buf.WriteString("DNT: 1\r\nConnection: keep-alive\r\n\r\n") } buf.Write(b) _, err := c.Conn.Write(buf.Bytes()) if err != nil { return 0, nil } c.hasSentHeader = true return bLength, nil
<mask> h.firstRequest = false <mask> return encoded, nil <mask> } <mask> <mask> return b, nil <mask> } <mask> <mask> func data2URLEncode(data []byte) (ret string) { <mask> for i := 0; i < len(data); i++ { <mask> ret = fmt.Sprintf("%s%%%s", ret, hex.EncodeToString([]byte{data[i]})) </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove return </s> add </s> remove func data2URLEncode(data []byte) (ret string) { for i := 0; i < len(data); i++ { ret = fmt.Sprintf("%s%%%s", ret, hex.EncodeToString([]byte{data[i]})) </s> add func packURLEncodedHeadData(buf *bytes.Buffer, data []byte) { dataLength := len(data) for i := 0; i < dataLength; i++ { buf.WriteRune('%') buf.WriteString(hex.EncodeToString(data[i : i+1])) </s> remove func boundary() (ret string) { </s> add func packBoundary(buf *bytes.Buffer) { buf.WriteString("Content-Type: multipart/form-data; boundary=") </s> remove ret = fmt.Sprintf("%s%c", ret, set[rand.Intn(len(set))]) </s> add buf.WriteByte(set[rand.Intn(62)]) </s> remove return </s> add buf.WriteString("\r\n")
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/obfs/http_simple.go
func packURLEncodedHeadData(buf *bytes.Buffer, data []byte) { dataLength := len(data) for i := 0; i < dataLength; i++ { buf.WriteRune('%') buf.WriteString(hex.EncodeToString(data[i : i+1]))
<mask> <mask> return b, nil <mask> } <mask> <mask> func data2URLEncode(data []byte) (ret string) { <mask> for i := 0; i < len(data); i++ { <mask> ret = fmt.Sprintf("%s%%%s", ret, hex.EncodeToString([]byte{data[i]})) <mask> } <mask> return <mask> } <mask> <mask> func boundary() (ret string) { </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove return </s> add </s> remove func boundary() (ret string) { </s> add func packBoundary(buf *bytes.Buffer) { buf.WriteString("Content-Type: multipart/form-data; boundary=") </s> remove ret = fmt.Sprintf("%s%c", ret, set[rand.Intn(len(set))]) </s> add buf.WriteByte(set[rand.Intn(62)]) </s> remove return b, nil </s> add buf := tools.BufPool.Get().(*bytes.Buffer) defer tools.BufPool.Put(buf) defer buf.Reset() if c.post { buf.WriteString("POST /") } else { buf.WriteString("GET /") } packURLEncodedHeadData(buf, headData) buf.WriteString(" HTTP/1.1\r\nHost: " + host) if c.Port != 80 { buf.WriteString(":" + strconv.Itoa(c.Port)) } buf.WriteString("\r\n") if len(body) > 0 { buf.WriteString(body + "\r\n\r\n") } else { buf.WriteString("User-Agent: ") buf.WriteString(userAgent[rand.Intn(len(userAgent))]) buf.WriteString("\r\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\nAccept-Language: en-US,en;q=0.8\r\nAccept-Encoding: gzip, deflate\r\n") if c.post { packBoundary(buf) } buf.WriteString("DNT: 1\r\nConnection: keep-alive\r\n\r\n") } buf.Write(b) _, err := c.Conn.Write(buf.Bytes()) if err != nil { return 0, nil } c.hasSentHeader = true return bLength, nil </s> remove return </s> add buf.WriteString("\r\n")
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/obfs/http_simple.go
<mask> func data2URLEncode(data []byte) (ret string) { <mask> for i := 0; i < len(data); i++ { <mask> ret = fmt.Sprintf("%s%%%s", ret, hex.EncodeToString([]byte{data[i]})) <mask> } <mask> return <mask> } <mask> <mask> func boundary() (ret string) { <mask> set := "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789" <mask> for i := 0; i < 32; i++ { </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove func data2URLEncode(data []byte) (ret string) { for i := 0; i < len(data); i++ { ret = fmt.Sprintf("%s%%%s", ret, hex.EncodeToString([]byte{data[i]})) </s> add func packURLEncodedHeadData(buf *bytes.Buffer, data []byte) { dataLength := len(data) for i := 0; i < dataLength; i++ { buf.WriteRune('%') buf.WriteString(hex.EncodeToString(data[i : i+1])) </s> remove ret = fmt.Sprintf("%s%c", ret, set[rand.Intn(len(set))]) </s> add buf.WriteByte(set[rand.Intn(62)]) </s> remove func boundary() (ret string) { </s> add func packBoundary(buf *bytes.Buffer) { buf.WriteString("Content-Type: multipart/form-data; boundary=") </s> remove return </s> add buf.WriteString("\r\n") </s> remove return b, nil </s> add buf := tools.BufPool.Get().(*bytes.Buffer) defer tools.BufPool.Put(buf) defer buf.Reset() if c.post { buf.WriteString("POST /") } else { buf.WriteString("GET /") } packURLEncodedHeadData(buf, headData) buf.WriteString(" HTTP/1.1\r\nHost: " + host) if c.Port != 80 { buf.WriteString(":" + strconv.Itoa(c.Port)) } buf.WriteString("\r\n") if len(body) > 0 { buf.WriteString(body + "\r\n\r\n") } else { buf.WriteString("User-Agent: ") buf.WriteString(userAgent[rand.Intn(len(userAgent))]) buf.WriteString("\r\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\nAccept-Language: en-US,en;q=0.8\r\nAccept-Encoding: gzip, deflate\r\n") if c.post { packBoundary(buf) } buf.WriteString("DNT: 1\r\nConnection: keep-alive\r\n\r\n") } buf.Write(b) _, err := c.Conn.Write(buf.Bytes()) if err != nil { return 0, nil } c.hasSentHeader = true return bLength, nil
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/obfs/http_simple.go
func packBoundary(buf *bytes.Buffer) { buf.WriteString("Content-Type: multipart/form-data; boundary=")
<mask> } <mask> return <mask> } <mask> <mask> func boundary() (ret string) { <mask> set := "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789" <mask> for i := 0; i < 32; i++ { <mask> ret = fmt.Sprintf("%s%c", ret, set[rand.Intn(len(set))]) <mask> } <mask> return </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove ret = fmt.Sprintf("%s%c", ret, set[rand.Intn(len(set))]) </s> add buf.WriteByte(set[rand.Intn(62)]) </s> remove return </s> add </s> remove return </s> add buf.WriteString("\r\n") </s> remove func data2URLEncode(data []byte) (ret string) { for i := 0; i < len(data); i++ { ret = fmt.Sprintf("%s%%%s", ret, hex.EncodeToString([]byte{data[i]})) </s> add func packURLEncodedHeadData(buf *bytes.Buffer, data []byte) { dataLength := len(data) for i := 0; i < dataLength; i++ { buf.WriteRune('%') buf.WriteString(hex.EncodeToString(data[i : i+1])) </s> remove return b, nil </s> add buf := tools.BufPool.Get().(*bytes.Buffer) defer tools.BufPool.Put(buf) defer buf.Reset() if c.post { buf.WriteString("POST /") } else { buf.WriteString("GET /") } packURLEncodedHeadData(buf, headData) buf.WriteString(" HTTP/1.1\r\nHost: " + host) if c.Port != 80 { buf.WriteString(":" + strconv.Itoa(c.Port)) } buf.WriteString("\r\n") if len(body) > 0 { buf.WriteString(body + "\r\n\r\n") } else { buf.WriteString("User-Agent: ") buf.WriteString(userAgent[rand.Intn(len(userAgent))]) buf.WriteString("\r\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\nAccept-Language: en-US,en;q=0.8\r\nAccept-Encoding: gzip, deflate\r\n") if c.post { packBoundary(buf) } buf.WriteString("DNT: 1\r\nConnection: keep-alive\r\n\r\n") } buf.Write(b) _, err := c.Conn.Write(buf.Bytes()) if err != nil { return 0, nil } c.hasSentHeader = true return bLength, nil
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/obfs/http_simple.go
buf.WriteByte(set[rand.Intn(62)])
<mask> <mask> func boundary() (ret string) { <mask> set := "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789" <mask> for i := 0; i < 32; i++ { <mask> ret = fmt.Sprintf("%s%c", ret, set[rand.Intn(len(set))]) <mask> } <mask> return <mask> } <mask> <mask> var ( </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove func boundary() (ret string) { </s> add func packBoundary(buf *bytes.Buffer) { buf.WriteString("Content-Type: multipart/form-data; boundary=") </s> remove return </s> add </s> remove return </s> add buf.WriteString("\r\n") </s> remove func data2URLEncode(data []byte) (ret string) { for i := 0; i < len(data); i++ { ret = fmt.Sprintf("%s%%%s", ret, hex.EncodeToString([]byte{data[i]})) </s> add func packURLEncodedHeadData(buf *bytes.Buffer, data []byte) { dataLength := len(data) for i := 0; i < dataLength; i++ { buf.WriteRune('%') buf.WriteString(hex.EncodeToString(data[i : i+1])) </s> remove return b, nil </s> add buf := tools.BufPool.Get().(*bytes.Buffer) defer tools.BufPool.Put(buf) defer buf.Reset() if c.post { buf.WriteString("POST /") } else { buf.WriteString("GET /") } packURLEncodedHeadData(buf, headData) buf.WriteString(" HTTP/1.1\r\nHost: " + host) if c.Port != 80 { buf.WriteString(":" + strconv.Itoa(c.Port)) } buf.WriteString("\r\n") if len(body) > 0 { buf.WriteString(body + "\r\n\r\n") } else { buf.WriteString("User-Agent: ") buf.WriteString(userAgent[rand.Intn(len(userAgent))]) buf.WriteString("\r\nAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\nAccept-Language: en-US,en;q=0.8\r\nAccept-Encoding: gzip, deflate\r\n") if c.post { packBoundary(buf) } buf.WriteString("DNT: 1\r\nConnection: keep-alive\r\n\r\n") } buf.Write(b) _, err := c.Conn.Write(buf.Bytes()) if err != nil { return 0, nil } c.hasSentHeader = true return bLength, nil
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/obfs/http_simple.go
buf.WriteString("\r\n")
<mask> set := "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789" <mask> for i := 0; i < 32; i++ { <mask> ret = fmt.Sprintf("%s%c", ret, set[rand.Intn(len(set))]) <mask> } <mask> return <mask> } <mask> <mask> var ( <mask> requestPath = []string{ <mask> "", "", </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove ret = fmt.Sprintf("%s%c", ret, set[rand.Intn(len(set))]) </s> add buf.WriteByte(set[rand.Intn(62)]) </s> remove func boundary() (ret string) { </s> add func packBoundary(buf *bytes.Buffer) { buf.WriteString("Content-Type: multipart/form-data; boundary=") </s> remove return </s> add </s> remove func data2URLEncode(data []byte) (ret string) { for i := 0; i < len(data); i++ { ret = fmt.Sprintf("%s%%%s", ret, hex.EncodeToString([]byte{data[i]})) </s> add func packURLEncodedHeadData(buf *bytes.Buffer, data []byte) { dataLength := len(data) for i := 0; i < dataLength; i++ { buf.WriteRune('%') buf.WriteString(hex.EncodeToString(data[i : i+1])) </s> remove sort.Ints(r.dataSizeList) </s> add p.iv = iv p.randDataLength = p.getRandLength p.initDataSize() return &Conn{Conn: c, Protocol: p} } func (a *authChainB) initDataSize() { a.dataSizeList = a.dataSizeList[:0] a.dataSizeList2 = a.dataSizeList2[:0]
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/obfs/http_simple.go
var userAgent = []string{ "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.162 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.85 Safari/537.36", "Mozilla/5.0 (Linux; Android 7.0; Moto C Build/NRD90M.059) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Mobile Safari/537.36", "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.106 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36", "Mozilla/5.0 (Linux; Android 6.0.1; SM-G532M Build/MMB29T; wv) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/55.0.2883.91 Mobile Safari/537.36", "Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.101 Safari/537.36", "Mozilla/5.0 (Windows NT 6.2; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.111 Safari/537.36", "Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.94 Safari/537.36", "Mozilla/5.0 (Linux; Android 5.1.1; SM-J120M Build/LMY47X) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Mobile Safari/537.36", "Mozilla/5.0 (Windows NT 6.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36", "Mozilla/5.0 (Linux; Android 7.0; Moto G (5) Build/NPPS25.137-93-14) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Mobile Safari/537.36", "Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.106 Safari/537.36", "Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.181 Safari/537.36", "Mozilla/5.0 (Linux; Android 7.0; SM-G570M) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.80 Mobile Safari/537.36", "Mozilla/5.0 (Windows NT 5.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36", "Mozilla/5.0 (Windows NT 10.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36", "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.112 Safari/537.36", "Mozilla/5.0 (Linux; Android 6.0; CAM-L03 Build/HUAWEICAM-L03) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Mobile Safari/537.36", "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.76 Safari/537.36", "Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.117 Safari/537.36", "Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US) AppleWebKit/534.3 (KHTML, like Gecko) Chrome/6.0.472.63 Safari/534.3", "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Safari/537.36", "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36", "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.106 Safari/537.36", "Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7", "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2743.116 Safari/537.36", "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.75 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2840.71 Safari/537.36", "Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.3 (KHTML, like Gecko) Chrome/6.0.472.63 Safari/534.3", "Mozilla/5.0 (Linux; Android 8.0.0; FIG-LX3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.80 Mobile Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.115 Safari/537.36", "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2743.116 Safari/537.36", "Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10", "Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.90 Safari/537.36", "Mozilla/5.0 (X11; U; Linux x86_64; en-US) AppleWebKit/533.2 (KHTML, like Gecko) Chrome/5.0.342.1 Safari/533.2", "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36", "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.110 Safari/537.36", "Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.89 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.81 Safari/537.36", "Mozilla/5.0 (X11; Datanyze; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.181 Safari/537.36", "Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36", "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2840.71 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.1916.153 Safari/537.36", "Mozilla/5.0 (Linux; Android 5.1.1; SM-J111M Build/LMY47V) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Mobile Safari/537.36", "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36", "Mozilla/5.0 (Windows NT 6.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.106 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.181 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2062.120 Safari/537.36", "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2840.99 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/32.0.1700.107 Safari/537.36", "Mozilla/5.0 (Windows NT 10.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36", "Mozilla/5.0 (Linux; Android 6.0.1; SM-J700M Build/MMB29K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Mobile Safari/537.36", "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.63 Safari/537.36", "Mozilla/5.0 (X11; Linux i686) AppleWebKit/534.30 (KHTML, like Gecko) Slackware/Chrome/12.0.742.100 Safari/534.30", "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36", "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.167 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/48.0.2564.116 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/50.0.2661.102 Safari/537.36", "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/53.0.2785.143 Safari/537.36", "Mozilla/5.0 (X11; Linux i686) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.100 Safari/534.30", "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36", "Mozilla/5.0 (Linux; Android 8.0.0; WAS-LX3 Build/HUAWEIWAS-LX3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Mobile Safari/537.36", "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2840.99 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.87 Safari/537.36", "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/50.0.2661.102 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.57 Safari/537.36", "Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.99 Safari/537.36", "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.101 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.1805 Safari/537.36 MVisionPlayer/1.0.0.0", "Mozilla/5.0 (Linux; Android 7.0; TRT-LX3 Build/HUAWEITRT-LX3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Mobile Safari/537.36", "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.89 Safari/537.36", "Mozilla/5.0 (Linux; Android 6.0; vivo 1610 Build/MMB29M) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/53.0.2785.124 Mobile Safari/537.36", "Mozilla/5.0 (Windows NT 6.2; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/56.0.2924.87 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36", "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.111 Safari/537.36", "Mozilla/5.0 (Linux; Android 4.4.2; de-de; SAMSUNG GT-I9195 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36", "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.110 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36", "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.90 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.110 Safari/537.36", "Mozilla/5.0 (Linux; Android 8.0.0; ANE-LX3 Build/HUAWEIANE-LX3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Mobile Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.112 Safari/537.36", "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/56.0.2924.87 Safari/537.36", "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.87 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/53.0.2785.143 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/56.0.2924.87 Safari/537.36", "Mozilla/5.0 (X11; U; Linux i586; en-US) AppleWebKit/533.2 (KHTML, like Gecko) Chrome/5.0.342.1 Safari/533.2", "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/43.0.2357.65 Safari/537.36", "Mozilla/5.0 (Linux; Android 7.0; SM-G610M) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.80 Mobile Safari/537.36", "Mozilla/5.0 (Linux; Android 6.0.1; SM-J500M Build/MMB29M) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Mobile Safari/537.36", "Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7", "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.104 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.115 Safari/537.36", "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/56.0.2924.87 Safari/537.36", "Mozilla/5.0 (Linux; Android 6.0; vivo 1606 Build/MMB29M) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/53.0.2785.124 Mobile Safari/537.36", "Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Safari/537.36", "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36", "Mozilla/5.0 (Linux; Android 7.0; SM-G610M Build/NRD90M) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Mobile Safari/537.36", "Mozilla/5.0 (Linux; Android 7.1; vivo 1716 Build/N2G47H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.98 Mobile Safari/537.36", "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/56.0.2924.87 Safari/537.36", "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Safari/537.36", "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.93 Safari/537.36", "Mozilla/5.0 (Linux; Android 7.0; SM-G570M Build/NRD90M) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Mobile Safari/537.36", "Mozilla/5.0 (Windows NT 6.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.90 Safari/537.36", "Mozilla/5.0 (Linux; Android 6.0; MYA-L22 Build/HUAWEIMYA-L22) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.84 Mobile Safari/537.36", "Mozilla/5.0 (Linux; Android 5.1; A1601 Build/LMY47I) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2743.98 Mobile Safari/537.36", "Mozilla/5.0 (Linux; Android 7.0; TRT-LX2 Build/HUAWEITRT-LX2; wv) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/59.0.3071.125 Mobile Safari/537.36", "Mozilla/5.0 (Windows NT 6.2; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Safari/537.36", "Mozilla/5.0 (Windows NT 6.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Safari/537.36", "Mozilla/5.0 (Windows NT 5.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Safari/537.36", "Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36", "Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.17 (KHTML, like Gecko) Chrome/10.0.649.0 Safari/534.17", "Mozilla/5.0 (Linux; Android 6.0; CAM-L21 Build/HUAWEICAM-L21; wv) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/62.0.3202.84 Mobile Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.94 Safari/537.36", "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.3 Safari/534.24", "Mozilla/5.0 (Linux; Android 7.1.2; Redmi 4X Build/N2G47H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.111 Mobile Safari/537.36", "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.106 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.181 Safari/537.36", "Mozilla/5.0 (Linux; Android 4.4.2; SM-G7102 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.84 Mobile Safari/537.36", "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/48.0.2564.109 Safari/537.36", "Mozilla/5.0 (Linux; Android 5.1; HUAWEI CUN-L22 Build/HUAWEICUN-L22; wv) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/62.0.3202.84 Mobile Safari/537.36", "Mozilla/5.0 (Linux; Android 5.1.1; A37fw Build/LMY47V) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.84 Mobile Safari/537.36", "Mozilla/5.0 (Linux; Android 7.0; SM-J730GM Build/NRD90M) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.111 Mobile Safari/537.36", "Mozilla/5.0 (Linux; Android 7.0; SM-G610F Build/NRD90M) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.111 Mobile Safari/537.36", "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.101 Safari/537.36", "Mozilla/5.0 (Linux; Android 7.1.2; Redmi Note 5A Build/N2G47H; wv) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/63.0.3239.111 Mobile Safari/537.36", "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36", "Mozilla/5.0 (Linux; Android 7.0; Redmi Note 4 Build/NRD90M) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.111 Mobile Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.106 Safari/537.36", "Mozilla/5.0 (Unknown; Linux) AppleWebKit/538.1 (KHTML, like Gecko) Chrome/v1.0.0 Safari/538.1", "Mozilla/5.0 (Linux; Android 7.0; BLL-L22 Build/HUAWEIBLL-L22) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.91 Mobile Safari/537.36", "Mozilla/5.0 (Linux; Android 7.0; SM-J710F Build/NRD90M) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.84 Mobile Safari/537.36", "Mozilla/5.0 (Linux; Android 6.0.1; SM-G532M Build/MMB29T) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.91 Mobile Safari/537.36", "Mozilla/5.0 (Linux; Android 7.1.1; CPH1723 Build/N6F26Q) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.98 Mobile Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.118 Safari/537.36", "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.79 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.101 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/50.0.2661.94 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.139 Safari/537.36", "Mozilla/5.0 (Linux; Android 8.0.0; FIG-LX3 Build/HUAWEIFIG-LX3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Mobile Safari/537.36", "Mozilla/5.0 (Windows; U; Windows NT 6.1; de-DE) AppleWebKit/534.17 (KHTML, like Gecko) Chrome/10.0.649.0 Safari/534.17", "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2743.116 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.63 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.36", "Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.67 Safari/537.36", "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.94 Safari/537.36", "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.110 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.99 Safari/537.36", "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2840.99 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.67 Safari/537.36", "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36", "Mozilla/5.0 (Windows NT 10.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.67 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36", "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.67 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/43.0.2357.65 Safari/537.36", "Mozilla/5.0 (Linux; Android 7.1; Mi A1 Build/N2G47H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.83 Mobile Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.117 Safari/537.36", "Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.181 Safari/537.36", "Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US) AppleWebKit/533.4 (KHTML, like Gecko) Chrome/5.0.375.99 Safari/533.4", "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.125 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.89 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.111 Safari/537.36 MVisionPlayer/1.0.0.0", "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.103 Safari/537.36", "Mozilla/5.0 (Linux; Android 5.1; A37f Build/LMY47V) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/43.0.2357.93 Mobile Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/56.0.2924.87 Safari/537.36", "Mozilla/5.0 (Windows NT 6.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36", "Mozilla/5.0 (Windows NT 6.2; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.100 Safari/537.36", "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.110 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.76 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Safari/537.36", "Mozilla/5.0 (Windows NT 5.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36", "Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36", "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36", "Mozilla/5.0 (Linux; Android 6.0.1; CPH1607 Build/MMB29M; wv) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/63.0.3239.111 Mobile Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2840.99 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36", "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.100 Safari/537.36", "Mozilla/5.0 (Linux; Android 6.0.1; vivo 1603 Build/MMB29M) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.83 Mobile Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36", "Mozilla/5.0 (Linux; Android 6.0.1; SM-G532M Build/MMB29T) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Mobile Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36", "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36", "Mozilla/5.0 (Linux; Android 6.0.1; Redmi 4A Build/MMB29M; wv) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/60.0.3112.116 Mobile Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.103 Safari/537.36", "Mozilla/5.0 (Windows NT 6.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.112 Safari/537.36", "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.90 Safari/537.36", "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.157 Safari/537.36", "Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.71 Safari/537.36", "Mozilla/5.0 (Windows NT 5.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.90 Safari/537.36", "Mozilla/5.0 (Windows NT 6.2; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.90 Safari/537.36", "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36", "Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36", "Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.90 Safari/537.36", "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36", "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36", "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.90 Safari/537.36", "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36", "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.99 Safari/537.36", "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.100 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36", "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.31 (KHTML, like Gecko) Chrome/26.0.1410.64 Safari/537.31", "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36", "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36", "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36", "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.115 Safari/537.36", "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.106 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.143 Safari/537.36", "Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.112 Safari/537.36", "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.67 Safari/537.36", "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.181 Safari/537.36", "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.181 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.99 Safari/537.36", "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2743.116 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.106 Safari/537.36", "Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36", "Mozilla/5.0 (Linux; Android 6.0.1; SM-G532G Build/MMB29T) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.83 Mobile Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/48.0.2564.109 Safari/537.36", "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.117 Safari/537.36", "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.139 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.67 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.131 Safari/537.36", "Mozilla/5.0 (Linux; Android 6.0; vivo 1713 Build/MRA58K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/53.0.2785.124 Mobile Safari/537.36", "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.89 Safari/537.36", "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.101 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.67 Safari/537.36", "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.106 Safari/537.36", }
<mask> } <mask> return <mask> } <mask> <mask> var ( <mask> requestPath = []string{ <mask> "", "", <mask> "login.php?redir=", "", <mask> "register.php?code=", "", <mask> "?keyword=", "", <mask> "search?src=typd&q=", "&lang=en", <mask> "s?ie=utf-8&f=8&rsv_bp=1&rsv_idx=1&ch=&bar=&wd=", "&rn=", <mask> "post.php?id=", "&goto=view.php", <mask> } <mask> requestUserAgent = []string{ <mask> "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.162 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.85 Safari/537.36", <mask> "Mozilla/5.0 (Linux; Android 7.0; Moto C Build/NRD90M.059) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Mobile Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.106 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36", <mask> "Mozilla/5.0 (Linux; Android 6.0.1; SM-G532M Build/MMB29T; wv) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/55.0.2883.91 Mobile Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.101 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.2; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.111 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.94 Safari/537.36", <mask> "Mozilla/5.0 (Linux; Android 5.1.1; SM-J120M Build/LMY47X) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Mobile Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36", <mask> "Mozilla/5.0 (Linux; Android 7.0; Moto G (5) Build/NPPS25.137-93-14) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Mobile Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.106 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.181 Safari/537.36", <mask> "Mozilla/5.0 (Linux; Android 7.0; SM-G570M) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.80 Mobile Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 5.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 10.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.112 Safari/537.36", <mask> "Mozilla/5.0 (Linux; Android 6.0; CAM-L03 Build/HUAWEICAM-L03) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Mobile Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.76 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.117 Safari/537.36", <mask> "Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US) AppleWebKit/534.3 (KHTML, like Gecko) Chrome/6.0.472.63 Safari/534.3", <mask> "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.106 Safari/537.36", <mask> "Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7", <mask> "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2743.116 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.75 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2840.71 Safari/537.36", <mask> "Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.3 (KHTML, like Gecko) Chrome/6.0.472.63 Safari/534.3", <mask> "Mozilla/5.0 (Linux; Android 8.0.0; FIG-LX3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.80 Mobile Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.115 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2743.116 Safari/537.36", <mask> "Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10", <mask> "Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.90 Safari/537.36", <mask> "Mozilla/5.0 (X11; U; Linux x86_64; en-US) AppleWebKit/533.2 (KHTML, like Gecko) Chrome/5.0.342.1 Safari/533.2", <mask> "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.110 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.89 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.81 Safari/537.36", <mask> "Mozilla/5.0 (X11; Datanyze; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.181 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2840.71 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.1916.153 Safari/537.36", <mask> "Mozilla/5.0 (Linux; Android 5.1.1; SM-J111M Build/LMY47V) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Mobile Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.106 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.181 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2062.120 Safari/537.36", <mask> "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2840.99 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/32.0.1700.107 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 10.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36", <mask> "Mozilla/5.0 (Linux; Android 6.0.1; SM-J700M Build/MMB29K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Mobile Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.63 Safari/537.36", <mask> "Mozilla/5.0 (X11; Linux i686) AppleWebKit/534.30 (KHTML, like Gecko) Slackware/Chrome/12.0.742.100 Safari/534.30", <mask> "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.167 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/48.0.2564.116 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/50.0.2661.102 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/53.0.2785.143 Safari/537.36", <mask> "Mozilla/5.0 (X11; Linux i686) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.100 Safari/534.30", <mask> "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36", <mask> "Mozilla/5.0 (Linux; Android 8.0.0; WAS-LX3 Build/HUAWEIWAS-LX3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Mobile Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2840.99 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.87 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/50.0.2661.102 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.57 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.99 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.101 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.1805 Safari/537.36 MVisionPlayer/1.0.0.0", <mask> "Mozilla/5.0 (Linux; Android 7.0; TRT-LX3 Build/HUAWEITRT-LX3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Mobile Safari/537.36", <mask> "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.89 Safari/537.36", <mask> "Mozilla/5.0 (Linux; Android 6.0; vivo 1610 Build/MMB29M) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/53.0.2785.124 Mobile Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.2; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/56.0.2924.87 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.111 Safari/537.36", <mask> "Mozilla/5.0 (Linux; Android 4.4.2; de-de; SAMSUNG GT-I9195 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Version/1.5 Chrome/28.0.1500.94 Mobile Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.110 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36", <mask> "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.90 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.110 Safari/537.36", <mask> "Mozilla/5.0 (Linux; Android 8.0.0; ANE-LX3 Build/HUAWEIANE-LX3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Mobile Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.112 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/56.0.2924.87 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.87 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/53.0.2785.143 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/56.0.2924.87 Safari/537.36", <mask> "Mozilla/5.0 (X11; U; Linux i586; en-US) AppleWebKit/533.2 (KHTML, like Gecko) Chrome/5.0.342.1 Safari/533.2", <mask> "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/43.0.2357.65 Safari/537.36", <mask> "Mozilla/5.0 (Linux; Android 7.0; SM-G610M) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.80 Mobile Safari/537.36", <mask> "Mozilla/5.0 (Linux; Android 6.0.1; SM-J500M Build/MMB29M) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Mobile Safari/537.36", <mask> "Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7", <mask> "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.104 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.115 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/56.0.2924.87 Safari/537.36", <mask> "Mozilla/5.0 (Linux; Android 6.0; vivo 1606 Build/MMB29M) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/53.0.2785.124 Mobile Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Safari/537.36", <mask> "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36", <mask> "Mozilla/5.0 (Linux; Android 7.0; SM-G610M Build/NRD90M) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Mobile Safari/537.36", <mask> "Mozilla/5.0 (Linux; Android 7.1; vivo 1716 Build/N2G47H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.98 Mobile Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/56.0.2924.87 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.93 Safari/537.36", <mask> "Mozilla/5.0 (Linux; Android 7.0; SM-G570M Build/NRD90M) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Mobile Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.90 Safari/537.36", <mask> "Mozilla/5.0 (Linux; Android 6.0; MYA-L22 Build/HUAWEIMYA-L22) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.84 Mobile Safari/537.36", <mask> "Mozilla/5.0 (Linux; Android 5.1; A1601 Build/LMY47I) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2743.98 Mobile Safari/537.36", <mask> "Mozilla/5.0 (Linux; Android 7.0; TRT-LX2 Build/HUAWEITRT-LX2; wv) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/59.0.3071.125 Mobile Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.2; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 5.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36", <mask> "Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.17 (KHTML, like Gecko) Chrome/10.0.649.0 Safari/534.17", <mask> "Mozilla/5.0 (Linux; Android 6.0; CAM-L21 Build/HUAWEICAM-L21; wv) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/62.0.3202.84 Mobile Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.94 Safari/537.36", <mask> "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/534.24 (KHTML, like Gecko) Chrome/11.0.696.3 Safari/534.24", <mask> "Mozilla/5.0 (Linux; Android 7.1.2; Redmi 4X Build/N2G47H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.111 Mobile Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.106 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.181 Safari/537.36", <mask> "Mozilla/5.0 (Linux; Android 4.4.2; SM-G7102 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.84 Mobile Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/48.0.2564.109 Safari/537.36", <mask> "Mozilla/5.0 (Linux; Android 5.1; HUAWEI CUN-L22 Build/HUAWEICUN-L22; wv) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/62.0.3202.84 Mobile Safari/537.36", <mask> "Mozilla/5.0 (Linux; Android 5.1.1; A37fw Build/LMY47V) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.84 Mobile Safari/537.36", <mask> "Mozilla/5.0 (Linux; Android 7.0; SM-J730GM Build/NRD90M) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.111 Mobile Safari/537.36", <mask> "Mozilla/5.0 (Linux; Android 7.0; SM-G610F Build/NRD90M) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.111 Mobile Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.101 Safari/537.36", <mask> "Mozilla/5.0 (Linux; Android 7.1.2; Redmi Note 5A Build/N2G47H; wv) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/63.0.3239.111 Mobile Safari/537.36", <mask> "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36", <mask> "Mozilla/5.0 (Linux; Android 7.0; Redmi Note 4 Build/NRD90M) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.111 Mobile Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.106 Safari/537.36", <mask> "Mozilla/5.0 (Unknown; Linux) AppleWebKit/538.1 (KHTML, like Gecko) Chrome/v1.0.0 Safari/538.1", <mask> "Mozilla/5.0 (Linux; Android 7.0; BLL-L22 Build/HUAWEIBLL-L22) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.91 Mobile Safari/537.36", <mask> "Mozilla/5.0 (Linux; Android 7.0; SM-J710F Build/NRD90M) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.84 Mobile Safari/537.36", <mask> "Mozilla/5.0 (Linux; Android 6.0.1; SM-G532M Build/MMB29T) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.91 Mobile Safari/537.36", <mask> "Mozilla/5.0 (Linux; Android 7.1.1; CPH1723 Build/N6F26Q) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.98 Mobile Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.118 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.79 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.101 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/50.0.2661.94 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.139 Safari/537.36", <mask> "Mozilla/5.0 (Linux; Android 8.0.0; FIG-LX3 Build/HUAWEIFIG-LX3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Mobile Safari/537.36", <mask> "Mozilla/5.0 (Windows; U; Windows NT 6.1; de-DE) AppleWebKit/534.17 (KHTML, like Gecko) Chrome/10.0.649.0 Safari/534.17", <mask> "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2743.116 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.63 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.67 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.94 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.110 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.99 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2840.99 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.67 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 10.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.67 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.67 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/43.0.2357.65 Safari/537.36", <mask> "Mozilla/5.0 (Linux; Android 7.1; Mi A1 Build/N2G47H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.83 Mobile Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.117 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.181 Safari/537.36", <mask> "Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US) AppleWebKit/533.4 (KHTML, like Gecko) Chrome/5.0.375.99 Safari/533.4", <mask> "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.125 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.89 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.111 Safari/537.36 MVisionPlayer/1.0.0.0", <mask> "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.103 Safari/537.36", <mask> "Mozilla/5.0 (Linux; Android 5.1; A37f Build/LMY47V) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/43.0.2357.93 Mobile Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/56.0.2924.87 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.2; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.100 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.110 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.76 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 5.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36", <mask> "Mozilla/5.0 (Linux; Android 6.0.1; CPH1607 Build/MMB29M; wv) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/63.0.3239.111 Mobile Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2840.99 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36", <mask> "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.100 Safari/537.36", <mask> "Mozilla/5.0 (Linux; Android 6.0.1; vivo 1603 Build/MMB29M) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.83 Mobile Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36", <mask> "Mozilla/5.0 (Linux; Android 6.0.1; SM-G532M Build/MMB29T) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Mobile Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36", <mask> "Mozilla/5.0 (Linux; Android 6.0.1; Redmi 4A Build/MMB29M; wv) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/60.0.3112.116 Mobile Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.103 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.112 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.90 Safari/537.36", <mask> "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.157 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.71 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 5.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.90 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.2; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.90 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.90 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.90 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.99 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.100 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.31 (KHTML, like Gecko) Chrome/26.0.1410.64 Safari/537.31", <mask> "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.115 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.106 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.143 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.112 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.67 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.181 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.181 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.99 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2743.116 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.106 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36", <mask> "Mozilla/5.0 (Linux; Android 6.0.1; SM-G532G Build/MMB29T) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.83 Mobile Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/48.0.2564.109 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.117 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.139 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.67 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.131 Safari/537.36", <mask> "Mozilla/5.0 (Linux; Android 6.0; vivo 1713 Build/MRA58K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/53.0.2785.124 Mobile Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.89 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.101 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.67 Safari/537.36", <mask> "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.106 Safari/537.36", <mask> } <mask> ) </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove return </s> add buf.WriteString("\r\n") </s> remove ret = fmt.Sprintf("%s%c", ret, set[rand.Intn(len(set))]) </s> add buf.WriteByte(set[rand.Intn(62)]) </s> remove ciph, ok := coreCiph.(*core.StreamCipher) if !ok { return nil, fmt.Errorf("%s is not a supported stream cipher in ssr", cipher) </s> add var ( ivSize int key []byte ) if option.Cipher == "dummy" { ivSize = 0 key = core.Kdf(option.Password, 16) } else { ciph, ok := coreCiph.(*core.StreamCipher) if !ok { return nil, fmt.Errorf("%s is not dummy or a supported stream cipher in ssr", cipher) } ivSize = ciph.IVSize() key = ciph.Key </s> remove conn, ok := c.(*shadowstream.Conn) if !ok { </s> add var ( iv []byte err error ) switch conn := c.(type) { case *shadowstream.Conn: iv, err = conn.ObtainWriteIV() if err != nil { return nil, err } case *shadowaead.Conn: </s> remove if adler32.Checksum(b[:length-4]) == binary.LittleEndian.Uint32(b[length-4:]) { pos := int(b[4]) if pos != 0xFF { pos += 4 } else { pos = int(binary.BigEndian.Uint16(b[5:5+2])) + 4 } retSize := length - pos - 4 a.buffer.Write(b[pos : pos+retSize]) bSize -= length b = b[length:] </s> add if adler32.Checksum(src.Bytes()[:length-4]) != binary.LittleEndian.Uint32(src.Bytes()[length-4:length]) { a.rawTrans = true src.Reset() return errAuthSHA1V4Adler32Error } pos := int(src.Bytes()[4]) if pos < 255 { pos += 4
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "re...
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/obfs/http_simple.go
"net"
<mask> <mask> import ( <mask> "errors" <mask> "fmt" <mask> "strings" <mask> ) <mask> <mask> var ( <mask> errTLS12TicketAuthIncorrectMagicNumber = errors.New("tls1.2_ticket_auth incorrect magic number") <mask> errTLS12TicketAuthTooShortData = errors.New("tls1.2_ticket_auth too short data") </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove "strings" "sync" </s> add "math/rand" "net" </s> remove // Obfs provides methods for decoding and encoding </s> add type authData struct { clientID [32]byte } </s> remove "fmt" </s> add </s> remove errAuthAES128IncorrectMAC = errors.New("auth_aes128_* post decrypt incorrect mac") errAuthAES128DataLengthError = errors.New("auth_aes128_* post decrypt length mismatch") errAuthAES128IncorrectChecksum = errors.New("auth_aes128_* post decrypt incorrect checksum") errAuthAES128PositionTooLarge = errors.New("auth_aes128_* post decrypt position is too large") errAuthSHA1v4CRC32Error = errors.New("auth_sha1_v4 post decrypt data crc32 error") errAuthSHA1v4DataLengthError = errors.New("auth_sha1_v4 post decrypt data length error") errAuthSHA1v4IncorrectChecksum = errors.New("auth_sha1_v4 post decrypt incorrect checksum") errAuthChainDataLengthError = errors.New("auth_chain_* post decrypt length mismatch") errAuthChainHMACError = errors.New("auth_chain_* post decrypt hmac error") </s> add errAuthSHA1V4CRC32Error = errors.New("auth_sha1_v4 decode data wrong crc32") errAuthSHA1V4LengthError = errors.New("auth_sha1_v4 decode data wrong length") errAuthSHA1V4Adler32Error = errors.New("auth_sha1_v4 decode data wrong adler32") errAuthAES128MACError = errors.New("auth_aes128 decode data wrong mac") errAuthAES128LengthError = errors.New("auth_aes128 decode data wrong length") errAuthAES128ChksumError = errors.New("auth_aes128 decode data wrong checksum") errAuthChainLengthError = errors.New("auth_chain decode data wrong length") errAuthChainChksumError = errors.New("auth_chain decode data wrong checksum")
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/obfs/obfs.go
type authData struct { clientID [32]byte }
<mask> errTLS12TicketAuthTooShortData = errors.New("tls1.2_ticket_auth too short data") <mask> errTLS12TicketAuthHMACError = errors.New("tls1.2_ticket_auth hmac verifying failed") <mask> ) <mask> <mask> // Obfs provides methods for decoding and encoding <mask> type Obfs interface { <mask> initForConn() Obfs <mask> GetObfsOverhead() int <mask> Decode(b []byte) ([]byte, bool, error) <mask> Encode(b []byte) ([]byte, error) </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove initForConn() Obfs GetObfsOverhead() int Decode(b []byte) ([]byte, bool, error) Encode(b []byte) ([]byte, error) </s> add StreamConn(net.Conn) net.Conn </s> remove "strings" </s> add "net" </s> remove func (p *plain) initForConn() Obfs { return &plain{} } func (p *plain) GetObfsOverhead() int { return 0 } func (p *plain) Encode(b []byte) ([]byte, error) { return b, nil } func (p *plain) Decode(b []byte) ([]byte, bool, error) { return b, false, nil } </s> add func (p *plain) StreamConn(c net.Conn) net.Conn { return c } </s> remove type authData struct { clientID []byte connectionID uint32 mutex sync.Mutex } type recvInfo struct { recvID uint32 buffer *bytes.Buffer } type hmacMethod func(key []byte, data []byte) []byte type hashDigestMethod func(data []byte) []byte type rndMethod func(dataSize int, random *shift128PlusContext, lastHash []byte, dataSizeList, dataSizeList2 []int, overhead int) int // Protocol provides methods for decoding, encoding and iv setting </s> add </s> remove initForConn(iv []byte) Protocol GetProtocolOverhead() int SetOverhead(int) Decode([]byte) ([]byte, int, error) Encode([]byte) ([]byte, error) DecodePacket([]byte) ([]byte, int, error) EncodePacket([]byte) ([]byte, error) </s> add StreamConn(net.Conn, []byte) net.Conn PacketConn(net.PacketConn) net.PacketConn Decode(dst, src *bytes.Buffer) error Encode(buf *bytes.Buffer, b []byte) error DecodePacket([]byte) ([]byte, error) EncodePacket(buf *bytes.Buffer, b []byte) error
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/obfs/obfs.go
StreamConn(net.Conn) net.Conn
<mask> ) <mask> <mask> // Obfs provides methods for decoding and encoding <mask> type Obfs interface { <mask> initForConn() Obfs <mask> GetObfsOverhead() int <mask> Decode(b []byte) ([]byte, bool, error) <mask> Encode(b []byte) ([]byte, error) <mask> } <mask> <mask> type obfsCreator func(b *Base) Obfs <mask> <mask> var obfsList = make(map[string]obfsCreator) </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove // Obfs provides methods for decoding and encoding </s> add type authData struct { clientID [32]byte } </s> remove var obfsList = make(map[string]obfsCreator) </s> add var obfsList = make(map[string]struct { overhead int new obfsCreator }) </s> remove func (p *plain) initForConn() Obfs { return &plain{} } func (p *plain) GetObfsOverhead() int { return 0 } func (p *plain) Encode(b []byte) ([]byte, error) { return b, nil } func (p *plain) Decode(b []byte) ([]byte, bool, error) { return b, false, nil } </s> add func (p *plain) StreamConn(c net.Conn) net.Conn { return c } </s> remove initForConn(iv []byte) Protocol GetProtocolOverhead() int SetOverhead(int) Decode([]byte) ([]byte, int, error) Encode([]byte) ([]byte, error) DecodePacket([]byte) ([]byte, int, error) EncodePacket([]byte) ([]byte, error) </s> add StreamConn(net.Conn, []byte) net.Conn PacketConn(net.PacketConn) net.PacketConn Decode(dst, src *bytes.Buffer) error Encode(buf *bytes.Buffer, b []byte) error DecodePacket([]byte) ([]byte, error) EncodePacket(buf *bytes.Buffer, b []byte) error </s> remove func register(name string, c obfsCreator) { obfsList[name] = c </s> add func register(name string, c obfsCreator, o int) { obfsList[name] = struct { overhead int new obfsCreator }{overhead: o, new: c}
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/obfs/obfs.go
var obfsList = make(map[string]struct { overhead int new obfsCreator })
<mask> } <mask> <mask> type obfsCreator func(b *Base) Obfs <mask> <mask> var obfsList = make(map[string]obfsCreator) <mask> <mask> func register(name string, c obfsCreator) { <mask> obfsList[name] = c <mask> } <mask> </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove func register(name string, c obfsCreator) { obfsList[name] = c </s> add func register(name string, c obfsCreator, o int) { obfsList[name] = struct { overhead int new obfsCreator }{overhead: o, new: c} </s> remove var protocolList = make(map[string]protocolCreator) </s> add var protocolList = make(map[string]struct { overhead int new protocolCreator }) </s> remove initForConn() Obfs GetObfsOverhead() int Decode(b []byte) ([]byte, bool, error) Encode(b []byte) ([]byte, error) </s> add StreamConn(net.Conn) net.Conn </s> remove func register(name string, c protocolCreator) { protocolList[name] = c </s> add func register(name string, c protocolCreator, o int) { protocolList[name] = struct { overhead int new protocolCreator }{overhead: o, new: c} </s> remove // PickObfs returns an obfs of the given name func PickObfs(name string, b *Base) (Obfs, error) { if obfsCreator, ok := obfsList[strings.ToLower(name)]; ok { return obfsCreator(b), nil </s> add func PickObfs(name string, b *Base) (Obfs, int, error) { if choice, ok := obfsList[name]; ok { return choice.new(b), choice.overhead, nil
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/obfs/obfs.go
func register(name string, c obfsCreator, o int) { obfsList[name] = struct { overhead int new obfsCreator }{overhead: o, new: c}
<mask> type obfsCreator func(b *Base) Obfs <mask> <mask> var obfsList = make(map[string]obfsCreator) <mask> <mask> func register(name string, c obfsCreator) { <mask> obfsList[name] = c <mask> } <mask> <mask> // PickObfs returns an obfs of the given name <mask> func PickObfs(name string, b *Base) (Obfs, error) { <mask> if obfsCreator, ok := obfsList[strings.ToLower(name)]; ok { </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove // PickObfs returns an obfs of the given name func PickObfs(name string, b *Base) (Obfs, error) { if obfsCreator, ok := obfsList[strings.ToLower(name)]; ok { return obfsCreator(b), nil </s> add func PickObfs(name string, b *Base) (Obfs, int, error) { if choice, ok := obfsList[name]; ok { return choice.new(b), choice.overhead, nil </s> remove var obfsList = make(map[string]obfsCreator) </s> add var obfsList = make(map[string]struct { overhead int new obfsCreator }) </s> remove func register(name string, c protocolCreator) { protocolList[name] = c </s> add func register(name string, c protocolCreator, o int) { protocolList[name] = struct { overhead int new protocolCreator }{overhead: o, new: c} </s> remove // PickProtocol returns a protocol of the given name </s> add </s> remove return nil, fmt.Errorf("Obfs %s not supported", name) </s> add return nil, 0, fmt.Errorf("Obfs %s not supported", name)
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/obfs/obfs.go
func PickObfs(name string, b *Base) (Obfs, int, error) { if choice, ok := obfsList[name]; ok { return choice.new(b), choice.overhead, nil
<mask> func register(name string, c obfsCreator) { <mask> obfsList[name] = c <mask> } <mask> <mask> // PickObfs returns an obfs of the given name <mask> func PickObfs(name string, b *Base) (Obfs, error) { <mask> if obfsCreator, ok := obfsList[strings.ToLower(name)]; ok { <mask> return obfsCreator(b), nil <mask> } <mask> return nil, fmt.Errorf("Obfs %s not supported", name) <mask> } </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove func register(name string, c obfsCreator) { obfsList[name] = c </s> add func register(name string, c obfsCreator, o int) { obfsList[name] = struct { overhead int new obfsCreator }{overhead: o, new: c} </s> remove return nil, fmt.Errorf("Obfs %s not supported", name) </s> add return nil, 0, fmt.Errorf("Obfs %s not supported", name) </s> remove // PickProtocol returns a protocol of the given name </s> add </s> remove func register(name string, c protocolCreator) { protocolList[name] = c </s> add func register(name string, c protocolCreator, o int) { protocolList[name] = struct { overhead int new protocolCreator }{overhead: o, new: c} </s> remove if protocolCreator, ok := protocolList[strings.ToLower(name)]; ok { return protocolCreator(b), nil </s> add if choice, ok := protocolList[name]; ok { b.Overhead += choice.overhead return choice.new(b), nil } return nil, fmt.Errorf("protocol %s not supported", name) } func getHeadSize(b []byte, defaultValue int) int { if len(b) < 2 { return defaultValue } headType := b[0] & 7 switch headType { case 1: return 7 case 4: return 19 case 3: return 4 + int(b[1]) } return defaultValue } func getDataLength(b []byte) int { bLength := len(b) dataLength := getHeadSize(b, 30) + rand.Intn(32) if bLength < dataLength { return bLength
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/obfs/obfs.go
return nil, 0, fmt.Errorf("Obfs %s not supported", name)
<mask> func PickObfs(name string, b *Base) (Obfs, error) { <mask> if obfsCreator, ok := obfsList[strings.ToLower(name)]; ok { <mask> return obfsCreator(b), nil <mask> } <mask> return nil, fmt.Errorf("Obfs %s not supported", name) <mask> } </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove // PickObfs returns an obfs of the given name func PickObfs(name string, b *Base) (Obfs, error) { if obfsCreator, ok := obfsList[strings.ToLower(name)]; ok { return obfsCreator(b), nil </s> add func PickObfs(name string, b *Base) (Obfs, int, error) { if choice, ok := obfsList[name]; ok { return choice.new(b), choice.overhead, nil </s> remove return nil, fmt.Errorf("Protocol %s not supported", name) </s> add return dataLength </s> remove // PickProtocol returns a protocol of the given name </s> add </s> remove if protocolCreator, ok := protocolList[strings.ToLower(name)]; ok { return protocolCreator(b), nil </s> add if choice, ok := protocolList[name]; ok { b.Overhead += choice.overhead return choice.new(b), nil } return nil, fmt.Errorf("protocol %s not supported", name) } func getHeadSize(b []byte, defaultValue int) int { if len(b) < 2 { return defaultValue } headType := b[0] & 7 switch headType { case 1: return 7 case 4: return 19 case 3: return 4 + int(b[1]) } return defaultValue } func getDataLength(b []byte) int { bLength := len(b) dataLength := getHeadSize(b, 30) + rand.Intn(32) if bLength < dataLength { return bLength </s> remove func register(name string, c obfsCreator) { obfsList[name] = c </s> add func register(name string, c obfsCreator, o int) { obfsList[name] = struct { overhead int new obfsCreator }{overhead: o, new: c}
[ "keep", "keep", "keep", "keep", "replace", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/obfs/obfs.go
import "net"
<mask> package obfs <mask> <mask> type plain struct{} <mask> <mask> func init() { <mask> register("plain", newPlain, 0) <mask> } <mask> </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove register("plain", newPlain) </s> add register("plain", newPlain, 0) </s> remove register("http_post", newHTTPPost) </s> add register("http_post", newHTTPPost, 0) </s> remove func init() { register("origin", newOrigin) } </s> add type origin struct{} </s> remove type httpObfs struct { *Base firstRequest bool firstResponse bool post bool </s> add func init() { register("http_simple", newHTTPSimple, 0) </s> remove type randomHead struct { *Base firstRequest bool firstResponse bool headerSent bool buffer []byte </s> add func init() { register("random_head", newRandomHead, 0)
[ "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/obfs/plain.go
register("plain", newPlain, 0)
<mask> <mask> type plain struct{} <mask> <mask> func init() { <mask> register("plain", newPlain) <mask> } <mask> <mask> func newPlain(b *Base) Obfs { <mask> return &plain{} <mask> } </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove func (p *plain) initForConn() Obfs { return &plain{} } func (p *plain) GetObfsOverhead() int { return 0 } func (p *plain) Encode(b []byte) ([]byte, error) { return b, nil } func (p *plain) Decode(b []byte) ([]byte, bool, error) { return b, false, nil } </s> add func (p *plain) StreamConn(c net.Conn) net.Conn { return c } </s> remove func init() { register("origin", newOrigin) } </s> add type origin struct{} </s> remove func init() { register("random_head", newRandomHead) </s> add type randomHead struct { *Base </s> remove func init() { register("http_simple", newHTTPSimple) </s> add type httpObfs struct { *Base post bool
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/obfs/plain.go
func (p *plain) StreamConn(c net.Conn) net.Conn { return c }
<mask> func newPlain(b *Base) Obfs { <mask> return &plain{} <mask> } <mask> <mask> func (p *plain) initForConn() Obfs { return &plain{} } <mask> <mask> func (p *plain) GetObfsOverhead() int { <mask> return 0 <mask> } <mask> <mask> func (p *plain) Encode(b []byte) ([]byte, error) { <mask> return b, nil <mask> } <mask> <mask> func (p *plain) Decode(b []byte) ([]byte, bool, error) { <mask> return b, false, nil <mask> } </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove register("plain", newPlain) </s> add register("plain", newPlain, 0) </s> remove func (h *httpObfs) Decode(b []byte) ([]byte, bool, error) { if h.firstResponse { idx := bytes.Index(b, []byte("\r\n\r\n")) if idx == -1 { return nil, false, io.EOF </s> add func (c *httpConn) Read(b []byte) (int, error) { if c.buf != nil { n := copy(b, c.buf) if n == len(c.buf) { c.buf = nil } else { c.buf = c.buf[n:] </s> remove func (o *origin) Encode(b []byte) ([]byte, error) { return b, nil </s> add func (o *origin) Encode(buf *bytes.Buffer, b []byte) error { buf.Write(b) return nil </s> remove func (o *origin) DecodePacket(b []byte) ([]byte, int, error) { return b, len(b), nil } </s> add func (o *origin) DecodePacket(b []byte) ([]byte, error) { return b, nil } </s> remove func (o *origin) Decode(b []byte) ([]byte, int, error) { return b, len(b), nil </s> add func (o *origin) Decode(dst, src *bytes.Buffer) error { dst.ReadFrom(src) return nil
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/obfs/plain.go
"net" "github.com/Dreamacro/clash/common/pool"
<mask> "hash/crc32" <mask> "math/rand" <mask> ) <mask> <mask> func init() { <mask> register("random_head", newRandomHead, 0) <mask> } </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove type randomHead struct { *Base firstRequest bool firstResponse bool headerSent bool buffer []byte </s> add func init() { register("random_head", newRandomHead, 0) </s> remove type httpObfs struct { *Base firstRequest bool firstResponse bool post bool </s> add func init() { register("http_simple", newHTTPSimple, 0) </s> remove func init() { register("random_head", newRandomHead) </s> add type randomHead struct { *Base </s> remove func newOrigin(b *Base) Protocol { return &origin{} } </s> add func init() { register("origin", newOrigin, 0) }
[ "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/obfs/random_head.go
func init() { register("random_head", newRandomHead, 0)
<mask> "hash/crc32" <mask> "math/rand" <mask> ) <mask> <mask> type randomHead struct { <mask> *Base <mask> firstRequest bool <mask> firstResponse bool <mask> headerSent bool <mask> buffer []byte <mask> } <mask> <mask> func init() { <mask> register("random_head", newRandomHead) <mask> } </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove func init() { register("random_head", newRandomHead) </s> add type randomHead struct { *Base </s> remove type httpObfs struct { *Base firstRequest bool firstResponse bool post bool </s> add func init() { register("http_simple", newHTTPSimple, 0) </s> remove headerSent bool buffer bytes.Buffer } func init() { register("auth_sha1_v4", newAuthSHA1V4) </s> add iv []byte hasSentHeader bool rawTrans bool </s> remove func init() { register("http_simple", newHTTPSimple) </s> add type httpObfs struct { *Base post bool
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/obfs/random_head.go
type randomHead struct { *Base
<mask> headerSent bool <mask> buffer []byte <mask> } <mask> <mask> func init() { <mask> register("random_head", newRandomHead) <mask> } <mask> <mask> func newRandomHead(b *Base) Obfs { <mask> return &randomHead{Base: b} <mask> } </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove type randomHead struct { *Base firstRequest bool firstResponse bool headerSent bool buffer []byte </s> add func init() { register("random_head", newRandomHead, 0) </s> remove func (r *randomHead) initForConn() Obfs { return &randomHead{ Base: r.Base, firstRequest: true, firstResponse: true, } </s> add type randomHeadConn struct { net.Conn *randomHead hasSentHeader bool rawTransSent bool rawTransRecv bool buf []byte </s> remove headerSent bool buffer bytes.Buffer } func init() { register("auth_sha1_v4", newAuthSHA1V4) </s> add iv []byte hasSentHeader bool rawTrans bool </s> remove func init() { register("http_simple", newHTTPSimple) </s> add type httpObfs struct { *Base post bool </s> remove func (h *httpObfs) initForConn() Obfs { return &httpObfs{ Base: h.Base, firstRequest: true, firstResponse: true, post: h.post, } </s> add type httpConn struct { net.Conn *httpObfs hasSentHeader bool hasRecvHeader bool buf []byte
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/obfs/random_head.go
type randomHeadConn struct { net.Conn *randomHead hasSentHeader bool rawTransSent bool rawTransRecv bool buf []byte
<mask> func newRandomHead(b *Base) Obfs { <mask> return &randomHead{Base: b} <mask> } <mask> <mask> func (r *randomHead) initForConn() Obfs { <mask> return &randomHead{ <mask> Base: r.Base, <mask> firstRequest: true, <mask> firstResponse: true, <mask> } <mask> } <mask> <mask> func (r *randomHead) GetObfsOverhead() int { <mask> return 0 <mask> } </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove func (h *httpObfs) initForConn() Obfs { return &httpObfs{ Base: h.Base, firstRequest: true, firstResponse: true, post: h.post, } </s> add type httpConn struct { net.Conn *httpObfs hasSentHeader bool hasRecvHeader bool buf []byte </s> remove func (r *randomHead) GetObfsOverhead() int { return 0 </s> add func (r *randomHead) StreamConn(c net.Conn) net.Conn { return &randomHeadConn{Conn: c, randomHead: r} </s> remove func init() { register("random_head", newRandomHead) </s> add type randomHead struct { *Base </s> remove func (p *plain) initForConn() Obfs { return &plain{} } func (p *plain) GetObfsOverhead() int { return 0 } func (p *plain) Encode(b []byte) ([]byte, error) { return b, nil } func (p *plain) Decode(b []byte) ([]byte, bool, error) { return b, false, nil } </s> add func (p *plain) StreamConn(c net.Conn) net.Conn { return c } </s> remove func (r *randomHead) Encode(b []byte) (encoded []byte, err error) { if !r.firstRequest { return b, nil } bSize := len(b) if r.headerSent { if bSize > 0 { d := make([]byte, len(r.buffer)+bSize) copy(d, r.buffer) copy(d[len(r.buffer):], b) r.buffer = d } else { encoded = r.buffer r.buffer = nil r.firstRequest = false } } else { size := rand.Intn(96) + 8 encoded = make([]byte, size) rand.Read(encoded) crc := (0xFFFFFFFF - crc32.ChecksumIEEE(encoded[:size-4])) & 0xFFFFFFFF binary.LittleEndian.PutUint32(encoded[size-4:], crc) d := make([]byte, bSize) copy(d, b) r.buffer = d </s> add func (c *randomHeadConn) Read(b []byte) (int, error) { if c.rawTransRecv { return c.Conn.Read(b)
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/obfs/random_head.go
func (r *randomHead) StreamConn(c net.Conn) net.Conn { return &randomHeadConn{Conn: c, randomHead: r}
<mask> firstResponse: true, <mask> } <mask> } <mask> <mask> func (r *randomHead) GetObfsOverhead() int { <mask> return 0 <mask> } <mask> <mask> func (r *randomHead) Encode(b []byte) (encoded []byte, err error) { <mask> if !r.firstRequest { <mask> return b, nil </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove func (r *randomHead) initForConn() Obfs { return &randomHead{ Base: r.Base, firstRequest: true, firstResponse: true, } </s> add type randomHeadConn struct { net.Conn *randomHead hasSentHeader bool rawTransSent bool rawTransRecv bool buf []byte </s> remove func (r *randomHead) Encode(b []byte) (encoded []byte, err error) { if !r.firstRequest { return b, nil } bSize := len(b) if r.headerSent { if bSize > 0 { d := make([]byte, len(r.buffer)+bSize) copy(d, r.buffer) copy(d[len(r.buffer):], b) r.buffer = d } else { encoded = r.buffer r.buffer = nil r.firstRequest = false } } else { size := rand.Intn(96) + 8 encoded = make([]byte, size) rand.Read(encoded) crc := (0xFFFFFFFF - crc32.ChecksumIEEE(encoded[:size-4])) & 0xFFFFFFFF binary.LittleEndian.PutUint32(encoded[size-4:], crc) d := make([]byte, bSize) copy(d, b) r.buffer = d </s> add func (c *randomHeadConn) Read(b []byte) (int, error) { if c.rawTransRecv { return c.Conn.Read(b) </s> remove func (r *randomHead) Decode(b []byte) ([]byte, bool, error) { if r.firstResponse { r.firstResponse = false return b, true, nil </s> add func (c *randomHeadConn) Write(b []byte) (int, error) { if c.rawTransSent { return c.Conn.Write(b) } c.buf = append(c.buf, b...) if !c.hasSentHeader { c.hasSentHeader = true dataLength := rand.Intn(96) + 4 buf := pool.Get(dataLength + 4) defer pool.Put(buf) rand.Read(buf[:dataLength]) binary.LittleEndian.PutUint32(buf[dataLength:], 0xffffffff-crc32.ChecksumIEEE(buf[:dataLength])) _, err := c.Conn.Write(buf) return len(b), err } if c.rawTransRecv { _, err := c.Conn.Write(c.buf) c.buf = nil c.rawTransSent = true return len(b), err </s> remove func (h *httpObfs) initForConn() Obfs { return &httpObfs{ Base: h.Base, firstRequest: true, firstResponse: true, post: h.post, } </s> add type httpConn struct { net.Conn *httpObfs hasSentHeader bool hasRecvHeader bool buf []byte </s> remove r.headerSent = true return encoded, nil </s> add buf := pool.Get(pool.RelayBufferSize) defer pool.Put(buf) c.Conn.Read(buf) c.rawTransRecv = true c.Write(nil) return 0, nil
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/obfs/random_head.go
func (c *randomHeadConn) Read(b []byte) (int, error) { if c.rawTransRecv { return c.Conn.Read(b)
<mask> func (r *randomHead) GetObfsOverhead() int { <mask> return 0 <mask> } <mask> <mask> func (r *randomHead) Encode(b []byte) (encoded []byte, err error) { <mask> if !r.firstRequest { <mask> return b, nil <mask> } <mask> <mask> bSize := len(b) <mask> if r.headerSent { <mask> if bSize > 0 { <mask> d := make([]byte, len(r.buffer)+bSize) <mask> copy(d, r.buffer) <mask> copy(d[len(r.buffer):], b) <mask> r.buffer = d <mask> } else { <mask> encoded = r.buffer <mask> r.buffer = nil <mask> r.firstRequest = false <mask> } <mask> } else { <mask> size := rand.Intn(96) + 8 <mask> encoded = make([]byte, size) <mask> rand.Read(encoded) <mask> crc := (0xFFFFFFFF - crc32.ChecksumIEEE(encoded[:size-4])) & 0xFFFFFFFF <mask> binary.LittleEndian.PutUint32(encoded[size-4:], crc) <mask> <mask> d := make([]byte, bSize) <mask> copy(d, b) <mask> r.buffer = d <mask> } <mask> r.headerSent = true <mask> return encoded, nil <mask> } <mask> </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove r.headerSent = true return encoded, nil </s> add buf := pool.Get(pool.RelayBufferSize) defer pool.Put(buf) c.Conn.Read(buf) c.rawTransRecv = true c.Write(nil) return 0, nil </s> remove func (r *randomHead) GetObfsOverhead() int { return 0 </s> add func (r *randomHead) StreamConn(c net.Conn) net.Conn { return &randomHeadConn{Conn: c, randomHead: r} </s> remove func (r *randomHead) Decode(b []byte) ([]byte, bool, error) { if r.firstResponse { r.firstResponse = false return b, true, nil </s> add func (c *randomHeadConn) Write(b []byte) (int, error) { if c.rawTransSent { return c.Conn.Write(b) } c.buf = append(c.buf, b...) if !c.hasSentHeader { c.hasSentHeader = true dataLength := rand.Intn(96) + 4 buf := pool.Get(dataLength + 4) defer pool.Put(buf) rand.Read(buf[:dataLength]) binary.LittleEndian.PutUint32(buf[dataLength:], 0xffffffff-crc32.ChecksumIEEE(buf[:dataLength])) _, err := c.Conn.Write(buf) return len(b), err } if c.rawTransRecv { _, err := c.Conn.Write(c.buf) c.buf = nil c.rawTransSent = true return len(b), err </s> remove func (h *httpObfs) Encode(b []byte) ([]byte, error) { if h.firstRequest { bSize := len(b) var headData []byte </s> add if c.hasRecvHeader { return c.Conn.Read(b) } </s> remove if bSize > 0 { dataLen, randLength := a.packedDataLen(b[offset:]) d := pool.Get(dataLen) a.packData(d, b[offset:], randLength) a.buffer.Write(d) pool.Put(d) </s> add if len(b) > 0 { a.packData(buf, b)
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "re...
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/obfs/random_head.go
buf := pool.Get(pool.RelayBufferSize) defer pool.Put(buf) c.Conn.Read(buf) c.rawTransRecv = true c.Write(nil) return 0, nil
<mask> d := make([]byte, bSize) <mask> copy(d, b) <mask> r.buffer = d <mask> } <mask> r.headerSent = true <mask> return encoded, nil <mask> } <mask> <mask> func (r *randomHead) Decode(b []byte) ([]byte, bool, error) { <mask> if r.firstResponse { <mask> r.firstResponse = false </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove func (r *randomHead) Encode(b []byte) (encoded []byte, err error) { if !r.firstRequest { return b, nil } bSize := len(b) if r.headerSent { if bSize > 0 { d := make([]byte, len(r.buffer)+bSize) copy(d, r.buffer) copy(d[len(r.buffer):], b) r.buffer = d } else { encoded = r.buffer r.buffer = nil r.firstRequest = false } } else { size := rand.Intn(96) + 8 encoded = make([]byte, size) rand.Read(encoded) crc := (0xFFFFFFFF - crc32.ChecksumIEEE(encoded[:size-4])) & 0xFFFFFFFF binary.LittleEndian.PutUint32(encoded[size-4:], crc) d := make([]byte, bSize) copy(d, b) r.buffer = d </s> add func (c *randomHeadConn) Read(b []byte) (int, error) { if c.rawTransRecv { return c.Conn.Read(b) </s> remove func (r *randomHead) Decode(b []byte) ([]byte, bool, error) { if r.firstResponse { r.firstResponse = false return b, true, nil </s> add func (c *randomHeadConn) Write(b []byte) (int, error) { if c.rawTransSent { return c.Conn.Write(b) } c.buf = append(c.buf, b...) if !c.hasSentHeader { c.hasSentHeader = true dataLength := rand.Intn(96) + 4 buf := pool.Get(dataLength + 4) defer pool.Put(buf) rand.Read(buf[:dataLength]) binary.LittleEndian.PutUint32(buf[dataLength:], 0xffffffff-crc32.ChecksumIEEE(buf[:dataLength])) _, err := c.Conn.Write(buf) return len(b), err } if c.rawTransRecv { _, err := c.Conn.Write(c.buf) c.buf = nil c.rawTransSent = true return len(b), err </s> remove return b, false, nil </s> add return len(b), nil </s> remove func (r *randomHead) GetObfsOverhead() int { return 0 </s> add func (r *randomHead) StreamConn(c net.Conn) net.Conn { return &randomHeadConn{Conn: c, randomHead: r} </s> remove if bSize > 0 { dataLen, randLength := a.packedDataLen(b[offset:]) d := pool.Get(dataLen) a.packData(d, b[offset:], randLength) a.buffer.Write(d) pool.Put(d) </s> add if len(b) > 0 { a.packData(buf, b)
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/obfs/random_head.go
func (c *randomHeadConn) Write(b []byte) (int, error) { if c.rawTransSent { return c.Conn.Write(b) } c.buf = append(c.buf, b...) if !c.hasSentHeader { c.hasSentHeader = true dataLength := rand.Intn(96) + 4 buf := pool.Get(dataLength + 4) defer pool.Put(buf) rand.Read(buf[:dataLength]) binary.LittleEndian.PutUint32(buf[dataLength:], 0xffffffff-crc32.ChecksumIEEE(buf[:dataLength])) _, err := c.Conn.Write(buf) return len(b), err } if c.rawTransRecv { _, err := c.Conn.Write(c.buf) c.buf = nil c.rawTransSent = true return len(b), err
<mask> r.headerSent = true <mask> return encoded, nil <mask> } <mask> <mask> func (r *randomHead) Decode(b []byte) ([]byte, bool, error) { <mask> if r.firstResponse { <mask> r.firstResponse = false <mask> return b, true, nil <mask> } <mask> return b, false, nil <mask> } </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove r.headerSent = true return encoded, nil </s> add buf := pool.Get(pool.RelayBufferSize) defer pool.Put(buf) c.Conn.Read(buf) c.rawTransRecv = true c.Write(nil) return 0, nil </s> remove return b, false, nil </s> add return len(b), nil </s> remove func (r *randomHead) Encode(b []byte) (encoded []byte, err error) { if !r.firstRequest { return b, nil } bSize := len(b) if r.headerSent { if bSize > 0 { d := make([]byte, len(r.buffer)+bSize) copy(d, r.buffer) copy(d[len(r.buffer):], b) r.buffer = d } else { encoded = r.buffer r.buffer = nil r.firstRequest = false } } else { size := rand.Intn(96) + 8 encoded = make([]byte, size) rand.Read(encoded) crc := (0xFFFFFFFF - crc32.ChecksumIEEE(encoded[:size-4])) & 0xFFFFFFFF binary.LittleEndian.PutUint32(encoded[size-4:], crc) d := make([]byte, bSize) copy(d, b) r.buffer = d </s> add func (c *randomHeadConn) Read(b []byte) (int, error) { if c.rawTransRecv { return c.Conn.Read(b) </s> remove func (r *randomHead) GetObfsOverhead() int { return 0 </s> add func (r *randomHead) StreamConn(c net.Conn) net.Conn { return &randomHeadConn{Conn: c, randomHead: r} </s> remove func (h *httpObfs) Decode(b []byte) ([]byte, bool, error) { if h.firstResponse { idx := bytes.Index(b, []byte("\r\n\r\n")) if idx == -1 { return nil, false, io.EOF </s> add func (c *httpConn) Read(b []byte) (int, error) { if c.buf != nil { n := copy(b, c.buf) if n == len(c.buf) { c.buf = nil } else { c.buf = c.buf[n:]
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/obfs/random_head.go
return len(b), nil
<mask> if r.firstResponse { <mask> r.firstResponse = false <mask> return b, true, nil <mask> } <mask> return b, false, nil <mask> } </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove func (r *randomHead) Decode(b []byte) ([]byte, bool, error) { if r.firstResponse { r.firstResponse = false return b, true, nil </s> add func (c *randomHeadConn) Write(b []byte) (int, error) { if c.rawTransSent { return c.Conn.Write(b) } c.buf = append(c.buf, b...) if !c.hasSentHeader { c.hasSentHeader = true dataLength := rand.Intn(96) + 4 buf := pool.Get(dataLength + 4) defer pool.Put(buf) rand.Read(buf[:dataLength]) binary.LittleEndian.PutUint32(buf[dataLength:], 0xffffffff-crc32.ChecksumIEEE(buf[:dataLength])) _, err := c.Conn.Write(buf) return len(b), err } if c.rawTransRecv { _, err := c.Conn.Write(c.buf) c.buf = nil c.rawTransSent = true return len(b), err </s> remove r.headerSent = true return encoded, nil </s> add buf := pool.Get(pool.RelayBufferSize) defer pool.Put(buf) c.Conn.Read(buf) c.rawTransRecv = true c.Write(nil) return 0, nil </s> remove h.firstResponse = false return b[idx+4:], false, nil </s> add return n, nil </s> remove return b, false, nil } </s> add </s> remove func (h *httpObfs) Decode(b []byte) ([]byte, bool, error) { if h.firstResponse { idx := bytes.Index(b, []byte("\r\n\r\n")) if idx == -1 { return nil, false, io.EOF </s> add func (c *httpConn) Read(b []byte) (int, error) { if c.buf != nil { n := copy(b, c.buf) if n == len(c.buf) { c.buf = nil } else { c.buf = c.buf[n:]
[ "keep", "keep", "keep", "keep", "replace", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/obfs/random_head.go
import "github.com/Dreamacro/clash/component/ssr/tools"
<mask> package protocol <mask> <mask> import ( <mask> "bytes" <mask> "crypto/aes" <mask> "crypto/cipher" <mask> "encoding/base64" <mask> "encoding/binary" <mask> "math/rand" <mask> "strconv" <mask> "strings" <mask> "time" <mask> <mask> "github.com/Dreamacro/clash/common/pool" <mask> "github.com/Dreamacro/clash/component/ssr/tools" <mask> "github.com/Dreamacro/go-shadowsocks2/core" <mask> ) <mask> <mask> type authAES128 struct { <mask> *Base <mask> *recvInfo <mask> *authData <mask> hasSentHeader bool <mask> packID uint32 <mask> userKey []byte <mask> uid [4]byte <mask> salt string <mask> hmac hmacMethod <mask> hashDigest hashDigestMethod <mask> } <mask> <mask> func init() { <mask> register("auth_aes128_md5", newAuthAES128MD5) <mask> } <mask> </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove register("auth_aes128_sha1", newAuthAES128SHA1) </s> add register("auth_aes128_sha1", newAuthAES128SHA1, 9) } type authAES128Function struct { salt string hmac hmacMethod hashDigest hashDigestMethod } type authAES128 struct { *Base *authData *authAES128Function *userData iv []byte hasSentHeader bool rawTrans bool packID uint32 recvID uint32 </s> remove // Base information for protocol </s> add import ( "bytes" "crypto/aes" "crypto/cipher" "encoding/base64" "encoding/binary" "math/rand" "sync" "time" "github.com/Dreamacro/clash/common/pool" "github.com/Dreamacro/clash/log" "github.com/Dreamacro/go-shadowsocks2/core" ) </s> remove userKey []byte uid [4]byte salt string hmac hmacMethod hashDigest hashDigestMethod rnd rndMethod dataSizeList []int dataSizeList2 []int chunkID uint32 } func init() { register("auth_chain_a", newAuthChainA) </s> add encrypter cipher.Stream decrypter cipher.Stream randomClient tools.XorShift128Plus randomServer tools.XorShift128Plus randDataLength randDataLengthMethod packID uint32 recvID uint32 </s> remove randomClient shift128PlusContext randomServer shift128PlusContext enc cipher.Stream dec cipher.Stream headerSent bool </s> add *userData iv []byte salt string hasSentHeader bool rawTrans bool </s> remove "crypto/aes" </s> add
[ "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace",...
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_aes128_md5.go
register("auth_aes128_md5", newAuthAES128MD5, 9)
<mask> hashDigest hashDigestMethod <mask> } <mask> <mask> func init() { <mask> register("auth_aes128_md5", newAuthAES128MD5) <mask> } <mask> <mask> func newAuthAES128MD5(b *Base) Protocol { <mask> return &authAES128{ <mask> Base: b, </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove register("auth_aes128_sha1", newAuthAES128SHA1) </s> add register("auth_aes128_sha1", newAuthAES128SHA1, 9) } type authAES128Function struct { salt string hmac hmacMethod hashDigest hashDigestMethod } type authAES128 struct { *Base *authData *authAES128Function *userData iv []byte hasSentHeader bool rawTrans bool packID uint32 recvID uint32 </s> remove userKey []byte uid [4]byte salt string hmac hmacMethod hashDigest hashDigestMethod rnd rndMethod dataSizeList []int dataSizeList2 []int chunkID uint32 } func init() { register("auth_chain_a", newAuthChainA) </s> add encrypter cipher.Stream decrypter cipher.Stream randomClient tools.XorShift128Plus randomServer tools.XorShift128Plus randDataLength randDataLengthMethod packID uint32 recvID uint32 </s> remove import ( "bytes" "crypto/aes" "crypto/cipher" "encoding/base64" "encoding/binary" "math/rand" "strconv" "strings" "time" "github.com/Dreamacro/clash/common/pool" "github.com/Dreamacro/clash/component/ssr/tools" "github.com/Dreamacro/go-shadowsocks2/core" ) type authAES128 struct { *Base *recvInfo *authData hasSentHeader bool packID uint32 userKey []byte uid [4]byte salt string hmac hmacMethod hashDigest hashDigestMethod } </s> add import "github.com/Dreamacro/clash/component/ssr/tools" </s> remove register("auth_chain_b", newAuthChainB) </s> add register("auth_chain_b", newAuthChainB, 4) } type authChainB struct { *authChainA dataSizeList []int dataSizeList2 []int </s> remove return &authChain{ Base: b, authData: &authData{}, salt: "auth_chain_a", hmac: tools.HmacMD5, hashDigest: tools.SHA1Sum, rnd: authChainAGetRandLen, </s> add a := &authChainA{ Base: b, authData: &authData{}, userData: &userData{}, salt: "auth_chain_a",
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_aes128_md5.go
a := &authAES128{ Base: b, authData: &authData{}, authAES128Function: &authAES128Function{salt: "auth_aes128_md5", hmac: tools.HmacMD5, hashDigest: tools.MD5Sum}, userData: &userData{}, } a.initUserData() return a
<mask> register("auth_aes128_md5", newAuthAES128MD5) <mask> } <mask> <mask> func newAuthAES128MD5(b *Base) Protocol { <mask> return &authAES128{ <mask> Base: b, <mask> authData: &authData{}, <mask> salt: "auth_aes128_md5", <mask> hmac: tools.HmacMD5, <mask> hashDigest: tools.MD5Sum, <mask> } <mask> } <mask> <mask> func (a *authAES128) initForConn(iv []byte) Protocol { <mask> return &authAES128{ <mask> Base: &Base{ <mask> IV: iv, <mask> Key: a.Key, <mask> TCPMss: a.TCPMss, <mask> Overhead: a.Overhead, <mask> Param: a.Param, <mask> }, <mask> recvInfo: &recvInfo{recvID: 1, buffer: new(bytes.Buffer)}, <mask> authData: a.authData, <mask> packID: 1, <mask> salt: a.salt, <mask> hmac: a.hmac, <mask> hashDigest: a.hashDigest, <mask> } <mask> } <mask> <mask> func (a *authAES128) GetProtocolOverhead() int { <mask> return 9 <mask> } <mask> <mask> func (a *authAES128) SetOverhead(overhead int) { <mask> a.Overhead = overhead <mask> } <mask> <mask> func (a *authAES128) Decode(b []byte) ([]byte, int, error) { <mask> a.buffer.Reset() <mask> bSize := len(b) <mask> readSize := 0 <mask> key := pool.Get(len(a.userKey) + 4) <mask> defer pool.Put(key) <mask> copy(key, a.userKey) <mask> for bSize > 4 { <mask> binary.LittleEndian.PutUint32(key[len(key)-4:], a.recvID) <mask> <mask> h := a.hmac(key, b[:2]) <mask> if !bytes.Equal(h[:2], b[2:4]) { <mask> return nil, 0, errAuthAES128IncorrectMAC <mask> } <mask> <mask> length := int(binary.LittleEndian.Uint16(b[:2])) <mask> if length >= 8192 || length < 8 { <mask> return nil, 0, errAuthAES128DataLengthError <mask> } <mask> if length > bSize { <mask> break <mask> } <mask> <mask> h = a.hmac(key, b[:length-4]) <mask> if !bytes.Equal(h[:4], b[length-4:length]) { <mask> return nil, 0, errAuthAES128IncorrectChecksum <mask> } <mask> <mask> a.recvID++ <mask> pos := int(b[4]) <mask> if pos < 255 { <mask> pos += 4 <mask> } else { <mask> pos = int(binary.LittleEndian.Uint16(b[5:7])) + 4 <mask> } <mask> <mask> if pos > length-4 { <mask> return nil, 0, errAuthAES128PositionTooLarge <mask> } <mask> a.buffer.Write(b[pos : length-4]) <mask> b = b[length:] <mask> bSize -= length <mask> readSize += length <mask> } <mask> return a.buffer.Bytes(), readSize, nil <mask> } <mask> <mask> func (a *authAES128) Encode(b []byte) ([]byte, error) { <mask> a.buffer.Reset() <mask> bSize := len(b) <mask> offset := 0 <mask> if bSize > 0 && !a.hasSentHeader { <mask> authSize := bSize <mask> if authSize > 1200 { <mask> authSize = 1200 <mask> } <mask> a.hasSentHeader = true <mask> a.buffer.Write(a.packAuthData(b[:authSize])) <mask> bSize -= authSize <mask> offset += authSize <mask> } <mask> const blockSize = 4096 <mask> for bSize > blockSize { <mask> packSize, randSize := a.packedDataSize(b[offset : offset+blockSize]) <mask> pack := pool.Get(packSize) <mask> a.packData(b[offset:offset+blockSize], pack, randSize) <mask> a.buffer.Write(pack) <mask> pool.Put(pack) <mask> bSize -= blockSize <mask> offset += blockSize <mask> } <mask> if bSize > 0 { <mask> packSize, randSize := a.packedDataSize(b[offset:]) <mask> pack := pool.Get(packSize) <mask> a.packData(b[offset:], pack, randSize) <mask> a.buffer.Write(pack) <mask> pool.Put(pack) <mask> } <mask> return a.buffer.Bytes(), nil <mask> } <mask> <mask> func (a *authAES128) DecodePacket(b []byte) ([]byte, int, error) { <mask> bSize := len(b) <mask> h := a.hmac(a.Key, b[:bSize-4]) <mask> if !bytes.Equal(h[:4], b[bSize-4:]) { <mask> return nil, 0, errAuthAES128IncorrectMAC <mask> } <mask> return b[:bSize-4], bSize - 4, nil <mask> } <mask> <mask> func (a *authAES128) EncodePacket(b []byte) ([]byte, error) { <mask> a.initUserKeyAndID() <mask> <mask> var buf bytes.Buffer <mask> buf.Write(b) <mask> buf.Write(a.uid[:]) <mask> h := a.hmac(a.userKey, buf.Bytes()) <mask> buf.Write(h[:4]) <mask> return buf.Bytes(), nil <mask> } <mask> <mask> func (a *authAES128) initUserKeyAndID() { <mask> if a.userKey == nil { <mask> params := strings.Split(a.Param, ":") <mask> if len(params) >= 2 { <mask> if userID, err := strconv.ParseUint(params[0], 10, 32); err == nil { <mask> binary.LittleEndian.PutUint32(a.uid[:], uint32(userID)) <mask> a.userKey = a.hashDigest([]byte(params[1])) <mask> } <mask> } <mask> <mask> if a.userKey == nil { <mask> rand.Read(a.uid[:]) <mask> a.userKey = make([]byte, len(a.Key)) <mask> copy(a.userKey, a.Key) <mask> } <mask> } <mask> } <mask> <mask> func (a *authAES128) packedDataSize(data []byte) (packSize, randSize int) { <mask> dataSize := len(data) <mask> randSize = 1 <mask> if dataSize <= 1200 { <mask> if a.packID > 4 { <mask> randSize += rand.Intn(32) <mask> } else { <mask> if dataSize > 900 { <mask> randSize += rand.Intn(128) <mask> } else { <mask> randSize += rand.Intn(512) <mask> } <mask> } <mask> } <mask> packSize = randSize + dataSize + 8 <mask> return <mask> } <mask> <mask> func (a *authAES128) packData(data, ret []byte, randSize int) { <mask> dataSize := len(data) <mask> retSize := len(ret) <mask> // 0~1, ret_size <mask> binary.LittleEndian.PutUint16(ret[0:], uint16(retSize&0xFFFF)) <mask> // 2~3, hmac <mask> key := pool.Get(len(a.userKey) + 4) <mask> defer pool.Put(key) <mask> copy(key, a.userKey) <mask> binary.LittleEndian.PutUint32(key[len(key)-4:], a.packID) <mask> h := a.hmac(key, ret[:2]) <mask> copy(ret[2:4], h[:2]) <mask> // 4~rand_size+4, rand number <mask> rand.Read(ret[4 : 4+randSize]) <mask> // 4, rand_size <mask> if randSize < 128 { <mask> ret[4] = byte(randSize & 0xFF) <mask> } else { <mask> // 4, magic number 0xFF <mask> ret[4] = 0xFF <mask> // 5~6, rand_size <mask> binary.LittleEndian.PutUint16(ret[5:], uint16(randSize&0xFFFF)) <mask> } <mask> // rand_size+4~ret_size-4, data <mask> if dataSize > 0 { <mask> copy(ret[randSize+4:], data) <mask> } <mask> a.packID++ <mask> h = a.hmac(key, ret[:retSize-4]) <mask> copy(ret[retSize-4:], h[:4]) <mask> } <mask> <mask> func (a *authAES128) packAuthData(data []byte) (ret []byte) { <mask> dataSize := len(data) <mask> var randSize int <mask> <mask> if dataSize > 400 { <mask> randSize = rand.Intn(512) <mask> } else { <mask> randSize = rand.Intn(1024) <mask> } <mask> <mask> dataOffset := randSize + 16 + 4 + 4 + 7 <mask> retSize := dataOffset + dataSize + 4 <mask> ret = make([]byte, retSize) <mask> encrypt := make([]byte, 24) <mask> key := make([]byte, len(a.IV)+len(a.Key)) <mask> copy(key, a.IV) <mask> copy(key[len(a.IV):], a.Key) <mask> <mask> rand.Read(ret[dataOffset-randSize:]) <mask> a.mutex.Lock() <mask> defer a.mutex.Unlock() <mask> a.connectionID++ <mask> if a.connectionID > 0xFF000000 { <mask> a.clientID = nil <mask> } <mask> if len(a.clientID) == 0 { <mask> a.clientID = make([]byte, 8) <mask> rand.Read(a.clientID) <mask> b := make([]byte, 4) <mask> rand.Read(b) <mask> a.connectionID = binary.LittleEndian.Uint32(b) & 0xFFFFFF <mask> } <mask> copy(encrypt[4:], a.clientID) <mask> binary.LittleEndian.PutUint32(encrypt[8:], a.connectionID) <mask> <mask> now := time.Now().Unix() <mask> binary.LittleEndian.PutUint32(encrypt[:4], uint32(now)) <mask> <mask> binary.LittleEndian.PutUint16(encrypt[12:], uint16(retSize&0xFFFF)) <mask> binary.LittleEndian.PutUint16(encrypt[14:], uint16(randSize&0xFFFF)) <mask> <mask> a.initUserKeyAndID() <mask> <mask> aesCipherKey := core.Kdf(base64.StdEncoding.EncodeToString(a.userKey)+a.salt, 16) <mask> block, err := aes.NewCipher(aesCipherKey) <mask> if err != nil { <mask> return nil <mask> } <mask> encryptData := make([]byte, 16) <mask> iv := make([]byte, aes.BlockSize) <mask> cbc := cipher.NewCBCEncrypter(block, iv) <mask> cbc.CryptBlocks(encryptData, encrypt[:16]) <mask> copy(encrypt[:4], a.uid[:]) <mask> copy(encrypt[4:4+16], encryptData) <mask> <mask> h := a.hmac(key, encrypt[:20]) <mask> copy(encrypt[20:], h[:4]) <mask> <mask> rand.Read(ret[:1]) <mask> h = a.hmac(key, ret[:1]) <mask> copy(ret[1:], h[:7-1]) <mask> <mask> copy(ret[7:], encrypt) <mask> copy(ret[dataOffset:], data) <mask> <mask> h = a.hmac(a.userKey, ret[:retSize-4]) <mask> copy(ret[retSize-4:], h[:4]) <mask> <mask> return <mask> } </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove func (a *authSHA1V4) packedDataSize(data []byte) (packSize, randSize int) { dataSize := len(data) randSize = 1 if dataSize <= 1300 { if dataSize > 400 { randSize += rand.Intn(128) } else { randSize += rand.Intn(1024) } } packSize = randSize + dataSize + 8 return </s> add func (a *authSHA1V4) EncodePacket(buf *bytes.Buffer, b []byte) error { buf.Write(b) return nil </s> remove func (a *authSHA1V4) packAuthData(data []byte) (ret []byte) { dataSize := len(data) randSize := 1 if dataSize <= 1300 { if dataSize > 400 { randSize += rand.Intn(128) } else { randSize += rand.Intn(1024) } } dataOffset := randSize + 4 + 2 retSize := dataOffset + dataSize + 12 + tools.HmacSHA1Len ret = make([]byte, retSize) a.mutex.Lock() defer a.mutex.Unlock() a.connectionID++ if a.connectionID > 0xFF000000 { a.clientID = nil </s> add func (a *authSHA1V4) packAuthData(poolBuf *bytes.Buffer, data []byte) { dataLength := len(data) randDataLength := a.getRandDataLength(12 + dataLength) /* 2: uint16 BigEndian packedAuthDataLength 4: uint32 LittleEndian crc32Data 3: maxRandDataLengthPrefix (min: 1) 12: authDataLength 10: hmacSHA1DataLength */ packedAuthDataLength := 2 + 4 + 3 + randDataLength + 12 + dataLength + 10 if randDataLength < 128 { packedAuthDataLength -= 2 </s> remove return &authAES128{ Base: b, recvInfo: &recvInfo{buffer: new(bytes.Buffer)}, authData: &authData{}, salt: "auth_aes128_sha1", hmac: tools.HmacSHA1, hashDigest: tools.SHA1Sum, </s> add a := &authAES128{ Base: b, authData: &authData{}, authAES128Function: &authAES128Function{salt: "auth_aes128_sha1", hmac: tools.HmacSHA1, hashDigest: tools.SHA1Sum}, userData: &userData{}, } a.initUserData() return a } func (a *authAES128) initUserData() { params := strings.Split(a.Param, ":") if len(params) > 1 { if userID, err := strconv.ParseUint(params[0], 10, 32); err == nil { binary.LittleEndian.PutUint32(a.userID[:], uint32(userID)) a.userKey = a.hashDigest([]byte(params[1])) } else { log.Warnln("Wrong protocol-param for %s, only digits are expected before ':'", a.salt) } } if len(a.userKey) == 0 { a.userKey = a.Key rand.Read(a.userID[:]) } } func (a *authAES128) StreamConn(c net.Conn, iv []byte) net.Conn { p := &authAES128{ Base: a.Base, authData: a.next(), authAES128Function: a.authAES128Function, userData: a.userData, packID: 1, recvID: 1, } p.iv = iv return &Conn{Conn: c, Protocol: p} } func (a *authAES128) PacketConn(c net.PacketConn) net.PacketConn { p := &authAES128{ Base: a.Base, authAES128Function: a.authAES128Function, userData: a.userData, } return &PacketConn{PacketConn: c, Protocol: p} } func (a *authAES128) Decode(dst, src *bytes.Buffer) error { if a.rawTrans { dst.ReadFrom(src) return nil } for src.Len() > 4 { macKey := pool.Get(len(a.userKey) + 4) defer pool.Put(macKey) copy(macKey, a.userKey) binary.LittleEndian.PutUint32(macKey[len(a.userKey):], a.recvID) if !bytes.Equal(a.hmac(macKey, src.Bytes()[:2])[:2], src.Bytes()[2:4]) { src.Reset() return errAuthAES128MACError } length := int(binary.LittleEndian.Uint16(src.Bytes()[:2])) if length >= 8192 || length < 7 { a.rawTrans = true src.Reset() return errAuthAES128LengthError } if length > src.Len() { break } if !bytes.Equal(a.hmac(macKey, src.Bytes()[:length-4])[:4], src.Bytes()[length-4:length]) { a.rawTrans = true src.Reset() return errAuthAES128ChksumError } a.recvID++ pos := int(src.Bytes()[4]) if pos < 255 { pos += 4 } else { pos = int(binary.LittleEndian.Uint16(src.Bytes()[5:7])) + 4 } dst.Write(src.Bytes()[pos : length-4]) src.Next(length) } return nil } func (a *authAES128) Encode(buf *bytes.Buffer, b []byte) error { fullDataLength := len(b) if !a.hasSentHeader { dataLength := getDataLength(b) a.packAuthData(buf, b[:dataLength]) b = b[dataLength:] a.hasSentHeader = true } for len(b) > 8100 { a.packData(buf, b[:8100], fullDataLength) b = b[8100:] } if len(b) > 0 { a.packData(buf, b, fullDataLength) } return nil } func (a *authAES128) DecodePacket(b []byte) ([]byte, error) { if !bytes.Equal(a.hmac(a.Key, b[:len(b)-4])[:4], b[len(b)-4:]) { return nil, errAuthAES128ChksumError } return b[:len(b)-4], nil } func (a *authAES128) EncodePacket(buf *bytes.Buffer, b []byte) error { buf.Write(b) buf.Write(a.userID[:]) buf.Write(a.hmac(a.userKey, buf.Bytes())[:4]) return nil } func (a *authAES128) packData(poolBuf *bytes.Buffer, data []byte, fullDataLength int) { dataLength := len(data) randDataLength := a.getRandDataLengthForPackData(dataLength, fullDataLength) /* 2: uint16 LittleEndian packedDataLength 2: hmac of packedDataLength 3: maxRandDataLengthPrefix (min:1) 4: hmac of packedData except the last 4 bytes */ packedDataLength := 2 + 2 + 3 + randDataLength + dataLength + 4 if randDataLength < 128 { packedDataLength -= 2 } macKey := pool.Get(len(a.userKey) + 4) defer pool.Put(macKey) copy(macKey, a.userKey) binary.LittleEndian.PutUint32(macKey[len(a.userKey):], a.packID) a.packID++ binary.Write(poolBuf, binary.LittleEndian, uint16(packedDataLength)) poolBuf.Write(a.hmac(macKey, poolBuf.Bytes()[poolBuf.Len()-2:])[:2]) a.packRandData(poolBuf, randDataLength) poolBuf.Write(data) poolBuf.Write(a.hmac(macKey, poolBuf.Bytes()[poolBuf.Len()-packedDataLength+4:])[:4]) } func trapezoidRandom(max int, d float64) int { base := rand.Float64() if d-0 > 1e-6 { a := 1 - d base = (math.Sqrt(a*a+4*d*base) - a) / (2 * d) } return int(base * float64(max)) } func (a *authAES128) getRandDataLengthForPackData(dataLength, fullDataLength int) int { if fullDataLength >= 32*1024-a.Overhead { return 0 } // 1460: tcp_mss revLength := 1460 - dataLength - 9 if revLength == 0 { return 0 } if revLength < 0 { if revLength > -1460 { return trapezoidRandom(revLength+1460, -0.3) } return rand.Intn(32) } if dataLength > 900 { return rand.Intn(revLength) } return trapezoidRandom(revLength, -0.3) } func (a *authAES128) packAuthData(poolBuf *bytes.Buffer, data []byte) { if len(data) == 0 { return } dataLength := len(data) randDataLength := a.getRandDataLengthForPackAuthData(dataLength) /* 7: checkHead(1) and hmac of checkHead(6) 4: userID 16: encrypted data of authdata(12), uint16 BigEndian packedDataLength(2) and uint16 BigEndian randDataLength(2) 4: hmac of userID and encrypted data 4: hmac of packedAuthData except the last 4 bytes */ packedAuthDataLength := 7 + 4 + 16 + 4 + randDataLength + dataLength + 4 macKey := pool.Get(len(a.iv) + len(a.Key)) defer pool.Put(macKey) copy(macKey, a.iv) copy(macKey[len(a.iv):], a.Key) poolBuf.WriteByte(byte(rand.Intn(256))) poolBuf.Write(a.hmac(macKey, poolBuf.Bytes())[:6]) poolBuf.Write(a.userID[:]) err := a.authData.putEncryptedData(poolBuf, a.userKey, [2]int{packedAuthDataLength, randDataLength}, a.salt) if err != nil { poolBuf.Reset() return } poolBuf.Write(a.hmac(macKey, poolBuf.Bytes()[7:])[:4]) tools.AppendRandBytes(poolBuf, randDataLength) poolBuf.Write(data) poolBuf.Write(a.hmac(a.userKey, poolBuf.Bytes())[:4]) } func (a *authAES128) getRandDataLengthForPackAuthData(size int) int { if size > 400 { return rand.Intn(512) } return rand.Intn(1024) } func (a *authAES128) packRandData(poolBuf *bytes.Buffer, size int) { if size < 128 { poolBuf.WriteByte(byte(size + 1)) tools.AppendRandBytes(poolBuf, size) return </s> remove if bSize > 0 { packSize, randSize := a.packedDataSize(b[offset:]) pack := pool.Get(packSize) a.packData(b[offset:], pack, randSize) a.buffer.Write(pack) pool.Put(pack) </s> add if len(b) > 0 { a.packData(buf, b) </s> remove const blockSize = 4096 for bSize > blockSize { packSize, randSize := a.packedDataSize(b[offset : offset+blockSize]) pack := pool.Get(packSize) a.packData(b[offset:offset+blockSize], pack, randSize) a.buffer.Write(pack) pool.Put(pack) offset += blockSize bSize -= blockSize </s> add for len(b) > 8100 { a.packData(buf, b[:8100]) b = b[8100:]
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "re...
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_aes128_md5.go
"encoding/binary" "math" "math/rand" "net" "strconv" "strings"
<mask> package protocol <mask> <mask> import ( <mask> "bytes" <mask> <mask> "github.com/Dreamacro/clash/common/pool" <mask> "github.com/Dreamacro/clash/component/ssr/tools" <mask> "github.com/Dreamacro/clash/log" </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove // Base information for protocol </s> add import ( "bytes" "crypto/aes" "crypto/cipher" "encoding/base64" "encoding/binary" "math/rand" "sync" "time" "github.com/Dreamacro/clash/common/pool" "github.com/Dreamacro/clash/log" "github.com/Dreamacro/go-shadowsocks2/core" ) </s> remove import ( "bytes" "crypto/aes" "crypto/cipher" "encoding/base64" "encoding/binary" "math/rand" "strconv" "strings" "time" "github.com/Dreamacro/clash/common/pool" "github.com/Dreamacro/clash/component/ssr/tools" "github.com/Dreamacro/go-shadowsocks2/core" ) type authAES128 struct { *Base *recvInfo *authData hasSentHeader bool packID uint32 userKey []byte uid [4]byte salt string hmac hmacMethod hashDigest hashDigestMethod } </s> add import "github.com/Dreamacro/clash/component/ssr/tools" </s> remove "crypto/aes" </s> add
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_aes128_sha1.go
"github.com/Dreamacro/clash/common/pool"
<mask> "net" <mask> "strconv" <mask> "strings" <mask> <mask> "github.com/Dreamacro/clash/component/ssr/tools" <mask> "github.com/Dreamacro/clash/log" <mask> ) <mask> </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove "time" </s> add </s> remove "math/rand" </s> add "net"
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_aes128_sha1.go
"github.com/Dreamacro/clash/log"
<mask> <mask> "github.com/Dreamacro/clash/common/pool" <mask> "github.com/Dreamacro/clash/component/ssr/tools" <mask> ) <mask> <mask> type hmacMethod func(key, data []byte) []byte <mask> type hashDigestMethod func([]byte) []byte <mask> <mask> func init() { </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove import ( "bytes" "crypto/aes" "crypto/cipher" "encoding/base64" "encoding/binary" "math/rand" "strconv" "strings" "time" "github.com/Dreamacro/clash/common/pool" "github.com/Dreamacro/clash/component/ssr/tools" "github.com/Dreamacro/go-shadowsocks2/core" ) type authAES128 struct { *Base *recvInfo *authData hasSentHeader bool packID uint32 userKey []byte uid [4]byte salt string hmac hmacMethod hashDigest hashDigestMethod } </s> add import "github.com/Dreamacro/clash/component/ssr/tools" </s> remove register("auth_aes128_sha1", newAuthAES128SHA1) </s> add register("auth_aes128_sha1", newAuthAES128SHA1, 9) } type authAES128Function struct { salt string hmac hmacMethod hashDigest hashDigestMethod } type authAES128 struct { *Base *authData *authAES128Function *userData iv []byte hasSentHeader bool rawTrans bool packID uint32 recvID uint32 </s> remove type authData struct { clientID []byte connectionID uint32 mutex sync.Mutex } type recvInfo struct { recvID uint32 buffer *bytes.Buffer } type hmacMethod func(key []byte, data []byte) []byte type hashDigestMethod func(data []byte) []byte type rndMethod func(dataSize int, random *shift128PlusContext, lastHash []byte, dataSizeList, dataSizeList2 []int, overhead int) int // Protocol provides methods for decoding, encoding and iv setting </s> add
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_aes128_sha1.go
type hmacMethod func(key, data []byte) []byte type hashDigestMethod func([]byte) []byte
<mask> "github.com/Dreamacro/clash/component/ssr/tools" <mask> "github.com/Dreamacro/clash/log" <mask> ) <mask> <mask> func init() { <mask> register("auth_aes128_sha1", newAuthAES128SHA1, 9) <mask> } <mask> <mask> type authAES128Function struct { </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove register("auth_aes128_sha1", newAuthAES128SHA1) </s> add register("auth_aes128_sha1", newAuthAES128SHA1, 9) } type authAES128Function struct { salt string hmac hmacMethod hashDigest hashDigestMethod } type authAES128 struct { *Base *authData *authAES128Function *userData iv []byte hasSentHeader bool rawTrans bool packID uint32 recvID uint32 </s> remove type authChain struct { </s> add func init() { register("auth_chain_a", newAuthChainA, 4) } type randDataLengthMethod func(int, []byte, *tools.XorShift128Plus) int type authChainA struct {
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_aes128_sha1.go
register("auth_aes128_sha1", newAuthAES128SHA1, 9) } type authAES128Function struct { salt string hmac hmacMethod hashDigest hashDigestMethod } type authAES128 struct { *Base *authData *authAES128Function *userData iv []byte hasSentHeader bool rawTrans bool packID uint32 recvID uint32
<mask> "github.com/Dreamacro/clash/component/ssr/tools" <mask> ) <mask> <mask> func init() { <mask> register("auth_aes128_sha1", newAuthAES128SHA1) <mask> } <mask> <mask> func newAuthAES128SHA1(b *Base) Protocol { <mask> return &authAES128{ <mask> Base: b, </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove register("auth_aes128_md5", newAuthAES128MD5) </s> add register("auth_aes128_md5", newAuthAES128MD5, 9) </s> remove register("auth_chain_b", newAuthChainB) </s> add register("auth_chain_b", newAuthChainB, 4) } type authChainB struct { *authChainA dataSizeList []int dataSizeList2 []int </s> remove return &authChain{ Base: b, authData: &authData{}, salt: "auth_chain_a", hmac: tools.HmacMD5, hashDigest: tools.SHA1Sum, rnd: authChainAGetRandLen, </s> add a := &authChainA{ Base: b, authData: &authData{}, userData: &userData{}, salt: "auth_chain_a", </s> remove func newOrigin(b *Base) Protocol { return &origin{} } </s> add func init() { register("origin", newOrigin, 0) }
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_aes128_sha1.go
a := &authAES128{ Base: b, authData: &authData{}, authAES128Function: &authAES128Function{salt: "auth_aes128_sha1", hmac: tools.HmacSHA1, hashDigest: tools.SHA1Sum}, userData: &userData{}, } a.initUserData() return a } func (a *authAES128) initUserData() { params := strings.Split(a.Param, ":") if len(params) > 1 { if userID, err := strconv.ParseUint(params[0], 10, 32); err == nil { binary.LittleEndian.PutUint32(a.userID[:], uint32(userID)) a.userKey = a.hashDigest([]byte(params[1])) } else { log.Warnln("Wrong protocol-param for %s, only digits are expected before ':'", a.salt) } } if len(a.userKey) == 0 { a.userKey = a.Key rand.Read(a.userID[:]) } } func (a *authAES128) StreamConn(c net.Conn, iv []byte) net.Conn { p := &authAES128{ Base: a.Base, authData: a.next(), authAES128Function: a.authAES128Function, userData: a.userData, packID: 1, recvID: 1, } p.iv = iv return &Conn{Conn: c, Protocol: p} } func (a *authAES128) PacketConn(c net.PacketConn) net.PacketConn { p := &authAES128{ Base: a.Base, authAES128Function: a.authAES128Function, userData: a.userData, } return &PacketConn{PacketConn: c, Protocol: p} } func (a *authAES128) Decode(dst, src *bytes.Buffer) error { if a.rawTrans { dst.ReadFrom(src) return nil } for src.Len() > 4 { macKey := pool.Get(len(a.userKey) + 4) defer pool.Put(macKey) copy(macKey, a.userKey) binary.LittleEndian.PutUint32(macKey[len(a.userKey):], a.recvID) if !bytes.Equal(a.hmac(macKey, src.Bytes()[:2])[:2], src.Bytes()[2:4]) { src.Reset() return errAuthAES128MACError } length := int(binary.LittleEndian.Uint16(src.Bytes()[:2])) if length >= 8192 || length < 7 { a.rawTrans = true src.Reset() return errAuthAES128LengthError } if length > src.Len() { break } if !bytes.Equal(a.hmac(macKey, src.Bytes()[:length-4])[:4], src.Bytes()[length-4:length]) { a.rawTrans = true src.Reset() return errAuthAES128ChksumError } a.recvID++ pos := int(src.Bytes()[4]) if pos < 255 { pos += 4 } else { pos = int(binary.LittleEndian.Uint16(src.Bytes()[5:7])) + 4 } dst.Write(src.Bytes()[pos : length-4]) src.Next(length) } return nil } func (a *authAES128) Encode(buf *bytes.Buffer, b []byte) error { fullDataLength := len(b) if !a.hasSentHeader { dataLength := getDataLength(b) a.packAuthData(buf, b[:dataLength]) b = b[dataLength:] a.hasSentHeader = true } for len(b) > 8100 { a.packData(buf, b[:8100], fullDataLength) b = b[8100:] } if len(b) > 0 { a.packData(buf, b, fullDataLength) } return nil } func (a *authAES128) DecodePacket(b []byte) ([]byte, error) { if !bytes.Equal(a.hmac(a.Key, b[:len(b)-4])[:4], b[len(b)-4:]) { return nil, errAuthAES128ChksumError } return b[:len(b)-4], nil } func (a *authAES128) EncodePacket(buf *bytes.Buffer, b []byte) error { buf.Write(b) buf.Write(a.userID[:]) buf.Write(a.hmac(a.userKey, buf.Bytes())[:4]) return nil } func (a *authAES128) packData(poolBuf *bytes.Buffer, data []byte, fullDataLength int) { dataLength := len(data) randDataLength := a.getRandDataLengthForPackData(dataLength, fullDataLength) /* 2: uint16 LittleEndian packedDataLength 2: hmac of packedDataLength 3: maxRandDataLengthPrefix (min:1) 4: hmac of packedData except the last 4 bytes */ packedDataLength := 2 + 2 + 3 + randDataLength + dataLength + 4 if randDataLength < 128 { packedDataLength -= 2 } macKey := pool.Get(len(a.userKey) + 4) defer pool.Put(macKey) copy(macKey, a.userKey) binary.LittleEndian.PutUint32(macKey[len(a.userKey):], a.packID) a.packID++ binary.Write(poolBuf, binary.LittleEndian, uint16(packedDataLength)) poolBuf.Write(a.hmac(macKey, poolBuf.Bytes()[poolBuf.Len()-2:])[:2]) a.packRandData(poolBuf, randDataLength) poolBuf.Write(data) poolBuf.Write(a.hmac(macKey, poolBuf.Bytes()[poolBuf.Len()-packedDataLength+4:])[:4]) } func trapezoidRandom(max int, d float64) int { base := rand.Float64() if d-0 > 1e-6 { a := 1 - d base = (math.Sqrt(a*a+4*d*base) - a) / (2 * d) } return int(base * float64(max)) } func (a *authAES128) getRandDataLengthForPackData(dataLength, fullDataLength int) int { if fullDataLength >= 32*1024-a.Overhead { return 0 } // 1460: tcp_mss revLength := 1460 - dataLength - 9 if revLength == 0 { return 0 } if revLength < 0 { if revLength > -1460 { return trapezoidRandom(revLength+1460, -0.3) } return rand.Intn(32) } if dataLength > 900 { return rand.Intn(revLength) } return trapezoidRandom(revLength, -0.3) } func (a *authAES128) packAuthData(poolBuf *bytes.Buffer, data []byte) { if len(data) == 0 { return } dataLength := len(data) randDataLength := a.getRandDataLengthForPackAuthData(dataLength) /* 7: checkHead(1) and hmac of checkHead(6) 4: userID 16: encrypted data of authdata(12), uint16 BigEndian packedDataLength(2) and uint16 BigEndian randDataLength(2) 4: hmac of userID and encrypted data 4: hmac of packedAuthData except the last 4 bytes */ packedAuthDataLength := 7 + 4 + 16 + 4 + randDataLength + dataLength + 4 macKey := pool.Get(len(a.iv) + len(a.Key)) defer pool.Put(macKey) copy(macKey, a.iv) copy(macKey[len(a.iv):], a.Key) poolBuf.WriteByte(byte(rand.Intn(256))) poolBuf.Write(a.hmac(macKey, poolBuf.Bytes())[:6]) poolBuf.Write(a.userID[:]) err := a.authData.putEncryptedData(poolBuf, a.userKey, [2]int{packedAuthDataLength, randDataLength}, a.salt) if err != nil { poolBuf.Reset() return } poolBuf.Write(a.hmac(macKey, poolBuf.Bytes()[7:])[:4]) tools.AppendRandBytes(poolBuf, randDataLength) poolBuf.Write(data) poolBuf.Write(a.hmac(a.userKey, poolBuf.Bytes())[:4]) } func (a *authAES128) getRandDataLengthForPackAuthData(size int) int { if size > 400 { return rand.Intn(512) } return rand.Intn(1024) } func (a *authAES128) packRandData(poolBuf *bytes.Buffer, size int) { if size < 128 { poolBuf.WriteByte(byte(size + 1)) tools.AppendRandBytes(poolBuf, size) return
<mask> register("auth_aes128_sha1", newAuthAES128SHA1) <mask> } <mask> <mask> func newAuthAES128SHA1(b *Base) Protocol { <mask> return &authAES128{ <mask> Base: b, <mask> recvInfo: &recvInfo{buffer: new(bytes.Buffer)}, <mask> authData: &authData{}, <mask> salt: "auth_aes128_sha1", <mask> hmac: tools.HmacSHA1, <mask> hashDigest: tools.SHA1Sum, <mask> } <mask> } </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove return &authChain{ Base: b, authData: &authData{}, salt: "auth_chain_a", hmac: tools.HmacMD5, hashDigest: tools.SHA1Sum, rnd: authChainAGetRandLen, </s> add a := &authChainA{ Base: b, authData: &authData{}, userData: &userData{}, salt: "auth_chain_a", </s> remove return &authChain{ Base: b, authData: &authData{}, salt: "auth_chain_b", hmac: tools.HmacMD5, hashDigest: tools.SHA1Sum, rnd: authChainBGetRandLen, </s> add a := &authChainB{ authChainA: &authChainA{ Base: b, authData: &authData{}, userData: &userData{}, salt: "auth_chain_b", }, </s> remove register("auth_aes128_sha1", newAuthAES128SHA1) </s> add register("auth_aes128_sha1", newAuthAES128SHA1, 9) } type authAES128Function struct { salt string hmac hmacMethod hashDigest hashDigestMethod } type authAES128 struct { *Base *authData *authAES128Function *userData iv []byte hasSentHeader bool rawTrans bool packID uint32 recvID uint32 </s> remove func (a *authChain) initForConn(iv []byte) Protocol { r := &authChain{ Base: &Base{ IV: iv, Key: a.Key, TCPMss: a.TCPMss, Overhead: a.Overhead, Param: a.Param, }, recvInfo: &recvInfo{recvID: 1, buffer: new(bytes.Buffer)}, authData: a.authData, salt: a.salt, hmac: a.hmac, hashDigest: a.hashDigest, rnd: a.rnd, </s> add func (a *authChainA) initUserData() { params := strings.Split(a.Param, ":") if len(params) > 1 { if userID, err := strconv.ParseUint(params[0], 10, 32); err == nil { binary.LittleEndian.PutUint32(a.userID[:], uint32(userID)) a.userKey = []byte(params[1]) } else { log.Warnln("Wrong protocol-param for %s, only digits are expected before ':'", a.salt) } </s> remove register("auth_aes128_md5", newAuthAES128MD5) </s> add register("auth_aes128_md5", newAuthAES128MD5, 9)
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_aes128_sha1.go
poolBuf.WriteByte(255) binary.Write(poolBuf, binary.LittleEndian, uint16(size+3)) tools.AppendRandBytes(poolBuf, size)
<mask> poolBuf.WriteByte(byte(size + 1)) <mask> tools.AppendRandBytes(poolBuf, size) <mask> return <mask> } <mask> } </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove crc := crc32.ChecksumIEEE(crcData) & 0xFFFFFFFF // 2~6, crc of (ret size+salt+key) binary.LittleEndian.PutUint32(ret[2:], crc) // 6~(rand size+6), rand numbers rand.Read(ret[dataOffset-randSize : dataOffset]) // 6, rand size if randSize < 128 { ret[6] = byte(randSize & 0xFF) } else { // 6, magic number 0xFF ret[6] = 0xFF // 7~8, rand size binary.BigEndian.PutUint16(ret[7:9], uint16(randSize&0xFFFF)) </s> add key := pool.Get(len(a.iv) + len(a.Key)) defer pool.Put(key) copy(key, a.iv) copy(key[len(a.iv):], a.Key) poolBuf.Write(crcData[:2]) binary.Write(poolBuf, binary.LittleEndian, crc32.ChecksumIEEE(crcData)) a.packRandData(poolBuf, randDataLength) a.putAuthData(poolBuf) poolBuf.Write(data) poolBuf.Write(tools.HmacSHA1(key, poolBuf.Bytes()[poolBuf.Len()-packedAuthDataLength+10:])[:10]) } func (a *authSHA1V4) packRandData(poolBuf *bytes.Buffer, size int) { if size < 128 { poolBuf.WriteByte(byte(size + 1)) tools.AppendRandBytes(poolBuf, size) return </s> remove return &authAES128{ Base: b, recvInfo: &recvInfo{buffer: new(bytes.Buffer)}, authData: &authData{}, salt: "auth_aes128_sha1", hmac: tools.HmacSHA1, hashDigest: tools.SHA1Sum, </s> add a := &authAES128{ Base: b, authData: &authData{}, authAES128Function: &authAES128Function{salt: "auth_aes128_sha1", hmac: tools.HmacSHA1, hashDigest: tools.SHA1Sum}, userData: &userData{}, } a.initUserData() return a } func (a *authAES128) initUserData() { params := strings.Split(a.Param, ":") if len(params) > 1 { if userID, err := strconv.ParseUint(params[0], 10, 32); err == nil { binary.LittleEndian.PutUint32(a.userID[:], uint32(userID)) a.userKey = a.hashDigest([]byte(params[1])) } else { log.Warnln("Wrong protocol-param for %s, only digits are expected before ':'", a.salt) } } if len(a.userKey) == 0 { a.userKey = a.Key rand.Read(a.userID[:]) } } func (a *authAES128) StreamConn(c net.Conn, iv []byte) net.Conn { p := &authAES128{ Base: a.Base, authData: a.next(), authAES128Function: a.authAES128Function, userData: a.userData, packID: 1, recvID: 1, } p.iv = iv return &Conn{Conn: c, Protocol: p} } func (a *authAES128) PacketConn(c net.PacketConn) net.PacketConn { p := &authAES128{ Base: a.Base, authAES128Function: a.authAES128Function, userData: a.userData, } return &PacketConn{PacketConn: c, Protocol: p} } func (a *authAES128) Decode(dst, src *bytes.Buffer) error { if a.rawTrans { dst.ReadFrom(src) return nil } for src.Len() > 4 { macKey := pool.Get(len(a.userKey) + 4) defer pool.Put(macKey) copy(macKey, a.userKey) binary.LittleEndian.PutUint32(macKey[len(a.userKey):], a.recvID) if !bytes.Equal(a.hmac(macKey, src.Bytes()[:2])[:2], src.Bytes()[2:4]) { src.Reset() return errAuthAES128MACError } length := int(binary.LittleEndian.Uint16(src.Bytes()[:2])) if length >= 8192 || length < 7 { a.rawTrans = true src.Reset() return errAuthAES128LengthError } if length > src.Len() { break } if !bytes.Equal(a.hmac(macKey, src.Bytes()[:length-4])[:4], src.Bytes()[length-4:length]) { a.rawTrans = true src.Reset() return errAuthAES128ChksumError } a.recvID++ pos := int(src.Bytes()[4]) if pos < 255 { pos += 4 } else { pos = int(binary.LittleEndian.Uint16(src.Bytes()[5:7])) + 4 } dst.Write(src.Bytes()[pos : length-4]) src.Next(length) } return nil } func (a *authAES128) Encode(buf *bytes.Buffer, b []byte) error { fullDataLength := len(b) if !a.hasSentHeader { dataLength := getDataLength(b) a.packAuthData(buf, b[:dataLength]) b = b[dataLength:] a.hasSentHeader = true } for len(b) > 8100 { a.packData(buf, b[:8100], fullDataLength) b = b[8100:] } if len(b) > 0 { a.packData(buf, b, fullDataLength) } return nil } func (a *authAES128) DecodePacket(b []byte) ([]byte, error) { if !bytes.Equal(a.hmac(a.Key, b[:len(b)-4])[:4], b[len(b)-4:]) { return nil, errAuthAES128ChksumError } return b[:len(b)-4], nil } func (a *authAES128) EncodePacket(buf *bytes.Buffer, b []byte) error { buf.Write(b) buf.Write(a.userID[:]) buf.Write(a.hmac(a.userKey, buf.Bytes())[:4]) return nil } func (a *authAES128) packData(poolBuf *bytes.Buffer, data []byte, fullDataLength int) { dataLength := len(data) randDataLength := a.getRandDataLengthForPackData(dataLength, fullDataLength) /* 2: uint16 LittleEndian packedDataLength 2: hmac of packedDataLength 3: maxRandDataLengthPrefix (min:1) 4: hmac of packedData except the last 4 bytes */ packedDataLength := 2 + 2 + 3 + randDataLength + dataLength + 4 if randDataLength < 128 { packedDataLength -= 2 } macKey := pool.Get(len(a.userKey) + 4) defer pool.Put(macKey) copy(macKey, a.userKey) binary.LittleEndian.PutUint32(macKey[len(a.userKey):], a.packID) a.packID++ binary.Write(poolBuf, binary.LittleEndian, uint16(packedDataLength)) poolBuf.Write(a.hmac(macKey, poolBuf.Bytes()[poolBuf.Len()-2:])[:2]) a.packRandData(poolBuf, randDataLength) poolBuf.Write(data) poolBuf.Write(a.hmac(macKey, poolBuf.Bytes()[poolBuf.Len()-packedDataLength+4:])[:4]) } func trapezoidRandom(max int, d float64) int { base := rand.Float64() if d-0 > 1e-6 { a := 1 - d base = (math.Sqrt(a*a+4*d*base) - a) / (2 * d) } return int(base * float64(max)) } func (a *authAES128) getRandDataLengthForPackData(dataLength, fullDataLength int) int { if fullDataLength >= 32*1024-a.Overhead { return 0 } // 1460: tcp_mss revLength := 1460 - dataLength - 9 if revLength == 0 { return 0 } if revLength < 0 { if revLength > -1460 { return trapezoidRandom(revLength+1460, -0.3) } return rand.Intn(32) } if dataLength > 900 { return rand.Intn(revLength) } return trapezoidRandom(revLength, -0.3) } func (a *authAES128) packAuthData(poolBuf *bytes.Buffer, data []byte) { if len(data) == 0 { return } dataLength := len(data) randDataLength := a.getRandDataLengthForPackAuthData(dataLength) /* 7: checkHead(1) and hmac of checkHead(6) 4: userID 16: encrypted data of authdata(12), uint16 BigEndian packedDataLength(2) and uint16 BigEndian randDataLength(2) 4: hmac of userID and encrypted data 4: hmac of packedAuthData except the last 4 bytes */ packedAuthDataLength := 7 + 4 + 16 + 4 + randDataLength + dataLength + 4 macKey := pool.Get(len(a.iv) + len(a.Key)) defer pool.Put(macKey) copy(macKey, a.iv) copy(macKey[len(a.iv):], a.Key) poolBuf.WriteByte(byte(rand.Intn(256))) poolBuf.Write(a.hmac(macKey, poolBuf.Bytes())[:6]) poolBuf.Write(a.userID[:]) err := a.authData.putEncryptedData(poolBuf, a.userKey, [2]int{packedAuthDataLength, randDataLength}, a.salt) if err != nil { poolBuf.Reset() return } poolBuf.Write(a.hmac(macKey, poolBuf.Bytes()[7:])[:4]) tools.AppendRandBytes(poolBuf, randDataLength) poolBuf.Write(data) poolBuf.Write(a.hmac(a.userKey, poolBuf.Bytes())[:4]) } func (a *authAES128) getRandDataLengthForPackAuthData(size int) int { if size > 400 { return rand.Intn(512) } return rand.Intn(1024) } func (a *authAES128) packRandData(poolBuf *bytes.Buffer, size int) { if size < 128 { poolBuf.WriteByte(byte(size + 1)) tools.AppendRandBytes(poolBuf, size) return </s> remove // rand size+6~(rand size+10), time stamp now := time.Now().Unix() binary.LittleEndian.PutUint32(ret[dataOffset:dataOffset+4], uint32(now)) // rand size+10~(rand size+14), client ID copy(ret[dataOffset+4:dataOffset+4+4], a.clientID[:4]) // rand size+14~(rand size+18), connection ID binary.LittleEndian.PutUint32(ret[dataOffset+8:dataOffset+8+4], a.connectionID) // rand size+18~(rand size+18)+data length, data copy(ret[dataOffset+12:], data) key := make([]byte, len(a.IV)+len(a.Key)) copy(key, a.IV) copy(key[len(a.IV):], a.Key) h := tools.HmacSHA1(key, ret[:retSize-tools.HmacSHA1Len]) // (ret size-10)~(ret size)/(rand size)+18+data length~end, hmac copy(ret[retSize-tools.HmacSHA1Len:], h[:tools.HmacSHA1Len]) return ret </s> add poolBuf.WriteByte(255) binary.Write(poolBuf, binary.BigEndian, uint16(size+3)) tools.AppendRandBytes(poolBuf, size) </s> remove func (r *randomHead) Encode(b []byte) (encoded []byte, err error) { if !r.firstRequest { return b, nil } bSize := len(b) if r.headerSent { if bSize > 0 { d := make([]byte, len(r.buffer)+bSize) copy(d, r.buffer) copy(d[len(r.buffer):], b) r.buffer = d } else { encoded = r.buffer r.buffer = nil r.firstRequest = false } } else { size := rand.Intn(96) + 8 encoded = make([]byte, size) rand.Read(encoded) crc := (0xFFFFFFFF - crc32.ChecksumIEEE(encoded[:size-4])) & 0xFFFFFFFF binary.LittleEndian.PutUint32(encoded[size-4:], crc) d := make([]byte, bSize) copy(d, b) r.buffer = d </s> add func (c *randomHeadConn) Read(b []byte) (int, error) { if c.rawTransRecv { return c.Conn.Read(b) </s> remove const authHeadLength = 4 + 8 + 4 + 16 + 4 func (a *authChain) packAuthData(data []byte) (outData []byte) { outData = make([]byte, authHeadLength, authHeadLength+1500) a.mutex.Lock() defer a.mutex.Unlock() a.connectionID++ if a.connectionID > 0xFF000000 { a.clientID = nil } if len(a.clientID) == 0 { a.clientID = make([]byte, 4) rand.Read(a.clientID) b := make([]byte, 4) rand.Read(b) a.connectionID = binary.LittleEndian.Uint32(b) & 0xFFFFFF </s> add func (a *authChainA) putMixedRandDataAndData(poolBuf *bytes.Buffer, data []byte) { randDataLength := a.randDataLength(len(data), a.lastClientHash, &a.randomClient) if len(data) == 0 { tools.AppendRandBytes(poolBuf, randDataLength) return
[ "keep", "keep", "keep", "add", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_aes128_sha1.go
<mask> package protocol <mask> <mask> import ( <mask> "bytes" <mask> "crypto/aes" <mask> "crypto/cipher" <mask> "crypto/rc4" <mask> "encoding/base64" <mask> "encoding/binary" <mask> "math/rand" </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove // Base information for protocol </s> add import ( "bytes" "crypto/aes" "crypto/cipher" "encoding/base64" "encoding/binary" "math/rand" "sync" "time" "github.com/Dreamacro/clash/common/pool" "github.com/Dreamacro/clash/log" "github.com/Dreamacro/go-shadowsocks2/core" ) </s> remove import ( "bytes" "crypto/aes" "crypto/cipher" "encoding/base64" "encoding/binary" "math/rand" "strconv" "strings" "time" "github.com/Dreamacro/clash/common/pool" "github.com/Dreamacro/clash/component/ssr/tools" "github.com/Dreamacro/go-shadowsocks2/core" ) type authAES128 struct { *Base *recvInfo *authData hasSentHeader bool packID uint32 userKey []byte uid [4]byte salt string hmac hmacMethod hashDigest hashDigestMethod } </s> add import "github.com/Dreamacro/clash/component/ssr/tools" </s> remove "math/rand" </s> add "net"
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_a.go
"crypto/rand"
<mask> import ( <mask> "bytes" <mask> "crypto/cipher" <mask> "crypto/rc4" <mask> "encoding/base64" <mask> "encoding/binary" <mask> "net" <mask> "strconv" </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove "crypto/aes" </s> add </s> remove "math/rand" </s> add "net" </s> remove import ( "bytes" "crypto/aes" "crypto/cipher" "encoding/base64" "encoding/binary" "math/rand" "strconv" "strings" "time" "github.com/Dreamacro/clash/common/pool" "github.com/Dreamacro/clash/component/ssr/tools" "github.com/Dreamacro/go-shadowsocks2/core" ) type authAES128 struct { *Base *recvInfo *authData hasSentHeader bool packID uint32 userKey []byte uid [4]byte salt string hmac hmacMethod hashDigest hashDigestMethod } </s> add import "github.com/Dreamacro/clash/component/ssr/tools" </s> remove // Base information for protocol </s> add import ( "bytes" "crypto/aes" "crypto/cipher" "encoding/base64" "encoding/binary" "math/rand" "sync" "time" "github.com/Dreamacro/clash/common/pool" "github.com/Dreamacro/clash/log" "github.com/Dreamacro/go-shadowsocks2/core" )
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_a.go
"net"
<mask> "crypto/cipher" <mask> "crypto/rc4" <mask> "encoding/base64" <mask> "encoding/binary" <mask> "math/rand" <mask> "strconv" <mask> "strings" <mask> "time" <mask> <mask> "github.com/Dreamacro/clash/common/pool" </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove import ( "bytes" "crypto/aes" "crypto/cipher" "encoding/base64" "encoding/binary" "math/rand" "strconv" "strings" "time" "github.com/Dreamacro/clash/common/pool" "github.com/Dreamacro/clash/component/ssr/tools" "github.com/Dreamacro/go-shadowsocks2/core" ) type authAES128 struct { *Base *recvInfo *authData hasSentHeader bool packID uint32 userKey []byte uid [4]byte salt string hmac hmacMethod hashDigest hashDigestMethod } </s> add import "github.com/Dreamacro/clash/component/ssr/tools" </s> remove "time" </s> add </s> remove "crypto/aes" </s> add </s> remove // Base information for protocol </s> add import ( "bytes" "crypto/aes" "crypto/cipher" "encoding/base64" "encoding/binary" "math/rand" "sync" "time" "github.com/Dreamacro/clash/common/pool" "github.com/Dreamacro/clash/log" "github.com/Dreamacro/go-shadowsocks2/core" )
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_a.go
<mask> "encoding/binary" <mask> "math/rand" <mask> "strconv" <mask> "strings" <mask> "time" <mask> <mask> "github.com/Dreamacro/clash/common/pool" <mask> "github.com/Dreamacro/clash/component/ssr/tools" <mask> "github.com/Dreamacro/go-shadowsocks2/core" <mask> ) </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove import ( "bytes" "crypto/aes" "crypto/cipher" "encoding/base64" "encoding/binary" "math/rand" "strconv" "strings" "time" "github.com/Dreamacro/clash/common/pool" "github.com/Dreamacro/clash/component/ssr/tools" "github.com/Dreamacro/go-shadowsocks2/core" ) type authAES128 struct { *Base *recvInfo *authData hasSentHeader bool packID uint32 userKey []byte uid [4]byte salt string hmac hmacMethod hashDigest hashDigestMethod } </s> add import "github.com/Dreamacro/clash/component/ssr/tools" </s> remove "math/rand" </s> add "net" </s> remove "time" </s> add "net"
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_a.go
"github.com/Dreamacro/clash/log"
<mask> <mask> "github.com/Dreamacro/clash/common/pool" <mask> "github.com/Dreamacro/clash/component/ssr/tools" <mask> "github.com/Dreamacro/go-shadowsocks2/core" <mask> ) <mask> <mask> func init() { <mask> register("auth_chain_a", newAuthChainA, 4) <mask> } </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove type authChain struct { </s> add func init() { register("auth_chain_a", newAuthChainA, 4) } type randDataLengthMethod func(int, []byte, *tools.XorShift128Plus) int type authChainA struct { </s> remove import ( "bytes" "crypto/aes" "crypto/cipher" "encoding/base64" "encoding/binary" "math/rand" "strconv" "strings" "time" "github.com/Dreamacro/clash/common/pool" "github.com/Dreamacro/clash/component/ssr/tools" "github.com/Dreamacro/go-shadowsocks2/core" ) type authAES128 struct { *Base *recvInfo *authData hasSentHeader bool packID uint32 userKey []byte uid [4]byte salt string hmac hmacMethod hashDigest hashDigestMethod } </s> add import "github.com/Dreamacro/clash/component/ssr/tools" </s> remove register("auth_chain_b", newAuthChainB) </s> add register("auth_chain_b", newAuthChainB, 4) } type authChainB struct { *authChainA dataSizeList []int dataSizeList2 []int
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_a.go
func init() { register("auth_chain_a", newAuthChainA, 4) } type randDataLengthMethod func(int, []byte, *tools.XorShift128Plus) int type authChainA struct {
<mask> "github.com/Dreamacro/clash/component/ssr/tools" <mask> "github.com/Dreamacro/go-shadowsocks2/core" <mask> ) <mask> <mask> type authChain struct { <mask> *Base <mask> *recvInfo <mask> *authData <mask> randomClient shift128PlusContext <mask> randomServer shift128PlusContext </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove *recvInfo </s> add </s> remove randomClient shift128PlusContext randomServer shift128PlusContext enc cipher.Stream dec cipher.Stream headerSent bool </s> add *userData iv []byte salt string hasSentHeader bool rawTrans bool </s> remove import ( "bytes" "crypto/aes" "crypto/cipher" "encoding/base64" "encoding/binary" "math/rand" "strconv" "strings" "time" "github.com/Dreamacro/clash/common/pool" "github.com/Dreamacro/clash/component/ssr/tools" "github.com/Dreamacro/go-shadowsocks2/core" ) type authAES128 struct { *Base *recvInfo *authData hasSentHeader bool packID uint32 userKey []byte uid [4]byte salt string hmac hmacMethod hashDigest hashDigestMethod } </s> add import "github.com/Dreamacro/clash/component/ssr/tools" </s> remove register("auth_aes128_sha1", newAuthAES128SHA1) </s> add register("auth_aes128_sha1", newAuthAES128SHA1, 9) } type authAES128Function struct { salt string hmac hmacMethod hashDigest hashDigestMethod } type authAES128 struct { *Base *authData *authAES128Function *userData iv []byte hasSentHeader bool rawTrans bool packID uint32 recvID uint32
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_a.go
<mask> ) <mask> <mask> type authChain struct { <mask> *Base <mask> *recvInfo <mask> *authData <mask> randomClient shift128PlusContext <mask> randomServer shift128PlusContext <mask> enc cipher.Stream <mask> dec cipher.Stream </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove randomClient shift128PlusContext randomServer shift128PlusContext enc cipher.Stream dec cipher.Stream headerSent bool </s> add *userData iv []byte salt string hasSentHeader bool rawTrans bool </s> remove type authChain struct { </s> add func init() { register("auth_chain_a", newAuthChainA, 4) } type randDataLengthMethod func(int, []byte, *tools.XorShift128Plus) int type authChainA struct { </s> remove userKey []byte uid [4]byte salt string hmac hmacMethod hashDigest hashDigestMethod rnd rndMethod dataSizeList []int dataSizeList2 []int chunkID uint32 } func init() { register("auth_chain_a", newAuthChainA) </s> add encrypter cipher.Stream decrypter cipher.Stream randomClient tools.XorShift128Plus randomServer tools.XorShift128Plus randDataLength randDataLengthMethod packID uint32 recvID uint32 </s> remove import ( "bytes" "crypto/aes" "crypto/cipher" "encoding/base64" "encoding/binary" "math/rand" "strconv" "strings" "time" "github.com/Dreamacro/clash/common/pool" "github.com/Dreamacro/clash/component/ssr/tools" "github.com/Dreamacro/go-shadowsocks2/core" ) type authAES128 struct { *Base *recvInfo *authData hasSentHeader bool packID uint32 userKey []byte uid [4]byte salt string hmac hmacMethod hashDigest hashDigestMethod } </s> add import "github.com/Dreamacro/clash/component/ssr/tools"
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_a.go
*userData iv []byte salt string hasSentHeader bool rawTrans bool
<mask> type authChain struct { <mask> *Base <mask> *recvInfo <mask> *authData <mask> randomClient shift128PlusContext <mask> randomServer shift128PlusContext <mask> enc cipher.Stream <mask> dec cipher.Stream <mask> headerSent bool <mask> lastClientHash []byte <mask> lastServerHash []byte <mask> userKey []byte <mask> uid [4]byte <mask> salt string </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove *recvInfo </s> add </s> remove userKey []byte uid [4]byte salt string hmac hmacMethod hashDigest hashDigestMethod rnd rndMethod dataSizeList []int dataSizeList2 []int chunkID uint32 } func init() { register("auth_chain_a", newAuthChainA) </s> add encrypter cipher.Stream decrypter cipher.Stream randomClient tools.XorShift128Plus randomServer tools.XorShift128Plus randDataLength randDataLengthMethod packID uint32 recvID uint32 </s> remove type authChain struct { </s> add func init() { register("auth_chain_a", newAuthChainA, 4) } type randDataLengthMethod func(int, []byte, *tools.XorShift128Plus) int type authChainA struct { </s> remove import ( "bytes" "crypto/aes" "crypto/cipher" "encoding/base64" "encoding/binary" "math/rand" "strconv" "strings" "time" "github.com/Dreamacro/clash/common/pool" "github.com/Dreamacro/clash/component/ssr/tools" "github.com/Dreamacro/go-shadowsocks2/core" ) type authAES128 struct { *Base *recvInfo *authData hasSentHeader bool packID uint32 userKey []byte uid [4]byte salt string hmac hmacMethod hashDigest hashDigestMethod } </s> add import "github.com/Dreamacro/clash/component/ssr/tools" </s> remove register("auth_aes128_sha1", newAuthAES128SHA1) </s> add register("auth_aes128_sha1", newAuthAES128SHA1, 9) } type authAES128Function struct { salt string hmac hmacMethod hashDigest hashDigestMethod } type authAES128 struct { *Base *authData *authAES128Function *userData iv []byte hasSentHeader bool rawTrans bool packID uint32 recvID uint32
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_a.go
encrypter cipher.Stream decrypter cipher.Stream randomClient tools.XorShift128Plus randomServer tools.XorShift128Plus randDataLength randDataLengthMethod packID uint32 recvID uint32
<mask> dec cipher.Stream <mask> headerSent bool <mask> lastClientHash []byte <mask> lastServerHash []byte <mask> userKey []byte <mask> uid [4]byte <mask> salt string <mask> hmac hmacMethod <mask> hashDigest hashDigestMethod <mask> rnd rndMethod <mask> dataSizeList []int <mask> dataSizeList2 []int <mask> chunkID uint32 <mask> } <mask> <mask> func init() { <mask> register("auth_chain_a", newAuthChainA) <mask> } <mask> <mask> func newAuthChainA(b *Base) Protocol { <mask> return &authChain{ <mask> Base: b, </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove randomClient shift128PlusContext randomServer shift128PlusContext enc cipher.Stream dec cipher.Stream headerSent bool </s> add *userData iv []byte salt string hasSentHeader bool rawTrans bool </s> remove register("auth_aes128_sha1", newAuthAES128SHA1) </s> add register("auth_aes128_sha1", newAuthAES128SHA1, 9) } type authAES128Function struct { salt string hmac hmacMethod hashDigest hashDigestMethod } type authAES128 struct { *Base *authData *authAES128Function *userData iv []byte hasSentHeader bool rawTrans bool packID uint32 recvID uint32 </s> remove import ( "bytes" "crypto/aes" "crypto/cipher" "encoding/base64" "encoding/binary" "math/rand" "strconv" "strings" "time" "github.com/Dreamacro/clash/common/pool" "github.com/Dreamacro/clash/component/ssr/tools" "github.com/Dreamacro/go-shadowsocks2/core" ) type authAES128 struct { *Base *recvInfo *authData hasSentHeader bool packID uint32 userKey []byte uid [4]byte salt string hmac hmacMethod hashDigest hashDigestMethod } </s> add import "github.com/Dreamacro/clash/component/ssr/tools" </s> remove register("auth_chain_b", newAuthChainB) </s> add register("auth_chain_b", newAuthChainB, 4) } type authChainB struct { *authChainA dataSizeList []int dataSizeList2 []int </s> remove return &authChain{ Base: b, authData: &authData{}, salt: "auth_chain_a", hmac: tools.HmacMD5, hashDigest: tools.SHA1Sum, rnd: authChainAGetRandLen, </s> add a := &authChainA{ Base: b, authData: &authData{}, userData: &userData{}, salt: "auth_chain_a",
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_a.go
a := &authChainA{ Base: b, authData: &authData{}, userData: &userData{}, salt: "auth_chain_a",
<mask> register("auth_chain_a", newAuthChainA) <mask> } <mask> <mask> func newAuthChainA(b *Base) Protocol { <mask> return &authChain{ <mask> Base: b, <mask> authData: &authData{}, <mask> salt: "auth_chain_a", <mask> hmac: tools.HmacMD5, <mask> hashDigest: tools.SHA1Sum, <mask> rnd: authChainAGetRandLen, <mask> } <mask> } <mask> <mask> func (a *authChain) initForConn(iv []byte) Protocol { <mask> r := &authChain{ </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove return &authChain{ Base: b, authData: &authData{}, salt: "auth_chain_b", hmac: tools.HmacMD5, hashDigest: tools.SHA1Sum, rnd: authChainBGetRandLen, </s> add a := &authChainB{ authChainA: &authChainA{ Base: b, authData: &authData{}, userData: &userData{}, salt: "auth_chain_b", }, </s> remove func (a *authChain) initForConn(iv []byte) Protocol { r := &authChain{ Base: &Base{ IV: iv, Key: a.Key, TCPMss: a.TCPMss, Overhead: a.Overhead, Param: a.Param, }, recvInfo: &recvInfo{recvID: 1, buffer: new(bytes.Buffer)}, authData: a.authData, salt: a.salt, hmac: a.hmac, hashDigest: a.hashDigest, rnd: a.rnd, </s> add func (a *authChainA) initUserData() { params := strings.Split(a.Param, ":") if len(params) > 1 { if userID, err := strconv.ParseUint(params[0], 10, 32); err == nil { binary.LittleEndian.PutUint32(a.userID[:], uint32(userID)) a.userKey = []byte(params[1]) } else { log.Warnln("Wrong protocol-param for %s, only digits are expected before ':'", a.salt) } </s> remove userKey []byte uid [4]byte salt string hmac hmacMethod hashDigest hashDigestMethod rnd rndMethod dataSizeList []int dataSizeList2 []int chunkID uint32 } func init() { register("auth_chain_a", newAuthChainA) </s> add encrypter cipher.Stream decrypter cipher.Stream randomClient tools.XorShift128Plus randomServer tools.XorShift128Plus randDataLength randDataLengthMethod packID uint32 recvID uint32 </s> remove func (a *authSHA1V4) initForConn(iv []byte) Protocol { return &authSHA1V4{ Base: &Base{ IV: iv, Key: a.Key, TCPMss: a.TCPMss, Overhead: a.Overhead, Param: a.Param, }, authData: a.authData, } } func (a *authSHA1V4) GetProtocolOverhead() int { return 7 </s> add func (a *authSHA1V4) StreamConn(c net.Conn, iv []byte) net.Conn { p := &authSHA1V4{Base: a.Base, authData: a.next()} p.iv = iv return &Conn{Conn: c, Protocol: p} </s> remove register("auth_chain_b", newAuthChainB) </s> add register("auth_chain_b", newAuthChainB, 4) } type authChainB struct { *authChainA dataSizeList []int dataSizeList2 []int
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_a.go
a.initUserData() return a
<mask> authData: &authData{}, <mask> userData: &userData{}, <mask> salt: "auth_chain_a", <mask> } <mask> } <mask> <mask> func (a *authChainA) initUserData() { <mask> params := strings.Split(a.Param, ":") <mask> if len(params) > 1 { </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove return &authChain{ Base: b, authData: &authData{}, salt: "auth_chain_a", hmac: tools.HmacMD5, hashDigest: tools.SHA1Sum, rnd: authChainAGetRandLen, </s> add a := &authChainA{ Base: b, authData: &authData{}, userData: &userData{}, salt: "auth_chain_a", </s> remove func (a *authChain) initForConn(iv []byte) Protocol { r := &authChain{ Base: &Base{ IV: iv, Key: a.Key, TCPMss: a.TCPMss, Overhead: a.Overhead, Param: a.Param, }, recvInfo: &recvInfo{recvID: 1, buffer: new(bytes.Buffer)}, authData: a.authData, salt: a.salt, hmac: a.hmac, hashDigest: a.hashDigest, rnd: a.rnd, </s> add func (a *authChainA) initUserData() { params := strings.Split(a.Param, ":") if len(params) > 1 { if userID, err := strconv.ParseUint(params[0], 10, 32); err == nil { binary.LittleEndian.PutUint32(a.userID[:], uint32(userID)) a.userKey = []byte(params[1]) } else { log.Warnln("Wrong protocol-param for %s, only digits are expected before ':'", a.salt) } </s> remove return &authChain{ Base: b, authData: &authData{}, salt: "auth_chain_b", hmac: tools.HmacMD5, hashDigest: tools.SHA1Sum, rnd: authChainBGetRandLen, </s> add a := &authChainB{ authChainA: &authChainA{ Base: b, authData: &authData{}, userData: &userData{}, salt: "auth_chain_b", }, </s> remove return &authAES128{ Base: b, recvInfo: &recvInfo{buffer: new(bytes.Buffer)}, authData: &authData{}, salt: "auth_aes128_sha1", hmac: tools.HmacSHA1, hashDigest: tools.SHA1Sum, </s> add a := &authAES128{ Base: b, authData: &authData{}, authAES128Function: &authAES128Function{salt: "auth_aes128_sha1", hmac: tools.HmacSHA1, hashDigest: tools.SHA1Sum}, userData: &userData{}, } a.initUserData() return a } func (a *authAES128) initUserData() { params := strings.Split(a.Param, ":") if len(params) > 1 { if userID, err := strconv.ParseUint(params[0], 10, 32); err == nil { binary.LittleEndian.PutUint32(a.userID[:], uint32(userID)) a.userKey = a.hashDigest([]byte(params[1])) } else { log.Warnln("Wrong protocol-param for %s, only digits are expected before ':'", a.salt) } } if len(a.userKey) == 0 { a.userKey = a.Key rand.Read(a.userID[:]) } } func (a *authAES128) StreamConn(c net.Conn, iv []byte) net.Conn { p := &authAES128{ Base: a.Base, authData: a.next(), authAES128Function: a.authAES128Function, userData: a.userData, packID: 1, recvID: 1, } p.iv = iv return &Conn{Conn: c, Protocol: p} } func (a *authAES128) PacketConn(c net.PacketConn) net.PacketConn { p := &authAES128{ Base: a.Base, authAES128Function: a.authAES128Function, userData: a.userData, } return &PacketConn{PacketConn: c, Protocol: p} } func (a *authAES128) Decode(dst, src *bytes.Buffer) error { if a.rawTrans { dst.ReadFrom(src) return nil } for src.Len() > 4 { macKey := pool.Get(len(a.userKey) + 4) defer pool.Put(macKey) copy(macKey, a.userKey) binary.LittleEndian.PutUint32(macKey[len(a.userKey):], a.recvID) if !bytes.Equal(a.hmac(macKey, src.Bytes()[:2])[:2], src.Bytes()[2:4]) { src.Reset() return errAuthAES128MACError } length := int(binary.LittleEndian.Uint16(src.Bytes()[:2])) if length >= 8192 || length < 7 { a.rawTrans = true src.Reset() return errAuthAES128LengthError } if length > src.Len() { break } if !bytes.Equal(a.hmac(macKey, src.Bytes()[:length-4])[:4], src.Bytes()[length-4:length]) { a.rawTrans = true src.Reset() return errAuthAES128ChksumError } a.recvID++ pos := int(src.Bytes()[4]) if pos < 255 { pos += 4 } else { pos = int(binary.LittleEndian.Uint16(src.Bytes()[5:7])) + 4 } dst.Write(src.Bytes()[pos : length-4]) src.Next(length) } return nil } func (a *authAES128) Encode(buf *bytes.Buffer, b []byte) error { fullDataLength := len(b) if !a.hasSentHeader { dataLength := getDataLength(b) a.packAuthData(buf, b[:dataLength]) b = b[dataLength:] a.hasSentHeader = true } for len(b) > 8100 { a.packData(buf, b[:8100], fullDataLength) b = b[8100:] } if len(b) > 0 { a.packData(buf, b, fullDataLength) } return nil } func (a *authAES128) DecodePacket(b []byte) ([]byte, error) { if !bytes.Equal(a.hmac(a.Key, b[:len(b)-4])[:4], b[len(b)-4:]) { return nil, errAuthAES128ChksumError } return b[:len(b)-4], nil } func (a *authAES128) EncodePacket(buf *bytes.Buffer, b []byte) error { buf.Write(b) buf.Write(a.userID[:]) buf.Write(a.hmac(a.userKey, buf.Bytes())[:4]) return nil } func (a *authAES128) packData(poolBuf *bytes.Buffer, data []byte, fullDataLength int) { dataLength := len(data) randDataLength := a.getRandDataLengthForPackData(dataLength, fullDataLength) /* 2: uint16 LittleEndian packedDataLength 2: hmac of packedDataLength 3: maxRandDataLengthPrefix (min:1) 4: hmac of packedData except the last 4 bytes */ packedDataLength := 2 + 2 + 3 + randDataLength + dataLength + 4 if randDataLength < 128 { packedDataLength -= 2 } macKey := pool.Get(len(a.userKey) + 4) defer pool.Put(macKey) copy(macKey, a.userKey) binary.LittleEndian.PutUint32(macKey[len(a.userKey):], a.packID) a.packID++ binary.Write(poolBuf, binary.LittleEndian, uint16(packedDataLength)) poolBuf.Write(a.hmac(macKey, poolBuf.Bytes()[poolBuf.Len()-2:])[:2]) a.packRandData(poolBuf, randDataLength) poolBuf.Write(data) poolBuf.Write(a.hmac(macKey, poolBuf.Bytes()[poolBuf.Len()-packedDataLength+4:])[:4]) } func trapezoidRandom(max int, d float64) int { base := rand.Float64() if d-0 > 1e-6 { a := 1 - d base = (math.Sqrt(a*a+4*d*base) - a) / (2 * d) } return int(base * float64(max)) } func (a *authAES128) getRandDataLengthForPackData(dataLength, fullDataLength int) int { if fullDataLength >= 32*1024-a.Overhead { return 0 } // 1460: tcp_mss revLength := 1460 - dataLength - 9 if revLength == 0 { return 0 } if revLength < 0 { if revLength > -1460 { return trapezoidRandom(revLength+1460, -0.3) } return rand.Intn(32) } if dataLength > 900 { return rand.Intn(revLength) } return trapezoidRandom(revLength, -0.3) } func (a *authAES128) packAuthData(poolBuf *bytes.Buffer, data []byte) { if len(data) == 0 { return } dataLength := len(data) randDataLength := a.getRandDataLengthForPackAuthData(dataLength) /* 7: checkHead(1) and hmac of checkHead(6) 4: userID 16: encrypted data of authdata(12), uint16 BigEndian packedDataLength(2) and uint16 BigEndian randDataLength(2) 4: hmac of userID and encrypted data 4: hmac of packedAuthData except the last 4 bytes */ packedAuthDataLength := 7 + 4 + 16 + 4 + randDataLength + dataLength + 4 macKey := pool.Get(len(a.iv) + len(a.Key)) defer pool.Put(macKey) copy(macKey, a.iv) copy(macKey[len(a.iv):], a.Key) poolBuf.WriteByte(byte(rand.Intn(256))) poolBuf.Write(a.hmac(macKey, poolBuf.Bytes())[:6]) poolBuf.Write(a.userID[:]) err := a.authData.putEncryptedData(poolBuf, a.userKey, [2]int{packedAuthDataLength, randDataLength}, a.salt) if err != nil { poolBuf.Reset() return } poolBuf.Write(a.hmac(macKey, poolBuf.Bytes()[7:])[:4]) tools.AppendRandBytes(poolBuf, randDataLength) poolBuf.Write(data) poolBuf.Write(a.hmac(a.userKey, poolBuf.Bytes())[:4]) } func (a *authAES128) getRandDataLengthForPackAuthData(size int) int { if size > 400 { return rand.Intn(512) } return rand.Intn(1024) } func (a *authAES128) packRandData(poolBuf *bytes.Buffer, size int) { if size < 128 { poolBuf.WriteByte(byte(size + 1)) tools.AppendRandBytes(poolBuf, size) return </s> remove func (a *authChain) GetProtocolOverhead() int { return 4 </s> add func (a *authChainA) StreamConn(c net.Conn, iv []byte) net.Conn { p := &authChainA{ Base: a.Base, authData: a.next(), userData: a.userData, salt: a.salt, packID: 1, recvID: 1, } p.iv = iv p.randDataLength = p.getRandLength return &Conn{Conn: c, Protocol: p}
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_a.go
func (a *authChainA) initUserData() { params := strings.Split(a.Param, ":") if len(params) > 1 { if userID, err := strconv.ParseUint(params[0], 10, 32); err == nil { binary.LittleEndian.PutUint32(a.userID[:], uint32(userID)) a.userKey = []byte(params[1]) } else { log.Warnln("Wrong protocol-param for %s, only digits are expected before ':'", a.salt) }
<mask> rnd: authChainAGetRandLen, <mask> } <mask> } <mask> <mask> func (a *authChain) initForConn(iv []byte) Protocol { <mask> r := &authChain{ <mask> Base: &Base{ <mask> IV: iv, <mask> Key: a.Key, <mask> TCPMss: a.TCPMss, <mask> Overhead: a.Overhead, <mask> Param: a.Param, <mask> }, <mask> recvInfo: &recvInfo{recvID: 1, buffer: new(bytes.Buffer)}, <mask> authData: a.authData, <mask> salt: a.salt, <mask> hmac: a.hmac, <mask> hashDigest: a.hashDigest, <mask> rnd: a.rnd, <mask> } <mask> if r.salt == "auth_chain_b" { <mask> initDataSize(r) <mask> } <mask> return r </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove if r.salt == "auth_chain_b" { initDataSize(r) </s> add if len(a.userKey) == 0 { a.userKey = a.Key rand.Read(a.userID[:]) </s> remove func (a *authSHA1V4) initForConn(iv []byte) Protocol { return &authSHA1V4{ Base: &Base{ IV: iv, Key: a.Key, TCPMss: a.TCPMss, Overhead: a.Overhead, Param: a.Param, }, authData: a.authData, } } func (a *authSHA1V4) GetProtocolOverhead() int { return 7 </s> add func (a *authSHA1V4) StreamConn(c net.Conn, iv []byte) net.Conn { p := &authSHA1V4{Base: a.Base, authData: a.next()} p.iv = iv return &Conn{Conn: c, Protocol: p} </s> remove return &authChain{ Base: b, authData: &authData{}, salt: "auth_chain_a", hmac: tools.HmacMD5, hashDigest: tools.SHA1Sum, rnd: authChainAGetRandLen, </s> add a := &authChainA{ Base: b, authData: &authData{}, userData: &userData{}, salt: "auth_chain_a", </s> remove return &authChain{ Base: b, authData: &authData{}, salt: "auth_chain_b", hmac: tools.HmacMD5, hashDigest: tools.SHA1Sum, rnd: authChainBGetRandLen, </s> add a := &authChainB{ authChainA: &authChainA{ Base: b, authData: &authData{}, userData: &userData{}, salt: "auth_chain_b", }, </s> remove return r </s> add
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_a.go
if len(a.userKey) == 0 { a.userKey = a.Key rand.Read(a.userID[:])
<mask> hmac: a.hmac, <mask> hashDigest: a.hashDigest, <mask> rnd: a.rnd, <mask> } <mask> if r.salt == "auth_chain_b" { <mask> initDataSize(r) <mask> } <mask> return r <mask> } <mask> <mask> func (a *authChain) GetProtocolOverhead() int { </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove func (a *authChain) initForConn(iv []byte) Protocol { r := &authChain{ Base: &Base{ IV: iv, Key: a.Key, TCPMss: a.TCPMss, Overhead: a.Overhead, Param: a.Param, }, recvInfo: &recvInfo{recvID: 1, buffer: new(bytes.Buffer)}, authData: a.authData, salt: a.salt, hmac: a.hmac, hashDigest: a.hashDigest, rnd: a.rnd, </s> add func (a *authChainA) initUserData() { params := strings.Split(a.Param, ":") if len(params) > 1 { if userID, err := strconv.ParseUint(params[0], 10, 32); err == nil { binary.LittleEndian.PutUint32(a.userID[:], uint32(userID)) a.userKey = []byte(params[1]) } else { log.Warnln("Wrong protocol-param for %s, only digits are expected before ':'", a.salt) } </s> remove return r </s> add </s> remove return &authChain{ Base: b, authData: &authData{}, salt: "auth_chain_a", hmac: tools.HmacMD5, hashDigest: tools.SHA1Sum, rnd: authChainAGetRandLen, </s> add a := &authChainA{ Base: b, authData: &authData{}, userData: &userData{}, salt: "auth_chain_a", </s> remove return &authChain{ Base: b, authData: &authData{}, salt: "auth_chain_b", hmac: tools.HmacMD5, hashDigest: tools.SHA1Sum, rnd: authChainBGetRandLen, </s> add a := &authChainB{ authChainA: &authChainA{ Base: b, authData: &authData{}, userData: &userData{}, salt: "auth_chain_b", }, </s> remove func (a *authChain) GetProtocolOverhead() int { return 4 </s> add func (a *authChainA) StreamConn(c net.Conn, iv []byte) net.Conn { p := &authChainA{ Base: a.Base, authData: a.next(), userData: a.userData, salt: a.salt, packID: 1, recvID: 1, } p.iv = iv p.randDataLength = p.getRandLength return &Conn{Conn: c, Protocol: p}
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_a.go
<mask> } <mask> if r.salt == "auth_chain_b" { <mask> initDataSize(r) <mask> } <mask> return r <mask> } <mask> <mask> func (a *authChain) GetProtocolOverhead() int { <mask> return 4 <mask> } </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove if r.salt == "auth_chain_b" { initDataSize(r) </s> add if len(a.userKey) == 0 { a.userKey = a.Key rand.Read(a.userID[:]) </s> remove func (a *authChain) initForConn(iv []byte) Protocol { r := &authChain{ Base: &Base{ IV: iv, Key: a.Key, TCPMss: a.TCPMss, Overhead: a.Overhead, Param: a.Param, }, recvInfo: &recvInfo{recvID: 1, buffer: new(bytes.Buffer)}, authData: a.authData, salt: a.salt, hmac: a.hmac, hashDigest: a.hashDigest, rnd: a.rnd, </s> add func (a *authChainA) initUserData() { params := strings.Split(a.Param, ":") if len(params) > 1 { if userID, err := strconv.ParseUint(params[0], 10, 32); err == nil { binary.LittleEndian.PutUint32(a.userID[:], uint32(userID)) a.userKey = []byte(params[1]) } else { log.Warnln("Wrong protocol-param for %s, only digits are expected before ':'", a.salt) } </s> remove func (a *authChain) GetProtocolOverhead() int { return 4 </s> add func (a *authChainA) StreamConn(c net.Conn, iv []byte) net.Conn { p := &authChainA{ Base: a.Base, authData: a.next(), userData: a.userData, salt: a.salt, packID: 1, recvID: 1, } p.iv = iv p.randDataLength = p.getRandLength return &Conn{Conn: c, Protocol: p} </s> remove func (a *authChain) SetOverhead(overhead int) { a.Overhead = overhead </s> add func (a *authChainA) PacketConn(c net.PacketConn) net.PacketConn { p := &authChainA{ Base: a.Base, salt: a.salt, userData: a.userData, } return &PacketConn{PacketConn: c, Protocol: p} </s> remove func (a *authChain) getClientRandLen(dataLength int, overhead int) int { return a.rnd(dataLength, &a.randomClient, a.lastClientHash, a.dataSizeList, a.dataSizeList2, overhead) } </s> add func (a *authChainA) packData(poolBuf *bytes.Buffer, data []byte) { a.encrypter.XORKeyStream(data, data)
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_a.go
func (a *authChainA) StreamConn(c net.Conn, iv []byte) net.Conn { p := &authChainA{ Base: a.Base, authData: a.next(), userData: a.userData, salt: a.salt, packID: 1, recvID: 1, } p.iv = iv p.randDataLength = p.getRandLength return &Conn{Conn: c, Protocol: p}
<mask> } <mask> return r <mask> } <mask> <mask> func (a *authChain) GetProtocolOverhead() int { <mask> return 4 <mask> } <mask> <mask> func (a *authChain) SetOverhead(overhead int) { <mask> a.Overhead = overhead <mask> } </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove func (a *authChain) SetOverhead(overhead int) { a.Overhead = overhead </s> add func (a *authChainA) PacketConn(c net.PacketConn) net.PacketConn { p := &authChainA{ Base: a.Base, salt: a.salt, userData: a.userData, } return &PacketConn{PacketConn: c, Protocol: p} </s> remove return r </s> add </s> remove func (a *authSHA1V4) SetOverhead(overhead int) { a.Overhead = overhead </s> add func (a *authSHA1V4) PacketConn(c net.PacketConn) net.PacketConn { return c </s> remove func (a *authChain) getClientRandLen(dataLength int, overhead int) int { return a.rnd(dataLength, &a.randomClient, a.lastClientHash, a.dataSizeList, a.dataSizeList2, overhead) } </s> add func (a *authChainA) packData(poolBuf *bytes.Buffer, data []byte) { a.encrypter.XORKeyStream(data, data) </s> remove func (a *authSHA1V4) initForConn(iv []byte) Protocol { return &authSHA1V4{ Base: &Base{ IV: iv, Key: a.Key, TCPMss: a.TCPMss, Overhead: a.Overhead, Param: a.Param, }, authData: a.authData, } } func (a *authSHA1V4) GetProtocolOverhead() int { return 7 </s> add func (a *authSHA1V4) StreamConn(c net.Conn, iv []byte) net.Conn { p := &authSHA1V4{Base: a.Base, authData: a.next()} p.iv = iv return &Conn{Conn: c, Protocol: p}
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_a.go
func (a *authChainA) PacketConn(c net.PacketConn) net.PacketConn { p := &authChainA{ Base: a.Base, salt: a.salt, userData: a.userData, } return &PacketConn{PacketConn: c, Protocol: p}
<mask> func (a *authChain) GetProtocolOverhead() int { <mask> return 4 <mask> } <mask> <mask> func (a *authChain) SetOverhead(overhead int) { <mask> a.Overhead = overhead <mask> } <mask> <mask> func (a *authChain) Decode(b []byte) ([]byte, int, error) { <mask> a.buffer.Reset() <mask> key := pool.Get(len(a.userKey) + 4) </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove func (a *authChain) Decode(b []byte) ([]byte, int, error) { a.buffer.Reset() key := pool.Get(len(a.userKey) + 4) defer pool.Put(key) readSize := 0 copy(key, a.userKey) for len(b) > 4 { binary.LittleEndian.PutUint32(key[len(a.userKey):], a.recvID) dataLen := (int)((uint(b[1]^a.lastServerHash[15]) << 8) + uint(b[0]^a.lastServerHash[14])) randLen := a.getServerRandLen(dataLen, a.Overhead) length := randLen + dataLen </s> add func (a *authChainA) Decode(dst, src *bytes.Buffer) error { if a.rawTrans { dst.ReadFrom(src) return nil } for src.Len() > 4 { macKey := pool.Get(len(a.userKey) + 4) defer pool.Put(macKey) copy(macKey, a.userKey) binary.LittleEndian.PutUint32(macKey[len(a.userKey):], a.recvID) dataLength := int(binary.LittleEndian.Uint16(src.Bytes()[:2]) ^ binary.LittleEndian.Uint16(a.lastServerHash[14:16])) randDataLength := a.randDataLength(dataLength, a.lastServerHash, &a.randomServer) length := dataLength + randDataLength </s> remove func (a *authSHA1V4) SetOverhead(overhead int) { a.Overhead = overhead </s> add func (a *authSHA1V4) PacketConn(c net.PacketConn) net.PacketConn { return c </s> remove func (a *authChain) getServerRandLen(dataLength int, overhead int) int { return a.rnd(dataLength, &a.randomServer, a.lastServerHash, a.dataSizeList, a.dataSizeList2, overhead) } </s> add macKey := pool.Get(len(a.userKey) + 4) defer pool.Put(macKey) copy(macKey, a.userKey) binary.LittleEndian.PutUint32(macKey[len(a.userKey):], a.packID) a.packID++ </s> remove func (a *authChain) GetProtocolOverhead() int { return 4 </s> add func (a *authChainA) StreamConn(c net.Conn, iv []byte) net.Conn { p := &authChainA{ Base: a.Base, authData: a.next(), userData: a.userData, salt: a.salt, packID: 1, recvID: 1, } p.iv = iv p.randDataLength = p.getRandLength return &Conn{Conn: c, Protocol: p} </s> remove func (a *authSHA1V4) Decode(b []byte) ([]byte, int, error) { a.buffer.Reset() bSize := len(b) originalSize := bSize for bSize > 4 { crc := crc32.ChecksumIEEE(b[:2]) & 0xFFFF if binary.LittleEndian.Uint16(b[2:4]) != uint16(crc) { return nil, 0, errAuthSHA1v4CRC32Error </s> add func (a *authSHA1V4) Decode(dst, src *bytes.Buffer) error { if a.rawTrans { dst.ReadFrom(src) return nil } for src.Len() > 4 { if uint16(crc32.ChecksumIEEE(src.Bytes()[:2])&0xffff) != binary.LittleEndian.Uint16(src.Bytes()[2:4]) { src.Reset() return errAuthSHA1V4CRC32Error
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_a.go
func (a *authChainA) Decode(dst, src *bytes.Buffer) error { if a.rawTrans { dst.ReadFrom(src) return nil } for src.Len() > 4 { macKey := pool.Get(len(a.userKey) + 4) defer pool.Put(macKey) copy(macKey, a.userKey) binary.LittleEndian.PutUint32(macKey[len(a.userKey):], a.recvID) dataLength := int(binary.LittleEndian.Uint16(src.Bytes()[:2]) ^ binary.LittleEndian.Uint16(a.lastServerHash[14:16])) randDataLength := a.randDataLength(dataLength, a.lastServerHash, &a.randomServer) length := dataLength + randDataLength
<mask> func (a *authChain) SetOverhead(overhead int) { <mask> a.Overhead = overhead <mask> } <mask> <mask> func (a *authChain) Decode(b []byte) ([]byte, int, error) { <mask> a.buffer.Reset() <mask> key := pool.Get(len(a.userKey) + 4) <mask> defer pool.Put(key) <mask> readSize := 0 <mask> copy(key, a.userKey) <mask> for len(b) > 4 { <mask> binary.LittleEndian.PutUint32(key[len(a.userKey):], a.recvID) <mask> dataLen := (int)((uint(b[1]^a.lastServerHash[15]) << 8) + uint(b[0]^a.lastServerHash[14])) <mask> randLen := a.getServerRandLen(dataLen, a.Overhead) <mask> length := randLen + dataLen <mask> if length >= 4096 { <mask> return nil, 0, errAuthChainDataLengthError <mask> } <mask> length += 4 <mask> if length > len(b) { </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove return nil, 0, errAuthChainDataLengthError </s> add a.rawTrans = true src.Reset() return errAuthChainLengthError </s> remove length += 4 if length > len(b) { </s> add if 4+length > src.Len() { </s> remove func (a *authSHA1V4) Decode(b []byte) ([]byte, int, error) { a.buffer.Reset() bSize := len(b) originalSize := bSize for bSize > 4 { crc := crc32.ChecksumIEEE(b[:2]) & 0xFFFF if binary.LittleEndian.Uint16(b[2:4]) != uint16(crc) { return nil, 0, errAuthSHA1v4CRC32Error </s> add func (a *authSHA1V4) Decode(dst, src *bytes.Buffer) error { if a.rawTrans { dst.ReadFrom(src) return nil } for src.Len() > 4 { if uint16(crc32.ChecksumIEEE(src.Bytes()[:2])&0xffff) != binary.LittleEndian.Uint16(src.Bytes()[2:4]) { src.Reset() return errAuthSHA1V4CRC32Error </s> remove func (a *authChain) SetOverhead(overhead int) { a.Overhead = overhead </s> add func (a *authChainA) PacketConn(c net.PacketConn) net.PacketConn { p := &authChainA{ Base: a.Base, salt: a.salt, userData: a.userData, } return &PacketConn{PacketConn: c, Protocol: p} </s> remove return &authAES128{ Base: b, authData: &authData{}, salt: "auth_aes128_md5", hmac: tools.HmacMD5, hashDigest: tools.MD5Sum, } } func (a *authAES128) initForConn(iv []byte) Protocol { return &authAES128{ Base: &Base{ IV: iv, Key: a.Key, TCPMss: a.TCPMss, Overhead: a.Overhead, Param: a.Param, }, recvInfo: &recvInfo{recvID: 1, buffer: new(bytes.Buffer)}, authData: a.authData, packID: 1, salt: a.salt, hmac: a.hmac, hashDigest: a.hashDigest, } } func (a *authAES128) GetProtocolOverhead() int { return 9 } func (a *authAES128) SetOverhead(overhead int) { a.Overhead = overhead } func (a *authAES128) Decode(b []byte) ([]byte, int, error) { a.buffer.Reset() bSize := len(b) readSize := 0 key := pool.Get(len(a.userKey) + 4) defer pool.Put(key) copy(key, a.userKey) for bSize > 4 { binary.LittleEndian.PutUint32(key[len(key)-4:], a.recvID) h := a.hmac(key, b[:2]) if !bytes.Equal(h[:2], b[2:4]) { return nil, 0, errAuthAES128IncorrectMAC } length := int(binary.LittleEndian.Uint16(b[:2])) if length >= 8192 || length < 8 { return nil, 0, errAuthAES128DataLengthError } if length > bSize { break } h = a.hmac(key, b[:length-4]) if !bytes.Equal(h[:4], b[length-4:length]) { return nil, 0, errAuthAES128IncorrectChecksum } a.recvID++ pos := int(b[4]) if pos < 255 { pos += 4 } else { pos = int(binary.LittleEndian.Uint16(b[5:7])) + 4 } if pos > length-4 { return nil, 0, errAuthAES128PositionTooLarge } a.buffer.Write(b[pos : length-4]) b = b[length:] bSize -= length readSize += length } return a.buffer.Bytes(), readSize, nil } func (a *authAES128) Encode(b []byte) ([]byte, error) { a.buffer.Reset() bSize := len(b) offset := 0 if bSize > 0 && !a.hasSentHeader { authSize := bSize if authSize > 1200 { authSize = 1200 } a.hasSentHeader = true a.buffer.Write(a.packAuthData(b[:authSize])) bSize -= authSize offset += authSize } const blockSize = 4096 for bSize > blockSize { packSize, randSize := a.packedDataSize(b[offset : offset+blockSize]) pack := pool.Get(packSize) a.packData(b[offset:offset+blockSize], pack, randSize) a.buffer.Write(pack) pool.Put(pack) bSize -= blockSize offset += blockSize } if bSize > 0 { packSize, randSize := a.packedDataSize(b[offset:]) pack := pool.Get(packSize) a.packData(b[offset:], pack, randSize) a.buffer.Write(pack) pool.Put(pack) } return a.buffer.Bytes(), nil } func (a *authAES128) DecodePacket(b []byte) ([]byte, int, error) { bSize := len(b) h := a.hmac(a.Key, b[:bSize-4]) if !bytes.Equal(h[:4], b[bSize-4:]) { return nil, 0, errAuthAES128IncorrectMAC } return b[:bSize-4], bSize - 4, nil } func (a *authAES128) EncodePacket(b []byte) ([]byte, error) { a.initUserKeyAndID() var buf bytes.Buffer buf.Write(b) buf.Write(a.uid[:]) h := a.hmac(a.userKey, buf.Bytes()) buf.Write(h[:4]) return buf.Bytes(), nil } func (a *authAES128) initUserKeyAndID() { if a.userKey == nil { params := strings.Split(a.Param, ":") if len(params) >= 2 { if userID, err := strconv.ParseUint(params[0], 10, 32); err == nil { binary.LittleEndian.PutUint32(a.uid[:], uint32(userID)) a.userKey = a.hashDigest([]byte(params[1])) } } if a.userKey == nil { rand.Read(a.uid[:]) a.userKey = make([]byte, len(a.Key)) copy(a.userKey, a.Key) } } } func (a *authAES128) packedDataSize(data []byte) (packSize, randSize int) { dataSize := len(data) randSize = 1 if dataSize <= 1200 { if a.packID > 4 { randSize += rand.Intn(32) } else { if dataSize > 900 { randSize += rand.Intn(128) } else { randSize += rand.Intn(512) } } } packSize = randSize + dataSize + 8 return } func (a *authAES128) packData(data, ret []byte, randSize int) { dataSize := len(data) retSize := len(ret) // 0~1, ret_size binary.LittleEndian.PutUint16(ret[0:], uint16(retSize&0xFFFF)) // 2~3, hmac key := pool.Get(len(a.userKey) + 4) defer pool.Put(key) copy(key, a.userKey) binary.LittleEndian.PutUint32(key[len(key)-4:], a.packID) h := a.hmac(key, ret[:2]) copy(ret[2:4], h[:2]) // 4~rand_size+4, rand number rand.Read(ret[4 : 4+randSize]) // 4, rand_size if randSize < 128 { ret[4] = byte(randSize & 0xFF) } else { // 4, magic number 0xFF ret[4] = 0xFF // 5~6, rand_size binary.LittleEndian.PutUint16(ret[5:], uint16(randSize&0xFFFF)) } // rand_size+4~ret_size-4, data if dataSize > 0 { copy(ret[randSize+4:], data) } a.packID++ h = a.hmac(key, ret[:retSize-4]) copy(ret[retSize-4:], h[:4]) } func (a *authAES128) packAuthData(data []byte) (ret []byte) { dataSize := len(data) var randSize int if dataSize > 400 { randSize = rand.Intn(512) } else { randSize = rand.Intn(1024) } dataOffset := randSize + 16 + 4 + 4 + 7 retSize := dataOffset + dataSize + 4 ret = make([]byte, retSize) encrypt := make([]byte, 24) key := make([]byte, len(a.IV)+len(a.Key)) copy(key, a.IV) copy(key[len(a.IV):], a.Key) rand.Read(ret[dataOffset-randSize:]) a.mutex.Lock() defer a.mutex.Unlock() a.connectionID++ if a.connectionID > 0xFF000000 { a.clientID = nil } if len(a.clientID) == 0 { a.clientID = make([]byte, 8) rand.Read(a.clientID) b := make([]byte, 4) rand.Read(b) a.connectionID = binary.LittleEndian.Uint32(b) & 0xFFFFFF } copy(encrypt[4:], a.clientID) binary.LittleEndian.PutUint32(encrypt[8:], a.connectionID) now := time.Now().Unix() binary.LittleEndian.PutUint32(encrypt[:4], uint32(now)) binary.LittleEndian.PutUint16(encrypt[12:], uint16(retSize&0xFFFF)) binary.LittleEndian.PutUint16(encrypt[14:], uint16(randSize&0xFFFF)) a.initUserKeyAndID() aesCipherKey := core.Kdf(base64.StdEncoding.EncodeToString(a.userKey)+a.salt, 16) block, err := aes.NewCipher(aesCipherKey) if err != nil { return nil } encryptData := make([]byte, 16) iv := make([]byte, aes.BlockSize) cbc := cipher.NewCBCEncrypter(block, iv) cbc.CryptBlocks(encryptData, encrypt[:16]) copy(encrypt[:4], a.uid[:]) copy(encrypt[4:4+16], encryptData) h := a.hmac(key, encrypt[:20]) copy(encrypt[20:], h[:4]) rand.Read(ret[:1]) h = a.hmac(key, ret[:1]) copy(ret[1:], h[:7-1]) copy(ret[7:], encrypt) copy(ret[dataOffset:], data) h = a.hmac(a.userKey, ret[:retSize-4]) copy(ret[retSize-4:], h[:4]) return </s> add a := &authAES128{ Base: b, authData: &authData{}, authAES128Function: &authAES128Function{salt: "auth_aes128_md5", hmac: tools.HmacMD5, hashDigest: tools.MD5Sum}, userData: &userData{}, } a.initUserData() return a
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_a.go
a.rawTrans = true src.Reset() return errAuthChainLengthError
<mask> dataLen := (int)((uint(b[1]^a.lastServerHash[15]) << 8) + uint(b[0]^a.lastServerHash[14])) <mask> randLen := a.getServerRandLen(dataLen, a.Overhead) <mask> length := randLen + dataLen <mask> if length >= 4096 { <mask> return nil, 0, errAuthChainDataLengthError <mask> } <mask> length += 4 <mask> if length > len(b) { <mask> break <mask> } </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove func (a *authChain) Decode(b []byte) ([]byte, int, error) { a.buffer.Reset() key := pool.Get(len(a.userKey) + 4) defer pool.Put(key) readSize := 0 copy(key, a.userKey) for len(b) > 4 { binary.LittleEndian.PutUint32(key[len(a.userKey):], a.recvID) dataLen := (int)((uint(b[1]^a.lastServerHash[15]) << 8) + uint(b[0]^a.lastServerHash[14])) randLen := a.getServerRandLen(dataLen, a.Overhead) length := randLen + dataLen </s> add func (a *authChainA) Decode(dst, src *bytes.Buffer) error { if a.rawTrans { dst.ReadFrom(src) return nil } for src.Len() > 4 { macKey := pool.Get(len(a.userKey) + 4) defer pool.Put(macKey) copy(macKey, a.userKey) binary.LittleEndian.PutUint32(macKey[len(a.userKey):], a.recvID) dataLength := int(binary.LittleEndian.Uint16(src.Bytes()[:2]) ^ binary.LittleEndian.Uint16(a.lastServerHash[14:16])) randDataLength := a.randDataLength(dataLength, a.lastServerHash, &a.randomServer) length := dataLength + randDataLength </s> remove length += 4 if length > len(b) { </s> add if 4+length > src.Len() { </s> remove hash := a.hmac(key, b[:length-2]) if !bytes.Equal(hash[:2], b[length-2:length]) { return nil, 0, errAuthChainHMACError </s> add serverHash := tools.HmacMD5(macKey, src.Bytes()[:length+2]) if !bytes.Equal(serverHash[:2], src.Bytes()[length+2:length+4]) { a.rawTrans = true src.Reset() return errAuthChainChksumError </s> remove length := int(binary.BigEndian.Uint16(b[:2])) if length >= 8192 || length < 8 { return nil, 0, errAuthSHA1v4DataLengthError </s> add length := int(binary.BigEndian.Uint16(src.Bytes()[:2])) if length >= 8192 || length < 7 { a.rawTrans = true src.Reset() return errAuthSHA1V4LengthError </s> remove if adler32.Checksum(b[:length-4]) == binary.LittleEndian.Uint32(b[length-4:]) { pos := int(b[4]) if pos != 0xFF { pos += 4 } else { pos = int(binary.BigEndian.Uint16(b[5:5+2])) + 4 } retSize := length - pos - 4 a.buffer.Write(b[pos : pos+retSize]) bSize -= length b = b[length:] </s> add if adler32.Checksum(src.Bytes()[:length-4]) != binary.LittleEndian.Uint32(src.Bytes()[length-4:length]) { a.rawTrans = true src.Reset() return errAuthSHA1V4Adler32Error } pos := int(src.Bytes()[4]) if pos < 255 { pos += 4
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_a.go
if 4+length > src.Len() {
<mask> length := randLen + dataLen <mask> if length >= 4096 { <mask> return nil, 0, errAuthChainDataLengthError <mask> } <mask> length += 4 <mask> if length > len(b) { <mask> break <mask> } <mask> <mask> hash := a.hmac(key, b[:length-2]) <mask> if !bytes.Equal(hash[:2], b[length-2:length]) { </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove return nil, 0, errAuthChainDataLengthError </s> add a.rawTrans = true src.Reset() return errAuthChainLengthError </s> remove hash := a.hmac(key, b[:length-2]) if !bytes.Equal(hash[:2], b[length-2:length]) { return nil, 0, errAuthChainHMACError </s> add serverHash := tools.HmacMD5(macKey, src.Bytes()[:length+2]) if !bytes.Equal(serverHash[:2], src.Bytes()[length+2:length+4]) { a.rawTrans = true src.Reset() return errAuthChainChksumError </s> remove func (a *authChain) Decode(b []byte) ([]byte, int, error) { a.buffer.Reset() key := pool.Get(len(a.userKey) + 4) defer pool.Put(key) readSize := 0 copy(key, a.userKey) for len(b) > 4 { binary.LittleEndian.PutUint32(key[len(a.userKey):], a.recvID) dataLen := (int)((uint(b[1]^a.lastServerHash[15]) << 8) + uint(b[0]^a.lastServerHash[14])) randLen := a.getServerRandLen(dataLen, a.Overhead) length := randLen + dataLen </s> add func (a *authChainA) Decode(dst, src *bytes.Buffer) error { if a.rawTrans { dst.ReadFrom(src) return nil } for src.Len() > 4 { macKey := pool.Get(len(a.userKey) + 4) defer pool.Put(macKey) copy(macKey, a.userKey) binary.LittleEndian.PutUint32(macKey[len(a.userKey):], a.recvID) dataLength := int(binary.LittleEndian.Uint16(src.Bytes()[:2]) ^ binary.LittleEndian.Uint16(a.lastServerHash[14:16])) randDataLength := a.randDataLength(dataLength, a.lastServerHash, &a.randomServer) length := dataLength + randDataLength </s> remove var dataPos int if dataLen > 0 && randLen > 0 { dataPos = 2 + getRandStartPos(&a.randomServer, randLen) } else { dataPos = 2 </s> add a.lastServerHash = serverHash pos := 2 if dataLength > 0 && randDataLength > 0 { pos += getRandStartPos(randDataLength, &a.randomServer) </s> remove length := int(binary.BigEndian.Uint16(b[:2])) if length >= 8192 || length < 8 { return nil, 0, errAuthSHA1v4DataLengthError </s> add length := int(binary.BigEndian.Uint16(src.Bytes()[:2])) if length >= 8192 || length < 7 { a.rawTrans = true src.Reset() return errAuthSHA1V4LengthError
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_a.go
serverHash := tools.HmacMD5(macKey, src.Bytes()[:length+2]) if !bytes.Equal(serverHash[:2], src.Bytes()[length+2:length+4]) { a.rawTrans = true src.Reset() return errAuthChainChksumError
<mask> if length > len(b) { <mask> break <mask> } <mask> <mask> hash := a.hmac(key, b[:length-2]) <mask> if !bytes.Equal(hash[:2], b[length-2:length]) { <mask> return nil, 0, errAuthChainHMACError <mask> } <mask> var dataPos int <mask> if dataLen > 0 && randLen > 0 { <mask> dataPos = 2 + getRandStartPos(&a.randomServer, randLen) <mask> } else { </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove var dataPos int if dataLen > 0 && randLen > 0 { dataPos = 2 + getRandStartPos(&a.randomServer, randLen) } else { dataPos = 2 </s> add a.lastServerHash = serverHash pos := 2 if dataLength > 0 && randDataLength > 0 { pos += getRandStartPos(randDataLength, &a.randomServer) </s> remove length += 4 if length > len(b) { </s> add if 4+length > src.Len() { </s> remove d := pool.Get(dataLen) a.dec.XORKeyStream(d, b[dataPos:dataPos+dataLen]) a.buffer.Write(d) pool.Put(d) </s> add wantedData := src.Bytes()[pos : pos+dataLength] a.decrypter.XORKeyStream(wantedData, wantedData) </s> remove return nil, 0, errAuthChainDataLengthError </s> add a.rawTrans = true src.Reset() return errAuthChainLengthError </s> remove func (a *authChain) Decode(b []byte) ([]byte, int, error) { a.buffer.Reset() key := pool.Get(len(a.userKey) + 4) defer pool.Put(key) readSize := 0 copy(key, a.userKey) for len(b) > 4 { binary.LittleEndian.PutUint32(key[len(a.userKey):], a.recvID) dataLen := (int)((uint(b[1]^a.lastServerHash[15]) << 8) + uint(b[0]^a.lastServerHash[14])) randLen := a.getServerRandLen(dataLen, a.Overhead) length := randLen + dataLen </s> add func (a *authChainA) Decode(dst, src *bytes.Buffer) error { if a.rawTrans { dst.ReadFrom(src) return nil } for src.Len() > 4 { macKey := pool.Get(len(a.userKey) + 4) defer pool.Put(macKey) copy(macKey, a.userKey) binary.LittleEndian.PutUint32(macKey[len(a.userKey):], a.recvID) dataLength := int(binary.LittleEndian.Uint16(src.Bytes()[:2]) ^ binary.LittleEndian.Uint16(a.lastServerHash[14:16])) randDataLength := a.randDataLength(dataLength, a.lastServerHash, &a.randomServer) length := dataLength + randDataLength
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_a.go
a.lastServerHash = serverHash pos := 2 if dataLength > 0 && randDataLength > 0 { pos += getRandStartPos(randDataLength, &a.randomServer)
<mask> hash := a.hmac(key, b[:length-2]) <mask> if !bytes.Equal(hash[:2], b[length-2:length]) { <mask> return nil, 0, errAuthChainHMACError <mask> } <mask> var dataPos int <mask> if dataLen > 0 && randLen > 0 { <mask> dataPos = 2 + getRandStartPos(&a.randomServer, randLen) <mask> } else { <mask> dataPos = 2 <mask> } <mask> d := pool.Get(dataLen) <mask> a.dec.XORKeyStream(d, b[dataPos:dataPos+dataLen]) <mask> a.buffer.Write(d) <mask> pool.Put(d) </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove hash := a.hmac(key, b[:length-2]) if !bytes.Equal(hash[:2], b[length-2:length]) { return nil, 0, errAuthChainHMACError </s> add serverHash := tools.HmacMD5(macKey, src.Bytes()[:length+2]) if !bytes.Equal(serverHash[:2], src.Bytes()[length+2:length+4]) { a.rawTrans = true src.Reset() return errAuthChainChksumError </s> remove d := pool.Get(dataLen) a.dec.XORKeyStream(d, b[dataPos:dataPos+dataLen]) a.buffer.Write(d) pool.Put(d) </s> add wantedData := src.Bytes()[pos : pos+dataLength] a.decrypter.XORKeyStream(wantedData, wantedData) </s> remove length += 4 if length > len(b) { </s> add if 4+length > src.Len() { </s> remove if bSize > 0 { dataLen, randLength := a.packedDataLen(b[offset:]) d := pool.Get(dataLen) a.packData(d, b[offset:], randLength) a.buffer.Write(d) pool.Put(d) </s> add if len(b) > 0 { a.packData(buf, b) </s> remove var unitSize = a.TCPMss - a.Overhead for bSize > unitSize { dataLen, randLength := a.packedDataLen(b[offset : offset+unitSize]) d := pool.Get(dataLen) a.packData(d, b[offset:offset+unitSize], randLength) a.buffer.Write(d) pool.Put(d) bSize -= unitSize offset += unitSize </s> add for len(b) > 2800 { a.packData(buf, b[:2800]) b = b[2800:]
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_a.go
wantedData := src.Bytes()[pos : pos+dataLength] a.decrypter.XORKeyStream(wantedData, wantedData)
<mask> dataPos = 2 + getRandStartPos(&a.randomServer, randLen) <mask> } else { <mask> dataPos = 2 <mask> } <mask> d := pool.Get(dataLen) <mask> a.dec.XORKeyStream(d, b[dataPos:dataPos+dataLen]) <mask> a.buffer.Write(d) <mask> pool.Put(d) <mask> if a.recvID == 1 { <mask> a.TCPMss = int(binary.LittleEndian.Uint16(a.buffer.Next(2))) <mask> } <mask> a.lastServerHash = hash <mask> a.recvID++ </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove var dataPos int if dataLen > 0 && randLen > 0 { dataPos = 2 + getRandStartPos(&a.randomServer, randLen) } else { dataPos = 2 </s> add a.lastServerHash = serverHash pos := 2 if dataLength > 0 && randDataLength > 0 { pos += getRandStartPos(randDataLength, &a.randomServer) </s> remove a.TCPMss = int(binary.LittleEndian.Uint16(a.buffer.Next(2))) </s> add dst.Write(wantedData[2:]) } else { dst.Write(wantedData) </s> remove a.lastServerHash = hash </s> add </s> remove hash := a.hmac(key, b[:length-2]) if !bytes.Equal(hash[:2], b[length-2:length]) { return nil, 0, errAuthChainHMACError </s> add serverHash := tools.HmacMD5(macKey, src.Bytes()[:length+2]) if !bytes.Equal(serverHash[:2], src.Bytes()[length+2:length+4]) { a.rawTrans = true src.Reset() return errAuthChainChksumError </s> remove b = b[length:] readSize += length </s> add src.Next(length + 4)
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_a.go
dst.Write(wantedData[2:]) } else { dst.Write(wantedData)
<mask> a.dec.XORKeyStream(d, b[dataPos:dataPos+dataLen]) <mask> a.buffer.Write(d) <mask> pool.Put(d) <mask> if a.recvID == 1 { <mask> a.TCPMss = int(binary.LittleEndian.Uint16(a.buffer.Next(2))) <mask> } <mask> a.lastServerHash = hash <mask> a.recvID++ <mask> b = b[length:] <mask> readSize += length </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove a.lastServerHash = hash </s> add </s> remove d := pool.Get(dataLen) a.dec.XORKeyStream(d, b[dataPos:dataPos+dataLen]) a.buffer.Write(d) pool.Put(d) </s> add wantedData := src.Bytes()[pos : pos+dataLength] a.decrypter.XORKeyStream(wantedData, wantedData) </s> remove b = b[length:] readSize += length </s> add src.Next(length + 4) </s> remove var dataPos int if dataLen > 0 && randLen > 0 { dataPos = 2 + getRandStartPos(&a.randomServer, randLen) } else { dataPos = 2 </s> add a.lastServerHash = serverHash pos := 2 if dataLength > 0 && randDataLength > 0 { pos += getRandStartPos(randDataLength, &a.randomServer) </s> remove return a.buffer.Bytes(), readSize, nil </s> add return nil
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_a.go
<mask> pool.Put(d) <mask> if a.recvID == 1 { <mask> a.TCPMss = int(binary.LittleEndian.Uint16(a.buffer.Next(2))) <mask> } <mask> a.lastServerHash = hash <mask> a.recvID++ <mask> b = b[length:] <mask> readSize += length <mask> } <mask> return a.buffer.Bytes(), readSize, nil </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove a.TCPMss = int(binary.LittleEndian.Uint16(a.buffer.Next(2))) </s> add dst.Write(wantedData[2:]) } else { dst.Write(wantedData) </s> remove b = b[length:] readSize += length </s> add src.Next(length + 4) </s> remove d := pool.Get(dataLen) a.dec.XORKeyStream(d, b[dataPos:dataPos+dataLen]) a.buffer.Write(d) pool.Put(d) </s> add wantedData := src.Bytes()[pos : pos+dataLength] a.decrypter.XORKeyStream(wantedData, wantedData) </s> remove return a.buffer.Bytes(), readSize, nil </s> add return nil </s> remove if adler32.Checksum(b[:length-4]) == binary.LittleEndian.Uint32(b[length-4:]) { pos := int(b[4]) if pos != 0xFF { pos += 4 } else { pos = int(binary.BigEndian.Uint16(b[5:5+2])) + 4 } retSize := length - pos - 4 a.buffer.Write(b[pos : pos+retSize]) bSize -= length b = b[length:] </s> add if adler32.Checksum(src.Bytes()[:length-4]) != binary.LittleEndian.Uint32(src.Bytes()[length-4:length]) { a.rawTrans = true src.Reset() return errAuthSHA1V4Adler32Error } pos := int(src.Bytes()[4]) if pos < 255 { pos += 4
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_a.go
src.Next(length + 4)
<mask> a.TCPMss = int(binary.LittleEndian.Uint16(a.buffer.Next(2))) <mask> } <mask> a.lastServerHash = hash <mask> a.recvID++ <mask> b = b[length:] <mask> readSize += length <mask> } <mask> return a.buffer.Bytes(), readSize, nil <mask> } <mask> <mask> func (a *authChain) Encode(b []byte) ([]byte, error) { </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove a.lastServerHash = hash </s> add </s> remove return a.buffer.Bytes(), readSize, nil </s> add return nil </s> remove a.TCPMss = int(binary.LittleEndian.Uint16(a.buffer.Next(2))) </s> add dst.Write(wantedData[2:]) } else { dst.Write(wantedData) </s> remove func (a *authChain) Encode(b []byte) ([]byte, error) { a.buffer.Reset() bSize := len(b) offset := 0 if bSize > 0 && !a.headerSent { headSize := 1200 if headSize > bSize { headSize = bSize } a.buffer.Write(a.packAuthData(b[:headSize])) offset += headSize bSize -= headSize a.headerSent = true </s> add func (a *authChainA) Encode(buf *bytes.Buffer, b []byte) error { if !a.hasSentHeader { dataLength := getDataLength(b) a.packAuthData(buf, b[:dataLength]) b = b[dataLength:] a.hasSentHeader = true </s> remove d := pool.Get(dataLen) a.dec.XORKeyStream(d, b[dataPos:dataPos+dataLen]) a.buffer.Write(d) pool.Put(d) </s> add wantedData := src.Bytes()[pos : pos+dataLength] a.decrypter.XORKeyStream(wantedData, wantedData)
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_a.go
return nil
<mask> a.recvID++ <mask> b = b[length:] <mask> readSize += length <mask> } <mask> return a.buffer.Bytes(), readSize, nil <mask> } <mask> <mask> func (a *authChain) Encode(b []byte) ([]byte, error) { <mask> a.buffer.Reset() <mask> bSize := len(b) </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove b = b[length:] readSize += length </s> add src.Next(length + 4) </s> remove a.lastServerHash = hash </s> add </s> remove func (a *authChain) Encode(b []byte) ([]byte, error) { a.buffer.Reset() bSize := len(b) offset := 0 if bSize > 0 && !a.headerSent { headSize := 1200 if headSize > bSize { headSize = bSize } a.buffer.Write(a.packAuthData(b[:headSize])) offset += headSize bSize -= headSize a.headerSent = true </s> add func (a *authChainA) Encode(buf *bytes.Buffer, b []byte) error { if !a.hasSentHeader { dataLength := getDataLength(b) a.packAuthData(buf, b[:dataLength]) b = b[dataLength:] a.hasSentHeader = true </s> remove return a.buffer.Bytes(), originalSize - bSize, nil </s> add return nil </s> remove func (a *authSHA1V4) Encode(b []byte) ([]byte, error) { a.buffer.Reset() bSize := len(b) offset := 0 if !a.headerSent && bSize > 0 { headSize := getHeadSize(b, 30) if headSize > bSize { headSize = bSize } a.buffer.Write(a.packAuthData(b[:headSize])) offset += headSize bSize -= headSize a.headerSent = true </s> add func (a *authSHA1V4) Encode(buf *bytes.Buffer, b []byte) error { if !a.hasSentHeader { dataLength := getDataLength(b) a.packAuthData(buf, b[:dataLength]) b = b[dataLength:] a.hasSentHeader = true
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_a.go
func (a *authChainA) Encode(buf *bytes.Buffer, b []byte) error { if !a.hasSentHeader { dataLength := getDataLength(b) a.packAuthData(buf, b[:dataLength]) b = b[dataLength:] a.hasSentHeader = true
<mask> } <mask> return a.buffer.Bytes(), readSize, nil <mask> } <mask> <mask> func (a *authChain) Encode(b []byte) ([]byte, error) { <mask> a.buffer.Reset() <mask> bSize := len(b) <mask> offset := 0 <mask> if bSize > 0 && !a.headerSent { <mask> headSize := 1200 <mask> if headSize > bSize { <mask> headSize = bSize <mask> } <mask> a.buffer.Write(a.packAuthData(b[:headSize])) <mask> offset += headSize <mask> bSize -= headSize <mask> a.headerSent = true <mask> } <mask> var unitSize = a.TCPMss - a.Overhead <mask> for bSize > unitSize { <mask> dataLen, randLength := a.packedDataLen(b[offset : offset+unitSize]) <mask> d := pool.Get(dataLen) </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove var unitSize = a.TCPMss - a.Overhead for bSize > unitSize { dataLen, randLength := a.packedDataLen(b[offset : offset+unitSize]) d := pool.Get(dataLen) a.packData(d, b[offset:offset+unitSize], randLength) a.buffer.Write(d) pool.Put(d) bSize -= unitSize offset += unitSize </s> add for len(b) > 2800 { a.packData(buf, b[:2800]) b = b[2800:] </s> remove func (a *authSHA1V4) Encode(b []byte) ([]byte, error) { a.buffer.Reset() bSize := len(b) offset := 0 if !a.headerSent && bSize > 0 { headSize := getHeadSize(b, 30) if headSize > bSize { headSize = bSize } a.buffer.Write(a.packAuthData(b[:headSize])) offset += headSize bSize -= headSize a.headerSent = true </s> add func (a *authSHA1V4) Encode(buf *bytes.Buffer, b []byte) error { if !a.hasSentHeader { dataLength := getDataLength(b) a.packAuthData(buf, b[:dataLength]) b = b[dataLength:] a.hasSentHeader = true </s> remove if bSize > 0 { dataLen, randLength := a.packedDataLen(b[offset:]) d := pool.Get(dataLen) a.packData(d, b[offset:], randLength) a.buffer.Write(d) pool.Put(d) </s> add if len(b) > 0 { a.packData(buf, b) </s> remove const blockSize = 4096 for bSize > blockSize { packSize, randSize := a.packedDataSize(b[offset : offset+blockSize]) pack := pool.Get(packSize) a.packData(b[offset:offset+blockSize], pack, randSize) a.buffer.Write(pack) pool.Put(pack) offset += blockSize bSize -= blockSize </s> add for len(b) > 8100 { a.packData(buf, b[:8100]) b = b[8100:] </s> remove if bSize > 0 { packSize, randSize := a.packedDataSize(b[offset:]) pack := pool.Get(packSize) a.packData(b[offset:], pack, randSize) a.buffer.Write(pack) pool.Put(pack) </s> add if len(b) > 0 { a.packData(buf, b)
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_a.go
for len(b) > 2800 { a.packData(buf, b[:2800]) b = b[2800:]
<mask> offset += headSize <mask> bSize -= headSize <mask> a.headerSent = true <mask> } <mask> var unitSize = a.TCPMss - a.Overhead <mask> for bSize > unitSize { <mask> dataLen, randLength := a.packedDataLen(b[offset : offset+unitSize]) <mask> d := pool.Get(dataLen) <mask> a.packData(d, b[offset:offset+unitSize], randLength) <mask> a.buffer.Write(d) <mask> pool.Put(d) <mask> bSize -= unitSize <mask> offset += unitSize <mask> } <mask> if bSize > 0 { <mask> dataLen, randLength := a.packedDataLen(b[offset:]) <mask> d := pool.Get(dataLen) <mask> a.packData(d, b[offset:], randLength) </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove if bSize > 0 { dataLen, randLength := a.packedDataLen(b[offset:]) d := pool.Get(dataLen) a.packData(d, b[offset:], randLength) a.buffer.Write(d) pool.Put(d) </s> add if len(b) > 0 { a.packData(buf, b) </s> remove func (a *authChain) Encode(b []byte) ([]byte, error) { a.buffer.Reset() bSize := len(b) offset := 0 if bSize > 0 && !a.headerSent { headSize := 1200 if headSize > bSize { headSize = bSize } a.buffer.Write(a.packAuthData(b[:headSize])) offset += headSize bSize -= headSize a.headerSent = true </s> add func (a *authChainA) Encode(buf *bytes.Buffer, b []byte) error { if !a.hasSentHeader { dataLength := getDataLength(b) a.packAuthData(buf, b[:dataLength]) b = b[dataLength:] a.hasSentHeader = true </s> remove const blockSize = 4096 for bSize > blockSize { packSize, randSize := a.packedDataSize(b[offset : offset+blockSize]) pack := pool.Get(packSize) a.packData(b[offset:offset+blockSize], pack, randSize) a.buffer.Write(pack) pool.Put(pack) offset += blockSize bSize -= blockSize </s> add for len(b) > 8100 { a.packData(buf, b[:8100]) b = b[8100:] </s> remove func (a *authSHA1V4) Encode(b []byte) ([]byte, error) { a.buffer.Reset() bSize := len(b) offset := 0 if !a.headerSent && bSize > 0 { headSize := getHeadSize(b, 30) if headSize > bSize { headSize = bSize } a.buffer.Write(a.packAuthData(b[:headSize])) offset += headSize bSize -= headSize a.headerSent = true </s> add func (a *authSHA1V4) Encode(buf *bytes.Buffer, b []byte) error { if !a.hasSentHeader { dataLength := getDataLength(b) a.packAuthData(buf, b[:dataLength]) b = b[dataLength:] a.hasSentHeader = true </s> remove return a.buffer.Bytes(), nil </s> add return nil
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_a.go
if len(b) > 0 { a.packData(buf, b)
<mask> pool.Put(d) <mask> bSize -= unitSize <mask> offset += unitSize <mask> } <mask> if bSize > 0 { <mask> dataLen, randLength := a.packedDataLen(b[offset:]) <mask> d := pool.Get(dataLen) <mask> a.packData(d, b[offset:], randLength) <mask> a.buffer.Write(d) <mask> pool.Put(d) <mask> } <mask> return a.buffer.Bytes(), nil <mask> } <mask> <mask> func (a *authChain) DecodePacket(b []byte) ([]byte, int, error) { </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove var unitSize = a.TCPMss - a.Overhead for bSize > unitSize { dataLen, randLength := a.packedDataLen(b[offset : offset+unitSize]) d := pool.Get(dataLen) a.packData(d, b[offset:offset+unitSize], randLength) a.buffer.Write(d) pool.Put(d) bSize -= unitSize offset += unitSize </s> add for len(b) > 2800 { a.packData(buf, b[:2800]) b = b[2800:] </s> remove return a.buffer.Bytes(), nil </s> add return nil </s> remove func (a *authChain) Encode(b []byte) ([]byte, error) { a.buffer.Reset() bSize := len(b) offset := 0 if bSize > 0 && !a.headerSent { headSize := 1200 if headSize > bSize { headSize = bSize } a.buffer.Write(a.packAuthData(b[:headSize])) offset += headSize bSize -= headSize a.headerSent = true </s> add func (a *authChainA) Encode(buf *bytes.Buffer, b []byte) error { if !a.hasSentHeader { dataLength := getDataLength(b) a.packAuthData(buf, b[:dataLength]) b = b[dataLength:] a.hasSentHeader = true </s> remove if bSize > 0 { packSize, randSize := a.packedDataSize(b[offset:]) pack := pool.Get(packSize) a.packData(b[offset:], pack, randSize) a.buffer.Write(pack) pool.Put(pack) </s> add if len(b) > 0 { a.packData(buf, b) </s> remove func (a *authSHA1V4) Encode(b []byte) ([]byte, error) { a.buffer.Reset() bSize := len(b) offset := 0 if !a.headerSent && bSize > 0 { headSize := getHeadSize(b, 30) if headSize > bSize { headSize = bSize } a.buffer.Write(a.packAuthData(b[:headSize])) offset += headSize bSize -= headSize a.headerSent = true </s> add func (a *authSHA1V4) Encode(buf *bytes.Buffer, b []byte) error { if !a.hasSentHeader { dataLength := getDataLength(b) a.packAuthData(buf, b[:dataLength]) b = b[dataLength:] a.hasSentHeader = true
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_a.go
return nil
<mask> a.packData(d, b[offset:], randLength) <mask> a.buffer.Write(d) <mask> pool.Put(d) <mask> } <mask> return a.buffer.Bytes(), nil <mask> } <mask> <mask> func (a *authChain) DecodePacket(b []byte) ([]byte, int, error) { <mask> bSize := len(b) <mask> if bSize < 9 { </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove if bSize > 0 { dataLen, randLength := a.packedDataLen(b[offset:]) d := pool.Get(dataLen) a.packData(d, b[offset:], randLength) a.buffer.Write(d) pool.Put(d) </s> add if len(b) > 0 { a.packData(buf, b) </s> remove func (a *authChain) DecodePacket(b []byte) ([]byte, int, error) { bSize := len(b) if bSize < 9 { return nil, 0, errAuthChainDataLengthError </s> add func (a *authChainA) DecodePacket(b []byte) ([]byte, error) { if len(b) < 9 { return nil, errAuthChainLengthError </s> remove var unitSize = a.TCPMss - a.Overhead for bSize > unitSize { dataLen, randLength := a.packedDataLen(b[offset : offset+unitSize]) d := pool.Get(dataLen) a.packData(d, b[offset:offset+unitSize], randLength) a.buffer.Write(d) pool.Put(d) bSize -= unitSize offset += unitSize </s> add for len(b) > 2800 { a.packData(buf, b[:2800]) b = b[2800:] </s> remove if bSize > 0 { packSize, randSize := a.packedDataSize(b[offset:]) pack := pool.Get(packSize) a.packData(b[offset:], pack, randSize) a.buffer.Write(pack) pool.Put(pack) </s> add if len(b) > 0 { a.packData(buf, b) </s> remove return a.buffer.Bytes(), readSize, nil </s> add return nil
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_a.go
func (a *authChainA) DecodePacket(b []byte) ([]byte, error) { if len(b) < 9 { return nil, errAuthChainLengthError
<mask> } <mask> return a.buffer.Bytes(), nil <mask> } <mask> <mask> func (a *authChain) DecodePacket(b []byte) ([]byte, int, error) { <mask> bSize := len(b) <mask> if bSize < 9 { <mask> return nil, 0, errAuthChainDataLengthError <mask> } <mask> h := a.hmac(a.userKey, b[:bSize-1]) <mask> if h[0] != b[bSize-1] { <mask> return nil, 0, errAuthChainHMACError <mask> } </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove h := a.hmac(a.userKey, b[:bSize-1]) if h[0] != b[bSize-1] { return nil, 0, errAuthChainHMACError </s> add if !bytes.Equal(tools.HmacMD5(a.userKey, b[:len(b)-1])[:1], b[len(b)-1:]) { return nil, errAuthChainChksumError </s> remove hash := a.hmac(a.Key, b[bSize-8:bSize-1]) cipherKey := a.getRC4CipherKey(hash) dec, _ := rc4.NewCipher(cipherKey) randLength := udpGetRandLen(&a.randomServer, hash) bSize -= 8 + randLength dec.XORKeyStream(b, b[:bSize]) return b, bSize, nil </s> add md5Data := tools.HmacMD5(a.Key, b[len(b)-8:len(b)-1]) randDataLength := udpGetRandLength(md5Data, &a.randomServer) key := core.Kdf(base64.StdEncoding.EncodeToString(a.userKey)+base64.StdEncoding.EncodeToString(md5Data), 16) rc4Cipher, err := rc4.NewCipher(key) if err != nil { return nil, err } wantedData := b[:len(b)-8-randDataLength] rc4Cipher.XORKeyStream(wantedData, wantedData) return wantedData, nil </s> remove return a.buffer.Bytes(), nil </s> add return nil </s> remove func (a *authSHA1V4) Decode(b []byte) ([]byte, int, error) { a.buffer.Reset() bSize := len(b) originalSize := bSize for bSize > 4 { crc := crc32.ChecksumIEEE(b[:2]) & 0xFFFF if binary.LittleEndian.Uint16(b[2:4]) != uint16(crc) { return nil, 0, errAuthSHA1v4CRC32Error </s> add func (a *authSHA1V4) Decode(dst, src *bytes.Buffer) error { if a.rawTrans { dst.ReadFrom(src) return nil } for src.Len() > 4 { if uint16(crc32.ChecksumIEEE(src.Bytes()[:2])&0xffff) != binary.LittleEndian.Uint16(src.Bytes()[2:4]) { src.Reset() return errAuthSHA1V4CRC32Error </s> remove return a.buffer.Bytes(), originalSize - bSize, nil </s> add return nil
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_a.go
if !bytes.Equal(tools.HmacMD5(a.userKey, b[:len(b)-1])[:1], b[len(b)-1:]) { return nil, errAuthChainChksumError
<mask> bSize := len(b) <mask> if bSize < 9 { <mask> return nil, 0, errAuthChainDataLengthError <mask> } <mask> h := a.hmac(a.userKey, b[:bSize-1]) <mask> if h[0] != b[bSize-1] { <mask> return nil, 0, errAuthChainHMACError <mask> } <mask> hash := a.hmac(a.Key, b[bSize-8:bSize-1]) <mask> cipherKey := a.getRC4CipherKey(hash) <mask> dec, _ := rc4.NewCipher(cipherKey) <mask> randLength := udpGetRandLen(&a.randomServer, hash) </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove hash := a.hmac(a.Key, b[bSize-8:bSize-1]) cipherKey := a.getRC4CipherKey(hash) dec, _ := rc4.NewCipher(cipherKey) randLength := udpGetRandLen(&a.randomServer, hash) bSize -= 8 + randLength dec.XORKeyStream(b, b[:bSize]) return b, bSize, nil </s> add md5Data := tools.HmacMD5(a.Key, b[len(b)-8:len(b)-1]) randDataLength := udpGetRandLength(md5Data, &a.randomServer) key := core.Kdf(base64.StdEncoding.EncodeToString(a.userKey)+base64.StdEncoding.EncodeToString(md5Data), 16) rc4Cipher, err := rc4.NewCipher(key) if err != nil { return nil, err } wantedData := b[:len(b)-8-randDataLength] rc4Cipher.XORKeyStream(wantedData, wantedData) return wantedData, nil </s> remove func (a *authChain) DecodePacket(b []byte) ([]byte, int, error) { bSize := len(b) if bSize < 9 { return nil, 0, errAuthChainDataLengthError </s> add func (a *authChainA) DecodePacket(b []byte) ([]byte, error) { if len(b) < 9 { return nil, errAuthChainLengthError </s> remove cipherKey := a.getRC4CipherKey(hash) enc, _ := rc4.NewCipher(cipherKey) var buf bytes.Buffer enc.XORKeyStream(b, b) buf.Write(b) randLength := udpGetRandLen(&a.randomClient, hash) randBytes := pool.Get(randLength) defer pool.Put(randBytes) buf.Write(randBytes) buf.Write(authData) buf.Write(uid) </s> add md5Data := tools.HmacMD5(a.Key, authData) </s> remove hash := a.hmac(a.Key, authData) uid := pool.Get(4) defer pool.Put(uid) for i := 0; i < 4; i++ { uid[i] = a.uid[i] ^ hash[i] } </s> add </s> remove func (a *authSHA1V4) Decode(b []byte) ([]byte, int, error) { a.buffer.Reset() bSize := len(b) originalSize := bSize for bSize > 4 { crc := crc32.ChecksumIEEE(b[:2]) & 0xFFFF if binary.LittleEndian.Uint16(b[2:4]) != uint16(crc) { return nil, 0, errAuthSHA1v4CRC32Error </s> add func (a *authSHA1V4) Decode(dst, src *bytes.Buffer) error { if a.rawTrans { dst.ReadFrom(src) return nil } for src.Len() > 4 { if uint16(crc32.ChecksumIEEE(src.Bytes()[:2])&0xffff) != binary.LittleEndian.Uint16(src.Bytes()[2:4]) { src.Reset() return errAuthSHA1V4CRC32Error
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_a.go
md5Data := tools.HmacMD5(a.Key, b[len(b)-8:len(b)-1]) randDataLength := udpGetRandLength(md5Data, &a.randomServer) key := core.Kdf(base64.StdEncoding.EncodeToString(a.userKey)+base64.StdEncoding.EncodeToString(md5Data), 16) rc4Cipher, err := rc4.NewCipher(key) if err != nil { return nil, err } wantedData := b[:len(b)-8-randDataLength] rc4Cipher.XORKeyStream(wantedData, wantedData) return wantedData, nil
<mask> h := a.hmac(a.userKey, b[:bSize-1]) <mask> if h[0] != b[bSize-1] { <mask> return nil, 0, errAuthChainHMACError <mask> } <mask> hash := a.hmac(a.Key, b[bSize-8:bSize-1]) <mask> cipherKey := a.getRC4CipherKey(hash) <mask> dec, _ := rc4.NewCipher(cipherKey) <mask> randLength := udpGetRandLen(&a.randomServer, hash) <mask> bSize -= 8 + randLength <mask> dec.XORKeyStream(b, b[:bSize]) <mask> return b, bSize, nil <mask> } <mask> <mask> func (a *authChain) EncodePacket(b []byte) ([]byte, error) { <mask> a.initUserKeyAndID() <mask> authData := pool.Get(3) </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove h := a.hmac(a.userKey, b[:bSize-1]) if h[0] != b[bSize-1] { return nil, 0, errAuthChainHMACError </s> add if !bytes.Equal(tools.HmacMD5(a.userKey, b[:len(b)-1])[:1], b[len(b)-1:]) { return nil, errAuthChainChksumError </s> remove func (a *authChain) EncodePacket(b []byte) ([]byte, error) { a.initUserKeyAndID() </s> add func (a *authChainA) EncodePacket(buf *bytes.Buffer, b []byte) error { </s> remove func (a *authChain) DecodePacket(b []byte) ([]byte, int, error) { bSize := len(b) if bSize < 9 { return nil, 0, errAuthChainDataLengthError </s> add func (a *authChainA) DecodePacket(b []byte) ([]byte, error) { if len(b) < 9 { return nil, errAuthChainLengthError </s> remove hash := a.hmac(a.Key, authData) uid := pool.Get(4) defer pool.Put(uid) for i := 0; i < 4; i++ { uid[i] = a.uid[i] ^ hash[i] } </s> add </s> remove cipherKey := a.getRC4CipherKey(hash) enc, _ := rc4.NewCipher(cipherKey) var buf bytes.Buffer enc.XORKeyStream(b, b) buf.Write(b) randLength := udpGetRandLen(&a.randomClient, hash) randBytes := pool.Get(randLength) defer pool.Put(randBytes) buf.Write(randBytes) buf.Write(authData) buf.Write(uid) </s> add md5Data := tools.HmacMD5(a.Key, authData)
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_a.go
func (a *authChainA) EncodePacket(buf *bytes.Buffer, b []byte) error {
<mask> dec.XORKeyStream(b, b[:bSize]) <mask> return b, bSize, nil <mask> } <mask> <mask> func (a *authChain) EncodePacket(b []byte) ([]byte, error) { <mask> a.initUserKeyAndID() <mask> authData := pool.Get(3) <mask> defer pool.Put(authData) <mask> rand.Read(authData) <mask> hash := a.hmac(a.Key, authData) <mask> uid := pool.Get(4) </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove hash := a.hmac(a.Key, authData) uid := pool.Get(4) defer pool.Put(uid) for i := 0; i < 4; i++ { uid[i] = a.uid[i] ^ hash[i] } </s> add </s> remove hash := a.hmac(a.Key, b[bSize-8:bSize-1]) cipherKey := a.getRC4CipherKey(hash) dec, _ := rc4.NewCipher(cipherKey) randLength := udpGetRandLen(&a.randomServer, hash) bSize -= 8 + randLength dec.XORKeyStream(b, b[:bSize]) return b, bSize, nil </s> add md5Data := tools.HmacMD5(a.Key, b[len(b)-8:len(b)-1]) randDataLength := udpGetRandLength(md5Data, &a.randomServer) key := core.Kdf(base64.StdEncoding.EncodeToString(a.userKey)+base64.StdEncoding.EncodeToString(md5Data), 16) rc4Cipher, err := rc4.NewCipher(key) if err != nil { return nil, err } wantedData := b[:len(b)-8-randDataLength] rc4Cipher.XORKeyStream(wantedData, wantedData) return wantedData, nil </s> remove func (a *authSHA1V4) EncodePacket(b []byte) ([]byte, error) { return b, nil } </s> add func (a *authSHA1V4) DecodePacket(b []byte) ([]byte, error) { return b, nil } </s> remove func (a *authSHA1V4) packedDataSize(data []byte) (packSize, randSize int) { dataSize := len(data) randSize = 1 if dataSize <= 1300 { if dataSize > 400 { randSize += rand.Intn(128) } else { randSize += rand.Intn(1024) } } packSize = randSize + dataSize + 8 return </s> add func (a *authSHA1V4) EncodePacket(buf *bytes.Buffer, b []byte) error { buf.Write(b) return nil </s> remove return a.buffer.Bytes(), originalSize - bSize, nil </s> add return nil
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_a.go
<mask> a.initUserKeyAndID() <mask> authData := pool.Get(3) <mask> defer pool.Put(authData) <mask> rand.Read(authData) <mask> hash := a.hmac(a.Key, authData) <mask> uid := pool.Get(4) <mask> defer pool.Put(uid) <mask> for i := 0; i < 4; i++ { <mask> uid[i] = a.uid[i] ^ hash[i] <mask> } <mask> <mask> cipherKey := a.getRC4CipherKey(hash) <mask> enc, _ := rc4.NewCipher(cipherKey) <mask> var buf bytes.Buffer <mask> enc.XORKeyStream(b, b) </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove cipherKey := a.getRC4CipherKey(hash) enc, _ := rc4.NewCipher(cipherKey) var buf bytes.Buffer enc.XORKeyStream(b, b) buf.Write(b) randLength := udpGetRandLen(&a.randomClient, hash) randBytes := pool.Get(randLength) defer pool.Put(randBytes) buf.Write(randBytes) buf.Write(authData) buf.Write(uid) </s> add md5Data := tools.HmacMD5(a.Key, authData) </s> remove func (a *authChain) EncodePacket(b []byte) ([]byte, error) { a.initUserKeyAndID() </s> add func (a *authChainA) EncodePacket(buf *bytes.Buffer, b []byte) error { </s> remove var base64UserKey string // uid & 16 bytes auth data { a.initUserKeyAndID() uid := make([]byte, 4) for i := 0; i < 4; i++ { uid[i] = a.uid[i] ^ a.lastClientHash[8+i] } base64UserKey = base64.StdEncoding.EncodeToString(a.userKey) aesCipherKey := core.Kdf(base64UserKey+a.salt, 16) block, err := aes.NewCipher(aesCipherKey) if err != nil { return } encryptData := make([]byte, 16) iv := make([]byte, aes.BlockSize) cbc := cipher.NewCBCEncrypter(block, iv) cbc.CryptBlocks(encryptData, encrypt[:16]) copy(encrypt[:4], uid[:]) copy(encrypt[4:4+16], encryptData) } // final HMAC { a.lastServerHash = a.hmac(a.userKey, encrypt[:20]) copy(outData[12:], encrypt) copy(outData[12+20:], a.lastServerHash[:4]) } // init cipher cipherKey := a.calcRC4CipherKey(a.lastClientHash, base64UserKey) a.enc, _ = rc4.NewCipher(cipherKey) a.dec, _ = rc4.NewCipher(cipherKey) // data chunkLength, randLength := a.packedDataLen(data) if chunkLength+authHeadLength <= cap(outData) { outData = outData[:authHeadLength+chunkLength] } else { newOutData := make([]byte, authHeadLength+chunkLength) copy(newOutData, outData[:authHeadLength]) outData = newOutData } a.packData(outData[authHeadLength:], data, randLength) return </s> add poolBuf.Write(data) </s> remove hash := a.hmac(a.Key, b[bSize-8:bSize-1]) cipherKey := a.getRC4CipherKey(hash) dec, _ := rc4.NewCipher(cipherKey) randLength := udpGetRandLen(&a.randomServer, hash) bSize -= 8 + randLength dec.XORKeyStream(b, b[:bSize]) return b, bSize, nil </s> add md5Data := tools.HmacMD5(a.Key, b[len(b)-8:len(b)-1]) randDataLength := udpGetRandLength(md5Data, &a.randomServer) key := core.Kdf(base64.StdEncoding.EncodeToString(a.userKey)+base64.StdEncoding.EncodeToString(md5Data), 16) rc4Cipher, err := rc4.NewCipher(key) if err != nil { return nil, err } wantedData := b[:len(b)-8-randDataLength] rc4Cipher.XORKeyStream(wantedData, wantedData) return wantedData, nil </s> remove h := a.hmac(a.userKey, b[:bSize-1]) if h[0] != b[bSize-1] { return nil, 0, errAuthChainHMACError </s> add if !bytes.Equal(tools.HmacMD5(a.userKey, b[:len(b)-1])[:1], b[len(b)-1:]) { return nil, errAuthChainChksumError
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_a.go
md5Data := tools.HmacMD5(a.Key, authData)
<mask> for i := 0; i < 4; i++ { <mask> uid[i] = a.uid[i] ^ hash[i] <mask> } <mask> <mask> cipherKey := a.getRC4CipherKey(hash) <mask> enc, _ := rc4.NewCipher(cipherKey) <mask> var buf bytes.Buffer <mask> enc.XORKeyStream(b, b) <mask> buf.Write(b) <mask> <mask> randLength := udpGetRandLen(&a.randomClient, hash) <mask> randBytes := pool.Get(randLength) <mask> defer pool.Put(randBytes) <mask> buf.Write(randBytes) <mask> <mask> buf.Write(authData) <mask> buf.Write(uid) <mask> <mask> h := a.hmac(a.userKey, buf.Bytes()) <mask> buf.Write(h[:1]) <mask> return buf.Bytes(), nil <mask> } </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove hash := a.hmac(a.Key, authData) uid := pool.Get(4) defer pool.Put(uid) for i := 0; i < 4; i++ { uid[i] = a.uid[i] ^ hash[i] } </s> add </s> remove var base64UserKey string // uid & 16 bytes auth data { a.initUserKeyAndID() uid := make([]byte, 4) for i := 0; i < 4; i++ { uid[i] = a.uid[i] ^ a.lastClientHash[8+i] } base64UserKey = base64.StdEncoding.EncodeToString(a.userKey) aesCipherKey := core.Kdf(base64UserKey+a.salt, 16) block, err := aes.NewCipher(aesCipherKey) if err != nil { return } encryptData := make([]byte, 16) iv := make([]byte, aes.BlockSize) cbc := cipher.NewCBCEncrypter(block, iv) cbc.CryptBlocks(encryptData, encrypt[:16]) copy(encrypt[:4], uid[:]) copy(encrypt[4:4+16], encryptData) } // final HMAC { a.lastServerHash = a.hmac(a.userKey, encrypt[:20]) copy(outData[12:], encrypt) copy(outData[12+20:], a.lastServerHash[:4]) } // init cipher cipherKey := a.calcRC4CipherKey(a.lastClientHash, base64UserKey) a.enc, _ = rc4.NewCipher(cipherKey) a.dec, _ = rc4.NewCipher(cipherKey) // data chunkLength, randLength := a.packedDataLen(data) if chunkLength+authHeadLength <= cap(outData) { outData = outData[:authHeadLength+chunkLength] } else { newOutData := make([]byte, authHeadLength+chunkLength) copy(newOutData, outData[:authHeadLength]) outData = newOutData } a.packData(outData[authHeadLength:], data, randLength) return </s> add poolBuf.Write(data) </s> remove h := a.hmac(a.userKey, buf.Bytes()) buf.Write(h[:1]) return buf.Bytes(), nil } </s> add randDataLength := udpGetRandLength(md5Data, &a.randomClient) </s> remove h := a.hmac(a.userKey, b[:bSize-1]) if h[0] != b[bSize-1] { return nil, 0, errAuthChainHMACError </s> add if !bytes.Equal(tools.HmacMD5(a.userKey, b[:len(b)-1])[:1], b[len(b)-1:]) { return nil, errAuthChainChksumError </s> remove hash := a.hmac(a.Key, b[bSize-8:bSize-1]) cipherKey := a.getRC4CipherKey(hash) dec, _ := rc4.NewCipher(cipherKey) randLength := udpGetRandLen(&a.randomServer, hash) bSize -= 8 + randLength dec.XORKeyStream(b, b[:bSize]) return b, bSize, nil </s> add md5Data := tools.HmacMD5(a.Key, b[len(b)-8:len(b)-1]) randDataLength := udpGetRandLength(md5Data, &a.randomServer) key := core.Kdf(base64.StdEncoding.EncodeToString(a.userKey)+base64.StdEncoding.EncodeToString(md5Data), 16) rc4Cipher, err := rc4.NewCipher(key) if err != nil { return nil, err } wantedData := b[:len(b)-8-randDataLength] rc4Cipher.XORKeyStream(wantedData, wantedData) return wantedData, nil
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_a.go
randDataLength := udpGetRandLength(md5Data, &a.randomClient)
<mask> <mask> buf.Write(authData) <mask> buf.Write(uid) <mask> <mask> h := a.hmac(a.userKey, buf.Bytes()) <mask> buf.Write(h[:1]) <mask> return buf.Bytes(), nil <mask> } <mask> <mask> func (a *authChain) getRC4CipherKey(hash []byte) []byte { <mask> base64UserKey := base64.StdEncoding.EncodeToString(a.userKey) <mask> return a.calcRC4CipherKey(hash, base64UserKey) <mask> } </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove func (a *authChain) getRC4CipherKey(hash []byte) []byte { base64UserKey := base64.StdEncoding.EncodeToString(a.userKey) return a.calcRC4CipherKey(hash, base64UserKey) } </s> add key := core.Kdf(base64.StdEncoding.EncodeToString(a.userKey)+base64.StdEncoding.EncodeToString(md5Data), 16) rc4Cipher, err := rc4.NewCipher(key) if err != nil { return err } rc4Cipher.XORKeyStream(b, b) </s> remove func (a *authChain) calcRC4CipherKey(hash []byte, base64UserKey string) []byte { password := pool.Get(len(base64UserKey) + base64.StdEncoding.EncodedLen(16)) defer pool.Put(password) copy(password, base64UserKey) base64.StdEncoding.Encode(password[len(base64UserKey):], hash[:16]) return core.Kdf(string(password), 16) </s> add buf.Write(b) tools.AppendRandBytes(buf, randDataLength) buf.Write(authData) binary.Write(buf, binary.LittleEndian, binary.LittleEndian.Uint32(a.userID[:])^binary.LittleEndian.Uint32(md5Data[:4])) buf.Write(tools.HmacMD5(a.userKey, buf.Bytes())[:1]) return nil </s> remove cipherKey := a.getRC4CipherKey(hash) enc, _ := rc4.NewCipher(cipherKey) var buf bytes.Buffer enc.XORKeyStream(b, b) buf.Write(b) randLength := udpGetRandLen(&a.randomClient, hash) randBytes := pool.Get(randLength) defer pool.Put(randBytes) buf.Write(randBytes) buf.Write(authData) buf.Write(uid) </s> add md5Data := tools.HmacMD5(a.Key, authData) </s> remove func (a *authChain) DecodePacket(b []byte) ([]byte, int, error) { bSize := len(b) if bSize < 9 { return nil, 0, errAuthChainDataLengthError </s> add func (a *authChainA) DecodePacket(b []byte) ([]byte, error) { if len(b) < 9 { return nil, errAuthChainLengthError </s> remove var base64UserKey string // uid & 16 bytes auth data { a.initUserKeyAndID() uid := make([]byte, 4) for i := 0; i < 4; i++ { uid[i] = a.uid[i] ^ a.lastClientHash[8+i] } base64UserKey = base64.StdEncoding.EncodeToString(a.userKey) aesCipherKey := core.Kdf(base64UserKey+a.salt, 16) block, err := aes.NewCipher(aesCipherKey) if err != nil { return } encryptData := make([]byte, 16) iv := make([]byte, aes.BlockSize) cbc := cipher.NewCBCEncrypter(block, iv) cbc.CryptBlocks(encryptData, encrypt[:16]) copy(encrypt[:4], uid[:]) copy(encrypt[4:4+16], encryptData) } // final HMAC { a.lastServerHash = a.hmac(a.userKey, encrypt[:20]) copy(outData[12:], encrypt) copy(outData[12+20:], a.lastServerHash[:4]) } // init cipher cipherKey := a.calcRC4CipherKey(a.lastClientHash, base64UserKey) a.enc, _ = rc4.NewCipher(cipherKey) a.dec, _ = rc4.NewCipher(cipherKey) // data chunkLength, randLength := a.packedDataLen(data) if chunkLength+authHeadLength <= cap(outData) { outData = outData[:authHeadLength+chunkLength] } else { newOutData := make([]byte, authHeadLength+chunkLength) copy(newOutData, outData[:authHeadLength]) outData = newOutData } a.packData(outData[authHeadLength:], data, randLength) return </s> add poolBuf.Write(data)
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_a.go
key := core.Kdf(base64.StdEncoding.EncodeToString(a.userKey)+base64.StdEncoding.EncodeToString(md5Data), 16) rc4Cipher, err := rc4.NewCipher(key) if err != nil { return err } rc4Cipher.XORKeyStream(b, b)
<mask> buf.Write(h[:1]) <mask> return buf.Bytes(), nil <mask> } <mask> <mask> func (a *authChain) getRC4CipherKey(hash []byte) []byte { <mask> base64UserKey := base64.StdEncoding.EncodeToString(a.userKey) <mask> return a.calcRC4CipherKey(hash, base64UserKey) <mask> } <mask> <mask> func (a *authChain) calcRC4CipherKey(hash []byte, base64UserKey string) []byte { <mask> password := pool.Get(len(base64UserKey) + base64.StdEncoding.EncodedLen(16)) <mask> defer pool.Put(password) <mask> copy(password, base64UserKey) </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove func (a *authChain) calcRC4CipherKey(hash []byte, base64UserKey string) []byte { password := pool.Get(len(base64UserKey) + base64.StdEncoding.EncodedLen(16)) defer pool.Put(password) copy(password, base64UserKey) base64.StdEncoding.Encode(password[len(base64UserKey):], hash[:16]) return core.Kdf(string(password), 16) </s> add buf.Write(b) tools.AppendRandBytes(buf, randDataLength) buf.Write(authData) binary.Write(buf, binary.LittleEndian, binary.LittleEndian.Uint32(a.userID[:])^binary.LittleEndian.Uint32(md5Data[:4])) buf.Write(tools.HmacMD5(a.userKey, buf.Bytes())[:1]) return nil </s> remove h := a.hmac(a.userKey, buf.Bytes()) buf.Write(h[:1]) return buf.Bytes(), nil } </s> add randDataLength := udpGetRandLength(md5Data, &a.randomClient) </s> remove func (a *authChain) packedDataLen(data []byte) (chunkLength, randLength int) { dataLength := len(data) randLength = a.getClientRandLen(dataLength, a.Overhead) chunkLength = randLength + dataLength + 2 + 2 return } </s> add length := uint16(len(data)) ^ binary.LittleEndian.Uint16(a.lastClientHash[14:16]) </s> remove var base64UserKey string // uid & 16 bytes auth data { a.initUserKeyAndID() uid := make([]byte, 4) for i := 0; i < 4; i++ { uid[i] = a.uid[i] ^ a.lastClientHash[8+i] } base64UserKey = base64.StdEncoding.EncodeToString(a.userKey) aesCipherKey := core.Kdf(base64UserKey+a.salt, 16) block, err := aes.NewCipher(aesCipherKey) if err != nil { return } encryptData := make([]byte, 16) iv := make([]byte, aes.BlockSize) cbc := cipher.NewCBCEncrypter(block, iv) cbc.CryptBlocks(encryptData, encrypt[:16]) copy(encrypt[:4], uid[:]) copy(encrypt[4:4+16], encryptData) } // final HMAC { a.lastServerHash = a.hmac(a.userKey, encrypt[:20]) copy(outData[12:], encrypt) copy(outData[12+20:], a.lastServerHash[:4]) } // init cipher cipherKey := a.calcRC4CipherKey(a.lastClientHash, base64UserKey) a.enc, _ = rc4.NewCipher(cipherKey) a.dec, _ = rc4.NewCipher(cipherKey) // data chunkLength, randLength := a.packedDataLen(data) if chunkLength+authHeadLength <= cap(outData) { outData = outData[:authHeadLength+chunkLength] } else { newOutData := make([]byte, authHeadLength+chunkLength) copy(newOutData, outData[:authHeadLength]) outData = newOutData } a.packData(outData[authHeadLength:], data, randLength) return </s> add poolBuf.Write(data) </s> remove func (a *authChain) getServerRandLen(dataLength int, overhead int) int { return a.rnd(dataLength, &a.randomServer, a.lastServerHash, a.dataSizeList, a.dataSizeList2, overhead) } </s> add macKey := pool.Get(len(a.userKey) + 4) defer pool.Put(macKey) copy(macKey, a.userKey) binary.LittleEndian.PutUint32(macKey[len(a.userKey):], a.packID) a.packID++
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_a.go
buf.Write(b) tools.AppendRandBytes(buf, randDataLength) buf.Write(authData) binary.Write(buf, binary.LittleEndian, binary.LittleEndian.Uint32(a.userID[:])^binary.LittleEndian.Uint32(md5Data[:4])) buf.Write(tools.HmacMD5(a.userKey, buf.Bytes())[:1]) return nil
<mask> base64UserKey := base64.StdEncoding.EncodeToString(a.userKey) <mask> return a.calcRC4CipherKey(hash, base64UserKey) <mask> } <mask> <mask> func (a *authChain) calcRC4CipherKey(hash []byte, base64UserKey string) []byte { <mask> password := pool.Get(len(base64UserKey) + base64.StdEncoding.EncodedLen(16)) <mask> defer pool.Put(password) <mask> copy(password, base64UserKey) <mask> base64.StdEncoding.Encode(password[len(base64UserKey):], hash[:16]) <mask> return core.Kdf(string(password), 16) <mask> } <mask> <mask> func (a *authChain) initUserKeyAndID() { <mask> if a.userKey == nil { <mask> params := strings.Split(a.Param, ":") </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove func (a *authChain) getRC4CipherKey(hash []byte) []byte { base64UserKey := base64.StdEncoding.EncodeToString(a.userKey) return a.calcRC4CipherKey(hash, base64UserKey) } </s> add key := core.Kdf(base64.StdEncoding.EncodeToString(a.userKey)+base64.StdEncoding.EncodeToString(md5Data), 16) rc4Cipher, err := rc4.NewCipher(key) if err != nil { return err } rc4Cipher.XORKeyStream(b, b) </s> remove h := a.hmac(a.userKey, buf.Bytes()) buf.Write(h[:1]) return buf.Bytes(), nil } </s> add randDataLength := udpGetRandLength(md5Data, &a.randomClient) </s> remove func (a *authChain) initUserKeyAndID() { if a.userKey == nil { params := strings.Split(a.Param, ":") if len(params) >= 2 { if userID, err := strconv.ParseUint(params[0], 10, 32); err == nil { binary.LittleEndian.PutUint32(a.uid[:], uint32(userID)) a.userKey = []byte(params[1]) } } if a.userKey == nil { rand.Read(a.uid[:]) a.userKey = make([]byte, len(a.Key)) copy(a.userKey, a.Key) } </s> add func (a *authChainA) packAuthData(poolBuf *bytes.Buffer, data []byte) { /* dataLength := len(data) 12: checkHead(4) and hmac of checkHead(8) 4: uint32 LittleEndian uid (uid = userID ^ last client hash) 16: encrypted data of authdata(12), uint16 LittleEndian overhead(2) and uint16 LittleEndian number zero(2) 4: last server hash(4) packedAuthDataLength := 12 + 4 + 16 + 4 + dataLength */ macKey := pool.Get(len(a.iv) + len(a.Key)) defer pool.Put(macKey) copy(macKey, a.iv) copy(macKey[len(a.iv):], a.Key) // check head tools.AppendRandBytes(poolBuf, 4) a.lastClientHash = tools.HmacMD5(macKey, poolBuf.Bytes()) a.initRC4Cipher() poolBuf.Write(a.lastClientHash[:8]) // uid binary.Write(poolBuf, binary.LittleEndian, binary.LittleEndian.Uint32(a.userID[:])^binary.LittleEndian.Uint32(a.lastClientHash[8:12])) // encrypted data err := a.putEncryptedData(poolBuf, a.userKey, [2]int{a.Overhead, 0}, a.salt) if err != nil { poolBuf.Reset() return </s> remove func (a *authChain) initForConn(iv []byte) Protocol { r := &authChain{ Base: &Base{ IV: iv, Key: a.Key, TCPMss: a.TCPMss, Overhead: a.Overhead, Param: a.Param, }, recvInfo: &recvInfo{recvID: 1, buffer: new(bytes.Buffer)}, authData: a.authData, salt: a.salt, hmac: a.hmac, hashDigest: a.hashDigest, rnd: a.rnd, </s> add func (a *authChainA) initUserData() { params := strings.Split(a.Param, ":") if len(params) > 1 { if userID, err := strconv.ParseUint(params[0], 10, 32); err == nil { binary.LittleEndian.PutUint32(a.userID[:], uint32(userID)) a.userKey = []byte(params[1]) } else { log.Warnln("Wrong protocol-param for %s, only digits are expected before ':'", a.salt) } </s> remove var base64UserKey string // uid & 16 bytes auth data { a.initUserKeyAndID() uid := make([]byte, 4) for i := 0; i < 4; i++ { uid[i] = a.uid[i] ^ a.lastClientHash[8+i] } base64UserKey = base64.StdEncoding.EncodeToString(a.userKey) aesCipherKey := core.Kdf(base64UserKey+a.salt, 16) block, err := aes.NewCipher(aesCipherKey) if err != nil { return } encryptData := make([]byte, 16) iv := make([]byte, aes.BlockSize) cbc := cipher.NewCBCEncrypter(block, iv) cbc.CryptBlocks(encryptData, encrypt[:16]) copy(encrypt[:4], uid[:]) copy(encrypt[4:4+16], encryptData) } // final HMAC { a.lastServerHash = a.hmac(a.userKey, encrypt[:20]) copy(outData[12:], encrypt) copy(outData[12+20:], a.lastServerHash[:4]) } // init cipher cipherKey := a.calcRC4CipherKey(a.lastClientHash, base64UserKey) a.enc, _ = rc4.NewCipher(cipherKey) a.dec, _ = rc4.NewCipher(cipherKey) // data chunkLength, randLength := a.packedDataLen(data) if chunkLength+authHeadLength <= cap(outData) { outData = outData[:authHeadLength+chunkLength] } else { newOutData := make([]byte, authHeadLength+chunkLength) copy(newOutData, outData[:authHeadLength]) outData = newOutData } a.packData(outData[authHeadLength:], data, randLength) return </s> add poolBuf.Write(data)
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_a.go
func (a *authChainA) packAuthData(poolBuf *bytes.Buffer, data []byte) { /* dataLength := len(data) 12: checkHead(4) and hmac of checkHead(8) 4: uint32 LittleEndian uid (uid = userID ^ last client hash) 16: encrypted data of authdata(12), uint16 LittleEndian overhead(2) and uint16 LittleEndian number zero(2) 4: last server hash(4) packedAuthDataLength := 12 + 4 + 16 + 4 + dataLength */ macKey := pool.Get(len(a.iv) + len(a.Key)) defer pool.Put(macKey) copy(macKey, a.iv) copy(macKey[len(a.iv):], a.Key) // check head tools.AppendRandBytes(poolBuf, 4) a.lastClientHash = tools.HmacMD5(macKey, poolBuf.Bytes()) a.initRC4Cipher() poolBuf.Write(a.lastClientHash[:8]) // uid binary.Write(poolBuf, binary.LittleEndian, binary.LittleEndian.Uint32(a.userID[:])^binary.LittleEndian.Uint32(a.lastClientHash[8:12])) // encrypted data err := a.putEncryptedData(poolBuf, a.userKey, [2]int{a.Overhead, 0}, a.salt) if err != nil { poolBuf.Reset() return
<mask> base64.StdEncoding.Encode(password[len(base64UserKey):], hash[:16]) <mask> return core.Kdf(string(password), 16) <mask> } <mask> <mask> func (a *authChain) initUserKeyAndID() { <mask> if a.userKey == nil { <mask> params := strings.Split(a.Param, ":") <mask> if len(params) >= 2 { <mask> if userID, err := strconv.ParseUint(params[0], 10, 32); err == nil { <mask> binary.LittleEndian.PutUint32(a.uid[:], uint32(userID)) <mask> a.userKey = []byte(params[1]) <mask> } <mask> } <mask> <mask> if a.userKey == nil { <mask> rand.Read(a.uid[:]) <mask> a.userKey = make([]byte, len(a.Key)) <mask> copy(a.userKey, a.Key) <mask> } <mask> } <mask> } <mask> <mask> func (a *authChain) getClientRandLen(dataLength int, overhead int) int { <mask> return a.rnd(dataLength, &a.randomClient, a.lastClientHash, a.dataSizeList, a.dataSizeList2, overhead) </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove func (a *authChain) calcRC4CipherKey(hash []byte, base64UserKey string) []byte { password := pool.Get(len(base64UserKey) + base64.StdEncoding.EncodedLen(16)) defer pool.Put(password) copy(password, base64UserKey) base64.StdEncoding.Encode(password[len(base64UserKey):], hash[:16]) return core.Kdf(string(password), 16) </s> add buf.Write(b) tools.AppendRandBytes(buf, randDataLength) buf.Write(authData) binary.Write(buf, binary.LittleEndian, binary.LittleEndian.Uint32(a.userID[:])^binary.LittleEndian.Uint32(md5Data[:4])) buf.Write(tools.HmacMD5(a.userKey, buf.Bytes())[:1]) return nil </s> remove func (a *authChain) initForConn(iv []byte) Protocol { r := &authChain{ Base: &Base{ IV: iv, Key: a.Key, TCPMss: a.TCPMss, Overhead: a.Overhead, Param: a.Param, }, recvInfo: &recvInfo{recvID: 1, buffer: new(bytes.Buffer)}, authData: a.authData, salt: a.salt, hmac: a.hmac, hashDigest: a.hashDigest, rnd: a.rnd, </s> add func (a *authChainA) initUserData() { params := strings.Split(a.Param, ":") if len(params) > 1 { if userID, err := strconv.ParseUint(params[0], 10, 32); err == nil { binary.LittleEndian.PutUint32(a.userID[:], uint32(userID)) a.userKey = []byte(params[1]) } else { log.Warnln("Wrong protocol-param for %s, only digits are expected before ':'", a.salt) } </s> remove func (a *authChain) getClientRandLen(dataLength int, overhead int) int { return a.rnd(dataLength, &a.randomClient, a.lastClientHash, a.dataSizeList, a.dataSizeList2, overhead) } </s> add func (a *authChainA) packData(poolBuf *bytes.Buffer, data []byte) { a.encrypter.XORKeyStream(data, data) </s> remove func (a *authChain) getServerRandLen(dataLength int, overhead int) int { return a.rnd(dataLength, &a.randomServer, a.lastServerHash, a.dataSizeList, a.dataSizeList2, overhead) } </s> add macKey := pool.Get(len(a.userKey) + 4) defer pool.Put(macKey) copy(macKey, a.userKey) binary.LittleEndian.PutUint32(macKey[len(a.userKey):], a.packID) a.packID++ </s> remove return &authAES128{ Base: b, authData: &authData{}, salt: "auth_aes128_md5", hmac: tools.HmacMD5, hashDigest: tools.MD5Sum, } } func (a *authAES128) initForConn(iv []byte) Protocol { return &authAES128{ Base: &Base{ IV: iv, Key: a.Key, TCPMss: a.TCPMss, Overhead: a.Overhead, Param: a.Param, }, recvInfo: &recvInfo{recvID: 1, buffer: new(bytes.Buffer)}, authData: a.authData, packID: 1, salt: a.salt, hmac: a.hmac, hashDigest: a.hashDigest, } } func (a *authAES128) GetProtocolOverhead() int { return 9 } func (a *authAES128) SetOverhead(overhead int) { a.Overhead = overhead } func (a *authAES128) Decode(b []byte) ([]byte, int, error) { a.buffer.Reset() bSize := len(b) readSize := 0 key := pool.Get(len(a.userKey) + 4) defer pool.Put(key) copy(key, a.userKey) for bSize > 4 { binary.LittleEndian.PutUint32(key[len(key)-4:], a.recvID) h := a.hmac(key, b[:2]) if !bytes.Equal(h[:2], b[2:4]) { return nil, 0, errAuthAES128IncorrectMAC } length := int(binary.LittleEndian.Uint16(b[:2])) if length >= 8192 || length < 8 { return nil, 0, errAuthAES128DataLengthError } if length > bSize { break } h = a.hmac(key, b[:length-4]) if !bytes.Equal(h[:4], b[length-4:length]) { return nil, 0, errAuthAES128IncorrectChecksum } a.recvID++ pos := int(b[4]) if pos < 255 { pos += 4 } else { pos = int(binary.LittleEndian.Uint16(b[5:7])) + 4 } if pos > length-4 { return nil, 0, errAuthAES128PositionTooLarge } a.buffer.Write(b[pos : length-4]) b = b[length:] bSize -= length readSize += length } return a.buffer.Bytes(), readSize, nil } func (a *authAES128) Encode(b []byte) ([]byte, error) { a.buffer.Reset() bSize := len(b) offset := 0 if bSize > 0 && !a.hasSentHeader { authSize := bSize if authSize > 1200 { authSize = 1200 } a.hasSentHeader = true a.buffer.Write(a.packAuthData(b[:authSize])) bSize -= authSize offset += authSize } const blockSize = 4096 for bSize > blockSize { packSize, randSize := a.packedDataSize(b[offset : offset+blockSize]) pack := pool.Get(packSize) a.packData(b[offset:offset+blockSize], pack, randSize) a.buffer.Write(pack) pool.Put(pack) bSize -= blockSize offset += blockSize } if bSize > 0 { packSize, randSize := a.packedDataSize(b[offset:]) pack := pool.Get(packSize) a.packData(b[offset:], pack, randSize) a.buffer.Write(pack) pool.Put(pack) } return a.buffer.Bytes(), nil } func (a *authAES128) DecodePacket(b []byte) ([]byte, int, error) { bSize := len(b) h := a.hmac(a.Key, b[:bSize-4]) if !bytes.Equal(h[:4], b[bSize-4:]) { return nil, 0, errAuthAES128IncorrectMAC } return b[:bSize-4], bSize - 4, nil } func (a *authAES128) EncodePacket(b []byte) ([]byte, error) { a.initUserKeyAndID() var buf bytes.Buffer buf.Write(b) buf.Write(a.uid[:]) h := a.hmac(a.userKey, buf.Bytes()) buf.Write(h[:4]) return buf.Bytes(), nil } func (a *authAES128) initUserKeyAndID() { if a.userKey == nil { params := strings.Split(a.Param, ":") if len(params) >= 2 { if userID, err := strconv.ParseUint(params[0], 10, 32); err == nil { binary.LittleEndian.PutUint32(a.uid[:], uint32(userID)) a.userKey = a.hashDigest([]byte(params[1])) } } if a.userKey == nil { rand.Read(a.uid[:]) a.userKey = make([]byte, len(a.Key)) copy(a.userKey, a.Key) } } } func (a *authAES128) packedDataSize(data []byte) (packSize, randSize int) { dataSize := len(data) randSize = 1 if dataSize <= 1200 { if a.packID > 4 { randSize += rand.Intn(32) } else { if dataSize > 900 { randSize += rand.Intn(128) } else { randSize += rand.Intn(512) } } } packSize = randSize + dataSize + 8 return } func (a *authAES128) packData(data, ret []byte, randSize int) { dataSize := len(data) retSize := len(ret) // 0~1, ret_size binary.LittleEndian.PutUint16(ret[0:], uint16(retSize&0xFFFF)) // 2~3, hmac key := pool.Get(len(a.userKey) + 4) defer pool.Put(key) copy(key, a.userKey) binary.LittleEndian.PutUint32(key[len(key)-4:], a.packID) h := a.hmac(key, ret[:2]) copy(ret[2:4], h[:2]) // 4~rand_size+4, rand number rand.Read(ret[4 : 4+randSize]) // 4, rand_size if randSize < 128 { ret[4] = byte(randSize & 0xFF) } else { // 4, magic number 0xFF ret[4] = 0xFF // 5~6, rand_size binary.LittleEndian.PutUint16(ret[5:], uint16(randSize&0xFFFF)) } // rand_size+4~ret_size-4, data if dataSize > 0 { copy(ret[randSize+4:], data) } a.packID++ h = a.hmac(key, ret[:retSize-4]) copy(ret[retSize-4:], h[:4]) } func (a *authAES128) packAuthData(data []byte) (ret []byte) { dataSize := len(data) var randSize int if dataSize > 400 { randSize = rand.Intn(512) } else { randSize = rand.Intn(1024) } dataOffset := randSize + 16 + 4 + 4 + 7 retSize := dataOffset + dataSize + 4 ret = make([]byte, retSize) encrypt := make([]byte, 24) key := make([]byte, len(a.IV)+len(a.Key)) copy(key, a.IV) copy(key[len(a.IV):], a.Key) rand.Read(ret[dataOffset-randSize:]) a.mutex.Lock() defer a.mutex.Unlock() a.connectionID++ if a.connectionID > 0xFF000000 { a.clientID = nil } if len(a.clientID) == 0 { a.clientID = make([]byte, 8) rand.Read(a.clientID) b := make([]byte, 4) rand.Read(b) a.connectionID = binary.LittleEndian.Uint32(b) & 0xFFFFFF } copy(encrypt[4:], a.clientID) binary.LittleEndian.PutUint32(encrypt[8:], a.connectionID) now := time.Now().Unix() binary.LittleEndian.PutUint32(encrypt[:4], uint32(now)) binary.LittleEndian.PutUint16(encrypt[12:], uint16(retSize&0xFFFF)) binary.LittleEndian.PutUint16(encrypt[14:], uint16(randSize&0xFFFF)) a.initUserKeyAndID() aesCipherKey := core.Kdf(base64.StdEncoding.EncodeToString(a.userKey)+a.salt, 16) block, err := aes.NewCipher(aesCipherKey) if err != nil { return nil } encryptData := make([]byte, 16) iv := make([]byte, aes.BlockSize) cbc := cipher.NewCBCEncrypter(block, iv) cbc.CryptBlocks(encryptData, encrypt[:16]) copy(encrypt[:4], a.uid[:]) copy(encrypt[4:4+16], encryptData) h := a.hmac(key, encrypt[:20]) copy(encrypt[20:], h[:4]) rand.Read(ret[:1]) h = a.hmac(key, ret[:1]) copy(ret[1:], h[:7-1]) copy(ret[7:], encrypt) copy(ret[dataOffset:], data) h = a.hmac(a.userKey, ret[:retSize-4]) copy(ret[retSize-4:], h[:4]) return </s> add a := &authAES128{ Base: b, authData: &authData{}, authAES128Function: &authAES128Function{salt: "auth_aes128_md5", hmac: tools.HmacMD5, hashDigest: tools.MD5Sum}, userData: &userData{}, } a.initUserData() return a
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_a.go
// last server hash a.lastServerHash = tools.HmacMD5(a.userKey, poolBuf.Bytes()[12:]) poolBuf.Write(a.lastServerHash[:4]) // packed data a.packData(poolBuf, data)
<mask> return <mask> } <mask> } <mask> <mask> func (a *authChainA) packData(poolBuf *bytes.Buffer, data []byte) { <mask> a.encrypter.XORKeyStream(data, data) </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove func (a *authChain) getClientRandLen(dataLength int, overhead int) int { return a.rnd(dataLength, &a.randomClient, a.lastClientHash, a.dataSizeList, a.dataSizeList2, overhead) } </s> add func (a *authChainA) packData(poolBuf *bytes.Buffer, data []byte) { a.encrypter.XORKeyStream(data, data) </s> remove func (a *authSHA1V4) packData(data, ret []byte, randSize int) { dataSize := len(data) retSize := len(ret) // 0~1, ret size binary.BigEndian.PutUint16(ret[:2], uint16(retSize&0xFFFF)) // 2~3, crc of ret size crc := crc32.ChecksumIEEE(ret[:2]) & 0xFFFF binary.LittleEndian.PutUint16(ret[2:4], uint16(crc)) // 4, rand size if randSize < 128 { ret[4] = uint8(randSize & 0xFF) } else { ret[4] = uint8(0xFF) binary.BigEndian.PutUint16(ret[5:7], uint16(randSize&0xFFFF)) } // (rand size+4)~(ret size-4), data if dataSize > 0 { copy(ret[randSize+4:], data) </s> add func (a *authSHA1V4) packData(poolBuf *bytes.Buffer, data []byte) { dataLength := len(data) randDataLength := a.getRandDataLength(dataLength) /* 2: uint16 BigEndian packedDataLength 2: uint16 LittleEndian crc32Data & 0xffff 3: maxRandDataLengthPrefix (min:1) 4: adler32Data */ packedDataLength := 2 + 2 + 3 + randDataLength + dataLength + 4 if randDataLength < 128 { packedDataLength -= 2 </s> remove func (a *authChain) EncodePacket(b []byte) ([]byte, error) { a.initUserKeyAndID() </s> add func (a *authChainA) EncodePacket(buf *bytes.Buffer, b []byte) error { </s> remove const authHeadLength = 4 + 8 + 4 + 16 + 4 func (a *authChain) packAuthData(data []byte) (outData []byte) { outData = make([]byte, authHeadLength, authHeadLength+1500) a.mutex.Lock() defer a.mutex.Unlock() a.connectionID++ if a.connectionID > 0xFF000000 { a.clientID = nil } if len(a.clientID) == 0 { a.clientID = make([]byte, 4) rand.Read(a.clientID) b := make([]byte, 4) rand.Read(b) a.connectionID = binary.LittleEndian.Uint32(b) & 0xFFFFFF </s> add func (a *authChainA) putMixedRandDataAndData(poolBuf *bytes.Buffer, data []byte) { randDataLength := a.randDataLength(len(data), a.lastClientHash, &a.randomClient) if len(data) == 0 { tools.AppendRandBytes(poolBuf, randDataLength) return </s> remove return &authAES128{ Base: b, recvInfo: &recvInfo{buffer: new(bytes.Buffer)}, authData: &authData{}, salt: "auth_aes128_sha1", hmac: tools.HmacSHA1, hashDigest: tools.SHA1Sum, </s> add a := &authAES128{ Base: b, authData: &authData{}, authAES128Function: &authAES128Function{salt: "auth_aes128_sha1", hmac: tools.HmacSHA1, hashDigest: tools.SHA1Sum}, userData: &userData{}, } a.initUserData() return a } func (a *authAES128) initUserData() { params := strings.Split(a.Param, ":") if len(params) > 1 { if userID, err := strconv.ParseUint(params[0], 10, 32); err == nil { binary.LittleEndian.PutUint32(a.userID[:], uint32(userID)) a.userKey = a.hashDigest([]byte(params[1])) } else { log.Warnln("Wrong protocol-param for %s, only digits are expected before ':'", a.salt) } } if len(a.userKey) == 0 { a.userKey = a.Key rand.Read(a.userID[:]) } } func (a *authAES128) StreamConn(c net.Conn, iv []byte) net.Conn { p := &authAES128{ Base: a.Base, authData: a.next(), authAES128Function: a.authAES128Function, userData: a.userData, packID: 1, recvID: 1, } p.iv = iv return &Conn{Conn: c, Protocol: p} } func (a *authAES128) PacketConn(c net.PacketConn) net.PacketConn { p := &authAES128{ Base: a.Base, authAES128Function: a.authAES128Function, userData: a.userData, } return &PacketConn{PacketConn: c, Protocol: p} } func (a *authAES128) Decode(dst, src *bytes.Buffer) error { if a.rawTrans { dst.ReadFrom(src) return nil } for src.Len() > 4 { macKey := pool.Get(len(a.userKey) + 4) defer pool.Put(macKey) copy(macKey, a.userKey) binary.LittleEndian.PutUint32(macKey[len(a.userKey):], a.recvID) if !bytes.Equal(a.hmac(macKey, src.Bytes()[:2])[:2], src.Bytes()[2:4]) { src.Reset() return errAuthAES128MACError } length := int(binary.LittleEndian.Uint16(src.Bytes()[:2])) if length >= 8192 || length < 7 { a.rawTrans = true src.Reset() return errAuthAES128LengthError } if length > src.Len() { break } if !bytes.Equal(a.hmac(macKey, src.Bytes()[:length-4])[:4], src.Bytes()[length-4:length]) { a.rawTrans = true src.Reset() return errAuthAES128ChksumError } a.recvID++ pos := int(src.Bytes()[4]) if pos < 255 { pos += 4 } else { pos = int(binary.LittleEndian.Uint16(src.Bytes()[5:7])) + 4 } dst.Write(src.Bytes()[pos : length-4]) src.Next(length) } return nil } func (a *authAES128) Encode(buf *bytes.Buffer, b []byte) error { fullDataLength := len(b) if !a.hasSentHeader { dataLength := getDataLength(b) a.packAuthData(buf, b[:dataLength]) b = b[dataLength:] a.hasSentHeader = true } for len(b) > 8100 { a.packData(buf, b[:8100], fullDataLength) b = b[8100:] } if len(b) > 0 { a.packData(buf, b, fullDataLength) } return nil } func (a *authAES128) DecodePacket(b []byte) ([]byte, error) { if !bytes.Equal(a.hmac(a.Key, b[:len(b)-4])[:4], b[len(b)-4:]) { return nil, errAuthAES128ChksumError } return b[:len(b)-4], nil } func (a *authAES128) EncodePacket(buf *bytes.Buffer, b []byte) error { buf.Write(b) buf.Write(a.userID[:]) buf.Write(a.hmac(a.userKey, buf.Bytes())[:4]) return nil } func (a *authAES128) packData(poolBuf *bytes.Buffer, data []byte, fullDataLength int) { dataLength := len(data) randDataLength := a.getRandDataLengthForPackData(dataLength, fullDataLength) /* 2: uint16 LittleEndian packedDataLength 2: hmac of packedDataLength 3: maxRandDataLengthPrefix (min:1) 4: hmac of packedData except the last 4 bytes */ packedDataLength := 2 + 2 + 3 + randDataLength + dataLength + 4 if randDataLength < 128 { packedDataLength -= 2 } macKey := pool.Get(len(a.userKey) + 4) defer pool.Put(macKey) copy(macKey, a.userKey) binary.LittleEndian.PutUint32(macKey[len(a.userKey):], a.packID) a.packID++ binary.Write(poolBuf, binary.LittleEndian, uint16(packedDataLength)) poolBuf.Write(a.hmac(macKey, poolBuf.Bytes()[poolBuf.Len()-2:])[:2]) a.packRandData(poolBuf, randDataLength) poolBuf.Write(data) poolBuf.Write(a.hmac(macKey, poolBuf.Bytes()[poolBuf.Len()-packedDataLength+4:])[:4]) } func trapezoidRandom(max int, d float64) int { base := rand.Float64() if d-0 > 1e-6 { a := 1 - d base = (math.Sqrt(a*a+4*d*base) - a) / (2 * d) } return int(base * float64(max)) } func (a *authAES128) getRandDataLengthForPackData(dataLength, fullDataLength int) int { if fullDataLength >= 32*1024-a.Overhead { return 0 } // 1460: tcp_mss revLength := 1460 - dataLength - 9 if revLength == 0 { return 0 } if revLength < 0 { if revLength > -1460 { return trapezoidRandom(revLength+1460, -0.3) } return rand.Intn(32) } if dataLength > 900 { return rand.Intn(revLength) } return trapezoidRandom(revLength, -0.3) } func (a *authAES128) packAuthData(poolBuf *bytes.Buffer, data []byte) { if len(data) == 0 { return } dataLength := len(data) randDataLength := a.getRandDataLengthForPackAuthData(dataLength) /* 7: checkHead(1) and hmac of checkHead(6) 4: userID 16: encrypted data of authdata(12), uint16 BigEndian packedDataLength(2) and uint16 BigEndian randDataLength(2) 4: hmac of userID and encrypted data 4: hmac of packedAuthData except the last 4 bytes */ packedAuthDataLength := 7 + 4 + 16 + 4 + randDataLength + dataLength + 4 macKey := pool.Get(len(a.iv) + len(a.Key)) defer pool.Put(macKey) copy(macKey, a.iv) copy(macKey[len(a.iv):], a.Key) poolBuf.WriteByte(byte(rand.Intn(256))) poolBuf.Write(a.hmac(macKey, poolBuf.Bytes())[:6]) poolBuf.Write(a.userID[:]) err := a.authData.putEncryptedData(poolBuf, a.userKey, [2]int{packedAuthDataLength, randDataLength}, a.salt) if err != nil { poolBuf.Reset() return } poolBuf.Write(a.hmac(macKey, poolBuf.Bytes()[7:])[:4]) tools.AppendRandBytes(poolBuf, randDataLength) poolBuf.Write(data) poolBuf.Write(a.hmac(a.userKey, poolBuf.Bytes())[:4]) } func (a *authAES128) getRandDataLengthForPackAuthData(size int) int { if size > 400 { return rand.Intn(512) } return rand.Intn(1024) } func (a *authAES128) packRandData(poolBuf *bytes.Buffer, size int) { if size < 128 { poolBuf.WriteByte(byte(size + 1)) tools.AppendRandBytes(poolBuf, size) return
[ "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_a.go
func (a *authChainA) packData(poolBuf *bytes.Buffer, data []byte) { a.encrypter.XORKeyStream(data, data)
<mask> } <mask> } <mask> } <mask> <mask> func (a *authChain) getClientRandLen(dataLength int, overhead int) int { <mask> return a.rnd(dataLength, &a.randomClient, a.lastClientHash, a.dataSizeList, a.dataSizeList2, overhead) <mask> } <mask> <mask> func (a *authChain) getServerRandLen(dataLength int, overhead int) int { <mask> return a.rnd(dataLength, &a.randomServer, a.lastServerHash, a.dataSizeList, a.dataSizeList2, overhead) <mask> } <mask> </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove func (a *authChain) getServerRandLen(dataLength int, overhead int) int { return a.rnd(dataLength, &a.randomServer, a.lastServerHash, a.dataSizeList, a.dataSizeList2, overhead) } </s> add macKey := pool.Get(len(a.userKey) + 4) defer pool.Put(macKey) copy(macKey, a.userKey) binary.LittleEndian.PutUint32(macKey[len(a.userKey):], a.packID) a.packID++ </s> remove func (a *authChain) packedDataLen(data []byte) (chunkLength, randLength int) { dataLength := len(data) randLength = a.getClientRandLen(dataLength, a.Overhead) chunkLength = randLength + dataLength + 2 + 2 return } </s> add length := uint16(len(data)) ^ binary.LittleEndian.Uint16(a.lastClientHash[14:16]) </s> remove func (a *authChain) initUserKeyAndID() { if a.userKey == nil { params := strings.Split(a.Param, ":") if len(params) >= 2 { if userID, err := strconv.ParseUint(params[0], 10, 32); err == nil { binary.LittleEndian.PutUint32(a.uid[:], uint32(userID)) a.userKey = []byte(params[1]) } } if a.userKey == nil { rand.Read(a.uid[:]) a.userKey = make([]byte, len(a.Key)) copy(a.userKey, a.Key) } </s> add func (a *authChainA) packAuthData(poolBuf *bytes.Buffer, data []byte) { /* dataLength := len(data) 12: checkHead(4) and hmac of checkHead(8) 4: uint32 LittleEndian uid (uid = userID ^ last client hash) 16: encrypted data of authdata(12), uint16 LittleEndian overhead(2) and uint16 LittleEndian number zero(2) 4: last server hash(4) packedAuthDataLength := 12 + 4 + 16 + 4 + dataLength */ macKey := pool.Get(len(a.iv) + len(a.Key)) defer pool.Put(macKey) copy(macKey, a.iv) copy(macKey[len(a.iv):], a.Key) // check head tools.AppendRandBytes(poolBuf, 4) a.lastClientHash = tools.HmacMD5(macKey, poolBuf.Bytes()) a.initRC4Cipher() poolBuf.Write(a.lastClientHash[:8]) // uid binary.Write(poolBuf, binary.LittleEndian, binary.LittleEndian.Uint32(a.userID[:])^binary.LittleEndian.Uint32(a.lastClientHash[8:12])) // encrypted data err := a.putEncryptedData(poolBuf, a.userKey, [2]int{a.Overhead, 0}, a.salt) if err != nil { poolBuf.Reset() return </s> remove func (a *authChain) SetOverhead(overhead int) { a.Overhead = overhead </s> add func (a *authChainA) PacketConn(c net.PacketConn) net.PacketConn { p := &authChainA{ Base: a.Base, salt: a.salt, userData: a.userData, } return &PacketConn{PacketConn: c, Protocol: p} </s> remove func (a *authChain) GetProtocolOverhead() int { return 4 </s> add func (a *authChainA) StreamConn(c net.Conn, iv []byte) net.Conn { p := &authChainA{ Base: a.Base, authData: a.next(), userData: a.userData, salt: a.salt, packID: 1, recvID: 1, } p.iv = iv p.randDataLength = p.getRandLength return &Conn{Conn: c, Protocol: p}
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_a.go
macKey := pool.Get(len(a.userKey) + 4) defer pool.Put(macKey) copy(macKey, a.userKey) binary.LittleEndian.PutUint32(macKey[len(a.userKey):], a.packID) a.packID++
<mask> func (a *authChain) getClientRandLen(dataLength int, overhead int) int { <mask> return a.rnd(dataLength, &a.randomClient, a.lastClientHash, a.dataSizeList, a.dataSizeList2, overhead) <mask> } <mask> <mask> func (a *authChain) getServerRandLen(dataLength int, overhead int) int { <mask> return a.rnd(dataLength, &a.randomServer, a.lastServerHash, a.dataSizeList, a.dataSizeList2, overhead) <mask> } <mask> <mask> func (a *authChain) packedDataLen(data []byte) (chunkLength, randLength int) { <mask> dataLength := len(data) <mask> randLength = a.getClientRandLen(dataLength, a.Overhead) <mask> chunkLength = randLength + dataLength + 2 + 2 </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove func (a *authChain) packedDataLen(data []byte) (chunkLength, randLength int) { dataLength := len(data) randLength = a.getClientRandLen(dataLength, a.Overhead) chunkLength = randLength + dataLength + 2 + 2 return } </s> add length := uint16(len(data)) ^ binary.LittleEndian.Uint16(a.lastClientHash[14:16]) </s> remove func (a *authChain) getClientRandLen(dataLength int, overhead int) int { return a.rnd(dataLength, &a.randomClient, a.lastClientHash, a.dataSizeList, a.dataSizeList2, overhead) } </s> add func (a *authChainA) packData(poolBuf *bytes.Buffer, data []byte) { a.encrypter.XORKeyStream(data, data) </s> remove func (a *authChain) initUserKeyAndID() { if a.userKey == nil { params := strings.Split(a.Param, ":") if len(params) >= 2 { if userID, err := strconv.ParseUint(params[0], 10, 32); err == nil { binary.LittleEndian.PutUint32(a.uid[:], uint32(userID)) a.userKey = []byte(params[1]) } } if a.userKey == nil { rand.Read(a.uid[:]) a.userKey = make([]byte, len(a.Key)) copy(a.userKey, a.Key) } </s> add func (a *authChainA) packAuthData(poolBuf *bytes.Buffer, data []byte) { /* dataLength := len(data) 12: checkHead(4) and hmac of checkHead(8) 4: uint32 LittleEndian uid (uid = userID ^ last client hash) 16: encrypted data of authdata(12), uint16 LittleEndian overhead(2) and uint16 LittleEndian number zero(2) 4: last server hash(4) packedAuthDataLength := 12 + 4 + 16 + 4 + dataLength */ macKey := pool.Get(len(a.iv) + len(a.Key)) defer pool.Put(macKey) copy(macKey, a.iv) copy(macKey[len(a.iv):], a.Key) // check head tools.AppendRandBytes(poolBuf, 4) a.lastClientHash = tools.HmacMD5(macKey, poolBuf.Bytes()) a.initRC4Cipher() poolBuf.Write(a.lastClientHash[:8]) // uid binary.Write(poolBuf, binary.LittleEndian, binary.LittleEndian.Uint32(a.userID[:])^binary.LittleEndian.Uint32(a.lastClientHash[8:12])) // encrypted data err := a.putEncryptedData(poolBuf, a.userKey, [2]int{a.Overhead, 0}, a.salt) if err != nil { poolBuf.Reset() return </s> remove func (a *authChain) packData(outData []byte, data []byte, randLength int) { dataLength := len(data) outLength := randLength + dataLength + 2 outData[0] = byte(dataLength) ^ a.lastClientHash[14] outData[1] = byte(dataLength>>8) ^ a.lastClientHash[15] { if dataLength > 0 { randPart1Length := getRandStartPos(&a.randomClient, randLength) rand.Read(outData[2 : 2+randPart1Length]) a.enc.XORKeyStream(outData[2+randPart1Length:], data) rand.Read(outData[2+randPart1Length+dataLength : outLength]) } else { rand.Read(outData[2 : 2+randLength]) } } userKeyLen := uint8(len(a.userKey)) key := pool.Get(int(userKeyLen + 4)) defer pool.Put(key) copy(key, a.userKey) a.chunkID++ binary.LittleEndian.PutUint32(key[userKeyLen:], a.chunkID) a.lastClientHash = a.hmac(key, outData[:outLength]) copy(outData[outLength:], a.lastClientHash[:2]) </s> add originalLength := poolBuf.Len() binary.Write(poolBuf, binary.LittleEndian, length) a.putMixedRandDataAndData(poolBuf, data) a.lastClientHash = tools.HmacMD5(macKey, poolBuf.Bytes()[originalLength:]) poolBuf.Write(a.lastClientHash[:2]) </s> remove func (a *authChain) SetOverhead(overhead int) { a.Overhead = overhead </s> add func (a *authChainA) PacketConn(c net.PacketConn) net.PacketConn { p := &authChainA{ Base: a.Base, salt: a.salt, userData: a.userData, } return &PacketConn{PacketConn: c, Protocol: p}
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_a.go
length := uint16(len(data)) ^ binary.LittleEndian.Uint16(a.lastClientHash[14:16])
<mask> func (a *authChain) getServerRandLen(dataLength int, overhead int) int { <mask> return a.rnd(dataLength, &a.randomServer, a.lastServerHash, a.dataSizeList, a.dataSizeList2, overhead) <mask> } <mask> <mask> func (a *authChain) packedDataLen(data []byte) (chunkLength, randLength int) { <mask> dataLength := len(data) <mask> randLength = a.getClientRandLen(dataLength, a.Overhead) <mask> chunkLength = randLength + dataLength + 2 + 2 <mask> return <mask> } <mask> <mask> func (a *authChain) packData(outData []byte, data []byte, randLength int) { <mask> dataLength := len(data) <mask> outLength := randLength + dataLength + 2 <mask> outData[0] = byte(dataLength) ^ a.lastClientHash[14] </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove func (a *authChain) getServerRandLen(dataLength int, overhead int) int { return a.rnd(dataLength, &a.randomServer, a.lastServerHash, a.dataSizeList, a.dataSizeList2, overhead) } </s> add macKey := pool.Get(len(a.userKey) + 4) defer pool.Put(macKey) copy(macKey, a.userKey) binary.LittleEndian.PutUint32(macKey[len(a.userKey):], a.packID) a.packID++ </s> remove func (a *authChain) packData(outData []byte, data []byte, randLength int) { dataLength := len(data) outLength := randLength + dataLength + 2 outData[0] = byte(dataLength) ^ a.lastClientHash[14] outData[1] = byte(dataLength>>8) ^ a.lastClientHash[15] { if dataLength > 0 { randPart1Length := getRandStartPos(&a.randomClient, randLength) rand.Read(outData[2 : 2+randPart1Length]) a.enc.XORKeyStream(outData[2+randPart1Length:], data) rand.Read(outData[2+randPart1Length+dataLength : outLength]) } else { rand.Read(outData[2 : 2+randLength]) } } userKeyLen := uint8(len(a.userKey)) key := pool.Get(int(userKeyLen + 4)) defer pool.Put(key) copy(key, a.userKey) a.chunkID++ binary.LittleEndian.PutUint32(key[userKeyLen:], a.chunkID) a.lastClientHash = a.hmac(key, outData[:outLength]) copy(outData[outLength:], a.lastClientHash[:2]) </s> add originalLength := poolBuf.Len() binary.Write(poolBuf, binary.LittleEndian, length) a.putMixedRandDataAndData(poolBuf, data) a.lastClientHash = tools.HmacMD5(macKey, poolBuf.Bytes()[originalLength:]) poolBuf.Write(a.lastClientHash[:2]) </s> remove func (a *authChain) getClientRandLen(dataLength int, overhead int) int { return a.rnd(dataLength, &a.randomClient, a.lastClientHash, a.dataSizeList, a.dataSizeList2, overhead) } </s> add func (a *authChainA) packData(poolBuf *bytes.Buffer, data []byte) { a.encrypter.XORKeyStream(data, data) </s> remove func (a *authChain) initUserKeyAndID() { if a.userKey == nil { params := strings.Split(a.Param, ":") if len(params) >= 2 { if userID, err := strconv.ParseUint(params[0], 10, 32); err == nil { binary.LittleEndian.PutUint32(a.uid[:], uint32(userID)) a.userKey = []byte(params[1]) } } if a.userKey == nil { rand.Read(a.uid[:]) a.userKey = make([]byte, len(a.Key)) copy(a.userKey, a.Key) } </s> add func (a *authChainA) packAuthData(poolBuf *bytes.Buffer, data []byte) { /* dataLength := len(data) 12: checkHead(4) and hmac of checkHead(8) 4: uint32 LittleEndian uid (uid = userID ^ last client hash) 16: encrypted data of authdata(12), uint16 LittleEndian overhead(2) and uint16 LittleEndian number zero(2) 4: last server hash(4) packedAuthDataLength := 12 + 4 + 16 + 4 + dataLength */ macKey := pool.Get(len(a.iv) + len(a.Key)) defer pool.Put(macKey) copy(macKey, a.iv) copy(macKey[len(a.iv):], a.Key) // check head tools.AppendRandBytes(poolBuf, 4) a.lastClientHash = tools.HmacMD5(macKey, poolBuf.Bytes()) a.initRC4Cipher() poolBuf.Write(a.lastClientHash[:8]) // uid binary.Write(poolBuf, binary.LittleEndian, binary.LittleEndian.Uint32(a.userID[:])^binary.LittleEndian.Uint32(a.lastClientHash[8:12])) // encrypted data err := a.putEncryptedData(poolBuf, a.userKey, [2]int{a.Overhead, 0}, a.salt) if err != nil { poolBuf.Reset() return </s> remove func (a *authChain) Decode(b []byte) ([]byte, int, error) { a.buffer.Reset() key := pool.Get(len(a.userKey) + 4) defer pool.Put(key) readSize := 0 copy(key, a.userKey) for len(b) > 4 { binary.LittleEndian.PutUint32(key[len(a.userKey):], a.recvID) dataLen := (int)((uint(b[1]^a.lastServerHash[15]) << 8) + uint(b[0]^a.lastServerHash[14])) randLen := a.getServerRandLen(dataLen, a.Overhead) length := randLen + dataLen </s> add func (a *authChainA) Decode(dst, src *bytes.Buffer) error { if a.rawTrans { dst.ReadFrom(src) return nil } for src.Len() > 4 { macKey := pool.Get(len(a.userKey) + 4) defer pool.Put(macKey) copy(macKey, a.userKey) binary.LittleEndian.PutUint32(macKey[len(a.userKey):], a.recvID) dataLength := int(binary.LittleEndian.Uint16(src.Bytes()[:2]) ^ binary.LittleEndian.Uint16(a.lastServerHash[14:16])) randDataLength := a.randDataLength(dataLength, a.lastServerHash, &a.randomServer) length := dataLength + randDataLength
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_a.go
originalLength := poolBuf.Len() binary.Write(poolBuf, binary.LittleEndian, length) a.putMixedRandDataAndData(poolBuf, data) a.lastClientHash = tools.HmacMD5(macKey, poolBuf.Bytes()[originalLength:]) poolBuf.Write(a.lastClientHash[:2])
<mask> chunkLength = randLength + dataLength + 2 + 2 <mask> return <mask> } <mask> <mask> func (a *authChain) packData(outData []byte, data []byte, randLength int) { <mask> dataLength := len(data) <mask> outLength := randLength + dataLength + 2 <mask> outData[0] = byte(dataLength) ^ a.lastClientHash[14] <mask> outData[1] = byte(dataLength>>8) ^ a.lastClientHash[15] <mask> <mask> { <mask> if dataLength > 0 { <mask> randPart1Length := getRandStartPos(&a.randomClient, randLength) <mask> rand.Read(outData[2 : 2+randPart1Length]) <mask> a.enc.XORKeyStream(outData[2+randPart1Length:], data) <mask> rand.Read(outData[2+randPart1Length+dataLength : outLength]) <mask> } else { <mask> rand.Read(outData[2 : 2+randLength]) <mask> } <mask> } <mask> <mask> userKeyLen := uint8(len(a.userKey)) <mask> key := pool.Get(int(userKeyLen + 4)) <mask> defer pool.Put(key) <mask> copy(key, a.userKey) <mask> a.chunkID++ <mask> binary.LittleEndian.PutUint32(key[userKeyLen:], a.chunkID) <mask> a.lastClientHash = a.hmac(key, outData[:outLength]) <mask> copy(outData[outLength:], a.lastClientHash[:2]) <mask> } <mask> <mask> const authHeadLength = 4 + 8 + 4 + 16 + 4 <mask> <mask> func (a *authChain) packAuthData(data []byte) (outData []byte) { </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove func (a *authChain) packedDataLen(data []byte) (chunkLength, randLength int) { dataLength := len(data) randLength = a.getClientRandLen(dataLength, a.Overhead) chunkLength = randLength + dataLength + 2 + 2 return } </s> add length := uint16(len(data)) ^ binary.LittleEndian.Uint16(a.lastClientHash[14:16]) </s> remove const authHeadLength = 4 + 8 + 4 + 16 + 4 func (a *authChain) packAuthData(data []byte) (outData []byte) { outData = make([]byte, authHeadLength, authHeadLength+1500) a.mutex.Lock() defer a.mutex.Unlock() a.connectionID++ if a.connectionID > 0xFF000000 { a.clientID = nil } if len(a.clientID) == 0 { a.clientID = make([]byte, 4) rand.Read(a.clientID) b := make([]byte, 4) rand.Read(b) a.connectionID = binary.LittleEndian.Uint32(b) & 0xFFFFFF </s> add func (a *authChainA) putMixedRandDataAndData(poolBuf *bytes.Buffer, data []byte) { randDataLength := a.randDataLength(len(data), a.lastClientHash, &a.randomClient) if len(data) == 0 { tools.AppendRandBytes(poolBuf, randDataLength) return </s> remove func (a *authChain) getServerRandLen(dataLength int, overhead int) int { return a.rnd(dataLength, &a.randomServer, a.lastServerHash, a.dataSizeList, a.dataSizeList2, overhead) } </s> add macKey := pool.Get(len(a.userKey) + 4) defer pool.Put(macKey) copy(macKey, a.userKey) binary.LittleEndian.PutUint32(macKey[len(a.userKey):], a.packID) a.packID++ </s> remove func (a *authChain) Decode(b []byte) ([]byte, int, error) { a.buffer.Reset() key := pool.Get(len(a.userKey) + 4) defer pool.Put(key) readSize := 0 copy(key, a.userKey) for len(b) > 4 { binary.LittleEndian.PutUint32(key[len(a.userKey):], a.recvID) dataLen := (int)((uint(b[1]^a.lastServerHash[15]) << 8) + uint(b[0]^a.lastServerHash[14])) randLen := a.getServerRandLen(dataLen, a.Overhead) length := randLen + dataLen </s> add func (a *authChainA) Decode(dst, src *bytes.Buffer) error { if a.rawTrans { dst.ReadFrom(src) return nil } for src.Len() > 4 { macKey := pool.Get(len(a.userKey) + 4) defer pool.Put(macKey) copy(macKey, a.userKey) binary.LittleEndian.PutUint32(macKey[len(a.userKey):], a.recvID) dataLength := int(binary.LittleEndian.Uint16(src.Bytes()[:2]) ^ binary.LittleEndian.Uint16(a.lastServerHash[14:16])) randDataLength := a.randDataLength(dataLength, a.lastServerHash, &a.randomServer) length := dataLength + randDataLength </s> remove func (a *authSHA1V4) packAuthData(data []byte) (ret []byte) { dataSize := len(data) randSize := 1 if dataSize <= 1300 { if dataSize > 400 { randSize += rand.Intn(128) } else { randSize += rand.Intn(1024) } } dataOffset := randSize + 4 + 2 retSize := dataOffset + dataSize + 12 + tools.HmacSHA1Len ret = make([]byte, retSize) a.mutex.Lock() defer a.mutex.Unlock() a.connectionID++ if a.connectionID > 0xFF000000 { a.clientID = nil </s> add func (a *authSHA1V4) packAuthData(poolBuf *bytes.Buffer, data []byte) { dataLength := len(data) randDataLength := a.getRandDataLength(12 + dataLength) /* 2: uint16 BigEndian packedAuthDataLength 4: uint32 LittleEndian crc32Data 3: maxRandDataLengthPrefix (min: 1) 12: authDataLength 10: hmacSHA1DataLength */ packedAuthDataLength := 2 + 4 + 3 + randDataLength + 12 + dataLength + 10 if randDataLength < 128 { packedAuthDataLength -= 2
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "re...
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_a.go
func (a *authChainA) putMixedRandDataAndData(poolBuf *bytes.Buffer, data []byte) { randDataLength := a.randDataLength(len(data), a.lastClientHash, &a.randomClient) if len(data) == 0 { tools.AppendRandBytes(poolBuf, randDataLength) return
<mask> a.lastClientHash = a.hmac(key, outData[:outLength]) <mask> copy(outData[outLength:], a.lastClientHash[:2]) <mask> } <mask> <mask> const authHeadLength = 4 + 8 + 4 + 16 + 4 <mask> <mask> func (a *authChain) packAuthData(data []byte) (outData []byte) { <mask> outData = make([]byte, authHeadLength, authHeadLength+1500) <mask> a.mutex.Lock() <mask> defer a.mutex.Unlock() <mask> a.connectionID++ <mask> if a.connectionID > 0xFF000000 { <mask> a.clientID = nil <mask> } <mask> if len(a.clientID) == 0 { <mask> a.clientID = make([]byte, 4) <mask> rand.Read(a.clientID) <mask> b := make([]byte, 4) <mask> rand.Read(b) <mask> a.connectionID = binary.LittleEndian.Uint32(b) & 0xFFFFFF <mask> } <mask> var key = make([]byte, len(a.IV)+len(a.Key)) <mask> copy(key, a.IV) <mask> copy(key[len(a.IV):], a.Key) <mask> </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove if len(a.clientID) == 0 { a.clientID = make([]byte, 8) rand.Read(a.clientID) b := make([]byte, 4) rand.Read(b) a.connectionID = binary.LittleEndian.Uint32(b) & 0xFFFFFF } // 0~1, ret size binary.BigEndian.PutUint16(ret[:2], uint16(retSize&0xFFFF)) </s> add </s> remove var key = make([]byte, len(a.IV)+len(a.Key)) copy(key, a.IV) copy(key[len(a.IV):], a.Key) encrypt := make([]byte, 20) t := time.Now().Unix() binary.LittleEndian.PutUint32(encrypt[:4], uint32(t)) copy(encrypt[4:8], a.clientID) binary.LittleEndian.PutUint32(encrypt[8:], a.connectionID) binary.LittleEndian.PutUint16(encrypt[12:], uint16(a.Overhead)) binary.LittleEndian.PutUint16(encrypt[14:], 0) // first 12 bytes { rand.Read(outData[:4]) a.lastClientHash = a.hmac(key, outData[:4]) copy(outData[4:], a.lastClientHash[:8]) </s> add if randDataLength > 0 { startPos := getRandStartPos(randDataLength, &a.randomClient) tools.AppendRandBytes(poolBuf, startPos) poolBuf.Write(data) tools.AppendRandBytes(poolBuf, randDataLength-startPos) return </s> remove func (a *authSHA1V4) packAuthData(data []byte) (ret []byte) { dataSize := len(data) randSize := 1 if dataSize <= 1300 { if dataSize > 400 { randSize += rand.Intn(128) } else { randSize += rand.Intn(1024) } } dataOffset := randSize + 4 + 2 retSize := dataOffset + dataSize + 12 + tools.HmacSHA1Len ret = make([]byte, retSize) a.mutex.Lock() defer a.mutex.Unlock() a.connectionID++ if a.connectionID > 0xFF000000 { a.clientID = nil </s> add func (a *authSHA1V4) packAuthData(poolBuf *bytes.Buffer, data []byte) { dataLength := len(data) randDataLength := a.getRandDataLength(12 + dataLength) /* 2: uint16 BigEndian packedAuthDataLength 4: uint32 LittleEndian crc32Data 3: maxRandDataLengthPrefix (min: 1) 12: authDataLength 10: hmacSHA1DataLength */ packedAuthDataLength := 2 + 4 + 3 + randDataLength + 12 + dataLength + 10 if randDataLength < 128 { packedAuthDataLength -= 2 </s> remove func (a *authChain) packData(outData []byte, data []byte, randLength int) { dataLength := len(data) outLength := randLength + dataLength + 2 outData[0] = byte(dataLength) ^ a.lastClientHash[14] outData[1] = byte(dataLength>>8) ^ a.lastClientHash[15] { if dataLength > 0 { randPart1Length := getRandStartPos(&a.randomClient, randLength) rand.Read(outData[2 : 2+randPart1Length]) a.enc.XORKeyStream(outData[2+randPart1Length:], data) rand.Read(outData[2+randPart1Length+dataLength : outLength]) } else { rand.Read(outData[2 : 2+randLength]) } } userKeyLen := uint8(len(a.userKey)) key := pool.Get(int(userKeyLen + 4)) defer pool.Put(key) copy(key, a.userKey) a.chunkID++ binary.LittleEndian.PutUint32(key[userKeyLen:], a.chunkID) a.lastClientHash = a.hmac(key, outData[:outLength]) copy(outData[outLength:], a.lastClientHash[:2]) </s> add originalLength := poolBuf.Len() binary.Write(poolBuf, binary.LittleEndian, length) a.putMixedRandDataAndData(poolBuf, data) a.lastClientHash = tools.HmacMD5(macKey, poolBuf.Bytes()[originalLength:]) poolBuf.Write(a.lastClientHash[:2]) </s> remove return &authAES128{ Base: b, authData: &authData{}, salt: "auth_aes128_md5", hmac: tools.HmacMD5, hashDigest: tools.MD5Sum, } } func (a *authAES128) initForConn(iv []byte) Protocol { return &authAES128{ Base: &Base{ IV: iv, Key: a.Key, TCPMss: a.TCPMss, Overhead: a.Overhead, Param: a.Param, }, recvInfo: &recvInfo{recvID: 1, buffer: new(bytes.Buffer)}, authData: a.authData, packID: 1, salt: a.salt, hmac: a.hmac, hashDigest: a.hashDigest, } } func (a *authAES128) GetProtocolOverhead() int { return 9 } func (a *authAES128) SetOverhead(overhead int) { a.Overhead = overhead } func (a *authAES128) Decode(b []byte) ([]byte, int, error) { a.buffer.Reset() bSize := len(b) readSize := 0 key := pool.Get(len(a.userKey) + 4) defer pool.Put(key) copy(key, a.userKey) for bSize > 4 { binary.LittleEndian.PutUint32(key[len(key)-4:], a.recvID) h := a.hmac(key, b[:2]) if !bytes.Equal(h[:2], b[2:4]) { return nil, 0, errAuthAES128IncorrectMAC } length := int(binary.LittleEndian.Uint16(b[:2])) if length >= 8192 || length < 8 { return nil, 0, errAuthAES128DataLengthError } if length > bSize { break } h = a.hmac(key, b[:length-4]) if !bytes.Equal(h[:4], b[length-4:length]) { return nil, 0, errAuthAES128IncorrectChecksum } a.recvID++ pos := int(b[4]) if pos < 255 { pos += 4 } else { pos = int(binary.LittleEndian.Uint16(b[5:7])) + 4 } if pos > length-4 { return nil, 0, errAuthAES128PositionTooLarge } a.buffer.Write(b[pos : length-4]) b = b[length:] bSize -= length readSize += length } return a.buffer.Bytes(), readSize, nil } func (a *authAES128) Encode(b []byte) ([]byte, error) { a.buffer.Reset() bSize := len(b) offset := 0 if bSize > 0 && !a.hasSentHeader { authSize := bSize if authSize > 1200 { authSize = 1200 } a.hasSentHeader = true a.buffer.Write(a.packAuthData(b[:authSize])) bSize -= authSize offset += authSize } const blockSize = 4096 for bSize > blockSize { packSize, randSize := a.packedDataSize(b[offset : offset+blockSize]) pack := pool.Get(packSize) a.packData(b[offset:offset+blockSize], pack, randSize) a.buffer.Write(pack) pool.Put(pack) bSize -= blockSize offset += blockSize } if bSize > 0 { packSize, randSize := a.packedDataSize(b[offset:]) pack := pool.Get(packSize) a.packData(b[offset:], pack, randSize) a.buffer.Write(pack) pool.Put(pack) } return a.buffer.Bytes(), nil } func (a *authAES128) DecodePacket(b []byte) ([]byte, int, error) { bSize := len(b) h := a.hmac(a.Key, b[:bSize-4]) if !bytes.Equal(h[:4], b[bSize-4:]) { return nil, 0, errAuthAES128IncorrectMAC } return b[:bSize-4], bSize - 4, nil } func (a *authAES128) EncodePacket(b []byte) ([]byte, error) { a.initUserKeyAndID() var buf bytes.Buffer buf.Write(b) buf.Write(a.uid[:]) h := a.hmac(a.userKey, buf.Bytes()) buf.Write(h[:4]) return buf.Bytes(), nil } func (a *authAES128) initUserKeyAndID() { if a.userKey == nil { params := strings.Split(a.Param, ":") if len(params) >= 2 { if userID, err := strconv.ParseUint(params[0], 10, 32); err == nil { binary.LittleEndian.PutUint32(a.uid[:], uint32(userID)) a.userKey = a.hashDigest([]byte(params[1])) } } if a.userKey == nil { rand.Read(a.uid[:]) a.userKey = make([]byte, len(a.Key)) copy(a.userKey, a.Key) } } } func (a *authAES128) packedDataSize(data []byte) (packSize, randSize int) { dataSize := len(data) randSize = 1 if dataSize <= 1200 { if a.packID > 4 { randSize += rand.Intn(32) } else { if dataSize > 900 { randSize += rand.Intn(128) } else { randSize += rand.Intn(512) } } } packSize = randSize + dataSize + 8 return } func (a *authAES128) packData(data, ret []byte, randSize int) { dataSize := len(data) retSize := len(ret) // 0~1, ret_size binary.LittleEndian.PutUint16(ret[0:], uint16(retSize&0xFFFF)) // 2~3, hmac key := pool.Get(len(a.userKey) + 4) defer pool.Put(key) copy(key, a.userKey) binary.LittleEndian.PutUint32(key[len(key)-4:], a.packID) h := a.hmac(key, ret[:2]) copy(ret[2:4], h[:2]) // 4~rand_size+4, rand number rand.Read(ret[4 : 4+randSize]) // 4, rand_size if randSize < 128 { ret[4] = byte(randSize & 0xFF) } else { // 4, magic number 0xFF ret[4] = 0xFF // 5~6, rand_size binary.LittleEndian.PutUint16(ret[5:], uint16(randSize&0xFFFF)) } // rand_size+4~ret_size-4, data if dataSize > 0 { copy(ret[randSize+4:], data) } a.packID++ h = a.hmac(key, ret[:retSize-4]) copy(ret[retSize-4:], h[:4]) } func (a *authAES128) packAuthData(data []byte) (ret []byte) { dataSize := len(data) var randSize int if dataSize > 400 { randSize = rand.Intn(512) } else { randSize = rand.Intn(1024) } dataOffset := randSize + 16 + 4 + 4 + 7 retSize := dataOffset + dataSize + 4 ret = make([]byte, retSize) encrypt := make([]byte, 24) key := make([]byte, len(a.IV)+len(a.Key)) copy(key, a.IV) copy(key[len(a.IV):], a.Key) rand.Read(ret[dataOffset-randSize:]) a.mutex.Lock() defer a.mutex.Unlock() a.connectionID++ if a.connectionID > 0xFF000000 { a.clientID = nil } if len(a.clientID) == 0 { a.clientID = make([]byte, 8) rand.Read(a.clientID) b := make([]byte, 4) rand.Read(b) a.connectionID = binary.LittleEndian.Uint32(b) & 0xFFFFFF } copy(encrypt[4:], a.clientID) binary.LittleEndian.PutUint32(encrypt[8:], a.connectionID) now := time.Now().Unix() binary.LittleEndian.PutUint32(encrypt[:4], uint32(now)) binary.LittleEndian.PutUint16(encrypt[12:], uint16(retSize&0xFFFF)) binary.LittleEndian.PutUint16(encrypt[14:], uint16(randSize&0xFFFF)) a.initUserKeyAndID() aesCipherKey := core.Kdf(base64.StdEncoding.EncodeToString(a.userKey)+a.salt, 16) block, err := aes.NewCipher(aesCipherKey) if err != nil { return nil } encryptData := make([]byte, 16) iv := make([]byte, aes.BlockSize) cbc := cipher.NewCBCEncrypter(block, iv) cbc.CryptBlocks(encryptData, encrypt[:16]) copy(encrypt[:4], a.uid[:]) copy(encrypt[4:4+16], encryptData) h := a.hmac(key, encrypt[:20]) copy(encrypt[20:], h[:4]) rand.Read(ret[:1]) h = a.hmac(key, ret[:1]) copy(ret[1:], h[:7-1]) copy(ret[7:], encrypt) copy(ret[dataOffset:], data) h = a.hmac(a.userKey, ret[:retSize-4]) copy(ret[retSize-4:], h[:4]) return </s> add a := &authAES128{ Base: b, authData: &authData{}, authAES128Function: &authAES128Function{salt: "auth_aes128_md5", hmac: tools.HmacMD5, hashDigest: tools.MD5Sum}, userData: &userData{}, } a.initUserData() return a
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_a.go
if randDataLength > 0 { startPos := getRandStartPos(randDataLength, &a.randomClient) tools.AppendRandBytes(poolBuf, startPos) poolBuf.Write(data) tools.AppendRandBytes(poolBuf, randDataLength-startPos) return
<mask> b := make([]byte, 4) <mask> rand.Read(b) <mask> a.connectionID = binary.LittleEndian.Uint32(b) & 0xFFFFFF <mask> } <mask> var key = make([]byte, len(a.IV)+len(a.Key)) <mask> copy(key, a.IV) <mask> copy(key[len(a.IV):], a.Key) <mask> <mask> encrypt := make([]byte, 20) <mask> t := time.Now().Unix() <mask> binary.LittleEndian.PutUint32(encrypt[:4], uint32(t)) <mask> copy(encrypt[4:8], a.clientID) <mask> binary.LittleEndian.PutUint32(encrypt[8:], a.connectionID) <mask> binary.LittleEndian.PutUint16(encrypt[12:], uint16(a.Overhead)) <mask> binary.LittleEndian.PutUint16(encrypt[14:], 0) <mask> <mask> // first 12 bytes <mask> { <mask> rand.Read(outData[:4]) <mask> a.lastClientHash = a.hmac(key, outData[:4]) <mask> copy(outData[4:], a.lastClientHash[:8]) <mask> } <mask> var base64UserKey string <mask> // uid & 16 bytes auth data <mask> { <mask> a.initUserKeyAndID() </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove const authHeadLength = 4 + 8 + 4 + 16 + 4 func (a *authChain) packAuthData(data []byte) (outData []byte) { outData = make([]byte, authHeadLength, authHeadLength+1500) a.mutex.Lock() defer a.mutex.Unlock() a.connectionID++ if a.connectionID > 0xFF000000 { a.clientID = nil } if len(a.clientID) == 0 { a.clientID = make([]byte, 4) rand.Read(a.clientID) b := make([]byte, 4) rand.Read(b) a.connectionID = binary.LittleEndian.Uint32(b) & 0xFFFFFF </s> add func (a *authChainA) putMixedRandDataAndData(poolBuf *bytes.Buffer, data []byte) { randDataLength := a.randDataLength(len(data), a.lastClientHash, &a.randomClient) if len(data) == 0 { tools.AppendRandBytes(poolBuf, randDataLength) return </s> remove var base64UserKey string // uid & 16 bytes auth data { a.initUserKeyAndID() uid := make([]byte, 4) for i := 0; i < 4; i++ { uid[i] = a.uid[i] ^ a.lastClientHash[8+i] } base64UserKey = base64.StdEncoding.EncodeToString(a.userKey) aesCipherKey := core.Kdf(base64UserKey+a.salt, 16) block, err := aes.NewCipher(aesCipherKey) if err != nil { return } encryptData := make([]byte, 16) iv := make([]byte, aes.BlockSize) cbc := cipher.NewCBCEncrypter(block, iv) cbc.CryptBlocks(encryptData, encrypt[:16]) copy(encrypt[:4], uid[:]) copy(encrypt[4:4+16], encryptData) } // final HMAC { a.lastServerHash = a.hmac(a.userKey, encrypt[:20]) copy(outData[12:], encrypt) copy(outData[12+20:], a.lastServerHash[:4]) } // init cipher cipherKey := a.calcRC4CipherKey(a.lastClientHash, base64UserKey) a.enc, _ = rc4.NewCipher(cipherKey) a.dec, _ = rc4.NewCipher(cipherKey) // data chunkLength, randLength := a.packedDataLen(data) if chunkLength+authHeadLength <= cap(outData) { outData = outData[:authHeadLength+chunkLength] } else { newOutData := make([]byte, authHeadLength+chunkLength) copy(newOutData, outData[:authHeadLength]) outData = newOutData } a.packData(outData[authHeadLength:], data, randLength) return </s> add poolBuf.Write(data) </s> remove if len(a.clientID) == 0 { a.clientID = make([]byte, 8) rand.Read(a.clientID) b := make([]byte, 4) rand.Read(b) a.connectionID = binary.LittleEndian.Uint32(b) & 0xFFFFFF } // 0~1, ret size binary.BigEndian.PutUint16(ret[:2], uint16(retSize&0xFFFF)) </s> add </s> remove return &authAES128{ Base: b, authData: &authData{}, salt: "auth_aes128_md5", hmac: tools.HmacMD5, hashDigest: tools.MD5Sum, } } func (a *authAES128) initForConn(iv []byte) Protocol { return &authAES128{ Base: &Base{ IV: iv, Key: a.Key, TCPMss: a.TCPMss, Overhead: a.Overhead, Param: a.Param, }, recvInfo: &recvInfo{recvID: 1, buffer: new(bytes.Buffer)}, authData: a.authData, packID: 1, salt: a.salt, hmac: a.hmac, hashDigest: a.hashDigest, } } func (a *authAES128) GetProtocolOverhead() int { return 9 } func (a *authAES128) SetOverhead(overhead int) { a.Overhead = overhead } func (a *authAES128) Decode(b []byte) ([]byte, int, error) { a.buffer.Reset() bSize := len(b) readSize := 0 key := pool.Get(len(a.userKey) + 4) defer pool.Put(key) copy(key, a.userKey) for bSize > 4 { binary.LittleEndian.PutUint32(key[len(key)-4:], a.recvID) h := a.hmac(key, b[:2]) if !bytes.Equal(h[:2], b[2:4]) { return nil, 0, errAuthAES128IncorrectMAC } length := int(binary.LittleEndian.Uint16(b[:2])) if length >= 8192 || length < 8 { return nil, 0, errAuthAES128DataLengthError } if length > bSize { break } h = a.hmac(key, b[:length-4]) if !bytes.Equal(h[:4], b[length-4:length]) { return nil, 0, errAuthAES128IncorrectChecksum } a.recvID++ pos := int(b[4]) if pos < 255 { pos += 4 } else { pos = int(binary.LittleEndian.Uint16(b[5:7])) + 4 } if pos > length-4 { return nil, 0, errAuthAES128PositionTooLarge } a.buffer.Write(b[pos : length-4]) b = b[length:] bSize -= length readSize += length } return a.buffer.Bytes(), readSize, nil } func (a *authAES128) Encode(b []byte) ([]byte, error) { a.buffer.Reset() bSize := len(b) offset := 0 if bSize > 0 && !a.hasSentHeader { authSize := bSize if authSize > 1200 { authSize = 1200 } a.hasSentHeader = true a.buffer.Write(a.packAuthData(b[:authSize])) bSize -= authSize offset += authSize } const blockSize = 4096 for bSize > blockSize { packSize, randSize := a.packedDataSize(b[offset : offset+blockSize]) pack := pool.Get(packSize) a.packData(b[offset:offset+blockSize], pack, randSize) a.buffer.Write(pack) pool.Put(pack) bSize -= blockSize offset += blockSize } if bSize > 0 { packSize, randSize := a.packedDataSize(b[offset:]) pack := pool.Get(packSize) a.packData(b[offset:], pack, randSize) a.buffer.Write(pack) pool.Put(pack) } return a.buffer.Bytes(), nil } func (a *authAES128) DecodePacket(b []byte) ([]byte, int, error) { bSize := len(b) h := a.hmac(a.Key, b[:bSize-4]) if !bytes.Equal(h[:4], b[bSize-4:]) { return nil, 0, errAuthAES128IncorrectMAC } return b[:bSize-4], bSize - 4, nil } func (a *authAES128) EncodePacket(b []byte) ([]byte, error) { a.initUserKeyAndID() var buf bytes.Buffer buf.Write(b) buf.Write(a.uid[:]) h := a.hmac(a.userKey, buf.Bytes()) buf.Write(h[:4]) return buf.Bytes(), nil } func (a *authAES128) initUserKeyAndID() { if a.userKey == nil { params := strings.Split(a.Param, ":") if len(params) >= 2 { if userID, err := strconv.ParseUint(params[0], 10, 32); err == nil { binary.LittleEndian.PutUint32(a.uid[:], uint32(userID)) a.userKey = a.hashDigest([]byte(params[1])) } } if a.userKey == nil { rand.Read(a.uid[:]) a.userKey = make([]byte, len(a.Key)) copy(a.userKey, a.Key) } } } func (a *authAES128) packedDataSize(data []byte) (packSize, randSize int) { dataSize := len(data) randSize = 1 if dataSize <= 1200 { if a.packID > 4 { randSize += rand.Intn(32) } else { if dataSize > 900 { randSize += rand.Intn(128) } else { randSize += rand.Intn(512) } } } packSize = randSize + dataSize + 8 return } func (a *authAES128) packData(data, ret []byte, randSize int) { dataSize := len(data) retSize := len(ret) // 0~1, ret_size binary.LittleEndian.PutUint16(ret[0:], uint16(retSize&0xFFFF)) // 2~3, hmac key := pool.Get(len(a.userKey) + 4) defer pool.Put(key) copy(key, a.userKey) binary.LittleEndian.PutUint32(key[len(key)-4:], a.packID) h := a.hmac(key, ret[:2]) copy(ret[2:4], h[:2]) // 4~rand_size+4, rand number rand.Read(ret[4 : 4+randSize]) // 4, rand_size if randSize < 128 { ret[4] = byte(randSize & 0xFF) } else { // 4, magic number 0xFF ret[4] = 0xFF // 5~6, rand_size binary.LittleEndian.PutUint16(ret[5:], uint16(randSize&0xFFFF)) } // rand_size+4~ret_size-4, data if dataSize > 0 { copy(ret[randSize+4:], data) } a.packID++ h = a.hmac(key, ret[:retSize-4]) copy(ret[retSize-4:], h[:4]) } func (a *authAES128) packAuthData(data []byte) (ret []byte) { dataSize := len(data) var randSize int if dataSize > 400 { randSize = rand.Intn(512) } else { randSize = rand.Intn(1024) } dataOffset := randSize + 16 + 4 + 4 + 7 retSize := dataOffset + dataSize + 4 ret = make([]byte, retSize) encrypt := make([]byte, 24) key := make([]byte, len(a.IV)+len(a.Key)) copy(key, a.IV) copy(key[len(a.IV):], a.Key) rand.Read(ret[dataOffset-randSize:]) a.mutex.Lock() defer a.mutex.Unlock() a.connectionID++ if a.connectionID > 0xFF000000 { a.clientID = nil } if len(a.clientID) == 0 { a.clientID = make([]byte, 8) rand.Read(a.clientID) b := make([]byte, 4) rand.Read(b) a.connectionID = binary.LittleEndian.Uint32(b) & 0xFFFFFF } copy(encrypt[4:], a.clientID) binary.LittleEndian.PutUint32(encrypt[8:], a.connectionID) now := time.Now().Unix() binary.LittleEndian.PutUint32(encrypt[:4], uint32(now)) binary.LittleEndian.PutUint16(encrypt[12:], uint16(retSize&0xFFFF)) binary.LittleEndian.PutUint16(encrypt[14:], uint16(randSize&0xFFFF)) a.initUserKeyAndID() aesCipherKey := core.Kdf(base64.StdEncoding.EncodeToString(a.userKey)+a.salt, 16) block, err := aes.NewCipher(aesCipherKey) if err != nil { return nil } encryptData := make([]byte, 16) iv := make([]byte, aes.BlockSize) cbc := cipher.NewCBCEncrypter(block, iv) cbc.CryptBlocks(encryptData, encrypt[:16]) copy(encrypt[:4], a.uid[:]) copy(encrypt[4:4+16], encryptData) h := a.hmac(key, encrypt[:20]) copy(encrypt[20:], h[:4]) rand.Read(ret[:1]) h = a.hmac(key, ret[:1]) copy(ret[1:], h[:7-1]) copy(ret[7:], encrypt) copy(ret[dataOffset:], data) h = a.hmac(a.userKey, ret[:retSize-4]) copy(ret[retSize-4:], h[:4]) return </s> add a := &authAES128{ Base: b, authData: &authData{}, authAES128Function: &authAES128Function{salt: "auth_aes128_md5", hmac: tools.HmacMD5, hashDigest: tools.MD5Sum}, userData: &userData{}, } a.initUserData() return a </s> remove // rand size+6~(rand size+10), time stamp now := time.Now().Unix() binary.LittleEndian.PutUint32(ret[dataOffset:dataOffset+4], uint32(now)) // rand size+10~(rand size+14), client ID copy(ret[dataOffset+4:dataOffset+4+4], a.clientID[:4]) // rand size+14~(rand size+18), connection ID binary.LittleEndian.PutUint32(ret[dataOffset+8:dataOffset+8+4], a.connectionID) // rand size+18~(rand size+18)+data length, data copy(ret[dataOffset+12:], data) key := make([]byte, len(a.IV)+len(a.Key)) copy(key, a.IV) copy(key[len(a.IV):], a.Key) h := tools.HmacSHA1(key, ret[:retSize-tools.HmacSHA1Len]) // (ret size-10)~(ret size)/(rand size)+18+data length~end, hmac copy(ret[retSize-tools.HmacSHA1Len:], h[:tools.HmacSHA1Len]) return ret </s> add poolBuf.WriteByte(255) binary.Write(poolBuf, binary.BigEndian, uint16(size+3)) tools.AppendRandBytes(poolBuf, size)
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_a.go
poolBuf.Write(data)
<mask> rand.Read(outData[:4]) <mask> a.lastClientHash = a.hmac(key, outData[:4]) <mask> copy(outData[4:], a.lastClientHash[:8]) <mask> } <mask> var base64UserKey string <mask> // uid & 16 bytes auth data <mask> { <mask> a.initUserKeyAndID() <mask> uid := make([]byte, 4) <mask> for i := 0; i < 4; i++ { <mask> uid[i] = a.uid[i] ^ a.lastClientHash[8+i] <mask> } <mask> base64UserKey = base64.StdEncoding.EncodeToString(a.userKey) <mask> aesCipherKey := core.Kdf(base64UserKey+a.salt, 16) <mask> block, err := aes.NewCipher(aesCipherKey) <mask> if err != nil { <mask> return <mask> } <mask> encryptData := make([]byte, 16) <mask> iv := make([]byte, aes.BlockSize) <mask> cbc := cipher.NewCBCEncrypter(block, iv) <mask> cbc.CryptBlocks(encryptData, encrypt[:16]) <mask> copy(encrypt[:4], uid[:]) <mask> copy(encrypt[4:4+16], encryptData) <mask> } <mask> // final HMAC <mask> { <mask> a.lastServerHash = a.hmac(a.userKey, encrypt[:20]) <mask> <mask> copy(outData[12:], encrypt) <mask> copy(outData[12+20:], a.lastServerHash[:4]) <mask> } <mask> <mask> // init cipher <mask> cipherKey := a.calcRC4CipherKey(a.lastClientHash, base64UserKey) <mask> a.enc, _ = rc4.NewCipher(cipherKey) <mask> a.dec, _ = rc4.NewCipher(cipherKey) <mask> <mask> // data <mask> chunkLength, randLength := a.packedDataLen(data) <mask> if chunkLength+authHeadLength <= cap(outData) { <mask> outData = outData[:authHeadLength+chunkLength] <mask> } else { <mask> newOutData := make([]byte, authHeadLength+chunkLength) <mask> copy(newOutData, outData[:authHeadLength]) <mask> outData = newOutData <mask> } <mask> a.packData(outData[authHeadLength:], data, randLength) <mask> return <mask> } <mask> <mask> func getRandStartPos(random *shift128PlusContext, randLength int) int { <mask> if randLength > 0 { <mask> return int(random.Next() % 8589934609 % uint64(randLength)) </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove var key = make([]byte, len(a.IV)+len(a.Key)) copy(key, a.IV) copy(key[len(a.IV):], a.Key) encrypt := make([]byte, 20) t := time.Now().Unix() binary.LittleEndian.PutUint32(encrypt[:4], uint32(t)) copy(encrypt[4:8], a.clientID) binary.LittleEndian.PutUint32(encrypt[8:], a.connectionID) binary.LittleEndian.PutUint16(encrypt[12:], uint16(a.Overhead)) binary.LittleEndian.PutUint16(encrypt[14:], 0) // first 12 bytes { rand.Read(outData[:4]) a.lastClientHash = a.hmac(key, outData[:4]) copy(outData[4:], a.lastClientHash[:8]) </s> add if randDataLength > 0 { startPos := getRandStartPos(randDataLength, &a.randomClient) tools.AppendRandBytes(poolBuf, startPos) poolBuf.Write(data) tools.AppendRandBytes(poolBuf, randDataLength-startPos) return </s> remove cipherKey := a.getRC4CipherKey(hash) enc, _ := rc4.NewCipher(cipherKey) var buf bytes.Buffer enc.XORKeyStream(b, b) buf.Write(b) randLength := udpGetRandLen(&a.randomClient, hash) randBytes := pool.Get(randLength) defer pool.Put(randBytes) buf.Write(randBytes) buf.Write(authData) buf.Write(uid) </s> add md5Data := tools.HmacMD5(a.Key, authData) </s> remove hash := a.hmac(a.Key, authData) uid := pool.Get(4) defer pool.Put(uid) for i := 0; i < 4; i++ { uid[i] = a.uid[i] ^ hash[i] } </s> add </s> remove return &authAES128{ Base: b, authData: &authData{}, salt: "auth_aes128_md5", hmac: tools.HmacMD5, hashDigest: tools.MD5Sum, } } func (a *authAES128) initForConn(iv []byte) Protocol { return &authAES128{ Base: &Base{ IV: iv, Key: a.Key, TCPMss: a.TCPMss, Overhead: a.Overhead, Param: a.Param, }, recvInfo: &recvInfo{recvID: 1, buffer: new(bytes.Buffer)}, authData: a.authData, packID: 1, salt: a.salt, hmac: a.hmac, hashDigest: a.hashDigest, } } func (a *authAES128) GetProtocolOverhead() int { return 9 } func (a *authAES128) SetOverhead(overhead int) { a.Overhead = overhead } func (a *authAES128) Decode(b []byte) ([]byte, int, error) { a.buffer.Reset() bSize := len(b) readSize := 0 key := pool.Get(len(a.userKey) + 4) defer pool.Put(key) copy(key, a.userKey) for bSize > 4 { binary.LittleEndian.PutUint32(key[len(key)-4:], a.recvID) h := a.hmac(key, b[:2]) if !bytes.Equal(h[:2], b[2:4]) { return nil, 0, errAuthAES128IncorrectMAC } length := int(binary.LittleEndian.Uint16(b[:2])) if length >= 8192 || length < 8 { return nil, 0, errAuthAES128DataLengthError } if length > bSize { break } h = a.hmac(key, b[:length-4]) if !bytes.Equal(h[:4], b[length-4:length]) { return nil, 0, errAuthAES128IncorrectChecksum } a.recvID++ pos := int(b[4]) if pos < 255 { pos += 4 } else { pos = int(binary.LittleEndian.Uint16(b[5:7])) + 4 } if pos > length-4 { return nil, 0, errAuthAES128PositionTooLarge } a.buffer.Write(b[pos : length-4]) b = b[length:] bSize -= length readSize += length } return a.buffer.Bytes(), readSize, nil } func (a *authAES128) Encode(b []byte) ([]byte, error) { a.buffer.Reset() bSize := len(b) offset := 0 if bSize > 0 && !a.hasSentHeader { authSize := bSize if authSize > 1200 { authSize = 1200 } a.hasSentHeader = true a.buffer.Write(a.packAuthData(b[:authSize])) bSize -= authSize offset += authSize } const blockSize = 4096 for bSize > blockSize { packSize, randSize := a.packedDataSize(b[offset : offset+blockSize]) pack := pool.Get(packSize) a.packData(b[offset:offset+blockSize], pack, randSize) a.buffer.Write(pack) pool.Put(pack) bSize -= blockSize offset += blockSize } if bSize > 0 { packSize, randSize := a.packedDataSize(b[offset:]) pack := pool.Get(packSize) a.packData(b[offset:], pack, randSize) a.buffer.Write(pack) pool.Put(pack) } return a.buffer.Bytes(), nil } func (a *authAES128) DecodePacket(b []byte) ([]byte, int, error) { bSize := len(b) h := a.hmac(a.Key, b[:bSize-4]) if !bytes.Equal(h[:4], b[bSize-4:]) { return nil, 0, errAuthAES128IncorrectMAC } return b[:bSize-4], bSize - 4, nil } func (a *authAES128) EncodePacket(b []byte) ([]byte, error) { a.initUserKeyAndID() var buf bytes.Buffer buf.Write(b) buf.Write(a.uid[:]) h := a.hmac(a.userKey, buf.Bytes()) buf.Write(h[:4]) return buf.Bytes(), nil } func (a *authAES128) initUserKeyAndID() { if a.userKey == nil { params := strings.Split(a.Param, ":") if len(params) >= 2 { if userID, err := strconv.ParseUint(params[0], 10, 32); err == nil { binary.LittleEndian.PutUint32(a.uid[:], uint32(userID)) a.userKey = a.hashDigest([]byte(params[1])) } } if a.userKey == nil { rand.Read(a.uid[:]) a.userKey = make([]byte, len(a.Key)) copy(a.userKey, a.Key) } } } func (a *authAES128) packedDataSize(data []byte) (packSize, randSize int) { dataSize := len(data) randSize = 1 if dataSize <= 1200 { if a.packID > 4 { randSize += rand.Intn(32) } else { if dataSize > 900 { randSize += rand.Intn(128) } else { randSize += rand.Intn(512) } } } packSize = randSize + dataSize + 8 return } func (a *authAES128) packData(data, ret []byte, randSize int) { dataSize := len(data) retSize := len(ret) // 0~1, ret_size binary.LittleEndian.PutUint16(ret[0:], uint16(retSize&0xFFFF)) // 2~3, hmac key := pool.Get(len(a.userKey) + 4) defer pool.Put(key) copy(key, a.userKey) binary.LittleEndian.PutUint32(key[len(key)-4:], a.packID) h := a.hmac(key, ret[:2]) copy(ret[2:4], h[:2]) // 4~rand_size+4, rand number rand.Read(ret[4 : 4+randSize]) // 4, rand_size if randSize < 128 { ret[4] = byte(randSize & 0xFF) } else { // 4, magic number 0xFF ret[4] = 0xFF // 5~6, rand_size binary.LittleEndian.PutUint16(ret[5:], uint16(randSize&0xFFFF)) } // rand_size+4~ret_size-4, data if dataSize > 0 { copy(ret[randSize+4:], data) } a.packID++ h = a.hmac(key, ret[:retSize-4]) copy(ret[retSize-4:], h[:4]) } func (a *authAES128) packAuthData(data []byte) (ret []byte) { dataSize := len(data) var randSize int if dataSize > 400 { randSize = rand.Intn(512) } else { randSize = rand.Intn(1024) } dataOffset := randSize + 16 + 4 + 4 + 7 retSize := dataOffset + dataSize + 4 ret = make([]byte, retSize) encrypt := make([]byte, 24) key := make([]byte, len(a.IV)+len(a.Key)) copy(key, a.IV) copy(key[len(a.IV):], a.Key) rand.Read(ret[dataOffset-randSize:]) a.mutex.Lock() defer a.mutex.Unlock() a.connectionID++ if a.connectionID > 0xFF000000 { a.clientID = nil } if len(a.clientID) == 0 { a.clientID = make([]byte, 8) rand.Read(a.clientID) b := make([]byte, 4) rand.Read(b) a.connectionID = binary.LittleEndian.Uint32(b) & 0xFFFFFF } copy(encrypt[4:], a.clientID) binary.LittleEndian.PutUint32(encrypt[8:], a.connectionID) now := time.Now().Unix() binary.LittleEndian.PutUint32(encrypt[:4], uint32(now)) binary.LittleEndian.PutUint16(encrypt[12:], uint16(retSize&0xFFFF)) binary.LittleEndian.PutUint16(encrypt[14:], uint16(randSize&0xFFFF)) a.initUserKeyAndID() aesCipherKey := core.Kdf(base64.StdEncoding.EncodeToString(a.userKey)+a.salt, 16) block, err := aes.NewCipher(aesCipherKey) if err != nil { return nil } encryptData := make([]byte, 16) iv := make([]byte, aes.BlockSize) cbc := cipher.NewCBCEncrypter(block, iv) cbc.CryptBlocks(encryptData, encrypt[:16]) copy(encrypt[:4], a.uid[:]) copy(encrypt[4:4+16], encryptData) h := a.hmac(key, encrypt[:20]) copy(encrypt[20:], h[:4]) rand.Read(ret[:1]) h = a.hmac(key, ret[:1]) copy(ret[1:], h[:7-1]) copy(ret[7:], encrypt) copy(ret[dataOffset:], data) h = a.hmac(a.userKey, ret[:retSize-4]) copy(ret[retSize-4:], h[:4]) return </s> add a := &authAES128{ Base: b, authData: &authData{}, authAES128Function: &authAES128Function{salt: "auth_aes128_md5", hmac: tools.HmacMD5, hashDigest: tools.MD5Sum}, userData: &userData{}, } a.initUserData() return a </s> remove hash := a.hmac(a.Key, b[bSize-8:bSize-1]) cipherKey := a.getRC4CipherKey(hash) dec, _ := rc4.NewCipher(cipherKey) randLength := udpGetRandLen(&a.randomServer, hash) bSize -= 8 + randLength dec.XORKeyStream(b, b[:bSize]) return b, bSize, nil </s> add md5Data := tools.HmacMD5(a.Key, b[len(b)-8:len(b)-1]) randDataLength := udpGetRandLength(md5Data, &a.randomServer) key := core.Kdf(base64.StdEncoding.EncodeToString(a.userKey)+base64.StdEncoding.EncodeToString(md5Data), 16) rc4Cipher, err := rc4.NewCipher(key) if err != nil { return nil, err } wantedData := b[:len(b)-8-randDataLength] rc4Cipher.XORKeyStream(wantedData, wantedData) return wantedData, nil
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "re...
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_a.go