docstring_tokens
stringlengths
0
76.5k
code_tokens
stringlengths
75
1.81M
label_window
listlengths
4
2.12k
html_url
stringlengths
74
116
file_name
stringlengths
3
311
func getRandStartPos(length int, random *tools.XorShift128Plus) int { if length == 0 { return 0
<mask> a.packData(outData[authHeadLength:], data, randLength) <mask> return <mask> } <mask> <mask> func getRandStartPos(random *shift128PlusContext, randLength int) int { <mask> if randLength > 0 { <mask> return int(random.Next() % 8589934609 % uint64(randLength)) <mask> } <mask> return 0 <mask> } <mask> <mask> func authChainAGetRandLen(dataLength int, random *shift128PlusContext, lastHash []byte, dataSizeList, dataSizeList2 []int, overhead int) int { </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove return 0 </s> add return int(random.Next()%8589934609) % length </s> remove func authChainAGetRandLen(dataLength int, random *shift128PlusContext, lastHash []byte, dataSizeList, dataSizeList2 []int, overhead int) int { if dataLength > 1440 { </s> add func (a *authChainA) getRandLength(length int, lastHash []byte, random *tools.XorShift128Plus) int { if length > 1440 { </s> remove random.InitFromBinDatalen(lastHash[:16], dataLength) if dataLength > 1300 { </s> add random.InitFromBinAndLength(lastHash, length) if length > 1300 { </s> remove sort.Ints(r.dataSizeList2) </s> add sort.Ints(a.dataSizeList) length = a.randomServer.Next()%16 + 8 for ; length > 0; length-- { a.dataSizeList2 = append(a.dataSizeList2, int(a.randomServer.Next()%2340%2040%1440)) } sort.Ints(a.dataSizeList2) </s> remove func authChainBGetRandLen(dataLength int, random *shift128PlusContext, lastHash []byte, dataSizeList, dataSizeList2 []int, overhead int) int { if dataLength > 1440 { </s> add func (a *authChainB) getRandLength(length int, lashHash []byte, random *tools.XorShift128Plus) int { if length >= 1440 {
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_a.go
return int(random.Next()%8589934609) % length
<mask> func getRandStartPos(random *shift128PlusContext, randLength int) int { <mask> if randLength > 0 { <mask> return int(random.Next() % 8589934609 % uint64(randLength)) <mask> } <mask> return 0 <mask> } <mask> <mask> func authChainAGetRandLen(dataLength int, random *shift128PlusContext, lastHash []byte, dataSizeList, dataSizeList2 []int, overhead int) int { <mask> if dataLength > 1440 { <mask> return 0 </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove func getRandStartPos(random *shift128PlusContext, randLength int) int { if randLength > 0 { return int(random.Next() % 8589934609 % uint64(randLength)) </s> add func getRandStartPos(length int, random *tools.XorShift128Plus) int { if length == 0 { return 0 </s> remove func authChainAGetRandLen(dataLength int, random *shift128PlusContext, lastHash []byte, dataSizeList, dataSizeList2 []int, overhead int) int { if dataLength > 1440 { </s> add func (a *authChainA) getRandLength(length int, lastHash []byte, random *tools.XorShift128Plus) int { if length > 1440 { </s> remove random.InitFromBinDatalen(lastHash[:16], dataLength) if dataLength > 1300 { </s> add random.InitFromBinAndLength(lastHash, length) if length > 1300 { </s> remove sort.Ints(r.dataSizeList2) </s> add sort.Ints(a.dataSizeList) length = a.randomServer.Next()%16 + 8 for ; length > 0; length-- { a.dataSizeList2 = append(a.dataSizeList2, int(a.randomServer.Next()%2340%2040%1440)) } sort.Ints(a.dataSizeList2) </s> remove func authChainBGetRandLen(dataLength int, random *shift128PlusContext, lastHash []byte, dataSizeList, dataSizeList2 []int, overhead int) int { if dataLength > 1440 { </s> add func (a *authChainB) getRandLength(length int, lashHash []byte, random *tools.XorShift128Plus) int { if length >= 1440 {
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_a.go
func (a *authChainA) getRandLength(length int, lastHash []byte, random *tools.XorShift128Plus) int { if length > 1440 {
<mask> } <mask> return 0 <mask> } <mask> <mask> func authChainAGetRandLen(dataLength int, random *shift128PlusContext, lastHash []byte, dataSizeList, dataSizeList2 []int, overhead int) int { <mask> if dataLength > 1440 { <mask> return 0 <mask> } <mask> random.InitFromBinDatalen(lastHash[:16], dataLength) <mask> if dataLength > 1300 { <mask> return int(random.Next() % 31) </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove random.InitFromBinDatalen(lastHash[:16], dataLength) if dataLength > 1300 { </s> add random.InitFromBinAndLength(lastHash, length) if length > 1300 { </s> remove return 0 </s> add return int(random.Next()%8589934609) % length </s> remove func authChainBGetRandLen(dataLength int, random *shift128PlusContext, lastHash []byte, dataSizeList, dataSizeList2 []int, overhead int) int { if dataLength > 1440 { </s> add func (a *authChainB) getRandLength(length int, lashHash []byte, random *tools.XorShift128Plus) int { if length >= 1440 { </s> remove func getRandStartPos(random *shift128PlusContext, randLength int) int { if randLength > 0 { return int(random.Next() % 8589934609 % uint64(randLength)) </s> add func getRandStartPos(length int, random *tools.XorShift128Plus) int { if length == 0 { return 0 </s> remove sort.Ints(r.dataSizeList2) </s> add sort.Ints(a.dataSizeList) length = a.randomServer.Next()%16 + 8 for ; length > 0; length-- { a.dataSizeList2 = append(a.dataSizeList2, int(a.randomServer.Next()%2340%2040%1440)) } sort.Ints(a.dataSizeList2)
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_a.go
random.InitFromBinAndLength(lastHash, length) if length > 1300 {
<mask> func authChainAGetRandLen(dataLength int, random *shift128PlusContext, lastHash []byte, dataSizeList, dataSizeList2 []int, overhead int) int { <mask> if dataLength > 1440 { <mask> return 0 <mask> } <mask> random.InitFromBinDatalen(lastHash[:16], dataLength) <mask> if dataLength > 1300 { <mask> return int(random.Next() % 31) <mask> } <mask> if dataLength > 900 { <mask> return int(random.Next() % 127) <mask> } </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove func authChainAGetRandLen(dataLength int, random *shift128PlusContext, lastHash []byte, dataSizeList, dataSizeList2 []int, overhead int) int { if dataLength > 1440 { </s> add func (a *authChainA) getRandLength(length int, lastHash []byte, random *tools.XorShift128Plus) int { if length > 1440 { </s> remove return 0 </s> add return int(random.Next()%8589934609) % length </s> remove if dataLength > 900 { </s> add if length > 900 { </s> remove func getRandStartPos(random *shift128PlusContext, randLength int) int { if randLength > 0 { return int(random.Next() % 8589934609 % uint64(randLength)) </s> add func getRandStartPos(length int, random *tools.XorShift128Plus) int { if length == 0 { return 0 </s> remove func authChainBGetRandLen(dataLength int, random *shift128PlusContext, lastHash []byte, dataSizeList, dataSizeList2 []int, overhead int) int { if dataLength > 1440 { </s> add func (a *authChainB) getRandLength(length int, lashHash []byte, random *tools.XorShift128Plus) int { if length >= 1440 {
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_a.go
if length > 900 {
<mask> random.InitFromBinDatalen(lastHash[:16], dataLength) <mask> if dataLength > 1300 { <mask> return int(random.Next() % 31) <mask> } <mask> if dataLength > 900 { <mask> return int(random.Next() % 127) <mask> } <mask> if dataLength > 400 { <mask> return int(random.Next() % 521) <mask> } </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove if dataLength > 900 { </s> add if length > 900 { </s> remove random.InitFromBinDatalen(lastHash[:16], dataLength) if dataLength > 1300 { </s> add random.InitFromBinAndLength(lastHash, length) if length > 1300 { </s> remove if dataLength > 400 { </s> add if length > 400 { </s> remove if dataLength > 400 { </s> add if length > 400 { </s> remove if dataLength > 1300 { </s> add if length > 1300 {
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_a.go
if length > 400 {
<mask> } <mask> if dataLength > 900 { <mask> return int(random.Next() % 127) <mask> } <mask> if dataLength > 400 { <mask> return int(random.Next() % 521) <mask> } <mask> return int(random.Next() % 1021) <mask> } <mask> </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove if dataLength > 400 { </s> add if length > 400 { </s> remove if dataLength > 900 { </s> add if length > 900 { </s> remove if dataLength > 900 { </s> add if length > 900 { </s> remove if dataLength > 1300 { </s> add if length > 1300 { </s> remove random.InitFromBinDatalen(lastHash[:16], dataLength) if dataLength > 1300 { </s> add random.InitFromBinAndLength(lastHash, length) if length > 1300 {
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_a.go
func (a *authChainA) initRC4Cipher() { key := core.Kdf(base64.StdEncoding.EncodeToString(a.userKey)+base64.StdEncoding.EncodeToString(a.lastClientHash), 16) a.encrypter, _ = rc4.NewCipher(key) a.decrypter, _ = rc4.NewCipher(key)
<mask> } <mask> return int(random.Next() % 1021) <mask> } <mask> <mask> func udpGetRandLen(random *shift128PlusContext, lastHash []byte) int { <mask> random.InitFromBin(lastHash[:16]) <mask> return int(random.Next() % 127) <mask> } <mask> <mask> type shift128PlusContext struct { <mask> v [2]uint64 <mask> } <mask> <mask> func (ctx *shift128PlusContext) InitFromBin(bin []byte) { <mask> var fillBin [16]byte <mask> copy(fillBin[:], bin) <mask> <mask> ctx.v[0] = binary.LittleEndian.Uint64(fillBin[:8]) <mask> ctx.v[1] = binary.LittleEndian.Uint64(fillBin[8:]) <mask> } <mask> <mask> func (ctx *shift128PlusContext) InitFromBinDatalen(bin []byte, datalen int) { <mask> var fillBin [16]byte <mask> copy(fillBin[:], bin) <mask> binary.LittleEndian.PutUint16(fillBin[:2], uint16(datalen)) <mask> <mask> ctx.v[0] = binary.LittleEndian.Uint64(fillBin[:8]) <mask> ctx.v[1] = binary.LittleEndian.Uint64(fillBin[8:]) <mask> <mask> for i := 0; i < 4; i++ { <mask> ctx.Next() <mask> } <mask> } <mask> <mask> func (ctx *shift128PlusContext) Next() uint64 { <mask> x := ctx.v[0] <mask> y := ctx.v[1] </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove func (ctx *shift128PlusContext) Next() uint64 { x := ctx.v[0] y := ctx.v[1] ctx.v[0] = y x ^= x << 23 x ^= y ^ (x >> 17) ^ (y >> 26) ctx.v[1] = x return x + y </s> add func udpGetRandLength(lastHash []byte, random *tools.XorShift128Plus) int { random.InitFromBin(lastHash) return int(random.Next() % 127) </s> remove sort.Ints(r.dataSizeList2) </s> add sort.Ints(a.dataSizeList) length = a.randomServer.Next()%16 + 8 for ; length > 0; length-- { a.dataSizeList2 = append(a.dataSizeList2, int(a.randomServer.Next()%2340%2040%1440)) } sort.Ints(a.dataSizeList2) </s> remove len = random.Next()%16 + 8 r.dataSizeList2 = make([]int, len) for i := 0; i < int(len); i++ { r.dataSizeList2[i] = int(random.Next() % 2340 % 2040 % 1440) </s> add a.randomServer.InitFromBin(a.Key) length := a.randomServer.Next()%8 + 4 for ; length > 0; length-- { a.dataSizeList = append(a.dataSizeList, int(a.randomServer.Next()%2340%2040%1440)) </s> remove sort.Ints(r.dataSizeList) </s> add p.iv = iv p.randDataLength = p.getRandLength p.initDataSize() return &Conn{Conn: c, Protocol: p} } func (a *authChainB) initDataSize() { a.dataSizeList = a.dataSizeList[:0] a.dataSizeList2 = a.dataSizeList2[:0] </s> remove func data2URLEncode(data []byte) (ret string) { for i := 0; i < len(data); i++ { ret = fmt.Sprintf("%s%%%s", ret, hex.EncodeToString([]byte{data[i]})) </s> add func packURLEncodedHeadData(buf *bytes.Buffer, data []byte) { dataLength := len(data) for i := 0; i < dataLength; i++ { buf.WriteRune('%') buf.WriteString(hex.EncodeToString(data[i : i+1]))
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "re...
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_a.go
func udpGetRandLength(lastHash []byte, random *tools.XorShift128Plus) int { random.InitFromBin(lastHash) return int(random.Next() % 127)
<mask> ctx.Next() <mask> } <mask> } <mask> <mask> func (ctx *shift128PlusContext) Next() uint64 { <mask> x := ctx.v[0] <mask> y := ctx.v[1] <mask> ctx.v[0] = y <mask> x ^= x << 23 <mask> x ^= y ^ (x >> 17) ^ (y >> 26) <mask> ctx.v[1] = x <mask> return x + y <mask> } </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove func udpGetRandLen(random *shift128PlusContext, lastHash []byte) int { random.InitFromBin(lastHash[:16]) return int(random.Next() % 127) } type shift128PlusContext struct { v [2]uint64 } func (ctx *shift128PlusContext) InitFromBin(bin []byte) { var fillBin [16]byte copy(fillBin[:], bin) ctx.v[0] = binary.LittleEndian.Uint64(fillBin[:8]) ctx.v[1] = binary.LittleEndian.Uint64(fillBin[8:]) } func (ctx *shift128PlusContext) InitFromBinDatalen(bin []byte, datalen int) { var fillBin [16]byte copy(fillBin[:], bin) binary.LittleEndian.PutUint16(fillBin[:2], uint16(datalen)) ctx.v[0] = binary.LittleEndian.Uint64(fillBin[:8]) ctx.v[1] = binary.LittleEndian.Uint64(fillBin[8:]) for i := 0; i < 4; i++ { ctx.Next() } </s> add func (a *authChainA) initRC4Cipher() { key := core.Kdf(base64.StdEncoding.EncodeToString(a.userKey)+base64.StdEncoding.EncodeToString(a.lastClientHash), 16) a.encrypter, _ = rc4.NewCipher(key) a.decrypter, _ = rc4.NewCipher(key) </s> remove func (a *authChain) packedDataLen(data []byte) (chunkLength, randLength int) { dataLength := len(data) randLength = a.getClientRandLen(dataLength, a.Overhead) chunkLength = randLength + dataLength + 2 + 2 return } </s> add length := uint16(len(data)) ^ binary.LittleEndian.Uint16(a.lastClientHash[14:16]) </s> remove func (a *authChain) Decode(b []byte) ([]byte, int, error) { a.buffer.Reset() key := pool.Get(len(a.userKey) + 4) defer pool.Put(key) readSize := 0 copy(key, a.userKey) for len(b) > 4 { binary.LittleEndian.PutUint32(key[len(a.userKey):], a.recvID) dataLen := (int)((uint(b[1]^a.lastServerHash[15]) << 8) + uint(b[0]^a.lastServerHash[14])) randLen := a.getServerRandLen(dataLen, a.Overhead) length := randLen + dataLen </s> add func (a *authChainA) Decode(dst, src *bytes.Buffer) error { if a.rawTrans { dst.ReadFrom(src) return nil } for src.Len() > 4 { macKey := pool.Get(len(a.userKey) + 4) defer pool.Put(macKey) copy(macKey, a.userKey) binary.LittleEndian.PutUint32(macKey[len(a.userKey):], a.recvID) dataLength := int(binary.LittleEndian.Uint16(src.Bytes()[:2]) ^ binary.LittleEndian.Uint16(a.lastServerHash[14:16])) randDataLength := a.randDataLength(dataLength, a.lastServerHash, &a.randomServer) length := dataLength + randDataLength </s> remove func (a *authChain) packData(outData []byte, data []byte, randLength int) { dataLength := len(data) outLength := randLength + dataLength + 2 outData[0] = byte(dataLength) ^ a.lastClientHash[14] outData[1] = byte(dataLength>>8) ^ a.lastClientHash[15] { if dataLength > 0 { randPart1Length := getRandStartPos(&a.randomClient, randLength) rand.Read(outData[2 : 2+randPart1Length]) a.enc.XORKeyStream(outData[2+randPart1Length:], data) rand.Read(outData[2+randPart1Length+dataLength : outLength]) } else { rand.Read(outData[2 : 2+randLength]) } } userKeyLen := uint8(len(a.userKey)) key := pool.Get(int(userKeyLen + 4)) defer pool.Put(key) copy(key, a.userKey) a.chunkID++ binary.LittleEndian.PutUint32(key[userKeyLen:], a.chunkID) a.lastClientHash = a.hmac(key, outData[:outLength]) copy(outData[outLength:], a.lastClientHash[:2]) </s> add originalLength := poolBuf.Len() binary.Write(poolBuf, binary.LittleEndian, length) a.putMixedRandDataAndData(poolBuf, data) a.lastClientHash = tools.HmacMD5(macKey, poolBuf.Bytes()[originalLength:]) poolBuf.Write(a.lastClientHash[:2]) </s> remove return nil, 0, errAuthChainDataLengthError </s> add a.rawTrans = true src.Reset() return errAuthChainLengthError
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_a.go
"net"
<mask> package protocol <mask> <mask> import ( <mask> "sort" <mask> <mask> "github.com/Dreamacro/clash/component/ssr/tools" <mask> ) </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove import ( "bytes" "crypto/aes" "crypto/cipher" "encoding/base64" "encoding/binary" "math/rand" "strconv" "strings" "time" "github.com/Dreamacro/clash/common/pool" "github.com/Dreamacro/clash/component/ssr/tools" "github.com/Dreamacro/go-shadowsocks2/core" ) type authAES128 struct { *Base *recvInfo *authData hasSentHeader bool packID uint32 userKey []byte uid [4]byte salt string hmac hmacMethod hashDigest hashDigestMethod } </s> add import "github.com/Dreamacro/clash/component/ssr/tools" </s> remove type origin struct{ *Base } </s> add import ( "bytes" "net" ) </s> remove // Base information for protocol </s> add import ( "bytes" "crypto/aes" "crypto/cipher" "encoding/base64" "encoding/binary" "math/rand" "sync" "time" "github.com/Dreamacro/clash/common/pool" "github.com/Dreamacro/clash/log" "github.com/Dreamacro/go-shadowsocks2/core" )
[ "keep", "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_b.go
register("auth_chain_b", newAuthChainB, 4) } type authChainB struct { *authChainA dataSizeList []int dataSizeList2 []int
<mask> "github.com/Dreamacro/clash/component/ssr/tools" <mask> ) <mask> <mask> func init() { <mask> register("auth_chain_b", newAuthChainB) <mask> } <mask> <mask> func newAuthChainB(b *Base) Protocol { <mask> return &authChain{ <mask> Base: b, </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove return &authChain{ Base: b, authData: &authData{}, salt: "auth_chain_b", hmac: tools.HmacMD5, hashDigest: tools.SHA1Sum, rnd: authChainBGetRandLen, </s> add a := &authChainB{ authChainA: &authChainA{ Base: b, authData: &authData{}, userData: &userData{}, salt: "auth_chain_b", }, </s> remove return &authChain{ Base: b, authData: &authData{}, salt: "auth_chain_a", hmac: tools.HmacMD5, hashDigest: tools.SHA1Sum, rnd: authChainAGetRandLen, </s> add a := &authChainA{ Base: b, authData: &authData{}, userData: &userData{}, salt: "auth_chain_a", </s> remove register("auth_aes128_sha1", newAuthAES128SHA1) </s> add register("auth_aes128_sha1", newAuthAES128SHA1, 9) } type authAES128Function struct { salt string hmac hmacMethod hashDigest hashDigestMethod } type authAES128 struct { *Base *authData *authAES128Function *userData iv []byte hasSentHeader bool rawTrans bool packID uint32 recvID uint32 </s> remove register("auth_aes128_md5", newAuthAES128MD5) </s> add register("auth_aes128_md5", newAuthAES128MD5, 9) </s> remove userKey []byte uid [4]byte salt string hmac hmacMethod hashDigest hashDigestMethod rnd rndMethod dataSizeList []int dataSizeList2 []int chunkID uint32 } func init() { register("auth_chain_a", newAuthChainA) </s> add encrypter cipher.Stream decrypter cipher.Stream randomClient tools.XorShift128Plus randomServer tools.XorShift128Plus randDataLength randDataLengthMethod packID uint32 recvID uint32
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_b.go
a := &authChainB{ authChainA: &authChainA{ Base: b, authData: &authData{}, userData: &userData{}, salt: "auth_chain_b", },
<mask> register("auth_chain_b", newAuthChainB) <mask> } <mask> <mask> func newAuthChainB(b *Base) Protocol { <mask> return &authChain{ <mask> Base: b, <mask> authData: &authData{}, <mask> salt: "auth_chain_b", <mask> hmac: tools.HmacMD5, <mask> hashDigest: tools.SHA1Sum, <mask> rnd: authChainBGetRandLen, <mask> } <mask> } <mask> <mask> func initDataSize(r *authChain) { <mask> random := &r.randomServer </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove return &authChain{ Base: b, authData: &authData{}, salt: "auth_chain_a", hmac: tools.HmacMD5, hashDigest: tools.SHA1Sum, rnd: authChainAGetRandLen, </s> add a := &authChainA{ Base: b, authData: &authData{}, userData: &userData{}, salt: "auth_chain_a", </s> remove register("auth_chain_b", newAuthChainB) </s> add register("auth_chain_b", newAuthChainB, 4) } type authChainB struct { *authChainA dataSizeList []int dataSizeList2 []int </s> remove func initDataSize(r *authChain) { random := &r.randomServer random.InitFromBin(r.Key) len := random.Next()%8 + 4 r.dataSizeList = make([]int, len) for i := 0; i < int(len); i++ { r.dataSizeList[i] = int(random.Next() % 2340 % 2040 % 1440) </s> add func (a *authChainB) StreamConn(c net.Conn, iv []byte) net.Conn { p := &authChainB{ authChainA: &authChainA{ Base: a.Base, authData: a.next(), userData: a.userData, salt: a.salt, packID: 1, recvID: 1, }, </s> remove func (a *authChain) initForConn(iv []byte) Protocol { r := &authChain{ Base: &Base{ IV: iv, Key: a.Key, TCPMss: a.TCPMss, Overhead: a.Overhead, Param: a.Param, }, recvInfo: &recvInfo{recvID: 1, buffer: new(bytes.Buffer)}, authData: a.authData, salt: a.salt, hmac: a.hmac, hashDigest: a.hashDigest, rnd: a.rnd, </s> add func (a *authChainA) initUserData() { params := strings.Split(a.Param, ":") if len(params) > 1 { if userID, err := strconv.ParseUint(params[0], 10, 32); err == nil { binary.LittleEndian.PutUint32(a.userID[:], uint32(userID)) a.userKey = []byte(params[1]) } else { log.Warnln("Wrong protocol-param for %s, only digits are expected before ':'", a.salt) } </s> remove if r.salt == "auth_chain_b" { initDataSize(r) </s> add if len(a.userKey) == 0 { a.userKey = a.Key rand.Read(a.userID[:])
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_b.go
a.initUserData() return a
<mask> }, <mask> } <mask> } <mask> <mask> func (a *authChainB) StreamConn(c net.Conn, iv []byte) net.Conn { <mask> p := &authChainB{ <mask> authChainA: &authChainA{ </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove func initDataSize(r *authChain) { random := &r.randomServer random.InitFromBin(r.Key) len := random.Next()%8 + 4 r.dataSizeList = make([]int, len) for i := 0; i < int(len); i++ { r.dataSizeList[i] = int(random.Next() % 2340 % 2040 % 1440) </s> add func (a *authChainB) StreamConn(c net.Conn, iv []byte) net.Conn { p := &authChainB{ authChainA: &authChainA{ Base: a.Base, authData: a.next(), userData: a.userData, salt: a.salt, packID: 1, recvID: 1, }, </s> remove func (a *authChain) GetProtocolOverhead() int { return 4 </s> add func (a *authChainA) StreamConn(c net.Conn, iv []byte) net.Conn { p := &authChainA{ Base: a.Base, authData: a.next(), userData: a.userData, salt: a.salt, packID: 1, recvID: 1, } p.iv = iv p.randDataLength = p.getRandLength return &Conn{Conn: c, Protocol: p} </s> remove func (a *authSHA1V4) initForConn(iv []byte) Protocol { return &authSHA1V4{ Base: &Base{ IV: iv, Key: a.Key, TCPMss: a.TCPMss, Overhead: a.Overhead, Param: a.Param, }, authData: a.authData, } } func (a *authSHA1V4) GetProtocolOverhead() int { return 7 </s> add func (a *authSHA1V4) StreamConn(c net.Conn, iv []byte) net.Conn { p := &authSHA1V4{Base: a.Base, authData: a.next()} p.iv = iv return &Conn{Conn: c, Protocol: p} </s> remove return &authChain{ Base: b, authData: &authData{}, salt: "auth_chain_b", hmac: tools.HmacMD5, hashDigest: tools.SHA1Sum, rnd: authChainBGetRandLen, </s> add a := &authChainB{ authChainA: &authChainA{ Base: b, authData: &authData{}, userData: &userData{}, salt: "auth_chain_b", }, </s> remove func (o *origin) GetProtocolOverhead() int { return 0 } </s> add func (o *origin) StreamConn(c net.Conn, iv []byte) net.Conn { return c }
[ "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_b.go
func (a *authChainB) StreamConn(c net.Conn, iv []byte) net.Conn { p := &authChainB{ authChainA: &authChainA{ Base: a.Base, authData: a.next(), userData: a.userData, salt: a.salt, packID: 1, recvID: 1, },
<mask> rnd: authChainBGetRandLen, <mask> } <mask> } <mask> <mask> func initDataSize(r *authChain) { <mask> random := &r.randomServer <mask> random.InitFromBin(r.Key) <mask> len := random.Next()%8 + 4 <mask> r.dataSizeList = make([]int, len) <mask> for i := 0; i < int(len); i++ { <mask> r.dataSizeList[i] = int(random.Next() % 2340 % 2040 % 1440) <mask> } <mask> sort.Ints(r.dataSizeList) <mask> <mask> len = random.Next()%16 + 8 <mask> r.dataSizeList2 = make([]int, len) </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove sort.Ints(r.dataSizeList) </s> add p.iv = iv p.randDataLength = p.getRandLength p.initDataSize() return &Conn{Conn: c, Protocol: p} } func (a *authChainB) initDataSize() { a.dataSizeList = a.dataSizeList[:0] a.dataSizeList2 = a.dataSizeList2[:0] </s> remove len = random.Next()%16 + 8 r.dataSizeList2 = make([]int, len) for i := 0; i < int(len); i++ { r.dataSizeList2[i] = int(random.Next() % 2340 % 2040 % 1440) </s> add a.randomServer.InitFromBin(a.Key) length := a.randomServer.Next()%8 + 4 for ; length > 0; length-- { a.dataSizeList = append(a.dataSizeList, int(a.randomServer.Next()%2340%2040%1440)) </s> remove sort.Ints(r.dataSizeList2) </s> add sort.Ints(a.dataSizeList) length = a.randomServer.Next()%16 + 8 for ; length > 0; length-- { a.dataSizeList2 = append(a.dataSizeList2, int(a.randomServer.Next()%2340%2040%1440)) } sort.Ints(a.dataSizeList2) </s> remove func udpGetRandLen(random *shift128PlusContext, lastHash []byte) int { random.InitFromBin(lastHash[:16]) return int(random.Next() % 127) } type shift128PlusContext struct { v [2]uint64 } func (ctx *shift128PlusContext) InitFromBin(bin []byte) { var fillBin [16]byte copy(fillBin[:], bin) ctx.v[0] = binary.LittleEndian.Uint64(fillBin[:8]) ctx.v[1] = binary.LittleEndian.Uint64(fillBin[8:]) } func (ctx *shift128PlusContext) InitFromBinDatalen(bin []byte, datalen int) { var fillBin [16]byte copy(fillBin[:], bin) binary.LittleEndian.PutUint16(fillBin[:2], uint16(datalen)) ctx.v[0] = binary.LittleEndian.Uint64(fillBin[:8]) ctx.v[1] = binary.LittleEndian.Uint64(fillBin[8:]) for i := 0; i < 4; i++ { ctx.Next() } </s> add func (a *authChainA) initRC4Cipher() { key := core.Kdf(base64.StdEncoding.EncodeToString(a.userKey)+base64.StdEncoding.EncodeToString(a.lastClientHash), 16) a.encrypter, _ = rc4.NewCipher(key) a.decrypter, _ = rc4.NewCipher(key) </s> remove return &authChain{ Base: b, authData: &authData{}, salt: "auth_chain_b", hmac: tools.HmacMD5, hashDigest: tools.SHA1Sum, rnd: authChainBGetRandLen, </s> add a := &authChainB{ authChainA: &authChainA{ Base: b, authData: &authData{}, userData: &userData{}, salt: "auth_chain_b", },
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_b.go
p.iv = iv p.randDataLength = p.getRandLength p.initDataSize() return &Conn{Conn: c, Protocol: p} } func (a *authChainB) initDataSize() { a.dataSizeList = a.dataSizeList[:0] a.dataSizeList2 = a.dataSizeList2[:0]
<mask> r.dataSizeList = make([]int, len) <mask> for i := 0; i < int(len); i++ { <mask> r.dataSizeList[i] = int(random.Next() % 2340 % 2040 % 1440) <mask> } <mask> sort.Ints(r.dataSizeList) <mask> <mask> len = random.Next()%16 + 8 <mask> r.dataSizeList2 = make([]int, len) <mask> for i := 0; i < int(len); i++ { <mask> r.dataSizeList2[i] = int(random.Next() % 2340 % 2040 % 1440) </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove len = random.Next()%16 + 8 r.dataSizeList2 = make([]int, len) for i := 0; i < int(len); i++ { r.dataSizeList2[i] = int(random.Next() % 2340 % 2040 % 1440) </s> add a.randomServer.InitFromBin(a.Key) length := a.randomServer.Next()%8 + 4 for ; length > 0; length-- { a.dataSizeList = append(a.dataSizeList, int(a.randomServer.Next()%2340%2040%1440)) </s> remove func initDataSize(r *authChain) { random := &r.randomServer random.InitFromBin(r.Key) len := random.Next()%8 + 4 r.dataSizeList = make([]int, len) for i := 0; i < int(len); i++ { r.dataSizeList[i] = int(random.Next() % 2340 % 2040 % 1440) </s> add func (a *authChainB) StreamConn(c net.Conn, iv []byte) net.Conn { p := &authChainB{ authChainA: &authChainA{ Base: a.Base, authData: a.next(), userData: a.userData, salt: a.salt, packID: 1, recvID: 1, }, </s> remove sort.Ints(r.dataSizeList2) </s> add sort.Ints(a.dataSizeList) length = a.randomServer.Next()%16 + 8 for ; length > 0; length-- { a.dataSizeList2 = append(a.dataSizeList2, int(a.randomServer.Next()%2340%2040%1440)) } sort.Ints(a.dataSizeList2) </s> remove func udpGetRandLen(random *shift128PlusContext, lastHash []byte) int { random.InitFromBin(lastHash[:16]) return int(random.Next() % 127) } type shift128PlusContext struct { v [2]uint64 } func (ctx *shift128PlusContext) InitFromBin(bin []byte) { var fillBin [16]byte copy(fillBin[:], bin) ctx.v[0] = binary.LittleEndian.Uint64(fillBin[:8]) ctx.v[1] = binary.LittleEndian.Uint64(fillBin[8:]) } func (ctx *shift128PlusContext) InitFromBinDatalen(bin []byte, datalen int) { var fillBin [16]byte copy(fillBin[:], bin) binary.LittleEndian.PutUint16(fillBin[:2], uint16(datalen)) ctx.v[0] = binary.LittleEndian.Uint64(fillBin[:8]) ctx.v[1] = binary.LittleEndian.Uint64(fillBin[8:]) for i := 0; i < 4; i++ { ctx.Next() } </s> add func (a *authChainA) initRC4Cipher() { key := core.Kdf(base64.StdEncoding.EncodeToString(a.userKey)+base64.StdEncoding.EncodeToString(a.lastClientHash), 16) a.encrypter, _ = rc4.NewCipher(key) a.decrypter, _ = rc4.NewCipher(key) </s> remove return </s> add
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_b.go
a.randomServer.InitFromBin(a.Key) length := a.randomServer.Next()%8 + 4 for ; length > 0; length-- { a.dataSizeList = append(a.dataSizeList, int(a.randomServer.Next()%2340%2040%1440))
<mask> r.dataSizeList[i] = int(random.Next() % 2340 % 2040 % 1440) <mask> } <mask> sort.Ints(r.dataSizeList) <mask> <mask> len = random.Next()%16 + 8 <mask> r.dataSizeList2 = make([]int, len) <mask> for i := 0; i < int(len); i++ { <mask> r.dataSizeList2[i] = int(random.Next() % 2340 % 2040 % 1440) <mask> } <mask> sort.Ints(r.dataSizeList2) <mask> } <mask> <mask> func authChainBGetRandLen(dataLength int, random *shift128PlusContext, lastHash []byte, dataSizeList, dataSizeList2 []int, overhead int) int { </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove sort.Ints(r.dataSizeList) </s> add p.iv = iv p.randDataLength = p.getRandLength p.initDataSize() return &Conn{Conn: c, Protocol: p} } func (a *authChainB) initDataSize() { a.dataSizeList = a.dataSizeList[:0] a.dataSizeList2 = a.dataSizeList2[:0] </s> remove sort.Ints(r.dataSizeList2) </s> add sort.Ints(a.dataSizeList) length = a.randomServer.Next()%16 + 8 for ; length > 0; length-- { a.dataSizeList2 = append(a.dataSizeList2, int(a.randomServer.Next()%2340%2040%1440)) } sort.Ints(a.dataSizeList2) </s> remove func initDataSize(r *authChain) { random := &r.randomServer random.InitFromBin(r.Key) len := random.Next()%8 + 4 r.dataSizeList = make([]int, len) for i := 0; i < int(len); i++ { r.dataSizeList[i] = int(random.Next() % 2340 % 2040 % 1440) </s> add func (a *authChainB) StreamConn(c net.Conn, iv []byte) net.Conn { p := &authChainB{ authChainA: &authChainA{ Base: a.Base, authData: a.next(), userData: a.userData, salt: a.salt, packID: 1, recvID: 1, }, </s> remove return 0 </s> add return int(random.Next()%8589934609) % length </s> remove func getRandStartPos(random *shift128PlusContext, randLength int) int { if randLength > 0 { return int(random.Next() % 8589934609 % uint64(randLength)) </s> add func getRandStartPos(length int, random *tools.XorShift128Plus) int { if length == 0 { return 0
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_b.go
sort.Ints(a.dataSizeList) length = a.randomServer.Next()%16 + 8 for ; length > 0; length-- { a.dataSizeList2 = append(a.dataSizeList2, int(a.randomServer.Next()%2340%2040%1440)) } sort.Ints(a.dataSizeList2)
<mask> r.dataSizeList2 = make([]int, len) <mask> for i := 0; i < int(len); i++ { <mask> r.dataSizeList2[i] = int(random.Next() % 2340 % 2040 % 1440) <mask> } <mask> sort.Ints(r.dataSizeList2) <mask> } <mask> <mask> func authChainBGetRandLen(dataLength int, random *shift128PlusContext, lastHash []byte, dataSizeList, dataSizeList2 []int, overhead int) int { <mask> if dataLength > 1440 { <mask> return 0 </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove len = random.Next()%16 + 8 r.dataSizeList2 = make([]int, len) for i := 0; i < int(len); i++ { r.dataSizeList2[i] = int(random.Next() % 2340 % 2040 % 1440) </s> add a.randomServer.InitFromBin(a.Key) length := a.randomServer.Next()%8 + 4 for ; length > 0; length-- { a.dataSizeList = append(a.dataSizeList, int(a.randomServer.Next()%2340%2040%1440)) </s> remove sort.Ints(r.dataSizeList) </s> add p.iv = iv p.randDataLength = p.getRandLength p.initDataSize() return &Conn{Conn: c, Protocol: p} } func (a *authChainB) initDataSize() { a.dataSizeList = a.dataSizeList[:0] a.dataSizeList2 = a.dataSizeList2[:0] </s> remove func initDataSize(r *authChain) { random := &r.randomServer random.InitFromBin(r.Key) len := random.Next()%8 + 4 r.dataSizeList = make([]int, len) for i := 0; i < int(len); i++ { r.dataSizeList[i] = int(random.Next() % 2340 % 2040 % 1440) </s> add func (a *authChainB) StreamConn(c net.Conn, iv []byte) net.Conn { p := &authChainB{ authChainA: &authChainA{ Base: a.Base, authData: a.next(), userData: a.userData, salt: a.salt, packID: 1, recvID: 1, }, </s> remove return 0 </s> add return int(random.Next()%8589934609) % length </s> remove func authChainAGetRandLen(dataLength int, random *shift128PlusContext, lastHash []byte, dataSizeList, dataSizeList2 []int, overhead int) int { if dataLength > 1440 { </s> add func (a *authChainA) getRandLength(length int, lastHash []byte, random *tools.XorShift128Plus) int { if length > 1440 {
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_b.go
func (a *authChainB) getRandLength(length int, lashHash []byte, random *tools.XorShift128Plus) int { if length >= 1440 {
<mask> } <mask> sort.Ints(r.dataSizeList2) <mask> } <mask> <mask> func authChainBGetRandLen(dataLength int, random *shift128PlusContext, lastHash []byte, dataSizeList, dataSizeList2 []int, overhead int) int { <mask> if dataLength > 1440 { <mask> return 0 <mask> } <mask> random.InitFromBinDatalen(lastHash[:16], dataLength) <mask> pos := sort.Search(len(dataSizeList), func(i int) bool { return dataSizeList[i] > dataLength+overhead }) <mask> finalPos := uint64(pos) + random.Next()%uint64(len(dataSizeList)) </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove random.InitFromBinDatalen(lastHash[:16], dataLength) pos := sort.Search(len(dataSizeList), func(i int) bool { return dataSizeList[i] > dataLength+overhead }) finalPos := uint64(pos) + random.Next()%uint64(len(dataSizeList)) if finalPos < uint64(len(dataSizeList)) { return dataSizeList[finalPos] - dataLength - overhead </s> add random.InitFromBinAndLength(lashHash, length) pos := sort.Search(len(a.dataSizeList), func(i int) bool { return a.dataSizeList[i] >= length+a.Overhead }) finalPos := pos + int(random.Next()%uint64(len(a.dataSizeList))) if finalPos < len(a.dataSizeList) { return a.dataSizeList[finalPos] - length - a.Overhead </s> remove func authChainAGetRandLen(dataLength int, random *shift128PlusContext, lastHash []byte, dataSizeList, dataSizeList2 []int, overhead int) int { if dataLength > 1440 { </s> add func (a *authChainA) getRandLength(length int, lastHash []byte, random *tools.XorShift128Plus) int { if length > 1440 { </s> remove random.InitFromBinDatalen(lastHash[:16], dataLength) if dataLength > 1300 { </s> add random.InitFromBinAndLength(lastHash, length) if length > 1300 { </s> remove sort.Ints(r.dataSizeList2) </s> add sort.Ints(a.dataSizeList) length = a.randomServer.Next()%16 + 8 for ; length > 0; length-- { a.dataSizeList2 = append(a.dataSizeList2, int(a.randomServer.Next()%2340%2040%1440)) } sort.Ints(a.dataSizeList2) </s> remove pos = sort.Search(len(dataSizeList2), func(i int) bool { return dataSizeList2[i] > dataLength+overhead }) finalPos = uint64(pos) + random.Next()%uint64(len(dataSizeList2)) if finalPos < uint64(len(dataSizeList2)) { return dataSizeList2[finalPos] - dataLength - overhead </s> add pos = sort.Search(len(a.dataSizeList2), func(i int) bool { return a.dataSizeList2[i] >= length+a.Overhead }) finalPos = pos + int(random.Next()%uint64(len(a.dataSizeList2))) if finalPos < len(a.dataSizeList2) { return a.dataSizeList2[finalPos] - length - a.Overhead
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_b.go
random.InitFromBinAndLength(lashHash, length) pos := sort.Search(len(a.dataSizeList), func(i int) bool { return a.dataSizeList[i] >= length+a.Overhead }) finalPos := pos + int(random.Next()%uint64(len(a.dataSizeList))) if finalPos < len(a.dataSizeList) { return a.dataSizeList[finalPos] - length - a.Overhead
<mask> func authChainBGetRandLen(dataLength int, random *shift128PlusContext, lastHash []byte, dataSizeList, dataSizeList2 []int, overhead int) int { <mask> if dataLength > 1440 { <mask> return 0 <mask> } <mask> random.InitFromBinDatalen(lastHash[:16], dataLength) <mask> pos := sort.Search(len(dataSizeList), func(i int) bool { return dataSizeList[i] > dataLength+overhead }) <mask> finalPos := uint64(pos) + random.Next()%uint64(len(dataSizeList)) <mask> if finalPos < uint64(len(dataSizeList)) { <mask> return dataSizeList[finalPos] - dataLength - overhead <mask> } <mask> <mask> pos = sort.Search(len(dataSizeList2), func(i int) bool { return dataSizeList2[i] > dataLength+overhead }) <mask> finalPos = uint64(pos) + random.Next()%uint64(len(dataSizeList2)) <mask> if finalPos < uint64(len(dataSizeList2)) { </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove pos = sort.Search(len(dataSizeList2), func(i int) bool { return dataSizeList2[i] > dataLength+overhead }) finalPos = uint64(pos) + random.Next()%uint64(len(dataSizeList2)) if finalPos < uint64(len(dataSizeList2)) { return dataSizeList2[finalPos] - dataLength - overhead </s> add pos = sort.Search(len(a.dataSizeList2), func(i int) bool { return a.dataSizeList2[i] >= length+a.Overhead }) finalPos = pos + int(random.Next()%uint64(len(a.dataSizeList2))) if finalPos < len(a.dataSizeList2) { return a.dataSizeList2[finalPos] - length - a.Overhead </s> remove func authChainBGetRandLen(dataLength int, random *shift128PlusContext, lastHash []byte, dataSizeList, dataSizeList2 []int, overhead int) int { if dataLength > 1440 { </s> add func (a *authChainB) getRandLength(length int, lashHash []byte, random *tools.XorShift128Plus) int { if length >= 1440 { </s> remove if finalPos < uint64(pos+len(dataSizeList2)-1) { </s> add if finalPos < pos+len(a.dataSizeList2)-1 { </s> remove func authChainAGetRandLen(dataLength int, random *shift128PlusContext, lastHash []byte, dataSizeList, dataSizeList2 []int, overhead int) int { if dataLength > 1440 { </s> add func (a *authChainA) getRandLength(length int, lastHash []byte, random *tools.XorShift128Plus) int { if length > 1440 { </s> remove random.InitFromBinDatalen(lastHash[:16], dataLength) if dataLength > 1300 { </s> add random.InitFromBinAndLength(lastHash, length) if length > 1300 {
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_b.go
pos = sort.Search(len(a.dataSizeList2), func(i int) bool { return a.dataSizeList2[i] >= length+a.Overhead }) finalPos = pos + int(random.Next()%uint64(len(a.dataSizeList2))) if finalPos < len(a.dataSizeList2) { return a.dataSizeList2[finalPos] - length - a.Overhead
<mask> if finalPos < uint64(len(dataSizeList)) { <mask> return dataSizeList[finalPos] - dataLength - overhead <mask> } <mask> <mask> pos = sort.Search(len(dataSizeList2), func(i int) bool { return dataSizeList2[i] > dataLength+overhead }) <mask> finalPos = uint64(pos) + random.Next()%uint64(len(dataSizeList2)) <mask> if finalPos < uint64(len(dataSizeList2)) { <mask> return dataSizeList2[finalPos] - dataLength - overhead <mask> } <mask> if finalPos < uint64(pos+len(dataSizeList2)-1) { <mask> return 0 <mask> } <mask> </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove random.InitFromBinDatalen(lastHash[:16], dataLength) pos := sort.Search(len(dataSizeList), func(i int) bool { return dataSizeList[i] > dataLength+overhead }) finalPos := uint64(pos) + random.Next()%uint64(len(dataSizeList)) if finalPos < uint64(len(dataSizeList)) { return dataSizeList[finalPos] - dataLength - overhead </s> add random.InitFromBinAndLength(lashHash, length) pos := sort.Search(len(a.dataSizeList), func(i int) bool { return a.dataSizeList[i] >= length+a.Overhead }) finalPos := pos + int(random.Next()%uint64(len(a.dataSizeList))) if finalPos < len(a.dataSizeList) { return a.dataSizeList[finalPos] - length - a.Overhead </s> remove if finalPos < uint64(pos+len(dataSizeList2)-1) { </s> add if finalPos < pos+len(a.dataSizeList2)-1 { </s> remove func authChainBGetRandLen(dataLength int, random *shift128PlusContext, lastHash []byte, dataSizeList, dataSizeList2 []int, overhead int) int { if dataLength > 1440 { </s> add func (a *authChainB) getRandLength(length int, lashHash []byte, random *tools.XorShift128Plus) int { if length >= 1440 { </s> remove if dataLength > 1300 { </s> add if length > 1300 { </s> remove if adler32.Checksum(b[:length-4]) == binary.LittleEndian.Uint32(b[length-4:]) { pos := int(b[4]) if pos != 0xFF { pos += 4 } else { pos = int(binary.BigEndian.Uint16(b[5:5+2])) + 4 } retSize := length - pos - 4 a.buffer.Write(b[pos : pos+retSize]) bSize -= length b = b[length:] </s> add if adler32.Checksum(src.Bytes()[:length-4]) != binary.LittleEndian.Uint32(src.Bytes()[length-4:length]) { a.rawTrans = true src.Reset() return errAuthSHA1V4Adler32Error } pos := int(src.Bytes()[4]) if pos < 255 { pos += 4
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_b.go
if finalPos < pos+len(a.dataSizeList2)-1 {
<mask> finalPos = uint64(pos) + random.Next()%uint64(len(dataSizeList2)) <mask> if finalPos < uint64(len(dataSizeList2)) { <mask> return dataSizeList2[finalPos] - dataLength - overhead <mask> } <mask> if finalPos < uint64(pos+len(dataSizeList2)-1) { <mask> return 0 <mask> } <mask> <mask> if dataLength > 1300 { <mask> return int(random.Next() % 31) </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove pos = sort.Search(len(dataSizeList2), func(i int) bool { return dataSizeList2[i] > dataLength+overhead }) finalPos = uint64(pos) + random.Next()%uint64(len(dataSizeList2)) if finalPos < uint64(len(dataSizeList2)) { return dataSizeList2[finalPos] - dataLength - overhead </s> add pos = sort.Search(len(a.dataSizeList2), func(i int) bool { return a.dataSizeList2[i] >= length+a.Overhead }) finalPos = pos + int(random.Next()%uint64(len(a.dataSizeList2))) if finalPos < len(a.dataSizeList2) { return a.dataSizeList2[finalPos] - length - a.Overhead </s> remove random.InitFromBinDatalen(lastHash[:16], dataLength) pos := sort.Search(len(dataSizeList), func(i int) bool { return dataSizeList[i] > dataLength+overhead }) finalPos := uint64(pos) + random.Next()%uint64(len(dataSizeList)) if finalPos < uint64(len(dataSizeList)) { return dataSizeList[finalPos] - dataLength - overhead </s> add random.InitFromBinAndLength(lashHash, length) pos := sort.Search(len(a.dataSizeList), func(i int) bool { return a.dataSizeList[i] >= length+a.Overhead }) finalPos := pos + int(random.Next()%uint64(len(a.dataSizeList))) if finalPos < len(a.dataSizeList) { return a.dataSizeList[finalPos] - length - a.Overhead </s> remove if dataLength > 1300 { </s> add if length > 1300 { </s> remove random.InitFromBinDatalen(lastHash[:16], dataLength) if dataLength > 1300 { </s> add random.InitFromBinAndLength(lastHash, length) if length > 1300 { </s> remove if dataLength > 900 { </s> add if length > 900 {
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_b.go
if length > 1300 {
<mask> } <mask> if finalPos < uint64(pos+len(dataSizeList2)-1) { <mask> return 0 <mask> } <mask> <mask> if dataLength > 1300 { <mask> return int(random.Next() % 31) <mask> } <mask> if dataLength > 900 { <mask> return int(random.Next() % 127) <mask> } </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove if dataLength > 900 { </s> add if length > 900 { </s> remove if dataLength > 900 { </s> add if length > 900 { </s> remove if finalPos < uint64(pos+len(dataSizeList2)-1) { </s> add if finalPos < pos+len(a.dataSizeList2)-1 { </s> remove random.InitFromBinDatalen(lastHash[:16], dataLength) if dataLength > 1300 { </s> add random.InitFromBinAndLength(lastHash, length) if length > 1300 { </s> remove if dataLength > 400 { </s> add if length > 400 {
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_b.go
if length > 900 {
<mask> <mask> if dataLength > 1300 { <mask> return int(random.Next() % 31) <mask> } <mask> if dataLength > 900 { <mask> return int(random.Next() % 127) <mask> } <mask> if dataLength > 400 { <mask> return int(random.Next() % 521) <mask> } </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove if dataLength > 900 { </s> add if length > 900 { </s> remove if dataLength > 400 { </s> add if length > 400 { </s> remove if dataLength > 400 { </s> add if length > 400 { </s> remove if dataLength > 1300 { </s> add if length > 1300 { </s> remove random.InitFromBinDatalen(lastHash[:16], dataLength) if dataLength > 1300 { </s> add random.InitFromBinAndLength(lastHash, length) if length > 1300 {
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_b.go
if length > 400 {
<mask> } <mask> if dataLength > 900 { <mask> return int(random.Next() % 127) <mask> } <mask> if dataLength > 400 { <mask> return int(random.Next() % 521) <mask> } <mask> return int(random.Next() % 1021) <mask> } </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain>
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_chain_b.go
"net"
<mask> "encoding/binary" <mask> "hash/adler32" <mask> "hash/crc32" <mask> "math/rand" <mask> "time" <mask> <mask> "github.com/Dreamacro/clash/common/pool" <mask> "github.com/Dreamacro/clash/component/ssr/tools" <mask> ) <mask> </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove "time" </s> add </s> remove import ( "bytes" "crypto/aes" "crypto/cipher" "encoding/base64" "encoding/binary" "math/rand" "strconv" "strings" "time" "github.com/Dreamacro/clash/common/pool" "github.com/Dreamacro/clash/component/ssr/tools" "github.com/Dreamacro/go-shadowsocks2/core" ) type authAES128 struct { *Base *recvInfo *authData hasSentHeader bool packID uint32 userKey []byte uid [4]byte salt string hmac hmacMethod hashDigest hashDigestMethod } </s> add import "github.com/Dreamacro/clash/component/ssr/tools" </s> remove "math/rand" </s> add "net" </s> remove // Base information for protocol </s> add import ( "bytes" "crypto/aes" "crypto/cipher" "encoding/base64" "encoding/binary" "math/rand" "sync" "time" "github.com/Dreamacro/clash/common/pool" "github.com/Dreamacro/clash/log" "github.com/Dreamacro/go-shadowsocks2/core" )
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_sha1_v4.go
func init() { register("auth_sha1_v4", newAuthSHA1V4, 7) }
<mask> "github.com/Dreamacro/clash/common/pool" <mask> "github.com/Dreamacro/clash/component/ssr/tools" <mask> ) <mask> <mask> type authSHA1V4 struct { <mask> *Base <mask> *authData <mask> iv []byte <mask> hasSentHeader bool </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove headerSent bool buffer bytes.Buffer } func init() { register("auth_sha1_v4", newAuthSHA1V4) </s> add iv []byte hasSentHeader bool rawTrans bool </s> remove register("auth_aes128_sha1", newAuthAES128SHA1) </s> add register("auth_aes128_sha1", newAuthAES128SHA1, 9) } type authAES128Function struct { salt string hmac hmacMethod hashDigest hashDigestMethod } type authAES128 struct { *Base *authData *authAES128Function *userData iv []byte hasSentHeader bool rawTrans bool packID uint32 recvID uint32 </s> remove import ( "bytes" "crypto/aes" "crypto/cipher" "encoding/base64" "encoding/binary" "math/rand" "strconv" "strings" "time" "github.com/Dreamacro/clash/common/pool" "github.com/Dreamacro/clash/component/ssr/tools" "github.com/Dreamacro/go-shadowsocks2/core" ) type authAES128 struct { *Base *recvInfo *authData hasSentHeader bool packID uint32 userKey []byte uid [4]byte salt string hmac hmacMethod hashDigest hashDigestMethod } </s> add import "github.com/Dreamacro/clash/component/ssr/tools" </s> remove randomClient shift128PlusContext randomServer shift128PlusContext enc cipher.Stream dec cipher.Stream headerSent bool </s> add *userData iv []byte salt string hasSentHeader bool rawTrans bool </s> remove type authChain struct { </s> add func init() { register("auth_chain_a", newAuthChainA, 4) } type randDataLengthMethod func(int, []byte, *tools.XorShift128Plus) int type authChainA struct {
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_sha1_v4.go
iv []byte hasSentHeader bool rawTrans bool
<mask> <mask> type authSHA1V4 struct { <mask> *Base <mask> *authData <mask> headerSent bool <mask> buffer bytes.Buffer <mask> } <mask> <mask> func init() { <mask> register("auth_sha1_v4", newAuthSHA1V4) <mask> } <mask> <mask> func newAuthSHA1V4(b *Base) Protocol { <mask> return &authSHA1V4{Base: b, authData: &authData{}} <mask> } </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove func init() { register("random_head", newRandomHead) </s> add type randomHead struct { *Base </s> remove func (a *authSHA1V4) initForConn(iv []byte) Protocol { return &authSHA1V4{ Base: &Base{ IV: iv, Key: a.Key, TCPMss: a.TCPMss, Overhead: a.Overhead, Param: a.Param, }, authData: a.authData, } } func (a *authSHA1V4) GetProtocolOverhead() int { return 7 </s> add func (a *authSHA1V4) StreamConn(c net.Conn, iv []byte) net.Conn { p := &authSHA1V4{Base: a.Base, authData: a.next()} p.iv = iv return &Conn{Conn: c, Protocol: p} </s> remove type randomHead struct { *Base firstRequest bool firstResponse bool headerSent bool buffer []byte </s> add func init() { register("random_head", newRandomHead, 0) </s> remove register("auth_aes128_sha1", newAuthAES128SHA1) </s> add register("auth_aes128_sha1", newAuthAES128SHA1, 9) } type authAES128Function struct { salt string hmac hmacMethod hashDigest hashDigestMethod } type authAES128 struct { *Base *authData *authAES128Function *userData iv []byte hasSentHeader bool rawTrans bool packID uint32 recvID uint32
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_sha1_v4.go
func (a *authSHA1V4) StreamConn(c net.Conn, iv []byte) net.Conn { p := &authSHA1V4{Base: a.Base, authData: a.next()} p.iv = iv return &Conn{Conn: c, Protocol: p}
<mask> func newAuthSHA1V4(b *Base) Protocol { <mask> return &authSHA1V4{Base: b, authData: &authData{}} <mask> } <mask> <mask> func (a *authSHA1V4) initForConn(iv []byte) Protocol { <mask> return &authSHA1V4{ <mask> Base: &Base{ <mask> IV: iv, <mask> Key: a.Key, <mask> TCPMss: a.TCPMss, <mask> Overhead: a.Overhead, <mask> Param: a.Param, <mask> }, <mask> authData: a.authData, <mask> } <mask> } <mask> <mask> func (a *authSHA1V4) GetProtocolOverhead() int { <mask> return 7 <mask> } <mask> <mask> func (a *authSHA1V4) SetOverhead(overhead int) { <mask> a.Overhead = overhead <mask> } </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove func (a *authChain) initForConn(iv []byte) Protocol { r := &authChain{ Base: &Base{ IV: iv, Key: a.Key, TCPMss: a.TCPMss, Overhead: a.Overhead, Param: a.Param, }, recvInfo: &recvInfo{recvID: 1, buffer: new(bytes.Buffer)}, authData: a.authData, salt: a.salt, hmac: a.hmac, hashDigest: a.hashDigest, rnd: a.rnd, </s> add func (a *authChainA) initUserData() { params := strings.Split(a.Param, ":") if len(params) > 1 { if userID, err := strconv.ParseUint(params[0], 10, 32); err == nil { binary.LittleEndian.PutUint32(a.userID[:], uint32(userID)) a.userKey = []byte(params[1]) } else { log.Warnln("Wrong protocol-param for %s, only digits are expected before ':'", a.salt) } </s> remove func (a *authSHA1V4) SetOverhead(overhead int) { a.Overhead = overhead </s> add func (a *authSHA1V4) PacketConn(c net.PacketConn) net.PacketConn { return c </s> remove headerSent bool buffer bytes.Buffer } func init() { register("auth_sha1_v4", newAuthSHA1V4) </s> add iv []byte hasSentHeader bool rawTrans bool </s> remove func (a *authChain) GetProtocolOverhead() int { return 4 </s> add func (a *authChainA) StreamConn(c net.Conn, iv []byte) net.Conn { p := &authChainA{ Base: a.Base, authData: a.next(), userData: a.userData, salt: a.salt, packID: 1, recvID: 1, } p.iv = iv p.randDataLength = p.getRandLength return &Conn{Conn: c, Protocol: p} </s> remove return &authChain{ Base: b, authData: &authData{}, salt: "auth_chain_a", hmac: tools.HmacMD5, hashDigest: tools.SHA1Sum, rnd: authChainAGetRandLen, </s> add a := &authChainA{ Base: b, authData: &authData{}, userData: &userData{}, salt: "auth_chain_a",
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_sha1_v4.go
func (a *authSHA1V4) PacketConn(c net.PacketConn) net.PacketConn { return c
<mask> func (a *authSHA1V4) GetProtocolOverhead() int { <mask> return 7 <mask> } <mask> <mask> func (a *authSHA1V4) SetOverhead(overhead int) { <mask> a.Overhead = overhead <mask> } <mask> <mask> func (a *authSHA1V4) Decode(b []byte) ([]byte, int, error) { <mask> a.buffer.Reset() <mask> bSize := len(b) </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove func (a *authSHA1V4) Decode(b []byte) ([]byte, int, error) { a.buffer.Reset() bSize := len(b) originalSize := bSize for bSize > 4 { crc := crc32.ChecksumIEEE(b[:2]) & 0xFFFF if binary.LittleEndian.Uint16(b[2:4]) != uint16(crc) { return nil, 0, errAuthSHA1v4CRC32Error </s> add func (a *authSHA1V4) Decode(dst, src *bytes.Buffer) error { if a.rawTrans { dst.ReadFrom(src) return nil } for src.Len() > 4 { if uint16(crc32.ChecksumIEEE(src.Bytes()[:2])&0xffff) != binary.LittleEndian.Uint16(src.Bytes()[2:4]) { src.Reset() return errAuthSHA1V4CRC32Error </s> remove func (a *authSHA1V4) initForConn(iv []byte) Protocol { return &authSHA1V4{ Base: &Base{ IV: iv, Key: a.Key, TCPMss: a.TCPMss, Overhead: a.Overhead, Param: a.Param, }, authData: a.authData, } } func (a *authSHA1V4) GetProtocolOverhead() int { return 7 </s> add func (a *authSHA1V4) StreamConn(c net.Conn, iv []byte) net.Conn { p := &authSHA1V4{Base: a.Base, authData: a.next()} p.iv = iv return &Conn{Conn: c, Protocol: p} </s> remove func (a *authChain) SetOverhead(overhead int) { a.Overhead = overhead </s> add func (a *authChainA) PacketConn(c net.PacketConn) net.PacketConn { p := &authChainA{ Base: a.Base, salt: a.salt, userData: a.userData, } return &PacketConn{PacketConn: c, Protocol: p} </s> remove func (a *authSHA1V4) EncodePacket(b []byte) ([]byte, error) { return b, nil } </s> add func (a *authSHA1V4) DecodePacket(b []byte) ([]byte, error) { return b, nil } </s> remove return a.buffer.Bytes(), originalSize - bSize, nil </s> add return nil
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_sha1_v4.go
func (a *authSHA1V4) Decode(dst, src *bytes.Buffer) error { if a.rawTrans { dst.ReadFrom(src) return nil } for src.Len() > 4 { if uint16(crc32.ChecksumIEEE(src.Bytes()[:2])&0xffff) != binary.LittleEndian.Uint16(src.Bytes()[2:4]) { src.Reset() return errAuthSHA1V4CRC32Error
<mask> func (a *authSHA1V4) SetOverhead(overhead int) { <mask> a.Overhead = overhead <mask> } <mask> <mask> func (a *authSHA1V4) Decode(b []byte) ([]byte, int, error) { <mask> a.buffer.Reset() <mask> bSize := len(b) <mask> originalSize := bSize <mask> for bSize > 4 { <mask> crc := crc32.ChecksumIEEE(b[:2]) & 0xFFFF <mask> if binary.LittleEndian.Uint16(b[2:4]) != uint16(crc) { <mask> return nil, 0, errAuthSHA1v4CRC32Error <mask> } <mask> length := int(binary.BigEndian.Uint16(b[:2])) <mask> if length >= 8192 || length < 8 { <mask> return nil, 0, errAuthSHA1v4DataLengthError <mask> } </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove length := int(binary.BigEndian.Uint16(b[:2])) if length >= 8192 || length < 8 { return nil, 0, errAuthSHA1v4DataLengthError </s> add length := int(binary.BigEndian.Uint16(src.Bytes()[:2])) if length >= 8192 || length < 7 { a.rawTrans = true src.Reset() return errAuthSHA1V4LengthError </s> remove if length > bSize { </s> add if length > src.Len() { </s> remove func (a *authSHA1V4) SetOverhead(overhead int) { a.Overhead = overhead </s> add func (a *authSHA1V4) PacketConn(c net.PacketConn) net.PacketConn { return c </s> remove func (a *authChain) Decode(b []byte) ([]byte, int, error) { a.buffer.Reset() key := pool.Get(len(a.userKey) + 4) defer pool.Put(key) readSize := 0 copy(key, a.userKey) for len(b) > 4 { binary.LittleEndian.PutUint32(key[len(a.userKey):], a.recvID) dataLen := (int)((uint(b[1]^a.lastServerHash[15]) << 8) + uint(b[0]^a.lastServerHash[14])) randLen := a.getServerRandLen(dataLen, a.Overhead) length := randLen + dataLen </s> add func (a *authChainA) Decode(dst, src *bytes.Buffer) error { if a.rawTrans { dst.ReadFrom(src) return nil } for src.Len() > 4 { macKey := pool.Get(len(a.userKey) + 4) defer pool.Put(macKey) copy(macKey, a.userKey) binary.LittleEndian.PutUint32(macKey[len(a.userKey):], a.recvID) dataLength := int(binary.LittleEndian.Uint16(src.Bytes()[:2]) ^ binary.LittleEndian.Uint16(a.lastServerHash[14:16])) randDataLength := a.randDataLength(dataLength, a.lastServerHash, &a.randomServer) length := dataLength + randDataLength </s> remove return a.buffer.Bytes(), originalSize - bSize, nil </s> add return nil
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_sha1_v4.go
length := int(binary.BigEndian.Uint16(src.Bytes()[:2])) if length >= 8192 || length < 7 { a.rawTrans = true src.Reset() return errAuthSHA1V4LengthError
<mask> crc := crc32.ChecksumIEEE(b[:2]) & 0xFFFF <mask> if binary.LittleEndian.Uint16(b[2:4]) != uint16(crc) { <mask> return nil, 0, errAuthSHA1v4CRC32Error <mask> } <mask> length := int(binary.BigEndian.Uint16(b[:2])) <mask> if length >= 8192 || length < 8 { <mask> return nil, 0, errAuthSHA1v4DataLengthError <mask> } <mask> if length > bSize { <mask> break <mask> } <mask> </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove func (a *authSHA1V4) Decode(b []byte) ([]byte, int, error) { a.buffer.Reset() bSize := len(b) originalSize := bSize for bSize > 4 { crc := crc32.ChecksumIEEE(b[:2]) & 0xFFFF if binary.LittleEndian.Uint16(b[2:4]) != uint16(crc) { return nil, 0, errAuthSHA1v4CRC32Error </s> add func (a *authSHA1V4) Decode(dst, src *bytes.Buffer) error { if a.rawTrans { dst.ReadFrom(src) return nil } for src.Len() > 4 { if uint16(crc32.ChecksumIEEE(src.Bytes()[:2])&0xffff) != binary.LittleEndian.Uint16(src.Bytes()[2:4]) { src.Reset() return errAuthSHA1V4CRC32Error </s> remove if length > bSize { </s> add if length > src.Len() { </s> remove length += 4 if length > len(b) { </s> add if 4+length > src.Len() { </s> remove return nil, 0, errAuthChainDataLengthError </s> add a.rawTrans = true src.Reset() return errAuthChainLengthError </s> remove if adler32.Checksum(b[:length-4]) == binary.LittleEndian.Uint32(b[length-4:]) { pos := int(b[4]) if pos != 0xFF { pos += 4 } else { pos = int(binary.BigEndian.Uint16(b[5:5+2])) + 4 } retSize := length - pos - 4 a.buffer.Write(b[pos : pos+retSize]) bSize -= length b = b[length:] </s> add if adler32.Checksum(src.Bytes()[:length-4]) != binary.LittleEndian.Uint32(src.Bytes()[length-4:length]) { a.rawTrans = true src.Reset() return errAuthSHA1V4Adler32Error } pos := int(src.Bytes()[4]) if pos < 255 { pos += 4
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_sha1_v4.go
if length > src.Len() {
<mask> length := int(binary.BigEndian.Uint16(b[:2])) <mask> if length >= 8192 || length < 8 { <mask> return nil, 0, errAuthSHA1v4DataLengthError <mask> } <mask> if length > bSize { <mask> break <mask> } <mask> <mask> if adler32.Checksum(b[:length-4]) == binary.LittleEndian.Uint32(b[length-4:]) { <mask> pos := int(b[4]) </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove length := int(binary.BigEndian.Uint16(b[:2])) if length >= 8192 || length < 8 { return nil, 0, errAuthSHA1v4DataLengthError </s> add length := int(binary.BigEndian.Uint16(src.Bytes()[:2])) if length >= 8192 || length < 7 { a.rawTrans = true src.Reset() return errAuthSHA1V4LengthError </s> remove if adler32.Checksum(b[:length-4]) == binary.LittleEndian.Uint32(b[length-4:]) { pos := int(b[4]) if pos != 0xFF { pos += 4 } else { pos = int(binary.BigEndian.Uint16(b[5:5+2])) + 4 } retSize := length - pos - 4 a.buffer.Write(b[pos : pos+retSize]) bSize -= length b = b[length:] </s> add if adler32.Checksum(src.Bytes()[:length-4]) != binary.LittleEndian.Uint32(src.Bytes()[length-4:length]) { a.rawTrans = true src.Reset() return errAuthSHA1V4Adler32Error } pos := int(src.Bytes()[4]) if pos < 255 { pos += 4 </s> remove func (a *authSHA1V4) Decode(b []byte) ([]byte, int, error) { a.buffer.Reset() bSize := len(b) originalSize := bSize for bSize > 4 { crc := crc32.ChecksumIEEE(b[:2]) & 0xFFFF if binary.LittleEndian.Uint16(b[2:4]) != uint16(crc) { return nil, 0, errAuthSHA1v4CRC32Error </s> add func (a *authSHA1V4) Decode(dst, src *bytes.Buffer) error { if a.rawTrans { dst.ReadFrom(src) return nil } for src.Len() > 4 { if uint16(crc32.ChecksumIEEE(src.Bytes()[:2])&0xffff) != binary.LittleEndian.Uint16(src.Bytes()[2:4]) { src.Reset() return errAuthSHA1V4CRC32Error </s> remove length += 4 if length > len(b) { </s> add if 4+length > src.Len() { </s> remove return nil, 0, errAuthChainDataLengthError </s> add a.rawTrans = true src.Reset() return errAuthChainLengthError
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_sha1_v4.go
if adler32.Checksum(src.Bytes()[:length-4]) != binary.LittleEndian.Uint32(src.Bytes()[length-4:length]) { a.rawTrans = true src.Reset() return errAuthSHA1V4Adler32Error } pos := int(src.Bytes()[4]) if pos < 255 { pos += 4
<mask> if length > bSize { <mask> break <mask> } <mask> <mask> if adler32.Checksum(b[:length-4]) == binary.LittleEndian.Uint32(b[length-4:]) { <mask> pos := int(b[4]) <mask> if pos != 0xFF { <mask> pos += 4 <mask> } else { <mask> pos = int(binary.BigEndian.Uint16(b[5:5+2])) + 4 <mask> } <mask> retSize := length - pos - 4 <mask> a.buffer.Write(b[pos : pos+retSize]) <mask> bSize -= length <mask> b = b[length:] <mask> } else { <mask> return nil, 0, errAuthSHA1v4IncorrectChecksum <mask> } <mask> } <mask> return a.buffer.Bytes(), originalSize - bSize, nil </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove return nil, 0, errAuthSHA1v4IncorrectChecksum </s> add pos = int(binary.BigEndian.Uint16(src.Bytes()[5:7])) + 4 </s> remove if length > bSize { </s> add if length > src.Len() { </s> remove return &authAES128{ Base: b, authData: &authData{}, salt: "auth_aes128_md5", hmac: tools.HmacMD5, hashDigest: tools.MD5Sum, } } func (a *authAES128) initForConn(iv []byte) Protocol { return &authAES128{ Base: &Base{ IV: iv, Key: a.Key, TCPMss: a.TCPMss, Overhead: a.Overhead, Param: a.Param, }, recvInfo: &recvInfo{recvID: 1, buffer: new(bytes.Buffer)}, authData: a.authData, packID: 1, salt: a.salt, hmac: a.hmac, hashDigest: a.hashDigest, } } func (a *authAES128) GetProtocolOverhead() int { return 9 } func (a *authAES128) SetOverhead(overhead int) { a.Overhead = overhead } func (a *authAES128) Decode(b []byte) ([]byte, int, error) { a.buffer.Reset() bSize := len(b) readSize := 0 key := pool.Get(len(a.userKey) + 4) defer pool.Put(key) copy(key, a.userKey) for bSize > 4 { binary.LittleEndian.PutUint32(key[len(key)-4:], a.recvID) h := a.hmac(key, b[:2]) if !bytes.Equal(h[:2], b[2:4]) { return nil, 0, errAuthAES128IncorrectMAC } length := int(binary.LittleEndian.Uint16(b[:2])) if length >= 8192 || length < 8 { return nil, 0, errAuthAES128DataLengthError } if length > bSize { break } h = a.hmac(key, b[:length-4]) if !bytes.Equal(h[:4], b[length-4:length]) { return nil, 0, errAuthAES128IncorrectChecksum } a.recvID++ pos := int(b[4]) if pos < 255 { pos += 4 } else { pos = int(binary.LittleEndian.Uint16(b[5:7])) + 4 } if pos > length-4 { return nil, 0, errAuthAES128PositionTooLarge } a.buffer.Write(b[pos : length-4]) b = b[length:] bSize -= length readSize += length } return a.buffer.Bytes(), readSize, nil } func (a *authAES128) Encode(b []byte) ([]byte, error) { a.buffer.Reset() bSize := len(b) offset := 0 if bSize > 0 && !a.hasSentHeader { authSize := bSize if authSize > 1200 { authSize = 1200 } a.hasSentHeader = true a.buffer.Write(a.packAuthData(b[:authSize])) bSize -= authSize offset += authSize } const blockSize = 4096 for bSize > blockSize { packSize, randSize := a.packedDataSize(b[offset : offset+blockSize]) pack := pool.Get(packSize) a.packData(b[offset:offset+blockSize], pack, randSize) a.buffer.Write(pack) pool.Put(pack) bSize -= blockSize offset += blockSize } if bSize > 0 { packSize, randSize := a.packedDataSize(b[offset:]) pack := pool.Get(packSize) a.packData(b[offset:], pack, randSize) a.buffer.Write(pack) pool.Put(pack) } return a.buffer.Bytes(), nil } func (a *authAES128) DecodePacket(b []byte) ([]byte, int, error) { bSize := len(b) h := a.hmac(a.Key, b[:bSize-4]) if !bytes.Equal(h[:4], b[bSize-4:]) { return nil, 0, errAuthAES128IncorrectMAC } return b[:bSize-4], bSize - 4, nil } func (a *authAES128) EncodePacket(b []byte) ([]byte, error) { a.initUserKeyAndID() var buf bytes.Buffer buf.Write(b) buf.Write(a.uid[:]) h := a.hmac(a.userKey, buf.Bytes()) buf.Write(h[:4]) return buf.Bytes(), nil } func (a *authAES128) initUserKeyAndID() { if a.userKey == nil { params := strings.Split(a.Param, ":") if len(params) >= 2 { if userID, err := strconv.ParseUint(params[0], 10, 32); err == nil { binary.LittleEndian.PutUint32(a.uid[:], uint32(userID)) a.userKey = a.hashDigest([]byte(params[1])) } } if a.userKey == nil { rand.Read(a.uid[:]) a.userKey = make([]byte, len(a.Key)) copy(a.userKey, a.Key) } } } func (a *authAES128) packedDataSize(data []byte) (packSize, randSize int) { dataSize := len(data) randSize = 1 if dataSize <= 1200 { if a.packID > 4 { randSize += rand.Intn(32) } else { if dataSize > 900 { randSize += rand.Intn(128) } else { randSize += rand.Intn(512) } } } packSize = randSize + dataSize + 8 return } func (a *authAES128) packData(data, ret []byte, randSize int) { dataSize := len(data) retSize := len(ret) // 0~1, ret_size binary.LittleEndian.PutUint16(ret[0:], uint16(retSize&0xFFFF)) // 2~3, hmac key := pool.Get(len(a.userKey) + 4) defer pool.Put(key) copy(key, a.userKey) binary.LittleEndian.PutUint32(key[len(key)-4:], a.packID) h := a.hmac(key, ret[:2]) copy(ret[2:4], h[:2]) // 4~rand_size+4, rand number rand.Read(ret[4 : 4+randSize]) // 4, rand_size if randSize < 128 { ret[4] = byte(randSize & 0xFF) } else { // 4, magic number 0xFF ret[4] = 0xFF // 5~6, rand_size binary.LittleEndian.PutUint16(ret[5:], uint16(randSize&0xFFFF)) } // rand_size+4~ret_size-4, data if dataSize > 0 { copy(ret[randSize+4:], data) } a.packID++ h = a.hmac(key, ret[:retSize-4]) copy(ret[retSize-4:], h[:4]) } func (a *authAES128) packAuthData(data []byte) (ret []byte) { dataSize := len(data) var randSize int if dataSize > 400 { randSize = rand.Intn(512) } else { randSize = rand.Intn(1024) } dataOffset := randSize + 16 + 4 + 4 + 7 retSize := dataOffset + dataSize + 4 ret = make([]byte, retSize) encrypt := make([]byte, 24) key := make([]byte, len(a.IV)+len(a.Key)) copy(key, a.IV) copy(key[len(a.IV):], a.Key) rand.Read(ret[dataOffset-randSize:]) a.mutex.Lock() defer a.mutex.Unlock() a.connectionID++ if a.connectionID > 0xFF000000 { a.clientID = nil } if len(a.clientID) == 0 { a.clientID = make([]byte, 8) rand.Read(a.clientID) b := make([]byte, 4) rand.Read(b) a.connectionID = binary.LittleEndian.Uint32(b) & 0xFFFFFF } copy(encrypt[4:], a.clientID) binary.LittleEndian.PutUint32(encrypt[8:], a.connectionID) now := time.Now().Unix() binary.LittleEndian.PutUint32(encrypt[:4], uint32(now)) binary.LittleEndian.PutUint16(encrypt[12:], uint16(retSize&0xFFFF)) binary.LittleEndian.PutUint16(encrypt[14:], uint16(randSize&0xFFFF)) a.initUserKeyAndID() aesCipherKey := core.Kdf(base64.StdEncoding.EncodeToString(a.userKey)+a.salt, 16) block, err := aes.NewCipher(aesCipherKey) if err != nil { return nil } encryptData := make([]byte, 16) iv := make([]byte, aes.BlockSize) cbc := cipher.NewCBCEncrypter(block, iv) cbc.CryptBlocks(encryptData, encrypt[:16]) copy(encrypt[:4], a.uid[:]) copy(encrypt[4:4+16], encryptData) h := a.hmac(key, encrypt[:20]) copy(encrypt[20:], h[:4]) rand.Read(ret[:1]) h = a.hmac(key, ret[:1]) copy(ret[1:], h[:7-1]) copy(ret[7:], encrypt) copy(ret[dataOffset:], data) h = a.hmac(a.userKey, ret[:retSize-4]) copy(ret[retSize-4:], h[:4]) return </s> add a := &authAES128{ Base: b, authData: &authData{}, authAES128Function: &authAES128Function{salt: "auth_aes128_md5", hmac: tools.HmacMD5, hashDigest: tools.MD5Sum}, userData: &userData{}, } a.initUserData() return a </s> remove if headSize := h.IVSize + h.HeadLen; bSize-headSize > 64 { headData = make([]byte, headSize+rand.Intn(64)) } else { headData = make([]byte, bSize) } copy(headData, b[:len(headData)]) host := h.Host var customHead string </s> add buf := pool.Get(pool.RelayBufferSize) defer pool.Put(buf) n, err := c.Conn.Read(buf) if err != nil { return 0, err } pos := bytes.Index(buf[:n], []byte("\r\n\r\n")) if pos == -1 { return 0, io.EOF } c.hasRecvHeader = true dataLength := n - pos - 4 n = copy(b, buf[4+pos:n]) if dataLength > n { c.buf = append(c.buf, buf[4+pos+n:4+pos+dataLength]...) } return n, nil } </s> remove return a.buffer.Bytes(), originalSize - bSize, nil </s> add return nil
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_sha1_v4.go
pos = int(binary.BigEndian.Uint16(src.Bytes()[5:7])) + 4
<mask> a.buffer.Write(b[pos : pos+retSize]) <mask> bSize -= length <mask> b = b[length:] <mask> } else { <mask> return nil, 0, errAuthSHA1v4IncorrectChecksum <mask> } <mask> } <mask> return a.buffer.Bytes(), originalSize - bSize, nil <mask> } <mask> </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove if adler32.Checksum(b[:length-4]) == binary.LittleEndian.Uint32(b[length-4:]) { pos := int(b[4]) if pos != 0xFF { pos += 4 } else { pos = int(binary.BigEndian.Uint16(b[5:5+2])) + 4 } retSize := length - pos - 4 a.buffer.Write(b[pos : pos+retSize]) bSize -= length b = b[length:] </s> add if adler32.Checksum(src.Bytes()[:length-4]) != binary.LittleEndian.Uint32(src.Bytes()[length-4:length]) { a.rawTrans = true src.Reset() return errAuthSHA1V4Adler32Error } pos := int(src.Bytes()[4]) if pos < 255 { pos += 4 </s> remove return a.buffer.Bytes(), originalSize - bSize, nil </s> add return nil </s> remove func (a *authSHA1V4) Encode(b []byte) ([]byte, error) { a.buffer.Reset() bSize := len(b) offset := 0 if !a.headerSent && bSize > 0 { headSize := getHeadSize(b, 30) if headSize > bSize { headSize = bSize } a.buffer.Write(a.packAuthData(b[:headSize])) offset += headSize bSize -= headSize a.headerSent = true </s> add func (a *authSHA1V4) Encode(buf *bytes.Buffer, b []byte) error { if !a.hasSentHeader { dataLength := getDataLength(b) a.packAuthData(buf, b[:dataLength]) b = b[dataLength:] a.hasSentHeader = true </s> remove return a.buffer.Bytes(), readSize, nil </s> add return nil </s> remove return &authAES128{ Base: b, authData: &authData{}, salt: "auth_aes128_md5", hmac: tools.HmacMD5, hashDigest: tools.MD5Sum, } } func (a *authAES128) initForConn(iv []byte) Protocol { return &authAES128{ Base: &Base{ IV: iv, Key: a.Key, TCPMss: a.TCPMss, Overhead: a.Overhead, Param: a.Param, }, recvInfo: &recvInfo{recvID: 1, buffer: new(bytes.Buffer)}, authData: a.authData, packID: 1, salt: a.salt, hmac: a.hmac, hashDigest: a.hashDigest, } } func (a *authAES128) GetProtocolOverhead() int { return 9 } func (a *authAES128) SetOverhead(overhead int) { a.Overhead = overhead } func (a *authAES128) Decode(b []byte) ([]byte, int, error) { a.buffer.Reset() bSize := len(b) readSize := 0 key := pool.Get(len(a.userKey) + 4) defer pool.Put(key) copy(key, a.userKey) for bSize > 4 { binary.LittleEndian.PutUint32(key[len(key)-4:], a.recvID) h := a.hmac(key, b[:2]) if !bytes.Equal(h[:2], b[2:4]) { return nil, 0, errAuthAES128IncorrectMAC } length := int(binary.LittleEndian.Uint16(b[:2])) if length >= 8192 || length < 8 { return nil, 0, errAuthAES128DataLengthError } if length > bSize { break } h = a.hmac(key, b[:length-4]) if !bytes.Equal(h[:4], b[length-4:length]) { return nil, 0, errAuthAES128IncorrectChecksum } a.recvID++ pos := int(b[4]) if pos < 255 { pos += 4 } else { pos = int(binary.LittleEndian.Uint16(b[5:7])) + 4 } if pos > length-4 { return nil, 0, errAuthAES128PositionTooLarge } a.buffer.Write(b[pos : length-4]) b = b[length:] bSize -= length readSize += length } return a.buffer.Bytes(), readSize, nil } func (a *authAES128) Encode(b []byte) ([]byte, error) { a.buffer.Reset() bSize := len(b) offset := 0 if bSize > 0 && !a.hasSentHeader { authSize := bSize if authSize > 1200 { authSize = 1200 } a.hasSentHeader = true a.buffer.Write(a.packAuthData(b[:authSize])) bSize -= authSize offset += authSize } const blockSize = 4096 for bSize > blockSize { packSize, randSize := a.packedDataSize(b[offset : offset+blockSize]) pack := pool.Get(packSize) a.packData(b[offset:offset+blockSize], pack, randSize) a.buffer.Write(pack) pool.Put(pack) bSize -= blockSize offset += blockSize } if bSize > 0 { packSize, randSize := a.packedDataSize(b[offset:]) pack := pool.Get(packSize) a.packData(b[offset:], pack, randSize) a.buffer.Write(pack) pool.Put(pack) } return a.buffer.Bytes(), nil } func (a *authAES128) DecodePacket(b []byte) ([]byte, int, error) { bSize := len(b) h := a.hmac(a.Key, b[:bSize-4]) if !bytes.Equal(h[:4], b[bSize-4:]) { return nil, 0, errAuthAES128IncorrectMAC } return b[:bSize-4], bSize - 4, nil } func (a *authAES128) EncodePacket(b []byte) ([]byte, error) { a.initUserKeyAndID() var buf bytes.Buffer buf.Write(b) buf.Write(a.uid[:]) h := a.hmac(a.userKey, buf.Bytes()) buf.Write(h[:4]) return buf.Bytes(), nil } func (a *authAES128) initUserKeyAndID() { if a.userKey == nil { params := strings.Split(a.Param, ":") if len(params) >= 2 { if userID, err := strconv.ParseUint(params[0], 10, 32); err == nil { binary.LittleEndian.PutUint32(a.uid[:], uint32(userID)) a.userKey = a.hashDigest([]byte(params[1])) } } if a.userKey == nil { rand.Read(a.uid[:]) a.userKey = make([]byte, len(a.Key)) copy(a.userKey, a.Key) } } } func (a *authAES128) packedDataSize(data []byte) (packSize, randSize int) { dataSize := len(data) randSize = 1 if dataSize <= 1200 { if a.packID > 4 { randSize += rand.Intn(32) } else { if dataSize > 900 { randSize += rand.Intn(128) } else { randSize += rand.Intn(512) } } } packSize = randSize + dataSize + 8 return } func (a *authAES128) packData(data, ret []byte, randSize int) { dataSize := len(data) retSize := len(ret) // 0~1, ret_size binary.LittleEndian.PutUint16(ret[0:], uint16(retSize&0xFFFF)) // 2~3, hmac key := pool.Get(len(a.userKey) + 4) defer pool.Put(key) copy(key, a.userKey) binary.LittleEndian.PutUint32(key[len(key)-4:], a.packID) h := a.hmac(key, ret[:2]) copy(ret[2:4], h[:2]) // 4~rand_size+4, rand number rand.Read(ret[4 : 4+randSize]) // 4, rand_size if randSize < 128 { ret[4] = byte(randSize & 0xFF) } else { // 4, magic number 0xFF ret[4] = 0xFF // 5~6, rand_size binary.LittleEndian.PutUint16(ret[5:], uint16(randSize&0xFFFF)) } // rand_size+4~ret_size-4, data if dataSize > 0 { copy(ret[randSize+4:], data) } a.packID++ h = a.hmac(key, ret[:retSize-4]) copy(ret[retSize-4:], h[:4]) } func (a *authAES128) packAuthData(data []byte) (ret []byte) { dataSize := len(data) var randSize int if dataSize > 400 { randSize = rand.Intn(512) } else { randSize = rand.Intn(1024) } dataOffset := randSize + 16 + 4 + 4 + 7 retSize := dataOffset + dataSize + 4 ret = make([]byte, retSize) encrypt := make([]byte, 24) key := make([]byte, len(a.IV)+len(a.Key)) copy(key, a.IV) copy(key[len(a.IV):], a.Key) rand.Read(ret[dataOffset-randSize:]) a.mutex.Lock() defer a.mutex.Unlock() a.connectionID++ if a.connectionID > 0xFF000000 { a.clientID = nil } if len(a.clientID) == 0 { a.clientID = make([]byte, 8) rand.Read(a.clientID) b := make([]byte, 4) rand.Read(b) a.connectionID = binary.LittleEndian.Uint32(b) & 0xFFFFFF } copy(encrypt[4:], a.clientID) binary.LittleEndian.PutUint32(encrypt[8:], a.connectionID) now := time.Now().Unix() binary.LittleEndian.PutUint32(encrypt[:4], uint32(now)) binary.LittleEndian.PutUint16(encrypt[12:], uint16(retSize&0xFFFF)) binary.LittleEndian.PutUint16(encrypt[14:], uint16(randSize&0xFFFF)) a.initUserKeyAndID() aesCipherKey := core.Kdf(base64.StdEncoding.EncodeToString(a.userKey)+a.salt, 16) block, err := aes.NewCipher(aesCipherKey) if err != nil { return nil } encryptData := make([]byte, 16) iv := make([]byte, aes.BlockSize) cbc := cipher.NewCBCEncrypter(block, iv) cbc.CryptBlocks(encryptData, encrypt[:16]) copy(encrypt[:4], a.uid[:]) copy(encrypt[4:4+16], encryptData) h := a.hmac(key, encrypt[:20]) copy(encrypt[20:], h[:4]) rand.Read(ret[:1]) h = a.hmac(key, ret[:1]) copy(ret[1:], h[:7-1]) copy(ret[7:], encrypt) copy(ret[dataOffset:], data) h = a.hmac(a.userKey, ret[:retSize-4]) copy(ret[retSize-4:], h[:4]) return </s> add a := &authAES128{ Base: b, authData: &authData{}, authAES128Function: &authAES128Function{salt: "auth_aes128_md5", hmac: tools.HmacMD5, hashDigest: tools.MD5Sum}, userData: &userData{}, } a.initUserData() return a
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_sha1_v4.go
dst.Write(src.Bytes()[pos : length-4]) src.Next(length)
<mask> pos = int(binary.BigEndian.Uint16(src.Bytes()[5:7])) + 4 <mask> } <mask> } <mask> return nil <mask> } <mask> </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove return nil, 0, errAuthSHA1v4IncorrectChecksum </s> add pos = int(binary.BigEndian.Uint16(src.Bytes()[5:7])) + 4 </s> remove if adler32.Checksum(b[:length-4]) == binary.LittleEndian.Uint32(b[length-4:]) { pos := int(b[4]) if pos != 0xFF { pos += 4 } else { pos = int(binary.BigEndian.Uint16(b[5:5+2])) + 4 } retSize := length - pos - 4 a.buffer.Write(b[pos : pos+retSize]) bSize -= length b = b[length:] </s> add if adler32.Checksum(src.Bytes()[:length-4]) != binary.LittleEndian.Uint32(src.Bytes()[length-4:length]) { a.rawTrans = true src.Reset() return errAuthSHA1V4Adler32Error } pos := int(src.Bytes()[4]) if pos < 255 { pos += 4 </s> remove return &authAES128{ Base: b, recvInfo: &recvInfo{buffer: new(bytes.Buffer)}, authData: &authData{}, salt: "auth_aes128_sha1", hmac: tools.HmacSHA1, hashDigest: tools.SHA1Sum, </s> add a := &authAES128{ Base: b, authData: &authData{}, authAES128Function: &authAES128Function{salt: "auth_aes128_sha1", hmac: tools.HmacSHA1, hashDigest: tools.SHA1Sum}, userData: &userData{}, } a.initUserData() return a } func (a *authAES128) initUserData() { params := strings.Split(a.Param, ":") if len(params) > 1 { if userID, err := strconv.ParseUint(params[0], 10, 32); err == nil { binary.LittleEndian.PutUint32(a.userID[:], uint32(userID)) a.userKey = a.hashDigest([]byte(params[1])) } else { log.Warnln("Wrong protocol-param for %s, only digits are expected before ':'", a.salt) } } if len(a.userKey) == 0 { a.userKey = a.Key rand.Read(a.userID[:]) } } func (a *authAES128) StreamConn(c net.Conn, iv []byte) net.Conn { p := &authAES128{ Base: a.Base, authData: a.next(), authAES128Function: a.authAES128Function, userData: a.userData, packID: 1, recvID: 1, } p.iv = iv return &Conn{Conn: c, Protocol: p} } func (a *authAES128) PacketConn(c net.PacketConn) net.PacketConn { p := &authAES128{ Base: a.Base, authAES128Function: a.authAES128Function, userData: a.userData, } return &PacketConn{PacketConn: c, Protocol: p} } func (a *authAES128) Decode(dst, src *bytes.Buffer) error { if a.rawTrans { dst.ReadFrom(src) return nil } for src.Len() > 4 { macKey := pool.Get(len(a.userKey) + 4) defer pool.Put(macKey) copy(macKey, a.userKey) binary.LittleEndian.PutUint32(macKey[len(a.userKey):], a.recvID) if !bytes.Equal(a.hmac(macKey, src.Bytes()[:2])[:2], src.Bytes()[2:4]) { src.Reset() return errAuthAES128MACError } length := int(binary.LittleEndian.Uint16(src.Bytes()[:2])) if length >= 8192 || length < 7 { a.rawTrans = true src.Reset() return errAuthAES128LengthError } if length > src.Len() { break } if !bytes.Equal(a.hmac(macKey, src.Bytes()[:length-4])[:4], src.Bytes()[length-4:length]) { a.rawTrans = true src.Reset() return errAuthAES128ChksumError } a.recvID++ pos := int(src.Bytes()[4]) if pos < 255 { pos += 4 } else { pos = int(binary.LittleEndian.Uint16(src.Bytes()[5:7])) + 4 } dst.Write(src.Bytes()[pos : length-4]) src.Next(length) } return nil } func (a *authAES128) Encode(buf *bytes.Buffer, b []byte) error { fullDataLength := len(b) if !a.hasSentHeader { dataLength := getDataLength(b) a.packAuthData(buf, b[:dataLength]) b = b[dataLength:] a.hasSentHeader = true } for len(b) > 8100 { a.packData(buf, b[:8100], fullDataLength) b = b[8100:] } if len(b) > 0 { a.packData(buf, b, fullDataLength) } return nil } func (a *authAES128) DecodePacket(b []byte) ([]byte, error) { if !bytes.Equal(a.hmac(a.Key, b[:len(b)-4])[:4], b[len(b)-4:]) { return nil, errAuthAES128ChksumError } return b[:len(b)-4], nil } func (a *authAES128) EncodePacket(buf *bytes.Buffer, b []byte) error { buf.Write(b) buf.Write(a.userID[:]) buf.Write(a.hmac(a.userKey, buf.Bytes())[:4]) return nil } func (a *authAES128) packData(poolBuf *bytes.Buffer, data []byte, fullDataLength int) { dataLength := len(data) randDataLength := a.getRandDataLengthForPackData(dataLength, fullDataLength) /* 2: uint16 LittleEndian packedDataLength 2: hmac of packedDataLength 3: maxRandDataLengthPrefix (min:1) 4: hmac of packedData except the last 4 bytes */ packedDataLength := 2 + 2 + 3 + randDataLength + dataLength + 4 if randDataLength < 128 { packedDataLength -= 2 } macKey := pool.Get(len(a.userKey) + 4) defer pool.Put(macKey) copy(macKey, a.userKey) binary.LittleEndian.PutUint32(macKey[len(a.userKey):], a.packID) a.packID++ binary.Write(poolBuf, binary.LittleEndian, uint16(packedDataLength)) poolBuf.Write(a.hmac(macKey, poolBuf.Bytes()[poolBuf.Len()-2:])[:2]) a.packRandData(poolBuf, randDataLength) poolBuf.Write(data) poolBuf.Write(a.hmac(macKey, poolBuf.Bytes()[poolBuf.Len()-packedDataLength+4:])[:4]) } func trapezoidRandom(max int, d float64) int { base := rand.Float64() if d-0 > 1e-6 { a := 1 - d base = (math.Sqrt(a*a+4*d*base) - a) / (2 * d) } return int(base * float64(max)) } func (a *authAES128) getRandDataLengthForPackData(dataLength, fullDataLength int) int { if fullDataLength >= 32*1024-a.Overhead { return 0 } // 1460: tcp_mss revLength := 1460 - dataLength - 9 if revLength == 0 { return 0 } if revLength < 0 { if revLength > -1460 { return trapezoidRandom(revLength+1460, -0.3) } return rand.Intn(32) } if dataLength > 900 { return rand.Intn(revLength) } return trapezoidRandom(revLength, -0.3) } func (a *authAES128) packAuthData(poolBuf *bytes.Buffer, data []byte) { if len(data) == 0 { return } dataLength := len(data) randDataLength := a.getRandDataLengthForPackAuthData(dataLength) /* 7: checkHead(1) and hmac of checkHead(6) 4: userID 16: encrypted data of authdata(12), uint16 BigEndian packedDataLength(2) and uint16 BigEndian randDataLength(2) 4: hmac of userID and encrypted data 4: hmac of packedAuthData except the last 4 bytes */ packedAuthDataLength := 7 + 4 + 16 + 4 + randDataLength + dataLength + 4 macKey := pool.Get(len(a.iv) + len(a.Key)) defer pool.Put(macKey) copy(macKey, a.iv) copy(macKey[len(a.iv):], a.Key) poolBuf.WriteByte(byte(rand.Intn(256))) poolBuf.Write(a.hmac(macKey, poolBuf.Bytes())[:6]) poolBuf.Write(a.userID[:]) err := a.authData.putEncryptedData(poolBuf, a.userKey, [2]int{packedAuthDataLength, randDataLength}, a.salt) if err != nil { poolBuf.Reset() return } poolBuf.Write(a.hmac(macKey, poolBuf.Bytes()[7:])[:4]) tools.AppendRandBytes(poolBuf, randDataLength) poolBuf.Write(data) poolBuf.Write(a.hmac(a.userKey, poolBuf.Bytes())[:4]) } func (a *authAES128) getRandDataLengthForPackAuthData(size int) int { if size > 400 { return rand.Intn(512) } return rand.Intn(1024) } func (a *authAES128) packRandData(poolBuf *bytes.Buffer, size int) { if size < 128 { poolBuf.WriteByte(byte(size + 1)) tools.AppendRandBytes(poolBuf, size) return </s> remove if headSize := h.IVSize + h.HeadLen; bSize-headSize > 64 { headData = make([]byte, headSize+rand.Intn(64)) } else { headData = make([]byte, bSize) } copy(headData, b[:len(headData)]) host := h.Host var customHead string </s> add buf := pool.Get(pool.RelayBufferSize) defer pool.Put(buf) n, err := c.Conn.Read(buf) if err != nil { return 0, err } pos := bytes.Index(buf[:n], []byte("\r\n\r\n")) if pos == -1 { return 0, io.EOF } c.hasRecvHeader = true dataLength := n - pos - 4 n = copy(b, buf[4+pos:n]) if dataLength > n { c.buf = append(c.buf, buf[4+pos+n:4+pos+dataLength]...) } return n, nil } </s> remove return &authAES128{ Base: b, authData: &authData{}, salt: "auth_aes128_md5", hmac: tools.HmacMD5, hashDigest: tools.MD5Sum, } } func (a *authAES128) initForConn(iv []byte) Protocol { return &authAES128{ Base: &Base{ IV: iv, Key: a.Key, TCPMss: a.TCPMss, Overhead: a.Overhead, Param: a.Param, }, recvInfo: &recvInfo{recvID: 1, buffer: new(bytes.Buffer)}, authData: a.authData, packID: 1, salt: a.salt, hmac: a.hmac, hashDigest: a.hashDigest, } } func (a *authAES128) GetProtocolOverhead() int { return 9 } func (a *authAES128) SetOverhead(overhead int) { a.Overhead = overhead } func (a *authAES128) Decode(b []byte) ([]byte, int, error) { a.buffer.Reset() bSize := len(b) readSize := 0 key := pool.Get(len(a.userKey) + 4) defer pool.Put(key) copy(key, a.userKey) for bSize > 4 { binary.LittleEndian.PutUint32(key[len(key)-4:], a.recvID) h := a.hmac(key, b[:2]) if !bytes.Equal(h[:2], b[2:4]) { return nil, 0, errAuthAES128IncorrectMAC } length := int(binary.LittleEndian.Uint16(b[:2])) if length >= 8192 || length < 8 { return nil, 0, errAuthAES128DataLengthError } if length > bSize { break } h = a.hmac(key, b[:length-4]) if !bytes.Equal(h[:4], b[length-4:length]) { return nil, 0, errAuthAES128IncorrectChecksum } a.recvID++ pos := int(b[4]) if pos < 255 { pos += 4 } else { pos = int(binary.LittleEndian.Uint16(b[5:7])) + 4 } if pos > length-4 { return nil, 0, errAuthAES128PositionTooLarge } a.buffer.Write(b[pos : length-4]) b = b[length:] bSize -= length readSize += length } return a.buffer.Bytes(), readSize, nil } func (a *authAES128) Encode(b []byte) ([]byte, error) { a.buffer.Reset() bSize := len(b) offset := 0 if bSize > 0 && !a.hasSentHeader { authSize := bSize if authSize > 1200 { authSize = 1200 } a.hasSentHeader = true a.buffer.Write(a.packAuthData(b[:authSize])) bSize -= authSize offset += authSize } const blockSize = 4096 for bSize > blockSize { packSize, randSize := a.packedDataSize(b[offset : offset+blockSize]) pack := pool.Get(packSize) a.packData(b[offset:offset+blockSize], pack, randSize) a.buffer.Write(pack) pool.Put(pack) bSize -= blockSize offset += blockSize } if bSize > 0 { packSize, randSize := a.packedDataSize(b[offset:]) pack := pool.Get(packSize) a.packData(b[offset:], pack, randSize) a.buffer.Write(pack) pool.Put(pack) } return a.buffer.Bytes(), nil } func (a *authAES128) DecodePacket(b []byte) ([]byte, int, error) { bSize := len(b) h := a.hmac(a.Key, b[:bSize-4]) if !bytes.Equal(h[:4], b[bSize-4:]) { return nil, 0, errAuthAES128IncorrectMAC } return b[:bSize-4], bSize - 4, nil } func (a *authAES128) EncodePacket(b []byte) ([]byte, error) { a.initUserKeyAndID() var buf bytes.Buffer buf.Write(b) buf.Write(a.uid[:]) h := a.hmac(a.userKey, buf.Bytes()) buf.Write(h[:4]) return buf.Bytes(), nil } func (a *authAES128) initUserKeyAndID() { if a.userKey == nil { params := strings.Split(a.Param, ":") if len(params) >= 2 { if userID, err := strconv.ParseUint(params[0], 10, 32); err == nil { binary.LittleEndian.PutUint32(a.uid[:], uint32(userID)) a.userKey = a.hashDigest([]byte(params[1])) } } if a.userKey == nil { rand.Read(a.uid[:]) a.userKey = make([]byte, len(a.Key)) copy(a.userKey, a.Key) } } } func (a *authAES128) packedDataSize(data []byte) (packSize, randSize int) { dataSize := len(data) randSize = 1 if dataSize <= 1200 { if a.packID > 4 { randSize += rand.Intn(32) } else { if dataSize > 900 { randSize += rand.Intn(128) } else { randSize += rand.Intn(512) } } } packSize = randSize + dataSize + 8 return } func (a *authAES128) packData(data, ret []byte, randSize int) { dataSize := len(data) retSize := len(ret) // 0~1, ret_size binary.LittleEndian.PutUint16(ret[0:], uint16(retSize&0xFFFF)) // 2~3, hmac key := pool.Get(len(a.userKey) + 4) defer pool.Put(key) copy(key, a.userKey) binary.LittleEndian.PutUint32(key[len(key)-4:], a.packID) h := a.hmac(key, ret[:2]) copy(ret[2:4], h[:2]) // 4~rand_size+4, rand number rand.Read(ret[4 : 4+randSize]) // 4, rand_size if randSize < 128 { ret[4] = byte(randSize & 0xFF) } else { // 4, magic number 0xFF ret[4] = 0xFF // 5~6, rand_size binary.LittleEndian.PutUint16(ret[5:], uint16(randSize&0xFFFF)) } // rand_size+4~ret_size-4, data if dataSize > 0 { copy(ret[randSize+4:], data) } a.packID++ h = a.hmac(key, ret[:retSize-4]) copy(ret[retSize-4:], h[:4]) } func (a *authAES128) packAuthData(data []byte) (ret []byte) { dataSize := len(data) var randSize int if dataSize > 400 { randSize = rand.Intn(512) } else { randSize = rand.Intn(1024) } dataOffset := randSize + 16 + 4 + 4 + 7 retSize := dataOffset + dataSize + 4 ret = make([]byte, retSize) encrypt := make([]byte, 24) key := make([]byte, len(a.IV)+len(a.Key)) copy(key, a.IV) copy(key[len(a.IV):], a.Key) rand.Read(ret[dataOffset-randSize:]) a.mutex.Lock() defer a.mutex.Unlock() a.connectionID++ if a.connectionID > 0xFF000000 { a.clientID = nil } if len(a.clientID) == 0 { a.clientID = make([]byte, 8) rand.Read(a.clientID) b := make([]byte, 4) rand.Read(b) a.connectionID = binary.LittleEndian.Uint32(b) & 0xFFFFFF } copy(encrypt[4:], a.clientID) binary.LittleEndian.PutUint32(encrypt[8:], a.connectionID) now := time.Now().Unix() binary.LittleEndian.PutUint32(encrypt[:4], uint32(now)) binary.LittleEndian.PutUint16(encrypt[12:], uint16(retSize&0xFFFF)) binary.LittleEndian.PutUint16(encrypt[14:], uint16(randSize&0xFFFF)) a.initUserKeyAndID() aesCipherKey := core.Kdf(base64.StdEncoding.EncodeToString(a.userKey)+a.salt, 16) block, err := aes.NewCipher(aesCipherKey) if err != nil { return nil } encryptData := make([]byte, 16) iv := make([]byte, aes.BlockSize) cbc := cipher.NewCBCEncrypter(block, iv) cbc.CryptBlocks(encryptData, encrypt[:16]) copy(encrypt[:4], a.uid[:]) copy(encrypt[4:4+16], encryptData) h := a.hmac(key, encrypt[:20]) copy(encrypt[20:], h[:4]) rand.Read(ret[:1]) h = a.hmac(key, ret[:1]) copy(ret[1:], h[:7-1]) copy(ret[7:], encrypt) copy(ret[dataOffset:], data) h = a.hmac(a.userKey, ret[:retSize-4]) copy(ret[retSize-4:], h[:4]) return </s> add a := &authAES128{ Base: b, authData: &authData{}, authAES128Function: &authAES128Function{salt: "auth_aes128_md5", hmac: tools.HmacMD5, hashDigest: tools.MD5Sum}, userData: &userData{}, } a.initUserData() return a
[ "keep", "add", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_sha1_v4.go
return nil
<mask> } else { <mask> return nil, 0, errAuthSHA1v4IncorrectChecksum <mask> } <mask> } <mask> return a.buffer.Bytes(), originalSize - bSize, nil <mask> } <mask> <mask> func (a *authSHA1V4) Encode(b []byte) ([]byte, error) { <mask> a.buffer.Reset() <mask> bSize := len(b) </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove return nil, 0, errAuthSHA1v4IncorrectChecksum </s> add pos = int(binary.BigEndian.Uint16(src.Bytes()[5:7])) + 4 </s> remove func (a *authSHA1V4) Encode(b []byte) ([]byte, error) { a.buffer.Reset() bSize := len(b) offset := 0 if !a.headerSent && bSize > 0 { headSize := getHeadSize(b, 30) if headSize > bSize { headSize = bSize } a.buffer.Write(a.packAuthData(b[:headSize])) offset += headSize bSize -= headSize a.headerSent = true </s> add func (a *authSHA1V4) Encode(buf *bytes.Buffer, b []byte) error { if !a.hasSentHeader { dataLength := getDataLength(b) a.packAuthData(buf, b[:dataLength]) b = b[dataLength:] a.hasSentHeader = true </s> remove if adler32.Checksum(b[:length-4]) == binary.LittleEndian.Uint32(b[length-4:]) { pos := int(b[4]) if pos != 0xFF { pos += 4 } else { pos = int(binary.BigEndian.Uint16(b[5:5+2])) + 4 } retSize := length - pos - 4 a.buffer.Write(b[pos : pos+retSize]) bSize -= length b = b[length:] </s> add if adler32.Checksum(src.Bytes()[:length-4]) != binary.LittleEndian.Uint32(src.Bytes()[length-4:length]) { a.rawTrans = true src.Reset() return errAuthSHA1V4Adler32Error } pos := int(src.Bytes()[4]) if pos < 255 { pos += 4 </s> remove func (a *authSHA1V4) Decode(b []byte) ([]byte, int, error) { a.buffer.Reset() bSize := len(b) originalSize := bSize for bSize > 4 { crc := crc32.ChecksumIEEE(b[:2]) & 0xFFFF if binary.LittleEndian.Uint16(b[2:4]) != uint16(crc) { return nil, 0, errAuthSHA1v4CRC32Error </s> add func (a *authSHA1V4) Decode(dst, src *bytes.Buffer) error { if a.rawTrans { dst.ReadFrom(src) return nil } for src.Len() > 4 { if uint16(crc32.ChecksumIEEE(src.Bytes()[:2])&0xffff) != binary.LittleEndian.Uint16(src.Bytes()[2:4]) { src.Reset() return errAuthSHA1V4CRC32Error </s> remove func (a *authChain) DecodePacket(b []byte) ([]byte, int, error) { bSize := len(b) if bSize < 9 { return nil, 0, errAuthChainDataLengthError </s> add func (a *authChainA) DecodePacket(b []byte) ([]byte, error) { if len(b) < 9 { return nil, errAuthChainLengthError
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_sha1_v4.go
func (a *authSHA1V4) Encode(buf *bytes.Buffer, b []byte) error { if !a.hasSentHeader { dataLength := getDataLength(b) a.packAuthData(buf, b[:dataLength]) b = b[dataLength:] a.hasSentHeader = true
<mask> } <mask> return a.buffer.Bytes(), originalSize - bSize, nil <mask> } <mask> <mask> func (a *authSHA1V4) Encode(b []byte) ([]byte, error) { <mask> a.buffer.Reset() <mask> bSize := len(b) <mask> offset := 0 <mask> if !a.headerSent && bSize > 0 { <mask> headSize := getHeadSize(b, 30) <mask> if headSize > bSize { <mask> headSize = bSize <mask> } <mask> a.buffer.Write(a.packAuthData(b[:headSize])) <mask> offset += headSize <mask> bSize -= headSize <mask> a.headerSent = true <mask> } <mask> const blockSize = 4096 <mask> for bSize > blockSize { <mask> packSize, randSize := a.packedDataSize(b[offset : offset+blockSize]) <mask> pack := pool.Get(packSize) </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove const blockSize = 4096 for bSize > blockSize { packSize, randSize := a.packedDataSize(b[offset : offset+blockSize]) pack := pool.Get(packSize) a.packData(b[offset:offset+blockSize], pack, randSize) a.buffer.Write(pack) pool.Put(pack) offset += blockSize bSize -= blockSize </s> add for len(b) > 8100 { a.packData(buf, b[:8100]) b = b[8100:] </s> remove func (a *authChain) Encode(b []byte) ([]byte, error) { a.buffer.Reset() bSize := len(b) offset := 0 if bSize > 0 && !a.headerSent { headSize := 1200 if headSize > bSize { headSize = bSize } a.buffer.Write(a.packAuthData(b[:headSize])) offset += headSize bSize -= headSize a.headerSent = true </s> add func (a *authChainA) Encode(buf *bytes.Buffer, b []byte) error { if !a.hasSentHeader { dataLength := getDataLength(b) a.packAuthData(buf, b[:dataLength]) b = b[dataLength:] a.hasSentHeader = true </s> remove if bSize > 0 { packSize, randSize := a.packedDataSize(b[offset:]) pack := pool.Get(packSize) a.packData(b[offset:], pack, randSize) a.buffer.Write(pack) pool.Put(pack) </s> add if len(b) > 0 { a.packData(buf, b) </s> remove var unitSize = a.TCPMss - a.Overhead for bSize > unitSize { dataLen, randLength := a.packedDataLen(b[offset : offset+unitSize]) d := pool.Get(dataLen) a.packData(d, b[offset:offset+unitSize], randLength) a.buffer.Write(d) pool.Put(d) bSize -= unitSize offset += unitSize </s> add for len(b) > 2800 { a.packData(buf, b[:2800]) b = b[2800:] </s> remove return &authAES128{ Base: b, authData: &authData{}, salt: "auth_aes128_md5", hmac: tools.HmacMD5, hashDigest: tools.MD5Sum, } } func (a *authAES128) initForConn(iv []byte) Protocol { return &authAES128{ Base: &Base{ IV: iv, Key: a.Key, TCPMss: a.TCPMss, Overhead: a.Overhead, Param: a.Param, }, recvInfo: &recvInfo{recvID: 1, buffer: new(bytes.Buffer)}, authData: a.authData, packID: 1, salt: a.salt, hmac: a.hmac, hashDigest: a.hashDigest, } } func (a *authAES128) GetProtocolOverhead() int { return 9 } func (a *authAES128) SetOverhead(overhead int) { a.Overhead = overhead } func (a *authAES128) Decode(b []byte) ([]byte, int, error) { a.buffer.Reset() bSize := len(b) readSize := 0 key := pool.Get(len(a.userKey) + 4) defer pool.Put(key) copy(key, a.userKey) for bSize > 4 { binary.LittleEndian.PutUint32(key[len(key)-4:], a.recvID) h := a.hmac(key, b[:2]) if !bytes.Equal(h[:2], b[2:4]) { return nil, 0, errAuthAES128IncorrectMAC } length := int(binary.LittleEndian.Uint16(b[:2])) if length >= 8192 || length < 8 { return nil, 0, errAuthAES128DataLengthError } if length > bSize { break } h = a.hmac(key, b[:length-4]) if !bytes.Equal(h[:4], b[length-4:length]) { return nil, 0, errAuthAES128IncorrectChecksum } a.recvID++ pos := int(b[4]) if pos < 255 { pos += 4 } else { pos = int(binary.LittleEndian.Uint16(b[5:7])) + 4 } if pos > length-4 { return nil, 0, errAuthAES128PositionTooLarge } a.buffer.Write(b[pos : length-4]) b = b[length:] bSize -= length readSize += length } return a.buffer.Bytes(), readSize, nil } func (a *authAES128) Encode(b []byte) ([]byte, error) { a.buffer.Reset() bSize := len(b) offset := 0 if bSize > 0 && !a.hasSentHeader { authSize := bSize if authSize > 1200 { authSize = 1200 } a.hasSentHeader = true a.buffer.Write(a.packAuthData(b[:authSize])) bSize -= authSize offset += authSize } const blockSize = 4096 for bSize > blockSize { packSize, randSize := a.packedDataSize(b[offset : offset+blockSize]) pack := pool.Get(packSize) a.packData(b[offset:offset+blockSize], pack, randSize) a.buffer.Write(pack) pool.Put(pack) bSize -= blockSize offset += blockSize } if bSize > 0 { packSize, randSize := a.packedDataSize(b[offset:]) pack := pool.Get(packSize) a.packData(b[offset:], pack, randSize) a.buffer.Write(pack) pool.Put(pack) } return a.buffer.Bytes(), nil } func (a *authAES128) DecodePacket(b []byte) ([]byte, int, error) { bSize := len(b) h := a.hmac(a.Key, b[:bSize-4]) if !bytes.Equal(h[:4], b[bSize-4:]) { return nil, 0, errAuthAES128IncorrectMAC } return b[:bSize-4], bSize - 4, nil } func (a *authAES128) EncodePacket(b []byte) ([]byte, error) { a.initUserKeyAndID() var buf bytes.Buffer buf.Write(b) buf.Write(a.uid[:]) h := a.hmac(a.userKey, buf.Bytes()) buf.Write(h[:4]) return buf.Bytes(), nil } func (a *authAES128) initUserKeyAndID() { if a.userKey == nil { params := strings.Split(a.Param, ":") if len(params) >= 2 { if userID, err := strconv.ParseUint(params[0], 10, 32); err == nil { binary.LittleEndian.PutUint32(a.uid[:], uint32(userID)) a.userKey = a.hashDigest([]byte(params[1])) } } if a.userKey == nil { rand.Read(a.uid[:]) a.userKey = make([]byte, len(a.Key)) copy(a.userKey, a.Key) } } } func (a *authAES128) packedDataSize(data []byte) (packSize, randSize int) { dataSize := len(data) randSize = 1 if dataSize <= 1200 { if a.packID > 4 { randSize += rand.Intn(32) } else { if dataSize > 900 { randSize += rand.Intn(128) } else { randSize += rand.Intn(512) } } } packSize = randSize + dataSize + 8 return } func (a *authAES128) packData(data, ret []byte, randSize int) { dataSize := len(data) retSize := len(ret) // 0~1, ret_size binary.LittleEndian.PutUint16(ret[0:], uint16(retSize&0xFFFF)) // 2~3, hmac key := pool.Get(len(a.userKey) + 4) defer pool.Put(key) copy(key, a.userKey) binary.LittleEndian.PutUint32(key[len(key)-4:], a.packID) h := a.hmac(key, ret[:2]) copy(ret[2:4], h[:2]) // 4~rand_size+4, rand number rand.Read(ret[4 : 4+randSize]) // 4, rand_size if randSize < 128 { ret[4] = byte(randSize & 0xFF) } else { // 4, magic number 0xFF ret[4] = 0xFF // 5~6, rand_size binary.LittleEndian.PutUint16(ret[5:], uint16(randSize&0xFFFF)) } // rand_size+4~ret_size-4, data if dataSize > 0 { copy(ret[randSize+4:], data) } a.packID++ h = a.hmac(key, ret[:retSize-4]) copy(ret[retSize-4:], h[:4]) } func (a *authAES128) packAuthData(data []byte) (ret []byte) { dataSize := len(data) var randSize int if dataSize > 400 { randSize = rand.Intn(512) } else { randSize = rand.Intn(1024) } dataOffset := randSize + 16 + 4 + 4 + 7 retSize := dataOffset + dataSize + 4 ret = make([]byte, retSize) encrypt := make([]byte, 24) key := make([]byte, len(a.IV)+len(a.Key)) copy(key, a.IV) copy(key[len(a.IV):], a.Key) rand.Read(ret[dataOffset-randSize:]) a.mutex.Lock() defer a.mutex.Unlock() a.connectionID++ if a.connectionID > 0xFF000000 { a.clientID = nil } if len(a.clientID) == 0 { a.clientID = make([]byte, 8) rand.Read(a.clientID) b := make([]byte, 4) rand.Read(b) a.connectionID = binary.LittleEndian.Uint32(b) & 0xFFFFFF } copy(encrypt[4:], a.clientID) binary.LittleEndian.PutUint32(encrypt[8:], a.connectionID) now := time.Now().Unix() binary.LittleEndian.PutUint32(encrypt[:4], uint32(now)) binary.LittleEndian.PutUint16(encrypt[12:], uint16(retSize&0xFFFF)) binary.LittleEndian.PutUint16(encrypt[14:], uint16(randSize&0xFFFF)) a.initUserKeyAndID() aesCipherKey := core.Kdf(base64.StdEncoding.EncodeToString(a.userKey)+a.salt, 16) block, err := aes.NewCipher(aesCipherKey) if err != nil { return nil } encryptData := make([]byte, 16) iv := make([]byte, aes.BlockSize) cbc := cipher.NewCBCEncrypter(block, iv) cbc.CryptBlocks(encryptData, encrypt[:16]) copy(encrypt[:4], a.uid[:]) copy(encrypt[4:4+16], encryptData) h := a.hmac(key, encrypt[:20]) copy(encrypt[20:], h[:4]) rand.Read(ret[:1]) h = a.hmac(key, ret[:1]) copy(ret[1:], h[:7-1]) copy(ret[7:], encrypt) copy(ret[dataOffset:], data) h = a.hmac(a.userKey, ret[:retSize-4]) copy(ret[retSize-4:], h[:4]) return </s> add a := &authAES128{ Base: b, authData: &authData{}, authAES128Function: &authAES128Function{salt: "auth_aes128_md5", hmac: tools.HmacMD5, hashDigest: tools.MD5Sum}, userData: &userData{}, } a.initUserData() return a
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_sha1_v4.go
for len(b) > 8100 { a.packData(buf, b[:8100]) b = b[8100:]
<mask> offset += headSize <mask> bSize -= headSize <mask> a.headerSent = true <mask> } <mask> const blockSize = 4096 <mask> for bSize > blockSize { <mask> packSize, randSize := a.packedDataSize(b[offset : offset+blockSize]) <mask> pack := pool.Get(packSize) <mask> a.packData(b[offset:offset+blockSize], pack, randSize) <mask> a.buffer.Write(pack) <mask> pool.Put(pack) <mask> offset += blockSize <mask> bSize -= blockSize <mask> } <mask> if bSize > 0 { <mask> packSize, randSize := a.packedDataSize(b[offset:]) <mask> pack := pool.Get(packSize) <mask> a.packData(b[offset:], pack, randSize) </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove if bSize > 0 { packSize, randSize := a.packedDataSize(b[offset:]) pack := pool.Get(packSize) a.packData(b[offset:], pack, randSize) a.buffer.Write(pack) pool.Put(pack) </s> add if len(b) > 0 { a.packData(buf, b) </s> remove func (a *authSHA1V4) Encode(b []byte) ([]byte, error) { a.buffer.Reset() bSize := len(b) offset := 0 if !a.headerSent && bSize > 0 { headSize := getHeadSize(b, 30) if headSize > bSize { headSize = bSize } a.buffer.Write(a.packAuthData(b[:headSize])) offset += headSize bSize -= headSize a.headerSent = true </s> add func (a *authSHA1V4) Encode(buf *bytes.Buffer, b []byte) error { if !a.hasSentHeader { dataLength := getDataLength(b) a.packAuthData(buf, b[:dataLength]) b = b[dataLength:] a.hasSentHeader = true </s> remove return &authAES128{ Base: b, authData: &authData{}, salt: "auth_aes128_md5", hmac: tools.HmacMD5, hashDigest: tools.MD5Sum, } } func (a *authAES128) initForConn(iv []byte) Protocol { return &authAES128{ Base: &Base{ IV: iv, Key: a.Key, TCPMss: a.TCPMss, Overhead: a.Overhead, Param: a.Param, }, recvInfo: &recvInfo{recvID: 1, buffer: new(bytes.Buffer)}, authData: a.authData, packID: 1, salt: a.salt, hmac: a.hmac, hashDigest: a.hashDigest, } } func (a *authAES128) GetProtocolOverhead() int { return 9 } func (a *authAES128) SetOverhead(overhead int) { a.Overhead = overhead } func (a *authAES128) Decode(b []byte) ([]byte, int, error) { a.buffer.Reset() bSize := len(b) readSize := 0 key := pool.Get(len(a.userKey) + 4) defer pool.Put(key) copy(key, a.userKey) for bSize > 4 { binary.LittleEndian.PutUint32(key[len(key)-4:], a.recvID) h := a.hmac(key, b[:2]) if !bytes.Equal(h[:2], b[2:4]) { return nil, 0, errAuthAES128IncorrectMAC } length := int(binary.LittleEndian.Uint16(b[:2])) if length >= 8192 || length < 8 { return nil, 0, errAuthAES128DataLengthError } if length > bSize { break } h = a.hmac(key, b[:length-4]) if !bytes.Equal(h[:4], b[length-4:length]) { return nil, 0, errAuthAES128IncorrectChecksum } a.recvID++ pos := int(b[4]) if pos < 255 { pos += 4 } else { pos = int(binary.LittleEndian.Uint16(b[5:7])) + 4 } if pos > length-4 { return nil, 0, errAuthAES128PositionTooLarge } a.buffer.Write(b[pos : length-4]) b = b[length:] bSize -= length readSize += length } return a.buffer.Bytes(), readSize, nil } func (a *authAES128) Encode(b []byte) ([]byte, error) { a.buffer.Reset() bSize := len(b) offset := 0 if bSize > 0 && !a.hasSentHeader { authSize := bSize if authSize > 1200 { authSize = 1200 } a.hasSentHeader = true a.buffer.Write(a.packAuthData(b[:authSize])) bSize -= authSize offset += authSize } const blockSize = 4096 for bSize > blockSize { packSize, randSize := a.packedDataSize(b[offset : offset+blockSize]) pack := pool.Get(packSize) a.packData(b[offset:offset+blockSize], pack, randSize) a.buffer.Write(pack) pool.Put(pack) bSize -= blockSize offset += blockSize } if bSize > 0 { packSize, randSize := a.packedDataSize(b[offset:]) pack := pool.Get(packSize) a.packData(b[offset:], pack, randSize) a.buffer.Write(pack) pool.Put(pack) } return a.buffer.Bytes(), nil } func (a *authAES128) DecodePacket(b []byte) ([]byte, int, error) { bSize := len(b) h := a.hmac(a.Key, b[:bSize-4]) if !bytes.Equal(h[:4], b[bSize-4:]) { return nil, 0, errAuthAES128IncorrectMAC } return b[:bSize-4], bSize - 4, nil } func (a *authAES128) EncodePacket(b []byte) ([]byte, error) { a.initUserKeyAndID() var buf bytes.Buffer buf.Write(b) buf.Write(a.uid[:]) h := a.hmac(a.userKey, buf.Bytes()) buf.Write(h[:4]) return buf.Bytes(), nil } func (a *authAES128) initUserKeyAndID() { if a.userKey == nil { params := strings.Split(a.Param, ":") if len(params) >= 2 { if userID, err := strconv.ParseUint(params[0], 10, 32); err == nil { binary.LittleEndian.PutUint32(a.uid[:], uint32(userID)) a.userKey = a.hashDigest([]byte(params[1])) } } if a.userKey == nil { rand.Read(a.uid[:]) a.userKey = make([]byte, len(a.Key)) copy(a.userKey, a.Key) } } } func (a *authAES128) packedDataSize(data []byte) (packSize, randSize int) { dataSize := len(data) randSize = 1 if dataSize <= 1200 { if a.packID > 4 { randSize += rand.Intn(32) } else { if dataSize > 900 { randSize += rand.Intn(128) } else { randSize += rand.Intn(512) } } } packSize = randSize + dataSize + 8 return } func (a *authAES128) packData(data, ret []byte, randSize int) { dataSize := len(data) retSize := len(ret) // 0~1, ret_size binary.LittleEndian.PutUint16(ret[0:], uint16(retSize&0xFFFF)) // 2~3, hmac key := pool.Get(len(a.userKey) + 4) defer pool.Put(key) copy(key, a.userKey) binary.LittleEndian.PutUint32(key[len(key)-4:], a.packID) h := a.hmac(key, ret[:2]) copy(ret[2:4], h[:2]) // 4~rand_size+4, rand number rand.Read(ret[4 : 4+randSize]) // 4, rand_size if randSize < 128 { ret[4] = byte(randSize & 0xFF) } else { // 4, magic number 0xFF ret[4] = 0xFF // 5~6, rand_size binary.LittleEndian.PutUint16(ret[5:], uint16(randSize&0xFFFF)) } // rand_size+4~ret_size-4, data if dataSize > 0 { copy(ret[randSize+4:], data) } a.packID++ h = a.hmac(key, ret[:retSize-4]) copy(ret[retSize-4:], h[:4]) } func (a *authAES128) packAuthData(data []byte) (ret []byte) { dataSize := len(data) var randSize int if dataSize > 400 { randSize = rand.Intn(512) } else { randSize = rand.Intn(1024) } dataOffset := randSize + 16 + 4 + 4 + 7 retSize := dataOffset + dataSize + 4 ret = make([]byte, retSize) encrypt := make([]byte, 24) key := make([]byte, len(a.IV)+len(a.Key)) copy(key, a.IV) copy(key[len(a.IV):], a.Key) rand.Read(ret[dataOffset-randSize:]) a.mutex.Lock() defer a.mutex.Unlock() a.connectionID++ if a.connectionID > 0xFF000000 { a.clientID = nil } if len(a.clientID) == 0 { a.clientID = make([]byte, 8) rand.Read(a.clientID) b := make([]byte, 4) rand.Read(b) a.connectionID = binary.LittleEndian.Uint32(b) & 0xFFFFFF } copy(encrypt[4:], a.clientID) binary.LittleEndian.PutUint32(encrypt[8:], a.connectionID) now := time.Now().Unix() binary.LittleEndian.PutUint32(encrypt[:4], uint32(now)) binary.LittleEndian.PutUint16(encrypt[12:], uint16(retSize&0xFFFF)) binary.LittleEndian.PutUint16(encrypt[14:], uint16(randSize&0xFFFF)) a.initUserKeyAndID() aesCipherKey := core.Kdf(base64.StdEncoding.EncodeToString(a.userKey)+a.salt, 16) block, err := aes.NewCipher(aesCipherKey) if err != nil { return nil } encryptData := make([]byte, 16) iv := make([]byte, aes.BlockSize) cbc := cipher.NewCBCEncrypter(block, iv) cbc.CryptBlocks(encryptData, encrypt[:16]) copy(encrypt[:4], a.uid[:]) copy(encrypt[4:4+16], encryptData) h := a.hmac(key, encrypt[:20]) copy(encrypt[20:], h[:4]) rand.Read(ret[:1]) h = a.hmac(key, ret[:1]) copy(ret[1:], h[:7-1]) copy(ret[7:], encrypt) copy(ret[dataOffset:], data) h = a.hmac(a.userKey, ret[:retSize-4]) copy(ret[retSize-4:], h[:4]) return </s> add a := &authAES128{ Base: b, authData: &authData{}, authAES128Function: &authAES128Function{salt: "auth_aes128_md5", hmac: tools.HmacMD5, hashDigest: tools.MD5Sum}, userData: &userData{}, } a.initUserData() return a </s> remove var unitSize = a.TCPMss - a.Overhead for bSize > unitSize { dataLen, randLength := a.packedDataLen(b[offset : offset+unitSize]) d := pool.Get(dataLen) a.packData(d, b[offset:offset+unitSize], randLength) a.buffer.Write(d) pool.Put(d) bSize -= unitSize offset += unitSize </s> add for len(b) > 2800 { a.packData(buf, b[:2800]) b = b[2800:] </s> remove func (a *authChain) Encode(b []byte) ([]byte, error) { a.buffer.Reset() bSize := len(b) offset := 0 if bSize > 0 && !a.headerSent { headSize := 1200 if headSize > bSize { headSize = bSize } a.buffer.Write(a.packAuthData(b[:headSize])) offset += headSize bSize -= headSize a.headerSent = true </s> add func (a *authChainA) Encode(buf *bytes.Buffer, b []byte) error { if !a.hasSentHeader { dataLength := getDataLength(b) a.packAuthData(buf, b[:dataLength]) b = b[dataLength:] a.hasSentHeader = true
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_sha1_v4.go
if len(b) > 0 { a.packData(buf, b)
<mask> pool.Put(pack) <mask> offset += blockSize <mask> bSize -= blockSize <mask> } <mask> if bSize > 0 { <mask> packSize, randSize := a.packedDataSize(b[offset:]) <mask> pack := pool.Get(packSize) <mask> a.packData(b[offset:], pack, randSize) <mask> a.buffer.Write(pack) <mask> pool.Put(pack) <mask> } <mask> return a.buffer.Bytes(), nil <mask> } <mask> <mask> func (a *authSHA1V4) DecodePacket(b []byte) ([]byte, int, error) { </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove const blockSize = 4096 for bSize > blockSize { packSize, randSize := a.packedDataSize(b[offset : offset+blockSize]) pack := pool.Get(packSize) a.packData(b[offset:offset+blockSize], pack, randSize) a.buffer.Write(pack) pool.Put(pack) offset += blockSize bSize -= blockSize </s> add for len(b) > 8100 { a.packData(buf, b[:8100]) b = b[8100:] </s> remove func (a *authSHA1V4) Encode(b []byte) ([]byte, error) { a.buffer.Reset() bSize := len(b) offset := 0 if !a.headerSent && bSize > 0 { headSize := getHeadSize(b, 30) if headSize > bSize { headSize = bSize } a.buffer.Write(a.packAuthData(b[:headSize])) offset += headSize bSize -= headSize a.headerSent = true </s> add func (a *authSHA1V4) Encode(buf *bytes.Buffer, b []byte) error { if !a.hasSentHeader { dataLength := getDataLength(b) a.packAuthData(buf, b[:dataLength]) b = b[dataLength:] a.hasSentHeader = true </s> remove return a.buffer.Bytes(), nil } </s> add </s> remove return &authAES128{ Base: b, authData: &authData{}, salt: "auth_aes128_md5", hmac: tools.HmacMD5, hashDigest: tools.MD5Sum, } } func (a *authAES128) initForConn(iv []byte) Protocol { return &authAES128{ Base: &Base{ IV: iv, Key: a.Key, TCPMss: a.TCPMss, Overhead: a.Overhead, Param: a.Param, }, recvInfo: &recvInfo{recvID: 1, buffer: new(bytes.Buffer)}, authData: a.authData, packID: 1, salt: a.salt, hmac: a.hmac, hashDigest: a.hashDigest, } } func (a *authAES128) GetProtocolOverhead() int { return 9 } func (a *authAES128) SetOverhead(overhead int) { a.Overhead = overhead } func (a *authAES128) Decode(b []byte) ([]byte, int, error) { a.buffer.Reset() bSize := len(b) readSize := 0 key := pool.Get(len(a.userKey) + 4) defer pool.Put(key) copy(key, a.userKey) for bSize > 4 { binary.LittleEndian.PutUint32(key[len(key)-4:], a.recvID) h := a.hmac(key, b[:2]) if !bytes.Equal(h[:2], b[2:4]) { return nil, 0, errAuthAES128IncorrectMAC } length := int(binary.LittleEndian.Uint16(b[:2])) if length >= 8192 || length < 8 { return nil, 0, errAuthAES128DataLengthError } if length > bSize { break } h = a.hmac(key, b[:length-4]) if !bytes.Equal(h[:4], b[length-4:length]) { return nil, 0, errAuthAES128IncorrectChecksum } a.recvID++ pos := int(b[4]) if pos < 255 { pos += 4 } else { pos = int(binary.LittleEndian.Uint16(b[5:7])) + 4 } if pos > length-4 { return nil, 0, errAuthAES128PositionTooLarge } a.buffer.Write(b[pos : length-4]) b = b[length:] bSize -= length readSize += length } return a.buffer.Bytes(), readSize, nil } func (a *authAES128) Encode(b []byte) ([]byte, error) { a.buffer.Reset() bSize := len(b) offset := 0 if bSize > 0 && !a.hasSentHeader { authSize := bSize if authSize > 1200 { authSize = 1200 } a.hasSentHeader = true a.buffer.Write(a.packAuthData(b[:authSize])) bSize -= authSize offset += authSize } const blockSize = 4096 for bSize > blockSize { packSize, randSize := a.packedDataSize(b[offset : offset+blockSize]) pack := pool.Get(packSize) a.packData(b[offset:offset+blockSize], pack, randSize) a.buffer.Write(pack) pool.Put(pack) bSize -= blockSize offset += blockSize } if bSize > 0 { packSize, randSize := a.packedDataSize(b[offset:]) pack := pool.Get(packSize) a.packData(b[offset:], pack, randSize) a.buffer.Write(pack) pool.Put(pack) } return a.buffer.Bytes(), nil } func (a *authAES128) DecodePacket(b []byte) ([]byte, int, error) { bSize := len(b) h := a.hmac(a.Key, b[:bSize-4]) if !bytes.Equal(h[:4], b[bSize-4:]) { return nil, 0, errAuthAES128IncorrectMAC } return b[:bSize-4], bSize - 4, nil } func (a *authAES128) EncodePacket(b []byte) ([]byte, error) { a.initUserKeyAndID() var buf bytes.Buffer buf.Write(b) buf.Write(a.uid[:]) h := a.hmac(a.userKey, buf.Bytes()) buf.Write(h[:4]) return buf.Bytes(), nil } func (a *authAES128) initUserKeyAndID() { if a.userKey == nil { params := strings.Split(a.Param, ":") if len(params) >= 2 { if userID, err := strconv.ParseUint(params[0], 10, 32); err == nil { binary.LittleEndian.PutUint32(a.uid[:], uint32(userID)) a.userKey = a.hashDigest([]byte(params[1])) } } if a.userKey == nil { rand.Read(a.uid[:]) a.userKey = make([]byte, len(a.Key)) copy(a.userKey, a.Key) } } } func (a *authAES128) packedDataSize(data []byte) (packSize, randSize int) { dataSize := len(data) randSize = 1 if dataSize <= 1200 { if a.packID > 4 { randSize += rand.Intn(32) } else { if dataSize > 900 { randSize += rand.Intn(128) } else { randSize += rand.Intn(512) } } } packSize = randSize + dataSize + 8 return } func (a *authAES128) packData(data, ret []byte, randSize int) { dataSize := len(data) retSize := len(ret) // 0~1, ret_size binary.LittleEndian.PutUint16(ret[0:], uint16(retSize&0xFFFF)) // 2~3, hmac key := pool.Get(len(a.userKey) + 4) defer pool.Put(key) copy(key, a.userKey) binary.LittleEndian.PutUint32(key[len(key)-4:], a.packID) h := a.hmac(key, ret[:2]) copy(ret[2:4], h[:2]) // 4~rand_size+4, rand number rand.Read(ret[4 : 4+randSize]) // 4, rand_size if randSize < 128 { ret[4] = byte(randSize & 0xFF) } else { // 4, magic number 0xFF ret[4] = 0xFF // 5~6, rand_size binary.LittleEndian.PutUint16(ret[5:], uint16(randSize&0xFFFF)) } // rand_size+4~ret_size-4, data if dataSize > 0 { copy(ret[randSize+4:], data) } a.packID++ h = a.hmac(key, ret[:retSize-4]) copy(ret[retSize-4:], h[:4]) } func (a *authAES128) packAuthData(data []byte) (ret []byte) { dataSize := len(data) var randSize int if dataSize > 400 { randSize = rand.Intn(512) } else { randSize = rand.Intn(1024) } dataOffset := randSize + 16 + 4 + 4 + 7 retSize := dataOffset + dataSize + 4 ret = make([]byte, retSize) encrypt := make([]byte, 24) key := make([]byte, len(a.IV)+len(a.Key)) copy(key, a.IV) copy(key[len(a.IV):], a.Key) rand.Read(ret[dataOffset-randSize:]) a.mutex.Lock() defer a.mutex.Unlock() a.connectionID++ if a.connectionID > 0xFF000000 { a.clientID = nil } if len(a.clientID) == 0 { a.clientID = make([]byte, 8) rand.Read(a.clientID) b := make([]byte, 4) rand.Read(b) a.connectionID = binary.LittleEndian.Uint32(b) & 0xFFFFFF } copy(encrypt[4:], a.clientID) binary.LittleEndian.PutUint32(encrypt[8:], a.connectionID) now := time.Now().Unix() binary.LittleEndian.PutUint32(encrypt[:4], uint32(now)) binary.LittleEndian.PutUint16(encrypt[12:], uint16(retSize&0xFFFF)) binary.LittleEndian.PutUint16(encrypt[14:], uint16(randSize&0xFFFF)) a.initUserKeyAndID() aesCipherKey := core.Kdf(base64.StdEncoding.EncodeToString(a.userKey)+a.salt, 16) block, err := aes.NewCipher(aesCipherKey) if err != nil { return nil } encryptData := make([]byte, 16) iv := make([]byte, aes.BlockSize) cbc := cipher.NewCBCEncrypter(block, iv) cbc.CryptBlocks(encryptData, encrypt[:16]) copy(encrypt[:4], a.uid[:]) copy(encrypt[4:4+16], encryptData) h := a.hmac(key, encrypt[:20]) copy(encrypt[20:], h[:4]) rand.Read(ret[:1]) h = a.hmac(key, ret[:1]) copy(ret[1:], h[:7-1]) copy(ret[7:], encrypt) copy(ret[dataOffset:], data) h = a.hmac(a.userKey, ret[:retSize-4]) copy(ret[retSize-4:], h[:4]) return </s> add a := &authAES128{ Base: b, authData: &authData{}, authAES128Function: &authAES128Function{salt: "auth_aes128_md5", hmac: tools.HmacMD5, hashDigest: tools.MD5Sum}, userData: &userData{}, } a.initUserData() return a </s> remove if bSize > 0 { dataLen, randLength := a.packedDataLen(b[offset:]) d := pool.Get(dataLen) a.packData(d, b[offset:], randLength) a.buffer.Write(d) pool.Put(d) </s> add if len(b) > 0 { a.packData(buf, b)
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_sha1_v4.go
<mask> a.packData(b[offset:], pack, randSize) <mask> a.buffer.Write(pack) <mask> pool.Put(pack) <mask> } <mask> return a.buffer.Bytes(), nil <mask> } <mask> <mask> func (a *authSHA1V4) DecodePacket(b []byte) ([]byte, int, error) { <mask> return b, len(b), nil <mask> } <mask> </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove if bSize > 0 { packSize, randSize := a.packedDataSize(b[offset:]) pack := pool.Get(packSize) a.packData(b[offset:], pack, randSize) a.buffer.Write(pack) pool.Put(pack) </s> add if len(b) > 0 { a.packData(buf, b) </s> remove func (a *authSHA1V4) DecodePacket(b []byte) ([]byte, int, error) { return b, len(b), nil </s> add return nil </s> remove func (a *authSHA1V4) EncodePacket(b []byte) ([]byte, error) { return b, nil } </s> add func (a *authSHA1V4) DecodePacket(b []byte) ([]byte, error) { return b, nil } </s> remove func (o *origin) DecodePacket(b []byte) ([]byte, int, error) { return b, len(b), nil } </s> add func (o *origin) DecodePacket(b []byte) ([]byte, error) { return b, nil } </s> remove func (o *origin) Encode(b []byte) ([]byte, error) { return b, nil </s> add func (o *origin) Encode(buf *bytes.Buffer, b []byte) error { buf.Write(b) return nil
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_sha1_v4.go
return nil
<mask> } <mask> return a.buffer.Bytes(), nil <mask> } <mask> <mask> func (a *authSHA1V4) DecodePacket(b []byte) ([]byte, int, error) { <mask> return b, len(b), nil <mask> } <mask> <mask> func (a *authSHA1V4) EncodePacket(b []byte) ([]byte, error) { <mask> return b, nil <mask> } </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove func (a *authSHA1V4) EncodePacket(b []byte) ([]byte, error) { return b, nil } </s> add func (a *authSHA1V4) DecodePacket(b []byte) ([]byte, error) { return b, nil } </s> remove return a.buffer.Bytes(), nil } </s> add </s> remove func (o *origin) DecodePacket(b []byte) ([]byte, int, error) { return b, len(b), nil } </s> add func (o *origin) DecodePacket(b []byte) ([]byte, error) { return b, nil } </s> remove func (o *origin) EncodePacket(b []byte) ([]byte, error) { return b, nil </s> add func (o *origin) EncodePacket(buf *bytes.Buffer, b []byte) error { buf.Write(b) return nil </s> remove func (o *origin) Encode(b []byte) ([]byte, error) { return b, nil </s> add func (o *origin) Encode(buf *bytes.Buffer, b []byte) error { buf.Write(b) return nil
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_sha1_v4.go
func (a *authSHA1V4) DecodePacket(b []byte) ([]byte, error) { return b, nil }
<mask> func (a *authSHA1V4) DecodePacket(b []byte) ([]byte, int, error) { <mask> return b, len(b), nil <mask> } <mask> <mask> func (a *authSHA1V4) EncodePacket(b []byte) ([]byte, error) { <mask> return b, nil <mask> } <mask> <mask> func (a *authSHA1V4) packedDataSize(data []byte) (packSize, randSize int) { <mask> dataSize := len(data) <mask> randSize = 1 <mask> if dataSize <= 1300 { </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove func (a *authSHA1V4) packedDataSize(data []byte) (packSize, randSize int) { dataSize := len(data) randSize = 1 if dataSize <= 1300 { if dataSize > 400 { randSize += rand.Intn(128) } else { randSize += rand.Intn(1024) } } packSize = randSize + dataSize + 8 return </s> add func (a *authSHA1V4) EncodePacket(buf *bytes.Buffer, b []byte) error { buf.Write(b) return nil </s> remove func (a *authSHA1V4) DecodePacket(b []byte) ([]byte, int, error) { return b, len(b), nil </s> add return nil </s> remove func (a *authSHA1V4) packAuthData(data []byte) (ret []byte) { dataSize := len(data) randSize := 1 if dataSize <= 1300 { if dataSize > 400 { randSize += rand.Intn(128) } else { randSize += rand.Intn(1024) } } dataOffset := randSize + 4 + 2 retSize := dataOffset + dataSize + 12 + tools.HmacSHA1Len ret = make([]byte, retSize) a.mutex.Lock() defer a.mutex.Unlock() a.connectionID++ if a.connectionID > 0xFF000000 { a.clientID = nil </s> add func (a *authSHA1V4) packAuthData(poolBuf *bytes.Buffer, data []byte) { dataLength := len(data) randDataLength := a.getRandDataLength(12 + dataLength) /* 2: uint16 BigEndian packedAuthDataLength 4: uint32 LittleEndian crc32Data 3: maxRandDataLengthPrefix (min: 1) 12: authDataLength 10: hmacSHA1DataLength */ packedAuthDataLength := 2 + 4 + 3 + randDataLength + 12 + dataLength + 10 if randDataLength < 128 { packedAuthDataLength -= 2 </s> remove return a.buffer.Bytes(), nil } </s> add </s> remove func (a *authSHA1V4) SetOverhead(overhead int) { a.Overhead = overhead </s> add func (a *authSHA1V4) PacketConn(c net.PacketConn) net.PacketConn { return c
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_sha1_v4.go
func (a *authSHA1V4) EncodePacket(buf *bytes.Buffer, b []byte) error { buf.Write(b) return nil
<mask> func (a *authSHA1V4) EncodePacket(b []byte) ([]byte, error) { <mask> return b, nil <mask> } <mask> <mask> func (a *authSHA1V4) packedDataSize(data []byte) (packSize, randSize int) { <mask> dataSize := len(data) <mask> randSize = 1 <mask> if dataSize <= 1300 { <mask> if dataSize > 400 { <mask> randSize += rand.Intn(128) <mask> } else { <mask> randSize += rand.Intn(1024) <mask> } <mask> } <mask> packSize = randSize + dataSize + 8 <mask> return <mask> } <mask> <mask> func (a *authSHA1V4) packData(data, ret []byte, randSize int) { <mask> dataSize := len(data) <mask> retSize := len(ret) </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove func (a *authSHA1V4) EncodePacket(b []byte) ([]byte, error) { return b, nil } </s> add func (a *authSHA1V4) DecodePacket(b []byte) ([]byte, error) { return b, nil } </s> remove func (a *authSHA1V4) packAuthData(data []byte) (ret []byte) { dataSize := len(data) randSize := 1 if dataSize <= 1300 { if dataSize > 400 { randSize += rand.Intn(128) } else { randSize += rand.Intn(1024) } } dataOffset := randSize + 4 + 2 retSize := dataOffset + dataSize + 12 + tools.HmacSHA1Len ret = make([]byte, retSize) a.mutex.Lock() defer a.mutex.Unlock() a.connectionID++ if a.connectionID > 0xFF000000 { a.clientID = nil </s> add func (a *authSHA1V4) packAuthData(poolBuf *bytes.Buffer, data []byte) { dataLength := len(data) randDataLength := a.getRandDataLength(12 + dataLength) /* 2: uint16 BigEndian packedAuthDataLength 4: uint32 LittleEndian crc32Data 3: maxRandDataLengthPrefix (min: 1) 12: authDataLength 10: hmacSHA1DataLength */ packedAuthDataLength := 2 + 4 + 3 + randDataLength + 12 + dataLength + 10 if randDataLength < 128 { packedAuthDataLength -= 2 </s> remove func (a *authSHA1V4) packData(data, ret []byte, randSize int) { dataSize := len(data) retSize := len(ret) // 0~1, ret size binary.BigEndian.PutUint16(ret[:2], uint16(retSize&0xFFFF)) // 2~3, crc of ret size crc := crc32.ChecksumIEEE(ret[:2]) & 0xFFFF binary.LittleEndian.PutUint16(ret[2:4], uint16(crc)) // 4, rand size if randSize < 128 { ret[4] = uint8(randSize & 0xFF) } else { ret[4] = uint8(0xFF) binary.BigEndian.PutUint16(ret[5:7], uint16(randSize&0xFFFF)) } // (rand size+4)~(ret size-4), data if dataSize > 0 { copy(ret[randSize+4:], data) </s> add func (a *authSHA1V4) packData(poolBuf *bytes.Buffer, data []byte) { dataLength := len(data) randDataLength := a.getRandDataLength(dataLength) /* 2: uint16 BigEndian packedDataLength 2: uint16 LittleEndian crc32Data & 0xffff 3: maxRandDataLengthPrefix (min:1) 4: adler32Data */ packedDataLength := 2 + 2 + 3 + randDataLength + dataLength + 4 if randDataLength < 128 { packedDataLength -= 2 </s> remove return &authAES128{ Base: b, authData: &authData{}, salt: "auth_aes128_md5", hmac: tools.HmacMD5, hashDigest: tools.MD5Sum, } } func (a *authAES128) initForConn(iv []byte) Protocol { return &authAES128{ Base: &Base{ IV: iv, Key: a.Key, TCPMss: a.TCPMss, Overhead: a.Overhead, Param: a.Param, }, recvInfo: &recvInfo{recvID: 1, buffer: new(bytes.Buffer)}, authData: a.authData, packID: 1, salt: a.salt, hmac: a.hmac, hashDigest: a.hashDigest, } } func (a *authAES128) GetProtocolOverhead() int { return 9 } func (a *authAES128) SetOverhead(overhead int) { a.Overhead = overhead } func (a *authAES128) Decode(b []byte) ([]byte, int, error) { a.buffer.Reset() bSize := len(b) readSize := 0 key := pool.Get(len(a.userKey) + 4) defer pool.Put(key) copy(key, a.userKey) for bSize > 4 { binary.LittleEndian.PutUint32(key[len(key)-4:], a.recvID) h := a.hmac(key, b[:2]) if !bytes.Equal(h[:2], b[2:4]) { return nil, 0, errAuthAES128IncorrectMAC } length := int(binary.LittleEndian.Uint16(b[:2])) if length >= 8192 || length < 8 { return nil, 0, errAuthAES128DataLengthError } if length > bSize { break } h = a.hmac(key, b[:length-4]) if !bytes.Equal(h[:4], b[length-4:length]) { return nil, 0, errAuthAES128IncorrectChecksum } a.recvID++ pos := int(b[4]) if pos < 255 { pos += 4 } else { pos = int(binary.LittleEndian.Uint16(b[5:7])) + 4 } if pos > length-4 { return nil, 0, errAuthAES128PositionTooLarge } a.buffer.Write(b[pos : length-4]) b = b[length:] bSize -= length readSize += length } return a.buffer.Bytes(), readSize, nil } func (a *authAES128) Encode(b []byte) ([]byte, error) { a.buffer.Reset() bSize := len(b) offset := 0 if bSize > 0 && !a.hasSentHeader { authSize := bSize if authSize > 1200 { authSize = 1200 } a.hasSentHeader = true a.buffer.Write(a.packAuthData(b[:authSize])) bSize -= authSize offset += authSize } const blockSize = 4096 for bSize > blockSize { packSize, randSize := a.packedDataSize(b[offset : offset+blockSize]) pack := pool.Get(packSize) a.packData(b[offset:offset+blockSize], pack, randSize) a.buffer.Write(pack) pool.Put(pack) bSize -= blockSize offset += blockSize } if bSize > 0 { packSize, randSize := a.packedDataSize(b[offset:]) pack := pool.Get(packSize) a.packData(b[offset:], pack, randSize) a.buffer.Write(pack) pool.Put(pack) } return a.buffer.Bytes(), nil } func (a *authAES128) DecodePacket(b []byte) ([]byte, int, error) { bSize := len(b) h := a.hmac(a.Key, b[:bSize-4]) if !bytes.Equal(h[:4], b[bSize-4:]) { return nil, 0, errAuthAES128IncorrectMAC } return b[:bSize-4], bSize - 4, nil } func (a *authAES128) EncodePacket(b []byte) ([]byte, error) { a.initUserKeyAndID() var buf bytes.Buffer buf.Write(b) buf.Write(a.uid[:]) h := a.hmac(a.userKey, buf.Bytes()) buf.Write(h[:4]) return buf.Bytes(), nil } func (a *authAES128) initUserKeyAndID() { if a.userKey == nil { params := strings.Split(a.Param, ":") if len(params) >= 2 { if userID, err := strconv.ParseUint(params[0], 10, 32); err == nil { binary.LittleEndian.PutUint32(a.uid[:], uint32(userID)) a.userKey = a.hashDigest([]byte(params[1])) } } if a.userKey == nil { rand.Read(a.uid[:]) a.userKey = make([]byte, len(a.Key)) copy(a.userKey, a.Key) } } } func (a *authAES128) packedDataSize(data []byte) (packSize, randSize int) { dataSize := len(data) randSize = 1 if dataSize <= 1200 { if a.packID > 4 { randSize += rand.Intn(32) } else { if dataSize > 900 { randSize += rand.Intn(128) } else { randSize += rand.Intn(512) } } } packSize = randSize + dataSize + 8 return } func (a *authAES128) packData(data, ret []byte, randSize int) { dataSize := len(data) retSize := len(ret) // 0~1, ret_size binary.LittleEndian.PutUint16(ret[0:], uint16(retSize&0xFFFF)) // 2~3, hmac key := pool.Get(len(a.userKey) + 4) defer pool.Put(key) copy(key, a.userKey) binary.LittleEndian.PutUint32(key[len(key)-4:], a.packID) h := a.hmac(key, ret[:2]) copy(ret[2:4], h[:2]) // 4~rand_size+4, rand number rand.Read(ret[4 : 4+randSize]) // 4, rand_size if randSize < 128 { ret[4] = byte(randSize & 0xFF) } else { // 4, magic number 0xFF ret[4] = 0xFF // 5~6, rand_size binary.LittleEndian.PutUint16(ret[5:], uint16(randSize&0xFFFF)) } // rand_size+4~ret_size-4, data if dataSize > 0 { copy(ret[randSize+4:], data) } a.packID++ h = a.hmac(key, ret[:retSize-4]) copy(ret[retSize-4:], h[:4]) } func (a *authAES128) packAuthData(data []byte) (ret []byte) { dataSize := len(data) var randSize int if dataSize > 400 { randSize = rand.Intn(512) } else { randSize = rand.Intn(1024) } dataOffset := randSize + 16 + 4 + 4 + 7 retSize := dataOffset + dataSize + 4 ret = make([]byte, retSize) encrypt := make([]byte, 24) key := make([]byte, len(a.IV)+len(a.Key)) copy(key, a.IV) copy(key[len(a.IV):], a.Key) rand.Read(ret[dataOffset-randSize:]) a.mutex.Lock() defer a.mutex.Unlock() a.connectionID++ if a.connectionID > 0xFF000000 { a.clientID = nil } if len(a.clientID) == 0 { a.clientID = make([]byte, 8) rand.Read(a.clientID) b := make([]byte, 4) rand.Read(b) a.connectionID = binary.LittleEndian.Uint32(b) & 0xFFFFFF } copy(encrypt[4:], a.clientID) binary.LittleEndian.PutUint32(encrypt[8:], a.connectionID) now := time.Now().Unix() binary.LittleEndian.PutUint32(encrypt[:4], uint32(now)) binary.LittleEndian.PutUint16(encrypt[12:], uint16(retSize&0xFFFF)) binary.LittleEndian.PutUint16(encrypt[14:], uint16(randSize&0xFFFF)) a.initUserKeyAndID() aesCipherKey := core.Kdf(base64.StdEncoding.EncodeToString(a.userKey)+a.salt, 16) block, err := aes.NewCipher(aesCipherKey) if err != nil { return nil } encryptData := make([]byte, 16) iv := make([]byte, aes.BlockSize) cbc := cipher.NewCBCEncrypter(block, iv) cbc.CryptBlocks(encryptData, encrypt[:16]) copy(encrypt[:4], a.uid[:]) copy(encrypt[4:4+16], encryptData) h := a.hmac(key, encrypt[:20]) copy(encrypt[20:], h[:4]) rand.Read(ret[:1]) h = a.hmac(key, ret[:1]) copy(ret[1:], h[:7-1]) copy(ret[7:], encrypt) copy(ret[dataOffset:], data) h = a.hmac(a.userKey, ret[:retSize-4]) copy(ret[retSize-4:], h[:4]) return </s> add a := &authAES128{ Base: b, authData: &authData{}, authAES128Function: &authAES128Function{salt: "auth_aes128_md5", hmac: tools.HmacMD5, hashDigest: tools.MD5Sum}, userData: &userData{}, } a.initUserData() return a </s> remove // (ret size-4)~end, adler32 of full data adler := adler32.Checksum(ret[:retSize-4]) binary.LittleEndian.PutUint32(ret[retSize-4:], adler) </s> add binary.Write(poolBuf, binary.BigEndian, uint16(packedDataLength)) binary.Write(poolBuf, binary.LittleEndian, uint16(crc32.ChecksumIEEE(poolBuf.Bytes()[poolBuf.Len()-2:])&0xffff)) a.packRandData(poolBuf, randDataLength) poolBuf.Write(data) binary.Write(poolBuf, binary.LittleEndian, adler32.Checksum(poolBuf.Bytes()[poolBuf.Len()-packedDataLength+4:]))
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_sha1_v4.go
func (a *authSHA1V4) packData(poolBuf *bytes.Buffer, data []byte) { dataLength := len(data) randDataLength := a.getRandDataLength(dataLength) /* 2: uint16 BigEndian packedDataLength 2: uint16 LittleEndian crc32Data & 0xffff 3: maxRandDataLengthPrefix (min:1) 4: adler32Data */ packedDataLength := 2 + 2 + 3 + randDataLength + dataLength + 4 if randDataLength < 128 { packedDataLength -= 2
<mask> packSize = randSize + dataSize + 8 <mask> return <mask> } <mask> <mask> func (a *authSHA1V4) packData(data, ret []byte, randSize int) { <mask> dataSize := len(data) <mask> retSize := len(ret) <mask> // 0~1, ret size <mask> binary.BigEndian.PutUint16(ret[:2], uint16(retSize&0xFFFF)) <mask> // 2~3, crc of ret size <mask> crc := crc32.ChecksumIEEE(ret[:2]) & 0xFFFF <mask> binary.LittleEndian.PutUint16(ret[2:4], uint16(crc)) <mask> // 4, rand size <mask> if randSize < 128 { <mask> ret[4] = uint8(randSize & 0xFF) <mask> } else { <mask> ret[4] = uint8(0xFF) <mask> binary.BigEndian.PutUint16(ret[5:7], uint16(randSize&0xFFFF)) <mask> } <mask> // (rand size+4)~(ret size-4), data <mask> if dataSize > 0 { <mask> copy(ret[randSize+4:], data) <mask> } <mask> // (ret size-4)~end, adler32 of full data <mask> adler := adler32.Checksum(ret[:retSize-4]) <mask> binary.LittleEndian.PutUint32(ret[retSize-4:], adler) <mask> } </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove // (ret size-4)~end, adler32 of full data adler := adler32.Checksum(ret[:retSize-4]) binary.LittleEndian.PutUint32(ret[retSize-4:], adler) </s> add binary.Write(poolBuf, binary.BigEndian, uint16(packedDataLength)) binary.Write(poolBuf, binary.LittleEndian, uint16(crc32.ChecksumIEEE(poolBuf.Bytes()[poolBuf.Len()-2:])&0xffff)) a.packRandData(poolBuf, randDataLength) poolBuf.Write(data) binary.Write(poolBuf, binary.LittleEndian, adler32.Checksum(poolBuf.Bytes()[poolBuf.Len()-packedDataLength+4:])) </s> remove func (a *authSHA1V4) packedDataSize(data []byte) (packSize, randSize int) { dataSize := len(data) randSize = 1 if dataSize <= 1300 { if dataSize > 400 { randSize += rand.Intn(128) } else { randSize += rand.Intn(1024) } } packSize = randSize + dataSize + 8 return </s> add func (a *authSHA1V4) EncodePacket(buf *bytes.Buffer, b []byte) error { buf.Write(b) return nil </s> remove crc := crc32.ChecksumIEEE(crcData) & 0xFFFFFFFF // 2~6, crc of (ret size+salt+key) binary.LittleEndian.PutUint32(ret[2:], crc) // 6~(rand size+6), rand numbers rand.Read(ret[dataOffset-randSize : dataOffset]) // 6, rand size if randSize < 128 { ret[6] = byte(randSize & 0xFF) } else { // 6, magic number 0xFF ret[6] = 0xFF // 7~8, rand size binary.BigEndian.PutUint16(ret[7:9], uint16(randSize&0xFFFF)) </s> add key := pool.Get(len(a.iv) + len(a.Key)) defer pool.Put(key) copy(key, a.iv) copy(key[len(a.iv):], a.Key) poolBuf.Write(crcData[:2]) binary.Write(poolBuf, binary.LittleEndian, crc32.ChecksumIEEE(crcData)) a.packRandData(poolBuf, randDataLength) a.putAuthData(poolBuf) poolBuf.Write(data) poolBuf.Write(tools.HmacSHA1(key, poolBuf.Bytes()[poolBuf.Len()-packedAuthDataLength+10:])[:10]) } func (a *authSHA1V4) packRandData(poolBuf *bytes.Buffer, size int) { if size < 128 { poolBuf.WriteByte(byte(size + 1)) tools.AppendRandBytes(poolBuf, size) return </s> remove func (a *authSHA1V4) packAuthData(data []byte) (ret []byte) { dataSize := len(data) randSize := 1 if dataSize <= 1300 { if dataSize > 400 { randSize += rand.Intn(128) } else { randSize += rand.Intn(1024) } } dataOffset := randSize + 4 + 2 retSize := dataOffset + dataSize + 12 + tools.HmacSHA1Len ret = make([]byte, retSize) a.mutex.Lock() defer a.mutex.Unlock() a.connectionID++ if a.connectionID > 0xFF000000 { a.clientID = nil </s> add func (a *authSHA1V4) packAuthData(poolBuf *bytes.Buffer, data []byte) { dataLength := len(data) randDataLength := a.getRandDataLength(12 + dataLength) /* 2: uint16 BigEndian packedAuthDataLength 4: uint32 LittleEndian crc32Data 3: maxRandDataLengthPrefix (min: 1) 12: authDataLength 10: hmacSHA1DataLength */ packedAuthDataLength := 2 + 4 + 3 + randDataLength + 12 + dataLength + 10 if randDataLength < 128 { packedAuthDataLength -= 2 </s> remove return &authAES128{ Base: b, authData: &authData{}, salt: "auth_aes128_md5", hmac: tools.HmacMD5, hashDigest: tools.MD5Sum, } } func (a *authAES128) initForConn(iv []byte) Protocol { return &authAES128{ Base: &Base{ IV: iv, Key: a.Key, TCPMss: a.TCPMss, Overhead: a.Overhead, Param: a.Param, }, recvInfo: &recvInfo{recvID: 1, buffer: new(bytes.Buffer)}, authData: a.authData, packID: 1, salt: a.salt, hmac: a.hmac, hashDigest: a.hashDigest, } } func (a *authAES128) GetProtocolOverhead() int { return 9 } func (a *authAES128) SetOverhead(overhead int) { a.Overhead = overhead } func (a *authAES128) Decode(b []byte) ([]byte, int, error) { a.buffer.Reset() bSize := len(b) readSize := 0 key := pool.Get(len(a.userKey) + 4) defer pool.Put(key) copy(key, a.userKey) for bSize > 4 { binary.LittleEndian.PutUint32(key[len(key)-4:], a.recvID) h := a.hmac(key, b[:2]) if !bytes.Equal(h[:2], b[2:4]) { return nil, 0, errAuthAES128IncorrectMAC } length := int(binary.LittleEndian.Uint16(b[:2])) if length >= 8192 || length < 8 { return nil, 0, errAuthAES128DataLengthError } if length > bSize { break } h = a.hmac(key, b[:length-4]) if !bytes.Equal(h[:4], b[length-4:length]) { return nil, 0, errAuthAES128IncorrectChecksum } a.recvID++ pos := int(b[4]) if pos < 255 { pos += 4 } else { pos = int(binary.LittleEndian.Uint16(b[5:7])) + 4 } if pos > length-4 { return nil, 0, errAuthAES128PositionTooLarge } a.buffer.Write(b[pos : length-4]) b = b[length:] bSize -= length readSize += length } return a.buffer.Bytes(), readSize, nil } func (a *authAES128) Encode(b []byte) ([]byte, error) { a.buffer.Reset() bSize := len(b) offset := 0 if bSize > 0 && !a.hasSentHeader { authSize := bSize if authSize > 1200 { authSize = 1200 } a.hasSentHeader = true a.buffer.Write(a.packAuthData(b[:authSize])) bSize -= authSize offset += authSize } const blockSize = 4096 for bSize > blockSize { packSize, randSize := a.packedDataSize(b[offset : offset+blockSize]) pack := pool.Get(packSize) a.packData(b[offset:offset+blockSize], pack, randSize) a.buffer.Write(pack) pool.Put(pack) bSize -= blockSize offset += blockSize } if bSize > 0 { packSize, randSize := a.packedDataSize(b[offset:]) pack := pool.Get(packSize) a.packData(b[offset:], pack, randSize) a.buffer.Write(pack) pool.Put(pack) } return a.buffer.Bytes(), nil } func (a *authAES128) DecodePacket(b []byte) ([]byte, int, error) { bSize := len(b) h := a.hmac(a.Key, b[:bSize-4]) if !bytes.Equal(h[:4], b[bSize-4:]) { return nil, 0, errAuthAES128IncorrectMAC } return b[:bSize-4], bSize - 4, nil } func (a *authAES128) EncodePacket(b []byte) ([]byte, error) { a.initUserKeyAndID() var buf bytes.Buffer buf.Write(b) buf.Write(a.uid[:]) h := a.hmac(a.userKey, buf.Bytes()) buf.Write(h[:4]) return buf.Bytes(), nil } func (a *authAES128) initUserKeyAndID() { if a.userKey == nil { params := strings.Split(a.Param, ":") if len(params) >= 2 { if userID, err := strconv.ParseUint(params[0], 10, 32); err == nil { binary.LittleEndian.PutUint32(a.uid[:], uint32(userID)) a.userKey = a.hashDigest([]byte(params[1])) } } if a.userKey == nil { rand.Read(a.uid[:]) a.userKey = make([]byte, len(a.Key)) copy(a.userKey, a.Key) } } } func (a *authAES128) packedDataSize(data []byte) (packSize, randSize int) { dataSize := len(data) randSize = 1 if dataSize <= 1200 { if a.packID > 4 { randSize += rand.Intn(32) } else { if dataSize > 900 { randSize += rand.Intn(128) } else { randSize += rand.Intn(512) } } } packSize = randSize + dataSize + 8 return } func (a *authAES128) packData(data, ret []byte, randSize int) { dataSize := len(data) retSize := len(ret) // 0~1, ret_size binary.LittleEndian.PutUint16(ret[0:], uint16(retSize&0xFFFF)) // 2~3, hmac key := pool.Get(len(a.userKey) + 4) defer pool.Put(key) copy(key, a.userKey) binary.LittleEndian.PutUint32(key[len(key)-4:], a.packID) h := a.hmac(key, ret[:2]) copy(ret[2:4], h[:2]) // 4~rand_size+4, rand number rand.Read(ret[4 : 4+randSize]) // 4, rand_size if randSize < 128 { ret[4] = byte(randSize & 0xFF) } else { // 4, magic number 0xFF ret[4] = 0xFF // 5~6, rand_size binary.LittleEndian.PutUint16(ret[5:], uint16(randSize&0xFFFF)) } // rand_size+4~ret_size-4, data if dataSize > 0 { copy(ret[randSize+4:], data) } a.packID++ h = a.hmac(key, ret[:retSize-4]) copy(ret[retSize-4:], h[:4]) } func (a *authAES128) packAuthData(data []byte) (ret []byte) { dataSize := len(data) var randSize int if dataSize > 400 { randSize = rand.Intn(512) } else { randSize = rand.Intn(1024) } dataOffset := randSize + 16 + 4 + 4 + 7 retSize := dataOffset + dataSize + 4 ret = make([]byte, retSize) encrypt := make([]byte, 24) key := make([]byte, len(a.IV)+len(a.Key)) copy(key, a.IV) copy(key[len(a.IV):], a.Key) rand.Read(ret[dataOffset-randSize:]) a.mutex.Lock() defer a.mutex.Unlock() a.connectionID++ if a.connectionID > 0xFF000000 { a.clientID = nil } if len(a.clientID) == 0 { a.clientID = make([]byte, 8) rand.Read(a.clientID) b := make([]byte, 4) rand.Read(b) a.connectionID = binary.LittleEndian.Uint32(b) & 0xFFFFFF } copy(encrypt[4:], a.clientID) binary.LittleEndian.PutUint32(encrypt[8:], a.connectionID) now := time.Now().Unix() binary.LittleEndian.PutUint32(encrypt[:4], uint32(now)) binary.LittleEndian.PutUint16(encrypt[12:], uint16(retSize&0xFFFF)) binary.LittleEndian.PutUint16(encrypt[14:], uint16(randSize&0xFFFF)) a.initUserKeyAndID() aesCipherKey := core.Kdf(base64.StdEncoding.EncodeToString(a.userKey)+a.salt, 16) block, err := aes.NewCipher(aesCipherKey) if err != nil { return nil } encryptData := make([]byte, 16) iv := make([]byte, aes.BlockSize) cbc := cipher.NewCBCEncrypter(block, iv) cbc.CryptBlocks(encryptData, encrypt[:16]) copy(encrypt[:4], a.uid[:]) copy(encrypt[4:4+16], encryptData) h := a.hmac(key, encrypt[:20]) copy(encrypt[20:], h[:4]) rand.Read(ret[:1]) h = a.hmac(key, ret[:1]) copy(ret[1:], h[:7-1]) copy(ret[7:], encrypt) copy(ret[dataOffset:], data) h = a.hmac(a.userKey, ret[:retSize-4]) copy(ret[retSize-4:], h[:4]) return </s> add a := &authAES128{ Base: b, authData: &authData{}, authAES128Function: &authAES128Function{salt: "auth_aes128_md5", hmac: tools.HmacMD5, hashDigest: tools.MD5Sum}, userData: &userData{}, } a.initUserData() return a
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "k...
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_sha1_v4.go
binary.Write(poolBuf, binary.BigEndian, uint16(packedDataLength)) binary.Write(poolBuf, binary.LittleEndian, uint16(crc32.ChecksumIEEE(poolBuf.Bytes()[poolBuf.Len()-2:])&0xffff)) a.packRandData(poolBuf, randDataLength) poolBuf.Write(data) binary.Write(poolBuf, binary.LittleEndian, adler32.Checksum(poolBuf.Bytes()[poolBuf.Len()-packedDataLength+4:]))
<mask> // (rand size+4)~(ret size-4), data <mask> if dataSize > 0 { <mask> copy(ret[randSize+4:], data) <mask> } <mask> // (ret size-4)~end, adler32 of full data <mask> adler := adler32.Checksum(ret[:retSize-4]) <mask> binary.LittleEndian.PutUint32(ret[retSize-4:], adler) <mask> } <mask> <mask> func (a *authSHA1V4) packAuthData(data []byte) (ret []byte) { <mask> dataSize := len(data) <mask> randSize := 1 </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove func (a *authSHA1V4) packData(data, ret []byte, randSize int) { dataSize := len(data) retSize := len(ret) // 0~1, ret size binary.BigEndian.PutUint16(ret[:2], uint16(retSize&0xFFFF)) // 2~3, crc of ret size crc := crc32.ChecksumIEEE(ret[:2]) & 0xFFFF binary.LittleEndian.PutUint16(ret[2:4], uint16(crc)) // 4, rand size if randSize < 128 { ret[4] = uint8(randSize & 0xFF) } else { ret[4] = uint8(0xFF) binary.BigEndian.PutUint16(ret[5:7], uint16(randSize&0xFFFF)) } // (rand size+4)~(ret size-4), data if dataSize > 0 { copy(ret[randSize+4:], data) </s> add func (a *authSHA1V4) packData(poolBuf *bytes.Buffer, data []byte) { dataLength := len(data) randDataLength := a.getRandDataLength(dataLength) /* 2: uint16 BigEndian packedDataLength 2: uint16 LittleEndian crc32Data & 0xffff 3: maxRandDataLengthPrefix (min:1) 4: adler32Data */ packedDataLength := 2 + 2 + 3 + randDataLength + dataLength + 4 if randDataLength < 128 { packedDataLength -= 2 </s> remove func (a *authSHA1V4) packAuthData(data []byte) (ret []byte) { dataSize := len(data) randSize := 1 if dataSize <= 1300 { if dataSize > 400 { randSize += rand.Intn(128) } else { randSize += rand.Intn(1024) } } dataOffset := randSize + 4 + 2 retSize := dataOffset + dataSize + 12 + tools.HmacSHA1Len ret = make([]byte, retSize) a.mutex.Lock() defer a.mutex.Unlock() a.connectionID++ if a.connectionID > 0xFF000000 { a.clientID = nil </s> add func (a *authSHA1V4) packAuthData(poolBuf *bytes.Buffer, data []byte) { dataLength := len(data) randDataLength := a.getRandDataLength(12 + dataLength) /* 2: uint16 BigEndian packedAuthDataLength 4: uint32 LittleEndian crc32Data 3: maxRandDataLengthPrefix (min: 1) 12: authDataLength 10: hmacSHA1DataLength */ packedAuthDataLength := 2 + 4 + 3 + randDataLength + 12 + dataLength + 10 if randDataLength < 128 { packedAuthDataLength -= 2 </s> remove func (a *authSHA1V4) packedDataSize(data []byte) (packSize, randSize int) { dataSize := len(data) randSize = 1 if dataSize <= 1300 { if dataSize > 400 { randSize += rand.Intn(128) } else { randSize += rand.Intn(1024) } } packSize = randSize + dataSize + 8 return </s> add func (a *authSHA1V4) EncodePacket(buf *bytes.Buffer, b []byte) error { buf.Write(b) return nil </s> remove func (a *authSHA1V4) EncodePacket(b []byte) ([]byte, error) { return b, nil } </s> add func (a *authSHA1V4) DecodePacket(b []byte) ([]byte, error) { return b, nil } </s> remove return &authAES128{ Base: b, authData: &authData{}, salt: "auth_aes128_md5", hmac: tools.HmacMD5, hashDigest: tools.MD5Sum, } } func (a *authAES128) initForConn(iv []byte) Protocol { return &authAES128{ Base: &Base{ IV: iv, Key: a.Key, TCPMss: a.TCPMss, Overhead: a.Overhead, Param: a.Param, }, recvInfo: &recvInfo{recvID: 1, buffer: new(bytes.Buffer)}, authData: a.authData, packID: 1, salt: a.salt, hmac: a.hmac, hashDigest: a.hashDigest, } } func (a *authAES128) GetProtocolOverhead() int { return 9 } func (a *authAES128) SetOverhead(overhead int) { a.Overhead = overhead } func (a *authAES128) Decode(b []byte) ([]byte, int, error) { a.buffer.Reset() bSize := len(b) readSize := 0 key := pool.Get(len(a.userKey) + 4) defer pool.Put(key) copy(key, a.userKey) for bSize > 4 { binary.LittleEndian.PutUint32(key[len(key)-4:], a.recvID) h := a.hmac(key, b[:2]) if !bytes.Equal(h[:2], b[2:4]) { return nil, 0, errAuthAES128IncorrectMAC } length := int(binary.LittleEndian.Uint16(b[:2])) if length >= 8192 || length < 8 { return nil, 0, errAuthAES128DataLengthError } if length > bSize { break } h = a.hmac(key, b[:length-4]) if !bytes.Equal(h[:4], b[length-4:length]) { return nil, 0, errAuthAES128IncorrectChecksum } a.recvID++ pos := int(b[4]) if pos < 255 { pos += 4 } else { pos = int(binary.LittleEndian.Uint16(b[5:7])) + 4 } if pos > length-4 { return nil, 0, errAuthAES128PositionTooLarge } a.buffer.Write(b[pos : length-4]) b = b[length:] bSize -= length readSize += length } return a.buffer.Bytes(), readSize, nil } func (a *authAES128) Encode(b []byte) ([]byte, error) { a.buffer.Reset() bSize := len(b) offset := 0 if bSize > 0 && !a.hasSentHeader { authSize := bSize if authSize > 1200 { authSize = 1200 } a.hasSentHeader = true a.buffer.Write(a.packAuthData(b[:authSize])) bSize -= authSize offset += authSize } const blockSize = 4096 for bSize > blockSize { packSize, randSize := a.packedDataSize(b[offset : offset+blockSize]) pack := pool.Get(packSize) a.packData(b[offset:offset+blockSize], pack, randSize) a.buffer.Write(pack) pool.Put(pack) bSize -= blockSize offset += blockSize } if bSize > 0 { packSize, randSize := a.packedDataSize(b[offset:]) pack := pool.Get(packSize) a.packData(b[offset:], pack, randSize) a.buffer.Write(pack) pool.Put(pack) } return a.buffer.Bytes(), nil } func (a *authAES128) DecodePacket(b []byte) ([]byte, int, error) { bSize := len(b) h := a.hmac(a.Key, b[:bSize-4]) if !bytes.Equal(h[:4], b[bSize-4:]) { return nil, 0, errAuthAES128IncorrectMAC } return b[:bSize-4], bSize - 4, nil } func (a *authAES128) EncodePacket(b []byte) ([]byte, error) { a.initUserKeyAndID() var buf bytes.Buffer buf.Write(b) buf.Write(a.uid[:]) h := a.hmac(a.userKey, buf.Bytes()) buf.Write(h[:4]) return buf.Bytes(), nil } func (a *authAES128) initUserKeyAndID() { if a.userKey == nil { params := strings.Split(a.Param, ":") if len(params) >= 2 { if userID, err := strconv.ParseUint(params[0], 10, 32); err == nil { binary.LittleEndian.PutUint32(a.uid[:], uint32(userID)) a.userKey = a.hashDigest([]byte(params[1])) } } if a.userKey == nil { rand.Read(a.uid[:]) a.userKey = make([]byte, len(a.Key)) copy(a.userKey, a.Key) } } } func (a *authAES128) packedDataSize(data []byte) (packSize, randSize int) { dataSize := len(data) randSize = 1 if dataSize <= 1200 { if a.packID > 4 { randSize += rand.Intn(32) } else { if dataSize > 900 { randSize += rand.Intn(128) } else { randSize += rand.Intn(512) } } } packSize = randSize + dataSize + 8 return } func (a *authAES128) packData(data, ret []byte, randSize int) { dataSize := len(data) retSize := len(ret) // 0~1, ret_size binary.LittleEndian.PutUint16(ret[0:], uint16(retSize&0xFFFF)) // 2~3, hmac key := pool.Get(len(a.userKey) + 4) defer pool.Put(key) copy(key, a.userKey) binary.LittleEndian.PutUint32(key[len(key)-4:], a.packID) h := a.hmac(key, ret[:2]) copy(ret[2:4], h[:2]) // 4~rand_size+4, rand number rand.Read(ret[4 : 4+randSize]) // 4, rand_size if randSize < 128 { ret[4] = byte(randSize & 0xFF) } else { // 4, magic number 0xFF ret[4] = 0xFF // 5~6, rand_size binary.LittleEndian.PutUint16(ret[5:], uint16(randSize&0xFFFF)) } // rand_size+4~ret_size-4, data if dataSize > 0 { copy(ret[randSize+4:], data) } a.packID++ h = a.hmac(key, ret[:retSize-4]) copy(ret[retSize-4:], h[:4]) } func (a *authAES128) packAuthData(data []byte) (ret []byte) { dataSize := len(data) var randSize int if dataSize > 400 { randSize = rand.Intn(512) } else { randSize = rand.Intn(1024) } dataOffset := randSize + 16 + 4 + 4 + 7 retSize := dataOffset + dataSize + 4 ret = make([]byte, retSize) encrypt := make([]byte, 24) key := make([]byte, len(a.IV)+len(a.Key)) copy(key, a.IV) copy(key[len(a.IV):], a.Key) rand.Read(ret[dataOffset-randSize:]) a.mutex.Lock() defer a.mutex.Unlock() a.connectionID++ if a.connectionID > 0xFF000000 { a.clientID = nil } if len(a.clientID) == 0 { a.clientID = make([]byte, 8) rand.Read(a.clientID) b := make([]byte, 4) rand.Read(b) a.connectionID = binary.LittleEndian.Uint32(b) & 0xFFFFFF } copy(encrypt[4:], a.clientID) binary.LittleEndian.PutUint32(encrypt[8:], a.connectionID) now := time.Now().Unix() binary.LittleEndian.PutUint32(encrypt[:4], uint32(now)) binary.LittleEndian.PutUint16(encrypt[12:], uint16(retSize&0xFFFF)) binary.LittleEndian.PutUint16(encrypt[14:], uint16(randSize&0xFFFF)) a.initUserKeyAndID() aesCipherKey := core.Kdf(base64.StdEncoding.EncodeToString(a.userKey)+a.salt, 16) block, err := aes.NewCipher(aesCipherKey) if err != nil { return nil } encryptData := make([]byte, 16) iv := make([]byte, aes.BlockSize) cbc := cipher.NewCBCEncrypter(block, iv) cbc.CryptBlocks(encryptData, encrypt[:16]) copy(encrypt[:4], a.uid[:]) copy(encrypt[4:4+16], encryptData) h := a.hmac(key, encrypt[:20]) copy(encrypt[20:], h[:4]) rand.Read(ret[:1]) h = a.hmac(key, ret[:1]) copy(ret[1:], h[:7-1]) copy(ret[7:], encrypt) copy(ret[dataOffset:], data) h = a.hmac(a.userKey, ret[:retSize-4]) copy(ret[retSize-4:], h[:4]) return </s> add a := &authAES128{ Base: b, authData: &authData{}, authAES128Function: &authAES128Function{salt: "auth_aes128_md5", hmac: tools.HmacMD5, hashDigest: tools.MD5Sum}, userData: &userData{}, } a.initUserData() return a
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_sha1_v4.go
func (a *authSHA1V4) packAuthData(poolBuf *bytes.Buffer, data []byte) { dataLength := len(data) randDataLength := a.getRandDataLength(12 + dataLength) /* 2: uint16 BigEndian packedAuthDataLength 4: uint32 LittleEndian crc32Data 3: maxRandDataLengthPrefix (min: 1) 12: authDataLength 10: hmacSHA1DataLength */ packedAuthDataLength := 2 + 4 + 3 + randDataLength + 12 + dataLength + 10 if randDataLength < 128 { packedAuthDataLength -= 2
<mask> adler := adler32.Checksum(ret[:retSize-4]) <mask> binary.LittleEndian.PutUint32(ret[retSize-4:], adler) <mask> } <mask> <mask> func (a *authSHA1V4) packAuthData(data []byte) (ret []byte) { <mask> dataSize := len(data) <mask> randSize := 1 <mask> if dataSize <= 1300 { <mask> if dataSize > 400 { <mask> randSize += rand.Intn(128) <mask> } else { <mask> randSize += rand.Intn(1024) <mask> } <mask> } <mask> dataOffset := randSize + 4 + 2 <mask> retSize := dataOffset + dataSize + 12 + tools.HmacSHA1Len <mask> ret = make([]byte, retSize) <mask> a.mutex.Lock() <mask> defer a.mutex.Unlock() <mask> a.connectionID++ <mask> if a.connectionID > 0xFF000000 { <mask> a.clientID = nil <mask> } <mask> if len(a.clientID) == 0 { <mask> a.clientID = make([]byte, 8) <mask> rand.Read(a.clientID) <mask> b := make([]byte, 4) </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove func (a *authSHA1V4) packedDataSize(data []byte) (packSize, randSize int) { dataSize := len(data) randSize = 1 if dataSize <= 1300 { if dataSize > 400 { randSize += rand.Intn(128) } else { randSize += rand.Intn(1024) } } packSize = randSize + dataSize + 8 return </s> add func (a *authSHA1V4) EncodePacket(buf *bytes.Buffer, b []byte) error { buf.Write(b) return nil </s> remove return &authAES128{ Base: b, authData: &authData{}, salt: "auth_aes128_md5", hmac: tools.HmacMD5, hashDigest: tools.MD5Sum, } } func (a *authAES128) initForConn(iv []byte) Protocol { return &authAES128{ Base: &Base{ IV: iv, Key: a.Key, TCPMss: a.TCPMss, Overhead: a.Overhead, Param: a.Param, }, recvInfo: &recvInfo{recvID: 1, buffer: new(bytes.Buffer)}, authData: a.authData, packID: 1, salt: a.salt, hmac: a.hmac, hashDigest: a.hashDigest, } } func (a *authAES128) GetProtocolOverhead() int { return 9 } func (a *authAES128) SetOverhead(overhead int) { a.Overhead = overhead } func (a *authAES128) Decode(b []byte) ([]byte, int, error) { a.buffer.Reset() bSize := len(b) readSize := 0 key := pool.Get(len(a.userKey) + 4) defer pool.Put(key) copy(key, a.userKey) for bSize > 4 { binary.LittleEndian.PutUint32(key[len(key)-4:], a.recvID) h := a.hmac(key, b[:2]) if !bytes.Equal(h[:2], b[2:4]) { return nil, 0, errAuthAES128IncorrectMAC } length := int(binary.LittleEndian.Uint16(b[:2])) if length >= 8192 || length < 8 { return nil, 0, errAuthAES128DataLengthError } if length > bSize { break } h = a.hmac(key, b[:length-4]) if !bytes.Equal(h[:4], b[length-4:length]) { return nil, 0, errAuthAES128IncorrectChecksum } a.recvID++ pos := int(b[4]) if pos < 255 { pos += 4 } else { pos = int(binary.LittleEndian.Uint16(b[5:7])) + 4 } if pos > length-4 { return nil, 0, errAuthAES128PositionTooLarge } a.buffer.Write(b[pos : length-4]) b = b[length:] bSize -= length readSize += length } return a.buffer.Bytes(), readSize, nil } func (a *authAES128) Encode(b []byte) ([]byte, error) { a.buffer.Reset() bSize := len(b) offset := 0 if bSize > 0 && !a.hasSentHeader { authSize := bSize if authSize > 1200 { authSize = 1200 } a.hasSentHeader = true a.buffer.Write(a.packAuthData(b[:authSize])) bSize -= authSize offset += authSize } const blockSize = 4096 for bSize > blockSize { packSize, randSize := a.packedDataSize(b[offset : offset+blockSize]) pack := pool.Get(packSize) a.packData(b[offset:offset+blockSize], pack, randSize) a.buffer.Write(pack) pool.Put(pack) bSize -= blockSize offset += blockSize } if bSize > 0 { packSize, randSize := a.packedDataSize(b[offset:]) pack := pool.Get(packSize) a.packData(b[offset:], pack, randSize) a.buffer.Write(pack) pool.Put(pack) } return a.buffer.Bytes(), nil } func (a *authAES128) DecodePacket(b []byte) ([]byte, int, error) { bSize := len(b) h := a.hmac(a.Key, b[:bSize-4]) if !bytes.Equal(h[:4], b[bSize-4:]) { return nil, 0, errAuthAES128IncorrectMAC } return b[:bSize-4], bSize - 4, nil } func (a *authAES128) EncodePacket(b []byte) ([]byte, error) { a.initUserKeyAndID() var buf bytes.Buffer buf.Write(b) buf.Write(a.uid[:]) h := a.hmac(a.userKey, buf.Bytes()) buf.Write(h[:4]) return buf.Bytes(), nil } func (a *authAES128) initUserKeyAndID() { if a.userKey == nil { params := strings.Split(a.Param, ":") if len(params) >= 2 { if userID, err := strconv.ParseUint(params[0], 10, 32); err == nil { binary.LittleEndian.PutUint32(a.uid[:], uint32(userID)) a.userKey = a.hashDigest([]byte(params[1])) } } if a.userKey == nil { rand.Read(a.uid[:]) a.userKey = make([]byte, len(a.Key)) copy(a.userKey, a.Key) } } } func (a *authAES128) packedDataSize(data []byte) (packSize, randSize int) { dataSize := len(data) randSize = 1 if dataSize <= 1200 { if a.packID > 4 { randSize += rand.Intn(32) } else { if dataSize > 900 { randSize += rand.Intn(128) } else { randSize += rand.Intn(512) } } } packSize = randSize + dataSize + 8 return } func (a *authAES128) packData(data, ret []byte, randSize int) { dataSize := len(data) retSize := len(ret) // 0~1, ret_size binary.LittleEndian.PutUint16(ret[0:], uint16(retSize&0xFFFF)) // 2~3, hmac key := pool.Get(len(a.userKey) + 4) defer pool.Put(key) copy(key, a.userKey) binary.LittleEndian.PutUint32(key[len(key)-4:], a.packID) h := a.hmac(key, ret[:2]) copy(ret[2:4], h[:2]) // 4~rand_size+4, rand number rand.Read(ret[4 : 4+randSize]) // 4, rand_size if randSize < 128 { ret[4] = byte(randSize & 0xFF) } else { // 4, magic number 0xFF ret[4] = 0xFF // 5~6, rand_size binary.LittleEndian.PutUint16(ret[5:], uint16(randSize&0xFFFF)) } // rand_size+4~ret_size-4, data if dataSize > 0 { copy(ret[randSize+4:], data) } a.packID++ h = a.hmac(key, ret[:retSize-4]) copy(ret[retSize-4:], h[:4]) } func (a *authAES128) packAuthData(data []byte) (ret []byte) { dataSize := len(data) var randSize int if dataSize > 400 { randSize = rand.Intn(512) } else { randSize = rand.Intn(1024) } dataOffset := randSize + 16 + 4 + 4 + 7 retSize := dataOffset + dataSize + 4 ret = make([]byte, retSize) encrypt := make([]byte, 24) key := make([]byte, len(a.IV)+len(a.Key)) copy(key, a.IV) copy(key[len(a.IV):], a.Key) rand.Read(ret[dataOffset-randSize:]) a.mutex.Lock() defer a.mutex.Unlock() a.connectionID++ if a.connectionID > 0xFF000000 { a.clientID = nil } if len(a.clientID) == 0 { a.clientID = make([]byte, 8) rand.Read(a.clientID) b := make([]byte, 4) rand.Read(b) a.connectionID = binary.LittleEndian.Uint32(b) & 0xFFFFFF } copy(encrypt[4:], a.clientID) binary.LittleEndian.PutUint32(encrypt[8:], a.connectionID) now := time.Now().Unix() binary.LittleEndian.PutUint32(encrypt[:4], uint32(now)) binary.LittleEndian.PutUint16(encrypt[12:], uint16(retSize&0xFFFF)) binary.LittleEndian.PutUint16(encrypt[14:], uint16(randSize&0xFFFF)) a.initUserKeyAndID() aesCipherKey := core.Kdf(base64.StdEncoding.EncodeToString(a.userKey)+a.salt, 16) block, err := aes.NewCipher(aesCipherKey) if err != nil { return nil } encryptData := make([]byte, 16) iv := make([]byte, aes.BlockSize) cbc := cipher.NewCBCEncrypter(block, iv) cbc.CryptBlocks(encryptData, encrypt[:16]) copy(encrypt[:4], a.uid[:]) copy(encrypt[4:4+16], encryptData) h := a.hmac(key, encrypt[:20]) copy(encrypt[20:], h[:4]) rand.Read(ret[:1]) h = a.hmac(key, ret[:1]) copy(ret[1:], h[:7-1]) copy(ret[7:], encrypt) copy(ret[dataOffset:], data) h = a.hmac(a.userKey, ret[:retSize-4]) copy(ret[retSize-4:], h[:4]) return </s> add a := &authAES128{ Base: b, authData: &authData{}, authAES128Function: &authAES128Function{salt: "auth_aes128_md5", hmac: tools.HmacMD5, hashDigest: tools.MD5Sum}, userData: &userData{}, } a.initUserData() return a </s> remove func (a *authSHA1V4) packData(data, ret []byte, randSize int) { dataSize := len(data) retSize := len(ret) // 0~1, ret size binary.BigEndian.PutUint16(ret[:2], uint16(retSize&0xFFFF)) // 2~3, crc of ret size crc := crc32.ChecksumIEEE(ret[:2]) & 0xFFFF binary.LittleEndian.PutUint16(ret[2:4], uint16(crc)) // 4, rand size if randSize < 128 { ret[4] = uint8(randSize & 0xFF) } else { ret[4] = uint8(0xFF) binary.BigEndian.PutUint16(ret[5:7], uint16(randSize&0xFFFF)) } // (rand size+4)~(ret size-4), data if dataSize > 0 { copy(ret[randSize+4:], data) </s> add func (a *authSHA1V4) packData(poolBuf *bytes.Buffer, data []byte) { dataLength := len(data) randDataLength := a.getRandDataLength(dataLength) /* 2: uint16 BigEndian packedDataLength 2: uint16 LittleEndian crc32Data & 0xffff 3: maxRandDataLengthPrefix (min:1) 4: adler32Data */ packedDataLength := 2 + 2 + 3 + randDataLength + dataLength + 4 if randDataLength < 128 { packedDataLength -= 2 </s> remove const authHeadLength = 4 + 8 + 4 + 16 + 4 func (a *authChain) packAuthData(data []byte) (outData []byte) { outData = make([]byte, authHeadLength, authHeadLength+1500) a.mutex.Lock() defer a.mutex.Unlock() a.connectionID++ if a.connectionID > 0xFF000000 { a.clientID = nil } if len(a.clientID) == 0 { a.clientID = make([]byte, 4) rand.Read(a.clientID) b := make([]byte, 4) rand.Read(b) a.connectionID = binary.LittleEndian.Uint32(b) & 0xFFFFFF </s> add func (a *authChainA) putMixedRandDataAndData(poolBuf *bytes.Buffer, data []byte) { randDataLength := a.randDataLength(len(data), a.lastClientHash, &a.randomClient) if len(data) == 0 { tools.AppendRandBytes(poolBuf, randDataLength) return </s> remove // (ret size-4)~end, adler32 of full data adler := adler32.Checksum(ret[:retSize-4]) binary.LittleEndian.PutUint32(ret[retSize-4:], adler) </s> add binary.Write(poolBuf, binary.BigEndian, uint16(packedDataLength)) binary.Write(poolBuf, binary.LittleEndian, uint16(crc32.ChecksumIEEE(poolBuf.Bytes()[poolBuf.Len()-2:])&0xffff)) a.packRandData(poolBuf, randDataLength) poolBuf.Write(data) binary.Write(poolBuf, binary.LittleEndian, adler32.Checksum(poolBuf.Bytes()[poolBuf.Len()-packedDataLength+4:]))
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "k...
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_sha1_v4.go
<mask> a.connectionID++ <mask> if a.connectionID > 0xFF000000 { <mask> a.clientID = nil <mask> } <mask> if len(a.clientID) == 0 { <mask> a.clientID = make([]byte, 8) <mask> rand.Read(a.clientID) <mask> b := make([]byte, 4) <mask> rand.Read(b) <mask> a.connectionID = binary.LittleEndian.Uint32(b) & 0xFFFFFF <mask> } <mask> // 0~1, ret size <mask> binary.BigEndian.PutUint16(ret[:2], uint16(retSize&0xFFFF)) <mask> <mask> // 2~6, crc of (ret size+salt+key) <mask> salt := []byte("auth_sha1_v4") <mask> crcData := make([]byte, len(salt)+len(a.Key)+2) <mask> copy(crcData[:2], ret[:2]) </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove // 2~6, crc of (ret size+salt+key) </s> add </s> remove crcData := make([]byte, len(salt)+len(a.Key)+2) copy(crcData[:2], ret[:2]) </s> add crcData := pool.Get(len(salt) + len(a.Key) + 2) defer pool.Put(crcData) binary.BigEndian.PutUint16(crcData, uint16(packedAuthDataLength)) </s> remove const authHeadLength = 4 + 8 + 4 + 16 + 4 func (a *authChain) packAuthData(data []byte) (outData []byte) { outData = make([]byte, authHeadLength, authHeadLength+1500) a.mutex.Lock() defer a.mutex.Unlock() a.connectionID++ if a.connectionID > 0xFF000000 { a.clientID = nil } if len(a.clientID) == 0 { a.clientID = make([]byte, 4) rand.Read(a.clientID) b := make([]byte, 4) rand.Read(b) a.connectionID = binary.LittleEndian.Uint32(b) & 0xFFFFFF </s> add func (a *authChainA) putMixedRandDataAndData(poolBuf *bytes.Buffer, data []byte) { randDataLength := a.randDataLength(len(data), a.lastClientHash, &a.randomClient) if len(data) == 0 { tools.AppendRandBytes(poolBuf, randDataLength) return </s> remove func (a *authSHA1V4) packAuthData(data []byte) (ret []byte) { dataSize := len(data) randSize := 1 if dataSize <= 1300 { if dataSize > 400 { randSize += rand.Intn(128) } else { randSize += rand.Intn(1024) } } dataOffset := randSize + 4 + 2 retSize := dataOffset + dataSize + 12 + tools.HmacSHA1Len ret = make([]byte, retSize) a.mutex.Lock() defer a.mutex.Unlock() a.connectionID++ if a.connectionID > 0xFF000000 { a.clientID = nil </s> add func (a *authSHA1V4) packAuthData(poolBuf *bytes.Buffer, data []byte) { dataLength := len(data) randDataLength := a.getRandDataLength(12 + dataLength) /* 2: uint16 BigEndian packedAuthDataLength 4: uint32 LittleEndian crc32Data 3: maxRandDataLengthPrefix (min: 1) 12: authDataLength 10: hmacSHA1DataLength */ packedAuthDataLength := 2 + 4 + 3 + randDataLength + 12 + dataLength + 10 if randDataLength < 128 { packedAuthDataLength -= 2 </s> remove crc := crc32.ChecksumIEEE(crcData) & 0xFFFFFFFF // 2~6, crc of (ret size+salt+key) binary.LittleEndian.PutUint32(ret[2:], crc) // 6~(rand size+6), rand numbers rand.Read(ret[dataOffset-randSize : dataOffset]) // 6, rand size if randSize < 128 { ret[6] = byte(randSize & 0xFF) } else { // 6, magic number 0xFF ret[6] = 0xFF // 7~8, rand size binary.BigEndian.PutUint16(ret[7:9], uint16(randSize&0xFFFF)) </s> add key := pool.Get(len(a.iv) + len(a.Key)) defer pool.Put(key) copy(key, a.iv) copy(key[len(a.iv):], a.Key) poolBuf.Write(crcData[:2]) binary.Write(poolBuf, binary.LittleEndian, crc32.ChecksumIEEE(crcData)) a.packRandData(poolBuf, randDataLength) a.putAuthData(poolBuf) poolBuf.Write(data) poolBuf.Write(tools.HmacSHA1(key, poolBuf.Bytes()[poolBuf.Len()-packedAuthDataLength+10:])[:10]) } func (a *authSHA1V4) packRandData(poolBuf *bytes.Buffer, size int) { if size < 128 { poolBuf.WriteByte(byte(size + 1)) tools.AppendRandBytes(poolBuf, size) return
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_sha1_v4.go
<mask> } <mask> // 0~1, ret size <mask> binary.BigEndian.PutUint16(ret[:2], uint16(retSize&0xFFFF)) <mask> <mask> // 2~6, crc of (ret size+salt+key) <mask> salt := []byte("auth_sha1_v4") <mask> crcData := make([]byte, len(salt)+len(a.Key)+2) <mask> copy(crcData[:2], ret[:2]) <mask> copy(crcData[2:], salt) <mask> copy(crcData[2+len(salt):], a.Key) </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove crcData := make([]byte, len(salt)+len(a.Key)+2) copy(crcData[:2], ret[:2]) </s> add crcData := pool.Get(len(salt) + len(a.Key) + 2) defer pool.Put(crcData) binary.BigEndian.PutUint16(crcData, uint16(packedAuthDataLength)) </s> remove if len(a.clientID) == 0 { a.clientID = make([]byte, 8) rand.Read(a.clientID) b := make([]byte, 4) rand.Read(b) a.connectionID = binary.LittleEndian.Uint32(b) & 0xFFFFFF } // 0~1, ret size binary.BigEndian.PutUint16(ret[:2], uint16(retSize&0xFFFF)) </s> add </s> remove crc := crc32.ChecksumIEEE(crcData) & 0xFFFFFFFF // 2~6, crc of (ret size+salt+key) binary.LittleEndian.PutUint32(ret[2:], crc) // 6~(rand size+6), rand numbers rand.Read(ret[dataOffset-randSize : dataOffset]) // 6, rand size if randSize < 128 { ret[6] = byte(randSize & 0xFF) } else { // 6, magic number 0xFF ret[6] = 0xFF // 7~8, rand size binary.BigEndian.PutUint16(ret[7:9], uint16(randSize&0xFFFF)) </s> add key := pool.Get(len(a.iv) + len(a.Key)) defer pool.Put(key) copy(key, a.iv) copy(key[len(a.iv):], a.Key) poolBuf.Write(crcData[:2]) binary.Write(poolBuf, binary.LittleEndian, crc32.ChecksumIEEE(crcData)) a.packRandData(poolBuf, randDataLength) a.putAuthData(poolBuf) poolBuf.Write(data) poolBuf.Write(tools.HmacSHA1(key, poolBuf.Bytes()[poolBuf.Len()-packedAuthDataLength+10:])[:10]) } func (a *authSHA1V4) packRandData(poolBuf *bytes.Buffer, size int) { if size < 128 { poolBuf.WriteByte(byte(size + 1)) tools.AppendRandBytes(poolBuf, size) return </s> remove func (a *authSHA1V4) packData(data, ret []byte, randSize int) { dataSize := len(data) retSize := len(ret) // 0~1, ret size binary.BigEndian.PutUint16(ret[:2], uint16(retSize&0xFFFF)) // 2~3, crc of ret size crc := crc32.ChecksumIEEE(ret[:2]) & 0xFFFF binary.LittleEndian.PutUint16(ret[2:4], uint16(crc)) // 4, rand size if randSize < 128 { ret[4] = uint8(randSize & 0xFF) } else { ret[4] = uint8(0xFF) binary.BigEndian.PutUint16(ret[5:7], uint16(randSize&0xFFFF)) } // (rand size+4)~(ret size-4), data if dataSize > 0 { copy(ret[randSize+4:], data) </s> add func (a *authSHA1V4) packData(poolBuf *bytes.Buffer, data []byte) { dataLength := len(data) randDataLength := a.getRandDataLength(dataLength) /* 2: uint16 BigEndian packedDataLength 2: uint16 LittleEndian crc32Data & 0xffff 3: maxRandDataLengthPrefix (min:1) 4: adler32Data */ packedDataLength := 2 + 2 + 3 + randDataLength + dataLength + 4 if randDataLength < 128 { packedDataLength -= 2 </s> remove // rand size+6~(rand size+10), time stamp now := time.Now().Unix() binary.LittleEndian.PutUint32(ret[dataOffset:dataOffset+4], uint32(now)) // rand size+10~(rand size+14), client ID copy(ret[dataOffset+4:dataOffset+4+4], a.clientID[:4]) // rand size+14~(rand size+18), connection ID binary.LittleEndian.PutUint32(ret[dataOffset+8:dataOffset+8+4], a.connectionID) // rand size+18~(rand size+18)+data length, data copy(ret[dataOffset+12:], data) key := make([]byte, len(a.IV)+len(a.Key)) copy(key, a.IV) copy(key[len(a.IV):], a.Key) h := tools.HmacSHA1(key, ret[:retSize-tools.HmacSHA1Len]) // (ret size-10)~(ret size)/(rand size)+18+data length~end, hmac copy(ret[retSize-tools.HmacSHA1Len:], h[:tools.HmacSHA1Len]) return ret </s> add poolBuf.WriteByte(255) binary.Write(poolBuf, binary.BigEndian, uint16(size+3)) tools.AppendRandBytes(poolBuf, size)
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_sha1_v4.go
crcData := pool.Get(len(salt) + len(a.Key) + 2) defer pool.Put(crcData) binary.BigEndian.PutUint16(crcData, uint16(packedAuthDataLength))
<mask> binary.BigEndian.PutUint16(ret[:2], uint16(retSize&0xFFFF)) <mask> <mask> // 2~6, crc of (ret size+salt+key) <mask> salt := []byte("auth_sha1_v4") <mask> crcData := make([]byte, len(salt)+len(a.Key)+2) <mask> copy(crcData[:2], ret[:2]) <mask> copy(crcData[2:], salt) <mask> copy(crcData[2+len(salt):], a.Key) <mask> crc := crc32.ChecksumIEEE(crcData) & 0xFFFFFFFF <mask> // 2~6, crc of (ret size+salt+key) <mask> binary.LittleEndian.PutUint32(ret[2:], crc) </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove // 2~6, crc of (ret size+salt+key) </s> add </s> remove if len(a.clientID) == 0 { a.clientID = make([]byte, 8) rand.Read(a.clientID) b := make([]byte, 4) rand.Read(b) a.connectionID = binary.LittleEndian.Uint32(b) & 0xFFFFFF } // 0~1, ret size binary.BigEndian.PutUint16(ret[:2], uint16(retSize&0xFFFF)) </s> add </s> remove crc := crc32.ChecksumIEEE(crcData) & 0xFFFFFFFF // 2~6, crc of (ret size+salt+key) binary.LittleEndian.PutUint32(ret[2:], crc) // 6~(rand size+6), rand numbers rand.Read(ret[dataOffset-randSize : dataOffset]) // 6, rand size if randSize < 128 { ret[6] = byte(randSize & 0xFF) } else { // 6, magic number 0xFF ret[6] = 0xFF // 7~8, rand size binary.BigEndian.PutUint16(ret[7:9], uint16(randSize&0xFFFF)) </s> add key := pool.Get(len(a.iv) + len(a.Key)) defer pool.Put(key) copy(key, a.iv) copy(key[len(a.iv):], a.Key) poolBuf.Write(crcData[:2]) binary.Write(poolBuf, binary.LittleEndian, crc32.ChecksumIEEE(crcData)) a.packRandData(poolBuf, randDataLength) a.putAuthData(poolBuf) poolBuf.Write(data) poolBuf.Write(tools.HmacSHA1(key, poolBuf.Bytes()[poolBuf.Len()-packedAuthDataLength+10:])[:10]) } func (a *authSHA1V4) packRandData(poolBuf *bytes.Buffer, size int) { if size < 128 { poolBuf.WriteByte(byte(size + 1)) tools.AppendRandBytes(poolBuf, size) return </s> remove func (a *authSHA1V4) packData(data, ret []byte, randSize int) { dataSize := len(data) retSize := len(ret) // 0~1, ret size binary.BigEndian.PutUint16(ret[:2], uint16(retSize&0xFFFF)) // 2~3, crc of ret size crc := crc32.ChecksumIEEE(ret[:2]) & 0xFFFF binary.LittleEndian.PutUint16(ret[2:4], uint16(crc)) // 4, rand size if randSize < 128 { ret[4] = uint8(randSize & 0xFF) } else { ret[4] = uint8(0xFF) binary.BigEndian.PutUint16(ret[5:7], uint16(randSize&0xFFFF)) } // (rand size+4)~(ret size-4), data if dataSize > 0 { copy(ret[randSize+4:], data) </s> add func (a *authSHA1V4) packData(poolBuf *bytes.Buffer, data []byte) { dataLength := len(data) randDataLength := a.getRandDataLength(dataLength) /* 2: uint16 BigEndian packedDataLength 2: uint16 LittleEndian crc32Data & 0xffff 3: maxRandDataLengthPrefix (min:1) 4: adler32Data */ packedDataLength := 2 + 2 + 3 + randDataLength + dataLength + 4 if randDataLength < 128 { packedDataLength -= 2 </s> remove func (r *randomHead) Encode(b []byte) (encoded []byte, err error) { if !r.firstRequest { return b, nil } bSize := len(b) if r.headerSent { if bSize > 0 { d := make([]byte, len(r.buffer)+bSize) copy(d, r.buffer) copy(d[len(r.buffer):], b) r.buffer = d } else { encoded = r.buffer r.buffer = nil r.firstRequest = false } } else { size := rand.Intn(96) + 8 encoded = make([]byte, size) rand.Read(encoded) crc := (0xFFFFFFFF - crc32.ChecksumIEEE(encoded[:size-4])) & 0xFFFFFFFF binary.LittleEndian.PutUint32(encoded[size-4:], crc) d := make([]byte, bSize) copy(d, b) r.buffer = d </s> add func (c *randomHeadConn) Read(b []byte) (int, error) { if c.rawTransRecv { return c.Conn.Read(b)
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_sha1_v4.go
key := pool.Get(len(a.iv) + len(a.Key)) defer pool.Put(key) copy(key, a.iv) copy(key[len(a.iv):], a.Key) poolBuf.Write(crcData[:2]) binary.Write(poolBuf, binary.LittleEndian, crc32.ChecksumIEEE(crcData)) a.packRandData(poolBuf, randDataLength) a.putAuthData(poolBuf) poolBuf.Write(data) poolBuf.Write(tools.HmacSHA1(key, poolBuf.Bytes()[poolBuf.Len()-packedAuthDataLength+10:])[:10]) } func (a *authSHA1V4) packRandData(poolBuf *bytes.Buffer, size int) { if size < 128 { poolBuf.WriteByte(byte(size + 1)) tools.AppendRandBytes(poolBuf, size) return
<mask> crcData := make([]byte, len(salt)+len(a.Key)+2) <mask> copy(crcData[:2], ret[:2]) <mask> copy(crcData[2:], salt) <mask> copy(crcData[2+len(salt):], a.Key) <mask> crc := crc32.ChecksumIEEE(crcData) & 0xFFFFFFFF <mask> // 2~6, crc of (ret size+salt+key) <mask> binary.LittleEndian.PutUint32(ret[2:], crc) <mask> // 6~(rand size+6), rand numbers <mask> rand.Read(ret[dataOffset-randSize : dataOffset]) <mask> // 6, rand size <mask> if randSize < 128 { <mask> ret[6] = byte(randSize & 0xFF) <mask> } else { <mask> // 6, magic number 0xFF <mask> ret[6] = 0xFF <mask> // 7~8, rand size <mask> binary.BigEndian.PutUint16(ret[7:9], uint16(randSize&0xFFFF)) <mask> } <mask> // rand size+6~(rand size+10), time stamp <mask> now := time.Now().Unix() <mask> binary.LittleEndian.PutUint32(ret[dataOffset:dataOffset+4], uint32(now)) <mask> // rand size+10~(rand size+14), client ID </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove // rand size+6~(rand size+10), time stamp now := time.Now().Unix() binary.LittleEndian.PutUint32(ret[dataOffset:dataOffset+4], uint32(now)) // rand size+10~(rand size+14), client ID copy(ret[dataOffset+4:dataOffset+4+4], a.clientID[:4]) // rand size+14~(rand size+18), connection ID binary.LittleEndian.PutUint32(ret[dataOffset+8:dataOffset+8+4], a.connectionID) // rand size+18~(rand size+18)+data length, data copy(ret[dataOffset+12:], data) key := make([]byte, len(a.IV)+len(a.Key)) copy(key, a.IV) copy(key[len(a.IV):], a.Key) h := tools.HmacSHA1(key, ret[:retSize-tools.HmacSHA1Len]) // (ret size-10)~(ret size)/(rand size)+18+data length~end, hmac copy(ret[retSize-tools.HmacSHA1Len:], h[:tools.HmacSHA1Len]) return ret </s> add poolBuf.WriteByte(255) binary.Write(poolBuf, binary.BigEndian, uint16(size+3)) tools.AppendRandBytes(poolBuf, size) </s> remove crcData := make([]byte, len(salt)+len(a.Key)+2) copy(crcData[:2], ret[:2]) </s> add crcData := pool.Get(len(salt) + len(a.Key) + 2) defer pool.Put(crcData) binary.BigEndian.PutUint16(crcData, uint16(packedAuthDataLength)) </s> remove // 2~6, crc of (ret size+salt+key) </s> add </s> remove func (a *authSHA1V4) packData(data, ret []byte, randSize int) { dataSize := len(data) retSize := len(ret) // 0~1, ret size binary.BigEndian.PutUint16(ret[:2], uint16(retSize&0xFFFF)) // 2~3, crc of ret size crc := crc32.ChecksumIEEE(ret[:2]) & 0xFFFF binary.LittleEndian.PutUint16(ret[2:4], uint16(crc)) // 4, rand size if randSize < 128 { ret[4] = uint8(randSize & 0xFF) } else { ret[4] = uint8(0xFF) binary.BigEndian.PutUint16(ret[5:7], uint16(randSize&0xFFFF)) } // (rand size+4)~(ret size-4), data if dataSize > 0 { copy(ret[randSize+4:], data) </s> add func (a *authSHA1V4) packData(poolBuf *bytes.Buffer, data []byte) { dataLength := len(data) randDataLength := a.getRandDataLength(dataLength) /* 2: uint16 BigEndian packedDataLength 2: uint16 LittleEndian crc32Data & 0xffff 3: maxRandDataLengthPrefix (min:1) 4: adler32Data */ packedDataLength := 2 + 2 + 3 + randDataLength + dataLength + 4 if randDataLength < 128 { packedDataLength -= 2 </s> remove if len(a.clientID) == 0 { a.clientID = make([]byte, 8) rand.Read(a.clientID) b := make([]byte, 4) rand.Read(b) a.connectionID = binary.LittleEndian.Uint32(b) & 0xFFFFFF } // 0~1, ret size binary.BigEndian.PutUint16(ret[:2], uint16(retSize&0xFFFF)) </s> add
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_sha1_v4.go
poolBuf.WriteByte(255) binary.Write(poolBuf, binary.BigEndian, uint16(size+3)) tools.AppendRandBytes(poolBuf, size)
<mask> ret[6] = 0xFF <mask> // 7~8, rand size <mask> binary.BigEndian.PutUint16(ret[7:9], uint16(randSize&0xFFFF)) <mask> } <mask> // rand size+6~(rand size+10), time stamp <mask> now := time.Now().Unix() <mask> binary.LittleEndian.PutUint32(ret[dataOffset:dataOffset+4], uint32(now)) <mask> // rand size+10~(rand size+14), client ID <mask> copy(ret[dataOffset+4:dataOffset+4+4], a.clientID[:4]) <mask> // rand size+14~(rand size+18), connection ID <mask> binary.LittleEndian.PutUint32(ret[dataOffset+8:dataOffset+8+4], a.connectionID) <mask> // rand size+18~(rand size+18)+data length, data <mask> copy(ret[dataOffset+12:], data) <mask> <mask> key := make([]byte, len(a.IV)+len(a.Key)) <mask> copy(key, a.IV) <mask> copy(key[len(a.IV):], a.Key) <mask> <mask> h := tools.HmacSHA1(key, ret[:retSize-tools.HmacSHA1Len]) <mask> // (ret size-10)~(ret size)/(rand size)+18+data length~end, hmac <mask> copy(ret[retSize-tools.HmacSHA1Len:], h[:tools.HmacSHA1Len]) <mask> return ret <mask> } <mask> <mask> func getHeadSize(data []byte, defaultValue int) int { <mask> if data == nil || len(data) < 2 { <mask> return defaultValue </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove crc := crc32.ChecksumIEEE(crcData) & 0xFFFFFFFF // 2~6, crc of (ret size+salt+key) binary.LittleEndian.PutUint32(ret[2:], crc) // 6~(rand size+6), rand numbers rand.Read(ret[dataOffset-randSize : dataOffset]) // 6, rand size if randSize < 128 { ret[6] = byte(randSize & 0xFF) } else { // 6, magic number 0xFF ret[6] = 0xFF // 7~8, rand size binary.BigEndian.PutUint16(ret[7:9], uint16(randSize&0xFFFF)) </s> add key := pool.Get(len(a.iv) + len(a.Key)) defer pool.Put(key) copy(key, a.iv) copy(key[len(a.iv):], a.Key) poolBuf.Write(crcData[:2]) binary.Write(poolBuf, binary.LittleEndian, crc32.ChecksumIEEE(crcData)) a.packRandData(poolBuf, randDataLength) a.putAuthData(poolBuf) poolBuf.Write(data) poolBuf.Write(tools.HmacSHA1(key, poolBuf.Bytes()[poolBuf.Len()-packedAuthDataLength+10:])[:10]) } func (a *authSHA1V4) packRandData(poolBuf *bytes.Buffer, size int) { if size < 128 { poolBuf.WriteByte(byte(size + 1)) tools.AppendRandBytes(poolBuf, size) return </s> remove func getHeadSize(data []byte, defaultValue int) int { if data == nil || len(data) < 2 { return defaultValue </s> add func (a *authSHA1V4) getRandDataLength(size int) int { if size > 1200 { return 0 </s> remove func (a *authSHA1V4) packData(data, ret []byte, randSize int) { dataSize := len(data) retSize := len(ret) // 0~1, ret size binary.BigEndian.PutUint16(ret[:2], uint16(retSize&0xFFFF)) // 2~3, crc of ret size crc := crc32.ChecksumIEEE(ret[:2]) & 0xFFFF binary.LittleEndian.PutUint16(ret[2:4], uint16(crc)) // 4, rand size if randSize < 128 { ret[4] = uint8(randSize & 0xFF) } else { ret[4] = uint8(0xFF) binary.BigEndian.PutUint16(ret[5:7], uint16(randSize&0xFFFF)) } // (rand size+4)~(ret size-4), data if dataSize > 0 { copy(ret[randSize+4:], data) </s> add func (a *authSHA1V4) packData(poolBuf *bytes.Buffer, data []byte) { dataLength := len(data) randDataLength := a.getRandDataLength(dataLength) /* 2: uint16 BigEndian packedDataLength 2: uint16 LittleEndian crc32Data & 0xffff 3: maxRandDataLengthPrefix (min:1) 4: adler32Data */ packedDataLength := 2 + 2 + 3 + randDataLength + dataLength + 4 if randDataLength < 128 { packedDataLength -= 2 </s> remove headType := data[0] & 0x07 switch headType { case 1: // IPv4 1+4+2 return 7 case 4: // IPv6 1+16+2 return 19 case 3: // domain name, variant length return 4 + int(data[1]) </s> add if size > 400 { return rand.Intn(256) </s> remove var key = make([]byte, len(a.IV)+len(a.Key)) copy(key, a.IV) copy(key[len(a.IV):], a.Key) encrypt := make([]byte, 20) t := time.Now().Unix() binary.LittleEndian.PutUint32(encrypt[:4], uint32(t)) copy(encrypt[4:8], a.clientID) binary.LittleEndian.PutUint32(encrypt[8:], a.connectionID) binary.LittleEndian.PutUint16(encrypt[12:], uint16(a.Overhead)) binary.LittleEndian.PutUint16(encrypt[14:], 0) // first 12 bytes { rand.Read(outData[:4]) a.lastClientHash = a.hmac(key, outData[:4]) copy(outData[4:], a.lastClientHash[:8]) </s> add if randDataLength > 0 { startPos := getRandStartPos(randDataLength, &a.randomClient) tools.AppendRandBytes(poolBuf, startPos) poolBuf.Write(data) tools.AppendRandBytes(poolBuf, randDataLength-startPos) return
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "k...
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_sha1_v4.go
func (a *authSHA1V4) getRandDataLength(size int) int { if size > 1200 { return 0
<mask> copy(ret[retSize-tools.HmacSHA1Len:], h[:tools.HmacSHA1Len]) <mask> return ret <mask> } <mask> <mask> func getHeadSize(data []byte, defaultValue int) int { <mask> if data == nil || len(data) < 2 { <mask> return defaultValue <mask> } <mask> headType := data[0] & 0x07 <mask> switch headType { <mask> case 1: <mask> // IPv4 1+4+2 </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove headType := data[0] & 0x07 switch headType { case 1: // IPv4 1+4+2 return 7 case 4: // IPv6 1+16+2 return 19 case 3: // domain name, variant length return 4 + int(data[1]) </s> add if size > 400 { return rand.Intn(256) </s> remove if protocolCreator, ok := protocolList[strings.ToLower(name)]; ok { return protocolCreator(b), nil </s> add if choice, ok := protocolList[name]; ok { b.Overhead += choice.overhead return choice.new(b), nil } return nil, fmt.Errorf("protocol %s not supported", name) } func getHeadSize(b []byte, defaultValue int) int { if len(b) < 2 { return defaultValue } headType := b[0] & 7 switch headType { case 1: return 7 case 4: return 19 case 3: return 4 + int(b[1]) } return defaultValue } func getDataLength(b []byte) int { bLength := len(b) dataLength := getHeadSize(b, 30) + rand.Intn(32) if bLength < dataLength { return bLength </s> remove // rand size+6~(rand size+10), time stamp now := time.Now().Unix() binary.LittleEndian.PutUint32(ret[dataOffset:dataOffset+4], uint32(now)) // rand size+10~(rand size+14), client ID copy(ret[dataOffset+4:dataOffset+4+4], a.clientID[:4]) // rand size+14~(rand size+18), connection ID binary.LittleEndian.PutUint32(ret[dataOffset+8:dataOffset+8+4], a.connectionID) // rand size+18~(rand size+18)+data length, data copy(ret[dataOffset+12:], data) key := make([]byte, len(a.IV)+len(a.Key)) copy(key, a.IV) copy(key[len(a.IV):], a.Key) h := tools.HmacSHA1(key, ret[:retSize-tools.HmacSHA1Len]) // (ret size-10)~(ret size)/(rand size)+18+data length~end, hmac copy(ret[retSize-tools.HmacSHA1Len:], h[:tools.HmacSHA1Len]) return ret </s> add poolBuf.WriteByte(255) binary.Write(poolBuf, binary.BigEndian, uint16(size+3)) tools.AppendRandBytes(poolBuf, size) </s> remove func (a *authSHA1V4) packData(data, ret []byte, randSize int) { dataSize := len(data) retSize := len(ret) // 0~1, ret size binary.BigEndian.PutUint16(ret[:2], uint16(retSize&0xFFFF)) // 2~3, crc of ret size crc := crc32.ChecksumIEEE(ret[:2]) & 0xFFFF binary.LittleEndian.PutUint16(ret[2:4], uint16(crc)) // 4, rand size if randSize < 128 { ret[4] = uint8(randSize & 0xFF) } else { ret[4] = uint8(0xFF) binary.BigEndian.PutUint16(ret[5:7], uint16(randSize&0xFFFF)) } // (rand size+4)~(ret size-4), data if dataSize > 0 { copy(ret[randSize+4:], data) </s> add func (a *authSHA1V4) packData(poolBuf *bytes.Buffer, data []byte) { dataLength := len(data) randDataLength := a.getRandDataLength(dataLength) /* 2: uint16 BigEndian packedDataLength 2: uint16 LittleEndian crc32Data & 0xffff 3: maxRandDataLengthPrefix (min:1) 4: adler32Data */ packedDataLength := 2 + 2 + 3 + randDataLength + dataLength + 4 if randDataLength < 128 { packedDataLength -= 2 </s> remove func (a *authChain) packedDataLen(data []byte) (chunkLength, randLength int) { dataLength := len(data) randLength = a.getClientRandLen(dataLength, a.Overhead) chunkLength = randLength + dataLength + 2 + 2 return } </s> add length := uint16(len(data)) ^ binary.LittleEndian.Uint16(a.lastClientHash[14:16])
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_sha1_v4.go
if size > 400 { return rand.Intn(256)
<mask> func getHeadSize(data []byte, defaultValue int) int { <mask> if data == nil || len(data) < 2 { <mask> return defaultValue <mask> } <mask> headType := data[0] & 0x07 <mask> switch headType { <mask> case 1: <mask> // IPv4 1+4+2 <mask> return 7 <mask> case 4: <mask> // IPv6 1+16+2 <mask> return 19 <mask> case 3: <mask> // domain name, variant length <mask> return 4 + int(data[1]) <mask> } <mask> <mask> return defaultValue <mask> } </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove func getHeadSize(data []byte, defaultValue int) int { if data == nil || len(data) < 2 { return defaultValue </s> add func (a *authSHA1V4) getRandDataLength(size int) int { if size > 1200 { return 0 </s> remove if protocolCreator, ok := protocolList[strings.ToLower(name)]; ok { return protocolCreator(b), nil </s> add if choice, ok := protocolList[name]; ok { b.Overhead += choice.overhead return choice.new(b), nil } return nil, fmt.Errorf("protocol %s not supported", name) } func getHeadSize(b []byte, defaultValue int) int { if len(b) < 2 { return defaultValue } headType := b[0] & 7 switch headType { case 1: return 7 case 4: return 19 case 3: return 4 + int(b[1]) } return defaultValue } func getDataLength(b []byte) int { bLength := len(b) dataLength := getHeadSize(b, 30) + rand.Intn(32) if bLength < dataLength { return bLength </s> remove return defaultValue </s> add return rand.Intn(512) </s> remove // rand size+6~(rand size+10), time stamp now := time.Now().Unix() binary.LittleEndian.PutUint32(ret[dataOffset:dataOffset+4], uint32(now)) // rand size+10~(rand size+14), client ID copy(ret[dataOffset+4:dataOffset+4+4], a.clientID[:4]) // rand size+14~(rand size+18), connection ID binary.LittleEndian.PutUint32(ret[dataOffset+8:dataOffset+8+4], a.connectionID) // rand size+18~(rand size+18)+data length, data copy(ret[dataOffset+12:], data) key := make([]byte, len(a.IV)+len(a.Key)) copy(key, a.IV) copy(key[len(a.IV):], a.Key) h := tools.HmacSHA1(key, ret[:retSize-tools.HmacSHA1Len]) // (ret size-10)~(ret size)/(rand size)+18+data length~end, hmac copy(ret[retSize-tools.HmacSHA1Len:], h[:tools.HmacSHA1Len]) return ret </s> add poolBuf.WriteByte(255) binary.Write(poolBuf, binary.BigEndian, uint16(size+3)) tools.AppendRandBytes(poolBuf, size) </s> remove func (a *authSHA1V4) packData(data, ret []byte, randSize int) { dataSize := len(data) retSize := len(ret) // 0~1, ret size binary.BigEndian.PutUint16(ret[:2], uint16(retSize&0xFFFF)) // 2~3, crc of ret size crc := crc32.ChecksumIEEE(ret[:2]) & 0xFFFF binary.LittleEndian.PutUint16(ret[2:4], uint16(crc)) // 4, rand size if randSize < 128 { ret[4] = uint8(randSize & 0xFF) } else { ret[4] = uint8(0xFF) binary.BigEndian.PutUint16(ret[5:7], uint16(randSize&0xFFFF)) } // (rand size+4)~(ret size-4), data if dataSize > 0 { copy(ret[randSize+4:], data) </s> add func (a *authSHA1V4) packData(poolBuf *bytes.Buffer, data []byte) { dataLength := len(data) randDataLength := a.getRandDataLength(dataLength) /* 2: uint16 BigEndian packedDataLength 2: uint16 LittleEndian crc32Data & 0xffff 3: maxRandDataLengthPrefix (min:1) 4: adler32Data */ packedDataLength := 2 + 2 + 3 + randDataLength + dataLength + 4 if randDataLength < 128 { packedDataLength -= 2
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_sha1_v4.go
return rand.Intn(512)
<mask> case 3: <mask> // domain name, variant length <mask> return 4 + int(data[1]) <mask> } <mask> <mask> return defaultValue <mask> } </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove headType := data[0] & 0x07 switch headType { case 1: // IPv4 1+4+2 return 7 case 4: // IPv6 1+16+2 return 19 case 3: // domain name, variant length return 4 + int(data[1]) </s> add if size > 400 { return rand.Intn(256) </s> remove if protocolCreator, ok := protocolList[strings.ToLower(name)]; ok { return protocolCreator(b), nil </s> add if choice, ok := protocolList[name]; ok { b.Overhead += choice.overhead return choice.new(b), nil } return nil, fmt.Errorf("protocol %s not supported", name) } func getHeadSize(b []byte, defaultValue int) int { if len(b) < 2 { return defaultValue } headType := b[0] & 7 switch headType { case 1: return 7 case 4: return 19 case 3: return 4 + int(b[1]) } return defaultValue } func getDataLength(b []byte) int { bLength := len(b) dataLength := getHeadSize(b, 30) + rand.Intn(32) if bLength < dataLength { return bLength </s> remove func getHeadSize(data []byte, defaultValue int) int { if data == nil || len(data) < 2 { return defaultValue </s> add func (a *authSHA1V4) getRandDataLength(size int) int { if size > 1200 { return 0 </s> remove if adler32.Checksum(b[:length-4]) == binary.LittleEndian.Uint32(b[length-4:]) { pos := int(b[4]) if pos != 0xFF { pos += 4 } else { pos = int(binary.BigEndian.Uint16(b[5:5+2])) + 4 } retSize := length - pos - 4 a.buffer.Write(b[pos : pos+retSize]) bSize -= length b = b[length:] </s> add if adler32.Checksum(src.Bytes()[:length-4]) != binary.LittleEndian.Uint32(src.Bytes()[length-4:length]) { a.rawTrans = true src.Reset() return errAuthSHA1V4Adler32Error } pos := int(src.Bytes()[4]) if pos < 255 { pos += 4 </s> remove return nil, 0, errAuthSHA1v4IncorrectChecksum </s> add pos = int(binary.BigEndian.Uint16(src.Bytes()[5:7])) + 4
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/auth_sha1_v4.go
import ( "bytes" "crypto/aes" "crypto/cipher" "encoding/base64" "encoding/binary" "math/rand" "sync" "time" "github.com/Dreamacro/clash/common/pool" "github.com/Dreamacro/clash/log" "github.com/Dreamacro/go-shadowsocks2/core" )
<mask> package protocol <mask> <mask> // Base information for protocol <mask> type Base struct { <mask> IV []byte <mask> Key []byte <mask> TCPMss int <mask> Overhead int </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove IV []byte </s> add </s> remove TCPMss int </s> add </s> remove // Base information for obfs </s> add </s> remove IVSize int Key []byte HeadLen int Host string Port int Param string </s> add Host string Port int Key []byte IVSize int Param string </s> remove // NewConn wraps a stream-oriented net.Conn with protocol decoding/encoding func NewConn(c net.Conn, p Protocol, iv []byte) net.Conn { return &Conn{Conn: c, Protocol: p.initForConn(iv)} } // Conn represents a protocol connection </s> add
[ "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/base.go
<mask> package protocol <mask> <mask> // Base information for protocol <mask> type Base struct { <mask> IV []byte <mask> Key []byte <mask> TCPMss int <mask> Overhead int <mask> Param string <mask> } </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove TCPMss int </s> add </s> remove // Base information for protocol </s> add import ( "bytes" "crypto/aes" "crypto/cipher" "encoding/base64" "encoding/binary" "math/rand" "sync" "time" "github.com/Dreamacro/clash/common/pool" "github.com/Dreamacro/clash/log" "github.com/Dreamacro/go-shadowsocks2/core" ) </s> remove IVSize int Key []byte HeadLen int Host string Port int Param string </s> add Host string Port int Key []byte IVSize int Param string </s> remove // Base information for obfs </s> add </s> remove // NewConn wraps a stream-oriented net.Conn with protocol decoding/encoding func NewConn(c net.Conn, p Protocol, iv []byte) net.Conn { return &Conn{Conn: c, Protocol: p.initForConn(iv)} } // Conn represents a protocol connection </s> add
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/base.go
<mask> // Base information for protocol <mask> type Base struct { <mask> IV []byte <mask> Key []byte <mask> TCPMss int <mask> Overhead int <mask> Param string <mask> } </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove IV []byte </s> add </s> remove // Base information for protocol </s> add import ( "bytes" "crypto/aes" "crypto/cipher" "encoding/base64" "encoding/binary" "math/rand" "sync" "time" "github.com/Dreamacro/clash/common/pool" "github.com/Dreamacro/clash/log" "github.com/Dreamacro/go-shadowsocks2/core" ) </s> remove IVSize int Key []byte HeadLen int Host string Port int Param string </s> add Host string Port int Key []byte IVSize int Param string </s> remove // Base information for obfs </s> add </s> remove // NewConn wraps a stream-oriented net.Conn with protocol decoding/encoding func NewConn(c net.Conn, p Protocol, iv []byte) net.Conn { return &Conn{Conn: c, Protocol: p.initForConn(iv)} } // Conn represents a protocol connection </s> add
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/base.go
import ( "bytes" "net" )
<mask> package protocol <mask> <mask> type origin struct{ *Base } <mask> <mask> func init() { <mask> register("origin", newOrigin) <mask> } <mask> </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove func init() { register("origin", newOrigin) } </s> add type origin struct{} </s> remove func newOrigin(b *Base) Protocol { return &origin{} } </s> add func init() { register("origin", newOrigin, 0) } </s> remove import ( "bytes" "crypto/aes" "crypto/cipher" "encoding/base64" "encoding/binary" "math/rand" "strconv" "strings" "time" "github.com/Dreamacro/clash/common/pool" "github.com/Dreamacro/clash/component/ssr/tools" "github.com/Dreamacro/go-shadowsocks2/core" ) type authAES128 struct { *Base *recvInfo *authData hasSentHeader bool packID uint32 userKey []byte uid [4]byte salt string hmac hmacMethod hashDigest hashDigestMethod } </s> add import "github.com/Dreamacro/clash/component/ssr/tools" </s> remove type httpObfs struct { *Base firstRequest bool firstResponse bool post bool </s> add func init() { register("http_simple", newHTTPSimple, 0) </s> remove type randomHead struct { *Base firstRequest bool firstResponse bool headerSent bool buffer []byte </s> add func init() { register("random_head", newRandomHead, 0)
[ "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/origin.go
type origin struct{}
<mask> package protocol <mask> <mask> type origin struct{ *Base } <mask> <mask> func init() { <mask> register("origin", newOrigin) <mask> } <mask> <mask> func newOrigin(b *Base) Protocol { <mask> return &origin{} <mask> } <mask> </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove type origin struct{ *Base } </s> add import ( "bytes" "net" ) </s> remove func newOrigin(b *Base) Protocol { return &origin{} } </s> add func init() { register("origin", newOrigin, 0) } </s> remove func (o *origin) initForConn(iv []byte) Protocol { return &origin{} } </s> add func newOrigin(b *Base) Protocol { return &origin{} } </s> remove headerSent bool buffer bytes.Buffer } func init() { register("auth_sha1_v4", newAuthSHA1V4) </s> add iv []byte hasSentHeader bool rawTrans bool </s> remove func init() { register("random_head", newRandomHead) </s> add type randomHead struct { *Base
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/origin.go
func init() { register("origin", newOrigin, 0) }
<mask> func init() { <mask> register("origin", newOrigin) <mask> } <mask> <mask> func newOrigin(b *Base) Protocol { <mask> return &origin{} <mask> } <mask> <mask> func (o *origin) initForConn(iv []byte) Protocol { return &origin{} } <mask> <mask> func (o *origin) GetProtocolOverhead() int { <mask> return 0 </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove func (o *origin) initForConn(iv []byte) Protocol { return &origin{} } </s> add func newOrigin(b *Base) Protocol { return &origin{} } </s> remove func (o *origin) GetProtocolOverhead() int { return 0 } </s> add func (o *origin) StreamConn(c net.Conn, iv []byte) net.Conn { return c } </s> remove func init() { register("origin", newOrigin) } </s> add type origin struct{} </s> remove func (o *origin) SetOverhead(overhead int) { } </s> add func (o *origin) PacketConn(c net.PacketConn) net.PacketConn { return c } </s> remove func (o *origin) DecodePacket(b []byte) ([]byte, int, error) { return b, len(b), nil } </s> add func (o *origin) DecodePacket(b []byte) ([]byte, error) { return b, nil }
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/origin.go
func newOrigin(b *Base) Protocol { return &origin{} }
<mask> func newOrigin(b *Base) Protocol { <mask> return &origin{} <mask> } <mask> <mask> func (o *origin) initForConn(iv []byte) Protocol { return &origin{} } <mask> <mask> func (o *origin) GetProtocolOverhead() int { <mask> return 0 <mask> } <mask> </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove func newOrigin(b *Base) Protocol { return &origin{} } </s> add func init() { register("origin", newOrigin, 0) } </s> remove func (o *origin) GetProtocolOverhead() int { return 0 } </s> add func (o *origin) StreamConn(c net.Conn, iv []byte) net.Conn { return c } </s> remove func (o *origin) SetOverhead(overhead int) { } </s> add func (o *origin) PacketConn(c net.PacketConn) net.PacketConn { return c } </s> remove func (o *origin) DecodePacket(b []byte) ([]byte, int, error) { return b, len(b), nil } </s> add func (o *origin) DecodePacket(b []byte) ([]byte, error) { return b, nil } </s> remove func (o *origin) Decode(b []byte) ([]byte, int, error) { return b, len(b), nil </s> add func (o *origin) Decode(dst, src *bytes.Buffer) error { dst.ReadFrom(src) return nil
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/origin.go
func (o *origin) StreamConn(c net.Conn, iv []byte) net.Conn { return c }
<mask> } <mask> <mask> func (o *origin) initForConn(iv []byte) Protocol { return &origin{} } <mask> <mask> func (o *origin) GetProtocolOverhead() int { <mask> return 0 <mask> } <mask> <mask> func (o *origin) SetOverhead(overhead int) { <mask> } <mask> <mask> func (o *origin) Decode(b []byte) ([]byte, int, error) { </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove func (o *origin) SetOverhead(overhead int) { } </s> add func (o *origin) PacketConn(c net.PacketConn) net.PacketConn { return c } </s> remove func (o *origin) initForConn(iv []byte) Protocol { return &origin{} } </s> add func newOrigin(b *Base) Protocol { return &origin{} } </s> remove func (o *origin) Decode(b []byte) ([]byte, int, error) { return b, len(b), nil </s> add func (o *origin) Decode(dst, src *bytes.Buffer) error { dst.ReadFrom(src) return nil </s> remove func newOrigin(b *Base) Protocol { return &origin{} } </s> add func init() { register("origin", newOrigin, 0) } </s> remove func (o *origin) Encode(b []byte) ([]byte, error) { return b, nil </s> add func (o *origin) Encode(buf *bytes.Buffer, b []byte) error { buf.Write(b) return nil
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/origin.go
func (o *origin) PacketConn(c net.PacketConn) net.PacketConn { return c }
<mask> func (o *origin) GetProtocolOverhead() int { <mask> return 0 <mask> } <mask> <mask> func (o *origin) SetOverhead(overhead int) { <mask> } <mask> <mask> func (o *origin) Decode(b []byte) ([]byte, int, error) { <mask> return b, len(b), nil <mask> } <mask> </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove func (o *origin) Decode(b []byte) ([]byte, int, error) { return b, len(b), nil </s> add func (o *origin) Decode(dst, src *bytes.Buffer) error { dst.ReadFrom(src) return nil </s> remove func (o *origin) GetProtocolOverhead() int { return 0 } </s> add func (o *origin) StreamConn(c net.Conn, iv []byte) net.Conn { return c } </s> remove func (o *origin) Encode(b []byte) ([]byte, error) { return b, nil </s> add func (o *origin) Encode(buf *bytes.Buffer, b []byte) error { buf.Write(b) return nil </s> remove func (o *origin) DecodePacket(b []byte) ([]byte, int, error) { return b, len(b), nil } </s> add func (o *origin) DecodePacket(b []byte) ([]byte, error) { return b, nil } </s> remove func (o *origin) EncodePacket(b []byte) ([]byte, error) { return b, nil </s> add func (o *origin) EncodePacket(buf *bytes.Buffer, b []byte) error { buf.Write(b) return nil
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/origin.go
func (o *origin) Decode(dst, src *bytes.Buffer) error { dst.ReadFrom(src) return nil
<mask> <mask> func (o *origin) SetOverhead(overhead int) { <mask> } <mask> <mask> func (o *origin) Decode(b []byte) ([]byte, int, error) { <mask> return b, len(b), nil <mask> } <mask> <mask> func (o *origin) Encode(b []byte) ([]byte, error) { <mask> return b, nil <mask> } </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove func (o *origin) Encode(b []byte) ([]byte, error) { return b, nil </s> add func (o *origin) Encode(buf *bytes.Buffer, b []byte) error { buf.Write(b) return nil </s> remove func (o *origin) SetOverhead(overhead int) { } </s> add func (o *origin) PacketConn(c net.PacketConn) net.PacketConn { return c } </s> remove func (o *origin) DecodePacket(b []byte) ([]byte, int, error) { return b, len(b), nil } </s> add func (o *origin) DecodePacket(b []byte) ([]byte, error) { return b, nil } </s> remove func (o *origin) EncodePacket(b []byte) ([]byte, error) { return b, nil </s> add func (o *origin) EncodePacket(buf *bytes.Buffer, b []byte) error { buf.Write(b) return nil </s> remove func (o *origin) GetProtocolOverhead() int { return 0 } </s> add func (o *origin) StreamConn(c net.Conn, iv []byte) net.Conn { return c }
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/origin.go
func (o *origin) Encode(buf *bytes.Buffer, b []byte) error { buf.Write(b) return nil
<mask> func (o *origin) Decode(b []byte) ([]byte, int, error) { <mask> return b, len(b), nil <mask> } <mask> <mask> func (o *origin) Encode(b []byte) ([]byte, error) { <mask> return b, nil <mask> } <mask> <mask> func (o *origin) DecodePacket(b []byte) ([]byte, int, error) { <mask> return b, len(b), nil <mask> } </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove func (o *origin) DecodePacket(b []byte) ([]byte, int, error) { return b, len(b), nil } </s> add func (o *origin) DecodePacket(b []byte) ([]byte, error) { return b, nil } </s> remove func (o *origin) Decode(b []byte) ([]byte, int, error) { return b, len(b), nil </s> add func (o *origin) Decode(dst, src *bytes.Buffer) error { dst.ReadFrom(src) return nil </s> remove func (o *origin) EncodePacket(b []byte) ([]byte, error) { return b, nil </s> add func (o *origin) EncodePacket(buf *bytes.Buffer, b []byte) error { buf.Write(b) return nil </s> remove func (o *origin) SetOverhead(overhead int) { } </s> add func (o *origin) PacketConn(c net.PacketConn) net.PacketConn { return c } </s> remove func (o *origin) GetProtocolOverhead() int { return 0 } </s> add func (o *origin) StreamConn(c net.Conn, iv []byte) net.Conn { return c }
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/origin.go
func (o *origin) DecodePacket(b []byte) ([]byte, error) { return b, nil }
<mask> func (o *origin) Encode(b []byte) ([]byte, error) { <mask> return b, nil <mask> } <mask> <mask> func (o *origin) DecodePacket(b []byte) ([]byte, int, error) { <mask> return b, len(b), nil <mask> } <mask> <mask> func (o *origin) EncodePacket(b []byte) ([]byte, error) { <mask> return b, nil <mask> } </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove func (o *origin) Encode(b []byte) ([]byte, error) { return b, nil </s> add func (o *origin) Encode(buf *bytes.Buffer, b []byte) error { buf.Write(b) return nil </s> remove func (o *origin) EncodePacket(b []byte) ([]byte, error) { return b, nil </s> add func (o *origin) EncodePacket(buf *bytes.Buffer, b []byte) error { buf.Write(b) return nil </s> remove func (o *origin) Decode(b []byte) ([]byte, int, error) { return b, len(b), nil </s> add func (o *origin) Decode(dst, src *bytes.Buffer) error { dst.ReadFrom(src) return nil </s> remove func (o *origin) SetOverhead(overhead int) { } </s> add func (o *origin) PacketConn(c net.PacketConn) net.PacketConn { return c } </s> remove func (o *origin) GetProtocolOverhead() int { return 0 } </s> add func (o *origin) StreamConn(c net.Conn, iv []byte) net.Conn { return c }
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/origin.go
func (o *origin) EncodePacket(buf *bytes.Buffer, b []byte) error { buf.Write(b) return nil
<mask> func (o *origin) DecodePacket(b []byte) ([]byte, int, error) { <mask> return b, len(b), nil <mask> } <mask> <mask> func (o *origin) EncodePacket(b []byte) ([]byte, error) { <mask> return b, nil <mask> } </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove func (o *origin) DecodePacket(b []byte) ([]byte, int, error) { return b, len(b), nil } </s> add func (o *origin) DecodePacket(b []byte) ([]byte, error) { return b, nil } </s> remove func (o *origin) Encode(b []byte) ([]byte, error) { return b, nil </s> add func (o *origin) Encode(buf *bytes.Buffer, b []byte) error { buf.Write(b) return nil </s> remove func (o *origin) Decode(b []byte) ([]byte, int, error) { return b, len(b), nil </s> add func (o *origin) Decode(dst, src *bytes.Buffer) error { dst.ReadFrom(src) return nil </s> remove func (o *origin) SetOverhead(overhead int) { } </s> add func (o *origin) PacketConn(c net.PacketConn) net.PacketConn { return c } </s> remove func (o *origin) GetProtocolOverhead() int { return 0 } </s> add func (o *origin) StreamConn(c net.Conn, iv []byte) net.Conn { return c }
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/origin.go
"bytes"
<mask> package protocol <mask> <mask> import ( <mask> "net" <mask> <mask> "github.com/Dreamacro/clash/component/ssr/tools" <mask> ) <mask> </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove type origin struct{ *Base } </s> add import ( "bytes" "net" ) </s> remove "github.com/Dreamacro/clash/common/pool" </s> add "github.com/Dreamacro/clash/component/ssr/tools" </s> remove import ( "bytes" "crypto/aes" "crypto/cipher" "encoding/base64" "encoding/binary" "math/rand" "strconv" "strings" "time" "github.com/Dreamacro/clash/common/pool" "github.com/Dreamacro/clash/component/ssr/tools" "github.com/Dreamacro/go-shadowsocks2/core" ) type authAES128 struct { *Base *recvInfo *authData hasSentHeader bool packID uint32 userKey []byte uid [4]byte salt string hmac hmacMethod hashDigest hashDigestMethod } </s> add import "github.com/Dreamacro/clash/component/ssr/tools"
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/packet.go
"github.com/Dreamacro/clash/component/ssr/tools"
<mask> <mask> import ( <mask> "net" <mask> <mask> "github.com/Dreamacro/clash/common/pool" <mask> ) <mask> <mask> // NewPacketConn returns a net.NewPacketConn with protocol decoding/encoding <mask> func NewPacketConn(pc net.PacketConn, p Protocol) net.PacketConn { <mask> return &PacketConn{PacketConn: pc, Protocol: p.initForConn(nil)} </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove // NewPacketConn returns a net.NewPacketConn with protocol decoding/encoding func NewPacketConn(pc net.PacketConn, p Protocol) net.PacketConn { return &PacketConn{PacketConn: pc, Protocol: p.initForConn(nil)} } // PacketConn represents a protocol packet connection </s> add </s> remove // NewConn wraps a stream-oriented net.Conn with protocol decoding/encoding func NewConn(c net.Conn, p Protocol, iv []byte) net.Conn { return &Conn{Conn: c, Protocol: p.initForConn(iv)} } // Conn represents a protocol connection </s> add </s> remove func (a *authChain) SetOverhead(overhead int) { a.Overhead = overhead </s> add func (a *authChainA) PacketConn(c net.PacketConn) net.PacketConn { p := &authChainA{ Base: a.Base, salt: a.salt, userData: a.userData, } return &PacketConn{PacketConn: c, Protocol: p} </s> remove type origin struct{ *Base } </s> add import ( "bytes" "net" ) </s> remove // Base information for protocol </s> add import ( "bytes" "crypto/aes" "crypto/cipher" "encoding/base64" "encoding/binary" "math/rand" "sync" "time" "github.com/Dreamacro/clash/common/pool" "github.com/Dreamacro/clash/log" "github.com/Dreamacro/go-shadowsocks2/core" )
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/packet.go
<mask> <mask> "github.com/Dreamacro/clash/common/pool" <mask> ) <mask> <mask> // NewPacketConn returns a net.NewPacketConn with protocol decoding/encoding <mask> func NewPacketConn(pc net.PacketConn, p Protocol) net.PacketConn { <mask> return &PacketConn{PacketConn: pc, Protocol: p.initForConn(nil)} <mask> } <mask> <mask> // PacketConn represents a protocol packet connection <mask> type PacketConn struct { <mask> net.PacketConn <mask> Protocol <mask> } <mask> </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove "github.com/Dreamacro/clash/common/pool" </s> add "github.com/Dreamacro/clash/component/ssr/tools" </s> remove // NewConn wraps a stream-oriented net.Conn with protocol decoding/encoding func NewConn(c net.Conn, p Protocol, iv []byte) net.Conn { return &Conn{Conn: c, Protocol: p.initForConn(iv)} } // Conn represents a protocol connection </s> add </s> remove buf []byte offset int </s> add decoded bytes.Buffer </s> remove func register(name string, c protocolCreator) { protocolList[name] = c </s> add func register(name string, c protocolCreator, o int) { protocolList[name] = struct { overhead int new protocolCreator }{overhead: o, new: c} </s> remove func (a *authChain) SetOverhead(overhead int) { a.Overhead = overhead </s> add func (a *authChainA) PacketConn(c net.PacketConn) net.PacketConn { p := &authChainA{ Base: a.Base, salt: a.salt, userData: a.userData, } return &PacketConn{PacketConn: c, Protocol: p}
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/packet.go
buf := tools.BufPool.Get().(*bytes.Buffer) defer tools.BufPool.Put(buf) defer buf.Reset() err := c.EncodePacket(buf, b)
<mask> Protocol <mask> } <mask> <mask> func (c *PacketConn) WriteTo(b []byte, addr net.Addr) (int, error) { <mask> buf := pool.Get(pool.RelayBufferSize) <mask> defer pool.Put(buf) <mask> buf, err := c.EncodePacket(b) <mask> if err != nil { <mask> return 0, err <mask> } <mask> _, err = c.PacketConn.WriteTo(buf, addr) <mask> return len(b), err </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove _, err = c.PacketConn.WriteTo(buf, addr) </s> add _, err = c.PacketConn.WriteTo(buf.Bytes(), addr) </s> remove encoded, err := c.Encode(b) </s> add bLength := len(b) buf := tools.BufPool.Get().(*bytes.Buffer) defer tools.BufPool.Put(buf) defer buf.Reset() err := c.Encode(buf, b) </s> remove func (r *randomHead) Decode(b []byte) ([]byte, bool, error) { if r.firstResponse { r.firstResponse = false return b, true, nil </s> add func (c *randomHeadConn) Write(b []byte) (int, error) { if c.rawTransSent { return c.Conn.Write(b) } c.buf = append(c.buf, b...) if !c.hasSentHeader { c.hasSentHeader = true dataLength := rand.Intn(96) + 4 buf := pool.Get(dataLength + 4) defer pool.Put(buf) rand.Read(buf[:dataLength]) binary.LittleEndian.PutUint32(buf[dataLength:], 0xffffffff-crc32.ChecksumIEEE(buf[:dataLength])) _, err := c.Conn.Write(buf) return len(b), err } if c.rawTransRecv { _, err := c.Conn.Write(c.buf) c.buf = nil c.rawTransSent = true return len(b), err </s> remove if c.buf != nil { n := copy(b, c.buf[c.offset:]) c.offset += n if c.offset == len(c.buf) { c.buf = nil } return n, nil </s> add if c.decoded.Len() > 0 { return c.decoded.Read(b) </s> remove _, err = c.Conn.Write(encoded) </s> add _, err = c.Conn.Write(buf.Bytes())
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/packet.go
_, err = c.PacketConn.WriteTo(buf.Bytes(), addr)
<mask> buf, err := c.EncodePacket(b) <mask> if err != nil { <mask> return 0, err <mask> } <mask> _, err = c.PacketConn.WriteTo(buf, addr) <mask> return len(b), err <mask> } <mask> <mask> func (c *PacketConn) ReadFrom(b []byte) (int, net.Addr, error) { <mask> n, addr, err := c.PacketConn.ReadFrom(b) </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove buf := pool.Get(pool.RelayBufferSize) defer pool.Put(buf) buf, err := c.EncodePacket(b) </s> add buf := tools.BufPool.Get().(*bytes.Buffer) defer tools.BufPool.Put(buf) defer buf.Reset() err := c.EncodePacket(buf, b) </s> remove encoded, err := c.Encode(b) </s> add bLength := len(b) buf := tools.BufPool.Get().(*bytes.Buffer) defer tools.BufPool.Put(buf) defer buf.Reset() err := c.Encode(buf, b) </s> remove bb, length, err := c.DecodePacket(b[:n]) </s> add decoded, err := c.DecodePacket(b[:n]) </s> remove _, err = c.Conn.Write(encoded) </s> add _, err = c.Conn.Write(buf.Bytes())
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/packet.go
decoded, err := c.DecodePacket(b[:n])
<mask> n, addr, err := c.PacketConn.ReadFrom(b) <mask> if err != nil { <mask> return n, addr, err <mask> } <mask> bb, length, err := c.DecodePacket(b[:n]) <mask> if err != nil { <mask> return n, addr, err <mask> } <mask> copy(b, bb) <mask> return length, addr, err </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove copy(b, bb) return length, addr, err </s> add copy(b, decoded) return len(decoded), addr, nil </s> remove _, err = c.PacketConn.WriteTo(buf, addr) </s> add _, err = c.PacketConn.WriteTo(buf.Bytes(), addr) </s> remove c.underDecoded.Reset() return 0, nil } if length == 0 { return 0, nil } c.underDecoded.Next(length) n = copy(b, decoded) if len(decoded) > len(b) { c.buf = decoded c.offset = n </s> add return 0, err </s> remove if c.buf != nil { n := copy(b, c.buf[c.offset:]) c.offset += n if c.offset == len(c.buf) { c.buf = nil } return n, nil </s> add if c.decoded.Len() > 0 { return c.decoded.Read(b)
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/packet.go
copy(b, decoded) return len(decoded), addr, nil
<mask> bb, length, err := c.DecodePacket(b[:n]) <mask> if err != nil { <mask> return n, addr, err <mask> } <mask> copy(b, bb) <mask> return length, addr, err <mask> } </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove bb, length, err := c.DecodePacket(b[:n]) </s> add decoded, err := c.DecodePacket(b[:n]) </s> remove c.underDecoded.Reset() return 0, nil } if length == 0 { return 0, nil } c.underDecoded.Next(length) n = copy(b, decoded) if len(decoded) > len(b) { c.buf = decoded c.offset = n </s> add return 0, err </s> remove _, err = c.PacketConn.WriteTo(buf, addr) </s> add _, err = c.PacketConn.WriteTo(buf.Bytes(), addr) </s> remove underDecoded := c.underDecoded.Bytes() decoded, length, err := c.Decode(underDecoded) </s> add err = c.Decode(&c.decoded, &c.underDecoded) </s> remove if c.buf != nil { n := copy(b, c.buf[c.offset:]) c.offset += n if c.offset == len(c.buf) { c.buf = nil } return n, nil </s> add if c.decoded.Len() > 0 { return c.decoded.Read(b)
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/packet.go
"math/rand" "net"
<mask> import ( <mask> "bytes" <mask> "errors" <mask> "fmt" <mask> "strings" <mask> "sync" <mask> ) <mask> <mask> var ( <mask> errAuthAES128IncorrectMAC = errors.New("auth_aes128_* post decrypt incorrect mac") <mask> errAuthAES128DataLengthError = errors.New("auth_aes128_* post decrypt length mismatch") </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove errAuthAES128IncorrectMAC = errors.New("auth_aes128_* post decrypt incorrect mac") errAuthAES128DataLengthError = errors.New("auth_aes128_* post decrypt length mismatch") errAuthAES128IncorrectChecksum = errors.New("auth_aes128_* post decrypt incorrect checksum") errAuthAES128PositionTooLarge = errors.New("auth_aes128_* post decrypt position is too large") errAuthSHA1v4CRC32Error = errors.New("auth_sha1_v4 post decrypt data crc32 error") errAuthSHA1v4DataLengthError = errors.New("auth_sha1_v4 post decrypt data length error") errAuthSHA1v4IncorrectChecksum = errors.New("auth_sha1_v4 post decrypt incorrect checksum") errAuthChainDataLengthError = errors.New("auth_chain_* post decrypt length mismatch") errAuthChainHMACError = errors.New("auth_chain_* post decrypt hmac error") </s> add errAuthSHA1V4CRC32Error = errors.New("auth_sha1_v4 decode data wrong crc32") errAuthSHA1V4LengthError = errors.New("auth_sha1_v4 decode data wrong length") errAuthSHA1V4Adler32Error = errors.New("auth_sha1_v4 decode data wrong adler32") errAuthAES128MACError = errors.New("auth_aes128 decode data wrong mac") errAuthAES128LengthError = errors.New("auth_aes128 decode data wrong length") errAuthAES128ChksumError = errors.New("auth_aes128 decode data wrong checksum") errAuthChainLengthError = errors.New("auth_chain decode data wrong length") errAuthChainChksumError = errors.New("auth_chain decode data wrong checksum") </s> remove "strings" </s> add "net" </s> remove "fmt" </s> add </s> remove type authData struct { clientID []byte connectionID uint32 mutex sync.Mutex } type recvInfo struct { recvID uint32 buffer *bytes.Buffer } type hmacMethod func(key []byte, data []byte) []byte type hashDigestMethod func(data []byte) []byte type rndMethod func(dataSize int, random *shift128PlusContext, lastHash []byte, dataSizeList, dataSizeList2 []int, overhead int) int // Protocol provides methods for decoding, encoding and iv setting </s> add </s> remove // Base information for protocol </s> add import ( "bytes" "crypto/aes" "crypto/cipher" "encoding/base64" "encoding/binary" "math/rand" "sync" "time" "github.com/Dreamacro/clash/common/pool" "github.com/Dreamacro/clash/log" "github.com/Dreamacro/go-shadowsocks2/core" )
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/protocol.go
errAuthSHA1V4CRC32Error = errors.New("auth_sha1_v4 decode data wrong crc32") errAuthSHA1V4LengthError = errors.New("auth_sha1_v4 decode data wrong length") errAuthSHA1V4Adler32Error = errors.New("auth_sha1_v4 decode data wrong adler32") errAuthAES128MACError = errors.New("auth_aes128 decode data wrong mac") errAuthAES128LengthError = errors.New("auth_aes128 decode data wrong length") errAuthAES128ChksumError = errors.New("auth_aes128 decode data wrong checksum") errAuthChainLengthError = errors.New("auth_chain decode data wrong length") errAuthChainChksumError = errors.New("auth_chain decode data wrong checksum")
<mask> "sync" <mask> ) <mask> <mask> var ( <mask> errAuthAES128IncorrectMAC = errors.New("auth_aes128_* post decrypt incorrect mac") <mask> errAuthAES128DataLengthError = errors.New("auth_aes128_* post decrypt length mismatch") <mask> errAuthAES128IncorrectChecksum = errors.New("auth_aes128_* post decrypt incorrect checksum") <mask> errAuthAES128PositionTooLarge = errors.New("auth_aes128_* post decrypt position is too large") <mask> errAuthSHA1v4CRC32Error = errors.New("auth_sha1_v4 post decrypt data crc32 error") <mask> errAuthSHA1v4DataLengthError = errors.New("auth_sha1_v4 post decrypt data length error") <mask> errAuthSHA1v4IncorrectChecksum = errors.New("auth_sha1_v4 post decrypt incorrect checksum") <mask> errAuthChainDataLengthError = errors.New("auth_chain_* post decrypt length mismatch") <mask> errAuthChainHMACError = errors.New("auth_chain_* post decrypt hmac error") <mask> ) <mask> <mask> type authData struct { <mask> clientID []byte <mask> connectionID uint32 </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove "strings" "sync" </s> add "math/rand" "net" </s> remove type authData struct { clientID []byte connectionID uint32 mutex sync.Mutex } type recvInfo struct { recvID uint32 buffer *bytes.Buffer } type hmacMethod func(key []byte, data []byte) []byte type hashDigestMethod func(data []byte) []byte type rndMethod func(dataSize int, random *shift128PlusContext, lastHash []byte, dataSizeList, dataSizeList2 []int, overhead int) int // Protocol provides methods for decoding, encoding and iv setting </s> add </s> remove func init() { register("http_simple", newHTTPSimple) </s> add type httpObfs struct { *Base post bool </s> remove type httpObfs struct { *Base firstRequest bool firstResponse bool post bool </s> add func init() { register("http_simple", newHTTPSimple, 0) </s> remove "strings" </s> add "net"
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/protocol.go
<mask> errAuthChainDataLengthError = errors.New("auth_chain_* post decrypt length mismatch") <mask> errAuthChainHMACError = errors.New("auth_chain_* post decrypt hmac error") <mask> ) <mask> <mask> type authData struct { <mask> clientID []byte <mask> connectionID uint32 <mask> mutex sync.Mutex <mask> } <mask> <mask> type recvInfo struct { <mask> recvID uint32 <mask> buffer *bytes.Buffer <mask> } <mask> <mask> type hmacMethod func(key []byte, data []byte) []byte <mask> type hashDigestMethod func(data []byte) []byte <mask> type rndMethod func(dataSize int, random *shift128PlusContext, lastHash []byte, dataSizeList, dataSizeList2 []int, overhead int) int <mask> <mask> // Protocol provides methods for decoding, encoding and iv setting <mask> type Protocol interface { <mask> initForConn(iv []byte) Protocol <mask> GetProtocolOverhead() int <mask> SetOverhead(int) <mask> Decode([]byte) ([]byte, int, error) </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove initForConn(iv []byte) Protocol GetProtocolOverhead() int SetOverhead(int) Decode([]byte) ([]byte, int, error) Encode([]byte) ([]byte, error) DecodePacket([]byte) ([]byte, int, error) EncodePacket([]byte) ([]byte, error) </s> add StreamConn(net.Conn, []byte) net.Conn PacketConn(net.PacketConn) net.PacketConn Decode(dst, src *bytes.Buffer) error Encode(buf *bytes.Buffer, b []byte) error DecodePacket([]byte) ([]byte, error) EncodePacket(buf *bytes.Buffer, b []byte) error </s> remove errAuthAES128IncorrectMAC = errors.New("auth_aes128_* post decrypt incorrect mac") errAuthAES128DataLengthError = errors.New("auth_aes128_* post decrypt length mismatch") errAuthAES128IncorrectChecksum = errors.New("auth_aes128_* post decrypt incorrect checksum") errAuthAES128PositionTooLarge = errors.New("auth_aes128_* post decrypt position is too large") errAuthSHA1v4CRC32Error = errors.New("auth_sha1_v4 post decrypt data crc32 error") errAuthSHA1v4DataLengthError = errors.New("auth_sha1_v4 post decrypt data length error") errAuthSHA1v4IncorrectChecksum = errors.New("auth_sha1_v4 post decrypt incorrect checksum") errAuthChainDataLengthError = errors.New("auth_chain_* post decrypt length mismatch") errAuthChainHMACError = errors.New("auth_chain_* post decrypt hmac error") </s> add errAuthSHA1V4CRC32Error = errors.New("auth_sha1_v4 decode data wrong crc32") errAuthSHA1V4LengthError = errors.New("auth_sha1_v4 decode data wrong length") errAuthSHA1V4Adler32Error = errors.New("auth_sha1_v4 decode data wrong adler32") errAuthAES128MACError = errors.New("auth_aes128 decode data wrong mac") errAuthAES128LengthError = errors.New("auth_aes128 decode data wrong length") errAuthAES128ChksumError = errors.New("auth_aes128 decode data wrong checksum") errAuthChainLengthError = errors.New("auth_chain decode data wrong length") errAuthChainChksumError = errors.New("auth_chain decode data wrong checksum") </s> remove // Obfs provides methods for decoding and encoding </s> add type authData struct { clientID [32]byte } </s> remove register("auth_aes128_sha1", newAuthAES128SHA1) </s> add register("auth_aes128_sha1", newAuthAES128SHA1, 9) } type authAES128Function struct { salt string hmac hmacMethod hashDigest hashDigestMethod } type authAES128 struct { *Base *authData *authAES128Function *userData iv []byte hasSentHeader bool rawTrans bool packID uint32 recvID uint32 </s> remove initForConn() Obfs GetObfsOverhead() int Decode(b []byte) ([]byte, bool, error) Encode(b []byte) ([]byte, error) </s> add StreamConn(net.Conn) net.Conn
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/protocol.go
StreamConn(net.Conn, []byte) net.Conn PacketConn(net.PacketConn) net.PacketConn Decode(dst, src *bytes.Buffer) error Encode(buf *bytes.Buffer, b []byte) error DecodePacket([]byte) ([]byte, error) EncodePacket(buf *bytes.Buffer, b []byte) error
<mask> type rndMethod func(dataSize int, random *shift128PlusContext, lastHash []byte, dataSizeList, dataSizeList2 []int, overhead int) int <mask> <mask> // Protocol provides methods for decoding, encoding and iv setting <mask> type Protocol interface { <mask> initForConn(iv []byte) Protocol <mask> GetProtocolOverhead() int <mask> SetOverhead(int) <mask> Decode([]byte) ([]byte, int, error) <mask> Encode([]byte) ([]byte, error) <mask> DecodePacket([]byte) ([]byte, int, error) <mask> EncodePacket([]byte) ([]byte, error) <mask> } <mask> <mask> type protocolCreator func(b *Base) Protocol <mask> <mask> var protocolList = make(map[string]protocolCreator) </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove type authData struct { clientID []byte connectionID uint32 mutex sync.Mutex } type recvInfo struct { recvID uint32 buffer *bytes.Buffer } type hmacMethod func(key []byte, data []byte) []byte type hashDigestMethod func(data []byte) []byte type rndMethod func(dataSize int, random *shift128PlusContext, lastHash []byte, dataSizeList, dataSizeList2 []int, overhead int) int // Protocol provides methods for decoding, encoding and iv setting </s> add </s> remove initForConn() Obfs GetObfsOverhead() int Decode(b []byte) ([]byte, bool, error) Encode(b []byte) ([]byte, error) </s> add StreamConn(net.Conn) net.Conn </s> remove var protocolList = make(map[string]protocolCreator) </s> add var protocolList = make(map[string]struct { overhead int new protocolCreator }) </s> remove // Obfs provides methods for decoding and encoding </s> add type authData struct { clientID [32]byte } </s> remove func register(name string, c protocolCreator) { protocolList[name] = c </s> add func register(name string, c protocolCreator, o int) { protocolList[name] = struct { overhead int new protocolCreator }{overhead: o, new: c}
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/protocol.go
var protocolList = make(map[string]struct { overhead int new protocolCreator })
<mask> } <mask> <mask> type protocolCreator func(b *Base) Protocol <mask> <mask> var protocolList = make(map[string]protocolCreator) <mask> <mask> func register(name string, c protocolCreator) { <mask> protocolList[name] = c <mask> } <mask> </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove func register(name string, c protocolCreator) { protocolList[name] = c </s> add func register(name string, c protocolCreator, o int) { protocolList[name] = struct { overhead int new protocolCreator }{overhead: o, new: c} </s> remove var obfsList = make(map[string]obfsCreator) </s> add var obfsList = make(map[string]struct { overhead int new obfsCreator }) </s> remove // PickProtocol returns a protocol of the given name </s> add </s> remove func register(name string, c obfsCreator) { obfsList[name] = c </s> add func register(name string, c obfsCreator, o int) { obfsList[name] = struct { overhead int new obfsCreator }{overhead: o, new: c} </s> remove initForConn(iv []byte) Protocol GetProtocolOverhead() int SetOverhead(int) Decode([]byte) ([]byte, int, error) Encode([]byte) ([]byte, error) DecodePacket([]byte) ([]byte, int, error) EncodePacket([]byte) ([]byte, error) </s> add StreamConn(net.Conn, []byte) net.Conn PacketConn(net.PacketConn) net.PacketConn Decode(dst, src *bytes.Buffer) error Encode(buf *bytes.Buffer, b []byte) error DecodePacket([]byte) ([]byte, error) EncodePacket(buf *bytes.Buffer, b []byte) error
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/protocol.go
func register(name string, c protocolCreator, o int) { protocolList[name] = struct { overhead int new protocolCreator }{overhead: o, new: c}
<mask> type protocolCreator func(b *Base) Protocol <mask> <mask> var protocolList = make(map[string]protocolCreator) <mask> <mask> func register(name string, c protocolCreator) { <mask> protocolList[name] = c <mask> } <mask> <mask> // PickProtocol returns a protocol of the given name <mask> func PickProtocol(name string, b *Base) (Protocol, error) { <mask> if protocolCreator, ok := protocolList[strings.ToLower(name)]; ok { </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove // PickProtocol returns a protocol of the given name </s> add </s> remove var protocolList = make(map[string]protocolCreator) </s> add var protocolList = make(map[string]struct { overhead int new protocolCreator }) </s> remove func register(name string, c obfsCreator) { obfsList[name] = c </s> add func register(name string, c obfsCreator, o int) { obfsList[name] = struct { overhead int new obfsCreator }{overhead: o, new: c} </s> remove // PickObfs returns an obfs of the given name func PickObfs(name string, b *Base) (Obfs, error) { if obfsCreator, ok := obfsList[strings.ToLower(name)]; ok { return obfsCreator(b), nil </s> add func PickObfs(name string, b *Base) (Obfs, int, error) { if choice, ok := obfsList[name]; ok { return choice.new(b), choice.overhead, nil </s> remove if protocolCreator, ok := protocolList[strings.ToLower(name)]; ok { return protocolCreator(b), nil </s> add if choice, ok := protocolList[name]; ok { b.Overhead += choice.overhead return choice.new(b), nil } return nil, fmt.Errorf("protocol %s not supported", name) } func getHeadSize(b []byte, defaultValue int) int { if len(b) < 2 { return defaultValue } headType := b[0] & 7 switch headType { case 1: return 7 case 4: return 19 case 3: return 4 + int(b[1]) } return defaultValue } func getDataLength(b []byte) int { bLength := len(b) dataLength := getHeadSize(b, 30) + rand.Intn(32) if bLength < dataLength { return bLength
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/protocol.go
<mask> func register(name string, c protocolCreator) { <mask> protocolList[name] = c <mask> } <mask> <mask> // PickProtocol returns a protocol of the given name <mask> func PickProtocol(name string, b *Base) (Protocol, error) { <mask> if protocolCreator, ok := protocolList[strings.ToLower(name)]; ok { <mask> return protocolCreator(b), nil <mask> } <mask> return nil, fmt.Errorf("Protocol %s not supported", name) </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove func register(name string, c protocolCreator) { protocolList[name] = c </s> add func register(name string, c protocolCreator, o int) { protocolList[name] = struct { overhead int new protocolCreator }{overhead: o, new: c} </s> remove if protocolCreator, ok := protocolList[strings.ToLower(name)]; ok { return protocolCreator(b), nil </s> add if choice, ok := protocolList[name]; ok { b.Overhead += choice.overhead return choice.new(b), nil } return nil, fmt.Errorf("protocol %s not supported", name) } func getHeadSize(b []byte, defaultValue int) int { if len(b) < 2 { return defaultValue } headType := b[0] & 7 switch headType { case 1: return 7 case 4: return 19 case 3: return 4 + int(b[1]) } return defaultValue } func getDataLength(b []byte) int { bLength := len(b) dataLength := getHeadSize(b, 30) + rand.Intn(32) if bLength < dataLength { return bLength </s> remove return nil, fmt.Errorf("Protocol %s not supported", name) </s> add return dataLength </s> remove // PickObfs returns an obfs of the given name func PickObfs(name string, b *Base) (Obfs, error) { if obfsCreator, ok := obfsList[strings.ToLower(name)]; ok { return obfsCreator(b), nil </s> add func PickObfs(name string, b *Base) (Obfs, int, error) { if choice, ok := obfsList[name]; ok { return choice.new(b), choice.overhead, nil </s> remove func register(name string, c obfsCreator) { obfsList[name] = c </s> add func register(name string, c obfsCreator, o int) { obfsList[name] = struct { overhead int new obfsCreator }{overhead: o, new: c}
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/protocol.go
if choice, ok := protocolList[name]; ok { b.Overhead += choice.overhead return choice.new(b), nil } return nil, fmt.Errorf("protocol %s not supported", name) } func getHeadSize(b []byte, defaultValue int) int { if len(b) < 2 { return defaultValue } headType := b[0] & 7 switch headType { case 1: return 7 case 4: return 19 case 3: return 4 + int(b[1]) } return defaultValue } func getDataLength(b []byte) int { bLength := len(b) dataLength := getHeadSize(b, 30) + rand.Intn(32) if bLength < dataLength { return bLength
<mask> } <mask> <mask> // PickProtocol returns a protocol of the given name <mask> func PickProtocol(name string, b *Base) (Protocol, error) { <mask> if protocolCreator, ok := protocolList[strings.ToLower(name)]; ok { <mask> return protocolCreator(b), nil <mask> } <mask> return nil, fmt.Errorf("Protocol %s not supported", name) <mask> } </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove // PickProtocol returns a protocol of the given name </s> add </s> remove return nil, fmt.Errorf("Protocol %s not supported", name) </s> add return dataLength </s> remove func register(name string, c protocolCreator) { protocolList[name] = c </s> add func register(name string, c protocolCreator, o int) { protocolList[name] = struct { overhead int new protocolCreator }{overhead: o, new: c} </s> remove // PickObfs returns an obfs of the given name func PickObfs(name string, b *Base) (Obfs, error) { if obfsCreator, ok := obfsList[strings.ToLower(name)]; ok { return obfsCreator(b), nil </s> add func PickObfs(name string, b *Base) (Obfs, int, error) { if choice, ok := obfsList[name]; ok { return choice.new(b), choice.overhead, nil </s> remove return nil, fmt.Errorf("Obfs %s not supported", name) </s> add return nil, 0, fmt.Errorf("Obfs %s not supported", name)
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/protocol.go
return dataLength
<mask> func PickProtocol(name string, b *Base) (Protocol, error) { <mask> if protocolCreator, ok := protocolList[strings.ToLower(name)]; ok { <mask> return protocolCreator(b), nil <mask> } <mask> return nil, fmt.Errorf("Protocol %s not supported", name) <mask> } </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove // PickProtocol returns a protocol of the given name </s> add </s> remove if protocolCreator, ok := protocolList[strings.ToLower(name)]; ok { return protocolCreator(b), nil </s> add if choice, ok := protocolList[name]; ok { b.Overhead += choice.overhead return choice.new(b), nil } return nil, fmt.Errorf("protocol %s not supported", name) } func getHeadSize(b []byte, defaultValue int) int { if len(b) < 2 { return defaultValue } headType := b[0] & 7 switch headType { case 1: return 7 case 4: return 19 case 3: return 4 + int(b[1]) } return defaultValue } func getDataLength(b []byte) int { bLength := len(b) dataLength := getHeadSize(b, 30) + rand.Intn(32) if bLength < dataLength { return bLength </s> remove return nil, fmt.Errorf("Obfs %s not supported", name) </s> add return nil, 0, fmt.Errorf("Obfs %s not supported", name) </s> remove // PickObfs returns an obfs of the given name func PickObfs(name string, b *Base) (Obfs, error) { if obfsCreator, ok := obfsList[strings.ToLower(name)]; ok { return obfsCreator(b), nil </s> add func PickObfs(name string, b *Base) (Obfs, int, error) { if choice, ok := obfsList[name]; ok { return choice.new(b), choice.overhead, nil </s> remove func register(name string, c protocolCreator) { protocolList[name] = c </s> add func register(name string, c protocolCreator, o int) { protocolList[name] = struct { overhead int new protocolCreator }{overhead: o, new: c}
[ "keep", "keep", "keep", "keep", "replace", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/protocol.go
"github.com/Dreamacro/clash/component/ssr/tools"
<mask> <mask> "github.com/Dreamacro/clash/common/pool" <mask> ) <mask> <mask> type Conn struct { <mask> net.Conn <mask> Protocol </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove // NewConn wraps a stream-oriented net.Conn with protocol decoding/encoding func NewConn(c net.Conn, p Protocol, iv []byte) net.Conn { return &Conn{Conn: c, Protocol: p.initForConn(iv)} } // Conn represents a protocol connection </s> add </s> remove buf []byte offset int </s> add decoded bytes.Buffer </s> remove // NewPacketConn returns a net.NewPacketConn with protocol decoding/encoding func NewPacketConn(pc net.PacketConn, p Protocol) net.PacketConn { return &PacketConn{PacketConn: pc, Protocol: p.initForConn(nil)} } // PacketConn represents a protocol packet connection </s> add </s> remove type authData struct { clientID []byte connectionID uint32 mutex sync.Mutex } type recvInfo struct { recvID uint32 buffer *bytes.Buffer } type hmacMethod func(key []byte, data []byte) []byte type hashDigestMethod func(data []byte) []byte type rndMethod func(dataSize int, random *shift128PlusContext, lastHash []byte, dataSizeList, dataSizeList2 []int, overhead int) int // Protocol provides methods for decoding, encoding and iv setting </s> add
[ "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/stream.go
<mask> <mask> "github.com/Dreamacro/clash/common/pool" <mask> ) <mask> <mask> // NewConn wraps a stream-oriented net.Conn with protocol decoding/encoding <mask> func NewConn(c net.Conn, p Protocol, iv []byte) net.Conn { <mask> return &Conn{Conn: c, Protocol: p.initForConn(iv)} <mask> } <mask> <mask> // Conn represents a protocol connection <mask> type Conn struct { <mask> net.Conn <mask> Protocol <mask> buf []byte <mask> offset int </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove buf []byte offset int </s> add decoded bytes.Buffer </s> remove // NewPacketConn returns a net.NewPacketConn with protocol decoding/encoding func NewPacketConn(pc net.PacketConn, p Protocol) net.PacketConn { return &PacketConn{PacketConn: pc, Protocol: p.initForConn(nil)} } // PacketConn represents a protocol packet connection </s> add </s> remove "github.com/Dreamacro/clash/common/pool" </s> add "github.com/Dreamacro/clash/component/ssr/tools" </s> remove func (a *authSHA1V4) initForConn(iv []byte) Protocol { return &authSHA1V4{ Base: &Base{ IV: iv, Key: a.Key, TCPMss: a.TCPMss, Overhead: a.Overhead, Param: a.Param, }, authData: a.authData, } } func (a *authSHA1V4) GetProtocolOverhead() int { return 7 </s> add func (a *authSHA1V4) StreamConn(c net.Conn, iv []byte) net.Conn { p := &authSHA1V4{Base: a.Base, authData: a.next()} p.iv = iv return &Conn{Conn: c, Protocol: p}
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/stream.go
decoded bytes.Buffer
<mask> // Conn represents a protocol connection <mask> type Conn struct { <mask> net.Conn <mask> Protocol <mask> buf []byte <mask> offset int <mask> underDecoded bytes.Buffer <mask> } <mask> <mask> func (c *Conn) Read(b []byte) (int, error) { <mask> if c.buf != nil { </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove // NewConn wraps a stream-oriented net.Conn with protocol decoding/encoding func NewConn(c net.Conn, p Protocol, iv []byte) net.Conn { return &Conn{Conn: c, Protocol: p.initForConn(iv)} } // Conn represents a protocol connection </s> add </s> remove if c.buf != nil { n := copy(b, c.buf[c.offset:]) c.offset += n if c.offset == len(c.buf) { c.buf = nil } return n, nil </s> add if c.decoded.Len() > 0 { return c.decoded.Read(b) </s> remove // NewPacketConn returns a net.NewPacketConn with protocol decoding/encoding func NewPacketConn(pc net.PacketConn, p Protocol) net.PacketConn { return &PacketConn{PacketConn: pc, Protocol: p.initForConn(nil)} } // PacketConn represents a protocol packet connection </s> add </s> remove c.underDecoded.Reset() return 0, nil } if length == 0 { return 0, nil } c.underDecoded.Next(length) n = copy(b, decoded) if len(decoded) > len(b) { c.buf = decoded c.offset = n </s> add return 0, err </s> remove func (h *httpObfs) Decode(b []byte) ([]byte, bool, error) { if h.firstResponse { idx := bytes.Index(b, []byte("\r\n\r\n")) if idx == -1 { return nil, false, io.EOF </s> add func (c *httpConn) Read(b []byte) (int, error) { if c.buf != nil { n := copy(b, c.buf) if n == len(c.buf) { c.buf = nil } else { c.buf = c.buf[n:]
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/stream.go
if c.decoded.Len() > 0 { return c.decoded.Read(b)
<mask> underDecoded bytes.Buffer <mask> } <mask> <mask> func (c *Conn) Read(b []byte) (int, error) { <mask> if c.buf != nil { <mask> n := copy(b, c.buf[c.offset:]) <mask> c.offset += n <mask> if c.offset == len(c.buf) { <mask> c.buf = nil <mask> } <mask> return n, nil <mask> } <mask> buf := pool.Get(pool.RelayBufferSize) <mask> defer pool.Put(buf) <mask> n, err := c.Conn.Read(buf) <mask> if err != nil { </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove c.underDecoded.Reset() return 0, nil } if length == 0 { return 0, nil } c.underDecoded.Next(length) n = copy(b, decoded) if len(decoded) > len(b) { c.buf = decoded c.offset = n </s> add return 0, err </s> remove if headSize := h.IVSize + h.HeadLen; bSize-headSize > 64 { headData = make([]byte, headSize+rand.Intn(64)) } else { headData = make([]byte, bSize) } copy(headData, b[:len(headData)]) host := h.Host var customHead string </s> add buf := pool.Get(pool.RelayBufferSize) defer pool.Put(buf) n, err := c.Conn.Read(buf) if err != nil { return 0, err } pos := bytes.Index(buf[:n], []byte("\r\n\r\n")) if pos == -1 { return 0, io.EOF } c.hasRecvHeader = true dataLength := n - pos - 4 n = copy(b, buf[4+pos:n]) if dataLength > n { c.buf = append(c.buf, buf[4+pos+n:4+pos+dataLength]...) } return n, nil } </s> remove func (h *httpObfs) Decode(b []byte) ([]byte, bool, error) { if h.firstResponse { idx := bytes.Index(b, []byte("\r\n\r\n")) if idx == -1 { return nil, false, io.EOF </s> add func (c *httpConn) Read(b []byte) (int, error) { if c.buf != nil { n := copy(b, c.buf) if n == len(c.buf) { c.buf = nil } else { c.buf = c.buf[n:] </s> remove encoded, err := c.Encode(b) </s> add bLength := len(b) buf := tools.BufPool.Get().(*bytes.Buffer) defer tools.BufPool.Put(buf) defer buf.Reset() err := c.Encode(buf, b) </s> remove buf []byte offset int </s> add decoded bytes.Buffer
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/stream.go
err = c.Decode(&c.decoded, &c.underDecoded)
<mask> if err != nil { <mask> return 0, err <mask> } <mask> c.underDecoded.Write(buf[:n]) <mask> underDecoded := c.underDecoded.Bytes() <mask> decoded, length, err := c.Decode(underDecoded) <mask> if err != nil { <mask> c.underDecoded.Reset() <mask> return 0, nil <mask> } <mask> if length == 0 { </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove c.underDecoded.Reset() return 0, nil } if length == 0 { return 0, nil } c.underDecoded.Next(length) n = copy(b, decoded) if len(decoded) > len(b) { c.buf = decoded c.offset = n </s> add return 0, err </s> remove bb, length, err := c.DecodePacket(b[:n]) </s> add decoded, err := c.DecodePacket(b[:n]) </s> remove _, err = c.Conn.Write(encoded) </s> add _, err = c.Conn.Write(buf.Bytes()) </s> remove encoded, err := c.Encode(b) </s> add bLength := len(b) buf := tools.BufPool.Get().(*bytes.Buffer) defer tools.BufPool.Put(buf) defer buf.Reset() err := c.Encode(buf, b) </s> remove if c.buf != nil { n := copy(b, c.buf[c.offset:]) c.offset += n if c.offset == len(c.buf) { c.buf = nil } return n, nil </s> add if c.decoded.Len() > 0 { return c.decoded.Read(b)
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/stream.go
return 0, err
<mask> c.underDecoded.Write(buf[:n]) <mask> underDecoded := c.underDecoded.Bytes() <mask> decoded, length, err := c.Decode(underDecoded) <mask> if err != nil { <mask> c.underDecoded.Reset() <mask> return 0, nil <mask> } <mask> if length == 0 { <mask> return 0, nil <mask> } <mask> c.underDecoded.Next(length) <mask> n = copy(b, decoded) <mask> if len(decoded) > len(b) { <mask> c.buf = decoded <mask> c.offset = n <mask> } <mask> return n, nil <mask> } <mask> <mask> func (c *Conn) Write(b []byte) (int, error) { </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove if c.buf != nil { n := copy(b, c.buf[c.offset:]) c.offset += n if c.offset == len(c.buf) { c.buf = nil } return n, nil </s> add if c.decoded.Len() > 0 { return c.decoded.Read(b) </s> remove underDecoded := c.underDecoded.Bytes() decoded, length, err := c.Decode(underDecoded) </s> add err = c.Decode(&c.decoded, &c.underDecoded) </s> remove encoded, err := c.Encode(b) </s> add bLength := len(b) buf := tools.BufPool.Get().(*bytes.Buffer) defer tools.BufPool.Put(buf) defer buf.Reset() err := c.Encode(buf, b) </s> remove if headSize := h.IVSize + h.HeadLen; bSize-headSize > 64 { headData = make([]byte, headSize+rand.Intn(64)) } else { headData = make([]byte, bSize) } copy(headData, b[:len(headData)]) host := h.Host var customHead string </s> add buf := pool.Get(pool.RelayBufferSize) defer pool.Put(buf) n, err := c.Conn.Read(buf) if err != nil { return 0, err } pos := bytes.Index(buf[:n], []byte("\r\n\r\n")) if pos == -1 { return 0, io.EOF } c.hasRecvHeader = true dataLength := n - pos - 4 n = copy(b, buf[4+pos:n]) if dataLength > n { c.buf = append(c.buf, buf[4+pos+n:4+pos+dataLength]...) } return n, nil }
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/stream.go
n, _ = c.decoded.Read(b)
<mask> err = c.Decode(&c.decoded, &c.underDecoded) <mask> if err != nil { <mask> return 0, err <mask> } <mask> return n, nil <mask> } <mask> <mask> func (c *Conn) Write(b []byte) (int, error) { <mask> bLength := len(b) </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove encoded, err := c.Encode(b) </s> add bLength := len(b) buf := tools.BufPool.Get().(*bytes.Buffer) defer tools.BufPool.Put(buf) defer buf.Reset() err := c.Encode(buf, b) </s> remove c.underDecoded.Reset() return 0, nil } if length == 0 { return 0, nil } c.underDecoded.Next(length) n = copy(b, decoded) if len(decoded) > len(b) { c.buf = decoded c.offset = n </s> add return 0, err </s> remove if c.buf != nil { n := copy(b, c.buf[c.offset:]) c.offset += n if c.offset == len(c.buf) { c.buf = nil } return n, nil </s> add if c.decoded.Len() > 0 { return c.decoded.Read(b) </s> remove _, err = c.PacketConn.WriteTo(buf, addr) </s> add _, err = c.PacketConn.WriteTo(buf.Bytes(), addr) </s> remove underDecoded := c.underDecoded.Bytes() decoded, length, err := c.Decode(underDecoded) </s> add err = c.Decode(&c.decoded, &c.underDecoded)
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/stream.go
bLength := len(b) buf := tools.BufPool.Get().(*bytes.Buffer) defer tools.BufPool.Put(buf) defer buf.Reset() err := c.Encode(buf, b)
<mask> return n, nil <mask> } <mask> <mask> func (c *Conn) Write(b []byte) (int, error) { <mask> encoded, err := c.Encode(b) <mask> if err != nil { <mask> return 0, err <mask> } <mask> _, err = c.Conn.Write(encoded) <mask> if err != nil { </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove _, err = c.Conn.Write(encoded) </s> add _, err = c.Conn.Write(buf.Bytes()) </s> remove c.underDecoded.Reset() return 0, nil } if length == 0 { return 0, nil } c.underDecoded.Next(length) n = copy(b, decoded) if len(decoded) > len(b) { c.buf = decoded c.offset = n </s> add return 0, err </s> remove _, err = c.PacketConn.WriteTo(buf, addr) </s> add _, err = c.PacketConn.WriteTo(buf.Bytes(), addr) </s> remove if c.buf != nil { n := copy(b, c.buf[c.offset:]) c.offset += n if c.offset == len(c.buf) { c.buf = nil } return n, nil </s> add if c.decoded.Len() > 0 { return c.decoded.Read(b)
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/stream.go
_, err = c.Conn.Write(buf.Bytes())
<mask> encoded, err := c.Encode(b) <mask> if err != nil { <mask> return 0, err <mask> } <mask> _, err = c.Conn.Write(encoded) <mask> if err != nil { <mask> return 0, err <mask> } <mask> return len(b), nil <mask> } </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove encoded, err := c.Encode(b) </s> add bLength := len(b) buf := tools.BufPool.Get().(*bytes.Buffer) defer tools.BufPool.Put(buf) defer buf.Reset() err := c.Encode(buf, b) </s> remove return len(b), nil </s> add return bLength, nil </s> remove _, err = c.PacketConn.WriteTo(buf, addr) </s> add _, err = c.PacketConn.WriteTo(buf.Bytes(), addr) </s> remove buf := pool.Get(pool.RelayBufferSize) defer pool.Put(buf) buf, err := c.EncodePacket(b) </s> add buf := tools.BufPool.Get().(*bytes.Buffer) defer tools.BufPool.Put(buf) defer buf.Reset() err := c.EncodePacket(buf, b) </s> remove underDecoded := c.underDecoded.Bytes() decoded, length, err := c.Decode(underDecoded) </s> add err = c.Decode(&c.decoded, &c.underDecoded)
[ "keep", "keep", "keep", "keep", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/stream.go
return bLength, nil
<mask> _, err = c.Conn.Write(encoded) <mask> if err != nil { <mask> return 0, err <mask> } <mask> return len(b), nil <mask> } </s> Improve: refactor ssr and fix #995 (#1189) Co-authored-by: goomada <madao@DESKTOP-IOEBS0C.localdomain> </s> remove _, err = c.Conn.Write(encoded) </s> add _, err = c.Conn.Write(buf.Bytes()) </s> remove encoded, err := c.Encode(b) </s> add bLength := len(b) buf := tools.BufPool.Get().(*bytes.Buffer) defer tools.BufPool.Put(buf) defer buf.Reset() err := c.Encode(buf, b) </s> remove _, err = c.PacketConn.WriteTo(buf, addr) </s> add _, err = c.PacketConn.WriteTo(buf.Bytes(), addr) </s> remove buf := pool.Get(pool.RelayBufferSize) defer pool.Put(buf) buf, err := c.EncodePacket(b) </s> add buf := tools.BufPool.Get().(*bytes.Buffer) defer tools.BufPool.Put(buf) defer buf.Reset() err := c.EncodePacket(buf, b) </s> remove func (r *randomHead) Decode(b []byte) ([]byte, bool, error) { if r.firstResponse { r.firstResponse = false return b, true, nil </s> add func (c *randomHeadConn) Write(b []byte) (int, error) { if c.rawTransSent { return c.Conn.Write(b) } c.buf = append(c.buf, b...) if !c.hasSentHeader { c.hasSentHeader = true dataLength := rand.Intn(96) + 4 buf := pool.Get(dataLength + 4) defer pool.Put(buf) rand.Read(buf[:dataLength]) binary.LittleEndian.PutUint32(buf[dataLength:], 0xffffffff-crc32.ChecksumIEEE(buf[:dataLength])) _, err := c.Conn.Write(buf) return len(b), err } if c.rawTransRecv { _, err := c.Conn.Write(c.buf) c.buf = nil c.rawTransSent = true return len(b), err
[ "keep", "keep", "keep", "keep", "replace", "keep" ]
https://github.com/Dreamacro/clash/commit/9eb98e399d3163497e9f341ed0bd008fd3153211
component/ssr/protocol/stream.go
routingMark: int(DefaultRoutingMark.Load()),
<mask> cfg := &option{ <mask> interfaceName: DefaultInterface.Load(), <mask> } <mask> <mask> for _, o := range DefaultOptions { <mask> o(cfg) <mask> } </s> Fix: `routing-mark` should effect on root </s> remove Mode T.TunnelMode `json:"mode"` LogLevel log.LogLevel `json:"log-level"` IPv6 bool `json:"ipv6"` Interface string `json:"-"` </s> add Mode T.TunnelMode `json:"mode"` LogLevel log.LogLevel `json:"log-level"` IPv6 bool `json:"ipv6"` Interface string `json:"-"` RoutingMark int `json:"-"` </s> remove Mode: cfg.Mode, LogLevel: cfg.LogLevel, IPv6: cfg.IPv6, Interface: cfg.Interface, </s> add Mode: cfg.Mode, LogLevel: cfg.LogLevel, IPv6: cfg.IPv6, Interface: cfg.Interface, RoutingMark: cfg.RoutingMark, </s> remove DefaultOptions []Option DefaultInterface = atomic.NewString("") </s> add DefaultOptions []Option DefaultInterface = atomic.NewString("") DefaultRoutingMark = atomic.NewInt32(0)
[ "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/a0221bf897330647f024d4854b053970854ecd7d
component/dialer/dialer.go
routingMark: int(DefaultRoutingMark.Load()),
<mask> <mask> func dialContext(ctx context.Context, network string, destination net.IP, port string, options []Option) (net.Conn, error) { <mask> opt := &option{ <mask> interfaceName: DefaultInterface.Load(), <mask> } <mask> <mask> for _, o := range DefaultOptions { <mask> o(opt) <mask> } <mask> </s> Fix: `routing-mark` should effect on root </s> remove Mode: cfg.Mode, LogLevel: cfg.LogLevel, IPv6: cfg.IPv6, Interface: cfg.Interface, </s> add Mode: cfg.Mode, LogLevel: cfg.LogLevel, IPv6: cfg.IPv6, Interface: cfg.Interface, RoutingMark: cfg.RoutingMark, </s> remove Mode T.TunnelMode `json:"mode"` LogLevel log.LogLevel `json:"log-level"` IPv6 bool `json:"ipv6"` Interface string `json:"-"` </s> add Mode T.TunnelMode `json:"mode"` LogLevel log.LogLevel `json:"log-level"` IPv6 bool `json:"ipv6"` Interface string `json:"-"` RoutingMark int `json:"-"` </s> remove DefaultOptions []Option DefaultInterface = atomic.NewString("") </s> add DefaultOptions []Option DefaultInterface = atomic.NewString("") DefaultRoutingMark = atomic.NewInt32(0)
[ "keep", "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/a0221bf897330647f024d4854b053970854ecd7d
component/dialer/dialer.go
DefaultOptions []Option DefaultInterface = atomic.NewString("") DefaultRoutingMark = atomic.NewInt32(0)
<mask> <mask> import "go.uber.org/atomic" <mask> <mask> var ( <mask> DefaultOptions []Option <mask> DefaultInterface = atomic.NewString("") <mask> ) <mask> <mask> type option struct { <mask> interfaceName string <mask> addrReuse bool </s> Fix: `routing-mark` should effect on root </s> remove Mode T.TunnelMode `json:"mode"` LogLevel log.LogLevel `json:"log-level"` IPv6 bool `json:"ipv6"` Interface string `json:"-"` </s> add Mode T.TunnelMode `json:"mode"` LogLevel log.LogLevel `json:"log-level"` IPv6 bool `json:"ipv6"` Interface string `json:"-"` RoutingMark int `json:"-"` </s> remove Mode: cfg.Mode, LogLevel: cfg.LogLevel, IPv6: cfg.IPv6, Interface: cfg.Interface, </s> add Mode: cfg.Mode, LogLevel: cfg.LogLevel, IPv6: cfg.IPv6, Interface: cfg.Interface, RoutingMark: cfg.RoutingMark,
[ "keep", "keep", "keep", "keep", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/a0221bf897330647f024d4854b053970854ecd7d
component/dialer/options.go
Mode T.TunnelMode `json:"mode"` LogLevel log.LogLevel `json:"log-level"` IPv6 bool `json:"ipv6"` Interface string `json:"-"` RoutingMark int `json:"-"`
<mask> // General config <mask> type General struct { <mask> Inbound <mask> Controller <mask> Mode T.TunnelMode `json:"mode"` <mask> LogLevel log.LogLevel `json:"log-level"` <mask> IPv6 bool `json:"ipv6"` <mask> Interface string `json:"-"` <mask> } <mask> <mask> // Inbound <mask> type Inbound struct { <mask> Port int `json:"port"` </s> Fix: `routing-mark` should effect on root </s> remove DefaultOptions []Option DefaultInterface = atomic.NewString("") </s> add DefaultOptions []Option DefaultInterface = atomic.NewString("") DefaultRoutingMark = atomic.NewInt32(0)
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/a0221bf897330647f024d4854b053970854ecd7d
config/config.go
RoutingMark int `yaml:"routing-mark"`
<mask> ExternalUI string `yaml:"external-ui"` <mask> Secret string `yaml:"secret"` <mask> Interface string `yaml:"interface-name"` <mask> <mask> ProxyProvider map[string]map[string]interface{} `yaml:"proxy-providers"` <mask> Hosts map[string]string `yaml:"hosts"` <mask> DNS RawDNS `yaml:"dns"` <mask> Experimental Experimental `yaml:"experimental"` </s> Fix: `routing-mark` should effect on root </s> remove Mode T.TunnelMode `json:"mode"` LogLevel log.LogLevel `json:"log-level"` IPv6 bool `json:"ipv6"` Interface string `json:"-"` </s> add Mode T.TunnelMode `json:"mode"` LogLevel log.LogLevel `json:"log-level"` IPv6 bool `json:"ipv6"` Interface string `json:"-"` RoutingMark int `json:"-"` </s> remove DefaultOptions []Option DefaultInterface = atomic.NewString("") </s> add DefaultOptions []Option DefaultInterface = atomic.NewString("") DefaultRoutingMark = atomic.NewInt32(0) </s> remove Mode: cfg.Mode, LogLevel: cfg.LogLevel, IPv6: cfg.IPv6, Interface: cfg.Interface, </s> add Mode: cfg.Mode, LogLevel: cfg.LogLevel, IPv6: cfg.IPv6, Interface: cfg.Interface, RoutingMark: cfg.RoutingMark,
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/a0221bf897330647f024d4854b053970854ecd7d
config/config.go
Mode: cfg.Mode, LogLevel: cfg.LogLevel, IPv6: cfg.IPv6, Interface: cfg.Interface, RoutingMark: cfg.RoutingMark,
<mask> ExternalController: cfg.ExternalController, <mask> ExternalUI: cfg.ExternalUI, <mask> Secret: cfg.Secret, <mask> }, <mask> Mode: cfg.Mode, <mask> LogLevel: cfg.LogLevel, <mask> IPv6: cfg.IPv6, <mask> Interface: cfg.Interface, <mask> }, nil <mask> } <mask> <mask> func parseProxies(cfg *RawConfig) (proxies map[string]C.Proxy, providersMap map[string]providerTypes.ProxyProvider, err error) { <mask> proxies = make(map[string]C.Proxy) </s> Fix: `routing-mark` should effect on root </s> remove DefaultOptions []Option DefaultInterface = atomic.NewString("") </s> add DefaultOptions []Option DefaultInterface = atomic.NewString("") DefaultRoutingMark = atomic.NewInt32(0) </s> remove Mode T.TunnelMode `json:"mode"` LogLevel log.LogLevel `json:"log-level"` IPv6 bool `json:"ipv6"` Interface string `json:"-"` </s> add Mode T.TunnelMode `json:"mode"` LogLevel log.LogLevel `json:"log-level"` IPv6 bool `json:"ipv6"` Interface string `json:"-"` RoutingMark int `json:"-"`
[ "keep", "keep", "keep", "keep", "replace", "replace", "replace", "replace", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/a0221bf897330647f024d4854b053970854ecd7d
config/config.go
dialer.DefaultRoutingMark.Store(int32(general.RoutingMark))
<mask> <mask> dialer.DefaultInterface.Store(general.Interface) <mask> <mask> iface.FlushCache() <mask> <mask> if !force { <mask> return </s> Fix: `routing-mark` should effect on root </s> remove Mode T.TunnelMode `json:"mode"` LogLevel log.LogLevel `json:"log-level"` IPv6 bool `json:"ipv6"` Interface string `json:"-"` </s> add Mode T.TunnelMode `json:"mode"` LogLevel log.LogLevel `json:"log-level"` IPv6 bool `json:"ipv6"` Interface string `json:"-"` RoutingMark int `json:"-"` </s> remove DefaultOptions []Option DefaultInterface = atomic.NewString("") </s> add DefaultOptions []Option DefaultInterface = atomic.NewString("") DefaultRoutingMark = atomic.NewInt32(0) </s> remove Mode: cfg.Mode, LogLevel: cfg.LogLevel, IPv6: cfg.IPv6, Interface: cfg.Interface, </s> add Mode: cfg.Mode, LogLevel: cfg.LogLevel, IPv6: cfg.IPv6, Interface: cfg.Interface, RoutingMark: cfg.RoutingMark,
[ "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/a0221bf897330647f024d4854b053970854ecd7d
hub/executor/executor.go
"strings"
<mask> <mask> import ( <mask> "net" <mask> <mask> "github.com/Dreamacro/clash/component/mmdb" <mask> "github.com/Dreamacro/clash/component/trie" <mask> ) <mask> </s> Chore: make geoip match case-insensitive (#1574) </s> remove return record.Country.IsoCode == g.country </s> add return strings.EqualFold(record.Country.IsoCode, g.country) </s> remove if g.country == "LAN" { </s> add if strings.EqualFold(g.country, "LAN") { </s> remove return record.Country.IsoCode != gf.code && !ip.IsPrivate() </s> add return !strings.EqualFold(record.Country.IsoCode, gf.code) && !ip.IsPrivate()
[ "keep", "keep", "add", "keep", "keep", "keep", "keep", "keep" ]
https://github.com/Dreamacro/clash/commit/a20b9a3960658fb2844e5c52200705f1fc5cb90e
dns/filters.go