mirror of
https://github.com/MHSanaei/3x-ui.git
synced 2026-04-16 12:35:54 +00:00
1. **Fixed XPadding Placement Dropdown**: - Added the missing `cookie` and `query` options to `xPaddingPlacement` (`stream_xhttp.html`). - *Why:* Previously, users wanting `cookie` obfuscation were forced to use the `header` placement string. This caused Xray-core to blindly intercept the entire monolithic HTTP Cookie header, failing internal padding-length validations and causing the inbound to silently drop the connection. 2. **Fixed Uplink Data Placement Validation**: - Replaced the unsupported `query` option with `cookie` in `uplinkDataPlacement`. - *Why:* Xray-core's `transport_internet.go` explicitly forbids `query` as an uplink placement option. Selecting it from the UI previously sent a payload that would cause Xray-core to instantly throw an `unsupported uplink data placement: query` panic. Adding `cookie` perfectly aligns the UI with Xray-core restrictions. ### Related Issues - Resolves #3992
38 lines
1.2 KiB
Go
38 lines
1.2 KiB
Go
package crypto
|
|
|
|
import (
|
|
"crypto/aes"
|
|
"crypto/cipher"
|
|
|
|
"github.com/xtls/xray-core/common"
|
|
)
|
|
|
|
// NewAesDecryptionStream creates a new AES encryption stream based on given key and IV.
|
|
// Caller must ensure the length of key and IV is either 16, 24 or 32 bytes.
|
|
func NewAesDecryptionStream(key []byte, iv []byte) cipher.Stream {
|
|
return NewAesStreamMethod(key, iv, cipher.NewCFBDecrypter)
|
|
}
|
|
|
|
// NewAesEncryptionStream creates a new AES description stream based on given key and IV.
|
|
// Caller must ensure the length of key and IV is either 16, 24 or 32 bytes.
|
|
func NewAesEncryptionStream(key []byte, iv []byte) cipher.Stream {
|
|
return NewAesStreamMethod(key, iv, cipher.NewCFBEncrypter)
|
|
}
|
|
|
|
func NewAesStreamMethod(key []byte, iv []byte, f func(cipher.Block, []byte) cipher.Stream) cipher.Stream {
|
|
aesBlock, err := aes.NewCipher(key)
|
|
common.Must(err)
|
|
return f(aesBlock, iv)
|
|
}
|
|
|
|
// NewAesCTRStream creates a stream cipher based on AES-CTR.
|
|
func NewAesCTRStream(key []byte, iv []byte) cipher.Stream {
|
|
return NewAesStreamMethod(key, iv, cipher.NewCTR)
|
|
}
|
|
|
|
// NewAesGcm creates a AEAD cipher based on AES-GCM.
|
|
func NewAesGcm(key []byte) cipher.AEAD {
|
|
block := common.Must2(aes.NewCipher(key))
|
|
aead := common.Must2(cipher.NewGCM(block))
|
|
return aead
|
|
}
|