mirror of
https://github.com/MHSanaei/3x-ui.git
synced 2026-04-16 12:35:54 +00:00
1. **Fixed XPadding Placement Dropdown**: - Added the missing `cookie` and `query` options to `xPaddingPlacement` (`stream_xhttp.html`). - *Why:* Previously, users wanting `cookie` obfuscation were forced to use the `header` placement string. This caused Xray-core to blindly intercept the entire monolithic HTTP Cookie header, failing internal padding-length validations and causing the inbound to silently drop the connection. 2. **Fixed Uplink Data Placement Validation**: - Replaced the unsupported `query` option with `cookie` in `uplinkDataPlacement`. - *Why:* Xray-core's `transport_internet.go` explicitly forbids `query` as an uplink placement option. Selecting it from the UI previously sent a payload that would cause Xray-core to instantly throw an `unsupported uplink data placement: query` panic. Adding `cookie` perfectly aligns the UI with Xray-core restrictions. ### Related Issues - Resolves #3992
38 lines
897 B
Go
38 lines
897 B
Go
package shadowsocks_test
|
|
|
|
import (
|
|
"crypto/rand"
|
|
"testing"
|
|
|
|
"github.com/google/go-cmp/cmp"
|
|
"github.com/xtls/xray-core/common"
|
|
"github.com/xtls/xray-core/common/buf"
|
|
"github.com/xtls/xray-core/proxy/shadowsocks"
|
|
)
|
|
|
|
func TestAEADCipherUDP(t *testing.T) {
|
|
rawAccount := &shadowsocks.Account{
|
|
CipherType: shadowsocks.CipherType_AES_128_GCM,
|
|
Password: "test",
|
|
}
|
|
account, err := rawAccount.AsAccount()
|
|
common.Must(err)
|
|
|
|
cipher := account.(*shadowsocks.MemoryAccount).Cipher
|
|
|
|
key := make([]byte, cipher.KeySize())
|
|
common.Must2(rand.Read(key))
|
|
|
|
payload := make([]byte, 1024)
|
|
common.Must2(rand.Read(payload))
|
|
|
|
b1 := buf.New()
|
|
common.Must2(b1.ReadFullFrom(rand.Reader, cipher.IVSize()))
|
|
common.Must2(b1.Write(payload))
|
|
common.Must(cipher.EncodePacket(key, b1))
|
|
|
|
common.Must(cipher.DecodePacket(key, b1))
|
|
if diff := cmp.Diff(b1.Bytes(), payload); diff != "" {
|
|
t.Error(diff)
|
|
}
|
|
}
|