mirror of
https://github.com/MHSanaei/3x-ui.git
synced 2026-04-16 20:45:50 +00:00
1. **Fixed XPadding Placement Dropdown**: - Added the missing `cookie` and `query` options to `xPaddingPlacement` (`stream_xhttp.html`). - *Why:* Previously, users wanting `cookie` obfuscation were forced to use the `header` placement string. This caused Xray-core to blindly intercept the entire monolithic HTTP Cookie header, failing internal padding-length validations and causing the inbound to silently drop the connection. 2. **Fixed Uplink Data Placement Validation**: - Replaced the unsupported `query` option with `cookie` in `uplinkDataPlacement`. - *Why:* Xray-core's `transport_internet.go` explicitly forbids `query` as an uplink placement option. Selecting it from the UI previously sent a payload that would cause Xray-core to instantly throw an `unsupported uplink data placement: query` panic. Adding `cookie` perfectly aligns the UI with Xray-core restrictions. ### Related Issues - Resolves #3992
33 lines
521 B
Go
33 lines
521 B
Go
package aead
|
|
|
|
import (
|
|
"crypto/hmac"
|
|
"crypto/sha256"
|
|
"hash"
|
|
)
|
|
|
|
type hash2 struct {
|
|
hash.Hash
|
|
}
|
|
|
|
func KDF(key []byte, path ...string) []byte {
|
|
hmacf := hmac.New(sha256.New, []byte(KDFSaltConstVMessAEADKDF))
|
|
|
|
for _, v := range path {
|
|
first := true
|
|
hmacf = hmac.New(func() hash.Hash {
|
|
if first {
|
|
first = false
|
|
return hash2{hmacf}
|
|
}
|
|
return hmacf
|
|
}, []byte(v))
|
|
}
|
|
hmacf.Write(key)
|
|
return hmacf.Sum(nil)
|
|
}
|
|
|
|
func KDF16(key []byte, path ...string) []byte {
|
|
r := KDF(key, path...)
|
|
return r[:16]
|
|
}
|