From 8dcadf2736d2634673f8bc725680a43829ceb6b2 Mon Sep 17 00:00:00 2001 From: Sergey Frolov Date: Thu, 21 Jun 2018 12:10:06 -0400 Subject: [PATCH] Bump min Go version to 1.9, gofmt --- .travis.yml | 4 ++-- README.md | 1 + u_parrots.go | 8 ++++---- 3 files changed, 7 insertions(+), 6 deletions(-) diff --git a/.travis.yml b/.travis.yml index 223c5c3..a251342 100644 --- a/.travis.yml +++ b/.travis.yml @@ -1,8 +1,8 @@ language: go go: - - 1.8.x - - 1.9 + - "1.9" + - "1.10.x" sudo: required dist: trusty diff --git a/README.md b/README.md index 1f88513..2512bac 100644 --- a/README.md +++ b/README.md @@ -3,6 +3,7 @@ [![godoc](https://img.shields.io/badge/godoc-reference-blue.svg)](https://godoc.org/github.com/refraction-networking/utls#UConn) --- uTLS is a fork of "crypto/tls", which provides ClientHello fingerprinting resistance, low-level access to handshake, fake session tickets and some other features. Handshake is still performed by "crypto/tls", this library merely changes ClientHello part of it and provides low-level access. +Golang 1.9+ is required. If you have any questions, bug reports or contributions, you are welcome to publish those on GitHub. If you want to do so in private, you can contact one of developers personally via sergey.frolov@colorado.edu # Features ## Low-level access to handshake diff --git a/u_parrots.go b/u_parrots.go index dbc61a3..074ff00 100644 --- a/u_parrots.go +++ b/u_parrots.go @@ -7,13 +7,13 @@ package tls import ( "crypto/rand" "crypto/sha256" + "encoding/binary" "errors" "io" "math/big" "sort" "strconv" "time" - "encoding/binary" ) func initParrots() { @@ -187,10 +187,10 @@ func (uconn *UConn) ApplyPreset(p *ClientHelloSpec) error { return errors.New("tls: short read from Rand: " + err.Error()) } for i := range uconn.greaseSeed { - uconn.greaseSeed[i] = binary.LittleEndian.Uint16(grease_bytes[2*i:2*i +2]) + uconn.greaseSeed[i] = binary.LittleEndian.Uint16(grease_bytes[2*i : 2*i+2]) } - if (uconn.greaseSeed[ssl_grease_extension1] == uconn.greaseSeed[ssl_grease_extension2]) { - uconn.greaseSeed[ssl_grease_extension2] ^= 0x1010; + if uconn.greaseSeed[ssl_grease_extension1] == uconn.greaseSeed[ssl_grease_extension2] { + uconn.greaseSeed[ssl_grease_extension2] ^= 0x1010 } hello.CipherSuites = p.CipherSuites