Commit graph

1321 commits

Author SHA1 Message Date
orignal 0ab95b1b87 2.35.0 2020-11-30 12:50:15 -05:00
orignal 746f53ba07 use SendBufferQueue for queued messages from I2P 2020-11-29 14:59:34 -05:00
orignal c833b16544 check if session expired before generating more tags 2020-11-26 09:15:45 -05:00
orignal 1c5b350c2b TCP_QUICKACK 2020-11-23 18:55:48 -05:00
orignal 9301e39af7 minimal version for floodfill 0.9.28 2020-11-23 12:49:18 -05:00
R4SAS bc330ff0ea update makefiles, license year
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-11-23 01:46:08 +03:00
orignal c875ff923a random intro key 2020-11-21 18:44:40 -05:00
orignal 3dfb44de31 exclude DSA floodfills 2020-11-21 14:27:08 -05:00
R4SAS 2266c3877c
update reseeds
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-11-21 19:45:06 +03:00
orignal f4486bc075 take intro key from right address 2020-11-20 21:48:33 -05:00
orignal 0436a65baa upddate DSA router keys 2020-11-20 20:31:50 -05:00
orignal d8381e9486 disable encryption to ECIES routers 2020-11-18 18:11:29 -05:00
orignal 3925540517 don't update expired tunnels 2020-11-16 12:56:22 -05:00
orignal 3b630fe546 fixed race condition 2020-11-16 10:04:38 -05:00
orignal c69c4ae8a0 don't publish too fast 2020-11-15 21:46:49 -05:00
orignal b4369470cb publish updated RouterInfo 2020-11-15 20:05:27 -05:00
R4SAS 2bd6daeb8d disable aes/avx for winxp by default 2020-11-16 03:43:54 +03:00
orignal 44ca315c75 don't build tunnels for all pools at the time 2020-11-15 19:38:34 -05:00
orignal af20b13c7a create paired inbound tunnels if no inbound tunnels yet 2020-11-15 17:02:01 -05:00
orignal 1f6be38145 wait for publish confirmation or publish to another floodfill 2020-11-15 13:06:02 -05:00
orignal 8b3a7486c7 rename CRYPTO_KEY_TYPE_ECIES_X25519_AEAD_RATCHET to CRYPTO_KEY_TYPE_ECIES_X25519_AEAD 2020-11-14 18:28:50 -05:00
R4SAS 62cd9fffa3
Automate AES-NI and AVX detection on runtime, make it default on x86-based systems (#1578)
Rework CPU extensions detection code and build with AES-NI and AVX support by default
2020-11-15 01:31:20 +03:00
orignal 7e874eaa7c pre-calculated h 2020-11-12 15:15:02 -05:00
orignal 1c7780a423 garlic clove block for router 2020-11-09 15:35:50 -05:00
orignal 07b77443dd don't handle TunnelBuild message for ECIES router 2020-11-07 18:28:38 -05:00
orignal 4ba1be2dc0 one time garlic encryption for ECIES routers 2020-11-05 21:21:46 -05:00
orignal 6362a7bba5 decrypt garlic on ECIES router 2020-11-05 15:27:37 -05:00
orignal 1740715c00 correct reply key and IV for ECIES record 2020-11-04 21:04:28 -05:00
orignal 21501cbf81 correct MixHash after decryption 2020-11-04 13:31:28 -05:00
orignal d5f3d6111e correct tunnel build record size to decrept 2020-11-04 11:52:33 -05:00
orignal bd04f92087 correct public key for ECIES address 2020-11-03 18:41:27 -05:00
orignal 942b2b05e7 correct key for AEAD decryption 2020-11-03 15:53:47 -05:00
orignal b8064b9b4b copy noise state 2020-11-03 15:42:53 -05:00
orignal f94d03465a don't create transit tunnel if decyrption failed 2020-11-03 15:38:25 -05:00
orignal 4e7aafeec1 send transit tunnel reply for ECIES router 2020-11-03 15:23:13 -05:00
orignal d820b8036e correct transient signature length 2020-11-03 09:20:14 -05:00
orignal 3907c17cf5 handle TunnelBuildMessage for ECIES router 2020-11-02 18:49:07 -05:00
orignal b12fa97a38 32 bytes private key for ECIESx25519 2020-10-29 18:41:21 -04:00
orignal 9f2a2e44a3 common MixHash and MixKey 2020-10-28 21:53:11 -04:00
orignal c63818f355 2.34.0 2020-10-27 12:27:08 -04:00
orignal c400372a79 create new ratchets session if previous was not replied 2020-10-27 08:32:38 -04:00
R4SAS 56f3bdd746
[win32] handle WinAPI errors in SSU
Windows can throw WinAPI errors which are not handled by boost asio

Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-10-27 11:52:02 +03:00
orignal 21d99e355c MixHash(sepk) added 2020-10-24 15:48:56 -04:00
orignal ef5495bfb2 padding for x25519 crypto key 2020-10-23 22:14:00 -04:00
orignal c93ee0d65d tunnels through ECIES routers 2020-10-23 15:53:22 -04:00
orignal 57d6c7a3b3 Added TunnelConfig.cpp. Removed CryptoWroker.h 2020-10-22 21:06:23 -04:00
orignal d65a282e9d check routers with non ElGamal encryptions for lookup, publish and tunnel build 2020-10-22 18:34:15 -04:00
orignal 801ecaa41c temporary exclude routers with non ElGamal crypto types 2020-10-21 19:03:51 -04:00
orignal 49bf735c22 don't set destination to routers 2020-10-21 18:59:16 -04:00
orignal 387830e07a encyption type 0,4 by default for client tunnels 2020-10-19 18:26:01 -04:00
orignal 417b5ed6cc handle SSU v4 and v6 messages in one thread 2020-10-14 21:06:51 -04:00
orignal acc5592f59 create DH keys for SSU session directly 2020-10-13 21:12:52 -04:00
R4SAS 3f45a11f12
[SSU] handle ICMP responses
Windows network stack can forward ICMP to socket and simple deleting of
packet can cause socket death. Same thing can happen on other systems
but without socket death.

Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-10-13 15:22:39 +03:00
orignal e3464add50 don't create new tunnels if offline 2020-10-12 17:15:17 -04:00
R4SAS 18bb4a71c2
fix incorrect chars in variable
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-10-12 18:27:25 +03:00
R4SAS 85e9da82b0 [transports] validate IP when trying connect to remote peer for being in reserved IP range
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-10-12 14:56:17 +00:00
R4SAS 99d046ca11
[http] handle WebDAV methods
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-10-12 07:31:57 +03:00
orignal ffa0f0afd9 check network status 2020-10-11 17:51:40 -04:00
orignal e21dac21c8 fixed #1557. don't try to send empty message 2020-10-11 14:02:12 -04:00
orignal e2a1cd12c3 don't delete unreachable routers if too few 2020-10-07 21:13:26 -04:00
orignal d218c9a983 disable ntcpproxy 2020-10-04 10:12:33 -04:00
orignal c2f13a1496 some cleanup 2020-10-03 22:29:52 -04:00
orignal faae2709d9 removed NTCP 2020-10-03 21:58:20 -04:00
orignal a8d23b5439 disable NTCP for good 2020-10-03 18:46:12 -04:00
orignal 8483464aab don't attach our RouterInfo to router's request 2020-10-03 17:20:04 -04:00
orignal 3a2724ec58 single thread for I2CP 2020-10-02 13:13:27 -04:00
orignal ee84291997 handle i2p.streaming.answerPings properly 2020-09-30 19:06:13 -04:00
orignal fd9229c467 ping/pong for streaming 2020-09-30 17:12:28 -04:00
orignal dec7a9a01c shared transient destination between proxies 2020-09-27 20:50:57 -04:00
orignal 335f9394a5 drop gcc 4.7 support 2020-09-26 19:32:19 -04:00
orignal f939a7b349 reduce variable tunnel build length to 4 2020-09-21 19:22:53 -04:00
orignal 09fdb068d2 Database lookups from ECIES destinations 2020-09-19 21:15:42 -04:00
orignal 024c29b180 eliminate boost/bind 2020-09-17 21:11:46 -04:00
orignal 2b0d1a2190 implement DatabaseLookupTagSet 2020-09-15 19:39:18 -04:00
orignal d0d71c93af set LeaseSet type to 3 for ratchets if not specified 2020-09-10 19:27:29 -04:00
orignal da1e52357f delete symmkey on cleanup 2020-09-08 07:46:55 -04:00
orignal a05a54b38e trim behind ECIESx25519 tags 2020-09-07 18:45:05 -04:00
orignal 954781262c 2.33.0 2020-08-24 12:27:39 -04:00
orignal 3159b06988 reseeds update 2020-08-15 13:53:49 -04:00
orignal e50abbb250 avoid replay upon SSU packet resend 2020-08-08 19:01:55 -04:00
orignal 8e25226574 use unordered_map for incomplete and sent messages 2020-08-08 13:34:27 -04:00
orignal 9636d82b37 MixHash for SessionConfirmed processing 2020-08-03 18:31:03 -04:00
orignal c3aa6b9cda use delivery type local if destination is not secified 2020-07-29 17:47:46 -04:00
orignal c41554109b change datagram routing path if nothing comes back in 10 seconds 2020-07-15 16:20:35 -04:00
orignal 67b94d3533 unordered_map for RouterInfos and LeaseSets 2020-07-07 15:38:20 -04:00
orignal 6f2e6ed887 key for next send ratchet 2020-06-30 15:05:17 -04:00
orignal 5f1e66d64b use pre-calculated x25519 ephemeral keys for ratchets 2020-06-30 13:00:41 -04:00
orignal 1f31fdc257 pre-calculate ephemeral keys for x25519 2020-06-29 20:02:09 -04:00
orignal df9965e129 use unordered_map for peers 2020-06-29 18:19:31 -04:00
orignal 61e9c31f0d don't hold RouterInfo after successive connect 2020-06-24 11:29:54 -04:00
orignal a0b35ebd3e mark NTCP2 unreachable routers 2020-06-22 22:32:18 -04:00
orignal 31494267e5 fixed datagram idle crash 2020-06-17 14:24:25 -04:00
orignal 1e609acb03 keep sending through first successive routing path 2020-06-14 11:16:08 -04:00
orignal 69194118df generate random padding length in bulk 2020-06-13 21:24:16 -04:00
orignal 1a39f7e5c6 GarlicRoutingPath per session 2020-06-13 16:18:12 -04:00
orignal 61897ae16c crypto.ratchet.inboundTags 2020-06-12 20:42:54 -04:00
orignal 5993cc857a start new tunnel message if remining is too small 2020-06-12 16:03:12 -04:00
orignal 44bb8f6f16 allocated datagram I2NP from memory pool 2020-06-10 21:19:37 -04:00
orignal a33cad4b70 eliminate datagram send timer 2020-06-10 11:57:40 -04:00
orignal f077836bf5 store DatagramSession for bulk 2020-06-09 19:20:24 -04:00
orignal 6d7847f2df send bulk datagrams 2020-06-09 16:26:45 -04:00
orignal 6735b2686b set LeaseSet2 for ECIESx25519 2020-06-05 15:41:30 -04:00
orignal 4ae41513ac save new session with NSR tagset 2020-06-04 18:19:38 -04:00
orignal 438a225487 pass calculatePublic 2020-06-03 19:58:36 -04:00
orignal e135696530 support multiple encryption keys through the I2CP 2020-06-03 16:05:19 -04:00
R4SAS 9135772f89
2.32.1
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-06-02 19:26:36 +03:00
orignal 0dc212d97c fixed non-updating LeaseSet1 2020-05-28 13:46:02 -04:00
R4SAS 45e8d5c50e
Return deprecated websocket config options for compatibility
Closes #1523

Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-05-27 21:29:00 +03:00
orignal 37ec90c436 don't gererate more tags for detached session 2020-05-26 16:47:45 -04:00
orignal 0e0169d22b 2.32.0 2020-05-25 08:37:47 -04:00
orignal 1975adc48f print remote peer for queues 2020-05-24 14:14:16 -04:00
orignal 71564f0d10 set default i2cp.leaseSetEncType=0,4 for http and socks proxy for android 2020-05-24 10:30:00 -04:00
orignal 5a32082624 recreate session after 90 seconds incativity 2020-05-23 15:58:11 -04:00
orignal 86e8614934 allow session restart after 2 minutes from creation 2020-05-23 10:20:22 -04:00
orignal ead89c767a compress longer RouterInfo 2020-05-22 18:32:44 -04:00
R4SAS 8bae4975fb add copyright headers
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-05-22 18:14:53 +00:00
R4SAS 7a5146ea74 fix code syle(spaces->tabs, tabulations)
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-05-22 18:14:53 +00:00
orignal 46ee427ee3 common header for repliable datagrams 2020-05-21 21:54:00 -04:00
orignal 0c2b0081b5 rollback 2020-05-21 19:38:25 -04:00
orignal f133a7f9fd resend outstading packets again 2020-05-21 18:58:28 -04:00
orignal 153aaa6d21 no compression for RouterInfo gzip 2020-05-21 15:33:12 -04:00
orignal e5901dad91 resend not more than half of window 2020-05-21 14:52:44 -04:00
orignal bdd75e1171 build client tunnels through router with version >= 0.9.36 2020-05-20 14:59:18 -04:00
orignal 648d035a0f GzipNoCompression for datagrams 2020-05-19 21:02:32 -04:00
orignal 7ebf2f010c shorter padding for optimal packet length 2020-05-19 19:03:12 -04:00
orignal 3db4421aa7 don't invoke gzip for decompression if no compression 2020-05-19 10:48:23 -04:00
orignal 9fb59e128b resubmit updated LeaseSet if not confirmed 2020-05-18 22:31:36 -04:00
orignal c7c6e5917a Streaming MTU size 1812 for ECIESX25519AEADRatchet 2020-05-18 20:45:25 -04:00
orignal 7b418b3adf insert whole message to queue 2020-05-18 17:51:45 -04:00
orignal 1c8d662e30 don't add padding for optimal packet size 2020-05-18 16:42:06 -04:00
orignal d4bfeab36c pass gzip parameter to UDP tunnels 2020-05-18 12:01:13 -04:00
orignal e1b1032df9 reseeds update 2020-05-18 08:29:09 -04:00
orignal 329439d0ae don't copy datagram payload 2020-05-17 16:49:31 -04:00
orignal 0b1cfb2102 send response to recived datagram from ECIESX25519AEADRatchet session 2020-05-16 19:10:17 -04:00
orignal 23be4c01df CreateLeaseSetClove 2020-05-13 18:09:26 -04:00
orignal 86782f3479 eliminate extra buffer allocation for incoming packets 2020-05-12 18:30:04 -04:00
orignal a96c205830 allow encryption type param for encrypted LeaseSet 2020-05-08 14:20:13 -04:00
orignal 9b6facf3b0 fixed crash of encrypted leaseset without authentication 2020-05-06 14:08:54 -04:00
orignal d503190647 fixed crash of encrypted leaseset without authentication 2020-05-06 10:08:01 -04:00
orignal c4d9c03930 handle termination block 2020-05-05 13:01:23 -04:00
orignal d7d70b707f configurable throw function 2020-05-05 11:13:59 -04:00
orignal bb7f03857c ThrowFatal function 2020-05-05 09:35:41 -04:00
orignal 53b43353eb fixed formatting 2020-05-05 08:27:56 -04:00
orignal b197556447 remove dependency from Win32App 2020-05-05 08:11:01 -04:00
R4SAS 42d4781a96
[windows] add binding exceptions messagebox notifications, update exceptions handling code
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-05-05 02:45:25 +03:00
R4SAS 4d48d35ad7
[SSU] handle socket binding errors
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-05-04 18:12:23 +03:00
orignal b7ba8f8e93 precalculate initial h and ck 2020-05-03 13:23:08 -04:00
orignal dff510c181 set best compression for RouterInfo 2020-05-03 09:27:17 -04:00
orignal 1eead0e885 GzipNoCompression witout zlib calls 2020-05-02 21:18:44 -04:00
orignal e301387896 don't calculate checsum for Data message send through ECIESX25519AEADRatchet session 2020-05-02 11:13:40 -04:00
orignal c49e544781 allow longer families 2020-05-01 14:30:56 -04:00
orignal d48db501e0 max payload is always 1730 2020-05-01 07:33:05 -04:00
orignal ec4e17f75c cleanup previous tagsets 2020-04-30 21:27:35 -04:00
orignal 17e69e67b1 create additional tags for NSR tagset 2020-04-30 15:38:15 -04:00
orignal c4f9f7da06 fixed warning 2020-04-30 13:45:26 -04:00
R4SAS f5712c4198
remove not needed initialization for pointer
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-04-30 04:59:05 +03:00
R4SAS 1aa0da3382 [NTCP2] fix socks proxy support
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-04-30 04:47:32 +03:00
orignal 27d69894d4 show ECIESx25519 session and tag on the web console 2020-04-29 20:50:31 -04:00
orignal 627d8cfe69 correct timestamp check for LeaseSet2 2020-04-29 17:11:48 -04:00
orignal 3d9c844dca handle out of order NSR 2020-04-28 22:03:13 -04:00
orignal 65e1871cd7 new tag for each NSR 2020-04-28 18:23:13 -04:00
R4SAS 0a431594f8
[Log] Change default loglevel (closes #1230)
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-04-29 00:56:43 +03:00
orignal 7b22ef4270 create incoming NSR tagset 2020-04-28 14:47:53 -04:00
orignal f77a58b2dc set some ECIESx25519 params 2020-04-27 18:53:02 -04:00
orignal 142a138cfc store previous reverse key 2020-04-27 09:35:02 -04:00
R4SAS e6fdf5ad8d
[Log] create logfile even if loglevel is "none"
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-04-27 13:59:00 +03:00
orignal 50a77fedca removed trivial check 2020-04-26 19:37:00 -04:00
orignal 51e3d5f7bc create next tagset 2020-04-26 19:27:31 -04:00
R4SAS 7f859978dd
[webconsole] Add runtime transit limit changer, fix button CSS
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-04-26 23:45:30 +03:00
orignal d8134e8a21 handle and send next key message without public key 2020-04-25 21:09:03 -04:00
orignal 614d91e0b1 send same next key reponse 2020-04-25 14:45:53 -04:00
orignal 30067fc7d7 handle next key forward 2020-04-24 21:36:08 -04:00
orignal ec29597dbd associate tagset for ECIESx25519 tags 2020-04-24 15:46:02 -04:00
orignal ad211a63f3 check if number of peers to exclude doesn't exceed 512 2020-04-23 15:22:07 -04:00
orignal 6b596bd05f check ECIES flag for encrypted response 2020-04-21 15:14:03 -04:00
orignal 510b85fd23 try ECIESx25519 tag first 2020-04-20 19:37:46 -04:00
orignal e3c8f3fd6f use ack request instead DeliveryStatus for LeaseSet confirmation 2020-04-19 15:00:51 -04:00
orignal f9175db28e store intermediate symmetric keys 2020-04-16 21:30:18 -04:00
orignal f4798d05e7 persist multi encryption keys 2020-04-15 22:04:18 -04:00
orignal a2a0f62135 multi crypto keys in i2cp.leaseSetEncType 2020-04-15 18:01:01 -04:00
orignal d923f0e01b support two encryption keys 2020-04-14 19:12:44 -04:00
orignal 2fc16ee13d indetification of incoming garlic messages 2020-04-13 20:00:19 -04:00
orignal 5e606573b1 2.31.0 2020-04-10 12:57:47 -04:00
orignal b7c206c44b replace by new incoming session 2020-04-09 15:00:38 -04:00
orignal 49c1e47736 correct termination if session already exists 2020-04-08 18:02:12 -04:00
orignal 4e1319d874 handle ECIESFlag in DatabaseLookup at floodfill 2020-04-07 11:40:18 -04:00
R4SAS a9436aa9af drop i2lua
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-04-03 14:31:38 +03:00
orignal aa7750bfd3 keep sending new session reply until first established session message received 2020-04-02 21:48:39 -04:00
orignal 8872d1f389 mutex for m_RemoteIdentity 2020-04-01 09:54:10 -04:00
orignal f21af4068f preferred crypto type for Decrypt 2020-03-31 17:35:51 -04:00
orignal f4ca6bbb52 fixed race with identity verifier 2020-03-30 19:27:10 -04:00
orignal 869d0156ce handle Ack request 2020-03-26 19:03:38 -04:00
orignal fe9ac10f02 generate new tags based on last received index 2020-03-22 21:21:12 -04:00
orignal 6fb80f226a reopen socked and restart receiver on exception 2020-03-22 08:14:20 -04:00
orignal 962c2160c7 set actual LeaseSet2 buffer size 2020-03-20 17:43:37 -04:00
R4SAS 168da33d8b
add comma
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-03-20 18:43:54 +03:00
R4SAS b6b25dc9f3 update log messages
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-03-20 17:51:55 +03:00
orignal 3ca17fdc03 support multiple encryption keys 2020-03-19 18:33:42 -04:00
orignal f3b0e57a54 publish multiple encryption keys 2020-03-18 18:03:03 -04:00
orignal 5da92437a1 set msg type for deliverystatus 2020-03-16 16:41:07 -04:00
orignal b5bc05ac2b delete unconfirmed LeaseSet and DeliveryStatus 2020-03-14 16:35:34 -04:00
orignal 45145fa50a add ECIESX25519AEADRatchet session to delivery status 2020-03-14 09:33:48 -04:00
R4SAS 2f56547d5f
Merge pull request #1477 from PurpleI2P/drop-websockets
drop websockets support
2020-03-11 12:37:38 +00:00
orignal 3c53479864 update LeaseSet for ECIESX25519AEADRatchet sessions 2020-03-08 20:58:59 -04:00
orignal 4adc741de3 send DeliveryStatusMsg for LeaseSet 2020-03-08 18:13:41 -04:00
orignal 64da62dbe6 alsways store latest symmkey 2020-03-07 18:46:40 -05:00
orignal 5eec580727 delete strem from destination upon termination 2020-03-04 18:31:22 -05:00
orignal 1e9a53da3f delete stream by id for HTTP interface 2020-03-04 15:54:09 -05:00
orignal 2d3fad2cdb correct proxy buffers 2020-03-02 16:24:00 -05:00
orignal e969d58689 handle ntcp2.proxy parameter 2020-03-01 15:11:54 -05:00
orignal ae20e3aa95 NTCP2 proxy 2020-03-01 11:24:18 -05:00
unlnown542a 4f0da87a7a add ntcp2proxy support 2020-03-01 14:35:24 +00:00
orignal 2ffe62ba41 [[fallthrough]] if C++17 only 2020-02-29 09:21:50 -05:00
orignal e0cb26bd9e fixed fallthough warning for C++17 2020-02-28 14:15:41 -05:00
orignal 1893127e84 use fold expression if C++17 2020-02-28 14:05:51 -05:00
R4SAS bca0809918
cleanup removed websockets funtions
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-02-28 18:48:43 +03:00
R4SAS 00db527377
drop websockets support
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-02-27 14:58:06 +03:00
orignal 5115c27e72 2.30.0 2020-02-25 11:15:30 -05:00
orignal 91919c6d64 check if both sides are ECIESx25519 2020-02-20 21:07:45 -05:00
orignal 7168738835 check ctx for null 2020-02-20 21:05:07 -05:00
orignal 9c9b723cf5 delete expired ECIESX25519AEADRatchet sessions and tags 2020-02-20 15:44:09 -05:00
orignal f392edd66c single thread SAM by default 2020-02-19 13:27:28 -05:00
orignal 24b48e5d50 reseeds update 2020-02-18 17:45:04 -05:00
orignal 32e2f0b1fa correct termination of streaming destination 2020-02-15 16:30:10 -05:00
orignal 09ed57ad42 select preferred crypto from LeaseSet2 2020-02-12 11:09:20 -05:00
orignal 53a6162b0c generate more receive tags when needed 2020-02-09 17:19:42 -05:00
orignal 694d851cdb Symmetric Key Ratchet 2020-02-08 21:51:02 -05:00
orignal 8e53c30a00 correct calls sequence for tag and index 2020-02-07 22:08:55 -05:00
orignal 012f22cc47 create session tags for ECIESX25519 2020-02-05 15:48:51 -05:00
orignal 9d891ab5dd single thread mode for SAM 2020-02-04 15:31:04 -05:00
orignal d0e78be867 moved io_service away from ClientDestination 2020-02-04 14:17:23 -05:00
orignal cbedebc9dd change minimal MTU size 2020-02-04 13:32:16 -05:00
orignal 969f9aa436 common RuunableBase with private inheritance 2020-02-04 11:48:56 -05:00
orignal b982be5ff5 handle existing session message 2020-02-03 16:21:07 -05:00
orignal 2d154ee640 move RunnableService away from LeaseSetDestination 2020-02-02 18:58:58 -05:00
orignal 49810eb153 common RunnableService 2020-02-02 17:05:30 -05:00
orignal 85b88b8749 second x25519 for new session reply 2020-01-30 19:30:30 -05:00
orignal 239c8b5172 destination delivery instructions 2020-01-30 11:48:32 -05:00
orignal 8c800dc178 save aepk from new session message 2020-01-29 21:57:10 -05:00
orignal cdd068d99a correct message size 2020-01-29 19:27:38 -05:00
orignal 48fa10b080 incoming ECIESX25519AEADRatchet messages hanler 2020-01-29 15:54:11 -05:00
orignal a1dbec0fcb handle new session reply 2020-01-29 12:54:26 -05:00
orignal abe668f1c3 fixed build error 2020-01-28 10:31:35 -05:00
orignal 77440c235d replaced map by unordered_map 2020-01-28 10:03:51 -05:00
orignal fd1ee48dbe datetime and padding blocks 2020-01-23 14:26:40 -05:00
orignal 205e807b66 reset keys 2020-01-22 21:42:30 -05:00
orignal 34295adb05 attach LeaseSet clove 2020-01-22 14:26:47 -05:00
orignal 7c212bef63 add new session to the list after reply received 2020-01-22 11:27:47 -05:00
orignal 76f95644b7 fixed #1461. Use openssl's HKDF for 1.1.1 anf higher 2020-01-22 09:59:08 -05:00
orignal 928b90d5bc fixed #1461. Use openssl's HKDF for 1.1.1 anf higher 2020-01-22 09:50:50 -05:00
orignal 09c6c2a4f3 decode aepk and bepk back 2020-01-21 21:09:19 -05:00
orignal 2b2bd733e9 correct sharedkey for new outgoing session 2020-01-21 19:13:23 -05:00
orignal 0d2d7e5e71 fixed Elligator tests 2020-01-21 17:53:48 -05:00
orignal 6142e93252 session tag for ECIESx25519 sessions 2020-01-21 14:40:23 -05:00
orignal ccec3376ba try another ephemeral keys if elligator encoding failes 2020-01-21 12:19:20 -05:00
orignal f497a74ec4 set random two highest bits 2020-01-21 12:18:31 -05:00
orignal 8b49a55442 ratchet tagsets 2020-01-20 15:17:38 -05:00
Rosen Penev eabcafa516
replace random_shuffle with shuffle
random_shuffle is gone with C++17.

Found and fixed with clang-tidy.
2020-01-19 18:09:04 -08:00
orignal 6cc388c1bc use HKDF for MixKey 2020-01-18 14:43:36 -05:00
orignal 62e39ddfbd new session reply 2020-01-17 14:11:15 -05:00
orignal 80373623cd create payload 2020-01-17 11:21:41 -05:00
orignal 451c3945f0 create new ECIESX25519AEADRatchet session if not found 2020-01-16 19:33:00 -05:00
orignal 00cb15d9b4 fixed tyypo 2020-01-16 18:03:51 -05:00
orignal 67dd59125e new outgoing ECIESX25519AEADRatchet session 2020-01-16 16:34:13 -05:00
orignal b6800dd125 lookup ECIESX25519AEADRatchet session by static key 2020-01-16 15:45:22 -05:00
orignal dc9da69509 derive ECIESX25519AEADRatchetSession from GarlicRoutingSession 2020-01-16 14:59:19 -05:00
orignal d7d964bf57 GarlicRoutingSession/ElGamalAESSession split 2020-01-16 14:31:01 -05:00
orignal bcfe44db54 handle tunnel delivery instructioin for ECIESx25519 2020-01-16 12:47:08 -05:00
orignal 376bf6ba72 correct message size for ECIESx25519 2020-01-15 19:22:42 -05:00
orignal f651baab25 ECIESX25519AEADRatchetSession added 2020-01-15 15:13:43 -05:00
orignal 61752e2aab correct ciphertext length 2020-01-13 22:37:31 -05:00
orignal 4f70822b13 always persist crypto keys for public destinations 2020-01-12 10:03:30 -05:00
orignal 0007f304d0 don't pass from to HandleI2NPMessage 2020-01-07 15:20:55 -05:00
orignal 4afef91359 invoke HandleCloveI2NPMessage 2020-01-06 16:14:41 -05:00
orignal 815b6db0bf HandleCloveI2NPMessage 2020-01-06 15:31:20 -05:00
orignal a335841509 pass msgID to HandleDeliveryStatus 2020-01-06 14:37:40 -05:00
orignal 5337aa10f7 check AES tag first 2020-01-02 13:30:54 -05:00
orignal 9f79bdae9b encryptor for ECIES-X25519-AEAD-Ratchet 2019-12-19 15:59:15 -05:00
orignal db84be2488 use HKDF for NTCP2 key derivation data phase 2019-12-18 20:48:30 -05:00
orignal 599ec62bb0 use HKDF for NTCP2 key derivation data phase 2019-12-18 20:45:47 -05:00
orignal 19a88300c6 decrypt payload section 2019-12-18 14:44:02 -05:00
orignal b5d55e1ffb decrypt flags/static section 2019-12-17 16:34:47 -05:00
orignal 521fb83e38 initial code for ECIES-X25519-AEAD-Ratchet KDF 2019-12-17 16:18:40 -05:00
orignal 553d59c32b decryptor for ECIES-X25519-AEAD-Ratchet 2019-12-11 13:38:36 -05:00
orignal 9ed58e5186 encode with highY 2019-12-10 14:10:12 -05:00
orignal 36eaaa748c handle case when encoded key is (p-1)/2 2019-12-10 13:40:04 -05:00
orignal 5faf84c732 correct conversion from Little Endian 2019-12-10 12:51:39 -05:00
orignal d7b819267f check a for 0 in Legendre 2019-12-10 10:53:39 -05:00
orignal 7417867d0f implemented Legendre 2019-12-10 10:45:08 -05:00
orignal 8d74905257 0.9.44 2019-12-10 10:44:19 -05:00
orignal c38298c06e Elligator decode 2019-12-09 16:11:46 -05:00
orignal 3100d587d1 use d%q 2019-12-09 13:23:17 -05:00
orignal 95df3e4b39 encode key 2019-12-06 20:29:03 -05:00
orignal e6956d9bb0 calculate constants 2019-12-06 14:54:15 -05:00
orignal 2877900233 use 486662 for A 2019-12-05 16:13:59 -05:00
orignal df1aa52e08 Elligator's encode 2019-12-05 16:03:11 -05:00
orignal 5fa2485a7d removed reseed.i2p.net.in 2019-12-04 17:27:16 -05:00
orignal 29f0e10411 Elligator added 2019-12-04 15:37:24 -05:00
orignal 0abb871f3f close socket after if accept failed 2019-11-20 13:00:50 -05:00
orignal 704fca969f handle accept errors 2019-11-20 12:05:32 -05:00
orignal 6cfe4fa580 handle sending errors 2019-11-18 14:13:31 -05:00
orignal 515c086099 Use GetProcAddress for inet_pton. Fixed build error 2019-11-12 15:06:04 -05:00
orignal 34ce06ac17 some cleanup 2019-11-12 14:19:14 -05:00
orignal a104c9881e some cleanup 2019-11-12 11:57:34 -05:00
orignal c3e3c091cc correct implementation of GetMTUWindows for WindowsXP 2019-11-12 11:35:59 -05:00
orignal 651240113c mark RI as unreachable if all connections failed 2019-11-12 10:03:33 -05:00
orignal 77189bf8e9 start over if an active session got disconnected 2019-11-12 09:38:22 -05:00
orignal 60fd3a4542 fixed #1434 use memset inster bzero 2019-11-12 07:17:57 -05:00
orignal c66f9c8d6d reset connection attempts before reconnect 2019-11-12 06:46:08 -05:00
orignal a7e8dd04fe 2.29.0 2019-10-21 11:50:59 -04:00
orignal dfdd76a1bb fixed #1429. Don't use monotonic timer for Win32 2019-10-15 10:32:29 -04:00
orignal c2f47119ce fixed #1424. Check if .b32.i2p address string is valid 2019-09-23 13:42:15 -04:00
orignal d6b1d0d4fb remove incoming session from pending list when established 2019-09-22 21:01:34 -04:00
orignal 03a861745b removed CloseSession 2019-09-20 20:09:25 -04:00
orignal 9a7aed20e9 handle error for SessionConfrimed send 2019-09-19 16:54:23 -04:00
orignal b7f17d4cb1 client auth flag for B33 address 2019-09-06 11:02:19 -04:00
orignal 44a2549b81 2.28.0 2019-08-27 09:46:54 -04:00
orignal e42efec220 correct outet plain text length in case of authKeys 2019-08-26 07:35:11 -04:00
orignal 9d06aa2f6a pass authSalt or epk 2019-08-25 20:51:15 -04:00
orignal 80765a797b correct outer cipher text len 2019-08-25 19:14:53 -04:00
orignal 0b5509a1ed correct authClients offset 2019-08-25 14:54:43 -04:00
orignal 351c899807 cleanup incoming streams on stop 2019-08-23 10:00:49 -04:00
orignal c8cbf425ac check and send netid for NTCP2 and SSU 2019-08-13 14:55:18 -04:00
orignal 3872c2a3f5 use published encrypted instead orig type 2019-08-07 16:18:00 -04:00
orignal e6a09b49c9 published encrypted flag 2019-08-07 15:43:03 -04:00
orignal 254d2b82b3 fixed #1393. store streams by recvStreamID 2019-07-26 14:23:21 -04:00
orignal 97d9795fc9 pass encrepted LeaseSet auth keys 2019-07-16 16:31:17 -04:00
orignal 54071b0e5d set and handle unpublished LeaseSet flag 2019-07-16 11:48:30 -04:00
orignal 925e8316c7 read i2cp.leaseSetAuthType, i2cp.leaseSetClient.dh.nnn and i2cp.leaseSetClient.psk.nnn from tunnel config 2019-07-12 20:58:17 -04:00
orignal 99e1b74023 create encrypted LeaseSet2 with authentication 2019-07-12 15:40:59 -04:00
orignal 7d68ccca53 create encrypted LeaseSet2 with authentication 2019-07-12 15:37:32 -04:00
orignal a090114066 send data message wih raw type fpr raw datagrams 2019-07-10 13:31:49 -04:00
orignal a605e4bab6 send and recieve raw datagrams 2019-07-09 21:33:55 -04:00
orignal 3f0534134d check for malformed b33 2019-07-04 13:05:39 -04:00
orignal 3acfb129cd 2.27.0 2019-07-03 12:38:55 -04:00
orignal 6ccef66920 call shutdown before close 2019-06-26 10:47:16 -04:00
orignal fecc0c4640 don't call destructor twice 2019-06-25 16:37:06 -04:00
orignal 8e919ddc8e use monotonic clock for uptime 2019-06-19 11:43:04 -04:00
orignal 832a9ab6b5 don't set random NTCP2 port if already set 2019-06-18 15:47:58 -04:00
orignal 13732ac333 fix #1363 try connect in SSU's thread 2019-06-14 15:43:03 -04:00
orignal 3e932a55f4 fixed typo 2019-06-11 15:09:10 -04:00
orignal 74e8610ec9 DH auth for encrypted LeaseSet2 2019-06-11 10:40:53 -04:00
orignal f6f45eab39 flood encrypted LeaseSet2 with store hash 2019-06-08 21:23:25 -04:00
orignal 41f4f4713e handle i2cp.leaseSetPrivKey 2019-06-07 14:51:08 -04:00
orignal 213a292fd5 correct offsets for auth data 2019-06-07 11:59:48 -04:00
orignal 1c9e46dbb3 2.26.0 2019-06-07 10:04:57 -04:00
orignal 0a299284f8 correct check for PSK auth 2019-06-06 13:58:31 -04:00
orignal 347a5f7346 pass secret to encrypted LeaseSet2 2019-06-06 12:33:33 -04:00
R4SAS c6a903572c [HTTP] add PROFIND support 2019-06-06 18:07:17 +03:00
orignal 14f0d6d26b extract client auth data 2019-06-05 15:57:20 -04:00
orignal 485f105555 fixed typo 2019-06-04 15:12:19 -04:00
orignal 686c0b776f common blinding code for public and private keys 2019-06-04 14:47:40 -04:00
orignal 828862ea49 store hash for ECDSA blidning 2019-06-03 12:51:57 -04:00
orignal c4dffa4dc8 remove obsolete reseeds 2019-06-01 09:37:02 -04:00
orignal 5e10549543 disable NTCP by default 2019-05-30 19:18:56 -04:00
orignal 685f45bd76 publish/unpublish NTCP2 address depending on network status 2019-05-30 17:52:44 -04:00
orignal 61d84dd4c1 publish/unpublish NTCP2 address depending on network status 2019-05-30 17:48:49 -04:00
orignal 4d10593bb1 publish/unpublish NTCP2 address depending on network status 2019-05-30 16:11:35 -04:00
orignal fbb8903774 correct buffer size for ECDSA blinding 2019-05-30 13:57:43 -04:00
orignal e8cac91bb7 blind ECDSA public key 2019-05-29 15:48:35 -04:00
orignal 8e3d16e9fb update ipv6 addresses from SSU rather than NTCP or NTCP2 2019-05-29 11:36:58 -04:00
orignal 07405e57b9 fixed typo 2019-05-25 14:58:10 -04:00
orignal 354c9187db detect our ipv6 address 2019-05-23 15:59:44 -04:00
orignal af33df3004 common buffer size 2019-05-23 11:49:54 -04:00
orignal 78bfde237f allocate actual RouterInfo's buffer size 2019-05-23 09:34:04 -04:00
orignal 7b9033d678 allocate actual RouterInfo's buffer size 2019-05-23 09:32:07 -04:00
orignal f784cfad46 correct RouterInfo buffer size 2019-05-23 06:56:41 -04:00
orignal e40c139ff1 blind ECDSA private key 2019-05-22 16:15:11 -04:00
orignal 60ec03237e blidning for ECDSA 2019-05-16 15:49:07 -04:00
R4SAS a91641e427 fix #823, reindent code 2019-05-16 09:39:22 +03:00
orignal 743fa745b7 show b33 address for encrypted LeaseSet2 2019-05-14 14:42:10 -04:00
orignal 39400fd381 move key blinding code from LeaseSet.cpp to Blinding.cpp 2019-05-14 11:42:25 -04:00
orignal 5299ac35a6 create NTCP2 ipv6 address 2019-05-13 11:40:08 -04:00
orignal ef76ed394c publish SSU ipv6 address if NTCP if disabled 2019-05-12 13:36:26 -04:00
orignal 1472637de7 skip introducers for non-SSU address 2019-05-11 07:27:34 -04:00
orignal 3b8baa85a3 2.25.0 2019-05-09 10:21:11 -04:00
R4SAS 73921b1024 fix ipv6 fallback address 2019-05-08 00:45:52 +03:00
orignal 5e42947fbd always lookup SSU session if peer's endpoint doesn't match 2019-04-25 12:54:44 -04:00
orignal 1bfb9b02f5 make sure remote endpoint matches stored with 2019-04-24 11:40:58 -04:00
orignal f6199c6c17 print store hash for encrypted LeaseSet 2019-04-20 09:44:16 -04:00
orignal d7e7f06e88 re-request encrypted LeaseSet 2019-04-17 15:53:07 -04:00
orignal 4c4e856a1a ntcp2.addressv6 parameter 2019-04-17 14:40:00 -04:00
orignal 07bbbbaf61 fixed gcc 4.7 build 2019-04-17 12:42:43 -04:00
orignal 3236827781 add/removed NTCP addresses 2019-04-16 21:04:04 -04:00
orignal 0be664cc3d publish NTCP2 address instead NTCP if NTCP is disabled 2019-04-15 16:32:16 -04:00
orignal 6cc6849ccc use published timestamp for blinding 2019-04-12 14:05:07 -04:00
orignal 5d5cd71714 limit expiration by next midnight for encrypted LS2 2019-04-12 11:13:46 -04:00
orignal d248343517 Handle CreateLeaseSet2 I2CP message for encrypted leasesets 2019-04-11 14:06:53 -04:00
orignal 64d800427f allow HTTP headers without value 2019-04-10 15:25:09 -04:00
orignal c4c896a833 publish encrypted LS2 2019-04-10 12:04:19 -04:00
orignal b6b5bb3f75 publish LeaseSet with store hash 2019-04-09 15:36:10 -04:00
orignal 5d69bb7383 correct ecrypted LS2 layout 2019-04-09 10:34:05 -04:00
orignal 76e222079a Merge branch 'openssl' of https://github.com/PurpleI2P/i2pd into openssl 2019-04-09 09:21:47 -04:00
orignal 73abb9278d correct ecrypted LS2 size 2019-04-09 09:21:38 -04:00
orignal 8fd843e7ce
Merge pull request #1334 from rex4539/fix-typos
Fix typos
2019-04-08 17:36:55 -04:00
Dimitris Apostolou 6a497a23d9
Fix typos 2019-04-08 22:22:42 +03:00
orignal 3ac74e1091 create encrypted LS2 2019-04-08 13:27:21 -04:00
orignal ef0fb48f1f blind private keys 2019-04-05 16:03:58 -04:00
orignal ea791309ad moved credential and blinding to BlindedPublicKey 2019-04-02 16:32:18 -04:00
orignal 5b56f4007b counter is always in Little Endian 2019-03-29 18:45:31 -04:00
orignal e2071542bf use 16 bytes iv for chacha20 2019-03-29 16:18:51 -04:00
orignal cdb217b774 always initialize m_Pkey 2019-03-29 13:15:32 -04:00
orignal 3fd9d5f641 save b33 addresses 2019-03-28 16:06:53 -04:00
orignal 00b5fdce03 create stream to blinded dest 2019-03-27 16:04:46 -04:00
orignal ff44bcc489 complete implementation of RedDSA 2019-03-24 18:42:52 -04:00
orignal 3d4d260a34 extract b33 address 2019-03-22 16:04:47 -04:00
orignal 8e4b9da97d pass blinded key instead identity for encrypted LS2 2019-03-22 15:32:13 -04:00
orignal cdfd411df7 2.24.0 2019-03-21 10:58:59 -04:00
orignal aa4bddd6ec common HKDF 2019-03-15 12:25:20 -04:00
orignal 8ec12a1b65 fixed race condition for publishing 2019-03-10 09:22:42 -04:00
orignal 0fbf552e95 lookup and handle encrypted LeaseSet2 2019-03-07 14:52:59 -05:00
orignal 09b1b120d7 update LeaseSet2 if store type changed 2019-03-07 14:51:05 -05:00
orignal 557244bc3f verify blinding key for encrypted LS2 2019-03-07 11:55:47 -05:00
orignal 24c5ed1cff calculate store hash for encrypted LeaseSet2 2019-03-06 16:08:04 -05:00
orignal 32e55ebd0c blind public key for encrypted LeaseSet2 2019-03-05 15:51:24 -05:00
orignal ea3070d02b derivation of subcredentials for LeaseSet2 2019-03-05 12:41:01 -05:00
orignal 9aaba49a9f decrypt and handle Layer 2 of encrypted LeaseSet 2 2019-03-04 15:47:35 -05:00
orignal 9b64be07a9 set chacha20 counter to 1 2019-03-04 15:08:03 -05:00
orignal 560ebcec8d persist.addressbook parameter added 2019-03-01 14:42:20 -05:00
orignal 9b1fe4338b reuse_address for ipv6 acceptor 2019-02-28 16:00:26 -05:00
orignal 9188e3ad3f ChaCha20 decrypt 2019-02-28 13:31:51 -05:00
orignal af65af5be9 H and HKDF for encrypted LeaseSet2 2019-02-27 15:52:47 -05:00
orignal 2f0115c300 handle RedDSA as EdDSA 2019-02-27 13:18:09 -05:00
orignal 0646461342 check published timestamp for LeaseSet2 2019-02-26 16:20:24 -05:00
orignal 846eac29dc filter out unspecified addresses. Check floodfill status change 2019-02-24 18:26:58 -05:00
orignal 0f9e3c5b33 fix crash if public key is null 2019-02-22 13:17:43 -05:00
orignal aa27746982 remove address string 2019-02-22 11:03:31 -05:00
R4SAS d8a4954bf1 [NetDb] check PersistProfiles on load
* tabulation fixes
2019-02-22 18:37:32 +03:00
orignal d40a029dae eliminate extra copy 2019-02-20 12:36:05 -05:00
orignal 96d961c393 correct public key for EdDSA trasient key 2019-02-15 15:03:58 -05:00
orignal 7b6814e32d correct flags 2019-02-14 21:22:49 -05:00
orignal 6fee2d3536 correct options szie 2019-02-14 17:49:23 -05:00
orignal 636fc633d4 send offline signature in streaming 2019-02-14 12:11:25 -05:00
orignal 72a239838e publish offline signature 2019-02-12 14:56:39 -05:00
R4SAS 7d0d421724 [windows] handle unexpected conditions (#1185) 2019-02-12 04:27:09 +03:00
orignal 80ffe13f3e correct offline signature layout 2019-02-08 15:12:51 -05:00
orignal 1eb726c9bb create offline keys 2019-02-08 12:19:51 -05:00
orignal 1fa3ba8b42 read offline info 2019-02-07 16:04:31 -05:00
orignal b6bfd66a49 use identity from LeaseSet 2019-02-06 21:19:44 -05:00
orignal 2cac9b03ff common code for offline signatures 2019-02-06 13:36:03 -05:00
R4SAS f5f4190803 catch error 10045 on stopping SAM acceptor (#1233), fix warning in util 2019-02-06 03:03:37 +03:00
R4SAS a14d554947 fix tray icon disappearing, var type warning, code tabulation 2019-02-06 00:24:01 +03:00
orignal 6d9e5147b5 handle offline signature 2019-02-05 15:32:18 -05:00
R4SAS 9c76368dbc inet_pton for winxp 2019-02-05 14:13:23 +03:00
orignal bd5122c6ea fixed build error 2019-02-01 17:41:12 -05:00
orignal 6643258618 implement Update for LeaseSet2 2019-02-01 12:55:13 -05:00
orignal bc3f02cb6b fix #1290. copy correct size if message didn't fit previous 2019-01-31 16:03:10 -05:00
orignal d848ae332a encryption keys priority 2019-01-30 14:10:40 -05:00
orignal 08ddc98303 initial LeaseSet2 support in I2CP 2019-01-29 11:30:31 -05:00
orignal 22c1ce3ea5 don't pick port 9150 (Tor browser) 2019-01-23 09:53:30 -05:00
orignal 60a282826c 2.23.0 2019-01-21 10:33:22 -05:00
orignal 65c2c7d80b re-create LeaseSet if store type has changed 2019-01-16 19:00:17 -05:00
orignal 468a32a819 check LS2 transient key expires time 2019-01-15 18:56:26 -05:00
orignal b89cf73ae2 correct encryption key type for LS2 2019-01-15 18:41:00 -05:00
orignal 9cf43dea1a handle i2cp.leaseSetEncType 2019-01-15 15:43:21 -05:00
orignal 884cf756ed remove invalid leasesets 2019-01-14 18:37:17 -05:00
orignal 3712749a94 extract timestamp for LS2 2019-01-14 13:49:27 -05:00
orignal 6569c4aa03 actual key size for LS2 2019-01-13 19:17:02 -05:00
orignal d6b2b3c996 take key type for LS2 from identity 2019-01-13 08:34:34 -05:00
orignal 52a6a12a9a correct LS2 creation 2019-01-12 18:25:10 -05:00
orignal e647603dce handle i2cp.leaseSetType parameter 2019-01-11 13:58:02 -05:00
orignal dadf6174ba create standard LS2 2019-01-10 11:52:34 -05:00
orignal 84de7675c4 don't copy LS2 for signature verification 2019-01-10 10:57:57 -05:00
orignal 9504e69598 LocalLeaseSet2 added 2019-01-09 14:51:47 -05:00
orignal 5398b651f7 handle LS2 in destinations 2019-01-09 12:47:47 -05:00
orignal b5596c4596 handle encrypted LS2 2019-01-08 11:26:50 -05:00
orignal 8ca8bc810d take elgamal percomputation from config 2019-01-08 09:23:14 -05:00
Rosen Penev 90f2b2d249 Fix compilation without deprecated OpenSSL APIs 2019-01-06 15:39:24 -08:00
orignal f74b27c58c check if chacha20 and poly1305 is presented in openssl build 2019-01-06 17:43:05 -05:00
orignal e55e15693d update LS2 leases 2019-01-02 15:40:48 -05:00
orignal c54e6bafdb process meta LS2 2019-01-02 14:19:10 -05:00
orignal 2e56c4895d transient key signature verification 2019-01-02 09:43:18 -05:00
orignal bce4224d6e extract and verify LS2 transient key 2019-01-01 17:00:37 -05:00
orignal 812e2814bc read flags from LS2 header 2018-12-31 14:23:48 -05:00
r4sas 7cd17f8e1f build android app with llvm 2018-12-27 03:16:38 +03:00
orignal 6193b06708 LS2 signature verification and store type 2018-12-26 15:27:32 -05:00
orignal 12af68bdb5 initial support of LeaseSet2 2018-12-21 15:00:03 -05:00
orignal 1933e44719 reseeds update 2018-12-17 20:14:12 -05:00
orignal 8a987af244 initialize m_Pkey 2018-12-11 15:14:51 -05:00
orignal 65cbb06080 create ephemeral keys after getting connected 2018-12-07 19:24:46 -05:00
orignal 979ea9c252 removed address resolvers as discontinued 2018-12-07 12:27:06 -05:00
orignal c7af2889fa removed dummy initializer 2018-12-05 14:56:40 -05:00
orignal 5ab3390434 don't create dummy initializer for android 2018-12-05 11:39:48 -05:00
orignal 67f60f1889 set openssl no_config before boost::asio:ssl 2018-12-04 21:20:12 -05:00
orignal 985a468d0f don't read openssl config file 2018-12-04 18:39:49 -05:00
orignal 34dc6fbdc1 check if session is terminated before sending 2018-12-04 16:10:52 -05:00
orignal b57152cc25 common code for padding and sending termination and RouterInfo messages 2018-12-04 15:56:55 -05:00
orignal dc9562e430 padding for termination message 2018-12-04 15:23:43 -05:00
orignal 05689fe183 padding for short messages 2018-12-04 15:00:10 -05:00
orignal 8f6f95211e eliminate extra copy of RouterInfo 2018-12-04 12:56:49 -05:00
orignal f30b6c9e6e const reference to vector of buffers 2018-12-04 12:54:48 -05:00
orignal 12ac7d6a00 enable sending I2NP messages 2018-12-03 18:47:20 -05:00
orignal 10251a6447 fixed typo 2018-12-03 15:54:35 -05:00
orignal 089cbbc20a rollback 2018-12-03 14:51:27 -05:00
orignal 95ab68acd1 don't copy I2NP messages to NTCP2 frame 2018-12-03 14:14:36 -05:00
orignal abc4f6c70b fixed bug with chacha20 encryption of short messages 2018-12-03 13:36:17 -05:00
orignal 8fc3a1f9c9 correct frame size for I2NP msgs 2018-12-03 12:29:24 -05:00
orignal 5c3d0fc02c create I2NP blocks 2018-12-02 17:24:31 -05:00
orignal 7efb47fed4 send NTCP2 frame from I2NP messages 2018-12-02 14:24:39 -05:00
orignal 7692332f0e don't inialize Chacha20 state twice 2018-11-30 21:31:06 -05:00