Commit graph

2061 commits

Author SHA1 Message Date
orignal d4c47d90cb adjust time offset after second time discrepancy 2023-12-30 17:16:28 -05:00
orignal 302af823a3 fixed race condition with openssl 3.2.0 2023-12-30 15:55:53 -05:00
r4sas 816a58f292
2.50.1
Signed-off-by: r4sas <r4sas@i2pmail.org>
2023-12-23 18:13:31 +00:00
orignal 43e130ee34 reinitialize context before each Sign/Verify call to make it working with openssl 3.2 2023-12-19 19:29:08 -05:00
orignal 0e98dd5c70 use fallback EdDSA implementation with openssl 3.2.0 due to regression in EVP_DigestSign (#23075) 2023-12-18 07:40:40 -05:00
orignal 9b82265cd8 2.50.0 2023-12-17 11:07:10 -05:00
orignal c802c2deb0 update yggdrasil ressed address 2023-12-05 15:48:26 -05:00
orignal c215f2e8d1 check router for null pointer 2023-11-23 13:06:50 -05:00
orignal 21259204b1 eliminate send buffer mutex completely 2023-11-14 09:39:36 -05:00
orignal 8d6eb5b6b2 don't lock mutex in AsyncSend 2023-11-13 19:12:07 -05:00
orignal 9632e7ba03 exclude NAT64 ipv6 addresses 2023-11-12 18:32:57 -05:00
orignal 083034fa35 send peer tests with random delays 2023-11-09 21:56:32 -05:00
orignal a3f62e1d71 check actual distance with router to reduce expiration time 2023-10-31 13:20:04 -04:00
orignal 575268d360 reduce expiration time for low bandwidth and far routers 2023-10-30 20:02:48 -04:00
orignal e1b4feb618 correct base64 check 2023-10-30 08:10:17 -04:00
orignal 3286bdb4a7 verify jump link for valid characters 2023-10-29 22:11:38 -04:00
orignal d04b19d77c don't recalculate badwidth if clock was adjusted too much 2023-10-18 18:09:41 -04:00
orignal 04adc14b76 ls@mail.i2p yggdrasil reseed added 2023-10-16 18:46:59 -04:00
orignal 0cc91dd2d2 don't pick too active peer 2023-10-15 08:31:55 -04:00
orignal 606e35eec1 reseed.us.prestium.org reseed added 2023-10-10 12:59:40 -04:00
orignal e926b0392f reseed.is.prestium.org reseed added 2023-10-07 14:22:53 -04:00
orignal efdbe26755 try peer test again if Unknown 2023-09-28 18:40:51 -04:00
hfsfox 0cf656cd76
Add Haiku OS support (#1970) 2023-09-28 22:30:38 +03:00
r4sas fb420bb563
[cpu] more builtin version check changes
Signed-off-by: r4sas <r4sas@i2pmail.org>
2023-09-18 18:12:26 +00:00
r4sas 3da5061426
[cpu] Increase GCC version for use of builtin CPU extensions checker
Signed-off-by: r4sas <r4sas@i2pmail.org>
2023-09-18 17:11:45 +00:00
r4sas 1857f14be8
[cpu] use short defines instead of long checks
Signed-off-by: r4sas <r4sas@i2pmail.org>
2023-09-17 18:33:42 +00:00
orignal df6bb6d9b8 2.49.0 2023-09-17 10:19:57 -04:00
orignal 918aa556ef fixed non-x86 build 2023-09-15 11:37:45 -04:00
r4sas 4ed19c05f6
[cpu] split AES detect for GNU C < 5
Signed-off-by: r4sas <r4sas@i2pmail.org>
2023-09-07 21:20:52 +00:00
r4sas 4a5e16b994
[cpu] tests with preprocessor
Signed-off-by: r4sas <r4sas@i2pmail.org>
2023-09-07 16:56:53 +00:00
r4sas c53ad2012c
[cpu] use cpuid on gcc < 5
Signed-off-by: r4sas <r4sas@i2pmail.org>
2023-09-06 23:30:16 +03:00
R4SAS 7b6aa41ca8
CPU: remove AVX code, switch to __builtin for AES detection (#1959)
* [cpu] remove avx detect and code blocks, try to switch to __builtin
* [cpu] use __builtin_* only on x86 systems
* [cpu] perform check in separate function
* [cpu] set AES definition on MSVC
* update x86 and aes support checks at compile time
* [cmake] update comment about AES on MSVC
2023-08-31 19:52:51 +03:00
orignal c112276eea memory poll for RouterProfile 2023-08-26 10:57:05 -04:00
Chad Fraleigh 662a59d0fd Eliminate additional undefined behavior of bit shifting signed int. 2023-08-16 19:49:18 +00:00
Chad Fraleigh 627b8dca83
Fixed buf offset EVP_EncryptFinal_ex() to include outlen. 2023-08-13 17:08:14 -07:00
orignal 7bcc905f05 exclude SSU1 introducers 2023-08-07 21:28:13 -04:00
orignal 8447822c35 don't publish intrducers with zero tag 2023-08-05 15:25:16 -04:00
Vort 9bac680f2a improve transport session logging 2023-08-05 18:25:01 +03:00
orignal 38795a41cb don't publish introducers with zero iTag 2023-08-05 08:55:06 -04:00
Vort 68f4961f1a separate test status from network status 2023-07-30 15:44:16 +03:00
orignal ae5239de43 remove introducer from RouterInfo after 60 minutes 2023-07-23 07:42:36 -04:00
orignal 2064504cce fixed send keepalive for existing session 2023-07-23 07:17:10 -04:00
orignal 4aa631c33f clear implied list if no more introducers found 2023-07-22 16:51:19 -04:00
orignal d6834d6a9a keep non-published, but not-expired introducers in the introducers list 2023-07-22 15:03:03 -04:00
orignal 413e25f20e don't pick too old session for introducer 2023-07-22 10:13:05 -04:00
orignal b8e19bf5f1 reduced peer test interval and added peer test interval variance 2023-07-22 08:50:49 -04:00
orignal c7efd465fa padding for path response 2023-07-21 18:25:28 -04:00
orignal 6e9a3422e9 correct min size for keepalive 2023-07-21 07:59:09 -04:00
Vort f13cc0b862 allow 0 hops with explicitPeers 2023-07-19 16:43:40 +03:00
orignal 0754255c1f drop incoming session from too old or from future routers 2023-07-17 21:08:26 -04:00
orignal 902899ae24 don't pick completely unreachable peers 2023-07-17 19:49:42 -04:00
orignal c620fc1232 clear unreachable flag upon succesive connect 2023-07-17 18:44:51 -04:00
orignal e7157cf15e don't create paired inbound tunnel if length is different 2023-07-17 17:57:30 -04:00
orignal 8e63f8f333 consider all addresses non published for U and H routers 2023-07-15 17:11:56 -04:00
Vort ea7cf1cf69 fix termination block processing and size check 2023-07-15 18:44:37 +03:00
orignal 17c4038c60 select router with ipv4 for endpoint 2023-07-11 13:16:35 -04:00
orignal 5022a9c610
Merge pull request #1948 from chadf/fuzzing-5
Use offset from Identity::signingKey instead of Identity::certificate for key.
2023-07-10 08:06:47 -04:00
orignal ca8ec6286a
Merge pull request #1947 from chadf/fuzzing-4
Eliminate undefined behavior of bit shifting signed int.
2023-07-10 08:03:10 -04:00
orignal 5142459e12
Merge pull request #1945 from chadf/fuzzing-2
Fixed division by zero due to thread race condition.
2023-07-10 08:01:46 -04:00
Chad Fraleigh c4be5f7fdb
Use offset from Identity::signingKey instead of Identity::certificate for key. 2023-07-09 18:45:30 -07:00
Chad Fraleigh 47dc5591b9
Eliminate undefined behavior of bit shifting signed int. 2023-07-09 15:09:17 -07:00
Chad Fraleigh 2bb48b4546
Fixed crash when Base64ToByteStream() is only given '=' characters. 2023-07-09 13:12:22 -07:00
Chad Fraleigh 638e9b4d7f
Fixed division by zero due to thread race condition. 2023-07-08 17:07:04 -07:00
orignal 13f263b791 correct transport comptibility for OBEP in second attempt 2023-06-30 11:54:55 -04:00
r4sas 03cc6e0524
use uint16_t for ports
Signed-off-by: r4sas <r4sas@i2pmail.org>
2023-06-12 05:10:32 +03:00
orignal 52b2d6c393 2.48.0 2023-06-11 15:44:16 -04:00
orignal bb52056aec correct index for connected transport 2023-06-11 06:48:47 -04:00
r4sas 09f233dbfb
NetDB: ignore LeaseSet store request if not floodfill
Signed-off-by: r4sas <r4sas@i2pmail.org>
2023-06-06 01:00:07 +03:00
r4sas dfe5df29e1
suppress build warnings on windows
Signed-off-by: r4sas <r4sas@i2pmail.org>
2023-05-30 21:05:15 +03:00
orignal 86173400d5 don't drop profile of real router too early 2023-05-29 08:49:45 -04:00
r4sas ae439b5385
SSU2: check if socket is opened before sending data, handle network_reset error
Signed-off-by: r4sas <r4sas@i2pmail.org>
2023-05-27 01:00:19 +03:00
r4sas fdf38f45d9
more debug messages at destinations stop
Signed-off-by: r4sas <r4sas@i2pmail.org>
2023-05-23 00:44:47 +03:00
orignal c984f89dfb don't handle unecnrypted DatabaseSearchReply msg if came throug client tunnel 2023-05-21 18:43:58 -04:00
weko d44be2fd73 fix typo 2023-05-08 15:33:40 +00:00
weko a158647153 refactor TBM hadling 2023-05-08 14:52:48 +00:00
orignal 623c3f4605 check for max number of records in tunnel build and tunnel build reply messages 2023-05-06 18:07:21 -04:00
orignal 8a52295882 make router real upon successive outgoing NTCP2 session. Eliminate static keys table 2023-05-06 16:43:09 -04:00
orignal f2bc2598dc
Merge pull request #1925 from wekoq/openssl
Do not save useless peer profiles
2023-05-06 06:34:59 -04:00
weko 1d8a91c5cc redo no save useless profiles 2023-05-06 08:04:27 +00:00
orignal 3bc56ba423 store 'connected' in 'usage' section 2023-05-06 08:04:27 +00:00
orignal e068a3cf22 store 'connected' in 'usage' section 2023-05-05 19:58:58 -04:00
weko 2e2cbe7803 save profile if has connected 2023-05-05 22:46:48 +00:00
weko 1c1452e06b Merge branch 'openssl' of https://github.com/PurpleI2P/i2pd into openssl 2023-05-05 22:42:46 +00:00
orignal c757b6d020 reset floodfill cap for unknown floodfills 2023-05-05 18:22:11 -04:00
weko 8fcab7b0c1 fix incorrect merge conflict resolve 2023-05-05 21:55:31 +00:00
weko 7646147ed2 save only non-default peer profile 2023-05-05 21:44:54 +00:00
orignal b6de474fda don't include unconfirmed floodfill to the list if we have enough floodfills already 2023-05-05 16:14:54 -04:00
orignal 2f74e670a5 invalidate routers with incorrect family signature 2023-05-04 15:32:19 -04:00
orignal c1168c2aa0 don't catch RouterInfo at OBEP 2023-05-04 09:39:37 -04:00
orignal 1bd6390f78 check if s is x25519 public key 2023-05-04 08:20:38 -04:00
orignal a9e9e14c42
Merge pull request #1921 from contextswap/openssl
limit aes-ni assembly to x86
2023-05-03 12:21:00 -04:00
SidorKozlov 3b13a3f2a1 Configurable minimum successful tunnels 2023-05-03 16:13:03 +02:00
orignal 4ce2ef1d83 make router unreachable if AEAD fails in SessionCreated 2023-05-03 07:43:28 -04:00
contextswap 12d0abda55
[
Signed-off-by: contextswap <ctxswp@proton.me>
2023-05-03 19:10:16 +09:00
contextswap 7418f11651
limit aesni inline asm to x86
Signed-off-by: contextswap <ctxswp@proton.me>
2023-05-03 19:04:16 +09:00
weko dab34e9051 get indent hash directly 2023-05-01 20:08:08 +00:00
weko ec2297ed9d Recognize invalid static key 2023-05-01 19:28:32 +00:00
orignal 7c535159bc static keys table 2023-04-30 20:05:35 -04:00
orignal 2af4a2b58d override reply token only if non-zero 2023-04-28 08:01:02 -04:00
orignal ead6a6dca3 correct parsing of caught RouterInfo at IBGW and OBEP 2023-04-27 21:37:30 -04:00