Commit graph

701 commits

Author SHA1 Message Date
orignal 9c9b723cf5 delete expired ECIESX25519AEADRatchet sessions and tags 2020-02-20 15:44:09 -05:00
orignal f392edd66c single thread SAM by default 2020-02-19 13:27:28 -05:00
orignal 24b48e5d50 reseeds update 2020-02-18 17:45:04 -05:00
orignal 32e2f0b1fa correct termination of streaming destination 2020-02-15 16:30:10 -05:00
orignal 09ed57ad42 select preferred crypto from LeaseSet2 2020-02-12 11:09:20 -05:00
orignal 53a6162b0c generate more receive tags when needed 2020-02-09 17:19:42 -05:00
orignal 694d851cdb Symmetric Key Ratchet 2020-02-08 21:51:02 -05:00
orignal 8e53c30a00 correct calls sequence for tag and index 2020-02-07 22:08:55 -05:00
orignal 012f22cc47 create session tags for ECIESX25519 2020-02-05 15:48:51 -05:00
orignal 9d891ab5dd single thread mode for SAM 2020-02-04 15:31:04 -05:00
orignal d0e78be867 moved io_service away from ClientDestination 2020-02-04 14:17:23 -05:00
orignal cbedebc9dd change minimal MTU size 2020-02-04 13:32:16 -05:00
orignal 969f9aa436 common RuunableBase with private inheritance 2020-02-04 11:48:56 -05:00
orignal b982be5ff5 handle existing session message 2020-02-03 16:21:07 -05:00
orignal 2d154ee640 move RunnableService away from LeaseSetDestination 2020-02-02 18:58:58 -05:00
orignal 49810eb153 common RunnableService 2020-02-02 17:05:30 -05:00
orignal 85b88b8749 second x25519 for new session reply 2020-01-30 19:30:30 -05:00
orignal 239c8b5172 destination delivery instructions 2020-01-30 11:48:32 -05:00
orignal 8c800dc178 save aepk from new session message 2020-01-29 21:57:10 -05:00
orignal cdd068d99a correct message size 2020-01-29 19:27:38 -05:00
orignal 48fa10b080 incoming ECIESX25519AEADRatchet messages hanler 2020-01-29 15:54:11 -05:00
orignal a1dbec0fcb handle new session reply 2020-01-29 12:54:26 -05:00
orignal abe668f1c3 fixed build error 2020-01-28 10:31:35 -05:00
orignal 77440c235d replaced map by unordered_map 2020-01-28 10:03:51 -05:00
orignal fd1ee48dbe datetime and padding blocks 2020-01-23 14:26:40 -05:00
orignal 205e807b66 reset keys 2020-01-22 21:42:30 -05:00
orignal 34295adb05 attach LeaseSet clove 2020-01-22 14:26:47 -05:00
orignal 7c212bef63 add new session to the list after reply received 2020-01-22 11:27:47 -05:00
orignal 76f95644b7 fixed #1461. Use openssl's HKDF for 1.1.1 anf higher 2020-01-22 09:59:08 -05:00
orignal 928b90d5bc fixed #1461. Use openssl's HKDF for 1.1.1 anf higher 2020-01-22 09:50:50 -05:00
orignal 09c6c2a4f3 decode aepk and bepk back 2020-01-21 21:09:19 -05:00
orignal 2b2bd733e9 correct sharedkey for new outgoing session 2020-01-21 19:13:23 -05:00
orignal 0d2d7e5e71 fixed Elligator tests 2020-01-21 17:53:48 -05:00
orignal 6142e93252 session tag for ECIESx25519 sessions 2020-01-21 14:40:23 -05:00
orignal ccec3376ba try another ephemeral keys if elligator encoding failes 2020-01-21 12:19:20 -05:00
orignal f497a74ec4 set random two highest bits 2020-01-21 12:18:31 -05:00
orignal 8b49a55442 ratchet tagsets 2020-01-20 15:17:38 -05:00
Rosen Penev eabcafa516
replace random_shuffle with shuffle
random_shuffle is gone with C++17.

Found and fixed with clang-tidy.
2020-01-19 18:09:04 -08:00
orignal 6cc388c1bc use HKDF for MixKey 2020-01-18 14:43:36 -05:00
orignal 62e39ddfbd new session reply 2020-01-17 14:11:15 -05:00
orignal 80373623cd create payload 2020-01-17 11:21:41 -05:00
orignal 451c3945f0 create new ECIESX25519AEADRatchet session if not found 2020-01-16 19:33:00 -05:00
orignal 00cb15d9b4 fixed tyypo 2020-01-16 18:03:51 -05:00
orignal 67dd59125e new outgoing ECIESX25519AEADRatchet session 2020-01-16 16:34:13 -05:00
orignal b6800dd125 lookup ECIESX25519AEADRatchet session by static key 2020-01-16 15:45:22 -05:00
orignal dc9da69509 derive ECIESX25519AEADRatchetSession from GarlicRoutingSession 2020-01-16 14:59:19 -05:00
orignal d7d964bf57 GarlicRoutingSession/ElGamalAESSession split 2020-01-16 14:31:01 -05:00
orignal bcfe44db54 handle tunnel delivery instructioin for ECIESx25519 2020-01-16 12:47:08 -05:00
orignal 376bf6ba72 correct message size for ECIESx25519 2020-01-15 19:22:42 -05:00
orignal f651baab25 ECIESX25519AEADRatchetSession added 2020-01-15 15:13:43 -05:00
orignal 61752e2aab correct ciphertext length 2020-01-13 22:37:31 -05:00
orignal 4f70822b13 always persist crypto keys for public destinations 2020-01-12 10:03:30 -05:00
orignal 0007f304d0 don't pass from to HandleI2NPMessage 2020-01-07 15:20:55 -05:00
orignal 4afef91359 invoke HandleCloveI2NPMessage 2020-01-06 16:14:41 -05:00
orignal 815b6db0bf HandleCloveI2NPMessage 2020-01-06 15:31:20 -05:00
orignal a335841509 pass msgID to HandleDeliveryStatus 2020-01-06 14:37:40 -05:00
orignal 5337aa10f7 check AES tag first 2020-01-02 13:30:54 -05:00
orignal 9f79bdae9b encryptor for ECIES-X25519-AEAD-Ratchet 2019-12-19 15:59:15 -05:00
orignal db84be2488 use HKDF for NTCP2 key derivation data phase 2019-12-18 20:48:30 -05:00
orignal 599ec62bb0 use HKDF for NTCP2 key derivation data phase 2019-12-18 20:45:47 -05:00
orignal 19a88300c6 decrypt payload section 2019-12-18 14:44:02 -05:00
orignal b5d55e1ffb decrypt flags/static section 2019-12-17 16:34:47 -05:00
orignal 521fb83e38 initial code for ECIES-X25519-AEAD-Ratchet KDF 2019-12-17 16:18:40 -05:00
orignal 553d59c32b decryptor for ECIES-X25519-AEAD-Ratchet 2019-12-11 13:38:36 -05:00
orignal 9ed58e5186 encode with highY 2019-12-10 14:10:12 -05:00
orignal 36eaaa748c handle case when encoded key is (p-1)/2 2019-12-10 13:40:04 -05:00
orignal 5faf84c732 correct conversion from Little Endian 2019-12-10 12:51:39 -05:00
orignal d7b819267f check a for 0 in Legendre 2019-12-10 10:53:39 -05:00
orignal 7417867d0f implemented Legendre 2019-12-10 10:45:08 -05:00
orignal 8d74905257 0.9.44 2019-12-10 10:44:19 -05:00
orignal c38298c06e Elligator decode 2019-12-09 16:11:46 -05:00
orignal 3100d587d1 use d%q 2019-12-09 13:23:17 -05:00
orignal 95df3e4b39 encode key 2019-12-06 20:29:03 -05:00
orignal e6956d9bb0 calculate constants 2019-12-06 14:54:15 -05:00
orignal 2877900233 use 486662 for A 2019-12-05 16:13:59 -05:00
orignal df1aa52e08 Elligator's encode 2019-12-05 16:03:11 -05:00
orignal 5fa2485a7d removed reseed.i2p.net.in 2019-12-04 17:27:16 -05:00
orignal 29f0e10411 Elligator added 2019-12-04 15:37:24 -05:00
orignal 0abb871f3f close socket after if accept failed 2019-11-20 13:00:50 -05:00
orignal 704fca969f handle accept errors 2019-11-20 12:05:32 -05:00
orignal 6cfe4fa580 handle sending errors 2019-11-18 14:13:31 -05:00
orignal 515c086099 Use GetProcAddress for inet_pton. Fixed build error 2019-11-12 15:06:04 -05:00
orignal 34ce06ac17 some cleanup 2019-11-12 14:19:14 -05:00
orignal a104c9881e some cleanup 2019-11-12 11:57:34 -05:00
orignal c3e3c091cc correct implementation of GetMTUWindows for WindowsXP 2019-11-12 11:35:59 -05:00
orignal 651240113c mark RI as unreachable if all connections failed 2019-11-12 10:03:33 -05:00
orignal 77189bf8e9 start over if an active session got disconnected 2019-11-12 09:38:22 -05:00
orignal 60fd3a4542 fixed #1434 use memset inster bzero 2019-11-12 07:17:57 -05:00
orignal c66f9c8d6d reset connection attempts before reconnect 2019-11-12 06:46:08 -05:00
orignal a7e8dd04fe 2.29.0 2019-10-21 11:50:59 -04:00
orignal dfdd76a1bb fixed #1429. Don't use monotonic timer for Win32 2019-10-15 10:32:29 -04:00
orignal c2f47119ce fixed #1424. Check if .b32.i2p address string is valid 2019-09-23 13:42:15 -04:00
orignal d6b1d0d4fb remove incoming session from pending list when established 2019-09-22 21:01:34 -04:00
orignal 03a861745b removed CloseSession 2019-09-20 20:09:25 -04:00
orignal 9a7aed20e9 handle error for SessionConfrimed send 2019-09-19 16:54:23 -04:00
orignal b7f17d4cb1 client auth flag for B33 address 2019-09-06 11:02:19 -04:00
orignal 44a2549b81 2.28.0 2019-08-27 09:46:54 -04:00
orignal e42efec220 correct outet plain text length in case of authKeys 2019-08-26 07:35:11 -04:00
orignal 9d06aa2f6a pass authSalt or epk 2019-08-25 20:51:15 -04:00
orignal 80765a797b correct outer cipher text len 2019-08-25 19:14:53 -04:00