orignal
ae73e8a305
find SSU2 address with static key if supports both ipv4 and ipv6
2 years ago
R4SAS
a344c09d0d
[util] add inet_ntop for XP
...
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
R4SAS
991e37d0bf
[peertest] fixed ssu2 router exclusion
...
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
R4SAS
fdeb884fe5
fixed getting MTU on windows, add address to log messages with MTU
...
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
orignal
4b1f5c9c9b
terminate session in separate task
2 years ago
orignal
b574aaf99c
fix SSU2 crash on shutdown
2 years ago
orignal
f9106b77bb
add SSU2 introducer if SSU2 only
2 years ago
orignal
a0419e4f34
add SSU2 introducer if SSU2 only
2 years ago
orignal
46a549c875
random size of fragments
2 years ago
orignal
f8a609f692
respond to termination
2 years ago
orignal
987497bb10
don't publish invalid host/port
2 years ago
orignal
e537878b8a
check Ack block bufer size and shrink ranges if necessary
2 years ago
orignal
617f45bc59
try to send I2NP message in one packet, reduce or drop Ack block if necessary
2 years ago
orignal
fe744f8f81
more routine cleanup
2 years ago
orignal
93d879b297
more tunnel brokers ranges
2 years ago
orignal
dbb9295063
set MTU if local address is specified explicitly. update MTU for ipv6 if not set
2 years ago
orignal
09aa96e486
always bring to closing state if termination requested
2 years ago
orignal
4d0047ae7c
request termination for existing session
2 years ago
orignal
b860a4799d
testing cap for published SSU2 address
2 years ago
orignal
6ff64352d3
don't create and oublish duplicates
2 years ago
orignal
3683ec6a95
fixed race condition
2 years ago
orignal
454fa9ee9b
update SSU2 port
2 years ago
orignal
d33aeb4bb2
set unreachable if firewalled. Store router's hash of introducer instead session
2 years ago
R4SAS
5ff34b93c0
print detected MTU
...
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
orignal
2eb929fe05
Merge pull request #1776 from simonvetter/openssl
...
leaseset: add missing bound checks
2 years ago
orignal
ea0ed9e844
update SSU2 introducers if Firewalled
2 years ago
orignal
4a3e481a83
don't publish introducers for non-published SSU2 address
2 years ago
orignal
2197cd8620
add/remove SSU2 introducers to local RouterInfo
2 years ago
orignal
cf0d3b5f61
create new list of SSU2 introducers
2 years ago
orignal
6f7ab49346
moved creation time to TransportSession
2 years ago
orignal
000e0358a7
resend SessionConfirmed immediately if another SessionCreated received
2 years ago
orignal
a3e19931f0
insert RouterInfo from SessionConfirmed into netdb immediately
2 years ago
orignal
9fec1a86cf
send ack for peer test
2 years ago
orignal
ffab29890b
created additional ranges if acnt > 255
2 years ago
orignal
206c068d8e
don't send termination without address
2 years ago
orignal
dc30cd1112
handle SessionConfirmed fragments in reversed order
2 years ago
Simon Vetter
412a245e88
leaseset: add missing bound checks
...
This builds on ChadF's issue and patch (https://github.com/PurpleI2P/i2pd/issues/1772 )
and fixes other potential bound check issues.
2 years ago
orignal
16290bf66f
fixed race condition on session termination
2 years ago
orignal
4f8b0e6484
send more SessionConfirmed termination messages. Limit send queue
2 years ago
orignal
5026dbc1b3
receive bigger packets
2 years ago
orignal
014e4b0e1d
detect MTU for some known ipv6 tunnel brokers
2 years ago
orignal
14a6947b02
round MTU to multiple of 16 for SSU1
2 years ago
orignal
665a914dc3
set max MTU for ipv4
2 years ago
orignal
8feac310af
start initial peer test if SSU2 only
2 years ago
orignal
3394bb4b8d
calculate SSU2 session MTU and max payload size
2 years ago
orignal
1dd2bd0013
publish MTU for ipv6 SSU2 address. Max MTU of 1488 for SSU1
2 years ago
orignal
5c62726992
check clock skew and terminate
2 years ago
orignal
90981f628e
Send fragmented SessionConfirmed
2 years ago
orignal
0c34189d94
correct buffer size for fragments of SessionConfirmed
2 years ago
orignal
f1d3d6a7b5
set max compression for SessionConfirmed
2 years ago
orignal
b0d962b49a
send ack for retransmitted SessionConfirmed
2 years ago
orignal
c50e453af6
check out of sequence messages range
2 years ago
Simon Vetter
3cf809e99d
fix SSU2 introducers selection logic
2 years ago
orignal
8b649aaaf8
NACKs and Acks only Ack ranges
2 years ago
orignal
fdebbc4498
select sessions for introducers
2 years ago
orignal
3ff3417ff2
send termiation with reason
2 years ago
orignal
bb6227281a
teminate session after 5 unacked resends
2 years ago
orignal
2f44d99a74
session closing state
2 years ago
orignal
ca4414d15a
request relay tag if firewalled
2 years ago
orignal
fbb961b43c
extract correct endpoint from peer test msg 2
2 years ago
orignal
fa9c174264
handle first packet from Bob
2 years ago
orignal
83f43ab166
pick 3 routers for SSU2 peer test
2 years ago
orignal
f7e9e6a1c4
set status OK after both peer test msg 4 and 5
2 years ago
orignal
aa21748e9a
set status OK after peer test msg 5
2 years ago
orignal
a2f4e08b00
set testing status for SSU2 peer test
2 years ago
orignal
66bc29d075
insert received RouterInfo into netdb immediately
2 years ago
orignal
3ed625f949
don't try SSU peer test if SSU is disabled
2 years ago
orignal
a1e414c3b7
make SSU2 server eligible for peer test
2 years ago
r4sas
a5a35b1fa6
[daemon] check for SSU2 transport at start
...
Signed-off-by: r4sas <r4sas@i2pmail.org>
2 years ago
orignal
6039cdceb0
correct SSU2 only detection
2 years ago
orignal
473159be0f
don't use port from SSU2 address
2 years ago
orignal
0e6ad548b2
invoke SSU2 peer test updates
2 years ago
orignal
6143515ac6
update our IP adress from SSU2
2 years ago
orignal
50419f200d
fixed 1 packet off for out of sequence clean up
2 years ago
orignal
455390f121
clean up first out of sequence packet if too many
2 years ago
orignal
d375299fa9
send token in relay response block
2 years ago
orignal
28db337166
give priority to SSU2 over SSU
2 years ago
orignal
6ca9a599ff
remove session after HolePunch received
2 years ago
orignal
83bd3b6f0b
use token from RelayResponse block
2 years ago
orignal
a68765e021
fixed off 5 bytes for follow on fragment
2 years ago
orignal
f5ed9129cd
process retry as reponse to relay request
2 years ago
orignal
5e3115a614
check nonce in HolePunch relay response block
2 years ago
orignal
624c46f925
correct msg offset for follow-on fragment
2 years ago
orignal
52d1ee161f
store RouterInfo in netdb from SessionConfirmed
2 years ago
orignal
d3bc9eb110
update token and conn id after HolePunch
2 years ago
orignal
72b61a29c2
check TokenRequest message size
2 years ago
orignal
a99fcfe54f
cleanup terminated sessions
2 years ago
orignal
b5d139f7b2
process session created after session request sent
2 years ago
orignal
463ed12ce8
don't pick same session for PeerTest msg 2
2 years ago
orignal
baf74cb582
1 byte off for RelayRequest signature
2 years ago
orignal
63d7cffefe
Merge branch 'openssl' of https://github.com/PurpleI2P/i2pd into openssl
2 years ago
orignal
d7d74666b2
correct max MTU size
2 years ago
R4SAS
078d76c6f3
fix tabulation, remove long description (to be moved to documentation)
...
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
orignal
3539ee9be6
Merge pull request #1769 from AVAtarMod/sigtstp-patch-1
...
Add SIGTSTP, SIGCONT support
2 years ago
AVAtarMod
437282b148
[config, daemon] catch TSTP, CONT is option
2 years ago
orignal
dd1dd3b7cf
wait for Ack for SessionConfirmed or resend
2 years ago
orignal
ae77d4ad22
correct signed content for peer test msg 3
2 years ago
orignal
821987fed7
don't send peer test for unknown address/port
2 years ago
orignal
18ddba4332
send RouterInfo message to right session in relay request
2 years ago
orignal
aaad6dece6
set session request sent status in right place
2 years ago
orignal
ed04747b9d
resend SessionRequest and SessionCreated
2 years ago
orignal
827a88d772
exclude expired SSU2 introducers
2 years ago
orignal
38e43bc9c8
check Charlie's address for PeerTest msg 4
2 years ago
orignal
c3c5c7ae63
forward correct RelayResponse from Charlie to Alice
2 years ago
orignal
578a15bbe5
don't send PeerTest msg 5 if address is not supported
2 years ago
orignal
6b3d7372ae
token received session state
2 years ago
orignal
55f7529167
delete pending outgoind session when Retry received
2 years ago
orignal
bceae244c1
delete pending outgoind session when SessionCreated received
2 years ago
orignal
5de224d6bf
don't connect if pending connection already
2 years ago
orignal
694b936f30
verify signature for PeerTest msg 4
2 years ago
orignal
dda25d431c
check if we can send HolePunch to partcular address
2 years ago
orignal
22f9abc2f1
send errors for RelayIntro
2 years ago
orignal
c6c3de9164
fixed PeerTest signature verification
2 years ago
orignal
58186f0283
handle PeerTest msg 4 if msg 5 was received before
2 years ago
orignal
0253e2d3f6
different nonce location for PeerTest msg 2 and 4
2 years ago
orignal
ee20d5b804
sign data for PeerTest msg 3 and 5
2 years ago
orignal
b8bc114502
correct source connection id for HolePunch
2 years ago
orignal
74d29770e1
handle unexpected PeerTest message
2 years ago
orignal
e4d5788cdc
correct endianess for PeerTest mesaage connection id
2 years ago
orignal
2a5cf3e4a8
SSU2 connect timer
2 years ago
orignal
c348736058
send updated local RouterInfo for long sessions
2 years ago
orignal
5bb20cb039
token expiration threshold
2 years ago
orignal
dd602a27b5
send RelayResponse rejection message
2 years ago
orignal
2067de162a
show itag for SSU2 sessions
2 years ago
orignal
2cc106b43e
bind SSU2 socket to specified interface
2 years ago
orignal
b15bfd99b3
correct layout for peer test masg 2 and 4
2 years ago
orignal
67252b90b3
generate new token with longer expiration time
2 years ago
orignal
079f7e515c
correct hangling of Ack ranges
2 years ago
orignal
e8c58270c4
Populate router's buffer before sending RouterInfo block
2 years ago
orignal
0c64f278d7
1 byte off for ranges in Ack block
2 years ago
orignal
03518ec94f
fixed typo
2 years ago
orignal
93b5dc2dff
send new token block in SessionCreated
2 years ago
orignal
3bef6383d9
send update local RouterInfo
2 years ago
orignal
17892238a9
update supported transports for SSU2
2 years ago
orignal
b678c989e2
fixed typo
2 years ago
orignal
b72d1237d2
correct values for last ack range
2 years ago
orignal
f7b6db5dad
PeerTest for connection through introducer
2 years ago
orignal
b744a0cc38
correct ack ranges calculation
2 years ago
orignal
b918499f14
correct SSU2 server termination
2 years ago
orignal
2cfd054f2c
publisuh peer test cap for published SSU2 addresses
2 years ago
orignal
dddc7ab039
publisuh peer test cap for published SSU2 addresses
2 years ago
orignal
2e4d8cdc8b
handle PeerTest msg 1
2 years ago
orignal
0640bec026
corect ack count in ranges
2 years ago
orignal
cbcee5fb45
handle peer test messages 4 and 5
2 years ago
orignal
47460d86b2
verify signature and send peer test msg 5
2 years ago
orignal
3cd74f0d4f
send PeerTest message
2 years ago
R4SAS
690c9f7c6f
[FS] add support for windows ProgramData path when running as service
...
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
R4SAS
e2718e5a12
[config] change descriptions for deprecated options
...
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
orignal
d9fefe757e
SSU2/SSU2Session split
2 years ago
orignal
55e4bf6b65
set correct statuc code for peer test
2 years ago
orignal
4670b12d49
correct buffer size for token request
2 years ago
orignal
321ec8ae4d
correct size for Ack block with ranges
2 years ago
orignal
1ccbb8d10b
correct offset for nonce in peer test message
2 years ago
orignal
86c0accdce
check nonce for peer test msg 5
2 years ago
orignal
38d6c29ce9
correct timestamp size for peer test message
2 years ago
orignal
0cf9478cd4
create SSU2 session for peer test msgs 5-7
2 years ago
orignal
a04abd304a
don't send own hash for peer test msg 1
2 years ago
orignal
84aec9fe31
correct msg for first peer test message
2 years ago
orignal
593b9bb6c5
start SSU2 server before peer test
2 years ago
orignal
d3a9cc8fde
check if session is established before sending peer test
2 years ago
orignal
87a434c377
start peer test for SSU2
2 years ago
orignal
56022c9442
handle garlic messages from tunnels without pool
2 years ago
orignal
593d6bf466
create initial peer test
2 years ago
orignal
1d6104ecf3
addressbook.enabled config param
2 years ago
orignal
14da941ff4
Fixed #1761 . Correct section for SSU2
2 years ago
R4SAS
06b87311ea
2.42.1
...
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
orignal
fd7b889a0f
2.42.0
2 years ago
R4SAS
6b4ffcff5a
cleanup code (spaces, tabs)
...
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
R4SAS
d31cd2e5d6
fix incorrect boolean value parsing
...
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
R4SAS
ee6bb40736
remove obsolete msvc define
...
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
orignal
2cd3ebbdb3
copy peer test block
2 years ago
orignal
5e25e30330
check if there is only one unacked packet
2 years ago
orignal
5aa2a8f60f
handle peer tests
2 years ago
orbea
0a1e302e8a
libi2pd: Fix the build with LibreSSL 3.5.2
2 years ago
orignal
bb705a77cf
handle PeerTest message
2 years ago
orignal
cb6155b946
fixed warning
2 years ago
orignal
714d1cc993
close stream if delete requested
2 years ago
orignal
bc8e4494c4
random new profiles cleanup interval
2 years ago
R4SAS
c3a064f980
change int type
...
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
R4SAS
eb3feb7dbd
[profiles] add daily cleanup
...
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
orignal
da3f3ccac9
connect to reachable introducers only
2 years ago
orignal
1a1871e8cd
add RouterInfo block before RelayIntro
2 years ago
orignal
c22ab7e1fc
use openssl's siphash for 3.0.1 and higher
2 years ago
orignal
436992b069
send and process HolePunch message
2 years ago
orignal
18cb3912e5
fixed imccorect termination
2 years ago
R4SAS
3716b6f988
move TunnelHopVisitor inside Tunnel class
...
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
R4SAS
c9e4e78f41
[webconsole] remove version from title, move tunnel chain print from Tunnel class
...
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
orignal
5aebefe73f
connect through introducer
2 years ago
R4SAS
8f2124beab
update reseeds
...
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
orignal
1f5ed89a88
set blinded signature type to RedDSA for EdDSA
2 years ago
orignal
dc82105226
check status code and verify RelayResponse signature
2 years ago
orignal
5221f3ddc9
one SSU2 session per remote router
2 years ago
orignal
e970deb92b
check presense of introducers in SSU2 address
2 years ago
orignal
9db7ec6bb0
create and send RelayRequest
2 years ago
orignal
2e691b6655
check if next manage time is too long
2 years ago
orignal
f22e10537b
fixed typo
2 years ago
orignal
6e532c494c
create new published SSU2 addresses
2 years ago
orignal
f9ed0d4aa2
fixed crash
2 years ago
orignal
78b1afcc8c
publish introducer cap for SSU2 address
2 years ago
orignal
40340cf9c2
handle RelayResponse
2 years ago
orignal
eb6437050f
SSU2 introducers
2 years ago
orignal
45ebfe378b
correct Ack range
2 years ago
R4SAS
1326597226
use ipv6 preference only when netinet headers not used (entware with musl workaround)'
...
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
orignal
751da92c13
send relay response
2 years ago
orignal
e10ca637da
handle RelayIntro
2 years ago
orignal
c5d9d71a8a
create relay tag and relay request block
2 years ago
orignal
3e0f5d231d
send queue after batch of packets
3 years ago
orignal
6990f177ba
window size
3 years ago
orignal
4c91ae0085
check if end of list
3 years ago
orignal
43f74d4d5a
resend packet with new packet number
3 years ago
orignal
8c3e716c3f
ranges in ack block
3 years ago
orignal
05946125b5
handle single packet
3 years ago
orignal
1e2a0a4549
handle incoming packets in batch
3 years ago
orignal
f9d67b28ec
handle fragmented SessionConfirmed
3 years ago
orignal
46b77cc280
increase RouterInfo buffer size
3 years ago
orignal
678a1ae0fb
send fragmented messages
3 years ago
orignal
51cbffd097
don't lookup session for every sinle packet
3 years ago
orignal
207b13dcab
send correct acnt if gaps
3 years ago
orignal
3052dbd1e8
single receive thread for both ipv4 and ipv6
3 years ago
orignal
5891b1ceb2
separate receive thread
3 years ago
orignal
07e14ddda8
check if SSU2 enabled
3 years ago
orignal
db5e90787c
update I2NP header after all fragments received
3 years ago
orignal
67e501f5c7
correct nonce for SessionCorfirmed part 2
3 years ago
orignal
2160001167
correct non for token request and retry encryption
3 years ago
orignal
f5f4150d17
fixed typo
3 years ago
orignal
f5f282af97
cost for published SSU2 address
3 years ago
orignal
82f9585b7a
handle fragments
3 years ago
orignal
eb561bb0c2
handle Ack ranges
3 years ago
orignal
81207999eb
check token in SessionRequest
3 years ago
orignal
2fef595b83
resend packets
3 years ago
orignal
2024e790ca
send I2NP messages
3 years ago
orignal
f9925c7374
hanlde Ack block
3 years ago
orignal
dd774b8dfd
store out of sequence packet numbers
3 years ago
orignal
064b8042a5
ssu2.published and update SSU2 ipv4
3 years ago
orignal
7923ed9567
publish SSU2 address
3 years ago
orignal
30b83414ef
find SSU2 address by address type
3 years ago
orignal
990906c57f
insert garlic tag in destination's thread
3 years ago
orignal
4c323a666a
show SSU2 transports in web console
3 years ago
orignal
a3f165d374
handle and send termination
3 years ago
orignal
7d5f51e357
don't send instant Ack for out-of-sequence message
3 years ago
orignal
371a339b18
encrypt Data header
3 years ago
orignal
7e7aee27b6
handle I2NP message block
3 years ago
orignal
53148fe58f
send Ack packet
3 years ago
orignal
56b6de6962
correct header decryption for Data message
3 years ago
orignal
44735681af
KDF and process Data message
3 years ago
orignal
ee1c4f4fdc
internal numeric id for families
3 years ago
orignal
fb6ecdde1e
handle TokenRequest
3 years ago
orignal
861166d8a9
send TokenRequest message:
3 years ago
R4SAS
70dca81c40
dropped MESHNET build option
...
Dropping MESHNET build option due to lack of usage. That change won't
affect on usage with currently supported Yggdrasil network.
Signed-off-by: R4SAS <r4sas@i2pmail.org>
3 years ago
orignal
2440ffbfc9
handle SSU2 SessionConfirmed
3 years ago
orignal
77c5dde320
send SessionConfirmed
3 years ago
orignal
aa49cad279
correct encrypted payload size for MixHash
3 years ago
orignal
f56ae240ab
don't delete peding endpoint if Retry received
3 years ago
orignal
e871a30a78
initialize connid in constructor
3 years ago
orignal
30e6984889
handle Retry message
3 years ago
orignal
324932c758
separate i and key fields for shared SSU address
3 years ago
orignal
421800bc8f
recognize SSU address supporting SSU2
3 years ago
orignal
87bf5c2418
cleanup pending sessions
3 years ago
orignal
5c9af1c613
MixHash with encrypted payload after decryption
3 years ago
orignal
765e0e5c6b
correct 'i' size for SSU2
3 years ago
orignal
cc296e16dc
don't make SSU2 address published is 'i' is presented
3 years ago
orignal
ab9901525b
separated sockets for ipv4 and ipv6
3 years ago
orignal
3643a46a0c
don't update SSU2 port
3 years ago
orignal
d467e6869d
don't update address for SSU2
3 years ago
orignal
3c5c375f71
connect to SSU2 address
3 years ago
orignal
7473d8c9aa
create and handle Address block
3 years ago
orignal
40c8a1bc1d
handle payload blocks
3 years ago
orignal
7b72d91549
receive incoming SSU2 packets
3 years ago
orignal
b3c2e86436
skip unknown address
3 years ago
orignal
908bdc7624
always publish intro key for SSU2 address
3 years ago
orignal
21c1ec9c8c
enable SSU2 server
3 years ago
orignal
6eba061c2a
show local SSU2 address
3 years ago
orignal
f184f550b9
SSU2 address in config and RouterInfo
3 years ago
orignal
bb7c0fef20
SSU2 address in config and RouterInfo
3 years ago
orignal
5c15a12116
don't allocate buffer from netdb for LocalRouterInfo
3 years ago
orignal
68d015763e
recognize SSU2 addresses
3 years ago
orignal
7faa732f38
send SessionCreated
3 years ago
orignal
11f9eeabf1
inbound.lengthVariance and outbound.lengthVariance
3 years ago
orignal
a152f36894
MixHash for SSU2 long header
3 years ago
orignal
d4ede6ff01
process SessionRequest
3 years ago
orignal
35542d803c
KDF for session request
3 years ago
orignal
f6ba776c12
SSU2 keys
3 years ago
orignal
1511dcb309
store endpoint and send packet
3 years ago
R4SAS
35afa98112
[reseed] add new reseed
...
Signed-off-by: R4SAS <r4sas@i2pmail.org>
3 years ago
orignal
9f1a125ed9
decrypt connID for incoming packet
3 years ago
orignal
0a34f1f3ad
2.41.0
3 years ago
orignal
7bdeaa9611
don't pick own router for peer test
3 years ago
R4SAS
a51ef0cfc6
set of updates:
...
* [webconsole] change error handling code to restart acceptor after any
error
* [webconsole] call shutdown vefore stopping acceptor on exit
* update license headers for modified files, change year to file
creation year, not 2013 (when project started)
Signed-off-by: R4SAS <r4sas@i2pmail.org>
3 years ago
orignal
a92c29e04c
drop routers older than 6 months on start
3 years ago
orignal
510fe43ec4
create and encrypt SessionRequest
3 years ago
R4SAS
73e572b66b
disable thread naming for PowerPC ( #1726 )
...
Signed-off-by: R4SAS <r4sas@i2pmail.org>
3 years ago
R4SAS
90130b5492
fix exception printing
...
Signed-off-by: R4SAS <r4sas@i2pmail.org>
3 years ago
R4SAS
f22faaefeb
remove duplicate definition
...
Signed-off-by: R4SAS <r4sas@i2pmail.org>
3 years ago
R4SAS
ac25649425
cast pthread name to char* for apple sdk
...
Signed-off-by: R4SAS <r4sas@i2pmail.org>
3 years ago
orignal
04388325a8
KDF and encryption for SessionRequest
3 years ago
orignal
61ec873842
fixed incorrect ret code
3 years ago
orignal
ea1f2d4e26
use i for intro key for SSU
3 years ago
orignal
4211c733a2
s and i keys for all addresses
3 years ago
orignal
450266818a
Noise XK for SSU2
3 years ago
orignal
1e019157bb
SSU2 initial commit
3 years ago