orignal
c69c4ae8a0
don't publish too fast
2020-11-15 21:46:49 -05:00
orignal
b4369470cb
publish updated RouterInfo
2020-11-15 20:05:27 -05:00
R4SAS
2bd6daeb8d
disable aes/avx for winxp by default
2020-11-16 03:43:54 +03:00
orignal
44ca315c75
don't build tunnels for all pools at the time
2020-11-15 19:38:34 -05:00
orignal
af20b13c7a
create paired inbound tunnels if no inbound tunnels yet
2020-11-15 17:02:01 -05:00
orignal
1f6be38145
wait for publish confirmation or publish to another floodfill
2020-11-15 13:06:02 -05:00
orignal
8b3a7486c7
rename CRYPTO_KEY_TYPE_ECIES_X25519_AEAD_RATCHET to CRYPTO_KEY_TYPE_ECIES_X25519_AEAD
2020-11-14 18:28:50 -05:00
R4SAS
62cd9fffa3
Automate AES-NI and AVX detection on runtime, make it default on x86-based systems ( #1578 )
...
Rework CPU extensions detection code and build with AES-NI and AVX support by default
2020-11-15 01:31:20 +03:00
orignal
7e874eaa7c
pre-calculated h
2020-11-12 15:15:02 -05:00
orignal
1c7780a423
garlic clove block for router
2020-11-09 15:35:50 -05:00
orignal
07b77443dd
don't handle TunnelBuild message for ECIES router
2020-11-07 18:28:38 -05:00
orignal
4ba1be2dc0
one time garlic encryption for ECIES routers
2020-11-05 21:21:46 -05:00
orignal
6362a7bba5
decrypt garlic on ECIES router
2020-11-05 15:27:37 -05:00
orignal
1740715c00
correct reply key and IV for ECIES record
2020-11-04 21:04:28 -05:00
orignal
21501cbf81
correct MixHash after decryption
2020-11-04 13:31:28 -05:00
orignal
d5f3d6111e
correct tunnel build record size to decrept
2020-11-04 11:52:33 -05:00
orignal
bd04f92087
correct public key for ECIES address
2020-11-03 18:41:27 -05:00
orignal
942b2b05e7
correct key for AEAD decryption
2020-11-03 15:53:47 -05:00
orignal
b8064b9b4b
copy noise state
2020-11-03 15:42:53 -05:00
orignal
f94d03465a
don't create transit tunnel if decyrption failed
2020-11-03 15:38:25 -05:00
orignal
4e7aafeec1
send transit tunnel reply for ECIES router
2020-11-03 15:23:13 -05:00
orignal
d820b8036e
correct transient signature length
2020-11-03 09:20:14 -05:00
orignal
3907c17cf5
handle TunnelBuildMessage for ECIES router
2020-11-02 18:49:07 -05:00
orignal
b12fa97a38
32 bytes private key for ECIESx25519
2020-10-29 18:41:21 -04:00
orignal
9f2a2e44a3
common MixHash and MixKey
2020-10-28 21:53:11 -04:00
orignal
c63818f355
2.34.0
2020-10-27 12:27:08 -04:00
orignal
c400372a79
create new ratchets session if previous was not replied
2020-10-27 08:32:38 -04:00
R4SAS
56f3bdd746
[win32] handle WinAPI errors in SSU
...
Windows can throw WinAPI errors which are not handled by boost asio
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-10-27 11:52:02 +03:00
orignal
21d99e355c
MixHash(sepk) added
2020-10-24 15:48:56 -04:00
orignal
ef5495bfb2
padding for x25519 crypto key
2020-10-23 22:14:00 -04:00
orignal
c93ee0d65d
tunnels through ECIES routers
2020-10-23 15:53:22 -04:00
orignal
57d6c7a3b3
Added TunnelConfig.cpp. Removed CryptoWroker.h
2020-10-22 21:06:23 -04:00
orignal
d65a282e9d
check routers with non ElGamal encryptions for lookup, publish and tunnel build
2020-10-22 18:34:15 -04:00
orignal
801ecaa41c
temporary exclude routers with non ElGamal crypto types
2020-10-21 19:03:51 -04:00
orignal
49bf735c22
don't set destination to routers
2020-10-21 18:59:16 -04:00
orignal
387830e07a
encyption type 0,4 by default for client tunnels
2020-10-19 18:26:01 -04:00
orignal
417b5ed6cc
handle SSU v4 and v6 messages in one thread
2020-10-14 21:06:51 -04:00
orignal
acc5592f59
create DH keys for SSU session directly
2020-10-13 21:12:52 -04:00
R4SAS
3f45a11f12
[SSU] handle ICMP responses
...
Windows network stack can forward ICMP to socket and simple deleting of
packet can cause socket death. Same thing can happen on other systems
but without socket death.
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-10-13 15:22:39 +03:00
orignal
e3464add50
don't create new tunnels if offline
2020-10-12 17:15:17 -04:00
R4SAS
18bb4a71c2
fix incorrect chars in variable
...
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-10-12 18:27:25 +03:00
R4SAS
85e9da82b0
[transports] validate IP when trying connect to remote peer for being in reserved IP range
...
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-10-12 14:56:17 +00:00
R4SAS
99d046ca11
[http] handle WebDAV methods
...
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-10-12 07:31:57 +03:00
orignal
ffa0f0afd9
check network status
2020-10-11 17:51:40 -04:00
orignal
e21dac21c8
fixed #1557 . don't try to send empty message
2020-10-11 14:02:12 -04:00
orignal
e2a1cd12c3
don't delete unreachable routers if too few
2020-10-07 21:13:26 -04:00
orignal
d218c9a983
disable ntcpproxy
2020-10-04 10:12:33 -04:00
orignal
c2f13a1496
some cleanup
2020-10-03 22:29:52 -04:00
orignal
faae2709d9
removed NTCP
2020-10-03 21:58:20 -04:00
orignal
a8d23b5439
disable NTCP for good
2020-10-03 18:46:12 -04:00