weko
710a35993d
change some log level to error back
2023-03-31 12:16:32 +00:00
weko
354a04f0f6
Up level for some logs to critical
2023-03-31 11:29:04 +00:00
orignal
55b2f2c625
memory pool for IdentityEx
2023-03-16 21:32:53 -04:00
R4SAS
503f522cc3
[style] clean trailing spaces and tabs
...
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2023-01-03 21:25:19 +03:00
orignal
a902d68669
enable compressible padding
2022-12-12 18:36:29 -05:00
orignal
2b6d9eaa8b
disable compressible padding for now
2022-10-26 13:26:16 -04:00
orignal
b2767304e9
correct padding offset
2022-10-24 18:07:04 -04:00
orignal
3d4d3ce80d
compressable crypto key and padding for routers and destination
2022-10-24 15:12:07 -04:00
R4SAS
6b4ffcff5a
cleanup code (spaces, tabs)
...
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2022-05-20 17:44:29 +00:00
R4SAS
edc0162163
clean line trailing spaces and tabs
...
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2021-11-27 23:30:35 +03:00
R4SAS
94661f697b
[log] update log messages ( closes #1693 )
...
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2021-11-27 22:53:53 +03:00
Simon Vetter
a348e10620
libi2pd: fix undefined behaviour and memory overruns
...
This fixes the following issues (flagged by cppcheck):
[libi2pd/ECIESX25519AEADRatchetSession.cpp:537]: (error) Buffer is accessed out of bounds: m_NSREncodedKey
[libi2pd/Identity.cpp:22]: (error) Buffer is accessed out of bounds: keys.publicKey
[libi2pd/Identity.cpp:22]: (error) Buffer is accessed out of bounds: publicKey
[libi2pd/NetDb.cpp:70] -> [libi2pd/NetDb.cpp:69]: (error) Iterator 'it' used after element has been erased
[libi2pd/SSUData.cpp:186] -> [libi2pd/SSUData.cpp:187]: (warning) Shifting 32-bit value by 63 bits is undefined behaviour.
2021-10-19 22:27:12 +02:00
orignal
ad036de69d
eliminate allocation of m_ExtendedBuffer
2021-09-09 21:19:52 -04:00
R4SAS
7373dae026
[avx] check if c++ target supports AVX ( closes #1600 )
...
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-12-12 09:54:07 +03:00
orignal
8b3a7486c7
rename CRYPTO_KEY_TYPE_ECIES_X25519_AEAD_RATCHET to CRYPTO_KEY_TYPE_ECIES_X25519_AEAD
2020-11-14 18:28:50 -05:00
R4SAS
62cd9fffa3
Automate AES-NI and AVX detection on runtime, make it default on x86-based systems ( #1578 )
...
Rework CPU extensions detection code and build with AES-NI and AVX support by default
2020-11-15 01:31:20 +03:00
orignal
bd04f92087
correct public key for ECIES address
2020-11-03 18:41:27 -05:00
orignal
b12fa97a38
32 bytes private key for ECIESx25519
2020-10-29 18:41:21 -04:00
orignal
ef5495bfb2
padding for x25519 crypto key
2020-10-23 22:14:00 -04:00
R4SAS
8bae4975fb
add copyright headers
...
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-05-22 18:14:53 +00:00
R4SAS
7a5146ea74
fix code syle(spaces->tabs, tabulations)
...
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-05-22 18:14:53 +00:00
orignal
2fc16ee13d
indetification of incoming garlic messages
2020-04-13 20:00:19 -04:00
orignal
f4ca6bbb52
fixed race with identity verifier
2020-03-30 19:27:10 -04:00
orignal
2ffe62ba41
[[fallthrough]] if C++17 only
2020-02-29 09:21:50 -05:00
orignal
e0cb26bd9e
fixed fallthough warning for C++17
2020-02-28 14:15:41 -05:00
orignal
9f79bdae9b
encryptor for ECIES-X25519-AEAD-Ratchet
2019-12-19 15:59:15 -05:00
orignal
553d59c32b
decryptor for ECIES-X25519-AEAD-Ratchet
2019-12-11 13:38:36 -05:00
orignal
ef0fb48f1f
blind private keys
2019-04-05 16:03:58 -04:00
orignal
ff44bcc489
complete implementation of RedDSA
2019-03-24 18:42:52 -04:00
orignal
557244bc3f
verify blinding key for encrypted LS2
2019-03-07 11:55:47 -05:00
orignal
ea3070d02b
derivation of subcredentials for LeaseSet2
2019-03-05 12:41:01 -05:00
orignal
2f0115c300
handle RedDSA as EdDSA
2019-02-27 13:18:09 -05:00
orignal
96d961c393
correct public key for EdDSA trasient key
2019-02-15 15:03:58 -05:00
orignal
80ffe13f3e
correct offline signature layout
2019-02-08 15:12:51 -05:00
orignal
1eb726c9bb
create offline keys
2019-02-08 12:19:51 -05:00
orignal
1fa3ba8b42
read offline info
2019-02-07 16:04:31 -05:00
orignal
5398b651f7
handle LS2 in destinations
2019-01-09 12:47:47 -05:00
orignal
bce4224d6e
extract and verify LS2 transient key
2019-01-01 17:00:37 -05:00
orignal
358cdcf4c4
removed RSA signatures completly
2018-09-21 11:16:38 -04:00
yangfl
dec848f072
use builtin __AVX__ and __AES__ macros and reduce code duplication
2018-06-27 17:32:38 +08:00
yangfl
50ba52756f
fix mixing tabs and spaces
2018-01-13 22:51:02 +08:00
yangfl
46f62e1af9
remove trailing whitespaces
2018-01-06 22:24:03 +08:00
orignal
272090fc8f
don't accept streams from RSA detinations
2017-11-28 11:33:51 -05:00
orignal
ab6bc52a0f
don't create destination with RSA signature
2017-11-28 10:59:11 -05:00
orignal
a21fb17d73
renamed ECIES-P256
2017-11-13 11:50:17 -05:00
orignal
a4ce224cd1
pass correct crypto type to identity
2017-11-09 15:49:27 -05:00
orignal
ab1cd3f5cf
ECIES for GOST R 34.10
2017-11-09 15:01:07 -05:00
orignal
c5f784719d
implement Decrypt for all local destination
2017-11-08 13:49:48 -05:00
orignal
81658d2ff9
generic encryption for RoutingDestination
2017-11-07 15:05:22 -05:00
orignal
efacfced45
CryptoKey added
2017-11-06 13:40:58 -05:00