Jeff Becker
7e1a6236be
if relayed try closer router if we don't have an intro
2020-02-07 14:35:57 -05:00
Jeff
e44449b2d5
Merge pull request #1084 from notlesh/reduce-client-log-output-2020-02-06
...
s/LogInfo/LogDebug/ @ explore message
2020-02-06 16:08:40 -05:00
Stephen Shelton
37e4f26be1
s/LogInfo/LogDebug @ 'signed/verify encrypted introset'
2020-02-06 12:05:43 -07:00
Stephen Shelton
2cade16c0e
s/LogInfo/LogDebug/ @ 'updating SN list'
2020-02-06 12:03:06 -07:00
Stephen Shelton
bc3184a126
s/LogInfo/LogDebug/ @ explore message
2020-02-06 11:57:39 -07:00
Jeff Becker
499e346da6
notify delivery of path builds
2020-02-06 12:12:39 -05:00
Jeff
8230b1152e
Merge pull request #1072 from majestrate/2020-01-25-router-version
...
add router version
2020-02-04 17:40:46 -05:00
Jeff Becker
e6174efa21
don't derive x25519 key from ed25519 key
2020-02-03 17:21:31 -05:00
Jeff
c122b460e1
Merge pull request #1075 from jagerman/dht-blinding
...
Dht blinding
2020-02-03 16:44:25 -05:00
Jason Rhinelander
8cd95c01b3
Abstract signing hash data location
...
This makes the interface a little cleaner by not requiring the class
user to know how we laid out the data in the object.
2020-02-02 16:38:48 -04:00
Jason Rhinelander
739ce92aeb
Remove unused ristretto includes
2020-02-01 12:44:31 -04:00
Jeff Becker
ee752c00e6
make format
2020-02-01 10:28:10 -05:00
Jeff Becker
c014d21f84
use std::shared_ptr not a bare pointer to prevent memleak
2020-02-01 09:31:53 -05:00
Stephen Shelton
5631983716
Make format
2020-01-31 14:52:59 -07:00
Stephen Shelton
8921125924
Fix buffer overflow when version encodes too many integers
2020-01-31 14:48:00 -07:00
Jason Rhinelander
f1171ed7a2
make format 😠 🤮
2020-01-31 17:05:50 -04:00
Jason Rhinelander
46f3459b79
Fixed EncryptedIntroSet signing to use PrivateKey
...
We can generate both root and derived signatures from a PrivateKey, but
only root from a SecretKey, so just change it to use a PrivateKey.
2020-01-31 16:47:25 -04:00
Jason Rhinelander
cd8f26deff
Use hash instead of random for signing hash data
...
This makes PrivateKey store both the key followed by the hash. For
PrivateKeys based on SecretKeys this just means the second half of the
SHA-512 of the seed, and makes a PrivateKey constructed from a SecretKey
give an identical signature to signing directly with sodium.
For derived keys we use a ShortHash of the root key's signing hash
concatenated with the publicly known hash value, so that our derived key
signing hash will be different from the root signing hash and also
different for different derivation parameters.
This also changed one of the asserts in crypto_noop, but upon closer
inspection the copying of the secret key into the signature seems really
wrong, so just changed them to fill with 0s.
2020-01-31 16:47:25 -04:00
Jason Rhinelander
fe8a72750a
Silence unused parameter warning
2020-01-31 16:47:25 -04:00
Stephen Shelton
cfabe72587
Fix RouterVersion::IsEmpty() and RouterVersion::Clear()
2020-01-31 13:31:00 -07:00
Stephen Shelton
f0571a9f2c
Fix IsCompatableWith() logic WRT emptyRouterVersion, add unit tests
2020-01-31 13:23:48 -07:00
Thomas Winget
afd87eedb4
NO CLAMPS YOU IDIOT!!!
2020-01-31 12:05:27 -04:00
Thomas Winget
a487982c49
initial implementation of blinded sign -- not working yet
2020-01-31 12:05:20 -04:00
Jason Rhinelander
f7cd10a82e
Fix Recalculate()
...
Recalculate did what should have been the right thing but wasn't because
of libsodium's mislabelling the "seed" as the secret key.
2020-01-30 12:38:39 -04:00
Jason Rhinelander
860c5efd47
Derived key fixes
...
The reason things weren't working here is because libsodium does
something completely unintuitive and called the seed the "secret key"
when it isn't, it's the seed.
This adds a new PrivateKey class (alongside the existing SecretKey and
PubKey) that holds just a private key value but no seed -- which we need
to do because there is no way we can get a seed after calculating a
derived keypair.
With these changes, we now generate exactly the same keys and subkeys as
Tor (and a new test case uses values generated in Tor to verify this).
This is incomplete -- the subkey signing code is still not implemented;
it has to be adapted to create a signature from a PrivateKey rather than
a SecretKey which will probably requiring working around/reimplementing
some of what libsodium does for creating a signature since it expects
"secret keys" i.e. the seed.
2020-01-30 12:34:05 -04:00
Jeff Becker
0f13591802
does not work
2020-01-28 16:55:36 -05:00
Jeff Becker
99eb7726ff
initial dht key blinding
2020-01-27 16:30:41 -05:00
Jeff Becker
1543284f6b
make it compile
2020-01-27 11:56:07 -05:00
Jeff Becker
4f81b913ef
make router version member optional on serialization
2020-01-27 11:55:19 -05:00
Jeff Becker
9efd796145
initial wack at 0.7.0 dht fixes
2020-01-27 11:54:51 -05:00
jeff
f6813717b5
Merge branch '2020-01-25-router-version' of ssh://github.com/majestrate/loki-network into 2020-01-25-router-version
2020-01-25 14:05:35 -05:00
jeff
898c98b170
use double braces
2020-01-25 14:04:21 -05:00
Jeff Becker
bb6dce486f
don't use a pointer
2020-01-25 12:41:34 -05:00
Jeff Becker
8c82bfe5bf
operator !=
2020-01-25 12:39:00 -05:00
Jeff Becker
03c13f4261
make it compile
2020-01-25 12:38:12 -05:00
jeff
816070be62
dont inherit std::array
2020-01-25 12:21:28 -05:00
jeff
fa30a6f9b2
router version
2020-01-25 11:29:01 -05:00
jeff
f728e6016b
router version
2020-01-25 11:28:07 -05:00
Jeff Becker
b280bac141
don't always use bootstrap when exploring
2020-01-23 12:49:33 -05:00
Jeff Becker
7146857df6
use static initialization for started times
2020-01-23 12:14:26 -05:00
Jeff Becker
7aa1b2c27c
monotonic time and run testnet at 20% realtime
2020-01-23 12:14:25 -05:00
Jeff Becker
626b2a6196
return true
2020-01-23 12:10:58 -05:00
Jeff Becker
e87b754906
fix recursion depth on introset lookup
2020-01-23 12:10:58 -05:00
Jeff Becker
2c0dc12f39
refactor single char variables in DHT (mostly)
2020-01-23 12:10:58 -05:00
Jeff Becker
ae8bb3751b
connect to closest for RC lookups too
2020-01-23 12:10:58 -05:00
Jeff Becker
49f696de9c
connect to closer nodes for introset lookups
2020-01-23 12:10:57 -05:00
Jeff Becker
3b66cf6e75
dht fixes, disable iterative lookups on clients, revert "fixes" from 0.6.3, pass in recursion depth from introset lookup
2020-01-22 17:08:05 -05:00
Stephen Shelton
fba12093ac
Remove dead code (AbstractRouter::EnsureRouter())
2020-01-22 11:15:40 -07:00
Jeff
51e4b47cf8
Merge pull request #1061 from majestrate/fix-log-level-2020-01-20
...
configurable log level
2020-01-21 15:58:49 -05:00
Jeff Becker
1165466d56
don't deadlock when we want to remove lots of paths, flush queue instead when full
2020-01-21 12:28:23 -05:00