Commit Graph

628 Commits

Author SHA1 Message Date
Jeff
671c765161
Merge pull request #1085 from majestrate/check-for-initial-current-introset-2020-02-06
check for current introset being zero (initial state)
2020-02-12 11:44:39 -05:00
Jeff Becker
5b87a9419e
default recursion depth to 2 not 12 2020-02-07 14:55:08 -05:00
Jeff Becker
8c698a1cd1
* rename i to foundIntro
* check for zero timestamp
* use > not >=
2020-02-06 14:35:31 -05:00
Jeff Becker
41210a8ae1
check for current introset being zero (initial state) 2020-02-06 14:23:23 -05:00
Stephen Shelton
37e4f26be1
s/LogInfo/LogDebug @ 'signed/verify encrypted introset' 2020-02-06 12:05:43 -07:00
Jeff Becker
e6174efa21
don't derive x25519 key from ed25519 key 2020-02-03 17:21:31 -05:00
Jason Rhinelander
f1171ed7a2 make format 😠 🤮 2020-01-31 17:05:50 -04:00
Jason Rhinelander
46f3459b79 Fixed EncryptedIntroSet signing to use PrivateKey
We can generate both root and derived signatures from a PrivateKey, but
only root from a SecretKey, so just change it to use a PrivateKey.
2020-01-31 16:47:25 -04:00
Jason Rhinelander
860c5efd47 Derived key fixes
The reason things weren't working here is because libsodium does
something completely unintuitive and called the seed the "secret key"
when it isn't, it's the seed.

This adds a new PrivateKey class (alongside the existing SecretKey and
PubKey) that holds just a private key value but no seed -- which we need
to do because there is no way we can get a seed after calculating a
derived keypair.

With these changes, we now generate exactly the same keys and subkeys as
Tor (and a new test case uses values generated in Tor to verify this).

This is incomplete -- the subkey signing code is still not implemented;
it has to be adapted to create a signature from a PrivateKey rather than
a SecretKey which will probably requiring working around/reimplementing
some of what libsodium does for creating a signature since it expects
"secret keys" i.e. the seed.
2020-01-30 12:34:05 -04:00
Jeff Becker
0f13591802
does not work 2020-01-28 16:55:36 -05:00
Jeff Becker
99eb7726ff
initial dht key blinding 2020-01-27 16:30:41 -05:00
Jeff Becker
e87b754906
fix recursion depth on introset lookup 2020-01-23 12:10:58 -05:00
Jeff Becker
2c0dc12f39
refactor single char variables in DHT (mostly) 2020-01-23 12:10:58 -05:00
Jeff Becker
3b66cf6e75
dht fixes, disable iterative lookups on clients, revert "fixes" from 0.6.3, pass in recursion depth from introset lookup 2020-01-22 17:08:05 -05:00
Jeff Becker
a17b5f25b5
check for zero'd rc 2020-01-15 10:43:21 -05:00
Jeff
0e2c5736a8
Merge pull request #1034 from majestrate/dht-timeout-fixes-2020-01-10
dht timeout tweak
2020-01-10 17:35:56 -05:00
Jeff
0ad2809ac7
Merge pull request #1033 from majestrate/prevent-segfault-2020-01-10
prevent segfault
2020-01-10 17:35:49 -05:00
Jeff Becker
8bb492da6e
dht timeout tweak 2020-01-10 10:45:25 -05:00
Jeff Becker
77f0944d6d
use shared_from_this 2020-01-10 07:35:00 -05:00
Jeff Becker
78e325c4c5
always lookup introset from nearest router 2020-01-09 07:21:38 -05:00
Jeff Becker
2d82e931da
try doing lookup from close router, randomize when above lookup threshold 2020-01-09 06:26:41 -05:00
Jeff Becker
8a5365d9a6
diversify endpoints 2020-01-07 13:00:15 -05:00
Jeff Becker
c1ad5f955a
remove mutex 2020-01-07 12:59:30 -05:00
Jeff Becker
3147e2d357
shuffle intros when more than 1 exists 2020-01-03 14:50:12 -05:00
Jeff Becker
b3ad65f470
randomize intro order on shift 2020-01-02 17:08:45 -05:00
Jeff Becker
79badd6714
* clients expore dht faster
* use random path when doing dht lookups for .loki
2020-01-02 16:37:17 -05:00
Jeff Becker
5ae428a114
Revert "remove call to link manager"
This reverts commit 3dd36fa11a.
2019-12-30 11:13:17 -05:00
Jeff Becker
a5121c346c
remove call to link manager 2019-12-30 11:13:17 -05:00
Jeff Becker
d1a29884df
client side perf improvement 2019-12-30 11:13:17 -05:00
Jeff Becker
79c3c748e4
limit number of snode sessions client side 2019-12-30 05:19:03 -05:00
Jeff Becker
8b8d636ded
make format 2019-12-22 09:16:28 -05:00
Thomas Winget
71bb0dd520 implement timers using libuv
So far only a bit of the code using timers has been modified to use
the new libuv-based timers.  Also only the non-Windows case has been
implemented.  Seems to be working though, so it's a good time to commit.
2019-12-18 13:11:13 -05:00
Jeff Becker
7f6d1ebb92
fix slow start bug 2019-12-14 13:50:52 -05:00
Stephen Shelton
5d3cb8f405 Include error code in log output in Identity::EnsureKeys() 2019-12-12 10:09:57 -07:00
Stephen Shelton
2c6226f54a Backup SNApp keys when migrating to new ed25519 crypto 2019-12-06 11:21:14 -07:00
Stephen Shelton
66a058a2af Make format 2019-12-06 10:13:09 -07:00
Stephen Shelton
93b8832026
Merge branch 'dev' into private-keys-backup-support 2019-12-03 11:20:45 -07:00
Jeff Becker
28a2d471d6 style nitch 2019-11-29 19:11:14 -04:00
Jeff Becker
44e0e2c034 dont flood the logic queue 2019-11-29 19:11:14 -04:00
Jeff Becker
0828307906 fix address mapping bug 2019-11-29 19:11:14 -04:00
Jeff Becker
8849173112 try async decrypt then verify 2019-11-29 19:11:14 -04:00
Jeff Becker
285a9a1dd5 prevent segfault 2019-11-29 19:11:14 -04:00
Jeff Becker
ba0fd223d9 reduce number of jobs we put onto the logic thread 2019-11-29 18:45:06 -04:00
Jeff Becker
56dce90de9
add trace log level for tracking logic thread jobs 2019-11-22 16:23:19 -05:00
Stephen Shelton
db56e17c23 Rename bencode function for clarity 2019-11-22 14:14:37 -07:00
Jeff Becker
1a864832c8
make format 2019-11-14 10:07:40 -05:00
Thomas Winget
23a9773e1e
remove our paths from outbound queues 2019-11-07 13:23:14 -05:00
Jeff Becker
2c5561fc3c
make format 2019-11-05 12:01:34 -05:00
Jeff Becker
7ee026fa50
make path builds work again 2019-11-05 11:58:53 -05:00
Jeff Becker
2bf1e4f46a
enable IOS on IOS 2019-10-30 09:33:23 -04:00