Jeff
671c765161
Merge pull request #1085 from majestrate/check-for-initial-current-introset-2020-02-06
...
check for current introset being zero (initial state)
2020-02-12 11:44:39 -05:00
Jeff Becker
5b87a9419e
default recursion depth to 2 not 12
2020-02-07 14:55:08 -05:00
Jeff Becker
8c698a1cd1
* rename i to foundIntro
...
* check for zero timestamp
* use > not >=
2020-02-06 14:35:31 -05:00
Jeff Becker
41210a8ae1
check for current introset being zero (initial state)
2020-02-06 14:23:23 -05:00
Stephen Shelton
37e4f26be1
s/LogInfo/LogDebug @ 'signed/verify encrypted introset'
2020-02-06 12:05:43 -07:00
Jeff Becker
e6174efa21
don't derive x25519 key from ed25519 key
2020-02-03 17:21:31 -05:00
Jason Rhinelander
f1171ed7a2
make format 😠 🤮
2020-01-31 17:05:50 -04:00
Jason Rhinelander
46f3459b79
Fixed EncryptedIntroSet signing to use PrivateKey
...
We can generate both root and derived signatures from a PrivateKey, but
only root from a SecretKey, so just change it to use a PrivateKey.
2020-01-31 16:47:25 -04:00
Jason Rhinelander
860c5efd47
Derived key fixes
...
The reason things weren't working here is because libsodium does
something completely unintuitive and called the seed the "secret key"
when it isn't, it's the seed.
This adds a new PrivateKey class (alongside the existing SecretKey and
PubKey) that holds just a private key value but no seed -- which we need
to do because there is no way we can get a seed after calculating a
derived keypair.
With these changes, we now generate exactly the same keys and subkeys as
Tor (and a new test case uses values generated in Tor to verify this).
This is incomplete -- the subkey signing code is still not implemented;
it has to be adapted to create a signature from a PrivateKey rather than
a SecretKey which will probably requiring working around/reimplementing
some of what libsodium does for creating a signature since it expects
"secret keys" i.e. the seed.
2020-01-30 12:34:05 -04:00
Jeff Becker
0f13591802
does not work
2020-01-28 16:55:36 -05:00
Jeff Becker
99eb7726ff
initial dht key blinding
2020-01-27 16:30:41 -05:00
Jeff Becker
e87b754906
fix recursion depth on introset lookup
2020-01-23 12:10:58 -05:00
Jeff Becker
2c0dc12f39
refactor single char variables in DHT (mostly)
2020-01-23 12:10:58 -05:00
Jeff Becker
3b66cf6e75
dht fixes, disable iterative lookups on clients, revert "fixes" from 0.6.3, pass in recursion depth from introset lookup
2020-01-22 17:08:05 -05:00
Jeff Becker
a17b5f25b5
check for zero'd rc
2020-01-15 10:43:21 -05:00
Jeff
0e2c5736a8
Merge pull request #1034 from majestrate/dht-timeout-fixes-2020-01-10
...
dht timeout tweak
2020-01-10 17:35:56 -05:00
Jeff
0ad2809ac7
Merge pull request #1033 from majestrate/prevent-segfault-2020-01-10
...
prevent segfault
2020-01-10 17:35:49 -05:00
Jeff Becker
8bb492da6e
dht timeout tweak
2020-01-10 10:45:25 -05:00
Jeff Becker
77f0944d6d
use shared_from_this
2020-01-10 07:35:00 -05:00
Jeff Becker
78e325c4c5
always lookup introset from nearest router
2020-01-09 07:21:38 -05:00
Jeff Becker
2d82e931da
try doing lookup from close router, randomize when above lookup threshold
2020-01-09 06:26:41 -05:00
Jeff Becker
8a5365d9a6
diversify endpoints
2020-01-07 13:00:15 -05:00
Jeff Becker
c1ad5f955a
remove mutex
2020-01-07 12:59:30 -05:00
Jeff Becker
3147e2d357
shuffle intros when more than 1 exists
2020-01-03 14:50:12 -05:00
Jeff Becker
b3ad65f470
randomize intro order on shift
2020-01-02 17:08:45 -05:00
Jeff Becker
79badd6714
* clients expore dht faster
...
* use random path when doing dht lookups for .loki
2020-01-02 16:37:17 -05:00
Jeff Becker
5ae428a114
Revert "remove call to link manager"
...
This reverts commit 3dd36fa11a
.
2019-12-30 11:13:17 -05:00
Jeff Becker
a5121c346c
remove call to link manager
2019-12-30 11:13:17 -05:00
Jeff Becker
d1a29884df
client side perf improvement
2019-12-30 11:13:17 -05:00
Jeff Becker
79c3c748e4
limit number of snode sessions client side
2019-12-30 05:19:03 -05:00
Jeff Becker
8b8d636ded
make format
2019-12-22 09:16:28 -05:00
Thomas Winget
71bb0dd520
implement timers using libuv
...
So far only a bit of the code using timers has been modified to use
the new libuv-based timers. Also only the non-Windows case has been
implemented. Seems to be working though, so it's a good time to commit.
2019-12-18 13:11:13 -05:00
Jeff Becker
7f6d1ebb92
fix slow start bug
2019-12-14 13:50:52 -05:00
Stephen Shelton
5d3cb8f405
Include error code in log output in Identity::EnsureKeys()
2019-12-12 10:09:57 -07:00
Stephen Shelton
2c6226f54a
Backup SNApp keys when migrating to new ed25519 crypto
2019-12-06 11:21:14 -07:00
Stephen Shelton
66a058a2af
Make format
2019-12-06 10:13:09 -07:00
Stephen Shelton
93b8832026
Merge branch 'dev' into private-keys-backup-support
2019-12-03 11:20:45 -07:00
Jeff Becker
28a2d471d6
style nitch
2019-11-29 19:11:14 -04:00
Jeff Becker
44e0e2c034
dont flood the logic queue
2019-11-29 19:11:14 -04:00
Jeff Becker
0828307906
fix address mapping bug
2019-11-29 19:11:14 -04:00
Jeff Becker
8849173112
try async decrypt then verify
2019-11-29 19:11:14 -04:00
Jeff Becker
285a9a1dd5
prevent segfault
2019-11-29 19:11:14 -04:00
Jeff Becker
ba0fd223d9
reduce number of jobs we put onto the logic thread
2019-11-29 18:45:06 -04:00
Jeff Becker
56dce90de9
add trace log level for tracking logic thread jobs
2019-11-22 16:23:19 -05:00
Stephen Shelton
db56e17c23
Rename bencode function for clarity
2019-11-22 14:14:37 -07:00
Jeff Becker
1a864832c8
make format
2019-11-14 10:07:40 -05:00
Thomas Winget
23a9773e1e
remove our paths from outbound queues
2019-11-07 13:23:14 -05:00
Jeff Becker
2c5561fc3c
make format
2019-11-05 12:01:34 -05:00
Jeff Becker
7ee026fa50
make path builds work again
2019-11-05 11:58:53 -05:00
Jeff Becker
2bf1e4f46a
enable IOS on IOS
2019-10-30 09:33:23 -04:00