Commit Graph

866 Commits

Author SHA1 Message Date
R4SAS
bc330ff0ea update makefiles, license year
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-11-23 01:46:08 +03:00
orignal
c875ff923a random intro key 2020-11-21 18:44:40 -05:00
orignal
3dfb44de31 exclude DSA floodfills 2020-11-21 14:27:08 -05:00
R4SAS
2266c3877c
update reseeds
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-11-21 19:45:06 +03:00
orignal
f4486bc075 take intro key from right address 2020-11-20 21:48:33 -05:00
orignal
0436a65baa upddate DSA router keys 2020-11-20 20:31:50 -05:00
orignal
d8381e9486 disable encryption to ECIES routers 2020-11-18 18:11:29 -05:00
orignal
3925540517 don't update expired tunnels 2020-11-16 12:56:22 -05:00
orignal
3b630fe546 fixed race condition 2020-11-16 10:04:38 -05:00
orignal
c69c4ae8a0 don't publish too fast 2020-11-15 21:46:49 -05:00
orignal
b4369470cb publish updated RouterInfo 2020-11-15 20:05:27 -05:00
R4SAS
2bd6daeb8d disable aes/avx for winxp by default 2020-11-16 03:43:54 +03:00
orignal
44ca315c75 don't build tunnels for all pools at the time 2020-11-15 19:38:34 -05:00
orignal
af20b13c7a create paired inbound tunnels if no inbound tunnels yet 2020-11-15 17:02:01 -05:00
orignal
1f6be38145 wait for publish confirmation or publish to another floodfill 2020-11-15 13:06:02 -05:00
orignal
8b3a7486c7 rename CRYPTO_KEY_TYPE_ECIES_X25519_AEAD_RATCHET to CRYPTO_KEY_TYPE_ECIES_X25519_AEAD 2020-11-14 18:28:50 -05:00
R4SAS
62cd9fffa3
Automate AES-NI and AVX detection on runtime, make it default on x86-based systems (#1578)
Rework CPU extensions detection code and build with AES-NI and AVX support by default
2020-11-15 01:31:20 +03:00
orignal
7e874eaa7c pre-calculated h 2020-11-12 15:15:02 -05:00
orignal
1c7780a423 garlic clove block for router 2020-11-09 15:35:50 -05:00
orignal
07b77443dd don't handle TunnelBuild message for ECIES router 2020-11-07 18:28:38 -05:00
orignal
4ba1be2dc0 one time garlic encryption for ECIES routers 2020-11-05 21:21:46 -05:00
orignal
6362a7bba5 decrypt garlic on ECIES router 2020-11-05 15:27:37 -05:00
orignal
1740715c00 correct reply key and IV for ECIES record 2020-11-04 21:04:28 -05:00
orignal
21501cbf81 correct MixHash after decryption 2020-11-04 13:31:28 -05:00
orignal
d5f3d6111e correct tunnel build record size to decrept 2020-11-04 11:52:33 -05:00
orignal
bd04f92087 correct public key for ECIES address 2020-11-03 18:41:27 -05:00
orignal
942b2b05e7 correct key for AEAD decryption 2020-11-03 15:53:47 -05:00
orignal
b8064b9b4b copy noise state 2020-11-03 15:42:53 -05:00
orignal
f94d03465a don't create transit tunnel if decyrption failed 2020-11-03 15:38:25 -05:00
orignal
4e7aafeec1 send transit tunnel reply for ECIES router 2020-11-03 15:23:13 -05:00
orignal
d820b8036e correct transient signature length 2020-11-03 09:20:14 -05:00
orignal
3907c17cf5 handle TunnelBuildMessage for ECIES router 2020-11-02 18:49:07 -05:00
orignal
b12fa97a38 32 bytes private key for ECIESx25519 2020-10-29 18:41:21 -04:00
orignal
9f2a2e44a3 common MixHash and MixKey 2020-10-28 21:53:11 -04:00
orignal
c63818f355 2.34.0 2020-10-27 12:27:08 -04:00
orignal
c400372a79 create new ratchets session if previous was not replied 2020-10-27 08:32:38 -04:00
R4SAS
56f3bdd746
[win32] handle WinAPI errors in SSU
Windows can throw WinAPI errors which are not handled by boost asio

Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-10-27 11:52:02 +03:00
orignal
21d99e355c MixHash(sepk) added 2020-10-24 15:48:56 -04:00
orignal
ef5495bfb2 padding for x25519 crypto key 2020-10-23 22:14:00 -04:00
orignal
c93ee0d65d tunnels through ECIES routers 2020-10-23 15:53:22 -04:00
orignal
57d6c7a3b3 Added TunnelConfig.cpp. Removed CryptoWroker.h 2020-10-22 21:06:23 -04:00
orignal
d65a282e9d check routers with non ElGamal encryptions for lookup, publish and tunnel build 2020-10-22 18:34:15 -04:00
orignal
801ecaa41c temporary exclude routers with non ElGamal crypto types 2020-10-21 19:03:51 -04:00
orignal
49bf735c22 don't set destination to routers 2020-10-21 18:59:16 -04:00
orignal
387830e07a encyption type 0,4 by default for client tunnels 2020-10-19 18:26:01 -04:00
orignal
417b5ed6cc handle SSU v4 and v6 messages in one thread 2020-10-14 21:06:51 -04:00
orignal
acc5592f59 create DH keys for SSU session directly 2020-10-13 21:12:52 -04:00
R4SAS
3f45a11f12
[SSU] handle ICMP responses
Windows network stack can forward ICMP to socket and simple deleting of
packet can cause socket death. Same thing can happen on other systems
but without socket death.

Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-10-13 15:22:39 +03:00
orignal
e3464add50 don't create new tunnels if offline 2020-10-12 17:15:17 -04:00
R4SAS
18bb4a71c2
fix incorrect chars in variable
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-10-12 18:27:25 +03:00