orignal
3925540517
don't update expired tunnels
2020-11-16 12:56:22 -05:00
orignal
3b630fe546
fixed race condition
2020-11-16 10:04:38 -05:00
orignal
c69c4ae8a0
don't publish too fast
2020-11-15 21:46:49 -05:00
orignal
b4369470cb
publish updated RouterInfo
2020-11-15 20:05:27 -05:00
R4SAS
2bd6daeb8d
disable aes/avx for winxp by default
2020-11-16 03:43:54 +03:00
orignal
44ca315c75
don't build tunnels for all pools at the time
2020-11-15 19:38:34 -05:00
orignal
af20b13c7a
create paired inbound tunnels if no inbound tunnels yet
2020-11-15 17:02:01 -05:00
orignal
1f6be38145
wait for publish confirmation or publish to another floodfill
2020-11-15 13:06:02 -05:00
orignal
8b3a7486c7
rename CRYPTO_KEY_TYPE_ECIES_X25519_AEAD_RATCHET to CRYPTO_KEY_TYPE_ECIES_X25519_AEAD
2020-11-14 18:28:50 -05:00
R4SAS
62cd9fffa3
Automate AES-NI and AVX detection on runtime, make it default on x86-based systems ( #1578 )
...
Rework CPU extensions detection code and build with AES-NI and AVX support by default
2020-11-15 01:31:20 +03:00
orignal
7e874eaa7c
pre-calculated h
2020-11-12 15:15:02 -05:00
orignal
1c7780a423
garlic clove block for router
2020-11-09 15:35:50 -05:00
orignal
07b77443dd
don't handle TunnelBuild message for ECIES router
2020-11-07 18:28:38 -05:00
orignal
4ba1be2dc0
one time garlic encryption for ECIES routers
2020-11-05 21:21:46 -05:00
orignal
6362a7bba5
decrypt garlic on ECIES router
2020-11-05 15:27:37 -05:00
orignal
1740715c00
correct reply key and IV for ECIES record
2020-11-04 21:04:28 -05:00
orignal
21501cbf81
correct MixHash after decryption
2020-11-04 13:31:28 -05:00
orignal
d5f3d6111e
correct tunnel build record size to decrept
2020-11-04 11:52:33 -05:00
orignal
bd04f92087
correct public key for ECIES address
2020-11-03 18:41:27 -05:00
orignal
942b2b05e7
correct key for AEAD decryption
2020-11-03 15:53:47 -05:00
orignal
b8064b9b4b
copy noise state
2020-11-03 15:42:53 -05:00
orignal
f94d03465a
don't create transit tunnel if decyrption failed
2020-11-03 15:38:25 -05:00
orignal
4e7aafeec1
send transit tunnel reply for ECIES router
2020-11-03 15:23:13 -05:00
orignal
d820b8036e
correct transient signature length
2020-11-03 09:20:14 -05:00
orignal
3907c17cf5
handle TunnelBuildMessage for ECIES router
2020-11-02 18:49:07 -05:00
orignal
b12fa97a38
32 bytes private key for ECIESx25519
2020-10-29 18:41:21 -04:00
orignal
9f2a2e44a3
common MixHash and MixKey
2020-10-28 21:53:11 -04:00
orignal
c63818f355
2.34.0
2020-10-27 12:27:08 -04:00
orignal
c400372a79
create new ratchets session if previous was not replied
2020-10-27 08:32:38 -04:00
R4SAS
56f3bdd746
[win32] handle WinAPI errors in SSU
...
Windows can throw WinAPI errors which are not handled by boost asio
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-10-27 11:52:02 +03:00
orignal
21d99e355c
MixHash(sepk) added
2020-10-24 15:48:56 -04:00
orignal
ef5495bfb2
padding for x25519 crypto key
2020-10-23 22:14:00 -04:00
orignal
c93ee0d65d
tunnels through ECIES routers
2020-10-23 15:53:22 -04:00
orignal
57d6c7a3b3
Added TunnelConfig.cpp. Removed CryptoWroker.h
2020-10-22 21:06:23 -04:00
orignal
d65a282e9d
check routers with non ElGamal encryptions for lookup, publish and tunnel build
2020-10-22 18:34:15 -04:00
orignal
801ecaa41c
temporary exclude routers with non ElGamal crypto types
2020-10-21 19:03:51 -04:00
orignal
49bf735c22
don't set destination to routers
2020-10-21 18:59:16 -04:00
orignal
387830e07a
encyption type 0,4 by default for client tunnels
2020-10-19 18:26:01 -04:00
orignal
417b5ed6cc
handle SSU v4 and v6 messages in one thread
2020-10-14 21:06:51 -04:00
orignal
acc5592f59
create DH keys for SSU session directly
2020-10-13 21:12:52 -04:00
R4SAS
3f45a11f12
[SSU] handle ICMP responses
...
Windows network stack can forward ICMP to socket and simple deleting of
packet can cause socket death. Same thing can happen on other systems
but without socket death.
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-10-13 15:22:39 +03:00
orignal
e3464add50
don't create new tunnels if offline
2020-10-12 17:15:17 -04:00
R4SAS
18bb4a71c2
fix incorrect chars in variable
...
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-10-12 18:27:25 +03:00
R4SAS
85e9da82b0
[transports] validate IP when trying connect to remote peer for being in reserved IP range
...
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-10-12 14:56:17 +00:00
R4SAS
99d046ca11
[http] handle WebDAV methods
...
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-10-12 07:31:57 +03:00
orignal
ffa0f0afd9
check network status
2020-10-11 17:51:40 -04:00
orignal
e21dac21c8
fixed #1557 . don't try to send empty message
2020-10-11 14:02:12 -04:00
orignal
e2a1cd12c3
don't delete unreachable routers if too few
2020-10-07 21:13:26 -04:00
orignal
d218c9a983
disable ntcpproxy
2020-10-04 10:12:33 -04:00
orignal
c2f13a1496
some cleanup
2020-10-03 22:29:52 -04:00
orignal
faae2709d9
removed NTCP
2020-10-03 21:58:20 -04:00
orignal
a8d23b5439
disable NTCP for good
2020-10-03 18:46:12 -04:00
orignal
8483464aab
don't attach our RouterInfo to router's request
2020-10-03 17:20:04 -04:00
orignal
3a2724ec58
single thread for I2CP
2020-10-02 13:13:27 -04:00
orignal
ee84291997
handle i2p.streaming.answerPings properly
2020-09-30 19:06:13 -04:00
orignal
fd9229c467
ping/pong for streaming
2020-09-30 17:12:28 -04:00
orignal
dec7a9a01c
shared transient destination between proxies
2020-09-27 20:50:57 -04:00
orignal
335f9394a5
drop gcc 4.7 support
2020-09-26 19:32:19 -04:00
orignal
f939a7b349
reduce variable tunnel build length to 4
2020-09-21 19:22:53 -04:00
orignal
09fdb068d2
Database lookups from ECIES destinations
2020-09-19 21:15:42 -04:00
orignal
024c29b180
eliminate boost/bind
2020-09-17 21:11:46 -04:00
orignal
2b0d1a2190
implement DatabaseLookupTagSet
2020-09-15 19:39:18 -04:00
orignal
d0d71c93af
set LeaseSet type to 3 for ratchets if not specified
2020-09-10 19:27:29 -04:00
orignal
da1e52357f
delete symmkey on cleanup
2020-09-08 07:46:55 -04:00
orignal
a05a54b38e
trim behind ECIESx25519 tags
2020-09-07 18:45:05 -04:00
orignal
954781262c
2.33.0
2020-08-24 12:27:39 -04:00
orignal
3159b06988
reseeds update
2020-08-15 13:53:49 -04:00
orignal
e50abbb250
avoid replay upon SSU packet resend
2020-08-08 19:01:55 -04:00
orignal
8e25226574
use unordered_map for incomplete and sent messages
2020-08-08 13:34:27 -04:00
orignal
9636d82b37
MixHash for SessionConfirmed processing
2020-08-03 18:31:03 -04:00
orignal
c3aa6b9cda
use delivery type local if destination is not secified
2020-07-29 17:47:46 -04:00
orignal
c41554109b
change datagram routing path if nothing comes back in 10 seconds
2020-07-15 16:20:35 -04:00
orignal
67b94d3533
unordered_map for RouterInfos and LeaseSets
2020-07-07 15:38:20 -04:00
orignal
6f2e6ed887
key for next send ratchet
2020-06-30 15:05:17 -04:00
orignal
5f1e66d64b
use pre-calculated x25519 ephemeral keys for ratchets
2020-06-30 13:00:41 -04:00
orignal
1f31fdc257
pre-calculate ephemeral keys for x25519
2020-06-29 20:02:09 -04:00
orignal
df9965e129
use unordered_map for peers
2020-06-29 18:19:31 -04:00
orignal
61e9c31f0d
don't hold RouterInfo after successive connect
2020-06-24 11:29:54 -04:00
orignal
a0b35ebd3e
mark NTCP2 unreachable routers
2020-06-22 22:32:18 -04:00
orignal
31494267e5
fixed datagram idle crash
2020-06-17 14:24:25 -04:00
orignal
1e609acb03
keep sending through first successive routing path
2020-06-14 11:16:08 -04:00
orignal
69194118df
generate random padding length in bulk
2020-06-13 21:24:16 -04:00
orignal
1a39f7e5c6
GarlicRoutingPath per session
2020-06-13 16:18:12 -04:00
orignal
61897ae16c
crypto.ratchet.inboundTags
2020-06-12 20:42:54 -04:00
orignal
5993cc857a
start new tunnel message if remining is too small
2020-06-12 16:03:12 -04:00
orignal
44bb8f6f16
allocated datagram I2NP from memory pool
2020-06-10 21:19:37 -04:00
orignal
a33cad4b70
eliminate datagram send timer
2020-06-10 11:57:40 -04:00
orignal
f077836bf5
store DatagramSession for bulk
2020-06-09 19:20:24 -04:00
orignal
6d7847f2df
send bulk datagrams
2020-06-09 16:26:45 -04:00
orignal
6735b2686b
set LeaseSet2 for ECIESx25519
2020-06-05 15:41:30 -04:00
orignal
4ae41513ac
save new session with NSR tagset
2020-06-04 18:19:38 -04:00
orignal
438a225487
pass calculatePublic
2020-06-03 19:58:36 -04:00
orignal
e135696530
support multiple encryption keys through the I2CP
2020-06-03 16:05:19 -04:00
R4SAS
9135772f89
2.32.1
...
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-06-02 19:26:36 +03:00
orignal
0dc212d97c
fixed non-updating LeaseSet1
2020-05-28 13:46:02 -04:00
R4SAS
45e8d5c50e
Return deprecated websocket config options for compatibility
...
Closes #1523
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-05-27 21:29:00 +03:00
orignal
37ec90c436
don't gererate more tags for detached session
2020-05-26 16:47:45 -04:00
orignal
0e0169d22b
2.32.0
2020-05-25 08:37:47 -04:00
orignal
1975adc48f
print remote peer for queues
2020-05-24 14:14:16 -04:00
orignal
71564f0d10
set default i2cp.leaseSetEncType=0,4 for http and socks proxy for android
2020-05-24 10:30:00 -04:00
orignal
5a32082624
recreate session after 90 seconds incativity
2020-05-23 15:58:11 -04:00
orignal
86e8614934
allow session restart after 2 minutes from creation
2020-05-23 10:20:22 -04:00
orignal
ead89c767a
compress longer RouterInfo
2020-05-22 18:32:44 -04:00
R4SAS
8bae4975fb
add copyright headers
...
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-05-22 18:14:53 +00:00
R4SAS
7a5146ea74
fix code syle(spaces->tabs, tabulations)
...
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-05-22 18:14:53 +00:00
orignal
46ee427ee3
common header for repliable datagrams
2020-05-21 21:54:00 -04:00
orignal
0c2b0081b5
rollback
2020-05-21 19:38:25 -04:00
orignal
f133a7f9fd
resend outstading packets again
2020-05-21 18:58:28 -04:00
orignal
153aaa6d21
no compression for RouterInfo gzip
2020-05-21 15:33:12 -04:00
orignal
e5901dad91
resend not more than half of window
2020-05-21 14:52:44 -04:00
orignal
bdd75e1171
build client tunnels through router with version >= 0.9.36
2020-05-20 14:59:18 -04:00
orignal
648d035a0f
GzipNoCompression for datagrams
2020-05-19 21:02:32 -04:00
orignal
7ebf2f010c
shorter padding for optimal packet length
2020-05-19 19:03:12 -04:00
orignal
3db4421aa7
don't invoke gzip for decompression if no compression
2020-05-19 10:48:23 -04:00
orignal
9fb59e128b
resubmit updated LeaseSet if not confirmed
2020-05-18 22:31:36 -04:00
orignal
c7c6e5917a
Streaming MTU size 1812 for ECIESX25519AEADRatchet
2020-05-18 20:45:25 -04:00
orignal
7b418b3adf
insert whole message to queue
2020-05-18 17:51:45 -04:00
orignal
1c8d662e30
don't add padding for optimal packet size
2020-05-18 16:42:06 -04:00
orignal
d4bfeab36c
pass gzip parameter to UDP tunnels
2020-05-18 12:01:13 -04:00
orignal
e1b1032df9
reseeds update
2020-05-18 08:29:09 -04:00
orignal
329439d0ae
don't copy datagram payload
2020-05-17 16:49:31 -04:00
orignal
0b1cfb2102
send response to recived datagram from ECIESX25519AEADRatchet session
2020-05-16 19:10:17 -04:00
orignal
23be4c01df
CreateLeaseSetClove
2020-05-13 18:09:26 -04:00
orignal
86782f3479
eliminate extra buffer allocation for incoming packets
2020-05-12 18:30:04 -04:00
orignal
a96c205830
allow encryption type param for encrypted LeaseSet
2020-05-08 14:20:13 -04:00
orignal
9b6facf3b0
fixed crash of encrypted leaseset without authentication
2020-05-06 14:08:54 -04:00
orignal
d503190647
fixed crash of encrypted leaseset without authentication
2020-05-06 10:08:01 -04:00
orignal
c4d9c03930
handle termination block
2020-05-05 13:01:23 -04:00
orignal
d7d70b707f
configurable throw function
2020-05-05 11:13:59 -04:00
orignal
bb7f03857c
ThrowFatal function
2020-05-05 09:35:41 -04:00
orignal
53b43353eb
fixed formatting
2020-05-05 08:27:56 -04:00
orignal
b197556447
remove dependency from Win32App
2020-05-05 08:11:01 -04:00
R4SAS
42d4781a96
[windows] add binding exceptions messagebox notifications, update exceptions handling code
...
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-05-05 02:45:25 +03:00
R4SAS
4d48d35ad7
[SSU] handle socket binding errors
...
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-05-04 18:12:23 +03:00
orignal
b7ba8f8e93
precalculate initial h and ck
2020-05-03 13:23:08 -04:00
orignal
dff510c181
set best compression for RouterInfo
2020-05-03 09:27:17 -04:00
orignal
1eead0e885
GzipNoCompression witout zlib calls
2020-05-02 21:18:44 -04:00
orignal
e301387896
don't calculate checsum for Data message send through ECIESX25519AEADRatchet session
2020-05-02 11:13:40 -04:00
orignal
c49e544781
allow longer families
2020-05-01 14:30:56 -04:00
orignal
d48db501e0
max payload is always 1730
2020-05-01 07:33:05 -04:00
orignal
ec4e17f75c
cleanup previous tagsets
2020-04-30 21:27:35 -04:00
orignal
17e69e67b1
create additional tags for NSR tagset
2020-04-30 15:38:15 -04:00
orignal
c4f9f7da06
fixed warning
2020-04-30 13:45:26 -04:00
R4SAS
f5712c4198
remove not needed initialization for pointer
...
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-04-30 04:59:05 +03:00
R4SAS
1aa0da3382
[NTCP2] fix socks proxy support
...
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-04-30 04:47:32 +03:00
orignal
27d69894d4
show ECIESx25519 session and tag on the web console
2020-04-29 20:50:31 -04:00
orignal
627d8cfe69
correct timestamp check for LeaseSet2
2020-04-29 17:11:48 -04:00
orignal
3d9c844dca
handle out of order NSR
2020-04-28 22:03:13 -04:00
orignal
65e1871cd7
new tag for each NSR
2020-04-28 18:23:13 -04:00
R4SAS
0a431594f8
[Log] Change default loglevel ( closes #1230 )
...
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-04-29 00:56:43 +03:00
orignal
7b22ef4270
create incoming NSR tagset
2020-04-28 14:47:53 -04:00
orignal
f77a58b2dc
set some ECIESx25519 params
2020-04-27 18:53:02 -04:00
orignal
142a138cfc
store previous reverse key
2020-04-27 09:35:02 -04:00
R4SAS
e6fdf5ad8d
[Log] create logfile even if loglevel is "none"
...
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-04-27 13:59:00 +03:00
orignal
50a77fedca
removed trivial check
2020-04-26 19:37:00 -04:00
orignal
51e3d5f7bc
create next tagset
2020-04-26 19:27:31 -04:00
R4SAS
7f859978dd
[webconsole] Add runtime transit limit changer, fix button CSS
...
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-04-26 23:45:30 +03:00
orignal
d8134e8a21
handle and send next key message without public key
2020-04-25 21:09:03 -04:00
orignal
614d91e0b1
send same next key reponse
2020-04-25 14:45:53 -04:00
orignal
30067fc7d7
handle next key forward
2020-04-24 21:36:08 -04:00
orignal
ec29597dbd
associate tagset for ECIESx25519 tags
2020-04-24 15:46:02 -04:00
orignal
ad211a63f3
check if number of peers to exclude doesn't exceed 512
2020-04-23 15:22:07 -04:00
orignal
6b596bd05f
check ECIES flag for encrypted response
2020-04-21 15:14:03 -04:00
orignal
510b85fd23
try ECIESx25519 tag first
2020-04-20 19:37:46 -04:00
orignal
e3c8f3fd6f
use ack request instead DeliveryStatus for LeaseSet confirmation
2020-04-19 15:00:51 -04:00
orignal
f9175db28e
store intermediate symmetric keys
2020-04-16 21:30:18 -04:00
orignal
f4798d05e7
persist multi encryption keys
2020-04-15 22:04:18 -04:00
orignal
a2a0f62135
multi crypto keys in i2cp.leaseSetEncType
2020-04-15 18:01:01 -04:00
orignal
d923f0e01b
support two encryption keys
2020-04-14 19:12:44 -04:00
orignal
2fc16ee13d
indetification of incoming garlic messages
2020-04-13 20:00:19 -04:00
orignal
5e606573b1
2.31.0
2020-04-10 12:57:47 -04:00
orignal
b7c206c44b
replace by new incoming session
2020-04-09 15:00:38 -04:00
orignal
49c1e47736
correct termination if session already exists
2020-04-08 18:02:12 -04:00
orignal
4e1319d874
handle ECIESFlag in DatabaseLookup at floodfill
2020-04-07 11:40:18 -04:00
R4SAS
a9436aa9af
drop i2lua
...
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-04-03 14:31:38 +03:00
orignal
aa7750bfd3
keep sending new session reply until first established session message received
2020-04-02 21:48:39 -04:00
orignal
8872d1f389
mutex for m_RemoteIdentity
2020-04-01 09:54:10 -04:00
orignal
f21af4068f
preferred crypto type for Decrypt
2020-03-31 17:35:51 -04:00
orignal
f4ca6bbb52
fixed race with identity verifier
2020-03-30 19:27:10 -04:00
orignal
869d0156ce
handle Ack request
2020-03-26 19:03:38 -04:00
orignal
fe9ac10f02
generate new tags based on last received index
2020-03-22 21:21:12 -04:00
orignal
6fb80f226a
reopen socked and restart receiver on exception
2020-03-22 08:14:20 -04:00
orignal
962c2160c7
set actual LeaseSet2 buffer size
2020-03-20 17:43:37 -04:00
R4SAS
168da33d8b
add comma
...
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-03-20 18:43:54 +03:00
R4SAS
b6b25dc9f3
update log messages
...
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-03-20 17:51:55 +03:00
orignal
3ca17fdc03
support multiple encryption keys
2020-03-19 18:33:42 -04:00
orignal
f3b0e57a54
publish multiple encryption keys
2020-03-18 18:03:03 -04:00
orignal
5da92437a1
set msg type for deliverystatus
2020-03-16 16:41:07 -04:00
orignal
b5bc05ac2b
delete unconfirmed LeaseSet and DeliveryStatus
2020-03-14 16:35:34 -04:00
orignal
45145fa50a
add ECIESX25519AEADRatchet session to delivery status
2020-03-14 09:33:48 -04:00
R4SAS
2f56547d5f
Merge pull request #1477 from PurpleI2P/drop-websockets
...
drop websockets support
2020-03-11 12:37:38 +00:00
orignal
3c53479864
update LeaseSet for ECIESX25519AEADRatchet sessions
2020-03-08 20:58:59 -04:00
orignal
4adc741de3
send DeliveryStatusMsg for LeaseSet
2020-03-08 18:13:41 -04:00
orignal
64da62dbe6
alsways store latest symmkey
2020-03-07 18:46:40 -05:00
orignal
5eec580727
delete strem from destination upon termination
2020-03-04 18:31:22 -05:00
orignal
1e9a53da3f
delete stream by id for HTTP interface
2020-03-04 15:54:09 -05:00
orignal
2d3fad2cdb
correct proxy buffers
2020-03-02 16:24:00 -05:00
orignal
e969d58689
handle ntcp2.proxy parameter
2020-03-01 15:11:54 -05:00
orignal
ae20e3aa95
NTCP2 proxy
2020-03-01 11:24:18 -05:00
unlnown542a
4f0da87a7a
add ntcp2proxy support
2020-03-01 14:35:24 +00:00
orignal
2ffe62ba41
[[fallthrough]] if C++17 only
2020-02-29 09:21:50 -05:00
orignal
e0cb26bd9e
fixed fallthough warning for C++17
2020-02-28 14:15:41 -05:00
orignal
1893127e84
use fold expression if C++17
2020-02-28 14:05:51 -05:00
R4SAS
bca0809918
cleanup removed websockets funtions
...
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-02-28 18:48:43 +03:00
R4SAS
00db527377
drop websockets support
...
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2020-02-27 14:58:06 +03:00
orignal
5115c27e72
2.30.0
2020-02-25 11:15:30 -05:00
orignal
91919c6d64
check if both sides are ECIESx25519
2020-02-20 21:07:45 -05:00
orignal
7168738835
check ctx for null
2020-02-20 21:05:07 -05:00
orignal
9c9b723cf5
delete expired ECIESX25519AEADRatchet sessions and tags
2020-02-20 15:44:09 -05:00
orignal
f392edd66c
single thread SAM by default
2020-02-19 13:27:28 -05:00
orignal
24b48e5d50
reseeds update
2020-02-18 17:45:04 -05:00
orignal
32e2f0b1fa
correct termination of streaming destination
2020-02-15 16:30:10 -05:00
orignal
09ed57ad42
select preferred crypto from LeaseSet2
2020-02-12 11:09:20 -05:00
orignal
53a6162b0c
generate more receive tags when needed
2020-02-09 17:19:42 -05:00
orignal
694d851cdb
Symmetric Key Ratchet
2020-02-08 21:51:02 -05:00
orignal
8e53c30a00
correct calls sequence for tag and index
2020-02-07 22:08:55 -05:00
orignal
012f22cc47
create session tags for ECIESX25519
2020-02-05 15:48:51 -05:00
orignal
9d891ab5dd
single thread mode for SAM
2020-02-04 15:31:04 -05:00
orignal
d0e78be867
moved io_service away from ClientDestination
2020-02-04 14:17:23 -05:00
orignal
cbedebc9dd
change minimal MTU size
2020-02-04 13:32:16 -05:00
orignal
969f9aa436
common RuunableBase with private inheritance
2020-02-04 11:48:56 -05:00
orignal
b982be5ff5
handle existing session message
2020-02-03 16:21:07 -05:00
orignal
2d154ee640
move RunnableService away from LeaseSetDestination
2020-02-02 18:58:58 -05:00
orignal
49810eb153
common RunnableService
2020-02-02 17:05:30 -05:00
orignal
85b88b8749
second x25519 for new session reply
2020-01-30 19:30:30 -05:00
orignal
239c8b5172
destination delivery instructions
2020-01-30 11:48:32 -05:00
orignal
8c800dc178
save aepk from new session message
2020-01-29 21:57:10 -05:00
orignal
cdd068d99a
correct message size
2020-01-29 19:27:38 -05:00
orignal
48fa10b080
incoming ECIESX25519AEADRatchet messages hanler
2020-01-29 15:54:11 -05:00
orignal
a1dbec0fcb
handle new session reply
2020-01-29 12:54:26 -05:00
orignal
abe668f1c3
fixed build error
2020-01-28 10:31:35 -05:00
orignal
77440c235d
replaced map by unordered_map
2020-01-28 10:03:51 -05:00
orignal
fd1ee48dbe
datetime and padding blocks
2020-01-23 14:26:40 -05:00
orignal
205e807b66
reset keys
2020-01-22 21:42:30 -05:00
orignal
34295adb05
attach LeaseSet clove
2020-01-22 14:26:47 -05:00
orignal
7c212bef63
add new session to the list after reply received
2020-01-22 11:27:47 -05:00
orignal
76f95644b7
fixed #1461 . Use openssl's HKDF for 1.1.1 anf higher
2020-01-22 09:59:08 -05:00
orignal
928b90d5bc
fixed #1461 . Use openssl's HKDF for 1.1.1 anf higher
2020-01-22 09:50:50 -05:00
orignal
09c6c2a4f3
decode aepk and bepk back
2020-01-21 21:09:19 -05:00
orignal
2b2bd733e9
correct sharedkey for new outgoing session
2020-01-21 19:13:23 -05:00
orignal
0d2d7e5e71
fixed Elligator tests
2020-01-21 17:53:48 -05:00
orignal
6142e93252
session tag for ECIESx25519 sessions
2020-01-21 14:40:23 -05:00
orignal
ccec3376ba
try another ephemeral keys if elligator encoding failes
2020-01-21 12:19:20 -05:00
orignal
f497a74ec4
set random two highest bits
2020-01-21 12:18:31 -05:00
orignal
8b49a55442
ratchet tagsets
2020-01-20 15:17:38 -05:00
Rosen Penev
eabcafa516
replace random_shuffle with shuffle
...
random_shuffle is gone with C++17.
Found and fixed with clang-tidy.
2020-01-19 18:09:04 -08:00
orignal
6cc388c1bc
use HKDF for MixKey
2020-01-18 14:43:36 -05:00
orignal
62e39ddfbd
new session reply
2020-01-17 14:11:15 -05:00
orignal
80373623cd
create payload
2020-01-17 11:21:41 -05:00
orignal
451c3945f0
create new ECIESX25519AEADRatchet session if not found
2020-01-16 19:33:00 -05:00
orignal
00cb15d9b4
fixed tyypo
2020-01-16 18:03:51 -05:00
orignal
67dd59125e
new outgoing ECIESX25519AEADRatchet session
2020-01-16 16:34:13 -05:00
orignal
b6800dd125
lookup ECIESX25519AEADRatchet session by static key
2020-01-16 15:45:22 -05:00
orignal
dc9da69509
derive ECIESX25519AEADRatchetSession from GarlicRoutingSession
2020-01-16 14:59:19 -05:00
orignal
d7d964bf57
GarlicRoutingSession/ElGamalAESSession split
2020-01-16 14:31:01 -05:00
orignal
bcfe44db54
handle tunnel delivery instructioin for ECIESx25519
2020-01-16 12:47:08 -05:00
orignal
376bf6ba72
correct message size for ECIESx25519
2020-01-15 19:22:42 -05:00
orignal
f651baab25
ECIESX25519AEADRatchetSession added
2020-01-15 15:13:43 -05:00
orignal
61752e2aab
correct ciphertext length
2020-01-13 22:37:31 -05:00
orignal
4f70822b13
always persist crypto keys for public destinations
2020-01-12 10:03:30 -05:00
orignal
0007f304d0
don't pass from to HandleI2NPMessage
2020-01-07 15:20:55 -05:00
orignal
4afef91359
invoke HandleCloveI2NPMessage
2020-01-06 16:14:41 -05:00
orignal
815b6db0bf
HandleCloveI2NPMessage
2020-01-06 15:31:20 -05:00
orignal
a335841509
pass msgID to HandleDeliveryStatus
2020-01-06 14:37:40 -05:00
orignal
5337aa10f7
check AES tag first
2020-01-02 13:30:54 -05:00
orignal
9f79bdae9b
encryptor for ECIES-X25519-AEAD-Ratchet
2019-12-19 15:59:15 -05:00
orignal
db84be2488
use HKDF for NTCP2 key derivation data phase
2019-12-18 20:48:30 -05:00
orignal
599ec62bb0
use HKDF for NTCP2 key derivation data phase
2019-12-18 20:45:47 -05:00
orignal
19a88300c6
decrypt payload section
2019-12-18 14:44:02 -05:00
orignal
b5d55e1ffb
decrypt flags/static section
2019-12-17 16:34:47 -05:00
orignal
521fb83e38
initial code for ECIES-X25519-AEAD-Ratchet KDF
2019-12-17 16:18:40 -05:00
orignal
553d59c32b
decryptor for ECIES-X25519-AEAD-Ratchet
2019-12-11 13:38:36 -05:00
orignal
9ed58e5186
encode with highY
2019-12-10 14:10:12 -05:00
orignal
36eaaa748c
handle case when encoded key is (p-1)/2
2019-12-10 13:40:04 -05:00
orignal
5faf84c732
correct conversion from Little Endian
2019-12-10 12:51:39 -05:00
orignal
d7b819267f
check a for 0 in Legendre
2019-12-10 10:53:39 -05:00
orignal
7417867d0f
implemented Legendre
2019-12-10 10:45:08 -05:00
orignal
8d74905257
0.9.44
2019-12-10 10:44:19 -05:00
orignal
c38298c06e
Elligator decode
2019-12-09 16:11:46 -05:00
orignal
3100d587d1
use d%q
2019-12-09 13:23:17 -05:00
orignal
95df3e4b39
encode key
2019-12-06 20:29:03 -05:00
orignal
e6956d9bb0
calculate constants
2019-12-06 14:54:15 -05:00
orignal
2877900233
use 486662 for A
2019-12-05 16:13:59 -05:00
orignal
df1aa52e08
Elligator's encode
2019-12-05 16:03:11 -05:00
orignal
5fa2485a7d
removed reseed.i2p.net.in
2019-12-04 17:27:16 -05:00
orignal
29f0e10411
Elligator added
2019-12-04 15:37:24 -05:00
orignal
0abb871f3f
close socket after if accept failed
2019-11-20 13:00:50 -05:00
orignal
704fca969f
handle accept errors
2019-11-20 12:05:32 -05:00
orignal
6cfe4fa580
handle sending errors
2019-11-18 14:13:31 -05:00
orignal
515c086099
Use GetProcAddress for inet_pton. Fixed build error
2019-11-12 15:06:04 -05:00
orignal
34ce06ac17
some cleanup
2019-11-12 14:19:14 -05:00
orignal
a104c9881e
some cleanup
2019-11-12 11:57:34 -05:00
orignal
c3e3c091cc
correct implementation of GetMTUWindows for WindowsXP
2019-11-12 11:35:59 -05:00
orignal
651240113c
mark RI as unreachable if all connections failed
2019-11-12 10:03:33 -05:00
orignal
77189bf8e9
start over if an active session got disconnected
2019-11-12 09:38:22 -05:00
orignal
60fd3a4542
fixed #1434 use memset inster bzero
2019-11-12 07:17:57 -05:00
orignal
c66f9c8d6d
reset connection attempts before reconnect
2019-11-12 06:46:08 -05:00
orignal
a7e8dd04fe
2.29.0
2019-10-21 11:50:59 -04:00
orignal
dfdd76a1bb
fixed #1429 . Don't use monotonic timer for Win32
2019-10-15 10:32:29 -04:00
orignal
c2f47119ce
fixed #1424 . Check if .b32.i2p address string is valid
2019-09-23 13:42:15 -04:00
orignal
d6b1d0d4fb
remove incoming session from pending list when established
2019-09-22 21:01:34 -04:00
orignal
03a861745b
removed CloseSession
2019-09-20 20:09:25 -04:00
orignal
9a7aed20e9
handle error for SessionConfrimed send
2019-09-19 16:54:23 -04:00
orignal
b7f17d4cb1
client auth flag for B33 address
2019-09-06 11:02:19 -04:00
orignal
44a2549b81
2.28.0
2019-08-27 09:46:54 -04:00
orignal
e42efec220
correct outet plain text length in case of authKeys
2019-08-26 07:35:11 -04:00
orignal
9d06aa2f6a
pass authSalt or epk
2019-08-25 20:51:15 -04:00
orignal
80765a797b
correct outer cipher text len
2019-08-25 19:14:53 -04:00
orignal
0b5509a1ed
correct authClients offset
2019-08-25 14:54:43 -04:00
orignal
351c899807
cleanup incoming streams on stop
2019-08-23 10:00:49 -04:00
orignal
c8cbf425ac
check and send netid for NTCP2 and SSU
2019-08-13 14:55:18 -04:00
orignal
3872c2a3f5
use published encrypted instead orig type
2019-08-07 16:18:00 -04:00
orignal
e6a09b49c9
published encrypted flag
2019-08-07 15:43:03 -04:00
orignal
254d2b82b3
fixed #1393 . store streams by recvStreamID
2019-07-26 14:23:21 -04:00
orignal
97d9795fc9
pass encrepted LeaseSet auth keys
2019-07-16 16:31:17 -04:00
orignal
54071b0e5d
set and handle unpublished LeaseSet flag
2019-07-16 11:48:30 -04:00
orignal
925e8316c7
read i2cp.leaseSetAuthType, i2cp.leaseSetClient.dh.nnn and i2cp.leaseSetClient.psk.nnn from tunnel config
2019-07-12 20:58:17 -04:00
orignal
99e1b74023
create encrypted LeaseSet2 with authentication
2019-07-12 15:40:59 -04:00
orignal
7d68ccca53
create encrypted LeaseSet2 with authentication
2019-07-12 15:37:32 -04:00
orignal
a090114066
send data message wih raw type fpr raw datagrams
2019-07-10 13:31:49 -04:00
orignal
a605e4bab6
send and recieve raw datagrams
2019-07-09 21:33:55 -04:00
orignal
3f0534134d
check for malformed b33
2019-07-04 13:05:39 -04:00
orignal
3acfb129cd
2.27.0
2019-07-03 12:38:55 -04:00
orignal
6ccef66920
call shutdown before close
2019-06-26 10:47:16 -04:00
orignal
fecc0c4640
don't call destructor twice
2019-06-25 16:37:06 -04:00
orignal
8e919ddc8e
use monotonic clock for uptime
2019-06-19 11:43:04 -04:00
orignal
832a9ab6b5
don't set random NTCP2 port if already set
2019-06-18 15:47:58 -04:00
orignal
13732ac333
fix #1363 try connect in SSU's thread
2019-06-14 15:43:03 -04:00
orignal
3e932a55f4
fixed typo
2019-06-11 15:09:10 -04:00
orignal
74e8610ec9
DH auth for encrypted LeaseSet2
2019-06-11 10:40:53 -04:00
orignal
f6f45eab39
flood encrypted LeaseSet2 with store hash
2019-06-08 21:23:25 -04:00
orignal
41f4f4713e
handle i2cp.leaseSetPrivKey
2019-06-07 14:51:08 -04:00
orignal
213a292fd5
correct offsets for auth data
2019-06-07 11:59:48 -04:00
orignal
1c9e46dbb3
2.26.0
2019-06-07 10:04:57 -04:00
orignal
0a299284f8
correct check for PSK auth
2019-06-06 13:58:31 -04:00
orignal
347a5f7346
pass secret to encrypted LeaseSet2
2019-06-06 12:33:33 -04:00
R4SAS
c6a903572c
[HTTP] add PROFIND support
2019-06-06 18:07:17 +03:00
orignal
14f0d6d26b
extract client auth data
2019-06-05 15:57:20 -04:00
orignal
485f105555
fixed typo
2019-06-04 15:12:19 -04:00
orignal
686c0b776f
common blinding code for public and private keys
2019-06-04 14:47:40 -04:00
orignal
828862ea49
store hash for ECDSA blidning
2019-06-03 12:51:57 -04:00
orignal
c4dffa4dc8
remove obsolete reseeds
2019-06-01 09:37:02 -04:00
orignal
5e10549543
disable NTCP by default
2019-05-30 19:18:56 -04:00
orignal
685f45bd76
publish/unpublish NTCP2 address depending on network status
2019-05-30 17:52:44 -04:00
orignal
61d84dd4c1
publish/unpublish NTCP2 address depending on network status
2019-05-30 17:48:49 -04:00
orignal
4d10593bb1
publish/unpublish NTCP2 address depending on network status
2019-05-30 16:11:35 -04:00
orignal
fbb8903774
correct buffer size for ECDSA blinding
2019-05-30 13:57:43 -04:00
orignal
e8cac91bb7
blind ECDSA public key
2019-05-29 15:48:35 -04:00
orignal
8e3d16e9fb
update ipv6 addresses from SSU rather than NTCP or NTCP2
2019-05-29 11:36:58 -04:00
orignal
07405e57b9
fixed typo
2019-05-25 14:58:10 -04:00
orignal
354c9187db
detect our ipv6 address
2019-05-23 15:59:44 -04:00
orignal
af33df3004
common buffer size
2019-05-23 11:49:54 -04:00
orignal
78bfde237f
allocate actual RouterInfo's buffer size
2019-05-23 09:34:04 -04:00
orignal
7b9033d678
allocate actual RouterInfo's buffer size
2019-05-23 09:32:07 -04:00
orignal
f784cfad46
correct RouterInfo buffer size
2019-05-23 06:56:41 -04:00
orignal
e40c139ff1
blind ECDSA private key
2019-05-22 16:15:11 -04:00
orignal
60ec03237e
blidning for ECDSA
2019-05-16 15:49:07 -04:00
R4SAS
a91641e427
fix #823 , reindent code
2019-05-16 09:39:22 +03:00
orignal
743fa745b7
show b33 address for encrypted LeaseSet2
2019-05-14 14:42:10 -04:00
orignal
39400fd381
move key blinding code from LeaseSet.cpp to Blinding.cpp
2019-05-14 11:42:25 -04:00
orignal
5299ac35a6
create NTCP2 ipv6 address
2019-05-13 11:40:08 -04:00
orignal
ef76ed394c
publish SSU ipv6 address if NTCP if disabled
2019-05-12 13:36:26 -04:00
orignal
1472637de7
skip introducers for non-SSU address
2019-05-11 07:27:34 -04:00
orignal
3b8baa85a3
2.25.0
2019-05-09 10:21:11 -04:00
R4SAS
73921b1024
fix ipv6 fallback address
2019-05-08 00:45:52 +03:00
orignal
5e42947fbd
always lookup SSU session if peer's endpoint doesn't match
2019-04-25 12:54:44 -04:00
orignal
1bfb9b02f5
make sure remote endpoint matches stored with
2019-04-24 11:40:58 -04:00
orignal
f6199c6c17
print store hash for encrypted LeaseSet
2019-04-20 09:44:16 -04:00
orignal
d7e7f06e88
re-request encrypted LeaseSet
2019-04-17 15:53:07 -04:00
orignal
4c4e856a1a
ntcp2.addressv6 parameter
2019-04-17 14:40:00 -04:00
orignal
07bbbbaf61
fixed gcc 4.7 build
2019-04-17 12:42:43 -04:00
orignal
3236827781
add/removed NTCP addresses
2019-04-16 21:04:04 -04:00
orignal
0be664cc3d
publish NTCP2 address instead NTCP if NTCP is disabled
2019-04-15 16:32:16 -04:00
orignal
6cc6849ccc
use published timestamp for blinding
2019-04-12 14:05:07 -04:00
orignal
5d5cd71714
limit expiration by next midnight for encrypted LS2
2019-04-12 11:13:46 -04:00
orignal
d248343517
Handle CreateLeaseSet2 I2CP message for encrypted leasesets
2019-04-11 14:06:53 -04:00
orignal
64d800427f
allow HTTP headers without value
2019-04-10 15:25:09 -04:00
orignal
c4c896a833
publish encrypted LS2
2019-04-10 12:04:19 -04:00
orignal
b6b5bb3f75
publish LeaseSet with store hash
2019-04-09 15:36:10 -04:00
orignal
5d69bb7383
correct ecrypted LS2 layout
2019-04-09 10:34:05 -04:00
orignal
76e222079a
Merge branch 'openssl' of https://github.com/PurpleI2P/i2pd into openssl
2019-04-09 09:21:47 -04:00
orignal
73abb9278d
correct ecrypted LS2 size
2019-04-09 09:21:38 -04:00
orignal
8fd843e7ce
Merge pull request #1334 from rex4539/fix-typos
...
Fix typos
2019-04-08 17:36:55 -04:00
Dimitris Apostolou
6a497a23d9
Fix typos
2019-04-08 22:22:42 +03:00
orignal
3ac74e1091
create encrypted LS2
2019-04-08 13:27:21 -04:00
orignal
ef0fb48f1f
blind private keys
2019-04-05 16:03:58 -04:00
orignal
ea791309ad
moved credential and blinding to BlindedPublicKey
2019-04-02 16:32:18 -04:00
orignal
5b56f4007b
counter is always in Little Endian
2019-03-29 18:45:31 -04:00
orignal
e2071542bf
use 16 bytes iv for chacha20
2019-03-29 16:18:51 -04:00
orignal
cdb217b774
always initialize m_Pkey
2019-03-29 13:15:32 -04:00
orignal
3fd9d5f641
save b33 addresses
2019-03-28 16:06:53 -04:00
orignal
00b5fdce03
create stream to blinded dest
2019-03-27 16:04:46 -04:00
orignal
ff44bcc489
complete implementation of RedDSA
2019-03-24 18:42:52 -04:00
orignal
3d4d260a34
extract b33 address
2019-03-22 16:04:47 -04:00
orignal
8e4b9da97d
pass blinded key instead identity for encrypted LS2
2019-03-22 15:32:13 -04:00
orignal
cdfd411df7
2.24.0
2019-03-21 10:58:59 -04:00
orignal
aa4bddd6ec
common HKDF
2019-03-15 12:25:20 -04:00
orignal
8ec12a1b65
fixed race condition for publishing
2019-03-10 09:22:42 -04:00
orignal
0fbf552e95
lookup and handle encrypted LeaseSet2
2019-03-07 14:52:59 -05:00
orignal
09b1b120d7
update LeaseSet2 if store type changed
2019-03-07 14:51:05 -05:00
orignal
557244bc3f
verify blinding key for encrypted LS2
2019-03-07 11:55:47 -05:00
orignal
24c5ed1cff
calculate store hash for encrypted LeaseSet2
2019-03-06 16:08:04 -05:00
orignal
32e55ebd0c
blind public key for encrypted LeaseSet2
2019-03-05 15:51:24 -05:00
orignal
ea3070d02b
derivation of subcredentials for LeaseSet2
2019-03-05 12:41:01 -05:00
orignal
9aaba49a9f
decrypt and handle Layer 2 of encrypted LeaseSet 2
2019-03-04 15:47:35 -05:00
orignal
9b64be07a9
set chacha20 counter to 1
2019-03-04 15:08:03 -05:00
orignal
560ebcec8d
persist.addressbook parameter added
2019-03-01 14:42:20 -05:00
orignal
9b1fe4338b
reuse_address for ipv6 acceptor
2019-02-28 16:00:26 -05:00
orignal
9188e3ad3f
ChaCha20 decrypt
2019-02-28 13:31:51 -05:00
orignal
af65af5be9
H and HKDF for encrypted LeaseSet2
2019-02-27 15:52:47 -05:00
orignal
2f0115c300
handle RedDSA as EdDSA
2019-02-27 13:18:09 -05:00
orignal
0646461342
check published timestamp for LeaseSet2
2019-02-26 16:20:24 -05:00
orignal
846eac29dc
filter out unspecified addresses. Check floodfill status change
2019-02-24 18:26:58 -05:00
orignal
0f9e3c5b33
fix crash if public key is null
2019-02-22 13:17:43 -05:00
orignal
aa27746982
remove address string
2019-02-22 11:03:31 -05:00
R4SAS
d8a4954bf1
[NetDb] check PersistProfiles on load
...
* tabulation fixes
2019-02-22 18:37:32 +03:00
orignal
d40a029dae
eliminate extra copy
2019-02-20 12:36:05 -05:00
orignal
96d961c393
correct public key for EdDSA trasient key
2019-02-15 15:03:58 -05:00
orignal
7b6814e32d
correct flags
2019-02-14 21:22:49 -05:00
orignal
6fee2d3536
correct options szie
2019-02-14 17:49:23 -05:00
orignal
636fc633d4
send offline signature in streaming
2019-02-14 12:11:25 -05:00
orignal
72a239838e
publish offline signature
2019-02-12 14:56:39 -05:00
R4SAS
7d0d421724
[windows] handle unexpected conditions ( #1185 )
2019-02-12 04:27:09 +03:00
orignal
80ffe13f3e
correct offline signature layout
2019-02-08 15:12:51 -05:00
orignal
1eb726c9bb
create offline keys
2019-02-08 12:19:51 -05:00
orignal
1fa3ba8b42
read offline info
2019-02-07 16:04:31 -05:00
orignal
b6bfd66a49
use identity from LeaseSet
2019-02-06 21:19:44 -05:00
orignal
2cac9b03ff
common code for offline signatures
2019-02-06 13:36:03 -05:00
R4SAS
f5f4190803
catch error 10045 on stopping SAM acceptor ( #1233 ), fix warning in util
2019-02-06 03:03:37 +03:00
R4SAS
a14d554947
fix tray icon disappearing, var type warning, code tabulation
2019-02-06 00:24:01 +03:00
orignal
6d9e5147b5
handle offline signature
2019-02-05 15:32:18 -05:00
R4SAS
9c76368dbc
inet_pton for winxp
2019-02-05 14:13:23 +03:00
orignal
bd5122c6ea
fixed build error
2019-02-01 17:41:12 -05:00
orignal
6643258618
implement Update for LeaseSet2
2019-02-01 12:55:13 -05:00
orignal
bc3f02cb6b
fix #1290 . copy correct size if message didn't fit previous
2019-01-31 16:03:10 -05:00
orignal
d848ae332a
encryption keys priority
2019-01-30 14:10:40 -05:00
orignal
08ddc98303
initial LeaseSet2 support in I2CP
2019-01-29 11:30:31 -05:00
orignal
22c1ce3ea5
don't pick port 9150 (Tor browser)
2019-01-23 09:53:30 -05:00
orignal
60a282826c
2.23.0
2019-01-21 10:33:22 -05:00
orignal
65c2c7d80b
re-create LeaseSet if store type has changed
2019-01-16 19:00:17 -05:00
orignal
468a32a819
check LS2 transient key expires time
2019-01-15 18:56:26 -05:00
orignal
b89cf73ae2
correct encryption key type for LS2
2019-01-15 18:41:00 -05:00
orignal
9cf43dea1a
handle i2cp.leaseSetEncType
2019-01-15 15:43:21 -05:00
orignal
884cf756ed
remove invalid leasesets
2019-01-14 18:37:17 -05:00
orignal
3712749a94
extract timestamp for LS2
2019-01-14 13:49:27 -05:00
orignal
6569c4aa03
actual key size for LS2
2019-01-13 19:17:02 -05:00
orignal
d6b2b3c996
take key type for LS2 from identity
2019-01-13 08:34:34 -05:00
orignal
52a6a12a9a
correct LS2 creation
2019-01-12 18:25:10 -05:00
orignal
e647603dce
handle i2cp.leaseSetType parameter
2019-01-11 13:58:02 -05:00
orignal
dadf6174ba
create standard LS2
2019-01-10 11:52:34 -05:00
orignal
84de7675c4
don't copy LS2 for signature verification
2019-01-10 10:57:57 -05:00
orignal
9504e69598
LocalLeaseSet2 added
2019-01-09 14:51:47 -05:00
orignal
5398b651f7
handle LS2 in destinations
2019-01-09 12:47:47 -05:00
orignal
b5596c4596
handle encrypted LS2
2019-01-08 11:26:50 -05:00
orignal
8ca8bc810d
take elgamal percomputation from config
2019-01-08 09:23:14 -05:00
Rosen Penev
90f2b2d249
Fix compilation without deprecated OpenSSL APIs
2019-01-06 15:39:24 -08:00
orignal
f74b27c58c
check if chacha20 and poly1305 is presented in openssl build
2019-01-06 17:43:05 -05:00
orignal
e55e15693d
update LS2 leases
2019-01-02 15:40:48 -05:00
orignal
c54e6bafdb
process meta LS2
2019-01-02 14:19:10 -05:00
orignal
2e56c4895d
transient key signature verification
2019-01-02 09:43:18 -05:00
orignal
bce4224d6e
extract and verify LS2 transient key
2019-01-01 17:00:37 -05:00
orignal
812e2814bc
read flags from LS2 header
2018-12-31 14:23:48 -05:00
r4sas
7cd17f8e1f
build android app with llvm
2018-12-27 03:16:38 +03:00
orignal
6193b06708
LS2 signature verification and store type
2018-12-26 15:27:32 -05:00
orignal
12af68bdb5
initial support of LeaseSet2
2018-12-21 15:00:03 -05:00
orignal
1933e44719
reseeds update
2018-12-17 20:14:12 -05:00
orignal
8a987af244
initialize m_Pkey
2018-12-11 15:14:51 -05:00
orignal
65cbb06080
create ephemeral keys after getting connected
2018-12-07 19:24:46 -05:00
orignal
979ea9c252
removed address resolvers as discontinued
2018-12-07 12:27:06 -05:00
orignal
c7af2889fa
removed dummy initializer
2018-12-05 14:56:40 -05:00
orignal
5ab3390434
don't create dummy initializer for android
2018-12-05 11:39:48 -05:00
orignal
67f60f1889
set openssl no_config before boost::asio:ssl
2018-12-04 21:20:12 -05:00
orignal
985a468d0f
don't read openssl config file
2018-12-04 18:39:49 -05:00
orignal
34dc6fbdc1
check if session is terminated before sending
2018-12-04 16:10:52 -05:00
orignal
b57152cc25
common code for padding and sending termination and RouterInfo messages
2018-12-04 15:56:55 -05:00
orignal
dc9562e430
padding for termination message
2018-12-04 15:23:43 -05:00
orignal
05689fe183
padding for short messages
2018-12-04 15:00:10 -05:00
orignal
8f6f95211e
eliminate extra copy of RouterInfo
2018-12-04 12:56:49 -05:00
orignal
f30b6c9e6e
const reference to vector of buffers
2018-12-04 12:54:48 -05:00
orignal
12ac7d6a00
enable sending I2NP messages
2018-12-03 18:47:20 -05:00
orignal
10251a6447
fixed typo
2018-12-03 15:54:35 -05:00
orignal
089cbbc20a
rollback
2018-12-03 14:51:27 -05:00
orignal
95ab68acd1
don't copy I2NP messages to NTCP2 frame
2018-12-03 14:14:36 -05:00
orignal
abc4f6c70b
fixed bug with chacha20 encryption of short messages
2018-12-03 13:36:17 -05:00
orignal
8fc3a1f9c9
correct frame size for I2NP msgs
2018-12-03 12:29:24 -05:00
orignal
5c3d0fc02c
create I2NP blocks
2018-12-02 17:24:31 -05:00
orignal
7efb47fed4
send NTCP2 frame from I2NP messages
2018-12-02 14:24:39 -05:00
orignal
7692332f0e
don't inialize Chacha20 state twice
2018-11-30 21:31:06 -05:00
orignal
ef6db64e9f
correct chacha20 for multiple messages
2018-11-30 16:21:11 -05:00
orignal
e68f1dbc99
AEAD/Chacha20/Poly1305 encrypt multiple buffers
2018-11-30 14:41:14 -05:00
orignal
0c9ebc36d4
remove AVX and SSE for CipherBlock XOR
2018-11-27 14:33:31 -05:00
orignal
328c2182c2
alignment for tunnel message AES decryption
2018-11-27 10:35:17 -05:00
orignal
08706f5dfb
fixed typo
2018-11-25 18:49:59 -05:00
orignal
d49f165f0d
fixed build warning
2018-11-25 15:59:00 -05:00
orignal
cf0fc3a4a9
some performance improvements
2018-11-25 10:33:48 -05:00
orignal
72c8fd257c
eliminate extra buffer for Poly1305
2018-11-24 15:39:37 -05:00
orignal
fa620e41a4
correct alignment for polyKey
2018-11-24 14:41:17 -05:00
Jeff Becker
16b3108719
Merge remote-tracking branch 'purple/openssl' into openssl
2018-11-24 10:08:12 -05:00
Jeff Becker
f385c624c7
expose poly1305 digester
2018-11-24 10:07:17 -05:00
orignal
f7e9975192
restore BlockCipher XOR using SSE
2018-11-24 09:43:30 -05:00
orignal
cde989b59d
don't compile compatibility code if openssl 1.1.1
2018-11-22 12:13:16 -05:00
orignal
c0e263abd3
default value for m_PersistProfiles
2018-11-22 11:30:44 -05:00
R4SAS
79c0c11e80
configure persist of peer profiles
...
* If persist.profiles = false, peer profiles not stored on disk
* remove inet_pton for windows
* update configs
2018-11-22 00:13:23 +03:00
orignal
ca671551c8
flood NTCP2 RouterInfo if requested
2018-11-21 13:24:54 -05:00
orignal
42ed312384
handle NTCP2 RouterInfo flag
2018-11-21 11:23:48 -05:00
orignal
0e9074aaba
reduce start and stop time
2018-11-20 13:57:51 -05:00
orignal
8a549b83a2
NTP sync in separate thread
2018-11-16 12:49:04 -05:00
orignal
d7081c5f23
handle RouterInfo from NTCP2 in netdb's thread
2018-11-14 20:52:54 -05:00
orignal
588d64a30b
more NTP logging
2018-11-14 12:27:11 -05:00
orignal
8335bdf3d4
correct ntp servers
2018-11-14 11:47:50 -05:00
orignal
85394f2438
NTP time sync
2018-11-14 11:06:53 -05:00
asokolov
a26ed6fe6c
Merge remote-tracking branch 'upstream/openssl' into webroot
2018-11-09 16:30:54 +03:00
R4SAS
779228857e
2.22.0
2018-11-09 02:22:55 +00:00
asokolov
23ae220aa7
add webroot setting
2018-11-07 18:07:05 +03:00
orignal
b3fd8bd0ae
check if keys are available before sending termination message
2018-11-04 18:51:25 -05:00
orignal
bffeb237de
termination might be send for non-established session
2018-11-04 15:32:31 -05:00
orignal
23e3602ea1
common MixHash
2018-11-01 16:06:39 -04:00
orignal
34cfd205f6
create new static keys by X25519Keys
2018-11-01 10:43:31 -04:00
l-n-s
a141678119
Add --version flag to display i2pd and system libraries versions
2018-10-28 10:52:22 -04:00
orignal
96d109af81
fixed typo
2018-10-27 19:55:23 -04:00
orignal
a309eb9f3c
faster CipherBlock XOR implementation for non-AVX
2018-10-27 18:41:05 -04:00
orignal
d034dab265
fill m3p2 with SessionRequest
2018-10-26 09:58:18 -04:00
orignal
a2e84e5a1e
2.21.1
2018-10-22 09:19:39 -04:00
orignal
9439621849
fixed #1259 . read extra tunnels from tunnels.d
2018-10-19 15:23:46 -04:00
orignal
15ded89618
set cost=14 for unpublished NTCP2 addresses
2018-10-11 13:00:37 -04:00
orignal
b84f74c167
limit SSU message size to 32K
2018-10-11 11:17:14 -04:00
orignal
a97300f8be
fixed #1256 I2NP messages up to 64K
2018-10-10 11:31:55 -04:00
orignal
15899c10b2
2.21.0
2018-10-04 09:38:04 -04:00
orignal
af793395f0
don't publish O with X or P
2018-09-30 16:08:26 -04:00
orignal
8f41776858
check send queue size
2018-09-28 09:54:42 -04:00
orignal
5f7dda5ba8
treat extra bandwidth as high bandwidth
2018-09-22 14:12:46 -04:00
orignal
2dfa1ca0f2
check RouterInfo's timestamp in SessionConfirmed
2018-09-21 11:45:04 -04:00
orignal
358cdcf4c4
removed RSA signatures completly
2018-09-21 11:16:38 -04:00
orignal
c8f4ace5c4
update timestamp before publishing
2018-09-21 10:13:18 -04:00
orignal
5cac6ca8bb
read message body immediatly after length
2018-09-17 13:08:49 -04:00
orignal
fccad71df1
temporary buffer for EdDSA signature for openssl 1.1.1
2018-09-16 18:08:59 -04:00
orignal
97ae2674dc
always use EdDsa signer fallback
2018-09-14 21:54:45 -04:00
orignal
7c70affd7f
eddsa signer fallback
2018-09-14 21:23:16 -04:00
orignal
52ff568d86
fixed incorrect second signature
2018-09-14 18:58:40 -04:00
orignal
8de443ec4c
siphash from openssl 1.1.1
2018-09-11 13:26:29 -04:00
orignal
7d9893c614
fixed build error
2018-09-09 17:27:53 -04:00
orignal
3540712517
some cleanup
2018-09-09 08:38:12 -04:00
orignal
a8b1a86bd7
X25519Keys for static key
2018-09-08 22:08:08 -04:00
orignal
1babd3a5a2
separate X25519Keys
2018-09-08 16:52:42 -04:00
orignal
33aa8e2471
use x25519 from openssl 1.1.1 for ephemeral keys
2018-09-05 11:19:58 -04:00
orignal
2c58fe736b
fixed build error with openssl 1.1.1
2018-09-05 09:51:03 -04:00
orignal
2c3b19a539
use EdDSA from openssl 1.1.1
2018-09-03 17:39:49 -04:00
orignal
b67424643d
done insert NTCP2 ipv6 address twice
2018-08-27 18:56:57 -04:00
orignal
575a4c01c9
publish NTCP2 adress if port is specified
2018-08-27 18:35:35 -04:00
orignal
f0d4ee6618
pass NTCP2 ipv6 address
2018-08-27 16:01:47 -04:00
orignal
8753186a0d
publish NTCP2 ipv6 address if applicable
2018-08-27 15:01:43 -04:00
orignal
9dd38b99d6
check NTCP2 for addreses comparison
2018-08-26 09:40:27 -04:00
orignal
71ac0286b1
2.20.0
2018-08-23 10:24:44 -04:00
orignal
022f4d2c11
don't send message to not established session
2018-08-23 07:23:50 -04:00
orignal
b259ee89aa
send RouterInfo from NTCP2Server's thread
2018-08-22 12:33:43 -04:00
orignal
d9476fb5ca
set correct IV when NTCP2 address gets published
2018-08-19 16:17:57 -04:00
orignal
2d758ce963
change cost for NTCP and NTCP2
2018-08-18 13:52:35 -04:00
orignal
1dd003d26a
check m2p3len
2018-08-18 08:27:36 -04:00
orignal
5e110e9f7b
enable NTCP2 by default
2018-08-16 13:48:47 -04:00
orignal
77a409935d
license added
2018-08-16 13:46:59 -04:00
orignal
11142690a0
show correct value of time drift
2018-08-16 10:13:32 -04:00
orignal
02e8c5faca
fixed typo
2018-08-15 13:23:10 -04:00
orignal
c41081d35c
check timestamps
2018-08-15 11:42:56 -04:00
orignal
e4ab51329d
move handshake messages processing to NTCP2Establisher
2018-08-14 14:01:04 -04:00
orignal
86782aeb1b
don't send RouterInfo twice
2018-08-14 11:27:27 -04:00
orignal
49a44fc92e
assume siphash IV in Litte Endian
2018-08-13 14:07:57 -04:00
orignal
cd39a52c25
correct endianness for siphash length
2018-08-13 13:43:51 -04:00
l-n-s
29b91075d2
Don't add SSU/NTCP addresses to RI if they are disabled in config ( #1220 )
2018-08-12 02:36:00 -04:00
orignal
6d46fc9f9f
check send frame error code
2018-08-11 16:08:21 -04:00
orignal
a2c41c9e36
allow NTCP2 only transports
2018-08-10 15:35:43 -04:00
orignal
ee700ac861
fixed incorrect iv for published NTCP2 addresses
2018-08-10 15:14:07 -04:00
orignal
9884a4336f
don't connect to NTCP2 only address using NTCP
2018-08-10 13:42:59 -04:00
orignal
5b83d4bef8
move handshake messages creation to NTCP2Establisher
2018-08-10 10:53:34 -04:00
orignal
d320a89590
don't copy buffer to ifself
2018-08-09 16:32:43 -04:00
orignal
f7e4afc282
use same buffer for input and output for AEAD/Chacha20/Poly1305
2018-08-09 15:47:02 -04:00
orignal
88e87d589b
add incoming NTCP2 session to the sessions list
2018-08-09 14:20:10 -04:00
orignal
d8c6dede7e
moved NTCP2 handshake buffers to establisher
2018-08-09 12:53:36 -04:00
orignal
5cc84133e3
fixed incorrect lenght
2018-08-08 17:38:21 -04:00
orignal
f7728aa1f6
reuse NTCP2 frame buffers
2018-08-08 16:23:44 -04:00
orignal
2b61f9a731
fixed #1217 . verify decryption result
2018-08-07 10:35:25 -04:00
orignal
f407022fe6
connect to NTCP2 address if presented
2018-08-04 13:48:09 -04:00
orignal
41b9f19b01
get unpublished NTCP2 address
2018-08-04 08:47:58 -04:00
orignal
09c6faf923
don't overwrite NTCP2 keys
2018-08-03 21:16:35 -04:00
orignal
26d0177c01
always make NTCP address first
2018-08-03 20:28:29 -04:00
orignal
f7415c8a8f
enable/disable NTCP2 address
2018-08-03 14:49:28 -04:00
orignal
4cf79088f9
NTCP2 idle timeout
2018-08-03 13:19:35 -04:00
orignal
50cd321818
NTCP2 idle timeout
2018-08-03 13:10:32 -04:00
orignal
0a33c18e36
send termination message
2018-08-02 15:31:15 -04:00
orignal
6cf158ac63
check RouterInfo from SessionConfirmed
2018-08-02 13:58:47 -04:00
orignal
f96bfa6afa
send RouterInfo
2018-08-02 12:42:39 -04:00
orignal
2b64cf9126
publish i in correct place for NTCP2
2018-08-01 12:28:34 -04:00
orignal
a8dcfc44f5
handle termination message
2018-08-01 09:43:48 -04:00
orignal
0ff9c9da27
complete Bob side of NTCP2
2018-07-31 15:41:13 -04:00
orignal
07e7c2d852
ntcp2.published and ntcp2.port parameters
2018-07-31 12:59:38 -04:00
orignal
10e4b5b2a3
ignore NTCP2 addresses
2018-07-23 15:44:36 -04:00
orignal
998653ea9d
NTCP2 acceptors
2018-07-23 15:30:51 -04:00
orignal
1a38e925bf
publish NTCP2 address
2018-07-23 13:51:29 -04:00
orignal
c8f51380e6
publish NTCP2 for new routers
2018-07-21 16:59:58 -04:00
orignal
5bedfc1c84
post I2NP messages to NTCP2 thread
2018-07-19 12:46:19 -04:00
orignal
5001592fb4
replace ntcp2 by ntcp2.enabled
2018-07-19 09:45:24 -04:00
orignal
f6495e59c5
better MixHash
2018-07-19 09:27:59 -04:00
orignal
66bf431481
correct KDF1 calculation
2018-07-18 16:27:43 -04:00
orignal
d9685e991e
handle RouterInfo block
2018-07-18 15:57:18 -04:00
orignal
e0790700cd
don't connect to unpublished NTCP2 addresses
2018-07-18 14:19:12 -04:00
orignal
910a9600bd
display NTCP2 session in web console
2018-07-18 12:58:29 -04:00
orignal
fc52b2b940
fixed typo
2018-07-18 12:56:46 -04:00
orignal
b99f828583
send I2NP messages through NTCP2
2018-07-18 11:16:40 -04:00
orignal
f38891cace
fixed build for gcc < 4.8
2018-07-18 11:15:27 -04:00
orignal
8c5111e11a
handle NTCP2 I2NP messages
2018-07-17 15:17:05 -04:00
orignal
5575b981c8
enable NTCP2 as transport
2018-07-13 15:59:28 -04:00
yangfl
52f3081a40
fix typo
2018-07-10 17:39:21 +08:00
orignal
00c71dc26a
handle SessionConfirmed
2018-07-09 15:56:23 -04:00
orignal
5218c8584f
some refactoring of NTCP2 code
2018-07-04 14:15:40 -04:00
orignal
6054bd6621
NTCP2 session establisher
2018-07-03 16:26:02 -04:00
Dmitry Marakasov
4ffbb46cf9
Fix "macro expansion producing 'defined' has undefined behavior" clang warning
2018-06-27 22:31:01 +03:00
yangfl
dec848f072
use builtin __AVX__ and __AES__ macros and reduce code duplication
2018-06-27 17:32:38 +08:00
orignal
00df3f8d4e
2.19.0
2018-06-26 13:36:30 -04:00
orignal
5bc157eb19
send data frame for NTCP2
2018-06-25 12:28:07 -04:00
orignal
0aa618b938
process AEAD/Chacha20/Poly1305 frame for data phase of NTCP2
2018-06-22 15:02:49 -04:00
orignal
5884852612
correct usage of sipkeys
2018-06-22 12:20:35 -04:00
orignal
5b29592174
generate sipkeys for data pahse of NTCP2
2018-06-21 16:24:19 -04:00
orignal
96411cc93e
derive keys for siphash
2018-06-21 12:39:24 -04:00
R4SAS
7d862d8eba
service and daemon works as bool without values, other requires true/false
2018-06-21 09:40:53 +03:00
R4SAS
dd392941d0
update Config.cpp, links to examples, manpage
2018-06-21 09:40:53 +03:00
orignal
3cec5235c9
NTCP2 according to new specs
2018-06-20 16:09:22 -04:00
orignal
b5682012d3
process SessionRequest and send SessionCreated for NTCP2
2018-06-19 15:43:47 -04:00
orignal
9c7cadb191
better implementation of x25519
2018-06-19 11:14:22 -04:00
orignal
58c92b8405
aead/chacha20/poly1305 from openssl 1.1
2018-06-18 12:56:47 -04:00
R4SAS
985b618932
addng forgotten bracket
2018-06-16 23:07:03 +03:00
R4SAS
bdc7acffbe
remove zero_tokens(), update manpage
2018-06-16 22:38:59 +03:00
R4SAS
6bd73cdea2
Update help message, debian manpage. Prepare changelog message
2018-06-16 18:11:46 +03:00
orignal
e05110ff44
send RouterInfo in SessionConfirmed
2018-06-15 14:56:03 -04:00
orignal
706b976a28
handle and publish NTCP2 address
2018-06-15 12:52:43 -04:00
orignal
2bd7a92d20
send SessionConfirmed
2018-06-14 15:29:36 -04:00
orignal
6b37a41e00
correct ad calculation for SessionCreated
2018-06-14 10:45:25 -04:00
orignal
5447259e1a
AEAD/ChaCha20/Poly1305 decryption and SessionCreate prcessing
2018-06-13 16:16:23 -04:00
orignal
ee0ae0b74b
decrypt Y for NTCP2
2018-06-13 14:56:51 -04:00
orignal
966256ac32
correct Poly1305 calculation
2018-06-13 12:58:32 -04:00
orignal
6b9061515f
AEAD/ChaCha20/Poly1305 test added
2018-06-13 12:25:32 -04:00
orignal
df60e78766
AEAD/Chacha20/Poly1305 encryption
2018-06-13 11:41:46 -04:00
orignal
3b46e9f351
fixed typo
2018-06-12 14:55:40 -04:00
orignal
046a80cfe4
scalar multiplication for x25519
2018-06-12 12:42:20 -04:00
orignal
a8278fc78b
router's NTCP2 private keys
2018-06-11 15:33:48 -04:00
orignal
7f3127ac89
pass unencrypted X to KDF
2018-06-11 14:32:15 -04:00
orignal
7cdb021a1f
pass correct nonce to chacha20
2018-06-11 14:05:30 -04:00
orignal
74c0b729c2
connect to NTCP2
2018-06-11 12:29:30 -04:00
orignal
5cb81f8532
send SessionRequest message
2018-06-06 15:38:18 -04:00
orignal
4f23d7b7df
recognize routers with NTCP2
2018-06-06 11:51:34 -04:00
orignal
a70d0edf2e
encrypt SessionRequest options block
2018-06-05 16:15:33 -04:00
orignal
8c9eaccc11
KeyDerivationFunction for NTCP2
2018-06-05 15:37:08 -04:00