Commit Graph

5891 Commits

Author SHA1 Message Date
R4SAS
a74065f775 [qt] dont build UnixDaemon.cpp 2019-06-09 01:04:43 +03:00
R4SAS
48d02f7e09 [qt] update headers, fix ChaCha source name, remove duplicates 2019-06-08 22:24:11 +03:00
R4SAS
e60549f8df [qt] fix build 2019-06-08 21:16:20 +03:00
orignal
41f4f4713e handle i2cp.leaseSetPrivKey 2019-06-07 14:51:08 -04:00
orignal
213a292fd5 correct offsets for auth data 2019-06-07 11:59:48 -04:00
R4SAS
79630e844b
2.26.0 2019-06-07 17:25:55 +03:00
orignal
1c9e46dbb3 2.26.0 2019-06-07 10:04:57 -04:00
orignal
0a299284f8 correct check for PSK auth 2019-06-06 13:58:31 -04:00
orignal
347a5f7346 pass secret to encrypted LeaseSet2 2019-06-06 12:33:33 -04:00
R4SAS
c6a903572c [HTTP] add PROFIND support 2019-06-06 18:07:17 +03:00
orignal
14f0d6d26b extract client auth data 2019-06-05 15:57:20 -04:00
orignal
485f105555 fixed typo 2019-06-04 15:12:19 -04:00
orignal
686c0b776f common blinding code for public and private keys 2019-06-04 14:47:40 -04:00
orignal
828862ea49 store hash for ECDSA blidning 2019-06-03 12:51:57 -04:00
orignal
c4dffa4dc8 remove obsolete reseeds 2019-06-01 09:37:02 -04:00
orignal
3c1906e3d4
Merge pull request #1360 from khumarahn/openssl
link libi2pd to boost and zlib
2019-06-01 09:28:54 -04:00
Alexey Korepanov
7147a3694c link libi2pd to boost and zlib 2019-06-01 12:57:09 +01:00
orignal
64707dbb22 key blinding test 2019-05-31 11:57:16 -04:00
R4SAS
554e8eeef3
[appveyor] remove gcc-ada and gcc-objc packages
https://github.com/msys2/MINGW-packages/issues/5434#issuecomment-496706950
2019-05-31 16:32:32 +03:00
orignal
5e10549543 disable NTCP by default 2019-05-30 19:18:56 -04:00
orignal
685f45bd76 publish/unpublish NTCP2 address depending on network status 2019-05-30 17:52:44 -04:00
orignal
61d84dd4c1 publish/unpublish NTCP2 address depending on network status 2019-05-30 17:48:49 -04:00
orignal
4d10593bb1 publish/unpublish NTCP2 address depending on network status 2019-05-30 16:11:35 -04:00
orignal
fbb8903774 correct buffer size for ECDSA blinding 2019-05-30 13:57:43 -04:00
orignal
e8cac91bb7 blind ECDSA public key 2019-05-29 15:48:35 -04:00
orignal
7328ffa036
Merge pull request #1359 from rszibele/openssl
BOB modifications.
2019-05-29 14:07:30 -04:00
rszibele
a03e828317 BOB: status: forgot to pass destination for current tunnel. 2019-05-29 18:47:35 +02:00
rszibele
93d4dc70cf BOB fixes. 2019-05-29 18:05:03 +02:00
orignal
8e3d16e9fb update ipv6 addresses from SSU rather than NTCP or NTCP2 2019-05-29 11:36:58 -04:00
orignal
07405e57b9 fixed typo 2019-05-25 14:58:10 -04:00
orignal
354c9187db detect our ipv6 address 2019-05-23 15:59:44 -04:00
orignal
af33df3004 common buffer size 2019-05-23 11:49:54 -04:00
orignal
78bfde237f allocate actual RouterInfo's buffer size 2019-05-23 09:34:04 -04:00
orignal
7b9033d678 allocate actual RouterInfo's buffer size 2019-05-23 09:32:07 -04:00
orignal
f784cfad46 correct RouterInfo buffer size 2019-05-23 06:56:41 -04:00
orignal
e40c139ff1 blind ECDSA private key 2019-05-22 16:15:11 -04:00
orignal
edf4f7695d fix #1352. correct response for 'list' command 2019-05-22 12:45:50 -04:00
orignal
60ec03237e blidning for ECDSA 2019-05-16 15:49:07 -04:00
R4SAS
a91641e427 fix #823, reindent code 2019-05-16 09:39:22 +03:00
orignal
5c3992018f fixed #1350 use GetAddress insted GetIdentHash 2019-05-15 14:22:19 -04:00
R4SAS
f5b682619f
[webconsole] move b33 to spoiler, fix typo 2019-05-15 14:15:10 +03:00
orignal
743fa745b7 show b33 address for encrypted LeaseSet2 2019-05-14 14:42:10 -04:00
orignal
39400fd381 move key blinding code from LeaseSet.cpp to Blinding.cpp 2019-05-14 11:42:25 -04:00
orignal
5299ac35a6 create NTCP2 ipv6 address 2019-05-13 11:40:08 -04:00
orignal
ef76ed394c publish SSU ipv6 address if NTCP if disabled 2019-05-12 13:36:26 -04:00
orignal
1472637de7 skip introducers for non-SSU address 2019-05-11 07:27:34 -04:00
orignal
3b8baa85a3 2.25.0 2019-05-09 10:21:11 -04:00
R4SAS
73921b1024 fix ipv6 fallback address 2019-05-08 00:45:52 +03:00
R4SAS
ece140f18c [httpproxy] make addresshelper support configurable for every httpproxy 2019-04-25 23:06:14 +03:00
orignal
5e42947fbd always lookup SSU session if peer's endpoint doesn't match 2019-04-25 12:54:44 -04:00