Commit Graph

  • 85b88b8749 second x25519 for new session reply orignal 2020-01-30 19:30:30 -05:00
  • 239c8b5172 destination delivery instructions orignal 2020-01-30 11:48:32 -05:00
  • 8c800dc178 save aepk from new session message orignal 2020-01-29 21:57:10 -05:00
  • cdd068d99a correct message size orignal 2020-01-29 19:27:38 -05:00
  • 48fa10b080 incoming ECIESX25519AEADRatchet messages hanler orignal 2020-01-29 15:54:11 -05:00
  • a1dbec0fcb handle new session reply orignal 2020-01-29 12:54:26 -05:00
  • abe668f1c3 fixed build error orignal 2020-01-28 10:31:35 -05:00
  • 77440c235d replaced map by unordered_map orignal 2020-01-28 10:03:51 -05:00
  • fd1ee48dbe datetime and padding blocks orignal 2020-01-23 14:26:40 -05:00
  • 205e807b66 reset keys orignal 2020-01-22 21:42:30 -05:00
  • 34295adb05 attach LeaseSet clove orignal 2020-01-22 14:26:47 -05:00
  • 7c212bef63 add new session to the list after reply received orignal 2020-01-22 11:27:47 -05:00
  • 76f95644b7 fixed #1461. Use openssl's HKDF for 1.1.1 anf higher orignal 2020-01-22 09:59:08 -05:00
  • 928b90d5bc fixed #1461. Use openssl's HKDF for 1.1.1 anf higher orignal 2020-01-22 09:50:50 -05:00
  • 09c6c2a4f3 decode aepk and bepk back orignal 2020-01-21 21:09:19 -05:00
  • 2b2bd733e9 correct sharedkey for new outgoing session orignal 2020-01-21 19:13:23 -05:00
  • 0d2d7e5e71 fixed Elligator tests orignal 2020-01-21 17:53:48 -05:00
  • 6142e93252 session tag for ECIESx25519 sessions orignal 2020-01-21 14:40:23 -05:00
  • ccec3376ba try another ephemeral keys if elligator encoding failes orignal 2020-01-21 12:19:20 -05:00
  • f497a74ec4 set random two highest bits orignal 2020-01-21 12:18:31 -05:00
  • 0e666e7d6a encoding fail test orignal 2020-01-21 10:53:11 -05:00
  • f498fabd27 fix for openssl 1.1 orignal 2020-01-21 10:52:51 -05:00
  • 8b49a55442 ratchet tagsets orignal 2020-01-20 15:17:38 -05:00
  • a26eb942a9 Merge pull request #1458 from neheb/jjjjj orignal 2020-01-20 07:16:00 -05:00
  • eabcafa516 replace random_shuffle with shuffle Rosen Penev 2020-01-16 22:10:15 -08:00
  • 6cc388c1bc use HKDF for MixKey orignal 2020-01-18 14:43:36 -05:00
  • 62e39ddfbd new session reply orignal 2020-01-17 14:11:15 -05:00
  • 80373623cd create payload orignal 2020-01-17 11:21:41 -05:00
  • 451c3945f0 create new ECIESX25519AEADRatchet session if not found orignal 2020-01-16 19:33:00 -05:00
  • 00cb15d9b4 fixed tyypo orignal 2020-01-16 18:03:51 -05:00
  • 67dd59125e new outgoing ECIESX25519AEADRatchet session orignal 2020-01-16 16:34:13 -05:00
  • b6800dd125 lookup ECIESX25519AEADRatchet session by static key orignal 2020-01-16 15:45:22 -05:00
  • dc9da69509 derive ECIESX25519AEADRatchetSession from GarlicRoutingSession orignal 2020-01-16 14:59:19 -05:00
  • d7d964bf57 GarlicRoutingSession/ElGamalAESSession split orignal 2020-01-16 14:31:01 -05:00
  • d6d9f05443 Merge pull request #1456 from PurpleI2P/openssl orignal 2020-01-16 14:20:47 -05:00
  • bcfe44db54 handle tunnel delivery instructioin for ECIESx25519 orignal 2020-01-16 12:47:08 -05:00
  • 376bf6ba72 correct message size for ECIESx25519 orignal 2020-01-15 19:22:42 -05:00
  • f651baab25 ECIESX25519AEADRatchetSession added orignal 2020-01-15 15:13:43 -05:00
  • 61752e2aab correct ciphertext length orignal 2020-01-13 22:37:31 -05:00
  • b7d3fd959e Merge pull request #1454 from rex4539/dead-strip orignal 2020-01-13 09:17:05 -05:00
  • 7ac05f8487 Pass -dead_strip -dead_strip_dylibs -bind_at_load on macOS Dimitris Apostolou 2020-01-13 14:47:15 +02:00
  • 5cfc574f9a Update Dockerfile donarrock 2020-01-12 16:24:21 +01:00
  • 4f70822b13 always persist crypto keys for public destinations orignal 2020-01-12 10:03:30 -05:00
  • 0007f304d0 don't pass from to HandleI2NPMessage orignal 2020-01-07 15:20:55 -05:00
  • 4afef91359 invoke HandleCloveI2NPMessage orignal 2020-01-06 16:14:41 -05:00
  • 815b6db0bf HandleCloveI2NPMessage orignal 2020-01-06 15:31:20 -05:00
  • 433d3bf582 Merge branch 'openssl' of https://github.com/PurpleI2P/i2pd into openssl orignal 2020-01-06 14:38:13 -05:00
  • a335841509 pass msgID to HandleDeliveryStatus orignal 2020-01-06 14:37:40 -05:00
  • 26ad793d82 use unscoped storage (fixes usage on android 10) r4sas 2020-01-05 23:04:08 +00:00
  • 5337aa10f7 check AES tag first orignal 2020-01-02 13:30:54 -05:00
  • 9f79bdae9b encryptor for ECIES-X25519-AEAD-Ratchet orignal 2019-12-19 15:59:15 -05:00
  • db84be2488 use HKDF for NTCP2 key derivation data phase orignal 2019-12-18 20:48:30 -05:00
  • 599ec62bb0 use HKDF for NTCP2 key derivation data phase orignal 2019-12-18 20:45:47 -05:00
  • 19a88300c6 decrypt payload section orignal 2019-12-18 14:44:02 -05:00
  • b5d55e1ffb decrypt flags/static section orignal 2019-12-17 16:34:47 -05:00
  • 521fb83e38 initial code for ECIES-X25519-AEAD-Ratchet KDF orignal 2019-12-17 16:18:40 -05:00
  • 553d59c32b decryptor for ECIES-X25519-AEAD-Ratchet orignal 2019-12-11 13:38:36 -05:00
  • 9ed58e5186 encode with highY orignal 2019-12-10 14:10:12 -05:00
  • 36eaaa748c handle case when encoded key is (p-1)/2 orignal 2019-12-10 13:40:04 -05:00
  • 4d7b86ca26 elligator test added orignal 2019-12-10 13:20:23 -05:00
  • 5faf84c732 correct conversion from Little Endian orignal 2019-12-10 12:51:39 -05:00
  • d7b819267f check a for 0 in Legendre orignal 2019-12-10 10:53:39 -05:00
  • 7417867d0f implemented Legendre orignal 2019-12-10 10:45:08 -05:00
  • 8d74905257 0.9.44 orignal 2019-12-10 10:44:19 -05:00
  • c38298c06e Elligator decode orignal 2019-12-09 16:11:46 -05:00
  • 3100d587d1 use d%q orignal 2019-12-09 13:23:17 -05:00
  • ba849d0300 Merge branch 'openssl' of https://github.com/PurpleI2P/i2pd into openssl orignal 2019-12-06 20:29:29 -05:00
  • 95df3e4b39 encode key orignal 2019-12-06 20:29:03 -05:00
  • 72492e33a0 appveyor: drop msys2 overwrite R4SAS 2019-12-07 01:02:23 +00:00
  • 934f1269f5 appveyor: replace deprecated --force in msys2 R4SAS 2019-12-07 00:59:33 +00:00
  • e6956d9bb0 calculate constants orignal 2019-12-06 14:54:15 -05:00
  • 2877900233 use 486662 for A orignal 2019-12-05 16:13:59 -05:00
  • df1aa52e08 Elligator's encode orignal 2019-12-05 16:03:11 -05:00
  • 5fa2485a7d removed reseed.i2p.net.in orignal 2019-12-04 17:27:16 -05:00
  • 29f0e10411 Elligator added orignal 2019-12-04 15:37:24 -05:00
  • 39300a5bbf removed reseed.i2p.net.in orignal 2019-11-28 17:49:36 -05:00
  • 35d6268675 README: explicit linux distro supported Alexandre ZANNI 2019-11-23 22:52:31 +01:00
  • 0abb871f3f close socket after if accept failed orignal 2019-11-20 13:00:50 -05:00
  • 704fca969f handle accept errors orignal 2019-11-20 12:05:32 -05:00
  • 95debf8c80 update mingw build script R4SAS 2019-11-19 14:29:55 +03:00
  • dd94b77b2a use GetTickCount dll pointer, add USE_WINXP to makefile R4SAS 2019-11-19 13:50:16 +03:00
  • 6cfe4fa580 handle sending errors orignal 2019-11-18 14:13:31 -05:00
  • 515c086099 Use GetProcAddress for inet_pton. Fixed build error orignal 2019-11-12 15:06:04 -05:00
  • 34ce06ac17 some cleanup orignal 2019-11-12 14:19:14 -05:00
  • a104c9881e some cleanup orignal 2019-11-12 11:57:34 -05:00
  • c3e3c091cc correct implementation of GetMTUWindows for WindowsXP orignal 2019-11-12 11:35:59 -05:00
  • 651240113c mark RI as unreachable if all connections failed orignal 2019-11-12 10:03:33 -05:00
  • 77189bf8e9 start over if an active session got disconnected orignal 2019-11-12 09:38:22 -05:00
  • 60fd3a4542 fixed #1434 use memset inster bzero orignal 2019-11-12 07:17:57 -05:00
  • c66f9c8d6d reset connection attempts before reconnect orignal 2019-11-12 06:46:08 -05:00
  • 569088eaca 2.29.0 2.29.0 orignal 2019-10-21 12:02:43 -04:00
  • 13e09e231d Merge pull request #1432 from PurpleI2P/openssl orignal 2019-10-21 11:52:22 -04:00
  • a7e8dd04fe 2.29.0 orignal 2019-10-21 11:50:59 -04:00
  • dfdd76a1bb fixed #1429. Don't use monotonic timer for Win32 orignal 2019-10-15 10:32:29 -04:00
  • 28aac6f93b fix bogus date in changelogs R4SAS 2019-10-07 21:18:46 +03:00
  • c2f47119ce fixed #1424. Check if .b32.i2p address string is valid orignal 2019-09-23 13:42:15 -04:00
  • d6b1d0d4fb remove incoming session from pending list when established orignal 2019-09-22 21:01:34 -04:00
  • 03a861745b removed CloseSession orignal 2019-09-20 20:09:25 -04:00
  • 9a7aed20e9 handle error for SessionConfrimed send orignal 2019-09-19 16:54:23 -04:00
  • b7f17d4cb1 client auth flag for B33 address orignal 2019-09-06 11:02:19 -04:00