- Dec 18, 2017
-
-
Felix Lange authored
The tx data field is called "input" in returned objects and "data" in argument objects. Make it so "input" can be used, but bail if both are set.
-
Péter Szilágyi authored
accounts/keystore: Improved error message
-
Armin authored
* Fix for #15668
-
Péter Szilágyi authored
p2p/discover: fix leaked goroutine in data expiration
-
Péter Szilágyi authored
cmd/geth: add support for geth --rinkeby attach
-
ferhat elmas authored
-
- Dec 15, 2017
-
-
Sorin Neacsu authored
-
Felix Lange authored
This adds the inverse to DecompressPubkey and improves a few minor details in crypto/secp256k1.
-
- Dec 14, 2017
-
-
Péter Szilágyi authored
crypto: Fix comment typo
-
George Ornbo authored
-
rhaps107 authored
Fixes #15408 Fixes #14432
-
Péter Szilágyi authored
consensus/ethash: relax requirements when determining future-blocks
-
- Dec 13, 2017
-
-
Felix Lange authored
-
- Dec 12, 2017
-
-
Vitaly V authored
-
holisticode authored
This commit adds mocker functionality to p2p/simulations. A mocker allows to starting/stopping of nodes via the HTTP API.
-
Zach authored
-
yoza authored
-
- Dec 11, 2017
-
-
holisticode authored
This commit adds a TOML configuration option to swarm. It reuses the TOML configuration structure used in geth with swarm customized items. The commit: * Adds a "dumpconfig" command to the swarm executable which allows printing the (default) configuration to stdout, which then can be redirected to a file in order to customize it. * Adds a "--config <file>" option to the swarm executable which will allow to load a configuration file in TOML format from the specified location in order to initialize the Swarm node The override priorities are like follows: environment variables override command line arguments override config file override default config.
-
Felix Lange authored
With this change, key, err := crypto.HexToECDSA("000000...") returns nil key and an error instead of a non-nil key with nil X and Y inside. Issue found by @guidovranken.
-
Felix Lange authored
Issue found by @guidovranken
-
Guillaume Ballet authored
Now that the AES salt has been moved to the payload, padding must be adjusted to hide it, lest an attacker guesses that the packet uses symmetric encryption.
-
- Dec 09, 2017
-
-
Michael Ruminer authored
-
Alejandro Isaza authored
-
Péter Szilágyi authored
-
- Dec 08, 2017
-
-
Guillaume Ballet authored
-
Sorin Neacsu authored
-
Guillaume Ballet authored
As per EIP-627, the salt for symmetric encryption is now part of the payload. This commit does that.
-
Martin Holst Swende authored
-
- Dec 07, 2017
-
-
Felix Lange authored
Also remove installation steps for fuse and golang.org/x/tools/cmd/cover because they're not required anymore.
-
Airead authored
-
- Dec 06, 2017
-
-
Benoit Verkindt authored
Fixes #15196
-
Felix Lange authored
We need those operations for p2p/enr. Also upgrade github.com/btcsuite/btcd/btcec to the latest version and improve BenchmarkSha3. The benchmark printed extra output that confused tools like benchstat and ignored N.
-
- Dec 05, 2017
-
-
Sorin Neacsu authored
-
- Dec 04, 2017
-
-
Steven Roose authored
Also unexport isHex, hasHexPrefix because IsHexAddress is the only caller. Fixes #15550
-
ferhat elmas authored
-
- Dec 01, 2017
-
-
ferhat elmas authored
-
Matthew Di Ferrante authored
Generator in the current lib uses -2 as the y point when doing ScalarBaseMult, this makes it so that points/signatures generated from libs like py_ecc don't match/validate as pretty much all other libs (including libsnark) have (1, 2) as the standard generator. This does not affect consensus as the generator is never used in the VM, points are always explicitly defined and there is not ScalarBaseMult op - it only makes it so that doing "import github.com/ethereum/go-ethereum/crypto/bn256" doesn't generate bad points in userland tools.
-
Rob authored
Updated use of Parallel and added some subtests to help isolate them. Increased timeout in RequestHeadersByNumber so it doesn't time out and causes other tests to break.
-
Guillaume Ballet authored
-
Lewis Marshall authored
p2p/simulations: introduce dialBan - Refactor simulations/network connection getters to support avoiding simultaneous dials between two peers If two peers dial simultaneously, the connection will be dropped to help avoid that, we essentially lock the connection object with a timestamp which serves as a ban on dialing for a period of time (dialBanTimeout). - The connection getter InitConn can be wrapped and passed to the nodes via adapters.NodeConfig#Reachable field and then used by the respective services when they initiate connections. This massively stablise the emerging connectivity when running with hundreds of nodes bootstrapping a network. p2p: add Inbound public method to p2p.Peer p2p/simulations: Add server id to logs to support debugging in-memory network simulations when multiple peers are logging. p2p: SetupConn now returns error. The dialer checks the error and only calls resolve if the actual TCP dial fails.
-