- Feb 13, 2015
-
-
Felix Lange authored
For compatibility with cpp-ethereum
-
Felix Lange authored
-
Felix Lange authored
udp.Table was assigned after the readLoop started, so packets could arrive and be processed before the Table was there.
-
Felix Lange authored
addPeer doesn't allow self connects, but we can avoid opening connections in the first place.
-
Felix Lange authored
-
Felix Lange authored
The deflect logic called Disconnect on the peer, but the peer never ran and wouldn't process the disconnect request.
-
Felix Lange authored
There are now two deadlines, frameReadTimeout and payloadReadTimeout. The frame timeout is longer and allows for connections that are idle. The message timeout is still short and ensures that we don't get stuck in the middle of a message.
-
Felix Lange authored
-
Felix Lange authored
-
Felix Lange authored
This deletes the old NAT implementation.
-
Felix Lange authored
I have verified that UPnP and NAT-PMP work against an older version of the MiniUPnP daemon running on pfSense. This code is kind of hard to test automatically.
-
- Feb 10, 2015
-
-
Felix Lange authored
-
Felix Lange authored
-
Felix Lange authored
-
Felix Lange authored
-
- Feb 09, 2015
-
-
Felix Lange authored
-
Felix Lange authored
-
- Feb 06, 2015
-
-
Felix Lange authored
-
Felix Lange authored
-
Felix Lange authored
The unit test hooks were turned on 'in production'.
-
Felix Lange authored
The discovery RPC protocol does not yet distinguish TCP and UDP ports. But it can't hurt to do so in our internal model.
-
- Feb 05, 2015
-
-
Felix Lange authored
-
Felix Lange authored
Will be back soon. Maybe.
-
Felix Lange authored
Overview of changes: - ClientIdentity has been removed, use discover.NodeID - Server now requires a private key to be set (instead of public key) - Server performs the encryption handshake before launching Peer - Dial logic takes peers from discover table - Encryption handshake code has been cleaned up a bit - baseProtocol is gone because we don't exchange peers anymore - Some parts of baseProtocol have moved into Peer instead
-
Felix Lange authored
-
Felix Lange authored
-
Felix Lange authored
-
Felix Lange authored
crypto.Sha3(append(foo, bar)) --> crypto.Sha3(foo, bar) crypto.Sha3([]byte{}) --> crypto.Sha3()
-
Viktor Trón authored
-
Viktor Trón authored
-
Viktor Trón authored
-
Viktor Trón authored
-
Viktor Trón authored
-
Viktor Trón authored
-
Viktor Trón authored
- add const length params for handshake messages - add length check to fail early - add debug logs to help interop testing (!ABSOLUTELY SHOULD BE DELETED LATER) - wrap connection read/writes in error check - add cryptoReady channel in peer to signal when secure session setup is finished - wait for cryptoReady or timeout in TestPeersHandshake
-
Viktor Trón authored
chop first byte when cryptoid.PubKeyS is set from identity.Pubkey() since this is directly copied in the auth message
-
Viktor Trón authored
-
Viktor Trón authored
-
Viktor Trón authored
- set proper public key serialisation length in pubLen = 64 - reset all sizes and offsets - rename from DER to S (we are not using DER encoding) - add remoteInitRandomPubKey as return value to respondToHandshake - add ImportPublicKey with error return to read both EC golang.elliptic style 65 byte encoding and 64 byte one - add ExportPublicKey falling back to go-ethereum/crypto.FromECDSAPub() chopping off the first byte - add Import - Export tests - all tests pass
-
Viktor Trón authored
-