- Dec 21, 2023
-
-
Renovate Bot authored
-
meskio authored
-
meskio authored
-
- Dec 16, 2023
-
-
Renovate Bot authored
-
- Dec 10, 2023
-
-
Renovate Bot authored
-
- Nov 27, 2023
-
-
Renovate Bot authored
-
- Oct 16, 2023
-
-
Renovate Bot authored
-
meskio authored
-
Renovate Bot authored
-
Renovate Bot authored
-
meskio authored
-
- Oct 05, 2023
-
-
When renovate attempts to process the dependencies for lyrebird, it attempts to go to: https://gitlab.com/yawning/edwards25519-extra.git?go-get=1. For some reason, that produces a redirect loop in gitlab, and it causes the renovate run to fail after a redirect limit is reached. You can see the redirect yourself by visiting that URL in your browser. With this change, by simply removing the .git at the end, renovate would visit https://gitlab.com/yawning/edwards25519-extra?go-get=1 and that does not produce a redirect loop.
-
- Sep 07, 2023
-
-
Pier Angelo Vendrame authored
Also, updated the man page file.
-
- Sep 06, 2023
-
-
meskio authored
-
- Sep 05, 2023
-
-
meskio authored
-
Renovate Bot authored
-
meskio authored
-
- Sep 04, 2023
-
-
Renovate Bot authored
-
- Aug 23, 2023
-
-
Renovate Bot authored
-
- Jul 12, 2023
-
-
vbauerster authored
-
- Jul 08, 2023
-
-
vbauerster authored
readFull method takes byte slice as param instead of allocating one inside. Advantage that caller is free to allocate slice or use const size array like: var addr [net.IPv4len]byte req.readFull(addr[:])
-
- Jul 03, 2023
- May 31, 2023
-
-
meskio authored
-
- May 29, 2023
-
- May 23, 2023
-
- Apr 18, 2023
-
-
meskio authored
Closes: tpo/anti-censorship/team#122
-
meskio authored
-
- Oct 25, 2022
-
-
meskio authored
-
- Oct 20, 2022
-
-
meskio authored
-
- Oct 19, 2022
-
- Sep 04, 2022
-
-
Yawning Angel authored
-
Yawning Angel authored
-
David Fifield authored
The Elligator inverse map uses the least significant bits of the private key, which clamping sets to 0, to choose a random low-order point to add to the public key, to ensure uniformity of representatives. The other ways that the private key is used, namely in calls to curve25519.ScalarMult and curve25519.ScalarBaseMult, do their own clamping when necessary and are documented to accept a uniformly random scalar.
-
David Fifield authored
See discussion under "Step 2" at https://elligator.org/key-exchange.
-
Yawning Angel authored
-
- Feb 04, 2022
-
-
Yawning Angel authored
-
- Feb 03, 2022
-
-
Yawning Angel authored
While this was a good idea back when I did it: * People don't like the fact that it requires a fork of utls to fix compatibility issues, and would rather spend 3 years complaining about it instead of spending a weekend to fix the issues in upstream. * Tor over meek is trivially identifiable regardless of utls or not. * Malware asshats ruined domain fronting for everybody.
-