Csaba Kiraly a9d0d0d69b
fix cross-connect key exchange
Since key exchange can be started both ways simultaneously, and
these might not get finalised with UDP transport, we can't be
sure what encryption key will be used by the other side:
- the one derived in the key-exchange started by us,
- the one derived in the key-exchange started by the other node.
To alleviate this issue, we store two decryption keys in each session.

Signed-off-by: Csaba Kiraly <csaba.kiraly@gmail.com>
2023-09-12 11:57:05 +02:00
2023-09-12 11:57:05 +02:00
2022-07-12 15:45:53 +03:00
2022-07-12 15:45:53 +03:00

A DHT implementation for Dagger

License: Apache License: MIT Stability: experimental CI (GitHub Actions) codecov

This DHT implementation is aiming to provide a DHT for Dagger with the following properties

  • flexible transport usage with
    • fast UDP based operation
    • fallback to TCP-based operation (maybe though libp2p)
    • support operation on top of libp2p
  • flexible message encoding that plays well with the above transports
  • provide node lookup, content storage/lookup, and provider storage/lookup operations

Current implementation is based on nim-eth's Discovery v5 implementation.

Base files were copied from status-im/nim-eth@779d767b024175a51cf74c79ec7513301ebe2f46

Description
A DHT based on Discv5 with libp2p provider records support
Readme
Languages
Nim 100%