fix that one thing so I can try and extract the base64 key and derive the base32 key

This commit is contained in:
idk
2018-09-08 08:58:27 -04:00
parent 4321f91f4b
commit d029ac0afd
2 changed files with 20 additions and 10 deletions

View File

@ -179,12 +179,12 @@ TLS configuration is experimental. It might not be possible(To multiplex http
and https on the same SAM tunnel).
-----BEGIN PGP SIGNATURE-----
iQEzBAEBCAAdFiEEcNIGBzi++AUjrK/311wDs5teFOEFAluTibwACgkQ11wDs5te
FOFwcgf/VvPwSPQ/gbqb7+pZ2cV0iJsrdBMbWHhvYSc1MFpxUXB3ylWtmFzhgLZC
fqj3/ZIahXyPow8CVg7wKlLgWmMVdAQjHosnH1lP0t7/5k71JsvaPbSMqlfhk5hG
mFWQf0PrsaQGkY64Ljo4VY++fe6RfEub1uvgL5Qy7LoTwXwGUW7OSk2QXgiucZmV
Tom+ZZN1Z/cuOn0DiGG5XRprbT5ZkWdcUZqb9/TXgU0nVZWM6+E1jUmPC9tMHvZX
UiEWhjuR30ktZhQ0WEaRfcwPr6LCDfsoqdaagHEwGpPwwNE8n07OE7850L2pyihQ
AFJ1kkd6IhMja3VA6Rs15zmrkf1wrQ==
=tCDn
iQEzBAEBCAAdFiEEcNIGBzi++AUjrK/311wDs5teFOEFAluTx3AACgkQ11wDs5te
FOEXoggAjWPpfls4LZNR0FFUUO3bJSDO8z5bJRXKQmrfSHDYZ9yOKJAHTXP+/FGe
yzwZjK4HPbvBFrkn9Y1FP0cr5ODB29LpPCyzCGtSquFXaIPNkDqqip8LkiDtaDsM
nGikV0ExZkCMGphDGQY8qlYwdFcNjUyJhziwhb+TQTd12XrdLwTJ4XkXOVwLAcsO
MD6UhhdkE3iQlbsetgxTrM4r7fNwkc8q5Gf4EiMGyiujzsX2iI72cVB8pxklMIzE
yZdAeE9GH5gZXGtnjOGcWt670aDDYtCsUIyf59/6CVzR/dL0JHF1lkw2pWLtmSfT
Y86v7DX6Jzz95bxnxDHWgyQnTPp+WA==
=b50r
-----END PGP SIGNATURE-----

View File

@ -1,9 +1,11 @@
package samforwarder
import (
"bufio"
"io"
"log"
"net"
"net/http"
"os"
"path/filepath"
"strings"
@ -100,13 +102,21 @@ func (f *SAMForwarder) sam() string {
}
func (f *SAMForwarder) forward(conn net.Conn) {
var request *http.Request
var err error
client, err := net.Dial("tcp", f.Target())
if err != nil {
log.Fatalf("Dial failed: %v", err)
}
log.Printf("Connected to localhost %v\n", conn)
if Type == "http" {
//
if f.Type == "http" {
request, err = http.ReadRequest(bufio.NewReader(conn))
if err != nil {
log.Fatal(err)
}
request.Header.Add("X-I2p-Dest-Base64", "test")
request.Header.Add("X-I2p-Dest-Base32", "test")
//request.Header.Add("X-I2p-Dest-Hash", "test")
}
go func() {
defer client.Close()