Commit Graph

163 Commits

Author SHA1 Message Date
orignal
1d9fdca9ce don't send address for initial PeerTest 2014-09-22 16:27:56 -04:00
orignal
1441c1371b adjust MTU for incoming SSU sessions 2014-09-18 14:37:29 -04:00
orignal
cb46d63058 read Identity from SessionConfirmed message 2014-09-18 14:16:16 -04:00
orignal
ddc18a9b28 acquire DH pair by demand only 2014-09-18 12:43:02 -04:00
orignal
1742a72fe0 use Tag<32> for SSU key 2014-09-17 20:43:47 -04:00
orignal
11a1201506 check if remote RouterInfo is presented 2014-09-14 21:53:00 -04:00
orignal
4e213550ff exclude desctroyed session to introducer from RouterInfo 2014-09-14 15:57:38 -04:00
orignal
5c2785cfca send HolePunch if unreachable 2014-09-13 19:43:25 -04:00
orignal
7ec2318bba don't try to connect to unreachable router from unreachable router 2014-09-13 14:39:01 -04:00
orignal
d3081a4e03 use data message for keep-alive 2014-09-12 11:41:29 -04:00
orignal
5cb691fb0b limit session to introducer by 1 hour 2014-09-09 13:45:12 -04:00
orignal
5435d20199 don't include same introducer twice 2014-09-09 08:03:05 -04:00
orignal
98fd1c7dbc cleanup introducers at startup 2014-09-08 21:53:55 -04:00
orignal
fc50b24809 unreachable mode 2014-09-08 16:43:20 -04:00
orignal
44751955cc select introducers 2014-09-06 20:43:20 -04:00
orignal
119603845b relay request from non-established session 2014-09-05 17:34:33 -04:00
orignal
9500d96789 session to introducer 2014-09-05 16:35:02 -04:00
orignal
4a39dd4818 zero-length address in RelayRequest 2014-09-05 11:58:22 -04:00
orignal
d1ae603b93 fixed incorrect PeerTest 2014-09-04 19:46:35 -04:00
orignal
3c610fa952 RelayTest for Bob and Charlie 2014-09-04 16:27:22 -04:00
orignal
10d9a4582f schdule connect timer 2014-09-04 10:20:44 -04:00
orignal
617e7bc81d closed non-etsablished SSU session by timeout 2014-09-04 09:52:02 -04:00
orignal
ebe73491c6 send PeerTest to Charlie 2014-09-03 19:31:43 -04:00
orignal
aaf386a0ab GetRandomEstablishedSession 2014-09-03 16:49:48 -04:00
orignal
ccbc4353d6 fixed race condition 2014-08-30 16:30:53 -04:00
orignal
180fbcdac6 ignore zero length packets 2014-08-19 11:03:08 -04:00
orignal
7995385a19 wait more for tunnel creation 2014-08-18 21:23:49 -04:00
orignal
9655891e4b proper endiness of relay tag 2014-08-18 13:46:11 -04:00
orignal
6dbf8d1457 don't save received IV 2014-07-21 22:13:57 -04:00
orignal
de377b45b4 delete unreachable SSU sessions 2014-07-20 18:16:55 -04:00
orignal
756a920c1a show number sent/received bytes through the status page 2014-07-20 17:12:36 -04:00
orignal
9ee049aa63 close SSU session if not established 2014-07-15 21:40:44 -04:00
orignal
2f601ce02f send ack per fragment. temporary disble check for duplicated through IV 2014-07-15 14:49:54 -04:00
orignal
a7406e03ab try to find existing SSU session to introducer first 2014-07-11 12:23:29 -04:00
orignal
226ef77927 fixed memory leak 2014-07-06 17:48:16 -04:00
orignal
ebd64c9337 check for duplicates 2014-06-17 13:15:32 -04:00
orignal
165a079928 moved sending acks to SSUData 2014-06-10 11:19:31 -04:00
orignal
7bb5054644 moved sending I2NP messages to SSUData 2014-06-10 10:39:29 -04:00
orignal
c9ace095f4 removed unused SSU states 2014-06-09 22:56:16 -04:00
orignal
f9cd2f6808 don't use crypto++ AES directly 2014-06-08 14:43:18 -04:00
orignal
a6cc2e647b eliminated multiple of 16 check for AES 2014-06-08 07:56:04 -04:00
orignal
6518727270 use CBCEncryption for session key encryption 2014-06-01 19:51:27 -04:00
orignal
d3812786fa session key decryption 2014-05-14 22:49:22 -04:00
orignal
44bba19283 fixed memory leak 2014-05-04 18:57:26 -04:00
orignal
9ec671ba69 split SSU to SSU and SSUData 2014-04-22 11:39:26 -04:00
orignal
bf2e833f26 separate thread for SSU server 2014-04-19 20:45:41 -04:00
orignal
607f2d29f2 check for 16 bytes boundary before encryption 2014-04-18 14:38:32 -04:00
orignal
3b0c03104c introducer support 2014-04-16 18:28:44 -04:00
orignal
b873f7c7f1 RelayResponse/RelayIntro 2014-04-16 16:47:56 -04:00
orignal
73d38f530f store relay tag if introducer 2014-04-16 15:54:28 -04:00
orignal
4341d285aa fxied crash 2014-04-15 17:44:44 -04:00
orignal
25e16f1693 implement session and mac key if shared key is shorter than 64 bytes 2014-04-15 11:53:24 -04:00
orignal
8694ed16fd decrypt message first 2014-04-13 16:59:54 -04:00
orignal
a510e7c2c6 check for duplicate and missing fragments 2014-04-12 21:13:30 -04:00
orignal
c9c38cccf6 send PeerTest if partly has 'B' capability only 2014-04-10 14:46:52 -04:00
orignal
9c7039cf78 recognize PeerTest back from Bob to Alice 2014-04-10 14:41:34 -04:00
orignal
747383a5e6 check if session key is available 2014-04-10 14:13:15 -04:00
orignal
2140f49665 fixed crash 2014-04-09 22:35:35 -04:00
orignal
e96c55bd98 fixed crash 2014-04-09 18:17:13 -04:00
orignal
d09bafa4a7 save peer test nonces 2014-04-09 14:58:30 -04:00
orignal
5099b997ad delete session with introducer 2014-04-09 13:55:31 -04:00
orignal
73066eb6c6 send relay request through connected session 2014-04-09 12:25:40 -04:00
orignal
31f906240e introducer session 2014-04-09 11:58:57 -04:00
orignal
8de75a2a90 save relay tag 2014-04-08 15:35:08 -04:00
orignal
76cb75f7c0 process relay intro 2014-04-08 14:03:15 -04:00
orignal
702b352be9 use seesion key only for SesssionDestroy message 2014-04-08 13:25:19 -04:00
orignal
40d5489429 delete inactive SSU sessions 2014-04-07 22:26:18 -04:00
orignal
c30dd2639a SSU timeout 2014-04-07 21:40:28 -04:00
orignal
03a5059617 peer test 2014-04-07 19:28:06 -04:00
orignal
9f8f91a2ee fixed small issues 2014-04-07 18:54:28 -04:00
orignal
be563dcbd1 process session created after decryption with intro key 2014-04-07 16:53:28 -04:00
orignal
64f195868e process intro key message 2014-04-07 16:41:29 -04:00
orignal
45d1571559 send peer test by Alice 2014-04-07 16:19:33 -04:00
orignal
130e1c2daf handle PeerTest 2014-04-07 15:31:38 -04:00
orignal
7f357e285f generate DH keys pair per SSU session 2014-04-04 14:56:46 -04:00
orignal
4970b4d14e generic SSU timer 2014-04-02 10:49:16 -04:00
orignal
88e6a76a1b don't send session request twice 2014-03-31 07:51:18 -04:00
orignal
9a5a04ca70 delete non-responding SSU sessions 2014-03-30 22:55:03 -04:00
orignal
3ae225fb41 use existing SSU session if available 2014-03-25 21:17:03 -04:00
orignal
b2fb466cde extract caps 2014-03-19 12:02:51 -04:00
orignal
9ef8ae99e2 close SSU session if MAC verification fails 2014-03-16 08:34:32 -04:00
orignal
06088ff7a2 fixed crash and few other small issues 2014-03-13 07:43:54 -04:00
orignal
6732ba21f9 inbound tunnel where an I2NP messages has been received from 2014-03-12 20:13:49 -04:00
orignal
5dfe19c6ed set established state after hole punch 2014-03-01 11:56:28 -05:00
orignal
48737864a3 process HolePunch 2014-02-28 21:28:05 -05:00
orignal
7300792033 set SessionCreated state 2014-02-25 20:37:39 -05:00
orignal
2ac36b1d31 verify SessionCreated 2014-02-24 21:43:26 -05:00
orignal
b9031c331d send SSU DeliveryStatus 2014-02-24 15:16:39 -05:00
orignal
64aa588a9b establish SSU session through relay 2014-02-21 16:13:36 -05:00
orignal
411ac5b898 try intro key if mac key failed 2014-02-12 16:36:13 -05:00
orignal
f8d105551f handle session destroyed 2014-02-11 15:51:32 -05:00
orignal
4862b594e8 use SSU if NTCP is not available 2014-02-10 19:27:55 -05:00
orignal
c5f70d4559 wait for DeliveryStatus message 2014-02-10 15:13:16 -05:00
orignal
735f6bd72a SSU send message 2014-02-09 18:28:34 -05:00
orignal
c266575528 eliminate unnecessary const_cast 2014-02-09 08:52:56 -05:00
orignal
ec5eafafeb external IP detection 2014-02-08 21:06:40 -05:00
orignal
202e3eeb2a process ACKs 2014-02-07 21:42:35 -05:00
orignal
1c1103dcce send ack 2014-02-07 15:47:10 -05:00
orignal
656392fe1e handle SSU I2NP header 2014-02-07 11:26:00 -05:00
orignal
d04f9e723c handle recieved I2NP message 2014-02-06 10:16:50 -05:00