orignal
|
ed04747b9d
|
resend SessionRequest and SessionCreated
|
2022-06-24 13:07:02 -04:00 |
|
orignal
|
827a88d772
|
exclude expired SSU2 introducers
|
2022-06-23 18:23:25 -04:00 |
|
orignal
|
bceae244c1
|
delete pending outgoind session when SessionCreated received
|
2022-06-22 13:15:25 -04:00 |
|
orignal
|
5de224d6bf
|
don't connect if pending connection already
|
2022-06-22 11:59:29 -04:00 |
|
orignal
|
dda25d431c
|
check if we can send HolePunch to partcular address
|
2022-06-21 16:20:39 -04:00 |
|
orignal
|
2a5cf3e4a8
|
SSU2 connect timer
|
2022-06-19 16:40:03 -04:00 |
|
orignal
|
5bb20cb039
|
token expiration threshold
|
2022-06-19 08:52:47 -04:00 |
|
orignal
|
2cc106b43e
|
bind SSU2 socket to specified interface
|
2022-06-17 15:16:12 -04:00 |
|
orignal
|
67252b90b3
|
generate new token with longer expiration time
|
2022-06-16 22:37:33 -04:00 |
|
orignal
|
93b5dc2dff
|
send new token block in SessionCreated
|
2022-06-13 17:55:41 -04:00 |
|
orignal
|
f7b6db5dad
|
PeerTest for connection through introducer
|
2022-06-11 21:26:23 -04:00 |
|
orignal
|
b918499f14
|
correct SSU2 server termination
|
2022-06-10 12:50:55 -04:00 |
|
orignal
|
2e4d8cdc8b
|
handle PeerTest msg 1
|
2022-06-09 18:04:37 -04:00 |
|
orignal
|
47460d86b2
|
verify signature and send peer test msg 5
|
2022-06-07 12:55:58 -04:00 |
|
orignal
|
d9fefe757e
|
SSU2/SSU2Session split
|
2022-06-05 19:33:36 -04:00 |
|
orignal
|
55e4bf6b65
|
set correct statuc code for peer test
|
2022-06-05 14:59:33 -04:00 |
|
orignal
|
4670b12d49
|
correct buffer size for token request
|
2022-06-04 08:18:45 -04:00 |
|
orignal
|
321ec8ae4d
|
correct size for Ack block with ranges
|
2022-06-03 19:16:52 -04:00 |
|
orignal
|
1ccbb8d10b
|
correct offset for nonce in peer test message
|
2022-06-03 14:02:31 -04:00 |
|
orignal
|
86c0accdce
|
check nonce for peer test msg 5
|
2022-06-03 13:18:37 -04:00 |
|
orignal
|
38d6c29ce9
|
correct timestamp size for peer test message
|
2022-06-03 08:39:54 -04:00 |
|
orignal
|
0cf9478cd4
|
create SSU2 session for peer test msgs 5-7
|
2022-06-02 20:12:25 -04:00 |
|
orignal
|
a04abd304a
|
don't send own hash for peer test msg 1
|
2022-06-02 18:23:51 -04:00 |
|
orignal
|
84aec9fe31
|
correct msg for first peer test message
|
2022-06-02 15:40:51 -04:00 |
|
orignal
|
d3a9cc8fde
|
check if session is established before sending peer test
|
2022-06-02 15:04:35 -04:00 |
|
orignal
|
87a434c377
|
start peer test for SSU2
|
2022-06-01 21:51:02 -04:00 |
|
orignal
|
593d6bf466
|
create initial peer test
|
2022-05-31 18:31:05 -04:00 |
|
R4SAS
|
6b4ffcff5a
|
cleanup code (spaces, tabs)
Signed-off-by: R4SAS <r4sas@i2pmail.org>
|
2022-05-20 17:44:29 +00:00 |
|
orignal
|
2cd3ebbdb3
|
copy peer test block
|
2022-05-14 19:18:58 -04:00 |
|
orignal
|
5e25e30330
|
check if there is only one unacked packet
|
2022-05-14 16:36:16 -04:00 |
|
orignal
|
5aa2a8f60f
|
handle peer tests
|
2022-05-13 20:38:18 -04:00 |
|
orignal
|
bb705a77cf
|
handle PeerTest message
|
2022-05-11 17:48:25 -04:00 |
|
orignal
|
da3f3ccac9
|
connect to reachable introducers only
|
2022-05-06 19:38:48 -04:00 |
|
orignal
|
1a1871e8cd
|
add RouterInfo block before RelayIntro
|
2022-05-06 15:02:09 -04:00 |
|
orignal
|
436992b069
|
send and process HolePunch message
|
2022-05-04 13:58:06 -04:00 |
|
orignal
|
18cb3912e5
|
fixed imccorect termination
|
2022-05-02 15:05:44 -04:00 |
|
orignal
|
5aebefe73f
|
connect through introducer
|
2022-05-01 10:33:25 -04:00 |
|
orignal
|
dc82105226
|
check status code and verify RelayResponse signature
|
2022-04-28 20:41:06 -04:00 |
|
orignal
|
5221f3ddc9
|
one SSU2 session per remote router
|
2022-04-28 13:11:51 -04:00 |
|
orignal
|
e970deb92b
|
check presense of introducers in SSU2 address
|
2022-04-28 11:43:33 -04:00 |
|
orignal
|
9db7ec6bb0
|
create and send RelayRequest
|
2022-04-27 18:52:44 -04:00 |
|
orignal
|
40340cf9c2
|
handle RelayResponse
|
2022-04-26 13:59:59 -04:00 |
|
orignal
|
45ebfe378b
|
correct Ack range
|
2022-04-23 11:11:49 -04:00 |
|
orignal
|
751da92c13
|
send relay response
|
2022-04-22 20:34:19 -04:00 |
|
orignal
|
e10ca637da
|
handle RelayIntro
|
2022-04-22 15:03:49 -04:00 |
|
orignal
|
c5d9d71a8a
|
create relay tag and relay request block
|
2022-04-21 15:47:36 -04:00 |
|
orignal
|
3e0f5d231d
|
send queue after batch of packets
|
2022-04-18 15:47:35 -04:00 |
|
orignal
|
6990f177ba
|
window size
|
2022-04-18 13:14:09 -04:00 |
|
orignal
|
4c91ae0085
|
check if end of list
|
2022-04-16 17:01:06 -04:00 |
|
orignal
|
43f74d4d5a
|
resend packet with new packet number
|
2022-04-16 15:42:11 -04:00 |
|
orignal
|
8c3e716c3f
|
ranges in ack block
|
2022-04-15 16:26:44 -04:00 |
|
orignal
|
05946125b5
|
handle single packet
|
2022-04-13 12:33:59 -04:00 |
|
orignal
|
1e2a0a4549
|
handle incoming packets in batch
|
2022-04-12 11:42:51 -04:00 |
|
orignal
|
f9d67b28ec
|
handle fragmented SessionConfirmed
|
2022-04-09 19:56:57 -04:00 |
|
orignal
|
678a1ae0fb
|
send fragmented messages
|
2022-04-09 11:42:34 -04:00 |
|
orignal
|
51cbffd097
|
don't lookup session for every sinle packet
|
2022-04-07 10:57:57 -04:00 |
|
orignal
|
207b13dcab
|
send correct acnt if gaps
|
2022-04-05 18:23:52 -04:00 |
|
orignal
|
3052dbd1e8
|
single receive thread for both ipv4 and ipv6
|
2022-04-05 16:27:52 -04:00 |
|
orignal
|
5891b1ceb2
|
separate receive thread
|
2022-04-05 16:14:13 -04:00 |
|
orignal
|
db5e90787c
|
update I2NP header after all fragments received
|
2022-04-04 13:25:08 -04:00 |
|
orignal
|
67e501f5c7
|
correct nonce for SessionCorfirmed part 2
|
2022-04-04 11:52:14 -04:00 |
|
orignal
|
2160001167
|
correct non for token request and retry encryption
|
2022-04-04 09:58:17 -04:00 |
|
orignal
|
f5f4150d17
|
fixed typo
|
2022-04-03 13:43:33 -04:00 |
|
orignal
|
82f9585b7a
|
handle fragments
|
2022-04-02 13:05:11 -04:00 |
|
orignal
|
eb561bb0c2
|
handle Ack ranges
|
2022-04-01 15:09:35 -04:00 |
|
orignal
|
81207999eb
|
check token in SessionRequest
|
2022-03-31 21:07:51 -04:00 |
|
orignal
|
2fef595b83
|
resend packets
|
2022-03-31 15:35:55 -04:00 |
|
orignal
|
2024e790ca
|
send I2NP messages
|
2022-03-30 18:04:12 -04:00 |
|
orignal
|
f9925c7374
|
hanlde Ack block
|
2022-03-30 15:03:45 -04:00 |
|
orignal
|
dd774b8dfd
|
store out of sequence packet numbers
|
2022-03-30 12:31:24 -04:00 |
|
orignal
|
30b83414ef
|
find SSU2 address by address type
|
2022-03-28 18:03:22 -04:00 |
|
orignal
|
a3f165d374
|
handle and send termination
|
2022-03-27 16:39:58 -04:00 |
|
orignal
|
7d5f51e357
|
don't send instant Ack for out-of-sequence message
|
2022-03-27 09:26:45 -04:00 |
|
orignal
|
371a339b18
|
encrypt Data header
|
2022-03-27 07:47:25 -04:00 |
|
orignal
|
7e7aee27b6
|
handle I2NP message block
|
2022-03-26 21:59:21 -04:00 |
|
orignal
|
53148fe58f
|
send Ack packet
|
2022-03-26 16:35:07 -04:00 |
|
orignal
|
56b6de6962
|
correct header decryption for Data message
|
2022-03-25 17:57:59 -04:00 |
|
orignal
|
44735681af
|
KDF and process Data message
|
2022-03-25 15:34:43 -04:00 |
|
orignal
|
fb6ecdde1e
|
handle TokenRequest
|
2022-03-23 21:48:41 -04:00 |
|
orignal
|
861166d8a9
|
send TokenRequest message:
|
2022-03-23 19:13:44 -04:00 |
|
orignal
|
2440ffbfc9
|
handle SSU2 SessionConfirmed
|
2022-03-23 14:06:55 -04:00 |
|
orignal
|
77c5dde320
|
send SessionConfirmed
|
2022-03-21 21:06:14 -04:00 |
|
orignal
|
aa49cad279
|
correct encrypted payload size for MixHash
|
2022-03-21 13:21:08 -04:00 |
|
orignal
|
f56ae240ab
|
don't delete peding endpoint if Retry received
|
2022-03-21 12:56:02 -04:00 |
|
orignal
|
e871a30a78
|
initialize connid in constructor
|
2022-03-20 16:53:32 -04:00 |
|
orignal
|
30e6984889
|
handle Retry message
|
2022-03-20 15:10:18 -04:00 |
|
orignal
|
87bf5c2418
|
cleanup pending sessions
|
2022-03-18 20:21:31 -04:00 |
|
orignal
|
5c9af1c613
|
MixHash with encrypted payload after decryption
|
2022-03-18 15:32:32 -04:00 |
|
orignal
|
ab9901525b
|
separated sockets for ipv4 and ipv6
|
2022-03-17 18:45:14 -04:00 |
|
orignal
|
3c5c375f71
|
connect to SSU2 address
|
2022-03-16 21:11:48 -04:00 |
|
orignal
|
7473d8c9aa
|
create and handle Address block
|
2022-03-16 13:13:31 -04:00 |
|
orignal
|
40c8a1bc1d
|
handle payload blocks
|
2022-03-15 20:49:41 -04:00 |
|
orignal
|
7b72d91549
|
receive incoming SSU2 packets
|
2022-03-14 19:25:59 -04:00 |
|
orignal
|
21c1ec9c8c
|
enable SSU2 server
|
2022-03-13 21:34:11 -04:00 |
|
orignal
|
68d015763e
|
recognize SSU2 addresses
|
2022-03-11 16:17:44 -05:00 |
|
orignal
|
7faa732f38
|
send SessionCreated
|
2022-03-08 21:33:21 -05:00 |
|
orignal
|
a152f36894
|
MixHash for SSU2 long header
|
2022-03-07 18:20:06 -05:00 |
|
orignal
|
d4ede6ff01
|
process SessionRequest
|
2022-03-05 18:39:27 -05:00 |
|
orignal
|
35542d803c
|
KDF for session request
|
2022-03-04 21:51:40 -05:00 |
|
orignal
|
f6ba776c12
|
SSU2 keys
|
2022-03-01 21:23:08 -05:00 |
|
orignal
|
1511dcb309
|
store endpoint and send packet
|
2022-02-28 21:46:00 -05:00 |
|
orignal
|
9f1a125ed9
|
decrypt connID for incoming packet
|
2022-02-27 20:15:14 -05:00 |
|
R4SAS
|
a51ef0cfc6
|
set of updates:
* [webconsole] change error handling code to restart acceptor after any
error
* [webconsole] call shutdown vefore stopping acceptor on exit
* update license headers for modified files, change year to file
creation year, not 2013 (when project started)
Signed-off-by: R4SAS <r4sas@i2pmail.org>
|
2022-02-18 09:20:06 +03:00 |
|
orignal
|
510fe43ec4
|
create and encrypt SessionRequest
|
2022-02-11 19:21:04 -05:00 |
|
orignal
|
04388325a8
|
KDF and encryption for SessionRequest
|
2022-02-10 14:03:09 -05:00 |
|
orignal
|
4211c733a2
|
s and i keys for all addresses
|
2022-02-05 17:14:25 -05:00 |
|
orignal
|
450266818a
|
Noise XK for SSU2
|
2022-02-05 15:58:39 -05:00 |
|
orignal
|
1e019157bb
|
SSU2 initial commit
|
2022-02-04 15:01:18 -05:00 |
|