Commit Graph

50 Commits

Author SHA1 Message Date
orignal
8de75a2a90 save relay tag 2014-04-08 15:35:08 -04:00
orignal
76cb75f7c0 process relay intro 2014-04-08 14:03:15 -04:00
orignal
702b352be9 use seesion key only for SesssionDestroy message 2014-04-08 13:25:19 -04:00
orignal
40d5489429 delete inactive SSU sessions 2014-04-07 22:26:18 -04:00
orignal
c30dd2639a SSU timeout 2014-04-07 21:40:28 -04:00
orignal
03a5059617 peer test 2014-04-07 19:28:06 -04:00
orignal
9f8f91a2ee fixed small issues 2014-04-07 18:54:28 -04:00
orignal
be563dcbd1 process session created after decryption with intro key 2014-04-07 16:53:28 -04:00
orignal
64f195868e process intro key message 2014-04-07 16:41:29 -04:00
orignal
45d1571559 send peer test by Alice 2014-04-07 16:19:33 -04:00
orignal
130e1c2daf handle PeerTest 2014-04-07 15:31:38 -04:00
orignal
7f357e285f generate DH keys pair per SSU session 2014-04-04 14:56:46 -04:00
orignal
4970b4d14e generic SSU timer 2014-04-02 10:49:16 -04:00
orignal
88e6a76a1b don't send session request twice 2014-03-31 07:51:18 -04:00
orignal
9a5a04ca70 delete non-responding SSU sessions 2014-03-30 22:55:03 -04:00
orignal
3ae225fb41 use existing SSU session if available 2014-03-25 21:17:03 -04:00
orignal
b2fb466cde extract caps 2014-03-19 12:02:51 -04:00
orignal
9ef8ae99e2 close SSU session if MAC verification fails 2014-03-16 08:34:32 -04:00
orignal
06088ff7a2 fixed crash and few other small issues 2014-03-13 07:43:54 -04:00
orignal
6732ba21f9 inbound tunnel where an I2NP messages has been received from 2014-03-12 20:13:49 -04:00
orignal
5dfe19c6ed set established state after hole punch 2014-03-01 11:56:28 -05:00
orignal
48737864a3 process HolePunch 2014-02-28 21:28:05 -05:00
orignal
7300792033 set SessionCreated state 2014-02-25 20:37:39 -05:00
orignal
2ac36b1d31 verify SessionCreated 2014-02-24 21:43:26 -05:00
orignal
b9031c331d send SSU DeliveryStatus 2014-02-24 15:16:39 -05:00
orignal
64aa588a9b establish SSU session through relay 2014-02-21 16:13:36 -05:00
orignal
411ac5b898 try intro key if mac key failed 2014-02-12 16:36:13 -05:00
orignal
f8d105551f handle session destroyed 2014-02-11 15:51:32 -05:00
orignal
4862b594e8 use SSU if NTCP is not available 2014-02-10 19:27:55 -05:00
orignal
c5f70d4559 wait for DeliveryStatus message 2014-02-10 15:13:16 -05:00
orignal
735f6bd72a SSU send message 2014-02-09 18:28:34 -05:00
orignal
c266575528 eliminate unnecessary const_cast 2014-02-09 08:52:56 -05:00
orignal
ec5eafafeb external IP detection 2014-02-08 21:06:40 -05:00
orignal
202e3eeb2a process ACKs 2014-02-07 21:42:35 -05:00
orignal
1c1103dcce send ack 2014-02-07 15:47:10 -05:00
orignal
656392fe1e handle SSU I2NP header 2014-02-07 11:26:00 -05:00
orignal
d04f9e723c handle recieved I2NP message 2014-02-06 10:16:50 -05:00
orignal
fd80a13495 handle multiple fragments in one packet 2014-02-05 19:11:38 -05:00
orignal
53cd9c2418 parse data message 2014-02-05 15:07:47 -05:00
orignal
135b3f1477 take UDP address from actual endpoint 2014-02-04 22:51:46 -05:00
orignal
670508016b SessionConfirmed message 2014-02-04 14:20:58 -05:00
orignal
6f08edb32f create MAC key 2014-02-03 14:40:38 -05:00
orignal
499a7a9e32 use key of remote router as ident key for SessionCreated 2014-02-01 18:46:28 -05:00
orignal
732b17a368 send SessionCreated message 2014-01-30 14:03:11 -05:00
orignal
611ab9ce8d endpoint for SSU server 2014-01-29 22:14:05 -05:00
orignal
21693fc1e5 handle and send SessionRequest message 2014-01-29 16:49:53 -05:00
orignal
58386bb88e Encrypt/Decrypt/Validate SSU packet 2014-01-28 16:49:54 -05:00
orignal
8d4b98c83a SSUHeader and authenticate added 2014-01-27 16:52:17 -05:00
orignal
9e91be671d SSU payload types 2014-01-24 16:30:07 -05:00
orignal
3cf3e69aef SSU added 2014-01-23 16:10:33 -05:00