Commit Graph

180 Commits

Author SHA1 Message Date
orignal
cd1af85e39 bypass slow transport sessions 2023-03-29 15:54:53 -04:00
Dimitris Apostolou
d91d734b5c Fix typos 2023-03-26 01:48:22 +00:00
orignal
f41563a700 check packet number for SessionConfirmed 2023-03-19 17:42:53 -04:00
orignal
084663d6ea mediam size I2NP messages 2023-03-18 15:32:05 -04:00
orignal
5ad9c8e740 create I2NP tunnel message for first fragment 2023-03-13 19:19:57 -04:00
orignal
4db643aa8e limited number of acked packets to 511 2023-03-02 16:18:25 -05:00
orignal
02a36a9fa8 don't populate buffer of unreachable router 2023-02-14 15:44:35 -05:00
orignal
d79bdc9f66 send datetime block after approximately every 250 packets 2023-02-11 20:11:34 -05:00
R4SAS
86fc12e395
[style] clean code
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2023-02-11 09:41:51 +03:00
orignal
ac94341203 disconnect established session if clock skew detected 2023-02-10 11:48:11 -05:00
Vort
0829b186b7 Fix debug log output 2023-02-10 01:57:43 +02:00
orignal
d1c98c58b9 update status before deleting session 2023-02-06 19:31:31 -05:00
orignal
3c02cade58 compare only first 8 bytes for temporary addreses 2023-02-05 19:19:20 -05:00
orignal
21123e2afa compare published address and actual endpoint 2023-02-05 18:26:09 -05:00
orignal
f1415c2234 compare published address and actual endpoint 2023-02-05 15:42:46 -05:00
orignal
54fb234424 limit number of acked packets to 510 2023-02-03 19:17:46 -05:00
orignal
02e7f6b0c3 cleanup out of sequence packet nums in one call 2023-02-02 13:52:48 -05:00
orignal
e9f0ed6473 cleanup out-of-sequnce list more aggressivly 2023-02-01 19:05:04 -05:00
orignal
4960587f46 cleanup out-of-sequnce list more aggressivly 2023-02-01 18:37:31 -05:00
orignal
e8be39af17 memrory pool for SSU2IncompleteMessage 2023-01-17 21:32:36 -05:00
orignal
bc888167a7 use linked list for out of sequence fragments 2023-01-16 21:40:23 -05:00
orignal
993dc72ce6 use separate pointer to second fragment of incomplete message 2023-01-15 22:50:54 -05:00
orignal
324ace103b memoery pool for fragments 2023-01-14 17:05:09 -05:00
orignal
d530269e4f try to insert received msgid instead lookup 2023-01-13 19:23:26 -05:00
orignal
a3c305032a don't set Firewalled upon SessionCreated if ports mismatch 2023-01-08 08:25:23 -05:00
orignal
1cc68ea402 differentiate symmetric and full cone NAT 2023-01-07 12:06:26 -05:00
orignal
a6f9a56e40 support C++20 2023-01-06 14:08:39 -05:00
orignal
55704ece3a drop duplicated I2NP messages 2023-01-05 15:33:41 -05:00
R4SAS
503f522cc3
[style] clean trailing spaces and tabs
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2023-01-03 21:25:19 +03:00
R4SAS
22179400c7
2.45.0
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2023-01-03 18:16:34 +00:00
orignal
7b341d5d30 update and show send queue size for transports 2023-01-01 16:03:53 -05:00
Dimitris Apostolou
9f9e8bfa14
Fix typos 2022-12-27 10:44:23 +02:00
orignal
b6f83dfe9f set error before status 2022-12-22 08:36:07 -05:00
orignal
36501fe31e change network status back to OK if port in msg 7 matches 2022-12-21 18:14:19 -05:00
orignal
d6c101d261 try to handle RelayIntro again is Alice's RouterInfo not found 2022-12-19 13:28:21 -05:00
orignal
eeea02d834 rounded to seconds timestamps 2022-12-19 12:56:19 -05:00
orignal
df737a65b2 SessionRequest must be min 88 bytes 2022-12-15 15:08:56 -05:00
orignal
f6ca7c19af allow zero length padding 2022-12-12 14:18:36 -05:00
orignal
8ad5696e50 don't send termination again if termination received block received 2022-12-06 21:40:33 -05:00
orignal
2bb5ff7184 eliminate RTT self-reduction 2022-12-05 15:48:11 -05:00
orignal
50abeea82a print endpoint if more than two fragments of SessionConfirmed 2022-12-04 17:08:38 -05:00
orignal
8db352b4d0 recognize symmetric NAT from peer test msg 7 2022-12-04 16:30:45 -05:00
orignal
2a6f906177 print separate message for introducer timeout 2022-11-27 17:14:33 -05:00
orignal
64c3282aae check minimal message size 2022-11-27 09:13:24 -05:00
Dimitris Apostolou
73b9c0302b
Fix typos 2022-11-25 22:37:52 +02:00
orignal
ccfeca728e use only SSU2 for network status 2022-11-22 22:03:19 -05:00
orignal
e5553f7528 milliseconds for peer test send time 2022-10-11 18:21:04 -04:00
orignal
6e3cec653d resend PeerTest msg 2 2022-10-11 15:27:19 -04:00
orignal
55976fd9dc resend PeerTest msg 1 2022-10-10 16:34:08 -04:00
orignal
3544f77e90 terminate peer session if Charlie's RouterInfo not found 2022-10-09 15:03:32 -04:00