Commit Graph

192 Commits (cb8fbb013514a738168d191f42c9b38c61f49f4c)

Author SHA1 Message Date
orignal 4670b12d49 correct buffer size for token request 2 years ago
orignal 321ec8ae4d correct size for Ack block with ranges 2 years ago
orignal 1ccbb8d10b correct offset for nonce in peer test message 2 years ago
orignal 86c0accdce check nonce for peer test msg 5 2 years ago
orignal 38d6c29ce9 correct timestamp size for peer test message 2 years ago
orignal 0cf9478cd4 create SSU2 session for peer test msgs 5-7 2 years ago
orignal a04abd304a don't send own hash for peer test msg 1 2 years ago
orignal 84aec9fe31 correct msg for first peer test message 2 years ago
orignal d3a9cc8fde check if session is established before sending peer test 2 years ago
orignal 87a434c377 start peer test for SSU2 2 years ago
orignal 593d6bf466 create initial peer test 2 years ago
R4SAS 6b4ffcff5a cleanup code (spaces, tabs)
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
orignal 2cd3ebbdb3 copy peer test block 2 years ago
orignal 5e25e30330 check if there is only one unacked packet 2 years ago
orignal 5aa2a8f60f handle peer tests 2 years ago
orignal bb705a77cf handle PeerTest message 2 years ago
orignal da3f3ccac9 connect to reachable introducers only 2 years ago
orignal 1a1871e8cd add RouterInfo block before RelayIntro 2 years ago
orignal 436992b069 send and process HolePunch message 2 years ago
orignal 18cb3912e5 fixed imccorect termination 2 years ago
orignal 5aebefe73f connect through introducer 2 years ago
orignal dc82105226 check status code and verify RelayResponse signature 2 years ago
orignal 5221f3ddc9 one SSU2 session per remote router 2 years ago
orignal e970deb92b check presense of introducers in SSU2 address 2 years ago
orignal 9db7ec6bb0 create and send RelayRequest 2 years ago
orignal 40340cf9c2 handle RelayResponse 2 years ago
orignal 45ebfe378b correct Ack range 2 years ago
orignal 751da92c13 send relay response 2 years ago
orignal e10ca637da handle RelayIntro 2 years ago
orignal c5d9d71a8a create relay tag and relay request block 2 years ago
orignal 3e0f5d231d send queue after batch of packets 2 years ago
orignal 6990f177ba window size 2 years ago
orignal 4c91ae0085 check if end of list 2 years ago
orignal 43f74d4d5a resend packet with new packet number 2 years ago
orignal 8c3e716c3f ranges in ack block 2 years ago
orignal 05946125b5 handle single packet 2 years ago
orignal 1e2a0a4549 handle incoming packets in batch 2 years ago
orignal f9d67b28ec handle fragmented SessionConfirmed 2 years ago
orignal 678a1ae0fb send fragmented messages 2 years ago
orignal 51cbffd097 don't lookup session for every sinle packet 2 years ago
orignal 207b13dcab send correct acnt if gaps 2 years ago
orignal 3052dbd1e8 single receive thread for both ipv4 and ipv6 2 years ago
orignal 5891b1ceb2 separate receive thread 2 years ago
orignal db5e90787c update I2NP header after all fragments received 2 years ago
orignal 67e501f5c7 correct nonce for SessionCorfirmed part 2 2 years ago
orignal 2160001167 correct non for token request and retry encryption 2 years ago
orignal f5f4150d17 fixed typo 2 years ago
orignal 82f9585b7a handle fragments 2 years ago
orignal eb561bb0c2 handle Ack ranges 2 years ago
orignal 81207999eb check token in SessionRequest 2 years ago
orignal 2fef595b83 resend packets 2 years ago
orignal 2024e790ca send I2NP messages 2 years ago
orignal f9925c7374 hanlde Ack block 2 years ago
orignal dd774b8dfd store out of sequence packet numbers 2 years ago
orignal 30b83414ef find SSU2 address by address type 2 years ago
orignal a3f165d374 handle and send termination 2 years ago
orignal 7d5f51e357 don't send instant Ack for out-of-sequence message 2 years ago
orignal 371a339b18 encrypt Data header 2 years ago
orignal 7e7aee27b6 handle I2NP message block 2 years ago
orignal 53148fe58f send Ack packet 2 years ago
orignal 56b6de6962 correct header decryption for Data message 2 years ago
orignal 44735681af KDF and process Data message 2 years ago
orignal fb6ecdde1e handle TokenRequest 2 years ago
orignal 861166d8a9 send TokenRequest message: 2 years ago
orignal 2440ffbfc9 handle SSU2 SessionConfirmed 2 years ago
orignal 77c5dde320 send SessionConfirmed 2 years ago
orignal aa49cad279 correct encrypted payload size for MixHash 2 years ago
orignal f56ae240ab don't delete peding endpoint if Retry received 2 years ago
orignal e871a30a78 initialize connid in constructor 2 years ago
orignal 30e6984889 handle Retry message 2 years ago
orignal 87bf5c2418 cleanup pending sessions 2 years ago
orignal 5c9af1c613 MixHash with encrypted payload after decryption 2 years ago
orignal ab9901525b separated sockets for ipv4 and ipv6 2 years ago
orignal 3c5c375f71 connect to SSU2 address 2 years ago
orignal 7473d8c9aa create and handle Address block 2 years ago
orignal 40c8a1bc1d handle payload blocks 2 years ago
orignal 7b72d91549 receive incoming SSU2 packets 2 years ago
orignal 21c1ec9c8c enable SSU2 server 2 years ago
orignal 68d015763e recognize SSU2 addresses 2 years ago
orignal 7faa732f38 send SessionCreated 2 years ago
orignal a152f36894 MixHash for SSU2 long header 2 years ago
orignal d4ede6ff01 process SessionRequest 2 years ago
orignal 35542d803c KDF for session request 2 years ago
orignal f6ba776c12 SSU2 keys 2 years ago
orignal 1511dcb309 store endpoint and send packet 2 years ago
orignal 9f1a125ed9 decrypt connID for incoming packet 2 years ago
R4SAS a51ef0cfc6
set of updates:
* [webconsole] change error handling code to restart acceptor after any
error
* [webconsole] call shutdown vefore stopping acceptor on exit
* update license headers for modified files, change year to file
  creation year, not 2013 (when project started)

Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
orignal 510fe43ec4 create and encrypt SessionRequest 2 years ago
orignal 04388325a8 KDF and encryption for SessionRequest 2 years ago
orignal 4211c733a2 s and i keys for all addresses 2 years ago
orignal 450266818a Noise XK for SSU2 2 years ago
orignal 1e019157bb SSU2 initial commit 2 years ago