Commit Graph

181 Commits (e20acb93cfdb7880ad200fe55b6d5d58a07093a0)

Author SHA1 Message Date
orignal 3544f77e90 terminate peer session if Charlie's RouterInfo not found 2 years ago
R4SAS 96c4463d39
clean code
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
R4SAS 650b7abef6
[SSU2] add log messages about peertest
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
R4SAS 714b3856a2
[SSU2] print to log when peer test is sent
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
orignal 24ae8d5443 don't handle more than 2 fragments in SessionConfirmed 2 years ago
orignal 030af11d86 don't merge duppicated fragment of SessionConfirmed 2 years ago
orignal 857a2bc399 verify path response 2 years ago
orignal 09e6e2940f correct max paddign size 2 years ago
orignal 23e18a34d4 check if new address is in reserved range 2 years ago
orignal 3bdef5f58d update remote endpoint and send path challenge 2 years ago
orignal cf27581c76 check min MTU 1280 2 years ago
orignal 4634bff9f0 limit number of resent packets. Resend interval variance 2 years ago
orignal 1a9c658836 immediate ack request flag 2 years ago
orignal 9b5a885b3b check if I2NP message to send is not null 2 years ago
orignal 8fd466c5a9 separate network status and errors 2 years ago
orignal 95f19a5fb2 send Retry instead SessionCreated if clock skew 2 years ago
orignal f98780b1d7 check timestamp for token request 2 years ago
orignal 150c89e48a don't request session if zero token received 2 years ago
orignal f875823357 copy path challenge to response 2 years ago
orignal c3dd7ed73a try to resend if window is full 2 years ago
orignal 3ae885d120 change status back to Testing from Unknow if next test was accepted 2 years ago
orignal ab606a1121 adjust clock from SSU2 2 years ago
orignal c6f898b8ca connect to Charlie if RelayResponse from Bob was received before HolePunch 2 years ago
orignal 3e40852999 memory pool for sent packets 2 years ago
orignal df073bb306 send local address in RelayResponse block 2 years ago
orignal 771c4a0d02 allocate smaller I2NP buffer for fragmented message. Limit number of fragments by 64 2 years ago
orignal cb959ab14c allocate tunnel message buffer for I2NP block with tunnel data message type 2 years ago
orignal ed5c533982 recgnize symmetric NAT from SSU2 2 years ago
orignal 98d2ce5845 Respond to path challenge. Correct termination reason for duplicated session 2 years ago
orignal eba4626589 kappa for RTO culculation 2 years ago
orignal ff5fa1d137 3 bytes off for token in RelayResponse 2 years ago
orignal 71766ecd16 select introducers randomly. More logging for RelayIntro 2 years ago
orignal 3bd40fc8b3 calculate RTT and RTO 2 years ago
orignal e70d57dcb4 resend intervals in milliseconds 2 years ago
orignal fd41fba069 variable retranmission window 2 years ago
orignal 8a6fe0f321 check if address type matches peer's address type for peer test msg 1 2 years ago
orignal 4b1f5c9c9b terminate session in separate task 2 years ago
orignal 46a549c875 random size of fragments 2 years ago
orignal f8a609f692 respond to termination 2 years ago
orignal e537878b8a check Ack block bufer size and shrink ranges if necessary 2 years ago
orignal 617f45bc59 try to send I2NP message in one packet, reduce or drop Ack block if necessary 2 years ago
orignal 09aa96e486 always bring to closing state if termination requested 2 years ago
orignal ea0ed9e844 update SSU2 introducers if Firewalled 2 years ago
orignal 000e0358a7 resend SessionConfirmed immediately if another SessionCreated received 2 years ago
orignal a3e19931f0 insert RouterInfo from SessionConfirmed into netdb immediately 2 years ago
orignal 9fec1a86cf send ack for peer test 2 years ago
orignal ffab29890b created additional ranges if acnt > 255 2 years ago
orignal 206c068d8e don't send termination without address 2 years ago
orignal dc30cd1112 handle SessionConfirmed fragments in reversed order 2 years ago
orignal 16290bf66f fixed race condition on session termination 2 years ago
orignal 4f8b0e6484 send more SessionConfirmed termination messages. Limit send queue 2 years ago
orignal 5026dbc1b3 receive bigger packets 2 years ago
orignal 665a914dc3 set max MTU for ipv4 2 years ago
orignal 3394bb4b8d calculate SSU2 session MTU and max payload size 2 years ago
orignal 5c62726992 check clock skew and terminate 2 years ago
orignal 90981f628e Send fragmented SessionConfirmed 2 years ago
orignal 0c34189d94 correct buffer size for fragments of SessionConfirmed 2 years ago
orignal f1d3d6a7b5 set max compression for SessionConfirmed 2 years ago
orignal b0d962b49a send ack for retransmitted SessionConfirmed 2 years ago
orignal c50e453af6 check out of sequence messages range 2 years ago
orignal 8b649aaaf8 NACKs and Acks only Ack ranges 2 years ago
orignal fdebbc4498 select sessions for introducers 2 years ago
orignal 3ff3417ff2 send termiation with reason 2 years ago
orignal bb6227281a teminate session after 5 unacked resends 2 years ago
orignal 2f44d99a74 session closing state 2 years ago
orignal ca4414d15a request relay tag if firewalled 2 years ago
orignal fbb961b43c extract correct endpoint from peer test msg 2 2 years ago
orignal fa9c174264 handle first packet from Bob 2 years ago
orignal 83f43ab166 pick 3 routers for SSU2 peer test 2 years ago
orignal f7e9e6a1c4 set status OK after both peer test msg 4 and 5 2 years ago
orignal aa21748e9a set status OK after peer test msg 5 2 years ago
orignal 66bc29d075 insert received RouterInfo into netdb immediately 2 years ago
orignal 0e6ad548b2 invoke SSU2 peer test updates 2 years ago
orignal 6143515ac6 update our IP adress from SSU2 2 years ago
orignal 50419f200d fixed 1 packet off for out of sequence clean up 2 years ago
orignal 455390f121 clean up first out of sequence packet if too many 2 years ago
orignal d375299fa9 send token in relay response block 2 years ago
orignal 6ca9a599ff remove session after HolePunch received 2 years ago
orignal 83bd3b6f0b use token from RelayResponse block 2 years ago
orignal a68765e021 fixed off 5 bytes for follow on fragment 2 years ago
orignal 5e3115a614 check nonce in HolePunch relay response block 2 years ago
orignal 624c46f925 correct msg offset for follow-on fragment 2 years ago
orignal 52d1ee161f store RouterInfo in netdb from SessionConfirmed 2 years ago
orignal d3bc9eb110 update token and conn id after HolePunch 2 years ago
orignal 72b61a29c2 check TokenRequest message size 2 years ago
orignal 463ed12ce8 don't pick same session for PeerTest msg 2 2 years ago
orignal baf74cb582 1 byte off for RelayRequest signature 2 years ago
orignal d7d74666b2 correct max MTU size 2 years ago
orignal dd1dd3b7cf wait for Ack for SessionConfirmed or resend 2 years ago
orignal ae77d4ad22 correct signed content for peer test msg 3 2 years ago
orignal 821987fed7 don't send peer test for unknown address/port 2 years ago
orignal 18ddba4332 send RouterInfo message to right session in relay request 2 years ago
orignal aaad6dece6 set session request sent status in right place 2 years ago
orignal ed04747b9d resend SessionRequest and SessionCreated 2 years ago
orignal 38e43bc9c8 check Charlie's address for PeerTest msg 4 2 years ago
orignal c3c5c7ae63 forward correct RelayResponse from Charlie to Alice 2 years ago
orignal 578a15bbe5 don't send PeerTest msg 5 if address is not supported 2 years ago
orignal 6b3d7372ae token received session state 2 years ago
orignal 55f7529167 delete pending outgoind session when Retry received 2 years ago
orignal bceae244c1 delete pending outgoind session when SessionCreated received 2 years ago