orignal
|
2f44d99a74
|
session closing state
|
2022-07-08 19:06:09 -04:00 |
|
orignal
|
ca4414d15a
|
request relay tag if firewalled
|
2022-07-08 13:52:09 -04:00 |
|
orignal
|
fbb961b43c
|
extract correct endpoint from peer test msg 2
|
2022-07-07 13:23:51 -04:00 |
|
orignal
|
fa9c174264
|
handle first packet from Bob
|
2022-07-06 21:28:53 -04:00 |
|
orignal
|
83f43ab166
|
pick 3 routers for SSU2 peer test
|
2022-07-06 19:33:02 -04:00 |
|
orignal
|
f7e9e6a1c4
|
set status OK after both peer test msg 4 and 5
|
2022-07-06 13:35:04 -04:00 |
|
orignal
|
aa21748e9a
|
set status OK after peer test msg 5
|
2022-07-06 12:41:51 -04:00 |
|
orignal
|
a2f4e08b00
|
set testing status for SSU2 peer test
|
2022-07-05 19:38:24 -04:00 |
|
orignal
|
66bc29d075
|
insert received RouterInfo into netdb immediately
|
2022-07-05 19:15:50 -04:00 |
|
orignal
|
e3eebe537b
|
set correct port for unpublished SSU2 addresses
|
2022-07-05 14:00:30 -04:00 |
|
orignal
|
3ed625f949
|
don't try SSU peer test if SSU is disabled
|
2022-07-05 13:07:23 -04:00 |
|
orignal
|
a1e414c3b7
|
make SSU2 server eligible for peer test
|
2022-07-05 12:55:11 -04:00 |
|
r4sas
|
a5a35b1fa6
|
[daemon] check for SSU2 transport at start
Signed-off-by: r4sas <r4sas@i2pmail.org>
|
2022-07-05 06:11:23 +00:00 |
|
orignal
|
2a24584d45
|
set SSU2 port if not specified
|
2022-07-04 23:00:16 -04:00 |
|
orignal
|
6039cdceb0
|
correct SSU2 only detection
|
2022-07-04 20:01:45 -04:00 |
|
orignal
|
473159be0f
|
don't use port from SSU2 address
|
2022-07-04 19:32:43 -04:00 |
|
orignal
|
0e6ad548b2
|
invoke SSU2 peer test updates
|
2022-07-04 18:54:20 -04:00 |
|
orignal
|
6143515ac6
|
update our IP adress from SSU2
|
2022-07-03 09:31:20 -04:00 |
|
orignal
|
50419f200d
|
fixed 1 packet off for out of sequence clean up
|
2022-07-01 17:35:38 -04:00 |
|
orignal
|
455390f121
|
clean up first out of sequence packet if too many
|
2022-07-01 10:52:10 -04:00 |
|
orignal
|
d375299fa9
|
send token in relay response block
|
2022-06-30 20:00:18 -04:00 |
|
orignal
|
28db337166
|
give priority to SSU2 over SSU
|
2022-06-30 12:53:50 -04:00 |
|
orignal
|
6ca9a599ff
|
remove session after HolePunch received
|
2022-06-30 08:37:50 -04:00 |
|
orignal
|
83bd3b6f0b
|
use token from RelayResponse block
|
2022-06-29 13:42:57 -04:00 |
|
orignal
|
a68765e021
|
fixed off 5 bytes for follow on fragment
|
2022-06-29 08:30:11 -04:00 |
|
orignal
|
f5ed9129cd
|
process retry as reponse to relay request
|
2022-06-29 08:09:43 -04:00 |
|
orignal
|
5e3115a614
|
check nonce in HolePunch relay response block
|
2022-06-28 18:51:31 -04:00 |
|
orignal
|
624c46f925
|
correct msg offset for follow-on fragment
|
2022-06-28 16:09:13 -04:00 |
|
orignal
|
52d1ee161f
|
store RouterInfo in netdb from SessionConfirmed
|
2022-06-28 10:35:35 -04:00 |
|
orignal
|
d3bc9eb110
|
update token and conn id after HolePunch
|
2022-06-27 23:03:27 -04:00 |
|
orignal
|
72b61a29c2
|
check TokenRequest message size
|
2022-06-27 15:56:47 -04:00 |
|
orignal
|
a99fcfe54f
|
cleanup terminated sessions
|
2022-06-26 21:35:26 -04:00 |
|
orignal
|
b5d139f7b2
|
process session created after session request sent
|
2022-06-26 14:31:24 -04:00 |
|
orignal
|
463ed12ce8
|
don't pick same session for PeerTest msg 2
|
2022-06-26 10:07:39 -04:00 |
|
orignal
|
baf74cb582
|
1 byte off for RelayRequest signature
|
2022-06-26 09:53:29 -04:00 |
|
orignal
|
63d7cffefe
|
Merge branch 'openssl' of https://github.com/PurpleI2P/i2pd into openssl
|
2022-06-25 18:52:09 -04:00 |
|
orignal
|
d7d74666b2
|
correct max MTU size
|
2022-06-25 18:51:24 -04:00 |
|
R4SAS
|
078d76c6f3
|
fix tabulation, remove long description (to be moved to documentation)
Signed-off-by: R4SAS <r4sas@i2pmail.org>
|
2022-06-26 01:38:42 +03:00 |
|
orignal
|
3539ee9be6
|
Merge pull request #1769 from AVAtarMod/sigtstp-patch-1
Add SIGTSTP, SIGCONT support
|
2022-06-25 13:09:57 -04:00 |
|
AVAtarMod
|
437282b148
|
[config, daemon] catch TSTP, CONT is option
|
2022-06-25 18:54:54 +03:00 |
|
AVAtarMod
|
5394b747a1
|
[daemon] add SIGTSTP, SIGCONT support on Unix
|
2022-06-25 10:20:29 +03:00 |
|
orignal
|
dd1dd3b7cf
|
wait for Ack for SessionConfirmed or resend
|
2022-06-24 22:06:30 -04:00 |
|
orignal
|
ae77d4ad22
|
correct signed content for peer test msg 3
|
2022-06-24 18:18:11 -04:00 |
|
orignal
|
821987fed7
|
don't send peer test for unknown address/port
|
2022-06-24 15:31:08 -04:00 |
|
orignal
|
18ddba4332
|
send RouterInfo message to right session in relay request
|
2022-06-24 14:08:39 -04:00 |
|
orignal
|
aaad6dece6
|
set session request sent status in right place
|
2022-06-24 13:27:13 -04:00 |
|
orignal
|
ed04747b9d
|
resend SessionRequest and SessionCreated
|
2022-06-24 13:07:02 -04:00 |
|
orignal
|
827a88d772
|
exclude expired SSU2 introducers
|
2022-06-23 18:23:25 -04:00 |
|
R4SAS
|
24e325db62
|
[make] fix install target paths for linux and homebrew
Signed-off-by: R4SAS <r4sas@i2pmail.org>
|
2022-06-23 19:55:16 +03:00 |
|
orignal
|
38e43bc9c8
|
check Charlie's address for PeerTest msg 4
|
2022-06-23 08:18:35 -04:00 |
|