Commit Graph

400 Commits

Author SHA1 Message Date
orignal
4a66624b04 fixed typo 2024-07-27 21:42:07 -04:00
orignal
0153748134 save and use previous routing session 2024-07-27 19:37:10 -04:00
orignal
d3062d2994 don't create full identity from buffer if only ident hash is needed 2024-07-25 20:36:46 -04:00
orignal
e0ac8a7298 check if destination is ready. Create garlic message before selectiing routing path 2024-07-24 19:09:46 -04:00
orignal
96ea630274 send message right a way if in same thread 2024-07-24 16:06:28 -04:00
orignal
f232c8f2df don't limit num attempts in routing path. Increased routing path expiration to 2 minutes 2024-07-23 21:55:56 -04:00
orignal
2f54d95187 try to read message payload immediately after header 2024-07-23 19:02:37 -04:00
orignal
830e49f2c5 increase I2CP socket buffer size 2024-07-23 16:01:43 -04:00
orignal
23e323438a cancel LeaseSet creation timer before destination termination 2024-07-23 08:35:43 -04:00
orignal
0428b5ece1 limit stream's outbound speed 2024-07-04 13:07:57 -04:00
orignal
577ed56af0 store HTTP and SOCKS proxy as pointer to I2PService 2024-02-20 18:51:37 -05:00
orignal
695dc96a83 common ServiceAcceptor for all stream protocols 2024-02-20 18:32:51 -05:00
orignal
a4a3f8e96b support upstream proxy through local sockets 2024-02-19 22:04:43 -05:00
orignal
710b27688b generic SocketsPipe for different socket types 2024-02-14 15:35:47 -05:00
orignal
a9ad6fc31e renamed TCPIPPipe to SocketsPipe 2024-02-13 18:52:18 -05:00
orignal
d9b6262a6e removed unused field 2024-02-12 12:10:29 -05:00
orignal
075f80aea2 use SOCK5 proxy for upstream 2024-02-11 15:33:37 -05:00
orignal
b07530a8a1 don't print error message if operation cancelled 2024-02-11 11:44:15 -05:00
orignal
0ae7931a6f replaced SOCKS4 outproxy by SOCKS5 2024-02-11 11:23:37 -05:00
weko
4b167fdbaf Update copyright year 2024-01-25 01:57:24 +00:00
weko
5b93558bd0 Add support for multiple udp server tunnels on one destionation 2024-01-25 01:05:58 +00:00
orignal
c5a1806528 fixed possible deadlock 2024-01-24 13:58:42 -05:00
orignal
a2249f0a82 identify server tunnel session but from ant to ports 2024-01-24 13:52:13 -05:00
orignal
828facab57
Merge pull request #2003 from rex4539/typos
Fix typos
2024-01-11 13:14:20 -05:00
orignal
cd087568b5 reply with CANT_REACH_PEER if connect to outselves 2024-01-09 21:02:11 -05:00
orignal
8bc58daa5a fixed #2004. Check supported crypto 2024-01-07 18:42:34 -05:00
Dimitris Apostolou
577c71b930
Fix typos 2024-01-04 21:35:25 +02:00
orignal
d327533b56 close unclaimed acceptors after 3 seconds 2023-11-17 18:50:52 -05:00
orignal
94255ebaf4 STREAM ACCEPT queue 2023-11-17 13:44:30 -05:00
orignal
a6ee1e648e recognize trailing padding as part of base64 address 2023-10-31 09:10:56 -04:00
orignal
69b0bef206 fixed possible invalid pointer when send error response 2023-10-30 10:09:47 -04:00
orignal
3286bdb4a7 verify jump link for valid characters 2023-10-29 22:11:38 -04:00
orignal
1e6edf06a2 send already accepting error response 2023-09-28 16:05:13 -04:00
orignal
17c4038c60 select router with ipv4 for endpoint 2023-07-11 13:16:35 -04:00
orignal
b8f998f76a don't delete BOBDestination if used by another BOBSession 2023-07-06 13:08:39 -04:00
orignal
5f43026986 check if local destination is not null 2023-07-06 12:30:33 -04:00
orignal
07c529173e send current version of the subnegotiation in user/password response 2023-06-17 10:08:04 -04:00
orignal
fee940238a handle SOCK5 authrosation with empty user/password 2023-06-17 07:52:06 -04:00
r4sas
a0795d8534
set server tunnel inport in ClientContext from port (#1936)
Signed-off-by: r4sas <r4sas@i2pmail.org>
2023-06-12 05:12:07 +03:00
r4sas
03cc6e0524
use uint16_t for ports
Signed-off-by: r4sas <r4sas@i2pmail.org>
2023-06-12 05:10:32 +03:00
r4sas
3af1f4bc76
Use of 'server' type tunnel port as inport (#1936)
Signed-off-by: r4sas <r4sas@i2pmail.org>
2023-06-12 00:32:44 +03:00
r4sas
fdf38f45d9
more debug messages at destinations stop
Signed-off-by: r4sas <r4sas@i2pmail.org>
2023-05-23 00:44:47 +03:00
orignal
e95fb3ab89 allow user/password authentication 2023-05-22 08:58:04 -04:00
orignal
0ce15ffc91 check for incomplete HTTP header 2023-04-26 21:34:22 -04:00
orignal
7a12b5ca4b handle incomplete HTTP header lines 2023-04-18 19:25:15 -04:00
orignal
132557f941 don't return default destination if port is specified explicitly 2023-04-12 13:33:20 -04:00
orignal
b8d21a1282 create non-default port destination explicitly 2023-04-12 07:46:50 -04:00
orignal
922e5915b1 rename SendTunnelDataMsg to SendTunnelDataMsgs for multiple messages 2023-04-04 13:19:08 -04:00
orignal
7c2da75197 don't recreate existing streaming destination 2023-04-03 19:05:35 -04:00
weko
a3bdc4ddc1 change some log levels back 2023-03-31 12:40:38 +00:00