Commit Graph

23 Commits

Author SHA1 Message Date
orignal
9ef8ae99e2 close SSU session if MAC verification fails 2014-03-16 08:34:32 -04:00
orignal
27c7ea2801 print direction of SSU session 2014-03-12 07:37:43 -04:00
orignal
48737864a3 process HolePunch 2014-02-28 21:28:05 -05:00
orignal
303855f59a show SSU sessions 2014-02-24 22:28:28 -05:00
orignal
64aa588a9b establish SSU session through relay 2014-02-21 16:13:36 -05:00
orignal
411ac5b898 try intro key if mac key failed 2014-02-12 16:36:13 -05:00
orignal
735f6bd72a SSU send message 2014-02-09 18:28:34 -05:00
orignal
c266575528 eliminate unnecessary const_cast 2014-02-09 08:52:56 -05:00
orignal
ec5eafafeb external IP detection 2014-02-08 21:06:40 -05:00
orignal
202e3eeb2a process ACKs 2014-02-07 21:42:35 -05:00
orignal
1c1103dcce send ack 2014-02-07 15:47:10 -05:00
orignal
d04f9e723c handle recieved I2NP message 2014-02-06 10:16:50 -05:00
orignal
53cd9c2418 parse data message 2014-02-05 15:07:47 -05:00
orignal
670508016b SessionConfirmed message 2014-02-04 14:20:58 -05:00
orignal
6f08edb32f create MAC key 2014-02-03 14:40:38 -05:00
orignal
499a7a9e32 use key of remote router as ident key for SessionCreated 2014-02-01 18:46:28 -05:00
orignal
732b17a368 send SessionCreated message 2014-01-30 14:03:11 -05:00
Meeh
38bc15167c Fix. Thanks to zzz @ #i2p-dev 2014-01-30 14:28:11 +01:00
orignal
21693fc1e5 handle and send SessionRequest message 2014-01-29 16:49:53 -05:00
orignal
58386bb88e Encrypt/Decrypt/Validate SSU packet 2014-01-28 16:49:54 -05:00
orignal
8d4b98c83a SSUHeader and authenticate added 2014-01-27 16:52:17 -05:00
orignal
9e91be671d SSU payload types 2014-01-24 16:30:07 -05:00
orignal
3cf3e69aef SSU added 2014-01-23 16:10:33 -05:00