Browse Source

Fix typos

pull/2131/head
Dimitris Apostolou 7 days ago
parent
commit
226257aa71
No known key found for this signature in database
GPG Key ID: 4B5D20E938204A8A
  1. 2
      libi2pd/Config.cpp
  2. 2
      libi2pd/Garlic.cpp
  3. 2
      libi2pd/Garlic.h
  4. 2
      libi2pd/NetDb.cpp
  5. 2
      libi2pd/SSU2.cpp
  6. 4
      libi2pd/SSU2OutOfSession.cpp
  7. 2
      libi2pd/Streaming.cpp
  8. 2
      libi2pd/Streaming.h
  9. 6
      libi2pd/TunnelGateway.cpp
  10. 2
      libi2pd_client/I2CP.cpp
  11. 2
      libi2pd_client/UDPTunnel.cpp

2
libi2pd/Config.cpp

@ -117,7 +117,7 @@ namespace config {
("httpproxy.latency.max", value<std::string>()->default_value("0"), "HTTP proxy max latency for tunnels") ("httpproxy.latency.max", value<std::string>()->default_value("0"), "HTTP proxy max latency for tunnels")
("httpproxy.outproxy", value<std::string>()->default_value(""), "HTTP proxy upstream out proxy url") ("httpproxy.outproxy", value<std::string>()->default_value(""), "HTTP proxy upstream out proxy url")
("httpproxy.addresshelper", value<bool>()->default_value(true), "Enable or disable addresshelper") ("httpproxy.addresshelper", value<bool>()->default_value(true), "Enable or disable addresshelper")
("httpproxy.senduseragent", value<bool>()->default_value(false), "Pass through user's User-Agent if enabled. Disabled by deafult") ("httpproxy.senduseragent", value<bool>()->default_value(false), "Pass through user's User-Agent if enabled. Disabled by default")
("httpproxy.i2cp.leaseSetType", value<std::string>()->default_value("3"), "Local destination's LeaseSet type") ("httpproxy.i2cp.leaseSetType", value<std::string>()->default_value("3"), "Local destination's LeaseSet type")
("httpproxy.i2cp.leaseSetEncType", value<std::string>()->default_value("0,4"), "Local destination's LeaseSet encryption type") ("httpproxy.i2cp.leaseSetEncType", value<std::string>()->default_value("0,4"), "Local destination's LeaseSet encryption type")
("httpproxy.i2cp.leaseSetPrivKey", value<std::string>()->default_value(""), "LeaseSet private key") ("httpproxy.i2cp.leaseSetPrivKey", value<std::string>()->default_value(""), "LeaseSet private key")

2
libi2pd/Garlic.cpp

@ -550,7 +550,7 @@ namespace garlic
LogPrint (eLogError, "Garlic: Can't handle ECIES-X25519-AEAD-Ratchet message"); LogPrint (eLogError, "Garlic: Can't handle ECIES-X25519-AEAD-Ratchet message");
} }
else else
LogPrint (eLogWarning, "Garlic: Incoming sessions come too ofter"); LogPrint (eLogWarning, "Garlic: Incoming sessions come too often");
} }
else else
LogPrint (eLogError, "Garlic: Failed to decrypt message"); LogPrint (eLogError, "Garlic: Failed to decrypt message");

2
libi2pd/Garlic.h

@ -286,7 +286,7 @@ namespace garlic
std::unordered_map<i2p::data::IdentHash, ElGamalAESSessionPtr> m_Sessions; std::unordered_map<i2p::data::IdentHash, ElGamalAESSessionPtr> m_Sessions;
std::unordered_map<i2p::data::Tag<32>, ECIESX25519AEADRatchetSessionPtr> m_ECIESx25519Sessions; // static key -> session std::unordered_map<i2p::data::Tag<32>, ECIESX25519AEADRatchetSessionPtr> m_ECIESx25519Sessions; // static key -> session
uint8_t * m_PayloadBuffer; // for ECIESX25519AEADRatchet uint8_t * m_PayloadBuffer; // for ECIESX25519AEADRatchet
uint64_t m_LastIncomingSessionTimestamp; // in millseconds uint64_t m_LastIncomingSessionTimestamp; // in milliseconds
// incoming // incoming
int m_NumRatchetInboundTags; int m_NumRatchetInboundTags;
std::unordered_map<SessionTag, std::shared_ptr<AESDecryption>, std::hash<i2p::data::Tag<32> > > m_Tags; std::unordered_map<SessionTag, std::shared_ptr<AESDecryption>, std::hash<i2p::data::Tag<32> > > m_Tags;

2
libi2pd/NetDb.cpp

@ -637,7 +637,7 @@ namespace data
if (checkForExpiration && uptime > i2p::transport::SSU2_TO_INTRODUCER_SESSION_DURATION) // 1 hour if (checkForExpiration && uptime > i2p::transport::SSU2_TO_INTRODUCER_SESSION_DURATION) // 1 hour
expirationTimeout = i2p::context.IsFloodfill () ? NETDB_FLOODFILL_EXPIRATION_TIMEOUT*1000LL : expirationTimeout = i2p::context.IsFloodfill () ? NETDB_FLOODFILL_EXPIRATION_TIMEOUT*1000LL :
NETDB_MIN_EXPIRATION_TIMEOUT*1000LL + (NETDB_MAX_EXPIRATION_TIMEOUT - NETDB_MIN_EXPIRATION_TIMEOUT)*1000LL*NETDB_MIN_ROUTERS/total; NETDB_MIN_EXPIRATION_TIMEOUT*1000LL + (NETDB_MAX_EXPIRATION_TIMEOUT - NETDB_MIN_EXPIRATION_TIMEOUT)*1000LL*NETDB_MIN_ROUTERS/total;
bool isOffline = checkForExpiration && i2p::transport::transports.GetNumPeers () < NETDB_MIN_TRANSPORTS; // enough routers and uptime, but no tranports bool isOffline = checkForExpiration && i2p::transport::transports.GetNumPeers () < NETDB_MIN_TRANSPORTS; // enough routers and uptime, but no transports
std::list<std::pair<std::string, std::shared_ptr<RouterInfo::Buffer> > > saveToDisk; std::list<std::pair<std::string, std::shared_ptr<RouterInfo::Buffer> > > saveToDisk;
std::list<std::string> removeFromDisk; std::list<std::string> removeFromDisk;

2
libi2pd/SSU2.cpp

@ -1389,7 +1389,7 @@ namespace transport
excluded.insert (ident); excluded.insert (ident);
} }
// sesssion about to expire are not counted // session about to expire are not counted
for (auto i = introducers.size (); i < SSU2_MAX_NUM_INTRODUCERS + numOldSessions; i++) for (auto i = introducers.size (); i < SSU2_MAX_NUM_INTRODUCERS + numOldSessions; i++)
{ {
auto introducer = i2p::data::netdb.GetRandomSSU2Introducer (v4, excluded); auto introducer = i2p::data::netdb.GetRandomSSU2Introducer (v4, excluded);

4
libi2pd/SSU2OutOfSession.cpp

@ -68,7 +68,7 @@ namespace transport
void SSU2PeerTestSession::HandleAddress (const uint8_t * buf, size_t len) void SSU2PeerTestSession::HandleAddress (const uint8_t * buf, size_t len)
{ {
if (!ExtractEndpoint (buf, len, m_OurEndpoint)) if (!ExtractEndpoint (buf, len, m_OurEndpoint))
LogPrint (eLogWarning, "SSU2: Can't hanlde address block from peer test message"); LogPrint (eLogWarning, "SSU2: Can't handle address block from peer test message");
} }
void SSU2PeerTestSession::HandlePeerTest (const uint8_t * buf, size_t len) void SSU2PeerTestSession::HandlePeerTest (const uint8_t * buf, size_t len)
@ -89,7 +89,7 @@ namespace transport
{ {
if (htobe64 (((uint64_t)nonce << 32) | nonce) == GetSourceConnID ()) if (htobe64 (((uint64_t)nonce << 32) | nonce) == GetSourceConnID ())
{ {
m_PeerTestResendTimer.cancel (); // calcel delayed msg 6 if any m_PeerTestResendTimer.cancel (); // cancel delayed msg 6 if any
m_IsConnectedRecently = GetServer ().IsConnectedRecently (GetRemoteEndpoint ()); m_IsConnectedRecently = GetServer ().IsConnectedRecently (GetRemoteEndpoint ());
if (GetAddress ()) if (GetAddress ())
{ {

2
libi2pd/Streaming.cpp

@ -958,7 +958,7 @@ namespace stream
if (choking || requestImmediateAck) if (choking || requestImmediateAck)
{ {
htobe16buf (packet + size, 2); // 2 bytes delay interval htobe16buf (packet + size, 2); // 2 bytes delay interval
htobe16buf (packet + size + 2, choking ? DELAY_CHOKING : 0); // set choking or immediated ack interval htobe16buf (packet + size + 2, choking ? DELAY_CHOKING : 0); // set choking or immediate ack interval
size += 2; size += 2;
if (requestImmediateAck) // ack request sent if (requestImmediateAck) // ack request sent
{ {

2
libi2pd/Streaming.h

@ -298,7 +298,7 @@ namespace stream
int m_WindowIncCounter, m_RTO, m_AckDelay, m_PrevRTTSample; int m_WindowIncCounter, m_RTO, m_AckDelay, m_PrevRTTSample;
double m_Jitter; double m_Jitter;
uint64_t m_MinPacingTime, m_PacingTime, m_PacingTimeRem, // microseconds uint64_t m_MinPacingTime, m_PacingTime, m_PacingTimeRem, // microseconds
m_LastSendTime, m_RemoteLeaseChangeTime; // miliseconds m_LastSendTime, m_RemoteLeaseChangeTime; // milliseconds
uint64_t m_LastACKSendTime, m_PacketACKInterval, m_PacketACKIntervalRem; // for limit inbound speed uint64_t m_LastACKSendTime, m_PacketACKInterval, m_PacketACKIntervalRem; // for limit inbound speed
int m_NumResendAttempts, m_NumPacketsToSend; int m_NumResendAttempts, m_NumPacketsToSend;
size_t m_MTU; size_t m_MTU;

6
libi2pd/TunnelGateway.cpp

@ -240,13 +240,13 @@ namespace tunnel
auto currentTransport = m_CurrentTransport.lock (); auto currentTransport = m_CurrentTransport.lock ();
if (!currentTransport) if (!currentTransport)
{ {
// try to obtain transport from peding reequest or send thought transport is not complete // try to obtain transport from pending request or send thought transport is not complete
if (m_PendingTransport.valid ()) // pending request? if (m_PendingTransport.valid ()) // pending request?
{ {
if (m_PendingTransport.wait_for(std::chrono::seconds(0)) == std::future_status::ready) if (m_PendingTransport.wait_for(std::chrono::seconds(0)) == std::future_status::ready)
{ {
// pending request complete // pending request complete
currentTransport = m_PendingTransport.get (); // take tarnsports used in pending request currentTransport = m_PendingTransport.get (); // take transports used in pending request
if (currentTransport) if (currentTransport)
{ {
if (currentTransport->IsEstablished ()) if (currentTransport->IsEstablished ())
@ -257,7 +257,7 @@ namespace tunnel
} }
else // still pending else // still pending
{ {
// send through transports, but don't update pedning transport // send through transports, but don't update pending transport
i2p::transport::transports.SendMessages (m_Tunnel.GetNextIdentHash (), std::move (newTunnelMsgs)); i2p::transport::transports.SendMessages (m_Tunnel.GetNextIdentHash (), std::move (newTunnelMsgs));
return; return;
} }

2
libi2pd_client/I2CP.cpp

@ -879,7 +879,7 @@ namespace client
if (!remoteSession || !m_Destination->SendMsg (buf + offset, payloadLen, remoteSession, nonce)) if (!remoteSession || !m_Destination->SendMsg (buf + offset, payloadLen, remoteSession, nonce))
{ {
i2p::data::IdentHash identHash; i2p::data::IdentHash identHash;
SHA256(ident, identSize, identHash); // caclulate ident hash, because we don't need full identity SHA256(ident, identSize, identHash); // calculate ident hash, because we don't need full identity
m_Destination->SendMsgTo (buf + offset, payloadLen, identHash, nonce); m_Destination->SendMsgTo (buf + offset, payloadLen, identHash, nonce);
} }
} }

2
libi2pd_client/UDPTunnel.cpp

@ -86,7 +86,7 @@ namespace client
} }
else else
{ {
LogPrint(eLogWarning, "UDPServer: Session with from ", remotePort, " and to ", localPort, " ports already exists. But from differend address. Removed"); LogPrint(eLogWarning, "UDPServer: Session with from ", remotePort, " and to ", localPort, " ports already exists. But from different address. Removed");
m_Sessions.erase (it); m_Sessions.erase (it);
} }
} }

Loading…
Cancel
Save