7563 Commits (413e25f20e16a0a0e1b01ed9cdf1d76e20ba3a5b)
 

Author SHA1 Message Date
orignal 9fec1a86cf send ack for peer test 2 years ago
orignal ffab29890b created additional ranges if acnt > 255 2 years ago
orignal 206c068d8e don't send termination without address 2 years ago
orignal dc30cd1112 handle SessionConfirmed fragments in reversed order 2 years ago
Simon Vetter 412a245e88 leaseset: add missing bound checks 2 years ago
orignal 16290bf66f fixed race condition on session termination 2 years ago
orignal 4f8b0e6484 send more SessionConfirmed termination messages. Limit send queue 2 years ago
orignal 5026dbc1b3 receive bigger packets 2 years ago
orignal 014e4b0e1d detect MTU for some known ipv6 tunnel brokers 2 years ago
orignal 14a6947b02 round MTU to multiple of 16 for SSU1 3 years ago
orignal 665a914dc3 set max MTU for ipv4 3 years ago
orignal 8feac310af start initial peer test if SSU2 only 3 years ago
orignal 3394bb4b8d calculate SSU2 session MTU and max payload size 3 years ago
orignal 1dd2bd0013 publish MTU for ipv6 SSU2 address. Max MTU of 1488 for SSU1 3 years ago
orignal 5c62726992 check clock skew and terminate 3 years ago
orignal 90981f628e Send fragmented SessionConfirmed 3 years ago
orignal 0c34189d94 correct buffer size for fragments of SessionConfirmed 3 years ago
orignal f1d3d6a7b5 set max compression for SessionConfirmed 3 years ago
orignal b0d962b49a send ack for retransmitted SessionConfirmed 3 years ago
orignal c50e453af6 check out of sequence messages range 3 years ago
orignal efbaf02016
Merge pull request #1774 from simonvetter/openssl 3 years ago
Simon Vetter 3cf809e99d fix SSU2 introducers selection logic 3 years ago
orignal 8b649aaaf8 NACKs and Acks only Ack ranges 3 years ago
orignal fdebbc4498 select sessions for introducers 3 years ago
orignal 3ff3417ff2 send termiation with reason 3 years ago
orignal bb6227281a teminate session after 5 unacked resends 3 years ago
orignal 2f44d99a74 session closing state 3 years ago
orignal ca4414d15a request relay tag if firewalled 3 years ago
orignal fbb961b43c extract correct endpoint from peer test msg 2 3 years ago
orignal fa9c174264 handle first packet from Bob 3 years ago
orignal 83f43ab166 pick 3 routers for SSU2 peer test 3 years ago
orignal f7e9e6a1c4 set status OK after both peer test msg 4 and 5 3 years ago
orignal aa21748e9a set status OK after peer test msg 5 3 years ago
orignal a2f4e08b00 set testing status for SSU2 peer test 3 years ago
orignal 66bc29d075 insert received RouterInfo into netdb immediately 3 years ago
orignal e3eebe537b set correct port for unpublished SSU2 addresses 3 years ago
orignal 3ed625f949 don't try SSU peer test if SSU is disabled 3 years ago
orignal a1e414c3b7 make SSU2 server eligible for peer test 3 years ago
R4SAS a5a35b1fa6 [daemon] check for SSU2 transport at start 3 years ago
orignal 2a24584d45 set SSU2 port if not specified 3 years ago
orignal 6039cdceb0 correct SSU2 only detection 3 years ago
orignal 473159be0f don't use port from SSU2 address 3 years ago
orignal 0e6ad548b2 invoke SSU2 peer test updates 3 years ago
orignal 6143515ac6 update our IP adress from SSU2 3 years ago
orignal 50419f200d fixed 1 packet off for out of sequence clean up 3 years ago
orignal 455390f121 clean up first out of sequence packet if too many 3 years ago
orignal d375299fa9 send token in relay response block 3 years ago
orignal 28db337166 give priority to SSU2 over SSU 3 years ago
orignal 6ca9a599ff remove session after HolePunch received 3 years ago
orignal 83bd3b6f0b use token from RelayResponse block 3 years ago