6933 Commits (83f43ab166709bc56054b1bd2b57bf8b91ad8934)
 

Author SHA1 Message Date
orignal 83f43ab166 pick 3 routers for SSU2 peer test 2 years ago
orignal f7e9e6a1c4 set status OK after both peer test msg 4 and 5 3 years ago
orignal aa21748e9a set status OK after peer test msg 5 3 years ago
orignal a2f4e08b00 set testing status for SSU2 peer test 3 years ago
orignal 66bc29d075 insert received RouterInfo into netdb immediately 3 years ago
orignal e3eebe537b set correct port for unpublished SSU2 addresses 3 years ago
orignal 3ed625f949 don't try SSU peer test if SSU is disabled 3 years ago
orignal a1e414c3b7 make SSU2 server eligible for peer test 3 years ago
R4SAS a5a35b1fa6 [daemon] check for SSU2 transport at start 3 years ago
orignal 2a24584d45 set SSU2 port if not specified 3 years ago
orignal 6039cdceb0 correct SSU2 only detection 3 years ago
orignal 473159be0f don't use port from SSU2 address 3 years ago
orignal 0e6ad548b2 invoke SSU2 peer test updates 3 years ago
orignal 6143515ac6 update our IP adress from SSU2 3 years ago
orignal 50419f200d fixed 1 packet off for out of sequence clean up 3 years ago
orignal 455390f121 clean up first out of sequence packet if too many 3 years ago
orignal d375299fa9 send token in relay response block 3 years ago
orignal 28db337166 give priority to SSU2 over SSU 3 years ago
orignal 6ca9a599ff remove session after HolePunch received 3 years ago
orignal 83bd3b6f0b use token from RelayResponse block 3 years ago
orignal a68765e021 fixed off 5 bytes for follow on fragment 3 years ago
orignal f5ed9129cd process retry as reponse to relay request 3 years ago
orignal 5e3115a614 check nonce in HolePunch relay response block 3 years ago
orignal 624c46f925 correct msg offset for follow-on fragment 3 years ago
orignal 52d1ee161f store RouterInfo in netdb from SessionConfirmed 3 years ago
orignal d3bc9eb110 update token and conn id after HolePunch 3 years ago
orignal 72b61a29c2 check TokenRequest message size 3 years ago
orignal a99fcfe54f cleanup terminated sessions 3 years ago
orignal b5d139f7b2 process session created after session request sent 3 years ago
orignal 463ed12ce8 don't pick same session for PeerTest msg 2 3 years ago
orignal baf74cb582 1 byte off for RelayRequest signature 3 years ago
orignal 63d7cffefe Merge branch 'openssl' of https://github.com/PurpleI2P/i2pd into openssl 3 years ago
orignal d7d74666b2 correct max MTU size 3 years ago
R4SAS 078d76c6f3
fix tabulation, remove long description (to be moved to documentation) 3 years ago
orignal 3539ee9be6
Merge pull request #1769 from AVAtarMod/sigtstp-patch-1 3 years ago
AVAtarMod 437282b148 [config, daemon] catch TSTP, CONT is option 3 years ago
AVAtarMod 5394b747a1 [daemon] add SIGTSTP, SIGCONT support on Unix 3 years ago
orignal dd1dd3b7cf wait for Ack for SessionConfirmed or resend 3 years ago
orignal ae77d4ad22 correct signed content for peer test msg 3 3 years ago
orignal 821987fed7 don't send peer test for unknown address/port 3 years ago
orignal 18ddba4332 send RouterInfo message to right session in relay request 3 years ago
orignal aaad6dece6 set session request sent status in right place 3 years ago
orignal ed04747b9d resend SessionRequest and SessionCreated 3 years ago
orignal 827a88d772 exclude expired SSU2 introducers 3 years ago
R4SAS 24e325db62
[make] fix install target paths for linux and homebrew 3 years ago
orignal 38e43bc9c8 check Charlie's address for PeerTest msg 4 3 years ago
orignal c3c5c7ae63 forward correct RelayResponse from Charlie to Alice 3 years ago
orignal 578a15bbe5 don't send PeerTest msg 5 if address is not supported 3 years ago
orignal 6b3d7372ae token received session state 3 years ago
orignal 55f7529167 delete pending outgoind session when Retry received 3 years ago