2369 Commits (9d1e5268125f91b20a6a741be1fc8cbf024f3d0b)

Author SHA1 Message Date
orignal d375299fa9 send token in relay response block 2 years ago
orignal 28db337166 give priority to SSU2 over SSU 2 years ago
orignal 6ca9a599ff remove session after HolePunch received 2 years ago
orignal 83bd3b6f0b use token from RelayResponse block 2 years ago
orignal a68765e021 fixed off 5 bytes for follow on fragment 2 years ago
orignal f5ed9129cd process retry as reponse to relay request 2 years ago
orignal 5e3115a614 check nonce in HolePunch relay response block 2 years ago
orignal 624c46f925 correct msg offset for follow-on fragment 2 years ago
orignal 52d1ee161f store RouterInfo in netdb from SessionConfirmed 2 years ago
orignal d3bc9eb110 update token and conn id after HolePunch 2 years ago
orignal 72b61a29c2 check TokenRequest message size 2 years ago
orignal a99fcfe54f cleanup terminated sessions 2 years ago
orignal b5d139f7b2 process session created after session request sent 2 years ago
orignal 463ed12ce8 don't pick same session for PeerTest msg 2 2 years ago
orignal baf74cb582 1 byte off for RelayRequest signature 2 years ago
orignal d7d74666b2 correct max MTU size 2 years ago
R4SAS 078d76c6f3
fix tabulation, remove long description (to be moved to documentation) 2 years ago
AVAtarMod 437282b148 [config, daemon] catch TSTP, CONT is option 2 years ago
orignal dd1dd3b7cf wait for Ack for SessionConfirmed or resend 2 years ago
orignal ae77d4ad22 correct signed content for peer test msg 3 2 years ago
orignal 821987fed7 don't send peer test for unknown address/port 2 years ago
orignal 18ddba4332 send RouterInfo message to right session in relay request 2 years ago
orignal aaad6dece6 set session request sent status in right place 2 years ago
orignal ed04747b9d resend SessionRequest and SessionCreated 2 years ago
orignal 827a88d772 exclude expired SSU2 introducers 2 years ago
orignal 38e43bc9c8 check Charlie's address for PeerTest msg 4 2 years ago
orignal c3c5c7ae63 forward correct RelayResponse from Charlie to Alice 2 years ago
orignal 578a15bbe5 don't send PeerTest msg 5 if address is not supported 2 years ago
orignal 6b3d7372ae token received session state 2 years ago
orignal 55f7529167 delete pending outgoind session when Retry received 2 years ago
orignal bceae244c1 delete pending outgoind session when SessionCreated received 2 years ago
orignal 5de224d6bf don't connect if pending connection already 2 years ago
orignal 694b936f30 verify signature for PeerTest msg 4 2 years ago
orignal dda25d431c check if we can send HolePunch to partcular address 2 years ago
orignal 22f9abc2f1 send errors for RelayIntro 2 years ago
orignal c6c3de9164 fixed PeerTest signature verification 2 years ago
orignal 58186f0283 handle PeerTest msg 4 if msg 5 was received before 2 years ago
orignal 0253e2d3f6 different nonce location for PeerTest msg 2 and 4 2 years ago
orignal ee20d5b804 sign data for PeerTest msg 3 and 5 2 years ago
orignal b8bc114502 correct source connection id for HolePunch 2 years ago
orignal 74d29770e1 handle unexpected PeerTest message 2 years ago
orignal e4d5788cdc correct endianess for PeerTest mesaage connection id 2 years ago
orignal 2a5cf3e4a8 SSU2 connect timer 2 years ago
orignal c348736058 send updated local RouterInfo for long sessions 2 years ago
orignal 5bb20cb039 token expiration threshold 2 years ago
orignal dd602a27b5 send RelayResponse rejection message 2 years ago
orignal 2067de162a show itag for SSU2 sessions 2 years ago
orignal 2cc106b43e bind SSU2 socket to specified interface 2 years ago
orignal b15bfd99b3 correct layout for peer test masg 2 and 4 2 years ago
orignal 67252b90b3 generate new token with longer expiration time 2 years ago