2015 Commits (c5cab05a6b8690f3fd2442054c1475e06dc43640)

Author SHA1 Message Date
orignal 0e477bf938 set min MTU if through proxy 2 years ago
orignal eb75eb0e55 reset port value before parsing 2 years ago
orignal 2a703e0844 SSU2 through a socks5 proxy 2 years ago
orignal 2b6d9eaa8b disable compressible padding for now 2 years ago
orignal f9b0bb0383 I2PTunnel/UDPTunnel split 2 years ago
orignal c6e8873d57 always compress SYN packet 2 years ago
orignal b2767304e9 correct padding offset 2 years ago
orignal 3d4d3ce80d compressable crypto key and padding for routers and destination 2 years ago
orignal f3aada9e1a Proxy connection and UDP associate request 2 years ago
orignal 08fd32b3bf allow different ports from RelayReponse and HolePunch 2 years ago
orignal 39a86ce5c9 handle UDP packet from proxy relay 2 years ago
orignal fe25260ee2 send UDP request to proxy relay 2 years ago
orignal 63fd05c7d3 SOCKS5 constants 2 years ago
orignal e5553f7528 milliseconds for peer test send time 2 years ago
orignal 6e3cec653d resend PeerTest msg 2 2 years ago
orignal 55976fd9dc resend PeerTest msg 1 2 years ago
R4SAS 1d9d89b115
[transports] get addresses on interfaeces before initializing RouterContext 2 years ago
orignal 3544f77e90 terminate peer session if Charlie's RouterInfo not found 2 years ago
R4SAS 96c4463d39
clean code 2 years ago
R4SAS 650b7abef6
[SSU2] add log messages about peertest 2 years ago
R4SAS 714b3856a2
[SSU2] print to log when peer test is sent 2 years ago
orignal 69ca3bc75d catch lexical_cast exceptions 2 years ago
orignal 549dcbee32 don't set port=1 2 years ago
orignal 0a0c2350f2 random seelection between NTCP2 and SSU2 priority 2 years ago
orignal cef2263a7f Transports priority for peer 2 years ago
orignal 638c376e5b enable SSU2 and disable SSU by default 2 years ago
orignal 8eade86624 moved InitTransports code from Daemon to Transports 2 years ago
orignal 24ae8d5443 don't handle more than 2 fragments in SessionConfirmed 2 years ago
orignal 030af11d86 don't merge duppicated fragment of SessionConfirmed 2 years ago
orignal 857a2bc399 verify path response 2 years ago
orignal 09e6e2940f correct max paddign size 2 years ago
orignal 23e18a34d4 check if new address is in reserved range 2 years ago
orignal 3bdef5f58d update remote endpoint and send path challenge 2 years ago
orignal cf27581c76 check min MTU 1280 2 years ago
orignal 4634bff9f0 limit number of resent packets. Resend interval variance 2 years ago
orignal 1a9c658836 immediate ack request flag 2 years ago
orignal 1a32c55ca3 delete routers with expired SSU2 introducers 2 years ago
orignal 9b5a885b3b check if I2NP message to send is not null 2 years ago
orignal f378119889 5 SSU2 peer tests if no SSU 2 years ago
orignal 8fd466c5a9 separate network status and errors 2 years ago
orignal 95f19a5fb2 send Retry instead SessionCreated if clock skew 2 years ago
orignal f98780b1d7 check timestamp for token request 2 years ago
orignal 150c89e48a don't request session if zero token received 2 years ago
R4SAS 63227ab2f1
fix log message 2 years ago
orignal b40f1b67b9 2.43.0 2 years ago
orignal f875823357 copy path challenge to response 2 years ago
orignal 75611866eb update router's transports when SSU or NTCP address was deleted 2 years ago
orignal c3dd7ed73a try to resend if window is full 2 years ago
orignal 3ae885d120 change status back to Testing from Unknow if next test was accepted 2 years ago
orignal 81f53d313c alsways set some port to SSU2 address 2 years ago