summaryrefslogtreecommitdiff
path: root/src/Network
AgeCommit message (Collapse)Author
2018-09-07Documented Network.Tox.Session.Joe Crayne
2018-09-07Fixed handling of lossy outgoing in Network.Lossless.Joe Crayne
2018-09-07KillPacket and PacketRequest are treated as lossy (bypass packet-queue).Joe Crayne
2018-09-07Quieter decryption of tox handshake.Joe Crayne
2018-09-07Removed unused arguments to setEstablished/setTerminated.Joe Crayne
2018-09-07Tox Alternative sessions: Outgoing seqno/ack reversed.Joe Crayne
2018-09-07Allow Transport inbound/outbout types to vary.Joe Crayne
2018-09-07Cleaner tox debug prints.Joe Crayne
2018-09-07Tox cookie: Generic & Hashable instances.Joe Crayne
2018-09-07tox: Generate keys within STM monad.Joe Crayne
2018-09-07Removed obsolete Connection.Tox.Joe Crayne
2018-08-21Alternate session manager using IntervalSet for uniqs.Joe Crayne
2018-08-21Isolated the logic to implement Tox's lossless netcrypto protocol: ↵Joe Crayne
Network.Lossless
2018-08-21Added packet data to lossy inbound event.Joe Crayne
2018-08-18Split grokPacket into inbound/outbound versions.Joe Crayne
2018-08-17Simplified PacketQueue/PacketBuffer interface.Joe Crayne
2018-06-28More performant pendingRoutes (IntMap -> Array).Joe Crayne
2018-06-28Kademlia.Search: fork -> forkIOJoe Crayne
2018-06-27Fix: Pings & Packet requests were miss-classified as lossyJames Crayne
2018-06-26More thorough thread shutdown.joe
2018-06-26testTox: a pair of simulated tox nodes.joe
2018-06-26Pair of linked transports for testing.joe
2018-06-26debug printsjoe
2018-06-26handle packet requests immediatelyjim@bo
2018-06-25Feature Negotiation messages, serialization codejim@bo
2018-06-24supply hostname for dnssd displayAndrew Cady
2018-06-24Share toxid over avahiAndrew Cady
This isn't really completely correct; there should be some possibility for denial of service. The call to setContactAddr is destructive of whatever information was there previously, but we haven't verified that we're talking to the real contact at the time it is called. This problem exists even in the ordinary path where the nodeinfocallback isn't really requiring proof of anything before throwing out data.
2018-06-24ensure setTerminated not called if there is another NetCryptoSessoin on same keyjim@bo
2018-06-24call setTerminated from destroySessionjim@bo
2018-06-24Redundant imports.joe
2018-06-24debug traces of packet request send/recievejim@bo
2018-06-24Fixed handshake behaviorAndrew Cady
The handshake code would flood the network with interminable handshakes.
2018-06-24XMPP: Type-checking on various uses of SockAddr.joe
2018-06-24fix index-bounds error & improve efficiencyjim@bo
2018-06-23atox: subProcess exe launch from dhtd netcrypto commandjim@bo
2018-06-23OutGoing hooks so SessionView is updated etcjim@bo
2018-06-23show msg in dtrace on outgoingjim@bo
2018-06-22Quieted some warnings.joe
2018-06-22Removed redundant imports and other clean up.joe
2018-06-22OutGoingResult now offers packet for conveniencejim@bo
Also, don't send anohter Online, just send duplicate packet.
2018-06-22packet request off by 1 serializatoin fix & getMissing fixjim@bo
2018-06-22Forward port to nightly-2018-06-22.joe
2018-06-22call destroySession before freshCrpytoSession on Reset-handshakejim@bo
2018-06-22fix thread cleanup bugjim@bo
2018-06-22longer ncRequestInterval (easier debugging)jim@bo
2018-06-21NetCrypto IdleEvents,TimeOutsjim@bo
2018-06-21start to implement plan in conn-notes.txtAndrew Cady
2018-06-21PacketRequest deserialize should match serializejim@bo
2018-06-21Send outgoing friend requests from XMPP clients.joe
2018-06-21TODO comments regarding ncStoredRequestsjim@bo
* In the case that the session seems to lock up, the packet requests could be (re-)handled without sorting. Just in case both sides are waiting on a missing packet.