For every bucket away from us, resend period increases by 5 minutes - so we resend
our own key every 5 minutes, and keys very far from us every 2.5 hours, increasing
linearly
RUNNING -
Static variable in class net.i2p.i2ptunnel.web.IndexBean
Simple rate calculator for periodically sampled data points - determining an
average value over a period, the number of events in that period, the maximum number
of events (using the interval between events), and lifetime data.
Determine how reliable the peer is - how likely they'll be able to respond or
otherwise carry out whatever we ask them to (or even merely be reachable)
Read the body into the data structures, after the initial type byte and
the uniqueId / expiration, using the current class's format as defined by
the I2NP specification
The local router has received a request to join the createTunnel with the next hop being nextPeer,
and we should send our decision to join it through sourceRoutePeer
Receive the raw preprocessed message at the endpoint, parsing out each
of the fragments, using those to fill various FragmentedMessages, and
sending the resulting I2NPMessages where necessary.
Instruct the router that the message received was abusive (including how
abusive on a 1-100 scale) in the hopes the router can do something to
minimize receiving abusive messages like that in the future.
We are requesting that the peerRequested create the tunnel specified with the
given nextPeer, and we are sending that request to them through outTunnel with
a request that the reply is sent back to us through replyTunnel on the given
replyThrough router.
Send a small message, wait a second, then send a large message, pushing
the first one through immediately, with the rest of the large one passed
after a brief delay.
Send a small message, wait a second, then send a large message, pushing
the first one through immediately, with the rest of the large one passed
after a brief delay.
Run the client on the given port number pointing at the specified destination
(either the base64 of the destination or file:fileNameContainingDestination).
Generate a new keypair
Sets the event "privateKey" = base64 of the privateKey stream and
sets the event "publicDestination" = base64 of the destination
Run the HTTP server pointing at the host and port specified using the private i2p
destination loaded from the specified file, replacing the HTTP headers
so that the Host: specified is the one spoofed.
Specify the hostname / IP address of the interface that the tunnels should bind to
Sets the event "listen_onResult" = "ok" or "error" after the interface has been specified
Specify whether to use its own destination for each outgoing tunnel
Sets the event "owndestResult" = "ok" or "error" after the configuration has been specified
Specify the read timeout going to be used for newly-created I2PSockets
Sets the event "read_timeoutResult" = "ok" or "error" after the interface has been specified