Provides a severity level (larger numbers are more severe) in association with
a client reporting abusive behavior to the router or the router reporting it
to the client
If we're coming from the client subsystem itself, we already know whether
the target is definitely remote and as such don't need to recheck
ourselves, but if we aren't certain, we want it to check for us.
Add a message to be sent down the tunnel, either sending it now (perhaps
coallesced with other pending messages) or after a brief pause (_flushFrequency).
Add a message to be sent down the tunnel, either sending it now (perhaps
coallesced with other pending messages) or after a brief pause (_flushFrequency).
add the peer info, returning true if it went in properly, false if
it was rejected (causes include peer ident already connected, or no
remote host info known
This reads an underlying stream as written by AESOutputStream - AES256 encrypted
in CBC mode with PKCS#5 padding, with the padding on each and every block of
16 bytes.
This writes everything as CBC with PKCS#5 padding, but each block is padded
so as soon as a block is received it can be decrypted (rather than wait for
an arbitrary number of blocks to arrive).
fortuna instance that tries to avoid blocking if at all possible by using separate
filled buffer segments rather than one buffer (and blocking when that buffer's data
has been eaten)