Simple rate calculator for periodically sampled data points - determining an
average value over a period, the number of events in that period, the maximum number
of events (using the interval between events), and lifetime data.
Pool of running threads which will process any read bytes on any of the
NTCPConnections, including the decryption of the data read, connection
handshaking, parsing bytes into I2NP messages, etc.
Read the body into the data structures, after the initial type byte and
the uniqueId / expiration, using the current class's format as defined by
the I2NP specification
Receive a test message of some sort from the given peer, queueing up any packet
that should be sent in response, or if its a reply to our own current testing,
adjusting our test state.
The local router has received a request to join the createTunnel with the next hop being nextPeer,
and we should send our decision to join it through sourceRoutePeer
Receive the raw preprocessed message at the endpoint, parsing out each
of the fragments, using those to fill various FragmentedMessages, and
sending the resulting I2NPMessages where necessary.
Determine how reliable the peer is - how likely they'll be able to respond or
otherwise carry out whatever we ask them to (or even merely be reachable)
Render the stats as determined by the specified JRobin xml config,
but note that this doesn't work on stock jvms, as it requires
DOM level 3 load and store support.
Instruct the router that the message received was abusive (including how
abusive on a 1-100 scale) in the hopes the router can do something to
minimize receiving abusive messages like that in the future.
We are requesting that the peerRequested create the tunnel specified with the
given nextPeer, and we are sending that request to them through outTunnel with
a request that the reply is sent back to us through replyTunnel on the given
replyThrough router.
For every bucket away from us, resend period increases by 5 minutes - so we resend
our own key every 5 minutes, and keys very far from us every 2.5 hours, increasing
linearly
Run the client on the given port number pointing at the specified destination
(either the base64 of the destination or file:fileNameContainingDestination).
Generate a new keypair
Sets the event "privateKey" = base64 of the privateKey stream and
sets the event "publicDestination" = base64 of the destination
Run the HTTP server pointing at the host and port specified using the private i2p
destination loaded from the specified file, replacing the HTTP headers
so that the Host: specified is the one spoofed.
Specify the hostname / IP address of the interface that the tunnels should bind to
Sets the event "listen_onResult" = "ok" or "error" after the interface has been specified
Specify whether to use its own destination for each outgoing tunnel
Sets the event "owndestResult" = "ok" or "error" after the configuration has been specified
Specify the read timeout going to be used for newly-created I2PSockets
Sets the event "read_timeoutResult" = "ok" or "error" after the interface has been specified