|
||||||||||
PREV NEXT | FRAMES NO FRAMES |
Packages that use SessionTag | |
---|---|
net.i2p.client.impl | Implements the base I2P SDK for developing applications that communicate through I2P. |
net.i2p.client.streaming.impl | Implementation of a TCP-like (reliable, authenticated, in order) set of sockets for communicating over the IP-like (unreliable, unauthenticated, unordered) I2P messages. |
net.i2p.crypto | These classes provide a number of low-level cryptographic routines. |
net.i2p.data.i2np | This package defines the low-level messages sent between routers, called the Invisible Internet Network Protocol (I2NP). |
net.i2p.router.crypto | Classes formerly in net.i2p.crypto but moved here as they are only used by the router. |
net.i2p.router.message | Creates and parses garlic messages. |
net.i2p.router.networkdb.kademlia | The network database, including implementation of floodfills. |
Uses of SessionTag in net.i2p.client.impl |
---|
Methods in net.i2p.client.impl with parameters of type SessionTag | |
---|---|
void |
I2CPMessageProducer.sendMessage(I2PSessionImpl session,
Destination dest,
long nonce,
byte[] payload,
SessionTag tag,
SessionKey key,
Set tags,
SessionKey newKey,
long expires)
Package up and send the payload to the router for delivery |
Uses of SessionTag in net.i2p.client.streaming.impl |
---|
Methods in net.i2p.client.streaming.impl that return types with arguments of type SessionTag | |
---|---|
Set<SessionTag> |
PacketLocal.getTagsSent()
Deprecated. should always return null or an empty set |
Method parameters in net.i2p.client.streaming.impl with type arguments of type SessionTag | |
---|---|
void |
PacketLocal.setTagsSent(Set<SessionTag> tags)
Deprecated. I2PSession throws out the tags |
Uses of SessionTag in net.i2p.crypto |
---|
Methods in net.i2p.crypto that return SessionTag | |
---|---|
SessionTag |
SessionKeyManager.consumeNextAvailableTag(PublicKey target,
SessionKey key)
Retrieve the next available session tag for identifying the use of the given key when communicating with the target. |
Methods in net.i2p.crypto with parameters of type SessionTag | |
---|---|
SessionKey |
SessionKeyManager.consumeTag(SessionTag tag)
Determine if we have received a session key associated with the given session tag, and if so, discard it (but keep track for frequent dups) and return the decryption key it was received with (via tagsReceived(...)). |
byte[] |
ElGamalAESEngine.encrypt(byte[] data,
PublicKey target,
SessionKey key,
Set<SessionTag> tagsForDelivery,
SessionTag currentTag,
long paddedSize)
Encrypt the data to the target using the given key and deliver the specified tags No new session key This is the one called from GarlicMessageBuilder and is the primary entry point. |
byte[] |
ElGamalAESEngine.encrypt(byte[] data,
PublicKey target,
SessionKey key,
Set<SessionTag> tagsForDelivery,
SessionTag currentTag,
SessionKey newKey,
long paddedSize)
Encrypt the unencrypted data to the target. |
Method parameters in net.i2p.crypto with type arguments of type SessionTag | |
---|---|
(package private) byte[] |
ElGamalAESEngine.decryptAESBlock(byte[] encrypted,
int offset,
int encryptedLen,
SessionKey key,
byte[] iv,
byte[] sentTag,
Set<SessionTag> foundTags,
SessionKey foundKey)
private byte[] decryptAESBlock(byte encrypted[], SessionKey key, byte iv[], byte sentTag[], Set foundTags, SessionKey foundKey) throws DataFormatException { return decryptAESBlock(encrypted, 0, encrypted.length, key, iv, sentTag, foundTags, foundKey); } |
byte[] |
ElGamalAESEngine.encrypt(byte[] data,
PublicKey target,
SessionKey key,
Set<SessionTag> tagsForDelivery,
long paddedSize)
Deprecated. unused |
byte[] |
ElGamalAESEngine.encrypt(byte[] data,
PublicKey target,
SessionKey key,
Set<SessionTag> tagsForDelivery,
SessionTag currentTag,
long paddedSize)
Encrypt the data to the target using the given key and deliver the specified tags No new session key This is the one called from GarlicMessageBuilder and is the primary entry point. |
byte[] |
ElGamalAESEngine.encrypt(byte[] data,
PublicKey target,
SessionKey key,
Set<SessionTag> tagsForDelivery,
SessionTag currentTag,
SessionKey newKey,
long paddedSize)
Encrypt the unencrypted data to the target. |
(package private) byte[] |
ElGamalAESEngine.encryptAESBlock(byte[] data,
SessionKey key,
byte[] iv,
Set<SessionTag> tagsForDelivery,
SessionKey newKey,
long paddedSize)
For both scenarios, this method encrypts the AES area using the given key, iv and making sure the resulting data is at least as long as the paddedSize and also mod 16 bytes. |
TagSetHandle |
SessionKeyManager.tagsDelivered(PublicKey target,
SessionKey key,
Set<SessionTag> sessionTags)
Take note of the fact that the given sessionTags associated with the key for encryption to the target have definitely been received at the target (aka call this method after receiving an ack to a message delivering them) |
void |
SessionKeyManager.tagsReceived(SessionKey key,
Set<SessionTag> sessionTags)
Accept the given tags and associate them with the given key for decryption, with the default expiration. |
void |
SessionKeyManager.tagsReceived(SessionKey key,
Set<SessionTag> sessionTags,
long expire)
Accept the given tags and associate them with the given key for decryption, with specified expiration. |
Uses of SessionTag in net.i2p.data.i2np |
---|
Methods in net.i2p.data.i2np that return SessionTag | |
---|---|
SessionTag |
DatabaseLookupMessage.getReplyTag()
The included session tag or null if unset |
Methods in net.i2p.data.i2np with parameters of type SessionTag | |
---|---|
void |
DatabaseLookupMessage.setReplySession(SessionKey encryptKey,
SessionTag encryptTag)
Only worthwhile if sending reply via tunnel |
Uses of SessionTag in net.i2p.router.crypto |
---|
Methods in net.i2p.router.crypto that return SessionTag | |
---|---|
SessionTag |
TransientSessionKeyManager.consumeNextAvailableTag(PublicKey target,
SessionKey key)
Retrieve the next available session tag for identifying the use of the given key when communicating with the target. |
Methods in net.i2p.router.crypto with parameters of type SessionTag | |
---|---|
SessionKey |
TransientSessionKeyManager.consumeTag(SessionTag tag)
Determine if we have received a session key associated with the given session tag, and if so, discard it (but keep track for frequent dups) and return the decryption key it was received with (via tagsReceived(...)). |
Method parameters in net.i2p.router.crypto with type arguments of type SessionTag | |
---|---|
TagSetHandle |
TransientSessionKeyManager.tagsDelivered(PublicKey target,
SessionKey key,
Set<SessionTag> sessionTags)
Take note of the fact that the given sessionTags associated with the key for encryption to the target have been sent. |
void |
TransientSessionKeyManager.tagsReceived(SessionKey key,
Set<SessionTag> sessionTags)
Accept the given tags and associate them with the given key for decryption |
void |
TransientSessionKeyManager.tagsReceived(SessionKey key,
Set<SessionTag> sessionTags,
long expire)
Accept the given tags and associate them with the given key for decryption |
Uses of SessionTag in net.i2p.router.message |
---|
Methods in net.i2p.router.message with parameters of type SessionTag | |
---|---|
static GarlicMessage |
GarlicMessageBuilder.buildMessage(RouterContext ctx,
GarlicConfig config,
SessionKey wrappedKey,
Set<SessionTag> wrappedTags,
PublicKey target,
SessionKey encryptKey,
SessionTag encryptTag)
used by TestJob and directly above and for encrypting DatabaseLookupMessages |
Method parameters in net.i2p.router.message with type arguments of type SessionTag | |
---|---|
static GarlicMessage |
GarlicMessageBuilder.buildMessage(RouterContext ctx,
GarlicConfig config,
SessionKey wrappedKey,
Set<SessionTag> wrappedTags,
int numTagsToDeliver,
int lowTagsThreshold,
SessionKeyManager skm)
called by netdb and above |
static GarlicMessage |
GarlicMessageBuilder.buildMessage(RouterContext ctx,
GarlicConfig config,
SessionKey wrappedKey,
Set<SessionTag> wrappedTags,
int numTagsToDeliver,
SessionKeyManager skm)
called by OCMJH |
static GarlicMessage |
GarlicMessageBuilder.buildMessage(RouterContext ctx,
GarlicConfig config,
SessionKey wrappedKey,
Set<SessionTag> wrappedTags,
PublicKey target,
SessionKey encryptKey,
SessionTag encryptTag)
used by TestJob and directly above and for encrypting DatabaseLookupMessages |
static GarlicMessage |
GarlicMessageBuilder.buildMessage(RouterContext ctx,
GarlicConfig config,
SessionKey wrappedKey,
Set<SessionTag> wrappedTags,
SessionKeyManager skm)
Now unused, since we have to generate a reply token first in OCMOSJ but we don't know if tags are required yet. |
(package private) static GarlicMessage |
OutboundClientMessageJobHelper.createGarlicMessage(RouterContext ctx,
long replyToken,
long expiration,
PublicKey recipientPK,
PayloadGarlicConfig dataClove,
Hash from,
Destination dest,
TunnelInfo replyTunnel,
int tagsToSendOverride,
int lowTagsOverride,
SessionKey wrappedKey,
Set<SessionTag> wrappedTags,
boolean requireAck,
LeaseSet bundledReplyLeaseSet)
Allow the app to specify the data clove directly, which enables OutboundClientMessage to resend the same payload (including expiration and unique id) in different garlics (down different tunnels) This is called from OCMOSJ |
Uses of SessionTag in net.i2p.router.networkdb.kademlia |
---|
Fields in net.i2p.router.networkdb.kademlia declared as SessionTag | |
---|---|
SessionTag |
MessageWrapper.OneTimeSession.tag
|
Methods in net.i2p.router.networkdb.kademlia with parameters of type SessionTag | |
---|---|
static GarlicMessage |
MessageWrapper.wrap(RouterContext ctx,
I2NPMessage m,
SessionKey encryptKey,
SessionTag encryptTag)
Garlic wrap a message from nobody, destined for an unknown router, to hide the contents from the IBGW. |
Constructors in net.i2p.router.networkdb.kademlia with parameters of type SessionTag | |
---|---|
MessageWrapper.OneTimeSession(SessionKey key,
SessionTag tag)
|
|
||||||||||
PREV NEXT | FRAMES NO FRAMES |