Package | Description |
---|---|
net.i2p.crypto |
These classes provide a number of low-level cryptographic routines.
|
net.i2p.router.crypto |
Classes formerly in net.i2p.crypto but moved here as they are only used by the router.
|
net.i2p.router.networkdb.kademlia |
The network database, including implementation of floodfills.
|
Modifier and Type | Method and Description |
---|---|
TagSetHandle |
SessionKeyManager.tagsDelivered(PublicKey target,
SessionKey key,
Set<SessionTag> sessionTags)
Take note of the fact that the given sessionTags associated with the key for
encryption to the target have definitely been received at the target (aka call this
method after receiving an ack to a message delivering them)
|
Modifier and Type | Method and Description |
---|---|
void |
SessionKeyManager.failTags(PublicKey target,
SessionKey key,
TagSetHandle ts) |
void |
SessionKeyManager.tagsAcked(PublicKey target,
SessionKey key,
TagSetHandle ts) |
Modifier and Type | Method and Description |
---|---|
TagSetHandle |
TransientSessionKeyManager.tagsDelivered(PublicKey target,
SessionKey key,
Set<SessionTag> sessionTags)
Take note of the fact that the given sessionTags associated with the key for
encryption to the target have been sent.
|
Modifier and Type | Method and Description |
---|---|
void |
TransientSessionKeyManager.failTags(PublicKey target,
SessionKey key,
TagSetHandle ts)
Mark these tags as invalid, since the peer
has failed to ack them in time.
|
void |
TransientSessionKeyManager.tagsAcked(PublicKey target,
SessionKey key,
TagSetHandle ts)
Mark these tags as acked, start to use them (if we haven't already)
If the set was previously failed, it will be added back in.
|
Constructor and Description |
---|
WrappedMessage(GarlicMessage msg,
SessionKeyManager skm,
PublicKey sentTo,
SessionKey sentKey,
TagSetHandle tsh) |