Uses of Class
net.i2p.data.SessionTag
Package
Description
Interfaces and factories for
the base I2P SDK used to develop applications that communicate
through I2P.
Implements the base I2P SDK for developing applications that communicate
through I2P.
Implementation of a TCP-like (reliable, authenticated, in order) set of sockets for
communicating over the IP-like (unreliable, unauthenticated, unordered) I2P
messages.
These classes provide a number of low-level cryptographic routines.
This package defines the low-level messages sent between routers,
called the Invisible Internet Network Protocol (I2NP).
Classes formerly in net.i2p.crypto but moved here as they are only used by the router.
Implementation of ECIES-X25519-AEAD-Ratchet (proposal 144).
Creates and parses garlic messages.
The network database, including implementation of floodfills.
-
Uses of SessionTag in net.i2p.client
Modifier and TypeMethodDescriptionboolean
I2PSession.sendMessage
(Destination dest, byte[] payload, int offset, int size, SessionKey keyUsed, Set<SessionTag> tagsSent) End-to-End Crypto is disabled, tags and keys are ignored.boolean
I2PSession.sendMessage
(Destination dest, byte[] payload, int offset, int size, SessionKey keyUsed, Set<SessionTag> tagsSent, int proto, int fromPort, int toPort) See I2PSessionMuxedImpl for proto/port details.boolean
I2PSession.sendMessage
(Destination dest, byte[] payload, int offset, int size, SessionKey keyUsed, Set<SessionTag> tagsSent, long expire) End-to-End Crypto is disabled, tags and keys are ignored.boolean
I2PSession.sendMessage
(Destination dest, byte[] payload, int offset, int size, SessionKey keyUsed, Set<SessionTag> tagsSent, long expire, int proto, int fromPort, int toPort) See I2PSessionMuxedImpl for proto/port details.boolean
I2PSession.sendMessage
(Destination dest, byte[] payload, int offset, int size, SessionKey keyUsed, Set<SessionTag> tagsSent, long expire, int proto, int fromPort, int toPort, int flags) See I2PSessionMuxedImpl for proto/port details.boolean
I2PSession.sendMessage
(Destination dest, byte[] payload, SessionKey keyUsed, Set<SessionTag> tagsSent) End-to-End Crypto is disabled, tags and keys are ignored! Like sendMessage above, except the key used and the tags sent are exposed to the application. -
Uses of SessionTag in net.i2p.client.impl
Modifier and TypeMethodDescriptionvoid
I2CPMessageProducer.sendMessage
(I2PSessionImpl session, Destination dest, long nonce, byte[] payload, SessionTag tag, SessionKey key, Set<SessionTag> tags, SessionKey newKey, long expires) Package up and send the payload to the router for deliveryModifier and TypeMethodDescriptionprotected boolean
I2PSessionImpl2.sendBestEffort
(Destination dest, byte[] payload, SessionKey keyUsed, Set<SessionTag> tagsSent, long expires) void
I2CPMessageProducer.sendMessage
(I2PSessionImpl session, Destination dest, long nonce, byte[] payload, SessionTag tag, SessionKey key, Set<SessionTag> tags, SessionKey newKey, long expires) Package up and send the payload to the router for deliveryboolean
I2PSessionImpl2.sendMessage
(Destination dest, byte[] payload, int offset, int size, SessionKey keyUsed, Set<SessionTag> tagsSent) boolean
I2PSessionImpl2.sendMessage
(Destination dest, byte[] payload, int offset, int size, SessionKey keyUsed, Set<SessionTag> tagsSent, int proto, int fromport, int toport) boolean
I2PSessionImpl2.sendMessage
(Destination dest, byte[] payload, int offset, int size, SessionKey keyUsed, Set<SessionTag> tagsSent, long expires) Unused? see MuxedImpl overrideboolean
I2PSessionImpl2.sendMessage
(Destination dest, byte[] payload, int offset, int size, SessionKey keyUsed, Set<SessionTag> tagsSent, long expire, int proto, int fromport, int toport) boolean
I2PSessionImpl2.sendMessage
(Destination dest, byte[] payload, int offset, int size, SessionKey keyUsed, Set<SessionTag> tagsSent, long expire, int proto, int fromport, int toport, int flags) boolean
I2PSessionImpl2.sendMessage
(Destination dest, byte[] payload, SessionKey keyUsed, Set<SessionTag> tagsSent) boolean
I2PSessionMuxedImpl.sendMessage
(Destination dest, byte[] payload, int offset, int size, SessionKey keyUsed, Set<SessionTag> tagsSent, int proto, int fromport, int toport) boolean
I2PSessionMuxedImpl.sendMessage
(Destination dest, byte[] payload, int offset, int size, SessionKey keyUsed, Set<SessionTag> tagsSent, long expires) boolean
I2PSessionMuxedImpl.sendMessage
(Destination dest, byte[] payload, int offset, int size, SessionKey keyUsed, Set<SessionTag> tagsSent, long expires, int proto, int fromPort, int toPort) boolean
I2PSessionMuxedImpl.sendMessage
(Destination dest, byte[] payload, int offset, int size, SessionKey keyUsed, Set<SessionTag> tagsSent, long expires, int proto, int fromPort, int toPort, int flags) -
Uses of SessionTag in net.i2p.client.streaming.impl
Modifier and TypeMethodDescriptionPacketLocal.getTagsSent()
Deprecated.should always return null or an empty setModifier and TypeMethodDescriptionvoid
PacketLocal.setTagsSent
(Set<SessionTag> tags) Deprecated.I2PSession throws out the tags -
Uses of SessionTag in net.i2p.crypto
Modifier and TypeMethodDescriptionSessionKeyManager.consumeNextAvailableTag
(PublicKey target, SessionKey key) Retrieve the next available session tag for identifying the use of the given key when communicating with the target.Modifier and TypeMethodDescriptionSessionKeyManager.consumeTag
(SessionTag tag) Determine if we have received a session key associated with the given session tag, and if so, discard it (but keep track for frequent dups) and return the decryption key it was received with (via tagsReceived(...)).Modifier and TypeMethodDescriptionSessionKeyManager.tagsDelivered
(PublicKey target, SessionKey key, Set<SessionTag> sessionTags) Take note of the fact that the given sessionTags associated with the key for encryption to the target have definitely been received at the target (aka call this method after receiving an ack to a message delivering them)void
SessionKeyManager.tagsReceived
(SessionKey key, Set<SessionTag> sessionTags) Accept the given tags and associate them with the given key for decryption, with the default expiration.void
SessionKeyManager.tagsReceived
(SessionKey key, Set<SessionTag> sessionTags, long expire) Accept the given tags and associate them with the given key for decryption, with specified expiration. -
Uses of SessionTag in net.i2p.data.i2np
Modifier and TypeMethodDescriptionDatabaseLookupMessage.getReplyTag()
The included session tag or null if unsetModifier and TypeMethodDescriptionvoid
DatabaseLookupMessage.setReplySession
(SessionKey encryptKey, SessionTag encryptTag) Only worthwhile if sending reply via tunnel -
Uses of SessionTag in net.i2p.router.crypto
Modifier and TypeMethodDescriptionTransientSessionKeyManager.consumeNextAvailableTag
(PublicKey target, SessionKey key) Retrieve the next available session tag for identifying the use of the given key when communicating with the target.Modifier and TypeMethodDescriptionTransientSessionKeyManager.consumeTag
(SessionTag tag) Determine if we have received a session key associated with the given session tag, and if so, discard it (but keep track for frequent dups) and return the decryption key it was received with (via tagsReceived(...)).byte[]
ElGamalAESEngine.encrypt
(byte[] data, PublicKey target, SessionKey key, Set<SessionTag> tagsForDelivery, SessionTag currentTag, long paddedSize) Encrypt the data to the target using the given key and deliver the specified tags No new session key This is the one called from GarlicMessageBuilder and is the primary entry point.byte[]
ElGamalAESEngine.encrypt
(byte[] data, PublicKey target, SessionKey key, Set<SessionTag> tagsForDelivery, SessionTag currentTag, SessionKey newKey, long paddedSize) Encrypt the unencrypted data to the target.Modifier and TypeMethodDescription(package private) byte[]
ElGamalAESEngine.decryptAESBlock
(byte[] encrypted, int offset, int encryptedLen, SessionKey key, byte[] iv, byte[] sentTag, Set<SessionTag> foundTags, SessionKey foundKey) private byte[] decryptAESBlock(byte encrypted[], SessionKey key, byte iv[], byte sentTag[], Set foundTags, SessionKey foundKey) throws DataFormatException { return decryptAESBlock(encrypted, 0, encrypted.length, key, iv, sentTag, foundTags, foundKey); }byte[]
ElGamalAESEngine.encrypt
(byte[] data, PublicKey target, SessionKey key, Set<SessionTag> tagsForDelivery, long paddedSize) Deprecated.unusedbyte[]
ElGamalAESEngine.encrypt
(byte[] data, PublicKey target, SessionKey key, Set<SessionTag> tagsForDelivery, SessionTag currentTag, long paddedSize) Encrypt the data to the target using the given key and deliver the specified tags No new session key This is the one called from GarlicMessageBuilder and is the primary entry point.byte[]
ElGamalAESEngine.encrypt
(byte[] data, PublicKey target, SessionKey key, Set<SessionTag> tagsForDelivery, SessionTag currentTag, SessionKey newKey, long paddedSize) Encrypt the unencrypted data to the target.(package private) final byte[]
ElGamalAESEngine.encryptAESBlock
(byte[] data, SessionKey key, byte[] iv, Set<SessionTag> tagsForDelivery, SessionKey newKey, long paddedSize) For both scenarios, this method encrypts the AES area using the given key, iv and making sure the resulting data is at least as long as the paddedSize and also mod 16 bytes.TransientSessionKeyManager.tagsDelivered
(PublicKey target, SessionKey key, Set<SessionTag> sessionTags) Take note of the fact that the given sessionTags associated with the key for encryption to the target have been sent.void
TransientSessionKeyManager.tagsReceived
(SessionKey key, Set<SessionTag> sessionTags) Accept the given tags and associate them with the given key for decryptionvoid
TransientSessionKeyManager.tagsReceived
(SessionKey key, Set<SessionTag> sessionTags, long expire) Accept the given tags and associate them with the given key for decryption -
Uses of SessionTag in net.i2p.router.crypto.ratchet
Modifier and TypeMethodDescriptionMuxedSKM.consumeNextAvailableTag
(PublicKey target, SessionKey key) ElG onlyRatchetSKM.consumeNextAvailableTag
(PublicKey target, SessionKey key) Modifier and TypeMethodDescriptionMuxedSKM.consumeTag
(SessionTag tag) RatchetSKM.consumeTag
(SessionTag tag) Modifier and TypeMethodDescriptionMuxedSKM.tagsDelivered
(PublicKey target, SessionKey key, Set<SessionTag> sessionTags) ElG onlyRatchetSKM.tagsDelivered
(PublicKey target, SessionKey key, Set<SessionTag> sessionTags) void
MuxedSKM.tagsReceived
(SessionKey key, Set<SessionTag> sessionTags) ElG onlyvoid
MuxedSKM.tagsReceived
(SessionKey key, Set<SessionTag> sessionTags, long expire) ElG onlyvoid
RatchetSKM.tagsReceived
(SessionKey key, Set<SessionTag> sessionTags) void
RatchetSKM.tagsReceived
(SessionKey key, Set<SessionTag> sessionTags, long expire) -
Uses of SessionTag in net.i2p.router.message
Modifier and TypeMethodDescriptionstatic GarlicMessage
GarlicMessageBuilder.buildMessage
(RouterContext ctx, GarlicConfig config, Set<SessionTag> wrappedTags, PublicKey target, SessionKey encryptKey, SessionTag encryptTag) ELGAMAL_2048 only.Modifier and TypeMethodDescriptionstatic GarlicMessage
GarlicMessageBuilder.buildMessage
(RouterContext ctx, GarlicConfig config, Set<SessionTag> wrappedTags, PublicKey target, SessionKey encryptKey, SessionTag encryptTag) ELGAMAL_2048 only.static GarlicMessage
GarlicMessageBuilder.buildMessage
(RouterContext ctx, GarlicConfig config, SessionKey wrappedKey, Set<SessionTag> wrappedTags, int numTagsToDeliver, int lowTagsThreshold, SessionKeyManager skm) ELGAMAL_2048 only.static GarlicMessage
GarlicMessageBuilder.buildMessage
(RouterContext ctx, GarlicConfig config, SessionKey wrappedKey, Set<SessionTag> wrappedTags, int numTagsToDeliver, SessionKeyManager skm) ELGAMAL_2048 only.static GarlicMessage
GarlicMessageBuilder.buildMessage
(RouterContext ctx, GarlicConfig config, SessionKey wrappedKey, Set<SessionTag> wrappedTags, SessionKeyManager skm) Now unused, since we have to generate a reply token first in OCMOSJ but we don't know if tags are required yet.(package private) static GarlicMessage
OutboundClientMessageJobHelper.createGarlicMessage
(RouterContext ctx, long replyToken, long expiration, PublicKey recipientPK, PayloadGarlicConfig dataClove, Hash from, Destination dest, TunnelInfo replyTunnel, int tagsToSendOverride, int lowTagsOverride, SessionKey wrappedKey, Set<SessionTag> wrappedTags, boolean requireAck, LeaseSet bundledReplyLeaseSet, ReplyCallback callback) Allow the app to specify the data clove directly, which enables OutboundClientMessage to resend the same payload (including expiration and unique id) in different garlics (down different tunnels) This is called from OCMOSJ -
Uses of SessionTag in net.i2p.router.networkdb.kademlia
Modifier and TypeFieldDescriptionfinal SessionTag
MessageWrapper.OneTimeSession.tag
non-null for ElGModifier and TypeMethodDescriptionstatic GarlicMessage
MessageWrapper.wrap
(RouterContext ctx, I2NPMessage m, SessionKey encryptKey, SessionTag encryptTag) Garlic wrap a message from nobody, destined for an unknown router, to hide the contents from the IBGW.