diff --git a/router/java/src/net/i2p/router/transport/udp/InboundEstablishState2.java b/router/java/src/net/i2p/router/transport/udp/InboundEstablishState2.java index c3beba3c86097da8ba552cec94888324109f219f..2830e019738450460190c24a247807341118cbba 100644 --- a/router/java/src/net/i2p/router/transport/udp/InboundEstablishState2.java +++ b/router/java/src/net/i2p/router/transport/udp/InboundEstablishState2.java @@ -136,11 +136,11 @@ class InboundEstablishState2 extends InboundEstablishState implements SSU2Payloa // probably don't need again _token = token; _handshakeState.start(); - if (_log.shouldDebug()) - _log.debug("State after start: " + _handshakeState); + //if (_log.shouldDebug()) + // _log.debug("State after start: " + _handshakeState); _handshakeState.mixHash(data, off, LONG_HEADER_SIZE); - if (_log.shouldDebug()) - _log.debug("State after mixHash 1: " + _handshakeState); + //if (_log.shouldDebug()) + // _log.debug("State after mixHash 1: " + _handshakeState); // decrypt in-place try { @@ -150,8 +150,8 @@ class InboundEstablishState2 extends InboundEstablishState implements SSU2Payloa _log.debug("Session request error, State at failure: " + _handshakeState + '\n' + net.i2p.util.HexDump.dump(data, off, len), gse); throw gse; } - if (_log.shouldDebug()) - _log.debug("State after sess req: " + _handshakeState); + //if (_log.shouldDebug()) + // _log.debug("State after sess req: " + _handshakeState); processPayload(data, off + LONG_HEADER_SIZE, len - (LONG_HEADER_SIZE + KEY_LEN + MAC_LEN), true); _sendHeaderEncryptKey2 = SSU2Util.hkdf(_context, _handshakeState.getChainingKey(), "SessCreateHeader"); _currentState = InboundState.IB_STATE_REQUEST_RECEIVED; @@ -407,14 +407,6 @@ class InboundEstablishState2 extends InboundEstablishState implements SSU2Payloa _transport.getEstablisher().receiveSessionDestroy(_remoteHostId); } - public void gotUnknown(int type, int len) { - if (_log.shouldDebug()) - _log.debug("Got UNKNOWN block, type: " + type + " len: " + len); - } - - public void gotPadding(int paddingLength, int frameLength) { - } - ///////////////////////////////////////////////////////// // end payload callbacks ///////////////////////////////////////////////////////// @@ -495,8 +487,8 @@ class InboundEstablishState2 extends InboundEstablishState implements SSU2Payloa throw new GeneralSecurityException("Token mismatch: 1: " + _token + " 2: " + token); _handshakeState.start(); _handshakeState.mixHash(data, off, 32); - if (_log.shouldDebug()) - _log.debug("State after mixHash 1: " + _handshakeState); + //if (_log.shouldDebug()) + // _log.debug("State after mixHash 1: " + _handshakeState); // decrypt in-place try { @@ -506,8 +498,8 @@ class InboundEstablishState2 extends InboundEstablishState implements SSU2Payloa _log.debug("Session Request error, State at failure: " + _handshakeState + '\n' + net.i2p.util.HexDump.dump(data, off, len), gse); throw gse; } - if (_log.shouldDebug()) - _log.debug("State after sess req: " + _handshakeState); + //if (_log.shouldDebug()) + // _log.debug("State after sess req: " + _handshakeState); _timeReceived = 0; processPayload(data, off + LONG_HEADER_SIZE, len - (LONG_HEADER_SIZE + KEY_LEN + MAC_LEN), true); packetReceived(); @@ -545,8 +537,8 @@ class InboundEstablishState2 extends InboundEstablishState implements SSU2Payloa if (rid != _rcvConnID) throw new GeneralSecurityException("Conn ID mismatch: req: " + _rcvConnID + " conf: " + rid); _handshakeState.mixHash(data, off, 16); - if (_log.shouldDebug()) - _log.debug("State after mixHash 3: " + _handshakeState); + //if (_log.shouldDebug()) + // _log.debug("State after mixHash 3: " + _handshakeState); // decrypt in-place try { @@ -556,8 +548,8 @@ class InboundEstablishState2 extends InboundEstablishState implements SSU2Payloa _log.debug("Session Confirmed error, State at failure: " + _handshakeState + '\n' + net.i2p.util.HexDump.dump(data, off, len), gse); throw gse; } - if (_log.shouldDebug()) - _log.debug("State after sess conf: " + _handshakeState); + //if (_log.shouldDebug()) + // _log.debug("State after sess conf: " + _handshakeState); processPayload(data, off + SHORT_HEADER_SIZE, len - (SHORT_HEADER_SIZE + KEY_LEN + MAC_LEN + MAC_LEN), false); packetReceived(); if (_currentState == InboundState.IB_STATE_FAILED) { diff --git a/router/java/src/net/i2p/router/transport/udp/OutboundEstablishState2.java b/router/java/src/net/i2p/router/transport/udp/OutboundEstablishState2.java index a430b03858593ccb64c7e6a91b35fd7a3892daee..4b53cff3ec5518051a50095b5dd7360a54e2bdc9 100644 --- a/router/java/src/net/i2p/router/transport/udp/OutboundEstablishState2.java +++ b/router/java/src/net/i2p/router/transport/udp/OutboundEstablishState2.java @@ -270,14 +270,6 @@ class OutboundEstablishState2 extends OutboundEstablishState implements SSU2Payl _transport.getEstablisher().receiveSessionDestroy(_remoteHostId, this); } - public void gotUnknown(int type, int len) { - if (_log.shouldDebug()) - _log.debug("Got UNKNOWN block, type: " + type + " len: " + len); - } - - public void gotPadding(int paddingLength, int frameLength) { - } - ///////////////////////////////////////////////////////// // end payload callbacks ///////////////////////////////////////////////////////// diff --git a/router/java/src/net/i2p/router/transport/udp/PeerState2.java b/router/java/src/net/i2p/router/transport/udp/PeerState2.java index 94fc7211f2ecea326f044023fc117a6b3ba1bb6b..9aff6ac0758ea673dcad2394a102bf99366f9391 100644 --- a/router/java/src/net/i2p/router/transport/udp/PeerState2.java +++ b/router/java/src/net/i2p/router/transport/udp/PeerState2.java @@ -512,14 +512,6 @@ public class PeerState2 extends PeerState implements SSU2Payload.PayloadCallback _transport.getEstablisher().receiveSessionDestroy(_remoteHostId, this); } - public void gotUnknown(int type, int len) { - if (_log.shouldDebug()) - _log.debug("Got UNKNOWN block, type: " + type + " len: " + len); - } - - public void gotPadding(int paddingLength, int frameLength) { - } - ///////////////////////////////////////////////////////// // end payload callbacks ///////////////////////////////////////////////////////// diff --git a/router/java/src/net/i2p/router/transport/udp/SSU2Payload.java b/router/java/src/net/i2p/router/transport/udp/SSU2Payload.java index 69a3243de52b958bab44583326ea529d7264f078..4dfdafad392f3a0a5ec174c3759370a188ea8613 100644 --- a/router/java/src/net/i2p/router/transport/udp/SSU2Payload.java +++ b/router/java/src/net/i2p/router/transport/udp/SSU2Payload.java @@ -13,6 +13,7 @@ import net.i2p.data.i2np.I2NPMessage; import net.i2p.data.i2np.I2NPMessageException; import net.i2p.data.i2np.I2NPMessageImpl; import net.i2p.data.router.RouterInfo; +import net.i2p.util.Log; /** * @@ -125,15 +126,6 @@ class SSU2Payload { * @param lastReceived in theory could wrap around to negative, but very unlikely */ public void gotTermination(int reason, long lastReceived); - - /** - * For stats. - * @param paddingLength the number of padding bytes, not including the 3-byte block header - * @param frameLength the total size of the frame, including all blocks and block headers - */ - public void gotPadding(int paddingLength, int frameLength); - - public void gotUnknown(int type, int len); } /** @@ -364,13 +356,12 @@ class SSU2Payload { case BLOCK_PADDING: gotPadding = true; - cb.gotPadding(len, length); break; default: - if (isHandshake) - throw new IOException("Illegal block in handshake: " + type); - cb.gotUnknown(type, len); + Log log = ctx.logManager().getLog(SSU2Payload.class); + if (log.shouldWarn()) + log.warn("Got UNKNOWN block, type: " + type + " len: " + len + " on " + cb); break; }