Ecosyste.ms: OpenCollective

An open API service for software projects hosted on Open Collective.

SagerNet

An anti-censorship community
Collective - Host: opensource - https://opencollective.com/sagernet - Website: https://sagernet.org/ - Code: https://github.com/SagerNet

README: bump document Go requirement to 1.16

Signed-off-by: Brad Fitzpatrick <[email protected]>

github.com/SagerNet/wireguard-go - fecb8f482ad8bc4d56fa6202fe15d2a221d0dbe5 authored almost 4 years ago
tun: make NativeTun.Close well behaved, not crash on double close

Signed-off-by: Brad Fitzpatrick <[email protected]>

github.com/SagerNet/wireguard-go - 0f4809f366daa77c6e2f5b09d3f05771fe9bf188 authored almost 4 years ago
global: stop using ioutil

Signed-off-by: Jason A. Donenfeld <[email protected]>

github.com/SagerNet/wireguard-go - 8bf4204d2ea388e662bd58950c2f4a61b8f92b01 authored almost 4 years ago
conn: bump to 1.16 and get rid of NetErrClosed hack

Signed-off-by: Jason A. Donenfeld <[email protected]>

github.com/SagerNet/wireguard-go - 4e439ea10e327d4894a5d2db2611e1fd03f54188 authored almost 4 years ago
version: bump snapshot

Signed-off-by: Jason A. Donenfeld <[email protected]>

github.com/SagerNet/wireguard-go - 7a0fb5bbb1720fdd9404a4cf41920e24a46e0dad authored almost 4 years ago
device: remove old version file

Signed-off-by: Jason A. Donenfeld <[email protected]>

github.com/SagerNet/wireguard-go - c7b799861998250c7847235aa373c98ffda3a405 authored almost 4 years ago
gitignore: remove old hacks

Signed-off-by: Jason A. Donenfeld <[email protected]>

github.com/SagerNet/wireguard-go - ef8115f63b226ad80b02ddab431b254cf06dc485 authored almost 4 years ago
device: use container/list instead of open coding it

This linked list implementation is awful, but maybe Go 2 will help
eventually, and at least we'r...

github.com/SagerNet/wireguard-go - 75e6d810edd3026b60fb3ca7b759236e555c2d0d authored almost 4 years ago
device: retry Up() in up/down test

We're loosing our ownership of the port when bringing the device down,
which means another test ...

github.com/SagerNet/wireguard-go - 747f5440bc18492a63eb91cba7db72b16c96176d authored almost 4 years ago
conn: close old fd before trying again

Signed-off-by: Jason A. Donenfeld <[email protected]>

github.com/SagerNet/wireguard-go - aabc3770bad3ac6674a7a3952cdcd88f11dd1a72 authored almost 4 years ago
device: flush peer queues before starting device

In case some old packets snuck in there before, this flushes before
starting afresh.

Signed-off...

github.com/SagerNet/wireguard-go - 484a9fd32494176526e0ffe81413e73362a6f92d authored almost 4 years ago
device: create peer queues at peer creation time

Rather than racing with Start(), since we're never destroying these
queues, we just set the vari...

github.com/SagerNet/wireguard-go - 5bf8d731273e0c03b84b6424f00e70b87afb248f authored almost 4 years ago
device: return error from Up() and Down()

Signed-off-by: Jason A. Donenfeld <[email protected]>

github.com/SagerNet/wireguard-go - 587a2b2a2028430893f14f9ac49e1efa5e3f8509 authored almost 4 years ago
rwcancel: add an explicit close call

This lets us collect FDs even if the GC doesn't do it for us.

Signed-off-by: Jason A. Donenfeld...

github.com/SagerNet/wireguard-go - 6f08a100410fb61093df5321b685b07ff8b801e6 authored almost 4 years ago
rwcancel: use errors.Is for unwrapping

Signed-off-by: Jason A. Donenfeld <[email protected]>

github.com/SagerNet/wireguard-go - a97ef39cd4a8a7612ff744ff0e7a4efdf3837214 authored almost 4 years ago
tun: use errors.Is for unwrapping

Signed-off-by: Jason A. Donenfeld <[email protected]>

github.com/SagerNet/wireguard-go - c040dea7985b7b5a35ca2fa746c3385732c44bd1 authored almost 4 years ago
conn: use errors.Is for unwrapping

Signed-off-by: Jason A. Donenfeld <[email protected]>

github.com/SagerNet/wireguard-go - 5cdb862f15fc4d0772ace2ca3fd0271233012185 authored almost 4 years ago
device: handshake routine writes into encryption queue

Since RoutineHandshake calls peer.SendKeepalive(), it potentially is a
writer into the encryptio...

github.com/SagerNet/wireguard-go - da32fe328bb2958773b07280c62eaebb6857f4df authored almost 4 years ago
device: make RoutineReadFromTUN keep encryption queue alive

RoutineReadFromTUN can trigger a call to SendStagedPackets.
SendStagedPackets attempts to protec...

github.com/SagerNet/wireguard-go - 4eab21a7b7192dc806a3d60c46827866fc8942fe authored almost 4 years ago
conn: try harder to have v4 and v6 ports agree

Signed-off-by: Jason A. Donenfeld <[email protected]>

github.com/SagerNet/wireguard-go - 30b96ba083e4ef61051f125770b50bd278712539 authored almost 4 years ago
device: only allocate peer queues once

This serves two purposes.

First, it makes repeatedly stopping then starting a peer cheaper.
Sec...

github.com/SagerNet/wireguard-go - 78ebce69324e241d462d624cae389396db9dbd94 authored almost 4 years ago
device: clarify device.state.state docs (again)

Signed-off-by: Josh Bleecher Snyder <[email protected]>

github.com/SagerNet/wireguard-go - cae090d116d4aa61494f5951a9d6ab6902017dce authored almost 4 years ago
device: run fewer iterations in TestUpDown

The high iteration count was useful when TestUpDown
was the nexus of new bugs to investigate.

N...

github.com/SagerNet/wireguard-go - 465261310b55898c3f67809bd56d58442bca4554 authored almost 4 years ago
device: run fewer trials in TestWaitPool when race detector enabled

On a many-core machine with the race detector enabled,
this test can take several minutes to com...

github.com/SagerNet/wireguard-go - d117d42ae74d276cd986337d218bd9f4220c789e authored almost 4 years ago
device: remove nil elem check in finalizers

This is not necessary, and removing it speeds up detection of UAF bugs.

Signed-off-by: Josh Ble...

github.com/SagerNet/wireguard-go - ecceaadd168ce682695acf1a5c004ef89e4927eb authored almost 4 years ago
device: rename unsafeRemovePeer to removePeerLocked

This matches the new naming scheme of upLocked and downLocked.

Signed-off-by: Jason A. Donenfel...

github.com/SagerNet/wireguard-go - 9e728c2eb07e9d551bef2bcb3681ea0afc2dd1a0 authored almost 4 years ago
device: remove deviceStateNew

It's never used and we won't have a use for it. Also, move to go-running
stringer, for those wit...

github.com/SagerNet/wireguard-go - eaf664e4e9134ab7d5100d7284274a821122fbbc authored almost 4 years ago
device: fix alignment on 32-bit machines and test for it

The test previously checked the offset within a substruct, not the
offset within the allocated s...

github.com/SagerNet/wireguard-go - d7bc7508e57d6227646f6aa81e5393a41a904518 authored almost 4 years ago
device: remove listen port race in tests

Signed-off-by: Jason A. Donenfeld <[email protected]>

github.com/SagerNet/wireguard-go - 6548a682a9a06cf7041e25f7aa5ac57f1f4cf3b4 authored almost 4 years ago
device: do not attach finalizer to non-returned object

Before, the code attached a finalizer to an object that wasn't returned,
resulting in immediate ...

github.com/SagerNet/wireguard-go - 6ac1240821207c90708ac205f4f98eb8b82f3ee5 authored almost 4 years ago
device: lock elem in autodraining queue before freeing

Without this, we wind up freeing packets that the encryption/decryption
queues still have, resul...

github.com/SagerNet/wireguard-go - 4b5d15ec2b1f148b4f718ed16d7e7f022b19fe1b authored almost 4 years ago
device: fix typo in comment

Signed-off-by: Jason A. Donenfeld <[email protected]>

github.com/SagerNet/wireguard-go - 02138f1f8185c0b578a7b57122f59d9c9681f64b authored almost 4 years ago
device: fix comment typo and shorten state.mu.Lock to state.Lock

Signed-off-by: Jason A. Donenfeld <[email protected]>

github.com/SagerNet/wireguard-go - a816e8511eb45975e8e0e4199c3481989953fd56 authored almost 4 years ago
device: do not log on idempotent device state change

Part of being actually idempotent is that we shouldn't penalize code
that takes advantage of thi...

github.com/SagerNet/wireguard-go - d6e76fdbd6bae64a08662eb19d3634adb4881155 authored almost 4 years ago
device: generate test keys on the fly

Signed-off-by: Jason A. Donenfeld <[email protected]>

github.com/SagerNet/wireguard-go - a60e6dab76f1e2ff44d77e75df02f76c3f66e1ca authored almost 4 years ago
device: remove mutex from Peer send/receive

The immediate motivation for this change is an observed deadlock.

1. A goroutine calls peer.Sto...

github.com/SagerNet/wireguard-go - d8dd1f254fc42878970d764b046ec5789ab30259 authored almost 4 years ago
device: create channels.go

We have a bunch of stupid channel tricks, and I'm about to add more.
Give them their own file. T...

github.com/SagerNet/wireguard-go - 57aadfcb14776a792e629dd7c22be066b7e2ed20 authored almost 4 years ago
device: print direction when ping transit fails

Signed-off-by: Josh Bleecher Snyder <[email protected]>

github.com/SagerNet/wireguard-go - af408eb9400bd94a01eea5ece8fa3da62c911818 authored almost 4 years ago
device: improve MTU change handling

The old code silently accepted negative MTUs.
It also set MTUs above the maximum.
It also had ha...

github.com/SagerNet/wireguard-go - 675ff32e6c29b4547e854c73b6aa6fdabe2cd0f5 authored almost 4 years ago
device: don't track device interface state in RoutineTUNEventReader

We already track this state elsewhere. No need to duplicate.
The cost of calling changeState is ...

github.com/SagerNet/wireguard-go - d840445e9bdd4f4db3538c9caf93d797cc987fbc authored almost 4 years ago
device: remove device.state.stopping from RoutineTUNEventReader

The TUN event reader does three things: Change MTU, device up, and device down.
Changing the MTU...

github.com/SagerNet/wireguard-go - 3516ccc1e226756c4ba6d431cbf7e3a3fe63c5f8 authored almost 4 years ago
device: overhaul device state management

This commit simplifies device state management.
It creates a single unified state variable and d...

github.com/SagerNet/wireguard-go - 0bcb822e5b4ee6408c5bcb5ad4d4e61b394a834e authored almost 4 years ago
device: separate timersInit from timersStart

timersInit sets up the timers.
It need only be done once per peer.

timersStart does the work to...

github.com/SagerNet/wireguard-go - 15810daa2283e3cfe0c811c3632f053274f31950 authored almost 4 years ago
device: remove unnecessary zeroing in peer.SendKeepalive

elem.packet is always already nil.

Signed-off-by: Josh Bleecher Snyder <[email protected]>

github.com/SagerNet/wireguard-go - da956772030b8b1fcbd37f82f08863070c93aa0f authored almost 4 years ago
device: remove device.state.stopping from RoutineHandshake

It is no longer necessary.

Signed-off-by: Josh Bleecher Snyder <[email protected]>

github.com/SagerNet/wireguard-go - 9c75f58f3d8656e9e5394959a67b630f51f9dc98 authored almost 4 years ago
device: remove device.state.stopping from RoutineDecryption

It is no longer necessary, as of 454de6f3e64abd2a7bf9201579cd92eea5280996
(device: use channel c...

github.com/SagerNet/wireguard-go - 84a42aed63c1bb2c6de0774dc568ab1c77a22b33 authored almost 4 years ago
main: add back version file

Signed-off-by: Jason A. Donenfeld <[email protected]>

github.com/SagerNet/wireguard-go - 4192036acd3b6442a60a5852b78979dde4b53ba5 authored almost 4 years ago
tai64n: add string representation for error messages

Signed-off-by: Jason A. Donenfeld <[email protected]>

github.com/SagerNet/wireguard-go - 9c7bd73be2cc7b706d471cd34d718852457e8cef authored almost 4 years ago
device: take peer handshake when reinitializing last sent handshake

This papers over other unrelated races, unfortunately.

Signed-off-by: Jason A. Donenfeld <Jason...

github.com/SagerNet/wireguard-go - 01e176af3c2b36c7da3bfd8f92f7f578ecd4fbd6 authored almost 4 years ago
device: fix goroutine leak test

The leak test had rare flakes.
If a system goroutine started at just the wrong moment, you'd get...

github.com/SagerNet/wireguard-go - 91617b4c522eaa034d39b208edc8221ba52e0954 authored almost 4 years ago
device: add up/down stress test

Signed-off-by: Jason A. Donenfeld <[email protected]>

github.com/SagerNet/wireguard-go - 7258a8973dfb2e3069fe1a8364966cfaadbdb4e1 authored almost 4 years ago
device: pass cfg strings around in tests instead of reader

This makes it easier to tag things onto the end manually for quick hacks.

Signed-off-by: Jason ...

github.com/SagerNet/wireguard-go - d9d547a3f3f83f6ea23e140e3665ac41b6aca10a authored almost 4 years ago
device: benchmark the waitpool to compare it to the prior channels

Here is the old implementation:

type WaitPool struct {
c chan interface{}
}

...

github.com/SagerNet/wireguard-go - c3bde5f59099a3b21b016bf809b83ee3de126f80 authored almost 4 years ago
device: test that we do not leak goroutines

Signed-off-by: Josh Bleecher Snyder <[email protected]>

github.com/SagerNet/wireguard-go - fd63a233c9fedad2be4e26edbc540e11d9ea5968 authored almost 4 years ago
device: tie encryption queue lifetime to the peers that write to it

Signed-off-by: Josh Bleecher Snyder <[email protected]>

github.com/SagerNet/wireguard-go - 8a374a35a0fe62dfd86df2c16166d2bb84115b93 authored almost 4 years ago
device: use a waiting sync.Pool instead of a channel

Channels are FIFO which means we have guaranteed cache misses.

Signed-off-by: Jason A. Donenfel...

github.com/SagerNet/wireguard-go - 48460703229d73fbacdd0d6b0d0f01a54f7ce751 authored almost 4 years ago
device: reduce number of append calls when padding

Signed-off-by: Jason A. Donenfeld <[email protected]>

github.com/SagerNet/wireguard-go - a9f80d8c587df99c6e8f57704aef3fe1ac62d0db authored about 4 years ago
device: use int64 instead of atomic.Value for time stamp

Signed-off-by: Jason A. Donenfeld <[email protected]>

github.com/SagerNet/wireguard-go - de51129e33a5fe4fad3da172539e9be640d39211 authored about 4 years ago
device: use new model queues for handshakes

Signed-off-by: Jason A. Donenfeld <[email protected]>

github.com/SagerNet/wireguard-go - beb25cc4fd31da09590fed3200628baf4c701f8b authored about 4 years ago
device: simplify peer queue locking

Signed-off-by: Jason A. Donenfeld <[email protected]>

github.com/SagerNet/wireguard-go - 9263014ed3f0a97800c893cb7346cc5109fc9e27 authored about 4 years ago
device: reduce nesting when staging packet

Suggested-by: Josh Bleecher Snyder <[email protected]>
Signed-off-by: Jason A. Donenfeld <Jason...

github.com/SagerNet/wireguard-go - f0f27d7fd242587ccb966c6d2e074dafe5ab7349 authored about 4 years ago
global: bump copyright

Signed-off-by: Jason A. Donenfeld <[email protected]>

github.com/SagerNet/wireguard-go - d4112d9096f4bdd68f1a109bb12df82f5f4ca5a0 authored about 4 years ago
device: remove version string

This is what modules are for, and Go binaries can introspect.

Signed-off-by: Jason A. Donenfeld...

github.com/SagerNet/wireguard-go - bf3bb888512e74bee0b79bd38826cb019ca2a0ee authored about 4 years ago
device: do not allow get to run while set runs

Signed-off-by: Jason A. Donenfeld <[email protected]>

github.com/SagerNet/wireguard-go - 6a128dde71d925fd4865ebd86855213a429b4729 authored about 4 years ago
device: avoid hex allocations in IpcGet

benchmark old ns/op new ns/op delta
BenchmarkUAPIGet-16 2872 ...

github.com/SagerNet/wireguard-go - 34c047c762c31911333833c56a6dc50c52c84f5f authored about 4 years ago
device: the psk is not a chapoly key

It's a separate type of key that gets hashed into the chain.

Signed-off-by: Jason A. Donenfeld ...

github.com/SagerNet/wireguard-go - d4725bc45685187088c84234a6d2be396a1373e5 authored about 4 years ago
device: get rid of nonce routine

This moves to a simple queue with no routine processing it, to reduce
scheduler pressure.

This ...

github.com/SagerNet/wireguard-go - 1b092ce584cbee0f86f3e25b5498870c8ca96652 authored about 4 years ago
tun: use %w for errors on linux

Signed-off-by: Jason A. Donenfeld <[email protected]>

github.com/SagerNet/wireguard-go - a11dec5dc12255ee032ce730eef3c82e77c84ed2 authored about 4 years ago
device: avoid deadlock when changing private key and removing self peers

Signed-off-by: Jason A. Donenfeld <[email protected]>

github.com/SagerNet/wireguard-go - ace50a0529bdd69f32f637ee84845bde45de07b6 authored about 4 years ago
device: use linked list for per-peer allowed-ip traversal

This makes the IpcGet method much faster.

We also refactor the traversal API to use a callback ...

github.com/SagerNet/wireguard-go - 8cc99631d025f5013e40f8a5a7b3370bff1c577e authored about 4 years ago
device: combine debug and info log levels into 'verbose'

There are very few cases, if any, in which a user only wants one of
these levels, so combine it ...

github.com/SagerNet/wireguard-go - d669c78c4306290963415568f4a64a1ae2b35b20 authored about 4 years ago
device: change logging interface to use functions

This commit overhauls wireguard-go's logging.

The primary, motivating change is to use a functi...

github.com/SagerNet/wireguard-go - 7139279cd0b08ebbd2c0322bc01d5678aa00cd0e authored about 4 years ago
device: fix shadowing of err in IpcHandle

The declaration of err in

nextByte, err := buffered.ReadByte

shadows the declaration of err i...

github.com/SagerNet/wireguard-go - 37efdcaccfb16e47137728b5462c90d0b2ae8460 authored about 4 years ago
device: remove extra error arg

Caught by go vet.
Signed-off-by: Josh Bleecher Snyder <[email protected]>

github.com/SagerNet/wireguard-go - d3a2b74df28ea7d7e90918c4431a38853990ce72 authored about 4 years ago
device: reduce allocs in Device.IpcGetOperation

Plenty more to go, but a start:

name old time/op new time/op delta
UAPIGet-4 6.3...

github.com/SagerNet/wireguard-go - 8114c9db5ffc8c63e7f58eb06228ddad4ee2e1c3 authored about 4 years ago
device: add benchmark for UAPI Device.IpcGetOperation

Signed-off-by: Josh Bleecher Snyder <[email protected]>

github.com/SagerNet/wireguard-go - e6ec3852a93c95ac55662cc34a25b71a84c6e7b0 authored about 4 years ago
conn: fix interface parameter name in Bind interface docs

Signed-off-by: Brad Fitzpatrick <[email protected]>

github.com/SagerNet/wireguard-go - 23b2790aa06270485f3d951132609afaeb888c28 authored about 4 years ago
device: allow pipelining UAPI requests

The original spec ends with \n\n especially for this reason.

Signed-off-by: Jason A. Donenfeld ...

github.com/SagerNet/wireguard-go - 18e47795e598973195887893e7d77baddec53ebb authored about 4 years ago
ipc: add missing Windows errno

Signed-off-by: Jason A. Donenfeld <[email protected]>

github.com/SagerNet/wireguard-go - a29767dda6db9811b547ceec593a7170dc33bd31 authored about 4 years ago
device: serialize access to IpcSetOperation

Interleaves IpcSetOperations would spell trouble.

Signed-off-by: Josh Bleecher Snyder <josh@tai...

github.com/SagerNet/wireguard-go - cecb41515d780213fd6b37bd04686f5296edf84c authored about 4 years ago
device: simplify handling of IPC set endpoint

Signed-off-by: Josh Bleecher Snyder <[email protected]>

github.com/SagerNet/wireguard-go - a9ce4b762cd8b9898ff69571194ad3f09ad6d7bd authored about 4 years ago
device: remove close processing fwmark

Also, a behavior change: Stop treating a blank value as 0.
It's not in the spec.

Signed-off-by:...

github.com/SagerNet/wireguard-go - d8f2cc87ee66958226157c5bb77464eee23156c2 authored about 4 years ago
device: remove unnecessary comment

Signed-off-by: Josh Bleecher Snyder <[email protected]>

github.com/SagerNet/wireguard-go - 2b8665f5f973cd0b36722ba0a8689b91b99eec7d authored about 4 years ago
device: introduce new IPC error message for unknown error

Signed-off-by: Josh Bleecher Snyder <[email protected]>

github.com/SagerNet/wireguard-go - 674a4675a10ea7eb83fad2eada5bf7211c7575f3 authored about 4 years ago
device: correct IPC error number for I/O errors

Signed-off-by: Josh Bleecher Snyder <[email protected]>

github.com/SagerNet/wireguard-go - 87bdcb2ae472711c3b0b3679fbdb393e39b4dbc3 authored about 4 years ago
device: split IpcSetOperation into parts

The goal of this change is to make the structure
of IpcSetOperation easier to follow.

IpcSetOpe...

github.com/SagerNet/wireguard-go - 6252de0db9331cbc20074e9d40165266b5816148 authored about 4 years ago
device: simplify IpcHandle error handling

Unify the handling of unexpected UAPI errors.
The comment that says "should never happen" is inc...

github.com/SagerNet/wireguard-go - 37a239e7360dd38e513fd7d717ce50de6d8215ff authored about 4 years ago
device: expand IPCError

Expand IPCError to contain a wrapped error,
and add a helper to make constructing such errors ea...

github.com/SagerNet/wireguard-go - a029b942ae25be8ea31a4945198617c76c31abcd authored about 4 years ago
device: return errors from ipc scanner

The code as written will drop any read errors on the floor.
Fix that.

Signed-off-by: Josh Bleec...

github.com/SagerNet/wireguard-go - 675aae24232750e5a41c0a10bb1195fa4bb63d42 authored about 4 years ago
device: remove dead code

If device.NewPeer returns a nil error,
then the returned peer is always non-nil.

Signed-off-by:...

github.com/SagerNet/wireguard-go - db3fa1409cae2113df73f1641d9fb1830fbcc696 authored about 4 years ago
netstack: further sequester with own go.mod and go.sum

In order to avoid even the flirtation with passing on these dependencies
to ordinary consumers o...

github.com/SagerNet/wireguard-go - fcc8ad05df75d73f10f9aaa1c468a11a66a48f87 authored about 4 years ago
netstack: introduce new module for gvisor tcp tun adapter

The Go linker isn't smart enough to prevent gvisor from being pulled
into modules that use other...

github.com/SagerNet/wireguard-go - 1d4eb2727a3ad6086229f45354933e84d85fc4e3 authored about 4 years ago
device: allow compiling with Go 1.15

Until we depend on Go 1.16 (which isn't released yet), alias our own
variable to the private mem...

github.com/SagerNet/wireguard-go - 294d3bedf959c9c496aaa877919a762acf07c684 authored about 4 years ago
tun: fix fmt.Errorf format strings

Type tcpip.Error is not an error.

I've filed https://github.com/google/gvisor/issues/5314
to fi...

github.com/SagerNet/wireguard-go - b00b2c29514549b6ec1f04b788191a9eabf4e723 authored about 4 years ago
device: remove unused trie test code

Signed-off-by: Josh Bleecher Snyder <[email protected]>

github.com/SagerNet/wireguard-go - 6a2ecb581b5940ab82814fe836cb599705da9b8a authored about 4 years ago
device: remove unused fields from DummyDatagram and DummyBind

Signed-off-by: Josh Bleecher Snyder <[email protected]>

github.com/SagerNet/wireguard-go - 86a58b51c027feb3bf8836359fb3adf1c436c53d authored about 4 years ago
conn: remove _ method receiver

Minor style fix.

Signed-off-by: Josh Bleecher Snyder <[email protected]>

github.com/SagerNet/wireguard-go - f07177c762bfc4aab7d44a4b32432b8575007bec authored about 4 years ago
device: remove unnecessary zeroing

Newly allocated objects are already zeroed.

Signed-off-by: Josh Bleecher Snyder <josh@tailscale...

github.com/SagerNet/wireguard-go - 7c5d1e355e6faa1551296c34aaced4ffe0b16d87 authored about 4 years ago
device: remove QueueInboundElement.dropped

Now that we block when enqueueing to the decryption queue,
there is only one case in which we "d...

github.com/SagerNet/wireguard-go - a86492a5673983fe7755631996a23c2dc510808f authored about 4 years ago
device: remove QueueOutboundElement.dropped

If we block when enqueuing encryption elements to the queue,
then we never drop them.

Signed-of...

github.com/SagerNet/wireguard-go - 7ee95e053c280796ecfb5533000915e7daa13f69 authored about 4 years ago