mirror of
https://github.com/YGGverse/aquatic.git
synced 2026-03-31 17:55:36 +00:00
Update TODO
This commit is contained in:
parent
f73910934b
commit
81983b98a2
1 changed files with 7 additions and 3 deletions
10
TODO.md
10
TODO.md
|
|
@ -7,9 +7,7 @@
|
|||
|
||||
## aquatic_http
|
||||
* handshake stuff
|
||||
* fix overcomplicated and probably incorrect implementation
|
||||
* support TLS and plain at the same time??
|
||||
* really close connections after sending response??
|
||||
* fix overcomplicated and possibly incorrect implementation
|
||||
* fixed size buffer is probably bad
|
||||
* compact peer representation in announce response: is implementation correct?
|
||||
* scrape info hash parsing: multiple ought to be accepted
|
||||
|
|
@ -110,6 +108,12 @@ just like best results in last benchmark, multiple client ips=true:
|
|||
* target-cpu=skylake: 439k
|
||||
* no target-cpu set: 388k
|
||||
|
||||
## aquatic_http / aquatic_ws
|
||||
* Shared state for HTTP with and without TLS. Peers who announce over TLS
|
||||
should be able to expect that someone snooping on the connection can't
|
||||
connect them to a info hash. If someone receives their IP in a response
|
||||
while announcing without TLS, this expectation would be broken.
|
||||
|
||||
## aquatic_udp
|
||||
|
||||
* Other HashMap hashers (such as SeaHash): seemingly not worthwhile, see
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue