Right. I've written a deeply hackerware experimental freenet node
implementation (in C) -- currently it can connect to the 'testserver'
program in Steven Hazel's libfreenet successfully. (I haven't tested the
encrypted transport against Fred yet since my node is dropping connections
right after they go up. I'm assuming this is because it has reached the
connection limit.)
Currently it doesn't do much. It has a couple of wonderfully ugly internal
APIs for message handling and encrypted I/O using either Rijndael or
Twofish. Oh, and it sends out a (probably insufficient) HandshakeRequest
if you tell it to --connect to a node, without waiting for a response. It
also dumps anything anybody sends to it both to stdout and /dev/null while
doing a perfect "I'm dumb as a fish" impression.
The source for the first release, 0.1, is available at
<URL:http://www.iki.fi/~ksandstr/reiska.html>. I'm releasing this early
because of the "release early, release often" principle (though I won't
announce further releases like this), so you can also expect the source
to rape your cat, eat your barn and make obscene phone calls to your
parents.
I'd ramble about the design goals I've set for myself, but I won't. Too
tired and all that.
(The monster acronym stands for Yet Another Freenet Node Implementation In
C. I would have put "experimental" in there somewhere, but I didn't. Ha.)
--
Kalle A. Sandstro"m ksandstr &at& iki &dot& fi
http ohutsuoli 2*viilto www piste iki piste fi viilto mato ksandstr viilto
1ED7 C636: 7728 49D5 F784 D2DD D20F 63CF 655D F19E 1ED7 C636
PGP signature