5 Author: Pekka Riikonen <priikone@poseidon.pspt.fi>
7 Copyright (C) 1997 - 2001 Pekka Riikonen
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 2 of the License, or
12 (at your option) any later version.
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
21 * Server packet routines to send packets.
25 #include "serverincludes.h"
26 #include "server_internal.h"
28 /* Routine that sends packet or marks packet to be sent. This is used
29 directly only in special cases. Normal cases should use
30 silc_server_packet_send. Returns < 0 error. */
32 int silc_server_packet_send_real(SilcServer server,
33 SilcSocketConnection sock,
38 /* If rekey protocol is active we must assure that all packets are
39 sent through packet queue. */
40 if (SILC_SERVER_IS_REKEY(sock))
44 ret = silc_packet_send(sock, force_send);
48 /* Mark that there is some outgoing data available for this connection.
49 This call sets the connection both for input and output (the input
50 is set always and this call keeps the input setting, actually).
51 Actual data sending is performed by silc_server_packet_process. */
52 SILC_SET_CONNECTION_FOR_OUTPUT(sock->sock);
54 /* Mark to socket that data is pending in outgoing buffer. This flag
55 is needed if new data is added to the buffer before the earlier
56 put data is sent to the network. */
57 SILC_SET_OUTBUF_PENDING(sock);
62 /* Assembles a new packet to be sent out to network. This doesn't actually
63 send the packet but creates the packet and fills the outgoing data
64 buffer and marks the packet ready to be sent to network. However, If
65 argument force_send is TRUE the packet is sent immediately and not put
66 to queue. Normal case is that the packet is not sent immediately. */
68 void silc_server_packet_send(SilcServer server,
69 SilcSocketConnection sock,
71 SilcPacketFlags flags,
77 SilcIdType dst_id_type = SILC_ID_NONE;
82 /* Get data used in the packet sending, keys and stuff */
84 case SILC_SOCKET_TYPE_CLIENT:
85 dst_id = ((SilcClientEntry)sock->user_data)->id;
86 dst_id_type = SILC_ID_CLIENT;
88 case SILC_SOCKET_TYPE_SERVER:
89 case SILC_SOCKET_TYPE_ROUTER:
90 dst_id = ((SilcServerEntry)sock->user_data)->id;
91 dst_id_type = SILC_ID_SERVER;
97 silc_server_packet_send_dest(server, sock, type, flags, dst_id,
98 dst_id_type, data, data_len, force_send);
101 /* Assembles a new packet to be sent out to network. This doesn't actually
102 send the packet but creates the packet and fills the outgoing data
103 buffer and marks the packet ready to be sent to network. However, If
104 argument force_send is TRUE the packet is sent immediately and not put
105 to queue. Normal case is that the packet is not sent immediately.
106 Destination information is sent as argument for this function. */
108 void silc_server_packet_send_dest(SilcServer server,
109 SilcSocketConnection sock,
111 SilcPacketFlags flags,
113 SilcIdType dst_id_type,
118 SilcPacketContext packetdata;
119 SilcIDListData idata;
120 SilcCipher cipher = NULL;
121 SilcHmac hmac = NULL;
122 unsigned char *dst_id_data = NULL;
123 uint32 dst_id_len = 0;
125 SILC_LOG_DEBUG(("Sending packet, type %d", type));
127 /* Get data used in the packet sending, keys and stuff */
128 idata = (SilcIDListData)sock->user_data;
131 dst_id_data = silc_id_id2str(dst_id, dst_id_type);
132 dst_id_len = silc_id_get_len(dst_id_type);
135 /* Set the packet context pointers */
136 packetdata.type = type;
137 packetdata.flags = flags;
138 packetdata.src_id = silc_id_id2str(server->id, server->id_type);
139 packetdata.src_id_len = SILC_ID_SERVER_LEN;
140 packetdata.src_id_type = server->id_type;
141 packetdata.dst_id = dst_id_data;
142 packetdata.dst_id_len = dst_id_len;
143 packetdata.dst_id_type = dst_id_type;
144 packetdata.truelen = data_len + SILC_PACKET_HEADER_LEN +
145 packetdata.src_id_len + dst_id_len;
146 packetdata.padlen = SILC_PACKET_PADLEN(packetdata.truelen);
148 /* Prepare outgoing data buffer for packet sending */
149 silc_packet_send_prepare(sock,
150 SILC_PACKET_HEADER_LEN +
151 packetdata.src_id_len +
152 packetdata.dst_id_len,
156 SILC_LOG_DEBUG(("Putting data to outgoing buffer, len %d", data_len));
158 packetdata.buffer = sock->outbuf;
160 /* Put the data to the buffer */
161 if (data && data_len)
162 silc_buffer_put(sock->outbuf, data, data_len);
164 /* Create the outgoing packet */
165 silc_packet_assemble(&packetdata);
168 cipher = idata->send_key;
169 hmac = idata->hmac_send;
172 /* Encrypt the packet */
173 silc_packet_encrypt(cipher, hmac, sock->outbuf, sock->outbuf->len);
175 SILC_LOG_HEXDUMP(("Outgoing packet, len %d", sock->outbuf->len),
176 sock->outbuf->data, sock->outbuf->len);
178 /* Now actually send the packet */
179 silc_server_packet_send_real(server, sock, force_send);
181 if (packetdata.src_id)
182 silc_free(packetdata.src_id);
183 if (packetdata.dst_id)
184 silc_free(packetdata.dst_id);
187 /* Assembles a new packet to be sent out to network. This doesn't actually
188 send the packet but creates the packet and fills the outgoing data
189 buffer and marks the packet ready to be sent to network. However, If
190 argument force_send is TRUE the packet is sent immediately and not put
191 to queue. Normal case is that the packet is not sent immediately.
192 The source and destination information is sent as argument for this
195 void silc_server_packet_send_srcdest(SilcServer server,
196 SilcSocketConnection sock,
198 SilcPacketFlags flags,
200 SilcIdType src_id_type,
202 SilcIdType dst_id_type,
207 SilcPacketContext packetdata;
208 SilcIDListData idata;
209 SilcCipher cipher = NULL;
210 SilcHmac hmac = NULL;
211 unsigned char *dst_id_data = NULL;
212 uint32 dst_id_len = 0;
213 unsigned char *src_id_data = NULL;
214 uint32 src_id_len = 0;
216 SILC_LOG_DEBUG(("Sending packet, type %d", type));
218 /* Get data used in the packet sending, keys and stuff */
219 idata = (SilcIDListData)sock->user_data;
222 dst_id_data = silc_id_id2str(dst_id, dst_id_type);
223 dst_id_len = silc_id_get_len(dst_id_type);
227 src_id_data = silc_id_id2str(src_id, src_id_type);
228 src_id_len = silc_id_get_len(src_id_type);
231 /* Set the packet context pointers */
232 packetdata.type = type;
233 packetdata.flags = flags;
234 packetdata.src_id = src_id_data;
235 packetdata.src_id_len = src_id_len;
236 packetdata.src_id_type = src_id_type;
237 packetdata.dst_id = dst_id_data;
238 packetdata.dst_id_len = dst_id_len;
239 packetdata.dst_id_type = dst_id_type;
240 packetdata.truelen = data_len + SILC_PACKET_HEADER_LEN +
241 packetdata.src_id_len + dst_id_len;
242 packetdata.padlen = SILC_PACKET_PADLEN(packetdata.truelen);
244 /* Prepare outgoing data buffer for packet sending */
245 silc_packet_send_prepare(sock,
246 SILC_PACKET_HEADER_LEN +
247 packetdata.src_id_len +
248 packetdata.dst_id_len,
252 SILC_LOG_DEBUG(("Putting data to outgoing buffer, len %d", data_len));
254 packetdata.buffer = sock->outbuf;
256 /* Put the data to the buffer */
257 if (data && data_len)
258 silc_buffer_put(sock->outbuf, data, data_len);
260 /* Create the outgoing packet */
261 silc_packet_assemble(&packetdata);
264 cipher = idata->send_key;
265 hmac = idata->hmac_send;
268 /* Encrypt the packet */
269 silc_packet_encrypt(cipher, hmac, sock->outbuf, sock->outbuf->len);
271 SILC_LOG_HEXDUMP(("Outgoing packet, len %d", sock->outbuf->len),
272 sock->outbuf->data, sock->outbuf->len);
274 /* Now actually send the packet */
275 silc_server_packet_send_real(server, sock, force_send);
277 if (packetdata.src_id)
278 silc_free(packetdata.src_id);
279 if (packetdata.dst_id)
280 silc_free(packetdata.dst_id);
283 /* Broadcast received packet to our primary route. This function is used
284 by router to further route received broadcast packet. It is expected
285 that the broadcast flag from the packet is checked before calling this
286 function. This does not test or set the broadcast flag. */
288 void silc_server_packet_broadcast(SilcServer server,
289 SilcSocketConnection sock,
290 SilcPacketContext *packet)
292 SilcBuffer buffer = packet->buffer;
293 SilcIDListData idata;
296 SILC_LOG_DEBUG(("Broadcasting received broadcast packet"));
298 /* If the packet is originated from our primary route we are
299 not allowed to send the packet. */
300 id = silc_id_str2id(packet->src_id, packet->src_id_len, packet->src_id_type);
301 if (id && SILC_ID_SERVER_COMPARE(id, server->router->id)) {
302 idata = (SilcIDListData)sock->user_data;
304 silc_buffer_push(buffer, buffer->data - buffer->head);
305 silc_packet_send_prepare(sock, 0, 0, buffer->len);
306 silc_buffer_put(sock->outbuf, buffer->data, buffer->len);
307 silc_packet_encrypt(idata->send_key, idata->hmac_send,
308 sock->outbuf, sock->outbuf->len);
310 SILC_LOG_HEXDUMP(("Broadcasted packet, len %d", sock->outbuf->len),
311 sock->outbuf->data, sock->outbuf->len);
313 /* Now actually send the packet */
314 silc_server_packet_send_real(server, sock, TRUE);
319 SILC_LOG_DEBUG(("Will not broadcast to primary route since it is the "
320 "original sender of this packet"));
324 /* Routes received packet to `sock'. This is used to route the packets that
325 router receives but are not destined to it. */
327 void silc_server_packet_route(SilcServer server,
328 SilcSocketConnection sock,
329 SilcPacketContext *packet)
331 SilcBuffer buffer = packet->buffer;
332 SilcIDListData idata;
334 SILC_LOG_DEBUG(("Routing received packet"));
336 idata = (SilcIDListData)sock->user_data;
338 silc_buffer_push(buffer, buffer->data - buffer->head);
339 silc_packet_send_prepare(sock, 0, 0, buffer->len);
340 silc_buffer_put(sock->outbuf, buffer->data, buffer->len);
341 silc_packet_encrypt(idata->send_key, idata->hmac_send,
342 sock->outbuf, sock->outbuf->len);
344 SILC_LOG_HEXDUMP(("Routed packet, len %d", sock->outbuf->len),
345 sock->outbuf->data, sock->outbuf->len);
347 /* Now actually send the packet */
348 silc_server_packet_send_real(server, sock, TRUE);
351 /* Internal routine to actually create the channel packet and send it
352 to network. This is common function in channel message sending. If
353 `channel_message' is TRUE this encrypts the message as it is strictly
354 a channel message. If FALSE normal encryption process is used. */
357 silc_server_packet_send_to_channel_real(SilcServer server,
358 SilcSocketConnection sock,
359 SilcPacketContext *packet,
367 packet->truelen = data_len + SILC_PACKET_HEADER_LEN +
368 packet->src_id_len + packet->dst_id_len;
370 /* Prepare outgoing data buffer for packet sending */
371 silc_packet_send_prepare(sock,
372 SILC_PACKET_HEADER_LEN +
378 packet->buffer = sock->outbuf;
380 /* Put the data to buffer, assemble and encrypt the packet. The packet
381 is encrypted with normal session key shared with the client. */
382 silc_buffer_put(sock->outbuf, data, data_len);
383 silc_packet_assemble(packet);
385 silc_packet_encrypt(cipher, hmac, sock->outbuf, SILC_PACKET_HEADER_LEN +
386 packet->src_id_len + packet->dst_id_len +
389 silc_packet_encrypt(cipher, hmac, sock->outbuf, sock->outbuf->len);
391 SILC_LOG_HEXDUMP(("Channel packet, len %d", sock->outbuf->len),
392 sock->outbuf->data, sock->outbuf->len);
394 /* Now actually send the packet */
395 silc_server_packet_send_real(server, sock, force_send);
398 /* This routine is used by the server to send packets to channel. The
399 packet sent with this function is distributed to all clients on
400 the channel. Usually this is used to send notify messages to the
401 channel, things like notify about new user joining to the channel.
402 If `route' is FALSE then the packet is sent only locally and will not
403 be routed anywhere (for router locally means cell wide). If `sender'
404 is provided then the packet is not sent to that connection since it
405 originally came from it. */
407 void silc_server_packet_send_to_channel(SilcServer server,
408 SilcSocketConnection sender,
409 SilcChannelEntry channel,
416 SilcSocketConnection sock = NULL;
417 SilcPacketContext packetdata;
418 SilcClientEntry client = NULL;
419 SilcServerEntry *routed = NULL;
420 SilcChannelClientEntry chl;
421 SilcIDListData idata;
422 uint32 routed_count = 0;
424 /* This doesn't send channel message packets */
425 if (type == SILC_PACKET_CHANNEL_MESSAGE)
428 SILC_LOG_DEBUG(("Sending packet to channel"));
430 /* Set the packet context pointers. */
431 packetdata.flags = 0;
432 packetdata.type = type;
433 packetdata.src_id = silc_id_id2str(server->id, SILC_ID_SERVER);
434 packetdata.src_id_len = SILC_ID_SERVER_LEN;
435 packetdata.src_id_type = SILC_ID_SERVER;
436 packetdata.dst_id = silc_id_id2str(channel->id, SILC_ID_CHANNEL);
437 packetdata.dst_id_len = SILC_ID_CHANNEL_LEN;
438 packetdata.dst_id_type = SILC_ID_CHANNEL;
439 packetdata.truelen = data_len + SILC_PACKET_HEADER_LEN +
440 packetdata.src_id_len + packetdata.dst_id_len;
441 packetdata.padlen = SILC_PACKET_PADLEN(packetdata.truelen);
443 /* If there are global users in the channel we will send the message
444 first to our router for further routing. */
445 if (route && server->server_type == SILC_SERVER && !server->standalone &&
446 channel->global_users) {
447 SilcServerEntry router;
449 /* Get data used in packet header encryption, keys and stuff. */
450 router = server->router;
451 sock = (SilcSocketConnection)router->connection;
452 idata = (SilcIDListData)router;
454 if (sock != sender) {
455 SILC_LOG_DEBUG(("Sending channel message to router for routing"));
457 silc_server_packet_send_to_channel_real(server, sock, &packetdata,
460 data, data_len, FALSE,
465 /* Send the message to clients on the channel's client list. */
466 silc_list_start(channel->user_list);
467 while ((chl = silc_list_get(channel->user_list)) != SILC_LIST_END) {
468 client = chl->client;
470 /* If client has router set it is not locally connected client and
471 we will route the message to the router set in the client. Though,
472 send locally connected server in all cases. */
473 if (server->server_type == SILC_ROUTER && client && client->router &&
474 ((!route && client->router->router == server->id_entry) || route)) {
477 /* Check if we have sent the packet to this route already */
478 for (k = 0; k < routed_count; k++)
479 if (routed[k] == client->router)
481 if (k < routed_count)
484 /* Get data used in packet header encryption, keys and stuff. */
485 sock = (SilcSocketConnection)client->router->connection;
486 idata = (SilcIDListData)client->router;
488 if (sender && sock == sender)
491 /* Send the packet */
492 silc_server_packet_send_to_channel_real(server, sock, &packetdata,
495 data, data_len, FALSE,
498 /* We want to make sure that the packet is routed to same router
499 only once. Mark this route as sent route. */
501 routed = silc_realloc(routed, sizeof(*routed) * (k + 1));
502 routed[k] = client->router;
508 if (client && client->router)
511 /* Send to locally connected client */
514 /* Get data used in packet header encryption, keys and stuff. */
515 sock = (SilcSocketConnection)client->connection;
516 idata = (SilcIDListData)client;
518 if (sender && sock == sender)
521 /* Send the packet */
522 silc_server_packet_send_to_channel_real(server, sock, &packetdata,
525 data, data_len, FALSE,
532 silc_free(packetdata.src_id);
533 silc_free(packetdata.dst_id);
536 /* This checks whether the relayed packet came from router. If it did
537 then we'll need to encrypt it with the channel key. This is called
538 from the silc_server_packet_relay_to_channel. */
541 silc_server_packet_relay_to_channel_encrypt(SilcServer server,
542 SilcSocketConnection sock,
543 SilcChannelEntry channel,
545 unsigned int data_len)
547 /* If we are router and the packet came from router and private key
548 has not been set for the channel then we must encrypt the packet
549 as it was decrypted with the session key shared between us and the
550 router which sent it. This is so, because cells does not share the
552 if (server->server_type == SILC_ROUTER &&
553 sock->type == SILC_SOCKET_TYPE_ROUTER &&
554 !(channel->mode & SILC_CHANNEL_MODE_PRIVKEY) &&
555 channel->channel_key) {
558 uint16 data_len, flags;
560 iv_len = silc_cipher_get_block_len(channel->channel_key);
561 if (channel->iv[0] == '\0')
562 for (i = 0; i < iv_len; i++) channel->iv[i] =
563 silc_rng_get_byte(server->rng);
565 silc_hash_make(server->md5hash, channel->iv, iv_len, channel->iv);
567 /* Encode new payload. This encrypts it also. */
568 SILC_GET16_MSB(flags, data);
569 SILC_GET16_MSB(data_len, data + 2);
570 chp = silc_channel_message_payload_encode(flags, data_len,
573 channel->channel_key,
575 memcpy(data, chp->data, chp->len);
576 silc_buffer_free(chp);
580 /* This routine is explicitly used to relay messages to some channel.
581 Packets sent with this function we have received earlier and are
582 totally encrypted. This just sends the packet to all clients on
583 the channel. If the sender of the packet is someone on the channel
584 the message will not be sent to that client. The SILC Packet header
585 is encrypted with the session key shared between us and the client.
586 MAC is also computed before encrypting the header. Rest of the
587 packet will be untouched. */
589 void silc_server_packet_relay_to_channel(SilcServer server,
590 SilcSocketConnection sender_sock,
591 SilcChannelEntry channel,
593 SilcIdType sender_type,
600 SilcSocketConnection sock = NULL;
601 SilcPacketContext packetdata;
602 SilcClientEntry client = NULL;
603 SilcServerEntry *routed = NULL;
604 SilcChannelClientEntry chl;
605 uint32 routed_count = 0;
606 SilcIDListData idata;
608 SILC_LOG_DEBUG(("Relaying packet to channel"));
610 /* Set the packet context pointers. */
611 packetdata.flags = 0;
612 packetdata.type = SILC_PACKET_CHANNEL_MESSAGE;
613 packetdata.src_id = silc_id_id2str(sender, sender_type);
614 packetdata.src_id_len = silc_id_get_len(sender_type);
615 packetdata.src_id_type = sender_type;
616 packetdata.dst_id = silc_id_id2str(channel->id, SILC_ID_CHANNEL);
617 packetdata.dst_id_len = SILC_ID_CHANNEL_LEN;
618 packetdata.dst_id_type = SILC_ID_CHANNEL;
619 packetdata.padlen = SILC_PACKET_PADLEN((SILC_PACKET_HEADER_LEN +
620 packetdata.src_id_len +
621 packetdata.dst_id_len));
623 /* This encrypts the packet, if needed. It will be encrypted if
624 it came from the router thus it needs to be encrypted with the
625 channel key. If the channel key does not exist, then we know we
626 don't have a single local user on the channel. */
627 silc_server_packet_relay_to_channel_encrypt(server, sender_sock,
631 /* If there are global users in the channel we will send the message
632 first to our router for further routing. */
633 if (server->server_type == SILC_SERVER && !server->standalone &&
634 channel->global_users) {
635 SilcServerEntry router;
637 router = server->router;
639 /* Check that the sender is not our router. */
640 if (sender_sock != (SilcSocketConnection)router->connection) {
642 /* Get data used in packet header encryption, keys and stuff. */
643 sock = (SilcSocketConnection)router->connection;
644 idata = (SilcIDListData)router;
646 SILC_LOG_DEBUG(("Sending channel message to router for routing"));
648 silc_server_packet_send_to_channel_real(server, sock, &packetdata,
651 data, data_len, TRUE,
656 /* Send the message to clients on the channel's client list. */
657 silc_list_start(channel->user_list);
658 while ((chl = silc_list_get(channel->user_list)) != SILC_LIST_END) {
659 client = chl->client;
663 /* If sender is one on the channel do not send it the packet. */
664 if (!found && sender_type == SILC_ID_CLIENT &&
665 !SILC_ID_CLIENT_COMPARE(client->id, sender)) {
670 /* If the client has set router it means that it is not locally
671 connected client and we will route the packet further. */
672 if (server->server_type == SILC_ROUTER && client->router) {
675 /* Sender maybe server as well so we want to make sure that
676 we won't send the message to the server it came from. */
677 if (!found && !SILC_ID_SERVER_COMPARE(client->router->id, sender)) {
682 /* Check if we have sent the packet to this route already */
683 for (k = 0; k < routed_count; k++)
684 if (routed[k] == client->router)
686 if (k < routed_count)
689 /* Get data used in packet header encryption, keys and stuff. */
690 sock = (SilcSocketConnection)client->router->connection;
691 idata = (SilcIDListData)client->router;
693 /* Do not send to the sender. Check first whether the true
694 sender's router is same as this client's router. Also check
695 if the sender socket is the same as this client's router
698 ((SilcClientEntry)sender_entry)->router == client->router)
700 if (sender_sock && sock == sender_sock)
703 SILC_LOG_DEBUG(("Relaying packet to client ID(%s) %s (%s)",
704 silc_id_render(client->id, SILC_ID_CLIENT),
705 sock->hostname, sock->ip));
707 /* We want to make sure that the packet is routed to same router
708 only once. Mark this route as sent route. */
710 routed = silc_realloc(routed, sizeof(*routed) * (k + 1));
711 routed[k] = client->router;
714 /* If the remote connection is router then we'll decrypt the
715 channel message and re-encrypt it with the session key shared
716 between us and the remote router. This is done because the
717 channel keys are cell specific and we have different channel
718 key than the remote router has. */
719 if (sock->type == SILC_SOCKET_TYPE_ROUTER) {
721 /* If private key mode is not set then decrypt the packet
723 if (!(channel->mode & SILC_CHANNEL_MODE_PRIVKEY)) {
724 unsigned char *tmp = silc_calloc(data_len, sizeof(*data));
725 memcpy(tmp, data, data_len);
727 /* Decrypt the channel message (we don't check the MAC) */
728 if (channel->channel_key &&
729 !silc_channel_message_payload_decrypt(tmp, data_len,
730 channel->channel_key,
732 memset(tmp, 0, data_len);
737 /* Now re-encrypt and send it to the router */
738 silc_server_packet_send_srcdest(server, sock,
739 SILC_PACKET_CHANNEL_MESSAGE, 0,
741 channel->id, SILC_ID_CHANNEL,
742 tmp, data_len, force_send);
744 /* Free the copy of the channel message */
745 memset(tmp, 0, data_len);
748 /* Private key mode is set, we don't have the channel key, so
749 just re-encrypt the entire packet and send it to the router. */
750 silc_server_packet_send_srcdest(server, sock,
751 SILC_PACKET_CHANNEL_MESSAGE, 0,
753 channel->id, SILC_ID_CHANNEL,
754 data, data_len, force_send);
759 /* Send the packet (to normal server) */
760 silc_server_packet_send_to_channel_real(server, sock, &packetdata,
763 data, data_len, TRUE,
769 if (client && client->router)
772 /* Get data used in packet header encryption, keys and stuff. */
773 sock = (SilcSocketConnection)client->connection;
774 idata = (SilcIDListData)client;
776 if (sender_sock && sock == sender_sock)
779 SILC_LOG_DEBUG(("Sending packet to client ID(%s) %s (%s)",
780 silc_id_render(client->id, SILC_ID_CLIENT),
781 sock->hostname, sock->ip));
783 /* Send the packet */
784 silc_server_packet_send_to_channel_real(server, sock, &packetdata,
787 data, data_len, TRUE,
792 silc_free(packetdata.src_id);
793 silc_free(packetdata.dst_id);
796 /* This function is used to send packets strictly to all local clients
797 on a particular channel. This is used for example to distribute new
798 channel key to all our locally connected clients on the channel.
799 The packets are always encrypted with the session key shared between
800 the client, this means these are not _to the channel_ but _to the client_
803 void silc_server_packet_send_local_channel(SilcServer server,
804 SilcChannelEntry channel,
806 SilcPacketFlags flags,
811 SilcChannelClientEntry chl;
812 SilcSocketConnection sock = NULL;
814 SILC_LOG_DEBUG(("Start"));
816 /* Send the message to clients on the channel's client list. */
817 silc_list_start(channel->user_list);
818 while ((chl = silc_list_get(channel->user_list)) != SILC_LIST_END) {
819 if (chl->client && !chl->client->router) {
820 sock = (SilcSocketConnection)chl->client->connection;
822 /* Send the packet to the client */
823 silc_server_packet_send_dest(server, sock, type, flags, chl->client->id,
824 SILC_ID_CLIENT, data, data_len,
830 /* Routine used to send (relay, route) private messages to some destination.
831 If the private message key does not exist then the message is re-encrypted,
832 otherwise we just pass it along. This really is not used to send new
833 private messages (as server does not send them) but to relay received
836 void silc_server_send_private_message(SilcServer server,
837 SilcSocketConnection dst_sock,
840 SilcPacketContext *packet)
842 SilcBuffer buffer = packet->buffer;
844 /* Re-encrypt and send if private messge key does not exist */
845 if ((packet->flags & SILC_PACKET_FLAG_PRIVMSG_KEY) == FALSE) {
847 silc_buffer_push(buffer, SILC_PACKET_HEADER_LEN + packet->src_id_len
848 + packet->dst_id_len + packet->padlen);
849 silc_packet_send_prepare(dst_sock, 0, 0, buffer->len);
850 silc_buffer_put(dst_sock->outbuf, buffer->data, buffer->len);
852 /* Re-encrypt packet */
853 silc_packet_encrypt(cipher, hmac, dst_sock->outbuf, buffer->len);
855 /* Send the packet */
856 silc_server_packet_send_real(server, dst_sock, FALSE);
859 /* Key exist so encrypt just header and send it */
860 silc_buffer_push(buffer, SILC_PACKET_HEADER_LEN + packet->src_id_len
861 + packet->dst_id_len + packet->padlen);
862 silc_packet_send_prepare(dst_sock, 0, 0, buffer->len);
863 silc_buffer_put(dst_sock->outbuf, buffer->data, buffer->len);
866 silc_packet_encrypt(cipher, hmac, dst_sock->outbuf,
867 SILC_PACKET_HEADER_LEN + packet->src_id_len +
868 packet->dst_id_len + packet->padlen);
870 silc_server_packet_send_real(server, dst_sock, FALSE);
874 /* Sends current motd to client */
876 void silc_server_send_motd(SilcServer server,
877 SilcSocketConnection sock)
882 if (server->config && server->config->motd &&
883 server->config->motd->motd_file) {
885 motd = silc_file_read(server->config->motd->motd_file, &motd_len);
889 silc_server_send_notify(server, sock, FALSE, SILC_NOTIFY_TYPE_MOTD, 1,
895 /* Sends error message. Error messages may or may not have any
898 void silc_server_send_error(SilcServer server,
899 SilcSocketConnection sock,
900 const char *fmt, ...)
903 unsigned char buf[4096];
905 memset(buf, 0, sizeof(buf));
907 vsprintf(buf, fmt, ap);
910 silc_server_packet_send(server, sock, SILC_PACKET_ERROR, 0,
911 buf, strlen(buf), FALSE);
914 /* Sends notify message. If format is TRUE the variable arguments are
915 formatted and the formatted string is sent as argument payload. If it is
916 FALSE then each argument is sent as separate argument and their format
917 in the argument list must be { argument data, argument length }. */
919 void silc_server_send_notify(SilcServer server,
920 SilcSocketConnection sock,
930 packet = silc_notify_payload_encode(type, argc, ap);
931 silc_server_packet_send(server, sock, SILC_PACKET_NOTIFY,
932 broadcast ? SILC_PACKET_FLAG_BROADCAST : 0,
933 packet->data, packet->len, FALSE);
934 silc_buffer_free(packet);
937 /* Sends notify message and gets the arguments from the `args' Argument
940 void silc_server_send_notify_args(SilcServer server,
941 SilcSocketConnection sock,
949 packet = silc_notify_payload_encode_args(type, argc, args);
950 silc_server_packet_send(server, sock, SILC_PACKET_NOTIFY,
951 broadcast ? SILC_PACKET_FLAG_BROADCAST : 0,
952 packet->data, packet->len, FALSE);
953 silc_buffer_free(packet);
956 /* Send CHANNEL_CHANGE notify type. This tells the receiver to replace the
957 `old_id' with the `new_id'. */
959 void silc_server_send_notify_channel_change(SilcServer server,
960 SilcSocketConnection sock,
962 SilcChannelID *old_id,
963 SilcChannelID *new_id,
966 SilcBuffer idp1, idp2;
968 idp1 = silc_id_payload_encode((void *)old_id, SILC_ID_CHANNEL);
969 idp2 = silc_id_payload_encode((void *)new_id, SILC_ID_CHANNEL);
971 silc_server_send_notify(server, sock, broadcast,
972 SILC_NOTIFY_TYPE_CHANNEL_CHANGE,
973 2, idp1->data, idp1->len, idp2->data, idp2->len);
974 silc_buffer_free(idp1);
975 silc_buffer_free(idp2);
978 /* Send NICK_CHANGE notify type. This tells the receiver to replace the
979 `old_id' with the `new_id'. */
981 void silc_server_send_notify_nick_change(SilcServer server,
982 SilcSocketConnection sock,
984 SilcClientID *old_id,
985 SilcClientID *new_id,
988 SilcBuffer idp1, idp2;
990 idp1 = silc_id_payload_encode((void *)old_id, SILC_ID_CLIENT);
991 idp2 = silc_id_payload_encode((void *)new_id, SILC_ID_CLIENT);
993 silc_server_send_notify(server, sock, broadcast,
994 SILC_NOTIFY_TYPE_NICK_CHANGE,
995 2, idp1->data, idp1->len, idp2->data, idp2->len);
996 silc_buffer_free(idp1);
997 silc_buffer_free(idp2);
1000 /* Sends JOIN notify type. This tells that new client by `client_id' ID
1001 has joined to the `channel'. */
1003 void silc_server_send_notify_join(SilcServer server,
1004 SilcSocketConnection sock,
1006 SilcChannelEntry channel,
1007 SilcClientID *client_id,
1008 uint32 client_id_len)
1010 SilcBuffer idp1, idp2;
1012 idp1 = silc_id_payload_encode((void *)client_id, SILC_ID_CLIENT);
1013 idp2 = silc_id_payload_encode((void *)channel->id, SILC_ID_CHANNEL);
1014 silc_server_send_notify(server, sock, broadcast, SILC_NOTIFY_TYPE_JOIN,
1015 2, idp1->data, idp1->len,
1016 idp2->data, idp2->len);
1017 silc_buffer_free(idp1);
1018 silc_buffer_free(idp2);
1021 /* Sends LEAVE notify type. This tells that `client_id' has left the
1022 `channel'. The Notify packet is always destined to the channel. */
1024 void silc_server_send_notify_leave(SilcServer server,
1025 SilcSocketConnection sock,
1027 SilcChannelEntry channel,
1028 SilcClientID *client_id,
1029 uint32 client_id_len)
1033 idp = silc_id_payload_encode((void *)client_id, SILC_ID_CLIENT);
1034 silc_server_send_notify_dest(server, sock, broadcast, (void *)channel->id,
1035 SILC_ID_CHANNEL, SILC_NOTIFY_TYPE_LEAVE,
1036 1, idp->data, idp->len);
1037 silc_buffer_free(idp);
1040 /* Sends CMODE_CHANGE notify type. This tells that `client_id' changed the
1041 `channel' mode to `mode. The Notify packet is always destined to
1044 void silc_server_send_notify_cmode(SilcServer server,
1045 SilcSocketConnection sock,
1047 SilcChannelEntry channel,
1049 void *id, SilcIdType id_type,
1051 char *cipher, char *hmac)
1054 unsigned char mode[4];
1056 idp = silc_id_payload_encode((void *)id, id_type);
1057 SILC_PUT32_MSB(mode_mask, mode);
1059 silc_server_send_notify_dest(server, sock, broadcast, (void *)channel->id,
1060 SILC_ID_CHANNEL, SILC_NOTIFY_TYPE_CMODE_CHANGE,
1061 4, idp->data, idp->len,
1063 cipher, cipher ? strlen(cipher) : 0,
1064 hmac, hmac ? strlen(hmac) : 0);
1065 silc_buffer_free(idp);
1068 /* Sends CUMODE_CHANGE notify type. This tells that `client_id' changed the
1069 `target' client's mode on `channel'. The Notify packet is always
1070 destined to the channel. */
1072 void silc_server_send_notify_cumode(SilcServer server,
1073 SilcSocketConnection sock,
1075 SilcChannelEntry channel,
1077 SilcClientID *client_id,
1078 uint32 client_id_len,
1079 SilcClientID *target,
1082 SilcBuffer idp1, idp2;
1083 unsigned char mode[4];
1085 idp1 = silc_id_payload_encode((void *)client_id, SILC_ID_CLIENT);
1086 idp2 = silc_id_payload_encode((void *)target, SILC_ID_CLIENT);
1087 SILC_PUT32_MSB(mode_mask, mode);
1089 silc_server_send_notify_dest(server, sock, broadcast, (void *)channel->id,
1091 SILC_NOTIFY_TYPE_CUMODE_CHANGE, 3,
1092 idp1->data, idp1->len,
1094 idp2->data, idp2->len);
1095 silc_buffer_free(idp1);
1096 silc_buffer_free(idp2);
1099 /* Sends SIGNOFF notify type. This tells that `client_id' client has
1100 left SILC network. This function is used only between server and router
1101 traffic. This is not used to send the notify to the channel for
1102 client. The `message may be NULL. */
1104 void silc_server_send_notify_signoff(SilcServer server,
1105 SilcSocketConnection sock,
1107 SilcClientID *client_id,
1108 uint32 client_id_len,
1113 idp = silc_id_payload_encode((void *)client_id, SILC_ID_CLIENT);
1114 silc_server_send_notify(server, sock, broadcast,
1115 SILC_NOTIFY_TYPE_SIGNOFF,
1116 message ? 2 : 1, idp->data, idp->len,
1117 message, message ? strlen(message): 0);
1118 silc_buffer_free(idp);
1121 /* Sends TOPIC_SET notify type. This tells that `client_id' changed
1122 the `channel's topic to `topic'. The Notify packet is always destined
1123 to the channel. This function is used to send the topic set notifies
1126 void silc_server_send_notify_topic_set(SilcServer server,
1127 SilcSocketConnection sock,
1129 SilcChannelEntry channel,
1130 SilcClientID *client_id,
1131 uint32 client_id_len,
1136 idp = silc_id_payload_encode((void *)client_id, SILC_ID_CLIENT);
1137 silc_server_send_notify(server, sock, broadcast,
1138 SILC_NOTIFY_TYPE_SERVER_SIGNOFF,
1140 idp->data, idp->len,
1141 topic, topic ? strlen(topic) : 0);
1142 silc_buffer_free(idp);
1145 /* Send KICKED notify type. This tells that the `client_id' on `channel'
1146 was kicked off the channel. The `comment' may indicate the reason
1147 for the kicking. This function is used only between server and router
1150 void silc_server_send_notify_kicked(SilcServer server,
1151 SilcSocketConnection sock,
1153 SilcChannelEntry channel,
1154 SilcClientID *client_id,
1155 uint32 client_id_len,
1160 idp = silc_id_payload_encode((void *)client_id, SILC_ID_CLIENT);
1161 silc_server_send_notify_dest(server, sock, broadcast, (void *)channel->id,
1162 SILC_ID_CHANNEL, SILC_NOTIFY_TYPE_KICKED,
1163 comment ? 2 : 1, idp->data, idp->len,
1164 comment, comment ? strlen(comment) : 0);
1165 silc_buffer_free(idp);
1168 /* Send KILLED notify type. This tells that the `client_id' client was
1169 killed from the network. The `comment' may indicate the reason
1172 void silc_server_send_notify_killed(SilcServer server,
1173 SilcSocketConnection sock,
1175 SilcClientID *client_id,
1176 uint32 client_id_len,
1181 idp = silc_id_payload_encode((void *)client_id, SILC_ID_CLIENT);
1182 silc_server_send_notify_dest(server, sock, broadcast, (void *)client_id,
1183 SILC_ID_CLIENT, SILC_NOTIFY_TYPE_KILLED,
1184 comment ? 2 : 1, idp->data, idp->len,
1185 comment, comment ? strlen(comment) : 0);
1186 silc_buffer_free(idp);
1189 /* Sends UMODE_CHANGE notify type. This tells that `client_id' client's
1190 user mode in the SILC Network was changed. This function is used to
1191 send the packet between routers as broadcast packet. */
1193 void silc_server_send_notify_umode(SilcServer server,
1194 SilcSocketConnection sock,
1196 SilcClientID *client_id,
1197 uint32 client_id_len,
1201 unsigned char mode[4];
1203 idp = silc_id_payload_encode((void *)client_id, SILC_ID_CLIENT);
1204 SILC_PUT32_MSB(mode_mask, mode);
1206 silc_server_send_notify(server, sock, broadcast,
1207 SILC_NOTIFY_TYPE_UMODE_CHANGE, 2,
1208 idp->data, idp->len,
1210 silc_buffer_free(idp);
1213 /* Sends BAN notify type. This tells that ban has been either `add'ed
1214 or `del'eted on the `channel. This function is used to send the packet
1215 between routers as broadcast packet. */
1217 void silc_server_send_notify_ban(SilcServer server,
1218 SilcSocketConnection sock,
1220 SilcChannelEntry channel,
1221 char *add, char *del)
1225 idp = silc_id_payload_encode((void *)channel->id, SILC_ID_CHANNEL);
1226 silc_server_send_notify(server, sock, broadcast,
1227 SILC_NOTIFY_TYPE_BAN, 3,
1228 idp->data, idp->len,
1229 add, add ? strlen(add) : 0,
1230 del, del ? strlen(del) : 0);
1231 silc_buffer_free(idp);
1234 /* Sends INVITE notify type. This tells that invite has been either `add'ed
1235 or `del'eted on the `channel. The sender of the invite is the `client_id'.
1236 This function is used to send the packet between routers as broadcast
1239 void silc_server_send_notify_invite(SilcServer server,
1240 SilcSocketConnection sock,
1242 SilcChannelEntry channel,
1243 SilcClientID *client_id,
1244 uint32 client_id_len,
1245 char *add, char *del)
1247 SilcBuffer idp, idp2;
1249 idp = silc_id_payload_encode((void *)channel->id, SILC_ID_CHANNEL);
1250 idp2 = silc_id_payload_encode((void *)client_id, SILC_ID_CLIENT);
1251 silc_server_send_notify(server, sock, broadcast,
1252 SILC_NOTIFY_TYPE_INVITE, 5,
1253 idp->data, idp->len,
1254 channel->channel_name, strlen(channel->channel_name),
1255 idp2->data, idp2->len,
1256 add, add ? strlen(add) : 0,
1257 del, del ? strlen(del) : 0);
1258 silc_buffer_free(idp);
1259 silc_buffer_free(idp2);
1262 /* Sends notify message destined to specific entity. */
1264 void silc_server_send_notify_dest(SilcServer server,
1265 SilcSocketConnection sock,
1268 SilcIdType dest_id_type,
1269 SilcNotifyType type,
1277 packet = silc_notify_payload_encode(type, argc, ap);
1278 silc_server_packet_send_dest(server, sock, SILC_PACKET_NOTIFY, 0,
1279 dest_id, dest_id_type,
1280 packet->data, packet->len, FALSE);
1281 silc_buffer_free(packet);
1284 /* Sends notify message to a channel. The notify message sent is
1285 distributed to all clients on the channel. If `route_notify' is TRUE
1286 then the notify may be routed to primary route or to some other routers.
1287 If FALSE it is assured that the notify is sent only locally. If `sender'
1288 is provided then the packet is not sent to that connection since it
1289 originally came from it. */
1291 void silc_server_send_notify_to_channel(SilcServer server,
1292 SilcSocketConnection sender,
1293 SilcChannelEntry channel,
1294 unsigned char route_notify,
1295 SilcNotifyType type,
1303 packet = silc_notify_payload_encode(type, argc, ap);
1304 silc_server_packet_send_to_channel(server, sender, channel,
1305 SILC_PACKET_NOTIFY, route_notify,
1306 packet->data, packet->len, FALSE);
1307 silc_buffer_free(packet);
1310 /* Send notify message to all channels the client has joined. It is quaranteed
1311 that the message is sent only once to a client (ie. if a client is joined
1312 on two same channel it will receive only one notify message). Also, this
1313 sends only to local clients (locally connected if we are server, and to
1314 local servers if we are router). If `sender' is provided the packet is
1315 not sent to that client at all. */
1317 void silc_server_send_notify_on_channels(SilcServer server,
1318 SilcClientEntry sender,
1319 SilcClientEntry client,
1320 SilcNotifyType type,
1324 SilcSocketConnection sock = NULL;
1325 SilcPacketContext packetdata;
1327 SilcClientEntry *sent_clients = NULL;
1328 uint32 sent_clients_count = 0;
1329 SilcServerEntry *routed = NULL;
1330 uint32 routed_count = 0;
1331 SilcChannelEntry channel;
1332 SilcChannelClientEntry chl, chl2;
1333 SilcIDListData idata;
1335 unsigned char *data;
1337 int force_send = FALSE;
1340 SILC_LOG_DEBUG(("Start"));
1342 if (!silc_list_count(client->channels))
1346 packet = silc_notify_payload_encode(type, argc, ap);
1347 data = packet->data;
1348 data_len = packet->len;
1350 /* Set the packet context pointers. */
1351 packetdata.flags = 0;
1352 packetdata.type = SILC_PACKET_NOTIFY;
1353 packetdata.src_id = silc_id_id2str(server->id, SILC_ID_SERVER);
1354 packetdata.src_id_len = SILC_ID_SERVER_LEN;
1355 packetdata.src_id_type = SILC_ID_SERVER;
1357 silc_list_start(client->channels);
1358 while ((chl = silc_list_get(client->channels)) != SILC_LIST_END) {
1359 channel = chl->channel;
1361 /* Send the message to all clients on the channel's client list. */
1362 silc_list_start(channel->user_list);
1363 while ((chl2 = silc_list_get(channel->user_list)) != SILC_LIST_END) {
1366 if (sender && c == sender)
1369 /* Check if we have sent the packet to this client already */
1370 for (k = 0; k < sent_clients_count; k++)
1371 if (sent_clients[k] == c)
1373 if (k < sent_clients_count)
1376 /* If we are router and if this client has router set it is not
1377 locally connected client and we will route the message to the
1378 router set in the client. */
1379 if (c && c->router && server->server_type == SILC_ROUTER) {
1380 /* Check if we have sent the packet to this route already */
1381 for (k = 0; k < routed_count; k++)
1382 if (routed[k] == c->router)
1384 if (k < routed_count)
1387 /* Get data used in packet header encryption, keys and stuff. */
1388 sock = (SilcSocketConnection)c->router->connection;
1389 idata = (SilcIDListData)c->router;
1391 packetdata.dst_id = silc_id_id2str(c->router->id, SILC_ID_SERVER);
1392 packetdata.dst_id_len = SILC_ID_SERVER_LEN;
1393 packetdata.dst_id_type = SILC_ID_SERVER;
1394 packetdata.truelen = data_len + SILC_PACKET_HEADER_LEN +
1395 packetdata.src_id_len + packetdata.dst_id_len;
1396 packetdata.padlen = SILC_PACKET_PADLEN(packetdata.truelen);
1398 /* Send the packet */
1399 silc_server_packet_send_to_channel_real(server, sock, &packetdata,
1402 data, data_len, FALSE,
1405 silc_free(packetdata.dst_id);
1407 /* We want to make sure that the packet is routed to same router
1408 only once. Mark this route as sent route. */
1410 routed = silc_realloc(routed, sizeof(*routed) * (k + 1));
1411 routed[k] = c->router;
1420 /* Send to locally connected client */
1423 /* Get data used in packet header encryption, keys and stuff. */
1424 sock = (SilcSocketConnection)c->connection;
1425 idata = (SilcIDListData)c;
1427 packetdata.dst_id = silc_id_id2str(c->id, SILC_ID_CLIENT);
1428 packetdata.dst_id_len = SILC_ID_CLIENT_LEN;
1429 packetdata.dst_id_type = SILC_ID_CLIENT;
1430 packetdata.truelen = data_len + SILC_PACKET_HEADER_LEN +
1431 packetdata.src_id_len + packetdata.dst_id_len;
1432 packetdata.padlen = SILC_PACKET_PADLEN(packetdata.truelen);
1434 /* Send the packet */
1435 silc_server_packet_send_to_channel_real(server, sock, &packetdata,
1438 data, data_len, FALSE,
1441 silc_free(packetdata.dst_id);
1443 /* Make sure that we send the notify only once per client. */
1444 sent_clients = silc_realloc(sent_clients, sizeof(*sent_clients) *
1445 (sent_clients_count + 1));
1446 sent_clients[sent_clients_count] = c;
1447 sent_clients_count++;
1454 if (sent_clients_count)
1455 silc_free(sent_clients);
1456 silc_free(packetdata.src_id);
1459 /* Sends New ID Payload to remote end. The packet is used to distribute
1460 information about new registered clients, servers, channel etc. usually
1461 to routers so that they can keep these information up to date.
1462 If the argument `broadcast' is TRUE then the packet is sent as
1463 broadcast packet. */
1465 void silc_server_send_new_id(SilcServer server,
1466 SilcSocketConnection sock,
1468 void *id, SilcIdType id_type,
1473 SILC_LOG_DEBUG(("Start"));
1475 idp = silc_id_payload_encode(id, id_type);
1476 silc_server_packet_send(server, sock, SILC_PACKET_NEW_ID,
1477 broadcast ? SILC_PACKET_FLAG_BROADCAST : 0,
1478 idp->data, idp->len, FALSE);
1479 silc_buffer_free(idp);
1482 /* Send New Channel Payload to notify about newly created channel in the
1483 SILC network. Normal server nevers sends this packet. Router uses this
1484 to notify other routers in the network about new channel. This packet
1487 void silc_server_send_new_channel(SilcServer server,
1488 SilcSocketConnection sock,
1492 uint32 channel_id_len,
1497 uint32 name_len = strlen(channel_name);
1499 SILC_LOG_DEBUG(("Start"));
1501 cid = silc_id_id2str(channel_id, SILC_ID_CHANNEL);
1505 /* Encode the channel payload */
1506 packet = silc_channel_payload_encode(channel_name, name_len,
1507 cid, channel_id_len, mode);
1509 silc_server_packet_send(server, sock, SILC_PACKET_NEW_CHANNEL,
1510 broadcast ? SILC_PACKET_FLAG_BROADCAST : 0,
1511 packet->data, packet->len, FALSE);
1514 silc_buffer_free(packet);
1517 /* Send Channel Key payload to distribute the new channel key. Normal server
1518 sends this to router when new client joins to existing channel. Router
1519 sends this to the local server who sent the join command in case where
1520 the channel did not exist yet. Both normal and router servers uses this
1521 also to send this to locally connected clients on the channel. This
1522 must not be broadcasted packet. Routers do not send this to each other.
1523 If `sender is provided then the packet is not sent to that connection since
1524 it originally came from it. */
1526 void silc_server_send_channel_key(SilcServer server,
1527 SilcSocketConnection sender,
1528 SilcChannelEntry channel,
1529 unsigned char route)
1532 unsigned char *chid;
1535 SILC_LOG_DEBUG(("Start"));
1537 chid = silc_id_id2str(channel->id, SILC_ID_CHANNEL);
1541 /* Encode channel key packet */
1542 tmp_len = strlen(channel->channel_key->cipher->name);
1543 packet = silc_channel_key_payload_encode(SILC_ID_CHANNEL_LEN, chid, tmp_len,
1544 channel->channel_key->cipher->name,
1545 channel->key_len / 8, channel->key);
1547 silc_server_packet_send_to_channel(server, sender, channel,
1548 SILC_PACKET_CHANNEL_KEY,
1549 route, packet->data, packet->len, FALSE);
1550 silc_buffer_free(packet);
1554 /* Generic function to send any command. The arguments must be sent already
1555 encoded into correct form in correct order. */
1557 void silc_server_send_command(SilcServer server,
1558 SilcSocketConnection sock,
1559 SilcCommand command,
1567 packet = silc_command_payload_encode_vap(command, 0, argc, ap);
1568 silc_server_packet_send(server, sock, SILC_PACKET_COMMAND, 0,
1569 packet->data, packet->len, TRUE);
1570 silc_buffer_free(packet);
1573 /* Send the heartbeat packet. */
1575 void silc_server_send_heartbeat(SilcServer server,
1576 SilcSocketConnection sock)
1578 silc_server_packet_send(server, sock, SILC_PACKET_HEARTBEAT, 0,
1582 /* Generic function to relay packet we've received. This is used to relay
1583 packets to a client but generally can be used to other purposes as well. */
1585 void silc_server_relay_packet(SilcServer server,
1586 SilcSocketConnection dst_sock,
1589 SilcPacketContext *packet,
1592 silc_buffer_push(packet->buffer, SILC_PACKET_HEADER_LEN + packet->src_id_len
1593 + packet->dst_id_len + packet->padlen);
1595 silc_packet_send_prepare(dst_sock, 0, 0, packet->buffer->len);
1596 silc_buffer_put(dst_sock->outbuf, packet->buffer->data, packet->buffer->len);
1598 /* Re-encrypt packet */
1599 silc_packet_encrypt(cipher, hmac, dst_sock->outbuf, packet->buffer->len);
1601 /* Send the packet */
1602 silc_server_packet_send_real(server, dst_sock, force_send);
1604 silc_buffer_pull(packet->buffer, SILC_PACKET_HEADER_LEN + packet->src_id_len
1605 + packet->dst_id_len + packet->padlen);
1608 /* Routine used to send the connection authentication packet. */
1610 void silc_server_send_connection_auth_request(SilcServer server,
1611 SilcSocketConnection sock,
1613 SilcAuthMethod auth_meth)
1617 packet = silc_buffer_alloc(4);
1618 silc_buffer_pull_tail(packet, SILC_BUFFER_END(packet));
1619 silc_buffer_format(packet,
1620 SILC_STR_UI_SHORT(conn_type),
1621 SILC_STR_UI_SHORT(auth_meth),
1624 silc_server_packet_send(server, sock, SILC_PACKET_CONNECTION_AUTH_REQUEST,
1625 0, packet->data, packet->len, FALSE);
1626 silc_buffer_free(packet);