5 Author: Pekka Riikonen <priikone@silcnet.org>
7 Copyright (C) 1997 - 2002 Pekka Riikonen
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 2 of the License, or
12 (at your option) any later version.
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
21 * Server packet routines to send packets.
25 #include "serverincludes.h"
26 #include "server_internal.h"
28 /* Routine that sends packet or marks packet to be sent. This is used
29 directly only in special cases. Normal cases should use
30 silc_server_packet_send. Returns < 0 error. */
32 int silc_server_packet_send_real(SilcServer server,
33 SilcSocketConnection sock,
38 /* If disconnecting, ignore the data */
39 if (SILC_IS_DISCONNECTING(sock))
42 /* If rekey protocol is active we must assure that all packets are
43 sent through packet queue. */
44 if (SILC_SERVER_IS_REKEY(sock))
47 /* If outbound data is already pending do not force send */
48 if (SILC_IS_OUTBUF_PENDING(sock))
52 ret = silc_packet_send(sock, force_send);
56 /* Mark that there is some outgoing data available for this connection.
57 This call sets the connection both for input and output (the input
58 is set always and this call keeps the input setting, actually).
59 Actual data sending is performed by silc_server_packet_process. */
60 SILC_SET_CONNECTION_FOR_OUTPUT(server->schedule, sock->sock);
62 /* Mark to socket that data is pending in outgoing buffer. This flag
63 is needed if new data is added to the buffer before the earlier
64 put data is sent to the network. */
65 SILC_SET_OUTBUF_PENDING(sock);
70 /* Assembles a new packet to be sent out to network. This doesn't actually
71 send the packet but creates the packet and fills the outgoing data
72 buffer and marks the packet ready to be sent to network. However, If
73 argument force_send is TRUE the packet is sent immediately and not put
74 to queue. Normal case is that the packet is not sent immediately. */
76 void silc_server_packet_send(SilcServer server,
77 SilcSocketConnection sock,
79 SilcPacketFlags flags,
85 SilcIdType dst_id_type = SILC_ID_NONE;
86 SilcIDListData idata = (SilcIDListData)sock->user_data;
91 /* If disconnecting, ignore the data */
92 if (SILC_IS_DISCONNECTING(sock))
95 /* If entry is disabled do not sent anything. */
96 if (idata && idata->status & SILC_IDLIST_STATUS_DISABLED)
99 /* Get data used in the packet sending, keys and stuff */
101 case SILC_SOCKET_TYPE_CLIENT:
102 if (sock->user_data) {
103 dst_id = ((SilcClientEntry)sock->user_data)->id;
104 dst_id_type = SILC_ID_CLIENT;
107 case SILC_SOCKET_TYPE_SERVER:
108 case SILC_SOCKET_TYPE_ROUTER:
109 if (sock->user_data) {
110 dst_id = ((SilcServerEntry)sock->user_data)->id;
111 dst_id_type = SILC_ID_SERVER;
118 silc_server_packet_send_dest(server, sock, type, flags, dst_id,
119 dst_id_type, data, data_len, force_send);
122 /* Assembles a new packet to be sent out to network. This doesn't actually
123 send the packet but creates the packet and fills the outgoing data
124 buffer and marks the packet ready to be sent to network. However, If
125 argument force_send is TRUE the packet is sent immediately and not put
126 to queue. Normal case is that the packet is not sent immediately.
127 Destination information is sent as argument for this function. */
129 void silc_server_packet_send_dest(SilcServer server,
130 SilcSocketConnection sock,
132 SilcPacketFlags flags,
134 SilcIdType dst_id_type,
139 SilcPacketContext packetdata;
140 const SilcBufferStruct packet;
141 SilcIDListData idata = (SilcIDListData)sock->user_data;
142 SilcCipher cipher = NULL;
143 SilcHmac hmac = NULL;
144 SilcUInt32 sequence = 0;
145 unsigned char *dst_id_data = NULL;
146 SilcUInt32 dst_id_len = 0;
149 /* If disconnecting, ignore the data */
150 if (SILC_IS_DISCONNECTING(sock))
153 /* If entry is disabled do not sent anything. */
154 if (idata && idata->status & SILC_IDLIST_STATUS_DISABLED)
157 SILC_LOG_DEBUG(("Sending packet, type %d", type));
160 dst_id_data = silc_id_id2str(dst_id, dst_id_type);
161 dst_id_len = silc_id_get_len(dst_id, dst_id_type);
165 cipher = idata->send_key;
166 hmac = idata->hmac_send;
167 sequence = idata->psn_send++;
168 block_len = silc_cipher_get_block_len(cipher);
171 /* Set the packet context pointers */
172 packetdata.type = type;
173 packetdata.flags = flags;
174 packetdata.src_id = silc_id_id2str(server->id, server->id_type);
175 packetdata.src_id_len = silc_id_get_len(server->id, server->id_type);
176 packetdata.src_id_type = server->id_type;
177 packetdata.dst_id = dst_id_data;
178 packetdata.dst_id_len = dst_id_len;
179 packetdata.dst_id_type = dst_id_type;
180 data_len = SILC_PACKET_DATALEN(data_len, (SILC_PACKET_HEADER_LEN +
181 packetdata.src_id_len +
182 packetdata.dst_id_len));
183 packetdata.truelen = data_len + SILC_PACKET_HEADER_LEN +
184 packetdata.src_id_len + dst_id_len;
185 packetdata.padlen = SILC_PACKET_PADLEN(packetdata.truelen, block_len);
187 /* Create the outgoing packet */
188 if (!silc_packet_assemble(&packetdata, NULL, cipher, hmac, sock,
189 data, data_len, (const SilcBuffer)&packet)) {
190 SILC_LOG_ERROR(("Cannot assemble packet"));
194 /* Encrypt the packet */
195 silc_packet_encrypt(cipher, hmac, sequence, (SilcBuffer)&packet, packet.len);
197 SILC_LOG_HEXDUMP(("Outgoing packet (%d), len %d", sequence, packet.len),
198 packet.data, packet.len);
200 /* Now actually send the packet */
201 silc_server_packet_send_real(server, sock, force_send);
204 if (packetdata.src_id)
205 silc_free(packetdata.src_id);
206 if (packetdata.dst_id)
207 silc_free(packetdata.dst_id);
210 /* Assembles a new packet to be sent out to network. This doesn't actually
211 send the packet but creates the packet and fills the outgoing data
212 buffer and marks the packet ready to be sent to network. However, If
213 argument force_send is TRUE the packet is sent immediately and not put
214 to queue. Normal case is that the packet is not sent immediately.
215 The source and destination information is sent as argument for this
218 void silc_server_packet_send_srcdest(SilcServer server,
219 SilcSocketConnection sock,
221 SilcPacketFlags flags,
223 SilcIdType src_id_type,
225 SilcIdType dst_id_type,
230 SilcPacketContext packetdata;
231 const SilcBufferStruct packet;
232 SilcIDListData idata;
233 SilcCipher cipher = NULL;
234 SilcHmac hmac = NULL;
235 SilcUInt32 sequence = 0;
236 unsigned char *dst_id_data = NULL;
237 SilcUInt32 dst_id_len = 0;
238 unsigned char *src_id_data = NULL;
239 SilcUInt32 src_id_len = 0;
242 SILC_LOG_DEBUG(("Sending packet, type %d", type));
244 /* Get data used in the packet sending, keys and stuff */
245 idata = (SilcIDListData)sock->user_data;
248 dst_id_data = silc_id_id2str(dst_id, dst_id_type);
249 dst_id_len = silc_id_get_len(dst_id, dst_id_type);
253 src_id_data = silc_id_id2str(src_id, src_id_type);
254 src_id_len = silc_id_get_len(src_id, src_id_type);
258 cipher = idata->send_key;
259 hmac = idata->hmac_send;
260 sequence = idata->psn_send++;
261 block_len = silc_cipher_get_block_len(cipher);
264 /* Set the packet context pointers */
265 packetdata.type = type;
266 packetdata.flags = flags;
267 packetdata.src_id = src_id_data;
268 packetdata.src_id_len = src_id_len;
269 packetdata.src_id_type = src_id_type;
270 packetdata.dst_id = dst_id_data;
271 packetdata.dst_id_len = dst_id_len;
272 packetdata.dst_id_type = dst_id_type;
273 data_len = SILC_PACKET_DATALEN(data_len, (SILC_PACKET_HEADER_LEN +
274 packetdata.src_id_len +
276 packetdata.truelen = data_len + SILC_PACKET_HEADER_LEN +
277 packetdata.src_id_len + dst_id_len;
278 packetdata.padlen = SILC_PACKET_PADLEN(packetdata.truelen, block_len);
280 /* Create the outgoing packet */
281 if (!silc_packet_assemble(&packetdata, NULL, cipher, hmac, sock, data,
282 data_len, (const SilcBuffer)&packet)) {
283 SILC_LOG_ERROR(("Cannot assemble packe"));
287 /* Encrypt the packet */
288 silc_packet_encrypt(cipher, hmac, sequence, (SilcBuffer)&packet, packet.len);
290 SILC_LOG_HEXDUMP(("Outgoing packet (%d), len %d", sequence, packet.len),
291 packet.data, packet.len);
293 /* Now actually send the packet */
294 silc_server_packet_send_real(server, sock, force_send);
297 if (packetdata.src_id)
298 silc_free(packetdata.src_id);
299 if (packetdata.dst_id)
300 silc_free(packetdata.dst_id);
303 /* Broadcast received packet to our primary route. This function is used
304 by router to further route received broadcast packet. It is expected
305 that the broadcast flag from the packet is checked before calling this
306 function. This does not test or set the broadcast flag. */
308 void silc_server_packet_broadcast(SilcServer server,
309 SilcSocketConnection sock,
310 SilcPacketContext *packet)
312 SilcBuffer buffer = packet->buffer;
313 SilcIDListData idata;
316 SILC_LOG_DEBUG(("Broadcasting received broadcast packet"));
318 /* If the packet is originated from our primary route we are
319 not allowed to send the packet. */
320 id = silc_id_str2id(packet->src_id, packet->src_id_len, packet->src_id_type);
321 if (id && !SILC_ID_SERVER_COMPARE(id, server->router->id)) {
322 const SilcBufferStruct p;
324 idata = (SilcIDListData)sock->user_data;
326 silc_buffer_push(buffer, buffer->data - buffer->head);
327 if (!silc_packet_send_prepare(sock, 0, 0, buffer->len, idata->hmac_send,
328 (const SilcBuffer)&p)) {
329 SILC_LOG_ERROR(("Cannot send packet"));
333 silc_buffer_put((SilcBuffer)&p, buffer->data, buffer->len);
334 silc_packet_encrypt(idata->send_key, idata->hmac_send, idata->psn_send++,
335 (SilcBuffer)&p, p.len);
337 SILC_LOG_HEXDUMP(("Broadcasted packet (%d), len %d", idata->psn_send - 1,
338 p.len), p.data, p.len);
340 /* Now actually send the packet */
341 silc_server_packet_send_real(server, sock, TRUE);
346 SILC_LOG_DEBUG(("Will not broadcast to primary route since it is the "
347 "original sender of this packet"));
351 /* Routes received packet to `sock'. This is used to route the packets that
352 router receives but are not destined to it. */
354 void silc_server_packet_route(SilcServer server,
355 SilcSocketConnection sock,
356 SilcPacketContext *packet)
358 SilcBuffer buffer = packet->buffer;
359 const SilcBufferStruct p;
360 SilcIDListData idata;
362 SILC_LOG_DEBUG(("Routing received packet"));
364 idata = (SilcIDListData)sock->user_data;
366 silc_buffer_push(buffer, buffer->data - buffer->head);
367 if (!silc_packet_send_prepare(sock, 0, 0, buffer->len, idata->hmac_send,
368 (const SilcBuffer)&p)) {
369 SILC_LOG_ERROR(("Cannot send packet"));
372 silc_buffer_put((SilcBuffer)&p, buffer->data, buffer->len);
373 silc_packet_encrypt(idata->send_key, idata->hmac_send, idata->psn_send++,
374 (SilcBuffer)&p, p.len);
376 SILC_LOG_HEXDUMP(("Routed packet (%d), len %d", idata->psn_send - 1,
377 p.len), p.data, p.len);
379 /* Now actually send the packet */
380 silc_server_packet_send_real(server, sock, TRUE);
383 /* This routine can be used to send a packet to table of clients provided
384 in `clients'. If `route' is FALSE the packet is routed only to local
385 clients (for server locally connected, and for router local cell). */
387 void silc_server_packet_send_clients(SilcServer server,
388 SilcClientEntry *clients,
389 SilcUInt32 clients_count,
391 SilcPacketFlags flags,
397 SilcSocketConnection sock = NULL;
398 SilcClientEntry client = NULL;
399 SilcServerEntry *routed = NULL;
400 SilcUInt32 routed_count = 0;
404 SILC_LOG_DEBUG(("Sending packet to list of clients"));
406 /* Send to all clients in table */
407 for (i = 0; i < clients_count; i++) {
410 /* If client has router set it is not locally connected client and
411 we will route the message to the router set in the client. Though,
412 send locally connected server in all cases. */
413 if (server->server_type == SILC_ROUTER && client->router &&
414 ((!route && client->router->router == server->id_entry) || route)) {
416 /* Check if we have sent the packet to this route already */
417 for (k = 0; k < routed_count; k++)
418 if (routed[k] == client->router)
420 if (k < routed_count)
423 /* Route only once to router */
424 sock = (SilcSocketConnection)client->router->connection;
425 if (sock->type == SILC_SOCKET_TYPE_ROUTER) {
431 /* Send the packet */
432 silc_server_packet_send_dest(server, sock, type, flags,
433 client->router->id, SILC_ID_SERVER,
434 data, data_len, force_send);
436 /* Mark this route routed already */
437 routed = silc_realloc(routed, sizeof(*routed) * (routed_count + 1));
438 routed[routed_count++] = client->router;
445 /* Send to locally connected client */
446 sock = (SilcSocketConnection)client->connection;
450 silc_server_packet_send_dest(server, sock, type, flags,
451 client->id, SILC_ID_CLIENT,
452 data, data_len, force_send);
458 /* Internal routine to actually create the channel packet and send it
459 to network. This is common function in channel message sending. If
460 `channel_message' is TRUE this encrypts the message as it is strictly
461 a channel message. If FALSE normal encryption process is used. */
464 silc_server_packet_send_to_channel_real(SilcServer server,
465 SilcSocketConnection sock,
466 SilcPacketContext *packet,
472 bool channel_message,
476 const SilcBufferStruct p;
481 data_len = SILC_PACKET_DATALEN(data_len, (SILC_PACKET_HEADER_LEN +
483 packet->dst_id_len));
484 packet->truelen = data_len + SILC_PACKET_HEADER_LEN +
485 packet->src_id_len + packet->dst_id_len;
487 block_len = cipher ? silc_cipher_get_block_len(cipher) : 0;
489 packet->padlen = SILC_PACKET_PADLEN((SILC_PACKET_HEADER_LEN +
491 packet->dst_id_len), block_len);
493 packet->padlen = SILC_PACKET_PADLEN(packet->truelen, block_len);
495 /* Put the data to buffer, assemble and encrypt the packet. The packet
496 is encrypted with normal session key shared with the client, unless
497 the `channel_message' is TRUE. */
498 if (!silc_packet_assemble(packet, NULL, cipher, hmac, sock, data,
499 data_len, (const SilcBuffer)&p)) {
500 SILC_LOG_ERROR(("Cannot assemble packet"));
505 silc_packet_encrypt(cipher, hmac, sequence, (SilcBuffer)&p,
506 SILC_PACKET_HEADER_LEN + packet->src_id_len +
507 packet->dst_id_len + packet->padlen);
509 silc_packet_encrypt(cipher, hmac, sequence, (SilcBuffer)&p, p.len);
511 SILC_LOG_HEXDUMP(("Channel packet (%d), len %d", sequence, p.len),
514 /* Now actually send the packet */
515 silc_server_packet_send_real(server, sock, force_send);
518 /* This routine is used by the server to send packets to channel. The
519 packet sent with this function is distributed to all clients on
520 the channel. Usually this is used to send notify messages to the
521 channel, things like notify about new user joining to the channel.
522 If `route' is FALSE then the packet is sent only locally and will not
523 be routed anywhere (for router locally means cell wide). If `sender'
524 is provided then the packet is not sent to that connection since it
525 originally came from it. If `send_to_clients' is FALSE then the
526 packet is not sent clients, only servers. */
528 void silc_server_packet_send_to_channel(SilcServer server,
529 SilcSocketConnection sender,
530 SilcChannelEntry channel,
537 SilcSocketConnection sock = NULL;
538 SilcPacketContext packetdata;
539 SilcClientEntry client = NULL;
540 SilcServerEntry *routed = NULL;
541 SilcChannelClientEntry chl;
542 SilcHashTableList htl;
543 SilcIDListData idata;
544 SilcUInt32 routed_count = 0;
548 /* This doesn't send channel message packets */
549 assert(type != SILC_PACKET_CHANNEL_MESSAGE);
551 SILC_LOG_DEBUG(("Sending packet to channel"));
553 /* Set the packet context pointers. */
554 packetdata.flags = 0;
555 packetdata.type = type;
556 packetdata.src_id = silc_id_id2str(server->id, SILC_ID_SERVER);
557 packetdata.src_id_len = silc_id_get_len(server->id, SILC_ID_SERVER);
558 packetdata.src_id_type = SILC_ID_SERVER;
559 packetdata.dst_id = silc_id_id2str(channel->id, SILC_ID_CHANNEL);
560 packetdata.dst_id_len = silc_id_get_len(channel->id, SILC_ID_CHANNEL);
561 packetdata.dst_id_type = SILC_ID_CHANNEL;
563 /* If there are global users in the channel we will send the message
564 first to our router for further routing. */
565 if (route && server->server_type != SILC_ROUTER && !server->standalone &&
566 channel->global_users) {
567 SilcServerEntry router;
569 /* Get data used in packet header encryption, keys and stuff. */
570 router = server->router;
571 sock = (SilcSocketConnection)router->connection;
572 idata = (SilcIDListData)router;
574 if (sock != sender) {
575 SILC_LOG_DEBUG(("Sending packet to router for routing"));
577 silc_server_packet_send_to_channel_real(server, sock, &packetdata,
581 data, data_len, FALSE,
586 routed = silc_calloc(silc_hash_table_count(channel->user_list),
589 /* Send the message to clients on the channel's client list. */
590 silc_hash_table_list(channel->user_list, &htl);
591 while (silc_hash_table_get(&htl, NULL, (void *)&chl)) {
592 client = chl->client;
596 /* If client has router set it is not locally connected client and
597 we will route the message to the router set in the client. Though,
598 send locally connected server in all cases. */
599 if (server->server_type == SILC_ROUTER && client->router &&
600 ((!route && client->router->router == server->id_entry) || route)) {
602 /* Check if we have sent the packet to this route already */
603 for (k = 0; k < routed_count; k++)
604 if (routed[k] == client->router)
606 if (k < routed_count)
609 /* Get data used in packet header encryption, keys and stuff. */
610 sock = (SilcSocketConnection)client->router->connection;
611 idata = (SilcIDListData)client->router;
613 if (sender && sock == sender)
616 /* Route only once to router. Protocol prohibits sending channel
617 messages to more than one router. */
618 if (sock->type == SILC_SOCKET_TYPE_ROUTER) {
624 /* Send the packet */
625 silc_server_packet_send_to_channel_real(server, sock, &packetdata,
629 data, data_len, FALSE,
632 /* Mark this route routed already */
633 routed[routed_count++] = client->router;
640 /* Send to locally connected client */
642 /* Get data used in packet header encryption, keys and stuff. */
643 sock = (SilcSocketConnection)client->connection;
644 idata = (SilcIDListData)client;
646 if (!sock || (sender && sock == sender))
649 /* Send the packet */
650 silc_server_packet_send_to_channel_real(server, sock, &packetdata,
654 data, data_len, FALSE,
658 silc_hash_table_list_reset(&htl);
660 silc_free(packetdata.src_id);
661 silc_free(packetdata.dst_id);
664 /* This checks whether the relayed packet came from router. If it did
665 then we'll need to encrypt it with the channel key. This is called
666 from the silc_server_packet_relay_to_channel. */
669 silc_server_packet_relay_to_channel_encrypt(SilcServer server,
670 SilcSocketConnection sock,
671 SilcChannelEntry channel,
673 unsigned int data_len)
675 /* If we are router and the packet came from router and private key
676 has not been set for the channel then we must encrypt the packet
677 as it was decrypted with the session key shared between us and the
678 router which sent it. This is so, because cells does not share the
680 if (server->server_type == SILC_ROUTER &&
681 sock->type == SILC_SOCKET_TYPE_ROUTER &&
682 !(channel->mode & SILC_CHANNEL_MODE_PRIVKEY) &&
683 channel->channel_key) {
684 SilcUInt32 mac_len = silc_hmac_len(channel->hmac);
685 SilcUInt32 iv_len = silc_cipher_get_block_len(channel->channel_key);
687 if (data_len <= mac_len + iv_len) {
688 SILC_LOG_WARNING(("Corrupted channel message, cannot relay it"));
692 memcpy(channel->iv, data + (data_len - iv_len), iv_len);
693 silc_channel_message_payload_encrypt(data, data_len - iv_len - mac_len,
694 data_len, channel->iv, iv_len,
695 channel->channel_key, channel->hmac);
701 /* This routine is explicitly used to relay messages to some channel.
702 Packets sent with this function we have received earlier and are
703 totally encrypted. This just sends the packet to all clients on
704 the channel. If the sender of the packet is someone on the channel
705 the message will not be sent to that client. The SILC Packet header
706 is encrypted with the session key shared between us and the client.
707 MAC is also computed before encrypting the header. Rest of the
708 packet will be untouched. */
710 void silc_server_packet_relay_to_channel(SilcServer server,
711 SilcSocketConnection sender_sock,
712 SilcChannelEntry channel,
714 SilcIdType sender_type,
715 SilcClientEntry sender_entry,
720 SilcSocketConnection sock = NULL;
721 SilcPacketContext packetdata;
722 SilcClientEntry client = NULL;
723 SilcServerEntry *routed = NULL;
724 SilcChannelClientEntry chl, chl_sender;
725 SilcUInt32 routed_count = 0;
726 SilcIDListData idata;
727 SilcHashTableList htl;
731 SILC_LOG_DEBUG(("Relaying packet to channel"));
733 if (!silc_server_client_on_channel(sender_entry, channel, &chl_sender))
736 /* This encrypts the packet, if needed. It will be encrypted if
737 it came from the router thus it needs to be encrypted with the
738 channel key. If the channel key does not exist, then we know we
739 don't have a single local user on the channel. */
740 if (!silc_server_packet_relay_to_channel_encrypt(server, sender_sock,
745 /* Set the packet context pointers. */
746 packetdata.flags = 0;
747 packetdata.type = SILC_PACKET_CHANNEL_MESSAGE;
748 packetdata.src_id = silc_id_id2str(sender_id, sender_type);
749 packetdata.src_id_len = silc_id_get_len(sender_id, sender_type);
750 packetdata.src_id_type = sender_type;
751 packetdata.dst_id = silc_id_id2str(channel->id, SILC_ID_CHANNEL);
752 packetdata.dst_id_len = silc_id_get_len(channel->id, SILC_ID_CHANNEL);
753 packetdata.dst_id_type = SILC_ID_CHANNEL;
755 /* If there are global users in the channel we will send the message
756 first to our router for further routing. */
757 if (server->server_type != SILC_ROUTER && !server->standalone &&
758 channel->global_users) {
759 SilcServerEntry router = server->router;
761 /* Check that the sender is not our router. */
762 if (sender_sock != (SilcSocketConnection)router->connection) {
764 /* Get data used in packet header encryption, keys and stuff. */
765 sock = (SilcSocketConnection)router->connection;
766 idata = (SilcIDListData)router;
768 SILC_LOG_DEBUG(("Sending channel message to router for routing"));
770 silc_server_packet_send_to_channel_real(server, sock, &packetdata,
774 data, data_len, TRUE,
779 routed = silc_calloc(silc_hash_table_count(channel->user_list),
782 /* Assure we won't route the message back to the sender's way. */
783 if (sender_entry->router)
784 routed[routed_count++] = sender_entry->router;
786 /* Send the message to clients on the channel's client list. */
787 silc_hash_table_list(channel->user_list, &htl);
788 while (silc_hash_table_get(&htl, NULL, (void *)&chl)) {
789 client = chl->client;
790 if (!client || client == sender_entry)
793 /* Check whether message sending is blocked */
794 if (chl->mode & SILC_CHANNEL_UMODE_BLOCK_MESSAGES)
796 if (chl->mode & SILC_CHANNEL_UMODE_BLOCK_MESSAGES_USERS &&
797 !(chl_sender->mode & SILC_CHANNEL_UMODE_CHANOP) &&
798 !(chl_sender->mode & SILC_CHANNEL_UMODE_CHANFO))
800 if (chl->mode & SILC_CHANNEL_UMODE_BLOCK_MESSAGES_ROBOTS &&
801 sender_entry->mode & SILC_UMODE_ROBOT)
804 /* If the client has set router it means that it is not locally
805 connected client and we will route the packet further. */
806 if (server->server_type == SILC_ROUTER && client->router) {
808 /* Check if we have sent the packet to this route already */
809 for (k = 0; k < routed_count; k++)
810 if (routed[k] == client->router)
812 if (k < routed_count)
815 /* Get data used in packet header encryption, keys and stuff. */
816 sock = (SilcSocketConnection)client->router->connection;
817 idata = (SilcIDListData)client->router;
819 /* Check if the sender socket is the same as this client's router
821 if (sender_sock && sock == sender_sock)
824 SILC_LOG_DEBUG(("Relaying packet to client ID(%s) %s (%s)",
825 silc_id_render(client->id, SILC_ID_CLIENT),
826 sock->hostname, sock->ip));
828 /* Mark this route routed already. */
829 routed[routed_count++] = client->router;
831 if (sock->type == SILC_SOCKET_TYPE_ROUTER) {
832 /* The remote connection is router then we'll decrypt the
833 channel message and re-encrypt it with the session key shared
834 between us and the remote router. This is done because the
835 channel keys are cell specific and we have different channel
836 key than the remote router has. */
838 /* Route only once to router. Protocol prohibits sending channel
839 messages to more than one router. */
844 SILC_LOG_DEBUG(("Remote is router, encrypt with session key"));
846 /* If private key mode is not set then decrypt the packet
848 if (!(channel->mode & SILC_CHANNEL_MODE_PRIVKEY) &&
849 channel->channel_key) {
850 unsigned char tmp[SILC_PACKET_MAX_LEN];
852 if (data_len > SILC_PACKET_MAX_LEN)
853 data_len = SILC_PACKET_MAX_LEN;
854 memcpy(tmp, data, data_len);
856 /* Decrypt the channel message (we don't check the MAC) */
857 silc_channel_message_payload_decrypt(tmp, data_len,
858 channel->channel_key, NULL);
860 /* Now re-encrypt and send it to the router */
861 silc_server_packet_send_srcdest(server, sock,
862 SILC_PACKET_CHANNEL_MESSAGE, 0,
863 sender_id, sender_type,
864 channel->id, SILC_ID_CHANNEL,
865 tmp, data_len, force_send);
867 /* Private key mode is set, we don't have the channel key, so
868 just re-encrypt the entire packet and send it to the router. */
869 silc_server_packet_send_srcdest(server, sock,
870 SILC_PACKET_CHANNEL_MESSAGE, 0,
871 sender_id, sender_type,
872 channel->id, SILC_ID_CHANNEL,
873 data, data_len, force_send);
876 /* Send the packet to normal server */
877 silc_server_packet_send_to_channel_real(server, sock, &packetdata,
881 data, data_len, TRUE,
891 /* Get data used in packet header encryption, keys and stuff. */
892 sock = (SilcSocketConnection)client->connection;
893 idata = (SilcIDListData)client;
895 if (!sock || (sender_sock && sock == sender_sock))
898 SILC_LOG_DEBUG(("Sending packet to client ID(%s) %s (%s)",
899 silc_id_render(client->id, SILC_ID_CLIENT),
900 sock->hostname, sock->ip));
902 /* Send the packet */
903 silc_server_packet_send_to_channel_real(server, sock, &packetdata,
907 data, data_len, TRUE,
911 silc_hash_table_list_reset(&htl);
913 silc_free(packetdata.src_id);
914 silc_free(packetdata.dst_id);
917 /* This function is used to send packets strictly to all local clients
918 on a particular channel. This is used for example to distribute new
919 channel key to all our locally connected clients on the channel.
920 The packets are always encrypted with the session key shared between
921 the client, this means these are not _to the channel_ but _to the client_
924 void silc_server_packet_send_local_channel(SilcServer server,
925 SilcChannelEntry channel,
927 SilcPacketFlags flags,
932 SilcChannelClientEntry chl;
933 SilcHashTableList htl;
934 SilcSocketConnection sock = NULL;
936 SILC_LOG_DEBUG(("Start"));
938 /* Send the message to clients on the channel's client list. */
939 silc_hash_table_list(channel->user_list, &htl);
940 while (silc_hash_table_get(&htl, NULL, (void *)&chl)) {
941 if (chl->client && !chl->client->router) {
942 sock = (SilcSocketConnection)chl->client->connection;
944 /* Send the packet to the client */
945 silc_server_packet_send_dest(server, sock, type, flags, chl->client->id,
946 SILC_ID_CLIENT, data, data_len,
950 silc_hash_table_list_reset(&htl);
953 /* Routine used to send (relay, route) private messages to some destination.
954 If the private message key does not exist then the message is re-encrypted,
955 otherwise we just pass it along. This really is not used to send new
956 private messages (as server does not send them) but to relay received
959 void silc_server_send_private_message(SilcServer server,
960 SilcSocketConnection dst_sock,
964 SilcPacketContext *packet)
966 SilcBuffer buffer = packet->buffer;
967 const SilcBufferStruct p;
969 silc_buffer_push(buffer, SILC_PACKET_HEADER_LEN + packet->src_id_len
970 + packet->dst_id_len + packet->padlen);
971 if (!silc_packet_send_prepare(dst_sock, 0, 0, buffer->len, hmac,
972 (const SilcBuffer)&p)) {
973 SILC_LOG_ERROR(("Cannot send packet"));
976 silc_buffer_put((SilcBuffer)&p, buffer->data, buffer->len);
978 /* Re-encrypt and send if private messge key does not exist */
979 if (!(packet->flags & SILC_PACKET_FLAG_PRIVMSG_KEY)) {
980 /* Re-encrypt packet */
981 silc_packet_encrypt(cipher, hmac, sequence, (SilcBuffer)&p, buffer->len);
983 /* Key exist so encrypt just header and send it */
984 silc_packet_encrypt(cipher, hmac, sequence, (SilcBuffer)&p,
985 SILC_PACKET_HEADER_LEN + packet->src_id_len +
986 packet->dst_id_len + packet->padlen);
989 /* Send the packet */
990 silc_server_packet_send_real(server, dst_sock, FALSE);
993 /* Sends current motd to client */
995 void silc_server_send_motd(SilcServer server,
996 SilcSocketConnection sock)
998 char *motd, *motd_file = NULL;
1002 motd_file = server->config->server_info->motd_file;
1005 motd = silc_file_readfile(motd_file, &motd_len);
1009 silc_server_send_notify(server, sock, FALSE, SILC_NOTIFY_TYPE_MOTD, 1,
1015 /* Sends error message. Error messages may or may not have any
1018 void silc_server_send_error(SilcServer server,
1019 SilcSocketConnection sock,
1020 const char *fmt, ...)
1023 unsigned char buf[4096];
1025 memset(buf, 0, sizeof(buf));
1027 vsprintf(buf, fmt, ap);
1030 silc_server_packet_send(server, sock, SILC_PACKET_ERROR, 0,
1031 buf, strlen(buf), FALSE);
1034 /* Sends notify message. If format is TRUE the variable arguments are
1035 formatted and the formatted string is sent as argument payload. If it is
1036 FALSE then each argument is sent as separate argument and their format
1037 in the argument list must be { argument data, argument length }. */
1039 void silc_server_send_notify(SilcServer server,
1040 SilcSocketConnection sock,
1042 SilcNotifyType type,
1043 SilcUInt32 argc, ...)
1050 packet = silc_notify_payload_encode(type, argc, ap);
1051 silc_server_packet_send(server, sock, SILC_PACKET_NOTIFY,
1052 broadcast ? SILC_PACKET_FLAG_BROADCAST : 0,
1053 packet->data, packet->len, FALSE);
1055 /* Send to backup routers if this is being broadcasted to primary
1057 if (server->router && server->router->connection &&
1058 sock == server->router->connection && broadcast)
1059 silc_server_backup_send(server, NULL, SILC_PACKET_NOTIFY, 0,
1060 packet->data, packet->len, FALSE, TRUE);
1062 silc_buffer_free(packet);
1066 /* Sends notify message and gets the arguments from the `args' Argument
1069 void silc_server_send_notify_args(SilcServer server,
1070 SilcSocketConnection sock,
1072 SilcNotifyType type,
1078 packet = silc_notify_payload_encode_args(type, argc, args);
1079 silc_server_packet_send(server, sock, SILC_PACKET_NOTIFY,
1080 broadcast ? SILC_PACKET_FLAG_BROADCAST : 0,
1081 packet->data, packet->len, FALSE);
1082 silc_buffer_free(packet);
1085 /* Send CHANNEL_CHANGE notify type. This tells the receiver to replace the
1086 `old_id' with the `new_id'. */
1088 void silc_server_send_notify_channel_change(SilcServer server,
1089 SilcSocketConnection sock,
1091 SilcChannelID *old_id,
1092 SilcChannelID *new_id)
1094 SilcBuffer idp1, idp2;
1096 idp1 = silc_id_payload_encode((void *)old_id, SILC_ID_CHANNEL);
1097 idp2 = silc_id_payload_encode((void *)new_id, SILC_ID_CHANNEL);
1099 silc_server_send_notify(server, sock, broadcast,
1100 SILC_NOTIFY_TYPE_CHANNEL_CHANGE,
1101 2, idp1->data, idp1->len, idp2->data, idp2->len);
1102 silc_buffer_free(idp1);
1103 silc_buffer_free(idp2);
1106 /* Send NICK_CHANGE notify type. This tells the receiver to replace the
1107 `old_id' with the `new_id'. */
1109 void silc_server_send_notify_nick_change(SilcServer server,
1110 SilcSocketConnection sock,
1112 SilcClientID *old_id,
1113 SilcClientID *new_id,
1114 const char *nickname)
1116 SilcBuffer idp1, idp2;
1118 idp1 = silc_id_payload_encode((void *)old_id, SILC_ID_CLIENT);
1119 idp2 = silc_id_payload_encode((void *)new_id, SILC_ID_CLIENT);
1121 silc_server_send_notify(server, sock, broadcast,
1122 SILC_NOTIFY_TYPE_NICK_CHANGE,
1123 3, idp1->data, idp1->len, idp2->data, idp2->len,
1124 nickname, nickname ? strlen(nickname) : 0);
1125 silc_buffer_free(idp1);
1126 silc_buffer_free(idp2);
1129 /* Sends JOIN notify type. This tells that new client by `client_id' ID
1130 has joined to the `channel'. */
1132 void silc_server_send_notify_join(SilcServer server,
1133 SilcSocketConnection sock,
1135 SilcChannelEntry channel,
1136 SilcClientID *client_id)
1138 SilcBuffer idp1, idp2;
1140 idp1 = silc_id_payload_encode((void *)client_id, SILC_ID_CLIENT);
1141 idp2 = silc_id_payload_encode((void *)channel->id, SILC_ID_CHANNEL);
1142 silc_server_send_notify(server, sock, broadcast, SILC_NOTIFY_TYPE_JOIN,
1143 2, idp1->data, idp1->len,
1144 idp2->data, idp2->len);
1145 silc_buffer_free(idp1);
1146 silc_buffer_free(idp2);
1149 /* Sends LEAVE notify type. This tells that `client_id' has left the
1150 `channel'. The Notify packet is always destined to the channel. */
1152 void silc_server_send_notify_leave(SilcServer server,
1153 SilcSocketConnection sock,
1155 SilcChannelEntry channel,
1156 SilcClientID *client_id)
1160 idp = silc_id_payload_encode((void *)client_id, SILC_ID_CLIENT);
1161 silc_server_send_notify_dest(server, sock, broadcast, (void *)channel->id,
1162 SILC_ID_CHANNEL, SILC_NOTIFY_TYPE_LEAVE,
1163 1, idp->data, idp->len);
1164 silc_buffer_free(idp);
1167 /* Sends CMODE_CHANGE notify type. This tells that `client_id' changed the
1168 `channel' mode to `mode. The Notify packet is always destined to
1171 void silc_server_send_notify_cmode(SilcServer server,
1172 SilcSocketConnection sock,
1174 SilcChannelEntry channel,
1175 SilcUInt32 mode_mask,
1176 void *id, SilcIdType id_type,
1177 char *cipher, char *hmac,
1181 unsigned char mode[4];
1183 idp = silc_id_payload_encode((void *)id, id_type);
1184 SILC_PUT32_MSB(mode_mask, mode);
1186 silc_server_send_notify_dest(server, sock, broadcast, (void *)channel->id,
1187 SILC_ID_CHANNEL, SILC_NOTIFY_TYPE_CMODE_CHANGE,
1188 5, idp->data, idp->len,
1190 cipher, cipher ? strlen(cipher) : 0,
1191 hmac, hmac ? strlen(hmac) : 0,
1192 passphrase, passphrase ?
1193 strlen(passphrase) : 0);
1194 silc_buffer_free(idp);
1197 /* Sends CUMODE_CHANGE notify type. This tells that `client_id' changed the
1198 `target' client's mode on `channel'. The notify packet is always
1199 destined to the channel. */
1201 void silc_server_send_notify_cumode(SilcServer server,
1202 SilcSocketConnection sock,
1204 SilcChannelEntry channel,
1205 SilcUInt32 mode_mask,
1206 void *id, SilcIdType id_type,
1207 SilcClientID *target)
1209 SilcBuffer idp1, idp2;
1210 unsigned char mode[4];
1212 idp1 = silc_id_payload_encode((void *)id, id_type);
1213 idp2 = silc_id_payload_encode((void *)target, SILC_ID_CLIENT);
1214 SILC_PUT32_MSB(mode_mask, mode);
1216 silc_server_send_notify_dest(server, sock, broadcast, (void *)channel->id,
1218 SILC_NOTIFY_TYPE_CUMODE_CHANGE, 3,
1219 idp1->data, idp1->len,
1221 idp2->data, idp2->len);
1222 silc_buffer_free(idp1);
1223 silc_buffer_free(idp2);
1226 /* Sends SIGNOFF notify type. This tells that `client_id' client has
1227 left SILC network. This function is used only between server and router
1228 traffic. This is not used to send the notify to the channel for
1229 client. The `message may be NULL. */
1231 void silc_server_send_notify_signoff(SilcServer server,
1232 SilcSocketConnection sock,
1234 SilcClientID *client_id,
1235 const char *message)
1239 idp = silc_id_payload_encode((void *)client_id, SILC_ID_CLIENT);
1240 silc_server_send_notify(server, sock, broadcast,
1241 SILC_NOTIFY_TYPE_SIGNOFF,
1242 message ? 2 : 1, idp->data, idp->len,
1243 message, message ? strlen(message): 0);
1244 silc_buffer_free(idp);
1247 /* Sends TOPIC_SET notify type. This tells that `id' changed
1248 the `channel's topic to `topic'. The Notify packet is always destined
1249 to the channel. This function is used to send the topic set notifies
1252 void silc_server_send_notify_topic_set(SilcServer server,
1253 SilcSocketConnection sock,
1255 SilcChannelEntry channel,
1256 void *id, SilcIdType id_type,
1261 idp = silc_id_payload_encode(id, id_type);
1262 silc_server_send_notify_dest(server, sock, broadcast,
1263 (void *)channel->id, SILC_ID_CHANNEL,
1264 SILC_NOTIFY_TYPE_TOPIC_SET,
1266 idp->data, idp->len,
1267 topic, topic ? strlen(topic) : 0);
1268 silc_buffer_free(idp);
1271 /* Send KICKED notify type. This tells that the `client_id' on `channel'
1272 was kicked off the channel. The `comment' may indicate the reason
1273 for the kicking. This function is used only between server and router
1276 void silc_server_send_notify_kicked(SilcServer server,
1277 SilcSocketConnection sock,
1279 SilcChannelEntry channel,
1280 SilcClientID *client_id,
1281 SilcClientID *kicker,
1287 idp1 = silc_id_payload_encode((void *)client_id, SILC_ID_CLIENT);
1288 idp2 = silc_id_payload_encode((void *)kicker, SILC_ID_CLIENT);
1289 silc_server_send_notify_dest(server, sock, broadcast, (void *)channel->id,
1290 SILC_ID_CHANNEL, SILC_NOTIFY_TYPE_KICKED, 3,
1291 idp1->data, idp1->len,
1292 comment, comment ? strlen(comment) : 0,
1293 idp2->data, idp2->len);
1294 silc_buffer_free(idp1);
1295 silc_buffer_free(idp2);
1298 /* Send KILLED notify type. This tells that the `client_id' client was
1299 killed from the network. The `comment' may indicate the reason
1302 void silc_server_send_notify_killed(SilcServer server,
1303 SilcSocketConnection sock,
1305 SilcClientID *client_id,
1306 const char *comment,
1307 void *killer, SilcIdType killer_type)
1312 idp1 = silc_id_payload_encode(client_id, SILC_ID_CLIENT);
1313 idp2 = silc_id_payload_encode(killer, killer_type);
1314 silc_server_send_notify_dest(server, sock, broadcast, (void *)client_id,
1315 SILC_ID_CLIENT, SILC_NOTIFY_TYPE_KILLED,
1316 3, idp1->data, idp1->len,
1317 comment, comment ? strlen(comment) : 0,
1318 idp2->data, idp2->len);
1319 silc_buffer_free(idp1);
1320 silc_buffer_free(idp2);
1323 /* Sends UMODE_CHANGE notify type. This tells that `client_id' client's
1324 user mode in the SILC Network was changed. This function is used to
1325 send the packet between routers as broadcast packet. */
1327 void silc_server_send_notify_umode(SilcServer server,
1328 SilcSocketConnection sock,
1330 SilcClientID *client_id,
1331 SilcUInt32 mode_mask)
1334 unsigned char mode[4];
1336 idp = silc_id_payload_encode((void *)client_id, SILC_ID_CLIENT);
1337 SILC_PUT32_MSB(mode_mask, mode);
1339 silc_server_send_notify(server, sock, broadcast,
1340 SILC_NOTIFY_TYPE_UMODE_CHANGE, 2,
1341 idp->data, idp->len,
1343 silc_buffer_free(idp);
1346 /* Sends BAN notify type. This tells that ban has been either `add'ed
1347 or `del'eted on the `channel. This function is used to send the packet
1348 between routers as broadcast packet. */
1350 void silc_server_send_notify_ban(SilcServer server,
1351 SilcSocketConnection sock,
1353 SilcChannelEntry channel,
1354 char *add, char *del)
1358 idp = silc_id_payload_encode((void *)channel->id, SILC_ID_CHANNEL);
1359 silc_server_send_notify(server, sock, broadcast,
1360 SILC_NOTIFY_TYPE_BAN, 3,
1361 idp->data, idp->len,
1362 add, add ? strlen(add) : 0,
1363 del, del ? strlen(del) : 0);
1364 silc_buffer_free(idp);
1367 /* Sends INVITE notify type. This tells that invite has been either `add'ed
1368 or `del'eted on the `channel. The sender of the invite is the `client_id'.
1369 This function is used to send the packet between routers as broadcast
1372 void silc_server_send_notify_invite(SilcServer server,
1373 SilcSocketConnection sock,
1375 SilcChannelEntry channel,
1376 SilcClientID *client_id,
1377 char *add, char *del)
1379 SilcBuffer idp, idp2;
1381 idp = silc_id_payload_encode((void *)channel->id, SILC_ID_CHANNEL);
1382 idp2 = silc_id_payload_encode((void *)client_id, SILC_ID_CLIENT);
1383 silc_server_send_notify(server, sock, broadcast,
1384 SILC_NOTIFY_TYPE_INVITE, 5,
1385 idp->data, idp->len,
1386 channel->channel_name, strlen(channel->channel_name),
1387 idp2->data, idp2->len,
1388 add, add ? strlen(add) : 0,
1389 del, del ? strlen(del) : 0);
1390 silc_buffer_free(idp);
1391 silc_buffer_free(idp2);
1394 /* Sends WATCH notify type. This tells that the `client' was watched and
1395 its status in the network has changed. */
1397 void silc_server_send_notify_watch(SilcServer server,
1398 SilcSocketConnection sock,
1399 SilcClientEntry watcher,
1400 SilcClientEntry client,
1401 const char *nickname,
1402 SilcNotifyType type)
1405 unsigned char mode[4], n[2];
1407 idp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
1408 SILC_PUT16_MSB(type, n);
1409 SILC_PUT32_MSB(client->mode, mode);
1410 silc_server_send_notify_dest(server, sock, FALSE, watcher->id,
1411 SILC_ID_CLIENT, SILC_NOTIFY_TYPE_WATCH,
1412 4, idp->data, idp->len,
1413 nickname, strlen(nickname),
1415 type != SILC_NOTIFY_TYPE_NONE ?
1416 n : NULL, sizeof(n));
1417 silc_buffer_free(idp);
1420 /* Sends notify message destined to specific entity. */
1422 void silc_server_send_notify_dest(SilcServer server,
1423 SilcSocketConnection sock,
1426 SilcIdType dest_id_type,
1427 SilcNotifyType type,
1428 SilcUInt32 argc, ...)
1435 packet = silc_notify_payload_encode(type, argc, ap);
1436 silc_server_packet_send_dest(server, sock, SILC_PACKET_NOTIFY,
1437 broadcast ? SILC_PACKET_FLAG_BROADCAST : 0,
1438 dest_id, dest_id_type,
1439 packet->data, packet->len, FALSE);
1440 silc_buffer_free(packet);
1444 /* Sends notify message to a channel. The notify message sent is
1445 distributed to all clients on the channel. If `route_notify' is TRUE
1446 then the notify may be routed to primary route or to some other routers.
1447 If FALSE it is assured that the notify is sent only locally. If `sender'
1448 is provided then the packet is not sent to that connection since it
1449 originally came from it. */
1451 void silc_server_send_notify_to_channel(SilcServer server,
1452 SilcSocketConnection sender,
1453 SilcChannelEntry channel,
1455 SilcNotifyType type,
1456 SilcUInt32 argc, ...)
1463 packet = silc_notify_payload_encode(type, argc, ap);
1464 silc_server_packet_send_to_channel(server, sender, channel,
1465 SILC_PACKET_NOTIFY, route_notify,
1466 packet->data, packet->len, FALSE);
1467 silc_buffer_free(packet);
1471 /* Send notify message to all channels the client has joined. It is quaranteed
1472 that the message is sent only once to a client (ie. if a client is joined
1473 on two same channel it will receive only one notify message). Also, this
1474 sends only to local clients (locally connected if we are server, and to
1475 local servers if we are router). If `sender' is provided the packet is
1476 not sent to that client at all. */
1478 void silc_server_send_notify_on_channels(SilcServer server,
1479 SilcClientEntry sender,
1480 SilcClientEntry client,
1481 SilcNotifyType type,
1482 SilcUInt32 argc, ...)
1485 SilcSocketConnection sock = NULL;
1486 SilcPacketContext packetdata;
1488 SilcClientEntry *sent_clients = NULL;
1489 SilcUInt32 sent_clients_count = 0;
1490 SilcServerEntry *routed = NULL;
1491 SilcUInt32 routed_count = 0;
1492 SilcHashTableList htl, htl2;
1493 SilcChannelEntry channel;
1494 SilcChannelClientEntry chl, chl2;
1495 SilcIDListData idata;
1497 unsigned char *data;
1498 SilcUInt32 data_len;
1499 bool force_send = FALSE;
1502 SILC_LOG_DEBUG(("Start"));
1504 if (!silc_hash_table_count(client->channels))
1508 packet = silc_notify_payload_encode(type, argc, ap);
1509 data = packet->data;
1510 data_len = packet->len;
1512 /* Set the packet context pointers. */
1513 packetdata.flags = 0;
1514 packetdata.type = SILC_PACKET_NOTIFY;
1515 packetdata.src_id = silc_id_id2str(server->id, SILC_ID_SERVER);
1516 packetdata.src_id_len = silc_id_get_len(server->id, SILC_ID_SERVER);
1517 packetdata.src_id_type = SILC_ID_SERVER;
1519 silc_hash_table_list(client->channels, &htl);
1520 while (silc_hash_table_get(&htl, NULL, (void *)&chl)) {
1521 channel = chl->channel;
1523 /* Send the message to all clients on the channel's client list. */
1524 silc_hash_table_list(channel->user_list, &htl2);
1525 while (silc_hash_table_get(&htl2, NULL, (void *)&chl2)) {
1528 if (sender && c == sender)
1531 /* Check if we have sent the packet to this client already */
1532 for (k = 0; k < sent_clients_count; k++)
1533 if (sent_clients[k] == c)
1535 if (k < sent_clients_count)
1538 /* If we are router and if this client has router set it is not
1539 locally connected client and we will route the message to the
1540 router set in the client. */
1541 if (c && c->router && server->server_type == SILC_ROUTER) {
1542 /* Check if we have sent the packet to this route already */
1543 for (k = 0; k < routed_count; k++)
1544 if (routed[k] == c->router)
1546 if (k < routed_count)
1549 /* Get data used in packet header encryption, keys and stuff. */
1550 sock = (SilcSocketConnection)c->router->connection;
1551 idata = (SilcIDListData)c->router;
1554 SILC_LOG_DEBUG(("*****************"));
1555 SILC_LOG_DEBUG(("client->router->id %s",
1556 silc_id_render(c->router->id, SILC_ID_SERVER)));
1557 SILC_LOG_DEBUG(("client->router->connection->user_data->id %s",
1558 silc_id_render(((SilcServerEntry)sock->user_data)->id, SILC_ID_SERVER)));
1561 packetdata.dst_id = silc_id_id2str(c->router->id, SILC_ID_SERVER);
1562 packetdata.dst_id_len = silc_id_get_len(c->router->id, SILC_ID_SERVER);
1563 packetdata.dst_id_type = SILC_ID_SERVER;
1565 /* Send the packet */
1566 silc_server_packet_send_to_channel_real(server, sock, &packetdata,
1570 data, data_len, FALSE,
1573 silc_free(packetdata.dst_id);
1575 /* We want to make sure that the packet is routed to same router
1576 only once. Mark this route as sent route. */
1577 routed = silc_realloc(routed, sizeof(*routed) * (routed_count + 1));
1578 routed[routed_count++] = c->router;
1585 /* Send to locally connected client */
1588 /* Get data used in packet header encryption, keys and stuff. */
1589 sock = (SilcSocketConnection)c->connection;
1590 idata = (SilcIDListData)c;
1595 packetdata.dst_id = silc_id_id2str(c->id, SILC_ID_CLIENT);
1596 packetdata.dst_id_len = silc_id_get_len(c->id, SILC_ID_CLIENT);
1597 packetdata.dst_id_type = SILC_ID_CLIENT;
1599 /* Send the packet */
1600 silc_server_packet_send_to_channel_real(server, sock, &packetdata,
1604 data, data_len, FALSE,
1607 silc_free(packetdata.dst_id);
1609 /* Make sure that we send the notify only once per client. */
1610 sent_clients = silc_realloc(sent_clients, sizeof(*sent_clients) *
1611 (sent_clients_count + 1));
1612 sent_clients[sent_clients_count++] = c;
1615 silc_hash_table_list_reset(&htl2);
1618 silc_hash_table_list_reset(&htl);
1620 silc_free(sent_clients);
1621 silc_free(packetdata.src_id);
1622 silc_buffer_free(packet);
1626 /* Sends New ID Payload to remote end. The packet is used to distribute
1627 information about new registered clients, servers, channel etc. usually
1628 to routers so that they can keep these information up to date.
1629 If the argument `broadcast' is TRUE then the packet is sent as
1630 broadcast packet. */
1632 void silc_server_send_new_id(SilcServer server,
1633 SilcSocketConnection sock,
1635 void *id, SilcIdType id_type,
1640 SILC_LOG_DEBUG(("Start"));
1642 idp = silc_id_payload_encode(id, id_type);
1643 silc_server_packet_send(server, sock, SILC_PACKET_NEW_ID,
1644 broadcast ? SILC_PACKET_FLAG_BROADCAST : 0,
1645 idp->data, idp->len, FALSE);
1647 /* Send to backup routers if this is being broadcasted to primary
1649 if (server->router && server->router->connection &&
1650 sock == server->router->connection && broadcast)
1651 silc_server_backup_send(server, NULL, SILC_PACKET_NEW_ID, 0,
1652 idp->data, idp->len, FALSE, TRUE);
1654 silc_buffer_free(idp);
1657 /* Send New Channel Payload to notify about newly created channel in the
1658 SILC network. Router uses this to notify other routers in the network
1659 about new channel. This packet is broadcasted by router. */
1661 void silc_server_send_new_channel(SilcServer server,
1662 SilcSocketConnection sock,
1666 SilcUInt32 channel_id_len,
1671 SilcUInt32 name_len = strlen(channel_name);
1673 SILC_LOG_DEBUG(("Start"));
1675 cid = silc_id_id2str(channel_id, SILC_ID_CHANNEL);
1679 /* Encode the channel payload */
1680 packet = silc_channel_payload_encode(channel_name, name_len,
1681 cid, channel_id_len, mode);
1683 silc_server_packet_send(server, sock, SILC_PACKET_NEW_CHANNEL,
1684 broadcast ? SILC_PACKET_FLAG_BROADCAST : 0,
1685 packet->data, packet->len, FALSE);
1687 /* Send to backup routers if this is being broadcasted to primary
1689 if (server->server_type == SILC_ROUTER &&
1690 server->router && server->router->connection &&
1691 sock == server->router->connection && broadcast)
1692 silc_server_backup_send(server, NULL, SILC_PACKET_NEW_CHANNEL, 0,
1693 packet->data, packet->len, FALSE, TRUE);
1696 silc_buffer_free(packet);
1699 /* Send Channel Key payload to distribute the new channel key. Normal server
1700 sends this to router when new client joins to existing channel. Router
1701 sends this to the local server who sent the join command in case where
1702 the channel did not exist yet. Both normal and router servers uses this
1703 also to send this to locally connected clients on the channel. This
1704 must not be broadcasted packet. Routers do not send this to each other.
1705 If `sender is provided then the packet is not sent to that connection since
1706 it originally came from it. */
1708 void silc_server_send_channel_key(SilcServer server,
1709 SilcSocketConnection sender,
1710 SilcChannelEntry channel,
1711 unsigned char route)
1714 unsigned char *chid;
1717 SILC_LOG_DEBUG(("Sending key to channel %s", channel->channel_name));
1719 chid = silc_id_id2str(channel->id, SILC_ID_CHANNEL);
1723 /* Encode channel key packet */
1724 tmp_len = strlen(channel->channel_key->cipher->name);
1725 packet = silc_channel_key_payload_encode(silc_id_get_len(channel->id,
1728 channel->channel_key->cipher->name,
1729 channel->key_len / 8, channel->key);
1730 silc_server_packet_send_to_channel(server, sender, channel,
1731 SILC_PACKET_CHANNEL_KEY,
1732 route, packet->data, packet->len,
1734 silc_buffer_free(packet);
1738 /* Generic function to send any command. The arguments must be sent already
1739 encoded into correct form in correct order. */
1741 void silc_server_send_command(SilcServer server,
1742 SilcSocketConnection sock,
1743 SilcCommand command,
1745 SilcUInt32 argc, ...)
1752 packet = silc_command_payload_encode_vap(command, ident, argc, ap);
1753 silc_server_packet_send(server, sock, SILC_PACKET_COMMAND, 0,
1754 packet->data, packet->len, TRUE);
1755 silc_buffer_free(packet);
1759 /* Generic function to send any command reply. The arguments must be sent
1760 already encoded into correct form in correct order. */
1762 void silc_server_send_command_reply(SilcServer server,
1763 SilcSocketConnection sock,
1764 SilcCommand command,
1768 SilcUInt32 argc, ...)
1775 packet = silc_command_reply_payload_encode_vap(command, status, error,
1777 silc_server_packet_send(server, sock, SILC_PACKET_COMMAND_REPLY, 0,
1778 packet->data, packet->len, TRUE);
1779 silc_buffer_free(packet);
1783 /* Generic function to send any command reply. The arguments must be sent
1784 already encoded into correct form in correct order. */
1786 void silc_server_send_dest_command_reply(SilcServer server,
1787 SilcSocketConnection sock,
1789 SilcIdType dst_id_type,
1790 SilcCommand command,
1794 SilcUInt32 argc, ...)
1801 packet = silc_command_reply_payload_encode_vap(command, status, error,
1803 silc_server_packet_send_dest(server, sock, SILC_PACKET_COMMAND_REPLY, 0,
1804 dst_id, dst_id_type, packet->data,
1806 silc_buffer_free(packet);
1810 /* Send the heartbeat packet. */
1812 void silc_server_send_heartbeat(SilcServer server,
1813 SilcSocketConnection sock)
1815 silc_server_packet_send(server, sock, SILC_PACKET_HEARTBEAT, 0,
1819 /* Generic function to relay packet we've received. This is used to relay
1820 packets to a client but generally can be used to other purposes as well. */
1822 void silc_server_relay_packet(SilcServer server,
1823 SilcSocketConnection dst_sock,
1826 SilcUInt32 sequence,
1827 SilcPacketContext *packet,
1830 const SilcBufferStruct p;
1832 silc_buffer_push(packet->buffer, SILC_PACKET_HEADER_LEN + packet->src_id_len
1833 + packet->dst_id_len + packet->padlen);
1834 if (!silc_packet_send_prepare(dst_sock, 0, 0, packet->buffer->len, hmac,
1835 (const SilcBuffer)&p)) {
1836 SILC_LOG_ERROR(("Cannot send packet"));
1839 silc_buffer_put((SilcBuffer)&p, packet->buffer->data, packet->buffer->len);
1841 /* Re-encrypt packet */
1842 silc_packet_encrypt(cipher, hmac, sequence, (SilcBuffer)&p, p.len);
1844 /* Send the packet */
1845 silc_server_packet_send_real(server, dst_sock, force_send);
1847 silc_buffer_pull(packet->buffer, SILC_PACKET_HEADER_LEN + packet->src_id_len
1848 + packet->dst_id_len + packet->padlen);
1851 /* Routine used to send the connection authentication packet. */
1853 void silc_server_send_connection_auth_request(SilcServer server,
1854 SilcSocketConnection sock,
1855 SilcUInt16 conn_type,
1856 SilcAuthMethod auth_meth)
1860 packet = silc_buffer_alloc(4);
1861 silc_buffer_pull_tail(packet, SILC_BUFFER_END(packet));
1862 silc_buffer_format(packet,
1863 SILC_STR_UI_SHORT(conn_type),
1864 SILC_STR_UI_SHORT(auth_meth),
1867 silc_server_packet_send(server, sock, SILC_PACKET_CONNECTION_AUTH_REQUEST,
1868 0, packet->data, packet->len, FALSE);
1869 silc_buffer_free(packet);
1872 /* Purge the outgoing packet queue to the network if there is data. This
1873 function can be used to empty the packet queue. It is guaranteed that
1874 after this function returns the outgoing data queue is empty. */
1876 void silc_server_packet_queue_purge(SilcServer server,
1877 SilcSocketConnection sock)
1879 if (sock && SILC_IS_OUTBUF_PENDING(sock) &&
1880 (SILC_IS_DISCONNECTED(sock) == FALSE)) {
1881 server->stat.packets_sent++;
1882 silc_packet_send(sock, TRUE);
1883 SILC_SET_CONNECTION_FOR_INPUT(server->schedule, sock->sock);
1884 SILC_UNSET_OUTBUF_PENDING(sock);
1885 silc_buffer_clear(sock->outbuf);