5 Author: Pekka Riikonen <priikone@poseidon.pspt.fi>
7 Copyright (C) 1997 - 2001 Pekka Riikonen
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 2 of the License, or
12 (at your option) any later version.
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
21 * Created: Fri Jul 25 18:52:14 1997
25 #include "silcincludes.h"
27 /******************************************************************************
29 Packet Sending Routines
31 ******************************************************************************/
33 /* Writes data from encrypted buffer to the socket connection. If the
34 data cannot be written at once, it will be written later with a timeout.
35 The data is written from the data section of the buffer, not from head
36 or tail section. This automatically pulls the data section towards end
37 after writing the data. */
39 int silc_packet_write(int sock, SilcBuffer src)
43 SILC_LOG_DEBUG(("Writing data to socket %d", sock));
46 ret = write(sock, src->data, src->len);
48 if (errno == EAGAIN) {
49 SILC_LOG_DEBUG(("Could not write immediately, will do it later"));
52 SILC_LOG_ERROR(("Cannot write to socket: %s", strerror(errno)));
56 silc_buffer_pull(src, ret);
59 SILC_LOG_DEBUG(("Wrote data %d bytes", ret));
64 /* Actually sends the packet. This flushes the connections outgoing data
65 buffer. If data is sent directly to the network this returns the bytes
66 written, if error occured this returns -1 and if the data could not
67 be written directly to the network at this time this returns -2, in
68 which case the data should be queued by the caller and sent at some
69 later time. If `force_send' is TRUE this attempts to write the data
70 directly to the network, if FALSE, this returns -2. */
72 int silc_packet_send(SilcSocketConnection sock, int force_send)
74 SILC_LOG_DEBUG(("Sending packet to %s:%d [%s]", sock->hostname,
76 (sock->type == SILC_SOCKET_TYPE_UNKNOWN ? "Unknown" :
77 sock->type == SILC_SOCKET_TYPE_CLIENT ? "Client" :
78 sock->type == SILC_SOCKET_TYPE_SERVER ? "Server" :
81 /* Send now if forced to do so */
82 if (force_send == TRUE) {
85 SILC_LOG_DEBUG(("Forcing packet send, packet sent immediately"));
87 /* Write to network */
88 ret = silc_packet_write(sock->sock, sock->outbuf);
91 SILC_LOG_ERROR(("Error sending packet, dropped"));
96 SILC_LOG_DEBUG(("Could not force the send, packet put to queue"));
99 SILC_LOG_DEBUG(("Packet in queue"));
104 /* Encrypts a packet. This also creates HMAC of the packet before
105 encryption and adds the HMAC at the end of the buffer. This assumes
106 that there is enough free space at the end of the buffer to add the
107 computed HMAC. This is the normal way of encrypting packets, if some
108 other process of HMAC computing and encryption is needed this function
111 void silc_packet_encrypt(SilcCipher cipher, SilcHmac hmac,
112 SilcBuffer buffer, uint32 len)
114 unsigned char mac[32];
117 /* Compute HMAC. This assumes that HMAC is created from the entire
118 data area thus this uses the length found in buffer, not the length
121 silc_hmac_make(hmac, buffer->data, buffer->len, mac, &mac_len);
122 silc_buffer_put_tail(buffer, mac, mac_len);
123 memset(mac, 0, sizeof(mac));
126 /* Encrypt the data area of the packet. 2 bytes of the packet
127 are not encrypted. */
129 SILC_LOG_DEBUG(("Encrypting packet, cipher %s, len %d (%d)",
130 cipher->cipher->name, len, len - 2));
131 cipher->cipher->encrypt(cipher->context, buffer->data + 2,
132 buffer->data + 2, len - 2, cipher->iv);
135 /* Pull the HMAC into the visible data area in the buffer */
137 silc_buffer_pull_tail(buffer, mac_len);
140 /* Assembles a new packet to be ready for send out. The buffer sent as
141 argument must include the data to be sent and it must not be encrypted.
142 The packet also must have enough free space so that the SILC header
143 and padding maybe added to the packet. The packet is encrypted after
144 this function has returned.
146 The buffer sent as argument should be something like following:
148 --------------------------------------------
149 | head | data | tail |
150 --------------------------------------------
154 So that the SILC header and 1 - 16 bytes of padding can fit to
155 the buffer. After assembly the buffer might look like this:
157 --------------------------------------------
159 --------------------------------------------
161 Start of assembled packet
163 Packet construct is as follows (* = won't be encrypted):
166 2 bytes Payload length (*)
169 1 byte Source ID Type
170 2 bytes Source ID Length
172 1 byte Destination ID Type
173 2 bytes Destination ID Length
174 x bytes Destination ID
180 All fields in the packet will be authenticated by MAC. The MAC is
181 not computed here, it must be computed differently before encrypting
186 void silc_packet_assemble(SilcPacketContext *ctx)
188 unsigned char tmppad[SILC_PACKET_MAX_PADLEN];
191 SILC_LOG_DEBUG(("Assembling outgoing packet"));
193 /* Get the true length of the packet. This is saved as payload length
194 into the packet header. This does not include the length of the
197 ctx->truelen = ctx->buffer->len + SILC_PACKET_HEADER_LEN +
198 ctx->src_id_len + ctx->dst_id_len;
200 /* Calculate the length of the padding. The padding is calculated from
201 the data that will be encrypted. As protocol states 3 first bytes
202 of the packet are not encrypted they are not included in the
203 padding calculation. */
205 ctx->padlen = SILC_PACKET_PADLEN(ctx->truelen);
207 /* Put the start of the data section to the right place. */
208 silc_buffer_push(ctx->buffer, SILC_PACKET_HEADER_LEN +
209 ctx->src_id_len + ctx->dst_id_len + ctx->padlen);
211 /* Get random padding */
213 for (i = 0; i < ctx->padlen; i++) tmppad[i] = silc_rng_global_get_byte();
215 /* XXX: For testing - to be removed */
216 memset(tmppad, 65, sizeof(tmppad));
219 /* Create the packet. This creates the SILC header and adds padding,
220 rest of the buffer remains as it is. */
221 silc_buffer_format(ctx->buffer,
222 SILC_STR_UI_SHORT(ctx->truelen),
223 SILC_STR_UI_CHAR(ctx->flags),
224 SILC_STR_UI_CHAR(ctx->type),
225 SILC_STR_UI_SHORT(ctx->src_id_len),
226 SILC_STR_UI_SHORT(ctx->dst_id_len),
227 SILC_STR_UI_CHAR(ctx->src_id_type),
228 SILC_STR_UI_XNSTRING(ctx->src_id, ctx->src_id_len),
229 SILC_STR_UI_CHAR(ctx->dst_id_type),
230 SILC_STR_UI_XNSTRING(ctx->dst_id, ctx->dst_id_len),
231 SILC_STR_UI_XNSTRING(tmppad, ctx->padlen),
234 SILC_LOG_HEXDUMP(("Assembled packet, len %d", ctx->buffer->len),
235 ctx->buffer->data, ctx->buffer->len);
237 SILC_LOG_DEBUG(("Outgoing packet assembled"));
240 /* Prepare outgoing data buffer for packet sending. This moves the data
241 area so that new packet may be added into it. If needed this allocates
242 more space to the buffer. This handles directly the connection's
243 outgoing buffer in SilcSocketConnection object. */
245 void silc_packet_send_prepare(SilcSocketConnection sock,
252 totlen = header_len + padlen + data_len;
254 /* Prepare the outgoing buffer for packet sending. */
256 /* Allocate new buffer. This is done only once per connection. */
257 SILC_LOG_DEBUG(("Allocating outgoing data buffer"));
259 sock->outbuf = silc_buffer_alloc(SILC_PACKET_DEFAULT_SIZE);
260 silc_buffer_pull_tail(sock->outbuf, totlen);
261 silc_buffer_pull(sock->outbuf, header_len + padlen);
263 if (SILC_IS_OUTBUF_PENDING(sock)) {
264 /* There is some pending data in the buffer. */
266 /* Allocate more space if needed */
267 if ((sock->outbuf->end - sock->outbuf->tail) < data_len) {
268 SILC_LOG_DEBUG(("Reallocating outgoing data buffer"));
269 sock->outbuf = silc_buffer_realloc(sock->outbuf,
270 sock->outbuf->truelen + totlen);
273 oldlen = sock->outbuf->len;
274 silc_buffer_pull_tail(sock->outbuf, totlen);
275 silc_buffer_pull(sock->outbuf, header_len + padlen + oldlen);
277 /* Buffer is free for use */
278 silc_buffer_clear(sock->outbuf);
279 silc_buffer_pull_tail(sock->outbuf, totlen);
280 silc_buffer_pull(sock->outbuf, header_len + padlen);
285 /******************************************************************************
287 Packet Reception Routines
289 ******************************************************************************/
291 /* Reads data from the socket connection into the incoming data buffer.
292 However, this does not parse the packet, it only reads some amount from
293 the network. If there are more data available that can be read at a time
294 the rest of the data will be read later with a timeout and only after
295 that the packet is ready to be parsed.
297 The destination buffer sent as argument must be initialized before
298 calling this function, and, the data section and the start of the tail
299 section must be same. Ie. we add the read data to the tail section of
300 the buffer hence the data section is the start of the buffer.
302 This returns amount of bytes read or -1 on error or -2 on case where
303 all of the data could not be read at once. */
305 int silc_packet_read(int sock, SilcBuffer dest)
308 unsigned char buf[SILC_PACKET_READ_SIZE];
310 SILC_LOG_DEBUG(("Reading data from socket %d", sock));
312 /* Read the data from the socket. */
313 len = read(sock, buf, sizeof(buf));
315 if (errno == EAGAIN || errno == EINTR) {
316 SILC_LOG_DEBUG(("Could not read immediately, will do it later"));
319 SILC_LOG_ERROR(("Cannot read from socket: %d:%s", sock, strerror(errno)));
326 /* Insert the data to the buffer. If the data doesn't fit to the
327 buffer space is allocated for the buffer. */
328 /* XXX: This may actually be bad thing as if there is pending data in
329 the buffer they will be lost! */
332 /* If the data doesn't fit we just have to allocate a whole new
334 if (dest->truelen <= len) {
336 /* Free the old buffer */
337 memset(dest->head, 'F', dest->truelen);
338 silc_free(dest->head);
340 /* Allocate new data area */
341 len += SILC_PACKET_DEFAULT_SIZE;
342 dest->data = silc_calloc(len, sizeof(char));
345 dest->head = dest->data;
346 dest->data = dest->data;
347 dest->tail = dest->data;
348 dest->end = dest->data + dest->truelen;
349 len -= SILC_PACKET_DEFAULT_SIZE;
352 silc_buffer_put_tail(dest, buf, len);
353 silc_buffer_pull_tail(dest, len);
356 SILC_LOG_DEBUG(("Read %d bytes", len));
361 /* Processes the received data. This checks the received data and
362 calls parser callback that handles the actual packet decryption
363 and parsing. If more than one packet was received this calls the
364 parser multiple times. The parser callback will get context
365 SilcPacketParserContext that includes the packet and the `context'
366 sent to this function. */
368 void silc_packet_receive_process(SilcSocketConnection sock,
369 SilcCipher cipher, SilcHmac hmac,
370 SilcPacketParserCallback parser,
373 SilcPacketParserContext *parse_ctx;
374 int packetlen, paddedlen, count, mac_len = 0;
376 /* We need at least 2 bytes of data to be able to start processing
378 if (sock->inbuf->len < 2)
382 mac_len = hmac->hmac->len;
384 /* Parse the packets from the data */
386 while (sock->inbuf->len > 0) {
387 SILC_PACKET_LENGTH(sock->inbuf, packetlen, paddedlen);
391 if (packetlen < SILC_PACKET_MIN_LEN) {
392 SILC_LOG_DEBUG(("Received invalid packet, dropped"));
393 silc_buffer_clear(sock->inbuf);
397 if (sock->inbuf->len < paddedlen + mac_len) {
398 SILC_LOG_DEBUG(("Received partial packet, waiting for the rest"));
402 parse_ctx = silc_calloc(1, sizeof(*parse_ctx));
403 parse_ctx->packet = silc_packet_context_alloc();
404 parse_ctx->packet->buffer = silc_buffer_alloc(paddedlen + mac_len);
405 parse_ctx->sock = sock;
406 parse_ctx->cipher = cipher;
407 parse_ctx->hmac = hmac;
408 parse_ctx->context = context;
410 silc_buffer_pull_tail(parse_ctx->packet->buffer,
411 SILC_BUFFER_END(parse_ctx->packet->buffer));
412 silc_buffer_put(parse_ctx->packet->buffer, sock->inbuf->data,
413 paddedlen + mac_len);
415 SILC_LOG_HEXDUMP(("Incoming packet, len %d",
416 parse_ctx->packet->buffer->len),
417 parse_ctx->packet->buffer->data,
418 parse_ctx->packet->buffer->len);
420 /* Call the parser */
422 (*parser)(parse_ctx);
424 /* Pull the packet from inbuf thus we'll get the next one
426 silc_buffer_pull(sock->inbuf, paddedlen);
428 silc_buffer_pull(sock->inbuf, mac_len);
431 SILC_LOG_DEBUG(("Clearing inbound buffer"));
432 silc_buffer_clear(sock->inbuf);
435 /* Receives packet from network and reads the data into connection's
436 incoming data buffer. If the data was read directly this returns the
437 read bytes, if error occured this returns -1, if the data could not
438 be read directly at this time this returns -2 in which case the data
439 should be read again at some later time, or If EOF occured this returns
442 int silc_packet_receive(SilcSocketConnection sock)
446 SILC_LOG_DEBUG(("Receiving packet from %s:%d [%s]", sock->hostname,
448 (sock->type == SILC_SOCKET_TYPE_UNKNOWN ? "Unknown" :
449 sock->type == SILC_SOCKET_TYPE_CLIENT ? "Client" :
450 sock->type == SILC_SOCKET_TYPE_SERVER ? "Server" :
453 /* Allocate the incoming data buffer if not done already. */
455 sock->inbuf = silc_buffer_alloc(SILC_PACKET_DEFAULT_SIZE);
457 /* Read some data from connection */
458 ret = silc_packet_read(sock->sock, sock->inbuf);
463 /* Checks MAC in the packet. Returns TRUE if MAC is Ok. This is called
464 after packet has been totally decrypted and parsed. */
466 static int silc_packet_check_mac(SilcHmac hmac, SilcBuffer buffer)
470 unsigned char mac[32];
473 SILC_LOG_DEBUG(("Verifying MAC"));
475 /* Compute HMAC of packet */
476 memset(mac, 0, sizeof(mac));
477 silc_hmac_make(hmac, buffer->data, buffer->len, mac, &mac_len);
479 /* Compare the HMAC's (buffer->tail has the packet's HMAC) */
480 if (memcmp(mac, buffer->tail, mac_len)) {
481 SILC_LOG_ERROR(("MAC failed"));
485 SILC_LOG_DEBUG(("MAC is Ok"));
486 memset(mac, 0, sizeof(mac));
492 /* Decrypts rest of the packet (after decrypting just the SILC header).
493 After calling this function the packet is ready to be parsed by calling
494 silc_packet_parse. If everything goes without errors this returns TRUE,
495 if packet is malformed this returns FALSE. */
497 static int silc_packet_decrypt_rest(SilcCipher cipher, SilcHmac hmac,
502 /* Pull MAC from packet before decryption */
504 if ((buffer->len - hmac->hmac->len) > SILC_PACKET_MIN_LEN) {
505 silc_buffer_push_tail(buffer, hmac->hmac->len);
507 SILC_LOG_DEBUG(("Bad MAC length in packet, packet dropped"));
512 SILC_LOG_DEBUG(("Decrypting rest of the packet"));
514 /* Decrypt rest of the packet */
515 silc_buffer_pull(buffer, SILC_PACKET_MIN_HEADER_LEN - 2);
516 cipher->cipher->decrypt(cipher->context, buffer->data + 2,
517 buffer->data + 2, buffer->len - 2,
519 silc_buffer_push(buffer, SILC_PACKET_MIN_HEADER_LEN - 2);
521 SILC_LOG_HEXDUMP(("Fully decrypted packet, len %d", buffer->len),
522 buffer->data, buffer->len);
528 /* Decrypts rest of the SILC Packet header that has been decrypted partly
529 already. This decrypts the padding of the packet also. After calling
530 this function the packet is ready to be parsed by calling function
531 silc_packet_parse. This is used in special packet reception (protocol
532 defines the way of decrypting special packets). */
534 static int silc_packet_decrypt_rest_special(SilcCipher cipher,
538 /* Decrypt rest of the header plus padding */
540 uint16 truelen, len1, len2, padlen;
542 /* Pull MAC from packet before decryption */
544 if ((buffer->len - hmac->hmac->len) > SILC_PACKET_MIN_LEN) {
545 silc_buffer_push_tail(buffer, hmac->hmac->len);
547 SILC_LOG_DEBUG(("Bad MAC length in packet, packet dropped"));
552 SILC_LOG_DEBUG(("Decrypting rest of the header"));
554 SILC_GET16_MSB(len1, &buffer->data[4]);
555 SILC_GET16_MSB(len2, &buffer->data[6]);
557 truelen = SILC_PACKET_HEADER_LEN + len1 + len2;
558 padlen = SILC_PACKET_PADLEN(truelen);
559 len1 = (truelen + padlen) - (SILC_PACKET_MIN_HEADER_LEN - 2);
561 silc_buffer_pull(buffer, SILC_PACKET_MIN_HEADER_LEN - 2);
562 cipher->cipher->decrypt(cipher->context, buffer->data + 2,
563 buffer->data + 2, len1 - 2,
565 silc_buffer_push(buffer, SILC_PACKET_MIN_HEADER_LEN - 2);
571 /* Decrypts a packet. This assumes that typical SILC packet is the
572 packet to be decrypted and thus checks for normal and special SILC
573 packets and can handle both of them. This also computes and checks
574 the HMAC of the packet. If any other special or customized decryption
575 processing is required this function cannot be used. This returns
576 -1 on error, 0 when packet is normal packet and 1 when the packet
577 is special and requires special processing.
579 The `check_packet' is a callback funtion that this function will
580 call. The callback relates to the checking whether the packet is
581 normal packet or special packet and how it should be processed. If
582 the callback return TRUE the packet is normal and FALSE if the packet
583 is special and requires special procesing. */
585 int silc_packet_decrypt(SilcCipher cipher, SilcHmac hmac,
586 SilcBuffer buffer, SilcPacketContext *packet,
587 SilcPacketCheckDecrypt check_packet,
592 /* Decrypt start of the packet header */
594 silc_cipher_decrypt(cipher, buffer->data + 2, buffer->data + 2,
595 SILC_PACKET_MIN_HEADER_LEN - 2, cipher->iv);
597 /* Do packet checking, whether the packet is normal or special */
598 check = check_packet((SilcPacketType)buffer->data[3], buffer,
601 /* If the packet type is not any special type lets decrypt rest
602 of the packet here. */
604 /* Normal packet, decrypt rest of the packet */
605 if (!silc_packet_decrypt_rest(cipher, hmac, buffer))
609 if (!silc_packet_check_mac(hmac, buffer))
614 /* Packet requires special handling, decrypt rest of the header.
615 This only decrypts. */
616 if (!silc_packet_decrypt_rest_special(cipher, hmac, buffer))
620 if (!silc_packet_check_mac(hmac, buffer))
627 /* Parses the packet. This is called when a whole packet is ready to be
628 parsed. The buffer sent must be already decrypted before calling this
629 function. The len argument must be the true length of the packet. This
630 function returns the type of the packet. The data section of the
631 buffer is parsed, not head or tail sections. */
633 SilcPacketType silc_packet_parse(SilcPacketContext *ctx)
635 SilcBuffer buffer = ctx->buffer;
638 SILC_LOG_DEBUG(("Parsing incoming packet"));
640 /* Check the length of the buffer */
641 if (buffer->len < SILC_PACKET_MIN_LEN) {
642 SILC_LOG_ERROR(("Bad packet length: %d, packet dropped", buffer->len));
643 return SILC_PACKET_NONE;
646 /* Parse the buffer. This parses the SILC header of the packet. */
647 len = silc_buffer_unformat(buffer,
648 SILC_STR_UI_SHORT(&ctx->truelen),
649 SILC_STR_UI_CHAR(&ctx->flags),
650 SILC_STR_UI_CHAR(&ctx->type),
651 SILC_STR_UI_SHORT(&ctx->src_id_len),
652 SILC_STR_UI_SHORT(&ctx->dst_id_len),
653 SILC_STR_UI_CHAR(&ctx->src_id_type),
656 return SILC_PACKET_NONE;
658 if (ctx->src_id_len > SILC_PACKET_MAX_ID_LEN ||
659 ctx->dst_id_len > SILC_PACKET_MAX_ID_LEN) {
660 SILC_LOG_ERROR(("Bad ID lengths in packet"));
661 return SILC_PACKET_NONE;
664 /* Calculate length of padding in packet */
665 ctx->padlen = SILC_PACKET_PADLEN(ctx->truelen);
667 silc_buffer_pull(buffer, len);
668 ret = silc_buffer_unformat(buffer,
669 SILC_STR_UI_XNSTRING_ALLOC(&ctx->src_id,
671 SILC_STR_UI_CHAR(&ctx->dst_id_type),
672 SILC_STR_UI_XNSTRING_ALLOC(&ctx->dst_id,
674 SILC_STR_UI_XNSTRING(NULL, ctx->padlen),
677 return SILC_PACKET_NONE;
679 silc_buffer_push(buffer, len);
681 SILC_LOG_HEXDUMP(("parsed packet, len %d", ctx->buffer->len),
682 ctx->buffer->data, ctx->buffer->len);
684 /* Pull SILC header and padding from packet */
685 silc_buffer_pull(buffer, SILC_PACKET_HEADER_LEN +
686 ctx->src_id_len + ctx->dst_id_len + ctx->padlen);
688 SILC_LOG_DEBUG(("Incoming packet type: %d", ctx->type));
693 /* Perform special SILC Packet header parsing. This is required to some
694 packet types that have the data payload encrypted with different key
695 than the header area plus padding of the packet. Hence, this parses
696 the header in a way that it does not take the data area into account
697 and parses the header and padding area only. */
699 SilcPacketType silc_packet_parse_special(SilcPacketContext *ctx)
701 SilcBuffer buffer = ctx->buffer;
702 int len, tmplen, ret;
704 SILC_LOG_DEBUG(("Parsing incoming packet"));
706 /* Check the length of the buffer */
707 if (buffer->len < SILC_PACKET_MIN_LEN) {
708 SILC_LOG_ERROR(("Bad packet length: %d, packet dropped", buffer->len));
709 return SILC_PACKET_NONE;
712 /* Parse the buffer. This parses the SILC header of the packet. */
713 len = silc_buffer_unformat(buffer,
714 SILC_STR_UI_SHORT(&ctx->truelen),
715 SILC_STR_UI_CHAR(&ctx->flags),
716 SILC_STR_UI_CHAR(&ctx->type),
717 SILC_STR_UI_SHORT(&ctx->src_id_len),
718 SILC_STR_UI_SHORT(&ctx->dst_id_len),
719 SILC_STR_UI_CHAR(&ctx->src_id_type),
722 return SILC_PACKET_NONE;
724 if (ctx->src_id_len > SILC_PACKET_MAX_ID_LEN ||
725 ctx->dst_id_len > SILC_PACKET_MAX_ID_LEN) {
726 SILC_LOG_ERROR(("Bad ID lengths in packet"));
727 return SILC_PACKET_NONE;
730 /* Calculate length of padding in packet. As this is special packet
731 the data area is not used in the padding calculation as it won't
732 be decrypted by the caller. */
733 tmplen = SILC_PACKET_HEADER_LEN + ctx->src_id_len + ctx->dst_id_len;
734 ctx->padlen = SILC_PACKET_PADLEN(tmplen);
736 silc_buffer_pull(buffer, len);
737 ret = silc_buffer_unformat(buffer,
738 SILC_STR_UI_XNSTRING_ALLOC(&ctx->src_id,
740 SILC_STR_UI_CHAR(&ctx->dst_id_type),
741 SILC_STR_UI_XNSTRING_ALLOC(&ctx->dst_id,
743 SILC_STR_UI_XNSTRING(NULL, ctx->padlen),
746 return SILC_PACKET_NONE;
748 silc_buffer_push(buffer, len);
750 SILC_LOG_HEXDUMP(("parsed packet, len %d", ctx->buffer->len),
751 ctx->buffer->data, ctx->buffer->len);
753 /* Pull SILC header and padding from packet */
754 silc_buffer_pull(buffer, SILC_PACKET_HEADER_LEN +
755 ctx->src_id_len + ctx->dst_id_len + ctx->padlen);
757 SILC_LOG_DEBUG(("Incoming packet type: %d", ctx->type));
762 /* Allocate packet context */
764 SilcPacketContext *silc_packet_context_alloc()
766 SilcPacketContext *ctx = silc_calloc(1, sizeof(*ctx));
771 /* Increse the reference count of the packet context. */
773 SilcPacketContext *silc_packet_context_dup(SilcPacketContext *ctx)
776 SILC_LOG_DEBUG(("Packet context %p refcnt %d->%d", ctx, ctx->users - 1,
781 /* Decrese the reference count of the packet context and free it only if
784 void silc_packet_context_free(SilcPacketContext *ctx)
787 SILC_LOG_DEBUG(("Packet context %p refcnt %d->%d", ctx, ctx->users + 1,
792 silc_buffer_free(ctx->buffer);
794 silc_free(ctx->src_id);
796 silc_free(ctx->dst_id);