is something sensible in the silc_packet_decrypt_rest_special
in lib/silccrypt/silcpacket.c.
+ * Free and NULL the allocated pointer in silc_hmac_alloc if
+ the HMAC allocation fails. The affected file is
+ lib/silccrypt/silchmac.c.
+
+ * Print the selected security properties to the log files in
+ the server. Affected file silcd/protocol.c.
+
Sat Sep 15 13:29:17 EEST 2001 Pekka Riikonen <priikone@silcnet.org>
* Check that the public key exists in the GETKEY command before
o Add perhaps /var/run/silcd.pid for PID information for the server.
+ o Update idle times only for private/channel messaegs.
+
o Add a timeout to handling incmoing JOIN commands. It should be
enforced that JOIN command is executed only once in a second or two
seconds. Now it is possible to accept n incoming JOIN commands
memcpy(tmp, data, data_len);
/* Decrypt the channel message (we don't check the MAC) */
- /* XXX this could be optimized and removed all together by
- taking a copy of the original data before encrypting it
- and thus would not required decrypting. */
if (channel->channel_key &&
!silc_channel_message_payload_decrypt(tmp, data_len,
channel->channel_key,
sock->user_data = (void *)conn_data;
+ SILC_LOG_INFO(("%s (%s) security properties: %s %s %s",
+ sock->hostname, sock->ip,
+ idata->send_key->cipher->name,
+ idata->hmac_send->hmac->name,
+ idata->hash->hash->name));
+
return TRUE;
}
if (!silc_hash_alloc(hname, &hash)) {
silc_free(tmp);
+ silc_free(*new_hmac);
+ *new_hmac = NULL;
return FALSE;
}
}
}
+ silc_free(*new_hmac);
+ *new_hmac = NULL;
return FALSE;
}