+Fri Nov 22 18:34:20 EET 2002 Pekka Riikonen <priikone@silcnet.org>
+
+ * Added support to backup router protocol for backup to tell
+ normal server that it cannot use the backup router as primary
+ because the primary isn't really down. Updated protocol
+ specs.
+
+ * Added support for primary router to tell backup router that
+ resuming is not possible because the backup really isn't primary
+ in the cell. For example if backup disconnected itself the
+ resuming is not allowed since the primary really did not
+ go down. Updated protocol specs.
+
+ * Removed MARS from crypto library.
+
+ * Defined the CTR mode and Randomized CBC mode in SILC. The
+ CTR mode is RECOMMENDED now in specification. Defined also
+ Serpent cipher as optional cipher. Updated the protocol specs.
+
+Thu Nov 21 12:43:28 EET 2002 Pekka Riikonen <priikone@silcnet.org>
+
+ * Added support for inviting/banning by IP/MASK, public key,
+ and explicit Client ID. Redefined the command and notify
+ types to allow easier forwards support for other methods
+ of inviting/banning. Updated protocol specs.
+
+ * Remove the client from channel's invite lists if the client
+ is kicked or killed. Updated protocol specs.
+
+ * Unified the Channel Message Payload and Private Message
+ into one Message Payload. Updated protocol specs and
+ implemented.
+
Tue Nov 19 22:30:56 EET 2002 Pekka Riikonen <priikone@silcnet.org>
* Don't wait for EOF after socket error has occurred, but
o SILC protocol version 1.2 integration
+ o Signed message payload handling
+
o Testing - See test plan:
http://silcnet.org/docs/silc-client-1.0-test.pdf
http://silcnet.org/docs/silc-client-1.0-test.ps
TODO for SILC Server 1.0
========================
- o WHOIS search by public key in attrs.
+ o New INVITE and BAN commands and notify types.
+
+ o Remove client from invite lists in KICKED and KILLED.
+
+ o 1.2 backup router support
o Backup router related issues:
}
memcpy(iv, data + (data_len - iv_len - mac_len), iv_len);
- silc_channel_message_payload_encrypt(data, data_len - iv_len, iv, iv_len,
- channel->channel_key, channel->hmac);
+ silc_message_payload_encrypt(data, data_len - iv_len, iv, iv_len,
+ channel->channel_key, channel->hmac);
}
return TRUE;
memcpy(tmp, data, data_len);
/* Decrypt the channel message (we don't check the MAC) */
- silc_channel_message_payload_decrypt(tmp, data_len,
- channel->channel_key,
- channel->hmac, FALSE);
+ silc_message_payload_decrypt(tmp, data_len, FALSE, FALSE,
+ channel->channel_key,
+ channel->hmac, FALSE);
/* Now re-encrypt and send it to the router */
silc_server_packet_send_srcdest(server, sock,
} else if (backup_router) {
SILC_LOG_INFO(("Enabling the use of backup router %s",
backup_router->server_name));
- SILC_LOG_DEBUG(("Enabling the use of backup router %s",
- backup_router->server_name));
/* Mark this connection as replaced */
silc_server_backup_replaced_add(server, user_data->id,
CFLAGS="-Wall -finline-functions $CFLAGS"
fi
+#
# Program checking
#
AC_PROG_INSTALL