5 Author: Pekka Riikonen <priikone@poseidon.pspt.fi>
7 Copyright (C) 1997 - 2001 Pekka Riikonen
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 2 of the License, or
12 (at your option) any later version.
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
21 * Server packet routines to send packets.
25 #include "serverincludes.h"
26 #include "server_internal.h"
28 /* Routine that sends packet or marks packet to be sent. This is used
29 directly only in special cases. Normal cases should use
30 silc_server_packet_send. Returns < 0 error. */
32 int silc_server_packet_send_real(SilcServer server,
33 SilcSocketConnection sock,
38 /* If rekey protocol is active we must assure that all packets are
39 sent through packet queue. */
40 if (SILC_SERVER_IS_REKEY(sock))
44 ret = silc_packet_send(sock, force_send);
48 /* Mark that there is some outgoing data available for this connection.
49 This call sets the connection both for input and output (the input
50 is set always and this call keeps the input setting, actually).
51 Actual data sending is performed by silc_server_packet_process. */
52 SILC_SET_CONNECTION_FOR_OUTPUT(sock->sock);
54 /* Mark to socket that data is pending in outgoing buffer. This flag
55 is needed if new data is added to the buffer before the earlier
56 put data is sent to the network. */
57 SILC_SET_OUTBUF_PENDING(sock);
62 /* Assembles a new packet to be sent out to network. This doesn't actually
63 send the packet but creates the packet and fills the outgoing data
64 buffer and marks the packet ready to be sent to network. However, If
65 argument force_send is TRUE the packet is sent immediately and not put
66 to queue. Normal case is that the packet is not sent immediately. */
68 void silc_server_packet_send(SilcServer server,
69 SilcSocketConnection sock,
71 SilcPacketFlags flags,
77 SilcIdType dst_id_type = SILC_ID_NONE;
82 /* Get data used in the packet sending, keys and stuff */
84 case SILC_SOCKET_TYPE_CLIENT:
85 dst_id = ((SilcClientEntry)sock->user_data)->id;
86 dst_id_type = SILC_ID_CLIENT;
88 case SILC_SOCKET_TYPE_SERVER:
89 case SILC_SOCKET_TYPE_ROUTER:
90 dst_id = ((SilcServerEntry)sock->user_data)->id;
91 dst_id_type = SILC_ID_SERVER;
97 silc_server_packet_send_dest(server, sock, type, flags, dst_id,
98 dst_id_type, data, data_len, force_send);
101 /* Assembles a new packet to be sent out to network. This doesn't actually
102 send the packet but creates the packet and fills the outgoing data
103 buffer and marks the packet ready to be sent to network. However, If
104 argument force_send is TRUE the packet is sent immediately and not put
105 to queue. Normal case is that the packet is not sent immediately.
106 Destination information is sent as argument for this function. */
108 void silc_server_packet_send_dest(SilcServer server,
109 SilcSocketConnection sock,
111 SilcPacketFlags flags,
113 SilcIdType dst_id_type,
118 SilcPacketContext packetdata;
119 SilcIDListData idata;
120 SilcCipher cipher = NULL;
121 SilcHmac hmac = NULL;
122 unsigned char *dst_id_data = NULL;
123 uint32 dst_id_len = 0;
125 SILC_LOG_DEBUG(("Sending packet, type %d", type));
127 /* Get data used in the packet sending, keys and stuff */
128 idata = (SilcIDListData)sock->user_data;
131 dst_id_data = silc_id_id2str(dst_id, dst_id_type);
132 dst_id_len = silc_id_get_len(dst_id_type);
135 /* Set the packet context pointers */
136 packetdata.type = type;
137 packetdata.flags = flags;
138 packetdata.src_id = silc_id_id2str(server->id, server->id_type);
139 packetdata.src_id_len = SILC_ID_SERVER_LEN;
140 packetdata.src_id_type = server->id_type;
141 packetdata.dst_id = dst_id_data;
142 packetdata.dst_id_len = dst_id_len;
143 packetdata.dst_id_type = dst_id_type;
144 packetdata.truelen = data_len + SILC_PACKET_HEADER_LEN +
145 packetdata.src_id_len + dst_id_len;
146 packetdata.padlen = SILC_PACKET_PADLEN(packetdata.truelen);
148 /* Prepare outgoing data buffer for packet sending */
149 silc_packet_send_prepare(sock,
150 SILC_PACKET_HEADER_LEN +
151 packetdata.src_id_len +
152 packetdata.dst_id_len,
156 SILC_LOG_DEBUG(("Putting data to outgoing buffer, len %d", data_len));
158 packetdata.buffer = sock->outbuf;
160 /* Put the data to the buffer */
161 if (data && data_len)
162 silc_buffer_put(sock->outbuf, data, data_len);
164 /* Create the outgoing packet */
165 silc_packet_assemble(&packetdata);
168 cipher = idata->send_key;
169 hmac = idata->hmac_send;
172 /* Encrypt the packet */
173 silc_packet_encrypt(cipher, hmac, sock->outbuf, sock->outbuf->len);
175 SILC_LOG_HEXDUMP(("Outgoing packet, len %d", sock->outbuf->len),
176 sock->outbuf->data, sock->outbuf->len);
178 /* Now actually send the packet */
179 silc_server_packet_send_real(server, sock, force_send);
181 if (packetdata.src_id)
182 silc_free(packetdata.src_id);
183 if (packetdata.dst_id)
184 silc_free(packetdata.dst_id);
187 /* Assembles a new packet to be sent out to network. This doesn't actually
188 send the packet but creates the packet and fills the outgoing data
189 buffer and marks the packet ready to be sent to network. However, If
190 argument force_send is TRUE the packet is sent immediately and not put
191 to queue. Normal case is that the packet is not sent immediately.
192 The source and destination information is sent as argument for this
195 void silc_server_packet_send_srcdest(SilcServer server,
196 SilcSocketConnection sock,
198 SilcPacketFlags flags,
200 SilcIdType src_id_type,
202 SilcIdType dst_id_type,
207 SilcPacketContext packetdata;
208 SilcIDListData idata;
209 SilcCipher cipher = NULL;
210 SilcHmac hmac = NULL;
211 unsigned char *dst_id_data = NULL;
212 uint32 dst_id_len = 0;
213 unsigned char *src_id_data = NULL;
214 uint32 src_id_len = 0;
216 SILC_LOG_DEBUG(("Sending packet, type %d", type));
218 /* Get data used in the packet sending, keys and stuff */
219 idata = (SilcIDListData)sock->user_data;
222 dst_id_data = silc_id_id2str(dst_id, dst_id_type);
223 dst_id_len = silc_id_get_len(dst_id_type);
227 src_id_data = silc_id_id2str(src_id, src_id_type);
228 src_id_len = silc_id_get_len(src_id_type);
231 /* Set the packet context pointers */
232 packetdata.type = type;
233 packetdata.flags = flags;
234 packetdata.src_id = src_id_data;
235 packetdata.src_id_len = src_id_len;
236 packetdata.src_id_type = src_id_type;
237 packetdata.dst_id = dst_id_data;
238 packetdata.dst_id_len = dst_id_len;
239 packetdata.dst_id_type = dst_id_type;
240 packetdata.truelen = data_len + SILC_PACKET_HEADER_LEN +
241 packetdata.src_id_len + dst_id_len;
242 packetdata.padlen = SILC_PACKET_PADLEN(packetdata.truelen);
244 /* Prepare outgoing data buffer for packet sending */
245 silc_packet_send_prepare(sock,
246 SILC_PACKET_HEADER_LEN +
247 packetdata.src_id_len +
248 packetdata.dst_id_len,
252 SILC_LOG_DEBUG(("Putting data to outgoing buffer, len %d", data_len));
254 packetdata.buffer = sock->outbuf;
256 /* Put the data to the buffer */
257 if (data && data_len)
258 silc_buffer_put(sock->outbuf, data, data_len);
260 /* Create the outgoing packet */
261 silc_packet_assemble(&packetdata);
264 cipher = idata->send_key;
265 hmac = idata->hmac_send;
268 /* Encrypt the packet */
269 silc_packet_encrypt(cipher, hmac, sock->outbuf, sock->outbuf->len);
271 SILC_LOG_HEXDUMP(("Outgoing packet, len %d", sock->outbuf->len),
272 sock->outbuf->data, sock->outbuf->len);
274 /* Now actually send the packet */
275 silc_server_packet_send_real(server, sock, force_send);
277 if (packetdata.src_id)
278 silc_free(packetdata.src_id);
279 if (packetdata.dst_id)
280 silc_free(packetdata.dst_id);
283 /* Broadcast received packet to our primary route. This function is used
284 by router to further route received broadcast packet. It is expected
285 that the broadcast flag from the packet is checked before calling this
286 function. This does not test or set the broadcast flag. */
288 void silc_server_packet_broadcast(SilcServer server,
289 SilcSocketConnection sock,
290 SilcPacketContext *packet)
292 SilcBuffer buffer = packet->buffer;
293 SilcIDListData idata;
296 SILC_LOG_DEBUG(("Broadcasting received broadcast packet"));
298 /* If the packet is originated from our primary route we are
299 not allowed to send the packet. */
300 id = silc_id_str2id(packet->src_id, packet->src_id_len, packet->src_id_type);
301 if (id && SILC_ID_SERVER_COMPARE(id, server->router->id)) {
302 idata = (SilcIDListData)sock->user_data;
304 silc_buffer_push(buffer, buffer->data - buffer->head);
305 silc_packet_send_prepare(sock, 0, 0, buffer->len);
306 silc_buffer_put(sock->outbuf, buffer->data, buffer->len);
307 silc_packet_encrypt(idata->send_key, idata->hmac_send,
308 sock->outbuf, sock->outbuf->len);
310 SILC_LOG_HEXDUMP(("Broadcasted packet, len %d", sock->outbuf->len),
311 sock->outbuf->data, sock->outbuf->len);
313 /* Now actually send the packet */
314 silc_server_packet_send_real(server, sock, TRUE);
319 SILC_LOG_DEBUG(("Will not broadcast to primary route since it is the "
320 "original sender of this packet"));
324 /* Routes received packet to `sock'. This is used to route the packets that
325 router receives but are not destined to it. */
327 void silc_server_packet_route(SilcServer server,
328 SilcSocketConnection sock,
329 SilcPacketContext *packet)
331 SilcBuffer buffer = packet->buffer;
332 SilcIDListData idata;
334 SILC_LOG_DEBUG(("Routing received packet"));
336 idata = (SilcIDListData)sock->user_data;
338 silc_buffer_push(buffer, buffer->data - buffer->head);
339 silc_packet_send_prepare(sock, 0, 0, buffer->len);
340 silc_buffer_put(sock->outbuf, buffer->data, buffer->len);
341 silc_packet_encrypt(idata->send_key, idata->hmac_send,
342 sock->outbuf, sock->outbuf->len);
344 SILC_LOG_HEXDUMP(("Routed packet, len %d", sock->outbuf->len),
345 sock->outbuf->data, sock->outbuf->len);
347 /* Now actually send the packet */
348 silc_server_packet_send_real(server, sock, TRUE);
351 /* Internal routine to actually create the channel packet and send it
352 to network. This is common function in channel message sending. If
353 `channel_message' is TRUE this encrypts the message as it is strictly
354 a channel message. If FALSE normal encryption process is used. */
357 silc_server_packet_send_to_channel_real(SilcServer server,
358 SilcSocketConnection sock,
359 SilcPacketContext *packet,
367 packet->truelen = data_len + SILC_PACKET_HEADER_LEN +
368 packet->src_id_len + packet->dst_id_len;
370 /* Prepare outgoing data buffer for packet sending */
371 silc_packet_send_prepare(sock,
372 SILC_PACKET_HEADER_LEN +
378 packet->buffer = sock->outbuf;
380 /* Put the data to buffer, assemble and encrypt the packet. The packet
381 is encrypted with normal session key shared with the client. */
382 silc_buffer_put(sock->outbuf, data, data_len);
383 silc_packet_assemble(packet);
385 silc_packet_encrypt(cipher, hmac, sock->outbuf, SILC_PACKET_HEADER_LEN +
386 packet->src_id_len + packet->dst_id_len +
389 silc_packet_encrypt(cipher, hmac, sock->outbuf, sock->outbuf->len);
391 SILC_LOG_HEXDUMP(("Channel packet, len %d", sock->outbuf->len),
392 sock->outbuf->data, sock->outbuf->len);
394 /* Now actually send the packet */
395 silc_server_packet_send_real(server, sock, force_send);
398 /* This routine is used by the server to send packets to channel. The
399 packet sent with this function is distributed to all clients on
400 the channel. Usually this is used to send notify messages to the
401 channel, things like notify about new user joining to the channel.
402 If `route' is FALSE then the packet is sent only locally and will not
403 be routed anywhere (for router locally means cell wide). If `sender'
404 is provided then the packet is not sent to that connection since it
405 originally came from it. */
407 void silc_server_packet_send_to_channel(SilcServer server,
408 SilcSocketConnection sender,
409 SilcChannelEntry channel,
416 SilcSocketConnection sock = NULL;
417 SilcPacketContext packetdata;
418 SilcClientEntry client = NULL;
419 SilcServerEntry *routed = NULL;
420 SilcChannelClientEntry chl;
421 SilcIDListData idata;
422 uint32 routed_count = 0;
424 /* This doesn't send channel message packets */
425 if (type == SILC_PACKET_CHANNEL_MESSAGE)
428 SILC_LOG_DEBUG(("Sending packet to channel"));
430 /* Set the packet context pointers. */
431 packetdata.flags = 0;
432 packetdata.type = type;
433 packetdata.src_id = silc_id_id2str(server->id, SILC_ID_SERVER);
434 packetdata.src_id_len = SILC_ID_SERVER_LEN;
435 packetdata.src_id_type = SILC_ID_SERVER;
436 packetdata.dst_id = silc_id_id2str(channel->id, SILC_ID_CHANNEL);
437 packetdata.dst_id_len = SILC_ID_CHANNEL_LEN;
438 packetdata.dst_id_type = SILC_ID_CHANNEL;
439 packetdata.truelen = data_len + SILC_PACKET_HEADER_LEN +
440 packetdata.src_id_len + packetdata.dst_id_len;
441 packetdata.padlen = SILC_PACKET_PADLEN(packetdata.truelen);
443 /* If there are global users in the channel we will send the message
444 first to our router for further routing. */
445 if (route && server->server_type == SILC_SERVER && !server->standalone &&
446 channel->global_users) {
447 SilcServerEntry router;
449 /* Get data used in packet header encryption, keys and stuff. */
450 router = server->router;
451 sock = (SilcSocketConnection)router->connection;
452 idata = (SilcIDListData)router;
454 if (sock != sender) {
455 SILC_LOG_DEBUG(("Sending channel message to router for routing"));
457 silc_server_packet_send_to_channel_real(server, sock, &packetdata,
460 data, data_len, FALSE,
465 /* Send the message to clients on the channel's client list. */
466 silc_list_start(channel->user_list);
467 while ((chl = silc_list_get(channel->user_list)) != SILC_LIST_END) {
468 client = chl->client;
470 /* If client has router set it is not locally connected client and
471 we will route the message to the router set in the client. Though,
472 send locally connected server in all cases. */
473 if (server->server_type == SILC_ROUTER && client && client->router &&
474 ((!route && client->router->router == server->id_entry) || route)) {
477 /* Check if we have sent the packet to this route already */
478 for (k = 0; k < routed_count; k++)
479 if (routed[k] == client->router)
481 if (k < routed_count)
484 /* Get data used in packet header encryption, keys and stuff. */
485 sock = (SilcSocketConnection)client->router->connection;
486 idata = (SilcIDListData)client->router;
488 if (sender && sock == sender)
491 /* Send the packet */
492 silc_server_packet_send_to_channel_real(server, sock, &packetdata,
495 data, data_len, FALSE,
498 /* We want to make sure that the packet is routed to same router
499 only once. Mark this route as sent route. */
501 routed = silc_realloc(routed, sizeof(*routed) * (k + 1));
502 routed[k] = client->router;
508 if (client && client->router)
511 /* Send to locally connected client */
514 /* Get data used in packet header encryption, keys and stuff. */
515 sock = (SilcSocketConnection)client->connection;
516 idata = (SilcIDListData)client;
518 if (sender && sock == sender)
521 /* Send the packet */
522 silc_server_packet_send_to_channel_real(server, sock, &packetdata,
525 data, data_len, FALSE,
532 silc_free(packetdata.src_id);
533 silc_free(packetdata.dst_id);
536 /* This checks whether the relayed packet came from router. If it did
537 then we'll need to encrypt it with the channel key. This is called
538 from the silc_server_packet_relay_to_channel. */
541 silc_server_packet_relay_to_channel_encrypt(SilcServer server,
542 SilcSocketConnection sock,
543 SilcChannelEntry channel,
545 unsigned int data_len)
547 /* If we are router and the packet came from router and private key
548 has not been set for the channel then we must encrypt the packet
549 as it was decrypted with the session key shared between us and the
550 router which sent it. This is so, because cells does not share the
552 if (server->server_type == SILC_ROUTER &&
553 sock->type == SILC_SOCKET_TYPE_ROUTER &&
554 !(channel->mode & SILC_CHANNEL_MODE_PRIVKEY) &&
555 channel->channel_key) {
558 uint16 data_len, flags;
560 iv_len = silc_cipher_get_block_len(channel->channel_key);
561 if (channel->iv[0] == '\0')
562 for (i = 0; i < iv_len; i++) channel->iv[i] =
563 silc_rng_get_byte(server->rng);
565 silc_hash_make(server->md5hash, channel->iv, iv_len, channel->iv);
567 /* Encode new payload. This encrypts it also. */
568 SILC_GET16_MSB(flags, data);
569 SILC_GET16_MSB(data_len, data + 2);
570 chp = silc_channel_message_payload_encode(flags, data_len,
573 channel->channel_key,
575 memcpy(data, chp->data, chp->len);
576 silc_buffer_free(chp);
580 /* This routine is explicitly used to relay messages to some channel.
581 Packets sent with this function we have received earlier and are
582 totally encrypted. This just sends the packet to all clients on
583 the channel. If the sender of the packet is someone on the channel
584 the message will not be sent to that client. The SILC Packet header
585 is encrypted with the session key shared between us and the client.
586 MAC is also computed before encrypting the header. Rest of the
587 packet will be untouched. */
589 void silc_server_packet_relay_to_channel(SilcServer server,
590 SilcSocketConnection sender_sock,
591 SilcChannelEntry channel,
593 SilcIdType sender_type,
599 SilcSocketConnection sock = NULL;
600 SilcPacketContext packetdata;
601 SilcClientEntry client = NULL;
602 SilcServerEntry *routed = NULL;
603 SilcChannelClientEntry chl;
604 uint32 routed_count = 0;
605 SilcIDListData idata;
607 SILC_LOG_DEBUG(("Relaying packet to channel"));
609 /* Set the packet context pointers. */
610 packetdata.flags = 0;
611 packetdata.type = SILC_PACKET_CHANNEL_MESSAGE;
612 packetdata.src_id = silc_id_id2str(sender, sender_type);
613 packetdata.src_id_len = silc_id_get_len(sender_type);
614 packetdata.src_id_type = sender_type;
615 packetdata.dst_id = silc_id_id2str(channel->id, SILC_ID_CHANNEL);
616 packetdata.dst_id_len = SILC_ID_CHANNEL_LEN;
617 packetdata.dst_id_type = SILC_ID_CHANNEL;
618 packetdata.padlen = SILC_PACKET_PADLEN((SILC_PACKET_HEADER_LEN +
619 packetdata.src_id_len +
620 packetdata.dst_id_len));
622 /* This encrypts the packet, if needed. It will be encrypted if
623 it came from the router thus it needs to be encrypted with the
624 channel key. If the channel key does not exist, then we know we
625 don't have a single local user on the channel. */
626 silc_server_packet_relay_to_channel_encrypt(server, sender_sock,
630 /* If there are global users in the channel we will send the message
631 first to our router for further routing. */
632 if (server->server_type == SILC_SERVER && !server->standalone &&
633 channel->global_users) {
634 SilcServerEntry router;
636 router = server->router;
638 /* Check that the sender is not our router. */
639 if (sender_sock != (SilcSocketConnection)router->connection) {
641 /* Get data used in packet header encryption, keys and stuff. */
642 sock = (SilcSocketConnection)router->connection;
643 idata = (SilcIDListData)router;
645 SILC_LOG_DEBUG(("Sending channel message to router for routing"));
647 silc_server_packet_send_to_channel_real(server, sock, &packetdata,
650 data, data_len, TRUE,
655 /* Send the message to clients on the channel's client list. */
656 silc_list_start(channel->user_list);
657 while ((chl = silc_list_get(channel->user_list)) != SILC_LIST_END) {
658 client = chl->client;
662 /* If sender is one on the channel do not send it the packet. */
663 if (!found && !SILC_ID_CLIENT_COMPARE(client->id, sender)) {
668 /* If the client has set router it means that it is not locally
669 connected client and we will route the packet further. */
670 if (server->server_type == SILC_ROUTER && client->router) {
673 /* Sender maybe server as well so we want to make sure that
674 we won't send the message to the server it came from. */
675 if (!found && !SILC_ID_SERVER_COMPARE(client->router->id, sender)) {
680 /* Check if we have sent the packet to this route already */
681 for (k = 0; k < routed_count; k++)
682 if (routed[k] == client->router)
684 if (k < routed_count)
687 /* Get data used in packet header encryption, keys and stuff. */
688 sock = (SilcSocketConnection)client->router->connection;
689 idata = (SilcIDListData)client->router;
691 if (sender_sock && sock == sender_sock)
694 SILC_LOG_DEBUG(("Relaying packet to client ID(%s) %s (%s)",
695 silc_id_render(client->id, SILC_ID_CLIENT),
696 sock->hostname, sock->ip));
698 /* We want to make sure that the packet is routed to same router
699 only once. Mark this route as sent route. */
701 routed = silc_realloc(routed, sizeof(*routed) * (k + 1));
702 routed[k] = client->router;
705 /* If the remote connection is router then we'll decrypt the
706 channel message and re-encrypt it with the session key shared
707 between us and the remote router. This is done because the
708 channel keys are cell specific and we have different channel
709 key than the remote router has. */
710 if (sock->type == SILC_SOCKET_TYPE_ROUTER) {
712 /* If private key mode is not set then decrypt the packet
714 if (!(channel->mode & SILC_CHANNEL_MODE_PRIVKEY)) {
715 unsigned char *tmp = silc_calloc(data_len, sizeof(*data));
716 memcpy(tmp, data, data_len);
718 /* Decrypt the channel message (we don't check the MAC) */
719 if (channel->channel_key &&
720 !silc_channel_message_payload_decrypt(tmp, data_len,
721 channel->channel_key,
723 memset(tmp, 0, data_len);
728 /* Now re-encrypt and send it to the router */
729 silc_server_packet_send_srcdest(server, sock,
730 SILC_PACKET_CHANNEL_MESSAGE, 0,
732 channel->id, SILC_ID_CHANNEL,
733 tmp, data_len, force_send);
735 /* Free the copy of the channel message */
736 memset(tmp, 0, data_len);
739 /* Private key mode is set, we don't have the channel key, so
740 just re-encrypt the entire packet and send it to the router. */
741 silc_server_packet_send_srcdest(server, sock,
742 SILC_PACKET_CHANNEL_MESSAGE, 0,
744 channel->id, SILC_ID_CHANNEL,
745 data, data_len, force_send);
750 /* Send the packet (to normal server) */
751 silc_server_packet_send_to_channel_real(server, sock, &packetdata,
754 data, data_len, TRUE,
760 if (client && client->router)
763 /* Get data used in packet header encryption, keys and stuff. */
764 sock = (SilcSocketConnection)client->connection;
765 idata = (SilcIDListData)client;
767 if (sender_sock && sock == sender_sock)
770 SILC_LOG_DEBUG(("Sending packet to client ID(%s) %s (%s)",
771 silc_id_render(client->id, SILC_ID_CLIENT),
772 sock->hostname, sock->ip));
774 /* Send the packet */
775 silc_server_packet_send_to_channel_real(server, sock, &packetdata,
778 data, data_len, TRUE,
783 silc_free(packetdata.src_id);
784 silc_free(packetdata.dst_id);
787 /* This function is used to send packets strictly to all local clients
788 on a particular channel. This is used for example to distribute new
789 channel key to all our locally connected clients on the channel.
790 The packets are always encrypted with the session key shared between
791 the client, this means these are not _to the channel_ but _to the client_
794 void silc_server_packet_send_local_channel(SilcServer server,
795 SilcChannelEntry channel,
797 SilcPacketFlags flags,
802 SilcChannelClientEntry chl;
803 SilcSocketConnection sock = NULL;
805 SILC_LOG_DEBUG(("Start"));
807 /* Send the message to clients on the channel's client list. */
808 silc_list_start(channel->user_list);
809 while ((chl = silc_list_get(channel->user_list)) != SILC_LIST_END) {
810 if (chl->client && !chl->client->router) {
811 sock = (SilcSocketConnection)chl->client->connection;
813 /* Send the packet to the client */
814 silc_server_packet_send_dest(server, sock, type, flags, chl->client->id,
815 SILC_ID_CLIENT, data, data_len,
821 /* Routine used to send (relay, route) private messages to some destination.
822 If the private message key does not exist then the message is re-encrypted,
823 otherwise we just pass it along. This really is not used to send new
824 private messages (as server does not send them) but to relay received
827 void silc_server_send_private_message(SilcServer server,
828 SilcSocketConnection dst_sock,
831 SilcPacketContext *packet)
833 SilcBuffer buffer = packet->buffer;
835 /* Re-encrypt and send if private messge key does not exist */
836 if ((packet->flags & SILC_PACKET_FLAG_PRIVMSG_KEY) == FALSE) {
838 silc_buffer_push(buffer, SILC_PACKET_HEADER_LEN + packet->src_id_len
839 + packet->dst_id_len + packet->padlen);
840 silc_packet_send_prepare(dst_sock, 0, 0, buffer->len);
841 silc_buffer_put(dst_sock->outbuf, buffer->data, buffer->len);
843 /* Re-encrypt packet */
844 silc_packet_encrypt(cipher, hmac, dst_sock->outbuf, buffer->len);
846 /* Send the packet */
847 silc_server_packet_send_real(server, dst_sock, FALSE);
850 /* Key exist so encrypt just header and send it */
851 silc_buffer_push(buffer, SILC_PACKET_HEADER_LEN + packet->src_id_len
852 + packet->dst_id_len + packet->padlen);
853 silc_packet_send_prepare(dst_sock, 0, 0, buffer->len);
854 silc_buffer_put(dst_sock->outbuf, buffer->data, buffer->len);
857 silc_packet_encrypt(cipher, hmac, dst_sock->outbuf,
858 SILC_PACKET_HEADER_LEN + packet->src_id_len +
859 packet->dst_id_len + packet->padlen);
861 silc_server_packet_send_real(server, dst_sock, FALSE);
865 /* Sends current motd to client */
867 void silc_server_send_motd(SilcServer server,
868 SilcSocketConnection sock)
873 if (server->config && server->config->motd &&
874 server->config->motd->motd_file) {
876 motd = silc_file_read(server->config->motd->motd_file, &motd_len);
880 silc_server_send_notify(server, sock, FALSE, SILC_NOTIFY_TYPE_MOTD, 1,
886 /* Sends error message. Error messages may or may not have any
889 void silc_server_send_error(SilcServer server,
890 SilcSocketConnection sock,
891 const char *fmt, ...)
894 unsigned char buf[4096];
896 memset(buf, 0, sizeof(buf));
898 vsprintf(buf, fmt, ap);
901 silc_server_packet_send(server, sock, SILC_PACKET_ERROR, 0,
902 buf, strlen(buf), FALSE);
905 /* Sends notify message. If format is TRUE the variable arguments are
906 formatted and the formatted string is sent as argument payload. If it is
907 FALSE then each argument is sent as separate argument and their format
908 in the argument list must be { argument data, argument length }. */
910 void silc_server_send_notify(SilcServer server,
911 SilcSocketConnection sock,
921 packet = silc_notify_payload_encode(type, argc, ap);
922 silc_server_packet_send(server, sock, SILC_PACKET_NOTIFY,
923 broadcast ? SILC_PACKET_FLAG_BROADCAST : 0,
924 packet->data, packet->len, FALSE);
925 silc_buffer_free(packet);
928 /* Sends notify message and gets the arguments from the `args' Argument
931 void silc_server_send_notify_args(SilcServer server,
932 SilcSocketConnection sock,
940 packet = silc_notify_payload_encode_args(type, argc, args);
941 silc_server_packet_send(server, sock, SILC_PACKET_NOTIFY,
942 broadcast ? SILC_PACKET_FLAG_BROADCAST : 0,
943 packet->data, packet->len, FALSE);
944 silc_buffer_free(packet);
947 /* Send CHANNEL_CHANGE notify type. This tells the receiver to replace the
948 `old_id' with the `new_id'. */
950 void silc_server_send_notify_channel_change(SilcServer server,
951 SilcSocketConnection sock,
953 SilcChannelID *old_id,
954 SilcChannelID *new_id,
957 SilcBuffer idp1, idp2;
959 idp1 = silc_id_payload_encode((void *)old_id, SILC_ID_CHANNEL);
960 idp2 = silc_id_payload_encode((void *)new_id, SILC_ID_CHANNEL);
962 silc_server_send_notify(server, sock, broadcast,
963 SILC_NOTIFY_TYPE_CHANNEL_CHANGE,
964 2, idp1->data, idp1->len, idp2->data, idp2->len);
965 silc_buffer_free(idp1);
966 silc_buffer_free(idp2);
969 /* Send NICK_CHANGE notify type. This tells the receiver to replace the
970 `old_id' with the `new_id'. */
972 void silc_server_send_notify_nick_change(SilcServer server,
973 SilcSocketConnection sock,
975 SilcClientID *old_id,
976 SilcClientID *new_id,
979 SilcBuffer idp1, idp2;
981 idp1 = silc_id_payload_encode((void *)old_id, SILC_ID_CLIENT);
982 idp2 = silc_id_payload_encode((void *)new_id, SILC_ID_CLIENT);
984 silc_server_send_notify(server, sock, broadcast,
985 SILC_NOTIFY_TYPE_NICK_CHANGE,
986 2, idp1->data, idp1->len, idp2->data, idp2->len);
987 silc_buffer_free(idp1);
988 silc_buffer_free(idp2);
991 /* Sends JOIN notify type. This tells that new client by `client_id' ID
992 has joined to the `channel'. */
994 void silc_server_send_notify_join(SilcServer server,
995 SilcSocketConnection sock,
997 SilcChannelEntry channel,
998 SilcClientID *client_id,
999 uint32 client_id_len)
1001 SilcBuffer idp1, idp2;
1003 idp1 = silc_id_payload_encode((void *)client_id, SILC_ID_CLIENT);
1004 idp2 = silc_id_payload_encode((void *)channel->id, SILC_ID_CHANNEL);
1005 silc_server_send_notify(server, sock, broadcast, SILC_NOTIFY_TYPE_JOIN,
1006 2, idp1->data, idp1->len,
1007 idp2->data, idp2->len);
1008 silc_buffer_free(idp1);
1009 silc_buffer_free(idp2);
1012 /* Sends LEAVE notify type. This tells that `client_id' has left the
1013 `channel'. The Notify packet is always destined to the channel. */
1015 void silc_server_send_notify_leave(SilcServer server,
1016 SilcSocketConnection sock,
1018 SilcChannelEntry channel,
1019 SilcClientID *client_id,
1020 uint32 client_id_len)
1024 idp = silc_id_payload_encode((void *)client_id, SILC_ID_CLIENT);
1025 silc_server_send_notify_dest(server, sock, broadcast, (void *)channel->id,
1026 SILC_ID_CHANNEL, SILC_NOTIFY_TYPE_LEAVE,
1027 1, idp->data, idp->len);
1028 silc_buffer_free(idp);
1031 /* Sends CMODE_CHANGE notify type. This tells that `client_id' changed the
1032 `channel' mode to `mode. The Notify packet is always destined to
1035 void silc_server_send_notify_cmode(SilcServer server,
1036 SilcSocketConnection sock,
1038 SilcChannelEntry channel,
1040 void *id, SilcIdType id_type,
1042 char *cipher, char *hmac)
1045 unsigned char mode[4];
1047 idp = silc_id_payload_encode((void *)id, id_type);
1048 SILC_PUT32_MSB(mode_mask, mode);
1050 silc_server_send_notify_dest(server, sock, broadcast, (void *)channel->id,
1051 SILC_ID_CHANNEL, SILC_NOTIFY_TYPE_CMODE_CHANGE,
1052 4, idp->data, idp->len,
1054 cipher, cipher ? strlen(cipher) : 0,
1055 hmac, hmac ? strlen(hmac) : 0);
1056 silc_buffer_free(idp);
1059 /* Sends CUMODE_CHANGE notify type. This tells that `client_id' changed the
1060 `target' client's mode on `channel'. The Notify packet is always
1061 destined to the channel. */
1063 void silc_server_send_notify_cumode(SilcServer server,
1064 SilcSocketConnection sock,
1066 SilcChannelEntry channel,
1068 SilcClientID *client_id,
1069 uint32 client_id_len,
1070 SilcClientID *target,
1073 SilcBuffer idp1, idp2;
1074 unsigned char mode[4];
1076 idp1 = silc_id_payload_encode((void *)client_id, SILC_ID_CLIENT);
1077 idp2 = silc_id_payload_encode((void *)target, SILC_ID_CLIENT);
1078 SILC_PUT32_MSB(mode_mask, mode);
1080 silc_server_send_notify_dest(server, sock, broadcast, (void *)channel->id,
1082 SILC_NOTIFY_TYPE_CUMODE_CHANGE, 3,
1083 idp1->data, idp1->len,
1085 idp2->data, idp2->len);
1086 silc_buffer_free(idp1);
1087 silc_buffer_free(idp2);
1090 /* Sends SIGNOFF notify type. This tells that `client_id' client has
1091 left SILC network. This function is used only between server and router
1092 traffic. This is not used to send the notify to the channel for
1093 client. The `message may be NULL. */
1095 void silc_server_send_notify_signoff(SilcServer server,
1096 SilcSocketConnection sock,
1098 SilcClientID *client_id,
1099 uint32 client_id_len,
1104 idp = silc_id_payload_encode((void *)client_id, SILC_ID_CLIENT);
1105 silc_server_send_notify(server, sock, broadcast,
1106 SILC_NOTIFY_TYPE_SIGNOFF,
1107 message ? 2 : 1, idp->data, idp->len,
1108 message, message ? strlen(message): 0);
1109 silc_buffer_free(idp);
1112 /* Sends TOPIC_SET notify type. This tells that `client_id' changed
1113 the `channel's topic to `topic'. The Notify packet is always destined
1114 to the channel. This function is used to send the topic set notifies
1117 void silc_server_send_notify_topic_set(SilcServer server,
1118 SilcSocketConnection sock,
1120 SilcChannelEntry channel,
1121 SilcClientID *client_id,
1122 uint32 client_id_len,
1127 idp = silc_id_payload_encode((void *)client_id, SILC_ID_CLIENT);
1128 silc_server_send_notify(server, sock, broadcast,
1129 SILC_NOTIFY_TYPE_SERVER_SIGNOFF,
1131 idp->data, idp->len,
1132 topic, topic ? strlen(topic) : 0);
1133 silc_buffer_free(idp);
1136 /* Send KICKED notify type. This tells that the `client_id' on `channel'
1137 was kicked off the channel. The `comment' may indicate the reason
1138 for the kicking. This function is used only between server and router
1141 void silc_server_send_notify_kicked(SilcServer server,
1142 SilcSocketConnection sock,
1144 SilcChannelEntry channel,
1145 SilcClientID *client_id,
1146 uint32 client_id_len,
1151 idp = silc_id_payload_encode((void *)client_id, SILC_ID_CLIENT);
1152 silc_server_send_notify_dest(server, sock, broadcast, (void *)channel->id,
1153 SILC_ID_CHANNEL, SILC_NOTIFY_TYPE_KICKED,
1154 comment ? 2 : 1, idp->data, idp->len,
1155 comment, comment ? strlen(comment) : 0);
1156 silc_buffer_free(idp);
1159 /* Send KILLED notify type. This tells that the `client_id' client was
1160 killed from the network. The `comment' may indicate the reason
1163 void silc_server_send_notify_killed(SilcServer server,
1164 SilcSocketConnection sock,
1166 SilcClientID *client_id,
1167 uint32 client_id_len,
1172 idp = silc_id_payload_encode((void *)client_id, SILC_ID_CLIENT);
1173 silc_server_send_notify_dest(server, sock, broadcast, (void *)client_id,
1174 SILC_ID_CLIENT, SILC_NOTIFY_TYPE_KILLED,
1175 comment ? 2 : 1, idp->data, idp->len,
1176 comment, comment ? strlen(comment) : 0);
1177 silc_buffer_free(idp);
1180 /* Sends UMODE_CHANGE notify type. This tells that `client_id' client's
1181 user mode in the SILC Network was changed. This function is used to
1182 send the packet between routers as broadcast packet. */
1184 void silc_server_send_notify_umode(SilcServer server,
1185 SilcSocketConnection sock,
1187 SilcClientID *client_id,
1188 uint32 client_id_len,
1192 unsigned char mode[4];
1194 idp = silc_id_payload_encode((void *)client_id, SILC_ID_CLIENT);
1195 SILC_PUT32_MSB(mode_mask, mode);
1197 silc_server_send_notify(server, sock, broadcast,
1198 SILC_NOTIFY_TYPE_UMODE_CHANGE, 2,
1199 idp->data, idp->len,
1201 silc_buffer_free(idp);
1204 /* Sends BAN notify type. This tells that ban has been either `add'ed
1205 or `del'eted on the `channel. This function is used to send the packet
1206 between routers as broadcast packet. */
1208 void silc_server_send_notify_ban(SilcServer server,
1209 SilcSocketConnection sock,
1211 SilcChannelEntry channel,
1212 char *add, char *del)
1216 idp = silc_id_payload_encode((void *)channel->id, SILC_ID_CHANNEL);
1217 silc_server_send_notify(server, sock, broadcast,
1218 SILC_NOTIFY_TYPE_BAN, 3,
1219 idp->data, idp->len,
1220 add, add ? strlen(add) : 0,
1221 del, del ? strlen(del) : 0);
1222 silc_buffer_free(idp);
1225 /* Sends INVITE notify type. This tells that invite has been either `add'ed
1226 or `del'eted on the `channel. The sender of the invite is the `client_id'.
1227 This function is used to send the packet between routers as broadcast
1230 void silc_server_send_notify_invite(SilcServer server,
1231 SilcSocketConnection sock,
1233 SilcChannelEntry channel,
1234 SilcClientID *client_id,
1235 uint32 client_id_len,
1236 char *add, char *del)
1238 SilcBuffer idp, idp2;
1240 idp = silc_id_payload_encode((void *)channel->id, SILC_ID_CHANNEL);
1241 idp2 = silc_id_payload_encode((void *)client_id, SILC_ID_CLIENT);
1242 silc_server_send_notify(server, sock, broadcast,
1243 SILC_NOTIFY_TYPE_INVITE, 5,
1244 idp->data, idp->len,
1245 channel->channel_name, strlen(channel->channel_name),
1246 idp2->data, idp2->len,
1247 add, add ? strlen(add) : 0,
1248 del, del ? strlen(del) : 0);
1249 silc_buffer_free(idp);
1250 silc_buffer_free(idp2);
1253 /* Sends notify message destined to specific entity. */
1255 void silc_server_send_notify_dest(SilcServer server,
1256 SilcSocketConnection sock,
1259 SilcIdType dest_id_type,
1260 SilcNotifyType type,
1268 packet = silc_notify_payload_encode(type, argc, ap);
1269 silc_server_packet_send_dest(server, sock, SILC_PACKET_NOTIFY, 0,
1270 dest_id, dest_id_type,
1271 packet->data, packet->len, FALSE);
1272 silc_buffer_free(packet);
1275 /* Sends notify message to a channel. The notify message sent is
1276 distributed to all clients on the channel. If `route_notify' is TRUE
1277 then the notify may be routed to primary route or to some other routers.
1278 If FALSE it is assured that the notify is sent only locally. If `sender'
1279 is provided then the packet is not sent to that connection since it
1280 originally came from it. */
1282 void silc_server_send_notify_to_channel(SilcServer server,
1283 SilcSocketConnection sender,
1284 SilcChannelEntry channel,
1285 unsigned char route_notify,
1286 SilcNotifyType type,
1294 packet = silc_notify_payload_encode(type, argc, ap);
1295 silc_server_packet_send_to_channel(server, sender, channel,
1296 SILC_PACKET_NOTIFY, route_notify,
1297 packet->data, packet->len, FALSE);
1298 silc_buffer_free(packet);
1301 /* Send notify message to all channels the client has joined. It is quaranteed
1302 that the message is sent only once to a client (ie. if a client is joined
1303 on two same channel it will receive only one notify message). Also, this
1304 sends only to local clients (locally connected if we are server, and to
1305 local servers if we are router). If `sender' is provided the packet is
1306 not sent to that client at all. */
1308 void silc_server_send_notify_on_channels(SilcServer server,
1309 SilcClientEntry sender,
1310 SilcClientEntry client,
1311 SilcNotifyType type,
1315 SilcSocketConnection sock = NULL;
1316 SilcPacketContext packetdata;
1318 SilcClientEntry *sent_clients = NULL;
1319 uint32 sent_clients_count = 0;
1320 SilcServerEntry *routed = NULL;
1321 uint32 routed_count = 0;
1322 SilcChannelEntry channel;
1323 SilcChannelClientEntry chl, chl2;
1324 SilcIDListData idata;
1326 unsigned char *data;
1328 int force_send = FALSE;
1331 SILC_LOG_DEBUG(("Start"));
1333 if (!silc_list_count(client->channels))
1337 packet = silc_notify_payload_encode(type, argc, ap);
1338 data = packet->data;
1339 data_len = packet->len;
1341 /* Set the packet context pointers. */
1342 packetdata.flags = 0;
1343 packetdata.type = SILC_PACKET_NOTIFY;
1344 packetdata.src_id = silc_id_id2str(server->id, SILC_ID_SERVER);
1345 packetdata.src_id_len = SILC_ID_SERVER_LEN;
1346 packetdata.src_id_type = SILC_ID_SERVER;
1348 silc_list_start(client->channels);
1349 while ((chl = silc_list_get(client->channels)) != SILC_LIST_END) {
1350 channel = chl->channel;
1352 /* Send the message to all clients on the channel's client list. */
1353 silc_list_start(channel->user_list);
1354 while ((chl2 = silc_list_get(channel->user_list)) != SILC_LIST_END) {
1357 if (sender && c == sender)
1360 /* Check if we have sent the packet to this client already */
1361 for (k = 0; k < sent_clients_count; k++)
1362 if (sent_clients[k] == c)
1364 if (k < sent_clients_count)
1367 /* If we are router and if this client has router set it is not
1368 locally connected client and we will route the message to the
1369 router set in the client. */
1370 if (c && c->router && server->server_type == SILC_ROUTER) {
1371 /* Check if we have sent the packet to this route already */
1372 for (k = 0; k < routed_count; k++)
1373 if (routed[k] == c->router)
1375 if (k < routed_count)
1378 /* Get data used in packet header encryption, keys and stuff. */
1379 sock = (SilcSocketConnection)c->router->connection;
1380 idata = (SilcIDListData)c->router;
1382 packetdata.dst_id = silc_id_id2str(c->router->id, SILC_ID_SERVER);
1383 packetdata.dst_id_len = SILC_ID_SERVER_LEN;
1384 packetdata.dst_id_type = SILC_ID_SERVER;
1385 packetdata.truelen = data_len + SILC_PACKET_HEADER_LEN +
1386 packetdata.src_id_len + packetdata.dst_id_len;
1387 packetdata.padlen = SILC_PACKET_PADLEN(packetdata.truelen);
1389 /* Send the packet */
1390 silc_server_packet_send_to_channel_real(server, sock, &packetdata,
1393 data, data_len, FALSE,
1396 silc_free(packetdata.dst_id);
1398 /* We want to make sure that the packet is routed to same router
1399 only once. Mark this route as sent route. */
1401 routed = silc_realloc(routed, sizeof(*routed) * (k + 1));
1402 routed[k] = c->router;
1411 /* Send to locally connected client */
1414 /* Get data used in packet header encryption, keys and stuff. */
1415 sock = (SilcSocketConnection)c->connection;
1416 idata = (SilcIDListData)c;
1418 packetdata.dst_id = silc_id_id2str(c->id, SILC_ID_CLIENT);
1419 packetdata.dst_id_len = SILC_ID_CLIENT_LEN;
1420 packetdata.dst_id_type = SILC_ID_CLIENT;
1421 packetdata.truelen = data_len + SILC_PACKET_HEADER_LEN +
1422 packetdata.src_id_len + packetdata.dst_id_len;
1423 packetdata.padlen = SILC_PACKET_PADLEN(packetdata.truelen);
1425 /* Send the packet */
1426 silc_server_packet_send_to_channel_real(server, sock, &packetdata,
1429 data, data_len, FALSE,
1432 silc_free(packetdata.dst_id);
1434 /* Make sure that we send the notify only once per client. */
1435 sent_clients = silc_realloc(sent_clients, sizeof(*sent_clients) *
1436 (sent_clients_count + 1));
1437 sent_clients[sent_clients_count] = c;
1438 sent_clients_count++;
1445 if (sent_clients_count)
1446 silc_free(sent_clients);
1447 silc_free(packetdata.src_id);
1450 /* Sends New ID Payload to remote end. The packet is used to distribute
1451 information about new registered clients, servers, channel etc. usually
1452 to routers so that they can keep these information up to date.
1453 If the argument `broadcast' is TRUE then the packet is sent as
1454 broadcast packet. */
1456 void silc_server_send_new_id(SilcServer server,
1457 SilcSocketConnection sock,
1459 void *id, SilcIdType id_type,
1464 SILC_LOG_DEBUG(("Start"));
1466 idp = silc_id_payload_encode(id, id_type);
1467 silc_server_packet_send(server, sock, SILC_PACKET_NEW_ID,
1468 broadcast ? SILC_PACKET_FLAG_BROADCAST : 0,
1469 idp->data, idp->len, FALSE);
1470 silc_buffer_free(idp);
1473 /* Send New Channel Payload to notify about newly created channel in the
1474 SILC network. Normal server nevers sends this packet. Router uses this
1475 to notify other routers in the network about new channel. This packet
1478 void silc_server_send_new_channel(SilcServer server,
1479 SilcSocketConnection sock,
1483 uint32 channel_id_len,
1488 uint32 name_len = strlen(channel_name);
1490 SILC_LOG_DEBUG(("Start"));
1492 cid = silc_id_id2str(channel_id, SILC_ID_CHANNEL);
1496 /* Encode the channel payload */
1497 packet = silc_channel_payload_encode(channel_name, name_len,
1498 cid, channel_id_len, mode);
1500 silc_server_packet_send(server, sock, SILC_PACKET_NEW_CHANNEL,
1501 broadcast ? SILC_PACKET_FLAG_BROADCAST : 0,
1502 packet->data, packet->len, FALSE);
1505 silc_buffer_free(packet);
1508 /* Send Channel Key payload to distribute the new channel key. Normal server
1509 sends this to router when new client joins to existing channel. Router
1510 sends this to the local server who sent the join command in case where
1511 the channel did not exist yet. Both normal and router servers uses this
1512 also to send this to locally connected clients on the channel. This
1513 must not be broadcasted packet. Routers do not send this to each other.
1514 If `sender is provided then the packet is not sent to that connection since
1515 it originally came from it. */
1517 void silc_server_send_channel_key(SilcServer server,
1518 SilcSocketConnection sender,
1519 SilcChannelEntry channel,
1520 unsigned char route)
1523 unsigned char *chid;
1526 SILC_LOG_DEBUG(("Start"));
1528 chid = silc_id_id2str(channel->id, SILC_ID_CHANNEL);
1532 /* Encode channel key packet */
1533 tmp_len = strlen(channel->channel_key->cipher->name);
1534 packet = silc_channel_key_payload_encode(SILC_ID_CHANNEL_LEN, chid, tmp_len,
1535 channel->channel_key->cipher->name,
1536 channel->key_len / 8, channel->key);
1538 silc_server_packet_send_to_channel(server, sender, channel,
1539 SILC_PACKET_CHANNEL_KEY,
1540 route, packet->data, packet->len, FALSE);
1541 silc_buffer_free(packet);
1545 /* Generic function to send any command. The arguments must be sent already
1546 encoded into correct form in correct order. */
1548 void silc_server_send_command(SilcServer server,
1549 SilcSocketConnection sock,
1550 SilcCommand command,
1558 packet = silc_command_payload_encode_vap(command, 0, argc, ap);
1559 silc_server_packet_send(server, sock, SILC_PACKET_COMMAND, 0,
1560 packet->data, packet->len, TRUE);
1561 silc_buffer_free(packet);
1564 /* Send the heartbeat packet. */
1566 void silc_server_send_heartbeat(SilcServer server,
1567 SilcSocketConnection sock)
1569 silc_server_packet_send(server, sock, SILC_PACKET_HEARTBEAT, 0,
1573 /* Generic function to relay packet we've received. This is used to relay
1574 packets to a client but generally can be used to other purposes as well. */
1576 void silc_server_relay_packet(SilcServer server,
1577 SilcSocketConnection dst_sock,
1580 SilcPacketContext *packet,
1583 silc_buffer_push(packet->buffer, SILC_PACKET_HEADER_LEN + packet->src_id_len
1584 + packet->dst_id_len + packet->padlen);
1586 silc_packet_send_prepare(dst_sock, 0, 0, packet->buffer->len);
1587 silc_buffer_put(dst_sock->outbuf, packet->buffer->data, packet->buffer->len);
1589 /* Re-encrypt packet */
1590 silc_packet_encrypt(cipher, hmac, dst_sock->outbuf, packet->buffer->len);
1592 /* Send the packet */
1593 silc_server_packet_send_real(server, dst_sock, force_send);
1595 silc_buffer_pull(packet->buffer, SILC_PACKET_HEADER_LEN + packet->src_id_len
1596 + packet->dst_id_len + packet->padlen);
1599 /* Routine used to send the connection authentication packet. */
1601 void silc_server_send_connection_auth_request(SilcServer server,
1602 SilcSocketConnection sock,
1604 SilcAuthMethod auth_meth)
1608 packet = silc_buffer_alloc(4);
1609 silc_buffer_pull_tail(packet, SILC_BUFFER_END(packet));
1610 silc_buffer_format(packet,
1611 SILC_STR_UI_SHORT(conn_type),
1612 SILC_STR_UI_SHORT(auth_meth),
1615 silc_server_packet_send(server, sock, SILC_PACKET_CONNECTION_AUTH_REQUEST,
1616 0, packet->data, packet->len, FALSE);
1617 silc_buffer_free(packet);