5 Author: Pekka Riikonen <priikone@silcnet.org>
7 Copyright (C) 1997 - 2007 Pekka Riikonen
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; version 2 of the License.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
21 #include "serverincludes.h"
22 #include "server_internal.h"
24 static int silc_server_is_registered(SilcServer server,
25 SilcPacketStream sock,
26 SilcServerCommandContext cmd,
29 silc_server_command_send_status_reply(SilcServerCommandContext cmd,
34 silc_server_command_send_status_data(SilcServerCommandContext cmd,
39 const unsigned char *arg,
42 silc_server_command_pending_error_check(SilcServerCommandContext cmd,
43 SilcServerCommandReplyContext cmdr,
45 SILC_TASK_CALLBACK(silc_server_command_process_timeout);
47 /* Server command list. */
48 SilcServerCommand silc_command_list[] =
50 SILC_SERVER_CMD(whois, WHOIS, SILC_CF_LAG | SILC_CF_REG),
51 SILC_SERVER_CMD(whowas, WHOWAS, SILC_CF_LAG | SILC_CF_REG),
52 SILC_SERVER_CMD(identify, IDENTIFY, SILC_CF_LAG | SILC_CF_REG),
53 SILC_SERVER_CMD(nick, NICK, SILC_CF_LAG_STRICT | SILC_CF_REG),
54 SILC_SERVER_CMD(list, LIST, SILC_CF_LAG_STRICT | SILC_CF_REG),
55 SILC_SERVER_CMD(topic, TOPIC, SILC_CF_LAG | SILC_CF_REG),
56 SILC_SERVER_CMD(invite, INVITE, SILC_CF_LAG | SILC_CF_REG),
57 SILC_SERVER_CMD(quit, QUIT, SILC_CF_LAG | SILC_CF_REG),
58 SILC_SERVER_CMD(kill, KILL, SILC_CF_LAG_STRICT | SILC_CF_REG | SILC_CF_OPER),
59 SILC_SERVER_CMD(info, INFO, SILC_CF_LAG | SILC_CF_REG),
60 SILC_SERVER_CMD(stats, STATS, SILC_CF_LAG | SILC_CF_REG),
61 SILC_SERVER_CMD(ping, PING, SILC_CF_LAG | SILC_CF_REG),
62 SILC_SERVER_CMD(oper, OPER, SILC_CF_LAG | SILC_CF_REG | SILC_CF_OPER),
63 SILC_SERVER_CMD(join, JOIN, SILC_CF_LAG_STRICT | SILC_CF_REG),
64 SILC_SERVER_CMD(motd, MOTD, SILC_CF_LAG | SILC_CF_REG),
65 SILC_SERVER_CMD(umode, UMODE, SILC_CF_LAG | SILC_CF_REG),
66 SILC_SERVER_CMD(cmode, CMODE, SILC_CF_LAG_STRICT | SILC_CF_REG),
67 SILC_SERVER_CMD(cumode, CUMODE, SILC_CF_LAG | SILC_CF_REG),
68 SILC_SERVER_CMD(kick, KICK, SILC_CF_LAG_STRICT | SILC_CF_REG),
69 SILC_SERVER_CMD(ban, BAN, SILC_CF_LAG_STRICT | SILC_CF_REG),
70 SILC_SERVER_CMD(detach, DETACH, SILC_CF_LAG_STRICT | SILC_CF_REG),
71 SILC_SERVER_CMD(watch, WATCH, SILC_CF_LAG | SILC_CF_REG),
72 SILC_SERVER_CMD(silcoper, SILCOPER,
73 SILC_CF_LAG | SILC_CF_REG | SILC_CF_SILC_OPER),
74 SILC_SERVER_CMD(leave, LEAVE, SILC_CF_LAG_STRICT | SILC_CF_REG),
75 SILC_SERVER_CMD(users, USERS, SILC_CF_LAG | SILC_CF_REG),
76 SILC_SERVER_CMD(getkey, GETKEY, SILC_CF_LAG | SILC_CF_REG),
77 SILC_SERVER_CMD(service, SERVICE, SILC_CF_LAG_STRICT | SILC_CF_REG),
79 SILC_SERVER_CMD(connect, PRIV_CONNECT,
80 SILC_CF_LAG | SILC_CF_REG | SILC_CF_OPER),
81 SILC_SERVER_CMD(close, PRIV_CLOSE,
82 SILC_CF_LAG | SILC_CF_REG | SILC_CF_OPER),
83 SILC_SERVER_CMD(shutdown, PRIV_SHUTDOWN, SILC_CF_LAG | SILC_CF_REG |
89 /* Performs several checks to the command. It first checks whether this
90 command was called as pending command callback. If it was then it checks
91 whether error occurred in the command reply where the pending command
94 It also checks that the requested command includes correct amount
96 #define SILC_SERVER_COMMAND_CHECK(command, context, min, max) \
100 if (silc_server_command_pending_error_check(cmd, context2, command)) { \
101 SILC_LOG_DEBUG(("Error occurred in command reply, command not called")); \
102 silc_server_command_free(cmd); \
106 _argc = silc_argument_get_arg_num(cmd->args); \
108 SILC_LOG_DEBUG(("Not enough parameters in command")); \
109 silc_server_command_send_status_reply(cmd, command, \
110 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS, \
112 silc_server_command_free(cmd); \
116 SILC_LOG_DEBUG(("Too many parameters in command")); \
117 silc_server_command_send_status_reply(cmd, command, \
118 SILC_STATUS_ERR_TOO_MANY_PARAMS, \
120 silc_server_command_free(cmd); \
125 /* Returns TRUE if the connection is registered. Unregistered connections
126 usually cannot send commands hence the check. */
128 static int silc_server_is_registered(SilcServer server,
129 SilcPacketStream sock,
130 SilcServerCommandContext cmd,
133 SilcIDListData idata = silc_packet_get_context(sock);
138 if (idata->status & SILC_IDLIST_STATUS_REGISTERED)
141 silc_server_command_send_status_reply(cmd, command,
142 SILC_STATUS_ERR_NOT_REGISTERED, 0);
146 /* Internal context to hold data when executed command with timeout. */
148 SilcServerCommandContext ctx;
149 SilcServerCommand *cmd;
150 } *SilcServerCommandTimeout;
152 /* Timeout callback to process commands with timeout for client. Client's
153 commands are always executed with timeout. */
155 SILC_TASK_CALLBACK(silc_server_command_process_timeout)
157 SilcServerCommandTimeout timeout = (SilcServerCommandTimeout)context;
158 SilcClientEntry client = silc_packet_get_context(timeout->ctx->sock);
161 SILC_LOG_DEBUG(("Client entry is invalid"));
162 silc_server_command_free(timeout->ctx);
167 /* Update access time */
168 client->last_command = time(NULL);
170 if (!(timeout->cmd->flags & SILC_CF_REG)) {
171 SILC_LOG_DEBUG(("Calling %s command",
172 silc_get_command_name(timeout->cmd->cmd)));
173 timeout->cmd->cb(timeout->ctx, NULL);
174 } else if (silc_server_is_registered(timeout->ctx->server,
177 timeout->cmd->cmd)) {
178 SILC_LOG_DEBUG(("Calling %s command",
179 silc_get_command_name(timeout->cmd->cmd)));
180 timeout->cmd->cb(timeout->ctx, NULL);
182 SILC_LOG_DEBUG(("Client is not registered"));
183 silc_server_command_free(timeout->ctx);
189 /* Processes received command packet. */
191 void silc_server_command_process(SilcServer server,
192 SilcPacketStream sock,
195 SilcIDListData idata = silc_packet_get_context(sock);
196 SilcServerCommandContext ctx;
197 SilcServerCommand *cmd;
203 /* Allocate command context. This must be free'd by the
204 command routine receiving it. */
205 ctx = silc_server_command_alloc();
206 ctx->server = server;
208 ctx->packet = packet; /* Save original packet */
209 silc_packet_stream_ref(sock);
211 /* Parse the command payload in the packet */
212 ctx->payload = silc_command_payload_parse(packet->buffer.data,
213 silc_buffer_len(&packet->buffer));
215 SILC_LOG_ERROR(("Bad command payload"));
216 silc_packet_free(packet);
217 silc_packet_stream_unref(ctx->sock);
221 ctx->args = silc_command_get_args(ctx->payload);
223 /* Get the command */
224 command = silc_command_get(ctx->payload);
225 for (cmd = silc_command_list; cmd->cb; cmd++)
226 if (cmd->cmd == command)
229 if (!cmd || !cmd->cb) {
230 SILC_LOG_DEBUG(("Unknown command %d", command));
231 silc_server_command_send_status_reply(ctx, command,
232 SILC_STATUS_ERR_UNKNOWN_COMMAND, 0);
233 silc_packet_free(packet);
234 silc_packet_stream_unref(ctx->sock);
239 /* Execute client's commands always with timeout. Normally they are
240 executed with zero (0) timeout but if client is sending command more
241 frequently than once in 2 seconds, then the timeout may be 0 to 2
243 if (idata->conn_type == SILC_CONN_CLIENT) {
244 SilcClientEntry client = silc_packet_get_context(sock);
245 SilcServerCommandTimeout timeout;
248 timeout = silc_calloc(1, sizeof(*timeout));
252 if (client->last_command && (time(NULL) - client->last_command) < 2) {
253 client->fast_command++;
256 if (client->fast_command - 2 <= 0)
257 client->fast_command = 0;
259 client->fast_command -= 2;
263 if (!fast && ((cmd->flags & SILC_CF_LAG_STRICT) ||
264 (client->fast_command > 5 && cmd->flags & SILC_CF_LAG)))
265 silc_schedule_task_add_timeout(
267 silc_server_command_process_timeout, timeout,
268 (client->fast_command < 3 ? 0 :
269 2 - (time(NULL) - client->last_command)),
270 (client->fast_command < 3 ? 200000 : 0));
272 silc_schedule_task_add_timeout(server->schedule,
273 silc_server_command_process_timeout,
278 /* Execute for server */
280 if (!(cmd->flags & SILC_CF_REG)) {
281 SILC_LOG_DEBUG(("Calling %s command", silc_get_command_name(cmd->cmd)));
283 } else if (silc_server_is_registered(server, sock, ctx, cmd->cmd)) {
284 SILC_LOG_DEBUG(("Calling %s command", silc_get_command_name(cmd->cmd)));
287 SILC_LOG_DEBUG(("Server is not registered"));
288 silc_server_command_free(ctx);
292 /* Allocate Command Context */
294 SilcServerCommandContext silc_server_command_alloc()
296 SilcServerCommandContext ctx = silc_calloc(1, sizeof(*ctx));
301 /* Free's the command context allocated before executing the command */
303 void silc_server_command_free(SilcServerCommandContext ctx)
306 SILC_LOG_DEBUG(("Command context %p refcnt %d->%d", ctx, ctx->users + 1,
308 if (ctx->users < 1) {
310 silc_command_payload_free(ctx->payload);
312 silc_packet_free(ctx->packet);
314 silc_packet_stream_unref(ctx->sock);
319 /* Duplicate Command Context by adding reference counter. The context won't
320 be free'd untill it hits zero. */
322 SilcServerCommandContext
323 silc_server_command_dup(SilcServerCommandContext ctx)
326 SILC_LOG_DEBUG(("Command context %p refcnt %d->%d", ctx, ctx->users - 1,
331 /* Timeout for pending command. If reply to pending command never arrives
332 this is called to free resources. */
334 SILC_TASK_CALLBACK(silc_server_command_pending_timeout)
336 SilcServer server = app_context;
337 SilcServerCommandPending *reply = context;
338 SilcServerCommandReplyContext cmdr;
342 SILC_LOG_DEBUG(("Timeout pending command"));
344 /* Allocate temporary and bogus command reply context */
345 cmdr = silc_calloc(1, sizeof(*cmdr));
346 cmdr->server = server;
347 cmdr->ident = reply->ident;
349 /* Check for pending commands and mark to be exeucted */
351 silc_server_command_pending_check(server, reply->reply_cmd,
352 reply->ident, &cmdr->callbacks_count);
354 /* Create bogus command reply with an error inside */
356 silc_command_reply_payload_encode_va(reply->reply_cmd ? reply->reply_cmd :
357 SILC_COMMAND_RESERVED,
358 SILC_STATUS_ERR_TIMEDOUT, 0,
360 cmdr->payload = silc_command_payload_parse(tmpreply->data,
361 silc_buffer_len(tmpreply));
362 silc_buffer_free(tmpreply);
364 /* Call all callbacks. Same as SILC_SERVER_PENDING_EXEC macro. */
365 for (i = 0; i < cmdr->callbacks_count; i++)
366 if (cmdr->callbacks[i].callback)
367 (*cmdr->callbacks[i].callback)(cmdr->callbacks[i].context, cmdr);
369 silc_server_command_pending_del(server, reply->reply_cmd, reply->ident);
370 silc_server_command_reply_free(cmdr);
373 /* Add new pending command to be executed when reply to a command has been
374 received. The `reply_cmd' is the command that will call the `callback'
375 with `context' when reply has been received. It can be SILC_COMMAND_NONE
376 to match any command with the `ident'. If `ident' is non-zero
377 the `callback' will be executed when received reply with command
378 identifier `ident'. If there already exists pending command for the
379 specified command, ident, callback and context this function has no
382 SilcBool silc_server_command_pending(SilcServer server,
383 SilcCommand reply_cmd,
385 SilcCommandCb callback,
388 return silc_server_command_pending_timed(server, reply_cmd, ident, callback,
392 /* Same as silc_server_command_pending with specific timeout for pending
393 commands. If the `timeout' is zero default timeout is used. */
395 SilcBool silc_server_command_pending_timed(SilcServer server,
396 SilcCommand reply_cmd,
398 SilcCommandCb callback,
402 SilcServerCommandPending *reply;
404 /* Check whether identical pending already exists for same command,
405 ident, callback and callback context. If it does then it would be
406 error to register it again. */
407 silc_dlist_start(server->pending_commands);
408 while ((reply = silc_dlist_get(server->pending_commands)) != SILC_LIST_END) {
409 if (reply->reply_cmd == reply_cmd && reply->ident == ident &&
410 reply->callback == callback && reply->context == context)
414 reply = silc_calloc(1, sizeof(*reply));
415 reply->reply_cmd = reply_cmd;
416 reply->ident = ident;
417 reply->context = context;
418 reply->callback = callback;
420 silc_schedule_task_add_timeout(server->schedule,
421 silc_server_command_pending_timeout, reply,
422 timeout ? timeout : 12, 0);
423 silc_dlist_add(server->pending_commands, reply);
428 /* Deletes pending command by reply command type. */
430 void silc_server_command_pending_del(SilcServer server,
431 SilcCommand reply_cmd,
434 SilcServerCommandPending *r;
436 silc_dlist_start(server->pending_commands);
437 while ((r = silc_dlist_get(server->pending_commands)) != SILC_LIST_END) {
438 if ((r->reply_cmd == reply_cmd || (r->reply_cmd == SILC_COMMAND_NONE &&
440 && r->ident == ident) {
441 silc_dlist_del(server->pending_commands, r);
443 silc_schedule_task_del(server->schedule, r->timeout);
449 /* Checks for pending commands and marks callbacks to be called from
450 the command reply function. Returns TRUE if there were pending command. */
452 SilcServerCommandPendingCallbacks
453 silc_server_command_pending_check(SilcServer server,
456 SilcUInt32 *callbacks_count)
458 SilcServerCommandPending *r;
459 SilcServerCommandPendingCallbacks callbacks = NULL;
462 silc_dlist_start(server->pending_commands);
463 while ((r = silc_dlist_get(server->pending_commands)) != SILC_LIST_END) {
464 if ((r->reply_cmd == command || r->reply_cmd == SILC_COMMAND_NONE)
465 && r->ident == ident) {
466 callbacks = silc_realloc(callbacks, sizeof(*callbacks) * (i + 1));
467 callbacks[i].context = r->context;
468 callbacks[i].callback = r->callback;
469 r->reply_check = TRUE;
474 *callbacks_count = i;
478 /* Sends simple status message as command reply packet */
481 silc_server_command_send_status_reply(SilcServerCommandContext cmd,
489 cmd->server->stat.commands_sent++;
491 SILC_LOG_DEBUG(("Sending command status %d", status));
494 silc_command_reply_payload_encode_va(command, status, error,
495 silc_command_get_ident(cmd->payload),
497 silc_server_packet_send(cmd->server, cmd->sock,
498 SILC_PACKET_COMMAND_REPLY, 0,
499 buffer->data, silc_buffer_len(buffer));
500 silc_buffer_free(buffer);
503 /* Sends command status reply with one extra argument. The argument
504 type must be sent as argument. */
507 silc_server_command_send_status_data(SilcServerCommandContext cmd,
512 const unsigned char *arg,
518 cmd->server->stat.commands_sent++;
520 SILC_LOG_DEBUG(("Sending command status %d", status));
523 silc_command_reply_payload_encode_va(command, status, 0,
524 silc_command_get_ident(cmd->payload),
525 1, arg_type, arg, arg_len);
526 silc_server_packet_send(cmd->server, cmd->sock,
527 SILC_PACKET_COMMAND_REPLY, 0,
528 buffer->data, silc_buffer_len(buffer));
529 silc_buffer_free(buffer);
533 silc_server_command_send_status_data2(SilcServerCommandContext cmd,
537 SilcUInt32 arg_type1,
538 const unsigned char *arg1,
540 SilcUInt32 arg_type2,
541 const unsigned char *arg2,
547 cmd->server->stat.commands_sent++;
549 SILC_LOG_DEBUG(("Sending command status %d", status));
552 silc_command_reply_payload_encode_va(command, status, 0,
553 silc_command_get_ident(cmd->payload),
554 2, arg_type1, arg1, arg_len1,
555 arg_type2, arg2, arg_len2);
556 silc_server_packet_send(cmd->server, cmd->sock,
557 SILC_PACKET_COMMAND_REPLY, 0,
558 buffer->data, silc_buffer_len(buffer));
559 silc_buffer_free(buffer);
562 /* This function can be called to check whether in the command reply
563 an error occurred. This function has no effect if this is called
564 when the command function was not called as pending command callback.
565 This returns TRUE if error had occurred. */
568 silc_server_command_pending_error_check(SilcServerCommandContext cmd,
569 SilcServerCommandReplyContext cmdr,
572 if (!cmd->pending || !cmdr)
575 if (!silc_command_get_status(cmdr->payload, NULL, NULL)) {
579 cmd->server->stat.commands_sent++;
581 /* Send the same command reply payload */
582 silc_command_set_command(cmdr->payload, silc_command_get(cmd->payload));
583 silc_command_set_ident(cmdr->payload,
584 silc_command_get_ident(cmd->payload));
585 buffer = silc_command_payload_encode_payload(cmdr->payload);
586 silc_server_packet_send(cmd->server, cmd->sock,
587 SILC_PACKET_COMMAND_REPLY, 0,
588 buffer->data, silc_buffer_len(buffer));
589 silc_buffer_free(buffer);
596 /* Server side of command WHOIS. */
598 SILC_SERVER_CMD_FUNC(whois)
600 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
601 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_WHOIS, cmd, 1, 256);
602 silc_server_query_command(cmd->server, SILC_COMMAND_WHOIS, cmd, NULL);
603 silc_server_command_free(cmd);
606 /* Server side of command WHOWAS. */
608 SILC_SERVER_CMD_FUNC(whowas)
610 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
611 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_WHOWAS, cmd, 1, 2);
612 silc_server_query_command(cmd->server, SILC_COMMAND_WHOWAS, cmd, NULL);
613 silc_server_command_free(cmd);
616 /* Server side of command IDENTIFY. */
618 SILC_SERVER_CMD_FUNC(identify)
620 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
621 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_IDENTIFY, cmd, 1, 256);
622 silc_server_query_command(cmd->server, SILC_COMMAND_IDENTIFY, cmd, NULL);
623 silc_server_command_free(cmd);
626 /* Server side of command NICK. Sets nickname for user. Setting
627 nickname causes generation of a new client ID for the client. The
628 new client ID is sent to the client after changing the nickname. */
630 SILC_SERVER_CMD_FUNC(nick)
632 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
633 SilcClientEntry client = silc_packet_get_context(cmd->sock);
634 SilcServer server = cmd->server;
635 SilcBuffer nidp, oidp = NULL;
636 SilcClientID *new_id;
638 unsigned char *nick, *nickc = NULL;
639 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
641 if (client->data.conn_type != SILC_CONN_CLIENT || !client)
644 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_NICK, cmd, 1, 1);
647 nick = silc_argument_get_arg_type(cmd->args, 1, &nick_len);
649 silc_server_command_send_status_reply(cmd, SILC_COMMAND_NICK,
650 SILC_STATUS_ERR_BAD_NICKNAME, 0);
654 /* Truncate over long nicks */
655 if (nick_len > 128) {
657 nick[nick_len - 1] = '\0';
660 /* Check for valid nickname string. This is cached, original is saved
661 in the client context. */
662 nickc = silc_identifier_check(nick, nick_len, SILC_STRING_UTF8, 128, NULL);
664 silc_server_command_send_status_reply(cmd, SILC_COMMAND_NICK,
665 SILC_STATUS_ERR_BAD_NICKNAME, 0);
669 /* Check for same nickname */
670 if (strlen(client->nickname) == nick_len &&
671 !memcmp(client->nickname, nick, nick_len)) {
672 nidp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
677 /* Create new Client ID */
678 if (!silc_id_create_client_id(cmd->server, cmd->server->id,
680 cmd->server->md5hash,
681 nickc, strlen(nickc), &new_id)) {
682 silc_server_command_send_status_reply(cmd, SILC_COMMAND_NICK,
683 SILC_STATUS_ERR_BAD_NICKNAME, 0);
688 /* Send notify about nickname change to our router. We send the new
689 ID and ask to replace it with the old one. If we are router the
690 packet is broadcasted. Send NICK_CHANGE notify. */
691 silc_server_send_notify_nick_change(server, SILC_PRIMARY_ROUTE(server),
692 SILC_BROADCAST(server), client->id,
695 /* Check if anyone is watching the old nickname */
696 if (server->server_type == SILC_ROUTER)
697 silc_server_check_watcher_list(server, client, nick,
698 SILC_NOTIFY_TYPE_NICK_CHANGE);
700 oidp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
702 /* Update client entry */
703 silc_idcache_update_by_context(server->local_list->clients, client,
704 new_id, nickc, TRUE);
706 silc_free(client->nickname);
707 client->nickname = strdup(nick);
709 nidp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
711 /* Send NICK_CHANGE notify to the client's channels */
712 silc_server_send_notify_on_channels(server, NULL, client,
713 SILC_NOTIFY_TYPE_NICK_CHANGE, 3,
714 oidp->data, silc_buffer_len(oidp),
715 nidp->data, silc_buffer_len(nidp),
717 strlen(client->nickname));
719 /* Check if anyone is watching the new nickname */
720 if (server->server_type == SILC_ROUTER)
721 silc_server_check_watcher_list(server, client, NULL,
722 SILC_NOTIFY_TYPE_NICK_CHANGE);
725 /* Send the new Client ID as reply command back to client */
726 silc_server_send_command_reply(cmd->server, cmd->sock,
728 SILC_STATUS_OK, 0, ident, 2,
729 2, nidp->data, silc_buffer_len(nidp),
731 silc_buffer_free(nidp);
733 silc_buffer_free(oidp);
736 silc_server_command_free(cmd);
739 /* Sends the LIST command reply */
742 silc_server_command_list_send_reply(SilcServerCommandContext cmd,
743 SilcChannelEntry *lch,
744 SilcUInt32 lch_count,
745 SilcChannelEntry *gch,
746 SilcUInt32 gch_count)
750 SilcChannelEntry entry;
752 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
754 unsigned char usercount[4];
756 int valid_lcount = 0, valid_rcount = 0;
758 for (i = 0; i < lch_count; i++) {
759 if (lch[i]->mode & SILC_CHANNEL_MODE_SECRET)
764 for (i = 0; i < gch_count; i++) {
765 if (gch[i]->mode & SILC_CHANNEL_MODE_SECRET)
771 if (!lch_count && !gch_count) {
772 silc_server_command_send_status_reply(cmd, SILC_COMMAND_LIST,
777 status = SILC_STATUS_OK;
778 if ((lch_count + gch_count) > 1)
779 status = SILC_STATUS_LIST_START;
782 for (i = 0, k = 0; i < lch_count; i++) {
788 status = SILC_STATUS_LIST_ITEM;
789 if (valid_lcount > 1 && k == valid_lcount - 1 && !valid_rcount)
790 status = SILC_STATUS_LIST_END;
792 idp = silc_id_payload_encode(entry->id, SILC_ID_CHANNEL);
794 if (entry->mode & SILC_CHANNEL_MODE_PRIVATE) {
796 memset(usercount, 0, sizeof(usercount));
798 topic = entry->topic;
799 users = silc_hash_table_count(entry->user_list);
800 SILC_PUT32_MSB(users, usercount);
804 silc_server_send_command_reply(cmd->server, cmd->sock, SILC_COMMAND_LIST,
806 2, idp->data, silc_buffer_len(idp),
807 3, entry->channel_name,
808 strlen(entry->channel_name),
809 4, topic, topic ? strlen(topic) : 0,
811 silc_buffer_free(idp);
816 for (i = 0, k = 0; i < gch_count; i++) {
822 status = SILC_STATUS_LIST_ITEM;
823 if (valid_rcount > 1 && k == valid_rcount - 1)
824 status = SILC_STATUS_LIST_END;
826 idp = silc_id_payload_encode(entry->id, SILC_ID_CHANNEL);
828 if (entry->mode & SILC_CHANNEL_MODE_PRIVATE) {
830 memset(usercount, 0, sizeof(usercount));
832 topic = entry->topic;
833 users = entry->user_count;
834 SILC_PUT32_MSB(users, usercount);
838 silc_server_send_command_reply(cmd->server, cmd->sock, SILC_COMMAND_LIST,
840 2, idp->data, silc_buffer_len(idp),
841 3, entry->channel_name,
842 strlen(entry->channel_name),
843 4, topic, topic ? strlen(topic) : 0,
845 silc_buffer_free(idp);
850 /* Server side of LIST command. This lists the channel of the requested
851 server. Secret channels are not listed. */
853 SILC_SERVER_CMD_FUNC(list)
855 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
856 SilcServer server = cmd->server;
858 SilcChannelID *channel_id = NULL;
859 SilcChannelEntry *lchannels = NULL, *gchannels = NULL;
860 SilcUInt32 lch_count = 0, gch_count = 0;
862 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_LIST, cmd, 0, 1);
864 /* If we are normal server, send the command to router, since we
865 want to know all channels in the network. */
866 if (!cmd->pending && server->server_type != SILC_ROUTER &&
867 !server->standalone) {
869 SilcUInt16 old_ident;
872 cmd->server->stat.commands_sent++;
874 old_ident = silc_command_get_ident(cmd->payload);
875 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
876 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
877 silc_server_packet_send(server, SILC_PRIMARY_ROUTE(server),
878 SILC_PACKET_COMMAND, cmd->packet->flags,
879 tmpbuf->data, silc_buffer_len(tmpbuf));
881 /* Reprocess this packet after received reply from router */
882 silc_server_command_pending(server, SILC_COMMAND_LIST,
883 silc_command_get_ident(cmd->payload),
884 silc_server_command_list,
885 silc_server_command_dup(cmd));
887 silc_command_set_ident(cmd->payload, old_ident);
888 silc_buffer_free(tmpbuf);
893 if (silc_argument_get_decoded(cmd->args, 1, SILC_ARGUMENT_ID, &id, NULL))
894 channel_id = SILC_ID_GET_ID(id);
896 /* Get the channels from local list */
897 lchannels = silc_idlist_get_channels(server->local_list, channel_id,
900 /* Get the channels from global list */
901 gchannels = silc_idlist_get_channels(server->global_list, channel_id,
905 silc_server_command_list_send_reply(cmd, lchannels, lch_count,
906 gchannels, gch_count);
908 silc_free(lchannels);
909 silc_free(gchannels);
912 silc_server_command_free(cmd);
915 /* Server side of TOPIC command. Sets topic for channel and/or returns
916 current topic to client. */
918 SILC_SERVER_CMD_FUNC(topic)
920 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
921 SilcServer server = cmd->server;
922 SilcClientEntry client = silc_packet_get_context(cmd->sock);
924 SilcChannelEntry channel;
925 SilcChannelClientEntry chl;
928 SilcUInt32 argc, tmp_len;
929 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
931 if (client->data.conn_type != SILC_CONN_CLIENT || !client)
934 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_TOPIC, cmd, 1, 2);
936 argc = silc_argument_get_arg_num(cmd->args);
939 if (!silc_argument_get_decoded(cmd->args, 1, SILC_ARGUMENT_ID, &id, NULL)) {
940 silc_server_command_send_status_reply(cmd, SILC_COMMAND_TOPIC,
941 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
945 /* Check whether the channel exists */
946 channel = silc_idlist_find_channel_by_id(server->local_list,
947 SILC_ID_GET_ID(id), NULL);
949 channel = silc_idlist_find_channel_by_id(server->global_list,
950 SILC_ID_GET_ID(id), NULL);
952 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
953 silc_server_command_send_status_data(cmd, SILC_COMMAND_TOPIC,
954 SILC_STATUS_ERR_NO_SUCH_CHANNEL_ID,
962 tmp = silc_argument_get_arg_type(cmd->args, 2, &tmp_len);
964 silc_server_command_send_status_reply(cmd, SILC_COMMAND_TOPIC,
965 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
971 tmp[tmp_len - 1] = '\0';
974 if (!silc_utf8_valid(tmp, tmp_len)) {
975 silc_server_command_send_status_reply(cmd, SILC_COMMAND_TOPIC,
976 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
981 /* See whether the client is on channel and has rights to change topic */
982 if (!silc_server_client_on_channel(client, channel, &chl)) {
983 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
984 silc_server_command_send_status_data(cmd, SILC_COMMAND_TOPIC,
985 SILC_STATUS_ERR_NOT_ON_CHANNEL,
990 if (channel->mode & SILC_CHANNEL_MODE_TOPIC &&
991 !(chl->mode & SILC_CHANNEL_UMODE_CHANOP) &&
992 !(chl->mode & SILC_CHANNEL_UMODE_CHANFO)) {
993 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
994 silc_server_command_send_status_data(cmd, SILC_COMMAND_TOPIC,
995 SILC_STATUS_ERR_NO_CHANNEL_PRIV,
1000 if (!channel->topic || strcmp(channel->topic, tmp)) {
1001 /* Set the topic for channel */
1002 silc_free(channel->topic);
1003 channel->topic = strdup(tmp);
1005 /* Send TOPIC_SET notify type to the network */
1006 silc_server_send_notify_topic_set(server, SILC_PRIMARY_ROUTE(server),
1007 SILC_BROADCAST(server), channel,
1008 client->id, SILC_ID_CLIENT,
1011 /* Send notify about topic change to all clients on the channel */
1012 idp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
1013 silc_server_send_notify_to_channel(server, NULL, channel, FALSE, TRUE,
1014 SILC_NOTIFY_TYPE_TOPIC_SET, 2,
1015 idp->data, silc_buffer_len(idp),
1017 strlen(channel->topic));
1018 silc_buffer_free(idp);
1022 /* Send the topic to client as reply packet */
1023 idp = silc_id_payload_encode(SILC_ID_GET_ID(id), SILC_ID_CHANNEL);
1024 silc_server_send_command_reply(cmd->server, cmd->sock, SILC_COMMAND_TOPIC,
1025 SILC_STATUS_OK, 0, ident, 2,
1026 2, idp->data, silc_buffer_len(idp),
1029 strlen(channel->topic) : 0);
1030 silc_buffer_free(idp);
1033 silc_server_command_free(cmd);
1036 /* Server side of INVITE command. Invites some client to join some channel.
1037 This command is also used to manage the invite list of the channel. */
1039 SILC_SERVER_CMD_FUNC(invite)
1041 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
1042 SilcServer server = cmd->server;
1043 SilcPacketStream sock = cmd->sock, dest_sock;
1044 SilcChannelClientEntry chl;
1045 SilcClientEntry sender, dest;
1046 SilcChannelEntry channel;
1048 SilcIDListData idata;
1049 SilcArgumentPayload args;
1050 SilcHashTableList htl;
1051 SilcBuffer list, tmp2;
1052 SilcBufferStruct alist;
1053 unsigned char *tmp, *atype = NULL;
1054 SilcUInt32 len, type, len2;
1055 SilcUInt16 argc = 0, ident = silc_command_get_ident(cmd->payload);
1057 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_INVITE, cmd, 1, 4);
1059 /* Get Channel ID */
1060 if (!silc_argument_get_decoded(cmd->args, 1, SILC_ARGUMENT_ID, &id, NULL)) {
1061 silc_server_command_send_status_reply(cmd, SILC_COMMAND_INVITE,
1062 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
1066 /* Get the channel entry */
1067 channel = silc_idlist_find_channel_by_id(server->local_list,
1068 SILC_ID_GET_ID(id), NULL);
1070 channel = silc_idlist_find_channel_by_id(server->global_list,
1071 SILC_ID_GET_ID(id), NULL);
1073 tmp = silc_argument_get_arg_type(cmd->args, 1, &len);
1074 silc_server_command_send_status_data(cmd, SILC_COMMAND_INVITE,
1075 SILC_STATUS_ERR_NO_SUCH_CHANNEL_ID,
1081 /* Check whether the sender of this command is on the channel. */
1082 sender = silc_packet_get_context(sock);
1083 if (!sender || !silc_server_client_on_channel(sender, channel, &chl)) {
1084 tmp = silc_argument_get_arg_type(cmd->args, 1, &len);
1085 silc_server_command_send_status_data(cmd, SILC_COMMAND_INVITE,
1086 SILC_STATUS_ERR_NOT_ON_CHANNEL, 0,
1091 /* Check whether the channel is invite-only channel. If yes then the
1092 sender of this command must be at least channel operator. */
1093 if (channel->mode & SILC_CHANNEL_MODE_INVITE &&
1094 !(chl->mode & SILC_CHANNEL_UMODE_CHANOP) &&
1095 !(chl->mode & SILC_CHANNEL_UMODE_CHANFO)) {
1096 tmp = silc_argument_get_arg_type(cmd->args, 1, &len);
1097 silc_server_command_send_status_data(cmd, SILC_COMMAND_INVITE,
1098 SILC_STATUS_ERR_NO_CHANNEL_PRIV,
1103 /* Get destination client ID */
1104 if (silc_argument_get_decoded(cmd->args, 2, SILC_ARGUMENT_ID, &id2, NULL)) {
1107 /* Get the client entry */
1108 dest = silc_server_query_client(server, SILC_ID_GET_ID(id2),
1111 if (server->server_type != SILC_SERVER || !resolve || cmd->pending) {
1112 tmp = silc_argument_get_arg_type(cmd->args, 2, &len);
1113 silc_server_command_send_status_data(
1114 cmd, SILC_COMMAND_INVITE,
1115 SILC_STATUS_ERR_NO_SUCH_CLIENT_ID, 0,
1120 /* The client info is being resolved. Reprocess this packet after
1121 receiving the reply to the query. */
1122 silc_server_command_pending(server, SILC_COMMAND_WHOIS,
1124 silc_server_command_invite,
1125 silc_server_command_dup(cmd));
1126 cmd->pending = TRUE;
1130 /* Check whether the requested client is already on the channel. */
1131 if (silc_server_client_on_channel(dest, channel, NULL)) {
1132 tmp = silc_argument_get_arg_type(cmd->args, 2, &len);
1133 atype = silc_argument_get_arg_type(cmd->args, 1, &len2);
1134 silc_server_command_send_status_data2(cmd, SILC_COMMAND_INVITE,
1135 SILC_STATUS_ERR_USER_ON_CHANNEL,
1141 /* Get route to the client */
1142 dest_sock = silc_server_get_client_route(server, NULL, 0,
1143 SILC_ID_GET_ID(id2),
1146 tmp = silc_argument_get_arg_type(cmd->args, 2, &len);
1147 silc_server_command_send_status_data(cmd, SILC_COMMAND_INVITE,
1148 SILC_STATUS_ERR_NO_SUCH_CLIENT_ID,
1153 /* Add the client to the invite list */
1155 /* Allocate hash table for invite list if it doesn't exist yet */
1156 if (!channel->invite_list)
1157 channel->invite_list =
1158 silc_hash_table_alloc(0, silc_hash_ptr,
1160 silc_server_inviteban_destruct, channel, TRUE);
1162 /* Check if the ID is in the list already */
1163 tmp = silc_argument_get_arg_type(cmd->args, 2, &len);
1164 silc_hash_table_list(channel->invite_list, &htl);
1165 while (silc_hash_table_get(&htl, (void *)&type, (void *)&tmp2)) {
1166 if (type == 3 && !memcmp(tmp2->data, tmp, len)) {
1171 silc_hash_table_list_reset(&htl);
1173 /* Add new Client ID to invite list */
1175 list = silc_buffer_alloc_size(len);
1176 silc_buffer_put(list, tmp, len);
1177 silc_hash_table_add(channel->invite_list, (void *)3, list);
1180 if (!(dest->mode & SILC_UMODE_BLOCK_INVITE)) {
1181 /* Send notify to the client that is invited to the channel */
1182 SilcBuffer idp, idp2;
1183 idp = silc_id_payload_encode(SILC_ID_GET_ID(id), SILC_ID_CHANNEL);
1184 idp2 = silc_id_payload_encode(sender->id, SILC_ID_CLIENT);
1185 silc_server_send_notify_dest(server, dest_sock, FALSE,
1186 SILC_ID_GET_ID(id2), SILC_ID_CLIENT,
1187 SILC_NOTIFY_TYPE_INVITE, 3,
1188 idp->data, silc_buffer_len(idp),
1189 channel->channel_name,
1190 strlen(channel->channel_name),
1191 idp2->data, silc_buffer_len(idp2));
1192 silc_buffer_free(idp);
1193 silc_buffer_free(idp2);
1197 /* Get the invite information */
1198 tmp = silc_argument_get_arg_type(cmd->args, 4, &len2);
1199 if (tmp && len2 > 2) {
1200 /* Parse the arguments to see they are constructed correctly */
1201 SILC_GET16_MSB(argc, tmp);
1202 args = silc_argument_payload_parse(tmp + 2, len2 - 2, argc);
1204 silc_server_command_send_status_reply(cmd, SILC_COMMAND_INVITE,
1205 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
1210 /* Get the type of action */
1211 atype = silc_argument_get_arg_type(cmd->args, 3, &len);
1212 if (atype && len == 1) {
1213 if (atype[0] == 0x00) {
1214 /* Allocate hash table for invite list if it doesn't exist yet */
1215 if (!channel->invite_list)
1216 channel->invite_list =
1217 silc_hash_table_alloc(0, silc_hash_ptr,
1219 silc_server_inviteban_destruct, channel,
1222 /* Check for resource limit */
1223 if (silc_hash_table_count(channel->invite_list) > 64) {
1224 silc_server_command_send_status_reply(cmd, SILC_COMMAND_INVITE,
1225 SILC_STATUS_ERR_RESOURCE_LIMIT,
1231 /* Now add or delete the information. */
1232 if (!silc_server_inviteban_process(server, channel->invite_list,
1233 (SilcUInt8)atype[0], args)) {
1234 silc_server_command_send_status_reply(
1235 cmd, SILC_COMMAND_INVITE,
1236 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
1241 silc_argument_payload_free(args);
1244 /* Encode invite list */
1246 if (channel->invite_list && silc_hash_table_count(channel->invite_list)) {
1247 list = silc_buffer_alloc_size(2);
1248 silc_buffer_format(list,
1249 SILC_STR_UI_SHORT(silc_hash_table_count(
1250 channel->invite_list)),
1252 silc_hash_table_list(channel->invite_list, &htl);
1253 while (silc_hash_table_get(&htl, (void *)&type, (void *)&tmp2))
1254 list = silc_argument_payload_encode_one(list, tmp2->data,
1255 silc_buffer_len(tmp2), type);
1256 silc_hash_table_list_reset(&htl);
1259 /* The notify is sent to local servers (not clients), and to network. */
1260 if (atype && tmp && len2) {
1261 silc_buffer_set(&alist, tmp, len2);
1263 /* Send to local servers if we are router */
1264 if (server->server_type == SILC_ROUTER) {
1265 SilcBuffer idp, idp2;
1266 idp = silc_id_payload_encode(SILC_ID_GET_ID(id), SILC_ID_CHANNEL);
1267 idp2 = silc_id_payload_encode(sender->id, SILC_ID_CLIENT);
1268 silc_server_send_notify_to_channel(server, NULL, channel, FALSE, FALSE,
1269 SILC_NOTIFY_TYPE_INVITE, 5,
1270 idp->data, silc_buffer_len(idp),
1271 channel->channel_name,
1272 strlen(channel->channel_name),
1273 idp2->data, silc_buffer_len(idp2),
1275 tmp ? alist.data : NULL,
1276 tmp ? silc_buffer_len(&alist) : 0);
1277 silc_buffer_free(idp);
1278 silc_buffer_free(idp2);
1281 /* Send to network */
1282 silc_server_send_notify_invite(server, SILC_PRIMARY_ROUTE(server),
1283 SILC_BROADCAST(server), channel,
1285 tmp ? &alist : NULL);
1288 /* Send invite list back only if the list was modified, or no arguments
1291 argc = silc_argument_get_arg_num(cmd->args);
1294 if (silc_argument_get_arg_type(cmd->args, 3, &len))
1297 /* Send command reply */
1298 tmp = silc_argument_get_arg_type(cmd->args, 1, &len);
1299 silc_server_send_command_reply(server, cmd->sock, SILC_COMMAND_INVITE,
1300 SILC_STATUS_OK, 0, ident, 2,
1304 type && list ? silc_buffer_len(list) : 0);
1305 silc_buffer_free(list);
1308 silc_server_command_free(cmd);
1312 SilcPacketStream sock;
1316 /* Quits connection to client. This gets called if client won't
1317 close the connection even when it has issued QUIT command. */
1319 SILC_TASK_CALLBACK(silc_server_command_quit_cb)
1321 SilcServer server = app_context;
1322 QuitInternal q = (QuitInternal)context;
1323 SilcClientEntry client = silc_packet_get_context(q->sock);
1326 /* Free all client specific data, such as client entry and entires
1327 on channels this client may be on. */
1328 silc_server_free_sock_user_data(server, q->sock, q->signoff);
1329 silc_server_close_connection(server, q->sock);
1332 silc_packet_stream_unref(q->sock);
1333 silc_free(q->signoff);
1337 /* Quits SILC session. This is the normal way to disconnect client. */
1339 SILC_SERVER_CMD_FUNC(quit)
1341 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
1342 SilcServer server = cmd->server;
1343 SilcPacketStream sock = cmd->sock;
1344 SilcClientEntry client = silc_packet_get_context(sock);
1346 unsigned char *tmp = NULL;
1349 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_QUIT, cmd, 0, 1);
1351 if (client->data.conn_type != SILC_CONN_CLIENT)
1355 tmp = silc_argument_get_arg_type(cmd->args, 1, &len);
1359 q = silc_calloc(1, sizeof(*q));
1361 q->signoff = tmp ? strdup(tmp) : NULL;
1362 silc_packet_stream_ref(q->sock);
1364 /* We quit the connection with little timeout */
1365 silc_schedule_task_add_timeout(server->schedule,
1366 silc_server_command_quit_cb, (void *)q,
1370 silc_server_command_free(cmd);
1373 /* Server side of command KILL. This command is used by router operator
1374 to remove an client from the SILC Network temporarily. */
1376 SILC_SERVER_CMD_FUNC(kill)
1378 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
1379 SilcServer server = cmd->server;
1380 SilcClientEntry client = silc_packet_get_context(cmd->sock);
1381 SilcClientEntry remote_client;
1383 unsigned char *tmp, *comment, *auth;
1384 SilcUInt32 tmp_len, tmp_len2, auth_len;
1386 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_KILL, cmd, 1, 3);
1388 if (client->data.conn_type != SILC_CONN_CLIENT || !client)
1391 /* Get authentication payload if present */
1392 auth = silc_argument_get_arg_type(cmd->args, 3, &auth_len);
1395 /* Router operator killing */
1397 /* KILL command works only on router */
1398 if (server->server_type != SILC_ROUTER) {
1399 silc_server_command_send_status_reply(cmd, SILC_COMMAND_KILL,
1400 SILC_STATUS_ERR_NO_ROUTER_PRIV, 0);
1404 /* Check whether client has the permissions. */
1405 if (!(client->mode & SILC_UMODE_ROUTER_OPERATOR)) {
1406 silc_server_command_send_status_reply(cmd, SILC_COMMAND_KILL,
1407 SILC_STATUS_ERR_NO_ROUTER_PRIV, 0);
1412 /* Get the client ID */
1413 if (!silc_argument_get_decoded(cmd->args, 1, SILC_ARGUMENT_ID, &id, NULL)) {
1414 silc_server_command_send_status_reply(cmd, SILC_COMMAND_KILL,
1415 SILC_STATUS_ERR_NO_CLIENT_ID, 0);
1419 /* Get the client entry */
1420 remote_client = silc_idlist_find_client_by_id(server->local_list,
1423 if (!remote_client) {
1424 remote_client = silc_idlist_find_client_by_id(server->global_list,
1427 if (!remote_client) {
1428 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
1429 silc_server_command_send_status_data(cmd, SILC_COMMAND_KILL,
1430 SILC_STATUS_ERR_NO_SUCH_CLIENT_ID,
1431 0, 2, tmp, tmp_len);
1437 comment = silc_argument_get_arg_type(cmd->args, 2, &tmp_len2);
1438 if (comment && tmp_len2 > 128) {
1440 comment[tmp_len2 - 1] = '\0';
1443 /* If authentication data is provided then verify that killing is
1445 if (auth && auth_len) {
1446 SilcPacketStream sock;
1448 if (!SILC_IS_LOCAL(remote_client) || !remote_client->data.public_key) {
1449 silc_server_command_send_status_reply(cmd, SILC_COMMAND_KILL,
1450 SILC_STATUS_ERR_OPERATION_ALLOWED,
1455 /* Verify the signature */
1456 if (!silc_auth_verify_data(auth, auth_len, SILC_AUTH_PUBLIC_KEY,
1457 remote_client->data.public_key, 0,
1458 server->sha1hash, remote_client->id,
1460 silc_server_command_send_status_reply(cmd, SILC_COMMAND_KILL,
1461 SILC_STATUS_ERR_AUTH_FAILED, 0);
1465 /* Send reply to the sender */
1466 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
1467 silc_server_command_send_status_data(cmd, SILC_COMMAND_KILL,
1471 /* Do normal signoff for the destination client */
1472 sock = remote_client->connection;
1473 silc_server_remove_from_channels(server, NULL, remote_client,
1474 TRUE, (char *)"Killed", TRUE, TRUE);
1475 silc_server_free_client_data(server, NULL, remote_client, TRUE,
1477 (unsigned char *)"Killed");
1479 silc_server_close_connection(server, sock);
1481 /* Router operator killing */
1483 /* Send reply to the sender */
1484 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
1485 silc_server_command_send_status_data(cmd, SILC_COMMAND_KILL,
1489 /* Check if anyone is watching this nickname */
1490 if (server->server_type == SILC_ROUTER)
1491 silc_server_check_watcher_list(server, client, NULL,
1492 SILC_NOTIFY_TYPE_KILLED);
1494 /* Now do the killing */
1495 silc_server_kill_client(server, remote_client, comment, client->id,
1500 silc_server_command_free(cmd);
1503 /* Server side of command INFO. This sends information about us to
1504 the client. If client requested specific server we will send the
1505 command to that server. */
1507 SILC_SERVER_CMD_FUNC(info)
1509 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
1510 SilcServer server = cmd->server;
1514 char *dest_server = NULL, *server_info = NULL, *server_name;
1515 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
1516 SilcServerEntry entry = NULL;
1519 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_INFO, cmd, 0, 2);
1521 /* Get server name */
1522 dest_server = silc_argument_get_arg_type(cmd->args, 1, NULL);
1524 /* Check server name. */
1525 dest_server = silc_identifier_check(dest_server, strlen(dest_server),
1526 SILC_STRING_UTF8, 256, &tmp_len);
1528 silc_server_command_send_status_reply(cmd, SILC_COMMAND_INFO,
1529 SILC_STATUS_ERR_BAD_SERVER, 0);
1535 if (silc_argument_get_decoded(cmd->args, 2, SILC_ARGUMENT_ID, &id, NULL)) {
1536 /* Check whether we have this server cached */
1537 entry = silc_idlist_find_server_by_id(server->local_list,
1538 SILC_ID_GET_ID(id), TRUE, NULL);
1540 entry = silc_idlist_find_server_by_id(server->global_list,
1541 SILC_ID_GET_ID(id), TRUE, NULL);
1542 if (!entry && server->server_type != SILC_SERVER) {
1543 tmp = silc_argument_get_arg_type(cmd->args, 2, &tmp_len);
1544 silc_server_command_send_status_data(cmd, SILC_COMMAND_INFO,
1545 SILC_STATUS_ERR_NO_SUCH_SERVER_ID,
1546 0, 2, tmp, tmp_len);
1552 if ((!dest_server && !entry) || (entry && entry == server->id_entry) ||
1553 (dest_server && !cmd->pending &&
1554 !memcmp(dest_server, server->server_name, strlen(dest_server)))) {
1555 /* Send our reply */
1556 char info_string[256];
1558 memset(info_string, 0, sizeof(info_string));
1559 snprintf(info_string, sizeof(info_string),
1560 "location: %s server: %s admin: %s <%s>",
1561 server->config->server_info->location,
1562 server->config->server_info->server_type,
1563 server->config->server_info->admin,
1564 server->config->server_info->email);
1566 server_info = info_string;
1567 entry = server->id_entry;
1569 /* Check whether we have this server cached */
1570 if (!entry && dest_server) {
1571 entry = silc_idlist_find_server_by_name(server->global_list,
1572 dest_server, TRUE, NULL);
1574 entry = silc_idlist_find_server_by_name(server->local_list,
1575 dest_server, TRUE, NULL);
1579 if (!cmd->pending &&
1580 server->server_type != SILC_SERVER && entry && !entry->server_info) {
1581 /* Send to the server */
1583 SilcUInt16 old_ident;
1586 cmd->server->stat.commands_sent++;
1588 old_ident = silc_command_get_ident(cmd->payload);
1589 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
1590 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
1592 silc_server_packet_send(server, entry->connection,
1593 SILC_PACKET_COMMAND, cmd->packet->flags,
1594 tmpbuf->data, silc_buffer_len(tmpbuf));
1596 /* Reprocess this packet after received reply from router */
1597 silc_server_command_pending(server, SILC_COMMAND_INFO,
1598 silc_command_get_ident(cmd->payload),
1599 silc_server_command_info,
1600 silc_server_command_dup(cmd));
1601 cmd->pending = TRUE;
1602 silc_command_set_ident(cmd->payload, old_ident);
1603 silc_buffer_free(tmpbuf);
1607 if (!entry && !cmd->pending && !server->standalone) {
1608 /* Send to the primary router */
1610 SilcUInt16 old_ident;
1613 cmd->server->stat.commands_sent++;
1615 old_ident = silc_command_get_ident(cmd->payload);
1616 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
1617 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
1619 silc_server_packet_send(server, SILC_PRIMARY_ROUTE(server),
1620 SILC_PACKET_COMMAND, cmd->packet->flags,
1621 tmpbuf->data, silc_buffer_len(tmpbuf));
1623 /* Reprocess this packet after received reply from router */
1624 silc_server_command_pending(server, SILC_COMMAND_INFO,
1625 silc_command_get_ident(cmd->payload),
1626 silc_server_command_info,
1627 silc_server_command_dup(cmd));
1628 cmd->pending = TRUE;
1629 silc_command_set_ident(cmd->payload, old_ident);
1630 silc_buffer_free(tmpbuf);
1637 silc_free(dest_server);
1638 dest_server = silc_argument_get_arg_type(cmd->args, 1, NULL);
1639 silc_server_command_send_status_data(cmd, SILC_COMMAND_INFO,
1640 SILC_STATUS_ERR_NO_SUCH_SERVER, 0,
1642 strlen(dest_server));
1648 idp = silc_id_payload_encode(entry->id, SILC_ID_SERVER);
1650 server_info = entry->server_info;
1651 server_name = entry->server_name;
1653 /* Send the reply */
1654 silc_server_send_command_reply(server, cmd->sock, SILC_COMMAND_INFO,
1655 SILC_STATUS_OK, 0, ident, 3,
1656 2, idp->data, silc_buffer_len(idp),
1658 strlen(server_name),
1661 strlen(server_info) : 0);
1662 silc_buffer_free(idp);
1665 silc_free(dest_server);
1666 silc_server_command_free(cmd);
1669 /* Server side of command PING. This just replies to the ping. */
1671 SILC_SERVER_CMD_FUNC(ping)
1673 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
1674 SilcServer server = cmd->server;
1679 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_PING, cmd, 1, 1);
1682 if (!silc_argument_get_decoded(cmd->args, 1, SILC_ARGUMENT_ID, &id, NULL)) {
1683 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PING,
1684 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
1689 if (SILC_ID_SERVER_COMPARE(SILC_ID_GET_ID(id), server->id)) {
1690 /* Send our reply */
1691 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PING,
1694 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
1695 silc_server_command_send_status_data(cmd, SILC_COMMAND_PING,
1696 SILC_STATUS_ERR_NO_SUCH_SERVER_ID, 0,
1702 silc_server_command_free(cmd);
1705 /* Server side of command STATS. */
1707 SILC_SERVER_CMD_FUNC(stats)
1709 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
1710 SilcServer server = cmd->server;
1714 SilcBuffer packet, stats;
1715 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
1718 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_STATS, cmd, 1, 1);
1721 if (!silc_argument_get_decoded(cmd->args, 1, SILC_ARGUMENT_ID, &id, NULL)) {
1722 silc_server_command_send_status_reply(cmd, SILC_COMMAND_STATS,
1723 SILC_STATUS_ERR_NO_SERVER_ID, 0);
1727 SILC_LOG_DEBUG(("id %s", silc_id_render(SILC_ID_GET_ID(id),
1730 /* The ID must be ours */
1731 if (!SILC_ID_SERVER_COMPARE(server->id, SILC_ID_GET_ID(id))) {
1732 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
1733 silc_server_command_send_status_data(cmd, SILC_COMMAND_STATS,
1734 SILC_STATUS_ERR_NO_SUCH_SERVER_ID, 0,
1739 /* If we are router then just send everything we got. If we are normal
1740 server then we'll send this to our router to get all the latest
1741 statistical information. */
1742 if (!cmd->pending && server->server_type != SILC_ROUTER &&
1743 !server->standalone) {
1747 cmd->server->stat.commands_sent++;
1749 /* Send request to our router */
1750 idp = silc_id_payload_encode(server->router->id,
1752 packet = silc_command_payload_encode_va(SILC_COMMAND_STATS,
1753 ++server->cmd_ident, 1,
1755 silc_buffer_len(idp));
1756 silc_server_packet_send(server, SILC_PRIMARY_ROUTE(server),
1757 SILC_PACKET_COMMAND, 0, packet->data,
1758 silc_buffer_len(packet));
1760 /* Reprocess this packet after received reply from router */
1761 silc_server_command_pending(server, SILC_COMMAND_STATS,
1763 silc_server_command_stats,
1764 silc_server_command_dup(cmd));
1765 cmd->pending = TRUE;
1766 silc_buffer_free(packet);
1767 silc_buffer_free(idp);
1771 /* Send our reply to sender */
1772 uptime = time(NULL) - server->starttime;
1774 stats = silc_buffer_alloc_size(60);
1775 silc_buffer_format(stats,
1776 SILC_STR_UI_INT(server->starttime),
1777 SILC_STR_UI_INT(uptime),
1778 SILC_STR_UI_INT(server->stat.my_clients),
1779 SILC_STR_UI_INT(server->stat.my_channels),
1780 SILC_STR_UI_INT(server->stat.my_server_ops),
1781 SILC_STR_UI_INT(server->stat.my_router_ops),
1782 SILC_STR_UI_INT(server->stat.cell_clients),
1783 SILC_STR_UI_INT(server->stat.cell_channels),
1784 SILC_STR_UI_INT(server->stat.cell_servers),
1785 SILC_STR_UI_INT(server->stat.clients),
1786 SILC_STR_UI_INT(server->stat.channels),
1787 SILC_STR_UI_INT(server->stat.servers),
1788 SILC_STR_UI_INT(server->stat.routers),
1789 SILC_STR_UI_INT(server->stat.server_ops),
1790 SILC_STR_UI_INT(server->stat.router_ops),
1793 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
1794 silc_server_send_command_reply(server, cmd->sock, SILC_COMMAND_STATS,
1795 SILC_STATUS_OK, 0, ident, 2,
1797 3, stats->data, silc_buffer_len(stats));
1798 silc_buffer_free(stats);
1801 silc_server_command_free(cmd);
1804 /* Internal routine to join channel. The channel sent to this function
1805 has been either created or resolved from ID lists. This joins the sent
1806 client to the channel. */
1808 static void silc_server_command_join_channel(SilcServer server,
1809 SilcServerCommandContext cmd,
1810 SilcChannelEntry channel,
1811 SilcClientID *client_id,
1813 SilcBool create_key,
1815 const unsigned char *auth,
1816 SilcUInt32 auth_len,
1817 const unsigned char *cauth,
1818 SilcUInt32 cauth_len)
1820 SilcPacketStream sock = cmd->sock;
1821 SilcIDListData idata = silc_packet_get_context(sock);
1823 SilcUInt32 tmp_len, user_count;
1824 unsigned char *passphrase = NULL, mode[4], tmp2[4], tmp3[4], ulimit[4];
1825 SilcClientEntry client;
1826 SilcChannelClientEntry chl;
1827 SilcBuffer reply, chidp, clidp, keyp = NULL;
1828 SilcBuffer user_list, mode_list, invite_list, ban_list;
1829 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
1830 char check[512], check2[512];
1831 SilcBool founder = FALSE;
1833 SilcBuffer fkey = NULL, chpklist = NULL;
1834 const char *cipher, *hostname, *ip;
1836 SILC_LOG_DEBUG(("Joining client to channel"));
1841 silc_socket_stream_get_info(silc_packet_stream_get_stream(sock),
1842 NULL, &hostname, &ip, NULL);
1844 /* Get the client entry */
1845 if (idata->conn_type == SILC_CONN_CLIENT) {
1846 client = (SilcClientEntry)idata;
1850 client = silc_server_query_client(server, client_id, FALSE,
1853 if (!resolve || cmd->pending) {
1854 tmp = silc_argument_get_arg_type(cmd->args, 2, &tmp_len);
1855 silc_server_command_send_status_data(
1856 cmd, SILC_COMMAND_JOIN,
1857 SILC_STATUS_ERR_NO_SUCH_CLIENT_ID, 0,
1862 /* The client info is being resolved. Reprocess this packet after
1863 receiving the reply to the query. */
1864 silc_server_command_pending(server, SILC_COMMAND_WHOIS,
1866 silc_server_command_join,
1867 silc_server_command_dup(cmd));
1868 cmd->pending = TRUE;
1872 if (!client->data.public_key &&
1873 (auth || cauth || channel->ban_list ||
1874 (channel->mode & SILC_CHANNEL_MODE_INVITE))) {
1875 if (cmd->pending == 2)
1878 /* We must retrieve the client's public key by sending
1879 GETKEY command. Reprocess this packet after receiving the key */
1880 clidp = silc_id_payload_encode(client_id, SILC_ID_CLIENT);
1881 silc_server_send_command(server, cmd->sock,
1882 SILC_COMMAND_GETKEY, ++server->cmd_ident,
1883 1, 1, clidp->data, silc_buffer_len(clidp));
1884 silc_buffer_free(clidp);
1885 silc_server_command_pending(server, SILC_COMMAND_GETKEY,
1887 silc_server_command_join,
1888 silc_server_command_dup(cmd));
1893 cmd->pending = FALSE;
1897 * Check founder auth payload if provided. If client can gain founder
1898 * privileges it can override various conditions on joining the channel,
1899 * and can have directly the founder mode set on the channel.
1901 if (auth && auth_len && channel->mode & SILC_CHANNEL_MODE_FOUNDER_AUTH) {
1902 SilcIDListData idata = (SilcIDListData)client;
1903 SilcChannelClientEntry chl2;
1904 SilcHashTableList htl;
1906 if (channel->founder_key && idata->public_key &&
1907 silc_pkcs_public_key_compare(channel->founder_key,
1908 idata->public_key)) {
1909 /* Check whether the client is to become founder */
1910 if (silc_auth_verify_data(auth, auth_len, SILC_AUTH_PUBLIC_KEY,
1911 channel->founder_key, 0, server->sha1hash,
1912 client->id, SILC_ID_CLIENT)) {
1914 /* There cannot be anyone else as founder on the channel now. This
1915 client is definitely the founder due to this authentication */
1916 silc_hash_table_list(channel->user_list, &htl);
1917 while (silc_hash_table_get(&htl, NULL, (void *)&chl2))
1918 if (chl2->mode & SILC_CHANNEL_UMODE_CHANFO) {
1919 chl2->mode &= ~SILC_CHANNEL_UMODE_CHANFO;
1920 silc_server_force_cumode_change(server, NULL, channel, chl2,
1924 silc_hash_table_list_reset(&htl);
1926 umode = (SILC_CHANNEL_UMODE_CHANOP | SILC_CHANNEL_UMODE_CHANFO);
1933 * Check channel modes
1937 memset(check, 0, sizeof(check));
1938 memset(check2, 0, sizeof(check2));
1939 silc_strncat(check, sizeof(check),
1940 client->nickname, strlen(client->nickname));
1941 silc_strncat(check, sizeof(check), "!", 1);
1942 silc_strncat(check, sizeof(check),
1943 client->username, strlen(client->username));
1944 if (!strchr(client->username, '@')) {
1945 silc_strncat(check, sizeof(check), "@", 1);
1946 silc_strncat(check, sizeof(check),
1947 hostname, strlen(hostname));
1950 silc_strncat(check2, sizeof(check2),
1951 client->nickname, strlen(client->nickname));
1952 if (!strchr(client->nickname, '@')) {
1953 silc_strncat(check2, sizeof(check2), "@", 1);
1954 silc_strncat(check2, sizeof(check2),
1955 SILC_IS_LOCAL(client) ? server->server_name :
1956 client->router->server_name,
1957 SILC_IS_LOCAL(client) ? strlen(server->server_name) :
1958 strlen(client->router->server_name));
1960 silc_strncat(check2, sizeof(check2), "!", 1);
1961 silc_strncat(check2, sizeof(check2),
1962 client->username, strlen(client->username));
1963 if (!strchr(client->username, '@')) {
1964 silc_strncat(check2, sizeof(check2), "@", 1);
1965 silc_strncat(check2, sizeof(check2),
1966 hostname, strlen(hostname));
1969 /* Check invite list if channel is invite-only channel */
1970 if (channel->mode & SILC_CHANNEL_MODE_INVITE) {
1971 if (!channel->invite_list ||
1972 !silc_hash_table_count(channel->invite_list) ||
1973 (!silc_server_inviteban_match(server, channel->invite_list,
1975 !silc_server_inviteban_match(server, channel->invite_list,
1976 2, client->data.public_key) &&
1977 !silc_server_inviteban_match(server, channel->invite_list,
1978 1, client->nickname) &&
1979 !silc_server_inviteban_match(server, channel->invite_list,
1981 !silc_server_inviteban_match(server, channel->invite_list,
1983 chidp = silc_id_payload_encode(channel->id, SILC_ID_CHANNEL);
1984 silc_server_command_send_status_data(cmd, SILC_COMMAND_JOIN,
1985 SILC_STATUS_ERR_NOT_INVITED, 0,
1987 silc_buffer_len(chidp));
1988 silc_buffer_free(chidp);
1993 /* Check ban list if it exists. If the client's nickname, server,
1994 username and/or hostname is in the ban list the access to the
1995 channel is denied. */
1996 if (channel->ban_list && silc_hash_table_count(channel->ban_list)) {
1997 if (silc_server_inviteban_match(server, channel->ban_list,
1999 silc_server_inviteban_match(server, channel->ban_list,
2000 2, client->data.public_key) ||
2001 silc_server_inviteban_match(server, channel->ban_list,
2002 1, client->nickname) ||
2003 silc_server_inviteban_match(server, channel->ban_list,
2005 silc_server_inviteban_match(server, channel->ban_list,
2007 chidp = silc_id_payload_encode(channel->id, SILC_ID_CHANNEL);
2008 silc_server_command_send_status_data(
2009 cmd, SILC_COMMAND_JOIN,
2010 SILC_STATUS_ERR_BANNED_FROM_CHANNEL, 0,
2012 silc_buffer_len(chidp));
2013 silc_buffer_free(chidp);
2018 /* Check user count limit if set. */
2019 if (channel->mode & SILC_CHANNEL_MODE_ULIMIT) {
2020 if (silc_hash_table_count(channel->user_list) + 1 >
2021 channel->user_limit) {
2022 chidp = silc_id_payload_encode(channel->id, SILC_ID_CHANNEL);
2023 silc_server_command_send_status_data(cmd, SILC_COMMAND_JOIN,
2024 SILC_STATUS_ERR_CHANNEL_IS_FULL,
2026 silc_buffer_len(chidp));
2027 silc_buffer_free(chidp);
2033 /* Check the channel passphrase if set. */
2034 if (channel->mode & SILC_CHANNEL_MODE_PASSPHRASE) {
2035 /* Get passphrase */
2036 tmp = silc_argument_get_arg_type(cmd->args, 3, &tmp_len);
2038 passphrase = silc_memdup(tmp, tmp_len);
2040 if (!passphrase || !channel->passphrase ||
2041 strlen(channel->passphrase) != strlen(passphrase) ||
2042 memcmp(passphrase, channel->passphrase, strlen(channel->passphrase))) {
2043 chidp = silc_id_payload_encode(channel->id, SILC_ID_CHANNEL);
2044 silc_server_command_send_status_data(cmd, SILC_COMMAND_JOIN,
2045 SILC_STATUS_ERR_BAD_PASSWORD, 0,
2047 silc_buffer_len(chidp));
2048 silc_buffer_free(chidp);
2053 /* Verify channel authentication with channel public keys if set. */
2054 if (channel->mode & SILC_CHANNEL_MODE_CHANNEL_AUTH) {
2055 if (!silc_server_verify_channel_auth(server, channel, client->id,
2056 cauth, cauth_len)) {
2057 silc_server_command_send_status_reply(cmd, SILC_COMMAND_JOIN,
2058 SILC_STATUS_ERR_PERM_DENIED, 0);
2064 * Client is allowed to join to the channel. Make it happen.
2067 /* Check whether the client already is on the channel */
2068 if (silc_server_client_on_channel(client, channel, NULL)) {
2069 clidp = silc_id_payload_encode(client_id, SILC_ID_CLIENT);
2070 chidp = silc_id_payload_encode(channel->id, SILC_ID_CHANNEL);
2071 silc_server_command_send_status_data2(cmd, SILC_COMMAND_JOIN,
2072 SILC_STATUS_ERR_USER_ON_CHANNEL, 0,
2074 silc_buffer_len(clidp),
2076 silc_buffer_len(chidp));
2077 silc_buffer_free(clidp);
2078 silc_buffer_free(chidp);
2082 /* Generate new channel key as protocol dictates */
2084 if (!silc_server_create_channel_key(server, channel, 0))
2087 /* Send the channel key. This is broadcasted to the channel but is not
2088 sent to the client who is joining to the channel. */
2089 if (!(channel->mode & SILC_CHANNEL_MODE_PRIVKEY))
2090 silc_server_send_channel_key(server, NULL, channel,
2091 server->server_type == SILC_ROUTER ?
2092 FALSE : !server->standalone);
2095 /* Join the client to the channel by adding it to channel's user list.
2096 Add also the channel to client entry's channels list for fast cross-
2098 chl = silc_calloc(1, sizeof(*chl));
2100 chl->client = client;
2101 chl->channel = channel;
2102 silc_hash_table_add(channel->user_list, client, chl);
2103 silc_hash_table_add(client->channels, channel, chl);
2104 channel->user_count++;
2105 channel->disabled = FALSE;
2107 /* Get users on the channel */
2108 silc_server_get_users_on_channel(server, channel, &user_list, &mode_list,
2111 /* Encode Client ID Payload of the original client who wants to join */
2112 clidp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
2114 /* Encode command reply packet */
2115 chidp = silc_id_payload_encode(channel->id, SILC_ID_CHANNEL);
2116 SILC_PUT32_MSB(channel->mode, mode);
2117 SILC_PUT32_MSB(created, tmp2);
2118 SILC_PUT32_MSB(user_count, tmp3);
2119 if (channel->mode & SILC_CHANNEL_MODE_ULIMIT)
2120 SILC_PUT32_MSB(channel->user_limit, ulimit);
2122 if (!(channel->mode & SILC_CHANNEL_MODE_PRIVKEY)) {
2123 unsigned char cid[32];
2125 silc_id_id2str(channel->id, SILC_ID_CHANNEL, cid, sizeof(cid), &cid_len);
2126 cipher = silc_cipher_get_name(channel->send_key);
2127 keyp = silc_channel_key_payload_encode(cid_len, cid,
2128 strlen(cipher), cipher,
2129 channel->key_len / 8, channel->key);
2132 if (channel->founder_key)
2133 fkey = silc_public_key_payload_encode(channel->founder_key);
2135 /* Encode invite list */
2137 if (channel->invite_list && silc_hash_table_count(channel->invite_list)) {
2138 SilcHashTableList htl;
2140 invite_list = silc_buffer_alloc_size(2);
2141 silc_buffer_format(invite_list,
2142 SILC_STR_UI_SHORT(silc_hash_table_count(
2143 channel->invite_list)),
2146 silc_hash_table_list(channel->invite_list, &htl);
2147 while (silc_hash_table_get(&htl, (void *)&tmp_len, (void *)&reply))
2148 invite_list = silc_argument_payload_encode_one(invite_list,
2150 silc_buffer_len(reply), tmp_len);
2151 silc_hash_table_list_reset(&htl);
2154 /* Encode ban list */
2156 if (channel->ban_list && silc_hash_table_count(channel->ban_list)) {
2157 SilcHashTableList htl;
2159 ban_list = silc_buffer_alloc_size(2);
2160 silc_buffer_format(ban_list,
2161 SILC_STR_UI_SHORT(silc_hash_table_count(
2162 channel->ban_list)),
2165 silc_hash_table_list(channel->ban_list, &htl);
2166 while (silc_hash_table_get(&htl, (void *)&tmp_len, (void *)&reply))
2167 ban_list = silc_argument_payload_encode_one(ban_list,
2169 silc_buffer_len(reply), tmp_len);
2170 silc_hash_table_list_reset(&htl);
2173 if (channel->channel_pubkeys)
2174 chpklist = silc_server_get_channel_pk_list(server, channel, FALSE, FALSE);
2177 silc_command_reply_payload_encode_va(SILC_COMMAND_JOIN,
2178 SILC_STATUS_OK, 0, ident, 16,
2179 2, channel->channel_name,
2180 strlen(channel->channel_name),
2182 silc_buffer_len(chidp),
2184 silc_buffer_len(clidp),
2187 7, keyp ? keyp->data : NULL,
2188 keyp ? silc_buffer_len(keyp) : 0,
2189 8, ban_list ? ban_list->data : NULL,
2191 silc_buffer_len(ban_list): 0,
2192 9, invite_list ? invite_list->data :
2195 silc_buffer_len(invite_list) : 0,
2198 strlen(channel->topic) : 0,
2199 11, silc_hmac_get_name(channel->hmac),
2200 strlen(silc_hmac_get_name(channel->
2203 13, user_list->data,
2204 silc_buffer_len(user_list),
2205 14, mode_list->data,
2206 silc_buffer_len(mode_list),
2207 15, fkey ? fkey->data : NULL,
2208 fkey ? silc_buffer_len(fkey) : 0,
2209 16, chpklist ? chpklist->data : NULL,
2210 chpklist ? silc_buffer_len(chpklist) : 0,
2211 17, (channel->mode &
2212 SILC_CHANNEL_MODE_ULIMIT ?
2215 SILC_CHANNEL_MODE_ULIMIT ?
2216 sizeof(ulimit) : 0));
2218 /* Send command reply */
2219 silc_server_packet_send(server, sock, SILC_PACKET_COMMAND_REPLY, 0,
2220 reply->data, silc_buffer_len(reply));
2223 cmd->server->stat.commands_sent++;
2225 /* Send JOIN notify to locally connected clients on the channel. If
2226 we are normal server then router will send or have sent JOIN notify
2227 already. However since we've added the client already to our channel
2228 we'll ignore it (in packet_receive.c) so we must send it here. If
2229 we are router then this will send it to local clients and local
2231 SILC_LOG_DEBUG(("Send JOIN notify to channel"));
2232 silc_server_send_notify_to_channel(server, NULL, channel, FALSE, TRUE,
2233 SILC_NOTIFY_TYPE_JOIN, 2,
2234 clidp->data, silc_buffer_len(clidp),
2235 chidp->data, silc_buffer_len(chidp));
2237 /* Update statistics */
2238 server->stat.my_chanclients++;
2239 if (server->server_type == SILC_ROUTER) {
2240 server->stat.cell_chanclients++;
2241 server->stat.chanclients++;
2244 if (!cmd->pending) {
2245 /* Send JOIN notify packet to our primary router */
2246 silc_server_send_notify_join(server, SILC_PRIMARY_ROUTE(server),
2247 SILC_BROADCAST(server), channel, client->id);
2250 /* Distribute the channel key to all backup routers. */
2251 silc_server_backup_send(server, NULL, SILC_PACKET_CHANNEL_KEY, 0,
2252 keyp->data, silc_buffer_len(keyp), FALSE, TRUE);
2254 /* If client became founder by providing correct founder auth data
2255 notify the mode change to the channel. */
2257 SILC_PUT32_MSB(chl->mode, mode);
2258 SILC_LOG_DEBUG(("Send CUMODE_CHANGE notify to channel"));
2259 silc_server_send_notify_to_channel(server, NULL, channel, FALSE, TRUE,
2260 SILC_NOTIFY_TYPE_CUMODE_CHANGE, 4,
2262 silc_buffer_len(clidp),
2263 mode, 4, clidp->data,
2264 silc_buffer_len(clidp),
2265 fkey ? fkey->data : NULL,
2266 fkey ? silc_buffer_len(fkey) : 0);
2270 /* Set CUMODE notify type to network */
2272 silc_server_send_notify_cumode(server, SILC_PRIMARY_ROUTE(server),
2273 SILC_BROADCAST(server), channel,
2274 chl->mode, client->id, SILC_ID_CLIENT,
2275 client->id, channel->founder_key);
2277 silc_buffer_free(reply);
2278 silc_buffer_free(clidp);
2279 silc_buffer_free(chidp);
2280 silc_buffer_free(keyp);
2281 silc_buffer_free(user_list);
2282 silc_buffer_free(mode_list);
2283 silc_buffer_free(fkey);
2284 silc_buffer_free(chpklist);
2285 silc_buffer_free(invite_list);
2286 silc_buffer_free(ban_list);
2290 memset(passphrase, 0, strlen(passphrase));
2291 silc_free(passphrase);
2294 /* Server side of command JOIN. Joins client into requested channel. If
2295 the channel does not exist it will be created. */
2297 void silc_server_command_join_connected(SilcServer server,
2298 SilcServerEntry server_entry,
2301 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
2303 if (!server_entry) {
2305 unsigned char *tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
2308 SILC_LOG_DEBUG(("Connecting to router failed"));
2309 silc_parse_userfqdn(tmp, NULL, 0, serv, sizeof(serv));
2312 silc_server_command_send_status_data(cmd, SILC_COMMAND_JOIN,
2313 SILC_STATUS_ERR_NO_SUCH_SERVER, 0,
2314 2, serv, strlen(serv));
2316 silc_server_command_send_status_data(cmd, SILC_COMMAND_JOIN,
2317 SILC_STATUS_ERR_NO_SUCH_CHANNEL, 0,
2320 silc_server_command_free(cmd);
2324 /* Reprocess command */
2325 SILC_LOG_DEBUG(("Reprocess JOIN after connecting to router"));
2326 silc_server_command_join(cmd, NULL);
2329 SILC_SERVER_CMD_FUNC(join)
2331 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
2332 SilcServer server = cmd->server;
2333 SilcIDListData idata = silc_packet_get_context(cmd->sock);
2334 unsigned char *auth, *cauth;
2335 SilcUInt32 tmp_len, auth_len, cauth_len;
2336 char *tmp, *channel_name, *channel_namec = NULL, *cipher, *hmac;
2337 char parsed[256 + 1], serv[256 + 1];
2338 SilcChannelEntry channel;
2339 SilcUInt32 umode = 0;
2340 SilcBool created = FALSE, create_key = TRUE;
2343 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_JOIN, cmd, 2, 7);
2345 /* Get channel name */
2346 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
2348 silc_server_command_send_status_reply(cmd, SILC_COMMAND_JOIN,
2349 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
2354 /* Truncate over long channel names */
2355 if (tmp_len > 256) {
2357 tmp[tmp_len - 1] = '\0';
2360 /* Parse server name from the channel name */
2361 silc_parse_userfqdn(tmp, parsed, sizeof(parsed), serv,
2363 channel_name = parsed;
2365 if (server->config->dynamic_server) {
2366 /* If server name is not specified but local channels is FALSE then the
2367 channel will be global, based on our router name. */
2368 if (!serv[0] && !server->config->local_channels) {
2369 if (!server->standalone) {
2370 silc_snprintf(serv, sizeof(serv), server->router->server_name);
2372 SilcServerConfigRouter *router;
2373 router = silc_server_config_get_primary_router(server);
2375 /* Create connection to primary router */
2376 SILC_LOG_DEBUG(("Create dynamic connection to primary router %s:%d",
2377 router->host, router->port));
2378 silc_server_create_connection(server, FALSE, TRUE,
2379 router->host, router->port,
2380 silc_server_command_join_connected,
2387 /* If server name is ours, ignore it. */
2388 if (serv[0] && silc_utf8_strcasecmp(serv, server->server_name))
2389 memset(serv, 0, sizeof(serv));
2391 /* Create connection */
2392 if (serv[0] && server->standalone) {
2393 SilcServerConfigRouter *router;
2394 router = silc_server_config_get_primary_router(server);
2396 /* Create connection to primary router */
2397 SILC_LOG_DEBUG(("Create dynamic connection to primary router %s:%d",
2398 router->host, router->port));
2399 silc_server_create_connection(server, FALSE, TRUE,
2400 router->host, router->port,
2401 silc_server_command_join_connected, cmd);
2407 /* Check for valid channel name. This is cached, the original is saved
2408 in the channel context. */
2409 channel_namec = silc_channel_name_check(channel_name, strlen(channel_name),
2410 SILC_STRING_UTF8, 256, NULL);
2411 if (!channel_namec) {
2412 silc_server_command_send_status_reply(cmd, SILC_COMMAND_JOIN,
2413 SILC_STATUS_ERR_BAD_CHANNEL, 0);
2417 /* Get Client ID of the client who is joining to the channel */
2418 if (!silc_argument_get_decoded(cmd->args, 2, SILC_ARGUMENT_ID, &id, NULL)) {
2419 silc_server_command_send_status_reply(cmd, SILC_COMMAND_JOIN,
2420 SILC_STATUS_ERR_NO_CLIENT_ID,
2424 tmp = silc_argument_get_arg_type(cmd->args, 2, &tmp_len);
2426 /* Get cipher, hmac name and auth payload */
2427 cipher = silc_argument_get_arg_type(cmd->args, 4, NULL);
2428 hmac = silc_argument_get_arg_type(cmd->args, 5, NULL);
2429 auth = silc_argument_get_arg_type(cmd->args, 6, &auth_len);
2430 cauth = silc_argument_get_arg_type(cmd->args, 7, &cauth_len);
2432 /* See if the channel exists */
2433 channel = silc_idlist_find_channel_by_name(server->local_list,
2434 channel_namec, NULL);
2436 if (idata->conn_type == SILC_CONN_CLIENT) {
2437 SilcClientEntry entry = (SilcClientEntry)idata;
2439 silc_server_command_send_status_reply(cmd, SILC_COMMAND_JOIN,
2440 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
2445 #ifndef SILC_DIST_INPLACE
2446 /* Limit how many channels client can join */
2447 if (!cmd->pending && entry->channels &&
2448 silc_hash_table_count(entry->channels) >=
2449 server->config->param.chlimit) {
2450 silc_server_command_send_status_reply(cmd, SILC_COMMAND_JOIN,
2451 SILC_STATUS_ERR_RESOURCE_LIMIT,
2455 #endif /* SILC_DIST_INPLACE */
2458 (channel->disabled && server->server_type != SILC_ROUTER)) {
2459 /* Channel not found or not valid */
2461 /* If we are standalone server we don't have a router, we just create
2462 the channel by ourselves (unless it existed). */
2463 if (server->standalone) {
2465 channel = silc_server_create_new_channel(server, server->id, cipher,
2466 hmac, channel_name, TRUE);
2469 silc_server_command_send_status_data(
2470 cmd, SILC_COMMAND_JOIN,
2471 SILC_STATUS_ERR_UNKNOWN_ALGORITHM,
2472 0, 2, cipher, strlen(cipher));
2474 silc_server_command_send_status_data(
2475 cmd, SILC_COMMAND_JOIN,
2476 SILC_STATUS_ERR_UNKNOWN_ALGORITHM,
2477 0, 2, hmac, strlen(hmac));
2479 silc_server_command_send_status_reply(
2480 cmd, SILC_COMMAND_JOIN,
2481 SILC_STATUS_ERR_RESOURCE_LIMIT,
2487 umode = (SILC_CHANNEL_UMODE_CHANOP | SILC_CHANNEL_UMODE_CHANFO);
2493 /* The channel does not exist on our server. If we are normal server
2494 we will send JOIN command to our router which will handle the
2495 joining procedure (either creates the channel if it doesn't exist
2496 or joins the client to it). */
2497 if (server->server_type != SILC_ROUTER) {
2499 SilcUInt16 old_ident;
2501 /* If this is pending command callback then we've resolved
2502 it and it didn't work, return since we've notified the
2503 client already in the command reply callback. */
2508 cmd->server->stat.commands_sent++;
2510 old_ident = silc_command_get_ident(cmd->payload);
2511 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
2512 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
2514 /* Send JOIN command to our router */
2515 silc_server_packet_send(server, SILC_PRIMARY_ROUTE(server),
2516 SILC_PACKET_COMMAND, cmd->packet->flags,
2517 tmpbuf->data, silc_buffer_len(tmpbuf));
2519 /* Reprocess this packet after received reply from router */
2520 silc_server_command_pending(server, SILC_COMMAND_JOIN,
2521 silc_command_get_ident(cmd->payload),
2522 silc_server_command_join,
2523 silc_server_command_dup(cmd));
2524 cmd->pending = TRUE;
2525 silc_command_set_ident(cmd->payload, old_ident);
2526 silc_buffer_free(tmpbuf);
2530 /* We are router and the channel does not seem exist so we will check
2531 our global list as well for the channel. */
2532 channel = silc_idlist_find_channel_by_name(server->global_list,
2533 channel_namec, NULL);
2535 /* Channel really does not exist, create it */
2536 channel = silc_server_create_new_channel(server, server->id, cipher,
2537 hmac, channel_name, TRUE);
2540 silc_server_command_send_status_data(
2541 cmd, SILC_COMMAND_JOIN,
2542 SILC_STATUS_ERR_UNKNOWN_ALGORITHM,
2543 0, 2, cipher, strlen(cipher));
2545 silc_server_command_send_status_data(
2546 cmd, SILC_COMMAND_JOIN,
2547 SILC_STATUS_ERR_UNKNOWN_ALGORITHM,
2548 0, 2, hmac, strlen(hmac));
2550 silc_server_command_send_status_reply(
2551 cmd, SILC_COMMAND_JOIN,
2552 SILC_STATUS_ERR_RESOURCE_LIMIT,
2558 umode = (SILC_CHANNEL_UMODE_CHANOP | SILC_CHANNEL_UMODE_CHANFO);
2566 /* Channel not found */
2568 /* If the command came from router and we are normal server then
2569 something went wrong with the joining as the channel was not found.
2570 We can't do anything else but ignore this. */
2571 if (idata->conn_type == SILC_CONN_ROUTER ||
2572 server->server_type != SILC_ROUTER)
2575 /* We are router and the channel does not seem exist so we will check
2576 our global list as well for the channel. */
2577 channel = silc_idlist_find_channel_by_name(server->global_list,
2578 channel_namec, NULL);
2580 /* Channel really does not exist, create it */
2581 channel = silc_server_create_new_channel(server, server->id, cipher,
2582 hmac, channel_name, TRUE);
2585 silc_server_command_send_status_data(
2586 cmd, SILC_COMMAND_JOIN,
2587 SILC_STATUS_ERR_UNKNOWN_ALGORITHM,
2588 0, 2, cipher, strlen(cipher));
2590 silc_server_command_send_status_data(
2591 cmd, SILC_COMMAND_JOIN,
2592 SILC_STATUS_ERR_UNKNOWN_ALGORITHM,
2593 0, 2, hmac, strlen(hmac));
2595 silc_server_command_send_status_reply(
2596 cmd, SILC_COMMAND_JOIN,
2597 SILC_STATUS_ERR_RESOURCE_LIMIT,
2603 umode = (SILC_CHANNEL_UMODE_CHANOP | SILC_CHANNEL_UMODE_CHANFO);
2610 /* Check whether the channel was created by our router */
2611 if (cmd->pending && context2) {
2612 SilcServerCommandReplyContext reply = context2;
2614 if (silc_command_get(reply->payload) == SILC_COMMAND_JOIN) {
2615 tmp = silc_argument_get_arg_type(reply->args, 6, NULL);
2616 SILC_GET32_MSB(created, tmp);
2617 if (silc_argument_get_arg_type(reply->args, 7, NULL))
2618 create_key = FALSE; /* Router returned the key already */
2620 if (silc_command_get_status(reply->payload, NULL, NULL) &&
2621 channel->mode & SILC_CHANNEL_MODE_PASSPHRASE) {
2622 /* Save channel passphrase, if user provided it successfully */
2625 pa = silc_argument_get_arg_type(cmd->args, 3, &pa_len);
2627 silc_free(channel->passphrase);
2628 channel->passphrase = silc_memdup(pa, pa_len);
2633 if (silc_command_get(reply->payload) == SILC_COMMAND_WHOIS &&
2634 !channel->disabled && !silc_hash_table_count(channel->user_list))
2638 /* If the channel does not have global users and is also empty the client
2639 will be the channel founder and operator. */
2640 if (!channel->disabled &&
2641 !channel->global_users && !silc_hash_table_count(channel->user_list))
2642 umode = (SILC_CHANNEL_UMODE_CHANOP | SILC_CHANNEL_UMODE_CHANFO);
2644 /* Join to the channel */
2645 silc_server_command_join_channel(server, cmd, channel, SILC_ID_GET_ID(id),
2646 created, create_key, umode,
2647 auth, auth_len, cauth, cauth_len);
2650 silc_free(channel_namec);
2651 silc_server_command_free(cmd);
2654 /* Server side of command MOTD. Sends server's current "message of the
2655 day" to the client. */
2657 SILC_SERVER_CMD_FUNC(motd)
2659 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
2660 SilcServer server = cmd->server;
2662 char *motd, *dest_server = NULL;
2663 SilcUInt32 motd_len;
2664 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
2666 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_MOTD, cmd, 1, 1);
2668 /* Get server name */
2669 dest_server = silc_argument_get_arg_type(cmd->args, 1, NULL);
2671 silc_server_command_send_status_reply(cmd, SILC_COMMAND_MOTD,
2672 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
2677 /* Check server name */
2678 dest_server = silc_identifier_check(dest_server, strlen(dest_server),
2679 SILC_STRING_UTF8, 256, NULL);
2681 silc_server_command_send_status_reply(cmd, SILC_COMMAND_MOTD,
2682 SILC_STATUS_ERR_BAD_SERVER,
2687 if (!memcmp(dest_server, server->server_name, strlen(dest_server))) {
2690 idp = silc_id_payload_encode(server->id_entry->id, SILC_ID_SERVER);
2692 if (server->config && server->config->server_info &&
2693 server->config->server_info->motd_file) {
2695 motd = silc_file_readfile(server->config->server_info->motd_file,
2699 silc_server_send_command_reply(server, cmd->sock, SILC_COMMAND_MOTD,
2700 SILC_STATUS_OK, 0, ident, 1,
2701 2, idp->data, silc_buffer_len(idp));
2706 silc_server_send_command_reply(server, cmd->sock, SILC_COMMAND_MOTD,
2707 SILC_STATUS_OK, 0, ident, 2,
2708 2, idp->data, silc_buffer_len(idp),
2712 silc_server_send_command_reply(server, cmd->sock, SILC_COMMAND_MOTD,
2713 SILC_STATUS_OK, 0, ident, 1,
2714 2, idp->data, silc_buffer_len(idp));
2716 silc_buffer_free(idp);
2718 SilcServerEntry entry;
2720 /* Check whether we have this server cached */
2721 entry = silc_idlist_find_server_by_name(server->global_list,
2722 dest_server, TRUE, NULL);
2724 entry = silc_idlist_find_server_by_name(server->local_list,
2725 dest_server, TRUE, NULL);
2728 if (server->server_type != SILC_SERVER && !cmd->pending &&
2729 entry && !entry->motd) {
2730 /* Send to the server */
2732 SilcUInt16 old_ident;
2735 cmd->server->stat.commands_sent++;
2737 old_ident = silc_command_get_ident(cmd->payload);
2738 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
2739 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
2741 silc_server_packet_send(server, entry->connection,
2742 SILC_PACKET_COMMAND, cmd->packet->flags,
2743 tmpbuf->data, silc_buffer_len(tmpbuf));
2745 /* Reprocess this packet after received reply from router */
2746 silc_server_command_pending(server, SILC_COMMAND_MOTD,
2747 silc_command_get_ident(cmd->payload),
2748 silc_server_command_motd,
2749 silc_server_command_dup(cmd));
2750 cmd->pending = TRUE;
2751 silc_command_set_ident(cmd->payload, old_ident);
2752 silc_buffer_free(tmpbuf);
2756 /* Send to primary router only if we don't know the server
2757 * the client requested or if the server is not locally connected */
2758 if ((!entry || !(entry->data.status & SILC_IDLIST_STATUS_LOCAL))
2759 && !cmd->pending && !server->standalone) {
2760 /* Send to the primary router */
2762 SilcUInt16 old_ident;
2765 cmd->server->stat.commands_sent++;
2767 old_ident = silc_command_get_ident(cmd->payload);
2768 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
2769 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
2771 silc_server_packet_send(server, SILC_PRIMARY_ROUTE(server),
2772 SILC_PACKET_COMMAND, cmd->packet->flags,
2773 tmpbuf->data, silc_buffer_len(tmpbuf));
2775 /* Reprocess this packet after received reply from router */
2776 silc_server_command_pending(server, SILC_COMMAND_MOTD,
2777 silc_command_get_ident(cmd->payload),
2778 silc_server_command_motd,
2779 silc_server_command_dup(cmd));
2780 cmd->pending = TRUE;
2781 silc_command_set_ident(cmd->payload, old_ident);
2782 silc_buffer_free(tmpbuf);
2787 silc_free(dest_server);
2788 dest_server = silc_argument_get_arg_type(cmd->args, 1, NULL);
2789 silc_server_command_send_status_data(cmd, SILC_COMMAND_MOTD,
2790 SILC_STATUS_ERR_NO_SUCH_SERVER, 0,
2792 strlen(dest_server));
2797 idp = silc_id_payload_encode(entry->id, SILC_ID_SERVER);
2798 silc_server_send_command_reply(server, cmd->sock, SILC_COMMAND_MOTD,
2799 SILC_STATUS_OK, 0, ident, 2,
2800 2, idp->data, silc_buffer_len(idp),
2803 strlen(entry->motd) : 0);
2804 silc_buffer_free(idp);
2808 silc_free(dest_server);
2809 silc_server_command_free(cmd);
2812 /* Server side of command UMODE. Client can use this command to set/unset
2813 user mode. Client actually cannot set itself to be as server/router
2814 operator so this can be used only to unset the modes. */
2816 SILC_SERVER_CMD_FUNC(umode)
2818 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
2819 SilcServer server = cmd->server;
2820 SilcClientEntry client = silc_packet_get_context(cmd->sock);
2821 unsigned char *tmp_mask, m[4];
2822 SilcUInt32 mask = 0;
2823 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
2824 SilcBool set_mask = FALSE;
2826 if (client->data.conn_type != SILC_CONN_CLIENT || !client)
2829 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_UMODE, cmd, 1, 2);
2831 /* Get the client's mode mask */
2832 tmp_mask = silc_argument_get_arg_type(cmd->args, 2, NULL);
2834 SILC_GET32_MSB(mask, tmp_mask);
2839 /* Check that mode changing is allowed. */
2840 if (!silc_server_check_umode_rights(server, client, mask)) {
2841 silc_server_command_send_status_reply(cmd, SILC_COMMAND_UMODE,
2842 SILC_STATUS_ERR_PERM_DENIED, 0);
2846 /* Anonymous mode cannot be set by client */
2847 if (mask & SILC_UMODE_ANONYMOUS &&
2848 !(client->mode & SILC_UMODE_ANONYMOUS)) {
2849 silc_server_command_send_status_reply(cmd, SILC_COMMAND_UMODE,
2850 SILC_STATUS_ERR_PERM_DENIED, 0);
2854 /* Update statistics */
2855 if (mask & SILC_UMODE_GONE) {
2856 if (!(client->mode & SILC_UMODE_GONE))
2857 server->stat.my_aways++;
2859 if (client->mode & SILC_UMODE_GONE)
2860 server->stat.my_aways--;
2863 /* If the client has anonymous mode set, preserve it. */
2864 if (client->mode & SILC_UMODE_ANONYMOUS)
2865 mask |= SILC_UMODE_ANONYMOUS;
2867 /* Change the mode */
2868 client->mode = mask;
2870 /* Send UMODE change to primary router */
2871 silc_server_send_notify_umode(server, SILC_PRIMARY_ROUTE(server),
2872 SILC_BROADCAST(server), client->id,
2875 /* Check if anyone is watching this nickname */
2876 if (server->server_type == SILC_ROUTER)
2877 silc_server_check_watcher_list(server, client, NULL,
2878 SILC_NOTIFY_TYPE_UMODE_CHANGE);
2881 /* Send command reply to sender */
2882 SILC_PUT32_MSB(client->mode, m);
2883 silc_server_send_command_reply(server, cmd->sock, SILC_COMMAND_UMODE,
2884 SILC_STATUS_OK, 0, ident, 1,
2888 silc_server_command_free(cmd);
2891 /* Server side command of CMODE. Changes channel mode */
2893 SILC_SERVER_CMD_FUNC(cmode)
2895 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
2896 SilcServer server = cmd->server;
2897 SilcClientEntry client = silc_packet_get_context(cmd->sock);
2898 SilcIDListData idata = (SilcIDListData)client;
2900 SilcChannelEntry channel;
2901 SilcChannelClientEntry chl;
2903 unsigned char *tmp, *tmp_id, *tmp_mask, *chpkdata = NULL;
2904 char *cipher = NULL, *hmac = NULL, *passphrase = NULL, ulimit[4];
2905 SilcUInt32 mode_mask = 0, old_mask = 0, tmp_len, tmp_len2, chpklen;
2906 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
2907 SilcBool set_mask = FALSE, set_chpk = FALSE;
2908 SilcPublicKey founder_key = NULL;
2909 SilcBuffer fkey = NULL, chpklist = NULL;
2910 SilcBufferStruct chpk;
2913 silc_server_command_free(cmd);
2917 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_CMODE, cmd, 1, 9);
2919 /* Get Channel ID */
2920 if (!silc_argument_get_decoded(cmd->args, 1, SILC_ARGUMENT_ID, &id, NULL)) {
2921 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
2922 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
2923 silc_server_command_free(cmd);
2927 /* Get channel entry */
2928 channel = silc_idlist_find_channel_by_id(server->local_list,
2929 SILC_ID_GET_ID(id), NULL);
2931 channel = silc_idlist_find_channel_by_id(server->global_list,
2932 SILC_ID_GET_ID(id), NULL);
2934 tmp_id = silc_argument_get_arg_type(cmd->args, 1, &tmp_len2);
2935 silc_server_command_send_status_data(cmd, SILC_COMMAND_CMODE,
2936 SILC_STATUS_ERR_NO_SUCH_CHANNEL_ID,
2937 0, 2, tmp_id, tmp_len2);
2938 silc_server_command_free(cmd);
2942 old_mask = channel->mode;
2944 /* Get the channel mode mask */
2945 tmp_mask = silc_argument_get_arg_type(cmd->args, 2, &tmp_len);
2947 SILC_GET32_MSB(mode_mask, tmp_mask);
2951 /* Check whether this client is on the channel */
2952 if (!silc_server_client_on_channel(client, channel, &chl)) {
2953 tmp_id = silc_argument_get_arg_type(cmd->args, 1, &tmp_len2);
2954 silc_server_command_send_status_data(cmd, SILC_COMMAND_CMODE,
2955 SILC_STATUS_ERR_NOT_ON_CHANNEL, 0,
2956 2, tmp_id, tmp_len2);
2960 /* Check that client has rights to change any requested channel modes */
2961 if (set_mask && !silc_server_check_cmode_rights(server, channel, chl,
2963 SILC_LOG_DEBUG(("Client does not have rights to change mode"));
2964 tmp_id = silc_argument_get_arg_type(cmd->args, 1, &tmp_len2);
2965 silc_server_command_send_status_data(
2966 cmd, SILC_COMMAND_CMODE,
2967 (!(chl->mode & SILC_CHANNEL_UMODE_CHANOP) ?
2968 SILC_STATUS_ERR_NO_CHANNEL_PRIV :
2969 SILC_STATUS_ERR_NO_CHANNEL_FOPRIV), 0,
2970 2, tmp_id, tmp_len2);
2974 /* If mode mask was not sent as argument then merely return the current
2975 mode mask, founder key and channel public key list to the sender. */
2978 SILC_PUT32_MSB(channel->mode, m);
2979 if (channel->founder_key)
2980 fkey = silc_public_key_payload_encode(channel->founder_key);
2981 if (channel->channel_pubkeys)
2982 chpklist = silc_server_get_channel_pk_list(server, channel,
2984 tmp_id = silc_argument_get_arg_type(cmd->args, 1, &tmp_len2);
2985 silc_server_send_command_reply(server, cmd->sock, SILC_COMMAND_CMODE,
2986 SILC_STATUS_OK, 0, ident, 4,
2987 2, tmp_id, tmp_len2,
2989 4, fkey ? fkey->data : NULL,
2990 fkey ? silc_buffer_len(fkey) : 0,
2991 5, chpklist ? chpklist->data : NULL,
2992 chpklist ? silc_buffer_len(chpklist) : 0);
2997 * Check the modes. Modes that requires nothing special operation are
3001 if (mode_mask & SILC_CHANNEL_MODE_PRIVKEY) {
3002 /* Channel uses private keys to protect traffic. Client(s) has set the
3003 key locally they want to use, server does not know that key. */
3004 /* Nothing interesting to do here */
3006 if (channel->mode & SILC_CHANNEL_MODE_PRIVKEY) {
3007 /* The mode is removed and we need to generate and distribute
3008 new channel key. Clients are not using private channel keys
3009 anymore after this. */
3011 /* if we don't remove the flag from the mode
3012 * silc_server_create_channel_key won't create a new key */
3013 channel->mode &= ~SILC_CHANNEL_MODE_PRIVKEY;
3015 /* Re-generate channel key */
3016 if (!silc_server_create_channel_key(server, channel, 0))
3019 /* Send the channel key. This sends it to our local clients and if
3020 we are normal server to our router as well. */
3021 silc_server_send_channel_key(server, NULL, channel,
3022 server->server_type == SILC_ROUTER ?
3023 FALSE : !server->standalone);
3025 cipher = (char *)silc_cipher_get_name(channel->send_key);
3026 hmac = (char *)silc_hmac_get_name(channel->hmac);
3030 if (mode_mask & SILC_CHANNEL_MODE_ULIMIT) {
3031 /* User limit is set on channel */
3032 SilcUInt32 user_limit;
3034 /* Get user limit */
3035 tmp = silc_argument_get_arg_type(cmd->args, 3, NULL);
3037 if (!(channel->mode & SILC_CHANNEL_MODE_ULIMIT)) {
3038 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
3039 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS, 0);
3043 SILC_GET32_MSB(user_limit, tmp);
3044 channel->user_limit = user_limit;
3047 if (channel->mode & SILC_CHANNEL_MODE_ULIMIT)
3048 /* User limit mode is unset. Remove user limit */
3049 channel->user_limit = 0;
3052 if (mode_mask & SILC_CHANNEL_MODE_PASSPHRASE) {
3053 if (!(channel->mode & SILC_CHANNEL_MODE_PASSPHRASE)) {
3054 /* Passphrase has been set to channel */
3056 /* Get the passphrase */
3057 tmp = silc_argument_get_arg_type(cmd->args, 4, NULL);
3059 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
3060 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS, 0);
3064 /* Save the passphrase */
3065 passphrase = channel->passphrase = silc_memdup(tmp, strlen(tmp));
3068 if (channel->mode & SILC_CHANNEL_MODE_PASSPHRASE) {
3069 /* Passphrase mode is unset. remove the passphrase */
3070 silc_free(channel->passphrase);
3071 channel->passphrase = NULL;
3075 if (mode_mask & SILC_CHANNEL_MODE_CIPHER) {
3076 if (!(channel->mode & SILC_CHANNEL_MODE_CIPHER)) {
3077 /* Cipher to use protect the traffic */
3078 SilcCipher send_key, receive_key, olds, oldr;
3081 cipher = silc_argument_get_arg_type(cmd->args, 5, NULL);
3083 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
3084 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS, 0);
3088 /* Delete old cipher and allocate the new one */
3089 if (!silc_cipher_alloc(cipher, &send_key)) {
3090 silc_server_command_send_status_data(
3091 cmd, SILC_COMMAND_CMODE,
3092 SILC_STATUS_ERR_UNKNOWN_ALGORITHM, 0,
3093 2, cipher, strlen(cipher));
3096 if (!silc_cipher_alloc(cipher, &receive_key)) {
3097 silc_server_command_send_status_data(
3098 cmd, SILC_COMMAND_CMODE,
3099 SILC_STATUS_ERR_UNKNOWN_ALGORITHM, 0,
3100 2, cipher, strlen(cipher));
3104 olds = channel->send_key;
3105 oldr = channel->receive_key;
3106 channel->send_key = send_key;
3107 channel->receive_key = receive_key;
3109 /* Re-generate channel key */
3110 if (!silc_server_create_channel_key(server, channel, 0)) {
3111 /* We don't have new key, revert to old one */
3112 channel->send_key = olds;
3113 channel->receive_key = oldr;
3117 /* Remove old channel key for good */
3118 silc_cipher_free(olds);
3119 silc_cipher_free(oldr);
3121 /* Send the channel key. This sends it to our local clients and if
3122 we are normal server to our router as well. */
3123 silc_server_send_channel_key(server, NULL, channel,
3124 server->server_type == SILC_ROUTER ?
3125 FALSE : !server->standalone);
3128 if (channel->mode & SILC_CHANNEL_MODE_CIPHER) {
3129 /* Cipher mode is unset. Remove the cipher and revert back to
3131 SilcCipher send_key, receive_key, olds, oldr;
3132 cipher = channel->cipher;
3134 /* Delete old cipher and allocate default one */
3135 if (!silc_cipher_alloc(cipher ? cipher : SILC_DEFAULT_CIPHER,
3137 silc_server_command_send_status_data(
3138 cmd, SILC_COMMAND_CMODE,
3139 SILC_STATUS_ERR_UNKNOWN_ALGORITHM, 0,
3140 2, cipher, strlen(cipher));
3143 if (!silc_cipher_alloc(cipher ? cipher : SILC_DEFAULT_CIPHER,
3145 silc_server_command_send_status_data(
3146 cmd, SILC_COMMAND_CMODE,
3147 SILC_STATUS_ERR_UNKNOWN_ALGORITHM, 0,
3148 2, cipher, strlen(cipher));
3152 olds = channel->send_key;
3153 oldr = channel->receive_key;
3154 channel->send_key = send_key;
3155 channel->receive_key = receive_key;
3157 /* Re-generate channel key */
3158 if (!silc_server_create_channel_key(server, channel, 0)) {
3159 /* We don't have new key, revert to old one */
3160 channel->send_key = olds;
3161 channel->receive_key = oldr;
3165 /* Remove old channel key for good */
3166 silc_cipher_free(olds);
3167 silc_cipher_free(oldr);
3169 /* Send the channel key. This sends it to our local clients and if
3170 we are normal server to our router as well. */
3171 silc_server_send_channel_key(server, NULL, channel,
3172 server->server_type == SILC_ROUTER ?
3173 FALSE : !server->standalone);
3177 if (mode_mask & SILC_CHANNEL_MODE_HMAC) {
3178 if (!(channel->mode & SILC_CHANNEL_MODE_HMAC)) {
3179 /* HMAC to use protect the traffic */
3180 unsigned char hash[SILC_HASH_MAXLEN];
3184 hmac = silc_argument_get_arg_type(cmd->args, 6, NULL);
3186 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
3187 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS, 0);
3191 /* Delete old hmac and allocate the new one */
3192 if (!silc_hmac_alloc(hmac, NULL, &newhmac)) {
3193 silc_server_command_send_status_data(
3194 cmd, SILC_COMMAND_CMODE,
3195 SILC_STATUS_ERR_UNKNOWN_ALGORITHM, 0,
3196 2, hmac, strlen(hmac));
3200 silc_hmac_free(channel->hmac);
3201 channel->hmac = newhmac;
3203 /* Set the HMAC key out of current channel key. The client must do
3205 silc_hash_make(silc_hmac_get_hash(channel->hmac), channel->key,
3206 channel->key_len / 8, hash);
3207 silc_hmac_set_key(channel->hmac, hash,
3208 silc_hash_len(silc_hmac_get_hash(channel->hmac)));
3209 memset(hash, 0, sizeof(hash));
3212 if (channel->mode & SILC_CHANNEL_MODE_HMAC) {
3213 /* Hmac mode is unset. Remove the hmac and revert back to
3216 unsigned char hash[SILC_HASH_MAXLEN];
3217 hmac = channel->hmac_name;
3219 /* Delete old hmac and allocate default one */
3220 if (!silc_hmac_alloc(hmac ? hmac : SILC_DEFAULT_HMAC, NULL, &newhmac)) {
3221 silc_server_command_send_status_data(
3222 cmd, SILC_COMMAND_CMODE,
3223 SILC_STATUS_ERR_UNKNOWN_ALGORITHM, 0,
3224 2, hmac, strlen(hmac));
3228 silc_hmac_free(channel->hmac);
3229 channel->hmac = newhmac;
3231 /* Set the HMAC key out of current channel key. The client must do
3233 silc_hash_make(silc_hmac_get_hash(channel->hmac), channel->key,
3234 channel->key_len / 8,
3236 silc_hmac_set_key(channel->hmac, hash,
3237 silc_hash_len(silc_hmac_get_hash(channel->hmac)));
3238 memset(hash, 0, sizeof(hash));
3242 if (mode_mask & SILC_CHANNEL_MODE_FOUNDER_AUTH) {
3243 if (chl->mode & SILC_CHANNEL_UMODE_CHANFO) {
3244 /* Check if the founder public key was received */
3245 founder_key = idata->public_key;
3246 tmp = silc_argument_get_arg_type(cmd->args, 8, &tmp_len);
3248 if (!silc_public_key_payload_decode(tmp, tmp_len, &founder_key)) {
3249 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
3250 SILC_STATUS_ERR_AUTH_FAILED,
3255 /* If key was not sent and the channel mode has already founder
3256 then the key was not to be changed. */
3257 if (channel->mode & SILC_CHANNEL_MODE_FOUNDER_AUTH)
3261 /* Set the founder authentication */
3262 tmp = silc_argument_get_arg_type(cmd->args, 7, &tmp_len);
3264 silc_server_command_send_status_reply(
3265 cmd, SILC_COMMAND_CMODE,
3266 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS, 0);
3270 /* Verify the payload before setting the mode */
3271 if (!silc_auth_verify_data(tmp, tmp_len, SILC_AUTH_PUBLIC_KEY,
3272 founder_key, 0, server->sha1hash,
3273 client->id, SILC_ID_CLIENT)) {
3274 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
3275 SILC_STATUS_ERR_AUTH_FAILED,
3280 /* Save the public key */
3281 if (channel->founder_key)
3282 silc_pkcs_public_key_free(channel->founder_key);
3283 if (silc_argument_get_arg_type(cmd->args, 8, NULL))
3284 channel->founder_key = founder_key;
3286 channel->founder_key = silc_pkcs_public_key_copy(founder_key);
3287 if (!channel->founder_key) {
3288 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
3289 SILC_STATUS_ERR_AUTH_FAILED,
3294 fkey = silc_public_key_payload_encode(channel->founder_key);
3296 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
3297 SILC_STATUS_ERR_AUTH_FAILED,
3299 silc_pkcs_public_key_free(channel->founder_key);
3300 channel->founder_key = NULL;
3305 if (chl->mode & SILC_CHANNEL_UMODE_CHANFO) {
3306 if (channel->mode & SILC_CHANNEL_MODE_FOUNDER_AUTH) {
3307 if (channel->founder_key)
3308 silc_pkcs_public_key_free(channel->founder_key);
3309 channel->founder_key = NULL;
3315 if (mode_mask & SILC_CHANNEL_MODE_CHANNEL_AUTH) {
3316 if (chl->mode & SILC_CHANNEL_UMODE_CHANFO) {
3319 chpkdata = silc_argument_get_arg_type(cmd->args, 9, &chpklen);
3321 if (!chpkdata && channel->mode & SILC_CHANNEL_MODE_CHANNEL_AUTH)
3326 /* Process the channel public key(s) */
3327 st = silc_server_set_channel_pk_list(server, NULL, channel,
3329 if (st != SILC_STATUS_OK) {
3330 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE, st, 0);
3335 if (chl->mode & SILC_CHANNEL_UMODE_CHANFO) {
3336 if (channel->mode & SILC_CHANNEL_MODE_CHANNEL_AUTH) {
3337 if (channel->channel_pubkeys)
3338 silc_hash_table_free(channel->channel_pubkeys);
3339 channel->channel_pubkeys = NULL;
3346 /* Finally, set the mode */
3347 old_mask = channel->mode = mode_mask;
3349 /* Send CMODE_CHANGE notify. */
3350 cidp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
3351 if (mode_mask & SILC_CHANNEL_MODE_ULIMIT)
3352 SILC_PUT32_MSB(channel->user_limit, ulimit);
3353 silc_server_send_notify_to_channel(server, NULL, channel, FALSE, TRUE,
3354 SILC_NOTIFY_TYPE_CMODE_CHANGE, 8,
3355 cidp->data, silc_buffer_len(cidp),
3357 cipher, cipher ? strlen(cipher) : 0,
3358 hmac, hmac ? strlen(hmac) : 0,
3359 passphrase, passphrase ?
3360 strlen(passphrase) : 0,
3361 fkey ? fkey->data : NULL,
3362 fkey ? silc_buffer_len(fkey) : 0,
3363 chpkdata ? chpkdata : NULL,
3364 chpkdata ? chpklen : 0,
3365 mode_mask & SILC_CHANNEL_MODE_ULIMIT ?
3367 mode_mask & SILC_CHANNEL_MODE_ULIMIT ?
3368 sizeof(ulimit) : 0);
3370 /* Set CMODE notify type to network */
3371 if (chpkdata && chpklen)
3372 silc_buffer_set(&chpk, chpkdata, chpklen);
3373 silc_server_send_notify_cmode(server, SILC_PRIMARY_ROUTE(server),
3374 SILC_BROADCAST(server), channel,
3375 mode_mask, client->id, SILC_ID_CLIENT,
3376 cipher, hmac, passphrase, founder_key,
3377 chpkdata ? &chpk : NULL);
3380 chpklist = silc_server_get_channel_pk_list(server, channel, FALSE, FALSE);
3382 /* Send command reply to sender */
3383 tmp_id = silc_argument_get_arg_type(cmd->args, 1, &tmp_len2);
3384 silc_server_send_command_reply(server, cmd->sock, SILC_COMMAND_CMODE,
3385 SILC_STATUS_OK, 0, ident, 5,
3386 2, tmp_id, tmp_len2,
3388 4, fkey ? fkey->data : NULL,
3389 fkey ? silc_buffer_len(fkey) : 0,
3390 5, chpklist ? chpklist->data :
3391 NULL, chpklist ? silc_buffer_len(chpklist)
3394 SILC_CHANNEL_MODE_ULIMIT ?
3397 SILC_CHANNEL_MODE_ULIMIT ?
3398 sizeof(ulimit) : 0));
3399 silc_buffer_free(cidp);
3402 channel->mode = old_mask;
3403 silc_buffer_free(chpklist);
3404 silc_buffer_free(fkey);
3405 silc_server_command_free(cmd);
3408 /* Server side of CUMODE command. Changes client's mode on a channel. */
3410 SILC_SERVER_CMD_FUNC(cumode)
3412 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
3413 SilcServer server = cmd->server;
3414 SilcClientEntry client = silc_packet_get_context(cmd->sock);
3416 SilcChannelEntry channel;
3417 SilcClientEntry target_client;
3418 SilcChannelClientEntry chl;
3420 unsigned char *tmp_id, *tmp_ch_id, *tmp_mask;
3421 SilcUInt32 target_mask, sender_mask = 0, tmp_len, tmp_ch_len;
3423 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
3424 SilcPublicKey founder_key = NULL;
3425 SilcBuffer fkey = NULL;
3430 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_CUMODE, cmd, 3, 4);
3432 /* Get Channel ID */
3433 if (!silc_argument_get_decoded(cmd->args, 1, SILC_ARGUMENT_ID, &id, NULL)) {
3434 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3435 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
3439 /* Get channel entry */
3440 channel = silc_idlist_find_channel_by_id(server->local_list,
3441 SILC_ID_GET_ID(id), NULL);
3443 channel = silc_idlist_find_channel_by_id(server->global_list,
3444 SILC_ID_GET_ID(id), NULL);
3446 tmp_ch_id = silc_argument_get_arg_type(cmd->args, 1, &tmp_ch_len);
3447 silc_server_command_send_status_data(cmd, SILC_COMMAND_CUMODE,
3448 SILC_STATUS_ERR_NO_SUCH_CHANNEL_ID,
3449 0, 2, tmp_ch_id, tmp_ch_len);
3454 /* Check whether sender is on the channel */
3455 if (!silc_server_client_on_channel(client, channel, &chl)) {
3456 tmp_ch_id = silc_argument_get_arg_type(cmd->args, 1, &tmp_ch_len);
3457 silc_server_command_send_status_data(cmd, SILC_COMMAND_CUMODE,
3458 SILC_STATUS_ERR_NOT_ON_CHANNEL, 0,
3459 2, tmp_ch_id, tmp_ch_len);
3462 sender_mask = chl->mode;
3464 /* Get the target client's channel mode mask */
3465 tmp_mask = silc_argument_get_arg_type(cmd->args, 2, NULL);
3467 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3468 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
3472 SILC_GET32_MSB(target_mask, tmp_mask);
3474 /* Get target Client ID */
3475 if (!silc_argument_get_decoded(cmd->args, 3, SILC_ARGUMENT_ID, &id2, NULL)) {
3476 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3477 SILC_STATUS_ERR_NO_CLIENT_ID, 0);
3481 /* Get target client's entry */
3482 target_client = silc_idlist_find_client_by_id(server->local_list,
3483 SILC_ID_GET_ID(id2),
3486 target_client = silc_idlist_find_client_by_id(server->global_list,
3487 SILC_ID_GET_ID(id2),
3490 if (target_client != client &&
3491 !(sender_mask & SILC_CHANNEL_UMODE_CHANFO) &&
3492 !(sender_mask & SILC_CHANNEL_UMODE_CHANOP)) {
3493 tmp_ch_id = silc_argument_get_arg_type(cmd->args, 1, &tmp_ch_len);
3494 silc_server_command_send_status_data(cmd, SILC_COMMAND_CUMODE,
3495 SILC_STATUS_ERR_NOT_YOU, 0,
3496 2, tmp_ch_id, tmp_ch_len);
3500 /* Check whether target client is on the channel */
3501 if (target_client != client) {
3502 if (!silc_server_client_on_channel(target_client, channel, &chl)) {
3503 tmp_ch_id = silc_argument_get_arg_type(cmd->args, 1, &tmp_ch_len);
3504 tmp_id = silc_argument_get_arg_type(cmd->args, 3, &tmp_len);
3505 silc_server_command_send_status_data2(
3506 cmd, SILC_COMMAND_CUMODE,
3507 SILC_STATUS_ERR_USER_NOT_ON_CHANNEL, 0,
3509 3, tmp_ch_id, tmp_ch_len);
3518 /* If the target client is founder, no one else can change their mode
3520 if (chl->mode & SILC_CHANNEL_UMODE_CHANFO && client != target_client) {
3521 tmp_ch_id = silc_argument_get_arg_type(cmd->args, 1, &tmp_ch_len);
3522 silc_server_command_send_status_data(cmd, SILC_COMMAND_CUMODE,
3523 SILC_STATUS_ERR_NO_CHANNEL_FOPRIV,
3524 0, 2, tmp_ch_id, tmp_ch_len);
3528 if (target_mask & SILC_CHANNEL_UMODE_CHANFO) {
3529 if (target_client != client) {
3530 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3531 SILC_STATUS_ERR_NO_CHANNEL_FOPRIV,
3536 if (!(chl->mode & SILC_CHANNEL_UMODE_CHANFO)) {
3537 /* The client tries to claim the founder rights. */
3538 unsigned char *tmp_auth;
3539 SilcUInt32 tmp_auth_len;
3540 SilcChannelClientEntry chl2;
3541 SilcHashTableList htl;
3543 if (!(channel->mode & SILC_CHANNEL_MODE_FOUNDER_AUTH) ||
3544 !channel->founder_key) {
3545 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3546 SILC_STATUS_ERR_AUTH_FAILED, 0);
3550 tmp_auth = silc_argument_get_arg_type(cmd->args, 4, &tmp_auth_len);
3552 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3553 SILC_STATUS_ERR_AUTH_FAILED, 0);
3557 /* Verify the authentication payload */
3558 if (!silc_auth_verify_data(tmp_auth, tmp_auth_len, SILC_AUTH_PUBLIC_KEY,
3559 channel->founder_key, 0, server->sha1hash,
3560 client->id, SILC_ID_CLIENT)) {
3561 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3562 SILC_STATUS_ERR_AUTH_FAILED, 0);
3567 founder_key = channel->founder_key;
3568 fkey = silc_public_key_payload_encode(founder_key);
3570 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3571 SILC_STATUS_ERR_AUTH_FAILED, 0);
3575 /* There cannot be anyone else as founder on the channel now. This
3576 client is definitely the founder due to this authentication. This
3577 is done only on router, not on server, since server cannot know
3578 whether router will accept this mode change or not. XXX This
3579 probably shouldn't be done anymore at all, may cause problems in
3580 router-router connections too (maybe just AUTH_FAILED error should
3581 be returned). -Pekka */
3582 if (server->server_type == SILC_ROUTER) {
3583 silc_hash_table_list(channel->user_list, &htl);
3584 while (silc_hash_table_get(&htl, NULL, (void *)&chl2))
3585 if (chl2->mode & SILC_CHANNEL_UMODE_CHANFO) {
3586 chl2->mode &= ~SILC_CHANNEL_UMODE_CHANFO;
3587 silc_server_force_cumode_change(server, NULL, channel, chl2,
3591 silc_hash_table_list_reset(&htl);
3594 sender_mask = chl->mode |= SILC_CHANNEL_UMODE_CHANFO;
3597 if (chl->mode & SILC_CHANNEL_UMODE_CHANFO) {
3598 if (target_client == client) {
3599 /* Remove channel founder rights from itself */
3600 chl->mode &= ~SILC_CHANNEL_UMODE_CHANFO;
3603 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3604 SILC_STATUS_ERR_NOT_YOU, 0);
3610 if (target_mask & SILC_CHANNEL_UMODE_CHANOP) {
3611 /* Promote to operator */
3612 if (!(chl->mode & SILC_CHANNEL_UMODE_CHANOP)) {
3613 if (!(sender_mask & SILC_CHANNEL_UMODE_CHANOP) &&
3614 !(sender_mask & SILC_CHANNEL_UMODE_CHANFO)) {
3615 tmp_ch_id = silc_argument_get_arg_type(cmd->args, 1, &tmp_ch_len);
3616 silc_server_command_send_status_data(cmd, SILC_COMMAND_CUMODE,
3617 SILC_STATUS_ERR_NO_CHANNEL_PRIV,
3618 0, 2, tmp_ch_id, tmp_ch_len);
3622 chl->mode |= SILC_CHANNEL_UMODE_CHANOP;
3626 if (chl->mode & SILC_CHANNEL_UMODE_CHANOP) {
3627 if (!(sender_mask & SILC_CHANNEL_UMODE_CHANOP) &&
3628 !(sender_mask & SILC_CHANNEL_UMODE_CHANFO)) {
3629 tmp_ch_id = silc_argument_get_arg_type(cmd->args, 1, &tmp_ch_len);
3630 silc_server_command_send_status_data(cmd, SILC_COMMAND_CUMODE,
3631 SILC_STATUS_ERR_NO_CHANNEL_PRIV,
3632 0, 2, tmp_ch_id, tmp_ch_len);
3636 /* Demote to normal user */
3637 chl->mode &= ~SILC_CHANNEL_UMODE_CHANOP;
3642 if (target_mask & SILC_CHANNEL_UMODE_BLOCK_MESSAGES) {
3643 if (target_client != client) {
3644 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3645 SILC_STATUS_ERR_NOT_YOU, 0);
3649 if (!(chl->mode & SILC_CHANNEL_UMODE_BLOCK_MESSAGES)) {
3650 chl->mode |= SILC_CHANNEL_UMODE_BLOCK_MESSAGES;
3654 if (chl->mode & SILC_CHANNEL_UMODE_BLOCK_MESSAGES) {
3655 if (target_client != client) {
3656 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3657 SILC_STATUS_ERR_NOT_YOU, 0);
3661 chl->mode &= ~SILC_CHANNEL_UMODE_BLOCK_MESSAGES;
3666 if (target_mask & SILC_CHANNEL_UMODE_BLOCK_MESSAGES_USERS) {
3667 if (target_client != client) {
3668 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3669 SILC_STATUS_ERR_NOT_YOU, 0);
3673 if (!(chl->mode & SILC_CHANNEL_UMODE_BLOCK_MESSAGES_USERS)) {
3674 chl->mode |= SILC_CHANNEL_UMODE_BLOCK_MESSAGES_USERS;
3678 if (chl->mode & SILC_CHANNEL_UMODE_BLOCK_MESSAGES_USERS) {
3679 if (target_client != client) {
3680 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3681 SILC_STATUS_ERR_NOT_YOU, 0);
3685 chl->mode &= ~SILC_CHANNEL_UMODE_BLOCK_MESSAGES_USERS;
3690 if (target_mask & SILC_CHANNEL_UMODE_BLOCK_MESSAGES_ROBOTS) {
3691 if (target_client != client) {
3692 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3693 SILC_STATUS_ERR_NOT_YOU, 0);
3697 if (!(chl->mode & SILC_CHANNEL_UMODE_BLOCK_MESSAGES_ROBOTS)) {
3698 chl->mode |= SILC_CHANNEL_UMODE_BLOCK_MESSAGES_ROBOTS;
3702 if (chl->mode & SILC_CHANNEL_UMODE_BLOCK_MESSAGES_ROBOTS) {
3703 if (target_client != client) {
3704 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3705 SILC_STATUS_ERR_NOT_YOU, 0);
3709 chl->mode &= ~SILC_CHANNEL_UMODE_BLOCK_MESSAGES_ROBOTS;
3714 if (target_mask & SILC_CHANNEL_UMODE_QUIET) {
3715 if (!(chl->mode & SILC_CHANNEL_UMODE_QUIET)) {
3716 if (client == target_client) {
3717 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3718 SILC_STATUS_ERR_PERM_DENIED, 0);
3721 chl->mode |= SILC_CHANNEL_UMODE_QUIET;
3725 if (chl->mode & SILC_CHANNEL_UMODE_QUIET) {
3726 if (client == target_client) {
3727 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3728 SILC_STATUS_ERR_PERM_DENIED, 0);
3731 chl->mode &= ~SILC_CHANNEL_UMODE_QUIET;
3736 idp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
3737 tmp_id = silc_argument_get_arg_type(cmd->args, 3, &tmp_len);
3738 tmp_ch_id = silc_argument_get_arg_type(cmd->args, 1, &tmp_ch_len);
3740 /* Send notify to channel, notify only if mode was actually changed. */
3742 silc_server_send_notify_to_channel(server, NULL, channel, FALSE, TRUE,
3743 SILC_NOTIFY_TYPE_CUMODE_CHANGE, 4,
3744 idp->data, silc_buffer_len(idp),
3747 fkey ? fkey->data : NULL,
3748 fkey ? silc_buffer_len(fkey) : 0);
3750 /* Set CUMODE notify type to network */
3751 silc_server_send_notify_cumode(server, SILC_PRIMARY_ROUTE(server),
3752 SILC_BROADCAST(server), channel,
3753 target_mask, client->id, SILC_ID_CLIENT,
3754 target_client->id, founder_key);
3757 /* Send command reply to sender */
3758 silc_server_send_command_reply(server, cmd->sock, SILC_COMMAND_CUMODE,
3759 SILC_STATUS_OK, 0, ident, 3,
3761 3, tmp_ch_id, tmp_ch_len,
3762 4, tmp_id, tmp_len);
3763 silc_buffer_free(idp);
3766 silc_buffer_free(fkey);
3767 silc_server_command_free(cmd);
3770 /* Server side of KICK command. Kicks client out of channel. */
3772 SILC_SERVER_CMD_FUNC(kick)
3774 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
3775 SilcServer server = cmd->server;
3776 SilcClientEntry client = silc_packet_get_context(cmd->sock);
3777 SilcClientEntry target_client;
3779 SilcChannelEntry channel;
3780 SilcChannelClientEntry chl;
3782 SilcUInt32 tmp_len, target_idp_len, clen;
3783 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
3784 unsigned char *tmp, *comment, *target_idp;
3789 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_LEAVE, cmd, 1, 3);
3791 /* Get Channel ID */
3792 if (!silc_argument_get_decoded(cmd->args, 1, SILC_ARGUMENT_ID, &id, NULL)) {
3793 silc_server_command_send_status_reply(cmd, SILC_COMMAND_KICK,
3794 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
3798 /* Get channel entry */
3799 channel = silc_idlist_find_channel_by_id(server->local_list,
3800 SILC_ID_GET_ID(id), NULL);
3802 channel = silc_idlist_find_channel_by_id(server->local_list,
3803 SILC_ID_GET_ID(id), NULL);
3805 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
3806 silc_server_command_send_status_data(cmd, SILC_COMMAND_KICK,
3807 SILC_STATUS_ERR_NO_SUCH_CHANNEL_ID,
3808 0, 2, tmp, tmp_len);
3813 /* Check whether sender is on the channel */
3814 if (!silc_server_client_on_channel(client, channel, &chl)) {
3815 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
3816 silc_server_command_send_status_data(cmd, SILC_COMMAND_KICK,
3817 SILC_STATUS_ERR_NOT_ON_CHANNEL,
3818 0, 2, tmp, tmp_len);
3822 /* Check that the kicker is channel operator or channel founder */
3823 if (!(chl->mode & SILC_CHANNEL_UMODE_CHANOP) &&
3824 !(chl->mode & SILC_CHANNEL_UMODE_CHANFO)) {
3825 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
3826 silc_server_command_send_status_data(cmd, SILC_COMMAND_KICK,
3827 SILC_STATUS_ERR_NO_CHANNEL_PRIV,
3828 0, 2, tmp, tmp_len);
3832 /* Get target Client ID */
3833 if (!silc_argument_get_decoded(cmd->args, 2, SILC_ARGUMENT_ID, &id2, NULL)) {
3834 silc_server_command_send_status_reply(cmd, SILC_COMMAND_KICK,
3835 SILC_STATUS_ERR_NO_CLIENT_ID, 0);
3839 /* Get target client's entry */
3840 target_client = silc_idlist_find_client_by_id(server->local_list,
3841 SILC_ID_GET_ID(id2),
3844 target_client = silc_idlist_find_client_by_id(server->global_list,
3845 SILC_ID_GET_ID(id2),
3848 /* Check whether target client is on the channel */
3849 if (!silc_server_client_on_channel(target_client, channel, &chl)) {
3850 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
3851 target_idp = silc_argument_get_arg_type(cmd->args, 2, &target_idp_len);
3852 silc_server_command_send_status_data2(cmd, SILC_COMMAND_KICK,
3853 SILC_STATUS_ERR_USER_NOT_ON_CHANNEL,
3854 0, 2, target_idp, target_idp_len,
3859 /* Check that the target client is not channel founder. Channel founder
3860 cannot be kicked from the channel. */
3861 if (chl->mode & SILC_CHANNEL_UMODE_CHANFO) {
3862 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
3863 silc_server_command_send_status_data(cmd, SILC_COMMAND_KICK,
3864 SILC_STATUS_ERR_NO_CHANNEL_FOPRIV,
3865 0, 2, tmp, tmp_len);
3870 comment = silc_argument_get_arg_type(cmd->args, 3, &clen);
3874 /* Send the reply back to the client */
3875 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
3876 target_idp = silc_argument_get_arg_type(cmd->args, 2, &target_idp_len);
3877 silc_server_send_command_reply(server, cmd->sock, SILC_COMMAND_KICK,
3878 SILC_STATUS_OK, 0, ident, 2,
3880 3, target_idp, target_idp_len);
3882 /* Send KICKED notify to local clients on the channel */
3883 idp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
3884 silc_server_send_notify_to_channel(server, NULL, channel, FALSE, TRUE,
3885 SILC_NOTIFY_TYPE_KICKED, 3,
3886 target_idp, target_idp_len,
3887 comment, comment ? strlen(comment) : 0,
3888 idp->data, silc_buffer_len(idp));
3889 silc_buffer_free(idp);
3891 /* Send KICKED notify to primary route */
3892 silc_server_send_notify_kicked(server, SILC_PRIMARY_ROUTE(server),
3893 SILC_BROADCAST(server), channel,
3894 target_client->id, client->id, comment);
3896 /* Remove the client from channel's invite list */
3897 if (channel->invite_list && silc_hash_table_count(channel->invite_list)) {
3899 silc_argument_payload_encode_one(NULL, target_idp, target_idp_len, 3);
3900 SilcArgumentPayload args =
3901 silc_argument_payload_parse(ab->data, silc_buffer_len(ab), 1);
3903 silc_server_inviteban_process(server, channel->invite_list, 1, args);
3904 silc_buffer_free(ab);
3905 silc_argument_payload_free(args);
3908 /* Remove the client from the channel. If the channel does not exist
3909 after removing the client then the client kicked itself off the channel
3910 and we don't have to send anything after that. */
3911 if (!silc_server_remove_from_one_channel(server, NULL, channel,
3912 target_client, FALSE))
3915 if (!(channel->mode & SILC_CHANNEL_MODE_PRIVKEY)) {
3916 /* Re-generate channel key */
3917 if (!silc_server_create_channel_key(server, channel, 0))
3920 /* Send the channel key to the channel. The key of course is not sent
3921 to the client who was kicked off the channel. */
3922 silc_server_send_channel_key(server, target_client->connection, channel,
3923 server->server_type == SILC_ROUTER ?
3924 FALSE : !server->standalone);
3928 silc_server_command_free(cmd);
3931 /* Server side of OPER command. Client uses this comand to obtain server
3932 operator privileges to this server/router. */
3934 SILC_SERVER_CMD_FUNC(oper)
3936 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
3937 SilcServer server = cmd->server;
3938 SilcClientEntry client = silc_packet_get_context(cmd->sock);
3939 unsigned char *username = NULL, *auth;
3941 SilcServerConfigAdmin *admin;
3942 SilcIDListData idata = (SilcIDListData)client;
3943 SilcBool result = FALSE;
3944 SilcPublicKey cached_key;
3945 const char *hostname, *ip;
3947 if (client->data.conn_type != SILC_CONN_CLIENT || !client)
3950 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_OPER, cmd, 1, 2);
3952 silc_socket_stream_get_info(silc_packet_stream_get_stream(cmd->sock),
3953 NULL, &hostname, &ip, NULL);
3955 /* Get the username */
3956 username = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
3958 silc_server_command_send_status_reply(cmd, SILC_COMMAND_OPER,
3959 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
3964 /* Check username */
3965 username = silc_identifier_check(username, strlen(username),
3966 SILC_STRING_UTF8, 128, &tmp_len);
3968 silc_server_command_send_status_reply(cmd, SILC_COMMAND_OPER,
3969 SILC_STATUS_ERR_BAD_USERNAME,
3974 /* Get the admin configuration */
3975 admin = silc_server_config_find_admin(server, (char *)ip,
3976 username, client->nickname);
3978 admin = silc_server_config_find_admin(server, (char *)hostname,
3979 username, client->nickname);
3981 silc_server_command_send_status_reply(cmd, SILC_COMMAND_OPER,
3982 SILC_STATUS_ERR_AUTH_FAILED,
3984 SILC_LOG_INFO(("OPER authentication failed for username '%s' by "
3985 "nickname '%s' from %s", username,
3986 client->nickname, hostname));
3991 /* Get the authentication payload */
3992 auth = silc_argument_get_arg_type(cmd->args, 2, &tmp_len);
3994 silc_server_command_send_status_reply(cmd, SILC_COMMAND_OPER,
3995 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
4000 /* Verify the authentication data. If both passphrase and public key
4001 is set then try both of them. */
4002 if (admin->passphrase)
4003 result = silc_auth_verify_data(auth, tmp_len, SILC_AUTH_PASSWORD,
4004 admin->passphrase, admin->passphrase_len,
4005 idata->hash, client->id, SILC_ID_CLIENT);
4006 if (!result && admin->publickeys) {
4008 silc_server_get_public_key(server,
4009 SILC_SKR_USAGE_SERVICE_AUTHORIZATION, admin);
4012 result = silc_auth_verify_data(auth, tmp_len, SILC_AUTH_PUBLIC_KEY,
4013 cached_key, 0, idata->hash,
4014 client->id, SILC_ID_CLIENT);
4017 /* Authentication failed */
4018 silc_server_command_send_status_reply(cmd, SILC_COMMAND_OPER,
4019 SILC_STATUS_ERR_AUTH_FAILED,
4024 /* Client is now server operator */
4025 client->mode |= SILC_UMODE_SERVER_OPERATOR;
4027 /* Update statistics */
4028 if (SILC_IS_LOCAL(client))
4029 server->stat.my_server_ops++;
4030 if (server->server_type == SILC_ROUTER)
4031 server->stat.server_ops++;
4033 /* Send UMODE change to primary router */
4034 silc_server_send_notify_umode(server, SILC_PRIMARY_ROUTE(server),
4035 SILC_BROADCAST(server), client->id,
4038 /* Check if anyone is watching this nickname */
4039 if (server->server_type == SILC_ROUTER)
4040 silc_server_check_watcher_list(server, client, NULL,
4041 SILC_NOTIFY_TYPE_UMODE_CHANGE);
4043 /* Send reply to the sender */
4044 silc_server_command_send_status_reply(cmd, SILC_COMMAND_OPER,
4048 silc_free(username);
4049 silc_server_command_free(cmd);
4052 SILC_TASK_CALLBACK(silc_server_command_detach_cb)
4054 SilcServer server = app_context;
4055 QuitInternal q = (QuitInternal)context;
4056 SilcClientID *client_id = (SilcClientID *)q->sock;
4057 SilcClientEntry client;
4058 SilcPacketStream sock;
4060 client = silc_idlist_find_client_by_id(server->local_list, client_id,
4062 if (client && client->connection) {
4063 sock = client->connection;
4065 /* Close the connection on our side */
4066 client->router = NULL;
4067 client->connection = NULL;
4068 silc_server_close_connection(server, sock);
4071 silc_free(client_id);
4075 SILC_TASK_CALLBACK(silc_server_command_detach_timeout)
4077 SilcServer server = app_context;
4078 QuitInternal q = (QuitInternal)context;
4079 SilcClientID *client_id = (SilcClientID *)q->sock;
4080 SilcClientEntry client;
4082 client = silc_idlist_find_client_by_id(server->local_list, client_id,
4084 if (client && client->mode & SILC_UMODE_DETACHED) {
4085 SILC_LOG_DEBUG(("Detach timeout"));
4086 silc_server_free_client_data(server, NULL, client, TRUE,
4090 silc_free(client_id);
4094 /* Server side of DETACH command. Detached the client from the network
4095 by closing the connection but preserving the session. */
4097 SILC_SERVER_CMD_FUNC(detach)
4099 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
4100 SilcServer server = cmd->server;
4101 SilcClientEntry client = silc_packet_get_context(cmd->sock);
4104 if (server->config->detach_disabled) {
4105 silc_server_command_send_status_reply(cmd, SILC_COMMAND_DETACH,
4106 SILC_STATUS_ERR_OPERATION_ALLOWED,
4111 if (client->data.conn_type != SILC_CONN_CLIENT || !client)
4114 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_DETACH, cmd, 0, 0);
4116 /* Remove operator privileges, since the client may resume in some
4117 other server which to it does not have operator privileges. */
4118 SILC_OPER_STATS_UPDATE(client, server, SILC_UMODE_SERVER_OPERATOR);
4119 SILC_OPER_STATS_UPDATE(client, router, SILC_UMODE_ROUTER_OPERATOR);
4121 /* Send the user mode notify to notify that client is detached */
4122 client->mode |= SILC_UMODE_DETACHED;
4123 client->data.status &= ~SILC_IDLIST_STATUS_RESUMED;
4124 client->data.status &= ~SILC_IDLIST_STATUS_NOATTR;
4125 client->last_command = 0;
4126 client->fast_command = 0;
4127 silc_server_send_notify_umode(server, SILC_PRIMARY_ROUTE(server),
4128 SILC_BROADCAST(server), client->id,
4130 server->stat.my_detached++;
4132 /* Check if anyone is watching this nickname */
4133 if (server->server_type == SILC_ROUTER)
4134 silc_server_check_watcher_list(server, client, NULL,
4135 SILC_NOTIFY_TYPE_UMODE_CHANGE);
4137 q = silc_calloc(1, sizeof(*q));
4138 q->sock = silc_id_dup(client->id, SILC_ID_CLIENT);
4139 silc_schedule_task_add_timeout(server->schedule,
4140 silc_server_command_detach_cb,
4143 if (server->config->detach_timeout) {
4144 q = silc_calloc(1, sizeof(*q));
4145 q->sock = silc_id_dup(client->id, SILC_ID_CLIENT);
4146 silc_schedule_task_add_timeout(server->schedule,
4147 silc_server_command_detach_timeout,
4148 q, server->config->detach_timeout * 60, 0);
4151 /* Send reply to the sender */
4152 silc_server_command_send_status_reply(cmd, SILC_COMMAND_DETACH,
4156 silc_server_command_free(cmd);
4159 /* Server side of WATCH command. */
4161 SILC_SERVER_CMD_FUNC(watch)
4163 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
4164 SilcServer server = cmd->server;
4165 char *add_nick, *del_nick;
4166 SilcUInt32 add_nick_len, del_nick_len, tmp_len, pk_len;
4167 unsigned char hash[SILC_HASH_MAXLEN], *tmp, *pk, *nick;
4168 SilcClientEntry client;
4170 SilcUInt16 old_ident;
4172 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_WATCH, cmd, 1, 3);
4174 if (server->server_type != SILC_ROUTER && !server->standalone) {
4175 if (!cmd->pending) {
4176 /* Send the command to router */
4179 /* If backup receives this from primary, handle it locally */
4180 if (server->server_type == SILC_BACKUP_ROUTER &&
4181 cmd->sock == SILC_PRIMARY_ROUTE(server))
4184 SILC_LOG_DEBUG(("Forwarding WATCH to router"));
4187 cmd->server->stat.commands_sent++;
4189 old_ident = silc_command_get_ident(cmd->payload);
4190 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
4191 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
4193 silc_server_packet_send(server, SILC_PRIMARY_ROUTE(server),
4194 SILC_PACKET_COMMAND, cmd->packet->flags,
4195 tmpbuf->data, silc_buffer_len(tmpbuf));
4197 /* Reprocess this packet after received reply from router */
4198 silc_server_command_pending(server, SILC_COMMAND_WATCH,
4199 silc_command_get_ident(cmd->payload),
4200 silc_server_command_watch,
4201 silc_server_command_dup(cmd));
4202 cmd->pending = TRUE;
4203 silc_command_set_ident(cmd->payload, old_ident);
4204 silc_buffer_free(tmpbuf);
4207 SilcServerCommandReplyContext reply = context2;
4213 silc_command_get_status(reply->payload, &status, NULL);
4215 /* Backup router handles the WATCH command also. */
4216 if (server->server_type != SILC_BACKUP_ROUTER ||
4217 SILC_STATUS_IS_ERROR(status)) {
4218 /* Received reply from router, just send same data to the client. */
4219 SILC_LOG_DEBUG(("Received reply to WATCH from router"));
4220 silc_server_command_send_status_reply(cmd, SILC_COMMAND_WATCH, status,
4227 /* We are router and keep the watch list for local cell */
4230 /* Get the client ID */
4231 if (!silc_argument_get_decoded(cmd->args, 1, SILC_ARGUMENT_ID, &id, NULL)) {
4232 silc_server_command_send_status_reply(cmd, SILC_COMMAND_WATCH,
4233 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
4238 /* Get the client entry which must be in local list */
4239 client = silc_idlist_find_client_by_id(server->local_list,
4240 SILC_ID_GET_ID(id), TRUE, NULL);
4242 /* Backup checks global list also */
4243 if (server->server_type == SILC_BACKUP_ROUTER)
4244 client = silc_idlist_find_client_by_id(server->global_list,
4245 SILC_ID_GET_ID(id), TRUE, NULL);
4247 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
4248 silc_server_command_send_status_data(cmd, SILC_COMMAND_WATCH,
4249 SILC_STATUS_ERR_NO_SUCH_CLIENT_ID,
4250 0, 2, tmp, tmp_len);
4255 /* Take public key for watching by public key */
4256 pk = silc_argument_get_arg_type(cmd->args, 4, &pk_len);
4259 add_nick = silc_argument_get_arg_type(cmd->args, 2, &add_nick_len);
4260 del_nick = silc_argument_get_arg_type(cmd->args, 3, &del_nick_len);
4261 if (!add_nick && !del_nick && !pk) {
4262 silc_server_command_send_status_reply(cmd, SILC_COMMAND_WATCH,
4263 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
4268 if (add_nick && add_nick_len > 128) {
4270 add_nick[add_nick_len - 1] = '\0';
4272 if (del_nick && del_nick_len > 128) {
4274 del_nick[del_nick_len - 1] = '\0';
4277 /* Add new nickname to be watched in our cell */
4279 nick = silc_identifier_check(add_nick, add_nick_len, SILC_STRING_UTF8, 128,
4282 silc_server_command_send_status_reply(cmd, SILC_COMMAND_WATCH,
4283 SILC_STATUS_ERR_BAD_NICKNAME, 0);
4287 /* Hash the nick, we have the hash saved, not nicks because we can
4288 do one to one mapping to the nick from Client ID hash this way. */
4289 silc_hash_make(server->md5hash, nick, add_nick_len, hash);
4291 /* Check whether this client is already watching this nickname */
4292 if (silc_hash_table_find_by_context(server->watcher_list, hash,
4294 /* Nickname is alredy being watched for this client */
4295 silc_server_command_send_status_reply(cmd, SILC_COMMAND_WATCH,
4296 SILC_STATUS_ERR_NICKNAME_IN_USE,
4302 /* Get the nickname from the watcher list and use the same key in
4303 new entries as well. If key doesn't exist then create it. */
4304 if (!silc_hash_table_find(server->watcher_list, hash, (void *)&tmp, NULL))
4305 tmp = silc_memdup(hash, CLIENTID_HASH_LEN);
4307 /* Add the client to the watcher list with the specified nickname hash. */
4308 silc_hash_table_add(server->watcher_list, tmp, client);
4312 /* Delete nickname from watch list */
4314 nick = silc_identifier_check(del_nick, del_nick_len, SILC_STRING_UTF8, 128,
4317 silc_server_command_send_status_reply(cmd, SILC_COMMAND_WATCH,
4318 SILC_STATUS_ERR_BAD_NICKNAME, 0);
4322 /* Hash the nick, we have the hash saved, not nicks because we can
4323 do one to one mapping to the nick from Client ID hash this way. */
4324 silc_hash_make(server->md5hash, nick, del_nick_len, hash);
4326 /* Check that this client is watching for this nickname */
4327 if (!silc_hash_table_find_by_context(server->watcher_list, hash,
4328 client, (void *)&tmp)) {
4329 /* Nickname is alredy being watched for this client */
4330 silc_server_command_send_status_data(cmd, SILC_COMMAND_WATCH,
4331 SILC_STATUS_ERR_NO_SUCH_NICK, 0,
4332 2, nick, del_nick_len);
4337 /* Delete the nickname from the watcher list. */
4338 silc_hash_table_del_by_context(server->watcher_list, hash, client);
4340 /* Now check whether there still exists entries with this key, if not
4341 then free the key to not leak memory. */
4342 if (!silc_hash_table_find(server->watcher_list, hash, NULL, NULL))
4347 /* Add/del public key */
4350 SilcArgumentPayload pkargs;
4352 SilcPublicKey public_key, pkkey;
4355 silc_server_command_send_status_reply(cmd, SILC_COMMAND_WATCH,
4356 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
4361 /* Get the argument from the Argument List Payload */
4362 SILC_GET16_MSB(pkargc, pk);
4363 pkargs = silc_argument_payload_parse(pk + 2, pk_len - 2, pkargc);
4365 silc_server_command_send_status_reply(cmd, SILC_COMMAND_WATCH,
4366 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
4371 pk = silc_argument_get_next_arg(pkargs, &type, &pk_len);
4373 if (!silc_public_key_payload_decode(pk, pk_len, &public_key))
4379 /* Add public key to watch list */
4381 /* Check whether this client is already watching this public key */
4382 if (silc_hash_table_find_by_context(server->watcher_list_pk,
4383 public_key, client, NULL)) {
4384 silc_pkcs_public_key_free(public_key);
4385 silc_server_command_send_status_reply(
4386 cmd, SILC_COMMAND_WATCH,
4387 SILC_STATUS_ERR_NICKNAME_IN_USE, 0);
4391 /* Get the public key from the watcher list and use the same key in
4392 new entries as well. If key doesn't exist then create it. */
4394 if (!silc_hash_table_find(server->watcher_list_pk, public_key,
4395 (void *)&pkkey, NULL))
4398 silc_pkcs_public_key_free(public_key);
4400 /* Add the client to the watcher list with the specified public
4402 silc_hash_table_add(server->watcher_list_pk, pkkey, client);
4404 } else if (type == 0x01) {
4405 /* Delete public key from watch list */
4407 /* Check that this client is watching this public key */
4408 if (silc_hash_table_find_by_context(server->watcher_list_pk,
4411 silc_pkcs_public_key_free(public_key);
4412 silc_server_command_send_status_reply(
4413 cmd, SILC_COMMAND_WATCH,
4414 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS, 0);
4418 /* Delete the public key from the watcher list. */
4419 silc_hash_table_del_by_context(server->watcher_list_pk,
4420 public_key, client);
4422 /* Now check whether there still exists entries with this key, if
4423 not then free the key to not leak memory. */
4424 if (!silc_hash_table_find(server->watcher_list_pk, hash, NULL, NULL))
4425 silc_pkcs_public_key_free(pkkey);
4426 silc_pkcs_public_key_free(public_key);
4429 pk = silc_argument_get_next_arg(pkargs, &type, &pk_len);
4434 silc_server_command_send_status_reply(cmd, SILC_COMMAND_WATCH,
4437 /* Distribute the watch list to backup routers too */
4438 if (server->backup) {
4442 cmd->server->stat.commands_sent++;
4444 old_ident = silc_command_get_ident(cmd->payload);
4445 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
4446 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
4447 silc_server_backup_send(server, silc_packet_get_context(cmd->sock),
4448 SILC_PACKET_COMMAND,
4449 cmd->packet->flags, tmpbuf->data,
4450 silc_buffer_len(tmpbuf),
4452 silc_command_set_ident(cmd->payload, old_ident);
4453 silc_buffer_free(tmpbuf);
4457 silc_server_command_free(cmd);
4460 /* Server side of SILCOPER command. Client uses this comand to obtain router
4461 operator privileges to this router. */
4463 SILC_SERVER_CMD_FUNC(silcoper)
4465 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
4466 SilcServer server = cmd->server;
4467 SilcClientEntry client = silc_packet_get_context(cmd->sock);
4468 unsigned char *username = NULL, *auth;
4470 SilcServerConfigAdmin *admin;
4471 SilcIDListData idata = (SilcIDListData)client;
4472 SilcBool result = FALSE;
4473 SilcPublicKey cached_key;
4474 const char *hostname, *ip;
4476 if (client->data.conn_type != SILC_CONN_CLIENT || !client)
4479 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_SILCOPER, cmd, 1, 2);
4481 silc_socket_stream_get_info(silc_packet_stream_get_stream(cmd->sock),
4482 NULL, &hostname, &ip, NULL);
4484 if (server->server_type != SILC_ROUTER) {
4485 silc_server_command_send_status_reply(cmd, SILC_COMMAND_SILCOPER,
4486 SILC_STATUS_ERR_AUTH_FAILED, 0);
4490 /* Get the username */
4491 username = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
4493 silc_server_command_send_status_reply(cmd, SILC_COMMAND_SILCOPER,
4494 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
4499 /* Check username */
4500 username = silc_identifier_check(username, tmp_len, SILC_STRING_UTF8, 128,
4503 silc_server_command_send_status_reply(cmd, SILC_COMMAND_SILCOPER,
4504 SILC_STATUS_ERR_BAD_USERNAME,
4509 /* Get the admin configuration */
4510 admin = silc_server_config_find_admin(server, (char *)ip,
4511 username, client->nickname);
4513 admin = silc_server_config_find_admin(server, (char *)hostname,
4514 username, client->nickname);
4516 silc_server_command_send_status_reply(cmd, SILC_COMMAND_SILCOPER,
4517 SILC_STATUS_ERR_AUTH_FAILED, 0);
4518 SILC_LOG_INFO(("SILCOPER authentication failed for username '%s' by "
4519 "nickname '%s' from %s", username,
4520 client->nickname, hostname));
4525 /* Get the authentication payload */
4526 auth = silc_argument_get_arg_type(cmd->args, 2, &tmp_len);
4528 silc_server_command_send_status_reply(cmd, SILC_COMMAND_SILCOPER,
4529 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
4534 /* Verify the authentication data. If both passphrase and public key
4535 is set then try both of them. */
4536 if (admin->passphrase)
4537 result = silc_auth_verify_data(auth, tmp_len, SILC_AUTH_PASSWORD,
4538 admin->passphrase, admin->passphrase_len,
4539 idata->hash, client->id, SILC_ID_CLIENT);
4540 if (!result && admin->publickeys) {
4542 silc_server_get_public_key(server,
4543 SILC_SKR_USAGE_SERVICE_AUTHORIZATION, admin);
4546 result = silc_auth_verify_data(auth, tmp_len, SILC_AUTH_PUBLIC_KEY,
4547 cached_key, 0, idata->hash,
4548 client->id, SILC_ID_CLIENT);
4551 /* Authentication failed */
4552 silc_server_command_send_status_reply(cmd, SILC_COMMAND_SILCOPER,
4553 SILC_STATUS_ERR_AUTH_FAILED, 0);
4557 /* Client is now router operator */
4558 client->mode |= SILC_UMODE_ROUTER_OPERATOR;
4560 /* Update statistics */
4561 if (SILC_IS_LOCAL(client))
4562 server->stat.my_router_ops++;
4563 if (server->server_type == SILC_ROUTER)
4564 server->stat.router_ops++;
4566 /* Send UMODE change to primary router */
4567 silc_server_send_notify_umode(server, SILC_PRIMARY_ROUTE(server),
4568 SILC_BROADCAST(server), client->id,
4571 /* Check if anyone is watching this nickname */
4572 if (server->server_type == SILC_ROUTER)
4573 silc_server_check_watcher_list(server, client, NULL,
4574 SILC_NOTIFY_TYPE_UMODE_CHANGE);
4576 /* Send reply to the sender */
4577 silc_server_command_send_status_reply(cmd, SILC_COMMAND_SILCOPER,
4581 silc_free(username);
4582 silc_server_command_free(cmd);
4585 /* Server side of command BAN. This is used to manage the ban list of the
4586 channel. To add clients and remove clients from the ban list. */
4588 SILC_SERVER_CMD_FUNC(ban)
4590 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
4591 SilcServer server = cmd->server;
4592 SilcClientEntry client = silc_packet_get_context(cmd->sock);
4593 SilcBuffer list, tmp2;
4594 SilcChannelEntry channel;
4595 SilcChannelClientEntry chl;
4597 unsigned char *tmp_id, *tmp, *atype = NULL;
4598 SilcUInt32 id_len, len, len2;
4599 SilcArgumentPayload args;
4600 SilcHashTableList htl;
4602 SilcUInt16 argc = 0, ident = silc_command_get_ident(cmd->payload);
4603 SilcBufferStruct blist;
4605 if (client->data.conn_type != SILC_CONN_CLIENT || !client)
4608 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_BAN, cmd, 0, 3);
4610 /* Get Channel ID */
4611 if (!silc_argument_get_decoded(cmd->args, 1, SILC_ARGUMENT_ID, &id, NULL)) {
4612 silc_server_command_send_status_reply(cmd, SILC_COMMAND_BAN,
4613 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
4617 /* Get channel entry. The server must know about the channel since the
4618 client is expected to be on the channel. */
4619 channel = silc_idlist_find_channel_by_id(server->local_list,
4620 SILC_ID_GET_ID(id), NULL);
4622 channel = silc_idlist_find_channel_by_id(server->global_list,
4623 SILC_ID_GET_ID(id), NULL);
4625 tmp_id = silc_argument_get_arg_type(cmd->args, 1, &id_len);
4626 silc_server_command_send_status_data(
4627 cmd, SILC_COMMAND_BAN,
4628 SILC_STATUS_ERR_NO_SUCH_CHANNEL_ID,
4629 0, 2, tmp_id, id_len);
4634 /* Check whether this client is on the channel */
4635 if (!silc_server_client_on_channel(client, channel, &chl)) {
4636 tmp_id = silc_argument_get_arg_type(cmd->args, 1, &id_len);
4637 silc_server_command_send_status_data(cmd, SILC_COMMAND_BAN,
4638 SILC_STATUS_ERR_NOT_ON_CHANNEL, 0,
4643 /* The client must be at least channel operator. */
4644 if (!(chl->mode & SILC_CHANNEL_UMODE_CHANOP)) {
4645 tmp_id = silc_argument_get_arg_type(cmd->args, 1, &id_len);
4646 silc_server_command_send_status_data(cmd, SILC_COMMAND_BAN,
4647 SILC_STATUS_ERR_NO_CHANNEL_PRIV, 0,
4652 /* Get the ban information */
4653 tmp = silc_argument_get_arg_type(cmd->args, 3, &len2);
4654 if (tmp && len2 > 2) {
4655 /* Parse the arguments to see they are constructed correctly */
4656 SILC_GET16_MSB(argc, tmp);
4657 args = silc_argument_payload_parse(tmp + 2, len2 - 2, argc);
4659 silc_server_command_send_status_reply(cmd, SILC_COMMAND_BAN,
4660 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
4665 /* Get the type of action */
4666 atype = silc_argument_get_arg_type(cmd->args, 2, &len);
4667 if (atype && len == 1) {
4668 if (atype[0] == 0x00) {
4669 /* Allocate hash table for ban list if it doesn't exist yet */
4670 if (!channel->ban_list)
4672 silc_hash_table_alloc(0, silc_hash_ptr,
4674 silc_server_inviteban_destruct, channel,
4677 /* Check for resource limit */
4678 if (silc_hash_table_count(channel->ban_list) > 64) {
4679 silc_server_command_send_status_reply(cmd, SILC_COMMAND_BAN,
4680 SILC_STATUS_ERR_RESOURCE_LIMIT,
4686 /* Now add or delete the information. */
4687 if (!silc_server_inviteban_process(server, channel->ban_list,
4688 (SilcUInt8)atype[0], args)) {
4689 silc_server_command_send_status_reply(
4690 cmd, SILC_COMMAND_BAN,
4691 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
4696 silc_argument_payload_free(args);
4699 /* Encode ban list */
4701 if (channel->ban_list && silc_hash_table_count(channel->ban_list)) {
4702 list = silc_buffer_alloc_size(2);
4703 silc_buffer_format(list,
4704 SILC_STR_UI_SHORT(silc_hash_table_count(
4705 channel->ban_list)),
4707 silc_hash_table_list(channel->ban_list, &htl);
4708 while (silc_hash_table_get(&htl, (void *)&type, (void *)&tmp2))
4709 list = silc_argument_payload_encode_one(list, tmp2->data,
4710 silc_buffer_len(tmp2), type);
4711 silc_hash_table_list_reset(&htl);
4714 tmp_id = silc_argument_get_arg_type(cmd->args, 1, &id_len);
4716 /* Send BAN notify type to local servers (but not clients) and to
4718 if (atype && tmp && len2) {
4719 silc_buffer_set(&blist, tmp, len2);
4721 /* Send to local servers if we are router */
4722 if (server->server_type == SILC_ROUTER)
4723 silc_server_send_notify_to_channel(server, NULL, channel, FALSE, FALSE,
4724 SILC_NOTIFY_TYPE_BAN, 3,
4727 tmp ? blist.data : NULL,
4728 tmp ? silc_buffer_len(&blist) : 0);
4730 /* Send to network. */
4731 silc_server_send_notify_ban(server, SILC_PRIMARY_ROUTE(server),
4732 SILC_BROADCAST(server), channel, atype,
4736 /* Send the reply back to the client */
4737 silc_server_send_command_reply(server, cmd->sock, SILC_COMMAND_BAN,
4738 SILC_STATUS_OK, 0, ident, 2,
4740 3, list ? list->data : NULL,
4741 list ? silc_buffer_len(list) : 0);
4742 silc_buffer_free(list);
4745 silc_server_command_free(cmd);
4748 /* Server side command of LEAVE. Removes client from a channel. */
4750 SILC_SERVER_CMD_FUNC(leave)
4752 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
4753 SilcServer server = cmd->server;
4754 SilcPacketStream sock = cmd->sock;
4755 SilcClientEntry id_entry = silc_packet_get_context(cmd->sock);
4757 SilcChannelEntry channel;
4761 if (id_entry->data.conn_type != SILC_CONN_CLIENT || !id_entry)
4764 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_LEAVE, cmd, 1, 2);
4766 /* Get Channel ID */
4767 if (!silc_argument_get_decoded(cmd->args, 1, SILC_ARGUMENT_ID, &id, NULL)) {
4768 silc_server_command_send_status_reply(cmd, SILC_COMMAND_LEAVE,
4769 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
4773 /* Get channel entry */
4774 channel = silc_idlist_find_channel_by_id(server->local_list,
4775 SILC_ID_GET_ID(id), NULL);
4777 channel = silc_idlist_find_channel_by_id(server->global_list,
4778 SILC_ID_GET_ID(id), NULL);
4780 tmp = silc_argument_get_arg_type(cmd->args, 1, &len);
4781 silc_server_command_send_status_data(cmd, SILC_COMMAND_LEAVE,
4782 SILC_STATUS_ERR_NO_SUCH_CHANNEL_ID,
4788 /* Check whether this client is on the channel */
4789 if (!silc_server_client_on_channel(id_entry, channel, NULL)) {
4790 tmp = silc_argument_get_arg_type(cmd->args, 1, &len);
4791 silc_server_command_send_status_data(cmd, SILC_COMMAND_LEAVE,
4792 SILC_STATUS_ERR_NOT_ON_CHANNEL, 0,
4797 /* Notify routers that they should remove this client from their list
4798 of clients on the channel. Send LEAVE notify type. */
4799 silc_server_send_notify_leave(server, SILC_PRIMARY_ROUTE(server),
4800 SILC_BROADCAST(server), channel, id_entry->id);
4802 tmp = silc_argument_get_arg_type(cmd->args, 1, &len);
4803 silc_server_command_send_status_data(cmd, SILC_COMMAND_LEAVE,
4804 SILC_STATUS_OK, 0, 2, tmp, len);
4806 /* Remove client from channel */
4807 if (!silc_server_remove_from_one_channel(server, sock, channel, id_entry,
4809 /* If the channel does not exist anymore we won't send anything */
4812 if (!(channel->mode & SILC_CHANNEL_MODE_PRIVKEY)) {
4813 /* Re-generate channel key */
4814 if (!silc_server_create_channel_key(server, channel, 0))
4817 /* Send the channel key */
4818 silc_server_send_channel_key(server, NULL, channel,
4819 server->server_type == SILC_ROUTER ?
4820 FALSE : !server->standalone);
4824 silc_server_command_free(cmd);
4827 /* Server side of command USERS. Resolves clients and their USERS currently
4828 joined on the requested channel. The list of Client ID's and their modes
4829 on the channel is sent back. */
4831 SILC_SERVER_CMD_FUNC(users)
4833 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
4834 SilcServer server = cmd->server;
4835 SilcIDListData idata = silc_packet_get_context(cmd->sock);
4836 SilcChannelEntry channel;
4839 unsigned char *channel_id;
4840 SilcUInt32 channel_id_len;
4841 SilcBuffer client_id_list;
4842 SilcBuffer client_mode_list;
4843 unsigned char lc[4];
4844 SilcUInt32 list_count = 0;
4845 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
4846 char *channel_name, *channel_namec = NULL;
4848 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_USERS, cmd, 1, 2);
4850 /* Get Channel ID */
4851 channel_id = silc_argument_get_arg_type(cmd->args, 1, &channel_id_len);
4853 /* Get channel name */
4854 channel_name = silc_argument_get_arg_type(cmd->args, 2, NULL);
4856 if (!channel_id && !channel_name) {
4857 silc_server_command_send_status_reply(cmd, SILC_COMMAND_USERS,
4858 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
4862 /* Check channel name */
4864 channel_namec = silc_channel_name_check(channel_name, strlen(channel_name),
4865 SILC_STRING_UTF8, 256, NULL);
4866 if (!channel_namec) {
4867 silc_server_command_send_status_reply(cmd, SILC_COMMAND_USERS,
4868 SILC_STATUS_ERR_BAD_CHANNEL, 0);
4873 /* Check Channel ID */
4875 if (!silc_id_payload_parse_id(channel_id, channel_id_len, &id)) {
4876 silc_server_command_send_status_data(cmd, SILC_COMMAND_USERS,
4877 SILC_STATUS_ERR_BAD_CHANNEL_ID, 0,
4878 2, channel_id, channel_id_len);
4883 /* If we are server and we don't know about this channel we will send
4884 the command to our router. If we know about the channel then we also
4885 have the list of users already. */
4887 channel = silc_idlist_find_channel_by_id(server->local_list,
4888 SILC_ID_GET_ID(id), NULL);
4890 channel = silc_idlist_find_channel_by_name(server->local_list,
4891 channel_namec, NULL);
4893 if (!channel || (!server->standalone && (channel->disabled ||
4894 !channel->users_resolved))) {
4895 if (server->server_type != SILC_ROUTER && !server->standalone &&
4900 cmd->server->stat.commands_sent++;
4902 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
4903 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
4905 /* Send USERS command */
4906 silc_server_packet_send(server, SILC_PRIMARY_ROUTE(server),
4907 SILC_PACKET_COMMAND, cmd->packet->flags,
4908 tmpbuf->data, silc_buffer_len(tmpbuf));
4910 /* Reprocess this packet after received reply */
4911 silc_server_command_pending(server, SILC_COMMAND_USERS,
4912 silc_command_get_ident(cmd->payload),
4913 silc_server_command_users,
4914 silc_server_command_dup(cmd));
4915 cmd->pending = TRUE;
4916 silc_command_set_ident(cmd->payload, ident);
4917 silc_buffer_free(tmpbuf);
4921 /* Check the global list as well. */
4923 channel = silc_idlist_find_channel_by_id(server->global_list,
4924 SILC_ID_GET_ID(id), NULL);
4926 channel = silc_idlist_find_channel_by_name(server->global_list,
4927 channel_namec, NULL);
4929 /* Channel really does not exist */
4931 silc_server_command_send_status_data(
4932 cmd, SILC_COMMAND_USERS,
4933 SILC_STATUS_ERR_NO_SUCH_CHANNEL_ID, 0,
4934 2, channel_id, channel_id_len);
4936 silc_server_command_send_status_data(
4937 cmd, SILC_COMMAND_USERS,
4938 SILC_STATUS_ERR_NO_SUCH_CHANNEL, 0,
4939 2, channel_name, strlen(channel_name));
4944 /* If the channel is private or secret do not send anything, unless the
4945 user requesting this command is on the channel or is server */
4946 if (idata->conn_type == SILC_CONN_CLIENT) {
4947 if (channel->mode & (SILC_CHANNEL_MODE_PRIVATE | SILC_CHANNEL_MODE_SECRET)
4948 && !silc_server_client_on_channel((SilcClientEntry)idata, channel,
4950 silc_server_command_send_status_data(cmd, SILC_COMMAND_USERS,
4951 SILC_STATUS_ERR_NO_SUCH_CHANNEL, 0,
4952 2, channel->channel_name,
4953 strlen(channel->channel_name));
4958 /* Get the users list */
4959 if (!silc_server_get_users_on_channel(server, channel, &client_id_list,
4960 &client_mode_list, &list_count)) {
4962 client_id_list = NULL;
4963 client_mode_list = NULL;
4967 SILC_PUT32_MSB(list_count, lc);
4970 idp = silc_id_payload_encode(channel->id, SILC_ID_CHANNEL);
4971 silc_server_send_command_reply(server, cmd->sock, SILC_COMMAND_USERS,
4972 SILC_STATUS_OK, 0, ident, 4,
4973 2, idp->data, silc_buffer_len(idp),
4976 client_id_list->data : NULL,
4978 silc_buffer_len(client_id_list) : 0,
4979 5, client_mode_list ?
4980 client_mode_list->data : NULL,
4982 silc_buffer_len(client_mode_list) : 0);
4983 silc_buffer_free(idp);
4985 silc_buffer_free(client_id_list);
4986 if (client_mode_list)
4987 silc_buffer_free(client_mode_list);
4990 silc_free(channel_namec);
4991 silc_server_command_free(cmd);
4994 /* Server side of command GETKEY. This fetches the client's public key
4995 from the server where to the client is connected. */
4997 SILC_SERVER_CMD_FUNC(getkey)
4999 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
5000 SilcServer server = cmd->server;
5001 SilcClientEntry client;
5002 SilcServerEntry server_entry;
5003 SilcClientID client_id;
5004 SilcServerID server_id;
5005 SilcIDPayload idp = NULL;
5006 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
5009 SilcBuffer pk = NULL;
5011 SilcPublicKey public_key;
5013 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
5015 silc_server_command_send_status_reply(cmd, SILC_COMMAND_GETKEY,
5016 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
5020 idp = silc_id_payload_parse(tmp, tmp_len);
5022 silc_server_command_send_status_reply(cmd, SILC_COMMAND_GETKEY,
5023 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
5028 id_type = silc_id_payload_get_type(idp);
5029 if (id_type == SILC_ID_CLIENT) {
5030 silc_id_payload_get_id(idp, &client_id, sizeof(client_id));
5032 /* If the client is not found from local list there is no chance it
5033 would be locally connected client so send the command further. */
5034 client = silc_idlist_find_client_by_id(server->local_list,
5035 &client_id, TRUE, NULL);
5037 client = silc_idlist_find_client_by_id(server->global_list,
5038 &client_id, TRUE, NULL);
5040 if ((!client && !cmd->pending && !server->standalone) ||
5041 (client && !client->connection && !cmd->pending &&
5042 !(client->mode & SILC_UMODE_DETACHED)) ||
5043 (client && !client->data.public_key && !cmd->pending)) {
5045 SilcUInt16 old_ident;
5046 SilcPacketStream dest_sock;
5048 dest_sock = silc_server_get_client_route(server, NULL, 0,
5049 &client_id, NULL, NULL);
5054 cmd->server->stat.commands_sent++;
5056 old_ident = silc_command_get_ident(cmd->payload);
5057 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
5058 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
5060 silc_server_packet_send(server, dest_sock,
5061 SILC_PACKET_COMMAND, cmd->packet->flags,
5062 tmpbuf->data, silc_buffer_len(tmpbuf));
5064 /* Reprocess this packet after received reply from router */
5065 silc_server_command_pending(server, SILC_COMMAND_GETKEY,
5066 silc_command_get_ident(cmd->payload),
5067 silc_server_command_getkey,
5068 silc_server_command_dup(cmd));
5069 cmd->pending = TRUE;
5070 silc_command_set_ident(cmd->payload, old_ident);
5071 silc_buffer_free(tmpbuf);
5076 silc_server_command_send_status_data(cmd, SILC_COMMAND_GETKEY,
5077 SILC_STATUS_ERR_NO_SUCH_CLIENT_ID,
5078 0, 2, tmp, tmp_len);
5082 /* The client is locally connected, just get the public key and
5083 send it back. If they key does not exist then do not send it,
5084 send just OK reply */
5085 public_key = client->data.public_key;
5087 pk = silc_public_key_payload_encode(public_key);
5088 } else if (id_type == SILC_ID_SERVER) {
5089 silc_id_payload_get_id(idp, &server_id, sizeof(server_id));
5091 /* If the server is not found from local list there is no chance it
5092 would be locally connected server so send the command further. */
5093 server_entry = silc_idlist_find_server_by_id(server->local_list,
5094 &server_id, TRUE, NULL);
5096 server_entry = silc_idlist_find_server_by_id(server->global_list,
5097 &server_id, TRUE, NULL);
5099 if (server_entry != server->id_entry &&
5100 ((!server_entry && !cmd->pending && !server->standalone) ||
5101 (server_entry && !server_entry->connection && !cmd->pending &&
5102 !server->standalone) ||
5103 (server_entry && !server_entry->data.public_key && !cmd->pending &&
5104 !server->standalone))) {
5106 SilcUInt16 old_ident;
5109 cmd->server->stat.commands_sent++;
5111 old_ident = silc_command_get_ident(cmd->payload);
5112 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
5113 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
5115 silc_server_packet_send(server, SILC_PRIMARY_ROUTE(server),
5116 SILC_PACKET_COMMAND, cmd->packet->flags,
5117 tmpbuf->data, silc_buffer_len(tmpbuf));
5119 /* Reprocess this packet after received reply from router */
5120 silc_server_command_pending(server, SILC_COMMAND_GETKEY,
5121 silc_command_get_ident(cmd->payload),
5122 silc_server_command_getkey,
5123 silc_server_command_dup(cmd));
5124 cmd->pending = TRUE;
5125 silc_command_set_ident(cmd->payload, old_ident);
5126 silc_buffer_free(tmpbuf);
5130 if (!server_entry) {
5131 silc_server_command_send_status_data(cmd, SILC_COMMAND_GETKEY,
5132 SILC_STATUS_ERR_NO_SUCH_SERVER_ID,
5133 0, 2, tmp, tmp_len);
5137 /* If they key does not exist then do not send it, send just OK reply */
5138 public_key = (!server_entry->data.public_key ?
5139 (server_entry == server->id_entry ? server->public_key :
5140 NULL) : server_entry->data.public_key);
5142 pk = silc_public_key_payload_encode(public_key);
5147 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
5148 silc_server_send_command_reply(server, cmd->sock, SILC_COMMAND_GETKEY,
5149 SILC_STATUS_OK, 0, ident, 2,
5151 3, pk ? pk->data : NULL,
5152 pk ? silc_buffer_len(pk) : 0);
5156 silc_id_payload_free(idp);
5157 silc_buffer_free(pk);
5158 silc_server_command_free(cmd);
5161 /* Server side of command SERVICE. */
5162 /* XXX currently this just sends empty reply back */
5164 SILC_SERVER_CMD_FUNC(service)
5166 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
5167 SilcServer server = cmd->server;
5168 SilcUInt32 tmp_len, auth_len;
5169 unsigned char *service_name, *auth;
5170 SilcBool send_list = FALSE;
5171 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
5173 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_SERVICE, cmd, 0, 256);
5175 /* Get requested service */
5176 service_name = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
5177 if (service_name && tmp_len) {
5178 /* Verify service name */
5179 if (!silc_identifier_verify(service_name, tmp_len,
5180 SILC_STRING_UTF8, 256)) {
5181 silc_server_command_send_status_reply(cmd, SILC_COMMAND_SERVICE,
5182 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
5188 /* Get authentication payload if present */
5189 auth = silc_argument_get_arg_type(cmd->args, 2, &auth_len);
5197 /* Send our service list back */
5198 silc_server_send_command_reply(server, cmd->sock, SILC_COMMAND_SERVICE,
5199 SILC_STATUS_OK, 0, ident, 0);
5202 silc_server_command_free(cmd);
5206 /* Private range commands, specific to this implementation */
5208 /* Server side command of CONNECT. Connects us to the specified remote
5209 server or router. */
5211 SILC_SERVER_CMD_FUNC(connect)
5213 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
5214 SilcServer server = cmd->server;
5215 SilcClientEntry client = silc_packet_get_context(cmd->sock);
5216 unsigned char *tmp, *host;
5218 SilcUInt32 port = SILC_PORT;
5220 if (client->data.conn_type != SILC_CONN_CLIENT || !client)
5223 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_PRIV_CONNECT, cmd, 1, 2);
5225 /* Check whether client has the permissions. */
5226 if (!(client->mode & SILC_UMODE_SERVER_OPERATOR) &&
5227 !(client->mode & SILC_UMODE_ROUTER_OPERATOR)) {
5228 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_CONNECT,
5229 SILC_STATUS_ERR_NO_SERVER_PRIV, 0);
5233 if (server->server_type == SILC_ROUTER && !server->backup_router &&
5234 client->mode & SILC_UMODE_SERVER_OPERATOR) {
5235 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_CONNECT,
5236 SILC_STATUS_ERR_NO_ROUTER_PRIV, 0);
5240 /* Get the remote server */
5241 host = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
5243 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_CONNECT,
5244 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
5250 tmp = silc_argument_get_arg_type(cmd->args, 2, &tmp_len);
5252 SILC_GET32_MSB(port, tmp);
5254 /* Create the connection. It is done with timeout and is async. */
5255 silc_server_create_connection(server, FALSE, FALSE, host, port, NULL, NULL);
5257 /* Send reply to the sender */
5258 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_CONNECT,
5262 silc_server_command_free(cmd);
5265 /* Server side command of CLOSE. Closes connection to a specified server. */
5267 SILC_SERVER_CMD_FUNC(close)
5269 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
5270 SilcServer server = cmd->server;
5271 SilcClientEntry client = silc_packet_get_context(cmd->sock);
5272 SilcServerEntry server_entry;
5273 SilcPacketStream sock;
5276 unsigned char *name;
5277 SilcUInt32 port = SILC_PORT;
5279 if (client->data.conn_type != SILC_CONN_CLIENT || !client)
5282 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_PRIV_CLOSE, cmd, 1, 2);
5284 /* Check whether client has the permissions. */
5285 if (!(client->mode & SILC_UMODE_SERVER_OPERATOR) &&
5286 !(client->mode & SILC_UMODE_ROUTER_OPERATOR)) {
5287 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_CLOSE,
5288 SILC_STATUS_ERR_NO_SERVER_PRIV,
5293 /* Get the remote server */
5294 name = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
5296 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_CLOSE,
5297 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
5303 tmp = silc_argument_get_arg_type(cmd->args, 2, &tmp_len);
5305 SILC_GET32_MSB(port, tmp);
5307 server_entry = silc_idlist_find_server_by_conn(server->local_list,
5308 name, port, TRUE, NULL);
5310 server_entry = silc_idlist_find_server_by_conn(server->global_list,
5311 name, port, TRUE, NULL);
5312 if (!server_entry) {
5313 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_CLOSE,
5314 SILC_STATUS_ERR_NO_SERVER_ID, 0);
5318 if (server_entry == server->id_entry) {
5319 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_CLOSE,
5320 SILC_STATUS_ERR_NO_SERVER_ID, 0);
5324 /* Send reply to the sender */
5325 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_CLOSE,
5328 /* Close the connection to the server */
5329 sock = server_entry->connection;
5331 if (server_entry->server_type == SILC_BACKUP_ROUTER) {
5332 server->backup_closed = TRUE;
5333 silc_server_backup_del(server, server_entry);
5336 server->backup_noswitch = TRUE;
5337 if (server->router == server_entry) {
5338 server->id_entry->router = NULL;
5339 server->router = NULL;
5340 server->standalone = TRUE;
5342 silc_server_disconnect_remote(server, sock,
5343 SILC_STATUS_ERR_BANNED_FROM_SERVER,
5344 "Closed by administrator");
5345 silc_server_free_sock_user_data(server, sock, NULL);
5346 server->backup_noswitch = FALSE;
5349 silc_server_command_free(cmd);
5352 /* Server side command of SHUTDOWN. Shutdowns the server and closes all
5353 active connections. */
5355 SILC_SERVER_CMD_FUNC(shutdown)
5357 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
5358 SilcServer server = cmd->server;
5359 SilcClientEntry client = silc_packet_get_context(cmd->sock);
5361 if (client->data.conn_type != SILC_CONN_CLIENT || !client)
5364 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_PRIV_SHUTDOWN, cmd, 0, 0);
5366 /* Check whether client has the permission. */
5367 if (!(client->mode & SILC_UMODE_SERVER_OPERATOR) &&
5368 !(client->mode & SILC_UMODE_ROUTER_OPERATOR)) {
5369 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_SHUTDOWN,
5370 SILC_STATUS_ERR_NO_SERVER_PRIV,
5375 /* Send reply to the sender */
5376 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_SHUTDOWN,
5379 /* Then, gracefully, or not, bring the server down. */
5380 silc_server_stop(server);
5384 silc_server_command_free(cmd);