5 Author: Pekka Riikonen <priikone@poseidon.pspt.fi>
7 Copyright (C) 1997 - 2001 Pekka Riikonen
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 2 of the License, or
12 (at your option) any later version.
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
21 * This is the actual SILC server than handles everything relating to
22 * servicing the SILC connections. This is also a SILC router as a router
23 * is also normal server.
27 #include "serverincludes.h"
28 #include "server_internal.h"
30 /* Static prototypes */
31 SILC_TASK_CALLBACK(silc_server_connect_router);
32 SILC_TASK_CALLBACK(silc_server_connect_to_router);
33 SILC_TASK_CALLBACK(silc_server_connect_to_router_second);
34 SILC_TASK_CALLBACK(silc_server_connect_to_router_final);
35 SILC_TASK_CALLBACK(silc_server_accept_new_connection);
36 SILC_TASK_CALLBACK(silc_server_accept_new_connection_second);
37 SILC_TASK_CALLBACK(silc_server_accept_new_connection_final);
38 SILC_TASK_CALLBACK(silc_server_packet_process);
39 SILC_TASK_CALLBACK(silc_server_packet_parse_real);
40 SILC_TASK_CALLBACK(silc_server_timeout_remote);
42 /* Allocates a new SILC server object. This has to be done before the server
43 can be used. After allocation one must call silc_server_init to initialize
44 the server. The new allocated server object is returned to the new_server
47 int silc_server_alloc(SilcServer *new_server)
51 SILC_LOG_DEBUG(("Allocating new server object"));
53 server = silc_calloc(1, sizeof(*server));
54 server->server_type = SILC_SERVER;
55 server->standalone = TRUE;
56 server->local_list = silc_calloc(1, sizeof(*server->local_list));
57 server->global_list = silc_calloc(1, sizeof(*server->global_list));
58 server->pending_commands = silc_dlist_init();
60 server->sim = silc_dlist_init();
68 /* Free's the SILC server object. This is called at the very end before
71 void silc_server_free(SilcServer server)
78 if (server->local_list)
79 silc_free(server->local_list);
80 if (server->global_list)
81 silc_free(server->global_list);
83 silc_rng_free(server->rng);
86 while ((sim = silc_dlist_get(server->sim)) != SILC_LIST_END) {
87 silc_dlist_del(server->sim, sim);
90 silc_dlist_uninit(server->sim);
94 silc_free(server->params);
96 if (server->pending_commands)
97 silc_dlist_uninit(server->pending_commands);
103 /* Initializes the entire SILC server. This is called always before running
104 the server. This is called only once at the initialization of the program.
105 This binds the server to its listenning port. After this function returns
106 one should call silc_server_run to start the server. This returns TRUE
107 when everything is ok to run the server. Configuration file must be
108 read and parsed before calling this. */
110 int silc_server_init(SilcServer server)
112 int *sock = NULL, sock_count = 0, i;
114 SilcServerEntry id_entry;
116 SILC_LOG_DEBUG(("Initializing server"));
118 assert(server->config);
120 /* XXX After server is made as Silc Server Library this can be given
121 as argument, for now this is hard coded */
122 server->params = silc_calloc(1, sizeof(*server->params));
123 server->params->retry_count = SILC_SERVER_RETRY_COUNT;
124 server->params->retry_interval_min = SILC_SERVER_RETRY_INTERVAL_MIN;
125 server->params->retry_interval_max = SILC_SERVER_RETRY_INTERVAL_MAX;
126 server->params->retry_keep_trying = FALSE;
127 server->params->protocol_timeout = 60;
128 server->params->require_reverse_mapping = FALSE;
130 /* Set log files where log message should be saved. */
131 server->config->server = server;
132 silc_config_server_setlogfiles(server->config);
134 /* Register all configured ciphers, PKCS and hash functions. */
135 silc_config_server_register_ciphers(server->config);
136 silc_config_server_register_pkcs(server->config);
137 silc_config_server_register_hashfuncs(server->config);
139 /* Initialize random number generator for the server. */
140 server->rng = silc_rng_alloc();
141 silc_rng_init(server->rng);
142 silc_rng_global_init(server->rng);
144 /* Initialize hash functions for server to use */
145 silc_hash_alloc("md5", &server->md5hash);
146 silc_hash_alloc("sha1", &server->sha1hash);
148 /* Initialize none cipher */
149 silc_cipher_alloc("none", &server->none_cipher);
151 /* XXXXX Generate RSA key pair */
153 unsigned char *public_key;
154 unsigned char *private_key;
155 unsigned int pk_len, prv_len;
158 if (stat("pubkey.pub", &st) < 0 && stat("privkey.prv", &st) < 0) {
160 if (silc_pkcs_alloc("rsa", &server->pkcs) == FALSE) {
161 SILC_LOG_ERROR(("Could not create RSA key pair"));
165 if (server->pkcs->pkcs->init(server->pkcs->context,
166 1024, server->rng) == FALSE) {
167 SILC_LOG_ERROR(("Could not generate RSA key pair"));
171 public_key = server->pkcs->pkcs->get_public_key(server->pkcs->context,
173 private_key = server->pkcs->pkcs->get_private_key(server->pkcs->context,
176 SILC_LOG_HEXDUMP(("public key"), public_key, pk_len);
177 SILC_LOG_HEXDUMP(("private key"), private_key, prv_len);
180 silc_pkcs_public_key_alloc("rsa", "UN=root, HN=dummy",
182 server->private_key =
183 silc_pkcs_private_key_alloc("rsa", private_key, prv_len);
186 silc_pkcs_save_public_key("pubkey.pub", server->public_key,
188 silc_pkcs_save_private_key("privkey.prv", server->private_key, NULL,
191 memset(public_key, 0, pk_len);
192 memset(private_key, 0, prv_len);
193 silc_free(public_key);
194 silc_free(private_key);
196 silc_pkcs_load_public_key("pubkey.pub", &server->public_key,
198 silc_pkcs_load_private_key("privkey.prv", &server->private_key,
203 /* Create a listening server. Note that our server can listen on
204 multiple ports. All listeners are created here and now. */
205 /* XXX Still check this whether to use server_info or listen_port. */
207 while(server->config->listen_port) {
210 tmp = silc_net_create_server(server->config->listen_port->port,
211 server->config->listen_port->host);
215 sock = silc_realloc(sock, (sizeof(int *) * (sock_count + 1)));
216 sock[sock_count] = tmp;
217 server->config->listen_port = server->config->listen_port->next;
221 /* Initialize ID caches */
222 server->local_list->clients = silc_idcache_alloc(0);
223 server->local_list->servers = silc_idcache_alloc(0);
224 server->local_list->channels = silc_idcache_alloc(0);
226 /* These are allocated for normal server as well as these hold some
227 global information that the server has fetched from its router. For
228 router these are used as they are supposed to be used on router. */
229 server->global_list->clients = silc_idcache_alloc(0);
230 server->global_list->servers = silc_idcache_alloc(0);
231 server->global_list->channels = silc_idcache_alloc(0);
233 /* Allocate the entire socket list that is used in server. Eventually
234 all connections will have entry in this table (it is a table of
235 pointers to the actual object that is allocated individually
237 server->sockets = silc_calloc(SILC_SERVER_MAX_CONNECTIONS,
238 sizeof(*server->sockets));
240 for (i = 0; i < sock_count; i++) {
241 SilcSocketConnection newsocket = NULL;
243 /* Set socket to non-blocking mode */
244 silc_net_set_socket_nonblock(sock[i]);
245 server->sock = sock[i];
247 /* Create a Server ID for the server. */
248 silc_id_create_server_id(sock[i], server->rng, &id);
254 server->id_string = silc_id_id2str(id, SILC_ID_SERVER);
255 server->id_string_len = silc_id_get_len(SILC_ID_SERVER);
256 server->id_type = SILC_ID_SERVER;
257 server->server_name = server->config->server_info->server_name;
259 /* Add ourselves to the server list. We don't have a router yet
260 beacuse we haven't established a route yet. It will be done later.
261 For now, NULL is sent as router. This allocates new entry to
264 silc_idlist_add_server(server->local_list,
265 server->config->server_info->server_name,
266 server->server_type, server->id, NULL, NULL);
268 SILC_LOG_ERROR(("Could not add ourselves to cache"));
272 /* Add ourselves also to the socket table. The entry allocated above
273 is sent as argument for fast referencing in the future. */
274 silc_socket_alloc(sock[i], SILC_SOCKET_TYPE_SERVER, id_entry,
279 server->sockets[sock[i]] = newsocket;
281 /* Put the allocated socket pointer also to the entry allocated above
282 for fast back-referencing to the socket list. */
283 id_entry->connection = (void *)server->sockets[sock[i]];
284 server->id_entry = id_entry;
287 /* Register the task queues. In SILC we have by default three task queues.
288 One task queue for non-timeout tasks which perform different kind of
289 I/O on file descriptors, timeout task queue for timeout tasks, and,
290 generic non-timeout task queue whose tasks apply to all connections. */
291 silc_task_queue_alloc(&server->io_queue, TRUE);
292 if (!server->io_queue) {
295 silc_task_queue_alloc(&server->timeout_queue, TRUE);
296 if (!server->timeout_queue) {
299 silc_task_queue_alloc(&server->generic_queue, TRUE);
300 if (!server->generic_queue) {
304 /* Register protocols */
305 silc_server_protocols_register();
307 /* Initialize the scheduler */
308 silc_schedule_init(&server->io_queue, &server->timeout_queue,
309 &server->generic_queue,
310 SILC_SERVER_MAX_CONNECTIONS);
312 /* Add the first task to the queue. This is task that is executed by
313 timeout. It expires as soon as the caller calls silc_server_run. This
314 task performs authentication protocol and key exchange with our
316 silc_task_register(server->timeout_queue, sock[0],
317 silc_server_connect_to_router,
318 (void *)server, 0, 1,
320 SILC_TASK_PRI_NORMAL);
322 /* Add listener task to the queue. This task receives new connections to the
323 server. This task remains on the queue until the end of the program. */
324 silc_task_register(server->io_queue, sock[0],
325 silc_server_accept_new_connection,
326 (void *)server, 0, 0,
328 SILC_TASK_PRI_NORMAL);
329 server->listenning = TRUE;
331 /* If server connections has been configured then we must be router as
332 normal server cannot have server connections, only router connections. */
333 if (server->config->servers)
334 server->server_type = SILC_ROUTER;
336 SILC_LOG_DEBUG(("Server initialized"));
338 /* We are done here, return succesfully */
341 silc_task_queue_free(server->timeout_queue);
343 silc_task_queue_free(server->io_queue);
345 for (i = 0; i < sock_count; i++)
346 silc_net_close_server(sock[i]);
351 /* Fork server to background and set gid+uid to non-root.
352 Silcd will not run as root, so trying to set either user or group to
353 root will cause silcd to exit. */
355 void silc_server_daemonise(SilcServer server)
357 /* Are we executing silcd as root or a regular user? */
364 if (!server->config->identity || !server->config->identity->user ||
365 !server->config->identity->group) {
366 fprintf(stderr, "Error:"
367 "\tSILC server must not be run as root. For the security of your\n"
368 "\tsystem it is strongly suggested that you run SILC under dedicated\n"
369 "\tuser account. Modify the [Identity] configuration section to run\n"
370 "\tthe server as non-root user.\n");
374 /* Get the values given for user and group in configuration file */
375 user=server->config->identity->user;
376 group=server->config->identity->group;
378 /* Check whether the user/group information is text */
379 if (atoi(user)!=0 || atoi(group)!=0) {
380 SILC_LOG_DEBUG(("Invalid user and/or group information"));
381 SILC_LOG_DEBUG(("User and/or group given as number"));
382 fprintf(stderr, "Invalid user and/or group information\n");
383 fprintf(stderr, "Please assign them as names, not numbers\n");
387 /* Catch the nasty incident of string "0" returning 0 from atoi */
388 if (strcmp("0", user)==0 || strcmp("0", group)==0) {
389 SILC_LOG_DEBUG(("User and/or group configured to 0. Unacceptable"));
390 fprintf(stderr, "User and/or group configured to 0. Exiting\n");
398 fprintf(stderr, "No such user %s found\n", user);
403 fprintf(stderr, "No such group %s found\n", group);
407 /* Check whether user and/or group is set to root. If yes, exit
408 immediately. Otherwise, setgid and setuid server to user.group */
409 if (gr->gr_gid==0 || pw->pw_uid==0) {
410 fprintf(stderr, "Error:"
411 "\tSILC server must not be run as root. For the security of your\n"
412 "\tsystem it is strongly suggested that you run SILC under dedicated\n"
413 "\tuser account. Modify the [Identity] configuration section to run\n"
414 "\tthe server as non-root user.\n");
417 /* Fork server to background, making it a daemon */
419 SILC_LOG_DEBUG(("Server started as root. Dropping privileges."));
420 SILC_LOG_DEBUG(("Forking SILC server to background"));
425 SILC_LOG_DEBUG(("Changing to group %s", group));
426 if(setgid(gr->gr_gid)==0) {
427 SILC_LOG_DEBUG(("Setgid to %s", group));
429 SILC_LOG_DEBUG(("Setgid to %s failed", group));
430 fprintf(stderr, "Tried to setgid %s but no such group. Exiting\n",
434 SILC_LOG_DEBUG(("Changing to user nobody"));
435 if(setuid(pw->pw_uid)==0) {
436 SILC_LOG_DEBUG(("Setuid to %s", user));
438 SILC_LOG_DEBUG(("Setuid to %s failed", user));
439 fprintf(stderr, "Tried to setuid %s but no such user. Exiting\n",
445 /* Fork server to background, making it a daemon */
447 SILC_LOG_DEBUG(("Server started as user"));
448 SILC_LOG_DEBUG(("Forking SILC server to background"));
455 /* Stops the SILC server. This function is used to shutdown the server.
456 This is usually called after the scheduler has returned. After stopping
457 the server one should call silc_server_free. */
459 void silc_server_stop(SilcServer server)
461 SILC_LOG_DEBUG(("Stopping server"));
463 /* Stop the scheduler, although it might be already stopped. This
464 doesn't hurt anyone. This removes all the tasks and task queues,
466 silc_schedule_stop();
467 silc_schedule_uninit();
469 silc_server_protocols_unregister();
471 SILC_LOG_DEBUG(("Server stopped"));
474 /* The heart of the server. This runs the scheduler thus runs the server.
475 When this returns the server has been stopped and the program will
478 void silc_server_run(SilcServer server)
480 SILC_LOG_DEBUG(("Running server"));
482 /* Start the scheduler, the heart of the SILC server. When this returns
483 the program will be terminated. */
487 /* Timeout callback that will be called to retry connecting to remote
488 router. This is used by both normal and router server. This will wait
489 before retrying the connecting. The timeout is generated by exponential
490 backoff algorithm. */
492 SILC_TASK_CALLBACK(silc_server_connect_to_router_retry)
494 SilcServerConnection sconn = (SilcServerConnection)context;
495 SilcServer server = sconn->server;
497 SILC_LOG_INFO(("Retrying connecting to a router"));
499 /* Calculate next timeout */
500 if (sconn->retry_count >= 1) {
501 sconn->retry_timeout = sconn->retry_timeout * SILC_SERVER_RETRY_MULTIPLIER;
502 if (sconn->retry_timeout > SILC_SERVER_RETRY_INTERVAL_MAX)
503 sconn->retry_timeout = SILC_SERVER_RETRY_INTERVAL_MAX;
505 sconn->retry_timeout = server->params->retry_interval_min;
507 sconn->retry_count++;
508 sconn->retry_timeout = sconn->retry_timeout +
509 silc_rng_get_rn32(server->rng) % SILC_SERVER_RETRY_RANDOMIZER;
511 /* If we've reached max retry count, give up. */
512 if (sconn->retry_count > server->params->retry_count &&
513 server->params->retry_keep_trying == FALSE) {
514 SILC_LOG_ERROR(("Could not connect to router, giving up"));
518 /* Wait one before retrying */
519 silc_task_register(server->timeout_queue, fd, silc_server_connect_router,
520 context, sconn->retry_timeout,
521 server->params->retry_interval_min_usec,
522 SILC_TASK_TIMEOUT, SILC_TASK_PRI_NORMAL);
525 /* Generic routine to use connect to a router. */
527 SILC_TASK_CALLBACK(silc_server_connect_router)
529 SilcServerConnection sconn = (SilcServerConnection)context;
530 SilcServer server = sconn->server;
531 SilcSocketConnection newsocket;
532 SilcProtocol protocol;
533 SilcServerKEInternalContext *proto_ctx;
536 /* Connect to remote host */
537 sock = silc_net_create_connection(sconn->remote_port,
540 SILC_LOG_ERROR(("Could not connect to router"));
541 silc_task_register(server->timeout_queue, fd,
542 silc_server_connect_to_router_retry,
543 context, 0, 1, SILC_TASK_TIMEOUT,
544 SILC_TASK_PRI_NORMAL);
548 /* Set socket options */
549 silc_net_set_socket_nonblock(sock);
550 silc_net_set_socket_opt(sock, SOL_SOCKET, SO_REUSEADDR, 1);
552 /* Create socket connection for the connection. Even though we
553 know that we are connecting to a router we will mark the socket
554 to be unknown connection until we have executed authentication
556 silc_socket_alloc(sock, SILC_SOCKET_TYPE_UNKNOWN, NULL, &newsocket);
557 server->sockets[sock] = newsocket;
558 newsocket->hostname = strdup(sconn->remote_host);
559 newsocket->ip = strdup(sconn->remote_host);
560 newsocket->port = sconn->remote_port;
561 sconn->sock = newsocket;
563 /* Allocate internal protocol context. This is sent as context
565 proto_ctx = silc_calloc(1, sizeof(*proto_ctx));
566 proto_ctx->server = (void *)server;
567 proto_ctx->context = (void *)sconn;
568 proto_ctx->sock = newsocket;
569 proto_ctx->rng = server->rng;
570 proto_ctx->responder = FALSE;
572 /* Perform key exchange protocol. silc_server_connect_to_router_second
573 will be called after the protocol is finished. */
574 silc_protocol_alloc(SILC_PROTOCOL_SERVER_KEY_EXCHANGE,
575 &protocol, proto_ctx,
576 silc_server_connect_to_router_second);
577 newsocket->protocol = protocol;
579 /* Register a timeout task that will be executed if the protocol
580 is not executed within set limit. */
581 proto_ctx->timeout_task =
582 silc_task_register(server->timeout_queue, sock,
583 silc_server_timeout_remote,
584 server, server->params->protocol_timeout,
585 server->params->protocol_timeout_usec,
589 /* Register the connection for network input and output. This sets
590 that scheduler will listen for incoming packets for this connection
591 and sets that outgoing packets may be sent to this connection as
592 well. However, this doesn't set the scheduler for outgoing traffic,
593 it will be set separately by calling SILC_SET_CONNECTION_FOR_OUTPUT,
594 later when outgoing data is available. */
595 context = (void *)server;
596 SILC_REGISTER_CONNECTION_FOR_IO(sock);
598 /* Run the protocol */
599 protocol->execute(server->timeout_queue, 0, protocol, sock, 0, 0);
602 /* This function connects to our primary router or if we are a router this
603 establishes all our primary routes. This is called at the start of the
604 server to do authentication and key exchange with our router - called
607 SILC_TASK_CALLBACK(silc_server_connect_to_router)
609 SilcServer server = (SilcServer)context;
610 SilcServerConnection sconn;
612 SILC_LOG_DEBUG(("Connecting to router(s)"));
614 /* If we are normal SILC server we need to connect to our cell's
616 if (server->server_type == SILC_SERVER) {
617 SILC_LOG_DEBUG(("We are normal server"));
619 /* Create connection to the router, if configured. */
620 if (server->config->routers) {
622 /* Allocate connection object for hold connection specific stuff. */
623 sconn = silc_calloc(1, sizeof(*sconn));
624 sconn->server = server;
625 sconn->remote_host = server->config->routers->host;
626 sconn->remote_port = server->config->routers->port;
628 silc_task_register(server->timeout_queue, fd,
629 silc_server_connect_router,
630 (void *)sconn, 0, 1, SILC_TASK_TIMEOUT,
631 SILC_TASK_PRI_NORMAL);
636 /* If we are a SILC router we need to establish all of our primary
638 if (server->server_type == SILC_ROUTER) {
639 SilcConfigServerSectionServerConnection *ptr;
641 SILC_LOG_DEBUG(("We are router"));
643 /* Create the connections to all our routes */
644 ptr = server->config->routers;
647 SILC_LOG_DEBUG(("Router connection [%s] %s:%d",
648 ptr->initiator ? "Initiator" : "Responder",
649 ptr->host, ptr->port));
651 if (ptr->initiator) {
652 /* Allocate connection object for hold connection specific stuff. */
653 sconn = silc_calloc(1, sizeof(*sconn));
654 sconn->server = server;
655 sconn->remote_host = ptr->host;
656 sconn->remote_port = ptr->port;
658 silc_task_register(server->timeout_queue, fd,
659 silc_server_connect_router,
660 (void *)sconn, 0, 1, SILC_TASK_TIMEOUT,
661 SILC_TASK_PRI_NORMAL);
671 SILC_LOG_DEBUG(("No router(s), server will be standalone"));
673 /* There wasn't a configured router, we will continue but we don't
674 have a connection to outside world. We will be standalone server. */
675 server->standalone = TRUE;
678 /* Second part of connecting to router(s). Key exchange protocol has been
679 executed and now we will execute authentication protocol. */
681 SILC_TASK_CALLBACK(silc_server_connect_to_router_second)
683 SilcProtocol protocol = (SilcProtocol)context;
684 SilcServerKEInternalContext *ctx =
685 (SilcServerKEInternalContext *)protocol->context;
686 SilcServer server = (SilcServer)ctx->server;
687 SilcServerConnection sconn = (SilcServerConnection)ctx->context;
688 SilcSocketConnection sock = NULL;
689 SilcServerConnAuthInternalContext *proto_ctx;
691 SILC_LOG_DEBUG(("Start"));
693 if (protocol->state == SILC_PROTOCOL_STATE_ERROR) {
694 /* Error occured during protocol */
695 silc_protocol_free(protocol);
697 silc_packet_context_free(ctx->packet);
699 silc_ske_free(ctx->ske);
701 silc_free(ctx->dest_id);
704 sock->protocol = NULL;
705 silc_server_disconnect_remote(server, sock, "Server closed connection: "
706 "Key exchange failed");
710 /* Allocate internal context for the authentication protocol. This
711 is sent as context for the protocol. */
712 proto_ctx = silc_calloc(1, sizeof(*proto_ctx));
713 proto_ctx->server = (void *)server;
714 proto_ctx->context = (void *)sconn;
715 proto_ctx->sock = sock = server->sockets[fd];
716 proto_ctx->ske = ctx->ske; /* Save SKE object from previous protocol */
717 proto_ctx->dest_id_type = ctx->dest_id_type;
718 proto_ctx->dest_id = ctx->dest_id;
720 /* Resolve the authentication method used in this connection */
721 proto_ctx->auth_meth = SILC_PROTOCOL_CONN_AUTH_PASSWORD;
722 if (server->config->routers) {
723 SilcConfigServerSectionServerConnection *conn = NULL;
725 /* Check if we find a match from user configured connections */
726 conn = silc_config_server_find_router_conn(server->config,
730 /* Match found. Use the configured authentication method */
731 proto_ctx->auth_meth = conn->auth_meth;
732 if (conn->auth_data) {
733 proto_ctx->auth_data = strdup(conn->auth_data);
734 proto_ctx->auth_data_len = strlen(conn->auth_data);
737 /* No match found. */
744 /* Free old protocol as it is finished now */
745 silc_protocol_free(protocol);
747 silc_packet_context_free(ctx->packet);
749 sock->protocol = NULL;
751 /* Allocate the authentication protocol. This is allocated here
752 but we won't start it yet. We will be receiving party of this
753 protocol thus we will wait that connecting party will make
755 silc_protocol_alloc(SILC_PROTOCOL_SERVER_CONNECTION_AUTH,
756 &sock->protocol, proto_ctx,
757 silc_server_connect_to_router_final);
759 /* Register timeout task. If the protocol is not executed inside
760 this timelimit the connection will be terminated. Currently
761 this is 15 seconds and is hard coded limit (XXX). */
762 proto_ctx->timeout_task =
763 silc_task_register(server->timeout_queue, sock->sock,
764 silc_server_timeout_remote,
765 (void *)server, 15, 0,
769 /* Run the protocol */
770 sock->protocol->execute(server->timeout_queue, 0,
771 sock->protocol, sock->sock, 0, 0);
774 /* Finalizes the connection to router. Registers a server task to the
775 queue so that we can accept new connections. */
777 SILC_TASK_CALLBACK(silc_server_connect_to_router_final)
779 SilcProtocol protocol = (SilcProtocol)context;
780 SilcServerConnAuthInternalContext *ctx =
781 (SilcServerConnAuthInternalContext *)protocol->context;
782 SilcServer server = (SilcServer)ctx->server;
783 SilcServerConnection sconn = (SilcServerConnection)ctx->context;
784 SilcSocketConnection sock = ctx->sock;
785 SilcServerEntry id_entry;
787 SilcServerHBContext hb_context;
788 unsigned char *id_string;
790 SILC_LOG_DEBUG(("Start"));
792 if (protocol->state == SILC_PROTOCOL_STATE_ERROR) {
793 /* Error occured during protocol */
795 silc_free(ctx->dest_id);
796 silc_server_disconnect_remote(server, sock, "Server closed connection: "
797 "Authentication failed");
801 /* Add a task to the queue. This task receives new connections to the
802 server. This task remains on the queue until the end of the program. */
803 if (!server->listenning) {
804 silc_task_register(server->io_queue, server->sock,
805 silc_server_accept_new_connection,
806 (void *)server, 0, 0,
808 SILC_TASK_PRI_NORMAL);
809 server->listenning = TRUE;
812 /* Send NEW_SERVER packet to the router. We will become registered
813 to the SILC network after sending this packet. */
814 id_string = silc_id_id2str(server->id, SILC_ID_SERVER);
815 packet = silc_buffer_alloc(2 + 2 + SILC_ID_SERVER_LEN +
816 strlen(server->server_name));
817 silc_buffer_pull_tail(packet, SILC_BUFFER_END(packet));
818 silc_buffer_format(packet,
819 SILC_STR_UI_SHORT(SILC_ID_SERVER_LEN),
820 SILC_STR_UI_XNSTRING(id_string, SILC_ID_SERVER_LEN),
821 SILC_STR_UI_SHORT(strlen(server->server_name)),
822 SILC_STR_UI_XNSTRING(server->server_name,
823 strlen(server->server_name)),
826 /* Send the packet */
827 silc_server_packet_send(server, ctx->sock, SILC_PACKET_NEW_SERVER, 0,
828 packet->data, packet->len, TRUE);
829 silc_buffer_free(packet);
830 silc_free(id_string);
832 SILC_LOG_DEBUG(("Connected to router %s", sock->hostname));
834 /* Add the connected router to local server list */
835 server->standalone = FALSE;
836 id_entry = silc_idlist_add_server(server->local_list, sock->hostname,
837 SILC_ROUTER, ctx->dest_id, NULL, sock);
840 silc_free(ctx->dest_id);
841 silc_server_disconnect_remote(server, sock, "Server closed connection: "
842 "Authentication failed");
846 silc_idlist_add_data(id_entry, (SilcIDListData)sock->user_data);
847 silc_free(sock->user_data);
848 sock->user_data = (void *)id_entry;
849 sock->type = SILC_SOCKET_TYPE_ROUTER;
850 server->id_entry->router = id_entry;
851 server->router = id_entry;
852 server->router->data.registered = TRUE;
854 /* Perform keepalive. The `hb_context' will be freed automatically
855 when finally calling the silc_socket_free function. XXX hardcoded
857 hb_context = silc_calloc(1, sizeof(*hb_context));
858 hb_context->server = server;
859 silc_socket_set_heartbeat(sock, 600, hb_context,
860 silc_server_perform_heartbeat,
861 server->timeout_queue);
863 /* If we are router then announce our possible servers. */
864 if (server->server_type == SILC_ROUTER)
865 silc_server_announce_servers(server);
867 /* Announce our clients and channels to the router */
868 silc_server_announce_clients(server);
869 silc_server_announce_channels(server);
872 /* Free the temporary connection data context */
876 /* Free the protocol object */
877 silc_protocol_free(protocol);
879 silc_packet_context_free(ctx->packet);
881 silc_ske_free(ctx->ske);
883 sock->protocol = NULL;
886 /* Accepts new connections to the server. Accepting new connections are
887 done in three parts to make it async. */
889 SILC_TASK_CALLBACK(silc_server_accept_new_connection)
891 SilcServer server = (SilcServer)context;
892 SilcSocketConnection newsocket;
893 SilcServerKEInternalContext *proto_ctx;
896 SILC_LOG_DEBUG(("Accepting new connection"));
898 server->stat.conn_attempts++;
900 sock = silc_net_accept_connection(server->sock);
902 SILC_LOG_ERROR(("Could not accept new connection: %s", strerror(errno)));
903 server->stat.conn_failures++;
907 /* Check max connections */
908 if (sock > SILC_SERVER_MAX_CONNECTIONS) {
909 if (server->config->redirect) {
910 /* XXX Redirecting connection to somewhere else now?? */
911 /*silc_server_send_notify("Server is full, trying to redirect..."); */
913 SILC_LOG_ERROR(("Refusing connection, server is full"));
914 server->stat.conn_failures++;
919 /* Set socket options */
920 silc_net_set_socket_nonblock(sock);
921 silc_net_set_socket_opt(sock, SOL_SOCKET, SO_REUSEADDR, 1);
923 /* We don't create a ID yet, since we don't know what type of connection
924 this is yet. But, we do add the connection to the socket table. */
925 silc_socket_alloc(sock, SILC_SOCKET_TYPE_UNKNOWN, NULL, &newsocket);
926 server->sockets[sock] = newsocket;
928 /* XXX This MUST be done async as this will block the entire server
929 process. Either we have to do our own resolver stuff or in the future
930 we can use threads. */
931 /* Perform name and address lookups for the remote host. */
932 silc_net_check_host_by_sock(sock, &newsocket->hostname, &newsocket->ip);
933 if ((server->params->require_reverse_mapping && !newsocket->hostname) ||
935 SILC_LOG_ERROR(("IP/DNS lookup failed"));
936 server->stat.conn_failures++;
939 if (!newsocket->hostname)
940 newsocket->hostname = strdup(newsocket->ip);
941 newsocket->port = silc_net_get_remote_port(sock);
943 SILC_LOG_INFO(("Incoming connection from %s (%s)", newsocket->hostname,
946 /* Allocate internal context for key exchange protocol. This is
947 sent as context for the protocol. */
948 proto_ctx = silc_calloc(1, sizeof(*proto_ctx));
949 proto_ctx->server = context;
950 proto_ctx->sock = newsocket;
951 proto_ctx->rng = server->rng;
952 proto_ctx->responder = TRUE;
954 /* Prepare the connection for key exchange protocol. We allocate the
955 protocol but will not start it yet. The connector will be the
956 initiator of the protocol thus we will wait for initiation from
957 there before we start the protocol. */
958 server->stat.auth_attempts++;
959 silc_protocol_alloc(SILC_PROTOCOL_SERVER_KEY_EXCHANGE,
960 &newsocket->protocol, proto_ctx,
961 silc_server_accept_new_connection_second);
963 /* Register a timeout task that will be executed if the connector
964 will not start the key exchange protocol within 60 seconds. For
965 now, this is a hard coded limit. After 60 secs the connection will
966 be closed if the key exchange protocol has not been started. */
967 proto_ctx->timeout_task =
968 silc_task_register(server->timeout_queue, newsocket->sock,
969 silc_server_timeout_remote,
974 /* Register the connection for network input and output. This sets
975 that scheduler will listen for incoming packets for this connection
976 and sets that outgoing packets may be sent to this connection as well.
977 However, this doesn't set the scheduler for outgoing traffic, it
978 will be set separately by calling SILC_SET_CONNECTION_FOR_OUTPUT,
979 later when outgoing data is available. */
980 SILC_REGISTER_CONNECTION_FOR_IO(sock);
983 /* Second part of accepting new connection. Key exchange protocol has been
984 performed and now it is time to do little connection authentication
985 protocol to figure out whether this connection is client or server
986 and whether it has right to access this server (especially server
987 connections needs to be authenticated). */
989 SILC_TASK_CALLBACK(silc_server_accept_new_connection_second)
991 SilcProtocol protocol = (SilcProtocol)context;
992 SilcServerKEInternalContext *ctx =
993 (SilcServerKEInternalContext *)protocol->context;
994 SilcServer server = (SilcServer)ctx->server;
995 SilcSocketConnection sock = NULL;
996 SilcServerConnAuthInternalContext *proto_ctx;
998 SILC_LOG_DEBUG(("Start"));
1000 if (protocol->state == SILC_PROTOCOL_STATE_ERROR) {
1001 /* Error occured during protocol */
1002 silc_protocol_free(protocol);
1004 silc_packet_context_free(ctx->packet);
1006 silc_ske_free(ctx->ske);
1008 silc_free(ctx->dest_id);
1011 sock->protocol = NULL;
1012 silc_server_disconnect_remote(server, sock, "Server closed connection: "
1013 "Key exchange failed");
1014 server->stat.auth_failures++;
1018 /* Allocate internal context for the authentication protocol. This
1019 is sent as context for the protocol. */
1020 proto_ctx = silc_calloc(1, sizeof(*proto_ctx));
1021 proto_ctx->server = (void *)server;
1022 proto_ctx->sock = sock = server->sockets[fd];
1023 proto_ctx->ske = ctx->ske; /* Save SKE object from previous protocol */
1024 proto_ctx->responder = TRUE;
1025 proto_ctx->dest_id_type = ctx->dest_id_type;
1026 proto_ctx->dest_id = ctx->dest_id;
1028 /* Free old protocol as it is finished now */
1029 silc_protocol_free(protocol);
1031 silc_packet_context_free(ctx->packet);
1033 sock->protocol = NULL;
1035 /* Allocate the authentication protocol. This is allocated here
1036 but we won't start it yet. We will be receiving party of this
1037 protocol thus we will wait that connecting party will make
1038 their first move. */
1039 silc_protocol_alloc(SILC_PROTOCOL_SERVER_CONNECTION_AUTH,
1040 &sock->protocol, proto_ctx,
1041 silc_server_accept_new_connection_final);
1043 /* Register timeout task. If the protocol is not executed inside
1044 this timelimit the connection will be terminated. Currently
1045 this is 60 seconds and is hard coded limit (XXX). */
1046 proto_ctx->timeout_task =
1047 silc_task_register(server->timeout_queue, sock->sock,
1048 silc_server_timeout_remote,
1049 (void *)server, 60, 0,
1054 /* Final part of accepting new connection. The connection has now
1055 been authenticated and keys has been exchanged. We also know whether
1056 this is client or server connection. */
1058 SILC_TASK_CALLBACK(silc_server_accept_new_connection_final)
1060 SilcProtocol protocol = (SilcProtocol)context;
1061 SilcServerConnAuthInternalContext *ctx =
1062 (SilcServerConnAuthInternalContext *)protocol->context;
1063 SilcServer server = (SilcServer)ctx->server;
1064 SilcSocketConnection sock = ctx->sock;
1065 SilcServerHBContext hb_context;
1066 void *id_entry = NULL;
1068 SILC_LOG_DEBUG(("Start"));
1070 if (protocol->state == SILC_PROTOCOL_STATE_ERROR) {
1071 /* Error occured during protocol */
1072 silc_protocol_free(protocol);
1074 silc_packet_context_free(ctx->packet);
1076 silc_ske_free(ctx->ske);
1078 silc_free(ctx->dest_id);
1081 sock->protocol = NULL;
1082 silc_server_disconnect_remote(server, sock, "Server closed connection: "
1083 "Authentication failed");
1084 server->stat.auth_failures++;
1088 sock->type = ctx->conn_type;
1089 switch(sock->type) {
1090 case SILC_SOCKET_TYPE_CLIENT:
1092 SilcClientEntry client;
1094 SILC_LOG_DEBUG(("Remote host is client"));
1095 SILC_LOG_INFO(("Connection from %s (%s) is client", sock->hostname,
1098 /* Add the client to the client ID cache. The nickname and Client ID
1099 and other information is created after we have received NEW_CLIENT
1100 packet from client. */
1101 client = silc_idlist_add_client(server->local_list,
1102 NULL, NULL, NULL, NULL, NULL, sock);
1104 SILC_LOG_ERROR(("Could not add new client to cache"));
1105 silc_free(sock->user_data);
1110 server->stat.my_clients++;
1111 server->stat.clients++;
1112 if (server->server_type == SILC_ROUTER)
1113 server->stat.cell_clients++;
1115 id_entry = (void *)client;
1118 case SILC_SOCKET_TYPE_SERVER:
1119 case SILC_SOCKET_TYPE_ROUTER:
1121 SilcServerEntry new_server;
1123 SILC_LOG_DEBUG(("Remote host is %s",
1124 sock->type == SILC_SOCKET_TYPE_SERVER ?
1125 "server" : "router"));
1126 SILC_LOG_INFO(("Connection from %s (%s) is %s", sock->hostname,
1127 sock->ip, sock->type == SILC_SOCKET_TYPE_SERVER ?
1128 "server" : "router"));
1130 /* Add the server into server cache. The server name and Server ID
1131 is updated after we have received NEW_SERVER packet from the
1132 server. We mark ourselves as router for this server if we really
1135 silc_idlist_add_server(server->local_list, NULL,
1136 sock->type == SILC_SOCKET_TYPE_SERVER ?
1137 SILC_SERVER : SILC_ROUTER, NULL,
1138 sock->type == SILC_SOCKET_TYPE_SERVER ?
1139 server->id_entry : NULL, sock);
1141 SILC_LOG_ERROR(("Could not add new server to cache"));
1142 silc_free(sock->user_data);
1147 if (sock->type == SILC_SOCKET_TYPE_SERVER)
1148 server->stat.my_servers++;
1150 server->stat.my_routers++;
1151 server->stat.servers++;
1153 id_entry = (void *)new_server;
1155 /* There is connection to other server now, if it is router then
1156 we will have connection to outside world. If we are router but
1157 normal server connected to us then we will remain standalone,
1158 if we are standlone. */
1159 if (server->standalone && sock->type == SILC_SOCKET_TYPE_ROUTER) {
1160 SILC_LOG_DEBUG(("We are not standalone server anymore"));
1161 server->standalone = FALSE;
1162 if (!server->id_entry->router) {
1163 server->id_entry->router = id_entry;
1164 server->router = id_entry;
1173 /* Add the common data structure to the ID entry. */
1175 silc_idlist_add_data(id_entry, (SilcIDListData)sock->user_data);
1177 /* Add to sockets internal pointer for fast referencing */
1178 silc_free(sock->user_data);
1179 sock->user_data = id_entry;
1181 /* Connection has been fully established now. Everything is ok. */
1182 SILC_LOG_DEBUG(("New connection authenticated"));
1184 /* Perform keepalive. The `hb_context' will be freed automatically
1185 when finally calling the silc_socket_free function. XXX hardcoded
1187 hb_context = silc_calloc(1, sizeof(*hb_context));
1188 hb_context->server = server;
1189 silc_socket_set_heartbeat(sock, 600, hb_context,
1190 silc_server_perform_heartbeat,
1191 server->timeout_queue);
1193 silc_protocol_free(protocol);
1195 silc_packet_context_free(ctx->packet);
1197 silc_ske_free(ctx->ske);
1199 silc_free(ctx->dest_id);
1201 sock->protocol = NULL;
1204 /* This function is used to read packets from network and send packets to
1205 network. This is usually a generic task. */
1207 SILC_TASK_CALLBACK(silc_server_packet_process)
1209 SilcServer server = (SilcServer)context;
1210 SilcSocketConnection sock = server->sockets[fd];
1211 SilcIDListData idata;
1212 SilcCipher cipher = NULL;
1213 SilcHmac hmac = NULL;
1219 SILC_LOG_DEBUG(("Processing packet"));
1221 /* Packet sending */
1223 if (type == SILC_TASK_WRITE) {
1224 /* Do not send data to disconnected connection */
1225 if (SILC_IS_DISCONNECTED(sock))
1228 server->stat.packets_sent++;
1230 if (sock->outbuf->data - sock->outbuf->head)
1231 silc_buffer_push(sock->outbuf, sock->outbuf->data - sock->outbuf->head);
1233 ret = silc_server_packet_send_real(server, sock, TRUE);
1235 /* If returned -2 could not write to connection now, will do
1243 /* The packet has been sent and now it is time to set the connection
1244 back to only for input. When there is again some outgoing data
1245 available for this connection it will be set for output as well.
1246 This call clears the output setting and sets it only for input. */
1247 SILC_SET_CONNECTION_FOR_INPUT(fd);
1248 SILC_UNSET_OUTBUF_PENDING(sock);
1250 silc_buffer_clear(sock->outbuf);
1254 /* Packet receiving */
1256 /* Read some data from connection */
1257 ret = silc_packet_receive(sock);
1263 SILC_LOG_DEBUG(("Read EOF"));
1265 /* If connection is disconnecting already we will finally
1266 close the connection */
1267 if (SILC_IS_DISCONNECTING(sock)) {
1268 if (sock->user_data)
1269 silc_server_free_sock_user_data(server, sock);
1270 silc_server_close_connection(server, sock);
1274 SILC_LOG_DEBUG(("Premature EOF from connection %d", sock->sock));
1275 SILC_SET_DISCONNECTING(sock);
1277 /* If the closed connection was our primary router connection the
1278 start re-connecting phase. */
1279 if (!server->standalone && server->server_type == SILC_SERVER &&
1280 sock == server->router->connection)
1281 silc_task_register(server->timeout_queue, 0,
1282 silc_server_connect_to_router,
1285 SILC_TASK_PRI_NORMAL);
1287 if (sock->user_data)
1288 silc_server_free_sock_user_data(server, sock);
1289 silc_server_close_connection(server, sock);
1293 /* If connection is disconnecting or disconnected we will ignore
1295 if (SILC_IS_DISCONNECTING(sock) || SILC_IS_DISCONNECTED(sock)) {
1296 SILC_LOG_DEBUG(("Ignoring read data from disonnected connection"));
1300 server->stat.packets_received++;
1302 /* Get keys and stuff from ID entry */
1303 idata = (SilcIDListData)sock->user_data;
1305 idata->last_receive = time(NULL);
1306 cipher = idata->receive_key;
1310 /* Process the packet. This will call the parser that will then
1311 decrypt and parse the packet. */
1312 silc_packet_receive_process(sock, cipher, hmac, silc_server_packet_parse,
1316 /* Parses whole packet, received earlier. */
1318 SILC_TASK_CALLBACK(silc_server_packet_parse_real)
1320 SilcPacketParserContext *parse_ctx = (SilcPacketParserContext *)context;
1321 SilcServer server = (SilcServer)parse_ctx->context;
1322 SilcSocketConnection sock = parse_ctx->sock;
1323 SilcPacketContext *packet = parse_ctx->packet;
1326 SILC_LOG_DEBUG(("Start"));
1328 /* Decrypt the received packet */
1329 ret = silc_packet_decrypt(parse_ctx->cipher, parse_ctx->hmac,
1330 packet->buffer, packet);
1335 /* Parse the packet. Packet type is returned. */
1336 ret = silc_packet_parse(packet);
1338 /* Parse the packet header in special way as this is "special"
1340 ret = silc_packet_parse_special(packet);
1343 if (ret == SILC_PACKET_NONE)
1346 if (server->server_type == SILC_ROUTER) {
1347 /* Route the packet if it is not destined to us. Other ID types but
1348 server are handled separately after processing them. */
1349 if (packet->dst_id_type == SILC_ID_SERVER &&
1350 sock->type != SILC_SOCKET_TYPE_CLIENT &&
1351 SILC_ID_SERVER_COMPARE(packet->dst_id, server->id_string)) {
1353 /* Route the packet to fastest route for the destination ID */
1354 void *id = silc_id_str2id(packet->dst_id, packet->dst_id_len,
1355 packet->dst_id_type);
1358 silc_server_packet_route(server,
1359 silc_server_route_get(server, id,
1360 packet->dst_id_type),
1366 /* Broadcast packet if it is marked as broadcast packet and it is
1367 originated from router and we are router. */
1368 if (sock->type == SILC_SOCKET_TYPE_ROUTER &&
1369 packet->flags & SILC_PACKET_FLAG_BROADCAST) {
1370 silc_server_packet_broadcast(server, server->router->connection, packet);
1374 /* Parse the incoming packet type */
1375 silc_server_packet_parse_type(server, sock, packet);
1378 silc_buffer_clear(sock->inbuf);
1379 silc_packet_context_free(packet);
1380 silc_free(parse_ctx);
1383 /* Parser callback called by silc_packet_receive_process. This merely
1384 registers timeout that will handle the actual parsing when appropriate. */
1386 void silc_server_packet_parse(SilcPacketParserContext *parser_context)
1388 SilcServer server = (SilcServer)parser_context->context;
1389 SilcSocketConnection sock = parser_context->sock;
1391 switch (sock->type) {
1392 case SILC_SOCKET_TYPE_CLIENT:
1393 case SILC_SOCKET_TYPE_UNKNOWN:
1394 /* Parse the packet with timeout */
1395 silc_task_register(server->timeout_queue, sock->sock,
1396 silc_server_packet_parse_real,
1397 (void *)parser_context, 0, 100000,
1399 SILC_TASK_PRI_NORMAL);
1401 case SILC_SOCKET_TYPE_SERVER:
1402 case SILC_SOCKET_TYPE_ROUTER:
1403 /* Packets from servers are parsed as soon as possible */
1404 silc_task_register(server->timeout_queue, sock->sock,
1405 silc_server_packet_parse_real,
1406 (void *)parser_context, 0, 1,
1408 SILC_TASK_PRI_NORMAL);
1415 /* Parses the packet type and calls what ever routines the packet type
1416 requires. This is done for all incoming packets. */
1418 void silc_server_packet_parse_type(SilcServer server,
1419 SilcSocketConnection sock,
1420 SilcPacketContext *packet)
1422 SilcPacketType type = packet->type;
1424 SILC_LOG_DEBUG(("Parsing packet type %d", type));
1426 /* Parse the packet type */
1428 case SILC_PACKET_DISCONNECT:
1429 SILC_LOG_DEBUG(("Disconnect packet"));
1432 case SILC_PACKET_SUCCESS:
1434 * Success received for something. For now we can have only
1435 * one protocol for connection executing at once hence this
1436 * success message is for whatever protocol is executing currently.
1438 SILC_LOG_DEBUG(("Success packet"));
1439 if (sock->protocol) {
1440 sock->protocol->execute(server->timeout_queue, 0,
1441 sock->protocol, sock->sock, 0, 0);
1445 case SILC_PACKET_FAILURE:
1447 * Failure received for something. For now we can have only
1448 * one protocol for connection executing at once hence this
1449 * failure message is for whatever protocol is executing currently.
1451 SILC_LOG_DEBUG(("Failure packet"));
1452 if (sock->protocol) {
1453 /* XXX Audit the failure type */
1454 sock->protocol->state = SILC_PROTOCOL_STATE_FAILURE;
1455 sock->protocol->execute(server->timeout_queue, 0,
1456 sock->protocol, sock->sock, 0, 0);
1460 case SILC_PACKET_REJECT:
1461 SILC_LOG_DEBUG(("Reject packet"));
1465 case SILC_PACKET_NOTIFY:
1467 * Received notify packet. Server can receive notify packets from
1468 * router. Server then relays the notify messages to clients if needed.
1470 SILC_LOG_DEBUG(("Notify packet"));
1471 silc_server_notify(server, sock, packet);
1477 case SILC_PACKET_CHANNEL_MESSAGE:
1479 * Received channel message. Channel messages are special packets
1480 * (although probably most common ones) thus they are handled
1483 SILC_LOG_DEBUG(("Channel Message packet"));
1484 silc_server_channel_message(server, sock, packet);
1487 case SILC_PACKET_CHANNEL_KEY:
1489 * Received key for channel. As channels are created by the router
1490 * the keys are as well. We will distribute the key to all of our
1491 * locally connected clients on the particular channel. Router
1492 * never receives this channel and thus is ignored.
1494 SILC_LOG_DEBUG(("Channel Key packet"));
1495 silc_server_channel_key(server, sock, packet);
1501 case SILC_PACKET_COMMAND:
1503 * Recived command. Processes the command request and allocates the
1504 * command context and calls the command.
1506 SILC_LOG_DEBUG(("Command packet"));
1507 silc_server_command_process(server, sock, packet);
1510 case SILC_PACKET_COMMAND_REPLY:
1512 * Received command reply packet. Received command reply to command. It
1513 * may be reply to command sent by us or reply to command sent by client
1514 * that we've routed further.
1516 SILC_LOG_DEBUG(("Command Reply packet"));
1517 silc_server_command_reply(server, sock, packet);
1521 * Private Message packets
1523 case SILC_PACKET_PRIVATE_MESSAGE:
1525 * Received private message packet. The packet is coming from either
1528 SILC_LOG_DEBUG(("Private Message packet"));
1529 silc_server_private_message(server, sock, packet);
1532 case SILC_PACKET_PRIVATE_MESSAGE_KEY:
1534 * Private message key packet.
1539 * Key Exchange protocol packets
1541 case SILC_PACKET_KEY_EXCHANGE:
1542 SILC_LOG_DEBUG(("KE packet"));
1543 if (sock->protocol && sock->protocol->protocol->type
1544 == SILC_PROTOCOL_SERVER_KEY_EXCHANGE) {
1546 SilcServerKEInternalContext *proto_ctx =
1547 (SilcServerKEInternalContext *)sock->protocol->context;
1549 proto_ctx->packet = silc_packet_context_dup(packet);
1551 /* Let the protocol handle the packet */
1552 sock->protocol->execute(server->timeout_queue, 0,
1553 sock->protocol, sock->sock, 0, 100000);
1555 SILC_LOG_ERROR(("Received Key Exchange packet but no key exchange "
1556 "protocol active, packet dropped."));
1558 /* XXX Trigger KE protocol?? Rekey actually, maybe. */
1562 case SILC_PACKET_KEY_EXCHANGE_1:
1563 SILC_LOG_DEBUG(("KE 1 packet"));
1564 if (sock->protocol && sock->protocol->protocol->type
1565 == SILC_PROTOCOL_SERVER_KEY_EXCHANGE) {
1567 SilcServerKEInternalContext *proto_ctx =
1568 (SilcServerKEInternalContext *)sock->protocol->context;
1570 if (proto_ctx->packet)
1571 silc_packet_context_free(proto_ctx->packet);
1573 proto_ctx->packet = silc_packet_context_dup(packet);
1574 proto_ctx->dest_id_type = packet->src_id_type;
1575 proto_ctx->dest_id = silc_id_str2id(packet->src_id, packet->src_id_len,
1576 packet->src_id_type);
1577 if (!proto_ctx->dest_id)
1580 /* Let the protocol handle the packet */
1581 sock->protocol->execute(server->timeout_queue, 0,
1582 sock->protocol, sock->sock,
1585 SILC_LOG_ERROR(("Received Key Exchange 1 packet but no key exchange "
1586 "protocol active, packet dropped."));
1590 case SILC_PACKET_KEY_EXCHANGE_2:
1591 SILC_LOG_DEBUG(("KE 2 packet"));
1592 if (sock->protocol && sock->protocol->protocol->type
1593 == SILC_PROTOCOL_SERVER_KEY_EXCHANGE) {
1595 SilcServerKEInternalContext *proto_ctx =
1596 (SilcServerKEInternalContext *)sock->protocol->context;
1598 if (proto_ctx->packet)
1599 silc_packet_context_free(proto_ctx->packet);
1601 proto_ctx->packet = silc_packet_context_dup(packet);
1602 proto_ctx->dest_id_type = packet->src_id_type;
1603 proto_ctx->dest_id = silc_id_str2id(packet->src_id, packet->src_id_len,
1604 packet->src_id_type);
1605 if (!proto_ctx->dest_id)
1608 /* Let the protocol handle the packet */
1609 sock->protocol->execute(server->timeout_queue, 0,
1610 sock->protocol, sock->sock,
1613 SILC_LOG_ERROR(("Received Key Exchange 2 packet but no key exchange "
1614 "protocol active, packet dropped."));
1618 case SILC_PACKET_CONNECTION_AUTH_REQUEST:
1620 * Connection authentication request packet. When we receive this packet
1621 * we will send to the other end information about our mandatory
1622 * authentication method for the connection. This packet maybe received
1625 SILC_LOG_DEBUG(("Connection authentication request packet"));
1629 * Connection Authentication protocol packets
1631 case SILC_PACKET_CONNECTION_AUTH:
1632 /* Start of the authentication protocol. We receive here the
1633 authentication data and will verify it. */
1634 SILC_LOG_DEBUG(("Connection auth packet"));
1635 if (sock->protocol && sock->protocol->protocol->type
1636 == SILC_PROTOCOL_SERVER_CONNECTION_AUTH) {
1638 SilcServerConnAuthInternalContext *proto_ctx =
1639 (SilcServerConnAuthInternalContext *)sock->protocol->context;
1641 proto_ctx->packet = silc_packet_context_dup(packet);
1643 /* Let the protocol handle the packet */
1644 sock->protocol->execute(server->timeout_queue, 0,
1645 sock->protocol, sock->sock, 0, 0);
1647 SILC_LOG_ERROR(("Received Connection Auth packet but no authentication "
1648 "protocol active, packet dropped."));
1652 case SILC_PACKET_NEW_ID:
1654 * Received New ID packet. This includes some new ID that has been
1655 * created. It may be for client, server or channel. This is the way
1656 * to distribute information about new registered entities in the
1659 SILC_LOG_DEBUG(("New ID packet"));
1660 silc_server_new_id(server, sock, packet);
1663 case SILC_PACKET_NEW_ID_LIST:
1665 * Received list of ID's. This packet is used by servers and routers
1666 * to notify their primary router about clients and servers they have.
1668 SILC_LOG_DEBUG(("New ID List packet"));
1669 silc_server_new_id_list(server, sock, packet);
1672 case SILC_PACKET_NEW_CLIENT:
1674 * Received new client packet. This includes client information that
1675 * we will use to create initial client ID. After creating new
1676 * ID we will send it to the client.
1678 SILC_LOG_DEBUG(("New Client packet"));
1679 silc_server_new_client(server, sock, packet);
1682 case SILC_PACKET_NEW_SERVER:
1684 * Received new server packet. This includes Server ID and some other
1685 * information that we may save. This is received after server has
1688 SILC_LOG_DEBUG(("New Server packet"));
1689 silc_server_new_server(server, sock, packet);
1692 case SILC_PACKET_NEW_CHANNEL:
1694 * Received new channel packet. Information about new channel in the
1695 * network are distributed using this packet.
1697 SILC_LOG_DEBUG(("New Channel packet"));
1698 silc_server_new_channel(server, sock, packet);
1701 case SILC_PACKET_NEW_CHANNEL_USER:
1703 * Received new channel user packet. Information about new users on a
1704 * channel are distributed between routers using this packet. The
1705 * router receiving this will redistribute it and also sent JOIN notify
1706 * to local clients on the same channel. Normal server sends JOIN notify
1707 * to its local clients on the channel.
1709 SILC_LOG_DEBUG(("New Channel User packet"));
1710 silc_server_new_channel_user(server, sock, packet);
1713 case SILC_PACKET_NEW_CHANNEL_LIST:
1715 * List of new channel packets received. This is usually received when
1716 * existing server or router connects to us and distributes information
1717 * of all channels it has.
1719 SILC_LOG_DEBUG(("New Channel List packet"));
1720 silc_server_new_channel_list(server, sock, packet);
1723 case SILC_PACKET_NEW_CHANNEL_USER_LIST:
1725 * List of new channel user packets received. This is usually received
1726 * when existing server or router connects to us and distributes
1727 * information of all channel users it has.
1729 SILC_LOG_DEBUG(("New Channel User List packet"));
1730 silc_server_new_channel_user_list(server, sock, packet);
1733 case SILC_PACKET_REPLACE_ID:
1735 * Received replace ID packet. This sends the old ID that is to be
1736 * replaced with the new one included into the packet. Client must not
1739 SILC_LOG_DEBUG(("Replace ID packet"));
1740 silc_server_replace_id(server, sock, packet);
1743 case SILC_PACKET_REMOVE_ID:
1745 * Received remove ID Packet.
1747 SILC_LOG_DEBUG(("Remove ID packet"));
1748 silc_server_remove_id(server, sock, packet);
1751 case SILC_PACKET_REMOVE_CHANNEL_USER:
1753 * Received packet to remove user from a channel. Routers notify other
1754 * routers about a user leaving a channel.
1756 SILC_LOG_DEBUG(("Remove Channel User packet"));
1757 silc_server_remove_channel_user(server, sock, packet);
1760 case SILC_PACKET_SET_MODE:
1762 * Received packet to set the mode of channel or client's channel mode.
1764 SILC_LOG_DEBUG(("Set Mode packet"));
1765 silc_server_set_mode(server, sock, packet);
1768 case SILC_PACKET_HEARTBEAT:
1770 * Received heartbeat.
1772 SILC_LOG_DEBUG(("Heartbeat packet"));
1776 SILC_LOG_ERROR(("Incorrect packet type %d, packet dropped", type));
1782 /* Closes connection to socket connection */
1784 void silc_server_close_connection(SilcServer server,
1785 SilcSocketConnection sock)
1787 SILC_LOG_DEBUG(("Closing connection %d", sock->sock));
1789 /* We won't listen for this connection anymore */
1790 silc_schedule_unset_listen_fd(sock->sock);
1792 /* Unregister all tasks */
1793 silc_task_unregister_by_fd(server->io_queue, sock->sock);
1794 silc_task_unregister_by_fd(server->timeout_queue, sock->sock);
1796 /* Close the actual connection */
1797 silc_net_close_connection(sock->sock);
1798 server->sockets[sock->sock] = NULL;
1799 silc_socket_free(sock);
1802 /* Sends disconnect message to remote connection and disconnects the
1805 void silc_server_disconnect_remote(SilcServer server,
1806 SilcSocketConnection sock,
1807 const char *fmt, ...)
1810 unsigned char buf[4096];
1815 memset(buf, 0, sizeof(buf));
1817 vsprintf(buf, fmt, ap);
1820 SILC_LOG_DEBUG(("Disconnecting remote host"));
1822 SILC_LOG_INFO(("Disconnecting %s:%d (%s) [%s]", sock->hostname,
1824 (sock->type == SILC_SOCKET_TYPE_UNKNOWN ? "Unknown" :
1825 sock->type == SILC_SOCKET_TYPE_CLIENT ? "Client" :
1826 sock->type == SILC_SOCKET_TYPE_SERVER ? "Server" :
1829 /* Notify remote end that the conversation is over. The notify message
1830 is tried to be sent immediately. */
1831 silc_server_packet_send(server, sock, SILC_PACKET_DISCONNECT, 0,
1832 buf, strlen(buf), TRUE);
1834 /* Mark the connection to be disconnected */
1835 SILC_SET_DISCONNECTED(sock);
1836 silc_server_close_connection(server, sock);
1839 /* Free's user_data pointer from socket connection object. This also sends
1840 appropriate notify packets to the network to inform about leaving
1843 void silc_server_free_sock_user_data(SilcServer server,
1844 SilcSocketConnection sock)
1846 SILC_LOG_DEBUG(("Start"));
1848 switch(sock->type) {
1849 case SILC_SOCKET_TYPE_CLIENT:
1851 SilcClientEntry user_data = (SilcClientEntry)sock->user_data;
1853 /* Remove client from all channels */
1854 silc_server_remove_from_channels(server, sock, user_data);
1856 /* XXX must take some info to history before freeing */
1858 /* Send REMOVE_ID packet to routers. */
1859 if (!server->standalone && server->router)
1860 silc_server_send_remove_id(server, server->router->connection,
1861 server->server_type == SILC_SERVER ?
1862 FALSE : TRUE, user_data->id,
1863 SILC_ID_CLIENT_LEN, SILC_ID_CLIENT);
1865 /* Free the client entry and everything in it */
1866 silc_idlist_del_data(user_data);
1867 silc_idlist_del_client(server->local_list, user_data);
1868 server->stat.my_clients--;
1869 server->stat.clients--;
1870 if (server->server_type == SILC_ROUTER)
1871 server->stat.cell_clients--;
1874 case SILC_SOCKET_TYPE_SERVER:
1875 case SILC_SOCKET_TYPE_ROUTER:
1877 SilcServerEntry user_data = (SilcServerEntry)sock->user_data;
1879 /* Send REMOVE_ID packet to routers. */
1880 if (!server->standalone && server->router)
1881 silc_server_send_remove_id(server, server->router->connection,
1882 server->server_type == SILC_SERVER ?
1883 FALSE : TRUE, user_data->id,
1884 SILC_ID_SERVER_LEN, SILC_ID_SERVER);
1886 /* Then also free all client entries that this server owns as
1887 they will become invalid now as well. */
1888 silc_server_remove_clients_by_server(server, user_data);
1890 /* If this was our primary router connection then we're lost to
1891 the outside world. */
1892 if (server->server_type == SILC_SERVER && server->router == user_data) {
1893 server->id_entry->router = NULL;
1894 server->router = NULL;
1895 server->standalone = TRUE;
1898 /* Free the server entry */
1899 silc_idlist_del_data(user_data);
1900 silc_idlist_del_server(server->local_list, user_data);
1901 server->stat.my_servers--;
1902 server->stat.servers--;
1903 if (server->server_type == SILC_ROUTER)
1904 server->stat.cell_servers--;
1909 SilcUnknownEntry user_data = (SilcUnknownEntry)sock->user_data;
1911 silc_idlist_del_data(user_data);
1912 silc_free(user_data);
1917 sock->user_data = NULL;
1920 /* This function is used to remove all client entries by the server `entry'.
1921 This is called when the connection is lost to the server. In this case
1922 we must invalidate all the client entries owned by the server `entry'. */
1924 int silc_server_remove_clients_by_server(SilcServer server,
1925 SilcServerEntry entry)
1927 SilcIDCacheList list = NULL;
1928 SilcIDCacheEntry id_cache = NULL;
1929 SilcClientEntry client = NULL;
1931 if (silc_idcache_find_by_id(server->local_list->clients,
1932 SILC_ID_CACHE_ANY, SILC_ID_CLIENT, &list)) {
1934 if (silc_idcache_list_first(list, &id_cache)) {
1936 client = (SilcClientEntry)id_cache->context;
1938 if (client->router != entry) {
1939 if (!silc_idcache_list_next(list, &id_cache))
1945 /* Remove the client entry */
1946 silc_server_remove_from_channels(server, NULL, client);
1947 silc_idlist_del_client(server->local_list, client);
1949 if (!silc_idcache_list_next(list, &id_cache))
1953 silc_idcache_list_free(list);
1956 if (silc_idcache_find_by_id(server->global_list->clients,
1957 SILC_ID_CACHE_ANY, SILC_ID_CLIENT, &list)) {
1959 if (silc_idcache_list_first(list, &id_cache)) {
1961 client = (SilcClientEntry)id_cache->context;
1963 if (client->router != entry) {
1964 if (!silc_idcache_list_next(list, &id_cache))
1970 /* Remove the client entry */
1971 silc_server_remove_from_channels(server, NULL, client);
1972 silc_idlist_del_client(server->global_list, client);
1974 if (!silc_idcache_list_next(list, &id_cache))
1978 silc_idcache_list_free(list);
1984 /* Checks whether given channel has global users. If it does this returns
1985 TRUE and FALSE if there is only locally connected clients on the channel. */
1987 int silc_server_channel_has_global(SilcChannelEntry channel)
1989 SilcChannelClientEntry chl;
1991 silc_list_start(channel->user_list);
1992 while ((chl = silc_list_get(channel->user_list)) != SILC_LIST_END) {
1993 if (chl->client->router)
2000 /* Checks whether given channel has locally connected users. If it does this
2001 returns TRUE and FALSE if there is not one locally connected client. */
2003 int silc_server_channel_has_local(SilcChannelEntry channel)
2005 SilcChannelClientEntry chl;
2007 silc_list_start(channel->user_list);
2008 while ((chl = silc_list_get(channel->user_list)) != SILC_LIST_END) {
2009 if (!chl->client->router)
2016 /* Removes client from all channels it has joined. This is used when client
2017 connection is disconnected. If the client on a channel is last, the
2018 channel is removed as well. This sends the SIGNOFF notify types. */
2020 void silc_server_remove_from_channels(SilcServer server,
2021 SilcSocketConnection sock,
2022 SilcClientEntry client)
2024 SilcChannelEntry channel;
2025 SilcChannelClientEntry chl;
2028 SILC_LOG_DEBUG(("Start"));
2030 if (!client || !client->id)
2033 clidp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
2035 /* Remove the client from all channels. The client is removed from
2036 the channels' user list. */
2037 silc_list_start(client->channels);
2038 while ((chl = silc_list_get(client->channels)) != SILC_LIST_END) {
2039 channel = chl->channel;
2041 /* Remove channel from client's channel list */
2042 silc_list_del(client->channels, chl);
2044 /* Remove channel if there is no users anymore */
2045 if (server->server_type == SILC_ROUTER &&
2046 silc_list_count(channel->user_list) < 2) {
2047 if (!silc_idlist_del_channel(server->local_list, channel))
2048 silc_idlist_del_channel(server->global_list, channel);
2049 server->stat.my_channels--;
2053 /* Remove client from channel's client list */
2054 silc_list_del(channel->user_list, chl);
2056 server->stat.my_chanclients--;
2058 /* If there is not at least one local user on the channel then we don't
2059 need the channel entry anymore, we can remove it safely. */
2060 if (server->server_type == SILC_SERVER &&
2061 !silc_server_channel_has_local(channel)) {
2062 /* Notify about leaving client if this channel has global users. */
2063 if (channel->global_users)
2064 silc_server_send_notify_to_channel(server, NULL, channel, FALSE,
2065 SILC_NOTIFY_TYPE_SIGNOFF, 1,
2066 clidp->data, clidp->len);
2068 if (!silc_idlist_del_channel(server->local_list, channel))
2069 silc_idlist_del_channel(server->global_list, channel);
2070 server->stat.my_channels--;
2074 /* Send notify to channel about client leaving SILC and thus
2075 the entire channel. */
2076 silc_server_send_notify_to_channel(server, NULL, channel, FALSE,
2077 SILC_NOTIFY_TYPE_SIGNOFF, 1,
2078 clidp->data, clidp->len);
2081 silc_buffer_free(clidp);
2084 /* Removes client from one channel. This is used for example when client
2085 calls LEAVE command to remove itself from the channel. Returns TRUE
2086 if channel still exists and FALSE if the channel is removed when
2087 last client leaves the channel. If `notify' is FALSE notify messages
2090 int silc_server_remove_from_one_channel(SilcServer server,
2091 SilcSocketConnection sock,
2092 SilcChannelEntry channel,
2093 SilcClientEntry client,
2096 SilcChannelEntry ch;
2097 SilcChannelClientEntry chl;
2100 SILC_LOG_DEBUG(("Start"));
2102 clidp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
2104 /* Remove the client from the channel. The client is removed from
2105 the channel's user list. */
2106 silc_list_start(client->channels);
2107 while ((chl = silc_list_get(client->channels)) != SILC_LIST_END) {
2108 if (chl->channel != channel)
2113 /* Remove channel from client's channel list */
2114 silc_list_del(client->channels, chl);
2116 /* Remove channel if there is no users anymore */
2117 if (server->server_type == SILC_ROUTER &&
2118 silc_list_count(channel->user_list) < 2) {
2119 if (!silc_idlist_del_channel(server->local_list, channel))
2120 silc_idlist_del_channel(server->global_list, channel);
2121 silc_buffer_free(clidp);
2122 server->stat.my_channels--;
2126 /* Remove client from channel's client list */
2127 silc_list_del(channel->user_list, chl);
2129 server->stat.my_chanclients--;
2131 /* If there is no global users on the channel anymore mark the channel
2132 as local channel. */
2133 if (server->server_type == SILC_SERVER &&
2134 !silc_server_channel_has_global(channel))
2135 channel->global_users = FALSE;
2137 /* If there is not at least one local user on the channel then we don't
2138 need the channel entry anymore, we can remove it safely. */
2139 if (server->server_type == SILC_SERVER &&
2140 !silc_server_channel_has_local(channel)) {
2141 /* Notify about leaving client if this channel has global users. */
2142 if (notify && channel->global_users)
2143 silc_server_send_notify_to_channel(server, NULL, channel, FALSE,
2144 SILC_NOTIFY_TYPE_LEAVE, 1,
2145 clidp->data, clidp->len);
2147 if (!silc_idlist_del_channel(server->local_list, channel))
2148 silc_idlist_del_channel(server->global_list, channel);
2149 silc_buffer_free(clidp);
2150 server->stat.my_channels--;
2154 /* Send notify to channel about client leaving the channel */
2156 silc_server_send_notify_to_channel(server, NULL, channel, FALSE,
2157 SILC_NOTIFY_TYPE_LEAVE, 1,
2158 clidp->data, clidp->len);
2162 silc_buffer_free(clidp);
2166 /* Returns TRUE if the given client is on the channel. FALSE if not.
2167 This works because we assure that the user list on the channel is
2168 always in up to date thus we can only check the channel list from
2169 `client' which is faster than checking the user list from `channel'. */
2171 int silc_server_client_on_channel(SilcClientEntry client,
2172 SilcChannelEntry channel)
2174 SilcChannelClientEntry chl;
2176 if (!client || !channel)
2179 silc_list_start(client->channels);
2180 while ((chl = silc_list_get(client->channels)) != SILC_LIST_END)
2181 if (chl->channel == channel)
2187 /* Timeout callback. This is called if connection is idle or for some
2188 other reason is not responding within some period of time. This
2189 disconnects the remote end. */
2191 SILC_TASK_CALLBACK(silc_server_timeout_remote)
2193 SilcServer server = (SilcServer)context;
2194 SilcSocketConnection sock = server->sockets[fd];
2199 if (sock->user_data)
2200 silc_server_free_sock_user_data(server, sock);
2202 silc_server_disconnect_remote(server, sock,
2203 "Server closed connection: "
2204 "Connection timeout");
2207 /* Creates new channel. Sends NEW_CHANNEL packet to primary route. This
2208 function may be used only by router. In real SILC network all channels
2209 are created by routers thus this function is never used by normal
2212 SilcChannelEntry silc_server_create_new_channel(SilcServer server,
2213 SilcServerID *router_id,
2218 SilcChannelID *channel_id;
2219 SilcChannelEntry entry;
2222 SILC_LOG_DEBUG(("Creating new channel"));
2227 /* Allocate cipher */
2228 silc_cipher_alloc(cipher, &key);
2230 channel_name = strdup(channel_name);
2232 /* Create the channel */
2233 silc_id_create_channel_id(router_id, server->rng, &channel_id);
2234 entry = silc_idlist_add_channel(server->local_list, channel_name,
2235 SILC_CHANNEL_MODE_NONE, channel_id,
2238 silc_free(channel_name);
2242 /* Now create the actual key material */
2243 silc_server_create_channel_key(server, entry, 16);
2245 /* Notify other routers about the new channel. We send the packet
2246 to our primary route. */
2247 if (broadcast && server->standalone == FALSE) {
2248 silc_server_send_new_channel(server, server->router->connection, TRUE,
2249 channel_name, entry->id, SILC_ID_CHANNEL_LEN);
2252 server->stat.my_channels++;
2257 /* Same as above but creates the channel with Channel ID `channel_id. */
2260 silc_server_create_new_channel_with_id(SilcServer server,
2263 SilcChannelID *channel_id,
2266 SilcChannelEntry entry;
2269 SILC_LOG_DEBUG(("Creating new channel"));
2274 /* Allocate cipher */
2275 silc_cipher_alloc(cipher, &key);
2277 channel_name = strdup(channel_name);
2279 /* Create the channel */
2280 entry = silc_idlist_add_channel(server->local_list, channel_name,
2281 SILC_CHANNEL_MODE_NONE, channel_id,
2284 silc_free(channel_name);
2288 /* Now create the actual key material */
2289 silc_server_create_channel_key(server, entry, 16);
2291 /* Notify other routers about the new channel. We send the packet
2292 to our primary route. */
2293 if (broadcast && server->standalone == FALSE) {
2294 silc_server_send_new_channel(server, server->router->connection, TRUE,
2295 channel_name, entry->id, SILC_ID_CHANNEL_LEN);
2298 server->stat.my_channels++;
2303 /* Generates new channel key. This is used to create the initial channel key
2304 but also to re-generate new key for channel. If `key_len' is provided
2305 it is the bytes of the key length. */
2307 void silc_server_create_channel_key(SilcServer server,
2308 SilcChannelEntry channel,
2309 unsigned int key_len)
2312 unsigned char channel_key[32];
2315 if (!channel->channel_key)
2316 silc_cipher_alloc("twofish", &channel->channel_key);
2320 else if (channel->key_len)
2321 len = channel->key_len / 8;
2323 len = sizeof(channel_key);
2325 /* Create channel key */
2326 for (i = 0; i < len; i++) channel_key[i] = silc_rng_get_byte(server->rng);
2329 channel->channel_key->cipher->set_key(channel->channel_key->context,
2332 /* Remove old key if exists */
2334 memset(channel->key, 0, channel->key_len / 8);
2335 silc_free(channel->key);
2339 channel->key_len = len * 8;
2340 channel->key = silc_calloc(len, sizeof(*channel->key));
2341 memcpy(channel->key, channel_key, len);
2342 memset(channel_key, 0, sizeof(channel_key));
2345 /* Saves the channel key found in the encoded `key_payload' buffer. This
2346 function is used when we receive Channel Key Payload and also when we're
2347 processing JOIN command reply. Returns entry to the channel. */
2349 SilcChannelEntry silc_server_save_channel_key(SilcServer server,
2350 SilcBuffer key_payload,
2351 SilcChannelEntry channel)
2353 SilcChannelKeyPayload payload = NULL;
2354 SilcChannelID *id = NULL;
2356 unsigned int tmp_len;
2359 /* Decode channel key payload */
2360 payload = silc_channel_key_payload_parse(key_payload);
2362 SILC_LOG_ERROR(("Bad channel key payload, dropped"));
2367 /* Get the channel entry */
2370 /* Get channel ID */
2371 tmp = silc_channel_key_get_id(payload, &tmp_len);
2372 id = silc_id_str2id(tmp, tmp_len, SILC_ID_CHANNEL);
2378 channel = silc_idlist_find_channel_by_id(server->local_list, id, NULL);
2380 channel = silc_idlist_find_channel_by_id(server->global_list, id, NULL);
2382 SILC_LOG_ERROR(("Received key for non-existent channel"));
2388 tmp = silc_channel_key_get_key(payload, &tmp_len);
2394 cipher = silc_channel_key_get_cipher(payload, NULL);;
2400 /* Remove old key if exists */
2402 memset(channel->key, 0, channel->key_len / 8);
2403 silc_free(channel->key);
2404 silc_cipher_free(channel->channel_key);
2407 /* Create new cipher */
2408 if (!silc_cipher_alloc(cipher, &channel->channel_key)) {
2414 channel->key_len = tmp_len * 8;
2415 channel->key = silc_calloc(tmp_len, sizeof(unsigned char));
2416 memcpy(channel->key, tmp, tmp_len);
2417 channel->channel_key->cipher->set_key(channel->channel_key->context,
2424 silc_channel_key_payload_free(payload);
2429 /* Heartbeat callback. This function is set as argument for the
2430 silc_socket_set_heartbeat function. The library will call this function
2431 at the set time interval. */
2433 void silc_server_perform_heartbeat(SilcSocketConnection sock,
2436 SilcServerHBContext hb = (SilcServerHBContext)hb_context;
2438 SILC_LOG_DEBUG(("Sending heartbeat to %s (%s)", sock->hostname,
2441 /* Send the heartbeat */
2442 silc_server_send_heartbeat(hb->server, sock);
2445 /* Returns assembled of all servers in the given ID list. The packet's
2446 form is dictated by the New ID payload. */
2448 static void silc_server_announce_get_servers(SilcServer server,
2450 SilcBuffer *servers)
2452 SilcIDCacheList list;
2453 SilcIDCacheEntry id_cache;
2454 SilcServerEntry entry;
2457 /* Go through all clients in the list */
2458 if (silc_idcache_find_by_id(id_list->clients, SILC_ID_CACHE_ANY,
2459 SILC_ID_SERVER, &list)) {
2460 if (silc_idcache_list_first(list, &id_cache)) {
2462 entry = (SilcServerEntry)id_cache->context;
2464 idp = silc_id_payload_encode(entry->id, SILC_ID_SERVER);
2466 *servers = silc_buffer_realloc(*servers,
2468 (*servers)->truelen + idp->len :
2470 silc_buffer_pull_tail(*servers, ((*servers)->end - (*servers)->data));
2471 silc_buffer_put(*servers, idp->data, idp->len);
2472 silc_buffer_pull(*servers, idp->len);
2473 silc_buffer_free(idp);
2475 if (!silc_idcache_list_next(list, &id_cache))
2480 silc_idcache_list_free(list);
2484 /* This function is used by router to announce existing servers to our
2485 primary router when we've connected to it. */
2487 void silc_server_announce_servers(SilcServer server)
2489 SilcBuffer servers = NULL;
2491 SILC_LOG_DEBUG(("Announcing servers"));
2493 /* Get servers in local list */
2494 silc_server_announce_get_servers(server, server->local_list, &servers);
2496 /* Get servers in global list */
2497 silc_server_announce_get_servers(server, server->global_list, &servers);
2500 silc_buffer_push(servers, servers->data - servers->head);
2501 SILC_LOG_HEXDUMP(("servers"), servers->data, servers->len);
2503 /* Send the packet */
2504 silc_server_packet_send(server, server->router->connection,
2505 SILC_PACKET_NEW_ID_LIST, 0,
2506 servers->data, servers->len, TRUE);
2508 silc_buffer_free(servers);
2512 /* Returns assembled packet of all clients in the given ID list. The
2513 packet's form is dictated by the New ID Payload. */
2515 static void silc_server_announce_get_clients(SilcServer server,
2517 SilcBuffer *clients)
2519 SilcIDCacheList list;
2520 SilcIDCacheEntry id_cache;
2521 SilcClientEntry client;
2524 /* Go through all clients in the list */
2525 if (silc_idcache_find_by_id(id_list->clients, SILC_ID_CACHE_ANY,
2526 SILC_ID_CLIENT, &list)) {
2527 if (silc_idcache_list_first(list, &id_cache)) {
2529 client = (SilcClientEntry)id_cache->context;
2531 idp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
2533 *clients = silc_buffer_realloc(*clients,
2535 (*clients)->truelen + idp->len :
2537 silc_buffer_pull_tail(*clients, ((*clients)->end - (*clients)->data));
2538 silc_buffer_put(*clients, idp->data, idp->len);
2539 silc_buffer_pull(*clients, idp->len);
2540 silc_buffer_free(idp);
2542 if (!silc_idcache_list_next(list, &id_cache))
2547 silc_idcache_list_free(list);
2551 /* This function is used to announce our existing clients to our router
2552 when we've connected to it. */
2554 void silc_server_announce_clients(SilcServer server)
2556 SilcBuffer clients = NULL;
2558 SILC_LOG_DEBUG(("Announcing clients"));
2560 /* Get clients in local list */
2561 silc_server_announce_get_clients(server, server->local_list,
2564 /* As router we announce our global list as well */
2565 if (server->server_type == SILC_ROUTER)
2566 silc_server_announce_get_clients(server, server->global_list,
2570 silc_buffer_push(clients, clients->data - clients->head);
2571 SILC_LOG_HEXDUMP(("clients"), clients->data, clients->len);
2573 /* Send the packet */
2574 silc_server_packet_send(server, server->router->connection,
2575 SILC_PACKET_NEW_ID_LIST, 0,
2576 clients->data, clients->len, TRUE);
2578 silc_buffer_free(clients);
2582 /* Returns assembled packets for all channels and users on those channels
2583 from the given ID List. The packets are in the form dictated by the
2584 New Channel and New Channel User payloads. */
2586 static void silc_server_announce_get_channels(SilcServer server,
2588 SilcBuffer *channels,
2589 SilcBuffer *channel_users)
2591 SilcIDCacheList list;
2592 SilcIDCacheEntry id_cache;
2593 SilcChannelEntry channel;
2594 SilcChannelClientEntry chl;
2596 unsigned short name_len;
2599 /* Go through all channels in the list */
2600 if (silc_idcache_find_by_id(id_list->channels, SILC_ID_CACHE_ANY,
2601 SILC_ID_CHANNEL, &list)) {
2602 if (silc_idcache_list_first(list, &id_cache)) {
2604 channel = (SilcChannelEntry)id_cache->context;
2606 cid = silc_id_id2str(channel->id, SILC_ID_CHANNEL);
2607 name_len = strlen(channel->channel_name);
2609 len = 4 + name_len + SILC_ID_CHANNEL_LEN;
2611 silc_buffer_realloc(*channels,
2612 (*channels ? (*channels)->truelen + len : len));
2613 silc_buffer_pull_tail(*channels,
2614 ((*channels)->end - (*channels)->data));
2615 silc_buffer_format(*channels,
2616 SILC_STR_UI_SHORT(name_len),
2617 SILC_STR_UI_XNSTRING(channel->channel_name,
2619 SILC_STR_UI_SHORT(SILC_ID_CHANNEL_LEN),
2620 SILC_STR_UI_XNSTRING(cid, SILC_ID_CHANNEL_LEN),
2622 silc_buffer_pull(*channels, len);
2624 /* Now find all users on the channel */
2625 silc_list_start(channel->user_list);
2626 while ((chl = silc_list_get(channel->user_list)) != SILC_LIST_END) {
2627 unsigned char *clid;
2629 clid = silc_id_id2str(chl->client->id, SILC_ID_CLIENT);
2631 len = 4 + SILC_ID_CHANNEL_LEN + SILC_ID_CLIENT_LEN;
2633 silc_buffer_realloc(*channel_users,
2635 (*channel_users)->truelen + len : len));
2636 silc_buffer_pull_tail(*channel_users,
2637 ((*channel_users)->end -
2638 (*channel_users)->data));
2639 silc_buffer_format(*channel_users,
2640 SILC_STR_UI_SHORT(SILC_ID_CHANNEL_LEN),
2641 SILC_STR_UI_XNSTRING(cid, SILC_ID_CHANNEL_LEN),
2642 SILC_STR_UI_SHORT(SILC_ID_CLIENT_LEN),
2643 SILC_STR_UI_XNSTRING(clid, SILC_ID_CLIENT_LEN),
2645 silc_buffer_pull(*channel_users, len);
2651 if (!silc_idcache_list_next(list, &id_cache))
2656 silc_idcache_list_free(list);
2660 /* This function is used to announce our existing channels to our router
2661 when we've connected to it. This also announces the users on the
2662 channels to the router. */
2664 void silc_server_announce_channels(SilcServer server)
2666 SilcBuffer channels = NULL, channel_users = NULL;
2668 SILC_LOG_DEBUG(("Announcing channels and channel users"));
2670 /* Get channels and channel users in local list */
2671 silc_server_announce_get_channels(server, server->local_list,
2672 &channels, &channel_users);
2674 /* Get channels and channel users in global list */
2675 silc_server_announce_get_channels(server, server->global_list,
2676 &channels, &channel_users);
2679 silc_buffer_push(channels, channels->data - channels->head);
2680 SILC_LOG_HEXDUMP(("channels"), channels->data, channels->len);
2682 /* Send the packet */
2683 silc_server_packet_send(server, server->router->connection,
2684 SILC_PACKET_NEW_CHANNEL_LIST, 0,
2685 channels->data, channels->len,
2688 silc_buffer_free(channels);
2691 if (channel_users) {
2692 silc_buffer_push(channel_users, channel_users->data - channel_users->head);
2693 SILC_LOG_HEXDUMP(("channel users"), channel_users->data,
2694 channel_users->len);
2696 /* Send the packet */
2697 silc_server_packet_send(server, server->router->connection,
2698 SILC_PACKET_NEW_CHANNEL_USER_LIST, 0,
2699 channel_users->data, channel_users->len,
2702 silc_buffer_free(channel_users);