#include "silc-channels.h"
#include "silc-queries.h"
#include "silc-nicklist.h"
-#include "version_internal.h"
-#include "version.h"
#include "signals.h"
#include "levels.h"
#include "fe-common/silc/module-formats.h"
/* Command line option variables */
-static bool opt_create_keypair = FALSE;
-static bool opt_debug = FALSE;
static char *opt_pkcs = NULL;
-static char *opt_keyfile = NULL;
static int opt_bits = 0;
static int idletag;
SilcClient silc_client = NULL;
-SilcClientConfig silc_config = NULL;
extern SilcClientOperations ops;
-extern int silc_debug;
-#ifdef SILC_SIM
-/* SIM (SILC Module) table */
-SilcSimContext **sims = NULL;
-uint32 sims_count = 0;
-#endif
-
-static void silc_say(SilcClient client, SilcClientConnection conn,
- char *msg, ...);
-static void
-silc_channel_message(SilcClient client, SilcClientConnection conn,
- SilcClientEntry sender, SilcChannelEntry channel,
- SilcMessageFlags flags, char *msg);
-static void
-silc_private_message(SilcClient client, SilcClientConnection conn,
- SilcClientEntry sender, SilcMessageFlags flags,
- char *msg);
-static void silc_notify(SilcClient client, SilcClientConnection conn,
- SilcNotifyType type, ...);
-static void
-silc_connect(SilcClient client, SilcClientConnection conn, int success);
-static void
-silc_disconnect(SilcClient client, SilcClientConnection conn);
-static void
-silc_command(SilcClient client, SilcClientConnection conn,
- SilcClientCommandContext cmd_context, int success,
- SilcCommand command);
-static void
-silc_command_reply(SilcClient client, SilcClientConnection conn,
- SilcCommandPayload cmd_payload, int success,
- SilcCommand command, SilcCommandStatus status, ...);
-static void
-silc_verify_public_key_internal(SilcClient client, SilcClientConnection conn,
- SilcSocketType conn_type, unsigned char *pk,
- uint32 pk_len, SilcSKEPKType pk_type,
- SilcVerifyPublicKey completion, void *context);
-static void
-silc_verify_public_key(SilcClient client, SilcClientConnection conn,
- SilcSocketType conn_type, unsigned char *pk,
- uint32 pk_len, SilcSKEPKType pk_type,
- SilcVerifyPublicKey completion, void *context);
-static void silc_ask_passphrase(SilcClient client, SilcClientConnection conn,
- SilcAskPassphrase completion, void *context);
-static int
-silc_get_auth_method(SilcClient client, SilcClientConnection conn,
- char *hostname, uint16 port,
- SilcProtocolAuthMeth *auth_meth,
- unsigned char **auth_data,
- uint32 *auth_data_len);
-static void
-silc_failure(SilcClient client, SilcClientConnection conn,
- SilcProtocol protocol, void *failure);
-static int
-silc_key_agreement(SilcClient client, SilcClientConnection conn,
- SilcClientEntry client_entry, char *hostname,
- int port,
- SilcKeyAgreementCallback *completion,
- void **context);
-
-static void silc_say(SilcClient client, SilcClientConnection conn,
- char *msg, ...)
-{
- SILC_SERVER_REC *server;
- va_list va;
- char *str;
-
- server = conn == NULL ? NULL : conn->context;
-
- va_start(va, msg);
- str = g_strdup_vprintf(msg, va);
- printtext(server, NULL, MSGLEVEL_CRAP, "%s", str);
- g_free(str);
- va_end(va);
-}
-
-static void silc_say_error(char *msg, ...)
-{
- va_list va;
- char *str;
-
- va_start(va, msg);
- str = g_strdup_vprintf(msg, va);
- printtext(NULL, NULL, MSGLEVEL_CLIENTERROR, "%s", str);
-
- g_free(str);
- va_end(va);
-}
-
-/* Message for a channel. The `sender' is the nickname of the sender
- received in the packet. The `channel_name' is the name of the channel. */
-
-static void
-silc_channel_message(SilcClient client, SilcClientConnection conn,
- SilcClientEntry sender, SilcChannelEntry channel,
- SilcMessageFlags flags, char *msg)
-{
- SILC_SERVER_REC *server;
- SILC_NICK_REC *nick;
- SILC_CHANNEL_REC *chanrec;
-
- server = conn == NULL ? NULL : conn->context;
- chanrec = silc_channel_find_entry(server, channel);
-
- nick = silc_nicklist_find(chanrec, sender);
-
- if (flags & SILC_MESSAGE_FLAG_ACTION)
- printformat_module("fe-common/silc", server, channel->channel_name,
- MSGLEVEL_ACTIONS, SILCTXT_CHANNEL_ACTION, msg);
- else if (flags & SILC_MESSAGE_FLAG_NOTICE)
- printformat_module("fe-common/silc", server, channel->channel_name,
- MSGLEVEL_NOTICES, SILCTXT_CHANNEL_NOTICE, msg);
- else
- signal_emit("message public", 6, server, msg,
- nick == NULL ? "[<unknown>]" : nick->nick,
- nick == NULL ? NULL : nick->host,
- chanrec->name, nick);
-}
-
-/* Private message to the client. The `sender' is the nickname of the
- sender received in the packet. */
-
-static void
-silc_private_message(SilcClient client, SilcClientConnection conn,
- SilcClientEntry sender, SilcMessageFlags flags,
- char *msg)
-{
- SILC_SERVER_REC *server;
-
- server = conn == NULL ? NULL : conn->context;
- signal_emit("message private", 4, server, msg,
- sender->nickname ? sender->nickname : "[<unknown>]",
- sender->username ? sender->username : NULL);
-}
-
-/* Notify message to the client. The notify arguments are sent in the
- same order as servers sends them. The arguments are same as received
- from the server except for ID's. If ID is received application receives
- the corresponding entry to the ID. For example, if Client ID is received
- application receives SilcClientEntry. Also, if the notify type is
- for channel the channel entry is sent to application (even if server
- does not send it). */
-
-typedef struct {
- int type;
- const char *name;
-} NOTIFY_REC;
-
-#define MAX_NOTIFY (sizeof(notifies)/sizeof(notifies[0]))
-static NOTIFY_REC notifies[] = {
- { SILC_NOTIFY_TYPE_NONE, NULL },
- { SILC_NOTIFY_TYPE_INVITE, "invite" },
- { SILC_NOTIFY_TYPE_JOIN, "join" },
- { SILC_NOTIFY_TYPE_LEAVE, "leave" },
- { SILC_NOTIFY_TYPE_SIGNOFF, "signoff" },
- { SILC_NOTIFY_TYPE_TOPIC_SET, "topic" },
- { SILC_NOTIFY_TYPE_NICK_CHANGE, "nick" },
- { SILC_NOTIFY_TYPE_CMODE_CHANGE, "cmode" },
- { SILC_NOTIFY_TYPE_CUMODE_CHANGE, "cumode" },
- { SILC_NOTIFY_TYPE_MOTD, "motd" },
- { SILC_NOTIFY_TYPE_CHANNEL_CHANGE, "channel_change" },
- { SILC_NOTIFY_TYPE_SERVER_SIGNOFF, "server_signoff" },
- { SILC_NOTIFY_TYPE_KICKED, "kick" },
- { SILC_NOTIFY_TYPE_KILLED, "kill" },
- { SILC_NOTIFY_TYPE_UMODE_CHANGE, "umode" },
- { SILC_NOTIFY_TYPE_BAN, "ban" },
-};
-
-static void silc_notify(SilcClient client, SilcClientConnection conn,
- SilcNotifyType type, ...)
-{
- SILC_SERVER_REC *server;
- va_list va;
-
- server = conn == NULL ? NULL : conn->context;
- va_start(va, type);
-
- if (type == SILC_NOTIFY_TYPE_NONE) {
- /* Some generic notice from server */
- printtext(server, NULL, MSGLEVEL_CRAP, "%s", (char *)va_arg(va, char *));
- } else if (type < MAX_NOTIFY) {
- /* Send signal about the notify event */
- char signal[50];
- g_snprintf(signal, sizeof(signal), "silc event %s", notifies[type].name);
- signal_emit(signal, 2, server, va);
- } else {
- /* Unknown notify */
- printtext(server, NULL, MSGLEVEL_CRAP, "Unknown notify type %d", type);
- }
-
- va_end(va);
-}
-
-/* Called to indicate that connection was either successfully established
- or connecting failed. This is also the first time application receives
- the SilcClientConnection objecet which it should save somewhere. */
-
-static void
-silc_connect(SilcClient client, SilcClientConnection conn, int success)
-{
- SILC_SERVER_REC *server = conn->context;
-
- if (success) {
- server->connected = TRUE;
- signal_emit("event connected", 1, server);
- } else {
- server->connection_lost = TRUE;
- server->conn->context = NULL;
- server_disconnect(SERVER(server));
- }
-}
-
-/* Called to indicate that connection was disconnected to the server. */
-
-static void
-silc_disconnect(SilcClient client, SilcClientConnection conn)
-{
- SILC_SERVER_REC *server = conn->context;
-
- server->conn->context = NULL;
- server->conn = NULL;
- server->connection_lost = TRUE;
- server_disconnect(SERVER(server));
-}
-
-/* Command handler. This function is called always in the command function.
- If error occurs it will be called as well. `conn' is the associated
- client connection. `cmd_context' is the command context that was
- originally sent to the command. `success' is FALSE if error occured
- during command. `command' is the command being processed. It must be
- noted that this is not reply from server. This is merely called just
- after application has called the command. Just to tell application
- that the command really was processed. */
-
-static void
-silc_command(SilcClient client, SilcClientConnection conn,
- SilcClientCommandContext cmd_context, int success,
- SilcCommand command)
-{
-}
-
-/* Client info resolving callback when JOIN command reply is received.
- This will cache all users on the channel. */
-
-void silc_client_join_get_users(SilcClient client,
- SilcClientConnection conn,
- SilcClientEntry *clients,
- uint32 clients_count,
- void *context)
-{
- SilcChannelEntry channel = (SilcChannelEntry)context;
- SilcChannelUser chu;
- SILC_SERVER_REC *server = conn->context;
- SILC_CHANNEL_REC *chanrec;
- SilcClientEntry founder = NULL;
- NICK_REC *ownnick;
-
- if (!clients)
- return;
-
- chanrec = silc_channel_find(server, channel->channel_name);
- if (chanrec == NULL)
- return;
-
- silc_list_start(channel->clients);
- while ((chu = silc_list_get(channel->clients)) != SILC_LIST_END) {
- if (chu->mode & SILC_CHANNEL_UMODE_CHANFO)
- founder = chu->client;
- silc_nicklist_insert(chanrec, chu, FALSE);
- }
-
- ownnick = NICK(silc_nicklist_find(chanrec, conn->local_entry));
- nicklist_set_own(CHANNEL(chanrec), ownnick);
- signal_emit("channel joined", 1, chanrec);
-
- if (chanrec->topic)
- printformat_module("fe-common/silc", server, channel->channel_name,
- MSGLEVEL_CRAP, SILCTXT_CHANNEL_TOPIC,
- channel->channel_name, chanrec->topic);
-
- fe_channels_nicklist(CHANNEL(chanrec), CHANNEL_NICKLIST_FLAG_ALL);
-
- if (founder) {
- if (founder == conn->local_entry)
- printformat_module("fe-common/silc",
- server, channel->channel_name, MSGLEVEL_CRAP,
- SILCTXT_CHANNEL_FOUNDER_YOU,
- channel->channel_name);
- else
- printformat_module("fe-common/silc",
- server, channel->channel_name, MSGLEVEL_CRAP,
- SILCTXT_CHANNEL_FOUNDER,
- channel->channel_name, founder->nickname);
- }
-}
-
-/* Command reply handler. This function is called always in the command reply
- function. If error occurs it will be called as well. Normal scenario
- is that it will be called after the received command data has been parsed
- and processed. The function is used to pass the received command data to
- the application.
-
- `conn' is the associated client connection. `cmd_payload' is the command
- payload data received from server and it can be ignored. It is provided
- if the application would like to re-parse the received command data,
- however, it must be noted that the data is parsed already by the library
- thus the payload can be ignored. `success' is FALSE if error occured.
- In this case arguments are not sent to the application. `command' is the
- command reply being processed. The function has variable argument list
- and each command defines the number and type of arguments it passes to the
- application (on error they are not sent). */
-
-static void
-silc_command_reply(SilcClient client, SilcClientConnection conn,
- SilcCommandPayload cmd_payload, int success,
- SilcCommand command, SilcCommandStatus status, ...)
-
-{
- SILC_SERVER_REC *server = conn->context;
- SILC_CHANNEL_REC *chanrec;
- va_list vp;
-
- va_start(vp, status);
-
- switch(command) {
- case SILC_COMMAND_WHOIS:
- {
- char buf[1024], *nickname, *username, *realname;
- uint32 idle, mode;
- SilcBuffer channels;
-
- if (status == SILC_STATUS_ERR_NO_SUCH_NICK ||
- status == SILC_STATUS_ERR_NO_SUCH_CLIENT_ID) {
- char *tmp;
- tmp = silc_argument_get_arg_type(silc_command_get_args(cmd_payload),
- 3, NULL);
- if (tmp)
- silc_say_error("%s: %s", tmp,
- silc_client_command_status_message(status));
- else
- silc_say_error("%s", silc_client_command_status_message(status));
- break;
- }
-
- if (!success)
- return;
-
- (void)va_arg(vp, SilcClientEntry);
- nickname = va_arg(vp, char *);
- username = va_arg(vp, char *);
- realname = va_arg(vp, char *);
- channels = va_arg(vp, SilcBuffer);
- mode = va_arg(vp, uint32);
- idle = va_arg(vp, uint32);
-
- printformat_module("fe-common/silc", server, NULL, MSGLEVEL_CRAP,
- SILCTXT_WHOIS_USERINFO, nickname, username,
- realname);
-
- if (channels) {
- SilcDList list = silc_channel_payload_parse_list(channels);
- if (list) {
- SilcChannelPayload entry;
- memset(buf, 0, sizeof(buf));
- silc_dlist_start(list);
- while ((entry = silc_dlist_get(list)) != SILC_LIST_END) {
- char *m = silc_client_chumode_char(silc_channel_get_mode(entry));
- uint32 name_len;
- char *name = silc_channel_get_name(entry, &name_len);
-
- if (m)
- strncat(buf, m, strlen(m));
- strncat(buf, name, name_len);
- strncat(buf, " ", 1);
- silc_free(m);
- }
-
- printformat_module("fe-common/silc", server, NULL, MSGLEVEL_CRAP,
- SILCTXT_WHOIS_CHANNELS, buf);
- silc_channel_payload_list_free(list);
- }
- }
-
- if (mode) {
- memset(buf, 0, sizeof(buf));
-
- if ((mode & SILC_UMODE_SERVER_OPERATOR) ||
- (mode & SILC_UMODE_ROUTER_OPERATOR)) {
- strcat(buf, (mode & SILC_UMODE_SERVER_OPERATOR) ?
- "Server Operator " :
- (mode & SILC_UMODE_ROUTER_OPERATOR) ?
- "SILC Operator " : "[Unknown mode] ");
- }
- if (mode & SILC_UMODE_GONE)
- strcat(buf, "away");
-
- printformat_module("fe-common/silc", server, NULL, MSGLEVEL_CRAP,
- SILCTXT_WHOIS_MODES, buf);
- }
-
- if (idle && nickname) {
- memset(buf, 0, sizeof(buf));
- snprintf(buf, sizeof(buf) - 1, "%lu %s",
- idle > 60 ? (idle / 60) : idle,
- idle > 60 ? "minutes" : "seconds");
-
- printformat_module("fe-common/silc", server, NULL, MSGLEVEL_CRAP,
- SILCTXT_WHOIS_IDLE, buf);
- }
- }
- break;
-
- case SILC_COMMAND_WHOWAS:
- {
- char *nickname, *username, *realname;
-
- if (status == SILC_STATUS_ERR_NO_SUCH_NICK ||
- status == SILC_STATUS_ERR_NO_SUCH_CLIENT_ID) {
- char *tmp;
- tmp = silc_argument_get_arg_type(silc_command_get_args(cmd_payload),
- 3, NULL);
- if (tmp)
- silc_say_error("%s: %s", tmp,
- silc_client_command_status_message(status));
- else
- silc_say_error("%s", silc_client_command_status_message(status));
- break;
- }
-
- if (!success)
- return;
-
- (void)va_arg(vp, SilcClientEntry);
- nickname = va_arg(vp, char *);
- username = va_arg(vp, char *);
- realname = va_arg(vp, char *);
-
- printformat_module("fe-common/silc", server, NULL, MSGLEVEL_CRAP,
- SILCTXT_WHOWAS_USERINFO, nickname, username,
- realname ? realname : "");
- }
- break;
-
- case SILC_COMMAND_INVITE:
- {
- SilcChannelEntry channel;
- char *invite_list;
-
- if (!success)
- return;
-
- /* XXX should use irssi routines */
-
- channel = va_arg(vp, SilcChannelEntry);
- invite_list = va_arg(vp, char *);
-
- if (invite_list)
- silc_say(client, conn, "%s invite list: %s", channel->channel_name,
- invite_list);
- else
- silc_say(client, conn, "%s invite list not set",
- channel->channel_name);
- }
- break;
-
- case SILC_COMMAND_JOIN:
- {
- char *channel, *mode, *topic;
- uint32 modei;
- SilcChannelEntry channel_entry;
- SilcBuffer client_id_list;
- uint32 list_count;
-
- channel = va_arg(vp, char *);
- channel_entry = va_arg(vp, SilcChannelEntry);
- modei = va_arg(vp, uint32);
- (void)va_arg(vp, uint32);
- (void)va_arg(vp, unsigned char *);
- (void)va_arg(vp, unsigned char *);
- (void)va_arg(vp, unsigned char *);
- topic = va_arg(vp, char *);
- (void)va_arg(vp, unsigned char *);
- list_count = va_arg(vp, uint32);
- client_id_list = va_arg(vp, SilcBuffer);
-
- if (!success)
- return;
-
- chanrec = silc_channel_find(server, channel);
- if (chanrec != NULL && !success)
- channel_destroy(CHANNEL(chanrec));
- else if (chanrec == NULL && success)
- chanrec = silc_channel_create(server, channel, TRUE);
-
- if (topic) {
- g_free_not_null(chanrec->topic);
- chanrec->topic = *topic == '\0' ? NULL : g_strdup(topic);
- signal_emit("channel topic changed", 1, chanrec);
- }
-
- mode = silc_client_chmode(modei, channel_entry);
- g_free_not_null(chanrec->mode);
- chanrec->mode = g_strdup(mode == NULL ? "" : mode);
- signal_emit("channel mode changed", 1, chanrec);
-
- /* Resolve the client information */
- silc_client_get_clients_by_list(client, conn, list_count, client_id_list,
- silc_client_join_get_users,
- channel_entry);
- break;
- }
-
- case SILC_COMMAND_NICK:
- {
- SilcClientEntry client = va_arg(vp, SilcClientEntry);
- char *old;
-
- if (!success)
- return;
-
- old = g_strdup(server->nick);
- server_change_nick(SERVER(server), client->nickname);
- nicklist_rename_unique(SERVER(server),
- server->conn->local_entry, server->nick,
- client, client->nickname);
-
- signal_emit("message own_nick", 4, server, server->nick, old, "");
- g_free(old);
- break;
- }
-
- case SILC_COMMAND_LIST:
- {
- char *topic, *name;
- int usercount;
- unsigned char buf[256], tmp[16];
- int i, len;
-
- if (!success)
- return;
-
- /* XXX should use irssi routines */
-
- (void)va_arg(vp, SilcChannelEntry);
- name = va_arg(vp, char *);
- topic = va_arg(vp, char *);
- usercount = va_arg(vp, int);
-
- if (status == SILC_STATUS_LIST_START ||
- status == SILC_STATUS_OK)
- silc_say(client, conn,
- " Channel Users Topic");
-
- memset(buf, 0, sizeof(buf));
- strncat(buf, " ", 2);
- len = strlen(name);
- strncat(buf, name, len > 40 ? 40 : len);
- if (len < 40)
- for (i = 0; i < 40 - len; i++)
- strcat(buf, " ");
- strcat(buf, " ");
-
- memset(tmp, 0, sizeof(tmp));
- if (usercount) {
- snprintf(tmp, sizeof(tmp), "%d", usercount);
- strcat(buf, tmp);
- }
- len = strlen(tmp);
- if (len < 10)
- for (i = 0; i < 10 - len; i++)
- strcat(buf, " ");
- strcat(buf, " ");
-
- if (topic) {
- len = strlen(topic);
- strncat(buf, topic, len);
- }
-
- silc_say(client, conn, "%s", buf);
- }
- break;
-
- case SILC_COMMAND_UMODE:
- {
- uint32 mode;
-
- if (!success)
- return;
-
- mode = va_arg(vp, uint32);
-
- /* XXX todo */
- }
- break;
-
- case SILC_COMMAND_OPER:
- silc_say(client, conn, "You are now server operator");
- break;
-
- case SILC_COMMAND_SILCOPER:
- silc_say(client, conn, "You are now SILC operator");
- break;
-
- case SILC_COMMAND_USERS:
- {
- SilcChannelEntry channel;
- SilcChannelUser chu;
- int line_len;
- char *line;
-
- if (!success)
- return;
-
- channel = va_arg(vp, SilcChannelEntry);
-
- /* There are two ways to do this, either parse the list (that
- the command_reply sends (just take it with va_arg()) or just
- traverse the channel's client list. I'll do the latter. See
- JOIN command reply for example for the list. */
-
- silc_say(client, conn, "Users on %s", channel->channel_name);
-
- line = silc_calloc(1024, sizeof(*line));
- line_len = 1024;
- silc_list_start(channel->clients);
- while ((chu = silc_list_get(channel->clients)) != SILC_LIST_END) {
- SilcClientEntry e = chu->client;
- int i, len1;
- char *m, tmp[80];
-
- memset(line, 0, line_len);
-
- if (strlen(e->nickname) + strlen(e->server) + 100 > line_len) {
- silc_free(line);
- line_len += strlen(e->nickname) + strlen(e->server) + 100;
- line = silc_calloc(line_len, sizeof(*line));
- }
-
- memset(tmp, 0, sizeof(tmp));
- m = silc_client_chumode_char(chu->mode);
-
- strncat(line, " ", 1);
- strncat(line, e->nickname, strlen(e->nickname));
- strncat(line, e->server ? "@" : "", 1);
-
- len1 = 0;
- if (e->server)
- len1 = strlen(e->server);
- strncat(line, e->server ? e->server : "", len1 > 30 ? 30 : len1);
-
- len1 = strlen(line);
- if (len1 >= 30) {
- memset(&line[29], 0, len1 - 29);
- } else {
- for (i = 0; i < 30 - len1 - 1; i++)
- strcat(line, " ");
- }
-
- if (e->mode & SILC_UMODE_GONE)
- strcat(line, " G");
- else
- strcat(line, " H");
- strcat(tmp, m ? m : "");
- strncat(line, tmp, strlen(tmp));
-
- if (strlen(tmp) < 5)
- for (i = 0; i < 5 - strlen(tmp); i++)
- strcat(line, " ");
-
- strcat(line, e->username ? e->username : "");
-
- silc_say(client, conn, "%s", line);
-
- if (m)
- silc_free(m);
- }
-
- silc_free(line);
- }
- break;
-
- case SILC_COMMAND_BAN:
- {
- SilcChannelEntry channel;
- char *ban_list;
-
- if (!success)
- return;
-
- /* XXX should use irssi routines */
-
- channel = va_arg(vp, SilcChannelEntry);
- ban_list = va_arg(vp, char *);
-
- if (ban_list)
- silc_say(client, conn, "%s ban list: %s", channel->channel_name,
- ban_list);
- else
- silc_say(client, conn, "%s ban list not set", channel->channel_name);
- }
- break;
-
- case SILC_COMMAND_GETKEY:
- {
- SilcIdType id_type;
- void *entry;
- SilcPublicKey public_key;
- unsigned char *pk;
- uint32 pk_len;
-
- id_type = va_arg(vp, uint32);
- entry = va_arg(vp, void *);
- public_key = va_arg(vp, SilcPublicKey);
-
- pk = silc_pkcs_public_key_encode(public_key, &pk_len);
-
- if (id_type == SILC_ID_CLIENT) {
- silc_verify_public_key_internal(client, conn, SILC_SOCKET_TYPE_CLIENT,
- pk, pk_len, SILC_SKE_PK_TYPE_SILC,
- NULL, NULL);
- }
-
- silc_free(pk);
- }
-
- case SILC_COMMAND_TOPIC:
- {
- SilcChannelEntry channel;
- char *topic;
-
- if (!success)
- return;
-
- channel = va_arg(vp, SilcChannelEntry);
- topic = va_arg(vp, char *);
-
- if (topic) {
- chanrec = silc_channel_find_entry(server, channel);
- if (chanrec) {
- g_free_not_null(chanrec->topic);
- chanrec->topic = *topic == '\0' ? NULL : g_strdup(topic);
- signal_emit("channel topic changed", 1, chanrec);
- }
- printformat_module("fe-common/silc", server, channel->channel_name,
- MSGLEVEL_CRAP, SILCTXT_CHANNEL_TOPIC,
- channel->channel_name, topic);
- }
- }
- break;
- }
-
- va_end(vp);
-}
-
-/* Internal routine to verify public key. If the `completion' is provided
- it will be called to indicate whether public was verified or not. */
-
-typedef struct {
- SilcClient client;
- SilcClientConnection conn;
- char *filename;
- char *entity;
- unsigned char *pk;
- uint32 pk_len;
- SilcSKEPKType pk_type;
- SilcVerifyPublicKey completion;
- void *context;
-} *PublicKeyVerify;
-
-static void verify_public_key_completion(const char *line, void *context)
-{
- PublicKeyVerify verify = (PublicKeyVerify)context;
-
- if (line[0] == 'Y' || line[0] == 'y') {
- /* Call the completion */
- if (verify->completion)
- verify->completion(TRUE, verify->context);
-
- /* Save the key for future checking */
- silc_pkcs_save_public_key_data(verify->filename, verify->pk,
- verify->pk_len, SILC_PKCS_FILE_PEM);
- } else {
- /* Call the completion */
- if (verify->completion)
- verify->completion(FALSE, verify->context);
-
- silc_say(verify->client,
- verify->conn, "Will not accept the %s key", verify->entity);
- }
-
- silc_free(verify->filename);
- silc_free(verify->entity);
- silc_free(verify);
-}
-
-static void
-silc_verify_public_key_internal(SilcClient client, SilcClientConnection conn,
- SilcSocketType conn_type, unsigned char *pk,
- uint32 pk_len, SilcSKEPKType pk_type,
- SilcVerifyPublicKey completion, void *context)
-{
- int i;
- char file[256], filename[256], *fingerprint;
- struct passwd *pw;
- struct stat st;
- char *entity = ((conn_type == SILC_SOCKET_TYPE_SERVER ||
- conn_type == SILC_SOCKET_TYPE_ROUTER) ?
- "server" : "client");
- PublicKeyVerify verify;
-
- if (pk_type != SILC_SKE_PK_TYPE_SILC) {
- silc_say(client, conn, "We don't support %s public key type %d",
- entity, pk_type);
- if (completion)
- completion(FALSE, context);
- return;
- }
-
- pw = getpwuid(getuid());
- if (!pw) {
- if (completion)
- completion(FALSE, context);
- return;
- }
-
- memset(filename, 0, sizeof(filename));
- memset(file, 0, sizeof(file));
-
- if (conn_type == SILC_SOCKET_TYPE_SERVER ||
- conn_type == SILC_SOCKET_TYPE_ROUTER) {
- snprintf(file, sizeof(file) - 1, "%skey_%s_%d.pub", entity,
- conn->sock->hostname, conn->sock->port);
- snprintf(filename, sizeof(filename) - 1, "%s/.silc/%skeys/%s",
- pw->pw_dir, entity, file);
- } else {
- /* Replace all whitespaces with `_'. */
- fingerprint = silc_hash_fingerprint(NULL, pk, pk_len);
- for (i = 0; i < strlen(fingerprint); i++)
- if (fingerprint[i] == ' ')
- fingerprint[i] = '_';
-
- snprintf(file, sizeof(file) - 1, "%skey_%s.pub", entity, fingerprint);
- snprintf(filename, sizeof(filename) - 1, "%s/.silc/%skeys/%s",
- pw->pw_dir, entity, file);
- silc_free(fingerprint);
- }
-
- /* Take fingerprint of the public key */
- fingerprint = silc_hash_fingerprint(NULL, pk, pk_len);
-
- verify = silc_calloc(1, sizeof(*verify));
- verify->client = client;
- verify->conn = conn;
- verify->filename = strdup(filename);
- verify->entity = strdup(entity);
- verify->pk = pk;
- verify->pk_len = pk_len;
- verify->pk_type = pk_type;
- verify->completion = completion;
- verify->context = context;
-
- /* Check whether this key already exists */
- if (stat(filename, &st) < 0) {
- /* Key does not exist, ask user to verify the key and save it */
-
- silc_say(client, conn, "Received %s public key", entity);
- silc_say(client, conn, "Fingerprint for the %s key is", entity);
- silc_say(client, conn, "%s", fingerprint);
-
- keyboard_entry_redirect((SIGNAL_FUNC)verify_public_key_completion,
- "Would you like to accept the key (y/n)? ", 0,
- verify);
- silc_free(fingerprint);
- return;
- } else {
- /* The key already exists, verify it. */
- SilcPublicKey public_key;
- unsigned char *encpk;
- uint32 encpk_len;
-
- /* Load the key file */
- if (!silc_pkcs_load_public_key(filename, &public_key,
- SILC_PKCS_FILE_PEM))
- if (!silc_pkcs_load_public_key(filename, &public_key,
- SILC_PKCS_FILE_BIN)) {
- silc_say(client, conn, "Received %s public key", entity);
- silc_say(client, conn, "Fingerprint for the %s key is", entity);
- silc_say(client, conn, "%s", fingerprint);
- silc_say(client, conn, "Could not load your local copy of the %s key",
- entity);
- keyboard_entry_redirect((SIGNAL_FUNC)verify_public_key_completion,
- "Would you like to accept the key "
- "anyway (y/n)? ", 0,
- verify);
- silc_free(fingerprint);
- return;
- }
-
- /* Encode the key data */
- encpk = silc_pkcs_public_key_encode(public_key, &encpk_len);
- if (!encpk) {
- silc_say(client, conn, "Received %s public key", entity);
- silc_say(client, conn, "Fingerprint for the %s key is", entity);
- silc_say(client, conn, "%s", fingerprint);
- silc_say(client, conn, "Your local copy of the %s key is malformed",
- entity);
- keyboard_entry_redirect((SIGNAL_FUNC)verify_public_key_completion,
- "Would you like to accept the key "
- "anyway (y/n)? ", 0,
- verify);
- silc_free(fingerprint);
- return;
- }
-
- /* Compare the keys */
- if (memcmp(encpk, pk, encpk_len)) {
- silc_say(client, conn, "Received %s public key", entity);
- silc_say(client, conn, "Fingerprint for the %s key is", entity);
- silc_say(client, conn, "%s", fingerprint);
- silc_say(client, conn, "%s key does not match with your local copy",
- entity);
- silc_say(client, conn,
- "It is possible that the key has expired or changed");
- silc_say(client, conn, "It is also possible that some one is performing "
- "man-in-the-middle attack");
-
- /* Ask user to verify the key and save it */
- keyboard_entry_redirect((SIGNAL_FUNC)verify_public_key_completion,
- "Would you like to accept the key "
- "anyway (y/n)? ", 0,
- verify);
- silc_free(fingerprint);
- return;
- }
-
- /* Local copy matched */
- if (completion)
- completion(TRUE, context);
- silc_free(fingerprint);
- }
-}
-
-/* Verifies received public key. The `conn_type' indicates which entity
- (server, client etc.) has sent the public key. If user decides to trust
- the key may be saved as trusted public key for later use. The
- `completion' must be called after the public key has been verified. */
-
-static void
-silc_verify_public_key(SilcClient client, SilcClientConnection conn,
- SilcSocketType conn_type, unsigned char *pk,
- uint32 pk_len, SilcSKEPKType pk_type,
- SilcVerifyPublicKey completion, void *context)
-{
- silc_verify_public_key_internal(client, conn, conn_type, pk,
- pk_len, pk_type,
- completion, context);
-}
-
-/* Asks passphrase from user on the input line. */
-
-typedef struct {
- SilcAskPassphrase completion;
- void *context;
-} *AskPassphrase;
-
-static void ask_passphrase_completion(const char *passphrase, void *context)
-{
- AskPassphrase p = (AskPassphrase)context;
- p->completion((unsigned char *)passphrase,
- passphrase ? strlen(passphrase) : 0, p->context);
- silc_free(p);
-}
-
-static void silc_ask_passphrase(SilcClient client, SilcClientConnection conn,
- SilcAskPassphrase completion, void *context)
-{
- AskPassphrase p = silc_calloc(1, sizeof(*p));
- p->completion = completion;
- p->context = context;
-
- keyboard_entry_redirect((SIGNAL_FUNC)ask_passphrase_completion,
- "Passphrase: ", ENTRY_REDIRECT_FLAG_HIDDEN, p);
-}
-
-/* Find authentication method and authentication data by hostname and
- port. The hostname may be IP address as well. The found authentication
- method and authentication data is returned to `auth_meth', `auth_data'
- and `auth_data_len'. The function returns TRUE if authentication method
- is found and FALSE if not. `conn' may be NULL. */
-
-static int
-silc_get_auth_method(SilcClient client, SilcClientConnection conn,
- char *hostname, uint16 port,
- SilcProtocolAuthMeth *auth_meth,
- unsigned char **auth_data,
- uint32 *auth_data_len)
-{
-
- /* XXX must resolve from configuration whether this connection has
- any specific authentication data */
-
- *auth_meth = SILC_AUTH_NONE;
- *auth_data = NULL;
- *auth_data_len = 0;
-
- return TRUE;
-}
-
-/* Notifies application that failure packet was received. This is called
- if there is some protocol active in the client. The `protocol' is the
- protocol context. The `failure' is opaque pointer to the failure
- indication. Note, that the `failure' is protocol dependant and application
- must explicitly cast it to correct type. Usually `failure' is 32 bit
- failure type (see protocol specs for all protocol failure types). */
-
-static void
-silc_failure(SilcClient client, SilcClientConnection conn,
- SilcProtocol protocol, void *failure)
-{
- if (protocol->protocol->type == SILC_PROTOCOL_CLIENT_KEY_EXCHANGE) {
- SilcSKEStatus status = (SilcSKEStatus)failure;
-
- if (status == SILC_SKE_STATUS_BAD_VERSION)
- silc_say_error("You are running incompatible client version (it may be "
- "too old or too new)");
- if (status == SILC_SKE_STATUS_UNSUPPORTED_PUBLIC_KEY)
- silc_say_error("Server does not support your public key type");
- if (status == SILC_SKE_STATUS_UNKNOWN_GROUP)
- silc_say_error("Server does not support one of your proposed KE group");
- if (status == SILC_SKE_STATUS_UNKNOWN_CIPHER)
- silc_say_error("Server does not support one of your proposed cipher");
- if (status == SILC_SKE_STATUS_UNKNOWN_PKCS)
- silc_say_error("Server does not support one of your proposed PKCS");
- if (status == SILC_SKE_STATUS_UNKNOWN_HASH_FUNCTION)
- silc_say_error("Server does not support one of your proposed "
- "hash function");
- if (status == SILC_SKE_STATUS_UNKNOWN_HMAC)
- silc_say_error("Server does not support one of your proposed HMAC");
- if (status == SILC_SKE_STATUS_INCORRECT_SIGNATURE)
- silc_say_error("Incorrect signature");
- }
-
- if (protocol->protocol->type == SILC_PROTOCOL_CLIENT_CONNECTION_AUTH) {
- uint32 err = (uint32)failure;
-
- if (err == SILC_AUTH_FAILED)
- silc_say(client, conn, "Authentication failed");
- }
-}
+extern bool silc_debug;
+extern bool silc_debug_hexdump;
-/* Asks whether the user would like to perform the key agreement protocol.
- This is called after we have received an key agreement packet or an
- reply to our key agreement packet. This returns TRUE if the user wants
- the library to perform the key agreement protocol and FALSE if it is not
- desired (application may start it later by calling the function
- silc_client_perform_key_agreement). */
-
-static int
-silc_key_agreement(SilcClient client, SilcClientConnection conn,
- SilcClientEntry client_entry, char *hostname,
- int port,
- SilcKeyAgreementCallback *completion,
- void **context)
-{
- char host[256];
-
- /* We will just display the info on the screen and return FALSE and user
- will have to start the key agreement with a command. */
-
- if (hostname) {
- memset(host, 0, sizeof(host));
- snprintf(host, sizeof(host) - 1, "(%s on port %d)", hostname, port);
- }
-
- silc_say(client, conn, "%s wants to perform key agreement %s",
- client_entry->nickname, hostname ? host : "");
-
- *completion = NULL;
- *context = NULL;
-
- return FALSE;
-}
-
-/* SILC client operations */
-SilcClientOperations ops = {
- silc_say,
- silc_channel_message,
- silc_private_message,
- silc_notify,
- silc_command,
- silc_command_reply,
- silc_connect,
- silc_disconnect,
- silc_get_auth_method,
- silc_verify_public_key,
- silc_ask_passphrase,
- silc_failure,
- silc_key_agreement,
-};
+void silc_expandos_init(void);
+void silc_expandos_deinit(void);
static int my_silc_scheduler(void)
{
- silc_schedule_one(0);
+ silc_client_run_one(silc_client);
return 1;
}
return g_malloc0(sizeof(SILC_SERVER_CONNECT_REC));
}
+static void destroy_server_connect(SERVER_CONNECT_REC *conn)
+{
+
+}
+
/* Checks user information and saves them to the config file it they
do not exist there already. */
if (!str)
str = g_getenv("IRCNAME");
settings_set_str("real_name",
- str != NULL ? str : g_get_real_name());
+ str != NULL ? str : silc_get_real_name());
}
/* username */
if (!str)
str = g_getenv("IRCUSER");
settings_set_str("user_name",
- str != NULL ? str : g_get_user_name());
-
+ str != NULL ? str : silc_get_username());
+
user_name = settings_get_str("user_name");
}
-
+
/* nick */
nick = settings_get_str("nick");
if (nick == NULL || *nick == '\0') {
/* alternate nick */
set = settings_get_str("alternate_nick");
if (set == NULL || *set == '\0') {
- if (strlen(nick) < 9)
- str = g_strconcat(nick, "_", NULL);
- else {
- str = g_strdup(nick);
- str[strlen(str)-1] = '_';
- }
+ str = g_strconcat(nick, "_", NULL);
settings_set_str("alternate_nick", str);
g_free(str);
}
}
}
+#ifdef SILC_DEBUG
+static bool i_debug;
+static bool silc_irssi_debug_print(char *file, char *function, int line,
+ char *message, void *context)
+{
+ printtext(NULL, NULL, MSGLEVEL_CLIENTCRAP,
+ "DEBUG: %s:%d: %s", function, line, message);
+ return TRUE;
+}
+#endif
+
+static void sig_setup_changed(void)
+{
+#ifdef SILC_DEBUG
+ bool debug = settings_get_bool("debug");
+ if (debug) {
+ const char *debug_string = settings_get_str("debug_string");
+ i_debug = silc_debug = TRUE;
+ if (strlen(debug_string))
+ silc_log_set_debug_string(debug_string);
+ silc_log_set_debug_callbacks(silc_irssi_debug_print, NULL, NULL, NULL);
+ return;
+ }
+ if (i_debug)
+ silc_debug = FALSE;
+#endif
+}
+
/* Log callbacks */
-static void silc_log_info(char *message)
+static bool silc_log_misc(SilcLogType type, char *message, void *context)
{
- fprintf(stderr, "%s\n", message);
+ printtext(NULL, NULL, MSGLEVEL_CLIENTCRAP, "%s: %s",
+ (type == SILC_LOG_INFO ? "[Info]" :
+ type == SILC_LOG_WARNING ? "[Warning]" : "[Error]"), message);
+ return TRUE;
}
-static void silc_log_warning(char *message)
+static void silc_nickname_format_parse(const char *nickname,
+ char **ret_nickname)
{
- fprintf(stderr, "%s\n", message);
+ silc_parse_userfqdn(nickname, ret_nickname, NULL);
}
-static void silc_log_error(char *message)
+static void silc_register_cipher(SilcClient client, const char *cipher)
{
- fprintf(stderr, "%s\n", message);
+ int i;
+
+ if (cipher) {
+ for (i = 0; silc_default_ciphers[i].name; i++)
+ if (!strcmp(silc_default_ciphers[i].name, cipher)) {
+ silc_cipher_register(&(silc_default_ciphers[i]));
+ break;
+ }
+
+ if (!silc_cipher_is_supported(cipher)) {
+ SILC_LOG_ERROR(("Unknown cipher `%s'", cipher));
+ exit(1);
+ }
+ }
+
+ /* Register other defaults */
+ silc_cipher_register_default();
}
-/* Init SILC. Called from src/fe-text/silc.c */
+static void silc_register_hash(SilcClient client, const char *hash)
+{
+ int i;
-void silc_core_init(void)
+ if (hash) {
+ for (i = 0; silc_default_hash[i].name; i++)
+ if (!strcmp(silc_default_hash[i].name, hash)) {
+ silc_hash_register(&(silc_default_hash[i]));
+ break;
+ }
+
+ if (!silc_hash_is_supported(hash)) {
+ SILC_LOG_ERROR(("Unknown hash function `%s'", hash));
+ exit(1);
+ }
+ }
+
+ /* Register other defaults */
+ silc_hash_register_default();
+}
+
+static void silc_register_hmac(SilcClient client, const char *hmac)
{
- static struct poptOption options[] = {
- { "create-key-pair", 'C', POPT_ARG_NONE, &opt_create_keypair, 0,
- "Create new public key pair", NULL },
- { "pkcs", 0, POPT_ARG_STRING, &opt_pkcs, 0,
- "Set the PKCS of the public key pair", "PKCS" },
- { "bits", 0, POPT_ARG_INT, &opt_bits, 0,
- "Set the length of the public key pair", "VALUE" },
- { "show-key", 'S', POPT_ARG_STRING, &opt_keyfile, 0,
- "Show the contents of the public key", "FILE" },
- { "debug", 'd', POPT_ARG_NONE, &opt_debug, 0,
- "Enable debugging", NULL },
- { NULL, '\0', 0, NULL }
- };
+ int i;
- args_register(options);
+ if (hmac) {
+ for (i = 0; silc_default_hmacs[i].name; i++)
+ if (!strcmp(silc_default_hmacs[i].name, hmac)) {
+ silc_hmac_register(&(silc_default_hmacs[i]));
+ break;
+ }
+
+ if (!silc_hmac_is_supported(hmac)) {
+ SILC_LOG_ERROR(("Unknown HMAC `%s'", hmac));
+ exit(1);
+ }
+ }
+
+ /* Register other defaults */
+ silc_hmac_register_default();
}
-/* Finalize init. Called from src/fe-text/silc.c */
+/* Finalize init. Init finish signal calls this. */
-void silc_core_init_finish(void)
+void silc_opt_callback(poptContext con,
+ enum poptCallbackReason reason,
+ const struct poptOption *opt,
+ const char *arg, void *data)
{
- CHAT_PROTOCOL_REC *rec;
-
- if (opt_create_keypair == TRUE) {
- /* Create new key pair and exit */
+ if (strcmp(opt->longName, "show-key") == 0) {
+ /* Dump the key */
silc_cipher_register_default();
silc_pkcs_register_default();
silc_hash_register_default();
silc_hmac_register_default();
- silc_client_create_key_pair(opt_pkcs, opt_bits,
- NULL, NULL, NULL, NULL, NULL);
+ silc_show_public_key((char *)arg);
exit(0);
}
- if (opt_keyfile) {
- /* Dump the key */
+ if (strcmp(opt->longName, "list-ciphers") == 0) {
silc_cipher_register_default();
- silc_pkcs_register_default();
- silc_hash_register_default();
- silc_hmac_register_default();
- silc_client_show_key(opt_keyfile);
+ silc_client_list_ciphers();
exit(0);
}
- silc_debug = opt_debug;
- silc_log_set_callbacks(silc_log_info, silc_log_warning,
- silc_log_error, NULL);
-
- /* Do some irssi initializing */
- settings_add_bool("server", "skip_motd", FALSE);
- settings_add_str("server", "alternate_nick", NULL);
- silc_init_userinfo();
+ if (strcmp(opt->longName, "list-hash-funcs") == 0) {
+ silc_hash_register_default();
+ silc_client_list_hash_funcs();
+ exit(0);
+ }
- /* Allocate SILC client */
- silc_client = silc_client_alloc(&ops, NULL);
+ if (strcmp(opt->longName, "list-hmacs") == 0) {
+ silc_hmac_register_default();
+ silc_client_list_hmacs();
+ exit(0);
+ }
- /* Load local config file */
- silc_config = silc_client_config_alloc(SILC_CLIENT_HOME_CONFIG_FILE);
+ if (strcmp(opt->longName, "list-pkcs") == 0) {
+ silc_pkcs_register_default();
+ silc_client_list_pkcs();
+ exit(0);
+ }
- /* Get user information */
- silc_client->username = g_strdup(settings_get_str("user_name"));
- silc_client->hostname = silc_net_localhost();
- silc_client->realname = g_strdup(settings_get_str("real_name"));
+ if (strcmp(opt->longName, "debug") == 0) {
+ silc_debug = TRUE;
+ silc_debug_hexdump = TRUE;
+ silc_log_set_debug_string(arg);
+#ifndef SILC_DEBUG
+ fprintf(stdout,
+ "Run-time debugging is not enabled. To enable it recompile\n"
+ "the client with --enable-debug configuration option.\n");
+ sleep(1);
+#endif
+ }
- /* Register all configured ciphers, PKCS and hash functions. */
- if (silc_config) {
- silc_config->client = silc_client;
- if (!silc_client_config_register_ciphers(silc_config))
- silc_cipher_register_default();
- if (!silc_client_config_register_pkcs(silc_config))
- silc_pkcs_register_default();
- if (!silc_client_config_register_hashfuncs(silc_config))
- silc_hash_register_default();
- if (!silc_client_config_register_hmacs(silc_config))
- silc_hmac_register_default();
- } else {
- /* Register default ciphers, pkcs, hash funtions and hmacs. */
+ if (strcmp(opt->longName, "create-key-pair") == 0) {
+ /* Create new key pair and exit */
silc_cipher_register_default();
silc_pkcs_register_default();
silc_hash_register_default();
silc_hmac_register_default();
+ silc_create_key_pair(opt_pkcs, opt_bits, NULL, NULL, NULL,
+ NULL, NULL, NULL, NULL, TRUE);
+ exit(0);
}
+}
+static void sig_init_finished(void)
+{
/* Check ~/.silc directory and public and private keys */
- if (silc_client_check_silc_dir() == FALSE) {
+ if (!silc_client_check_silc_dir()) {
idletag = -1;
- return;
+ exit(1);
}
/* Load public and private key */
- if (silc_client_load_keys(silc_client) == FALSE) {
+ if (!silc_client_load_keys(silc_client)) {
idletag = -1;
- return;
+ exit(1);
}
/* Initialize the SILC client */
if (!silc_client_init(silc_client)) {
idletag = -1;
- return;
+ exit(1);
}
+}
+
+/* Init SILC. Called from src/fe-text/silc.c */
+
+void silc_core_init(void)
+{
+ static struct poptOption silc_options[] = {
+ { NULL, '\0', POPT_ARG_CALLBACK, (void *)&silc_opt_callback, '\0', NULL },
+ { "show-key", 'S', POPT_ARG_STRING, NULL, 0,
+ "Show the contents of the public key", "FILE" },
+ { "list-ciphers", 0, POPT_ARG_NONE, NULL, 0,
+ "List supported ciphers", NULL },
+ { "list-hash-funcs", 0, POPT_ARG_NONE, NULL, 0,
+ "List supported hash functions", NULL },
+ { "list-hmacs", 0, POPT_ARG_NONE, NULL, 0,
+ "List supported HMACs", NULL },
+ { "list-pkcs", 0, POPT_ARG_NONE, NULL, 0,
+ "List supported PKCSs", NULL },
+ { "debug", 'd', POPT_ARG_STRING, NULL, 0,
+ "Enable debugging", "STRING" },
+ { "create-key-pair", 'C', POPT_ARG_NONE, NULL, 0,
+ "Create new public key pair", NULL },
+ { "pkcs", 0, POPT_ARG_STRING, &opt_pkcs, 0,
+ "Set the PKCS of the public key pair (-C)", "PKCS" },
+ { "bits", 0, POPT_ARG_INT, &opt_bits, 0,
+ "Set the length of the public key pair (-C)", "VALUE" },
+ { NULL, '\0', 0, NULL }
+ };
+
+ CHAT_PROTOCOL_REC *rec;
+ SilcClientParams params;
+ const char *def_cipher, *def_hash, *def_hmac;
+
+ args_register(silc_options);
+
+ /* Settings */
+ settings_add_bool("server", "skip_motd", FALSE);
+ settings_add_str("server", "alternate_nick", NULL);
+ settings_add_bool("server", "use_auto_addr", FALSE);
+ settings_add_str("server", "auto_bind_ip", "");
+ settings_add_str("server", "auto_public_ip", "");
+ settings_add_int("server", "auto_bind_port", 0);
+ settings_add_str("server", "crypto_default_cipher", SILC_DEFAULT_CIPHER);
+ settings_add_str("server", "crypto_default_hash", SILC_DEFAULT_HASH);
+ settings_add_str("server", "crypto_default_hmac", SILC_DEFAULT_HMAC);
+ settings_add_int("server", "key_exchange_timeout_secs", 120);
+ settings_add_int("server", "key_exchange_rekey_secs", 3600);
+ settings_add_int("server", "connauth_request_secs", 2);
+ settings_add_int("server", "heartbeat", 300);
+
+ /* Requested Attributes settings */
+ settings_add_bool("silc", "attr_allow", TRUE);
+ settings_add_str("silc", "attr_vcard", "");
+ settings_add_str("silc", "attr_services", "");
+ settings_add_str("silc", "attr_status_mood", "NORMAL");
+ settings_add_str("silc", "attr_status_text", "");
+ settings_add_str("silc", "attr_status_message", NULL);
+ settings_add_str("silc", "attr_preferred_language", "");
+ settings_add_str("silc", "attr_preferred_contact", "CHAT");
+ settings_add_bool("silc", "attr_timezone", TRUE);
+ settings_add_str("silc", "attr_geolocation", "");
+ settings_add_str("silc", "attr_device_info", NULL);
+ settings_add_str("silc", "attr_public_keys", "");
+
+#ifdef SILC_DEBUG
+ settings_add_bool("debug", "debug", FALSE);
+ settings_add_str("debug", "debug_string", "");
+#endif
+
+ signal_add("setup changed", (SIGNAL_FUNC) sig_setup_changed);
+ signal_add("irssi init finished", (SIGNAL_FUNC) sig_init_finished);
+
+ silc_init_userinfo();
+
+ /* Initialize client parameters */
+ memset(¶ms, 0, sizeof(params));
+ strcat(params.nickname_format, "%n@%h%a");
+ params.nickname_parse = silc_nickname_format_parse;
+ params.rekey_secs = settings_get_int("key_exchange_rekey_secs");
+ params.connauth_request_secs = settings_get_int("connauth_request_secs");
+
+ /* Allocate SILC client */
+ silc_client = silc_client_alloc(&ops, ¶ms, NULL, silc_version_string);
+
+ /* Get the ciphers and stuff from config file */
+ def_cipher = settings_get_str("crypto_default_cipher");
+ def_hash = settings_get_str("crypto_default_hash");
+ def_hmac = settings_get_str("crypto_default_hmac");
+ silc_register_cipher(silc_client, def_cipher);
+ silc_register_hash(silc_client, def_hash);
+ silc_register_hmac(silc_client, def_hmac);
+ silc_pkcs_register_default();
+
+ /* Get user information */
+ silc_client->username = g_strdup(settings_get_str("user_name"));
+ silc_client->nickname = g_strdup(settings_get_str("nick"));
+ silc_client->hostname = silc_net_localhost();
+ silc_client->realname = g_strdup(settings_get_str("real_name"));
+
+ silc_log_set_callback(SILC_LOG_INFO, silc_log_misc, NULL);
+ silc_log_set_callback(SILC_LOG_WARNING, silc_log_misc, NULL);
+ silc_log_set_callback(SILC_LOG_ERROR, silc_log_misc, NULL);
+ silc_log_set_callback(SILC_LOG_FATAL, silc_log_misc, NULL);
/* Register SILC to the irssi */
rec = g_new0(CHAT_PROTOCOL_REC, 1);
rec->create_server_setup = create_server_setup;
rec->create_channel_setup = create_channel_setup;
rec->create_server_connect = create_server_connect;
- rec->server_connect = (SERVER_REC *(*) (SERVER_CONNECT_REC *))
- silc_server_connect;
- rec->channel_create = (CHANNEL_REC *(*) (SERVER_REC *, const char *, int))
+ rec->destroy_server_connect = destroy_server_connect;
+ rec->server_init_connect = silc_server_init_connect;
+ rec->server_connect = silc_server_connect;
+ rec->channel_create = (CHANNEL_REC *(*) (SERVER_REC *, const char *,
+ const char *, int))
silc_channel_create;
rec->query_create = (QUERY_REC *(*) (const char *, const char *, int))
silc_query_create;
silc_server_init();
silc_channels_init();
silc_queries_init();
+ silc_expandos_init();
+
+ idletag = g_timeout_add(5, (GSourceFunc) my_silc_scheduler, NULL);
- idletag = g_timeout_add(50, (GSourceFunc) my_silc_scheduler, NULL);
+ module_register("silc", "core");
}
/* Deinit SILC. Called from src/fe-text/silc.c */
if (idletag != -1) {
signal_emit("chat protocol deinit", 1,
chat_protocol_find("SILC"));
-
+ signal_remove("setup changed", (SIGNAL_FUNC) sig_setup_changed);
+ signal_remove("irssi init finished", (SIGNAL_FUNC) sig_init_finished);
+
silc_server_deinit();
silc_channels_deinit();
silc_queries_deinit();
+ silc_expandos_deinit();
chat_protocol_unregister("SILC");