5 Author: Pekka Riikonen <priikone@silcnet.org>
7 Copyright (C) 1997 - 2005 Pekka Riikonen
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; version 2 of the License.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
21 #include "serverincludes.h"
22 #include "server_internal.h"
24 static int silc_server_is_registered(SilcServer server,
25 SilcSocketConnection sock,
26 SilcServerCommandContext cmd,
29 silc_server_command_send_status_reply(SilcServerCommandContext cmd,
34 silc_server_command_send_status_data(SilcServerCommandContext cmd,
39 const unsigned char *arg,
42 silc_server_command_pending_error_check(SilcServerCommandContext cmd,
43 SilcServerCommandReplyContext cmdr,
45 SILC_TASK_CALLBACK(silc_server_command_process_timeout);
47 /* Server command list. */
48 SilcServerCommand silc_command_list[] =
50 SILC_SERVER_CMD(whois, WHOIS, SILC_CF_LAG | SILC_CF_REG),
51 SILC_SERVER_CMD(whowas, WHOWAS, SILC_CF_LAG | SILC_CF_REG),
52 SILC_SERVER_CMD(identify, IDENTIFY, SILC_CF_LAG | SILC_CF_REG),
53 SILC_SERVER_CMD(nick, NICK, SILC_CF_LAG_STRICT | SILC_CF_REG),
54 SILC_SERVER_CMD(list, LIST, SILC_CF_LAG_STRICT | SILC_CF_REG),
55 SILC_SERVER_CMD(topic, TOPIC, SILC_CF_LAG | SILC_CF_REG),
56 SILC_SERVER_CMD(invite, INVITE, SILC_CF_LAG | SILC_CF_REG),
57 SILC_SERVER_CMD(quit, QUIT, SILC_CF_LAG | SILC_CF_REG),
58 SILC_SERVER_CMD(kill, KILL, SILC_CF_LAG_STRICT | SILC_CF_REG | SILC_CF_OPER),
59 SILC_SERVER_CMD(info, INFO, SILC_CF_LAG | SILC_CF_REG),
60 SILC_SERVER_CMD(stats, STATS, SILC_CF_LAG | SILC_CF_REG),
61 SILC_SERVER_CMD(ping, PING, SILC_CF_LAG | SILC_CF_REG),
62 SILC_SERVER_CMD(oper, OPER, SILC_CF_LAG | SILC_CF_REG | SILC_CF_OPER),
63 SILC_SERVER_CMD(join, JOIN, SILC_CF_LAG_STRICT | SILC_CF_REG),
64 SILC_SERVER_CMD(motd, MOTD, SILC_CF_LAG | SILC_CF_REG),
65 SILC_SERVER_CMD(umode, UMODE, SILC_CF_LAG | SILC_CF_REG),
66 SILC_SERVER_CMD(cmode, CMODE, SILC_CF_LAG_STRICT | SILC_CF_REG),
67 SILC_SERVER_CMD(cumode, CUMODE, SILC_CF_LAG | SILC_CF_REG),
68 SILC_SERVER_CMD(kick, KICK, SILC_CF_LAG_STRICT | SILC_CF_REG),
69 SILC_SERVER_CMD(ban, BAN, SILC_CF_LAG_STRICT | SILC_CF_REG),
70 SILC_SERVER_CMD(detach, DETACH, SILC_CF_LAG_STRICT | SILC_CF_REG),
71 SILC_SERVER_CMD(watch, WATCH, SILC_CF_LAG | SILC_CF_REG),
72 SILC_SERVER_CMD(silcoper, SILCOPER,
73 SILC_CF_LAG | SILC_CF_REG | SILC_CF_SILC_OPER),
74 SILC_SERVER_CMD(leave, LEAVE, SILC_CF_LAG_STRICT | SILC_CF_REG),
75 SILC_SERVER_CMD(users, USERS, SILC_CF_LAG | SILC_CF_REG),
76 SILC_SERVER_CMD(getkey, GETKEY, SILC_CF_LAG | SILC_CF_REG),
78 SILC_SERVER_CMD(connect, PRIV_CONNECT,
79 SILC_CF_LAG | SILC_CF_REG | SILC_CF_OPER),
80 SILC_SERVER_CMD(close, PRIV_CLOSE,
81 SILC_CF_LAG | SILC_CF_REG | SILC_CF_OPER),
82 SILC_SERVER_CMD(shutdown, PRIV_SHUTDOWN, SILC_CF_LAG | SILC_CF_REG |
88 /* Performs several checks to the command. It first checks whether this
89 command was called as pending command callback. If it was then it checks
90 whether error occurred in the command reply where the pending command
93 It also checks that the requested command includes correct amount
95 #define SILC_SERVER_COMMAND_CHECK(command, context, min, max) \
99 if (silc_server_command_pending_error_check(cmd, context2, command)) { \
100 SILC_LOG_DEBUG(("Error occurred in command reply, command not called")); \
101 silc_server_command_free(cmd); \
105 _argc = silc_argument_get_arg_num(cmd->args); \
107 SILC_LOG_DEBUG(("Not enough parameters in command")); \
108 silc_server_command_send_status_reply(cmd, command, \
109 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS, \
111 silc_server_command_free(cmd); \
115 SILC_LOG_DEBUG(("Too many parameters in command")); \
116 silc_server_command_send_status_reply(cmd, command, \
117 SILC_STATUS_ERR_TOO_MANY_PARAMS, \
119 silc_server_command_free(cmd); \
124 /* Returns TRUE if the connection is registered. Unregistered connections
125 usually cannot send commands hence the check. */
127 static int silc_server_is_registered(SilcServer server,
128 SilcSocketConnection sock,
129 SilcServerCommandContext cmd,
132 SilcIDListData idata = (SilcIDListData)sock->user_data;
137 if (idata->status & SILC_IDLIST_STATUS_REGISTERED)
140 silc_server_command_send_status_reply(cmd, command,
141 SILC_STATUS_ERR_NOT_REGISTERED, 0);
145 /* Internal context to hold data when executed command with timeout. */
147 SilcServerCommandContext ctx;
148 SilcServerCommand *cmd;
149 } *SilcServerCommandTimeout;
151 /* Timeout callback to process commands with timeout for client. Client's
152 commands are always executed with timeout. */
154 SILC_TASK_CALLBACK(silc_server_command_process_timeout)
156 SilcServerCommandTimeout timeout = (SilcServerCommandTimeout)context;
157 SilcClientEntry client = (SilcClientEntry)timeout->ctx->sock->user_data;
160 SILC_LOG_DEBUG(("Client entry is invalid"));
161 silc_server_command_free(timeout->ctx);
166 /* Update access time */
167 client->last_command = time(NULL);
169 if (!(timeout->cmd->flags & SILC_CF_REG)) {
170 SILC_LOG_DEBUG(("Calling %s command",
171 silc_get_command_name(timeout->cmd->cmd)));
172 timeout->cmd->cb(timeout->ctx, NULL);
173 } else if (silc_server_is_registered(timeout->ctx->server,
176 timeout->cmd->cmd)) {
177 SILC_LOG_DEBUG(("Calling %s command",
178 silc_get_command_name(timeout->cmd->cmd)));
179 timeout->cmd->cb(timeout->ctx, NULL);
181 SILC_LOG_DEBUG(("Client is not registered"));
182 silc_server_command_free(timeout->ctx);
188 /* Processes received command packet. */
190 void silc_server_command_process(SilcServer server,
191 SilcSocketConnection sock,
192 SilcPacketContext *packet)
194 SilcServerCommandContext ctx;
195 SilcServerCommand *cmd;
198 /* Allocate command context. This must be free'd by the
199 command routine receiving it. */
200 ctx = silc_server_command_alloc();
201 ctx->server = server;
202 ctx->sock = silc_socket_dup(sock);
203 ctx->packet = silc_packet_context_dup(packet); /* Save original packet */
205 /* Parse the command payload in the packet */
206 ctx->payload = silc_command_payload_parse(packet->buffer->data,
207 packet->buffer->len);
209 SILC_LOG_ERROR(("Bad command payload, dropped (%s:%d [%s])",
210 sock->hostname, sock->port,
211 (sock->type == SILC_SOCKET_TYPE_UNKNOWN ? "Unknown" :
212 sock->type == SILC_SOCKET_TYPE_CLIENT ? "Client" :
213 sock->type == SILC_SOCKET_TYPE_SERVER ? "Server" :
215 silc_packet_context_free(packet);
216 silc_socket_free(ctx->sock);
220 ctx->args = silc_command_get_args(ctx->payload);
222 /* Get the command */
223 command = silc_command_get(ctx->payload);
224 for (cmd = silc_command_list; cmd->cb; cmd++)
225 if (cmd->cmd == command)
228 if (!cmd || !cmd->cb) {
229 SILC_LOG_DEBUG(("Unknown command %d", command));
230 silc_server_command_send_status_reply(ctx, command,
231 SILC_STATUS_ERR_UNKNOWN_COMMAND, 0);
232 silc_server_command_free(ctx);
236 /* Execute client's commands always with timeout. Normally they are
237 executed with zero (0) timeout but if client is sending command more
238 frequently than once in 2 seconds, then the timeout may be 0 to 2
240 if (sock->type == SILC_SOCKET_TYPE_CLIENT) {
241 SilcClientEntry client = (SilcClientEntry)sock->user_data;
242 SilcServerCommandTimeout timeout;
246 SILC_LOG_DEBUG(("Client entry is invalid"));
247 silc_server_command_free(ctx);
251 timeout = silc_calloc(1, sizeof(*timeout));
255 if (client->last_command && (time(NULL) - client->last_command) < 2) {
256 client->fast_command++;
259 if (client->fast_command - 2 <= 0)
260 client->fast_command = 0;
262 client->fast_command -= 2;
266 if (!fast && ((cmd->flags & SILC_CF_LAG_STRICT) ||
267 (client->fast_command > 5 && cmd->flags & SILC_CF_LAG)))
268 silc_schedule_task_add(server->schedule, sock->sock,
269 silc_server_command_process_timeout, timeout,
270 (client->fast_command < 3 ? 0 :
271 2 - (time(NULL) - client->last_command)),
272 (client->fast_command < 3 ? 200000 : 0),
273 SILC_TASK_TIMEOUT, SILC_TASK_PRI_NORMAL);
275 silc_schedule_task_add(server->schedule, sock->sock,
276 silc_server_command_process_timeout, timeout,
277 0, 1, SILC_TASK_TIMEOUT, SILC_TASK_PRI_NORMAL);
281 /* Execute for server */
283 if (!(cmd->flags & SILC_CF_REG)) {
284 SILC_LOG_DEBUG(("Calling %s command", silc_get_command_name(cmd->cmd)));
286 } else if (silc_server_is_registered(server, sock, ctx, cmd->cmd)) {
287 SILC_LOG_DEBUG(("Calling %s command", silc_get_command_name(cmd->cmd)));
290 SILC_LOG_DEBUG(("Server is not registered"));
291 silc_server_command_free(ctx);
295 /* Allocate Command Context */
297 SilcServerCommandContext silc_server_command_alloc()
299 SilcServerCommandContext ctx = silc_calloc(1, sizeof(*ctx));
304 /* Free's the command context allocated before executing the command */
306 void silc_server_command_free(SilcServerCommandContext ctx)
309 SILC_LOG_DEBUG(("Command context %p refcnt %d->%d", ctx, ctx->users + 1,
311 if (ctx->users < 1) {
313 silc_command_payload_free(ctx->payload);
315 silc_packet_context_free(ctx->packet);
317 silc_socket_free(ctx->sock); /* Decrease reference counter */
322 /* Duplicate Command Context by adding reference counter. The context won't
323 be free'd untill it hits zero. */
325 SilcServerCommandContext
326 silc_server_command_dup(SilcServerCommandContext ctx)
329 SILC_LOG_DEBUG(("Command context %p refcnt %d->%d", ctx, ctx->users - 1,
334 /* Timeout for pending command. If reply to pending command never arrives
335 this is called to free resources. */
337 SILC_TASK_CALLBACK(silc_server_command_pending_timeout)
339 SilcServer server = app_context;
340 SilcServerCommandPending *reply = context;
341 SilcServerCommandReplyContext cmdr;
345 SILC_LOG_DEBUG(("Timeout pending command"));
347 /* Allocate temporary and bogus command reply context */
348 cmdr = silc_calloc(1, sizeof(*cmdr));
349 cmdr->server = server;
350 cmdr->ident = reply->ident;
352 /* Check for pending commands and mark to be exeucted */
354 silc_server_command_pending_check(server, reply->reply_cmd,
355 reply->ident, &cmdr->callbacks_count);
357 /* Create bogus command reply with an error inside */
359 silc_command_reply_payload_encode_va(reply->reply_cmd ? reply->reply_cmd :
360 SILC_COMMAND_RESERVED,
361 SILC_STATUS_ERR_TIMEDOUT, 0,
363 cmdr->payload = silc_command_payload_parse(tmpreply->data, tmpreply->len);
364 silc_buffer_free(tmpreply);
366 /* Call all callbacks. Same as SILC_SERVER_PENDING_EXEC macro. */
367 for (i = 0; i < cmdr->callbacks_count; i++)
368 if (cmdr->callbacks[i].callback)
369 (*cmdr->callbacks[i].callback)(cmdr->callbacks[i].context, cmdr);
371 silc_server_command_pending_del(server, reply->reply_cmd, reply->ident);
372 silc_server_command_reply_free(cmdr);
375 /* Add new pending command to be executed when reply to a command has been
376 received. The `reply_cmd' is the command that will call the `callback'
377 with `context' when reply has been received. It can be SILC_COMMAND_NONE
378 to match any command with the `ident'. If `ident' is non-zero
379 the `callback' will be executed when received reply with command
380 identifier `ident'. If there already exists pending command for the
381 specified command, ident, callback and context this function has no
384 bool silc_server_command_pending(SilcServer server,
385 SilcCommand reply_cmd,
387 SilcCommandCb callback,
390 return silc_server_command_pending_timed(server, reply_cmd, ident, callback,
394 /* Same as silc_server_command_pending with specific timeout for pending
395 commands. If the `timeout' is zero default timeout is used. */
397 bool silc_server_command_pending_timed(SilcServer server,
398 SilcCommand reply_cmd,
400 SilcCommandCb callback,
404 SilcServerCommandPending *reply;
406 /* Check whether identical pending already exists for same command,
407 ident, callback and callback context. If it does then it would be
408 error to register it again. */
409 silc_dlist_start(server->pending_commands);
410 while ((reply = silc_dlist_get(server->pending_commands)) != SILC_LIST_END) {
411 if (reply->reply_cmd == reply_cmd && reply->ident == ident &&
412 reply->callback == callback && reply->context == context)
416 reply = silc_calloc(1, sizeof(*reply));
417 reply->reply_cmd = reply_cmd;
418 reply->ident = ident;
419 reply->context = context;
420 reply->callback = callback;
422 silc_schedule_task_add(server->schedule, 0,
423 silc_server_command_pending_timeout, reply,
424 timeout ? timeout : 12, 0,
425 SILC_TASK_TIMEOUT, SILC_TASK_PRI_LOW);
426 silc_dlist_add(server->pending_commands, reply);
431 /* Deletes pending command by reply command type. */
433 void silc_server_command_pending_del(SilcServer server,
434 SilcCommand reply_cmd,
437 SilcServerCommandPending *r;
439 silc_dlist_start(server->pending_commands);
440 while ((r = silc_dlist_get(server->pending_commands)) != SILC_LIST_END) {
441 if ((r->reply_cmd == reply_cmd || (r->reply_cmd == SILC_COMMAND_NONE &&
443 && r->ident == ident) {
444 silc_dlist_del(server->pending_commands, r);
446 silc_schedule_task_del(server->schedule, r->timeout);
452 /* Checks for pending commands and marks callbacks to be called from
453 the command reply function. Returns TRUE if there were pending command. */
455 SilcServerCommandPendingCallbacks
456 silc_server_command_pending_check(SilcServer server,
459 SilcUInt32 *callbacks_count)
461 SilcServerCommandPending *r;
462 SilcServerCommandPendingCallbacks callbacks = NULL;
465 silc_dlist_start(server->pending_commands);
466 while ((r = silc_dlist_get(server->pending_commands)) != SILC_LIST_END) {
467 if ((r->reply_cmd == command || r->reply_cmd == SILC_COMMAND_NONE)
468 && r->ident == ident) {
469 callbacks = silc_realloc(callbacks, sizeof(*callbacks) * (i + 1));
470 callbacks[i].context = r->context;
471 callbacks[i].callback = r->callback;
472 r->reply_check = TRUE;
477 *callbacks_count = i;
481 /* Sends simple status message as command reply packet */
484 silc_server_command_send_status_reply(SilcServerCommandContext cmd,
492 cmd->server->stat.commands_sent++;
494 SILC_LOG_DEBUG(("Sending command status %d", status));
497 silc_command_reply_payload_encode_va(command, status, error,
498 silc_command_get_ident(cmd->payload),
500 silc_server_packet_send(cmd->server, cmd->sock,
501 SILC_PACKET_COMMAND_REPLY, 0,
502 buffer->data, buffer->len, FALSE);
503 silc_buffer_free(buffer);
506 /* Sends command status reply with one extra argument. The argument
507 type must be sent as argument. */
510 silc_server_command_send_status_data(SilcServerCommandContext cmd,
515 const unsigned char *arg,
521 cmd->server->stat.commands_sent++;
523 SILC_LOG_DEBUG(("Sending command status %d", status));
526 silc_command_reply_payload_encode_va(command, status, 0,
527 silc_command_get_ident(cmd->payload),
528 1, arg_type, arg, arg_len);
529 silc_server_packet_send(cmd->server, cmd->sock,
530 SILC_PACKET_COMMAND_REPLY, 0,
531 buffer->data, buffer->len, FALSE);
532 silc_buffer_free(buffer);
536 silc_server_command_send_status_data2(SilcServerCommandContext cmd,
540 SilcUInt32 arg_type1,
541 const unsigned char *arg1,
543 SilcUInt32 arg_type2,
544 const unsigned char *arg2,
550 cmd->server->stat.commands_sent++;
552 SILC_LOG_DEBUG(("Sending command status %d", status));
555 silc_command_reply_payload_encode_va(command, status, 0,
556 silc_command_get_ident(cmd->payload),
557 2, arg_type1, arg1, arg_len1,
558 arg_type2, arg2, arg_len2);
559 silc_server_packet_send(cmd->server, cmd->sock,
560 SILC_PACKET_COMMAND_REPLY, 0,
561 buffer->data, buffer->len, FALSE);
562 silc_buffer_free(buffer);
565 /* This function can be called to check whether in the command reply
566 an error occurred. This function has no effect if this is called
567 when the command function was not called as pending command callback.
568 This returns TRUE if error had occurred. */
571 silc_server_command_pending_error_check(SilcServerCommandContext cmd,
572 SilcServerCommandReplyContext cmdr,
575 if (!cmd->pending || !cmdr)
578 if (!silc_command_get_status(cmdr->payload, NULL, NULL)) {
582 cmd->server->stat.commands_sent++;
584 /* Send the same command reply payload */
585 silc_command_set_command(cmdr->payload, silc_command_get(cmd->payload));
586 silc_command_set_ident(cmdr->payload,
587 silc_command_get_ident(cmd->payload));
588 buffer = silc_command_payload_encode_payload(cmdr->payload);
589 silc_server_packet_send(cmd->server, cmd->sock,
590 SILC_PACKET_COMMAND_REPLY, 0,
591 buffer->data, buffer->len, FALSE);
592 silc_buffer_free(buffer);
599 /* Server side of command WHOIS. */
601 SILC_SERVER_CMD_FUNC(whois)
603 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
604 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_WHOIS, cmd, 1, 256);
605 silc_server_query_command(cmd->server, SILC_COMMAND_WHOIS, cmd);
606 silc_server_command_free(cmd);
609 /* Server side of command WHOWAS. */
611 SILC_SERVER_CMD_FUNC(whowas)
613 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
614 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_WHOWAS, cmd, 1, 2);
615 silc_server_query_command(cmd->server, SILC_COMMAND_WHOWAS, cmd);
616 silc_server_command_free(cmd);
619 /* Server side of command IDENTIFY. */
621 SILC_SERVER_CMD_FUNC(identify)
623 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
624 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_IDENTIFY, cmd, 1, 256);
625 silc_server_query_command(cmd->server, SILC_COMMAND_IDENTIFY, cmd);
626 silc_server_command_free(cmd);
629 /* Server side of command NICK. Sets nickname for user. Setting
630 nickname causes generation of a new client ID for the client. The
631 new client ID is sent to the client after changing the nickname. */
633 SILC_SERVER_CMD_FUNC(nick)
635 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
636 SilcClientEntry client = (SilcClientEntry)cmd->sock->user_data;
637 SilcServer server = cmd->server;
638 SilcBuffer nidp, oidp = NULL;
639 SilcClientID *new_id;
641 unsigned char *nick, *nickc = NULL;
642 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
644 if (cmd->sock->type != SILC_SOCKET_TYPE_CLIENT || !client)
647 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_NICK, cmd, 1, 1);
650 nick = silc_argument_get_arg_type(cmd->args, 1, &nick_len);
652 silc_server_command_send_status_reply(cmd, SILC_COMMAND_NICK,
653 SILC_STATUS_ERR_BAD_NICKNAME, 0);
657 /* Truncate over long nicks */
658 if (nick_len > 128) {
663 /* Check for valid nickname string. This is cached, original is saved
664 in the client context. */
665 nickc = silc_identifier_check(nick, nick_len, SILC_STRING_UTF8, 128, NULL);
667 silc_server_command_send_status_reply(cmd, SILC_COMMAND_NICK,
668 SILC_STATUS_ERR_BAD_NICKNAME, 0);
672 /* Check for same nickname */
673 if (strlen(client->nickname) == nick_len &&
674 !memcmp(client->nickname, nick, nick_len)) {
675 nidp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
680 /* Create new Client ID */
681 if (!silc_id_create_client_id(cmd->server, cmd->server->id,
683 cmd->server->md5hash,
684 nickc, strlen(nickc), &new_id)) {
685 silc_server_command_send_status_reply(cmd, SILC_COMMAND_NICK,
686 SILC_STATUS_ERR_BAD_NICKNAME, 0);
691 /* Send notify about nickname change to our router. We send the new
692 ID and ask to replace it with the old one. If we are router the
693 packet is broadcasted. Send NICK_CHANGE notify. */
694 silc_server_send_notify_nick_change(server, SILC_PRIMARY_ROUTE(server),
695 SILC_BROADCAST(server), client->id,
698 /* Check if anyone is watching the old nickname */
699 if (server->server_type == SILC_ROUTER)
700 silc_server_check_watcher_list(server, client, nick,
701 SILC_NOTIFY_TYPE_NICK_CHANGE);
703 oidp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
705 /* Remove old cache entry */
706 silc_idcache_del_by_context(server->local_list->clients, client);
708 silc_free(client->id);
711 silc_free(client->nickname);
712 client->nickname = strdup(nick);
714 /* Update client cache */
715 silc_idcache_add(server->local_list->clients, nickc,
716 client->id, (void *)client, 0, NULL);
718 nidp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
720 /* Send NICK_CHANGE notify to the client's channels */
721 silc_server_send_notify_on_channels(server, NULL, client,
722 SILC_NOTIFY_TYPE_NICK_CHANGE, 3,
723 oidp->data, oidp->len,
724 nidp->data, nidp->len,
726 strlen(client->nickname));
728 /* Check if anyone is watching the new nickname */
729 if (server->server_type == SILC_ROUTER)
730 silc_server_check_watcher_list(server, client, NULL,
731 SILC_NOTIFY_TYPE_NICK_CHANGE);
734 /* Send the new Client ID as reply command back to client */
735 silc_server_send_command_reply(cmd->server, cmd->sock,
737 SILC_STATUS_OK, 0, ident, 2,
738 2, nidp->data, nidp->len,
740 silc_buffer_free(nidp);
742 silc_buffer_free(oidp);
745 silc_server_command_free(cmd);
748 /* Sends the LIST command reply */
751 silc_server_command_list_send_reply(SilcServerCommandContext cmd,
752 SilcChannelEntry *lch,
753 SilcUInt32 lch_count,
754 SilcChannelEntry *gch,
755 SilcUInt32 gch_count)
759 SilcChannelEntry entry;
761 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
763 unsigned char usercount[4];
765 int valid_lcount = 0, valid_rcount = 0;
767 for (i = 0; i < lch_count; i++) {
768 if (lch[i]->mode & SILC_CHANNEL_MODE_SECRET)
773 for (i = 0; i < gch_count; i++) {
774 if (gch[i]->mode & SILC_CHANNEL_MODE_SECRET)
780 if (!lch_count && !gch_count) {
781 silc_server_command_send_status_reply(cmd, SILC_COMMAND_LIST,
786 status = SILC_STATUS_OK;
787 if ((lch_count + gch_count) > 1)
788 status = SILC_STATUS_LIST_START;
791 for (i = 0, k = 0; i < lch_count; i++) {
797 status = SILC_STATUS_LIST_ITEM;
798 if (valid_lcount > 1 && k == valid_lcount - 1 && !valid_rcount)
799 status = SILC_STATUS_LIST_END;
801 idp = silc_id_payload_encode(entry->id, SILC_ID_CHANNEL);
803 if (entry->mode & SILC_CHANNEL_MODE_PRIVATE) {
805 memset(usercount, 0, sizeof(usercount));
807 topic = entry->topic;
808 users = silc_hash_table_count(entry->user_list);
809 SILC_PUT32_MSB(users, usercount);
813 silc_server_send_command_reply(cmd->server, cmd->sock, SILC_COMMAND_LIST,
815 2, idp->data, idp->len,
816 3, entry->channel_name,
817 strlen(entry->channel_name),
818 4, topic, topic ? strlen(topic) : 0,
820 silc_buffer_free(idp);
825 for (i = 0, k = 0; i < gch_count; i++) {
831 status = SILC_STATUS_LIST_ITEM;
832 if (valid_rcount > 1 && k == valid_rcount - 1)
833 status = SILC_STATUS_LIST_END;
835 idp = silc_id_payload_encode(entry->id, SILC_ID_CHANNEL);
837 if (entry->mode & SILC_CHANNEL_MODE_PRIVATE) {
839 memset(usercount, 0, sizeof(usercount));
841 topic = entry->topic;
842 users = entry->user_count;
843 SILC_PUT32_MSB(users, usercount);
847 silc_server_send_command_reply(cmd->server, cmd->sock, SILC_COMMAND_LIST,
849 2, idp->data, idp->len,
850 3, entry->channel_name,
851 strlen(entry->channel_name),
852 4, topic, topic ? strlen(topic) : 0,
854 silc_buffer_free(idp);
859 /* Server side of LIST command. This lists the channel of the requested
860 server. Secret channels are not listed. */
862 SILC_SERVER_CMD_FUNC(list)
864 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
865 SilcServer server = cmd->server;
866 SilcChannelID *channel_id = NULL;
869 SilcChannelEntry *lchannels = NULL, *gchannels = NULL;
870 SilcUInt32 lch_count = 0, gch_count = 0;
872 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_LIST, cmd, 0, 1);
874 /* If we are normal server, send the command to router, since we
875 want to know all channels in the network. */
876 if (!cmd->pending && server->server_type != SILC_ROUTER &&
877 !server->standalone) {
879 SilcUInt16 old_ident;
882 cmd->server->stat.commands_sent++;
884 old_ident = silc_command_get_ident(cmd->payload);
885 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
886 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
887 silc_server_packet_send(server, SILC_PRIMARY_ROUTE(server),
888 SILC_PACKET_COMMAND, cmd->packet->flags,
889 tmpbuf->data, tmpbuf->len, TRUE);
891 /* Reprocess this packet after received reply from router */
892 silc_server_command_pending(server, SILC_COMMAND_LIST,
893 silc_command_get_ident(cmd->payload),
894 silc_server_command_list,
895 silc_server_command_dup(cmd));
897 silc_command_set_ident(cmd->payload, old_ident);
898 silc_buffer_free(tmpbuf);
903 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
905 channel_id = silc_id_payload_parse_id(tmp, tmp_len, NULL);
907 silc_server_command_send_status_reply(cmd, SILC_COMMAND_LIST,
908 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
913 /* Get the channels from local list */
914 lchannels = silc_idlist_get_channels(server->local_list, channel_id,
917 /* Get the channels from global list */
918 gchannels = silc_idlist_get_channels(server->global_list, channel_id,
922 silc_server_command_list_send_reply(cmd, lchannels, lch_count,
923 gchannels, gch_count);
925 silc_free(lchannels);
926 silc_free(gchannels);
929 silc_server_command_free(cmd);
932 /* Server side of TOPIC command. Sets topic for channel and/or returns
933 current topic to client. */
935 SILC_SERVER_CMD_FUNC(topic)
937 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
938 SilcServer server = cmd->server;
939 SilcClientEntry client = (SilcClientEntry)cmd->sock->user_data;
940 SilcChannelID *channel_id;
941 SilcChannelEntry channel;
942 SilcChannelClientEntry chl;
945 SilcUInt32 argc, tmp_len;
946 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
948 if (cmd->sock->type != SILC_SOCKET_TYPE_CLIENT || !client)
951 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_TOPIC, cmd, 1, 2);
953 argc = silc_argument_get_arg_num(cmd->args);
956 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
958 silc_server_command_send_status_reply(cmd, SILC_COMMAND_TOPIC,
959 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
962 channel_id = silc_id_payload_parse_id(tmp, tmp_len, NULL);
964 silc_server_command_send_status_reply(cmd, SILC_COMMAND_TOPIC,
965 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
969 /* Check whether the channel exists */
970 channel = silc_idlist_find_channel_by_id(server->local_list,
973 channel = silc_idlist_find_channel_by_id(server->global_list,
976 silc_server_command_send_status_data(cmd, SILC_COMMAND_TOPIC,
977 SILC_STATUS_ERR_NO_SUCH_CHANNEL_ID,
985 tmp = silc_argument_get_arg_type(cmd->args, 2, NULL);
987 silc_server_command_send_status_reply(cmd, SILC_COMMAND_TOPIC,
988 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
993 if (strlen(tmp) > 256) {
994 silc_server_command_send_status_reply(cmd, SILC_COMMAND_TOPIC,
995 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
1000 if (!silc_utf8_valid(tmp, strlen(tmp))) {
1001 silc_server_command_send_status_reply(cmd, SILC_COMMAND_TOPIC,
1002 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
1007 /* See whether the client is on channel and has rights to change topic */
1008 if (!silc_server_client_on_channel(client, channel, &chl)) {
1009 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
1010 silc_server_command_send_status_data(cmd, SILC_COMMAND_TOPIC,
1011 SILC_STATUS_ERR_NOT_ON_CHANNEL,
1012 0, 2, tmp, tmp_len);
1016 if (channel->mode & SILC_CHANNEL_MODE_TOPIC &&
1017 !(chl->mode & SILC_CHANNEL_UMODE_CHANOP) &&
1018 !(chl->mode & SILC_CHANNEL_UMODE_CHANFO)) {
1019 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
1020 silc_server_command_send_status_data(cmd, SILC_COMMAND_TOPIC,
1021 SILC_STATUS_ERR_NO_CHANNEL_PRIV,
1022 0, 2, tmp, tmp_len);
1026 if (!channel->topic || strcmp(channel->topic, tmp)) {
1027 /* Set the topic for channel */
1028 silc_free(channel->topic);
1029 channel->topic = strdup(tmp);
1031 /* Send TOPIC_SET notify type to the network */
1032 silc_server_send_notify_topic_set(server, SILC_PRIMARY_ROUTE(server),
1033 SILC_BROADCAST(server), channel,
1034 client->id, SILC_ID_CLIENT,
1037 /* Send notify about topic change to all clients on the channel */
1038 idp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
1039 silc_server_send_notify_to_channel(server, NULL, channel, FALSE, TRUE,
1040 SILC_NOTIFY_TYPE_TOPIC_SET, 2,
1041 idp->data, idp->len,
1043 strlen(channel->topic));
1044 silc_buffer_free(idp);
1048 /* Send the topic to client as reply packet */
1049 idp = silc_id_payload_encode(channel_id, SILC_ID_CHANNEL);
1050 silc_server_send_command_reply(cmd->server, cmd->sock, SILC_COMMAND_TOPIC,
1051 SILC_STATUS_OK, 0, ident, 2,
1052 2, idp->data, idp->len,
1055 strlen(channel->topic) : 0);
1056 silc_buffer_free(idp);
1057 silc_free(channel_id);
1060 silc_server_command_free(cmd);
1063 /* Server side of INVITE command. Invites some client to join some channel.
1064 This command is also used to manage the invite list of the channel. */
1066 SILC_SERVER_CMD_FUNC(invite)
1068 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
1069 SilcServer server = cmd->server;
1070 SilcSocketConnection sock = cmd->sock, dest_sock;
1071 SilcChannelClientEntry chl;
1072 SilcClientEntry sender, dest;
1073 SilcClientID *dest_id = NULL;
1074 SilcChannelEntry channel;
1075 SilcChannelID *channel_id = NULL;
1076 SilcIDListData idata;
1077 SilcArgumentPayload args;
1078 SilcHashTableList htl;
1079 SilcBuffer list, tmp2;
1080 SilcBufferStruct alist;
1081 unsigned char *tmp, *atype = NULL;
1082 SilcUInt32 len, type, len2;
1083 SilcUInt16 argc = 0, ident = silc_command_get_ident(cmd->payload);
1085 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_INVITE, cmd, 1, 4);
1087 /* Get Channel ID */
1088 tmp = silc_argument_get_arg_type(cmd->args, 1, &len);
1090 silc_server_command_send_status_reply(cmd, SILC_COMMAND_INVITE,
1091 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
1094 channel_id = silc_id_payload_parse_id(tmp, len, NULL);
1096 silc_server_command_send_status_reply(cmd, SILC_COMMAND_INVITE,
1097 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
1101 /* Get the channel entry */
1102 channel = silc_idlist_find_channel_by_id(server->local_list,
1105 channel = silc_idlist_find_channel_by_id(server->global_list,
1108 silc_server_command_send_status_data(cmd, SILC_COMMAND_INVITE,
1109 SILC_STATUS_ERR_NO_SUCH_CHANNEL_ID,
1115 /* Check whether the sender of this command is on the channel. */
1116 sender = (SilcClientEntry)sock->user_data;
1117 if (!sender || !silc_server_client_on_channel(sender, channel, &chl)) {
1118 silc_server_command_send_status_data(cmd, SILC_COMMAND_INVITE,
1119 SILC_STATUS_ERR_NOT_ON_CHANNEL, 0,
1124 /* Check whether the channel is invite-only channel. If yes then the
1125 sender of this command must be at least channel operator. */
1126 if (channel->mode & SILC_CHANNEL_MODE_INVITE &&
1127 !(chl->mode & SILC_CHANNEL_UMODE_CHANOP) &&
1128 !(chl->mode & SILC_CHANNEL_UMODE_CHANFO)) {
1129 silc_server_command_send_status_data(cmd, SILC_COMMAND_INVITE,
1130 SILC_STATUS_ERR_NO_CHANNEL_PRIV,
1135 /* Get destination client ID */
1136 tmp = silc_argument_get_arg_type(cmd->args, 2, &len);
1140 dest_id = silc_id_payload_parse_id(tmp, len, NULL);
1142 silc_server_command_send_status_reply(cmd, SILC_COMMAND_INVITE,
1143 SILC_STATUS_ERR_NO_CLIENT_ID, 0);
1147 /* Get the client entry */
1148 dest = silc_server_query_client(server, dest_id, FALSE, &resolve);
1150 if (server->server_type != SILC_SERVER || !resolve || cmd->pending) {
1151 silc_server_command_send_status_data(
1152 cmd, SILC_COMMAND_INVITE,
1153 SILC_STATUS_ERR_NO_SUCH_CLIENT_ID, 0,
1158 /* The client info is being resolved. Reprocess this packet after
1159 receiving the reply to the query. */
1160 silc_server_command_pending(server, SILC_COMMAND_WHOIS,
1162 silc_server_command_invite,
1163 silc_server_command_dup(cmd));
1164 cmd->pending = TRUE;
1168 /* Check whether the requested client is already on the channel. */
1169 if (silc_server_client_on_channel(dest, channel, NULL)) {
1170 atype = silc_argument_get_arg_type(cmd->args, 1, &len2);
1171 silc_server_command_send_status_data2(cmd, SILC_COMMAND_INVITE,
1172 SILC_STATUS_ERR_USER_ON_CHANNEL,
1178 /* Get route to the client */
1179 dest_sock = silc_server_get_client_route(server, NULL, 0, dest_id,
1182 silc_server_command_send_status_data(cmd, SILC_COMMAND_INVITE,
1183 SILC_STATUS_ERR_NO_SUCH_CLIENT_ID,
1188 /* Add the client to the invite list */
1190 /* Allocate hash table for invite list if it doesn't exist yet */
1191 if (!channel->invite_list)
1192 channel->invite_list =
1193 silc_hash_table_alloc(0, silc_hash_ptr,
1195 silc_server_inviteban_destruct, channel, TRUE);
1197 /* Check if the ID is in the list already */
1198 silc_hash_table_list(channel->invite_list, &htl);
1199 while (silc_hash_table_get(&htl, (void *)&type, (void *)&tmp2)) {
1200 if (type == 3 && !memcmp(tmp2->data, tmp, len)) {
1205 silc_hash_table_list_reset(&htl);
1207 /* Add new Client ID to invite list */
1209 list = silc_buffer_alloc_size(len);
1210 silc_buffer_put(list, tmp, len);
1211 silc_hash_table_add(channel->invite_list, (void *)3, list);
1214 if (!(dest->mode & SILC_UMODE_BLOCK_INVITE)) {
1215 /* Send notify to the client that is invited to the channel */
1216 SilcBuffer idp, idp2;
1217 idp = silc_id_payload_encode(channel_id, SILC_ID_CHANNEL);
1218 idp2 = silc_id_payload_encode(sender->id, SILC_ID_CLIENT);
1219 silc_server_send_notify_dest(server, dest_sock, FALSE, dest_id,
1221 SILC_NOTIFY_TYPE_INVITE, 3,
1222 idp->data, idp->len,
1223 channel->channel_name,
1224 strlen(channel->channel_name),
1225 idp2->data, idp2->len);
1226 silc_buffer_free(idp);
1227 silc_buffer_free(idp2);
1231 /* Get the invite information */
1232 tmp = silc_argument_get_arg_type(cmd->args, 4, &len2);
1233 if (tmp && len2 > 2) {
1234 /* Parse the arguments to see they are constructed correctly */
1235 SILC_GET16_MSB(argc, tmp);
1236 args = silc_argument_payload_parse(tmp + 2, len2 - 2, argc);
1238 silc_server_command_send_status_reply(cmd, SILC_COMMAND_INVITE,
1239 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
1244 /* Get the type of action */
1245 atype = silc_argument_get_arg_type(cmd->args, 3, &len);
1246 if (atype && len == 1) {
1247 if (atype[0] == 0x00) {
1248 /* Allocate hash table for invite list if it doesn't exist yet */
1249 if (!channel->invite_list)
1250 channel->invite_list =
1251 silc_hash_table_alloc(0, silc_hash_ptr,
1253 silc_server_inviteban_destruct, channel,
1256 /* Check for resource limit */
1257 if (silc_hash_table_count(channel->invite_list) > 64) {
1258 silc_server_command_send_status_reply(cmd, SILC_COMMAND_INVITE,
1259 SILC_STATUS_ERR_RESOURCE_LIMIT,
1265 /* Now add or delete the information. */
1266 if (!silc_server_inviteban_process(server, channel->invite_list,
1267 (SilcUInt8)atype[0], args)) {
1268 silc_server_command_send_status_reply(
1269 cmd, SILC_COMMAND_INVITE,
1270 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
1275 silc_argument_payload_free(args);
1278 /* Encode invite list */
1280 if (channel->invite_list && silc_hash_table_count(channel->invite_list)) {
1281 list = silc_buffer_alloc_size(2);
1282 silc_buffer_format(list,
1283 SILC_STR_UI_SHORT(silc_hash_table_count(
1284 channel->invite_list)),
1286 silc_hash_table_list(channel->invite_list, &htl);
1287 while (silc_hash_table_get(&htl, (void *)&type, (void *)&tmp2))
1288 list = silc_argument_payload_encode_one(list, tmp2->data, tmp2->len,
1290 silc_hash_table_list_reset(&htl);
1293 /* The notify is sent to local servers (not clients), and to network. */
1294 if (atype && tmp && len2) {
1295 silc_buffer_set(&alist, tmp, len2);
1297 /* Send to local servers if we are router */
1298 if (server->server_type == SILC_ROUTER) {
1299 SilcBuffer idp, idp2;
1300 idp = silc_id_payload_encode(channel_id, SILC_ID_CHANNEL);
1301 idp2 = silc_id_payload_encode(sender->id, SILC_ID_CLIENT);
1302 silc_server_send_notify_to_channel(server, NULL, channel, FALSE, FALSE,
1303 SILC_NOTIFY_TYPE_INVITE, 5,
1304 idp->data, idp->len,
1305 channel->channel_name,
1306 strlen(channel->channel_name),
1307 idp2->data, idp2->len,
1309 tmp ? alist.data : NULL,
1310 tmp ? alist.len : 0);
1311 silc_buffer_free(idp);
1312 silc_buffer_free(idp2);
1315 /* Send to network */
1316 silc_server_send_notify_invite(server, SILC_PRIMARY_ROUTE(server),
1317 SILC_BROADCAST(server), channel,
1319 tmp ? &alist : NULL);
1322 /* Send invite list back only if the list was modified, or no arguments
1325 argc = silc_argument_get_arg_num(cmd->args);
1328 if (silc_argument_get_arg_type(cmd->args, 3, &len))
1331 /* Send command reply */
1332 tmp = silc_argument_get_arg_type(cmd->args, 1, &len);
1333 silc_server_send_command_reply(server, cmd->sock, SILC_COMMAND_INVITE,
1334 SILC_STATUS_OK, 0, ident, 2,
1338 type && list ? list->len : 0);
1339 silc_buffer_free(list);
1343 silc_free(channel_id);
1344 silc_server_command_free(cmd);
1348 SilcSocketConnection sock;
1352 /* Quits connection to client. This gets called if client won't
1353 close the connection even when it has issued QUIT command. */
1355 SILC_TASK_CALLBACK(silc_server_command_quit_cb)
1357 SilcServer server = app_context;
1358 QuitInternal q = (QuitInternal)context;
1360 if (q->sock->user_data) {
1361 /* Free all client specific data, such as client entry and entires
1362 on channels this client may be on. */
1363 silc_server_free_client_data(server, q->sock, q->sock->user_data,
1365 q->sock->user_data = NULL;
1368 if (!SILC_IS_DISCONNECTED(q->sock))
1369 /* Close the connection on our side */
1370 silc_server_close_connection(server, q->sock);
1372 silc_socket_free(q->sock);
1373 silc_free(q->signoff);
1377 /* Quits SILC session. This is the normal way to disconnect client. */
1379 SILC_SERVER_CMD_FUNC(quit)
1381 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
1382 SilcServer server = cmd->server;
1383 SilcSocketConnection sock = cmd->sock;
1385 unsigned char *tmp = NULL;
1388 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_QUIT, cmd, 0, 1);
1390 if (cmd->sock->type != SILC_SOCKET_TYPE_CLIENT)
1394 tmp = silc_argument_get_arg_type(cmd->args, 1, &len);
1398 q = silc_calloc(1, sizeof(*q));
1399 q->sock = silc_socket_dup(sock);
1400 q->signoff = tmp ? strdup(tmp) : NULL;
1402 /* We quit the connection with little timeout */
1403 silc_schedule_task_add(server->schedule, sock->sock,
1404 silc_server_command_quit_cb, (void *)q,
1405 0, 200000, SILC_TASK_TIMEOUT, SILC_TASK_PRI_LOW);
1408 silc_server_command_free(cmd);
1411 /* Server side of command KILL. This command is used by router operator
1412 to remove an client from the SILC Network temporarily. */
1414 SILC_SERVER_CMD_FUNC(kill)
1416 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
1417 SilcServer server = cmd->server;
1418 SilcClientEntry client = (SilcClientEntry)cmd->sock->user_data;
1419 SilcClientEntry remote_client;
1420 SilcClientID *client_id = NULL;
1421 unsigned char *tmp, *comment, *auth;
1422 SilcUInt32 tmp_len, tmp_len2, auth_len;
1424 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_KILL, cmd, 1, 3);
1426 if (cmd->sock->type != SILC_SOCKET_TYPE_CLIENT || !client)
1429 /* Get authentication payload if present */
1430 auth = silc_argument_get_arg_type(cmd->args, 3, &auth_len);
1433 /* Router operator killing */
1435 /* KILL command works only on router */
1436 if (server->server_type != SILC_ROUTER) {
1437 silc_server_command_send_status_reply(cmd, SILC_COMMAND_KILL,
1438 SILC_STATUS_ERR_NO_ROUTER_PRIV, 0);
1442 /* Check whether client has the permissions. */
1443 if (!(client->mode & SILC_UMODE_ROUTER_OPERATOR)) {
1444 silc_server_command_send_status_reply(cmd, SILC_COMMAND_KILL,
1445 SILC_STATUS_ERR_NO_ROUTER_PRIV, 0);
1450 /* Get the client ID */
1451 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
1453 silc_server_command_send_status_reply(cmd, SILC_COMMAND_KILL,
1454 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
1458 client_id = silc_id_payload_parse_id(tmp, tmp_len, NULL);
1460 silc_server_command_send_status_data(cmd, SILC_COMMAND_KILL,
1461 SILC_STATUS_ERR_NO_SUCH_CLIENT_ID,
1462 0, 2, tmp, tmp_len);
1466 /* Get the client entry */
1467 remote_client = silc_idlist_find_client_by_id(server->local_list,
1468 client_id, TRUE, NULL);
1469 if (!remote_client) {
1470 remote_client = silc_idlist_find_client_by_id(server->global_list,
1471 client_id, TRUE, NULL);
1472 if (!remote_client) {
1473 silc_server_command_send_status_data(cmd, SILC_COMMAND_KILL,
1474 SILC_STATUS_ERR_NO_SUCH_CLIENT_ID,
1475 0, 2, tmp, tmp_len);
1481 comment = silc_argument_get_arg_type(cmd->args, 2, &tmp_len2);
1482 if (comment && tmp_len2 > 128) {
1484 comment[127] = '\0';
1487 /* If authentication data is provided then verify that killing is
1489 if (auth && auth_len) {
1490 SilcSocketConnection sock;
1492 if (!SILC_IS_LOCAL(remote_client) || !remote_client->data.public_key) {
1493 silc_server_command_send_status_reply(cmd, SILC_COMMAND_KILL,
1494 SILC_STATUS_ERR_OPERATION_ALLOWED,
1499 /* Verify the signature */
1500 if (!silc_auth_verify_data(auth, auth_len, SILC_AUTH_PUBLIC_KEY,
1501 remote_client->data.public_key, 0,
1502 server->sha1hash, remote_client->id,
1504 silc_server_command_send_status_reply(cmd, SILC_COMMAND_KILL,
1505 SILC_STATUS_ERR_AUTH_FAILED, 0);
1509 /* Send reply to the sender */
1510 silc_server_command_send_status_data(cmd, SILC_COMMAND_KILL,
1514 /* Do normal signoff for the destination client */
1515 sock = remote_client->connection;
1516 silc_server_remove_from_channels(server, NULL, remote_client,
1517 TRUE, (char *)"Killed", TRUE, TRUE);
1518 silc_server_free_client_data(server, NULL, remote_client, TRUE,
1520 (unsigned char *)"Killed");
1522 silc_server_close_connection(server, sock);
1524 /* Router operator killing */
1526 /* Send reply to the sender */
1527 silc_server_command_send_status_data(cmd, SILC_COMMAND_KILL,
1531 /* Check if anyone is watching this nickname */
1532 if (server->server_type == SILC_ROUTER)
1533 silc_server_check_watcher_list(server, client, NULL,
1534 SILC_NOTIFY_TYPE_KILLED);
1536 /* Now do the killing */
1537 silc_server_kill_client(server, remote_client, comment, client->id,
1542 silc_free(client_id);
1543 silc_server_command_free(cmd);
1546 /* Server side of command INFO. This sends information about us to
1547 the client. If client requested specific server we will send the
1548 command to that server. */
1550 SILC_SERVER_CMD_FUNC(info)
1552 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
1553 SilcServer server = cmd->server;
1557 char *dest_server = NULL, *server_info = NULL, *server_name;
1558 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
1559 SilcServerEntry entry = NULL;
1560 SilcServerID *server_id = NULL;
1562 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_INFO, cmd, 0, 2);
1564 /* Get server name */
1565 dest_server = silc_argument_get_arg_type(cmd->args, 1, NULL);
1567 /* Check server name. */
1568 dest_server = silc_identifier_check(dest_server, strlen(dest_server),
1569 SILC_STRING_UTF8, 256, &tmp_len);
1571 silc_server_command_send_status_reply(cmd, SILC_COMMAND_INFO,
1572 SILC_STATUS_ERR_BAD_SERVER, 0);
1578 tmp = silc_argument_get_arg_type(cmd->args, 2, &tmp_len);
1580 server_id = silc_id_payload_parse_id(tmp, tmp_len, NULL);
1582 silc_server_command_send_status_reply(cmd, SILC_COMMAND_INFO,
1583 SILC_STATUS_ERR_NO_SERVER_ID, 0);
1589 /* Check whether we have this server cached */
1590 entry = silc_idlist_find_server_by_id(server->local_list,
1591 server_id, TRUE, NULL);
1593 entry = silc_idlist_find_server_by_id(server->global_list,
1594 server_id, TRUE, NULL);
1595 if (!entry && server->server_type != SILC_SERVER) {
1596 silc_server_command_send_status_data(cmd, SILC_COMMAND_INFO,
1597 SILC_STATUS_ERR_NO_SUCH_SERVER_ID,
1598 0, 2, tmp, tmp_len);
1604 /* Some buggy servers has sent request to router about themselves. */
1605 if (server->server_type != SILC_SERVER && cmd->sock->user_data == entry)
1608 if ((!dest_server && !server_id && !entry) || (entry &&
1609 entry == server->id_entry) ||
1610 (dest_server && !cmd->pending &&
1611 !memcmp(dest_server, server->server_name, strlen(dest_server)))) {
1612 /* Send our reply */
1613 char info_string[256];
1615 memset(info_string, 0, sizeof(info_string));
1616 snprintf(info_string, sizeof(info_string),
1617 "location: %s server: %s admin: %s <%s>",
1618 server->config->server_info->location,
1619 server->config->server_info->server_type,
1620 server->config->server_info->admin,
1621 server->config->server_info->email);
1623 server_info = info_string;
1624 entry = server->id_entry;
1626 /* Check whether we have this server cached */
1627 if (!entry && dest_server) {
1628 entry = silc_idlist_find_server_by_name(server->global_list,
1629 dest_server, TRUE, NULL);
1631 entry = silc_idlist_find_server_by_name(server->local_list,
1632 dest_server, TRUE, NULL);
1636 if (!cmd->pending &&
1637 server->server_type != SILC_SERVER && entry && !entry->server_info) {
1638 /* Send to the server */
1640 SilcUInt16 old_ident;
1643 cmd->server->stat.commands_sent++;
1645 old_ident = silc_command_get_ident(cmd->payload);
1646 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
1647 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
1649 silc_server_packet_send(server, entry->connection,
1650 SILC_PACKET_COMMAND, cmd->packet->flags,
1651 tmpbuf->data, tmpbuf->len, TRUE);
1653 /* Reprocess this packet after received reply from router */
1654 silc_server_command_pending(server, SILC_COMMAND_INFO,
1655 silc_command_get_ident(cmd->payload),
1656 silc_server_command_info,
1657 silc_server_command_dup(cmd));
1658 cmd->pending = TRUE;
1659 silc_command_set_ident(cmd->payload, old_ident);
1660 silc_buffer_free(tmpbuf);
1664 if (!entry && !cmd->pending && !server->standalone) {
1665 /* Send to the primary router */
1667 SilcUInt16 old_ident;
1670 cmd->server->stat.commands_sent++;
1672 old_ident = silc_command_get_ident(cmd->payload);
1673 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
1674 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
1676 silc_server_packet_send(server, SILC_PRIMARY_ROUTE(server),
1677 SILC_PACKET_COMMAND, cmd->packet->flags,
1678 tmpbuf->data, tmpbuf->len, TRUE);
1680 /* Reprocess this packet after received reply from router */
1681 silc_server_command_pending(server, SILC_COMMAND_INFO,
1682 silc_command_get_ident(cmd->payload),
1683 silc_server_command_info,
1684 silc_server_command_dup(cmd));
1685 cmd->pending = TRUE;
1686 silc_command_set_ident(cmd->payload, old_ident);
1687 silc_buffer_free(tmpbuf);
1692 silc_free(server_id);
1696 silc_free(dest_server);
1697 dest_server = silc_argument_get_arg_type(cmd->args, 1, NULL);
1698 silc_server_command_send_status_data(cmd, SILC_COMMAND_INFO,
1699 SILC_STATUS_ERR_NO_SUCH_SERVER, 0,
1701 strlen(dest_server));
1707 idp = silc_id_payload_encode(entry->id, SILC_ID_SERVER);
1709 server_info = entry->server_info;
1710 server_name = entry->server_name;
1712 /* Send the reply */
1713 silc_server_send_command_reply(server, cmd->sock, SILC_COMMAND_INFO,
1714 SILC_STATUS_OK, 0, ident, 3,
1715 2, idp->data, idp->len,
1717 strlen(server_name),
1720 strlen(server_info) : 0);
1721 silc_buffer_free(idp);
1724 silc_free(dest_server);
1725 silc_server_command_free(cmd);
1728 /* Server side of command PING. This just replies to the ping. */
1730 SILC_SERVER_CMD_FUNC(ping)
1732 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
1733 SilcServer server = cmd->server;
1736 SilcServerID *server_id = NULL;
1738 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_PING, cmd, 1, 1);
1741 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
1743 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PING,
1744 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
1748 server_id = silc_id_payload_parse_id(tmp, tmp_len, NULL);
1752 if (SILC_ID_SERVER_COMPARE(server_id, server->id)) {
1753 /* Send our reply */
1754 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PING,
1757 silc_server_command_send_status_data(cmd, SILC_COMMAND_PING,
1758 SILC_STATUS_ERR_NO_SUCH_SERVER_ID, 0,
1764 silc_free(server_id);
1765 silc_server_command_free(cmd);
1768 /* Server side of command STATS. */
1770 SILC_SERVER_CMD_FUNC(stats)
1772 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
1773 SilcServer server = cmd->server;
1774 SilcServerID *server_id;
1777 SilcBuffer packet, stats;
1778 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
1781 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_STATS, cmd, 1, 1);
1784 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
1786 silc_server_command_send_status_reply(cmd, SILC_COMMAND_STATS,
1787 SILC_STATUS_ERR_NO_SERVER_ID, 0);
1790 server_id = silc_id_payload_parse_id(tmp, tmp_len, NULL);
1794 /* The ID must be ours */
1795 if (!SILC_ID_SERVER_COMPARE(server->id, server_id)) {
1796 silc_server_command_send_status_data(cmd, SILC_COMMAND_STATS,
1797 SILC_STATUS_ERR_NO_SUCH_SERVER_ID, 0,
1799 silc_free(server_id);
1802 silc_free(server_id);
1804 /* If we are router then just send everything we got. If we are normal
1805 server then we'll send this to our router to get all the latest
1806 statistical information. */
1807 if (!cmd->pending && server->server_type != SILC_ROUTER &&
1808 !server->standalone) {
1810 cmd->server->stat.commands_sent++;
1812 /* Send request to our router */
1813 SilcBuffer idp = silc_id_payload_encode(server->router->id,
1815 packet = silc_command_payload_encode_va(SILC_COMMAND_STATS,
1816 ++server->cmd_ident, 1,
1817 1, idp->data, idp->len);
1818 silc_server_packet_send(server, SILC_PRIMARY_ROUTE(server),
1819 SILC_PACKET_COMMAND, 0, packet->data,
1820 packet->len, FALSE);
1822 /* Reprocess this packet after received reply from router */
1823 silc_server_command_pending(server, SILC_COMMAND_STATS,
1825 silc_server_command_stats,
1826 silc_server_command_dup(cmd));
1827 cmd->pending = TRUE;
1828 silc_buffer_free(packet);
1829 silc_buffer_free(idp);
1833 /* Send our reply to sender */
1834 uptime = time(NULL) - server->starttime;
1836 stats = silc_buffer_alloc_size(60);
1837 silc_buffer_format(stats,
1838 SILC_STR_UI_INT(server->starttime),
1839 SILC_STR_UI_INT(uptime),
1840 SILC_STR_UI_INT(server->stat.my_clients),
1841 SILC_STR_UI_INT(server->stat.my_channels),
1842 SILC_STR_UI_INT(server->stat.my_server_ops),
1843 SILC_STR_UI_INT(server->stat.my_router_ops),
1844 SILC_STR_UI_INT(server->stat.cell_clients),
1845 SILC_STR_UI_INT(server->stat.cell_channels),
1846 SILC_STR_UI_INT(server->stat.cell_servers),
1847 SILC_STR_UI_INT(server->stat.clients),
1848 SILC_STR_UI_INT(server->stat.channels),
1849 SILC_STR_UI_INT(server->stat.servers),
1850 SILC_STR_UI_INT(server->stat.routers),
1851 SILC_STR_UI_INT(server->stat.server_ops),
1852 SILC_STR_UI_INT(server->stat.router_ops),
1855 silc_server_send_command_reply(server, cmd->sock, SILC_COMMAND_STATS,
1856 SILC_STATUS_OK, 0, ident, 2,
1858 3, stats->data, stats->len);
1859 silc_buffer_free(stats);
1862 silc_server_command_free(cmd);
1865 /* Internal routine to join channel. The channel sent to this function
1866 has been either created or resolved from ID lists. This joins the sent
1867 client to the channel. */
1869 static void silc_server_command_join_channel(SilcServer server,
1870 SilcServerCommandContext cmd,
1871 SilcChannelEntry channel,
1872 SilcClientID *client_id,
1876 const unsigned char *auth,
1877 SilcUInt32 auth_len,
1878 const unsigned char *cauth,
1879 SilcUInt32 cauth_len)
1881 SilcSocketConnection sock = cmd->sock;
1883 SilcUInt32 tmp_len, user_count;
1884 unsigned char *passphrase = NULL, mode[4], tmp2[4], tmp3[4], ulimit[4];
1885 SilcClientEntry client;
1886 SilcChannelClientEntry chl;
1887 SilcBuffer reply, chidp, clidp, keyp = NULL;
1888 SilcBuffer user_list, mode_list, invite_list, ban_list;
1889 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
1890 char check[512], check2[512];
1891 bool founder = FALSE;
1893 SilcBuffer fkey = NULL, chpklist = NULL;
1896 SILC_LOG_DEBUG(("Joining client to channel"));
1901 /* Get the client entry */
1902 if (cmd->sock->type == SILC_SOCKET_TYPE_CLIENT) {
1903 client = (SilcClientEntry)sock->user_data;
1907 client = silc_server_query_client(server, client_id, FALSE,
1910 if (!resolve || cmd->pending) {
1911 tmp = silc_argument_get_arg_type(cmd->args, 2, &tmp_len);
1912 silc_server_command_send_status_data(
1913 cmd, SILC_COMMAND_JOIN,
1914 SILC_STATUS_ERR_NO_SUCH_CLIENT_ID, 0,
1919 /* The client info is being resolved. Reprocess this packet after
1920 receiving the reply to the query. */
1921 silc_server_command_pending(server, SILC_COMMAND_WHOIS,
1923 silc_server_command_join,
1924 silc_server_command_dup(cmd));
1925 cmd->pending = TRUE;
1929 if (!client->data.public_key &&
1930 (auth || cauth || channel->ban_list ||
1931 (channel->mode & SILC_CHANNEL_MODE_INVITE))) {
1932 if (cmd->pending == 2)
1935 /* We must retrieve the client's public key by sending
1936 GETKEY command. Reprocess this packet after receiving the key */
1937 clidp = silc_id_payload_encode(client_id, SILC_ID_CLIENT);
1938 silc_server_send_command(server, cmd->sock,
1939 SILC_COMMAND_GETKEY, ++server->cmd_ident,
1940 1, 1, clidp->data, clidp->len);
1941 silc_buffer_free(clidp);
1942 silc_server_command_pending(server, SILC_COMMAND_GETKEY,
1944 silc_server_command_join,
1945 silc_server_command_dup(cmd));
1950 cmd->pending = FALSE;
1954 * Check founder auth payload if provided. If client can gain founder
1955 * privileges it can override various conditions on joining the channel,
1956 * and can have directly the founder mode set on the channel.
1958 if (auth && auth_len && channel->mode & SILC_CHANNEL_MODE_FOUNDER_AUTH) {
1959 SilcIDListData idata = (SilcIDListData)client;
1960 SilcChannelClientEntry chl2;
1961 SilcHashTableList htl;
1963 if (channel->founder_key && idata->public_key &&
1964 silc_pkcs_public_key_compare(channel->founder_key,
1965 idata->public_key)) {
1966 /* Check whether the client is to become founder */
1967 if (silc_auth_verify_data(auth, auth_len, SILC_AUTH_PUBLIC_KEY,
1968 channel->founder_key, 0, server->sha1hash,
1969 client->id, SILC_ID_CLIENT)) {
1971 /* There cannot be anyone else as founder on the channel now. This
1972 client is definitely the founder due to this authentication */
1973 silc_hash_table_list(channel->user_list, &htl);
1974 while (silc_hash_table_get(&htl, NULL, (void *)&chl2))
1975 if (chl2->mode & SILC_CHANNEL_UMODE_CHANFO) {
1976 chl2->mode &= ~SILC_CHANNEL_UMODE_CHANFO;
1977 silc_server_force_cumode_change(server, NULL, channel, chl2,
1981 silc_hash_table_list_reset(&htl);
1983 umode = (SILC_CHANNEL_UMODE_CHANOP | SILC_CHANNEL_UMODE_CHANFO);
1990 * Check channel modes
1994 memset(check, 0, sizeof(check));
1995 memset(check2, 0, sizeof(check2));
1996 silc_strncat(check, sizeof(check),
1997 client->nickname, strlen(client->nickname));
1998 silc_strncat(check, sizeof(check), "!", 1);
1999 silc_strncat(check, sizeof(check),
2000 client->username, strlen(client->username));
2001 if (!strchr(client->username, '@')) {
2002 silc_strncat(check, sizeof(check), "@", 1);
2003 silc_strncat(check, sizeof(check),
2004 cmd->sock->hostname, strlen(cmd->sock->hostname));
2007 silc_strncat(check2, sizeof(check2),
2008 client->nickname, strlen(client->nickname));
2009 if (!strchr(client->nickname, '@')) {
2010 silc_strncat(check2, sizeof(check2), "@", 1);
2011 silc_strncat(check2, sizeof(check2),
2012 SILC_IS_LOCAL(client) ? server->server_name :
2013 client->router->server_name,
2014 SILC_IS_LOCAL(client) ? strlen(server->server_name) :
2015 strlen(client->router->server_name));
2017 silc_strncat(check2, sizeof(check2), "!", 1);
2018 silc_strncat(check2, sizeof(check2),
2019 client->username, strlen(client->username));
2020 if (!strchr(client->username, '@')) {
2021 silc_strncat(check2, sizeof(check2), "@", 1);
2022 silc_strncat(check2, sizeof(check2),
2023 cmd->sock->hostname, strlen(cmd->sock->hostname));
2026 /* Check invite list if channel is invite-only channel */
2027 if (channel->mode & SILC_CHANNEL_MODE_INVITE) {
2028 if (!channel->invite_list ||
2029 !silc_hash_table_count(channel->invite_list) ||
2030 (!silc_server_inviteban_match(server, channel->invite_list,
2032 !silc_server_inviteban_match(server, channel->invite_list,
2033 2, client->data.public_key) &&
2034 !silc_server_inviteban_match(server, channel->invite_list,
2035 1, client->nickname) &&
2036 !silc_server_inviteban_match(server, channel->invite_list,
2038 !silc_server_inviteban_match(server, channel->invite_list,
2040 chidp = silc_id_payload_encode(channel->id, SILC_ID_CHANNEL);
2041 silc_server_command_send_status_data(cmd, SILC_COMMAND_JOIN,
2042 SILC_STATUS_ERR_NOT_INVITED, 0,
2043 2, chidp->data, chidp->len);
2044 silc_buffer_free(chidp);
2049 /* Check ban list if it exists. If the client's nickname, server,
2050 username and/or hostname is in the ban list the access to the
2051 channel is denied. */
2052 if (channel->ban_list && silc_hash_table_count(channel->ban_list)) {
2053 if (silc_server_inviteban_match(server, channel->ban_list,
2055 silc_server_inviteban_match(server, channel->ban_list,
2056 2, client->data.public_key) ||
2057 silc_server_inviteban_match(server, channel->ban_list,
2058 1, client->nickname) ||
2059 silc_server_inviteban_match(server, channel->ban_list,
2061 silc_server_inviteban_match(server, channel->ban_list,
2063 chidp = silc_id_payload_encode(channel->id, SILC_ID_CHANNEL);
2064 silc_server_command_send_status_data(
2065 cmd, SILC_COMMAND_JOIN,
2066 SILC_STATUS_ERR_BANNED_FROM_CHANNEL, 0,
2067 2, chidp->data, chidp->len);
2068 silc_buffer_free(chidp);
2073 /* Check user count limit if set. */
2074 if (channel->mode & SILC_CHANNEL_MODE_ULIMIT) {
2075 if (silc_hash_table_count(channel->user_list) + 1 >
2076 channel->user_limit) {
2077 chidp = silc_id_payload_encode(channel->id, SILC_ID_CHANNEL);
2078 silc_server_command_send_status_data(cmd, SILC_COMMAND_JOIN,
2079 SILC_STATUS_ERR_CHANNEL_IS_FULL,
2080 0, 2, chidp->data, chidp->len);
2081 silc_buffer_free(chidp);
2087 /* Check the channel passphrase if set. */
2088 if (channel->mode & SILC_CHANNEL_MODE_PASSPHRASE) {
2089 /* Get passphrase */
2090 tmp = silc_argument_get_arg_type(cmd->args, 3, &tmp_len);
2092 passphrase = silc_memdup(tmp, tmp_len);
2094 if (!passphrase || !channel->passphrase ||
2095 strlen(channel->passphrase) != strlen(passphrase) ||
2096 memcmp(passphrase, channel->passphrase, strlen(channel->passphrase))) {
2097 chidp = silc_id_payload_encode(channel->id, SILC_ID_CHANNEL);
2098 silc_server_command_send_status_data(cmd, SILC_COMMAND_JOIN,
2099 SILC_STATUS_ERR_BAD_PASSWORD, 0,
2100 2, chidp->data, chidp->len);
2101 silc_buffer_free(chidp);
2106 /* Verify channel authentication with channel public keys if set. */
2107 if (channel->mode & SILC_CHANNEL_MODE_CHANNEL_AUTH) {
2108 if (!silc_server_verify_channel_auth(server, channel, client->id,
2109 cauth, cauth_len)) {
2110 silc_server_command_send_status_reply(cmd, SILC_COMMAND_JOIN,
2111 SILC_STATUS_ERR_PERM_DENIED, 0);
2117 * Client is allowed to join to the channel. Make it happen.
2120 /* Check whether the client already is on the channel */
2121 if (silc_server_client_on_channel(client, channel, NULL)) {
2122 clidp = silc_id_payload_encode(client_id, SILC_ID_CLIENT);
2123 chidp = silc_id_payload_encode(channel->id, SILC_ID_CHANNEL);
2124 silc_server_command_send_status_data2(cmd, SILC_COMMAND_JOIN,
2125 SILC_STATUS_ERR_USER_ON_CHANNEL, 0,
2126 2, clidp->data, clidp->len,
2127 3, chidp->data, chidp->len);
2128 silc_buffer_free(clidp);
2129 silc_buffer_free(chidp);
2133 /* Generate new channel key as protocol dictates */
2135 if (!silc_server_create_channel_key(server, channel, 0))
2138 /* Send the channel key. This is broadcasted to the channel but is not
2139 sent to the client who is joining to the channel. */
2140 if (!(channel->mode & SILC_CHANNEL_MODE_PRIVKEY))
2141 silc_server_send_channel_key(server, NULL, channel,
2142 server->server_type == SILC_ROUTER ?
2143 FALSE : !server->standalone);
2146 /* Join the client to the channel by adding it to channel's user list.
2147 Add also the channel to client entry's channels list for fast cross-
2149 chl = silc_calloc(1, sizeof(*chl));
2151 chl->client = client;
2152 chl->channel = channel;
2153 silc_hash_table_add(channel->user_list, client, chl);
2154 silc_hash_table_add(client->channels, channel, chl);
2155 channel->user_count++;
2156 channel->disabled = FALSE;
2158 /* Get users on the channel */
2159 silc_server_get_users_on_channel(server, channel, &user_list, &mode_list,
2162 /* Encode Client ID Payload of the original client who wants to join */
2163 clidp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
2165 /* Encode command reply packet */
2166 chidp = silc_id_payload_encode(channel->id, SILC_ID_CHANNEL);
2167 SILC_PUT32_MSB(channel->mode, mode);
2168 SILC_PUT32_MSB(created, tmp2);
2169 SILC_PUT32_MSB(user_count, tmp3);
2170 if (channel->mode & SILC_CHANNEL_MODE_ULIMIT)
2171 SILC_PUT32_MSB(channel->user_limit, ulimit);
2173 if (!(channel->mode & SILC_CHANNEL_MODE_PRIVKEY)) {
2174 tmp = silc_id_id2str(channel->id, SILC_ID_CHANNEL);
2175 cipher = silc_cipher_get_name(channel->channel_key);
2176 keyp = silc_channel_key_payload_encode(silc_id_get_len(channel->id,
2179 strlen(cipher), cipher,
2180 channel->key_len / 8, channel->key);
2184 if (channel->founder_key)
2185 fkey = silc_pkcs_public_key_payload_encode(channel->founder_key);
2187 /* Encode invite list */
2189 if (channel->invite_list && silc_hash_table_count(channel->invite_list)) {
2190 SilcHashTableList htl;
2192 invite_list = silc_buffer_alloc_size(2);
2193 silc_buffer_format(invite_list,
2194 SILC_STR_UI_SHORT(silc_hash_table_count(
2195 channel->invite_list)),
2198 silc_hash_table_list(channel->invite_list, &htl);
2199 while (silc_hash_table_get(&htl, (void *)&tmp_len, (void *)&reply))
2200 invite_list = silc_argument_payload_encode_one(invite_list,
2202 reply->len, tmp_len);
2203 silc_hash_table_list_reset(&htl);
2206 /* Encode ban list */
2208 if (channel->ban_list && silc_hash_table_count(channel->ban_list)) {
2209 SilcHashTableList htl;
2211 ban_list = silc_buffer_alloc_size(2);
2212 silc_buffer_format(ban_list,
2213 SILC_STR_UI_SHORT(silc_hash_table_count(
2214 channel->ban_list)),
2217 silc_hash_table_list(channel->ban_list, &htl);
2218 while (silc_hash_table_get(&htl, (void *)&tmp_len, (void *)&reply))
2219 ban_list = silc_argument_payload_encode_one(ban_list,
2221 reply->len, tmp_len);
2222 silc_hash_table_list_reset(&htl);
2225 if (channel->channel_pubkeys)
2226 chpklist = silc_server_get_channel_pk_list(server, channel, FALSE, FALSE);
2229 silc_command_reply_payload_encode_va(SILC_COMMAND_JOIN,
2230 SILC_STATUS_OK, 0, ident, 16,
2231 2, channel->channel_name,
2232 strlen(channel->channel_name),
2233 3, chidp->data, chidp->len,
2234 4, clidp->data, clidp->len,
2237 7, keyp ? keyp->data : NULL,
2238 keyp ? keyp->len : 0,
2239 8, ban_list ? ban_list->data : NULL,
2240 ban_list ? ban_list->len : 0,
2241 9, invite_list ? invite_list->data :
2243 invite_list ? invite_list->len : 0,
2246 strlen(channel->topic) : 0,
2247 11, silc_hmac_get_name(channel->hmac),
2248 strlen(silc_hmac_get_name(channel->
2251 13, user_list->data, user_list->len,
2252 14, mode_list->data,
2254 15, fkey ? fkey->data : NULL,
2255 fkey ? fkey->len : 0,
2256 16, chpklist ? chpklist->data : NULL,
2257 chpklist ? chpklist->len : 0,
2258 17, (channel->mode &
2259 SILC_CHANNEL_MODE_ULIMIT ?
2262 SILC_CHANNEL_MODE_ULIMIT ?
2263 sizeof(ulimit) : 0));
2265 /* Send command reply */
2266 silc_server_packet_send(server, sock, SILC_PACKET_COMMAND_REPLY, 0,
2267 reply->data, reply->len, FALSE);
2270 cmd->server->stat.commands_sent++;
2272 /* Send JOIN notify to locally connected clients on the channel. If
2273 we are normal server then router will send or have sent JOIN notify
2274 already. However since we've added the client already to our channel
2275 we'll ignore it (in packet_receive.c) so we must send it here. If
2276 we are router then this will send it to local clients and local
2278 SILC_LOG_DEBUG(("Send JOIN notify to channel"));
2279 silc_server_send_notify_to_channel(server, NULL, channel, FALSE, TRUE,
2280 SILC_NOTIFY_TYPE_JOIN, 2,
2281 clidp->data, clidp->len,
2282 chidp->data, chidp->len);
2284 /* Update statistics */
2285 server->stat.my_chanclients++;
2286 if (server->server_type == SILC_ROUTER) {
2287 server->stat.cell_chanclients++;
2288 server->stat.chanclients++;
2291 if (!cmd->pending) {
2292 /* Send JOIN notify packet to our primary router */
2293 silc_server_send_notify_join(server, SILC_PRIMARY_ROUTE(server),
2294 SILC_BROADCAST(server), channel, client->id);
2297 /* Distribute the channel key to all backup routers. */
2298 silc_server_backup_send(server, NULL, SILC_PACKET_CHANNEL_KEY, 0,
2299 keyp->data, keyp->len, FALSE, TRUE);
2301 /* If client became founder by providing correct founder auth data
2302 notify the mode change to the channel. */
2304 SILC_PUT32_MSB(chl->mode, mode);
2305 SILC_LOG_DEBUG(("Send CUMODE_CHANGE notify to channel"));
2306 silc_server_send_notify_to_channel(server, NULL, channel, FALSE, TRUE,
2307 SILC_NOTIFY_TYPE_CUMODE_CHANGE, 4,
2308 clidp->data, clidp->len,
2309 mode, 4, clidp->data, clidp->len,
2310 fkey ? fkey->data : NULL,
2311 fkey ? fkey->len : 0);
2315 /* Set CUMODE notify type to network */
2317 silc_server_send_notify_cumode(server, SILC_PRIMARY_ROUTE(server),
2318 SILC_BROADCAST(server), channel,
2319 chl->mode, client->id, SILC_ID_CLIENT,
2320 client->id, channel->founder_key);
2322 silc_buffer_free(reply);
2323 silc_buffer_free(clidp);
2324 silc_buffer_free(chidp);
2325 silc_buffer_free(keyp);
2326 silc_buffer_free(user_list);
2327 silc_buffer_free(mode_list);
2328 silc_buffer_free(fkey);
2329 silc_buffer_free(chpklist);
2330 silc_buffer_free(invite_list);
2331 silc_buffer_free(ban_list);
2335 memset(passphrase, 0, strlen(passphrase));
2336 silc_free(passphrase);
2339 /* Server side of command JOIN. Joins client into requested channel. If
2340 the channel does not exist it will be created. */
2342 SILC_SERVER_CMD_FUNC(join)
2344 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
2345 SilcServer server = cmd->server;
2346 unsigned char *auth, *cauth;
2347 SilcUInt32 tmp_len, auth_len, cauth_len;
2348 char *tmp, *channel_name, *channel_namec = NULL, *cipher, *hmac;
2349 SilcChannelEntry channel;
2350 SilcUInt32 umode = 0;
2351 bool created = FALSE, create_key = TRUE;
2352 SilcClientID *client_id;
2354 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_JOIN, cmd, 2, 7);
2356 /* Get channel name */
2357 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
2359 silc_server_command_send_status_reply(cmd, SILC_COMMAND_JOIN,
2360 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
2365 /* Truncate over long channel names */
2366 if (tmp_len > 256) {
2372 /* Check for valid channel name. This is cached, the original is saved
2373 in the channel context. */
2374 channel_namec = silc_channel_name_check(tmp, tmp_len, SILC_STRING_UTF8, 256,
2376 if (!channel_namec) {
2377 silc_server_command_send_status_reply(cmd, SILC_COMMAND_JOIN,
2378 SILC_STATUS_ERR_BAD_CHANNEL, 0);
2382 /* Get Client ID of the client who is joining to the channel */
2383 tmp = silc_argument_get_arg_type(cmd->args, 2, &tmp_len);
2385 silc_server_command_send_status_reply(cmd, SILC_COMMAND_JOIN,
2386 SILC_STATUS_ERR_NO_CLIENT_ID,
2390 client_id = silc_id_payload_parse_id(tmp, tmp_len, NULL);
2392 silc_server_command_send_status_data(cmd, SILC_COMMAND_JOIN,
2393 SILC_STATUS_ERR_BAD_CLIENT_ID, 0,
2398 /* Get cipher, hmac name and auth payload */
2399 cipher = silc_argument_get_arg_type(cmd->args, 4, NULL);
2400 hmac = silc_argument_get_arg_type(cmd->args, 5, NULL);
2401 auth = silc_argument_get_arg_type(cmd->args, 6, &auth_len);
2402 cauth = silc_argument_get_arg_type(cmd->args, 7, &cauth_len);
2404 /* See if the channel exists */
2405 channel = silc_idlist_find_channel_by_name(server->local_list,
2406 channel_namec, NULL);
2408 if (cmd->sock->type == SILC_SOCKET_TYPE_CLIENT) {
2409 SilcClientEntry entry = (SilcClientEntry)cmd->sock->user_data;
2411 silc_server_command_send_status_reply(cmd, SILC_COMMAND_JOIN,
2412 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
2417 silc_free(client_id);
2418 client_id = silc_id_dup(entry->id, SILC_ID_CLIENT);
2421 (channel->disabled && server->server_type != SILC_ROUTER)) {
2422 /* Channel not found or not valid */
2424 /* If we are standalone server we don't have a router, we just create
2425 the channel by ourselves (unless it existed). */
2426 if (server->standalone) {
2428 channel = silc_server_create_new_channel(server, server->id, cipher,
2429 hmac, channel_name, TRUE);
2431 silc_server_command_send_status_data(
2432 cmd, SILC_COMMAND_JOIN,
2433 SILC_STATUS_ERR_UNKNOWN_ALGORITHM,
2434 0, 2, cipher, strlen(cipher));
2435 silc_free(client_id);
2439 umode = (SILC_CHANNEL_UMODE_CHANOP | SILC_CHANNEL_UMODE_CHANFO);
2445 /* The channel does not exist on our server. If we are normal server
2446 we will send JOIN command to our router which will handle the
2447 joining procedure (either creates the channel if it doesn't exist
2448 or joins the client to it). */
2449 if (server->server_type != SILC_ROUTER) {
2451 SilcUInt16 old_ident;
2453 /* If this is pending command callback then we've resolved
2454 it and it didn't work, return since we've notified the
2455 client already in the command reply callback. */
2457 silc_free(client_id);
2462 cmd->server->stat.commands_sent++;
2464 old_ident = silc_command_get_ident(cmd->payload);
2465 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
2466 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
2468 /* Send JOIN command to our router */
2469 silc_server_packet_send(server, (SilcSocketConnection)
2470 SILC_PRIMARY_ROUTE(server),
2471 SILC_PACKET_COMMAND, cmd->packet->flags,
2472 tmpbuf->data, tmpbuf->len, TRUE);
2474 /* Reprocess this packet after received reply from router */
2475 silc_server_command_pending(server, SILC_COMMAND_JOIN,
2476 silc_command_get_ident(cmd->payload),
2477 silc_server_command_join,
2478 silc_server_command_dup(cmd));
2479 cmd->pending = TRUE;
2480 silc_command_set_ident(cmd->payload, old_ident);
2481 silc_buffer_free(tmpbuf);
2482 silc_free(client_id);
2486 /* We are router and the channel does not seem exist so we will check
2487 our global list as well for the channel. */
2488 channel = silc_idlist_find_channel_by_name(server->global_list,
2489 channel_namec, NULL);
2491 /* Channel really does not exist, create it */
2492 channel = silc_server_create_new_channel(server, server->id, cipher,
2493 hmac, channel_name, TRUE);
2495 silc_server_command_send_status_data(
2496 cmd, SILC_COMMAND_JOIN,
2497 SILC_STATUS_ERR_UNKNOWN_ALGORITHM, 0,
2498 2, cipher, strlen(cipher));
2499 silc_free(client_id);
2503 umode = (SILC_CHANNEL_UMODE_CHANOP | SILC_CHANNEL_UMODE_CHANFO);
2511 /* Channel not found */
2513 /* If the command came from router and we are normal server then
2514 something went wrong with the joining as the channel was not found.
2515 We can't do anything else but ignore this. */
2516 if (cmd->sock->type == SILC_SOCKET_TYPE_ROUTER ||
2517 server->server_type != SILC_ROUTER) {
2518 silc_free(client_id);
2522 /* We are router and the channel does not seem exist so we will check
2523 our global list as well for the channel. */
2524 channel = silc_idlist_find_channel_by_name(server->global_list,
2525 channel_namec, NULL);
2527 /* Channel really does not exist, create it */
2528 channel = silc_server_create_new_channel(server, server->id, cipher,
2529 hmac, channel_name, TRUE);
2531 silc_server_command_send_status_data(
2532 cmd, SILC_COMMAND_JOIN,
2533 SILC_STATUS_ERR_UNKNOWN_ALGORITHM, 0,
2534 2, cipher, strlen(cipher));
2535 silc_free(client_id);
2539 umode = (SILC_CHANNEL_UMODE_CHANOP | SILC_CHANNEL_UMODE_CHANFO);
2546 /* Check whether the channel was created by our router */
2547 if (cmd->pending && context2) {
2548 SilcServerCommandReplyContext reply = context2;
2550 if (silc_command_get(reply->payload) == SILC_COMMAND_JOIN) {
2551 tmp = silc_argument_get_arg_type(reply->args, 6, NULL);
2552 SILC_GET32_MSB(created, tmp);
2553 if (silc_argument_get_arg_type(reply->args, 7, NULL))
2554 create_key = FALSE; /* Router returned the key already */
2556 if (silc_command_get_status(reply->payload, NULL, NULL) &&
2557 channel->mode & SILC_CHANNEL_MODE_PASSPHRASE) {
2558 /* Save channel passphrase, if user provided it successfully */
2561 pa = silc_argument_get_arg_type(cmd->args, 3, &pa_len);
2563 silc_free(channel->passphrase);
2564 channel->passphrase = silc_memdup(pa, pa_len);
2569 if (silc_command_get(reply->payload) == SILC_COMMAND_WHOIS &&
2570 !channel->disabled && !silc_hash_table_count(channel->user_list))
2574 /* If the channel does not have global users and is also empty the client
2575 will be the channel founder and operator. */
2576 if (!channel->disabled &&
2577 !channel->global_users && !silc_hash_table_count(channel->user_list))
2578 umode = (SILC_CHANNEL_UMODE_CHANOP | SILC_CHANNEL_UMODE_CHANFO);
2580 /* Join to the channel */
2581 silc_server_command_join_channel(server, cmd, channel, client_id,
2582 created, create_key, umode,
2583 auth, auth_len, cauth, cauth_len);
2585 silc_free(client_id);
2588 silc_free(channel_namec);
2589 silc_server_command_free(cmd);
2592 /* Server side of command MOTD. Sends server's current "message of the
2593 day" to the client. */
2595 SILC_SERVER_CMD_FUNC(motd)
2597 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
2598 SilcServer server = cmd->server;
2600 char *motd, *dest_server = NULL;
2601 SilcUInt32 motd_len;
2602 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
2604 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_MOTD, cmd, 1, 1);
2606 /* Get server name */
2607 dest_server = silc_argument_get_arg_type(cmd->args, 1, NULL);
2609 silc_server_command_send_status_reply(cmd, SILC_COMMAND_MOTD,
2610 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
2615 /* Check server name */
2616 dest_server = silc_identifier_check(dest_server, strlen(dest_server),
2617 SILC_STRING_UTF8, 256, NULL);
2619 silc_server_command_send_status_reply(cmd, SILC_COMMAND_MOTD,
2620 SILC_STATUS_ERR_BAD_SERVER,
2625 if (!memcmp(dest_server, server->server_name, strlen(dest_server))) {
2628 idp = silc_id_payload_encode(server->id_entry->id, SILC_ID_SERVER);
2630 if (server->config && server->config->server_info &&
2631 server->config->server_info->motd_file) {
2633 motd = silc_file_readfile(server->config->server_info->motd_file,
2639 silc_server_send_command_reply(server, cmd->sock, SILC_COMMAND_MOTD,
2640 SILC_STATUS_OK, 0, ident, 2,
2641 2, idp->data, idp->len,
2645 silc_server_send_command_reply(server, cmd->sock, SILC_COMMAND_MOTD,
2646 SILC_STATUS_OK, 0, ident, 1,
2647 2, idp->data, idp->len);
2649 silc_buffer_free(idp);
2651 SilcServerEntry entry;
2653 /* Check whether we have this server cached */
2654 entry = silc_idlist_find_server_by_name(server->global_list,
2655 dest_server, TRUE, NULL);
2657 entry = silc_idlist_find_server_by_name(server->local_list,
2658 dest_server, TRUE, NULL);
2661 if (server->server_type != SILC_SERVER && !cmd->pending &&
2662 entry && !entry->motd) {
2663 /* Send to the server */
2665 SilcUInt16 old_ident;
2668 cmd->server->stat.commands_sent++;
2670 old_ident = silc_command_get_ident(cmd->payload);
2671 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
2672 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
2674 silc_server_packet_send(server, entry->connection,
2675 SILC_PACKET_COMMAND, cmd->packet->flags,
2676 tmpbuf->data, tmpbuf->len, TRUE);
2678 /* Reprocess this packet after received reply from router */
2679 silc_server_command_pending(server, SILC_COMMAND_MOTD,
2680 silc_command_get_ident(cmd->payload),
2681 silc_server_command_motd,
2682 silc_server_command_dup(cmd));
2683 cmd->pending = TRUE;
2684 silc_command_set_ident(cmd->payload, old_ident);
2685 silc_buffer_free(tmpbuf);
2689 /* Send to primary router only if we don't know the server
2690 * the client requested or if the server is not locally connected */
2691 if ((!entry || !(entry->data.status & SILC_IDLIST_STATUS_LOCAL))
2692 && !cmd->pending && !server->standalone) {
2693 /* Send to the primary router */
2695 SilcUInt16 old_ident;
2698 cmd->server->stat.commands_sent++;
2700 old_ident = silc_command_get_ident(cmd->payload);
2701 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
2702 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
2704 silc_server_packet_send(server, SILC_PRIMARY_ROUTE(server),
2705 SILC_PACKET_COMMAND, cmd->packet->flags,
2706 tmpbuf->data, tmpbuf->len, TRUE);
2708 /* Reprocess this packet after received reply from router */
2709 silc_server_command_pending(server, SILC_COMMAND_MOTD,
2710 silc_command_get_ident(cmd->payload),
2711 silc_server_command_motd,
2712 silc_server_command_dup(cmd));
2713 cmd->pending = TRUE;
2714 silc_command_set_ident(cmd->payload, old_ident);
2715 silc_buffer_free(tmpbuf);
2720 silc_free(dest_server);
2721 dest_server = silc_argument_get_arg_type(cmd->args, 1, NULL);
2722 silc_server_command_send_status_data(cmd, SILC_COMMAND_MOTD,
2723 SILC_STATUS_ERR_NO_SUCH_SERVER, 0,
2725 strlen(dest_server));
2730 idp = silc_id_payload_encode(entry->id, SILC_ID_SERVER);
2731 silc_server_send_command_reply(server, cmd->sock, SILC_COMMAND_MOTD,
2732 SILC_STATUS_OK, 0, ident, 2,
2733 2, idp->data, idp->len,
2736 strlen(entry->motd) : 0);
2737 silc_buffer_free(idp);
2741 silc_free(dest_server);
2742 silc_server_command_free(cmd);
2745 /* Server side of command UMODE. Client can use this command to set/unset
2746 user mode. Client actually cannot set itself to be as server/router
2747 operator so this can be used only to unset the modes. */
2749 SILC_SERVER_CMD_FUNC(umode)
2751 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
2752 SilcServer server = cmd->server;
2753 SilcClientEntry client = (SilcClientEntry)cmd->sock->user_data;
2754 unsigned char *tmp_mask, m[4];
2755 SilcUInt32 mask = 0;
2756 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
2757 bool set_mask = FALSE;
2759 if (cmd->sock->type != SILC_SOCKET_TYPE_CLIENT || !client)
2762 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_UMODE, cmd, 1, 2);
2764 /* Get the client's mode mask */
2765 tmp_mask = silc_argument_get_arg_type(cmd->args, 2, NULL);
2767 SILC_GET32_MSB(mask, tmp_mask);
2772 /* Check that mode changing is allowed. */
2773 if (!silc_server_check_umode_rights(server, client, mask)) {
2774 silc_server_command_send_status_reply(cmd, SILC_COMMAND_UMODE,
2775 SILC_STATUS_ERR_PERM_DENIED, 0);
2779 /* Anonymous mode cannot be set by client */
2780 if (mask & SILC_UMODE_ANONYMOUS &&
2781 !(client->mode & SILC_UMODE_ANONYMOUS)) {
2782 silc_server_command_send_status_reply(cmd, SILC_COMMAND_UMODE,
2783 SILC_STATUS_ERR_PERM_DENIED, 0);
2787 /* Update statistics */
2788 if (mask & SILC_UMODE_GONE) {
2789 if (!(client->mode & SILC_UMODE_GONE))
2790 server->stat.my_aways++;
2792 if (client->mode & SILC_UMODE_GONE)
2793 server->stat.my_aways--;
2796 /* If the client has anonymous mode set, preserve it. */
2797 if (client->mode & SILC_UMODE_ANONYMOUS)
2798 mask |= SILC_UMODE_ANONYMOUS;
2800 /* Change the mode */
2801 client->mode = mask;
2803 /* Send UMODE change to primary router */
2804 silc_server_send_notify_umode(server, SILC_PRIMARY_ROUTE(server),
2805 SILC_BROADCAST(server), client->id,
2808 /* Check if anyone is watching this nickname */
2809 if (server->server_type == SILC_ROUTER)
2810 silc_server_check_watcher_list(server, client, NULL,
2811 SILC_NOTIFY_TYPE_UMODE_CHANGE);
2814 /* Send command reply to sender */
2815 SILC_PUT32_MSB(client->mode, m);
2816 silc_server_send_command_reply(server, cmd->sock, SILC_COMMAND_UMODE,
2817 SILC_STATUS_OK, 0, ident, 1,
2821 silc_server_command_free(cmd);
2824 /* Server side command of CMODE. Changes channel mode */
2826 SILC_SERVER_CMD_FUNC(cmode)
2828 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
2829 SilcServer server = cmd->server;
2830 SilcClientEntry client = (SilcClientEntry)cmd->sock->user_data;
2831 SilcIDListData idata = (SilcIDListData)client;
2832 SilcChannelID *channel_id = NULL;
2833 SilcChannelEntry channel;
2834 SilcChannelClientEntry chl;
2836 unsigned char *tmp, *tmp_id, *tmp_mask, *chpkdata = NULL;
2837 char *cipher = NULL, *hmac = NULL, *passphrase = NULL, ulimit[4];
2838 SilcUInt32 mode_mask = 0, old_mask = 0, tmp_len, tmp_len2, chpklen;
2839 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
2840 bool set_mask = FALSE, set_chpk = FALSE;
2841 SilcPublicKey founder_key = NULL;
2842 SilcBuffer fkey = NULL, chpklist = NULL;
2843 SilcBufferStruct chpk;
2846 silc_server_command_free(cmd);
2850 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_CMODE, cmd, 1, 9);
2852 /* Get Channel ID */
2853 tmp_id = silc_argument_get_arg_type(cmd->args, 1, &tmp_len2);
2855 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
2856 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
2857 silc_server_command_free(cmd);
2860 channel_id = silc_id_payload_parse_id(tmp_id, tmp_len2, NULL);
2862 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
2863 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
2864 silc_server_command_free(cmd);
2868 /* Get channel entry */
2869 channel = silc_idlist_find_channel_by_id(server->local_list,
2872 channel = silc_idlist_find_channel_by_id(server->global_list,
2875 silc_server_command_send_status_data(cmd, SILC_COMMAND_CMODE,
2876 SILC_STATUS_ERR_NO_SUCH_CHANNEL_ID,
2877 0, 2, tmp_id, tmp_len2);
2878 silc_free(channel_id);
2879 silc_server_command_free(cmd);
2883 old_mask = channel->mode;
2885 /* Get the channel mode mask */
2886 tmp_mask = silc_argument_get_arg_type(cmd->args, 2, &tmp_len);
2888 SILC_GET32_MSB(mode_mask, tmp_mask);
2892 /* Check whether this client is on the channel */
2893 if (!silc_server_client_on_channel(client, channel, &chl)) {
2894 silc_server_command_send_status_data(cmd, SILC_COMMAND_CMODE,
2895 SILC_STATUS_ERR_NOT_ON_CHANNEL, 0,
2896 2, tmp_id, tmp_len2);
2900 /* Check that client has rights to change any requested channel modes */
2901 if (set_mask && !silc_server_check_cmode_rights(server, channel, chl,
2903 SILC_LOG_DEBUG(("Client does not have rights to change mode"));
2904 silc_server_command_send_status_data(
2905 cmd, SILC_COMMAND_CMODE,
2906 (!(chl->mode & SILC_CHANNEL_UMODE_CHANOP) ?
2907 SILC_STATUS_ERR_NO_CHANNEL_PRIV :
2908 SILC_STATUS_ERR_NO_CHANNEL_FOPRIV), 0,
2909 2, tmp_id, tmp_len2);
2913 /* If mode mask was not sent as argument then merely return the current
2914 mode mask, founder key and channel public key list to the sender. */
2917 SILC_PUT32_MSB(channel->mode, m);
2918 if (channel->founder_key)
2919 fkey = silc_pkcs_public_key_payload_encode(channel->founder_key);
2920 if (channel->channel_pubkeys)
2921 chpklist = silc_server_get_channel_pk_list(server, channel,
2923 silc_server_send_command_reply(server, cmd->sock, SILC_COMMAND_CMODE,
2924 SILC_STATUS_OK, 0, ident, 4,
2925 2, tmp_id, tmp_len2,
2927 4, fkey ? fkey->data : NULL,
2928 fkey ? fkey->len : 0,
2929 5, chpklist ? chpklist->data : NULL,
2930 chpklist ? chpklist->len : 0);
2935 * Check the modes. Modes that requires nothing special operation are
2939 if (mode_mask & SILC_CHANNEL_MODE_PRIVKEY) {
2940 /* Channel uses private keys to protect traffic. Client(s) has set the
2941 key locally they want to use, server does not know that key. */
2942 /* Nothing interesting to do here */
2944 if (channel->mode & SILC_CHANNEL_MODE_PRIVKEY) {
2945 /* The mode is removed and we need to generate and distribute
2946 new channel key. Clients are not using private channel keys
2947 anymore after this. */
2949 /* Re-generate channel key */
2950 if (!silc_server_create_channel_key(server, channel, 0))
2953 /* Send the channel key. This sends it to our local clients and if
2954 we are normal server to our router as well. */
2955 silc_server_send_channel_key(server, NULL, channel,
2956 server->server_type == SILC_ROUTER ?
2957 FALSE : !server->standalone);
2959 cipher = (char *)silc_cipher_get_name(channel->channel_key);
2960 hmac = (char *)silc_hmac_get_name(channel->hmac);
2964 if (mode_mask & SILC_CHANNEL_MODE_ULIMIT) {
2965 /* User limit is set on channel */
2966 SilcUInt32 user_limit;
2968 /* Get user limit */
2969 tmp = silc_argument_get_arg_type(cmd->args, 3, NULL);
2971 if (!(channel->mode & SILC_CHANNEL_MODE_ULIMIT)) {
2972 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
2973 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS, 0);
2977 SILC_GET32_MSB(user_limit, tmp);
2978 channel->user_limit = user_limit;
2981 if (channel->mode & SILC_CHANNEL_MODE_ULIMIT)
2982 /* User limit mode is unset. Remove user limit */
2983 channel->user_limit = 0;
2986 if (mode_mask & SILC_CHANNEL_MODE_PASSPHRASE) {
2987 if (!(channel->mode & SILC_CHANNEL_MODE_PASSPHRASE)) {
2988 /* Passphrase has been set to channel */
2990 /* Get the passphrase */
2991 tmp = silc_argument_get_arg_type(cmd->args, 4, NULL);
2993 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
2994 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS, 0);
2998 /* Save the passphrase */
2999 passphrase = channel->passphrase = silc_memdup(tmp, strlen(tmp));
3002 if (channel->mode & SILC_CHANNEL_MODE_PASSPHRASE) {
3003 /* Passphrase mode is unset. remove the passphrase */
3004 silc_free(channel->passphrase);
3005 channel->passphrase = NULL;
3009 if (mode_mask & SILC_CHANNEL_MODE_CIPHER) {
3010 if (!(channel->mode & SILC_CHANNEL_MODE_CIPHER)) {
3011 /* Cipher to use protect the traffic */
3012 SilcCipher newkey, oldkey;
3015 cipher = silc_argument_get_arg_type(cmd->args, 5, NULL);
3017 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
3018 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS, 0);
3022 /* Delete old cipher and allocate the new one */
3023 if (!silc_cipher_alloc(cipher, &newkey)) {
3024 silc_server_command_send_status_data(
3025 cmd, SILC_COMMAND_CMODE,
3026 SILC_STATUS_ERR_UNKNOWN_ALGORITHM, 0,
3027 2, cipher, strlen(cipher));
3031 oldkey = channel->channel_key;
3032 channel->channel_key = newkey;
3034 /* Re-generate channel key */
3035 if (!silc_server_create_channel_key(server, channel, 0)) {
3036 /* We don't have new key, revert to old one */
3037 channel->channel_key = oldkey;
3041 /* Remove old channel key for good */
3042 silc_cipher_free(oldkey);
3044 /* Send the channel key. This sends it to our local clients and if
3045 we are normal server to our router as well. */
3046 silc_server_send_channel_key(server, NULL, channel,
3047 server->server_type == SILC_ROUTER ?
3048 FALSE : !server->standalone);
3051 if (channel->mode & SILC_CHANNEL_MODE_CIPHER) {
3052 /* Cipher mode is unset. Remove the cipher and revert back to
3054 SilcCipher newkey, oldkey;
3055 cipher = channel->cipher;
3057 /* Delete old cipher and allocate default one */
3058 if (!silc_cipher_alloc(cipher ? cipher : SILC_DEFAULT_CIPHER, &newkey)) {
3059 silc_server_command_send_status_data(
3060 cmd, SILC_COMMAND_CMODE,
3061 SILC_STATUS_ERR_UNKNOWN_ALGORITHM, 0,
3062 2, cipher, strlen(cipher));
3066 oldkey = channel->channel_key;
3067 channel->channel_key = newkey;
3069 /* Re-generate channel key */
3070 if (!silc_server_create_channel_key(server, channel, 0)) {
3071 /* We don't have new key, revert to old one */
3072 channel->channel_key = oldkey;
3076 /* Remove old channel key for good */
3077 silc_cipher_free(oldkey);
3079 /* Send the channel key. This sends it to our local clients and if
3080 we are normal server to our router as well. */
3081 silc_server_send_channel_key(server, NULL, channel,
3082 server->server_type == SILC_ROUTER ?
3083 FALSE : !server->standalone);
3087 if (mode_mask & SILC_CHANNEL_MODE_HMAC) {
3088 if (!(channel->mode & SILC_CHANNEL_MODE_HMAC)) {
3089 /* HMAC to use protect the traffic */
3090 unsigned char hash[32];
3094 hmac = silc_argument_get_arg_type(cmd->args, 6, NULL);
3096 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
3097 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS, 0);
3101 /* Delete old hmac and allocate the new one */
3102 if (!silc_hmac_alloc(hmac, NULL, &newhmac)) {
3103 silc_server_command_send_status_data(
3104 cmd, SILC_COMMAND_CMODE,
3105 SILC_STATUS_ERR_UNKNOWN_ALGORITHM, 0,
3106 2, hmac, strlen(hmac));
3110 silc_hmac_free(channel->hmac);
3111 channel->hmac = newhmac;
3113 /* Set the HMAC key out of current channel key. The client must do
3115 silc_hash_make(silc_hmac_get_hash(channel->hmac), channel->key,
3116 channel->key_len / 8, hash);
3117 silc_hmac_set_key(channel->hmac, hash,
3118 silc_hash_len(silc_hmac_get_hash(channel->hmac)));
3119 memset(hash, 0, sizeof(hash));
3122 if (channel->mode & SILC_CHANNEL_MODE_HMAC) {
3123 /* Hmac mode is unset. Remove the hmac and revert back to
3126 unsigned char hash[32];
3127 hmac = channel->hmac_name;
3129 /* Delete old hmac and allocate default one */
3130 if (!silc_hmac_alloc(hmac ? hmac : SILC_DEFAULT_HMAC, NULL, &newhmac)) {
3131 silc_server_command_send_status_data(
3132 cmd, SILC_COMMAND_CMODE,
3133 SILC_STATUS_ERR_UNKNOWN_ALGORITHM, 0,
3134 2, hmac, strlen(hmac));
3138 silc_hmac_free(channel->hmac);
3139 channel->hmac = newhmac;
3141 /* Set the HMAC key out of current channel key. The client must do
3143 silc_hash_make(silc_hmac_get_hash(channel->hmac), channel->key,
3144 channel->key_len / 8,
3146 silc_hmac_set_key(channel->hmac, hash,
3147 silc_hash_len(silc_hmac_get_hash(channel->hmac)));
3148 memset(hash, 0, sizeof(hash));
3152 if (mode_mask & SILC_CHANNEL_MODE_FOUNDER_AUTH) {
3153 if (chl->mode & SILC_CHANNEL_UMODE_CHANFO) {
3154 /* Check if the founder public key was received */
3155 founder_key = idata->public_key;
3156 tmp = silc_argument_get_arg_type(cmd->args, 8, &tmp_len);
3158 if (!silc_pkcs_public_key_payload_decode(tmp, tmp_len, &founder_key)) {
3159 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
3160 SILC_STATUS_ERR_AUTH_FAILED,
3165 /* If key was not sent and the channel mode has already founder
3166 then the key was not to be changed. */
3167 if (channel->mode & SILC_CHANNEL_MODE_FOUNDER_AUTH)
3171 /* Set the founder authentication */
3172 tmp = silc_argument_get_arg_type(cmd->args, 7, &tmp_len);
3174 silc_server_command_send_status_reply(
3175 cmd, SILC_COMMAND_CMODE,
3176 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS, 0);
3180 /* Verify the payload before setting the mode */
3181 if (!silc_auth_verify_data(tmp, tmp_len, SILC_AUTH_PUBLIC_KEY,
3182 founder_key, 0, server->sha1hash,
3183 client->id, SILC_ID_CLIENT)) {
3184 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
3185 SILC_STATUS_ERR_AUTH_FAILED,
3190 /* Save the public key */
3191 if (channel->founder_key)
3192 silc_pkcs_public_key_free(channel->founder_key);
3193 if (silc_argument_get_arg_type(cmd->args, 8, NULL))
3194 channel->founder_key = founder_key;
3196 channel->founder_key = silc_pkcs_public_key_copy(founder_key);
3197 if (!channel->founder_key) {
3198 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
3199 SILC_STATUS_ERR_AUTH_FAILED,
3204 fkey = silc_pkcs_public_key_payload_encode(channel->founder_key);
3206 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
3207 SILC_STATUS_ERR_AUTH_FAILED,
3209 silc_pkcs_public_key_free(channel->founder_key);
3210 channel->founder_key = NULL;
3215 if (chl->mode & SILC_CHANNEL_UMODE_CHANFO) {
3216 if (channel->mode & SILC_CHANNEL_MODE_FOUNDER_AUTH) {
3217 if (channel->founder_key)
3218 silc_pkcs_public_key_free(channel->founder_key);
3219 channel->founder_key = NULL;
3225 if (mode_mask & SILC_CHANNEL_MODE_CHANNEL_AUTH) {
3226 if (chl->mode & SILC_CHANNEL_UMODE_CHANFO) {
3229 chpkdata = silc_argument_get_arg_type(cmd->args, 9, &chpklen);
3231 if (!chpkdata && channel->mode & SILC_CHANNEL_MODE_CHANNEL_AUTH)
3236 /* Process the channel public key(s) */
3237 st = silc_server_set_channel_pk_list(server, NULL, channel,
3239 if (st != SILC_STATUS_OK) {
3240 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE, st, 0);
3245 if (chl->mode & SILC_CHANNEL_UMODE_CHANFO) {
3246 if (channel->mode & SILC_CHANNEL_MODE_CHANNEL_AUTH) {
3247 if (channel->channel_pubkeys)
3248 silc_hash_table_free(channel->channel_pubkeys);
3249 channel->channel_pubkeys = NULL;
3256 /* Finally, set the mode */
3257 old_mask = channel->mode = mode_mask;
3259 /* Send CMODE_CHANGE notify. */
3260 cidp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
3261 if (mode_mask & SILC_CHANNEL_MODE_ULIMIT)
3262 SILC_PUT32_MSB(channel->user_limit, ulimit);
3263 silc_server_send_notify_to_channel(server, NULL, channel, FALSE, TRUE,
3264 SILC_NOTIFY_TYPE_CMODE_CHANGE, 8,
3265 cidp->data, cidp->len,
3267 cipher, cipher ? strlen(cipher) : 0,
3268 hmac, hmac ? strlen(hmac) : 0,
3269 passphrase, passphrase ?
3270 strlen(passphrase) : 0,
3271 fkey ? fkey->data : NULL,
3272 fkey ? fkey->len : 0,
3273 chpkdata ? chpkdata : NULL,
3274 chpkdata ? chpklen : 0,
3275 mode_mask & SILC_CHANNEL_MODE_ULIMIT ?
3277 mode_mask & SILC_CHANNEL_MODE_ULIMIT ?
3278 sizeof(ulimit) : 0);
3280 /* Set CMODE notify type to network */
3281 if (chpkdata && chpklen)
3282 silc_buffer_set(&chpk, chpkdata, chpklen);
3283 silc_server_send_notify_cmode(server, SILC_PRIMARY_ROUTE(server),
3284 SILC_BROADCAST(server), channel,
3285 mode_mask, client->id, SILC_ID_CLIENT,
3286 cipher, hmac, passphrase, founder_key,
3287 chpkdata ? &chpk : NULL);
3290 chpklist = silc_server_get_channel_pk_list(server, channel, FALSE, FALSE);
3292 /* Send command reply to sender */
3293 silc_server_send_command_reply(server, cmd->sock, SILC_COMMAND_CMODE,
3294 SILC_STATUS_OK, 0, ident, 5,
3295 2, tmp_id, tmp_len2,
3297 4, fkey ? fkey->data : NULL,
3298 fkey ? fkey->len : 0,
3299 5, chpklist ? chpklist->data :
3300 NULL, chpklist ? chpklist->len
3303 SILC_CHANNEL_MODE_ULIMIT ?
3306 SILC_CHANNEL_MODE_ULIMIT ?
3307 sizeof(ulimit) : 0));
3308 silc_buffer_free(cidp);
3311 channel->mode = old_mask;
3312 silc_buffer_free(chpklist);
3313 silc_buffer_free(fkey);
3314 silc_free(channel_id);
3315 silc_server_command_free(cmd);
3318 /* Server side of CUMODE command. Changes client's mode on a channel. */
3320 SILC_SERVER_CMD_FUNC(cumode)
3322 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
3323 SilcServer server = cmd->server;
3324 SilcClientEntry client = (SilcClientEntry)cmd->sock->user_data;
3325 SilcChannelID *channel_id = NULL;
3326 SilcClientID *client_id = NULL;
3327 SilcChannelEntry channel;
3328 SilcClientEntry target_client;
3329 SilcChannelClientEntry chl;
3331 unsigned char *tmp_id, *tmp_ch_id, *tmp_mask;
3332 SilcUInt32 target_mask, sender_mask = 0, tmp_len, tmp_ch_len;
3334 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
3335 SilcPublicKey founder_key = NULL;
3336 SilcBuffer fkey = NULL;
3341 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_CUMODE, cmd, 3, 4);
3343 /* Get Channel ID */
3344 tmp_ch_id = silc_argument_get_arg_type(cmd->args, 1, &tmp_ch_len);
3346 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3347 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
3350 channel_id = silc_id_payload_parse_id(tmp_ch_id, tmp_ch_len, NULL);
3352 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3353 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
3357 /* Get channel entry */
3358 channel = silc_idlist_find_channel_by_id(server->local_list,
3361 channel = silc_idlist_find_channel_by_id(server->global_list,
3364 silc_server_command_send_status_data(cmd, SILC_COMMAND_CUMODE,
3365 SILC_STATUS_ERR_NO_SUCH_CHANNEL_ID,
3366 0, 2, tmp_ch_id, tmp_ch_len);
3371 /* Check whether sender is on the channel */
3372 if (!silc_server_client_on_channel(client, channel, &chl)) {
3373 silc_server_command_send_status_data(cmd, SILC_COMMAND_CUMODE,
3374 SILC_STATUS_ERR_NOT_ON_CHANNEL, 0,
3375 2, tmp_ch_id, tmp_ch_len);
3378 sender_mask = chl->mode;
3380 /* Get the target client's channel mode mask */
3381 tmp_mask = silc_argument_get_arg_type(cmd->args, 2, NULL);
3383 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3384 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
3388 SILC_GET32_MSB(target_mask, tmp_mask);
3390 /* Get target Client ID */
3391 tmp_id = silc_argument_get_arg_type(cmd->args, 3, &tmp_len);
3393 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3394 SILC_STATUS_ERR_NO_CLIENT_ID, 0);
3397 client_id = silc_id_payload_parse_id(tmp_id, tmp_len, NULL);
3399 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3400 SILC_STATUS_ERR_NO_CLIENT_ID, 0);
3404 /* Get target client's entry */
3405 target_client = silc_idlist_find_client_by_id(server->local_list,
3406 client_id, TRUE, NULL);
3408 target_client = silc_idlist_find_client_by_id(server->global_list,
3409 client_id, TRUE, NULL);
3411 if (target_client != client &&
3412 !(sender_mask & SILC_CHANNEL_UMODE_CHANFO) &&
3413 !(sender_mask & SILC_CHANNEL_UMODE_CHANOP)) {
3414 silc_server_command_send_status_data(cmd, SILC_COMMAND_CUMODE,
3415 SILC_STATUS_ERR_NOT_YOU, 0,
3416 2, tmp_ch_id, tmp_ch_len);
3420 /* Check whether target client is on the channel */
3421 if (target_client != client) {
3422 if (!silc_server_client_on_channel(target_client, channel, &chl)) {
3423 silc_server_command_send_status_data2(
3424 cmd, SILC_COMMAND_CUMODE,
3425 SILC_STATUS_ERR_USER_NOT_ON_CHANNEL, 0,
3427 3, tmp_ch_id, tmp_ch_len);
3436 /* If the target client is founder, no one else can change their mode
3438 if (chl->mode & SILC_CHANNEL_UMODE_CHANFO && client != target_client) {
3439 silc_server_command_send_status_data(cmd, SILC_COMMAND_CUMODE,
3440 SILC_STATUS_ERR_NO_CHANNEL_FOPRIV,
3441 0, 2, tmp_ch_id, tmp_ch_len);
3445 if (target_mask & SILC_CHANNEL_UMODE_CHANFO) {
3446 if (target_client != client) {
3447 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3448 SILC_STATUS_ERR_NO_CHANNEL_FOPRIV,
3453 if (!(chl->mode & SILC_CHANNEL_UMODE_CHANFO)) {
3454 /* The client tries to claim the founder rights. */
3455 unsigned char *tmp_auth;
3456 SilcUInt32 tmp_auth_len;
3457 SilcChannelClientEntry chl2;
3458 SilcHashTableList htl;
3460 if (!(channel->mode & SILC_CHANNEL_MODE_FOUNDER_AUTH) ||
3461 !channel->founder_key) {
3462 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3463 SILC_STATUS_ERR_AUTH_FAILED, 0);
3467 tmp_auth = silc_argument_get_arg_type(cmd->args, 4, &tmp_auth_len);
3469 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3470 SILC_STATUS_ERR_AUTH_FAILED, 0);
3474 /* Verify the authentication payload */
3475 if (!silc_auth_verify_data(tmp_auth, tmp_auth_len, SILC_AUTH_PUBLIC_KEY,
3476 channel->founder_key, 0, server->sha1hash,
3477 client->id, SILC_ID_CLIENT)) {
3478 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3479 SILC_STATUS_ERR_AUTH_FAILED, 0);
3484 founder_key = channel->founder_key;
3485 fkey = silc_pkcs_public_key_payload_encode(founder_key);
3487 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3488 SILC_STATUS_ERR_AUTH_FAILED, 0);
3492 /* There cannot be anyone else as founder on the channel now. This
3493 client is definitely the founder due to this authentication. This
3494 is done only on router, not on server, since server cannot know
3495 whether router will accept this mode change or not. XXX This
3496 probably shouldn't be done anymore at all, may cause problems in
3497 router-router connections too (maybe just AUTH_FAILED error should
3498 be returned). -Pekka */
3499 if (server->server_type == SILC_ROUTER) {
3500 silc_hash_table_list(channel->user_list, &htl);
3501 while (silc_hash_table_get(&htl, NULL, (void *)&chl2))
3502 if (chl2->mode & SILC_CHANNEL_UMODE_CHANFO) {
3503 chl2->mode &= ~SILC_CHANNEL_UMODE_CHANFO;
3504 silc_server_force_cumode_change(server, NULL, channel, chl2,
3508 silc_hash_table_list_reset(&htl);
3511 sender_mask = chl->mode |= SILC_CHANNEL_UMODE_CHANFO;
3514 if (chl->mode & SILC_CHANNEL_UMODE_CHANFO) {
3515 if (target_client == client) {
3516 /* Remove channel founder rights from itself */
3517 chl->mode &= ~SILC_CHANNEL_UMODE_CHANFO;
3520 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3521 SILC_STATUS_ERR_NOT_YOU, 0);
3527 if (target_mask & SILC_CHANNEL_UMODE_CHANOP) {
3528 /* Promote to operator */
3529 if (!(chl->mode & SILC_CHANNEL_UMODE_CHANOP)) {
3530 if (!(sender_mask & SILC_CHANNEL_UMODE_CHANOP) &&
3531 !(sender_mask & SILC_CHANNEL_UMODE_CHANFO)) {
3532 silc_server_command_send_status_data(cmd, SILC_COMMAND_CUMODE,
3533 SILC_STATUS_ERR_NO_CHANNEL_PRIV,
3534 0, 2, tmp_ch_id, tmp_ch_len);
3538 chl->mode |= SILC_CHANNEL_UMODE_CHANOP;
3542 if (chl->mode & SILC_CHANNEL_UMODE_CHANOP) {
3543 if (!(sender_mask & SILC_CHANNEL_UMODE_CHANOP) &&
3544 !(sender_mask & SILC_CHANNEL_UMODE_CHANFO)) {
3545 silc_server_command_send_status_data(cmd, SILC_COMMAND_CUMODE,
3546 SILC_STATUS_ERR_NO_CHANNEL_PRIV,
3547 0, 2, tmp_ch_id, tmp_ch_len);
3551 /* Demote to normal user */
3552 chl->mode &= ~SILC_CHANNEL_UMODE_CHANOP;
3557 if (target_mask & SILC_CHANNEL_UMODE_BLOCK_MESSAGES) {
3558 if (target_client != client) {
3559 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3560 SILC_STATUS_ERR_NOT_YOU, 0);
3564 if (!(chl->mode & SILC_CHANNEL_UMODE_BLOCK_MESSAGES)) {
3565 chl->mode |= SILC_CHANNEL_UMODE_BLOCK_MESSAGES;
3569 if (chl->mode & SILC_CHANNEL_UMODE_BLOCK_MESSAGES) {
3570 if (target_client != client) {
3571 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3572 SILC_STATUS_ERR_NOT_YOU, 0);
3576 chl->mode &= ~SILC_CHANNEL_UMODE_BLOCK_MESSAGES;
3581 if (target_mask & SILC_CHANNEL_UMODE_BLOCK_MESSAGES_USERS) {
3582 if (target_client != client) {
3583 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3584 SILC_STATUS_ERR_NOT_YOU, 0);
3588 if (!(chl->mode & SILC_CHANNEL_UMODE_BLOCK_MESSAGES_USERS)) {
3589 chl->mode |= SILC_CHANNEL_UMODE_BLOCK_MESSAGES_USERS;
3593 if (chl->mode & SILC_CHANNEL_UMODE_BLOCK_MESSAGES_USERS) {
3594 if (target_client != client) {
3595 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3596 SILC_STATUS_ERR_NOT_YOU, 0);
3600 chl->mode &= ~SILC_CHANNEL_UMODE_BLOCK_MESSAGES_USERS;
3605 if (target_mask & SILC_CHANNEL_UMODE_BLOCK_MESSAGES_ROBOTS) {
3606 if (target_client != client) {
3607 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3608 SILC_STATUS_ERR_NOT_YOU, 0);
3612 if (!(chl->mode & SILC_CHANNEL_UMODE_BLOCK_MESSAGES_ROBOTS)) {
3613 chl->mode |= SILC_CHANNEL_UMODE_BLOCK_MESSAGES_ROBOTS;
3617 if (chl->mode & SILC_CHANNEL_UMODE_BLOCK_MESSAGES_ROBOTS) {
3618 if (target_client != client) {
3619 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3620 SILC_STATUS_ERR_NOT_YOU, 0);
3624 chl->mode &= ~SILC_CHANNEL_UMODE_BLOCK_MESSAGES_ROBOTS;
3629 if (target_mask & SILC_CHANNEL_UMODE_QUIET) {
3630 if (!(chl->mode & SILC_CHANNEL_UMODE_QUIET)) {
3631 if (client == target_client) {
3632 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3633 SILC_STATUS_ERR_PERM_DENIED, 0);
3636 chl->mode |= SILC_CHANNEL_UMODE_QUIET;
3640 if (chl->mode & SILC_CHANNEL_UMODE_QUIET) {
3641 if (client == target_client) {
3642 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3643 SILC_STATUS_ERR_PERM_DENIED, 0);
3646 chl->mode &= ~SILC_CHANNEL_UMODE_QUIET;
3651 idp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
3652 tmp_id = silc_argument_get_arg_type(cmd->args, 3, &tmp_len);
3654 /* Send notify to channel, notify only if mode was actually changed. */
3656 silc_server_send_notify_to_channel(server, NULL, channel, FALSE, TRUE,
3657 SILC_NOTIFY_TYPE_CUMODE_CHANGE, 4,
3658 idp->data, idp->len,
3661 fkey ? fkey->data : NULL,
3662 fkey ? fkey->len : 0);
3664 /* Set CUMODE notify type to network */
3665 silc_server_send_notify_cumode(server, SILC_PRIMARY_ROUTE(server),
3666 SILC_BROADCAST(server), channel,
3667 target_mask, client->id, SILC_ID_CLIENT,
3668 target_client->id, founder_key);
3671 /* Send command reply to sender */
3672 silc_server_send_command_reply(server, cmd->sock, SILC_COMMAND_CUMODE,
3673 SILC_STATUS_OK, 0, ident, 3,
3675 3, tmp_ch_id, tmp_ch_len,
3676 4, tmp_id, tmp_len);
3677 silc_buffer_free(idp);
3680 silc_free(channel_id);
3681 silc_free(client_id);
3682 silc_buffer_free(fkey);
3683 silc_server_command_free(cmd);
3686 /* Server side of KICK command. Kicks client out of channel. */
3688 SILC_SERVER_CMD_FUNC(kick)
3690 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
3691 SilcServer server = cmd->server;
3692 SilcClientEntry client = (SilcClientEntry)cmd->sock->user_data;
3693 SilcClientEntry target_client;
3694 SilcChannelID *channel_id;
3695 SilcClientID *client_id;
3696 SilcChannelEntry channel;
3697 SilcChannelClientEntry chl;
3699 SilcUInt32 tmp_len, target_idp_len, clen;
3700 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
3701 unsigned char *tmp, *comment, *target_idp;
3706 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_LEAVE, cmd, 1, 3);
3708 /* Get Channel ID */
3709 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
3711 silc_server_command_send_status_reply(cmd, SILC_COMMAND_KICK,
3712 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
3715 channel_id = silc_id_payload_parse_id(tmp, tmp_len, NULL);
3717 silc_server_command_send_status_data(cmd, SILC_COMMAND_KICK,
3718 SILC_STATUS_ERR_BAD_CHANNEL_ID, 0,
3723 /* Get channel entry */
3724 channel = silc_idlist_find_channel_by_id(server->local_list,
3727 channel = silc_idlist_find_channel_by_id(server->local_list,
3730 silc_server_command_send_status_data(cmd, SILC_COMMAND_KICK,
3731 SILC_STATUS_ERR_NO_SUCH_CHANNEL_ID,
3732 0, 2, tmp, tmp_len);
3737 /* Check whether sender is on the channel */
3738 if (!silc_server_client_on_channel(client, channel, &chl)) {
3739 silc_server_command_send_status_data(cmd, SILC_COMMAND_KICK,
3740 SILC_STATUS_ERR_NOT_ON_CHANNEL,
3741 0, 2, tmp, tmp_len);
3745 /* Check that the kicker is channel operator or channel founder */
3746 if (!(chl->mode & SILC_CHANNEL_UMODE_CHANOP) &&
3747 !(chl->mode & SILC_CHANNEL_UMODE_CHANFO)) {
3748 silc_server_command_send_status_data(cmd, SILC_COMMAND_KICK,
3749 SILC_STATUS_ERR_NO_CHANNEL_PRIV,
3750 0, 2, tmp, tmp_len);
3754 /* Get target Client ID */
3755 target_idp = silc_argument_get_arg_type(cmd->args, 2, &target_idp_len);
3757 silc_server_command_send_status_reply(cmd, SILC_COMMAND_KICK,
3758 SILC_STATUS_ERR_NO_CLIENT_ID, 0);
3761 client_id = silc_id_payload_parse_id(target_idp, target_idp_len, NULL);
3763 silc_server_command_send_status_data(cmd, SILC_COMMAND_KICK,
3764 SILC_STATUS_ERR_BAD_CLIENT_ID,
3765 0, 2, target_idp, target_idp_len);
3769 /* Get target client's entry */
3770 target_client = silc_idlist_find_client_by_id(server->local_list,
3771 client_id, TRUE, NULL);
3772 if (!target_client) {
3773 target_client = silc_idlist_find_client_by_id(server->global_list,
3774 client_id, TRUE, NULL);
3777 /* Check whether target client is on the channel */
3778 if (!silc_server_client_on_channel(target_client, channel, &chl)) {
3779 silc_server_command_send_status_data2(cmd, SILC_COMMAND_KICK,
3780 SILC_STATUS_ERR_USER_NOT_ON_CHANNEL,
3781 0, 2, target_idp, target_idp_len,
3786 /* Check that the target client is not channel founder. Channel founder
3787 cannot be kicked from the channel. */
3788 if (chl->mode & SILC_CHANNEL_UMODE_CHANFO) {
3789 silc_server_command_send_status_data(cmd, SILC_COMMAND_KICK,
3790 SILC_STATUS_ERR_NO_CHANNEL_FOPRIV,
3791 0, 2, tmp, tmp_len);
3796 comment = silc_argument_get_arg_type(cmd->args, 3, &clen);
3801 /* Send the reply back to the client */
3802 silc_server_send_command_reply(server, cmd->sock, SILC_COMMAND_KICK,
3803 SILC_STATUS_OK, 0, ident, 2,
3805 3, target_idp, target_idp_len);
3807 /* Send KICKED notify to local clients on the channel */
3808 idp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
3809 silc_server_send_notify_to_channel(server, NULL, channel, FALSE, TRUE,
3810 SILC_NOTIFY_TYPE_KICKED, 3,
3811 target_idp, target_idp_len,
3812 comment, comment ? strlen(comment) : 0,
3813 idp->data, idp->len);
3814 silc_buffer_free(idp);
3816 /* Send KICKED notify to primary route */
3817 silc_server_send_notify_kicked(server, SILC_PRIMARY_ROUTE(server),
3818 SILC_BROADCAST(server), channel,
3819 target_client->id, client->id, comment);
3821 /* Remove the client from channel's invite list */
3822 if (channel->invite_list && silc_hash_table_count(channel->invite_list)) {
3824 silc_argument_payload_encode_one(NULL, target_idp, target_idp_len, 3);
3825 SilcArgumentPayload args =
3826 silc_argument_payload_parse(ab->data, ab->len, 1);
3828 silc_server_inviteban_process(server, channel->invite_list, 1, args);
3829 silc_buffer_free(ab);
3830 silc_argument_payload_free(args);
3833 /* Remove the client from the channel. If the channel does not exist
3834 after removing the client then the client kicked itself off the channel
3835 and we don't have to send anything after that. */
3836 if (!silc_server_remove_from_one_channel(server, NULL, channel,
3837 target_client, FALSE))
3840 if (!(channel->mode & SILC_CHANNEL_MODE_PRIVKEY)) {
3841 /* Re-generate channel key */
3842 if (!silc_server_create_channel_key(server, channel, 0))
3845 /* Send the channel key to the channel. The key of course is not sent
3846 to the client who was kicked off the channel. */
3847 silc_server_send_channel_key(server, target_client->connection, channel,
3848 server->server_type == SILC_ROUTER ?
3849 FALSE : !server->standalone);
3853 silc_server_command_free(cmd);
3856 /* Server side of OPER command. Client uses this comand to obtain server
3857 operator privileges to this server/router. */
3859 SILC_SERVER_CMD_FUNC(oper)
3861 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
3862 SilcServer server = cmd->server;
3863 SilcClientEntry client = (SilcClientEntry)cmd->sock->user_data;
3864 unsigned char *username = NULL, *auth;
3866 SilcServerConfigAdmin *admin;
3867 SilcIDListData idata = (SilcIDListData)client;
3868 bool result = FALSE;
3869 SilcPublicKey cached_key;
3871 if (cmd->sock->type != SILC_SOCKET_TYPE_CLIENT || !client)
3874 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_OPER, cmd, 1, 2);
3876 /* Get the username */
3877 username = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
3879 silc_server_command_send_status_reply(cmd, SILC_COMMAND_OPER,
3880 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
3885 /* Check username */
3886 username = silc_identifier_check(username, strlen(username),
3887 SILC_STRING_UTF8, 128, &tmp_len);
3889 silc_server_command_send_status_reply(cmd, SILC_COMMAND_OPER,
3890 SILC_STATUS_ERR_BAD_USERNAME,
3895 /* Get the admin configuration */
3896 admin = silc_server_config_find_admin(server, cmd->sock->ip,
3897 username, client->nickname);
3899 admin = silc_server_config_find_admin(server, cmd->sock->hostname,
3900 username, client->nickname);
3902 silc_server_command_send_status_reply(cmd, SILC_COMMAND_OPER,
3903 SILC_STATUS_ERR_AUTH_FAILED,
3905 SILC_LOG_INFO(("OPER authentication failed for username '%s' by "
3906 "nickname '%s' from %s", username,
3907 client->nickname, cmd->sock->hostname));
3912 /* Get the authentication payload */
3913 auth = silc_argument_get_arg_type(cmd->args, 2, &tmp_len);
3915 silc_server_command_send_status_reply(cmd, SILC_COMMAND_OPER,
3916 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
3921 /* Verify the authentication data. If both passphrase and public key
3922 is set then try both of them. */
3923 if (admin->passphrase)
3924 result = silc_auth_verify_data(auth, tmp_len, SILC_AUTH_PASSWORD,
3925 admin->passphrase, admin->passphrase_len,
3926 idata->hash, client->id, SILC_ID_CLIENT);
3927 if (!result && admin->publickeys) {
3928 cached_key = silc_server_get_public_key(server, admin->publickeys);
3931 result = silc_auth_verify_data(auth, tmp_len, SILC_AUTH_PUBLIC_KEY,
3932 cached_key, 0, idata->hash,
3933 client->id, SILC_ID_CLIENT);
3936 /* Authentication failed */
3937 silc_server_command_send_status_reply(cmd, SILC_COMMAND_OPER,
3938 SILC_STATUS_ERR_AUTH_FAILED,
3943 /* Client is now server operator */
3944 client->mode |= SILC_UMODE_SERVER_OPERATOR;
3946 /* Update statistics */
3947 if (SILC_IS_LOCAL(client))
3948 server->stat.my_server_ops++;
3949 if (server->server_type == SILC_ROUTER)
3950 server->stat.server_ops++;
3952 /* Send UMODE change to primary router */
3953 silc_server_send_notify_umode(server, SILC_PRIMARY_ROUTE(server),
3954 SILC_BROADCAST(server), client->id,
3957 /* Check if anyone is watching this nickname */
3958 if (server->server_type == SILC_ROUTER)
3959 silc_server_check_watcher_list(server, client, NULL,
3960 SILC_NOTIFY_TYPE_UMODE_CHANGE);
3962 /* Send reply to the sender */
3963 silc_server_command_send_status_reply(cmd, SILC_COMMAND_OPER,
3967 silc_free(username);
3968 silc_server_command_free(cmd);
3971 SILC_TASK_CALLBACK(silc_server_command_detach_cb)
3973 SilcServer server = app_context;
3974 QuitInternal q = (QuitInternal)context;
3975 SilcClientID *client_id = (SilcClientID *)q->sock;
3976 SilcClientEntry client;
3977 SilcSocketConnection sock;
3979 client = silc_idlist_find_client_by_id(server->local_list, client_id,
3981 if (client && client->connection) {
3982 sock = client->connection;
3984 /* If there is pending outgoing data for the client then purge it
3985 to the network before closing connection. */
3986 silc_server_packet_queue_purge(server, sock);
3988 /* Close the connection on our side */
3989 client->router = NULL;
3990 client->connection = NULL;
3991 sock->user_data = NULL;
3992 silc_server_close_connection(server, sock);
3995 silc_free(client_id);
3999 SILC_TASK_CALLBACK(silc_server_command_detach_timeout)
4001 SilcServer server = app_context;
4002 QuitInternal q = (QuitInternal)context;
4003 SilcClientID *client_id = (SilcClientID *)q->sock;
4004 SilcClientEntry client;
4006 client = silc_idlist_find_client_by_id(server->local_list, client_id,
4008 if (client && client->mode & SILC_UMODE_DETACHED) {
4009 SILC_LOG_DEBUG(("Detach timeout"));
4010 silc_server_free_client_data(server, NULL, client, TRUE,
4014 silc_free(client_id);
4018 /* Server side of DETACH command. Detached the client from the network
4019 by closing the connection but preserving the session. */
4021 SILC_SERVER_CMD_FUNC(detach)
4023 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
4024 SilcServer server = cmd->server;
4025 SilcClientEntry client = (SilcClientEntry)cmd->sock->user_data;
4028 if (server->config->detach_disabled) {
4029 silc_server_command_send_status_reply(cmd, SILC_COMMAND_DETACH,
4030 SILC_STATUS_ERR_OPERATION_ALLOWED,
4035 if (cmd->sock->type != SILC_SOCKET_TYPE_CLIENT || !client)
4038 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_DETACH, cmd, 0, 0);
4040 /* Remove operator privileges, since the client may resume in some
4041 other server which to it does not have operator privileges. */
4042 SILC_OPER_STATS_UPDATE(client, server, SILC_UMODE_SERVER_OPERATOR);
4043 SILC_OPER_STATS_UPDATE(client, router, SILC_UMODE_ROUTER_OPERATOR);
4045 /* Send the user mode notify to notify that client is detached */
4046 client->mode |= SILC_UMODE_DETACHED;
4047 client->data.status &= ~SILC_IDLIST_STATUS_RESUMED;
4048 client->data.status &= ~SILC_IDLIST_STATUS_NOATTR;
4049 client->last_command = 0;
4050 client->fast_command = 0;
4051 silc_server_send_notify_umode(server, SILC_PRIMARY_ROUTE(server),
4052 SILC_BROADCAST(server), client->id,
4054 server->stat.my_detached++;
4056 /* Check if anyone is watching this nickname */
4057 if (server->server_type == SILC_ROUTER)
4058 silc_server_check_watcher_list(server, client, NULL,
4059 SILC_NOTIFY_TYPE_UMODE_CHANGE);
4061 q = silc_calloc(1, sizeof(*q));
4062 q->sock = silc_id_dup(client->id, SILC_ID_CLIENT);
4063 silc_schedule_task_add(server->schedule, 0, silc_server_command_detach_cb,
4064 q, 0, 200000, SILC_TASK_TIMEOUT, SILC_TASK_PRI_LOW);
4066 if (server->config->detach_timeout) {
4067 q = silc_calloc(1, sizeof(*q));
4068 q->sock = silc_id_dup(client->id, SILC_ID_CLIENT);
4069 silc_schedule_task_add(server->schedule, 0,
4070 silc_server_command_detach_timeout,
4071 q, server->config->detach_timeout * 60,
4072 0, SILC_TASK_TIMEOUT, SILC_TASK_PRI_LOW);
4075 /* Send reply to the sender */
4076 silc_server_command_send_status_reply(cmd, SILC_COMMAND_DETACH,
4080 silc_server_command_free(cmd);
4083 /* Server side of WATCH command. */
4085 SILC_SERVER_CMD_FUNC(watch)
4087 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
4088 SilcServer server = cmd->server;
4089 char *add_nick, *del_nick;
4090 SilcUInt32 add_nick_len, del_nick_len, tmp_len, pk_len;
4091 unsigned char hash[16], *tmp, *pk, *nick;
4092 SilcClientEntry client;
4093 SilcClientID *client_id = NULL;
4094 SilcUInt16 old_ident;
4096 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_WATCH, cmd, 1, 3);
4098 if (server->server_type != SILC_ROUTER && !server->standalone) {
4099 if (!cmd->pending) {
4100 /* Send the command to router */
4103 /* If backup receives this from primary, handle it locally */
4104 if (server->server_type == SILC_BACKUP_ROUTER &&
4105 cmd->sock == SILC_PRIMARY_ROUTE(server))
4108 SILC_LOG_DEBUG(("Forwarding WATCH to router"));
4111 cmd->server->stat.commands_sent++;
4113 old_ident = silc_command_get_ident(cmd->payload);
4114 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
4115 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
4117 silc_server_packet_send(server, SILC_PRIMARY_ROUTE(server),
4118 SILC_PACKET_COMMAND, cmd->packet->flags,
4119 tmpbuf->data, tmpbuf->len, TRUE);
4121 /* Reprocess this packet after received reply from router */
4122 silc_server_command_pending(server, SILC_COMMAND_WATCH,
4123 silc_command_get_ident(cmd->payload),
4124 silc_server_command_watch,
4125 silc_server_command_dup(cmd));
4126 cmd->pending = TRUE;
4127 silc_command_set_ident(cmd->payload, old_ident);
4128 silc_buffer_free(tmpbuf);
4131 SilcServerCommandReplyContext reply = context2;
4137 silc_command_get_status(reply->payload, &status, NULL);
4139 /* Backup router handles the WATCH command also. */
4140 if (server->server_type != SILC_BACKUP_ROUTER ||
4141 SILC_STATUS_IS_ERROR(status)) {
4142 /* Received reply from router, just send same data to the client. */
4143 SILC_LOG_DEBUG(("Received reply to WATCH from router"));
4144 silc_server_command_send_status_reply(cmd, SILC_COMMAND_WATCH, status,
4151 /* We are router and keep the watch list for local cell */
4154 /* Get the client ID */
4155 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
4157 silc_server_command_send_status_reply(cmd, SILC_COMMAND_WATCH,
4158 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
4162 client_id = silc_id_payload_parse_id(tmp, tmp_len, NULL);
4164 silc_server_command_send_status_data(cmd, SILC_COMMAND_WATCH,
4165 SILC_STATUS_ERR_NO_SUCH_CLIENT_ID,
4166 0, 2, tmp, tmp_len);
4170 /* Get the client entry which must be in local list */
4171 client = silc_idlist_find_client_by_id(server->local_list,
4172 client_id, TRUE, NULL);
4174 /* Backup checks global list also */
4175 if (server->server_type == SILC_BACKUP_ROUTER)
4176 client = silc_idlist_find_client_by_id(server->global_list,
4177 client_id, TRUE, NULL);
4179 silc_server_command_send_status_data(cmd, SILC_COMMAND_WATCH,
4180 SILC_STATUS_ERR_NO_SUCH_CLIENT_ID,
4181 0, 2, tmp, tmp_len);
4186 /* Take public key for watching by public key */
4187 pk = silc_argument_get_arg_type(cmd->args, 4, &pk_len);
4190 add_nick = silc_argument_get_arg_type(cmd->args, 2, &add_nick_len);
4191 del_nick = silc_argument_get_arg_type(cmd->args, 3, &del_nick_len);
4192 if (!add_nick && !del_nick && !pk) {
4193 silc_server_command_send_status_reply(cmd, SILC_COMMAND_WATCH,
4194 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
4199 if (add_nick && add_nick_len > 128) {
4200 add_nick[128] = '\0';
4203 if (del_nick && del_nick_len > 128) {
4204 del_nick[128] = '\0';
4208 /* Add new nickname to be watched in our cell */
4210 nick = silc_identifier_check(add_nick, add_nick_len, SILC_STRING_UTF8, 128,
4213 silc_server_command_send_status_reply(cmd, SILC_COMMAND_WATCH,
4214 SILC_STATUS_ERR_BAD_NICKNAME, 0);
4218 /* Hash the nick, we have the hash saved, not nicks because we can
4219 do one to one mapping to the nick from Client ID hash this way. */
4220 silc_hash_make(server->md5hash, nick, add_nick_len, hash);
4222 /* Check whether this client is already watching this nickname */
4223 if (silc_hash_table_find_by_context(server->watcher_list, hash,
4225 /* Nickname is alredy being watched for this client */
4226 silc_server_command_send_status_reply(cmd, SILC_COMMAND_WATCH,
4227 SILC_STATUS_ERR_NICKNAME_IN_USE,
4233 /* Get the nickname from the watcher list and use the same key in
4234 new entries as well. If key doesn't exist then create it. */
4235 if (!silc_hash_table_find(server->watcher_list, hash, (void *)&tmp, NULL))
4236 tmp = silc_memdup(hash, CLIENTID_HASH_LEN);
4238 /* Add the client to the watcher list with the specified nickname hash. */
4239 silc_hash_table_add(server->watcher_list, tmp, client);
4243 /* Delete nickname from watch list */
4245 nick = silc_identifier_check(del_nick, del_nick_len, SILC_STRING_UTF8, 128,
4248 silc_server_command_send_status_reply(cmd, SILC_COMMAND_WATCH,
4249 SILC_STATUS_ERR_BAD_NICKNAME, 0);
4253 /* Hash the nick, we have the hash saved, not nicks because we can
4254 do one to one mapping to the nick from Client ID hash this way. */
4255 silc_hash_make(server->md5hash, nick, del_nick_len, hash);
4257 /* Check that this client is watching for this nickname */
4258 if (!silc_hash_table_find_by_context(server->watcher_list, hash,
4259 client, (void *)&tmp)) {
4260 /* Nickname is alredy being watched for this client */
4261 silc_server_command_send_status_data(cmd, SILC_COMMAND_WATCH,
4262 SILC_STATUS_ERR_NO_SUCH_NICK, 0,
4263 2, nick, del_nick_len);
4268 /* Delete the nickname from the watcher list. */
4269 silc_hash_table_del_by_context(server->watcher_list, hash, client);
4271 /* Now check whether there still exists entries with this key, if not
4272 then free the key to not leak memory. */
4273 if (!silc_hash_table_find(server->watcher_list, hash, NULL, NULL))
4278 /* Add/del public key */
4281 SilcArgumentPayload pkargs;
4283 SilcPublicKey public_key, pkkey;
4286 silc_server_command_send_status_reply(cmd, SILC_COMMAND_WATCH,
4287 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
4292 /* Get the argument from the Argument List Payload */
4293 SILC_GET16_MSB(pkargc, pk);
4294 pkargs = silc_argument_payload_parse(pk + 2, pk_len - 2, pkargc);
4296 silc_server_command_send_status_reply(cmd, SILC_COMMAND_WATCH,
4297 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
4302 pk = silc_argument_get_next_arg(pkargs, &type, &pk_len);
4304 if (!silc_pkcs_public_key_payload_decode(pk, pk_len, &public_key))
4310 /* Add public key to watch list */
4312 /* Check whether this client is already watching this public key */
4313 if (silc_hash_table_find_by_context(server->watcher_list_pk,
4314 public_key, client, NULL)) {
4315 silc_pkcs_public_key_free(public_key);
4316 silc_server_command_send_status_reply(
4317 cmd, SILC_COMMAND_WATCH,
4318 SILC_STATUS_ERR_NICKNAME_IN_USE, 0);
4322 /* Get the public key from the watcher list and use the same key in
4323 new entries as well. If key doesn't exist then create it. */
4325 if (!silc_hash_table_find(server->watcher_list_pk, public_key,
4326 (void *)&pkkey, NULL))
4329 silc_pkcs_public_key_free(public_key);
4331 /* Add the client to the watcher list with the specified public
4333 silc_hash_table_add(server->watcher_list_pk, pkkey, client);
4335 } else if (type == 0x01) {
4336 /* Delete public key from watch list */
4338 /* Check that this client is watching this public key */
4339 if (silc_hash_table_find_by_context(server->watcher_list_pk,
4342 silc_pkcs_public_key_free(public_key);
4343 silc_server_command_send_status_reply(
4344 cmd, SILC_COMMAND_WATCH,
4345 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS, 0);
4349 /* Delete the public key from the watcher list. */
4350 silc_hash_table_del_by_context(server->watcher_list_pk,
4351 public_key, client);
4353 /* Now check whether there still exists entries with this key, if
4354 not then free the key to not leak memory. */
4355 if (!silc_hash_table_find(server->watcher_list_pk, hash, NULL, NULL))
4356 silc_pkcs_public_key_free(pkkey);
4357 silc_pkcs_public_key_free(public_key);
4360 pk = silc_argument_get_next_arg(pkargs, &type, &pk_len);
4365 silc_server_command_send_status_reply(cmd, SILC_COMMAND_WATCH,
4368 /* Distribute the watch list to backup routers too */
4369 if (server->backup) {
4373 cmd->server->stat.commands_sent++;
4375 old_ident = silc_command_get_ident(cmd->payload);
4376 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
4377 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
4378 silc_server_backup_send(server, cmd->sock->user_data, SILC_PACKET_COMMAND,
4379 cmd->packet->flags, tmpbuf->data, tmpbuf->len,
4381 silc_command_set_ident(cmd->payload, old_ident);
4382 silc_buffer_free(tmpbuf);
4386 silc_free(client_id);
4387 silc_server_command_free(cmd);
4390 /* Server side of SILCOPER command. Client uses this comand to obtain router
4391 operator privileges to this router. */
4393 SILC_SERVER_CMD_FUNC(silcoper)
4395 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
4396 SilcServer server = cmd->server;
4397 SilcClientEntry client = (SilcClientEntry)cmd->sock->user_data;
4398 unsigned char *username = NULL, *auth;
4400 SilcServerConfigAdmin *admin;
4401 SilcIDListData idata = (SilcIDListData)client;
4402 bool result = FALSE;
4403 SilcPublicKey cached_key;
4405 if (cmd->sock->type != SILC_SOCKET_TYPE_CLIENT || !client)
4408 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_SILCOPER, cmd, 1, 2);
4410 if (server->server_type != SILC_ROUTER) {
4411 silc_server_command_send_status_reply(cmd, SILC_COMMAND_SILCOPER,
4412 SILC_STATUS_ERR_AUTH_FAILED, 0);
4416 /* Get the username */
4417 username = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
4419 silc_server_command_send_status_reply(cmd, SILC_COMMAND_SILCOPER,
4420 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
4425 /* Check username */
4426 username = silc_identifier_check(username, tmp_len, SILC_STRING_UTF8, 128,
4429 silc_server_command_send_status_reply(cmd, SILC_COMMAND_OPER,
4430 SILC_STATUS_ERR_BAD_USERNAME,
4435 /* Get the admin configuration */
4436 admin = silc_server_config_find_admin(server, cmd->sock->ip,
4437 username, client->nickname);
4439 admin = silc_server_config_find_admin(server, cmd->sock->hostname,
4440 username, client->nickname);
4442 silc_server_command_send_status_reply(cmd, SILC_COMMAND_SILCOPER,
4443 SILC_STATUS_ERR_AUTH_FAILED, 0);
4444 SILC_LOG_INFO(("SILCOPER authentication failed for username '%s' by "
4445 "nickname '%s' from %s", username,
4446 client->nickname, cmd->sock->hostname));
4451 /* Get the authentication payload */
4452 auth = silc_argument_get_arg_type(cmd->args, 2, &tmp_len);
4454 silc_server_command_send_status_reply(cmd, SILC_COMMAND_SILCOPER,
4455 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
4460 /* Verify the authentication data. If both passphrase and public key
4461 is set then try both of them. */
4462 if (admin->passphrase)
4463 result = silc_auth_verify_data(auth, tmp_len, SILC_AUTH_PASSWORD,
4464 admin->passphrase, admin->passphrase_len,
4465 idata->hash, client->id, SILC_ID_CLIENT);
4466 if (!result && admin->publickeys) {
4467 cached_key = silc_server_get_public_key(server, admin->publickeys);
4470 result = silc_auth_verify_data(auth, tmp_len, SILC_AUTH_PUBLIC_KEY,
4471 cached_key, 0, idata->hash,
4472 client->id, SILC_ID_CLIENT);
4475 /* Authentication failed */
4476 silc_server_command_send_status_reply(cmd, SILC_COMMAND_OPER,
4477 SILC_STATUS_ERR_AUTH_FAILED, 0);
4481 /* Client is now router operator */
4482 client->mode |= SILC_UMODE_ROUTER_OPERATOR;
4484 /* Update statistics */
4485 if (SILC_IS_LOCAL(client))
4486 server->stat.my_router_ops++;
4487 if (server->server_type == SILC_ROUTER)
4488 server->stat.router_ops++;
4490 /* Send UMODE change to primary router */
4491 silc_server_send_notify_umode(server, SILC_PRIMARY_ROUTE(server),
4492 SILC_BROADCAST(server), client->id,
4495 /* Check if anyone is watching this nickname */
4496 if (server->server_type == SILC_ROUTER)
4497 silc_server_check_watcher_list(server, client, NULL,
4498 SILC_NOTIFY_TYPE_UMODE_CHANGE);
4500 /* Send reply to the sender */
4501 silc_server_command_send_status_reply(cmd, SILC_COMMAND_SILCOPER,
4505 silc_free(username);
4506 silc_server_command_free(cmd);
4509 /* Server side of command BAN. This is used to manage the ban list of the
4510 channel. To add clients and remove clients from the ban list. */
4512 SILC_SERVER_CMD_FUNC(ban)
4514 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
4515 SilcServer server = cmd->server;
4516 SilcClientEntry client = (SilcClientEntry)cmd->sock->user_data;
4517 SilcBuffer list, tmp2;
4518 SilcChannelEntry channel;
4519 SilcChannelClientEntry chl;
4520 SilcChannelID *channel_id = NULL;
4521 unsigned char *id, *tmp, *atype = NULL;
4522 SilcUInt32 id_len, len, len2;
4523 SilcArgumentPayload args;
4524 SilcHashTableList htl;
4526 SilcUInt16 argc = 0, ident = silc_command_get_ident(cmd->payload);
4527 SilcBufferStruct blist;
4529 if (cmd->sock->type != SILC_SOCKET_TYPE_CLIENT || !client)
4532 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_BAN, cmd, 0, 3);
4534 /* Get Channel ID */
4535 id = silc_argument_get_arg_type(cmd->args, 1, &id_len);
4537 channel_id = silc_id_payload_parse_id(id, id_len, NULL);
4539 silc_server_command_send_status_reply(cmd, SILC_COMMAND_BAN,
4540 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
4545 /* Get channel entry. The server must know about the channel since the
4546 client is expected to be on the channel. */
4547 channel = silc_idlist_find_channel_by_id(server->local_list,
4550 channel = silc_idlist_find_channel_by_id(server->global_list,
4553 silc_server_command_send_status_data(cmd, SILC_COMMAND_BAN,
4554 SILC_STATUS_ERR_NO_SUCH_CHANNEL_ID,
4560 /* Check whether this client is on the channel */
4561 if (!silc_server_client_on_channel(client, channel, &chl)) {
4562 silc_server_command_send_status_data(cmd, SILC_COMMAND_BAN,
4563 SILC_STATUS_ERR_NOT_ON_CHANNEL, 0,
4568 /* The client must be at least channel operator. */
4569 if (!(chl->mode & SILC_CHANNEL_UMODE_CHANOP)) {
4570 silc_server_command_send_status_data(cmd, SILC_COMMAND_BAN,
4571 SILC_STATUS_ERR_NO_CHANNEL_PRIV, 0,
4576 /* Get the ban information */
4577 tmp = silc_argument_get_arg_type(cmd->args, 3, &len2);
4578 if (tmp && len2 > 2) {
4579 /* Parse the arguments to see they are constructed correctly */
4580 SILC_GET16_MSB(argc, tmp);
4581 args = silc_argument_payload_parse(tmp + 2, len2 - 2, argc);
4583 silc_server_command_send_status_reply(cmd, SILC_COMMAND_BAN,
4584 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
4589 /* Get the type of action */
4590 atype = silc_argument_get_arg_type(cmd->args, 2, &len);
4591 if (atype && len == 1) {
4592 if (atype[0] == 0x00) {
4593 /* Allocate hash table for ban list if it doesn't exist yet */
4594 if (!channel->ban_list)
4596 silc_hash_table_alloc(0, silc_hash_ptr,
4598 silc_server_inviteban_destruct, channel,
4601 /* Check for resource limit */
4602 if (silc_hash_table_count(channel->ban_list) > 64) {
4603 silc_server_command_send_status_reply(cmd, SILC_COMMAND_BAN,
4604 SILC_STATUS_ERR_RESOURCE_LIMIT,
4610 /* Now add or delete the information. */
4611 if (!silc_server_inviteban_process(server, channel->ban_list,
4612 (SilcUInt8)atype[0], args)) {
4613 silc_server_command_send_status_reply(
4614 cmd, SILC_COMMAND_BAN,
4615 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
4620 silc_argument_payload_free(args);
4623 /* Encode ban list */
4625 if (channel->ban_list && silc_hash_table_count(channel->ban_list)) {
4626 list = silc_buffer_alloc_size(2);
4627 silc_buffer_format(list,
4628 SILC_STR_UI_SHORT(silc_hash_table_count(
4629 channel->ban_list)),
4631 silc_hash_table_list(channel->ban_list, &htl);
4632 while (silc_hash_table_get(&htl, (void *)&type, (void *)&tmp2))
4633 list = silc_argument_payload_encode_one(list, tmp2->data, tmp2->len,
4635 silc_hash_table_list_reset(&htl);
4638 /* Send BAN notify type to local servers (but not clients) and to
4640 if (atype && tmp && len2) {
4641 silc_buffer_set(&blist, tmp, len2);
4643 /* Send to local servers if we are router */
4644 if (server->server_type == SILC_ROUTER)
4645 silc_server_send_notify_to_channel(server, NULL, channel, FALSE, FALSE,
4646 SILC_NOTIFY_TYPE_BAN, 3,
4649 tmp ? blist.data : NULL,
4650 tmp ? blist.len : 0);
4652 /* Send to network. */
4653 silc_server_send_notify_ban(server, SILC_PRIMARY_ROUTE(server),
4654 SILC_BROADCAST(server), channel, atype,
4658 /* Send the reply back to the client */
4659 silc_server_send_command_reply(server, cmd->sock, SILC_COMMAND_BAN,
4660 SILC_STATUS_OK, 0, ident, 2,
4662 3, list ? list->data : NULL,
4663 list ? list->len : 0);
4664 silc_buffer_free(list);
4667 silc_free(channel_id);
4668 silc_server_command_free(cmd);
4671 /* Server side command of LEAVE. Removes client from a channel. */
4673 SILC_SERVER_CMD_FUNC(leave)
4675 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
4676 SilcServer server = cmd->server;
4677 SilcSocketConnection sock = cmd->sock;
4678 SilcClientEntry id_entry = (SilcClientEntry)cmd->sock->user_data;
4679 SilcChannelID *id = NULL;
4680 SilcChannelEntry channel;
4684 if (cmd->sock->type != SILC_SOCKET_TYPE_CLIENT || !id_entry)
4687 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_LEAVE, cmd, 1, 2);
4689 /* Get Channel ID */
4690 tmp = silc_argument_get_arg_type(cmd->args, 1, &len);
4692 silc_server_command_send_status_reply(cmd, SILC_COMMAND_LEAVE,
4693 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
4696 id = silc_id_payload_parse_id(tmp, len, NULL);
4698 silc_server_command_send_status_reply(cmd, SILC_COMMAND_LEAVE,
4699 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
4703 /* Get channel entry */
4704 channel = silc_idlist_find_channel_by_id(server->local_list, id, NULL);
4706 channel = silc_idlist_find_channel_by_id(server->global_list, id, NULL);
4708 silc_server_command_send_status_data(cmd, SILC_COMMAND_LEAVE,
4709 SILC_STATUS_ERR_NO_SUCH_CHANNEL_ID,
4715 /* Check whether this client is on the channel */
4716 if (!silc_server_client_on_channel(id_entry, channel, NULL)) {
4717 silc_server_command_send_status_data(cmd, SILC_COMMAND_LEAVE,
4718 SILC_STATUS_ERR_NOT_ON_CHANNEL, 0,
4723 /* Notify routers that they should remove this client from their list
4724 of clients on the channel. Send LEAVE notify type. */
4725 silc_server_send_notify_leave(server, SILC_PRIMARY_ROUTE(server),
4726 SILC_BROADCAST(server), channel, id_entry->id);
4728 silc_server_command_send_status_data(cmd, SILC_COMMAND_LEAVE,
4729 SILC_STATUS_OK, 0, 2, tmp, len);
4731 /* Remove client from channel */
4732 if (!silc_server_remove_from_one_channel(server, sock, channel, id_entry,
4734 /* If the channel does not exist anymore we won't send anything */
4737 if (!(channel->mode & SILC_CHANNEL_MODE_PRIVKEY)) {
4738 /* Re-generate channel key */
4739 if (!silc_server_create_channel_key(server, channel, 0))
4742 /* Send the channel key */
4743 silc_server_send_channel_key(server, NULL, channel,
4744 server->server_type == SILC_ROUTER ?
4745 FALSE : !server->standalone);
4750 silc_server_command_free(cmd);
4753 /* Server side of command USERS. Resolves clients and their USERS currently
4754 joined on the requested channel. The list of Client ID's and their modes
4755 on the channel is sent back. */
4757 SILC_SERVER_CMD_FUNC(users)
4759 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
4760 SilcServer server = cmd->server;
4761 SilcChannelEntry channel;
4762 SilcChannelID *id = NULL;
4764 unsigned char *channel_id;
4765 SilcUInt32 channel_id_len;
4766 SilcBuffer client_id_list;
4767 SilcBuffer client_mode_list;
4768 unsigned char lc[4];
4769 SilcUInt32 list_count = 0;
4770 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
4771 char *channel_name, *channel_namec = NULL;
4773 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_USERS, cmd, 1, 2);
4775 /* Get Channel ID */
4776 channel_id = silc_argument_get_arg_type(cmd->args, 1, &channel_id_len);
4778 /* Get channel name */
4779 channel_name = silc_argument_get_arg_type(cmd->args, 2, NULL);
4781 if (!channel_id && !channel_name) {
4782 silc_server_command_send_status_reply(cmd, SILC_COMMAND_USERS,
4783 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
4787 /* Check channel name */
4789 channel_namec = silc_channel_name_check(channel_name, strlen(channel_name),
4790 SILC_STRING_UTF8, 256, NULL);
4791 if (!channel_namec) {
4792 silc_server_command_send_status_reply(cmd, SILC_COMMAND_USERS,
4793 SILC_STATUS_ERR_BAD_CHANNEL, 0);
4798 /* Check Channel ID */
4800 id = silc_id_payload_parse_id(channel_id, channel_id_len, NULL);
4802 silc_server_command_send_status_data(cmd, SILC_COMMAND_USERS,
4803 SILC_STATUS_ERR_BAD_CHANNEL_ID, 0,
4804 2, channel_id, channel_id_len);
4809 /* If we are server and we don't know about this channel we will send
4810 the command to our router. If we know about the channel then we also
4811 have the list of users already. */
4813 channel = silc_idlist_find_channel_by_id(server->local_list, id, NULL);
4815 channel = silc_idlist_find_channel_by_name(server->local_list,
4816 channel_namec, NULL);
4818 if (!channel || (!server->standalone && (channel->disabled ||
4819 !channel->users_resolved))) {
4820 if (server->server_type != SILC_ROUTER && !server->standalone &&
4825 cmd->server->stat.commands_sent++;
4827 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
4828 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
4830 /* Send USERS command */
4831 silc_server_packet_send(server, SILC_PRIMARY_ROUTE(server),
4832 SILC_PACKET_COMMAND, cmd->packet->flags,
4833 tmpbuf->data, tmpbuf->len, TRUE);
4835 /* Reprocess this packet after received reply */
4836 silc_server_command_pending(server, SILC_COMMAND_USERS,
4837 silc_command_get_ident(cmd->payload),
4838 silc_server_command_users,
4839 silc_server_command_dup(cmd));
4840 cmd->pending = TRUE;
4841 silc_command_set_ident(cmd->payload, ident);
4842 silc_buffer_free(tmpbuf);
4847 /* Check the global list as well. */
4849 channel = silc_idlist_find_channel_by_id(server->global_list, id, NULL);
4851 channel = silc_idlist_find_channel_by_name(server->global_list,
4852 channel_namec, NULL);
4854 /* Channel really does not exist */
4856 silc_server_command_send_status_data(
4857 cmd, SILC_COMMAND_USERS,
4858 SILC_STATUS_ERR_NO_SUCH_CHANNEL_ID, 0,
4859 2, channel_id, channel_id_len);
4861 silc_server_command_send_status_data(
4862 cmd, SILC_COMMAND_USERS,
4863 SILC_STATUS_ERR_NO_SUCH_CHANNEL, 0,
4864 2, channel_name, strlen(channel_name));
4869 /* If the channel is private or secret do not send anything, unless the
4870 user requesting this command is on the channel or is server */
4871 if (cmd->sock->type == SILC_SOCKET_TYPE_CLIENT) {
4872 if (channel->mode & (SILC_CHANNEL_MODE_PRIVATE | SILC_CHANNEL_MODE_SECRET)
4873 && !silc_server_client_on_channel(cmd->sock->user_data, channel,
4875 silc_server_command_send_status_data(cmd, SILC_COMMAND_USERS,
4876 SILC_STATUS_ERR_NO_SUCH_CHANNEL, 0,
4877 2, channel->channel_name,
4878 strlen(channel->channel_name));
4883 /* Get the users list */
4884 if (!silc_server_get_users_on_channel(server, channel, &client_id_list,
4885 &client_mode_list, &list_count)) {
4887 client_id_list = NULL;
4888 client_mode_list = NULL;
4892 SILC_PUT32_MSB(list_count, lc);
4895 idp = silc_id_payload_encode(channel->id, SILC_ID_CHANNEL);
4896 silc_server_send_command_reply(server, cmd->sock, SILC_COMMAND_USERS,
4897 SILC_STATUS_OK, 0, ident, 4,
4898 2, idp->data, idp->len,
4901 client_id_list->data : NULL,
4903 client_id_list->len : 0,
4904 5, client_mode_list ?
4905 client_mode_list->data : NULL,
4907 client_mode_list->len : 0);
4908 silc_buffer_free(idp);
4910 silc_buffer_free(client_id_list);
4911 if (client_mode_list)
4912 silc_buffer_free(client_mode_list);
4916 silc_free(channel_namec);
4917 silc_server_command_free(cmd);
4920 /* Server side of command GETKEY. This fetches the client's public key
4921 from the server where to the client is connected. */
4923 SILC_SERVER_CMD_FUNC(getkey)
4925 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
4926 SilcServer server = cmd->server;
4927 SilcClientEntry client;
4928 SilcServerEntry server_entry;
4929 SilcClientID *client_id = NULL;
4930 SilcServerID *server_id = NULL;
4931 SilcIDPayload idp = NULL;
4932 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
4935 SilcBuffer pk = NULL;
4937 SilcPublicKey public_key;
4939 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
4941 silc_server_command_send_status_reply(cmd, SILC_COMMAND_GETKEY,
4942 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
4946 idp = silc_id_payload_parse(tmp, tmp_len);
4948 silc_server_command_send_status_reply(cmd, SILC_COMMAND_GETKEY,
4949 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
4954 id_type = silc_id_payload_get_type(idp);
4955 if (id_type == SILC_ID_CLIENT) {
4956 client_id = silc_id_payload_get_id(idp);
4958 /* If the client is not found from local list there is no chance it
4959 would be locally connected client so send the command further. */
4960 client = silc_idlist_find_client_by_id(server->local_list,
4961 client_id, TRUE, NULL);
4963 client = silc_idlist_find_client_by_id(server->global_list,
4964 client_id, TRUE, NULL);
4966 if ((!client && !cmd->pending && !server->standalone) ||
4967 (client && !client->connection && !cmd->pending &&
4968 !(client->mode & SILC_UMODE_DETACHED)) ||
4969 (client && !client->data.public_key && !cmd->pending)) {
4971 SilcUInt16 old_ident;
4972 SilcSocketConnection dest_sock;
4974 dest_sock = silc_server_get_client_route(server, NULL, 0,
4975 client_id, NULL, NULL);
4980 cmd->server->stat.commands_sent++;
4982 old_ident = silc_command_get_ident(cmd->payload);
4983 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
4984 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
4986 silc_server_packet_send(server, dest_sock,
4987 SILC_PACKET_COMMAND, cmd->packet->flags,
4988 tmpbuf->data, tmpbuf->len, TRUE);
4990 /* Reprocess this packet after received reply from router */
4991 silc_server_command_pending(server, SILC_COMMAND_GETKEY,
4992 silc_command_get_ident(cmd->payload),
4993 silc_server_command_getkey,
4994 silc_server_command_dup(cmd));
4995 cmd->pending = TRUE;
4996 silc_command_set_ident(cmd->payload, old_ident);
4997 silc_buffer_free(tmpbuf);
5002 silc_server_command_send_status_data(cmd, SILC_COMMAND_GETKEY,
5003 SILC_STATUS_ERR_NO_SUCH_CLIENT_ID,
5004 0, 2, tmp, tmp_len);
5008 /* The client is locally connected, just get the public key and
5009 send it back. If they key does not exist then do not send it,
5010 send just OK reply */
5011 public_key = client->data.public_key;
5013 pk = silc_pkcs_public_key_payload_encode(public_key);
5014 } else if (id_type == SILC_ID_SERVER) {
5015 server_id = silc_id_payload_get_id(idp);
5017 /* If the server is not found from local list there is no chance it
5018 would be locally connected server so send the command further. */
5019 server_entry = silc_idlist_find_server_by_id(server->local_list,
5020 server_id, TRUE, NULL);
5022 server_entry = silc_idlist_find_server_by_id(server->global_list,
5023 server_id, TRUE, NULL);
5025 if (server_entry != server->id_entry &&
5026 ((!server_entry && !cmd->pending && !server->standalone) ||
5027 (server_entry && !server_entry->connection && !cmd->pending &&
5028 !server->standalone) ||
5029 (server_entry && !server_entry->data.public_key && !cmd->pending &&
5030 !server->standalone))) {
5032 SilcUInt16 old_ident;
5035 cmd->server->stat.commands_sent++;
5037 old_ident = silc_command_get_ident(cmd->payload);
5038 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
5039 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
5041 silc_server_packet_send(server, SILC_PRIMARY_ROUTE(server),
5042 SILC_PACKET_COMMAND, cmd->packet->flags,
5043 tmpbuf->data, tmpbuf->len, TRUE);
5045 /* Reprocess this packet after received reply from router */
5046 silc_server_command_pending(server, SILC_COMMAND_GETKEY,
5047 silc_command_get_ident(cmd->payload),
5048 silc_server_command_getkey,
5049 silc_server_command_dup(cmd));
5050 cmd->pending = TRUE;
5051 silc_command_set_ident(cmd->payload, old_ident);
5052 silc_buffer_free(tmpbuf);
5056 if (!server_entry) {
5057 silc_server_command_send_status_data(cmd, SILC_COMMAND_GETKEY,
5058 SILC_STATUS_ERR_NO_SUCH_SERVER_ID,
5059 0, 2, tmp, tmp_len);
5063 /* If they key does not exist then do not send it, send just OK reply */
5064 public_key = (!server_entry->data.public_key ?
5065 (server_entry == server->id_entry ? server->public_key :
5066 NULL) : server_entry->data.public_key);
5068 pk = silc_pkcs_public_key_payload_encode(public_key);
5073 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
5074 silc_server_send_command_reply(server, cmd->sock, SILC_COMMAND_GETKEY,
5075 SILC_STATUS_OK, 0, ident, 2,
5077 3, pk ? pk->data : NULL,
5082 silc_id_payload_free(idp);
5083 silc_buffer_free(pk);
5084 silc_free(client_id);
5085 silc_free(server_id);
5086 silc_server_command_free(cmd);
5090 /* Private range commands, specific to this implementation */
5092 /* Server side command of CONNECT. Connects us to the specified remote
5093 server or router. */
5095 SILC_SERVER_CMD_FUNC(connect)
5097 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
5098 SilcServer server = cmd->server;
5099 SilcClientEntry client = (SilcClientEntry)cmd->sock->user_data;
5100 unsigned char *tmp, *host;
5102 SilcUInt32 port = SILC_PORT;
5104 if (cmd->sock->type != SILC_SOCKET_TYPE_CLIENT || !client)
5107 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_PRIV_CONNECT, cmd, 1, 2);
5109 /* Check whether client has the permissions. */
5110 if (!(client->mode & SILC_UMODE_SERVER_OPERATOR) &&
5111 !(client->mode & SILC_UMODE_ROUTER_OPERATOR)) {
5112 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_CONNECT,
5113 SILC_STATUS_ERR_NO_SERVER_PRIV, 0);
5117 if (server->server_type == SILC_ROUTER && !server->backup_router &&
5118 client->mode & SILC_UMODE_SERVER_OPERATOR) {
5119 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_CONNECT,
5120 SILC_STATUS_ERR_NO_ROUTER_PRIV, 0);
5124 /* Get the remote server */
5125 host = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
5127 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_CONNECT,
5128 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
5134 tmp = silc_argument_get_arg_type(cmd->args, 2, &tmp_len);
5136 SILC_GET32_MSB(port, tmp);
5138 /* Create the connection. It is done with timeout and is async. */
5139 silc_server_create_connection(server, host, port);
5141 /* Send reply to the sender */
5142 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_CONNECT,
5146 silc_server_command_free(cmd);
5149 /* Server side command of CLOSE. Closes connection to a specified server. */
5151 SILC_SERVER_CMD_FUNC(close)
5153 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
5154 SilcServer server = cmd->server;
5155 SilcClientEntry client = (SilcClientEntry)cmd->sock->user_data;
5156 SilcServerEntry server_entry;
5157 SilcSocketConnection sock;
5160 unsigned char *name;
5161 SilcUInt32 port = SILC_PORT;
5163 if (cmd->sock->type != SILC_SOCKET_TYPE_CLIENT || !client)
5166 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_PRIV_CLOSE, cmd, 1, 2);
5168 /* Check whether client has the permissions. */
5169 if (!(client->mode & SILC_UMODE_SERVER_OPERATOR) &&
5170 !(client->mode & SILC_UMODE_ROUTER_OPERATOR)) {
5171 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_CLOSE,
5172 SILC_STATUS_ERR_NO_SERVER_PRIV,
5177 /* Get the remote server */
5178 name = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
5180 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_CLOSE,
5181 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
5187 tmp = silc_argument_get_arg_type(cmd->args, 2, &tmp_len);
5189 SILC_GET32_MSB(port, tmp);
5191 server_entry = silc_idlist_find_server_by_conn(server->local_list,
5192 name, port, TRUE, NULL);
5194 server_entry = silc_idlist_find_server_by_conn(server->global_list,
5195 name, port, TRUE, NULL);
5196 if (!server_entry) {
5197 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_CLOSE,
5198 SILC_STATUS_ERR_NO_SERVER_ID, 0);
5202 if (server_entry == server->id_entry) {
5203 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_CLOSE,
5204 SILC_STATUS_ERR_NO_SERVER_ID, 0);
5208 /* Send reply to the sender */
5209 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_CLOSE,
5212 /* Close the connection to the server */
5213 sock = (SilcSocketConnection)server_entry->connection;
5215 if (server_entry->server_type == SILC_BACKUP_ROUTER) {
5216 server->backup_closed = TRUE;
5217 silc_server_backup_del(server, server_entry);
5220 server->backup_noswitch = TRUE;
5221 if (server->router == server_entry) {
5222 server->id_entry->router = NULL;
5223 server->router = NULL;
5224 server->standalone = TRUE;
5226 silc_server_disconnect_remote(server, sock,
5227 SILC_STATUS_ERR_BANNED_FROM_SERVER,
5228 "Closed by administrator");
5229 if (sock->user_data)
5230 silc_server_free_sock_user_data(server, sock, NULL);
5231 server->backup_noswitch = FALSE;
5234 silc_server_command_free(cmd);
5237 /* Server side command of SHUTDOWN. Shutdowns the server and closes all
5238 active connections. */
5240 SILC_SERVER_CMD_FUNC(shutdown)
5242 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
5243 SilcServer server = cmd->server;
5244 SilcClientEntry client = (SilcClientEntry)cmd->sock->user_data;
5246 if (cmd->sock->type != SILC_SOCKET_TYPE_CLIENT || !client)
5249 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_PRIV_SHUTDOWN, cmd, 0, 0);
5251 /* Check whether client has the permission. */
5252 if (!(client->mode & SILC_UMODE_SERVER_OPERATOR) &&
5253 !(client->mode & SILC_UMODE_ROUTER_OPERATOR)) {
5254 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_SHUTDOWN,
5255 SILC_STATUS_ERR_NO_SERVER_PRIV,
5260 /* Send reply to the sender */
5261 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_SHUTDOWN,
5264 /* Then, gracefully, or not, bring the server down. */
5265 silc_server_stop(server);
5269 silc_server_command_free(cmd);