5 Author: Pekka Riikonen <priikone@silcnet.org>
7 Copyright (C) 1997 - 2002 Pekka Riikonen
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; version 2 of the License.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
21 #include "serverincludes.h"
22 #include "server_internal.h"
24 static int silc_server_is_registered(SilcServer server,
25 SilcSocketConnection sock,
26 SilcServerCommandContext cmd,
29 silc_server_command_send_status_reply(SilcServerCommandContext cmd,
34 silc_server_command_send_status_data(SilcServerCommandContext cmd,
39 const unsigned char *arg,
42 silc_server_command_pending_error_check(SilcServerCommandContext cmd,
43 SilcServerCommandReplyContext cmdr,
45 SILC_TASK_CALLBACK(silc_server_command_process_timeout);
47 /* Server command list. */
48 SilcServerCommand silc_command_list[] =
50 SILC_SERVER_CMD(whois, WHOIS, SILC_CF_LAG | SILC_CF_REG),
51 SILC_SERVER_CMD(whowas, WHOWAS, SILC_CF_LAG | SILC_CF_REG),
52 SILC_SERVER_CMD(identify, IDENTIFY, SILC_CF_LAG | SILC_CF_REG),
53 SILC_SERVER_CMD(nick, NICK, SILC_CF_LAG_STRICT | SILC_CF_REG),
54 SILC_SERVER_CMD(list, LIST, SILC_CF_LAG_STRICT | SILC_CF_REG),
55 SILC_SERVER_CMD(topic, TOPIC, SILC_CF_LAG | SILC_CF_REG),
56 SILC_SERVER_CMD(invite, INVITE, SILC_CF_LAG | SILC_CF_REG),
57 SILC_SERVER_CMD(quit, QUIT, SILC_CF_LAG | SILC_CF_REG),
58 SILC_SERVER_CMD(kill, KILL, SILC_CF_LAG_STRICT | SILC_CF_REG | SILC_CF_OPER),
59 SILC_SERVER_CMD(info, INFO, SILC_CF_LAG | SILC_CF_REG),
60 SILC_SERVER_CMD(stats, STATS, SILC_CF_LAG | SILC_CF_REG),
61 SILC_SERVER_CMD(ping, PING, SILC_CF_LAG | SILC_CF_REG),
62 SILC_SERVER_CMD(oper, OPER, SILC_CF_LAG | SILC_CF_REG | SILC_CF_OPER),
63 SILC_SERVER_CMD(join, JOIN, SILC_CF_LAG_STRICT | SILC_CF_REG),
64 SILC_SERVER_CMD(motd, MOTD, SILC_CF_LAG | SILC_CF_REG),
65 SILC_SERVER_CMD(umode, UMODE, SILC_CF_LAG | SILC_CF_REG),
66 SILC_SERVER_CMD(cmode, CMODE, SILC_CF_LAG_STRICT | SILC_CF_REG),
67 SILC_SERVER_CMD(cumode, CUMODE, SILC_CF_LAG | SILC_CF_REG),
68 SILC_SERVER_CMD(kick, KICK, SILC_CF_LAG_STRICT | SILC_CF_REG),
69 SILC_SERVER_CMD(ban, BAN, SILC_CF_LAG_STRICT | SILC_CF_REG),
70 SILC_SERVER_CMD(detach, DETACH, SILC_CF_LAG_STRICT | SILC_CF_REG),
71 SILC_SERVER_CMD(watch, WATCH, SILC_CF_LAG | SILC_CF_REG),
72 SILC_SERVER_CMD(silcoper, SILCOPER,
73 SILC_CF_LAG | SILC_CF_REG | SILC_CF_SILC_OPER),
74 SILC_SERVER_CMD(leave, LEAVE, SILC_CF_LAG_STRICT | SILC_CF_REG),
75 SILC_SERVER_CMD(users, USERS, SILC_CF_LAG | SILC_CF_REG),
76 SILC_SERVER_CMD(getkey, GETKEY, SILC_CF_LAG | SILC_CF_REG),
78 SILC_SERVER_CMD(connect, PRIV_CONNECT,
79 SILC_CF_LAG | SILC_CF_REG | SILC_CF_OPER),
80 SILC_SERVER_CMD(close, PRIV_CLOSE,
81 SILC_CF_LAG | SILC_CF_REG | SILC_CF_OPER),
82 SILC_SERVER_CMD(shutdown, PRIV_SHUTDOWN, SILC_CF_LAG | SILC_CF_REG |
88 /* Performs several checks to the command. It first checks whether this
89 command was called as pending command callback. If it was then it checks
90 whether error occurred in the command reply where the pending command
93 It also checks that the requested command includes correct amount
95 #define SILC_SERVER_COMMAND_CHECK(command, context, min, max) \
99 if (silc_server_command_pending_error_check(cmd, context2, command)) { \
100 SILC_LOG_DEBUG(("Error occurred in command reply, command not called")); \
101 silc_server_command_free(cmd); \
105 _argc = silc_argument_get_arg_num(cmd->args); \
107 SILC_LOG_DEBUG(("Not enough parameters in command")); \
108 silc_server_command_send_status_reply(cmd, command, \
109 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS, \
111 silc_server_command_free(cmd); \
115 SILC_LOG_DEBUG(("Too many parameters in command")); \
116 silc_server_command_send_status_reply(cmd, command, \
117 SILC_STATUS_ERR_TOO_MANY_PARAMS, \
119 silc_server_command_free(cmd); \
124 /* Returns TRUE if the connection is registered. Unregistered connections
125 usually cannot send commands hence the check. */
127 static int silc_server_is_registered(SilcServer server,
128 SilcSocketConnection sock,
129 SilcServerCommandContext cmd,
132 SilcIDListData idata = (SilcIDListData)sock->user_data;
137 if (idata->status & SILC_IDLIST_STATUS_REGISTERED)
140 silc_server_command_send_status_reply(cmd, command,
141 SILC_STATUS_ERR_NOT_REGISTERED, 0);
145 /* Internal context to hold data when executed command with timeout. */
147 SilcServerCommandContext ctx;
148 SilcServerCommand *cmd;
149 } *SilcServerCommandTimeout;
151 /* Timeout callback to process commands with timeout for client. Client's
152 commands are always executed with timeout. */
154 SILC_TASK_CALLBACK(silc_server_command_process_timeout)
156 SilcServerCommandTimeout timeout = (SilcServerCommandTimeout)context;
157 SilcClientEntry client = (SilcClientEntry)timeout->ctx->sock->user_data;
160 SILC_LOG_DEBUG(("Client entry is invalid"));
161 silc_server_command_free(timeout->ctx);
165 /* Update access time */
166 client->last_command = time(NULL);
168 if (!(timeout->cmd->flags & SILC_CF_REG)) {
169 SILC_LOG_DEBUG(("Calling %s command",
170 silc_get_command_name(timeout->cmd->cmd)));
171 timeout->cmd->cb(timeout->ctx, NULL);
172 } else if (silc_server_is_registered(timeout->ctx->server,
175 timeout->cmd->cmd)) {
176 SILC_LOG_DEBUG(("Calling %s command",
177 silc_get_command_name(timeout->cmd->cmd)));
178 timeout->cmd->cb(timeout->ctx, NULL);
180 SILC_LOG_DEBUG(("Client is not registered"));
181 silc_server_command_free(timeout->ctx);
187 /* Processes received command packet. */
189 void silc_server_command_process(SilcServer server,
190 SilcSocketConnection sock,
191 SilcPacketContext *packet)
193 SilcServerCommandContext ctx;
194 SilcServerCommand *cmd;
197 /* Allocate command context. This must be free'd by the
198 command routine receiving it. */
199 ctx = silc_server_command_alloc();
200 ctx->server = server;
201 ctx->sock = silc_socket_dup(sock);
202 ctx->packet = silc_packet_context_dup(packet); /* Save original packet */
204 /* Parse the command payload in the packet */
205 ctx->payload = silc_command_payload_parse(packet->buffer->data,
206 packet->buffer->len);
208 SILC_LOG_ERROR(("Bad command payload, packet dropped"));
209 silc_packet_context_free(packet);
210 silc_socket_free(ctx->sock);
214 ctx->args = silc_command_get_args(ctx->payload);
216 /* Get the command */
217 command = silc_command_get(ctx->payload);
218 for (cmd = silc_command_list; cmd->cb; cmd++)
219 if (cmd->cmd == command)
222 if (!cmd || !cmd->cb) {
223 SILC_LOG_DEBUG(("Unknown command %d", command));
224 silc_server_command_send_status_reply(ctx, command,
225 SILC_STATUS_ERR_UNKNOWN_COMMAND, 0);
226 silc_server_command_free(ctx);
230 /* Execute client's commands always with timeout. Normally they are
231 executed with zero (0) timeout but if client is sending command more
232 frequently than once in 2 seconds, then the timeout may be 0 to 2
234 if (sock->type == SILC_SOCKET_TYPE_CLIENT) {
235 SilcClientEntry client = (SilcClientEntry)sock->user_data;
236 SilcServerCommandTimeout timeout;
240 SILC_LOG_DEBUG(("Client entry is invalid"));
241 silc_server_command_free(ctx);
244 timeout = silc_calloc(1, sizeof(*timeout));
248 if (client->last_command && (time(NULL) - client->last_command) < 2) {
249 client->fast_command++;
252 if (client->fast_command - 2 <= 0)
253 client->fast_command = 0;
255 client->fast_command -= 2;
259 if (!fast && ((cmd->flags & SILC_CF_LAG_STRICT) ||
260 (client->fast_command > 5 && cmd->flags & SILC_CF_LAG)))
261 silc_schedule_task_add(server->schedule, sock->sock,
262 silc_server_command_process_timeout, timeout,
263 (client->fast_command < 3 ? 0 :
264 2 - (time(NULL) - client->last_command)),
265 (client->fast_command < 3 ? 200000 : 0),
266 SILC_TASK_TIMEOUT, SILC_TASK_PRI_NORMAL);
268 silc_schedule_task_add(server->schedule, sock->sock,
269 silc_server_command_process_timeout, timeout,
270 0, 1, SILC_TASK_TIMEOUT, SILC_TASK_PRI_NORMAL);
274 /* Execute for server */
276 if (!(cmd->flags & SILC_CF_REG)) {
277 SILC_LOG_DEBUG(("Calling %s command", silc_get_command_name(cmd->cmd)));
279 } else if (silc_server_is_registered(server, sock, ctx, cmd->cmd)) {
280 SILC_LOG_DEBUG(("Calling %s command", silc_get_command_name(cmd->cmd)));
283 SILC_LOG_DEBUG(("Server is not registered"));
284 silc_server_command_free(ctx);
288 /* Allocate Command Context */
290 SilcServerCommandContext silc_server_command_alloc()
292 SilcServerCommandContext ctx = silc_calloc(1, sizeof(*ctx));
297 /* Free's the command context allocated before executing the command */
299 void silc_server_command_free(SilcServerCommandContext ctx)
302 SILC_LOG_DEBUG(("Command context %p refcnt %d->%d", ctx, ctx->users + 1,
304 if (ctx->users < 1) {
306 silc_command_payload_free(ctx->payload);
308 silc_packet_context_free(ctx->packet);
310 silc_socket_free(ctx->sock); /* Decrease reference counter */
315 /* Duplicate Command Context by adding reference counter. The context won't
316 be free'd untill it hits zero. */
318 SilcServerCommandContext
319 silc_server_command_dup(SilcServerCommandContext ctx)
322 SILC_LOG_DEBUG(("Command context %p refcnt %d->%d", ctx, ctx->users - 1,
327 /* Timeout for pending command. If reply to pending command never arrives
328 this is called to free resources. */
330 SILC_TASK_CALLBACK(silc_server_command_pending_timeout)
332 SilcServer server = app_context;
333 SilcServerCommandPending *reply = context;
334 SilcServerCommandReplyContext cmdr;
338 SILC_LOG_DEBUG(("Timeout pending command"));
340 /* Allocate temporary and bogus command reply context */
341 cmdr = silc_calloc(1, sizeof(*cmdr));
342 cmdr->server = server;
343 cmdr->ident = reply->ident;
345 /* Check for pending commands and mark to be exeucted */
347 silc_server_command_pending_check(server, reply->reply_cmd,
348 reply->ident, &cmdr->callbacks_count);
350 /* Create bogus command reply with an error inside */
352 silc_command_reply_payload_encode_va(reply->reply_cmd ? reply->reply_cmd :
353 SILC_COMMAND_RESERVED,
354 SILC_STATUS_ERR_TIMEDOUT, 0,
356 cmdr->payload = silc_command_payload_parse(tmpreply->data, tmpreply->len);
357 silc_buffer_free(tmpreply);
359 /* Call all callbacks. Same as SILC_SERVER_PENDING_EXEC macro. */
360 for (i = 0; i < cmdr->callbacks_count; i++)
361 if (cmdr->callbacks[i].callback)
362 (*cmdr->callbacks[i].callback)(cmdr->callbacks[i].context, cmdr);
364 silc_server_command_pending_del(server, reply->reply_cmd, reply->ident);
365 silc_server_command_reply_free(cmdr);
368 /* Add new pending command to be executed when reply to a command has been
369 received. The `reply_cmd' is the command that will call the `callback'
370 with `context' when reply has been received. It can be SILC_COMMAND_NONE
371 to match any command with the `ident'. If `ident' is non-zero
372 the `callback' will be executed when received reply with command
373 identifier `ident'. If there already exists pending command for the
374 specified command, ident, callback and context this function has no
377 bool silc_server_command_pending(SilcServer server,
378 SilcCommand reply_cmd,
380 SilcCommandCb callback,
383 return silc_server_command_pending_timed(server, reply_cmd, ident, callback,
387 /* Same as silc_server_command_pending with specific timeout for pending
388 commands. If the `timeout' is zero default timeout is used. */
390 bool silc_server_command_pending_timed(SilcServer server,
391 SilcCommand reply_cmd,
393 SilcCommandCb callback,
397 SilcServerCommandPending *reply;
399 /* Check whether identical pending already exists for same command,
400 ident, callback and callback context. If it does then it would be
401 error to register it again. */
402 silc_dlist_start(server->pending_commands);
403 while ((reply = silc_dlist_get(server->pending_commands)) != SILC_LIST_END) {
404 if (reply->reply_cmd == reply_cmd && reply->ident == ident &&
405 reply->callback == callback && reply->context == context)
409 reply = silc_calloc(1, sizeof(*reply));
410 reply->reply_cmd = reply_cmd;
411 reply->ident = ident;
412 reply->context = context;
413 reply->callback = callback;
415 silc_schedule_task_add(server->schedule, 0,
416 silc_server_command_pending_timeout, reply,
417 timeout ? timeout : 10, 0,
418 SILC_TASK_TIMEOUT, SILC_TASK_PRI_LOW);
419 silc_dlist_add(server->pending_commands, reply);
424 /* Deletes pending command by reply command type. */
426 void silc_server_command_pending_del(SilcServer server,
427 SilcCommand reply_cmd,
430 SilcServerCommandPending *r;
432 silc_dlist_start(server->pending_commands);
433 while ((r = silc_dlist_get(server->pending_commands)) != SILC_LIST_END) {
434 if ((r->reply_cmd == reply_cmd || (r->reply_cmd == SILC_COMMAND_NONE &&
436 && r->ident == ident) {
437 silc_dlist_del(server->pending_commands, r);
439 silc_schedule_task_del(server->schedule, r->timeout);
445 /* Checks for pending commands and marks callbacks to be called from
446 the command reply function. Returns TRUE if there were pending command. */
448 SilcServerCommandPendingCallbacks
449 silc_server_command_pending_check(SilcServer server,
452 SilcUInt32 *callbacks_count)
454 SilcServerCommandPending *r;
455 SilcServerCommandPendingCallbacks callbacks = NULL;
458 silc_dlist_start(server->pending_commands);
459 while ((r = silc_dlist_get(server->pending_commands)) != SILC_LIST_END) {
460 if ((r->reply_cmd == command || r->reply_cmd == SILC_COMMAND_NONE)
461 && r->ident == ident) {
462 callbacks = silc_realloc(callbacks, sizeof(*callbacks) * (i + 1));
463 callbacks[i].context = r->context;
464 callbacks[i].callback = r->callback;
465 r->reply_check = TRUE;
470 *callbacks_count = i;
474 /* Sends simple status message as command reply packet */
477 silc_server_command_send_status_reply(SilcServerCommandContext cmd,
484 SILC_LOG_DEBUG(("Sending command status %d", status));
487 silc_command_reply_payload_encode_va(command, status, error,
488 silc_command_get_ident(cmd->payload),
490 silc_server_packet_send(cmd->server, cmd->sock,
491 SILC_PACKET_COMMAND_REPLY, 0,
492 buffer->data, buffer->len, FALSE);
493 silc_buffer_free(buffer);
496 /* Sends command status reply with one extra argument. The argument
497 type must be sent as argument. */
500 silc_server_command_send_status_data(SilcServerCommandContext cmd,
505 const unsigned char *arg,
510 SILC_LOG_DEBUG(("Sending command status %d", status));
513 silc_command_reply_payload_encode_va(command, status, 0,
514 silc_command_get_ident(cmd->payload),
515 1, arg_type, arg, arg_len);
516 silc_server_packet_send(cmd->server, cmd->sock,
517 SILC_PACKET_COMMAND_REPLY, 0,
518 buffer->data, buffer->len, FALSE);
519 silc_buffer_free(buffer);
522 /* This function can be called to check whether in the command reply
523 an error occurred. This function has no effect if this is called
524 when the command function was not called as pending command callback.
525 This returns TRUE if error had occurred. */
528 silc_server_command_pending_error_check(SilcServerCommandContext cmd,
529 SilcServerCommandReplyContext cmdr,
532 if (!cmd->pending || !cmdr)
535 if (!silc_command_get_status(cmdr->payload, NULL, NULL)) {
538 /* Send the same command reply payload */
539 silc_command_set_command(cmdr->payload, silc_command_get(cmd->payload));
540 silc_command_set_ident(cmdr->payload,
541 silc_command_get_ident(cmd->payload));
542 buffer = silc_command_payload_encode_payload(cmdr->payload);
543 silc_server_packet_send(cmd->server, cmd->sock,
544 SILC_PACKET_COMMAND_REPLY, 0,
545 buffer->data, buffer->len, FALSE);
546 silc_buffer_free(buffer);
553 /* Server side of command WHOIS. */
555 SILC_SERVER_CMD_FUNC(whois)
557 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
558 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_WHOIS, cmd, 1, 256);
559 silc_server_query_command(cmd->server, SILC_COMMAND_WHOIS, cmd);
560 silc_server_command_free(cmd);
563 /* Server side of command WHOWAS. */
565 SILC_SERVER_CMD_FUNC(whowas)
567 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
568 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_WHOWAS, cmd, 1, 2);
569 silc_server_query_command(cmd->server, SILC_COMMAND_WHOWAS, cmd);
570 silc_server_command_free(cmd);
573 /* Server side of command IDENTIFY. */
575 SILC_SERVER_CMD_FUNC(identify)
577 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
578 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_IDENTIFY, cmd, 1, 256);
579 silc_server_query_command(cmd->server, SILC_COMMAND_IDENTIFY, cmd);
580 silc_server_command_free(cmd);
583 /* Server side of command NICK. Sets nickname for user. Setting
584 nickname causes generation of a new client ID for the client. The
585 new client ID is sent to the client after changing the nickname. */
587 SILC_SERVER_CMD_FUNC(nick)
589 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
590 SilcClientEntry client = (SilcClientEntry)cmd->sock->user_data;
591 SilcServer server = cmd->server;
592 SilcBuffer packet, nidp, oidp = NULL;
593 SilcClientID *new_id;
596 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
599 if (cmd->sock->type != SILC_SOCKET_TYPE_CLIENT || !client)
602 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_NICK, cmd, 1, 1);
605 nick = silc_argument_get_arg_type(cmd->args, 1, &nick_len);
607 silc_server_command_send_status_reply(cmd, SILC_COMMAND_NICK,
608 SILC_STATUS_ERR_BAD_NICKNAME, 0);
613 if (silc_server_name_bad_chars(nick, nick_len) == TRUE) {
614 silc_server_command_send_status_reply(cmd, SILC_COMMAND_NICK,
615 SILC_STATUS_ERR_BAD_NICKNAME, 0);
619 /* Check for same nickname */
620 if (!strcmp(client->nickname, nick)) {
621 nidp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
625 /* Create new Client ID */
626 while (!silc_id_create_client_id(cmd->server, cmd->server->id,
628 cmd->server->md5hash, nick,
632 silc_server_command_send_status_reply(cmd, SILC_COMMAND_NICK,
633 SILC_STATUS_ERR_BAD_NICKNAME, 0);
636 snprintf(&nick[strlen(nick) - 1], 1, "%d", nickfail);
639 /* Send notify about nickname change to our router. We send the new
640 ID and ask to replace it with the old one. If we are router the
641 packet is broadcasted. Send NICK_CHANGE notify. */
642 silc_server_send_notify_nick_change(server, SILC_PRIMARY_ROUTE(server),
643 SILC_BROADCAST(server), client->id,
646 /* Check if anyone is watching the old nickname */
647 if (server->server_type == SILC_ROUTER)
648 silc_server_check_watcher_list(server, client, nick,
649 SILC_NOTIFY_TYPE_NICK_CHANGE);
651 oidp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
653 /* Remove old cache entry */
654 silc_idcache_del_by_context(server->local_list->clients, client);
656 silc_free(client->id);
659 silc_free(client->nickname);
660 client->nickname = strdup(nick);
662 /* Update client cache */
663 silc_idcache_add(server->local_list->clients, client->nickname,
664 client->id, (void *)client, 0, NULL);
666 nidp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
668 /* Send NICK_CHANGE notify to the client's channels */
669 silc_server_send_notify_on_channels(server, NULL, client,
670 SILC_NOTIFY_TYPE_NICK_CHANGE, 3,
671 oidp->data, oidp->len,
672 nidp->data, nidp->len,
674 strlen(client->nickname));
676 /* Check if anyone is watching the new nickname */
677 if (server->server_type == SILC_ROUTER)
678 silc_server_check_watcher_list(server, client, NULL,
679 SILC_NOTIFY_TYPE_NICK_CHANGE);
682 /* Send the new Client ID as reply command back to client */
683 packet = silc_command_reply_payload_encode_va(SILC_COMMAND_NICK,
684 SILC_STATUS_OK, 0, ident, 2,
685 2, nidp->data, nidp->len,
686 3, nick, strlen(nick));
687 silc_server_packet_send(cmd->server, cmd->sock, SILC_PACKET_COMMAND_REPLY,
688 0, packet->data, packet->len, FALSE);
690 silc_buffer_free(packet);
691 silc_buffer_free(nidp);
693 silc_buffer_free(oidp);
696 silc_server_command_free(cmd);
699 /* Sends the LIST command reply */
702 silc_server_command_list_send_reply(SilcServerCommandContext cmd,
703 SilcChannelEntry *lch,
704 SilcUInt32 lch_count,
705 SilcChannelEntry *gch,
706 SilcUInt32 gch_count)
709 SilcBuffer packet, idp;
710 SilcChannelEntry entry;
712 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
714 unsigned char usercount[4];
716 int valid_lcount = 0, valid_rcount = 0;
718 for (i = 0; i < lch_count; i++) {
719 if (lch[i]->mode & SILC_CHANNEL_MODE_SECRET)
724 for (i = 0; i < gch_count; i++) {
725 if (gch[i]->mode & SILC_CHANNEL_MODE_SECRET)
731 status = SILC_STATUS_OK;
732 if ((lch_count + gch_count) > 1)
733 status = SILC_STATUS_LIST_START;
736 for (i = 0, k = 0; i < lch_count; i++) {
742 status = SILC_STATUS_LIST_ITEM;
743 if (valid_lcount > 1 && k == valid_lcount - 1 && !valid_rcount)
744 status = SILC_STATUS_LIST_END;
746 idp = silc_id_payload_encode(entry->id, SILC_ID_CHANNEL);
748 if (entry->mode & SILC_CHANNEL_MODE_PRIVATE) {
750 memset(usercount, 0, sizeof(usercount));
752 topic = entry->topic;
753 users = silc_hash_table_count(entry->user_list);
754 SILC_PUT32_MSB(users, usercount);
759 silc_command_reply_payload_encode_va(SILC_COMMAND_LIST,
761 2, idp->data, idp->len,
762 3, entry->channel_name,
763 strlen(entry->channel_name),
764 4, topic, topic ? strlen(topic) : 0,
766 silc_server_packet_send(cmd->server, cmd->sock,
767 SILC_PACKET_COMMAND_REPLY, 0, packet->data,
769 silc_buffer_free(packet);
770 silc_buffer_free(idp);
775 for (i = 0, k = 0; i < gch_count; i++) {
781 status = SILC_STATUS_LIST_ITEM;
782 if (valid_rcount > 1 && k == valid_rcount - 1)
783 status = SILC_STATUS_LIST_END;
785 idp = silc_id_payload_encode(entry->id, SILC_ID_CHANNEL);
787 if (entry->mode & SILC_CHANNEL_MODE_PRIVATE) {
789 memset(usercount, 0, sizeof(usercount));
791 topic = entry->topic;
792 users = entry->user_count;
793 SILC_PUT32_MSB(users, usercount);
798 silc_command_reply_payload_encode_va(SILC_COMMAND_LIST,
800 2, idp->data, idp->len,
801 3, entry->channel_name,
802 strlen(entry->channel_name),
803 4, topic, topic ? strlen(topic) : 0,
805 silc_server_packet_send(cmd->server, cmd->sock,
806 SILC_PACKET_COMMAND_REPLY, 0, packet->data,
808 silc_buffer_free(packet);
809 silc_buffer_free(idp);
814 /* Server side of LIST command. This lists the channel of the requested
815 server. Secret channels are not listed. */
817 SILC_SERVER_CMD_FUNC(list)
819 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
820 SilcServer server = cmd->server;
821 SilcChannelID *channel_id = NULL;
824 SilcChannelEntry *lchannels = NULL, *gchannels = NULL;
825 SilcUInt32 lch_count = 0, gch_count = 0;
827 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_LIST, cmd, 0, 1);
829 /* If we are normal server, send the command to router, since we
830 want to know all channels in the network. */
831 if (!cmd->pending && server->server_type != SILC_ROUTER &&
832 !server->standalone) {
834 SilcUInt16 old_ident;
836 old_ident = silc_command_get_ident(cmd->payload);
837 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
838 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
839 silc_server_packet_send(server, SILC_PRIMARY_ROUTE(server),
840 SILC_PACKET_COMMAND, cmd->packet->flags,
841 tmpbuf->data, tmpbuf->len, TRUE);
843 /* Reprocess this packet after received reply from router */
844 silc_server_command_pending(server, SILC_COMMAND_LIST,
845 silc_command_get_ident(cmd->payload),
846 silc_server_command_list,
847 silc_server_command_dup(cmd));
849 silc_command_set_ident(cmd->payload, old_ident);
850 silc_buffer_free(tmpbuf);
855 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
857 channel_id = silc_id_payload_parse_id(tmp, tmp_len, NULL);
859 silc_server_command_send_status_reply(cmd, SILC_COMMAND_LIST,
860 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
865 /* Get the channels from local list */
866 lchannels = silc_idlist_get_channels(server->local_list, channel_id,
869 /* Get the channels from global list */
870 gchannels = silc_idlist_get_channels(server->global_list, channel_id,
874 silc_server_command_list_send_reply(cmd, lchannels, lch_count,
875 gchannels, gch_count);
877 silc_free(lchannels);
878 silc_free(gchannels);
881 silc_server_command_free(cmd);
884 /* Server side of TOPIC command. Sets topic for channel and/or returns
885 current topic to client. */
887 SILC_SERVER_CMD_FUNC(topic)
889 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
890 SilcServer server = cmd->server;
891 SilcClientEntry client = (SilcClientEntry)cmd->sock->user_data;
892 SilcChannelID *channel_id;
893 SilcChannelEntry channel;
894 SilcChannelClientEntry chl;
895 SilcBuffer packet, idp;
897 SilcUInt32 argc, tmp_len;
898 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
900 if (cmd->sock->type != SILC_SOCKET_TYPE_CLIENT || !client)
903 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_TOPIC, cmd, 1, 2);
905 argc = silc_argument_get_arg_num(cmd->args);
908 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
910 silc_server_command_send_status_reply(cmd, SILC_COMMAND_TOPIC,
911 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
914 channel_id = silc_id_payload_parse_id(tmp, tmp_len, NULL);
916 silc_server_command_send_status_reply(cmd, SILC_COMMAND_TOPIC,
917 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
921 /* Check whether the channel exists */
922 channel = silc_idlist_find_channel_by_id(server->local_list,
925 channel = silc_idlist_find_channel_by_id(server->global_list,
928 silc_server_command_send_status_reply(cmd, SILC_COMMAND_TOPIC,
929 SILC_STATUS_ERR_NO_SUCH_CHANNEL,
937 tmp = silc_argument_get_arg_type(cmd->args, 2, NULL);
939 silc_server_command_send_status_reply(cmd, SILC_COMMAND_TOPIC,
940 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
945 if (strlen(tmp) > 256) {
946 silc_server_command_send_status_reply(cmd, SILC_COMMAND_TOPIC,
947 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
952 /* See whether the client is on channel and has rights to change topic */
953 if (!silc_server_client_on_channel(client, channel, &chl)) {
954 silc_server_command_send_status_reply(cmd, SILC_COMMAND_TOPIC,
955 SILC_STATUS_ERR_NOT_ON_CHANNEL,
960 if (channel->mode & SILC_CHANNEL_MODE_TOPIC &&
961 !(chl->mode & SILC_CHANNEL_UMODE_CHANOP) &&
962 !(chl->mode & SILC_CHANNEL_UMODE_CHANFO)) {
963 silc_server_command_send_status_reply(cmd, SILC_COMMAND_TOPIC,
964 SILC_STATUS_ERR_NO_CHANNEL_PRIV,
969 if (!channel->topic || strcmp(channel->topic, tmp)) {
970 /* Set the topic for channel */
971 silc_free(channel->topic);
972 channel->topic = strdup(tmp);
974 /* Send TOPIC_SET notify type to the network */
975 silc_server_send_notify_topic_set(server, SILC_PRIMARY_ROUTE(server),
976 SILC_BROADCAST(server), channel,
977 client->id, SILC_ID_CLIENT,
980 /* Send notify about topic change to all clients on the channel */
981 idp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
982 silc_server_send_notify_to_channel(server, NULL, channel, FALSE,
983 SILC_NOTIFY_TYPE_TOPIC_SET, 2,
986 strlen(channel->topic));
987 silc_buffer_free(idp);
991 /* Send the topic to client as reply packet */
992 idp = silc_id_payload_encode(channel_id, SILC_ID_CHANNEL);
993 packet = silc_command_reply_payload_encode_va(SILC_COMMAND_TOPIC,
994 SILC_STATUS_OK, 0, ident, 2,
995 2, idp->data, idp->len,
998 strlen(channel->topic) : 0);
999 silc_server_packet_send(cmd->server, cmd->sock, SILC_PACKET_COMMAND_REPLY,
1000 0, packet->data, packet->len, FALSE);
1002 silc_buffer_free(packet);
1003 silc_buffer_free(idp);
1004 silc_free(channel_id);
1007 silc_server_command_free(cmd);
1010 /* Server side of INVITE command. Invites some client to join some channel.
1011 This command is also used to manage the invite list of the channel. */
1013 SILC_SERVER_CMD_FUNC(invite)
1015 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
1016 SilcServer server = cmd->server;
1017 SilcSocketConnection sock = cmd->sock, dest_sock;
1018 SilcChannelClientEntry chl;
1019 SilcClientEntry sender, dest;
1020 SilcClientID *dest_id = NULL;
1021 SilcChannelEntry channel;
1022 SilcChannelID *channel_id = NULL;
1023 SilcIDListData idata;
1024 SilcArgumentPayload args;
1025 SilcHashTableList htl;
1026 SilcBuffer packet, list, tmp2;
1028 SilcUInt32 len, type;
1029 SilcUInt16 argc = 0, ident = silc_command_get_ident(cmd->payload);
1031 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_INVITE, cmd, 1, 4);
1033 /* Get Channel ID */
1034 tmp = silc_argument_get_arg_type(cmd->args, 1, &len);
1036 silc_server_command_send_status_reply(cmd, SILC_COMMAND_INVITE,
1037 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
1040 channel_id = silc_id_payload_parse_id(tmp, len, NULL);
1042 silc_server_command_send_status_reply(cmd, SILC_COMMAND_INVITE,
1043 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
1047 /* Get the channel entry */
1048 channel = silc_idlist_find_channel_by_id(server->local_list,
1051 channel = silc_idlist_find_channel_by_id(server->global_list,
1054 silc_server_command_send_status_reply(cmd, SILC_COMMAND_INVITE,
1055 SILC_STATUS_ERR_NO_SUCH_CHANNEL,
1061 /* Check whether the sender of this command is on the channel. */
1062 sender = (SilcClientEntry)sock->user_data;
1063 if (!sender || !silc_server_client_on_channel(sender, channel, &chl)) {
1064 silc_server_command_send_status_reply(cmd, SILC_COMMAND_INVITE,
1065 SILC_STATUS_ERR_NOT_ON_CHANNEL, 0);
1069 /* Check whether the channel is invite-only channel. If yes then the
1070 sender of this command must be at least channel operator. */
1071 if (channel->mode & SILC_CHANNEL_MODE_INVITE &&
1072 !(chl->mode & SILC_CHANNEL_UMODE_CHANOP) &&
1073 !(chl->mode & SILC_CHANNEL_UMODE_CHANFO)) {
1074 silc_server_command_send_status_reply(cmd, SILC_COMMAND_INVITE,
1075 SILC_STATUS_ERR_NO_CHANNEL_PRIV,
1080 /* Get destination client ID */
1081 tmp = silc_argument_get_arg_type(cmd->args, 2, &len);
1085 dest_id = silc_id_payload_parse_id(tmp, len, NULL);
1087 silc_server_command_send_status_reply(cmd, SILC_COMMAND_INVITE,
1088 SILC_STATUS_ERR_NO_CLIENT_ID, 0);
1092 /* Get the client entry */
1093 dest = silc_server_query_client(server, dest_id, FALSE, &resolve);
1095 if (server->server_type != SILC_SERVER || !resolve || cmd->pending) {
1096 silc_server_command_send_status_reply(
1097 cmd, SILC_COMMAND_INVITE,
1098 SILC_STATUS_ERR_NO_SUCH_CLIENT_ID, 0);
1102 /* The client info is being resolved. Reprocess this packet after
1103 receiving the reply to the query. */
1104 silc_server_command_pending(server, SILC_COMMAND_WHOIS,
1106 silc_server_command_invite,
1107 silc_server_command_dup(cmd));
1108 cmd->pending = TRUE;
1109 silc_free(channel_id);
1114 /* Check whether the requested client is already on the channel. */
1115 if (silc_server_client_on_channel(dest, channel, NULL)) {
1116 silc_server_command_send_status_reply(cmd, SILC_COMMAND_INVITE,
1117 SILC_STATUS_ERR_USER_ON_CHANNEL,
1122 /* Get route to the client */
1123 dest_sock = silc_server_get_client_route(server, NULL, 0, dest_id,
1126 silc_server_command_send_status_reply(cmd, SILC_COMMAND_INVITE,
1127 SILC_STATUS_ERR_NO_SUCH_CLIENT_ID,
1132 /* Add the client to the invite list */
1134 /* Allocate hash table for invite list if it doesn't exist yet */
1135 if (!channel->invite_list)
1136 channel->invite_list =
1137 silc_hash_table_alloc(0, silc_hash_ptr,
1139 silc_server_inviteban_destruct, channel, TRUE);
1141 /* Check if the ID is in the list already */
1142 silc_hash_table_list(channel->invite_list, &htl);
1143 while (silc_hash_table_get(&htl, (void **)&type, (void **)&tmp2)) {
1144 if (type == 3 && !memcmp(tmp2->data, tmp, len)) {
1149 silc_hash_table_list_reset(&htl);
1151 /* Add new Client ID to invite list */
1153 list = silc_buffer_alloc_size(len);
1154 silc_buffer_put(list, tmp, len);
1155 silc_hash_table_add(channel->invite_list, (void *)3, list);
1158 if (!(dest->mode & SILC_UMODE_BLOCK_INVITE)) {
1159 /* Send notify to the client that is invited to the channel */
1160 SilcBuffer idp, idp2;
1161 idp = silc_id_payload_encode(channel_id, SILC_ID_CHANNEL);
1162 idp2 = silc_id_payload_encode(sender->id, SILC_ID_CLIENT);
1163 silc_server_send_notify_dest(server, dest_sock, FALSE, dest_id,
1165 SILC_NOTIFY_TYPE_INVITE, 3,
1166 idp->data, idp->len,
1167 channel->channel_name,
1168 strlen(channel->channel_name),
1169 idp2->data, idp2->len);
1170 silc_buffer_free(idp);
1171 silc_buffer_free(idp2);
1175 /* Get the invite information */
1176 tmp = silc_argument_get_arg_type(cmd->args, 4, &len);
1177 if (tmp && len > 2) {
1178 /* Parse the arguments to see they are constructed correctly */
1179 SILC_GET16_MSB(argc, tmp);
1180 args = silc_argument_payload_parse(tmp + 2, len - 2, argc);
1182 silc_server_command_send_status_reply(cmd, SILC_COMMAND_INVITE,
1183 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
1188 /* Get the type of action */
1189 tmp = silc_argument_get_arg_type(cmd->args, 3, &len);
1190 if (tmp && len == 1) {
1191 if (tmp[0] == 0x00) {
1192 /* Allocate hash table for invite list if it doesn't exist yet */
1193 if (!channel->invite_list)
1194 channel->invite_list =
1195 silc_hash_table_alloc(0, silc_hash_ptr,
1197 silc_server_inviteban_destruct, channel,
1200 /* Check for resource limit */
1201 if (silc_hash_table_count(channel->invite_list) > 64) {
1202 silc_server_command_send_status_reply(cmd, SILC_COMMAND_INVITE,
1203 SILC_STATUS_ERR_RESOURCE_LIMIT,
1209 /* Now add or delete the information. */
1210 silc_server_inviteban_process(server, channel->invite_list,
1211 (SilcUInt8)tmp[0], args);
1213 silc_argument_payload_free(args);
1216 /* Encode invite list */
1218 if (channel->invite_list && silc_hash_table_count(channel->invite_list)) {
1219 list = silc_buffer_alloc_size(2);
1220 silc_buffer_format(list,
1221 SILC_STR_UI_SHORT(silc_hash_table_count(
1222 channel->invite_list)),
1224 silc_hash_table_list(channel->invite_list, &htl);
1225 while (silc_hash_table_get(&htl, (void **)&type, (void **)&tmp2)) {
1227 list = silc_argument_payload_encode_one(list, (char *)tmp2,
1228 strlen((char *)tmp2), type);
1230 list = silc_argument_payload_encode_one(list, tmp2->data, tmp2->len,
1233 silc_hash_table_list_reset(&htl);
1236 /* Send notify to the primary router */
1237 silc_server_send_notify_invite(
1238 server, SILC_PRIMARY_ROUTE(server),
1239 SILC_BROADCAST(server), channel, sender->id,
1240 silc_argument_get_arg_type(cmd->args, 3, NULL),
1243 /* Send invite list back only if the list was modified, or now arguments
1246 argc = silc_argument_get_arg_num(cmd->args);
1249 if (silc_argument_get_arg_type(cmd->args, 3, &len))
1252 /* Send command reply */
1253 tmp = silc_argument_get_arg_type(cmd->args, 1, &len);
1254 packet = silc_command_reply_payload_encode_va(SILC_COMMAND_INVITE,
1255 SILC_STATUS_OK, 0, ident, 2,
1259 type && list ? list->len : 0);
1260 silc_server_packet_send(server, cmd->sock, SILC_PACKET_COMMAND_REPLY, 0,
1261 packet->data, packet->len, FALSE);
1262 silc_buffer_free(packet);
1263 silc_buffer_free(list);
1267 silc_free(channel_id);
1268 silc_server_command_free(cmd);
1272 SilcSocketConnection sock;
1276 /* Quits connection to client. This gets called if client won't
1277 close the connection even when it has issued QUIT command. */
1279 SILC_TASK_CALLBACK(silc_server_command_quit_cb)
1281 SilcServer server = app_context;
1282 QuitInternal q = (QuitInternal)context;
1284 /* Free all client specific data, such as client entry and entires
1285 on channels this client may be on. */
1286 silc_server_free_client_data(server, q->sock, q->sock->user_data,
1288 q->sock->user_data = NULL;
1290 /* Close the connection on our side */
1291 silc_server_close_connection(server, q->sock);
1293 silc_socket_free(q->sock);
1294 silc_free(q->signoff);
1298 /* Quits SILC session. This is the normal way to disconnect client. */
1300 SILC_SERVER_CMD_FUNC(quit)
1302 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
1303 SilcServer server = cmd->server;
1304 SilcSocketConnection sock = cmd->sock;
1306 unsigned char *tmp = NULL;
1309 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_QUIT, cmd, 0, 1);
1311 if (cmd->sock->type != SILC_SOCKET_TYPE_CLIENT)
1315 tmp = silc_argument_get_arg_type(cmd->args, 1, &len);
1319 q = silc_calloc(1, sizeof(*q));
1320 q->sock = silc_socket_dup(sock);
1321 q->signoff = tmp ? strdup(tmp) : NULL;
1323 /* We quit the connection with little timeout */
1324 silc_schedule_task_add(server->schedule, sock->sock,
1325 silc_server_command_quit_cb, (void *)q,
1326 0, 200000, SILC_TASK_TIMEOUT, SILC_TASK_PRI_LOW);
1329 silc_server_command_free(cmd);
1332 /* Server side of command KILL. This command is used by router operator
1333 to remove an client from the SILC Network temporarily. */
1335 SILC_SERVER_CMD_FUNC(kill)
1337 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
1338 SilcServer server = cmd->server;
1339 SilcClientEntry client = (SilcClientEntry)cmd->sock->user_data;
1340 SilcClientEntry remote_client;
1341 SilcClientID *client_id = NULL;
1342 unsigned char *tmp, *comment, *auth;
1343 SilcUInt32 tmp_len, tmp_len2, auth_len;
1345 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_KILL, cmd, 1, 3);
1347 if (cmd->sock->type != SILC_SOCKET_TYPE_CLIENT || !client)
1350 /* Get authentication payload if present */
1351 auth = silc_argument_get_arg_type(cmd->args, 3, &auth_len);
1354 /* Router operator killing */
1356 /* KILL command works only on router */
1357 if (server->server_type != SILC_ROUTER) {
1358 silc_server_command_send_status_reply(cmd, SILC_COMMAND_KILL,
1359 SILC_STATUS_ERR_NO_ROUTER_PRIV, 0);
1363 /* Check whether client has the permissions. */
1364 if (!(client->mode & SILC_UMODE_ROUTER_OPERATOR)) {
1365 silc_server_command_send_status_reply(cmd, SILC_COMMAND_KILL,
1366 SILC_STATUS_ERR_NO_ROUTER_PRIV, 0);
1371 /* Get the client ID */
1372 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
1374 silc_server_command_send_status_reply(cmd, SILC_COMMAND_KILL,
1375 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
1379 client_id = silc_id_payload_parse_id(tmp, tmp_len, NULL);
1381 silc_server_command_send_status_reply(cmd, SILC_COMMAND_KILL,
1382 SILC_STATUS_ERR_NO_SUCH_CLIENT_ID,
1387 /* Get the client entry */
1388 remote_client = silc_idlist_find_client_by_id(server->local_list,
1389 client_id, TRUE, NULL);
1390 if (!remote_client) {
1391 remote_client = silc_idlist_find_client_by_id(server->global_list,
1392 client_id, TRUE, NULL);
1393 if (!remote_client) {
1394 silc_server_command_send_status_reply(cmd, SILC_COMMAND_KILL,
1395 SILC_STATUS_ERR_NO_SUCH_CLIENT_ID,
1402 comment = silc_argument_get_arg_type(cmd->args, 2, &tmp_len2);
1403 if (comment && tmp_len2 > 128) {
1405 comment[127] = '\0';
1408 /* If authentication data is provided then verify that killing is
1410 if (auth && auth_len) {
1411 SilcSocketConnection sock;
1413 if (!SILC_IS_LOCAL(remote_client) || !remote_client->data.public_key) {
1414 silc_server_command_send_status_reply(cmd, SILC_COMMAND_KILL,
1415 SILC_STATUS_ERR_OPERATION_ALLOWED,
1420 /* Verify the signature */
1421 if (!silc_auth_verify_data(auth, auth_len, SILC_AUTH_PUBLIC_KEY,
1422 remote_client->data.public_key, 0,
1423 server->sha1hash, remote_client->id,
1425 silc_server_command_send_status_reply(cmd, SILC_COMMAND_KILL,
1426 SILC_STATUS_ERR_AUTH_FAILED,
1431 /* Send reply to the sender */
1432 silc_server_command_send_status_reply(cmd, SILC_COMMAND_KILL,
1435 /* Do normal signoff for the destination client */
1436 sock = remote_client->connection;
1437 silc_server_remove_from_channels(server, NULL, remote_client,
1438 TRUE, (char *)"Killed", TRUE, TRUE);
1439 silc_server_free_client_data(server, NULL, remote_client, TRUE,
1441 (unsigned char *)"Killed");
1443 silc_server_close_connection(server, sock);
1445 /* Router operator killing */
1447 /* Send reply to the sender */
1448 silc_server_command_send_status_reply(cmd, SILC_COMMAND_KILL,
1451 /* Check if anyone is watching this nickname */
1452 if (server->server_type == SILC_ROUTER)
1453 silc_server_check_watcher_list(server, client, NULL,
1454 SILC_NOTIFY_TYPE_KILLED);
1456 /* Now do the killing */
1457 silc_server_kill_client(server, remote_client, comment, client->id,
1462 silc_free(client_id);
1463 silc_server_command_free(cmd);
1466 /* Server side of command INFO. This sends information about us to
1467 the client. If client requested specific server we will send the
1468 command to that server. */
1470 SILC_SERVER_CMD_FUNC(info)
1472 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
1473 SilcServer server = cmd->server;
1474 SilcBuffer packet, idp;
1477 char *dest_server, *server_info = NULL, *server_name;
1478 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
1479 SilcServerEntry entry = NULL;
1480 SilcServerID *server_id = NULL;
1482 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_INFO, cmd, 0, 2);
1484 /* Get server name */
1485 dest_server = silc_argument_get_arg_type(cmd->args, 1, NULL);
1488 tmp = silc_argument_get_arg_type(cmd->args, 2, &tmp_len);
1490 server_id = silc_id_payload_parse_id(tmp, tmp_len, NULL);
1492 silc_server_command_send_status_reply(cmd, SILC_COMMAND_INFO,
1493 SILC_STATUS_ERR_NO_SERVER_ID, 0);
1499 /* Check whether we have this server cached */
1500 entry = silc_idlist_find_server_by_id(server->local_list,
1501 server_id, TRUE, NULL);
1503 entry = silc_idlist_find_server_by_id(server->global_list,
1504 server_id, TRUE, NULL);
1505 if (!entry && server->server_type != SILC_SERVER) {
1506 silc_server_command_send_status_reply(cmd, SILC_COMMAND_INFO,
1507 SILC_STATUS_ERR_NO_SUCH_SERVER,
1514 /* Some buggy servers has sent request to router about themselves. */
1515 if (server->server_type != SILC_SERVER && cmd->sock->user_data == entry)
1518 if ((!dest_server && !server_id && !entry) || (entry &&
1519 entry == server->id_entry) ||
1520 (dest_server && !cmd->pending &&
1521 !strncasecmp(dest_server, server->server_name, strlen(dest_server)))) {
1522 /* Send our reply */
1523 char info_string[256];
1525 memset(info_string, 0, sizeof(info_string));
1526 snprintf(info_string, sizeof(info_string),
1527 "location: %s server: %s admin: %s <%s>",
1528 server->config->server_info->location,
1529 server->config->server_info->server_type,
1530 server->config->server_info->admin,
1531 server->config->server_info->email);
1533 server_info = info_string;
1534 entry = server->id_entry;
1536 /* Check whether we have this server cached */
1537 if (!entry && dest_server) {
1538 entry = silc_idlist_find_server_by_name(server->global_list,
1539 dest_server, TRUE, NULL);
1541 entry = silc_idlist_find_server_by_name(server->local_list,
1542 dest_server, TRUE, NULL);
1546 if (!cmd->pending &&
1547 server->server_type != SILC_SERVER && entry && !entry->server_info) {
1548 /* Send to the server */
1550 SilcUInt16 old_ident;
1552 old_ident = silc_command_get_ident(cmd->payload);
1553 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
1554 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
1556 silc_server_packet_send(server, entry->connection,
1557 SILC_PACKET_COMMAND, cmd->packet->flags,
1558 tmpbuf->data, tmpbuf->len, TRUE);
1560 /* Reprocess this packet after received reply from router */
1561 silc_server_command_pending(server, SILC_COMMAND_INFO,
1562 silc_command_get_ident(cmd->payload),
1563 silc_server_command_info,
1564 silc_server_command_dup(cmd));
1565 cmd->pending = TRUE;
1566 silc_command_set_ident(cmd->payload, old_ident);
1567 silc_buffer_free(tmpbuf);
1571 if (!entry && !cmd->pending && !server->standalone) {
1572 /* Send to the primary router */
1574 SilcUInt16 old_ident;
1576 old_ident = silc_command_get_ident(cmd->payload);
1577 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
1578 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
1580 silc_server_packet_send(server, SILC_PRIMARY_ROUTE(server),
1581 SILC_PACKET_COMMAND, cmd->packet->flags,
1582 tmpbuf->data, tmpbuf->len, TRUE);
1584 /* Reprocess this packet after received reply from router */
1585 silc_server_command_pending(server, SILC_COMMAND_INFO,
1586 silc_command_get_ident(cmd->payload),
1587 silc_server_command_info,
1588 silc_server_command_dup(cmd));
1589 cmd->pending = TRUE;
1590 silc_command_set_ident(cmd->payload, old_ident);
1591 silc_buffer_free(tmpbuf);
1596 silc_free(server_id);
1599 silc_server_command_send_status_reply(cmd, SILC_COMMAND_INFO,
1600 SILC_STATUS_ERR_NO_SUCH_SERVER, 0);
1604 idp = silc_id_payload_encode(entry->id, SILC_ID_SERVER);
1606 server_info = entry->server_info;
1607 server_name = entry->server_name;
1609 /* Send the reply */
1610 packet = silc_command_reply_payload_encode_va(SILC_COMMAND_INFO,
1611 SILC_STATUS_OK, 0, ident, 3,
1612 2, idp->data, idp->len,
1614 strlen(server_name),
1617 strlen(server_info) : 0);
1618 silc_server_packet_send(server, cmd->sock, SILC_PACKET_COMMAND_REPLY, 0,
1619 packet->data, packet->len, FALSE);
1621 silc_buffer_free(packet);
1622 silc_buffer_free(idp);
1625 silc_server_command_free(cmd);
1628 /* Server side of command PING. This just replies to the ping. */
1630 SILC_SERVER_CMD_FUNC(ping)
1632 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
1633 SilcServer server = cmd->server;
1636 SilcServerID *server_id = NULL;
1638 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_PING, cmd, 1, 1);
1641 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
1643 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PING,
1644 SILC_STATUS_ERR_NO_SERVER_ID, 0);
1647 server_id = silc_id_payload_parse_id(tmp, tmp_len, NULL);
1651 if (SILC_ID_SERVER_COMPARE(server_id, server->id)) {
1652 /* Send our reply */
1653 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PING,
1656 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PING,
1657 SILC_STATUS_ERR_NO_SUCH_SERVER, 0);
1662 silc_free(server_id);
1663 silc_server_command_free(cmd);
1666 /* Server side of command STATS. */
1668 SILC_SERVER_CMD_FUNC(stats)
1670 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
1671 SilcServer server = cmd->server;
1672 SilcServerID *server_id;
1675 SilcBuffer packet, stats;
1676 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
1679 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_STATS, cmd, 1, 1);
1682 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
1684 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PING,
1685 SILC_STATUS_ERR_NO_SERVER_ID, 0);
1688 server_id = silc_id_payload_parse_id(tmp, tmp_len, NULL);
1692 /* The ID must be ours */
1693 if (!SILC_ID_SERVER_COMPARE(server->id, server_id)) {
1694 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PING,
1695 SILC_STATUS_ERR_NO_SUCH_SERVER, 0);
1696 silc_free(server_id);
1699 silc_free(server_id);
1701 /* If we are router then just send everything we got. If we are normal
1702 server then we'll send this to our router to get all the latest
1703 statistical information. */
1704 if (!cmd->pending && server->server_type != SILC_ROUTER &&
1705 !server->standalone) {
1706 /* Send request to our router */
1707 SilcBuffer idp = silc_id_payload_encode(server->router->id,
1709 packet = silc_command_payload_encode_va(SILC_COMMAND_STATS,
1710 ++server->cmd_ident, 1,
1711 1, idp->data, idp->len);
1712 silc_server_packet_send(server, SILC_PRIMARY_ROUTE(server),
1713 SILC_PACKET_COMMAND, 0, packet->data,
1714 packet->len, FALSE);
1716 /* Reprocess this packet after received reply from router */
1717 silc_server_command_pending(server, SILC_COMMAND_STATS,
1719 silc_server_command_stats,
1720 silc_server_command_dup(cmd));
1721 cmd->pending = TRUE;
1722 silc_buffer_free(packet);
1723 silc_buffer_free(idp);
1727 /* Send our reply to sender */
1728 uptime = time(NULL) - server->starttime;
1730 stats = silc_buffer_alloc_size(60);
1731 silc_buffer_format(stats,
1732 SILC_STR_UI_INT(server->starttime),
1733 SILC_STR_UI_INT(uptime),
1734 SILC_STR_UI_INT(server->stat.my_clients),
1735 SILC_STR_UI_INT(server->stat.my_channels),
1736 SILC_STR_UI_INT(server->stat.my_server_ops),
1737 SILC_STR_UI_INT(server->stat.my_router_ops),
1738 SILC_STR_UI_INT(server->stat.cell_clients),
1739 SILC_STR_UI_INT(server->stat.cell_channels),
1740 SILC_STR_UI_INT(server->stat.cell_servers),
1741 SILC_STR_UI_INT(server->stat.clients),
1742 SILC_STR_UI_INT(server->stat.channels),
1743 SILC_STR_UI_INT(server->stat.servers),
1744 SILC_STR_UI_INT(server->stat.routers),
1745 SILC_STR_UI_INT(server->stat.server_ops),
1746 SILC_STR_UI_INT(server->stat.router_ops),
1749 packet = silc_command_reply_payload_encode_va(SILC_COMMAND_STATS,
1750 SILC_STATUS_OK, 0, ident, 2,
1752 3, stats->data, stats->len);
1753 silc_server_packet_send(server, cmd->sock, SILC_PACKET_COMMAND_REPLY,
1754 0, packet->data, packet->len, FALSE);
1755 silc_buffer_free(packet);
1756 silc_buffer_free(stats);
1759 silc_server_command_free(cmd);
1762 /* Internal routine to join channel. The channel sent to this function
1763 has been either created or resolved from ID lists. This joins the sent
1764 client to the channel. */
1766 static void silc_server_command_join_channel(SilcServer server,
1767 SilcServerCommandContext cmd,
1768 SilcChannelEntry channel,
1769 SilcClientID *client_id,
1773 const unsigned char *auth,
1774 SilcUInt32 auth_len)
1776 SilcSocketConnection sock = cmd->sock;
1778 SilcUInt32 tmp_len, user_count;
1779 unsigned char *passphrase = NULL, mode[4], tmp2[4], tmp3[4];
1780 SilcClientEntry client;
1781 SilcChannelClientEntry chl;
1782 SilcBuffer reply, chidp, clidp, keyp = NULL;
1783 SilcBuffer user_list, mode_list, invite_list, ban_list;
1784 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
1785 char check[512], check2[512];
1786 bool founder = FALSE;
1788 SilcBuffer fkey = NULL;
1791 SILC_LOG_DEBUG(("Joining client to channel"));
1796 /* Get the client entry */
1797 if (cmd->sock->type == SILC_SOCKET_TYPE_CLIENT) {
1798 client = (SilcClientEntry)sock->user_data;
1802 client = silc_server_query_client(server, client_id, FALSE,
1805 if (!resolve || cmd->pending) {
1806 silc_server_command_send_status_reply(
1807 cmd, SILC_COMMAND_JOIN,
1808 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS, 0);
1812 /* The client info is being resolved. Reprocess this packet after
1813 receiving the reply to the query. */
1814 silc_server_command_pending(server, SILC_COMMAND_WHOIS,
1816 silc_server_command_join,
1817 silc_server_command_dup(cmd));
1818 cmd->pending = TRUE;
1822 if (auth && auth_len && !client->data.public_key) {
1823 if (cmd->pending == 2)
1826 /* We must retrieve the detached client's public key by sending
1827 GETKEY command. Reprocess this packet after receiving the key */
1828 clidp = silc_id_payload_encode(client_id, SILC_ID_CLIENT);
1829 silc_server_send_command(server, cmd->sock,
1830 SILC_COMMAND_GETKEY, ++server->cmd_ident,
1831 1, 1, clidp->data, clidp->len);
1832 silc_buffer_free(clidp);
1833 silc_server_command_pending(server, SILC_COMMAND_GETKEY,
1835 silc_server_command_join,
1836 silc_server_command_dup(cmd));
1841 cmd->pending = FALSE;
1845 * Check founder auth payload if provided. If client can gain founder
1846 * privileges it can override various conditions on joining the channel,
1847 * and can have directly the founder mode set on the channel.
1849 if (auth && auth_len && channel->mode & SILC_CHANNEL_MODE_FOUNDER_AUTH) {
1850 SilcIDListData idata = (SilcIDListData)client;
1851 SilcChannelClientEntry chl2;
1852 SilcHashTableList htl;
1854 if (channel->founder_key && idata->public_key &&
1855 silc_pkcs_public_key_compare(channel->founder_key,
1856 idata->public_key)) {
1857 /* Check whether the client is to become founder */
1858 if (silc_auth_verify_data(auth, auth_len, SILC_AUTH_PUBLIC_KEY,
1859 channel->founder_key, 0, server->sha1hash,
1860 client->id, SILC_ID_CLIENT)) {
1862 /* There cannot be anyone else as founder on the channel now. This
1863 client is definitely the founder due to this authentication */
1864 silc_hash_table_list(channel->user_list, &htl);
1865 while (silc_hash_table_get(&htl, NULL, (void *)&chl2))
1866 if (chl2->mode & SILC_CHANNEL_UMODE_CHANFO) {
1867 chl2->mode &= ~SILC_CHANNEL_UMODE_CHANFO;
1868 silc_server_force_cumode_change(server, NULL, channel, chl2,
1872 silc_hash_table_list_reset(&htl);
1874 umode = (SILC_CHANNEL_UMODE_CHANOP | SILC_CHANNEL_UMODE_CHANFO);
1881 * Check channel modes
1885 memset(check, 0, sizeof(check));
1886 memset(check2, 0, sizeof(check2));
1887 silc_strncat(check, sizeof(check),
1888 client->nickname, strlen(client->nickname));
1889 silc_strncat(check, sizeof(check), "!", 1);
1890 silc_strncat(check, sizeof(check),
1891 client->username, strlen(client->username));
1892 if (!strchr(client->username, '@')) {
1893 silc_strncat(check, sizeof(check), "@", 1);
1894 silc_strncat(check, sizeof(check),
1895 cmd->sock->hostname, strlen(cmd->sock->hostname));
1898 silc_strncat(check2, sizeof(check2),
1899 client->nickname, strlen(client->nickname));
1900 if (!strchr(client->nickname, '@')) {
1901 silc_strncat(check2, sizeof(check2), "@", 1);
1902 silc_strncat(check2, sizeof(check2),
1903 server->server_name, strlen(server->server_name));
1905 silc_strncat(check2, sizeof(check2), "!", 1);
1906 silc_strncat(check2, sizeof(check2),
1907 client->username, strlen(client->username));
1908 if (!strchr(client->username, '@')) {
1909 silc_strncat(check2, sizeof(check2), "@", 1);
1910 silc_strncat(check2, sizeof(check2),
1911 cmd->sock->hostname, strlen(cmd->sock->hostname));
1914 /* Check invite list if channel is invite-only channel */
1915 if (channel->mode & SILC_CHANNEL_MODE_INVITE) {
1916 if (!channel->invite_list ||
1917 !silc_hash_table_count(channel->invite_list) ||
1918 (!silc_server_inviteban_match(server, channel->invite_list,
1920 !silc_server_inviteban_match(server, channel->invite_list,
1921 2, client->data.public_key) &&
1922 !silc_server_inviteban_match(server, channel->invite_list,
1924 !silc_server_inviteban_match(server, channel->invite_list,
1926 silc_server_command_send_status_reply(cmd, SILC_COMMAND_JOIN,
1927 SILC_STATUS_ERR_NOT_INVITED, 0);
1932 /* Check ban list if it exists. If the client's nickname, server,
1933 username and/or hostname is in the ban list the access to the
1934 channel is denied. */
1935 if (channel->ban_list && silc_hash_table_count(channel->ban_list)) {
1936 if (silc_server_inviteban_match(server, channel->ban_list,
1938 silc_server_inviteban_match(server, channel->ban_list,
1939 2, client->data.public_key) ||
1940 silc_server_inviteban_match(server, channel->ban_list,
1942 silc_server_inviteban_match(server, channel->ban_list,
1944 silc_server_command_send_status_reply(
1945 cmd, SILC_COMMAND_JOIN,
1946 SILC_STATUS_ERR_BANNED_FROM_CHANNEL, 0);
1951 /* Check user count limit if set. */
1952 if (channel->mode & SILC_CHANNEL_MODE_ULIMIT) {
1953 if (silc_hash_table_count(channel->user_list) + 1 >
1954 channel->user_limit) {
1955 silc_server_command_send_status_reply(cmd, SILC_COMMAND_JOIN,
1956 SILC_STATUS_ERR_CHANNEL_IS_FULL,
1963 /* Check the channel passphrase if set. */
1964 if (channel->mode & SILC_CHANNEL_MODE_PASSPHRASE) {
1965 /* Get passphrase */
1966 tmp = silc_argument_get_arg_type(cmd->args, 3, &tmp_len);
1968 passphrase = silc_memdup(tmp, tmp_len);
1970 if (!passphrase || !channel->passphrase ||
1971 memcmp(passphrase, channel->passphrase, strlen(channel->passphrase))) {
1972 silc_server_command_send_status_reply(cmd, SILC_COMMAND_JOIN,
1973 SILC_STATUS_ERR_BAD_PASSWORD, 0);
1979 * Client is allowed to join to the channel. Make it happen.
1982 /* Check whether the client already is on the channel */
1983 if (silc_server_client_on_channel(client, channel, NULL)) {
1984 silc_server_command_send_status_reply(cmd, SILC_COMMAND_JOIN,
1985 SILC_STATUS_ERR_USER_ON_CHANNEL, 0);
1989 /* Generate new channel key as protocol dictates */
1991 if (!silc_server_create_channel_key(server, channel, 0))
1994 /* Send the channel key. This is broadcasted to the channel but is not
1995 sent to the client who is joining to the channel. */
1996 if (!(channel->mode & SILC_CHANNEL_MODE_PRIVKEY))
1997 silc_server_send_channel_key(server, NULL, channel,
1998 server->server_type == SILC_ROUTER ?
1999 FALSE : !server->standalone);
2002 /* Join the client to the channel by adding it to channel's user list.
2003 Add also the channel to client entry's channels list for fast cross-
2005 chl = silc_calloc(1, sizeof(*chl));
2007 chl->client = client;
2008 chl->channel = channel;
2009 silc_hash_table_add(channel->user_list, client, chl);
2010 silc_hash_table_add(client->channels, channel, chl);
2011 channel->user_count++;
2012 channel->disabled = FALSE;
2014 /* Get users on the channel */
2015 silc_server_get_users_on_channel(server, channel, &user_list, &mode_list,
2018 /* Encode Client ID Payload of the original client who wants to join */
2019 clidp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
2021 /* Encode command reply packet */
2022 chidp = silc_id_payload_encode(channel->id, SILC_ID_CHANNEL);
2023 SILC_PUT32_MSB(channel->mode, mode);
2024 SILC_PUT32_MSB(created, tmp2);
2025 SILC_PUT32_MSB(user_count, tmp3);
2027 if (!(channel->mode & SILC_CHANNEL_MODE_PRIVKEY)) {
2028 tmp = silc_id_id2str(channel->id, SILC_ID_CHANNEL);
2029 cipher = silc_cipher_get_name(channel->channel_key);
2030 keyp = silc_channel_key_payload_encode(silc_id_get_len(channel->id,
2033 strlen(cipher), cipher,
2034 channel->key_len / 8, channel->key);
2038 if (channel->founder_key)
2039 fkey = silc_pkcs_public_key_payload_encode(channel->founder_key);
2041 /* Encode invite list */
2043 if (channel->invite_list && silc_hash_table_count(channel->invite_list)) {
2044 SilcHashTableList htl;
2046 invite_list = silc_buffer_alloc_size(2);
2047 silc_buffer_format(invite_list,
2048 SILC_STR_UI_SHORT(silc_hash_table_count(
2049 channel->invite_list)),
2052 silc_hash_table_list(channel->invite_list, &htl);
2053 while (silc_hash_table_get(&htl, (void **)&tmp_len, (void **)&reply)) {
2055 invite_list = silc_argument_payload_encode_one(invite_list,
2057 strlen((char *)reply),
2060 invite_list = silc_argument_payload_encode_one(invite_list,
2062 reply->len, tmp_len);
2064 silc_hash_table_list_reset(&htl);
2067 /* Encode ban list */
2069 if (channel->ban_list && silc_hash_table_count(channel->ban_list)) {
2070 SilcHashTableList htl;
2072 ban_list = silc_buffer_alloc_size(2);
2073 silc_buffer_format(ban_list,
2074 SILC_STR_UI_SHORT(silc_hash_table_count(
2075 channel->ban_list)),
2078 silc_hash_table_list(channel->ban_list, &htl);
2079 while (silc_hash_table_get(&htl, (void **)&tmp_len, (void **)&reply)) {
2081 ban_list = silc_argument_payload_encode_one(ban_list,
2083 strlen((char *)reply),
2086 ban_list = silc_argument_payload_encode_one(ban_list,
2088 reply->len, tmp_len);
2090 silc_hash_table_list_reset(&htl);
2094 silc_command_reply_payload_encode_va(SILC_COMMAND_JOIN,
2095 SILC_STATUS_OK, 0, ident, 14,
2096 2, channel->channel_name,
2097 strlen(channel->channel_name),
2098 3, chidp->data, chidp->len,
2099 4, clidp->data, clidp->len,
2102 7, keyp ? keyp->data : NULL,
2103 keyp ? keyp->len : 0,
2104 8, ban_list ? ban_list->data : NULL,
2105 ban_list ? ban_list->len : 0,
2106 9, invite_list ? invite_list->data :
2108 invite_list ? invite_list->len : 0,
2111 strlen(channel->topic) : 0,
2112 11, silc_hmac_get_name(channel->hmac),
2113 strlen(silc_hmac_get_name(channel->
2116 13, user_list->data, user_list->len,
2117 14, mode_list->data,
2119 15, fkey ? fkey->data : NULL,
2120 fkey ? fkey->len : 0);
2122 /* Send command reply */
2123 silc_server_packet_send(server, sock, SILC_PACKET_COMMAND_REPLY, 0,
2124 reply->data, reply->len, FALSE);
2126 /* Send JOIN notify to locally connected clients on the channel. If
2127 we are normal server then router will send or have sent JOIN notify
2128 already. However since we've added the client already to our channel
2129 we'll ignore it (in packet_receive.c) so we must send it here. If
2130 we are router then this will send it to local clients and local
2132 SILC_LOG_DEBUG(("Send JOIN notify to channel"));
2133 silc_server_send_notify_to_channel(server, NULL, channel, FALSE,
2134 SILC_NOTIFY_TYPE_JOIN, 2,
2135 clidp->data, clidp->len,
2136 chidp->data, chidp->len);
2138 /* Update statistics */
2139 server->stat.my_chanclients++;
2140 if (server->server_type == SILC_ROUTER) {
2141 server->stat.cell_chanclients++;
2142 server->stat.chanclients++;
2145 if (!cmd->pending) {
2146 /* Send JOIN notify packet to our primary router */
2147 silc_server_send_notify_join(server, SILC_PRIMARY_ROUTE(server),
2148 SILC_BROADCAST(server), channel, client->id);
2151 /* Distribute the channel key to all backup routers. */
2152 silc_server_backup_send(server, NULL, SILC_PACKET_CHANNEL_KEY, 0,
2153 keyp->data, keyp->len, FALSE, TRUE);
2155 /* If client became founder by providing correct founder auth data
2156 notify the mode change to the channel. */
2158 SILC_PUT32_MSB(chl->mode, mode);
2159 SILC_LOG_DEBUG(("Send CUMODE_CHANGE notify to channel"));
2160 silc_server_send_notify_to_channel(server, NULL, channel, FALSE,
2161 SILC_NOTIFY_TYPE_CUMODE_CHANGE, 4,
2162 clidp->data, clidp->len,
2163 mode, 4, clidp->data, clidp->len,
2164 fkey ? fkey->data : NULL,
2165 fkey ? fkey->len : 0);
2169 /* Set CUMODE notify type to network */
2171 silc_server_send_notify_cumode(server, SILC_PRIMARY_ROUTE(server),
2172 SILC_BROADCAST(server), channel,
2173 chl->mode, client->id, SILC_ID_CLIENT,
2174 client->id, channel->founder_key);
2176 silc_buffer_free(reply);
2177 silc_buffer_free(clidp);
2178 silc_buffer_free(chidp);
2179 silc_buffer_free(keyp);
2180 silc_buffer_free(user_list);
2181 silc_buffer_free(mode_list);
2182 silc_buffer_free(fkey);
2183 silc_buffer_free(invite_list);
2184 silc_buffer_free(ban_list);
2187 silc_free(passphrase);
2190 /* Server side of command JOIN. Joins client into requested channel. If
2191 the channel does not exist it will be created. */
2193 SILC_SERVER_CMD_FUNC(join)
2195 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
2196 SilcServer server = cmd->server;
2197 unsigned char *auth;
2198 SilcUInt32 tmp_len, auth_len;
2199 char *tmp, *channel_name = NULL, *cipher, *hmac;
2200 SilcChannelEntry channel;
2201 SilcUInt32 umode = 0;
2202 bool created = FALSE, create_key = TRUE;
2203 SilcClientID *client_id;
2205 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_JOIN, cmd, 2, 6);
2207 /* Get channel name */
2208 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
2210 silc_server_command_send_status_reply(cmd, SILC_COMMAND_JOIN,
2211 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
2218 channel_name[255] = '\0';
2220 if (silc_server_name_bad_chars(channel_name, tmp_len) == TRUE) {
2221 silc_server_command_send_status_reply(cmd, SILC_COMMAND_JOIN,
2222 SILC_STATUS_ERR_BAD_CHANNEL, 0);
2226 /* Get Client ID of the client who is joining to the channel */
2227 tmp = silc_argument_get_arg_type(cmd->args, 2, &tmp_len);
2229 silc_server_command_send_status_reply(cmd, SILC_COMMAND_JOIN,
2230 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
2234 client_id = silc_id_payload_parse_id(tmp, tmp_len, NULL);
2236 silc_server_command_send_status_reply(cmd, SILC_COMMAND_JOIN,
2237 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
2242 /* Get cipher, hmac name and auth payload */
2243 cipher = silc_argument_get_arg_type(cmd->args, 4, NULL);
2244 hmac = silc_argument_get_arg_type(cmd->args, 5, NULL);
2245 auth = silc_argument_get_arg_type(cmd->args, 6, &auth_len);
2247 /* See if the channel exists */
2248 channel = silc_idlist_find_channel_by_name(server->local_list,
2249 channel_name, NULL);
2251 if (cmd->sock->type == SILC_SOCKET_TYPE_CLIENT) {
2252 SilcClientEntry entry = (SilcClientEntry)cmd->sock->user_data;
2254 silc_server_command_send_status_reply(cmd, SILC_COMMAND_JOIN,
2255 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
2260 silc_free(client_id);
2261 client_id = silc_id_dup(entry->id, SILC_ID_CLIENT);
2264 (channel->disabled && server->server_type != SILC_ROUTER)) {
2265 /* Channel not found or not valid */
2267 /* If we are standalone server we don't have a router, we just create
2268 the channel by ourselves (unless it existed). */
2269 if (server->standalone) {
2271 channel = silc_server_create_new_channel(server, server->id, cipher,
2272 hmac, channel_name, TRUE);
2274 silc_server_command_send_status_reply(
2275 cmd, SILC_COMMAND_JOIN,
2276 SILC_STATUS_ERR_UNKNOWN_ALGORITHM,
2278 silc_free(client_id);
2282 umode = (SILC_CHANNEL_UMODE_CHANOP | SILC_CHANNEL_UMODE_CHANFO);
2288 /* The channel does not exist on our server. If we are normal server
2289 we will send JOIN command to our router which will handle the
2290 joining procedure (either creates the channel if it doesn't exist
2291 or joins the client to it). */
2292 if (server->server_type != SILC_ROUTER) {
2294 SilcUInt16 old_ident;
2296 /* If this is pending command callback then we've resolved
2297 it and it didn't work, return since we've notified the
2298 client already in the command reply callback. */
2300 silc_free(client_id);
2304 old_ident = silc_command_get_ident(cmd->payload);
2305 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
2306 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
2308 /* Send JOIN command to our router */
2309 silc_server_packet_send(server, (SilcSocketConnection)
2310 SILC_PRIMARY_ROUTE(server),
2311 SILC_PACKET_COMMAND, cmd->packet->flags,
2312 tmpbuf->data, tmpbuf->len, TRUE);
2314 /* Reprocess this packet after received reply from router */
2315 silc_server_command_pending(server, SILC_COMMAND_JOIN,
2316 silc_command_get_ident(cmd->payload),
2317 silc_server_command_join,
2318 silc_server_command_dup(cmd));
2319 cmd->pending = TRUE;
2320 silc_command_set_ident(cmd->payload, old_ident);
2321 silc_buffer_free(tmpbuf);
2322 silc_free(client_id);
2326 /* We are router and the channel does not seem exist so we will check
2327 our global list as well for the channel. */
2328 channel = silc_idlist_find_channel_by_name(server->global_list,
2329 channel_name, NULL);
2331 /* Channel really does not exist, create it */
2332 channel = silc_server_create_new_channel(server, server->id, cipher,
2333 hmac, channel_name, TRUE);
2335 silc_server_command_send_status_reply(
2336 cmd, SILC_COMMAND_JOIN,
2337 SILC_STATUS_ERR_UNKNOWN_ALGORITHM, 0);
2338 silc_free(client_id);
2342 umode = (SILC_CHANNEL_UMODE_CHANOP | SILC_CHANNEL_UMODE_CHANFO);
2350 /* Channel not found */
2352 /* If the command came from router and we are normal server then
2353 something went wrong with the joining as the channel was not found.
2354 We can't do anything else but ignore this. */
2355 if (cmd->sock->type == SILC_SOCKET_TYPE_ROUTER ||
2356 server->server_type != SILC_ROUTER) {
2357 silc_free(client_id);
2361 /* We are router and the channel does not seem exist so we will check
2362 our global list as well for the channel. */
2363 channel = silc_idlist_find_channel_by_name(server->global_list,
2364 channel_name, NULL);
2366 /* Channel really does not exist, create it */
2367 channel = silc_server_create_new_channel(server, server->id, cipher,
2368 hmac, channel_name, TRUE);
2370 silc_server_command_send_status_reply(
2371 cmd, SILC_COMMAND_JOIN,
2372 SILC_STATUS_ERR_UNKNOWN_ALGORITHM, 0);
2373 silc_free(client_id);
2377 umode = (SILC_CHANNEL_UMODE_CHANOP | SILC_CHANNEL_UMODE_CHANFO);
2384 /* Check whether the channel was created by our router */
2385 if (cmd->pending && context2) {
2386 SilcServerCommandReplyContext reply = context2;
2388 if (silc_command_get(reply->payload) == SILC_COMMAND_JOIN) {
2389 tmp = silc_argument_get_arg_type(reply->args, 6, NULL);
2390 SILC_GET32_MSB(created, tmp);
2391 if (silc_argument_get_arg_type(reply->args, 7, NULL))
2392 create_key = FALSE; /* Router returned the key already */
2394 if (silc_command_get_status(reply->payload, NULL, NULL) &&
2395 channel->mode & SILC_CHANNEL_MODE_PASSPHRASE) {
2396 /* Save channel passphrase, if user provided it successfully */
2399 pa = silc_argument_get_arg_type(cmd->args, 3, &pa_len);
2401 silc_free(channel->passphrase);
2402 channel->passphrase = silc_memdup(pa, pa_len);
2407 if (silc_command_get(reply->payload) == SILC_COMMAND_WHOIS &&
2408 !channel->disabled && !silc_hash_table_count(channel->user_list))
2412 /* If the channel does not have global users and is also empty the client
2413 will be the channel founder and operator. */
2414 if (!channel->disabled &&
2415 !channel->global_users && !silc_hash_table_count(channel->user_list))
2416 umode = (SILC_CHANNEL_UMODE_CHANOP | SILC_CHANNEL_UMODE_CHANFO);
2418 /* Join to the channel */
2419 silc_server_command_join_channel(server, cmd, channel, client_id,
2420 created, create_key, umode,
2423 silc_free(client_id);
2426 silc_server_command_free(cmd);
2429 /* Server side of command MOTD. Sends server's current "message of the
2430 day" to the client. */
2432 SILC_SERVER_CMD_FUNC(motd)
2434 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
2435 SilcServer server = cmd->server;
2436 SilcBuffer packet, idp;
2437 char *motd, *dest_server;
2438 SilcUInt32 motd_len;
2439 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
2441 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_MOTD, cmd, 1, 1);
2443 /* Get server name */
2444 dest_server = silc_argument_get_arg_type(cmd->args, 1, NULL);
2446 silc_server_command_send_status_reply(cmd, SILC_COMMAND_MOTD,
2447 SILC_STATUS_ERR_NO_SUCH_SERVER, 0);
2451 if (!strncasecmp(dest_server, server->server_name, strlen(dest_server))) {
2454 idp = silc_id_payload_encode(server->id_entry->id, SILC_ID_SERVER);
2456 if (server->config && server->config->server_info &&
2457 server->config->server_info->motd_file) {
2459 motd = silc_file_readfile(server->config->server_info->motd_file,
2465 packet = silc_command_reply_payload_encode_va(SILC_COMMAND_MOTD,
2472 packet = silc_command_reply_payload_encode_va(SILC_COMMAND_MOTD,
2478 silc_server_packet_send(server, cmd->sock, SILC_PACKET_COMMAND_REPLY, 0,
2479 packet->data, packet->len, FALSE);
2480 silc_buffer_free(packet);
2481 silc_buffer_free(idp);
2483 SilcServerEntry entry;
2485 /* Check whether we have this server cached */
2486 entry = silc_idlist_find_server_by_name(server->global_list,
2487 dest_server, TRUE, NULL);
2489 entry = silc_idlist_find_server_by_name(server->local_list,
2490 dest_server, TRUE, NULL);
2493 if (server->server_type != SILC_SERVER && !cmd->pending &&
2494 entry && !entry->motd) {
2495 /* Send to the server */
2497 SilcUInt16 old_ident;
2499 old_ident = silc_command_get_ident(cmd->payload);
2500 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
2501 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
2503 silc_server_packet_send(server, entry->connection,
2504 SILC_PACKET_COMMAND, cmd->packet->flags,
2505 tmpbuf->data, tmpbuf->len, TRUE);
2507 /* Reprocess this packet after received reply from router */
2508 silc_server_command_pending(server, SILC_COMMAND_MOTD,
2509 silc_command_get_ident(cmd->payload),
2510 silc_server_command_motd,
2511 silc_server_command_dup(cmd));
2512 cmd->pending = TRUE;
2513 silc_command_set_ident(cmd->payload, old_ident);
2514 silc_buffer_free(tmpbuf);
2518 if (!entry && !cmd->pending && !server->standalone) {
2519 /* Send to the primary router */
2521 SilcUInt16 old_ident;
2523 old_ident = silc_command_get_ident(cmd->payload);
2524 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
2525 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
2527 silc_server_packet_send(server, SILC_PRIMARY_ROUTE(server),
2528 SILC_PACKET_COMMAND, cmd->packet->flags,
2529 tmpbuf->data, tmpbuf->len, TRUE);
2531 /* Reprocess this packet after received reply from router */
2532 silc_server_command_pending(server, SILC_COMMAND_MOTD,
2533 silc_command_get_ident(cmd->payload),
2534 silc_server_command_motd,
2535 silc_server_command_dup(cmd));
2536 cmd->pending = TRUE;
2537 silc_command_set_ident(cmd->payload, old_ident);
2538 silc_buffer_free(tmpbuf);
2543 silc_server_command_send_status_reply(cmd, SILC_COMMAND_MOTD,
2544 SILC_STATUS_ERR_NO_SUCH_SERVER, 0);
2548 idp = silc_id_payload_encode(server->id_entry->id, SILC_ID_SERVER);
2549 packet = silc_command_reply_payload_encode_va(SILC_COMMAND_MOTD,
2550 SILC_STATUS_OK, 0, ident, 2,
2554 strlen(entry->motd) : 0);
2555 silc_server_packet_send(server, cmd->sock, SILC_PACKET_COMMAND_REPLY, 0,
2556 packet->data, packet->len, FALSE);
2557 silc_buffer_free(packet);
2558 silc_buffer_free(idp);
2562 silc_server_command_free(cmd);
2565 /* Server side of command UMODE. Client can use this command to set/unset
2566 user mode. Client actually cannot set itself to be as server/router
2567 operator so this can be used only to unset the modes. */
2569 SILC_SERVER_CMD_FUNC(umode)
2571 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
2572 SilcServer server = cmd->server;
2573 SilcClientEntry client = (SilcClientEntry)cmd->sock->user_data;
2575 unsigned char *tmp_mask, m[4];
2576 SilcUInt32 mask = 0;
2577 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
2578 bool set_mask = FALSE;
2580 if (cmd->sock->type != SILC_SOCKET_TYPE_CLIENT || !client)
2583 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_UMODE, cmd, 1, 2);
2585 /* Get the client's mode mask */
2586 tmp_mask = silc_argument_get_arg_type(cmd->args, 2, NULL);
2588 SILC_GET32_MSB(mask, tmp_mask);
2593 /* Check that mode changing is allowed. */
2594 if (!silc_server_check_umode_rights(server, client, mask)) {
2595 silc_server_command_send_status_reply(cmd, SILC_COMMAND_UMODE,
2596 SILC_STATUS_ERR_PERM_DENIED, 0);
2600 /* Anonymous mode cannot be set by client */
2601 if (mask & SILC_UMODE_ANONYMOUS) {
2602 if (!(client->mode & SILC_UMODE_ANONYMOUS)) {
2603 silc_server_command_send_status_reply(cmd, SILC_COMMAND_UMODE,
2604 SILC_STATUS_ERR_PERM_DENIED, 0);
2608 if (client->mode & SILC_UMODE_ANONYMOUS) {
2609 silc_server_command_send_status_reply(cmd, SILC_COMMAND_UMODE,
2610 SILC_STATUS_ERR_PERM_DENIED, 0);
2615 /* Update statistics */
2616 if (mask & SILC_UMODE_GONE) {
2617 if (!(client->mode & SILC_UMODE_GONE))
2618 server->stat.my_aways++;
2620 if (client->mode & SILC_UMODE_GONE)
2621 server->stat.my_aways--;
2624 /* Change the mode */
2625 client->mode = mask;
2627 /* Send UMODE change to primary router */
2628 silc_server_send_notify_umode(server, SILC_PRIMARY_ROUTE(server),
2629 SILC_BROADCAST(server), client->id,
2632 /* Check if anyone is watching this nickname */
2633 if (server->server_type == SILC_ROUTER)
2634 silc_server_check_watcher_list(server, client, NULL,
2635 SILC_NOTIFY_TYPE_UMODE_CHANGE);
2638 /* Send command reply to sender */
2639 SILC_PUT32_MSB(client->mode, m);
2640 packet = silc_command_reply_payload_encode_va(SILC_COMMAND_UMODE,
2641 SILC_STATUS_OK, 0, ident, 1,
2643 silc_server_packet_send(server, cmd->sock, SILC_PACKET_COMMAND_REPLY, 0,
2644 packet->data, packet->len, FALSE);
2645 silc_buffer_free(packet);
2648 silc_server_command_free(cmd);
2651 /* Server side command of CMODE. Changes channel mode */
2653 SILC_SERVER_CMD_FUNC(cmode)
2655 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
2656 SilcServer server = cmd->server;
2657 SilcClientEntry client = (SilcClientEntry)cmd->sock->user_data;
2658 SilcIDListData idata = (SilcIDListData)client;
2659 SilcChannelID *channel_id = NULL;
2660 SilcChannelEntry channel;
2661 SilcChannelClientEntry chl;
2662 SilcBuffer packet, cidp;
2663 unsigned char *tmp, *tmp_id, *tmp_mask;
2664 char *cipher = NULL, *hmac = NULL, *passphrase = NULL;
2665 SilcUInt32 mode_mask = 0, old_mask = 0, tmp_len, tmp_len2;
2666 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
2667 bool set_mask = FALSE;
2668 SilcPublicKey founder_key = NULL;
2669 SilcBuffer fkey = NULL;
2672 silc_server_command_free(cmd);
2676 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_CMODE, cmd, 1, 8);
2678 /* Get Channel ID */
2679 tmp_id = silc_argument_get_arg_type(cmd->args, 1, &tmp_len2);
2681 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
2682 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
2683 silc_server_command_free(cmd);
2686 channel_id = silc_id_payload_parse_id(tmp_id, tmp_len2, NULL);
2688 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
2689 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
2690 silc_server_command_free(cmd);
2694 /* Get channel entry */
2695 channel = silc_idlist_find_channel_by_id(server->local_list,
2698 channel = silc_idlist_find_channel_by_id(server->global_list,
2701 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
2702 SILC_STATUS_ERR_NO_SUCH_CHANNEL,
2704 silc_free(channel_id);
2705 silc_server_command_free(cmd);
2709 old_mask = channel->mode;
2711 /* Get the channel mode mask */
2712 tmp_mask = silc_argument_get_arg_type(cmd->args, 2, &tmp_len);
2714 SILC_GET32_MSB(mode_mask, tmp_mask);
2718 /* Check whether this client is on the channel */
2719 if (!silc_server_client_on_channel(client, channel, &chl)) {
2720 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
2721 SILC_STATUS_ERR_NOT_ON_CHANNEL, 0);
2725 /* Check that client has rights to change any requested channel modes */
2726 if (set_mask && !silc_server_check_cmode_rights(server, channel, chl,
2728 SILC_LOG_DEBUG(("Client does not have rights to change mode"));
2729 silc_server_command_send_status_reply(
2730 cmd, SILC_COMMAND_CMODE,
2731 (!(chl->mode & SILC_CHANNEL_UMODE_CHANOP) ?
2732 SILC_STATUS_ERR_NO_CHANNEL_PRIV :
2733 SILC_STATUS_ERR_NO_CHANNEL_FOPRIV), 0);
2737 /* If mode mask was not sent as argument then merely return the current
2738 mode mask to the sender. */
2741 SILC_PUT32_MSB(channel->mode, m);
2742 packet = silc_command_reply_payload_encode_va(SILC_COMMAND_CMODE,
2743 SILC_STATUS_OK, 0, ident, 2,
2744 2, tmp_id, tmp_len2,
2746 silc_server_packet_send(server, cmd->sock, SILC_PACKET_COMMAND_REPLY, 0,
2747 packet->data, packet->len, FALSE);
2748 silc_buffer_free(packet);
2753 * Check the modes. Modes that requires nothing special operation are
2757 if (mode_mask & SILC_CHANNEL_MODE_PRIVKEY) {
2758 /* Channel uses private keys to protect traffic. Client(s) has set the
2759 key locally they want to use, server does not know that key. */
2760 /* Nothing interesting to do here */
2762 if (channel->mode & SILC_CHANNEL_MODE_PRIVKEY) {
2763 /* The mode is removed and we need to generate and distribute
2764 new channel key. Clients are not using private channel keys
2765 anymore after this. */
2767 /* Re-generate channel key */
2768 if (!silc_server_create_channel_key(server, channel, 0))
2771 /* Send the channel key. This sends it to our local clients and if
2772 we are normal server to our router as well. */
2773 silc_server_send_channel_key(server, NULL, channel,
2774 server->server_type == SILC_ROUTER ?
2775 FALSE : !server->standalone);
2777 cipher = (char *)silc_cipher_get_name(channel->channel_key);
2778 hmac = (char *)silc_hmac_get_name(channel->hmac);
2782 if (mode_mask & SILC_CHANNEL_MODE_ULIMIT) {
2783 /* User limit is set on channel */
2784 SilcUInt32 user_limit;
2786 /* Get user limit */
2787 tmp = silc_argument_get_arg_type(cmd->args, 3, NULL);
2789 if (!(channel->mode & SILC_CHANNEL_MODE_ULIMIT)) {
2790 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
2791 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS, 0);
2795 SILC_GET32_MSB(user_limit, tmp);
2796 channel->user_limit = user_limit;
2799 if (channel->mode & SILC_CHANNEL_MODE_ULIMIT)
2800 /* User limit mode is unset. Remove user limit */
2801 channel->user_limit = 0;
2804 if (mode_mask & SILC_CHANNEL_MODE_PASSPHRASE) {
2805 if (!(channel->mode & SILC_CHANNEL_MODE_PASSPHRASE)) {
2806 /* Passphrase has been set to channel */
2808 /* Get the passphrase */
2809 tmp = silc_argument_get_arg_type(cmd->args, 4, NULL);
2811 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
2812 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS, 0);
2816 /* Save the passphrase */
2817 passphrase = channel->passphrase = silc_memdup(tmp, strlen(tmp));
2820 if (channel->mode & SILC_CHANNEL_MODE_PASSPHRASE) {
2821 /* Passphrase mode is unset. remove the passphrase */
2822 silc_free(channel->passphrase);
2823 channel->passphrase = NULL;
2827 if (mode_mask & SILC_CHANNEL_MODE_CIPHER) {
2828 if (!(channel->mode & SILC_CHANNEL_MODE_CIPHER)) {
2829 /* Cipher to use protect the traffic */
2830 SilcCipher newkey, oldkey;
2833 cipher = silc_argument_get_arg_type(cmd->args, 5, NULL);
2835 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
2836 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS, 0);
2840 /* Delete old cipher and allocate the new one */
2841 if (!silc_cipher_alloc(cipher, &newkey)) {
2842 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
2843 SILC_STATUS_ERR_UNKNOWN_ALGORITHM, 0);
2847 oldkey = channel->channel_key;
2848 channel->channel_key = newkey;
2850 /* Re-generate channel key */
2851 if (!silc_server_create_channel_key(server, channel, 0)) {
2852 /* We don't have new key, revert to old one */
2853 channel->channel_key = oldkey;
2857 /* Remove old channel key for good */
2858 silc_cipher_free(oldkey);
2860 /* Send the channel key. This sends it to our local clients and if
2861 we are normal server to our router as well. */
2862 silc_server_send_channel_key(server, NULL, channel,
2863 server->server_type == SILC_ROUTER ?
2864 FALSE : !server->standalone);
2867 if (channel->mode & SILC_CHANNEL_MODE_CIPHER) {
2868 /* Cipher mode is unset. Remove the cipher and revert back to
2870 SilcCipher newkey, oldkey;
2871 cipher = channel->cipher;
2873 /* Delete old cipher and allocate default one */
2874 if (!silc_cipher_alloc(cipher ? cipher : SILC_DEFAULT_CIPHER, &newkey)) {
2875 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
2876 SILC_STATUS_ERR_UNKNOWN_ALGORITHM, 0);
2880 oldkey = channel->channel_key;
2881 channel->channel_key = newkey;
2883 /* Re-generate channel key */
2884 if (!silc_server_create_channel_key(server, channel, 0)) {
2885 /* We don't have new key, revert to old one */
2886 channel->channel_key = oldkey;
2890 /* Remove old channel key for good */
2891 silc_cipher_free(oldkey);
2893 /* Send the channel key. This sends it to our local clients and if
2894 we are normal server to our router as well. */
2895 silc_server_send_channel_key(server, NULL, channel,
2896 server->server_type == SILC_ROUTER ?
2897 FALSE : !server->standalone);
2901 if (mode_mask & SILC_CHANNEL_MODE_HMAC) {
2902 if (!(channel->mode & SILC_CHANNEL_MODE_HMAC)) {
2903 /* HMAC to use protect the traffic */
2904 unsigned char hash[32];
2908 hmac = silc_argument_get_arg_type(cmd->args, 6, NULL);
2910 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
2911 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS, 0);
2915 /* Delete old hmac and allocate the new one */
2916 if (!silc_hmac_alloc(hmac, NULL, &newhmac)) {
2917 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
2918 SILC_STATUS_ERR_UNKNOWN_ALGORITHM, 0);
2922 silc_hmac_free(channel->hmac);
2923 channel->hmac = newhmac;
2925 /* Set the HMAC key out of current channel key. The client must do
2927 silc_hash_make(silc_hmac_get_hash(channel->hmac), channel->key,
2928 channel->key_len / 8, hash);
2929 silc_hmac_set_key(channel->hmac, hash,
2930 silc_hash_len(silc_hmac_get_hash(channel->hmac)));
2931 memset(hash, 0, sizeof(hash));
2934 if (channel->mode & SILC_CHANNEL_MODE_HMAC) {
2935 /* Hmac mode is unset. Remove the hmac and revert back to
2938 unsigned char hash[32];
2939 hmac = channel->hmac_name;
2941 /* Delete old hmac and allocate default one */
2942 silc_hmac_free(channel->hmac);
2943 if (!silc_hmac_alloc(hmac ? hmac : SILC_DEFAULT_HMAC, NULL, &newhmac)) {
2944 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
2945 SILC_STATUS_ERR_UNKNOWN_ALGORITHM, 0);
2949 silc_hmac_free(channel->hmac);
2950 channel->hmac = newhmac;
2952 /* Set the HMAC key out of current channel key. The client must do
2954 silc_hash_make(silc_hmac_get_hash(channel->hmac), channel->key,
2955 channel->key_len / 8,
2957 silc_hmac_set_key(channel->hmac, hash,
2958 silc_hash_len(silc_hmac_get_hash(channel->hmac)));
2959 memset(hash, 0, sizeof(hash));
2963 if (mode_mask & SILC_CHANNEL_MODE_FOUNDER_AUTH) {
2964 if (chl->mode & SILC_CHANNEL_UMODE_CHANFO) {
2965 /* Check if the founder public key was received */
2966 founder_key = idata->public_key;
2967 tmp = silc_argument_get_arg_type(cmd->args, 8, &tmp_len);
2969 if (!silc_pkcs_public_key_payload_decode(tmp, tmp_len, &founder_key)) {
2970 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
2971 SILC_STATUS_ERR_AUTH_FAILED,
2976 /* If key was not sent and the channel mode has already founder
2977 then the key was not to be changed. */
2978 if (channel->mode & SILC_CHANNEL_MODE_FOUNDER_AUTH)
2982 /* Set the founder authentication */
2983 tmp = silc_argument_get_arg_type(cmd->args, 7, &tmp_len);
2985 silc_server_command_send_status_reply(
2986 cmd, SILC_COMMAND_CMODE,
2987 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS, 0);
2991 /* Verify the payload before setting the mode */
2992 if (!silc_auth_verify_data(tmp, tmp_len, SILC_AUTH_PUBLIC_KEY,
2993 founder_key, 0, server->sha1hash,
2994 client->id, SILC_ID_CLIENT)) {
2995 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
2996 SILC_STATUS_ERR_AUTH_FAILED,
3001 /* Save the public key */
3002 if (channel->founder_key)
3003 silc_pkcs_public_key_free(channel->founder_key);
3004 if (silc_argument_get_arg_type(cmd->args, 8, NULL))
3005 channel->founder_key = founder_key;
3007 channel->founder_key = silc_pkcs_public_key_copy(founder_key);
3008 if (!channel->founder_key) {
3009 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
3010 SILC_STATUS_ERR_AUTH_FAILED,
3015 fkey = silc_pkcs_public_key_payload_encode(channel->founder_key);
3017 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
3018 SILC_STATUS_ERR_AUTH_FAILED,
3020 silc_pkcs_public_key_free(channel->founder_key);
3021 channel->founder_key = NULL;
3027 if (chl->mode & SILC_CHANNEL_UMODE_CHANFO) {
3028 if (channel->mode & SILC_CHANNEL_MODE_FOUNDER_AUTH) {
3029 if (channel->founder_key)
3030 silc_pkcs_public_key_free(channel->founder_key);
3031 channel->founder_key = NULL;
3036 /* Finally, set the mode */
3037 old_mask = channel->mode = mode_mask;
3039 /* Send CMODE_CHANGE notify. */
3040 cidp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
3041 silc_server_send_notify_to_channel(server, NULL, channel, FALSE,
3042 SILC_NOTIFY_TYPE_CMODE_CHANGE, 6,
3043 cidp->data, cidp->len,
3045 cipher, cipher ? strlen(cipher) : 0,
3046 hmac, hmac ? strlen(hmac) : 0,
3047 passphrase, passphrase ?
3048 strlen(passphrase) : 0,
3049 fkey ? fkey->data : NULL,
3050 fkey ? fkey->len : 0);
3052 /* Set CMODE notify type to network */
3053 silc_server_send_notify_cmode(server, SILC_PRIMARY_ROUTE(server),
3054 SILC_BROADCAST(server), channel,
3055 mode_mask, client->id, SILC_ID_CLIENT,
3056 cipher, hmac, passphrase, founder_key);
3058 /* Send command reply to sender */
3059 packet = silc_command_reply_payload_encode_va(SILC_COMMAND_CMODE,
3060 SILC_STATUS_OK, 0, ident, 3,
3061 2, tmp_id, tmp_len2,
3063 4, fkey ? fkey->data : NULL,
3064 fkey ? fkey->len : 0);
3065 silc_server_packet_send(server, cmd->sock, SILC_PACKET_COMMAND_REPLY, 0,
3066 packet->data, packet->len, FALSE);
3068 silc_buffer_free(packet);
3069 silc_buffer_free(cidp);
3072 channel->mode = old_mask;
3073 silc_buffer_free(fkey);
3074 silc_free(channel_id);
3075 silc_server_command_free(cmd);
3078 /* Server side of CUMODE command. Changes client's mode on a channel. */
3080 SILC_SERVER_CMD_FUNC(cumode)
3082 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
3083 SilcServer server = cmd->server;
3084 SilcClientEntry client = (SilcClientEntry)cmd->sock->user_data;
3085 SilcChannelID *channel_id = NULL;
3086 SilcClientID *client_id = NULL;
3087 SilcChannelEntry channel;
3088 SilcClientEntry target_client;
3089 SilcChannelClientEntry chl;
3090 SilcBuffer packet, idp;
3091 unsigned char *tmp_id, *tmp_ch_id, *tmp_mask;
3092 SilcUInt32 target_mask, sender_mask = 0, tmp_len, tmp_ch_len;
3094 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
3095 SilcPublicKey founder_key = NULL;
3096 SilcBuffer fkey = NULL;
3101 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_CUMODE, cmd, 3, 4);
3103 /* Get Channel ID */
3104 tmp_ch_id = silc_argument_get_arg_type(cmd->args, 1, &tmp_ch_len);
3106 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3107 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
3110 channel_id = silc_id_payload_parse_id(tmp_ch_id, tmp_ch_len, NULL);
3112 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3113 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
3117 /* Get channel entry */
3118 channel = silc_idlist_find_channel_by_id(server->local_list,
3121 channel = silc_idlist_find_channel_by_id(server->global_list,
3124 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3125 SILC_STATUS_ERR_NO_SUCH_CHANNEL,
3131 /* Check whether sender is on the channel */
3132 if (!silc_server_client_on_channel(client, channel, &chl)) {
3133 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3134 SILC_STATUS_ERR_NOT_ON_CHANNEL, 0);
3137 sender_mask = chl->mode;
3139 /* Get the target client's channel mode mask */
3140 tmp_mask = silc_argument_get_arg_type(cmd->args, 2, NULL);
3142 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3143 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
3147 SILC_GET32_MSB(target_mask, tmp_mask);
3149 /* Get target Client ID */
3150 tmp_id = silc_argument_get_arg_type(cmd->args, 3, &tmp_len);
3152 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3153 SILC_STATUS_ERR_NO_CLIENT_ID, 0);
3156 client_id = silc_id_payload_parse_id(tmp_id, tmp_len, NULL);
3158 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3159 SILC_STATUS_ERR_NO_CLIENT_ID, 0);
3163 /* Get target client's entry */
3164 target_client = silc_idlist_find_client_by_id(server->local_list,
3165 client_id, TRUE, NULL);
3166 if (!target_client) {
3167 target_client = silc_idlist_find_client_by_id(server->global_list,
3168 client_id, TRUE, NULL);
3171 if (target_client != client &&
3172 !(sender_mask & SILC_CHANNEL_UMODE_CHANFO) &&
3173 !(sender_mask & SILC_CHANNEL_UMODE_CHANOP)) {
3174 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3175 SILC_STATUS_ERR_NO_CHANNEL_PRIV, 0);
3179 /* Check whether target client is on the channel */
3180 if (target_client != client) {
3181 if (!silc_server_client_on_channel(target_client, channel, &chl)) {
3182 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3183 SILC_STATUS_ERR_USER_NOT_ON_CHANNEL, 0);
3192 /* If the target client is founder, no one else can change their mode
3194 if (chl->mode & SILC_CHANNEL_UMODE_CHANFO && client != target_client) {
3195 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3196 SILC_STATUS_ERR_NO_CHANNEL_FOPRIV,
3201 if (target_mask & SILC_CHANNEL_UMODE_CHANFO) {
3202 if (target_client != client) {
3203 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3204 SILC_STATUS_ERR_NOT_YOU, 0);
3208 if (!(chl->mode & SILC_CHANNEL_UMODE_CHANFO)) {
3209 /* The client tries to claim the founder rights. */
3210 unsigned char *tmp_auth;
3211 SilcUInt32 tmp_auth_len;
3212 SilcChannelClientEntry chl2;
3213 SilcHashTableList htl;
3215 if (!(channel->mode & SILC_CHANNEL_MODE_FOUNDER_AUTH) ||
3216 !channel->founder_key) {
3217 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3218 SILC_STATUS_ERR_AUTH_FAILED, 0);
3222 tmp_auth = silc_argument_get_arg_type(cmd->args, 4, &tmp_auth_len);
3224 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3225 SILC_STATUS_ERR_AUTH_FAILED, 0);
3229 /* Verify the authentication payload */
3230 if (!silc_auth_verify_data(tmp_auth, tmp_auth_len, SILC_AUTH_PUBLIC_KEY,
3231 channel->founder_key, 0, server->sha1hash,
3232 client->id, SILC_ID_CLIENT)) {
3233 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3234 SILC_STATUS_ERR_AUTH_FAILED, 0);
3239 founder_key = channel->founder_key;
3240 fkey = silc_pkcs_public_key_payload_encode(founder_key);
3242 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3243 SILC_STATUS_ERR_AUTH_FAILED, 0);
3247 /* There cannot be anyone else as founder on the channel now. This
3248 client is definitely the founder due to this authentication */
3249 silc_hash_table_list(channel->user_list, &htl);
3250 while (silc_hash_table_get(&htl, NULL, (void *)&chl2))
3251 if (chl2->mode & SILC_CHANNEL_UMODE_CHANFO) {
3252 chl2->mode &= ~SILC_CHANNEL_UMODE_CHANFO;
3253 silc_server_force_cumode_change(server, NULL, channel, chl2,
3257 silc_hash_table_list_reset(&htl);
3259 sender_mask = chl->mode |= SILC_CHANNEL_UMODE_CHANFO;
3262 if (chl->mode & SILC_CHANNEL_UMODE_CHANFO) {
3263 if (target_client == client) {
3264 /* Remove channel founder rights from itself */
3265 chl->mode &= ~SILC_CHANNEL_UMODE_CHANFO;
3268 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3269 SILC_STATUS_ERR_NOT_YOU, 0);
3275 if (target_mask & SILC_CHANNEL_UMODE_CHANOP) {
3276 /* Promote to operator */
3277 if (!(chl->mode & SILC_CHANNEL_UMODE_CHANOP)) {
3278 if (!(sender_mask & SILC_CHANNEL_UMODE_CHANOP) &&
3279 !(sender_mask & SILC_CHANNEL_UMODE_CHANFO)) {
3280 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3281 SILC_STATUS_ERR_NO_CHANNEL_PRIV,
3286 chl->mode |= SILC_CHANNEL_UMODE_CHANOP;
3290 if (chl->mode & SILC_CHANNEL_UMODE_CHANOP) {
3291 if (!(sender_mask & SILC_CHANNEL_UMODE_CHANOP) &&
3292 !(sender_mask & SILC_CHANNEL_UMODE_CHANFO)) {
3293 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3294 SILC_STATUS_ERR_NO_CHANNEL_PRIV,
3299 /* Demote to normal user */
3300 chl->mode &= ~SILC_CHANNEL_UMODE_CHANOP;
3305 if (target_mask & SILC_CHANNEL_UMODE_BLOCK_MESSAGES) {
3306 if (target_client != client) {
3307 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3308 SILC_STATUS_ERR_NOT_YOU, 0);
3312 if (!(chl->mode & SILC_CHANNEL_UMODE_BLOCK_MESSAGES)) {
3313 chl->mode |= SILC_CHANNEL_UMODE_BLOCK_MESSAGES;
3317 if (chl->mode & SILC_CHANNEL_UMODE_BLOCK_MESSAGES) {
3318 if (target_client != client) {
3319 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3320 SILC_STATUS_ERR_NOT_YOU, 0);
3324 chl->mode &= ~SILC_CHANNEL_UMODE_BLOCK_MESSAGES;
3329 if (target_mask & SILC_CHANNEL_UMODE_BLOCK_MESSAGES_USERS) {
3330 if (target_client != client) {
3331 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3332 SILC_STATUS_ERR_NOT_YOU, 0);
3336 if (!(chl->mode & SILC_CHANNEL_UMODE_BLOCK_MESSAGES_USERS)) {
3337 chl->mode |= SILC_CHANNEL_UMODE_BLOCK_MESSAGES_USERS;
3341 if (chl->mode & SILC_CHANNEL_UMODE_BLOCK_MESSAGES_USERS) {
3342 if (target_client != client) {
3343 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3344 SILC_STATUS_ERR_NOT_YOU, 0);
3348 chl->mode &= ~SILC_CHANNEL_UMODE_BLOCK_MESSAGES_USERS;
3353 if (target_mask & SILC_CHANNEL_UMODE_BLOCK_MESSAGES_ROBOTS) {
3354 if (target_client != client) {
3355 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3356 SILC_STATUS_ERR_NOT_YOU, 0);
3360 if (!(chl->mode & SILC_CHANNEL_UMODE_BLOCK_MESSAGES_ROBOTS)) {
3361 chl->mode |= SILC_CHANNEL_UMODE_BLOCK_MESSAGES_ROBOTS;
3365 if (chl->mode & SILC_CHANNEL_UMODE_BLOCK_MESSAGES_ROBOTS) {
3366 if (target_client != client) {
3367 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3368 SILC_STATUS_ERR_NOT_YOU, 0);
3372 chl->mode &= ~SILC_CHANNEL_UMODE_BLOCK_MESSAGES_ROBOTS;
3377 if (target_mask & SILC_CHANNEL_UMODE_QUIET) {
3378 if (!(chl->mode & SILC_CHANNEL_UMODE_QUIET)) {
3379 if (client == target_client) {
3380 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3381 SILC_STATUS_ERR_PERM_DENIED, 0);
3384 chl->mode |= SILC_CHANNEL_UMODE_QUIET;
3388 if (chl->mode & SILC_CHANNEL_UMODE_QUIET) {
3389 if (client == target_client) {
3390 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3391 SILC_STATUS_ERR_PERM_DENIED, 0);
3394 chl->mode &= ~SILC_CHANNEL_UMODE_QUIET;
3399 idp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
3400 tmp_id = silc_argument_get_arg_type(cmd->args, 3, &tmp_len);
3402 /* Send notify to channel, notify only if mode was actually changed. */
3404 silc_server_send_notify_to_channel(server, NULL, channel, FALSE,
3405 SILC_NOTIFY_TYPE_CUMODE_CHANGE, 4,
3406 idp->data, idp->len,
3409 fkey ? fkey->data : NULL,
3410 fkey ? fkey->len : 0);
3412 /* Set CUMODE notify type to network */
3413 silc_server_send_notify_cumode(server, SILC_PRIMARY_ROUTE(server),
3414 SILC_BROADCAST(server), channel,
3415 target_mask, client->id, SILC_ID_CLIENT,
3416 target_client->id, founder_key);
3419 /* Send command reply to sender */
3420 packet = silc_command_reply_payload_encode_va(SILC_COMMAND_CUMODE,
3421 SILC_STATUS_OK, 0, ident, 3,
3423 3, tmp_ch_id, tmp_ch_len,
3424 4, tmp_id, tmp_len);
3425 silc_server_packet_send(server, cmd->sock, SILC_PACKET_COMMAND_REPLY, 0,
3426 packet->data, packet->len, FALSE);
3428 silc_buffer_free(packet);
3429 silc_buffer_free(idp);
3432 silc_free(channel_id);
3433 silc_free(client_id);
3434 silc_buffer_free(fkey);
3435 silc_server_command_free(cmd);
3438 /* Server side of KICK command. Kicks client out of channel. */
3440 SILC_SERVER_CMD_FUNC(kick)
3442 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
3443 SilcServer server = cmd->server;
3444 SilcClientEntry client = (SilcClientEntry)cmd->sock->user_data;
3445 SilcClientEntry target_client;
3446 SilcChannelID *channel_id;
3447 SilcClientID *client_id;
3448 SilcChannelEntry channel;
3449 SilcChannelClientEntry chl;
3451 SilcUInt32 tmp_len, target_idp_len;
3452 unsigned char *tmp, *comment, *target_idp;
3457 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_LEAVE, cmd, 1, 3);
3459 /* Get Channel ID */
3460 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
3462 silc_server_command_send_status_reply(cmd, SILC_COMMAND_KICK,
3463 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
3466 channel_id = silc_id_payload_parse_id(tmp, tmp_len, NULL);
3468 silc_server_command_send_status_reply(cmd, SILC_COMMAND_KICK,
3469 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
3473 /* Get channel entry */
3474 channel = silc_idlist_find_channel_by_id(server->local_list,
3477 channel = silc_idlist_find_channel_by_id(server->local_list,
3480 silc_server_command_send_status_reply(cmd, SILC_COMMAND_KICK,
3481 SILC_STATUS_ERR_NO_SUCH_CHANNEL,
3487 /* Check whether sender is on the channel */
3488 if (!silc_server_client_on_channel(client, channel, &chl)) {
3489 silc_server_command_send_status_reply(cmd, SILC_COMMAND_KICK,
3490 SILC_STATUS_ERR_NOT_ON_CHANNEL, 0);
3494 /* Check that the kicker is channel operator or channel founder */
3495 if (!(chl->mode & SILC_CHANNEL_UMODE_CHANOP) &&
3496 !(chl->mode & SILC_CHANNEL_UMODE_CHANFO)) {
3497 silc_server_command_send_status_reply(cmd, SILC_COMMAND_KICK,
3498 SILC_STATUS_ERR_NO_CHANNEL_PRIV, 0);
3502 /* Get target Client ID */
3503 target_idp = silc_argument_get_arg_type(cmd->args, 2, &target_idp_len);
3505 silc_server_command_send_status_reply(cmd, SILC_COMMAND_KICK,
3506 SILC_STATUS_ERR_NO_CLIENT_ID, 0);
3509 client_id = silc_id_payload_parse_id(target_idp, target_idp_len, NULL);
3511 silc_server_command_send_status_reply(cmd, SILC_COMMAND_KICK,
3512 SILC_STATUS_ERR_NO_CLIENT_ID, 0);
3516 /* Get target client's entry */
3517 target_client = silc_idlist_find_client_by_id(server->local_list,
3518 client_id, TRUE, NULL);
3519 if (!target_client) {
3520 target_client = silc_idlist_find_client_by_id(server->global_list,
3521 client_id, TRUE, NULL);
3524 /* Check whether target client is on the channel */
3525 if (!silc_server_client_on_channel(target_client, channel, &chl)) {
3526 silc_server_command_send_status_reply(cmd, SILC_COMMAND_KICK,
3527 SILC_STATUS_ERR_USER_NOT_ON_CHANNEL,
3532 /* Check that the target client is not channel founder. Channel founder
3533 cannot be kicked from the channel. */
3534 if (chl->mode & SILC_CHANNEL_UMODE_CHANFO) {
3535 silc_server_command_send_status_reply(cmd, SILC_COMMAND_KICK,
3536 SILC_STATUS_ERR_NO_CHANNEL_FOPRIV,
3543 comment = silc_argument_get_arg_type(cmd->args, 3, &tmp_len);
3547 /* Send command reply to sender */
3548 silc_server_command_send_status_reply(cmd, SILC_COMMAND_KICK,
3551 /* Send KICKED notify to local clients on the channel */
3552 idp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
3553 silc_server_send_notify_to_channel(server, NULL, channel, FALSE,
3554 SILC_NOTIFY_TYPE_KICKED, 3,
3555 target_idp, target_idp_len,
3556 comment, comment ? strlen(comment) : 0,
3557 idp->data, idp->len);
3558 silc_buffer_free(idp);
3560 /* Send KICKED notify to primary route */
3561 silc_server_send_notify_kicked(server, SILC_PRIMARY_ROUTE(server),
3562 SILC_BROADCAST(server), channel,
3563 target_client->id, client->id, comment);
3565 /* Remove the client from channel's invite list */
3566 if (channel->invite_list && silc_hash_table_count(channel->invite_list)) {
3568 silc_argument_payload_encode_one(NULL, target_idp, target_idp_len, 3);
3569 SilcArgumentPayload args =
3570 silc_argument_payload_parse(ab->data, ab->len, 1);
3571 silc_server_inviteban_process(server, channel->invite_list, 1, args);
3572 silc_buffer_free(ab);
3573 silc_argument_payload_free(args);
3576 /* Remove the client from the channel. If the channel does not exist
3577 after removing the client then the client kicked itself off the channel
3578 and we don't have to send anything after that. */
3579 if (!silc_server_remove_from_one_channel(server, NULL, channel,
3580 target_client, FALSE))
3583 if (!(channel->mode & SILC_CHANNEL_MODE_PRIVKEY)) {
3584 /* Re-generate channel key */
3585 if (!silc_server_create_channel_key(server, channel, 0))
3588 /* Send the channel key to the channel. The key of course is not sent
3589 to the client who was kicked off the channel. */
3590 silc_server_send_channel_key(server, target_client->connection, channel,
3591 server->server_type == SILC_ROUTER ?
3592 FALSE : !server->standalone);
3596 silc_server_command_free(cmd);
3599 /* Server side of OPER command. Client uses this comand to obtain server
3600 operator privileges to this server/router. */
3602 SILC_SERVER_CMD_FUNC(oper)
3604 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
3605 SilcServer server = cmd->server;
3606 SilcClientEntry client = (SilcClientEntry)cmd->sock->user_data;
3607 unsigned char *username, *auth;
3609 SilcServerConfigAdmin *admin;
3610 SilcIDListData idata = (SilcIDListData)client;
3611 bool result = FALSE;
3612 SilcPublicKey cached_key;
3614 if (cmd->sock->type != SILC_SOCKET_TYPE_CLIENT || !client)
3617 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_OPER, cmd, 1, 2);
3619 /* Get the username */
3620 username = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
3622 silc_server_command_send_status_reply(cmd, SILC_COMMAND_OPER,
3623 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
3628 /* Get the admin configuration */
3629 admin = silc_server_config_find_admin(server, cmd->sock->ip,
3630 username, client->nickname);
3632 admin = silc_server_config_find_admin(server, cmd->sock->hostname,
3633 username, client->nickname);
3635 silc_server_command_send_status_reply(cmd, SILC_COMMAND_OPER,
3636 SILC_STATUS_ERR_AUTH_FAILED,
3638 SILC_LOG_INFO(("OPER authentication failed for username '%s' by "
3639 "nickname '%s' from %s", username,
3640 client->nickname, cmd->sock->hostname));
3645 /* Get the authentication payload */
3646 auth = silc_argument_get_arg_type(cmd->args, 2, &tmp_len);
3648 silc_server_command_send_status_reply(cmd, SILC_COMMAND_OPER,
3649 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
3654 /* Verify the authentication data. If both passphrase and public key
3655 is set then try both of them. */
3656 if (admin->passphrase)
3657 result = silc_auth_verify_data(auth, tmp_len, SILC_AUTH_PASSWORD,
3658 admin->passphrase, admin->passphrase_len,
3659 idata->hash, client->id, SILC_ID_CLIENT);
3660 if (!result && admin->publickeys) {
3661 cached_key = silc_server_get_public_key(server, admin->publickeys);
3664 result = silc_auth_verify_data(auth, tmp_len, SILC_AUTH_PUBLIC_KEY,
3665 cached_key, 0, idata->hash,
3666 client->id, SILC_ID_CLIENT);
3669 /* Authentication failed */
3670 silc_server_command_send_status_reply(cmd, SILC_COMMAND_OPER,
3671 SILC_STATUS_ERR_AUTH_FAILED,
3676 /* Client is now server operator */
3677 client->mode |= SILC_UMODE_SERVER_OPERATOR;
3679 /* Update statistics */
3680 if (SILC_IS_LOCAL(client))
3681 server->stat.my_server_ops++;
3682 if (server->server_type == SILC_ROUTER)
3683 server->stat.server_ops++;
3685 /* Send UMODE change to primary router */
3686 silc_server_send_notify_umode(server, SILC_PRIMARY_ROUTE(server),
3687 SILC_BROADCAST(server), client->id,
3690 /* Check if anyone is watching this nickname */
3691 if (server->server_type == SILC_ROUTER)
3692 silc_server_check_watcher_list(server, client, NULL,
3693 SILC_NOTIFY_TYPE_UMODE_CHANGE);
3695 /* Send reply to the sender */
3696 silc_server_command_send_status_reply(cmd, SILC_COMMAND_OPER,
3700 silc_server_command_free(cmd);
3703 SILC_TASK_CALLBACK(silc_server_command_detach_cb)
3705 SilcServer server = app_context;
3706 QuitInternal q = (QuitInternal)context;
3707 SilcClientID *client_id = (SilcClientID *)q->sock;
3708 SilcClientEntry client;
3709 SilcSocketConnection sock;
3711 client = silc_idlist_find_client_by_id(server->local_list, client_id,
3713 if (client && client->connection) {
3714 sock = client->connection;
3716 /* If there is pending outgoing data for the client then purge it
3717 to the network before closing connection. */
3718 silc_server_packet_queue_purge(server, sock);
3720 /* Close the connection on our side */
3721 client->router = NULL;
3722 client->connection = NULL;
3723 sock->user_data = NULL;
3724 silc_server_close_connection(server, sock);
3727 silc_free(client_id);
3731 SILC_TASK_CALLBACK(silc_server_command_detach_timeout)
3733 SilcServer server = app_context;
3734 QuitInternal q = (QuitInternal)context;
3735 SilcClientID *client_id = (SilcClientID *)q->sock;
3736 SilcClientEntry client;
3738 client = silc_idlist_find_client_by_id(server->local_list, client_id,
3740 if (client && client->mode & SILC_UMODE_DETACHED) {
3741 SILC_LOG_DEBUG(("Detach timeout"));
3742 silc_server_free_client_data(server, NULL, client, TRUE,
3746 silc_free(client_id);
3750 /* Server side of DETACH command. Detached the client from the network
3751 by closing the connection but preserving the session. */
3753 SILC_SERVER_CMD_FUNC(detach)
3755 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
3756 SilcServer server = cmd->server;
3757 SilcClientEntry client = (SilcClientEntry)cmd->sock->user_data;
3760 if (server->config->detach_disabled) {
3761 silc_server_command_send_status_reply(cmd, SILC_COMMAND_DETACH,
3762 SILC_STATUS_ERR_OPERATION_ALLOWED,
3767 if (cmd->sock->type != SILC_SOCKET_TYPE_CLIENT || !client)
3770 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_DETACH, cmd, 0, 0);
3772 /* Remove operator privileges, since the client may resume in some
3773 other server which to it does not have operator privileges. */
3774 SILC_OPER_STATS_UPDATE(client, server, SILC_UMODE_SERVER_OPERATOR);
3775 SILC_OPER_STATS_UPDATE(client, router, SILC_UMODE_ROUTER_OPERATOR);
3777 /* Send the user mode notify to notify that client is detached */
3778 client->mode |= SILC_UMODE_DETACHED;
3779 client->data.status &= ~SILC_IDLIST_STATUS_RESUMED;
3780 client->data.status &= ~SILC_IDLIST_STATUS_NOATTR;
3781 client->last_command = 0;
3782 client->fast_command = 0;
3783 silc_server_send_notify_umode(server, SILC_PRIMARY_ROUTE(server),
3784 SILC_BROADCAST(server), client->id,
3786 server->stat.my_detached++;
3788 /* Check if anyone is watching this nickname */
3789 if (server->server_type == SILC_ROUTER)
3790 silc_server_check_watcher_list(server, client, NULL,
3791 SILC_NOTIFY_TYPE_UMODE_CHANGE);
3793 q = silc_calloc(1, sizeof(*q));
3794 q->sock = silc_id_dup(client->id, SILC_ID_CLIENT);
3795 silc_schedule_task_add(server->schedule, 0, silc_server_command_detach_cb,
3796 q, 0, 200000, SILC_TASK_TIMEOUT, SILC_TASK_PRI_LOW);
3798 if (server->config->detach_timeout) {
3799 q = silc_calloc(1, sizeof(*q));
3800 q->sock = silc_id_dup(client->id, SILC_ID_CLIENT);
3801 silc_schedule_task_add(server->schedule, 0,
3802 silc_server_command_detach_timeout,
3803 q, server->config->detach_timeout * 60,
3804 0, SILC_TASK_TIMEOUT, SILC_TASK_PRI_LOW);
3807 /* Send reply to the sender */
3808 silc_server_command_send_status_reply(cmd, SILC_COMMAND_DETACH,
3812 silc_server_command_free(cmd);
3815 /* Server side of WATCH command. */
3817 SILC_SERVER_CMD_FUNC(watch)
3819 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
3820 SilcServer server = cmd->server;
3821 char *add_nick, *del_nick;
3822 SilcUInt32 add_nick_len, del_nick_len, tmp_len;
3824 unsigned char hash[16], *tmp;
3825 SilcClientEntry client;
3826 SilcClientID *client_id = NULL;
3828 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_WATCH, cmd, 1, 3);
3830 if (server->server_type != SILC_ROUTER && !server->standalone) {
3831 if (!cmd->pending) {
3832 /* Send the command to router */
3834 SilcUInt16 old_ident;
3836 SILC_LOG_DEBUG(("Forwarding WATCH to router"));
3838 old_ident = silc_command_get_ident(cmd->payload);
3839 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
3840 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
3842 silc_server_packet_send(server, SILC_PRIMARY_ROUTE(server),
3843 SILC_PACKET_COMMAND, cmd->packet->flags,
3844 tmpbuf->data, tmpbuf->len, TRUE);
3846 /* Reprocess this packet after received reply from router */
3847 silc_server_command_pending(server, SILC_COMMAND_WATCH,
3848 silc_command_get_ident(cmd->payload),
3849 silc_server_command_watch,
3850 silc_server_command_dup(cmd));
3851 cmd->pending = TRUE;
3852 silc_command_set_ident(cmd->payload, old_ident);
3853 silc_buffer_free(tmpbuf);
3854 } else if (context2) {
3855 /* Received reply from router, just send same data to the client. */
3856 SilcServerCommandReplyContext reply = context2;
3859 SILC_LOG_DEBUG(("Received reply to WATCH from router"));
3860 silc_command_get_status(reply->payload, &status, NULL);
3861 silc_server_command_send_status_reply(cmd, SILC_COMMAND_WATCH, status,
3868 /* We are router and keep the watch list for local cell */
3870 /* Get the client ID */
3871 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
3873 silc_server_command_send_status_reply(cmd, SILC_COMMAND_WATCH,
3874 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
3878 client_id = silc_id_payload_parse_id(tmp, tmp_len, NULL);
3880 silc_server_command_send_status_reply(cmd, SILC_COMMAND_WATCH,
3881 SILC_STATUS_ERR_NO_SUCH_CLIENT_ID,
3886 /* Get the client entry which must be in local list */
3887 client = silc_idlist_find_client_by_id(server->local_list,
3888 client_id, TRUE, NULL);
3890 silc_server_command_send_status_reply(cmd, SILC_COMMAND_WATCH,
3891 SILC_STATUS_ERR_NO_SUCH_CLIENT_ID,
3897 add_nick = silc_argument_get_arg_type(cmd->args, 2, &add_nick_len);
3898 del_nick = silc_argument_get_arg_type(cmd->args, 3, &del_nick_len);
3899 if (!add_nick && !del_nick) {
3900 silc_server_command_send_status_reply(cmd, SILC_COMMAND_WATCH,
3901 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
3906 if (add_nick && add_nick_len > 128)
3907 add_nick[128] = '\0';
3908 if (del_nick && del_nick_len > 128)
3909 del_nick[128] = '\0';
3911 memset(nick, 0, sizeof(nick));
3913 /* Add new nickname to be watched in our cell */
3915 if (silc_server_name_bad_chars(add_nick, strlen(add_nick)) == TRUE) {
3916 silc_server_command_send_status_reply(cmd, SILC_COMMAND_WATCH,
3917 SILC_STATUS_ERR_BAD_NICKNAME, 0);
3921 /* Hash the nick, we have the hash saved, not nicks because we can
3922 do one to one mapping to the nick from Client ID hash this way. */
3923 silc_to_lower(add_nick, nick, sizeof(nick) - 1);
3924 silc_hash_make(server->md5hash, nick, strlen(nick), hash);
3926 /* Check whether this client is already watching this nickname */
3927 if (silc_hash_table_find_by_context(server->watcher_list, hash,
3929 /* Nickname is alredy being watched for this client */
3930 silc_server_command_send_status_reply(cmd, SILC_COMMAND_WATCH,
3931 SILC_STATUS_ERR_NICKNAME_IN_USE,
3936 /* Get the nickname from the watcher list and use the same key in
3937 new entries as well. If key doesn't exist then create it. */
3938 if (!silc_hash_table_find(server->watcher_list, hash, (void **)&tmp, NULL))
3939 tmp = silc_memdup(hash, CLIENTID_HASH_LEN);
3941 /* Add the client to the watcher list with the specified nickname hash. */
3942 silc_hash_table_add(server->watcher_list, tmp, client);
3945 /* Delete nickname from watch list */
3947 if (silc_server_name_bad_chars(del_nick, strlen(del_nick)) == TRUE) {
3948 silc_server_command_send_status_reply(cmd, SILC_COMMAND_WATCH,
3949 SILC_STATUS_ERR_BAD_NICKNAME, 0);
3953 /* Hash the nick, we have the hash saved, not nicks because we can
3954 do one to one mapping to the nick from Client ID hash this way. */
3955 silc_to_lower(del_nick, nick, sizeof(nick) - 1);
3956 silc_hash_make(server->md5hash, nick, strlen(nick), hash);
3958 /* Check that this client is watching for this nickname */
3959 if (!silc_hash_table_find_by_context(server->watcher_list, hash,
3960 client, (void **)&tmp)) {
3961 /* Nickname is alredy being watched for this client */
3962 silc_server_command_send_status_reply(cmd, SILC_COMMAND_WATCH,
3963 SILC_STATUS_ERR_NO_SUCH_NICK, 0);
3967 /* Delete the nickname from the watcher list. */
3968 silc_hash_table_del_by_context(server->watcher_list, hash, client);
3970 /* Now check whether there still exists entries with this key, if not
3971 then free the key to not leak memory. */
3972 if (!silc_hash_table_find(server->watcher_list, hash, NULL, NULL))
3976 /* Distribute the watch list to backup routers too */
3977 if (server->backup) {
3979 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
3980 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
3981 silc_server_backup_send(server, NULL, SILC_PACKET_COMMAND,
3982 cmd->packet->flags, tmpbuf->data, tmpbuf->len,
3984 silc_buffer_free(tmpbuf);
3987 silc_server_command_send_status_reply(cmd, SILC_COMMAND_WATCH,
3991 silc_free(client_id);
3992 silc_server_command_free(cmd);
3995 /* Server side of SILCOPER command. Client uses this comand to obtain router
3996 operator privileges to this router. */
3998 SILC_SERVER_CMD_FUNC(silcoper)
4000 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
4001 SilcServer server = cmd->server;
4002 SilcClientEntry client = (SilcClientEntry)cmd->sock->user_data;
4003 unsigned char *username, *auth;
4005 SilcServerConfigAdmin *admin;
4006 SilcIDListData idata = (SilcIDListData)client;
4007 bool result = FALSE;
4008 SilcPublicKey cached_key;
4010 if (cmd->sock->type != SILC_SOCKET_TYPE_CLIENT || !client)
4013 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_SILCOPER, cmd, 1, 2);
4015 if (server->server_type != SILC_ROUTER) {
4016 silc_server_command_send_status_reply(cmd, SILC_COMMAND_SILCOPER,
4017 SILC_STATUS_ERR_AUTH_FAILED, 0);
4021 /* Get the username */
4022 username = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
4024 silc_server_command_send_status_reply(cmd, SILC_COMMAND_SILCOPER,
4025 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
4030 /* Get the admin configuration */
4031 admin = silc_server_config_find_admin(server, cmd->sock->ip,
4032 username, client->nickname);
4034 admin = silc_server_config_find_admin(server, cmd->sock->hostname,
4035 username, client->nickname);
4037 silc_server_command_send_status_reply(cmd, SILC_COMMAND_SILCOPER,
4038 SILC_STATUS_ERR_AUTH_FAILED, 0);
4039 SILC_LOG_INFO(("SILCOPER authentication failed for username '%s' by "
4040 "nickname '%s' from %s", username,
4041 client->nickname, cmd->sock->hostname));
4046 /* Get the authentication payload */
4047 auth = silc_argument_get_arg_type(cmd->args, 2, &tmp_len);
4049 silc_server_command_send_status_reply(cmd, SILC_COMMAND_SILCOPER,
4050 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
4055 /* Verify the authentication data. If both passphrase and public key
4056 is set then try both of them. */
4057 if (admin->passphrase)
4058 result = silc_auth_verify_data(auth, tmp_len, SILC_AUTH_PASSWORD,
4059 admin->passphrase, admin->passphrase_len,
4060 idata->hash, client->id, SILC_ID_CLIENT);
4061 if (!result && admin->publickeys) {
4062 cached_key = silc_server_get_public_key(server, admin->publickeys);
4065 result = silc_auth_verify_data(auth, tmp_len, SILC_AUTH_PUBLIC_KEY,
4066 cached_key, 0, idata->hash,
4067 client->id, SILC_ID_CLIENT);
4070 /* Authentication failed */
4071 silc_server_command_send_status_reply(cmd, SILC_COMMAND_OPER,
4072 SILC_STATUS_ERR_AUTH_FAILED, 0);
4076 /* Client is now router operator */
4077 client->mode |= SILC_UMODE_ROUTER_OPERATOR;
4079 /* Update statistics */
4080 if (SILC_IS_LOCAL(client))
4081 server->stat.my_router_ops++;
4082 if (server->server_type == SILC_ROUTER)
4083 server->stat.router_ops++;
4085 /* Send UMODE change to primary router */
4086 silc_server_send_notify_umode(server, SILC_PRIMARY_ROUTE(server),
4087 SILC_BROADCAST(server), client->id,
4090 /* Check if anyone is watching this nickname */
4091 if (server->server_type == SILC_ROUTER)
4092 silc_server_check_watcher_list(server, client, NULL,
4093 SILC_NOTIFY_TYPE_UMODE_CHANGE);
4095 /* Send reply to the sender */
4096 silc_server_command_send_status_reply(cmd, SILC_COMMAND_SILCOPER,
4100 silc_server_command_free(cmd);
4103 /* Server side of command BAN. This is used to manage the ban list of the
4104 channel. To add clients and remove clients from the ban list. */
4106 SILC_SERVER_CMD_FUNC(ban)
4108 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
4109 SilcServer server = cmd->server;
4110 SilcClientEntry client = (SilcClientEntry)cmd->sock->user_data;
4111 SilcBuffer packet, list, tmp2;
4112 SilcChannelEntry channel;
4113 SilcChannelClientEntry chl;
4114 SilcChannelID *channel_id = NULL;
4115 unsigned char *id, *tmp;
4116 SilcUInt32 id_len, len;
4117 SilcArgumentPayload args;
4118 SilcHashTableList htl;
4120 SilcUInt16 argc = 0, ident = silc_command_get_ident(cmd->payload);
4122 if (cmd->sock->type != SILC_SOCKET_TYPE_CLIENT || !client)
4125 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_BAN, cmd, 0, 3);
4127 /* Get Channel ID */
4128 id = silc_argument_get_arg_type(cmd->args, 1, &id_len);
4130 channel_id = silc_id_payload_parse_id(id, id_len, NULL);
4132 silc_server_command_send_status_reply(cmd, SILC_COMMAND_BAN,
4133 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
4138 /* Get channel entry. The server must know about the channel since the
4139 client is expected to be on the channel. */
4140 channel = silc_idlist_find_channel_by_id(server->local_list,
4143 channel = silc_idlist_find_channel_by_id(server->global_list,
4146 silc_server_command_send_status_reply(cmd, SILC_COMMAND_BAN,
4147 SILC_STATUS_ERR_NO_SUCH_CHANNEL,
4153 /* Check whether this client is on the channel */
4154 if (!silc_server_client_on_channel(client, channel, &chl)) {
4155 silc_server_command_send_status_reply(cmd, SILC_COMMAND_BAN,
4156 SILC_STATUS_ERR_NOT_ON_CHANNEL, 0);
4160 /* The client must be at least channel operator. */
4161 if (!(chl->mode & SILC_CHANNEL_UMODE_CHANOP)) {
4162 silc_server_command_send_status_reply(cmd, SILC_COMMAND_BAN,
4163 SILC_STATUS_ERR_NO_CHANNEL_PRIV, 0);
4167 /* Get the ban information */
4168 tmp = silc_argument_get_arg_type(cmd->args, 3, &len);
4169 if (tmp && len > 2) {
4170 /* Parse the arguments to see they are constructed correctly */
4171 SILC_GET16_MSB(argc, tmp);
4172 args = silc_argument_payload_parse(tmp + 2, len - 2, argc);
4174 silc_server_command_send_status_reply(cmd, SILC_COMMAND_BAN,
4175 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
4180 /* Get the type of action */
4181 tmp = silc_argument_get_arg_type(cmd->args, 2, &len);
4182 if (tmp && len == 1) {
4183 if (tmp[0] == 0x00) {
4184 /* Allocate hash table for ban list if it doesn't exist yet */
4185 if (!channel->ban_list)
4187 silc_hash_table_alloc(0, silc_hash_ptr,
4189 silc_server_inviteban_destruct, channel,
4192 /* Check for resource limit */
4193 if (silc_hash_table_count(channel->ban_list) > 64) {
4194 silc_server_command_send_status_reply(cmd, SILC_COMMAND_BAN,
4195 SILC_STATUS_ERR_RESOURCE_LIMIT,
4201 /* Now add or delete the information. */
4202 silc_server_inviteban_process(server, channel->ban_list,
4203 (SilcUInt8)tmp[0], args);
4205 silc_argument_payload_free(args);
4208 /* Encode ban list */
4210 if (channel->ban_list && silc_hash_table_count(channel->ban_list)) {
4211 list = silc_buffer_alloc_size(2);
4212 silc_buffer_format(list,
4213 SILC_STR_UI_SHORT(silc_hash_table_count(
4214 channel->ban_list)),
4216 silc_hash_table_list(channel->ban_list, &htl);
4217 while (silc_hash_table_get(&htl, (void **)&type, (void **)&tmp2)) {
4219 list = silc_argument_payload_encode_one(list, (char *)tmp2,
4220 strlen((char *)tmp2), type);
4222 list = silc_argument_payload_encode_one(list, tmp2->data, tmp2->len,
4225 silc_hash_table_list_reset(&htl);
4228 /* Send the BAN notify type to our primary router. */
4230 silc_server_send_notify_ban(server, SILC_PRIMARY_ROUTE(server),
4231 SILC_BROADCAST(server), channel,
4232 silc_argument_get_arg_type(cmd->args, 2, NULL),
4235 /* Send the reply back to the client */
4237 silc_command_reply_payload_encode_va(SILC_COMMAND_BAN,
4238 SILC_STATUS_OK, 0, ident, 2,
4240 3, list ? list->data : NULL,
4241 list ? list->len : 0);
4242 silc_server_packet_send(server, cmd->sock, SILC_PACKET_COMMAND_REPLY, 0,
4243 packet->data, packet->len, FALSE);
4245 silc_buffer_free(packet);
4246 silc_buffer_free(list);
4249 silc_free(channel_id);
4250 silc_server_command_free(cmd);
4253 /* Server side command of LEAVE. Removes client from a channel. */
4255 SILC_SERVER_CMD_FUNC(leave)
4257 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
4258 SilcServer server = cmd->server;
4259 SilcSocketConnection sock = cmd->sock;
4260 SilcClientEntry id_entry = (SilcClientEntry)cmd->sock->user_data;
4261 SilcChannelID *id = NULL;
4262 SilcChannelEntry channel;
4266 if (cmd->sock->type != SILC_SOCKET_TYPE_CLIENT || !id_entry)
4269 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_LEAVE, cmd, 1, 2);
4271 /* Get Channel ID */
4272 tmp = silc_argument_get_arg_type(cmd->args, 1, &len);
4274 silc_server_command_send_status_reply(cmd, SILC_COMMAND_LEAVE,
4275 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
4278 id = silc_id_payload_parse_id(tmp, len, NULL);
4280 silc_server_command_send_status_reply(cmd, SILC_COMMAND_LEAVE,
4281 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
4285 /* Get channel entry */
4286 channel = silc_idlist_find_channel_by_id(server->local_list, id, NULL);
4288 channel = silc_idlist_find_channel_by_id(server->global_list, id, NULL);
4290 silc_server_command_send_status_reply(cmd, SILC_COMMAND_LEAVE,
4291 SILC_STATUS_ERR_NO_SUCH_CHANNEL,
4297 /* Check whether this client is on the channel */
4298 if (!silc_server_client_on_channel(id_entry, channel, NULL)) {
4299 silc_server_command_send_status_reply(cmd, SILC_COMMAND_LEAVE,
4300 SILC_STATUS_ERR_NOT_ON_CHANNEL, 0);
4304 /* Notify routers that they should remove this client from their list
4305 of clients on the channel. Send LEAVE notify type. */
4306 silc_server_send_notify_leave(server, SILC_PRIMARY_ROUTE(server),
4307 SILC_BROADCAST(server), channel, id_entry->id);
4309 silc_server_command_send_status_data(cmd, SILC_COMMAND_LEAVE,
4310 SILC_STATUS_OK, 0, 2, tmp, len);
4312 /* Remove client from channel */
4313 if (!silc_server_remove_from_one_channel(server, sock, channel, id_entry,
4315 /* If the channel does not exist anymore we won't send anything */
4318 if (!(channel->mode & SILC_CHANNEL_MODE_PRIVKEY)) {
4319 /* Re-generate channel key */
4320 if (!silc_server_create_channel_key(server, channel, 0))
4323 /* Send the channel key */
4324 silc_server_send_channel_key(server, NULL, channel,
4325 server->server_type == SILC_ROUTER ?
4326 FALSE : !server->standalone);
4331 silc_server_command_free(cmd);
4334 /* Server side of command USERS. Resolves clients and their USERS currently
4335 joined on the requested channel. The list of Client ID's and their modes
4336 on the channel is sent back. */
4338 SILC_SERVER_CMD_FUNC(users)
4340 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
4341 SilcServer server = cmd->server;
4342 SilcChannelEntry channel;
4343 SilcChannelID *id = NULL;
4344 SilcBuffer packet, idp;
4345 unsigned char *channel_id;
4346 SilcUInt32 channel_id_len;
4347 SilcBuffer client_id_list;
4348 SilcBuffer client_mode_list;
4349 unsigned char lc[4];
4350 SilcUInt32 list_count = 0;
4351 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
4354 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_USERS, cmd, 1, 2);
4356 /* Get Channel ID */
4357 channel_id = silc_argument_get_arg_type(cmd->args, 1, &channel_id_len);
4359 /* Get channel name */
4360 channel_name = silc_argument_get_arg_type(cmd->args, 2, NULL);
4362 if (!channel_id && !channel_name) {
4363 silc_server_command_send_status_reply(cmd, SILC_COMMAND_USERS,
4364 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
4369 id = silc_id_payload_parse_id(channel_id, channel_id_len, NULL);
4371 silc_server_command_send_status_reply(cmd, SILC_COMMAND_USERS,
4372 SILC_STATUS_ERR_BAD_CHANNEL_ID, 0);
4377 /* If we are server and we don't know about this channel we will send
4378 the command to our router. If we know about the channel then we also
4379 have the list of users already. */
4381 channel = silc_idlist_find_channel_by_id(server->local_list, id, NULL);
4383 channel = silc_idlist_find_channel_by_name(server->local_list,
4384 channel_name, NULL);
4386 if (!channel || (!server->standalone && (channel->disabled ||
4387 !channel->users_resolved))) {
4388 if (server->server_type != SILC_ROUTER && !server->standalone &&
4392 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
4393 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
4395 /* Send USERS command */
4396 silc_server_packet_send(server, SILC_PRIMARY_ROUTE(server),
4397 SILC_PACKET_COMMAND, cmd->packet->flags,
4398 tmpbuf->data, tmpbuf->len, TRUE);
4400 /* Reprocess this packet after received reply */
4401 silc_server_command_pending(server, SILC_COMMAND_USERS,
4402 silc_command_get_ident(cmd->payload),
4403 silc_server_command_users,
4404 silc_server_command_dup(cmd));
4405 cmd->pending = TRUE;
4406 silc_command_set_ident(cmd->payload, ident);
4407 silc_buffer_free(tmpbuf);
4412 /* Check the global list as well. */
4414 channel = silc_idlist_find_channel_by_id(server->global_list, id, NULL);
4416 channel = silc_idlist_find_channel_by_name(server->global_list,
4417 channel_name, NULL);
4419 /* Channel really does not exist */
4420 silc_server_command_send_status_reply(cmd, SILC_COMMAND_USERS,
4421 SILC_STATUS_ERR_NO_SUCH_CHANNEL,
4427 /* If the channel is private or secret do not send anything, unless the
4428 user requesting this command is on the channel or is server */
4429 if (cmd->sock->type == SILC_SOCKET_TYPE_CLIENT) {
4430 if (channel->mode & (SILC_CHANNEL_MODE_PRIVATE | SILC_CHANNEL_MODE_SECRET)
4431 && !silc_server_client_on_channel(cmd->sock->user_data, channel,
4433 silc_server_command_send_status_reply(cmd, SILC_COMMAND_USERS,
4434 SILC_STATUS_ERR_NO_SUCH_CHANNEL,
4440 /* Get the users list */
4441 if (!silc_server_get_users_on_channel(server, channel, &client_id_list,
4442 &client_mode_list, &list_count)) {
4444 client_id_list = NULL;
4445 client_mode_list = NULL;
4449 SILC_PUT32_MSB(list_count, lc);
4452 idp = silc_id_payload_encode(channel->id, SILC_ID_CHANNEL);
4453 packet = silc_command_reply_payload_encode_va(SILC_COMMAND_USERS,
4454 SILC_STATUS_OK, 0, ident, 4,
4455 2, idp->data, idp->len,
4458 client_id_list->data : NULL,
4460 client_id_list->len : 0,
4461 5, client_mode_list ?
4462 client_mode_list->data : NULL,
4464 client_mode_list->len : 0);
4465 silc_server_packet_send(server, cmd->sock, SILC_PACKET_COMMAND_REPLY, 0,
4466 packet->data, packet->len, FALSE);
4468 silc_buffer_free(idp);
4469 silc_buffer_free(packet);
4471 silc_buffer_free(client_id_list);
4472 if (client_mode_list)
4473 silc_buffer_free(client_mode_list);
4477 silc_server_command_free(cmd);
4480 /* Server side of command GETKEY. This fetches the client's public key
4481 from the server where to the client is connected. */
4483 SILC_SERVER_CMD_FUNC(getkey)
4485 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
4486 SilcServer server = cmd->server;
4488 SilcClientEntry client;
4489 SilcServerEntry server_entry;
4490 SilcClientID *client_id = NULL;
4491 SilcServerID *server_id = NULL;
4492 SilcIDPayload idp = NULL;
4493 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
4496 SilcBuffer pk = NULL;
4498 SilcPublicKey public_key;
4500 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
4502 silc_server_command_send_status_reply(cmd, SILC_COMMAND_GETKEY,
4503 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
4507 idp = silc_id_payload_parse(tmp, tmp_len);
4509 silc_server_command_send_status_reply(cmd, SILC_COMMAND_GETKEY,
4510 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
4515 id_type = silc_id_payload_get_type(idp);
4516 if (id_type == SILC_ID_CLIENT) {
4517 client_id = silc_id_payload_get_id(idp);
4519 /* If the client is not found from local list there is no chance it
4520 would be locally connected client so send the command further. */
4521 client = silc_idlist_find_client_by_id(server->local_list,
4522 client_id, TRUE, NULL);
4524 client = silc_idlist_find_client_by_id(server->global_list,
4525 client_id, TRUE, NULL);
4527 if ((!client && !cmd->pending && !server->standalone) ||
4528 (client && !client->connection && !cmd->pending &&
4529 !(client->mode & SILC_UMODE_DETACHED)) ||
4530 (client && !client->data.public_key && !cmd->pending)) {
4532 SilcUInt16 old_ident;
4533 SilcSocketConnection dest_sock;
4535 dest_sock = silc_server_get_client_route(server, NULL, 0,
4536 client_id, NULL, NULL);
4540 old_ident = silc_command_get_ident(cmd->payload);
4541 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
4542 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
4544 silc_server_packet_send(server, dest_sock,
4545 SILC_PACKET_COMMAND, cmd->packet->flags,
4546 tmpbuf->data, tmpbuf->len, TRUE);
4548 /* Reprocess this packet after received reply from router */
4549 silc_server_command_pending(server, SILC_COMMAND_GETKEY,
4550 silc_command_get_ident(cmd->payload),
4551 silc_server_command_getkey,
4552 silc_server_command_dup(cmd));
4553 cmd->pending = TRUE;
4554 silc_command_set_ident(cmd->payload, old_ident);
4555 silc_buffer_free(tmpbuf);
4560 silc_server_command_send_status_reply(cmd, SILC_COMMAND_GETKEY,
4561 SILC_STATUS_ERR_NO_SUCH_CLIENT_ID,
4566 /* The client is locally connected, just get the public key and
4567 send it back. If they key does not exist then do not send it,
4568 send just OK reply */
4569 public_key = client->data.public_key;
4571 pk = silc_pkcs_public_key_payload_encode(public_key);
4572 } else if (id_type == SILC_ID_SERVER) {
4573 server_id = silc_id_payload_get_id(idp);
4575 /* If the server is not found from local list there is no chance it
4576 would be locally connected server so send the command further. */
4577 server_entry = silc_idlist_find_server_by_id(server->local_list,
4578 server_id, TRUE, NULL);
4580 server_entry = silc_idlist_find_server_by_id(server->global_list,
4581 server_id, TRUE, NULL);
4583 if (server_entry != server->id_entry &&
4584 ((!server_entry && !cmd->pending && !server->standalone) ||
4585 (server_entry && !server_entry->connection && !cmd->pending &&
4586 !server->standalone) ||
4587 (server_entry && !server_entry->data.public_key && !cmd->pending &&
4588 !server->standalone))) {
4590 SilcUInt16 old_ident;
4592 old_ident = silc_command_get_ident(cmd->payload);
4593 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
4594 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
4596 silc_server_packet_send(server, SILC_PRIMARY_ROUTE(server),
4597 SILC_PACKET_COMMAND, cmd->packet->flags,
4598 tmpbuf->data, tmpbuf->len, TRUE);
4600 /* Reprocess this packet after received reply from router */
4601 silc_server_command_pending(server, SILC_COMMAND_GETKEY,
4602 silc_command_get_ident(cmd->payload),
4603 silc_server_command_getkey,
4604 silc_server_command_dup(cmd));
4605 cmd->pending = TRUE;
4606 silc_command_set_ident(cmd->payload, old_ident);
4607 silc_buffer_free(tmpbuf);
4611 if (!server_entry) {
4612 silc_server_command_send_status_reply(cmd, SILC_COMMAND_GETKEY,
4613 SILC_STATUS_ERR_NO_SUCH_SERVER_ID,
4618 /* If they key does not exist then do not send it, send just OK reply */
4619 public_key = (!server_entry->data.public_key ?
4620 (server_entry == server->id_entry ? server->public_key :
4621 NULL) : server_entry->data.public_key);
4623 pk = silc_pkcs_public_key_payload_encode(public_key);
4628 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
4629 packet = silc_command_reply_payload_encode_va(SILC_COMMAND_GETKEY,
4630 SILC_STATUS_OK, 0, ident, 2,
4632 3, pk ? pk->data : NULL,
4634 silc_server_packet_send(server, cmd->sock, SILC_PACKET_COMMAND_REPLY, 0,
4635 packet->data, packet->len, FALSE);
4636 silc_buffer_free(packet);
4640 silc_id_payload_free(idp);
4641 silc_buffer_free(pk);
4642 silc_free(client_id);
4643 silc_free(server_id);
4644 silc_server_command_free(cmd);
4648 /* Private range commands, specific to this implementation */
4650 /* Server side command of CONNECT. Connects us to the specified remote
4651 server or router. */
4653 SILC_SERVER_CMD_FUNC(connect)
4655 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
4656 SilcServer server = cmd->server;
4657 SilcClientEntry client = (SilcClientEntry)cmd->sock->user_data;
4658 unsigned char *tmp, *host;
4660 SilcUInt32 port = SILC_PORT;
4662 if (cmd->sock->type != SILC_SOCKET_TYPE_CLIENT || !client)
4665 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_PRIV_CONNECT, cmd, 1, 2);
4667 /* Check whether client has the permissions. */
4668 if (!(client->mode & SILC_UMODE_SERVER_OPERATOR) &&
4669 !(client->mode & SILC_UMODE_ROUTER_OPERATOR)) {
4670 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_CONNECT,
4671 SILC_STATUS_ERR_NO_SERVER_PRIV, 0);
4675 if (server->server_type == SILC_ROUTER && !server->backup_router &&
4676 client->mode & SILC_UMODE_SERVER_OPERATOR) {
4677 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_CONNECT,
4678 SILC_STATUS_ERR_NO_ROUTER_PRIV, 0);
4682 /* Get the remote server */
4683 host = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
4685 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_CONNECT,
4686 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
4692 tmp = silc_argument_get_arg_type(cmd->args, 2, &tmp_len);
4694 SILC_GET32_MSB(port, tmp);
4696 /* Create the connection. It is done with timeout and is async. */
4697 silc_server_create_connection(server, host, port);
4699 /* Send reply to the sender */
4700 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_CONNECT,
4704 silc_server_command_free(cmd);
4707 /* Server side command of CLOSE. Closes connection to a specified server. */
4709 SILC_SERVER_CMD_FUNC(close)
4711 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
4712 SilcServer server = cmd->server;
4713 SilcClientEntry client = (SilcClientEntry)cmd->sock->user_data;
4714 SilcServerEntry server_entry;
4715 SilcSocketConnection sock;
4718 unsigned char *name;
4719 SilcUInt32 port = SILC_PORT;
4721 if (cmd->sock->type != SILC_SOCKET_TYPE_CLIENT || !client)
4724 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_PRIV_CLOSE, cmd, 1, 2);
4726 /* Check whether client has the permissions. */
4727 if (!(client->mode & SILC_UMODE_SERVER_OPERATOR) &&
4728 !(client->mode & SILC_UMODE_ROUTER_OPERATOR)) {
4729 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_CLOSE,
4730 SILC_STATUS_ERR_NO_SERVER_PRIV,
4735 /* Get the remote server */
4736 name = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
4738 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_CLOSE,
4739 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
4745 tmp = silc_argument_get_arg_type(cmd->args, 2, &tmp_len);
4747 SILC_GET32_MSB(port, tmp);
4749 server_entry = silc_idlist_find_server_by_conn(server->local_list,
4750 name, port, FALSE, NULL);
4752 server_entry = silc_idlist_find_server_by_conn(server->global_list,
4753 name, port, FALSE, NULL);
4754 if (!server_entry) {
4755 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_CLOSE,
4756 SILC_STATUS_ERR_NO_SERVER_ID, 0);
4760 if (server_entry == server->id_entry) {
4761 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_CLOSE,
4762 SILC_STATUS_ERR_NO_SERVER_ID, 0);
4766 /* Send reply to the sender */
4767 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_CLOSE,
4770 /* Close the connection to the server */
4771 sock = (SilcSocketConnection)server_entry->connection;
4773 /* If we shutdown primary router connection manually then don't trigger
4774 any reconnect or backup router connections, by setting the router
4776 if (server->router == server_entry) {
4777 server->id_entry->router = NULL;
4778 server->router = NULL;
4779 server->standalone = TRUE;
4781 silc_server_free_sock_user_data(server, sock, NULL);
4782 silc_server_close_connection(server, sock);
4785 silc_server_command_free(cmd);
4788 /* Server side command of SHUTDOWN. Shutdowns the server and closes all
4789 active connections. */
4791 SILC_SERVER_CMD_FUNC(shutdown)
4793 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
4794 SilcServer server = cmd->server;
4795 SilcClientEntry client = (SilcClientEntry)cmd->sock->user_data;
4797 if (cmd->sock->type != SILC_SOCKET_TYPE_CLIENT || !client)
4800 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_PRIV_SHUTDOWN, cmd, 0, 0);
4802 /* Check whether client has the permission. */
4803 if (!(client->mode & SILC_UMODE_SERVER_OPERATOR) &&
4804 !(client->mode & SILC_UMODE_ROUTER_OPERATOR)) {
4805 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_SHUTDOWN,
4806 SILC_STATUS_ERR_NO_SERVER_PRIV,
4811 /* Send reply to the sender */
4812 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_SHUTDOWN,
4815 /* Then, gracefully, or not, bring the server down. */
4816 silc_server_stop(server);
4820 silc_server_command_free(cmd);