5 Author: Pekka Riikonen <priikone@silcnet.org>
7 Copyright (C) 1997 - 2004 Pekka Riikonen
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; version 2 of the License.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
21 #include "serverincludes.h"
22 #include "server_internal.h"
24 static int silc_server_is_registered(SilcServer server,
25 SilcSocketConnection sock,
26 SilcServerCommandContext cmd,
29 silc_server_command_send_status_reply(SilcServerCommandContext cmd,
34 silc_server_command_send_status_data(SilcServerCommandContext cmd,
39 const unsigned char *arg,
42 silc_server_command_pending_error_check(SilcServerCommandContext cmd,
43 SilcServerCommandReplyContext cmdr,
45 SILC_TASK_CALLBACK(silc_server_command_process_timeout);
47 /* Server command list. */
48 SilcServerCommand silc_command_list[] =
50 SILC_SERVER_CMD(whois, WHOIS, SILC_CF_LAG | SILC_CF_REG),
51 SILC_SERVER_CMD(whowas, WHOWAS, SILC_CF_LAG | SILC_CF_REG),
52 SILC_SERVER_CMD(identify, IDENTIFY, SILC_CF_LAG | SILC_CF_REG),
53 SILC_SERVER_CMD(nick, NICK, SILC_CF_LAG_STRICT | SILC_CF_REG),
54 SILC_SERVER_CMD(list, LIST, SILC_CF_LAG_STRICT | SILC_CF_REG),
55 SILC_SERVER_CMD(topic, TOPIC, SILC_CF_LAG | SILC_CF_REG),
56 SILC_SERVER_CMD(invite, INVITE, SILC_CF_LAG | SILC_CF_REG),
57 SILC_SERVER_CMD(quit, QUIT, SILC_CF_LAG | SILC_CF_REG),
58 SILC_SERVER_CMD(kill, KILL, SILC_CF_LAG_STRICT | SILC_CF_REG | SILC_CF_OPER),
59 SILC_SERVER_CMD(info, INFO, SILC_CF_LAG | SILC_CF_REG),
60 SILC_SERVER_CMD(stats, STATS, SILC_CF_LAG | SILC_CF_REG),
61 SILC_SERVER_CMD(ping, PING, SILC_CF_LAG | SILC_CF_REG),
62 SILC_SERVER_CMD(oper, OPER, SILC_CF_LAG | SILC_CF_REG | SILC_CF_OPER),
63 SILC_SERVER_CMD(join, JOIN, SILC_CF_LAG_STRICT | SILC_CF_REG),
64 SILC_SERVER_CMD(motd, MOTD, SILC_CF_LAG | SILC_CF_REG),
65 SILC_SERVER_CMD(umode, UMODE, SILC_CF_LAG | SILC_CF_REG),
66 SILC_SERVER_CMD(cmode, CMODE, SILC_CF_LAG_STRICT | SILC_CF_REG),
67 SILC_SERVER_CMD(cumode, CUMODE, SILC_CF_LAG | SILC_CF_REG),
68 SILC_SERVER_CMD(kick, KICK, SILC_CF_LAG_STRICT | SILC_CF_REG),
69 SILC_SERVER_CMD(ban, BAN, SILC_CF_LAG_STRICT | SILC_CF_REG),
70 SILC_SERVER_CMD(detach, DETACH, SILC_CF_LAG_STRICT | SILC_CF_REG),
71 SILC_SERVER_CMD(watch, WATCH, SILC_CF_LAG | SILC_CF_REG),
72 SILC_SERVER_CMD(silcoper, SILCOPER,
73 SILC_CF_LAG | SILC_CF_REG | SILC_CF_SILC_OPER),
74 SILC_SERVER_CMD(leave, LEAVE, SILC_CF_LAG_STRICT | SILC_CF_REG),
75 SILC_SERVER_CMD(users, USERS, SILC_CF_LAG | SILC_CF_REG),
76 SILC_SERVER_CMD(getkey, GETKEY, SILC_CF_LAG | SILC_CF_REG),
78 SILC_SERVER_CMD(connect, PRIV_CONNECT,
79 SILC_CF_LAG | SILC_CF_REG | SILC_CF_OPER),
80 SILC_SERVER_CMD(close, PRIV_CLOSE,
81 SILC_CF_LAG | SILC_CF_REG | SILC_CF_OPER),
82 SILC_SERVER_CMD(shutdown, PRIV_SHUTDOWN, SILC_CF_LAG | SILC_CF_REG |
88 /* Performs several checks to the command. It first checks whether this
89 command was called as pending command callback. If it was then it checks
90 whether error occurred in the command reply where the pending command
93 It also checks that the requested command includes correct amount
95 #define SILC_SERVER_COMMAND_CHECK(command, context, min, max) \
99 if (silc_server_command_pending_error_check(cmd, context2, command)) { \
100 SILC_LOG_DEBUG(("Error occurred in command reply, command not called")); \
101 silc_server_command_free(cmd); \
105 _argc = silc_argument_get_arg_num(cmd->args); \
107 SILC_LOG_DEBUG(("Not enough parameters in command")); \
108 silc_server_command_send_status_reply(cmd, command, \
109 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS, \
111 silc_server_command_free(cmd); \
115 SILC_LOG_DEBUG(("Too many parameters in command")); \
116 silc_server_command_send_status_reply(cmd, command, \
117 SILC_STATUS_ERR_TOO_MANY_PARAMS, \
119 silc_server_command_free(cmd); \
124 /* Returns TRUE if the connection is registered. Unregistered connections
125 usually cannot send commands hence the check. */
127 static int silc_server_is_registered(SilcServer server,
128 SilcSocketConnection sock,
129 SilcServerCommandContext cmd,
132 SilcIDListData idata = (SilcIDListData)sock->user_data;
137 if (idata->status & SILC_IDLIST_STATUS_REGISTERED)
140 silc_server_command_send_status_reply(cmd, command,
141 SILC_STATUS_ERR_NOT_REGISTERED, 0);
145 /* Internal context to hold data when executed command with timeout. */
147 SilcServerCommandContext ctx;
148 SilcServerCommand *cmd;
149 } *SilcServerCommandTimeout;
151 /* Timeout callback to process commands with timeout for client. Client's
152 commands are always executed with timeout. */
154 SILC_TASK_CALLBACK(silc_server_command_process_timeout)
156 SilcServerCommandTimeout timeout = (SilcServerCommandTimeout)context;
157 SilcClientEntry client = (SilcClientEntry)timeout->ctx->sock->user_data;
160 SILC_LOG_DEBUG(("Client entry is invalid"));
161 silc_server_command_free(timeout->ctx);
166 /* Update access time */
167 client->last_command = time(NULL);
169 if (!(timeout->cmd->flags & SILC_CF_REG)) {
170 SILC_LOG_DEBUG(("Calling %s command",
171 silc_get_command_name(timeout->cmd->cmd)));
172 timeout->cmd->cb(timeout->ctx, NULL);
173 } else if (silc_server_is_registered(timeout->ctx->server,
176 timeout->cmd->cmd)) {
177 SILC_LOG_DEBUG(("Calling %s command",
178 silc_get_command_name(timeout->cmd->cmd)));
179 timeout->cmd->cb(timeout->ctx, NULL);
181 SILC_LOG_DEBUG(("Client is not registered"));
182 silc_server_command_free(timeout->ctx);
188 /* Processes received command packet. */
190 void silc_server_command_process(SilcServer server,
191 SilcSocketConnection sock,
192 SilcPacketContext *packet)
194 SilcServerCommandContext ctx;
195 SilcServerCommand *cmd;
198 /* Allocate command context. This must be free'd by the
199 command routine receiving it. */
200 ctx = silc_server_command_alloc();
201 ctx->server = server;
202 ctx->sock = silc_socket_dup(sock);
203 ctx->packet = silc_packet_context_dup(packet); /* Save original packet */
205 /* Parse the command payload in the packet */
206 ctx->payload = silc_command_payload_parse(packet->buffer->data,
207 packet->buffer->len);
209 SILC_LOG_ERROR(("Bad command payload, packet dropped"));
210 silc_packet_context_free(packet);
211 silc_socket_free(ctx->sock);
215 ctx->args = silc_command_get_args(ctx->payload);
217 /* Get the command */
218 command = silc_command_get(ctx->payload);
219 for (cmd = silc_command_list; cmd->cb; cmd++)
220 if (cmd->cmd == command)
223 if (!cmd || !cmd->cb) {
224 SILC_LOG_DEBUG(("Unknown command %d", command));
225 silc_server_command_send_status_reply(ctx, command,
226 SILC_STATUS_ERR_UNKNOWN_COMMAND, 0);
227 silc_server_command_free(ctx);
231 /* Execute client's commands always with timeout. Normally they are
232 executed with zero (0) timeout but if client is sending command more
233 frequently than once in 2 seconds, then the timeout may be 0 to 2
235 if (sock->type == SILC_SOCKET_TYPE_CLIENT) {
236 SilcClientEntry client = (SilcClientEntry)sock->user_data;
237 SilcServerCommandTimeout timeout;
241 SILC_LOG_DEBUG(("Client entry is invalid"));
242 silc_server_command_free(ctx);
246 timeout = silc_calloc(1, sizeof(*timeout));
250 if (client->last_command && (time(NULL) - client->last_command) < 2) {
251 client->fast_command++;
254 if (client->fast_command - 2 <= 0)
255 client->fast_command = 0;
257 client->fast_command -= 2;
261 if (!fast && ((cmd->flags & SILC_CF_LAG_STRICT) ||
262 (client->fast_command > 5 && cmd->flags & SILC_CF_LAG)))
263 silc_schedule_task_add(server->schedule, sock->sock,
264 silc_server_command_process_timeout, timeout,
265 (client->fast_command < 3 ? 0 :
266 2 - (time(NULL) - client->last_command)),
267 (client->fast_command < 3 ? 200000 : 0),
268 SILC_TASK_TIMEOUT, SILC_TASK_PRI_NORMAL);
270 silc_schedule_task_add(server->schedule, sock->sock,
271 silc_server_command_process_timeout, timeout,
272 0, 1, SILC_TASK_TIMEOUT, SILC_TASK_PRI_NORMAL);
276 /* Execute for server */
278 if (!(cmd->flags & SILC_CF_REG)) {
279 SILC_LOG_DEBUG(("Calling %s command", silc_get_command_name(cmd->cmd)));
281 } else if (silc_server_is_registered(server, sock, ctx, cmd->cmd)) {
282 SILC_LOG_DEBUG(("Calling %s command", silc_get_command_name(cmd->cmd)));
285 SILC_LOG_DEBUG(("Server is not registered"));
286 silc_server_command_free(ctx);
290 /* Allocate Command Context */
292 SilcServerCommandContext silc_server_command_alloc()
294 SilcServerCommandContext ctx = silc_calloc(1, sizeof(*ctx));
299 /* Free's the command context allocated before executing the command */
301 void silc_server_command_free(SilcServerCommandContext ctx)
304 SILC_LOG_DEBUG(("Command context %p refcnt %d->%d", ctx, ctx->users + 1,
306 if (ctx->users < 1) {
308 silc_command_payload_free(ctx->payload);
310 silc_packet_context_free(ctx->packet);
312 silc_socket_free(ctx->sock); /* Decrease reference counter */
317 /* Duplicate Command Context by adding reference counter. The context won't
318 be free'd untill it hits zero. */
320 SilcServerCommandContext
321 silc_server_command_dup(SilcServerCommandContext ctx)
324 SILC_LOG_DEBUG(("Command context %p refcnt %d->%d", ctx, ctx->users - 1,
329 /* Timeout for pending command. If reply to pending command never arrives
330 this is called to free resources. */
332 SILC_TASK_CALLBACK(silc_server_command_pending_timeout)
334 SilcServer server = app_context;
335 SilcServerCommandPending *reply = context;
336 SilcServerCommandReplyContext cmdr;
340 SILC_LOG_DEBUG(("Timeout pending command"));
342 /* Allocate temporary and bogus command reply context */
343 cmdr = silc_calloc(1, sizeof(*cmdr));
344 cmdr->server = server;
345 cmdr->ident = reply->ident;
347 /* Check for pending commands and mark to be exeucted */
349 silc_server_command_pending_check(server, reply->reply_cmd,
350 reply->ident, &cmdr->callbacks_count);
352 /* Create bogus command reply with an error inside */
354 silc_command_reply_payload_encode_va(reply->reply_cmd ? reply->reply_cmd :
355 SILC_COMMAND_RESERVED,
356 SILC_STATUS_ERR_TIMEDOUT, 0,
358 cmdr->payload = silc_command_payload_parse(tmpreply->data, tmpreply->len);
359 silc_buffer_free(tmpreply);
361 /* Call all callbacks. Same as SILC_SERVER_PENDING_EXEC macro. */
362 for (i = 0; i < cmdr->callbacks_count; i++)
363 if (cmdr->callbacks[i].callback)
364 (*cmdr->callbacks[i].callback)(cmdr->callbacks[i].context, cmdr);
366 silc_server_command_pending_del(server, reply->reply_cmd, reply->ident);
367 silc_server_command_reply_free(cmdr);
370 /* Add new pending command to be executed when reply to a command has been
371 received. The `reply_cmd' is the command that will call the `callback'
372 with `context' when reply has been received. It can be SILC_COMMAND_NONE
373 to match any command with the `ident'. If `ident' is non-zero
374 the `callback' will be executed when received reply with command
375 identifier `ident'. If there already exists pending command for the
376 specified command, ident, callback and context this function has no
379 bool silc_server_command_pending(SilcServer server,
380 SilcCommand reply_cmd,
382 SilcCommandCb callback,
385 return silc_server_command_pending_timed(server, reply_cmd, ident, callback,
389 /* Same as silc_server_command_pending with specific timeout for pending
390 commands. If the `timeout' is zero default timeout is used. */
392 bool silc_server_command_pending_timed(SilcServer server,
393 SilcCommand reply_cmd,
395 SilcCommandCb callback,
399 SilcServerCommandPending *reply;
401 /* Check whether identical pending already exists for same command,
402 ident, callback and callback context. If it does then it would be
403 error to register it again. */
404 silc_dlist_start(server->pending_commands);
405 while ((reply = silc_dlist_get(server->pending_commands)) != SILC_LIST_END) {
406 if (reply->reply_cmd == reply_cmd && reply->ident == ident &&
407 reply->callback == callback && reply->context == context)
411 reply = silc_calloc(1, sizeof(*reply));
412 reply->reply_cmd = reply_cmd;
413 reply->ident = ident;
414 reply->context = context;
415 reply->callback = callback;
417 silc_schedule_task_add(server->schedule, 0,
418 silc_server_command_pending_timeout, reply,
419 timeout ? timeout : 10, 0,
420 SILC_TASK_TIMEOUT, SILC_TASK_PRI_LOW);
421 silc_dlist_add(server->pending_commands, reply);
426 /* Deletes pending command by reply command type. */
428 void silc_server_command_pending_del(SilcServer server,
429 SilcCommand reply_cmd,
432 SilcServerCommandPending *r;
434 silc_dlist_start(server->pending_commands);
435 while ((r = silc_dlist_get(server->pending_commands)) != SILC_LIST_END) {
436 if ((r->reply_cmd == reply_cmd || (r->reply_cmd == SILC_COMMAND_NONE &&
438 && r->ident == ident) {
439 silc_dlist_del(server->pending_commands, r);
441 silc_schedule_task_del(server->schedule, r->timeout);
447 /* Checks for pending commands and marks callbacks to be called from
448 the command reply function. Returns TRUE if there were pending command. */
450 SilcServerCommandPendingCallbacks
451 silc_server_command_pending_check(SilcServer server,
454 SilcUInt32 *callbacks_count)
456 SilcServerCommandPending *r;
457 SilcServerCommandPendingCallbacks callbacks = NULL;
460 silc_dlist_start(server->pending_commands);
461 while ((r = silc_dlist_get(server->pending_commands)) != SILC_LIST_END) {
462 if ((r->reply_cmd == command || r->reply_cmd == SILC_COMMAND_NONE)
463 && r->ident == ident) {
464 callbacks = silc_realloc(callbacks, sizeof(*callbacks) * (i + 1));
465 callbacks[i].context = r->context;
466 callbacks[i].callback = r->callback;
467 r->reply_check = TRUE;
472 *callbacks_count = i;
476 /* Sends simple status message as command reply packet */
479 silc_server_command_send_status_reply(SilcServerCommandContext cmd,
486 SILC_LOG_DEBUG(("Sending command status %d", status));
489 silc_command_reply_payload_encode_va(command, status, error,
490 silc_command_get_ident(cmd->payload),
492 silc_server_packet_send(cmd->server, cmd->sock,
493 SILC_PACKET_COMMAND_REPLY, 0,
494 buffer->data, buffer->len, FALSE);
495 silc_buffer_free(buffer);
498 /* Sends command status reply with one extra argument. The argument
499 type must be sent as argument. */
502 silc_server_command_send_status_data(SilcServerCommandContext cmd,
507 const unsigned char *arg,
512 SILC_LOG_DEBUG(("Sending command status %d", status));
515 silc_command_reply_payload_encode_va(command, status, 0,
516 silc_command_get_ident(cmd->payload),
517 1, arg_type, arg, arg_len);
518 silc_server_packet_send(cmd->server, cmd->sock,
519 SILC_PACKET_COMMAND_REPLY, 0,
520 buffer->data, buffer->len, FALSE);
521 silc_buffer_free(buffer);
525 silc_server_command_send_status_data2(SilcServerCommandContext cmd,
529 SilcUInt32 arg_type1,
530 const unsigned char *arg1,
532 SilcUInt32 arg_type2,
533 const unsigned char *arg2,
538 SILC_LOG_DEBUG(("Sending command status %d", status));
541 silc_command_reply_payload_encode_va(command, status, 0,
542 silc_command_get_ident(cmd->payload),
543 2, arg_type1, arg1, arg_len1,
544 arg_type2, arg2, arg_len2);
545 silc_server_packet_send(cmd->server, cmd->sock,
546 SILC_PACKET_COMMAND_REPLY, 0,
547 buffer->data, buffer->len, FALSE);
548 silc_buffer_free(buffer);
551 /* This function can be called to check whether in the command reply
552 an error occurred. This function has no effect if this is called
553 when the command function was not called as pending command callback.
554 This returns TRUE if error had occurred. */
557 silc_server_command_pending_error_check(SilcServerCommandContext cmd,
558 SilcServerCommandReplyContext cmdr,
561 if (!cmd->pending || !cmdr)
564 if (!silc_command_get_status(cmdr->payload, NULL, NULL)) {
567 /* Send the same command reply payload */
568 silc_command_set_command(cmdr->payload, silc_command_get(cmd->payload));
569 silc_command_set_ident(cmdr->payload,
570 silc_command_get_ident(cmd->payload));
571 buffer = silc_command_payload_encode_payload(cmdr->payload);
572 silc_server_packet_send(cmd->server, cmd->sock,
573 SILC_PACKET_COMMAND_REPLY, 0,
574 buffer->data, buffer->len, FALSE);
575 silc_buffer_free(buffer);
582 /* Server side of command WHOIS. */
584 SILC_SERVER_CMD_FUNC(whois)
586 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
587 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_WHOIS, cmd, 1, 256);
588 silc_server_query_command(cmd->server, SILC_COMMAND_WHOIS, cmd);
589 silc_server_command_free(cmd);
592 /* Server side of command WHOWAS. */
594 SILC_SERVER_CMD_FUNC(whowas)
596 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
597 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_WHOWAS, cmd, 1, 2);
598 silc_server_query_command(cmd->server, SILC_COMMAND_WHOWAS, cmd);
599 silc_server_command_free(cmd);
602 /* Server side of command IDENTIFY. */
604 SILC_SERVER_CMD_FUNC(identify)
606 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
607 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_IDENTIFY, cmd, 1, 256);
608 silc_server_query_command(cmd->server, SILC_COMMAND_IDENTIFY, cmd);
609 silc_server_command_free(cmd);
612 /* Server side of command NICK. Sets nickname for user. Setting
613 nickname causes generation of a new client ID for the client. The
614 new client ID is sent to the client after changing the nickname. */
616 SILC_SERVER_CMD_FUNC(nick)
618 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
619 SilcClientEntry client = (SilcClientEntry)cmd->sock->user_data;
620 SilcServer server = cmd->server;
621 SilcBuffer packet, nidp, oidp = NULL;
622 SilcClientID *new_id;
625 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
628 if (cmd->sock->type != SILC_SOCKET_TYPE_CLIENT || !client)
631 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_NICK, cmd, 1, 1);
634 nick = silc_argument_get_arg_type(cmd->args, 1, &nick_len);
636 silc_server_command_send_status_reply(cmd, SILC_COMMAND_NICK,
637 SILC_STATUS_ERR_BAD_NICKNAME, 0);
642 if (silc_server_name_bad_chars(nick, nick_len) == TRUE) {
643 silc_server_command_send_status_reply(cmd, SILC_COMMAND_NICK,
644 SILC_STATUS_ERR_BAD_NICKNAME, 0);
648 /* Check for same nickname */
649 if (!strcmp(client->nickname, nick)) {
650 nidp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
654 /* Create new Client ID */
655 while (!silc_id_create_client_id(cmd->server, cmd->server->id,
657 cmd->server->md5hash, nick,
661 silc_server_command_send_status_reply(cmd, SILC_COMMAND_NICK,
662 SILC_STATUS_ERR_BAD_NICKNAME, 0);
665 snprintf(&nick[strlen(nick) - 1], 1, "%d", nickfail);
668 /* Send notify about nickname change to our router. We send the new
669 ID and ask to replace it with the old one. If we are router the
670 packet is broadcasted. Send NICK_CHANGE notify. */
671 silc_server_send_notify_nick_change(server, SILC_PRIMARY_ROUTE(server),
672 SILC_BROADCAST(server), client->id,
675 /* Check if anyone is watching the old nickname */
676 if (server->server_type == SILC_ROUTER)
677 silc_server_check_watcher_list(server, client, nick,
678 SILC_NOTIFY_TYPE_NICK_CHANGE);
680 oidp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
682 /* Remove old cache entry */
683 silc_idcache_del_by_context(server->local_list->clients, client);
685 silc_free(client->id);
688 silc_free(client->nickname);
689 client->nickname = strdup(nick);
691 /* Update client cache */
692 silc_idcache_add(server->local_list->clients, client->nickname,
693 client->id, (void *)client, 0, NULL);
695 nidp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
697 /* Send NICK_CHANGE notify to the client's channels */
698 silc_server_send_notify_on_channels(server, NULL, client,
699 SILC_NOTIFY_TYPE_NICK_CHANGE, 3,
700 oidp->data, oidp->len,
701 nidp->data, nidp->len,
703 strlen(client->nickname));
705 /* Check if anyone is watching the new nickname */
706 if (server->server_type == SILC_ROUTER)
707 silc_server_check_watcher_list(server, client, NULL,
708 SILC_NOTIFY_TYPE_NICK_CHANGE);
711 /* Send the new Client ID as reply command back to client */
712 packet = silc_command_reply_payload_encode_va(SILC_COMMAND_NICK,
713 SILC_STATUS_OK, 0, ident, 2,
714 2, nidp->data, nidp->len,
715 3, nick, strlen(nick));
716 silc_server_packet_send(cmd->server, cmd->sock, SILC_PACKET_COMMAND_REPLY,
717 0, packet->data, packet->len, FALSE);
719 silc_buffer_free(packet);
720 silc_buffer_free(nidp);
722 silc_buffer_free(oidp);
725 silc_server_command_free(cmd);
728 /* Sends the LIST command reply */
731 silc_server_command_list_send_reply(SilcServerCommandContext cmd,
732 SilcChannelEntry *lch,
733 SilcUInt32 lch_count,
734 SilcChannelEntry *gch,
735 SilcUInt32 gch_count)
738 SilcBuffer packet, idp;
739 SilcChannelEntry entry;
741 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
743 unsigned char usercount[4];
745 int valid_lcount = 0, valid_rcount = 0;
747 for (i = 0; i < lch_count; i++) {
748 if (lch[i]->mode & SILC_CHANNEL_MODE_SECRET)
753 for (i = 0; i < gch_count; i++) {
754 if (gch[i]->mode & SILC_CHANNEL_MODE_SECRET)
760 status = SILC_STATUS_OK;
761 if ((lch_count + gch_count) > 1)
762 status = SILC_STATUS_LIST_START;
765 for (i = 0, k = 0; i < lch_count; i++) {
771 status = SILC_STATUS_LIST_ITEM;
772 if (valid_lcount > 1 && k == valid_lcount - 1 && !valid_rcount)
773 status = SILC_STATUS_LIST_END;
775 idp = silc_id_payload_encode(entry->id, SILC_ID_CHANNEL);
777 if (entry->mode & SILC_CHANNEL_MODE_PRIVATE) {
779 memset(usercount, 0, sizeof(usercount));
781 topic = entry->topic;
782 users = silc_hash_table_count(entry->user_list);
783 SILC_PUT32_MSB(users, usercount);
788 silc_command_reply_payload_encode_va(SILC_COMMAND_LIST,
790 2, idp->data, idp->len,
791 3, entry->channel_name,
792 strlen(entry->channel_name),
793 4, topic, topic ? strlen(topic) : 0,
795 silc_server_packet_send(cmd->server, cmd->sock,
796 SILC_PACKET_COMMAND_REPLY, 0, packet->data,
798 silc_buffer_free(packet);
799 silc_buffer_free(idp);
804 for (i = 0, k = 0; i < gch_count; i++) {
810 status = SILC_STATUS_LIST_ITEM;
811 if (valid_rcount > 1 && k == valid_rcount - 1)
812 status = SILC_STATUS_LIST_END;
814 idp = silc_id_payload_encode(entry->id, SILC_ID_CHANNEL);
816 if (entry->mode & SILC_CHANNEL_MODE_PRIVATE) {
818 memset(usercount, 0, sizeof(usercount));
820 topic = entry->topic;
821 users = entry->user_count;
822 SILC_PUT32_MSB(users, usercount);
827 silc_command_reply_payload_encode_va(SILC_COMMAND_LIST,
829 2, idp->data, idp->len,
830 3, entry->channel_name,
831 strlen(entry->channel_name),
832 4, topic, topic ? strlen(topic) : 0,
834 silc_server_packet_send(cmd->server, cmd->sock,
835 SILC_PACKET_COMMAND_REPLY, 0, packet->data,
837 silc_buffer_free(packet);
838 silc_buffer_free(idp);
843 /* Server side of LIST command. This lists the channel of the requested
844 server. Secret channels are not listed. */
846 SILC_SERVER_CMD_FUNC(list)
848 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
849 SilcServer server = cmd->server;
850 SilcChannelID *channel_id = NULL;
853 SilcChannelEntry *lchannels = NULL, *gchannels = NULL;
854 SilcUInt32 lch_count = 0, gch_count = 0;
856 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_LIST, cmd, 0, 1);
858 /* If we are normal server, send the command to router, since we
859 want to know all channels in the network. */
860 if (!cmd->pending && server->server_type != SILC_ROUTER &&
861 !server->standalone) {
863 SilcUInt16 old_ident;
865 old_ident = silc_command_get_ident(cmd->payload);
866 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
867 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
868 silc_server_packet_send(server, SILC_PRIMARY_ROUTE(server),
869 SILC_PACKET_COMMAND, cmd->packet->flags,
870 tmpbuf->data, tmpbuf->len, TRUE);
872 /* Reprocess this packet after received reply from router */
873 silc_server_command_pending(server, SILC_COMMAND_LIST,
874 silc_command_get_ident(cmd->payload),
875 silc_server_command_list,
876 silc_server_command_dup(cmd));
878 silc_command_set_ident(cmd->payload, old_ident);
879 silc_buffer_free(tmpbuf);
884 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
886 channel_id = silc_id_payload_parse_id(tmp, tmp_len, NULL);
888 silc_server_command_send_status_reply(cmd, SILC_COMMAND_LIST,
889 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
894 /* Get the channels from local list */
895 lchannels = silc_idlist_get_channels(server->local_list, channel_id,
898 /* Get the channels from global list */
899 gchannels = silc_idlist_get_channels(server->global_list, channel_id,
903 silc_server_command_list_send_reply(cmd, lchannels, lch_count,
904 gchannels, gch_count);
906 silc_free(lchannels);
907 silc_free(gchannels);
910 silc_server_command_free(cmd);
913 /* Server side of TOPIC command. Sets topic for channel and/or returns
914 current topic to client. */
916 SILC_SERVER_CMD_FUNC(topic)
918 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
919 SilcServer server = cmd->server;
920 SilcClientEntry client = (SilcClientEntry)cmd->sock->user_data;
921 SilcChannelID *channel_id;
922 SilcChannelEntry channel;
923 SilcChannelClientEntry chl;
924 SilcBuffer packet, idp;
926 SilcUInt32 argc, tmp_len;
927 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
929 if (cmd->sock->type != SILC_SOCKET_TYPE_CLIENT || !client)
932 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_TOPIC, cmd, 1, 2);
934 argc = silc_argument_get_arg_num(cmd->args);
937 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
939 silc_server_command_send_status_reply(cmd, SILC_COMMAND_TOPIC,
940 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
943 channel_id = silc_id_payload_parse_id(tmp, tmp_len, NULL);
945 silc_server_command_send_status_reply(cmd, SILC_COMMAND_TOPIC,
946 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
950 /* Check whether the channel exists */
951 channel = silc_idlist_find_channel_by_id(server->local_list,
954 channel = silc_idlist_find_channel_by_id(server->global_list,
957 silc_server_command_send_status_data(cmd, SILC_COMMAND_TOPIC,
958 SILC_STATUS_ERR_NO_SUCH_CHANNEL_ID,
966 tmp = silc_argument_get_arg_type(cmd->args, 2, NULL);
968 silc_server_command_send_status_reply(cmd, SILC_COMMAND_TOPIC,
969 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
974 if (strlen(tmp) > 256) {
975 silc_server_command_send_status_reply(cmd, SILC_COMMAND_TOPIC,
976 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
981 /* See whether the client is on channel and has rights to change topic */
982 if (!silc_server_client_on_channel(client, channel, &chl)) {
983 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
984 silc_server_command_send_status_data(cmd, SILC_COMMAND_TOPIC,
985 SILC_STATUS_ERR_NOT_ON_CHANNEL,
990 if (channel->mode & SILC_CHANNEL_MODE_TOPIC &&
991 !(chl->mode & SILC_CHANNEL_UMODE_CHANOP) &&
992 !(chl->mode & SILC_CHANNEL_UMODE_CHANFO)) {
993 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
994 silc_server_command_send_status_data(cmd, SILC_COMMAND_TOPIC,
995 SILC_STATUS_ERR_NO_CHANNEL_PRIV,
1000 if (!channel->topic || strcmp(channel->topic, tmp)) {
1001 /* Set the topic for channel */
1002 silc_free(channel->topic);
1003 channel->topic = strdup(tmp);
1005 /* Send TOPIC_SET notify type to the network */
1006 silc_server_send_notify_topic_set(server, SILC_PRIMARY_ROUTE(server),
1007 SILC_BROADCAST(server), channel,
1008 client->id, SILC_ID_CLIENT,
1011 /* Send notify about topic change to all clients on the channel */
1012 idp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
1013 silc_server_send_notify_to_channel(server, NULL, channel, FALSE, TRUE,
1014 SILC_NOTIFY_TYPE_TOPIC_SET, 2,
1015 idp->data, idp->len,
1017 strlen(channel->topic));
1018 silc_buffer_free(idp);
1022 /* Send the topic to client as reply packet */
1023 idp = silc_id_payload_encode(channel_id, SILC_ID_CHANNEL);
1024 packet = silc_command_reply_payload_encode_va(SILC_COMMAND_TOPIC,
1025 SILC_STATUS_OK, 0, ident, 2,
1026 2, idp->data, idp->len,
1029 strlen(channel->topic) : 0);
1030 silc_server_packet_send(cmd->server, cmd->sock, SILC_PACKET_COMMAND_REPLY,
1031 0, packet->data, packet->len, FALSE);
1033 silc_buffer_free(packet);
1034 silc_buffer_free(idp);
1035 silc_free(channel_id);
1038 silc_server_command_free(cmd);
1041 /* Server side of INVITE command. Invites some client to join some channel.
1042 This command is also used to manage the invite list of the channel. */
1044 SILC_SERVER_CMD_FUNC(invite)
1046 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
1047 SilcServer server = cmd->server;
1048 SilcSocketConnection sock = cmd->sock, dest_sock;
1049 SilcChannelClientEntry chl;
1050 SilcClientEntry sender, dest;
1051 SilcClientID *dest_id = NULL;
1052 SilcChannelEntry channel;
1053 SilcChannelID *channel_id = NULL;
1054 SilcIDListData idata;
1055 SilcArgumentPayload args;
1056 SilcHashTableList htl;
1057 SilcBuffer packet, list, tmp2;
1058 SilcBufferStruct alist;
1059 unsigned char *tmp, *atype = NULL;
1060 SilcUInt32 len, type, len2;
1061 SilcUInt16 argc = 0, ident = silc_command_get_ident(cmd->payload);
1063 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_INVITE, cmd, 1, 4);
1065 /* Get Channel ID */
1066 tmp = silc_argument_get_arg_type(cmd->args, 1, &len);
1068 silc_server_command_send_status_reply(cmd, SILC_COMMAND_INVITE,
1069 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
1072 channel_id = silc_id_payload_parse_id(tmp, len, NULL);
1074 silc_server_command_send_status_reply(cmd, SILC_COMMAND_INVITE,
1075 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
1079 /* Get the channel entry */
1080 channel = silc_idlist_find_channel_by_id(server->local_list,
1083 channel = silc_idlist_find_channel_by_id(server->global_list,
1086 silc_server_command_send_status_data(cmd, SILC_COMMAND_INVITE,
1087 SILC_STATUS_ERR_NO_SUCH_CHANNEL_ID,
1093 /* Check whether the sender of this command is on the channel. */
1094 sender = (SilcClientEntry)sock->user_data;
1095 if (!sender || !silc_server_client_on_channel(sender, channel, &chl)) {
1096 silc_server_command_send_status_data(cmd, SILC_COMMAND_INVITE,
1097 SILC_STATUS_ERR_NOT_ON_CHANNEL, 0,
1102 /* Check whether the channel is invite-only channel. If yes then the
1103 sender of this command must be at least channel operator. */
1104 if (channel->mode & SILC_CHANNEL_MODE_INVITE &&
1105 !(chl->mode & SILC_CHANNEL_UMODE_CHANOP) &&
1106 !(chl->mode & SILC_CHANNEL_UMODE_CHANFO)) {
1107 silc_server_command_send_status_data(cmd, SILC_COMMAND_INVITE,
1108 SILC_STATUS_ERR_NO_CHANNEL_PRIV,
1113 /* Get destination client ID */
1114 tmp = silc_argument_get_arg_type(cmd->args, 2, &len);
1118 dest_id = silc_id_payload_parse_id(tmp, len, NULL);
1120 silc_server_command_send_status_reply(cmd, SILC_COMMAND_INVITE,
1121 SILC_STATUS_ERR_NO_CLIENT_ID, 0);
1125 /* Get the client entry */
1126 dest = silc_server_query_client(server, dest_id, FALSE, &resolve);
1128 if (server->server_type != SILC_SERVER || !resolve || cmd->pending) {
1129 silc_server_command_send_status_data(
1130 cmd, SILC_COMMAND_INVITE,
1131 SILC_STATUS_ERR_NO_SUCH_CLIENT_ID, 0,
1136 /* The client info is being resolved. Reprocess this packet after
1137 receiving the reply to the query. */
1138 silc_server_command_pending(server, SILC_COMMAND_WHOIS,
1140 silc_server_command_invite,
1141 silc_server_command_dup(cmd));
1142 cmd->pending = TRUE;
1146 /* Check whether the requested client is already on the channel. */
1147 if (silc_server_client_on_channel(dest, channel, NULL)) {
1148 atype = silc_argument_get_arg_type(cmd->args, 1, &len2);
1149 silc_server_command_send_status_data2(cmd, SILC_COMMAND_INVITE,
1150 SILC_STATUS_ERR_USER_ON_CHANNEL,
1156 /* Get route to the client */
1157 dest_sock = silc_server_get_client_route(server, NULL, 0, dest_id,
1160 silc_server_command_send_status_data(cmd, SILC_COMMAND_INVITE,
1161 SILC_STATUS_ERR_NO_SUCH_CLIENT_ID,
1166 /* Add the client to the invite list */
1168 /* Allocate hash table for invite list if it doesn't exist yet */
1169 if (!channel->invite_list)
1170 channel->invite_list =
1171 silc_hash_table_alloc(0, silc_hash_ptr,
1173 silc_server_inviteban_destruct, channel, TRUE);
1175 /* Check if the ID is in the list already */
1176 silc_hash_table_list(channel->invite_list, &htl);
1177 while (silc_hash_table_get(&htl, (void *)&type, (void *)&tmp2)) {
1178 if (type == 3 && !memcmp(tmp2->data, tmp, len)) {
1183 silc_hash_table_list_reset(&htl);
1185 /* Add new Client ID to invite list */
1187 list = silc_buffer_alloc_size(len);
1188 silc_buffer_put(list, tmp, len);
1189 silc_hash_table_add(channel->invite_list, (void *)3, list);
1192 if (!(dest->mode & SILC_UMODE_BLOCK_INVITE)) {
1193 /* Send notify to the client that is invited to the channel */
1194 SilcBuffer idp, idp2;
1195 idp = silc_id_payload_encode(channel_id, SILC_ID_CHANNEL);
1196 idp2 = silc_id_payload_encode(sender->id, SILC_ID_CLIENT);
1197 silc_server_send_notify_dest(server, dest_sock, FALSE, dest_id,
1199 SILC_NOTIFY_TYPE_INVITE, 3,
1200 idp->data, idp->len,
1201 channel->channel_name,
1202 strlen(channel->channel_name),
1203 idp2->data, idp2->len);
1204 silc_buffer_free(idp);
1205 silc_buffer_free(idp2);
1209 /* Get the invite information */
1210 tmp = silc_argument_get_arg_type(cmd->args, 4, &len2);
1211 if (tmp && len2 > 2) {
1212 /* Parse the arguments to see they are constructed correctly */
1213 SILC_GET16_MSB(argc, tmp);
1214 args = silc_argument_payload_parse(tmp + 2, len2 - 2, argc);
1216 silc_server_command_send_status_reply(cmd, SILC_COMMAND_INVITE,
1217 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
1222 /* Get the type of action */
1223 atype = silc_argument_get_arg_type(cmd->args, 3, &len);
1224 if (atype && len == 1) {
1225 if (atype[0] == 0x00) {
1226 /* Allocate hash table for invite list if it doesn't exist yet */
1227 if (!channel->invite_list)
1228 channel->invite_list =
1229 silc_hash_table_alloc(0, silc_hash_ptr,
1231 silc_server_inviteban_destruct, channel,
1234 /* Check for resource limit */
1235 if (silc_hash_table_count(channel->invite_list) > 64) {
1236 silc_server_command_send_status_reply(cmd, SILC_COMMAND_INVITE,
1237 SILC_STATUS_ERR_RESOURCE_LIMIT,
1243 /* Now add or delete the information. */
1244 silc_server_inviteban_process(server, channel->invite_list,
1245 (SilcUInt8)atype[0], args);
1247 silc_argument_payload_free(args);
1250 /* Encode invite list */
1252 if (channel->invite_list && silc_hash_table_count(channel->invite_list)) {
1253 list = silc_buffer_alloc_size(2);
1254 silc_buffer_format(list,
1255 SILC_STR_UI_SHORT(silc_hash_table_count(
1256 channel->invite_list)),
1258 silc_hash_table_list(channel->invite_list, &htl);
1259 while (silc_hash_table_get(&htl, (void *)&type, (void *)&tmp2))
1260 list = silc_argument_payload_encode_one(list, tmp2->data, tmp2->len,
1262 silc_hash_table_list_reset(&htl);
1265 /* The notify is sent to local servers (not clients), and to network. */
1266 if (atype && tmp && len2) {
1267 silc_buffer_set(&alist, tmp, len2);
1269 /* Send to local servers if we are router */
1270 if (server->server_type == SILC_ROUTER) {
1271 SilcBuffer idp, idp2;
1272 idp = silc_id_payload_encode(channel_id, SILC_ID_CHANNEL);
1273 idp2 = silc_id_payload_encode(sender->id, SILC_ID_CLIENT);
1274 silc_server_send_notify_to_channel(server, NULL, channel, FALSE, FALSE,
1275 SILC_NOTIFY_TYPE_INVITE, 5,
1276 idp->data, idp->len,
1277 channel->channel_name,
1278 strlen(channel->channel_name),
1279 idp2->data, idp2->len,
1281 tmp ? alist.data : NULL,
1282 tmp ? alist.len : 0);
1283 silc_buffer_free(idp);
1284 silc_buffer_free(idp2);
1287 /* Send to network */
1288 silc_server_send_notify_invite(server, SILC_PRIMARY_ROUTE(server),
1289 SILC_BROADCAST(server), channel,
1291 tmp ? &alist : NULL);
1294 /* Send invite list back only if the list was modified, or no arguments
1297 argc = silc_argument_get_arg_num(cmd->args);
1300 if (silc_argument_get_arg_type(cmd->args, 3, &len))
1303 /* Send command reply */
1304 tmp = silc_argument_get_arg_type(cmd->args, 1, &len);
1305 packet = silc_command_reply_payload_encode_va(SILC_COMMAND_INVITE,
1306 SILC_STATUS_OK, 0, ident, 2,
1310 type && list ? list->len : 0);
1311 silc_server_packet_send(server, cmd->sock, SILC_PACKET_COMMAND_REPLY, 0,
1312 packet->data, packet->len, FALSE);
1313 silc_buffer_free(packet);
1314 silc_buffer_free(list);
1318 silc_free(channel_id);
1319 silc_server_command_free(cmd);
1323 SilcSocketConnection sock;
1327 /* Quits connection to client. This gets called if client won't
1328 close the connection even when it has issued QUIT command. */
1330 SILC_TASK_CALLBACK(silc_server_command_quit_cb)
1332 SilcServer server = app_context;
1333 QuitInternal q = (QuitInternal)context;
1335 if (q->sock->user_data) {
1336 /* Free all client specific data, such as client entry and entires
1337 on channels this client may be on. */
1338 silc_server_free_client_data(server, q->sock, q->sock->user_data,
1340 q->sock->user_data = NULL;
1343 if (!SILC_IS_DISCONNECTED(q->sock))
1344 /* Close the connection on our side */
1345 silc_server_close_connection(server, q->sock);
1347 silc_socket_free(q->sock);
1348 silc_free(q->signoff);
1352 /* Quits SILC session. This is the normal way to disconnect client. */
1354 SILC_SERVER_CMD_FUNC(quit)
1356 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
1357 SilcServer server = cmd->server;
1358 SilcSocketConnection sock = cmd->sock;
1360 unsigned char *tmp = NULL;
1363 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_QUIT, cmd, 0, 1);
1365 if (cmd->sock->type != SILC_SOCKET_TYPE_CLIENT)
1369 tmp = silc_argument_get_arg_type(cmd->args, 1, &len);
1373 q = silc_calloc(1, sizeof(*q));
1374 q->sock = silc_socket_dup(sock);
1375 q->signoff = tmp ? strdup(tmp) : NULL;
1377 /* We quit the connection with little timeout */
1378 silc_schedule_task_add(server->schedule, sock->sock,
1379 silc_server_command_quit_cb, (void *)q,
1380 0, 200000, SILC_TASK_TIMEOUT, SILC_TASK_PRI_LOW);
1383 silc_server_command_free(cmd);
1386 /* Server side of command KILL. This command is used by router operator
1387 to remove an client from the SILC Network temporarily. */
1389 SILC_SERVER_CMD_FUNC(kill)
1391 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
1392 SilcServer server = cmd->server;
1393 SilcClientEntry client = (SilcClientEntry)cmd->sock->user_data;
1394 SilcClientEntry remote_client;
1395 SilcClientID *client_id = NULL;
1396 unsigned char *tmp, *comment, *auth;
1397 SilcUInt32 tmp_len, tmp_len2, auth_len;
1399 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_KILL, cmd, 1, 3);
1401 if (cmd->sock->type != SILC_SOCKET_TYPE_CLIENT || !client)
1404 /* Get authentication payload if present */
1405 auth = silc_argument_get_arg_type(cmd->args, 3, &auth_len);
1408 /* Router operator killing */
1410 /* KILL command works only on router */
1411 if (server->server_type != SILC_ROUTER) {
1412 silc_server_command_send_status_reply(cmd, SILC_COMMAND_KILL,
1413 SILC_STATUS_ERR_NO_ROUTER_PRIV, 0);
1417 /* Check whether client has the permissions. */
1418 if (!(client->mode & SILC_UMODE_ROUTER_OPERATOR)) {
1419 silc_server_command_send_status_reply(cmd, SILC_COMMAND_KILL,
1420 SILC_STATUS_ERR_NO_ROUTER_PRIV, 0);
1425 /* Get the client ID */
1426 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
1428 silc_server_command_send_status_reply(cmd, SILC_COMMAND_KILL,
1429 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
1433 client_id = silc_id_payload_parse_id(tmp, tmp_len, NULL);
1435 silc_server_command_send_status_data(cmd, SILC_COMMAND_KILL,
1436 SILC_STATUS_ERR_NO_SUCH_CLIENT_ID,
1437 0, 2, tmp, tmp_len);
1441 /* Get the client entry */
1442 remote_client = silc_idlist_find_client_by_id(server->local_list,
1443 client_id, TRUE, NULL);
1444 if (!remote_client) {
1445 remote_client = silc_idlist_find_client_by_id(server->global_list,
1446 client_id, TRUE, NULL);
1447 if (!remote_client) {
1448 silc_server_command_send_status_data(cmd, SILC_COMMAND_KILL,
1449 SILC_STATUS_ERR_NO_SUCH_CLIENT_ID,
1450 0, 2, tmp, tmp_len);
1456 comment = silc_argument_get_arg_type(cmd->args, 2, &tmp_len2);
1457 if (comment && tmp_len2 > 128) {
1459 comment[127] = '\0';
1462 /* If authentication data is provided then verify that killing is
1464 if (auth && auth_len) {
1465 SilcSocketConnection sock;
1467 if (!SILC_IS_LOCAL(remote_client) || !remote_client->data.public_key) {
1468 silc_server_command_send_status_reply(cmd, SILC_COMMAND_KILL,
1469 SILC_STATUS_ERR_OPERATION_ALLOWED,
1474 /* Verify the signature */
1475 if (!silc_auth_verify_data(auth, auth_len, SILC_AUTH_PUBLIC_KEY,
1476 remote_client->data.public_key, 0,
1477 server->sha1hash, remote_client->id,
1479 silc_server_command_send_status_reply(cmd, SILC_COMMAND_KILL,
1480 SILC_STATUS_ERR_AUTH_FAILED, 0);
1484 /* Send reply to the sender */
1485 silc_server_command_send_status_data(cmd, SILC_COMMAND_KILL,
1489 /* Do normal signoff for the destination client */
1490 sock = remote_client->connection;
1491 silc_server_remove_from_channels(server, NULL, remote_client,
1492 TRUE, (char *)"Killed", TRUE, TRUE);
1493 silc_server_free_client_data(server, NULL, remote_client, TRUE,
1495 (unsigned char *)"Killed");
1497 silc_server_close_connection(server, sock);
1499 /* Router operator killing */
1501 /* Send reply to the sender */
1502 silc_server_command_send_status_data(cmd, SILC_COMMAND_KILL,
1506 /* Check if anyone is watching this nickname */
1507 if (server->server_type == SILC_ROUTER)
1508 silc_server_check_watcher_list(server, client, NULL,
1509 SILC_NOTIFY_TYPE_KILLED);
1511 /* Now do the killing */
1512 silc_server_kill_client(server, remote_client, comment, client->id,
1517 silc_free(client_id);
1518 silc_server_command_free(cmd);
1521 /* Server side of command INFO. This sends information about us to
1522 the client. If client requested specific server we will send the
1523 command to that server. */
1525 SILC_SERVER_CMD_FUNC(info)
1527 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
1528 SilcServer server = cmd->server;
1529 SilcBuffer packet, idp;
1532 char *dest_server, *server_info = NULL, *server_name;
1533 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
1534 SilcServerEntry entry = NULL;
1535 SilcServerID *server_id = NULL;
1537 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_INFO, cmd, 0, 2);
1539 /* Get server name */
1540 dest_server = silc_argument_get_arg_type(cmd->args, 1, NULL);
1543 tmp = silc_argument_get_arg_type(cmd->args, 2, &tmp_len);
1545 server_id = silc_id_payload_parse_id(tmp, tmp_len, NULL);
1547 silc_server_command_send_status_reply(cmd, SILC_COMMAND_INFO,
1548 SILC_STATUS_ERR_NO_SERVER_ID, 0);
1554 /* Check whether we have this server cached */
1555 entry = silc_idlist_find_server_by_id(server->local_list,
1556 server_id, TRUE, NULL);
1558 entry = silc_idlist_find_server_by_id(server->global_list,
1559 server_id, TRUE, NULL);
1560 if (!entry && server->server_type != SILC_SERVER) {
1561 silc_server_command_send_status_data(cmd, SILC_COMMAND_INFO,
1562 SILC_STATUS_ERR_NO_SUCH_SERVER_ID,
1563 0, 2, tmp, tmp_len);
1569 /* Some buggy servers has sent request to router about themselves. */
1570 if (server->server_type != SILC_SERVER && cmd->sock->user_data == entry)
1573 if ((!dest_server && !server_id && !entry) || (entry &&
1574 entry == server->id_entry) ||
1575 (dest_server && !cmd->pending &&
1576 !strncasecmp(dest_server, server->server_name, strlen(dest_server)))) {
1577 /* Send our reply */
1578 char info_string[256];
1580 memset(info_string, 0, sizeof(info_string));
1581 snprintf(info_string, sizeof(info_string),
1582 "location: %s server: %s admin: %s <%s>",
1583 server->config->server_info->location,
1584 server->config->server_info->server_type,
1585 server->config->server_info->admin,
1586 server->config->server_info->email);
1588 server_info = info_string;
1589 entry = server->id_entry;
1591 /* Check whether we have this server cached */
1592 if (!entry && dest_server) {
1593 entry = silc_idlist_find_server_by_name(server->global_list,
1594 dest_server, TRUE, NULL);
1596 entry = silc_idlist_find_server_by_name(server->local_list,
1597 dest_server, TRUE, NULL);
1601 if (!cmd->pending &&
1602 server->server_type != SILC_SERVER && entry && !entry->server_info) {
1603 /* Send to the server */
1605 SilcUInt16 old_ident;
1607 old_ident = silc_command_get_ident(cmd->payload);
1608 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
1609 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
1611 silc_server_packet_send(server, entry->connection,
1612 SILC_PACKET_COMMAND, cmd->packet->flags,
1613 tmpbuf->data, tmpbuf->len, TRUE);
1615 /* Reprocess this packet after received reply from router */
1616 silc_server_command_pending(server, SILC_COMMAND_INFO,
1617 silc_command_get_ident(cmd->payload),
1618 silc_server_command_info,
1619 silc_server_command_dup(cmd));
1620 cmd->pending = TRUE;
1621 silc_command_set_ident(cmd->payload, old_ident);
1622 silc_buffer_free(tmpbuf);
1626 if (!entry && !cmd->pending && !server->standalone) {
1627 /* Send to the primary router */
1629 SilcUInt16 old_ident;
1631 old_ident = silc_command_get_ident(cmd->payload);
1632 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
1633 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
1635 silc_server_packet_send(server, SILC_PRIMARY_ROUTE(server),
1636 SILC_PACKET_COMMAND, cmd->packet->flags,
1637 tmpbuf->data, tmpbuf->len, TRUE);
1639 /* Reprocess this packet after received reply from router */
1640 silc_server_command_pending(server, SILC_COMMAND_INFO,
1641 silc_command_get_ident(cmd->payload),
1642 silc_server_command_info,
1643 silc_server_command_dup(cmd));
1644 cmd->pending = TRUE;
1645 silc_command_set_ident(cmd->payload, old_ident);
1646 silc_buffer_free(tmpbuf);
1651 silc_free(server_id);
1655 silc_server_command_send_status_data(cmd, SILC_COMMAND_INFO,
1656 SILC_STATUS_ERR_NO_SUCH_SERVER, 0,
1658 strlen(dest_server));
1662 idp = silc_id_payload_encode(entry->id, SILC_ID_SERVER);
1664 server_info = entry->server_info;
1665 server_name = entry->server_name;
1667 /* Send the reply */
1668 packet = silc_command_reply_payload_encode_va(SILC_COMMAND_INFO,
1669 SILC_STATUS_OK, 0, ident, 3,
1670 2, idp->data, idp->len,
1672 strlen(server_name),
1675 strlen(server_info) : 0);
1676 silc_server_packet_send(server, cmd->sock, SILC_PACKET_COMMAND_REPLY, 0,
1677 packet->data, packet->len, FALSE);
1679 silc_buffer_free(packet);
1680 silc_buffer_free(idp);
1683 silc_server_command_free(cmd);
1686 /* Server side of command PING. This just replies to the ping. */
1688 SILC_SERVER_CMD_FUNC(ping)
1690 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
1691 SilcServer server = cmd->server;
1694 SilcServerID *server_id = NULL;
1696 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_PING, cmd, 1, 1);
1699 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
1701 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PING,
1702 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
1706 server_id = silc_id_payload_parse_id(tmp, tmp_len, NULL);
1710 if (SILC_ID_SERVER_COMPARE(server_id, server->id)) {
1711 /* Send our reply */
1712 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PING,
1715 silc_server_command_send_status_data(cmd, SILC_COMMAND_PING,
1716 SILC_STATUS_ERR_NO_SUCH_SERVER_ID, 0,
1722 silc_free(server_id);
1723 silc_server_command_free(cmd);
1726 /* Server side of command STATS. */
1728 SILC_SERVER_CMD_FUNC(stats)
1730 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
1731 SilcServer server = cmd->server;
1732 SilcServerID *server_id;
1735 SilcBuffer packet, stats;
1736 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
1739 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_STATS, cmd, 1, 1);
1742 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
1744 silc_server_command_send_status_reply(cmd, SILC_COMMAND_STATS,
1745 SILC_STATUS_ERR_NO_SERVER_ID, 0);
1748 server_id = silc_id_payload_parse_id(tmp, tmp_len, NULL);
1752 /* The ID must be ours */
1753 if (!SILC_ID_SERVER_COMPARE(server->id, server_id)) {
1754 silc_server_command_send_status_data(cmd, SILC_COMMAND_STATS,
1755 SILC_STATUS_ERR_NO_SUCH_SERVER_ID, 0,
1757 silc_free(server_id);
1760 silc_free(server_id);
1762 /* If we are router then just send everything we got. If we are normal
1763 server then we'll send this to our router to get all the latest
1764 statistical information. */
1765 if (!cmd->pending && server->server_type != SILC_ROUTER &&
1766 !server->standalone) {
1767 /* Send request to our router */
1768 SilcBuffer idp = silc_id_payload_encode(server->router->id,
1770 packet = silc_command_payload_encode_va(SILC_COMMAND_STATS,
1771 ++server->cmd_ident, 1,
1772 1, idp->data, idp->len);
1773 silc_server_packet_send(server, SILC_PRIMARY_ROUTE(server),
1774 SILC_PACKET_COMMAND, 0, packet->data,
1775 packet->len, FALSE);
1777 /* Reprocess this packet after received reply from router */
1778 silc_server_command_pending(server, SILC_COMMAND_STATS,
1780 silc_server_command_stats,
1781 silc_server_command_dup(cmd));
1782 cmd->pending = TRUE;
1783 silc_buffer_free(packet);
1784 silc_buffer_free(idp);
1788 /* Send our reply to sender */
1789 uptime = time(NULL) - server->starttime;
1791 stats = silc_buffer_alloc_size(60);
1792 silc_buffer_format(stats,
1793 SILC_STR_UI_INT(server->starttime),
1794 SILC_STR_UI_INT(uptime),
1795 SILC_STR_UI_INT(server->stat.my_clients),
1796 SILC_STR_UI_INT(server->stat.my_channels),
1797 SILC_STR_UI_INT(server->stat.my_server_ops),
1798 SILC_STR_UI_INT(server->stat.my_router_ops),
1799 SILC_STR_UI_INT(server->stat.cell_clients),
1800 SILC_STR_UI_INT(server->stat.cell_channels),
1801 SILC_STR_UI_INT(server->stat.cell_servers),
1802 SILC_STR_UI_INT(server->stat.clients),
1803 SILC_STR_UI_INT(server->stat.channels),
1804 SILC_STR_UI_INT(server->stat.servers),
1805 SILC_STR_UI_INT(server->stat.routers),
1806 SILC_STR_UI_INT(server->stat.server_ops),
1807 SILC_STR_UI_INT(server->stat.router_ops),
1810 packet = silc_command_reply_payload_encode_va(SILC_COMMAND_STATS,
1811 SILC_STATUS_OK, 0, ident, 2,
1813 3, stats->data, stats->len);
1814 silc_server_packet_send(server, cmd->sock, SILC_PACKET_COMMAND_REPLY,
1815 0, packet->data, packet->len, FALSE);
1816 silc_buffer_free(packet);
1817 silc_buffer_free(stats);
1820 silc_server_command_free(cmd);
1823 /* Internal routine to join channel. The channel sent to this function
1824 has been either created or resolved from ID lists. This joins the sent
1825 client to the channel. */
1827 static void silc_server_command_join_channel(SilcServer server,
1828 SilcServerCommandContext cmd,
1829 SilcChannelEntry channel,
1830 SilcClientID *client_id,
1834 const unsigned char *auth,
1835 SilcUInt32 auth_len,
1836 const unsigned char *cauth,
1837 SilcUInt32 cauth_len)
1839 SilcSocketConnection sock = cmd->sock;
1841 SilcUInt32 tmp_len, user_count;
1842 unsigned char *passphrase = NULL, mode[4], tmp2[4], tmp3[4], ulimit[4];
1843 SilcClientEntry client;
1844 SilcChannelClientEntry chl;
1845 SilcBuffer reply, chidp, clidp, keyp = NULL;
1846 SilcBuffer user_list, mode_list, invite_list, ban_list;
1847 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
1848 char check[512], check2[512];
1849 bool founder = FALSE;
1851 SilcBuffer fkey = NULL, chpklist = NULL;
1854 SILC_LOG_DEBUG(("Joining client to channel"));
1859 /* Get the client entry */
1860 if (cmd->sock->type == SILC_SOCKET_TYPE_CLIENT) {
1861 client = (SilcClientEntry)sock->user_data;
1865 client = silc_server_query_client(server, client_id, FALSE,
1868 if (!resolve || cmd->pending) {
1869 tmp = silc_argument_get_arg_type(cmd->args, 2, &tmp_len);
1870 silc_server_command_send_status_data(
1871 cmd, SILC_COMMAND_JOIN,
1872 SILC_STATUS_ERR_NO_SUCH_CLIENT_ID, 0,
1877 /* The client info is being resolved. Reprocess this packet after
1878 receiving the reply to the query. */
1879 silc_server_command_pending(server, SILC_COMMAND_WHOIS,
1881 silc_server_command_join,
1882 silc_server_command_dup(cmd));
1883 cmd->pending = TRUE;
1887 if (!client->data.public_key &&
1888 (auth || cauth || channel->ban_list ||
1889 (channel->mode & SILC_CHANNEL_MODE_INVITE))) {
1890 if (cmd->pending == 2)
1893 /* We must retrieve the client's public key by sending
1894 GETKEY command. Reprocess this packet after receiving the key */
1895 clidp = silc_id_payload_encode(client_id, SILC_ID_CLIENT);
1896 silc_server_send_command(server, cmd->sock,
1897 SILC_COMMAND_GETKEY, ++server->cmd_ident,
1898 1, 1, clidp->data, clidp->len);
1899 silc_buffer_free(clidp);
1900 silc_server_command_pending(server, SILC_COMMAND_GETKEY,
1902 silc_server_command_join,
1903 silc_server_command_dup(cmd));
1908 cmd->pending = FALSE;
1912 * Check founder auth payload if provided. If client can gain founder
1913 * privileges it can override various conditions on joining the channel,
1914 * and can have directly the founder mode set on the channel.
1916 if (auth && auth_len && channel->mode & SILC_CHANNEL_MODE_FOUNDER_AUTH) {
1917 SilcIDListData idata = (SilcIDListData)client;
1918 SilcChannelClientEntry chl2;
1919 SilcHashTableList htl;
1921 if (channel->founder_key && idata->public_key &&
1922 silc_pkcs_public_key_compare(channel->founder_key,
1923 idata->public_key)) {
1924 /* Check whether the client is to become founder */
1925 if (silc_auth_verify_data(auth, auth_len, SILC_AUTH_PUBLIC_KEY,
1926 channel->founder_key, 0, server->sha1hash,
1927 client->id, SILC_ID_CLIENT)) {
1929 /* There cannot be anyone else as founder on the channel now. This
1930 client is definitely the founder due to this authentication */
1931 silc_hash_table_list(channel->user_list, &htl);
1932 while (silc_hash_table_get(&htl, NULL, (void *)&chl2))
1933 if (chl2->mode & SILC_CHANNEL_UMODE_CHANFO) {
1934 chl2->mode &= ~SILC_CHANNEL_UMODE_CHANFO;
1935 silc_server_force_cumode_change(server, NULL, channel, chl2,
1939 silc_hash_table_list_reset(&htl);
1941 umode = (SILC_CHANNEL_UMODE_CHANOP | SILC_CHANNEL_UMODE_CHANFO);
1948 * Check channel modes
1952 memset(check, 0, sizeof(check));
1953 memset(check2, 0, sizeof(check2));
1954 silc_strncat(check, sizeof(check),
1955 client->nickname, strlen(client->nickname));
1956 silc_strncat(check, sizeof(check), "!", 1);
1957 silc_strncat(check, sizeof(check),
1958 client->username, strlen(client->username));
1959 if (!strchr(client->username, '@')) {
1960 silc_strncat(check, sizeof(check), "@", 1);
1961 silc_strncat(check, sizeof(check),
1962 cmd->sock->hostname, strlen(cmd->sock->hostname));
1965 silc_strncat(check2, sizeof(check2),
1966 client->nickname, strlen(client->nickname));
1967 if (!strchr(client->nickname, '@')) {
1968 silc_strncat(check2, sizeof(check2), "@", 1);
1969 silc_strncat(check2, sizeof(check2),
1970 SILC_IS_LOCAL(client) ? server->server_name :
1971 client->router->server_name,
1972 SILC_IS_LOCAL(client) ? strlen(server->server_name) :
1973 strlen(client->router->server_name));
1975 silc_strncat(check2, sizeof(check2), "!", 1);
1976 silc_strncat(check2, sizeof(check2),
1977 client->username, strlen(client->username));
1978 if (!strchr(client->username, '@')) {
1979 silc_strncat(check2, sizeof(check2), "@", 1);
1980 silc_strncat(check2, sizeof(check2),
1981 cmd->sock->hostname, strlen(cmd->sock->hostname));
1984 /* Check invite list if channel is invite-only channel */
1985 if (channel->mode & SILC_CHANNEL_MODE_INVITE) {
1986 if (!channel->invite_list ||
1987 !silc_hash_table_count(channel->invite_list) ||
1988 (!silc_server_inviteban_match(server, channel->invite_list,
1990 !silc_server_inviteban_match(server, channel->invite_list,
1991 2, client->data.public_key) &&
1992 !silc_server_inviteban_match(server, channel->invite_list,
1993 1, client->nickname) &&
1994 !silc_server_inviteban_match(server, channel->invite_list,
1996 !silc_server_inviteban_match(server, channel->invite_list,
1998 chidp = silc_id_payload_encode(channel->id, SILC_ID_CHANNEL);
1999 silc_server_command_send_status_data(cmd, SILC_COMMAND_JOIN,
2000 SILC_STATUS_ERR_NOT_INVITED, 0,
2001 2, chidp->data, chidp->len);
2002 silc_buffer_free(chidp);
2007 /* Check ban list if it exists. If the client's nickname, server,
2008 username and/or hostname is in the ban list the access to the
2009 channel is denied. */
2010 if (channel->ban_list && silc_hash_table_count(channel->ban_list)) {
2011 if (silc_server_inviteban_match(server, channel->ban_list,
2013 silc_server_inviteban_match(server, channel->ban_list,
2014 2, client->data.public_key) ||
2015 silc_server_inviteban_match(server, channel->ban_list,
2016 1, client->nickname) ||
2017 silc_server_inviteban_match(server, channel->ban_list,
2019 silc_server_inviteban_match(server, channel->ban_list,
2021 chidp = silc_id_payload_encode(channel->id, SILC_ID_CHANNEL);
2022 silc_server_command_send_status_data(
2023 cmd, SILC_COMMAND_JOIN,
2024 SILC_STATUS_ERR_BANNED_FROM_CHANNEL, 0,
2025 2, chidp->data, chidp->len);
2026 silc_buffer_free(chidp);
2031 /* Check user count limit if set. */
2032 if (channel->mode & SILC_CHANNEL_MODE_ULIMIT) {
2033 if (silc_hash_table_count(channel->user_list) + 1 >
2034 channel->user_limit) {
2035 chidp = silc_id_payload_encode(channel->id, SILC_ID_CHANNEL);
2036 silc_server_command_send_status_data(cmd, SILC_COMMAND_JOIN,
2037 SILC_STATUS_ERR_CHANNEL_IS_FULL,
2038 0, 2, chidp->data, chidp->len);
2039 silc_buffer_free(chidp);
2045 /* Check the channel passphrase if set. */
2046 if (channel->mode & SILC_CHANNEL_MODE_PASSPHRASE) {
2047 /* Get passphrase */
2048 tmp = silc_argument_get_arg_type(cmd->args, 3, &tmp_len);
2050 passphrase = silc_memdup(tmp, tmp_len);
2052 if (!passphrase || !channel->passphrase ||
2053 memcmp(passphrase, channel->passphrase, strlen(channel->passphrase))) {
2054 chidp = silc_id_payload_encode(channel->id, SILC_ID_CHANNEL);
2055 silc_server_command_send_status_data(cmd, SILC_COMMAND_JOIN,
2056 SILC_STATUS_ERR_BAD_PASSWORD, 0,
2057 2, chidp->data, chidp->len);
2058 silc_buffer_free(chidp);
2063 /* Verify channel authentication with channel public keys if set. */
2064 if (channel->mode & SILC_CHANNEL_MODE_CHANNEL_AUTH) {
2065 if (!silc_server_verify_channel_auth(server, channel, client->id,
2066 cauth, cauth_len)) {
2067 silc_server_command_send_status_reply(cmd, SILC_COMMAND_JOIN,
2068 SILC_STATUS_ERR_PERM_DENIED, 0);
2074 * Client is allowed to join to the channel. Make it happen.
2077 /* Check whether the client already is on the channel */
2078 if (silc_server_client_on_channel(client, channel, NULL)) {
2079 clidp = silc_id_payload_encode(client_id, SILC_ID_CLIENT);
2080 chidp = silc_id_payload_encode(channel->id, SILC_ID_CHANNEL);
2081 silc_server_command_send_status_data2(cmd, SILC_COMMAND_JOIN,
2082 SILC_STATUS_ERR_USER_ON_CHANNEL, 0,
2083 2, clidp->data, clidp->len,
2084 3, chidp->data, chidp->len);
2085 silc_buffer_free(clidp);
2086 silc_buffer_free(chidp);
2090 /* Generate new channel key as protocol dictates */
2092 if (!silc_server_create_channel_key(server, channel, 0))
2095 /* Send the channel key. This is broadcasted to the channel but is not
2096 sent to the client who is joining to the channel. */
2097 if (!(channel->mode & SILC_CHANNEL_MODE_PRIVKEY))
2098 silc_server_send_channel_key(server, NULL, channel,
2099 server->server_type == SILC_ROUTER ?
2100 FALSE : !server->standalone);
2103 /* Join the client to the channel by adding it to channel's user list.
2104 Add also the channel to client entry's channels list for fast cross-
2106 chl = silc_calloc(1, sizeof(*chl));
2108 chl->client = client;
2109 chl->channel = channel;
2110 silc_hash_table_add(channel->user_list, client, chl);
2111 silc_hash_table_add(client->channels, channel, chl);
2112 channel->user_count++;
2113 channel->disabled = FALSE;
2115 /* Get users on the channel */
2116 silc_server_get_users_on_channel(server, channel, &user_list, &mode_list,
2119 /* Encode Client ID Payload of the original client who wants to join */
2120 clidp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
2122 /* Encode command reply packet */
2123 chidp = silc_id_payload_encode(channel->id, SILC_ID_CHANNEL);
2124 SILC_PUT32_MSB(channel->mode, mode);
2125 SILC_PUT32_MSB(created, tmp2);
2126 SILC_PUT32_MSB(user_count, tmp3);
2127 if (channel->mode & SILC_CHANNEL_MODE_ULIMIT)
2128 SILC_PUT32_MSB(channel->user_limit, ulimit);
2130 if (!(channel->mode & SILC_CHANNEL_MODE_PRIVKEY)) {
2131 tmp = silc_id_id2str(channel->id, SILC_ID_CHANNEL);
2132 cipher = silc_cipher_get_name(channel->channel_key);
2133 keyp = silc_channel_key_payload_encode(silc_id_get_len(channel->id,
2136 strlen(cipher), cipher,
2137 channel->key_len / 8, channel->key);
2141 if (channel->founder_key)
2142 fkey = silc_pkcs_public_key_payload_encode(channel->founder_key);
2144 /* Encode invite list */
2146 if (channel->invite_list && silc_hash_table_count(channel->invite_list)) {
2147 SilcHashTableList htl;
2149 invite_list = silc_buffer_alloc_size(2);
2150 silc_buffer_format(invite_list,
2151 SILC_STR_UI_SHORT(silc_hash_table_count(
2152 channel->invite_list)),
2155 silc_hash_table_list(channel->invite_list, &htl);
2156 while (silc_hash_table_get(&htl, (void *)&tmp_len, (void *)&reply))
2157 invite_list = silc_argument_payload_encode_one(invite_list,
2159 reply->len, tmp_len);
2160 silc_hash_table_list_reset(&htl);
2163 /* Encode ban list */
2165 if (channel->ban_list && silc_hash_table_count(channel->ban_list)) {
2166 SilcHashTableList htl;
2168 ban_list = silc_buffer_alloc_size(2);
2169 silc_buffer_format(ban_list,
2170 SILC_STR_UI_SHORT(silc_hash_table_count(
2171 channel->ban_list)),
2174 silc_hash_table_list(channel->ban_list, &htl);
2175 while (silc_hash_table_get(&htl, (void *)&tmp_len, (void *)&reply))
2176 ban_list = silc_argument_payload_encode_one(ban_list,
2178 reply->len, tmp_len);
2179 silc_hash_table_list_reset(&htl);
2182 if (channel->channel_pubkeys)
2183 chpklist = silc_server_get_channel_pk_list(server, channel, FALSE, FALSE);
2186 silc_command_reply_payload_encode_va(SILC_COMMAND_JOIN,
2187 SILC_STATUS_OK, 0, ident, 16,
2188 2, channel->channel_name,
2189 strlen(channel->channel_name),
2190 3, chidp->data, chidp->len,
2191 4, clidp->data, clidp->len,
2194 7, keyp ? keyp->data : NULL,
2195 keyp ? keyp->len : 0,
2196 8, ban_list ? ban_list->data : NULL,
2197 ban_list ? ban_list->len : 0,
2198 9, invite_list ? invite_list->data :
2200 invite_list ? invite_list->len : 0,
2203 strlen(channel->topic) : 0,
2204 11, silc_hmac_get_name(channel->hmac),
2205 strlen(silc_hmac_get_name(channel->
2208 13, user_list->data, user_list->len,
2209 14, mode_list->data,
2211 15, fkey ? fkey->data : NULL,
2212 fkey ? fkey->len : 0,
2213 16, chpklist ? chpklist->data : NULL,
2214 chpklist ? chpklist->len : 0,
2215 17, (channel->mode &
2216 SILC_CHANNEL_MODE_ULIMIT ?
2219 SILC_CHANNEL_MODE_ULIMIT ?
2220 sizeof(ulimit) : 0));
2222 /* Send command reply */
2223 silc_server_packet_send(server, sock, SILC_PACKET_COMMAND_REPLY, 0,
2224 reply->data, reply->len, FALSE);
2226 /* Send JOIN notify to locally connected clients on the channel. If
2227 we are normal server then router will send or have sent JOIN notify
2228 already. However since we've added the client already to our channel
2229 we'll ignore it (in packet_receive.c) so we must send it here. If
2230 we are router then this will send it to local clients and local
2232 SILC_LOG_DEBUG(("Send JOIN notify to channel"));
2233 silc_server_send_notify_to_channel(server, NULL, channel, FALSE, TRUE,
2234 SILC_NOTIFY_TYPE_JOIN, 2,
2235 clidp->data, clidp->len,
2236 chidp->data, chidp->len);
2238 /* Update statistics */
2239 server->stat.my_chanclients++;
2240 if (server->server_type == SILC_ROUTER) {
2241 server->stat.cell_chanclients++;
2242 server->stat.chanclients++;
2245 if (!cmd->pending) {
2246 /* Send JOIN notify packet to our primary router */
2247 silc_server_send_notify_join(server, SILC_PRIMARY_ROUTE(server),
2248 SILC_BROADCAST(server), channel, client->id);
2251 /* Distribute the channel key to all backup routers. */
2252 silc_server_backup_send(server, NULL, SILC_PACKET_CHANNEL_KEY, 0,
2253 keyp->data, keyp->len, FALSE, TRUE);
2255 /* If client became founder by providing correct founder auth data
2256 notify the mode change to the channel. */
2258 SILC_PUT32_MSB(chl->mode, mode);
2259 SILC_LOG_DEBUG(("Send CUMODE_CHANGE notify to channel"));
2260 silc_server_send_notify_to_channel(server, NULL, channel, FALSE, TRUE,
2261 SILC_NOTIFY_TYPE_CUMODE_CHANGE, 4,
2262 clidp->data, clidp->len,
2263 mode, 4, clidp->data, clidp->len,
2264 fkey ? fkey->data : NULL,
2265 fkey ? fkey->len : 0);
2269 /* Set CUMODE notify type to network */
2271 silc_server_send_notify_cumode(server, SILC_PRIMARY_ROUTE(server),
2272 SILC_BROADCAST(server), channel,
2273 chl->mode, client->id, SILC_ID_CLIENT,
2274 client->id, channel->founder_key);
2276 silc_buffer_free(reply);
2277 silc_buffer_free(clidp);
2278 silc_buffer_free(chidp);
2279 silc_buffer_free(keyp);
2280 silc_buffer_free(user_list);
2281 silc_buffer_free(mode_list);
2282 silc_buffer_free(fkey);
2283 silc_buffer_free(chpklist);
2284 silc_buffer_free(invite_list);
2285 silc_buffer_free(ban_list);
2289 memset(passphrase, 0, strlen(passphrase));
2290 silc_free(passphrase);
2293 /* Server side of command JOIN. Joins client into requested channel. If
2294 the channel does not exist it will be created. */
2296 SILC_SERVER_CMD_FUNC(join)
2298 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
2299 SilcServer server = cmd->server;
2300 unsigned char *auth, *cauth;
2301 SilcUInt32 tmp_len, auth_len, cauth_len;
2302 char *tmp, *channel_name = NULL, *cipher, *hmac;
2303 SilcChannelEntry channel;
2304 SilcUInt32 umode = 0;
2305 bool created = FALSE, create_key = TRUE;
2306 SilcClientID *client_id;
2308 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_JOIN, cmd, 2, 7);
2310 /* Get channel name */
2311 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
2313 silc_server_command_send_status_reply(cmd, SILC_COMMAND_JOIN,
2314 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
2321 channel_name[255] = '\0';
2323 if (silc_server_name_bad_chchars(channel_name, tmp_len) == TRUE) {
2324 silc_server_command_send_status_reply(cmd, SILC_COMMAND_JOIN,
2325 SILC_STATUS_ERR_BAD_CHANNEL, 0);
2329 /* Get Client ID of the client who is joining to the channel */
2330 tmp = silc_argument_get_arg_type(cmd->args, 2, &tmp_len);
2332 silc_server_command_send_status_reply(cmd, SILC_COMMAND_JOIN,
2333 SILC_STATUS_ERR_NO_CLIENT_ID,
2337 client_id = silc_id_payload_parse_id(tmp, tmp_len, NULL);
2339 silc_server_command_send_status_data(cmd, SILC_COMMAND_JOIN,
2340 SILC_STATUS_ERR_BAD_CLIENT_ID, 0,
2345 /* Get cipher, hmac name and auth payload */
2346 cipher = silc_argument_get_arg_type(cmd->args, 4, NULL);
2347 hmac = silc_argument_get_arg_type(cmd->args, 5, NULL);
2348 auth = silc_argument_get_arg_type(cmd->args, 6, &auth_len);
2349 cauth = silc_argument_get_arg_type(cmd->args, 7, &cauth_len);
2351 /* See if the channel exists */
2352 channel = silc_idlist_find_channel_by_name(server->local_list,
2353 channel_name, NULL);
2355 if (cmd->sock->type == SILC_SOCKET_TYPE_CLIENT) {
2356 SilcClientEntry entry = (SilcClientEntry)cmd->sock->user_data;
2358 silc_server_command_send_status_reply(cmd, SILC_COMMAND_JOIN,
2359 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
2364 silc_free(client_id);
2365 client_id = silc_id_dup(entry->id, SILC_ID_CLIENT);
2368 (channel->disabled && server->server_type != SILC_ROUTER)) {
2369 /* Channel not found or not valid */
2371 /* If we are standalone server we don't have a router, we just create
2372 the channel by ourselves (unless it existed). */
2373 if (server->standalone) {
2375 channel = silc_server_create_new_channel(server, server->id, cipher,
2376 hmac, channel_name, TRUE);
2378 silc_server_command_send_status_data(
2379 cmd, SILC_COMMAND_JOIN,
2380 SILC_STATUS_ERR_UNKNOWN_ALGORITHM,
2381 0, 2, cipher, strlen(cipher));
2382 silc_free(client_id);
2386 umode = (SILC_CHANNEL_UMODE_CHANOP | SILC_CHANNEL_UMODE_CHANFO);
2392 /* The channel does not exist on our server. If we are normal server
2393 we will send JOIN command to our router which will handle the
2394 joining procedure (either creates the channel if it doesn't exist
2395 or joins the client to it). */
2396 if (server->server_type != SILC_ROUTER) {
2398 SilcUInt16 old_ident;
2400 /* If this is pending command callback then we've resolved
2401 it and it didn't work, return since we've notified the
2402 client already in the command reply callback. */
2404 silc_free(client_id);
2408 old_ident = silc_command_get_ident(cmd->payload);
2409 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
2410 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
2412 /* Send JOIN command to our router */
2413 silc_server_packet_send(server, (SilcSocketConnection)
2414 SILC_PRIMARY_ROUTE(server),
2415 SILC_PACKET_COMMAND, cmd->packet->flags,
2416 tmpbuf->data, tmpbuf->len, TRUE);
2418 /* Reprocess this packet after received reply from router */
2419 silc_server_command_pending(server, SILC_COMMAND_JOIN,
2420 silc_command_get_ident(cmd->payload),
2421 silc_server_command_join,
2422 silc_server_command_dup(cmd));
2423 cmd->pending = TRUE;
2424 silc_command_set_ident(cmd->payload, old_ident);
2425 silc_buffer_free(tmpbuf);
2426 silc_free(client_id);
2430 /* We are router and the channel does not seem exist so we will check
2431 our global list as well for the channel. */
2432 channel = silc_idlist_find_channel_by_name(server->global_list,
2433 channel_name, NULL);
2435 /* Channel really does not exist, create it */
2436 channel = silc_server_create_new_channel(server, server->id, cipher,
2437 hmac, channel_name, TRUE);
2439 silc_server_command_send_status_data(
2440 cmd, SILC_COMMAND_JOIN,
2441 SILC_STATUS_ERR_UNKNOWN_ALGORITHM, 0,
2442 2, cipher, strlen(cipher));
2443 silc_free(client_id);
2447 umode = (SILC_CHANNEL_UMODE_CHANOP | SILC_CHANNEL_UMODE_CHANFO);
2455 /* Channel not found */
2457 /* If the command came from router and we are normal server then
2458 something went wrong with the joining as the channel was not found.
2459 We can't do anything else but ignore this. */
2460 if (cmd->sock->type == SILC_SOCKET_TYPE_ROUTER ||
2461 server->server_type != SILC_ROUTER) {
2462 silc_free(client_id);
2466 /* We are router and the channel does not seem exist so we will check
2467 our global list as well for the channel. */
2468 channel = silc_idlist_find_channel_by_name(server->global_list,
2469 channel_name, NULL);
2471 /* Channel really does not exist, create it */
2472 channel = silc_server_create_new_channel(server, server->id, cipher,
2473 hmac, channel_name, TRUE);
2475 silc_server_command_send_status_data(
2476 cmd, SILC_COMMAND_JOIN,
2477 SILC_STATUS_ERR_UNKNOWN_ALGORITHM, 0,
2478 2, cipher, strlen(cipher));
2479 silc_free(client_id);
2483 umode = (SILC_CHANNEL_UMODE_CHANOP | SILC_CHANNEL_UMODE_CHANFO);
2490 /* Check whether the channel was created by our router */
2491 if (cmd->pending && context2) {
2492 SilcServerCommandReplyContext reply = context2;
2494 if (silc_command_get(reply->payload) == SILC_COMMAND_JOIN) {
2495 tmp = silc_argument_get_arg_type(reply->args, 6, NULL);
2496 SILC_GET32_MSB(created, tmp);
2497 if (silc_argument_get_arg_type(reply->args, 7, NULL))
2498 create_key = FALSE; /* Router returned the key already */
2500 if (silc_command_get_status(reply->payload, NULL, NULL) &&
2501 channel->mode & SILC_CHANNEL_MODE_PASSPHRASE) {
2502 /* Save channel passphrase, if user provided it successfully */
2505 pa = silc_argument_get_arg_type(cmd->args, 3, &pa_len);
2507 silc_free(channel->passphrase);
2508 channel->passphrase = silc_memdup(pa, pa_len);
2513 if (silc_command_get(reply->payload) == SILC_COMMAND_WHOIS &&
2514 !channel->disabled && !silc_hash_table_count(channel->user_list))
2518 /* If the channel does not have global users and is also empty the client
2519 will be the channel founder and operator. */
2520 if (!channel->disabled &&
2521 !channel->global_users && !silc_hash_table_count(channel->user_list))
2522 umode = (SILC_CHANNEL_UMODE_CHANOP | SILC_CHANNEL_UMODE_CHANFO);
2524 /* Join to the channel */
2525 silc_server_command_join_channel(server, cmd, channel, client_id,
2526 created, create_key, umode,
2527 auth, auth_len, cauth, cauth_len);
2529 silc_free(client_id);
2532 silc_server_command_free(cmd);
2535 /* Server side of command MOTD. Sends server's current "message of the
2536 day" to the client. */
2538 SILC_SERVER_CMD_FUNC(motd)
2540 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
2541 SilcServer server = cmd->server;
2542 SilcBuffer packet, idp;
2543 char *motd, *dest_server;
2544 SilcUInt32 motd_len;
2545 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
2547 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_MOTD, cmd, 1, 1);
2549 /* Get server name */
2550 dest_server = silc_argument_get_arg_type(cmd->args, 1, NULL);
2552 silc_server_command_send_status_reply(cmd, SILC_COMMAND_MOTD,
2553 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
2558 if (!strncasecmp(dest_server, server->server_name, strlen(dest_server))) {
2561 idp = silc_id_payload_encode(server->id_entry->id, SILC_ID_SERVER);
2563 if (server->config && server->config->server_info &&
2564 server->config->server_info->motd_file) {
2566 motd = silc_file_readfile(server->config->server_info->motd_file,
2572 packet = silc_command_reply_payload_encode_va(SILC_COMMAND_MOTD,
2575 2, idp->data, idp->len,
2579 packet = silc_command_reply_payload_encode_va(SILC_COMMAND_MOTD,
2582 2, idp->data, idp->len);
2585 silc_server_packet_send(server, cmd->sock, SILC_PACKET_COMMAND_REPLY, 0,
2586 packet->data, packet->len, FALSE);
2587 silc_buffer_free(packet);
2588 silc_buffer_free(idp);
2590 SilcServerEntry entry;
2592 /* Check whether we have this server cached */
2593 entry = silc_idlist_find_server_by_name(server->global_list,
2594 dest_server, TRUE, NULL);
2596 entry = silc_idlist_find_server_by_name(server->local_list,
2597 dest_server, TRUE, NULL);
2600 if (server->server_type != SILC_SERVER && !cmd->pending &&
2601 entry && !entry->motd) {
2602 /* Send to the server */
2604 SilcUInt16 old_ident;
2606 old_ident = silc_command_get_ident(cmd->payload);
2607 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
2608 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
2610 silc_server_packet_send(server, entry->connection,
2611 SILC_PACKET_COMMAND, cmd->packet->flags,
2612 tmpbuf->data, tmpbuf->len, TRUE);
2614 /* Reprocess this packet after received reply from router */
2615 silc_server_command_pending(server, SILC_COMMAND_MOTD,
2616 silc_command_get_ident(cmd->payload),
2617 silc_server_command_motd,
2618 silc_server_command_dup(cmd));
2619 cmd->pending = TRUE;
2620 silc_command_set_ident(cmd->payload, old_ident);
2621 silc_buffer_free(tmpbuf);
2625 /* Send to primary router only if we don't know the server
2626 * the client requested or if the server is not locally connected */
2627 if ((!entry || !(entry->data.status & SILC_IDLIST_STATUS_LOCAL))
2628 && !cmd->pending && !server->standalone) {
2629 /* Send to the primary router */
2631 SilcUInt16 old_ident;
2633 old_ident = silc_command_get_ident(cmd->payload);
2634 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
2635 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
2637 silc_server_packet_send(server, SILC_PRIMARY_ROUTE(server),
2638 SILC_PACKET_COMMAND, cmd->packet->flags,
2639 tmpbuf->data, tmpbuf->len, TRUE);
2641 /* Reprocess this packet after received reply from router */
2642 silc_server_command_pending(server, SILC_COMMAND_MOTD,
2643 silc_command_get_ident(cmd->payload),
2644 silc_server_command_motd,
2645 silc_server_command_dup(cmd));
2646 cmd->pending = TRUE;
2647 silc_command_set_ident(cmd->payload, old_ident);
2648 silc_buffer_free(tmpbuf);
2653 silc_server_command_send_status_data(cmd, SILC_COMMAND_MOTD,
2654 SILC_STATUS_ERR_NO_SUCH_SERVER, 0,
2656 strlen(dest_server));
2660 idp = silc_id_payload_encode(entry->id, SILC_ID_SERVER);
2661 packet = silc_command_reply_payload_encode_va(SILC_COMMAND_MOTD,
2662 SILC_STATUS_OK, 0, ident, 2,
2663 2, idp->data, idp->len,
2666 strlen(entry->motd) : 0);
2667 silc_server_packet_send(server, cmd->sock, SILC_PACKET_COMMAND_REPLY, 0,
2668 packet->data, packet->len, FALSE);
2669 silc_buffer_free(packet);
2670 silc_buffer_free(idp);
2674 silc_server_command_free(cmd);
2677 /* Server side of command UMODE. Client can use this command to set/unset
2678 user mode. Client actually cannot set itself to be as server/router
2679 operator so this can be used only to unset the modes. */
2681 SILC_SERVER_CMD_FUNC(umode)
2683 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
2684 SilcServer server = cmd->server;
2685 SilcClientEntry client = (SilcClientEntry)cmd->sock->user_data;
2687 unsigned char *tmp_mask, m[4];
2688 SilcUInt32 mask = 0;
2689 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
2690 bool set_mask = FALSE;
2692 if (cmd->sock->type != SILC_SOCKET_TYPE_CLIENT || !client)
2695 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_UMODE, cmd, 1, 2);
2697 /* Get the client's mode mask */
2698 tmp_mask = silc_argument_get_arg_type(cmd->args, 2, NULL);
2700 SILC_GET32_MSB(mask, tmp_mask);
2705 /* Check that mode changing is allowed. */
2706 if (!silc_server_check_umode_rights(server, client, mask)) {
2707 silc_server_command_send_status_reply(cmd, SILC_COMMAND_UMODE,
2708 SILC_STATUS_ERR_PERM_DENIED, 0);
2712 /* Anonymous mode cannot be set by client */
2713 if (mask & SILC_UMODE_ANONYMOUS &&
2714 !(client->mode & SILC_UMODE_ANONYMOUS)) {
2715 silc_server_command_send_status_reply(cmd, SILC_COMMAND_UMODE,
2716 SILC_STATUS_ERR_PERM_DENIED, 0);
2720 /* Update statistics */
2721 if (mask & SILC_UMODE_GONE) {
2722 if (!(client->mode & SILC_UMODE_GONE))
2723 server->stat.my_aways++;
2725 if (client->mode & SILC_UMODE_GONE)
2726 server->stat.my_aways--;
2729 /* If the client has anonymous mode set, preserve it. */
2730 if (client->mode & SILC_UMODE_ANONYMOUS)
2731 mask |= SILC_UMODE_ANONYMOUS;
2733 /* Change the mode */
2734 client->mode = mask;
2736 /* Send UMODE change to primary router */
2737 silc_server_send_notify_umode(server, SILC_PRIMARY_ROUTE(server),
2738 SILC_BROADCAST(server), client->id,
2741 /* Check if anyone is watching this nickname */
2742 if (server->server_type == SILC_ROUTER)
2743 silc_server_check_watcher_list(server, client, NULL,
2744 SILC_NOTIFY_TYPE_UMODE_CHANGE);
2747 /* Send command reply to sender */
2748 SILC_PUT32_MSB(client->mode, m);
2749 packet = silc_command_reply_payload_encode_va(SILC_COMMAND_UMODE,
2750 SILC_STATUS_OK, 0, ident, 1,
2752 silc_server_packet_send(server, cmd->sock, SILC_PACKET_COMMAND_REPLY, 0,
2753 packet->data, packet->len, FALSE);
2754 silc_buffer_free(packet);
2757 silc_server_command_free(cmd);
2760 /* Server side command of CMODE. Changes channel mode */
2762 SILC_SERVER_CMD_FUNC(cmode)
2764 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
2765 SilcServer server = cmd->server;
2766 SilcClientEntry client = (SilcClientEntry)cmd->sock->user_data;
2767 SilcIDListData idata = (SilcIDListData)client;
2768 SilcChannelID *channel_id = NULL;
2769 SilcChannelEntry channel;
2770 SilcChannelClientEntry chl;
2771 SilcBuffer packet, cidp;
2772 unsigned char *tmp, *tmp_id, *tmp_mask, *chpkdata = NULL;
2773 char *cipher = NULL, *hmac = NULL, *passphrase = NULL, ulimit[4];
2774 SilcUInt32 mode_mask = 0, old_mask = 0, tmp_len, tmp_len2, chpklen;
2775 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
2776 bool set_mask = FALSE, set_chpk = FALSE;
2777 SilcPublicKey founder_key = NULL;
2778 SilcBuffer fkey = NULL, chpklist = NULL;
2779 SilcBufferStruct chpk;
2782 silc_server_command_free(cmd);
2786 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_CMODE, cmd, 1, 9);
2788 /* Get Channel ID */
2789 tmp_id = silc_argument_get_arg_type(cmd->args, 1, &tmp_len2);
2791 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
2792 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
2793 silc_server_command_free(cmd);
2796 channel_id = silc_id_payload_parse_id(tmp_id, tmp_len2, NULL);
2798 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
2799 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
2800 silc_server_command_free(cmd);
2804 /* Get channel entry */
2805 channel = silc_idlist_find_channel_by_id(server->local_list,
2808 channel = silc_idlist_find_channel_by_id(server->global_list,
2811 silc_server_command_send_status_data(cmd, SILC_COMMAND_CMODE,
2812 SILC_STATUS_ERR_NO_SUCH_CHANNEL_ID,
2813 0, 2, tmp_id, tmp_len2);
2814 silc_free(channel_id);
2815 silc_server_command_free(cmd);
2819 old_mask = channel->mode;
2821 /* Get the channel mode mask */
2822 tmp_mask = silc_argument_get_arg_type(cmd->args, 2, &tmp_len);
2824 SILC_GET32_MSB(mode_mask, tmp_mask);
2828 /* Check whether this client is on the channel */
2829 if (!silc_server_client_on_channel(client, channel, &chl)) {
2830 silc_server_command_send_status_data(cmd, SILC_COMMAND_CMODE,
2831 SILC_STATUS_ERR_NOT_ON_CHANNEL, 0,
2832 2, tmp_id, tmp_len2);
2836 /* Check that client has rights to change any requested channel modes */
2837 if (set_mask && !silc_server_check_cmode_rights(server, channel, chl,
2839 SILC_LOG_DEBUG(("Client does not have rights to change mode"));
2840 silc_server_command_send_status_data(
2841 cmd, SILC_COMMAND_CMODE,
2842 (!(chl->mode & SILC_CHANNEL_UMODE_CHANOP) ?
2843 SILC_STATUS_ERR_NO_CHANNEL_PRIV :
2844 SILC_STATUS_ERR_NO_CHANNEL_FOPRIV), 0,
2845 2, tmp_id, tmp_len2);
2849 /* If mode mask was not sent as argument then merely return the current
2850 mode mask, founder key and channel public key list to the sender. */
2853 SILC_PUT32_MSB(channel->mode, m);
2854 if (channel->founder_key)
2855 fkey = silc_pkcs_public_key_payload_encode(channel->founder_key);
2856 if (channel->channel_pubkeys)
2857 chpklist = silc_server_get_channel_pk_list(server, channel,
2860 silc_command_reply_payload_encode_va(SILC_COMMAND_CMODE,
2861 SILC_STATUS_OK, 0, ident, 4,
2862 2, tmp_id, tmp_len2,
2864 4, fkey ? fkey->data : NULL,
2865 fkey ? fkey->len : 0,
2866 5, chpklist ? chpklist->data : NULL,
2867 chpklist ? chpklist->len : 0);
2868 silc_server_packet_send(server, cmd->sock, SILC_PACKET_COMMAND_REPLY, 0,
2869 packet->data, packet->len, FALSE);
2870 silc_buffer_free(packet);
2875 * Check the modes. Modes that requires nothing special operation are
2879 if (mode_mask & SILC_CHANNEL_MODE_PRIVKEY) {
2880 /* Channel uses private keys to protect traffic. Client(s) has set the
2881 key locally they want to use, server does not know that key. */
2882 /* Nothing interesting to do here */
2884 if (channel->mode & SILC_CHANNEL_MODE_PRIVKEY) {
2885 /* The mode is removed and we need to generate and distribute
2886 new channel key. Clients are not using private channel keys
2887 anymore after this. */
2889 /* Re-generate channel key */
2890 if (!silc_server_create_channel_key(server, channel, 0))
2893 /* Send the channel key. This sends it to our local clients and if
2894 we are normal server to our router as well. */
2895 silc_server_send_channel_key(server, NULL, channel,
2896 server->server_type == SILC_ROUTER ?
2897 FALSE : !server->standalone);
2899 cipher = (char *)silc_cipher_get_name(channel->channel_key);
2900 hmac = (char *)silc_hmac_get_name(channel->hmac);
2904 if (mode_mask & SILC_CHANNEL_MODE_ULIMIT) {
2905 /* User limit is set on channel */
2906 SilcUInt32 user_limit;
2908 /* Get user limit */
2909 tmp = silc_argument_get_arg_type(cmd->args, 3, NULL);
2911 if (!(channel->mode & SILC_CHANNEL_MODE_ULIMIT)) {
2912 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
2913 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS, 0);
2917 SILC_GET32_MSB(user_limit, tmp);
2918 channel->user_limit = user_limit;
2921 if (channel->mode & SILC_CHANNEL_MODE_ULIMIT)
2922 /* User limit mode is unset. Remove user limit */
2923 channel->user_limit = 0;
2926 if (mode_mask & SILC_CHANNEL_MODE_PASSPHRASE) {
2927 if (!(channel->mode & SILC_CHANNEL_MODE_PASSPHRASE)) {
2928 /* Passphrase has been set to channel */
2930 /* Get the passphrase */
2931 tmp = silc_argument_get_arg_type(cmd->args, 4, NULL);
2933 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
2934 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS, 0);
2938 /* Save the passphrase */
2939 passphrase = channel->passphrase = silc_memdup(tmp, strlen(tmp));
2942 if (channel->mode & SILC_CHANNEL_MODE_PASSPHRASE) {
2943 /* Passphrase mode is unset. remove the passphrase */
2944 silc_free(channel->passphrase);
2945 channel->passphrase = NULL;
2949 if (mode_mask & SILC_CHANNEL_MODE_CIPHER) {
2950 if (!(channel->mode & SILC_CHANNEL_MODE_CIPHER)) {
2951 /* Cipher to use protect the traffic */
2952 SilcCipher newkey, oldkey;
2955 cipher = silc_argument_get_arg_type(cmd->args, 5, NULL);
2957 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
2958 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS, 0);
2962 /* Delete old cipher and allocate the new one */
2963 if (!silc_cipher_alloc(cipher, &newkey)) {
2964 silc_server_command_send_status_data(
2965 cmd, SILC_COMMAND_CMODE,
2966 SILC_STATUS_ERR_UNKNOWN_ALGORITHM, 0,
2967 2, cipher, strlen(cipher));
2971 oldkey = channel->channel_key;
2972 channel->channel_key = newkey;
2974 /* Re-generate channel key */
2975 if (!silc_server_create_channel_key(server, channel, 0)) {
2976 /* We don't have new key, revert to old one */
2977 channel->channel_key = oldkey;
2981 /* Remove old channel key for good */
2982 silc_cipher_free(oldkey);
2984 /* Send the channel key. This sends it to our local clients and if
2985 we are normal server to our router as well. */
2986 silc_server_send_channel_key(server, NULL, channel,
2987 server->server_type == SILC_ROUTER ?
2988 FALSE : !server->standalone);
2991 if (channel->mode & SILC_CHANNEL_MODE_CIPHER) {
2992 /* Cipher mode is unset. Remove the cipher and revert back to
2994 SilcCipher newkey, oldkey;
2995 cipher = channel->cipher;
2997 /* Delete old cipher and allocate default one */
2998 if (!silc_cipher_alloc(cipher ? cipher : SILC_DEFAULT_CIPHER, &newkey)) {
2999 silc_server_command_send_status_data(
3000 cmd, SILC_COMMAND_CMODE,
3001 SILC_STATUS_ERR_UNKNOWN_ALGORITHM, 0,
3002 2, cipher, strlen(cipher));
3006 oldkey = channel->channel_key;
3007 channel->channel_key = newkey;
3009 /* Re-generate channel key */
3010 if (!silc_server_create_channel_key(server, channel, 0)) {
3011 /* We don't have new key, revert to old one */
3012 channel->channel_key = oldkey;
3016 /* Remove old channel key for good */
3017 silc_cipher_free(oldkey);
3019 /* Send the channel key. This sends it to our local clients and if
3020 we are normal server to our router as well. */
3021 silc_server_send_channel_key(server, NULL, channel,
3022 server->server_type == SILC_ROUTER ?
3023 FALSE : !server->standalone);
3027 if (mode_mask & SILC_CHANNEL_MODE_HMAC) {
3028 if (!(channel->mode & SILC_CHANNEL_MODE_HMAC)) {
3029 /* HMAC to use protect the traffic */
3030 unsigned char hash[32];
3034 hmac = silc_argument_get_arg_type(cmd->args, 6, NULL);
3036 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
3037 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS, 0);
3041 /* Delete old hmac and allocate the new one */
3042 if (!silc_hmac_alloc(hmac, NULL, &newhmac)) {
3043 silc_server_command_send_status_data(
3044 cmd, SILC_COMMAND_CMODE,
3045 SILC_STATUS_ERR_UNKNOWN_ALGORITHM, 0,
3046 2, hmac, strlen(hmac));
3050 silc_hmac_free(channel->hmac);
3051 channel->hmac = newhmac;
3053 /* Set the HMAC key out of current channel key. The client must do
3055 silc_hash_make(silc_hmac_get_hash(channel->hmac), channel->key,
3056 channel->key_len / 8, hash);
3057 silc_hmac_set_key(channel->hmac, hash,
3058 silc_hash_len(silc_hmac_get_hash(channel->hmac)));
3059 memset(hash, 0, sizeof(hash));
3062 if (channel->mode & SILC_CHANNEL_MODE_HMAC) {
3063 /* Hmac mode is unset. Remove the hmac and revert back to
3066 unsigned char hash[32];
3067 hmac = channel->hmac_name;
3069 /* Delete old hmac and allocate default one */
3070 if (!silc_hmac_alloc(hmac ? hmac : SILC_DEFAULT_HMAC, NULL, &newhmac)) {
3071 silc_server_command_send_status_data(
3072 cmd, SILC_COMMAND_CMODE,
3073 SILC_STATUS_ERR_UNKNOWN_ALGORITHM, 0,
3074 2, hmac, strlen(hmac));
3078 silc_hmac_free(channel->hmac);
3079 channel->hmac = newhmac;
3081 /* Set the HMAC key out of current channel key. The client must do
3083 silc_hash_make(silc_hmac_get_hash(channel->hmac), channel->key,
3084 channel->key_len / 8,
3086 silc_hmac_set_key(channel->hmac, hash,
3087 silc_hash_len(silc_hmac_get_hash(channel->hmac)));
3088 memset(hash, 0, sizeof(hash));
3092 if (mode_mask & SILC_CHANNEL_MODE_FOUNDER_AUTH) {
3093 if (chl->mode & SILC_CHANNEL_UMODE_CHANFO) {
3094 /* Check if the founder public key was received */
3095 founder_key = idata->public_key;
3096 tmp = silc_argument_get_arg_type(cmd->args, 8, &tmp_len);
3098 if (!silc_pkcs_public_key_payload_decode(tmp, tmp_len, &founder_key)) {
3099 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
3100 SILC_STATUS_ERR_AUTH_FAILED,
3105 /* If key was not sent and the channel mode has already founder
3106 then the key was not to be changed. */
3107 if (channel->mode & SILC_CHANNEL_MODE_FOUNDER_AUTH)
3111 /* Set the founder authentication */
3112 tmp = silc_argument_get_arg_type(cmd->args, 7, &tmp_len);
3114 silc_server_command_send_status_reply(
3115 cmd, SILC_COMMAND_CMODE,
3116 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS, 0);
3120 /* Verify the payload before setting the mode */
3121 if (!silc_auth_verify_data(tmp, tmp_len, SILC_AUTH_PUBLIC_KEY,
3122 founder_key, 0, server->sha1hash,
3123 client->id, SILC_ID_CLIENT)) {
3124 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
3125 SILC_STATUS_ERR_AUTH_FAILED,
3130 /* Save the public key */
3131 if (channel->founder_key)
3132 silc_pkcs_public_key_free(channel->founder_key);
3133 if (silc_argument_get_arg_type(cmd->args, 8, NULL))
3134 channel->founder_key = founder_key;
3136 channel->founder_key = silc_pkcs_public_key_copy(founder_key);
3137 if (!channel->founder_key) {
3138 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
3139 SILC_STATUS_ERR_AUTH_FAILED,
3144 fkey = silc_pkcs_public_key_payload_encode(channel->founder_key);
3146 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
3147 SILC_STATUS_ERR_AUTH_FAILED,
3149 silc_pkcs_public_key_free(channel->founder_key);
3150 channel->founder_key = NULL;
3155 if (chl->mode & SILC_CHANNEL_UMODE_CHANFO) {
3156 if (channel->mode & SILC_CHANNEL_MODE_FOUNDER_AUTH) {
3157 if (channel->founder_key)
3158 silc_pkcs_public_key_free(channel->founder_key);
3159 channel->founder_key = NULL;
3165 if (mode_mask & SILC_CHANNEL_MODE_CHANNEL_AUTH) {
3166 if (chl->mode & SILC_CHANNEL_UMODE_CHANFO) {
3169 chpkdata = silc_argument_get_arg_type(cmd->args, 9, &chpklen);
3171 if (!chpkdata && channel->mode & SILC_CHANNEL_MODE_CHANNEL_AUTH)
3176 /* Process the channel public key(s) */
3177 st = silc_server_set_channel_pk_list(server, NULL, channel,
3179 if (st != SILC_STATUS_OK) {
3180 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE, st, 0);
3185 if (chl->mode & SILC_CHANNEL_UMODE_CHANFO) {
3186 if (channel->mode & SILC_CHANNEL_MODE_CHANNEL_AUTH) {
3187 if (channel->channel_pubkeys)
3188 silc_hash_table_free(channel->channel_pubkeys);
3189 channel->channel_pubkeys = NULL;
3196 /* Finally, set the mode */
3197 old_mask = channel->mode = mode_mask;
3199 /* Send CMODE_CHANGE notify. */
3200 cidp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
3201 if (mode_mask & SILC_CHANNEL_MODE_ULIMIT)
3202 SILC_PUT32_MSB(channel->user_limit, ulimit);
3203 silc_server_send_notify_to_channel(server, NULL, channel, FALSE, TRUE,
3204 SILC_NOTIFY_TYPE_CMODE_CHANGE, 8,
3205 cidp->data, cidp->len,
3207 cipher, cipher ? strlen(cipher) : 0,
3208 hmac, hmac ? strlen(hmac) : 0,
3209 passphrase, passphrase ?
3210 strlen(passphrase) : 0,
3211 fkey ? fkey->data : NULL,
3212 fkey ? fkey->len : 0,
3213 chpkdata ? chpkdata : NULL,
3214 chpkdata ? chpklen : 0,
3215 mode_mask & SILC_CHANNEL_MODE_ULIMIT ?
3217 mode_mask & SILC_CHANNEL_MODE_ULIMIT ?
3218 sizeof(ulimit) : 0);
3220 /* Set CMODE notify type to network */
3221 if (chpkdata && chpklen)
3222 silc_buffer_set(&chpk, chpkdata, chpklen);
3223 silc_server_send_notify_cmode(server, SILC_PRIMARY_ROUTE(server),
3224 SILC_BROADCAST(server), channel,
3225 mode_mask, client->id, SILC_ID_CLIENT,
3226 cipher, hmac, passphrase, founder_key,
3227 chpkdata ? &chpk : NULL);
3230 chpklist = silc_server_get_channel_pk_list(server, channel, FALSE, FALSE);
3232 /* Send command reply to sender */
3233 packet = silc_command_reply_payload_encode_va(SILC_COMMAND_CMODE,
3234 SILC_STATUS_OK, 0, ident, 5,
3235 2, tmp_id, tmp_len2,
3237 4, fkey ? fkey->data : NULL,
3238 fkey ? fkey->len : 0,
3239 5, chpklist ? chpklist->data :
3240 NULL, chpklist ? chpklist->len
3243 SILC_CHANNEL_MODE_ULIMIT ?
3246 SILC_CHANNEL_MODE_ULIMIT ?
3247 sizeof(ulimit) : 0));
3249 silc_server_packet_send(server, cmd->sock, SILC_PACKET_COMMAND_REPLY, 0,
3250 packet->data, packet->len, FALSE);
3252 silc_buffer_free(packet);
3253 silc_buffer_free(cidp);
3256 channel->mode = old_mask;
3257 silc_buffer_free(chpklist);
3258 silc_buffer_free(fkey);
3259 silc_free(channel_id);
3260 silc_server_command_free(cmd);
3263 /* Server side of CUMODE command. Changes client's mode on a channel. */
3265 SILC_SERVER_CMD_FUNC(cumode)
3267 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
3268 SilcServer server = cmd->server;
3269 SilcClientEntry client = (SilcClientEntry)cmd->sock->user_data;
3270 SilcChannelID *channel_id = NULL;
3271 SilcClientID *client_id = NULL;
3272 SilcChannelEntry channel;
3273 SilcClientEntry target_client;
3274 SilcChannelClientEntry chl;
3275 SilcBuffer packet, idp;
3276 unsigned char *tmp_id, *tmp_ch_id, *tmp_mask;
3277 SilcUInt32 target_mask, sender_mask = 0, tmp_len, tmp_ch_len;
3279 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
3280 SilcPublicKey founder_key = NULL;
3281 SilcBuffer fkey = NULL;
3286 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_CUMODE, cmd, 3, 4);
3288 /* Get Channel ID */
3289 tmp_ch_id = silc_argument_get_arg_type(cmd->args, 1, &tmp_ch_len);
3291 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3292 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
3295 channel_id = silc_id_payload_parse_id(tmp_ch_id, tmp_ch_len, NULL);
3297 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3298 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
3302 /* Get channel entry */
3303 channel = silc_idlist_find_channel_by_id(server->local_list,
3306 channel = silc_idlist_find_channel_by_id(server->global_list,
3309 silc_server_command_send_status_data(cmd, SILC_COMMAND_CUMODE,
3310 SILC_STATUS_ERR_NO_SUCH_CHANNEL_ID,
3311 0, 2, tmp_ch_id, tmp_ch_len);
3316 /* Check whether sender is on the channel */
3317 if (!silc_server_client_on_channel(client, channel, &chl)) {
3318 silc_server_command_send_status_data(cmd, SILC_COMMAND_CUMODE,
3319 SILC_STATUS_ERR_NOT_ON_CHANNEL, 0,
3320 2, tmp_ch_id, tmp_ch_len);
3323 sender_mask = chl->mode;
3325 /* Get the target client's channel mode mask */
3326 tmp_mask = silc_argument_get_arg_type(cmd->args, 2, NULL);
3328 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3329 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
3333 SILC_GET32_MSB(target_mask, tmp_mask);
3335 /* Get target Client ID */
3336 tmp_id = silc_argument_get_arg_type(cmd->args, 3, &tmp_len);
3338 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3339 SILC_STATUS_ERR_NO_CLIENT_ID, 0);
3342 client_id = silc_id_payload_parse_id(tmp_id, tmp_len, NULL);
3344 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3345 SILC_STATUS_ERR_NO_CLIENT_ID, 0);
3349 /* Get target client's entry */
3350 target_client = silc_idlist_find_client_by_id(server->local_list,
3351 client_id, TRUE, NULL);
3353 target_client = silc_idlist_find_client_by_id(server->global_list,
3354 client_id, TRUE, NULL);
3356 if (target_client != client &&
3357 !(sender_mask & SILC_CHANNEL_UMODE_CHANFO) &&
3358 !(sender_mask & SILC_CHANNEL_UMODE_CHANOP)) {
3359 silc_server_command_send_status_data(cmd, SILC_COMMAND_CUMODE,
3360 SILC_STATUS_ERR_NOT_YOU, 0,
3361 2, tmp_ch_id, tmp_ch_len);
3365 /* Check whether target client is on the channel */
3366 if (target_client != client) {
3367 if (!silc_server_client_on_channel(target_client, channel, &chl)) {
3368 silc_server_command_send_status_data2(
3369 cmd, SILC_COMMAND_CUMODE,
3370 SILC_STATUS_ERR_USER_NOT_ON_CHANNEL, 0,
3372 3, tmp_ch_id, tmp_ch_len);
3381 /* If the target client is founder, no one else can change their mode
3383 if (chl->mode & SILC_CHANNEL_UMODE_CHANFO && client != target_client) {
3384 silc_server_command_send_status_data(cmd, SILC_COMMAND_CUMODE,
3385 SILC_STATUS_ERR_NO_CHANNEL_FOPRIV,
3386 0, 2, tmp_ch_id, tmp_ch_len);
3390 if (target_mask & SILC_CHANNEL_UMODE_CHANFO) {
3391 if (target_client != client) {
3392 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3393 SILC_STATUS_ERR_NO_CHANNEL_FOPRIV,
3398 if (!(chl->mode & SILC_CHANNEL_UMODE_CHANFO)) {
3399 /* The client tries to claim the founder rights. */
3400 unsigned char *tmp_auth;
3401 SilcUInt32 tmp_auth_len;
3402 SilcChannelClientEntry chl2;
3403 SilcHashTableList htl;
3405 if (!(channel->mode & SILC_CHANNEL_MODE_FOUNDER_AUTH) ||
3406 !channel->founder_key) {
3407 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3408 SILC_STATUS_ERR_AUTH_FAILED, 0);
3412 tmp_auth = silc_argument_get_arg_type(cmd->args, 4, &tmp_auth_len);
3414 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3415 SILC_STATUS_ERR_AUTH_FAILED, 0);
3419 /* Verify the authentication payload */
3420 if (!silc_auth_verify_data(tmp_auth, tmp_auth_len, SILC_AUTH_PUBLIC_KEY,
3421 channel->founder_key, 0, server->sha1hash,
3422 client->id, SILC_ID_CLIENT)) {
3423 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3424 SILC_STATUS_ERR_AUTH_FAILED, 0);
3429 founder_key = channel->founder_key;
3430 fkey = silc_pkcs_public_key_payload_encode(founder_key);
3432 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3433 SILC_STATUS_ERR_AUTH_FAILED, 0);
3437 /* There cannot be anyone else as founder on the channel now. This
3438 client is definitely the founder due to this authentication. This
3439 is done only on router, not on server, since server cannot know
3440 whether router will accept this mode change or not. XXX This
3441 probably shouldn't be done anymore at all, may cause problems in
3442 router-router connections too (maybe just AUTH_FAILED error should
3443 be returned). -Pekka */
3444 if (server->server_type == SILC_ROUTER) {
3445 silc_hash_table_list(channel->user_list, &htl);
3446 while (silc_hash_table_get(&htl, NULL, (void *)&chl2))
3447 if (chl2->mode & SILC_CHANNEL_UMODE_CHANFO) {
3448 chl2->mode &= ~SILC_CHANNEL_UMODE_CHANFO;
3449 silc_server_force_cumode_change(server, NULL, channel, chl2,
3453 silc_hash_table_list_reset(&htl);
3456 sender_mask = chl->mode |= SILC_CHANNEL_UMODE_CHANFO;
3459 if (chl->mode & SILC_CHANNEL_UMODE_CHANFO) {
3460 if (target_client == client) {
3461 /* Remove channel founder rights from itself */
3462 chl->mode &= ~SILC_CHANNEL_UMODE_CHANFO;
3465 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3466 SILC_STATUS_ERR_NOT_YOU, 0);
3472 if (target_mask & SILC_CHANNEL_UMODE_CHANOP) {
3473 /* Promote to operator */
3474 if (!(chl->mode & SILC_CHANNEL_UMODE_CHANOP)) {
3475 if (!(sender_mask & SILC_CHANNEL_UMODE_CHANOP) &&
3476 !(sender_mask & SILC_CHANNEL_UMODE_CHANFO)) {
3477 silc_server_command_send_status_data(cmd, SILC_COMMAND_CUMODE,
3478 SILC_STATUS_ERR_NO_CHANNEL_PRIV,
3479 0, 2, tmp_ch_id, tmp_ch_len);
3483 chl->mode |= SILC_CHANNEL_UMODE_CHANOP;
3487 if (chl->mode & SILC_CHANNEL_UMODE_CHANOP) {
3488 if (!(sender_mask & SILC_CHANNEL_UMODE_CHANOP) &&
3489 !(sender_mask & SILC_CHANNEL_UMODE_CHANFO)) {
3490 silc_server_command_send_status_data(cmd, SILC_COMMAND_CUMODE,
3491 SILC_STATUS_ERR_NO_CHANNEL_PRIV,
3492 0, 2, tmp_ch_id, tmp_ch_len);
3496 /* Demote to normal user */
3497 chl->mode &= ~SILC_CHANNEL_UMODE_CHANOP;
3502 if (target_mask & SILC_CHANNEL_UMODE_BLOCK_MESSAGES) {
3503 if (target_client != client) {
3504 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3505 SILC_STATUS_ERR_NOT_YOU, 0);
3509 if (!(chl->mode & SILC_CHANNEL_UMODE_BLOCK_MESSAGES)) {
3510 chl->mode |= SILC_CHANNEL_UMODE_BLOCK_MESSAGES;
3514 if (chl->mode & SILC_CHANNEL_UMODE_BLOCK_MESSAGES) {
3515 if (target_client != client) {
3516 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3517 SILC_STATUS_ERR_NOT_YOU, 0);
3521 chl->mode &= ~SILC_CHANNEL_UMODE_BLOCK_MESSAGES;
3526 if (target_mask & SILC_CHANNEL_UMODE_BLOCK_MESSAGES_USERS) {
3527 if (target_client != client) {
3528 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3529 SILC_STATUS_ERR_NOT_YOU, 0);
3533 if (!(chl->mode & SILC_CHANNEL_UMODE_BLOCK_MESSAGES_USERS)) {
3534 chl->mode |= SILC_CHANNEL_UMODE_BLOCK_MESSAGES_USERS;
3538 if (chl->mode & SILC_CHANNEL_UMODE_BLOCK_MESSAGES_USERS) {
3539 if (target_client != client) {
3540 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3541 SILC_STATUS_ERR_NOT_YOU, 0);
3545 chl->mode &= ~SILC_CHANNEL_UMODE_BLOCK_MESSAGES_USERS;
3550 if (target_mask & SILC_CHANNEL_UMODE_BLOCK_MESSAGES_ROBOTS) {
3551 if (target_client != client) {
3552 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3553 SILC_STATUS_ERR_NOT_YOU, 0);
3557 if (!(chl->mode & SILC_CHANNEL_UMODE_BLOCK_MESSAGES_ROBOTS)) {
3558 chl->mode |= SILC_CHANNEL_UMODE_BLOCK_MESSAGES_ROBOTS;
3562 if (chl->mode & SILC_CHANNEL_UMODE_BLOCK_MESSAGES_ROBOTS) {
3563 if (target_client != client) {
3564 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3565 SILC_STATUS_ERR_NOT_YOU, 0);
3569 chl->mode &= ~SILC_CHANNEL_UMODE_BLOCK_MESSAGES_ROBOTS;
3574 if (target_mask & SILC_CHANNEL_UMODE_QUIET) {
3575 if (!(chl->mode & SILC_CHANNEL_UMODE_QUIET)) {
3576 if (client == target_client) {
3577 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3578 SILC_STATUS_ERR_PERM_DENIED, 0);
3581 chl->mode |= SILC_CHANNEL_UMODE_QUIET;
3585 if (chl->mode & SILC_CHANNEL_UMODE_QUIET) {
3586 if (client == target_client) {
3587 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3588 SILC_STATUS_ERR_PERM_DENIED, 0);
3591 chl->mode &= ~SILC_CHANNEL_UMODE_QUIET;
3596 idp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
3597 tmp_id = silc_argument_get_arg_type(cmd->args, 3, &tmp_len);
3599 /* Send notify to channel, notify only if mode was actually changed. */
3601 silc_server_send_notify_to_channel(server, NULL, channel, FALSE, TRUE,
3602 SILC_NOTIFY_TYPE_CUMODE_CHANGE, 4,
3603 idp->data, idp->len,
3606 fkey ? fkey->data : NULL,
3607 fkey ? fkey->len : 0);
3609 /* Set CUMODE notify type to network */
3610 silc_server_send_notify_cumode(server, SILC_PRIMARY_ROUTE(server),
3611 SILC_BROADCAST(server), channel,
3612 target_mask, client->id, SILC_ID_CLIENT,
3613 target_client->id, founder_key);
3616 /* Send command reply to sender */
3617 packet = silc_command_reply_payload_encode_va(SILC_COMMAND_CUMODE,
3618 SILC_STATUS_OK, 0, ident, 3,
3620 3, tmp_ch_id, tmp_ch_len,
3621 4, tmp_id, tmp_len);
3622 silc_server_packet_send(server, cmd->sock, SILC_PACKET_COMMAND_REPLY, 0,
3623 packet->data, packet->len, FALSE);
3625 silc_buffer_free(packet);
3626 silc_buffer_free(idp);
3629 silc_free(channel_id);
3630 silc_free(client_id);
3631 silc_buffer_free(fkey);
3632 silc_server_command_free(cmd);
3635 /* Server side of KICK command. Kicks client out of channel. */
3637 SILC_SERVER_CMD_FUNC(kick)
3639 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
3640 SilcServer server = cmd->server;
3641 SilcClientEntry client = (SilcClientEntry)cmd->sock->user_data;
3642 SilcClientEntry target_client;
3643 SilcChannelID *channel_id;
3644 SilcClientID *client_id;
3645 SilcChannelEntry channel;
3646 SilcChannelClientEntry chl;
3647 SilcBuffer idp, packet;
3648 SilcUInt32 tmp_len, target_idp_len, clen;
3649 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
3650 unsigned char *tmp, *comment, *target_idp;
3655 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_LEAVE, cmd, 1, 3);
3657 /* Get Channel ID */
3658 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
3660 silc_server_command_send_status_reply(cmd, SILC_COMMAND_KICK,
3661 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
3664 channel_id = silc_id_payload_parse_id(tmp, tmp_len, NULL);
3666 silc_server_command_send_status_data(cmd, SILC_COMMAND_KICK,
3667 SILC_STATUS_ERR_BAD_CHANNEL_ID, 0,
3672 /* Get channel entry */
3673 channel = silc_idlist_find_channel_by_id(server->local_list,
3676 channel = silc_idlist_find_channel_by_id(server->local_list,
3679 silc_server_command_send_status_data(cmd, SILC_COMMAND_KICK,
3680 SILC_STATUS_ERR_NO_SUCH_CHANNEL_ID,
3681 0, 2, tmp, tmp_len);
3686 /* Check whether sender is on the channel */
3687 if (!silc_server_client_on_channel(client, channel, &chl)) {
3688 silc_server_command_send_status_data(cmd, SILC_COMMAND_KICK,
3689 SILC_STATUS_ERR_NOT_ON_CHANNEL,
3690 0, 2, tmp, tmp_len);
3694 /* Check that the kicker is channel operator or channel founder */
3695 if (!(chl->mode & SILC_CHANNEL_UMODE_CHANOP) &&
3696 !(chl->mode & SILC_CHANNEL_UMODE_CHANFO)) {
3697 silc_server_command_send_status_data(cmd, SILC_COMMAND_KICK,
3698 SILC_STATUS_ERR_NO_CHANNEL_PRIV,
3699 0, 2, tmp, tmp_len);
3703 /* Get target Client ID */
3704 target_idp = silc_argument_get_arg_type(cmd->args, 2, &target_idp_len);
3706 silc_server_command_send_status_reply(cmd, SILC_COMMAND_KICK,
3707 SILC_STATUS_ERR_NO_CLIENT_ID, 0);
3710 client_id = silc_id_payload_parse_id(target_idp, target_idp_len, NULL);
3712 silc_server_command_send_status_data(cmd, SILC_COMMAND_KICK,
3713 SILC_STATUS_ERR_BAD_CLIENT_ID,
3714 0, 2, target_idp, target_idp_len);
3718 /* Get target client's entry */
3719 target_client = silc_idlist_find_client_by_id(server->local_list,
3720 client_id, TRUE, NULL);
3721 if (!target_client) {
3722 target_client = silc_idlist_find_client_by_id(server->global_list,
3723 client_id, TRUE, NULL);
3726 /* Check whether target client is on the channel */
3727 if (!silc_server_client_on_channel(target_client, channel, &chl)) {
3728 silc_server_command_send_status_data2(cmd, SILC_COMMAND_KICK,
3729 SILC_STATUS_ERR_USER_NOT_ON_CHANNEL,
3730 0, 2, target_idp, target_idp_len,
3735 /* Check that the target client is not channel founder. Channel founder
3736 cannot be kicked from the channel. */
3737 if (chl->mode & SILC_CHANNEL_UMODE_CHANFO) {
3738 silc_server_command_send_status_data(cmd, SILC_COMMAND_KICK,
3739 SILC_STATUS_ERR_NO_CHANNEL_FOPRIV,
3740 0, 2, tmp, tmp_len);
3745 comment = silc_argument_get_arg_type(cmd->args, 3, &clen);
3750 /* Send the reply back to the client */
3752 silc_command_reply_payload_encode_va(SILC_COMMAND_KICK,
3753 SILC_STATUS_OK, 0, ident, 2,
3755 3, target_idp, target_idp_len);
3756 silc_server_packet_send(server, cmd->sock, SILC_PACKET_COMMAND_REPLY, 0,
3757 packet->data, packet->len, FALSE);
3758 silc_buffer_free(packet);
3760 /* Send KICKED notify to local clients on the channel */
3761 idp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
3762 silc_server_send_notify_to_channel(server, NULL, channel, FALSE, TRUE,
3763 SILC_NOTIFY_TYPE_KICKED, 3,
3764 target_idp, target_idp_len,
3765 comment, comment ? strlen(comment) : 0,
3766 idp->data, idp->len);
3767 silc_buffer_free(idp);
3769 /* Send KICKED notify to primary route */
3770 silc_server_send_notify_kicked(server, SILC_PRIMARY_ROUTE(server),
3771 SILC_BROADCAST(server), channel,
3772 target_client->id, client->id, comment);
3774 /* Remove the client from channel's invite list */
3775 if (channel->invite_list && silc_hash_table_count(channel->invite_list)) {
3777 silc_argument_payload_encode_one(NULL, target_idp, target_idp_len, 3);
3778 SilcArgumentPayload args =
3779 silc_argument_payload_parse(ab->data, ab->len, 1);
3780 silc_server_inviteban_process(server, channel->invite_list, 1, args);
3781 silc_buffer_free(ab);
3782 silc_argument_payload_free(args);
3785 /* Remove the client from the channel. If the channel does not exist
3786 after removing the client then the client kicked itself off the channel
3787 and we don't have to send anything after that. */
3788 if (!silc_server_remove_from_one_channel(server, NULL, channel,
3789 target_client, FALSE))
3792 if (!(channel->mode & SILC_CHANNEL_MODE_PRIVKEY)) {
3793 /* Re-generate channel key */
3794 if (!silc_server_create_channel_key(server, channel, 0))
3797 /* Send the channel key to the channel. The key of course is not sent
3798 to the client who was kicked off the channel. */
3799 silc_server_send_channel_key(server, target_client->connection, channel,
3800 server->server_type == SILC_ROUTER ?
3801 FALSE : !server->standalone);
3805 silc_server_command_free(cmd);
3808 /* Server side of OPER command. Client uses this comand to obtain server
3809 operator privileges to this server/router. */
3811 SILC_SERVER_CMD_FUNC(oper)
3813 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
3814 SilcServer server = cmd->server;
3815 SilcClientEntry client = (SilcClientEntry)cmd->sock->user_data;
3816 unsigned char *username, *auth;
3818 SilcServerConfigAdmin *admin;
3819 SilcIDListData idata = (SilcIDListData)client;
3820 bool result = FALSE;
3821 SilcPublicKey cached_key;
3823 if (cmd->sock->type != SILC_SOCKET_TYPE_CLIENT || !client)
3826 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_OPER, cmd, 1, 2);
3828 /* Get the username */
3829 username = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
3831 silc_server_command_send_status_reply(cmd, SILC_COMMAND_OPER,
3832 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
3837 /* Get the admin configuration */
3838 admin = silc_server_config_find_admin(server, cmd->sock->ip,
3839 username, client->nickname);
3841 admin = silc_server_config_find_admin(server, cmd->sock->hostname,
3842 username, client->nickname);
3844 silc_server_command_send_status_reply(cmd, SILC_COMMAND_OPER,
3845 SILC_STATUS_ERR_AUTH_FAILED,
3847 SILC_LOG_INFO(("OPER authentication failed for username '%s' by "
3848 "nickname '%s' from %s", username,
3849 client->nickname, cmd->sock->hostname));
3854 /* Get the authentication payload */
3855 auth = silc_argument_get_arg_type(cmd->args, 2, &tmp_len);
3857 silc_server_command_send_status_reply(cmd, SILC_COMMAND_OPER,
3858 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
3863 /* Verify the authentication data. If both passphrase and public key
3864 is set then try both of them. */
3865 if (admin->passphrase)
3866 result = silc_auth_verify_data(auth, tmp_len, SILC_AUTH_PASSWORD,
3867 admin->passphrase, admin->passphrase_len,
3868 idata->hash, client->id, SILC_ID_CLIENT);
3869 if (!result && admin->publickeys) {
3870 cached_key = silc_server_get_public_key(server, admin->publickeys);
3873 result = silc_auth_verify_data(auth, tmp_len, SILC_AUTH_PUBLIC_KEY,
3874 cached_key, 0, idata->hash,
3875 client->id, SILC_ID_CLIENT);
3878 /* Authentication failed */
3879 silc_server_command_send_status_reply(cmd, SILC_COMMAND_OPER,
3880 SILC_STATUS_ERR_AUTH_FAILED,
3885 /* Client is now server operator */
3886 client->mode |= SILC_UMODE_SERVER_OPERATOR;
3888 /* Update statistics */
3889 if (SILC_IS_LOCAL(client))
3890 server->stat.my_server_ops++;
3891 if (server->server_type == SILC_ROUTER)
3892 server->stat.server_ops++;
3894 /* Send UMODE change to primary router */
3895 silc_server_send_notify_umode(server, SILC_PRIMARY_ROUTE(server),
3896 SILC_BROADCAST(server), client->id,
3899 /* Check if anyone is watching this nickname */
3900 if (server->server_type == SILC_ROUTER)
3901 silc_server_check_watcher_list(server, client, NULL,
3902 SILC_NOTIFY_TYPE_UMODE_CHANGE);
3904 /* Send reply to the sender */
3905 silc_server_command_send_status_reply(cmd, SILC_COMMAND_OPER,
3909 silc_server_command_free(cmd);
3912 SILC_TASK_CALLBACK(silc_server_command_detach_cb)
3914 SilcServer server = app_context;
3915 QuitInternal q = (QuitInternal)context;
3916 SilcClientID *client_id = (SilcClientID *)q->sock;
3917 SilcClientEntry client;
3918 SilcSocketConnection sock;
3920 client = silc_idlist_find_client_by_id(server->local_list, client_id,
3922 if (client && client->connection) {
3923 sock = client->connection;
3925 /* If there is pending outgoing data for the client then purge it
3926 to the network before closing connection. */
3927 silc_server_packet_queue_purge(server, sock);
3929 /* Close the connection on our side */
3930 client->router = NULL;
3931 client->connection = NULL;
3932 sock->user_data = NULL;
3933 silc_server_close_connection(server, sock);
3936 silc_free(client_id);
3940 SILC_TASK_CALLBACK(silc_server_command_detach_timeout)
3942 SilcServer server = app_context;
3943 QuitInternal q = (QuitInternal)context;
3944 SilcClientID *client_id = (SilcClientID *)q->sock;
3945 SilcClientEntry client;
3947 client = silc_idlist_find_client_by_id(server->local_list, client_id,
3949 if (client && client->mode & SILC_UMODE_DETACHED) {
3950 SILC_LOG_DEBUG(("Detach timeout"));
3951 silc_server_free_client_data(server, NULL, client, TRUE,
3955 silc_free(client_id);
3959 /* Server side of DETACH command. Detached the client from the network
3960 by closing the connection but preserving the session. */
3962 SILC_SERVER_CMD_FUNC(detach)
3964 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
3965 SilcServer server = cmd->server;
3966 SilcClientEntry client = (SilcClientEntry)cmd->sock->user_data;
3969 if (server->config->detach_disabled) {
3970 silc_server_command_send_status_reply(cmd, SILC_COMMAND_DETACH,
3971 SILC_STATUS_ERR_OPERATION_ALLOWED,
3976 if (cmd->sock->type != SILC_SOCKET_TYPE_CLIENT || !client)
3979 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_DETACH, cmd, 0, 0);
3981 /* Remove operator privileges, since the client may resume in some
3982 other server which to it does not have operator privileges. */
3983 SILC_OPER_STATS_UPDATE(client, server, SILC_UMODE_SERVER_OPERATOR);
3984 SILC_OPER_STATS_UPDATE(client, router, SILC_UMODE_ROUTER_OPERATOR);
3986 /* Send the user mode notify to notify that client is detached */
3987 client->mode |= SILC_UMODE_DETACHED;
3988 client->data.status &= ~SILC_IDLIST_STATUS_RESUMED;
3989 client->data.status &= ~SILC_IDLIST_STATUS_NOATTR;
3990 client->last_command = 0;
3991 client->fast_command = 0;
3992 silc_server_send_notify_umode(server, SILC_PRIMARY_ROUTE(server),
3993 SILC_BROADCAST(server), client->id,
3995 server->stat.my_detached++;
3997 /* Check if anyone is watching this nickname */
3998 if (server->server_type == SILC_ROUTER)
3999 silc_server_check_watcher_list(server, client, NULL,
4000 SILC_NOTIFY_TYPE_UMODE_CHANGE);
4002 q = silc_calloc(1, sizeof(*q));
4003 q->sock = silc_id_dup(client->id, SILC_ID_CLIENT);
4004 silc_schedule_task_add(server->schedule, 0, silc_server_command_detach_cb,
4005 q, 0, 200000, SILC_TASK_TIMEOUT, SILC_TASK_PRI_LOW);
4007 if (server->config->detach_timeout) {
4008 q = silc_calloc(1, sizeof(*q));
4009 q->sock = silc_id_dup(client->id, SILC_ID_CLIENT);
4010 silc_schedule_task_add(server->schedule, 0,
4011 silc_server_command_detach_timeout,
4012 q, server->config->detach_timeout * 60,
4013 0, SILC_TASK_TIMEOUT, SILC_TASK_PRI_LOW);
4016 /* Send reply to the sender */
4017 silc_server_command_send_status_reply(cmd, SILC_COMMAND_DETACH,
4021 silc_server_command_free(cmd);
4024 /* Server side of WATCH command. */
4026 SILC_SERVER_CMD_FUNC(watch)
4028 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
4029 SilcServer server = cmd->server;
4030 char *add_nick, *del_nick;
4031 SilcUInt32 add_nick_len, del_nick_len, tmp_len, pk_len;
4033 unsigned char hash[16], *tmp, *pk;
4034 SilcClientEntry client;
4035 SilcClientID *client_id = NULL;
4037 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_WATCH, cmd, 1, 3);
4039 if (server->server_type != SILC_ROUTER && !server->standalone) {
4040 if (!cmd->pending) {
4041 /* Send the command to router */
4043 SilcUInt16 old_ident;
4045 SILC_LOG_DEBUG(("Forwarding WATCH to router"));
4047 old_ident = silc_command_get_ident(cmd->payload);
4048 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
4049 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
4051 silc_server_packet_send(server, SILC_PRIMARY_ROUTE(server),
4052 SILC_PACKET_COMMAND, cmd->packet->flags,
4053 tmpbuf->data, tmpbuf->len, TRUE);
4055 /* Reprocess this packet after received reply from router */
4056 silc_server_command_pending(server, SILC_COMMAND_WATCH,
4057 silc_command_get_ident(cmd->payload),
4058 silc_server_command_watch,
4059 silc_server_command_dup(cmd));
4060 cmd->pending = TRUE;
4061 silc_command_set_ident(cmd->payload, old_ident);
4062 silc_buffer_free(tmpbuf);
4063 } else if (context2) {
4064 /* Received reply from router, just send same data to the client. */
4065 SilcServerCommandReplyContext reply = context2;
4068 SILC_LOG_DEBUG(("Received reply to WATCH from router"));
4069 silc_command_get_status(reply->payload, &status, NULL);
4070 silc_server_command_send_status_reply(cmd, SILC_COMMAND_WATCH, status,
4077 /* We are router and keep the watch list for local cell */
4079 /* Get the client ID */
4080 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
4082 silc_server_command_send_status_reply(cmd, SILC_COMMAND_WATCH,
4083 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
4087 client_id = silc_id_payload_parse_id(tmp, tmp_len, NULL);
4089 silc_server_command_send_status_data(cmd, SILC_COMMAND_WATCH,
4090 SILC_STATUS_ERR_NO_SUCH_CLIENT_ID,
4091 0, 2, tmp, tmp_len);
4095 /* Get the client entry which must be in local list */
4096 client = silc_idlist_find_client_by_id(server->local_list,
4097 client_id, TRUE, NULL);
4099 silc_server_command_send_status_data(cmd, SILC_COMMAND_WATCH,
4100 SILC_STATUS_ERR_NO_SUCH_CLIENT_ID, 0,
4105 /* Take public key for watching by public key */
4106 pk = silc_argument_get_arg_type(cmd->args, 4, &pk_len);
4109 add_nick = silc_argument_get_arg_type(cmd->args, 2, &add_nick_len);
4110 del_nick = silc_argument_get_arg_type(cmd->args, 3, &del_nick_len);
4111 if (!add_nick && !del_nick && !pk) {
4112 silc_server_command_send_status_reply(cmd, SILC_COMMAND_WATCH,
4113 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
4118 if (add_nick && add_nick_len > 128)
4119 add_nick[128] = '\0';
4120 if (del_nick && del_nick_len > 128)
4121 del_nick[128] = '\0';
4123 memset(nick, 0, sizeof(nick));
4125 /* Add new nickname to be watched in our cell */
4127 if (silc_server_name_bad_chars(add_nick, strlen(add_nick)) == TRUE) {
4128 silc_server_command_send_status_reply(cmd, SILC_COMMAND_WATCH,
4129 SILC_STATUS_ERR_BAD_NICKNAME, 0);
4133 /* Hash the nick, we have the hash saved, not nicks because we can
4134 do one to one mapping to the nick from Client ID hash this way. */
4135 silc_to_lower(add_nick, nick, sizeof(nick) - 1);
4136 silc_hash_make(server->md5hash, nick, strlen(nick), hash);
4138 /* Check whether this client is already watching this nickname */
4139 if (silc_hash_table_find_by_context(server->watcher_list, hash,
4141 /* Nickname is alredy being watched for this client */
4142 silc_server_command_send_status_reply(cmd, SILC_COMMAND_WATCH,
4143 SILC_STATUS_ERR_NICKNAME_IN_USE,
4148 /* Get the nickname from the watcher list and use the same key in
4149 new entries as well. If key doesn't exist then create it. */
4150 if (!silc_hash_table_find(server->watcher_list, hash, (void *)&tmp, NULL))
4151 tmp = silc_memdup(hash, CLIENTID_HASH_LEN);
4153 /* Add the client to the watcher list with the specified nickname hash. */
4154 silc_hash_table_add(server->watcher_list, tmp, client);
4157 /* Delete nickname from watch list */
4159 if (silc_server_name_bad_chars(del_nick, strlen(del_nick)) == TRUE) {
4160 silc_server_command_send_status_reply(cmd, SILC_COMMAND_WATCH,
4161 SILC_STATUS_ERR_BAD_NICKNAME, 0);
4165 /* Hash the nick, we have the hash saved, not nicks because we can
4166 do one to one mapping to the nick from Client ID hash this way. */
4167 silc_to_lower(del_nick, nick, sizeof(nick) - 1);
4168 silc_hash_make(server->md5hash, nick, strlen(nick), hash);
4170 /* Check that this client is watching for this nickname */
4171 if (!silc_hash_table_find_by_context(server->watcher_list, hash,
4172 client, (void *)&tmp)) {
4173 /* Nickname is alredy being watched for this client */
4174 silc_server_command_send_status_data(cmd, SILC_COMMAND_WATCH,
4175 SILC_STATUS_ERR_NO_SUCH_NICK, 0,
4176 2, nick, strlen(nick));
4180 /* Delete the nickname from the watcher list. */
4181 silc_hash_table_del_by_context(server->watcher_list, hash, client);
4183 /* Now check whether there still exists entries with this key, if not
4184 then free the key to not leak memory. */
4185 if (!silc_hash_table_find(server->watcher_list, hash, NULL, NULL))
4189 /* Add/del public key */
4192 SilcArgumentPayload pkargs;
4194 SilcPublicKey public_key, pkkey;
4197 silc_server_command_send_status_reply(cmd, SILC_COMMAND_WATCH,
4198 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
4203 /* Get the argument from the Argument List Payload */
4204 SILC_GET16_MSB(pkargc, pk);
4205 pkargs = silc_argument_payload_parse(pk + 2, pk_len - 2, pkargc);
4207 silc_server_command_send_status_reply(cmd, SILC_COMMAND_WATCH,
4208 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
4213 pk = silc_argument_get_next_arg(pkargs, &type, &pk_len);
4215 if (!silc_pkcs_public_key_payload_decode(pk, pk_len, &public_key))
4221 /* Add public key to watch list */
4223 /* Check whether this client is already watching this public key */
4224 if (silc_hash_table_find_by_context(server->watcher_list_pk,
4225 public_key, client, NULL)) {
4226 silc_pkcs_public_key_free(public_key);
4227 silc_server_command_send_status_reply(
4228 cmd, SILC_COMMAND_WATCH,
4229 SILC_STATUS_ERR_NICKNAME_IN_USE, 0);
4233 /* Get the public key from the watcher list and use the same key in
4234 new entries as well. If key doesn't exist then create it. */
4236 if (!silc_hash_table_find(server->watcher_list_pk, public_key,
4237 (void *)&pkkey, NULL))
4240 silc_pkcs_public_key_free(public_key);
4242 /* Add the client to the watcher list with the specified public
4244 silc_hash_table_add(server->watcher_list_pk, pkkey, client);
4246 } else if (type == 0x01) {
4247 /* Delete public key from watch list */
4249 /* Check that this client is watching this public key */
4250 if (silc_hash_table_find_by_context(server->watcher_list_pk,
4253 silc_pkcs_public_key_free(public_key);
4254 silc_server_command_send_status_reply(
4255 cmd, SILC_COMMAND_WATCH,
4256 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS, 0);
4260 /* Delete the public key from the watcher list. */
4261 silc_hash_table_del_by_context(server->watcher_list_pk,
4262 public_key, client);
4264 /* Now check whether there still exists entries with this key, if
4265 not then free the key to not leak memory. */
4266 if (!silc_hash_table_find(server->watcher_list_pk, hash, NULL, NULL))
4267 silc_pkcs_public_key_free(pkkey);
4268 silc_pkcs_public_key_free(public_key);
4271 pk = silc_argument_get_next_arg(pkargs, &type, &pk_len);
4275 /* Distribute the watch list to backup routers too */
4276 if (server->backup) {
4278 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
4279 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
4280 silc_server_backup_send(server, NULL, SILC_PACKET_COMMAND,
4281 cmd->packet->flags, tmpbuf->data, tmpbuf->len,
4283 silc_buffer_free(tmpbuf);
4286 silc_server_command_send_status_reply(cmd, SILC_COMMAND_WATCH,
4290 silc_free(client_id);
4291 silc_server_command_free(cmd);
4294 /* Server side of SILCOPER command. Client uses this comand to obtain router
4295 operator privileges to this router. */
4297 SILC_SERVER_CMD_FUNC(silcoper)
4299 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
4300 SilcServer server = cmd->server;
4301 SilcClientEntry client = (SilcClientEntry)cmd->sock->user_data;
4302 unsigned char *username, *auth;
4304 SilcServerConfigAdmin *admin;
4305 SilcIDListData idata = (SilcIDListData)client;
4306 bool result = FALSE;
4307 SilcPublicKey cached_key;
4309 if (cmd->sock->type != SILC_SOCKET_TYPE_CLIENT || !client)
4312 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_SILCOPER, cmd, 1, 2);
4314 if (server->server_type != SILC_ROUTER) {
4315 silc_server_command_send_status_reply(cmd, SILC_COMMAND_SILCOPER,
4316 SILC_STATUS_ERR_AUTH_FAILED, 0);
4320 /* Get the username */
4321 username = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
4323 silc_server_command_send_status_reply(cmd, SILC_COMMAND_SILCOPER,
4324 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
4329 /* Get the admin configuration */
4330 admin = silc_server_config_find_admin(server, cmd->sock->ip,
4331 username, client->nickname);
4333 admin = silc_server_config_find_admin(server, cmd->sock->hostname,
4334 username, client->nickname);
4336 silc_server_command_send_status_reply(cmd, SILC_COMMAND_SILCOPER,
4337 SILC_STATUS_ERR_AUTH_FAILED, 0);
4338 SILC_LOG_INFO(("SILCOPER authentication failed for username '%s' by "
4339 "nickname '%s' from %s", username,
4340 client->nickname, cmd->sock->hostname));
4345 /* Get the authentication payload */
4346 auth = silc_argument_get_arg_type(cmd->args, 2, &tmp_len);
4348 silc_server_command_send_status_reply(cmd, SILC_COMMAND_SILCOPER,
4349 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
4354 /* Verify the authentication data. If both passphrase and public key
4355 is set then try both of them. */
4356 if (admin->passphrase)
4357 result = silc_auth_verify_data(auth, tmp_len, SILC_AUTH_PASSWORD,
4358 admin->passphrase, admin->passphrase_len,
4359 idata->hash, client->id, SILC_ID_CLIENT);
4360 if (!result && admin->publickeys) {
4361 cached_key = silc_server_get_public_key(server, admin->publickeys);
4364 result = silc_auth_verify_data(auth, tmp_len, SILC_AUTH_PUBLIC_KEY,
4365 cached_key, 0, idata->hash,
4366 client->id, SILC_ID_CLIENT);
4369 /* Authentication failed */
4370 silc_server_command_send_status_reply(cmd, SILC_COMMAND_OPER,
4371 SILC_STATUS_ERR_AUTH_FAILED, 0);
4375 /* Client is now router operator */
4376 client->mode |= SILC_UMODE_ROUTER_OPERATOR;
4378 /* Update statistics */
4379 if (SILC_IS_LOCAL(client))
4380 server->stat.my_router_ops++;
4381 if (server->server_type == SILC_ROUTER)
4382 server->stat.router_ops++;
4384 /* Send UMODE change to primary router */
4385 silc_server_send_notify_umode(server, SILC_PRIMARY_ROUTE(server),
4386 SILC_BROADCAST(server), client->id,
4389 /* Check if anyone is watching this nickname */
4390 if (server->server_type == SILC_ROUTER)
4391 silc_server_check_watcher_list(server, client, NULL,
4392 SILC_NOTIFY_TYPE_UMODE_CHANGE);
4394 /* Send reply to the sender */
4395 silc_server_command_send_status_reply(cmd, SILC_COMMAND_SILCOPER,
4399 silc_server_command_free(cmd);
4402 /* Server side of command BAN. This is used to manage the ban list of the
4403 channel. To add clients and remove clients from the ban list. */
4405 SILC_SERVER_CMD_FUNC(ban)
4407 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
4408 SilcServer server = cmd->server;
4409 SilcClientEntry client = (SilcClientEntry)cmd->sock->user_data;
4410 SilcBuffer packet, list, tmp2;
4411 SilcChannelEntry channel;
4412 SilcChannelClientEntry chl;
4413 SilcChannelID *channel_id = NULL;
4414 unsigned char *id, *tmp, *atype = NULL;
4415 SilcUInt32 id_len, len, len2;
4416 SilcArgumentPayload args;
4417 SilcHashTableList htl;
4419 SilcUInt16 argc = 0, ident = silc_command_get_ident(cmd->payload);
4420 SilcBufferStruct blist;
4422 if (cmd->sock->type != SILC_SOCKET_TYPE_CLIENT || !client)
4425 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_BAN, cmd, 0, 3);
4427 /* Get Channel ID */
4428 id = silc_argument_get_arg_type(cmd->args, 1, &id_len);
4430 channel_id = silc_id_payload_parse_id(id, id_len, NULL);
4432 silc_server_command_send_status_reply(cmd, SILC_COMMAND_BAN,
4433 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
4438 /* Get channel entry. The server must know about the channel since the
4439 client is expected to be on the channel. */
4440 channel = silc_idlist_find_channel_by_id(server->local_list,
4443 channel = silc_idlist_find_channel_by_id(server->global_list,
4446 silc_server_command_send_status_data(cmd, SILC_COMMAND_BAN,
4447 SILC_STATUS_ERR_NO_SUCH_CHANNEL_ID,
4453 /* Check whether this client is on the channel */
4454 if (!silc_server_client_on_channel(client, channel, &chl)) {
4455 silc_server_command_send_status_data(cmd, SILC_COMMAND_BAN,
4456 SILC_STATUS_ERR_NOT_ON_CHANNEL, 0,
4461 /* The client must be at least channel operator. */
4462 if (!(chl->mode & SILC_CHANNEL_UMODE_CHANOP)) {
4463 silc_server_command_send_status_data(cmd, SILC_COMMAND_BAN,
4464 SILC_STATUS_ERR_NO_CHANNEL_PRIV, 0,
4469 /* Get the ban information */
4470 tmp = silc_argument_get_arg_type(cmd->args, 3, &len2);
4471 if (tmp && len2 > 2) {
4472 /* Parse the arguments to see they are constructed correctly */
4473 SILC_GET16_MSB(argc, tmp);
4474 args = silc_argument_payload_parse(tmp + 2, len2 - 2, argc);
4476 silc_server_command_send_status_reply(cmd, SILC_COMMAND_BAN,
4477 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
4482 /* Get the type of action */
4483 atype = silc_argument_get_arg_type(cmd->args, 2, &len);
4484 if (atype && len == 1) {
4485 if (atype[0] == 0x00) {
4486 /* Allocate hash table for ban list if it doesn't exist yet */
4487 if (!channel->ban_list)
4489 silc_hash_table_alloc(0, silc_hash_ptr,
4491 silc_server_inviteban_destruct, channel,
4494 /* Check for resource limit */
4495 if (silc_hash_table_count(channel->ban_list) > 64) {
4496 silc_server_command_send_status_reply(cmd, SILC_COMMAND_BAN,
4497 SILC_STATUS_ERR_RESOURCE_LIMIT,
4503 /* Now add or delete the information. */
4504 silc_server_inviteban_process(server, channel->ban_list,
4505 (SilcUInt8)atype[0], args);
4507 silc_argument_payload_free(args);
4510 /* Encode ban list */
4512 if (channel->ban_list && silc_hash_table_count(channel->ban_list)) {
4513 list = silc_buffer_alloc_size(2);
4514 silc_buffer_format(list,
4515 SILC_STR_UI_SHORT(silc_hash_table_count(
4516 channel->ban_list)),
4518 silc_hash_table_list(channel->ban_list, &htl);
4519 while (silc_hash_table_get(&htl, (void *)&type, (void *)&tmp2))
4520 list = silc_argument_payload_encode_one(list, tmp2->data, tmp2->len,
4522 silc_hash_table_list_reset(&htl);
4525 /* Send BAN notify type to local servers (but not clients) and to
4527 if (atype && tmp && len2) {
4528 silc_buffer_set(&blist, tmp, len2);
4530 /* Send to local servers if we are router */
4531 if (server->server_type == SILC_ROUTER)
4532 silc_server_send_notify_to_channel(server, NULL, channel, FALSE, FALSE,
4533 SILC_NOTIFY_TYPE_BAN, 3,
4536 tmp ? blist.data : NULL,
4537 tmp ? blist.len : 0);
4539 /* Send to network. */
4540 silc_server_send_notify_ban(server, SILC_PRIMARY_ROUTE(server),
4541 SILC_BROADCAST(server), channel, atype,
4545 /* Send the reply back to the client */
4547 silc_command_reply_payload_encode_va(SILC_COMMAND_BAN,
4548 SILC_STATUS_OK, 0, ident, 2,
4550 3, list ? list->data : NULL,
4551 list ? list->len : 0);
4552 silc_server_packet_send(server, cmd->sock, SILC_PACKET_COMMAND_REPLY, 0,
4553 packet->data, packet->len, FALSE);
4555 silc_buffer_free(packet);
4556 silc_buffer_free(list);
4559 silc_free(channel_id);
4560 silc_server_command_free(cmd);
4563 /* Server side command of LEAVE. Removes client from a channel. */
4565 SILC_SERVER_CMD_FUNC(leave)
4567 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
4568 SilcServer server = cmd->server;
4569 SilcSocketConnection sock = cmd->sock;
4570 SilcClientEntry id_entry = (SilcClientEntry)cmd->sock->user_data;
4571 SilcChannelID *id = NULL;
4572 SilcChannelEntry channel;
4576 if (cmd->sock->type != SILC_SOCKET_TYPE_CLIENT || !id_entry)
4579 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_LEAVE, cmd, 1, 2);
4581 /* Get Channel ID */
4582 tmp = silc_argument_get_arg_type(cmd->args, 1, &len);
4584 silc_server_command_send_status_reply(cmd, SILC_COMMAND_LEAVE,
4585 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
4588 id = silc_id_payload_parse_id(tmp, len, NULL);
4590 silc_server_command_send_status_reply(cmd, SILC_COMMAND_LEAVE,
4591 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
4595 /* Get channel entry */
4596 channel = silc_idlist_find_channel_by_id(server->local_list, id, NULL);
4598 channel = silc_idlist_find_channel_by_id(server->global_list, id, NULL);
4600 silc_server_command_send_status_data(cmd, SILC_COMMAND_LEAVE,
4601 SILC_STATUS_ERR_NO_SUCH_CHANNEL_ID,
4607 /* Check whether this client is on the channel */
4608 if (!silc_server_client_on_channel(id_entry, channel, NULL)) {
4609 silc_server_command_send_status_data(cmd, SILC_COMMAND_LEAVE,
4610 SILC_STATUS_ERR_NOT_ON_CHANNEL, 0,
4615 /* Notify routers that they should remove this client from their list
4616 of clients on the channel. Send LEAVE notify type. */
4617 silc_server_send_notify_leave(server, SILC_PRIMARY_ROUTE(server),
4618 SILC_BROADCAST(server), channel, id_entry->id);
4620 silc_server_command_send_status_data(cmd, SILC_COMMAND_LEAVE,
4621 SILC_STATUS_OK, 0, 2, tmp, len);
4623 /* Remove client from channel */
4624 if (!silc_server_remove_from_one_channel(server, sock, channel, id_entry,
4626 /* If the channel does not exist anymore we won't send anything */
4629 if (!(channel->mode & SILC_CHANNEL_MODE_PRIVKEY)) {
4630 /* Re-generate channel key */
4631 if (!silc_server_create_channel_key(server, channel, 0))
4634 /* Send the channel key */
4635 silc_server_send_channel_key(server, NULL, channel,
4636 server->server_type == SILC_ROUTER ?
4637 FALSE : !server->standalone);
4642 silc_server_command_free(cmd);
4645 /* Server side of command USERS. Resolves clients and their USERS currently
4646 joined on the requested channel. The list of Client ID's and their modes
4647 on the channel is sent back. */
4649 SILC_SERVER_CMD_FUNC(users)
4651 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
4652 SilcServer server = cmd->server;
4653 SilcChannelEntry channel;
4654 SilcChannelID *id = NULL;
4655 SilcBuffer packet, idp;
4656 unsigned char *channel_id;
4657 SilcUInt32 channel_id_len;
4658 SilcBuffer client_id_list;
4659 SilcBuffer client_mode_list;
4660 unsigned char lc[4];
4661 SilcUInt32 list_count = 0;
4662 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
4665 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_USERS, cmd, 1, 2);
4667 /* Get Channel ID */
4668 channel_id = silc_argument_get_arg_type(cmd->args, 1, &channel_id_len);
4670 /* Get channel name */
4671 channel_name = silc_argument_get_arg_type(cmd->args, 2, NULL);
4673 if (!channel_id && !channel_name) {
4674 silc_server_command_send_status_reply(cmd, SILC_COMMAND_USERS,
4675 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
4680 id = silc_id_payload_parse_id(channel_id, channel_id_len, NULL);
4682 silc_server_command_send_status_data(cmd, SILC_COMMAND_USERS,
4683 SILC_STATUS_ERR_BAD_CHANNEL_ID, 0,
4684 2, channel_id, channel_id_len);
4689 /* If we are server and we don't know about this channel we will send
4690 the command to our router. If we know about the channel then we also
4691 have the list of users already. */
4693 channel = silc_idlist_find_channel_by_id(server->local_list, id, NULL);
4695 channel = silc_idlist_find_channel_by_name(server->local_list,
4696 channel_name, NULL);
4698 if (!channel || (!server->standalone && (channel->disabled ||
4699 !channel->users_resolved))) {
4700 if (server->server_type != SILC_ROUTER && !server->standalone &&
4704 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
4705 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
4707 /* Send USERS command */
4708 silc_server_packet_send(server, SILC_PRIMARY_ROUTE(server),
4709 SILC_PACKET_COMMAND, cmd->packet->flags,
4710 tmpbuf->data, tmpbuf->len, TRUE);
4712 /* Reprocess this packet after received reply */
4713 silc_server_command_pending(server, SILC_COMMAND_USERS,
4714 silc_command_get_ident(cmd->payload),
4715 silc_server_command_users,
4716 silc_server_command_dup(cmd));
4717 cmd->pending = TRUE;
4718 silc_command_set_ident(cmd->payload, ident);
4719 silc_buffer_free(tmpbuf);
4724 /* Check the global list as well. */
4726 channel = silc_idlist_find_channel_by_id(server->global_list, id, NULL);
4728 channel = silc_idlist_find_channel_by_name(server->global_list,
4729 channel_name, NULL);
4731 /* Channel really does not exist */
4733 silc_server_command_send_status_data(
4734 cmd, SILC_COMMAND_USERS,
4735 SILC_STATUS_ERR_NO_SUCH_CHANNEL_ID, 0,
4736 2, channel_id, channel_id_len);
4738 silc_server_command_send_status_data(
4739 cmd, SILC_COMMAND_USERS,
4740 SILC_STATUS_ERR_NO_SUCH_CHANNEL, 0,
4741 2, channel_name, strlen(channel_name));
4746 /* If the channel is private or secret do not send anything, unless the
4747 user requesting this command is on the channel or is server */
4748 if (cmd->sock->type == SILC_SOCKET_TYPE_CLIENT) {
4749 if (channel->mode & (SILC_CHANNEL_MODE_PRIVATE | SILC_CHANNEL_MODE_SECRET)
4750 && !silc_server_client_on_channel(cmd->sock->user_data, channel,
4752 silc_server_command_send_status_data(cmd, SILC_COMMAND_USERS,
4753 SILC_STATUS_ERR_NO_SUCH_CHANNEL, 0,
4754 2, channel->channel_name,
4755 strlen(channel->channel_name));
4760 /* Get the users list */
4761 if (!silc_server_get_users_on_channel(server, channel, &client_id_list,
4762 &client_mode_list, &list_count)) {
4764 client_id_list = NULL;
4765 client_mode_list = NULL;
4769 SILC_PUT32_MSB(list_count, lc);
4772 idp = silc_id_payload_encode(channel->id, SILC_ID_CHANNEL);
4773 packet = silc_command_reply_payload_encode_va(SILC_COMMAND_USERS,
4774 SILC_STATUS_OK, 0, ident, 4,
4775 2, idp->data, idp->len,
4778 client_id_list->data : NULL,
4780 client_id_list->len : 0,
4781 5, client_mode_list ?
4782 client_mode_list->data : NULL,
4784 client_mode_list->len : 0);
4785 silc_server_packet_send(server, cmd->sock, SILC_PACKET_COMMAND_REPLY, 0,
4786 packet->data, packet->len, FALSE);
4788 silc_buffer_free(idp);
4789 silc_buffer_free(packet);
4791 silc_buffer_free(client_id_list);
4792 if (client_mode_list)
4793 silc_buffer_free(client_mode_list);
4797 silc_server_command_free(cmd);
4800 /* Server side of command GETKEY. This fetches the client's public key
4801 from the server where to the client is connected. */
4803 SILC_SERVER_CMD_FUNC(getkey)
4805 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
4806 SilcServer server = cmd->server;
4808 SilcClientEntry client;
4809 SilcServerEntry server_entry;
4810 SilcClientID *client_id = NULL;
4811 SilcServerID *server_id = NULL;
4812 SilcIDPayload idp = NULL;
4813 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
4816 SilcBuffer pk = NULL;
4818 SilcPublicKey public_key;
4820 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
4822 silc_server_command_send_status_reply(cmd, SILC_COMMAND_GETKEY,
4823 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
4827 idp = silc_id_payload_parse(tmp, tmp_len);
4829 silc_server_command_send_status_reply(cmd, SILC_COMMAND_GETKEY,
4830 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
4835 id_type = silc_id_payload_get_type(idp);
4836 if (id_type == SILC_ID_CLIENT) {
4837 client_id = silc_id_payload_get_id(idp);
4839 /* If the client is not found from local list there is no chance it
4840 would be locally connected client so send the command further. */
4841 client = silc_idlist_find_client_by_id(server->local_list,
4842 client_id, TRUE, NULL);
4844 client = silc_idlist_find_client_by_id(server->global_list,
4845 client_id, TRUE, NULL);
4847 if ((!client && !cmd->pending && !server->standalone) ||
4848 (client && !client->connection && !cmd->pending &&
4849 !(client->mode & SILC_UMODE_DETACHED)) ||
4850 (client && !client->data.public_key && !cmd->pending)) {
4852 SilcUInt16 old_ident;
4853 SilcSocketConnection dest_sock;
4855 dest_sock = silc_server_get_client_route(server, NULL, 0,
4856 client_id, NULL, NULL);
4860 old_ident = silc_command_get_ident(cmd->payload);
4861 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
4862 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
4864 silc_server_packet_send(server, dest_sock,
4865 SILC_PACKET_COMMAND, cmd->packet->flags,
4866 tmpbuf->data, tmpbuf->len, TRUE);
4868 /* Reprocess this packet after received reply from router */
4869 silc_server_command_pending(server, SILC_COMMAND_GETKEY,
4870 silc_command_get_ident(cmd->payload),
4871 silc_server_command_getkey,
4872 silc_server_command_dup(cmd));
4873 cmd->pending = TRUE;
4874 silc_command_set_ident(cmd->payload, old_ident);
4875 silc_buffer_free(tmpbuf);
4880 silc_server_command_send_status_data(cmd, SILC_COMMAND_GETKEY,
4881 SILC_STATUS_ERR_NO_SUCH_CLIENT_ID,
4882 0, 2, tmp, tmp_len);
4886 /* The client is locally connected, just get the public key and
4887 send it back. If they key does not exist then do not send it,
4888 send just OK reply */
4889 public_key = client->data.public_key;
4891 pk = silc_pkcs_public_key_payload_encode(public_key);
4892 } else if (id_type == SILC_ID_SERVER) {
4893 server_id = silc_id_payload_get_id(idp);
4895 /* If the server is not found from local list there is no chance it
4896 would be locally connected server so send the command further. */
4897 server_entry = silc_idlist_find_server_by_id(server->local_list,
4898 server_id, TRUE, NULL);
4900 server_entry = silc_idlist_find_server_by_id(server->global_list,
4901 server_id, TRUE, NULL);
4903 if (server_entry != server->id_entry &&
4904 ((!server_entry && !cmd->pending && !server->standalone) ||
4905 (server_entry && !server_entry->connection && !cmd->pending &&
4906 !server->standalone) ||
4907 (server_entry && !server_entry->data.public_key && !cmd->pending &&
4908 !server->standalone))) {
4910 SilcUInt16 old_ident;
4912 old_ident = silc_command_get_ident(cmd->payload);
4913 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
4914 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
4916 silc_server_packet_send(server, SILC_PRIMARY_ROUTE(server),
4917 SILC_PACKET_COMMAND, cmd->packet->flags,
4918 tmpbuf->data, tmpbuf->len, TRUE);
4920 /* Reprocess this packet after received reply from router */
4921 silc_server_command_pending(server, SILC_COMMAND_GETKEY,
4922 silc_command_get_ident(cmd->payload),
4923 silc_server_command_getkey,
4924 silc_server_command_dup(cmd));
4925 cmd->pending = TRUE;
4926 silc_command_set_ident(cmd->payload, old_ident);
4927 silc_buffer_free(tmpbuf);
4931 if (!server_entry) {
4932 silc_server_command_send_status_data(cmd, SILC_COMMAND_GETKEY,
4933 SILC_STATUS_ERR_NO_SUCH_SERVER_ID,
4934 0, 2, tmp, tmp_len);
4938 /* If they key does not exist then do not send it, send just OK reply */
4939 public_key = (!server_entry->data.public_key ?
4940 (server_entry == server->id_entry ? server->public_key :
4941 NULL) : server_entry->data.public_key);
4943 pk = silc_pkcs_public_key_payload_encode(public_key);
4948 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
4949 packet = silc_command_reply_payload_encode_va(SILC_COMMAND_GETKEY,
4950 SILC_STATUS_OK, 0, ident, 2,
4952 3, pk ? pk->data : NULL,
4954 silc_server_packet_send(server, cmd->sock, SILC_PACKET_COMMAND_REPLY, 0,
4955 packet->data, packet->len, FALSE);
4956 silc_buffer_free(packet);
4960 silc_id_payload_free(idp);
4961 silc_buffer_free(pk);
4962 silc_free(client_id);
4963 silc_free(server_id);
4964 silc_server_command_free(cmd);
4968 /* Private range commands, specific to this implementation */
4970 /* Server side command of CONNECT. Connects us to the specified remote
4971 server or router. */
4973 SILC_SERVER_CMD_FUNC(connect)
4975 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
4976 SilcServer server = cmd->server;
4977 SilcClientEntry client = (SilcClientEntry)cmd->sock->user_data;
4978 unsigned char *tmp, *host;
4980 SilcUInt32 port = SILC_PORT;
4982 if (cmd->sock->type != SILC_SOCKET_TYPE_CLIENT || !client)
4985 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_PRIV_CONNECT, cmd, 1, 2);
4987 /* Check whether client has the permissions. */
4988 if (!(client->mode & SILC_UMODE_SERVER_OPERATOR) &&
4989 !(client->mode & SILC_UMODE_ROUTER_OPERATOR)) {
4990 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_CONNECT,
4991 SILC_STATUS_ERR_NO_SERVER_PRIV, 0);
4995 if (server->server_type == SILC_ROUTER && !server->backup_router &&
4996 client->mode & SILC_UMODE_SERVER_OPERATOR) {
4997 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_CONNECT,
4998 SILC_STATUS_ERR_NO_ROUTER_PRIV, 0);
5002 /* Get the remote server */
5003 host = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
5005 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_CONNECT,
5006 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
5012 tmp = silc_argument_get_arg_type(cmd->args, 2, &tmp_len);
5014 SILC_GET32_MSB(port, tmp);
5016 /* Create the connection. It is done with timeout and is async. */
5017 silc_server_create_connection(server, host, port);
5019 /* Send reply to the sender */
5020 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_CONNECT,
5024 silc_server_command_free(cmd);
5027 /* Server side command of CLOSE. Closes connection to a specified server. */
5029 SILC_SERVER_CMD_FUNC(close)
5031 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
5032 SilcServer server = cmd->server;
5033 SilcClientEntry client = (SilcClientEntry)cmd->sock->user_data;
5034 SilcServerEntry server_entry;
5035 SilcSocketConnection sock;
5038 unsigned char *name;
5039 SilcUInt32 port = SILC_PORT;
5041 if (cmd->sock->type != SILC_SOCKET_TYPE_CLIENT || !client)
5044 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_PRIV_CLOSE, cmd, 1, 2);
5046 /* Check whether client has the permissions. */
5047 if (!(client->mode & SILC_UMODE_SERVER_OPERATOR) &&
5048 !(client->mode & SILC_UMODE_ROUTER_OPERATOR)) {
5049 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_CLOSE,
5050 SILC_STATUS_ERR_NO_SERVER_PRIV,
5055 /* Get the remote server */
5056 name = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
5058 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_CLOSE,
5059 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
5065 tmp = silc_argument_get_arg_type(cmd->args, 2, &tmp_len);
5067 SILC_GET32_MSB(port, tmp);
5069 server_entry = silc_idlist_find_server_by_conn(server->local_list,
5070 name, port, FALSE, NULL);
5072 server_entry = silc_idlist_find_server_by_conn(server->global_list,
5073 name, port, FALSE, NULL);
5074 if (!server_entry) {
5075 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_CLOSE,
5076 SILC_STATUS_ERR_NO_SERVER_ID, 0);
5080 if (server_entry == server->id_entry) {
5081 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_CLOSE,
5082 SILC_STATUS_ERR_NO_SERVER_ID, 0);
5086 /* Send reply to the sender */
5087 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_CLOSE,
5090 /* Close the connection to the server */
5091 sock = (SilcSocketConnection)server_entry->connection;
5093 server->backup_noswitch = TRUE;
5094 if (server->router == server_entry) {
5095 server->id_entry->router = NULL;
5096 server->router = NULL;
5097 server->standalone = TRUE;
5099 silc_server_disconnect_remote(server, sock,
5100 SILC_STATUS_ERR_BANNED_FROM_SERVER,
5101 "Closed by administrator");
5102 if (sock->user_data)
5103 silc_server_free_sock_user_data(server, sock, NULL);
5104 server->backup_noswitch = FALSE;
5107 silc_server_command_free(cmd);
5110 /* Server side command of SHUTDOWN. Shutdowns the server and closes all
5111 active connections. */
5113 SILC_SERVER_CMD_FUNC(shutdown)
5115 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
5116 SilcServer server = cmd->server;
5117 SilcClientEntry client = (SilcClientEntry)cmd->sock->user_data;
5119 if (cmd->sock->type != SILC_SOCKET_TYPE_CLIENT || !client)
5122 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_PRIV_SHUTDOWN, cmd, 0, 0);
5124 /* Check whether client has the permission. */
5125 if (!(client->mode & SILC_UMODE_SERVER_OPERATOR) &&
5126 !(client->mode & SILC_UMODE_ROUTER_OPERATOR)) {
5127 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_SHUTDOWN,
5128 SILC_STATUS_ERR_NO_SERVER_PRIV,
5133 /* Send reply to the sender */
5134 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_SHUTDOWN,
5137 /* Then, gracefully, or not, bring the server down. */
5138 silc_server_stop(server);
5142 silc_server_command_free(cmd);