If packet processing fails (like integrity check fails etc) the
[silc.git] / apps / silcd / server.c
1 /*
2
3   server.c 
4
5   Author: Pekka Riikonen <priikone@silcnet.org>
6
7   Copyright (C) 1997 - 2002 Pekka Riikonen
8
9   This program is free software; you can redistribute it and/or modify
10   it under the terms of the GNU General Public License as published by
11   the Free Software Foundation; version 2 of the License.
12
13   This program is distributed in the hope that it will be useful,
14   but WITHOUT ANY WARRANTY; without even the implied warranty of
15   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
16   GNU General Public License for more details.
17
18 */
19 /*
20  * This is the actual SILC server than handles everything relating to
21  * servicing the SILC connections. This is also a SILC router as a router
22  * is also normal server.
23  */
24 /* $Id$ */
25
26 #include "serverincludes.h"
27 #include "server_internal.h"
28
29 /* Static prototypes */
30 SILC_TASK_CALLBACK(silc_server_rehash_close_connection);
31 SILC_TASK_CALLBACK(silc_server_connect_to_router_retry);
32 SILC_TASK_CALLBACK(silc_server_connect_router);
33 SILC_TASK_CALLBACK(silc_server_connect_to_router);
34 SILC_TASK_CALLBACK(silc_server_connect_to_router_second);
35 SILC_TASK_CALLBACK(silc_server_connect_to_router_final);
36 SILC_TASK_CALLBACK(silc_server_accept_new_connection);
37 SILC_TASK_CALLBACK(silc_server_accept_new_connection_second);
38 SILC_TASK_CALLBACK(silc_server_accept_new_connection_final);
39 SILC_TASK_CALLBACK(silc_server_packet_process);
40 SILC_TASK_CALLBACK(silc_server_packet_parse_real);
41 SILC_TASK_CALLBACK(silc_server_close_connection_final);
42 SILC_TASK_CALLBACK(silc_server_free_client_data_timeout);
43 SILC_TASK_CALLBACK(silc_server_timeout_remote);
44 SILC_TASK_CALLBACK(silc_server_channel_key_rekey);
45 SILC_TASK_CALLBACK(silc_server_failure_callback);
46 SILC_TASK_CALLBACK(silc_server_rekey_callback);
47 SILC_TASK_CALLBACK(silc_server_get_stats);
48
49 /* Allocates a new SILC server object. This has to be done before the server
50    can be used. After allocation one must call silc_server_init to initialize
51    the server. The new allocated server object is returned to the new_server
52    argument. */
53
54 int silc_server_alloc(SilcServer *new_server)
55 {
56   SilcServer server;
57
58   SILC_LOG_DEBUG(("Allocating new server object"));
59
60   server = silc_calloc(1, sizeof(*server));
61   server->server_type = SILC_SERVER;
62   server->standalone = TRUE;
63   server->local_list = silc_calloc(1, sizeof(*server->local_list));
64   server->global_list = silc_calloc(1, sizeof(*server->global_list));
65   server->pending_commands = silc_dlist_init();
66 #ifdef SILC_SIM
67   server->sim = silc_dlist_init();
68 #endif
69
70   *new_server = server;
71
72   return TRUE;
73 }
74
75 /* Free's the SILC server object. This is called at the very end before
76    the program ends. */
77
78 void silc_server_free(SilcServer server)
79 {
80   SilcIDCacheList list;
81   SilcIDCacheEntry cache;
82
83   if (!server)
84     return;
85
86 #ifdef SILC_SIM
87   {
88     SilcSim sim;
89     
90     while ((sim = silc_dlist_get(server->sim)) != SILC_LIST_END) {
91       silc_dlist_del(server->sim, sim);
92       silc_sim_free(sim);
93     }
94     silc_dlist_uninit(server->sim);
95   }
96 #endif
97
98   silc_server_backup_free(server);
99   silc_server_config_unref(&server->config_ref);
100   if (server->rng)
101     silc_rng_free(server->rng);
102   if (server->pkcs)
103     silc_pkcs_free(server->pkcs);
104   if (server->public_key)
105     silc_pkcs_public_key_free(server->public_key);
106   if (server->private_key)
107     silc_pkcs_private_key_free(server->private_key);
108   if (server->pending_commands)
109     silc_dlist_uninit(server->pending_commands);
110   if (server->id_entry)
111     silc_idlist_del_server(server->local_list, server->id_entry);
112
113   /* Delete all channels */
114   list = NULL;
115   if (silc_idcache_get_all(server->local_list->channels, &list) &&
116       silc_idcache_list_first(list, &cache)) {
117     silc_idlist_del_channel(server->local_list, cache->context);
118     while (silc_idcache_list_next(list, &cache))
119       silc_idlist_del_channel(server->local_list, cache->context);
120   }
121   if (list)
122     silc_idcache_list_free(list);
123   list = NULL;
124   if (silc_idcache_get_all(server->global_list->channels, &list) &&
125       silc_idcache_list_first(list, &cache)) {
126     silc_idlist_del_channel(server->global_list, cache->context);
127     while (silc_idcache_list_next(list, &cache))
128       silc_idlist_del_channel(server->global_list, cache->context);
129   }
130   if (list)
131     silc_idcache_list_free(list);
132
133   /* Delete all clients */
134   list = NULL;
135   if (silc_idcache_get_all(server->local_list->clients, &list) &&
136       silc_idcache_list_first(list, &cache)) {
137     silc_idlist_del_client(server->local_list, cache->context);
138     while (silc_idcache_list_next(list, &cache))
139       silc_idlist_del_client(server->local_list, cache->context);
140   }
141   if (list)
142     silc_idcache_list_free(list);
143   list = NULL;
144   if (silc_idcache_get_all(server->global_list->clients, &list) &&
145       silc_idcache_list_first(list, &cache)) {
146     silc_idlist_del_client(server->global_list, cache->context);
147     while (silc_idcache_list_next(list, &cache))
148       silc_idlist_del_client(server->global_list, cache->context);
149   }
150   if (list)
151     silc_idcache_list_free(list);
152
153   /* Delete all servers */
154   list = NULL;
155   if (silc_idcache_get_all(server->local_list->servers, &list) &&
156       silc_idcache_list_first(list, &cache)) {
157     silc_idlist_del_server(server->local_list, cache->context);
158     while (silc_idcache_list_next(list, &cache))
159       silc_idlist_del_server(server->local_list, cache->context);
160   }
161   if (list)
162     silc_idcache_list_free(list);
163   list = NULL;
164   if (silc_idcache_get_all(server->global_list->servers, &list) &&
165       silc_idcache_list_first(list, &cache)) {
166     silc_idlist_del_server(server->global_list, cache->context);
167     while (silc_idcache_list_next(list, &cache))
168       silc_idlist_del_server(server->global_list, cache->context);
169   }
170   if (list)
171     silc_idcache_list_free(list);
172
173   silc_idcache_free(server->local_list->clients);
174   silc_idcache_free(server->local_list->servers);
175   silc_idcache_free(server->local_list->channels);
176   silc_idcache_free(server->global_list->clients);
177   silc_idcache_free(server->global_list->servers);
178   silc_idcache_free(server->global_list->channels);
179   silc_hash_table_free(server->watcher_list);
180
181   silc_hash_free(server->md5hash);
182   silc_hash_free(server->sha1hash);
183   silc_hmac_unregister_all();
184   silc_hash_unregister_all();
185   silc_cipher_unregister_all();
186   silc_pkcs_unregister_all();
187
188   silc_free(server->local_list);
189   silc_free(server->global_list);
190   silc_free(server->server_name);
191   silc_free(server->id_string);
192   silc_free(server->purge_i);
193   silc_free(server->purge_g);
194   silc_free(server);
195 }
196
197 /* Creates a new server listener. */
198
199 static bool silc_server_listen(SilcServer server, const char *server_ip,
200                                SilcUInt16 port, int *sock)
201 {
202   *sock = silc_net_create_server(port, server_ip);
203   if (*sock < 0) {
204     SILC_SERVER_LOG_ERROR(("Could not create server listener: %s on %hu",
205                         server_ip, port));
206     return FALSE;
207   }
208   return TRUE;
209 }
210
211 /* Adds a secondary listener. */
212
213 bool silc_server_init_secondary(SilcServer server)
214 {
215   int sock = 0, sock_list[server->config->param.connections_max];
216   SilcSocketConnection newsocket = NULL;
217   SilcServerConfigServerInfoInterface *interface;
218
219   for (interface = server->config->server_info->secondary; interface; 
220         interface = interface->next, sock++) {
221
222     if (!silc_server_listen(server,
223         interface->server_ip, interface->port, &sock_list[sock]))
224       goto err;
225
226     /* Set socket to non-blocking mode */
227     silc_net_set_socket_nonblock(sock_list[sock]);
228
229     /* Add ourselves also to the socket table. The entry allocated above
230        is sent as argument for fast referencing in the future. */
231     silc_socket_alloc(sock_list[sock],
232                       SILC_SOCKET_TYPE_SERVER, NULL, &newsocket);
233     server->sockets[sock_list[sock]] = newsocket;
234     SILC_SET_LISTENER(newsocket);
235
236     /* Perform name and address lookups to resolve the listenning address
237        and port. */
238     if (!silc_net_check_local_by_sock(sock_list[sock], &newsocket->hostname,
239                             &newsocket->ip)) {
240       if ((server->config->require_reverse_lookup && !newsocket->hostname) ||
241         !newsocket->ip) {
242         SILC_LOG_ERROR(("IP/DNS lookup failed for local host %s",
243                       newsocket->hostname ? newsocket->hostname :
244                       newsocket->ip ? newsocket->ip : ""));
245         server->stat.conn_failures++;
246         goto err;
247       }
248       if (!newsocket->hostname)
249         newsocket->hostname = strdup(newsocket->ip);
250     }
251     newsocket->port = silc_net_get_local_port(sock);
252
253     newsocket->user_data = (void *)server->id_entry;
254     silc_schedule_task_add(server->schedule, sock_list[sock],
255                            silc_server_accept_new_connection,
256                            (void *)server, 0, 0,
257                            SILC_TASK_FD,
258                            SILC_TASK_PRI_NORMAL);
259   }
260
261   return TRUE;
262
263  err:
264   do silc_net_close_server(sock_list[sock--]); while (sock >= 0);
265   return FALSE;
266 }
267
268 /* Initializes the entire SILC server. This is called always before running
269    the server. This is called only once at the initialization of the program.
270    This binds the server to its listenning port. After this function returns
271    one should call silc_server_run to start the server. This returns TRUE
272    when everything is ok to run the server. Configuration file must be
273    read and parsed before calling this. */
274
275 bool silc_server_init(SilcServer server)
276 {
277   int sock;
278   SilcServerID *id;
279   SilcServerEntry id_entry;
280   SilcIDListPurge purge;
281   SilcSocketConnection newsocket = NULL;
282
283   SILC_LOG_DEBUG(("Initializing server"));
284
285   server->starttime = time(NULL);
286
287   /* Take config object for us */
288   silc_server_config_ref(&server->config_ref, server->config,
289                          server->config);
290
291   /* Steal public and private key from the config object */
292   server->public_key = server->config->server_info->public_key;
293   server->private_key = server->config->server_info->private_key;
294   server->config->server_info->public_key = NULL;
295   server->config->server_info->private_key = NULL;
296
297   /* Register all configured ciphers, PKCS and hash functions. */
298   if (!silc_server_config_register_ciphers(server))
299     silc_cipher_register_default();
300   if (!silc_server_config_register_pkcs(server))
301     silc_pkcs_register_default();
302   if (!silc_server_config_register_hashfuncs(server))
303     silc_hash_register_default();
304   if (!silc_server_config_register_hmacs(server))
305     silc_hmac_register_default();
306
307   /* Initialize random number generator for the server. */
308   server->rng = silc_rng_alloc();
309   silc_rng_init(server->rng);
310   silc_rng_global_init(server->rng);
311
312   /* Initialize hash functions for server to use */
313   silc_hash_alloc("md5", &server->md5hash);
314   silc_hash_alloc("sha1", &server->sha1hash);
315
316   /* Allocate PKCS context for local public and private keys */
317   if (!silc_pkcs_alloc(server->public_key->name, &server->pkcs))
318     goto err;
319   silc_pkcs_public_key_set(server->pkcs, server->public_key);
320   silc_pkcs_private_key_set(server->pkcs, server->private_key);
321
322   /* Initialize the scheduler */
323   server->schedule = silc_schedule_init(server->config->param.connections_max,
324                                         server);
325   if (!server->schedule)
326     goto err;
327
328   /* First, register log files configuration for error output */
329   silc_server_config_setlogfiles(server);
330
331   /* Initialize ID caches */
332   server->local_list->clients =
333     silc_idcache_alloc(0, SILC_ID_CLIENT, silc_idlist_client_destructor);
334   server->local_list->servers = silc_idcache_alloc(0, SILC_ID_SERVER, NULL);
335   server->local_list->channels = silc_idcache_alloc(0, SILC_ID_CHANNEL, NULL);
336
337   /* These are allocated for normal server as well as these hold some
338      global information that the server has fetched from its router. For
339      router these are used as they are supposed to be used on router. */
340   server->global_list->clients =
341     silc_idcache_alloc(0, SILC_ID_CLIENT, silc_idlist_client_destructor);
342   server->global_list->servers = silc_idcache_alloc(0, SILC_ID_SERVER, NULL);
343   server->global_list->channels = silc_idcache_alloc(0, SILC_ID_CHANNEL, NULL);
344
345   /* Init watcher list */
346   server->watcher_list =
347     silc_hash_table_alloc(1, silc_hash_client_id_hash, NULL,
348                           silc_hash_data_compare, (void *)CLIENTID_HASH_LEN,
349                           NULL, NULL, TRUE);
350   if (!server->watcher_list)
351     goto err;
352
353   /* Create a listening server */
354   if (!silc_server_listen(server,
355                 server->config->server_info->primary == NULL ? NULL :
356                         server->config->server_info->primary->server_ip,
357                 server->config->server_info->primary == NULL ? 0 :
358                         server->config->server_info->primary->port,
359                 &sock))
360     goto err;
361
362   /* Set socket to non-blocking mode */
363   silc_net_set_socket_nonblock(sock);
364   server->sock = sock;
365
366   /* Allocate the entire socket list that is used in server. Eventually
367      all connections will have entry in this table (it is a table of
368      pointers to the actual object that is allocated individually
369      later). */
370   server->sockets = silc_calloc(server->config->param.connections_max,
371                                 sizeof(*server->sockets));
372   if (!server->sockets)
373     goto err;
374
375   /* Add ourselves also to the socket table. The entry allocated above
376      is sent as argument for fast referencing in the future. */
377   silc_socket_alloc(sock, SILC_SOCKET_TYPE_SERVER, NULL, &newsocket);
378   server->sockets[sock] = newsocket;
379   SILC_SET_LISTENER(newsocket);
380
381   /* Perform name and address lookups to resolve the listenning address
382      and port. */
383   if (!silc_net_check_local_by_sock(sock, &newsocket->hostname,
384                                     &newsocket->ip)) {
385     if ((server->config->require_reverse_lookup && !newsocket->hostname) ||
386         !newsocket->ip) {
387       SILC_LOG_ERROR(("IP/DNS lookup failed for local host %s",
388                       newsocket->hostname ? newsocket->hostname :
389                       newsocket->ip ? newsocket->ip : ""));
390       server->stat.conn_failures++;
391       goto err;
392     }
393     if (!newsocket->hostname)
394       newsocket->hostname = strdup(newsocket->ip);
395   }
396   newsocket->port = silc_net_get_local_port(sock);
397
398   /* Create a Server ID for the server. */
399   silc_id_create_server_id(newsocket->ip, newsocket->port, server->rng, &id);
400   if (!id)
401     goto err;
402
403   server->id = id;
404   server->id_string = silc_id_id2str(id, SILC_ID_SERVER);
405   server->id_string_len = silc_id_get_len(id, SILC_ID_SERVER);
406   server->server_name = server->config->server_info->server_name;
407   server->config->server_info->server_name = NULL;
408
409   /* Add ourselves to the server list. We don't have a router yet
410      beacuse we haven't established a route yet. It will be done later.
411      For now, NULL is sent as router. This allocates new entry to
412      the ID list. */
413   id_entry =
414     silc_idlist_add_server(server->local_list, strdup(server->server_name),
415                            server->server_type, server->id, NULL, NULL);
416   if (!id_entry) {
417     SILC_LOG_ERROR(("Could not add ourselves to cache"));
418     goto err;
419   }
420   id_entry->data.status |= SILC_IDLIST_STATUS_REGISTERED;
421
422   /* Put the allocated socket pointer also to the entry allocated above
423      for fast back-referencing to the socket list. */
424   newsocket->user_data = (void *)id_entry;
425   id_entry->connection = (void *)newsocket;
426   server->id_entry = id_entry;
427
428   /* Register protocols */
429   silc_server_protocols_register();
430
431   /* Add the first task to the scheduler. This is task that is executed by
432      timeout. It expires as soon as the caller calls silc_server_run. This
433      task performs authentication protocol and key exchange with our
434      primary router. */
435   silc_schedule_task_add(server->schedule, 0,
436                          silc_server_connect_to_router,
437                          (void *)server, 0, 1,
438                          SILC_TASK_TIMEOUT,
439                          SILC_TASK_PRI_NORMAL);
440
441   /* Add listener task to the scheduler. This task receives new connections
442      to the server. This task remains on the queue until the end of the
443      program. */
444   silc_schedule_task_add(server->schedule, sock,
445                          silc_server_accept_new_connection,
446                          (void *)server, 0, 0,
447                          SILC_TASK_FD,
448                          SILC_TASK_PRI_NORMAL);
449
450   if (silc_server_init_secondary(server) == FALSE)
451     goto err;
452   
453   server->listenning = TRUE;
454
455   /* If server connections has been configured then we must be router as
456      normal server cannot have server connections, only router connections. */
457   if (server->config->servers) {
458     SilcServerConfigServer *ptr = server->config->servers;
459
460     server->server_type = SILC_ROUTER;
461     while (ptr) {
462       if (ptr->backup_router) {
463         server->server_type = SILC_BACKUP_ROUTER;
464         server->backup_router = TRUE;
465         server->id_entry->server_type = SILC_BACKUP_ROUTER;
466         break;
467       }
468       ptr = ptr->next;
469     }
470   }
471
472   /* Register the ID Cache purge task. This periodically purges the ID cache
473      and removes the expired cache entries. */
474
475   /* Clients local list */
476   server->purge_i = purge = silc_calloc(1, sizeof(*purge));
477   purge->cache = server->local_list->clients;
478   purge->timeout = 600;
479   silc_schedule_task_add(server->schedule, 0, silc_idlist_purge,
480                          (void *)purge, purge->timeout, 0,
481                          SILC_TASK_TIMEOUT, SILC_TASK_PRI_LOW);
482
483   /* Clients global list */
484   server->purge_g = purge = silc_calloc(1, sizeof(*purge));
485   purge->cache = server->global_list->clients;
486   purge->timeout = 300;
487   silc_schedule_task_add(server->schedule, 0, silc_idlist_purge,
488                          (void *)purge, purge->timeout, 0,
489                          SILC_TASK_TIMEOUT, SILC_TASK_PRI_LOW);
490
491   /* If we are normal server we'll retrieve network statisticial information
492      once in a while from the router. */
493   if (server->server_type == SILC_SERVER)
494     silc_schedule_task_add(server->schedule, 0, silc_server_get_stats,
495                            server, 10, 0, SILC_TASK_TIMEOUT,
496                            SILC_TASK_PRI_LOW);
497
498   if (server->server_type == SILC_ROUTER)
499     server->stat.routers++;
500
501   SILC_LOG_DEBUG(("Server initialized"));
502
503   /* We are done here, return succesfully */
504   return TRUE;
505
506  err:
507   silc_server_config_unref(&server->config_ref);
508   silc_net_close_server(sock);
509   return FALSE;
510 }
511
512 /* Task callback to close a socket connection after rehash */
513
514 SILC_TASK_CALLBACK(silc_server_rehash_close_connection)
515 {
516   SilcServer server = context;
517   SilcSocketConnection sock = server->sockets[fd];
518
519   if (!sock)
520     return;
521
522   SILC_LOG_INFO(("Connection %s:%d [%s] is unconfigured",
523                  sock->hostname, sock->port,
524                  (sock->type == SILC_SOCKET_TYPE_UNKNOWN ? "Unknown" :
525                   sock->type == SILC_SOCKET_TYPE_CLIENT ? "Client" :
526                   sock->type == SILC_SOCKET_TYPE_SERVER ? "Server" :
527                   "Router")));
528   silc_schedule_task_del_by_context(server->schedule, sock);
529   silc_server_disconnect_remote(server, sock,
530                                 SILC_STATUS_ERR_BANNED_FROM_SERVER,
531                                 "This connection is removed from "
532                                 "configuration");
533   if (sock->user_data)
534     silc_server_free_sock_user_data(server, sock, NULL);
535 }
536
537 /* This function basically reads the config file again and switches the config
538    object pointed by the server object. After that, we have to fix various
539    things such as the server_name and the listening ports.
540    Keep in mind that we no longer have the root privileges at this point. */
541
542 bool silc_server_rehash(SilcServer server)
543 {
544   SilcServerConfig newconfig;
545
546   SILC_LOG_INFO(("Rehashing server"));
547
548   /* Reset the logging system */
549   silc_log_quick = TRUE;
550   silc_log_flush_all();
551
552   /* Start the main rehash phase (read again the config file) */
553   newconfig = silc_server_config_alloc(server->config_file);
554   if (!newconfig) {
555     SILC_LOG_ERROR(("Rehash FAILED."));
556     return FALSE;
557   }
558
559   /* Reinit scheduler if necessary */
560   if (newconfig->param.connections_max > server->config->param.connections_max)
561     if (!silc_schedule_reinit(server->schedule, 
562                               newconfig->param.connections_max))
563       return FALSE;
564
565   /* Fix the server_name field */
566   if (strcmp(server->server_name, newconfig->server_info->server_name)) {
567     silc_free(server->server_name);
568     server->server_name = newconfig->server_info->server_name;
569     newconfig->server_info->server_name = NULL;
570
571     /* Update the idcache list with a fresh pointer */
572     silc_free(server->id_entry->server_name);
573     server->id_entry->server_name = strdup(server->server_name);
574     if (!silc_idcache_del_by_context(server->local_list->servers, 
575                                      server->id_entry))
576       return FALSE;
577     if (!silc_idcache_add(server->local_list->servers,
578                           server->id_entry->server_name,
579                           server->id_entry->id, server->id_entry, 0, NULL))
580       return FALSE;
581   }
582
583   /* Set logging */
584   silc_server_config_setlogfiles(server);
585
586   /* Change new key pair if necessary */
587   if (newconfig->server_info->public_key &&
588       !silc_pkcs_public_key_compare(server->public_key,
589                                     newconfig->server_info->public_key)) {
590     silc_pkcs_public_key_free(server->public_key);
591     silc_pkcs_private_key_free(server->private_key);
592     server->public_key = newconfig->server_info->public_key;
593     server->private_key = newconfig->server_info->private_key;
594     newconfig->server_info->public_key = NULL;
595     newconfig->server_info->private_key = NULL;
596
597     /* Allocate PKCS context for local public and private keys */
598     silc_pkcs_free(server->pkcs);
599     if (!silc_pkcs_alloc(server->public_key->name, &server->pkcs))
600       return FALSE;
601     silc_pkcs_public_key_set(server->pkcs, server->public_key);
602     silc_pkcs_private_key_set(server->pkcs, server->private_key);
603   }
604
605   /* Check for unconfigured server and router connections and close
606      connections that were unconfigured. */
607
608   if (server->config->routers) {
609     SilcServerConfigRouter *ptr;
610     SilcServerConfigRouter *newptr;
611     bool found;
612
613     for (ptr = server->config->routers; ptr; ptr = ptr->next) {
614       found = FALSE;
615
616       /* Check whether new config has this one too */
617       for (newptr = newconfig->routers; newptr; newptr = newptr->next) {
618         if (silc_string_compare(newptr->host, ptr->host) && 
619             newptr->port == ptr->port &&
620             newptr->initiator == ptr->initiator) {
621           found = TRUE;
622           break;
623         }
624       }
625
626       if (!found && ptr->host) {
627         /* Remove this connection */
628         SilcSocketConnection sock;
629         sock = silc_server_find_socket_by_host(server, SILC_SOCKET_TYPE_ROUTER,
630                                                ptr->host, ptr->port);
631         if (sock && !SILC_IS_LISTENER(sock))
632           silc_schedule_task_add(server->schedule, sock->sock,
633                                  silc_server_rehash_close_connection,
634                                  server, 0, 1, SILC_TASK_TIMEOUT,
635                                  SILC_TASK_PRI_NORMAL);
636       }
637     }
638   }
639
640   if (server->config->servers) {
641     SilcServerConfigServer *ptr;
642     SilcServerConfigServer *newptr;
643     bool found;
644
645     for (ptr = server->config->servers; ptr; ptr = ptr->next) {
646       found = FALSE;
647
648       /* Check whether new config has this one too */
649       for (newptr = newconfig->servers; newptr; newptr = newptr->next) {
650         if (silc_string_compare(newptr->host, ptr->host)) {
651           found = TRUE;
652           break;
653         }
654       }
655
656       if (!found && ptr->host) {
657         /* Remove this connection */
658         SilcSocketConnection sock;
659         sock = silc_server_find_socket_by_host(server, SILC_SOCKET_TYPE_SERVER,
660                                                ptr->host, 0);
661         if (sock && !SILC_IS_LISTENER(sock))
662           silc_schedule_task_add(server->schedule, sock->sock,
663                                  silc_server_rehash_close_connection,
664                                  server, 0, 1, SILC_TASK_TIMEOUT,
665                                  SILC_TASK_PRI_NORMAL);
666       }
667     }
668   }
669
670   if (server->config->clients) {
671     SilcServerConfigClient *ptr;
672     SilcServerConfigClient *newptr;
673     bool found;
674
675     for (ptr = server->config->clients; ptr; ptr = ptr->next) {
676       found = FALSE;
677
678       /* Check whether new config has this one too */
679       for (newptr = newconfig->clients; newptr; newptr = newptr->next) {
680         if (silc_string_compare(newptr->host, ptr->host)) {
681           found = TRUE;
682           break;
683         }
684       }
685
686       if (!found && ptr->host) {
687         /* Remove this connection */
688         SilcSocketConnection sock;
689         sock = silc_server_find_socket_by_host(server, SILC_SOCKET_TYPE_CLIENT,
690                                                ptr->host, 0);
691         if (sock)
692           silc_schedule_task_add(server->schedule, sock->sock,
693                                  silc_server_rehash_close_connection,
694                                  server, 0, 1, SILC_TASK_TIMEOUT,
695                                  SILC_TASK_PRI_NORMAL);
696       }
697     }
698   }
699
700   /* Go through all configured routers after rehash */
701   silc_schedule_task_add(server->schedule, 0,
702                          silc_server_connect_to_router,
703                          (void *)server, 0, 1,
704                          SILC_TASK_TIMEOUT,
705                          SILC_TASK_PRI_NORMAL);
706
707   /* Check whether our router status has changed */
708   if (newconfig->servers) {
709     SilcServerConfigServer *ptr = newconfig->servers;
710
711     server->server_type = SILC_ROUTER;
712     while (ptr) {
713       if (ptr->backup_router) {
714         server->server_type = SILC_BACKUP_ROUTER;
715         server->backup_router = TRUE;
716         server->id_entry->server_type = SILC_BACKUP_ROUTER;
717         break;
718       }
719       ptr = ptr->next;
720     }
721   }
722
723   /* Our old config is gone now. We'll unreference our reference made in
724      silc_server_init and then destroy it since we are destroying it
725      underneath the application (layer which called silc_server_init). */
726   silc_server_config_unref(&server->config_ref);
727   silc_server_config_destroy(server->config);
728
729   /* Take new config context */
730   server->config = newconfig;
731   silc_server_config_ref(&server->config_ref, server->config, server->config);
732
733   SILC_LOG_DEBUG(("Server rehashed"));
734
735   return TRUE;
736 }
737
738 /* The heart of the server. This runs the scheduler thus runs the server.
739    When this returns the server has been stopped and the program will
740    be terminated. */
741
742 void silc_server_run(SilcServer server)
743 {
744   SILC_LOG_INFO(("SILC Server started"));
745
746   /* Start the scheduler, the heart of the SILC server. When this returns
747      the program will be terminated. */
748   silc_schedule(server->schedule);
749 }
750
751 /* Stops the SILC server. This function is used to shutdown the server.
752    This is usually called after the scheduler has returned. After stopping
753    the server one should call silc_server_free. */
754
755 void silc_server_stop(SilcServer server)
756 {
757   SILC_LOG_INFO(("SILC Server shutting down"));
758
759   if (server->schedule) {
760     int i;
761
762     server->server_shutdown = TRUE;
763
764     /* Close all connections */
765     for (i = 0; i < server->config->param.connections_max; i++) {
766       if (!server->sockets[i])
767         continue;
768       if (!SILC_IS_LISTENER(server->sockets[i])) {
769         SilcSocketConnection sock = server->sockets[i];
770         SilcIDListData idata = sock->user_data;
771
772         if (idata)
773           idata->status &= ~SILC_IDLIST_STATUS_DISABLED;
774
775         silc_schedule_task_del_by_context(server->schedule,
776                                           server->sockets[i]);
777         silc_server_disconnect_remote(server, server->sockets[i], 
778                                       SILC_STATUS_OK, 
779                                       "Server is shutting down");
780         if (sock->user_data)
781           silc_server_free_sock_user_data(server, sock,
782                                           "Server is shutting down");
783         silc_socket_free(sock);
784       } else {
785         silc_socket_free(server->sockets[i]);
786         server->sockets[i] = NULL;
787       }
788     }
789
790     /* We are not connected to network anymore */
791     server->standalone = TRUE;
792
793     silc_schedule_stop(server->schedule);
794     silc_schedule_uninit(server->schedule);
795     server->schedule = NULL;
796
797     silc_free(server->sockets);
798     server->sockets = NULL;
799   }
800
801   silc_server_protocols_unregister();
802
803   SILC_LOG_DEBUG(("Server stopped"));
804 }
805
806 /* Function that is called when the network connection to a router has
807    been established.  This will continue with the key exchange protocol
808    with the remote router. */
809
810 void silc_server_start_key_exchange(SilcServer server,
811                                     SilcServerConnection sconn,
812                                     int sock)
813 {
814   SilcSocketConnection newsocket;
815   SilcProtocol protocol;
816   SilcServerKEInternalContext *proto_ctx;
817   SilcServerConfigRouter *conn =
818     (SilcServerConfigRouter *) sconn->conn.ref_ptr;
819   void *context;
820
821   /* Cancel any possible retry timeouts */
822   silc_schedule_task_del_by_callback(server->schedule,
823                                      silc_server_connect_to_router_retry);
824
825   /* Set socket options */
826   silc_net_set_socket_nonblock(sock);
827   silc_net_set_socket_opt(sock, SOL_SOCKET, SO_REUSEADDR, 1);
828
829   /* Create socket connection for the connection. Even though we
830      know that we are connecting to a router we will mark the socket
831      to be unknown connection until we have executed authentication
832      protocol. */
833   silc_socket_alloc(sock, SILC_SOCKET_TYPE_UNKNOWN, NULL, &newsocket);
834   server->sockets[sock] = newsocket;
835   newsocket->hostname = strdup(sconn->remote_host);
836   newsocket->ip = strdup(sconn->remote_host);
837   newsocket->port = sconn->remote_port;
838   sconn->sock = newsocket;
839
840   /* Allocate internal protocol context. This is sent as context
841      to the protocol. */
842   proto_ctx = silc_calloc(1, sizeof(*proto_ctx));
843   proto_ctx->server = (void *)server;
844   proto_ctx->context = (void *)sconn;
845   proto_ctx->sock = newsocket;
846   proto_ctx->rng = server->rng;
847   proto_ctx->responder = FALSE;
848
849   /* Set Key Exchange flags from configuration, but fall back to global
850      settings too. */
851   SILC_GET_SKE_FLAGS(conn, proto_ctx);
852   if (server->config->param.key_exchange_pfs)
853     proto_ctx->flags |= SILC_SKE_SP_FLAG_PFS;
854
855   /* Perform key exchange protocol. silc_server_connect_to_router_second
856      will be called after the protocol is finished. */
857   silc_protocol_alloc(SILC_PROTOCOL_SERVER_KEY_EXCHANGE,
858                       &protocol, proto_ctx,
859                       silc_server_connect_to_router_second);
860   newsocket->protocol = protocol;
861
862   /* Register a timeout task that will be executed if the protocol
863      is not executed within set limit. */
864   proto_ctx->timeout_task =
865     silc_schedule_task_add(server->schedule, sock,
866                            silc_server_timeout_remote,
867                            server, server->config->key_exchange_timeout, 0,
868                            SILC_TASK_TIMEOUT,
869                            SILC_TASK_PRI_LOW);
870
871   /* Register the connection for network input and output. This sets
872      that scheduler will listen for incoming packets for this connection
873      and sets that outgoing packets may be sent to this connection as
874      well. However, this doesn't set the scheduler for outgoing traffic,
875      it will be set separately by calling SILC_SET_CONNECTION_FOR_OUTPUT,
876      later when outgoing data is available. */
877   context = (void *)server;
878   SILC_REGISTER_CONNECTION_FOR_IO(sock);
879
880   /* Run the protocol */
881   silc_protocol_execute(protocol, server->schedule, 0, 0);
882 }
883
884 /* Timeout callback that will be called to retry connecting to remote
885    router. This is used by both normal and router server. This will wait
886    before retrying the connecting. The timeout is generated by exponential
887    backoff algorithm. */
888
889 SILC_TASK_CALLBACK(silc_server_connect_to_router_retry)
890 {
891   SilcServer server = app_context;
892   SilcServerConnection sconn = (SilcServerConnection)context;
893   SilcServerConfigRouter *conn = sconn->conn.ref_ptr;
894   SilcServerConfigConnParams *param =
895                 (conn->param ? conn->param : &server->config->param);
896
897   /* Don't retry if we are shutting down. */
898   if (server->server_shutdown) {
899     silc_server_config_unref(&sconn->conn);
900     silc_free(sconn->remote_host);
901     silc_free(sconn->backup_replace_ip);
902     silc_free(sconn);
903     return;
904   }
905
906   SILC_LOG_INFO(("Retrying connecting to a router"));
907
908   /* Calculate next timeout */
909   if (sconn->retry_count >= 1) {
910     sconn->retry_timeout = sconn->retry_timeout * SILC_SERVER_RETRY_MULTIPLIER;
911     if (sconn->retry_timeout > param->reconnect_interval_max)
912       sconn->retry_timeout = param->reconnect_interval_max;
913   } else {
914     sconn->retry_timeout = param->reconnect_interval;
915   }
916   sconn->retry_count++;
917   sconn->retry_timeout = sconn->retry_timeout +
918     silc_rng_get_rn32(server->rng) % SILC_SERVER_RETRY_RANDOMIZER;
919
920   /* If we've reached max retry count, give up. */
921   if ((sconn->retry_count > param->reconnect_count) &&
922       !param->reconnect_keep_trying) {
923     SILC_LOG_ERROR(("Could not connect to router, giving up"));
924     silc_server_config_unref(&sconn->conn);
925     silc_free(sconn->remote_host);
926     silc_free(sconn->backup_replace_ip);
927     silc_free(sconn);
928     return;
929   }
930
931   SILC_LOG_DEBUG(("Retrying connecting to a router in %d seconds",
932                   sconn->retry_timeout));
933
934   /* We will lookup a fresh pointer later */
935   silc_server_config_unref(&sconn->conn);
936
937   /* Wait one before retrying */
938   silc_schedule_task_add(server->schedule, 0, silc_server_connect_router,
939                          context, sconn->retry_timeout, 0,
940                          SILC_TASK_TIMEOUT, SILC_TASK_PRI_NORMAL);
941 }
942
943 /* Generic routine to use connect to a router. */
944
945 SILC_TASK_CALLBACK(silc_server_connect_router)
946 {
947   SilcServer server = app_context;
948   SilcServerConnection sconn = (SilcServerConnection)context;
949   SilcServerConfigRouter *rconn;
950   int sock;
951
952   /* Don't connect if we are shutting down. */
953   if (server->server_shutdown) {
954     silc_free(sconn->remote_host);
955     silc_free(sconn->backup_replace_ip);
956     silc_free(sconn);
957     return;
958   }
959
960   SILC_LOG_INFO(("Connecting to the %s %s on port %d",
961                  (sconn->backup ? "backup router" : "router"),
962                  sconn->remote_host, sconn->remote_port));
963
964   server->router_connect = time(NULL);
965   rconn = silc_server_config_find_router_conn(server, sconn->remote_host,
966                                               sconn->remote_port);
967   if (!rconn) {
968     SILC_LOG_INFO(("Unconfigured %s connection %s:%d, cannot connect",
969                    (sconn->backup ? "backup router" : "router"),
970                    sconn->remote_host, sconn->remote_port));
971     silc_free(sconn->remote_host);
972     silc_free(sconn->backup_replace_ip);
973     silc_free(sconn);
974     return;
975   }
976   silc_server_config_ref(&sconn->conn, server->config, (void *)rconn);
977
978   /* Connect to remote host */
979   sock = silc_net_create_connection(
980                  (!server->config->server_info->primary ? NULL :
981                   server->config->server_info->primary->server_ip),
982                  sconn->remote_port, sconn->remote_host);
983   if (sock < 0) {
984     SILC_LOG_ERROR(("Could not connect to router %s:%d",
985                     sconn->remote_host, sconn->remote_port));
986     if (!sconn->no_reconnect)
987       silc_schedule_task_add(server->schedule, 0,
988                              silc_server_connect_to_router_retry,
989                              context, 0, 1, SILC_TASK_TIMEOUT,
990                              SILC_TASK_PRI_NORMAL);
991     else
992       silc_server_config_unref(&sconn->conn);
993     return;
994   }
995
996   /* Continue with key exchange protocol */
997   silc_server_start_key_exchange(server, sconn, sock);
998 }
999
1000 /* This function connects to our primary router or if we are a router this
1001    establishes all our primary routes. This is called at the start of the
1002    server to do authentication and key exchange with our router - called
1003    from schedule. */
1004
1005 SILC_TASK_CALLBACK(silc_server_connect_to_router)
1006 {
1007   SilcServer server = (SilcServer)context;
1008   SilcServerConnection sconn;
1009   SilcServerConfigRouter *ptr;
1010
1011   /* Don't connect if we are shutting down. */
1012   if (server->server_shutdown)
1013     return;
1014
1015   SILC_LOG_DEBUG(("We are %s",
1016                   (server->server_type == SILC_SERVER ?
1017                    "normal server" : server->server_type == SILC_ROUTER ?
1018                    "router" : "backup router/normal server")));
1019
1020   if (!server->config->routers) {
1021     /* There wasn't a configured router, we will continue but we don't
1022        have a connection to outside world.  We will be standalone server. */
1023     SILC_LOG_DEBUG(("No router(s), we are standalone"));
1024     server->standalone = TRUE;
1025     return;
1026   }
1027
1028   /* Cancel any possible retry timeouts */
1029   silc_schedule_task_del_by_callback(server->schedule,
1030                                      silc_server_connect_router);
1031   silc_schedule_task_del_by_callback(server->schedule,
1032                                      silc_server_connect_to_router_retry);
1033
1034   /* Create the connections to all our routes */
1035   for (ptr = server->config->routers; ptr; ptr = ptr->next) {
1036
1037     SILC_LOG_DEBUG(("%s connection [%s] %s:%d",
1038                     ptr->backup_router ? "Backup router" : "Router",
1039                     ptr->initiator ? "Initiator" : "Responder",
1040                     ptr->host, ptr->port));
1041
1042     if (server->server_type == SILC_ROUTER && ptr->backup_router &&
1043         ptr->initiator == FALSE && !server->backup_router &&
1044         !silc_server_config_get_backup_router(server))
1045       server->wait_backup = TRUE;
1046
1047     if (ptr->initiator) {
1048       /* Check whether we are connected to this host already */
1049       if (silc_server_num_sockets_by_remote(server, 
1050                                             silc_net_is_ip(ptr->host) ?
1051                                             ptr->host : NULL,
1052                                             silc_net_is_ip(ptr->host) ?
1053                                             NULL : ptr->host, ptr->port,
1054                                             SILC_SOCKET_TYPE_ROUTER)) {
1055         SILC_LOG_DEBUG(("We are already connected to this router"));
1056         continue;
1057       }
1058
1059       /* Allocate connection object for hold connection specific stuff. */
1060       sconn = silc_calloc(1, sizeof(*sconn));
1061       sconn->remote_host = strdup(ptr->host);
1062       sconn->remote_port = ptr->port;
1063       sconn->backup = ptr->backup_router;
1064       if (sconn->backup) {
1065         sconn->backup_replace_ip = strdup(ptr->backup_replace_ip);
1066         sconn->backup_replace_port = ptr->backup_replace_port;
1067       }
1068
1069       if (!server->router_conn && !sconn->backup)
1070         server->router_conn = sconn;
1071
1072       silc_schedule_task_add(server->schedule, 0,
1073                              silc_server_connect_router,
1074                              (void *)sconn, 0, 1, SILC_TASK_TIMEOUT,
1075                              SILC_TASK_PRI_NORMAL);
1076     }
1077   }
1078 }
1079
1080 /* Second part of connecting to router(s). Key exchange protocol has been
1081    executed and now we will execute authentication protocol. */
1082
1083 SILC_TASK_CALLBACK(silc_server_connect_to_router_second)
1084 {
1085   SilcProtocol protocol = (SilcProtocol)context;
1086   SilcServerKEInternalContext *ctx =
1087     (SilcServerKEInternalContext *)protocol->context;
1088   SilcServer server = (SilcServer)ctx->server;
1089   SilcServerConnection sconn = (SilcServerConnection)ctx->context;
1090   SilcSocketConnection sock = ctx->sock;
1091   SilcServerConnAuthInternalContext *proto_ctx;
1092   SilcServerConfigRouter *conn = NULL;
1093
1094   SILC_LOG_DEBUG(("Start"));
1095
1096   if (protocol->state == SILC_PROTOCOL_STATE_ERROR ||
1097       protocol->state == SILC_PROTOCOL_STATE_FAILURE) {
1098     /* Error occured during protocol */
1099     silc_protocol_free(protocol);
1100     sock->protocol = NULL;
1101     silc_ske_free_key_material(ctx->keymat);
1102     if (ctx->packet)
1103       silc_packet_context_free(ctx->packet);
1104     if (ctx->ske)
1105       silc_ske_free(ctx->ske);
1106     silc_free(ctx->dest_id);
1107     silc_free(ctx);
1108     silc_schedule_task_del_by_callback(server->schedule,
1109                                        silc_server_failure_callback);
1110     silc_server_disconnect_remote(server, sock, 
1111                                   SILC_STATUS_ERR_KEY_EXCHANGE_FAILED, NULL);
1112
1113     /* Try reconnecting if configuration wants it */
1114     if (!sconn->no_reconnect) {
1115       silc_schedule_task_add(server->schedule, 0,
1116                              silc_server_connect_to_router_retry,
1117                              sconn, 0, 1, SILC_TASK_TIMEOUT,
1118                              SILC_TASK_PRI_NORMAL);
1119       return;
1120     }
1121
1122     /* Call completion to indicate error */
1123     if (sconn->callback)
1124       (*sconn->callback)(server, NULL, sconn->callback_context);
1125
1126     silc_server_config_unref(&sconn->conn);
1127     silc_free(sconn->remote_host);
1128     silc_free(sconn->backup_replace_ip);
1129     silc_free(sconn);
1130     return;
1131   }
1132
1133   /* We now have the key material as the result of the key exchange
1134      protocol. Take the key material into use. Free the raw key material
1135      as soon as we've set them into use. */
1136   if (!silc_server_protocol_ke_set_keys(server, ctx->ske,
1137                                         ctx->sock, ctx->keymat,
1138                                         ctx->ske->prop->cipher,
1139                                         ctx->ske->prop->pkcs,
1140                                         ctx->ske->prop->hash,
1141                                         ctx->ske->prop->hmac,
1142                                         ctx->ske->prop->group,
1143                                         ctx->responder)) {
1144     silc_protocol_free(protocol);
1145     sock->protocol = NULL;
1146     silc_ske_free_key_material(ctx->keymat);
1147     if (ctx->packet)
1148       silc_packet_context_free(ctx->packet);
1149     if (ctx->ske)
1150       silc_ske_free(ctx->ske);
1151     silc_free(ctx->dest_id);
1152     silc_free(ctx);
1153     silc_schedule_task_del_by_callback(server->schedule,
1154                                        silc_server_failure_callback);
1155     silc_server_disconnect_remote(server, sock, 
1156                                   SILC_STATUS_ERR_KEY_EXCHANGE_FAILED, NULL);
1157
1158     /* Try reconnecting if configuration wants it */
1159     if (!sconn->no_reconnect) {
1160       silc_schedule_task_add(server->schedule, 0,
1161                              silc_server_connect_to_router_retry,
1162                              sconn, 0, 1, SILC_TASK_TIMEOUT,
1163                              SILC_TASK_PRI_NORMAL);
1164       return;
1165     }
1166
1167     /* Call completion to indicate error */
1168     if (sconn->callback)
1169       (*sconn->callback)(server, NULL, sconn->callback_context);
1170
1171     silc_server_config_unref(&sconn->conn);
1172     silc_free(sconn->remote_host);
1173     silc_free(sconn->backup_replace_ip);
1174     silc_free(sconn);
1175     return;
1176   }
1177   silc_ske_free_key_material(ctx->keymat);
1178
1179   /* Allocate internal context for the authentication protocol. This
1180      is sent as context for the protocol. */
1181   proto_ctx = silc_calloc(1, sizeof(*proto_ctx));
1182   proto_ctx->server = (void *)server;
1183   proto_ctx->context = (void *)sconn;
1184   proto_ctx->sock = sock;
1185   proto_ctx->ske = ctx->ske;       /* Save SKE object from previous protocol */
1186   proto_ctx->dest_id_type = ctx->dest_id_type;
1187   proto_ctx->dest_id = ctx->dest_id;
1188
1189   /* Resolve the authentication method used in this connection. Check if
1190      we find a match from user configured connections */
1191   if (!sconn->conn.ref_ptr)
1192     conn = silc_server_config_find_router_conn(server, sock->hostname,
1193                                                sock->port);
1194   else
1195     conn = sconn->conn.ref_ptr;
1196
1197   if (conn) {
1198     /* Match found. Use the configured authentication method. Take only
1199        the passphrase, since for public key auth we automatically use
1200        our local key pair. */
1201     if (conn->passphrase) {
1202       if (conn->publickeys && !server->config->prefer_passphrase_auth) {
1203         proto_ctx->auth_meth = SILC_AUTH_PUBLIC_KEY;
1204       } else {
1205         proto_ctx->auth_data = strdup(conn->passphrase);
1206         proto_ctx->auth_data_len = strlen(conn->passphrase);
1207         proto_ctx->auth_meth = SILC_AUTH_PASSWORD;
1208       }
1209     } else if (conn->publickeys) {
1210       proto_ctx->auth_meth = SILC_AUTH_PUBLIC_KEY;
1211     } else {
1212       proto_ctx->auth_meth = SILC_AUTH_NONE;
1213     }
1214   } else {
1215     SILC_LOG_ERROR(("Could not find connection data for %s (%s) on port",
1216                     sock->hostname, sock->ip, sock->port));
1217     silc_protocol_free(protocol);
1218     sock->protocol = NULL;
1219     if (ctx->packet)
1220       silc_packet_context_free(ctx->packet);
1221     if (ctx->ske)
1222       silc_ske_free(ctx->ske);
1223     silc_free(ctx->dest_id);
1224     silc_free(ctx);
1225     silc_server_config_unref(&sconn->conn);
1226     silc_free(sconn->remote_host);
1227     silc_free(sconn->backup_replace_ip);
1228     silc_free(sconn);
1229     silc_schedule_task_del_by_callback(server->schedule,
1230                                        silc_server_failure_callback);
1231     silc_server_disconnect_remote(server, sock, 
1232                                   SILC_STATUS_ERR_KEY_EXCHANGE_FAILED, NULL);
1233     return;
1234   }
1235
1236   /* Free old protocol as it is finished now */
1237   silc_protocol_free(protocol);
1238   if (ctx->packet)
1239     silc_packet_context_free(ctx->packet);
1240   silc_free(ctx);
1241   sock->protocol = NULL;
1242
1243   /* Allocate the authentication protocol. This is allocated here
1244      but we won't start it yet. We will be receiving party of this
1245      protocol thus we will wait that connecting party will make
1246      their first move. */
1247   silc_protocol_alloc(SILC_PROTOCOL_SERVER_CONNECTION_AUTH,
1248                       &sock->protocol, proto_ctx,
1249                       silc_server_connect_to_router_final);
1250
1251   /* Register timeout task. If the protocol is not executed inside
1252      this timelimit the connection will be terminated. */
1253   proto_ctx->timeout_task =
1254     silc_schedule_task_add(server->schedule, sock->sock,
1255                            silc_server_timeout_remote,
1256                            (void *)server,
1257                            server->config->conn_auth_timeout, 0,
1258                            SILC_TASK_TIMEOUT,
1259                            SILC_TASK_PRI_LOW);
1260
1261   /* Run the protocol */
1262   silc_protocol_execute(sock->protocol, server->schedule, 0, 0);
1263 }
1264
1265 /* Finalizes the connection to router. Registers a server task to the
1266    queue so that we can accept new connections. */
1267
1268 SILC_TASK_CALLBACK(silc_server_connect_to_router_final)
1269 {
1270   SilcProtocol protocol = (SilcProtocol)context;
1271   SilcServerConnAuthInternalContext *ctx =
1272     (SilcServerConnAuthInternalContext *)protocol->context;
1273   SilcServer server = (SilcServer)ctx->server;
1274   SilcServerConnection sconn = (SilcServerConnection)ctx->context;
1275   SilcSocketConnection sock = ctx->sock;
1276   SilcServerEntry id_entry = NULL;
1277   SilcBuffer packet;
1278   unsigned char *id_string;
1279   SilcUInt32 id_len;
1280   SilcIDListData idata;
1281   SilcServerConfigRouter *conn = NULL;
1282   SilcServerConfigConnParams *param = NULL;
1283
1284   SILC_LOG_DEBUG(("Start"));
1285
1286   if (protocol->state == SILC_PROTOCOL_STATE_ERROR ||
1287       protocol->state == SILC_PROTOCOL_STATE_FAILURE) {
1288     /* Error occured during protocol */
1289     silc_free(ctx->dest_id);
1290     silc_server_disconnect_remote(server, sock, SILC_STATUS_ERR_AUTH_FAILED,
1291                                   NULL);
1292
1293     /* Try reconnecting if configuration wants it */
1294     if (!sconn->no_reconnect) {
1295       silc_schedule_task_add(server->schedule, 0,
1296                              silc_server_connect_to_router_retry,
1297                              sconn, 0, 1, SILC_TASK_TIMEOUT,
1298                              SILC_TASK_PRI_NORMAL);
1299       goto out2;
1300     }
1301
1302     goto out;
1303   }
1304
1305   /* Add a task to the queue. This task receives new connections to the
1306      server. This task remains on the queue until the end of the program. */
1307   if (!server->listenning && !sconn->backup) {
1308     silc_schedule_task_add(server->schedule, server->sock,
1309                            silc_server_accept_new_connection,
1310                            (void *)server, 0, 0,
1311                            SILC_TASK_FD,
1312                            SILC_TASK_PRI_NORMAL);
1313     server->listenning = TRUE;
1314   }
1315
1316   /* Send NEW_SERVER packet to the router. We will become registered
1317      to the SILC network after sending this packet. */
1318   id_string = silc_id_id2str(server->id, SILC_ID_SERVER);
1319   id_len = silc_id_get_len(server->id, SILC_ID_SERVER);
1320   packet = silc_buffer_alloc(2 + 2 + id_len + strlen(server->server_name));
1321   silc_buffer_pull_tail(packet, SILC_BUFFER_END(packet));
1322   silc_buffer_format(packet,
1323                      SILC_STR_UI_SHORT(id_len),
1324                      SILC_STR_UI_XNSTRING(id_string, id_len),
1325                      SILC_STR_UI_SHORT(strlen(server->server_name)),
1326                      SILC_STR_UI_XNSTRING(server->server_name,
1327                                           strlen(server->server_name)),
1328                      SILC_STR_END);
1329
1330   /* Send the packet */
1331   silc_server_packet_send(server, ctx->sock, SILC_PACKET_NEW_SERVER, 0,
1332                           packet->data, packet->len, TRUE);
1333   silc_buffer_free(packet);
1334   silc_free(id_string);
1335
1336   SILC_LOG_INFO(("Connected to router %s", sock->hostname));
1337
1338   /* Check that we do not have this ID already */
1339   id_entry = silc_idlist_find_server_by_id(server->local_list,
1340                                            ctx->dest_id, TRUE, NULL);
1341   if (id_entry) {
1342     silc_idcache_del_by_context(server->local_list->servers, id_entry);
1343   } else {
1344     id_entry = silc_idlist_find_server_by_id(server->global_list,
1345                                              ctx->dest_id, TRUE, NULL);
1346     if (id_entry)
1347       silc_idcache_del_by_context(server->global_list->servers, id_entry);
1348   }
1349
1350   SILC_LOG_DEBUG(("New server id(%s)",
1351                   silc_id_render(ctx->dest_id, SILC_ID_SERVER)));
1352
1353   /* Add the connected router to global server list.  Router is sent
1354      as NULL since it's local to us. */
1355   id_entry = silc_idlist_add_server(server->global_list,
1356                                     strdup(sock->hostname),
1357                                     SILC_ROUTER, ctx->dest_id, NULL, sock);
1358   if (!id_entry) {
1359     silc_free(ctx->dest_id);
1360     SILC_LOG_ERROR(("Cannot add new server entry to cache"));
1361     silc_server_disconnect_remote(server, sock, SILC_STATUS_ERR_AUTH_FAILED,
1362                                   NULL);
1363     goto out;
1364   }
1365
1366   silc_idlist_add_data(id_entry, (SilcIDListData)sock->user_data);
1367   silc_free(sock->user_data);
1368   sock->user_data = (void *)id_entry;
1369   sock->type = SILC_SOCKET_TYPE_ROUTER;
1370   idata = (SilcIDListData)sock->user_data;
1371   idata->status |= (SILC_IDLIST_STATUS_REGISTERED |
1372                     SILC_IDLIST_STATUS_LOCAL);
1373
1374   conn = sconn->conn.ref_ptr;
1375   param = &server->config->param;
1376   if (conn && conn->param)
1377     param = conn->param;
1378
1379   /* Perform keepalive. The `hb_context' will be freed automatically
1380      when finally calling the silc_socket_free function. */
1381   silc_socket_set_heartbeat(sock, param->keepalive_secs, server,
1382                             silc_server_perform_heartbeat,
1383                             server->schedule);
1384
1385   /* Register re-key timeout */
1386   idata->rekey->timeout = param->key_exchange_rekey;
1387   silc_schedule_task_add(server->schedule, sock->sock,
1388                          silc_server_rekey_callback,
1389                          (void *)sock, idata->rekey->timeout, 0,
1390                          SILC_TASK_TIMEOUT, SILC_TASK_PRI_NORMAL);
1391
1392   if (!sconn->backup) {
1393     /* Mark this router our primary router if we're still standalone */
1394     if (server->standalone) {
1395       SILC_LOG_DEBUG(("This connection is our primary router"));
1396       server->id_entry->router = id_entry;
1397       server->router = id_entry;
1398       server->standalone = FALSE;
1399
1400       /* If we are router then announce our possible servers.  Backup
1401          router announces also global servers. */
1402       if (server->server_type == SILC_ROUTER)
1403         silc_server_announce_servers(server,
1404                                      server->backup_router ? TRUE : FALSE,
1405                                      0, SILC_PRIMARY_ROUTE(server));
1406
1407       /* Announce our clients and channels to the router */
1408       silc_server_announce_clients(server, 0, SILC_PRIMARY_ROUTE(server));
1409       silc_server_announce_channels(server, 0, SILC_PRIMARY_ROUTE(server));
1410
1411       /* If we are backup router then this primary router is whom we are
1412          backing up. */
1413       if (server->server_type == SILC_BACKUP_ROUTER)
1414         silc_server_backup_add(server, server->id_entry, sock->ip, 0, TRUE);
1415     }
1416   } else {
1417     /* Add this server to be our backup router */
1418     silc_server_backup_add(server, id_entry, sconn->backup_replace_ip,
1419                            sconn->backup_replace_port, FALSE);
1420   }
1421
1422   sock->protocol = NULL;
1423
1424  out:
1425   /* Call the completion callback to indicate that we've connected to
1426      the router */
1427   if (sconn && sconn->callback)
1428     (*sconn->callback)(server, id_entry, sconn->callback_context);
1429
1430   /* Free the temporary connection data context */
1431   if (sconn) {
1432     silc_server_config_unref(&sconn->conn);
1433     silc_free(sconn->remote_host);
1434     silc_free(sconn->backup_replace_ip);
1435     silc_free(sconn);
1436   }
1437   if (sconn == server->router_conn)
1438     server->router_conn = NULL;
1439
1440  out2:
1441   /* Free the protocol object */
1442   if (sock->protocol == protocol)
1443     sock->protocol = NULL;
1444   silc_protocol_free(protocol);
1445   if (ctx->packet)
1446     silc_packet_context_free(ctx->packet);
1447   if (ctx->ske)
1448     silc_ske_free(ctx->ske);
1449   if (ctx->auth_meth == SILC_AUTH_PASSWORD)
1450     silc_free(ctx->auth_data);
1451   silc_free(ctx);
1452 }
1453
1454 /* Host lookup callback that is called after the incoming connection's
1455    IP and FQDN lookup is performed. This will actually check the acceptance
1456    of the incoming connection and will register the key exchange protocol
1457    for this connection. */
1458
1459 static void
1460 silc_server_accept_new_connection_lookup(SilcSocketConnection sock,
1461                                          void *context)
1462 {
1463   SilcServerKEInternalContext *proto_ctx =
1464     (SilcServerKEInternalContext *)context;
1465   SilcServer server = (SilcServer)proto_ctx->server;
1466   SilcServerConfigClient *cconfig = NULL;
1467   SilcServerConfigServer *sconfig = NULL;
1468   SilcServerConfigRouter *rconfig = NULL;
1469   SilcServerConfigDeny *deny;
1470   int port;
1471
1472   /* Check whether we could resolve both IP and FQDN. */
1473   if (!sock->ip || (!strcmp(sock->ip, sock->hostname) &&
1474                     server->config->require_reverse_lookup)) {
1475     SILC_LOG_ERROR(("IP/DNS lookup failed %s",
1476                     sock->hostname ? sock->hostname :
1477                     sock->ip ? sock->ip : ""));
1478     server->stat.conn_failures++;
1479     silc_server_disconnect_remote(server, sock,
1480                                   SILC_STATUS_ERR_INCOMPLETE_INFORMATION,
1481                                   "Unknown host or IP");
1482     silc_free(proto_ctx);
1483     return;
1484   }
1485
1486   /* Register the connection for network input and output. This sets
1487      that scheduler will listen for incoming packets for this connection
1488      and sets that outgoing packets may be sent to this connection as well.
1489      However, this doesn't set the scheduler for outgoing traffic, it
1490      will be set separately by calling SILC_SET_CONNECTION_FOR_OUTPUT,
1491      later when outgoing data is available. */
1492   context = (void *)server;
1493   SILC_REGISTER_CONNECTION_FOR_IO(sock->sock);
1494
1495   SILC_LOG_INFO(("Incoming connection %s (%s)", sock->hostname,
1496                  sock->ip));
1497
1498   /* Listenning port */
1499   if (!server->sockets[(SilcUInt32)proto_ctx->context]) {
1500     silc_server_disconnect_remote(server, sock,
1501                                   SILC_STATUS_ERR_RESOURCE_LIMIT,
1502                                   "Connection refused");
1503     server->stat.conn_failures++;
1504     silc_free(proto_ctx);
1505     return;
1506   }
1507   port = server->sockets[(SilcUInt32)proto_ctx->context]->port;
1508
1509   /* Check whether this connection is denied to connect to us. */
1510   deny = silc_server_config_find_denied(server, sock->ip);
1511   if (!deny)
1512     deny = silc_server_config_find_denied(server, sock->hostname);
1513   if (deny) {
1514     /* The connection is denied */
1515     SILC_LOG_INFO(("Connection %s (%s) is denied",
1516                    sock->hostname, sock->ip));
1517     silc_server_disconnect_remote(server, sock,
1518                                   SILC_STATUS_ERR_BANNED_FROM_SERVER,
1519                                   deny->reason);
1520     server->stat.conn_failures++;
1521     silc_free(proto_ctx);
1522     return;
1523   }
1524
1525   /* Check whether we have configured this sort of connection at all. We
1526      have to check all configurations since we don't know what type of
1527      connection this is. */
1528   if (!(cconfig = silc_server_config_find_client(server, sock->ip)))
1529     cconfig = silc_server_config_find_client(server, sock->hostname);
1530   if (!(sconfig = silc_server_config_find_server_conn(server, sock->ip)))
1531     sconfig = silc_server_config_find_server_conn(server, sock->hostname);
1532   if (server->server_type == SILC_ROUTER) {
1533     if (!(rconfig = silc_server_config_find_router_conn(server,
1534                                                         sock->ip, sock->port)))
1535       rconfig = silc_server_config_find_router_conn(server, sock->hostname,
1536                                                     sock->port);
1537   }
1538   if (!cconfig && !sconfig && !rconfig) {
1539     SILC_LOG_INFO(("Connection %s (%s) is not allowed", sock->hostname,
1540                    sock->ip));
1541     silc_server_disconnect_remote(server, sock,
1542                                   SILC_STATUS_ERR_BANNED_FROM_SERVER, NULL);
1543     server->stat.conn_failures++;
1544     silc_free(proto_ctx);
1545     return;
1546   }
1547
1548   /* The connection is allowed */
1549
1550   /* Set internal context for key exchange protocol. This is
1551      sent as context for the protocol. */
1552   proto_ctx->sock = sock;
1553   proto_ctx->rng = server->rng;
1554   proto_ctx->responder = TRUE;
1555   silc_server_config_ref(&proto_ctx->cconfig, server->config, cconfig);
1556   silc_server_config_ref(&proto_ctx->sconfig, server->config, sconfig);
1557   silc_server_config_ref(&proto_ctx->rconfig, server->config, rconfig);
1558
1559   /* Take flags for key exchange. Since we do not know what type of connection
1560      this is, we go through all found configurations and use the global ones
1561      as well. This will result always into strictest key exchange flags. */
1562   SILC_GET_SKE_FLAGS(cconfig, proto_ctx);
1563   SILC_GET_SKE_FLAGS(sconfig, proto_ctx);
1564   SILC_GET_SKE_FLAGS(rconfig, proto_ctx);
1565   if (server->config->param.key_exchange_pfs)
1566     proto_ctx->flags |= SILC_SKE_SP_FLAG_PFS;
1567
1568   /* Prepare the connection for key exchange protocol. We allocate the
1569      protocol but will not start it yet. The connector will be the
1570      initiator of the protocol thus we will wait for initiation from
1571      there before we start the protocol. */
1572   server->stat.auth_attempts++;
1573   SILC_LOG_DEBUG(("Starting key exchange protocol"));
1574   silc_protocol_alloc(SILC_PROTOCOL_SERVER_KEY_EXCHANGE,
1575                       &sock->protocol, proto_ctx,
1576                       silc_server_accept_new_connection_second);
1577
1578   /* Register a timeout task that will be executed if the connector
1579      will not start the key exchange protocol within specified timeout
1580      and the connection will be closed. */
1581   proto_ctx->timeout_task =
1582     silc_schedule_task_add(server->schedule, sock->sock,
1583                            silc_server_timeout_remote,
1584                            (void *)server,
1585                            server->config->key_exchange_timeout, 0,
1586                            SILC_TASK_TIMEOUT,
1587                            SILC_TASK_PRI_LOW);
1588 }
1589
1590 /* Accepts new connections to the server. Accepting new connections are
1591    done in three parts to make it async. */
1592
1593 SILC_TASK_CALLBACK(silc_server_accept_new_connection)
1594 {
1595   SilcServer server = (SilcServer)context;
1596   SilcSocketConnection newsocket;
1597   SilcServerKEInternalContext *proto_ctx;
1598   int sock;
1599
1600   SILC_LOG_DEBUG(("Accepting new connection"));
1601
1602   server->stat.conn_attempts++;
1603
1604   sock = silc_net_accept_connection(fd);
1605   if (sock < 0) {
1606     SILC_LOG_ERROR(("Could not accept new connection: %s", strerror(errno)));
1607     server->stat.conn_failures++;
1608     return;
1609   }
1610
1611   /* Check for maximum allowed connections */
1612   if (sock > server->config->param.connections_max) {
1613     SILC_LOG_ERROR(("Refusing connection, server is full"));
1614     server->stat.conn_failures++;
1615     silc_net_close_connection(sock);
1616     return;
1617   }
1618
1619   /* Set socket options */
1620   silc_net_set_socket_nonblock(sock);
1621   silc_net_set_socket_opt(sock, SOL_SOCKET, SO_REUSEADDR, 1);
1622
1623   /* We don't create a ID yet, since we don't know what type of connection
1624      this is yet. But, we do add the connection to the socket table. */
1625   silc_socket_alloc(sock, SILC_SOCKET_TYPE_UNKNOWN, NULL, &newsocket);
1626   server->sockets[sock] = newsocket;
1627
1628   /* Perform asynchronous host lookup. This will lookup the IP and the
1629      FQDN of the remote connection. After the lookup is done the connection
1630      is accepted further. */
1631   proto_ctx = silc_calloc(1, sizeof(*proto_ctx));
1632   proto_ctx->server = server;
1633   proto_ctx->context = (void *)fd;
1634   silc_socket_host_lookup(newsocket, TRUE,
1635                           silc_server_accept_new_connection_lookup,
1636                           (void *)proto_ctx, server->schedule);
1637 }
1638
1639 /* Second part of accepting new connection. Key exchange protocol has been
1640    performed and now it is time to do little connection authentication
1641    protocol to figure out whether this connection is client or server
1642    and whether it has right to access this server (especially server
1643    connections needs to be authenticated). */
1644
1645 SILC_TASK_CALLBACK(silc_server_accept_new_connection_second)
1646 {
1647   SilcProtocol protocol = (SilcProtocol)context;
1648   SilcServerKEInternalContext *ctx =
1649     (SilcServerKEInternalContext *)protocol->context;
1650   SilcServer server = (SilcServer)ctx->server;
1651   SilcSocketConnection sock = ctx->sock;
1652   SilcServerConnAuthInternalContext *proto_ctx;
1653
1654   SILC_LOG_DEBUG(("Start"));
1655
1656   if ((protocol->state == SILC_PROTOCOL_STATE_ERROR) ||
1657       (protocol->state == SILC_PROTOCOL_STATE_FAILURE)) {
1658     /* Error occured during protocol */
1659     SILC_LOG_DEBUG(("Error key exchange protocol"));
1660     silc_protocol_free(protocol);
1661     sock->protocol = NULL;
1662     silc_ske_free_key_material(ctx->keymat);
1663     if (ctx->packet)
1664       silc_packet_context_free(ctx->packet);
1665     if (ctx->ske)
1666       silc_ske_free(ctx->ske);
1667     silc_free(ctx->dest_id);
1668     silc_server_config_unref(&ctx->cconfig);
1669     silc_server_config_unref(&ctx->sconfig);
1670     silc_server_config_unref(&ctx->rconfig);
1671     silc_free(ctx);
1672     silc_schedule_task_del_by_callback(server->schedule,
1673                                        silc_server_failure_callback);
1674     silc_server_disconnect_remote(server, sock, 
1675                                   SILC_STATUS_ERR_KEY_EXCHANGE_FAILED,
1676                                   NULL);
1677     server->stat.auth_failures++;
1678     return;
1679   }
1680
1681   /* We now have the key material as the result of the key exchange
1682      protocol. Take the key material into use. Free the raw key material
1683      as soon as we've set them into use. */
1684   if (!silc_server_protocol_ke_set_keys(server, ctx->ske,
1685                                         ctx->sock, ctx->keymat,
1686                                         ctx->ske->prop->cipher,
1687                                         ctx->ske->prop->pkcs,
1688                                         ctx->ske->prop->hash,
1689                                         ctx->ske->prop->hmac,
1690                                         ctx->ske->prop->group,
1691                                         ctx->responder)) {
1692     SILC_LOG_ERROR(("Error setting key material in use"));
1693     silc_protocol_free(protocol);
1694     sock->protocol = NULL;
1695     silc_ske_free_key_material(ctx->keymat);
1696     if (ctx->packet)
1697       silc_packet_context_free(ctx->packet);
1698     if (ctx->ske)
1699       silc_ske_free(ctx->ske);
1700     silc_free(ctx->dest_id);
1701     silc_server_config_unref(&ctx->cconfig);
1702     silc_server_config_unref(&ctx->sconfig);
1703     silc_server_config_unref(&ctx->rconfig);
1704     silc_free(ctx);
1705     silc_schedule_task_del_by_callback(server->schedule,
1706                                        silc_server_failure_callback);
1707     silc_server_disconnect_remote(server, sock, 
1708                                   SILC_STATUS_ERR_KEY_EXCHANGE_FAILED, NULL);
1709     server->stat.auth_failures++;
1710     return;
1711   }
1712   silc_ske_free_key_material(ctx->keymat);
1713
1714   /* Allocate internal context for the authentication protocol. This
1715      is sent as context for the protocol. */
1716   proto_ctx = silc_calloc(1, sizeof(*proto_ctx));
1717   proto_ctx->server = (void *)server;
1718   proto_ctx->sock = sock;
1719   proto_ctx->ske = ctx->ske;    /* Save SKE object from previous protocol */
1720   proto_ctx->responder = TRUE;
1721   proto_ctx->dest_id_type = ctx->dest_id_type;
1722   proto_ctx->dest_id = ctx->dest_id;
1723   proto_ctx->cconfig = ctx->cconfig;
1724   proto_ctx->sconfig = ctx->sconfig;
1725   proto_ctx->rconfig = ctx->rconfig;
1726
1727   /* Free old protocol as it is finished now */
1728   silc_protocol_free(protocol);
1729   if (ctx->packet)
1730     silc_packet_context_free(ctx->packet);
1731   silc_free(ctx);
1732   sock->protocol = NULL;
1733
1734   /* Allocate the authentication protocol. This is allocated here
1735      but we won't start it yet. We will be receiving party of this
1736      protocol thus we will wait that connecting party will make
1737      their first move. */
1738   SILC_LOG_DEBUG(("Starting connection authentication protocol"));
1739   silc_protocol_alloc(SILC_PROTOCOL_SERVER_CONNECTION_AUTH,
1740                       &sock->protocol, proto_ctx,
1741                       silc_server_accept_new_connection_final);
1742
1743   /* Register timeout task. If the protocol is not executed inside
1744      this timelimit the connection will be terminated. */
1745   proto_ctx->timeout_task =
1746     silc_schedule_task_add(server->schedule, sock->sock,
1747                            silc_server_timeout_remote,
1748                            (void *)server,
1749                            server->config->conn_auth_timeout, 0,
1750                            SILC_TASK_TIMEOUT,
1751                            SILC_TASK_PRI_LOW);
1752 }
1753
1754 /* After this is called, server don't wait for backup router anymore.  
1755    This gets called automatically even after we have backup router
1756    connection established. */
1757
1758 SILC_TASK_CALLBACK(silc_server_backup_router_wait)
1759 {
1760   SilcServer server = context;
1761   server->wait_backup = FALSE;
1762 }
1763
1764 /* Final part of accepting new connection. The connection has now
1765    been authenticated and keys has been exchanged. We also know whether
1766    this is client or server connection. */
1767
1768 SILC_TASK_CALLBACK(silc_server_accept_new_connection_final)
1769 {
1770   SilcProtocol protocol = (SilcProtocol)context;
1771   SilcServerConnAuthInternalContext *ctx =
1772     (SilcServerConnAuthInternalContext *)protocol->context;
1773   SilcServer server = (SilcServer)ctx->server;
1774   SilcSocketConnection sock = ctx->sock;
1775   SilcUnknownEntry entry = (SilcUnknownEntry)sock->user_data;
1776   void *id_entry;
1777   SilcUInt32 hearbeat_timeout = server->config->param.keepalive_secs;
1778
1779   if (protocol->state == SILC_PROTOCOL_STATE_ERROR ||
1780       protocol->state == SILC_PROTOCOL_STATE_FAILURE) {
1781     /* Error occured during protocol */
1782     SILC_LOG_DEBUG(("Error during authentication protocol"));
1783     silc_protocol_free(protocol);
1784     sock->protocol = NULL;
1785     if (ctx->packet)
1786       silc_packet_context_free(ctx->packet);
1787     if (ctx->ske)
1788       silc_ske_free(ctx->ske);
1789     silc_free(ctx->dest_id);
1790     silc_server_config_unref(&ctx->cconfig);
1791     silc_server_config_unref(&ctx->sconfig);
1792     silc_server_config_unref(&ctx->rconfig);
1793     silc_free(ctx);
1794     silc_schedule_task_del_by_callback(server->schedule,
1795                                        silc_server_failure_callback);
1796     silc_server_disconnect_remote(server, sock, SILC_STATUS_ERR_AUTH_FAILED,
1797                                   NULL);
1798     server->stat.auth_failures++;
1799     return;
1800   }
1801
1802   entry->data.last_receive = time(NULL);
1803
1804   switch (ctx->conn_type) {
1805   case SILC_SOCKET_TYPE_CLIENT:
1806     {
1807       SilcClientEntry client;
1808       SilcServerConfigClient *conn = ctx->cconfig.ref_ptr;
1809
1810       /* Verify whether this connection is after all allowed to connect */
1811       if (!silc_server_connection_allowed(server, sock, ctx->conn_type,
1812                                           &server->config->param,
1813                                           conn->param, ctx->ske)) {
1814         server->stat.auth_failures++;
1815         goto out;
1816       }
1817
1818       /* If we are primary router and we have backup router configured
1819          but it has not connected to use yet, do not accept any other
1820          connection. */
1821       if (server->wait_backup && server->server_type == SILC_ROUTER &&
1822           !server->backup_router) {
1823         SilcServerConfigRouter *router;
1824         router = silc_server_config_get_backup_router(server);
1825         if (router && strcmp(server->config->server_info->primary->server_ip,
1826                              sock->ip) &&
1827             silc_server_find_socket_by_host(server,
1828                                             SILC_SOCKET_TYPE_SERVER,
1829                                             router->backup_replace_ip, 0)) {
1830           SILC_LOG_INFO(("Will not accept connections because we do "
1831                          "not have backup router connection established"));
1832           silc_server_disconnect_remote(server, sock, 
1833                                         SILC_STATUS_ERR_PERM_DENIED,
1834                                         "We do not have connection to backup "
1835                                         "router established, try later");
1836           silc_free(sock->user_data);
1837           server->stat.auth_failures++;
1838
1839           /* From here on, wait 10 seconds for the backup router to appear. */
1840           silc_schedule_task_add(server->schedule, 0,
1841                                  silc_server_backup_router_wait,
1842                                  (void *)server, 10, 0,
1843                                  SILC_TASK_TIMEOUT, SILC_TASK_PRI_NORMAL);
1844           goto out;
1845         }
1846       }
1847
1848       SILC_LOG_DEBUG(("Remote host is client"));
1849       SILC_LOG_INFO(("Connection %s (%s) is client", sock->hostname,
1850                      sock->ip));
1851
1852       /* Add the client to the client ID cache. The nickname and Client ID
1853          and other information is created after we have received NEW_CLIENT
1854          packet from client. */
1855       client = silc_idlist_add_client(server->local_list,
1856                                       NULL, NULL, NULL, NULL, NULL, sock, 0);
1857       if (!client) {
1858         SILC_LOG_ERROR(("Could not add new client to cache"));
1859         silc_free(sock->user_data);
1860         silc_server_disconnect_remote(server, sock, 
1861                                       SILC_STATUS_ERR_AUTH_FAILED, NULL);
1862         server->stat.auth_failures++;
1863         goto out;
1864       }
1865       entry->data.status |= SILC_IDLIST_STATUS_LOCAL;
1866
1867       /* Statistics */
1868       server->stat.my_clients++;
1869       server->stat.clients++;
1870       server->stat.cell_clients++;
1871
1872       /* Get connection parameters */
1873       if (conn->param) {
1874         if (conn->param->keepalive_secs)
1875           hearbeat_timeout = conn->param->keepalive_secs;
1876
1877         /* Check if to be anonymous connection */
1878         if (conn->param->anonymous)
1879           client->mode |= SILC_UMODE_ANONYMOUS;
1880       }
1881
1882       id_entry = (void *)client;
1883       break;
1884     }
1885   case SILC_SOCKET_TYPE_SERVER:
1886   case SILC_SOCKET_TYPE_ROUTER:
1887     {
1888       SilcServerEntry new_server;
1889       bool initiator = FALSE;
1890       bool backup_local = FALSE;
1891       bool backup_router = FALSE;
1892       char *backup_replace_ip = NULL;
1893       SilcUInt16 backup_replace_port = 0;
1894       SilcServerConfigServer *sconn = ctx->sconfig.ref_ptr;
1895       SilcServerConfigRouter *rconn = ctx->rconfig.ref_ptr;
1896
1897       /* If we are backup router and this is incoming server connection
1898          and we do not have connection to primary router, do not allow
1899          the connection. */
1900       if (server->server_type == SILC_BACKUP_ROUTER &&
1901           ctx->conn_type == SILC_SOCKET_TYPE_SERVER &&
1902           !SILC_PRIMARY_ROUTE(server)) {
1903         SILC_LOG_INFO(("Will not accept server connection because we do "
1904                        "not have primary router connection established"));
1905         silc_server_disconnect_remote(server, sock, 
1906                                       SILC_STATUS_ERR_PERM_DENIED,
1907                                       "We do not have connection to primary "
1908                                       "router established, try later");
1909         silc_free(sock->user_data);
1910         server->stat.auth_failures++;
1911         goto out;
1912       }
1913
1914       if (ctx->conn_type == SILC_SOCKET_TYPE_ROUTER) {
1915         /* Verify whether this connection is after all allowed to connect */
1916         if (!silc_server_connection_allowed(server, sock, ctx->conn_type,
1917                                             &server->config->param,
1918                                             rconn ? rconn->param : NULL,
1919                                             ctx->ske)) {
1920           silc_free(sock->user_data);
1921           server->stat.auth_failures++;
1922           goto out;
1923         }
1924
1925         if (rconn) {
1926           if (rconn->param) {
1927             if (rconn->param->keepalive_secs)
1928               hearbeat_timeout = rconn->param->keepalive_secs;
1929           }
1930
1931           initiator = rconn->initiator;
1932           backup_local = rconn->backup_local;
1933           backup_router = rconn->backup_router;
1934           backup_replace_ip = rconn->backup_replace_ip;
1935           backup_replace_port = rconn->backup_replace_port;
1936         }
1937       }
1938
1939       if (ctx->conn_type == SILC_SOCKET_TYPE_SERVER) {
1940         /* Verify whether this connection is after all allowed to connect */
1941         if (!silc_server_connection_allowed(server, sock, ctx->conn_type,
1942                                             &server->config->param,
1943                                             sconn ? sconn->param : NULL,
1944                                             ctx->ske)) {
1945           silc_free(sock->user_data);
1946           server->stat.auth_failures++;
1947           goto out;
1948         }
1949         if (sconn) {
1950           if (sconn->param) {
1951             if (sconn->param->keepalive_secs)
1952               hearbeat_timeout = sconn->param->keepalive_secs;
1953           }
1954
1955           backup_router = sconn->backup_router;
1956         }
1957       }
1958
1959       /* If we are primary router and we have backup router configured
1960          but it has not connected to use yet, do not accept any other
1961          connection. */
1962       if (server->wait_backup && server->server_type == SILC_ROUTER &&
1963           !server->backup_router && !backup_router) {
1964         SilcServerConfigRouter *router;
1965         router = silc_server_config_get_backup_router(server);
1966         if (router && strcmp(server->config->server_info->primary->server_ip,
1967                              sock->ip) &&
1968             silc_server_find_socket_by_host(server,
1969                                             SILC_SOCKET_TYPE_SERVER,
1970                                             router->backup_replace_ip, 0)) {
1971           SILC_LOG_INFO(("Will not accept connections because we do "
1972                          "not have backup router connection established"));
1973           silc_server_disconnect_remote(server, sock, 
1974                                         SILC_STATUS_ERR_PERM_DENIED,
1975                                         "We do not have connection to backup "
1976                                         "router established, try later");
1977           silc_free(sock->user_data);
1978           server->stat.auth_failures++;
1979
1980           /* From here on, wait 10 seconds for the backup router to appear. */
1981           silc_schedule_task_add(server->schedule, 0,
1982                                  silc_server_backup_router_wait,
1983                                  (void *)server, 10, 0,
1984                                  SILC_TASK_TIMEOUT, SILC_TASK_PRI_NORMAL);
1985           goto out;
1986         }
1987       }
1988
1989       SILC_LOG_DEBUG(("Remote host is %s",
1990                       ctx->conn_type == SILC_SOCKET_TYPE_SERVER ?
1991                       "server" : (backup_router ?
1992                                   "backup router" : "router")));
1993       SILC_LOG_INFO(("Connection %s (%s) is %s", sock->hostname,
1994                      sock->ip, ctx->conn_type == SILC_SOCKET_TYPE_SERVER ?
1995                      "server" : (backup_router ?
1996                                  "backup router" : "router")));
1997
1998       /* Add the server into server cache. The server name and Server ID
1999          is updated after we have received NEW_SERVER packet from the
2000          server. We mark ourselves as router for this server if we really
2001          are router. */
2002       new_server =
2003         silc_idlist_add_server((ctx->conn_type == SILC_SOCKET_TYPE_SERVER ?
2004                                 server->local_list : (backup_router ?
2005                                                       server->local_list :
2006                                                       server->global_list)),
2007                                NULL,
2008                                (ctx->conn_type == SILC_SOCKET_TYPE_SERVER ?
2009                                 SILC_SERVER : SILC_ROUTER),
2010                                NULL,
2011                                (ctx->conn_type == SILC_SOCKET_TYPE_SERVER ?
2012                                 server->id_entry : (backup_router ?
2013                                                     server->id_entry : NULL)),
2014                                sock);
2015       if (!new_server) {
2016         SILC_LOG_ERROR(("Could not add new server to cache"));
2017         silc_free(sock->user_data);
2018         silc_server_disconnect_remote(server, sock, 
2019                                       SILC_STATUS_ERR_AUTH_FAILED, NULL);
2020         server->stat.auth_failures++;
2021         goto out;
2022       }
2023       entry->data.status |= SILC_IDLIST_STATUS_LOCAL;
2024
2025       id_entry = (void *)new_server;
2026
2027       /* If the incoming connection is router and marked as backup router
2028          then add it to be one of our backups */
2029       if (ctx->conn_type == SILC_SOCKET_TYPE_ROUTER && backup_router) {
2030         /* Change it back to SERVER type since that's what it really is. */
2031         if (backup_local)
2032           ctx->conn_type = SILC_SOCKET_TYPE_SERVER;
2033         new_server->server_type = SILC_BACKUP_ROUTER;
2034
2035         /* Remove the backup waiting with timeout */
2036         silc_schedule_task_add(server->schedule, 0,
2037                                silc_server_backup_router_wait,
2038                                (void *)server, 5, 0,
2039                                SILC_TASK_TIMEOUT, SILC_TASK_PRI_NORMAL);
2040       }
2041
2042       /* Statistics */
2043       if (ctx->conn_type == SILC_SOCKET_TYPE_SERVER) {
2044         server->stat.my_servers++;
2045       } else {
2046         server->stat.my_routers++;
2047         server->stat.routers++;
2048       }
2049       server->stat.servers++;
2050
2051       /* Check whether this connection is to be our primary router connection
2052          if we do not already have the primary route. */
2053       if (!backup_router &&
2054           server->standalone && ctx->conn_type == SILC_SOCKET_TYPE_ROUTER) {
2055         if (silc_server_config_is_primary_route(server) && !initiator)
2056           break;
2057
2058         SILC_LOG_DEBUG(("We are not standalone server anymore"));
2059         server->standalone = FALSE;
2060         if (!server->id_entry->router) {
2061           server->id_entry->router = id_entry;
2062           server->router = id_entry;
2063         }
2064       }
2065
2066       break;
2067     }
2068   default:
2069     goto out;
2070     break;
2071   }
2072
2073   sock->type = ctx->conn_type;
2074
2075   /* Add the common data structure to the ID entry. */
2076   silc_idlist_add_data(id_entry, (SilcIDListData)sock->user_data);
2077
2078   /* Add to sockets internal pointer for fast referencing */
2079   silc_free(sock->user_data);
2080   sock->user_data = id_entry;
2081
2082   /* Connection has been fully established now. Everything is ok. */
2083   SILC_LOG_DEBUG(("New connection authenticated"));
2084
2085   /* Perform keepalive. The `hb_context' will be freed automatically
2086      when finally calling the silc_socket_free function. */
2087   silc_socket_set_heartbeat(sock, hearbeat_timeout, server,
2088                             silc_server_perform_heartbeat,
2089                             server->schedule);
2090
2091  out:
2092   silc_schedule_task_del_by_callback(server->schedule,
2093                                      silc_server_failure_callback);
2094   silc_protocol_free(protocol);
2095   if (ctx->packet)
2096     silc_packet_context_free(ctx->packet);
2097   if (ctx->ske)
2098     silc_ske_free(ctx->ske);
2099   silc_free(ctx->dest_id);
2100   silc_server_config_unref(&ctx->cconfig);
2101   silc_server_config_unref(&ctx->sconfig);
2102   silc_server_config_unref(&ctx->rconfig);
2103   silc_free(ctx);
2104   sock->protocol = NULL;
2105 }
2106
2107 /* This function is used to read packets from network and send packets to
2108    network. This is usually a generic task. */
2109
2110 SILC_TASK_CALLBACK(silc_server_packet_process)
2111 {
2112   SilcServer server = (SilcServer)context;
2113   SilcSocketConnection sock = server->sockets[fd];
2114   SilcIDListData idata;
2115   SilcCipher cipher = NULL;
2116   SilcHmac hmac = NULL;
2117   SilcUInt32 sequence = 0;
2118   int ret;
2119
2120   if (!sock) {
2121     SILC_LOG_DEBUG(("Unknown socket connection"));
2122     return;
2123   }
2124
2125   /* Packet sending */
2126
2127   if (type == SILC_TASK_WRITE) {
2128     /* Do not send data to disconnected connection */
2129     if (SILC_IS_DISCONNECTED(sock)) {
2130       SILC_LOG_DEBUG(("Disconnected socket connection, cannot send"));
2131       return;
2132     }
2133
2134     server->stat.packets_sent++;
2135
2136     /* Send the packet */
2137     ret = silc_packet_send(sock, TRUE);
2138
2139     /* If returned -2 could not write to connection now, will do
2140        it later. */
2141     if (ret == -2)
2142       return;
2143
2144     if (ret == -1) {
2145       SILC_LOG_ERROR(("Error sending packet to connection "
2146                       "%s:%d [%s]", sock->hostname, sock->port,
2147                       (sock->type == SILC_SOCKET_TYPE_UNKNOWN ? "Unknown" :
2148                        sock->type == SILC_SOCKET_TYPE_CLIENT ? "Client" :
2149                        sock->type == SILC_SOCKET_TYPE_SERVER ? "Server" :
2150                        "Router")));
2151       return;
2152     }
2153
2154     /* The packet has been sent and now it is time to set the connection
2155        back to only for input. When there is again some outgoing data
2156        available for this connection it will be set for output as well.
2157        This call clears the output setting and sets it only for input. */
2158     SILC_SET_CONNECTION_FOR_INPUT(server->schedule, fd);
2159     SILC_UNSET_OUTBUF_PENDING(sock);
2160
2161     silc_buffer_clear(sock->outbuf);
2162     return;
2163   }
2164
2165   /* Packet receiving */
2166
2167   /* Read some data from connection */
2168   ret = silc_packet_receive(sock);
2169   if (ret < 0) {
2170
2171     if (ret == -1)
2172       SILC_LOG_ERROR(("Error receiving packet from connection "
2173                       "%s:%d [%s] %s", sock->hostname, sock->port,
2174                       (sock->type == SILC_SOCKET_TYPE_UNKNOWN ? "Unknown" :
2175                        sock->type == SILC_SOCKET_TYPE_CLIENT ? "Client" :
2176                        sock->type == SILC_SOCKET_TYPE_SERVER ? "Server" :
2177                        "Router"), strerror(errno)));
2178     return;
2179   }
2180
2181   /* EOF */
2182   if (ret == 0) {
2183     SILC_LOG_DEBUG(("Read EOF"));
2184
2185     /* If connection is disconnecting already we will finally
2186        close the connection */
2187     if (SILC_IS_DISCONNECTING(sock)) {
2188       if (sock->user_data)
2189         silc_server_free_sock_user_data(server, sock, NULL);
2190       silc_server_close_connection(server, sock);
2191       return;
2192     }
2193
2194     SILC_LOG_DEBUG(("Premature EOF from connection %d", sock->sock));
2195     SILC_SET_DISCONNECTING(sock);
2196
2197     if (sock->user_data) {
2198       char tmp[128];
2199       if (silc_socket_get_error(sock, tmp, sizeof(tmp) - 1))
2200         silc_server_free_sock_user_data(server, sock, tmp);
2201       else
2202         silc_server_free_sock_user_data(server, sock, NULL);
2203     } else if (server->router_conn && server->router_conn->sock == sock &&
2204              !server->router && server->standalone)
2205       silc_schedule_task_add(server->schedule, 0,
2206                              silc_server_connect_to_router,
2207                              server, 1, 0,
2208                              SILC_TASK_TIMEOUT,
2209                              SILC_TASK_PRI_NORMAL);
2210
2211     silc_server_close_connection(server, sock);
2212     return;
2213   }
2214
2215   /* If connection is disconnecting or disconnected we will ignore
2216      what we read. */
2217   if (SILC_IS_DISCONNECTING(sock) || SILC_IS_DISCONNECTED(sock)) {
2218     SILC_LOG_DEBUG(("Ignoring read data from disconnected connection"));
2219     return;
2220   }
2221
2222   /* Get keys and stuff from ID entry */
2223   idata = (SilcIDListData)sock->user_data;
2224   if (idata) {
2225     cipher = idata->receive_key;
2226     hmac = idata->hmac_receive;
2227     sequence = idata->psn_receive;
2228   }
2229
2230   /* Process the packet. This will call the parser that will then
2231      decrypt and parse the packet. */
2232   ret = silc_packet_receive_process(sock, server->server_type == SILC_ROUTER ?
2233                                     TRUE : FALSE, cipher, hmac, sequence,
2234                                     silc_server_packet_parse, server);
2235
2236   /* If processing failed the connection is closed. */
2237   if (!ret) {
2238     if (sock->user_data)
2239       silc_server_free_sock_user_data(server, sock, NULL);
2240     silc_server_close_connection(server, sock);
2241   }
2242 }
2243
2244 /* Parses whole packet, received earlier. */
2245
2246 SILC_TASK_CALLBACK(silc_server_packet_parse_real)
2247 {
2248   SilcPacketParserContext *parse_ctx = (SilcPacketParserContext *)context;
2249   SilcServer server = (SilcServer)parse_ctx->context;
2250   SilcSocketConnection sock = parse_ctx->sock;
2251   SilcPacketContext *packet = parse_ctx->packet;
2252   SilcIDListData idata = (SilcIDListData)sock->user_data;
2253   int ret;
2254
2255   server->stat.packets_received++;
2256
2257   /* Parse the packet */
2258   if (parse_ctx->normal)
2259     ret = silc_packet_parse(packet, idata ? idata->receive_key : NULL);
2260   else
2261     ret = silc_packet_parse_special(packet, idata ? idata->receive_key : NULL);
2262
2263   /* If entry is disabled ignore what we got. */
2264   if (idata && idata->status & SILC_IDLIST_STATUS_DISABLED && 
2265       ret != SILC_PACKET_HEARTBEAT && ret != SILC_PACKET_RESUME_ROUTER &&
2266       ret != SILC_PACKET_REKEY && ret != SILC_PACKET_REKEY_DONE) {
2267     SILC_LOG_DEBUG(("Connection is disabled"));
2268     goto out;
2269   }
2270
2271   if (ret == SILC_PACKET_NONE) {
2272     SILC_LOG_DEBUG(("Error parsing packet"));
2273     goto out;
2274   }
2275
2276   /* Check that the the current client ID is same as in the client's packet. */
2277   if (sock->type == SILC_SOCKET_TYPE_CLIENT) {
2278     SilcClientEntry client = (SilcClientEntry)sock->user_data;
2279     if (client && client->id && packet->src_id) {
2280       void *id = silc_id_str2id(packet->src_id, packet->src_id_len,
2281                                 packet->src_id_type);
2282       if (!id || !SILC_ID_CLIENT_COMPARE(client->id, id)) {
2283         silc_free(id);
2284         SILC_LOG_DEBUG(("Packet source is not same as sender"));
2285         goto out;
2286       }
2287       silc_free(id);
2288     }
2289   }
2290
2291   if (server->server_type == SILC_ROUTER) {
2292     /* Route the packet if it is not destined to us. Other ID types but
2293        server are handled separately after processing them. */
2294     if (packet->dst_id && !(packet->flags & SILC_PACKET_FLAG_BROADCAST) &&
2295         packet->dst_id_type == SILC_ID_SERVER &&
2296         sock->type != SILC_SOCKET_TYPE_CLIENT &&
2297         memcmp(packet->dst_id, server->id_string, server->id_string_len)) {
2298
2299       /* Route the packet to fastest route for the destination ID */
2300       void *id = silc_id_str2id(packet->dst_id, packet->dst_id_len,
2301                                 packet->dst_id_type);
2302       if (!id)
2303         goto out;
2304       silc_server_packet_route(server,
2305                                silc_server_route_get(server, id,
2306                                                      packet->dst_id_type),
2307                                packet);
2308       silc_free(id);
2309       goto out;
2310     }
2311   }
2312
2313   /* Parse the incoming packet type */
2314   silc_server_packet_parse_type(server, sock, packet);
2315
2316   /* Broadcast packet if it is marked as broadcast packet and it is
2317      originated from router and we are router. */
2318   if (server->server_type == SILC_ROUTER &&
2319       sock->type == SILC_SOCKET_TYPE_ROUTER &&
2320       packet->flags & SILC_PACKET_FLAG_BROADCAST) {
2321     /* Broadcast to our primary route */
2322     silc_server_packet_broadcast(server, SILC_PRIMARY_ROUTE(server), packet);
2323
2324     /* If we have backup routers then we need to feed all broadcast
2325        data to those servers. */
2326     silc_server_backup_broadcast(server, sock, packet);
2327   }
2328
2329  out:
2330   silc_packet_context_free(packet);
2331   silc_free(parse_ctx);
2332 }
2333
2334 /* Parser callback called by silc_packet_receive_process. This merely
2335    registers timeout that will handle the actual parsing when appropriate. */
2336
2337 bool silc_server_packet_parse(SilcPacketParserContext *parser_context,
2338                               void *context)
2339 {
2340   SilcServer server = (SilcServer)context;
2341   SilcSocketConnection sock = parser_context->sock;
2342   SilcIDListData idata = (SilcIDListData)sock->user_data;
2343
2344   if (idata)
2345     idata->psn_receive = parser_context->packet->sequence + 1;
2346
2347   /* If protocol for this connection is key exchange or rekey then we'll
2348      process all packets synchronously, since there might be packets in
2349      queue that we are not able to decrypt without first processing the
2350      packets before them. */
2351   if ((parser_context->packet->type == SILC_PACKET_REKEY ||
2352        parser_context->packet->type == SILC_PACKET_REKEY_DONE) ||
2353       (sock->protocol && sock->protocol->protocol &&
2354        (sock->protocol->protocol->type == SILC_PROTOCOL_SERVER_KEY_EXCHANGE ||
2355         sock->protocol->protocol->type == SILC_PROTOCOL_SERVER_REKEY))) {
2356     silc_server_packet_parse_real(server->schedule, server, 0, sock->sock,
2357                                   parser_context);
2358
2359     /* Reprocess data since we'll return FALSE here.  This is because
2360        the idata->receive_key might have become valid in the last packet
2361        and we want to call this processor with valid cipher. */
2362     if (idata)
2363       silc_packet_receive_process(sock, server->server_type == SILC_ROUTER ?
2364                                   TRUE : FALSE, idata->receive_key,
2365                                   idata->hmac_receive, idata->psn_receive,
2366                                   silc_server_packet_parse, server);
2367     else
2368       silc_packet_receive_process(sock, server->server_type == SILC_ROUTER ?
2369                                   TRUE : FALSE, NULL, NULL, 0,
2370                                   silc_server_packet_parse, server);
2371     return FALSE;
2372   }
2373
2374   switch (sock->type) {
2375   case SILC_SOCKET_TYPE_UNKNOWN:
2376   case SILC_SOCKET_TYPE_CLIENT:
2377     /* Parse the packet with timeout */
2378     silc_schedule_task_add(server->schedule, sock->sock,
2379                            silc_server_packet_parse_real,
2380                            (void *)parser_context, 0, 100000,
2381                            SILC_TASK_TIMEOUT,
2382                            SILC_TASK_PRI_NORMAL);
2383     break;
2384   case SILC_SOCKET_TYPE_SERVER:
2385   case SILC_SOCKET_TYPE_ROUTER:
2386     /* Packets from servers are parsed immediately */
2387     silc_server_packet_parse_real(server->schedule, server, 0, sock->sock,
2388                                   parser_context);
2389     break;
2390   default:
2391     return TRUE;
2392   }
2393
2394   return TRUE;
2395 }
2396
2397 /* Parses the packet type and calls what ever routines the packet type
2398    requires. This is done for all incoming packets. */
2399
2400 void silc_server_packet_parse_type(SilcServer server,
2401                                    SilcSocketConnection sock,
2402                                    SilcPacketContext *packet)
2403 {
2404   SilcPacketType type = packet->type;
2405   SilcIDListData idata = (SilcIDListData)sock->user_data;
2406
2407   SILC_LOG_DEBUG(("Received %s packet [flags %d]",
2408                   silc_get_packet_name(type), packet->flags));
2409
2410   /* Parse the packet type */
2411   switch (type) {
2412   case SILC_PACKET_DISCONNECT:
2413     {
2414       SilcStatus status;
2415       char *message = NULL;
2416
2417       if (packet->flags & SILC_PACKET_FLAG_LIST)
2418         break;
2419       if (packet->buffer->len < 1)
2420         break;
2421
2422       status = (SilcStatus)packet->buffer->data[0];
2423       if (packet->buffer->len > 1 &&
2424           silc_utf8_valid(packet->buffer->data + 1, packet->buffer->len - 1))
2425         message = silc_memdup(packet->buffer->data + 1,
2426                               packet->buffer->len - 1);
2427
2428       SILC_LOG_INFO(("Disconnected by %s (%s): %s (%d) %s", 
2429                      sock->ip, sock->hostname,
2430                      silc_get_status_message(status), status,
2431                      message ? message : ""));
2432       silc_free(message);
2433
2434       /* Handle the disconnection from our end too */
2435       if (sock->user_data && SILC_IS_LOCAL(sock->user_data))
2436         silc_server_free_sock_user_data(server, sock, NULL);
2437       silc_server_close_connection(server, sock);
2438     }
2439     break;
2440
2441   case SILC_PACKET_SUCCESS:
2442     /*
2443      * Success received for something. For now we can have only
2444      * one protocol for connection executing at once hence this
2445      * success message is for whatever protocol is executing currently.
2446      */
2447     if (packet->flags & SILC_PACKET_FLAG_LIST)
2448       break;
2449     if (sock->protocol)
2450       silc_protocol_execute(sock->protocol, server->schedule, 0, 0);
2451     break;
2452
2453   case SILC_PACKET_FAILURE:
2454     /*
2455      * Failure received for something. For now we can have only
2456      * one protocol for connection executing at once hence this
2457      * failure message is for whatever protocol is executing currently.
2458      */
2459     if (packet->flags & SILC_PACKET_FLAG_LIST)
2460       break;
2461     if (sock->protocol) {
2462       SilcServerFailureContext f;
2463       f = silc_calloc(1, sizeof(*f));
2464       f->sock = silc_socket_dup(sock);
2465
2466       /* We will wait 5 seconds to process this failure packet */
2467       silc_schedule_task_add(server->schedule, sock->sock,
2468                              silc_server_failure_callback, (void *)f, 5, 0,
2469                              SILC_TASK_TIMEOUT, SILC_TASK_PRI_NORMAL);
2470     }
2471     break;
2472
2473   case SILC_PACKET_REJECT:
2474     if (packet->flags & SILC_PACKET_FLAG_LIST)
2475       break;
2476     return;
2477     break;
2478
2479   case SILC_PACKET_NOTIFY:
2480     /*
2481      * Received notify packet. Server can receive notify packets from
2482      * router. Server then relays the notify messages to clients if needed.
2483      */
2484     if (packet->flags & SILC_PACKET_FLAG_LIST)
2485       silc_server_notify_list(server, sock, packet);
2486     else
2487       silc_server_notify(server, sock, packet);
2488     break;
2489
2490     /*
2491      * Channel packets
2492      */
2493   case SILC_PACKET_CHANNEL_MESSAGE:
2494     /*
2495      * Received channel message. Channel messages are special packets
2496      * (although probably most common ones) thus they are handled
2497      * specially.
2498      */
2499     if (packet->flags & SILC_PACKET_FLAG_LIST)
2500       break;
2501     idata->last_receive = time(NULL);
2502     silc_server_channel_message(server, sock, packet);
2503     break;
2504
2505   case SILC_PACKET_CHANNEL_KEY:
2506     /*
2507      * Received key for channel. As channels are created by the router
2508      * the keys are as well. We will distribute the key to all of our
2509      * locally connected clients on the particular channel. Router
2510      * never receives this channel and thus is ignored.
2511      */
2512     if (packet->flags & SILC_PACKET_FLAG_LIST)
2513       break;
2514     silc_server_channel_key(server, sock, packet);
2515     break;
2516
2517     /*
2518      * Command packets
2519      */
2520   case SILC_PACKET_COMMAND:
2521     /*
2522      * Recived command. Processes the command request and allocates the
2523      * command context and calls the command.
2524      */
2525     if (packet->flags & SILC_PACKET_FLAG_LIST)
2526       break;
2527     silc_server_command_process(server, sock, packet);
2528     break;
2529
2530   case SILC_PACKET_COMMAND_REPLY:
2531     /*
2532      * Received command reply packet. Received command reply to command. It
2533      * may be reply to command sent by us or reply to command sent by client
2534      * that we've routed further.
2535      */
2536     if (packet->flags & SILC_PACKET_FLAG_LIST)
2537       break;
2538     silc_server_command_reply(server, sock, packet);
2539     break;
2540
2541     /*
2542      * Private Message packets
2543      */
2544   case SILC_PACKET_PRIVATE_MESSAGE:
2545     /*
2546      * Received private message packet. The packet is coming from either
2547      * client or server.
2548      */
2549     if (packet->flags & SILC_PACKET_FLAG_LIST)
2550       break;
2551     idata->last_receive = time(NULL);
2552     silc_server_private_message(server, sock, packet);
2553     break;
2554
2555   case SILC_PACKET_PRIVATE_MESSAGE_KEY:
2556     /*
2557      * Private message key packet.
2558      */
2559     if (packet->flags & SILC_PACKET_FLAG_LIST)
2560       break;
2561     silc_server_private_message_key(server, sock, packet);
2562     break;
2563
2564     /*
2565      * Key Exchange protocol packets
2566      */
2567   case SILC_PACKET_KEY_EXCHANGE:
2568     if (packet->flags & SILC_PACKET_FLAG_LIST)
2569       break;
2570
2571     if (sock->protocol && sock->protocol->protocol &&
2572         sock->protocol->protocol->type == SILC_PROTOCOL_SERVER_KEY_EXCHANGE) {
2573       SilcServerKEInternalContext *proto_ctx =
2574         (SilcServerKEInternalContext *)sock->protocol->context;
2575
2576       proto_ctx->packet = silc_packet_context_dup(packet);
2577
2578       /* Let the protocol handle the packet */
2579       silc_protocol_execute(sock->protocol, server->schedule, 0, 100000);
2580     } else {
2581       SILC_LOG_ERROR(("Received Key Exchange packet but no key exchange "
2582                       "protocol active, packet dropped."));
2583     }
2584     break;
2585
2586   case SILC_PACKET_KEY_EXCHANGE_1:
2587     if (packet->flags & SILC_PACKET_FLAG_LIST)
2588       break;
2589
2590     if (sock->protocol && sock->protocol->protocol &&
2591         (sock->protocol->protocol->type == SILC_PROTOCOL_SERVER_KEY_EXCHANGE ||
2592          sock->protocol->protocol->type == SILC_PROTOCOL_SERVER_REKEY)) {
2593
2594       if (sock->protocol->protocol->type == SILC_PROTOCOL_SERVER_REKEY) {
2595         SilcServerRekeyInternalContext *proto_ctx =
2596           (SilcServerRekeyInternalContext *)sock->protocol->context;
2597
2598         if (proto_ctx->packet)
2599           silc_packet_context_free(proto_ctx->packet);
2600
2601         proto_ctx->packet = silc_packet_context_dup(packet);
2602
2603         /* Let the protocol handle the packet */
2604         silc_protocol_execute(sock->protocol, server->schedule, 0, 0);
2605       } else {
2606         SilcServerKEInternalContext *proto_ctx =
2607           (SilcServerKEInternalContext *)sock->protocol->context;
2608
2609         if (proto_ctx->packet)
2610           silc_packet_context_free(proto_ctx->packet);
2611
2612         proto_ctx->packet = silc_packet_context_dup(packet);
2613         proto_ctx->dest_id_type = packet->src_id_type;
2614         proto_ctx->dest_id = silc_id_str2id(packet->src_id, packet->src_id_len,
2615                                             packet->src_id_type);
2616         if (!proto_ctx->dest_id)
2617           break;
2618
2619         /* Let the protocol handle the packet */
2620         silc_protocol_execute(sock->protocol, server->schedule,
2621                               0, 100000);
2622       }
2623     } else {
2624       SILC_LOG_ERROR(("Received Key Exchange 1 packet but no key exchange "
2625                       "protocol active, packet dropped."));
2626     }
2627     break;
2628
2629   case SILC_PACKET_KEY_EXCHANGE_2:
2630     if (packet->flags & SILC_PACKET_FLAG_LIST)
2631       break;
2632
2633     if (sock->protocol && sock->protocol->protocol &&
2634         (sock->protocol->protocol->type == SILC_PROTOCOL_SERVER_KEY_EXCHANGE ||
2635          sock->protocol->protocol->type == SILC_PROTOCOL_SERVER_REKEY)) {
2636
2637       if (sock->protocol->protocol->type == SILC_PROTOCOL_SERVER_REKEY) {
2638         SilcServerRekeyInternalContext *proto_ctx =
2639           (SilcServerRekeyInternalContext *)sock->protocol->context;
2640
2641         if (proto_ctx->packet)
2642           silc_packet_context_free(proto_ctx->packet);
2643
2644         proto_ctx->packet = silc_packet_context_dup(packet);
2645
2646         /* Let the protocol handle the packet */
2647         silc_protocol_execute(sock->protocol, server->schedule, 0, 0);
2648       } else {
2649         SilcServerKEInternalContext *proto_ctx =
2650           (SilcServerKEInternalContext *)sock->protocol->context;
2651
2652         if (proto_ctx->packet)
2653           silc_packet_context_free(proto_ctx->packet);
2654
2655         proto_ctx->packet = silc_packet_context_dup(packet);
2656         proto_ctx->dest_id_type = packet->src_id_type;
2657         proto_ctx->dest_id = silc_id_str2id(packet->src_id, packet->src_id_len,
2658                                             packet->src_id_type);
2659         if (!proto_ctx->dest_id)
2660           break;
2661
2662         /* Let the protocol handle the packet */
2663         silc_protocol_execute(sock->protocol, server->schedule,
2664                               0, 100000);
2665       }
2666     } else {
2667       SILC_LOG_ERROR(("Received Key Exchange 2 packet but no key exchange "
2668                       "protocol active, packet dropped."));
2669     }
2670     break;
2671
2672   case SILC_PACKET_CONNECTION_AUTH_REQUEST:
2673     /*
2674      * Connection authentication request packet. When we receive this packet
2675      * we will send to the other end information about our mandatory
2676      * authentication method for the connection. This packet maybe received
2677      * at any time.
2678      */
2679     if (packet->flags & SILC_PACKET_FLAG_LIST)
2680       break;
2681     silc_server_connection_auth_request(server, sock, packet);
2682     break;
2683
2684     /*
2685      * Connection Authentication protocol packets
2686      */
2687   case SILC_PACKET_CONNECTION_AUTH:
2688     /* Start of the authentication protocol. We receive here the
2689        authentication data and will verify it. */
2690     if (packet->flags & SILC_PACKET_FLAG_LIST)
2691       break;
2692
2693     if (sock->protocol && sock->protocol->protocol->type
2694         == SILC_PROTOCOL_SERVER_CONNECTION_AUTH) {
2695
2696       SilcServerConnAuthInternalContext *proto_ctx =
2697         (SilcServerConnAuthInternalContext *)sock->protocol->context;
2698
2699       proto_ctx->packet = silc_packet_context_dup(packet);
2700
2701       /* Let the protocol handle the packet */
2702       silc_protocol_execute(sock->protocol, server->schedule, 0, 0);
2703     } else {
2704       SILC_LOG_ERROR(("Received Connection Auth packet but no authentication "
2705                       "protocol active, packet dropped."));
2706     }
2707     break;
2708
2709   case SILC_PACKET_NEW_ID:
2710     /*
2711      * Received New ID packet. This includes some new ID that has been
2712      * created. It may be for client, server or channel. This is the way
2713      * to distribute information about new registered entities in the
2714      * SILC network.
2715      */
2716     if (packet->flags & SILC_PACKET_FLAG_LIST)
2717       silc_server_new_id_list(server, sock, packet);
2718     else
2719       silc_server_new_id(server, sock, packet);
2720     break;
2721
2722   case SILC_PACKET_NEW_CLIENT:
2723     /*
2724      * Received new client packet. This includes client information that
2725      * we will use to create initial client ID. After creating new
2726      * ID we will send it to the client.
2727      */
2728     if (packet->flags & SILC_PACKET_FLAG_LIST)
2729       break;
2730     silc_server_new_client(server, sock, packet);
2731     break;
2732
2733   case SILC_PACKET_NEW_SERVER:
2734     /*
2735      * Received new server packet. This includes Server ID and some other
2736      * information that we may save. This is received after server has
2737      * connected to us.
2738      */
2739     if (packet->flags & SILC_PACKET_FLAG_LIST)
2740       break;
2741     silc_server_new_server(server, sock, packet);
2742     break;
2743
2744   case SILC_PACKET_NEW_CHANNEL:
2745     /*
2746      * Received new channel packet. Information about new channel in the
2747      * network are distributed using this packet.
2748      */
2749     if (packet->flags & SILC_PACKET_FLAG_LIST)
2750       silc_server_new_channel_list(server, sock, packet);
2751     else
2752       silc_server_new_channel(server, sock, packet);
2753     break;
2754
2755   case SILC_PACKET_HEARTBEAT:
2756     /*
2757      * Received heartbeat.
2758      */
2759     if (packet->flags & SILC_PACKET_FLAG_LIST)
2760       break;
2761     break;
2762
2763   case SILC_PACKET_KEY_AGREEMENT:
2764     /*
2765      * Received heartbeat.
2766      */
2767     if (packet->flags & SILC_PACKET_FLAG_LIST)
2768       break;
2769     silc_server_key_agreement(server, sock, packet);
2770     break;
2771
2772   case SILC_PACKET_REKEY:
2773     /*
2774      * Received re-key packet. The sender wants to regenerate the session
2775      * keys.
2776      */
2777     if (packet->flags & SILC_PACKET_FLAG_LIST)
2778       break;
2779     silc_server_rekey(server, sock, packet);
2780     break;
2781
2782   case SILC_PACKET_REKEY_DONE:
2783     /*
2784      * The re-key is done.
2785      */
2786     if (packet->flags & SILC_PACKET_FLAG_LIST)
2787       break;
2788
2789     if (sock->protocol && sock->protocol->protocol &&
2790         sock->protocol->protocol->type == SILC_PROTOCOL_SERVER_REKEY) {
2791
2792       SilcServerRekeyInternalContext *proto_ctx =
2793         (SilcServerRekeyInternalContext *)sock->protocol->context;
2794
2795       if (proto_ctx->packet)
2796         silc_packet_context_free(proto_ctx->packet);
2797
2798       proto_ctx->packet = silc_packet_context_dup(packet);
2799
2800       /* Let the protocol handle the packet */
2801       silc_protocol_execute(sock->protocol, server->schedule, 0, 0);
2802     } else {
2803       SILC_LOG_ERROR(("Received Re-key done packet but no re-key "
2804                       "protocol active, packet dropped."));
2805     }
2806     break;
2807
2808   case SILC_PACKET_FTP:
2809     /* FTP packet */
2810     if (packet->flags & SILC_PACKET_FLAG_LIST)
2811       break;
2812     silc_server_ftp(server, sock, packet);
2813     break;
2814
2815   case SILC_PACKET_RESUME_CLIENT:
2816     /* Resume client */
2817     if (packet->flags & SILC_PACKET_FLAG_LIST)
2818       break;
2819     silc_server_resume_client(server, sock, packet);
2820     break;
2821
2822   case SILC_PACKET_RESUME_ROUTER:
2823     /* Resume router packet received. This packet is received for backup
2824        router resuming protocol. */
2825     if (packet->flags & SILC_PACKET_FLAG_LIST)
2826       break;
2827     silc_server_backup_resume_router(server, sock, packet);
2828     break;
2829
2830   default:
2831     SILC_LOG_ERROR(("Incorrect packet type %d, packet dropped", type));
2832     break;
2833   }
2834 }
2835
2836 /* Creates connection to a remote router. */
2837
2838 void silc_server_create_connection(SilcServer server,
2839                                    const char *remote_host, SilcUInt32 port)
2840 {
2841   SilcServerConnection sconn;
2842
2843   /* Allocate connection object for hold connection specific stuff. */
2844   sconn = silc_calloc(1, sizeof(*sconn));
2845   sconn->remote_host = strdup(remote_host);
2846   sconn->remote_port = port;
2847   sconn->no_reconnect = TRUE;
2848
2849   silc_schedule_task_add(server->schedule, 0,
2850                          silc_server_connect_router,
2851                          (void *)sconn, 0, 1, SILC_TASK_TIMEOUT,
2852                          SILC_TASK_PRI_NORMAL);
2853 }
2854
2855 SILC_TASK_CALLBACK(silc_server_close_connection_final)
2856 {
2857   silc_socket_free(context);
2858 }
2859
2860 /* Closes connection to socket connection */
2861
2862 void silc_server_close_connection(SilcServer server,
2863                                   SilcSocketConnection sock)
2864 {
2865   char tmp[128];
2866
2867   if (!server->sockets[sock->sock] && SILC_IS_DISCONNECTED(sock)) {
2868     silc_schedule_task_add(server->schedule, 0,
2869                            silc_server_close_connection_final,
2870                            (void *)sock, 0, 1, SILC_TASK_TIMEOUT,
2871                            SILC_TASK_PRI_NORMAL);
2872     return;
2873   }
2874
2875   memset(tmp, 0, sizeof(tmp));
2876   silc_socket_get_error(sock, tmp, sizeof(tmp));
2877   SILC_LOG_INFO(("Closing connection %s:%d [%s] %s", sock->hostname,
2878                   sock->port,
2879                   (sock->type == SILC_SOCKET_TYPE_UNKNOWN ? "Unknown" :
2880                    sock->type == SILC_SOCKET_TYPE_CLIENT ? "Client" :
2881                    sock->type == SILC_SOCKET_TYPE_SERVER ? "Server" :
2882                    "Router"), tmp[0] ? tmp : ""));
2883
2884   /* We won't listen for this connection anymore */
2885   silc_schedule_unset_listen_fd(server->schedule, sock->sock);
2886
2887   /* Unregister all tasks */
2888   silc_schedule_task_del_by_fd(server->schedule, sock->sock);
2889
2890   /* Close the actual connection */
2891   silc_net_close_connection(sock->sock);
2892   server->sockets[sock->sock] = NULL;
2893
2894   /* If sock->user_data is NULL then we'll check for active protocols
2895      here since the silc_server_free_sock_user_data has not been called
2896      for this connection. */
2897   if (!sock->user_data) {
2898     /* If any protocol is active cancel its execution. It will call
2899        the final callback which will finalize the disconnection. */
2900     if (sock->protocol) {
2901       SILC_LOG_DEBUG(("Cancelling protocol, calling final callback"));
2902       silc_protocol_cancel(sock->protocol, server->schedule);
2903       sock->protocol->state = SILC_PROTOCOL_STATE_ERROR;
2904       silc_protocol_execute_final(sock->protocol, server->schedule);
2905       sock->protocol = NULL;
2906       return;
2907     }
2908   }
2909
2910   silc_schedule_task_add(server->schedule, 0,
2911                          silc_server_close_connection_final,
2912                          (void *)sock, 0, 1, SILC_TASK_TIMEOUT,
2913                          SILC_TASK_PRI_NORMAL);
2914 }
2915
2916 /* Sends disconnect message to remote connection and disconnects the
2917    connection. */
2918
2919 void silc_server_disconnect_remote(SilcServer server,
2920                                    SilcSocketConnection sock,
2921                                    SilcStatus status, ...)
2922 {
2923   va_list ap;
2924   unsigned char buf[512];
2925   SilcBuffer buffer;
2926   char *cp;
2927   int len;
2928
2929   if (!sock)
2930     return;
2931
2932   memset(buf, 0, sizeof(buf));
2933   va_start(ap, status);
2934   cp = va_arg(ap, char *);
2935   if (cp) {
2936     vsnprintf(buf, sizeof(buf) - 1, cp, ap);
2937     cp = buf;
2938   }
2939   va_end(ap);
2940
2941   SILC_LOG_DEBUG(("Disconnecting remote host"));
2942
2943   /* Notify remote end that the conversation is over. The notify message
2944      is tried to be sent immediately. */
2945
2946   len = 1;
2947   if (cp)
2948     len += silc_utf8_encoded_len(buf, strlen(buf), SILC_STRING_ASCII);
2949
2950   buffer = silc_buffer_alloc_size(len);
2951   if (!buffer)
2952     goto out;
2953
2954   buffer->data[0] = status;
2955   if (cp)
2956     silc_utf8_encode(buf, strlen(buf), SILC_STRING_ASCII, buffer->data + 1,
2957                      buffer->len - 1);
2958   silc_server_packet_send(server, sock, SILC_PACKET_DISCONNECT, 0,
2959                           buffer->data, buffer->len, TRUE);
2960   silc_buffer_free(buffer);
2961
2962  out:
2963   silc_server_packet_queue_purge(server, sock);
2964
2965   /* Mark the connection to be disconnected */
2966   SILC_SET_DISCONNECTED(sock);
2967   silc_server_close_connection(server, sock);
2968 }
2969
2970 SILC_TASK_CALLBACK(silc_server_free_client_data_timeout)
2971 {
2972   SilcServer server = app_context;
2973   SilcClientEntry client = context;
2974
2975   assert(!silc_hash_table_count(client->channels));
2976
2977   silc_idlist_del_data(client);
2978   silc_idcache_purge_by_context(server->local_list->clients, client);
2979 }
2980
2981 /* Frees client data and notifies about client's signoff. */
2982
2983 void silc_server_free_client_data(SilcServer server,
2984                                   SilcSocketConnection sock,
2985                                   SilcClientEntry client,
2986                                   int notify,
2987                                   const char *signoff)
2988 {
2989   SILC_LOG_DEBUG(("Freeing client data"));
2990
2991   /* If there is pending outgoing data for the client then purge it
2992      to the network before removing the client entry. */
2993   silc_server_packet_queue_purge(server, sock);
2994
2995   if (client->id) {
2996     /* Check if anyone is watching this nickname */
2997     if (server->server_type == SILC_ROUTER)
2998       silc_server_check_watcher_list(server, client, NULL,
2999                                      SILC_NOTIFY_TYPE_SIGNOFF);
3000
3001     /* Send SIGNOFF notify to routers. */
3002     if (notify)
3003       silc_server_send_notify_signoff(server, SILC_PRIMARY_ROUTE(server),
3004                                       SILC_BROADCAST(server), client->id,
3005                                       signoff);
3006   }
3007
3008   /* Remove client from all channels */
3009   if (notify)
3010     silc_server_remove_from_channels(server, NULL, client,
3011                                      TRUE, (char *)signoff, TRUE);
3012   else
3013     silc_server_remove_from_channels(server, NULL, client,
3014                                      FALSE, NULL, FALSE);
3015
3016   /* Remove this client from watcher list if it is */
3017   silc_server_del_from_watcher_list(server, client);
3018
3019   /* Update statistics */
3020   server->stat.my_clients--;
3021   server->stat.clients--;
3022   if (server->stat.cell_clients)
3023     server->stat.cell_clients--;
3024   SILC_OPER_STATS_UPDATE(client, server, SILC_UMODE_SERVER_OPERATOR);
3025   SILC_OPER_STATS_UPDATE(client, router, SILC_UMODE_ROUTER_OPERATOR);
3026   silc_schedule_task_del_by_context(server->schedule, client);
3027
3028   /* We will not delete the client entry right away. We will take it
3029      into history (for WHOWAS command) for 5 minutes, unless we're
3030      shutting down server. */
3031   if (!server->server_shutdown) {
3032     silc_schedule_task_add(server->schedule, 0,
3033                            silc_server_free_client_data_timeout,
3034                            client, 300, 0,
3035                            SILC_TASK_TIMEOUT, SILC_TASK_PRI_LOW);
3036     client->data.status &= ~SILC_IDLIST_STATUS_REGISTERED;
3037     client->data.status &= ~SILC_IDLIST_STATUS_LOCAL;
3038     client->mode = 0;
3039     client->router = NULL;
3040     client->connection = NULL;
3041   } else {
3042     /* Delete directly since we're shutting down server */
3043     silc_idlist_del_data(client);
3044     silc_idlist_del_client(server->local_list, client);
3045   }
3046 }
3047
3048 /* Frees user_data pointer from socket connection object. This also sends
3049    appropriate notify packets to the network to inform about leaving
3050    entities. */
3051
3052 void silc_server_free_sock_user_data(SilcServer server,
3053                                      SilcSocketConnection sock,
3054                                      const char *signoff_message)
3055 {
3056   switch (sock->type) {
3057   case SILC_SOCKET_TYPE_CLIENT:
3058     {
3059       SilcClientEntry user_data = (SilcClientEntry)sock->user_data;
3060       silc_server_free_client_data(server, sock, user_data, TRUE,
3061                                    signoff_message);
3062       break;
3063     }
3064   case SILC_SOCKET_TYPE_SERVER:
3065   case SILC_SOCKET_TYPE_ROUTER:
3066     {
3067       SilcServerEntry user_data = (SilcServerEntry)sock->user_data;
3068       SilcServerEntry backup_router = NULL;
3069
3070       SILC_LOG_DEBUG(("Freeing server data"));
3071
3072       if (user_data->id)
3073         backup_router = silc_server_backup_get(server, user_data->id);
3074
3075       if (!server->backup_router && server->server_type == SILC_ROUTER &&
3076           backup_router == server->id_entry &&
3077           sock->type != SILC_SOCKET_TYPE_ROUTER)
3078         backup_router = NULL;
3079
3080       if (server->server_shutdown)
3081         backup_router = NULL;
3082
3083       /* If this was our primary router connection then we're lost to
3084          the outside world. */
3085       if (server->router == user_data) {
3086         /* Check whether we have a backup router connection */
3087         if (!backup_router || backup_router == user_data) {
3088           silc_schedule_task_add(server->schedule, 0,
3089                                  silc_server_connect_to_router,
3090                                  server, 1, 0,
3091                                  SILC_TASK_TIMEOUT,
3092                                  SILC_TASK_PRI_NORMAL);
3093
3094           server->id_entry->router = NULL;
3095           server->router = NULL;
3096           server->standalone = TRUE;
3097           backup_router = NULL;
3098         } else {
3099           if (server->id_entry != backup_router) {
3100             SILC_LOG_INFO(("New primary router is backup router %s",
3101                            backup_router->server_name));
3102             server->id_entry->router = backup_router;
3103             server->router = backup_router;
3104             server->router_connect = time(0);
3105             server->backup_primary = TRUE;
3106           } else {
3107             SILC_LOG_INFO(("We are now new primary router in this cell"));
3108             server->id_entry->router = NULL;
3109             server->router = NULL;
3110             server->standalone = TRUE;
3111
3112             /* We stop here to take a breath */
3113             sleep(2);
3114           }
3115
3116           if (server->server_type == SILC_BACKUP_ROUTER) {
3117             server->server_type = SILC_ROUTER;
3118
3119             /* We'll need to constantly try to reconnect to the primary
3120                router so that we'll see when it comes back online. */
3121             silc_server_backup_reconnect(server, sock->ip, sock->port,
3122                                          silc_server_backup_connected,
3123                                          NULL);
3124           }
3125
3126           /* Mark this connection as replaced */
3127           silc_server_backup_replaced_add(server, user_data->id,
3128                                           backup_router);
3129         }
3130       } else if (backup_router) {
3131         SILC_LOG_INFO(("Enabling the use of backup router %s",
3132                        backup_router->server_name));
3133         SILC_LOG_DEBUG(("Enabling the use of backup router %s",
3134                         backup_router->server_name));
3135
3136         /* Mark this connection as replaced */
3137         silc_server_backup_replaced_add(server, user_data->id,
3138                                         backup_router);
3139       }
3140
3141       if (!backup_router) {
3142         /* Remove all servers that are originated from this server, and
3143            remove the clients of those servers too. */
3144         silc_server_remove_servers_by_server(server, user_data, TRUE);
3145
3146         /* Remove the clients that this server owns as they will become
3147            invalid now too.  For backup router the server is actually
3148            coming from the primary router, so mark that as the owner
3149            of this entry. */
3150         if (server->server_type == SILC_BACKUP_ROUTER &&
3151             sock->type == SILC_SOCKET_TYPE_SERVER)
3152           silc_server_remove_clients_by_server(server, server->router,
3153                                                user_data, TRUE);
3154         else
3155           silc_server_remove_clients_by_server(server, user_data,
3156                                                user_data, TRUE);
3157
3158         /* Remove channels owned by this server */
3159         if (server->server_type == SILC_SERVER)
3160           silc_server_remove_channels_by_server(server, user_data);
3161       } else {
3162         /* Enable local server connections that may be disabled */
3163         silc_server_local_servers_toggle_enabled(server, TRUE);
3164
3165         /* Update the client entries of this server to the new backup
3166            router.  If we are the backup router we also resolve the real
3167            servers for the clients.  After updating is over this also
3168            removes the clients that this server explicitly owns. */
3169         silc_server_update_clients_by_server(server, user_data,
3170                                              backup_router, TRUE);
3171
3172         /* If we are router and just lost our primary router (now standlaone)
3173            we remove everything that was behind it, since we don't know
3174            any better. */
3175         if (server->server_type == SILC_ROUTER && server->standalone)
3176           /* Remove all servers that are originated from this server, and
3177              remove the clients of those servers too. */
3178           silc_server_remove_servers_by_server(server, user_data, TRUE);
3179
3180         /* Finally remove the clients that are explicitly owned by this
3181            server.  They go down with the server. */
3182         silc_server_remove_clients_by_server(server, user_data,
3183                                              user_data, TRUE);
3184
3185         /* Update our server cache to use the new backup router too. */
3186         silc_server_update_servers_by_server(server, user_data, backup_router);
3187         if (server->server_type == SILC_SERVER)
3188           silc_server_update_channels_by_server(server, user_data,
3189                                                 backup_router);
3190
3191         /* Send notify about primary router going down to local operators */
3192         if (server->backup_router)
3193           SILC_SERVER_SEND_OPERS(server, FALSE, TRUE,
3194                                  SILC_NOTIFY_TYPE_NONE,
3195                                  ("%s switched to backup router %s "
3196                                   "(we are primary router now)",
3197                                   server->server_name, server->server_name));
3198         else if (server->router)
3199           SILC_SERVER_SEND_OPERS(server, FALSE, TRUE,
3200                                  SILC_NOTIFY_TYPE_NONE,
3201                                  ("%s switched to backup router %s",
3202                                   server->server_name,
3203                                   server->router->server_name));
3204       }
3205
3206       /* Free the server entry */
3207       silc_server_backup_del(server, user_data);
3208       silc_server_backup_replaced_del(server, user_data);
3209       silc_idlist_del_data(user_data);
3210       if (!silc_idlist_del_server(server->local_list, user_data))
3211         silc_idlist_del_server(server->global_list, user_data);
3212       if (sock->type == SILC_SOCKET_TYPE_SERVER) {
3213         server->stat.my_servers--;
3214       } else {
3215         server->stat.my_routers--;
3216         server->stat.routers--;
3217       }
3218       server->stat.servers--;
3219       if (server->server_type == SILC_ROUTER)
3220         server->stat.cell_servers--;
3221
3222       if (backup_router && backup_router != server->id_entry) {
3223         /* Announce all of our stuff that was created about 5 minutes ago.
3224            The backup router knows all the other stuff already. */
3225         if (server->server_type == SILC_ROUTER)
3226           silc_server_announce_servers(server, FALSE, time(0) - 300,
3227                                        backup_router->connection);
3228
3229         /* Announce our clients and channels to the router */
3230         silc_server_announce_clients(server, time(0) - 300,
3231                                      backup_router->connection);
3232         silc_server_announce_channels(server, time(0) - 300,
3233                                       backup_router->connection);
3234       }
3235       break;
3236     }
3237   default:
3238     {
3239       SilcUnknownEntry user_data = (SilcUnknownEntry)sock->user_data;
3240
3241       SILC_LOG_DEBUG(("Freeing unknown connection data"));
3242
3243       silc_idlist_del_data(user_data);
3244       silc_free(user_data);
3245       break;
3246     }
3247   }
3248
3249   /* If any protocol is active cancel its execution */
3250   if (sock->protocol) {
3251     SILC_LOG_DEBUG(("Cancelling protocol, calling final callback"));
3252     silc_protocol_cancel(sock->protocol, server->schedule);
3253     sock->protocol->state = SILC_PROTOCOL_STATE_ERROR;
3254     silc_protocol_execute_final(sock->protocol, server->schedule);
3255     sock->protocol = NULL;
3256   }
3257
3258   sock->user_data = NULL;
3259 }
3260
3261 /* Removes client from all channels it has joined. This is used when client
3262    connection is disconnected. If the client on a channel is last, the
3263    channel is removed as well. This sends the SIGNOFF notify types. */
3264
3265 void silc_server_remove_from_channels(SilcServer server,
3266                                       SilcSocketConnection sock,
3267                                       SilcClientEntry client,
3268                                       bool notify,
3269                                       const char *signoff_message,
3270                                       bool keygen)
3271 {
3272   SilcChannelEntry channel;
3273   SilcChannelClientEntry chl;
3274   SilcHashTableList htl;
3275   SilcBuffer clidp = NULL;
3276
3277   if (!client)
3278     return;
3279
3280   SILC_LOG_DEBUG(("Removing client from joined channels"));
3281
3282   if (notify && !client->id)
3283     notify = FALSE;
3284
3285   if (notify) {
3286     clidp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
3287     if (!clidp)
3288       notify = FALSE;
3289   }
3290
3291   /* Remove the client from all channels. The client is removed from
3292      the channels' user list. */
3293   silc_hash_table_list(client->channels, &htl);
3294   while (silc_hash_table_get(&htl, NULL, (void *)&chl)) {
3295     channel = chl->channel;
3296
3297     /* Remove channel if this is last client leaving the channel, unless
3298        the channel is permanent. */
3299     if (server->server_type != SILC_SERVER &&
3300         silc_hash_table_count(channel->user_list) < 2) {
3301       silc_server_channel_delete(server, channel);
3302       continue;
3303     }
3304
3305     silc_hash_table_del(client->channels, channel);
3306     silc_hash_table_del(channel->user_list, chl->client);
3307     channel->user_count--;
3308
3309     /* If there is no global users on the channel anymore mark the channel
3310        as local channel. Do not check if the removed client is local client. */
3311     if (server->server_type == SILC_SERVER && channel->global_users &&
3312         chl->client->router && !silc_server_channel_has_global(channel))
3313       channel->global_users = FALSE;
3314
3315     silc_free(chl);
3316
3317     /* Update statistics */
3318     if (SILC_IS_LOCAL(client))
3319       server->stat.my_chanclients--;
3320     if (server->server_type == SILC_ROUTER) {
3321       server->stat.cell_chanclients--;
3322       server->stat.chanclients--;
3323     }
3324
3325     /* If there is not at least one local user on the channel then we don't
3326        need the channel entry anymore, we can remove it safely, unless the
3327        channel is permanent channel */
3328     if (server->server_type == SILC_SERVER &&
3329         !silc_server_channel_has_local(channel)) {
3330       /* Notify about leaving client if this channel has global users. */
3331       if (notify && channel->global_users)
3332         silc_server_send_notify_to_channel(server, NULL, channel, FALSE,
3333                                            SILC_NOTIFY_TYPE_SIGNOFF,
3334                                            signoff_message ? 2 : 1,
3335                                            clidp->data, clidp->len,
3336                                            signoff_message, signoff_message ?
3337                                            strlen(signoff_message) : 0);
3338
3339       silc_schedule_task_del_by_context(server->schedule, channel->rekey);
3340       silc_server_channel_delete(server, channel);
3341       continue;
3342     }
3343
3344     /* Send notify to channel about client leaving SILC and channel too */
3345     if (notify)
3346       silc_server_send_notify_to_channel(server, NULL, channel, FALSE,
3347                                          SILC_NOTIFY_TYPE_SIGNOFF,
3348                                          signoff_message ? 2 : 1,
3349                                          clidp->data, clidp->len,
3350                                          signoff_message, signoff_message ?
3351                                          strlen(signoff_message) : 0);
3352
3353     /* Don't create keys if we are shutting down */
3354     if (server->server_shutdown)
3355       continue;
3356
3357     /* Re-generate channel key if needed */
3358     if (keygen && !(channel->mode & SILC_CHANNEL_MODE_PRIVKEY)) {
3359       if (!silc_server_create_channel_key(server, channel, 0))
3360         continue;
3361
3362       /* Send the channel key to the channel. The key of course is not sent
3363          to the client who was removed from the channel. */
3364       silc_server_send_channel_key(server, client->connection, channel,
3365                                    server->server_type == SILC_ROUTER ?
3366                                    FALSE : !server->standalone);
3367     }
3368   }
3369
3370   silc_hash_table_list_reset(&htl);
3371   if (clidp)
3372     silc_buffer_free(clidp);
3373 }
3374
3375 /* Removes client from one channel. This is used for example when client
3376    calls LEAVE command to remove itself from the channel. Returns TRUE
3377    if channel still exists and FALSE if the channel is removed when
3378    last client leaves the channel. If `notify' is FALSE notify messages
3379    are not sent. */
3380
3381 bool silc_server_remove_from_one_channel(SilcServer server,
3382                                          SilcSocketConnection sock,
3383                                          SilcChannelEntry channel,
3384                                          SilcClientEntry client,
3385                                          bool notify)
3386 {
3387   SilcChannelClientEntry chl;
3388   SilcBuffer clidp;
3389
3390   SILC_LOG_DEBUG(("Removing %s from channel %s",
3391                   silc_id_render(client->id, SILC_ID_CLIENT), 
3392                   channel->channel_name));
3393
3394   /* Get the entry to the channel, if this client is not on the channel
3395      then return Ok. */
3396   if (!silc_hash_table_find(client->channels, channel, NULL, (void *)&chl))
3397     return TRUE;
3398
3399   /* Remove channel if this is last client leaving the channel, unless
3400      the channel is permanent. */
3401   if (server->server_type != SILC_SERVER &&
3402       silc_hash_table_count(channel->user_list) < 2) {
3403     silc_server_channel_delete(server, channel);
3404     return FALSE;
3405   }
3406
3407   silc_hash_table_del(client->channels, chl->channel);
3408   silc_hash_table_del(channel->user_list, chl->client);
3409   channel->user_count--;
3410
3411   /* If there is no global users on the channel anymore mark the channel
3412      as local channel. Do not check if the client is local client. */
3413   if (server->server_type == SILC_SERVER && channel->global_users &&
3414       chl->client->router && !silc_server_channel_has_global(channel))
3415     channel->global_users = FALSE;
3416
3417   silc_free(chl);
3418
3419   /* Update statistics */
3420   if (SILC_IS_LOCAL(client))
3421     server->stat.my_chanclients--;
3422   if (server->server_type == SILC_ROUTER) {
3423     server->stat.cell_chanclients--;
3424     server->stat.chanclients--;
3425   }
3426
3427   clidp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
3428   if (!clidp)
3429     notify = FALSE;
3430
3431   /* If there is not at least one local user on the channel then we don't
3432      need the channel entry anymore, we can remove it safely, unless the
3433      channel is permanent channel */
3434   if (server->server_type == SILC_SERVER &&
3435       !silc_server_channel_has_local(channel)) {
3436     /* Notify about leaving client if this channel has global users. */
3437     if (notify && channel->global_users)
3438       silc_server_send_notify_to_channel(server, NULL, channel, FALSE,
3439                                          SILC_NOTIFY_TYPE_LEAVE, 1,
3440                                          clidp->data, clidp->len);
3441
3442     silc_schedule_task_del_by_context(server->schedule, channel->rekey);
3443     silc_server_channel_delete(server, channel);
3444     silc_buffer_free(clidp);
3445     return FALSE;
3446   }
3447
3448   /* Send notify to channel about client leaving the channel */
3449   if (notify)
3450     silc_server_send_notify_to_channel(server, NULL, channel, FALSE,
3451                                        SILC_NOTIFY_TYPE_LEAVE, 1,
3452                                        clidp->data, clidp->len);
3453
3454   silc_buffer_free(clidp);
3455   return TRUE;
3456 }
3457
3458 /* Timeout callback. This is called if connection is idle or for some
3459    other reason is not responding within some period of time. This
3460    disconnects the remote end. */
3461
3462 SILC_TASK_CALLBACK(silc_server_timeout_remote)
3463 {
3464   SilcServer server = (SilcServer)context;
3465   SilcSocketConnection sock = server->sockets[fd];
3466   SilcProtocolType protocol = 0;
3467
3468   SILC_LOG_DEBUG(("Start"));
3469
3470   if (!sock)
3471     return;
3472
3473   SILC_LOG_ERROR(("No response from %s (%s), Connection timeout",
3474                   sock->hostname, sock->ip));
3475
3476   /* If we have protocol active we must assure that we call the protocol's
3477      final callback so that all the memory is freed. */
3478   if (sock->protocol) {
3479     protocol = sock->protocol->protocol->type;
3480     silc_protocol_cancel(sock->protocol, server->schedule);
3481     sock->protocol->state = SILC_PROTOCOL_STATE_ERROR;
3482     silc_protocol_execute_final(sock->protocol, server->schedule);
3483     sock->protocol = NULL;
3484     return;
3485   }
3486
3487   if (sock->user_data)
3488     silc_server_free_sock_user_data(server, sock, NULL);
3489
3490   silc_server_disconnect_remote(server, sock, 
3491                                 protocol == 
3492                                 SILC_PROTOCOL_SERVER_CONNECTION_AUTH ?
3493                                 SILC_STATUS_ERR_AUTH_FAILED :
3494                                 SILC_STATUS_ERR_KEY_EXCHANGE_FAILED,
3495                                 "Connection timeout");
3496 }
3497
3498 /* Creates new channel. Sends NEW_CHANNEL packet to primary route. This
3499    function may be used only by router. In real SILC network all channels
3500    are created by routers thus this function is never used by normal
3501    server. */
3502
3503 SilcChannelEntry silc_server_create_new_channel(SilcServer server,
3504                                                 SilcServerID *router_id,
3505                                                 char *cipher,
3506                                                 char *hmac,
3507                                                 char *channel_name,
3508                                                 int broadcast)
3509 {
3510   SilcChannelID *channel_id;
3511   SilcChannelEntry entry;
3512   SilcCipher key;
3513   SilcHmac newhmac;
3514
3515   SILC_LOG_DEBUG(("Creating new channel %s", channel_name));
3516
3517   if (!cipher)
3518     cipher = SILC_DEFAULT_CIPHER;
3519   if (!hmac)
3520     hmac = SILC_DEFAULT_HMAC;
3521
3522   /* Allocate cipher */
3523   if (!silc_cipher_alloc(cipher, &key))
3524     return NULL;
3525
3526   /* Allocate hmac */
3527   if (!silc_hmac_alloc(hmac, NULL, &newhmac)) {
3528     silc_cipher_free(key);
3529     return NULL;
3530   }
3531
3532   channel_name = strdup(channel_name);
3533
3534   /* Create the channel ID */
3535   if (!silc_id_create_channel_id(server, router_id, server->rng,
3536                                  &channel_id)) {
3537     silc_free(channel_name);
3538     silc_cipher_free(key);
3539     silc_hmac_free(newhmac);
3540     return NULL;
3541   }
3542
3543   /* Create the channel */
3544   entry = silc_idlist_add_channel(server->local_list, channel_name,
3545                                   SILC_CHANNEL_MODE_NONE, channel_id,
3546                                   NULL, key, newhmac, 0);
3547   if (!entry) {
3548     silc_free(channel_name);
3549     silc_cipher_free(key);
3550     silc_hmac_free(newhmac);
3551     silc_free(channel_id);
3552     return NULL;
3553   }
3554
3555   entry->cipher = strdup(cipher);
3556   entry->hmac_name = strdup(hmac);
3557
3558   /* Now create the actual key material */
3559   if (!silc_server_create_channel_key(server, entry,
3560                                       silc_cipher_get_key_len(key) / 8)) {
3561     silc_idlist_del_channel(server->local_list, entry);
3562     return NULL;
3563   }
3564
3565   /* Notify other routers about the new channel. We send the packet
3566      to our primary route. */
3567   if (broadcast)
3568     silc_server_send_new_channel(server, SILC_PRIMARY_ROUTE(server), TRUE,
3569                                  channel_name, entry->id,
3570                                  silc_id_get_len(entry->id, SILC_ID_CHANNEL),
3571                                  entry->mode);
3572
3573   /* Distribute to backup routers */
3574   if (broadcast && server->server_type == SILC_ROUTER) {
3575     SilcBuffer packet;
3576     unsigned char *cid;
3577     SilcUInt32 name_len = strlen(channel_name);
3578     SilcUInt32 channel_id_len = silc_id_get_len(entry->id, SILC_ID_CHANNEL);
3579     cid = silc_id_id2str(entry->id, SILC_ID_CHANNEL);
3580
3581     packet = silc_channel_payload_encode(channel_name, name_len,
3582                                          cid, channel_id_len, entry->mode);
3583     silc_server_backup_send(server, NULL, SILC_PACKET_NEW_CHANNEL, 0,
3584                             packet->data, packet->len, FALSE, TRUE);
3585     silc_free(cid);
3586     silc_buffer_free(packet);
3587   }
3588
3589   server->stat.my_channels++;
3590   if (server->server_type == SILC_ROUTER) {
3591     server->stat.channels++;
3592     server->stat.cell_channels++;
3593     entry->users_resolved = TRUE;
3594   }
3595
3596   return entry;
3597 }
3598
3599 /* Same as above but creates the channel with Channel ID `channel_id. */
3600
3601 SilcChannelEntry
3602 silc_server_create_new_channel_with_id(SilcServer server,
3603                                        char *cipher,
3604                                        char *hmac,
3605                                        char *channel_name,
3606                                        SilcChannelID *channel_id,
3607                                        int broadcast)
3608 {
3609   SilcChannelEntry entry;
3610   SilcCipher key;
3611   SilcHmac newhmac;
3612
3613   SILC_LOG_DEBUG(("Creating new channel %s", channel_name));
3614
3615   if (!cipher)
3616     cipher = SILC_DEFAULT_CIPHER;
3617   if (!hmac)
3618     hmac = SILC_DEFAULT_HMAC;
3619
3620   /* Allocate cipher */
3621   if (!silc_cipher_alloc(cipher, &key))
3622     return NULL;
3623
3624   /* Allocate hmac */
3625   if (!silc_hmac_alloc(hmac, NULL, &newhmac)) {
3626     silc_cipher_free(key);
3627     return NULL;
3628   }
3629
3630   channel_name = strdup(channel_name);
3631
3632   /* Create the channel */
3633   entry = silc_idlist_add_channel(server->local_list, channel_name,
3634                                   SILC_CHANNEL_MODE_NONE, channel_id,
3635                                   NULL, key, newhmac, 0);
3636   if (!entry) {
3637     silc_cipher_free(key);
3638     silc_hmac_free(newhmac);
3639     silc_free(channel_name);
3640     return NULL;
3641   }
3642
3643   /* Now create the actual key material */
3644   if (!silc_server_create_channel_key(server, entry,
3645                                       silc_cipher_get_key_len(key) / 8)) {
3646     silc_idlist_del_channel(server->local_list, entry);
3647     return NULL;
3648   }
3649
3650   /* Notify other routers about the new channel. We send the packet
3651      to our primary route. */
3652   if (broadcast)
3653     silc_server_send_new_channel(server, SILC_PRIMARY_ROUTE(server), TRUE,
3654                                  channel_name, entry->id,
3655                                  silc_id_get_len(entry->id, SILC_ID_CHANNEL),
3656                                  entry->mode);
3657
3658   /* Distribute to backup routers */
3659   if (broadcast && server->server_type == SILC_ROUTER) {
3660     SilcBuffer packet;
3661     unsigned char *cid;
3662     SilcUInt32 name_len = strlen(channel_name);
3663     SilcUInt32 channel_id_len = silc_id_get_len(entry->id, SILC_ID_CHANNEL);
3664     cid = silc_id_id2str(entry->id, SILC_ID_CHANNEL);
3665
3666     packet = silc_channel_payload_encode(channel_name, name_len,
3667                                          cid, channel_id_len, entry->mode);
3668     silc_server_backup_send(server, NULL, SILC_PACKET_NEW_CHANNEL, 0,
3669                             packet->data, packet->len, FALSE, TRUE);
3670     silc_free(cid);
3671     silc_buffer_free(packet);
3672   }
3673
3674   server->stat.my_channels++;
3675   if (server->server_type == SILC_ROUTER) {
3676     server->stat.channels++;
3677     server->stat.cell_channels++;
3678     entry->users_resolved = TRUE;
3679   }
3680
3681   return entry;
3682 }
3683
3684 /* Channel's key re-key timeout callback. */
3685
3686 SILC_TASK_CALLBACK(silc_server_channel_key_rekey)
3687 {
3688   SilcServer server = app_context;
3689   SilcServerChannelRekey rekey = (SilcServerChannelRekey)context;
3690
3691   rekey->task = NULL;
3692
3693   /* Return now if we are shutting down */
3694   if (server->server_shutdown)
3695     return;
3696
3697   if (!silc_server_create_channel_key(server, rekey->channel, rekey->key_len))
3698     return;
3699
3700   silc_server_send_channel_key(server, NULL, rekey->channel, FALSE);
3701 }
3702
3703 /* Generates new channel key. This is used to create the initial channel key
3704    but also to re-generate new key for channel. If `key_len' is provided
3705    it is the bytes of the key length. */
3706
3707 bool silc_server_create_channel_key(SilcServer server,
3708                                     SilcChannelEntry channel,
3709                                     SilcUInt32 key_len)
3710 {
3711   int i;
3712   unsigned char channel_key[32], hash[32];
3713   SilcUInt32 len;
3714
3715   if (channel->mode & SILC_CHANNEL_MODE_PRIVKEY) {
3716     SILC_LOG_DEBUG(("Channel has private keys, will not generate new key"));
3717     return TRUE;
3718   }
3719
3720   SILC_LOG_DEBUG(("Generating channel %s key", channel->channel_name));
3721
3722   if (!channel->channel_key)
3723     if (!silc_cipher_alloc(SILC_DEFAULT_CIPHER, &channel->channel_key)) {
3724       channel->channel_key = NULL;
3725       return FALSE;
3726     }
3727
3728   if (key_len)
3729     len = key_len;
3730   else if (channel->key_len)
3731     len = channel->key_len / 8;
3732   else
3733     len = silc_cipher_get_key_len(channel->channel_key) / 8;
3734
3735   /* Create channel key */
3736   for (i = 0; i < len; i++) channel_key[i] = silc_rng_get_byte(server->rng);
3737
3738   /* Set the key */
3739   silc_cipher_set_key(channel->channel_key, channel_key, len * 8);
3740
3741   /* Remove old key if exists */
3742   if (channel->key) {
3743     memset(channel->key, 0, channel->key_len / 8);
3744     silc_free(channel->key);
3745   }
3746
3747   /* Save the key */
3748   channel->key_len = len * 8;
3749   channel->key = silc_memdup(channel_key, len);
3750   memset(channel_key, 0, sizeof(channel_key));
3751
3752   /* Generate HMAC key from the channel key data and set it */
3753   if (!channel->hmac)
3754     silc_hmac_alloc(SILC_DEFAULT_HMAC, NULL, &channel->hmac);
3755   silc_hash_make(silc_hmac_get_hash(channel->hmac), channel->key, len, hash);
3756   silc_hmac_set_key(channel->hmac, hash,
3757                     silc_hash_len(silc_hmac_get_hash(channel->hmac)));
3758   memset(hash, 0, sizeof(hash));
3759
3760   if (server->server_type == SILC_ROUTER) {
3761     if (!channel->rekey)
3762       channel->rekey = silc_calloc(1, sizeof(*channel->rekey));
3763     channel->rekey->channel = channel;
3764     channel->rekey->key_len = key_len;
3765     if (channel->rekey->task)
3766       silc_schedule_task_del(server->schedule, channel->rekey->task);
3767
3768     channel->rekey->task =
3769       silc_schedule_task_add(server->schedule, 0,
3770                              silc_server_channel_key_rekey,
3771                              (void *)channel->rekey,
3772                              server->config->channel_rekey_secs, 0,
3773                              SILC_TASK_TIMEOUT,
3774                              SILC_TASK_PRI_NORMAL);
3775   }
3776
3777   return TRUE;
3778 }
3779
3780 /* Saves the channel key found in the encoded `key_payload' buffer. This
3781    function is used when we receive Channel Key Payload and also when we're
3782    processing JOIN command reply. Returns entry to the channel. */
3783
3784 SilcChannelEntry silc_server_save_channel_key(SilcServer server,
3785                                               SilcBuffer key_payload,
3786                                               SilcChannelEntry channel)
3787 {
3788   SilcChannelKeyPayload payload = NULL;
3789   SilcChannelID *id = NULL;
3790   unsigned char *tmp, hash[32];
3791   SilcUInt32 tmp_len;
3792   char *cipher;
3793
3794   /* Decode channel key payload */
3795   payload = silc_channel_key_payload_parse(key_payload->data,
3796                                            key_payload->len);
3797   if (!payload) {
3798     SILC_LOG_ERROR(("Bad channel key payload received, dropped"));
3799     channel = NULL;
3800     goto out;
3801   }
3802
3803   /* Get the channel entry */
3804   if (!channel) {
3805
3806     /* Get channel ID */
3807     tmp = silc_channel_key_get_id(payload, &tmp_len);
3808     id = silc_id_str2id(tmp, tmp_len, SILC_ID_CHANNEL);
3809     if (!id) {
3810       channel = NULL;
3811       goto out;
3812     }
3813
3814     channel = silc_idlist_find_channel_by_id(server->local_list, id, NULL);
3815     if (!channel) {
3816       channel = silc_idlist_find_channel_by_id(server->global_list, id, NULL);
3817       if (!channel) {
3818         if (server->server_type == SILC_ROUTER)
3819           SILC_LOG_ERROR(("Received key for non-existent channel %s",
3820                           silc_id_render(id, SILC_ID_CHANNEL)));
3821         goto out;
3822       }
3823     }
3824   }
3825
3826   SILC_LOG_DEBUG(("Saving new channel %s key", channel->channel_name));
3827
3828   tmp = silc_channel_key_get_key(payload, &tmp_len);
3829   if (!tmp) {
3830     channel = NULL;
3831     goto out;
3832   }
3833
3834   cipher = silc_channel_key_get_cipher(payload, NULL);
3835   if (!cipher) {
3836     channel = NULL;
3837     goto out;
3838   }
3839
3840   /* Remove old key if exists */
3841   if (channel->key) {
3842     memset(channel->key, 0, channel->key_len / 8);
3843     silc_free(channel->key);
3844     silc_cipher_free(channel->channel_key);
3845   }
3846
3847   /* Create new cipher */
3848   if (!silc_cipher_alloc(cipher, &channel->channel_key)) {
3849     channel->channel_key = NULL;
3850     channel = NULL;
3851     goto out;
3852   }
3853
3854   if (channel->cipher)
3855     silc_free(channel->cipher);
3856   channel->cipher = strdup(cipher);
3857
3858   /* Save the key */
3859   channel->key_len = tmp_len * 8;
3860   channel->key = silc_memdup(tmp, tmp_len);
3861   silc_cipher_set_key(channel->channel_key, tmp, channel->key_len);
3862
3863   /* Generate HMAC key from the channel key data and set it */
3864   if (!channel->hmac)
3865     silc_hmac_alloc(SILC_DEFAULT_HMAC, NULL, &channel->hmac);
3866   silc_hash_make(silc_hmac_get_hash(channel->hmac), tmp, tmp_len, hash);
3867   silc_hmac_set_key(channel->hmac, hash,
3868                     silc_hash_len(silc_hmac_get_hash(channel->hmac)));
3869
3870   memset(hash, 0, sizeof(hash));
3871   memset(tmp, 0, tmp_len);
3872
3873   if (server->server_type == SILC_ROUTER) {
3874     if (!channel->rekey)
3875       channel->rekey = silc_calloc(1, sizeof(*channel->rekey));
3876     channel->rekey->channel = channel;
3877     if (channel->rekey->task)
3878       silc_schedule_task_del(server->schedule, channel->rekey->task);
3879
3880     channel->rekey->task =
3881       silc_schedule_task_add(server->schedule, 0,
3882                              silc_server_channel_key_rekey,
3883                              (void *)channel->rekey,
3884                              server->config->channel_rekey_secs, 0,
3885                              SILC_TASK_TIMEOUT,
3886                              SILC_TASK_PRI_NORMAL);
3887   }
3888
3889  out:
3890   silc_free(id);
3891   if (payload)
3892     silc_channel_key_payload_free(payload);
3893
3894   return channel;
3895 }
3896
3897 /* Heartbeat callback. This function is set as argument for the
3898    silc_socket_set_heartbeat function. The library will call this function
3899    at the set time interval. */
3900
3901 void silc_server_perform_heartbeat(SilcSocketConnection sock,
3902                                    void *hb_context)
3903 {
3904   SilcServer server = hb_context;
3905
3906   SILC_LOG_DEBUG(("Sending heartbeat to %s:%d (%s)", sock->hostname, 
3907                  sock->port, sock->ip));
3908
3909   /* Send the heartbeat */
3910   silc_server_send_heartbeat(server, sock);
3911 }
3912
3913 /* Returns assembled of all servers in the given ID list. The packet's
3914    form is dictated by the New ID payload. */
3915
3916 static void silc_server_announce_get_servers(SilcServer server,
3917                                              SilcServerEntry remote,
3918                                              SilcIDList id_list,
3919                                              SilcBuffer *servers,
3920                                              unsigned long creation_time)
3921 {
3922   SilcIDCacheList list;
3923   SilcIDCacheEntry id_cache;
3924   SilcServerEntry entry;
3925   SilcBuffer idp;
3926
3927   /* Go through all clients in the list */
3928   if (silc_idcache_get_all(id_list->servers, &list)) {
3929     if (silc_idcache_list_first(list, &id_cache)) {
3930       while (id_cache) {
3931         entry = (SilcServerEntry)id_cache->context;
3932
3933         /* Do not announce the one we've sending our announcements and
3934            do not announce ourself. Also check the creation time if it's
3935            provided. */
3936         if ((entry == remote) || (entry == server->id_entry) ||
3937             (creation_time && entry->data.created < creation_time)) {
3938           if (!silc_idcache_list_next(list, &id_cache))
3939             break;
3940           continue;
3941         }
3942
3943         idp = silc_id_payload_encode(entry->id, SILC_ID_SERVER);
3944
3945         *servers = silc_buffer_realloc(*servers,
3946                                        (*servers ?
3947                                         (*servers)->truelen + idp->len :
3948                                         idp->len));
3949         silc_buffer_pull_tail(*servers, ((*servers)->end - (*servers)->data));
3950         silc_buffer_put(*servers, idp->data, idp->len);
3951         silc_buffer_pull(*servers, idp->len);
3952         silc_buffer_free(idp);
3953
3954         if (!silc_idcache_list_next(list, &id_cache))
3955           break;
3956       }
3957     }
3958
3959     silc_idcache_list_free(list);
3960   }
3961 }
3962
3963 static SilcBuffer
3964 silc_server_announce_encode_notify(SilcNotifyType notify, SilcUInt32 argc, ...)
3965 {
3966   va_list ap;
3967   SilcBuffer p;
3968
3969   va_start(ap, argc);
3970   p = silc_notify_payload_encode(notify, argc, ap);
3971   va_end(ap);
3972
3973   return p;
3974 }
3975
3976 /* This function is used by router to announce existing servers to our
3977    primary router when we've connected to it. If `creation_time' is non-zero
3978    then only the servers that has been created after the `creation_time'
3979    will be announced. */
3980
3981 void silc_server_announce_servers(SilcServer server, bool global,
3982                                   unsigned long creation_time,
3983                                   SilcSocketConnection remote)
3984 {
3985   SilcBuffer servers = NULL;
3986
3987   SILC_LOG_DEBUG(("Announcing servers"));
3988
3989   /* Get servers in local list */
3990   silc_server_announce_get_servers(server, remote->user_data,
3991                                    server->local_list, &servers,
3992                                    creation_time);
3993
3994   if (global)
3995     /* Get servers in global list */
3996     silc_server_announce_get_servers(server, remote->user_data,
3997                                      server->global_list, &servers,
3998                                      creation_time);
3999
4000   if (servers) {
4001     silc_buffer_push(servers, servers->data - servers->head);
4002     SILC_LOG_HEXDUMP(("servers"), servers->data, servers->len);
4003
4004     /* Send the packet */
4005     silc_server_packet_send(server, remote,
4006                             SILC_PACKET_NEW_ID, SILC_PACKET_FLAG_LIST,
4007                             servers->data, servers->len, TRUE);
4008
4009     silc_buffer_free(servers);
4010   }
4011 }
4012
4013 /* Returns assembled packet of all clients in the given ID list. The
4014    packet's form is dictated by the New ID Payload. */
4015
4016 static void silc_server_announce_get_clients(SilcServer server,
4017                                              SilcIDList id_list,
4018                                              SilcBuffer *clients,
4019                                              SilcBuffer *umodes,
4020                                              unsigned long creation_time)
4021 {
4022   SilcIDCacheList list;
4023   SilcIDCacheEntry id_cache;
4024   SilcClientEntry client;
4025   SilcBuffer idp;
4026   SilcBuffer tmp;
4027   unsigned char mode[4];
4028
4029   /* Go through all clients in the list */
4030   if (silc_idcache_get_all(id_list->clients, &list)) {
4031     if (silc_idcache_list_first(list, &id_cache)) {
4032       while (id_cache) {
4033         client = (SilcClientEntry)id_cache->context;
4034
4035         if (creation_time && client->data.created < creation_time) {
4036           if (!silc_idcache_list_next(list, &id_cache))
4037             break;
4038           continue;
4039         }
4040         if (!(client->data.status & SILC_IDLIST_STATUS_REGISTERED) &&
4041             !client->connection && !client->router && !SILC_IS_LOCAL(client)) {
4042           if (!silc_idcache_list_next(list, &id_cache))
4043             break;
4044           continue;
4045         }
4046
4047         idp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
4048
4049         *clients = silc_buffer_realloc(*clients,
4050                                        (*clients ?
4051                                         (*clients)->truelen + idp->len :
4052                                         idp->len));
4053         silc_buffer_pull_tail(*clients, ((*clients)->end - (*clients)->data));
4054         silc_buffer_put(*clients, idp->data, idp->len);
4055         silc_buffer_pull(*clients, idp->len);
4056
4057         SILC_PUT32_MSB(client->mode, mode);
4058         tmp =
4059           silc_server_announce_encode_notify(SILC_NOTIFY_TYPE_UMODE_CHANGE,
4060                                              2, idp->data, idp->len,
4061                                              mode, 4);
4062         *umodes = silc_buffer_realloc(*umodes,
4063                                       (*umodes ?
4064                                        (*umodes)->truelen + tmp->len :
4065                                        tmp->len));
4066         silc_buffer_pull_tail(*umodes, ((*umodes)->end - (*umodes)->data));
4067         silc_buffer_put(*umodes, tmp->data, tmp->len);
4068         silc_buffer_pull(*umodes, tmp->len);
4069         silc_buffer_free(tmp);
4070
4071         silc_buffer_free(idp);
4072
4073         if (!silc_idcache_list_next(list, &id_cache))
4074           break;
4075       }
4076     }
4077
4078     silc_idcache_list_free(list);
4079   }
4080 }
4081
4082 /* This function is used to announce our existing clients to our router
4083    when we've connected to it. If `creation_time' is non-zero then only
4084    the clients that has been created after the `creation_time' will be
4085    announced. */
4086
4087 void silc_server_announce_clients(SilcServer server,
4088                                   unsigned long creation_time,
4089                                   SilcSocketConnection remote)
4090 {
4091   SilcBuffer clients = NULL;
4092   SilcBuffer umodes = NULL;
4093
4094   SILC_LOG_DEBUG(("Announcing clients"));
4095
4096   /* Get clients in local list */
4097   silc_server_announce_get_clients(server, server->local_list,
4098                                    &clients, &umodes, creation_time);
4099
4100   /* As router we announce our global list as well */
4101   if (server->server_type == SILC_ROUTER)
4102     silc_server_announce_get_clients(server, server->global_list,
4103                                      &clients, &umodes, creation_time);
4104
4105   if (clients) {
4106     silc_buffer_push(clients, clients->data - clients->head);
4107     SILC_LOG_HEXDUMP(("clients"), clients->data, clients->len);
4108
4109     /* Send the packet */
4110     silc_server_packet_send(server, remote,
4111                             SILC_PACKET_NEW_ID, SILC_PACKET_FLAG_LIST,
4112                             clients->data, clients->len, TRUE);
4113
4114     silc_buffer_free(clients);
4115   }
4116
4117   if (umodes) {
4118     silc_buffer_push(umodes, umodes->data - umodes->head);
4119     SILC_LOG_HEXDUMP(("umodes"), umodes->data, umodes->len);
4120
4121     /* Send the packet */
4122     silc_server_packet_send(server, remote,
4123                             SILC_PACKET_NOTIFY, SILC_PACKET_FLAG_LIST,
4124                             umodes->data, umodes->len, TRUE);
4125
4126     silc_buffer_free(umodes);
4127   }
4128 }
4129
4130 /* Returns channel's topic for announcing it */
4131
4132 void silc_server_announce_get_channel_topic(SilcServer server,
4133                                             SilcChannelEntry channel,
4134                                             SilcBuffer *topic)
4135 {
4136   SilcBuffer chidp;
4137
4138   if (channel->topic) {
4139     chidp = silc_id_payload_encode(channel->id, SILC_ID_CHANNEL);
4140     *topic = silc_server_announce_encode_notify(SILC_NOTIFY_TYPE_TOPIC_SET, 2,
4141                                                 chidp->data, chidp->len,
4142                                                 channel->topic,
4143                                                 strlen(channel->topic));
4144     silc_buffer_free(chidp);
4145   }
4146 }
4147
4148 /* Returns assembled packets for channel users of the `channel'. */
4149
4150 void silc_server_announce_get_channel_users(SilcServer server,
4151                                             SilcChannelEntry channel,
4152                                             SilcBuffer *channel_modes,
4153                                             SilcBuffer *channel_users,
4154                                             SilcBuffer *channel_users_modes)
4155 {
4156   SilcChannelClientEntry chl;
4157   SilcHashTableList htl;
4158   SilcBuffer chidp, clidp, csidp;
4159   SilcBuffer tmp;
4160   int len;
4161   unsigned char mode[4], *fkey = NULL;
4162   SilcUInt32 fkey_len = 0;
4163   char *hmac;
4164
4165   SILC_LOG_DEBUG(("Start"));
4166
4167   chidp = silc_id_payload_encode(channel->id, SILC_ID_CHANNEL);
4168   csidp = silc_id_payload_encode(server->id, SILC_ID_SERVER);
4169
4170   /* CMODE notify */
4171   SILC_PUT32_MSB(channel->mode, mode);
4172   hmac = channel->hmac ? (char *)silc_hmac_get_name(channel->hmac) : NULL;
4173   if (channel->founder_key)
4174     fkey = silc_pkcs_public_key_encode(channel->founder_key, &fkey_len);
4175   tmp = 
4176     silc_server_announce_encode_notify(SILC_NOTIFY_TYPE_CMODE_CHANGE,
4177                                        6, csidp->data, csidp->len,
4178                                        mode, sizeof(mode),
4179                                        NULL, 0,
4180                                        hmac, hmac ? strlen(hmac) : 0,
4181                                        channel->passphrase,
4182                                        channel->passphrase ?
4183                                        strlen(channel->passphrase) : 0,
4184                                        fkey, fkey_len);
4185   len = tmp->len;
4186   *channel_modes =
4187     silc_buffer_realloc(*channel_modes,
4188                         (*channel_modes ?
4189                          (*channel_modes)->truelen + len : len));
4190   silc_buffer_pull_tail(*channel_modes,
4191                         ((*channel_modes)->end -
4192                          (*channel_modes)->data));
4193   silc_buffer_put(*channel_modes, tmp->data, tmp->len);
4194   silc_buffer_pull(*channel_modes, len);
4195   silc_buffer_free(tmp);
4196   silc_free(fkey);
4197   fkey = NULL;
4198   fkey_len = 0;
4199
4200   /* Now find all users on the channel */
4201   silc_hash_table_list(channel->user_list, &htl);
4202   while (silc_hash_table_get(&htl, NULL, (void *)&chl)) {
4203     clidp = silc_id_payload_encode(chl->client->id, SILC_ID_CLIENT);
4204
4205     /* JOIN Notify */
4206     tmp = silc_server_announce_encode_notify(SILC_NOTIFY_TYPE_JOIN, 2,
4207                                              clidp->data, clidp->len,
4208                                              chidp->data, chidp->len);
4209     len = tmp->len;
4210     *channel_users =
4211       silc_buffer_realloc(*channel_users,
4212                           (*channel_users ?
4213                            (*channel_users)->truelen + len : len));
4214     silc_buffer_pull_tail(*channel_users,
4215                           ((*channel_users)->end -
4216                            (*channel_users)->data));
4217
4218     silc_buffer_put(*channel_users, tmp->data, tmp->len);
4219     silc_buffer_pull(*channel_users, len);
4220     silc_buffer_free(tmp);
4221
4222     /* CUMODE notify for mode change on the channel */
4223     SILC_PUT32_MSB(chl->mode, mode);
4224     if (chl->mode & SILC_CHANNEL_UMODE_CHANFO && channel->founder_key)
4225       fkey = silc_pkcs_public_key_encode(channel->founder_key, &fkey_len);
4226     tmp = silc_server_announce_encode_notify(SILC_NOTIFY_TYPE_CUMODE_CHANGE,
4227                                              4, csidp->data, csidp->len,
4228                                              mode, sizeof(mode),
4229                                              clidp->data, clidp->len,
4230                                              fkey, fkey_len);
4231     len = tmp->len;
4232     *channel_users_modes =
4233       silc_buffer_realloc(*channel_users_modes,
4234                           (*channel_users_modes ?
4235                            (*channel_users_modes)->truelen + len : len));
4236     silc_buffer_pull_tail(*channel_users_modes,
4237                           ((*channel_users_modes)->end -
4238                            (*channel_users_modes)->data));
4239
4240     silc_buffer_put(*channel_users_modes, tmp->data, tmp->len);
4241     silc_buffer_pull(*channel_users_modes, len);
4242     silc_buffer_free(tmp);
4243     silc_free(fkey);
4244     fkey = NULL;
4245     fkey_len = 0;
4246     silc_buffer_free(clidp);
4247   }
4248   silc_hash_table_list_reset(&htl);
4249   silc_buffer_free(chidp);
4250   silc_buffer_free(csidp);
4251 }
4252
4253 /* Returns assembled packets for all channels and users on those channels
4254    from the given ID List. The packets are in the form dictated by the
4255    New Channel and New Channel User payloads. */
4256
4257 void silc_server_announce_get_channels(SilcServer server,
4258                                        SilcIDList id_list,
4259                                        SilcBuffer *channels,
4260                                        SilcBuffer **channel_modes,
4261                                        SilcBuffer *channel_users,
4262                                        SilcBuffer **channel_users_modes,
4263                                        SilcUInt32 *channel_users_modes_c,
4264                                        SilcBuffer **channel_topics,
4265                                        SilcChannelID ***channel_ids,
4266                                        unsigned long creation_time)
4267 {
4268   SilcIDCacheList list;
4269   SilcIDCacheEntry id_cache;
4270   SilcChannelEntry channel;
4271   unsigned char *cid;
4272   SilcUInt32 id_len;
4273   SilcUInt16 name_len;
4274   int len;
4275   int i = *channel_users_modes_c;
4276   bool announce;
4277
4278   SILC_LOG_DEBUG(("Start"));
4279
4280   /* Go through all channels in the list */
4281   if (silc_idcache_get_all(id_list->channels, &list)) {
4282     if (silc_idcache_list_first(list, &id_cache)) {
4283       while (id_cache) {
4284         channel = (SilcChannelEntry)id_cache->context;
4285
4286         if (creation_time && channel->created < creation_time)
4287           announce = FALSE;
4288         else
4289           announce = TRUE;
4290
4291         cid = silc_id_id2str(channel->id, SILC_ID_CHANNEL);
4292         id_len = silc_id_get_len(channel->id, SILC_ID_CHANNEL);
4293         name_len = strlen(channel->channel_name);
4294
4295         if (announce) {
4296           len = 4 + name_len + id_len + 4;
4297           *channels =
4298             silc_buffer_realloc(*channels,
4299                                 (*channels ? (*channels)->truelen +
4300                                  len : len));
4301           silc_buffer_pull_tail(*channels,
4302                                 ((*channels)->end - (*channels)->data));
4303           silc_buffer_format(*channels,
4304                              SILC_STR_UI_SHORT(name_len),
4305                              SILC_STR_UI_XNSTRING(channel->channel_name,
4306                                                   name_len),
4307                              SILC_STR_UI_SHORT(id_len),
4308                              SILC_STR_UI_XNSTRING(cid, id_len),
4309                              SILC_STR_UI_INT(channel->mode),
4310                              SILC_STR_END);
4311           silc_buffer_pull(*channels, len);
4312         }
4313
4314         if (creation_time && channel->updated < creation_time)
4315           announce = FALSE;
4316         else
4317           announce = TRUE;
4318
4319         if (announce) {
4320           /* Channel user modes */
4321           *channel_users_modes = silc_realloc(*channel_users_modes,
4322                                               sizeof(**channel_users_modes) *
4323                                               (i + 1));
4324           (*channel_users_modes)[i] = NULL;
4325           *channel_modes = silc_realloc(*channel_modes,
4326                                         sizeof(**channel_modes) * (i + 1));
4327           (*channel_modes)[i] = NULL;
4328           *channel_ids = silc_realloc(*channel_ids,
4329                                       sizeof(**channel_ids) * (i + 1));
4330           (*channel_ids)[i] = NULL;
4331           silc_server_announce_get_channel_users(server, channel,
4332                                                  &(*channel_modes)[i], 
4333                                                  channel_users,
4334                                                  &(*channel_users_modes)[i]);
4335           (*channel_ids)[i] = channel->id;
4336
4337           /* Channel's topic */
4338           *channel_topics = silc_realloc(*channel_topics,
4339                                          sizeof(**channel_topics) * (i + 1));
4340           (*channel_topics)[i] = NULL;
4341           silc_server_announce_get_channel_topic(server, channel,
4342                                                  &(*channel_topics)[i]);
4343           (*channel_users_modes_c)++;
4344           i++;
4345         }
4346
4347         if (!silc_idcache_list_next(list, &id_cache))
4348           break;
4349       }
4350     }
4351
4352     silc_idcache_list_free(list);
4353   }
4354 }
4355
4356 /* This function is used to announce our existing channels to our router
4357    when we've connected to it. This also announces the users on the
4358    channels to the router. If the `creation_time' is non-zero only the
4359    channels that was created after the `creation_time' are announced.
4360    Note that the channel users are still announced even if the `creation_time'
4361    was provided. */
4362
4363 void silc_server_announce_channels(SilcServer server,
4364                                    unsigned long creation_time,
4365                                    SilcSocketConnection remote)
4366 {
4367   SilcBuffer channels = NULL, *channel_modes = NULL, channel_users = NULL;
4368   SilcBuffer *channel_users_modes = NULL;
4369   SilcBuffer *channel_topics = NULL;
4370   SilcUInt32 channel_users_modes_c = 0;
4371   SilcChannelID **channel_ids = NULL;
4372
4373   SILC_LOG_DEBUG(("Announcing channels and channel users"));
4374
4375   /* Get channels and channel users in local list */
4376   silc_server_announce_get_channels(server, server->local_list,
4377                                     &channels, &channel_modes,
4378                                     &channel_users,
4379                                     &channel_users_modes,
4380                                     &channel_users_modes_c,
4381                                     &channel_topics,
4382                                     &channel_ids, creation_time);
4383
4384   /* Get channels and channel users in global list */
4385   if (server->server_type != SILC_SERVER)
4386     silc_server_announce_get_channels(server, server->global_list,
4387                                       &channels, &channel_modes,
4388                                       &channel_users,
4389                                       &channel_users_modes,
4390                                       &channel_users_modes_c,
4391                                       &channel_topics,
4392                                       &channel_ids, creation_time);
4393
4394   if (channels) {
4395     silc_buffer_push(channels, channels->data - channels->head);
4396     SILC_LOG_HEXDUMP(("channels"), channels->data, channels->len);
4397
4398     /* Send the packet */
4399     silc_server_packet_send(server, remote,
4400                             SILC_PACKET_NEW_CHANNEL, SILC_PACKET_FLAG_LIST,
4401                             channels->data, channels->len,
4402                             FALSE);
4403
4404     silc_buffer_free(channels);
4405   }
4406
4407   if (channel_users) {
4408     silc_buffer_push(channel_users, channel_users->data - channel_users->head);
4409     SILC_LOG_HEXDUMP(("channel users"), channel_users->data,
4410                      channel_users->len);
4411
4412     /* Send the packet */
4413     silc_server_packet_send(server, remote,
4414                             SILC_PACKET_NOTIFY, SILC_PACKET_FLAG_LIST,
4415                             channel_users->data, channel_users->len,
4416                             FALSE);
4417
4418     silc_buffer_free(channel_users);
4419   }
4420
4421   if (channel_modes) {
4422     int i;
4423
4424     for (i = 0; i < channel_users_modes_c; i++) {
4425       if (!channel_modes[i])
4426         continue;
4427       silc_buffer_push(channel_modes[i],
4428                        channel_modes[i]->data -
4429                        channel_modes[i]->head);
4430       SILC_LOG_HEXDUMP(("channel modes"), channel_modes[i]->data,
4431                        channel_modes[i]->len);
4432       silc_server_packet_send_dest(server, remote,
4433                                    SILC_PACKET_NOTIFY, SILC_PACKET_FLAG_LIST,
4434                                    channel_ids[i], SILC_ID_CHANNEL,
4435                                    channel_modes[i]->data,
4436                                    channel_modes[i]->len,
4437                                    FALSE);
4438       silc_buffer_free(channel_modes[i]);
4439     }
4440     silc_free(channel_modes);
4441   }
4442
4443   if (channel_users_modes) {
4444     int i;
4445
4446     for (i = 0; i < channel_users_modes_c; i++) {
4447       if (!channel_users_modes[i])
4448         continue;
4449       silc_buffer_push(channel_users_modes[i],
4450                        channel_users_modes[i]->data -
4451                        channel_users_modes[i]->head);
4452       SILC_LOG_HEXDUMP(("channel users modes"), channel_users_modes[i]->data,
4453                        channel_users_modes[i]->len);
4454       silc_server_packet_send_dest(server, remote,
4455                                    SILC_PACKET_NOTIFY, SILC_PACKET_FLAG_LIST,
4456                                    channel_ids[i], SILC_ID_CHANNEL,
4457                                    channel_users_modes[i]->data,
4458                                    channel_users_modes[i]->len,
4459                                    FALSE);
4460       silc_buffer_free(channel_users_modes[i]);
4461     }
4462     silc_free(channel_users_modes);
4463   }
4464
4465   if (channel_topics) {
4466     int i;
4467
4468     for (i = 0; i < channel_users_modes_c; i++) {
4469       if (!channel_topics[i])
4470         continue;
4471
4472       silc_buffer_push(channel_topics[i],
4473                        channel_topics[i]->data -
4474                        channel_topics[i]->head);
4475       SILC_LOG_HEXDUMP(("channel topic"), channel_topics[i]->data,
4476                        channel_topics[i]->len);
4477       silc_server_packet_send_dest(server, remote,
4478                                    SILC_PACKET_NOTIFY, SILC_PACKET_FLAG_LIST,
4479                                    channel_ids[i], SILC_ID_CHANNEL,
4480                                    channel_topics[i]->data,
4481                                    channel_topics[i]->len,
4482                                    FALSE);
4483       silc_buffer_free(channel_topics[i]);
4484     }
4485     silc_free(channel_topics);
4486   }
4487
4488   silc_free(channel_ids);
4489 }
4490
4491 /* Failure timeout callback. If this is called then we will immediately
4492    process the received failure. We always process the failure with timeout
4493    since we do not want to blindly trust to received failure packets.
4494    This won't be called (the timeout is cancelled) if the failure was
4495    bogus (it is bogus if remote does not close the connection after sending
4496    the failure). */
4497
4498 SILC_TASK_CALLBACK(silc_server_failure_callback)
4499 {
4500   SilcServer server = app_context;
4501   SilcServerFailureContext f = (SilcServerFailureContext)context;
4502
4503   if (f->sock->protocol) {
4504     f->sock->protocol->state = SILC_PROTOCOL_STATE_FAILURE;
4505     silc_protocol_execute(f->sock->protocol, server->schedule, 0, 0);
4506   }
4507
4508   silc_socket_free(f->sock);
4509   silc_free(f);
4510 }
4511
4512 /* Assembles user list and users mode list from the `channel'. */
4513
4514 bool silc_server_get_users_on_channel(SilcServer server,
4515                                       SilcChannelEntry channel,
4516                                       SilcBuffer *user_list,
4517                                       SilcBuffer *mode_list,
4518                                       SilcUInt32 *user_count)
4519 {
4520   SilcChannelClientEntry chl;
4521   SilcHashTableList htl;
4522   SilcBuffer client_id_list;
4523   SilcBuffer client_mode_list;
4524   SilcBuffer idp;
4525   SilcUInt32 list_count = 0, len = 0;
4526
4527   if (!silc_hash_table_count(channel->user_list))
4528     return FALSE;
4529
4530   silc_hash_table_list(channel->user_list, &htl);
4531   while (silc_hash_table_get(&htl, NULL, (void *)&chl))
4532     len += (silc_id_get_len(chl->client->id, SILC_ID_CLIENT) + 4);
4533   silc_hash_table_list_reset(&htl);
4534
4535   client_id_list = silc_buffer_alloc(len);
4536   client_mode_list =
4537     silc_buffer_alloc(4 * silc_hash_table_count(channel->user_list));
4538   silc_buffer_pull_tail(client_id_list, SILC_BUFFER_END(client_id_list));
4539   silc_buffer_pull_tail(client_mode_list, SILC_BUFFER_END(client_mode_list));
4540
4541   silc_hash_table_list(channel->user_list, &htl);
4542   while (silc_hash_table_get(&htl, NULL, (void *)&chl)) {
4543     /* Client ID */
4544     idp = silc_id_payload_encode(chl->client->id, SILC_ID_CLIENT);
4545     silc_buffer_put(client_id_list, idp->data, idp->len);
4546     silc_buffer_pull(client_id_list, idp->len);
4547     silc_buffer_free(idp);
4548
4549     /* Client's mode on channel */
4550     SILC_PUT32_MSB(chl->mode, client_mode_list->data);
4551     silc_buffer_pull(client_mode_list, 4);
4552
4553     list_count++;
4554   }
4555   silc_hash_table_list_reset(&htl);
4556   silc_buffer_push(client_id_list,
4557                    client_id_list->data - client_id_list->head);
4558   silc_buffer_push(client_mode_list,
4559                    client_mode_list->data - client_mode_list->head);
4560
4561   *user_list = client_id_list;
4562   *mode_list = client_mode_list;
4563   *user_count = list_count;
4564   return TRUE;
4565 }
4566
4567 /* Saves users and their modes to the `channel'. */
4568
4569 void silc_server_save_users_on_channel(SilcServer server,
4570                                        SilcSocketConnection sock,
4571                                        SilcChannelEntry channel,
4572                                        SilcClientID *noadd,
4573                                        SilcBuffer user_list,
4574                                        SilcBuffer mode_list,
4575                                        SilcUInt32 user_count)
4576 {
4577   int i;
4578   SilcUInt16 idp_len;
4579   SilcUInt32 mode;
4580   SilcClientID *client_id;
4581   SilcClientEntry client;
4582   SilcIDCacheEntry cache;
4583   SilcChannelClientEntry chl;
4584
4585   SILC_LOG_DEBUG(("Saving %d users on %s channel", user_count,
4586                   channel->channel_name));
4587
4588   for (i = 0; i < user_count; i++) {
4589     /* Client ID */
4590     SILC_GET16_MSB(idp_len, user_list->data + 2);
4591     idp_len += 4;
4592     client_id = silc_id_payload_parse_id(user_list->data, idp_len, NULL);
4593     silc_buffer_pull(user_list, idp_len);
4594     if (!client_id)
4595       continue;
4596
4597     /* Mode */
4598     SILC_GET32_MSB(mode, mode_list->data);
4599     silc_buffer_pull(mode_list, 4);
4600
4601     if (noadd && SILC_ID_CLIENT_COMPARE(client_id, noadd)) {
4602       silc_free(client_id);
4603       continue;
4604     }
4605
4606     cache = NULL;
4607
4608     /* Check if we have this client cached already. */
4609     client = silc_idlist_find_client_by_id(server->local_list, client_id,
4610                                            server->server_type, &cache);
4611     if (!client)
4612       client = silc_idlist_find_client_by_id(server->global_list,
4613                                              client_id, server->server_type,
4614                                              &cache);
4615     if (!client) {
4616       /* If router did not find such Client ID in its lists then this must
4617          be bogus client or some router in the net is buggy. */
4618       if (server->server_type != SILC_SERVER) {
4619         silc_free(client_id);
4620         continue;
4621       }
4622
4623       /* We don't have that client anywhere, add it. The client is added
4624          to global list since server didn't have it in the lists so it must be
4625          global. */
4626       client = silc_idlist_add_client(server->global_list, NULL, NULL, NULL,
4627                                       silc_id_dup(client_id, SILC_ID_CLIENT),
4628                                       sock->user_data, NULL, 0);
4629       if (!client) {
4630         SILC_LOG_ERROR(("Could not add new client to the ID Cache"));
4631         silc_free(client_id);
4632         continue;
4633       }
4634
4635       client->data.status |= SILC_IDLIST_STATUS_REGISTERED;
4636     }
4637
4638     if (cache)
4639       cache->expire = 0;
4640     silc_free(client_id);
4641
4642     if (!(client->data.status & SILC_IDLIST_STATUS_REGISTERED)) {
4643       SILC_LOG_ERROR(("Attempting to add unregistered client to channel ",
4644                       "%s", channel->channel_name));
4645       continue;
4646     }
4647
4648     if (!silc_server_client_on_channel(client, channel, &chl)) {
4649       /* Client was not on the channel, add it. */
4650       chl = silc_calloc(1, sizeof(*chl));
4651       chl->client = client;
4652       chl->mode = mode;
4653       chl->channel = channel;
4654       silc_hash_table_add(channel->user_list, chl->client, chl);
4655       silc_hash_table_add(client->channels, chl->channel, chl);
4656       channel->user_count++;
4657     } else {
4658       /* Update mode */
4659       chl->mode = mode;
4660     }
4661   }
4662 }
4663
4664 /* Saves channels and channels user modes to the `client'.  Removes
4665    the client from those channels that are not sent in the list but
4666    it has joined. */
4667
4668 void silc_server_save_user_channels(SilcServer server,
4669                                     SilcSocketConnection sock,
4670                                     SilcClientEntry client,
4671                                     SilcBuffer channels,
4672                                     SilcBuffer channels_user_modes)
4673 {
4674   SilcDList ch;
4675   SilcUInt32 *chumodes;
4676   SilcChannelPayload entry;
4677   SilcChannelEntry channel;
4678   SilcChannelID *channel_id;
4679   SilcChannelClientEntry chl;
4680   SilcHashTable ht = NULL;
4681   SilcHashTableList htl;
4682   char *name;
4683   int i = 0;
4684
4685   if (!channels || !channels_user_modes ||
4686       !(client->data.status & SILC_IDLIST_STATUS_REGISTERED))
4687     goto out;
4688   
4689   ch = silc_channel_payload_parse_list(channels->data, channels->len);
4690   if (ch && silc_get_mode_list(channels_user_modes, silc_dlist_count(ch),
4691                                &chumodes)) {
4692     ht = silc_hash_table_alloc(0, silc_hash_ptr, NULL, NULL, 
4693                                NULL, NULL, NULL, TRUE);
4694     silc_dlist_start(ch);
4695     while ((entry = silc_dlist_get(ch)) != SILC_LIST_END) {
4696       /* Check if we have this channel, and add it if we don't have it.
4697          Also add the client on the channel unless it is there already. */
4698       channel_id = silc_channel_get_id_parse(entry);
4699       channel = silc_idlist_find_channel_by_id(server->local_list, 
4700                                                channel_id, NULL);
4701       if (!channel)
4702         channel = silc_idlist_find_channel_by_id(server->global_list,
4703                                                  channel_id, NULL);
4704       if (!channel) {
4705         if (server->server_type != SILC_SERVER) {
4706           silc_free(channel_id);
4707           i++;
4708           continue;
4709         }
4710         
4711         /* We don't have that channel anywhere, add it. */
4712         name = silc_channel_get_name(entry, NULL);
4713         channel = silc_idlist_add_channel(server->global_list, strdup(name), 0,
4714                                           channel_id, server->router,
4715                                           NULL, NULL, 0);
4716         if (!channel) {
4717           silc_free(channel_id);
4718           i++;
4719           continue;
4720         }
4721         channel_id = NULL;
4722       }
4723
4724       channel->mode = silc_channel_get_mode(entry);
4725
4726       /* Add the client on the channel */
4727       if (!silc_server_client_on_channel(client, channel, &chl)) {
4728         chl = silc_calloc(1, sizeof(*chl));
4729         chl->client = client;
4730         chl->mode = chumodes[i++];
4731         chl->channel = channel;
4732         silc_hash_table_add(channel->user_list, chl->client, chl);
4733         silc_hash_table_add(client->channels, chl->channel, chl);
4734         channel->user_count++;
4735       } else {
4736         /* Update mode */
4737         chl->mode = chumodes[i++];
4738       }
4739
4740       silc_hash_table_add(ht, channel, channel);
4741       silc_free(channel_id);
4742     }
4743     silc_channel_payload_list_free(ch);
4744     silc_free(chumodes);
4745   }
4746
4747  out:
4748   /* Go through the list again and remove client from channels that
4749      are no part of the list. */
4750   if (ht) {
4751     silc_hash_table_list(client->channels, &htl);
4752     while (silc_hash_table_get(&htl, NULL, (void **)&chl)) {
4753       if (!silc_hash_table_find(ht, chl->channel, NULL, NULL)) {
4754         silc_hash_table_del(chl->channel->user_list, chl->client);
4755         silc_hash_table_del(chl->client->channels, chl->channel);
4756         silc_free(chl);
4757       }
4758     }
4759     silc_hash_table_list_reset(&htl);
4760     silc_hash_table_free(ht);
4761   } else {
4762     silc_hash_table_list(client->channels, &htl);
4763     while (silc_hash_table_get(&htl, NULL, (void **)&chl)) {
4764       silc_hash_table_del(chl->channel->user_list, chl->client);
4765       silc_hash_table_del(chl->client->channels, chl->channel);
4766       silc_free(chl);
4767     }
4768     silc_hash_table_list_reset(&htl);
4769   }
4770 }
4771
4772 /* Lookups route to the client indicated by the `id_data'. The connection
4773    object and internal data object is returned. Returns NULL if route
4774    could not be found to the client. If the `client_id' is specified then
4775    it is used and the `id_data' is ignored. */
4776
4777 SilcSocketConnection
4778 silc_server_get_client_route(SilcServer server,
4779                              unsigned char *id_data,
4780                              SilcUInt32 id_len,
4781                              SilcClientID *client_id,
4782                              SilcIDListData *idata,
4783                              SilcClientEntry *client_entry)
4784 {
4785   SilcClientID *id;
4786   SilcClientEntry client;
4787
4788   SILC_LOG_DEBUG(("Start"));
4789
4790   if (client_entry)
4791     *client_entry = NULL;
4792
4793   /* Decode destination Client ID */
4794   if (!client_id) {
4795     id = silc_id_str2id(id_data, id_len, SILC_ID_CLIENT);
4796     if (!id) {
4797       SILC_LOG_ERROR(("Could not decode destination Client ID, dropped"));
4798       return NULL;
4799     }
4800   } else {
4801     id = silc_id_dup(client_id, SILC_ID_CLIENT);
4802   }
4803
4804   /* If the destination belongs to our server we don't have to route
4805      the packet anywhere but to send it to the local destination. */
4806   client = silc_idlist_find_client_by_id(server->local_list, id, TRUE, NULL);
4807   if (client) {
4808     silc_free(id);
4809
4810     /* If we are router and the client has router then the client is in
4811        our cell but not directly connected to us. */
4812     if (server->server_type == SILC_ROUTER && client->router) {
4813       /* We are of course in this case the client's router thus the route
4814          to the client is the server who owns the client. So, we will send
4815          the packet to that server. */
4816       if (idata)
4817         *idata = (SilcIDListData)client->router;
4818       return client->router->connection;
4819     }
4820
4821     /* Seems that client really is directly connected to us */
4822     if (idata)
4823       *idata = (SilcIDListData)client;
4824     if (client_entry)
4825       *client_entry = client;
4826     return client->connection;
4827   }
4828
4829   /* Destination belongs to someone not in this server. If we are normal
4830      server our action is to send the packet to our router. */
4831   if (server->server_type != SILC_ROUTER && !server->standalone) {
4832     silc_free(id);
4833     if (idata)
4834       *idata = (SilcIDListData)server->router;
4835     return SILC_PRIMARY_ROUTE(server);
4836   }
4837
4838   /* We are router and we will perform route lookup for the destination
4839      and send the packet to fastest route. */
4840   if (server->server_type == SILC_ROUTER && !server->standalone) {
4841     /* Check first that the ID is valid */
4842     client = silc_idlist_find_client_by_id(server->global_list, id,
4843                                            TRUE, NULL);
4844     if (client) {
4845       SilcSocketConnection dst_sock;
4846
4847       dst_sock = silc_server_route_get(server, id, SILC_ID_CLIENT);
4848
4849       silc_free(id);
4850       if (idata)
4851         *idata = (SilcIDListData)dst_sock->user_data;
4852       return dst_sock;
4853     }
4854   }
4855
4856   silc_free(id);
4857   return NULL;
4858 }
4859
4860 /* Encodes and returns channel list of channels the `client' has joined.
4861    Secret channels are not put to the list. */
4862
4863 SilcBuffer silc_server_get_client_channel_list(SilcServer server,
4864                                                SilcClientEntry client,
4865                                                bool get_private,
4866                                                bool get_secret,
4867                                                SilcBuffer *user_mode_list)
4868 {
4869   SilcBuffer buffer = NULL;
4870   SilcChannelEntry channel;
4871   SilcChannelClientEntry chl;
4872   SilcHashTableList htl;
4873   unsigned char *cid;
4874   SilcUInt32 id_len;
4875   SilcUInt16 name_len;
4876   int len;
4877
4878   if (user_mode_list)
4879     *user_mode_list = NULL;
4880
4881   silc_hash_table_list(client->channels, &htl);
4882   while (silc_hash_table_get(&htl, NULL, (void *)&chl)) {
4883     channel = chl->channel;
4884
4885     if (channel->mode & SILC_CHANNEL_MODE_SECRET && !get_secret)
4886       continue;
4887     if (channel->mode & SILC_CHANNEL_MODE_PRIVATE && !get_private)
4888       continue;
4889
4890     cid = silc_id_id2str(channel->id, SILC_ID_CHANNEL);
4891     id_len = silc_id_get_len(channel->id, SILC_ID_CHANNEL);
4892     name_len = strlen(channel->channel_name);
4893
4894     len = 4 + name_len + id_len + 4;
4895     buffer = silc_buffer_realloc(buffer,
4896                                  (buffer ? buffer->truelen + len : len));
4897     silc_buffer_pull_tail(buffer, (buffer->end - buffer->data));
4898     silc_buffer_format(buffer,
4899                        SILC_STR_UI_SHORT(name_len),
4900                        SILC_STR_UI_XNSTRING(channel->channel_name,
4901                                             name_len),
4902                        SILC_STR_UI_SHORT(id_len),
4903                        SILC_STR_UI_XNSTRING(cid, id_len),
4904                        SILC_STR_UI_INT(chl->channel->mode),
4905                        SILC_STR_END);
4906     silc_buffer_pull(buffer, len);
4907     silc_free(cid);
4908
4909     if (user_mode_list) {
4910       *user_mode_list = silc_buffer_realloc(*user_mode_list,
4911                                             (*user_mode_list ?
4912                                              (*user_mode_list)->truelen + 4 :
4913                                              4));
4914       silc_buffer_pull_tail(*user_mode_list, ((*user_mode_list)->end -
4915                                               (*user_mode_list)->data));
4916       SILC_PUT32_MSB(chl->mode, (*user_mode_list)->data);
4917       silc_buffer_pull(*user_mode_list, 4);
4918     }
4919   }
4920   silc_hash_table_list_reset(&htl);
4921
4922   if (buffer)
4923     silc_buffer_push(buffer, buffer->data - buffer->head);
4924   if (user_mode_list && *user_mode_list)
4925     silc_buffer_push(*user_mode_list, ((*user_mode_list)->data -
4926                                        (*user_mode_list)->head));
4927
4928   return buffer;
4929 }
4930
4931 /* A timeout callback for the re-key. We will be the initiator of the
4932    re-key protocol. */
4933
4934 SILC_TASK_CALLBACK(silc_server_rekey_callback)
4935 {
4936   SilcServer server = app_context;
4937   SilcSocketConnection sock = (SilcSocketConnection)context;
4938   SilcIDListData idata = (SilcIDListData)sock->user_data;
4939   SilcProtocol protocol;
4940   SilcServerRekeyInternalContext *proto_ctx;
4941
4942   /* Allocate internal protocol context. This is sent as context
4943      to the protocol. */
4944   proto_ctx = silc_calloc(1, sizeof(*proto_ctx));
4945   proto_ctx->server = (void *)server;
4946   proto_ctx->sock = sock;
4947   proto_ctx->responder = FALSE;
4948   proto_ctx->pfs = idata->rekey->pfs;
4949
4950   /* Perform rekey protocol. Will call the final callback after the
4951      protocol is over. */
4952   silc_protocol_alloc(SILC_PROTOCOL_SERVER_REKEY,
4953                       &protocol, proto_ctx, silc_server_rekey_final);
4954   sock->protocol = protocol;
4955
4956   /* Run the protocol */
4957   silc_protocol_execute(protocol, server->schedule, 0, 0);
4958
4959   SILC_LOG_DEBUG(("Rekey protocol completed"));
4960
4961   /* Re-register re-key timeout */
4962   silc_schedule_task_add(server->schedule, sock->sock,
4963                          silc_server_rekey_callback,
4964                          context, idata->rekey->timeout, 0,
4965                          SILC_TASK_TIMEOUT, SILC_TASK_PRI_NORMAL);
4966 }
4967
4968 /* The final callback for the REKEY protocol. This will actually take the
4969    new key material into use. */
4970
4971 SILC_TASK_CALLBACK_GLOBAL(silc_server_rekey_final)
4972 {
4973   SilcProtocol protocol = (SilcProtocol)context;
4974   SilcServerRekeyInternalContext *ctx =
4975     (SilcServerRekeyInternalContext *)protocol->context;
4976   SilcServer server = (SilcServer)ctx->server;
4977   SilcSocketConnection sock = ctx->sock;
4978
4979   SILC_LOG_DEBUG(("Start"));
4980
4981   if (protocol->state == SILC_PROTOCOL_STATE_ERROR ||
4982       protocol->state == SILC_PROTOCOL_STATE_FAILURE) {
4983     /* Error occured during protocol */
4984     SILC_LOG_ERROR(("Error occurred during rekey protocol"));
4985     silc_protocol_cancel(protocol, server->schedule);
4986     silc_protocol_free(protocol);
4987     sock->protocol = NULL;
4988     if (ctx->packet)
4989       silc_packet_context_free(ctx->packet);
4990     if (ctx->ske)
4991       silc_ske_free(ctx->ske);
4992     silc_free(ctx);
4993     return;
4994   }
4995
4996   /* Purge the outgoing data queue to assure that all rekey packets really
4997      go to the network before we quit the protocol. */
4998   silc_server_packet_queue_purge(server, sock);
4999
5000   /* Cleanup */
5001   silc_protocol_free(protocol);
5002   sock->protocol = NULL;
5003   if (ctx->packet)
5004     silc_packet_context_free(ctx->packet);
5005   if (ctx->ske)
5006     silc_ske_free(ctx->ske);
5007   silc_free(ctx);
5008 }
5009
5010 /* Task callback used to retrieve network statistical information from
5011    router server once in a while. */
5012
5013 SILC_TASK_CALLBACK(silc_server_get_stats)
5014 {
5015   SilcServer server = (SilcServer)context;
5016   SilcBuffer idp, packet;
5017
5018   SILC_LOG_DEBUG(("Retrieving stats from router"));
5019
5020   if (!server->standalone) {
5021     idp = silc_id_payload_encode(server->router->id, SILC_ID_SERVER);
5022     packet = silc_command_payload_encode_va(SILC_COMMAND_STATS, 
5023                                             ++server->cmd_ident, 1,
5024                                             1, idp->data, idp->len);
5025     silc_server_packet_send(server, SILC_PRIMARY_ROUTE(server),
5026                             SILC_PACKET_COMMAND, 0, packet->data,
5027                             packet->len, FALSE);
5028     silc_buffer_free(packet);
5029     silc_buffer_free(idp);
5030   }
5031
5032   silc_schedule_task_add(server->schedule, 0, silc_server_get_stats,
5033                          server, 120, 0, SILC_TASK_TIMEOUT,
5034                          SILC_TASK_PRI_LOW);
5035 }