5 Author: Pekka Riikonen <priikone@poseidon.pspt.fi>
7 Copyright (C) 1997 - 2000 Pekka Riikonen
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 2 of the License, or
12 (at your option) any later version.
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
22 #include "serverincludes.h"
23 #include "server_internal.h"
25 SilcServerConfigSection silc_server_config_sections[] = {
27 SILC_CONFIG_SERVER_SECTION_TYPE_CIPHER, 4 },
29 SILC_CONFIG_SERVER_SECTION_TYPE_PKCS, 1 },
31 SILC_CONFIG_SERVER_SECTION_TYPE_HASH_FUNCTION, 4 },
33 SILC_CONFIG_SERVER_SECTION_TYPE_HMAC, 3 },
35 SILC_CONFIG_SERVER_SECTION_TYPE_SERVER_KEYS, 2 },
37 SILC_CONFIG_SERVER_SECTION_TYPE_SERVER_INFO, 4 },
39 SILC_CONFIG_SERVER_SECTION_TYPE_ADMIN_INFO, 4 },
41 SILC_CONFIG_SERVER_SECTION_TYPE_LISTEN_PORT, 3 },
43 SILC_CONFIG_SERVER_SECTION_TYPE_IDENTITY, 2 },
45 SILC_CONFIG_SERVER_SECTION_TYPE_LOGGING, 3 },
46 { "[ConnectionClass]",
47 SILC_CONFIG_SERVER_SECTION_TYPE_CONNECTION_CLASS, 4 },
48 { "[ClientConnection]",
49 SILC_CONFIG_SERVER_SECTION_TYPE_CLIENT_CONNECTION, 5 },
50 { "[ServerConnection]",
51 SILC_CONFIG_SERVER_SECTION_TYPE_SERVER_CONNECTION, 6 },
52 { "[RouterConnection]",
53 SILC_CONFIG_SERVER_SECTION_TYPE_ROUTER_CONNECTION, 7 },
54 { "[AdminConnection]",
55 SILC_CONFIG_SERVER_SECTION_TYPE_ADMIN_CONNECTION, 5 },
57 SILC_CONFIG_SERVER_SECTION_TYPE_DENY_CONNECTION, 3 },
59 SILC_CONFIG_SERVER_SECTION_TYPE_MOTD, 1 },
61 { NULL, SILC_CONFIG_SERVER_SECTION_TYPE_NONE, 0 }
64 /* Allocates a new configuration object, opens configuration file and
65 parses the file. The parsed data is returned to the newly allocated
66 configuration object. */
68 SilcServerConfig silc_server_config_alloc(char *filename)
72 SilcServerConfigParse config_parse;
74 SILC_LOG_DEBUG(("Allocating new configuration object"));
76 new = silc_calloc(1, sizeof(*new));
78 fprintf(stderr, "Could not allocate new configuration object");
82 new->filename = filename;
84 SILC_LOG_DEBUG(("Loading config data from `%s'", filename));
86 /* Open configuration file and parse it */
89 silc_config_open(filename, &buffer);
92 if ((silc_server_config_parse(new, buffer, &config_parse)) == FALSE)
94 if ((silc_server_config_parse_lines(new, config_parse)) == FALSE)
106 /* Free's a configuration object. */
108 void silc_server_config_free(SilcServerConfig config)
111 silc_free(config->filename);
112 silc_free(config->server_keys);
113 silc_free(config->server_info);
114 silc_free(config->admin_info);
115 silc_free(config->listen_port);
116 silc_free(config->identity);
117 silc_free(config->conn_class);
118 silc_free(config->clients);
119 silc_free(config->admins);
120 silc_free(config->servers);
121 silc_free(config->routers);
122 silc_free(config->denied);
123 silc_free(config->motd);
128 /* Parses the the buffer and returns the parsed lines into return_config
129 argument. The return_config argument doesn't have to be initialized
130 before calling this. It will be initialized during the parsing. The
131 buffer sent as argument can be safely free'd after this function has
132 succesfully returned. */
134 int silc_server_config_parse(SilcServerConfig config, SilcBuffer buffer,
135 SilcServerConfigParse *return_config)
137 int i, begin, linenum;
138 char line[1024], *cp;
139 SilcServerConfigSection *cptr = NULL;
140 SilcServerConfigParse parse = *return_config, first = NULL;
142 SILC_LOG_DEBUG(("Parsing configuration file"));
146 while((begin = silc_gets(line, sizeof(line),
147 buffer->data, buffer->len, begin)) != EOF) {
151 /* Check for bad line */
152 if (silc_check_line(cp))
155 /* Remove tabs and whitespaces from the line */
156 if (strchr(cp, '\t')) {
158 while(strchr(cp + i, '\t')) {
159 *strchr(cp + i, '\t') = ' ';
163 for (i = 0; i < strlen(cp); i++) {
179 /* Remove new line sign */
180 if (strchr(cp, '\n'))
181 *strchr(cp, '\n') = '\0';
183 /* Check for matching sections */
184 for (cptr = silc_server_config_sections; cptr->section; cptr++)
185 if (!strncasecmp(cp, cptr->section, strlen(cptr->section)))
188 if (!cptr->section) {
189 fprintf(stderr, "%s:%d: Unknown section `%s'\n",
190 config->filename, linenum, cp);
197 * Start of a configuration line
200 if (cptr->type != SILC_CONFIG_SERVER_SECTION_TYPE_NONE) {
202 if (strchr(cp, '\n'))
203 *strchr(cp, '\n') = ':';
206 parse = silc_calloc(1, sizeof(*parse));
208 parse->section = NULL;
212 if (parse->next == NULL) {
213 parse->next = silc_calloc(1, sizeof(*parse->next));
214 parse->next->line = NULL;
215 parse->next->section = NULL;
216 parse->next->next = NULL;
217 parse->next->prev = parse;
225 /* Add the line to parsing structure for further parsing. */
227 parse->section = cptr;
228 parse->line = silc_buffer_alloc(strlen(cp) + 1);
229 parse->linenum = linenum;
230 silc_buffer_pull_tail(parse->line, strlen(cp));
231 silc_buffer_put(parse->line, cp, strlen(cp));
238 /* Set the return_config argument to its first value so that further
239 parsing can be started from the first line. */
240 *return_config = first;
245 /* Parses the lines earlier read from configuration file. The config object
246 must not be initialized, it will be initialized in this function. The
247 parse_config argument is uninitialized automatically during this
250 int silc_server_config_parse_lines(SilcServerConfig config,
251 SilcServerConfigParse parse_config)
253 int ret, check = FALSE;
256 SilcServerConfigParse pc = parse_config;
259 SILC_LOG_DEBUG(("Parsing configuration lines"));
269 /* Get number of tokens in line */
270 ret = silc_config_check_num_token(line);
271 if (ret != pc->section->maxfields) {
273 fprintf(stderr, "%s:%d: Missing tokens, %d tokens (should be %d)\n",
274 config->filename, pc->linenum, ret,
275 pc->section->maxfields);
280 switch(pc->section->type) {
281 case SILC_CONFIG_SERVER_SECTION_TYPE_CIPHER:
283 SILC_SERVER_CONFIG_LIST_ALLOC(config->cipher);
285 /* Get cipher name */
286 ret = silc_config_get_token(line, &config->cipher->alg_name);
290 fprintf(stderr, "%s:%d: Cipher name not defined\n",
291 config->filename, pc->linenum);
295 /* Get module name */
296 config->cipher->sim_name = NULL;
297 ret = silc_config_get_token(line, &config->cipher->sim_name);
302 ret = silc_config_get_token(line, &tmp);
306 fprintf(stderr, "%s:%d: Cipher key length not defined\n",
307 config->filename, pc->linenum);
310 config->cipher->key_len = atoi(tmp);
313 /* Get block length */
314 ret = silc_config_get_token(line, &tmp);
318 fprintf(stderr, "%s:%d: Cipher block length not defined\n",
319 config->filename, pc->linenum);
322 config->cipher->block_len = atoi(tmp);
326 checkmask |= (1L << pc->section->type);
329 case SILC_CONFIG_SERVER_SECTION_TYPE_PKCS:
331 SILC_SERVER_CONFIG_LIST_ALLOC(config->pkcs);
334 ret = silc_config_get_token(line, &config->pkcs->alg_name);
338 fprintf(stderr, "%s:%d: PKCS name not defined\n",
339 config->filename, pc->linenum);
344 checkmask |= (1L << pc->section->type);
347 case SILC_CONFIG_SERVER_SECTION_TYPE_HASH_FUNCTION:
349 SILC_SERVER_CONFIG_LIST_ALLOC(config->hash_func);
351 /* Get Hash function name */
352 ret = silc_config_get_token(line, &config->hash_func->alg_name);
356 fprintf(stderr, "%s:%d: Hash function name not defined\n",
357 config->filename, pc->linenum);
361 /* Get Hash function module name */
362 config->hash_func->sim_name = NULL;
363 ret = silc_config_get_token(line, &config->hash_func->sim_name);
367 /* Get block length */
368 ret = silc_config_get_token(line, &tmp);
372 fprintf(stderr, "%s:%d: Hash function block length not defined\n",
373 config->filename, pc->linenum);
376 config->hash_func->block_len = atoi(tmp);
379 /* Get hash length */
380 ret = silc_config_get_token(line, &tmp);
384 fprintf(stderr, "%s:%d: Hash function hash length not defined\n",
385 config->filename, pc->linenum);
388 config->hash_func->key_len = atoi(tmp);
392 checkmask |= (1L << pc->section->type);
395 case SILC_CONFIG_SERVER_SECTION_TYPE_HMAC:
397 SILC_SERVER_CONFIG_LIST_ALLOC(config->hmac);
400 ret = silc_config_get_token(line, &config->hmac->alg_name);
404 fprintf(stderr, "%s:%d: HMAC name not defined\n",
405 config->filename, pc->linenum);
410 ret = silc_config_get_token(line, &config->hmac->sim_name);
414 fprintf(stderr, "%s:%d: Hash function name not defined\n",
415 config->filename, pc->linenum);
420 ret = silc_config_get_token(line, &tmp);
424 fprintf(stderr, "%s:%d: HMAC's MAC length not defined\n",
425 config->filename, pc->linenum);
428 config->hmac->key_len = atoi(tmp);
432 checkmask |= (1L << pc->section->type);
435 case SILC_CONFIG_SERVER_SECTION_TYPE_SERVER_KEYS:
437 if (!config->server_keys)
438 config->server_keys = silc_calloc(1, sizeof(*config->server_keys));
440 ret = silc_config_get_token(line, &tmp);
444 fprintf(stderr, "%s:%d: Public key name not defined\n",
445 config->filename, pc->linenum);
449 if (!silc_pkcs_load_public_key(tmp, &config->server_keys->public_key,
451 if (!silc_pkcs_load_public_key(tmp, &config->server_keys->public_key,
452 SILC_PKCS_FILE_BIN)) {
453 fprintf(stderr, "%s:%d: Could not load public key file `%s'\n",
454 config->filename, pc->linenum, tmp);
459 ret = silc_config_get_token(line, &tmp);
463 fprintf(stderr, "%s:%d: Private key name not defined\n",
464 config->filename, pc->linenum);
468 if (!silc_pkcs_load_private_key(tmp, &config->server_keys->private_key,
470 if (!silc_pkcs_load_private_key(tmp,
471 &config->server_keys->private_key,
472 SILC_PKCS_FILE_PEM)) {
473 fprintf(stderr, "%s:%d: Could not load private key file `%s'\n",
474 config->filename, pc->linenum, tmp);
480 checkmask |= (1L << pc->section->type);
483 case SILC_CONFIG_SERVER_SECTION_TYPE_SERVER_INFO:
485 if (!config->server_info)
486 config->server_info = silc_calloc(1, sizeof(*config->server_info));
488 /* Get server name */
489 ret = silc_config_get_token(line, &config->server_info->server_name);
493 /* Server name not defined */
498 ret = silc_config_get_token(line, &config->server_info->server_ip);
502 /* Server IP not defined */
506 /* Get server location */
507 ret = silc_config_get_token(line, &config->server_info->location);
511 /* Get server port */
512 /* XXX: Need port here??? */
513 ret = silc_config_get_token(line, &tmp);
517 /* Port not defined */
520 config->server_info->port = atoi(tmp);
524 checkmask |= (1L << pc->section->type);
527 case SILC_CONFIG_SERVER_SECTION_TYPE_ADMIN_INFO:
529 if (!config->admin_info)
530 config->admin_info = silc_calloc(1, sizeof(*config->admin_info));
533 ret = silc_config_get_token(line, &config->admin_info->location);
537 /* Get server type */
538 ret = silc_config_get_token(line, &config->admin_info->server_type);
542 /* Get admins name */
543 ret = silc_config_get_token(line, &config->admin_info->admin_name);
547 /* Get admins email address */
548 ret = silc_config_get_token(line, &config->admin_info->admin_email);
553 checkmask |= (1L << pc->section->type);
556 case SILC_CONFIG_SERVER_SECTION_TYPE_LISTEN_PORT:
558 SILC_SERVER_CONFIG_LIST_ALLOC(config->listen_port);
561 ret = silc_config_get_token(line, &config->listen_port->local_ip);
565 /* Get listener IP */
566 ret = silc_config_get_token(line, &config->listen_port->listener_ip);
571 ret = silc_config_get_token(line, &tmp);
576 config->listen_port->port = 0;
578 config->listen_port->port = atoi(tmp);
583 checkmask |= (1L << pc->section->type);
586 case SILC_CONFIG_SERVER_SECTION_TYPE_IDENTITY:
588 if (!config->identity)
589 config->identity = silc_calloc(1, sizeof(*config->identity));
592 ret = silc_config_get_token(line, &config->identity->user);
596 ret = silc_config_get_token(line, &config->identity->group);
601 checkmask |= (1L << pc->section->type);
603 case SILC_CONFIG_SERVER_SECTION_TYPE_CONNECTION_CLASS:
605 SILC_SERVER_CONFIG_LIST_ALLOC(config->conn_class);
607 /* Get class number */
608 ret = silc_config_get_token(line, &tmp);
612 /* Class number not defined */
615 config->conn_class->class = atoi(tmp);
618 /* Get ping frequency */
619 ret = silc_config_get_token(line, &tmp);
622 config->conn_class->ping_freq = atoi(tmp);
625 /* Get connect frequency */
626 ret = silc_config_get_token(line, &tmp);
629 config->conn_class->connect_freq = atoi(tmp);
633 ret = silc_config_get_token(line, &tmp);
636 config->conn_class->max_links = atoi(tmp);
640 checkmask |= (1L << pc->section->type);
643 case SILC_CONFIG_SERVER_SECTION_TYPE_LOGGING:
645 SILC_SERVER_CONFIG_LIST_ALLOC(config->logging);
647 /* Get log section type and check it */
648 ret = silc_config_get_token(line, &config->logging->logtype);
652 fprintf(stderr, "%s:%d: Log file section not defined\n",
653 config->filename, pc->linenum);
656 if (strcmp(config->logging->logtype, SILC_CONFIG_SERVER_LF_INFO)
657 && strcmp(config->logging->logtype, SILC_CONFIG_SERVER_LF_WARNING)
658 && strcmp(config->logging->logtype, SILC_CONFIG_SERVER_LF_ERROR)
659 && strcmp(config->logging->logtype, SILC_CONFIG_SERVER_LF_FATAL)) {
660 fprintf(stderr, "%s:%d: Unknown log file section '%s'\n",
661 config->filename, pc->linenum, config->logging->logtype);
665 /* Get log filename */
666 ret = silc_config_get_token(line, &config->logging->filename);
670 fprintf(stderr, "%s:%d: Log file name not defined\n",
671 config->filename, pc->linenum);
675 /* Get max byte size */
676 ret = silc_config_get_token(line, &tmp);
680 config->logging->maxsize = atoi(tmp);
685 checkmask |= (1L << pc->section->type);
688 case SILC_CONFIG_SERVER_SECTION_TYPE_CLIENT_CONNECTION:
690 SILC_SERVER_CONFIG_LIST_ALLOC(config->clients);
693 ret = silc_config_get_token(line, &config->clients->host);
698 config->clients->host = strdup("*");
700 /* Get authentication method */
701 ret = silc_config_get_token(line, &tmp);
705 if (strcmp(tmp, SILC_CONFIG_SERVER_AUTH_METH_PASSWD) &&
706 strcmp(tmp, SILC_CONFIG_SERVER_AUTH_METH_PUBKEY)) {
707 fprintf(stderr, "%s:%d: Unknown authentication method '%s'\n",
708 config->filename, pc->linenum, tmp);
712 if (!strcmp(tmp, SILC_CONFIG_SERVER_AUTH_METH_PASSWD))
713 config->clients->auth_meth = SILC_AUTH_PASSWORD;
715 if (!strcmp(tmp, SILC_CONFIG_SERVER_AUTH_METH_PUBKEY))
716 config->clients->auth_meth = SILC_AUTH_PUBLIC_KEY;
721 /* Get authentication data */
722 ret = silc_config_get_token(line, (char **)&config->clients->auth_data);
726 if (config->clients->auth_meth == SILC_AUTH_PASSWORD) {
727 config->clients->auth_data_len = strlen(config->clients->auth_data);
728 } else if (config->clients->auth_meth == SILC_AUTH_PUBLIC_KEY) {
729 /* Get the public key */
730 SilcPublicKey public_key;
732 if (!silc_pkcs_load_public_key(config->clients->auth_data,
733 &public_key, SILC_PKCS_FILE_PEM))
734 if (!silc_pkcs_load_public_key(config->clients->auth_data,
735 &public_key, SILC_PKCS_FILE_BIN)) {
736 fprintf(stderr, "%s:%d: Could not load public key file `%s'\n",
737 config->filename, pc->linenum,
738 (char *)config->clients->auth_data);
742 silc_free(config->clients->auth_data);
743 config->clients->auth_data = (void *)public_key;
744 config->clients->auth_data_len = 0;
748 ret = silc_config_get_token(line, &tmp);
752 config->clients->port = atoi(tmp);
756 /* Get class number */
757 ret = silc_config_get_token(line, &tmp);
761 config->clients->class = atoi(tmp);
766 checkmask |= (1L << pc->section->type);
769 case SILC_CONFIG_SERVER_SECTION_TYPE_SERVER_CONNECTION:
771 SILC_SERVER_CONFIG_LIST_ALLOC(config->servers);
774 ret = silc_config_get_token(line, &config->servers->host);
779 config->servers->host = strdup("*");
781 /* Get authentication method */
782 ret = silc_config_get_token(line, &tmp);
786 if (strcmp(tmp, SILC_CONFIG_SERVER_AUTH_METH_PASSWD) &&
787 strcmp(tmp, SILC_CONFIG_SERVER_AUTH_METH_PUBKEY)) {
788 fprintf(stderr, "%s:%d: Unknown authentication method '%s'\n",
789 config->filename, pc->linenum, tmp);
793 if (!strcmp(tmp, SILC_CONFIG_SERVER_AUTH_METH_PASSWD))
794 config->servers->auth_meth = SILC_AUTH_PASSWORD;
796 if (!strcmp(tmp, SILC_CONFIG_SERVER_AUTH_METH_PUBKEY))
797 config->servers->auth_meth = SILC_AUTH_PUBLIC_KEY;
802 /* Get authentication data */
803 ret = silc_config_get_token(line, (char **)&config->servers->auth_data);
807 if (config->servers->auth_meth == SILC_AUTH_PASSWORD) {
808 config->servers->auth_data_len = strlen(config->servers->auth_data);
809 } else if (config->servers->auth_meth == SILC_AUTH_PUBLIC_KEY) {
810 /* Get the public key */
811 SilcPublicKey public_key;
813 if (!silc_pkcs_load_public_key(config->servers->auth_data,
814 &public_key, SILC_PKCS_FILE_PEM))
815 if (!silc_pkcs_load_public_key(config->servers->auth_data,
816 &public_key, SILC_PKCS_FILE_BIN)) {
817 fprintf(stderr, "%s:%d: Could not load public key file `%s'\n",
818 config->filename, pc->linenum,
819 (char *)config->servers->auth_data);
823 silc_free(config->servers->auth_data);
824 config->servers->auth_data = (void *)public_key;
825 config->servers->auth_data_len = 0;
829 ret = silc_config_get_token(line, &tmp);
833 config->servers->port = atoi(tmp);
838 ret = silc_config_get_token(line, &config->servers->version);
842 /* Get class number */
843 ret = silc_config_get_token(line, &tmp);
847 config->servers->class = atoi(tmp);
852 checkmask |= (1L << pc->section->type);
855 case SILC_CONFIG_SERVER_SECTION_TYPE_ROUTER_CONNECTION:
857 SILC_SERVER_CONFIG_LIST_ALLOC(config->routers);
860 ret = silc_config_get_token(line, &config->routers->host);
865 // config->routers->host = strdup("*");
867 /* Get authentication method */
868 ret = silc_config_get_token(line, &tmp);
872 if (strcmp(tmp, SILC_CONFIG_SERVER_AUTH_METH_PASSWD) &&
873 strcmp(tmp, SILC_CONFIG_SERVER_AUTH_METH_PUBKEY)) {
874 fprintf(stderr, "%s:%d: Unknown authentication method '%s'\n",
875 config->filename, pc->linenum, tmp);
879 if (!strcmp(tmp, SILC_CONFIG_SERVER_AUTH_METH_PASSWD))
880 config->routers->auth_meth = SILC_AUTH_PASSWORD;
882 if (!strcmp(tmp, SILC_CONFIG_SERVER_AUTH_METH_PUBKEY))
883 config->routers->auth_meth = SILC_AUTH_PUBLIC_KEY;
888 /* Get authentication data */
889 ret = silc_config_get_token(line, (char **)&config->routers->auth_data);
893 if (config->routers->auth_meth == SILC_AUTH_PASSWORD) {
894 config->routers->auth_data_len = strlen(config->routers->auth_data);
895 } else if (config->routers->auth_meth == SILC_AUTH_PUBLIC_KEY) {
896 /* Get the public key */
897 SilcPublicKey public_key;
899 if (!silc_pkcs_load_public_key(config->routers->auth_data,
900 &public_key, SILC_PKCS_FILE_PEM))
901 if (!silc_pkcs_load_public_key(config->routers->auth_data,
902 &public_key, SILC_PKCS_FILE_BIN)) {
903 fprintf(stderr, "%s:%d: Could not load public key file `%s'\n",
904 config->filename, pc->linenum,
905 (char *)config->routers->auth_data);
909 silc_free(config->routers->auth_data);
910 config->routers->auth_data = (void *)public_key;
911 config->routers->auth_data_len = 0;
915 ret = silc_config_get_token(line, &tmp);
919 config->routers->port = atoi(tmp);
924 ret = silc_config_get_token(line, &config->routers->version);
928 /* Get class number */
929 ret = silc_config_get_token(line, &tmp);
933 config->routers->class = atoi(tmp);
937 /* Get whether we are initiator or not */
938 ret = silc_config_get_token(line, &tmp);
942 config->routers->initiator = atoi(tmp);
943 if (config->routers->initiator != 0)
944 config->routers->initiator = TRUE;
949 checkmask |= (1L << pc->section->type);
952 case SILC_CONFIG_SERVER_SECTION_TYPE_ADMIN_CONNECTION:
954 SILC_SERVER_CONFIG_LIST_ALLOC(config->admins);
957 ret = silc_config_get_token(line, &config->admins->host);
962 config->admins->host = strdup("*");
965 ret = silc_config_get_token(line, &config->admins->username);
970 config->admins->username = strdup("*");
973 ret = silc_config_get_token(line, &config->admins->nickname);
978 config->admins->nickname = strdup("*");
980 /* Get authentication method */
981 ret = silc_config_get_token(line, &tmp);
985 if (strcmp(tmp, SILC_CONFIG_SERVER_AUTH_METH_PASSWD) &&
986 strcmp(tmp, SILC_CONFIG_SERVER_AUTH_METH_PUBKEY)) {
987 fprintf(stderr, "%s:%d: Unknown authentication method '%s'\n",
988 config->filename, pc->linenum, tmp);
992 if (!strcmp(tmp, SILC_CONFIG_SERVER_AUTH_METH_PASSWD))
993 config->admins->auth_meth = SILC_AUTH_PASSWORD;
995 if (!strcmp(tmp, SILC_CONFIG_SERVER_AUTH_METH_PUBKEY))
996 config->admins->auth_meth = SILC_AUTH_PUBLIC_KEY;
1001 /* Get authentication data */
1002 ret = silc_config_get_token(line, (char **)&config->admins->auth_data);
1006 if (config->admins->auth_meth == SILC_AUTH_PASSWORD) {
1007 config->admins->auth_data_len = strlen(config->admins->auth_data);
1008 } else if (config->admins->auth_meth == SILC_AUTH_PUBLIC_KEY) {
1009 /* Get the public key */
1010 SilcPublicKey public_key;
1012 if (!silc_pkcs_load_public_key(config->admins->auth_data,
1013 &public_key, SILC_PKCS_FILE_PEM))
1014 if (!silc_pkcs_load_public_key(config->admins->auth_data,
1015 &public_key, SILC_PKCS_FILE_BIN)) {
1016 fprintf(stderr, "%s:%d: Could not load public key file `%s'\n",
1017 config->filename, pc->linenum,
1018 (char *)config->admins->auth_data);
1022 silc_free(config->admins->auth_data);
1023 config->admins->auth_data = (void *)public_key;
1024 config->admins->auth_data_len = 0;
1028 checkmask |= (1L << pc->section->type);
1031 case SILC_CONFIG_SERVER_SECTION_TYPE_DENY_CONNECTION:
1033 SILC_SERVER_CONFIG_LIST_ALLOC(config->denied);
1036 ret = silc_config_get_token(line, &config->denied->host);
1041 config->denied->host = strdup("*");
1042 fprintf(stderr, "warning: %s:%d: Denying all connections",
1043 config->filename, pc->linenum);
1047 ret = silc_config_get_token(line, &tmp);
1052 config->denied->port = 0;
1054 config->denied->port = atoi(tmp);
1059 ret = silc_config_get_token(line, &config->denied->comment);
1064 checkmask |= (1L << pc->section->type);
1067 case SILC_CONFIG_SERVER_SECTION_TYPE_MOTD:
1070 config->motd = silc_calloc(1, sizeof(*config->motd));
1073 ret = silc_config_get_token(line, &config->motd->motd_file);
1078 checkmask |= (1L << pc->section->type);
1081 case SILC_CONFIG_SERVER_SECTION_TYPE_NONE:
1087 /* Check for error */
1088 if (check == FALSE) {
1089 /* Line could not be parsed */
1090 fprintf(stderr, "%s:%d: Parse error\n", config->filename, pc->linenum);
1100 /* Check that all mandatory sections really were found. If not, the server
1101 cannot function and we return error. */
1102 ret = silc_server_config_check_sections(checkmask);
1108 /* Before returning all the lists in the config object must be set
1109 to their first values (the last value is first here). */
1110 while (config->cipher && config->cipher->prev)
1111 config->cipher = config->cipher->prev;
1112 while (config->pkcs && config->pkcs->prev)
1113 config->pkcs = config->pkcs->prev;
1114 while (config->hash_func && config->hash_func->prev)
1115 config->hash_func = config->hash_func->prev;
1116 while (config->hmac && config->hmac->prev)
1117 config->hmac = config->hmac->prev;
1118 while (config->listen_port && config->listen_port->prev)
1119 config->listen_port = config->listen_port->prev;
1120 while (config->logging && config->logging->prev)
1121 config->logging = config->logging->prev;
1122 while (config->conn_class && config->conn_class->prev)
1123 config->conn_class = config->conn_class->prev;
1124 while (config->clients && config->clients->prev)
1125 config->clients = config->clients->prev;
1126 while (config->servers && config->servers->prev)
1127 config->servers = config->servers->prev;
1128 while (config->admins && config->admins->prev)
1129 config->admins = config->admins->prev;
1130 while (config->routers && config->routers->prev)
1131 config->routers = config->routers->prev;
1133 SILC_LOG_DEBUG(("Done"));
1138 /* This function checks that the mask sent as argument includes all the
1139 sections that are mandatory in SILC server. */
1141 int silc_server_config_check_sections(uint32 checkmask)
1143 if (!(checkmask & (1L << SILC_CONFIG_SERVER_SECTION_TYPE_SERVER_INFO))) {
1147 if (!(checkmask & (1L << SILC_CONFIG_SERVER_SECTION_TYPE_ADMIN_INFO))) {
1151 if (!(checkmask & (1L << SILC_CONFIG_SERVER_SECTION_TYPE_LISTEN_PORT))) {
1156 (1L << SILC_CONFIG_SERVER_SECTION_TYPE_CLIENT_CONNECTION))) {
1161 & (1L << SILC_CONFIG_SERVER_SECTION_TYPE_SERVER_CONNECTION))) {
1166 & (1L << SILC_CONFIG_SERVER_SECTION_TYPE_ROUTER_CONNECTION))) {
1174 /* Sets log files where log messages is saved by the server. */
1176 void silc_server_config_setlogfiles(SilcServerConfig config)
1178 SilcServerConfigSectionLogging *log;
1179 char *info, *warning, *error, *fatal;
1180 uint32 info_size, warning_size, error_size, fatal_size;
1182 SILC_LOG_DEBUG(("Setting configured log file names"));
1184 /* Set default files before checking configuration */
1185 info = SILC_LOG_FILE_INFO;
1186 warning = SILC_LOG_FILE_WARNING;
1187 error = SILC_LOG_FILE_ERROR;
1188 fatal = SILC_LOG_FILE_FATAL;
1194 log = config->logging;
1196 if (!strcmp(log->logtype, SILC_CONFIG_SERVER_LF_INFO)) {
1197 info = log->filename;
1198 info_size = log->maxsize;
1200 if (!strcmp(log->logtype, SILC_CONFIG_SERVER_LF_WARNING)) {
1201 warning = log->filename;
1202 warning_size = log->maxsize;
1204 if (!strcmp(log->logtype, SILC_CONFIG_SERVER_LF_ERROR)) {
1205 error = log->filename;
1206 error_size = log->maxsize;
1208 if (!strcmp(log->logtype, SILC_CONFIG_SERVER_LF_FATAL)) {
1209 fatal = log->filename;
1210 fatal_size = log->maxsize;
1216 silc_log_set_files(info, info_size, warning, warning_size,
1217 error, error_size, fatal, fatal_size);
1220 /* Registers configured ciphers. These can then be allocated by the
1221 server when needed. */
1223 bool silc_server_config_register_ciphers(SilcServerConfig config)
1225 SilcServerConfigSectionAlg *alg;
1226 SilcServer server = (SilcServer)config->server;
1228 SILC_LOG_DEBUG(("Registering configured ciphers"));
1230 if (!config->cipher)
1233 alg = config->cipher;
1236 if (!alg->sim_name) {
1239 for (i = 0; silc_default_ciphers[i].name; i++)
1240 if (!strcmp(silc_default_ciphers[i].name, alg->alg_name)) {
1241 silc_cipher_register(&silc_default_ciphers[i]);
1245 if (!silc_cipher_is_supported(alg->alg_name)) {
1246 SILC_LOG_ERROR(("Unknown cipher `%s'", alg->alg_name));
1247 silc_server_stop(server);
1252 /* Load (try at least) the crypto SIM module */
1253 SilcCipherObject cipher;
1254 SilcSimContext *sim;
1257 memset(&cipher, 0, sizeof(cipher));
1258 cipher.name = alg->alg_name;
1259 cipher.block_len = alg->block_len;
1260 cipher.key_len = alg->key_len * 8;
1262 sim = silc_sim_alloc();
1263 sim->type = SILC_SIM_CIPHER;
1264 sim->libname = alg->sim_name;
1266 alg_name = strdup(alg->alg_name);
1267 if (strchr(alg_name, '-'))
1268 *strchr(alg_name, '-') = '\0';
1270 if ((silc_sim_load(sim))) {
1272 silc_sim_getsym(sim, silc_sim_symname(alg_name,
1273 SILC_CIPHER_SIM_SET_KEY));
1274 SILC_LOG_DEBUG(("set_key=%p", cipher.set_key));
1275 cipher.set_key_with_string =
1276 silc_sim_getsym(sim, silc_sim_symname(alg_name,
1277 SILC_CIPHER_SIM_SET_KEY_WITH_STRING));
1278 SILC_LOG_DEBUG(("set_key_with_string=%p", cipher.set_key_with_string));
1280 silc_sim_getsym(sim, silc_sim_symname(alg_name,
1281 SILC_CIPHER_SIM_ENCRYPT_CBC));
1282 SILC_LOG_DEBUG(("encrypt_cbc=%p", cipher.encrypt));
1284 silc_sim_getsym(sim, silc_sim_symname(alg_name,
1285 SILC_CIPHER_SIM_DECRYPT_CBC));
1286 SILC_LOG_DEBUG(("decrypt_cbc=%p", cipher.decrypt));
1287 cipher.context_len =
1288 silc_sim_getsym(sim, silc_sim_symname(alg_name,
1289 SILC_CIPHER_SIM_CONTEXT_LEN));
1290 SILC_LOG_DEBUG(("context_len=%p", cipher.context_len));
1292 /* Put the SIM to the list of all SIM's in server */
1293 silc_dlist_add(server->sim, sim);
1295 silc_free(alg_name);
1297 SILC_LOG_ERROR(("Error configuring ciphers"));
1298 silc_server_stop(server);
1302 /* Register the cipher */
1303 silc_cipher_register(&cipher);
1313 /* Registers configured PKCS's. */
1315 bool silc_server_config_register_pkcs(SilcServerConfig config)
1317 SilcServerConfigSectionAlg *alg = config->pkcs;
1318 SilcServer server = (SilcServer)config->server;
1320 SILC_LOG_DEBUG(("Registering configured PKCS"));
1328 for (i = 0; silc_default_pkcs[i].name; i++)
1329 if (!strcmp(silc_default_pkcs[i].name, alg->alg_name)) {
1330 silc_pkcs_register(&silc_default_pkcs[i]);
1334 if (!silc_pkcs_is_supported(alg->alg_name)) {
1335 SILC_LOG_ERROR(("Unknown PKCS `%s'", alg->alg_name));
1336 silc_server_stop(server);
1346 /* Registers configured hash functions. These can then be allocated by the
1347 server when needed. */
1349 bool silc_server_config_register_hashfuncs(SilcServerConfig config)
1351 SilcServerConfigSectionAlg *alg;
1352 SilcServer server = (SilcServer)config->server;
1354 SILC_LOG_DEBUG(("Registering configured hash functions"));
1356 if (!config->hash_func)
1359 alg = config->hash_func;
1362 if (!alg->sim_name) {
1365 for (i = 0; silc_default_hash[i].name; i++)
1366 if (!strcmp(silc_default_hash[i].name, alg->alg_name)) {
1367 silc_hash_register(&silc_default_hash[i]);
1371 if (!silc_hash_is_supported(alg->alg_name)) {
1372 SILC_LOG_ERROR(("Unknown hash funtion `%s'", alg->alg_name));
1373 silc_server_stop(server);
1379 /* Load (try at least) the hash SIM module */
1380 SilcHashObject hash;
1381 SilcSimContext *sim;
1383 memset(&hash, 0, sizeof(hash));
1384 hash.name = alg->alg_name;
1385 hash.block_len = alg->block_len;
1386 hash.hash_len = alg->key_len;
1388 sim = silc_sim_alloc();
1389 sim->type = SILC_SIM_HASH;
1390 sim->libname = alg->sim_name;
1392 if ((silc_sim_load(sim))) {
1394 silc_sim_getsym(sim, silc_sim_symname(alg->alg_name,
1395 SILC_HASH_SIM_INIT));
1396 SILC_LOG_DEBUG(("init=%p", hash.init));
1398 silc_sim_getsym(sim, silc_sim_symname(alg->alg_name,
1399 SILC_HASH_SIM_UPDATE));
1400 SILC_LOG_DEBUG(("update=%p", hash.update));
1402 silc_sim_getsym(sim, silc_sim_symname(alg->alg_name,
1403 SILC_HASH_SIM_FINAL));
1404 SILC_LOG_DEBUG(("final=%p", hash.final));
1406 silc_sim_getsym(sim, silc_sim_symname(alg->alg_name,
1407 SILC_HASH_SIM_CONTEXT_LEN));
1408 SILC_LOG_DEBUG(("context_len=%p", hash.context_len));
1410 /* Put the SIM to the table of all SIM's in server */
1411 silc_dlist_add(server->sim, sim);
1413 SILC_LOG_ERROR(("Error configuring hash functions"));
1414 silc_server_stop(server);
1418 /* Register the hash function */
1419 silc_hash_register(&hash);
1429 /* Registers configure HMACs. These can then be allocated by the server
1432 bool silc_server_config_register_hmacs(SilcServerConfig config)
1434 SilcServerConfigSectionAlg *alg;
1435 SilcServer server = (SilcServer)config->server;
1437 SILC_LOG_DEBUG(("Registering configured HMACs"));
1444 SilcHmacObject hmac;
1446 if (!silc_hash_is_supported(alg->sim_name)) {
1447 SILC_LOG_ERROR(("Unknown hash function `%s'", alg->sim_name));
1448 silc_server_stop(server);
1452 /* Register the HMAC */
1453 memset(&hmac, 0, sizeof(hmac));
1454 hmac.name = alg->alg_name;
1455 hmac.len = alg->key_len;
1456 silc_hmac_register(&hmac);
1464 /* Returns client authentication information from server configuration
1465 by host (name or ip). If `port' is non-null then both name or IP and
1466 the port must match. */
1468 SilcServerConfigSectionClientConnection *
1469 silc_server_config_find_client_conn(SilcServerConfig config,
1470 char *host, int port)
1473 SilcServerConfigSectionClientConnection *client = NULL;
1479 if (!config->clients)
1482 client = config->clients;
1484 for (i = 0; client; i++) {
1485 if (silc_string_compare(client->host, host))
1488 if (port && client->port && client->port != port)
1494 client = client->next;
1503 /* Returns server connection info from server configuartion by host
1504 (name or ip). If `port' is non-null then both name or IP and the port
1507 SilcServerConfigSectionServerConnection *
1508 silc_server_config_find_server_conn(SilcServerConfig config,
1509 char *host, int port)
1512 SilcServerConfigSectionServerConnection *serv = NULL;
1518 if (!config->servers)
1521 serv = config->servers;
1522 for (i = 0; serv; i++) {
1523 if (silc_string_compare(serv->host, host))
1526 if (port && serv->port && serv->port != port)
1541 /* Returns router connection info from server configuartion by
1542 host (name or ip). */
1544 SilcServerConfigSectionServerConnection *
1545 silc_server_config_find_router_conn(SilcServerConfig config,
1546 char *host, int port)
1549 SilcServerConfigSectionServerConnection *serv = NULL;
1555 if (!config->routers)
1558 serv = config->routers;
1559 for (i = 0; serv; i++) {
1560 if (silc_string_compare(serv->host, host))
1563 if (port && serv->port && serv->port != port)
1578 /* Returns TRUE if configuartion for a router connection that we are
1579 initiating exists. */
1581 bool silc_server_config_is_primary_route(SilcServerConfig config)
1584 SilcServerConfigSectionServerConnection *serv = NULL;
1587 serv = config->routers;
1588 for (i = 0; serv; i++) {
1589 if (serv->initiator == TRUE) {
1600 /* Returns Admin connection configuration by host, username and/or
1603 SilcServerConfigSectionAdminConnection *
1604 silc_server_config_find_admin(SilcServerConfig config,
1605 char *host, char *username, char *nickname)
1607 SilcServerConfigSectionAdminConnection *admin = NULL;
1610 if (!config->admins)
1620 admin = config->admins;
1621 for (i = 0; admin; i++) {
1622 if (silc_string_compare(admin->host, host) &&
1623 silc_string_compare(admin->username, username) &&
1624 silc_string_compare(admin->nickname, nickname))
1627 admin = admin->next;
1636 /* Returns the Denied connection configuration by host and port. */
1638 SilcServerConfigSectionDenyConnection *
1639 silc_server_config_denied_conn(SilcServerConfig config, char *host,
1643 SilcServerConfigSectionDenyConnection *deny = NULL;
1649 if (!config->denied)
1652 deny = config->denied;
1653 for (i = 0; deny; i++) {
1654 if (silc_string_compare(deny->host, host))
1657 if (port && deny->port && deny->port != port)