5 Author: Pekka Riikonen <priikone@poseidon.pspt.fi>
7 Copyright (C) 1997 - 2000 Pekka Riikonen
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 2 of the License, or
12 (at your option) any later version.
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
22 #include "serverincludes.h"
23 #include "server_internal.h"
25 SilcServerConfigSection silc_server_config_sections[] = {
27 SILC_CONFIG_SERVER_SECTION_TYPE_CIPHER, 4 },
29 SILC_CONFIG_SERVER_SECTION_TYPE_PKCS, 1 },
31 SILC_CONFIG_SERVER_SECTION_TYPE_HASH_FUNCTION, 4 },
33 SILC_CONFIG_SERVER_SECTION_TYPE_HMAC, 3 },
35 SILC_CONFIG_SERVER_SECTION_TYPE_SERVER_KEYS, 2 },
37 SILC_CONFIG_SERVER_SECTION_TYPE_SERVER_INFO, 4 },
39 SILC_CONFIG_SERVER_SECTION_TYPE_ADMIN_INFO, 4 },
41 SILC_CONFIG_SERVER_SECTION_TYPE_LISTEN_PORT, 3 },
43 SILC_CONFIG_SERVER_SECTION_TYPE_IDENTITY, 2 },
45 SILC_CONFIG_SERVER_SECTION_TYPE_LOGGING, 3 },
46 { "[ConnectionClass]",
47 SILC_CONFIG_SERVER_SECTION_TYPE_CONNECTION_CLASS, 4 },
48 { "[ClientConnection]",
49 SILC_CONFIG_SERVER_SECTION_TYPE_CLIENT_CONNECTION, 5 },
50 { "[ServerConnection]",
51 SILC_CONFIG_SERVER_SECTION_TYPE_SERVER_CONNECTION, 6 },
52 { "[RouterConnection]",
53 SILC_CONFIG_SERVER_SECTION_TYPE_ROUTER_CONNECTION, 7 },
54 { "[AdminConnection]",
55 SILC_CONFIG_SERVER_SECTION_TYPE_ADMIN_CONNECTION, 5 },
57 SILC_CONFIG_SERVER_SECTION_TYPE_DENY_CONNECTION, 3 },
59 SILC_CONFIG_SERVER_SECTION_TYPE_MOTD, 1 },
61 { NULL, SILC_CONFIG_SERVER_SECTION_TYPE_NONE, 0 }
64 /* Allocates a new configuration object, opens configuration file and
65 parses the file. The parsed data is returned to the newly allocated
66 configuration object. */
68 SilcServerConfig silc_server_config_alloc(char *filename)
72 SilcServerConfigParse config_parse;
74 SILC_LOG_DEBUG(("Allocating new configuration object"));
76 new = silc_calloc(1, sizeof(*new));
78 fprintf(stderr, "Could not allocate new configuration object");
82 new->filename = filename;
84 SILC_LOG_DEBUG(("Loading config data from `%s'", filename));
86 /* Open configuration file and parse it */
89 silc_config_open(filename, &buffer);
92 if ((silc_server_config_parse(new, buffer, &config_parse)) == FALSE)
94 if ((silc_server_config_parse_lines(new, config_parse)) == FALSE)
106 /* Free's a configuration object. */
108 void silc_server_config_free(SilcServerConfig config)
111 silc_free(config->filename);
112 silc_free(config->server_keys);
113 silc_free(config->server_info);
114 silc_free(config->admin_info);
115 silc_free(config->listen_port);
116 silc_free(config->identity);
117 silc_free(config->conn_class);
118 silc_free(config->clients);
119 silc_free(config->admins);
120 silc_free(config->servers);
121 silc_free(config->routers);
122 silc_free(config->denied);
123 silc_free(config->motd);
128 /* Parses the the buffer and returns the parsed lines into return_config
129 argument. The return_config argument doesn't have to be initialized
130 before calling this. It will be initialized during the parsing. The
131 buffer sent as argument can be safely free'd after this function has
132 succesfully returned. */
134 int silc_server_config_parse(SilcServerConfig config, SilcBuffer buffer,
135 SilcServerConfigParse *return_config)
137 int i, begin, linenum;
138 char line[1024], *cp;
139 SilcServerConfigSection *cptr = NULL;
140 SilcServerConfigParse parse = *return_config, first = NULL;
142 SILC_LOG_DEBUG(("Parsing configuration file"));
146 while((begin = silc_gets(line, sizeof(line),
147 buffer->data, buffer->len, begin)) != EOF) {
151 /* Check for bad line */
152 if (silc_check_line(cp))
155 /* Remove tabs and whitespaces from the line */
156 if (strchr(cp, '\t')) {
158 while(strchr(cp + i, '\t')) {
159 *strchr(cp + i, '\t') = ' ';
163 for (i = 0; i < strlen(cp); i++) {
179 /* Remove new line sign */
180 if (strchr(cp, '\n'))
181 *strchr(cp, '\n') = '\0';
183 /* Check for matching sections */
184 for (cptr = silc_server_config_sections; cptr->section; cptr++)
185 if (!strncasecmp(cp, cptr->section, strlen(cptr->section)))
188 if (!cptr->section) {
189 fprintf(stderr, "%s:%d: Unknown section `%s'\n",
190 config->filename, linenum, cp);
197 * Start of a configuration line
200 if (cptr->type != SILC_CONFIG_SERVER_SECTION_TYPE_NONE) {
202 if (strchr(cp, '\n'))
203 *strchr(cp, '\n') = ':';
206 parse = silc_calloc(1, sizeof(*parse));
208 parse->section = NULL;
212 if (parse->next == NULL) {
213 parse->next = silc_calloc(1, sizeof(*parse->next));
214 parse->next->line = NULL;
215 parse->next->section = NULL;
216 parse->next->next = NULL;
217 parse->next->prev = parse;
225 /* Add the line to parsing structure for further parsing. */
227 parse->section = cptr;
228 parse->line = silc_buffer_alloc(strlen(cp) + 1);
229 parse->linenum = linenum;
230 silc_buffer_pull_tail(parse->line, strlen(cp));
231 silc_buffer_put(parse->line, cp, strlen(cp));
238 /* Set the return_config argument to its first value so that further
239 parsing can be started from the first line. */
240 *return_config = first;
245 /* Parses the lines earlier read from configuration file. The config object
246 must not be initialized, it will be initialized in this function. The
247 parse_config argument is uninitialized automatically during this
250 int silc_server_config_parse_lines(SilcServerConfig config,
251 SilcServerConfigParse parse_config)
253 int ret, check = FALSE;
256 SilcServerConfigParse pc = parse_config;
259 SILC_LOG_DEBUG(("Parsing configuration lines"));
269 /* Get number of tokens in line */
270 ret = silc_config_check_num_token(line);
271 if (ret != pc->section->maxfields) {
273 fprintf(stderr, "%s:%d: Missing tokens, %d tokens (should be %d)\n",
274 config->filename, pc->linenum, ret,
275 pc->section->maxfields);
280 switch(pc->section->type) {
281 case SILC_CONFIG_SERVER_SECTION_TYPE_CIPHER:
283 SILC_SERVER_CONFIG_LIST_ALLOC(config->cipher);
285 /* Get cipher name */
286 ret = silc_config_get_token(line, &config->cipher->alg_name);
290 fprintf(stderr, "%s:%d: Cipher name not defined\n",
291 config->filename, pc->linenum);
295 /* Get module name */
296 config->cipher->sim_name = NULL;
297 ret = silc_config_get_token(line, &config->cipher->sim_name);
302 ret = silc_config_get_token(line, &tmp);
306 fprintf(stderr, "%s:%d: Cipher key length not defined\n",
307 config->filename, pc->linenum);
310 config->cipher->key_len = atoi(tmp);
313 /* Get block length */
314 ret = silc_config_get_token(line, &tmp);
318 fprintf(stderr, "%s:%d: Cipher block length not defined\n",
319 config->filename, pc->linenum);
322 config->cipher->block_len = atoi(tmp);
326 checkmask |= (1L << pc->section->type);
329 case SILC_CONFIG_SERVER_SECTION_TYPE_PKCS:
331 SILC_SERVER_CONFIG_LIST_ALLOC(config->pkcs);
334 ret = silc_config_get_token(line, &config->pkcs->alg_name);
338 fprintf(stderr, "%s:%d: PKCS name not defined\n",
339 config->filename, pc->linenum);
344 checkmask |= (1L << pc->section->type);
347 case SILC_CONFIG_SERVER_SECTION_TYPE_HASH_FUNCTION:
349 SILC_SERVER_CONFIG_LIST_ALLOC(config->hash_func);
351 /* Get Hash function name */
352 ret = silc_config_get_token(line, &config->hash_func->alg_name);
356 fprintf(stderr, "%s:%d: Hash function name not defined\n",
357 config->filename, pc->linenum);
361 /* Get Hash function module name */
362 config->hash_func->sim_name = NULL;
363 ret = silc_config_get_token(line, &config->hash_func->sim_name);
367 /* Get block length */
368 ret = silc_config_get_token(line, &tmp);
372 fprintf(stderr, "%s:%d: Hash function block length not defined\n",
373 config->filename, pc->linenum);
376 config->hash_func->block_len = atoi(tmp);
379 /* Get hash length */
380 ret = silc_config_get_token(line, &tmp);
384 fprintf(stderr, "%s:%d: Hash function hash length not defined\n",
385 config->filename, pc->linenum);
388 config->hash_func->key_len = atoi(tmp);
392 checkmask |= (1L << pc->section->type);
395 case SILC_CONFIG_SERVER_SECTION_TYPE_HMAC:
397 SILC_SERVER_CONFIG_LIST_ALLOC(config->hmac);
400 ret = silc_config_get_token(line, &config->hmac->alg_name);
404 fprintf(stderr, "%s:%d: HMAC name not defined\n",
405 config->filename, pc->linenum);
410 ret = silc_config_get_token(line, &config->hmac->sim_name);
414 fprintf(stderr, "%s:%d: Hash function name not defined\n",
415 config->filename, pc->linenum);
420 ret = silc_config_get_token(line, &tmp);
424 fprintf(stderr, "%s:%d: HMAC's MAC length not defined\n",
425 config->filename, pc->linenum);
428 config->hmac->key_len = atoi(tmp);
432 checkmask |= (1L << pc->section->type);
435 case SILC_CONFIG_SERVER_SECTION_TYPE_SERVER_KEYS:
437 if (!config->server_keys)
438 config->server_keys = silc_calloc(1, sizeof(*config->server_keys));
440 ret = silc_config_get_token(line, &tmp);
444 fprintf(stderr, "%s:%d: Public key name not defined\n",
445 config->filename, pc->linenum);
449 if (!silc_pkcs_load_public_key(tmp, &config->server_keys->public_key,
451 if (!silc_pkcs_load_public_key(tmp, &config->server_keys->public_key,
452 SILC_PKCS_FILE_BIN)) {
453 fprintf(stderr, "%s:%d: Could not load public key file `%s'\n",
454 config->filename, pc->linenum, tmp);
459 ret = silc_config_get_token(line, &tmp);
463 fprintf(stderr, "%s:%d: Private key name not defined\n",
464 config->filename, pc->linenum);
468 if (!silc_pkcs_load_private_key(tmp, &config->server_keys->private_key,
470 if (!silc_pkcs_load_private_key(tmp,
471 &config->server_keys->private_key,
472 SILC_PKCS_FILE_PEM)) {
473 fprintf(stderr, "%s:%d: Could not load private key file `%s'\n",
474 config->filename, pc->linenum, tmp);
480 checkmask |= (1L << pc->section->type);
483 case SILC_CONFIG_SERVER_SECTION_TYPE_SERVER_INFO:
485 if (!config->server_info)
486 config->server_info = silc_calloc(1, sizeof(*config->server_info));
488 /* Get server name */
489 ret = silc_config_get_token(line, &config->server_info->server_name);
493 /* Server name not defined */
498 ret = silc_config_get_token(line, &config->server_info->server_ip);
502 /* Server IP not defined */
506 /* Get server location */
507 ret = silc_config_get_token(line, &config->server_info->location);
511 /* Get server port */
512 /* XXX: Need port here??? */
513 ret = silc_config_get_token(line, &tmp);
517 /* Port not defined */
520 config->server_info->port = atoi(tmp);
524 checkmask |= (1L << pc->section->type);
527 case SILC_CONFIG_SERVER_SECTION_TYPE_ADMIN_INFO:
529 if (!config->admin_info)
530 config->admin_info = silc_calloc(1, sizeof(*config->admin_info));
533 ret = silc_config_get_token(line, &config->admin_info->location);
537 /* Get server type */
538 ret = silc_config_get_token(line, &config->admin_info->server_type);
542 /* Get admins name */
543 ret = silc_config_get_token(line, &config->admin_info->admin_name);
547 /* Get admins email address */
548 ret = silc_config_get_token(line, &config->admin_info->admin_email);
553 checkmask |= (1L << pc->section->type);
556 case SILC_CONFIG_SERVER_SECTION_TYPE_LISTEN_PORT:
558 SILC_SERVER_CONFIG_LIST_ALLOC(config->listen_port);
561 ret = silc_config_get_token(line, &config->listen_port->host);
566 ret = silc_config_get_token(line, &config->listen_port->remote_ip);
571 ret = silc_config_get_token(line, &tmp);
576 config->listen_port->port = 0;
578 config->listen_port->port = atoi(tmp);
583 checkmask |= (1L << pc->section->type);
586 case SILC_CONFIG_SERVER_SECTION_TYPE_IDENTITY:
588 if (!config->identity)
589 config->identity = silc_calloc(1, sizeof(*config->identity));
592 ret = silc_config_get_token(line, &config->identity->user);
596 ret = silc_config_get_token(line, &config->identity->group);
601 checkmask |= (1L << pc->section->type);
603 case SILC_CONFIG_SERVER_SECTION_TYPE_CONNECTION_CLASS:
605 SILC_SERVER_CONFIG_LIST_ALLOC(config->conn_class);
607 /* Get class number */
608 ret = silc_config_get_token(line, &tmp);
612 /* Class number not defined */
615 config->conn_class->class = atoi(tmp);
618 /* Get ping frequency */
619 ret = silc_config_get_token(line, &tmp);
622 config->conn_class->ping_freq = atoi(tmp);
625 /* Get connect frequency */
626 ret = silc_config_get_token(line, &tmp);
629 config->conn_class->connect_freq = atoi(tmp);
633 ret = silc_config_get_token(line, &tmp);
636 config->conn_class->max_links = atoi(tmp);
640 checkmask |= (1L << pc->section->type);
643 case SILC_CONFIG_SERVER_SECTION_TYPE_LOGGING:
645 SILC_SERVER_CONFIG_LIST_ALLOC(config->logging);
647 /* Get log section type and check it */
648 ret = silc_config_get_token(line, &config->logging->logtype);
652 fprintf(stderr, "%s:%d: Log file section not defined\n",
653 config->filename, pc->linenum);
656 if (strcmp(config->logging->logtype, SILC_CONFIG_SERVER_LF_INFO)
657 && strcmp(config->logging->logtype, SILC_CONFIG_SERVER_LF_WARNING)
658 && strcmp(config->logging->logtype, SILC_CONFIG_SERVER_LF_ERROR)
659 && strcmp(config->logging->logtype, SILC_CONFIG_SERVER_LF_FATAL)) {
660 fprintf(stderr, "%s:%d: Unknown log file section '%s'\n",
661 config->filename, pc->linenum, config->logging->logtype);
665 /* Get log filename */
666 ret = silc_config_get_token(line, &config->logging->filename);
670 fprintf(stderr, "%s:%d: Log file name not defined\n",
671 config->filename, pc->linenum);
675 /* Get max byte size */
676 ret = silc_config_get_token(line, &tmp);
680 config->logging->maxsize = atoi(tmp);
685 checkmask |= (1L << pc->section->type);
688 case SILC_CONFIG_SERVER_SECTION_TYPE_CLIENT_CONNECTION:
690 SILC_SERVER_CONFIG_LIST_ALLOC(config->clients);
693 ret = silc_config_get_token(line, &config->clients->host);
698 config->clients->host = strdup("*");
700 /* Get authentication method */
701 ret = silc_config_get_token(line, &tmp);
705 if (strcmp(tmp, SILC_CONFIG_SERVER_AUTH_METH_PASSWD) &&
706 strcmp(tmp, SILC_CONFIG_SERVER_AUTH_METH_PUBKEY)) {
707 fprintf(stderr, "%s:%d: Unknown authentication method '%s'\n",
708 config->filename, pc->linenum, tmp);
712 if (!strcmp(tmp, SILC_CONFIG_SERVER_AUTH_METH_PASSWD))
713 config->clients->auth_meth = SILC_AUTH_PASSWORD;
715 if (!strcmp(tmp, SILC_CONFIG_SERVER_AUTH_METH_PUBKEY))
716 config->clients->auth_meth = SILC_AUTH_PUBLIC_KEY;
721 /* Get authentication data */
722 ret = silc_config_get_token(line, (char **)&config->clients->auth_data);
726 if (config->clients->auth_meth == SILC_AUTH_PASSWORD) {
727 config->clients->auth_data_len = strlen(config->clients->auth_data);
728 } else if (config->clients->auth_meth == SILC_AUTH_PUBLIC_KEY) {
729 /* Get the public key */
730 SilcPublicKey public_key;
732 if (!silc_pkcs_load_public_key(config->clients->auth_data,
733 &public_key, SILC_PKCS_FILE_PEM))
734 if (!silc_pkcs_load_public_key(config->clients->auth_data,
735 &public_key, SILC_PKCS_FILE_BIN)) {
736 fprintf(stderr, "%s:%d: Could not load public key file `%s'\n",
737 config->filename, pc->linenum,
738 (char *)config->clients->auth_data);
742 silc_free(config->clients->auth_data);
743 config->clients->auth_data = (void *)public_key;
744 config->clients->auth_data_len = 0;
748 ret = silc_config_get_token(line, &tmp);
752 config->clients->port = atoi(tmp);
756 /* Get class number */
757 ret = silc_config_get_token(line, &tmp);
761 config->clients->class = atoi(tmp);
766 checkmask |= (1L << pc->section->type);
769 case SILC_CONFIG_SERVER_SECTION_TYPE_SERVER_CONNECTION:
771 SILC_SERVER_CONFIG_LIST_ALLOC(config->servers);
774 ret = silc_config_get_token(line, &config->servers->host);
779 config->servers->host = strdup("*");
781 /* Get authentication method */
782 ret = silc_config_get_token(line, &tmp);
786 if (strcmp(tmp, SILC_CONFIG_SERVER_AUTH_METH_PASSWD) &&
787 strcmp(tmp, SILC_CONFIG_SERVER_AUTH_METH_PUBKEY)) {
788 fprintf(stderr, "%s:%d: Unknown authentication method '%s'\n",
789 config->filename, pc->linenum, tmp);
793 if (!strcmp(tmp, SILC_CONFIG_SERVER_AUTH_METH_PASSWD))
794 config->servers->auth_meth = SILC_AUTH_PASSWORD;
796 if (!strcmp(tmp, SILC_CONFIG_SERVER_AUTH_METH_PUBKEY))
797 config->servers->auth_meth = SILC_AUTH_PUBLIC_KEY;
802 /* Get authentication data */
803 ret = silc_config_get_token(line, (char **)&config->servers->auth_data);
807 if (config->servers->auth_meth == SILC_AUTH_PASSWORD) {
808 config->servers->auth_data_len = strlen(config->servers->auth_data);
809 } else if (config->servers->auth_meth == SILC_AUTH_PUBLIC_KEY) {
810 /* Get the public key */
811 SilcPublicKey public_key;
813 if (!silc_pkcs_load_public_key(config->servers->auth_data,
814 &public_key, SILC_PKCS_FILE_PEM))
815 if (!silc_pkcs_load_public_key(config->servers->auth_data,
816 &public_key, SILC_PKCS_FILE_BIN)) {
817 fprintf(stderr, "%s:%d: Could not load public key file `%s'\n",
818 config->filename, pc->linenum,
819 (char *)config->servers->auth_data);
823 silc_free(config->servers->auth_data);
824 config->servers->auth_data = (void *)public_key;
825 config->servers->auth_data_len = 0;
829 ret = silc_config_get_token(line, &tmp);
833 config->servers->port = atoi(tmp);
838 ret = silc_config_get_token(line, &config->servers->version);
842 /* Get class number */
843 ret = silc_config_get_token(line, &tmp);
847 config->servers->class = atoi(tmp);
852 checkmask |= (1L << pc->section->type);
855 case SILC_CONFIG_SERVER_SECTION_TYPE_ROUTER_CONNECTION:
857 SILC_SERVER_CONFIG_LIST_ALLOC(config->routers);
860 ret = silc_config_get_token(line, &config->routers->host);
865 // config->routers->host = strdup("*");
867 /* Get authentication method */
868 ret = silc_config_get_token(line, &tmp);
872 if (strcmp(tmp, SILC_CONFIG_SERVER_AUTH_METH_PASSWD) &&
873 strcmp(tmp, SILC_CONFIG_SERVER_AUTH_METH_PUBKEY)) {
874 fprintf(stderr, "%s:%d: Unknown authentication method '%s'\n",
875 config->filename, pc->linenum, tmp);
879 if (!strcmp(tmp, SILC_CONFIG_SERVER_AUTH_METH_PASSWD))
880 config->routers->auth_meth = SILC_AUTH_PASSWORD;
882 if (!strcmp(tmp, SILC_CONFIG_SERVER_AUTH_METH_PUBKEY))
883 config->routers->auth_meth = SILC_AUTH_PUBLIC_KEY;
888 /* Get authentication data */
889 ret = silc_config_get_token(line, (char **)&config->routers->auth_data);
893 if (config->routers->auth_meth == SILC_AUTH_PASSWORD) {
894 config->routers->auth_data_len = strlen(config->routers->auth_data);
895 } else if (config->routers->auth_meth == SILC_AUTH_PUBLIC_KEY) {
896 /* Get the public key */
897 SilcPublicKey public_key;
899 if (!silc_pkcs_load_public_key(config->routers->auth_data,
900 &public_key, SILC_PKCS_FILE_PEM))
901 if (!silc_pkcs_load_public_key(config->routers->auth_data,
902 &public_key, SILC_PKCS_FILE_BIN)) {
903 fprintf(stderr, "%s:%d: Could not load public key file `%s'\n",
904 config->filename, pc->linenum,
905 (char *)config->routers->auth_data);
909 silc_free(config->routers->auth_data);
910 config->routers->auth_data = (void *)public_key;
911 config->routers->auth_data_len = 0;
915 ret = silc_config_get_token(line, &tmp);
919 config->routers->port = atoi(tmp);
924 ret = silc_config_get_token(line, &config->routers->version);
928 /* Get class number */
929 ret = silc_config_get_token(line, &tmp);
933 config->routers->class = atoi(tmp);
937 /* Get whether we are initiator or not */
938 ret = silc_config_get_token(line, &tmp);
942 config->routers->initiator = atoi(tmp);
943 if (config->routers->initiator != 0)
944 config->routers->initiator = TRUE;
949 checkmask |= (1L << pc->section->type);
952 case SILC_CONFIG_SERVER_SECTION_TYPE_ADMIN_CONNECTION:
954 SILC_SERVER_CONFIG_LIST_ALLOC(config->admins);
957 ret = silc_config_get_token(line, &config->admins->host);
962 config->admins->host = strdup("*");
965 ret = silc_config_get_token(line, &config->admins->username);
970 config->admins->username = strdup("*");
973 ret = silc_config_get_token(line, &config->admins->nickname);
978 config->admins->nickname = strdup("*");
980 /* Get authentication method */
981 ret = silc_config_get_token(line, &tmp);
985 if (strcmp(tmp, SILC_CONFIG_SERVER_AUTH_METH_PASSWD) &&
986 strcmp(tmp, SILC_CONFIG_SERVER_AUTH_METH_PUBKEY)) {
987 fprintf(stderr, "%s:%d: Unknown authentication method '%s'\n",
988 config->filename, pc->linenum, tmp);
992 if (!strcmp(tmp, SILC_CONFIG_SERVER_AUTH_METH_PASSWD))
993 config->admins->auth_meth = SILC_AUTH_PASSWORD;
995 if (!strcmp(tmp, SILC_CONFIG_SERVER_AUTH_METH_PUBKEY))
996 config->admins->auth_meth = SILC_AUTH_PUBLIC_KEY;
1001 /* Get authentication data */
1002 ret = silc_config_get_token(line, (char **)&config->admins->auth_data);
1006 if (config->admins->auth_meth == SILC_AUTH_PASSWORD) {
1007 config->admins->auth_data_len = strlen(config->admins->auth_data);
1008 } else if (config->admins->auth_meth == SILC_AUTH_PUBLIC_KEY) {
1009 /* Get the public key */
1010 SilcPublicKey public_key;
1012 if (!silc_pkcs_load_public_key(config->admins->auth_data,
1013 &public_key, SILC_PKCS_FILE_PEM))
1014 if (!silc_pkcs_load_public_key(config->admins->auth_data,
1015 &public_key, SILC_PKCS_FILE_BIN)) {
1016 fprintf(stderr, "%s:%d: Could not load public key file `%s'\n",
1017 config->filename, pc->linenum,
1018 (char *)config->admins->auth_data);
1022 silc_free(config->admins->auth_data);
1023 config->admins->auth_data = (void *)public_key;
1024 config->admins->auth_data_len = 0;
1028 checkmask |= (1L << pc->section->type);
1031 case SILC_CONFIG_SERVER_SECTION_TYPE_DENY_CONNECTION:
1033 SILC_SERVER_CONFIG_LIST_ALLOC(config->denied);
1036 ret = silc_config_get_token(line, &config->denied->host);
1041 config->denied->host = strdup("*");
1042 fprintf(stderr, "warning: %s:%d: Denying all connections",
1043 config->filename, pc->linenum);
1047 ret = silc_config_get_token(line, &tmp);
1052 config->denied->port = 0;
1054 config->denied->port = atoi(tmp);
1059 ret = silc_config_get_token(line, &config->denied->comment);
1064 checkmask |= (1L << pc->section->type);
1067 case SILC_CONFIG_SERVER_SECTION_TYPE_MOTD:
1070 config->motd = silc_calloc(1, sizeof(*config->motd));
1073 ret = silc_config_get_token(line, &config->motd->motd_file);
1078 checkmask |= (1L << pc->section->type);
1081 case SILC_CONFIG_SERVER_SECTION_TYPE_NONE:
1087 /* Check for error */
1088 if (check == FALSE) {
1089 /* Line could not be parsed */
1090 fprintf(stderr, "%s:%d: Parse error\n", config->filename, pc->linenum);
1100 /* Check that all mandatory sections really were found. If not, the server
1101 cannot function and we return error. */
1102 ret = silc_server_config_check_sections(checkmask);
1108 /* Before returning all the lists in the config object must be set
1109 to their first values (the last value is first here). */
1110 while (config->cipher && config->cipher->prev)
1111 config->cipher = config->cipher->prev;
1112 while (config->pkcs && config->pkcs->prev)
1113 config->pkcs = config->pkcs->prev;
1114 while (config->hash_func && config->hash_func->prev)
1115 config->hash_func = config->hash_func->prev;
1116 while (config->hmac && config->hmac->prev)
1117 config->hmac = config->hmac->prev;
1118 while (config->listen_port && config->listen_port->prev)
1119 config->listen_port = config->listen_port->prev;
1120 while (config->logging && config->logging->prev)
1121 config->logging = config->logging->prev;
1122 while (config->conn_class && config->conn_class->prev)
1123 config->conn_class = config->conn_class->prev;
1124 while (config->clients && config->clients->prev)
1125 config->clients = config->clients->prev;
1126 while (config->servers && config->servers->prev)
1127 config->servers = config->servers->prev;
1128 while (config->admins && config->admins->prev)
1129 config->admins = config->admins->prev;
1130 while (config->routers && config->routers->prev)
1131 config->routers = config->routers->prev;
1133 SILC_LOG_DEBUG(("Done"));
1138 /* This function checks that the mask sent as argument includes all the
1139 sections that are mandatory in SILC server. */
1141 int silc_server_config_check_sections(uint32 checkmask)
1143 if (!(checkmask & (1L << SILC_CONFIG_SERVER_SECTION_TYPE_SERVER_INFO))) {
1147 if (!(checkmask & (1L << SILC_CONFIG_SERVER_SECTION_TYPE_ADMIN_INFO))) {
1151 if (!(checkmask & (1L << SILC_CONFIG_SERVER_SECTION_TYPE_LISTEN_PORT))) {
1156 (1L << SILC_CONFIG_SERVER_SECTION_TYPE_CLIENT_CONNECTION))) {
1161 & (1L << SILC_CONFIG_SERVER_SECTION_TYPE_SERVER_CONNECTION))) {
1166 & (1L << SILC_CONFIG_SERVER_SECTION_TYPE_ROUTER_CONNECTION))) {
1174 /* Sets log files where log messages is saved by the server. */
1176 void silc_server_config_setlogfiles(SilcServerConfig config)
1178 SilcServerConfigSectionLogging *log;
1179 char *info, *warning, *error, *fatal;
1180 uint32 info_size, warning_size, error_size, fatal_size;
1182 SILC_LOG_DEBUG(("Setting configured log file names"));
1184 /* Set default files before checking configuration */
1185 info = SILC_LOG_FILE_INFO;
1186 warning = SILC_LOG_FILE_WARNING;
1187 error = SILC_LOG_FILE_ERROR;
1188 fatal = SILC_LOG_FILE_FATAL;
1194 log = config->logging;
1196 if (!strcmp(log->logtype, SILC_CONFIG_SERVER_LF_INFO)) {
1197 info = log->filename;
1198 info_size = log->maxsize;
1200 if (!strcmp(log->logtype, SILC_CONFIG_SERVER_LF_WARNING)) {
1201 warning = log->filename;
1202 warning_size = log->maxsize;
1204 if (!strcmp(log->logtype, SILC_CONFIG_SERVER_LF_ERROR)) {
1205 error = log->filename;
1206 error_size = log->maxsize;
1208 if (!strcmp(log->logtype, SILC_CONFIG_SERVER_LF_FATAL)) {
1209 fatal = log->filename;
1210 fatal_size = log->maxsize;
1216 silc_log_set_files(info, info_size, warning, warning_size,
1217 error, error_size, fatal, fatal_size);
1220 /* Registers configured ciphers. These can then be allocated by the
1221 server when needed. */
1223 void silc_server_config_register_ciphers(SilcServerConfig config)
1225 SilcServerConfigSectionAlg *alg;
1226 SilcServer server = (SilcServer)config->server;
1228 SILC_LOG_DEBUG(("Registering configured ciphers"));
1230 alg = config->cipher;
1233 if (!alg->sim_name) {
1236 for (i = 0; silc_default_ciphers[i].name; i++)
1237 if (!strcmp(silc_default_ciphers[i].name, alg->alg_name)) {
1238 silc_cipher_register(&silc_default_ciphers[i]);
1242 if (!silc_cipher_is_supported(alg->alg_name)) {
1243 SILC_LOG_ERROR(("Unknown cipher `%s'", alg->alg_name));
1244 silc_server_stop(server);
1249 /* Load (try at least) the crypto SIM module */
1250 SilcCipherObject cipher;
1251 SilcSimContext *sim;
1254 memset(&cipher, 0, sizeof(cipher));
1255 cipher.name = alg->alg_name;
1256 cipher.block_len = alg->block_len;
1257 cipher.key_len = alg->key_len * 8;
1259 sim = silc_sim_alloc();
1260 sim->type = SILC_SIM_CIPHER;
1261 sim->libname = alg->sim_name;
1263 alg_name = strdup(alg->alg_name);
1264 if (strchr(alg_name, '-'))
1265 *strchr(alg_name, '-') = '\0';
1267 if ((silc_sim_load(sim))) {
1269 silc_sim_getsym(sim, silc_sim_symname(alg_name,
1270 SILC_CIPHER_SIM_SET_KEY));
1271 SILC_LOG_DEBUG(("set_key=%p", cipher.set_key));
1272 cipher.set_key_with_string =
1273 silc_sim_getsym(sim, silc_sim_symname(alg_name,
1274 SILC_CIPHER_SIM_SET_KEY_WITH_STRING));
1275 SILC_LOG_DEBUG(("set_key_with_string=%p", cipher.set_key_with_string));
1277 silc_sim_getsym(sim, silc_sim_symname(alg_name,
1278 SILC_CIPHER_SIM_ENCRYPT_CBC));
1279 SILC_LOG_DEBUG(("encrypt_cbc=%p", cipher.encrypt));
1281 silc_sim_getsym(sim, silc_sim_symname(alg_name,
1282 SILC_CIPHER_SIM_DECRYPT_CBC));
1283 SILC_LOG_DEBUG(("decrypt_cbc=%p", cipher.decrypt));
1284 cipher.context_len =
1285 silc_sim_getsym(sim, silc_sim_symname(alg_name,
1286 SILC_CIPHER_SIM_CONTEXT_LEN));
1287 SILC_LOG_DEBUG(("context_len=%p", cipher.context_len));
1289 /* Put the SIM to the list of all SIM's in server */
1290 silc_dlist_add(server->sim, sim);
1292 silc_free(alg_name);
1294 SILC_LOG_ERROR(("Error configuring ciphers"));
1295 silc_server_stop(server);
1299 /* Register the cipher */
1300 silc_cipher_register(&cipher);
1308 /* Registers configured PKCS's. */
1310 void silc_server_config_register_pkcs(SilcServerConfig config)
1312 SilcServerConfigSectionAlg *alg = config->pkcs;
1313 SilcServer server = (SilcServer)config->server;
1315 SILC_LOG_DEBUG(("Registering configured PKCS"));
1320 for (i = 0; silc_default_pkcs[i].name; i++)
1321 if (!strcmp(silc_default_pkcs[i].name, alg->alg_name)) {
1322 silc_pkcs_register(&silc_default_pkcs[i]);
1326 if (!silc_pkcs_is_supported(alg->alg_name)) {
1327 SILC_LOG_ERROR(("Unknown PKCS `%s'", alg->alg_name));
1328 silc_server_stop(server);
1336 /* Registers configured hash functions. These can then be allocated by the
1337 server when needed. */
1339 void silc_server_config_register_hashfuncs(SilcServerConfig config)
1341 SilcServerConfigSectionAlg *alg;
1342 SilcServer server = (SilcServer)config->server;
1344 SILC_LOG_DEBUG(("Registering configured hash functions"));
1346 alg = config->hash_func;
1349 if (!alg->sim_name) {
1352 for (i = 0; silc_default_hash[i].name; i++)
1353 if (!strcmp(silc_default_hash[i].name, alg->alg_name)) {
1354 silc_hash_register(&silc_default_hash[i]);
1358 if (!silc_hash_is_supported(alg->alg_name)) {
1359 SILC_LOG_ERROR(("Unknown hash funtion `%s'", alg->alg_name));
1360 silc_server_stop(server);
1366 /* Load (try at least) the hash SIM module */
1367 SilcHashObject hash;
1368 SilcSimContext *sim;
1370 memset(&hash, 0, sizeof(hash));
1371 hash.name = alg->alg_name;
1372 hash.block_len = alg->block_len;
1373 hash.hash_len = alg->key_len;
1375 sim = silc_sim_alloc();
1376 sim->type = SILC_SIM_HASH;
1377 sim->libname = alg->sim_name;
1379 if ((silc_sim_load(sim))) {
1381 silc_sim_getsym(sim, silc_sim_symname(alg->alg_name,
1382 SILC_HASH_SIM_INIT));
1383 SILC_LOG_DEBUG(("init=%p", hash.init));
1385 silc_sim_getsym(sim, silc_sim_symname(alg->alg_name,
1386 SILC_HASH_SIM_UPDATE));
1387 SILC_LOG_DEBUG(("update=%p", hash.update));
1389 silc_sim_getsym(sim, silc_sim_symname(alg->alg_name,
1390 SILC_HASH_SIM_FINAL));
1391 SILC_LOG_DEBUG(("final=%p", hash.final));
1393 silc_sim_getsym(sim, silc_sim_symname(alg->alg_name,
1394 SILC_HASH_SIM_CONTEXT_LEN));
1395 SILC_LOG_DEBUG(("context_len=%p", hash.context_len));
1397 /* Put the SIM to the table of all SIM's in server */
1398 silc_dlist_add(server->sim, sim);
1400 SILC_LOG_ERROR(("Error configuring hash functions"));
1401 silc_server_stop(server);
1405 /* Register the hash function */
1406 silc_hash_register(&hash);
1414 /* Registers configure HMACs. These can then be allocated by the server
1417 void silc_server_config_register_hmacs(SilcServerConfig config)
1419 SilcServerConfigSectionAlg *alg;
1420 SilcServer server = (SilcServer)config->server;
1422 SILC_LOG_DEBUG(("Registering configured HMACs"));
1424 if (!config->hmac) {
1425 SILC_LOG_ERROR(("HMACs are not configured. SILC cannot work without "
1427 silc_server_stop(server);
1433 SilcHmacObject hmac;
1435 if (!silc_hash_is_supported(alg->sim_name)) {
1436 SILC_LOG_ERROR(("Unknown hash function `%s'", alg->sim_name));
1437 silc_server_stop(server);
1441 /* Register the HMAC */
1442 memset(&hmac, 0, sizeof(hmac));
1443 hmac.name = alg->alg_name;
1444 hmac.len = alg->key_len;
1445 silc_hmac_register(&hmac);
1451 /* Returns client authentication information from server configuration
1452 by host (name or ip). If `port' is non-null then both name or IP and
1453 the port must match. */
1455 SilcServerConfigSectionClientConnection *
1456 silc_server_config_find_client_conn(SilcServerConfig config,
1457 char *host, int port)
1460 SilcServerConfigSectionClientConnection *client = NULL;
1466 if (!config->clients)
1469 client = config->clients;
1471 for (i = 0; client; i++) {
1472 if (silc_string_compare(client->host, host))
1475 if (port && client->port && client->port != port)
1481 client = client->next;
1490 /* Returns server connection info from server configuartion by host
1491 (name or ip). If `port' is non-null then both name or IP and the port
1494 SilcServerConfigSectionServerConnection *
1495 silc_server_config_find_server_conn(SilcServerConfig config,
1496 char *host, int port)
1499 SilcServerConfigSectionServerConnection *serv = NULL;
1505 if (!config->servers)
1508 serv = config->servers;
1509 for (i = 0; serv; i++) {
1510 if (silc_string_compare(serv->host, host))
1513 if (port && serv->port && serv->port != port)
1528 /* Returns router connection info from server configuartion by
1529 host (name or ip). */
1531 SilcServerConfigSectionServerConnection *
1532 silc_server_config_find_router_conn(SilcServerConfig config,
1533 char *host, int port)
1536 SilcServerConfigSectionServerConnection *serv = NULL;
1542 if (!config->routers)
1545 serv = config->routers;
1546 for (i = 0; serv; i++) {
1547 if (silc_string_compare(serv->host, host))
1550 if (port && serv->port && serv->port != port)
1565 /* Returns TRUE if configuartion for a router connection that we are
1566 initiating exists. */
1568 bool silc_server_config_is_primary_route(SilcServerConfig config)
1571 SilcServerConfigSectionServerConnection *serv = NULL;
1574 serv = config->routers;
1575 for (i = 0; serv; i++) {
1576 if (serv->initiator == TRUE) {
1587 /* Returns Admin connection configuration by host, username and/or
1590 SilcServerConfigSectionAdminConnection *
1591 silc_server_config_find_admin(SilcServerConfig config,
1592 char *host, char *username, char *nickname)
1594 SilcServerConfigSectionAdminConnection *admin = NULL;
1597 if (!config->admins)
1607 admin = config->admins;
1608 for (i = 0; admin; i++) {
1609 if (silc_string_compare(admin->host, host) &&
1610 silc_string_compare(admin->username, username) &&
1611 silc_string_compare(admin->nickname, nickname))
1614 admin = admin->next;
1623 /* Returns the Denied connection configuration by host and port. */
1625 SilcServerConfigSectionDenyConnection *
1626 silc_server_config_denied_conn(SilcServerConfig config, char *host,
1630 SilcServerConfigSectionDenyConnection *deny = NULL;
1636 if (!config->denied)
1639 deny = config->denied;
1640 for (i = 0; deny; i++) {
1641 if (silc_string_compare(deny->host, host))
1644 if (port && deny->port && deny->port != port)