/*
- silc-queries.c
+ silc-queries.c
Author: Pekka Riikonen <priikone@silcnet.org>
- Copyright (C) 2002 Pekka Riikonen
+ Copyright (C) 2002 - 2008 Pekka Riikonen
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
const char *sv;
SilcUInt32 tmp_len, mask;
SilcAttributeObjService service;
- SilcAttributeObjMime mime;
+ SilcMime mime;
SilcAttributeObjGeo geo;
SilcAttributeObjDevice dev;
SilcAttributeObjPk pk;
bool allowed;
memset(&service, 0, sizeof(service));
- memset(&mime, 0, sizeof(mime));
memset(&geo, 0, sizeof(geo));
memset(&dev, 0, sizeof(dev));
memset(&pk, 0, sizeof(pk));
/* Put USER_INFO */
silc_client_attribute_del(silc_client, conn,
SILC_ATTRIBUTE_USER_INFO, NULL);
- tmp = silc_file_readfile(sv, &tmp_len);
+ tmp = silc_file_readfile(sv, &tmp_len, NULL);
if (tmp) {
tmp[tmp_len] = 0;
if (silc_vcard_decode(tmp, tmp_len, &vcard))
silc_strncat(service.address, sizeof(service.address), *entry,
strlen(*entry));
service.status = TRUE;
+ service.idle = 0;
silc_client_attribute_add(silc_client, conn,
SILC_ATTRIBUTE_SERVICE, &service,
sizeof(service));
mask |= SILC_ATTRIBUTE_MOOD_ANXIOUS;
}
silc_client_attribute_add(silc_client, conn,
- SILC_ATTRIBUTE_STATUS_MOOD, (void *)mask,
+ SILC_ATTRIBUTE_STATUS_MOOD,
+ SILC_32_TO_PTR(mask),
sizeof(SilcUInt32));
g_strfreev(list);
}
/* Put STATUS_MESSAGE */
silc_client_attribute_del(silc_client, conn,
SILC_ATTRIBUTE_STATUS_MESSAGE, NULL);
- tmp = silc_file_readfile(sv, &tmp_len);
+ tmp = silc_file_readfile(sv, &tmp_len, NULL);
if (tmp) {
- tmp[tmp_len] = 0;
- mime.mime = (const unsigned char *)tmp;
- mime.mime_len = tmp_len;
- silc_client_attribute_add(silc_client, conn,
- SILC_ATTRIBUTE_STATUS_MESSAGE, &mime,
- sizeof(mime));
+ mime = silc_mime_decode(NULL, tmp, tmp_len);
+ if (mime)
+ silc_client_attribute_add(silc_client, conn,
+ SILC_ATTRIBUTE_STATUS_MESSAGE, mime,
+ sizeof(*mime));
}
silc_free(tmp);
}
mask |= SILC_ATTRIBUTE_CONTACT_MMS;
if (!strcasecmp(*entry, "CHAT"))
mask |= SILC_ATTRIBUTE_CONTACT_CHAT;
+ if (!strcasecmp(*entry, "VIDEO"))
+ mask |= SILC_ATTRIBUTE_CONTACT_VIDEO;
}
silc_client_attribute_add(silc_client, conn,
- SILC_ATTRIBUTE_PREFERRED_CONTACT, (void *)mask,
+ SILC_ATTRIBUTE_PREFERRED_CONTACT,
+ SILC_32_TO_PTR(mask),
sizeof(SilcUInt32));
g_strfreev(list);
}
list = g_strsplit(sv, " ", -1);
for (entry = list; *entry != NULL; entry++) {
if (!strncasecmp(*entry, "silc-rsa:", 8)) {
- tmp = silc_file_readfile((*entry) + 8, &tmp_len);
+ tmp = silc_file_readfile((*entry) + 8, &tmp_len, NULL);
if (tmp) {
tmp[tmp_len] = 0;
pk.type = "silc-rsa";
SILC_SERVER_REC *server;
char *name;
SilcAttributeObjPk userpk;
+ SilcPublicKey public_key;
SilcVCardStruct vcard;
- SilcAttributeObjMime message;
- SilcAttributeObjMime extension;
+ SilcMime message;
+ SilcMime extension;
bool nopk;
} *AttrVerify;
+static void silc_query_attributes_verify(SilcBool success, void *context)
+{
+ *(SilcBool *)context = success;
+}
+
void silc_query_attributes_print(SILC_SERVER_REC *server,
SilcClient client,
SilcClientConnection conn,
if (!silc_attribute_get_object(attr, (void *)&service,
sizeof(service)))
continue;
- snprintf(tmp, sizeof(tmp) - 1, "%s:%d (logged %s)",
+ snprintf(tmp, sizeof(tmp) - 1, "%s:%d (logged %s) idle %d seconds",
service.address, (unsigned int)service.port,
- service.status ? "in" : "out");
+ service.status ? "in" : "out",
+ (unsigned int)service.idle);
printformat_module("fe-common/silc", server, NULL,
MSGLEVEL_CRAP, SILCTXT_ATTR_SERVICES, tmp);
}
case SILC_ATTRIBUTE_STATUS_MESSAGE:
{
- if (!silc_attribute_get_object(attr, (void *)&verify->message,
- sizeof(verify->message)))
+ verify->message = silc_mime_alloc();
+ if (!verify->message)
+ continue;
+ if (!silc_attribute_get_object(attr, (void *)verify->message,
+ sizeof(*verify->message)))
continue;
printformat_module("fe-common/silc", server, NULL,
MSGLEVEL_CRAP, SILCTXT_ATTR_STATUS_MESSAGE,
silc_strncat(tmp, sizeof(tmp), "SMS ", strlen(" SMS"));
if (mask & SILC_ATTRIBUTE_CONTACT_MMS)
silc_strncat(tmp, sizeof(tmp), "MMS ", strlen(" MMS"));
+ if (mask & SILC_ATTRIBUTE_CONTACT_VIDEO)
+ silc_strncat(tmp, sizeof(tmp), "VIDEO ", strlen(" VIDEO"));
printformat_module("fe-common/silc", server, NULL,
MSGLEVEL_CRAP, SILCTXT_ATTR_PREFERRED_CONTACT, tmp);
}
case SILC_ATTRIBUTE_EXTENSION:
{
- if (!silc_attribute_get_object(attr, (void *)&verify->extension,
- sizeof(verify->extension)))
+ verify->extension = silc_mime_alloc();
+ if (!verify->extension)
+ continue;
+ if (!silc_attribute_get_object(attr, (void *)verify->extension,
+ sizeof(*verify->extension)))
continue;
printformat_module("fe-common/silc", server, NULL,
MSGLEVEL_CRAP, SILCTXT_ATTR_EXTENSION,
/* Handle the signature verifications and public key verifying here */
- if (usersign.data && !strcmp(verify->userpk.type, "silc-rsa")) {
+ if (verify->userpk.data) {
+ SilcPKCSType type = 0;
+
+ if (!strcmp(verify->userpk.type, "silc-rsa"))
+ type = SILC_PKCS_SILC;
+ else if (!strcmp(verify->userpk.type, "ssh-rsa"))
+ type = SILC_PKCS_SSH2;
+ else if (!strcmp(verify->userpk.type, "x509v3-sign-rsa"))
+ type = SILC_PKCS_X509V3;
+ else if (!strcmp(verify->userpk.type, "pgp-sign-rsa"))
+ type = SILC_PKCS_OPENPGP;
+
+ silc_pkcs_public_key_alloc(type, verify->userpk.data,
+ verify->userpk.data_len,
+ &verify->public_key);
+ }
+
+ if (usersign.data) {
/* Verify the signature now */
- SilcPublicKey public_key;
- SilcPKCS pkcs;
unsigned char *verifyd;
SilcUInt32 verify_len;
+ SilcBool verified = FALSE;
- if (silc_pkcs_public_key_decode(verify->userpk.data,
- verify->userpk.data_len,
- &public_key)) {
- silc_pkcs_alloc("rsa", &pkcs);
+ if (verify->public_key) {
verifyd = silc_attribute_get_verify_data(attrs, FALSE, &verify_len);
- if (verifyd && silc_pkcs_public_key_set(pkcs, public_key)){
- if (silc_pkcs_verify_with_hash(pkcs, client->sha1hash,
- usersign.data,
- usersign.data_len,
- verifyd, verify_len)) {
- printformat_module("fe-common/silc", server, NULL,
- MSGLEVEL_CRAP, SILCTXT_ATTR_USER_SIGN_VERIFIED);
- } else {
- printformat_module("fe-common/silc", server, NULL,
- MSGLEVEL_CRAP, SILCTXT_ATTR_USER_SIGN_FAILED);
- }
+ if (verifyd)
+ silc_pkcs_verify_async(verify->public_key, usersign.data,
+ usersign.data_len, verifyd, verify_len,
+ TRUE, sha1hash,
+ silc_query_attributes_verify, &verified);
+
+ if (verified) {
+ printformat_module("fe-common/silc", server, NULL,
+ MSGLEVEL_CRAP, SILCTXT_ATTR_USER_SIGN_VERIFIED);
+ } else {
+ printformat_module("fe-common/silc", server, NULL,
+ MSGLEVEL_CRAP, SILCTXT_ATTR_USER_SIGN_FAILED);
}
- silc_pkcs_public_key_free(public_key);
silc_free(verifyd);
+ } else {
+ printformat_module("fe-common/silc", server, NULL,
+ MSGLEVEL_CRAP, SILCTXT_ATTR_USER_SIGN_FAILED);
}
} else {
printformat_module("fe-common/silc", server, NULL,
MSGLEVEL_CRAP, SILCTXT_ATTR_USER_SIGN_NOT_PRESENT);
}
- if (serversign.data && !strcmp(serverpk.type, "silc-rsa")) {
+ if (serversign.data) {
/* Verify the signature now */
SilcPublicKey public_key;
- SilcPKCS pkcs;
+ SilcPKCSType type = 0;
unsigned char *verifyd;
SilcUInt32 verify_len;
-
- if (silc_pkcs_public_key_decode(serverpk.data, serverpk.data_len,
- &public_key)) {
- silc_pkcs_alloc("rsa", &pkcs);
+ SilcBool verified = FALSE;
+
+ if (!strcmp(serverpk.type, "silc-rsa"))
+ type = SILC_PKCS_SILC;
+ else if (!strcmp(serverpk.type, "ssh-rsa"))
+ type = SILC_PKCS_SSH2;
+ else if (!strcmp(serverpk.type, "x509v3-sign-rsa"))
+ type = SILC_PKCS_X509V3;
+ else if (!strcmp(serverpk.type, "pgp-sign-rsa"))
+ type = SILC_PKCS_OPENPGP;
+
+ if (silc_pkcs_public_key_alloc(type, serverpk.data,
+ serverpk.data_len,
+ &public_key)) {
verifyd = silc_attribute_get_verify_data(attrs, TRUE, &verify_len);
- if (verifyd && silc_pkcs_public_key_set(pkcs, public_key)) {
- if (silc_pkcs_verify_with_hash(pkcs, client->sha1hash,
- serversign.data,
- serversign.data_len,
- verifyd, verify_len)) {
- printformat_module("fe-common/silc", server, NULL,
- MSGLEVEL_CRAP, SILCTXT_ATTR_SERVER_SIGN_VERIFIED);
- } else {
- printformat_module("fe-common/silc", server, NULL,
- MSGLEVEL_CRAP, SILCTXT_ATTR_SERVER_SIGN_FAILED);
- }
+ if (verifyd)
+ silc_pkcs_verify_async(public_key, serversign.data,
+ serversign.data_len, verifyd,
+ verify_len, TRUE, sha1hash,
+ silc_query_attributes_verify, &verified);
+ if (verified) {
+ printformat_module("fe-common/silc", server, NULL,
+ MSGLEVEL_CRAP, SILCTXT_ATTR_SERVER_SIGN_VERIFIED);
+ } else {
+ printformat_module("fe-common/silc", server, NULL,
+ MSGLEVEL_CRAP, SILCTXT_ATTR_SERVER_SIGN_FAILED);
}
silc_pkcs_public_key_free(public_key);
silc_free(verifyd);
+ } else {
+ printformat_module("fe-common/silc", server, NULL,
+ MSGLEVEL_CRAP, SILCTXT_ATTR_SERVER_SIGN_FAILED);
}
}
- if (verify->userpk.data) {
- silc_verify_public_key(client, conn, SILC_SOCKET_TYPE_CLIENT,
- verify->userpk.data, verify->userpk.data_len,
- SILC_SKE_PK_TYPE_SILC,
+ if (verify->public_key) {
+ silc_verify_public_key(client, conn, SILC_CONN_CLIENT,
+ verify->public_key,
silc_query_attributes_print_final, verify);
} else {
verify->nopk = TRUE;
static void silc_query_attributes_print_final(bool success, void *context)
{
AttrVerify verify = context;
- SilcClient client = verify->client;
SILC_SERVER_REC *server = verify->server;
char *format = NULL;
unsigned char filename[256], *fingerprint = NULL, *tmp;
MSGLEVEL_CRAP, SILCTXT_ATTR_FOOTER);
/* Replace all whitespaces with `_'. */
- fingerprint = silc_hash_fingerprint(client->sha1hash,
+ fingerprint = silc_hash_fingerprint(sha1hash,
verify->userpk.data,
verify->userpk.data_len);
for (i = 0; i < strlen(fingerprint); i++)
if (fingerprint[i] == ' ')
fingerprint[i] = '_';
-
+
/* Filename for dir */
tmp = fingerprint + strlen(fingerprint) - 9;
- snprintf(filename, sizeof(filename) - 1, "%s/friends/%s",
+ snprintf(filename, sizeof(filename) - 1, "%s/friends/%s",
get_irssi_dir(), tmp);
silc_free(fingerprint);
static void silc_query_attributes_accept(const char *line, void *context)
{
AttrVerify verify = context;
- SilcClient client = verify->client;
SILC_SERVER_REC *server = verify->server;
struct stat st;
struct passwd *pw;
goto out;
/* Replace all whitespaces with `_'. */
- fingerprint = silc_hash_fingerprint(client->sha1hash,
+ fingerprint = silc_hash_fingerprint(sha1hash,
verify->userpk.data,
verify->userpk.data_len);
for (i = 0; i < strlen(fingerprint); i++)
/* Filename for dir */
tmp = fingerprint + strlen(fingerprint) - 9;
- snprintf(filename, sizeof(filename) - 1, "%s/friends/%s",
+ snprintf(filename, sizeof(filename) - 1, "%s/friends/%s",
get_irssi_dir(), tmp);
/* Create dir if it doesn't exist */
}
/* Save public key */
- memset(filename2, 0, sizeof(filename2));
- snprintf(filename2, sizeof(filename2) - 1, "%s/clientkey_%s.pub",
- filename, fingerprint);
- silc_pkcs_save_public_key_data(filename2, verify->userpk.data,
- verify->userpk.data_len,
- SILC_PKCS_FILE_PEM);
+ if (verify->public_key) {
+ memset(filename2, 0, sizeof(filename2));
+ snprintf(filename2, sizeof(filename2) - 1, "%s/clientkey_%s.pub",
+ filename, fingerprint);
+ silc_pkcs_save_public_key(filename2, verify->public_key,
+ SILC_PKCS_FILE_BASE64);
+ }
/* Save extension data */
- if (verify->extension.mime) {
+ if (verify->extension) {
memset(filename2, 0, sizeof(filename2));
snprintf(filename2, sizeof(filename2) - 1, "%s/extension.mime",
filename);
- silc_file_writefile(filename2, verify->extension.mime,
- verify->extension.mime_len);
+ tmp = silc_mime_encode(verify->extension, &len);
+ if (tmp)
+ silc_file_writefile(filename2, tmp, len);
}
/* Save MIME message data */
- if (verify->extension.mime) {
+ if (verify->message) {
memset(filename2, 0, sizeof(filename2));
snprintf(filename2, sizeof(filename2) - 1, "%s/status_message.mime",
filename);
- silc_file_writefile(filename2, verify->message.mime,
- verify->message.mime_len);
+ tmp = silc_mime_encode(verify->message, &len);
+ if (tmp)
+ silc_file_writefile(filename2, tmp, len);
}
printformat_module("fe-common/silc", server, NULL,