5 Author: Pekka Riikonen <priikone@silcnet.org>
7 Copyright (C) 1997 - 2005, 2007 Pekka Riikonen
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; version 2 of the License.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
21 #include "serverincludes.h"
22 #include "server_internal.h"
24 static int silc_server_is_registered(SilcServer server,
25 SilcPacketStream sock,
26 SilcServerCommandContext cmd,
29 silc_server_command_send_status_reply(SilcServerCommandContext cmd,
34 silc_server_command_send_status_data(SilcServerCommandContext cmd,
39 const unsigned char *arg,
42 silc_server_command_pending_error_check(SilcServerCommandContext cmd,
43 SilcServerCommandReplyContext cmdr,
45 SILC_TASK_CALLBACK(silc_server_command_process_timeout);
47 /* Server command list. */
48 SilcServerCommand silc_command_list[] =
50 SILC_SERVER_CMD(whois, WHOIS, SILC_CF_LAG | SILC_CF_REG),
51 SILC_SERVER_CMD(whowas, WHOWAS, SILC_CF_LAG | SILC_CF_REG),
52 SILC_SERVER_CMD(identify, IDENTIFY, SILC_CF_LAG | SILC_CF_REG),
53 SILC_SERVER_CMD(nick, NICK, SILC_CF_LAG_STRICT | SILC_CF_REG),
54 SILC_SERVER_CMD(list, LIST, SILC_CF_LAG_STRICT | SILC_CF_REG),
55 SILC_SERVER_CMD(topic, TOPIC, SILC_CF_LAG | SILC_CF_REG),
56 SILC_SERVER_CMD(invite, INVITE, SILC_CF_LAG | SILC_CF_REG),
57 SILC_SERVER_CMD(quit, QUIT, SILC_CF_LAG | SILC_CF_REG),
58 SILC_SERVER_CMD(kill, KILL, SILC_CF_LAG_STRICT | SILC_CF_REG | SILC_CF_OPER),
59 SILC_SERVER_CMD(info, INFO, SILC_CF_LAG | SILC_CF_REG),
60 SILC_SERVER_CMD(stats, STATS, SILC_CF_LAG | SILC_CF_REG),
61 SILC_SERVER_CMD(ping, PING, SILC_CF_LAG | SILC_CF_REG),
62 SILC_SERVER_CMD(oper, OPER, SILC_CF_LAG | SILC_CF_REG | SILC_CF_OPER),
63 SILC_SERVER_CMD(join, JOIN, SILC_CF_LAG_STRICT | SILC_CF_REG),
64 SILC_SERVER_CMD(motd, MOTD, SILC_CF_LAG | SILC_CF_REG),
65 SILC_SERVER_CMD(umode, UMODE, SILC_CF_LAG | SILC_CF_REG),
66 SILC_SERVER_CMD(cmode, CMODE, SILC_CF_LAG_STRICT | SILC_CF_REG),
67 SILC_SERVER_CMD(cumode, CUMODE, SILC_CF_LAG | SILC_CF_REG),
68 SILC_SERVER_CMD(kick, KICK, SILC_CF_LAG_STRICT | SILC_CF_REG),
69 SILC_SERVER_CMD(ban, BAN, SILC_CF_LAG_STRICT | SILC_CF_REG),
70 SILC_SERVER_CMD(detach, DETACH, SILC_CF_LAG_STRICT | SILC_CF_REG),
71 SILC_SERVER_CMD(watch, WATCH, SILC_CF_LAG | SILC_CF_REG),
72 SILC_SERVER_CMD(silcoper, SILCOPER,
73 SILC_CF_LAG | SILC_CF_REG | SILC_CF_SILC_OPER),
74 SILC_SERVER_CMD(leave, LEAVE, SILC_CF_LAG_STRICT | SILC_CF_REG),
75 SILC_SERVER_CMD(users, USERS, SILC_CF_LAG | SILC_CF_REG),
76 SILC_SERVER_CMD(getkey, GETKEY, SILC_CF_LAG | SILC_CF_REG),
77 SILC_SERVER_CMD(service, SERVICE, SILC_CF_LAG_STRICT | SILC_CF_REG),
79 SILC_SERVER_CMD(connect, PRIV_CONNECT,
80 SILC_CF_LAG | SILC_CF_REG | SILC_CF_OPER),
81 SILC_SERVER_CMD(close, PRIV_CLOSE,
82 SILC_CF_LAG | SILC_CF_REG | SILC_CF_OPER),
83 SILC_SERVER_CMD(shutdown, PRIV_SHUTDOWN, SILC_CF_LAG | SILC_CF_REG |
89 /* Performs several checks to the command. It first checks whether this
90 command was called as pending command callback. If it was then it checks
91 whether error occurred in the command reply where the pending command
94 It also checks that the requested command includes correct amount
96 #define SILC_SERVER_COMMAND_CHECK(command, context, min, max) \
100 if (silc_server_command_pending_error_check(cmd, context2, command)) { \
101 SILC_LOG_DEBUG(("Error occurred in command reply, command not called")); \
102 silc_server_command_free(cmd); \
106 _argc = silc_argument_get_arg_num(cmd->args); \
108 SILC_LOG_DEBUG(("Not enough parameters in command")); \
109 silc_server_command_send_status_reply(cmd, command, \
110 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS, \
112 silc_server_command_free(cmd); \
116 SILC_LOG_DEBUG(("Too many parameters in command")); \
117 silc_server_command_send_status_reply(cmd, command, \
118 SILC_STATUS_ERR_TOO_MANY_PARAMS, \
120 silc_server_command_free(cmd); \
125 /* Returns TRUE if the connection is registered. Unregistered connections
126 usually cannot send commands hence the check. */
128 static int silc_server_is_registered(SilcServer server,
129 SilcPacketStream sock,
130 SilcServerCommandContext cmd,
133 SilcIDListData idata = silc_packet_get_context(sock);
138 if (idata->status & SILC_IDLIST_STATUS_REGISTERED)
141 silc_server_command_send_status_reply(cmd, command,
142 SILC_STATUS_ERR_NOT_REGISTERED, 0);
146 /* Internal context to hold data when executed command with timeout. */
148 SilcServerCommandContext ctx;
149 SilcServerCommand *cmd;
150 } *SilcServerCommandTimeout;
152 /* Timeout callback to process commands with timeout for client. Client's
153 commands are always executed with timeout. */
155 SILC_TASK_CALLBACK(silc_server_command_process_timeout)
157 SilcServerCommandTimeout timeout = (SilcServerCommandTimeout)context;
158 SilcClientEntry client = silc_packet_get_context(timeout->ctx->sock);
161 SILC_LOG_DEBUG(("Client entry is invalid"));
162 silc_server_command_free(timeout->ctx);
167 /* Update access time */
168 client->last_command = time(NULL);
170 if (!(timeout->cmd->flags & SILC_CF_REG)) {
171 SILC_LOG_DEBUG(("Calling %s command",
172 silc_get_command_name(timeout->cmd->cmd)));
173 timeout->cmd->cb(timeout->ctx, NULL);
174 } else if (silc_server_is_registered(timeout->ctx->server,
177 timeout->cmd->cmd)) {
178 SILC_LOG_DEBUG(("Calling %s command",
179 silc_get_command_name(timeout->cmd->cmd)));
180 timeout->cmd->cb(timeout->ctx, NULL);
182 SILC_LOG_DEBUG(("Client is not registered"));
183 silc_server_command_free(timeout->ctx);
189 /* Processes received command packet. */
191 void silc_server_command_process(SilcServer server,
192 SilcPacketStream sock,
195 SilcIDListData idata = silc_packet_get_context(sock);
196 SilcServerCommandContext ctx;
197 SilcServerCommand *cmd;
203 /* Allocate command context. This must be free'd by the
204 command routine receiving it. */
205 ctx = silc_server_command_alloc();
206 ctx->server = server;
208 ctx->packet = packet; /* Save original packet */
209 silc_packet_stream_ref(sock);
211 /* Parse the command payload in the packet */
212 ctx->payload = silc_command_payload_parse(packet->buffer.data,
213 silc_buffer_len(&packet->buffer));
215 SILC_LOG_ERROR(("Bad command payload"));
216 silc_packet_free(packet);
217 silc_packet_stream_unref(ctx->sock);
221 ctx->args = silc_command_get_args(ctx->payload);
223 /* Get the command */
224 command = silc_command_get(ctx->payload);
225 for (cmd = silc_command_list; cmd->cb; cmd++)
226 if (cmd->cmd == command)
229 if (!cmd || !cmd->cb) {
230 SILC_LOG_DEBUG(("Unknown command %d", command));
231 silc_server_command_send_status_reply(ctx, command,
232 SILC_STATUS_ERR_UNKNOWN_COMMAND, 0);
233 silc_packet_free(packet);
234 silc_packet_stream_unref(ctx->sock);
239 /* Execute client's commands always with timeout. Normally they are
240 executed with zero (0) timeout but if client is sending command more
241 frequently than once in 2 seconds, then the timeout may be 0 to 2
243 if (idata->conn_type == SILC_CONN_CLIENT) {
244 SilcClientEntry client = silc_packet_get_context(sock);
245 SilcServerCommandTimeout timeout;
248 timeout = silc_calloc(1, sizeof(*timeout));
252 if (client->last_command && (time(NULL) - client->last_command) < 2) {
253 client->fast_command++;
256 if (client->fast_command - 2 <= 0)
257 client->fast_command = 0;
259 client->fast_command -= 2;
263 if (!fast && ((cmd->flags & SILC_CF_LAG_STRICT) ||
264 (client->fast_command > 5 && cmd->flags & SILC_CF_LAG)))
265 silc_schedule_task_add_timeout(
267 silc_server_command_process_timeout, timeout,
268 (client->fast_command < 3 ? 0 :
269 2 - (time(NULL) - client->last_command)),
270 (client->fast_command < 3 ? 200000 : 0));
272 silc_schedule_task_add_timeout(server->schedule,
273 silc_server_command_process_timeout,
278 /* Execute for server */
280 if (!(cmd->flags & SILC_CF_REG)) {
281 SILC_LOG_DEBUG(("Calling %s command", silc_get_command_name(cmd->cmd)));
283 } else if (silc_server_is_registered(server, sock, ctx, cmd->cmd)) {
284 SILC_LOG_DEBUG(("Calling %s command", silc_get_command_name(cmd->cmd)));
287 SILC_LOG_DEBUG(("Server is not registered"));
288 silc_server_command_free(ctx);
292 /* Allocate Command Context */
294 SilcServerCommandContext silc_server_command_alloc()
296 SilcServerCommandContext ctx = silc_calloc(1, sizeof(*ctx));
301 /* Free's the command context allocated before executing the command */
303 void silc_server_command_free(SilcServerCommandContext ctx)
306 SILC_LOG_DEBUG(("Command context %p refcnt %d->%d", ctx, ctx->users + 1,
308 if (ctx->users < 1) {
310 silc_command_payload_free(ctx->payload);
312 silc_packet_free(ctx->packet);
314 silc_packet_stream_unref(ctx->sock);
319 /* Duplicate Command Context by adding reference counter. The context won't
320 be free'd untill it hits zero. */
322 SilcServerCommandContext
323 silc_server_command_dup(SilcServerCommandContext ctx)
326 SILC_LOG_DEBUG(("Command context %p refcnt %d->%d", ctx, ctx->users - 1,
331 /* Timeout for pending command. If reply to pending command never arrives
332 this is called to free resources. */
334 SILC_TASK_CALLBACK(silc_server_command_pending_timeout)
336 SilcServer server = app_context;
337 SilcServerCommandPending *reply = context;
338 SilcServerCommandReplyContext cmdr;
342 SILC_LOG_DEBUG(("Timeout pending command"));
344 /* Allocate temporary and bogus command reply context */
345 cmdr = silc_calloc(1, sizeof(*cmdr));
346 cmdr->server = server;
347 cmdr->ident = reply->ident;
349 /* Check for pending commands and mark to be exeucted */
351 silc_server_command_pending_check(server, reply->reply_cmd,
352 reply->ident, &cmdr->callbacks_count);
354 /* Create bogus command reply with an error inside */
356 silc_command_reply_payload_encode_va(reply->reply_cmd ? reply->reply_cmd :
357 SILC_COMMAND_RESERVED,
358 SILC_STATUS_ERR_TIMEDOUT, 0,
360 cmdr->payload = silc_command_payload_parse(tmpreply->data,
361 silc_buffer_len(tmpreply));
362 silc_buffer_free(tmpreply);
364 /* Call all callbacks. Same as SILC_SERVER_PENDING_EXEC macro. */
365 for (i = 0; i < cmdr->callbacks_count; i++)
366 if (cmdr->callbacks[i].callback)
367 (*cmdr->callbacks[i].callback)(cmdr->callbacks[i].context, cmdr);
369 silc_server_command_pending_del(server, reply->reply_cmd, reply->ident);
370 silc_server_command_reply_free(cmdr);
373 /* Add new pending command to be executed when reply to a command has been
374 received. The `reply_cmd' is the command that will call the `callback'
375 with `context' when reply has been received. It can be SILC_COMMAND_NONE
376 to match any command with the `ident'. If `ident' is non-zero
377 the `callback' will be executed when received reply with command
378 identifier `ident'. If there already exists pending command for the
379 specified command, ident, callback and context this function has no
382 SilcBool silc_server_command_pending(SilcServer server,
383 SilcCommand reply_cmd,
385 SilcCommandCb callback,
388 return silc_server_command_pending_timed(server, reply_cmd, ident, callback,
392 /* Same as silc_server_command_pending with specific timeout for pending
393 commands. If the `timeout' is zero default timeout is used. */
395 SilcBool silc_server_command_pending_timed(SilcServer server,
396 SilcCommand reply_cmd,
398 SilcCommandCb callback,
402 SilcServerCommandPending *reply;
404 /* Check whether identical pending already exists for same command,
405 ident, callback and callback context. If it does then it would be
406 error to register it again. */
407 silc_dlist_start(server->pending_commands);
408 while ((reply = silc_dlist_get(server->pending_commands)) != SILC_LIST_END) {
409 if (reply->reply_cmd == reply_cmd && reply->ident == ident &&
410 reply->callback == callback && reply->context == context)
414 reply = silc_calloc(1, sizeof(*reply));
415 reply->reply_cmd = reply_cmd;
416 reply->ident = ident;
417 reply->context = context;
418 reply->callback = callback;
420 silc_schedule_task_add_timeout(server->schedule,
421 silc_server_command_pending_timeout, reply,
422 timeout ? timeout : 12, 0);
423 silc_dlist_add(server->pending_commands, reply);
428 /* Deletes pending command by reply command type. */
430 void silc_server_command_pending_del(SilcServer server,
431 SilcCommand reply_cmd,
434 SilcServerCommandPending *r;
436 silc_dlist_start(server->pending_commands);
437 while ((r = silc_dlist_get(server->pending_commands)) != SILC_LIST_END) {
438 if ((r->reply_cmd == reply_cmd || (r->reply_cmd == SILC_COMMAND_NONE &&
440 && r->ident == ident) {
441 silc_dlist_del(server->pending_commands, r);
443 silc_schedule_task_del(server->schedule, r->timeout);
449 /* Checks for pending commands and marks callbacks to be called from
450 the command reply function. Returns TRUE if there were pending command. */
452 SilcServerCommandPendingCallbacks
453 silc_server_command_pending_check(SilcServer server,
456 SilcUInt32 *callbacks_count)
458 SilcServerCommandPending *r;
459 SilcServerCommandPendingCallbacks callbacks = NULL;
462 silc_dlist_start(server->pending_commands);
463 while ((r = silc_dlist_get(server->pending_commands)) != SILC_LIST_END) {
464 if ((r->reply_cmd == command || r->reply_cmd == SILC_COMMAND_NONE)
465 && r->ident == ident) {
466 callbacks = silc_realloc(callbacks, sizeof(*callbacks) * (i + 1));
467 callbacks[i].context = r->context;
468 callbacks[i].callback = r->callback;
469 r->reply_check = TRUE;
474 *callbacks_count = i;
478 /* Sends simple status message as command reply packet */
481 silc_server_command_send_status_reply(SilcServerCommandContext cmd,
489 cmd->server->stat.commands_sent++;
491 SILC_LOG_DEBUG(("Sending command status %d", status));
494 silc_command_reply_payload_encode_va(command, status, error,
495 silc_command_get_ident(cmd->payload),
497 silc_server_packet_send(cmd->server, cmd->sock,
498 SILC_PACKET_COMMAND_REPLY, 0,
499 buffer->data, silc_buffer_len(buffer));
500 silc_buffer_free(buffer);
503 /* Sends command status reply with one extra argument. The argument
504 type must be sent as argument. */
507 silc_server_command_send_status_data(SilcServerCommandContext cmd,
512 const unsigned char *arg,
518 cmd->server->stat.commands_sent++;
520 SILC_LOG_DEBUG(("Sending command status %d", status));
523 silc_command_reply_payload_encode_va(command, status, 0,
524 silc_command_get_ident(cmd->payload),
525 1, arg_type, arg, arg_len);
526 silc_server_packet_send(cmd->server, cmd->sock,
527 SILC_PACKET_COMMAND_REPLY, 0,
528 buffer->data, silc_buffer_len(buffer));
529 silc_buffer_free(buffer);
533 silc_server_command_send_status_data2(SilcServerCommandContext cmd,
537 SilcUInt32 arg_type1,
538 const unsigned char *arg1,
540 SilcUInt32 arg_type2,
541 const unsigned char *arg2,
547 cmd->server->stat.commands_sent++;
549 SILC_LOG_DEBUG(("Sending command status %d", status));
552 silc_command_reply_payload_encode_va(command, status, 0,
553 silc_command_get_ident(cmd->payload),
554 2, arg_type1, arg1, arg_len1,
555 arg_type2, arg2, arg_len2);
556 silc_server_packet_send(cmd->server, cmd->sock,
557 SILC_PACKET_COMMAND_REPLY, 0,
558 buffer->data, silc_buffer_len(buffer));
559 silc_buffer_free(buffer);
562 /* This function can be called to check whether in the command reply
563 an error occurred. This function has no effect if this is called
564 when the command function was not called as pending command callback.
565 This returns TRUE if error had occurred. */
568 silc_server_command_pending_error_check(SilcServerCommandContext cmd,
569 SilcServerCommandReplyContext cmdr,
572 if (!cmd->pending || !cmdr)
575 if (!silc_command_get_status(cmdr->payload, NULL, NULL)) {
579 cmd->server->stat.commands_sent++;
581 /* Send the same command reply payload */
582 silc_command_set_command(cmdr->payload, silc_command_get(cmd->payload));
583 silc_command_set_ident(cmdr->payload,
584 silc_command_get_ident(cmd->payload));
585 buffer = silc_command_payload_encode_payload(cmdr->payload);
586 silc_server_packet_send(cmd->server, cmd->sock,
587 SILC_PACKET_COMMAND_REPLY, 0,
588 buffer->data, silc_buffer_len(buffer));
589 silc_buffer_free(buffer);
596 /* Server side of command WHOIS. */
598 SILC_SERVER_CMD_FUNC(whois)
600 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
601 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_WHOIS, cmd, 1, 256);
602 silc_server_query_command(cmd->server, SILC_COMMAND_WHOIS, cmd);
603 silc_server_command_free(cmd);
606 /* Server side of command WHOWAS. */
608 SILC_SERVER_CMD_FUNC(whowas)
610 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
611 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_WHOWAS, cmd, 1, 2);
612 silc_server_query_command(cmd->server, SILC_COMMAND_WHOWAS, cmd);
613 silc_server_command_free(cmd);
616 /* Server side of command IDENTIFY. */
618 SILC_SERVER_CMD_FUNC(identify)
620 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
621 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_IDENTIFY, cmd, 1, 256);
622 silc_server_query_command(cmd->server, SILC_COMMAND_IDENTIFY, cmd);
623 silc_server_command_free(cmd);
626 /* Server side of command NICK. Sets nickname for user. Setting
627 nickname causes generation of a new client ID for the client. The
628 new client ID is sent to the client after changing the nickname. */
630 SILC_SERVER_CMD_FUNC(nick)
632 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
633 SilcClientEntry client = silc_packet_get_context(cmd->sock);
634 SilcServer server = cmd->server;
635 SilcBuffer nidp, oidp = NULL;
636 SilcClientID *new_id;
638 unsigned char *nick, *nickc = NULL;
639 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
641 if (client->data.conn_type != SILC_CONN_CLIENT || !client)
644 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_NICK, cmd, 1, 1);
647 nick = silc_argument_get_arg_type(cmd->args, 1, &nick_len);
649 silc_server_command_send_status_reply(cmd, SILC_COMMAND_NICK,
650 SILC_STATUS_ERR_BAD_NICKNAME, 0);
654 /* Truncate over long nicks */
655 if (nick_len > 128) {
657 nick[nick_len - 1] = '\0';
660 /* Check for valid nickname string. This is cached, original is saved
661 in the client context. */
662 nickc = silc_identifier_check(nick, nick_len, SILC_STRING_UTF8, 128, NULL);
664 silc_server_command_send_status_reply(cmd, SILC_COMMAND_NICK,
665 SILC_STATUS_ERR_BAD_NICKNAME, 0);
669 /* Check for same nickname */
670 if (strlen(client->nickname) == nick_len &&
671 !memcmp(client->nickname, nick, nick_len)) {
672 nidp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
677 /* Create new Client ID */
678 if (!silc_id_create_client_id(cmd->server, cmd->server->id,
680 cmd->server->md5hash,
681 nickc, strlen(nickc), &new_id)) {
682 silc_server_command_send_status_reply(cmd, SILC_COMMAND_NICK,
683 SILC_STATUS_ERR_BAD_NICKNAME, 0);
688 /* Send notify about nickname change to our router. We send the new
689 ID and ask to replace it with the old one. If we are router the
690 packet is broadcasted. Send NICK_CHANGE notify. */
691 silc_server_send_notify_nick_change(server, SILC_PRIMARY_ROUTE(server),
692 SILC_BROADCAST(server), client->id,
695 /* Check if anyone is watching the old nickname */
696 if (server->server_type == SILC_ROUTER)
697 silc_server_check_watcher_list(server, client, nick,
698 SILC_NOTIFY_TYPE_NICK_CHANGE);
700 oidp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
702 /* Update client entry */
703 silc_idcache_update_by_context(server->local_list->clients, client,
704 new_id, nickc, TRUE);
706 silc_free(client->nickname);
707 client->nickname = strdup(nick);
709 nidp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
711 /* Send NICK_CHANGE notify to the client's channels */
712 silc_server_send_notify_on_channels(server, NULL, client,
713 SILC_NOTIFY_TYPE_NICK_CHANGE, 3,
714 oidp->data, silc_buffer_len(oidp),
715 nidp->data, silc_buffer_len(nidp),
717 strlen(client->nickname));
719 /* Check if anyone is watching the new nickname */
720 if (server->server_type == SILC_ROUTER)
721 silc_server_check_watcher_list(server, client, NULL,
722 SILC_NOTIFY_TYPE_NICK_CHANGE);
725 /* Send the new Client ID as reply command back to client */
726 silc_server_send_command_reply(cmd->server, cmd->sock,
728 SILC_STATUS_OK, 0, ident, 2,
729 2, nidp->data, silc_buffer_len(nidp),
731 silc_buffer_free(nidp);
733 silc_buffer_free(oidp);
736 silc_server_command_free(cmd);
739 /* Sends the LIST command reply */
742 silc_server_command_list_send_reply(SilcServerCommandContext cmd,
743 SilcChannelEntry *lch,
744 SilcUInt32 lch_count,
745 SilcChannelEntry *gch,
746 SilcUInt32 gch_count)
750 SilcChannelEntry entry;
752 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
754 unsigned char usercount[4];
756 int valid_lcount = 0, valid_rcount = 0;
758 for (i = 0; i < lch_count; i++) {
759 if (lch[i]->mode & SILC_CHANNEL_MODE_SECRET)
764 for (i = 0; i < gch_count; i++) {
765 if (gch[i]->mode & SILC_CHANNEL_MODE_SECRET)
771 if (!lch_count && !gch_count) {
772 silc_server_command_send_status_reply(cmd, SILC_COMMAND_LIST,
777 status = SILC_STATUS_OK;
778 if ((lch_count + gch_count) > 1)
779 status = SILC_STATUS_LIST_START;
782 for (i = 0, k = 0; i < lch_count; i++) {
788 status = SILC_STATUS_LIST_ITEM;
789 if (valid_lcount > 1 && k == valid_lcount - 1 && !valid_rcount)
790 status = SILC_STATUS_LIST_END;
792 idp = silc_id_payload_encode(entry->id, SILC_ID_CHANNEL);
794 if (entry->mode & SILC_CHANNEL_MODE_PRIVATE) {
796 memset(usercount, 0, sizeof(usercount));
798 topic = entry->topic;
799 users = silc_hash_table_count(entry->user_list);
800 SILC_PUT32_MSB(users, usercount);
804 silc_server_send_command_reply(cmd->server, cmd->sock, SILC_COMMAND_LIST,
806 2, idp->data, silc_buffer_len(idp),
807 3, entry->channel_name,
808 strlen(entry->channel_name),
809 4, topic, topic ? strlen(topic) : 0,
811 silc_buffer_free(idp);
816 for (i = 0, k = 0; i < gch_count; i++) {
822 status = SILC_STATUS_LIST_ITEM;
823 if (valid_rcount > 1 && k == valid_rcount - 1)
824 status = SILC_STATUS_LIST_END;
826 idp = silc_id_payload_encode(entry->id, SILC_ID_CHANNEL);
828 if (entry->mode & SILC_CHANNEL_MODE_PRIVATE) {
830 memset(usercount, 0, sizeof(usercount));
832 topic = entry->topic;
833 users = entry->user_count;
834 SILC_PUT32_MSB(users, usercount);
838 silc_server_send_command_reply(cmd->server, cmd->sock, SILC_COMMAND_LIST,
840 2, idp->data, silc_buffer_len(idp),
841 3, entry->channel_name,
842 strlen(entry->channel_name),
843 4, topic, topic ? strlen(topic) : 0,
845 silc_buffer_free(idp);
850 /* Server side of LIST command. This lists the channel of the requested
851 server. Secret channels are not listed. */
853 SILC_SERVER_CMD_FUNC(list)
855 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
856 SilcServer server = cmd->server;
858 SilcChannelID *channel_id = NULL;
859 SilcChannelEntry *lchannels = NULL, *gchannels = NULL;
860 SilcUInt32 lch_count = 0, gch_count = 0;
862 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_LIST, cmd, 0, 1);
864 /* If we are normal server, send the command to router, since we
865 want to know all channels in the network. */
866 if (!cmd->pending && server->server_type != SILC_ROUTER &&
867 !server->standalone) {
869 SilcUInt16 old_ident;
872 cmd->server->stat.commands_sent++;
874 old_ident = silc_command_get_ident(cmd->payload);
875 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
876 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
877 silc_server_packet_send(server, SILC_PRIMARY_ROUTE(server),
878 SILC_PACKET_COMMAND, cmd->packet->flags,
879 tmpbuf->data, silc_buffer_len(tmpbuf));
881 /* Reprocess this packet after received reply from router */
882 silc_server_command_pending(server, SILC_COMMAND_LIST,
883 silc_command_get_ident(cmd->payload),
884 silc_server_command_list,
885 silc_server_command_dup(cmd));
887 silc_command_set_ident(cmd->payload, old_ident);
888 silc_buffer_free(tmpbuf);
893 if (silc_argument_get_decoded(cmd->args, 1, SILC_ARGUMENT_ID, &id, NULL))
894 channel_id = SILC_ID_GET_ID(id);
896 /* Get the channels from local list */
897 lchannels = silc_idlist_get_channels(server->local_list, channel_id,
900 /* Get the channels from global list */
901 gchannels = silc_idlist_get_channels(server->global_list, channel_id,
905 silc_server_command_list_send_reply(cmd, lchannels, lch_count,
906 gchannels, gch_count);
908 silc_free(lchannels);
909 silc_free(gchannels);
912 silc_server_command_free(cmd);
915 /* Server side of TOPIC command. Sets topic for channel and/or returns
916 current topic to client. */
918 SILC_SERVER_CMD_FUNC(topic)
920 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
921 SilcServer server = cmd->server;
922 SilcClientEntry client = silc_packet_get_context(cmd->sock);
924 SilcChannelEntry channel;
925 SilcChannelClientEntry chl;
928 SilcUInt32 argc, tmp_len;
929 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
931 if (client->data.conn_type != SILC_CONN_CLIENT || !client)
934 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_TOPIC, cmd, 1, 2);
936 argc = silc_argument_get_arg_num(cmd->args);
939 if (!silc_argument_get_decoded(cmd->args, 1, SILC_ARGUMENT_ID, &id, NULL)) {
940 silc_server_command_send_status_reply(cmd, SILC_COMMAND_TOPIC,
941 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
945 /* Check whether the channel exists */
946 channel = silc_idlist_find_channel_by_id(server->local_list,
947 SILC_ID_GET_ID(id), NULL);
949 channel = silc_idlist_find_channel_by_id(server->global_list,
950 SILC_ID_GET_ID(id), NULL);
952 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
953 silc_server_command_send_status_data(cmd, SILC_COMMAND_TOPIC,
954 SILC_STATUS_ERR_NO_SUCH_CHANNEL_ID,
962 tmp = silc_argument_get_arg_type(cmd->args, 2, &tmp_len);
964 silc_server_command_send_status_reply(cmd, SILC_COMMAND_TOPIC,
965 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
971 tmp[tmp_len - 1] = '\0';
974 if (!silc_utf8_valid(tmp, tmp_len)) {
975 silc_server_command_send_status_reply(cmd, SILC_COMMAND_TOPIC,
976 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
981 /* See whether the client is on channel and has rights to change topic */
982 if (!silc_server_client_on_channel(client, channel, &chl)) {
983 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
984 silc_server_command_send_status_data(cmd, SILC_COMMAND_TOPIC,
985 SILC_STATUS_ERR_NOT_ON_CHANNEL,
990 if (channel->mode & SILC_CHANNEL_MODE_TOPIC &&
991 !(chl->mode & SILC_CHANNEL_UMODE_CHANOP) &&
992 !(chl->mode & SILC_CHANNEL_UMODE_CHANFO)) {
993 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
994 silc_server_command_send_status_data(cmd, SILC_COMMAND_TOPIC,
995 SILC_STATUS_ERR_NO_CHANNEL_PRIV,
1000 if (!channel->topic || strcmp(channel->topic, tmp)) {
1001 /* Set the topic for channel */
1002 silc_free(channel->topic);
1003 channel->topic = strdup(tmp);
1005 /* Send TOPIC_SET notify type to the network */
1006 silc_server_send_notify_topic_set(server, SILC_PRIMARY_ROUTE(server),
1007 SILC_BROADCAST(server), channel,
1008 client->id, SILC_ID_CLIENT,
1011 /* Send notify about topic change to all clients on the channel */
1012 idp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
1013 silc_server_send_notify_to_channel(server, NULL, channel, FALSE, TRUE,
1014 SILC_NOTIFY_TYPE_TOPIC_SET, 2,
1015 idp->data, silc_buffer_len(idp),
1017 strlen(channel->topic));
1018 silc_buffer_free(idp);
1022 /* Send the topic to client as reply packet */
1023 idp = silc_id_payload_encode(SILC_ID_GET_ID(id), SILC_ID_CHANNEL);
1024 silc_server_send_command_reply(cmd->server, cmd->sock, SILC_COMMAND_TOPIC,
1025 SILC_STATUS_OK, 0, ident, 2,
1026 2, idp->data, silc_buffer_len(idp),
1029 strlen(channel->topic) : 0);
1030 silc_buffer_free(idp);
1033 silc_server_command_free(cmd);
1036 /* Server side of INVITE command. Invites some client to join some channel.
1037 This command is also used to manage the invite list of the channel. */
1039 SILC_SERVER_CMD_FUNC(invite)
1041 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
1042 SilcServer server = cmd->server;
1043 SilcPacketStream sock = cmd->sock, dest_sock;
1044 SilcChannelClientEntry chl;
1045 SilcClientEntry sender, dest;
1046 SilcChannelEntry channel;
1048 SilcIDListData idata;
1049 SilcArgumentPayload args;
1050 SilcHashTableList htl;
1051 SilcBuffer list, tmp2;
1052 SilcBufferStruct alist;
1053 unsigned char *tmp, *atype = NULL;
1054 SilcUInt32 len, type, len2;
1055 SilcUInt16 argc = 0, ident = silc_command_get_ident(cmd->payload);
1057 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_INVITE, cmd, 1, 4);
1059 /* Get Channel ID */
1060 if (!silc_argument_get_decoded(cmd->args, 1, SILC_ARGUMENT_ID, &id, NULL)) {
1061 silc_server_command_send_status_reply(cmd, SILC_COMMAND_INVITE,
1062 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
1066 /* Get the channel entry */
1067 channel = silc_idlist_find_channel_by_id(server->local_list,
1068 SILC_ID_GET_ID(id), NULL);
1070 channel = silc_idlist_find_channel_by_id(server->global_list,
1071 SILC_ID_GET_ID(id), NULL);
1073 tmp = silc_argument_get_arg_type(cmd->args, 1, &len);
1074 silc_server_command_send_status_data(cmd, SILC_COMMAND_INVITE,
1075 SILC_STATUS_ERR_NO_SUCH_CHANNEL_ID,
1081 /* Check whether the sender of this command is on the channel. */
1082 sender = silc_packet_get_context(sock);
1083 if (!sender || !silc_server_client_on_channel(sender, channel, &chl)) {
1084 tmp = silc_argument_get_arg_type(cmd->args, 1, &len);
1085 silc_server_command_send_status_data(cmd, SILC_COMMAND_INVITE,
1086 SILC_STATUS_ERR_NOT_ON_CHANNEL, 0,
1091 /* Check whether the channel is invite-only channel. If yes then the
1092 sender of this command must be at least channel operator. */
1093 if (channel->mode & SILC_CHANNEL_MODE_INVITE &&
1094 !(chl->mode & SILC_CHANNEL_UMODE_CHANOP) &&
1095 !(chl->mode & SILC_CHANNEL_UMODE_CHANFO)) {
1096 tmp = silc_argument_get_arg_type(cmd->args, 1, &len);
1097 silc_server_command_send_status_data(cmd, SILC_COMMAND_INVITE,
1098 SILC_STATUS_ERR_NO_CHANNEL_PRIV,
1103 /* Get destination client ID */
1104 if (silc_argument_get_decoded(cmd->args, 2, SILC_ARGUMENT_ID, &id2, NULL)) {
1107 /* Get the client entry */
1108 dest = silc_server_query_client(server, SILC_ID_GET_ID(id2),
1111 if (server->server_type != SILC_SERVER || !resolve || cmd->pending) {
1112 tmp = silc_argument_get_arg_type(cmd->args, 2, &len);
1113 silc_server_command_send_status_data(
1114 cmd, SILC_COMMAND_INVITE,
1115 SILC_STATUS_ERR_NO_SUCH_CLIENT_ID, 0,
1120 /* The client info is being resolved. Reprocess this packet after
1121 receiving the reply to the query. */
1122 silc_server_command_pending(server, SILC_COMMAND_WHOIS,
1124 silc_server_command_invite,
1125 silc_server_command_dup(cmd));
1126 cmd->pending = TRUE;
1130 /* Check whether the requested client is already on the channel. */
1131 if (silc_server_client_on_channel(dest, channel, NULL)) {
1132 tmp = silc_argument_get_arg_type(cmd->args, 2, &len);
1133 atype = silc_argument_get_arg_type(cmd->args, 1, &len2);
1134 silc_server_command_send_status_data2(cmd, SILC_COMMAND_INVITE,
1135 SILC_STATUS_ERR_USER_ON_CHANNEL,
1141 /* Get route to the client */
1142 dest_sock = silc_server_get_client_route(server, NULL, 0,
1143 SILC_ID_GET_ID(id2),
1146 tmp = silc_argument_get_arg_type(cmd->args, 2, &len);
1147 silc_server_command_send_status_data(cmd, SILC_COMMAND_INVITE,
1148 SILC_STATUS_ERR_NO_SUCH_CLIENT_ID,
1153 /* Add the client to the invite list */
1155 /* Allocate hash table for invite list if it doesn't exist yet */
1156 if (!channel->invite_list)
1157 channel->invite_list =
1158 silc_hash_table_alloc(0, silc_hash_ptr,
1160 silc_server_inviteban_destruct, channel, TRUE);
1162 /* Check if the ID is in the list already */
1163 tmp = silc_argument_get_arg_type(cmd->args, 2, &len);
1164 silc_hash_table_list(channel->invite_list, &htl);
1165 while (silc_hash_table_get(&htl, (void *)&type, (void *)&tmp2)) {
1166 if (type == 3 && !memcmp(tmp2->data, tmp, len)) {
1171 silc_hash_table_list_reset(&htl);
1173 /* Add new Client ID to invite list */
1175 list = silc_buffer_alloc_size(len);
1176 silc_buffer_put(list, tmp, len);
1177 silc_hash_table_add(channel->invite_list, (void *)3, list);
1180 if (!(dest->mode & SILC_UMODE_BLOCK_INVITE)) {
1181 /* Send notify to the client that is invited to the channel */
1182 SilcBuffer idp, idp2;
1183 idp = silc_id_payload_encode(SILC_ID_GET_ID(id), SILC_ID_CHANNEL);
1184 idp2 = silc_id_payload_encode(sender->id, SILC_ID_CLIENT);
1185 silc_server_send_notify_dest(server, dest_sock, FALSE,
1186 SILC_ID_GET_ID(id2), SILC_ID_CLIENT,
1187 SILC_NOTIFY_TYPE_INVITE, 3,
1188 idp->data, silc_buffer_len(idp),
1189 channel->channel_name,
1190 strlen(channel->channel_name),
1191 idp2->data, silc_buffer_len(idp2));
1192 silc_buffer_free(idp);
1193 silc_buffer_free(idp2);
1197 /* Get the invite information */
1198 tmp = silc_argument_get_arg_type(cmd->args, 4, &len2);
1199 if (tmp && len2 > 2) {
1200 /* Parse the arguments to see they are constructed correctly */
1201 SILC_GET16_MSB(argc, tmp);
1202 args = silc_argument_payload_parse(tmp + 2, len2 - 2, argc);
1204 silc_server_command_send_status_reply(cmd, SILC_COMMAND_INVITE,
1205 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
1210 /* Get the type of action */
1211 atype = silc_argument_get_arg_type(cmd->args, 3, &len);
1212 if (atype && len == 1) {
1213 if (atype[0] == 0x00) {
1214 /* Allocate hash table for invite list if it doesn't exist yet */
1215 if (!channel->invite_list)
1216 channel->invite_list =
1217 silc_hash_table_alloc(0, silc_hash_ptr,
1219 silc_server_inviteban_destruct, channel,
1222 /* Check for resource limit */
1223 if (silc_hash_table_count(channel->invite_list) > 64) {
1224 silc_server_command_send_status_reply(cmd, SILC_COMMAND_INVITE,
1225 SILC_STATUS_ERR_RESOURCE_LIMIT,
1231 /* Now add or delete the information. */
1232 if (!silc_server_inviteban_process(server, channel->invite_list,
1233 (SilcUInt8)atype[0], args)) {
1234 silc_server_command_send_status_reply(
1235 cmd, SILC_COMMAND_INVITE,
1236 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
1241 silc_argument_payload_free(args);
1244 /* Encode invite list */
1246 if (channel->invite_list && silc_hash_table_count(channel->invite_list)) {
1247 list = silc_buffer_alloc_size(2);
1248 silc_buffer_format(list,
1249 SILC_STR_UI_SHORT(silc_hash_table_count(
1250 channel->invite_list)),
1252 silc_hash_table_list(channel->invite_list, &htl);
1253 while (silc_hash_table_get(&htl, (void *)&type, (void *)&tmp2))
1254 list = silc_argument_payload_encode_one(list, tmp2->data,
1255 silc_buffer_len(tmp2), type);
1256 silc_hash_table_list_reset(&htl);
1259 /* The notify is sent to local servers (not clients), and to network. */
1260 if (atype && tmp && len2) {
1261 silc_buffer_set(&alist, tmp, len2);
1263 /* Send to local servers if we are router */
1264 if (server->server_type == SILC_ROUTER) {
1265 SilcBuffer idp, idp2;
1266 idp = silc_id_payload_encode(SILC_ID_GET_ID(id), SILC_ID_CHANNEL);
1267 idp2 = silc_id_payload_encode(sender->id, SILC_ID_CLIENT);
1268 silc_server_send_notify_to_channel(server, NULL, channel, FALSE, FALSE,
1269 SILC_NOTIFY_TYPE_INVITE, 5,
1270 idp->data, silc_buffer_len(idp),
1271 channel->channel_name,
1272 strlen(channel->channel_name),
1273 idp2->data, silc_buffer_len(idp2),
1275 tmp ? alist.data : NULL,
1276 tmp ? silc_buffer_len(&alist) : 0);
1277 silc_buffer_free(idp);
1278 silc_buffer_free(idp2);
1281 /* Send to network */
1282 silc_server_send_notify_invite(server, SILC_PRIMARY_ROUTE(server),
1283 SILC_BROADCAST(server), channel,
1285 tmp ? &alist : NULL);
1288 /* Send invite list back only if the list was modified, or no arguments
1291 argc = silc_argument_get_arg_num(cmd->args);
1294 if (silc_argument_get_arg_type(cmd->args, 3, &len))
1297 /* Send command reply */
1298 tmp = silc_argument_get_arg_type(cmd->args, 1, &len);
1299 silc_server_send_command_reply(server, cmd->sock, SILC_COMMAND_INVITE,
1300 SILC_STATUS_OK, 0, ident, 2,
1304 type && list ? silc_buffer_len(list) : 0);
1305 silc_buffer_free(list);
1308 silc_server_command_free(cmd);
1312 SilcPacketStream sock;
1316 /* Quits connection to client. This gets called if client won't
1317 close the connection even when it has issued QUIT command. */
1319 SILC_TASK_CALLBACK(silc_server_command_quit_cb)
1321 SilcServer server = app_context;
1322 QuitInternal q = (QuitInternal)context;
1323 SilcClientEntry client = silc_packet_get_context(q->sock);
1326 /* Free all client specific data, such as client entry and entires
1327 on channels this client may be on. */
1328 silc_server_free_client_data(server, q->sock, client,
1330 silc_packet_set_context(q->sock, NULL);
1333 silc_packet_stream_unref(q->sock);
1334 silc_free(q->signoff);
1338 /* Quits SILC session. This is the normal way to disconnect client. */
1340 SILC_SERVER_CMD_FUNC(quit)
1342 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
1343 SilcServer server = cmd->server;
1344 SilcPacketStream sock = cmd->sock;
1345 SilcClientEntry client = silc_packet_get_context(sock);
1347 unsigned char *tmp = NULL;
1350 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_QUIT, cmd, 0, 1);
1352 if (client->data.conn_type != SILC_CONN_CLIENT)
1356 tmp = silc_argument_get_arg_type(cmd->args, 1, &len);
1360 q = silc_calloc(1, sizeof(*q));
1362 q->signoff = tmp ? strdup(tmp) : NULL;
1363 silc_packet_stream_ref(q->sock);
1365 /* We quit the connection with little timeout */
1366 silc_schedule_task_add_timeout(server->schedule,
1367 silc_server_command_quit_cb, (void *)q,
1371 silc_server_command_free(cmd);
1374 /* Server side of command KILL. This command is used by router operator
1375 to remove an client from the SILC Network temporarily. */
1377 SILC_SERVER_CMD_FUNC(kill)
1379 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
1380 SilcServer server = cmd->server;
1381 SilcClientEntry client = silc_packet_get_context(cmd->sock);
1382 SilcClientEntry remote_client;
1384 unsigned char *tmp, *comment, *auth;
1385 SilcUInt32 tmp_len, tmp_len2, auth_len;
1387 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_KILL, cmd, 1, 3);
1389 if (client->data.conn_type != SILC_CONN_CLIENT || !client)
1392 /* Get authentication payload if present */
1393 auth = silc_argument_get_arg_type(cmd->args, 3, &auth_len);
1396 /* Router operator killing */
1398 /* KILL command works only on router */
1399 if (server->server_type != SILC_ROUTER) {
1400 silc_server_command_send_status_reply(cmd, SILC_COMMAND_KILL,
1401 SILC_STATUS_ERR_NO_ROUTER_PRIV, 0);
1405 /* Check whether client has the permissions. */
1406 if (!(client->mode & SILC_UMODE_ROUTER_OPERATOR)) {
1407 silc_server_command_send_status_reply(cmd, SILC_COMMAND_KILL,
1408 SILC_STATUS_ERR_NO_ROUTER_PRIV, 0);
1413 /* Get the client ID */
1414 if (!silc_argument_get_decoded(cmd->args, 1, SILC_ARGUMENT_ID, &id, NULL)) {
1415 silc_server_command_send_status_reply(cmd, SILC_COMMAND_KILL,
1416 SILC_STATUS_ERR_NO_CLIENT_ID, 0);
1420 /* Get the client entry */
1421 remote_client = silc_idlist_find_client_by_id(server->local_list,
1424 if (!remote_client) {
1425 remote_client = silc_idlist_find_client_by_id(server->global_list,
1428 if (!remote_client) {
1429 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
1430 silc_server_command_send_status_data(cmd, SILC_COMMAND_KILL,
1431 SILC_STATUS_ERR_NO_SUCH_CLIENT_ID,
1432 0, 2, tmp, tmp_len);
1438 comment = silc_argument_get_arg_type(cmd->args, 2, &tmp_len2);
1439 if (comment && tmp_len2 > 128) {
1441 comment[127] = '\0';
1444 /* If authentication data is provided then verify that killing is
1446 if (auth && auth_len) {
1447 SilcPacketStream sock;
1449 if (!SILC_IS_LOCAL(remote_client) || !remote_client->data.public_key) {
1450 silc_server_command_send_status_reply(cmd, SILC_COMMAND_KILL,
1451 SILC_STATUS_ERR_OPERATION_ALLOWED,
1456 /* Verify the signature */
1457 if (!silc_auth_verify_data(auth, auth_len, SILC_AUTH_PUBLIC_KEY,
1458 remote_client->data.public_key, 0,
1459 server->sha1hash, remote_client->id,
1461 silc_server_command_send_status_reply(cmd, SILC_COMMAND_KILL,
1462 SILC_STATUS_ERR_AUTH_FAILED, 0);
1466 /* Send reply to the sender */
1467 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
1468 silc_server_command_send_status_data(cmd, SILC_COMMAND_KILL,
1472 /* Do normal signoff for the destination client */
1473 sock = remote_client->connection;
1474 silc_server_remove_from_channels(server, NULL, remote_client,
1475 TRUE, (char *)"Killed", TRUE, TRUE);
1476 silc_server_free_client_data(server, NULL, remote_client, TRUE,
1478 (unsigned char *)"Killed");
1480 silc_server_close_connection(server, sock);
1482 /* Router operator killing */
1484 /* Send reply to the sender */
1485 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
1486 silc_server_command_send_status_data(cmd, SILC_COMMAND_KILL,
1490 /* Check if anyone is watching this nickname */
1491 if (server->server_type == SILC_ROUTER)
1492 silc_server_check_watcher_list(server, client, NULL,
1493 SILC_NOTIFY_TYPE_KILLED);
1495 /* Now do the killing */
1496 silc_server_kill_client(server, remote_client, comment, client->id,
1501 silc_server_command_free(cmd);
1504 /* Server side of command INFO. This sends information about us to
1505 the client. If client requested specific server we will send the
1506 command to that server. */
1508 SILC_SERVER_CMD_FUNC(info)
1510 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
1511 SilcServer server = cmd->server;
1515 char *dest_server = NULL, *server_info = NULL, *server_name;
1516 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
1517 SilcServerEntry entry = NULL;
1520 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_INFO, cmd, 0, 2);
1522 /* Get server name */
1523 dest_server = silc_argument_get_arg_type(cmd->args, 1, NULL);
1525 /* Check server name. */
1526 dest_server = silc_identifier_check(dest_server, strlen(dest_server),
1527 SILC_STRING_UTF8, 256, &tmp_len);
1529 silc_server_command_send_status_reply(cmd, SILC_COMMAND_INFO,
1530 SILC_STATUS_ERR_BAD_SERVER, 0);
1536 if (silc_argument_get_decoded(cmd->args, 2, SILC_ARGUMENT_ID, &id, NULL)) {
1537 /* Check whether we have this server cached */
1538 entry = silc_idlist_find_server_by_id(server->local_list,
1539 SILC_ID_GET_ID(id), TRUE, NULL);
1541 entry = silc_idlist_find_server_by_id(server->global_list,
1542 SILC_ID_GET_ID(id), TRUE, NULL);
1543 if (!entry && server->server_type != SILC_SERVER) {
1544 tmp = silc_argument_get_arg_type(cmd->args, 2, &tmp_len);
1545 silc_server_command_send_status_data(cmd, SILC_COMMAND_INFO,
1546 SILC_STATUS_ERR_NO_SUCH_SERVER_ID,
1547 0, 2, tmp, tmp_len);
1553 if ((!dest_server && !entry) || (entry && entry == server->id_entry) ||
1554 (dest_server && !cmd->pending &&
1555 !memcmp(dest_server, server->server_name, strlen(dest_server)))) {
1556 /* Send our reply */
1557 char info_string[256];
1559 memset(info_string, 0, sizeof(info_string));
1560 snprintf(info_string, sizeof(info_string),
1561 "location: %s server: %s admin: %s <%s>",
1562 server->config->server_info->location,
1563 server->config->server_info->server_type,
1564 server->config->server_info->admin,
1565 server->config->server_info->email);
1567 server_info = info_string;
1568 entry = server->id_entry;
1570 /* Check whether we have this server cached */
1571 if (!entry && dest_server) {
1572 entry = silc_idlist_find_server_by_name(server->global_list,
1573 dest_server, TRUE, NULL);
1575 entry = silc_idlist_find_server_by_name(server->local_list,
1576 dest_server, TRUE, NULL);
1580 if (!cmd->pending &&
1581 server->server_type != SILC_SERVER && entry && !entry->server_info) {
1582 /* Send to the server */
1584 SilcUInt16 old_ident;
1587 cmd->server->stat.commands_sent++;
1589 old_ident = silc_command_get_ident(cmd->payload);
1590 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
1591 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
1593 silc_server_packet_send(server, entry->connection,
1594 SILC_PACKET_COMMAND, cmd->packet->flags,
1595 tmpbuf->data, silc_buffer_len(tmpbuf));
1597 /* Reprocess this packet after received reply from router */
1598 silc_server_command_pending(server, SILC_COMMAND_INFO,
1599 silc_command_get_ident(cmd->payload),
1600 silc_server_command_info,
1601 silc_server_command_dup(cmd));
1602 cmd->pending = TRUE;
1603 silc_command_set_ident(cmd->payload, old_ident);
1604 silc_buffer_free(tmpbuf);
1608 if (!entry && !cmd->pending && !server->standalone) {
1609 /* Send to the primary router */
1611 SilcUInt16 old_ident;
1614 cmd->server->stat.commands_sent++;
1616 old_ident = silc_command_get_ident(cmd->payload);
1617 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
1618 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
1620 silc_server_packet_send(server, SILC_PRIMARY_ROUTE(server),
1621 SILC_PACKET_COMMAND, cmd->packet->flags,
1622 tmpbuf->data, silc_buffer_len(tmpbuf));
1624 /* Reprocess this packet after received reply from router */
1625 silc_server_command_pending(server, SILC_COMMAND_INFO,
1626 silc_command_get_ident(cmd->payload),
1627 silc_server_command_info,
1628 silc_server_command_dup(cmd));
1629 cmd->pending = TRUE;
1630 silc_command_set_ident(cmd->payload, old_ident);
1631 silc_buffer_free(tmpbuf);
1638 silc_free(dest_server);
1639 dest_server = silc_argument_get_arg_type(cmd->args, 1, NULL);
1640 silc_server_command_send_status_data(cmd, SILC_COMMAND_INFO,
1641 SILC_STATUS_ERR_NO_SUCH_SERVER, 0,
1643 strlen(dest_server));
1649 idp = silc_id_payload_encode(entry->id, SILC_ID_SERVER);
1651 server_info = entry->server_info;
1652 server_name = entry->server_name;
1654 /* Send the reply */
1655 silc_server_send_command_reply(server, cmd->sock, SILC_COMMAND_INFO,
1656 SILC_STATUS_OK, 0, ident, 3,
1657 2, idp->data, silc_buffer_len(idp),
1659 strlen(server_name),
1662 strlen(server_info) : 0);
1663 silc_buffer_free(idp);
1666 silc_free(dest_server);
1667 silc_server_command_free(cmd);
1670 /* Server side of command PING. This just replies to the ping. */
1672 SILC_SERVER_CMD_FUNC(ping)
1674 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
1675 SilcServer server = cmd->server;
1680 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_PING, cmd, 1, 1);
1683 if (!silc_argument_get_decoded(cmd->args, 1, SILC_ARGUMENT_ID, &id, NULL)) {
1684 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PING,
1685 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
1690 if (SILC_ID_SERVER_COMPARE(SILC_ID_GET_ID(id), server->id)) {
1691 /* Send our reply */
1692 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PING,
1695 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
1696 silc_server_command_send_status_data(cmd, SILC_COMMAND_PING,
1697 SILC_STATUS_ERR_NO_SUCH_SERVER_ID, 0,
1703 silc_server_command_free(cmd);
1706 /* Server side of command STATS. */
1708 SILC_SERVER_CMD_FUNC(stats)
1710 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
1711 SilcServer server = cmd->server;
1715 SilcBuffer packet, stats;
1716 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
1719 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_STATS, cmd, 1, 1);
1722 if (!silc_argument_get_decoded(cmd->args, 1, SILC_ARGUMENT_ID, &id, NULL)) {
1723 silc_server_command_send_status_reply(cmd, SILC_COMMAND_STATS,
1724 SILC_STATUS_ERR_NO_SERVER_ID, 0);
1728 SILC_LOG_DEBUG(("id %s", silc_id_render(SILC_ID_GET_ID(id),
1731 /* The ID must be ours */
1732 if (!SILC_ID_SERVER_COMPARE(server->id, SILC_ID_GET_ID(id))) {
1733 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
1734 silc_server_command_send_status_data(cmd, SILC_COMMAND_STATS,
1735 SILC_STATUS_ERR_NO_SUCH_SERVER_ID, 0,
1740 /* If we are router then just send everything we got. If we are normal
1741 server then we'll send this to our router to get all the latest
1742 statistical information. */
1743 if (!cmd->pending && server->server_type != SILC_ROUTER &&
1744 !server->standalone) {
1748 cmd->server->stat.commands_sent++;
1750 /* Send request to our router */
1751 idp = silc_id_payload_encode(server->router->id,
1753 packet = silc_command_payload_encode_va(SILC_COMMAND_STATS,
1754 ++server->cmd_ident, 1,
1756 silc_buffer_len(idp));
1757 silc_server_packet_send(server, SILC_PRIMARY_ROUTE(server),
1758 SILC_PACKET_COMMAND, 0, packet->data,
1759 silc_buffer_len(packet));
1761 /* Reprocess this packet after received reply from router */
1762 silc_server_command_pending(server, SILC_COMMAND_STATS,
1764 silc_server_command_stats,
1765 silc_server_command_dup(cmd));
1766 cmd->pending = TRUE;
1767 silc_buffer_free(packet);
1768 silc_buffer_free(idp);
1772 /* Send our reply to sender */
1773 uptime = time(NULL) - server->starttime;
1775 stats = silc_buffer_alloc_size(60);
1776 silc_buffer_format(stats,
1777 SILC_STR_UI_INT(server->starttime),
1778 SILC_STR_UI_INT(uptime),
1779 SILC_STR_UI_INT(server->stat.my_clients),
1780 SILC_STR_UI_INT(server->stat.my_channels),
1781 SILC_STR_UI_INT(server->stat.my_server_ops),
1782 SILC_STR_UI_INT(server->stat.my_router_ops),
1783 SILC_STR_UI_INT(server->stat.cell_clients),
1784 SILC_STR_UI_INT(server->stat.cell_channels),
1785 SILC_STR_UI_INT(server->stat.cell_servers),
1786 SILC_STR_UI_INT(server->stat.clients),
1787 SILC_STR_UI_INT(server->stat.channels),
1788 SILC_STR_UI_INT(server->stat.servers),
1789 SILC_STR_UI_INT(server->stat.routers),
1790 SILC_STR_UI_INT(server->stat.server_ops),
1791 SILC_STR_UI_INT(server->stat.router_ops),
1794 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
1795 silc_server_send_command_reply(server, cmd->sock, SILC_COMMAND_STATS,
1796 SILC_STATUS_OK, 0, ident, 2,
1798 3, stats->data, silc_buffer_len(stats));
1799 silc_buffer_free(stats);
1802 silc_server_command_free(cmd);
1805 /* Internal routine to join channel. The channel sent to this function
1806 has been either created or resolved from ID lists. This joins the sent
1807 client to the channel. */
1809 static void silc_server_command_join_channel(SilcServer server,
1810 SilcServerCommandContext cmd,
1811 SilcChannelEntry channel,
1812 SilcClientID *client_id,
1814 SilcBool create_key,
1816 const unsigned char *auth,
1817 SilcUInt32 auth_len,
1818 const unsigned char *cauth,
1819 SilcUInt32 cauth_len)
1821 SilcPacketStream sock = cmd->sock;
1822 SilcIDListData idata = silc_packet_get_context(sock);
1824 SilcUInt32 tmp_len, user_count;
1825 unsigned char *passphrase = NULL, mode[4], tmp2[4], tmp3[4], ulimit[4];
1826 SilcClientEntry client;
1827 SilcChannelClientEntry chl;
1828 SilcBuffer reply, chidp, clidp, keyp = NULL;
1829 SilcBuffer user_list, mode_list, invite_list, ban_list;
1830 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
1831 char check[512], check2[512];
1832 SilcBool founder = FALSE;
1834 SilcBuffer fkey = NULL, chpklist = NULL;
1835 const char *cipher, *hostname, *ip;
1837 SILC_LOG_DEBUG(("Joining client to channel"));
1842 silc_socket_stream_get_info(silc_packet_stream_get_stream(sock),
1843 NULL, &hostname, &ip, NULL);
1845 /* Get the client entry */
1846 if (idata->conn_type == SILC_CONN_CLIENT) {
1847 client = (SilcClientEntry)idata;
1851 client = silc_server_query_client(server, client_id, FALSE,
1854 if (!resolve || cmd->pending) {
1855 tmp = silc_argument_get_arg_type(cmd->args, 2, &tmp_len);
1856 silc_server_command_send_status_data(
1857 cmd, SILC_COMMAND_JOIN,
1858 SILC_STATUS_ERR_NO_SUCH_CLIENT_ID, 0,
1863 /* The client info is being resolved. Reprocess this packet after
1864 receiving the reply to the query. */
1865 silc_server_command_pending(server, SILC_COMMAND_WHOIS,
1867 silc_server_command_join,
1868 silc_server_command_dup(cmd));
1869 cmd->pending = TRUE;
1873 if (!client->data.public_key &&
1874 (auth || cauth || channel->ban_list ||
1875 (channel->mode & SILC_CHANNEL_MODE_INVITE))) {
1876 if (cmd->pending == 2)
1879 /* We must retrieve the client's public key by sending
1880 GETKEY command. Reprocess this packet after receiving the key */
1881 clidp = silc_id_payload_encode(client_id, SILC_ID_CLIENT);
1882 silc_server_send_command(server, cmd->sock,
1883 SILC_COMMAND_GETKEY, ++server->cmd_ident,
1884 1, 1, clidp->data, silc_buffer_len(clidp));
1885 silc_buffer_free(clidp);
1886 silc_server_command_pending(server, SILC_COMMAND_GETKEY,
1888 silc_server_command_join,
1889 silc_server_command_dup(cmd));
1894 cmd->pending = FALSE;
1898 * Check founder auth payload if provided. If client can gain founder
1899 * privileges it can override various conditions on joining the channel,
1900 * and can have directly the founder mode set on the channel.
1902 if (auth && auth_len && channel->mode & SILC_CHANNEL_MODE_FOUNDER_AUTH) {
1903 SilcIDListData idata = (SilcIDListData)client;
1904 SilcChannelClientEntry chl2;
1905 SilcHashTableList htl;
1907 if (channel->founder_key && idata->public_key &&
1908 silc_pkcs_public_key_compare(channel->founder_key,
1909 idata->public_key)) {
1910 /* Check whether the client is to become founder */
1911 if (silc_auth_verify_data(auth, auth_len, SILC_AUTH_PUBLIC_KEY,
1912 channel->founder_key, 0, server->sha1hash,
1913 client->id, SILC_ID_CLIENT)) {
1915 /* There cannot be anyone else as founder on the channel now. This
1916 client is definitely the founder due to this authentication */
1917 silc_hash_table_list(channel->user_list, &htl);
1918 while (silc_hash_table_get(&htl, NULL, (void *)&chl2))
1919 if (chl2->mode & SILC_CHANNEL_UMODE_CHANFO) {
1920 chl2->mode &= ~SILC_CHANNEL_UMODE_CHANFO;
1921 silc_server_force_cumode_change(server, NULL, channel, chl2,
1925 silc_hash_table_list_reset(&htl);
1927 umode = (SILC_CHANNEL_UMODE_CHANOP | SILC_CHANNEL_UMODE_CHANFO);
1934 * Check channel modes
1938 memset(check, 0, sizeof(check));
1939 memset(check2, 0, sizeof(check2));
1940 silc_strncat(check, sizeof(check),
1941 client->nickname, strlen(client->nickname));
1942 silc_strncat(check, sizeof(check), "!", 1);
1943 silc_strncat(check, sizeof(check),
1944 client->username, strlen(client->username));
1945 if (!strchr(client->username, '@')) {
1946 silc_strncat(check, sizeof(check), "@", 1);
1947 silc_strncat(check, sizeof(check),
1948 hostname, strlen(hostname));
1951 silc_strncat(check2, sizeof(check2),
1952 client->nickname, strlen(client->nickname));
1953 if (!strchr(client->nickname, '@')) {
1954 silc_strncat(check2, sizeof(check2), "@", 1);
1955 silc_strncat(check2, sizeof(check2),
1956 SILC_IS_LOCAL(client) ? server->server_name :
1957 client->router->server_name,
1958 SILC_IS_LOCAL(client) ? strlen(server->server_name) :
1959 strlen(client->router->server_name));
1961 silc_strncat(check2, sizeof(check2), "!", 1);
1962 silc_strncat(check2, sizeof(check2),
1963 client->username, strlen(client->username));
1964 if (!strchr(client->username, '@')) {
1965 silc_strncat(check2, sizeof(check2), "@", 1);
1966 silc_strncat(check2, sizeof(check2),
1967 hostname, strlen(hostname));
1970 /* Check invite list if channel is invite-only channel */
1971 if (channel->mode & SILC_CHANNEL_MODE_INVITE) {
1972 if (!channel->invite_list ||
1973 !silc_hash_table_count(channel->invite_list) ||
1974 (!silc_server_inviteban_match(server, channel->invite_list,
1976 !silc_server_inviteban_match(server, channel->invite_list,
1977 2, client->data.public_key) &&
1978 !silc_server_inviteban_match(server, channel->invite_list,
1979 1, client->nickname) &&
1980 !silc_server_inviteban_match(server, channel->invite_list,
1982 !silc_server_inviteban_match(server, channel->invite_list,
1984 chidp = silc_id_payload_encode(channel->id, SILC_ID_CHANNEL);
1985 silc_server_command_send_status_data(cmd, SILC_COMMAND_JOIN,
1986 SILC_STATUS_ERR_NOT_INVITED, 0,
1988 silc_buffer_len(chidp));
1989 silc_buffer_free(chidp);
1994 /* Check ban list if it exists. If the client's nickname, server,
1995 username and/or hostname is in the ban list the access to the
1996 channel is denied. */
1997 if (channel->ban_list && silc_hash_table_count(channel->ban_list)) {
1998 if (silc_server_inviteban_match(server, channel->ban_list,
2000 silc_server_inviteban_match(server, channel->ban_list,
2001 2, client->data.public_key) ||
2002 silc_server_inviteban_match(server, channel->ban_list,
2003 1, client->nickname) ||
2004 silc_server_inviteban_match(server, channel->ban_list,
2006 silc_server_inviteban_match(server, channel->ban_list,
2008 chidp = silc_id_payload_encode(channel->id, SILC_ID_CHANNEL);
2009 silc_server_command_send_status_data(
2010 cmd, SILC_COMMAND_JOIN,
2011 SILC_STATUS_ERR_BANNED_FROM_CHANNEL, 0,
2013 silc_buffer_len(chidp));
2014 silc_buffer_free(chidp);
2019 /* Check user count limit if set. */
2020 if (channel->mode & SILC_CHANNEL_MODE_ULIMIT) {
2021 if (silc_hash_table_count(channel->user_list) + 1 >
2022 channel->user_limit) {
2023 chidp = silc_id_payload_encode(channel->id, SILC_ID_CHANNEL);
2024 silc_server_command_send_status_data(cmd, SILC_COMMAND_JOIN,
2025 SILC_STATUS_ERR_CHANNEL_IS_FULL,
2027 silc_buffer_len(chidp));
2028 silc_buffer_free(chidp);
2034 /* Check the channel passphrase if set. */
2035 if (channel->mode & SILC_CHANNEL_MODE_PASSPHRASE) {
2036 /* Get passphrase */
2037 tmp = silc_argument_get_arg_type(cmd->args, 3, &tmp_len);
2039 passphrase = silc_memdup(tmp, tmp_len);
2041 if (!passphrase || !channel->passphrase ||
2042 strlen(channel->passphrase) != strlen(passphrase) ||
2043 memcmp(passphrase, channel->passphrase, strlen(channel->passphrase))) {
2044 chidp = silc_id_payload_encode(channel->id, SILC_ID_CHANNEL);
2045 silc_server_command_send_status_data(cmd, SILC_COMMAND_JOIN,
2046 SILC_STATUS_ERR_BAD_PASSWORD, 0,
2048 silc_buffer_len(chidp));
2049 silc_buffer_free(chidp);
2054 /* Verify channel authentication with channel public keys if set. */
2055 if (channel->mode & SILC_CHANNEL_MODE_CHANNEL_AUTH) {
2056 if (!silc_server_verify_channel_auth(server, channel, client->id,
2057 cauth, cauth_len)) {
2058 silc_server_command_send_status_reply(cmd, SILC_COMMAND_JOIN,
2059 SILC_STATUS_ERR_PERM_DENIED, 0);
2065 * Client is allowed to join to the channel. Make it happen.
2068 /* Check whether the client already is on the channel */
2069 if (silc_server_client_on_channel(client, channel, NULL)) {
2070 clidp = silc_id_payload_encode(client_id, SILC_ID_CLIENT);
2071 chidp = silc_id_payload_encode(channel->id, SILC_ID_CHANNEL);
2072 silc_server_command_send_status_data2(cmd, SILC_COMMAND_JOIN,
2073 SILC_STATUS_ERR_USER_ON_CHANNEL, 0,
2075 silc_buffer_len(clidp),
2077 silc_buffer_len(chidp));
2078 silc_buffer_free(clidp);
2079 silc_buffer_free(chidp);
2083 /* Generate new channel key as protocol dictates */
2085 if (!silc_server_create_channel_key(server, channel, 0))
2088 /* Send the channel key. This is broadcasted to the channel but is not
2089 sent to the client who is joining to the channel. */
2090 if (!(channel->mode & SILC_CHANNEL_MODE_PRIVKEY))
2091 silc_server_send_channel_key(server, NULL, channel,
2092 server->server_type == SILC_ROUTER ?
2093 FALSE : !server->standalone);
2096 /* Join the client to the channel by adding it to channel's user list.
2097 Add also the channel to client entry's channels list for fast cross-
2099 chl = silc_calloc(1, sizeof(*chl));
2101 chl->client = client;
2102 chl->channel = channel;
2103 silc_hash_table_add(channel->user_list, client, chl);
2104 silc_hash_table_add(client->channels, channel, chl);
2105 channel->user_count++;
2106 channel->disabled = FALSE;
2108 /* Get users on the channel */
2109 silc_server_get_users_on_channel(server, channel, &user_list, &mode_list,
2112 /* Encode Client ID Payload of the original client who wants to join */
2113 clidp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
2115 /* Encode command reply packet */
2116 chidp = silc_id_payload_encode(channel->id, SILC_ID_CHANNEL);
2117 SILC_PUT32_MSB(channel->mode, mode);
2118 SILC_PUT32_MSB(created, tmp2);
2119 SILC_PUT32_MSB(user_count, tmp3);
2120 if (channel->mode & SILC_CHANNEL_MODE_ULIMIT)
2121 SILC_PUT32_MSB(channel->user_limit, ulimit);
2123 if (!(channel->mode & SILC_CHANNEL_MODE_PRIVKEY)) {
2124 unsigned char cid[32];
2126 silc_id_id2str(channel->id, SILC_ID_CHANNEL, cid, sizeof(cid), &cid_len);
2127 cipher = silc_cipher_get_name(channel->send_key);
2128 keyp = silc_channel_key_payload_encode(cid_len, cid,
2129 strlen(cipher), cipher,
2130 channel->key_len / 8, channel->key);
2133 if (channel->founder_key)
2134 fkey = silc_public_key_payload_encode(channel->founder_key);
2136 /* Encode invite list */
2138 if (channel->invite_list && silc_hash_table_count(channel->invite_list)) {
2139 SilcHashTableList htl;
2141 invite_list = silc_buffer_alloc_size(2);
2142 silc_buffer_format(invite_list,
2143 SILC_STR_UI_SHORT(silc_hash_table_count(
2144 channel->invite_list)),
2147 silc_hash_table_list(channel->invite_list, &htl);
2148 while (silc_hash_table_get(&htl, (void *)&tmp_len, (void *)&reply))
2149 invite_list = silc_argument_payload_encode_one(invite_list,
2151 silc_buffer_len(reply), tmp_len);
2152 silc_hash_table_list_reset(&htl);
2155 /* Encode ban list */
2157 if (channel->ban_list && silc_hash_table_count(channel->ban_list)) {
2158 SilcHashTableList htl;
2160 ban_list = silc_buffer_alloc_size(2);
2161 silc_buffer_format(ban_list,
2162 SILC_STR_UI_SHORT(silc_hash_table_count(
2163 channel->ban_list)),
2166 silc_hash_table_list(channel->ban_list, &htl);
2167 while (silc_hash_table_get(&htl, (void *)&tmp_len, (void *)&reply))
2168 ban_list = silc_argument_payload_encode_one(ban_list,
2170 silc_buffer_len(reply), tmp_len);
2171 silc_hash_table_list_reset(&htl);
2174 if (channel->channel_pubkeys)
2175 chpklist = silc_server_get_channel_pk_list(server, channel, FALSE, FALSE);
2178 silc_command_reply_payload_encode_va(SILC_COMMAND_JOIN,
2179 SILC_STATUS_OK, 0, ident, 16,
2180 2, channel->channel_name,
2181 strlen(channel->channel_name),
2183 silc_buffer_len(chidp),
2185 silc_buffer_len(clidp),
2188 7, keyp ? keyp->data : NULL,
2189 keyp ? silc_buffer_len(keyp) : 0,
2190 8, ban_list ? ban_list->data : NULL,
2192 silc_buffer_len(ban_list): 0,
2193 9, invite_list ? invite_list->data :
2196 silc_buffer_len(invite_list) : 0,
2199 strlen(channel->topic) : 0,
2200 11, silc_hmac_get_name(channel->hmac),
2201 strlen(silc_hmac_get_name(channel->
2204 13, user_list->data,
2205 silc_buffer_len(user_list),
2206 14, mode_list->data,
2207 silc_buffer_len(mode_list),
2208 15, fkey ? fkey->data : NULL,
2209 fkey ? silc_buffer_len(fkey) : 0,
2210 16, chpklist ? chpklist->data : NULL,
2211 chpklist ? silc_buffer_len(chpklist) : 0,
2212 17, (channel->mode &
2213 SILC_CHANNEL_MODE_ULIMIT ?
2216 SILC_CHANNEL_MODE_ULIMIT ?
2217 sizeof(ulimit) : 0));
2219 /* Send command reply */
2220 silc_server_packet_send(server, sock, SILC_PACKET_COMMAND_REPLY, 0,
2221 reply->data, silc_buffer_len(reply));
2224 cmd->server->stat.commands_sent++;
2226 /* Send JOIN notify to locally connected clients on the channel. If
2227 we are normal server then router will send or have sent JOIN notify
2228 already. However since we've added the client already to our channel
2229 we'll ignore it (in packet_receive.c) so we must send it here. If
2230 we are router then this will send it to local clients and local
2232 SILC_LOG_DEBUG(("Send JOIN notify to channel"));
2233 silc_server_send_notify_to_channel(server, NULL, channel, FALSE, TRUE,
2234 SILC_NOTIFY_TYPE_JOIN, 2,
2235 clidp->data, silc_buffer_len(clidp),
2236 chidp->data, silc_buffer_len(chidp));
2238 /* Update statistics */
2239 server->stat.my_chanclients++;
2240 if (server->server_type == SILC_ROUTER) {
2241 server->stat.cell_chanclients++;
2242 server->stat.chanclients++;
2245 if (!cmd->pending) {
2246 /* Send JOIN notify packet to our primary router */
2247 silc_server_send_notify_join(server, SILC_PRIMARY_ROUTE(server),
2248 SILC_BROADCAST(server), channel, client->id);
2251 /* Distribute the channel key to all backup routers. */
2252 silc_server_backup_send(server, NULL, SILC_PACKET_CHANNEL_KEY, 0,
2253 keyp->data, silc_buffer_len(keyp), FALSE, TRUE);
2255 /* If client became founder by providing correct founder auth data
2256 notify the mode change to the channel. */
2258 SILC_PUT32_MSB(chl->mode, mode);
2259 SILC_LOG_DEBUG(("Send CUMODE_CHANGE notify to channel"));
2260 silc_server_send_notify_to_channel(server, NULL, channel, FALSE, TRUE,
2261 SILC_NOTIFY_TYPE_CUMODE_CHANGE, 4,
2263 silc_buffer_len(clidp),
2264 mode, 4, clidp->data,
2265 silc_buffer_len(clidp),
2266 fkey ? fkey->data : NULL,
2267 fkey ? silc_buffer_len(fkey) : 0);
2271 /* Set CUMODE notify type to network */
2273 silc_server_send_notify_cumode(server, SILC_PRIMARY_ROUTE(server),
2274 SILC_BROADCAST(server), channel,
2275 chl->mode, client->id, SILC_ID_CLIENT,
2276 client->id, channel->founder_key);
2278 silc_buffer_free(reply);
2279 silc_buffer_free(clidp);
2280 silc_buffer_free(chidp);
2281 silc_buffer_free(keyp);
2282 silc_buffer_free(user_list);
2283 silc_buffer_free(mode_list);
2284 silc_buffer_free(fkey);
2285 silc_buffer_free(chpklist);
2286 silc_buffer_free(invite_list);
2287 silc_buffer_free(ban_list);
2291 memset(passphrase, 0, strlen(passphrase));
2292 silc_free(passphrase);
2295 /* Server side of command JOIN. Joins client into requested channel. If
2296 the channel does not exist it will be created. */
2298 SILC_SERVER_CMD_FUNC(join)
2300 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
2301 SilcServer server = cmd->server;
2302 SilcIDListData idata = silc_packet_get_context(cmd->sock);
2303 unsigned char *auth, *cauth;
2304 SilcUInt32 tmp_len, auth_len, cauth_len;
2305 char *tmp, *channel_name, *channel_namec = NULL, *cipher, *hmac;
2306 SilcChannelEntry channel;
2307 SilcUInt32 umode = 0;
2308 SilcBool created = FALSE, create_key = TRUE;
2311 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_JOIN, cmd, 2, 7);
2313 /* Get channel name */
2314 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
2316 silc_server_command_send_status_reply(cmd, SILC_COMMAND_JOIN,
2317 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
2322 /* Truncate over long channel names */
2323 if (tmp_len > 256) {
2324 tmp[tmp_len - 1] = '\0';
2329 /* Check for valid channel name. This is cached, the original is saved
2330 in the channel context. */
2331 channel_namec = silc_channel_name_check(tmp, tmp_len, SILC_STRING_UTF8, 256,
2333 if (!channel_namec) {
2334 silc_server_command_send_status_reply(cmd, SILC_COMMAND_JOIN,
2335 SILC_STATUS_ERR_BAD_CHANNEL, 0);
2339 /* Get Client ID of the client who is joining to the channel */
2340 if (!silc_argument_get_decoded(cmd->args, 2, SILC_ARGUMENT_ID, &id, NULL)) {
2341 silc_server_command_send_status_reply(cmd, SILC_COMMAND_JOIN,
2342 SILC_STATUS_ERR_NO_CLIENT_ID,
2346 tmp = silc_argument_get_arg_type(cmd->args, 2, &tmp_len);
2348 /* Get cipher, hmac name and auth payload */
2349 cipher = silc_argument_get_arg_type(cmd->args, 4, NULL);
2350 hmac = silc_argument_get_arg_type(cmd->args, 5, NULL);
2351 auth = silc_argument_get_arg_type(cmd->args, 6, &auth_len);
2352 cauth = silc_argument_get_arg_type(cmd->args, 7, &cauth_len);
2354 /* See if the channel exists */
2355 channel = silc_idlist_find_channel_by_name(server->local_list,
2356 channel_namec, NULL);
2358 if (idata->conn_type == SILC_CONN_CLIENT) {
2359 SilcClientEntry entry = (SilcClientEntry)idata;
2361 silc_server_command_send_status_reply(cmd, SILC_COMMAND_JOIN,
2362 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
2367 #ifndef SILC_DIST_INPLACE
2368 /* Limit how many channels client can join */
2369 if (!cmd->pending && entry->channels &&
2370 silc_hash_table_count(entry->channels) >=
2371 server->config->param.chlimit) {
2372 silc_server_command_send_status_reply(cmd, SILC_COMMAND_JOIN,
2373 SILC_STATUS_ERR_RESOURCE_LIMIT,
2377 #endif /* SILC_DIST_INPLACE */
2380 (channel->disabled && server->server_type != SILC_ROUTER)) {
2381 /* Channel not found or not valid */
2383 /* If we are standalone server we don't have a router, we just create
2384 the channel by ourselves (unless it existed). */
2385 if (server->standalone) {
2387 channel = silc_server_create_new_channel(server, server->id, cipher,
2388 hmac, channel_name, TRUE);
2390 silc_server_command_send_status_data(
2391 cmd, SILC_COMMAND_JOIN,
2392 SILC_STATUS_ERR_UNKNOWN_ALGORITHM,
2393 0, 2, cipher, strlen(cipher));
2397 umode = (SILC_CHANNEL_UMODE_CHANOP | SILC_CHANNEL_UMODE_CHANFO);
2403 /* The channel does not exist on our server. If we are normal server
2404 we will send JOIN command to our router which will handle the
2405 joining procedure (either creates the channel if it doesn't exist
2406 or joins the client to it). */
2407 if (server->server_type != SILC_ROUTER) {
2409 SilcUInt16 old_ident;
2411 /* If this is pending command callback then we've resolved
2412 it and it didn't work, return since we've notified the
2413 client already in the command reply callback. */
2418 cmd->server->stat.commands_sent++;
2420 old_ident = silc_command_get_ident(cmd->payload);
2421 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
2422 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
2424 /* Send JOIN command to our router */
2425 silc_server_packet_send(server, SILC_PRIMARY_ROUTE(server),
2426 SILC_PACKET_COMMAND, cmd->packet->flags,
2427 tmpbuf->data, silc_buffer_len(tmpbuf));
2429 /* Reprocess this packet after received reply from router */
2430 silc_server_command_pending(server, SILC_COMMAND_JOIN,
2431 silc_command_get_ident(cmd->payload),
2432 silc_server_command_join,
2433 silc_server_command_dup(cmd));
2434 cmd->pending = TRUE;
2435 silc_command_set_ident(cmd->payload, old_ident);
2436 silc_buffer_free(tmpbuf);
2440 /* We are router and the channel does not seem exist so we will check
2441 our global list as well for the channel. */
2442 channel = silc_idlist_find_channel_by_name(server->global_list,
2443 channel_namec, NULL);
2445 /* Channel really does not exist, create it */
2446 channel = silc_server_create_new_channel(server, server->id, cipher,
2447 hmac, channel_name, TRUE);
2449 silc_server_command_send_status_data(
2450 cmd, SILC_COMMAND_JOIN,
2451 SILC_STATUS_ERR_UNKNOWN_ALGORITHM, 0,
2452 2, cipher, strlen(cipher));
2456 umode = (SILC_CHANNEL_UMODE_CHANOP | SILC_CHANNEL_UMODE_CHANFO);
2464 /* Channel not found */
2466 /* If the command came from router and we are normal server then
2467 something went wrong with the joining as the channel was not found.
2468 We can't do anything else but ignore this. */
2469 if (idata->conn_type == SILC_CONN_ROUTER ||
2470 server->server_type != SILC_ROUTER)
2473 /* We are router and the channel does not seem exist so we will check
2474 our global list as well for the channel. */
2475 channel = silc_idlist_find_channel_by_name(server->global_list,
2476 channel_namec, NULL);
2478 /* Channel really does not exist, create it */
2479 channel = silc_server_create_new_channel(server, server->id, cipher,
2480 hmac, channel_name, TRUE);
2482 silc_server_command_send_status_data(
2483 cmd, SILC_COMMAND_JOIN,
2484 SILC_STATUS_ERR_UNKNOWN_ALGORITHM, 0,
2485 2, cipher, strlen(cipher));
2489 umode = (SILC_CHANNEL_UMODE_CHANOP | SILC_CHANNEL_UMODE_CHANFO);
2496 /* Check whether the channel was created by our router */
2497 if (cmd->pending && context2) {
2498 SilcServerCommandReplyContext reply = context2;
2500 if (silc_command_get(reply->payload) == SILC_COMMAND_JOIN) {
2501 tmp = silc_argument_get_arg_type(reply->args, 6, NULL);
2502 SILC_GET32_MSB(created, tmp);
2503 if (silc_argument_get_arg_type(reply->args, 7, NULL))
2504 create_key = FALSE; /* Router returned the key already */
2506 if (silc_command_get_status(reply->payload, NULL, NULL) &&
2507 channel->mode & SILC_CHANNEL_MODE_PASSPHRASE) {
2508 /* Save channel passphrase, if user provided it successfully */
2511 pa = silc_argument_get_arg_type(cmd->args, 3, &pa_len);
2513 silc_free(channel->passphrase);
2514 channel->passphrase = silc_memdup(pa, pa_len);
2519 if (silc_command_get(reply->payload) == SILC_COMMAND_WHOIS &&
2520 !channel->disabled && !silc_hash_table_count(channel->user_list))
2524 /* If the channel does not have global users and is also empty the client
2525 will be the channel founder and operator. */
2526 if (!channel->disabled &&
2527 !channel->global_users && !silc_hash_table_count(channel->user_list))
2528 umode = (SILC_CHANNEL_UMODE_CHANOP | SILC_CHANNEL_UMODE_CHANFO);
2530 /* Join to the channel */
2531 silc_server_command_join_channel(server, cmd, channel, SILC_ID_GET_ID(id),
2532 created, create_key, umode,
2533 auth, auth_len, cauth, cauth_len);
2536 silc_free(channel_namec);
2537 silc_server_command_free(cmd);
2540 /* Server side of command MOTD. Sends server's current "message of the
2541 day" to the client. */
2543 SILC_SERVER_CMD_FUNC(motd)
2545 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
2546 SilcServer server = cmd->server;
2548 char *motd, *dest_server = NULL;
2549 SilcUInt32 motd_len;
2550 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
2552 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_MOTD, cmd, 1, 1);
2554 /* Get server name */
2555 dest_server = silc_argument_get_arg_type(cmd->args, 1, NULL);
2557 silc_server_command_send_status_reply(cmd, SILC_COMMAND_MOTD,
2558 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
2563 /* Check server name */
2564 dest_server = silc_identifier_check(dest_server, strlen(dest_server),
2565 SILC_STRING_UTF8, 256, NULL);
2567 silc_server_command_send_status_reply(cmd, SILC_COMMAND_MOTD,
2568 SILC_STATUS_ERR_BAD_SERVER,
2573 if (!memcmp(dest_server, server->server_name, strlen(dest_server))) {
2576 idp = silc_id_payload_encode(server->id_entry->id, SILC_ID_SERVER);
2578 if (server->config && server->config->server_info &&
2579 server->config->server_info->motd_file) {
2581 motd = silc_file_readfile(server->config->server_info->motd_file,
2585 silc_server_send_command_reply(server, cmd->sock, SILC_COMMAND_MOTD,
2586 SILC_STATUS_OK, 0, ident, 1,
2587 2, idp->data, silc_buffer_len(idp));
2592 silc_server_send_command_reply(server, cmd->sock, SILC_COMMAND_MOTD,
2593 SILC_STATUS_OK, 0, ident, 2,
2594 2, idp->data, silc_buffer_len(idp),
2598 silc_server_send_command_reply(server, cmd->sock, SILC_COMMAND_MOTD,
2599 SILC_STATUS_OK, 0, ident, 1,
2600 2, idp->data, silc_buffer_len(idp));
2602 silc_buffer_free(idp);
2604 SilcServerEntry entry;
2606 /* Check whether we have this server cached */
2607 entry = silc_idlist_find_server_by_name(server->global_list,
2608 dest_server, TRUE, NULL);
2610 entry = silc_idlist_find_server_by_name(server->local_list,
2611 dest_server, TRUE, NULL);
2614 if (server->server_type != SILC_SERVER && !cmd->pending &&
2615 entry && !entry->motd) {
2616 /* Send to the server */
2618 SilcUInt16 old_ident;
2621 cmd->server->stat.commands_sent++;
2623 old_ident = silc_command_get_ident(cmd->payload);
2624 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
2625 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
2627 silc_server_packet_send(server, entry->connection,
2628 SILC_PACKET_COMMAND, cmd->packet->flags,
2629 tmpbuf->data, silc_buffer_len(tmpbuf));
2631 /* Reprocess this packet after received reply from router */
2632 silc_server_command_pending(server, SILC_COMMAND_MOTD,
2633 silc_command_get_ident(cmd->payload),
2634 silc_server_command_motd,
2635 silc_server_command_dup(cmd));
2636 cmd->pending = TRUE;
2637 silc_command_set_ident(cmd->payload, old_ident);
2638 silc_buffer_free(tmpbuf);
2642 /* Send to primary router only if we don't know the server
2643 * the client requested or if the server is not locally connected */
2644 if ((!entry || !(entry->data.status & SILC_IDLIST_STATUS_LOCAL))
2645 && !cmd->pending && !server->standalone) {
2646 /* Send to the primary router */
2648 SilcUInt16 old_ident;
2651 cmd->server->stat.commands_sent++;
2653 old_ident = silc_command_get_ident(cmd->payload);
2654 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
2655 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
2657 silc_server_packet_send(server, SILC_PRIMARY_ROUTE(server),
2658 SILC_PACKET_COMMAND, cmd->packet->flags,
2659 tmpbuf->data, silc_buffer_len(tmpbuf));
2661 /* Reprocess this packet after received reply from router */
2662 silc_server_command_pending(server, SILC_COMMAND_MOTD,
2663 silc_command_get_ident(cmd->payload),
2664 silc_server_command_motd,
2665 silc_server_command_dup(cmd));
2666 cmd->pending = TRUE;
2667 silc_command_set_ident(cmd->payload, old_ident);
2668 silc_buffer_free(tmpbuf);
2673 silc_free(dest_server);
2674 dest_server = silc_argument_get_arg_type(cmd->args, 1, NULL);
2675 silc_server_command_send_status_data(cmd, SILC_COMMAND_MOTD,
2676 SILC_STATUS_ERR_NO_SUCH_SERVER, 0,
2678 strlen(dest_server));
2683 idp = silc_id_payload_encode(entry->id, SILC_ID_SERVER);
2684 silc_server_send_command_reply(server, cmd->sock, SILC_COMMAND_MOTD,
2685 SILC_STATUS_OK, 0, ident, 2,
2686 2, idp->data, silc_buffer_len(idp),
2689 strlen(entry->motd) : 0);
2690 silc_buffer_free(idp);
2694 silc_free(dest_server);
2695 silc_server_command_free(cmd);
2698 /* Server side of command UMODE. Client can use this command to set/unset
2699 user mode. Client actually cannot set itself to be as server/router
2700 operator so this can be used only to unset the modes. */
2702 SILC_SERVER_CMD_FUNC(umode)
2704 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
2705 SilcServer server = cmd->server;
2706 SilcClientEntry client = silc_packet_get_context(cmd->sock);
2707 unsigned char *tmp_mask, m[4];
2708 SilcUInt32 mask = 0;
2709 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
2710 SilcBool set_mask = FALSE;
2712 if (client->data.conn_type != SILC_CONN_CLIENT || !client)
2715 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_UMODE, cmd, 1, 2);
2717 /* Get the client's mode mask */
2718 tmp_mask = silc_argument_get_arg_type(cmd->args, 2, NULL);
2720 SILC_GET32_MSB(mask, tmp_mask);
2725 /* Check that mode changing is allowed. */
2726 if (!silc_server_check_umode_rights(server, client, mask)) {
2727 silc_server_command_send_status_reply(cmd, SILC_COMMAND_UMODE,
2728 SILC_STATUS_ERR_PERM_DENIED, 0);
2732 /* Anonymous mode cannot be set by client */
2733 if (mask & SILC_UMODE_ANONYMOUS &&
2734 !(client->mode & SILC_UMODE_ANONYMOUS)) {
2735 silc_server_command_send_status_reply(cmd, SILC_COMMAND_UMODE,
2736 SILC_STATUS_ERR_PERM_DENIED, 0);
2740 /* Update statistics */
2741 if (mask & SILC_UMODE_GONE) {
2742 if (!(client->mode & SILC_UMODE_GONE))
2743 server->stat.my_aways++;
2745 if (client->mode & SILC_UMODE_GONE)
2746 server->stat.my_aways--;
2749 /* If the client has anonymous mode set, preserve it. */
2750 if (client->mode & SILC_UMODE_ANONYMOUS)
2751 mask |= SILC_UMODE_ANONYMOUS;
2753 /* Change the mode */
2754 client->mode = mask;
2756 /* Send UMODE change to primary router */
2757 silc_server_send_notify_umode(server, SILC_PRIMARY_ROUTE(server),
2758 SILC_BROADCAST(server), client->id,
2761 /* Check if anyone is watching this nickname */
2762 if (server->server_type == SILC_ROUTER)
2763 silc_server_check_watcher_list(server, client, NULL,
2764 SILC_NOTIFY_TYPE_UMODE_CHANGE);
2767 /* Send command reply to sender */
2768 SILC_PUT32_MSB(client->mode, m);
2769 silc_server_send_command_reply(server, cmd->sock, SILC_COMMAND_UMODE,
2770 SILC_STATUS_OK, 0, ident, 1,
2774 silc_server_command_free(cmd);
2777 /* Server side command of CMODE. Changes channel mode */
2779 SILC_SERVER_CMD_FUNC(cmode)
2781 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
2782 SilcServer server = cmd->server;
2783 SilcClientEntry client = silc_packet_get_context(cmd->sock);
2784 SilcIDListData idata = (SilcIDListData)client;
2786 SilcChannelEntry channel;
2787 SilcChannelClientEntry chl;
2789 unsigned char *tmp, *tmp_id, *tmp_mask, *chpkdata = NULL;
2790 char *cipher = NULL, *hmac = NULL, *passphrase = NULL, ulimit[4];
2791 SilcUInt32 mode_mask = 0, old_mask = 0, tmp_len, tmp_len2, chpklen;
2792 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
2793 SilcBool set_mask = FALSE, set_chpk = FALSE;
2794 SilcPublicKey founder_key = NULL;
2795 SilcBuffer fkey = NULL, chpklist = NULL;
2796 SilcBufferStruct chpk;
2799 silc_server_command_free(cmd);
2803 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_CMODE, cmd, 1, 9);
2805 /* Get Channel ID */
2806 if (!silc_argument_get_decoded(cmd->args, 1, SILC_ARGUMENT_ID, &id, NULL)) {
2807 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
2808 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
2809 silc_server_command_free(cmd);
2813 /* Get channel entry */
2814 channel = silc_idlist_find_channel_by_id(server->local_list,
2815 SILC_ID_GET_ID(id), NULL);
2817 channel = silc_idlist_find_channel_by_id(server->global_list,
2818 SILC_ID_GET_ID(id), NULL);
2820 tmp_id = silc_argument_get_arg_type(cmd->args, 1, &tmp_len2);
2821 silc_server_command_send_status_data(cmd, SILC_COMMAND_CMODE,
2822 SILC_STATUS_ERR_NO_SUCH_CHANNEL_ID,
2823 0, 2, tmp_id, tmp_len2);
2824 silc_server_command_free(cmd);
2828 old_mask = channel->mode;
2830 /* Get the channel mode mask */
2831 tmp_mask = silc_argument_get_arg_type(cmd->args, 2, &tmp_len);
2833 SILC_GET32_MSB(mode_mask, tmp_mask);
2837 /* Check whether this client is on the channel */
2838 if (!silc_server_client_on_channel(client, channel, &chl)) {
2839 tmp_id = silc_argument_get_arg_type(cmd->args, 1, &tmp_len2);
2840 silc_server_command_send_status_data(cmd, SILC_COMMAND_CMODE,
2841 SILC_STATUS_ERR_NOT_ON_CHANNEL, 0,
2842 2, tmp_id, tmp_len2);
2846 /* Check that client has rights to change any requested channel modes */
2847 if (set_mask && !silc_server_check_cmode_rights(server, channel, chl,
2849 SILC_LOG_DEBUG(("Client does not have rights to change mode"));
2850 tmp_id = silc_argument_get_arg_type(cmd->args, 1, &tmp_len2);
2851 silc_server_command_send_status_data(
2852 cmd, SILC_COMMAND_CMODE,
2853 (!(chl->mode & SILC_CHANNEL_UMODE_CHANOP) ?
2854 SILC_STATUS_ERR_NO_CHANNEL_PRIV :
2855 SILC_STATUS_ERR_NO_CHANNEL_FOPRIV), 0,
2856 2, tmp_id, tmp_len2);
2860 /* If mode mask was not sent as argument then merely return the current
2861 mode mask, founder key and channel public key list to the sender. */
2864 SILC_PUT32_MSB(channel->mode, m);
2865 if (channel->founder_key)
2866 fkey = silc_public_key_payload_encode(channel->founder_key);
2867 if (channel->channel_pubkeys)
2868 chpklist = silc_server_get_channel_pk_list(server, channel,
2870 tmp_id = silc_argument_get_arg_type(cmd->args, 1, &tmp_len2);
2871 silc_server_send_command_reply(server, cmd->sock, SILC_COMMAND_CMODE,
2872 SILC_STATUS_OK, 0, ident, 4,
2873 2, tmp_id, tmp_len2,
2875 4, fkey ? fkey->data : NULL,
2876 fkey ? silc_buffer_len(fkey) : 0,
2877 5, chpklist ? chpklist->data : NULL,
2878 chpklist ? silc_buffer_len(chpklist) : 0);
2883 * Check the modes. Modes that requires nothing special operation are
2887 if (mode_mask & SILC_CHANNEL_MODE_PRIVKEY) {
2888 /* Channel uses private keys to protect traffic. Client(s) has set the
2889 key locally they want to use, server does not know that key. */
2890 /* Nothing interesting to do here */
2892 if (channel->mode & SILC_CHANNEL_MODE_PRIVKEY) {
2893 /* The mode is removed and we need to generate and distribute
2894 new channel key. Clients are not using private channel keys
2895 anymore after this. */
2897 /* if we don't remove the flag from the mode
2898 * silc_server_create_channel_key won't create a new key */
2899 channel->mode &= ~SILC_CHANNEL_MODE_PRIVKEY;
2901 /* Re-generate channel key */
2902 if (!silc_server_create_channel_key(server, channel, 0))
2905 /* Send the channel key. This sends it to our local clients and if
2906 we are normal server to our router as well. */
2907 silc_server_send_channel_key(server, NULL, channel,
2908 server->server_type == SILC_ROUTER ?
2909 FALSE : !server->standalone);
2911 cipher = (char *)silc_cipher_get_name(channel->send_key);
2912 hmac = (char *)silc_hmac_get_name(channel->hmac);
2916 if (mode_mask & SILC_CHANNEL_MODE_ULIMIT) {
2917 /* User limit is set on channel */
2918 SilcUInt32 user_limit;
2920 /* Get user limit */
2921 tmp = silc_argument_get_arg_type(cmd->args, 3, NULL);
2923 if (!(channel->mode & SILC_CHANNEL_MODE_ULIMIT)) {
2924 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
2925 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS, 0);
2929 SILC_GET32_MSB(user_limit, tmp);
2930 channel->user_limit = user_limit;
2933 if (channel->mode & SILC_CHANNEL_MODE_ULIMIT)
2934 /* User limit mode is unset. Remove user limit */
2935 channel->user_limit = 0;
2938 if (mode_mask & SILC_CHANNEL_MODE_PASSPHRASE) {
2939 if (!(channel->mode & SILC_CHANNEL_MODE_PASSPHRASE)) {
2940 /* Passphrase has been set to channel */
2942 /* Get the passphrase */
2943 tmp = silc_argument_get_arg_type(cmd->args, 4, NULL);
2945 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
2946 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS, 0);
2950 /* Save the passphrase */
2951 passphrase = channel->passphrase = silc_memdup(tmp, strlen(tmp));
2954 if (channel->mode & SILC_CHANNEL_MODE_PASSPHRASE) {
2955 /* Passphrase mode is unset. remove the passphrase */
2956 silc_free(channel->passphrase);
2957 channel->passphrase = NULL;
2961 if (mode_mask & SILC_CHANNEL_MODE_CIPHER) {
2962 if (!(channel->mode & SILC_CHANNEL_MODE_CIPHER)) {
2963 /* Cipher to use protect the traffic */
2964 SilcCipher send_key, receive_key, olds, oldr;
2967 cipher = silc_argument_get_arg_type(cmd->args, 5, NULL);
2969 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
2970 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS, 0);
2974 /* Delete old cipher and allocate the new one */
2975 if (!silc_cipher_alloc(cipher, &send_key)) {
2976 silc_server_command_send_status_data(
2977 cmd, SILC_COMMAND_CMODE,
2978 SILC_STATUS_ERR_UNKNOWN_ALGORITHM, 0,
2979 2, cipher, strlen(cipher));
2982 if (!silc_cipher_alloc(cipher, &receive_key)) {
2983 silc_server_command_send_status_data(
2984 cmd, SILC_COMMAND_CMODE,
2985 SILC_STATUS_ERR_UNKNOWN_ALGORITHM, 0,
2986 2, cipher, strlen(cipher));
2990 olds = channel->send_key;
2991 oldr = channel->receive_key;
2992 channel->send_key = send_key;
2993 channel->receive_key = receive_key;
2995 /* Re-generate channel key */
2996 if (!silc_server_create_channel_key(server, channel, 0)) {
2997 /* We don't have new key, revert to old one */
2998 channel->send_key = olds;
2999 channel->receive_key = oldr;
3003 /* Remove old channel key for good */
3004 silc_cipher_free(olds);
3005 silc_cipher_free(oldr);
3007 /* Send the channel key. This sends it to our local clients and if
3008 we are normal server to our router as well. */
3009 silc_server_send_channel_key(server, NULL, channel,
3010 server->server_type == SILC_ROUTER ?
3011 FALSE : !server->standalone);
3014 if (channel->mode & SILC_CHANNEL_MODE_CIPHER) {
3015 /* Cipher mode is unset. Remove the cipher and revert back to
3017 SilcCipher send_key, receive_key, olds, oldr;
3018 cipher = channel->cipher;
3020 /* Delete old cipher and allocate default one */
3021 if (!silc_cipher_alloc(cipher ? cipher : SILC_DEFAULT_CIPHER,
3023 silc_server_command_send_status_data(
3024 cmd, SILC_COMMAND_CMODE,
3025 SILC_STATUS_ERR_UNKNOWN_ALGORITHM, 0,
3026 2, cipher, strlen(cipher));
3029 if (!silc_cipher_alloc(cipher ? cipher : SILC_DEFAULT_CIPHER,
3031 silc_server_command_send_status_data(
3032 cmd, SILC_COMMAND_CMODE,
3033 SILC_STATUS_ERR_UNKNOWN_ALGORITHM, 0,
3034 2, cipher, strlen(cipher));
3038 olds = channel->send_key;
3039 oldr = channel->receive_key;
3040 channel->send_key = send_key;
3041 channel->receive_key = receive_key;
3043 /* Re-generate channel key */
3044 if (!silc_server_create_channel_key(server, channel, 0)) {
3045 /* We don't have new key, revert to old one */
3046 channel->send_key = olds;
3047 channel->receive_key = oldr;
3051 /* Remove old channel key for good */
3052 silc_cipher_free(olds);
3053 silc_cipher_free(oldr);
3055 /* Send the channel key. This sends it to our local clients and if
3056 we are normal server to our router as well. */
3057 silc_server_send_channel_key(server, NULL, channel,
3058 server->server_type == SILC_ROUTER ?
3059 FALSE : !server->standalone);
3063 if (mode_mask & SILC_CHANNEL_MODE_HMAC) {
3064 if (!(channel->mode & SILC_CHANNEL_MODE_HMAC)) {
3065 /* HMAC to use protect the traffic */
3066 unsigned char hash[SILC_HASH_MAXLEN];
3070 hmac = silc_argument_get_arg_type(cmd->args, 6, NULL);
3072 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
3073 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS, 0);
3077 /* Delete old hmac and allocate the new one */
3078 if (!silc_hmac_alloc(hmac, NULL, &newhmac)) {
3079 silc_server_command_send_status_data(
3080 cmd, SILC_COMMAND_CMODE,
3081 SILC_STATUS_ERR_UNKNOWN_ALGORITHM, 0,
3082 2, hmac, strlen(hmac));
3086 silc_hmac_free(channel->hmac);
3087 channel->hmac = newhmac;
3089 /* Set the HMAC key out of current channel key. The client must do
3091 silc_hash_make(silc_hmac_get_hash(channel->hmac), channel->key,
3092 channel->key_len / 8, hash);
3093 silc_hmac_set_key(channel->hmac, hash,
3094 silc_hash_len(silc_hmac_get_hash(channel->hmac)));
3095 memset(hash, 0, sizeof(hash));
3098 if (channel->mode & SILC_CHANNEL_MODE_HMAC) {
3099 /* Hmac mode is unset. Remove the hmac and revert back to
3102 unsigned char hash[SILC_HASH_MAXLEN];
3103 hmac = channel->hmac_name;
3105 /* Delete old hmac and allocate default one */
3106 if (!silc_hmac_alloc(hmac ? hmac : SILC_DEFAULT_HMAC, NULL, &newhmac)) {
3107 silc_server_command_send_status_data(
3108 cmd, SILC_COMMAND_CMODE,
3109 SILC_STATUS_ERR_UNKNOWN_ALGORITHM, 0,
3110 2, hmac, strlen(hmac));
3114 silc_hmac_free(channel->hmac);
3115 channel->hmac = newhmac;
3117 /* Set the HMAC key out of current channel key. The client must do
3119 silc_hash_make(silc_hmac_get_hash(channel->hmac), channel->key,
3120 channel->key_len / 8,
3122 silc_hmac_set_key(channel->hmac, hash,
3123 silc_hash_len(silc_hmac_get_hash(channel->hmac)));
3124 memset(hash, 0, sizeof(hash));
3128 if (mode_mask & SILC_CHANNEL_MODE_FOUNDER_AUTH) {
3129 if (chl->mode & SILC_CHANNEL_UMODE_CHANFO) {
3130 /* Check if the founder public key was received */
3131 founder_key = idata->public_key;
3132 tmp = silc_argument_get_arg_type(cmd->args, 8, &tmp_len);
3134 if (!silc_public_key_payload_decode(tmp, tmp_len, &founder_key)) {
3135 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
3136 SILC_STATUS_ERR_AUTH_FAILED,
3141 /* If key was not sent and the channel mode has already founder
3142 then the key was not to be changed. */
3143 if (channel->mode & SILC_CHANNEL_MODE_FOUNDER_AUTH)
3147 /* Set the founder authentication */
3148 tmp = silc_argument_get_arg_type(cmd->args, 7, &tmp_len);
3150 silc_server_command_send_status_reply(
3151 cmd, SILC_COMMAND_CMODE,
3152 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS, 0);
3156 /* Verify the payload before setting the mode */
3157 if (!silc_auth_verify_data(tmp, tmp_len, SILC_AUTH_PUBLIC_KEY,
3158 founder_key, 0, server->sha1hash,
3159 client->id, SILC_ID_CLIENT)) {
3160 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
3161 SILC_STATUS_ERR_AUTH_FAILED,
3166 /* Save the public key */
3167 if (channel->founder_key)
3168 silc_pkcs_public_key_free(channel->founder_key);
3169 if (silc_argument_get_arg_type(cmd->args, 8, NULL))
3170 channel->founder_key = founder_key;
3172 channel->founder_key = silc_pkcs_public_key_copy(founder_key);
3173 if (!channel->founder_key) {
3174 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
3175 SILC_STATUS_ERR_AUTH_FAILED,
3180 fkey = silc_public_key_payload_encode(channel->founder_key);
3182 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE,
3183 SILC_STATUS_ERR_AUTH_FAILED,
3185 silc_pkcs_public_key_free(channel->founder_key);
3186 channel->founder_key = NULL;
3191 if (chl->mode & SILC_CHANNEL_UMODE_CHANFO) {
3192 if (channel->mode & SILC_CHANNEL_MODE_FOUNDER_AUTH) {
3193 if (channel->founder_key)
3194 silc_pkcs_public_key_free(channel->founder_key);
3195 channel->founder_key = NULL;
3201 if (mode_mask & SILC_CHANNEL_MODE_CHANNEL_AUTH) {
3202 if (chl->mode & SILC_CHANNEL_UMODE_CHANFO) {
3205 chpkdata = silc_argument_get_arg_type(cmd->args, 9, &chpklen);
3207 if (!chpkdata && channel->mode & SILC_CHANNEL_MODE_CHANNEL_AUTH)
3212 /* Process the channel public key(s) */
3213 st = silc_server_set_channel_pk_list(server, NULL, channel,
3215 if (st != SILC_STATUS_OK) {
3216 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CMODE, st, 0);
3221 if (chl->mode & SILC_CHANNEL_UMODE_CHANFO) {
3222 if (channel->mode & SILC_CHANNEL_MODE_CHANNEL_AUTH) {
3223 if (channel->channel_pubkeys)
3224 silc_hash_table_free(channel->channel_pubkeys);
3225 channel->channel_pubkeys = NULL;
3232 /* Finally, set the mode */
3233 old_mask = channel->mode = mode_mask;
3235 /* Send CMODE_CHANGE notify. */
3236 cidp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
3237 if (mode_mask & SILC_CHANNEL_MODE_ULIMIT)
3238 SILC_PUT32_MSB(channel->user_limit, ulimit);
3239 silc_server_send_notify_to_channel(server, NULL, channel, FALSE, TRUE,
3240 SILC_NOTIFY_TYPE_CMODE_CHANGE, 8,
3241 cidp->data, silc_buffer_len(cidp),
3243 cipher, cipher ? strlen(cipher) : 0,
3244 hmac, hmac ? strlen(hmac) : 0,
3245 passphrase, passphrase ?
3246 strlen(passphrase) : 0,
3247 fkey ? fkey->data : NULL,
3248 fkey ? silc_buffer_len(fkey) : 0,
3249 chpkdata ? chpkdata : NULL,
3250 chpkdata ? chpklen : 0,
3251 mode_mask & SILC_CHANNEL_MODE_ULIMIT ?
3253 mode_mask & SILC_CHANNEL_MODE_ULIMIT ?
3254 sizeof(ulimit) : 0);
3256 /* Set CMODE notify type to network */
3257 if (chpkdata && chpklen)
3258 silc_buffer_set(&chpk, chpkdata, chpklen);
3259 silc_server_send_notify_cmode(server, SILC_PRIMARY_ROUTE(server),
3260 SILC_BROADCAST(server), channel,
3261 mode_mask, client->id, SILC_ID_CLIENT,
3262 cipher, hmac, passphrase, founder_key,
3263 chpkdata ? &chpk : NULL);
3266 chpklist = silc_server_get_channel_pk_list(server, channel, FALSE, FALSE);
3268 /* Send command reply to sender */
3269 tmp_id = silc_argument_get_arg_type(cmd->args, 1, &tmp_len2);
3270 silc_server_send_command_reply(server, cmd->sock, SILC_COMMAND_CMODE,
3271 SILC_STATUS_OK, 0, ident, 5,
3272 2, tmp_id, tmp_len2,
3274 4, fkey ? fkey->data : NULL,
3275 fkey ? silc_buffer_len(fkey) : 0,
3276 5, chpklist ? chpklist->data :
3277 NULL, chpklist ? silc_buffer_len(chpklist)
3280 SILC_CHANNEL_MODE_ULIMIT ?
3283 SILC_CHANNEL_MODE_ULIMIT ?
3284 sizeof(ulimit) : 0));
3285 silc_buffer_free(cidp);
3288 channel->mode = old_mask;
3289 silc_buffer_free(chpklist);
3290 silc_buffer_free(fkey);
3291 silc_server_command_free(cmd);
3294 /* Server side of CUMODE command. Changes client's mode on a channel. */
3296 SILC_SERVER_CMD_FUNC(cumode)
3298 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
3299 SilcServer server = cmd->server;
3300 SilcClientEntry client = silc_packet_get_context(cmd->sock);
3302 SilcChannelEntry channel;
3303 SilcClientEntry target_client;
3304 SilcChannelClientEntry chl;
3306 unsigned char *tmp_id, *tmp_ch_id, *tmp_mask;
3307 SilcUInt32 target_mask, sender_mask = 0, tmp_len, tmp_ch_len;
3309 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
3310 SilcPublicKey founder_key = NULL;
3311 SilcBuffer fkey = NULL;
3316 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_CUMODE, cmd, 3, 4);
3318 /* Get Channel ID */
3319 if (!silc_argument_get_decoded(cmd->args, 1, SILC_ARGUMENT_ID, &id, NULL)) {
3320 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3321 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
3325 /* Get channel entry */
3326 channel = silc_idlist_find_channel_by_id(server->local_list,
3327 SILC_ID_GET_ID(id), NULL);
3329 channel = silc_idlist_find_channel_by_id(server->global_list,
3330 SILC_ID_GET_ID(id), NULL);
3332 tmp_ch_id = silc_argument_get_arg_type(cmd->args, 1, &tmp_ch_len);
3333 silc_server_command_send_status_data(cmd, SILC_COMMAND_CUMODE,
3334 SILC_STATUS_ERR_NO_SUCH_CHANNEL_ID,
3335 0, 2, tmp_ch_id, tmp_ch_len);
3340 /* Check whether sender is on the channel */
3341 if (!silc_server_client_on_channel(client, channel, &chl)) {
3342 tmp_ch_id = silc_argument_get_arg_type(cmd->args, 1, &tmp_ch_len);
3343 silc_server_command_send_status_data(cmd, SILC_COMMAND_CUMODE,
3344 SILC_STATUS_ERR_NOT_ON_CHANNEL, 0,
3345 2, tmp_ch_id, tmp_ch_len);
3348 sender_mask = chl->mode;
3350 /* Get the target client's channel mode mask */
3351 tmp_mask = silc_argument_get_arg_type(cmd->args, 2, NULL);
3353 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3354 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
3358 SILC_GET32_MSB(target_mask, tmp_mask);
3360 /* Get target Client ID */
3361 if (!silc_argument_get_decoded(cmd->args, 3, SILC_ARGUMENT_ID, &id2, NULL)) {
3362 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3363 SILC_STATUS_ERR_NO_CLIENT_ID, 0);
3367 /* Get target client's entry */
3368 target_client = silc_idlist_find_client_by_id(server->local_list,
3369 SILC_ID_GET_ID(id2),
3372 target_client = silc_idlist_find_client_by_id(server->global_list,
3373 SILC_ID_GET_ID(id2),
3376 if (target_client != client &&
3377 !(sender_mask & SILC_CHANNEL_UMODE_CHANFO) &&
3378 !(sender_mask & SILC_CHANNEL_UMODE_CHANOP)) {
3379 tmp_ch_id = silc_argument_get_arg_type(cmd->args, 1, &tmp_ch_len);
3380 silc_server_command_send_status_data(cmd, SILC_COMMAND_CUMODE,
3381 SILC_STATUS_ERR_NOT_YOU, 0,
3382 2, tmp_ch_id, tmp_ch_len);
3386 /* Check whether target client is on the channel */
3387 if (target_client != client) {
3388 if (!silc_server_client_on_channel(target_client, channel, &chl)) {
3389 tmp_ch_id = silc_argument_get_arg_type(cmd->args, 1, &tmp_ch_len);
3390 tmp_id = silc_argument_get_arg_type(cmd->args, 3, &tmp_len);
3391 silc_server_command_send_status_data2(
3392 cmd, SILC_COMMAND_CUMODE,
3393 SILC_STATUS_ERR_USER_NOT_ON_CHANNEL, 0,
3395 3, tmp_ch_id, tmp_ch_len);
3404 /* If the target client is founder, no one else can change their mode
3406 if (chl->mode & SILC_CHANNEL_UMODE_CHANFO && client != target_client) {
3407 tmp_ch_id = silc_argument_get_arg_type(cmd->args, 1, &tmp_ch_len);
3408 silc_server_command_send_status_data(cmd, SILC_COMMAND_CUMODE,
3409 SILC_STATUS_ERR_NO_CHANNEL_FOPRIV,
3410 0, 2, tmp_ch_id, tmp_ch_len);
3414 if (target_mask & SILC_CHANNEL_UMODE_CHANFO) {
3415 if (target_client != client) {
3416 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3417 SILC_STATUS_ERR_NO_CHANNEL_FOPRIV,
3422 if (!(chl->mode & SILC_CHANNEL_UMODE_CHANFO)) {
3423 /* The client tries to claim the founder rights. */
3424 unsigned char *tmp_auth;
3425 SilcUInt32 tmp_auth_len;
3426 SilcChannelClientEntry chl2;
3427 SilcHashTableList htl;
3429 if (!(channel->mode & SILC_CHANNEL_MODE_FOUNDER_AUTH) ||
3430 !channel->founder_key) {
3431 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3432 SILC_STATUS_ERR_AUTH_FAILED, 0);
3436 tmp_auth = silc_argument_get_arg_type(cmd->args, 4, &tmp_auth_len);
3438 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3439 SILC_STATUS_ERR_AUTH_FAILED, 0);
3443 /* Verify the authentication payload */
3444 if (!silc_auth_verify_data(tmp_auth, tmp_auth_len, SILC_AUTH_PUBLIC_KEY,
3445 channel->founder_key, 0, server->sha1hash,
3446 client->id, SILC_ID_CLIENT)) {
3447 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3448 SILC_STATUS_ERR_AUTH_FAILED, 0);
3453 founder_key = channel->founder_key;
3454 fkey = silc_public_key_payload_encode(founder_key);
3456 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3457 SILC_STATUS_ERR_AUTH_FAILED, 0);
3461 /* There cannot be anyone else as founder on the channel now. This
3462 client is definitely the founder due to this authentication. This
3463 is done only on router, not on server, since server cannot know
3464 whether router will accept this mode change or not. XXX This
3465 probably shouldn't be done anymore at all, may cause problems in
3466 router-router connections too (maybe just AUTH_FAILED error should
3467 be returned). -Pekka */
3468 if (server->server_type == SILC_ROUTER) {
3469 silc_hash_table_list(channel->user_list, &htl);
3470 while (silc_hash_table_get(&htl, NULL, (void *)&chl2))
3471 if (chl2->mode & SILC_CHANNEL_UMODE_CHANFO) {
3472 chl2->mode &= ~SILC_CHANNEL_UMODE_CHANFO;
3473 silc_server_force_cumode_change(server, NULL, channel, chl2,
3477 silc_hash_table_list_reset(&htl);
3480 sender_mask = chl->mode |= SILC_CHANNEL_UMODE_CHANFO;
3483 if (chl->mode & SILC_CHANNEL_UMODE_CHANFO) {
3484 if (target_client == client) {
3485 /* Remove channel founder rights from itself */
3486 chl->mode &= ~SILC_CHANNEL_UMODE_CHANFO;
3489 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3490 SILC_STATUS_ERR_NOT_YOU, 0);
3496 if (target_mask & SILC_CHANNEL_UMODE_CHANOP) {
3497 /* Promote to operator */
3498 if (!(chl->mode & SILC_CHANNEL_UMODE_CHANOP)) {
3499 if (!(sender_mask & SILC_CHANNEL_UMODE_CHANOP) &&
3500 !(sender_mask & SILC_CHANNEL_UMODE_CHANFO)) {
3501 tmp_ch_id = silc_argument_get_arg_type(cmd->args, 1, &tmp_ch_len);
3502 silc_server_command_send_status_data(cmd, SILC_COMMAND_CUMODE,
3503 SILC_STATUS_ERR_NO_CHANNEL_PRIV,
3504 0, 2, tmp_ch_id, tmp_ch_len);
3508 chl->mode |= SILC_CHANNEL_UMODE_CHANOP;
3512 if (chl->mode & SILC_CHANNEL_UMODE_CHANOP) {
3513 if (!(sender_mask & SILC_CHANNEL_UMODE_CHANOP) &&
3514 !(sender_mask & SILC_CHANNEL_UMODE_CHANFO)) {
3515 tmp_ch_id = silc_argument_get_arg_type(cmd->args, 1, &tmp_ch_len);
3516 silc_server_command_send_status_data(cmd, SILC_COMMAND_CUMODE,
3517 SILC_STATUS_ERR_NO_CHANNEL_PRIV,
3518 0, 2, tmp_ch_id, tmp_ch_len);
3522 /* Demote to normal user */
3523 chl->mode &= ~SILC_CHANNEL_UMODE_CHANOP;
3528 if (target_mask & SILC_CHANNEL_UMODE_BLOCK_MESSAGES) {
3529 if (target_client != client) {
3530 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3531 SILC_STATUS_ERR_NOT_YOU, 0);
3535 if (!(chl->mode & SILC_CHANNEL_UMODE_BLOCK_MESSAGES)) {
3536 chl->mode |= SILC_CHANNEL_UMODE_BLOCK_MESSAGES;
3540 if (chl->mode & SILC_CHANNEL_UMODE_BLOCK_MESSAGES) {
3541 if (target_client != client) {
3542 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3543 SILC_STATUS_ERR_NOT_YOU, 0);
3547 chl->mode &= ~SILC_CHANNEL_UMODE_BLOCK_MESSAGES;
3552 if (target_mask & SILC_CHANNEL_UMODE_BLOCK_MESSAGES_USERS) {
3553 if (target_client != client) {
3554 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3555 SILC_STATUS_ERR_NOT_YOU, 0);
3559 if (!(chl->mode & SILC_CHANNEL_UMODE_BLOCK_MESSAGES_USERS)) {
3560 chl->mode |= SILC_CHANNEL_UMODE_BLOCK_MESSAGES_USERS;
3564 if (chl->mode & SILC_CHANNEL_UMODE_BLOCK_MESSAGES_USERS) {
3565 if (target_client != client) {
3566 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3567 SILC_STATUS_ERR_NOT_YOU, 0);
3571 chl->mode &= ~SILC_CHANNEL_UMODE_BLOCK_MESSAGES_USERS;
3576 if (target_mask & SILC_CHANNEL_UMODE_BLOCK_MESSAGES_ROBOTS) {
3577 if (target_client != client) {
3578 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3579 SILC_STATUS_ERR_NOT_YOU, 0);
3583 if (!(chl->mode & SILC_CHANNEL_UMODE_BLOCK_MESSAGES_ROBOTS)) {
3584 chl->mode |= SILC_CHANNEL_UMODE_BLOCK_MESSAGES_ROBOTS;
3588 if (chl->mode & SILC_CHANNEL_UMODE_BLOCK_MESSAGES_ROBOTS) {
3589 if (target_client != client) {
3590 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3591 SILC_STATUS_ERR_NOT_YOU, 0);
3595 chl->mode &= ~SILC_CHANNEL_UMODE_BLOCK_MESSAGES_ROBOTS;
3600 if (target_mask & SILC_CHANNEL_UMODE_QUIET) {
3601 if (!(chl->mode & SILC_CHANNEL_UMODE_QUIET)) {
3602 if (client == target_client) {
3603 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3604 SILC_STATUS_ERR_PERM_DENIED, 0);
3607 chl->mode |= SILC_CHANNEL_UMODE_QUIET;
3611 if (chl->mode & SILC_CHANNEL_UMODE_QUIET) {
3612 if (client == target_client) {
3613 silc_server_command_send_status_reply(cmd, SILC_COMMAND_CUMODE,
3614 SILC_STATUS_ERR_PERM_DENIED, 0);
3617 chl->mode &= ~SILC_CHANNEL_UMODE_QUIET;
3622 idp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
3623 tmp_id = silc_argument_get_arg_type(cmd->args, 3, &tmp_len);
3624 tmp_ch_id = silc_argument_get_arg_type(cmd->args, 1, &tmp_ch_len);
3626 /* Send notify to channel, notify only if mode was actually changed. */
3628 silc_server_send_notify_to_channel(server, NULL, channel, FALSE, TRUE,
3629 SILC_NOTIFY_TYPE_CUMODE_CHANGE, 4,
3630 idp->data, silc_buffer_len(idp),
3633 fkey ? fkey->data : NULL,
3634 fkey ? silc_buffer_len(fkey) : 0);
3636 /* Set CUMODE notify type to network */
3637 silc_server_send_notify_cumode(server, SILC_PRIMARY_ROUTE(server),
3638 SILC_BROADCAST(server), channel,
3639 target_mask, client->id, SILC_ID_CLIENT,
3640 target_client->id, founder_key);
3643 /* Send command reply to sender */
3644 silc_server_send_command_reply(server, cmd->sock, SILC_COMMAND_CUMODE,
3645 SILC_STATUS_OK, 0, ident, 3,
3647 3, tmp_ch_id, tmp_ch_len,
3648 4, tmp_id, tmp_len);
3649 silc_buffer_free(idp);
3652 silc_buffer_free(fkey);
3653 silc_server_command_free(cmd);
3656 /* Server side of KICK command. Kicks client out of channel. */
3658 SILC_SERVER_CMD_FUNC(kick)
3660 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
3661 SilcServer server = cmd->server;
3662 SilcClientEntry client = silc_packet_get_context(cmd->sock);
3663 SilcClientEntry target_client;
3665 SilcChannelEntry channel;
3666 SilcChannelClientEntry chl;
3668 SilcUInt32 tmp_len, target_idp_len, clen;
3669 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
3670 unsigned char *tmp, *comment, *target_idp;
3675 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_LEAVE, cmd, 1, 3);
3677 /* Get Channel ID */
3678 if (!silc_argument_get_decoded(cmd->args, 1, SILC_ARGUMENT_ID, &id, NULL)) {
3679 silc_server_command_send_status_reply(cmd, SILC_COMMAND_KICK,
3680 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
3684 /* Get channel entry */
3685 channel = silc_idlist_find_channel_by_id(server->local_list,
3686 SILC_ID_GET_ID(id), NULL);
3688 channel = silc_idlist_find_channel_by_id(server->local_list,
3689 SILC_ID_GET_ID(id), NULL);
3691 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
3692 silc_server_command_send_status_data(cmd, SILC_COMMAND_KICK,
3693 SILC_STATUS_ERR_NO_SUCH_CHANNEL_ID,
3694 0, 2, tmp, tmp_len);
3699 /* Check whether sender is on the channel */
3700 if (!silc_server_client_on_channel(client, channel, &chl)) {
3701 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
3702 silc_server_command_send_status_data(cmd, SILC_COMMAND_KICK,
3703 SILC_STATUS_ERR_NOT_ON_CHANNEL,
3704 0, 2, tmp, tmp_len);
3708 /* Check that the kicker is channel operator or channel founder */
3709 if (!(chl->mode & SILC_CHANNEL_UMODE_CHANOP) &&
3710 !(chl->mode & SILC_CHANNEL_UMODE_CHANFO)) {
3711 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
3712 silc_server_command_send_status_data(cmd, SILC_COMMAND_KICK,
3713 SILC_STATUS_ERR_NO_CHANNEL_PRIV,
3714 0, 2, tmp, tmp_len);
3718 /* Get target Client ID */
3719 if (!silc_argument_get_decoded(cmd->args, 2, SILC_ARGUMENT_ID, &id2, NULL)) {
3720 silc_server_command_send_status_reply(cmd, SILC_COMMAND_KICK,
3721 SILC_STATUS_ERR_NO_CLIENT_ID, 0);
3725 /* Get target client's entry */
3726 target_client = silc_idlist_find_client_by_id(server->local_list,
3727 SILC_ID_GET_ID(id2),
3730 target_client = silc_idlist_find_client_by_id(server->global_list,
3731 SILC_ID_GET_ID(id2),
3734 /* Check whether target client is on the channel */
3735 if (!silc_server_client_on_channel(target_client, channel, &chl)) {
3736 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
3737 target_idp = silc_argument_get_arg_type(cmd->args, 2, &target_idp_len);
3738 silc_server_command_send_status_data2(cmd, SILC_COMMAND_KICK,
3739 SILC_STATUS_ERR_USER_NOT_ON_CHANNEL,
3740 0, 2, target_idp, target_idp_len,
3745 /* Check that the target client is not channel founder. Channel founder
3746 cannot be kicked from the channel. */
3747 if (chl->mode & SILC_CHANNEL_UMODE_CHANFO) {
3748 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
3749 silc_server_command_send_status_data(cmd, SILC_COMMAND_KICK,
3750 SILC_STATUS_ERR_NO_CHANNEL_FOPRIV,
3751 0, 2, tmp, tmp_len);
3756 comment = silc_argument_get_arg_type(cmd->args, 3, &clen);
3760 /* Send the reply back to the client */
3761 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
3762 target_idp = silc_argument_get_arg_type(cmd->args, 2, &target_idp_len);
3763 silc_server_send_command_reply(server, cmd->sock, SILC_COMMAND_KICK,
3764 SILC_STATUS_OK, 0, ident, 2,
3766 3, target_idp, target_idp_len);
3768 /* Send KICKED notify to local clients on the channel */
3769 idp = silc_id_payload_encode(client->id, SILC_ID_CLIENT);
3770 silc_server_send_notify_to_channel(server, NULL, channel, FALSE, TRUE,
3771 SILC_NOTIFY_TYPE_KICKED, 3,
3772 target_idp, target_idp_len,
3773 comment, comment ? strlen(comment) : 0,
3774 idp->data, silc_buffer_len(idp));
3775 silc_buffer_free(idp);
3777 /* Send KICKED notify to primary route */
3778 silc_server_send_notify_kicked(server, SILC_PRIMARY_ROUTE(server),
3779 SILC_BROADCAST(server), channel,
3780 target_client->id, client->id, comment);
3782 /* Remove the client from channel's invite list */
3783 if (channel->invite_list && silc_hash_table_count(channel->invite_list)) {
3785 silc_argument_payload_encode_one(NULL, target_idp, target_idp_len, 3);
3786 SilcArgumentPayload args =
3787 silc_argument_payload_parse(ab->data, silc_buffer_len(ab), 1);
3789 silc_server_inviteban_process(server, channel->invite_list, 1, args);
3790 silc_buffer_free(ab);
3791 silc_argument_payload_free(args);
3794 /* Remove the client from the channel. If the channel does not exist
3795 after removing the client then the client kicked itself off the channel
3796 and we don't have to send anything after that. */
3797 if (!silc_server_remove_from_one_channel(server, NULL, channel,
3798 target_client, FALSE))
3801 if (!(channel->mode & SILC_CHANNEL_MODE_PRIVKEY)) {
3802 /* Re-generate channel key */
3803 if (!silc_server_create_channel_key(server, channel, 0))
3806 /* Send the channel key to the channel. The key of course is not sent
3807 to the client who was kicked off the channel. */
3808 silc_server_send_channel_key(server, target_client->connection, channel,
3809 server->server_type == SILC_ROUTER ?
3810 FALSE : !server->standalone);
3814 silc_server_command_free(cmd);
3817 /* Server side of OPER command. Client uses this comand to obtain server
3818 operator privileges to this server/router. */
3820 SILC_SERVER_CMD_FUNC(oper)
3822 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
3823 SilcServer server = cmd->server;
3824 SilcClientEntry client = silc_packet_get_context(cmd->sock);
3825 unsigned char *username = NULL, *auth;
3827 SilcServerConfigAdmin *admin;
3828 SilcIDListData idata = (SilcIDListData)client;
3829 SilcBool result = FALSE;
3830 SilcPublicKey cached_key;
3831 const char *hostname, *ip;
3833 if (client->data.conn_type != SILC_CONN_CLIENT || !client)
3836 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_OPER, cmd, 1, 2);
3838 silc_socket_stream_get_info(silc_packet_stream_get_stream(cmd->sock),
3839 NULL, &hostname, &ip, NULL);
3841 /* Get the username */
3842 username = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
3844 silc_server_command_send_status_reply(cmd, SILC_COMMAND_OPER,
3845 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
3850 /* Check username */
3851 username = silc_identifier_check(username, strlen(username),
3852 SILC_STRING_UTF8, 128, &tmp_len);
3854 silc_server_command_send_status_reply(cmd, SILC_COMMAND_OPER,
3855 SILC_STATUS_ERR_BAD_USERNAME,
3860 /* Get the admin configuration */
3861 admin = silc_server_config_find_admin(server, (char *)ip,
3862 username, client->nickname);
3864 admin = silc_server_config_find_admin(server, (char *)hostname,
3865 username, client->nickname);
3867 silc_server_command_send_status_reply(cmd, SILC_COMMAND_OPER,
3868 SILC_STATUS_ERR_AUTH_FAILED,
3870 SILC_LOG_INFO(("OPER authentication failed for username '%s' by "
3871 "nickname '%s' from %s", username,
3872 client->nickname, hostname));
3877 /* Get the authentication payload */
3878 auth = silc_argument_get_arg_type(cmd->args, 2, &tmp_len);
3880 silc_server_command_send_status_reply(cmd, SILC_COMMAND_OPER,
3881 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
3886 /* Verify the authentication data. If both passphrase and public key
3887 is set then try both of them. */
3888 if (admin->passphrase)
3889 result = silc_auth_verify_data(auth, tmp_len, SILC_AUTH_PASSWORD,
3890 admin->passphrase, admin->passphrase_len,
3891 idata->hash, client->id, SILC_ID_CLIENT);
3892 if (!result && admin->publickeys) {
3894 silc_server_get_public_key(server,
3895 SILC_SKR_USAGE_SERVICE_AUTHORIZATION, admin);
3898 result = silc_auth_verify_data(auth, tmp_len, SILC_AUTH_PUBLIC_KEY,
3899 cached_key, 0, idata->hash,
3900 client->id, SILC_ID_CLIENT);
3903 /* Authentication failed */
3904 silc_server_command_send_status_reply(cmd, SILC_COMMAND_OPER,
3905 SILC_STATUS_ERR_AUTH_FAILED,
3910 /* Client is now server operator */
3911 client->mode |= SILC_UMODE_SERVER_OPERATOR;
3913 /* Update statistics */
3914 if (SILC_IS_LOCAL(client))
3915 server->stat.my_server_ops++;
3916 if (server->server_type == SILC_ROUTER)
3917 server->stat.server_ops++;
3919 /* Send UMODE change to primary router */
3920 silc_server_send_notify_umode(server, SILC_PRIMARY_ROUTE(server),
3921 SILC_BROADCAST(server), client->id,
3924 /* Check if anyone is watching this nickname */
3925 if (server->server_type == SILC_ROUTER)
3926 silc_server_check_watcher_list(server, client, NULL,
3927 SILC_NOTIFY_TYPE_UMODE_CHANGE);
3929 /* Send reply to the sender */
3930 silc_server_command_send_status_reply(cmd, SILC_COMMAND_OPER,
3934 silc_free(username);
3935 silc_server_command_free(cmd);
3938 SILC_TASK_CALLBACK(silc_server_command_detach_cb)
3940 SilcServer server = app_context;
3941 QuitInternal q = (QuitInternal)context;
3942 SilcClientID *client_id = (SilcClientID *)q->sock;
3943 SilcClientEntry client;
3944 SilcPacketStream sock;
3946 client = silc_idlist_find_client_by_id(server->local_list, client_id,
3948 if (client && client->connection) {
3949 sock = client->connection;
3951 /* Close the connection on our side */
3952 client->router = NULL;
3953 client->connection = NULL;
3954 silc_server_close_connection(server, sock);
3957 silc_free(client_id);
3961 SILC_TASK_CALLBACK(silc_server_command_detach_timeout)
3963 SilcServer server = app_context;
3964 QuitInternal q = (QuitInternal)context;
3965 SilcClientID *client_id = (SilcClientID *)q->sock;
3966 SilcClientEntry client;
3968 client = silc_idlist_find_client_by_id(server->local_list, client_id,
3970 if (client && client->mode & SILC_UMODE_DETACHED) {
3971 SILC_LOG_DEBUG(("Detach timeout"));
3972 silc_server_free_client_data(server, NULL, client, TRUE,
3976 silc_free(client_id);
3980 /* Server side of DETACH command. Detached the client from the network
3981 by closing the connection but preserving the session. */
3983 SILC_SERVER_CMD_FUNC(detach)
3985 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
3986 SilcServer server = cmd->server;
3987 SilcClientEntry client = silc_packet_get_context(cmd->sock);
3990 if (server->config->detach_disabled) {
3991 silc_server_command_send_status_reply(cmd, SILC_COMMAND_DETACH,
3992 SILC_STATUS_ERR_OPERATION_ALLOWED,
3997 if (client->data.conn_type != SILC_CONN_CLIENT || !client)
4000 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_DETACH, cmd, 0, 0);
4002 /* Remove operator privileges, since the client may resume in some
4003 other server which to it does not have operator privileges. */
4004 SILC_OPER_STATS_UPDATE(client, server, SILC_UMODE_SERVER_OPERATOR);
4005 SILC_OPER_STATS_UPDATE(client, router, SILC_UMODE_ROUTER_OPERATOR);
4007 /* Send the user mode notify to notify that client is detached */
4008 client->mode |= SILC_UMODE_DETACHED;
4009 client->data.status &= ~SILC_IDLIST_STATUS_RESUMED;
4010 client->data.status &= ~SILC_IDLIST_STATUS_NOATTR;
4011 client->last_command = 0;
4012 client->fast_command = 0;
4013 silc_server_send_notify_umode(server, SILC_PRIMARY_ROUTE(server),
4014 SILC_BROADCAST(server), client->id,
4016 server->stat.my_detached++;
4018 /* Check if anyone is watching this nickname */
4019 if (server->server_type == SILC_ROUTER)
4020 silc_server_check_watcher_list(server, client, NULL,
4021 SILC_NOTIFY_TYPE_UMODE_CHANGE);
4023 q = silc_calloc(1, sizeof(*q));
4024 q->sock = silc_id_dup(client->id, SILC_ID_CLIENT);
4025 silc_schedule_task_add_timeout(server->schedule,
4026 silc_server_command_detach_cb,
4029 if (server->config->detach_timeout) {
4030 q = silc_calloc(1, sizeof(*q));
4031 q->sock = silc_id_dup(client->id, SILC_ID_CLIENT);
4032 silc_schedule_task_add_timeout(server->schedule,
4033 silc_server_command_detach_timeout,
4034 q, server->config->detach_timeout * 60, 0);
4037 /* Send reply to the sender */
4038 silc_server_command_send_status_reply(cmd, SILC_COMMAND_DETACH,
4042 silc_server_command_free(cmd);
4045 /* Server side of WATCH command. */
4047 SILC_SERVER_CMD_FUNC(watch)
4049 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
4050 SilcServer server = cmd->server;
4051 char *add_nick, *del_nick;
4052 SilcUInt32 add_nick_len, del_nick_len, tmp_len, pk_len;
4053 unsigned char hash[SILC_HASH_MAXLEN], *tmp, *pk, *nick;
4054 SilcClientEntry client;
4056 SilcUInt16 old_ident;
4058 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_WATCH, cmd, 1, 3);
4060 if (server->server_type != SILC_ROUTER && !server->standalone) {
4061 if (!cmd->pending) {
4062 /* Send the command to router */
4065 /* If backup receives this from primary, handle it locally */
4066 if (server->server_type == SILC_BACKUP_ROUTER &&
4067 cmd->sock == SILC_PRIMARY_ROUTE(server))
4070 SILC_LOG_DEBUG(("Forwarding WATCH to router"));
4073 cmd->server->stat.commands_sent++;
4075 old_ident = silc_command_get_ident(cmd->payload);
4076 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
4077 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
4079 silc_server_packet_send(server, SILC_PRIMARY_ROUTE(server),
4080 SILC_PACKET_COMMAND, cmd->packet->flags,
4081 tmpbuf->data, silc_buffer_len(tmpbuf));
4083 /* Reprocess this packet after received reply from router */
4084 silc_server_command_pending(server, SILC_COMMAND_WATCH,
4085 silc_command_get_ident(cmd->payload),
4086 silc_server_command_watch,
4087 silc_server_command_dup(cmd));
4088 cmd->pending = TRUE;
4089 silc_command_set_ident(cmd->payload, old_ident);
4090 silc_buffer_free(tmpbuf);
4093 SilcServerCommandReplyContext reply = context2;
4099 silc_command_get_status(reply->payload, &status, NULL);
4101 /* Backup router handles the WATCH command also. */
4102 if (server->server_type != SILC_BACKUP_ROUTER ||
4103 SILC_STATUS_IS_ERROR(status)) {
4104 /* Received reply from router, just send same data to the client. */
4105 SILC_LOG_DEBUG(("Received reply to WATCH from router"));
4106 silc_server_command_send_status_reply(cmd, SILC_COMMAND_WATCH, status,
4113 /* We are router and keep the watch list for local cell */
4116 /* Get the client ID */
4117 if (!silc_argument_get_decoded(cmd->args, 1, SILC_ARGUMENT_ID, &id, NULL)) {
4118 silc_server_command_send_status_reply(cmd, SILC_COMMAND_WATCH,
4119 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
4124 /* Get the client entry which must be in local list */
4125 client = silc_idlist_find_client_by_id(server->local_list,
4126 SILC_ID_GET_ID(id), TRUE, NULL);
4128 /* Backup checks global list also */
4129 if (server->server_type == SILC_BACKUP_ROUTER)
4130 client = silc_idlist_find_client_by_id(server->global_list,
4131 SILC_ID_GET_ID(id), TRUE, NULL);
4133 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
4134 silc_server_command_send_status_data(cmd, SILC_COMMAND_WATCH,
4135 SILC_STATUS_ERR_NO_SUCH_CLIENT_ID,
4136 0, 2, tmp, tmp_len);
4141 /* Take public key for watching by public key */
4142 pk = silc_argument_get_arg_type(cmd->args, 4, &pk_len);
4145 add_nick = silc_argument_get_arg_type(cmd->args, 2, &add_nick_len);
4146 del_nick = silc_argument_get_arg_type(cmd->args, 3, &del_nick_len);
4147 if (!add_nick && !del_nick && !pk) {
4148 silc_server_command_send_status_reply(cmd, SILC_COMMAND_WATCH,
4149 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
4154 if (add_nick && add_nick_len > 128) {
4155 add_nick[128] = '\0';
4158 if (del_nick && del_nick_len > 128) {
4159 del_nick[128] = '\0';
4163 /* Add new nickname to be watched in our cell */
4165 nick = silc_identifier_check(add_nick, add_nick_len, SILC_STRING_UTF8, 128,
4168 silc_server_command_send_status_reply(cmd, SILC_COMMAND_WATCH,
4169 SILC_STATUS_ERR_BAD_NICKNAME, 0);
4173 /* Hash the nick, we have the hash saved, not nicks because we can
4174 do one to one mapping to the nick from Client ID hash this way. */
4175 silc_hash_make(server->md5hash, nick, add_nick_len, hash);
4177 /* Check whether this client is already watching this nickname */
4178 if (silc_hash_table_find_by_context(server->watcher_list, hash,
4180 /* Nickname is alredy being watched for this client */
4181 silc_server_command_send_status_reply(cmd, SILC_COMMAND_WATCH,
4182 SILC_STATUS_ERR_NICKNAME_IN_USE,
4188 /* Get the nickname from the watcher list and use the same key in
4189 new entries as well. If key doesn't exist then create it. */
4190 if (!silc_hash_table_find(server->watcher_list, hash, (void *)&tmp, NULL))
4191 tmp = silc_memdup(hash, CLIENTID_HASH_LEN);
4193 /* Add the client to the watcher list with the specified nickname hash. */
4194 silc_hash_table_add(server->watcher_list, tmp, client);
4198 /* Delete nickname from watch list */
4200 nick = silc_identifier_check(del_nick, del_nick_len, SILC_STRING_UTF8, 128,
4203 silc_server_command_send_status_reply(cmd, SILC_COMMAND_WATCH,
4204 SILC_STATUS_ERR_BAD_NICKNAME, 0);
4208 /* Hash the nick, we have the hash saved, not nicks because we can
4209 do one to one mapping to the nick from Client ID hash this way. */
4210 silc_hash_make(server->md5hash, nick, del_nick_len, hash);
4212 /* Check that this client is watching for this nickname */
4213 if (!silc_hash_table_find_by_context(server->watcher_list, hash,
4214 client, (void *)&tmp)) {
4215 /* Nickname is alredy being watched for this client */
4216 silc_server_command_send_status_data(cmd, SILC_COMMAND_WATCH,
4217 SILC_STATUS_ERR_NO_SUCH_NICK, 0,
4218 2, nick, del_nick_len);
4223 /* Delete the nickname from the watcher list. */
4224 silc_hash_table_del_by_context(server->watcher_list, hash, client);
4226 /* Now check whether there still exists entries with this key, if not
4227 then free the key to not leak memory. */
4228 if (!silc_hash_table_find(server->watcher_list, hash, NULL, NULL))
4233 /* Add/del public key */
4236 SilcArgumentPayload pkargs;
4238 SilcPublicKey public_key, pkkey;
4241 silc_server_command_send_status_reply(cmd, SILC_COMMAND_WATCH,
4242 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
4247 /* Get the argument from the Argument List Payload */
4248 SILC_GET16_MSB(pkargc, pk);
4249 pkargs = silc_argument_payload_parse(pk + 2, pk_len - 2, pkargc);
4251 silc_server_command_send_status_reply(cmd, SILC_COMMAND_WATCH,
4252 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
4257 pk = silc_argument_get_next_arg(pkargs, &type, &pk_len);
4259 if (!silc_public_key_payload_decode(pk, pk_len, &public_key))
4265 /* Add public key to watch list */
4267 /* Check whether this client is already watching this public key */
4268 if (silc_hash_table_find_by_context(server->watcher_list_pk,
4269 public_key, client, NULL)) {
4270 silc_pkcs_public_key_free(public_key);
4271 silc_server_command_send_status_reply(
4272 cmd, SILC_COMMAND_WATCH,
4273 SILC_STATUS_ERR_NICKNAME_IN_USE, 0);
4277 /* Get the public key from the watcher list and use the same key in
4278 new entries as well. If key doesn't exist then create it. */
4280 if (!silc_hash_table_find(server->watcher_list_pk, public_key,
4281 (void *)&pkkey, NULL))
4284 silc_pkcs_public_key_free(public_key);
4286 /* Add the client to the watcher list with the specified public
4288 silc_hash_table_add(server->watcher_list_pk, pkkey, client);
4290 } else if (type == 0x01) {
4291 /* Delete public key from watch list */
4293 /* Check that this client is watching this public key */
4294 if (silc_hash_table_find_by_context(server->watcher_list_pk,
4297 silc_pkcs_public_key_free(public_key);
4298 silc_server_command_send_status_reply(
4299 cmd, SILC_COMMAND_WATCH,
4300 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS, 0);
4304 /* Delete the public key from the watcher list. */
4305 silc_hash_table_del_by_context(server->watcher_list_pk,
4306 public_key, client);
4308 /* Now check whether there still exists entries with this key, if
4309 not then free the key to not leak memory. */
4310 if (!silc_hash_table_find(server->watcher_list_pk, hash, NULL, NULL))
4311 silc_pkcs_public_key_free(pkkey);
4312 silc_pkcs_public_key_free(public_key);
4315 pk = silc_argument_get_next_arg(pkargs, &type, &pk_len);
4320 silc_server_command_send_status_reply(cmd, SILC_COMMAND_WATCH,
4323 /* Distribute the watch list to backup routers too */
4324 if (server->backup) {
4328 cmd->server->stat.commands_sent++;
4330 old_ident = silc_command_get_ident(cmd->payload);
4331 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
4332 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
4333 silc_server_backup_send(server, silc_packet_get_context(cmd->sock),
4334 SILC_PACKET_COMMAND,
4335 cmd->packet->flags, tmpbuf->data,
4336 silc_buffer_len(tmpbuf),
4338 silc_command_set_ident(cmd->payload, old_ident);
4339 silc_buffer_free(tmpbuf);
4343 silc_server_command_free(cmd);
4346 /* Server side of SILCOPER command. Client uses this comand to obtain router
4347 operator privileges to this router. */
4349 SILC_SERVER_CMD_FUNC(silcoper)
4351 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
4352 SilcServer server = cmd->server;
4353 SilcClientEntry client = silc_packet_get_context(cmd->sock);
4354 unsigned char *username = NULL, *auth;
4356 SilcServerConfigAdmin *admin;
4357 SilcIDListData idata = (SilcIDListData)client;
4358 SilcBool result = FALSE;
4359 SilcPublicKey cached_key;
4360 const char *hostname, *ip;
4362 if (client->data.conn_type != SILC_CONN_CLIENT || !client)
4365 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_SILCOPER, cmd, 1, 2);
4367 silc_socket_stream_get_info(silc_packet_stream_get_stream(cmd->sock),
4368 NULL, &hostname, &ip, NULL);
4370 if (server->server_type != SILC_ROUTER) {
4371 silc_server_command_send_status_reply(cmd, SILC_COMMAND_SILCOPER,
4372 SILC_STATUS_ERR_AUTH_FAILED, 0);
4376 /* Get the username */
4377 username = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
4379 silc_server_command_send_status_reply(cmd, SILC_COMMAND_SILCOPER,
4380 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
4385 /* Check username */
4386 username = silc_identifier_check(username, tmp_len, SILC_STRING_UTF8, 128,
4389 silc_server_command_send_status_reply(cmd, SILC_COMMAND_OPER,
4390 SILC_STATUS_ERR_BAD_USERNAME,
4395 /* Get the admin configuration */
4396 admin = silc_server_config_find_admin(server, (char *)ip,
4397 username, client->nickname);
4399 admin = silc_server_config_find_admin(server, (char *)hostname,
4400 username, client->nickname);
4402 silc_server_command_send_status_reply(cmd, SILC_COMMAND_SILCOPER,
4403 SILC_STATUS_ERR_AUTH_FAILED, 0);
4404 SILC_LOG_INFO(("SILCOPER authentication failed for username '%s' by "
4405 "nickname '%s' from %s", username,
4406 client->nickname, hostname));
4411 /* Get the authentication payload */
4412 auth = silc_argument_get_arg_type(cmd->args, 2, &tmp_len);
4414 silc_server_command_send_status_reply(cmd, SILC_COMMAND_SILCOPER,
4415 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
4420 /* Verify the authentication data. If both passphrase and public key
4421 is set then try both of them. */
4422 if (admin->passphrase)
4423 result = silc_auth_verify_data(auth, tmp_len, SILC_AUTH_PASSWORD,
4424 admin->passphrase, admin->passphrase_len,
4425 idata->hash, client->id, SILC_ID_CLIENT);
4426 if (!result && admin->publickeys) {
4428 silc_server_get_public_key(server,
4429 SILC_SKR_USAGE_SERVICE_AUTHORIZATION, admin);
4432 result = silc_auth_verify_data(auth, tmp_len, SILC_AUTH_PUBLIC_KEY,
4433 cached_key, 0, idata->hash,
4434 client->id, SILC_ID_CLIENT);
4437 /* Authentication failed */
4438 silc_server_command_send_status_reply(cmd, SILC_COMMAND_OPER,
4439 SILC_STATUS_ERR_AUTH_FAILED, 0);
4443 /* Client is now router operator */
4444 client->mode |= SILC_UMODE_ROUTER_OPERATOR;
4446 /* Update statistics */
4447 if (SILC_IS_LOCAL(client))
4448 server->stat.my_router_ops++;
4449 if (server->server_type == SILC_ROUTER)
4450 server->stat.router_ops++;
4452 /* Send UMODE change to primary router */
4453 silc_server_send_notify_umode(server, SILC_PRIMARY_ROUTE(server),
4454 SILC_BROADCAST(server), client->id,
4457 /* Check if anyone is watching this nickname */
4458 if (server->server_type == SILC_ROUTER)
4459 silc_server_check_watcher_list(server, client, NULL,
4460 SILC_NOTIFY_TYPE_UMODE_CHANGE);
4462 /* Send reply to the sender */
4463 silc_server_command_send_status_reply(cmd, SILC_COMMAND_SILCOPER,
4467 silc_free(username);
4468 silc_server_command_free(cmd);
4471 /* Server side of command BAN. This is used to manage the ban list of the
4472 channel. To add clients and remove clients from the ban list. */
4474 SILC_SERVER_CMD_FUNC(ban)
4476 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
4477 SilcServer server = cmd->server;
4478 SilcClientEntry client = silc_packet_get_context(cmd->sock);
4479 SilcBuffer list, tmp2;
4480 SilcChannelEntry channel;
4481 SilcChannelClientEntry chl;
4483 unsigned char *tmp_id, *tmp, *atype = NULL;
4484 SilcUInt32 id_len, len, len2;
4485 SilcArgumentPayload args;
4486 SilcHashTableList htl;
4488 SilcUInt16 argc = 0, ident = silc_command_get_ident(cmd->payload);
4489 SilcBufferStruct blist;
4491 if (client->data.conn_type != SILC_CONN_CLIENT || !client)
4494 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_BAN, cmd, 0, 3);
4496 /* Get Channel ID */
4497 if (!silc_argument_get_decoded(cmd->args, 1, SILC_ARGUMENT_ID, &id, NULL)) {
4498 silc_server_command_send_status_reply(cmd, SILC_COMMAND_BAN,
4499 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
4503 /* Get channel entry. The server must know about the channel since the
4504 client is expected to be on the channel. */
4505 channel = silc_idlist_find_channel_by_id(server->local_list,
4506 SILC_ID_GET_ID(id), NULL);
4508 channel = silc_idlist_find_channel_by_id(server->global_list,
4509 SILC_ID_GET_ID(id), NULL);
4511 tmp_id = silc_argument_get_arg_type(cmd->args, 1, &id_len);
4512 silc_server_command_send_status_data(
4513 cmd, SILC_COMMAND_BAN,
4514 SILC_STATUS_ERR_NO_SUCH_CHANNEL_ID,
4515 0, 2, tmp_id, id_len);
4520 /* Check whether this client is on the channel */
4521 if (!silc_server_client_on_channel(client, channel, &chl)) {
4522 tmp_id = silc_argument_get_arg_type(cmd->args, 1, &id_len);
4523 silc_server_command_send_status_data(cmd, SILC_COMMAND_BAN,
4524 SILC_STATUS_ERR_NOT_ON_CHANNEL, 0,
4529 /* The client must be at least channel operator. */
4530 if (!(chl->mode & SILC_CHANNEL_UMODE_CHANOP)) {
4531 tmp_id = silc_argument_get_arg_type(cmd->args, 1, &id_len);
4532 silc_server_command_send_status_data(cmd, SILC_COMMAND_BAN,
4533 SILC_STATUS_ERR_NO_CHANNEL_PRIV, 0,
4538 /* Get the ban information */
4539 tmp = silc_argument_get_arg_type(cmd->args, 3, &len2);
4540 if (tmp && len2 > 2) {
4541 /* Parse the arguments to see they are constructed correctly */
4542 SILC_GET16_MSB(argc, tmp);
4543 args = silc_argument_payload_parse(tmp + 2, len2 - 2, argc);
4545 silc_server_command_send_status_reply(cmd, SILC_COMMAND_BAN,
4546 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
4551 /* Get the type of action */
4552 atype = silc_argument_get_arg_type(cmd->args, 2, &len);
4553 if (atype && len == 1) {
4554 if (atype[0] == 0x00) {
4555 /* Allocate hash table for ban list if it doesn't exist yet */
4556 if (!channel->ban_list)
4558 silc_hash_table_alloc(0, silc_hash_ptr,
4560 silc_server_inviteban_destruct, channel,
4563 /* Check for resource limit */
4564 if (silc_hash_table_count(channel->ban_list) > 64) {
4565 silc_server_command_send_status_reply(cmd, SILC_COMMAND_BAN,
4566 SILC_STATUS_ERR_RESOURCE_LIMIT,
4572 /* Now add or delete the information. */
4573 if (!silc_server_inviteban_process(server, channel->ban_list,
4574 (SilcUInt8)atype[0], args)) {
4575 silc_server_command_send_status_reply(
4576 cmd, SILC_COMMAND_BAN,
4577 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
4582 silc_argument_payload_free(args);
4585 /* Encode ban list */
4587 if (channel->ban_list && silc_hash_table_count(channel->ban_list)) {
4588 list = silc_buffer_alloc_size(2);
4589 silc_buffer_format(list,
4590 SILC_STR_UI_SHORT(silc_hash_table_count(
4591 channel->ban_list)),
4593 silc_hash_table_list(channel->ban_list, &htl);
4594 while (silc_hash_table_get(&htl, (void *)&type, (void *)&tmp2))
4595 list = silc_argument_payload_encode_one(list, tmp2->data,
4596 silc_buffer_len(tmp2), type);
4597 silc_hash_table_list_reset(&htl);
4600 tmp_id = silc_argument_get_arg_type(cmd->args, 1, &id_len);
4602 /* Send BAN notify type to local servers (but not clients) and to
4604 if (atype && tmp && len2) {
4605 silc_buffer_set(&blist, tmp, len2);
4607 /* Send to local servers if we are router */
4608 if (server->server_type == SILC_ROUTER)
4609 silc_server_send_notify_to_channel(server, NULL, channel, FALSE, FALSE,
4610 SILC_NOTIFY_TYPE_BAN, 3,
4613 tmp ? blist.data : NULL,
4614 tmp ? silc_buffer_len(&blist) : 0);
4616 /* Send to network. */
4617 silc_server_send_notify_ban(server, SILC_PRIMARY_ROUTE(server),
4618 SILC_BROADCAST(server), channel, atype,
4622 /* Send the reply back to the client */
4623 silc_server_send_command_reply(server, cmd->sock, SILC_COMMAND_BAN,
4624 SILC_STATUS_OK, 0, ident, 2,
4626 3, list ? list->data : NULL,
4627 list ? silc_buffer_len(list) : 0);
4628 silc_buffer_free(list);
4631 silc_server_command_free(cmd);
4634 /* Server side command of LEAVE. Removes client from a channel. */
4636 SILC_SERVER_CMD_FUNC(leave)
4638 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
4639 SilcServer server = cmd->server;
4640 SilcPacketStream sock = cmd->sock;
4641 SilcClientEntry id_entry = silc_packet_get_context(cmd->sock);
4643 SilcChannelEntry channel;
4647 if (id_entry->data.conn_type != SILC_CONN_CLIENT || !id_entry)
4650 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_LEAVE, cmd, 1, 2);
4652 /* Get Channel ID */
4653 if (!silc_argument_get_decoded(cmd->args, 1, SILC_ARGUMENT_ID, &id, NULL)) {
4654 silc_server_command_send_status_reply(cmd, SILC_COMMAND_LEAVE,
4655 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
4659 /* Get channel entry */
4660 channel = silc_idlist_find_channel_by_id(server->local_list,
4661 SILC_ID_GET_ID(id), NULL);
4663 channel = silc_idlist_find_channel_by_id(server->global_list,
4664 SILC_ID_GET_ID(id), NULL);
4666 tmp = silc_argument_get_arg_type(cmd->args, 1, &len);
4667 silc_server_command_send_status_data(cmd, SILC_COMMAND_LEAVE,
4668 SILC_STATUS_ERR_NO_SUCH_CHANNEL_ID,
4674 /* Check whether this client is on the channel */
4675 if (!silc_server_client_on_channel(id_entry, channel, NULL)) {
4676 tmp = silc_argument_get_arg_type(cmd->args, 1, &len);
4677 silc_server_command_send_status_data(cmd, SILC_COMMAND_LEAVE,
4678 SILC_STATUS_ERR_NOT_ON_CHANNEL, 0,
4683 /* Notify routers that they should remove this client from their list
4684 of clients on the channel. Send LEAVE notify type. */
4685 silc_server_send_notify_leave(server, SILC_PRIMARY_ROUTE(server),
4686 SILC_BROADCAST(server), channel, id_entry->id);
4688 tmp = silc_argument_get_arg_type(cmd->args, 1, &len);
4689 silc_server_command_send_status_data(cmd, SILC_COMMAND_LEAVE,
4690 SILC_STATUS_OK, 0, 2, tmp, len);
4692 /* Remove client from channel */
4693 if (!silc_server_remove_from_one_channel(server, sock, channel, id_entry,
4695 /* If the channel does not exist anymore we won't send anything */
4698 if (!(channel->mode & SILC_CHANNEL_MODE_PRIVKEY)) {
4699 /* Re-generate channel key */
4700 if (!silc_server_create_channel_key(server, channel, 0))
4703 /* Send the channel key */
4704 silc_server_send_channel_key(server, NULL, channel,
4705 server->server_type == SILC_ROUTER ?
4706 FALSE : !server->standalone);
4710 silc_server_command_free(cmd);
4713 /* Server side of command USERS. Resolves clients and their USERS currently
4714 joined on the requested channel. The list of Client ID's and their modes
4715 on the channel is sent back. */
4717 SILC_SERVER_CMD_FUNC(users)
4719 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
4720 SilcServer server = cmd->server;
4721 SilcIDListData idata = silc_packet_get_context(cmd->sock);
4722 SilcChannelEntry channel;
4725 unsigned char *channel_id;
4726 SilcUInt32 channel_id_len;
4727 SilcBuffer client_id_list;
4728 SilcBuffer client_mode_list;
4729 unsigned char lc[4];
4730 SilcUInt32 list_count = 0;
4731 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
4732 char *channel_name, *channel_namec = NULL;
4734 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_USERS, cmd, 1, 2);
4736 /* Get Channel ID */
4737 channel_id = silc_argument_get_arg_type(cmd->args, 1, &channel_id_len);
4739 /* Get channel name */
4740 channel_name = silc_argument_get_arg_type(cmd->args, 2, NULL);
4742 if (!channel_id && !channel_name) {
4743 silc_server_command_send_status_reply(cmd, SILC_COMMAND_USERS,
4744 SILC_STATUS_ERR_NO_CHANNEL_ID, 0);
4748 /* Check channel name */
4750 channel_namec = silc_channel_name_check(channel_name, strlen(channel_name),
4751 SILC_STRING_UTF8, 256, NULL);
4752 if (!channel_namec) {
4753 silc_server_command_send_status_reply(cmd, SILC_COMMAND_USERS,
4754 SILC_STATUS_ERR_BAD_CHANNEL, 0);
4759 /* Check Channel ID */
4761 if (!silc_id_payload_parse_id(channel_id, channel_id_len, &id)) {
4762 silc_server_command_send_status_data(cmd, SILC_COMMAND_USERS,
4763 SILC_STATUS_ERR_BAD_CHANNEL_ID, 0,
4764 2, channel_id, channel_id_len);
4769 /* If we are server and we don't know about this channel we will send
4770 the command to our router. If we know about the channel then we also
4771 have the list of users already. */
4773 channel = silc_idlist_find_channel_by_id(server->local_list,
4774 SILC_ID_GET_ID(id), NULL);
4776 channel = silc_idlist_find_channel_by_name(server->local_list,
4777 channel_namec, NULL);
4779 if (!channel || (!server->standalone && (channel->disabled ||
4780 !channel->users_resolved))) {
4781 if (server->server_type != SILC_ROUTER && !server->standalone &&
4786 cmd->server->stat.commands_sent++;
4788 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
4789 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
4791 /* Send USERS command */
4792 silc_server_packet_send(server, SILC_PRIMARY_ROUTE(server),
4793 SILC_PACKET_COMMAND, cmd->packet->flags,
4794 tmpbuf->data, silc_buffer_len(tmpbuf));
4796 /* Reprocess this packet after received reply */
4797 silc_server_command_pending(server, SILC_COMMAND_USERS,
4798 silc_command_get_ident(cmd->payload),
4799 silc_server_command_users,
4800 silc_server_command_dup(cmd));
4801 cmd->pending = TRUE;
4802 silc_command_set_ident(cmd->payload, ident);
4803 silc_buffer_free(tmpbuf);
4807 /* Check the global list as well. */
4809 channel = silc_idlist_find_channel_by_id(server->global_list,
4810 SILC_ID_GET_ID(id), NULL);
4812 channel = silc_idlist_find_channel_by_name(server->global_list,
4813 channel_namec, NULL);
4815 /* Channel really does not exist */
4817 silc_server_command_send_status_data(
4818 cmd, SILC_COMMAND_USERS,
4819 SILC_STATUS_ERR_NO_SUCH_CHANNEL_ID, 0,
4820 2, channel_id, channel_id_len);
4822 silc_server_command_send_status_data(
4823 cmd, SILC_COMMAND_USERS,
4824 SILC_STATUS_ERR_NO_SUCH_CHANNEL, 0,
4825 2, channel_name, strlen(channel_name));
4830 /* If the channel is private or secret do not send anything, unless the
4831 user requesting this command is on the channel or is server */
4832 if (idata->conn_type == SILC_CONN_CLIENT) {
4833 if (channel->mode & (SILC_CHANNEL_MODE_PRIVATE | SILC_CHANNEL_MODE_SECRET)
4834 && !silc_server_client_on_channel((SilcClientEntry)idata, channel,
4836 silc_server_command_send_status_data(cmd, SILC_COMMAND_USERS,
4837 SILC_STATUS_ERR_NO_SUCH_CHANNEL, 0,
4838 2, channel->channel_name,
4839 strlen(channel->channel_name));
4844 /* Get the users list */
4845 if (!silc_server_get_users_on_channel(server, channel, &client_id_list,
4846 &client_mode_list, &list_count)) {
4848 client_id_list = NULL;
4849 client_mode_list = NULL;
4853 SILC_PUT32_MSB(list_count, lc);
4856 idp = silc_id_payload_encode(channel->id, SILC_ID_CHANNEL);
4857 silc_server_send_command_reply(server, cmd->sock, SILC_COMMAND_USERS,
4858 SILC_STATUS_OK, 0, ident, 4,
4859 2, idp->data, silc_buffer_len(idp),
4862 client_id_list->data : NULL,
4864 silc_buffer_len(client_id_list) : 0,
4865 5, client_mode_list ?
4866 client_mode_list->data : NULL,
4868 silc_buffer_len(client_mode_list) : 0);
4869 silc_buffer_free(idp);
4871 silc_buffer_free(client_id_list);
4872 if (client_mode_list)
4873 silc_buffer_free(client_mode_list);
4876 silc_free(channel_namec);
4877 silc_server_command_free(cmd);
4880 /* Server side of command GETKEY. This fetches the client's public key
4881 from the server where to the client is connected. */
4883 SILC_SERVER_CMD_FUNC(getkey)
4885 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
4886 SilcServer server = cmd->server;
4887 SilcClientEntry client;
4888 SilcServerEntry server_entry;
4889 SilcClientID client_id;
4890 SilcServerID server_id;
4891 SilcIDPayload idp = NULL;
4892 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
4895 SilcBuffer pk = NULL;
4897 SilcPublicKey public_key;
4899 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
4901 silc_server_command_send_status_reply(cmd, SILC_COMMAND_GETKEY,
4902 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
4906 idp = silc_id_payload_parse(tmp, tmp_len);
4908 silc_server_command_send_status_reply(cmd, SILC_COMMAND_GETKEY,
4909 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
4914 id_type = silc_id_payload_get_type(idp);
4915 if (id_type == SILC_ID_CLIENT) {
4916 silc_id_payload_get_id(idp, &client_id, sizeof(client_id));
4918 /* If the client is not found from local list there is no chance it
4919 would be locally connected client so send the command further. */
4920 client = silc_idlist_find_client_by_id(server->local_list,
4921 &client_id, TRUE, NULL);
4923 client = silc_idlist_find_client_by_id(server->global_list,
4924 &client_id, TRUE, NULL);
4926 if ((!client && !cmd->pending && !server->standalone) ||
4927 (client && !client->connection && !cmd->pending &&
4928 !(client->mode & SILC_UMODE_DETACHED)) ||
4929 (client && !client->data.public_key && !cmd->pending)) {
4931 SilcUInt16 old_ident;
4932 SilcPacketStream dest_sock;
4934 dest_sock = silc_server_get_client_route(server, NULL, 0,
4935 &client_id, NULL, NULL);
4940 cmd->server->stat.commands_sent++;
4942 old_ident = silc_command_get_ident(cmd->payload);
4943 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
4944 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
4946 silc_server_packet_send(server, dest_sock,
4947 SILC_PACKET_COMMAND, cmd->packet->flags,
4948 tmpbuf->data, silc_buffer_len(tmpbuf));
4950 /* Reprocess this packet after received reply from router */
4951 silc_server_command_pending(server, SILC_COMMAND_GETKEY,
4952 silc_command_get_ident(cmd->payload),
4953 silc_server_command_getkey,
4954 silc_server_command_dup(cmd));
4955 cmd->pending = TRUE;
4956 silc_command_set_ident(cmd->payload, old_ident);
4957 silc_buffer_free(tmpbuf);
4962 silc_server_command_send_status_data(cmd, SILC_COMMAND_GETKEY,
4963 SILC_STATUS_ERR_NO_SUCH_CLIENT_ID,
4964 0, 2, tmp, tmp_len);
4968 /* The client is locally connected, just get the public key and
4969 send it back. If they key does not exist then do not send it,
4970 send just OK reply */
4971 public_key = client->data.public_key;
4973 pk = silc_public_key_payload_encode(public_key);
4974 } else if (id_type == SILC_ID_SERVER) {
4975 silc_id_payload_get_id(idp, &server_id, sizeof(server_id));
4977 /* If the server is not found from local list there is no chance it
4978 would be locally connected server so send the command further. */
4979 server_entry = silc_idlist_find_server_by_id(server->local_list,
4980 &server_id, TRUE, NULL);
4982 server_entry = silc_idlist_find_server_by_id(server->global_list,
4983 &server_id, TRUE, NULL);
4985 if (server_entry != server->id_entry &&
4986 ((!server_entry && !cmd->pending && !server->standalone) ||
4987 (server_entry && !server_entry->connection && !cmd->pending &&
4988 !server->standalone) ||
4989 (server_entry && !server_entry->data.public_key && !cmd->pending &&
4990 !server->standalone))) {
4992 SilcUInt16 old_ident;
4995 cmd->server->stat.commands_sent++;
4997 old_ident = silc_command_get_ident(cmd->payload);
4998 silc_command_set_ident(cmd->payload, ++server->cmd_ident);
4999 tmpbuf = silc_command_payload_encode_payload(cmd->payload);
5001 silc_server_packet_send(server, SILC_PRIMARY_ROUTE(server),
5002 SILC_PACKET_COMMAND, cmd->packet->flags,
5003 tmpbuf->data, silc_buffer_len(tmpbuf));
5005 /* Reprocess this packet after received reply from router */
5006 silc_server_command_pending(server, SILC_COMMAND_GETKEY,
5007 silc_command_get_ident(cmd->payload),
5008 silc_server_command_getkey,
5009 silc_server_command_dup(cmd));
5010 cmd->pending = TRUE;
5011 silc_command_set_ident(cmd->payload, old_ident);
5012 silc_buffer_free(tmpbuf);
5016 if (!server_entry) {
5017 silc_server_command_send_status_data(cmd, SILC_COMMAND_GETKEY,
5018 SILC_STATUS_ERR_NO_SUCH_SERVER_ID,
5019 0, 2, tmp, tmp_len);
5023 /* If they key does not exist then do not send it, send just OK reply */
5024 public_key = (!server_entry->data.public_key ?
5025 (server_entry == server->id_entry ? server->public_key :
5026 NULL) : server_entry->data.public_key);
5028 pk = silc_public_key_payload_encode(public_key);
5033 tmp = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
5034 silc_server_send_command_reply(server, cmd->sock, SILC_COMMAND_GETKEY,
5035 SILC_STATUS_OK, 0, ident, 2,
5037 3, pk ? pk->data : NULL,
5038 pk ? silc_buffer_len(pk) : 0);
5042 silc_id_payload_free(idp);
5043 silc_buffer_free(pk);
5044 silc_server_command_free(cmd);
5047 /* Server side of command SERVICE. */
5048 /* XXX currently this just sends empty reply back */
5050 SILC_SERVER_CMD_FUNC(service)
5052 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
5053 SilcServer server = cmd->server;
5054 SilcUInt32 tmp_len, auth_len;
5055 unsigned char *service_name, *auth;
5056 SilcBool send_list = FALSE;
5057 SilcUInt16 ident = silc_command_get_ident(cmd->payload);
5059 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_SERVICE, cmd, 0, 256);
5061 /* Get requested service */
5062 service_name = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
5063 if (service_name && tmp_len) {
5064 /* Verify service name */
5065 if (!silc_identifier_verify(service_name, tmp_len,
5066 SILC_STRING_UTF8, 256)) {
5067 silc_server_command_send_status_reply(cmd, SILC_COMMAND_SERVICE,
5068 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
5074 /* Get authentication payload if present */
5075 auth = silc_argument_get_arg_type(cmd->args, 2, &auth_len);
5083 /* Send our service list back */
5084 silc_server_send_command_reply(server, cmd->sock, SILC_COMMAND_SERVICE,
5085 SILC_STATUS_OK, 0, ident, 0);
5088 silc_server_command_free(cmd);
5092 /* Private range commands, specific to this implementation */
5094 /* Server side command of CONNECT. Connects us to the specified remote
5095 server or router. */
5097 SILC_SERVER_CMD_FUNC(connect)
5099 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
5100 SilcServer server = cmd->server;
5101 SilcClientEntry client = silc_packet_get_context(cmd->sock);
5102 unsigned char *tmp, *host;
5104 SilcUInt32 port = SILC_PORT;
5106 if (client->data.conn_type != SILC_CONN_CLIENT || !client)
5109 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_PRIV_CONNECT, cmd, 1, 2);
5111 /* Check whether client has the permissions. */
5112 if (!(client->mode & SILC_UMODE_SERVER_OPERATOR) &&
5113 !(client->mode & SILC_UMODE_ROUTER_OPERATOR)) {
5114 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_CONNECT,
5115 SILC_STATUS_ERR_NO_SERVER_PRIV, 0);
5119 if (server->server_type == SILC_ROUTER && !server->backup_router &&
5120 client->mode & SILC_UMODE_SERVER_OPERATOR) {
5121 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_CONNECT,
5122 SILC_STATUS_ERR_NO_ROUTER_PRIV, 0);
5126 /* Get the remote server */
5127 host = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
5129 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_CONNECT,
5130 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
5136 tmp = silc_argument_get_arg_type(cmd->args, 2, &tmp_len);
5138 SILC_GET32_MSB(port, tmp);
5140 /* Create the connection. It is done with timeout and is async. */
5141 silc_server_create_connection(server, FALSE, host, port, NULL, NULL);
5143 /* Send reply to the sender */
5144 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_CONNECT,
5148 silc_server_command_free(cmd);
5151 /* Server side command of CLOSE. Closes connection to a specified server. */
5153 SILC_SERVER_CMD_FUNC(close)
5155 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
5156 SilcServer server = cmd->server;
5157 SilcClientEntry client = silc_packet_get_context(cmd->sock);
5158 SilcServerEntry server_entry;
5159 SilcPacketStream sock;
5162 unsigned char *name;
5163 SilcUInt32 port = SILC_PORT;
5165 if (client->data.conn_type != SILC_CONN_CLIENT || !client)
5168 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_PRIV_CLOSE, cmd, 1, 2);
5170 /* Check whether client has the permissions. */
5171 if (!(client->mode & SILC_UMODE_SERVER_OPERATOR) &&
5172 !(client->mode & SILC_UMODE_ROUTER_OPERATOR)) {
5173 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_CLOSE,
5174 SILC_STATUS_ERR_NO_SERVER_PRIV,
5179 /* Get the remote server */
5180 name = silc_argument_get_arg_type(cmd->args, 1, &tmp_len);
5182 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_CLOSE,
5183 SILC_STATUS_ERR_NOT_ENOUGH_PARAMS,
5189 tmp = silc_argument_get_arg_type(cmd->args, 2, &tmp_len);
5191 SILC_GET32_MSB(port, tmp);
5193 server_entry = silc_idlist_find_server_by_conn(server->local_list,
5194 name, port, TRUE, NULL);
5196 server_entry = silc_idlist_find_server_by_conn(server->global_list,
5197 name, port, TRUE, NULL);
5198 if (!server_entry) {
5199 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_CLOSE,
5200 SILC_STATUS_ERR_NO_SERVER_ID, 0);
5204 if (server_entry == server->id_entry) {
5205 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_CLOSE,
5206 SILC_STATUS_ERR_NO_SERVER_ID, 0);
5210 /* Send reply to the sender */
5211 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_CLOSE,
5214 /* Close the connection to the server */
5215 sock = server_entry->connection;
5217 if (server_entry->server_type == SILC_BACKUP_ROUTER) {
5218 server->backup_closed = TRUE;
5219 silc_server_backup_del(server, server_entry);
5222 server->backup_noswitch = TRUE;
5223 if (server->router == server_entry) {
5224 server->id_entry->router = NULL;
5225 server->router = NULL;
5226 server->standalone = TRUE;
5228 silc_server_disconnect_remote(server, sock,
5229 SILC_STATUS_ERR_BANNED_FROM_SERVER,
5230 "Closed by administrator");
5231 silc_server_free_sock_user_data(server, sock, NULL);
5232 server->backup_noswitch = FALSE;
5235 silc_server_command_free(cmd);
5238 /* Server side command of SHUTDOWN. Shutdowns the server and closes all
5239 active connections. */
5241 SILC_SERVER_CMD_FUNC(shutdown)
5243 SilcServerCommandContext cmd = (SilcServerCommandContext)context;
5244 SilcServer server = cmd->server;
5245 SilcClientEntry client = silc_packet_get_context(cmd->sock);
5247 if (client->data.conn_type != SILC_CONN_CLIENT || !client)
5250 SILC_SERVER_COMMAND_CHECK(SILC_COMMAND_PRIV_SHUTDOWN, cmd, 0, 0);
5252 /* Check whether client has the permission. */
5253 if (!(client->mode & SILC_UMODE_SERVER_OPERATOR) &&
5254 !(client->mode & SILC_UMODE_ROUTER_OPERATOR)) {
5255 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_SHUTDOWN,
5256 SILC_STATUS_ERR_NO_SERVER_PRIV,
5261 /* Send reply to the sender */
5262 silc_server_command_send_status_reply(cmd, SILC_COMMAND_PRIV_SHUTDOWN,
5265 /* Then, gracefully, or not, bring the server down. */
5266 silc_server_stop(server);
5270 silc_server_command_free(cmd);