mirror of
https://github.com/clementine-player/Clementine
synced 2024-12-16 11:19:18 +01:00
1528 lines
43 KiB
C++
1528 lines
43 KiB
C++
/*
|
|
Copyright (c) 2005-2009 by Jakob Schroeter <js@camaya.net>
|
|
This file is part of the gloox library. http://camaya.net/gloox
|
|
|
|
This software is distributed under a license. The full license
|
|
agreement can be found in the file LICENSE in this distribution.
|
|
This software may not be copied, modified, sold or distributed
|
|
other than expressed in the named license agreement.
|
|
|
|
This software is distributed without any warranty.
|
|
*/
|
|
|
|
|
|
|
|
#include "config.h"
|
|
|
|
#include "clientbase.h"
|
|
#include "connectionbase.h"
|
|
#include "tlsbase.h"
|
|
#include "compressionbase.h"
|
|
#include "connectiontcpclient.h"
|
|
#include "disco.h"
|
|
#include "messagesessionhandler.h"
|
|
#include "tag.h"
|
|
#include "iq.h"
|
|
#include "message.h"
|
|
#include "subscription.h"
|
|
#include "presence.h"
|
|
#include "connectionlistener.h"
|
|
#include "iqhandler.h"
|
|
#include "messagehandler.h"
|
|
#include "presencehandler.h"
|
|
#include "rosterlistener.h"
|
|
#include "subscriptionhandler.h"
|
|
#include "loghandler.h"
|
|
#include "taghandler.h"
|
|
#include "mucinvitationhandler.h"
|
|
#include "mucroom.h"
|
|
#include "jid.h"
|
|
#include "base64.h"
|
|
#include "error.h"
|
|
#include "md5.h"
|
|
#include "util.h"
|
|
#include "tlsdefault.h"
|
|
#include "compressionzlib.h"
|
|
#include "stanzaextensionfactory.h"
|
|
#include "eventhandler.h"
|
|
#include "event.h"
|
|
|
|
#include <cstdlib>
|
|
#include <string>
|
|
#include <map>
|
|
#include <list>
|
|
#include <algorithm>
|
|
#include <cmath>
|
|
#include <ctime>
|
|
#include <cstdio>
|
|
|
|
#include <string.h> // for memset()
|
|
|
|
#if defined( _WIN32 ) && !defined( __SYMBIAN32__ )
|
|
#include <tchar.h>
|
|
#endif
|
|
|
|
namespace gloox
|
|
{
|
|
|
|
// ---- ClientBase::Ping ----
|
|
ClientBase::Ping::Ping()
|
|
: StanzaExtension( ExtPing )
|
|
{
|
|
}
|
|
|
|
ClientBase::Ping::~Ping()
|
|
{
|
|
}
|
|
|
|
const std::string& ClientBase::Ping::filterString() const
|
|
{
|
|
static const std::string filter = "/iq/ping[@xmlns='" + XMLNS_XMPP_PING + "']";
|
|
return filter;
|
|
}
|
|
// ---- ~ClientBase::Ping ----
|
|
|
|
// ---- ClientBase ----
|
|
ClientBase::ClientBase( const std::string& ns, const std::string& server, int port )
|
|
: m_connection( 0 ), m_encryption( 0 ), m_compression( 0 ), m_disco( 0 ), m_namespace( ns ),
|
|
m_xmllang( "en" ), m_server( server ), m_compressionActive( false ), m_encryptionActive( false ),
|
|
m_compress( true ), m_authed( false ), m_block( false ), m_sasl( true ), m_tls( TLSOptional ), m_port( port ),
|
|
m_availableSaslMechs( SaslMechAll ),
|
|
m_statisticsHandler( 0 ), m_mucInvitationHandler( 0 ),
|
|
m_messageSessionHandlerChat( 0 ), m_messageSessionHandlerGroupchat( 0 ),
|
|
m_messageSessionHandlerHeadline( 0 ), m_messageSessionHandlerNormal( 0 ),
|
|
m_parser( this ), m_seFactory( 0 ), m_authError( AuthErrorUndefined ),
|
|
m_streamError( StreamErrorUndefined ), m_streamErrorAppCondition( 0 ),
|
|
m_selectedSaslMech( SaslMechNone ), m_autoMessageSession( false )
|
|
{
|
|
init();
|
|
}
|
|
|
|
ClientBase::ClientBase( const std::string& ns, const std::string& password,
|
|
const std::string& server, int port )
|
|
: m_connection( 0 ), m_encryption( 0 ), m_compression( 0 ), m_disco( 0 ), m_namespace( ns ),
|
|
m_password( password ),
|
|
m_xmllang( "en" ), m_server( server ), m_compressionActive( false ), m_encryptionActive( false ),
|
|
m_compress( true ), m_authed( false ), m_block( false ), m_sasl( true ), m_tls( TLSOptional ),
|
|
m_port( port ), m_availableSaslMechs( SaslMechAll ),
|
|
m_statisticsHandler( 0 ), m_mucInvitationHandler( 0 ),
|
|
m_messageSessionHandlerChat( 0 ), m_messageSessionHandlerGroupchat( 0 ),
|
|
m_messageSessionHandlerHeadline( 0 ), m_messageSessionHandlerNormal( 0 ),
|
|
m_parser( this ), m_seFactory( 0 ), m_authError( AuthErrorUndefined ),
|
|
m_streamError( StreamErrorUndefined ), m_streamErrorAppCondition( 0 ),
|
|
m_selectedSaslMech( SaslMechNone ), m_autoMessageSession( false )
|
|
{
|
|
init();
|
|
}
|
|
|
|
void ClientBase::init()
|
|
{
|
|
if( !m_disco )
|
|
{
|
|
m_disco = new Disco( this );
|
|
m_disco->setVersion( "based on gloox", GLOOX_VERSION );
|
|
m_disco->addFeature( XMLNS_XMPP_PING );
|
|
}
|
|
|
|
registerStanzaExtension( new Error() );
|
|
registerStanzaExtension( new Ping() );
|
|
registerIqHandler( this, ExtPing );
|
|
|
|
m_streamError = StreamErrorUndefined;
|
|
m_block = false;
|
|
memset( &m_stats, 0, sizeof( m_stats ) );
|
|
cleanup();
|
|
}
|
|
|
|
ClientBase::~ClientBase()
|
|
{
|
|
delete m_connection;
|
|
delete m_encryption;
|
|
delete m_compression;
|
|
delete m_seFactory;
|
|
m_seFactory = 0; // to avoid usage when Disco gets deleted below
|
|
delete m_disco;
|
|
m_disco = 0;
|
|
|
|
util::clearList( m_messageSessions );
|
|
|
|
PresenceJidHandlerList::const_iterator it1 = m_presenceJidHandlers.begin();
|
|
for( ; it1 != m_presenceJidHandlers.end(); ++it1 )
|
|
delete (*it1).jid;
|
|
}
|
|
|
|
ConnectionError ClientBase::recv( int timeout )
|
|
{
|
|
if( !m_connection || m_connection->state() == StateDisconnected )
|
|
return ConnNotConnected;
|
|
|
|
return m_connection->recv( timeout );
|
|
}
|
|
|
|
bool ClientBase::connect( bool block )
|
|
{
|
|
if( m_server.empty() )
|
|
return false;
|
|
|
|
if( !m_connection )
|
|
m_connection = new ConnectionTCPClient( this, m_logInstance, m_server, m_port );
|
|
|
|
if( m_connection->state() >= StateConnecting )
|
|
return true;
|
|
|
|
if( !m_encryption )
|
|
m_encryption = getDefaultEncryption();
|
|
|
|
if( !m_compression )
|
|
m_compression = getDefaultCompression();
|
|
|
|
m_logInstance.dbg( LogAreaClassClientbase, "This is gloox " + GLOOX_VERSION + ", connecting to "
|
|
+ m_server + ":" + util::int2string( m_port ) + "..." );
|
|
m_block = block;
|
|
ConnectionError ret = m_connection->connect();
|
|
if( ret != ConnNoError )
|
|
return false;
|
|
|
|
if( m_block )
|
|
m_connection->receive();
|
|
|
|
return true;
|
|
}
|
|
|
|
void ClientBase::handleTag( Tag* tag )
|
|
{
|
|
if( !tag )
|
|
{
|
|
logInstance().dbg( LogAreaClassClientbase, "stream closed" );
|
|
disconnect( ConnStreamClosed );
|
|
return;
|
|
}
|
|
|
|
logInstance().dbg( LogAreaXmlIncoming, tag->xml() );
|
|
++m_stats.totalStanzasReceived;
|
|
|
|
if( tag->name() == "stream" && tag->xmlns() == XMLNS_STREAM )
|
|
{
|
|
const std::string& version = tag->findAttribute( "version" );
|
|
if( !checkStreamVersion( version ) )
|
|
{
|
|
logInstance().dbg( LogAreaClassClientbase, "This server is not XMPP-compliant"
|
|
" (it does not send a 'version' attribute). Please fix it or try another one.\n" );
|
|
disconnect( ConnStreamVersionError );
|
|
return;
|
|
}
|
|
|
|
m_sid = tag->findAttribute( "id" );
|
|
handleStartNode();
|
|
}
|
|
else if( tag->name() == "error" && tag->xmlns() == XMLNS_STREAM )
|
|
{
|
|
handleStreamError( tag );
|
|
disconnect( ConnStreamError );
|
|
}
|
|
else
|
|
{
|
|
if( !handleNormalNode( tag ) )
|
|
{
|
|
if( tag->xmlns().empty() || tag->xmlns() == XMLNS_CLIENT )
|
|
{
|
|
if( tag->name() == "iq" )
|
|
{
|
|
IQ iq( tag );
|
|
m_seFactory->addExtensions( iq, tag );
|
|
notifyIqHandlers( iq );
|
|
++m_stats.iqStanzasReceived;
|
|
}
|
|
else if( tag->name() == "message" )
|
|
{
|
|
Message msg( tag );
|
|
m_seFactory->addExtensions( msg, tag );
|
|
notifyMessageHandlers( msg );
|
|
++m_stats.messageStanzasReceived;
|
|
}
|
|
else if( tag->name() == "presence" )
|
|
{
|
|
const std::string& type = tag->findAttribute( TYPE );
|
|
if( type == "subscribe" || type == "unsubscribe"
|
|
|| type == "subscribed" || type == "unsubscribed" )
|
|
{
|
|
Subscription sub( tag );
|
|
m_seFactory->addExtensions( sub, tag );
|
|
notifySubscriptionHandlers( sub );
|
|
++m_stats.s10nStanzasReceived;
|
|
}
|
|
else
|
|
{
|
|
Presence pres( tag );
|
|
m_seFactory->addExtensions( pres, tag );
|
|
notifyPresenceHandlers( pres );
|
|
++m_stats.presenceStanzasReceived;
|
|
}
|
|
}
|
|
else
|
|
m_logInstance.err( LogAreaClassClientbase, "Received invalid stanza." );
|
|
}
|
|
else
|
|
{
|
|
notifyTagHandlers( tag );
|
|
}
|
|
}
|
|
}
|
|
|
|
if( m_statisticsHandler )
|
|
m_statisticsHandler->handleStatistics( getStatistics() );
|
|
}
|
|
|
|
void ClientBase::handleCompressedData( const std::string& data )
|
|
{
|
|
if( m_encryption && m_encryptionActive )
|
|
m_encryption->encrypt( data );
|
|
else if( m_connection )
|
|
m_connection->send( data );
|
|
else
|
|
m_logInstance.err( LogAreaClassClientbase, "Compression finished, but chain broken" );
|
|
}
|
|
|
|
void ClientBase::handleDecompressedData( const std::string& data )
|
|
{
|
|
parse( data );
|
|
}
|
|
|
|
void ClientBase::handleEncryptedData( const TLSBase* /*base*/, const std::string& data )
|
|
{
|
|
if( m_connection )
|
|
m_connection->send( data );
|
|
else
|
|
m_logInstance.err( LogAreaClassClientbase, "Encryption finished, but chain broken" );
|
|
}
|
|
|
|
void ClientBase::handleDecryptedData( const TLSBase* /*base*/, const std::string& data )
|
|
{
|
|
if( m_compression && m_compressionActive )
|
|
m_compression->decompress( data );
|
|
else
|
|
parse( data );
|
|
}
|
|
|
|
void ClientBase::handleHandshakeResult( const TLSBase* /*base*/, bool success, CertInfo &certinfo )
|
|
{
|
|
if( success )
|
|
{
|
|
if( !notifyOnTLSConnect( certinfo ) )
|
|
{
|
|
logInstance().err( LogAreaClassClientbase, "Server's certificate rejected!" );
|
|
disconnect( ConnTlsFailed );
|
|
}
|
|
else
|
|
{
|
|
logInstance().dbg( LogAreaClassClientbase, "connection encryption active" );
|
|
header();
|
|
}
|
|
}
|
|
else
|
|
{
|
|
logInstance().err( LogAreaClassClientbase, "TLS handshake failed!" );
|
|
disconnect( ConnTlsFailed );
|
|
}
|
|
}
|
|
|
|
void ClientBase::handleReceivedData( const ConnectionBase* /*connection*/, const std::string& data )
|
|
{
|
|
if( m_encryption && m_encryptionActive )
|
|
m_encryption->decrypt( data );
|
|
else if( m_compression && m_compressionActive )
|
|
m_compression->decompress( data );
|
|
else
|
|
parse( data );
|
|
}
|
|
|
|
void ClientBase::handleConnect( const ConnectionBase* /*connection*/ )
|
|
{
|
|
header();
|
|
}
|
|
|
|
void ClientBase::handleDisconnect( const ConnectionBase* /*connection*/, ConnectionError reason )
|
|
{
|
|
if( m_connection )
|
|
m_connection->cleanup();
|
|
|
|
if( m_encryption )
|
|
m_encryption->cleanup();
|
|
|
|
if( m_compression )
|
|
m_compression->cleanup();
|
|
|
|
m_encryptionActive = false;
|
|
m_compressionActive = false;
|
|
|
|
notifyOnDisconnect( reason );
|
|
}
|
|
|
|
void ClientBase::disconnect( ConnectionError reason )
|
|
{
|
|
if( !m_connection || m_connection->state() < StateConnecting )
|
|
return;
|
|
|
|
if( reason != ConnTlsFailed )
|
|
send( "</stream:stream>" );
|
|
|
|
m_connection->disconnect();
|
|
m_connection->cleanup();
|
|
|
|
if( m_encryption )
|
|
m_encryption->cleanup();
|
|
|
|
if( m_compression )
|
|
m_compression->cleanup();
|
|
|
|
m_encryptionActive = false;
|
|
m_compressionActive = false;
|
|
|
|
notifyOnDisconnect( reason );
|
|
}
|
|
|
|
void ClientBase::parse( const std::string& data )
|
|
{
|
|
std::string copy = data;
|
|
int i = 0;
|
|
if( ( i = m_parser.feed( copy ) ) >= 0 )
|
|
{
|
|
std::string error = "parse error (at pos ";
|
|
error += util::int2string( i );
|
|
error += "): ";
|
|
m_logInstance.err( LogAreaClassClientbase, error + copy );
|
|
Tag* e = new Tag( "stream:error" );
|
|
new Tag( e, "restricted-xml", "xmlns", XMLNS_XMPP_STREAM );
|
|
send( e );
|
|
disconnect( ConnParseError );
|
|
}
|
|
}
|
|
|
|
void ClientBase::header()
|
|
{
|
|
std::string head = "<?xml version='1.0' ?>";
|
|
head += "<stream:stream to='" + m_jid.server() + "' xmlns='" + m_namespace + "' ";
|
|
head += "xmlns:stream='http://etherx.jabber.org/streams' xml:lang='" + m_xmllang + "' ";
|
|
head += "version='" + XMPP_STREAM_VERSION_MAJOR + "." + XMPP_STREAM_VERSION_MINOR + "'>";
|
|
send( head );
|
|
}
|
|
|
|
bool ClientBase::hasTls()
|
|
{
|
|
#if defined( HAVE_GNUTLS ) || defined( HAVE_OPENSSL ) || defined( HAVE_WINTLS )
|
|
return true;
|
|
#else
|
|
return false;
|
|
#endif
|
|
}
|
|
|
|
void ClientBase::startTls()
|
|
{
|
|
send( new Tag( "starttls", XMLNS, XMLNS_STREAM_TLS ) );
|
|
}
|
|
|
|
void ClientBase::setServer( const std::string &server )
|
|
{
|
|
m_server = server;
|
|
if( m_connection )
|
|
m_connection->setServer( server );
|
|
}
|
|
|
|
void ClientBase::setClientCert( const std::string& clientKey, const std::string& clientCerts )
|
|
{
|
|
m_clientKey = clientKey;
|
|
m_clientCerts = clientCerts;
|
|
}
|
|
|
|
void ClientBase::startSASL( SaslMechanism type )
|
|
{
|
|
m_selectedSaslMech = type;
|
|
|
|
Tag* a = new Tag( "auth", XMLNS, XMLNS_STREAM_SASL );
|
|
|
|
switch( type )
|
|
{
|
|
case SaslMechDigestMd5:
|
|
a->addAttribute( "mechanism", "DIGEST-MD5" );
|
|
break;
|
|
case SaslMechPlain:
|
|
{
|
|
a->addAttribute( "mechanism", "PLAIN" );
|
|
|
|
std::string tmp;
|
|
if( m_authzid )
|
|
tmp += m_authzid.bare();
|
|
|
|
tmp += '\0';
|
|
if( !m_authcid.empty() )
|
|
tmp += m_authcid;
|
|
else
|
|
tmp += m_jid.username();
|
|
tmp += '\0';
|
|
tmp += m_password;
|
|
a->setCData( Base64::encode64( tmp ) );
|
|
break;
|
|
}
|
|
case SaslMechAnonymous:
|
|
a->addAttribute( "mechanism", "ANONYMOUS" );
|
|
break;
|
|
case SaslMechExternal:
|
|
a->addAttribute( "mechanism", "EXTERNAL" );
|
|
a->setCData( Base64::encode64( m_authzid ? m_authzid.bare() : m_jid.bare() ) );
|
|
break;
|
|
case SaslMechGssapi:
|
|
{
|
|
#if defined( _WIN32 ) && !defined( __SYMBIAN32__ )
|
|
a->addAttribute( "mechanism", "GSSAPI" );
|
|
// The client calls GSS_Init_sec_context, passing in 0 for
|
|
// input_context_handle (initially) and a targ_name equal to output_name
|
|
// from GSS_Import_Name called with input_name_type of
|
|
// GSS_C_NT_HOSTBASED_SERVICE and input_name_string of
|
|
// "service@hostname" where "service" is the service name specified in
|
|
// the protocol's profile, and "hostname" is the fully qualified host
|
|
// name of the server. The client then responds with the resulting
|
|
// output_token.
|
|
std::string token;
|
|
a->setCData( Base64::encode64( token ) );
|
|
// etc... see gssapi-sasl-draft.txt
|
|
#else
|
|
logInstance().err( LogAreaClassClientbase,
|
|
"SASL GSSAPI is not supported on this platform. You should never see this." );
|
|
#endif
|
|
break;
|
|
}
|
|
case SaslMechNTLM:
|
|
{
|
|
#if defined( _WIN32 ) && !defined( __SYMBIAN32__ )
|
|
a->addAttribute( "mechanism", "NTLM" );
|
|
SEC_WINNT_AUTH_IDENTITY identity, *ident = 0;
|
|
memset( &identity, 0, sizeof( identity ) );
|
|
if( m_jid.username().length() > 0 )
|
|
{
|
|
identity.User = (unsigned char*)m_jid.username().c_str();
|
|
identity.UserLength = (unsigned long)m_jid.username().length();
|
|
identity.Domain = (unsigned char*)m_ntlmDomain.c_str();
|
|
identity.DomainLength = (unsigned long)m_ntlmDomain.length();
|
|
identity.Password = (unsigned char*)m_password.c_str();
|
|
identity.PasswordLength = (unsigned long)m_password.length();
|
|
identity.Flags = SEC_WINNT_AUTH_IDENTITY_UNICODE;
|
|
ident = &identity;
|
|
}
|
|
AcquireCredentialsHandle( 0, _T( "NTLM" ), SECPKG_CRED_OUTBOUND, 0, ident, 0, 0, &m_credHandle, 0 );
|
|
#else
|
|
logInstance().err( LogAreaClassClientbase,
|
|
"SASL NTLM is not supported on this platform. You should never see this." );
|
|
#endif
|
|
break;
|
|
}
|
|
case SaslMechGoogleToken:
|
|
{
|
|
a->addAttribute("mechanism", "X-GOOGLE-TOKEN");
|
|
std::string tmp;
|
|
tmp += '\0';
|
|
tmp += m_jid.username();
|
|
tmp += '\0';
|
|
tmp += m_password;
|
|
a->setCData( Base64::encode64( tmp ) );
|
|
break;
|
|
}
|
|
default:
|
|
break;
|
|
}
|
|
|
|
send( a );
|
|
}
|
|
|
|
void ClientBase::processSASLChallenge( const std::string& challenge )
|
|
{
|
|
Tag* t = new Tag( "response", XMLNS, XMLNS_STREAM_SASL );
|
|
|
|
const std::string& decoded = Base64::decode64( challenge );
|
|
|
|
switch( m_selectedSaslMech )
|
|
{
|
|
case SaslMechDigestMd5:
|
|
{
|
|
if( !decoded.compare( 0, 7, "rspauth" ) )
|
|
break;
|
|
|
|
std::string realm;
|
|
std::string::size_type end = 0;
|
|
std::string::size_type pos = decoded.find( "realm=" );
|
|
if( pos != std::string::npos )
|
|
{
|
|
end = decoded.find( '"', pos + 7 );
|
|
realm = decoded.substr( pos + 7, end - ( pos + 7 ) );
|
|
}
|
|
else
|
|
realm = m_jid.server();
|
|
|
|
pos = decoded.find( "nonce=" );
|
|
if( pos == std::string::npos )
|
|
return;
|
|
|
|
end = decoded.find( '"', pos + 7 );
|
|
while( decoded[end-1] == '\\' )
|
|
end = decoded.find( '"', end + 1 );
|
|
std::string nonce = decoded.substr( pos + 7, end - ( pos + 7 ) );
|
|
|
|
std::string cnonce;
|
|
char cn[4*8+1];
|
|
for( int i = 0; i < 4; ++i )
|
|
sprintf( cn + i*8, "%08x", rand() );
|
|
cnonce.assign( cn, 4*8 );
|
|
|
|
MD5 md5;
|
|
md5.feed( m_jid.username() );
|
|
md5.feed( ":" );
|
|
md5.feed( realm );
|
|
md5.feed( ":" );
|
|
md5.feed( m_password );
|
|
md5.finalize();
|
|
const std::string& a1_h = md5.binary();
|
|
md5.reset();
|
|
md5.feed( a1_h );
|
|
md5.feed( ":" );
|
|
md5.feed( nonce );
|
|
md5.feed( ":" );
|
|
md5.feed( cnonce );
|
|
md5.finalize();
|
|
const std::string& a1 = md5.hex();
|
|
md5.reset();
|
|
md5.feed( "AUTHENTICATE:xmpp/" );
|
|
md5.feed( m_jid.server() );
|
|
md5.finalize();
|
|
const std::string& a2 = md5.hex();
|
|
md5.reset();
|
|
md5.feed( a1 );
|
|
md5.feed( ":" );
|
|
md5.feed( nonce );
|
|
md5.feed( ":00000001:" );
|
|
md5.feed( cnonce );
|
|
md5.feed( ":auth:" );
|
|
md5.feed( a2 );
|
|
md5.finalize();
|
|
|
|
std::string response = "username=\"";
|
|
response += m_jid.username();
|
|
response += "\",realm=\"";
|
|
response += realm;
|
|
response += "\",nonce=\"";
|
|
response += nonce;
|
|
response += "\",cnonce=\"";
|
|
response += cnonce;
|
|
response += "\",nc=00000001,qop=auth,digest-uri=\"xmpp/";
|
|
response += m_jid.server();
|
|
response += "\",response=";
|
|
response += md5.hex();
|
|
response += ",charset=utf-8";
|
|
|
|
if( m_authzid )
|
|
response += ",authzid=" + m_authzid.bare();
|
|
|
|
t->setCData( Base64::encode64( response ) );
|
|
|
|
break;
|
|
}
|
|
case SaslMechGssapi:
|
|
#if defined( _WIN32 ) && !defined( __SYMBIAN32__ )
|
|
// see gssapi-sasl-draft.txt
|
|
#else
|
|
m_logInstance.err( LogAreaClassClientbase,
|
|
"Huh, received GSSAPI challenge?! This should have never happened!" );
|
|
#endif
|
|
break;
|
|
case SaslMechNTLM:
|
|
{
|
|
#if defined( _WIN32 ) && !defined( __SYMBIAN32__ )
|
|
bool type1 = ( decoded.length() < 7 ) ? true : false;
|
|
|
|
SecBuffer bufferIn = { type1 ? 0 : (unsigned long)decoded.length(),
|
|
SECBUFFER_TOKEN,
|
|
(void*)decoded.c_str() };
|
|
SecBufferDesc secIn = { 0, 1, &bufferIn };
|
|
|
|
char buffer[4096];
|
|
|
|
SecBuffer bufferOut = { sizeof( buffer ), SECBUFFER_TOKEN, buffer };
|
|
SecBufferDesc secOut = { 0, 1, &bufferOut };
|
|
|
|
TimeStamp timestamp;
|
|
unsigned long contextAttr;
|
|
|
|
SECURITY_STATUS status = InitializeSecurityContext( &m_credHandle, type1 ? 0 : &m_ctxtHandle,
|
|
0, ISC_REQ_MUTUAL_AUTH, 0, 0, &secIn, 0,
|
|
&m_ctxtHandle, &secOut, &contextAttr,
|
|
×tamp );
|
|
std::string response;
|
|
if( SUCCEEDED( status ) )
|
|
{
|
|
response = std::string( (const char *)bufferOut.pvBuffer, bufferOut.cbBuffer );
|
|
}
|
|
else
|
|
{
|
|
logInstance().err( LogAreaClassClientbase,
|
|
"InitializeSecurityContext() failed, return value "
|
|
+ util::int2string( status ) );
|
|
}
|
|
|
|
t->setCData( Base64::encode64( response ) );
|
|
#else
|
|
m_logInstance.err( LogAreaClassClientbase,
|
|
"Huh, received NTLM challenge?! This should have never happened!" );
|
|
#endif
|
|
break;
|
|
}
|
|
|
|
default:
|
|
// should never happen.
|
|
break;
|
|
}
|
|
|
|
send( t );
|
|
}
|
|
|
|
void ClientBase::processSASLError( Tag* tag )
|
|
{
|
|
if( tag->hasChild( "aborted" ) )
|
|
m_authError = SaslAborted;
|
|
else if( tag->hasChild( "incorrect-encoding" ) )
|
|
m_authError = SaslIncorrectEncoding;
|
|
else if( tag->hasChild( "invalid-authzid" ) )
|
|
m_authError = SaslInvalidAuthzid;
|
|
else if( tag->hasChild( "invalid-mechanism" ) )
|
|
m_authError = SaslInvalidMechanism;
|
|
else if( tag->hasChild( "malformed-request" ) )
|
|
m_authError = SaslMalformedRequest;
|
|
else if( tag->hasChild( "mechanism-too-weak" ) )
|
|
m_authError = SaslMechanismTooWeak;
|
|
else if( tag->hasChild( "not-authorized" ) )
|
|
m_authError = SaslNotAuthorized;
|
|
else if( tag->hasChild( "temporary-auth-failure" ) )
|
|
m_authError = SaslTemporaryAuthFailure;
|
|
|
|
#if defined( _WIN32 ) && !defined( __SYMBIAN32__ )
|
|
if( m_selectedSaslMech == SaslMechNTLM )
|
|
{
|
|
FreeCredentialsHandle( &m_credHandle );
|
|
DeleteSecurityContext( &m_ctxtHandle );
|
|
}
|
|
#endif
|
|
}
|
|
|
|
void ClientBase::processSASLSuccess()
|
|
{
|
|
#if defined( _WIN32 ) && !defined( __SYMBIAN32__ )
|
|
if( m_selectedSaslMech == SaslMechNTLM )
|
|
{
|
|
FreeCredentialsHandle( &m_credHandle );
|
|
DeleteSecurityContext( &m_ctxtHandle );
|
|
}
|
|
#endif
|
|
}
|
|
|
|
void ClientBase::send( IQ& iq, IqHandler* ih, int context, bool del )
|
|
{
|
|
if( ih && ( iq.subtype() == IQ::Set || iq.subtype() == IQ::Get ) )
|
|
{
|
|
if( iq.id().empty() )
|
|
iq.setID( getID() );
|
|
|
|
TrackStruct track;
|
|
track.ih = ih;
|
|
track.context = context;
|
|
track.del = del;
|
|
m_iqHandlerMapMutex.lock();
|
|
m_iqIDHandlers[iq.id()] = track;
|
|
m_iqHandlerMapMutex.unlock();
|
|
}
|
|
|
|
send( iq );
|
|
}
|
|
|
|
void ClientBase::send( const IQ& iq )
|
|
{
|
|
++m_stats.iqStanzasSent;
|
|
Tag* tag = iq.tag();
|
|
addFrom( tag );
|
|
addNamespace( tag );
|
|
send( tag );
|
|
}
|
|
|
|
void ClientBase::send( const Message& msg )
|
|
{
|
|
++m_stats.messageStanzasSent;
|
|
Tag* tag = msg.tag();
|
|
addFrom( tag );
|
|
addNamespace( tag );
|
|
send( tag );
|
|
}
|
|
|
|
void ClientBase::send( const Subscription& sub )
|
|
{
|
|
++m_stats.s10nStanzasSent;
|
|
Tag* tag = sub.tag();
|
|
addFrom( tag );
|
|
addNamespace( tag );
|
|
send( tag );
|
|
}
|
|
|
|
void ClientBase::send( Presence& pres )
|
|
{
|
|
++m_stats.presenceStanzasSent;
|
|
Tag* tag = pres.tag();
|
|
StanzaExtensionList::const_iterator it = m_presenceExtensions.begin();
|
|
for( ; it != m_presenceExtensions.end(); ++it )
|
|
tag->addChild( (*it)->tag() );
|
|
addFrom( tag );
|
|
addNamespace( tag );
|
|
send( tag );
|
|
}
|
|
|
|
void ClientBase::send( Tag* tag )
|
|
{
|
|
if( !tag )
|
|
return;
|
|
|
|
send( tag->xml() );
|
|
|
|
++m_stats.totalStanzasSent;
|
|
|
|
if( m_statisticsHandler )
|
|
m_statisticsHandler->handleStatistics( getStatistics() );
|
|
|
|
delete tag;
|
|
}
|
|
|
|
void ClientBase::send( const std::string& xml )
|
|
{
|
|
if( m_connection && m_connection->state() == StateConnected )
|
|
{
|
|
if( m_compression && m_compressionActive )
|
|
m_compression->compress( xml );
|
|
else if( m_encryption && m_encryptionActive )
|
|
m_encryption->encrypt( xml );
|
|
else
|
|
m_connection->send( xml );
|
|
|
|
logInstance().dbg( LogAreaXmlOutgoing, xml );
|
|
}
|
|
}
|
|
|
|
void ClientBase::addFrom( Tag* tag )
|
|
{
|
|
if( !m_authed /*for IQ Auth */ || !tag || tag->hasAttribute( "from" ) )
|
|
return;
|
|
|
|
if ( m_selectedResource.empty() )
|
|
tag->addAttribute( "from", m_jid.bare() );
|
|
else
|
|
tag->addAttribute( "from", m_jid.bare() + '/' + m_selectedResource );
|
|
}
|
|
|
|
void ClientBase::addNamespace( Tag* tag )
|
|
{
|
|
if( !tag || !tag->xmlns().empty() )
|
|
return;
|
|
|
|
tag->setXmlns( m_namespace );
|
|
}
|
|
|
|
void ClientBase::registerStanzaExtension( StanzaExtension* ext )
|
|
{
|
|
if( !m_seFactory )
|
|
m_seFactory = new StanzaExtensionFactory();
|
|
|
|
m_seFactory->registerExtension( ext );
|
|
}
|
|
|
|
bool ClientBase::removeStanzaExtension( int ext )
|
|
{
|
|
if( !m_seFactory )
|
|
return false;
|
|
|
|
return m_seFactory->removeExtension( ext );
|
|
}
|
|
|
|
StatisticsStruct ClientBase::getStatistics()
|
|
{
|
|
if( m_connection )
|
|
m_connection->getStatistics( m_stats.totalBytesReceived, m_stats.totalBytesSent );
|
|
|
|
return m_stats;
|
|
}
|
|
|
|
ConnectionState ClientBase::state() const
|
|
{
|
|
return m_connection ? m_connection->state() : StateDisconnected;
|
|
}
|
|
|
|
void ClientBase::whitespacePing()
|
|
{
|
|
send( " " );
|
|
}
|
|
|
|
void ClientBase::xmppPing( const JID& to, EventHandler* eh )
|
|
{
|
|
const std::string& id = getID();
|
|
IQ iq( IQ::Get, to, id );
|
|
iq.addExtension( new Ping() );
|
|
m_dispatcher.registerEventHandler( eh, id );
|
|
send( iq, this, XMPPPing );
|
|
}
|
|
|
|
bool ClientBase::handleIq( const IQ& iq )
|
|
{
|
|
const Ping* p = iq.findExtension<Ping>( ExtPing );
|
|
if( !p || iq.subtype() != IQ::Get )
|
|
return false;
|
|
|
|
m_dispatcher.dispatch( Event( Event::PingPing, iq ) );
|
|
IQ re( IQ::Result, iq.from(), iq.id() );
|
|
send( re );
|
|
|
|
return true;
|
|
}
|
|
|
|
void ClientBase::handleIqID( const IQ& iq, int context )
|
|
{
|
|
if( context == XMPPPing )
|
|
m_dispatcher.dispatch( Event( ( iq.subtype() == IQ::Result ) ? Event::PingPong
|
|
: Event::PingError, iq ),
|
|
iq.id(), true );
|
|
else
|
|
handleIqIDForward( iq, context );
|
|
}
|
|
|
|
const std::string ClientBase::getID()
|
|
{
|
|
static unsigned int uniqueBaseID = (unsigned int)time( 0 );
|
|
char r[21+1];
|
|
sprintf( r, "uid:%08x:%08x", uniqueBaseID, rand() );
|
|
std::string ret( r, 21 );
|
|
return ret;
|
|
}
|
|
|
|
bool ClientBase::checkStreamVersion( const std::string& version )
|
|
{
|
|
if( version.empty() )
|
|
return false;
|
|
|
|
int major = 0;
|
|
int minor = 0;
|
|
int myMajor = atoi( XMPP_STREAM_VERSION_MAJOR.c_str() );
|
|
|
|
size_t dot = version.find( '.' );
|
|
if( !version.empty() && dot && dot != std::string::npos )
|
|
{
|
|
major = atoi( version.substr( 0, dot ).c_str() );
|
|
minor = atoi( version.substr( dot ).c_str() );
|
|
}
|
|
|
|
return myMajor >= major;
|
|
}
|
|
|
|
void ClientBase::setConnectionImpl( ConnectionBase* cb )
|
|
{
|
|
if( m_connection )
|
|
{
|
|
delete m_connection;
|
|
}
|
|
m_connection = cb;
|
|
}
|
|
|
|
void ClientBase::setEncryptionImpl( TLSBase* tb )
|
|
{
|
|
if( m_encryption )
|
|
{
|
|
delete m_encryption;
|
|
}
|
|
m_encryption = tb;
|
|
}
|
|
|
|
void ClientBase::setCompressionImpl( CompressionBase* cb )
|
|
{
|
|
if( m_compression )
|
|
{
|
|
delete m_compression;
|
|
}
|
|
m_compression = cb;
|
|
}
|
|
|
|
void ClientBase::handleStreamError( Tag* tag )
|
|
{
|
|
StreamError err = StreamErrorUndefined;
|
|
const TagList& c = tag->children();
|
|
TagList::const_iterator it = c.begin();
|
|
for( ; it != c.end(); ++it )
|
|
{
|
|
const std::string& name = (*it)->name();
|
|
if( name == "bad-format" )
|
|
err = StreamErrorBadFormat;
|
|
else if( name == "bad-namespace-prefix" )
|
|
err = StreamErrorBadNamespacePrefix;
|
|
else if( name == "conflict" )
|
|
err = StreamErrorConflict;
|
|
else if( name == "connection-timeout" )
|
|
err = StreamErrorConnectionTimeout;
|
|
else if( name == "host-gone" )
|
|
err = StreamErrorHostGone;
|
|
else if( name == "host-unknown" )
|
|
err = StreamErrorHostUnknown;
|
|
else if( name == "improper-addressing" )
|
|
err = StreamErrorImproperAddressing;
|
|
else if( name == "internal-server-error" )
|
|
err = StreamErrorInternalServerError;
|
|
else if( name == "invalid-from" )
|
|
err = StreamErrorInvalidFrom;
|
|
else if( name == "invalid-id" )
|
|
err = StreamErrorInvalidId;
|
|
else if( name == "invalid-namespace" )
|
|
err = StreamErrorInvalidNamespace;
|
|
else if( name == "invalid-xml" )
|
|
err = StreamErrorInvalidXml;
|
|
else if( name == "not-authorized" )
|
|
err = StreamErrorNotAuthorized;
|
|
else if( name == "policy-violation" )
|
|
err = StreamErrorPolicyViolation;
|
|
else if( name == "remote-connection-failed" )
|
|
err = StreamErrorRemoteConnectionFailed;
|
|
else if( name == "resource-constraint" )
|
|
err = StreamErrorResourceConstraint;
|
|
else if( name == "restricted-xml" )
|
|
err = StreamErrorRestrictedXml;
|
|
else if( name == "see-other-host" )
|
|
{
|
|
err = StreamErrorSeeOtherHost;
|
|
m_streamErrorCData = tag->findChild( "see-other-host" )->cdata();
|
|
}
|
|
else if( name == "system-shutdown" )
|
|
err = StreamErrorSystemShutdown;
|
|
else if( name == "undefined-condition" )
|
|
err = StreamErrorUndefinedCondition;
|
|
else if( name == "unsupported-encoding" )
|
|
err = StreamErrorUnsupportedEncoding;
|
|
else if( name == "unsupported-stanza-type" )
|
|
err = StreamErrorUnsupportedStanzaType;
|
|
else if( name == "unsupported-version" )
|
|
err = StreamErrorUnsupportedVersion;
|
|
else if( name == "xml-not-well-formed" )
|
|
err = StreamErrorXmlNotWellFormed;
|
|
else if( name == "text" )
|
|
{
|
|
const std::string& lang = (*it)->findAttribute( "xml:lang" );
|
|
if( !lang.empty() )
|
|
m_streamErrorText[lang] = (*it)->cdata();
|
|
else
|
|
m_streamErrorText["default"] = (*it)->cdata();
|
|
}
|
|
else
|
|
m_streamErrorAppCondition = (*it);
|
|
|
|
if( err != StreamErrorUndefined && (*it)->hasAttribute( XMLNS, XMLNS_XMPP_STREAM ) )
|
|
m_streamError = err;
|
|
}
|
|
}
|
|
|
|
const std::string& ClientBase::streamErrorText( const std::string& lang ) const
|
|
{
|
|
StringMap::const_iterator it = m_streamErrorText.find( lang );
|
|
return ( it != m_streamErrorText.end() ) ? (*it).second : EmptyString;
|
|
}
|
|
|
|
void ClientBase::registerMessageSessionHandler( MessageSessionHandler* msh, int types )
|
|
{
|
|
if( types & Message::Chat || types == 0 )
|
|
m_messageSessionHandlerChat = msh;
|
|
|
|
if( types & Message::Normal || types == 0 )
|
|
m_messageSessionHandlerNormal = msh;
|
|
|
|
if( types & Message::Groupchat || types == 0 )
|
|
m_messageSessionHandlerGroupchat = msh;
|
|
|
|
if( types & Message::Headline || types == 0 )
|
|
m_messageSessionHandlerHeadline = msh;
|
|
}
|
|
|
|
void ClientBase::registerPresenceHandler( PresenceHandler* ph )
|
|
{
|
|
if( ph )
|
|
m_presenceHandlers.push_back( ph );
|
|
}
|
|
|
|
void ClientBase::removePresenceHandler( PresenceHandler* ph )
|
|
{
|
|
if( ph )
|
|
m_presenceHandlers.remove( ph );
|
|
}
|
|
|
|
void ClientBase::registerPresenceHandler( const JID& jid, PresenceHandler* ph )
|
|
{
|
|
if( ph && jid )
|
|
{
|
|
JidPresHandlerStruct jph;
|
|
jph.jid = new JID( jid.bare() );
|
|
jph.ph = ph;
|
|
m_presenceJidHandlers.push_back( jph );
|
|
}
|
|
}
|
|
|
|
void ClientBase::removePresenceHandler( const JID& jid, PresenceHandler* ph )
|
|
{
|
|
PresenceJidHandlerList::iterator t;
|
|
PresenceJidHandlerList::iterator it = m_presenceJidHandlers.begin();
|
|
while( it != m_presenceJidHandlers.end() )
|
|
{
|
|
t = it;
|
|
++it;
|
|
if( ( !ph || (*t).ph == ph ) && (*t).jid->bare() == jid.bare() )
|
|
{
|
|
delete (*t).jid;
|
|
m_presenceJidHandlers.erase( t );
|
|
}
|
|
}
|
|
}
|
|
|
|
void ClientBase::removeIDHandler( IqHandler* ih )
|
|
{
|
|
IqTrackMap::iterator t;
|
|
m_iqHandlerMapMutex.lock();
|
|
IqTrackMap::iterator it = m_iqIDHandlers.begin();
|
|
while( it != m_iqIDHandlers.end() )
|
|
{
|
|
t = it;
|
|
++it;
|
|
if( ih == (*t).second.ih )
|
|
m_iqIDHandlers.erase( t );
|
|
}
|
|
m_iqHandlerMapMutex.unlock();
|
|
}
|
|
|
|
void ClientBase::registerIqHandler( IqHandler* ih, int exttype )
|
|
{
|
|
if( !ih )
|
|
return;
|
|
|
|
typedef IqHandlerMap::const_iterator IQci;
|
|
std::pair<IQci, IQci> g = m_iqExtHandlers.equal_range( exttype );
|
|
for( IQci it = g.first; it != g.second; ++it )
|
|
if( (*it).second == ih )
|
|
return;
|
|
|
|
m_iqExtHandlers.insert( std::make_pair( exttype, ih ) );
|
|
}
|
|
|
|
void ClientBase::removeIqHandler( IqHandler* ih, int exttype )
|
|
{
|
|
if( !ih )
|
|
return;
|
|
|
|
typedef IqHandlerMap::iterator IQi;
|
|
std::pair<IQi, IQi> g = m_iqExtHandlers.equal_range( exttype );
|
|
IQi it2;
|
|
IQi it = g.first;
|
|
while( it != g.second )
|
|
{
|
|
it2 = it++;
|
|
if( (*it2).second == ih )
|
|
m_iqExtHandlers.erase( it2 );
|
|
}
|
|
}
|
|
|
|
void ClientBase::registerMessageSession( MessageSession* session )
|
|
{
|
|
if( session )
|
|
m_messageSessions.push_back( session );
|
|
}
|
|
|
|
void ClientBase::disposeMessageSession( MessageSession* session )
|
|
{
|
|
if( !session )
|
|
return;
|
|
|
|
MessageSessionList::iterator it = std::find( m_messageSessions.begin(),
|
|
m_messageSessions.end(),
|
|
session );
|
|
if( it != m_messageSessions.end() )
|
|
{
|
|
delete (*it);
|
|
m_messageSessions.erase( it );
|
|
}
|
|
}
|
|
|
|
void ClientBase::registerMessageHandler( MessageHandler* mh )
|
|
{
|
|
if( mh )
|
|
m_messageHandlers.push_back( mh );
|
|
}
|
|
|
|
void ClientBase::removeMessageHandler( MessageHandler* mh )
|
|
{
|
|
if( mh )
|
|
m_messageHandlers.remove( mh );
|
|
}
|
|
|
|
void ClientBase::registerSubscriptionHandler( SubscriptionHandler* sh )
|
|
{
|
|
if( sh )
|
|
m_subscriptionHandlers.push_back( sh );
|
|
}
|
|
|
|
void ClientBase::removeSubscriptionHandler( SubscriptionHandler* sh )
|
|
{
|
|
if( sh )
|
|
m_subscriptionHandlers.remove( sh );
|
|
}
|
|
|
|
void ClientBase::registerTagHandler( TagHandler* th, const std::string& tag, const std::string& xmlns )
|
|
{
|
|
if( th && !tag.empty() )
|
|
{
|
|
TagHandlerStruct ths;
|
|
ths.tag = tag;
|
|
ths.xmlns = xmlns;
|
|
ths.th = th;
|
|
m_tagHandlers.push_back( ths );
|
|
}
|
|
}
|
|
|
|
void ClientBase::removeTagHandler( TagHandler* th, const std::string& tag, const std::string& xmlns )
|
|
{
|
|
if( th )
|
|
{
|
|
TagHandlerList::iterator it = m_tagHandlers.begin();
|
|
for( ; it != m_tagHandlers.end(); ++it )
|
|
{
|
|
if( (*it).th == th && (*it).tag == tag && (*it).xmlns == xmlns )
|
|
m_tagHandlers.erase( it );
|
|
}
|
|
}
|
|
}
|
|
|
|
void ClientBase::registerStatisticsHandler( StatisticsHandler* sh )
|
|
{
|
|
if( sh )
|
|
m_statisticsHandler = sh;
|
|
}
|
|
|
|
void ClientBase::removeStatisticsHandler()
|
|
{
|
|
m_statisticsHandler = 0;
|
|
}
|
|
|
|
void ClientBase::registerMUCInvitationHandler( MUCInvitationHandler* mih )
|
|
{
|
|
if( mih )
|
|
{
|
|
m_mucInvitationHandler = mih;
|
|
m_disco->addFeature( XMLNS_MUC );
|
|
}
|
|
}
|
|
|
|
void ClientBase::removeMUCInvitationHandler()
|
|
{
|
|
m_mucInvitationHandler = 0;
|
|
m_disco->removeFeature( XMLNS_MUC );
|
|
}
|
|
|
|
void ClientBase::registerConnectionListener( ConnectionListener* cl )
|
|
{
|
|
if( cl )
|
|
m_connectionListeners.push_back( cl );
|
|
}
|
|
|
|
void ClientBase::removeConnectionListener( ConnectionListener* cl )
|
|
{
|
|
if( cl )
|
|
m_connectionListeners.remove( cl );
|
|
}
|
|
|
|
void ClientBase::notifyOnConnect()
|
|
{
|
|
util::ForEach( m_connectionListeners, &ConnectionListener::onConnect );
|
|
}
|
|
|
|
void ClientBase::notifyOnDisconnect( ConnectionError e )
|
|
{
|
|
util::ForEach( m_connectionListeners, &ConnectionListener::onDisconnect, e );
|
|
init();
|
|
}
|
|
|
|
bool ClientBase::notifyOnTLSConnect( const CertInfo& info )
|
|
{
|
|
ConnectionListenerList::const_iterator it = m_connectionListeners.begin();
|
|
for( ; it != m_connectionListeners.end() && (*it)->onTLSConnect( info ); ++it )
|
|
;
|
|
return m_stats.encryption = ( it == m_connectionListeners.end() );
|
|
}
|
|
|
|
void ClientBase::notifyOnResourceBindError( const Error* error )
|
|
{
|
|
util::ForEach( m_connectionListeners, &ConnectionListener::onResourceBindError, error );
|
|
}
|
|
|
|
void ClientBase::notifyOnResourceBind( const std::string& resource )
|
|
{
|
|
util::ForEach( m_connectionListeners, &ConnectionListener::onResourceBind, resource );
|
|
}
|
|
|
|
void ClientBase::notifyOnSessionCreateError( const Error* error )
|
|
{
|
|
util::ForEach( m_connectionListeners, &ConnectionListener::onSessionCreateError, error );
|
|
}
|
|
|
|
void ClientBase::notifyStreamEvent( StreamEvent event )
|
|
{
|
|
util::ForEach( m_connectionListeners, &ConnectionListener::onStreamEvent, event );
|
|
}
|
|
|
|
void ClientBase::notifyPresenceHandlers( Presence& pres )
|
|
{
|
|
bool match = false;
|
|
PresenceJidHandlerList::const_iterator t;
|
|
PresenceJidHandlerList::const_iterator itj = m_presenceJidHandlers.begin();
|
|
while( itj != m_presenceJidHandlers.end() )
|
|
{
|
|
t = itj++;
|
|
if( (*t).jid->bare() == pres.from().bare() && (*t).ph )
|
|
{
|
|
(*t).ph->handlePresence( pres );
|
|
match = true;
|
|
}
|
|
}
|
|
if( match )
|
|
return;
|
|
|
|
// FIXME remove this for() for 1.1:
|
|
PresenceHandlerList::const_iterator it = m_presenceHandlers.begin();
|
|
for( ; it != m_presenceHandlers.end(); ++it )
|
|
{
|
|
(*it)->handlePresence( pres );
|
|
}
|
|
// FIXME and reinstantiate this:
|
|
// util::ForEach( m_presenceHandlers, &PresenceHandler::handlePresence, pres );
|
|
}
|
|
|
|
void ClientBase::notifySubscriptionHandlers( Subscription& s10n )
|
|
{
|
|
// FIXME remove this for() for 1.1:
|
|
SubscriptionHandlerList::const_iterator it = m_subscriptionHandlers.begin();
|
|
for( ; it != m_subscriptionHandlers.end(); ++it )
|
|
{
|
|
(*it)->handleSubscription( s10n );
|
|
}
|
|
// FIXME and reinstantiate this:
|
|
// util::ForEach( m_subscriptionHandlers, &SubscriptionHandler::handleSubscription, s10n );
|
|
}
|
|
|
|
void ClientBase::notifyIqHandlers( IQ& iq )
|
|
{
|
|
m_iqHandlerMapMutex.lock();
|
|
IqTrackMap::iterator it_id = m_iqIDHandlers.find( iq.id() );
|
|
m_iqHandlerMapMutex.unlock();
|
|
if( it_id != m_iqIDHandlers.end() && iq.subtype() & ( IQ::Result | IQ::Error ) )
|
|
{
|
|
(*it_id).second.ih->handleIqID( iq, (*it_id).second.context );
|
|
if( (*it_id).second.del )
|
|
delete (*it_id).second.ih;
|
|
m_iqHandlerMapMutex.lock();
|
|
m_iqIDHandlers.erase( it_id );
|
|
m_iqHandlerMapMutex.unlock();
|
|
return;
|
|
}
|
|
|
|
if( iq.extensions().empty() )
|
|
return;
|
|
|
|
bool res = false;
|
|
|
|
// FIXME remove for 1.1
|
|
// typedef IqHandlerMapXmlns::const_iterator IQciXmlns
|
|
// Tag *tag = iq.tag()->xmlns();
|
|
// std::pair<IQciXmlns, IQciXmlns> g = m_iqNSHandlers.equal_range( tag->xmlns() );
|
|
// for( IQciXmlns it = g.first; it != g.second; ++it )
|
|
// {
|
|
// if( (*it).second->handleIq( iq ) )
|
|
// res = true;
|
|
// }
|
|
// delete tag;
|
|
|
|
typedef IqHandlerMap::const_iterator IQci;
|
|
const StanzaExtensionList& sel = iq.extensions();
|
|
StanzaExtensionList::const_iterator itse = sel.begin();
|
|
for( ; itse != sel.end(); ++itse )
|
|
{
|
|
std::pair<IQci, IQci> g = m_iqExtHandlers.equal_range( (*itse)->extensionType() );
|
|
for( IQci it = g.first; it != g.second; ++it )
|
|
{
|
|
if( (*it).second->handleIq( iq ) )
|
|
res = true;
|
|
}
|
|
}
|
|
|
|
if( !res && iq.subtype() & ( IQ::Get | IQ::Set ) )
|
|
{
|
|
IQ re( IQ::Error, iq.from(), iq.id() );
|
|
re.addExtension( new Error( StanzaErrorTypeCancel, StanzaErrorServiceUnavailable ) );
|
|
send( re );
|
|
}
|
|
}
|
|
|
|
void ClientBase::notifyMessageHandlers( Message& msg )
|
|
{
|
|
if( m_mucInvitationHandler )
|
|
{
|
|
const MUCRoom::MUCUser* mu = msg.findExtension<MUCRoom::MUCUser>( ExtMUCUser );
|
|
if( mu && mu->operation() != MUCRoom::OpInviteTo )
|
|
{
|
|
|
|
m_mucInvitationHandler->handleMUCInvitation( msg.from(),
|
|
mu->jid() ? JID( *(mu->jid()) ) : JID(),
|
|
mu->reason() ? *(mu->reason()) : EmptyString,
|
|
msg.body(),
|
|
mu->password() ? *(mu->password()) : EmptyString,
|
|
mu->continued(),
|
|
mu->thread() ? *(mu->thread()) : EmptyString );
|
|
return;
|
|
}
|
|
}
|
|
|
|
MessageSessionList::const_iterator it1 = m_messageSessions.begin();
|
|
for( ; it1 != m_messageSessions.end(); ++it1 )
|
|
{
|
|
if( (*it1)->target().full() == msg.from().full() &&
|
|
( msg.thread().empty()
|
|
|| (*it1)->threadID() == msg.thread()
|
|
|| (*it1)->honorThreadID() ) &&
|
|
// FIXME don't use '== 0' here
|
|
( (*it1)->types() & msg.subtype() || (*it1)->types() == 0 ) )
|
|
{
|
|
(*it1)->handleMessage( msg );
|
|
return;
|
|
}
|
|
}
|
|
|
|
it1 = m_messageSessions.begin();
|
|
for( ; it1 != m_messageSessions.end(); ++it1 )
|
|
{
|
|
if( (*it1)->target().bare() == msg.from().bare() &&
|
|
( msg.thread().empty()
|
|
|| (*it1)->threadID() == msg.thread()
|
|
|| (*it1)->honorThreadID() ) &&
|
|
// FIXME don't use '== 0' here
|
|
( (*it1)->types() & msg.subtype() || (*it1)->types() == 0 ) )
|
|
{
|
|
(*it1)->handleMessage( msg );
|
|
return;
|
|
}
|
|
}
|
|
|
|
MessageSessionHandler* msHandler = 0;
|
|
|
|
switch( msg.subtype() )
|
|
{
|
|
case Message::Chat:
|
|
msHandler = m_messageSessionHandlerChat;
|
|
break;
|
|
case Message::Normal:
|
|
msHandler = m_messageSessionHandlerNormal;
|
|
break;
|
|
case Message::Groupchat:
|
|
msHandler = m_messageSessionHandlerGroupchat;
|
|
break;
|
|
case Message::Headline:
|
|
msHandler = m_messageSessionHandlerHeadline;
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
|
|
if( msHandler )
|
|
{
|
|
if( msg.subtype() == Message::Chat && msg.body().empty() )
|
|
return; // don't want a new MS for empty messages
|
|
MessageSession* session = new MessageSession( this, msg.from(), true, msg.subtype() );
|
|
msHandler->handleMessageSession( session );
|
|
session->handleMessage( msg );
|
|
}
|
|
else
|
|
{
|
|
// FIXME remove this for() for 1.1:
|
|
MessageHandlerList::const_iterator it = m_messageHandlers.begin();
|
|
for( ; it != m_messageHandlers.end(); ++it )
|
|
{
|
|
(*it)->handleMessage( msg );
|
|
}
|
|
// FIXME and reinstantiate this:
|
|
// util::ForEach( m_messageHandlers, &MessageHandler::handleMessage, msg ); // FIXME remove for 1.1
|
|
}
|
|
}
|
|
|
|
void ClientBase::notifyTagHandlers( Tag* tag )
|
|
{
|
|
TagHandlerList::const_iterator it = m_tagHandlers.begin();
|
|
for( ; it != m_tagHandlers.end(); ++it )
|
|
{
|
|
if( (*it).tag == tag->name() && tag->hasAttribute( XMLNS, (*it).xmlns ) )
|
|
(*it).th->handleTag( tag );
|
|
}
|
|
}
|
|
|
|
void ClientBase::addPresenceExtension( StanzaExtension* se )
|
|
{
|
|
if( !se )
|
|
return;
|
|
|
|
removePresenceExtension( se->extensionType() );
|
|
m_presenceExtensions.push_back( se );
|
|
}
|
|
|
|
bool ClientBase::removePresenceExtension( int type )
|
|
{
|
|
StanzaExtensionList::iterator it = m_presenceExtensions.begin();
|
|
for( ; it != m_presenceExtensions.end(); ++it )
|
|
{
|
|
if( (*it)->extensionType() == type )
|
|
{
|
|
delete (*it);
|
|
m_presenceExtensions.erase( it );
|
|
return true;
|
|
}
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
CompressionBase* ClientBase::getDefaultCompression()
|
|
{
|
|
if( !m_compress )
|
|
return 0;
|
|
|
|
#ifdef HAVE_ZLIB
|
|
CompressionBase* cmp = new CompressionZlib( this );
|
|
if( cmp->init() )
|
|
return cmp;
|
|
|
|
delete cmp;
|
|
#endif
|
|
return 0;
|
|
}
|
|
|
|
TLSBase* ClientBase::getDefaultEncryption()
|
|
{
|
|
if( m_tls == TLSDisabled || !hasTls() )
|
|
return 0;
|
|
|
|
TLSDefault* tls = new TLSDefault( this, m_server );
|
|
if( tls->init( m_clientKey, m_clientCerts, m_cacerts ) )
|
|
return tls;
|
|
else
|
|
{
|
|
delete tls;
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
}
|