Chat-O-Matic/libs/libgloox/clientbase.cpp

1823 lines
52 KiB
C++
Raw Normal View History

/*
2015-06-24 10:52:32 -05:00
Copyright (c) 2005-2015 by Jakob Schröter <js@camaya.net>
This file is part of the gloox library. http://camaya.net/gloox
This software is distributed under a license. The full license
agreement can be found in the file LICENSE in this distribution.
This software may not be copied, modified, sold or distributed
other than expressed in the named license agreement.
This software is distributed without any warranty.
*/
#include "config.h"
2015-06-24 10:52:32 -05:00
#include "base64.h"
#include "clientbase.h"
#include "compressionbase.h"
2015-06-24 10:52:32 -05:00
#include "compressionzlib.h"
#include "connectionbase.h"
#include "connectionlistener.h"
#include "connectiontcpclient.h"
#include "disco.h"
2015-06-24 10:52:32 -05:00
#include "error.h"
#include "eventhandler.h"
#include "event.h"
#include "iq.h"
#include "iqhandler.h"
2015-06-24 10:52:32 -05:00
#include "jid.h"
#include "loghandler.h"
#include "md5.h"
#include "message.h"
#include "messagehandler.h"
2015-06-24 10:52:32 -05:00
#include "messagesessionhandler.h"
#include "mucinvitationhandler.h"
#include "mucroom.h"
#include "mutexguard.h"
#include "presence.h"
#include "presencehandler.h"
#include "rosterlistener.h"
2015-06-24 10:52:32 -05:00
#include "stanzaextensionfactory.h"
#include "sha.h"
#include "subscription.h"
#include "subscriptionhandler.h"
2015-06-24 10:52:32 -05:00
#include "tag.h"
#include "taghandler.h"
2015-06-24 10:52:32 -05:00
#include "tlsbase.h"
#include "tlsdefault.h"
2015-06-24 10:52:32 -05:00
#include "prep.h"
#include "util.h"
#include <cstdlib>
#include <string>
#include <map>
#include <list>
#include <algorithm>
#include <cmath>
#include <ctime>
#include <cstdio>
#include <string.h> // for memset()
#if defined( _WIN32 ) && !defined( __SYMBIAN32__ )
#include <tchar.h>
2015-06-24 10:52:32 -05:00
# ifdef __MINGW32__
# ifndef SecureZeroMemory
# define SecureZeroMemory(p,s) RtlFillMemory((p),(s),0)
# endif
# endif
#endif
namespace gloox
{
// ---- ClientBase::Ping ----
ClientBase::Ping::Ping()
: StanzaExtension( ExtPing )
{
}
ClientBase::Ping::~Ping()
{
}
const std::string& ClientBase::Ping::filterString() const
{
static const std::string filter = "/iq/ping[@xmlns='" + XMLNS_XMPP_PING + "']";
return filter;
}
// ---- ~ClientBase::Ping ----
// ---- ClientBase ----
ClientBase::ClientBase( const std::string& ns, const std::string& server, int port )
: m_connection( 0 ), m_encryption( 0 ), m_compression( 0 ), m_disco( 0 ), m_namespace( ns ),
m_xmllang( "en" ), m_server( server ), m_compressionActive( false ), m_encryptionActive( false ),
m_compress( true ), m_authed( false ), m_block( false ), m_sasl( true ), m_tls( TLSOptional ), m_port( port ),
2015-06-24 10:52:32 -05:00
m_availableSaslMechs( SaslMechAll ), m_smContext( CtxSMInvalid ), m_smHandled( 0 ),
m_statisticsHandler( 0 ), m_mucInvitationHandler( 0 ),
m_messageSessionHandlerChat( 0 ), m_messageSessionHandlerGroupchat( 0 ),
m_messageSessionHandlerHeadline( 0 ), m_messageSessionHandlerNormal( 0 ),
m_parser( this ), m_seFactory( 0 ), m_authError( AuthErrorUndefined ),
m_streamError( StreamErrorUndefined ), m_streamErrorAppCondition( 0 ),
2015-06-24 10:52:32 -05:00
m_selectedSaslMech( SaslMechNone ), m_customConnection( false ),
m_uniqueBaseId( (unsigned int)( ( (unsigned long long)time( 0 ) & 0xFFFF ) << 16 ) | ( ( (unsigned long long) & m_nextId ) & 0xFFFF ) ),
m_smSent( 0 )
{
init();
}
ClientBase::ClientBase( const std::string& ns, const std::string& password,
const std::string& server, int port )
: m_connection( 0 ), m_encryption( 0 ), m_compression( 0 ), m_disco( 0 ), m_namespace( ns ),
m_password( password ),
m_xmllang( "en" ), m_server( server ), m_compressionActive( false ), m_encryptionActive( false ),
m_compress( true ), m_authed( false ), m_block( false ), m_sasl( true ), m_tls( TLSOptional ),
2015-06-24 10:52:32 -05:00
m_port( port ), m_availableSaslMechs( SaslMechAll ), m_smContext( CtxSMInvalid ), m_smHandled( 0 ),
m_statisticsHandler( 0 ), m_mucInvitationHandler( 0 ),
m_messageSessionHandlerChat( 0 ), m_messageSessionHandlerGroupchat( 0 ),
m_messageSessionHandlerHeadline( 0 ), m_messageSessionHandlerNormal( 0 ),
m_parser( this ), m_seFactory( 0 ), m_authError( AuthErrorUndefined ),
m_streamError( StreamErrorUndefined ), m_streamErrorAppCondition( 0 ),
2015-06-24 10:52:32 -05:00
m_selectedSaslMech( SaslMechNone ), m_customConnection( false ),
m_uniqueBaseId( (unsigned int)( ( (unsigned long long)time( 0 ) & 0xFFFF ) << 16 ) | ( ( (unsigned long long) & m_nextId ) & 0xFFFF ) ),
m_smSent( 0 )
{
init();
}
void ClientBase::init()
{
2015-06-24 10:52:32 -05:00
srand( time( 0 ) );
if( !m_disco )
{
m_disco = new Disco( this );
m_disco->setVersion( "based on gloox", GLOOX_VERSION );
m_disco->addFeature( XMLNS_XMPP_PING );
}
registerStanzaExtension( new Error() );
registerStanzaExtension( new Ping() );
registerIqHandler( this, ExtPing );
m_streamError = StreamErrorUndefined;
m_block = false;
memset( &m_stats, 0, sizeof( m_stats ) );
cleanup();
}
ClientBase::~ClientBase()
{
2015-06-24 10:52:32 -05:00
m_iqHandlerMapMutex.lock();
m_iqIDHandlers.clear();
m_iqHandlerMapMutex.unlock();
m_iqExtHandlerMapMutex.lock();
m_iqExtHandlers.clear();
m_iqExtHandlerMapMutex.unlock();
util::clearList( m_presenceExtensions );
util::clearMap( m_smQueue );
setConnectionImpl( 0 );
setEncryptionImpl( 0 );
setCompressionImpl( 0 );
delete m_seFactory;
m_seFactory = 0; // to avoid usage when Disco gets deleted below
delete m_disco;
m_disco = 0;
util::clearList( m_messageSessions );
PresenceJidHandlerList::const_iterator it1 = m_presenceJidHandlers.begin();
for( ; it1 != m_presenceJidHandlers.end(); ++it1 )
delete (*it1).jid;
}
ConnectionError ClientBase::recv( int timeout )
{
if( !m_connection || m_connection->state() == StateDisconnected )
return ConnNotConnected;
return m_connection->recv( timeout );
}
bool ClientBase::connect( bool block )
{
if( m_server.empty() )
return false;
if( !m_connection )
m_connection = new ConnectionTCPClient( this, m_logInstance, m_server, m_port );
if( m_connection->state() >= StateConnecting )
return true;
if( !m_encryption )
m_encryption = getDefaultEncryption();
if( !m_compression )
m_compression = getDefaultCompression();
m_logInstance.dbg( LogAreaClassClientbase, "This is gloox " + GLOOX_VERSION + ", connecting to "
2015-06-24 10:52:32 -05:00
+ m_server + ( ( m_customConnection )?( " using a custom connection" ):( m_port > 0 ? ( ":" + util::int2string( m_port ) ) : EmptyString ) ) + "..." );
m_block = block;
ConnectionError ret = m_connection->connect();
if( ret != ConnNoError )
return false;
if( m_block )
m_connection->receive();
return true;
}
void ClientBase::handleTag( Tag* tag )
{
if( !tag )
{
logInstance().dbg( LogAreaClassClientbase, "stream closed" );
disconnect( ConnStreamClosed );
return;
}
logInstance().dbg( LogAreaXmlIncoming, tag->xml() );
++m_stats.totalStanzasReceived;
if( tag->name() == "stream" && tag->xmlns() == XMLNS_STREAM )
{
const std::string& version = tag->findAttribute( "version" );
if( !checkStreamVersion( version ) )
{
logInstance().dbg( LogAreaClassClientbase, "This server is not XMPP-compliant"
" (it does not send a 'version' attribute). Please fix it or try another one.\n" );
disconnect( ConnStreamVersionError );
return;
}
m_sid = tag->findAttribute( "id" );
2015-06-24 10:52:32 -05:00
handleStartNode( tag );
}
else if( tag->name() == "error" && tag->xmlns() == XMLNS_STREAM )
{
handleStreamError( tag );
disconnect( ConnStreamError );
}
else
{
if( !handleNormalNode( tag ) )
{
if( tag->xmlns().empty() || tag->xmlns() == XMLNS_CLIENT )
{
if( tag->name() == "iq" )
{
IQ iq( tag );
m_seFactory->addExtensions( iq, tag );
2015-06-24 10:52:32 -05:00
if( iq.hasEmbeddedStanza() )
m_seFactory->addExtensions( *iq.embeddedStanza(), iq.embeddedTag() );
notifyIqHandlers( iq );
++m_stats.iqStanzasReceived;
2015-06-24 10:52:32 -05:00
if( m_smContext >= CtxSMEnabled )
++m_smHandled;
}
else if( tag->name() == "message" )
{
Message msg( tag );
m_seFactory->addExtensions( msg, tag );
2015-06-24 10:52:32 -05:00
if( msg.hasEmbeddedStanza() )
m_seFactory->addExtensions( *msg.embeddedStanza(), msg.embeddedTag() );
notifyMessageHandlers( msg );
++m_stats.messageStanzasReceived;
2015-06-24 10:52:32 -05:00
if( m_smContext >= CtxSMEnabled )
++m_smHandled;
}
else if( tag->name() == "presence" )
{
const std::string& type = tag->findAttribute( TYPE );
if( type == "subscribe" || type == "unsubscribe"
|| type == "subscribed" || type == "unsubscribed" )
{
Subscription sub( tag );
m_seFactory->addExtensions( sub, tag );
2015-06-24 10:52:32 -05:00
if( sub.hasEmbeddedStanza() )
m_seFactory->addExtensions( *sub.embeddedStanza(), sub.embeddedTag() );
notifySubscriptionHandlers( sub );
++m_stats.s10nStanzasReceived;
}
else
{
Presence pres( tag );
m_seFactory->addExtensions( pres, tag );
2015-06-24 10:52:32 -05:00
if( pres.hasEmbeddedStanza() )
m_seFactory->addExtensions( *pres.embeddedStanza(), pres.embeddedTag() );
notifyPresenceHandlers( pres );
++m_stats.presenceStanzasReceived;
}
2015-06-24 10:52:32 -05:00
if( m_smContext >= CtxSMEnabled )
++m_smHandled;
}
else
2015-06-24 10:52:32 -05:00
m_logInstance.err( LogAreaClassClientbase, "Invalid stanza received: " + tag->name() );
}
else
{
notifyTagHandlers( tag );
}
}
}
if( m_statisticsHandler )
m_statisticsHandler->handleStatistics( getStatistics() );
}
void ClientBase::handleCompressedData( const std::string& data )
{
if( m_encryption && m_encryptionActive )
m_encryption->encrypt( data );
else if( m_connection )
m_connection->send( data );
else
m_logInstance.err( LogAreaClassClientbase, "Compression finished, but chain broken" );
}
void ClientBase::handleDecompressedData( const std::string& data )
{
parse( data );
}
void ClientBase::handleEncryptedData( const TLSBase* /*base*/, const std::string& data )
{
if( m_connection )
m_connection->send( data );
else
m_logInstance.err( LogAreaClassClientbase, "Encryption finished, but chain broken" );
}
void ClientBase::handleDecryptedData( const TLSBase* /*base*/, const std::string& data )
{
if( m_compression && m_compressionActive )
m_compression->decompress( data );
else
parse( data );
}
void ClientBase::handleHandshakeResult( const TLSBase* /*base*/, bool success, CertInfo &certinfo )
{
if( success )
{
if( !notifyOnTLSConnect( certinfo ) )
{
logInstance().err( LogAreaClassClientbase, "Server's certificate rejected!" );
disconnect( ConnTlsFailed );
}
else
{
logInstance().dbg( LogAreaClassClientbase, "connection encryption active" );
header();
}
}
else
{
logInstance().err( LogAreaClassClientbase, "TLS handshake failed!" );
disconnect( ConnTlsFailed );
}
}
void ClientBase::handleReceivedData( const ConnectionBase* /*connection*/, const std::string& data )
{
if( m_encryption && m_encryptionActive )
m_encryption->decrypt( data );
else if( m_compression && m_compressionActive )
m_compression->decompress( data );
else
parse( data );
}
void ClientBase::handleConnect( const ConnectionBase* /*connection*/ )
{
header();
}
void ClientBase::handleDisconnect( const ConnectionBase* /*connection*/, ConnectionError reason )
{
if( m_connection )
m_connection->cleanup();
if( m_encryption )
m_encryption->cleanup();
if( m_compression )
m_compression->cleanup();
m_encryptionActive = false;
m_compressionActive = false;
notifyOnDisconnect( reason );
}
void ClientBase::disconnect( ConnectionError reason )
{
if( !m_connection || m_connection->state() < StateConnecting )
return;
if( reason != ConnTlsFailed )
send( "</stream:stream>" );
m_connection->disconnect();
m_connection->cleanup();
if( m_encryption )
m_encryption->cleanup();
if( m_compression )
m_compression->cleanup();
m_encryptionActive = false;
m_compressionActive = false;
2015-06-24 10:52:32 -05:00
m_smSent = 0;
notifyOnDisconnect( reason );
2015-06-24 10:52:32 -05:00
#ifdef CLIENTBASE_TEST
m_nextId.reset();
#endif
}
void ClientBase::parse( const std::string& data )
{
std::string copy = data;
int i = 0;
if( ( i = m_parser.feed( copy ) ) >= 0 )
{
std::string error = "parse error (at pos ";
error += util::int2string( i );
error += "): ";
m_logInstance.err( LogAreaClassClientbase, error + copy );
Tag* e = new Tag( "stream:error" );
new Tag( e, "restricted-xml", "xmlns", XMLNS_XMPP_STREAM );
send( e );
disconnect( ConnParseError );
}
}
void ClientBase::header()
{
std::string head = "<?xml version='1.0' ?>";
head += "<stream:stream to='" + m_jid.server() + "' xmlns='" + m_namespace + "' ";
head += "xmlns:stream='http://etherx.jabber.org/streams' xml:lang='" + m_xmllang + "' ";
head += "version='" + XMPP_STREAM_VERSION_MAJOR + "." + XMPP_STREAM_VERSION_MINOR + "'>";
send( head );
}
bool ClientBase::hasTls()
{
#if defined( HAVE_GNUTLS ) || defined( HAVE_OPENSSL ) || defined( HAVE_WINTLS )
return true;
#else
return false;
#endif
}
void ClientBase::startTls()
{
send( new Tag( "starttls", XMLNS, XMLNS_STREAM_TLS ) );
}
void ClientBase::setServer( const std::string &server )
{
m_server = server;
if( m_connection )
m_connection->setServer( server );
}
void ClientBase::setClientCert( const std::string& clientKey, const std::string& clientCerts )
{
m_clientKey = clientKey;
m_clientCerts = clientCerts;
}
void ClientBase::startSASL( SaslMechanism type )
{
m_selectedSaslMech = type;
Tag* a = new Tag( "auth", XMLNS, XMLNS_STREAM_SASL );
switch( type )
{
2015-06-24 10:52:32 -05:00
case SaslMechScramSha1Plus:
case SaslMechScramSha1:
{
if( type == SaslMechScramSha1 )
{
if( ( m_availableSaslMechs & SaslMechScramSha1Plus ) != SaslMechScramSha1Plus )
m_gs2Header = "y,";
else
m_gs2Header = "n,";
a->addAttribute( "mechanism", "SCRAM-SHA-1" );
}
else // SaslMechScramSha1Plus
{
m_gs2Header = "p=tls-unique,";
a->addAttribute( "mechanism", "SCRAM-SHA-1-PLUS" );
}
std::string t;
if( m_authzid && prep::saslprep( m_authzid.bare(), t ) )
m_gs2Header += "a=" + t;
m_gs2Header += ",";
m_clientFirstMessageBare = "n=";
if( !m_authcid.empty() && prep::saslprep( m_authcid, t ) )
m_clientFirstMessageBare += t;
else if( prep::saslprep( m_jid.username(), t ) )
m_clientFirstMessageBare += t;
m_clientFirstMessageBare += ",r=" + getRandom();
a->setCData( Base64::encode64( m_gs2Header + m_clientFirstMessageBare ) );
break;
}
case SaslMechDigestMd5:
a->addAttribute( "mechanism", "DIGEST-MD5" );
break;
case SaslMechPlain:
{
a->addAttribute( "mechanism", "PLAIN" );
std::string tmp;
if( m_authzid )
tmp += m_authzid.bare();
tmp += '\0';
if( !m_authcid.empty() )
tmp += m_authcid;
else
tmp += m_jid.username();
tmp += '\0';
tmp += m_password;
a->setCData( Base64::encode64( tmp ) );
break;
}
case SaslMechAnonymous:
a->addAttribute( "mechanism", "ANONYMOUS" );
break;
case SaslMechExternal:
a->addAttribute( "mechanism", "EXTERNAL" );
a->setCData( Base64::encode64( m_authzid ? m_authzid.bare() : m_jid.bare() ) );
break;
case SaslMechGssapi:
{
#if defined( _WIN32 ) && !defined( __SYMBIAN32__ )
a->addAttribute( "mechanism", "GSSAPI" );
// The client calls GSS_Init_sec_context, passing in 0 for
// input_context_handle (initially) and a targ_name equal to output_name
// from GSS_Import_Name called with input_name_type of
// GSS_C_NT_HOSTBASED_SERVICE and input_name_string of
// "service@hostname" where "service" is the service name specified in
// the protocol's profile, and "hostname" is the fully qualified host
// name of the server. The client then responds with the resulting
// output_token.
std::string token;
a->setCData( Base64::encode64( token ) );
// etc... see gssapi-sasl-draft.txt
#else
logInstance().err( LogAreaClassClientbase,
"SASL GSSAPI is not supported on this platform. You should never see this." );
#endif
break;
}
case SaslMechNTLM:
{
#if defined( _WIN32 ) && !defined( __SYMBIAN32__ )
a->addAttribute( "mechanism", "NTLM" );
2015-06-24 10:52:32 -05:00
SEC_WINNT_AUTH_IDENTITY_W identity, *ident = 0;
memset( &identity, 0, sizeof( identity ) );
2015-06-24 10:52:32 -05:00
WCHAR *usernameW = 0, *domainW = 0, *passwordW = 0;
int cchUsernameW = 0, cchDomainW = 0, cchPasswordW = 0;
if( m_jid.username().length() > 0 )
{
2015-06-24 10:52:32 -05:00
// NOTE: The return values of MultiByteToWideChar will include room
// for the NUL character since we use -1 for the input length.
cchUsernameW = ::MultiByteToWideChar( CP_UTF8, 0, m_jid.username().c_str(), -1, 0, 0 );
if( cchUsernameW > 0 )
{
usernameW = new WCHAR[cchUsernameW];
::MultiByteToWideChar( CP_UTF8, 0, m_jid.username().c_str(), -1, usernameW, cchUsernameW );
// Guarantee its NUL terminated.
usernameW[cchUsernameW-1] = L'\0';
}
cchDomainW = ::MultiByteToWideChar( CP_UTF8, 0, m_ntlmDomain.c_str(), -1, 0, 0 );
if( cchDomainW > 0 )
{
domainW = new WCHAR[cchDomainW];
::MultiByteToWideChar( CP_UTF8, 0, m_ntlmDomain.c_str(), -1, domainW, cchDomainW );
// Guarantee its NUL terminated.
domainW[cchDomainW-1] = L'\0';
}
cchPasswordW = ::MultiByteToWideChar( CP_UTF8, 0, m_password.c_str(), -1, 0, 0 );
if( cchPasswordW > 0 )
{
passwordW = new WCHAR[cchPasswordW];
::MultiByteToWideChar( CP_UTF8, 0, m_password.c_str(), -1, passwordW, cchPasswordW );
// Guarantee its NUL terminated.
passwordW[cchPasswordW-1] = L'\0';
}
identity.User = (unsigned short*)usernameW;
identity.UserLength = (unsigned long)cchUsernameW-1;
identity.Domain = (unsigned short*)domainW;
identity.DomainLength = (unsigned long)cchDomainW-1;
identity.Password = (unsigned short*)passwordW;
identity.PasswordLength = (unsigned long)cchPasswordW-1;
identity.Flags = SEC_WINNT_AUTH_IDENTITY_UNICODE;
ident = &identity;
}
2015-06-24 10:52:32 -05:00
AcquireCredentialsHandleW( 0, L"NTLM", SECPKG_CRED_OUTBOUND, 0, ident, 0, 0, &m_credHandle, 0 );
if( usernameW != 0 )
{
delete[] usernameW;
usernameW = 0;
}
if( domainW != 0 )
{
delete[] domainW;
domainW = 0;
}
if( passwordW != 0 )
{
::SecureZeroMemory( passwordW, cchPasswordW* sizeof( WCHAR ) );
delete[] passwordW;
passwordW = 0;
}
#else
logInstance().err( LogAreaClassClientbase,
"SASL NTLM is not supported on this platform. You should never see this." );
#endif
break;
}
default:
break;
}
send( a );
}
2015-06-24 10:52:32 -05:00
std::string ClientBase::hmac( const std::string& key, const std::string& str )
{
SHA sha;
std::string key_ = key;
if( key_.length() > 64 )
{
sha.feed( key_ );
key_ = sha.binary();
sha.reset();
}
unsigned char ipad[65];
unsigned char opad[65];
memset( ipad, '\0', sizeof( ipad ) );
memset( opad, '\0', sizeof( opad ) );
memcpy( ipad, key_.c_str(), key_.length() );
memcpy( opad, key_.c_str(), key_.length() );
for( int i = 0; i < 64; i++ )
{
ipad[i] ^= 0x36;
opad[i] ^= 0x5c;
}
sha.feed( ipad, 64 );
sha.feed( str );
key_ = sha.binary();
sha.reset();
sha.feed( opad, 64 );
sha.feed( key_ );
return sha.binary(); // hex() for testing
}
std::string ClientBase::hi( const std::string& str, const std::string& salt, int iter )
{
unsigned char xored[20];
memset( xored, '\0', sizeof( xored ) );
std::string tmp = salt;
tmp.append( "\0\0\0\1", 4 );
for( int i = 0; i < iter; ++i )
{
tmp = hmac( str, tmp );
for( int j = 0; j < 20; ++j )
xored[j] ^= tmp.c_str()[j];
}
return std::string( (char*)xored, 20 );
}
void ClientBase::processSASLChallenge( const std::string& challenge )
{
Tag* t = new Tag( "response", XMLNS, XMLNS_STREAM_SASL );
const std::string& decoded = Base64::decode64( challenge );
switch( m_selectedSaslMech )
{
2015-06-24 10:52:32 -05:00
case SaslMechScramSha1Plus:
case SaslMechScramSha1:
{
std::string snonce, salt, tmp;
int iter = 0;
std::string::size_type posn = decoded.find( "r=" );
std::string::size_type poss = decoded.find( "s=" );
std::string::size_type posi = decoded.find( "i=" );
if( posn == std::string::npos || poss == std::string::npos || posi == std::string::npos )
break;
snonce = decoded.substr( posn + 2, poss - posn - 3 );
salt = Base64::decode64( decoded.substr( poss + 2, posi - poss - 3 ) );
tmp = decoded.substr( posi + 2, decoded.length() - posi - 2 );
iter = atoi( tmp.c_str() );
if( !prep::saslprep( m_password, tmp ) )
break;
std::string saltedPwd = hi( tmp, salt, iter );
std::string ck = hmac( saltedPwd, "Client Key" );
SHA sha;
sha.feed( ck );
std::string storedKey = sha.binary();
if( m_selectedSaslMech == SaslMechScramSha1Plus )
tmp = "c=" + Base64::encode64( m_gs2Header + m_encryption->channelBinding() );
else
tmp = "c=biws";
tmp += ",r=" + snonce;
std::string authMessage = m_clientFirstMessageBare + "," + decoded + "," + tmp; // client-final-message-without-proof
std::string clientSignature = hmac( storedKey, authMessage );
unsigned char clientProof[20]; // ck XOR clientSignature
memcpy( clientProof, ck.c_str(), 20 );
for( int i = 0; i < 20; ++i )
clientProof[i] ^= clientSignature.c_str()[i];
std::string serverKey = hmac( saltedPwd, "Server Key" );
m_serverSignature = hmac( serverKey, authMessage );
tmp += ",p=";
tmp.append( Base64::encode64( std::string( (char*)clientProof, 20 ) ) );
t->setCData( Base64::encode64( tmp ) );
break;
}
case SaslMechDigestMd5:
{
if( !decoded.compare( 0, 7, "rspauth" ) )
break;
std::string realm;
std::string::size_type end = 0;
std::string::size_type pos = decoded.find( "realm=" );
if( pos != std::string::npos )
{
end = decoded.find( '"', pos + 7 );
realm = decoded.substr( pos + 7, end - ( pos + 7 ) );
}
else
realm = m_jid.server();
pos = decoded.find( "nonce=" );
if( pos == std::string::npos )
return;
end = decoded.find( '"', pos + 7 );
while( decoded[end-1] == '\\' )
end = decoded.find( '"', end + 1 );
std::string nonce = decoded.substr( pos + 7, end - ( pos + 7 ) );
2015-06-24 10:52:32 -05:00
std::string cnonce = getRandom();
MD5 md5;
md5.feed( m_jid.username() );
md5.feed( ":" );
md5.feed( realm );
md5.feed( ":" );
md5.feed( m_password );
md5.finalize();
const std::string& a1_h = md5.binary();
md5.reset();
md5.feed( a1_h );
md5.feed( ":" );
md5.feed( nonce );
md5.feed( ":" );
md5.feed( cnonce );
md5.finalize();
const std::string& a1 = md5.hex();
md5.reset();
md5.feed( "AUTHENTICATE:xmpp/" );
md5.feed( m_jid.server() );
md5.finalize();
const std::string& a2 = md5.hex();
md5.reset();
md5.feed( a1 );
md5.feed( ":" );
md5.feed( nonce );
md5.feed( ":00000001:" );
md5.feed( cnonce );
md5.feed( ":auth:" );
md5.feed( a2 );
md5.finalize();
std::string response = "username=\"";
response += m_jid.username();
response += "\",realm=\"";
response += realm;
response += "\",nonce=\"";
response += nonce;
response += "\",cnonce=\"";
response += cnonce;
response += "\",nc=00000001,qop=auth,digest-uri=\"xmpp/";
response += m_jid.server();
response += "\",response=";
response += md5.hex();
response += ",charset=utf-8";
if( m_authzid )
response += ",authzid=" + m_authzid.bare();
t->setCData( Base64::encode64( response ) );
break;
}
case SaslMechGssapi:
#if defined( _WIN32 ) && !defined( __SYMBIAN32__ )
// see gssapi-sasl-draft.txt
#else
m_logInstance.err( LogAreaClassClientbase,
"Huh, received GSSAPI challenge?! This should have never happened!" );
#endif
break;
case SaslMechNTLM:
{
#if defined( _WIN32 ) && !defined( __SYMBIAN32__ )
bool type1 = ( decoded.length() < 7 ) ? true : false;
SecBuffer bufferIn = { type1 ? 0 : (unsigned long)decoded.length(),
SECBUFFER_TOKEN,
(void*)decoded.c_str() };
SecBufferDesc secIn = { 0, 1, &bufferIn };
char buffer[4096];
SecBuffer bufferOut = { sizeof( buffer ), SECBUFFER_TOKEN, buffer };
SecBufferDesc secOut = { 0, 1, &bufferOut };
TimeStamp timestamp;
unsigned long contextAttr;
SECURITY_STATUS status = InitializeSecurityContext( &m_credHandle, type1 ? 0 : &m_ctxtHandle,
0, ISC_REQ_MUTUAL_AUTH, 0, 0, &secIn, 0,
&m_ctxtHandle, &secOut, &contextAttr,
&timestamp );
std::string response;
if( SUCCEEDED( status ) )
{
response = std::string( (const char *)bufferOut.pvBuffer, bufferOut.cbBuffer );
}
else
{
logInstance().err( LogAreaClassClientbase,
"InitializeSecurityContext() failed, return value "
+ util::int2string( status ) );
}
t->setCData( Base64::encode64( response ) );
#else
m_logInstance.err( LogAreaClassClientbase,
"Huh, received NTLM challenge?! This should have never happened!" );
#endif
break;
}
default:
// should never happen.
break;
}
send( t );
}
void ClientBase::processSASLError( Tag* tag )
{
if( tag->hasChild( "aborted" ) )
m_authError = SaslAborted;
else if( tag->hasChild( "incorrect-encoding" ) )
m_authError = SaslIncorrectEncoding;
else if( tag->hasChild( "invalid-authzid" ) )
m_authError = SaslInvalidAuthzid;
else if( tag->hasChild( "invalid-mechanism" ) )
m_authError = SaslInvalidMechanism;
else if( tag->hasChild( "malformed-request" ) )
m_authError = SaslMalformedRequest;
else if( tag->hasChild( "mechanism-too-weak" ) )
m_authError = SaslMechanismTooWeak;
else if( tag->hasChild( "not-authorized" ) )
m_authError = SaslNotAuthorized;
else if( tag->hasChild( "temporary-auth-failure" ) )
m_authError = SaslTemporaryAuthFailure;
#if defined( _WIN32 ) && !defined( __SYMBIAN32__ )
if( m_selectedSaslMech == SaslMechNTLM )
{
FreeCredentialsHandle( &m_credHandle );
DeleteSecurityContext( &m_ctxtHandle );
}
#endif
}
2015-06-24 10:52:32 -05:00
bool ClientBase::processSASLSuccess( const std::string& payload )
{
#if defined( _WIN32 ) && !defined( __SYMBIAN32__ )
if( m_selectedSaslMech == SaslMechNTLM )
{
FreeCredentialsHandle( &m_credHandle );
DeleteSecurityContext( &m_ctxtHandle );
}
#endif
2015-06-24 10:52:32 -05:00
if( m_selectedSaslMech == SaslMechScramSha1 || m_selectedSaslMech == SaslMechScramSha1Plus )
{
const std::string decoded = Base64::decode64( payload );
if( decoded.length() < 3 || Base64::decode64( decoded.substr( 2 ) ) != m_serverSignature )
return false;
}
return true;
}
void ClientBase::send( IQ& iq, IqHandler* ih, int context, bool del )
{
if( ih && ( iq.subtype() == IQ::Set || iq.subtype() == IQ::Get ) )
{
if( iq.id().empty() )
iq.setID( getID() );
TrackStruct track;
track.ih = ih;
track.context = context;
track.del = del;
m_iqHandlerMapMutex.lock();
m_iqIDHandlers[iq.id()] = track;
m_iqHandlerMapMutex.unlock();
}
send( iq );
}
void ClientBase::send( const IQ& iq )
{
++m_stats.iqStanzasSent;
Tag* tag = iq.tag();
addFrom( tag );
addNamespace( tag );
2015-06-24 10:52:32 -05:00
send( tag, true, false );
}
void ClientBase::send( const Message& msg )
{
++m_stats.messageStanzasSent;
Tag* tag = msg.tag();
addFrom( tag );
addNamespace( tag );
2015-06-24 10:52:32 -05:00
send( tag, true, false );
}
void ClientBase::send( const Subscription& sub )
{
++m_stats.s10nStanzasSent;
Tag* tag = sub.tag();
addFrom( tag );
addNamespace( tag );
2015-06-24 10:52:32 -05:00
send( tag, true, false );
}
2015-06-24 10:52:32 -05:00
void ClientBase::send( const Presence& pres )
{
++m_stats.presenceStanzasSent;
Tag* tag = pres.tag();
StanzaExtensionList::const_iterator it = m_presenceExtensions.begin();
for( ; it != m_presenceExtensions.end(); ++it )
tag->addChild( (*it)->tag() );
addFrom( tag );
addNamespace( tag );
2015-06-24 10:52:32 -05:00
send( tag, true, false );
}
void ClientBase::send( Tag* tag )
{
if( !tag )
return;
2015-06-24 10:52:32 -05:00
send( tag, false, true );
}
void ClientBase::send( Tag* tag, bool queue, bool del )
{
if( !tag )
return;
send( tag->xml() );
++m_stats.totalStanzasSent;
if( m_statisticsHandler )
m_statisticsHandler->handleStatistics( getStatistics() );
2015-06-24 10:52:32 -05:00
if( queue && m_smContext >= CtxSMEnabled )
{
m_queueMutex.lock();
m_smQueue.insert( std::make_pair( ++m_smSent, tag ) );
m_queueMutex.unlock();
}
else if( del || m_smContext < CtxSMEnabled )
delete tag;
}
void ClientBase::send( const std::string& xml )
{
if( m_connection && m_connection->state() == StateConnected )
{
if( m_compression && m_compressionActive )
m_compression->compress( xml );
else if( m_encryption && m_encryptionActive )
m_encryption->encrypt( xml );
else
m_connection->send( xml );
logInstance().dbg( LogAreaXmlOutgoing, xml );
}
}
2015-06-24 10:52:32 -05:00
void ClientBase::checkQueue( int handled, bool resend )
{
if( m_smContext < CtxSMEnabled || handled < 0 )
return;
util::MutexGuard mg( m_queueMutex );
SMQueueMap::iterator it = m_smQueue.begin();
while( it != m_smQueue.end() )
{
if( (*it).first <= handled )
{
delete (*it).second;
m_smQueue.erase( it++ );
}
else if( resend && (*it).first > handled )
{
send( (*it).second, false, false );
++it;
}
else
{
++it;
}
}
}
const TagList ClientBase::sendQueue()
{
TagList l;
util::MutexGuard mg( m_queueMutex );
SMQueueMap::iterator it = m_smQueue.begin();
for( ; it != m_smQueue.end(); ++it )
l.push_back( (*it).second->clone() );
return l;
}
void ClientBase::addFrom( Tag* tag )
{
if( !m_authed /*for IQ Auth */ || !tag || tag->hasAttribute( "from" ) )
return;
2015-06-24 10:52:32 -05:00
tag->addAttribute( "from", m_jid.full() );
}
void ClientBase::addNamespace( Tag* tag )
{
if( !tag || !tag->xmlns().empty() )
return;
tag->setXmlns( m_namespace );
}
void ClientBase::registerStanzaExtension( StanzaExtension* ext )
{
if( !m_seFactory )
m_seFactory = new StanzaExtensionFactory();
m_seFactory->registerExtension( ext );
}
bool ClientBase::removeStanzaExtension( int ext )
{
if( !m_seFactory )
return false;
return m_seFactory->removeExtension( ext );
}
StatisticsStruct ClientBase::getStatistics()
{
if( m_connection )
m_connection->getStatistics( m_stats.totalBytesReceived, m_stats.totalBytesSent );
return m_stats;
}
ConnectionState ClientBase::state() const
{
return m_connection ? m_connection->state() : StateDisconnected;
}
void ClientBase::whitespacePing()
{
send( " " );
}
void ClientBase::xmppPing( const JID& to, EventHandler* eh )
{
const std::string& id = getID();
IQ iq( IQ::Get, to, id );
iq.addExtension( new Ping() );
m_dispatcher.registerEventHandler( eh, id );
send( iq, this, XMPPPing );
}
bool ClientBase::handleIq( const IQ& iq )
{
const Ping* p = iq.findExtension<Ping>( ExtPing );
if( !p || iq.subtype() != IQ::Get )
return false;
m_dispatcher.dispatch( Event( Event::PingPing, iq ) );
IQ re( IQ::Result, iq.from(), iq.id() );
send( re );
return true;
}
void ClientBase::handleIqID( const IQ& iq, int context )
{
if( context == XMPPPing )
m_dispatcher.dispatch( Event( ( iq.subtype() == IQ::Result ) ? Event::PingPong
: Event::PingError, iq ),
iq.id(), true );
else
handleIqIDForward( iq, context );
}
const std::string ClientBase::getID()
{
2015-06-24 10:52:32 -05:00
#ifdef CLIENTBASE_TEST // to create predictable UIDs in test mode
return "uid" + util::int2string( m_nextId.increment() );
#else
char r[21+1];
2015-06-24 10:52:32 -05:00
sprintf( r, "uid-%08x-%08x", m_uniqueBaseId, m_nextId.increment() );
std::string ret( r, 21 );
return ret;
2015-06-24 10:52:32 -05:00
#endif
}
bool ClientBase::checkStreamVersion( const std::string& version )
{
if( version.empty() )
return false;
int major = 0;
2015-06-24 10:52:32 -05:00
// int minor = 0;
int myMajor = atoi( XMPP_STREAM_VERSION_MAJOR.c_str() );
size_t dot = version.find( '.' );
if( !version.empty() && dot && dot != std::string::npos )
{
major = atoi( version.substr( 0, dot ).c_str() );
2015-06-24 10:52:32 -05:00
// minor = atoi( version.substr( dot ).c_str() );
}
return myMajor >= major;
}
2015-06-24 10:52:32 -05:00
void ClientBase::setConnectionImpl( ConnectionBase* connection )
{
2015-06-24 10:52:32 -05:00
ConnectionBase* old = m_connection;
m_connection = connection;
m_customConnection = true;
if( old )
delete old;
}
2015-06-24 10:52:32 -05:00
void ClientBase::setEncryptionImpl( TLSBase* encryption )
{
2015-06-24 10:52:32 -05:00
TLSBase* old = m_encryption;
m_encryption = encryption;
if( old )
delete old;
}
2015-06-24 10:52:32 -05:00
void ClientBase::setCompressionImpl( CompressionBase* compression )
{
2015-06-24 10:52:32 -05:00
CompressionBase* old = m_compression;
m_compression = compression;
if( old )
delete old;
}
void ClientBase::handleStreamError( Tag* tag )
{
StreamError err = StreamErrorUndefined;
const TagList& c = tag->children();
TagList::const_iterator it = c.begin();
for( ; it != c.end(); ++it )
{
const std::string& name = (*it)->name();
if( name == "bad-format" )
err = StreamErrorBadFormat;
else if( name == "bad-namespace-prefix" )
err = StreamErrorBadNamespacePrefix;
else if( name == "conflict" )
err = StreamErrorConflict;
else if( name == "connection-timeout" )
err = StreamErrorConnectionTimeout;
else if( name == "host-gone" )
err = StreamErrorHostGone;
else if( name == "host-unknown" )
err = StreamErrorHostUnknown;
else if( name == "improper-addressing" )
err = StreamErrorImproperAddressing;
else if( name == "internal-server-error" )
err = StreamErrorInternalServerError;
else if( name == "invalid-from" )
err = StreamErrorInvalidFrom;
else if( name == "invalid-id" )
err = StreamErrorInvalidId;
else if( name == "invalid-namespace" )
err = StreamErrorInvalidNamespace;
else if( name == "invalid-xml" )
err = StreamErrorInvalidXml;
else if( name == "not-authorized" )
err = StreamErrorNotAuthorized;
else if( name == "policy-violation" )
err = StreamErrorPolicyViolation;
else if( name == "remote-connection-failed" )
err = StreamErrorRemoteConnectionFailed;
else if( name == "resource-constraint" )
err = StreamErrorResourceConstraint;
else if( name == "restricted-xml" )
err = StreamErrorRestrictedXml;
else if( name == "see-other-host" )
{
err = StreamErrorSeeOtherHost;
m_streamErrorCData = tag->findChild( "see-other-host" )->cdata();
}
else if( name == "system-shutdown" )
err = StreamErrorSystemShutdown;
else if( name == "undefined-condition" )
err = StreamErrorUndefinedCondition;
else if( name == "unsupported-encoding" )
err = StreamErrorUnsupportedEncoding;
else if( name == "unsupported-stanza-type" )
err = StreamErrorUnsupportedStanzaType;
else if( name == "unsupported-version" )
err = StreamErrorUnsupportedVersion;
else if( name == "xml-not-well-formed" )
err = StreamErrorXmlNotWellFormed;
else if( name == "text" )
{
const std::string& lang = (*it)->findAttribute( "xml:lang" );
if( !lang.empty() )
m_streamErrorText[lang] = (*it)->cdata();
else
m_streamErrorText["default"] = (*it)->cdata();
}
else
m_streamErrorAppCondition = (*it);
if( err != StreamErrorUndefined && (*it)->hasAttribute( XMLNS, XMLNS_XMPP_STREAM ) )
m_streamError = err;
}
}
const std::string& ClientBase::streamErrorText( const std::string& lang ) const
{
StringMap::const_iterator it = m_streamErrorText.find( lang );
return ( it != m_streamErrorText.end() ) ? (*it).second : EmptyString;
}
void ClientBase::registerMessageSessionHandler( MessageSessionHandler* msh, int types )
{
if( types & Message::Chat || types == 0 )
m_messageSessionHandlerChat = msh;
if( types & Message::Normal || types == 0 )
m_messageSessionHandlerNormal = msh;
if( types & Message::Groupchat || types == 0 )
m_messageSessionHandlerGroupchat = msh;
if( types & Message::Headline || types == 0 )
m_messageSessionHandlerHeadline = msh;
}
void ClientBase::registerPresenceHandler( PresenceHandler* ph )
{
if( ph )
m_presenceHandlers.push_back( ph );
}
void ClientBase::removePresenceHandler( PresenceHandler* ph )
{
if( ph )
m_presenceHandlers.remove( ph );
}
void ClientBase::registerPresenceHandler( const JID& jid, PresenceHandler* ph )
{
if( ph && jid )
{
JidPresHandlerStruct jph;
jph.jid = new JID( jid.bare() );
jph.ph = ph;
m_presenceJidHandlers.push_back( jph );
}
}
void ClientBase::removePresenceHandler( const JID& jid, PresenceHandler* ph )
{
PresenceJidHandlerList::iterator t;
PresenceJidHandlerList::iterator it = m_presenceJidHandlers.begin();
while( it != m_presenceJidHandlers.end() )
{
t = it;
++it;
if( ( !ph || (*t).ph == ph ) && (*t).jid->bare() == jid.bare() )
{
delete (*t).jid;
m_presenceJidHandlers.erase( t );
}
}
}
void ClientBase::removeIDHandler( IqHandler* ih )
{
IqTrackMap::iterator t;
m_iqHandlerMapMutex.lock();
IqTrackMap::iterator it = m_iqIDHandlers.begin();
while( it != m_iqIDHandlers.end() )
{
t = it;
++it;
if( ih == (*t).second.ih )
m_iqIDHandlers.erase( t );
}
m_iqHandlerMapMutex.unlock();
}
void ClientBase::registerIqHandler( IqHandler* ih, int exttype )
{
if( !ih )
return;
2015-06-24 10:52:32 -05:00
util::MutexGuard m( m_iqExtHandlerMapMutex );
typedef IqHandlerMap::const_iterator IQci;
std::pair<IQci, IQci> g = m_iqExtHandlers.equal_range( exttype );
for( IQci it = g.first; it != g.second; ++it )
2015-06-24 10:52:32 -05:00
{
if( (*it).second == ih )
return;
2015-06-24 10:52:32 -05:00
}
m_iqExtHandlers.insert( std::make_pair( exttype, ih ) );
}
void ClientBase::removeIqHandler( IqHandler* ih, int exttype )
{
if( !ih )
return;
2015-06-24 10:52:32 -05:00
util::MutexGuard m( m_iqExtHandlerMapMutex );
typedef IqHandlerMap::iterator IQi;
std::pair<IQi, IQi> g = m_iqExtHandlers.equal_range( exttype );
IQi it2;
IQi it = g.first;
while( it != g.second )
{
it2 = it++;
if( (*it2).second == ih )
m_iqExtHandlers.erase( it2 );
}
}
void ClientBase::registerMessageSession( MessageSession* session )
{
if( session )
m_messageSessions.push_back( session );
}
void ClientBase::disposeMessageSession( MessageSession* session )
{
if( !session )
return;
MessageSessionList::iterator it = std::find( m_messageSessions.begin(),
m_messageSessions.end(),
session );
if( it != m_messageSessions.end() )
{
delete (*it);
m_messageSessions.erase( it );
}
}
void ClientBase::registerMessageHandler( MessageHandler* mh )
{
if( mh )
m_messageHandlers.push_back( mh );
}
void ClientBase::removeMessageHandler( MessageHandler* mh )
{
if( mh )
m_messageHandlers.remove( mh );
}
void ClientBase::registerSubscriptionHandler( SubscriptionHandler* sh )
{
if( sh )
m_subscriptionHandlers.push_back( sh );
}
void ClientBase::removeSubscriptionHandler( SubscriptionHandler* sh )
{
if( sh )
m_subscriptionHandlers.remove( sh );
}
void ClientBase::registerTagHandler( TagHandler* th, const std::string& tag, const std::string& xmlns )
{
if( th && !tag.empty() )
{
TagHandlerStruct ths;
ths.tag = tag;
ths.xmlns = xmlns;
ths.th = th;
m_tagHandlers.push_back( ths );
}
}
void ClientBase::removeTagHandler( TagHandler* th, const std::string& tag, const std::string& xmlns )
{
if( th )
{
2015-06-24 10:52:32 -05:00
for( TagHandlerList::iterator it = m_tagHandlers.begin(); it != m_tagHandlers.end(); )
{
if( (*it).th == th && (*it).tag == tag && (*it).xmlns == xmlns )
2015-06-24 10:52:32 -05:00
{
// Normally we'd just assign it to the return value of the .erase() call,
// which is either the next element, or .end(). However,
// it's only since C++11 that this works; C++03 version returns void.
// So instead, we do a post-increment. this increments the iterator to point
// to the next element, then passes a copy of the old iterator (that is to the item to be deleted)
m_tagHandlers.erase( it++ );
}
else
{
++it;
}
}
}
}
void ClientBase::registerStatisticsHandler( StatisticsHandler* sh )
{
if( sh )
m_statisticsHandler = sh;
}
void ClientBase::removeStatisticsHandler()
{
m_statisticsHandler = 0;
}
void ClientBase::registerMUCInvitationHandler( MUCInvitationHandler* mih )
{
if( mih )
{
m_mucInvitationHandler = mih;
m_disco->addFeature( XMLNS_MUC );
}
}
void ClientBase::removeMUCInvitationHandler()
{
m_mucInvitationHandler = 0;
m_disco->removeFeature( XMLNS_MUC );
}
void ClientBase::registerConnectionListener( ConnectionListener* cl )
{
if( cl )
m_connectionListeners.push_back( cl );
}
void ClientBase::removeConnectionListener( ConnectionListener* cl )
{
if( cl )
m_connectionListeners.remove( cl );
}
void ClientBase::notifyOnConnect()
{
util::ForEach( m_connectionListeners, &ConnectionListener::onConnect );
}
void ClientBase::notifyOnDisconnect( ConnectionError e )
{
util::ForEach( m_connectionListeners, &ConnectionListener::onDisconnect, e );
init();
}
bool ClientBase::notifyOnTLSConnect( const CertInfo& info )
{
ConnectionListenerList::const_iterator it = m_connectionListeners.begin();
for( ; it != m_connectionListeners.end() && (*it)->onTLSConnect( info ); ++it )
;
return m_stats.encryption = ( it == m_connectionListeners.end() );
}
void ClientBase::notifyOnResourceBindError( const Error* error )
{
util::ForEach( m_connectionListeners, &ConnectionListener::onResourceBindError, error );
}
void ClientBase::notifyOnResourceBind( const std::string& resource )
{
util::ForEach( m_connectionListeners, &ConnectionListener::onResourceBind, resource );
}
void ClientBase::notifyOnSessionCreateError( const Error* error )
{
util::ForEach( m_connectionListeners, &ConnectionListener::onSessionCreateError, error );
}
void ClientBase::notifyStreamEvent( StreamEvent event )
{
util::ForEach( m_connectionListeners, &ConnectionListener::onStreamEvent, event );
}
void ClientBase::notifyPresenceHandlers( Presence& pres )
{
bool match = false;
PresenceJidHandlerList::const_iterator t;
PresenceJidHandlerList::const_iterator itj = m_presenceJidHandlers.begin();
while( itj != m_presenceJidHandlers.end() )
{
t = itj++;
if( (*t).jid->bare() == pres.from().bare() && (*t).ph )
{
(*t).ph->handlePresence( pres );
match = true;
}
}
if( match )
return;
// FIXME remove this for() for 1.1:
PresenceHandlerList::const_iterator it = m_presenceHandlers.begin();
for( ; it != m_presenceHandlers.end(); ++it )
{
(*it)->handlePresence( pres );
}
// FIXME and reinstantiate this:
// util::ForEach( m_presenceHandlers, &PresenceHandler::handlePresence, pres );
}
void ClientBase::notifySubscriptionHandlers( Subscription& s10n )
{
// FIXME remove this for() for 1.1:
SubscriptionHandlerList::const_iterator it = m_subscriptionHandlers.begin();
for( ; it != m_subscriptionHandlers.end(); ++it )
{
(*it)->handleSubscription( s10n );
}
// FIXME and reinstantiate this:
// util::ForEach( m_subscriptionHandlers, &SubscriptionHandler::handleSubscription, s10n );
}
void ClientBase::notifyIqHandlers( IQ& iq )
{
m_iqHandlerMapMutex.lock();
IqTrackMap::iterator it_id = m_iqIDHandlers.find( iq.id() );
2015-06-24 10:52:32 -05:00
bool haveIdHandler = ( it_id != m_iqIDHandlers.end() );
m_iqHandlerMapMutex.unlock();
2015-06-24 10:52:32 -05:00
if( haveIdHandler && ( iq.subtype() == IQ::Result || iq.subtype() == IQ::Error ) )
{
(*it_id).second.ih->handleIqID( iq, (*it_id).second.context );
if( (*it_id).second.del )
delete (*it_id).second.ih;
m_iqHandlerMapMutex.lock();
m_iqIDHandlers.erase( it_id );
m_iqHandlerMapMutex.unlock();
return;
}
if( iq.extensions().empty() )
2015-06-24 10:52:32 -05:00
{
if ( iq.subtype() == IQ::Get || iq.subtype() == IQ::Set )
{
IQ re( IQ::Error, iq.from(), iq.id() );
re.addExtension( new Error( StanzaErrorTypeCancel, StanzaErrorFeatureNotImplemented ) );
send( re );
}
return;
2015-06-24 10:52:32 -05:00
}
2015-06-24 10:52:32 -05:00
bool handled = false;
// FIXME remove for 1.1
// typedef IqHandlerMapXmlns::const_iterator IQciXmlns
// Tag *tag = iq.tag()->xmlns();
// std::pair<IQciXmlns, IQciXmlns> g = m_iqNSHandlers.equal_range( tag->xmlns() );
// for( IQciXmlns it = g.first; it != g.second; ++it )
// {
// if( (*it).second->handleIq( iq ) )
// res = true;
// }
// delete tag;
2015-06-24 10:52:32 -05:00
m_iqExtHandlerMapMutex.lock();
typedef IqHandlerMap::const_iterator IQci;
const StanzaExtensionList& sel = iq.extensions();
StanzaExtensionList::const_iterator itse = sel.begin();
2015-06-24 10:52:32 -05:00
for( ; !handled && itse != sel.end(); ++itse )
{
std::pair<IQci, IQci> g = m_iqExtHandlers.equal_range( (*itse)->extensionType() );
2015-06-24 10:52:32 -05:00
for( IQci it = g.first; !handled && it != g.second; ++it )
{
if( (*it).second->handleIq( iq ) )
2015-06-24 10:52:32 -05:00
handled = true;
}
}
2015-06-24 10:52:32 -05:00
m_iqExtHandlerMapMutex.unlock();
2015-06-24 10:52:32 -05:00
if( !handled && ( iq.subtype() == IQ::Get || iq.subtype() == IQ::Set ) )
{
IQ re( IQ::Error, iq.from(), iq.id() );
re.addExtension( new Error( StanzaErrorTypeCancel, StanzaErrorServiceUnavailable ) );
send( re );
}
}
void ClientBase::notifyMessageHandlers( Message& msg )
{
if( m_mucInvitationHandler )
{
const MUCRoom::MUCUser* mu = msg.findExtension<MUCRoom::MUCUser>( ExtMUCUser );
if( mu && mu->operation() != MUCRoom::OpInviteTo )
{
m_mucInvitationHandler->handleMUCInvitation( msg.from(),
mu->jid() ? JID( *(mu->jid()) ) : JID(),
mu->reason() ? *(mu->reason()) : EmptyString,
msg.body(),
mu->password() ? *(mu->password()) : EmptyString,
mu->continued(),
mu->thread() ? *(mu->thread()) : EmptyString );
return;
}
}
MessageSessionList::const_iterator it1 = m_messageSessions.begin();
for( ; it1 != m_messageSessions.end(); ++it1 )
{
if( (*it1)->target().full() == msg.from().full() &&
( msg.thread().empty()
|| (*it1)->threadID() == msg.thread()
|| (*it1)->honorThreadID() ) &&
// FIXME don't use '== 0' here
( (*it1)->types() & msg.subtype() || (*it1)->types() == 0 ) )
{
(*it1)->handleMessage( msg );
return;
}
}
it1 = m_messageSessions.begin();
for( ; it1 != m_messageSessions.end(); ++it1 )
{
if( (*it1)->target().bare() == msg.from().bare() &&
( msg.thread().empty()
|| (*it1)->threadID() == msg.thread()
|| (*it1)->honorThreadID() ) &&
// FIXME don't use '== 0' here
( (*it1)->types() & msg.subtype() || (*it1)->types() == 0 ) )
{
(*it1)->handleMessage( msg );
return;
}
}
MessageSessionHandler* msHandler = 0;
switch( msg.subtype() )
{
case Message::Chat:
msHandler = m_messageSessionHandlerChat;
break;
case Message::Normal:
msHandler = m_messageSessionHandlerNormal;
break;
case Message::Groupchat:
msHandler = m_messageSessionHandlerGroupchat;
break;
case Message::Headline:
msHandler = m_messageSessionHandlerHeadline;
break;
default:
break;
}
if( msHandler )
{
MessageSession* session = new MessageSession( this, msg.from(), true, msg.subtype() );
msHandler->handleMessageSession( session );
session->handleMessage( msg );
}
else
{
// FIXME remove this for() for 1.1:
MessageHandlerList::const_iterator it = m_messageHandlers.begin();
for( ; it != m_messageHandlers.end(); ++it )
{
(*it)->handleMessage( msg );
}
// FIXME and reinstantiate this:
// util::ForEach( m_messageHandlers, &MessageHandler::handleMessage, msg ); // FIXME remove for 1.1
}
}
void ClientBase::notifyTagHandlers( Tag* tag )
{
TagHandlerList::const_iterator it = m_tagHandlers.begin();
for( ; it != m_tagHandlers.end(); ++it )
{
if( (*it).tag == tag->name() && tag->hasAttribute( XMLNS, (*it).xmlns ) )
(*it).th->handleTag( tag );
}
}
void ClientBase::addPresenceExtension( StanzaExtension* se )
{
if( !se )
return;
removePresenceExtension( se->extensionType() );
m_presenceExtensions.push_back( se );
}
bool ClientBase::removePresenceExtension( int type )
{
StanzaExtensionList::iterator it = m_presenceExtensions.begin();
for( ; it != m_presenceExtensions.end(); ++it )
{
if( (*it)->extensionType() == type )
{
delete (*it);
m_presenceExtensions.erase( it );
return true;
}
}
return false;
}
2015-06-24 10:52:32 -05:00
std::string ClientBase::getRandom()
{
char cn[4*8+1];
for( int i = 0; i < 4; ++i )
sprintf( cn + i*8, "%08x", rand() );
return std::string( cn, 4*8 );;
}
CompressionBase* ClientBase::getDefaultCompression()
{
if( !m_compress )
return 0;
#ifdef HAVE_ZLIB
CompressionBase* cmp = new CompressionZlib( this );
if( cmp->init() )
return cmp;
delete cmp;
#endif
return 0;
}
TLSBase* ClientBase::getDefaultEncryption()
{
if( m_tls == TLSDisabled || !hasTls() )
return 0;
TLSDefault* tls = new TLSDefault( this, m_server );
if( tls->init( m_clientKey, m_clientCerts, m_cacerts ) )
return tls;
else
{
delete tls;
return 0;
}
}
}