/* * connection.c * vim: expandtab:ts=4:sts=4:sw=4 * * Copyright (C) 2012 - 2019 James Booth * Copyright (C) 2018 - 2019 Michael Vetter * * This file is part of Profanity. * * Profanity is free software: you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation, either version 3 of the License, or * (at your option) any later version. * * Profanity is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with Profanity. If not, see . * * In addition, as a special exception, the copyright holders give permission to * link the code of portions of this program with the OpenSSL library under * certain conditions as described in each individual source file, and * distribute linked combinations including the two. * * You must obey the GNU General Public License in all respects for all of the * code used other than OpenSSL. If you modify file(s) with this exception, you * may extend this exception to your version of the file(s), but you are not * obligated to do so. If you do not wish to do so, delete this exception * statement from your version. If you delete this exception statement from all * source files in the program, then also delete it here. * */ #include "config.h" #include #include #include #include #include #include #include "common.h" #include "log.h" #include "config/files.h" #include "config/preferences.h" #include "event/server_events.h" #include "xmpp/connection.h" #include "xmpp/session.h" #include "xmpp/stanza.h" #include "xmpp/iq.h" #include "ui/ui.h" typedef struct prof_conn_t { xmpp_log_t* xmpp_log; xmpp_ctx_t* xmpp_ctx; xmpp_conn_t* xmpp_conn; gboolean xmpp_in_event_loop; jabber_conn_status_t conn_status; xmpp_conn_event_t conn_last_event; char* presence_message; int priority; char* domain; GHashTable* available_resources; GHashTable* features_by_jid; GHashTable* requested_features; } ProfConnection; typedef struct { const char* username; const char* password; } prof_reg_t; static ProfConnection conn; static gchar* profanity_instance_id = NULL; static gchar* prof_identifier = NULL; static xmpp_log_t* _xmpp_get_file_logger(void); static void _xmpp_file_logger(void* const userdata, const xmpp_log_level_t level, const char* const area, const char* const msg); static void _connection_handler(xmpp_conn_t* const xmpp_conn, const xmpp_conn_event_t status, const int error, xmpp_stream_error_t* const stream_error, void* const userdata); TLSCertificate* _xmppcert_to_profcert(const xmpp_tlscert_t* xmpptlscert); static int _connection_certfail_cb(const xmpp_tlscert_t* xmpptlscert, const char* errormsg); static void _random_bytes_init(void); static void _random_bytes_close(void); static void _compute_identifier(const char* barejid); void connection_init(void) { xmpp_initialize(); conn.xmpp_conn = NULL; conn.xmpp_ctx = NULL; conn.xmpp_in_event_loop = FALSE; conn.conn_status = JABBER_DISCONNECTED; conn.conn_last_event = XMPP_CONN_DISCONNECT; conn.presence_message = NULL; conn.domain = NULL; conn.features_by_jid = NULL; conn.available_resources = g_hash_table_new_full(g_str_hash, g_str_equal, free, (GDestroyNotify)resource_destroy); conn.requested_features = g_hash_table_new_full(g_str_hash, g_str_equal, free, NULL); _random_bytes_init(); } void connection_check_events(void) { conn.xmpp_in_event_loop = TRUE; xmpp_run_once(conn.xmpp_ctx, 10); conn.xmpp_in_event_loop = FALSE; } void connection_shutdown(void) { connection_clear_data(); xmpp_shutdown(); free(conn.xmpp_log); conn.xmpp_log = NULL; _random_bytes_close(); } jabber_conn_status_t connection_connect(const char* const jid, const char* const passwd, const char* const altdomain, int port, const char* const tls_policy, const char* const auth_policy) { long flags; assert(jid != NULL); assert(passwd != NULL); Jid* jidp = jid_create(jid); if (jidp == NULL) { log_error("Malformed JID not able to connect: %s", jid); conn.conn_status = JABBER_DISCONNECTED; return conn.conn_status; } _compute_identifier(jidp->barejid); jid_destroy(jidp); log_info("Connecting as %s", jid); if (conn.xmpp_log) { free(conn.xmpp_log); } conn.xmpp_log = _xmpp_get_file_logger(); if (conn.xmpp_conn) { xmpp_conn_release(conn.xmpp_conn); } if (conn.xmpp_ctx) { xmpp_ctx_free(conn.xmpp_ctx); } conn.xmpp_ctx = xmpp_ctx_new(NULL, conn.xmpp_log); if (conn.xmpp_ctx == NULL) { log_warning("Failed to get libstrophe ctx during connect"); return JABBER_DISCONNECTED; } xmpp_ctx_set_verbosity(conn.xmpp_ctx, 0); conn.xmpp_conn = xmpp_conn_new(conn.xmpp_ctx); if (conn.xmpp_conn == NULL) { log_warning("Failed to get libstrophe conn during connect"); return JABBER_DISCONNECTED; } xmpp_conn_set_jid(conn.xmpp_conn, jid); xmpp_conn_set_pass(conn.xmpp_conn, passwd); flags = xmpp_conn_get_flags(conn.xmpp_conn); if (!tls_policy || (g_strcmp0(tls_policy, "force") == 0)) { flags |= XMPP_CONN_FLAG_MANDATORY_TLS; } else if (g_strcmp0(tls_policy, "trust") == 0) { flags |= XMPP_CONN_FLAG_MANDATORY_TLS; flags |= XMPP_CONN_FLAG_TRUST_TLS; } else if (g_strcmp0(tls_policy, "disable") == 0) { flags |= XMPP_CONN_FLAG_DISABLE_TLS; } else if (g_strcmp0(tls_policy, "legacy") == 0) { flags |= XMPP_CONN_FLAG_LEGACY_SSL; } if (auth_policy && (g_strcmp0(auth_policy, "legacy") == 0)) { flags |= XMPP_CONN_FLAG_LEGACY_AUTH; } xmpp_conn_set_flags(conn.xmpp_conn, flags); /* Print debug logs that can help when users share the logs */ if (flags != 0) { log_debug("Connecting with flags (0x%lx):", flags); #define LOG_FLAG_IF_SET(name) \ if (flags & name) { \ log_debug(" " #name); \ } LOG_FLAG_IF_SET(XMPP_CONN_FLAG_MANDATORY_TLS); LOG_FLAG_IF_SET(XMPP_CONN_FLAG_TRUST_TLS); LOG_FLAG_IF_SET(XMPP_CONN_FLAG_DISABLE_TLS); LOG_FLAG_IF_SET(XMPP_CONN_FLAG_LEGACY_SSL); LOG_FLAG_IF_SET(XMPP_CONN_FLAG_LEGACY_AUTH); #undef LOG_FLAG_IF_SET } char* cert_path = prefs_get_tls_certpath(); if (cert_path) { xmpp_conn_set_capath(conn.xmpp_conn, cert_path); free(cert_path); } xmpp_conn_set_certfail_handler(conn.xmpp_conn, _connection_certfail_cb); int connect_status = xmpp_connect_client( conn.xmpp_conn, altdomain, port, _connection_handler, conn.xmpp_ctx); if (connect_status == 0) { conn.conn_status = JABBER_CONNECTING; } else { conn.conn_status = JABBER_DISCONNECTED; } return conn.conn_status; } static int iq_reg2_cb(xmpp_conn_t* xmpp_conn, xmpp_stanza_t* stanza, void* userdata) { const char* type; (void)userdata; type = xmpp_stanza_get_type(stanza); if (!type || strcmp(type, "error") == 0) { char* error_message = stanza_get_error_message(stanza); cons_show_error("Server error: %s", error_message); log_debug("Registration error: %s", error_message); goto quit; } if (strcmp(type, "result") != 0) { log_debug("Expected type 'result', but got %s.", type); goto quit; } cons_show("Registration successful."); log_info("Registration successful."); goto quit; quit: xmpp_disconnect(xmpp_conn); return 0; } static int iq_reg_cb(xmpp_conn_t* xmpp_conn, xmpp_stanza_t* stanza, void* userdata) { prof_reg_t* reg = (prof_reg_t*)userdata; xmpp_stanza_t* registered = NULL; xmpp_stanza_t* query; const char* type; type = xmpp_stanza_get_type(stanza); if (!type || strcmp(type, "error") == 0) { char* error_message = stanza_get_error_message(stanza); cons_show_error("Server error: %s", error_message); log_debug("Registration error: %s", error_message); xmpp_disconnect(xmpp_conn); goto quit; } if (strcmp(type, "result") != 0) { log_debug("Expected type 'result', but got %s.", type); xmpp_disconnect(xmpp_conn); goto quit; } query = xmpp_stanza_get_child_by_name(stanza, "query"); if (query) registered = xmpp_stanza_get_child_by_name(query, "registered"); if (registered != NULL) { cons_show_error("Already registered."); log_debug("Already registered."); xmpp_disconnect(xmpp_conn); goto quit; } xmpp_stanza_t* iq = stanza_register_new_account(conn.xmpp_ctx, reg->username, reg->password); xmpp_id_handler_add(xmpp_conn, iq_reg2_cb, xmpp_stanza_get_id(iq), reg); xmpp_send(xmpp_conn, iq); quit: return 0; } static int _register_handle_error(xmpp_conn_t* xmpp_conn, xmpp_stanza_t* stanza, void* userdata) { (void)stanza; (void)userdata; char* error_message = stanza_get_error_message(stanza); cons_show_error("Server error: %s", error_message); log_debug("Registration error: %s", error_message); xmpp_disconnect(xmpp_conn); return 0; } static int _register_handle_proceedtls_default(xmpp_conn_t* xmpp_conn, xmpp_stanza_t* stanza, void* userdata) { const char* name = xmpp_stanza_get_name(stanza); (void)userdata; if (strcmp(name, "proceed") == 0) { log_debug("Proceeding with TLS."); if (xmpp_conn_tls_start(xmpp_conn) == 0) { xmpp_handler_delete(xmpp_conn, _register_handle_error); xmpp_conn_open_stream_default(xmpp_conn); } else { log_debug("TLS failed."); /* failed tls spoils the connection, so disconnect */ xmpp_disconnect(xmpp_conn); } } return 0; } static int _register_handle_missing_features(xmpp_conn_t* xmpp_conn, void* userdata) { (void)userdata; log_debug("Timeout"); xmpp_disconnect(xmpp_conn); return 0; } static int _register_handle_features(xmpp_conn_t* xmpp_conn, xmpp_stanza_t* stanza, void* userdata) { prof_reg_t* reg = (prof_reg_t*)userdata; xmpp_ctx_t* ctx = conn.xmpp_ctx; xmpp_stanza_t* child; xmpp_stanza_t* iq; char* domain; xmpp_timed_handler_delete(xmpp_conn, _register_handle_missing_features); /* secure connection if possible */ child = xmpp_stanza_get_child_by_name(stanza, "starttls"); if (child && (strcmp(xmpp_stanza_get_ns(child), XMPP_NS_TLS) == 0)) { log_debug("Server supports TLS. Attempting to establish..."); child = xmpp_stanza_new(ctx); xmpp_stanza_set_name(child, "starttls"); xmpp_stanza_set_ns(child, XMPP_NS_TLS); xmpp_handler_add(xmpp_conn, _register_handle_proceedtls_default, XMPP_NS_TLS, NULL, NULL, NULL); xmpp_send(xmpp_conn, child); xmpp_stanza_release(child); return 0; } /* check whether server supports in-band registration */ child = xmpp_stanza_get_child_by_name(stanza, "register"); if (!child) { log_debug("Server does not support in-band registration."); cons_show_error("Server does not support in-band registration, aborting."); xmpp_disconnect(xmpp_conn); return 0; } log_debug("Server supports in-band registration. Attempting registration."); domain = strdup(conn.domain); iq = xmpp_iq_new(ctx, "get", "reg1"); xmpp_stanza_set_to(iq, domain); child = xmpp_stanza_new(ctx); xmpp_stanza_set_name(child, "query"); xmpp_stanza_set_ns(child, STANZA_NS_REGISTER); xmpp_stanza_add_child(iq, child); xmpp_handler_add(xmpp_conn, iq_reg_cb, STANZA_NS_REGISTER, "iq", NULL, reg); xmpp_send(xmpp_conn, iq); xmpp_free(ctx, domain); xmpp_stanza_release(child); xmpp_stanza_release(iq); return 0; } static void _register_handler(xmpp_conn_t* xmpp_conn, xmpp_conn_event_t status, int error, xmpp_stream_error_t* stream_error, void* userdata) { conn.conn_last_event = status; prof_reg_t* reg = (prof_reg_t*)userdata; int secured; (void)error; (void)stream_error; switch (status) { case XMPP_CONN_RAW_CONNECT: log_debug("Raw connection established."); xmpp_conn_open_stream_default(xmpp_conn); conn.conn_status = JABBER_RAW_CONNECTED; break; case XMPP_CONN_CONNECT: log_debug("Connected."); secured = xmpp_conn_is_secured(xmpp_conn); conn.conn_status = JABBER_CONNECTED; log_debug("Connection is %s.\n", secured ? "secured" : "NOT secured"); Jid* my_jid = jid_create(xmpp_conn_get_jid(xmpp_conn)); conn.domain = strdup(my_jid->domainpart); jid_destroy(my_jid); xmpp_handler_add(xmpp_conn, _register_handle_error, XMPP_NS_STREAMS, "error", NULL, NULL); xmpp_handler_add(xmpp_conn, _register_handle_features, XMPP_NS_STREAMS, "features", NULL, reg); xmpp_timed_handler_add(xmpp_conn, _register_handle_missing_features, 5000, NULL); break; case XMPP_CONN_DISCONNECT: log_debug("Disconnected"); conn.conn_status = JABBER_DISCONNECTED; break; default: break; } } jabber_conn_status_t connection_register(const char* const altdomain, int port, const char* const tls_policy, const char* const username, const char* const password) { long flags; Jid* jidp = jid_create(altdomain); if (jidp == NULL) { log_error("Malformed JID not able to connect: %s", altdomain); conn.conn_status = JABBER_DISCONNECTED; return conn.conn_status; } _compute_identifier(jidp->barejid); jid_destroy(jidp); if (conn.xmpp_log) { free(conn.xmpp_log); } conn.xmpp_log = _xmpp_get_file_logger(); if (conn.xmpp_conn) { xmpp_conn_release(conn.xmpp_conn); } if (conn.xmpp_ctx) { xmpp_ctx_free(conn.xmpp_ctx); } conn.xmpp_ctx = xmpp_ctx_new(NULL, conn.xmpp_log); if (conn.xmpp_ctx == NULL) { log_warning("Failed to get libstrophe ctx during connect"); return JABBER_DISCONNECTED; } conn.xmpp_conn = xmpp_conn_new(conn.xmpp_ctx); if (conn.xmpp_conn == NULL) { log_warning("Failed to get libstrophe conn during connect"); return JABBER_DISCONNECTED; } xmpp_conn_set_jid(conn.xmpp_conn, altdomain); flags = xmpp_conn_get_flags(conn.xmpp_conn); if (!tls_policy || (g_strcmp0(tls_policy, "force") == 0)) { flags |= XMPP_CONN_FLAG_MANDATORY_TLS; } else if (g_strcmp0(tls_policy, "trust") == 0) { flags |= XMPP_CONN_FLAG_MANDATORY_TLS; flags |= XMPP_CONN_FLAG_TRUST_TLS; } else if (g_strcmp0(tls_policy, "disable") == 0) { flags |= XMPP_CONN_FLAG_DISABLE_TLS; } else if (g_strcmp0(tls_policy, "legacy") == 0) { flags |= XMPP_CONN_FLAG_LEGACY_SSL; } xmpp_conn_set_flags(conn.xmpp_conn, flags); /* Print debug logs that can help when users share the logs */ if (flags != 0) { log_debug("Connecting with flags (0x%lx):", flags); #define LOG_FLAG_IF_SET(name) \ if (flags & name) { \ log_debug(" " #name); \ } LOG_FLAG_IF_SET(XMPP_CONN_FLAG_MANDATORY_TLS); LOG_FLAG_IF_SET(XMPP_CONN_FLAG_TRUST_TLS); LOG_FLAG_IF_SET(XMPP_CONN_FLAG_DISABLE_TLS); LOG_FLAG_IF_SET(XMPP_CONN_FLAG_LEGACY_SSL); #undef LOG_FLAG_IF_SET } prof_reg_t* reg; reg = calloc(1, sizeof(*reg)); if (reg == NULL) { log_warning("Failed to allocate registration data struct during connect"); return JABBER_DISCONNECTED; } reg->username = strdup(username); reg->password = strdup(password); char* cert_path = prefs_get_tls_certpath(); if (cert_path) { xmpp_conn_set_capath(conn.xmpp_conn, cert_path); free(cert_path); } xmpp_conn_set_certfail_handler(conn.xmpp_conn, _connection_certfail_cb); int connect_status = xmpp_connect_raw( conn.xmpp_conn, altdomain, port, _register_handler, reg); if (connect_status == 0) { conn.conn_status = JABBER_RAW_CONNECTING; } else { conn.conn_status = JABBER_DISCONNECTED; } return conn.conn_status; } void connection_disconnect(void) { // don't disconnect already disconnected connection, // or we get infinite loop otherwise if (conn.conn_last_event == XMPP_CONN_CONNECT) { conn.conn_status = JABBER_DISCONNECTING; xmpp_disconnect(conn.xmpp_conn); while (conn.conn_status == JABBER_DISCONNECTING) { session_process_events(); } } else { conn.conn_status = JABBER_DISCONNECTED; } // can't free libstrophe objects while we're in the event loop if (!conn.xmpp_in_event_loop) { if (conn.xmpp_conn) { xmpp_conn_release(conn.xmpp_conn); conn.xmpp_conn = NULL; } if (conn.xmpp_ctx) { xmpp_ctx_free(conn.xmpp_ctx); conn.xmpp_ctx = NULL; } } free(prof_identifier); prof_identifier = NULL; } void connection_set_disconnected(void) { FREE_SET_NULL(conn.presence_message); FREE_SET_NULL(conn.domain); conn.conn_status = JABBER_DISCONNECTED; } void connection_clear_data(void) { if (conn.features_by_jid) { g_hash_table_destroy(conn.features_by_jid); conn.features_by_jid = NULL; } if (conn.available_resources) { g_hash_table_remove_all(conn.available_resources); } if (conn.requested_features) { g_hash_table_remove_all(conn.requested_features); } } TLSCertificate* connection_get_tls_peer_cert(void) { xmpp_tlscert_t* xmpptlscert = xmpp_conn_get_peer_cert(conn.xmpp_conn); TLSCertificate* cert = _xmppcert_to_profcert(xmpptlscert); xmpp_tlscert_free(xmpptlscert); return cert; } gboolean connection_is_secured(void) { if (conn.conn_status == JABBER_CONNECTED) { return xmpp_conn_is_secured(conn.xmpp_conn) == 0 ? FALSE : TRUE; } else { return FALSE; } } gboolean connection_send_stanza(const char* const stanza) { if (conn.conn_status != JABBER_CONNECTED) { return FALSE; } else { xmpp_send_raw_string(conn.xmpp_conn, "%s", stanza); return TRUE; } } gboolean connection_supports(const char* const feature) { gboolean ret = FALSE; GList* jids = g_hash_table_get_keys(conn.features_by_jid); GList* curr = jids; while (curr) { char* jid = curr->data; GHashTable* features = g_hash_table_lookup(conn.features_by_jid, jid); if (features && g_hash_table_lookup(features, feature)) { ret = TRUE; break; } curr = g_list_next(curr); } g_list_free(jids); return ret; } char* connection_jid_for_feature(const char* const feature) { if (conn.features_by_jid == NULL) { return NULL; } GList* jids = g_hash_table_get_keys(conn.features_by_jid); GList* curr = jids; while (curr) { char* jid = curr->data; GHashTable* features = g_hash_table_lookup(conn.features_by_jid, jid); if (features && g_hash_table_lookup(features, feature)) { g_list_free(jids); return jid; } curr = g_list_next(curr); } g_list_free(jids); return NULL; } void connection_request_features(void) { /* We don't record it as a requested feature to avoid triggering th * sv_ev_connection_features_received too soon */ iq_disco_info_request_onconnect(conn.domain); } void connection_set_disco_items(GSList* items) { GSList* curr = items; while (curr) { DiscoItem* item = curr->data; g_hash_table_insert(conn.requested_features, strdup(item->jid), NULL); g_hash_table_insert(conn.features_by_jid, strdup(item->jid), g_hash_table_new_full(g_str_hash, g_str_equal, free, NULL)); iq_disco_info_request_onconnect(item->jid); curr = g_slist_next(curr); } } jabber_conn_status_t connection_get_status(void) { return conn.conn_status; } xmpp_conn_t* connection_get_conn(void) { return conn.xmpp_conn; } xmpp_ctx_t* connection_get_ctx(void) { return conn.xmpp_ctx; } const char* connection_get_fulljid(void) { if (!conn.xmpp_conn) return NULL; const char* jid = xmpp_conn_get_bound_jid(conn.xmpp_conn); if (jid) { return jid; } else { return xmpp_conn_get_jid(conn.xmpp_conn); } } char* connection_get_barejid(void) { const char* jid = connection_get_fulljid(); if (!jid) return NULL; Jid* jidp = jid_create(jid); char* result = strdup(jidp->barejid); jid_destroy(jidp); return result; } char* connection_get_user(void) { const char* jid = connection_get_fulljid(); if (!jid) return NULL; char* result = strdup(jid); char* split = strchr(result, '@'); *split = '\0'; return result; } void connection_features_received(const char* const jid) { log_info("[CONNECTION] connection_features_received %s", jid); if (g_hash_table_remove(conn.requested_features, jid) && g_hash_table_size(conn.requested_features) == 0) { sv_ev_connection_features_received(); } } GHashTable* connection_get_features(const char* const jid) { return g_hash_table_lookup(conn.features_by_jid, jid); } GList* connection_get_available_resources(void) { return g_hash_table_get_values(conn.available_resources); } void connection_add_available_resource(Resource* resource) { g_hash_table_replace(conn.available_resources, strdup(resource->name), resource); } void connection_remove_available_resource(const char* const resource) { g_hash_table_remove(conn.available_resources, resource); } char* connection_create_uuid(void) { return xmpp_uuid_gen(conn.xmpp_ctx); } void connection_free_uuid(char* uuid) { if (uuid) { xmpp_free(conn.xmpp_ctx, uuid); } } char* connection_create_stanza_id(void) { char* rndid = get_random_string(CON_RAND_ID_LEN); assert(rndid != NULL); gchar* hmac = g_compute_hmac_for_string(G_CHECKSUM_SHA1, (guchar*)prof_identifier, strlen(prof_identifier), rndid, strlen(rndid)); char* ret = g_strdup_printf("%s%s", rndid, hmac); free(rndid); g_free(hmac); return ret; } char* connection_get_domain(void) { return conn.domain; } char* connection_get_presence_msg(void) { return conn.presence_message; } void connection_set_presence_msg(const char* const message) { FREE_SET_NULL(conn.presence_message); if (message) { conn.presence_message = strdup(message); } } void connection_set_priority(const int priority) { conn.priority = priority; } #if defined(LIBXMPP_VERSION_MAJOR) && defined(LIBXMPP_VERSION_MINOR) \ && ((LIBXMPP_VERSION_MAJOR > 0) || (LIBXMPP_VERSION_MINOR >= 12)) static xmpp_stanza_t* _get_soh_error(xmpp_stanza_t* error_stanza) { return xmpp_stanza_get_child_by_path(error_stanza, XMPP_STANZA_NAME_IN_NS("error", STANZA_NS_STREAMS), XMPP_STANZA_NAME_IN_NS("see-other-host", STANZA_NS_XMPP_STREAMS), NULL); } #else static xmpp_stanza_t* _get_soh_error(xmpp_stanza_t* error_stanza) { const char* name = xmpp_stanza_get_name(error_stanza); const char* ns = xmpp_stanza_get_ns(error_stanza); if (!name || !ns || strcmp(name, "error") || strcmp(ns, STANZA_NS_STREAMS)) { log_debug("_get_soh_error: could not find error stanza"); return NULL; } return xmpp_stanza_get_child_by_name_and_ns(error_stanza, "see-other-host", STANZA_NS_XMPP_STREAMS); } #endif #if GLIB_CHECK_VERSION(2, 66, 0) static gboolean _split_url(const char* alturi, gchar** host, gint* port) { /* Construct a valid URI with `schema://` as `g_uri_split_network()` * requires this to be there. */ const char* xmpp = "xmpp://"; char* xmpp_uri = malloc(strlen(xmpp) + strlen(alturi) + 1); if (!xmpp_uri) { log_debug("_get_other_host: malloc failed \"%s\"", alturi); return false; } memcpy(xmpp_uri, xmpp, strlen(xmpp)); memcpy(xmpp_uri + strlen(xmpp), alturi, strlen(alturi) + 1); gboolean ret = g_uri_split_network(xmpp_uri, 0, NULL, host, port, NULL); free(xmpp_uri); /* fix-up `port` as g_uri_split_network() sets port to `-1` if it's missing * in the passed-in URI, but libstrophe expects a "missing port" * to be passed as `0` (which then results in connecting to the standard port). */ if (*port == -1) *port = 0; return ret; } #else /* poor-mans URL splitting */ static gboolean _split_url(const char* alturi, gchar** host, gint* port) { ptrdiff_t hostlen; /* search ':' from start and end * if `first` matches `last` it's a `hostname:port` combination * if `first` is different than `last` it's `[ip:v6]` or `[ip:v6]:port` */ char* first = strchr(alturi, ':'); char* last = strrchr(alturi, ':'); if (first) { if (first == last) { hostlen = last - alturi + 1; if (!strtoi_range(last + 1, port, 1, 65535, NULL)) return FALSE; } else { /* IPv6 handling */ char* bracket = strrchr(alturi, ']'); if (!bracket) return FALSE; if (bracket > last) { /* `[ip:v6]` */ hostlen = strlen(alturi) + 1; *port = 0; } else { /* `[ip:v6]:port` */ hostlen = last - alturi + 1; if (!strtoi_range(last + 1, port, 1, 65535, NULL)) return FALSE; } } } else { hostlen = strlen(alturi) + 1; *port = 0; } gchar* buf = g_malloc(hostlen); if (!buf) return FALSE; memcpy(buf, alturi, hostlen); buf[hostlen - 1] = '\0'; *host = buf; return TRUE; } #endif static bool _get_other_host(xmpp_stanza_t* error_stanza, gchar** host, int* port) { xmpp_stanza_t* soh_error = _get_soh_error(error_stanza); if (!soh_error || !xmpp_stanza_get_children(soh_error)) { log_debug("_get_other_host: stream-error contains no see-other-host"); return false; } const char* alturi = xmpp_stanza_get_text_ptr(xmpp_stanza_get_children(soh_error)); if (!alturi) { log_debug("_get_other_host: see-other-host contains no text"); return false; } if (!_split_url(alturi, host, port)) { log_debug("_get_other_host: Could not split \"%s\"", alturi); return false; } return true; } static void _connection_handler(xmpp_conn_t* const xmpp_conn, const xmpp_conn_event_t status, const int error, xmpp_stream_error_t* const stream_error, void* const userdata) { conn.conn_last_event = status; switch (status) { // login success case XMPP_CONN_CONNECT: log_debug("Connection handler: XMPP_CONN_CONNECT"); conn.conn_status = JABBER_CONNECTED; Jid* my_jid = jid_create(xmpp_conn_get_jid(conn.xmpp_conn)); conn.domain = strdup(my_jid->domainpart); jid_destroy(my_jid); conn.features_by_jid = g_hash_table_new_full(g_str_hash, g_str_equal, free, (GDestroyNotify)g_hash_table_destroy); g_hash_table_insert(conn.features_by_jid, strdup(conn.domain), g_hash_table_new_full(g_str_hash, g_str_equal, free, NULL)); session_login_success(connection_is_secured()); break; // raw connection success case XMPP_CONN_RAW_CONNECT: log_debug("Connection handler: XMPP_CONN_RAW_CONNECT"); conn.conn_status = JABBER_RAW_CONNECTED; Jid* my_raw_jid = jid_create(xmpp_conn_get_jid(conn.xmpp_conn)); log_debug("jid: %s", xmpp_conn_get_jid(conn.xmpp_conn)); conn.domain = strdup(my_raw_jid->domainpart); jid_destroy(my_raw_jid); conn.features_by_jid = g_hash_table_new_full(g_str_hash, g_str_equal, free, (GDestroyNotify)g_hash_table_destroy); g_hash_table_insert(conn.features_by_jid, strdup(conn.domain), g_hash_table_new_full(g_str_hash, g_str_equal, free, NULL)); xmpp_conn_open_stream_default(xmpp_conn); break; // disconnected case XMPP_CONN_DISCONNECT: log_debug("Connection handler: XMPP_CONN_DISCONNECT"); // lost connection for unknown reason if (conn.conn_status == JABBER_CONNECTED) { log_debug("Connection handler: Lost connection for unknown reason"); session_lost_connection(); // login attempt failed } else if (conn.conn_status != JABBER_DISCONNECTING) { gchar* host; int port; if (stream_error && stream_error->stanza && _get_other_host(stream_error->stanza, &host, &port)) { session_reconnect(host, port); log_debug("Connection handler: Forcing a re-connect to \"%s\"", host); conn.conn_status = JABBER_RECONNECT; return; } log_debug("Connection handler: Login failed"); session_login_failed(); } // close stream response from server after disconnect is handled conn.conn_status = JABBER_DISCONNECTED; break; // connection failed case XMPP_CONN_FAIL: log_debug("Connection handler: XMPP_CONN_FAIL"); break; // unknown state default: log_error("Connection handler: Unknown status"); break; } } static int _connection_certfail_cb(const xmpp_tlscert_t* xmpptlscert, const char* errormsg) { TLSCertificate* cert = _xmppcert_to_profcert(xmpptlscert); int res = sv_ev_certfail(errormsg, cert); tlscerts_free(cert); return res; } TLSCertificate* _xmppcert_to_profcert(const xmpp_tlscert_t* xmpptlscert) { int version = (int)strtol( xmpp_tlscert_get_string(xmpptlscert, XMPP_CERT_VERSION), NULL, 10); return tlscerts_new( xmpp_tlscert_get_string(xmpptlscert, XMPP_CERT_FINGERPRINT_SHA1), version, xmpp_tlscert_get_string(xmpptlscert, XMPP_CERT_SERIALNUMBER), xmpp_tlscert_get_string(xmpptlscert, XMPP_CERT_SUBJECT), xmpp_tlscert_get_string(xmpptlscert, XMPP_CERT_ISSUER), xmpp_tlscert_get_string(xmpptlscert, XMPP_CERT_NOTBEFORE), xmpp_tlscert_get_string(xmpptlscert, XMPP_CERT_NOTAFTER), xmpp_tlscert_get_string(xmpptlscert, XMPP_CERT_KEYALG), xmpp_tlscert_get_string(xmpptlscert, XMPP_CERT_SIGALG)); } static xmpp_log_t* _xmpp_get_file_logger(void) { log_level_t prof_level = log_get_filter(); xmpp_log_level_t xmpp_level = XMPP_LEVEL_ERROR; switch (prof_level) { case PROF_LEVEL_DEBUG: xmpp_level = XMPP_LEVEL_DEBUG; break; case PROF_LEVEL_INFO: xmpp_level = XMPP_LEVEL_INFO; break; case PROF_LEVEL_WARN: xmpp_level = XMPP_LEVEL_WARN; break; default: xmpp_level = XMPP_LEVEL_ERROR; break; } xmpp_log_t* file_log = malloc(sizeof(xmpp_log_t)); file_log->handler = _xmpp_file_logger; file_log->userdata = &xmpp_level; return file_log; } static void _xmpp_file_logger(void* const userdata, const xmpp_log_level_t xmpp_level, const char* const area, const char* const msg) { log_level_t prof_level = PROF_LEVEL_ERROR; switch (xmpp_level) { case XMPP_LEVEL_DEBUG: prof_level = PROF_LEVEL_DEBUG; break; case XMPP_LEVEL_INFO: prof_level = PROF_LEVEL_INFO; break; case XMPP_LEVEL_WARN: prof_level = PROF_LEVEL_WARN; break; default: prof_level = PROF_LEVEL_ERROR; break; } log_msg(prof_level, area, msg); if ((g_strcmp0(area, "xmpp") == 0) || (g_strcmp0(area, "conn")) == 0) { sv_ev_xmpp_stanza(msg); } } static void _random_bytes_init(void) { char* rndbytes_loc; GKeyFile* rndbytes; rndbytes_loc = files_get_data_path(FILE_PROFANITY_IDENTIFIER); if (g_file_test(rndbytes_loc, G_FILE_TEST_EXISTS)) { g_chmod(rndbytes_loc, S_IRUSR | S_IWUSR); } rndbytes = g_key_file_new(); g_key_file_load_from_file(rndbytes, rndbytes_loc, G_KEY_FILE_KEEP_COMMENTS, NULL); if (g_key_file_has_group(rndbytes, "identifier")) { profanity_instance_id = g_key_file_get_string(rndbytes, "identifier", "random_bytes", NULL); } else { profanity_instance_id = get_random_string(10); g_key_file_set_string(rndbytes, "identifier", "random_bytes", profanity_instance_id); gsize g_data_size; gchar* g_accounts_data = g_key_file_to_data(rndbytes, &g_data_size, NULL); gchar* base = g_path_get_dirname(rndbytes_loc); gchar* true_loc = get_file_or_linked(rndbytes_loc, base); g_file_set_contents(true_loc, g_accounts_data, g_data_size, NULL); g_free(base); free(true_loc); g_free(g_accounts_data); } free(rndbytes_loc); g_key_file_free(rndbytes); } static void _random_bytes_close(void) { g_free(profanity_instance_id); } static void _compute_identifier(const char* barejid) { // in case of reconnect (lost connection) free(prof_identifier); prof_identifier = g_compute_hmac_for_string(G_CHECKSUM_SHA256, (guchar*)profanity_instance_id, strlen(profanity_instance_id), barejid, strlen(barejid)); } const char* connection_get_profanity_identifier(void) { return prof_identifier; }