forked from PsychoticNinja/ailin-nemui-irssi
944 lines
24 KiB
C
944 lines
24 KiB
C
/*
|
|
* Off-the-Record Messaging (OTR) modules for IRC
|
|
*
|
|
* Copyright (C) 2008 - Uli Meis <a.sporto+bee@gmail.com>
|
|
* 2012 - David Goulet <dgoulet@ev0ke.net>
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify it
|
|
* under the terms of the GNU General Public License as published by the Free
|
|
* Software Foundation; either version 2 of the License, or (at your option)
|
|
* any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful, but WITHOUT
|
|
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
|
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
|
|
* more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License along with
|
|
* this program; if not, write to the Free Software Foundation, Inc., 51
|
|
* Franklin Street, Fifth Floor, Boston, MA 02110-1301,USA
|
|
*/
|
|
|
|
#define _GNU_SOURCE
|
|
#include <glib.h>
|
|
#include <gcrypt.h>
|
|
#include <unistd.h>
|
|
|
|
#include "common.h"
|
|
#include "levels.h"
|
|
#include "signals.h"
|
|
#include "printtext.h"
|
|
#include "statusbar-item.h"
|
|
|
|
#include "irssi-otr.h"
|
|
#include "otr-formats.h"
|
|
#include "key.h"
|
|
|
|
#include "signal-registry.h"
|
|
|
|
static int otr_debug = 0;
|
|
|
|
static const char *statusbar_txt[] = {
|
|
"FINISHED",
|
|
"TRUST_MANUAL",
|
|
"TRUST_SMP",
|
|
"SMP_ABORT",
|
|
"SMP_STARTED",
|
|
"SMP_RESPONDED",
|
|
"SMP_INCOMING",
|
|
"SMP_FINALIZE",
|
|
"SMP_ABORTED",
|
|
"PEER_FINISHED",
|
|
"SMP_FAILED",
|
|
"SMP_SUCCESS",
|
|
"GONE_SECURE",
|
|
"GONE_INSECURE",
|
|
"CTX_UPDATE"
|
|
};
|
|
|
|
/* Glib timer for otr. */
|
|
static guint otr_timerid;
|
|
|
|
/*
|
|
* Load instance tags.
|
|
*/
|
|
static void instag_load(struct otr_user_state *ustate)
|
|
{
|
|
int ret;
|
|
char *filename;
|
|
gcry_error_t err;
|
|
|
|
g_return_if_fail(ustate != NULL);
|
|
|
|
/* Getting the otr instance filename path */
|
|
filename = g_strdup_printf("%s%s", get_irssi_dir(), OTR_INSTAG_FILE);
|
|
g_return_if_fail(filename != NULL);
|
|
|
|
ret = access(filename, F_OK);
|
|
if (ret < 0) {
|
|
IRSSI_OTR_DEBUG("no instance tags found at %9%s%9", filename);
|
|
g_free(filename);
|
|
return;
|
|
}
|
|
|
|
err = otrl_instag_read(ustate->otr_state, filename);
|
|
if (err == GPG_ERR_NO_ERROR)
|
|
IRSSI_OTR_DEBUG("Instance tags loaded from %9%s%9", filename);
|
|
else
|
|
IRSSI_OTR_DEBUG("Error loading instance tags: %d (%d)", gcry_strerror(err), gcry_strsource(err));
|
|
|
|
g_free(filename);
|
|
}
|
|
|
|
/*
|
|
* Free otr peer context. Callback passed to libotr.
|
|
*/
|
|
static void free_peer_context_cb(void *data)
|
|
{
|
|
g_free_not_null(data);
|
|
}
|
|
|
|
/*
|
|
* Allocate otr peer context. Callback passed to libotr.
|
|
*/
|
|
static void add_peer_context_cb(void *data, ConnContext *context)
|
|
{
|
|
struct otr_peer_context *opc;
|
|
|
|
opc = otr_create_peer_context();
|
|
if (opc == NULL) {
|
|
return;
|
|
}
|
|
|
|
opc->active_fingerprint = context->active_fingerprint;
|
|
|
|
context->app_data = opc;
|
|
context->app_data_free = free_peer_context_cb;
|
|
|
|
IRSSI_OTR_DEBUG("Peer context created for %s", context->username);
|
|
}
|
|
|
|
/*
|
|
* Find Irssi server record by network name.
|
|
*/
|
|
static SERVER_REC *find_server_by_network(const char *network)
|
|
{
|
|
GSList *tmp;
|
|
SERVER_REC *server;
|
|
|
|
g_return_val_if_fail(network != NULL, NULL);
|
|
|
|
for (tmp = servers; tmp; tmp = tmp->next) {
|
|
server = tmp->data;
|
|
|
|
if (g_ascii_strncasecmp(server->tag, network, strlen(server->tag)))
|
|
return server;
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
|
|
/*
|
|
* Check if fingerprint is in an encrypted context.
|
|
*
|
|
* Return 1 if it does, else 0.
|
|
*/
|
|
static int check_fp_encrypted_msgstate(Fingerprint *fp)
|
|
{
|
|
ConnContext *context;
|
|
|
|
g_return_val_if_fail(fp != NULL, 0);
|
|
|
|
/* Loop on all fingerprint's context(es). */
|
|
for (context = fp->context;
|
|
context != NULL && context->m_context == fp->context;
|
|
context = context->next) {
|
|
if (context->msgstate == OTRL_MSGSTATE_ENCRYPTED &&
|
|
context->active_fingerprint == fp) {
|
|
return 1;
|
|
}
|
|
}
|
|
|
|
/* No state is encrypted. */
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* Timer called from the glib main loop and set up by the timer_control
|
|
* callback of libotr.
|
|
*/
|
|
static gboolean timer_fired_cb(gpointer data)
|
|
{
|
|
otrl_message_poll(user_state_global->otr_state, &otr_ops, NULL);
|
|
return TRUE;
|
|
}
|
|
|
|
void otr_control_timer(unsigned int interval, void *opdata)
|
|
{
|
|
if (otr_timerid) {
|
|
g_source_remove(otr_timerid);
|
|
otr_timerid = 0;
|
|
}
|
|
|
|
if (interval > 0) {
|
|
otr_timerid = g_timeout_add_seconds(interval, timer_fired_cb, opdata);
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Is OTR debugging enabled or disabled?
|
|
*/
|
|
int otr_debug_get(void)
|
|
{
|
|
return otr_debug;
|
|
}
|
|
|
|
/*
|
|
* Toggle OTR debugging.
|
|
*/
|
|
void otr_debug_toggle(void)
|
|
{
|
|
otr_debug = !otr_debug;
|
|
}
|
|
|
|
/*
|
|
* Find context from nickname and irssi server record.
|
|
*/
|
|
ConnContext *otr_find_context(SERVER_REC *server, const char *nick, int create)
|
|
{
|
|
ConnContext *ctx = NULL;
|
|
|
|
g_return_val_if_fail(server != NULL, NULL);
|
|
g_return_val_if_fail(server->tag != NULL, NULL);
|
|
g_return_val_if_fail(nick != NULL, NULL);
|
|
|
|
ctx = otrl_context_find(user_state_global->otr_state, nick, server->tag,
|
|
OTR_PROTOCOL_ID, OTRL_INSTAG_BEST, create, NULL,
|
|
add_peer_context_cb, server);
|
|
|
|
return ctx;
|
|
}
|
|
|
|
/*
|
|
* Create otr peer context.
|
|
*/
|
|
struct otr_peer_context *otr_create_peer_context(void)
|
|
{
|
|
return g_new0(struct otr_peer_context, 1);
|
|
}
|
|
|
|
/*
|
|
* Return a newly allocated OTR user state.
|
|
*/
|
|
struct otr_user_state *otr_init_user_state(void)
|
|
{
|
|
struct otr_user_state *ous = NULL;
|
|
|
|
ous = g_new0(struct otr_user_state, 1);
|
|
if (ous == NULL) {
|
|
return ous;
|
|
}
|
|
|
|
ous->otr_state = otrl_userstate_create();
|
|
|
|
instag_load(ous);
|
|
|
|
/* Load keys and fingerprints. */
|
|
key_load(ous);
|
|
key_load_fingerprints(ous);
|
|
|
|
return ous;
|
|
}
|
|
|
|
/*
|
|
* Destroy otr user state.
|
|
*/
|
|
void otr_free_user_state(struct otr_user_state *ustate)
|
|
{
|
|
if (ustate->otr_state) {
|
|
otrl_userstate_free(ustate->otr_state);
|
|
ustate->otr_state = NULL;
|
|
}
|
|
|
|
g_free(ustate);
|
|
}
|
|
|
|
/*
|
|
* init otr lib.
|
|
*/
|
|
void otr_lib_init()
|
|
{
|
|
OTRL_INIT;
|
|
}
|
|
|
|
/*
|
|
* deinit otr lib.
|
|
*/
|
|
void otr_lib_uninit()
|
|
{
|
|
}
|
|
|
|
/*
|
|
* Hand the given message to OTR.
|
|
*
|
|
* Return 0 if the message was successfully handled or else a negative value.
|
|
*/
|
|
int otr_send(SERVER_REC *server, const char *msg, const char *to, char **otr_msg)
|
|
{
|
|
gcry_error_t err;
|
|
ConnContext *ctx = NULL;
|
|
|
|
g_return_val_if_fail(server != NULL, -1);
|
|
g_return_val_if_fail(server->tag != NULL, -1);
|
|
|
|
IRSSI_OTR_DEBUG("OTR: Sending message: %s", msg);
|
|
|
|
err = otrl_message_sending(user_state_global->otr_state, &otr_ops,
|
|
server, server->tag, OTR_PROTOCOL_ID, to, OTRL_INSTAG_BEST, msg, NULL, otr_msg,
|
|
OTRL_FRAGMENT_SEND_ALL_BUT_LAST, &ctx, add_peer_context_cb, server);
|
|
if (err) {
|
|
g_warning("OTR: Send failed: %s", gcry_strerror(err));
|
|
return -1;
|
|
}
|
|
|
|
/* Add peer context to OTR context if none exists. */
|
|
if (ctx && !ctx->app_data) {
|
|
add_peer_context_cb(server, ctx);
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* List otr contexts to the main Irssi windows.
|
|
*/
|
|
void otr_contexts(struct otr_user_state *ustate)
|
|
{
|
|
char human_fp[OTRL_PRIVKEY_FPRINT_HUMAN_LEN], *trust;
|
|
ConnContext *ctx, *c_iter;
|
|
Fingerprint *fp;
|
|
|
|
g_return_if_fail(ustate != NULL);
|
|
|
|
if (ustate->otr_state->context_root == NULL) {
|
|
printformat(NULL, NULL, MSGLEVEL_CLIENTERROR, TXT_OTR_CTX_MISSING);
|
|
return;
|
|
}
|
|
|
|
printformat(NULL, NULL, MSGLEVEL_CLIENTCRAP, TXT_OTR_CTX_LIST_HEADER);
|
|
|
|
/* Iterate over all contextes of the user state. */
|
|
for (ctx = ustate->otr_state->context_root; ctx != NULL; ctx = ctx->next) {
|
|
OtrlMessageState best_mstate = OTRL_MSGSTATE_PLAINTEXT;
|
|
|
|
/* Skip master context. */
|
|
if (ctx != ctx->m_context)
|
|
continue;
|
|
|
|
for (fp = ctx->fingerprint_root.next; fp != NULL; fp = fp->next) {
|
|
int used = 0;
|
|
char *username, *accountname;
|
|
|
|
username = ctx->username;
|
|
accountname = ctx->accountname;
|
|
|
|
for (c_iter = ctx->m_context; c_iter && c_iter->m_context == ctx->m_context; c_iter = c_iter->next) {
|
|
/* Print account name, username and msgstate. */
|
|
if (c_iter->active_fingerprint == fp) {
|
|
used = 1;
|
|
|
|
if (c_iter->msgstate == OTRL_MSGSTATE_ENCRYPTED)
|
|
best_mstate = OTRL_MSGSTATE_ENCRYPTED;
|
|
else if (c_iter->msgstate == OTRL_MSGSTATE_FINISHED && best_mstate == OTRL_MSGSTATE_PLAINTEXT)
|
|
best_mstate = OTRL_MSGSTATE_FINISHED;
|
|
}
|
|
}
|
|
|
|
if (used) {
|
|
switch (best_mstate) {
|
|
case OTRL_MSGSTATE_ENCRYPTED:
|
|
printformat(NULL, NULL, MSGLEVEL_CLIENTCRAP, TXT_OTR_CTX_LIST_ENCRYPTED_LINE, accountname, username);
|
|
break;
|
|
case OTRL_MSGSTATE_PLAINTEXT:
|
|
printformat(NULL, NULL, MSGLEVEL_CLIENTCRAP, TXT_OTR_CTX_LIST_PLAINTEXT_LINE, accountname, username);
|
|
break;
|
|
case OTRL_MSGSTATE_FINISHED:
|
|
printformat(NULL, NULL, MSGLEVEL_CLIENTCRAP, TXT_OTR_CTX_LIST_FINISHED_LINE, accountname, username);
|
|
break;
|
|
default:
|
|
printformat(NULL, NULL, MSGLEVEL_CLIENTCRAP, TXT_OTR_CTX_LIST_UNKNOWN_LINE, accountname, username);
|
|
break;
|
|
};
|
|
} else
|
|
printformat(NULL, NULL, MSGLEVEL_CLIENTCRAP, TXT_OTR_CTX_LIST_UNUSED_LINE, accountname, username);
|
|
|
|
/* Hash fingerprint to human. */
|
|
otrl_privkey_hash_to_human(human_fp, fp->fingerprint);
|
|
|
|
trust = fp->trust;
|
|
if (trust && trust[0] != '\0') {
|
|
if (strncmp(trust, "smp", 3) == 0)
|
|
printformat(NULL, NULL, MSGLEVEL_CLIENTCRAP, TXT_OTR_CTX_LIST_SMP_LINE, human_fp);
|
|
else
|
|
printformat(NULL, NULL, MSGLEVEL_CLIENTCRAP, TXT_OTR_CTX_LIST_MANUAL_LINE, human_fp);
|
|
} else
|
|
printformat(NULL, NULL, MSGLEVEL_CLIENTCRAP, TXT_OTR_CTX_LIST_UNVERIFIED_LINE, human_fp);
|
|
}
|
|
}
|
|
|
|
printformat(NULL, NULL, MSGLEVEL_CLIENTCRAP, TXT_OTR_CTX_LIST_FOOTER);
|
|
}
|
|
|
|
/*
|
|
* Finish the conversation.
|
|
*/
|
|
void otr_finish(SERVER_REC *server, const char *nick)
|
|
{
|
|
ConnContext *ctx;
|
|
|
|
g_return_if_fail(server != NULL);
|
|
g_return_if_fail(nick != NULL);
|
|
|
|
ctx = otr_find_context(server, nick, FALSE);
|
|
if (ctx == NULL) {
|
|
printformat(server, nick, MSGLEVEL_CRAP, TXT_OTR_SESSION_ALREADY_FINISHED);
|
|
return;
|
|
}
|
|
|
|
otrl_message_disconnect(user_state_global->otr_state, &otr_ops, server,
|
|
ctx->accountname, OTR_PROTOCOL_ID, nick, ctx->their_instance);
|
|
|
|
otr_status_change(server, nick, OTR_STATUS_FINISHED);
|
|
|
|
printformat(server, nick, MSGLEVEL_CRAP, TXT_OTR_SESSION_FINISHING, nick);
|
|
}
|
|
|
|
/*
|
|
* Finish all otr contexts.
|
|
*/
|
|
void otr_finishall(struct otr_user_state *ustate)
|
|
{
|
|
ConnContext *context;
|
|
SERVER_REC *server;
|
|
|
|
g_return_if_fail(ustate != NULL);
|
|
|
|
for (context = ustate->otr_state->context_root; context;
|
|
context = context->next) {
|
|
/* Only finish encrypted session. */
|
|
if (context->msgstate != OTRL_MSGSTATE_ENCRYPTED) {
|
|
continue;
|
|
}
|
|
|
|
server = find_server_by_network(context->accountname);
|
|
if (server == NULL) {
|
|
IRSSI_OTR_DEBUG("Unable to find server window for account %s", context->accountname);
|
|
continue;
|
|
}
|
|
|
|
otr_finish(server, context->username);
|
|
}
|
|
}
|
|
|
|
/*
|
|
* Trust our peer.
|
|
*/
|
|
void otr_trust(SERVER_REC *server, const char *nick, char *str_fp,
|
|
struct otr_user_state *ustate)
|
|
{
|
|
char peerfp[OTRL_PRIVKEY_FPRINT_HUMAN_LEN];
|
|
struct otr_peer_context *opc;
|
|
ConnContext *ctx;
|
|
Fingerprint *fp_trust;
|
|
|
|
g_return_if_fail(ustate != NULL);
|
|
|
|
/* No human string fingerprint given. */
|
|
if (*str_fp == '\0') {
|
|
ctx = otr_find_context(server, nick, FALSE);
|
|
if (ctx == NULL) {
|
|
return;
|
|
}
|
|
|
|
opc = ctx->app_data;
|
|
/* Always NEED a peer context or else code error. */
|
|
g_return_if_fail(opc != NULL);
|
|
|
|
fp_trust = ctx->active_fingerprint;
|
|
} else {
|
|
fp_trust = otr_find_hash_fingerprint_from_human(str_fp, ustate);
|
|
}
|
|
|
|
if (fp_trust != NULL) {
|
|
otrl_privkey_hash_to_human(peerfp, fp_trust->fingerprint);
|
|
|
|
if (otrl_context_is_fingerprint_trusted(fp_trust)) {
|
|
printformat(server, nick, MSGLEVEL_CLIENTERROR, TXT_OTR_FP_ALREADY_TRUSTED, peerfp);
|
|
return;
|
|
}
|
|
|
|
/* Trust level is manual at this point. */
|
|
otrl_context_set_trust(fp_trust, "manual");
|
|
key_write_fingerprints(ustate);
|
|
|
|
otr_status_change(server, nick, OTR_STATUS_TRUST_MANUAL);
|
|
|
|
printformat(server, nick, MSGLEVEL_CLIENTCRAP, TXT_OTR_FP_TRUSTED, peerfp);
|
|
} else
|
|
printformat(server, nick, MSGLEVEL_CLIENTERROR, TXT_OTR_FP_MISSING, str_fp);
|
|
}
|
|
|
|
/*
|
|
* implements /otr authabort
|
|
*/
|
|
void otr_auth_abort(SERVER_REC *server, const char *nick)
|
|
{
|
|
ConnContext *ctx;
|
|
|
|
g_return_if_fail(server != NULL);
|
|
g_return_if_fail(nick != NULL);
|
|
|
|
ctx = otr_find_context(server, nick, FALSE);
|
|
if (ctx == NULL) {
|
|
printformat(server, nick, MSGLEVEL_CLIENTERROR, TXT_OTR_CTX_NICK_MISSING, nick);
|
|
return;
|
|
}
|
|
|
|
otrl_message_abort_smp(user_state_global->otr_state, &otr_ops, server, ctx);
|
|
otr_status_change(server, nick, OTR_STATUS_SMP_ABORT);
|
|
|
|
if (ctx->smstate->nextExpected != OTRL_SMP_EXPECT1)
|
|
printformat(server, nick, MSGLEVEL_CLIENTCRAP, TXT_OTR_AUTH_ONGOING_ABORTED);
|
|
else
|
|
printformat(server, nick, MSGLEVEL_CLIENTCRAP, TXT_OTR_AUTH_ABORTED);
|
|
}
|
|
|
|
/*
|
|
* Initiate or respond to SMP authentication.
|
|
*/
|
|
void otr_auth(SERVER_REC *server, const char *nick, const char *question,
|
|
const char *secret)
|
|
{
|
|
int ret;
|
|
size_t secret_len = 0;
|
|
ConnContext *ctx;
|
|
struct otr_peer_context *opc;
|
|
|
|
g_return_if_fail(server != NULL);
|
|
g_return_if_fail(nick != NULL);
|
|
|
|
ctx = otr_find_context(server, nick, 0);
|
|
if (ctx == NULL) {
|
|
printformat(server, nick, MSGLEVEL_CLIENTERROR, TXT_OTR_CTX_NICK_MISSING, nick);
|
|
return;
|
|
}
|
|
|
|
opc = ctx->app_data;
|
|
/* Again, code flow error. */
|
|
g_return_if_fail(opc != NULL);
|
|
|
|
if (ctx->msgstate != OTRL_MSGSTATE_ENCRYPTED) {
|
|
printformat(server, nick, MSGLEVEL_CLIENTERROR, TXT_OTR_SESSION_MISSING);
|
|
return;
|
|
}
|
|
|
|
/* Aborting an ongoing auth */
|
|
if (ctx->smstate->nextExpected != OTRL_SMP_EXPECT1) {
|
|
otr_auth_abort(server, nick);
|
|
}
|
|
|
|
/* reset trust level */
|
|
if (ctx->active_fingerprint) {
|
|
ret = otrl_context_is_fingerprint_trusted(ctx->active_fingerprint);
|
|
if (!ret) {
|
|
otrl_context_set_trust(ctx->active_fingerprint, "");
|
|
key_write_fingerprints(user_state_global);
|
|
}
|
|
}
|
|
|
|
/* Libotr allows empty secret. */
|
|
if (secret) {
|
|
secret_len = strlen(secret);
|
|
}
|
|
|
|
if (opc->ask_secret) {
|
|
otrl_message_respond_smp(user_state_global->otr_state, &otr_ops,
|
|
server, ctx, (unsigned char *) secret, secret_len);
|
|
otr_status_change(server, nick, OTR_STATUS_SMP_RESPONDED);
|
|
printformat(server, nick, MSGLEVEL_CLIENTCRAP, TXT_OTR_AUTH_RESPONSE);
|
|
} else {
|
|
if (question != NULL)
|
|
otrl_message_initiate_smp_q(user_state_global->otr_state, &otr_ops, server, ctx, question, (unsigned char *) secret, secret_len);
|
|
else
|
|
otrl_message_initiate_smp(user_state_global->otr_state, &otr_ops, server, ctx, (unsigned char *) secret, secret_len);
|
|
|
|
otr_status_change(server, nick, OTR_STATUS_SMP_STARTED);
|
|
printformat(server, nick, MSGLEVEL_CLIENTCRAP, TXT_OTR_AUTH_INITIATED);
|
|
}
|
|
|
|
opc->ask_secret = 0;
|
|
}
|
|
|
|
/*
|
|
* For the given message we received through irssi, check if we need to queue
|
|
* it for the case where that message is part of a bigger OTR full message.
|
|
* This can happen with bitlbee for instance where OTR message are split in
|
|
* different PRIVMSG.
|
|
*
|
|
* This uses a "queue" in the peer context so it's it very important to have
|
|
* the peer context associated with the message (nickname + irssi object).
|
|
*
|
|
* Return an otr_msg_status code indicating the caller what to do with the msg.
|
|
* OTR_MSG_ERROR indicates an error probably memory related. OTR_MSG_WAIT_MORE
|
|
* tells the caller to NOT send out the message since we are waiting for more
|
|
* to complete the OTR original message. OTR_MSG_ORIGINAL tell the caller to
|
|
* simply use the original message. OTR_MSG_USE_QUEUE indicates that full_msg
|
|
* can be used containing the reconstructed message. The caller SHOULD free(3)
|
|
* this pointer after use.
|
|
*/
|
|
static enum otr_msg_status enqueue_otr_fragment(const char *msg, struct otr_peer_context *opc, char **full_msg)
|
|
{
|
|
enum otr_msg_status ret;
|
|
size_t msg_len;
|
|
|
|
g_return_val_if_fail(msg != NULL, OTR_MSG_ERROR);
|
|
g_return_val_if_fail(opc != NULL, OTR_MSG_ERROR);
|
|
|
|
/* We are going to use it quite a bit so ease our life a bit. */
|
|
msg_len = strlen(msg);
|
|
|
|
if (opc->full_msg) {
|
|
if (msg_len > (opc->msg_size - opc->msg_len)) {
|
|
char *tmp_ptr;
|
|
|
|
/* Realloc memory if there is not enough space. */
|
|
tmp_ptr = realloc(opc->full_msg, opc->msg_size + msg_len + 1);
|
|
if (tmp_ptr == NULL) {
|
|
free(opc->full_msg);
|
|
opc->full_msg = NULL;
|
|
ret = OTR_MSG_ERROR;
|
|
return ret;
|
|
}
|
|
opc->full_msg = tmp_ptr;
|
|
opc->msg_size += msg_len + 1;
|
|
}
|
|
|
|
/* Copy msg to full message since we already have a part pending. */
|
|
strncpy(opc->full_msg + opc->msg_len, msg, msg_len);
|
|
opc->msg_len += msg_len;
|
|
opc->full_msg[opc->msg_len] = '\0';
|
|
|
|
IRSSI_OTR_DEBUG("Partial OTR message added to queue: %s", msg);
|
|
|
|
/*
|
|
* Are we waiting for more? If the message ends with a ".", the
|
|
* transmission has ended else we have to wait for more.
|
|
*/
|
|
if (msg[msg_len - 1] != OTR_MSG_END_TAG) {
|
|
ret = OTR_MSG_WAIT_MORE;
|
|
return ret;
|
|
}
|
|
|
|
/*
|
|
* Dup the string with enough space for the NULL byte since we are
|
|
* about to free it before passing it to the caller.
|
|
*/
|
|
*full_msg = strndup(opc->full_msg, opc->msg_len + 1);
|
|
/* Reset everything. */
|
|
free(opc->full_msg);
|
|
opc->full_msg = NULL;
|
|
opc->msg_size = opc->msg_len = 0;
|
|
ret = OTR_MSG_USE_QUEUE;
|
|
return ret;
|
|
} else {
|
|
char *pos;
|
|
|
|
/*
|
|
* Try to find the OTR message tag at the _beginning_of the packet and
|
|
* check if this packet is not the end with the end tag of OTR "."
|
|
*/
|
|
pos = strstr(msg, OTR_MSG_BEGIN_TAG);
|
|
if (pos && (pos == msg) && msg[msg_len - 1] != OTR_MSG_END_TAG) {
|
|
/* Allocate full message buffer with an extra for NULL byte. */
|
|
opc->full_msg = g_new0(char, (msg_len * 2) + 1);
|
|
if (!opc->full_msg) {
|
|
ret = OTR_MSG_ERROR;
|
|
return ret;
|
|
}
|
|
/* Copy full message with NULL terminated byte. */
|
|
strncpy(opc->full_msg, msg, msg_len);
|
|
opc->msg_len += msg_len;
|
|
opc->msg_size += ((msg_len * 2) + 1);
|
|
opc->full_msg[opc->msg_len] = '\0';
|
|
ret = OTR_MSG_WAIT_MORE;
|
|
IRSSI_OTR_DEBUG("Partial OTR message begins the queue: %s", msg);
|
|
return ret;
|
|
}
|
|
|
|
/* Use original message. */
|
|
ret = OTR_MSG_ORIGINAL;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
/*
|
|
* Hand the given message to OTR.
|
|
*
|
|
* Returns 0 if its an OTR protocol message or else negative value.
|
|
*/
|
|
int otr_receive(SERVER_REC *server, const char *msg, const char *from, char **new_msg)
|
|
{
|
|
int ret = -1;
|
|
char *full_msg = NULL;
|
|
const char *recv_msg = NULL;
|
|
OtrlTLV *tlvs;
|
|
ConnContext *ctx;
|
|
struct otr_peer_context *opc;
|
|
OtrlTLV *tlv = NULL;
|
|
|
|
g_return_val_if_fail(server != NULL, -1);
|
|
g_return_val_if_fail(server->tag != NULL, -1);
|
|
|
|
IRSSI_OTR_DEBUG("Receiving message: %s", msg);
|
|
|
|
ctx = otr_find_context(server, from, 1);
|
|
if (ctx == NULL) {
|
|
return ret;
|
|
}
|
|
|
|
/* Add peer context to OTR context if none exists */
|
|
if (ctx->app_data == NULL)
|
|
add_peer_context_cb(server, ctx);
|
|
|
|
opc = ctx->app_data;
|
|
g_return_val_if_fail(opc != NULL, -1);
|
|
|
|
ret = enqueue_otr_fragment(msg, opc, &full_msg);
|
|
switch (ret) {
|
|
case OTR_MSG_ORIGINAL:
|
|
recv_msg = msg;
|
|
break;
|
|
case OTR_MSG_USE_QUEUE:
|
|
recv_msg = full_msg;
|
|
break;
|
|
case OTR_MSG_WAIT_MORE:
|
|
ret = 1;
|
|
g_free_not_null(full_msg);
|
|
return ret;
|
|
case OTR_MSG_ERROR:
|
|
ret = -1;
|
|
g_free_not_null(full_msg);
|
|
return ret;
|
|
}
|
|
|
|
ret = otrl_message_receiving(user_state_global->otr_state,
|
|
&otr_ops, server, server->tag, OTR_PROTOCOL_ID, from, recv_msg, new_msg,
|
|
&tlvs, &ctx, add_peer_context_cb, server);
|
|
if (ret) {
|
|
IRSSI_OTR_DEBUG("Ignoring message of length %d from %s to %s.\n%s", strlen(msg), from, server->tag, msg);
|
|
} else {
|
|
if (*new_msg) {
|
|
IRSSI_OTR_DEBUG("Converted received message.");
|
|
}
|
|
}
|
|
|
|
/* Check for disconnected message */
|
|
tlv = otrl_tlv_find(tlvs, OTRL_TLV_DISCONNECTED);
|
|
if (tlv != NULL) {
|
|
otr_status_change(server, from, OTR_STATUS_PEER_FINISHED);
|
|
printformat(server, from, MSGLEVEL_CLIENTCRAP, TXT_OTR_SESSION_FINISHED, from);
|
|
}
|
|
|
|
otrl_tlv_free(tlvs);
|
|
|
|
IRSSI_OTR_DEBUG("Message received.");
|
|
|
|
g_free_not_null(full_msg);
|
|
|
|
return ret;
|
|
}
|
|
|
|
/*
|
|
* Get the OTR status of this conversation.
|
|
*/
|
|
enum otr_status_format otr_get_status_format(SERVER_REC *server, const char *nick)
|
|
{
|
|
int ret;
|
|
enum otr_status_format code;
|
|
ConnContext *ctx = NULL;
|
|
|
|
g_return_val_if_fail(server != NULL, TXT_OTR_STB_UNKNOWN);
|
|
|
|
ctx = otr_find_context(server, nick, FALSE);
|
|
if (ctx == NULL) {
|
|
code = TXT_OTR_STB_PLAINTEXT;
|
|
return code;
|
|
}
|
|
|
|
switch (ctx->msgstate) {
|
|
case OTRL_MSGSTATE_PLAINTEXT:
|
|
code = TXT_OTR_STB_PLAINTEXT;
|
|
break;
|
|
case OTRL_MSGSTATE_ENCRYPTED:
|
|
/* Begin by checking trust. */
|
|
ret = otrl_context_is_fingerprint_trusted(ctx->active_fingerprint);
|
|
if (ret) {
|
|
code = TXT_OTR_STB_TRUST;
|
|
} else {
|
|
code = TXT_OTR_STB_UNTRUSTED;
|
|
}
|
|
break;
|
|
case OTRL_MSGSTATE_FINISHED:
|
|
code = TXT_OTR_STB_FINISHED;
|
|
break;
|
|
default:
|
|
g_warning("BUG! Invalid msgstate: %d", ctx->msgstate);
|
|
code = TXT_OTR_STB_UNKNOWN;
|
|
break;
|
|
}
|
|
|
|
if (ctx) {
|
|
IRSSI_OTR_DEBUG("Code: %d, state: %d, sm_prog_state: %d, auth state: %d",
|
|
code, ctx->msgstate, ctx->smstate->sm_prog_state,
|
|
ctx->auth.authstate);
|
|
}
|
|
return code;
|
|
}
|
|
|
|
/*
|
|
* Change status bar text for a given nickname.
|
|
*/
|
|
void otr_status_change(SERVER_REC *server, const char *nick,
|
|
enum otr_status_event event)
|
|
{
|
|
statusbar_items_redraw("otr");
|
|
SIGNAL_EMIT(otr_event, server, nick, statusbar_txt[event]);
|
|
}
|
|
|
|
/*
|
|
* Search for a OTR Fingerprint object from the given human readable string and
|
|
* return a pointer to the object if found else NULL.
|
|
*/
|
|
Fingerprint *otr_find_hash_fingerprint_from_human(const char *human_fp, struct otr_user_state *ustate)
|
|
{
|
|
char str_fp[OTRL_PRIVKEY_FPRINT_HUMAN_LEN];
|
|
Fingerprint *fp = NULL, *fp_iter = NULL;
|
|
ConnContext *context;
|
|
|
|
/* Loop on all context of the user state */
|
|
for (context = ustate->otr_state->context_root; context != NULL;
|
|
context = context->next) {
|
|
/* Loop on all fingerprint of the context */
|
|
for (fp_iter = context->fingerprint_root.next; fp_iter;
|
|
fp_iter = fp_iter->next) {
|
|
otrl_privkey_hash_to_human(str_fp, fp_iter->fingerprint);
|
|
/* Compare human fingerprint given in argument to the current. */
|
|
if (strncmp(str_fp, human_fp, sizeof(str_fp)) == 0) {
|
|
fp = otrl_context_find_fingerprint(context,
|
|
fp_iter->fingerprint, 0, NULL);
|
|
return fp;
|
|
}
|
|
}
|
|
}
|
|
|
|
return fp;
|
|
}
|
|
|
|
/*
|
|
* Forget a fingerprint.
|
|
*
|
|
* If str_fp is not NULL, it must be on the OTR human format like this:
|
|
* "487FFADA 5073FEDD C5AB5C14 5BB6C1FF 6D40D48A". If str_fp is NULL, get the
|
|
* context of the target nickname, check for the OTR peer context active
|
|
* fingerprint and forget this one if possible.
|
|
*/
|
|
void otr_forget(SERVER_REC *server, const char *nick, char *str_fp, struct otr_user_state *ustate)
|
|
{
|
|
char fp[OTRL_PRIVKEY_FPRINT_HUMAN_LEN];
|
|
Fingerprint *fp_forget;
|
|
ConnContext *ctx = NULL;
|
|
struct otr_peer_context *opc;
|
|
|
|
/* No human string fingerprint given. */
|
|
if (*str_fp == '\0') {
|
|
ctx = otr_find_context(server, nick, FALSE);
|
|
if (ctx == NULL) {
|
|
return;
|
|
}
|
|
|
|
opc = ctx->app_data;
|
|
/* Always NEED a peer context or else code error. */
|
|
g_return_if_fail(opc != NULL);
|
|
|
|
fp_forget = opc->active_fingerprint;
|
|
} else {
|
|
fp_forget = otr_find_hash_fingerprint_from_human(str_fp, ustate);
|
|
}
|
|
|
|
if (fp_forget) {
|
|
/* Don't do anything if context is in encrypted state. */
|
|
if (check_fp_encrypted_msgstate(fp_forget)) {
|
|
printformat(server, nick, MSGLEVEL_CLIENTCRAP, TXT_OTR_FP_CTX_ENCRYPTED);
|
|
return;
|
|
}
|
|
|
|
otrl_privkey_hash_to_human(fp, fp_forget->fingerprint);
|
|
/* Forget fp and context if it's the only one remaining. */
|
|
otrl_context_forget_fingerprint(fp_forget, 1);
|
|
/* Update fingerprints file. */
|
|
key_write_fingerprints(ustate);
|
|
printformat(server, nick, MSGLEVEL_CLIENTCRAP, TXT_OTR_FP_FORGOTTEN, fp);
|
|
} else
|
|
printformat(server, nick, MSGLEVEL_CLIENTERROR, TXT_OTR_FP_MISSING, str_fp);
|
|
}
|
|
|
|
/*
|
|
* Distrust a fingerprint.
|
|
*
|
|
* If str_fp is not NULL, it must be on the OTR human format like this:
|
|
* "487FFADA 5073FEDD C5AB5C14 5BB6C1FF 6D40D48A". If str_fp is NULL, get the
|
|
* context of the target nickname, check for the OTR peer context active
|
|
* fingerprint and distrust it.
|
|
*/
|
|
void otr_distrust(SERVER_REC *server, const char *nick, char *str_fp,
|
|
struct otr_user_state *ustate)
|
|
{
|
|
char fp[OTRL_PRIVKEY_FPRINT_HUMAN_LEN];
|
|
Fingerprint *fp_distrust;
|
|
ConnContext *ctx;
|
|
struct otr_peer_context *opc;
|
|
|
|
/* No human string fingerprint given. */
|
|
if (*str_fp == '\0') {
|
|
ctx = otr_find_context(server, nick, FALSE);
|
|
if (ctx == NULL) {
|
|
return;
|
|
}
|
|
|
|
opc = ctx->app_data;
|
|
/* Always NEED a peer context or else code error. */
|
|
g_return_if_fail(opc != NULL);
|
|
|
|
fp_distrust = opc->active_fingerprint;
|
|
} else
|
|
fp_distrust = otr_find_hash_fingerprint_from_human(str_fp, ustate);
|
|
|
|
if (fp_distrust != NULL) {
|
|
otrl_privkey_hash_to_human(fp, fp_distrust->fingerprint);
|
|
|
|
if (!otrl_context_is_fingerprint_trusted(fp_distrust)) {
|
|
/* Fingerprint already not trusted. Do nothing. */
|
|
printformat(server, nick, MSGLEVEL_CLIENTERROR, TXT_OTR_FP_ALREADY_DISTRUSED, fp);
|
|
return;
|
|
}
|
|
|
|
otrl_context_set_trust(fp_distrust, "");
|
|
|
|
/* Update fingerprints file. */
|
|
key_write_fingerprints(ustate);
|
|
printformat(server, nick, MSGLEVEL_CLIENTCRAP, TXT_OTR_FP_DISTRUSTED, fp);
|
|
} else
|
|
printformat(server, nick, MSGLEVEL_CLIENTERROR, TXT_OTR_FP_MISSING, str_fp);
|
|
}
|