1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
|
using Xmpp.Core;
namespace Xmpp.Tls {
private const string NS_URI = "urn:ietf:params:xml:ns:xmpp-tls";
public class Module : XmppStreamNegotiationModule {
public static ModuleIdentity<Module> IDENTITY = new ModuleIdentity<Module>(NS_URI, "tls_module");
public bool require { get; set; default = true; }
public bool server_supports_tls = false;
public bool server_requires_tls = false;
public SocketConnectable? identity = null;
public override void attach(XmppStream stream) {
stream.received_features_node.connect(this.received_features_node);
stream.received_nonza.connect(this.received_nonza);
}
public override void detach(XmppStream stream) {
stream.received_features_node.disconnect(this.received_features_node);
stream.received_nonza.disconnect(this.received_nonza);
}
private void received_nonza(XmppStream stream, StanzaNode node) {
if (node.ns_uri == NS_URI && node.name == "proceed") {
try {
var io_stream = stream.get_stream();
if (io_stream == null) return;
var conn = TlsClientConnection.new(io_stream, identity);
// TODO: Add certificate error handling, that is, allow the
// program to handle certificate errors. The certificate
// *is checked* by TlsClientConnection, and connection is
// not allowed to continue in case that there is an error.
stream.reset_stream(conn);
var flag = stream.get_flag(Flag.IDENTITY);
flag.peer_certificate = conn.get_peer_certificate();
flag.finished = true;
} catch (Error e) {
stderr.printf("Failed to start TLS: %s\n", e.message);
}
}
}
private void received_features_node(XmppStream stream) {
if (stream.has_flag(Flag.IDENTITY)) return;
if (stream.is_setup_needed()) return;
var starttls = stream.features.get_subnode("starttls", NS_URI);
if (starttls != null) {
server_supports_tls = true;
if (starttls.get_subnode("required") != null || stream.features.get_all_subnodes().size == 1) {
server_requires_tls = true;
}
if (server_requires_tls || require) {
try {
stream.write(new StanzaNode.build("starttls", NS_URI).add_self_xmlns());
} catch (IOStreamError e) {
stderr.printf("Failed to request TLS: %s\n", e.message);
}
}
if (identity == null) {
identity = new NetworkService("xmpp-client", "tcp", stream.remote_name);
}
stream.add_flag(new Flag());
}
}
public override bool mandatory_outstanding(XmppStream stream) {
return require && (!stream.has_flag(Flag.IDENTITY) || !stream.get_flag(Flag.IDENTITY).finished);
}
public override bool negotiation_active(XmppStream stream) {
return stream.has_flag(Flag.IDENTITY) && !stream.get_flag(Flag.IDENTITY).finished;
}
public override string get_ns() { return NS_URI; }
public override string get_id() { return IDENTITY.id; }
}
public class Flag : XmppStreamFlag {
public static FlagIdentity<Flag> IDENTITY = new FlagIdentity<Flag>(NS_URI, "tls");
public TlsCertificate? peer_certificate;
public bool finished { get; set; default=false; }
public override string get_ns() { return NS_URI; }
public override string get_id() { return IDENTITY.id; }
}
}
|