examples/test-lm.c
changeset 83 9c89653e79a1
child 99 81e9d035de02
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/examples/test-lm.c	Thu Mar 18 00:06:01 2004 +0000
@@ -0,0 +1,235 @@
+/* -*- Mode: C; tab-width: 8; indent-tabs-mode: t; c-basic-offset: 8 -*- */
+/*
+ * Copyright (C) 2003 Imendio HB
+ * Copyright (C) 2003 Mikael Hallendal <micke@imendio.com>
+ *
+ * This program is free software; you can redistribute it and/or
+ * modify it under the terms of the GNU Lesser General Public License as
+ * published by the Free Software Foundation; either version 2 of the
+ * License, or (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
+ * Lesser General Public License for more details.
+ *
+ * You should have received a copy of the GNU Lesser General Public
+ * License along with this program; if not, write to the
+ * Free Software Foundation, Inc., 59 Temple Place - Suite 330,
+ * Boston, MA 02111-1307, USA.
+ */
+
+#include <config.h>
+
+#include <glib.h>
+#include <string.h>
+#include <stdlib.h>
+#include <loudmouth/loudmouth.h>
+#ifdef __WIN32__
+#include <winsock2.h>
+#endif
+
+typedef struct {
+	gchar *name;
+	gchar *passwd;
+} UserInfo;
+
+static void 
+free_user_info (UserInfo *info)
+{
+	g_free (info->name);
+	g_free (info->passwd);
+
+	g_free (info);
+}
+
+static unsigned char expected_fingerprint[20];
+
+static void
+print_finger (const unsigned char *fpr, unsigned int size)
+{
+	gint i;
+	for (i = 0; i < size-1; i++)
+		g_print ("%02X:", (unsigned char) fpr[i]);
+	g_print ("%02X", (unsigned char) fpr[size-1]);
+}
+
+static LmSSLResponse
+ssl_cb (LmSSL *ssl, LmSSLStatus status, gpointer ud)
+{
+	g_print ("SSL status: %d\n", status);
+	switch (status) {
+	case LM_SSL_STATUS_NO_CERT_FOUND:
+		g_print ("No certificate found!\n");
+		break;
+	case LM_SSL_STATUS_UNTRUSTED_CERT:
+		g_print ("Certificate is not trusted!\n"); 
+		break;
+	case LM_SSL_STATUS_CERT_EXPIRED:
+		g_print ("Certificate has expired!\n"); 
+		break;
+	case LM_SSL_STATUS_CERT_NOT_ACTIVATED:
+		g_print ("Certificate has not been activated!\n"); 
+		break;
+	case LM_SSL_STATUS_CERT_HOSTNAME_MISMATCH:
+		g_print ("Certificate hostname does not match expected hostname!\n"); 
+		break;
+	case LM_SSL_STATUS_CERT_FINGERPRINT_MISMATCH: {
+		const unsigned char *fpr = lm_ssl_get_fingerprint (ssl);
+		g_print ("Certificate fingerprint does not match expected fingerprint!\n"); 
+		g_print ("Remote fingerprint: ");
+		print_finger (fpr, 16);
+		g_print ("\nExpected fingerprint: ");
+		print_finger (expected_fingerprint, 16);
+		g_print ("\n");
+		break;
+	}
+	case LM_SSL_STATUS_GENERIC_ERROR:
+		g_print ("Generic SSL error!\n"); 
+		break;
+	}
+
+	return LM_SSL_RESPONSE_CONTINUE;
+}
+
+static void
+authentication_cb (LmConnection *connection, gboolean result, gpointer ud)
+{
+	g_print ("Auth: %d\n", result);
+
+	if (result == TRUE) {
+		LmMessage *m;
+		
+		m = lm_message_new_with_sub_type (NULL,
+						  LM_MESSAGE_TYPE_PRESENCE,
+						  LM_MESSAGE_SUB_TYPE_AVAILABLE);
+		g_print (":: %s\n", lm_message_node_to_string (m->node));
+		
+		lm_connection_send (connection, m, NULL);
+		lm_message_unref (m);
+	}
+}
+
+static void
+connection_open_cb (LmConnection *connection, gboolean result, UserInfo *info)
+{
+	g_print ("Connected callback\n");
+	lm_connection_authenticate (connection,
+				    info->name, info->passwd, "TestLM",
+				    authentication_cb, NULL,FALSE,  NULL);
+	g_print ("Sent auth message\n");
+}
+
+static LmHandlerResult
+handle_messages (LmMessageHandler *handler,
+		 LmConnection     *connection,
+		 LmMessage        *m,
+		 gpointer          user_data)
+{
+	g_print ("Incoming message from: %s\n",
+		 lm_message_node_get_attribute (m->node, "from"));
+
+	return LM_HANDLER_RESULT_REMOVE_MESSAGE;
+}
+
+int 
+main (int argc, char **argv)
+{
+	GMainLoop        *main_loop;
+	LmConnection     *connection;
+	LmMessageHandler *handler;
+	gboolean          result;
+	UserInfo         *info;
+#ifdef __WIN32__
+	WORD wVersionRequested;
+	WSADATA wsaData;
+	int err;
+#endif
+	
+	if (argc < 4) {
+		g_print ("Usage: test-lm <server> <username> <password>\n"
+			 "       test-lm <server> <username> <password> <fingerprint>\n");
+		return 1;
+	}
+
+/* Needed to build on Win32. */
+#ifdef __WIN32__
+	wVersionRequested = MAKEWORD( 2, 2 );
+
+	err = WSAStartup( wVersionRequested, &wsaData );
+	if ( err != 0 ) {
+		/* Tell the user that we could not find a usable */
+		/* WinSock DLL.                                  */
+		return;
+	}
+
+	/* Confirm that the WinSock DLL supports 2.2.*/
+	/* Note that if the DLL supports versions greater    */
+	/* than 2.2 in addition to 2.2, it will still return */
+	/* 2.2 in wVersion since that is the version we      */
+	/* requested.                                        */
+
+	if ( LOBYTE( wsaData.wVersion ) != 2 ||
+			HIBYTE( wsaData.wVersion ) != 2 ) {
+		/* Tell the user that we could not find a usable */
+		/* WinSock DLL.                                  */
+		WSACleanup( );
+		return;
+	}
+#endif
+
+        connection = lm_connection_new (argv[1]);
+
+	if (argc > 4 && !lm_ssl_is_supported ()) {
+		g_error ("No SSL support!");
+		exit (1);
+	}
+
+
+	handler = lm_message_handler_new (handle_messages, NULL, NULL);
+	lm_connection_register_message_handler (connection, handler, 
+						LM_MESSAGE_TYPE_MESSAGE, 
+						LM_HANDLER_PRIORITY_NORMAL);
+	
+	lm_message_handler_unref (handler);
+	
+	info = g_new0 (UserInfo, 1);
+	info->name = g_strdup (argv[2]);
+	info->passwd = g_strdup (argv[3]);
+	
+	if (argc > 4) {
+		int    i;
+		char  *p;
+		LmSSL *ssl;
+		
+		lm_connection_set_port (connection,
+					LM_CONNECTION_DEFAULT_PORT_SSL);
+		
+		for (i = 0, p = argv[4]; *p && *(p+1); i++, p += 3)
+			expected_fingerprint[i] = (unsigned char) g_ascii_strtoull (p, NULL, 16);
+		
+		ssl = lm_ssl_new (expected_fingerprint,
+				  (LmSSLFunction) ssl_cb,
+				  info, 
+				  (GDestroyNotify) free_user_info);
+		
+		lm_connection_set_ssl (connection, ssl);
+
+		lm_ssl_unref (ssl);
+	}
+
+	result = lm_connection_open (connection,
+				     (LmResultFunction) connection_open_cb,
+				     info, NULL, NULL);
+
+	if (!result) {
+		g_print ("Opening connection failed: %d\n", result);
+	} else {
+		g_print ("Returned from the connection_open\n");
+	}
+	
+	main_loop = g_main_loop_new (NULL, FALSE);
+	g_main_loop_run (main_loop);
+
+	return 0;
+}