2004-10-05 Mikael Hallendal <micke@imendio.com>
* examples/*.c
* loudmouth/*.[ch]
- s/Imendio HB/Imendio AB/
/* -*- Mode: C; tab-width: 8; indent-tabs-mode: t; c-basic-offset: 8 -*- */
/*
* Copyright (C) 2003 Imendio AB
* Copyright (C) 2003 Mikael Hallendal <micke@imendio.com>
*
* This program is free software; you can redistribute it and/or
* modify it under the terms of the GNU Lesser General Public License as
* published by the Free Software Foundation; either version 2 of the
* License, or (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Lesser General Public License for more details.
*
* You should have received a copy of the GNU Lesser General Public
* License along with this program; if not, write to the
* Free Software Foundation, Inc., 59 Temple Place - Suite 330,
* Boston, MA 02111-1307, USA.
*/
#include <config.h>
#include <glib.h>
#include <string.h>
#include <stdlib.h>
#include <loudmouth/loudmouth.h>
#ifdef __WIN32__
#include <winsock2.h>
#endif
typedef struct {
gchar *name;
gchar *passwd;
} UserInfo;
static void
free_user_info (UserInfo *info)
{
g_free (info->name);
g_free (info->passwd);
g_free (info);
}
static unsigned char expected_fingerprint[20];
static void
print_finger (const unsigned char *fpr, unsigned int size)
{
gint i;
for (i = 0; i < size-1; i++)
g_print ("%02X:", (unsigned char) fpr[i]);
g_print ("%02X", (unsigned char) fpr[size-1]);
}
static LmSSLResponse
ssl_cb (LmSSL *ssl, LmSSLStatus status, gpointer ud)
{
g_print ("SSL status: %d\n", status);
switch (status) {
case LM_SSL_STATUS_NO_CERT_FOUND:
g_print ("No certificate found!\n");
break;
case LM_SSL_STATUS_UNTRUSTED_CERT:
g_print ("Certificate is not trusted!\n");
break;
case LM_SSL_STATUS_CERT_EXPIRED:
g_print ("Certificate has expired!\n");
break;
case LM_SSL_STATUS_CERT_NOT_ACTIVATED:
g_print ("Certificate has not been activated!\n");
break;
case LM_SSL_STATUS_CERT_HOSTNAME_MISMATCH:
g_print ("Certificate hostname does not match expected hostname!\n");
break;
case LM_SSL_STATUS_CERT_FINGERPRINT_MISMATCH: {
const unsigned char *fpr = lm_ssl_get_fingerprint (ssl);
g_print ("Certificate fingerprint does not match expected fingerprint!\n");
g_print ("Remote fingerprint: ");
print_finger (fpr, 16);
g_print ("\nExpected fingerprint: ");
print_finger (expected_fingerprint, 16);
g_print ("\n");
break;
}
case LM_SSL_STATUS_GENERIC_ERROR:
g_print ("Generic SSL error!\n");
break;
}
return LM_SSL_RESPONSE_CONTINUE;
}
static void
authentication_cb (LmConnection *connection, gboolean result, gpointer ud)
{
g_print ("Auth: %d\n", result);
if (result == TRUE) {
LmMessage *m;
m = lm_message_new_with_sub_type (NULL,
LM_MESSAGE_TYPE_PRESENCE,
LM_MESSAGE_SUB_TYPE_AVAILABLE);
g_print (":: %s\n", lm_message_node_to_string (m->node));
lm_connection_send (connection, m, NULL);
lm_message_unref (m);
}
}
static void
connection_open_cb (LmConnection *connection, gboolean result, UserInfo *info)
{
g_print ("Connected callback\n");
lm_connection_authenticate (connection,
info->name, info->passwd, "TestLM",
authentication_cb, NULL,FALSE, NULL);
g_print ("Sent auth message\n");
}
static LmHandlerResult
handle_messages (LmMessageHandler *handler,
LmConnection *connection,
LmMessage *m,
gpointer user_data)
{
g_print ("Incoming message from: %s\n",
lm_message_node_get_attribute (m->node, "from"));
return LM_HANDLER_RESULT_REMOVE_MESSAGE;
}
int
main (int argc, char **argv)
{
GMainLoop *main_loop;
LmConnection *connection;
LmMessageHandler *handler;
gboolean result;
UserInfo *info;
#ifdef __WIN32__
WORD wVersionRequested;
WSADATA wsaData;
int err;
#endif
if (argc < 4) {
g_print ("Usage: test-lm <server> <username> <password>\n"
" test-lm <server> <username> <password> <fingerprint>\n");
return 1;
}
/* Needed to build on Win32. */
#ifdef __WIN32__
wVersionRequested = MAKEWORD( 2, 2 );
err = WSAStartup( wVersionRequested, &wsaData );
if ( err != 0 ) {
/* Tell the user that we could not find a usable */
/* WinSock DLL. */
return;
}
/* Confirm that the WinSock DLL supports 2.2.*/
/* Note that if the DLL supports versions greater */
/* than 2.2 in addition to 2.2, it will still return */
/* 2.2 in wVersion since that is the version we */
/* requested. */
if ( LOBYTE( wsaData.wVersion ) != 2 ||
HIBYTE( wsaData.wVersion ) != 2 ) {
/* Tell the user that we could not find a usable */
/* WinSock DLL. */
WSACleanup( );
return;
}
#endif
connection = lm_connection_new (argv[1]);
if (argc > 4 && !lm_ssl_is_supported ()) {
g_error ("No SSL support!");
exit (1);
}
handler = lm_message_handler_new (handle_messages, NULL, NULL);
lm_connection_register_message_handler (connection, handler,
LM_MESSAGE_TYPE_MESSAGE,
LM_HANDLER_PRIORITY_NORMAL);
lm_message_handler_unref (handler);
info = g_new0 (UserInfo, 1);
info->name = g_strdup (argv[2]);
info->passwd = g_strdup (argv[3]);
if (argc > 4) {
int i;
char *p;
LmSSL *ssl;
lm_connection_set_port (connection,
LM_CONNECTION_DEFAULT_PORT_SSL);
for (i = 0, p = argv[4]; *p && *(p+1); i++, p += 3)
expected_fingerprint[i] = (unsigned char) g_ascii_strtoull (p, NULL, 16);
ssl = lm_ssl_new (expected_fingerprint,
(LmSSLFunction) ssl_cb,
info,
(GDestroyNotify) free_user_info);
lm_connection_set_ssl (connection, ssl);
lm_ssl_unref (ssl);
}
result = lm_connection_open (connection,
(LmResultFunction) connection_open_cb,
info, NULL, NULL);
if (!result) {
g_print ("Opening connection failed: %d\n", result);
} else {
g_print ("Returned from the connection_open\n");
}
main_loop = g_main_loop_new (NULL, FALSE);
g_main_loop_run (main_loop);
return 0;
}