2014-02-13 18:07:09 -05:00
|
|
|
/*
|
|
|
|
* otr.c
|
2019-11-13 06:11:05 -05:00
|
|
|
* vim: expandtab:ts=4:sts=4:sw=4
|
2014-02-13 18:07:09 -05:00
|
|
|
*
|
2019-01-22 05:31:45 -05:00
|
|
|
* Copyright (C) 2012 - 2019 James Booth <boothj5@gmail.com>
|
2014-02-13 18:07:09 -05:00
|
|
|
*
|
|
|
|
* This file is part of Profanity.
|
|
|
|
*
|
|
|
|
* Profanity is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* Profanity is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
2016-07-23 20:14:49 -04:00
|
|
|
* along with Profanity. If not, see <https://www.gnu.org/licenses/>.
|
2014-02-13 18:07:09 -05:00
|
|
|
*
|
2014-08-24 15:57:39 -04:00
|
|
|
* In addition, as a special exception, the copyright holders give permission to
|
|
|
|
* link the code of portions of this program with the OpenSSL library under
|
|
|
|
* certain conditions as described in each individual source file, and
|
|
|
|
* distribute linked combinations including the two.
|
|
|
|
*
|
|
|
|
* You must obey the GNU General Public License in all respects for all of the
|
|
|
|
* code used other than OpenSSL. If you modify file(s) with this exception, you
|
|
|
|
* may extend this exception to your version of the file(s), but you are not
|
|
|
|
* obligated to do so. If you do not wish to do so, delete this exception
|
|
|
|
* statement from your version. If you delete this exception statement from all
|
|
|
|
* source files in the program, then also delete it here.
|
|
|
|
*
|
2014-02-13 18:07:09 -05:00
|
|
|
*/
|
|
|
|
|
|
|
|
#include <libotr/proto.h>
|
|
|
|
#include <libotr/privkey.h>
|
|
|
|
#include <libotr/message.h>
|
2014-04-26 17:08:53 -04:00
|
|
|
#include <libotr/sm.h>
|
2014-02-13 18:07:09 -05:00
|
|
|
#include <glib.h>
|
|
|
|
|
2016-07-24 10:43:51 -04:00
|
|
|
#include "log.h"
|
|
|
|
#include "config/preferences.h"
|
2016-07-24 11:22:15 -04:00
|
|
|
#include "config/files.h"
|
2014-02-13 18:07:09 -05:00
|
|
|
#include "otr/otr.h"
|
|
|
|
#include "otr/otrlib.h"
|
2016-07-24 10:43:51 -04:00
|
|
|
#include "ui/ui.h"
|
2016-07-24 10:14:46 -04:00
|
|
|
#include "ui/window_list.h"
|
2016-07-24 10:43:51 -04:00
|
|
|
#include "xmpp/chat_session.h"
|
|
|
|
#include "xmpp/roster_list.h"
|
2016-07-24 09:55:32 -04:00
|
|
|
#include "xmpp/contact.h"
|
2016-04-26 16:34:06 -04:00
|
|
|
#include "xmpp/xmpp.h"
|
2014-02-13 18:07:09 -05:00
|
|
|
|
2014-04-18 18:29:22 -04:00
|
|
|
#define PRESENCE_ONLINE 1
|
|
|
|
#define PRESENCE_OFFLINE 0
|
|
|
|
#define PRESENCE_UNKNOWN -1
|
|
|
|
|
2014-02-13 18:07:09 -05:00
|
|
|
static OtrlUserState user_state;
|
|
|
|
static OtrlMessageAppOps ops;
|
|
|
|
static char *jid;
|
|
|
|
static gboolean data_loaded;
|
2014-04-26 17:52:25 -04:00
|
|
|
static GHashTable *smp_initiators;
|
2014-02-13 18:07:09 -05:00
|
|
|
|
2014-04-27 13:46:40 -04:00
|
|
|
OtrlUserState
|
|
|
|
otr_userstate(void)
|
|
|
|
{
|
|
|
|
return user_state;
|
|
|
|
}
|
|
|
|
|
2015-10-25 18:40:09 -04:00
|
|
|
OtrlMessageAppOps*
|
2014-04-27 13:46:40 -04:00
|
|
|
otr_messageops(void)
|
|
|
|
{
|
|
|
|
return &ops;
|
|
|
|
}
|
|
|
|
|
2015-10-25 18:40:09 -04:00
|
|
|
GHashTable*
|
2014-04-27 13:46:40 -04:00
|
|
|
otr_smpinitators(void)
|
|
|
|
{
|
|
|
|
return smp_initiators;
|
|
|
|
}
|
|
|
|
|
2014-02-13 18:07:09 -05:00
|
|
|
// ops callbacks
|
|
|
|
static OtrlPolicy
|
|
|
|
cb_policy(void *opdata, ConnContext *context)
|
|
|
|
{
|
|
|
|
return otrlib_policy();
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2016-01-04 19:06:50 -05:00
|
|
|
cb_is_logged_in(void *opdata, const char *accountname, const char *protocol, const char *recipient)
|
2014-02-13 18:07:09 -05:00
|
|
|
{
|
2016-05-05 18:51:49 -04:00
|
|
|
jabber_conn_status_t conn_status = connection_get_status();
|
2016-01-04 19:06:50 -05:00
|
|
|
if (conn_status != JABBER_CONNECTED) {
|
|
|
|
return PRESENCE_OFFLINE;
|
|
|
|
}
|
|
|
|
|
2014-02-13 18:07:09 -05:00
|
|
|
PContact contact = roster_get_contact(recipient);
|
2014-04-18 18:40:35 -04:00
|
|
|
|
|
|
|
// not in roster
|
2014-04-18 18:29:22 -04:00
|
|
|
if (contact == NULL) {
|
|
|
|
return PRESENCE_ONLINE;
|
|
|
|
}
|
|
|
|
|
2014-04-18 19:56:57 -04:00
|
|
|
// not subscribed
|
2014-04-18 18:40:35 -04:00
|
|
|
if (p_contact_subscribed(contact) == FALSE) {
|
|
|
|
return PRESENCE_ONLINE;
|
|
|
|
}
|
|
|
|
|
|
|
|
// subscribed
|
2014-02-13 18:07:09 -05:00
|
|
|
if (g_strcmp0(p_contact_presence(contact), "offline") == 0) {
|
2014-04-18 18:29:22 -04:00
|
|
|
return PRESENCE_OFFLINE;
|
2014-02-13 18:07:09 -05:00
|
|
|
} else {
|
2014-04-18 18:29:22 -04:00
|
|
|
return PRESENCE_ONLINE;
|
2014-02-13 18:07:09 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
cb_inject_message(void *opdata, const char *accountname,
|
|
|
|
const char *protocol, const char *recipient, const char *message)
|
|
|
|
{
|
2020-02-12 02:54:12 -05:00
|
|
|
char *id = message_send_chat_otr(recipient, message, FALSE, NULL);
|
2015-08-20 17:02:58 -04:00
|
|
|
free(id);
|
2014-02-13 18:07:09 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
cb_write_fingerprints(void *opdata)
|
|
|
|
{
|
|
|
|
gcry_error_t err = 0;
|
|
|
|
|
2016-07-24 16:35:12 -04:00
|
|
|
char *otrdir = files_get_data_path(DIR_OTR);
|
|
|
|
GString *basedir = g_string_new(otrdir);
|
|
|
|
free(otrdir);
|
2014-06-15 16:33:29 -04:00
|
|
|
gchar *account_dir = str_replace(jid, "@", "_at_");
|
2016-07-24 16:35:12 -04:00
|
|
|
g_string_append(basedir, "/");
|
2014-02-13 18:07:09 -05:00
|
|
|
g_string_append(basedir, account_dir);
|
|
|
|
g_string_append(basedir, "/");
|
|
|
|
free(account_dir);
|
|
|
|
|
|
|
|
GString *fpsfilename = g_string_new(basedir->str);
|
|
|
|
g_string_append(fpsfilename, "fingerprints.txt");
|
|
|
|
err = otrl_privkey_write_fingerprints(user_state, fpsfilename->str);
|
2016-04-27 17:10:27 -04:00
|
|
|
if (err != GPG_ERR_NO_ERROR) {
|
2014-02-13 18:07:09 -05:00
|
|
|
log_error("Failed to write fingerprints file");
|
|
|
|
cons_show_error("Failed to create fingerprints file");
|
|
|
|
}
|
|
|
|
g_string_free(basedir, TRUE);
|
|
|
|
g_string_free(fpsfilename, TRUE);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
cb_gone_secure(void *opdata, ConnContext *context)
|
|
|
|
{
|
2015-10-26 19:04:45 -04:00
|
|
|
ProfChatWin *chatwin = wins_get_chat(context->username);
|
|
|
|
if (!chatwin) {
|
|
|
|
chatwin = (ProfChatWin*) wins_new_chat(context->username);
|
|
|
|
}
|
|
|
|
|
2015-10-27 17:23:56 -04:00
|
|
|
chatwin_otr_secured(chatwin, otr_is_trusted(context->username));
|
2014-02-13 18:07:09 -05:00
|
|
|
}
|
|
|
|
|
2015-10-25 18:40:09 -04:00
|
|
|
char*
|
2014-12-22 17:13:42 -05:00
|
|
|
otr_libotr_version(void)
|
2014-02-13 18:07:09 -05:00
|
|
|
{
|
|
|
|
return OTRL_VERSION;
|
|
|
|
}
|
|
|
|
|
2015-10-25 18:40:09 -04:00
|
|
|
char*
|
2014-12-22 17:13:42 -05:00
|
|
|
otr_start_query(void)
|
2014-02-18 17:31:27 -05:00
|
|
|
{
|
|
|
|
return otrlib_start_query();
|
|
|
|
}
|
|
|
|
|
2014-12-22 17:13:42 -05:00
|
|
|
void
|
|
|
|
otr_init(void)
|
2014-02-13 18:07:09 -05:00
|
|
|
{
|
|
|
|
log_info("Initialising OTR");
|
|
|
|
OTRL_INIT;
|
|
|
|
|
2015-05-23 19:56:13 -04:00
|
|
|
jid = NULL;
|
|
|
|
|
2014-02-13 18:07:09 -05:00
|
|
|
ops.policy = cb_policy;
|
|
|
|
ops.is_logged_in = cb_is_logged_in;
|
|
|
|
ops.inject_message = cb_inject_message;
|
|
|
|
ops.write_fingerprints = cb_write_fingerprints;
|
|
|
|
ops.gone_secure = cb_gone_secure;
|
|
|
|
|
|
|
|
otrlib_init_ops(&ops);
|
2014-04-28 17:23:39 -04:00
|
|
|
otrlib_init_timer();
|
2014-04-26 17:52:25 -04:00
|
|
|
smp_initiators = g_hash_table_new_full(g_str_hash, g_str_equal, g_free, g_free);
|
|
|
|
|
2014-02-13 18:07:09 -05:00
|
|
|
data_loaded = FALSE;
|
|
|
|
}
|
|
|
|
|
2014-12-22 17:13:42 -05:00
|
|
|
void
|
|
|
|
otr_shutdown(void)
|
2014-06-26 18:55:57 -04:00
|
|
|
{
|
2015-05-04 17:52:48 -04:00
|
|
|
if (jid) {
|
2014-06-26 18:55:57 -04:00
|
|
|
free(jid);
|
2015-05-23 19:56:13 -04:00
|
|
|
jid = NULL;
|
2014-06-26 18:55:57 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-04-28 17:23:39 -04:00
|
|
|
void
|
2014-12-22 17:13:42 -05:00
|
|
|
otr_poll(void)
|
2014-04-28 17:23:39 -04:00
|
|
|
{
|
|
|
|
otrlib_poll();
|
|
|
|
}
|
|
|
|
|
2014-12-22 17:13:42 -05:00
|
|
|
void
|
|
|
|
otr_on_connect(ProfAccount *account)
|
2014-02-13 18:07:09 -05:00
|
|
|
{
|
2015-05-04 17:52:48 -04:00
|
|
|
if (jid) {
|
2014-06-26 18:55:57 -04:00
|
|
|
free(jid);
|
|
|
|
}
|
2014-02-13 18:07:09 -05:00
|
|
|
jid = strdup(account->jid);
|
|
|
|
log_info("Loading OTR key for %s", jid);
|
|
|
|
|
2016-07-24 16:35:12 -04:00
|
|
|
char *otrdir = files_get_data_path(DIR_OTR);
|
|
|
|
GString *basedir = g_string_new(otrdir);
|
|
|
|
free(otrdir);
|
2014-06-15 16:33:29 -04:00
|
|
|
gchar *account_dir = str_replace(jid, "@", "_at_");
|
2016-07-24 16:35:12 -04:00
|
|
|
g_string_append(basedir, "/");
|
2014-02-13 18:07:09 -05:00
|
|
|
g_string_append(basedir, account_dir);
|
|
|
|
g_string_append(basedir, "/");
|
|
|
|
free(account_dir);
|
|
|
|
|
|
|
|
if (!mkdir_recursive(basedir->str)) {
|
|
|
|
log_error("Could not create %s for account %s.", basedir->str, jid);
|
|
|
|
cons_show_error("Could not create %s for account %s.", basedir->str, jid);
|
|
|
|
g_string_free(basedir, TRUE);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2016-06-08 17:23:00 -04:00
|
|
|
if (user_state) {
|
|
|
|
otrl_userstate_free(user_state);
|
|
|
|
}
|
2014-02-13 18:07:09 -05:00
|
|
|
user_state = otrl_userstate_create();
|
|
|
|
|
|
|
|
gcry_error_t err = 0;
|
|
|
|
|
|
|
|
GString *keysfilename = g_string_new(basedir->str);
|
|
|
|
g_string_append(keysfilename, "keys.txt");
|
|
|
|
if (!g_file_test(keysfilename->str, G_FILE_TEST_IS_REGULAR)) {
|
2015-11-23 16:24:31 -05:00
|
|
|
log_info("No OTR private key file found %s", keysfilename->str);
|
2014-02-13 18:07:09 -05:00
|
|
|
data_loaded = FALSE;
|
|
|
|
} else {
|
|
|
|
log_info("Loading OTR private key %s", keysfilename->str);
|
|
|
|
err = otrl_privkey_read(user_state, keysfilename->str);
|
2016-04-27 17:10:27 -04:00
|
|
|
if (err != GPG_ERR_NO_ERROR) {
|
2015-11-23 16:24:31 -05:00
|
|
|
log_warning("Failed to read OTR private key file: %s", keysfilename->str);
|
|
|
|
cons_show_error("Failed to read OTR private key file: %s", keysfilename->str);
|
|
|
|
g_string_free(basedir, TRUE);
|
|
|
|
g_string_free(keysfilename, TRUE);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
OtrlPrivKey* privkey = otrl_privkey_find(user_state, jid, "xmpp");
|
|
|
|
if (!privkey) {
|
|
|
|
log_warning("No OTR private key found for account \"%s\", protocol \"xmpp\" in file: %s", jid, keysfilename->str);
|
|
|
|
cons_show_error("No OTR private key found for account \"%s\", protocol \"xmpp\" in file: %s", jid, keysfilename->str);
|
2014-02-13 18:07:09 -05:00
|
|
|
g_string_free(basedir, TRUE);
|
|
|
|
g_string_free(keysfilename, TRUE);
|
|
|
|
return;
|
|
|
|
}
|
2015-11-23 16:24:31 -05:00
|
|
|
log_info("Loaded OTR private key");
|
|
|
|
data_loaded = TRUE;
|
2014-02-13 18:07:09 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
GString *fpsfilename = g_string_new(basedir->str);
|
|
|
|
g_string_append(fpsfilename, "fingerprints.txt");
|
|
|
|
if (!g_file_test(fpsfilename->str, G_FILE_TEST_IS_REGULAR)) {
|
2015-11-23 16:24:31 -05:00
|
|
|
log_info("No OTR fingerprints file found %s", fpsfilename->str);
|
2014-02-13 18:07:09 -05:00
|
|
|
data_loaded = FALSE;
|
|
|
|
} else {
|
2015-11-23 16:24:31 -05:00
|
|
|
log_info("Loading OTR fingerprints %s", fpsfilename->str);
|
2014-02-13 18:07:09 -05:00
|
|
|
err = otrl_privkey_read_fingerprints(user_state, fpsfilename->str, NULL, NULL);
|
2016-04-27 17:10:27 -04:00
|
|
|
if (err != GPG_ERR_NO_ERROR) {
|
2015-11-23 16:24:31 -05:00
|
|
|
log_error("Failed to load OTR fingerprints file: %s", fpsfilename->str);
|
2014-02-13 18:07:09 -05:00
|
|
|
g_string_free(basedir, TRUE);
|
|
|
|
g_string_free(keysfilename, TRUE);
|
|
|
|
g_string_free(fpsfilename, TRUE);
|
|
|
|
return;
|
|
|
|
} else {
|
2015-11-23 16:24:31 -05:00
|
|
|
log_info("Loaded OTR fingerprints");
|
2014-02-13 18:07:09 -05:00
|
|
|
data_loaded = TRUE;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (data_loaded) {
|
|
|
|
cons_show("Loaded OTR private key for %s", jid);
|
|
|
|
}
|
|
|
|
|
|
|
|
g_string_free(basedir, TRUE);
|
|
|
|
g_string_free(keysfilename, TRUE);
|
|
|
|
g_string_free(fpsfilename, TRUE);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2015-06-21 13:00:57 -04:00
|
|
|
char*
|
2015-10-25 18:40:09 -04:00
|
|
|
otr_on_message_recv(const char *const barejid, const char *const resource, const char *const message, gboolean *decrypted)
|
2015-04-27 18:17:38 -04:00
|
|
|
{
|
|
|
|
prof_otrpolicy_t policy = otr_get_policy(barejid);
|
|
|
|
char *whitespace_base = strstr(message, OTRL_MESSAGE_TAG_BASE);
|
|
|
|
|
|
|
|
//check for OTR whitespace (opportunistic or always)
|
|
|
|
if (policy == PROF_OTRPOLICY_OPPORTUNISTIC || policy == PROF_OTRPOLICY_ALWAYS) {
|
|
|
|
if (whitespace_base) {
|
|
|
|
if (strstr(message, OTRL_MESSAGE_TAG_V2) || strstr(message, OTRL_MESSAGE_TAG_V1)) {
|
|
|
|
// Remove whitespace pattern for proper display in UI
|
|
|
|
// Handle both BASE+TAGV1/2(16+8) and BASE+TAGV1+TAGV2(16+8+8)
|
|
|
|
int tag_length = 24;
|
|
|
|
if (strstr(message, OTRL_MESSAGE_TAG_V2) && strstr(message, OTRL_MESSAGE_TAG_V1)) {
|
|
|
|
tag_length = 32;
|
|
|
|
}
|
|
|
|
memmove(whitespace_base, whitespace_base+tag_length, tag_length);
|
|
|
|
char *otr_query_message = otr_start_query();
|
|
|
|
cons_show("OTR Whitespace pattern detected. Attempting to start OTR session...");
|
2020-02-12 02:54:12 -05:00
|
|
|
char *id = message_send_chat_otr(barejid, otr_query_message, FALSE, NULL);
|
2015-08-20 17:02:58 -04:00
|
|
|
free(id);
|
2015-04-27 18:17:38 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-08-26 19:37:48 -04:00
|
|
|
char *newmessage = otr_decrypt_message(barejid, message, decrypted);
|
|
|
|
if (!newmessage) { // internal OTR message
|
2015-06-21 13:00:57 -04:00
|
|
|
return NULL;
|
2015-04-27 18:17:38 -04:00
|
|
|
}
|
|
|
|
|
2015-08-26 19:37:48 -04:00
|
|
|
if (policy == PROF_OTRPOLICY_ALWAYS && *decrypted == FALSE && !whitespace_base) {
|
2015-04-27 18:17:38 -04:00
|
|
|
char *otr_query_message = otr_start_query();
|
|
|
|
cons_show("Attempting to start OTR session...");
|
2020-02-12 02:54:12 -05:00
|
|
|
char *id = message_send_chat_otr(barejid, otr_query_message, FALSE, NULL);
|
2015-08-20 17:02:58 -04:00
|
|
|
free(id);
|
2015-04-27 18:17:38 -04:00
|
|
|
}
|
|
|
|
|
2015-08-26 19:37:48 -04:00
|
|
|
return newmessage;
|
2015-04-27 18:17:38 -04:00
|
|
|
}
|
|
|
|
|
2015-06-20 20:48:25 -04:00
|
|
|
gboolean
|
2020-02-12 02:54:12 -05:00
|
|
|
otr_on_message_send(ProfChatWin *chatwin, const char *const message, gboolean request_receipt, const char *const replace_id)
|
2015-04-27 18:30:33 -04:00
|
|
|
{
|
|
|
|
char *id = NULL;
|
2015-05-02 18:23:12 -04:00
|
|
|
prof_otrpolicy_t policy = otr_get_policy(chatwin->barejid);
|
2015-04-27 18:30:33 -04:00
|
|
|
|
2015-06-20 20:48:25 -04:00
|
|
|
// Send encrypted message
|
2015-05-02 18:23:12 -04:00
|
|
|
if (otr_is_secure(chatwin->barejid)) {
|
|
|
|
char *encrypted = otr_encrypt_message(chatwin->barejid, message);
|
2015-04-29 16:55:09 -04:00
|
|
|
if (encrypted) {
|
2020-02-12 02:54:12 -05:00
|
|
|
id = message_send_chat_otr(chatwin->barejid, encrypted, request_receipt, replace_id);
|
2019-10-28 18:36:42 -04:00
|
|
|
chat_log_otr_msg_out(chatwin->barejid, message, NULL);
|
2020-02-12 02:54:12 -05:00
|
|
|
chatwin_outgoing_msg(chatwin, message, id, PROF_MSG_ENC_OTR, request_receipt, replace_id);
|
2015-04-27 18:30:33 -04:00
|
|
|
otr_free_message(encrypted);
|
2015-06-20 20:48:25 -04:00
|
|
|
free(id);
|
|
|
|
return TRUE;
|
2015-04-27 18:30:33 -04:00
|
|
|
} else {
|
2020-02-20 12:11:08 -05:00
|
|
|
win_println((ProfWin*)chatwin, THEME_ERROR, "-", "%s", "Failed to encrypt and send message.");
|
2015-06-20 20:48:25 -04:00
|
|
|
return TRUE;
|
2015-04-27 18:30:33 -04:00
|
|
|
}
|
2015-06-20 20:48:25 -04:00
|
|
|
}
|
2015-04-27 18:30:33 -04:00
|
|
|
|
2015-06-20 20:48:25 -04:00
|
|
|
// show error if not secure and policy always
|
|
|
|
if (policy == PROF_OTRPOLICY_ALWAYS) {
|
2020-02-20 12:11:08 -05:00
|
|
|
win_println((ProfWin*)chatwin, THEME_ERROR, "-", "%s", "Failed to send message. OTR policy set to: always");
|
2015-06-20 20:48:25 -04:00
|
|
|
return TRUE;
|
|
|
|
}
|
2015-04-27 18:30:33 -04:00
|
|
|
|
2015-06-20 20:48:25 -04:00
|
|
|
// tag and send for policy opportunistic
|
|
|
|
if (policy == PROF_OTRPOLICY_OPPORTUNISTIC) {
|
2015-04-27 18:30:33 -04:00
|
|
|
char *otr_tagged_msg = otr_tag_message(message);
|
2020-02-12 02:54:12 -05:00
|
|
|
id = message_send_chat_otr(chatwin->barejid, otr_tagged_msg, request_receipt, replace_id);
|
2020-03-27 19:04:41 -04:00
|
|
|
chatwin_outgoing_msg(chatwin, message, id, PROF_MSG_ENC_NONE, request_receipt, replace_id);
|
2019-10-28 18:36:42 -04:00
|
|
|
chat_log_msg_out(chatwin->barejid, message, NULL);
|
2015-04-27 18:30:33 -04:00
|
|
|
free(otr_tagged_msg);
|
2015-06-20 20:48:25 -04:00
|
|
|
free(id);
|
|
|
|
return TRUE;
|
2015-04-27 18:30:33 -04:00
|
|
|
}
|
|
|
|
|
2015-06-20 20:48:25 -04:00
|
|
|
return FALSE;
|
2015-04-27 18:30:33 -04:00
|
|
|
}
|
|
|
|
|
2014-12-22 17:13:42 -05:00
|
|
|
void
|
|
|
|
otr_keygen(ProfAccount *account)
|
2014-02-13 18:07:09 -05:00
|
|
|
{
|
|
|
|
if (data_loaded) {
|
|
|
|
cons_show("OTR key already generated.");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2015-05-04 17:52:48 -04:00
|
|
|
if (jid) {
|
2014-06-26 18:55:57 -04:00
|
|
|
free(jid);
|
|
|
|
}
|
2014-02-13 18:07:09 -05:00
|
|
|
jid = strdup(account->jid);
|
|
|
|
log_info("Generating OTR key for %s", jid);
|
|
|
|
|
2016-07-24 16:35:12 -04:00
|
|
|
char *otrdir = files_get_data_path(DIR_OTR);
|
|
|
|
GString *basedir = g_string_new(otrdir);
|
|
|
|
free(otrdir);
|
2014-06-15 16:33:29 -04:00
|
|
|
gchar *account_dir = str_replace(jid, "@", "_at_");
|
2016-07-24 16:35:12 -04:00
|
|
|
g_string_append(basedir, "/");
|
2014-02-13 18:07:09 -05:00
|
|
|
g_string_append(basedir, account_dir);
|
|
|
|
g_string_append(basedir, "/");
|
|
|
|
free(account_dir);
|
|
|
|
|
|
|
|
if (!mkdir_recursive(basedir->str)) {
|
|
|
|
log_error("Could not create %s for account %s.", basedir->str, jid);
|
|
|
|
cons_show_error("Could not create %s for account %s.", basedir->str, jid);
|
|
|
|
g_string_free(basedir, TRUE);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
gcry_error_t err = 0;
|
|
|
|
|
|
|
|
GString *keysfilename = g_string_new(basedir->str);
|
|
|
|
g_string_append(keysfilename, "keys.txt");
|
|
|
|
log_debug("Generating private key file %s for %s", keysfilename->str, jid);
|
|
|
|
cons_show("Generating private key, this may take some time.");
|
|
|
|
cons_show("Moving the mouse randomly around the screen may speed up the process!");
|
2014-10-01 20:34:00 -04:00
|
|
|
ui_update();
|
2014-02-13 18:07:09 -05:00
|
|
|
err = otrl_privkey_generate(user_state, keysfilename->str, account->jid, "xmpp");
|
2016-04-27 17:10:27 -04:00
|
|
|
if (err != GPG_ERR_NO_ERROR) {
|
2014-02-13 18:07:09 -05:00
|
|
|
g_string_free(basedir, TRUE);
|
|
|
|
g_string_free(keysfilename, TRUE);
|
|
|
|
log_error("Failed to generate private key");
|
|
|
|
cons_show_error("Failed to generate private key");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
log_info("Private key generated");
|
|
|
|
cons_show("");
|
|
|
|
cons_show("Private key generation complete.");
|
|
|
|
|
|
|
|
GString *fpsfilename = g_string_new(basedir->str);
|
|
|
|
g_string_append(fpsfilename, "fingerprints.txt");
|
|
|
|
log_debug("Generating fingerprints file %s for %s", fpsfilename->str, jid);
|
|
|
|
err = otrl_privkey_write_fingerprints(user_state, fpsfilename->str);
|
2016-04-27 17:10:27 -04:00
|
|
|
if (err != GPG_ERR_NO_ERROR) {
|
2014-02-13 18:07:09 -05:00
|
|
|
g_string_free(basedir, TRUE);
|
|
|
|
g_string_free(keysfilename, TRUE);
|
|
|
|
log_error("Failed to create fingerprints file");
|
|
|
|
cons_show_error("Failed to create fingerprints file");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
log_info("Fingerprints file created");
|
|
|
|
|
|
|
|
err = otrl_privkey_read(user_state, keysfilename->str);
|
2016-04-27 17:10:27 -04:00
|
|
|
if (err != GPG_ERR_NO_ERROR) {
|
2014-02-13 18:07:09 -05:00
|
|
|
g_string_free(basedir, TRUE);
|
|
|
|
g_string_free(keysfilename, TRUE);
|
|
|
|
log_error("Failed to load private key");
|
|
|
|
data_loaded = FALSE;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
err = otrl_privkey_read_fingerprints(user_state, fpsfilename->str, NULL, NULL);
|
2016-04-27 17:10:27 -04:00
|
|
|
if (err != GPG_ERR_NO_ERROR) {
|
2014-02-13 18:07:09 -05:00
|
|
|
g_string_free(basedir, TRUE);
|
|
|
|
g_string_free(keysfilename, TRUE);
|
|
|
|
log_error("Failed to load fingerprints");
|
|
|
|
data_loaded = FALSE;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
data_loaded = TRUE;
|
|
|
|
|
|
|
|
g_string_free(basedir, TRUE);
|
|
|
|
g_string_free(keysfilename, TRUE);
|
|
|
|
g_string_free(fpsfilename, TRUE);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2014-12-22 17:13:42 -05:00
|
|
|
gboolean
|
|
|
|
otr_key_loaded(void)
|
2014-02-13 18:07:09 -05:00
|
|
|
{
|
|
|
|
return data_loaded;
|
|
|
|
}
|
|
|
|
|
2015-10-25 18:40:09 -04:00
|
|
|
char*
|
|
|
|
otr_tag_message(const char *const msg)
|
2015-03-16 17:41:35 -04:00
|
|
|
{
|
|
|
|
GString *otr_message = g_string_new(msg);
|
|
|
|
g_string_append(otr_message, OTRL_MESSAGE_TAG_BASE);
|
|
|
|
g_string_append(otr_message, OTRL_MESSAGE_TAG_V2);
|
|
|
|
char *result = otr_message->str;
|
|
|
|
g_string_free(otr_message, FALSE);
|
|
|
|
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
2014-12-22 17:13:42 -05:00
|
|
|
gboolean
|
2015-10-25 18:40:09 -04:00
|
|
|
otr_is_secure(const char *const recipient)
|
2014-02-13 18:07:09 -05:00
|
|
|
{
|
|
|
|
ConnContext *context = otrlib_context_find(user_state, recipient, jid);
|
|
|
|
|
|
|
|
if (context == NULL) {
|
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (context->msgstate != OTRL_MSGSTATE_ENCRYPTED) {
|
|
|
|
return FALSE;
|
|
|
|
} else {
|
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-12-22 17:13:42 -05:00
|
|
|
gboolean
|
2015-10-25 18:40:09 -04:00
|
|
|
otr_is_trusted(const char *const recipient)
|
2014-02-13 18:07:09 -05:00
|
|
|
{
|
|
|
|
ConnContext *context = otrlib_context_find(user_state, recipient, jid);
|
|
|
|
|
|
|
|
if (context == NULL) {
|
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (context->msgstate != OTRL_MSGSTATE_ENCRYPTED) {
|
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
|
2014-04-28 17:23:39 -04:00
|
|
|
if (context->active_fingerprint) {
|
|
|
|
if (context->active_fingerprint->trust == NULL) {
|
|
|
|
return FALSE;
|
|
|
|
} else if (context->active_fingerprint->trust[0] == '\0') {
|
|
|
|
return FALSE;
|
|
|
|
} else {
|
|
|
|
return TRUE;
|
|
|
|
}
|
2014-02-13 18:07:09 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
2014-12-22 17:13:42 -05:00
|
|
|
void
|
2015-10-25 18:40:09 -04:00
|
|
|
otr_trust(const char *const recipient)
|
2014-02-13 18:07:09 -05:00
|
|
|
{
|
|
|
|
ConnContext *context = otrlib_context_find(user_state, recipient, jid);
|
|
|
|
|
|
|
|
if (context == NULL) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (context->msgstate != OTRL_MSGSTATE_ENCRYPTED) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (context->active_fingerprint) {
|
2015-05-04 17:52:48 -04:00
|
|
|
if (context->active_fingerprint->trust) {
|
2014-04-28 17:23:39 -04:00
|
|
|
free(context->active_fingerprint->trust);
|
|
|
|
}
|
2014-04-26 21:04:05 -04:00
|
|
|
context->active_fingerprint->trust = strdup("trusted");
|
2014-02-13 18:07:09 -05:00
|
|
|
cb_write_fingerprints(NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2014-12-22 17:13:42 -05:00
|
|
|
void
|
2015-10-25 18:40:09 -04:00
|
|
|
otr_untrust(const char *const recipient)
|
2014-02-13 18:07:09 -05:00
|
|
|
{
|
|
|
|
ConnContext *context = otrlib_context_find(user_state, recipient, jid);
|
|
|
|
|
|
|
|
if (context == NULL) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (context->msgstate != OTRL_MSGSTATE_ENCRYPTED) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (context->active_fingerprint) {
|
2015-05-04 17:52:48 -04:00
|
|
|
if (context->active_fingerprint->trust) {
|
2014-04-28 17:23:39 -04:00
|
|
|
free(context->active_fingerprint->trust);
|
|
|
|
}
|
2014-02-13 18:07:09 -05:00
|
|
|
context->active_fingerprint->trust = NULL;
|
|
|
|
cb_write_fingerprints(NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2014-12-22 17:13:42 -05:00
|
|
|
void
|
2015-10-25 18:40:09 -04:00
|
|
|
otr_smp_secret(const char *const recipient, const char *secret)
|
2014-04-26 17:08:53 -04:00
|
|
|
{
|
|
|
|
ConnContext *context = otrlib_context_find(user_state, recipient, jid);
|
|
|
|
|
|
|
|
if (context == NULL) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (context->msgstate != OTRL_MSGSTATE_ENCRYPTED) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2014-04-26 17:52:25 -04:00
|
|
|
// if recipient initiated SMP, send response, else initialise
|
2015-10-26 20:19:22 -04:00
|
|
|
ProfChatWin *chatwin = wins_get_chat(recipient);
|
2014-04-26 17:52:25 -04:00
|
|
|
if (g_hash_table_contains(smp_initiators, recipient)) {
|
|
|
|
otrl_message_respond_smp(user_state, &ops, NULL, context, (const unsigned char*)secret, strlen(secret));
|
2015-10-26 20:19:22 -04:00
|
|
|
if (chatwin) {
|
2015-10-27 18:25:02 -04:00
|
|
|
chatwin_otr_smp_event(chatwin, PROF_OTR_SMP_AUTH, NULL);
|
2015-10-26 20:19:22 -04:00
|
|
|
}
|
2014-04-26 19:32:04 -04:00
|
|
|
g_hash_table_remove(smp_initiators, context->username);
|
2014-04-26 17:52:25 -04:00
|
|
|
} else {
|
|
|
|
otrl_message_initiate_smp(user_state, &ops, NULL, context, (const unsigned char*)secret, strlen(secret));
|
2015-10-26 20:19:22 -04:00
|
|
|
if (chatwin) {
|
2015-10-27 18:25:02 -04:00
|
|
|
chatwin_otr_smp_event(chatwin, PROF_OTR_SMP_AUTH_WAIT, NULL);
|
2015-10-26 20:19:22 -04:00
|
|
|
}
|
2014-04-26 17:52:25 -04:00
|
|
|
}
|
2014-04-26 17:08:53 -04:00
|
|
|
}
|
|
|
|
|
2014-12-22 17:13:42 -05:00
|
|
|
void
|
2015-10-25 18:40:09 -04:00
|
|
|
otr_smp_question(const char *const recipient, const char *question, const char *answer)
|
2014-04-30 18:59:40 -04:00
|
|
|
{
|
|
|
|
ConnContext *context = otrlib_context_find(user_state, recipient, jid);
|
|
|
|
|
|
|
|
if (context == NULL) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (context->msgstate != OTRL_MSGSTATE_ENCRYPTED) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
otrl_message_initiate_smp_q(user_state, &ops, NULL, context, question, (const unsigned char*)answer, strlen(answer));
|
2015-10-26 20:19:22 -04:00
|
|
|
ProfChatWin *chatwin = wins_get_chat(recipient);
|
|
|
|
if (chatwin) {
|
2015-10-27 18:25:02 -04:00
|
|
|
chatwin_otr_smp_event(chatwin, PROF_OTR_SMP_AUTH_WAIT, NULL);
|
2015-10-26 20:19:22 -04:00
|
|
|
}
|
2014-04-30 18:59:40 -04:00
|
|
|
}
|
|
|
|
|
2014-12-22 17:13:42 -05:00
|
|
|
void
|
2015-10-25 18:40:09 -04:00
|
|
|
otr_smp_answer(const char *const recipient, const char *answer)
|
2014-04-30 18:59:40 -04:00
|
|
|
{
|
|
|
|
ConnContext *context = otrlib_context_find(user_state, recipient, jid);
|
|
|
|
|
|
|
|
if (context == NULL) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (context->msgstate != OTRL_MSGSTATE_ENCRYPTED) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
// if recipient initiated SMP, send response, else initialise
|
|
|
|
otrl_message_respond_smp(user_state, &ops, NULL, context, (const unsigned char*)answer, strlen(answer));
|
|
|
|
}
|
|
|
|
|
2014-12-22 17:13:42 -05:00
|
|
|
void
|
2015-10-25 18:40:09 -04:00
|
|
|
otr_end_session(const char *const recipient)
|
2014-02-13 18:07:09 -05:00
|
|
|
{
|
|
|
|
otrlib_end_session(user_state, recipient, jid, &ops);
|
|
|
|
}
|
|
|
|
|
2015-10-25 18:40:09 -04:00
|
|
|
char*
|
2014-12-22 17:13:42 -05:00
|
|
|
otr_get_my_fingerprint(void)
|
2014-02-13 18:07:09 -05:00
|
|
|
{
|
|
|
|
char fingerprint[45];
|
|
|
|
otrl_privkey_fingerprint(user_state, fingerprint, jid, "xmpp");
|
|
|
|
char *result = strdup(fingerprint);
|
|
|
|
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
2015-10-25 18:40:09 -04:00
|
|
|
char*
|
|
|
|
otr_get_their_fingerprint(const char *const recipient)
|
2014-02-13 18:07:09 -05:00
|
|
|
{
|
|
|
|
ConnContext *context = otrlib_context_find(user_state, recipient, jid);
|
|
|
|
|
2015-05-04 17:52:48 -04:00
|
|
|
if (context) {
|
2014-02-13 18:07:09 -05:00
|
|
|
Fingerprint *fingerprint = context->active_fingerprint;
|
|
|
|
char readable[45];
|
|
|
|
otrl_privkey_hash_to_human(readable, fingerprint->fingerprint);
|
|
|
|
return strdup(readable);
|
|
|
|
} else {
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-12-22 17:13:42 -05:00
|
|
|
prof_otrpolicy_t
|
2015-10-25 18:40:09 -04:00
|
|
|
otr_get_policy(const char *const recipient)
|
2014-05-11 10:03:10 -04:00
|
|
|
{
|
2016-05-05 19:53:03 -04:00
|
|
|
char *account_name = session_get_account_name();
|
2015-05-23 23:13:28 -04:00
|
|
|
ProfAccount *account = accounts_get_account(account_name);
|
2014-05-11 14:32:07 -04:00
|
|
|
// check contact specific setting
|
|
|
|
if (g_list_find_custom(account->otr_manual, recipient, (GCompareFunc)g_strcmp0)) {
|
|
|
|
account_free(account);
|
2014-06-17 19:32:36 -04:00
|
|
|
return PROF_OTRPOLICY_MANUAL;
|
2014-05-11 14:32:07 -04:00
|
|
|
}
|
|
|
|
if (g_list_find_custom(account->otr_opportunistic, recipient, (GCompareFunc)g_strcmp0)) {
|
|
|
|
account_free(account);
|
2014-06-17 19:32:36 -04:00
|
|
|
return PROF_OTRPOLICY_OPPORTUNISTIC;
|
2014-05-11 14:32:07 -04:00
|
|
|
}
|
|
|
|
if (g_list_find_custom(account->otr_always, recipient, (GCompareFunc)g_strcmp0)) {
|
|
|
|
account_free(account);
|
2014-06-17 19:32:36 -04:00
|
|
|
return PROF_OTRPOLICY_ALWAYS;
|
2014-05-11 14:32:07 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
// check default account setting
|
2015-05-04 17:52:48 -04:00
|
|
|
if (account->otr_policy) {
|
2019-07-23 02:03:39 -04:00
|
|
|
prof_otrpolicy_t result = PROF_OTRPOLICY_MANUAL;
|
2014-05-11 14:32:07 -04:00
|
|
|
if (g_strcmp0(account->otr_policy, "manual") == 0) {
|
2014-06-17 19:32:36 -04:00
|
|
|
result = PROF_OTRPOLICY_MANUAL;
|
2014-05-11 14:32:07 -04:00
|
|
|
}
|
|
|
|
if (g_strcmp0(account->otr_policy, "opportunistic") == 0) {
|
2014-06-17 19:32:36 -04:00
|
|
|
result = PROF_OTRPOLICY_OPPORTUNISTIC;
|
2014-05-11 14:32:07 -04:00
|
|
|
}
|
|
|
|
if (g_strcmp0(account->otr_policy, "always") == 0) {
|
2014-06-17 19:32:36 -04:00
|
|
|
result = PROF_OTRPOLICY_ALWAYS;
|
2014-05-11 14:32:07 -04:00
|
|
|
}
|
2014-05-11 10:20:24 -04:00
|
|
|
account_free(account);
|
2014-06-17 19:32:36 -04:00
|
|
|
return result;
|
2014-05-11 10:20:24 -04:00
|
|
|
}
|
|
|
|
account_free(account);
|
|
|
|
|
2014-05-11 10:03:10 -04:00
|
|
|
// check global setting
|
2014-06-17 19:32:36 -04:00
|
|
|
char *pref_otr_policy = prefs_get_string(PREF_OTR_POLICY);
|
|
|
|
|
|
|
|
// pref defaults to manual
|
|
|
|
prof_otrpolicy_t result = PROF_OTRPOLICY_MANUAL;
|
|
|
|
|
|
|
|
if (strcmp(pref_otr_policy, "opportunistic") == 0) {
|
|
|
|
result = PROF_OTRPOLICY_OPPORTUNISTIC;
|
|
|
|
} else if (strcmp(pref_otr_policy, "always") == 0) {
|
|
|
|
result = PROF_OTRPOLICY_ALWAYS;
|
|
|
|
}
|
|
|
|
|
|
|
|
prefs_free_string(pref_otr_policy);
|
|
|
|
|
|
|
|
return result;
|
2014-05-11 10:03:10 -04:00
|
|
|
}
|
|
|
|
|
2015-10-25 18:40:09 -04:00
|
|
|
char*
|
|
|
|
otr_encrypt_message(const char *const to, const char *const message)
|
2014-02-13 18:07:09 -05:00
|
|
|
{
|
|
|
|
char *newmessage = NULL;
|
|
|
|
gcry_error_t err = otrlib_encrypt_message(user_state, &ops, jid, to, message, &newmessage);
|
|
|
|
|
2014-04-30 17:01:37 -04:00
|
|
|
if (err != 0) {
|
2014-02-13 18:07:09 -05:00
|
|
|
return NULL;
|
|
|
|
} else {
|
|
|
|
return newmessage;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-08-20 17:23:31 -04:00
|
|
|
static void
|
|
|
|
_otr_tlv_free(OtrlTLV *tlvs)
|
|
|
|
{
|
|
|
|
if (tlvs) {
|
|
|
|
otrl_tlv_free(tlvs);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-10-25 18:40:09 -04:00
|
|
|
char*
|
|
|
|
otr_decrypt_message(const char *const from, const char *const message, gboolean *decrypted)
|
2014-02-13 18:07:09 -05:00
|
|
|
{
|
2015-08-26 19:37:48 -04:00
|
|
|
char *newmessage = NULL;
|
2014-02-13 18:07:09 -05:00
|
|
|
OtrlTLV *tlvs = NULL;
|
|
|
|
|
2015-08-26 19:37:48 -04:00
|
|
|
int result = otrlib_decrypt_message(user_state, &ops, jid, from, message, &newmessage, &tlvs);
|
2014-02-13 18:07:09 -05:00
|
|
|
|
|
|
|
// internal libotr message
|
|
|
|
if (result == 1) {
|
2014-04-26 17:08:53 -04:00
|
|
|
ConnContext *context = otrlib_context_find(user_state, from, jid);
|
|
|
|
|
|
|
|
// common tlv handling
|
2014-04-25 19:36:36 -04:00
|
|
|
OtrlTLV *tlv = otrl_tlv_find(tlvs, OTRL_TLV_DISCONNECTED);
|
2014-02-13 18:07:09 -05:00
|
|
|
if (tlv) {
|
2015-05-04 17:52:48 -04:00
|
|
|
if (context) {
|
2014-02-13 18:07:09 -05:00
|
|
|
otrl_context_force_plaintext(context);
|
2015-10-26 19:10:30 -04:00
|
|
|
ProfChatWin *chatwin = wins_get_chat(from);
|
|
|
|
if (chatwin) {
|
2015-10-27 17:23:56 -04:00
|
|
|
chatwin_otr_unsecured(chatwin);
|
2015-10-26 19:10:30 -04:00
|
|
|
}
|
2014-02-13 18:07:09 -05:00
|
|
|
}
|
|
|
|
}
|
2014-04-26 17:08:53 -04:00
|
|
|
|
|
|
|
// library version specific tlv handling
|
2014-04-26 17:52:25 -04:00
|
|
|
otrlib_handle_tlvs(user_state, &ops, context, tlvs, smp_initiators);
|
2015-08-20 17:23:31 -04:00
|
|
|
_otr_tlv_free(tlvs);
|
2014-04-26 17:08:53 -04:00
|
|
|
|
2014-02-13 18:07:09 -05:00
|
|
|
return NULL;
|
|
|
|
|
2015-08-26 19:37:48 -04:00
|
|
|
// message was processed, return to user
|
|
|
|
} else if (newmessage) {
|
2015-08-20 17:23:31 -04:00
|
|
|
_otr_tlv_free(tlvs);
|
2015-08-26 19:37:48 -04:00
|
|
|
if (g_str_has_prefix(message, "?OTR:")) {
|
|
|
|
*decrypted = TRUE;
|
|
|
|
}
|
|
|
|
return newmessage;
|
2014-02-13 18:07:09 -05:00
|
|
|
|
|
|
|
// normal non OTR message
|
|
|
|
} else {
|
2015-08-20 17:23:31 -04:00
|
|
|
_otr_tlv_free(tlvs);
|
2015-08-26 19:37:48 -04:00
|
|
|
*decrypted = FALSE;
|
2014-02-13 18:07:09 -05:00
|
|
|
return strdup(message);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-02-16 14:14:15 -05:00
|
|
|
void
|
2014-12-22 17:13:42 -05:00
|
|
|
otr_free_message(char *message)
|
2014-02-16 14:14:15 -05:00
|
|
|
{
|
2014-12-22 17:13:42 -05:00
|
|
|
otrl_message_free(message);
|
2015-05-23 19:56:13 -04:00
|
|
|
}
|