1
0
mirror of https://github.com/profanity-im/profanity.git synced 2024-06-23 21:45:30 +00:00
profanity/src/xmpp/connection.c

663 lines
17 KiB
C
Raw Normal View History

2016-05-05 22:51:49 +00:00
/*
* connection.c
*
2019-01-22 10:31:45 +00:00
* Copyright (C) 2012 - 2019 James Booth <boothj5@gmail.com>
2019-10-16 08:54:05 +00:00
* Copyright (C) 2018 - 2019 Michael Vetter <jubalh@idoru.org>
2016-05-05 22:51:49 +00:00
*
* This file is part of Profanity.
*
* Profanity is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* Profanity is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
2016-07-24 00:14:49 +00:00
* along with Profanity. If not, see <https://www.gnu.org/licenses/>.
2016-05-05 22:51:49 +00:00
*
* In addition, as a special exception, the copyright holders give permission to
* link the code of portions of this program with the OpenSSL library under
* certain conditions as described in each individual source file, and
* distribute linked combinations including the two.
*
* You must obey the GNU General Public License in all respects for all of the
* code used other than OpenSSL. If you modify file(s) with this exception, you
* may extend this exception to your version of the file(s), but you are not
* obligated to do so. If you do not wish to do so, delete this exception
* statement from your version. If you delete this exception statement from all
* source files in the program, then also delete it here.
*
*/
#include "config.h"
#include <stdlib.h>
#include <string.h>
2016-05-06 01:02:23 +00:00
#include <assert.h>
2016-05-05 22:51:49 +00:00
#include <glib.h>
#include <glib/gstdio.h>
2016-05-05 22:51:49 +00:00
#ifdef HAVE_LIBMESODE
#include <mesode.h>
#endif
2016-07-24 14:43:51 +00:00
2016-05-05 22:51:49 +00:00
#ifdef HAVE_LIBSTROPHE
#include <strophe.h>
#endif
#include "common.h"
2016-05-05 22:51:49 +00:00
#include "log.h"
#include "config/files.h"
2016-05-06 01:02:23 +00:00
#include "config/preferences.h"
2016-05-05 22:51:49 +00:00
#include "event/server_events.h"
#include "xmpp/connection.h"
#include "xmpp/session.h"
#include "xmpp/iq.h"
2016-05-05 22:51:49 +00:00
typedef struct prof_conn_t {
2016-05-06 01:31:55 +00:00
xmpp_log_t *xmpp_log;
xmpp_ctx_t *xmpp_ctx;
xmpp_conn_t *xmpp_conn;
gboolean xmpp_in_event_loop;
2016-05-05 22:51:49 +00:00
jabber_conn_status_t conn_status;
xmpp_conn_event_t conn_last_event;
2016-05-05 22:51:49 +00:00
char *presence_message;
int priority;
char *domain;
GHashTable *available_resources;
2016-05-08 02:04:36 +00:00
GHashTable *features_by_jid;
GHashTable *requested_features;
2016-05-05 22:51:49 +00:00
} ProfConnection;
static ProfConnection conn;
static gchar *random_bytes;
2016-05-05 22:51:49 +00:00
static xmpp_log_t* _xmpp_get_file_logger(void);
static void _xmpp_file_logger(void *const userdata, const xmpp_log_level_t level, const char *const area, const char *const msg);
2016-05-10 20:59:41 +00:00
2016-05-06 01:31:55 +00:00
static void _connection_handler(xmpp_conn_t *const xmpp_conn, const xmpp_conn_event_t status, const int error,
2016-05-05 22:51:49 +00:00
xmpp_stream_error_t *const stream_error, void *const userdata);
2016-05-10 21:09:09 +00:00
2016-05-05 22:51:49 +00:00
#ifdef HAVE_LIBMESODE
2016-05-10 21:09:09 +00:00
TLSCertificate* _xmppcert_to_profcert(xmpp_tlscert_t *xmpptlscert);
2016-05-05 22:51:49 +00:00
static int _connection_certfail_cb(xmpp_tlscert_t *xmpptlscert, const char *const errormsg);
#endif
static void _random_bytes_init();
static void _random_bytes_close();
void
connection_init(void)
2016-05-05 22:51:49 +00:00
{
2016-05-07 22:29:19 +00:00
xmpp_initialize();
2016-05-06 01:31:55 +00:00
conn.xmpp_conn = NULL;
conn.xmpp_ctx = NULL;
conn.xmpp_in_event_loop = FALSE;
2016-05-10 22:53:44 +00:00
conn.conn_status = JABBER_DISCONNECTED;
conn.conn_last_event = XMPP_CONN_DISCONNECT;
2016-05-10 22:53:44 +00:00
conn.presence_message = NULL;
2016-05-05 22:51:49 +00:00
conn.domain = NULL;
2016-05-08 02:14:22 +00:00
conn.features_by_jid = NULL;
conn.available_resources = g_hash_table_new_full(g_str_hash, g_str_equal, free, (GDestroyNotify)resource_destroy);
conn.requested_features = g_hash_table_new_full(g_str_hash, g_str_equal, free, NULL);
_random_bytes_init();
2016-05-05 22:51:49 +00:00
}
void
connection_check_events(void)
{
conn.xmpp_in_event_loop = TRUE;
xmpp_run_once(conn.xmpp_ctx, 10);
conn.xmpp_in_event_loop = FALSE;
}
2016-05-10 22:27:16 +00:00
void
connection_shutdown(void)
{
2016-05-10 22:53:44 +00:00
connection_clear_data();
2016-05-10 22:27:16 +00:00
xmpp_shutdown();
free(conn.xmpp_log);
conn.xmpp_log = NULL;
_random_bytes_close();
2016-05-10 22:27:16 +00:00
}
2016-05-05 22:51:49 +00:00
jabber_conn_status_t
connection_connect(const char *const jid, const char *const passwd, const char *const altdomain, int port,
2016-05-06 01:02:23 +00:00
const char *const tls_policy)
{
assert(jid != NULL);
2016-05-06 01:02:23 +00:00
assert(passwd != NULL);
Jid *jidp = jid_create(jid);
if (jidp == NULL) {
log_error("Malformed JID not able to connect: %s", jid);
2016-05-06 01:02:23 +00:00
conn.conn_status = JABBER_DISCONNECTED;
return conn.conn_status;
}
jid_destroy(jidp);
2016-05-06 01:02:23 +00:00
log_info("Connecting as %s", jid);
2016-05-06 01:02:23 +00:00
2016-05-06 01:31:55 +00:00
if (conn.xmpp_log) {
free(conn.xmpp_log);
2016-05-05 22:51:49 +00:00
}
2016-05-06 01:31:55 +00:00
conn.xmpp_log = _xmpp_get_file_logger();
2016-05-05 22:51:49 +00:00
2016-05-06 01:31:55 +00:00
if (conn.xmpp_conn) {
xmpp_conn_release(conn.xmpp_conn);
2016-05-05 22:51:49 +00:00
}
2016-05-06 01:31:55 +00:00
if (conn.xmpp_ctx) {
xmpp_ctx_free(conn.xmpp_ctx);
2016-05-05 22:51:49 +00:00
}
2016-05-06 01:31:55 +00:00
conn.xmpp_ctx = xmpp_ctx_new(NULL, conn.xmpp_log);
if (conn.xmpp_ctx == NULL) {
2016-05-05 22:51:49 +00:00
log_warning("Failed to get libstrophe ctx during connect");
return JABBER_DISCONNECTED;
}
2016-05-06 01:31:55 +00:00
conn.xmpp_conn = xmpp_conn_new(conn.xmpp_ctx);
if (conn.xmpp_conn == NULL) {
2016-05-05 22:51:49 +00:00
log_warning("Failed to get libstrophe conn during connect");
return JABBER_DISCONNECTED;
}
xmpp_conn_set_jid(conn.xmpp_conn, jid);
2016-05-06 01:31:55 +00:00
xmpp_conn_set_pass(conn.xmpp_conn, passwd);
2016-05-05 22:51:49 +00:00
if (!tls_policy || (g_strcmp0(tls_policy, "force") == 0)) {
2016-05-06 01:31:55 +00:00
xmpp_conn_set_flags(conn.xmpp_conn, XMPP_CONN_FLAG_MANDATORY_TLS);
} else if (g_strcmp0(tls_policy, "trust") == 0) {
xmpp_conn_set_flags(conn.xmpp_conn, XMPP_CONN_FLAG_MANDATORY_TLS);
xmpp_conn_set_flags(conn.xmpp_conn, XMPP_CONN_FLAG_TRUST_TLS);
2016-05-05 22:51:49 +00:00
} else if (g_strcmp0(tls_policy, "disable") == 0) {
2016-05-06 01:31:55 +00:00
xmpp_conn_set_flags(conn.xmpp_conn, XMPP_CONN_FLAG_DISABLE_TLS);
} else if (g_strcmp0(tls_policy, "legacy") == 0) {
xmpp_conn_set_flags(conn.xmpp_conn, XMPP_CONN_FLAG_LEGACY_SSL);
2016-05-05 22:51:49 +00:00
}
#ifdef HAVE_LIBMESODE
2016-10-17 22:48:03 +00:00
char *cert_path = prefs_get_tls_certpath();
2016-05-05 22:51:49 +00:00
if (cert_path) {
2016-05-06 01:31:55 +00:00
xmpp_conn_tlscert_path(conn.xmpp_conn, cert_path);
2016-10-17 22:48:03 +00:00
free(cert_path);
2016-05-05 22:51:49 +00:00
}
int connect_status = xmpp_connect_client(
2016-05-06 01:31:55 +00:00
conn.xmpp_conn,
2016-05-05 22:51:49 +00:00
altdomain,
port,
_connection_certfail_cb,
_connection_handler,
2016-05-06 01:31:55 +00:00
conn.xmpp_ctx);
2016-05-05 22:51:49 +00:00
#else
int connect_status = xmpp_connect_client(
2016-05-06 01:31:55 +00:00
conn.xmpp_conn,
2016-05-05 22:51:49 +00:00
altdomain,
port,
_connection_handler,
2016-05-06 01:31:55 +00:00
conn.xmpp_ctx);
2016-05-05 22:51:49 +00:00
#endif
if (connect_status == 0) {
conn.conn_status = JABBER_CONNECTING;
} else {
conn.conn_status = JABBER_DISCONNECTED;
}
return conn.conn_status;
}
void
connection_disconnect(void)
{
// don't disconnect already disconnected connection,
// or we get infinite loop otherwise
if (conn.conn_last_event == XMPP_CONN_CONNECT) {
conn.conn_status = JABBER_DISCONNECTING;
xmpp_disconnect(conn.xmpp_conn);
while (conn.conn_status == JABBER_DISCONNECTING) {
session_process_events();
}
} else {
conn.conn_status = JABBER_DISCONNECTED;
}
// can't free libstrophe objects while we're in the event loop
if (!conn.xmpp_in_event_loop) {
if (conn.xmpp_conn) {
xmpp_conn_release(conn.xmpp_conn);
conn.xmpp_conn = NULL;
}
if (conn.xmpp_ctx) {
xmpp_ctx_free(conn.xmpp_ctx);
conn.xmpp_ctx = NULL;
}
}
}
2016-05-10 23:02:39 +00:00
void
connection_set_disconnected(void)
{
FREE_SET_NULL(conn.presence_message);
FREE_SET_NULL(conn.domain);
conn.conn_status = JABBER_DISCONNECTED;
}
2016-05-10 22:53:44 +00:00
void
connection_clear_data(void)
{
if (conn.features_by_jid) {
g_hash_table_destroy(conn.features_by_jid);
conn.features_by_jid = NULL;
}
2016-05-10 22:53:44 +00:00
if (conn.available_resources) {
g_hash_table_remove_all(conn.available_resources);
}
if (conn.requested_features) {
g_hash_table_remove_all(conn.requested_features);
}
2016-05-10 22:53:44 +00:00
}
2016-05-10 20:59:41 +00:00
#ifdef HAVE_LIBMESODE
TLSCertificate*
connection_get_tls_peer_cert(void)
{
xmpp_tlscert_t *xmpptlscert = xmpp_conn_tls_peer_cert(conn.xmpp_conn);
TLSCertificate *cert = _xmppcert_to_profcert(xmpptlscert);
xmpp_conn_free_tlscert(conn.xmpp_ctx, xmpptlscert);
return cert;
}
#endif
gboolean
connection_is_secured(void)
{
if (conn.conn_status == JABBER_CONNECTED) {
return xmpp_conn_is_secured(conn.xmpp_conn) == 0 ? FALSE : TRUE;
} else {
return FALSE;
}
}
gboolean
connection_send_stanza(const char *const stanza)
{
if (conn.conn_status != JABBER_CONNECTED) {
return FALSE;
} else {
xmpp_send_raw_string(conn.xmpp_conn, "%s", stanza);
return TRUE;
}
}
gboolean
connection_supports(const char *const feature)
{
2019-07-10 10:27:28 +00:00
gboolean ret = FALSE;
2016-05-10 20:59:41 +00:00
GList *jids = g_hash_table_get_keys(conn.features_by_jid);
GList *curr = jids;
while (curr) {
char *jid = curr->data;
GHashTable *features = g_hash_table_lookup(conn.features_by_jid, jid);
if (features && g_hash_table_lookup(features, feature)) {
2019-07-10 10:27:28 +00:00
ret = TRUE;
break;
2016-05-10 20:59:41 +00:00
}
curr = g_list_next(curr);
}
g_list_free(jids);
2019-07-10 10:27:28 +00:00
return ret;
2016-05-10 20:59:41 +00:00
}
char*
connection_jid_for_feature(const char *const feature)
{
if (conn.features_by_jid == NULL) {
return NULL;
}
2016-05-10 20:59:41 +00:00
GList *jids = g_hash_table_get_keys(conn.features_by_jid);
GList *curr = jids;
while (curr) {
char *jid = curr->data;
GHashTable *features = g_hash_table_lookup(conn.features_by_jid, jid);
if (features && g_hash_table_lookup(features, feature)) {
g_list_free(jids);
2016-05-10 20:59:41 +00:00
return jid;
}
curr = g_list_next(curr);
}
g_list_free(jids);
return NULL;
}
void
connection_request_features(void)
{
/* We don't record it as a requested feature to avoid triggering th
* sv_ev_connection_features_received too soon */
iq_disco_info_request_onconnect(conn.domain);
}
2016-05-10 20:59:41 +00:00
void
connection_set_disco_items(GSList *items)
{
GSList *curr = items;
while (curr) {
DiscoItem *item = curr->data;
g_hash_table_insert(conn.requested_features, strdup(item->jid), NULL);
2016-05-10 20:59:41 +00:00
g_hash_table_insert(conn.features_by_jid, strdup(item->jid),
g_hash_table_new_full(g_str_hash, g_str_equal, free, NULL));
iq_disco_info_request_onconnect(item->jid);
curr = g_slist_next(curr);
}
}
2016-05-05 22:51:49 +00:00
jabber_conn_status_t
connection_get_status(void)
{
return conn.conn_status;
}
xmpp_conn_t*
connection_get_conn(void)
{
2016-05-06 01:31:55 +00:00
return conn.xmpp_conn;
2016-05-05 22:51:49 +00:00
}
xmpp_ctx_t*
connection_get_ctx(void)
{
2016-05-06 01:31:55 +00:00
return conn.xmpp_ctx;
2016-05-05 22:51:49 +00:00
}
2016-05-06 00:12:54 +00:00
const char*
connection_get_fulljid(void)
{
const char *jid = xmpp_conn_get_bound_jid(conn.xmpp_conn);
if (jid) {
return jid;
} else {
return xmpp_conn_get_jid(conn.xmpp_conn);
}
2016-05-06 00:12:54 +00:00
}
void
connection_features_received(const char *const jid)
{
if (g_hash_table_remove(conn.requested_features, jid) && g_hash_table_size(conn.requested_features) == 0) {
sv_ev_connection_features_received();
}
}
2016-05-08 02:04:36 +00:00
GHashTable*
connection_get_features(const char *const jid)
2016-05-08 01:25:34 +00:00
{
2016-05-08 02:04:36 +00:00
return g_hash_table_lookup(conn.features_by_jid, jid);
2016-05-08 01:25:34 +00:00
}
GList*
connection_get_available_resources(void)
{
return g_hash_table_get_values(conn.available_resources);
}
void
connection_add_available_resource(Resource *resource)
{
g_hash_table_replace(conn.available_resources, strdup(resource->name), resource);
}
void
connection_remove_available_resource(const char *const resource)
{
g_hash_table_remove(conn.available_resources, resource);
}
2016-05-06 00:16:13 +00:00
char*
connection_create_uuid(void)
{
2016-05-06 01:31:55 +00:00
return xmpp_uuid_gen(conn.xmpp_ctx);
2016-05-06 00:16:13 +00:00
}
void
connection_free_uuid(char *uuid)
{
if (uuid) {
2016-05-06 01:31:55 +00:00
xmpp_free(conn.xmpp_ctx, uuid);
2016-05-06 00:16:13 +00:00
}
}
char*
connection_create_stanza_id(char *prefix)
{
char *result = NULL;
GString *result_str = g_string_new("");
char *uuid = connection_create_uuid();
if (prefix) {
g_string_printf(result_str, "prof_%s_%s", prefix, uuid);
} else {
g_string_printf(result_str, "prof_%s", uuid);
}
connection_free_uuid(uuid);
result = result_str->str;
g_string_free(result_str, FALSE);
return result;
}
2016-05-08 20:47:52 +00:00
char*
2016-05-05 22:51:49 +00:00
connection_get_domain(void)
{
return conn.domain;
}
2016-05-08 20:47:52 +00:00
char*
2016-05-05 22:51:49 +00:00
connection_get_presence_msg(void)
{
return conn.presence_message;
}
void
connection_set_presence_msg(const char *const message)
{
FREE_SET_NULL(conn.presence_message);
if (message) {
conn.presence_message = strdup(message);
}
}
void
connection_set_priority(const int priority)
{
conn.priority = priority;
}
static void
2016-05-06 01:31:55 +00:00
_connection_handler(xmpp_conn_t *const xmpp_conn, const xmpp_conn_event_t status, const int error,
2016-05-05 22:51:49 +00:00
xmpp_stream_error_t *const stream_error, void *const userdata)
{
conn.conn_last_event = status;
2016-05-10 21:09:09 +00:00
switch (status) {
2016-05-05 22:51:49 +00:00
// login success
2016-05-10 21:09:09 +00:00
case XMPP_CONN_CONNECT:
2016-05-05 22:51:49 +00:00
log_debug("Connection handler: XMPP_CONN_CONNECT");
2016-05-06 01:31:55 +00:00
conn.conn_status = JABBER_CONNECTED;
2016-05-05 22:51:49 +00:00
Jid *my_jid = jid_create(xmpp_conn_get_jid(conn.xmpp_conn));
conn.domain = strdup(my_jid->domainpart);
jid_destroy(my_jid);
2016-05-08 02:14:22 +00:00
conn.features_by_jid = g_hash_table_new_full(g_str_hash, g_str_equal, free, (GDestroyNotify)g_hash_table_destroy);
2016-05-08 02:04:36 +00:00
g_hash_table_insert(conn.features_by_jid, strdup(conn.domain), g_hash_table_new_full(g_str_hash, g_str_equal, free, NULL));
2016-05-05 23:53:03 +00:00
session_login_success(connection_is_secured());
2016-05-05 22:51:49 +00:00
2016-05-10 21:09:09 +00:00
break;
// disconnected
case XMPP_CONN_DISCONNECT:
2016-05-05 22:51:49 +00:00
log_debug("Connection handler: XMPP_CONN_DISCONNECT");
// lost connection for unknown reason
2016-05-06 01:31:55 +00:00
if (conn.conn_status == JABBER_CONNECTED) {
2016-05-05 22:51:49 +00:00
log_debug("Connection handler: Lost connection for unknown reason");
2016-05-05 23:53:03 +00:00
session_lost_connection();
2016-05-05 22:51:49 +00:00
// login attempt failed
2016-05-06 01:31:55 +00:00
} else if (conn.conn_status != JABBER_DISCONNECTING) {
2016-05-05 22:51:49 +00:00
log_debug("Connection handler: Login failed");
2016-05-05 23:53:03 +00:00
session_login_failed();
2016-05-05 22:51:49 +00:00
}
2016-05-10 21:09:09 +00:00
// close stream response from server after disconnect is handled
2016-05-06 01:31:55 +00:00
conn.conn_status = JABBER_DISCONNECTED;
2016-05-10 21:09:09 +00:00
break;
// connection failed
case XMPP_CONN_FAIL:
2016-05-05 22:51:49 +00:00
log_debug("Connection handler: XMPP_CONN_FAIL");
2016-05-10 21:09:09 +00:00
break;
// unknown state
default:
2016-05-05 22:51:49 +00:00
log_error("Connection handler: Unknown status");
2016-05-10 21:09:09 +00:00
break;
2016-05-05 22:51:49 +00:00
}
}
#ifdef HAVE_LIBMESODE
static int
_connection_certfail_cb(xmpp_tlscert_t *xmpptlscert, const char *const errormsg)
{
2016-05-10 20:59:41 +00:00
TLSCertificate *cert = _xmppcert_to_profcert(xmpptlscert);
2016-05-05 22:51:49 +00:00
int res = sv_ev_certfail(errormsg, cert);
tlscerts_free(cert);
return res;
}
2016-05-10 21:09:09 +00:00
TLSCertificate*
_xmppcert_to_profcert(xmpp_tlscert_t *xmpptlscert)
{
return tlscerts_new(
xmpp_conn_tlscert_fingerprint(xmpptlscert),
xmpp_conn_tlscert_version(xmpptlscert),
xmpp_conn_tlscert_serialnumber(xmpptlscert),
xmpp_conn_tlscert_subjectname(xmpptlscert),
xmpp_conn_tlscert_issuername(xmpptlscert),
xmpp_conn_tlscert_notbefore(xmpptlscert),
xmpp_conn_tlscert_notafter(xmpptlscert),
xmpp_conn_tlscert_key_algorithm(xmpptlscert),
xmpp_conn_tlscert_signature_algorithm(xmpptlscert));
}
2016-05-05 22:51:49 +00:00
#endif
static xmpp_log_t*
_xmpp_get_file_logger(void)
{
2016-05-10 20:59:41 +00:00
log_level_t prof_level = log_get_filter();
xmpp_log_level_t xmpp_level = XMPP_LEVEL_ERROR;
2016-05-05 22:51:49 +00:00
2016-05-10 20:59:41 +00:00
switch (prof_level) {
case PROF_LEVEL_DEBUG: xmpp_level = XMPP_LEVEL_DEBUG; break;
case PROF_LEVEL_INFO: xmpp_level = XMPP_LEVEL_INFO; break;
case PROF_LEVEL_WARN: xmpp_level = XMPP_LEVEL_WARN; break;
default: xmpp_level = XMPP_LEVEL_ERROR; break;
}
xmpp_log_t *file_log = malloc(sizeof(xmpp_log_t));
2016-05-05 22:51:49 +00:00
file_log->handler = _xmpp_file_logger;
2016-05-10 20:59:41 +00:00
file_log->userdata = &xmpp_level;
2016-05-05 22:51:49 +00:00
return file_log;
}
2016-05-10 20:59:41 +00:00
static void
_xmpp_file_logger(void *const userdata, const xmpp_log_level_t xmpp_level, const char *const area, const char *const msg)
2016-05-05 22:51:49 +00:00
{
2016-05-10 20:59:41 +00:00
log_level_t prof_level = PROF_LEVEL_ERROR;
2016-05-05 22:51:49 +00:00
2016-05-10 20:59:41 +00:00
switch (xmpp_level) {
case XMPP_LEVEL_DEBUG: prof_level = PROF_LEVEL_DEBUG; break;
case XMPP_LEVEL_INFO: prof_level = PROF_LEVEL_INFO; break;
case XMPP_LEVEL_WARN: prof_level = PROF_LEVEL_WARN; break;
default: prof_level = PROF_LEVEL_ERROR; break;
2016-05-05 22:51:49 +00:00
}
log_msg(prof_level, area, msg);
2016-05-10 20:59:41 +00:00
2016-05-05 22:51:49 +00:00
if ((g_strcmp0(area, "xmpp") == 0) || (g_strcmp0(area, "conn")) == 0) {
sv_ev_xmpp_stanza(msg);
}
}
static void _random_bytes_init()
{
char *rndbytes_loc;
GKeyFile *rndbytes;
2019-10-16 08:54:05 +00:00
rndbytes_loc = files_get_data_path(FILE_PROFANITY_IDENTIFIER);
if (g_file_test(rndbytes_loc, G_FILE_TEST_EXISTS)) {
g_chmod(rndbytes_loc, S_IRUSR | S_IWUSR);
}
rndbytes = g_key_file_new();
g_key_file_load_from_file(rndbytes, rndbytes_loc, G_KEY_FILE_KEEP_COMMENTS, NULL);
if (g_key_file_has_group(rndbytes, "identifier")) {
random_bytes = g_key_file_get_string(rndbytes, "identifier", "random_bytes", NULL);
} else {
random_bytes = get_random_string(10);
g_key_file_set_string(rndbytes, "identifier", "random_bytes", random_bytes);
gsize g_data_size;
gchar *g_accounts_data = g_key_file_to_data(rndbytes, &g_data_size, NULL);
gchar *base = g_path_get_basename(rndbytes_loc);
gchar *true_loc = get_file_or_linked(rndbytes_loc, base);
g_file_set_contents(true_loc, g_accounts_data, g_data_size, NULL);
g_free(base);
free(true_loc);
g_free(g_accounts_data);
}
free(rndbytes_loc);
g_key_file_free(rndbytes);
}
static void _random_bytes_close()
{
g_free(random_bytes);
}