diff mcabber/src/otr.c @ 1299:3b338a5c01fc

OTR support
author Frank Zschockelt <mcabber_otr[at]freakysoft.de>
date Thu, 30 Aug 2007 00:52:51 +0200
parents
children 37b41ed9ed35
line wrap: on
line diff
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/mcabber/src/otr.c	Thu Aug 30 00:52:51 2007 +0200
@@ -0,0 +1,676 @@
+/*
+ * otr.c      -- Off-The-Record Messaging for mcabber
+ *
+ * Copyright (C) 2007 Frank Zschockelt <mcabber_otr@freakysoft.de>
+ *
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation; either version 2 of the License, or (at
+ * your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful, but
+ * WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
+ * General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program; if not, write to the Free Software
+ * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
+ * USA
+ */
+
+#include <config.h>
+
+#ifdef HAVE_LIBOTR
+
+#include "otr.h"
+#include "logprint.h"
+#include "hbuf.h"
+#include "jab_priv.h"
+#include "roster.h"
+#include "utils.h"
+
+
+static OtrlUserState userstate = NULL;
+static char * account = NULL;
+static char * keyfile = NULL;
+static char * fprfile = NULL;
+static enum otr_policy policy = manual;
+
+
+static OtrlPolicy cb_policy             (void *opdata, ConnContext *ctx);
+static void       cb_create_privkey     (void *opdata,
+                                         const char *accountname,
+                                         const char *protocol);
+static int        cb_is_logged_in       (void *opdata,
+                                         const char *accountname,
+                                         const char *protocol,
+                                         const char *recipient);
+static void       cb_inject_message     (void *opdata,
+                                         const char *accountname,
+                                         const char *protocol,
+                                         const char *recipient,
+                                         const char *message);
+static void       cb_notify             (void *opdata,
+                                         OtrlNotifyLevel level,
+                                         const char *accountname,
+                                         const char *protocol,
+                                         const char *username,
+                                         const char *title,
+                                         const char *primary,
+                                         const char *secondary);
+static int        cb_display_otr_message(void *opdata,
+                                         const char *accountname,
+                                         const char *protocol,
+                                         const char *username,
+                                         const char *msg);
+static void       cb_update_context_list(void *opdata);
+static const char *cb_protocol_name     (void *opdata, const char *protocol);
+static void       cb_protocol_name_free (void *opdata,
+                                         const char *protocol_name);
+static void       cb_new_fingerprint    (void *opdata, OtrlUserState us,
+                                         const char *accountname,
+                                         const char *protocol,
+                                         const char *username,
+                                         unsigned char fingerprint[20]);
+static void       cb_write_fingerprints (void *opdata);
+static void       cb_gone_secure        (void *opdata, ConnContext *context);
+static void       cb_gone_insecure      (void *opdata, ConnContext *context);
+static void       cb_still_secure       (void *opdata, ConnContext *context,
+                                         int is_reply);
+static void       cb_log_message        (void *opdata, const char *message);
+static int        cb_max_message_size   (void *opdata, ConnContext *context);
+
+static OtrlMessageAppOps ops =
+{
+  policy:                 cb_policy,
+  create_privkey:         cb_create_privkey,
+  is_logged_in:           cb_is_logged_in,
+  inject_message:         cb_inject_message,
+  notify:                 cb_notify,
+  display_otr_message:    cb_display_otr_message,
+  update_context_list:    cb_update_context_list,
+  protocol_name:          cb_protocol_name,
+  protocol_name_free:     cb_protocol_name_free,
+  new_fingerprint:        cb_new_fingerprint,
+  write_fingerprints:     cb_write_fingerprints,
+  gone_secure:            cb_gone_secure,
+  gone_insecure:          cb_gone_insecure,
+  still_secure:           cb_still_secure,
+  log_message:            cb_log_message,
+  max_message_size:       cb_max_message_size
+};
+
+static void otr_message_disconnect(ConnContext *ctx);
+static ConnContext * otr_get_context(const char *buddy);
+static void otr_startstop(const char * buddy, int start);
+static void otr_handle_smp_tlvs(OtrlTLV * tlvs, ConnContext * ctx);
+
+
+int otr_init(const char *jid)
+{
+  char * root = expand_filename("~/.mcabber/otr/");
+  account = jidtodisp(jid);
+  keyfile = g_strdup_printf("%s%s.key", root, account);
+  fprfile = g_strdup_printf("%s%s.fpr", root, account);
+  g_free(root);
+
+  OTRL_INIT;
+
+  userstate = otrl_userstate_create ();
+  if (otrl_privkey_read(userstate, keyfile)){
+    scr_LogPrint(LPRINT_LOGNORM, "Could not read OTR key from %s", keyfile);
+    cb_create_privkey(NULL, account, "jabber");
+  }
+  if (otrl_privkey_read_fingerprints(userstate, fprfile, NULL, NULL)){
+    scr_LogPrint(LPRINT_LOGNORM, "Could not read OTR fingerprints from %s",
+                 fprfile);
+  }
+}
+
+void otr_terminate(void)
+{
+  ConnContext * ctx;
+
+  for(ctx = userstate->context_root; ctx; ctx = ctx->next)
+    if (ctx->msgstate == OTRL_MSGSTATE_ENCRYPTED)
+      otr_message_disconnect(ctx);
+
+  g_free(account);
+  account = NULL;
+  otrl_userstate_free(userstate);
+  userstate = NULL;
+  g_free(keyfile);
+  keyfile = NULL;
+}
+
+static ConnContext * otr_get_context(const char *buddy)
+{
+  int null = 0;
+  return otrl_context_find(userstate, buddy, account, "jabber", 1, &null,
+                           NULL, NULL);
+}
+
+static void otr_message_disconnect(ConnContext *ctx)
+{
+  if (ctx->msgstate == OTRL_MSGSTATE_ENCRYPTED)
+    cb_gone_insecure(NULL, ctx);
+  otrl_message_disconnect(userstate, &ops, NULL, ctx->accountname,
+                          ctx->protocol, ctx->username);
+}
+
+static void otr_startstop(const char * buddy, int start)
+{
+  char * msg = NULL;
+  ConnContext *ctx = otr_get_context(buddy);
+
+  if (!userstate || !ctx)
+    return;
+
+  if (start && ctx->msgstate == OTRL_MSGSTATE_ENCRYPTED)
+    otr_message_disconnect(ctx);
+
+  if (start) {
+    OtrlPolicy policy = cb_policy(NULL, ctx);
+    msg = otrl_proto_default_query_msg(ctx->accountname, policy);
+    cb_inject_message(NULL, ctx->accountname, ctx->protocol, ctx->username,
+                      msg);
+    free (msg);
+  }
+  else
+    otr_message_disconnect(ctx);
+}
+
+void otr_establish(const char *buddy)
+{
+  otr_startstop(buddy, 1);
+}
+
+void otr_disconnect(const char * buddy)
+{
+  otr_startstop(buddy, 0);
+}
+
+void otr_fingerprint(const char * buddy, const char * trust)
+{
+  char fpr[45], *tr;
+  ConnContext *ctx = otr_get_context(buddy);
+  if (!userstate || !ctx)
+    return;
+
+  if (!ctx->active_fingerprint || !ctx->active_fingerprint->fingerprint) {
+    scr_LogPrint(LPRINT_LOGNORM,
+                 "No active fingerprint - start OTR for this buddy first.");
+    return;
+  }
+
+  otrl_privkey_hash_to_human(fpr, ctx->active_fingerprint->fingerprint);
+  if (trust) {
+    if (strcmp(fpr, trust) == 0)
+      otrl_context_set_trust(ctx->active_fingerprint, "trust");
+    else
+      otrl_context_set_trust(ctx->active_fingerprint, NULL);
+  }
+
+  tr = ctx->active_fingerprint->trust;
+  scr_LogPrint(LPRINT_LOGNORM, "%s [%44s]: %s", ctx->username, fpr,
+               tr && *tr ?  "trusted" : "untrusted");
+  cb_write_fingerprints(NULL);
+}
+
+static void otr_handle_smp_tlvs(OtrlTLV * tlvs, ConnContext * ctx)
+{
+  OtrlTLV *tlv = NULL;
+  char *sbuf = NULL;
+  NextExpectedSMP nextMsg = ctx->smstate->nextExpected;
+
+  tlv = otrl_tlv_find(tlvs, OTRL_TLV_SMP1);
+  if (tlv) {
+    if (nextMsg != OTRL_SMP_EXPECT1)
+      otr_smp_abort(ctx->username);
+    else {
+      sbuf = g_strdup_printf("OTR: Received SMP Initiation. "
+                             "Answer with /otr smpr %s $secret",
+                             ctx->username);
+    }
+  }
+  tlv = otrl_tlv_find(tlvs, OTRL_TLV_SMP2);
+  if (tlv) {
+    if (nextMsg != OTRL_SMP_EXPECT2)
+      otr_smp_abort(ctx->username);
+    else {
+      sbuf = g_strdup("OTR: Received SMP Response.");
+      /* If we received TLV2, we will send TLV3 and expect TLV4 */
+      ctx->smstate->nextExpected = OTRL_SMP_EXPECT4;
+    }
+  }
+  tlv = otrl_tlv_find(tlvs, OTRL_TLV_SMP3);
+  if (tlv) {
+    if (nextMsg != OTRL_SMP_EXPECT3)
+      otr_smp_abort(ctx->username);
+    else {
+      /* If we received TLV3, we will send TLV4
+       * We will not expect more messages, so prepare for next SMP */
+      ctx->smstate->nextExpected = OTRL_SMP_EXPECT1;
+      /* Report result to user */
+      if (ctx->active_fingerprint && ctx->active_fingerprint->trust &&
+         *ctx->active_fingerprint->trust != '\0')
+        sbuf = g_strdup("OTR: SMP succeeded");
+      else
+        sbuf = g_strdup("OTR: SMP failed");
+    }
+  }
+  tlv = otrl_tlv_find(tlvs, OTRL_TLV_SMP4);
+  if (tlv) {
+    if (nextMsg != OTRL_SMP_EXPECT4)
+      otr_smp_abort(ctx->username);
+    else {
+      /* We will not expect more messages, so prepare for next SMP */
+      ctx->smstate->nextExpected = OTRL_SMP_EXPECT1;
+      /* Report result to user */
+      if (ctx->active_fingerprint && ctx->active_fingerprint->trust &&
+         *ctx->active_fingerprint->trust != '\0')
+        sbuf = g_strdup("OTR: SMP succeeded");
+      else
+        sbuf = g_strdup("OTR: SMP failed");
+    }
+  }
+  tlv = otrl_tlv_find(tlvs, OTRL_TLV_SMP_ABORT);
+  if (tlv) {
+    /* The message we are waiting for will not arrive, so reset
+     * and prepare for the next SMP */
+    sbuf = g_strdup("OTR: SMP aborted by your buddy");
+    ctx->smstate->nextExpected = OTRL_SMP_EXPECT1;
+  }
+
+  if (sbuf) {
+    scr_WriteIncomingMessage(ctx->username, sbuf, 0, HBB_PREFIX_INFO);
+    g_free(sbuf);
+  }
+}
+
+/*
+ * returns whether a otr_message was received
+ * sets *otr_data to NULL, when it was an internal otr message
+ */
+int otr_receive(char **otr_data, const char * buddy, int * free_msg)
+{
+  int ignore_message;
+  char *newmessage = NULL;
+  OtrlTLV *tlvs = NULL;
+  OtrlTLV *tlv = NULL;
+  ConnContext * ctx;
+
+  *free_msg = 0;
+  ignore_message = otrl_message_receiving(userstate, &ops, NULL, account,
+    "jabber", buddy, *otr_data, &newmessage, &tlvs, NULL, NULL);
+
+  ctx = otr_get_context(buddy);
+
+  tlv = otrl_tlv_find(tlvs, OTRL_TLV_DISCONNECTED);
+  if (tlv) {
+    /* Notify the user that the other side disconnected. */
+    if (ctx) {
+      cb_gone_insecure(NULL, ctx);
+      otr_disconnect(buddy);
+    }
+  }
+
+  otr_handle_smp_tlvs(tlvs, ctx);
+
+  if (tlvs != NULL)
+    otrl_tlv_free(tlvs);
+
+  if (ignore_message)
+    *otr_data = NULL;
+
+  if (!ignore_message && newmessage) {
+    *free_msg = 1;
+    *otr_data = g_strdup(newmessage);
+    otrl_message_free(newmessage);
+    if (ctx->msgstate == OTRL_MSGSTATE_ENCRYPTED)
+      return 1;
+  }
+  return 0;
+}
+
+int otr_send(char **msg, const char *buddy)
+{
+  gcry_error_t err;
+  char *newmessage = NULL;
+  ConnContext * ctx = otr_get_context(buddy);
+
+  err = otrl_message_sending(userstate, &ops, NULL, account, "jabber", buddy,
+    *msg, NULL, &newmessage, NULL, NULL);
+
+  if (err)
+    *msg = NULL; /*something went wrong, don't send the plain-message! */
+
+  if (!err && newmessage) {
+    *msg = g_strdup(newmessage);
+    otrl_message_free(newmessage);
+    if (cb_policy(NULL, ctx) & OTRL_POLICY_REQUIRE_ENCRYPTION ||
+        ctx->msgstate == OTRL_MSGSTATE_ENCRYPTED)
+      return 1;
+  }
+  return 0;
+}
+
+/* Prints OTR connection state */
+void otr_print_info(const char * buddy)
+{
+  const char *state, *auth, *policy;
+  ConnContext * ctx = otr_get_context(buddy);
+  OtrlPolicy p = cb_policy (ctx->app_data, ctx);
+
+  if (!userstate || !ctx)
+    return;
+
+  switch (ctx->msgstate) {
+    case OTRL_MSGSTATE_PLAINTEXT: state = "plaintext"; break;
+    case OTRL_MSGSTATE_ENCRYPTED:
+     switch (ctx->protocol_version) {
+       case 1: state = "encrypted V1"; break;
+       case 2: state = "encrypted V2"; break;
+       default:state = "encrypted";
+     };
+     break;
+    case OTRL_MSGSTATE_FINISHED:  state = "finished";  break;
+    default:                      state = "unknown state";
+  }
+  switch (ctx->auth.authstate) {
+    case OTRL_AUTHSTATE_NONE:
+      switch (ctx->otr_offer) {
+        case OFFER_NOT:      auth = "no offer sent";  break;
+        case OFFER_SENT:     auth = "offer sent";     break;
+        case OFFER_ACCEPTED: auth = "offer accepted"; break;
+        case OFFER_REJECTED: auth = "offer rejected"; break;
+        default:             auth = "unknown auth";
+      }
+      break;
+    case OTRL_AUTHSTATE_AWAITING_DHKEY:
+      auth = "awaiting D-H key";          break;
+    case OTRL_AUTHSTATE_AWAITING_REVEALSIG:
+      auth = "awaiting reveal signature"; break;
+    case OTRL_AUTHSTATE_AWAITING_SIG:
+      auth = "awaiting signature";        break;
+    case OTRL_AUTHSTATE_V1_SETUP:
+      auth = "v1 setup";                  break;
+    default:
+      auth = "unknown auth";
+  }
+  if (p == OTRL_POLICY_NEVER)
+    policy = "plain";
+  else if (p == OTRL_POLICY_OPPORTUNISTIC & ~OTRL_POLICY_ALLOW_V1)
+    policy = "opportunistic";
+  else if (p == OTRL_POLICY_MANUAL & ~OTRL_POLICY_ALLOW_V1)
+    policy = "manual";
+  else if (p == (OTRL_POLICY_ALWAYS & ~OTRL_POLICY_ALLOW_V1))
+    policy = "always";
+  else
+    policy = "unknown";
+
+  scr_LogPrint(LPRINT_LOGNORM, "%s: %s (%s) [%s]",
+               ctx->username, state, auth, policy);
+}
+
+static ConnContext * otr_context_encrypted(const char * buddy)
+{
+  ConnContext * ctx = otr_get_context(buddy);
+
+  if (!userstate || !ctx  || ctx->msgstate != OTRL_MSGSTATE_ENCRYPTED){
+    scr_LogPrint(LPRINT_LOGNORM,
+                 "You have to start an OTR channel with %s before you can "
+                 "use SMP.", buddy);
+    return NULL;
+  }
+
+  return ctx;
+}
+
+void otr_smp_query(const char * buddy, const char * secret)
+{
+  ConnContext * ctx = otr_context_encrypted(buddy);
+
+  if (!secret) {
+    scr_LogPrint(LPRINT_LOGNORM,
+                 "Using SMP without a secret isn't a good idea.");
+    return;
+  }
+
+  if (ctx) {
+    otrl_message_initiate_smp(userstate, &ops, NULL, ctx, secret,
+                              strlen(secret));
+    scr_WriteIncomingMessage(ctx->username,
+                             "OTR: Socialist Millionaires' Protocol "
+                             "initiated.", 0, HBB_PREFIX_INFO);
+  }
+}
+
+void otr_smp_respond(const char * buddy, const char * secret)
+{
+  ConnContext * ctx = otr_context_encrypted(buddy);
+
+  if (!secret) {
+    scr_LogPrint(LPRINT_LOGNORM,
+                 "Using SMP without a secret isn't a good idea.");
+    return;
+  }
+
+  if (ctx) {
+    if (!ctx->smstate->secret) {
+      scr_LogPrint(LPRINT_LOGNORM,
+                   "Don't call smpr before you haven't received an SMP "
+                   "Initiation!");
+      return;
+    }
+    otrl_message_respond_smp(userstate, &ops, NULL, ctx, secret,
+                             strlen(secret));
+    scr_WriteIncomingMessage(ctx->username,
+                             "OTR: Socialist Millionaires' Protocol: "
+                             "response sent", 0, HBB_PREFIX_INFO);
+  }
+}
+
+void otr_smp_abort(const char * buddy)
+{
+  ConnContext * ctx = otr_context_encrypted(buddy);
+
+  if (ctx) {
+    otrl_message_abort_smp(userstate, &ops, NULL, ctx);
+    scr_WriteIncomingMessage(ctx->username,
+                             "OTR: Socialist Millionaires' Protocol aborted.",
+                             0, HBB_PREFIX_INFO);
+  }
+}
+
+void otr_key(void)
+{
+  OtrlPrivKey * key;
+  char readable[45] = "";
+
+  if(!userstate)
+    return;
+  for (key = userstate->privkey_root; key; key = key->next) {
+    otrl_privkey_fingerprint(userstate, readable, key->accountname,
+                             key->protocol);
+    scr_LogPrint(LPRINT_LOGNORM, "%s: %s", key->accountname, readable);
+  }
+}
+
+/* Return the OTR policy for the given context. */
+static OtrlPolicy cb_policy(void *opdata, ConnContext *ctx)
+{
+  enum otr_policy p = settings_otr_getpolicy(NULL);
+
+  if(ctx)
+    if(settings_otr_getpolicy(ctx->username))
+      p = settings_otr_getpolicy(ctx->username);
+
+  switch (p) {
+    case plain:
+      return OTRL_POLICY_NEVER;
+    case opportunistic:
+      return OTRL_POLICY_OPPORTUNISTIC & ~OTRL_POLICY_ALLOW_V1;
+    case manual:
+      return OTRL_POLICY_MANUAL & ~OTRL_POLICY_ALLOW_V1;
+    case always:
+      return OTRL_POLICY_ALWAYS & ~OTRL_POLICY_ALLOW_V1;
+  }
+}
+
+/* Create a private key for the given accountname/protocol if
+ * desired. */
+static void cb_create_privkey(void *opdata, const char *accountname,
+                              const char *protocol)
+{
+  gcry_error_t e;
+
+  scr_LogPrint(LPRINT_LOGNORM,
+               "Generating new OTR key for %s. This may take a while...",
+               accountname);
+  scr_DoUpdate();
+
+  e = otrl_privkey_generate(userstate, keyfile, accountname, protocol);
+
+  if (e)
+    scr_LogPrint(LPRINT_LOGNORM, "OTR key generation failed!"
+                 " Please mkdir ~/.mcabber/otr/ and restart mcabber.");
+  else
+    scr_LogPrint(LPRINT_LOGNORM, "OTR key generated.");
+}
+
+/* Report whether you think the given user is online.  Return 1 if
+ * you think he is, 0 if you think he isn't, -1 if you're not sure.
+ * If you return 1, messages such as heartbeats or other
+ * notifications may be sent to the user, which could result in "not
+ * logged in" errors if you're wrong. */
+static int cb_is_logged_in(void *opdata, const char *accountname,
+                           const char *protocol, const char *recipient)
+{
+  int ret = (roster_getstatus((char *)recipient, NULL) != offline);
+  return ret;
+}
+
+/* Send the given IM to the given recipient from the given
+ * accountname/protocol. */
+static void cb_inject_message(void *opdata, const char *accountname,
+                              const char *protocol, const char *recipient,
+                              const char *message)
+{
+  char * id = g_strdup("otrinject");
+  jb_send_msg(recipient, message, ROSTER_TYPE_USER, "", id, NULL);
+  g_free(id);
+}
+
+/* Display a notification message for a particular
+ * accountname / protocol / username conversation. */
+static void cb_notify(void *opdata, OtrlNotifyLevel level,
+                      const char *accountname, const char *protocol,
+                      const char *username, const char *title,
+                      const char *primary, const char *secondary)
+{
+  char * type;
+  char *sbuf = NULL;
+  switch (level) {
+    case OTRL_NOTIFY_ERROR:   type = "error";   break;
+    case OTRL_NOTIFY_WARNING: type = "warning"; break;
+    case OTRL_NOTIFY_INFO:    type = "info";    break;
+  }
+  sbuf = g_strdup_printf("OTR %s:%s\n%s\n%s",type,title, primary, secondary);
+  scr_WriteIncomingMessage(username, sbuf, 0, HBB_PREFIX_INFO);
+  g_free(sbuf);
+}
+
+/* Display an OTR control message for a particular
+ * accountname / protocol / username conversation.  Return 0 if you are able
+ * to successfully display it.  If you return non-0 (or if this
+ * function is NULL), the control message will be displayed inline,
+ * as a received message, or else by using the above notify()
+ * callback. */
+static int cb_display_otr_message(void *opdata, const char *accountname,
+                                  const char *protocol, const char *username,
+                                  const char *msg)
+{
+  scr_WriteIncomingMessage(username, msg, 0, HBB_PREFIX_INFO);
+  return 0;
+}
+
+/* When the list of ConnContexts changes (including a change in
+ * state), this is called so the UI can be updated. */
+static void cb_update_context_list(void *opdata)
+{
+  /*maybe introduce new status characters for mcabber,
+   * then use this function (?!)*/
+}
+
+/* Return a newly allocated string containing a human-friendly name
+ * for the given protocol id */
+static const char *cb_protocol_name(void *opdata, const char *protocol)
+{
+  return protocol;
+}
+
+/* Deallocate a string allocated by protocol_name */
+static void cb_protocol_name_free (void *opdata, const char *protocol_name)
+{
+  /* We didn't allocated memory, so we don't have to free anything :p */
+}
+
+/* A new fingerprint for the given user has been received. */
+static void cb_new_fingerprint(void *opdata, OtrlUserState us,
+                               const char *accountname, const char *protocol,
+                               const char *username,
+                               unsigned char fingerprint[20])
+{
+  char *sbuf = NULL;
+  char readable[45];
+
+  otrl_privkey_hash_to_human(readable, fingerprint);
+  sbuf = g_strdup_printf("OTR: new fingerprint: %s", readable);
+  scr_WriteIncomingMessage(username, sbuf, 0, HBB_PREFIX_INFO);
+  g_free(sbuf);
+}
+
+/* The list of known fingerprints has changed.  Write them to disk. */
+static void cb_write_fingerprints(void *opdata)
+{
+  otrl_privkey_write_fingerprints(userstate, fprfile);
+}
+
+/* A ConnContext has entered a secure state. */
+static void cb_gone_secure(void *opdata, ConnContext *context)
+{
+  scr_WriteIncomingMessage(context->username, "OTR: channel established", 0,
+                           HBB_PREFIX_INFO);
+}
+
+/* A ConnContext has left a secure state. */
+static void cb_gone_insecure(void *opdata, ConnContext *context)
+{
+  scr_WriteIncomingMessage(context->username, "OTR: channel closed", 0,
+                           HBB_PREFIX_INFO);
+}
+
+/* We have completed an authentication, using the D-H keys we
+ * already knew.  is_reply indicates whether we initiated the AKE. */
+static void cb_still_secure(void *opdata, ConnContext *context, int is_reply)
+{
+  scr_WriteIncomingMessage(context->username, "OTR: channel reestablished", 0,
+                           HBB_PREFIX_INFO);
+}
+
+/* Log a message.  The passed message will end in "\n". */
+static void cb_log_message(void *opdata, const char *message)
+{
+  scr_LogPrint(LPRINT_DEBUG, "OTR: %s", message);
+}
+
+/* Find the maximum message size supported by this protocol. */
+static int cb_max_message_size(void *opdata, ConnContext *context)
+{
+  return 8192;
+}
+
+#endif /* HAVE_LIBOTR */
+/* vim: set expandtab cindent cinoptions=>2\:2(0:  For Vim users... */