Mercurial > ~mikael > mcabber > hg
view mcabber/src/main.c @ 1197:6f602d3270a4
Add /pgp [-]force
With this command it becomes possible to enforce PGP encryption without
checking if the remote client has PGP support. It can be used to send
encrypted offline messages too.
author | Mikael Berthe <mikael@lilotux.net> |
---|---|
date | Fri, 27 Apr 2007 00:37:57 +0200 |
parents | 7b8765c10abb |
children | 2de8f8ba1f34 |
line wrap: on
line source
/* * main.c * * Copyright (C) 2005, 2006 Mikael Berthe <bmikael@lists.lilotux.net> * Parts of this file come from Cabber <cabber@ajmacias.com> * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or (at * your option) any later version. * * This program is distributed in the hope that it will be useful, but * WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 * USA */ #include <stdio.h> #include <stdlib.h> #include <unistd.h> #include <string.h> #include <signal.h> #include <termios.h> #include <getopt.h> #include <sys/types.h> #include <sys/wait.h> #include <glib.h> #include <config.h> #include "jabglue.h" #include "screen.h" #include "settings.h" #include "roster.h" #include "commands.h" #include "histolog.h" #include "hooks.h" #include "utils.h" #include "pgp.h" #ifdef ENABLE_HGCSET # include "hgcset.h" #endif #ifndef WAIT_ANY # define WAIT_ANY -1 #endif static struct termios *backup_termios; char *mcabber_version(void) { char *ver; #ifdef HGCSET ver = g_strdup_printf("%s (%s)", PACKAGE_VERSION, HGCSET); #else ver = g_strdup(PACKAGE_VERSION); #endif return ver; } void mcabber_connect(void) { const char *username, *password, *resource, *servername; const char *proxy_host; char *bjid; int ssl; int sslverify = -1; const char *sslvopt = NULL, *cafile = NULL, *capath = NULL, *ciphers = NULL; char *cafile_xp = NULL, *capath_xp = NULL; unsigned int port; servername = settings_opt_get("server"); username = settings_opt_get("username"); password = settings_opt_get("password"); resource = settings_opt_get("resource"); proxy_host = settings_opt_get("proxy_host"); if (!servername) { scr_LogPrint(LPRINT_NORMAL, "Server name has not been specified!"); return; } if (!username) { scr_LogPrint(LPRINT_NORMAL, "User name has not been specified!"); return; } if (!password) { scr_LogPrint(LPRINT_NORMAL, "Password has not been specified!"); return; } if (!resource) resource = "mcabber"; port = (unsigned int) settings_opt_get_int("port"); ssl = settings_opt_get_int("ssl"); sslvopt = settings_opt_get("ssl_verify"); if (sslvopt) sslverify = settings_opt_get_int("ssl_verify"); cafile = settings_opt_get("ssl_cafile"); capath = settings_opt_get("ssl_capath"); ciphers = settings_opt_get("ssl_ciphers"); #if !defined(HAVE_OPENSSL) && !defined(HAVE_GNUTLS) if (ssl || sslvopt || cafile || capath || ciphers) { scr_LogPrint(LPRINT_LOGNORM, "** Warning: SSL is NOT available, ignoring ssl-related setting"); ssl = sslverify = 0; cafile = capath = ciphers = NULL; } #endif if (cafile) cafile_xp = expand_filename(cafile); if (capath) capath_xp = expand_filename(capath); cw_set_ssl_options(sslverify, cafile_xp, capath_xp, ciphers, servername); g_free(cafile_xp); g_free(capath_xp); /* Connect to server */ scr_LogPrint(LPRINT_NORMAL|LPRINT_DEBUG, "Connecting to server: %s", servername); if (port) scr_LogPrint(LPRINT_NORMAL|LPRINT_DEBUG, " using port %d", port); if (proxy_host) { int proxy_port = settings_opt_get_int("proxy_port"); if (proxy_port <= 0 || proxy_port > 65535) { scr_LogPrint(LPRINT_LOGNORM, "Invalid proxy port: %d", proxy_port); } else { const char *proxy_user, *proxy_pass; proxy_user = settings_opt_get("proxy_user"); proxy_pass = settings_opt_get("proxy_pass"); // Proxy initialization cw_setproxy(proxy_host, proxy_port, proxy_user, proxy_pass); scr_LogPrint(LPRINT_NORMAL|LPRINT_DEBUG, " using proxy %s:%d", proxy_host, proxy_port); } } bjid = compose_jid(username, servername, resource); jc = jb_connect(bjid, servername, port, ssl, password); g_free(bjid); if (!jc) scr_LogPrint(LPRINT_LOGNORM, "Error connecting to (%s)", servername); jb_reset_keepalive(); } static void mcabber_terminate(const char *msg) { jb_disconnect(); scr_TerminateCurses(); // Restore term settings, if needed. if (backup_termios) tcsetattr(fileno(stdin), TCSAFLUSH, backup_termios); if (msg) fprintf(stderr, "%s\n", msg); printf("Bye!\n"); exit(EXIT_SUCCESS); } void sig_handler(int signum) { if (signum == SIGCHLD) { int status; pid_t pid; do { pid = waitpid (WAIT_ANY, &status, WNOHANG); // Check the exit status value if 'eventcmd_checkstatus' is set if (settings_opt_get_int("eventcmd_checkstatus")) { if (pid > 0) { // exit status 2 -> beep if (WIFEXITED(status) && WEXITSTATUS(status) == 2) { scr_Beep(); } } } } while (pid > 0); signal(SIGCHLD, sig_handler); } else if (signum == SIGTERM) { mcabber_terminate("Killed by SIGTERM"); } else if (signum == SIGINT) { mcabber_terminate("Killed by SIGINT"); } else { scr_LogPrint(LPRINT_LOGNORM, "Caught signal: %d", signum); } } // ask_password(what) // Return the password, or NULL. // The string must be freed after use. static char *ask_password(const char *what) { char *password, *p; size_t passsize = 128; struct termios orig, new; password = g_new0(char, passsize); /* Turn echoing off and fail if we can't. */ if (tcgetattr(fileno(stdin), &orig) != 0) return NULL; backup_termios = &orig; new = orig; new.c_lflag &= ~ECHO; if (tcsetattr(fileno(stdin), TCSAFLUSH, &new) != 0) return NULL; /* Read the password. */ printf("Please enter %s: ", what); fgets(password, passsize, stdin); /* Restore terminal. */ tcsetattr(fileno(stdin), TCSAFLUSH, &orig); printf("\n"); backup_termios = NULL; for (p = (char*)password; *p; p++) ; for ( ; p > (char*)password ; p--) if (*p == '\n' || *p == '\r') *p = 0; return password; } static void credits(void) { const char *v_fmt = "MCabber %s -- Email: mcabber [at] lilotux [dot] net\n"; char *v = mcabber_version(); printf(v_fmt, v); scr_LogPrint(LPRINT_LOGNORM|LPRINT_NOTUTF8, v_fmt, v); g_free(v); } void main_init_pgp(void) { #ifdef HAVE_GPGME const char *pk, *pp; char *typed_passwd = NULL; char *p; bool pgp_invalid = FALSE; bool pgp_agent; p = getenv("GPG_AGENT_INFO"); pgp_agent = (p && strchr(p, ':')); pk = settings_opt_get("pgp_private_key"); pp = settings_opt_get("pgp_passphrase"); if (!pk) { scr_LogPrint(LPRINT_LOGNORM, "WARNING: unkown PGP private key"); pgp_invalid = TRUE; } else if (!(pp || pgp_agent)) { // Request PGP passphrase pp = typed_passwd = ask_password("PGP passphrase"); } gpg_init(pk, pp); // Erase password from the settings array if (pp) { memset((char*)pp, 0, strlen(pp)); if (typed_passwd) g_free(typed_passwd); else settings_set(SETTINGS_TYPE_OPTION, "pgp_passphrase", NULL); } if (!pgp_agent && pk && pp && gpg_test_passphrase()) { // Let's check the pasphrase int i; for (i = 0; i < 2; i++) { typed_passwd = ask_password("PGP passphrase"); // Ask again... if (typed_passwd) { gpg_set_passphrase(typed_passwd); memset(typed_passwd, 0, strlen(typed_passwd)); g_free(typed_passwd); } if (!gpg_test_passphrase()) break; // Ok } if (i == 2) pgp_invalid = TRUE; } if (pgp_invalid) scr_LogPrint(LPRINT_LOGNORM, "WARNING: PGP key/pass invalid"); #else /* not HAVE_GPGME */ scr_LogPrint(LPRINT_LOGNORM, "WARNING: not compiled with PGP support"); #endif /* HAVE_GPGME */ } int main(int argc, char **argv) { char *configFile = NULL; const char *optstring; int optval, optval2; unsigned int ping; int ret; keycode kcode; credits(); signal(SIGTERM, sig_handler); signal(SIGINT, sig_handler); signal(SIGCHLD, sig_handler); signal(SIGPIPE, SIG_IGN); /* Parse command line options */ while (1) { int c = getopt(argc, argv, "hf:"); if (c == -1) { break; } else switch (c) { case 'h': printf("Usage: %s [-f mcabberrc_file]\n\n", argv[0]); printf("Thanks to AjMacias for cabber!\n\n"); return 0; case 'f': configFile = g_strdup(optarg); break; } } /* Initialize command system, roster and default key bindings */ cmd_init(); roster_init(); settings_init(); scr_init_bindings(); /* Initialize charset */ scr_InitLocaleCharSet(); /* Parsing config file... */ ret = cfg_read_file(configFile, TRUE); /* free() configFile if it has been allocated during options parsing */ g_free(configFile); /* Leave if there was an error in the config. file */ if (ret == -2) exit(EXIT_FAILURE); optstring = settings_opt_get("tracelog_file"); if (optstring) ut_InitDebug(settings_opt_get_int("tracelog_level"), optstring); /* If no password is stored, we ask for it before entering ncurses mode -- unless the username is unknown. */ if (settings_opt_get("username") && !settings_opt_get("password")) { const char *p; char *pwd; p = settings_opt_get("server"); if (p) printf("Server: %s\n", p); p = settings_opt_get("username"); if (p) printf("Username: %s\n", p); pwd = ask_password("Jabber password"); settings_set(SETTINGS_TYPE_OPTION, "password", pwd); g_free(pwd); } /* Initialize PGP system We do it before ncurses initialization because we may need to request a passphrase. */ if (settings_opt_get_int("pgp")) main_init_pgp(); /* Initialize N-Curses */ scr_LogPrint(LPRINT_DEBUG, "Initializing N-Curses..."); scr_InitCurses(); scr_DrawMainWindow(TRUE); optval = (settings_opt_get_int("logging") > 0); optval2 = (settings_opt_get_int("load_logs") > 0); if (optval || optval2) hlog_enable(optval, settings_opt_get("logging_dir"), optval2); #ifdef HAVE_ASPELL_H /* Initialize aspell */ if (settings_opt_get_int("aspell_enable")) { spellcheck_init(); } #endif optstring = settings_opt_get("events_command"); if (optstring) hk_ext_cmd_init(optstring); ping = 40; if (settings_opt_get("pinginterval")) ping = (unsigned int) settings_opt_get_int("pinginterval"); jb_set_keepalive_delay(ping); scr_LogPrint(LPRINT_DEBUG, "Ping interval established: %d secs", ping); if (settings_opt_get_int("hide_offline_buddies") > 0) buddylist_set_hide_offline_buddies(TRUE); chatstates_disabled = settings_opt_get_int("disable_chatstates"); if (ret < 0) { scr_LogPrint(LPRINT_NORMAL, "No configuration file has been found."); scr_ShowBuddyWindow(); } else { /* Connection */ mcabber_connect(); } scr_LogPrint(LPRINT_DEBUG, "Entering into main loop..."); for (ret = 0 ; ret != 255 ; ) { scr_DoUpdate(); scr_Getch(&kcode); if (kcode.value != ERR) { ret = process_key(kcode); } else { scr_CheckAutoAway(FALSE); if (update_roster) scr_DrawRoster(); jb_main(); } } jb_disconnect(); #ifdef HAVE_GPGME gpg_terminate(); #endif scr_TerminateCurses(); #ifdef HAVE_ASPELL_H /* Deinitialize aspell */ if (settings_opt_get_int("aspell_enable")) { spellcheck_deinit(); } #endif printf("\n\nThanks for using mcabber!\n"); return 0; } /* vim: set expandtab cindent cinoptions=>2\:2(0: For Vim users... */