2017-03-02 14:37:32 +00:00
|
|
|
namespace Xmpp.PlainSasl {
|
|
|
|
private const string NS_URI = "urn:ietf:params:xml:ns:xmpp-sasl";
|
|
|
|
|
|
|
|
public class Module : XmppStreamNegotiationModule {
|
2017-03-19 11:55:36 +00:00
|
|
|
public static ModuleIdentity<Module> IDENTITY = new ModuleIdentity<Module>(NS_URI, "plain_module");
|
2017-03-02 14:37:32 +00:00
|
|
|
private const string MECHANISM = "PLAIN";
|
|
|
|
|
2017-08-12 21:14:50 +00:00
|
|
|
public string name { get; set; }
|
|
|
|
public string password { get; set; }
|
2017-03-02 14:37:32 +00:00
|
|
|
public bool use_full_name = false;
|
|
|
|
|
|
|
|
public signal void received_auth_failure(XmppStream stream, StanzaNode node);
|
|
|
|
|
|
|
|
public Module(string name, string password) {
|
|
|
|
this.name = name;
|
|
|
|
this.password = password;
|
|
|
|
}
|
|
|
|
|
|
|
|
public override void attach(XmppStream stream) {
|
|
|
|
stream.received_features_node.connect(this.received_features_node);
|
|
|
|
stream.received_nonza.connect(this.received_nonza);
|
|
|
|
}
|
|
|
|
|
|
|
|
public override void detach(XmppStream stream) {
|
|
|
|
stream.received_features_node.disconnect(this.received_features_node);
|
|
|
|
stream.received_nonza.disconnect(this.received_nonza);
|
|
|
|
}
|
|
|
|
|
|
|
|
public void received_nonza(XmppStream stream, StanzaNode node) {
|
|
|
|
if (node.ns_uri == NS_URI) {
|
|
|
|
if (node.name == "success") {
|
|
|
|
stream.require_setup();
|
2017-03-19 11:55:36 +00:00
|
|
|
stream.get_flag(Flag.IDENTITY).finished = true;
|
2017-03-02 14:37:32 +00:00
|
|
|
} else if (node.name == "failure") {
|
2017-03-19 11:55:36 +00:00
|
|
|
stream.remove_flag(stream.get_flag(Flag.IDENTITY));
|
2017-03-02 14:37:32 +00:00
|
|
|
received_auth_failure(stream, node);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
public void received_features_node(XmppStream stream) {
|
2017-03-19 11:55:36 +00:00
|
|
|
if (stream.has_flag(Flag.IDENTITY)) return;
|
2017-03-02 14:37:32 +00:00
|
|
|
if (stream.is_setup_needed()) return;
|
2017-03-19 11:55:36 +00:00
|
|
|
if (!stream.has_flag(Tls.Flag.IDENTITY) || !stream.get_flag(Tls.Flag.IDENTITY).finished) return;
|
2017-03-02 14:37:32 +00:00
|
|
|
|
|
|
|
var mechanisms = stream.features.get_subnode("mechanisms", NS_URI);
|
|
|
|
if (mechanisms != null) {
|
|
|
|
bool supportsPlain = false;
|
|
|
|
foreach (var mechanism in mechanisms.sub_nodes) {
|
|
|
|
if (mechanism.name != "mechanism" || mechanism.ns_uri != NS_URI) continue;
|
|
|
|
var text = mechanism.get_subnode("#text");
|
|
|
|
if (text != null && text.val == MECHANISM) {
|
|
|
|
supportsPlain = true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (!supportsPlain) {
|
2018-01-12 20:03:09 +00:00
|
|
|
stderr.printf("Server at %s does not support %s auth, use full-features Sasl implementation!\n", stream.remote_name.to_string(), MECHANISM);
|
2017-03-02 14:37:32 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!name.contains("@")) {
|
2018-01-12 20:03:09 +00:00
|
|
|
name = "%s@%s".printf(name, stream.remote_name.to_string());
|
2017-03-02 14:37:32 +00:00
|
|
|
}
|
|
|
|
if (!use_full_name && name.contains("@")) {
|
|
|
|
var split = name.split("@");
|
2018-01-12 20:03:09 +00:00
|
|
|
if (split[1] == stream.remote_name.to_string()) {
|
2017-03-02 14:37:32 +00:00
|
|
|
name = split[0];
|
|
|
|
} else {
|
|
|
|
use_full_name = true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
var name = this.name;
|
|
|
|
if (!use_full_name && name.contains("@")) {
|
|
|
|
var split = name.split("@");
|
2018-01-12 20:03:09 +00:00
|
|
|
if (split[1] == stream.remote_name.to_string()) {
|
2017-03-02 14:37:32 +00:00
|
|
|
name = split[0];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
stream.write(new StanzaNode.build("auth", NS_URI).add_self_xmlns()
|
|
|
|
.put_attribute("mechanism", MECHANISM)
|
|
|
|
.put_node(new StanzaNode.text(Base64.encode(get_plain_bytes(name, password)))));
|
|
|
|
var flag = new Flag();
|
|
|
|
flag.mechanism = MECHANISM;
|
|
|
|
flag.name = name;
|
|
|
|
stream.add_flag(flag);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
private static uchar[] get_plain_bytes(string name_s, string password_s) {
|
|
|
|
var name = name_s.to_utf8();
|
|
|
|
var password = password_s.to_utf8();
|
|
|
|
uchar[] res = new uchar[name.length + password.length + 2];
|
|
|
|
res[0] = 0;
|
|
|
|
res[name.length + 1] = 0;
|
|
|
|
for(int i = 0; i < name.length; i++) { res[i + 1] = (uchar) name[i]; }
|
|
|
|
for(int i = 0; i < password.length; i++) { res[i + name.length + 2] = (uchar) password[i]; }
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
|
|
|
public override bool mandatory_outstanding(XmppStream stream) {
|
2017-03-19 11:55:36 +00:00
|
|
|
return !stream.has_flag(Flag.IDENTITY) || !stream.get_flag(Flag.IDENTITY).finished;
|
2017-03-02 14:37:32 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
public override bool negotiation_active(XmppStream stream) {
|
2017-03-19 11:55:36 +00:00
|
|
|
return stream.has_flag(Flag.IDENTITY) && !stream.get_flag(Flag.IDENTITY).finished;
|
2017-03-02 14:37:32 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
public override string get_ns() { return NS_URI; }
|
2017-03-19 11:55:36 +00:00
|
|
|
public override string get_id() { return IDENTITY.id; }
|
2017-03-02 14:37:32 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
public class Flag : XmppStreamFlag {
|
2017-03-19 11:55:36 +00:00
|
|
|
public static FlagIdentity<Flag> IDENTITY = new FlagIdentity<Flag>(NS_URI, "sasl");
|
2017-03-02 14:37:32 +00:00
|
|
|
public string mechanism;
|
|
|
|
public string name;
|
|
|
|
public bool finished = false;
|
|
|
|
|
|
|
|
public override string get_ns() { return NS_URI; }
|
2017-03-19 11:55:36 +00:00
|
|
|
public override string get_id() { return IDENTITY.id; }
|
2017-03-02 14:37:32 +00:00
|
|
|
}
|
|
|
|
}
|