2006-01-17 21:02:11 +01:00
|
|
|
/**
|
|
|
|
* $RCSfile$
|
|
|
|
* $Revision: 3306 $
|
|
|
|
* $Date: 2006-01-16 14:34:56 -0300 (Mon, 16 Jan 2006) $
|
|
|
|
*
|
2007-02-12 01:59:05 +01:00
|
|
|
* Copyright 2003-2007 Jive Software.
|
2006-01-17 21:02:11 +01:00
|
|
|
*
|
|
|
|
* All rights reserved. Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
package org.jivesoftware.smack;
|
|
|
|
|
2008-07-15 04:59:21 +02:00
|
|
|
import org.jivesoftware.smack.proxy.ProxyInfo;
|
2008-10-24 07:17:50 +02:00
|
|
|
import org.jivesoftware.smack.util.DNSUtil;
|
2006-10-16 22:45:43 +02:00
|
|
|
|
2006-09-14 21:16:40 +02:00
|
|
|
import javax.net.SocketFactory;
|
2008-10-24 07:17:50 +02:00
|
|
|
import javax.security.auth.callback.CallbackHandler;
|
2006-01-17 21:02:11 +01:00
|
|
|
import java.io.File;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Configuration to use while establishing the connection to the server. It is possible to
|
|
|
|
* configure the path to the trustore file that keeps the trusted CA root certificates and
|
|
|
|
* enable or disable all or some of the checkings done while verifying server certificates.<p>
|
|
|
|
*
|
2007-01-11 20:01:24 +01:00
|
|
|
* It is also possible to configure if TLS, SASL, and compression are used or not.
|
2006-01-17 21:02:11 +01:00
|
|
|
*
|
|
|
|
* @author Gaston Dombiak
|
|
|
|
*/
|
2006-01-17 22:27:44 +01:00
|
|
|
public class ConnectionConfiguration implements Cloneable {
|
2006-01-17 21:02:11 +01:00
|
|
|
|
|
|
|
private String serviceName;
|
|
|
|
|
|
|
|
private String host;
|
|
|
|
private int port;
|
|
|
|
|
|
|
|
private String truststorePath;
|
|
|
|
private String truststoreType;
|
|
|
|
private String truststorePassword;
|
2007-11-14 17:27:47 +01:00
|
|
|
private String keystorePath;
|
|
|
|
private String keystoreType;
|
2007-12-27 17:38:25 +01:00
|
|
|
private String pkcs11Library;
|
2006-01-17 22:27:44 +01:00
|
|
|
private boolean verifyChainEnabled = false;
|
|
|
|
private boolean verifyRootCAEnabled = false;
|
2006-01-17 21:02:11 +01:00
|
|
|
private boolean selfSignedCertificateEnabled = false;
|
2006-01-17 22:27:44 +01:00
|
|
|
private boolean expiredCertificatesCheckEnabled = false;
|
|
|
|
private boolean notMatchingDomainCheckEnabled = false;
|
2006-01-17 21:02:11 +01:00
|
|
|
|
|
|
|
private boolean compressionEnabled = false;
|
|
|
|
|
|
|
|
private boolean saslAuthenticationEnabled = true;
|
2008-10-24 07:17:50 +02:00
|
|
|
/**
|
|
|
|
* Used to get information from the user
|
|
|
|
*/
|
|
|
|
private CallbackHandler callbackHandler;
|
2006-01-17 21:02:11 +01:00
|
|
|
|
|
|
|
private boolean debuggerEnabled = XMPPConnection.DEBUG_ENABLED;
|
|
|
|
|
2006-09-14 21:16:40 +02:00
|
|
|
// Flag that indicates if a reconnection should be attempted when abruptly disconnected
|
|
|
|
private boolean reconnectionAllowed = true;
|
|
|
|
|
|
|
|
// Holds the socket factory that is used to generate the socket in the connection
|
|
|
|
private SocketFactory socketFactory;
|
|
|
|
|
|
|
|
// Holds the authentication information for future reconnections
|
|
|
|
private String username;
|
|
|
|
private String password;
|
2006-11-10 20:06:33 +01:00
|
|
|
private String resource;
|
2008-10-24 07:17:50 +02:00
|
|
|
private boolean sendPresence = true;
|
|
|
|
private boolean rosterLoadedAtLogin = true;
|
2007-01-11 20:01:24 +01:00
|
|
|
private SecurityMode securityMode = SecurityMode.enabled;
|
2008-07-15 04:59:21 +02:00
|
|
|
|
|
|
|
// Holds the proxy information (such as proxyhost, proxyport, username, password etc)
|
|
|
|
private ProxyInfo proxy;
|
2007-01-05 00:00:58 +01:00
|
|
|
|
2006-10-16 22:45:43 +02:00
|
|
|
/**
|
2007-01-05 00:00:58 +01:00
|
|
|
* Creates a new ConnectionConfiguration for the specified service name.
|
|
|
|
* A DNS SRV lookup will be performed to find out the actual host address
|
|
|
|
* and port to use for the connection.
|
2006-10-16 22:45:43 +02:00
|
|
|
*
|
|
|
|
* @param serviceName the name of the service provided by an XMPP server.
|
|
|
|
*/
|
|
|
|
public ConnectionConfiguration(String serviceName) {
|
|
|
|
// Perform DNS lookup to get host and port to use
|
|
|
|
DNSUtil.HostAddress address = DNSUtil.resolveXMPPDomain(serviceName);
|
2008-07-15 04:59:21 +02:00
|
|
|
init(address.getHost(), address.getPort(), serviceName,
|
|
|
|
ProxyInfo.forDefaultProxy());
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Creates a new ConnectionConfiguration for the specified service name
|
|
|
|
* with specified proxy.
|
|
|
|
* A DNS SRV lookup will be performed to find out the actual host address
|
|
|
|
* and port to use for the connection.
|
|
|
|
*
|
|
|
|
* @param serviceName the name of the service provided by an XMPP server.
|
|
|
|
* @param proxy the proxy through which XMPP is to be connected
|
|
|
|
*/
|
|
|
|
public ConnectionConfiguration(String serviceName,ProxyInfo proxy) {
|
|
|
|
// Perform DNS lookup to get host and port to use
|
|
|
|
DNSUtil.HostAddress address = DNSUtil.resolveXMPPDomain(serviceName);
|
|
|
|
init(address.getHost(), address.getPort(), serviceName, proxy);
|
2006-10-16 22:45:43 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2007-01-05 00:00:58 +01:00
|
|
|
* Creates a new ConnectionConfiguration using the specified host, port and
|
|
|
|
* service name. This is useful for manually overriding the DNS SRV lookup
|
|
|
|
* process that's used with the {@link #ConnectionConfiguration(String)}
|
|
|
|
* constructor. For example, say that an XMPP server is running at localhost
|
|
|
|
* in an internal network on port 5222 but is configured to think that it's
|
|
|
|
* "example.com" for testing purposes. This constructor is necessary to connect
|
|
|
|
* to the server in that case since a DNS SRV lookup for example.com would not
|
|
|
|
* point to the local testing server.
|
2006-10-16 22:45:43 +02:00
|
|
|
*
|
|
|
|
* @param host the host where the XMPP server is running.
|
|
|
|
* @param port the port where the XMPP is listening.
|
|
|
|
* @param serviceName the name of the service provided by an XMPP server.
|
|
|
|
*/
|
2006-01-17 21:02:11 +01:00
|
|
|
public ConnectionConfiguration(String host, int port, String serviceName) {
|
2008-07-15 04:59:21 +02:00
|
|
|
init(host, port, serviceName, ProxyInfo.forDefaultProxy());
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Creates a new ConnectionConfiguration using the specified host, port and
|
|
|
|
* service name. This is useful for manually overriding the DNS SRV lookup
|
|
|
|
* process that's used with the {@link #ConnectionConfiguration(String)}
|
|
|
|
* constructor. For example, say that an XMPP server is running at localhost
|
|
|
|
* in an internal network on port 5222 but is configured to think that it's
|
|
|
|
* "example.com" for testing purposes. This constructor is necessary to connect
|
|
|
|
* to the server in that case since a DNS SRV lookup for example.com would not
|
|
|
|
* point to the local testing server.
|
|
|
|
*
|
|
|
|
* @param host the host where the XMPP server is running.
|
|
|
|
* @param port the port where the XMPP is listening.
|
|
|
|
* @param serviceName the name of the service provided by an XMPP server.
|
|
|
|
* @param proxy the proxy through which XMPP is to be connected
|
|
|
|
*/
|
|
|
|
public ConnectionConfiguration(String host, int port, String serviceName, ProxyInfo proxy) {
|
|
|
|
init(host, port, serviceName, proxy);
|
2006-10-16 22:45:43 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Creates a new ConnectionConfiguration for a connection that will connect
|
|
|
|
* to the desired host and port.
|
|
|
|
*
|
|
|
|
* @param host the host where the XMPP server is running.
|
|
|
|
* @param port the port where the XMPP is listening.
|
|
|
|
*/
|
|
|
|
public ConnectionConfiguration(String host, int port) {
|
2008-07-15 04:59:21 +02:00
|
|
|
init(host, port, host, ProxyInfo.forDefaultProxy());
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Creates a new ConnectionConfiguration for a connection that will connect
|
|
|
|
* to the desired host and port with desired proxy.
|
|
|
|
*
|
|
|
|
* @param host the host where the XMPP server is running.
|
|
|
|
* @param port the port where the XMPP is listening.
|
|
|
|
* @param proxy the proxy through which XMPP is to be connected
|
|
|
|
*/
|
|
|
|
public ConnectionConfiguration(String host, int port, ProxyInfo proxy) {
|
|
|
|
init(host, port, host, proxy);
|
2006-10-16 22:45:43 +02:00
|
|
|
}
|
|
|
|
|
2008-07-15 04:59:21 +02:00
|
|
|
private void init(String host, int port, String serviceName, ProxyInfo proxy) {
|
2006-01-17 21:02:11 +01:00
|
|
|
this.host = host;
|
|
|
|
this.port = port;
|
|
|
|
this.serviceName = serviceName;
|
2008-07-15 04:59:21 +02:00
|
|
|
this.proxy = proxy;
|
2006-01-17 21:02:11 +01:00
|
|
|
|
|
|
|
// Build the default path to the cacert truststore file. By default we are
|
|
|
|
// going to use the file located in $JREHOME/lib/security/cacerts.
|
2007-01-11 20:01:24 +01:00
|
|
|
String javaHome = System.getProperty("java.home");
|
2006-07-18 07:14:33 +02:00
|
|
|
StringBuilder buffer = new StringBuilder();
|
2006-01-17 21:02:11 +01:00
|
|
|
buffer.append(javaHome).append(File.separator).append("lib");
|
|
|
|
buffer.append(File.separator).append("security");
|
|
|
|
buffer.append(File.separator).append("cacerts");
|
|
|
|
truststorePath = buffer.toString();
|
|
|
|
// Set the default store type
|
|
|
|
truststoreType = "jks";
|
|
|
|
// Set the default password of the cacert file that is "changeit"
|
|
|
|
truststorePassword = "changeit";
|
2007-11-14 17:27:47 +01:00
|
|
|
keystorePath = System.getProperty("javax.net.ssl.keyStore");
|
|
|
|
keystoreType = "jks";
|
2007-12-27 17:38:25 +01:00
|
|
|
pkcs11Library = "pkcs11.config";
|
2008-07-15 04:59:21 +02:00
|
|
|
|
|
|
|
//Setting the SocketFactory according to proxy supplied
|
|
|
|
socketFactory = proxy.getSocketFactory();
|
2006-01-17 21:02:11 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Returns the server name of the target server.
|
|
|
|
*
|
|
|
|
* @return the server name of the target server.
|
|
|
|
*/
|
|
|
|
public String getServiceName() {
|
|
|
|
return serviceName;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Returns the host to use when establishing the connection. The host and port to use
|
2007-01-11 20:01:24 +01:00
|
|
|
* might have been resolved by a DNS lookup as specified by the XMPP spec (and therefore
|
|
|
|
* may not match the {@link #getServiceName service name}.
|
2006-01-17 21:02:11 +01:00
|
|
|
*
|
|
|
|
* @return the host to use when establishing the connection.
|
|
|
|
*/
|
|
|
|
public String getHost() {
|
|
|
|
return host;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Returns the port to use when establishing the connection. The host and port to use
|
|
|
|
* might have been resolved by a DNS lookup as specified by the XMPP spec.
|
|
|
|
*
|
|
|
|
* @return the port to use when establishing the connection.
|
|
|
|
*/
|
|
|
|
public int getPort() {
|
|
|
|
return port;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2007-01-11 20:01:24 +01:00
|
|
|
* Returns the TLS security mode used when making the connection. By default,
|
|
|
|
* the mode is {@link SecurityMode#enabled}.
|
2006-01-17 21:02:11 +01:00
|
|
|
*
|
2007-01-11 20:01:24 +01:00
|
|
|
* @return the security mode.
|
2006-01-17 21:02:11 +01:00
|
|
|
*/
|
2007-01-11 20:01:24 +01:00
|
|
|
public SecurityMode getSecurityMode() {
|
|
|
|
return securityMode;
|
2006-01-17 21:02:11 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2007-01-11 20:01:24 +01:00
|
|
|
* Sets the TLS security mode used when making the connection. By default,
|
|
|
|
* the mode is {@link SecurityMode#enabled}.
|
2006-01-17 21:02:11 +01:00
|
|
|
*
|
2007-01-11 20:01:24 +01:00
|
|
|
* @param securityMode the security mode.
|
2006-01-17 21:02:11 +01:00
|
|
|
*/
|
2007-01-11 20:01:24 +01:00
|
|
|
public void setSecurityMode(SecurityMode securityMode) {
|
|
|
|
this.securityMode = securityMode;
|
2006-01-17 21:02:11 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2007-01-11 20:01:24 +01:00
|
|
|
* Retuns the path to the trust store file. The trust store file contains the root
|
|
|
|
* certificates of several well known CAs. By default, will attempt to use the
|
2006-01-17 21:02:11 +01:00
|
|
|
* the file located in $JREHOME/lib/security/cacerts.
|
|
|
|
*
|
|
|
|
* @return the path to the truststore file.
|
|
|
|
*/
|
|
|
|
public String getTruststorePath() {
|
|
|
|
return truststorePath;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2007-01-11 20:01:24 +01:00
|
|
|
* Sets the path to the trust store file. The truststore file contains the root
|
2006-01-17 21:02:11 +01:00
|
|
|
* certificates of several well?known CAs. By default Smack is going to use
|
|
|
|
* the file located in $JREHOME/lib/security/cacerts.
|
|
|
|
*
|
|
|
|
* @param truststorePath the path to the truststore file.
|
|
|
|
*/
|
|
|
|
public void setTruststorePath(String truststorePath) {
|
|
|
|
this.truststorePath = truststorePath;
|
|
|
|
}
|
|
|
|
|
2007-01-11 20:01:24 +01:00
|
|
|
/**
|
|
|
|
* Returns the trust store type, or <tt>null</tt> if it's not set.
|
|
|
|
*
|
|
|
|
* @return the trust store type.
|
|
|
|
*/
|
2006-01-17 21:02:11 +01:00
|
|
|
public String getTruststoreType() {
|
|
|
|
return truststoreType;
|
|
|
|
}
|
|
|
|
|
2007-01-11 20:01:24 +01:00
|
|
|
/**
|
|
|
|
* Sets the trust store type.
|
|
|
|
*
|
|
|
|
* @param truststoreType the trust store type.
|
|
|
|
*/
|
2006-01-17 21:02:11 +01:00
|
|
|
public void setTruststoreType(String truststoreType) {
|
|
|
|
this.truststoreType = truststoreType;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2007-01-11 20:01:24 +01:00
|
|
|
* Returns the password to use to access the trust store file. It is assumed that all
|
|
|
|
* certificates share the same password in the trust store.
|
2006-01-17 21:02:11 +01:00
|
|
|
*
|
|
|
|
* @return the password to use to access the truststore file.
|
|
|
|
*/
|
|
|
|
public String getTruststorePassword() {
|
|
|
|
return truststorePassword;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2007-01-11 20:01:24 +01:00
|
|
|
* Sets the password to use to access the trust store file. It is assumed that all
|
|
|
|
* certificates share the same password in the trust store.
|
2006-01-17 21:02:11 +01:00
|
|
|
*
|
|
|
|
* @param truststorePassword the password to use to access the truststore file.
|
|
|
|
*/
|
|
|
|
public void setTruststorePassword(String truststorePassword) {
|
|
|
|
this.truststorePassword = truststorePassword;
|
|
|
|
}
|
|
|
|
|
2007-11-14 17:27:47 +01:00
|
|
|
/**
|
|
|
|
* Retuns the path to the keystore file. The key store file contains the
|
|
|
|
* certificates that may be used to authenticate the client to the server,
|
|
|
|
* in the event the server requests or requires it.
|
|
|
|
*
|
|
|
|
* @return the path to the keystore file.
|
|
|
|
*/
|
|
|
|
public String getKeystorePath() {
|
|
|
|
return keystorePath;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Sets the path to the keystore file. The key store file contains the
|
|
|
|
* certificates that may be used to authenticate the client to the server,
|
|
|
|
* in the event the server requests or requires it.
|
|
|
|
*
|
|
|
|
* @param keystorePath the path to the keystore file.
|
|
|
|
*/
|
|
|
|
public void setKeystorePath(String keystorePath) {
|
|
|
|
this.keystorePath = keystorePath;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Returns the keystore type, or <tt>null</tt> if it's not set.
|
|
|
|
*
|
|
|
|
* @return the keystore type.
|
|
|
|
*/
|
|
|
|
public String getKeystoreType() {
|
|
|
|
return keystoreType;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Sets the keystore type.
|
|
|
|
*
|
|
|
|
* @param keystoreType the keystore type.
|
|
|
|
*/
|
|
|
|
public void setKeystoreType(String keystoreType) {
|
|
|
|
this.keystoreType = keystoreType;
|
|
|
|
}
|
|
|
|
|
2007-11-30 20:40:31 +01:00
|
|
|
|
2007-11-14 17:27:47 +01:00
|
|
|
/**
|
2007-12-27 17:38:25 +01:00
|
|
|
* Returns the PKCS11 library file location, needed when the
|
2007-11-30 20:40:31 +01:00
|
|
|
* Keystore type is PKCS11.
|
2007-11-14 17:27:47 +01:00
|
|
|
*
|
2007-12-27 17:38:25 +01:00
|
|
|
* @return the path to the PKCS11 library file
|
2007-11-14 17:27:47 +01:00
|
|
|
*/
|
2007-12-27 17:38:25 +01:00
|
|
|
public String getPKCS11Library() {
|
|
|
|
return pkcs11Library;
|
2007-11-14 17:27:47 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2007-12-27 17:38:25 +01:00
|
|
|
* Sets the PKCS11 library file location, needed when the
|
2007-11-30 20:40:31 +01:00
|
|
|
* Keystore type is PKCS11
|
2007-11-14 17:27:47 +01:00
|
|
|
*
|
2007-12-27 17:38:25 +01:00
|
|
|
* @param pkcs11Library the path to the PKCS11 library file
|
2007-11-14 17:27:47 +01:00
|
|
|
*/
|
2007-12-27 17:38:25 +01:00
|
|
|
public void setPKCS11Library(String pkcs11Library) {
|
|
|
|
this.pkcs11Library = pkcs11Library;
|
2007-11-14 17:27:47 +01:00
|
|
|
}
|
|
|
|
|
2006-01-17 21:02:11 +01:00
|
|
|
/**
|
|
|
|
* Returns true if the whole chain of certificates presented by the server are going to
|
2006-01-17 22:27:44 +01:00
|
|
|
* be checked. By default the certificate chain is not verified.
|
2006-01-17 21:02:11 +01:00
|
|
|
*
|
|
|
|
* @return true if the whole chaing of certificates presented by the server are going to
|
|
|
|
* be checked.
|
|
|
|
*/
|
|
|
|
public boolean isVerifyChainEnabled() {
|
|
|
|
return verifyChainEnabled;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Sets if the whole chain of certificates presented by the server are going to
|
2006-01-17 22:27:44 +01:00
|
|
|
* be checked. By default the certificate chain is not verified.
|
2006-01-17 21:02:11 +01:00
|
|
|
*
|
|
|
|
* @param verifyChainEnabled if the whole chaing of certificates presented by the server
|
|
|
|
* are going to be checked.
|
|
|
|
*/
|
|
|
|
public void setVerifyChainEnabled(boolean verifyChainEnabled) {
|
|
|
|
this.verifyChainEnabled = verifyChainEnabled;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2006-01-17 22:27:44 +01:00
|
|
|
* Returns true if root CA checking is going to be done. By default checking is disabled.
|
2006-01-17 21:02:11 +01:00
|
|
|
*
|
|
|
|
* @return true if root CA checking is going to be done.
|
|
|
|
*/
|
|
|
|
public boolean isVerifyRootCAEnabled() {
|
|
|
|
return verifyRootCAEnabled;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2006-01-17 22:27:44 +01:00
|
|
|
* Sets if root CA checking is going to be done. By default checking is disabled.
|
2006-01-17 21:02:11 +01:00
|
|
|
*
|
|
|
|
* @param verifyRootCAEnabled if root CA checking is going to be done.
|
|
|
|
*/
|
|
|
|
public void setVerifyRootCAEnabled(boolean verifyRootCAEnabled) {
|
|
|
|
this.verifyRootCAEnabled = verifyRootCAEnabled;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Returns true if self-signed certificates are going to be accepted. By default
|
|
|
|
* this option is disabled.
|
|
|
|
*
|
|
|
|
* @return true if self-signed certificates are going to be accepted.
|
|
|
|
*/
|
|
|
|
public boolean isSelfSignedCertificateEnabled() {
|
|
|
|
return selfSignedCertificateEnabled;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Sets if self-signed certificates are going to be accepted. By default
|
|
|
|
* this option is disabled.
|
|
|
|
*
|
|
|
|
* @param selfSignedCertificateEnabled if self-signed certificates are going to be accepted.
|
|
|
|
*/
|
|
|
|
public void setSelfSignedCertificateEnabled(boolean selfSignedCertificateEnabled) {
|
|
|
|
this.selfSignedCertificateEnabled = selfSignedCertificateEnabled;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Returns true if certificates presented by the server are going to be checked for their
|
2006-01-17 22:27:44 +01:00
|
|
|
* validity. By default certificates are not verified.
|
2006-01-17 21:02:11 +01:00
|
|
|
*
|
|
|
|
* @return true if certificates presented by the server are going to be checked for their
|
|
|
|
* validity.
|
|
|
|
*/
|
|
|
|
public boolean isExpiredCertificatesCheckEnabled() {
|
|
|
|
return expiredCertificatesCheckEnabled;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Sets if certificates presented by the server are going to be checked for their
|
2006-01-17 22:27:44 +01:00
|
|
|
* validity. By default certificates are not verified.
|
2006-01-17 21:02:11 +01:00
|
|
|
*
|
|
|
|
* @param expiredCertificatesCheckEnabled if certificates presented by the server are going
|
|
|
|
* to be checked for their validity.
|
|
|
|
*/
|
|
|
|
public void setExpiredCertificatesCheckEnabled(boolean expiredCertificatesCheckEnabled) {
|
|
|
|
this.expiredCertificatesCheckEnabled = expiredCertificatesCheckEnabled;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Returns true if certificates presented by the server are going to be checked for their
|
2006-01-17 22:27:44 +01:00
|
|
|
* domain. By default certificates are not verified.
|
2006-01-17 21:02:11 +01:00
|
|
|
*
|
|
|
|
* @return true if certificates presented by the server are going to be checked for their
|
|
|
|
* domain.
|
|
|
|
*/
|
|
|
|
public boolean isNotMatchingDomainCheckEnabled() {
|
|
|
|
return notMatchingDomainCheckEnabled;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Sets if certificates presented by the server are going to be checked for their
|
2006-01-17 22:27:44 +01:00
|
|
|
* domain. By default certificates are not verified.
|
2006-01-17 21:02:11 +01:00
|
|
|
*
|
|
|
|
* @param notMatchingDomainCheckEnabled if certificates presented by the server are going
|
|
|
|
* to be checked for their domain.
|
|
|
|
*/
|
|
|
|
public void setNotMatchingDomainCheckEnabled(boolean notMatchingDomainCheckEnabled) {
|
|
|
|
this.notMatchingDomainCheckEnabled = notMatchingDomainCheckEnabled;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Returns true if the connection is going to use stream compression. Stream compression
|
|
|
|
* will be requested after TLS was established (if TLS was enabled) and only if the server
|
|
|
|
* offered stream compression. With stream compression network traffic can be reduced
|
|
|
|
* up to 90%. By default compression is disabled.
|
|
|
|
*
|
|
|
|
* @return true if the connection is going to use stream compression.
|
|
|
|
*/
|
|
|
|
public boolean isCompressionEnabled() {
|
|
|
|
return compressionEnabled;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Sets if the connection is going to use stream compression. Stream compression
|
|
|
|
* will be requested after TLS was established (if TLS was enabled) and only if the server
|
|
|
|
* offered stream compression. With stream compression network traffic can be reduced
|
|
|
|
* up to 90%. By default compression is disabled.
|
|
|
|
*
|
|
|
|
* @param compressionEnabled if the connection is going to use stream compression.
|
|
|
|
*/
|
|
|
|
public void setCompressionEnabled(boolean compressionEnabled) {
|
|
|
|
this.compressionEnabled = compressionEnabled;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Returns true if the client is going to use SASL authentication when logging into the
|
|
|
|
* server. If SASL authenticatin fails then the client will try to use non-sasl authentication.
|
|
|
|
* By default SASL is enabled.
|
|
|
|
*
|
|
|
|
* @return true if the client is going to use SASL authentication when logging into the
|
|
|
|
* server.
|
|
|
|
*/
|
|
|
|
public boolean isSASLAuthenticationEnabled() {
|
|
|
|
return saslAuthenticationEnabled;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2007-01-11 20:01:24 +01:00
|
|
|
* Sets whether the client will use SASL authentication when logging into the
|
2006-01-17 21:02:11 +01:00
|
|
|
* server. If SASL authenticatin fails then the client will try to use non-sasl authentication.
|
2007-01-11 20:01:24 +01:00
|
|
|
* By default, SASL is enabled.
|
2006-01-17 21:02:11 +01:00
|
|
|
*
|
|
|
|
* @param saslAuthenticationEnabled if the client is going to use SASL authentication when
|
|
|
|
* logging into the server.
|
|
|
|
*/
|
|
|
|
public void setSASLAuthenticationEnabled(boolean saslAuthenticationEnabled) {
|
|
|
|
this.saslAuthenticationEnabled = saslAuthenticationEnabled;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Returns true if the new connection about to be establish is going to be debugged. By
|
|
|
|
* default the value of {@link XMPPConnection#DEBUG_ENABLED} is used.
|
|
|
|
*
|
|
|
|
* @return true if the new connection about to be establish is going to be debugged.
|
|
|
|
*/
|
|
|
|
public boolean isDebuggerEnabled() {
|
|
|
|
return debuggerEnabled;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Sets if the new connection about to be establish is going to be debugged. By
|
|
|
|
* default the value of {@link XMPPConnection#DEBUG_ENABLED} is used.
|
|
|
|
*
|
|
|
|
* @param debuggerEnabled if the new connection about to be establish is going to be debugged.
|
|
|
|
*/
|
|
|
|
public void setDebuggerEnabled(boolean debuggerEnabled) {
|
|
|
|
this.debuggerEnabled = debuggerEnabled;
|
|
|
|
}
|
2006-09-14 21:16:40 +02:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Sets if the reconnection mechanism is allowed to be used. By default
|
|
|
|
* reconnection is allowed.
|
|
|
|
*
|
|
|
|
* @param isAllowed if the reconnection mechanism is allowed to use.
|
|
|
|
*/
|
|
|
|
public void setReconnectionAllowed(boolean isAllowed) {
|
|
|
|
this.reconnectionAllowed = isAllowed;
|
|
|
|
}
|
|
|
|
/**
|
|
|
|
* Returns if the reconnection mechanism is allowed to be used. By default
|
|
|
|
* reconnection is allowed.
|
|
|
|
*
|
|
|
|
* @return if the reconnection mechanism is allowed to be used.
|
|
|
|
*/
|
|
|
|
public boolean isReconnectionAllowed() {
|
|
|
|
return this.reconnectionAllowed;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Sets the socket factory used to create new xmppConnection sockets.
|
2007-01-11 20:01:24 +01:00
|
|
|
* This is useful when connecting through SOCKS5 proxies.
|
|
|
|
*
|
2006-09-14 21:16:40 +02:00
|
|
|
* @param socketFactory used to create new sockets.
|
|
|
|
*/
|
|
|
|
public void setSocketFactory(SocketFactory socketFactory) {
|
|
|
|
this.socketFactory = socketFactory;
|
|
|
|
}
|
2007-01-11 20:01:24 +01:00
|
|
|
|
2008-10-24 07:17:50 +02:00
|
|
|
/**
|
|
|
|
* Sets if an initial available presence will be sent to the server. By default
|
|
|
|
* an available presence will be sent to the server indicating that this presence
|
|
|
|
* is not online and available to receive messages. If you want to log in without
|
|
|
|
* being 'noticed' then pass a <tt>false</tt> value.
|
|
|
|
*
|
|
|
|
* @param sendPresence true if an initial available presence will be sent while logging in.
|
|
|
|
*/
|
|
|
|
public void setSendPresence(boolean sendPresence) {
|
|
|
|
this.sendPresence = sendPresence;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Returns true if the roster will be loaded from the server when logging in. This
|
|
|
|
* is the common behaviour for clients but sometimes clients may want to differ this
|
|
|
|
* or just never do it if not interested in rosters.
|
|
|
|
*
|
|
|
|
* @return true if the roster will be loaded from the server when logging in.
|
|
|
|
*/
|
|
|
|
public boolean isRosterLoadedAtLogin() {
|
|
|
|
return rosterLoadedAtLogin;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Sets if the roster will be loaded from the server when logging in. This
|
|
|
|
* is the common behaviour for clients but sometimes clients may want to differ this
|
|
|
|
* or just never do it if not interested in rosters.
|
|
|
|
*
|
|
|
|
* @param rosterLoadedAtLogin if the roster will be loaded from the server when logging in.
|
|
|
|
*/
|
|
|
|
public void setRosterLoadedAtLogin(boolean rosterLoadedAtLogin) {
|
|
|
|
this.rosterLoadedAtLogin = rosterLoadedAtLogin;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Returns a CallbackHandler to obtain information, such as the password or
|
|
|
|
* principal information during the SASL authentication. A CallbackHandler
|
|
|
|
* will be used <b>ONLY</b> if no password was specified during the login while
|
|
|
|
* using SASL authentication.
|
|
|
|
*
|
|
|
|
* @return a CallbackHandler to obtain information, such as the password or
|
|
|
|
* principal information during the SASL authentication.
|
|
|
|
*/
|
|
|
|
public CallbackHandler getCallbackHandler() {
|
|
|
|
return callbackHandler;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Sets a CallbackHandler to obtain information, such as the password or
|
|
|
|
* principal information during the SASL authentication. A CallbackHandler
|
|
|
|
* will be used <b>ONLY</b> if no password was specified during the login while
|
|
|
|
* using SASL authentication.
|
|
|
|
*
|
|
|
|
* @param callbackHandler to obtain information, such as the password or
|
|
|
|
* principal information during the SASL authentication.
|
|
|
|
*/
|
|
|
|
public void setCallbackHandler(CallbackHandler callbackHandler) {
|
|
|
|
this.callbackHandler = callbackHandler;
|
|
|
|
}
|
|
|
|
|
2006-09-14 21:16:40 +02:00
|
|
|
/**
|
|
|
|
* Returns the socket factory used to create new xmppConnection sockets.
|
2007-01-11 20:01:24 +01:00
|
|
|
* This is useful when connecting through SOCKS5 proxies.
|
2006-09-14 21:16:40 +02:00
|
|
|
*
|
|
|
|
* @return socketFactory used to create new sockets.
|
|
|
|
*/
|
|
|
|
public SocketFactory getSocketFactory() {
|
|
|
|
return this.socketFactory;
|
|
|
|
}
|
2006-11-10 20:06:33 +01:00
|
|
|
|
2007-01-11 20:01:24 +01:00
|
|
|
/**
|
|
|
|
* An enumeration for TLS security modes that are available when making a connection
|
|
|
|
* to the XMPP server.
|
|
|
|
*/
|
|
|
|
public static enum SecurityMode {
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Securirty via TLS encryption is required in order to connect. If the server
|
|
|
|
* does not offer TLS or if the TLS negotiaton fails, the connection to the server
|
|
|
|
* will fail.
|
|
|
|
*/
|
|
|
|
required,
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Security via TLS encryption is used whenever it's available. This is the
|
|
|
|
* default setting.
|
|
|
|
*/
|
|
|
|
enabled,
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Security via TLS encryption is disabled and only un-encrypted connections will
|
|
|
|
* be used. If only TLS encryption is available from the server, the connection
|
|
|
|
* will fail.
|
|
|
|
*/
|
|
|
|
disabled
|
2006-09-14 21:16:40 +02:00
|
|
|
}
|
2006-11-10 20:06:33 +01:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Returns the username to use when trying to reconnect to the server.
|
|
|
|
*
|
|
|
|
* @return the username to use when trying to reconnect to the server.
|
2006-09-14 21:16:40 +02:00
|
|
|
*/
|
2007-01-11 20:01:24 +01:00
|
|
|
String getUsername() {
|
2006-09-14 21:16:40 +02:00
|
|
|
return this.username;
|
|
|
|
}
|
2006-11-10 20:06:33 +01:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Returns the password to use when trying to reconnect to the server.
|
|
|
|
*
|
|
|
|
* @return the password to use when trying to reconnect to the server.
|
2006-09-14 21:16:40 +02:00
|
|
|
*/
|
2007-01-11 20:01:24 +01:00
|
|
|
String getPassword() {
|
2006-09-14 21:16:40 +02:00
|
|
|
return this.password;
|
|
|
|
}
|
2006-11-10 20:06:33 +01:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Returns the resource to use when trying to reconnect to the server.
|
|
|
|
*
|
|
|
|
* @return the resource to use when trying to reconnect to the server.
|
|
|
|
*/
|
2007-01-11 20:01:24 +01:00
|
|
|
String getResource() {
|
2006-11-10 20:06:33 +01:00
|
|
|
return resource;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Returns true if an available presence should be sent when logging in while reconnecting.
|
|
|
|
*
|
|
|
|
* @return true if an available presence should be sent when logging in while reconnecting
|
|
|
|
*/
|
2007-01-11 20:01:24 +01:00
|
|
|
boolean isSendPresence() {
|
2006-11-10 20:06:33 +01:00
|
|
|
return sendPresence;
|
|
|
|
}
|
2007-01-11 20:01:24 +01:00
|
|
|
|
2008-10-24 07:17:50 +02:00
|
|
|
void setLoginInfo(String username, String password, String resource) {
|
2007-01-11 20:01:24 +01:00
|
|
|
this.username = username;
|
|
|
|
this.password = password;
|
|
|
|
this.resource = resource;
|
|
|
|
}
|
2007-11-14 17:27:47 +01:00
|
|
|
}
|