本文整理汇总了Golang中github.com/twstrike/coyim/xmpp/interfaces.Conn.In方法的典型用法代码示例。如果您正苦于以下问题:Golang Conn.In方法的具体用法?Golang Conn.In怎么用?Golang Conn.In使用的例子?那么恭喜您, 这里精选的方法代码示例或许可以为您提供帮助。您也可以进一步了解该方法所在类github.com/twstrike/coyim/xmpp/interfaces.Conn
的用法示例。
在下文中一共展示了Conn.In方法的4个代码示例,这些例子默认根据受欢迎程度排序。您可以为喜欢或者感觉有用的代码点赞,您的评价将有助于系统推荐出更棒的Golang代码示例。
示例1: next
// Scan XML token stream for next element and save into val.
// If val == nil, allocate new element based on proto map.
// Either way, return val.
func next(c interfaces.Conn) (xml.Name, interface{}, error) {
elem, err := nextElement(c.In())
if err != nil {
return xml.Name{}, nil, err
}
c.Lock().Lock()
defer c.Lock().Unlock()
switch el := elem.(type) {
case xml.StartElement:
return decodeStartElement(c, el)
case xml.EndElement:
return decodeEndElement(el)
}
return xml.Name{}, nil, fmt.Errorf("unexpected element %s", elem)
}
示例2: decodeStartElement
func decodeStartElement(c interfaces.Conn, se xml.StartElement) (xml.Name, interface{}, error) {
// Put it in an interface and allocate one.
var nv interface{}
if t, e := c.CustomStorage()[se.Name]; e {
nv = reflect.New(t).Interface()
} else if t, e := defaultStorage[se.Name]; e {
nv = reflect.New(t).Interface()
} else {
return xml.Name{}, nil, errors.New("unexpected XMPP message " +
se.Name.Space + " <" + se.Name.Local + "/>")
}
// Unmarshal into that storage.
if err := c.In().DecodeElement(nv, &se); err != nil {
return xml.Name{}, nil, err
}
return se.Name, nv, nil
}
示例3: startTLS
func (d *dialer) startTLS(c interfaces.Conn, conn net.Conn) error {
fmt.Fprintf(c.Out(), "<starttls xmlns='%s'/>", NsTLS)
proceed, err := nextStart(c.In())
if err != nil {
return err
}
if proceed.Name.Space != NsTLS || proceed.Name.Local != "proceed" {
return errors.New("xmpp: expected <proceed> after <starttls> but got <" + proceed.Name.Local + "> in " + proceed.Name.Space)
}
l := c.Config().GetLog()
io.WriteString(l, "Starting TLS handshake\n")
var tlsConfig tls.Config
if c.Config().TLSConfig != nil {
tlsConfig = *c.Config().TLSConfig
}
tlsConfig.ServerName = c.OriginDomain()
tlsConfig.InsecureSkipVerify = true
tlsConn := tls.Client(conn, &tlsConfig)
if err := tlsConn.Handshake(); err != nil {
return err
}
tlsState := tlsConn.ConnectionState()
printTLSDetails(l, tlsState)
if err = d.verifier.Verify(tlsState, tlsConfig, c.OriginDomain()); err != nil {
return err
}
d.bindTransport(c, tlsConn)
return nil
}
示例4: startTLS
func (d *dialer) startTLS(c interfaces.Conn, conn net.Conn) error {
address := d.GetServer()
fmt.Fprintf(c.Out(), "<starttls xmlns='%s'/>", NsTLS)
proceed, err := nextStart(c.In())
if err != nil {
return err
}
if proceed.Name.Space != NsTLS || proceed.Name.Local != "proceed" {
return errors.New("xmpp: expected <proceed> after <starttls> but got <" + proceed.Name.Local + "> in " + proceed.Name.Space)
}
l := c.Config().GetLog()
io.WriteString(l, "Starting TLS handshake\n")
var tlsConfig tls.Config
if c.Config().TLSConfig != nil {
tlsConfig = *c.Config().TLSConfig
}
tlsConfig.ServerName = c.OriginDomain()
tlsConfig.InsecureSkipVerify = true
tlsConn := tls.Client(conn, &tlsConfig)
if err := tlsConn.Handshake(); err != nil {
return err
}
tlsState := tlsConn.ConnectionState()
printTLSDetails(l, tlsState)
haveCertHash := len(c.Config().ServerCertificateSHA256) != 0
if haveCertHash {
h := sha256.New()
h.Write(tlsState.PeerCertificates[0].Raw)
if digest := h.Sum(nil); !bytes.Equal(digest, c.Config().ServerCertificateSHA256) {
return fmt.Errorf("xmpp: server certificate does not match expected hash (got: %x, want: %x)",
digest, c.Config().ServerCertificateSHA256)
}
} else {
if len(tlsState.PeerCertificates) == 0 {
return errors.New("xmpp: server has no certificates")
}
opts := x509.VerifyOptions{
Intermediates: x509.NewCertPool(),
Roots: tlsConfig.RootCAs,
}
for _, cert := range tlsState.PeerCertificates[1:] {
opts.Intermediates.AddCert(cert)
}
verifiedChains, err := tlsState.PeerCertificates[0].Verify(opts)
if err != nil {
return errors.New("xmpp: failed to verify TLS certificate: " + err.Error())
}
for i, cert := range verifiedChains[0] {
fmt.Fprintf(l, " certificate %d: %s\n", i, certName(cert))
}
leafCert := verifiedChains[0][0]
if err := leafCert.VerifyHostname(c.OriginDomain()); err != nil {
if c.Config().TrustedAddress {
fmt.Fprintf(l, "Certificate fails to verify against domain in username: %s\n", err)
host, _, err := net.SplitHostPort(address)
if err != nil {
return errors.New("xmpp: failed to split address when checking whether TLS certificate is valid: " + err.Error())
}
if err = leafCert.VerifyHostname(host); err != nil {
return errors.New("xmpp: failed to match TLS certificate to address after failing to match to username: " + err.Error())
}
fmt.Fprintf(l, "Certificate matches against trusted server hostname: %s\n", host)
} else {
return errors.New("xmpp: failed to match TLS certificate to name: " + err.Error())
}
}
}
d.bindTransport(c, tlsConn)
return nil
}