+
+void CoreUserInputHandler::handleShowkey(const BufferInfo &bufferInfo, const QString &msg)
+{
+ QString bufname = bufferInfo.bufferName().isNull() ? "" : bufferInfo.bufferName();
+#ifdef HAVE_QCA2
+ if (!bufferInfo.isValid())
+ return;
+
+ if (!Cipher::neededFeaturesAvailable()) {
+ emit displayMsg(Message::Error, bufname, tr("Error: QCA provider plugin not found. It is usually provided by the qca-ossl plugin."));
+ return;
+ }
+
+ QStringList parms = msg.split(' ', QString::SkipEmptyParts);
+
+ if (parms.isEmpty() && !bufferInfo.bufferName().isEmpty())
+ parms.prepend(bufferInfo.bufferName());
+
+ if (parms.isEmpty()) {
+ emit displayMsg(Message::Info, bufname, tr("[usage] /showkey <nick|channel> shows the encryption key for nick or channel or just /showkey when in a channel or query."));
+ return;
+ }
+
+ QString target = parms.at(0);
+ QByteArray key = network()->cipherKey(target);
+
+ if (key.isEmpty()) {
+ emit displayMsg(Message::Info, bufname, tr("No key has been set for %1.").arg(target));
+ return;
+ }
+
+ emit displayMsg(Message::Info, bufname, tr("The key for %1 is %2").arg(target).arg(QString(key)));
+
+#else
+ Q_UNUSED(msg)
+ emit displayMsg(Message::Error, bufname, tr("Error: Setting an encryption key requires Quassel to have been built "
+ "with support for the Qt Cryptographic Architecture (QCA2) library. "
+ "Contact your distributor about a Quassel package with QCA2 "
+ "support, or rebuild Quassel with QCA2 present."));
+#endif
+}
+
+
+void CoreUserInputHandler::handleTopic(const BufferInfo &bufferInfo, const QString &msg)
+{
+ if (bufferInfo.bufferName().isEmpty())
+ return;
+
+ QList<QByteArray> params;
+ params << serverEncode(bufferInfo.bufferName());
+
+ if (!msg.isEmpty()) {
+# ifdef HAVE_QCA2
+ params << encrypt(bufferInfo.bufferName(), channelEncode(bufferInfo.bufferName(), msg));
+# else
+ params << channelEncode(bufferInfo.bufferName(), msg);
+# endif
+ }
+
+ emit putCmd("TOPIC", params);
+}
+
+
+void CoreUserInputHandler::handleVoice(const BufferInfo &bufferInfo, const QString &msg)
+{
+ QStringList nicks = msg.split(' ', QString::SkipEmptyParts);
+ QString m = "+"; for (int i = 0; i < nicks.count(); i++) m += 'v';
+ QStringList params;
+ params << bufferInfo.bufferName() << m << nicks;
+ emit putCmd("MODE", serverEncode(params));
+}
+
+
+void CoreUserInputHandler::handleWait(const BufferInfo &bufferInfo, const QString &msg)
+{
+ int splitPos = msg.indexOf(';');
+ if (splitPos <= 0)
+ return;
+
+ bool ok;
+ int delay = msg.left(splitPos).trimmed().toInt(&ok);
+ if (!ok)
+ return;
+
+ delay *= 1000;
+
+ QString command = msg.mid(splitPos + 1).trimmed();
+ if (command.isEmpty())
+ return;
+
+ _delayedCommands[startTimer(delay)] = Command(bufferInfo, command);
+}
+
+
+void CoreUserInputHandler::handleWho(const BufferInfo &bufferInfo, const QString &msg)
+{
+ Q_UNUSED(bufferInfo)
+ emit putCmd("WHO", serverEncode(msg.split(' ')));
+}
+
+
+void CoreUserInputHandler::handleWhois(const BufferInfo &bufferInfo, const QString &msg)
+{
+ Q_UNUSED(bufferInfo)
+ emit putCmd("WHOIS", serverEncode(msg.split(' ')));
+}
+
+
+void CoreUserInputHandler::handleWhowas(const BufferInfo &bufferInfo, const QString &msg)
+{
+ Q_UNUSED(bufferInfo)
+ emit putCmd("WHOWAS", serverEncode(msg.split(' ')));
+}
+
+
+void CoreUserInputHandler::defaultHandler(QString cmd, const BufferInfo &bufferInfo, const QString &msg)
+{
+ Q_UNUSED(bufferInfo);
+ emit putCmd(serverEncode(cmd.toUpper()), serverEncode(msg.split(" ")));
+}
+
+
+void CoreUserInputHandler::putPrivmsg(const QByteArray &target, const QByteArray &message, Cipher *cipher)
+{
+ // Encrypted messages need special care. There's no clear relation between cleartext and encrypted message length,
+ // so we can't just compute the maxSplitPos. Instead, we need to loop through the splitpoints until the crypted
+ // version is short enough...
+ // TODO: check out how the various possible encryption methods behave length-wise and make
+ // this clean by predicting the length of the crypted msg.
+ // For example, blowfish-ebc seems to create 8-char chunks.
+
+ static const char *cmd = "PRIVMSG";
+ static const char *splitter = " .,-";
+
+ int maxSplitPos = message.count();
+ int splitPos = maxSplitPos;
+ forever {
+ QByteArray crypted = message.left(splitPos);
+ bool isEncrypted = false;
+#ifdef HAVE_QCA2
+ if (cipher && !cipher->key().isEmpty() && !message.isEmpty()) {
+ isEncrypted = cipher->encrypt(crypted);
+ }
+#endif
+ int overrun = lastParamOverrun(cmd, QList<QByteArray>() << target << crypted);
+ if (overrun) {
+ // In case this is not an encrypted msg, we can just cut off at the end
+ if (!isEncrypted)
+ maxSplitPos = message.count() - overrun;
+
+ splitPos = -1;
+ for (const char *splitChar = splitter; *splitChar != 0; splitChar++) {
+ splitPos = qMax(splitPos, message.lastIndexOf(*splitChar, maxSplitPos) + 1); // keep split char on old line
+ }
+ if (splitPos <= 0 || splitPos > maxSplitPos)
+ splitPos = maxSplitPos;
+
+ maxSplitPos = splitPos - 1;
+ if (maxSplitPos <= 0) { // this should never happen, but who knows...
+ qWarning() << tr("[Error] Could not encrypt your message: %1").arg(message.data());
+ return;
+ }
+ continue; // we never come back here for !encrypted!
+ }
+
+ // now we have found a valid splitpos (or didn't need to split to begin with)
+ putCmd(cmd, QList<QByteArray>() << target << crypted);
+ if (splitPos < message.count())
+ putPrivmsg(target, message.mid(splitPos), cipher);
+
+ return;
+ }
+}
+
+