X-Git-Url: https://git.quassel-irc.org/?a=blobdiff_plain;f=src%2Fclient%2Fclientauthhandler.cpp;h=ce7c58d9583a9d4e2e7d1af306b36f5605df7397;hb=9f5f7f67cd4ccca7e6f922313aa0aa78246f7855;hp=c8ed7359cf63ebea648b9ca01cad6f866a7dd5e2;hpb=620cd1aa35e05099b3f84400dd33afc207c98244;p=quassel.git diff --git a/src/client/clientauthhandler.cpp b/src/client/clientauthhandler.cpp index c8ed7359..ce7c58d9 100644 --- a/src/client/clientauthhandler.cpp +++ b/src/client/clientauthhandler.cpp @@ -288,7 +288,7 @@ void ClientAuthHandler::startRegistration() useSsl = _account.useSsl(); #endif - _peer->dispatch(RegisterClient(Quassel::buildInfo().fancyVersionString, Quassel::buildInfo().commitDate, useSsl)); + _peer->dispatch(RegisterClient(Quassel::buildInfo().fancyVersionString, Quassel::buildInfo().commitDate, useSsl, Quassel::features())); } @@ -303,8 +303,10 @@ void ClientAuthHandler::handle(const ClientRegistered &msg) { _coreConfigured = msg.coreConfigured; _backendInfo = msg.backendInfo; + _authenticatorInfo = msg.authenticatorInfo; - Client::setCoreFeatures(static_cast(msg.coreFeatures)); + Client::setCoreFeatures(Quassel::Features(msg.coreFeatures)); + SignalProxy::current()->sourcePeer()->setFeatures(Quassel::Features(msg.coreFeatures)); // The legacy protocol enables SSL at this point if(_legacy && _account.useSsl()) @@ -321,7 +323,7 @@ void ClientAuthHandler::onConnectionReady() if (!_coreConfigured) { // start wizard - emit startCoreSetup(_backendInfo); + emit startCoreSetup(_backendInfo, _authenticatorInfo); } else // TODO: check if we need LoginEnabled login(); @@ -487,7 +489,7 @@ void ClientAuthHandler::onSslErrors() default: qWarning() << "Certificate digest version" << QString(knownDigestVersion) << "is not supported"; } - + if (knownDigest != calculatedDigest) { bool accepted = false; bool permanently = false;