diff src/toc.c @ 1:2846a03bda67

[gaim-migrate @ 10] The other missing files :) committer: Tailor Script <tailor@pidgin.im>
author Rob Flynn <gaim@robflynn.com>
date Thu, 23 Mar 2000 03:13:54 +0000
parents
children 34db9f242899
line wrap: on
line diff
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/src/toc.c	Thu Mar 23 03:13:54 2000 +0000
@@ -0,0 +1,833 @@
+/*
+ * gaim
+ *
+ * Copyright (C) 1998-1999, Mark Spencer <markster@marko.net>
+ *
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation; either version 2 of the License, or
+ * (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program; if not, write to the Free Software
+ * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA  02111-1307  USA
+ *
+ */
+
+
+
+#include <netdb.h>
+#include <gtk/gtk.h>
+#include <unistd.h>
+#include <errno.h>
+#include <netinet/in.h>
+#include <arpa/inet.h>
+#include <string.h>
+#include <stdlib.h>
+#include <stdio.h>
+#include <time.h>
+#include <sys/socket.h>
+#include "gaim.h"
+#include "gnome_applet_mgr.h"
+
+
+
+/* descriptor for talking to TOC */
+static int toc_fd;
+static int seqno;
+static unsigned int peer_ver=0;
+static int state;
+static int inpa=-1;
+#ifdef _WIN32
+static int win32_r;
+#endif
+
+int toc_signon(char *username, char *password);
+
+
+
+int toc_login(char *username, char *password)
+{
+	char *config;
+        struct in_addr *sin;
+        struct aim_user *u;
+	char buf[80];
+	char buf2[2048];
+
+	g_snprintf(buf, sizeof(buf), "Looking up %s", aim_host);	
+	set_login_progress(1, buf);
+
+	sin = (struct in_addr *)get_address(aim_host);
+	if (!sin) {
+	        
+#ifdef USE_APPLET
+		setUserState(offline);
+#endif /* USE_APPLET */
+                set_state(STATE_OFFLINE);
+		g_snprintf(buf, sizeof(buf), "Unable to lookup %s", aim_host);
+		hide_login_progress(buf);
+		return -1;
+	}
+	
+	g_snprintf(toc_addy, sizeof(toc_addy), "%s", inet_ntoa(*sin));
+	g_snprintf(buf, sizeof(buf), "Connecting to %s", inet_ntoa(*sin));
+	
+	set_login_progress(2, buf);
+
+
+	
+	toc_fd = connect_address(sin->s_addr, aim_port);
+
+        if (toc_fd < 0) {
+#ifdef USE_APPLET
+		setUserState(offline);
+#endif /* USE_APPLET */
+                set_state(STATE_OFFLINE);
+		g_snprintf(buf, sizeof(buf), "Connect to %s failed",
+			 inet_ntoa(*sin));
+		hide_login_progress(buf);
+		return -1;
+        }
+
+        g_free(sin);
+	
+	g_snprintf(buf, sizeof(buf), "Signon: %s",username);
+	
+	set_login_progress(3, buf);
+	
+	if (toc_signon(username, password) < 0) {
+#ifdef USE_APPLET
+		setUserState(offline);
+#endif /* USE_APPLET */
+                set_state(STATE_OFFLINE);
+		hide_login_progress("Disconnected.");
+		return -1;
+	}
+
+	g_snprintf(buf, sizeof(buf), "Waiting for reply...");
+	set_login_progress(4, buf);
+	if (toc_wait_signon() < 0) {
+#ifdef USE_APPLET
+		setUserState(offline);
+#endif /* USE_APPLET */
+                set_state(STATE_OFFLINE);
+		hide_login_progress("Authentication Failed");
+		return -1;
+	}
+
+        u = find_user(username);
+
+        if (!u) {
+                u = g_new0(struct aim_user, 1);
+                g_snprintf(u->user_info, sizeof(u->user_info), DEFAULT_INFO);
+                aim_users = g_list_append(aim_users, u);
+        }
+
+        current_user = u;
+        
+	g_snprintf(current_user->username, sizeof(current_user->username), "%s", username);
+	g_snprintf(current_user->password, sizeof(current_user->password), "%s", password);
+
+	save_prefs();
+
+	g_snprintf(buf, sizeof(buf), "Retrieving config...");
+	set_login_progress(5, buf);
+        if ((config=toc_wait_config()) == NULL) {
+		hide_login_progress("No Configuration");
+		set_state(STATE_OFFLINE);
+		return -1;
+
+	}
+
+        
+#ifdef USE_APPLET
+ 	if (applet_buddy_auto_show) {
+                make_buddy();
+                parse_toc_buddy_list(config);
+                refresh_buddy_window();
+                set_applet_draw_open();
+        } else {
+                make_buddy();
+                gnome_buddy_hide();
+                parse_toc_buddy_list(config);
+                set_applet_draw_closed();
+        }
+
+       
+	setUserState(online);
+#else
+        gtk_widget_hide(mainwindow);
+	show_buddy_list();
+        parse_toc_buddy_list(config);
+        refresh_buddy_window();
+#endif
+        
+        
+	g_snprintf(buf2, sizeof(buf2), "toc_init_done");
+	sflap_send(buf2, -1, TYPE_DATA);
+
+#if 0
+	g_snprintf(buf2, sizeof(buf2), "toc_set_caps %s",
+		   FILETRANS_UID);
+	sflap_send(buf2, -1, TYPE_DATA);
+#endif
+        
+        serv_finish_login();
+	return 0;
+}
+
+void toc_close()
+{
+#ifdef USE_APPLET
+	setUserState(offline);
+#endif /* USE_APPLET */
+        seqno = 0;
+        state = STATE_OFFLINE;
+        if (inpa > 0)
+		gdk_input_remove(inpa);
+	close(toc_fd);
+	toc_fd=-1;
+	inpa=-1;
+}
+
+unsigned char *roast_password(char *pass)
+{
+	/* Trivial "encryption" */
+	static char rp[256];
+	static char *roast = ROAST;
+	int pos=2;
+	int x;
+	strcpy(rp, "0x");
+	for (x=0;(x<150) && pass[x]; x++) 
+		pos+=sprintf(&rp[pos],"%02x", pass[x] ^ roast[x % strlen(roast)]);
+	rp[pos]='\0';
+        return rp;
+}
+
+
+char *print_header(void *hdr_v)
+{
+	static char s[80];
+	struct sflap_hdr *hdr = (struct sflap_hdr *)hdr_v;
+	g_snprintf(s,sizeof(s), "[ ast: %c, type: %d, seqno: %d, len: %d ]",
+		hdr->ast, hdr->type, ntohs(hdr->seqno), ntohs(hdr->len));
+	return s;
+}
+
+void print_buffer(char *buf, int len)
+{
+#if 0
+	int x;
+	printf("[ ");
+	for (x=0;x<len;x++) 
+		printf("%d ", buf[x]);
+	printf("]\n");
+	printf("[ ");
+	for (x=0;x<len;x++)
+		printf("%c ", buf[x]);
+	printf("]\n");
+#endif
+}
+
+int sflap_send(char *buf, int olen, int type)
+{
+	int len;
+	int slen=0;
+	struct sflap_hdr hdr;
+	char obuf[MSG_LEN];
+
+        /* One _last_ 2048 check here!  This shouldn't ever
+         * get hit though, hopefully.  If it gets hit on an IM
+         * It'll lose the last " and the message won't go through,
+         * but this'll stop a segfault. */
+        if (strlen(buf) > (MSG_LEN - sizeof(hdr))) {
+                buf[MSG_LEN - sizeof(hdr) - 3] = '"';
+                buf[MSG_LEN - sizeof(hdr) - 2] = '\0';
+        }
+
+        sprintf(debug_buff,"%s [Len %d]\n", buf, strlen(buf));
+		debug_print(debug_buff);
+        
+
+	
+	if (olen < 0)
+		len = escape_message(buf);
+	else
+		len = olen;
+	hdr.ast = '*';
+	hdr.type = type;
+	hdr.seqno = htons(seqno++ & 0xffff);
+        hdr.len = htons(len + (type == TYPE_SIGNON ? 0 : 1));
+
+    sprintf(debug_buff,"Escaped message is '%s'\n",buf);
+	debug_print(debug_buff);
+
+	memcpy(obuf, &hdr, sizeof(hdr));
+	slen += sizeof(hdr);
+	memcpy(&obuf[slen], buf, len);
+	slen += len;
+	if (type != TYPE_SIGNON) {
+		obuf[slen]='\0';
+		slen += 1;
+	}
+	print_buffer(obuf, slen);
+
+	return write(toc_fd, obuf, slen);
+}
+
+
+int wait_reply(char *buffer, int buflen)
+{
+        int res=6;
+	struct sflap_hdr *hdr=(struct sflap_hdr *)buffer;
+        char *c;
+
+        while((res = read(toc_fd, buffer, 1))) {
+		if (res < 0)
+			return res;
+		if (buffer[0] == '*')
+                        break;
+
+	}
+
+	res = read(toc_fd, buffer+1, sizeof(struct sflap_hdr) - 1);
+
+        if (res < 0)
+		return res;
+
+	res += 1;
+	
+        
+	sprintf(debug_buff, "Rcv: %s %s\n",print_header(buffer), "");
+	debug_print(debug_buff);
+
+
+
+        while (res < (sizeof(struct sflap_hdr) + ntohs(hdr->len))) {
+		res += read(toc_fd, buffer + res, (ntohs(hdr->len) + sizeof(struct sflap_hdr)) - res);
+		while(gtk_events_pending())
+			gtk_main_iteration();
+	}
+        
+        if (res >= sizeof(struct sflap_hdr)) 
+		buffer[res]='\0';
+	else
+		return res - sizeof(struct sflap_hdr);
+		
+	switch(hdr->type) {
+	case TYPE_SIGNON:
+		memcpy(&peer_ver, buffer + sizeof(struct sflap_hdr), 4);
+		peer_ver = ntohl(peer_ver);
+		seqno = ntohs(hdr->seqno);
+		state = STATE_SIGNON_REQUEST;
+		break;
+	case TYPE_DATA:
+		if (!strncasecmp(buffer + sizeof(struct sflap_hdr), "SIGN_ON:", strlen("SIGN_ON:")))
+			state = STATE_SIGNON_ACK;
+		else if (!strncasecmp(buffer + sizeof(struct sflap_hdr), "CONFIG:", strlen("CONFIG:"))) {
+			state = STATE_CONFIG;
+		} else if (state != STATE_ONLINE && !strncasecmp(buffer + sizeof(struct sflap_hdr), "ERROR:", strlen("ERROR:"))) {
+			c = strtok(buffer + sizeof(struct sflap_hdr) + strlen("ERROR:"), ":");
+			show_error_dialog(c);
+		}
+
+		sprintf(debug_buff, "Data: %s\n",buffer + sizeof(struct sflap_hdr));
+		debug_print(debug_buff);
+
+		break;
+	default:
+			sprintf(debug_buff, "Unknown/unimplemented packet type %d\n",hdr->type);
+			debug_print(debug_buff);
+	}
+        return res;
+}
+
+
+
+void toc_callback( gpointer          data,
+                   gint              source,
+                   GdkInputCondition condition )
+{
+        char *buf;
+	char *c;
+        char *l;
+
+        buf = g_malloc(BUF_LONG);
+        if (wait_reply(buf, BUF_LONG) < 0) {
+                signoff();
+                hide_login_progress("Connection Closed");
+                g_free(buf);
+		return;
+        }
+                         
+        
+	c=strtok(buf+sizeof(struct sflap_hdr),":");	/* Ditch the first part */
+	if (!strcasecmp(c,"UPDATE_BUDDY")) {
+		char *uc;
+		int logged, evil, idle, type = 0;
+                time_t signon;
+                time_t time_idle;
+		
+		c = strtok(NULL,":"); /* c is name */
+
+		l = strtok(NULL,":"); /* l is T/F logged status */
+       	
+		sscanf(strtok(NULL, ":"), "%d", &evil);
+		
+		sscanf(strtok(NULL, ":"), "%ld", &signon);
+		
+		sscanf(strtok(NULL, ":"), "%d", &idle);
+		
+                uc = strtok(NULL, ":");
+
+
+		if (!strncasecmp(l,"T",1))
+			logged = 1;
+		else
+			logged = 0;
+
+
+		if (uc[0] == 'A')
+			type |= UC_AOL;
+		
+		switch(uc[1]) {
+		case 'A':
+			type |= UC_ADMIN;
+			break;
+		case 'U':
+			type |= UC_UNCONFIRMED;
+			break;
+		case 'O':
+			type |= UC_NORMAL;
+			break;
+		default:
+			break;
+		}
+
+                switch(uc[2]) {
+		case 'U':
+			type |= UC_UNAVAILABLE;
+			break;
+		default:
+			break;
+		}
+
+                if (idle) {
+                        time(&time_idle);
+                        time_idle -= idle*60;
+                } else
+                        time_idle = 0;
+		
+                serv_got_update(c, logged, evil, signon, time_idle, type);
+
+	} else if (!strcasecmp(c, "ERROR")) {
+		c = strtok(NULL,":");
+		show_error_dialog(c);
+	} else if (!strcasecmp(c, "NICK")) {
+		c = strtok(NULL,":");
+		g_snprintf(current_user->username, sizeof(current_user->username), "%s", c);
+	} else if (!strcasecmp(c, "IM_IN")) {
+		char *away, *message;
+                int a = 0;
+                
+		c = strtok(NULL,":");
+		away = strtok(NULL,":");
+
+		message = away;
+
+                while(*message && (*message != ':'))
+                        message++;
+
+                message++;
+
+		if (!strncasecmp(away, "T", 1))
+			a = 1;
+                serv_got_im(c, message, a);
+		
+	} else if (!strcasecmp(c, "GOTO_URL")) {
+		char *name;
+		char *url;
+
+		char tmp[256];
+		
+		name = strtok(NULL, ":");
+		url = strtok(NULL, ":");
+
+
+		g_snprintf(tmp, sizeof(tmp), "http://%s:%d/%s", toc_addy, aim_port, url);
+/*		fprintf(stdout, "Name: %s\n%s\n", name, url);
+		printf("%s", grab_url(tmp));*/
+		g_show_info(tmp);
+        } else if (!strcasecmp(c, "EVILED")) {
+                int lev;
+		char *name = NULL;
+
+                sscanf(strtok(NULL, ":"), "%d", &lev);
+                name = strtok(NULL, ":");
+
+                sprintf(debug_buff,"%s | %d\n", name, lev);
+				debug_print(debug_buff);
+
+		serv_got_eviled(name, lev);
+		
+        } else if (!strcasecmp(c, "CHAT_JOIN")) {
+                char *name;
+                int id;
+                
+
+		sscanf(strtok(NULL, ":"), "%d", &id);
+                name = strtok(NULL, ":");
+                serv_got_joined_chat(id, name);
+
+	} else if (!strcasecmp(c, "DIR_STATUS")) {
+	} else if (!strcasecmp(c, "CHAT_UPDATE_BUDDY")) {
+		int id;
+		char *in;
+		char *buddy;
+                GList *bcs = buddy_chats;
+		struct buddy_chat *b = NULL;
+		
+		sscanf(strtok(NULL, ":"), "%d", &id);
+
+		in = strtok(NULL, ":");
+
+		while(bcs) {
+			b = (struct buddy_chat *)bcs->data;
+			if (id == b->id)
+				break;	
+			bcs = bcs->next;
+                        b = NULL;
+		}
+		
+		if (!b)
+			return;
+
+		
+		if (!strcasecmp(in, "T")) {
+			while((buddy = strtok(NULL, ":")) != NULL) {
+				add_chat_buddy(b, buddy);
+			}
+		} else {
+			while((buddy = strtok(NULL, ":")) != NULL) {
+				remove_chat_buddy(b, buddy);
+			}
+		}
+
+	} else if (!strcasecmp(c, "CHAT_LEFT")) {
+		int id;
+
+
+                sscanf(strtok(NULL, ":"), "%d", &id);
+
+                serv_got_chat_left(id);
+
+
+	} else if (!strcasecmp(c, "CHAT_IN")) {
+
+		int id, w;
+		char *m;
+		char *who, *whisper;
+
+	
+		sscanf(strtok(NULL, ":"), "%d", &id);
+		who = strtok(NULL, ":");
+		whisper = strtok(NULL, ":");
+		m = whisper;
+                while(*m && (*m != ':')) m++;
+                m++;
+
+                if (!strcasecmp(whisper, "T"))
+			w = 1;
+		else
+			w = 0;
+
+		serv_got_chat_in(id, who, w, m);
+
+
+	} else if (!strcasecmp(c, "CHAT_INVITE")) {
+		char *name;
+		char *who;
+		char *message;
+                int id;
+
+               
+		name = strtok(NULL, ":");
+		sscanf(strtok(NULL, ":"), "%d", &id);
+		who = strtok(NULL, ":");
+                message = strtok(NULL, ":");
+
+                serv_got_chat_invite(name, id, who, message);
+
+
+#if 0
+        } else if (!strcasecmp(c, "RVOUS_PROPOSE")) {
+                /* File trans.  Yummy. */
+                char *user;
+                char *uuid;
+                char *cookie;
+                int seq;
+                char *rip, *pip, *vip;
+                int port;
+                int unk[4];
+                char *messages[4];
+                int subtype, files, totalsize;
+                char *name;
+                char *tmp;
+                int i;
+                struct file_transfer *ft;
+                
+
+                user = strtok(NULL, ":");
+                uuid = strtok(NULL, ":");
+                cookie = strtok(NULL, ":");
+                sscanf(strtok(NULL, ":"), "%d", &seq);
+                rip = strtok(NULL, ":");
+                pip = strtok(NULL, ":");
+                vip = strtok(NULL, ":");
+                sscanf(strtok(NULL, ":"), "%d", &port);
+                for (i=0; i<4; i++) {
+                        sscanf(strtok(NULL, ":"), "%d", &unk[i]);
+                        if (unk[i] == 10001)
+                                break;
+                        messages[i] = frombase64(strtok(NULL, ":"));
+                }
+                
+                tmp = frombase64(strtok(NULL, ":"));
+
+                subtype = tmp[1];
+                files = tmp[3]; /* These are fine */
+
+                totalsize = (tmp[4] << 24 & 0xff) |
+                        (tmp[5] << 16 & 0xff) |
+                        (tmp[6] << 8 & 0xff) |
+                        (tmp[7] & 0xff);
+
+                name = tmp + 8;
+
+                ft = g_new0(struct file_transfer, 1);
+
+                ft->cookie = g_strdup(cookie);
+                ft->ip = g_strdup(pip);
+                ft->port = port;
+                if (i)
+                        ft->message = g_strdup(messages[0]);
+                else
+                        ft->message = NULL;
+                ft->filename = g_strdup(name);
+                ft->user = g_strdup(user);
+                ft->size = totalsize;
+                
+                g_free(tmp);
+
+                for (i--; i >= 0; i--)
+                        g_free(messages[i]);
+                
+                accept_file_dialog(ft);
+#endif
+	} else {
+		sprintf(debug_buff,"don't know what to do with %s\n", c);
+		debug_print(debug_buff);
+	}
+        g_free(buf);
+}
+
+
+int toc_signon(char *username, char *password)
+{
+	char buf[BUF_LONG];
+	int res;
+	struct signon so;
+
+        sprintf(debug_buff,"State = %d\n", state);
+	debug_print(debug_buff);
+
+	if ((res = write(toc_fd, FLAPON, strlen(FLAPON))) < 0)
+		return res;
+	/* Wait for signon packet */
+
+	state = STATE_FLAPON;
+
+	if ((res = wait_reply(buf, sizeof(buf)) < 0))
+		return res;
+	
+	if (state != STATE_SIGNON_REQUEST) {
+			sprintf(debug_buff, "State should be %d, but is %d instead\n", STATE_SIGNON_REQUEST, state);
+			debug_print(debug_buff);
+			return -1;
+	}
+	
+	/* Compose a response */
+	
+	g_snprintf(so.username, sizeof(so.username), "%s", username);
+	so.ver = ntohl(1);
+	so.tag = ntohs(1);
+	so.namelen = htons(strlen(so.username));	
+	
+	sflap_send((char *)&so, ntohs(so.namelen) + 8, TYPE_SIGNON);
+	
+	g_snprintf(buf, sizeof(buf), 
+		"toc_signon %s %d %s %s %s \"%s\"",
+		login_host, login_port, normalize(username), roast_password(password), LANGUAGE, REVISION);
+
+        sprintf(debug_buff,"Send: %s\n", buf);
+		debug_print(debug_buff);
+
+	return sflap_send(buf, -1, TYPE_DATA);
+}
+
+int toc_wait_signon()
+{
+	/* Wait for the SIGNON to be approved */
+	char buf[BUF_LEN];
+	int res;
+	res = wait_reply(buf, sizeof(buf));
+	if (res < 0)
+		return res;
+	if (state != STATE_SIGNON_ACK) {
+			sprintf(debug_buff, "State should be %d, but is %d instead\n",STATE_SIGNON_ACK, state);
+			debug_print(debug_buff);
+		return -1;
+	}
+	return 0;
+}
+
+#ifdef _WIN32
+gint win32_read()
+{
+        int ret;
+        struct fd_set fds;
+        struct timeval tv;
+
+        FD_ZERO(&fds);
+
+        tv.tv_sec = 0;
+        tv.tv_usec = 200;
+
+        FD_SET(toc_fd, &fds);
+
+        ret = select(toc_fd + 1, &fds, NULL, NULL, &tv);
+
+        if (ret == 0) {
+                return TRUE;
+        }
+
+        toc_callback(NULL, 0, (GdkInputCondition)0);
+        return TRUE;
+}
+#endif
+
+
+char *toc_wait_config()
+{
+	/* Waits for configuration packet, returning the contents of the packet */
+	static char buf[BUF_LEN];
+	int res;
+        res = wait_reply(buf, sizeof(buf));
+	if (res < 0)
+		return NULL;
+	if (state != STATE_CONFIG) {
+        sprintf(debug_buff , "State should be %d, but is %d instead\n",STATE_CONFIG, state);
+		debug_print(debug_buff);
+		return NULL;
+	}
+	/* At this point, it's time to setup automatic handling of incoming packets */
+        state = STATE_ONLINE;
+#ifdef _WIN32
+        win32_r = gtk_timeout_add(1000, (GtkFunction)win32_read, NULL);
+#else
+        inpa = gdk_input_add(toc_fd, GDK_INPUT_READ | GDK_INPUT_EXCEPTION, toc_callback, NULL);
+#endif
+	return buf;
+}
+
+
+void toc_build_config(char *s, int len)
+{
+    GList *grp = groups;
+    GList *mem;
+    struct group *g;
+        struct buddy *b;
+        GList *plist = permit;
+        GList *dlist = deny;
+
+    int pos=0;
+
+    if (!permdeny)
+                permdeny = 1;
+    pos += g_snprintf(&s[pos], len - pos, "m %d\n", permdeny);
+    while(grp) {
+        g = (struct group *)grp->data;
+        pos += g_snprintf(&s[pos], len - pos, "g %s\n", g->name);
+        mem = g->members;
+        while(mem) {
+            b = (struct buddy *)mem->data;
+            pos += g_snprintf(&s[pos], len - pos, "b %s\n", b->name);
+            mem = mem->next;
+        }
+        grp = grp ->next;
+        }
+        while(plist) {
+                pos += g_snprintf(&s[pos], len - pos, "p %s\n", (char *)plist->data);
+                plist=plist->next;
+
+        }
+        while(dlist) {
+                pos += g_snprintf(&s[pos], len - pos, "d %s\n", (char *)dlist->data);
+                dlist=dlist->next;
+        }
+}
+
+void parse_toc_buddy_list(char *config)
+{
+	char *c;
+        char current[256];
+	char *name;
+	GList *bud;
+        /* Clean out the permit/deny list!*/
+        g_list_free(permit);
+        g_list_free(deny);
+        permit = NULL;
+	deny = NULL;
+	bud = NULL;
+
+        
+        /* skip "CONFIG:" (if it exists)*/
+
+        c = strncmp(config + sizeof(struct sflap_hdr),"CONFIG:",strlen("CONFIG:"))?
+			strtok(config, "\n"):
+			strtok(config + sizeof(struct sflap_hdr)+strlen("CONFIG:"), "\n");
+     do {
+		if (c == NULL) 
+			break;
+		if (*c == 'g') {
+			strncpy(current,c+2, sizeof(current));
+			add_group(current);
+		} else if (*c == 'b') {
+			add_buddy(current, c+2);
+			bud = g_list_append(bud, c+2);
+        } else if (*c == 'p') {
+            name = g_malloc(strlen(c+2) + 2);
+            g_snprintf(name, strlen(c+2) + 1, "%s", c+2);
+            permit = g_list_append(permit, name);
+        } else if (*c == 'd') {
+            name = g_malloc(strlen(c+2) + 2);
+            g_snprintf(name, strlen(c+2) + 1, "%s", c+2);
+            deny = g_list_append(deny, name);
+        } else if (*c == 'm') {
+        	sscanf(c + strlen(c) - 1, "%d", &permdeny);
+        	if (permdeny == 0)
+			permdeny = 1;
+	   	}
+	}while((c=strtok(NULL,"\n"))); 
+#if 0
+	fprintf(stdout, "Sending message '%s'\n",buf);
+#endif
+       
+	serv_add_buddies(bud);
+        serv_set_permit_deny();
+ }