Mercurial > pidgin.yaz
diff libpurple/protocols/qq/qq_base.c @ 24074:c2253c485728
2008.10.04 - ccpaging <ccpagint(at)gmail.com>
* Update protocol for 2007
* Code cleanup
author | SHiNE CsyFeK <csyfek@gmail.com> |
---|---|
date | Wed, 22 Oct 2008 14:47:39 +0000 |
parents | 619ac2303c46 |
children | ec3f7d3e0445 |
line wrap: on
line diff
--- a/libpurple/protocols/qq/qq_base.c Wed Oct 22 14:46:44 2008 +0000 +++ b/libpurple/protocols/qq/qq_base.c Wed Oct 22 14:47:39 2008 +0000 @@ -66,7 +66,7 @@ struct tm *tm_local; qd = (qq_data *) gc->proto_data; - qq_show_packet("Login reply", data, len); + /* qq_show_packet("Login reply", data, len); */ if (len < 139) { purple_connection_error_reason(gc, @@ -665,7 +665,7 @@ qd->redirect_len = data_len; qd->redirect = g_realloc(qd->redirect, qd->redirect_len); qq_getdata(qd->redirect, qd->redirect_len, data); - qq_show_packet("Redirect to", qd->redirect, qd->redirect_len); + /* qq_show_packet("Redirect to", qd->redirect, qd->redirect_len); */ qq_getIP(&qd->redirect_ip, data + 11); purple_debug_info("QQ", "Get server %s\n", inet_ntoa(qd->redirect_ip)); @@ -912,7 +912,7 @@ bytes += qq_get16(&(qd->ld.token_ex_len), data + bytes); qd->ld.token_ex = g_realloc(qd->ld.token_ex, qd->ld.token_ex_len); bytes += qq_getdata(qd->ld.token_ex, qd->ld.token_ex_len, data + bytes); - qq_show_packet("Get token ex", qd->ld.token_ex, qd->ld.token_ex_len); + /* qq_show_packet("Get token ex", qd->ld.token_ex, qd->ld.token_ex_len); */ if(reply != 1) { @@ -932,7 +932,7 @@ bytes += qq_get16(&qd->captcha.token_len, data + bytes); qd->captcha.token = g_realloc(qd->captcha.token, qd->captcha.token_len); bytes += qq_getdata(qd->captcha.token, qd->captcha.token_len, data + bytes); - qq_show_packet("Get captcha token", qd->captcha.token, qd->captcha.token_len); + /* qq_show_packet("Get captcha token", qd->captcha.token, qd->captcha.token_len); */ purple_debug_info("QQ", "Request next captcha %d, new %d, total %d\n", qd->captcha.next_index, captcha_len, qd->captcha.data_len); @@ -1038,7 +1038,7 @@ bytes += qq_put8(raw_data + bytes, qd->ld.pwd_md5[1]); bytes += qq_put8(raw_data + bytes, qd->ld.pwd_md5[2]); - qq_show_packet("Check password", raw_data, bytes); + /* qq_show_packet("Check password", raw_data, bytes); */ /* Encrypted by random key*/ encrypted_len = qq_encrypt(encrypted, raw_data, bytes, qd->ld.random_key); @@ -1068,7 +1068,7 @@ g_return_val_if_fail(gc != NULL && gc->proto_data != NULL, QQ_LOGIN_REPLY_ERR); qd = (qq_data *) gc->proto_data; - qq_show_packet("Check password reply", data, data_len); + /* qq_show_packet("Check password reply", data, data_len); */ bytes = 0; bytes += qq_get16(&unknow_token_len, data + bytes); /* maybe total length */ @@ -1086,10 +1086,11 @@ if (qd->ld.login_token != NULL) g_free(qd->ld.login_token); qd->ld.login_token = g_new0(guint8, qd->ld.login_token_len); bytes += qq_getdata(qd->ld.login_token, qd->ld.login_token_len, data + bytes); - qq_show_packet("Get login token", qd->ld.login_token, qd->ld.login_token_len); + /* qq_show_packet("Get login token", qd->ld.login_token, qd->ld.login_token_len); */ + /* get login_key */ bytes += qq_getdata(qd->ld.login_key, sizeof(qd->ld.login_key), data + bytes); - qq_show_packet("Get login key", qd->ld.login_key, sizeof(qd->ld.login_key)); + /* qq_show_packet("Get login key", qd->ld.login_key, sizeof(qd->ld.login_key)); */ return QQ_LOGIN_REPLY_OK; } @@ -1202,7 +1203,7 @@ memset(raw_data + bytes, 0, 10); bytes += 10; /* redirect data, 15 bytes */ - qq_show_packet("Redirect", qd->redirect, qd->redirect_len); + /* qq_show_packet("Redirect", qd->redirect, qd->redirect_len); */ bytes += qq_putdata(raw_data + bytes, qd->redirect, qd->redirect_len); /* unknow fill */ bytes += qq_putdata(raw_data + bytes, login_2_16, sizeof(login_2_16)); @@ -1214,7 +1215,7 @@ memset(raw_data + bytes, 0, 332 - sizeof(login_3_83)); bytes += 332 - sizeof(login_3_83); - qq_show_packet("Login", raw_data, bytes); + /* qq_show_packet("Login", raw_data, bytes); */ encrypted_len = qq_encrypt(encrypted, raw_data, bytes, qd->ld.login_key); @@ -1254,11 +1255,12 @@ switch (ret) { case 0x05: error = g_strdup_printf( - _("Server is busy now, Please try later\n%s"), + _("Server is busy now (0x%02X), Please try later\n%s"), ret, msg_utf8); break; case 0x0A: /* 0a 2d 9a 4b 9a 01 01 00 00 00 05 00 00 00 00 79 0e 5f fd */ + /* Missing get server before login*/ default: error = g_strdup_printf( _("Unknow reply code when login (0x%02X):\n%s"), @@ -1408,7 +1410,7 @@ memset(raw_data + bytes, 0, 249); bytes += 249; - qq_show_packet("Login request", raw_data, bytes); + /* qq_show_packet("Login request", raw_data, bytes); */ encrypted_len = qq_encrypt(encrypted, raw_data, bytes, qd->ld.login_key); buf = g_newa(guint8, MAX_PACKET_SIZE); @@ -1446,7 +1448,7 @@ switch (ret) { case 0x05: error = g_strdup_printf( - _("Server is busy now, Please try later\n%s"), + _("Server is busy now (0x%02X), Please try later\n%s"), ret, msg_utf8); break; default: