diff libpurple/protocols/qq/qq_base.c @ 24074:c2253c485728

2008.10.04 - ccpaging <ccpagint(at)gmail.com> * Update protocol for 2007 * Code cleanup
author SHiNE CsyFeK <csyfek@gmail.com>
date Wed, 22 Oct 2008 14:47:39 +0000
parents 619ac2303c46
children ec3f7d3e0445
line wrap: on
line diff
--- a/libpurple/protocols/qq/qq_base.c	Wed Oct 22 14:46:44 2008 +0000
+++ b/libpurple/protocols/qq/qq_base.c	Wed Oct 22 14:47:39 2008 +0000
@@ -66,7 +66,7 @@
 	struct tm *tm_local;
 
 	qd = (qq_data *) gc->proto_data;
-	qq_show_packet("Login reply", data, len);
+	/* qq_show_packet("Login reply", data, len); */
 
 	if (len < 139) {
 		purple_connection_error_reason(gc,
@@ -665,7 +665,7 @@
 	qd->redirect_len = data_len;
 	qd->redirect = g_realloc(qd->redirect, qd->redirect_len);
 	qq_getdata(qd->redirect, qd->redirect_len, data);
-	qq_show_packet("Redirect to", qd->redirect, qd->redirect_len);
+	/* qq_show_packet("Redirect to", qd->redirect, qd->redirect_len); */
 
 	qq_getIP(&qd->redirect_ip, data + 11);
 	purple_debug_info("QQ", "Get server %s\n", inet_ntoa(qd->redirect_ip));
@@ -912,7 +912,7 @@
 	bytes += qq_get16(&(qd->ld.token_ex_len), data + bytes);
 	qd->ld.token_ex = g_realloc(qd->ld.token_ex, qd->ld.token_ex_len);
 	bytes += qq_getdata(qd->ld.token_ex, qd->ld.token_ex_len, data + bytes);
-	qq_show_packet("Get token ex", qd->ld.token_ex, qd->ld.token_ex_len);
+	/* qq_show_packet("Get token ex", qd->ld.token_ex, qd->ld.token_ex_len); */
 	
 	if(reply != 1)
 	{
@@ -932,7 +932,7 @@
 	bytes += qq_get16(&qd->captcha.token_len, data + bytes);
 	qd->captcha.token = g_realloc(qd->captcha.token, qd->captcha.token_len);
 	bytes += qq_getdata(qd->captcha.token, qd->captcha.token_len, data + bytes);
-	qq_show_packet("Get captcha token", qd->captcha.token, qd->captcha.token_len);
+	/* qq_show_packet("Get captcha token", qd->captcha.token, qd->captcha.token_len); */
 
 	purple_debug_info("QQ", "Request next captcha %d, new %d, total %d\n", 
 			qd->captcha.next_index, captcha_len, qd->captcha.data_len);
@@ -1038,7 +1038,7 @@
 	bytes += qq_put8(raw_data + bytes, qd->ld.pwd_md5[1]);
 	bytes += qq_put8(raw_data + bytes, qd->ld.pwd_md5[2]);
 
-	qq_show_packet("Check password", raw_data, bytes);
+	/* qq_show_packet("Check password", raw_data, bytes); */
 	/* Encrypted by random key*/
 	encrypted_len = qq_encrypt(encrypted, raw_data, bytes, qd->ld.random_key);
 
@@ -1068,7 +1068,7 @@
 	g_return_val_if_fail(gc != NULL  && gc->proto_data != NULL, QQ_LOGIN_REPLY_ERR);
 	qd = (qq_data *) gc->proto_data;
 
-	qq_show_packet("Check password reply", data, data_len);
+	/* qq_show_packet("Check password reply", data, data_len); */
 
 	bytes = 0;
 	bytes += qq_get16(&unknow_token_len, data + bytes);	/* maybe total length */
@@ -1086,10 +1086,11 @@
 		if (qd->ld.login_token != NULL) g_free(qd->ld.login_token);
 		qd->ld.login_token = g_new0(guint8, qd->ld.login_token_len);
 		bytes += qq_getdata(qd->ld.login_token, qd->ld.login_token_len, data + bytes);
-		qq_show_packet("Get login token", qd->ld.login_token, qd->ld.login_token_len);
+		/* qq_show_packet("Get login token", qd->ld.login_token, qd->ld.login_token_len); */
+
 		/* get login_key */
 		bytes += qq_getdata(qd->ld.login_key, sizeof(qd->ld.login_key), data + bytes);
-		qq_show_packet("Get login key", qd->ld.login_key, sizeof(qd->ld.login_key));
+		/* qq_show_packet("Get login key", qd->ld.login_key, sizeof(qd->ld.login_key)); */
 		return QQ_LOGIN_REPLY_OK;
 	}
 
@@ -1202,7 +1203,7 @@
 	memset(raw_data + bytes, 0, 10);
 	bytes += 10;
 	/* redirect data, 15 bytes */
-	qq_show_packet("Redirect", qd->redirect, qd->redirect_len);
+	/* qq_show_packet("Redirect", qd->redirect, qd->redirect_len); */
 	bytes += qq_putdata(raw_data + bytes, qd->redirect, qd->redirect_len);
 	/* unknow fill */
 	bytes += qq_putdata(raw_data + bytes, login_2_16, sizeof(login_2_16));
@@ -1214,7 +1215,7 @@
 	memset(raw_data + bytes, 0, 332 - sizeof(login_3_83));
 	bytes += 332 - sizeof(login_3_83);
 
-	qq_show_packet("Login", raw_data, bytes);
+	/* qq_show_packet("Login", raw_data, bytes); */
 
 	encrypted_len = qq_encrypt(encrypted, raw_data, bytes, qd->ld.login_key);
 
@@ -1254,11 +1255,12 @@
 		switch (ret) {
 			case 0x05:
 				error = g_strdup_printf(
-						_("Server is busy now, Please try later\n%s"),
+						_("Server is busy now (0x%02X), Please try later\n%s"),
 						ret, msg_utf8);
 				break;
 			case 0x0A:
 				/* 0a 2d 9a 4b 9a 01 01 00 00 00 05 00 00 00 00 79 0e 5f fd */
+				/* Missing get server before login*/
 			default:
 				error = g_strdup_printf(
 						_("Unknow reply code when login (0x%02X):\n%s"),
@@ -1408,7 +1410,7 @@
 	memset(raw_data + bytes, 0, 249);
 	bytes += 249;
 
-	qq_show_packet("Login request", raw_data, bytes);
+	/* qq_show_packet("Login request", raw_data, bytes); */
 	encrypted_len = qq_encrypt(encrypted, raw_data, bytes, qd->ld.login_key);
 
 	buf = g_newa(guint8, MAX_PACKET_SIZE);
@@ -1446,7 +1448,7 @@
 		switch (ret) {
 			case 0x05:
 				error = g_strdup_printf(
-						_("Server is busy now, Please try later\n%s"),
+						_("Server is busy now (0x%02X), Please try later\n%s"),
 						ret, msg_utf8);
 				break;
 			default: