Mercurial > pidgin
annotate plugins/msn/msn.c @ 1568:5a8c66de56b7
[gaim-migrate @ 1578]
la
committer: Tailor Script <tailor@pidgin.im>
author | Rob Flynn <gaim@robflynn.com> |
---|---|
date | Wed, 14 Mar 2001 06:31:01 +0000 |
parents | 0357164dffd0 |
children | 446536be85dd |
rev | line source |
---|---|
1259 | 1 /* |
2 * gaim - MSN Protocol Plugin | |
3 * | |
4 * Copyright (C) 2000, Rob Flynn <rob@tgflinux.com> | |
5 * | |
6 * This program is free software; you can redistribute it and/or modify | |
7 * it under the terms of the GNU General Public License as published by | |
8 * the Free Software Foundation; either version 2 of the License, or | |
9 * (at your option) any later version. | |
10 * | |
11 * This program is distributed in the hope that it will be useful, | |
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
14 * GNU General Public License for more details. | |
15 * | |
16 * You should have received a copy of the GNU General Public License | |
17 * along with this program; if not, write to the Free Software | |
18 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA | |
19 * | |
20 */ | |
21 | |
1514
0dd012166152
[gaim-migrate @ 1524]
Eric Warmenhoven <eric@warmenhoven.org>
parents:
1499
diff
changeset
|
22 #include "config.h" |
1259 | 23 |
24 #include <netdb.h> | |
25 #include <gtk/gtk.h> | |
26 #include <unistd.h> | |
27 #include <errno.h> | |
28 #include <netinet/in.h> | |
29 #include <arpa/inet.h> | |
30 #include <string.h> | |
31 #include <stdlib.h> | |
32 #include <stdio.h> | |
33 #include <time.h> | |
1567 | 34 #include <fcntl.h> |
1259 | 35 #include <sys/socket.h> |
36 #include <sys/stat.h> | |
1567 | 37 #include <sys/types.h> |
1259 | 38 #include "multi.h" |
39 #include "prpl.h" | |
40 #include "gaim.h" | |
41 #include "md5.h" | |
42 | |
1284 | 43 #include "pixmaps/msn_online.xpm" |
1285 | 44 #include "pixmaps/msn_away.xpm" |
1284 | 45 |
1567 | 46 #define MIME_HEADER "MIME-Version: 1.0\r\nContent-Type: text/plain; charset=UTF-8\r\nX-MMS-IM-Format: FN=MS%20Sans%20Serif; EF=; CO=0; CS=0; PF=0\r\n\r\n" |
1259 | 47 |
1567 | 48 #define MSN_BUF_LEN 8192 |
1259 | 49 |
50 #define MSN_ONLINE 1 | |
51 #define MSN_BUSY 2 | |
52 #define MSN_IDLE 3 | |
53 #define MSN_BRB 4 | |
54 #define MSN_AWAY 5 | |
55 #define MSN_PHONE 6 | |
56 #define MSN_LUNCH 7 | |
57 #define MSN_OFFLINE 8 | |
58 #define MSN_HIDDEN 9 | |
59 | |
1567 | 60 #define MSN_SIGNON_GOT_XFR 0x0001 |
61 #define MSN_SIGNON_SENT_USR 0x0002 | |
1259 | 62 |
63 struct msn_data { | |
64 int fd; | |
65 | |
66 char protocol[6]; | |
67 char *friendly; | |
68 gchar *policy; | |
1567 | 69 int inpa; |
70 int status; | |
71 time_t last_trid; | |
1259 | 72 }; |
73 | |
74 struct msn_conn { | |
75 gchar *user; | |
76 int inpa; | |
77 int fd; | |
78 }; | |
79 | |
1567 | 80 GSList *msn_connections = NULL; |
1259 | 81 |
1567 | 82 unsigned long long globalc = 0; |
1259 | 83 |
1282 | 84 static char *msn_name() |
85 { | |
1259 | 86 return "MSN"; |
87 } | |
88 | |
1282 | 89 char *name() |
90 { | |
1259 | 91 return "MSN"; |
92 } | |
93 | |
1282 | 94 char *description() |
95 { | |
1259 | 96 return "Allows gaim to use the MSN protocol. For some reason, this frightens me."; |
97 } | |
98 | |
1567 | 99 time_t trId(struct msn_data *md) |
1282 | 100 { |
1567 | 101 md->last_trid = time((time_t *)NULL) + globalc++; |
102 return md->last_trid; | |
103 } | |
104 | |
105 void msn_write(int fd, char *buf) | |
106 { | |
107 write(fd, buf, strlen(buf)); | |
108 printf("MSN <== %s", buf); | |
109 } | |
1259 | 110 |
1567 | 111 static void msn_callback(gpointer data, gint source, GdkInputCondition condition) |
112 { | |
113 struct gaim_connection *gc = data; | |
114 struct msn_data *md = (struct msn_data *)gc->proto_data; | |
115 char buf[MSN_BUF_LEN]; | |
116 int i = 0; | |
1259 | 117 |
1567 | 118 bzero(buf, MSN_BUF_LEN); |
119 | |
120 do | |
121 { | |
122 if (read(source, buf + i, 1) < 0) | |
123 { | |
124 hide_login_progress(gc, "Read error"); | |
125 signoff(gc); | |
126 return; | |
1259 | 127 } |
128 | |
1567 | 129 } while (buf[i++] != '\n'); |
130 | |
131 g_strchomp(buf); | |
132 | |
133 printf("MSN ==> %s\n", buf); | |
134 | |
135 /* Check to see what was just sent back to us. We should be seeing a VER tag. */ | |
136 if (!strncmp("LST ", buf, 4)) | |
137 { | |
138 char **res; | |
139 | |
140 res = g_strsplit(buf, " ", 0); | |
141 | |
1568 | 142 /* If we have zero buddies, abort */ |
143 if (atoi(res[5]) == 0) | |
144 { | |
145 g_strfreev(res); | |
146 return; | |
147 } | |
148 | |
1567 | 149 /* First, let's check the list type */ |
150 if (!strcmp("FL", res[2])) | |
151 { | |
152 /* We're dealing with a forward list. Add them | |
153 * to our buddylist and continue along our | |
154 * merry little way */ | |
155 | |
156 struct buddy *b; | |
157 | |
158 b = find_buddy(gc, res[6]); | |
159 | |
160 if (!b) | |
161 add_buddy(gc, "Buddies", res[6], res[7]); | |
162 } | |
163 | |
164 g_strfreev(res); | |
165 | |
166 return; | |
1259 | 167 } |
168 | |
169 } | |
170 | |
1567 | 171 static void msn_login_callback(gpointer data, gint source, GdkInputCondition condition) |
1282 | 172 { |
1567 | 173 struct gaim_connection *gc = data; |
174 struct msn_data *md = (struct msn_data *)gc->proto_data; | |
175 char buf[MSN_BUF_LEN]; | |
1259 | 176 int i = 0; |
1282 | 177 |
1567 | 178 if (!gc->inpa) |
179 { | |
180 fcntl(source, F_SETFL, 0); | |
181 | |
182 gdk_input_remove(md->inpa); | |
183 md->inpa = 0; | |
184 | |
185 gc->inpa = gdk_input_add(md->fd, GDK_INPUT_READ, msn_login_callback, gc); | |
1307 | 186 |
1567 | 187 if (md->status & MSN_SIGNON_GOT_XFR) |
188 { | |
189 /* Looks like we were transfered here. Just send a sign on */ | |
190 set_login_progress(gc, 3, "Signing On"); | |
191 g_snprintf(buf, MSN_BUF_LEN, "USR %d %s I %s\n", md->last_trid, md->policy, gc->username); | |
192 msn_write(md->fd, buf); | |
193 | |
194 /* Reset this bit */ | |
195 md->status ^= MSN_SIGNON_GOT_XFR; | |
196 } | |
197 else | |
198 { | |
199 /* Otherwise, send an initial request */ | |
200 set_login_progress(gc, 2, "Verifiying"); | |
1259 | 201 |
1567 | 202 g_snprintf(md->protocol, 6, "MSNP2"); |
203 | |
204 g_snprintf(buf, MSN_BUF_LEN, "VER %d %s\n", trId(md), md->protocol); | |
205 msn_write(md->fd, buf); | |
206 } | |
207 | |
208 return; | |
209 } | |
210 | |
211 bzero(buf, MSN_BUF_LEN); | |
212 | |
213 do | |
214 { | |
215 if (read(source, buf + i, 1) < 0) | |
216 { | |
217 hide_login_progress(gc, "Read error"); | |
218 signoff(gc); | |
1259 | 219 return; |
1567 | 220 } |
1259 | 221 |
1567 | 222 } while (buf[i++] != '\n'); |
1259 | 223 |
224 g_strchomp(buf); | |
225 | |
1567 | 226 printf("MSN ==> %s\n", buf); |
227 | |
228 /* Check to see what was just sent back to us. We should be seeing a VER tag. */ | |
229 if (!strncmp("VER ", buf, 4) && (!strstr("MSNP2", buf))) | |
230 { | |
231 /* Now that we got our ver, we shoudl send a policy request */ | |
232 g_snprintf(buf, MSN_BUF_LEN, "INF %d\n", trId(md)); | |
233 msn_write(md->fd, buf); | |
234 | |
235 return; | |
236 } | |
237 else if (!strncmp("INF ", buf, 4)) | |
238 { | |
239 char **res; | |
240 | |
241 /* Make a copy of our resulting policy */ | |
242 res = g_strsplit(buf, " ", 0); | |
243 md->policy = g_strdup(res[2]); | |
244 | |
245 /* And send our signon packet */ | |
246 set_login_progress(gc, 3, "Signing On"); | |
247 | |
248 g_snprintf(buf, MSN_BUF_LEN, "USR %d %s I %s\n", trId(md), md->policy, gc->username); | |
249 msn_write(md->fd, buf); | |
250 | |
251 g_strfreev(res); | |
252 | |
253 return; | |
254 } | |
255 else if (!strncmp("XFR ", buf, 4)) | |
256 { | |
257 char **res; | |
258 char *host; | |
259 char *port; | |
260 | |
261 res = g_strsplit(buf, " ", 0); | |
262 | |
263 strcpy(buf, res[3]); | |
264 | |
265 g_strfreev(res); | |
266 | |
267 res = g_strsplit(buf, ":", 0); | |
268 | |
269 close(md->fd); | |
270 | |
271 set_login_progress(gc, 1, "Connecting"); | |
272 | |
273 /* Now we have the host and port */ | |
274 if (!(md->fd = msn_connect(res[0], atoi(res[1])))) | |
275 { | |
276 hide_login_progress(gc, "Error connecting to server"); | |
277 signoff(gc); | |
278 return; | |
279 } | |
280 | |
281 g_strfreev(res); | |
282 | |
283 md->status |= MSN_SIGNON_GOT_XFR; | |
284 | |
285 gdk_input_remove(gc->inpa); | |
286 gc->inpa = 0; | |
287 | |
288 md->inpa = gdk_input_add(md->fd, GDK_INPUT_WRITE, msn_login_callback, gc); | |
289 | |
290 return; | |
291 } | |
292 else if (!strncmp("USR ", buf, 4)) | |
293 { | |
294 if (md->status & MSN_SIGNON_SENT_USR) | |
295 { | |
296 char **res; | |
297 | |
298 res = g_strsplit(buf, " ", 0); | |
299 | |
300 if (strcasecmp("OK", res[2])) | |
301 { | |
302 hide_login_progress(gc, "Error signing on"); | |
303 signoff(gc); | |
304 } | |
305 else | |
306 { | |
307 md->friendly = g_strdup(res[4]); | |
308 | |
309 /* Ok, ok. Your account is FINALLY online. Ya think Microsoft | |
310 * could have had any more steps involved? */ | |
311 | |
312 set_login_progress(gc, 4, "Fetching config"); | |
313 | |
314 /* Sync our buddylist */ | |
315 g_snprintf(buf, MSN_BUF_LEN, "SYN %d 0\n", trId(md)); | |
316 msn_write(md->fd, buf); | |
317 | |
318 /* And set ourselves online */ | |
319 g_snprintf(buf, MSN_BUF_LEN, "CHG %d NLN\n", trId(md)); | |
320 msn_write(md->fd, buf); | |
321 | |
322 account_online(gc); | |
323 serv_finish_login(gc); | |
324 | |
325 if (bud_list_cache_exists(gc)) | |
326 do_import(NULL, gc); | |
327 | |
328 gdk_input_remove(gc->inpa); | |
329 gc->inpa = gdk_input_add(md->fd, GDK_INPUT_READ, msn_callback, gc); | |
330 } | |
331 | |
332 g_strfreev(res); | |
333 } | |
334 else | |
335 { | |
336 char **res; | |
337 char buf2[MSN_BUF_LEN]; | |
338 int j; | |
339 md5_state_t st; | |
340 md5_byte_t di[16]; | |
341 | |
342 res = g_strsplit(buf, " ", 0); | |
343 | |
344 /* Make a copy of our MD5 Hash key */ | |
345 strcpy(buf, res[4]); | |
346 | |
347 /* Generate our secret with our key and password */ | |
348 snprintf(buf2, MSN_BUF_LEN, "%s%s", buf, gc->password); | |
349 | |
350 md5_init(&st); | |
351 md5_append(&st, (const md5_byte_t *)buf2, strlen(buf2)); | |
352 md5_finish(&st, di); | |
353 | |
354 /* Now that we have the MD5 Hash, lets' hex encode this bad boy. I smoke bad crack. */ | |
355 sprintf(buf, "%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x", | |
356 di[0],di[1],di[2],di[3],di[4],di[5],di[6],di[7],di[8],di[9],di[10],di[11],di[12], | |
357 di[13],di[14],di[15]); | |
358 | |
359 /* And now, send our final sign on packet */ | |
360 g_snprintf(buf2, MSN_BUF_LEN, "USR %s %s S %s\n", res[1], md->policy, buf); | |
361 msn_write(md->fd, buf2); | |
362 | |
363 md->status |= MSN_SIGNON_SENT_USR; | |
364 | |
365 g_strfreev(res); | |
366 } | |
367 | |
368 return; | |
369 } | |
1259 | 370 } |
371 | |
1282 | 372 int msn_connect(char *server, int port) |
373 { | |
1259 | 374 int fd; |
375 struct hostent *host; | |
376 struct sockaddr_in site; | |
377 | |
1567 | 378 if (!(host = gethostbyname(server))) |
379 { | |
380 printf("Could not resolve host name: %s\n", server); | |
1259 | 381 return -1; |
382 } | |
383 | |
1567 | 384 bzero(&site, sizeof(struct sockaddr_in)); |
385 site.sin_port = htons(port); | |
386 memcpy(&site.sin_addr, host->h_addr, host->h_length); | |
387 site.sin_family = host->h_addrtype; | |
1259 | 388 |
1567 | 389 fd = socket(host->h_addrtype, SOCK_STREAM, 0); |
1259 | 390 |
1567 | 391 fcntl(fd, F_SETFL, O_NONBLOCK); |
1259 | 392 |
1567 | 393 if (connect(fd, (struct sockaddr *)&site, sizeof(struct sockaddr_in)) < 0) |
394 { | |
395 if ((errno == EINPROGRESS) || (errno == EINTR)) | |
396 { | |
397 printf("Connection would block\n"); | |
398 return fd; | |
1259 | 399 } |
400 | |
1567 | 401 close(fd); |
402 fd = -1; | |
1259 | 403 } |
1567 | 404 |
405 return fd; | |
1259 | 406 } |
407 | |
1282 | 408 void msn_login(struct aim_user *user) |
409 { | |
1567 | 410 struct gaim_connection *gc = new_gaim_conn(user); |
411 struct msn_data *md = gc->proto_data = g_new0(struct msn_data, 1); | |
1282 | 412 |
1567 | 413 gc->inpa = 0; |
1282 | 414 |
415 set_login_progress(gc, 1, "Connecting"); | |
1259 | 416 |
417 while (gtk_events_pending()) | |
418 gtk_main_iteration(); | |
1567 | 419 |
1259 | 420 if (!g_slist_find(connections, gc)) |
421 return; | |
422 | |
1567 | 423 md->status = 0; |
1282 | 424 |
1567 | 425 if (!(md->fd = msn_connect("messenger.hotmail.com", 1863))) |
426 { | |
427 hide_login_progress(gc, "Error connecting to server"); | |
1259 | 428 signoff(gc); |
429 return; | |
430 } | |
431 | |
1567 | 432 md->inpa = gdk_input_add(md->fd, GDK_INPUT_WRITE, msn_login_callback, gc); |
1259 | 433 |
1567 | 434 printf("Connected.\n"); |
1284 | 435 } |
436 | |
1259 | 437 static struct prpl *my_protocol = NULL; |
438 | |
1282 | 439 void msn_init(struct prpl *ret) |
440 { | |
1259 | 441 ret->protocol = PROTO_MSN; |
442 ret->name = msn_name; | |
1567 | 443 ret->list_icon = NULL; |
1499
de0b946e86a4
[gaim-migrate @ 1509]
Eric Warmenhoven <eric@warmenhoven.org>
parents:
1443
diff
changeset
|
444 ret->buddy_menu = NULL; |
1259 | 445 ret->user_opts = NULL; |
446 ret->login = msn_login; | |
1567 | 447 ret->close = NULL; |
448 ret->send_im = NULL; | |
1259 | 449 ret->set_info = NULL; |
450 ret->get_info = NULL; | |
1567 | 451 ret->set_away = NULL; |
1259 | 452 ret->get_away_msg = NULL; |
453 ret->set_dir = NULL; | |
454 ret->get_dir = NULL; | |
455 ret->dir_search = NULL; | |
1567 | 456 ret->set_idle = NULL; |
1259 | 457 ret->change_passwd = NULL; |
1567 | 458 ret->add_buddy = NULL; |
1259 | 459 ret->add_buddies = NULL; |
1567 | 460 ret->remove_buddy = NULL; |
461 ret->add_permit = NULL; | |
462 ret->rem_permit = NULL; | |
463 ret->add_deny = NULL; | |
464 ret->rem_deny = NULL; | |
1259 | 465 ret->warn = NULL; |
466 ret->accept_chat = NULL; | |
467 ret->join_chat = NULL; | |
468 ret->chat_invite = NULL; | |
469 ret->chat_leave = NULL; | |
470 ret->chat_whisper = NULL; | |
471 ret->chat_send = NULL; | |
472 ret->keepalive = NULL; | |
473 | |
474 my_protocol = ret; | |
475 } | |
476 | |
1282 | 477 char *gaim_plugin_init(GModule * handle) |
478 { | |
1443
336fc98b7f90
[gaim-migrate @ 1453]
Eric Warmenhoven <eric@warmenhoven.org>
parents:
1327
diff
changeset
|
479 load_protocol(msn_init, sizeof(struct prpl)); |
1259 | 480 return NULL; |
481 } | |
482 | |
1282 | 483 void gaim_plugin_remove() |
484 { | |
1259 | 485 struct prpl *p = find_prpl(PROTO_MSN); |
486 if (p == my_protocol) | |
487 unload_protocol(p); | |
488 } |