Mercurial > pidgin
comparison libpurple/protocols/qq/qq_process.c @ 24138:dc112387190f
2008.09.29 - ccpaging <ccpaging(at)gmail.com>
* 'Check Password' function for protocol 2007/2008
author | SHiNE CsyFeK <csyfek@gmail.com> |
---|---|
date | Wed, 22 Oct 2008 14:41:13 +0000 |
parents | 87e61a85f5dd |
children | 832178d951ca |
comparison
equal
deleted
inserted
replaced
24137:87e61a85f5dd | 24138:dc112387190f |
---|---|
605 /* May use password_twice_md5 in the past version like QQ2005 */ | 605 /* May use password_twice_md5 in the past version like QQ2005 */ |
606 data_len = qq_decrypt(data, rcved, rcved_len, qd->ld.random_key); | 606 data_len = qq_decrypt(data, rcved, rcved_len, qd->ld.random_key); |
607 if (data_len >= 0) { | 607 if (data_len >= 0) { |
608 purple_debug_warning("QQ", "Decrypt login packet by random_key, %d bytes\n", data_len); | 608 purple_debug_warning("QQ", "Decrypt login packet by random_key, %d bytes\n", data_len); |
609 } else { | 609 } else { |
610 data_len = qq_decrypt(data, rcved, rcved_len, qd->ld.pwd_4th_md5); | 610 data_len = qq_decrypt(data, rcved, rcved_len, qd->ld.pwd_twice_md5); |
611 if (data_len >= 0) { | 611 if (data_len >= 0) { |
612 purple_debug_warning("QQ", "Decrypt login packet by pwd_4th_md5, %d bytes\n", data_len); | 612 purple_debug_warning("QQ", "Decrypt login packet by pwd_twice_md5, %d bytes\n", data_len); |
613 } | 613 } |
614 } | 614 } |
615 break; | 615 break; |
616 case QQ_CMD_LOGIN: | 616 case QQ_CMD_LOGIN: |
617 default: | 617 default: |
618 if (qd->client_version > 2005) { | 618 if (qd->client_version > 2005) { |
619 data_len = qq_decrypt(data, rcved, rcved_len, qd->ld.pwd_4th_md5); | 619 data_len = qq_decrypt(data, rcved, rcved_len, qd->ld.pwd_twice_md5); |
620 if (data_len >= 0) { | 620 if (data_len >= 0) { |
621 purple_debug_warning("QQ", "Decrypt login packet by pwd_4th_md5\n"); | 621 purple_debug_warning("QQ", "Decrypt login packet by pwd_twice_md5\n"); |
622 } else { | 622 } else { |
623 data_len = qq_decrypt(data, rcved, rcved_len, qd->ld.login_key); | 623 data_len = qq_decrypt(data, rcved, rcved_len, qd->ld.login_key); |
624 if (data_len >= 0) { | 624 if (data_len >= 0) { |
625 purple_debug_warning("QQ", "Decrypt login packet by login_key\n"); | 625 purple_debug_warning("QQ", "Decrypt login packet by login_key\n"); |
626 } | 626 } |
629 /* May use password_twice_md5 in the past version like QQ2005 */ | 629 /* May use password_twice_md5 in the past version like QQ2005 */ |
630 data_len = qq_decrypt(data, rcved, rcved_len, qd->ld.random_key); | 630 data_len = qq_decrypt(data, rcved, rcved_len, qd->ld.random_key); |
631 if (data_len >= 0) { | 631 if (data_len >= 0) { |
632 purple_debug_warning("QQ", "Decrypt login packet by random_key\n"); | 632 purple_debug_warning("QQ", "Decrypt login packet by random_key\n"); |
633 } else { | 633 } else { |
634 data_len = qq_decrypt(data, rcved, rcved_len, qd->ld.pwd_2nd_md5); | 634 data_len = qq_decrypt(data, rcved, rcved_len, qd->ld.pwd_twice_md5); |
635 if (data_len >= 0) { | 635 if (data_len >= 0) { |
636 purple_debug_warning("QQ", "Decrypt login packet by pwd_2nd_md5\n"); | 636 purple_debug_warning("QQ", "Decrypt login packet by pwd_twice_md5\n"); |
637 } | 637 } |
638 } | 638 } |
639 } | 639 } |
640 break; | 640 break; |
641 } | 641 } |