Mercurial > pidgin
view src/toc.c @ 121:3571b593f423
[gaim-migrate @ 131]
If buddy signs off, then signs on again before they get erased, it wouldn't
alert properly. Now it does.
committer: Tailor Script <tailor@pidgin.im>
author | Eric Warmenhoven <eric@warmenhoven.org> |
---|---|
date | Sat, 15 Apr 2000 23:52:33 +0000 |
parents | 55faf2e3a134 |
children | 9d684979f507 |
line wrap: on
line source
/* * gaim * * Copyright (C) 1998-1999, Mark Spencer <markster@marko.net> * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA * */ #include <netdb.h> #include <gtk/gtk.h> #include <unistd.h> #include <errno.h> #include <netinet/in.h> #include <arpa/inet.h> #include <string.h> #include <stdlib.h> #include <stdio.h> #include <time.h> #include <sys/socket.h> #include "gaim.h" #include "gnome_applet_mgr.h" /* descriptor for talking to TOC */ static int toc_fd; static int seqno; static unsigned int peer_ver=0; static int state; static int inpa=-1; #ifdef _WIN32 static int win32_r; #endif int toc_signon(char *username, char *password); int toc_login(char *username, char *password) { char *config; struct in_addr *sin; struct aim_user *u; char buf[80]; char buf2[2048]; g_snprintf(buf, sizeof(buf), "Looking up %s", aim_host); set_login_progress(1, buf); sin = (struct in_addr *)get_address(aim_host); if (!sin) { #ifdef USE_APPLET setUserState(offline); #endif /* USE_APPLET */ set_state(STATE_OFFLINE); g_snprintf(buf, sizeof(buf), "Unable to lookup %s", aim_host); hide_login_progress(buf); return -1; } g_snprintf(toc_addy, sizeof(toc_addy), "%s", inet_ntoa(*sin)); g_snprintf(buf, sizeof(buf), "Connecting to %s", inet_ntoa(*sin)); set_login_progress(2, buf); toc_fd = connect_address(sin->s_addr, aim_port); if (toc_fd < 0) { #ifdef USE_APPLET setUserState(offline); #endif /* USE_APPLET */ set_state(STATE_OFFLINE); g_snprintf(buf, sizeof(buf), "Connect to %s failed", inet_ntoa(*sin)); hide_login_progress(buf); return -1; } g_free(sin); g_snprintf(buf, sizeof(buf), "Signon: %s",username); set_login_progress(3, buf); if (toc_signon(username, password) < 0) { #ifdef USE_APPLET setUserState(offline); #endif /* USE_APPLET */ set_state(STATE_OFFLINE); hide_login_progress("Disconnected."); return -1; } g_snprintf(buf, sizeof(buf), "Waiting for reply..."); set_login_progress(4, buf); if (toc_wait_signon() < 0) { #ifdef USE_APPLET setUserState(offline); #endif /* USE_APPLET */ set_state(STATE_OFFLINE); hide_login_progress("Authentication Failed"); return -1; } u = find_user(username); if (!u) { u = g_new0(struct aim_user, 1); g_snprintf(u->user_info, sizeof(u->user_info), DEFAULT_INFO); aim_users = g_list_append(aim_users, u); } current_user = u; g_snprintf(current_user->username, sizeof(current_user->username), "%s", username); g_snprintf(current_user->password, sizeof(current_user->password), "%s", password); save_prefs(); g_snprintf(buf, sizeof(buf), "Retrieving config..."); set_login_progress(5, buf); if ((config=toc_wait_config()) == NULL) { hide_login_progress("No Configuration"); set_state(STATE_OFFLINE); return -1; } #ifdef USE_APPLET make_buddy(); if (general_options & OPT_GEN_APP_BUDDY_SHOW) { gnome_buddy_show(); parse_toc_buddy_list(config); createOnlinePopup(); set_applet_draw_open(); } else { gnome_buddy_hide(); parse_toc_buddy_list(config); set_applet_draw_closed(); } setUserState(online); gtk_widget_hide(mainwindow); #else gtk_widget_hide(mainwindow); show_buddy_list(); parse_toc_buddy_list(config); refresh_buddy_window(); #endif g_snprintf(buf2, sizeof(buf2), "toc_init_done"); sflap_send(buf2, -1, TYPE_DATA); #if 0 g_snprintf(buf2, sizeof(buf2), "toc_set_caps %s", FILETRANS_UID); sflap_send(buf2, -1, TYPE_DATA); #endif serv_finish_login(); return 0; } void toc_close() { #ifdef USE_APPLET setUserState(offline); #endif /* USE_APPLET */ seqno = 0; state = STATE_OFFLINE; if (inpa > 0) gdk_input_remove(inpa); close(toc_fd); toc_fd=-1; inpa=-1; } unsigned char *roast_password(char *pass) { /* Trivial "encryption" */ static char rp[256]; static char *roast = ROAST; int pos=2; int x; strcpy(rp, "0x"); for (x=0;(x<150) && pass[x]; x++) pos+=sprintf(&rp[pos],"%02x", pass[x] ^ roast[x % strlen(roast)]); rp[pos]='\0'; return rp; } char *print_header(void *hdr_v) { static char s[80]; struct sflap_hdr *hdr = (struct sflap_hdr *)hdr_v; g_snprintf(s,sizeof(s), "[ ast: %c, type: %d, seqno: %d, len: %d ]", hdr->ast, hdr->type, ntohs(hdr->seqno), ntohs(hdr->len)); return s; } void print_buffer(char *buf, int len) { #if 0 int x; printf("[ "); for (x=0;x<len;x++) printf("%d ", buf[x]); printf("]\n"); printf("[ "); for (x=0;x<len;x++) printf("%c ", buf[x]); printf("]\n"); #endif } int sflap_send(char *buf, int olen, int type) { int len; int slen=0; struct sflap_hdr hdr; char obuf[MSG_LEN]; /* One _last_ 2048 check here! This shouldn't ever * get hit though, hopefully. If it gets hit on an IM * It'll lose the last " and the message won't go through, * but this'll stop a segfault. */ if (strlen(buf) > (MSG_LEN - sizeof(hdr))) { buf[MSG_LEN - sizeof(hdr) - 3] = '"'; buf[MSG_LEN - sizeof(hdr) - 2] = '\0'; } sprintf(debug_buff,"%s [Len %d]\n", buf, strlen(buf)); debug_print(debug_buff); if (olen < 0) len = escape_message(buf); else len = olen; hdr.ast = '*'; hdr.type = type; hdr.seqno = htons(seqno++ & 0xffff); hdr.len = htons(len + (type == TYPE_SIGNON ? 0 : 1)); sprintf(debug_buff,"Escaped message is '%s'\n",buf); debug_print(debug_buff); memcpy(obuf, &hdr, sizeof(hdr)); slen += sizeof(hdr); memcpy(&obuf[slen], buf, len); slen += len; if (type != TYPE_SIGNON) { obuf[slen]='\0'; slen += 1; } print_buffer(obuf, slen); return write(toc_fd, obuf, slen); } int wait_reply(char *buffer, size_t buflen) { size_t res=-1; int read_rv = -1; struct sflap_hdr *hdr=(struct sflap_hdr *)buffer; char *c; if(buflen < sizeof(struct sflap_hdr)) { do_error_dialog("Buffer too small", "Gaim - Error (internal)"); return -1; } while((read_rv = read(toc_fd, buffer, 1))) { if (read_rv < 0 || read_rv > 1) return -1; if (buffer[0] == '*') break; } read_rv = read(toc_fd, buffer+1, sizeof(struct sflap_hdr) - 1); if (read_rv < 0) return read_rv; res = read_rv + 1; sprintf(debug_buff, "Rcv: %s %s\n",print_header(buffer), ""); debug_print(debug_buff); if(buflen < sizeof(struct sflap_hdr) + ntohs(hdr->len) + 1) { do_error_dialog("Buffer too small", "Gaim - Error (internal)"); return -1; } while (res < (sizeof(struct sflap_hdr) + ntohs(hdr->len))) { read_rv = read(toc_fd, buffer + res, (ntohs(hdr->len) + sizeof(struct sflap_hdr)) - res); if(read_rv < 0) return read_rv; res += read_rv; while(gtk_events_pending()) gtk_main_iteration(); } if (res >= sizeof(struct sflap_hdr)) buffer[res]='\0'; else return res - sizeof(struct sflap_hdr); switch(hdr->type) { case TYPE_SIGNON: memcpy(&peer_ver, buffer + sizeof(struct sflap_hdr), 4); peer_ver = ntohl(peer_ver); seqno = ntohs(hdr->seqno); state = STATE_SIGNON_REQUEST; break; case TYPE_DATA: if (!strncasecmp(buffer + sizeof(struct sflap_hdr), "SIGN_ON:", strlen("SIGN_ON:"))) state = STATE_SIGNON_ACK; else if (!strncasecmp(buffer + sizeof(struct sflap_hdr), "CONFIG:", strlen("CONFIG:"))) { state = STATE_CONFIG; } else if (state != STATE_ONLINE && !strncasecmp(buffer + sizeof(struct sflap_hdr), "ERROR:", strlen("ERROR:"))) { c = strtok(buffer + sizeof(struct sflap_hdr) + strlen("ERROR:"), ":"); show_error_dialog(c); } sprintf(debug_buff, "Data: %s\n",buffer + sizeof(struct sflap_hdr)); debug_print(debug_buff); break; default: sprintf(debug_buff, "Unknown/unimplemented packet type %d\n",hdr->type); debug_print(debug_buff); } return res; } void toc_callback( gpointer data, gint source, GdkInputCondition condition ) { char *buf; char *c; char *l; buf = g_malloc(BUF_LONG); if (wait_reply(buf, BUF_LONG) < 0) { signoff(); hide_login_progress("Connection Closed"); g_free(buf); return; } c=strtok(buf+sizeof(struct sflap_hdr),":"); /* Ditch the first part */ if (!strcasecmp(c,"UPDATE_BUDDY")) { char *uc; int logged, evil, idle, type = 0; time_t signon; time_t time_idle; c = strtok(NULL,":"); /* c is name */ l = strtok(NULL,":"); /* l is T/F logged status */ sscanf(strtok(NULL, ":"), "%d", &evil); sscanf(strtok(NULL, ":"), "%ld", &signon); sscanf(strtok(NULL, ":"), "%d", &idle); uc = strtok(NULL, ":"); if (!strncasecmp(l,"T",1)) logged = 1; else logged = 0; if (uc[0] == 'A') type |= UC_AOL; switch(uc[1]) { case 'A': type |= UC_ADMIN; break; case 'U': type |= UC_UNCONFIRMED; break; case 'O': type |= UC_NORMAL; break; default: break; } switch(uc[2]) { case 'U': type |= UC_UNAVAILABLE; break; default: break; } if (idle) { time(&time_idle); time_idle -= idle*60; } else time_idle = 0; serv_got_update(c, logged, evil, signon, time_idle, type); } else if (!strcasecmp(c, "ERROR")) { c = strtok(NULL,":"); show_error_dialog(c); } else if (!strcasecmp(c, "NICK")) { c = strtok(NULL,":"); g_snprintf(current_user->username, sizeof(current_user->username), "%s", c); } else if (!strcasecmp(c, "IM_IN")) { char *away, *message; int a = 0; c = strtok(NULL,":"); away = strtok(NULL,":"); message = away; while(*message && (*message != ':')) message++; message++; if (!strncasecmp(away, "T", 1)) a = 1; serv_got_im(c, message, a); } else if (!strcasecmp(c, "GOTO_URL")) { char *name; char *url; char tmp[256]; name = strtok(NULL, ":"); url = strtok(NULL, ":"); g_snprintf(tmp, sizeof(tmp), "http://%s:%d/%s", toc_addy, aim_port, url); /* fprintf(stdout, "Name: %s\n%s\n", name, url); printf("%s", grab_url(tmp));*/ g_show_info(tmp); } else if (!strcasecmp(c, "EVILED")) { int lev; char *name = NULL; sscanf(strtok(NULL, ":"), "%d", &lev); name = strtok(NULL, ":"); sprintf(debug_buff,"%s | %d\n", name, lev); debug_print(debug_buff); serv_got_eviled(name, lev); } else if (!strcasecmp(c, "CHAT_JOIN")) { char *name; int id; sscanf(strtok(NULL, ":"), "%d", &id); name = strtok(NULL, ":"); serv_got_joined_chat(id, name); } else if (!strcasecmp(c, "DIR_STATUS")) { } else if (!strcasecmp(c, "CHAT_UPDATE_BUDDY")) { int id; char *in; char *buddy; GList *bcs = buddy_chats; struct buddy_chat *b = NULL; sscanf(strtok(NULL, ":"), "%d", &id); in = strtok(NULL, ":"); while(bcs) { b = (struct buddy_chat *)bcs->data; if (id == b->id) break; bcs = bcs->next; b = NULL; } if (!b) { g_free(buf); return; } if (!strcasecmp(in, "T")) { while((buddy = strtok(NULL, ":")) != NULL) { add_chat_buddy(b, buddy); } } else { while((buddy = strtok(NULL, ":")) != NULL) { remove_chat_buddy(b, buddy); } } } else if (!strcasecmp(c, "CHAT_LEFT")) { int id; sscanf(strtok(NULL, ":"), "%d", &id); serv_got_chat_left(id); } else if (!strcasecmp(c, "CHAT_IN")) { int id, w; char *m; char *who, *whisper; sscanf(strtok(NULL, ":"), "%d", &id); who = strtok(NULL, ":"); whisper = strtok(NULL, ":"); m = whisper; while(*m && (*m != ':')) m++; m++; if (!strcasecmp(whisper, "T")) w = 1; else w = 0; serv_got_chat_in(id, who, w, m); } else if (!strcasecmp(c, "CHAT_INVITE")) { char *name; char *who; char *message; int id; name = strtok(NULL, ":"); sscanf(strtok(NULL, ":"), "%d", &id); who = strtok(NULL, ":"); message = strtok(NULL, ":"); serv_got_chat_invite(name, id, who, message); #if 0 } else if (!strcasecmp(c, "RVOUS_PROPOSE")) { /* File trans. Yummy. */ char *user; char *uuid; char *cookie; int seq; char *rip, *pip, *vip; int port; int unk[4]; char *messages[4]; int subtype, files, totalsize; char *name; char *tmp; int i; struct file_transfer *ft; user = strtok(NULL, ":"); uuid = strtok(NULL, ":"); cookie = strtok(NULL, ":"); sscanf(strtok(NULL, ":"), "%d", &seq); rip = strtok(NULL, ":"); pip = strtok(NULL, ":"); vip = strtok(NULL, ":"); sscanf(strtok(NULL, ":"), "%d", &port); for (i=0; i<4; i++) { sscanf(strtok(NULL, ":"), "%d", &unk[i]); if (unk[i] == 10001) break; messages[i] = frombase64(strtok(NULL, ":")); } tmp = frombase64(strtok(NULL, ":")); subtype = tmp[1]; files = tmp[3]; /* These are fine */ totalsize = (tmp[4] << 24 & 0xff) | (tmp[5] << 16 & 0xff) | (tmp[6] << 8 & 0xff) | (tmp[7] & 0xff); name = tmp + 8; ft = g_new0(struct file_transfer, 1); ft->cookie = g_strdup(cookie); ft->ip = g_strdup(pip); ft->port = port; if (i) ft->message = g_strdup(messages[0]); else ft->message = NULL; ft->filename = g_strdup(name); ft->user = g_strdup(user); ft->size = totalsize; g_free(tmp); for (i--; i >= 0; i--) g_free(messages[i]); accept_file_dialog(ft); #endif } else { sprintf(debug_buff,"don't know what to do with %s\n", c); debug_print(debug_buff); } g_free(buf); } int toc_signon(char *username, char *password) { char buf[BUF_LONG]; int res; struct signon so; sprintf(debug_buff,"State = %d\n", state); debug_print(debug_buff); if ((res = write(toc_fd, FLAPON, strlen(FLAPON))) < 0) return res; /* Wait for signon packet */ state = STATE_FLAPON; if ((res = wait_reply(buf, sizeof(buf)) < 0)) return res; if (state != STATE_SIGNON_REQUEST) { sprintf(debug_buff, "State should be %d, but is %d instead\n", STATE_SIGNON_REQUEST, state); debug_print(debug_buff); return -1; } /* Compose a response */ g_snprintf(so.username, sizeof(so.username), "%s", username); so.ver = ntohl(1); so.tag = ntohs(1); so.namelen = htons(strlen(so.username)); sflap_send((char *)&so, ntohs(so.namelen) + 8, TYPE_SIGNON); g_snprintf(buf, sizeof(buf), "toc_signon %s %d %s %s %s \"%s\"", login_host, login_port, normalize(username), roast_password(password), LANGUAGE, REVISION); sprintf(debug_buff,"Send: %s\n", buf); debug_print(debug_buff); return sflap_send(buf, -1, TYPE_DATA); } int toc_wait_signon() { /* Wait for the SIGNON to be approved */ char buf[BUF_LEN]; int res; res = wait_reply(buf, sizeof(buf)); if (res < 0) return res; if (state != STATE_SIGNON_ACK) { sprintf(debug_buff, "State should be %d, but is %d instead\n",STATE_SIGNON_ACK, state); debug_print(debug_buff); return -1; } return 0; } #ifdef _WIN32 gint win32_read() { int ret; struct fd_set fds; struct timeval tv; FD_ZERO(&fds); tv.tv_sec = 0; tv.tv_usec = 200; FD_SET(toc_fd, &fds); ret = select(toc_fd + 1, &fds, NULL, NULL, &tv); if (ret == 0) { return TRUE; } toc_callback(NULL, 0, (GdkInputCondition)0); return TRUE; } #endif char *toc_wait_config() { /* Waits for configuration packet, returning the contents of the packet */ static char buf[BUF_LEN]; int res; res = wait_reply(buf, sizeof(buf)); if (res < 0) return NULL; if (state != STATE_CONFIG) { sprintf(debug_buff , "State should be %d, but is %d instead\n",STATE_CONFIG, state); debug_print(debug_buff); return NULL; } /* At this point, it's time to setup automatic handling of incoming packets */ state = STATE_ONLINE; #ifdef _WIN32 win32_r = gtk_timeout_add(1000, (GtkFunction)win32_read, NULL); #else inpa = gdk_input_add(toc_fd, GDK_INPUT_READ | GDK_INPUT_EXCEPTION, toc_callback, NULL); #endif return buf; } void toc_build_config(char *s, int len) { GList *grp = groups; GList *mem; struct group *g; struct buddy *b; GList *plist = permit; GList *dlist = deny; int pos=0; if (!permdeny) permdeny = 1; pos += g_snprintf(&s[pos], len - pos, "m %d\n", permdeny); while(grp) { g = (struct group *)grp->data; pos += g_snprintf(&s[pos], len - pos, "g %s\n", g->name); mem = g->members; while(mem) { b = (struct buddy *)mem->data; pos += g_snprintf(&s[pos], len - pos, "b %s\n", b->name); mem = mem->next; } grp = grp ->next; } while(plist) { pos += g_snprintf(&s[pos], len - pos, "p %s\n", (char *)plist->data); plist=plist->next; } while(dlist) { pos += g_snprintf(&s[pos], len - pos, "d %s\n", (char *)dlist->data); dlist=dlist->next; } } void parse_toc_buddy_list(char *config) { char *c; char current[256]; char *name; GList *bud; /* Clean out the permit/deny list!*/ g_list_free(permit); g_list_free(deny); permit = NULL; deny = NULL; bud = NULL; /* skip "CONFIG:" (if it exists)*/ c = strncmp(config + sizeof(struct sflap_hdr),"CONFIG:",strlen("CONFIG:"))? strtok(config, "\n"): strtok(config + sizeof(struct sflap_hdr)+strlen("CONFIG:"), "\n"); do { if (c == NULL) break; if (*c == 'g') { strncpy(current,c+2, sizeof(current)); add_group(current); } else if (*c == 'b') { add_buddy(current, c+2); bud = g_list_append(bud, c+2); } else if (*c == 'p') { name = g_malloc(strlen(c+2) + 2); g_snprintf(name, strlen(c+2) + 1, "%s", c+2); permit = g_list_append(permit, name); } else if (*c == 'd') { name = g_malloc(strlen(c+2) + 2); g_snprintf(name, strlen(c+2) + 1, "%s", c+2); deny = g_list_append(deny, name); } else if (*c == 'm') { sscanf(c + strlen(c) - 1, "%d", &permdeny); if (permdeny == 0) permdeny = 1; } }while((c=strtok(NULL,"\n"))); #if 0 fprintf(stdout, "Sending message '%s'\n",buf); #endif serv_add_buddies(bud); serv_set_permit_deny(); }