Mercurial > pidgin
view src/toc.c @ 338:9d258a0aa560
[gaim-migrate @ 348]
Whoa, all kinds of things happened here. The applet looks better. The
preferences dialog changes based on your compile-time options (oscar,
gnome). Whispering works again. libfaim got updated; it can almost do
RVOUS stuff, and hopefully soon can make requests too. The applet doesn't
need to have its sounds go through GNOME, although it still can. There
is code to facilitate SOCKS5 support (all that needs to be done is to
actually write the code to communicate with the proxy server).
committer: Tailor Script <tailor@pidgin.im>
author | Eric Warmenhoven <eric@warmenhoven.org> |
---|---|
date | Tue, 06 Jun 2000 09:55:30 +0000 |
parents | af60432518a6 |
children | b402a23f35df |
line wrap: on
line source
/* * gaim * * Copyright (C) 1998-1999, Mark Spencer <markster@marko.net> * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA * */ #include <netdb.h> #include <gtk/gtk.h> #include <unistd.h> #include <errno.h> #include <netinet/in.h> #include <arpa/inet.h> #include <string.h> #include <stdlib.h> #include <stdio.h> #include <time.h> #include <sys/socket.h> #include "gaim.h" #include "gnome_applet_mgr.h" #ifndef USE_OSCAR /* descriptor for talking to TOC */ static int toc_fd; static int seqno; static unsigned int peer_ver=0; static int state; static int inpa=-1; #ifdef _WIN32 static int win32_r; #endif int toc_signon(char *username, char *password); int toc_login(char *username, char *password) { char *config; struct in_addr *sin; struct aim_user *u; char buf[80]; char buf2[2048]; g_snprintf(buf, sizeof(buf), "Looking up %s", aim_host); set_login_progress(1, buf); sin = (struct in_addr *)get_address(aim_host); if (!sin) { #ifdef USE_APPLET setUserState(offline); #endif /* USE_APPLET */ set_state(STATE_OFFLINE); g_snprintf(buf, sizeof(buf), "Unable to lookup %s", aim_host); hide_login_progress(buf); return -1; } g_snprintf(toc_addy, sizeof(toc_addy), "%s", inet_ntoa(*sin)); g_snprintf(buf, sizeof(buf), "Connecting to %s", inet_ntoa(*sin)); set_login_progress(2, buf); toc_fd = connect_address(sin->s_addr, aim_port); if (toc_fd < 0) { #ifdef USE_APPLET setUserState(offline); #endif /* USE_APPLET */ set_state(STATE_OFFLINE); g_snprintf(buf, sizeof(buf), "Connect to %s failed", inet_ntoa(*sin)); hide_login_progress(buf); return -1; } g_free(sin); g_snprintf(buf, sizeof(buf), "Signon: %s",username); set_login_progress(3, buf); if (toc_signon(username, password) < 0) { #ifdef USE_APPLET setUserState(offline); #endif /* USE_APPLET */ set_state(STATE_OFFLINE); hide_login_progress("Disconnected."); return -1; } g_snprintf(buf, sizeof(buf), "Waiting for reply..."); set_login_progress(4, buf); if (toc_wait_signon() < 0) { #ifdef USE_APPLET setUserState(offline); #endif /* USE_APPLET */ set_state(STATE_OFFLINE); hide_login_progress("Authentication Failed"); return -1; } u = find_user(username); if (!u) { u = g_new0(struct aim_user, 1); g_snprintf(u->user_info, sizeof(u->user_info), DEFAULT_INFO); aim_users = g_list_append(aim_users, u); } current_user = u; g_snprintf(current_user->username, sizeof(current_user->username), "%s", username); g_snprintf(current_user->password, sizeof(current_user->password), "%s", password); save_prefs(); g_snprintf(buf, sizeof(buf), "Retrieving config..."); set_login_progress(5, buf); config = toc_wait_config(); state = STATE_ONLINE; #ifdef USE_APPLET make_buddy(); if (general_options & OPT_GEN_APP_BUDDY_SHOW) { gnome_buddy_show(); if (config != NULL) parse_toc_buddy_list(config, 0); else do_import(0, 0); createOnlinePopup(); set_applet_draw_open(); } else { gnome_buddy_hide(); if (config != NULL) parse_toc_buddy_list(config, 0); else do_import(0, 0); set_applet_draw_closed(); } setUserState(online); gtk_widget_hide(mainwindow); #else gtk_widget_hide(mainwindow); show_buddy_list(); if (config != NULL) parse_toc_buddy_list(config, 0); else do_import(0, 0); refresh_buddy_window(); #endif g_snprintf(buf2, sizeof(buf2), "toc_init_done"); sflap_send(buf2, -1, TYPE_DATA); g_snprintf(buf2, sizeof(buf2), "toc_set_caps %s %s %s %s %s", FILE_SEND_UID, FILE_GET_UID, B_ICON_UID, IMAGE_UID, VOICE_UID); sflap_send(buf2, -1, TYPE_DATA); serv_finish_login(); return 0; } void toc_close() { #ifdef USE_APPLET setUserState(offline); #endif /* USE_APPLET */ seqno = 0; state = STATE_OFFLINE; if (inpa > 0) gdk_input_remove(inpa); close(toc_fd); toc_fd=-1; inpa=-1; } unsigned char *roast_password(char *pass) { /* Trivial "encryption" */ static char rp[256]; static char *roast = ROAST; int pos=2; int x; strcpy(rp, "0x"); for (x=0;(x<150) && pass[x]; x++) pos+=sprintf(&rp[pos],"%02x", pass[x] ^ roast[x % strlen(roast)]); rp[pos]='\0'; return rp; } char *print_header(void *hdr_v) { static char s[80]; struct sflap_hdr *hdr = (struct sflap_hdr *)hdr_v; g_snprintf(s,sizeof(s), "[ ast: %c, type: %d, seqno: %d, len: %d ]", hdr->ast, hdr->type, ntohs(hdr->seqno), ntohs(hdr->len)); return s; } void print_buffer(char *buf, int len) { #if 0 int x; printf("[ "); for (x=0;x<len;x++) printf("%d ", buf[x]); printf("]\n"); printf("[ "); for (x=0;x<len;x++) printf("%c ", buf[x]); printf("]\n"); #endif } int sflap_send(char *buf, int olen, int type) { int len; int slen=0; struct sflap_hdr hdr; char obuf[MSG_LEN]; /* One _last_ 2048 check here! This shouldn't ever * get hit though, hopefully. If it gets hit on an IM * It'll lose the last " and the message won't go through, * but this'll stop a segfault. */ if (strlen(buf) > (MSG_LEN - sizeof(hdr))) { buf[MSG_LEN - sizeof(hdr) - 3] = '"'; buf[MSG_LEN - sizeof(hdr) - 2] = '\0'; } sprintf(debug_buff,"%s [Len %d]\n", buf, strlen(buf)); debug_print(debug_buff); if (olen < 0) len = escape_message(buf); else len = olen; hdr.ast = '*'; hdr.type = type; hdr.seqno = htons(seqno++ & 0xffff); hdr.len = htons(len + (type == TYPE_SIGNON ? 0 : 1)); sprintf(debug_buff,"Escaped message is '%s'\n",buf); debug_print(debug_buff); memcpy(obuf, &hdr, sizeof(hdr)); slen += sizeof(hdr); memcpy(&obuf[slen], buf, len); slen += len; if (type != TYPE_SIGNON) { obuf[slen]='\0'; slen += 1; } print_buffer(obuf, slen); return write(toc_fd, obuf, slen); } int wait_reply(char *buffer, size_t buflen) { size_t res=-1; int read_rv = -1; struct sflap_hdr *hdr=(struct sflap_hdr *)buffer; char *c; if(buflen < sizeof(struct sflap_hdr)) { do_error_dialog("Buffer too small", "Gaim - Error (internal)"); return -1; } while((read_rv = read(toc_fd, buffer, 1))) { if (read_rv < 0 || read_rv > 1) return -1; if (buffer[0] == '*') break; } read_rv = read(toc_fd, buffer+1, sizeof(struct sflap_hdr) - 1); if (read_rv < 0) return read_rv; res = read_rv + 1; sprintf(debug_buff, "Rcv: %s %s\n",print_header(buffer), ""); debug_print(debug_buff); if(buflen < sizeof(struct sflap_hdr) + ntohs(hdr->len) + 1) { do_error_dialog("Buffer too small", "Gaim - Error (internal)"); return -1; } while (res < (sizeof(struct sflap_hdr) + ntohs(hdr->len))) { read_rv = read(toc_fd, buffer + res, (ntohs(hdr->len) + sizeof(struct sflap_hdr)) - res); if(read_rv < 0) return read_rv; res += read_rv; while(gtk_events_pending()) gtk_main_iteration(); } if (res >= sizeof(struct sflap_hdr)) buffer[res]='\0'; else return res - sizeof(struct sflap_hdr); switch(hdr->type) { case TYPE_SIGNON: memcpy(&peer_ver, buffer + sizeof(struct sflap_hdr), 4); peer_ver = ntohl(peer_ver); seqno = ntohs(hdr->seqno); state = STATE_SIGNON_REQUEST; break; case TYPE_DATA: if (!strncasecmp(buffer + sizeof(struct sflap_hdr), "SIGN_ON:", strlen("SIGN_ON:"))) state = STATE_SIGNON_ACK; else if (!strncasecmp(buffer + sizeof(struct sflap_hdr), "CONFIG:", strlen("CONFIG:"))) { state = STATE_CONFIG; } else if (!strncasecmp(buffer + sizeof(struct sflap_hdr), "ERROR:", strlen("ERROR:"))) { c = strtok(buffer + sizeof(struct sflap_hdr) + strlen("ERROR:"), ":"); show_error_dialog(c); } sprintf(debug_buff, "Data: %s\n",buffer + sizeof(struct sflap_hdr)); debug_print(debug_buff); break; default: sprintf(debug_buff, "Unknown/unimplemented packet type %d\n",hdr->type); debug_print(debug_buff); } return res; } void toc_callback( gpointer data, gint source, GdkInputCondition condition ) { char *buf; char *c; char *l; buf = g_malloc(BUF_LONG); if (wait_reply(buf, BUF_LONG) < 0) { signoff(); hide_login_progress("Connection Closed"); g_free(buf); return; } c=strtok(buf+sizeof(struct sflap_hdr),":"); /* Ditch the first part */ if (!strcasecmp(c,"UPDATE_BUDDY")) { char *uc; int logged, evil, idle, type = 0; time_t signon; time_t time_idle; c = strtok(NULL,":"); /* c is name */ l = strtok(NULL,":"); /* l is T/F logged status */ sscanf(strtok(NULL, ":"), "%d", &evil); sscanf(strtok(NULL, ":"), "%ld", &signon); sscanf(strtok(NULL, ":"), "%d", &idle); uc = strtok(NULL, ":"); if (!strncasecmp(l,"T",1)) logged = 1; else logged = 0; if (uc[0] == 'A') type |= UC_AOL; switch(uc[1]) { case 'A': type |= UC_ADMIN; break; case 'U': type |= UC_UNCONFIRMED; break; case 'O': type |= UC_NORMAL; break; default: break; } switch(uc[2]) { case 'U': type |= UC_UNAVAILABLE; break; default: break; } if (idle) { time(&time_idle); time_idle -= idle*60; } else time_idle = 0; serv_got_update(c, logged, evil, signon, time_idle, type); } else if (!strcasecmp(c, "CONFIG")) { /* do we want to load the buddy list again here? */ c = strtok(NULL,":"); parse_toc_buddy_list(c, 0); } else if (!strcasecmp(c, "ERROR")) { /* This should be handled by wait_reply c = strtok(NULL,":"); show_error_dialog(c); */ } else if (!strcasecmp(c, "NICK")) { c = strtok(NULL,":"); g_snprintf(current_user->username, sizeof(current_user->username), "%s", c); } else if (!strcasecmp(c, "IM_IN")) { char *away, *message; int a = 0; c = strtok(NULL,":"); away = strtok(NULL,":"); message = away; while(*message && (*message != ':')) message++; message++; if (!strncasecmp(away, "T", 1)) a = 1; serv_got_im(c, message, a); } else if (!strcasecmp(c, "GOTO_URL")) { char *name; char *url; char tmp[256]; name = strtok(NULL, ":"); url = strtok(NULL, ":"); g_snprintf(tmp, sizeof(tmp), "http://%s:%d/%s", toc_addy, aim_port, url); /* fprintf(stdout, "Name: %s\n%s\n", name, url); printf("%s", grab_url(tmp));*/ g_show_info(tmp); } else if (!strcasecmp(c, "EVILED")) { int lev; char *name = NULL; sscanf(strtok(NULL, ":"), "%d", &lev); name = strtok(NULL, ":"); sprintf(debug_buff,"%s | %d\n", name, lev); debug_print(debug_buff); serv_got_eviled(name, lev); } else if (!strcasecmp(c, "CHAT_JOIN")) { char *name; int id; sscanf(strtok(NULL, ":"), "%d", &id); name = strtok(NULL, ":"); serv_got_joined_chat(id, name); } else if (!strcasecmp(c, "DIR_STATUS")) { } else if (!strcasecmp(c, "ADMIN_PASSWD_STATUS")) { do_error_dialog("Password Change Successeful", "Gaim - Password Change"); } else if (!strcasecmp(c, "CHAT_UPDATE_BUDDY")) { int id; char *in; char *buddy; GList *bcs = buddy_chats; struct buddy_chat *b = NULL; sscanf(strtok(NULL, ":"), "%d", &id); in = strtok(NULL, ":"); while(bcs) { b = (struct buddy_chat *)bcs->data; if (id == b->id) break; bcs = bcs->next; b = NULL; } if (!b) { g_free(buf); return; } if (!strcasecmp(in, "T")) { while((buddy = strtok(NULL, ":")) != NULL) { add_chat_buddy(b, buddy); } } else { while((buddy = strtok(NULL, ":")) != NULL) { remove_chat_buddy(b, buddy); } } } else if (!strcasecmp(c, "CHAT_LEFT")) { int id; sscanf(strtok(NULL, ":"), "%d", &id); serv_got_chat_left(id); } else if (!strcasecmp(c, "CHAT_IN")) { int id, w; char *m; char *who, *whisper; sscanf(strtok(NULL, ":"), "%d", &id); who = strtok(NULL, ":"); whisper = strtok(NULL, ":"); m = whisper; while(*m && (*m != ':')) m++; m++; if (!strcasecmp(whisper, "T")) w = 1; else w = 0; serv_got_chat_in(id, who, w, m); } else if (!strcasecmp(c, "CHAT_INVITE")) { char *name; char *who; char *message; int id; name = strtok(NULL, ":"); sscanf(strtok(NULL, ":"), "%d", &id); who = strtok(NULL, ":"); message = strtok(NULL, ":"); serv_got_chat_invite(name, id, who, message); } else if (!strcasecmp(c, "RVOUS_PROPOSE")) { char *user; char *uuid; char *cookie; int seq; char *rip, *pip, *vip; int port; int unk[4]; char *messages[4]; int subtype, files, totalsize; char *name; char *tmp; int i; struct file_transfer *ft; user = strtok(NULL, ":"); uuid = strtok(NULL, ":"); cookie = strtok(NULL, ":"); sscanf(strtok(NULL, ":"), "%d", &seq); rip = strtok(NULL, ":"); pip = strtok(NULL, ":"); vip = strtok(NULL, ":"); sscanf(strtok(NULL, ":"), "%d", &port); if (!strcmp(uuid, FILE_SEND_UID)) { /* we're getting a file */ for (i=0; i<4; i++) { sscanf(strtok(NULL, ":"), "%d", &unk[i]); if (unk[i] == 10001) break; messages[i] = frombase64(strtok(NULL, ":")); } tmp = frombase64(strtok(NULL, ":")); subtype = tmp[1]; files = tmp[3]; /* These are fine */ totalsize = 0; totalsize |= (tmp[4] << 24) & 0xff000000; totalsize |= (tmp[5] << 16) & 0x00ff0000; totalsize |= (tmp[6] << 8) & 0x0000ff00; totalsize |= (tmp[7] << 0) & 0x000000ff; name = tmp + 8; ft = g_new0(struct file_transfer, 1); ft->cookie = g_strdup(cookie); ft->ip = g_strdup(pip); ft->port = port; if (i) ft->message = g_strdup(messages[0]); else ft->message = NULL; ft->filename = g_strdup(name); ft->user = g_strdup(user); ft->size = totalsize; sprintf(ft->UID, "%s", FILE_SEND_UID); g_free(tmp); for (i--; i >= 0; i--) g_free(messages[i]); accept_file_dialog(ft); } else if (!strcmp(uuid, FILE_GET_UID)) { /* we're sending a file */ for (i=0; i<4; i++) { sscanf(strtok(NULL, ":"), "%d", &unk[i]); if (unk[i] == 10001) break; messages[i] = frombase64(strtok(NULL, ":")); } tmp = frombase64(strtok(NULL, ":")); ft = g_new0(struct file_transfer, 1); ft->cookie = g_strdup(cookie); ft->ip = g_strdup(pip); ft->port = port; if (i) ft->message = g_strdup(messages[0]); else ft->message = NULL; ft->user = g_strdup(user); sprintf(ft->UID, "%s", FILE_GET_UID); g_free(tmp); for (i--; i >= 0; i--) g_free(messages[i]); accept_file_dialog(ft); /* } else if (!strcmp(uuid, VOICE_UID)) { } else if (!strcmp(uuid, B_ICON_UID)) { } else if (!strcmp(uuid, IMAGE_UID)) { */ } else { sprintf(debug_buff,"don't know what to do with %s\n", uuid); debug_print(debug_buff); tmp = g_malloc(BUF_LEN); name = frombase64(cookie); snprintf(tmp, BUF_LEN, "toc_rvous_cancel %s %s %s", user, name, uuid); sflap_send(tmp, strlen(tmp), TYPE_DATA); free(name); free(tmp); } } else { sprintf(debug_buff,"don't know what to do with %s\n", c); debug_print(debug_buff); } g_free(buf); } int toc_signon(char *username, char *password) { char buf[BUF_LONG]; int res; struct signon so; sprintf(debug_buff,"State = %d\n", state); debug_print(debug_buff); if ((res = write(toc_fd, FLAPON, strlen(FLAPON))) < 0) return res; /* Wait for signon packet */ state = STATE_FLAPON; if ((res = wait_reply(buf, sizeof(buf)) < 0)) return res; if (state != STATE_SIGNON_REQUEST) { sprintf(debug_buff, "State should be %d, but is %d instead\n", STATE_SIGNON_REQUEST, state); debug_print(debug_buff); return -1; } /* Compose a response */ g_snprintf(so.username, sizeof(so.username), "%s", username); so.ver = ntohl(1); so.tag = ntohs(1); so.namelen = htons(strlen(so.username)); sflap_send((char *)&so, ntohs(so.namelen) + 8, TYPE_SIGNON); g_snprintf(buf, sizeof(buf), "toc_signon %s %d %s %s %s \"%s\"", login_host, login_port, normalize(username), roast_password(password), LANGUAGE, REVISION); sprintf(debug_buff,"Send: %s\n", buf); debug_print(debug_buff); return sflap_send(buf, -1, TYPE_DATA); } int toc_wait_signon() { /* Wait for the SIGNON to be approved */ char buf[BUF_LEN]; int res; res = wait_reply(buf, sizeof(buf)); if (res < 0) return res; if (state != STATE_SIGNON_ACK) { sprintf(debug_buff, "State should be %d, but is %d instead\n",STATE_SIGNON_ACK, state); debug_print(debug_buff); return -1; } return 0; } #ifdef _WIN32 gint win32_read() { int ret; struct fd_set fds; struct timeval tv; FD_ZERO(&fds); tv.tv_sec = 0; tv.tv_usec = 200; FD_SET(toc_fd, &fds); ret = select(toc_fd + 1, &fds, NULL, NULL, &tv); if (ret == 0) { return TRUE; } toc_callback(NULL, 0, (GdkInputCondition)0); return TRUE; } #endif char *toc_wait_config() { /* Waits for configuration packet, returning the contents of the packet */ static char buf[BUF_LEN]; int res; res = wait_reply(buf, sizeof(buf)); if (res < 0) return NULL; /* Apparently, the toc_config is optional. *VERY* Optional */ if (state != STATE_CONFIG) { res = 0; } else { res = 1; } /* At this point, it's time to setup automatic handling of incoming packets */ state = STATE_ONLINE; #ifdef _WIN32 win32_r = gtk_timeout_add(1000, (GtkFunction)win32_read, NULL); #else inpa = gdk_input_add(toc_fd, GDK_INPUT_READ | GDK_INPUT_EXCEPTION, toc_callback, NULL); #endif if (res) return buf; else return NULL; } #endif /* USE_OSCAR */ void toc_build_config(char *s, int len) { GList *grp = groups; GList *mem; struct group *g; struct buddy *b; GList *plist = permit; GList *dlist = deny; int pos=0; if (!permdeny) permdeny = 1; pos += g_snprintf(&s[pos], len - pos, "m %d\n", permdeny); while(grp) { g = (struct group *)grp->data; pos += g_snprintf(&s[pos], len - pos, "g %s\n", g->name); mem = g->members; while(mem) { b = (struct buddy *)mem->data; pos += g_snprintf(&s[pos], len - pos, "b %s\n", b->name); mem = mem->next; } grp = grp ->next; } while(plist) { pos += g_snprintf(&s[pos], len - pos, "p %s\n", (char *)plist->data); plist=plist->next; } while(dlist) { pos += g_snprintf(&s[pos], len - pos, "d %s\n", (char *)dlist->data); dlist=dlist->next; } } void parse_toc_buddy_list(char *config, int from_do_import) { char *c; char current[256]; char *name; GList *bud; int how_many = 0; /* Clean out the permit/deny list!*/ g_list_free(permit); g_list_free(deny); permit = NULL; deny = NULL; bud = NULL; /* skip "CONFIG:" (if it exists)*/ if (config != NULL) { c = strncmp(config + sizeof(struct sflap_hdr),"CONFIG:",strlen("CONFIG:"))? strtok(config, "\n"): strtok(config + sizeof(struct sflap_hdr)+strlen("CONFIG:"), "\n"); do { if (c == NULL) break; if (*c == 'g') { strncpy(current,c+2, sizeof(current)); add_group(current); how_many++; } else if (*c == 'b') { add_buddy(current, c+2); how_many++; bud = g_list_append(bud, c+2); } else if (*c == 'p') { name = g_malloc(strlen(c+2) + 2); g_snprintf(name, strlen(c+2) + 1, "%s", c+2); permit = g_list_append(permit, name); } else if (*c == 'd') { name = g_malloc(strlen(c+2) + 2); g_snprintf(name, strlen(c+2) + 1, "%s", c+2); deny = g_list_append(deny, name); } else if (*c == 'm') { sscanf(c + strlen(c) - 1, "%d", &permdeny); if (permdeny == 0) permdeny = 1; } }while((c=strtok(NULL,"\n"))); #if 0 fprintf(stdout, "Sending message '%s'\n",buf); #endif serv_add_buddies(bud); serv_set_permit_deny(); if (blist) { build_edit_tree(); build_permit_tree(); } } /* perhaps the server dropped the buddy list, try importing from cache */ if ( how_many == 0 && !from_do_import ) { do_import( (GtkWidget *) NULL, 0 ); } else if ( bud_list_cache_exists() == FALSE ) { do_export( (GtkWidget *) NULL, 0 ); } }