view libfaim/aim_auth.c @ 142:fbabd28795d2

[gaim-migrate @ 152] Added auto-load for plugins. Rob pointed out this might be a bad idea: what if plugins modify the buddy list; the plugins are loaded before signon, thus before the buddy list appears. That would cause errors; then when the list does appear, the plugin doesn't work right because it didn't start off well. My response: EWarmenhoven: there are ways around that EWarmenhoven: in gaim_plugin_init you could have: EWarmenhoven: if (blist) { do_the_normal_thing(); } else { gaim_signal_connect(handle, event_signon, now_the_buddy_list_is_here, NULL); } EWarmenhoven: and actually, that's the way it should be for all plugins that modify the buddy list, because there will be at least one point during execution that it could be loaded when the person is signed off (and i'm not talking about when they first start it up, i'm talking about when they choose 'sign off' instead of 'close' in the buddy list menu) committer: Tailor Script <tailor@pidgin.im>
author Eric Warmenhoven <eric@warmenhoven.org>
date Thu, 20 Apr 2000 00:12:58 +0000
parents 68b230f8da5f
children 6ced2f1c8b24
line wrap: on
line source

/*
  aim_auth.c

  Deals with the authorizer.

 */

#include "aim.h"

/* this just pushes the passed cookie onto the passed connection -- NO SNAC! */
int aim_auth_sendcookie(struct aim_conn_t *conn, char *chipsahoy)
{
  struct command_tx_struct newpacket;
  int curbyte=0;
  
  newpacket.lock = 1;

  if (conn==NULL)
    newpacket.conn = aim_getconn_type(AIM_CONN_TYPE_AUTH);
  else
    newpacket.conn = conn;

  newpacket.type = 0x0001;  /* channel 1 (no SNACs, you know) */
  
  newpacket.commandlen = 4 + 2 + 2 + 0x100;
  newpacket.data = (char *) calloc(1, newpacket.commandlen);
  
  curbyte += aimutil_put16(newpacket.data+curbyte, 0x0000);
  curbyte += aimutil_put16(newpacket.data+curbyte, 0x0001);
  curbyte += aimutil_put16(newpacket.data+curbyte, 0x0006);
  curbyte += aimutil_put16(newpacket.data+curbyte, 0x0100);
  memcpy(&(newpacket.data[curbyte]), chipsahoy, 0x100);

  aim_tx_enqueue(&newpacket);
  
  return 0;
}

u_long aim_auth_clientready(struct aim_conn_t *conn)
{
  struct command_tx_struct newpacket;
  int curbyte = 0;

  newpacket.lock = 1;

  if (conn==NULL)
    newpacket.conn = aim_getconn_type(AIM_CONN_TYPE_AUTH);
  else
    newpacket.conn = conn;

  newpacket.type = 0x0002;
  
  newpacket.commandlen = 26;
  newpacket.data = (char *) malloc(newpacket.commandlen);
  
  curbyte += aim_putsnac(newpacket.data+curbyte, 0x0001, 0x0002, 0x0000, aim_snac_nextid);
  curbyte += aimutil_put16(newpacket.data+curbyte, 0x0001);
  curbyte += aimutil_put16(newpacket.data+curbyte, 0x0002);
  curbyte += aimutil_put16(newpacket.data+curbyte, 0x0001);
  curbyte += aimutil_put16(newpacket.data+curbyte, 0x0013);
  curbyte += aimutil_put16(newpacket.data+curbyte, 0x0007);
  curbyte += aimutil_put16(newpacket.data+curbyte, 0x0001);
  curbyte += aimutil_put16(newpacket.data+curbyte, 0x0001);
  curbyte += aimutil_put16(newpacket.data+curbyte, 0x0001);

  aim_tx_enqueue(&newpacket);

  {
    struct aim_snac_t snac;
    
    snac.id = aim_snac_nextid;
    snac.family = 0x0001;
    snac.type = 0x0004;
    snac.flags = 0x0000;

    snac.data = NULL;

    aim_newsnac(&snac);
  }

  return (aim_snac_nextid++);
}

u_long aim_auth_changepasswd(struct aim_conn_t *conn, char *new, char *current)
{
  struct command_tx_struct newpacket;
  int i;

  newpacket.lock = 1;

  if (conn==NULL)
    newpacket.conn = aim_getconn_type(AIM_CONN_TYPE_AUTH);
  else
    newpacket.conn = conn;

  newpacket.type = 0x0002;
  
  newpacket.commandlen = 10 + 4 + strlen(current) + 4 + strlen(new);
  newpacket.data = (char *) malloc(newpacket.commandlen);

  newpacket.data[0] = 0x00;
  newpacket.data[1] = 0x07;

  newpacket.data[2] = 0x00;
  newpacket.data[3] = 0x04;

  newpacket.data[4] = 0x00;
  newpacket.data[5] = 0x00;

  /* SNAC reqid */
  newpacket.data[6] = (aim_snac_nextid >> 24) & 0xFF;
  newpacket.data[7] = (aim_snac_nextid >> 16) & 0xFF;
  newpacket.data[8] = (aim_snac_nextid >>  8) & 0xFF;
  newpacket.data[9] = (aim_snac_nextid) & 0xFF;

  /* current password TLV t(0002) */
  i = 10;
  newpacket.data[i++] = 0x00;
  newpacket.data[i++] = 0x02;
  newpacket.data[i++] = 0x00;
  newpacket.data[i++] = strlen(current) & 0xff;
  memcpy(&(newpacket.data[i]), current, strlen(current));
  i += strlen(current);

  /* new password TLV t(0012) */
  newpacket.data[i++] = 0x00;
  newpacket.data[i++] = 0x12;
  newpacket.data[i++] = 0x00;
  newpacket.data[i++] = strlen(new) & 0xff;
  memcpy(&(newpacket.data[i]), new, strlen(new));
  i+=strlen(new);

  aim_tx_enqueue(&newpacket);

  {
    struct aim_snac_t snac;
    
    snac.id = aim_snac_nextid;
    snac.family = 0x0001;
    snac.type = 0x0004;
    snac.flags = 0x0000;

    snac.data = NULL;

    aim_newsnac(&snac);
  }

  return (aim_snac_nextid++);
}