libpurple/protocols/oscar/oft.c

changeset 16238
33bf2fd32108
parent 15884
4de1981757fc
child 17280
7c0472208173
child 18068
b6554e3c8224
child 20478
46933dc62880
equal deleted inserted replaced
13071:b98e72d4089a 16238:33bf2fd32108
1 /*
2 * Purple's oscar protocol plugin
3 * This file is the legal property of its developers.
4 * Please see the AUTHORS file distributed alongside this file.
5 *
6 * This library is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation; either
9 * version 2 of the License, or (at your option) any later version.
10 *
11 * This library is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
15 *
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with this library; if not, write to the Free Software
18 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
19 */
20
21 /*
22 * I feel like this is a good place to explain OFT, so I'm going to
23 * do just that. Each OFT packet has a header type. I guess this
24 * is pretty similar to the subtype of a SNAC packet. The type
25 * basically tells the other client the meaning of the OFT packet.
26 * There are two distinct types of file transfer, which I usually
27 * call "sendfile" and "getfile." Sendfile is when you send a file
28 * to another AIM user. Getfile is when you share a group of files,
29 * and other users request that you send them the files.
30 *
31 * A typical sendfile file transfer goes like this:
32 * 1) Sender sends a channel 2 ICBM telling the other user that
33 * we want to send them a file. At the same time, we open a
34 * listener socket (this should be done before sending the
35 * ICBM) on some port, and wait for them to connect to us.
36 * The ICBM we sent should contain our IP address and the port
37 * number that we're listening on.
38 * 2) The receiver connects to the sender on the given IP address
39 * and port. After the connection is established, the receiver
40 * sends an ICBM signifying that we are ready and waiting.
41 * 3) The sender sends an OFT PROMPT message over the OFT
42 * connection.
43 * 4) The receiver of the file sends back an exact copy of this
44 * OFT packet, except the cookie is filled in with the cookie
45 * from the ICBM. I think this might be an attempt to verify
46 * that the user that is connected is actually the guy that
47 * we sent the ICBM to. Oh, I've been calling this the ACK.
48 * 5) The sender starts sending raw data across the connection
49 * until the entire file has been sent.
50 * 6) The receiver knows the file is finished because the sender
51 * sent the file size in an earlier OFT packet. So then the
52 * receiver sends the DONE thingy (after filling in the
53 * "received" checksum and size) and closes the connection.
54 */
55
56 #include "oscar.h"
57 #include "peer.h"
58
59 #include "util.h"
60
61 #define CHECKSUM_BUFFER_SIZE 256 * 1024
62
63 struct _ChecksumData
64 {
65 PeerConnection *conn;
66 PurpleXfer *xfer;
67 GSourceFunc callback;
68 size_t size;
69 guint32 checksum;
70 size_t total;
71 FILE *file;
72 guint8 buffer[CHECKSUM_BUFFER_SIZE];
73 guint timer;
74 };
75
76 void
77 peer_oft_checksum_destroy(ChecksumData *checksum_data)
78 {
79 checksum_data->conn->checksum_data = NULL;
80 fclose(checksum_data->file);
81 if (checksum_data->timer > 0)
82 purple_timeout_remove(checksum_data->timer);
83 g_free(checksum_data);
84 }
85
86 /**
87 * Calculate oft checksum of buffer
88 *
89 * Prevcheck should be 0xFFFF0000 when starting a checksum of a file. The
90 * checksum is kind of a rolling checksum thing, so each time you get bytes
91 * of a file you just call this puppy and it updates the checksum. You can
92 * calculate the checksum of an entire file by calling this in a while or a
93 * for loop, or something.
94 *
95 * Thanks to Graham Booker for providing this improved checksum routine,
96 * which is simpler and should be more accurate than Josh Myer's original
97 * code. -- wtm
98 *
99 * This algorithm works every time I have tried it. The other fails
100 * sometimes. So, AOL who thought this up? It has got to be the weirdest
101 * checksum I have ever seen.
102 *
103 * @param buffer Buffer of data to checksum. Man I'd like to buff her...
104 * @param bufsize Size of buffer.
105 * @param prevchecksum Previous checksum.
106 * @param odd Whether an odd number of bytes have been processed before this call
107 */
108 static guint32
109 peer_oft_checksum_chunk(const guint8 *buffer, int bufferlen, guint32 prevchecksum, int odd)
110 {
111 guint32 checksum, oldchecksum;
112 int i = 0;
113 unsigned short val;
114
115 checksum = (prevchecksum >> 16) & 0xffff;
116 if (odd)
117 {
118 /*
119 * This is one hell of a hack, but it should always work.
120 * Essentially, I am reindexing the array so that index 1
121 * is the first element. Since the odd and even bytes are
122 * detected by the index number.
123 */
124 i = 1;
125 bufferlen++;
126 buffer--;
127 }
128 for (; i < bufferlen; i++)
129 {
130 oldchecksum = checksum;
131 if (i & 1)
132 val = buffer[i];
133 else
134 val = buffer[i] << 8;
135 checksum -= val;
136 /*
137 * The following appears to be necessary.... It happens
138 * every once in a while and the checksum doesn't fail.
139 */
140 if (checksum > oldchecksum)
141 checksum--;
142 }
143 checksum = ((checksum & 0x0000ffff) + (checksum >> 16));
144 checksum = ((checksum & 0x0000ffff) + (checksum >> 16));
145 return checksum << 16;
146 }
147
148 static gboolean
149 peer_oft_checksum_file_piece(gpointer data)
150 {
151 ChecksumData *checksum_data;
152 gboolean repeat;
153
154 checksum_data = data;
155 repeat = FALSE;
156
157 if (checksum_data->total < checksum_data->size)
158 {
159 size_t bytes = MIN(CHECKSUM_BUFFER_SIZE,
160 checksum_data->size - checksum_data->total);
161
162 bytes = fread(checksum_data->buffer, 1, bytes, checksum_data->file);
163 if (bytes != 0)
164 {
165 checksum_data->checksum = peer_oft_checksum_chunk(checksum_data->buffer, bytes, checksum_data->checksum, checksum_data->total & 1);
166 checksum_data->total += bytes;
167 repeat = TRUE;
168 }
169 }
170
171 if (!repeat)
172 {
173 purple_debug_info("oscar", "Checksum of %s calculated\n",
174 purple_xfer_get_local_filename(checksum_data->xfer));
175 if (checksum_data->callback != NULL)
176 checksum_data->callback(checksum_data);
177 peer_oft_checksum_destroy(checksum_data);
178 }
179
180 return repeat;
181 }
182
183 /**
184 * Calculate oft checksum of a file in a series of calls to
185 * peer_oft_checksum_file_piece(). We do it this way because
186 * calculating the checksum on large files can take a long time,
187 * and we want to return control to the UI so that the application
188 * doesn't appear completely frozen.
189 *
190 * @param conn The connection used for this file transfer.
191 * @param xfer The file transfer needing this checksum.
192 * @param callback The function to call upon calculation of the checksum.
193 * @param size The maximum size to check.
194 */
195
196 static void
197 peer_oft_checksum_file(PeerConnection *conn, PurpleXfer *xfer, GSourceFunc callback, size_t size)
198 {
199 ChecksumData *checksum_data;
200
201 purple_debug_info("oscar", "Calculating checksum of %s\n",
202 purple_xfer_get_local_filename(xfer));
203
204 checksum_data = g_malloc0(sizeof(ChecksumData));
205 checksum_data->conn = conn;
206 checksum_data->xfer = xfer;
207 checksum_data->callback = callback;
208 checksum_data->size = size;
209 checksum_data->checksum = 0xffff0000;
210 checksum_data->file = fopen(purple_xfer_get_local_filename(xfer), "rb");
211
212 if (checksum_data->file == NULL)
213 {
214 purple_debug_error("oscar", "Unable to open %s for checksumming: %s\n",
215 purple_xfer_get_local_filename(xfer), strerror(errno));
216 callback(checksum_data);
217 g_free(checksum_data);
218 }
219 else
220 {
221 checksum_data->timer = purple_timeout_add(10,
222 peer_oft_checksum_file_piece, checksum_data);
223 conn->checksum_data = checksum_data;
224 }
225 }
226
227 static void
228 peer_oft_copy_xfer_data(PeerConnection *conn, OftFrame *frame)
229 {
230 g_free(conn->xferdata.name);
231
232 memcpy(&(conn->xferdata), frame, sizeof(OftFrame));
233 conn->xferdata.name = g_memdup(frame->name, frame->name_length);
234 }
235
236 /**
237 * Free any OFT related data.
238 */
239 void
240 peer_oft_close(PeerConnection *conn)
241 {
242 /*
243 * If canceled by local user, and we're receiving a file, and
244 * we're not connected/ready then send an ICBM cancel message.
245 */
246 if ((purple_xfer_get_status(conn->xfer) == PURPLE_XFER_STATUS_CANCEL_LOCAL) &&
247 !conn->ready)
248 {
249 aim_im_sendch2_cancel(conn);
250 }
251
252 if (conn->sending_data_timer != 0)
253 {
254 purple_timeout_remove(conn->sending_data_timer);
255 conn->sending_data_timer = 0;
256 }
257 }
258
259 /**
260 * Write the given OftFrame to a ByteStream and send it out
261 * on the established PeerConnection.
262 */
263 static void
264 peer_oft_send(PeerConnection *conn, OftFrame *frame)
265 {
266 size_t length;
267 ByteStream bs;
268
269 length = 192 + MAX(64, frame->name_length + 1);
270 byte_stream_new(&bs, length);
271 byte_stream_putraw(&bs, conn->magic, 4);
272 byte_stream_put16(&bs, length);
273 byte_stream_put16(&bs, frame->type);
274 byte_stream_putraw(&bs, frame->cookie, 8);
275 byte_stream_put16(&bs, frame->encrypt);
276 byte_stream_put16(&bs, frame->compress);
277 byte_stream_put16(&bs, frame->totfiles);
278 byte_stream_put16(&bs, frame->filesleft);
279 byte_stream_put16(&bs, frame->totparts);
280 byte_stream_put16(&bs, frame->partsleft);
281 byte_stream_put32(&bs, frame->totsize);
282 byte_stream_put32(&bs, frame->size);
283 byte_stream_put32(&bs, frame->modtime);
284 byte_stream_put32(&bs, frame->checksum);
285 byte_stream_put32(&bs, frame->rfrcsum);
286 byte_stream_put32(&bs, frame->rfsize);
287 byte_stream_put32(&bs, frame->cretime);
288 byte_stream_put32(&bs, frame->rfcsum);
289 byte_stream_put32(&bs, frame->nrecvd);
290 byte_stream_put32(&bs, frame->recvcsum);
291 byte_stream_putraw(&bs, frame->idstring, 32);
292 byte_stream_put8(&bs, frame->flags);
293 byte_stream_put8(&bs, frame->lnameoffset);
294 byte_stream_put8(&bs, frame->lsizeoffset);
295 byte_stream_putraw(&bs, frame->dummy, 69);
296 byte_stream_putraw(&bs, frame->macfileinfo, 16);
297 byte_stream_put16(&bs, frame->nencode);
298 byte_stream_put16(&bs, frame->nlanguage);
299 /*
300 * The name can be more than 64 characters, but if it is less than
301 * 64 characters it is padded with NULLs.
302 */
303 byte_stream_putraw(&bs, frame->name, MAX(64, frame->name_length + 1));
304
305 peer_connection_send(conn, &bs);
306
307 g_free(bs.data);
308 }
309
310 void
311 peer_oft_send_prompt(PeerConnection *conn)
312 {
313 conn->xferdata.type = PEER_TYPE_PROMPT;
314 peer_oft_send(conn, &conn->xferdata);
315 }
316
317 static void
318 peer_oft_send_ack(PeerConnection *conn)
319 {
320 conn->xferdata.type = PEER_TYPE_ACK;
321
322 /* Fill in the cookie */
323 memcpy(conn->xferdata.cookie, conn->cookie, 8);
324
325 peer_oft_send(conn, &conn->xferdata);
326 }
327
328 static void
329 peer_oft_send_resume_accept(PeerConnection *conn)
330 {
331 conn->xferdata.type = PEER_TYPE_RESUMEACCEPT;
332
333 /* Fill in the cookie */
334 memcpy(conn->xferdata.cookie, conn->cookie, 8);
335
336 peer_oft_send(conn, &conn->xferdata);
337 }
338
339 static void
340 peer_oft_send_done(PeerConnection *conn)
341 {
342 conn->xferdata.type = PEER_TYPE_DONE;
343 conn->xferdata.filesleft = 0;
344 conn->xferdata.partsleft = 0;
345 conn->xferdata.nrecvd = purple_xfer_get_bytes_sent(conn->xfer);
346 peer_oft_send(conn, &conn->xferdata);
347 }
348
349 /**
350 * This function exists so that we don't remove the outgoing
351 * data watcher while we're still sending data. In most cases
352 * any data we're sending will be instantly wisked away to a TCP
353 * buffer maintained by our operating system... but we want to
354 * make sure the core doesn't start sending file data while
355 * we're still sending OFT frame data. That would be bad.
356 */
357 static gboolean
358 start_transfer_when_done_sending_data(gpointer data)
359 {
360 PeerConnection *conn;
361
362 conn = data;
363
364 if (purple_circ_buffer_get_max_read(conn->buffer_outgoing) == 0)
365 {
366 conn->sending_data_timer = 0;
367 conn->xfer->fd = conn->fd;
368 conn->fd = -1;
369 purple_xfer_start(conn->xfer, conn->xfer->fd, NULL, 0);
370 return FALSE;
371 }
372
373 return TRUE;
374 }
375
376 /**
377 * This function is similar to the above function, except instead
378 * of starting the xfer it will destroy the connection. This is
379 * used when you want to send one final message across the peer
380 * connection, and then close everything.
381 */
382 static gboolean
383 destroy_connection_when_done_sending_data(gpointer data)
384 {
385 PeerConnection *conn;
386
387 conn = data;
388
389 if (purple_circ_buffer_get_max_read(conn->buffer_outgoing) == 0)
390 {
391 conn->sending_data_timer = 0;
392 peer_connection_destroy(conn, conn->disconnect_reason, NULL);
393 return FALSE;
394 }
395
396 return TRUE;
397 }
398
399 /*
400 * This is called when a buddy sends us some file info. This happens when they
401 * are sending a file to you, and you have just established a connection to them.
402 * You should send them the exact same info except use the real cookie. We also
403 * get like totally ready to like, receive the file, kay?
404 */
405 static void
406 peer_oft_recv_frame_prompt(PeerConnection *conn, OftFrame *frame)
407 {
408 /* Record the file information and send an ack */
409 peer_oft_copy_xfer_data(conn, frame);
410 peer_oft_send_ack(conn);
411
412 /* Remove our watchers and use the file transfer watchers in the core */
413 purple_input_remove(conn->watcher_incoming);
414 conn->watcher_incoming = 0;
415 conn->sending_data_timer = purple_timeout_add(100,
416 start_transfer_when_done_sending_data, conn);
417 }
418
419 /**
420 * We are sending a file to someone else. They have just acknowledged our
421 * prompt, so we want to start sending data like there's no tomorrow.
422 */
423 static void
424 peer_oft_recv_frame_ack(PeerConnection *conn, OftFrame *frame)
425 {
426 if (memcmp(conn->cookie, frame->cookie, 8) != 0)
427 {
428 purple_debug_info("oscar", "Received an incorrect cookie. "
429 "Closing connection.\n");
430 peer_connection_destroy(conn, OSCAR_DISCONNECT_INVALID_DATA, NULL);
431 return;
432 }
433
434 /* Remove our watchers and use the file transfer watchers in the core */
435 purple_input_remove(conn->watcher_incoming);
436 conn->watcher_incoming = 0;
437 conn->sending_data_timer = purple_timeout_add(100,
438 start_transfer_when_done_sending_data, conn);
439 }
440
441 static gboolean
442 peer_oft_recv_frame_resume_checksum_calculated_cb(gpointer data)
443 {
444 ChecksumData *checksum_data;
445 PeerConnection *conn;
446
447 checksum_data = data;
448 conn = checksum_data->conn;
449
450 /* Check the checksums here. If not match, don't allow resume */
451 if (checksum_data->checksum != conn->xferdata.recvcsum || checksum_data->total != conn->xferdata.nrecvd)
452 {
453 /* Reset internal structure */
454 conn->xferdata.recvcsum = 0xffff0000;
455 conn->xferdata.rfrcsum = 0xffff0000;
456 conn->xferdata.nrecvd = 0;
457 }
458 else
459 /* Accept the change */
460 purple_xfer_set_bytes_sent(checksum_data->xfer, conn->xferdata.nrecvd);
461
462 peer_oft_send_resume_accept(conn);
463
464 return FALSE;
465 }
466
467 /**
468 * We are sending a file to someone else. They have just acknowledged our
469 * prompt and are asking to resume, so we accept their resume and await
470 * a resume ack.
471 */
472 static void
473 peer_oft_recv_frame_resume(PeerConnection *conn, OftFrame *frame)
474 {
475 if (memcmp(conn->cookie, frame->cookie, 8) != 0)
476 {
477 purple_debug_info("oscar", "Received an incorrect cookie. "
478 "Closing connection.\n");
479 peer_connection_destroy(conn, OSCAR_DISCONNECT_INVALID_DATA, NULL);
480 return;
481 }
482
483 /* Copy resume data into internal structure */
484 conn->xferdata.recvcsum = frame->recvcsum;
485 conn->xferdata.rfrcsum = frame->rfrcsum;
486 conn->xferdata.nrecvd = frame->nrecvd;
487
488 peer_oft_checksum_file(conn, conn->xfer,
489 peer_oft_recv_frame_resume_checksum_calculated_cb,
490 frame->nrecvd);
491 }
492
493 /*
494 * We just sent a file to someone. They said they got it and everything,
495 * so we can close our direct connection and what not.
496 */
497 static void
498 peer_oft_recv_frame_done(PeerConnection *conn, OftFrame *frame)
499 {
500 purple_input_remove(conn->watcher_incoming);
501 conn->watcher_incoming = 0;
502 conn->xfer->fd = conn->fd;
503 conn->fd = -1;
504 conn->disconnect_reason = OSCAR_DISCONNECT_DONE;
505 peer_connection_schedule_destroy(conn, conn->disconnect_reason, NULL);
506 }
507
508 /**
509 * Handle an incoming OftFrame. If there is a payload associated
510 * with this frame, then we remove the old watcher and add the
511 * OFT watcher to read in the payload.
512 */
513 void
514 peer_oft_recv_frame(PeerConnection *conn, ByteStream *bs)
515 {
516 OftFrame frame;
517
518 frame.type = byte_stream_get16(bs);
519 byte_stream_getrawbuf(bs, frame.cookie, 8);
520 frame.encrypt = byte_stream_get16(bs);
521 frame.compress = byte_stream_get16(bs);
522 frame.totfiles = byte_stream_get16(bs);
523 frame.filesleft = byte_stream_get16(bs);
524 frame.totparts = byte_stream_get16(bs);
525 frame.partsleft = byte_stream_get16(bs);
526 frame.totsize = byte_stream_get32(bs);
527 frame.size = byte_stream_get32(bs);
528 frame.modtime = byte_stream_get32(bs);
529 frame.checksum = byte_stream_get32(bs);
530 frame.rfrcsum = byte_stream_get32(bs);
531 frame.rfsize = byte_stream_get32(bs);
532 frame.cretime = byte_stream_get32(bs);
533 frame.rfcsum = byte_stream_get32(bs);
534 frame.nrecvd = byte_stream_get32(bs);
535 frame.recvcsum = byte_stream_get32(bs);
536 byte_stream_getrawbuf(bs, frame.idstring, 32);
537 frame.flags = byte_stream_get8(bs);
538 frame.lnameoffset = byte_stream_get8(bs);
539 frame.lsizeoffset = byte_stream_get8(bs);
540 byte_stream_getrawbuf(bs, frame.dummy, 69);
541 byte_stream_getrawbuf(bs, frame.macfileinfo, 16);
542 frame.nencode = byte_stream_get16(bs);
543 frame.nlanguage = byte_stream_get16(bs);
544 frame.name_length = bs->len - 186;
545 frame.name = byte_stream_getraw(bs, frame.name_length);
546
547 purple_debug_info("oscar", "Incoming OFT frame from %s with "
548 "type=0x%04x\n", conn->sn, frame.type);
549
550 /* TODOFT: peer_oft_dirconvert_fromstupid(frame->name); */
551
552 switch(frame.type)
553 {
554 case PEER_TYPE_PROMPT:
555 peer_oft_recv_frame_prompt(conn, &frame);
556 break;
557 case PEER_TYPE_ACK:
558 case PEER_TYPE_RESUMEACK:
559 peer_oft_recv_frame_ack(conn, &frame);
560 break;
561 case PEER_TYPE_RESUME:
562 peer_oft_recv_frame_resume(conn, &frame);
563 break;
564 case PEER_TYPE_DONE:
565 peer_oft_recv_frame_done(conn, &frame);
566 break;
567 default:
568 break;
569 }
570
571 free(frame.name);
572 }
573
574 /*******************************************************************/
575 /* Begin PurpleXfer callbacks for use when receiving a file */
576 /*******************************************************************/
577
578 void
579 peer_oft_recvcb_init(PurpleXfer *xfer)
580 {
581 PeerConnection *conn;
582
583 conn = xfer->data;
584 conn->flags |= PEER_CONNECTION_FLAG_APPROVED;
585 peer_connection_trynext(conn);
586 }
587
588 void
589 peer_oft_recvcb_end(PurpleXfer *xfer)
590 {
591 PeerConnection *conn;
592
593 conn = xfer->data;
594
595 /* Tell the other person that we've received everything */
596 conn->fd = conn->xfer->fd;
597 conn->xfer->fd = -1;
598 peer_oft_send_done(conn);
599
600 conn->disconnect_reason = OSCAR_DISCONNECT_DONE;
601 conn->sending_data_timer = purple_timeout_add(100,
602 destroy_connection_when_done_sending_data, conn);
603 }
604
605 void
606 peer_oft_recvcb_ack_recv(PurpleXfer *xfer, const guchar *buffer, size_t size)
607 {
608 PeerConnection *conn;
609
610 /* Update our rolling checksum. Like Walmart, yo. */
611 conn = xfer->data;
612 conn->xferdata.recvcsum = peer_oft_checksum_chunk(buffer,
613 size, conn->xferdata.recvcsum, purple_xfer_get_bytes_sent(xfer) & 1);
614 }
615
616 /*******************************************************************/
617 /* End PurpleXfer callbacks for use when receiving a file */
618 /*******************************************************************/
619
620 /*******************************************************************/
621 /* Begin PurpleXfer callbacks for use when sending a file */
622 /*******************************************************************/
623
624 static gboolean
625 peer_oft_checksum_calculated_cb(gpointer data)
626 {
627 ChecksumData *checksum_data;
628 PeerConnection *conn;
629
630 checksum_data = data;
631 conn = checksum_data->conn;
632
633 conn->xferdata.checksum = checksum_data->checksum;
634
635 /* Start the connection process */
636 peer_connection_trynext(checksum_data->conn);
637
638 return FALSE;
639 }
640
641 void
642 peer_oft_sendcb_init(PurpleXfer *xfer)
643 {
644 PeerConnection *conn;
645 size_t size;
646
647 conn = xfer->data;
648 conn->flags |= PEER_CONNECTION_FLAG_APPROVED;
649
650 /* Make sure the file size can be represented in 32 bits */
651 size = purple_xfer_get_size(xfer);
652 if (size > G_MAXUINT32)
653 {
654 gchar *tmp, *size1, *size2;
655 size1 = purple_str_size_to_units(size);
656 size2 = purple_str_size_to_units(G_MAXUINT32);
657 tmp = g_strdup_printf(_("File %s is %s, which is larger than "
658 "the maximum size of %s."),
659 xfer->local_filename, size1, size2);
660 purple_xfer_error(purple_xfer_get_type(xfer),
661 purple_xfer_get_account(xfer), xfer->who, tmp);
662 g_free(size1);
663 g_free(size2);
664 g_free(tmp);
665 peer_connection_destroy(conn, OSCAR_DISCONNECT_LOCAL_CLOSED, NULL);
666 return;
667 }
668
669 /* Keep track of file transfer info */
670 conn->xferdata.totfiles = 1;
671 conn->xferdata.filesleft = 1;
672 conn->xferdata.totparts = 1;
673 conn->xferdata.partsleft = 1;
674 conn->xferdata.totsize = size;
675 conn->xferdata.size = size;
676 conn->xferdata.checksum = 0xffff0000;
677 conn->xferdata.rfrcsum = 0xffff0000;
678 conn->xferdata.rfcsum = 0xffff0000;
679 conn->xferdata.recvcsum = 0xffff0000;
680 strncpy((gchar *)conn->xferdata.idstring, "OFT_Windows ICBMFT V1.1 32", 31);
681 conn->xferdata.modtime = 0;
682 conn->xferdata.cretime = 0;
683 xfer->filename = g_path_get_basename(xfer->local_filename);
684 conn->xferdata.name = (guchar *)g_strdup(xfer->filename);
685 conn->xferdata.name_length = strlen(xfer->filename);
686
687 peer_oft_checksum_file(conn, xfer,
688 peer_oft_checksum_calculated_cb, G_MAXUINT32);
689 }
690
691 /*
692 * AIM file transfers aren't really meant to be thought
693 * of as a transferring just a single file. The rendezvous
694 * establishes a connection between two computers, and then
695 * those computers can use the same connection for transferring
696 * multiple files. So we don't want the Purple core up and closing
697 * the socket all willy-nilly. We want to do that in the oscar
698 * prpl, whenever one side or the other says they're finished
699 * using the connection. There might be a better way to intercept
700 * the socket from the core...
701 */
702 void
703 peer_oft_sendcb_ack(PurpleXfer *xfer, const guchar *buffer, size_t size)
704 {
705 PeerConnection *conn;
706
707 conn = xfer->data;
708
709 /*
710 * If we're done sending, intercept the socket from the core ft code
711 * and wait for the other guy to send the "done" OFT packet.
712 */
713 if (purple_xfer_get_bytes_remaining(xfer) <= 0)
714 {
715 purple_input_remove(xfer->watcher);
716 conn->fd = xfer->fd;
717 xfer->fd = -1;
718 conn->watcher_incoming = purple_input_add(conn->fd,
719 PURPLE_INPUT_READ, peer_connection_recv_cb, conn);
720 }
721 }
722
723 /*******************************************************************/
724 /* End PurpleXfer callbacks for use when sending a file */
725 /*******************************************************************/
726
727 /*******************************************************************/
728 /* Begin PurpleXfer callbacks for use when sending and receiving */
729 /*******************************************************************/
730
731 void
732 peer_oft_cb_generic_cancel(PurpleXfer *xfer)
733 {
734 PeerConnection *conn;
735
736 conn = xfer->data;
737
738 if (conn == NULL)
739 return;
740
741 peer_connection_destroy(conn, OSCAR_DISCONNECT_LOCAL_CLOSED, NULL);
742 }
743
744 /*******************************************************************/
745 /* End PurpleXfer callbacks for use when sending and receiving */
746 /*******************************************************************/
747
748 #ifdef TODOFT
749 /*
750 * This little area in oscar.c is the nexus of file transfer code,
751 * so I wrote a little explanation of what happens. I am such a
752 * ninja.
753 *
754 * The series of events for a file send is:
755 * -Create xfer and call purple_xfer_request (this happens in oscar_ask_sendfile)
756 * -User chooses a file and oscar_xfer_init is called. It establishes a
757 * listening socket, then asks the remote user to connect to us (and
758 * gives them the file name, port, IP, etc.)
759 * -They connect to us and we send them an PEER_TYPE_PROMPT (this happens
760 * in peer_oft_recv_frame_established)
761 * -They send us an PEER_TYPE_ACK and then we start sending data
762 * -When we finish, they send us an PEER_TYPE_DONE and they close the
763 * connection.
764 * -We get drunk because file transfer kicks ass.
765 *
766 * The series of events for a file receive is:
767 * -Create xfer and call purple_xfer request (this happens in incomingim_chan2)
768 * -Purple user selects file to name and location to save file to and
769 * oscar_xfer_init is called
770 * -It connects to the remote user using the IP they gave us earlier
771 * -After connecting, they send us an PEER_TYPE_PROMPT. In reply, we send
772 * them an PEER_TYPE_ACK.
773 * -They begin to send us lots of raw data.
774 * -When they finish sending data we send an PEER_TYPE_DONE and then close
775 * the connection.
776 *
777 * Update August 2005:
778 * The series of events for transfers has been seriously complicated by the addition
779 * of transfer redirects and proxied connections. I could throw a whole lot of words
780 * at trying to explain things here, but it probably wouldn't do much good. To get
781 * a better idea of what happens, take a look at the diagrams and documentation
782 * from my Summer of Code project. -- Jonathan Clark
783 */
784
785 /**
786 * Convert the directory separator from / (0x2f) to ^A (0x01)
787 *
788 * @param name The filename to convert.
789 */
790 static void
791 peer_oft_dirconvert_tostupid(char *name)
792 {
793 while (name[0]) {
794 if (name[0] == 0x01)
795 name[0] = G_DIR_SEPARATOR;
796 name++;
797 }
798 }
799
800 /**
801 * Convert the directory separator from ^A (0x01) to / (0x2f)
802 *
803 * @param name The filename to convert.
804 */
805 static void
806 peer_oft_dirconvert_fromstupid(char *name)
807 {
808 while (name[0]) {
809 if (name[0] == G_DIR_SEPARATOR)
810 name[0] = 0x01;
811 name++;
812 }
813 }
814 #endif

mercurial