diff -r a3bc4677dbdd -r 889b6d39bed7 libpurple/protocols/toc/toc.c --- a/libpurple/protocols/toc/toc.c Mon Mar 16 21:46:01 2009 +0000 +++ /dev/null Thu Jan 01 00:00:00 1970 +0000 @@ -1,2340 +0,0 @@ -/* - * purple - * - * Copyright (C) 1998-1999, Mark Spencer - * - * This program is free software; you can redistribute it and/or modify - * it under the terms of the GNU General Public License as published by - * the Free Software Foundation; either version 2 of the License, or - * (at your option) any later version. - * - * This program is distributed in the hope that it will be useful, - * but WITHOUT ANY WARRANTY; without even the implied warranty of - * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - * GNU General Public License for more details. - * - * You should have received a copy of the GNU General Public License - * along with this program; if not, write to the Free Software - * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02111-1301 USA - * - */ -#include "internal.h" - -#include "account.h" -#include "accountopt.h" -#include "conversation.h" -#include "debug.h" -#include "notify.h" -#include "privacy.h" -#include "proxy.h" -#include "prpl.h" -#include "request.h" -#include "util.h" -#include "version.h" - -static PurplePlugin *my_protocol = NULL; - -#define REVISION "penguin" - -#define TYPE_SIGNON 1 -#define TYPE_DATA 2 -#define TYPE_ERROR 3 -#define TYPE_SIGNOFF 4 -#define TYPE_KEEPALIVE 5 - -#define FLAPON "FLAPON\r\n\r\n" -#define ROAST "Tic/Toc" - -#define TOC_HOST "toc.oscar.aol.com" -#define TOC_PORT 9898 -#define AUTH_HOST "login.oscar.aol.com" -#define AUTH_PORT 5190 -#define LANGUAGE "english" - -#define STATE_OFFLINE 0 -#define STATE_FLAPON 1 -#define STATE_SIGNON_REQUEST 2 -#define STATE_ONLINE 3 -#define STATE_PAUSE 4 - -#define VOICE_UID "09461341-4C7F-11D1-8222-444553540000" -#define FILE_SEND_UID "09461343-4C7F-11D1-8222-444553540000" -#define IMAGE_UID "09461345-4C7F-11D1-8222-444553540000" -#define B_ICON_UID "09461346-4C7F-11D1-8222-444553540000" -#define STOCKS_UID "09461347-4C7F-11D1-8222-444553540000" -#define FILE_GET_UID "09461348-4C7F-11D1-8222-444553540000" -#define GAMES_UID "0946134a-4C7F-11D1-8222-444553540000" - -#define UC_UNAVAILABLE 0x01 -#define UC_AOL 0x02 -#define UC_ADMIN 0x04 -#define UC_UNCONFIRMED 0x08 -#define UC_NORMAL 0x10 -#define UC_WIRELESS 0x20 - -struct ft_request { - PurpleConnection *gc; - char *user; - char UID[2048]; - char *cookie; - char *ip; - int port; - char *message; - char *filename; - int files; - int size; -}; - -struct buddy_icon { - guint32 hash; - guint32 len; - time_t time; - void *data; -}; - -struct toc_data { - int toc_fd; - char toc_ip[20]; - int seqno; - int state; -}; - -struct sflap_hdr { - unsigned char ast; - unsigned char type; - unsigned short seqno; - unsigned short len; -}; - -struct signon { - unsigned int ver; - unsigned short tag; - unsigned short namelen; - char username[80]; -}; - -/* constants to identify proto_opts */ -#define USEROPT_AUTH 0 -#define USEROPT_AUTHPORT 1 - -#define TOC_CONNECT_STEPS 3 - -static void toc_login_callback(gpointer, gint, const gchar *); -static void toc_callback(gpointer, gint, PurpleInputCondition); - -/* ok. this function used to take username/password, and return 0 on success. - * now, it takes username/password, and returns NULL on error or a new purple_connection - * on success. */ -static void toc_login(PurpleAccount *account) -{ - PurpleConnection *gc; - struct toc_data *tdt; - char buf[80]; - - gc = purple_account_get_connection(account); - gc->proto_data = tdt = g_new0(struct toc_data, 1); - gc->flags |= PURPLE_CONNECTION_HTML; - gc->flags |= PURPLE_CONNECTION_AUTO_RESP; - - g_snprintf(buf, sizeof buf, _("Looking up %s"), - purple_account_get_string(account, "server", TOC_HOST)); - purple_connection_update_progress(gc, buf, 0, TOC_CONNECT_STEPS); - - purple_debug(PURPLE_DEBUG_INFO, "toc", "Client connects to TOC\n"); - if (purple_proxy_connect(gc, account, - purple_account_get_string(account, "server", TOC_HOST), - purple_account_get_int(account, "port", TOC_PORT), - toc_login_callback, gc) != 0 || !account->gc) { - g_snprintf(buf, sizeof(buf), _("Connect to %s failed"), - purple_account_get_string(account, "server", TOC_HOST)); - purple_connection_error(gc, buf); - return; - } -} - -static void toc_login_callback(gpointer data, gint source, const gchar *error_message) -{ - PurpleConnection *gc = data; - struct toc_data *tdt; - char buf[80]; - struct sockaddr_in name; - socklen_t namelen; - - if (!PURPLE_CONNECTION_IS_VALID(gc)) { - if (source >= 0) - close(source); - return; - } - - tdt = gc->proto_data; - - if (source == -1) { - /* we didn't successfully connect. tdt->toc_fd is valid here */ - purple_connection_error(gc, _("Unable to connect.")); - return; - } - tdt->toc_fd = source; - - /* - * Copy the IP that we're connected to. We need this because "GOTO_URL"'s - * should open on the exact server we're connected to. toc.oscar.aol.com - * doesn't work because that hostname resolves to multiple IP addresses. - */ - if (getpeername(tdt->toc_fd, (struct sockaddr *)&name, &namelen) == 0) - strncpy(tdt->toc_ip, inet_ntoa(name.sin_addr), sizeof(tdt->toc_ip)); - else - strncpy(tdt->toc_ip, purple_account_get_string(gc->account, "server", TOC_HOST), sizeof(tdt->toc_ip)); - - purple_debug(PURPLE_DEBUG_INFO, "toc", - "Client sends \"FLAPON\\r\\n\\r\\n\"\n"); - if (write(tdt->toc_fd, FLAPON, strlen(FLAPON)) < 0) { - purple_connection_error(gc, _("Disconnected.")); - return; - } - tdt->state = STATE_FLAPON; - - /* i know a lot of people like to look at purple to see how TOC works. so i'll comment - * on what this does. it's really simple. when there's data ready to be read from the - * toc_fd file descriptor, toc_callback is called, with gc passed as its data arg. */ - gc->inpa = purple_input_add(tdt->toc_fd, PURPLE_INPUT_READ, toc_callback, gc); - - g_snprintf(buf, sizeof(buf), _("Signon: %s"), purple_account_get_username(gc->account)); - purple_connection_update_progress(gc, buf, 1, TOC_CONNECT_STEPS); -} - -static void toc_close(PurpleConnection *gc) -{ - if (gc->inpa > 0) - purple_input_remove(gc->inpa); - gc->inpa = 0; - close(((struct toc_data *)gc->proto_data)->toc_fd); - g_free(gc->proto_data); -} - -static void toc_build_config(PurpleAccount *account, char *s, int len, gboolean show) -{ - PurpleBlistNode *gnode, *cnode, *bnode; - PurpleGroup *g; - PurpleBuddy *b; - GSList *plist = account->permit; - GSList *dlist = account->deny; - - int pos = 0; - - if (!account->perm_deny) - account->perm_deny = 1; - - pos += g_snprintf(&s[pos], len - pos, "m %d\n", account->perm_deny); - for(gnode = purple_get_blist()->root; gnode && len > pos; gnode = gnode->next) { - g = (PurpleGroup *)gnode; - if(!PURPLE_BLIST_NODE_IS_GROUP(gnode)) - continue; - if(purple_group_on_account(g, account)) { - pos += g_snprintf(&s[pos], len - pos, "g %s\n", g->name); - for(cnode = gnode->child; cnode; cnode = cnode->next) { - if(!PURPLE_BLIST_NODE_IS_CONTACT(cnode)) - continue; - for(bnode = gnode->child; bnode && len > pos; bnode = bnode->next) { - b = (PurpleBuddy *)bnode; - if(!PURPLE_BLIST_NODE_IS_BUDDY(bnode)) - continue; - if(b->account == account) { - pos += g_snprintf(&s[pos], len - pos, "b %s%s%s\n", - b->name, - (show && b->alias) ? ":" : "", - (show && b->alias) ? b->alias : ""); - } - } - } - } - } - - while (len > pos && plist) { - pos += g_snprintf(&s[pos], len - pos, "p %s\n", (char *)plist->data); - plist = plist->next; - } - - while (len > pos && dlist) { - pos += g_snprintf(&s[pos], len - pos, "d %s\n", (char *)dlist->data); - dlist = dlist->next; - } -} - -static char * -escape_message(const char *msg) -{ - char *ret; - int i, j; - - if (!msg) - return NULL; - - /* Calculate the length after escaping */ - for (i=0, j=0; msg[i]; i++) - switch (msg[i]) { - case '$': - case '[': - case ']': - case '(': - case ')': - j++; - default: - j++; - } - - /* Allocate a string */ - ret = (char *)g_malloc((j+1) * sizeof(char)); - - /* Copy the string */ - for (i=0, j=0; msg[i]; i++) - switch (msg[i]) { - case '$': - case '[': - case ']': - case '(': - case ')': - ret[j++] = '\\'; - default: - ret[j++] = msg[i]; - } - ret[j] = '\0'; - - return ret; -} - -/* - * Duplicates the input string, replacing each \n with a
, and - * escaping a few other characters. - */ -static char * -escape_text(const char *msg) -{ - char *ret; - int i, j; - - if (!msg) - return NULL; - - /* Calculate the length after escaping */ - for (i=0, j=0; msg[i]; i++) - switch (msg[i]) { - case '\n': - j += 4; - break; - case '{': - case '}': - case '\\': - case '"': - j += 1; - default: - j += 1; - } - - /* Allocate a string */ - ret = (char *)malloc((j+1) * sizeof(char)); - - /* Copy the string */ - for (i=0, j=0; msg[i]; i++) - switch (msg[i]) { - case '\n': - ret[j++] = '<'; - ret[j++] = 'B'; - ret[j++] = 'R'; - ret[j++] = '>'; - break; - case '{': - case '}': - case '\\': - case '"': - ret[j++] = '\\'; - default: - ret[j++] = msg[i]; - } - ret[j] = '\0'; - - return ret; -} - -static int sflap_send(PurpleConnection *gc, const char *buf, int olen, int type) -{ - struct toc_data *tdt = (struct toc_data *)gc->proto_data; - int len; - int slen = 0; - int ret; - struct sflap_hdr hdr; - char *escaped, *obuf; - - if (tdt->state == STATE_PAUSE) - /* TOC has given us the PAUSE message; sending could cause a disconnect - * so we just return here like everything went through fine */ - return 0; - - if (olen < 0) { - escaped = escape_message(buf); - len = strlen(escaped); - } else { - escaped = g_memdup(buf, olen); - len = olen; - } - - /* - * One _last_ 2048 check here! This shouldn't ever - * get hit though, hopefully. If it gets hit on an IM - * It'll lose the last " and the message won't go through, - * but this'll stop a segfault. - */ - if (len > MSG_LEN) { - purple_debug(PURPLE_DEBUG_WARNING, "toc", "message too long, truncating\n"); - escaped[MSG_LEN - 1] = '\0'; - len = MSG_LEN; - } - - if (olen < 0) - purple_debug(PURPLE_DEBUG_INFO, "toc", "C: %s\n", escaped); - - hdr.ast = '*'; - hdr.type = type; - hdr.seqno = htons(tdt->seqno++ & 0xffff); - hdr.len = htons(len + (type == TYPE_SIGNON ? 0 : 1)); - - obuf = (char *)malloc((sizeof(hdr)+len+1) * sizeof(char)); - memcpy(obuf, &hdr, sizeof(hdr)); - slen += sizeof(hdr); - - memcpy(&obuf[slen], escaped, len); - slen += len; - - if (type != TYPE_SIGNON) { - obuf[slen] = '\0'; - slen += 1; - } - - ret = write(tdt->toc_fd, obuf, slen); - free(obuf); - g_free(escaped); - - return ret; -} - -static int toc_send_raw(PurpleConnection *gc, const char *buf, int len) -{ - return sflap_send(gc, buf, len, 2); -} - -static int wait_reply(PurpleConnection *gc, char *buffer, size_t buflen) -{ - struct toc_data *tdt = (struct toc_data *)gc->proto_data; - struct sflap_hdr *hdr; - int ret; - - if (read(tdt->toc_fd, buffer, sizeof(struct sflap_hdr)) < 0) { - purple_debug(PURPLE_DEBUG_ERROR, "toc", "Couldn't read flap header\n"); - return -1; - } - - hdr = (struct sflap_hdr *)buffer; - - if (buflen < ntohs(hdr->len)) { - /* fake like there's a read error */ - purple_debug(PURPLE_DEBUG_ERROR, "toc", - "buffer too small (have %" G_GSIZE_FORMAT ", need %d)\n", - buflen, ntohs(hdr->len)); - return -1; - } - - if (ntohs(hdr->len) > 0) { - int count = 0; - ret = 0; - do { - count += ret; - ret = read(tdt->toc_fd, - buffer + sizeof(struct sflap_hdr) + count, ntohs(hdr->len) - count); - } while (count + ret < ntohs(hdr->len) && ret > 0); - buffer[sizeof(struct sflap_hdr) + count + ret] = '\0'; - return ret; - } else - return 0; -} - -static unsigned char *roast_password(const char *pass) -{ - /* Trivial "encryption" */ - static unsigned char rp[256]; - static char *roast = ROAST; - int pos = 2; - int x; - strcpy(rp, "0x"); - for (x = 0; (x < 150) && pass[x]; x++) - pos += sprintf(&rp[pos], "%02x", pass[x] ^ roast[x % strlen(roast)]); - rp[pos] = '\0'; - return rp; -} - -static void toc_got_info(void *data, const char *url_text, size_t len) -{ - if (!url_text) - return; - - purple_notify_formatted(data, NULL, _("Buddy Information"), NULL, - url_text, NULL, NULL); -} - -static char *show_error_message() -{ - int no = atoi(strtok(NULL, ":")); - char *w = strtok(NULL, ":"); - static char buf[256]; - - switch(no) { - case 69: - g_snprintf(buf, sizeof(buf), _("Unable to write file %s."), w); - break; - case 169: - g_snprintf(buf, sizeof(buf), _("Unable to read file %s."), w); - break; - case 269: - g_snprintf(buf, sizeof(buf), _("Message too long, last %s bytes truncated."), w); - break; - case 901: - g_snprintf(buf, sizeof(buf), _("%s not currently logged in."), w); - break; - case 902: - g_snprintf(buf, sizeof(buf), _("Warning of %s not allowed."), w); - break; - case 903: - g_snprintf(buf, sizeof(buf), _("A message has been dropped, you are exceeding the server speed limit.")); - break; - case 950: - g_snprintf(buf, sizeof(buf), _("Chat in %s is not available."), w); - break; - case 960: - g_snprintf(buf, sizeof(buf), _("You are sending messages too fast to %s."), w); - break; - case 961: - g_snprintf(buf, sizeof(buf), _("You missed an IM from %s because it was too big."), w); - break; - case 962: - g_snprintf(buf, sizeof(buf), _("You missed an IM from %s because it was sent too fast."), w); - break; - case 970: - g_snprintf(buf, sizeof(buf), _("Failure.")); - break; - case 971: - g_snprintf(buf, sizeof(buf), _("Too many matches.")); - break; - case 972: - g_snprintf(buf, sizeof(buf), _("Need more qualifiers.")); - break; - case 973: - g_snprintf(buf, sizeof(buf), _("Dir service temporarily unavailable.")); - break; - case 974: - g_snprintf(buf, sizeof(buf), _("Email lookup restricted.")); - break; - case 975: - g_snprintf(buf, sizeof(buf), _("Keyword ignored.")); - break; - case 976: - g_snprintf(buf, sizeof(buf), _("No keywords.")); - break; - case 977: - g_snprintf(buf, sizeof(buf), _("User has no directory information.")); - /* g_snprintf(buf, sizeof(buf), _("Language not supported.")); */ - break; - case 978: - g_snprintf(buf, sizeof(buf), _("Country not supported.")); - break; - case 979: - g_snprintf(buf, sizeof(buf), _("Failure unknown: %s."), w); - break; - case 980: - g_snprintf(buf, sizeof(buf), _("Incorrect username or password.")); - break; - case 981: - g_snprintf(buf, sizeof(buf), _("The service is temporarily unavailable.")); - break; - case 982: - g_snprintf(buf, sizeof(buf), _("Your warning level is currently too high to log in.")); - break; - case 983: - g_snprintf(buf, sizeof(buf), _("You have been connecting and disconnecting too frequently. Wait ten minutes and try again. If you continue to try, you will need to wait even longer.")); - break; - g_snprintf(buf, sizeof(buf), _("An unknown signon error has occurred: %s."), w); - break; - default: - g_snprintf(buf, sizeof(buf), _("An unknown error, %d, has occurred. Info: %s"), no, w); - } - - return buf; -} - -static void -parse_toc_buddy_list(PurpleAccount *account, char *config) -{ - char *c; - char current[256]; - GList *buddies = NULL; - - if (config == NULL) - return; - - /* skip "CONFIG:" (if it exists) */ - c = strncmp(config + 6 /* sizeof(struct sflap_hdr) */ , "CONFIG:", strlen("CONFIG:")) ? - strtok(config, "\n") : - strtok(config + 6 /* sizeof(struct sflap_hdr) */ + strlen("CONFIG:"), "\n"); - do { - if (c == NULL) - break; - if (*c == 'g') { - char *utf8 = NULL; - utf8 = purple_utf8_try_convert(c + 2); - if (utf8 == NULL) { - g_strlcpy(current, _("Invalid Groupname"), sizeof(current)); - } else { - g_strlcpy(current, utf8, sizeof(current)); - g_free(utf8); - } - if (!purple_find_group(current)) { - PurpleGroup *g = purple_group_new(current); - purple_blist_add_group(g, NULL); - } - } else if (*c == 'b') { /*&& !purple_find_buddy(user, c + 2)) {*/ - char nm[80], sw[388], *a, *utf8 = NULL; - - if ((a = strchr(c + 2, ':')) != NULL) { - *a++ = '\0'; /* nul the : */ - } - - g_strlcpy(nm, c + 2, sizeof(nm)); - if (a) { - utf8 = purple_utf8_try_convert(a); - if (utf8 == NULL) { - purple_debug(PURPLE_DEBUG_ERROR, "toc blist", - "Failed to convert alias for " - "'%s' to UTF-8\n", nm); - } - } - if (utf8 == NULL) { - sw[0] = '\0'; - } else { - /* This can leave a partial sequence at the end, - * but who cares? */ - g_strlcpy(sw, utf8, sizeof(sw)); - g_free(utf8); - } - - if (!purple_find_buddy(account, nm)) { - PurpleBuddy *b = purple_buddy_new(account, nm, sw); - PurpleGroup *g = purple_find_group(current); - purple_blist_add_buddy(b, NULL, g, NULL); - buddies = g_list_append(buddies, b); - } - } else if (*c == 'p') { - purple_privacy_permit_add(account, c + 2, TRUE); - } else if (*c == 'd') { - purple_privacy_deny_add(account, c + 2, TRUE); - } else if (!strncmp("toc", c, 3)) { - sscanf(c + strlen(c) - 1, "%d", &account->perm_deny); - purple_debug(PURPLE_DEBUG_MISC, "toc blist", - "permdeny: %d\n", account->perm_deny); - if (account->perm_deny == 0) - account->perm_deny = PURPLE_PRIVACY_ALLOW_ALL; - } else if (*c == 'm') { - sscanf(c + 2, "%d", &account->perm_deny); - purple_debug(PURPLE_DEBUG_MISC, "toc blist", - "permdeny: %d\n", account->perm_deny); - if (account->perm_deny == 0) - account->perm_deny = PURPLE_PRIVACY_ALLOW_ALL; - } - } while ((c = strtok(NULL, "\n"))); - - if (account->gc) { - if (buddies != NULL) { - purple_account_add_buddies(account, buddies); - g_list_free(buddies); - } - serv_set_permit_deny(account->gc); - } - g_list_free(buddies); -} - -static void toc_callback(gpointer data, gint source, PurpleInputCondition condition) -{ - PurpleConnection *gc = (PurpleConnection *)data; - PurpleAccount *account = purple_connection_get_account(gc); - struct toc_data *tdt = (struct toc_data *)gc->proto_data; - struct sflap_hdr *hdr; - struct signon so; - char buf[8 * 1024], *c; - char snd[BUF_LEN * 2]; - const char *username = purple_account_get_username(account); - char *password; - PurpleBuddy *buddy; - - /* there's data waiting to be read, so read it. */ - if (wait_reply(gc, buf, 8 * 1024) <= 0) { - purple_connection_error(gc, _("Connection Closed")); - return; - } - - if (tdt->state == STATE_FLAPON) { - hdr = (struct sflap_hdr *)buf; - if (hdr->type != TYPE_SIGNON) - purple_debug(PURPLE_DEBUG_ERROR, "toc", "hdr->type != TYPE_SIGNON\n"); - else - purple_debug(PURPLE_DEBUG_INFO, "toc", - "TOC sends Client FLAP SIGNON\n"); - tdt->seqno = ntohs(hdr->seqno); - tdt->state = STATE_SIGNON_REQUEST; - - purple_debug(PURPLE_DEBUG_INFO, "toc", "Client sends TOC FLAP SIGNON\n"); - g_snprintf(so.username, sizeof(so.username), "%s", username); - so.ver = htonl(1); - so.tag = htons(1); - so.namelen = htons(strlen(so.username)); - if (sflap_send(gc, (char *)&so, ntohs(so.namelen) + 8, TYPE_SIGNON) < 0) { - purple_connection_error(gc, _("Disconnected.")); - return; - } - - purple_debug(PURPLE_DEBUG_INFO, "toc", - "Client sends TOC \"toc_signon\" message\n"); - /* i hate icq. */ - if (username[0] >= '0' && username[0] <= '9') - password = g_strndup(purple_connection_get_password(gc), 8); - else - password = g_strdup(purple_connection_get_password(gc)); - g_snprintf(snd, sizeof snd, "toc_signon %s %d %s %s %s \"%s\"", - AUTH_HOST, AUTH_PORT, purple_normalize(account, username), - roast_password(password), LANGUAGE, REVISION); - g_free(password); - if (sflap_send(gc, snd, -1, TYPE_DATA) < 0) { - purple_connection_error(gc, _("Disconnected.")); - return; - } - - purple_connection_update_progress(gc, _("Waiting for reply..."), 2, TOC_CONNECT_STEPS); - return; - } - - if (tdt->state == STATE_SIGNON_REQUEST) { - purple_debug(PURPLE_DEBUG_INFO, "toc", "TOC sends client SIGN_ON reply\n"); - if (g_ascii_strncasecmp(buf + sizeof(struct sflap_hdr), "SIGN_ON", strlen("SIGN_ON"))) { - purple_debug(PURPLE_DEBUG_ERROR, "toc", - "Didn't get SIGN_ON! buf was: %s\n", - buf + sizeof(struct sflap_hdr)); - if (!g_ascii_strncasecmp(buf + sizeof(struct sflap_hdr), "ERROR", 5)) { - strtok(buf + sizeof(struct sflap_hdr), ":"); - purple_connection_error(gc, show_error_message()); - } else - purple_connection_error(gc, _("Authentication failed")); - return; - } - /* we're supposed to check that it's really TOC v1 here but we know it is ;) */ - purple_debug(PURPLE_DEBUG_INFO, "toc", - "TOC version: %s\n", buf + sizeof(struct sflap_hdr) + 8); - - /* we used to check for the CONFIG here, but we'll wait until we've sent our - * version of the config and then the toc_init_done message. we'll come back to - * the callback in a better state if we get CONFIG anyway */ - - tdt->state = STATE_ONLINE; - - purple_connection_set_state(gc, PURPLE_CONNECTED); - - /* - * Add me to my buddy list so that we know the time when - * the server thinks I signed on. - */ - buddy = purple_buddy_new(account, username, NULL); - /* XXX - Pick a group to add to */ - /* purple_blist_add(buddy, NULL, g, NULL); */ - purple_account_add_buddy(gc, buddy); - - /* Client sends TOC toc_init_done message */ - purple_debug(PURPLE_DEBUG_INFO, "toc", - "Client sends TOC toc_init_done message\n"); - g_snprintf(snd, sizeof snd, "toc_init_done"); - sflap_send(gc, snd, -1, TYPE_DATA); - - /* - g_snprintf(snd, sizeof snd, "toc_set_caps %s %s %s", - FILE_SEND_UID, FILE_GET_UID, B_ICON_UID); - */ - g_snprintf(snd, sizeof snd, "toc_set_caps %s %s", FILE_SEND_UID, FILE_GET_UID); - sflap_send(gc, snd, -1, TYPE_DATA); - - return; - } - - purple_debug(PURPLE_DEBUG_INFO, "toc", "S: %s\n", - buf + sizeof(struct sflap_hdr)); - - c = strtok(buf + sizeof(struct sflap_hdr), ":"); /* Ditch the first part */ - - if (!g_ascii_strcasecmp(c, "SIGN_ON")) { - /* we should only get here after a PAUSE */ - if (tdt->state != STATE_PAUSE) - purple_debug(PURPLE_DEBUG_ERROR, "toc", - "got SIGN_ON but not PAUSE!\n"); - else { - tdt->state = STATE_ONLINE; - g_snprintf(snd, sizeof snd, "toc_signon %s %d %s %s %s \"%s\"", - AUTH_HOST, AUTH_PORT, - purple_normalize(account, purple_account_get_username(account)), - roast_password(purple_connection_get_password(gc)), - LANGUAGE, REVISION); - if (sflap_send(gc, snd, -1, TYPE_DATA) < 0) { - purple_connection_error(gc, _("Disconnected.")); - return; - } - g_snprintf(snd, sizeof snd, "toc_init_done"); - sflap_send(gc, snd, -1, TYPE_DATA); - purple_notify_info(gc, NULL, - _("TOC has come back from its pause. You may " - "now send messages again."), NULL); - } - } else if (!g_ascii_strcasecmp(c, "CONFIG")) { - c = strtok(NULL, ":"); - parse_toc_buddy_list(account, c); - } else if (!g_ascii_strcasecmp(c, "NICK")) { - /* ignore NICK so that things get imported/exported properly - c = strtok(NULL, ":"); - g_snprintf(gc->username, sizeof(gc->username), "%s", c); - */ - } else if (!g_ascii_strcasecmp(c, "IM_IN")) { - char *away, *message; - int a = 0; - - c = strtok(NULL, ":"); - away = strtok(NULL, ":"); - - message = away; - while (*message && (*message != ':')) - message++; - message++; - - a = (away && (*away == 'T')) ? PURPLE_MESSAGE_AUTO_RESP : 0; - - serv_got_im(gc, c, message, a, time(NULL)); - } else if (!g_ascii_strcasecmp(c, "UPDATE_BUDDY")) { - char *l, *uc, *tmp; - gboolean logged_in; - int evil, idle, type = 0; - time_t signon, time_idle; - - c = strtok(NULL, ":"); /* name */ - l = strtok(NULL, ":"); /* online */ - sscanf(strtok(NULL, ":"), "%d", &evil); - sscanf(strtok(NULL, ":"), "%ld", &signon); - sscanf(strtok(NULL, ":"), "%d", &idle); - uc = strtok(NULL, ":"); - - logged_in = (l && (*l == 'T')) ? TRUE : FALSE; - - if (uc[0] == 'A') - type |= UC_AOL; - switch (uc[1]) { - case 'A': - type |= UC_ADMIN; - break; - case 'U': - type |= UC_UNCONFIRMED; - break; - case 'O': - type |= UC_NORMAL; - break; - case 'C': - type |= UC_WIRELESS; - break; - default: - break; - } - if (uc[2] == 'U') - type |= UC_UNAVAILABLE; - - if (idle) { - time(&time_idle); - time_idle -= idle * 60; - } else - time_idle = 0; - - /* - * If we have info for ourselves then set our display name, warning - * level and official time of login. - */ - tmp = g_strdup(purple_normalize(account, purple_account_get_username(gc->account))); - if (!strcmp(tmp, purple_normalize(account, c))) { - purple_connection_set_display_name(gc, c); - /* XXX - What should the second parameter be here? */ - /* purple_prpl_got_account_warning_level(account, NULL, evil);*/ - purple_prpl_got_account_login_time(account, signon); - } - g_free(tmp); - - purple_prpl_got_user_status(account, c, (logged_in ? "online" : "offline"), NULL); - purple_prpl_got_user_login_time(account, c, signon); - if (time_idle > 0) - purple_prpl_got_user_idle(account, c, TRUE, time_idle); - else - purple_prpl_got_user_idle(account, c, FALSE, 0); - } else if (!g_ascii_strcasecmp(c, "ERROR")) { - purple_notify_error(gc, NULL, show_error_message(), NULL); - } else if (!g_ascii_strcasecmp(c, "EVILED")) { - int lev; - char *name; - - sscanf(strtok(NULL, ":"), "%d", &lev); - name = strtok(NULL, ":"); - - /* purple_prpl_got_account_warning_level(account, name, lev); */ - } else if (!g_ascii_strcasecmp(c, "CHAT_JOIN")) { - char *name; - int id; - - sscanf(strtok(NULL, ":"), "%d", &id); - name = strtok(NULL, ":"); - - serv_got_joined_chat(gc, id, name); - } else if (!g_ascii_strcasecmp(c, "CHAT_IN")) { - int id; - PurpleMessageFlags flags; - char *m, *who, *whisper; - - sscanf(strtok(NULL, ":"), "%d", &id); - who = strtok(NULL, ":"); - whisper = strtok(NULL, ":"); - m = whisper; - while (*m && (*m != ':')) - m++; - m++; - - flags = (whisper && (*whisper == 'T')) ? PURPLE_MESSAGE_WHISPER : 0; - - serv_got_chat_in(gc, id, who, flags, m, time((time_t)NULL)); - } else if (!g_ascii_strcasecmp(c, "CHAT_UPDATE_BUDDY")) { - int id; - char *in, *buddy; - GSList *bcs = gc->buddy_chats; - PurpleConversation *b = NULL; - PurpleConvChat *chat; - - sscanf(strtok(NULL, ":"), "%d", &id); - in = strtok(NULL, ":"); - - chat = PURPLE_CONV_CHAT(b); - - while (bcs) { - b = (PurpleConversation *)bcs->data; - if (id == purple_conv_chat_get_id(chat)) - break; - bcs = bcs->next; - b = NULL; - } - - if (!b) - return; - - if (in && (*in == 'T')) - while ((buddy = strtok(NULL, ":")) != NULL) - purple_conv_chat_add_user(chat, buddy, NULL, PURPLE_CBFLAGS_NONE, TRUE); - else - while ((buddy = strtok(NULL, ":")) != NULL) - purple_conv_chat_remove_user(chat, buddy, NULL); - } else if (!g_ascii_strcasecmp(c, "CHAT_INVITE")) { - char *name, *who, *message; - int id; - GHashTable *components = g_hash_table_new_full(g_str_hash, g_str_equal, - g_free, g_free); - - name = strtok(NULL, ":"); - sscanf(strtok(NULL, ":"), "%d", &id); - who = strtok(NULL, ":"); - message = strtok(NULL, ":"); - - g_hash_table_replace(components, g_strdup("id"), g_strdup_printf("%d", id)); - - serv_got_chat_invite(gc, name, who, message, components); - } else if (!g_ascii_strcasecmp(c, "CHAT_LEFT")) { - GSList *bcs = gc->buddy_chats; - PurpleConversation *b = NULL; - int id; - - sscanf(strtok(NULL, ":"), "%d", &id); - - while (bcs) { - b = (PurpleConversation *)bcs->data; - if (id == purple_conv_chat_get_id(PURPLE_CONV_CHAT(b))) - break; - b = NULL; - bcs = bcs->next; - } - - if (!b) - return; - - if (b->window) { - char error_buf[BUF_LONG]; - purple_conversation_set_account(b, NULL); - g_snprintf(error_buf, sizeof error_buf, _("You have been disconnected" - " from chat room %s."), b->name); - purple_notify_error(gc, NULL, error_buf, NULL); - } else - serv_got_chat_left(gc, id); - } else if (!g_ascii_strcasecmp(c, "GOTO_URL")) { - char *name, *url, tmp[256]; - - name = strtok(NULL, ":"); - url = strtok(NULL, ":"); - - g_snprintf(tmp, sizeof(tmp), "http://%s:%d/%s", tdt->toc_ip, - purple_account_get_int(gc->account, "port", TOC_PORT), - url); - purple_url_fetch(tmp, FALSE, NULL, FALSE, toc_got_info, gc); - } else if (!g_ascii_strcasecmp(c, "DIR_STATUS")) { - } else if (!g_ascii_strcasecmp(c, "ADMIN_NICK_STATUS")) { - } else if (!g_ascii_strcasecmp(c, "ADMIN_PASSWD_STATUS")) { - purple_notify_info(gc, NULL, _("Password Change Successful"), NULL); - } else if (!g_ascii_strcasecmp(c, "PAUSE")) { - tdt->state = STATE_PAUSE; - } else if (!g_ascii_strcasecmp(c, "RVOUS_PROPOSE")) { -#if 0 - char *user, *uuid, *cookie; - int seq; - char *rip, *pip, *vip, *trillian = NULL; - int port; - - user = strtok(NULL, ":"); - uuid = strtok(NULL, ":"); - cookie = strtok(NULL, ":"); - sscanf(strtok(NULL, ":"), "%d", &seq); - rip = strtok(NULL, ":"); - pip = strtok(NULL, ":"); - vip = strtok(NULL, ":"); - sscanf(strtok(NULL, ":"), "%d", &port); - - if (!strcmp(uuid, FILE_SEND_UID)) { - /* they want us to get a file */ - int unk[4], i; - char *messages[4], *tmp, *name; - int subtype, files, totalsize = 0; - struct ft_request *ft; - - for (i = 0; i < 4; i++) { - trillian = strtok(NULL, ":"); - sscanf(trillian, "%d", &unk[i]); - if (unk[i] == 10001) - break; - /* Trillian likes to send an empty token as a message, rather than - no message at all. */ - if (*(trillian + strlen(trillian) +1) != ':') - frombase64(strtok(NULL, ":"), &messages[i], NULL); - } - - frombase64(strtok(NULL, ":"), &tmp, NULL); - - subtype = tmp[1]; - files = tmp[3]; - - totalsize |= (tmp[4] << 24) & 0xff000000; - totalsize |= (tmp[5] << 16) & 0x00ff0000; - totalsize |= (tmp[6] << 8) & 0x0000ff00; - totalsize |= (tmp[7] << 0) & 0x000000ff; - - if (!totalsize) { - g_free(tmp); - for (i--; i >= 0; i--) - g_free(messages[i]); - return; - } - - name = tmp + 8; - - ft = g_new0(struct ft_request, 1); - ft->cookie = g_strdup(cookie); - ft->ip = g_strdup(pip); - ft->port = port; - if (i) - ft->message = g_strdup(messages[0]); - else - ft->message = NULL; - ft->filename = g_strdup(name); - ft->user = g_strdup(user); - ft->size = totalsize; - ft->files = files; - g_snprintf(ft->UID, sizeof(ft->UID), "%s", FILE_SEND_UID); - ft->gc = gc; - - g_free(tmp); - for (i--; i >= 0; i--) - g_free(messages[i]); - - purple_debug(PURPLE_DEBUG_MISC, "toc", - "English translation of RVOUS_PROPOSE: %s requests " - "Send File (i.e. send a file to you); %s:%d " - "(verified_ip:port), %d files at total size of " - "%d bytes.\n", user, vip, port, files, totalsize); - accept_file_dialog(ft); - } else if (!strcmp(uuid, FILE_GET_UID)) { - /* they want us to send a file */ - int unk[4], i; - char *messages[4], *tmp; - struct ft_request *ft; - - for (i = 0; i < 4; i++) { - sscanf(strtok(NULL, ":"), "%d", unk + i); - if (unk[i] == 10001) - break; - /* Trillian likes to send an empty token as a message, rather than - no message at all. */ - if (*(trillian + strlen(trillian) +1) != ':') - frombase64(strtok(NULL, ":"), &messages[i], NULL); - } - frombase64(strtok(NULL, ":"), &tmp, NULL); - - ft = g_new0(struct ft_request, 1); - ft->cookie = g_strdup(cookie); - ft->ip = g_strdup(pip); - ft->port = port; - if (i) - ft->message = g_strdup(messages[0]); - else - ft->message = NULL; - ft->user = g_strdup(user); - g_snprintf(ft->UID, sizeof(ft->UID), "%s", FILE_GET_UID); - ft->gc = gc; - - g_free(tmp); - for (i--; i >= 0; i--) - g_free(messages[i]); - - accept_file_dialog(ft); - } else if (!strcmp(uuid, VOICE_UID)) { - /* oh goody. voice over ip. fun stuff. */ - } else if (!strcmp(uuid, B_ICON_UID)) { - int unk[4], i; - char *messages[4]; - struct buddy_icon *icon; - - for (i = 0; i < 4; i++) { - sscanf(strtok(NULL, ":"), "%d", unk + i); - if (unk[i] == 10001) - break; - frombase64(strtok(NULL, ":"), &messages[i], NULL); - } - frombase64(strtok(NULL, ":"), (char **)&icon, NULL); - - purple_debug(PURPLE_DEBUG_MISC, "toc", - "received icon of length %d\n", icon->len); - g_free(icon); - for (i--; i >= 0; i--) - g_free(messages[i]); - } else if (!strcmp(uuid, IMAGE_UID)) { - /* aka Direct IM */ - } else { - purple_debug(PURPLE_DEBUG_ERROR, "toc", - "Don't know what to do with RVOUS UUID %s\n", uuid); - /* do we have to do anything here? i think it just times out */ - } -#endif - } else { - purple_debug(PURPLE_DEBUG_ERROR, "toc", - "don't know what to do with %s\n", c); - } -} - -static int toc_send_im(PurpleConnection *gc, const char *name, const char *message, PurpleMessageFlags flags) -{ - char *buf1, *buf2; - -#if 1 - /* This is the old, non-i18n way */ - buf1 = escape_text(message); - if (strlen(buf1) + 52 > MSG_LEN) { - g_free(buf1); - return -E2BIG; - } - buf2 = g_strdup_printf("toc_send_im %s \"%s\"%s", purple_normalize(gc->account, name), buf1, - ((flags & PURPLE_MESSAGE_AUTO_RESP) ? " auto" : "")); - g_free(buf1); -#else - /* This doesn't work yet. See the comments below for details */ - buf1 = purple_strreplace(message, "\"", "\\\""); - - /* - * We still need to determine what encoding should be used and send the - * message in that encoding. This should be done the same as in - * oscar_encoding_check() in oscar.c. There is no encoding flag sent - * along with the message--the TOC to OSCAR proxy server must just - * use a lil' algorithm to determine what the actual encoding is. - * - * After that, you need to convert buf1 to that encoding, and keep track - * of the length of the resulting string. Then you need to make sure - * that length is passed to sflap_send(). - */ - - if (strlen(buf1) + 52 > MSG_LEN) { - g_free(buf1); - return -E2BIG; - } - - buf2 = g_strdup_printf("toc2_send_im_enc %s F U en \"%s\" %s", purple_normalize(gc->account, name), buf1, - ((flags & PURPLE_MESSAGE_AUTO_RESP) ? "auto" : "")); - g_free(buf1); -#endif - - sflap_send(gc, buf2, -1, TYPE_DATA); - g_free(buf2); - - return 1; -} - -static void toc_set_config(PurpleConnection *gc) -{ - char *buf = g_malloc(MSG_LEN), snd[BUF_LEN * 2]; - toc_build_config(gc->account, buf, MSG_LEN - strlen("toc_set_config \\{\\}"), FALSE); - g_snprintf(snd, MSG_LEN, "toc_set_config {%s}", buf); - sflap_send(gc, snd, -1, TYPE_DATA); - g_free(buf); -} - -static void toc_get_info(PurpleConnection *gc, const char *name) -{ - char buf[BUF_LEN * 2]; - g_snprintf(buf, MSG_LEN, "toc_get_info %s", purple_normalize(gc->account, name)); - sflap_send(gc, buf, -1, TYPE_DATA); -} - -/* Should be implemented as an Account Action? */ -static void toc_get_dir(PurpleBlistNode *node, gpointer data) -{ - PurpleBuddy *buddy; - PurpleConnection *gc; - char buf[BUF_LEN * 2]; - - g_return_if_fail(PURPLE_BLIST_NODE_IS_BUDDY(node)); - - buddy = (PurpleBuddy *) node; - gc = purple_account_get_connection(buddy->account); - - g_snprintf(buf, MSG_LEN, "toc_get_dir %s", - purple_normalize(buddy->account, buddy->name)); - sflap_send(gc, buf, -1, TYPE_DATA); -} - -#if 0 -/* Should be implemented as an Account Action */ -static void toc_set_dir(PurpleConnection *g, const char *first, const char *middle, const char *last, - const char *maiden, const char *city, const char *state, const char *country, int web) -{ - char *buf3, buf2[BUF_LEN * 4], buf[BUF_LEN]; - g_snprintf(buf2, sizeof(buf2), "%s:%s:%s:%s:%s:%s:%s:%s", first, - middle, last, maiden, city, state, country, (web == 1) ? "Y" : ""); - buf3 = escape_text(buf2); - g_snprintf(buf, sizeof(buf), "toc_set_dir %s", buf3); - g_free(buf3); - sflap_send(g, buf, -1, TYPE_DATA); -} -#endif - -#if 0 -/* Should be implemented as an Account Action */ -static void toc_dir_search(PurpleConnection *g, const char *first, const char *middle, const char *last, - const char *maiden, const char *city, const char *state, const char *country, const char *email) -{ - char buf[BUF_LONG]; - g_snprintf(buf, sizeof(buf) / 2, "toc_dir_search %s:%s:%s:%s:%s:%s:%s:%s", first, middle, - last, maiden, city, state, country, email); - purple_debug(PURPLE_DEBUG_INFO, "toc", - "Searching for: %s,%s,%s,%s,%s,%s,%s\n", - first, middle, last, maiden, - city, state, country); - sflap_send(g, buf, -1, TYPE_DATA); -} -#endif - -static void toc_set_status(PurpleAccount *account, PurpleStatus *status) -{ -#if 0 /* do we care about TOC any more? */ - char buf[BUF_LEN * 2]; - if (gc->away) { - g_free(gc->away); - gc->away = NULL; - } - if (message) { - char *tmp; - gc->away = g_strdup(message); - tmp = escape_text(message); - g_snprintf(buf, MSG_LEN, "toc_set_away \"%s\"", tmp); - g_free(tmp); - } else - g_snprintf(buf, MSG_LEN, "toc_set_away \"\""); - sflap_send(g, buf, -1, TYPE_DATA); -#endif -} - -static void toc_set_info(PurpleConnection *g, const char *info) -{ - char buf[BUF_LEN * 2], *buf2; - buf2 = escape_text(info); - g_snprintf(buf, sizeof(buf), "toc_set_info \"%s\n\"", buf2); - g_free(buf2); - sflap_send(g, buf, -1, TYPE_DATA); -} - -static void toc_change_passwd(PurpleConnection *g, const char *orig, const char *new) -{ - char buf[BUF_LEN * 2]; - g_snprintf(buf, BUF_LONG, "toc_change_passwd %s %s", orig, new); - sflap_send(g, buf, -1, TYPE_DATA); -} - -static void -toc_add_buddy(PurpleConnection *gc, PurpleBuddy *buddy, PurpleGroup *group) -{ - char buf[BUF_LEN * 2]; - g_snprintf(buf, sizeof(buf), "toc_add_buddy %s", purple_normalize(gc->account, buddy->name)); - sflap_send(gc, buf, -1, TYPE_DATA); - toc_set_config(gc); -} - -static void toc_add_buddies(PurpleConnection *gc, GList *buddies, GList *groups) -{ - char buf[BUF_LEN * 2]; - int n; - GList *cur; - - n = g_snprintf(buf, sizeof(buf), "toc_add_buddy"); - for (cur = buddies; cur != NULL; cur = cur->next) { - PurpleBuddy *buddy = cur->data; - - if (strlen(purple_normalize(gc->account, buddy->name)) + n + 32 > MSG_LEN) { - sflap_send(gc, buf, -1, TYPE_DATA); - n = g_snprintf(buf, sizeof(buf), "toc_add_buddy"); - } - n += g_snprintf(buf + n, sizeof(buf) - n, " %s", purple_normalize(gc->account, buddy->name)); - } - sflap_send(gc, buf, -1, TYPE_DATA); -} - -static void toc_remove_buddy(PurpleConnection *gc, PurpleBuddy *buddy, PurpleGroup *group) -{ - char buf[BUF_LEN * 2]; - g_snprintf(buf, sizeof(buf), "toc_remove_buddy %s", purple_normalize(gc->account, buddy->name)); - sflap_send(gc, buf, -1, TYPE_DATA); - toc_set_config(gc); -} - -static void toc_remove_buddies(PurpleConnection *gc, GList *buddies, GList *groups) -{ - char buf[BUF_LEN * 2]; - int n; - GList *cur; - - n = g_snprintf(buf, sizeof(buf), "toc_remove_buddy"); - for (cur = buddies; cur != NULL; cur = cur->next) { - PurpleBuddy *buddy = cur->data; - - if (strlen(purple_normalize(gc->account, buddy->name)) + n + 32 > MSG_LEN) { - sflap_send(gc, buf, -1, TYPE_DATA); - n = g_snprintf(buf, sizeof(buf), "toc_remove_buddy"); - } - n += g_snprintf(buf + n, sizeof(buf) - n, " %s", purple_normalize(gc->account, buddy->name)); - } - sflap_send(gc, buf, -1, TYPE_DATA); - toc_set_config(gc); -} - -static void toc_set_idle(PurpleConnection *g, int time) -{ - char buf[BUF_LEN * 2]; - g_snprintf(buf, sizeof(buf), "toc_set_idle %d", time); - sflap_send(g, buf, -1, TYPE_DATA); -} - -static void toc_warn(PurpleConnection *g, const char *name, int anon) -{ - char send[BUF_LEN * 2]; - g_snprintf(send, 255, "toc_evil %s %s", name, ((anon) ? "anon" : "norm")); - sflap_send(g, send, -1, TYPE_DATA); -} - -static GList *toc_chat_info(PurpleConnection *gc) -{ - GList *m = NULL; - struct proto_chat_entry *pce; - - pce = g_new0(struct proto_chat_entry, 1); - pce->label = _("_Group:"); - pce->identifier = "room"; - m = g_list_append(m, pce); - - pce = g_new0(struct proto_chat_entry, 1); - pce->label = _("_Exchange:"); - pce->identifier = "exchange"; - pce->is_int = TRUE; - pce->min = 4; - pce->max = 20; - m = g_list_append(m, pce); - - return m; -} - -GHashTable *toc_chat_info_defaults(PurpleConnection *gc, const char *chat_name) -{ - GHashTable *defaults; - - defaults = g_hash_table_new_full(g_str_hash, g_str_equal, NULL, g_free); - - if (chat_name != NULL) - g_hash_table_insert(defaults, "room", g_strdup(chat_name)); - - return defaults; -} - -static void toc_join_chat(PurpleConnection *g, GHashTable *data) -{ - char buf[BUF_LONG]; - char *name, *exchange; - char *id; - - name = g_hash_table_lookup(data, "room"); - exchange = g_hash_table_lookup(data, "exchange"); - id = g_hash_table_lookup(data, "id"); - - if (id) { - g_snprintf(buf, 255, "toc_chat_accept %d", atoi(id)); - } else { - g_snprintf(buf, sizeof(buf) / 2, "toc_chat_join %d \"%s\"", atoi(exchange), name); - } - - sflap_send(g, buf, -1, TYPE_DATA); -} - -static void toc_chat_invite(PurpleConnection *gc, int id, const char *message, const char *name) -{ - char buf[BUF_LONG]; - g_snprintf(buf, sizeof(buf) / 2, "toc_chat_invite %d \"%s\" %s", id, - message ? message : "", purple_normalize(gc->account, name)); - sflap_send(gc, buf, -1, TYPE_DATA); -} - -static void toc_chat_leave(PurpleConnection *g, int id) -{ - GSList *bcs = g->buddy_chats; - PurpleConversation *b = NULL; - char buf[BUF_LEN * 2]; - - while (bcs) { - b = (PurpleConversation *)bcs->data; - if (id == purple_conv_chat_get_id(PURPLE_CONV_CHAT(b))) - break; - b = NULL; - bcs = bcs->next; - } - - if (!b) - return; /* can this happen? */ - - if (purple_conversation_get_account(b) == NULL) { - /* TOC already kicked us out of this room */ - serv_got_chat_left(g, id); - } - else { - g_snprintf(buf, 255, "toc_chat_leave %d", id); - sflap_send(g, buf, -1, TYPE_DATA); - } -} - -static void toc_chat_whisper(PurpleConnection *gc, int id, const char *who, const char *message) -{ - char *buf1, *buf2; - buf1 = escape_text(message); - buf2 = g_strdup_printf("toc_chat_whisper %d %s \"%s\"", id, purple_normalize(gc->account, who), buf1); - g_free(buf1); - sflap_send(gc, buf2, -1, TYPE_DATA); - g_free(buf2); -} - -static int toc_chat_send(PurpleConnection *g, int id, const char *message, PurpleMessageFlags flags) -{ - char *buf1, *buf2; - buf1 = escape_text(message); - if (strlen(buf1) > 2000) { - g_free(buf1); - return -E2BIG; - } - buf2 = g_strdup_printf("toc_chat_send %d \"%s\"", id, buf1); - g_free(buf1); - sflap_send(g, buf2, -1, TYPE_DATA); - g_free(buf2); - return 0; -} - -static void toc_keepalive(PurpleConnection *gc) -{ - sflap_send(gc, "", 0, TYPE_KEEPALIVE); -} - -static const char * -toc_normalize(const PurpleAccount *account, const char *str) -{ - static char buf[BUF_LEN]; - char *tmp1, *tmp2; - int i, j; - - g_return_val_if_fail(str != NULL, NULL); - - strncpy(buf, str, BUF_LEN); - for (i=0, j=0; buf[j]; i++, j++) - { - while (buf[j] == ' ') - j++; - buf[i] = buf[j]; - } - buf[i] = '\0'; - - tmp1 = g_utf8_strdown(buf, -1); - tmp2 = g_utf8_normalize(tmp1, -1, G_NORMALIZE_DEFAULT); - g_snprintf(buf, sizeof(buf), "%s", tmp2); - g_free(tmp2); - g_free(tmp1); - - return buf; -} - -static const char *toc_list_icon(PurpleAccount *a, PurpleBuddy *b) -{ - if (!b || (b && b->name && b->name[0] == '+')) { - if (a != NULL && isdigit(*purple_account_get_username(a))) - return "icq"; - else - return "aim"; - } - - if (b && b->name && isdigit(b->name[0])) - return "icq"; - return "aim"; -} - -static const char* toc_list_emblem(PurpleBuddy *b) -{ - if (b->uc & UC_AOL) - return "aol"; - if (b->uc & UC_ADMIN) - return "admin"; - if (b->uc & UC_WIRELESS) - return "mobile"; - return NULL -} - -static GList *toc_blist_node_menu(PurpleBlistNode *node) -{ - GList *m = NULL; - PurpleMenuAction *act; - - if(PURPLE_BLIST_NODE_IS_BUDDY(node)) { - act = purple_menu_action_new(_("Get Dir Info"), - toc_get_dir, NULL, NULL); - m = g_list_append(m, act); - } - - return m; -} - -static void toc_add_permit(PurpleConnection *gc, const char *who) -{ - char buf2[BUF_LEN * 2]; - if (gc->account->perm_deny != 3) - return; - g_snprintf(buf2, sizeof(buf2), "toc_add_permit %s", purple_normalize(gc->account, who)); - sflap_send(gc, buf2, -1, TYPE_DATA); - toc_set_config(gc); -} - -static void toc_add_deny(PurpleConnection *gc, const char *who) -{ - char buf2[BUF_LEN * 2]; - if (gc->account->perm_deny != 4) - return; - g_snprintf(buf2, sizeof(buf2), "toc_add_deny %s", purple_normalize(gc->account, who)); - sflap_send(gc, buf2, -1, TYPE_DATA); - toc_set_config(gc); -} - -static void toc_set_permit_deny(PurpleConnection *gc) -{ - char buf2[BUF_LEN * 2]; - GSList *list; - int at; - - switch (gc->account->perm_deny) { - case 1: - /* permit all, deny none. to get here reliably we need to have been in permit - * mode, and send an empty toc_add_deny message, which will switch us to deny none */ - g_snprintf(buf2, sizeof(buf2), "toc_add_permit "); - sflap_send(gc, buf2, -1, TYPE_DATA); - g_snprintf(buf2, sizeof(buf2), "toc_add_deny "); - sflap_send(gc, buf2, -1, TYPE_DATA); - break; - case 2: - /* deny all, permit none. to get here reliably we need to have been in deny - * mode, and send an empty toc_add_permit message, which will switch us to permit none */ - g_snprintf(buf2, sizeof(buf2), "toc_add_deny "); - sflap_send(gc, buf2, -1, TYPE_DATA); - g_snprintf(buf2, sizeof(buf2), "toc_add_permit "); - sflap_send(gc, buf2, -1, TYPE_DATA); - break; - case 3: - /* permit some. we want to switch to deny mode first, then send the toc_add_permit - * message, which will clear and set our permit list. toc sucks. */ - g_snprintf(buf2, sizeof(buf2), "toc_add_deny "); - sflap_send(gc, buf2, -1, TYPE_DATA); - - at = g_snprintf(buf2, sizeof(buf2), "toc_add_permit "); - list = gc->account->permit; - while (list) { - at += g_snprintf(buf2 + at, sizeof(buf2) - at, "%s ", purple_normalize(gc->account, list->data)); - if (at > MSG_LEN + 32) { /* from out my ass comes greatness */ - sflap_send(gc, buf2, -1, TYPE_DATA); - at = g_snprintf(buf2, sizeof(buf2), "toc_add_permit "); - } - list = list->next; - } - sflap_send(gc, buf2, -1, TYPE_DATA); - break; - case 4: - /* deny some. we want to switch to permit mode first, then send the toc_add_deny - * message, which will clear and set our deny list. toc sucks. */ - g_snprintf(buf2, sizeof(buf2), "toc_add_permit "); - sflap_send(gc, buf2, -1, TYPE_DATA); - - at = g_snprintf(buf2, sizeof(buf2), "toc_add_deny "); - list = gc->account->deny; - while (list) { - at += g_snprintf(buf2 + at, sizeof(buf2) - at, "%s ", purple_normalize(gc->account, list->data)); - if (at > MSG_LEN + 32) { /* from out my ass comes greatness */ - sflap_send(gc, buf2, -1, TYPE_DATA); - at = g_snprintf(buf2, sizeof(buf2), "toc_add_deny "); - } - list = list->next; - } - sflap_send(gc, buf2, -1, TYPE_DATA); - break; - default: - break; - } - toc_set_config(gc); -} - -static void toc_rem_permit(PurpleConnection *gc, const char *who) -{ - if (gc->account->perm_deny != 3) - return; - toc_set_permit_deny(gc); -} - -static void toc_rem_deny(PurpleConnection *gc, const char *who) -{ - if (gc->account->perm_deny != 4) - return; - toc_set_permit_deny(gc); -} - -static GList *toc_away_states(PurpleAccount *account) -{ -#if 0 /* do we care about TOC any more? */ - return g_list_append(NULL, PURPLE_AWAY_CUSTOM); -#else - return NULL; -#endif -} - -static void -show_set_info(PurplePluginAction *action) -{ - PurpleConnection *gc = (PurpleConnection *) action->context; - purple_account_request_change_user_info(purple_connection_get_account(gc)); -} - -static void -change_pass(PurplePluginAction *action) -{ - PurpleConnection *gc = (PurpleConnection *) action->context; - purple_account_request_change_password(purple_connection_get_account(gc)); -} - -static GList *toc_actions(PurplePlugin *plugin, gpointer context) -{ - GList *m = NULL; - PurplePluginAction *act; - - act = purple_plugin_action_new(_("Set User Info"), - show_set_info); - m = g_list_append(m, act); - -#if 0 - act = purple_plugin_action_new(_("Set Dir Info"), - show_set_dir); - m = g_list_append(m, act); -#endif - - act = purple_plugin_action_new(_("Change Password"), - change_pass); - m = g_list_append(m, act); - - return m; -} - -#if 0 -/********* - * RVOUS ACTIONS - ********/ - -struct file_header { - char magic[4]; /* 0 */ - short hdrlen; /* 4 */ - short hdrtype; /* 6 */ - char bcookie[8]; /* 8 */ - short encrypt; /* 16 */ - short compress; /* 18 */ - short totfiles; /* 20 */ - short filesleft; /* 22 */ - short totparts; /* 24 */ - short partsleft; /* 26 */ - long totsize; /* 28 */ - long size; /* 32 */ - long modtime; /* 36 */ - long checksum; /* 40 */ - long rfrcsum; /* 44 */ - long rfsize; /* 48 */ - long cretime; /* 52 */ - long rfcsum; /* 56 */ - long nrecvd; /* 60 */ - long recvcsum; /* 64 */ - char idstring[32]; /* 68 */ - char flags; /* 100 */ - char lnameoffset; /* 101 */ - char lsizeoffset; /* 102 */ - char dummy[69]; /* 103 */ - char macfileinfo[16]; /* 172 */ - short nencode; /* 188 */ - short nlanguage; /* 190 */ - char name[64]; /* 192 */ - /* 256 */ -}; - -struct file_transfer { - struct file_header hdr; - - PurpleConnection *gc; - - char *user; - char *cookie; - char *ip; - int port; - long size; - struct stat st; - - GtkWidget *window; - int files; - char *filename; - FILE *file; - int recvsize; - - gint inpa; -}; - -static void debug_header(struct file_transfer *ft) { - struct file_header *f = (struct file_header *)ft; - purple_debug(PURPLE_DEBUG_MISC, "toc", "FT HEADER:\n" - "\t%s %d 0x%04x\n" - "\t%s %d %d\n" - "\t%d %d %d %d %d %d\n" - "\t%d %d %d %d %d %d %d %d\n" - "\t%s\n" - "\t0x%02x, 0x%02x, 0x%02x\n" - "\t%s %s\n" - "\t%d %d\n" - "\t%s\n", - f->magic, ntohs(f->hdrlen), f->hdrtype, - f->bcookie, ntohs(f->encrypt), ntohs(f->compress), - ntohs(f->totfiles), ntohs(f->filesleft), ntohs(f->totparts), - ntohs(f->partsleft), ntohl(f->totsize), ntohl(f->size), - ntohl(f->modtime), ntohl(f->checksum), ntohl(f->rfrcsum), ntohl(f->rfsize), - ntohl(f->cretime), ntohl(f->rfcsum), ntohl(f->nrecvd), - ntohl(f->recvcsum), - f->idstring, - f->flags, f->lnameoffset, f->lsizeoffset, - f->dummy, f->macfileinfo, - ntohs(f->nencode), ntohs(f->nlanguage), - f->name); -} - -static void toc_send_file_callback(gpointer data, gint source, PurpleInputCondition cond) -{ - char buf[BUF_LONG]; - int rt, i; - - struct file_transfer *ft = data; - - if (ft->hdr.hdrtype != 0x202) { - char *buf; - frombase64(ft->cookie, &buf, NULL); - - read(source, ft, 8); - read(source, &ft->hdr.bcookie, MIN(256 - 8, ntohs(ft->hdr.hdrlen) - 8)); - debug_header(ft); - - ft->hdr.hdrtype = 0x202; - memcpy(ft->hdr.bcookie, buf, 8); - g_free(buf); - ft->hdr.encrypt = 0; ft->hdr.compress = 0; - debug_header(ft); - write(source, ft, 256); - - if (ft->files == 1) { - ft->file = g_fopen(ft->filename, "w"); - if (!ft->file) { - buf = g_strdup_printf(_("Could not open %s for writing!"), ft->filename); - purple_notify_error(ft->gc, NULL, buf, g_strerror(errno)); - g_free(buf); - purple_input_remove(ft->inpa); - close(source); - g_free(ft->filename); - g_free(ft->user); - g_free(ft->ip); - g_free(ft->cookie); - g_free(ft); - } - } else { - buf = g_strdup_printf("%s/%s", ft->filename, ft->hdr.name); - ft->file = g_fopen(buf, "w"); - g_free(buf); - if (!ft->file) { - buf = g_strdup_printf("Could not open %s/%s for writing!", ft->filename, - ft->hdr.name); - purple_notify_error(ft->gc, NULL, buf, g_strerror(errno)); - g_free(buf); - purple_input_remove(ft->inpa); - close(source); - g_free(ft->filename); - g_free(ft->user); - g_free(ft->ip); - g_free(ft->cookie); - g_free(ft); - } - } - - return; - } - - rt = read(source, buf, MIN(ntohl(ft->hdr.size) - ft->recvsize, 1024)); - if (rt < 0) { - purple_notify_error(ft->gc, NULL, - _("File transfer failed; other side probably " - "canceled."), NULL); - purple_input_remove(ft->inpa); - close(source); - g_free(ft->user); - g_free(ft->ip); - g_free(ft->cookie); - if (ft->file) - fclose(ft->file); - g_free(ft); - return; - } - ft->recvsize += rt; - for (i = 0; i < rt; i++) - fprintf(ft->file, "%c", buf[i]); - - if (ft->recvsize == ntohl(ft->hdr.size)) { - ft->hdr.hdrtype = htons(0x0204); - ft->hdr.filesleft = htons(ntohs(ft->hdr.filesleft) - 1); - ft->hdr.partsleft = htons(ntohs(ft->hdr.partsleft) - 1); - ft->hdr.recvcsum = ft->hdr.checksum; /* uh... */ - ft->hdr.nrecvd = htons(ntohs(ft->hdr.nrecvd) + 1); - ft->hdr.flags = 0; - write(source, ft, 256); - debug_header(ft); - ft->recvsize = 0; - fclose(ft->file); - if (ft->hdr.filesleft == 0) { - purple_input_remove(ft->inpa); - close(source); - g_free(ft->filename); - g_free(ft->user); - g_free(ft->ip); - g_free(ft->cookie); - g_free(ft); - } - } -} - -static void toc_send_file_connect(gpointer data, gint src, PurpleInputCondition cond) -{ - struct file_transfer *ft = data; - - if (src == -1) { - purple_notify_error(ft->gc, NULL, - _("Could not connect for transfer."), NULL); - g_free(ft->filename); - g_free(ft->cookie); - g_free(ft->user); - g_free(ft->ip); - g_free(ft); - return; - } - - ft->inpa = purple_input_add(src, PURPLE_INPUT_READ, toc_send_file_callback, ft); -} - -static void toc_send_file(gpointer a, struct file_transfer *old_ft) -{ - struct file_transfer *ft; - const char *dirname = gtk_file_selection_get_filename(GTK_FILE_SELECTION(old_ft->window)); - PurpleAccount *account; - char buf[BUF_LEN * 2]; - - if (purple_gtk_check_if_dir(dirname, GTK_FILE_SELECTION(old_ft->window))) - return; - ft = g_new0(struct file_transfer, 1); - if (old_ft->files == 1) - ft->filename = g_strdup(dirname); - else - ft->filename = g_path_get_dirname(dirname); - ft->cookie = g_strdup(old_ft->cookie); - ft->user = g_strdup(old_ft->user); - ft->ip = g_strdup(old_ft->ip); - ft->files = old_ft->files; - ft->port = old_ft->port; - ft->gc = old_ft->gc; - account = ft->gc->account; - gtk_widget_destroy(old_ft->window); - - g_snprintf(buf, sizeof(buf), "toc_rvous_accept %s %s %s", ft->user, ft->cookie, FILE_SEND_UID); - sflap_send(ft->gc, buf, -1, TYPE_DATA); - - if (purple_proxy_connect(ft->gc, account, ft->ip, ft->port, toc_send_file_connect, ft) != 0) { - purple_notify_error(ft->gc, NULL, - _("Could not connect for transfer."), NULL); - g_free(ft->filename); - g_free(ft->cookie); - g_free(ft->user); - g_free(ft->ip); - g_free(ft); - return; - } -} - -static void toc_get_file_callback(gpointer data, gint source, PurpleInputCondition cond) -{ - char buf[BUF_LONG]; - - struct file_transfer *ft = data; - - if (cond & PURPLE_INPUT_WRITE) { - int remain = MIN(ntohl(ft->hdr.totsize) - ft->recvsize, 1024); - int i; - for (i = 0; i < remain; i++) - fscanf(ft->file, "%c", &buf[i]); - write(source, buf, remain); - ft->recvsize += remain; - if (ft->recvsize == ntohl(ft->hdr.totsize)) { - purple_input_remove(ft->inpa); - ft->inpa = purple_input_add(source, PURPLE_INPUT_READ, - toc_get_file_callback, ft); - } - return; - } - - if (ft->hdr.hdrtype == htons(0x1108)) { - struct tm *fortime; - struct stat st; - char *basename; - - read(source, ft, 8); - read(source, &ft->hdr.bcookie, MIN(256 - 8, ntohs(ft->hdr.hdrlen) - 8)); - debug_header(ft); - - g_stat(ft->filename, &st); - fortime = localtime(&st.st_mtime); - basename = g_path_get_basename(ft->filename); - g_snprintf(buf, sizeof(buf), "%2d/%2d/%4d %2d:%2d %8ld %s\r\n", - fortime->tm_mon + 1, fortime->tm_mday, fortime->tm_year + 1900, - fortime->tm_hour + 1, fortime->tm_min + 1, (long)st.st_size, - basename); - write(source, buf, ntohl(ft->hdr.size)); - g_free(basename); - return; - } - - if (ft->hdr.hdrtype == htons(0x1209)) { - read(source, ft, 8); - read(source, &ft->hdr.bcookie, MIN(256 - 8, ntohs(ft->hdr.hdrlen) - 8)); - debug_header(ft); - return; - } - - if (ft->hdr.hdrtype == htons(0x120b)) { - read(source, ft, 8); - read(source, &ft->hdr.bcookie, MIN(256 - 8, ntohs(ft->hdr.hdrlen) - 8)); - debug_header(ft); - - if (ft->hdr.hdrtype != htons(0x120c)) { - g_snprintf(buf, sizeof(buf), "%s decided to cancel the transfer", ft->user); - purple_notify_error(ft->gc, NULL, buf, NULL); - purple_input_remove(ft->inpa); - close(source); - g_free(ft->filename); - g_free(ft->user); - g_free(ft->ip); - g_free(ft->cookie); - if (ft->file) - fclose(ft->file); - g_free(ft); - return; - } - - ft->hdr.hdrtype = 0x0101; - ft->hdr.totfiles = htons(1); ft->hdr.filesleft = htons(1); - ft->hdr.flags = 0x20; - write(source, ft, 256); - return; - } - - if (ft->hdr.hdrtype == 0x0101) { - read(source, ft, 8); - read(source, &ft->hdr.bcookie, MIN(256 - 8, ntohs(ft->hdr.hdrlen) - 8)); - debug_header(ft); - - purple_input_remove(ft->inpa); - ft->inpa = purple_input_add(source, PURPLE_INPUT_WRITE, - toc_get_file_callback, ft); - return; - } - - if (ft->hdr.hdrtype == 0x0202) { - read(source, ft, 8); - read(source, &ft->hdr.bcookie, MIN(256 - 8, ntohs(ft->hdr.hdrlen) - 8)); - debug_header(ft); - - purple_input_remove(ft->inpa); - close(source); - g_free(ft->filename); - g_free(ft->user); - g_free(ft->ip); - g_free(ft->cookie); - if (ft->file) - fclose(ft->file); - g_free(ft); - return; - } -} - -static void toc_get_file_connect(gpointer data, gint src, PurpleInputCondition cond) -{ - struct file_transfer *ft = data; - struct file_header *hdr; - char *buf; - char *basename; - - if (src == -1) { - purple_notify_error(ft->gc, NULL, - _("Could not connect for transfer."), NULL); - fclose(ft->file); - g_free(ft->filename); - g_free(ft->cookie); - g_free(ft->user); - g_free(ft->ip); - g_free(ft); - return; - } - - hdr = (struct file_header *)ft; - hdr->magic[0] = 'O'; hdr->magic[1] = 'F'; hdr->magic[2] = 'T'; hdr->magic[3] = '2'; - hdr->hdrlen = htons(256); - hdr->hdrtype = htons(0x1108); - rombase64(ft->cookie, &buf, NULL); - g_snprintf(hdr->bcookie, 8, "%s", buf); - g_free(buf); - hdr->totfiles = htons(1); hdr->filesleft = htons(1); - hdr->totparts = htons(1); hdr->partsleft = htons(1); - hdr->totsize = htonl((long)ft->st.st_size); /* combined size of all files */ - /* size = strlen("mm/dd/yyyy hh:mm sizesize 'name'\r\n") */ - basename = g_path_get_basename(ft->filename); - hdr->size = htonl(28 + strlen(basename)); /* size of listing.txt */ - g_free(basename); - hdr->modtime = htonl(ft->st.st_mtime); - hdr->checksum = htonl(0x89f70000); /* uh... */ - g_snprintf(hdr->idstring, 32, "OFT_Windows ICBMFT V1.1 32"); - hdr->flags = 0x02; - hdr->lnameoffset = 0x1A; - hdr->lsizeoffset = 0x10; - g_snprintf(hdr->name, 64, "listing.txt"); - if (write(src, hdr, 256) < 0) { - purple_notify_error(ft->gc, NULL, - _("Could not write file header. The file will " - "not be transferred."), NULL); - fclose(ft->file); - g_free(ft->filename); - g_free(ft->cookie); - g_free(ft->user); - g_free(ft->ip); - g_free(ft); - return; - } - - ft->inpa = purple_input_add(src, PURPLE_INPUT_READ, toc_get_file_callback, ft); -} - -static void toc_get_file(gpointer a, struct file_transfer *old_ft) -{ - struct file_transfer *ft; - const char *dirname = gtk_file_selection_get_filename(GTK_FILE_SELECTION(old_ft->window)); - PurpleAccount *account; - char *buf, buf2[BUF_LEN * 2]; - - if (purple_gtk_check_if_dir(dirname, GTK_FILE_SELECTION(old_ft->window))) - return; - ft = g_new0(struct file_transfer, 1); - ft->filename = g_strdup(dirname); - ft->file = g_fopen(ft->filename, "r"); - if (!ft->file) { - buf = g_strdup_printf("Unable to open %s for transfer.", ft->filename); - purple_notify_error(ft->gc, NULL, buf, NULL); - g_free(buf); - g_free(ft->filename); - g_free(ft); - return; - } - if (g_stat(dirname, &ft->st)) { - buf = g_strdup_printf("Unable to examine %s.", dirname); - purple_notify_error(ft->gc, NULL, buf, NULL); - g_free(buf); - g_free(ft->filename); - g_free(ft); - return; - } - ft->cookie = g_strdup(old_ft->cookie); - ft->user = g_strdup(old_ft->user); - ft->ip = g_strdup(old_ft->ip); - ft->port = old_ft->port; - ft->gc = old_ft->gc; - account = ft->gc->account; - gtk_widget_destroy(old_ft->window); - - g_snprintf(buf2, sizeof(buf2), "toc_rvous_accept %s %s %s", ft->user, ft->cookie, FILE_GET_UID); - sflap_send(ft->gc, buf2, -1, TYPE_DATA); - - if (purple_proxy_connect(ft->gc, account, ft->ip, ft->port, toc_get_file_connect, ft) < 0) { - purple_notify_error(ft->gc, NULL, - _("Could not connect for transfer."), NULL); - fclose(ft->file); - g_free(ft->filename); - g_free(ft->cookie); - g_free(ft->user); - g_free(ft->ip); - g_free(ft); - return; - } -} - -static void cancel_callback(gpointer a, struct file_transfer *ft) { - gtk_widget_destroy(ft->window); - if (a == ft->window) { - g_free(ft->cookie); - g_free(ft->user); - g_free(ft->ip); - g_free(ft); - } -} - -static void toc_reject_ft(struct ft_request *ft) { - g_free(ft->user); - g_free(ft->filename); - g_free(ft->ip); - g_free(ft->cookie); - if (ft->message) - g_free(ft->message); - g_free(ft); -} - - -static void toc_accept_ft(struct ft_request *fr) { - if(g_list_find(purple_connections_get_all(), fr->gc)) { - GtkWidget *window; - char buf[BUF_LEN]; - - struct file_transfer *ft = g_new0(struct file_transfer, 1); - ft->gc = fr->gc; - ft->user = g_strdup(fr->user); - ft->cookie = g_strdup(fr->cookie); - ft->ip = g_strdup(fr->ip); - ft->port = fr->port; - ft->files = fr->files; - - ft->window = window = gtk_file_selection_new(_("Save As...")); - g_snprintf(buf, sizeof(buf), "%s/%s", purple_home_dir(), fr->filename ? fr->filename : ""); - gtk_file_selection_set_filename(GTK_FILE_SELECTION(window), buf); - g_signal_connect(G_OBJECT(window), "destroy", - G_CALLBACK(cancel_callback), ft); - g_signal_connect(G_OBJECT(GTK_FILE_SELECTION(ft->window)->cancel_button), - "clicked", G_CALLBACK(cancel_callback), ft); - - if (!strcmp(fr->UID, FILE_SEND_UID)) - g_signal_connect(G_OBJECT(GTK_FILE_SELECTION(window)->ok_button), - "clicked", G_CALLBACK(toc_send_file), ft); - else - g_signal_connect(G_OBJECT(GTK_FILE_SELECTION(window)->ok_button), - "clicked", G_CALLBACK(toc_get_file), ft); - - gtk_widget_show(window); - } - - toc_reject_ft(fr); -} - -static void accept_file_dialog(struct ft_request *ft) { - char buf[BUF_LONG]; - if (!strcmp(ft->UID, FILE_SEND_UID)) { - /* holy crap. who the fuck would transfer gigabytes through AIM?! */ - static char *sizes[4] = { "bytes", "KB", "MB", "GB" }; - float size = ft->size; - int index = 0; - while ((index < 4) && (size > 1024)) { - size /= 1024; - index++; - } - g_snprintf(buf, sizeof(buf), - dngettext(PACKAGE, - "%s requests %s to accept %d file: %s (%.2f %s)%s%s", - "%s requests %s to accept %d files: %s (%.2f %s)%s%s", - ft->files), - ft->user, purple_account_get_username(ft->gc->account), ft->files, - ft->filename, size, sizes[index], (ft->message) ? "\n" : "", - (ft->message) ? ft->message : ""); - } else { - g_snprintf(buf, sizeof(buf), _("%s requests you to send them a file"), ft->user); - } - - purple_request_accept_cancel(ft->gc, NULL, buf, NULL, - PURPLE_DEFAULT_ACTION_NONE, ft, - G_CALLBACK(toc_accept_ft), - G_CALLBACK(toc_reject_ft)); -} -#endif - -static PurplePluginProtocolInfo prpl_info = -{ - 0, - NULL, /* user_splits */ - NULL, /* protocol_options */ - NO_BUDDY_ICONS, /* icon_spec */ - toc_list_icon, /* list_icon */ - toc_list_emblem, /* list_emblems */ - NULL, /* status_text */ - NULL, /* tooltip_text */ - toc_away_states, /* away_states */ - toc_blist_node_menu, /* blist_node_menu */ - toc_chat_info, /* chat_info */ - toc_chat_info_defaults, /* chat_info_defaults */ - toc_login, /* login */ - toc_close, /* close */ - toc_send_im, /* send_im */ - toc_set_info, /* set_info */ - NULL, /* send_typing */ - toc_get_info, /* get_info */ - toc_set_status, /* set_away */ - toc_set_idle, /* set_idle */ - toc_change_passwd, /* change_passwd */ - toc_add_buddy, /* add_buddy */ - toc_add_buddies, /* add_buddies */ - toc_remove_buddy, /* remove_buddy */ - toc_remove_buddies, /* remove_buddies */ - toc_add_permit, /* add_permit */ - toc_add_deny, /* add_deny */ - toc_rem_permit, /* rem_permit */ - toc_rem_deny, /* rem_deny */ - toc_set_permit_deny, /* set_permit_deny */ - toc_join_chat, /* join_chat */ - NULL, /* reject_chat */ - NULL, /* get_chat_name */ - toc_chat_invite, /* chat_invite */ - toc_chat_leave, /* chat_leave */ - toc_chat_whisper, /* chat_whisper */ - toc_chat_send, /* chat_send */ - toc_keepalive, /* keepalive */ - NULL, /* register_user */ - NULL, /* get_cb_info */ - NULL, /* get_cb_away */ - NULL, /* alias_buddy */ - NULL, /* group_buddy */ - NULL, /* rename_group */ - NULL, /* buddy_free */ - NULL, /* convo_closed */ - toc_normalize, /* normalize */ - NULL, /* set_buddy_icon */ - NULL, /* remove_group */ - NULL, /* get_cb_real_name */ - NULL, /* set_chat_topic */ - NULL, /* find_blist_chat */ - NULL, /* roomlist_get_list */ - NULL, /* roomlist_cancel */ - NULL, /* roomlist_expand_category */ - NULL, /* can_receive_file */ - NULL, /* send_file */ - NULL, /* new_xfer */ - NULL, /* offline_message */ - NULL, /* whiteboard_prpl_ops */ - toc_send_raw, /* send_raw */ -}; - -static PurplePluginInfo info = -{ - PURPLE_PLUGIN_MAGIC, - PURPLE_MAJOR_VERSION, - PURPLE_MINOR_VERSION, - PURPLE_PLUGIN_PROTOCOL, /**< type */ - NULL, /**< ui_requirement */ - 0, /**< flags */ - NULL, /**< dependencies */ - PURPLE_PRIORITY_DEFAULT, /**< priority */ - - "prpl-toc", /**< id */ - "TOC", /**< name */ - DISPLAY_VERSION, /**< version */ - /** summary */ - N_("TOC Protocol Plugin"), - /** description */ - N_("TOC Protocol Plugin"), - NULL, /**< author */ - PURPLE_WEBSITE, /**< homepage */ - - NULL, /**< load */ - NULL, /**< unload */ - NULL, /**< destroy */ - - NULL, /**< ui_info */ - &prpl_info, /**< extra_info */ - NULL, - toc_actions -}; - -static void -init_plugin(PurplePlugin *plugin) -{ - PurpleAccountOption *option; - - option = purple_account_option_string_new(_("Server"), "server", TOC_HOST); - prpl_info.protocol_options = g_list_append(prpl_info.protocol_options, - option); - - option = purple_account_option_int_new(_("Port"), "port", TOC_PORT); - prpl_info.protocol_options = g_list_append(prpl_info.protocol_options, - option); - - my_protocol = plugin; -} - -PURPLE_INIT_PLUGIN(toc, init_plugin, info);