Signed-off-by: Slávek Banko <slavek.banko@axis.cz>pull/1/head
parent
dc34f9c391
commit
036b0229db
@ -1,254 +0,0 @@
|
||||
/*
|
||||
Kopete Oscar Protocol
|
||||
aimlogintask.h - Handles logging into to the AIM service
|
||||
|
||||
Copyright (c) 2004 Matt Rogers <mattr@kde.org>
|
||||
|
||||
Kopete (c) 2002-2004 by the Kopete developers <kopete-devel@kde.org>
|
||||
|
||||
*************************************************************************
|
||||
* *
|
||||
* This library is free software; you can redistribute it and/or *
|
||||
* modify it under the terms of the GNU Lesser General Public *
|
||||
* License as published by the Free Software Foundation; either *
|
||||
* version 2 of the License, or (at your option) any later version. *
|
||||
* *
|
||||
*************************************************************************
|
||||
*/
|
||||
#include "aimlogintask.h"
|
||||
|
||||
#include <stdlib.h>
|
||||
#include <kdebug.h>
|
||||
#include <tdelocale.h>
|
||||
#include "connection.h"
|
||||
#include "oscartypes.h"
|
||||
#include "oscarutils.h"
|
||||
#include "transfer.h"
|
||||
|
||||
#include "md5.h"
|
||||
|
||||
using namespace Oscar;
|
||||
|
||||
AimLoginTask::AimLoginTask( Task* parent )
|
||||
: Task ( parent )
|
||||
{
|
||||
}
|
||||
|
||||
AimLoginTask::~AimLoginTask()
|
||||
{
|
||||
}
|
||||
|
||||
void AimLoginTask::onGo()
|
||||
{
|
||||
//send Snac 17,06
|
||||
sendAuthStringRequest();
|
||||
//when we have the authKey, login
|
||||
connect( this, TQT_SIGNAL( haveAuthKey() ), this, TQT_SLOT( sendLoginRequest() ) );
|
||||
}
|
||||
|
||||
bool AimLoginTask::forMe( Transfer* transfer ) const
|
||||
{
|
||||
SnacTransfer* st = dynamic_cast<SnacTransfer*>( transfer );
|
||||
|
||||
if (!st)
|
||||
return false;
|
||||
|
||||
if ( st && st->snacService() == 0x17 )
|
||||
{
|
||||
WORD subtype = st->snacSubtype();
|
||||
switch ( subtype )
|
||||
{
|
||||
case 0x0002:
|
||||
case 0x0003:
|
||||
case 0x0006:
|
||||
case 0x0007:
|
||||
return true;
|
||||
break;
|
||||
default:
|
||||
return false;
|
||||
break;
|
||||
}
|
||||
}
|
||||
return false;
|
||||
}
|
||||
|
||||
const TQByteArray& AimLoginTask::cookie() const
|
||||
{
|
||||
return m_cookie;
|
||||
}
|
||||
|
||||
const TQString& AimLoginTask::bosHost() const
|
||||
{
|
||||
return m_bosHost;
|
||||
}
|
||||
|
||||
const TQString& AimLoginTask::bosPort() const
|
||||
{
|
||||
return m_bosPort;
|
||||
}
|
||||
|
||||
bool AimLoginTask::take( Transfer* transfer )
|
||||
{
|
||||
if ( forMe( transfer ) )
|
||||
{
|
||||
SnacTransfer* st = dynamic_cast<SnacTransfer*>( transfer );
|
||||
if (!st)
|
||||
return false;
|
||||
|
||||
WORD subtype = st->snacSubtype();
|
||||
switch ( subtype )
|
||||
{
|
||||
case 0x0003:
|
||||
setTransfer( transfer );
|
||||
handleLoginResponse();
|
||||
setTransfer( 0 );
|
||||
return true;
|
||||
break;
|
||||
case 0x0007:
|
||||
setTransfer( transfer );
|
||||
processAuthStringReply();
|
||||
setTransfer( 0 );
|
||||
return true;
|
||||
break;
|
||||
default:
|
||||
return false;
|
||||
break;
|
||||
}
|
||||
|
||||
return false;
|
||||
}
|
||||
return false;
|
||||
}
|
||||
|
||||
void AimLoginTask::sendAuthStringRequest()
|
||||
{
|
||||
kdDebug(OSCAR_RAW_DEBUG) << k_funcinfo
|
||||
<< "SEND CLI_AUTH_REQUEST, sending login request" << endl;
|
||||
|
||||
FLAP f = { 0x02, 0, 0 };
|
||||
SNAC s = { 0x0017, 0x0006, 0x0000, client()->snacSequence() };
|
||||
|
||||
Buffer* outbuf = new Buffer;
|
||||
outbuf->addTLV(0x0001, client()->userId().length(), client()->userId().latin1() );
|
||||
outbuf->addDWord(0x004B0000); // empty TLV 0x004B
|
||||
outbuf->addDWord(0x005A0000); // empty TLV 0x005A
|
||||
|
||||
Transfer* st = createTransfer( f, s, outbuf );
|
||||
send( st );
|
||||
}
|
||||
|
||||
void AimLoginTask::processAuthStringReply()
|
||||
{
|
||||
kdDebug(OSCAR_RAW_DEBUG) << k_funcinfo << "Got the authorization key" << endl;
|
||||
Buffer *inbuf = transfer()->buffer();
|
||||
WORD keylen = inbuf->getWord();
|
||||
kdDebug(OSCAR_RAW_DEBUG) << k_funcinfo << "Key length is " << keylen << endl;
|
||||
m_authKey.duplicate( inbuf->getBlock(keylen) );
|
||||
emit haveAuthKey();
|
||||
}
|
||||
|
||||
void AimLoginTask::sendLoginRequest()
|
||||
{
|
||||
kdDebug(OSCAR_RAW_DEBUG) << k_funcinfo << "SEND (CLI_MD5_LOGIN) sending AIM login" << endl;
|
||||
|
||||
FLAP f = { 0x02, 0, 0 };
|
||||
SNAC s = { 0x0017, 0x0002, 0x0000, client()->snacSequence() };
|
||||
Buffer *outbuf = new Buffer;
|
||||
const Oscar::ClientVersion* version = client()->version();
|
||||
|
||||
outbuf->addTLV(0x0001, client()->userId().length(), client()->userId().latin1());
|
||||
|
||||
TQByteArray digest( 17 ); //apparently MD5 digests are 16 bytes long
|
||||
encodePassword( digest );
|
||||
digest[16] = '\0'; //do this so that addTLV sees a NULL-terminator
|
||||
|
||||
outbuf->addTLV(0x0025, 16, digest);
|
||||
outbuf->addTLV(0x0003, version->clientString.length(), version->clientString.latin1() );
|
||||
outbuf->addTLV16(0x0016, version->clientId );
|
||||
outbuf->addTLV16(0x0017, version->major );
|
||||
outbuf->addTLV16(0x0018, version->minor );
|
||||
outbuf->addTLV16(0x0019, version->point );
|
||||
outbuf->addTLV16(0x001a, version->build );
|
||||
outbuf->addDWord(0x00140004); //TLV type 0x0014, length 0x0004
|
||||
outbuf->addDWord( version->other ); //TLV data for type 0x0014
|
||||
outbuf->addTLV(0x000f, version->lang.length(), version->lang.latin1() );
|
||||
outbuf->addTLV(0x000e, version->country.length(), version->country.latin1() );
|
||||
|
||||
//if set, old-style buddy lists will not work... you will need to use SSI
|
||||
outbuf->addTLV8(0x004a,0x01);
|
||||
|
||||
Transfer *st = createTransfer( f, s, outbuf );
|
||||
send( st );
|
||||
}
|
||||
|
||||
void AimLoginTask::handleLoginResponse()
|
||||
{
|
||||
kdDebug(OSCAR_RAW_DEBUG) << k_funcinfo << "RECV SNAC 0x17, 0x07 - AIM Login Response" << endl;
|
||||
|
||||
SnacTransfer* st = dynamic_cast<SnacTransfer*> ( transfer() );
|
||||
|
||||
if ( !st )
|
||||
{
|
||||
setError( -1 , TQString() );
|
||||
return;
|
||||
}
|
||||
|
||||
TQValueList<TLV> tlvList = st->buffer()->getTLVList();
|
||||
|
||||
TLV uin = findTLV( tlvList, 0x0001 );
|
||||
if ( uin )
|
||||
{
|
||||
kdDebug(OSCAR_RAW_DEBUG) << k_funcinfo << "found TLV(1) [SN], SN=" << TQString( uin.data ) << endl;
|
||||
}
|
||||
|
||||
TLV err = findTLV( tlvList, 0x0008 );
|
||||
|
||||
if ( err )
|
||||
{
|
||||
WORD errorNum = ( ( err.data[0] << 8 ) | err.data[1] );
|
||||
|
||||
kdDebug(OSCAR_RAW_DEBUG) << k_funcinfo << k_funcinfo << "found TLV(8) [ERROR] error= " <<
|
||||
errorNum << endl;
|
||||
Oscar::SNAC s = { 0, 0, 0, 0 };
|
||||
client()->fatalTaskError( s, errorNum );
|
||||
setError( errorNum, TQString() );
|
||||
return; //if there's an error, we'll need to disconnect anyways
|
||||
}
|
||||
|
||||
TLV server = findTLV( tlvList, 0x0005 );
|
||||
if ( server )
|
||||
{
|
||||
TQString ip = TQString( server.data );
|
||||
kdDebug(OSCAR_RAW_DEBUG) << k_funcinfo << "found TLV(5) [SERVER] " << ip << endl;
|
||||
int index = ip.find( ':' );
|
||||
m_bosHost = ip.left( index );
|
||||
ip.remove( 0 , index+1 ); //get rid of the colon and everything before it
|
||||
m_bosPort = ip.left(4); //we only need 4 bytes
|
||||
kdDebug(OSCAR_RAW_DEBUG) << k_funcinfo << "We should reconnect to server '" << m_bosHost <<
|
||||
"' on port " << m_bosPort << endl;
|
||||
}
|
||||
|
||||
TLV cookie = findTLV( tlvList, 0x0006 );
|
||||
if ( cookie )
|
||||
{
|
||||
kdDebug(OSCAR_RAW_DEBUG) << k_funcinfo << "found TLV(6) [COOKIE]" << endl;
|
||||
m_cookie.duplicate( cookie.data );
|
||||
setSuccess( 0, TQString() );
|
||||
}
|
||||
tlvList.clear();
|
||||
}
|
||||
|
||||
void AimLoginTask::encodePassword( TQByteArray& digest ) const
|
||||
{
|
||||
kdDebug(OSCAR_RAW_DEBUG) << k_funcinfo << endl;
|
||||
md5_state_t state;
|
||||
md5_init( &state );
|
||||
md5_append( &state, ( const md5_byte_t* ) m_authKey.data(), m_authKey.size() );
|
||||
md5_append( &state, ( const md5_byte_t* ) client()->password().latin1(), client()->password().length() );
|
||||
md5_append( &state, ( const md5_byte_t* ) AIM_MD5_STRING, strlen( AIM_MD5_STRING ) );
|
||||
md5_finish( &state, ( md5_byte_t* ) digest.data() );
|
||||
}
|
||||
|
||||
//kate: indent-mode csands; tab-width 4;
|
||||
|
||||
#include "aimlogintask.moc"
|
@ -1,83 +0,0 @@
|
||||
/*
|
||||
Kopete Oscar Protocol
|
||||
aimlogintask.h - Handles logging into to the AIM service
|
||||
|
||||
Copyright (c) 2004 Matt Rogers <mattr@kde.org>
|
||||
|
||||
Kopete (c) 2002-2004 by the Kopete developers <kopete-devel@kde.org>
|
||||
|
||||
*************************************************************************
|
||||
* *
|
||||
* This library is free software; you can redistribute it and/or *
|
||||
* modify it under the terms of the GNU Lesser General Public *
|
||||
* License as published by the Free Software Foundation; either *
|
||||
* version 2 of the License, or (at your option) any later version. *
|
||||
* *
|
||||
*************************************************************************
|
||||
*/
|
||||
|
||||
#ifndef _OSCAR_AIMLOGINTASK_H_
|
||||
#define _OSCAR_AIMLOGINTASK_H_
|
||||
|
||||
#include "task.h"
|
||||
|
||||
using namespace Oscar;
|
||||
|
||||
class AimLoginTask : public Task
|
||||
{
|
||||
Q_OBJECT
|
||||
|
||||
public:
|
||||
AimLoginTask( Task* parent );
|
||||
~AimLoginTask();
|
||||
bool take( Transfer* transfer );
|
||||
virtual void onGo();
|
||||
|
||||
//Protocol specific stuff
|
||||
const TQByteArray& cookie() const;
|
||||
const TQString& bosHost() const;
|
||||
const TQString& bosPort() const;
|
||||
|
||||
protected:
|
||||
bool forMe( Transfer* transfer ) const;
|
||||
|
||||
signals:
|
||||
void haveAuthKey();
|
||||
|
||||
private:
|
||||
//! Encodes a password using MD5
|
||||
void encodePassword( TQByteArray& digest ) const;
|
||||
|
||||
//! Send SNAC 0x17, 0x06
|
||||
void sendAuthStringRequest();
|
||||
|
||||
//! Handle SNAC 0x17, 0x07
|
||||
void processAuthStringReply();
|
||||
|
||||
//! Handle SNAC 0x17, 0x03
|
||||
void handleLoginResponse();
|
||||
|
||||
//! Parse the error codes to generate a reason why sign-on failed
|
||||
//Massive code duplication with CloseConnectionTask
|
||||
bool parseDisconnectCode( int error, TQString& reason );
|
||||
|
||||
private slots:
|
||||
//! Send SNAC 0x17, 0x02
|
||||
void sendLoginRequest();
|
||||
|
||||
private:
|
||||
//! The authorization key to use when encoding the password
|
||||
TQByteArray m_authKey;
|
||||
|
||||
//! The all important connection cookie
|
||||
TQByteArray m_cookie;
|
||||
|
||||
//! The new BOS Host
|
||||
TQString m_bosHost;
|
||||
|
||||
//! The new BOS Port
|
||||
TQString m_bosPort;
|
||||
|
||||
};
|
||||
|
||||
#endif
|
Loading…
Reference in new issue