Annotation of ChivanetAimPidgin/oscarprpl/src/c/clientlogin.c, revision 1.1
1.1 ! snw 1: /*
! 2: * Purple's oscar protocol plugin
! 3: * This file is the legal property of its developers.
! 4: * Please see the AUTHORS file distributed alongside this file.
! 5: *
! 6: * This library is free software; you can redistribute it and/or
! 7: * modify it under the terms of the GNU Lesser General Public
! 8: * License as published by the Free Software Foundation; either
! 9: * version 2 of the License, or (at your option) any later version.
! 10: *
! 11: * This library is distributed in the hope that it will be useful,
! 12: * but WITHOUT ANY WARRANTY; without even the implied warranty of
! 13: * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
! 14: * Lesser General Public License for more details.
! 15: *
! 16: * You should have received a copy of the GNU Lesser General Public
! 17: * License along with this library; if not, write to the Free Software
! 18: * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02111-1301 USA
! 19: */
! 20:
! 21: /**
! 22: * This file implements AIM's clientLogin procedure for authenticating
! 23: * users. This replaces the older MD5-based and XOR-based
! 24: * authentication methods that use SNAC family 0x0017.
! 25: *
! 26: * This doesn't use SNACs or FLAPs at all. It makes http and https
! 27: * POSTs to AOL to validate the user based on the password they
! 28: * provided to us. Upon successful authentication we request a
! 29: * connection to the BOS server by calling startOSCARsession. The
! 30: * AOL server gives us the hostname and port number to use, as well
! 31: * as the cookie to use to authenticate to the BOS server. And then
! 32: * everything else is the same as with BUCP.
! 33: *
! 34: * For details, see:
! 35: * http://dev.aol.com/aim/oscar/#AUTH
! 36: * http://dev.aol.com/authentication_for_clients
! 37: */
! 38:
! 39: #include "oscar.h"
! 40: #include "oscarcommon.h"
! 41:
! 42: #include "cipher.h"
! 43: #include "core.h"
! 44:
! 45: #define AIM_LOGIN_HOST "api.nina.chat"
! 46: #define ICQ_LOGIN_HOST "api.nina.chat"
! 47:
! 48: #define AIM_API_HOST "api.nina.chat"
! 49: #define ICQ_API_HOST "api.nina.chat"
! 50:
! 51: #define CLIENT_LOGIN_PAGE "/auth/clientLogin"
! 52: #define START_OSCAR_SESSION_PAGE "/aim/startOSCARSession"
! 53:
! 54: #define HTTPS_FORMAT_URL(host, page) "https://" host page
! 55:
! 56: static const gchar *client_login_urls[] = {
! 57: HTTPS_FORMAT_URL(AIM_LOGIN_HOST, CLIENT_LOGIN_PAGE),
! 58: HTTPS_FORMAT_URL(ICQ_LOGIN_HOST, CLIENT_LOGIN_PAGE),
! 59: };
! 60:
! 61: static const gchar *start_oscar_session_urls[] = {
! 62: HTTPS_FORMAT_URL(AIM_API_HOST, START_OSCAR_SESSION_PAGE),
! 63: HTTPS_FORMAT_URL(ICQ_API_HOST, START_OSCAR_SESSION_PAGE),
! 64: };
! 65:
! 66: static const gchar *get_client_login_url(OscarData *od)
! 67: {
! 68: return client_login_urls[od->icq ? 1 : 0];
! 69: }
! 70:
! 71: static const gchar *get_start_oscar_session_url(OscarData *od)
! 72: {
! 73: return start_oscar_session_urls[od->icq ? 1 : 0];
! 74: }
! 75:
! 76: static const char *get_client_key(OscarData *od)
! 77: {
! 78: return oscar_get_ui_info_string(
! 79: od->icq ? "prpl-icq-clientkey" : "prpl-aim-clientkey",
! 80: od->icq ? ICQ_DEFAULT_CLIENT_KEY : AIM_DEFAULT_CLIENT_KEY);
! 81: }
! 82:
! 83: static gchar *generate_error_message(xmlnode *resp, const char *url)
! 84: {
! 85: xmlnode *text;
! 86: xmlnode *status_code_node;
! 87: gboolean have_error_code = TRUE;
! 88: gchar *err = NULL;
! 89: gchar *details = NULL;
! 90:
! 91: status_code_node = xmlnode_get_child(resp, "statusCode");
! 92: if (status_code_node) {
! 93: gchar *status_code;
! 94:
! 95: /* We can get 200 OK here if the server omitted something we think it shouldn't have (see #12783).
! 96: * No point in showing the "Ok" string to the user.
! 97: */
! 98: status_code = xmlnode_get_data_unescaped(status_code_node);
! 99: if (purple_strequal(status_code, "200")) {
! 100: have_error_code = FALSE;
! 101: }
! 102: }
! 103: if (have_error_code && resp && (text = xmlnode_get_child(resp, "statusText"))) {
! 104: details = xmlnode_get_data(text);
! 105: }
! 106:
! 107: if (details && *details) {
! 108: err = g_strdup_printf(_("Received unexpected response from %s: %s"), url, details);
! 109: } else {
! 110: err = g_strdup_printf(_("Received unexpected response from %s"), url);
! 111: }
! 112:
! 113: g_free(details);
! 114: return err;
! 115: }
! 116:
! 117: /**
! 118: * @return A null-terminated base64 encoded version of the HMAC
! 119: * calculated using the given key and data.
! 120: */
! 121: static gchar *hmac_sha256(const char *key, const char *message)
! 122: {
! 123: PurpleCipherContext *context;
! 124: guchar digest[32];
! 125:
! 126: context = purple_cipher_context_new_by_name("hmac", NULL);
! 127: purple_cipher_context_set_option(context, "hash", "sha256");
! 128: purple_cipher_context_set_key(context, (guchar *)key);
! 129: purple_cipher_context_append(context, (guchar *)message, strlen(message));
! 130: purple_cipher_context_digest(context, sizeof(digest), digest, NULL);
! 131: purple_cipher_context_destroy(context);
! 132:
! 133: return purple_base64_encode(digest, sizeof(digest));
! 134: }
! 135:
! 136: /**
! 137: * @return A base-64 encoded HMAC-SHA256 signature created using the
! 138: * technique documented at
! 139: * http://dev.aol.com/authentication_for_clients#signing
! 140: */
! 141: static gchar *generate_signature(const char *method, const char *url, const char *parameters, const char *session_key)
! 142: {
! 143: char *encoded_url, *signature_base_string, *signature;
! 144: const char *encoded_parameters;
! 145:
! 146: encoded_url = g_strdup(purple_url_encode(url));
! 147: encoded_parameters = purple_url_encode(parameters);
! 148: signature_base_string = g_strdup_printf("%s&%s&%s",
! 149: method, encoded_url, encoded_parameters);
! 150: g_free(encoded_url);
! 151:
! 152: signature = hmac_sha256(session_key, signature_base_string);
! 153: g_free(signature_base_string);
! 154:
! 155: return signature;
! 156: }
! 157:
! 158: static gboolean parse_start_oscar_session_response(PurpleConnection *gc, const gchar *response, gsize response_len, char **host, unsigned short *port, char **cookie, char **tls_certname)
! 159: {
! 160: OscarData *od = purple_connection_get_protocol_data(gc);
! 161: xmlnode *response_node, *tmp_node, *data_node;
! 162: xmlnode *host_node = NULL, *port_node = NULL, *cookie_node = NULL, *tls_node = NULL;
! 163: char *tmp;
! 164: guint code;
! 165: const gchar *encryption_type = purple_account_get_string(purple_connection_get_account(gc), "encryption", OSCAR_DEFAULT_ENCRYPTION);
! 166:
! 167: /* Parse the response as XML */
! 168: response_node = xmlnode_from_str(response, response_len);
! 169: if (response_node == NULL)
! 170: {
! 171: char *msg;
! 172: purple_debug_error("oscar", "startOSCARSession could not parse "
! 173: "response as XML: %s\n", response);
! 174: /* Note to translators: %s in this string is a URL */
! 175: msg = generate_error_message(response_node,
! 176: get_start_oscar_session_url(od));
! 177: purple_connection_error_reason(gc,
! 178: PURPLE_CONNECTION_ERROR_NETWORK_ERROR, msg);
! 179: g_free(msg);
! 180: return FALSE;
! 181: }
! 182:
! 183: /* Grab the necessary XML nodes */
! 184: tmp_node = xmlnode_get_child(response_node, "statusCode");
! 185: data_node = xmlnode_get_child(response_node, "data");
! 186: if (data_node != NULL) {
! 187: host_node = xmlnode_get_child(data_node, "host");
! 188: port_node = xmlnode_get_child(data_node, "port");
! 189: cookie_node = xmlnode_get_child(data_node, "cookie");
! 190: }
! 191:
! 192: /* Make sure we have a status code */
! 193: if (tmp_node == NULL || (tmp = xmlnode_get_data_unescaped(tmp_node)) == NULL) {
! 194: char *msg;
! 195: purple_debug_error("oscar", "startOSCARSession response was "
! 196: "missing statusCode: %s\n", response);
! 197: msg = generate_error_message(response_node,
! 198: get_start_oscar_session_url(od));
! 199: purple_connection_error_reason(gc,
! 200: PURPLE_CONNECTION_ERROR_NETWORK_ERROR, msg);
! 201: g_free(msg);
! 202: xmlnode_free(response_node);
! 203: return FALSE;
! 204: }
! 205:
! 206: /* Make sure the status code was 200 */
! 207: code = atoi(tmp);
! 208: if (code != 200)
! 209: {
! 210: xmlnode *status_detail_node;
! 211: guint status_detail = 0;
! 212:
! 213: status_detail_node = xmlnode_get_child(response_node,
! 214: "statusDetailCode");
! 215: if (status_detail_node) {
! 216: gchar *data = xmlnode_get_data(status_detail_node);
! 217: if (data) {
! 218: status_detail = atoi(data);
! 219: g_free(data);
! 220: }
! 221: }
! 222:
! 223: purple_debug_error("oscar", "startOSCARSession response statusCode "
! 224: "was %s: %s\n", tmp, response);
! 225:
! 226: if ((code == 401 && status_detail != 1014) || code == 607)
! 227: purple_connection_error_reason(gc,
! 228: PURPLE_CONNECTION_ERROR_OTHER_ERROR,
! 229: _("You have been connecting and disconnecting too "
! 230: "frequently. Wait ten minutes and try again. If "
! 231: "you continue to try, you will need to wait even "
! 232: "longer."));
! 233: else {
! 234: char *msg;
! 235: msg = generate_error_message(response_node,
! 236: get_start_oscar_session_url(od));
! 237: purple_connection_error_reason(gc,
! 238: PURPLE_CONNECTION_ERROR_OTHER_ERROR, msg);
! 239: g_free(msg);
! 240: }
! 241:
! 242: g_free(tmp);
! 243: xmlnode_free(response_node);
! 244: return FALSE;
! 245: }
! 246: g_free(tmp);
! 247:
! 248: /* Make sure we have everything else */
! 249: if (data_node == NULL || host_node == NULL || port_node == NULL || cookie_node == NULL)
! 250: {
! 251: char *msg;
! 252: purple_debug_error("oscar", "startOSCARSession response was missing "
! 253: "something: %s\n", response);
! 254: msg = generate_error_message(response_node,
! 255: get_start_oscar_session_url(od));
! 256: purple_connection_error_reason(gc,
! 257: PURPLE_CONNECTION_ERROR_NETWORK_ERROR, msg);
! 258: g_free(msg);
! 259: xmlnode_free(response_node);
! 260: return FALSE;
! 261: }
! 262:
! 263: if (!purple_strequal(encryption_type, OSCAR_NO_ENCRYPTION)) {
! 264: tls_node = xmlnode_get_child(data_node, "tlsCertName");
! 265: if (tls_node != NULL) {
! 266: *tls_certname = xmlnode_get_data_unescaped(tls_node);
! 267: } else {
! 268: if (purple_strequal(encryption_type, OSCAR_OPPORTUNISTIC_ENCRYPTION)) {
! 269: purple_debug_warning("oscar", "We haven't received a tlsCertName to use. We will not do SSL to BOS.\n");
! 270: } else {
! 271: purple_debug_error("oscar", "startOSCARSession was missing tlsCertName: %s\n", response);
! 272: purple_connection_error_reason(
! 273: gc,
! 274: PURPLE_CONNECTION_ERROR_NO_SSL_SUPPORT,
! 275: _("You required encryption in your account settings, but one of the servers doesn't support it."));
! 276: xmlnode_free(response_node);
! 277: return FALSE;
! 278: }
! 279: }
! 280: }
! 281:
! 282: /* Extract data from the XML */
! 283: *host = xmlnode_get_data_unescaped(host_node);
! 284: tmp = xmlnode_get_data_unescaped(port_node);
! 285: *cookie = xmlnode_get_data_unescaped(cookie_node);
! 286:
! 287: if (*host == NULL || **host == '\0' || tmp == NULL || *tmp == '\0' || *cookie == NULL || **cookie == '\0')
! 288: {
! 289: char *msg;
! 290: purple_debug_error("oscar", "startOSCARSession response was missing "
! 291: "something: %s\n", response);
! 292: msg = generate_error_message(response_node,
! 293: get_start_oscar_session_url(od));
! 294: purple_connection_error_reason(gc,
! 295: PURPLE_CONNECTION_ERROR_NETWORK_ERROR, msg);
! 296: g_free(msg);
! 297: g_free(*host);
! 298: g_free(tmp);
! 299: g_free(*cookie);
! 300: xmlnode_free(response_node);
! 301: return FALSE;
! 302: }
! 303:
! 304: *port = atoi(tmp);
! 305: g_free(tmp);
! 306:
! 307: return TRUE;
! 308: }
! 309:
! 310: static void start_oscar_session_cb(PurpleUtilFetchUrlData *url_data, gpointer user_data, const gchar *url_text, gsize len, const gchar *error_message)
! 311: {
! 312: OscarData *od;
! 313: PurpleConnection *gc;
! 314: char *host, *cookie;
! 315: char *tls_certname = NULL;
! 316: unsigned short port;
! 317: guint8 *cookiedata;
! 318: gsize cookiedata_len = 0;
! 319:
! 320: od = user_data;
! 321: gc = od->gc;
! 322:
! 323: od->url_data = NULL;
! 324:
! 325: if (error_message != NULL || len == 0) {
! 326: gchar *tmp;
! 327: /* Note to translators: The first %s is a URL, the second is an
! 328: error message. */
! 329: tmp = g_strdup_printf(_("Error requesting %s: %s"),
! 330: get_start_oscar_session_url(od), error_message ?
! 331: error_message : _("The server returned an empty response"));
! 332: purple_connection_error_reason(gc,
! 333: PURPLE_CONNECTION_ERROR_NETWORK_ERROR, tmp);
! 334: g_free(tmp);
! 335: return;
! 336: }
! 337:
! 338: if (!parse_start_oscar_session_response(gc, url_text, len, &host, &port, &cookie, &tls_certname))
! 339: return;
! 340:
! 341: cookiedata = purple_base64_decode(cookie, &cookiedata_len);
! 342: oscar_connect_to_bos(gc, od, host, port, cookiedata, cookiedata_len, tls_certname);
! 343: g_free(cookiedata);
! 344:
! 345: g_free(host);
! 346: g_free(cookie);
! 347: g_free(tls_certname);
! 348: }
! 349:
! 350: static void send_start_oscar_session(OscarData *od, const char *token, const char *session_key, time_t hosttime)
! 351: {
! 352: char *query_string, *signature, *url;
! 353: PurpleAccount *account = purple_connection_get_account(od->gc);
! 354: const gchar *encryption_type = purple_account_get_string(account, "encryption", OSCAR_DEFAULT_ENCRYPTION);
! 355:
! 356: /*
! 357: * Construct the GET parameters.
! 358: */
! 359: query_string = g_strdup_printf("a=%s"
! 360: "&distId=%d"
! 361: "&f=xml"
! 362: "&k=%s"
! 363: "&ts=%" PURPLE_TIME_T_MODIFIER
! 364: "&useTLS=%d",
! 365: purple_url_encode(token),
! 366: oscar_get_ui_info_int(od->icq ? "prpl-icq-distid" : "prpl-aim-distid",
! 367: od->icq ? ICQ_DEFAULT_DIST_ID : AIM_DEFAULT_DIST_ID),
! 368: get_client_key(od),
! 369: hosttime,
! 370: !purple_strequal(encryption_type, OSCAR_NO_ENCRYPTION));
! 371: signature = generate_signature("GET", get_start_oscar_session_url(od),
! 372: query_string, session_key);
! 373: url = g_strdup_printf("%s?%s&sig_sha256=%s", get_start_oscar_session_url(od),
! 374: query_string, signature);
! 375: g_free(query_string);
! 376: g_free(signature);
! 377:
! 378: /* Make the request */
! 379: od->url_data = purple_util_fetch_url_request_len_with_account(account,
! 380: url, TRUE, NULL, FALSE, NULL, FALSE, -1,
! 381: start_oscar_session_cb, od);
! 382: g_free(url);
! 383: }
! 384:
! 385: /**
! 386: * This function parses the given response from a clientLogin request
! 387: * and extracts the useful information.
! 388: *
! 389: * @param gc The PurpleConnection. If the response data does
! 390: * not indicate then purple_connection_error_reason()
! 391: * will be called to close this connection.
! 392: * @param response The response data from the clientLogin request.
! 393: * @param response_len The length of the above response, or -1 if
! 394: * @response is NUL terminated.
! 395: * @param token If parsing was successful then this will be set to
! 396: * a newly allocated string containing the token. The
! 397: * caller should g_free this string when it is finished
! 398: * with it. On failure this value will be untouched.
! 399: * @param secret If parsing was successful then this will be set to
! 400: * a newly allocated string containing the secret. The
! 401: * caller should g_free this string when it is finished
! 402: * with it. On failure this value will be untouched.
! 403: * @param hosttime If parsing was successful then this will be set to
! 404: * the time on the OpenAuth Server in seconds since the
! 405: * Unix epoch. On failure this value will be untouched.
! 406: *
! 407: * @return TRUE if the request was successful and we were able to
! 408: * extract all info we need. Otherwise FALSE.
! 409: */
! 410: static gboolean parse_client_login_response(PurpleConnection *gc, const gchar *response, gsize response_len, char **token, char **secret, time_t *hosttime)
! 411: {
! 412: OscarData *od = purple_connection_get_protocol_data(gc);
! 413: xmlnode *response_node, *tmp_node, *data_node;
! 414: xmlnode *secret_node = NULL, *hosttime_node = NULL, *token_node = NULL, *tokena_node = NULL;
! 415: char *tmp;
! 416:
! 417: /* Parse the response as XML */
! 418: response_node = xmlnode_from_str(response, response_len);
! 419: if (response_node == NULL)
! 420: {
! 421: char *msg;
! 422: purple_debug_error("oscar", "clientLogin could not parse "
! 423: "response as XML: %s\n", response);
! 424: msg = generate_error_message(response_node,
! 425: get_client_login_url(od));
! 426: purple_connection_error_reason(gc,
! 427: PURPLE_CONNECTION_ERROR_NETWORK_ERROR, msg);
! 428: g_free(msg);
! 429: return FALSE;
! 430: }
! 431:
! 432: /* Grab the necessary XML nodes */
! 433: tmp_node = xmlnode_get_child(response_node, "statusCode");
! 434: data_node = xmlnode_get_child(response_node, "data");
! 435: if (data_node != NULL) {
! 436: secret_node = xmlnode_get_child(data_node, "sessionSecret");
! 437: hosttime_node = xmlnode_get_child(data_node, "hostTime");
! 438: token_node = xmlnode_get_child(data_node, "token");
! 439: if (token_node != NULL)
! 440: tokena_node = xmlnode_get_child(token_node, "a");
! 441: }
! 442:
! 443: /* Make sure we have a status code */
! 444: if (tmp_node == NULL || (tmp = xmlnode_get_data_unescaped(tmp_node)) == NULL) {
! 445: char *msg;
! 446: purple_debug_error("oscar", "clientLogin response was "
! 447: "missing statusCode: %s\n", response);
! 448: msg = generate_error_message(response_node,
! 449: get_client_login_url(od));
! 450: purple_connection_error_reason(gc,
! 451: PURPLE_CONNECTION_ERROR_NETWORK_ERROR, msg);
! 452: g_free(msg);
! 453: xmlnode_free(response_node);
! 454: return FALSE;
! 455: }
! 456:
! 457: /* Make sure the status code was 200 */
! 458: if (!purple_strequal(tmp, "200"))
! 459: {
! 460: int status_code, status_detail_code = 0;
! 461:
! 462: status_code = atoi(tmp);
! 463: g_free(tmp);
! 464: tmp_node = xmlnode_get_child(response_node, "statusDetailCode");
! 465: if (tmp_node != NULL && (tmp = xmlnode_get_data_unescaped(tmp_node)) != NULL) {
! 466: status_detail_code = atoi(tmp);
! 467: g_free(tmp);
! 468: }
! 469:
! 470: purple_debug_error("oscar", "clientLogin response statusCode "
! 471: "was %d (%d): %s\n", status_code, status_detail_code, response);
! 472:
! 473: if (status_code == 330 && status_detail_code == 3011) {
! 474: PurpleAccount *account = purple_connection_get_account(gc);
! 475: if (!purple_account_get_remember_password(account))
! 476: purple_account_set_password(account, NULL);
! 477: purple_connection_error_reason(gc,
! 478: PURPLE_CONNECTION_ERROR_AUTHENTICATION_FAILED,
! 479: _("Incorrect password"));
! 480: } else if (status_code == 330 && status_detail_code == 3015) {
! 481: purple_connection_error_reason(gc,
! 482: PURPLE_CONNECTION_ERROR_AUTHENTICATION_FAILED,
! 483: _("Server requested that you fill out a CAPTCHA in order to "
! 484: "sign in, but this client does not currently support CAPTCHAs."));
! 485: } else if (status_code == 401 && status_detail_code == 3019) {
! 486: purple_connection_error_reason(gc,
! 487: PURPLE_CONNECTION_ERROR_OTHER_ERROR,
! 488: _("AOL does not allow your screen name to authenticate here"));
! 489: } else {
! 490: char *msg;
! 491: msg = generate_error_message(response_node,
! 492: get_client_login_url(od));
! 493: purple_connection_error_reason(gc,
! 494: PURPLE_CONNECTION_ERROR_OTHER_ERROR, msg);
! 495: g_free(msg);
! 496: }
! 497:
! 498: xmlnode_free(response_node);
! 499: return FALSE;
! 500: }
! 501: g_free(tmp);
! 502:
! 503: /* Make sure we have everything else */
! 504: if (data_node == NULL || secret_node == NULL ||
! 505: token_node == NULL || tokena_node == NULL)
! 506: {
! 507: char *msg;
! 508: purple_debug_error("oscar", "clientLogin response was missing "
! 509: "something: %s\n", response);
! 510: msg = generate_error_message(response_node,
! 511: get_client_login_url(od));
! 512: purple_connection_error_reason(gc,
! 513: PURPLE_CONNECTION_ERROR_NETWORK_ERROR, msg);
! 514: g_free(msg);
! 515: xmlnode_free(response_node);
! 516: return FALSE;
! 517: }
! 518:
! 519: /* Extract data from the XML */
! 520: *token = xmlnode_get_data_unescaped(tokena_node);
! 521: *secret = xmlnode_get_data_unescaped(secret_node);
! 522: tmp = xmlnode_get_data_unescaped(hosttime_node);
! 523: if (*token == NULL || **token == '\0' || *secret == NULL || **secret == '\0' || tmp == NULL || *tmp == '\0')
! 524: {
! 525: char *msg;
! 526: purple_debug_error("oscar", "clientLogin response was missing "
! 527: "something: %s\n", response);
! 528: msg = generate_error_message(response_node,
! 529: get_client_login_url(od));
! 530: purple_connection_error_reason(gc,
! 531: PURPLE_CONNECTION_ERROR_NETWORK_ERROR, msg);
! 532: g_free(msg);
! 533: g_free(*token);
! 534: g_free(*secret);
! 535: g_free(tmp);
! 536: xmlnode_free(response_node);
! 537: return FALSE;
! 538: }
! 539:
! 540: *hosttime = strtol(tmp, NULL, 10);
! 541: g_free(tmp);
! 542:
! 543: xmlnode_free(response_node);
! 544:
! 545: return TRUE;
! 546: }
! 547:
! 548: static void client_login_cb(PurpleUtilFetchUrlData *url_data, gpointer user_data, const gchar *url_text, gsize len, const gchar *error_message)
! 549: {
! 550: OscarData *od;
! 551: PurpleConnection *gc;
! 552: char *token, *secret, *session_key;
! 553: time_t hosttime;
! 554: int password_len;
! 555: char *password;
! 556:
! 557: od = user_data;
! 558: gc = od->gc;
! 559:
! 560: od->url_data = NULL;
! 561:
! 562: if (error_message != NULL || len == 0) {
! 563: gchar *tmp;
! 564: tmp = g_strdup_printf(_("Error requesting %s: %s"),
! 565: get_client_login_url(od), error_message ?
! 566: error_message : _("The server returned an empty response"));
! 567: purple_connection_error_reason(gc,
! 568: PURPLE_CONNECTION_ERROR_NETWORK_ERROR, tmp);
! 569: g_free(tmp);
! 570: return;
! 571: }
! 572:
! 573: if (!parse_client_login_response(gc, url_text, len, &token, &secret, &hosttime))
! 574: return;
! 575:
! 576: password_len = strlen(purple_connection_get_password(gc));
! 577: password = g_strdup_printf("%.*s",
! 578: od->icq ? MIN(password_len, MAXICQPASSLEN) : password_len,
! 579: purple_connection_get_password(gc));
! 580: session_key = hmac_sha256(password, secret);
! 581: g_free(password);
! 582: g_free(secret);
! 583:
! 584: send_start_oscar_session(od, token, session_key, hosttime);
! 585:
! 586: g_free(token);
! 587: g_free(session_key);
! 588: }
! 589:
! 590: /**
! 591: * This function sends a request to
! 592: * https://api.screenname.aol.com/auth/clientLogin with the user's
! 593: * username and password and receives the user's session key, which is
! 594: * used to request a connection to the BOSS server.
! 595: */
! 596: void send_client_login(OscarData *od, const char *username)
! 597: {
! 598: PurpleConnection *gc;
! 599: GString *request, *body;
! 600: const char *tmp;
! 601: char *password;
! 602: int password_len;
! 603:
! 604: gc = od->gc;
! 605:
! 606: /*
! 607: * We truncate ICQ passwords to 8 characters. There is probably a
! 608: * limit for AIM passwords, too, but we really only need to do
! 609: * this for ICQ because older ICQ clients let you enter a password
! 610: * as long as you wanted and then they truncated it silently.
! 611: *
! 612: * And we can truncate based on the number of bytes and not the
! 613: * number of characters because passwords for AIM and ICQ are
! 614: * supposed to be plain ASCII (I don't know if this has always been
! 615: * the case, though).
! 616: */
! 617: tmp = purple_connection_get_password(gc);
! 618: password_len = strlen(tmp);
! 619: password = g_strndup(tmp, od->icq ? MIN(password_len, MAXICQPASSLEN) : password_len);
! 620:
! 621: /* Construct the body of the HTTP POST request */
! 622: body = g_string_new("");
! 623: g_string_append_printf(body, "devId=%s", get_client_key(od));
! 624: g_string_append_printf(body, "&f=xml");
! 625: g_string_append_printf(body, "&pwd=%s", purple_url_encode(password));
! 626: g_string_append_printf(body, "&s=%s", purple_url_encode(username));
! 627: g_free(password);
! 628:
! 629: /* Construct an HTTP POST request */
! 630: request = g_string_new("POST /auth/clientLogin HTTP/1.0\r\n"
! 631: "Connection: close\r\n"
! 632: "Accept: */*\r\n");
! 633:
! 634: /* Tack on the body */
! 635: g_string_append_printf(request, "Content-Type: application/x-www-form-urlencoded; charset=UTF-8\r\n");
! 636: g_string_append_printf(request, "Content-Length: %" G_GSIZE_FORMAT "\r\n\r\n", body->len);
! 637: g_string_append_len(request, body->str, body->len);
! 638: g_string_free(body, TRUE);
! 639:
! 640: /* Send the POST request */
! 641: od->url_data = purple_util_fetch_url_request_len_with_account(
! 642: purple_connection_get_account(gc), get_client_login_url(od),
! 643: TRUE, NULL, FALSE, request->str, FALSE, -1,
! 644: client_login_cb, od);
! 645: g_string_free(request, TRUE);
! 646: }
FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>