Annotation of ChivanetAimPidgin/oscarprpl/src/c/family_auth.c, revision 1.1

1.1     ! snw         1: /*
        !             2:  * Purple's oscar protocol plugin
        !             3:  * This file is the legal property of its developers.
        !             4:  * Please see the AUTHORS file distributed alongside this file.
        !             5:  *
        !             6:  * This library is free software; you can redistribute it and/or
        !             7:  * modify it under the terms of the GNU Lesser General Public
        !             8:  * License as published by the Free Software Foundation; either
        !             9:  * version 2 of the License, or (at your option) any later version.
        !            10:  *
        !            11:  * This library is distributed in the hope that it will be useful,
        !            12:  * but WITHOUT ANY WARRANTY; without even the implied warranty of
        !            13:  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
        !            14:  * Lesser General Public License for more details.
        !            15:  *
        !            16:  * You should have received a copy of the GNU Lesser General Public
        !            17:  * License along with this library; if not, write to the Free Software
        !            18:  * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA  02111-1301  USA
        !            19: */
        !            20: 
        !            21: /*
        !            22:  * Family 0x0017 - Authentication.
        !            23:  *
        !            24:  * Deals with the authorizer for SNAC-based login, and also old-style
        !            25:  * non-SNAC login.
        !            26:  *
        !            27:  */
        !            28: 
        !            29: #include "oscar.h"
        !            30: 
        !            31: #include <ctype.h>
        !            32: 
        !            33: #include "cipher.h"
        !            34: 
        !            35: /* #define USE_XOR_FOR_ICQ */
        !            36: 
        !            37: #ifdef USE_XOR_FOR_ICQ
        !            38: /**
        !            39:  * Encode a password using old XOR method
        !            40:  *
        !            41:  * This takes a const pointer to a (null terminated) string
        !            42:  * containing the unencoded password.  It also gets passed
        !            43:  * an already allocated buffer to store the encoded password.
        !            44:  * This buffer should be the exact length of the password without
        !            45:  * the null.  The encoded password buffer /is not %NULL terminated/.
        !            46:  *
        !            47:  * The encoding_table seems to be a fixed set of values.  We'll
        !            48:  * hope it doesn't change over time!
        !            49:  *
        !            50:  * This is only used for the XOR method, not the better MD5 method.
        !            51:  *
        !            52:  * @param password Incoming password.
        !            53:  * @param encoded Buffer to put encoded password.
        !            54:  */
        !            55: static int
        !            56: aim_encode_password(const char *password, guint8 *encoded)
        !            57: {
        !            58:        guint8 encoding_table[] = {
        !            59:                0xf3, 0x26, 0x81, 0xc4,
        !            60:                0x39, 0x86, 0xdb, 0x92,
        !            61:                0x71, 0xa3, 0xb9, 0xe6,
        !            62:                0x53, 0x7a, 0x95, 0x7c
        !            63:        };
        !            64:        unsigned int i;
        !            65: 
        !            66:        for (i = 0; i < strlen(password); i++)
        !            67:                encoded[i] = (password[i] ^ encoding_table[i]);
        !            68: 
        !            69:        return 0;
        !            70: }
        !            71: #endif
        !            72: 
        !            73: #ifdef USE_OLD_MD5
        !            74: static int
        !            75: aim_encode_password_md5(const char *password, size_t password_len, const char *key, guint8 *digest)
        !            76: {
        !            77:        PurpleCipherContext *context;
        !            78: 
        !            79:        context = purple_cipher_context_new_by_name("md5", NULL);
        !            80:        purple_cipher_context_append(context, (const guchar *)key, strlen(key));
        !            81:        purple_cipher_context_append(context, (const guchar *)password, password_len);
        !            82:        purple_cipher_context_append(context, (const guchar *)AIM_MD5_STRING, strlen(AIM_MD5_STRING));
        !            83:        purple_cipher_context_digest(context, 16, digest, NULL);
        !            84:        purple_cipher_context_destroy(context);
        !            85: 
        !            86:        return 0;
        !            87: }
        !            88: #else
        !            89: static int
        !            90: aim_encode_password_md5(const char *password, size_t password_len, const char *key, guint8 *digest)
        !            91: {
        !            92:        PurpleCipher *cipher;
        !            93:        PurpleCipherContext *context;
        !            94:        guchar passdigest[16];
        !            95: 
        !            96:        cipher = purple_ciphers_find_cipher("md5");
        !            97: 
        !            98:        context = purple_cipher_context_new(cipher, NULL);
        !            99:        purple_cipher_context_append(context, (const guchar *)password, password_len);
        !           100:        purple_cipher_context_digest(context, 16, passdigest, NULL);
        !           101:        purple_cipher_context_destroy(context);
        !           102: 
        !           103:        context = purple_cipher_context_new(cipher, NULL);
        !           104:        purple_cipher_context_append(context, (const guchar *)key, strlen(key));
        !           105:        purple_cipher_context_append(context, passdigest, 16);
        !           106:        purple_cipher_context_append(context, (const guchar *)AIM_MD5_STRING, strlen(AIM_MD5_STRING));
        !           107:        purple_cipher_context_digest(context, 16, digest, NULL);
        !           108:        purple_cipher_context_destroy(context);
        !           109: 
        !           110:        return 0;
        !           111: }
        !           112: #endif
        !           113: 
        !           114: #ifdef USE_XOR_FOR_ICQ
        !           115: /*
        !           116:  * Part two of the ICQ hack.  Note the ignoring of the key.
        !           117:  */
        !           118: static int
        !           119: goddamnicq2(OscarData *od, FlapConnection *conn, const char *sn, const char *password, ClientInfo *ci)
        !           120: {
        !           121:        FlapFrame *frame;
        !           122:        GSList *tlvlist = NULL;
        !           123:        int passwdlen;
        !           124:        guint8 *password_encoded;
        !           125:        guint32 distrib;
        !           126: 
        !           127:        passwdlen = strlen(password);
        !           128:        password_encoded = (guint8 *)g_malloc(passwdlen+1);
        !           129:        if (passwdlen > MAXICQPASSLEN)
        !           130:                passwdlen = MAXICQPASSLEN;
        !           131: 
        !           132:        frame = flap_frame_new(od, 0x01, 1152);
        !           133: 
        !           134:        aim_encode_password(password, password_encoded);
        !           135: 
        !           136:        distrib = oscar_get_ui_info_int(
        !           137:                        od->icq ? "prpl-icq-distid" : "prpl-aim-distid",
        !           138:                        ci->distrib);
        !           139: 
        !           140:        byte_stream_put32(&frame->data, 0x00000001); /* FLAP Version */
        !           141:        aim_tlvlist_add_str(&tlvlist, 0x0001, sn);
        !           142:        aim_tlvlist_add_raw(&tlvlist, 0x0002, passwdlen, password_encoded);
        !           143: 
        !           144:        if (ci->clientstring != NULL)
        !           145:                aim_tlvlist_add_str(&tlvlist, 0x0003, ci->clientstring);
        !           146:        else {
        !           147:                gchar *clientstring = oscar_get_clientstring();
        !           148:                aim_tlvlist_add_str(&tlvlist, 0x0003, clientstring);
        !           149:                g_free(clientstring);
        !           150:        }
        !           151:        aim_tlvlist_add_16(&tlvlist, 0x0016, (guint16)ci->clientid);
        !           152:        aim_tlvlist_add_16(&tlvlist, 0x0017, (guint16)ci->major);
        !           153:        aim_tlvlist_add_16(&tlvlist, 0x0018, (guint16)ci->minor);
        !           154:        aim_tlvlist_add_16(&tlvlist, 0x0019, (guint16)ci->point);
        !           155:        aim_tlvlist_add_16(&tlvlist, 0x001a, (guint16)ci->build);
        !           156:        aim_tlvlist_add_32(&tlvlist, 0x0014, distrib); /* distribution chan */
        !           157:        aim_tlvlist_add_str(&tlvlist, 0x000f, ci->lang);
        !           158:        aim_tlvlist_add_str(&tlvlist, 0x000e, ci->country);
        !           159: 
        !           160:        aim_tlvlist_write(&frame->data, &tlvlist);
        !           161: 
        !           162:        g_free(password_encoded);
        !           163:        aim_tlvlist_free(tlvlist);
        !           164: 
        !           165:        flap_connection_send(conn, frame);
        !           166: 
        !           167:        return 0;
        !           168: }
        !           169: #endif
        !           170: 
        !           171: /*
        !           172:  * Subtype 0x0002
        !           173:  *
        !           174:  * This is the initial login request packet.
        !           175:  *
        !           176:  * NOTE!! If you want/need to make use of the aim_sendmemblock() function,
        !           177:  * then the client information you send here must exactly match the
        !           178:  * executable that you're pulling the data from.
        !           179:  *
        !           180:  * Java AIM 1.1.19:
        !           181:  *   clientstring = "AOL Instant Messenger (TM) version 1.1.19 for Java built 03/24/98, freeMem 215871 totalMem 1048567, i686, Linus, #2 SMP Sun Feb 11 03:41:17 UTC 2001 2.4.1-ac9, IBM Corporation, 1.1.8, 45.3, Tue Mar 27 12:09:17 PST 2001"
        !           182:  *   clientid = 0x0001
        !           183:  *   major  = 0x0001
        !           184:  *   minor  = 0x0001
        !           185:  *   point = (not sent)
        !           186:  *   build  = 0x0013
        !           187:  *   unknown= (not sent)
        !           188:  *
        !           189:  * AIM for Linux 1.1.112:
        !           190:  *   clientstring = "AOL Instant Messenger (SM)"
        !           191:  *   clientid = 0x1d09
        !           192:  *   major  = 0x0001
        !           193:  *   minor  = 0x0001
        !           194:  *   point = 0x0001
        !           195:  *   build  = 0x0070
        !           196:  *   unknown= 0x0000008b
        !           197:  *   serverstore = 0x01
        !           198:  *
        !           199:  * @param truncate_pass Truncate the password to 8 characters.  This
        !           200:  *        usually happens for AOL accounts.  We are told that we
        !           201:  *        should truncate it if the 0x0017/0x0007 SNAC contains
        !           202:  *        a TLV of type 0x0026 with data 0x0000.
        !           203:  * @param allow_multiple_logins Allow multiple logins? If TRUE, the AIM
        !           204:  *        server will prompt the user when multiple logins occur. If
        !           205:  *        FALSE, existing connections (on other clients) will be
        !           206:  *        disconnected automatically as we connect.
        !           207:  */
        !           208: int
        !           209: aim_send_login(OscarData *od, FlapConnection *conn, const char *sn, const char *password, gboolean truncate_pass, ClientInfo *ci, const char *key, gboolean allow_multiple_logins)
        !           210: {
        !           211:        FlapFrame *frame;
        !           212:        GSList *tlvlist = NULL;
        !           213:        guint8 digest[16];
        !           214:        aim_snacid_t snacid;
        !           215:        size_t password_len;
        !           216:        guint32 distrib;
        !           217: 
        !           218:        if (!ci || !sn || !password)
        !           219:                return -EINVAL;
        !           220: 
        !           221: #ifdef USE_XOR_FOR_ICQ
        !           222:        /* If we're signing on an ICQ account then use the older, XOR login method */
        !           223:        if (aim_snvalid_icq(sn))
        !           224:                return goddamnicq2(od, conn, sn, password, ci);
        !           225: #endif
        !           226: 
        !           227:        frame = flap_frame_new(od, 0x02, 1152);
        !           228: 
        !           229:        snacid = aim_cachesnac(od, SNAC_FAMILY_AUTH, 0x0002, 0x0000, NULL, 0);
        !           230:        aim_putsnac(&frame->data, SNAC_FAMILY_AUTH, 0x0002, snacid);
        !           231: 
        !           232:        aim_tlvlist_add_str(&tlvlist, 0x0001, sn);
        !           233: 
        !           234:        /* Truncate ICQ and AOL passwords, if necessary */
        !           235:        password_len = strlen(password);
        !           236:        if (oscar_util_valid_name_icq(sn) && (password_len > MAXICQPASSLEN))
        !           237:                password_len = MAXICQPASSLEN;
        !           238:        else if (truncate_pass && password_len > 8)
        !           239:                password_len = 8;
        !           240: 
        !           241:        aim_encode_password_md5(password, password_len, key, digest);
        !           242: 
        !           243:        distrib = oscar_get_ui_info_int(
        !           244:                        od->icq ? "prpl-icq-distid" : "prpl-aim-distid",
        !           245:                        ci->distrib);
        !           246: 
        !           247:        aim_tlvlist_add_raw(&tlvlist, 0x0025, 16, digest);
        !           248: 
        !           249: #ifndef USE_OLD_MD5
        !           250:        aim_tlvlist_add_noval(&tlvlist, 0x004c);
        !           251: #endif
        !           252: 
        !           253:        if (ci->clientstring != NULL)
        !           254:                aim_tlvlist_add_str(&tlvlist, 0x0003, ci->clientstring);
        !           255:        else {
        !           256:                gchar *clientstring = oscar_get_clientstring();
        !           257:                aim_tlvlist_add_str(&tlvlist, 0x0003, clientstring);
        !           258:                g_free(clientstring);
        !           259:        }
        !           260:        aim_tlvlist_add_16(&tlvlist, 0x0016, (guint16)ci->clientid);
        !           261:        aim_tlvlist_add_16(&tlvlist, 0x0017, (guint16)ci->major);
        !           262:        aim_tlvlist_add_16(&tlvlist, 0x0018, (guint16)ci->minor);
        !           263:        aim_tlvlist_add_16(&tlvlist, 0x0019, (guint16)ci->point);
        !           264:        aim_tlvlist_add_16(&tlvlist, 0x001a, (guint16)ci->build);
        !           265:        aim_tlvlist_add_32(&tlvlist, 0x0014, distrib);
        !           266:        aim_tlvlist_add_str(&tlvlist, 0x000f, ci->lang);
        !           267:        aim_tlvlist_add_str(&tlvlist, 0x000e, ci->country);
        !           268: 
        !           269:        /*
        !           270:         * If set, old-fashioned buddy lists will not work. You will need
        !           271:         * to use SSI.
        !           272:         */
        !           273:        aim_tlvlist_add_8(&tlvlist, 0x004a, (allow_multiple_logins ? 0x01 : 0x03));
        !           274: 
        !           275:        aim_tlvlist_write(&frame->data, &tlvlist);
        !           276: 
        !           277:        aim_tlvlist_free(tlvlist);
        !           278: 
        !           279:        flap_connection_send(conn, frame);
        !           280: 
        !           281:        return 0;
        !           282: }
        !           283: 
        !           284: /*
        !           285:  * This is sent back as a general response to the login command.
        !           286:  * It can be either an error or a success, depending on the
        !           287:  * presence of certain TLVs.
        !           288:  *
        !           289:  * The client should check the value passed as errorcode. If
        !           290:  * its nonzero, there was an error.
        !           291:  */
        !           292: static int
        !           293: parse(OscarData *od, FlapConnection *conn, aim_module_t *mod, FlapFrame *frame, aim_modsnac_t *snac, ByteStream *bs)
        !           294: {
        !           295:        GSList *tlvlist;
        !           296:        aim_rxcallback_t userfunc;
        !           297:        struct aim_authresp_info *info;
        !           298:        int ret = 0;
        !           299: 
        !           300:        info = g_new0(struct aim_authresp_info, 1);
        !           301: 
        !           302:        /*
        !           303:         * Read block of TLVs.  All further data is derived
        !           304:         * from what is parsed here.
        !           305:         */
        !           306:        tlvlist = aim_tlvlist_read(bs);
        !           307: 
        !           308:        /*
        !           309:         * No matter what, we should have a username.
        !           310:         */
        !           311:        if (aim_tlv_gettlv(tlvlist, 0x0001, 1)) {
        !           312:                info->bn = aim_tlv_getstr(tlvlist, 0x0001, 1);
        !           313:                purple_connection_set_display_name(od->gc, info->bn);
        !           314:        }
        !           315: 
        !           316:        /*
        !           317:         * Check for an error code.  If so, we should also
        !           318:         * have an error url.
        !           319:         */
        !           320:        if (aim_tlv_gettlv(tlvlist, 0x0008, 1))
        !           321:                info->errorcode = aim_tlv_get16(tlvlist, 0x0008, 1);
        !           322:        if (aim_tlv_gettlv(tlvlist, 0x0004, 1))
        !           323:                info->errorurl = aim_tlv_getstr(tlvlist, 0x0004, 1);
        !           324: 
        !           325:        /*
        !           326:         * BOS server address.
        !           327:         */
        !           328:        if (aim_tlv_gettlv(tlvlist, 0x0005, 1))
        !           329:                info->bosip = aim_tlv_getstr(tlvlist, 0x0005, 1);
        !           330: 
        !           331:        /*
        !           332:         * Authorization cookie.
        !           333:         */
        !           334:        if (aim_tlv_gettlv(tlvlist, 0x0006, 1)) {
        !           335:                aim_tlv_t *tmptlv;
        !           336: 
        !           337:                tmptlv = aim_tlv_gettlv(tlvlist, 0x0006, 1);
        !           338:                if (tmptlv != NULL)
        !           339:                {
        !           340:                        info->cookielen = tmptlv->length;
        !           341:                        info->cookie = tmptlv->value;
        !           342:                }
        !           343:        }
        !           344: 
        !           345:        /*
        !           346:         * The email address attached to this account
        !           347:         *   Not available for ICQ or @mac.com logins.
        !           348:         *   If you receive this TLV, then you are allowed to use
        !           349:         *   family 0x0018 to check the status of your email.
        !           350:         * XXX - Not really true!
        !           351:         */
        !           352:        if (aim_tlv_gettlv(tlvlist, 0x0011, 1))
        !           353:                info->email = aim_tlv_getstr(tlvlist, 0x0011, 1);
        !           354: 
        !           355:        /*
        !           356:         * The registration status.  (Not real sure what it means.)
        !           357:         *   Not available for ICQ or @mac.com logins.
        !           358:         *
        !           359:         *   1 = No disclosure
        !           360:         *   2 = Limited disclosure
        !           361:         *   3 = Full disclosure
        !           362:         *
        !           363:         * This has to do with whether your email address is available
        !           364:         * to other users or not.  AFAIK, this feature is no longer used.
        !           365:         *
        !           366:         * Means you can use the admin family? (0x0007)
        !           367:         *
        !           368:         */
        !           369:        if (aim_tlv_gettlv(tlvlist, 0x0013, 1))
        !           370:                info->regstatus = aim_tlv_get16(tlvlist, 0x0013, 1);
        !           371: 
        !           372:        if (aim_tlv_gettlv(tlvlist, 0x0040, 1))
        !           373:                info->latestbeta.build = aim_tlv_get32(tlvlist, 0x0040, 1);
        !           374:        if (aim_tlv_gettlv(tlvlist, 0x0041, 1))
        !           375:                info->latestbeta.url = aim_tlv_getstr(tlvlist, 0x0041, 1);
        !           376:        if (aim_tlv_gettlv(tlvlist, 0x0042, 1))
        !           377:                info->latestbeta.info = aim_tlv_getstr(tlvlist, 0x0042, 1);
        !           378:        if (aim_tlv_gettlv(tlvlist, 0x0043, 1))
        !           379:                info->latestbeta.name = aim_tlv_getstr(tlvlist, 0x0043, 1);
        !           380: 
        !           381:        if (aim_tlv_gettlv(tlvlist, 0x0044, 1))
        !           382:                info->latestrelease.build = aim_tlv_get32(tlvlist, 0x0044, 1);
        !           383:        if (aim_tlv_gettlv(tlvlist, 0x0045, 1))
        !           384:                info->latestrelease.url = aim_tlv_getstr(tlvlist, 0x0045, 1);
        !           385:        if (aim_tlv_gettlv(tlvlist, 0x0046, 1))
        !           386:                info->latestrelease.info = aim_tlv_getstr(tlvlist, 0x0046, 1);
        !           387:        if (aim_tlv_gettlv(tlvlist, 0x0047, 1))
        !           388:                info->latestrelease.name = aim_tlv_getstr(tlvlist, 0x0047, 1);
        !           389: 
        !           390:        /*
        !           391:         * URL to change password.
        !           392:         */
        !           393:        if (aim_tlv_gettlv(tlvlist, 0x0054, 1))
        !           394:                info->chpassurl = aim_tlv_getstr(tlvlist, 0x0054, 1);
        !           395: 
        !           396:        od->authinfo = info;
        !           397: 
        !           398:        if ((userfunc = aim_callhandler(od, snac ? snac->family : SNAC_FAMILY_AUTH, snac ? snac->subtype : 0x0003)))
        !           399:                ret = userfunc(od, conn, frame, info);
        !           400: 
        !           401:        aim_tlvlist_free(tlvlist);
        !           402: 
        !           403:        return ret;
        !           404: }
        !           405: 
        !           406: #ifdef USE_XOR_FOR_ICQ
        !           407: /*
        !           408:  * Subtype 0x0007 (kind of) - Send a fake type 0x0007 SNAC to the client
        !           409:  *
        !           410:  * This is a bit confusing.
        !           411:  *
        !           412:  * Normal SNAC login goes like this:
        !           413:  *   - connect
        !           414:  *   - server sends flap version
        !           415:  *   - client sends flap version
        !           416:  *   - client sends username (17/6)
        !           417:  *   - server sends hash key (17/7)
        !           418:  *   - client sends auth request (17/2 -- aim_send_login)
        !           419:  *   - server yells
        !           420:  *
        !           421:  * XOR login (for ICQ) goes like this:
        !           422:  *   - connect
        !           423:  *   - server sends flap version
        !           424:  *   - client sends auth request which contains flap version (aim_send_login)
        !           425:  *   - server yells
        !           426:  *
        !           427:  * For the client API, we make them implement the most complicated version,
        !           428:  * and for the simpler version, we fake it and make it look like the more
        !           429:  * complicated process.
        !           430:  *
        !           431:  * This is done by giving the client a faked key, just so we can convince
        !           432:  * them to call aim_send_login right away, which will detect the session
        !           433:  * flag that says this is XOR login and ignore the key, sending an ICQ
        !           434:  * login request instead of the normal SNAC one.
        !           435:  *
        !           436:  * As soon as AOL makes ICQ log in the same way as AIM, this is /gone/.
        !           437:  */
        !           438: static int
        !           439: goddamnicq(OscarData *od, FlapConnection *conn, const char *sn)
        !           440: {
        !           441:        FlapFrame frame;
        !           442:        aim_rxcallback_t userfunc;
        !           443: 
        !           444:        if ((userfunc = aim_callhandler(od, SNAC_FAMILY_AUTH, 0x0007)))
        !           445:                userfunc(od, conn, &frame, "");
        !           446: 
        !           447:        return 0;
        !           448: }
        !           449: #endif
        !           450: 
        !           451: /*
        !           452:  * Subtype 0x0006
        !           453:  *
        !           454:  * In AIM 3.5 protocol, the first stage of login is to request login from the
        !           455:  * Authorizer, passing it the username for verification.  If the name is
        !           456:  * invalid, a 0017/0003 is spit back, with the standard error contents.  If
        !           457:  * valid, a 0017/0007 comes back, which is the signal to send it the main
        !           458:  * login command (0017/0002).
        !           459:  *
        !           460:  */
        !           461: int
        !           462: aim_request_login(OscarData *od, FlapConnection *conn, const char *sn)
        !           463: {
        !           464:        FlapFrame *frame;
        !           465:        aim_snacid_t snacid;
        !           466:        GSList *tlvlist = NULL;
        !           467: 
        !           468:        if (!od || !conn || !sn)
        !           469:                return -EINVAL;
        !           470: 
        !           471: #ifdef USE_XOR_FOR_ICQ
        !           472:        if (aim_snvalid_icq(sn))
        !           473:                return goddamnicq(od, conn, sn);
        !           474: #endif
        !           475: 
        !           476:        frame = flap_frame_new(od, 0x02, 10+2+2+strlen(sn)+8);
        !           477: 
        !           478:        snacid = aim_cachesnac(od, SNAC_FAMILY_AUTH, 0x0006, 0x0000, NULL, 0);
        !           479:        aim_putsnac(&frame->data, SNAC_FAMILY_AUTH, 0x0006, snacid);
        !           480: 
        !           481:        aim_tlvlist_add_str(&tlvlist, 0x0001, sn);
        !           482: 
        !           483:        /* Tell the server we support SecurID logins. */
        !           484:        aim_tlvlist_add_noval(&tlvlist, 0x004b);
        !           485: 
        !           486:        /* Unknown.  Sent in recent WinAIM clients.*/
        !           487:        aim_tlvlist_add_noval(&tlvlist, 0x005a);
        !           488: 
        !           489:        aim_tlvlist_write(&frame->data, &tlvlist);
        !           490:        aim_tlvlist_free(tlvlist);
        !           491: 
        !           492:        flap_connection_send(conn, frame);
        !           493: 
        !           494:        return 0;
        !           495: }
        !           496: 
        !           497: /*
        !           498:  * Subtype 0x0007
        !           499:  *
        !           500:  * Middle handler for 0017/0007 SNACs.  Contains the auth key prefixed
        !           501:  * by only its length in a two byte word.
        !           502:  *
        !           503:  * Calls the client, which should then use the value to call aim_send_login.
        !           504:  *
        !           505:  */
        !           506: static int
        !           507: keyparse(OscarData *od, FlapConnection *conn, aim_module_t *mod, FlapFrame *frame, aim_modsnac_t *snac, ByteStream *bs)
        !           508: {
        !           509:        int keylen, ret = 1;
        !           510:        aim_rxcallback_t userfunc;
        !           511:        char *keystr;
        !           512:        GSList *tlvlist;
        !           513:        gboolean truncate_pass;
        !           514: 
        !           515:        keylen = byte_stream_get16(bs);
        !           516:        keystr = byte_stream_getstr(bs, keylen);
        !           517:        tlvlist = aim_tlvlist_read(bs);
        !           518: 
        !           519:        /*
        !           520:         * If the truncate_pass TLV exists then we should truncate the
        !           521:         * user's password to 8 characters.  This flag is sent to us
        !           522:         * when logging in with an AOL user's username.
        !           523:         */
        !           524:        truncate_pass = aim_tlv_gettlv(tlvlist, 0x0026, 1) != NULL;
        !           525: 
        !           526:        /* XXX - When GiantGrayPanda signed on AIM I got a thing asking me to register
        !           527:         * for the netscape network.  This SNAC had a type 0x0058 TLV with length 10.
        !           528:         * Data is 0x0007 0004 3e19 ae1e 0006 0004 0000 0005 */
        !           529: 
        !           530:        if ((userfunc = aim_callhandler(od, snac->family, snac->subtype)))
        !           531:                ret = userfunc(od, conn, frame, keystr, (int)truncate_pass);
        !           532: 
        !           533:        g_free(keystr);
        !           534:        aim_tlvlist_free(tlvlist);
        !           535: 
        !           536:        return ret;
        !           537: }
        !           538: 
        !           539: /**
        !           540:  * Subtype 0x000a
        !           541:  *
        !           542:  * Receive SecurID request.
        !           543:  */
        !           544: static int
        !           545: got_securid_request(OscarData *od, FlapConnection *conn, aim_module_t *mod, FlapFrame *frame, aim_modsnac_t *snac, ByteStream *bs)
        !           546: {
        !           547:        int ret = 0;
        !           548:        aim_rxcallback_t userfunc;
        !           549: 
        !           550:        if ((userfunc = aim_callhandler(od, snac->family, snac->subtype)))
        !           551:                ret = userfunc(od, conn, frame);
        !           552: 
        !           553:        return ret;
        !           554: }
        !           555: 
        !           556: /**
        !           557:  * Subtype 0x000b
        !           558:  *
        !           559:  * Send SecurID response.
        !           560:  */
        !           561: int
        !           562: aim_auth_securid_send(OscarData *od, const char *securid)
        !           563: {
        !           564:        FlapConnection *conn;
        !           565:        FlapFrame *frame;
        !           566:        int len;
        !           567: 
        !           568:        if (!od || !(conn = flap_connection_getbytype_all(od, SNAC_FAMILY_AUTH)) || !securid)
        !           569:                return -EINVAL;
        !           570: 
        !           571:        len = strlen(securid);
        !           572: 
        !           573:        frame = flap_frame_new(od, 0x02, 10+2+len);
        !           574: 
        !           575:        /* aim_snacid_t snacid = */ aim_cachesnac(od, SNAC_FAMILY_AUTH, SNAC_SUBTYPE_AUTH_SECURID_RESPONSE, 0x0000, NULL, 0);
        !           576:        aim_putsnac(&frame->data, SNAC_FAMILY_AUTH, SNAC_SUBTYPE_AUTH_SECURID_RESPONSE, 0);
        !           577: 
        !           578:        byte_stream_put16(&frame->data, len);
        !           579:        byte_stream_putstr(&frame->data, securid);
        !           580: 
        !           581:        flap_connection_send(conn, frame);
        !           582: 
        !           583:        return 0;
        !           584: }
        !           585: 
        !           586: static void
        !           587: auth_shutdown(OscarData *od, aim_module_t *mod)
        !           588: {
        !           589:        if (od->authinfo != NULL)
        !           590:        {
        !           591:                g_free(od->authinfo->bn);
        !           592:                g_free(od->authinfo->bosip);
        !           593:                g_free(od->authinfo->errorurl);
        !           594:                g_free(od->authinfo->email);
        !           595:                g_free(od->authinfo->chpassurl);
        !           596:                g_free(od->authinfo->latestrelease.name);
        !           597:                g_free(od->authinfo->latestrelease.url);
        !           598:                g_free(od->authinfo->latestrelease.info);
        !           599:                g_free(od->authinfo->latestbeta.name);
        !           600:                g_free(od->authinfo->latestbeta.url);
        !           601:                g_free(od->authinfo->latestbeta.info);
        !           602:                g_free(od->authinfo);
        !           603:        }
        !           604: }
        !           605: 
        !           606: static int
        !           607: snachandler(OscarData *od, FlapConnection *conn, aim_module_t *mod, FlapFrame *frame, aim_modsnac_t *snac, ByteStream *bs)
        !           608: {
        !           609:        if (snac->subtype == 0x0003)
        !           610:                return parse(od, conn, mod, frame, snac, bs);
        !           611:        else if (snac->subtype == 0x0007)
        !           612:                return keyparse(od, conn, mod, frame, snac, bs);
        !           613:        else if (snac->subtype == 0x000a)
        !           614:                return got_securid_request(od, conn, mod, frame, snac, bs);
        !           615: 
        !           616:        return 0;
        !           617: }
        !           618: 
        !           619: int
        !           620: auth_modfirst(OscarData *od, aim_module_t *mod)
        !           621: {
        !           622:        mod->family = SNAC_FAMILY_AUTH;
        !           623:        mod->version = 0x0000;
        !           624:        mod->flags = 0;
        !           625:        strncpy(mod->name, "auth", sizeof(mod->name));
        !           626:        mod->snachandler = snachandler;
        !           627:        mod->shutdown = auth_shutdown;
        !           628: 
        !           629:        return 0;
        !           630: }

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>