Annotation of ChivanetAimPidgin/oscarprpl/src/c/peer.c, revision 1.1.1.1

1.1       snw         1: /*
                      2:  * Purple's oscar protocol plugin
                      3:  * This file is the legal property of its developers.
                      4:  * Please see the AUTHORS file distributed alongside this file.
                      5:  *
                      6:  * This library is free software; you can redistribute it and/or
                      7:  * modify it under the terms of the GNU Lesser General Public
                      8:  * License as published by the Free Software Foundation; either
                      9:  * version 2 of the License, or (at your option) any later version.
                     10:  *
                     11:  * This library is distributed in the hope that it will be useful,
                     12:  * but WITHOUT ANY WARRANTY; without even the implied warranty of
                     13:  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
                     14:  * Lesser General Public License for more details.
                     15:  *
                     16:  * You should have received a copy of the GNU Lesser General Public
                     17:  * License along with this library; if not, write to the Free Software
                     18:  * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA  02111-1301  USA
                     19: */
                     20: 
                     21: /*
                     22:  * Functions dealing with peer connections.  This includes the code
                     23:  * used to establish a peer connection for both Oscar File transfer
                     24:  * (OFT) and Oscar Direct Connect (ODC).  (ODC is also referred to
                     25:  * as DirectIM and IM Image.)
                     26:  */
                     27: 
                     28: #ifdef HAVE_CONFIG_H
                     29: #include  <config.h>
                     30: #endif
                     31: 
                     32: /* From the oscar PRPL */
                     33: #include "oscar.h"
                     34: #include "peer.h"
                     35: 
                     36: /* From Purple */
                     37: #include "conversation.h"
                     38: #include "ft.h"
                     39: #include "network.h"
                     40: #include "notify.h"
                     41: #include "request.h"
                     42: #include "util.h"
                     43: 
                     44: #ifndef _WIN32
                     45: #include <stdio.h>
                     46: #include <netdb.h>
                     47: #include <sys/socket.h>
                     48: #include <netinet/in.h>
                     49: #include <arpa/inet.h> /* for inet_ntoa */
                     50: #include <limits.h> /* for UINT_MAX */
                     51: #endif
                     52: 
                     53: #ifdef _WIN32
                     54: #include "win32dep.h"
                     55: #endif
                     56: 
                     57: /*
                     58:  * I really want to switch all our networking code to using IPv6 only,
                     59:  * but that really isn't a good idea at all.  Evan S. of Adium says
                     60:  * OS X sets all connections as "AF_INET6/PF_INET6," even if there is
                     61:  * nothing inherently IPv6 about them.  And I feel like Linux kernel
                     62:  * 2.6.5 is doing the same thing.  So we REALLY should accept
                     63:  * connections if they're showing up as IPv6.  Old OSes (Solaris?)
                     64:  * that might not have full IPv6 support yet will fail if we try
                     65:  * to use PF_INET6 but it isn't defined.  --Mark Doliner
                     66:  */
                     67: #ifndef PF_INET6
                     68: #define PF_INET6 PF_INET
                     69: #endif
                     70: 
                     71: PeerConnection *
                     72: peer_connection_find_by_type(OscarData *od, const char *bn, guint64 type)
                     73: {
                     74:        GSList *cur;
                     75:        PeerConnection *conn;
                     76: 
                     77:        for (cur = od->peer_connections; cur != NULL; cur = cur->next)
                     78:        {
                     79:                conn = cur->data;
                     80:                if ((conn->type == type) && !oscar_util_name_compare(conn->bn, bn))
                     81:                        return conn;
                     82:        }
                     83: 
                     84:        return NULL;
                     85: }
                     86: 
                     87: /**
                     88:  * @param cookie This must be exactly 8 characters.
                     89:  */
                     90: PeerConnection *
                     91: peer_connection_find_by_cookie(OscarData *od, const char *bn, const guchar *cookie)
                     92: {
                     93:        GSList *cur;
                     94:        PeerConnection *conn;
                     95: 
                     96:        for (cur = od->peer_connections; cur != NULL; cur = cur->next)
                     97:        {
                     98:                conn = cur->data;
                     99:                if (!memcmp(conn->cookie, cookie, 8) && !oscar_util_name_compare(conn->bn, bn))
                    100:                        return conn;
                    101:        }
                    102: 
                    103:        return NULL;
                    104: }
                    105: 
                    106: PeerConnection *
                    107: peer_connection_new(OscarData *od, guint64 type, const char *bn)
                    108: {
                    109:        PeerConnection *conn;
                    110:        PurpleAccount *account;
                    111: 
                    112:        account = purple_connection_get_account(od->gc);
                    113: 
                    114:        conn = g_new0(PeerConnection, 1);
                    115:        conn->od = od;
                    116:        conn->type = type;
                    117:        conn->bn = g_strdup(bn);
                    118:        conn->buffer_outgoing = purple_circ_buffer_new(0);
                    119:        conn->listenerfd = -1;
                    120:        conn->fd = -1;
                    121:        conn->lastactivity = time(NULL);
                    122:        conn->use_proxy |= purple_account_get_bool(account, "always_use_rv_proxy", FALSE);
                    123: 
                    124:        if (type == OSCAR_CAPABILITY_DIRECTIM)
                    125:                memcpy(conn->magic, "ODC2", 4);
                    126:        else if (type == OSCAR_CAPABILITY_SENDFILE)
                    127:                memcpy(conn->magic, "OFT2", 4);
                    128: 
                    129:        od->peer_connections = g_slist_prepend(od->peer_connections, conn);
                    130: 
                    131:        return conn;
                    132: }
                    133: 
                    134: static void
                    135: peer_connection_close(PeerConnection *conn)
                    136: {
                    137:        if (conn->type == OSCAR_CAPABILITY_DIRECTIM)
                    138:                peer_odc_close(conn);
                    139:        else if (conn->type == OSCAR_CAPABILITY_SENDFILE)
                    140:                peer_oft_close(conn);
                    141: 
                    142:        if (conn->verified_connect_data != NULL)
                    143:        {
                    144:                purple_proxy_connect_cancel(conn->verified_connect_data);
                    145:                conn->verified_connect_data = NULL;
                    146:        }
                    147: 
                    148:        if (conn->client_connect_data != NULL)
                    149:        {
                    150:                purple_proxy_connect_cancel(conn->client_connect_data);
                    151:                conn->client_connect_data = NULL;
                    152:        }
                    153: 
                    154:        if (conn->listen_data != NULL)
                    155:        {
                    156:                purple_network_listen_cancel(conn->listen_data);
                    157:                conn->listen_data = NULL;
                    158:        }
                    159: 
                    160:        if (conn->connect_timeout_timer != 0)
                    161:        {
                    162:                purple_timeout_remove(conn->connect_timeout_timer);
                    163:                conn->connect_timeout_timer = 0;
                    164:        }
                    165: 
                    166:        if (conn->watcher_incoming != 0)
                    167:        {
                    168:                purple_input_remove(conn->watcher_incoming);
                    169:                conn->watcher_incoming = 0;
                    170:        }
                    171:        if (conn->watcher_outgoing != 0)
                    172:        {
                    173:                purple_input_remove(conn->watcher_outgoing);
                    174:                conn->watcher_outgoing = 0;
                    175:        }
                    176:        if (conn->listenerfd >= 0)
                    177:        {
                    178:                close(conn->listenerfd);
                    179:                conn->listenerfd = -1;
                    180:        }
                    181:        if (conn->fd >= 0)
                    182:        {
                    183:                close(conn->fd);
                    184:                conn->fd = -1;
                    185:        }
                    186: 
                    187:        g_free(conn->buffer_incoming.data);
                    188:        conn->buffer_incoming.data = NULL;
                    189:        conn->buffer_incoming.len = 0;
                    190:        conn->buffer_incoming.offset = 0;
                    191: 
                    192:        purple_circ_buffer_destroy(conn->buffer_outgoing);
                    193:        conn->buffer_outgoing = purple_circ_buffer_new(0);
                    194: 
                    195:        conn->flags &= ~PEER_CONNECTION_FLAG_IS_INCOMING;
                    196: }
                    197: 
                    198: static gboolean
                    199: peer_connection_destroy_cb(gpointer data)
                    200: {
                    201:        PeerConnection *conn;
                    202: 
                    203:        conn = data;
                    204: 
                    205:        purple_request_close_with_handle(conn);
                    206: 
                    207:        peer_connection_close(conn);
                    208: 
                    209:        if (conn->checksum_data != NULL)
                    210:                peer_oft_checksum_destroy(conn->checksum_data);
                    211: 
                    212:        if (conn->xfer != NULL)
                    213:        {
                    214:                PurpleXferStatusType status;
                    215:                conn->xfer->data = NULL;
                    216:                status = purple_xfer_get_status(conn->xfer);
                    217:                if ((status != PURPLE_XFER_STATUS_DONE) &&
                    218:                        (status != PURPLE_XFER_STATUS_CANCEL_LOCAL) &&
                    219:                        (status != PURPLE_XFER_STATUS_CANCEL_REMOTE))
                    220:                {
                    221:                        if ((conn->disconnect_reason == OSCAR_DISCONNECT_REMOTE_CLOSED) ||
                    222:                                (conn->disconnect_reason == OSCAR_DISCONNECT_REMOTE_REFUSED))
                    223:                                purple_xfer_cancel_remote(conn->xfer);
                    224:                        else
                    225:                                purple_xfer_cancel_local(conn->xfer);
                    226:                }
                    227:                purple_xfer_unref(conn->xfer);
                    228:                conn->xfer = NULL;
                    229:        }
                    230: 
                    231:        g_free(conn->bn);
                    232:        g_free(conn->error_message);
                    233:        g_free(conn->proxyip);
                    234:        g_free(conn->clientip);
                    235:        g_free(conn->verifiedip);
                    236:        g_free(conn->xferdata.name);
                    237:        purple_circ_buffer_destroy(conn->buffer_outgoing);
                    238: 
                    239:        conn->od->peer_connections = g_slist_remove(conn->od->peer_connections, conn);
                    240: 
                    241:        g_free(conn);
                    242: 
                    243:        return FALSE;
                    244: }
                    245: 
                    246: void
                    247: peer_connection_destroy(PeerConnection *conn, OscarDisconnectReason reason, const gchar *error_message)
                    248: {
                    249:        if (conn->destroy_timeout != 0)
                    250:                purple_timeout_remove(conn->destroy_timeout);
                    251:        conn->disconnect_reason = reason;
                    252:        g_free(conn->error_message);
                    253:        conn->error_message = g_strdup(error_message);
                    254:        peer_connection_destroy_cb(conn);
                    255: }
                    256: 
                    257: void
                    258: peer_connection_schedule_destroy(PeerConnection *conn, OscarDisconnectReason reason, const gchar *error_message)
                    259: {
                    260:        if (conn->destroy_timeout != 0)
                    261:                /* Already taken care of */
                    262:                return;
                    263: 
                    264:        purple_debug_info("oscar", "Scheduling destruction of peer connection\n");
                    265:        conn->disconnect_reason = reason;
                    266:        g_free(conn->error_message);
                    267:        conn->error_message = g_strdup(error_message);
                    268:        conn->destroy_timeout = purple_timeout_add(0, peer_connection_destroy_cb, conn);
                    269: }
                    270: 
                    271: /*******************************************************************/
                    272: /* Begin code for receiving data on a peer connection                */
                    273: /*******************************************************************/
                    274: 
                    275: /**
                    276:  * This should be used to read ODC and OFT framing info.  It should
                    277:  * NOT be used to read the payload sent across the connection (IMs,
                    278:  * file data, etc), and it should NOT be used to read proxy negotiation
                    279:  * headers.
                    280:  *
                    281:  * Unlike flap_connection_recv_cb(), this only reads one frame at a
                    282:  * time.  This is done so that the watcher can be changed during the
                    283:  * handling of the frame.  If the watcher is changed then this
                    284:  * function will not read in any more data.  This happens when
                    285:  * reading the payload of a direct IM frame, or when we're
                    286:  * receiving a file from the remote user.  Once the data has been
                    287:  * read, the watcher will be switched back to this function to
                    288:  * continue reading the next frame.
                    289:  */
                    290: void
                    291: peer_connection_recv_cb(gpointer data, gint source, PurpleInputCondition cond)
                    292: {
                    293:        PeerConnection *conn;
                    294:        gssize read;
                    295: 
                    296:        conn = data;
                    297: 
                    298:        /* Start reading a new ODC/OFT frame */
                    299:        if (conn->buffer_incoming.data == NULL)
                    300:        {
                    301:                /* Read the first 6 bytes (magic string and frame length) */
                    302:                read = recv(conn->fd, conn->header + conn->header_received,
                    303:                                6 - conn->header_received, 0);
                    304: 
                    305:                /* Check if the remote user closed the connection */
                    306:                if (read == 0)
                    307:                {
                    308:                        peer_connection_destroy(conn, OSCAR_DISCONNECT_REMOTE_CLOSED, NULL);
                    309:                        return;
                    310:                }
                    311: 
                    312:                /* If there was an error then close the connection */
                    313:                if (read < 0)
                    314:                {
                    315:                        if ((errno == EAGAIN) || (errno == EWOULDBLOCK))
                    316:                                /* No worries */
                    317:                                return;
                    318: 
                    319:                        peer_connection_destroy(conn,
                    320:                                        OSCAR_DISCONNECT_LOST_CONNECTION, g_strerror(errno));
                    321:                        return;
                    322:                }
                    323: 
                    324:                conn->lastactivity = time(NULL);
                    325: 
                    326:                /* If we don't even have the first 6 bytes then do nothing */
                    327:                conn->header_received += read;
                    328:                if (conn->header_received < 6)
                    329:                        return;
                    330: 
                    331:                /* All ODC/OFT frames must start with a magic string */
                    332:                if (memcmp(conn->magic, conn->header, 4))
                    333:                {
                    334:                        purple_debug_warning("oscar", "Expecting magic string to "
                    335:                                "be %c%c%c%c but received magic string %c%c%c%c.  "
                    336:                                "Closing connection.\n",
                    337:                                conn->magic[0], conn->magic[1], conn->magic[2],
                    338:                                conn->magic[3], conn->header[0], conn->header[1],
                    339:                                conn->header[2], conn->header[3]);
                    340:                        peer_connection_destroy(conn, OSCAR_DISCONNECT_INVALID_DATA, NULL);
                    341:                        return;
                    342:                }
                    343: 
                    344:                /* Initialize a new temporary ByteStream for incoming data */
                    345:                conn->buffer_incoming.len = aimutil_get16(&conn->header[4]) - 6;
                    346:                conn->buffer_incoming.data = g_new(guint8, conn->buffer_incoming.len);
                    347:                conn->buffer_incoming.offset = 0;
                    348:        }
                    349: 
                    350:        /* Read data into the temporary buffer until it is complete */
                    351:        read = recv(conn->fd,
                    352:                                &conn->buffer_incoming.data[conn->buffer_incoming.offset],
                    353:                                conn->buffer_incoming.len - conn->buffer_incoming.offset,
                    354:                                0);
                    355: 
                    356:        /* Check if the remote user closed the connection */
                    357:        if (read == 0)
                    358:        {
                    359:                peer_connection_destroy(conn, OSCAR_DISCONNECT_REMOTE_CLOSED, NULL);
                    360:                return;
                    361:        }
                    362: 
                    363:        if (read < 0)
                    364:        {
                    365:                if ((errno == EAGAIN) || (errno == EWOULDBLOCK))
                    366:                        /* No worries */
                    367:                        return;
                    368: 
                    369:                peer_connection_destroy(conn,
                    370:                                OSCAR_DISCONNECT_LOST_CONNECTION, g_strerror(errno));
                    371:                return;
                    372:        }
                    373: 
                    374:        conn->lastactivity = time(NULL);
                    375:        conn->buffer_incoming.offset += read;
                    376:        if (conn->buffer_incoming.offset < conn->buffer_incoming.len)
                    377:                /* Waiting for more data to arrive */
                    378:                return;
                    379: 
                    380:        /* We have a complete ODC/OFT frame!  Handle it and continue reading */
                    381:        byte_stream_rewind(&conn->buffer_incoming);
                    382:        if (conn->type == OSCAR_CAPABILITY_DIRECTIM)
                    383:        {
                    384:                peer_odc_recv_frame(conn, &conn->buffer_incoming);
                    385:        }
                    386:        else if (conn->type == OSCAR_CAPABILITY_SENDFILE)
                    387:        {
                    388:                peer_oft_recv_frame(conn, &conn->buffer_incoming);
                    389:        }
                    390: 
                    391:        g_free(conn->buffer_incoming.data);
                    392:        conn->buffer_incoming.data = NULL;
                    393: 
                    394:        conn->header_received = 0;
                    395: }
                    396: 
                    397: /*******************************************************************/
                    398: /* End code for receiving data on a peer connection                */
                    399: /*******************************************************************/
                    400: 
                    401: /*******************************************************************/
                    402: /* Begin code for sending data on a peer connection                */
                    403: /*******************************************************************/
                    404: 
                    405: static void
                    406: send_cb(gpointer data, gint source, PurpleInputCondition cond)
                    407: {
                    408:        PeerConnection *conn;
                    409:        gsize writelen;
                    410:        gssize wrotelen;
                    411: 
                    412:        conn = data;
                    413:        writelen = purple_circ_buffer_get_max_read(conn->buffer_outgoing);
                    414: 
                    415:        if (writelen == 0)
                    416:        {
                    417:                purple_input_remove(conn->watcher_outgoing);
                    418:                conn->watcher_outgoing = 0;
                    419:                /*
                    420:                 * The buffer is currently empty, so reset the current input
                    421:                 * and output positions to the start of the buffer.  We do
                    422:                 * this so that the next chunk of data that we put into the
                    423:                 * buffer can be read back out of the buffer in one fell swoop.
                    424:                 * Otherwise it gets fragmented and we have to read from the
                    425:                 * second half of the buffer than go back and read the rest of
                    426:                 * the chunk from the first half.
                    427:                 *
                    428:                 * We're using TCP, which is a stream based protocol, so this
                    429:                 * isn't supposed to matter.  However, experience has shown
                    430:                 * that at least the proxy file transfer code in AIM 6.1.41.2
                    431:                 * requires that the entire OFT frame arrive all at once.  If
                    432:                 * the frame is fragmented then AIM freaks out and aborts the
                    433:                 * file transfer.  Somebody should teach those guys how to
                    434:                 * write good TCP code.
                    435:                 */
                    436:                conn->buffer_outgoing->inptr = conn->buffer_outgoing->buffer;
                    437:                conn->buffer_outgoing->outptr = conn->buffer_outgoing->buffer;
                    438:                return;
                    439:        }
                    440: 
                    441:        wrotelen = send(conn->fd, conn->buffer_outgoing->outptr, writelen, 0);
                    442:        if (wrotelen <= 0)
                    443:        {
                    444:                if (wrotelen < 0 && ((errno == EAGAIN) || (errno == EWOULDBLOCK)))
                    445:                        /* No worries */
                    446:                        return;
                    447: 
                    448:                if (conn->ready)
                    449:                {
                    450:                        purple_input_remove(conn->watcher_outgoing);
                    451:                        conn->watcher_outgoing = 0;
                    452:                        close(conn->fd);
                    453:                        conn->fd = -1;
                    454:                        peer_connection_schedule_destroy(conn,
                    455:                                        OSCAR_DISCONNECT_LOST_CONNECTION, NULL);
                    456:                }
                    457:                else
                    458:                {
                    459:                        /*
                    460:                         * This could happen when unable to send a negotiation
                    461:                         * frame to a peer proxy server.
                    462:                         */
                    463:                        peer_connection_trynext(conn);
                    464:                }
                    465:                return;
                    466:        }
                    467: 
                    468:        purple_circ_buffer_mark_read(conn->buffer_outgoing, wrotelen);
                    469:        conn->lastactivity = time(NULL);
                    470: }
                    471: 
                    472: /**
                    473:  * This should be called by OFT/ODC code to send a standard OFT or ODC
                    474:  * frame across the peer connection along with some payload data.  Or
                    475:  * maybe a file.  Anything, really.
                    476:  */
                    477: void
                    478: peer_connection_send(PeerConnection *conn, ByteStream *bs)
                    479: {
                    480:        /* Add everything to our outgoing buffer */
                    481:        purple_circ_buffer_append(conn->buffer_outgoing, bs->data, bs->len);
                    482: 
                    483:        /* If we haven't already started writing stuff, then start the cycle */
                    484:        if ((conn->watcher_outgoing == 0) && (conn->fd >= 0))
                    485:        {
                    486:                conn->watcher_outgoing = purple_input_add(conn->fd,
                    487:                                PURPLE_INPUT_WRITE, send_cb, conn);
                    488:                send_cb(conn, conn->fd, 0);
                    489:        }
                    490: }
                    491: 
                    492: /*******************************************************************/
                    493: /* End code for sending data on a peer connection                  */
                    494: /*******************************************************************/
                    495: 
                    496: /*******************************************************************/
                    497: /* Begin code for establishing a peer connection                   */
                    498: /*******************************************************************/
                    499: 
                    500: void
                    501: peer_connection_finalize_connection(PeerConnection *conn)
                    502: {
                    503:        conn->watcher_incoming = purple_input_add(conn->fd,
                    504:                        PURPLE_INPUT_READ, peer_connection_recv_cb, conn);
                    505: 
                    506:        if (conn->type == OSCAR_CAPABILITY_DIRECTIM)
                    507:        {
                    508:                /*
                    509:                 * If we are connecting to them then send our cookie so they
                    510:                 * can verify who we are.  Note: This doesn't seem to be
                    511:                 * necessary, but it also doesn't seem to hurt.
                    512:                 */
                    513:                if (!(conn->flags & PEER_CONNECTION_FLAG_IS_INCOMING))
                    514:                        peer_odc_send_cookie(conn);
                    515:        }
                    516:        else if (conn->type == OSCAR_CAPABILITY_SENDFILE)
                    517:        {
                    518:                if (purple_xfer_get_type(conn->xfer) == PURPLE_XFER_SEND)
                    519:                {
                    520:                        peer_oft_send_prompt(conn);
                    521:                }
                    522:        }
                    523: 
                    524:        /*
                    525:         * Tell the remote user that we're connected (which may also imply
                    526:         * that we've accepted their request).
                    527:         */
                    528:        if (!(conn->flags & PEER_CONNECTION_FLAG_IS_INCOMING))
                    529:                aim_im_sendch2_connected(conn);
                    530: }
                    531: 
                    532: /**
                    533:  * We tried to make an outgoing connection to a remote user.  It
                    534:  * either connected or failed to connect.
                    535:  */
                    536: static void
                    537: peer_connection_common_established_cb(gpointer data, gint source, const gchar *error_message, gboolean verified)
                    538: {
                    539:        PeerConnection *conn;
                    540: 
                    541:        conn = data;
                    542: 
                    543:        if (verified)
                    544:                conn->verified_connect_data = NULL;
                    545:        else
                    546:                conn->client_connect_data = NULL;
                    547: 
                    548:        if (source < 0)
                    549:        {
                    550:                if ((conn->verified_connect_data == NULL) &&
                    551:                        (conn->client_connect_data == NULL))
                    552:                {
                    553:                        /* Our parallel connection attemps have both failed. */
                    554:                        peer_connection_trynext(conn);
                    555:                }
                    556:                return;
                    557:        }
                    558: 
                    559:        purple_timeout_remove(conn->connect_timeout_timer);
                    560:        conn->connect_timeout_timer = 0;
                    561: 
                    562:        if (conn->client_connect_data != NULL)
                    563:        {
                    564:                purple_proxy_connect_cancel(conn->client_connect_data);
                    565:                conn->client_connect_data = NULL;
                    566:        }
                    567: 
                    568:        if (conn->verified_connect_data != NULL)
                    569:        {
                    570:                purple_proxy_connect_cancel(conn->verified_connect_data);
                    571:                conn->verified_connect_data = NULL;
                    572:        }
                    573: 
                    574:        conn->fd = source;
                    575: 
                    576:        peer_connection_finalize_connection(conn);
                    577: }
                    578: 
                    579: static void
                    580: peer_connection_verified_established_cb(gpointer data, gint source, const gchar *error_message)
                    581: {
                    582:        peer_connection_common_established_cb(data, source, error_message, TRUE);
                    583: }
                    584: 
                    585: static void
                    586: peer_connection_client_established_cb(gpointer data, gint source, const gchar *error_message)
                    587: {
                    588:        peer_connection_common_established_cb(data, source, error_message, FALSE);
                    589: }
                    590: 
                    591: /**
                    592:  * This is the watcher callback for any listening socket that is
                    593:  * waiting for a peer to connect.  When a peer connects we set the
                    594:  * input watcher to start reading data from the peer.
                    595:  *
                    596:  * To make sure that the connection is with the intended person and
                    597:  * not with a malicious middle man, we don't send anything until we've
                    598:  * received a peer frame from the remote user and have verified that
                    599:  * the cookie in the peer frame matches the cookie that was exchanged
                    600:  * in the channel 2 ICBM.
                    601:  */
                    602: void
                    603: peer_connection_listen_cb(gpointer data, gint source, PurpleInputCondition cond)
                    604: {
                    605:        PeerConnection *conn;
                    606:        struct sockaddr addr;
                    607:        socklen_t addrlen = sizeof(addr);
                    608: 
                    609:        conn = data;
                    610: 
                    611:        purple_debug_info("oscar", "Accepting connection on listener socket.\n");
                    612: 
                    613:        conn->fd = accept(conn->listenerfd, &addr, &addrlen);
                    614:        if (conn->fd < 0)
                    615:        {
                    616:                if ((errno == EAGAIN) || (errno == EWOULDBLOCK))
                    617:                        /* No connection yet--no worries */
                    618:                        /* TODO: Hmm, but they SHOULD be connected if we're here, right? */
                    619:                        return;
                    620: 
                    621:                peer_connection_trynext(conn);
                    622:                return;
                    623:        }
                    624: 
                    625:        if ((addr.sa_family != PF_INET) && (addr.sa_family != PF_INET6))
                    626:        {
                    627:                /* Invalid connection type?!  Continue waiting. */
                    628:                close(conn->fd);
                    629:                return;
                    630:        }
                    631: 
                    632:        //_purple_network_set_common_socket_flags(conn->fd); // TODO: Not public? Check
                    633: 
                    634:        purple_input_remove(conn->watcher_incoming);
                    635: 
                    636:        peer_connection_finalize_connection(conn);
                    637: }
                    638: 
                    639: /**
                    640:  * We've just opened a listener socket, so we send the remote
                    641:  * user an ICBM and ask them to connect to us.
                    642:  */
                    643: static void
                    644: peer_connection_establish_listener_cb(int listenerfd, gpointer data)
                    645: {
                    646:        PeerConnection *conn;
                    647:        OscarData *od;
                    648:        PurpleConnection *gc;
                    649:        PurpleAccount *account;
                    650:        PurpleConversation *conv;
                    651:        char *tmp;
                    652:        FlapConnection *bos_conn;
                    653:        const char *listener_ip;
                    654:        const guchar *ip_atoi;
                    655:        unsigned short listener_port;
                    656: 
                    657:        conn = data;
                    658:        conn->listen_data = NULL;
                    659: 
                    660:        if (listenerfd < 0)
                    661:        {
                    662:                /* Could not open listener socket */
                    663:                peer_connection_trynext(conn);
                    664:                return;
                    665:        }
                    666: 
                    667:        od = conn->od;
                    668:        gc = od->gc;
                    669:        account = purple_connection_get_account(gc);
                    670:        conn->listenerfd = listenerfd;
                    671: 
                    672:        /* Watch for new connections on our listener socket */
                    673:        conn->watcher_incoming = purple_input_add(conn->listenerfd,
                    674:                        PURPLE_INPUT_READ, peer_connection_listen_cb, conn);
                    675: 
                    676:        /* Send the "please connect to me!" ICBM */
                    677:        bos_conn = flap_connection_findbygroup(od, SNAC_FAMILY_ICBM);
                    678:        if (bos_conn == NULL)
                    679:        {
                    680:                /* Not good */
                    681:                peer_connection_trynext(conn);
                    682:                return;
                    683:        }
                    684: 
                    685:        if (bos_conn->gsc)
                    686:                listener_ip = purple_network_get_my_ip(bos_conn->gsc->fd);
                    687:        else
                    688:                listener_ip = purple_network_get_my_ip(bos_conn->fd);
                    689: 
                    690:        ip_atoi = purple_network_ip_atoi(listener_ip);
                    691:        if (ip_atoi == NULL) {
                    692:                /* Could not convert IP to 4 byte array--weird, but this does
                    693:                   happen for some users (#4829, Adium #15839).  Maybe they're
                    694:                   connecting with IPv6...?  Maybe through a proxy? */
                    695:                purple_debug_error("oscar", "Can't ask peer to connect to us "
                    696:                                "because purple_network_ip_atoi(%s) returned NULL. "
                    697:                                "fd=%d. is_ssl=%d\n",
                    698:                                listener_ip ? listener_ip : "(null)",
                    699:                                bos_conn->gsc ? bos_conn->gsc->fd : bos_conn->fd,
                    700:                                bos_conn->gsc ? 1 : 0);
                    701:                peer_connection_trynext(conn);
                    702:                return;
                    703:        }
                    704: 
                    705:        listener_port = purple_network_get_port_from_fd(conn->listenerfd);
                    706: 
                    707:        if (conn->type == OSCAR_CAPABILITY_DIRECTIM)
                    708:        {
                    709:                aim_im_sendch2_odc_requestdirect(od,
                    710:                                conn->cookie, conn->bn, ip_atoi,
                    711:                                listener_port, ++conn->lastrequestnumber);
                    712: 
                    713:                /* Print a message to a local conversation window */
                    714:                conv = purple_conversation_new(PURPLE_CONV_TYPE_IM, account, conn->bn);
                    715:                tmp = g_strdup_printf(_("Asking %s to connect to us at %s:%hu for "
                    716:                                "Direct IM."), conn->bn, listener_ip, listener_port);
                    717:                purple_conversation_write(conv, NULL, tmp, PURPLE_MESSAGE_SYSTEM, time(NULL));
                    718:                g_free(tmp);
                    719:        }
                    720:        else if (conn->type == OSCAR_CAPABILITY_SENDFILE)
                    721:        {
                    722:                aim_im_sendch2_sendfile_requestdirect(od,
                    723:                                conn->cookie, conn->bn,
                    724:                                ip_atoi,
                    725:                                listener_port, ++conn->lastrequestnumber,
                    726:                                (const gchar *)conn->xferdata.name,
                    727:                                conn->xferdata.size, conn->xferdata.totfiles);
                    728:        }
                    729: }
                    730: 
                    731: /**
                    732:  * This is a callback function used when we're connecting to a peer
                    733:  * using either the client IP or the verified IP and the connection
                    734:  * took longer than 5 seconds to complete.  We do this because
                    735:  * waiting for the OS to time out the connection attempt is not
                    736:  * practical--the default timeout on many OSes can be 3 minutes or
                    737:  * more, and users are impatient.
                    738:  *
                    739:  * Worst case scenario: the user is connected to the Internet using
                    740:  * a modem with severe lag.  The peer connections fail and Purple falls
                    741:  * back to using a proxied connection.  The lower bandwidth
                    742:  * limitations imposed by the proxied connection won't matter because
                    743:  * the user is using a modem.
                    744:  *
                    745:  * I suppose this line of thinking is discriminatory against people
                    746:  * with very high lag but decent throughput who are transferring
                    747:  * large files.  But we don't care about those people.
                    748:  *
                    749:  * I (Sean) changed the timeout from 15 to 5 seconds, as 60 seconds is
                    750:  * too long for a user to wait to send a file. I'm also parallelizing
                    751:  * requests when possible. The longest we should have to wait now is 10
                    752:  * seconds. We shouldn't make it shorter than this.
                    753:  */
                    754: static gboolean
                    755: peer_connection_tooktoolong(gpointer data)
                    756: {
                    757:        PeerConnection *conn;
                    758: 
                    759:        conn = data;
                    760: 
                    761:        purple_debug_info("oscar", "Peer connection timed out after 5 seconds.  "
                    762:                        "Trying next method...\n");
                    763: 
                    764:        peer_connection_trynext(conn);
                    765: 
                    766:        /* Cancel this timer.  It'll be added again, if needed. */
                    767:        return FALSE;
                    768: }
                    769: 
                    770: /**
                    771:  * Try to establish the given PeerConnection using a defined
                    772:  * sequence of steps.
                    773:  */
                    774: void
                    775: peer_connection_trynext(PeerConnection *conn)
                    776: {
                    777:        PurpleAccount *account;
                    778: 
                    779:        account = purple_connection_get_account(conn->od->gc);
                    780: 
                    781:        /*
                    782:         * Close any remnants of a previous failed connection attempt.
                    783:         */
                    784:        peer_connection_close(conn);
                    785: 
                    786:        /*
                    787:         * 1. Attempt to connect to the remote user using their verifiedip and clientip.
                    788:         *    We try these at the same time and use whichever succeeds first, so we don't
                    789:         *    have to wait for a timeout.
                    790:         */
                    791:        if (!(conn->flags & PEER_CONNECTION_FLAG_TRIED_DIRECT) &&
                    792:                (conn->verifiedip != NULL) && (conn->port != 0) && (!conn->use_proxy))
                    793:        {
                    794:                conn->flags |= PEER_CONNECTION_FLAG_TRIED_DIRECT;
                    795: 
                    796:                if (conn->type == OSCAR_CAPABILITY_DIRECTIM)
                    797:                {
                    798:                        gchar *tmp;
                    799:                        PurpleConversation *conv;
                    800:                        tmp = g_strdup_printf(_("Attempting to connect to %s:%hu."),
                    801:                                        conn->verifiedip, conn->port);
                    802:                        conv = purple_conversation_new(PURPLE_CONV_TYPE_IM, account, conn->bn);
                    803:                        purple_conversation_write(conv, NULL, tmp,
                    804:                                        PURPLE_MESSAGE_SYSTEM, time(NULL));
                    805:                        g_free(tmp);
                    806:                }
                    807: 
                    808:                conn->verified_connect_data = purple_proxy_connect(NULL, account,
                    809:                                conn->verifiedip, conn->port,
                    810:                                peer_connection_verified_established_cb, conn);
                    811: 
                    812:                if ((conn->verifiedip == NULL) ||
                    813:                        !purple_strequal(conn->verifiedip, conn->clientip))
                    814:                {
                    815:                        conn->client_connect_data = purple_proxy_connect(NULL, account,
                    816:                                        conn->clientip, conn->port,
                    817:                                        peer_connection_client_established_cb, conn);
                    818:                }
                    819: 
                    820:                if ((conn->verified_connect_data != NULL) ||
                    821:                        (conn->client_connect_data != NULL))
                    822:                {
                    823:                        /* Connecting... */
                    824:                        conn->connect_timeout_timer = purple_timeout_add_seconds(5,
                    825:                                        peer_connection_tooktoolong, conn);
                    826:                        return;
                    827:                }
                    828:        }
                    829: 
                    830:        /*
                    831:         * 2. Attempt to have the remote user connect to us (using both
                    832:         *    our verifiedip and our clientip).
                    833:         */
                    834:        if (!(conn->flags & PEER_CONNECTION_FLAG_TRIED_INCOMING) &&
                    835:                (!conn->use_proxy))
                    836:        {
                    837:                conn->flags |= PEER_CONNECTION_FLAG_TRIED_INCOMING;
                    838: 
                    839:                /*
                    840:                 * Remote user is connecting to us, so we'll need to verify
                    841:                 * that the user who connected is our friend.
                    842:                 */
                    843:                conn->flags |= PEER_CONNECTION_FLAG_IS_INCOMING;
                    844: 
                    845:                conn->listen_data = purple_network_listen_range(5190, 5290, SOCK_STREAM,
                    846:                                peer_connection_establish_listener_cb, conn);
                    847:                if (conn->listen_data != NULL)
                    848:                {
                    849:                        /* Opening listener socket... */
                    850:                        return;
                    851:                }
                    852:        }
                    853: 
                    854:        /*
                    855:         * 3. Attempt to have both users connect to an intermediate proxy
                    856:         *    server.
                    857:         */
                    858:        if (!(conn->flags & PEER_CONNECTION_FLAG_TRIED_PROXY))
                    859:        {
                    860:                conn->flags |= PEER_CONNECTION_FLAG_TRIED_PROXY;
                    861: 
                    862:                /*
                    863:                 * If we initiate the proxy connection, then the remote user
                    864:                 * could be anyone, so we need to verify that the user who
                    865:                 * connected is our friend.
                    866:                 */
                    867:                if (!conn->use_proxy)
                    868:                        conn->flags |= PEER_CONNECTION_FLAG_IS_INCOMING;
                    869: 
                    870:                if (conn->type == OSCAR_CAPABILITY_DIRECTIM)
                    871:                {
                    872:                        gchar *tmp;
                    873:                        PurpleConversation *conv;
                    874:                        tmp = g_strdup(_("Attempting to connect via proxy server."));
                    875:                        conv = purple_conversation_new(PURPLE_CONV_TYPE_IM, account, conn->bn);
                    876:                        purple_conversation_write(conv, NULL, tmp,
                    877:                                        PURPLE_MESSAGE_SYSTEM, time(NULL));
                    878:                        g_free(tmp);
                    879:                }
                    880: 
                    881:                conn->verified_connect_data = purple_proxy_connect(NULL, account,
                    882:                                (conn->proxyip != NULL)
                    883:                                        ? conn->proxyip
                    884:                                        : (conn->od->icq ? ICQ_PEER_PROXY_SERVER : AIM_PEER_PROXY_SERVER),
                    885:                                PEER_PROXY_PORT,
                    886:                                peer_proxy_connection_established_cb, conn);
                    887:                if (conn->verified_connect_data != NULL)
                    888:                {
                    889:                        /* Connecting... */
                    890:                        return;
                    891:                }
                    892:        }
                    893: 
                    894:        /* Give up! */
                    895:        peer_connection_destroy(conn, OSCAR_DISCONNECT_COULD_NOT_CONNECT, NULL);
                    896: }
                    897: 
                    898: /**
                    899:  * Initiate a peer connection with someone.
                    900:  */
                    901: void
                    902: peer_connection_propose(OscarData *od, guint64 type, const char *bn)
                    903: {
                    904:        PeerConnection *conn;
                    905: 
                    906:        if (type == OSCAR_CAPABILITY_DIRECTIM)
                    907:        {
                    908:                conn = peer_connection_find_by_type(od, bn, type);
                    909:                if (conn != NULL)
                    910:                {
                    911:                        if (conn->ready)
                    912:                        {
                    913:                                PurpleAccount *account;
                    914:                                PurpleConversation *conv;
                    915: 
                    916:                                purple_debug_info("oscar", "Already have a direct IM "
                    917:                                                "session with %s.\n", bn);
                    918:                                account = purple_connection_get_account(od->gc);
                    919:                                conv = purple_find_conversation_with_account(PURPLE_CONV_TYPE_IM,
                    920:                                                bn, account);
                    921:                                if (conv != NULL)
                    922:                                        purple_conversation_present(conv);
                    923:                                return;
                    924:                        }
                    925: 
                    926:                        /* Cancel the old connection and try again */
                    927:                        peer_connection_destroy(conn, OSCAR_DISCONNECT_RETRYING, NULL);
                    928:                }
                    929:        }
                    930: 
                    931:        conn = peer_connection_new(od, type, bn);
                    932:        conn->flags |= PEER_CONNECTION_FLAG_INITIATED_BY_ME;
                    933:        conn->flags |= PEER_CONNECTION_FLAG_APPROVED;
                    934:        aim_icbm_makecookie(conn->cookie);
                    935: 
                    936:        peer_connection_trynext(conn);
                    937: }
                    938: 
                    939: /**
                    940:  * Someone else wants to establish a peer connection with us,
                    941:  * and we said yes.
                    942:  */
                    943: static void
                    944: peer_connection_got_proposition_yes_cb(gpointer data, gint id)
                    945: {
                    946:        PeerConnection *conn;
                    947: 
                    948:        conn = data;
                    949: 
                    950:        conn->flags |= PEER_CONNECTION_FLAG_APPROVED;
                    951:        peer_connection_trynext(conn);
                    952: }
                    953: 
                    954: /**
                    955:  * Someone else wants to establish a peer connection with us,
                    956:  * and we said no.
                    957:  *
                    958:  * "Well, one time my friend asked me if I wanted to play the
                    959:  *  piccolo.  But I said no."
                    960:  */
                    961: static void
                    962: peer_connection_got_proposition_no_cb(gpointer data, gint id)
                    963: {
                    964:        PeerConnection *conn;
                    965: 
                    966:        conn = data;
                    967: 
                    968:        aim_im_denytransfer(conn->od, conn->bn, conn->cookie,
                    969:                        AIM_TRANSFER_DENY_DECLINE);
                    970:        peer_connection_destroy(conn, OSCAR_DISCONNECT_LOCAL_CLOSED, NULL);
                    971: }
                    972: 
                    973: /**
                    974:  * Someone else wants to establish a peer connection with us.
                    975:  */
                    976: void
                    977: peer_connection_got_proposition(OscarData *od, const gchar *bn, const gchar *message, IcbmArgsCh2 *args)
                    978: {
                    979:        PurpleConnection *gc;
                    980:        PurpleAccount *account;
                    981:        PeerConnection *conn;
                    982:        gchar *buf;
                    983: 
                    984:        gc = od->gc;
                    985:        account = purple_connection_get_account(gc);
                    986: 
                    987:        /*
                    988:         * If we have a connection with this same cookie then they are
                    989:         * probably just telling us they weren't able to connect to us
                    990:         * and we should try connecting to them, instead.  Or they want
                    991:         * to go through a proxy.
                    992:         */
                    993:        conn = peer_connection_find_by_cookie(od, bn, args->cookie);
                    994:        if ((conn != NULL) && (conn->type == args->type))
                    995:        {
                    996:                purple_debug_info("oscar", "Remote user wants to try a "
                    997:                                "different connection method\n");
                    998:                g_free(conn->proxyip);
                    999:                g_free(conn->clientip);
                   1000:                g_free(conn->verifiedip);
                   1001:                if (args->use_proxy)
                   1002:                        conn->proxyip = g_strdup(args->proxyip);
                   1003:                else
                   1004:                        conn->proxyip = NULL;
                   1005:                conn->verifiedip = g_strdup(args->verifiedip);
                   1006:                conn->clientip = g_strdup(args->clientip);
                   1007:                conn->port = args->port;
                   1008:                conn->use_proxy |= args->use_proxy;
                   1009:                conn->lastrequestnumber++;
                   1010:                peer_connection_trynext(conn);
                   1011:                return;
                   1012:        }
                   1013: 
                   1014:        /* If this is a direct IM, then close any existing session */
                   1015:        if (args->type == OSCAR_CAPABILITY_DIRECTIM)
                   1016:        {
                   1017:                conn = peer_connection_find_by_type(od, bn, args->type);
                   1018:                if (conn != NULL)
                   1019:                {
                   1020:                        /* Close the old direct IM and start a new one */
                   1021:                        purple_debug_info("oscar", "Received new direct IM request "
                   1022:                                "from %s.  Destroying old connection.\n", bn);
                   1023:                        peer_connection_destroy(conn, OSCAR_DISCONNECT_REMOTE_CLOSED, NULL);
                   1024:                }
                   1025:        }
                   1026: 
                   1027:        /* Check for proper arguments */
                   1028:        if (args->type == OSCAR_CAPABILITY_SENDFILE)
                   1029:        {
                   1030:                if ((args->info.sendfile.filename == NULL) ||
                   1031:                        (args->info.sendfile.totsize == 0) ||
                   1032:                        (args->info.sendfile.totfiles == 0))
                   1033:                {
                   1034:                        purple_debug_warning("oscar",
                   1035:                                        "%s tried to send you a file with incomplete "
                   1036:                                        "information.\n", bn);
                   1037:                        return;
                   1038:                }
                   1039:        }
                   1040: 
                   1041:        conn = peer_connection_new(od, args->type, bn);
                   1042:        memcpy(conn->cookie, args->cookie, 8);
                   1043:        if (args->use_proxy)
                   1044:                conn->proxyip = g_strdup(args->proxyip);
                   1045:        conn->clientip = g_strdup(args->clientip);
                   1046:        conn->verifiedip = g_strdup(args->verifiedip);
                   1047:        conn->port = args->port;
                   1048:        conn->use_proxy |= args->use_proxy;
                   1049:        conn->lastrequestnumber++;
                   1050: 
                   1051:        if (args->type == OSCAR_CAPABILITY_DIRECTIM)
                   1052:        {
                   1053:                buf = g_strdup_printf(_("%s has just asked to directly connect to %s"),
                   1054:                                bn, purple_account_get_username(account));
                   1055: 
                   1056:                purple_request_action(conn, NULL, buf,
                   1057:                                                _("This requires a direct connection between "
                   1058:                                                  "the two computers and is necessary for IM "
                   1059:                                                  "Images.  Because your IP address will be "
                   1060:                                                  "revealed, this may be considered a privacy "
                   1061:                                                  "risk."),
                   1062:                                                PURPLE_DEFAULT_ACTION_NONE,
                   1063:                                                account, bn, NULL,
                   1064:                                                conn, 2,
                   1065:                                                _("C_onnect"), G_CALLBACK(peer_connection_got_proposition_yes_cb),
                   1066:                                                _("Cancel"), G_CALLBACK(peer_connection_got_proposition_no_cb));
                   1067:        }
                   1068:        else if (args->type == OSCAR_CAPABILITY_SENDFILE)
                   1069:        {
                   1070:                gchar *filename;
                   1071: 
                   1072:                conn->xfer = purple_xfer_new(account, PURPLE_XFER_RECEIVE, bn);
                   1073:                if (conn->xfer)
                   1074:                {
                   1075:                        conn->xfer->data = conn;
                   1076:                        purple_xfer_ref(conn->xfer);
                   1077:                        purple_xfer_set_size(conn->xfer, args->info.sendfile.totsize);
                   1078: 
                   1079:                        /* Set the file name */
                   1080:                        if (g_utf8_validate(args->info.sendfile.filename, -1, NULL))
                   1081:                                filename = g_strdup(args->info.sendfile.filename);
                   1082:                        else
                   1083:                                filename = purple_utf8_salvage(args->info.sendfile.filename);
                   1084: 
                   1085:                        if (args->info.sendfile.subtype == AIM_OFT_SUBTYPE_SEND_DIR)
                   1086:                        {
                   1087:                                /*
                   1088:                                 * If they are sending us a directory then the last character
                   1089:                                 * of the file name will be an asterisk.  We don't want to
                   1090:                                 * save stuff to a directory named "*" so we remove the
                   1091:                                 * asterisk from the file name.
                   1092:                                 */
                   1093:                                char *tmp = strrchr(filename, '\\');
                   1094:                                if ((tmp != NULL) && (tmp[1] == '*'))
                   1095:                                        tmp[0] = '\0';
                   1096:                        }
                   1097:                        purple_xfer_set_filename(conn->xfer, filename);
                   1098:                        g_free(filename);
                   1099: 
                   1100:                        /*
                   1101:                         * Set the message, unless this is the dummy message from an
                   1102:                         * ICQ client or an empty message from an AIM client.
                   1103:                         * TODO: Maybe we should strip HTML and then see if strlen>0?
                   1104:                         */
                   1105:                        if ((message != NULL) &&
                   1106:                                (g_ascii_strncasecmp(message, "<ICQ_COOL_FT>", 13) != 0) &&
                   1107:                                (g_ascii_strcasecmp(message, "<HTML>") != 0))
                   1108:                        {
                   1109:                                purple_xfer_set_message(conn->xfer, message);
                   1110:                        }
                   1111: 
                   1112:                        /* Setup our I/O op functions */
                   1113:                        purple_xfer_set_init_fnc(conn->xfer, peer_oft_recvcb_init);
                   1114:                        purple_xfer_set_end_fnc(conn->xfer, peer_oft_recvcb_end);
                   1115:                        purple_xfer_set_request_denied_fnc(conn->xfer, peer_oft_cb_generic_cancel);
                   1116:                        purple_xfer_set_cancel_recv_fnc(conn->xfer, peer_oft_cb_generic_cancel);
                   1117:                        purple_xfer_set_ack_fnc(conn->xfer, peer_oft_recvcb_ack_recv);
                   1118: 
                   1119:                        /* Now perform the request */
                   1120:                        purple_xfer_request(conn->xfer);
                   1121:                }
                   1122:        }
                   1123: }
                   1124: 
                   1125: /*******************************************************************/
                   1126: /* End code for establishing a peer connection                     */
                   1127: /*******************************************************************/

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>