diff options
| author | Wilmer van der Gaast <wilmer@gaast.net> | 2008-06-30 00:41:39 +0100 | 
|---|---|---|
| committer | Wilmer van der Gaast <wilmer@gaast.net> | 2008-06-30 00:41:39 +0100 | 
| commit | f5d1b3185140e690a6503b9e68c7ea28655b405e (patch) | |
| tree | f679a139ecca219aa2c7a07adcaefd3000c8c801 | |
| parent | cd63d5822e76a6126bb3017567c9ce2869a44e0b (diff) | |
| parent | 913545e54123296fb8229ecad2c77a6e899e0242 (diff) | |
Merging changes from Jelmer: It's now possible to cross-compile a Windows
version of BitlBee from Linux. No working SSL support yet though!
| -rw-r--r-- | .bzrignore | 1 | ||||
| -rw-r--r-- | Makefile | 12 | ||||
| -rw-r--r-- | bitlbee.c | 9 | ||||
| -rw-r--r-- | bitlbee.h | 6 | ||||
| -rwxr-xr-x | configure | 16 | ||||
| -rw-r--r-- | doc/BUILD.win32 | 10 | ||||
| -rw-r--r-- | ipc.c | 6 | ||||
| -rw-r--r-- | irc.c | 1 | ||||
| -rw-r--r-- | lib/misc.c | 2 | ||||
| -rw-r--r-- | lib/ssl_bogus.c | 5 | ||||
| -rw-r--r-- | lib/ssl_sspi.c | 278 | ||||
| -rw-r--r-- | protocols/yahoo/libyahoo2.c | 2 | ||||
| -rw-r--r-- | protocols/yahoo/yahoo_httplib.c | 2 | ||||
| -rw-r--r-- | sock.h | 8 | ||||
| -rw-r--r-- | storage_text.c | 8 | ||||
| -rw-r--r-- | storage_xml.c | 8 | ||||
| -rw-r--r-- | unix.c | 8 | ||||
| -rw-r--r-- | win32.c | 332 | 
18 files changed, 692 insertions, 22 deletions
| @@ -18,3 +18,4 @@ tests/check  *.o  coverage  bitlbee.info +bitlbee.exe @@ -9,10 +9,20 @@  -include Makefile.settings  # Program variables -objects = account.o bitlbee.o conf.o crypting.o help.o ipc.o irc.o irc_commands.o log.o nick.o query.o root_commands.o set.o storage.o $(STORAGE_OBJS) unix.o user.o +objects = account.o bitlbee.o crypting.o help.o ipc.o irc.o irc_commands.o nick.o query.o root_commands.o set.o storage.o $(STORAGE_OBJS) user.o  headers = account.h bitlbee.h commands.h conf.h config.h crypting.h help.h ipc.h irc.h log.h nick.h query.h set.h sock.h storage.h user.h lib/events.h lib/http_client.h lib/ini.h lib/md5.h lib/misc.h lib/proxy.h lib/sha1.h lib/ssl_client.h lib/url.h protocols/nogaim.h  subdirs = lib protocols +ifeq ($(TARGET),i586-mingw32msvc) +objects += win32.o +LFLAGS+=-lws2_32 +EFLAGS+=-lsecur32 +OUTFILE=bitlbee.exe +else +objects += unix.o conf.o log.o +OUTFILE=bitlbee +endif +  # Expansion of variables  subdirobjs = $(foreach dir,$(subdirs),$(dir)/$(dir).o)  CFLAGS += -Wall @@ -122,6 +122,7 @@ int bitlbee_daemon_init()  	if( global.conf->runmode == RUNMODE_DAEMON || global.conf->runmode == RUNMODE_FORKDAEMON )  		ipc_master_listen_socket(); +#ifndef _WIN32  	if( ( fp = fopen( global.conf->pidfile, "w" ) ) )  	{  		fprintf( fp, "%d\n", (int) getpid() ); @@ -131,6 +132,7 @@ int bitlbee_daemon_init()  	{  		log_message( LOGLVL_WARNING, "Warning: Couldn't write PID to `%s'", global.conf->pidfile );  	} +#endif  	return( 0 );  } @@ -140,9 +142,6 @@ int bitlbee_inetd_init()  	if( !irc_new( 0 ) )  		return( 1 ); -	log_link( LOGLVL_ERROR, LOGOUTPUT_IRC ); -	log_link( LOGLVL_WARNING, LOGOUTPUT_IRC ); -	  	return( 0 );  } @@ -253,7 +252,6 @@ static gboolean bitlbee_io_new_client( gpointer data, gint fd, b_input_condition  	socklen_t size = sizeof( struct sockaddr_in );  	struct sockaddr_in conn_info;  	int new_socket = accept( global.listen_socket, (struct sockaddr *) &conn_info, &size ); -	pid_t client_pid = 0;  	if( new_socket == -1 )  	{ @@ -261,8 +259,10 @@ static gboolean bitlbee_io_new_client( gpointer data, gint fd, b_input_condition  		return TRUE;  	} +#ifndef _WIN32  	if( global.conf->runmode == RUNMODE_FORKDAEMON )  	{ +		pid_t client_pid = 0;  		int fds[2];  		if( socketpair( AF_UNIX, SOCK_STREAM, 0, fds ) == -1 ) @@ -319,6 +319,7 @@ static gboolean bitlbee_io_new_client( gpointer data, gint fd, b_input_condition  		}  	}  	else +#endif  	{  		log_message( LOGLVL_INFO, "Creating new connection with fd %d.", new_socket );  		irc_new( new_socket ); @@ -28,6 +28,9 @@  #define _GNU_SOURCE /* Stupid GNU :-P */ +/* Depend on Windows 2000 for now since we need getaddrinfo() */ +#define _WIN32_WINNT 0x0501 +  #define PACKAGE "BitlBee"  #define BITLBEE_VERSION "1.2.1"  #define VERSION BITLBEE_VERSION @@ -47,9 +50,10 @@  #include <stdarg.h>  #include <stdio.h>  #include <ctype.h> +#include <errno.h> +  #ifndef _WIN32  #include <syslog.h> -#include <errno.h>  #endif  #include <glib.h> @@ -19,6 +19,7 @@ libevent='/usr/'  pidfile='/var/run/bitlbee.pid'  ipcsocket='/var/run/bitlbee.sock'  pcdir='$prefix/lib/pkgconfig' +systemlibdirs="/lib /usr/lib /usr/local/lib"  msn=1  jabber=1 @@ -108,9 +109,9 @@ CONFIG=$config  INCLUDEDIR=$includedir  PCDIR=$pcdir +TARGET=$target  ARCH=$arch  CPU=$cpu -OUTFILE=bitlbee  DESTDIR=  LFLAGS= @@ -133,13 +134,18 @@ cat<<EOF>config.h  #define CPU "$cpu"  EOF + +  if [ -n "$target" ]; then -	PKG_CONFIG_PATH=/usr/$target/lib/pkgconfig +	PKG_CONFIG_LIBDIR=/usr/$target/lib/pkgconfig +	export PKG_CONFIG_LIBDIR  	PATH=/usr/$target/bin:$PATH  	CC=$target-cc  	LD=$target-ld +	systemlibdirs="/usr/$target/lib"  fi +  if [ "$debug" = "1" ]; then  	[ -z "$CFLAGS" ] && CFLAGS=-g  	echo 'DEBUG=1' >> Makefile.settings @@ -284,6 +290,8 @@ elif [ "$ssl" = "gnutls" ]; then  	detect_gnutls  elif [ "$ssl" = "nss" ]; then  	detect_nss +elif [ "$ssl" = "sspi" ]; then +	echo  elif [ "$ssl" = "openssl" ]; then  	echo  	echo 'No detection code exists for OpenSSL. Make sure that you have a complete' @@ -340,7 +348,7 @@ fi;  echo 'SSL_CLIENT=ssl_'$ssl'.o' >> Makefile.settings -for i in /lib /usr/lib /usr/local/lib; do +for i in $systemlibdirs; do  	if [ -f $i/libresolv.a ]; then  		echo '#define HAVE_RESOLV_A' >> config.h  		echo 'EFLAGS+='$i'/libresolv.a' >> Makefile.settings @@ -500,6 +508,8 @@ AIX )  CYGWIN* )  	echo 'Cygwin is not officially supported.'  ;; +Windows ) +;;  * )  	echo 'We haven'\''t tested BitlBee on many platforms yet, yours is untested. YMMV.'  	echo 'Please report any problems at http://bugs.bitlbee.org/.' diff --git a/doc/BUILD.win32 b/doc/BUILD.win32 new file mode 100644 index 00000000..e1afe600 --- /dev/null +++ b/doc/BUILD.win32 @@ -0,0 +1,10 @@ +Instructions for building BitlBee for Windows
 +=============================================
 +
 +1) Install the mingw32 compiler
 +
 +2) Compile GLib2 for the target i586-mingw32msvc
 +
 +3) Cross-compile BitlBee:
 +
 +$ ./configure --target=i586-mingw32msvc --ssl=bogus --arch=Windows
 @@ -459,6 +459,7 @@ void ipc_child_disable()  	global.listen_socket = -1;  } +#ifndef _WIN32  char *ipc_master_save_state()  {  	char *fn = g_strdup( "/tmp/bee-restart.XXXXXX" ); @@ -519,7 +520,6 @@ static gboolean new_ipc_client( gpointer data, gint serversock, b_input_conditio  	return TRUE;  } -#ifndef _WIN32  int ipc_master_listen_socket()  {  	struct sockaddr_un un_addr; @@ -556,7 +556,11 @@ int ipc_master_listen_socket()  	return 1;  }  #else +int ipc_master_listen_socket() +{  	/* FIXME: Open named pipe \\.\BITLBEE */ +	return 0; +}  #endif  int ipc_master_load_state( char *statefile ) @@ -25,6 +25,7 @@  #define BITLBEE_CORE  #include "bitlbee.h" +#include "sock.h"  #include "crypting.h"  #include "ipc.h" @@ -372,6 +372,7 @@ signed int do_iconv( char *from_cs, char *to_cs, char *src, char *dst, size_t si     lack of entropy won't halt BitlBee. */  void random_bytes( unsigned char *buf, int count )  { +#ifndef _WIN32  	static int use_dev = -1;  	/* Actually this probing code isn't really necessary, is it? */ @@ -421,6 +422,7 @@ void random_bytes( unsigned char *buf, int count )  	}  	if( !use_dev ) +#endif  	{  		int i; diff --git a/lib/ssl_bogus.c b/lib/ssl_bogus.c index 5bae3496..a07ea752 100644 --- a/lib/ssl_bogus.c +++ b/lib/ssl_bogus.c @@ -60,3 +60,8 @@ b_input_condition ssl_getdirection( void *conn )  {  	return GAIM_INPUT_READ;  } + +int ssl_pending( void *conn ) +{ +	return 0; +} diff --git a/lib/ssl_sspi.c b/lib/ssl_sspi.c new file mode 100644 index 00000000..a16423b1 --- /dev/null +++ b/lib/ssl_sspi.c @@ -0,0 +1,278 @@ +  /********************************************************************\ +  * BitlBee -- An IRC to other IM-networks gateway                     * +  *                                                                    * +  * Copyright 2002-2004 Wilmer van der Gaast and others                * +  \********************************************************************/ + +/* SSL module - SSPI backend */ + +/* Copyright (C) 2005 Jelmer Vernooij <jelmer@samba.org> */ + +/* +  This program is free software; you can redistribute it and/or modify +  it under the terms of the GNU General Public License as published by +  the Free Software Foundation; either version 2 of the License, or +  (at your option) any later version. + +  This program is distributed in the hope that it will be useful, +  but WITHOUT ANY WARRANTY; without even the implied warranty of +  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the +  GNU General Public License for more details. + +  You should have received a copy of the GNU General Public License with +  the Debian GNU/Linux distribution in /usr/share/common-licenses/GPL; +  if not, write to the Free Software Foundation, Inc., 59 Temple Place, +  Suite 330, Boston, MA  02111-1307  USA +*/ + +#include "ssl_client.h" +#include <windows.h> +#define SECURITY_WIN32 +#include <security.h> +#include <sspi.h> +#include <schannel.h> +#include "sock.h" + +static gboolean initialized = FALSE; +int ssl_errno; + +struct scd +{ +	int fd; +	ssl_input_function func; +	gpointer data; +	gboolean established; +  	CredHandle cred;		/* SSL credentials */ +	CtxtHandle context;		/* SSL context */ +	SecPkgContext_StreamSizes sizes; + +	char *host; + +	char *pending_raw_data; +	gsize pending_raw_data_len; +	char *pending_data; +	gsize pending_data_len; +}; + +static void ssl_connected(gpointer, gint, GaimInputCondition); + +void sspi_global_init(void) +{ +	/* FIXME */ +} + +void sspi_global_deinit(void) +{ +	/* FIXME */ +} + +void *ssl_connect(char *host, int port, ssl_input_function func, gpointer data) +{ +	struct scd *conn = g_new0(struct scd, 1); +		 +	conn->fd = proxy_connect(host, port, ssl_connected, conn); +	sock_make_nonblocking(conn->fd); +	conn->func = func; +	conn->data = data; +	conn->host = g_strdup(host); +	 +	if (conn->fd < 0) +	{ +		g_free(conn); +		return NULL; +	} +	 +	if (!initialized) +	{ +		sspi_global_init(); +		initialized = TRUE; +		atexit(sspi_global_deinit); +	} + +	return conn; +} + +static void ssl_connected(gpointer _conn, gint fd, GaimInputCondition cond) +{ +	struct scd *conn = _conn; +	SCHANNEL_CRED ssl_cred; +	TimeStamp timestamp; +	SecBuffer ibuf[2],obuf[1]; +	SecBufferDesc ibufs,obufs; +	ULONG req = ISC_REQ_REPLAY_DETECT | ISC_REQ_SEQUENCE_DETECT | +    	ISC_REQ_CONFIDENTIALITY | ISC_REQ_USE_SESSION_KEY | +      	ISC_REQ_ALLOCATE_MEMORY | ISC_REQ_STREAM | ISC_REQ_EXTENDED_ERROR | +		ISC_REQ_MANUAL_CRED_VALIDATION; +	ULONG a; +	gsize size = 0; +	gchar *data = NULL; + +	memset(&ssl_cred, 0, sizeof(SCHANNEL_CRED)); +	ssl_cred.dwVersion = SCHANNEL_CRED_VERSION; +	ssl_cred.grbitEnabledProtocols = SP_PROT_SSL3_CLIENT; + +	SECURITY_STATUS st = AcquireCredentialsHandle(NULL, UNISP_NAME, SECPKG_CRED_OUTBOUND, NULL, &ssl_cred, NULL, NULL, &conn->cred, ×tamp); + +	if (st != SEC_E_OK) { +		conn->func(conn->data, NULL, cond); +		return; +	} +	 +	do { +		/* initialize buffers */ +	    ibuf[0].cbBuffer = size; ibuf[0].pvBuffer = data; +	    ibuf[1].cbBuffer = 0; ibuf[1].pvBuffer = NULL; +	    obuf[0].cbBuffer = 0; obuf[0].pvBuffer = NULL; +    	ibuf[0].BufferType = obuf[0].BufferType = SECBUFFER_TOKEN; +	    ibuf[1].BufferType = SECBUFFER_EMPTY; + +		/* initialize buffer descriptors */ +	    ibufs.ulVersion = obufs.ulVersion = SECBUFFER_VERSION; +	    ibufs.cBuffers = 2; obufs.cBuffers = 1; +	    ibufs.pBuffers = ibuf; obufs.pBuffers = obuf; + +		st = InitializeSecurityContext(&conn->cred, size?&conn->context:NULL, conn->host, req, 0, SECURITY_NETWORK_DREP, size?&ibufs:NULL, 0, &conn->context, &obufs, &a, ×tamp);   +    	if (obuf[0].pvBuffer && obuf[0].cbBuffer) { +			/* FIXME: Check return value */ +			send(conn->fd, obuf[0].pvBuffer, obuf[0].cbBuffer, 0); +		} + +		switch (st) { +		case SEC_I_INCOMPLETE_CREDENTIALS: +			break; +		case SEC_I_CONTINUE_NEEDED: +			break; +		case SEC_E_INCOMPLETE_MESSAGE: +			break; +		case SEC_E_OK: +			break; +		} +	 +		QueryContextAttributes(&conn->context, SECPKG_ATTR_STREAM_SIZES, &conn->sizes); +	} while (1); + +	conn->func(conn->data, conn, cond); +} + +int ssl_read(void *conn, char *retdata, int len) +{ +	struct scd *scd = conn; +	SecBufferDesc msg; +	SecBuffer buf[4]; +	int ret = -1, i; +	char *data = g_malloc(scd->sizes.cbHeader + scd->sizes.cbMaximumMessage + scd->sizes.cbTrailer); + +	/* FIXME: Try to read some data */ + +  	msg.ulVersion = SECBUFFER_VERSION; +	msg.cBuffers = 4; +	msg.pBuffers = buf; +	 +	buf[0].BufferType = SECBUFFER_DATA; +	buf[0].cbBuffer = len; +	buf[0].pvBuffer = data; + +	buf[1].BufferType = SECBUFFER_EMPTY; +	buf[2].BufferType = SECBUFFER_EMPTY; +	buf[3].BufferType = SECBUFFER_EMPTY; + +	SECURITY_STATUS st = DecryptMessage(&scd->context, &msg, 0, NULL); + +	if (st != SEC_E_OK) { +		/* FIXME */ +		return -1; +	} + +	for (i = 0; i < 4; i++) { +		if (buf[i].BufferType == SECBUFFER_DATA) { +			memcpy(retdata, buf[i].pvBuffer, len); +			ret = len; +		}	 +	} + +	g_free(data); +	return -1; +} + +int ssl_write(void *conn, const char *userdata, int len) +{ +	struct scd *scd = conn; +	SecBuffer buf[4]; +	SecBufferDesc msg; +	char *data; +	int ret; + +	msg.ulVersion = SECBUFFER_VERSION; +	msg.cBuffers = 4; +	msg.pBuffers = buf; + +	data = g_malloc(scd->sizes.cbHeader + scd->sizes.cbMaximumMessage + scd->sizes.cbTrailer); +	memcpy(data + scd->sizes.cbHeader, userdata, len); + +	buf[0].BufferType = SECBUFFER_STREAM_HEADER; +	buf[0].cbBuffer = scd->sizes.cbHeader; +	buf[0].pvBuffer = data; + +	buf[1].BufferType = SECBUFFER_DATA; +	buf[1].cbBuffer = len; +	buf[1].pvBuffer = data + scd->sizes.cbHeader; + +	buf[2].BufferType = SECBUFFER_STREAM_TRAILER; +	buf[2].cbBuffer = scd->sizes.cbTrailer; +	buf[2].pvBuffer = data + scd->sizes.cbHeader + len; +	buf[3].BufferType = SECBUFFER_EMPTY; + +	SECURITY_STATUS st = EncryptMessage(&scd->context, 0, &msg, 0); + +	ret = send(scd->fd, data,  +				buf[0].cbBuffer + buf[1].cbBuffer + buf[2].cbBuffer, 0); + +	g_free(data); + +	return ret; +} + +void ssl_disconnect(void *conn) +{ +	struct scd *scd = conn; + +	SecBufferDesc msg; +	SecBuffer buf; +	DWORD dw; + +	dw = SCHANNEL_SHUTDOWN; +	buf.cbBuffer = sizeof(dw); +	buf.BufferType = SECBUFFER_TOKEN; +	buf.pvBuffer = &dw; +	 +	msg.ulVersion = SECBUFFER_VERSION; +	msg.cBuffers = 1; +	msg.pBuffers = &buf; + +	SECURITY_STATUS st = ApplyControlToken(&scd->context, &msg); + +	if (st != SEC_E_OK) { +		/* FIXME */ +	} +	 +	/* FIXME: call InitializeSecurityContext(Schannel), passing  +	 * in empty buffers*/ + +	DeleteSecurityContext(&scd->context); + +	FreeCredentialsHandle(&scd->cred); + +	closesocket(scd->fd); +	g_free(scd->host); +	g_free(scd); +} + +int ssl_getfd(void *conn) +{ +	return ((struct scd*)conn)->fd; +} + +GaimInputCondition ssl_getdirection( void *conn ) +{ +	return GAIM_INPUT_WRITE; /* FIXME: or GAIM_INPUT_READ */ +} diff --git a/protocols/yahoo/libyahoo2.c b/protocols/yahoo/libyahoo2.c index 897ba27b..a61955c4 100644 --- a/protocols/yahoo/libyahoo2.c +++ b/protocols/yahoo/libyahoo2.c @@ -68,8 +68,6 @@ char *strchr (), *strrchr ();  #ifdef __MINGW32__  # include <winsock2.h> -# define write(a,b,c) send(a,b,c,0) -# define read(a,b,c)  recv(a,b,c,0)  #endif  #include <stdlib.h> diff --git a/protocols/yahoo/yahoo_httplib.c b/protocols/yahoo/yahoo_httplib.c index dbbe2a84..1b084992 100644 --- a/protocols/yahoo/yahoo_httplib.c +++ b/protocols/yahoo/yahoo_httplib.c @@ -50,8 +50,6 @@ char *strchr (), *strrchr ();  #include "yahoo_debug.h"  #ifdef __MINGW32__  # include <winsock2.h> -# define write(a,b,c) send(a,b,c,0) -# define read(a,b,c)  recv(a,b,c,0)  # define snprintf _snprintf  #endif @@ -15,17 +15,11 @@  #endif  #else  # include <winsock2.h> -# ifndef _MSC_VER -#  include <ws2tcpip.h> -# endif +# include <ws2tcpip.h>  # if !defined(BITLBEE_CORE) && defined(_MSC_VER)  #   pragma comment(lib,"bitlbee.lib")  # endif  # include <io.h> -# define read(a,b,c) recv(a,b,c,0) -# define write(a,b,c) send(a,b,c,0) -# define umask _umask -# define mode_t int  # define sock_make_nonblocking(fd) { int non_block = 1; ioctlsocket(fd, FIONBIO, &non_block); }  # define sock_make_blocking(fd) { int non_block = 0; ioctlsocket(fd, FIONBIO, &non_block); }  # define sockerr_again() (WSAGetLastError() == WSAEINTR || WSAGetLastError() == WSAEINPROGRESS || WSAGetLastError() == WSAEWOULDBLOCK) diff --git a/storage_text.c b/storage_text.c index 5ee6438d..78f7e3bd 100644 --- a/storage_text.c +++ b/storage_text.c @@ -26,6 +26,14 @@  #define BITLBEE_CORE  #include "bitlbee.h"  #include "crypting.h" +#ifdef _WIN32 +# define umask _umask +# define mode_t int +#endif + +#ifndef F_OK +#define F_OK 0 +#endif  static void text_init (void)  { diff --git a/storage_xml.c b/storage_xml.c index ca82a9d1..cb92135c 100644 --- a/storage_xml.c +++ b/storage_xml.c @@ -30,6 +30,11 @@  #include "md5.h"  #include <glib/gstdio.h> +#if !GLIB_CHECK_VERSION(2,8,0) +/* GLib < 2.8.0 doesn't have g_access, so just use the system access(). */ +#define g_access access +#endif +  typedef enum  {  	XML_PASS_CHECK_ONLY = -1, @@ -245,7 +250,8 @@ static void xml_init( void )  {  	if( ! g_file_test( global.conf->configdir, G_FILE_TEST_EXISTS ) )  		log_message( LOGLVL_WARNING, "The configuration directory `%s' does not exist. Configuration won't be saved.", global.conf->configdir ); -	else if( ! g_file_test( global.conf->configdir, G_FILE_TEST_EXISTS ) || g_access( global.conf->configdir, W_OK ) != 0 ) +	else if( ! g_file_test( global.conf->configdir, G_FILE_TEST_EXISTS ) ||  +			 g_access( global.conf->configdir, W_OK ) != 0 )  		log_message( LOGLVL_WARNING, "Permission problem: Can't read/write from/to `%s'.", global.conf->configdir );  } @@ -59,12 +59,18 @@ int main( int argc, char *argv[] )  	if( global.conf->runmode == RUNMODE_INETD )  	{ +		log_link( LOGLVL_ERROR, LOGOUTPUT_IRC ); +		log_link( LOGLVL_WARNING, LOGOUTPUT_IRC ); +	  		i = bitlbee_inetd_init();  		log_message( LOGLVL_INFO, "Bitlbee %s starting in inetd mode.", BITLBEE_VERSION );  	}  	else if( global.conf->runmode == RUNMODE_DAEMON )  	{ +		log_link( LOGLVL_ERROR, LOGOUTPUT_SYSLOG ); +		log_link( LOGLVL_WARNING, LOGOUTPUT_SYSLOG ); +  		i = bitlbee_daemon_init();  		log_message( LOGLVL_INFO, "Bitlbee %s starting in daemon mode.", BITLBEE_VERSION );  	} @@ -207,3 +213,5 @@ double gettime()  	gettimeofday( time, 0 );  	return( (double) time->tv_sec + (double) time->tv_usec / 1000000 );  } + + diff --git a/win32.c b/win32.c new file mode 100644 index 00000000..4ab1d522 --- /dev/null +++ b/win32.c @@ -0,0 +1,332 @@ +  /********************************************************************\ +  * BitlBee -- An IRC to other IM-networks gateway					 * +  *																	* +  * Copyright 2002-2004 Wilmer van der Gaast and others				* +  \********************************************************************/ + +/* Main file (Windows specific part)								   */ + +/* +  This program is free software; you can redistribute it and/or modify +  it under the terms of the GNU General Public License as published by +  the Free Software Foundation; either version 2 of the License, or +  (at your option) any later version. + +  This program is distributed in the hope that it will be useful, +  but WITHOUT ANY WARRANTY; without even the implied warranty of +  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the +  GNU General Public License for more details. + +  You should have received a copy of the GNU General Public License with +  the Debian GNU/Linux distribution in /usr/share/common-licenses/GPL; +  if not, write to the Free Software Foundation, Inc., 59 Temple Place, +  Suite 330, Boston, MA  02111-1307  USA +*/ + +#define BITLBEE_CORE +#include "bitlbee.h" +#include "commands.h" +#include "crypting.h" +#include "protocols/nogaim.h" +#include "help.h" +#include <signal.h> +#include <windows.h> + +global_t global;	/* Against global namespace pollution */ + +static void WINAPI service_ctrl (DWORD dwControl) +{ +	switch (dwControl) +	{ +		case SERVICE_CONTROL_STOP: +			/* FIXME */ +			break; + +		case SERVICE_CONTROL_INTERROGATE: +			break; + +		default: +			break; + +	} +} + +static void bitlbee_init(int argc, char **argv) +{ +	int i = -1; +	memset( &global, 0, sizeof( global_t ) ); + +	b_main_init(); +	 +	global.conf = conf_load( argc, argv ); +	if( global.conf == NULL ) +		return; +	 +	if( global.conf->runmode == RUNMODE_INETD ) +	{ +		i = bitlbee_inetd_init(); +		log_message( LOGLVL_INFO, "Bitlbee %s starting in inetd mode.", BITLBEE_VERSION ); + +	} +	else if( global.conf->runmode == RUNMODE_DAEMON ) +	{ +		i = bitlbee_daemon_init(); +		log_message( LOGLVL_INFO, "Bitlbee %s starting in daemon mode.", BITLBEE_VERSION ); +	}  +	else  +	{ +		log_message( LOGLVL_INFO, "No bitlbee mode specified..."); +	} +	 +	if( i != 0 ) +		return; + 	 +	if( access( global.conf->configdir, F_OK ) != 0 ) +		log_message( LOGLVL_WARNING, "The configuration directory %s does not exist. Configuration won't be saved.", global.conf->configdir ); +	else if( access( global.conf->configdir, 06 ) != 0 ) +		log_message( LOGLVL_WARNING, "Permission problem: Can't read/write from/to %s.", global.conf->configdir ); +	if( help_init( &(global.help), HELP_FILE ) == NULL ) +		log_message( LOGLVL_WARNING, "Error opening helpfile %s.", global.helpfile ); +} + +void service_main (DWORD argc, LPTSTR *argv) +{ +	SERVICE_STATUS_HANDLE handle; +	SERVICE_STATUS status; + +	handle = RegisterServiceCtrlHandler("bitlbee", service_ctrl); + +	if (!handle) +		return; + +	status.dwServiceType = SERVICE_WIN32_OWN_PROCESS; +	status.dwServiceSpecificExitCode = 0; + +	bitlbee_init(argc, argv); + +	SetServiceStatus(handle, &status); +	 +	b_main_run( ); +} + +SERVICE_TABLE_ENTRY dispatch_table[] = +{ +   { TEXT("bitlbee"), (LPSERVICE_MAIN_FUNCTION)service_main }, +   { NULL, NULL } +}; + +static int debug = 0; + +static void usage() +{ +	printf("Options:\n"); +	printf("-h   Show this help message\n"); +	printf("-d   Debug mode (simple console program)\n"); +} + +int main( int argc, char **argv) +{	 +	int i; +	WSADATA WSAData; + +	nogaim_init( ); + +	for (i = 1; i < argc; i++) { +		if (!strcmp(argv[i], "-d")) debug = 1; +		if (!strcmp(argv[i], "-h")) { +			usage(); +			return 0; +		} +	} + +	WSAStartup(MAKEWORD(1,1), &WSAData); + +	if (!debug) { +		if (!StartServiceCtrlDispatcher(dispatch_table)) +			log_message( LOGLVL_ERROR, "StartServiceCtrlDispatcher failed."); +	} else { +			bitlbee_init(argc, argv); + 			b_main_run(); +	} +	 +	return 0; +} + +double gettime() +{ +	return (GetTickCount() / 1000); +} + +void conf_get_string(HKEY section, const char *name, const char *def, char **dest) +{ +	char buf[4096]; +	long x; +	if (RegQueryValue(section, name, buf, &x) == ERROR_SUCCESS) { +		*dest = g_strdup(buf); +	} else if (!def) { +		*dest = NULL; +	} else { +		*dest = g_strdup(def); +	} +} + + +void conf_get_int(HKEY section, const char *name, int def, int *dest) +{ +	char buf[20]; +	long x; +	DWORD y; +	if (RegQueryValue(section, name, buf, &x) == ERROR_SUCCESS) { +		memcpy(&y, buf, sizeof(DWORD)); +		*dest = y; +	} else { +		*dest = def; +	} +} + +conf_t *conf_load( int argc, char *argv[] )  +{ +	conf_t *conf; +	HKEY key, key_main, key_proxy; +	char *tmp; + +	RegOpenKey(HKEY_CURRENT_USER, "SOFTWARE\\Bitlbee", &key); +	RegOpenKey(key, "main", &key_main); +	RegOpenKey(key, "proxy", &key_proxy); +	 +	memset( &global, 0, sizeof( global_t ) ); +	b_main_init(); + +	conf = g_new0( conf_t,1 ); +	global.conf = conf; +	conf_get_string(key_main, "interface_in", "0.0.0.0", &global.conf->iface_in); +	conf_get_string(key_main, "interface_out", "0.0.0.0", &global.conf->iface_out); +	conf_get_string(key_main, "port", "6667", &global.conf->port); +	conf_get_int(key_main, "verbose", 0, &global.conf->verbose); +	conf_get_string(key_main, "auth_pass", "", &global.conf->auth_pass); +	conf_get_string(key_main, "oper_pass", "", &global.conf->oper_pass); +	conf_get_int(key_main, "ping_interval_timeout", 60, &global.conf->ping_interval); +	conf_get_string(key_main, "hostname", "localhost", &global.conf->hostname); +	conf_get_string(key_main, "configdir", NULL, &global.conf->configdir); +	conf_get_string(key_main, "motdfile", NULL, &global.conf->motdfile); +	conf_get_string(key_main, "helpfile", NULL, &global.helpfile); +	global.conf->runmode = RUNMODE_DAEMON; +	conf_get_int(key_main, "AuthMode", AUTHMODE_OPEN, (int *)&global.conf->authmode); +	conf_get_string(key_proxy, "host", "", &tmp); strcpy(proxyhost, tmp); +	conf_get_string(key_proxy, "user", "", &tmp); strcpy(proxyuser, tmp); +	conf_get_string(key_proxy, "password", "", &tmp); strcpy(proxypass, tmp); +	conf_get_int(key_proxy, "type", PROXY_NONE, &proxytype); +	conf_get_int(key_proxy, "port", 3128, &proxyport); + +	RegCloseKey(key); +	RegCloseKey(key_main); +	RegCloseKey(key_proxy); + +	return conf; +} + +void conf_loaddefaults( irc_t *irc ) +{ +	HKEY key_defaults; +	int i; +	char name[4096], data[4096]; +	DWORD namelen = sizeof(name), datalen = sizeof(data); +	DWORD type; +	if (RegOpenKey(HKEY_LOCAL_MACHINE, "SOFTWARE\\Bitlbee\\defaults", &key_defaults) != ERROR_SUCCESS) { +		return; +	} + +	for (i = 0; RegEnumValue(key_defaults, i, name, &namelen, NULL, &type, data, &datalen) == ERROR_SUCCESS; i++) { +		set_t *s = set_find( &irc->set, name ); +			 +		if( s ) +		{ +			if( s->def ) g_free( s->def ); +			s->def = g_strdup( data ); +		} + +		namelen = sizeof(name); +		datalen = sizeof(data); +	} + +	RegCloseKey(key_defaults); +} + +#ifndef INADDR_NONE +#define INADDR_NONE 0xffffffff +#endif + +int +inet_aton(const char *cp, struct in_addr *addr) +{ +  addr->s_addr = inet_addr(cp); +  return (addr->s_addr == INADDR_NONE) ? 0 : 1; +} + +void log_error(char *msg) +{ +	log_message(LOGLVL_ERROR, "%s", msg); +} + +void log_message(int level, char *message, ...) +{ +	HANDLE  hEventSource; +	LPTSTR  lpszStrings[2]; +	WORD elevel; +	va_list ap; + +	va_start(ap, message); + +	if (debug) { +		vprintf(message, ap); +		putchar('\n'); +		va_end(ap); +		return; +	} + +	hEventSource = RegisterEventSource(NULL, TEXT("bitlbee")); + +	lpszStrings[0] = TEXT("bitlbee"); +	lpszStrings[1] = g_strdup_vprintf(message, ap); +	va_end(ap); + +	switch (level) { +	case LOGLVL_ERROR: elevel = EVENTLOG_ERROR_TYPE; break; +	case LOGLVL_WARNING: elevel = EVENTLOG_WARNING_TYPE; break; +	case LOGLVL_INFO: elevel = EVENTLOG_INFORMATION_TYPE; break; +#ifdef DEBUG +	case LOGLVL_DEBUG: elevel = EVENTLOG_AUDIT_SUCCESS; break; +#endif +	} + +	if (hEventSource != NULL) { +		ReportEvent(hEventSource,  +		elevel, +		0,					 +		0,					 +		NULL,				  +		2,					 +		0,					 +		lpszStrings,		   +		NULL);				 + +		DeregisterEventSource(hEventSource); +	} + +	g_free(lpszStrings[1]); +} + +void log_link(int level, int output) { /* FIXME */ } + +struct tm * +gmtime_r (const time_t *timer, struct tm *result) +{ +	struct tm *local_result; +	local_result = gmtime (timer); + +	if (local_result == NULL || result == NULL) +		return NULL; + +	memcpy (result, local_result, sizeof (result)); +	return result; +}  | 
