2014-02-25 08:28:24 +01:00
|
|
|
/* main.c
|
|
|
|
*
|
|
|
|
*
|
|
|
|
* Copyright (C) 2014 Toxic All Rights Reserved.
|
|
|
|
*
|
|
|
|
* This file is part of Toxic.
|
|
|
|
*
|
|
|
|
* Toxic is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* Toxic is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with Toxic. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*
|
2013-07-30 01:32:39 +02:00
|
|
|
*/
|
|
|
|
|
|
|
|
#include <curses.h>
|
2013-08-08 16:00:12 +02:00
|
|
|
#include <errno.h>
|
2013-07-30 01:32:39 +02:00
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <stdbool.h>
|
|
|
|
#include <stdint.h>
|
2013-08-11 02:59:16 +02:00
|
|
|
#include <signal.h>
|
2013-08-21 23:19:35 +02:00
|
|
|
#include <locale.h>
|
2013-08-23 23:03:44 +02:00
|
|
|
#include <string.h>
|
2013-11-15 01:14:54 +01:00
|
|
|
#include <time.h>
|
2014-03-13 11:06:53 +01:00
|
|
|
#include <pthread.h>
|
2014-06-22 02:18:23 +02:00
|
|
|
#include <getopt.h>
|
2013-08-27 09:45:21 +02:00
|
|
|
#include <netdb.h>
|
2013-08-08 16:00:12 +02:00
|
|
|
#include <sys/stat.h>
|
|
|
|
#include <sys/types.h>
|
2013-08-23 23:03:44 +02:00
|
|
|
#include <sys/socket.h>
|
2014-03-07 03:14:04 +01:00
|
|
|
#include <unistd.h>
|
2014-08-27 05:21:32 +02:00
|
|
|
#include <limits.h>
|
2014-09-14 23:46:28 +02:00
|
|
|
#include <termios.h>
|
2013-08-08 16:00:12 +02:00
|
|
|
|
2013-08-24 04:15:15 +02:00
|
|
|
#include <tox/tox.h>
|
2014-09-14 23:46:28 +02:00
|
|
|
#include <tox/toxencryptsave.h>
|
2013-07-30 01:32:39 +02:00
|
|
|
|
2013-08-08 10:15:07 +02:00
|
|
|
#include "configdir.h"
|
2014-06-22 02:18:23 +02:00
|
|
|
#include "toxic.h"
|
|
|
|
#include "windows.h"
|
2013-08-13 00:50:43 +02:00
|
|
|
#include "friendlist.h"
|
2013-09-21 02:35:03 +02:00
|
|
|
#include "prompt.h"
|
|
|
|
#include "misc_tools.h"
|
2014-06-28 18:14:43 +02:00
|
|
|
#include "file_senders.h"
|
2014-03-25 08:17:22 +01:00
|
|
|
#include "line_info.h"
|
2014-04-07 10:42:10 +02:00
|
|
|
#include "settings.h"
|
2014-06-22 03:41:38 +02:00
|
|
|
#include "log.h"
|
2014-07-21 01:12:13 +02:00
|
|
|
#include "notify.h"
|
2014-07-21 03:25:21 +02:00
|
|
|
#include "device.h"
|
2014-09-06 19:18:42 +02:00
|
|
|
#include "message_queue.h"
|
2013-07-30 01:32:39 +02:00
|
|
|
|
2014-07-21 03:25:21 +02:00
|
|
|
#ifdef _AUDIO
|
2014-04-19 23:58:13 +02:00
|
|
|
#include "audio_call.h"
|
2014-07-21 03:25:21 +02:00
|
|
|
#endif /* _AUDIO */
|
2014-03-07 03:14:04 +01:00
|
|
|
|
2013-08-25 01:16:43 +02:00
|
|
|
#ifndef PACKAGE_DATADIR
|
|
|
|
#define PACKAGE_DATADIR "."
|
|
|
|
#endif
|
2013-09-09 06:56:47 +02:00
|
|
|
|
2014-07-21 03:25:21 +02:00
|
|
|
#ifdef _AUDIO
|
2014-04-19 23:58:13 +02:00
|
|
|
ToxAv *av;
|
2014-07-21 03:25:21 +02:00
|
|
|
#endif /* _AUDIO */
|
2014-03-08 16:36:42 +01:00
|
|
|
|
2013-08-15 12:11:48 +02:00
|
|
|
/* Export for use in Callbacks */
|
|
|
|
char *DATA_FILE = NULL;
|
2014-07-31 18:48:49 +02:00
|
|
|
char *BLOCK_FILE = NULL;
|
2013-09-07 01:59:45 +02:00
|
|
|
ToxWindow *prompt = NULL;
|
2013-07-30 01:32:39 +02:00
|
|
|
|
2014-07-08 20:46:50 +02:00
|
|
|
#define AUTOSAVE_FREQ 60
|
|
|
|
|
2014-03-13 11:06:53 +01:00
|
|
|
struct _Winthread Winthread;
|
2014-09-06 19:18:42 +02:00
|
|
|
struct _cqueue_thread cqueue_thread;
|
2014-07-31 18:48:49 +02:00
|
|
|
struct arg_opts arg_opts;
|
2014-07-21 01:12:13 +02:00
|
|
|
struct user_settings *user_settings_ = NULL;
|
2014-03-13 11:06:53 +01:00
|
|
|
|
2014-09-14 23:46:28 +02:00
|
|
|
#define MIN_PASSWORD_LEN 6
|
2014-09-15 03:49:38 +02:00
|
|
|
#define MAX_PASSWORD_LEN 64
|
2014-09-14 23:46:28 +02:00
|
|
|
|
|
|
|
static struct _user_password {
|
|
|
|
bool data_is_encrypted;
|
2014-09-15 03:49:38 +02:00
|
|
|
char pass[MAX_PASSWORD_LEN + 1];
|
2014-09-14 23:46:28 +02:00
|
|
|
int len;
|
|
|
|
} user_password;
|
|
|
|
|
2014-07-09 02:21:51 +02:00
|
|
|
static void catch_SIGINT(int sig)
|
2013-08-11 02:59:16 +02:00
|
|
|
{
|
2014-07-09 06:05:13 +02:00
|
|
|
Winthread.sig_exit_toxic = true;
|
2014-06-22 02:18:23 +02:00
|
|
|
}
|
|
|
|
|
2014-08-03 06:26:44 +02:00
|
|
|
static void catch_SIGSEGV(int sig)
|
|
|
|
{
|
2014-08-03 21:31:56 +02:00
|
|
|
freopen("/dev/tty", "w", stderr);
|
2014-08-03 06:26:44 +02:00
|
|
|
endwin();
|
|
|
|
fprintf(stderr, "Caught SIGSEGV: Aborting toxic session.\n");
|
|
|
|
exit(EXIT_FAILURE);
|
|
|
|
}
|
|
|
|
|
2014-07-01 05:56:47 +02:00
|
|
|
static void flag_window_resize(int sig)
|
|
|
|
{
|
|
|
|
Winthread.flag_resize = true;
|
|
|
|
}
|
|
|
|
|
2014-08-03 06:26:44 +02:00
|
|
|
static void init_signal_catchers(void)
|
|
|
|
{
|
|
|
|
signal(SIGWINCH, flag_window_resize);
|
|
|
|
signal(SIGINT, catch_SIGINT);
|
|
|
|
signal(SIGSEGV, catch_SIGSEGV);
|
|
|
|
}
|
|
|
|
|
2014-06-22 02:18:23 +02:00
|
|
|
void exit_toxic_success(Tox *m)
|
|
|
|
{
|
|
|
|
store_data(m, DATA_FILE);
|
2014-09-14 23:46:28 +02:00
|
|
|
memset(&user_password, 0, sizeof(struct _user_password));
|
2014-06-28 18:55:05 +02:00
|
|
|
close_all_file_senders(m);
|
2014-08-05 23:38:33 +02:00
|
|
|
kill_all_windows(m);
|
2014-07-09 01:24:44 +02:00
|
|
|
|
2014-06-22 02:18:23 +02:00
|
|
|
free(DATA_FILE);
|
2014-08-02 05:00:52 +02:00
|
|
|
free(BLOCK_FILE);
|
2014-07-21 01:12:13 +02:00
|
|
|
free(user_settings_);
|
2014-07-09 01:24:44 +02:00
|
|
|
|
2014-07-22 20:38:32 +02:00
|
|
|
#ifdef _SOUND_NOTIFY
|
2014-08-02 00:37:02 +02:00
|
|
|
// sound_notify(NULL, self_log_out, NT_ALWAYS, NULL);
|
2014-07-22 20:38:32 +02:00
|
|
|
#endif /* _SOUND_NOTIFY */
|
2014-07-21 01:12:13 +02:00
|
|
|
terminate_notify();
|
2014-07-21 03:25:21 +02:00
|
|
|
#ifdef _AUDIO
|
2014-06-22 02:18:23 +02:00
|
|
|
terminate_audio();
|
2014-07-21 03:25:21 +02:00
|
|
|
#endif /* _AUDIO */
|
2014-06-22 02:18:23 +02:00
|
|
|
tox_kill(m);
|
|
|
|
endwin();
|
|
|
|
exit(EXIT_SUCCESS);
|
|
|
|
}
|
|
|
|
|
|
|
|
void exit_toxic_err(const char *errmsg, int errcode)
|
|
|
|
{
|
|
|
|
if (errmsg == NULL)
|
|
|
|
errmsg = "No error message";
|
|
|
|
|
2014-08-03 21:31:56 +02:00
|
|
|
freopen("/dev/tty", "w", stderr);
|
2014-06-22 02:18:23 +02:00
|
|
|
endwin();
|
|
|
|
fprintf(stderr, "Toxic session aborted with error code %d (%s)\n", errcode, errmsg);
|
|
|
|
exit(EXIT_FAILURE);
|
2013-08-11 02:59:16 +02:00
|
|
|
}
|
|
|
|
|
2013-11-24 03:19:59 +01:00
|
|
|
static void init_term(void)
|
2013-08-07 00:27:51 +02:00
|
|
|
{
|
2014-06-22 02:18:23 +02:00
|
|
|
#if HAVE_WIDECHAR
|
2014-04-19 23:58:13 +02:00
|
|
|
|
2014-06-30 00:14:28 +02:00
|
|
|
if (!arg_opts.default_locale) {
|
|
|
|
if (setlocale(LC_ALL, "") == NULL)
|
|
|
|
exit_toxic_err("Could not set your locale, please check your locale settings or "
|
2014-07-01 05:56:47 +02:00
|
|
|
"disable unicode support with the -d flag.", FATALERR_LOCALE_SET);
|
2014-06-30 00:14:28 +02:00
|
|
|
}
|
|
|
|
|
2013-08-25 00:59:57 +02:00
|
|
|
#endif
|
2014-06-22 02:18:23 +02:00
|
|
|
|
2013-08-16 19:11:09 +02:00
|
|
|
initscr();
|
|
|
|
cbreak();
|
|
|
|
keypad(stdscr, 1);
|
|
|
|
noecho();
|
|
|
|
timeout(100);
|
|
|
|
|
|
|
|
if (has_colors()) {
|
2014-04-02 20:41:19 +02:00
|
|
|
short bg_color = COLOR_BLACK;
|
2013-08-16 19:11:09 +02:00
|
|
|
start_color();
|
2014-04-12 09:10:01 +02:00
|
|
|
|
2014-07-21 01:12:13 +02:00
|
|
|
if (user_settings_->colour_theme == NATIVE_COLS) {
|
2014-04-19 23:58:13 +02:00
|
|
|
if (assume_default_colors(-1, -1) == OK)
|
2014-04-12 09:10:01 +02:00
|
|
|
bg_color = -1;
|
|
|
|
}
|
|
|
|
|
2013-09-05 06:47:33 +02:00
|
|
|
init_pair(0, COLOR_WHITE, COLOR_BLACK);
|
2014-04-02 20:41:19 +02:00
|
|
|
init_pair(1, COLOR_GREEN, bg_color);
|
|
|
|
init_pair(2, COLOR_CYAN, bg_color);
|
|
|
|
init_pair(3, COLOR_RED, bg_color);
|
|
|
|
init_pair(4, COLOR_BLUE, bg_color);
|
|
|
|
init_pair(5, COLOR_YELLOW, bg_color);
|
|
|
|
init_pair(6, COLOR_MAGENTA, bg_color);
|
2013-08-18 04:43:10 +02:00
|
|
|
init_pair(7, COLOR_BLACK, COLOR_BLACK);
|
|
|
|
init_pair(8, COLOR_BLACK, COLOR_WHITE);
|
2013-08-16 19:11:09 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
refresh();
|
2013-07-30 01:32:39 +02:00
|
|
|
}
|
|
|
|
|
2014-08-26 01:26:41 +02:00
|
|
|
static struct _init_messages {
|
|
|
|
char **msgs;
|
|
|
|
int num;
|
|
|
|
} init_messages;
|
|
|
|
|
2014-08-27 05:21:32 +02:00
|
|
|
/* One-time queue for messages created during init. Do not use after program init. */
|
2014-08-26 01:26:41 +02:00
|
|
|
static void queue_init_message(const char *msg)
|
|
|
|
{
|
|
|
|
int i = init_messages.num;
|
|
|
|
++init_messages.num;
|
|
|
|
|
|
|
|
char **new_msgs = realloc(init_messages.msgs, sizeof(char *) * init_messages.num);
|
|
|
|
|
|
|
|
if (new_msgs == NULL)
|
2014-08-26 08:28:05 +02:00
|
|
|
exit_toxic_err("Failed in queue_init_message", FATALERR_MEMORY);
|
2014-08-26 01:26:41 +02:00
|
|
|
|
|
|
|
new_msgs[i] = malloc(MAX_STR_SIZE);
|
|
|
|
|
|
|
|
if (new_msgs[i] == NULL)
|
2014-08-26 08:28:05 +02:00
|
|
|
exit_toxic_err("Failed in queue_init_message", FATALERR_MEMORY);
|
2014-08-26 01:26:41 +02:00
|
|
|
|
|
|
|
snprintf(new_msgs[i], MAX_STR_SIZE, "%s", msg);
|
|
|
|
init_messages.msgs = new_msgs;
|
|
|
|
}
|
|
|
|
|
2014-08-27 05:21:32 +02:00
|
|
|
/* called after messages have been printed to console and are no longer needed */
|
2014-08-26 01:26:41 +02:00
|
|
|
static void cleanup_init_messages(void)
|
|
|
|
{
|
|
|
|
if (init_messages.num <= 0)
|
|
|
|
return;
|
|
|
|
|
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i = 0; i < init_messages.num; ++i)
|
|
|
|
free(init_messages.msgs[i]);
|
|
|
|
|
|
|
|
free(init_messages.msgs);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void print_init_messages(ToxWindow *toxwin)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i = 0; i < init_messages.num; ++i)
|
|
|
|
line_info_add(toxwin, NULL, NULL, NULL, SYS_MSG, 0, 0, init_messages.msgs[i]);
|
|
|
|
}
|
|
|
|
|
2014-08-15 00:45:41 +02:00
|
|
|
static Tox *init_tox(void)
|
2013-08-07 00:27:51 +02:00
|
|
|
{
|
2014-08-15 00:45:41 +02:00
|
|
|
Tox_Options tox_opts;
|
|
|
|
tox_opts.ipv6enabled = !arg_opts.use_ipv4;
|
|
|
|
tox_opts.udp_disabled = arg_opts.force_tcp;
|
2014-08-15 02:31:52 +02:00
|
|
|
tox_opts.proxy_enabled = arg_opts.use_proxy;
|
|
|
|
|
|
|
|
if (tox_opts.proxy_enabled) {
|
|
|
|
tox_opts.proxy_port = arg_opts.proxy_port;
|
|
|
|
snprintf(tox_opts.proxy_address, sizeof(tox_opts.proxy_address), "%s", arg_opts.proxy_address);
|
2014-08-26 01:26:41 +02:00
|
|
|
|
|
|
|
char tmp[48];
|
|
|
|
snprintf(tmp, sizeof(tmp), "Using proxy %s : %d",
|
|
|
|
arg_opts.proxy_address, arg_opts.proxy_port);
|
|
|
|
queue_init_message(tmp);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (tox_opts.udp_disabled) {
|
|
|
|
queue_init_message("UDP disabled");
|
|
|
|
} else if (tox_opts.proxy_enabled) {
|
|
|
|
const char *msg = "WARNING: Using a proxy without disabling UDP may leak your real IP address.";
|
|
|
|
queue_init_message(msg);
|
|
|
|
msg = "Use the -t option to disable UDP.";
|
|
|
|
queue_init_message(msg);
|
2014-08-15 02:31:52 +02:00
|
|
|
}
|
2014-08-15 00:45:41 +02:00
|
|
|
|
2013-08-16 19:11:09 +02:00
|
|
|
/* Init core */
|
2014-08-15 00:45:41 +02:00
|
|
|
Tox *m = tox_new(&tox_opts);
|
|
|
|
|
|
|
|
if (tox_opts.ipv6enabled && m == NULL) {
|
2014-08-26 01:26:41 +02:00
|
|
|
queue_init_message("IPv6 failed to initialize");
|
2014-08-15 00:45:41 +02:00
|
|
|
tox_opts.ipv6enabled = 0;
|
|
|
|
m = tox_new(&tox_opts);
|
2013-12-07 03:43:57 +01:00
|
|
|
}
|
|
|
|
|
2014-08-15 00:45:41 +02:00
|
|
|
if (!tox_opts.ipv6enabled)
|
2014-08-26 01:26:41 +02:00
|
|
|
queue_init_message("Forcing IPv4 connection");
|
2014-08-15 00:45:41 +02:00
|
|
|
|
2014-08-15 02:31:52 +02:00
|
|
|
if (tox_opts.proxy_enabled && m == NULL)
|
2014-08-15 21:13:35 +02:00
|
|
|
exit_toxic_err("Proxy error", FATALERR_PROXY);
|
2014-08-15 02:31:52 +02:00
|
|
|
|
2013-09-11 06:02:27 +02:00
|
|
|
if (m == NULL)
|
2013-09-11 01:34:29 +02:00
|
|
|
return NULL;
|
2013-08-16 19:11:09 +02:00
|
|
|
|
|
|
|
/* Callbacks */
|
2013-11-29 16:14:59 +01:00
|
|
|
tox_callback_connection_status(m, on_connectionchange, NULL);
|
2014-02-23 10:28:33 +01:00
|
|
|
tox_callback_typing_change(m, on_typing_change, NULL);
|
2013-11-29 16:14:59 +01:00
|
|
|
tox_callback_friend_request(m, on_request, NULL);
|
|
|
|
tox_callback_friend_message(m, on_message, NULL);
|
|
|
|
tox_callback_name_change(m, on_nickchange, NULL);
|
|
|
|
tox_callback_user_status(m, on_statuschange, NULL);
|
|
|
|
tox_callback_status_message(m, on_statusmessagechange, NULL);
|
2013-12-11 01:51:40 +01:00
|
|
|
tox_callback_friend_action(m, on_action, NULL);
|
2013-09-15 22:38:38 +02:00
|
|
|
tox_callback_group_invite(m, on_groupinvite, NULL);
|
|
|
|
tox_callback_group_message(m, on_groupmessage, NULL);
|
2013-12-14 02:57:32 +01:00
|
|
|
tox_callback_group_action(m, on_groupaction, NULL);
|
2013-11-29 16:14:59 +01:00
|
|
|
tox_callback_group_namelist_change(m, on_group_namelistchange, NULL);
|
|
|
|
tox_callback_file_send_request(m, on_file_sendrequest, NULL);
|
2013-10-10 10:52:05 +02:00
|
|
|
tox_callback_file_control(m, on_file_control, NULL);
|
|
|
|
tox_callback_file_data(m, on_file_data, NULL);
|
2014-09-07 08:43:53 +02:00
|
|
|
tox_callback_read_receipt(m, on_read_receipt, NULL);
|
2013-10-10 10:52:05 +02:00
|
|
|
|
2013-08-18 17:59:34 +02:00
|
|
|
#ifdef __linux__
|
2014-06-22 02:18:23 +02:00
|
|
|
tox_set_name(m, (uint8_t *) "Cool dude", strlen("Cool dude"));
|
2014-05-08 22:13:33 +02:00
|
|
|
#elif defined(__FreeBSD__)
|
2014-06-22 02:18:23 +02:00
|
|
|
tox_set_name(m, (uint8_t *) "Nerd", strlen("Nerd"));
|
2013-08-19 09:23:40 +02:00
|
|
|
#elif defined(__APPLE__)
|
2014-04-01 04:00:17 +02:00
|
|
|
tox_set_name(m, (uint8_t *) "Hipster", strlen("Hipster")); /* This used to users of other Unixes are hipsters */
|
2013-08-18 17:59:34 +02:00
|
|
|
#else
|
2014-04-01 04:00:17 +02:00
|
|
|
tox_set_name(m, (uint8_t *) "Registered Minix user #4", strlen("Registered Minix user #4"));
|
2013-08-18 17:59:34 +02:00
|
|
|
#endif
|
2013-10-10 10:52:05 +02:00
|
|
|
|
2013-08-16 19:11:09 +02:00
|
|
|
return m;
|
2013-07-30 01:32:39 +02:00
|
|
|
}
|
|
|
|
|
2014-08-11 03:40:19 +02:00
|
|
|
#define MIN_NODE_LINE 50 /* IP: 7 + port: 5 + key: 38 + spaces: 2 = 70. ! (& e.g. tox.im = 6) */
|
|
|
|
#define MAX_NODE_LINE 256 /* Approx max number of chars in a sever line (name + port + key) */
|
2014-03-03 16:55:10 +01:00
|
|
|
#define MAXNODES 50
|
2014-08-11 03:40:19 +02:00
|
|
|
#define NODELEN (MAX_NODE_LINE - TOX_CLIENT_ID_SIZE - 7)
|
2013-08-10 21:46:29 +02:00
|
|
|
|
2014-06-22 02:18:23 +02:00
|
|
|
static struct _toxNodes {
|
|
|
|
int lines;
|
|
|
|
char nodes[MAXNODES][NODELEN];
|
|
|
|
uint16_t ports[MAXNODES];
|
2014-07-07 04:15:35 +02:00
|
|
|
char keys[MAXNODES][TOX_CLIENT_ID_SIZE];
|
2014-06-22 02:18:23 +02:00
|
|
|
} toxNodes;
|
2013-09-15 14:31:59 +02:00
|
|
|
|
2014-08-11 03:40:19 +02:00
|
|
|
static int load_nodelist(const char *filename)
|
2013-08-10 21:46:29 +02:00
|
|
|
{
|
2014-02-23 10:49:41 +01:00
|
|
|
if (!filename)
|
|
|
|
return 1;
|
2013-08-21 01:37:05 +02:00
|
|
|
|
2014-03-04 09:10:07 +01:00
|
|
|
FILE *fp = fopen(filename, "r");
|
2013-08-16 19:11:09 +02:00
|
|
|
|
2013-09-11 06:02:27 +02:00
|
|
|
if (fp == NULL)
|
2013-08-16 19:11:09 +02:00
|
|
|
return 1;
|
|
|
|
|
2014-08-11 03:40:19 +02:00
|
|
|
char line[MAX_NODE_LINE];
|
2014-04-19 23:58:13 +02:00
|
|
|
|
2014-06-22 02:18:23 +02:00
|
|
|
while (fgets(line, sizeof(line), fp) && toxNodes.lines < MAXNODES) {
|
2014-08-11 03:40:19 +02:00
|
|
|
if (strlen(line) > MIN_NODE_LINE) {
|
2014-06-22 02:18:23 +02:00
|
|
|
const char *name = strtok(line, " ");
|
|
|
|
const char *port = strtok(NULL, " ");
|
|
|
|
const char *key_ascii = strtok(NULL, " ");
|
2014-04-19 23:58:13 +02:00
|
|
|
|
2013-09-17 03:21:54 +02:00
|
|
|
/* invalid line */
|
|
|
|
if (name == NULL || port == NULL || key_ascii == NULL)
|
|
|
|
continue;
|
|
|
|
|
2014-06-22 02:18:23 +02:00
|
|
|
snprintf(toxNodes.nodes[toxNodes.lines], sizeof(toxNodes.nodes[toxNodes.lines]), "%s", name);
|
|
|
|
toxNodes.nodes[toxNodes.lines][NODELEN - 1] = 0;
|
2014-08-15 02:34:20 +02:00
|
|
|
toxNodes.ports[toxNodes.lines] = atoi(port);
|
2013-09-17 03:21:54 +02:00
|
|
|
|
2014-07-07 04:15:35 +02:00
|
|
|
char *key_binary = hex_string_to_bin(key_ascii);
|
2014-06-22 02:18:23 +02:00
|
|
|
memcpy(toxNodes.keys[toxNodes.lines], key_binary, TOX_CLIENT_ID_SIZE);
|
2013-09-17 03:21:54 +02:00
|
|
|
free(key_binary);
|
|
|
|
|
2014-06-22 02:18:23 +02:00
|
|
|
toxNodes.lines++;
|
2013-09-15 14:31:59 +02:00
|
|
|
}
|
2013-08-16 19:11:09 +02:00
|
|
|
}
|
|
|
|
|
2013-08-10 21:46:29 +02:00
|
|
|
fclose(fp);
|
2014-08-11 03:40:19 +02:00
|
|
|
|
|
|
|
if (toxNodes.lines < 1)
|
|
|
|
return 1;
|
|
|
|
|
2013-09-15 14:31:59 +02:00
|
|
|
return 0;
|
|
|
|
}
|
2013-08-16 19:11:09 +02:00
|
|
|
|
2014-02-25 01:18:43 +01:00
|
|
|
int init_connection_helper(Tox *m, int line)
|
2013-09-15 14:31:59 +02:00
|
|
|
{
|
2014-08-15 01:51:52 +02:00
|
|
|
return tox_bootstrap_from_address(m, toxNodes.nodes[line], toxNodes.ports[line], (uint8_t *) toxNodes.keys[line]);
|
2013-09-15 14:31:59 +02:00
|
|
|
}
|
2013-08-16 19:11:09 +02:00
|
|
|
|
2014-03-03 16:55:10 +01:00
|
|
|
/* Connects to a random DHT node listed in the DHTnodes file
|
2013-09-15 14:31:59 +02:00
|
|
|
*
|
|
|
|
* return codes:
|
2014-03-03 16:55:10 +01:00
|
|
|
* 1: failed to open node file
|
|
|
|
* 2: no line of sufficient length in node file
|
2014-02-25 01:41:02 +01:00
|
|
|
* 3: failed to resolve name to IP
|
2014-03-03 16:55:10 +01:00
|
|
|
* 4: nodelist file contains no acceptable line
|
2013-09-15 14:31:59 +02:00
|
|
|
*/
|
2014-02-25 01:18:43 +01:00
|
|
|
static bool srvlist_loaded = false;
|
|
|
|
|
2014-02-25 02:08:51 +01:00
|
|
|
#define NUM_INIT_NODES 5
|
|
|
|
|
2013-09-15 14:31:59 +02:00
|
|
|
int init_connection(Tox *m)
|
|
|
|
{
|
2014-06-22 02:18:23 +02:00
|
|
|
if (toxNodes.lines > 0) /* already loaded nodelist */
|
|
|
|
return init_connection_helper(m, rand() % toxNodes.lines) ? 0 : 3;
|
2013-09-15 14:31:59 +02:00
|
|
|
|
|
|
|
/* only once:
|
2014-03-03 16:55:10 +01:00
|
|
|
* - load the nodelist
|
2013-09-15 14:31:59 +02:00
|
|
|
* - connect to "everyone" inside
|
|
|
|
*/
|
2014-02-25 01:18:43 +01:00
|
|
|
if (!srvlist_loaded) {
|
|
|
|
srvlist_loaded = true;
|
2014-06-22 02:18:23 +02:00
|
|
|
int res;
|
|
|
|
|
|
|
|
if (!arg_opts.nodes_path[0])
|
2014-08-11 03:40:19 +02:00
|
|
|
res = load_nodelist(PACKAGE_DATADIR "/DHTnodes");
|
2014-06-22 02:18:23 +02:00
|
|
|
else
|
2014-08-11 03:40:19 +02:00
|
|
|
res = load_nodelist(arg_opts.nodes_path);
|
2013-09-15 14:31:59 +02:00
|
|
|
|
2014-08-11 03:40:19 +02:00
|
|
|
if (res != 0)
|
2013-09-15 14:31:59 +02:00
|
|
|
return res;
|
|
|
|
|
2014-02-25 01:41:02 +01:00
|
|
|
res = 3;
|
2014-02-25 02:08:51 +01:00
|
|
|
int i;
|
2014-06-22 02:18:23 +02:00
|
|
|
int n = MIN(NUM_INIT_NODES, toxNodes.lines);
|
2013-09-15 14:31:59 +02:00
|
|
|
|
2014-04-19 23:58:13 +02:00
|
|
|
for (i = 0; i < n; ++i) {
|
2014-06-22 02:18:23 +02:00
|
|
|
if (init_connection_helper(m, rand() % toxNodes.lines))
|
2013-09-17 03:21:54 +02:00
|
|
|
res = 0;
|
2014-03-13 11:06:53 +01:00
|
|
|
}
|
2013-09-15 14:31:59 +02:00
|
|
|
|
|
|
|
return res;
|
|
|
|
}
|
2013-08-16 19:11:09 +02:00
|
|
|
|
2014-03-03 16:55:10 +01:00
|
|
|
/* empty nodelist file */
|
2014-02-25 01:41:02 +01:00
|
|
|
return 4;
|
2013-08-10 21:46:29 +02:00
|
|
|
}
|
|
|
|
|
2014-07-10 04:11:31 +02:00
|
|
|
#define TRY_CONNECT 10 /* Seconds between connection attempts when DHT is not connected */
|
2014-06-22 02:18:23 +02:00
|
|
|
|
2014-02-22 23:58:36 +01:00
|
|
|
static void do_connection(Tox *m, ToxWindow *prompt)
|
2013-08-07 00:27:51 +02:00
|
|
|
{
|
2014-08-13 00:59:27 +02:00
|
|
|
if (arg_opts.no_connect == 1)
|
|
|
|
return;
|
|
|
|
|
2014-07-07 04:15:35 +02:00
|
|
|
char msg[MAX_STR_SIZE] = {0};
|
2014-03-25 08:17:22 +01:00
|
|
|
|
2013-08-16 19:11:09 +02:00
|
|
|
static int conn_err = 0;
|
2014-06-22 02:18:23 +02:00
|
|
|
static bool was_connected = false;
|
|
|
|
static uint64_t last_conn_try = 0;
|
|
|
|
uint64_t curtime = get_unix_time();
|
2014-02-22 23:58:36 +01:00
|
|
|
bool is_connected = tox_isconnected(m);
|
|
|
|
|
2014-06-22 02:18:23 +02:00
|
|
|
if (was_connected && is_connected)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (!was_connected && is_connected) {
|
|
|
|
was_connected = true;
|
|
|
|
prompt_update_connectionstatus(prompt, was_connected);
|
2014-08-26 01:26:41 +02:00
|
|
|
snprintf(msg, sizeof(msg), "DHT connected");
|
2014-06-22 02:18:23 +02:00
|
|
|
} else if (was_connected && !is_connected) {
|
|
|
|
was_connected = false;
|
|
|
|
prompt_update_connectionstatus(prompt, was_connected);
|
|
|
|
snprintf(msg, sizeof(msg), "DHT disconnected. Attempting to reconnect.");
|
|
|
|
} else if (!was_connected && !is_connected && timed_out(last_conn_try, curtime, TRY_CONNECT)) {
|
|
|
|
/* if autoconnect has already failed there's no point in trying again */
|
|
|
|
if (conn_err == 0) {
|
|
|
|
last_conn_try = curtime;
|
|
|
|
|
|
|
|
if ((conn_err = init_connection(m)) != 0)
|
|
|
|
snprintf(msg, sizeof(msg), "Auto-connect failed with error code %d", conn_err);
|
|
|
|
}
|
2013-08-13 04:04:07 +02:00
|
|
|
}
|
2014-03-25 08:17:22 +01:00
|
|
|
|
|
|
|
if (msg[0])
|
2014-07-25 04:43:32 +02:00
|
|
|
line_info_add(prompt, NULL, NULL, NULL, SYS_MSG, 0, 0, msg);
|
2013-07-30 01:32:39 +02:00
|
|
|
}
|
|
|
|
|
2014-03-05 14:01:12 +01:00
|
|
|
static void load_friendlist(Tox *m)
|
|
|
|
{
|
2014-04-11 00:16:27 +02:00
|
|
|
uint32_t i;
|
2014-03-05 14:01:12 +01:00
|
|
|
uint32_t numfriends = tox_count_friendlist(m);
|
|
|
|
|
|
|
|
for (i = 0; i < numfriends; ++i)
|
|
|
|
friendlist_onFriendAdded(NULL, m, i, false);
|
2014-07-31 18:48:49 +02:00
|
|
|
|
|
|
|
sort_friendlist_index();
|
2014-03-05 14:01:12 +01:00
|
|
|
}
|
2013-08-16 02:56:22 +02:00
|
|
|
|
2014-09-14 23:46:28 +02:00
|
|
|
/* return length of password on success, 0 on failure */
|
|
|
|
static int password_prompt(char *buf, int size)
|
|
|
|
{
|
|
|
|
/* disable terminal echo */
|
|
|
|
struct termios oflags, nflags;
|
|
|
|
tcgetattr(fileno(stdin), &oflags);
|
|
|
|
nflags = oflags;
|
|
|
|
nflags.c_lflag &= ~ECHO;
|
|
|
|
nflags.c_lflag |= ECHONL;
|
|
|
|
|
|
|
|
if (tcsetattr(fileno(stdin), TCSANOW, &nflags) != 0)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
fgets(buf, size, stdin);
|
|
|
|
int len = strlen(buf);
|
|
|
|
|
|
|
|
if (len > 0)
|
|
|
|
buf[--len] = '\0'; /* rm newline char */
|
|
|
|
|
|
|
|
/* re-enable terminal echo */
|
|
|
|
if (tcsetattr(fileno(stdin), TCSANOW, &oflags) != 0)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
return len;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Ask user if they would like to encrypt the data file on first usage */
|
|
|
|
static void first_time_running(void)
|
|
|
|
{
|
2014-09-15 03:49:38 +02:00
|
|
|
char ch[5] = {0};
|
2014-09-14 23:46:28 +02:00
|
|
|
|
|
|
|
do {
|
|
|
|
system("clear");
|
2014-09-15 03:49:38 +02:00
|
|
|
printf("Creating new data file. Would you like to encrypt it? Y/n (q to quit)\n");
|
2014-09-14 23:46:28 +02:00
|
|
|
|
2014-09-15 03:49:38 +02:00
|
|
|
if (!strcasecmp(ch, "y\n") || !strcasecmp(ch, "n\n")
|
|
|
|
|| !strcasecmp(ch, "yes\n") || !strcasecmp(ch, "no\n")
|
|
|
|
|| !strcasecmp(ch, "q\n"))
|
2014-09-14 23:46:28 +02:00
|
|
|
break;
|
|
|
|
|
|
|
|
} while (fgets(ch, sizeof(ch), stdin));
|
|
|
|
|
2014-09-15 03:49:38 +02:00
|
|
|
if (ch[0] == 'q' || ch[0] == 'Q')
|
|
|
|
exit(0);
|
|
|
|
|
|
|
|
if (ch[0] == 'y' || ch[0] == 'Y') {
|
|
|
|
int len = 0;
|
|
|
|
printf("Enter a new password (must be at least %d characters)\n", MIN_PASSWORD_LEN);
|
2014-09-14 23:46:28 +02:00
|
|
|
|
2014-09-15 03:49:38 +02:00
|
|
|
while (true) {
|
2014-09-14 23:46:28 +02:00
|
|
|
len = password_prompt(user_password.pass, sizeof(user_password.pass));
|
|
|
|
user_password.len = len;
|
2014-09-15 03:49:38 +02:00
|
|
|
|
|
|
|
if (len >= MIN_PASSWORD_LEN && len <= MAX_PASSWORD_LEN)
|
|
|
|
break;
|
|
|
|
else
|
|
|
|
printf("Password must be between %d and %d characters long.\n", MIN_PASSWORD_LEN, MAX_PASSWORD_LEN);
|
|
|
|
}
|
2014-09-14 23:46:28 +02:00
|
|
|
|
|
|
|
user_password.data_is_encrypted = true;
|
2014-09-15 03:49:38 +02:00
|
|
|
queue_init_message("Data file has been encrypted");
|
2014-09-14 23:46:28 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
system("clear");
|
|
|
|
}
|
|
|
|
|
2013-08-15 12:11:48 +02:00
|
|
|
/*
|
|
|
|
* Store Messenger to given location
|
2014-07-17 09:35:18 +02:00
|
|
|
* Return 0 stored successfully or ignoring data file
|
2014-07-31 18:48:49 +02:00
|
|
|
* Return -1 file path is NULL
|
|
|
|
* Return -2 malloc failed
|
|
|
|
* Return -3 opening path failed
|
|
|
|
* Return -4 fwrite failed
|
2013-08-15 12:11:48 +02:00
|
|
|
*/
|
2014-09-14 23:46:28 +02:00
|
|
|
int store_data(Tox *m, const char *path)
|
2013-08-07 00:27:51 +02:00
|
|
|
{
|
2014-06-22 02:18:23 +02:00
|
|
|
if (arg_opts.ignore_data_file)
|
2013-08-16 02:56:22 +02:00
|
|
|
return 0;
|
2013-08-16 19:11:09 +02:00
|
|
|
|
2013-09-09 06:56:47 +02:00
|
|
|
if (path == NULL)
|
2014-07-31 18:48:49 +02:00
|
|
|
return -1;
|
2013-09-09 06:56:47 +02:00
|
|
|
|
2014-09-14 23:46:28 +02:00
|
|
|
int len = user_password.data_is_encrypted ? tox_encrypted_size(m) : tox_size(m);
|
2014-07-17 09:35:18 +02:00
|
|
|
char *buf = malloc(len);
|
2013-08-16 19:11:09 +02:00
|
|
|
|
2013-09-09 21:33:15 +02:00
|
|
|
if (buf == NULL)
|
2014-07-31 18:48:49 +02:00
|
|
|
return -2;
|
2013-08-16 19:11:09 +02:00
|
|
|
|
2014-09-14 23:46:28 +02:00
|
|
|
if (user_password.data_is_encrypted)
|
|
|
|
tox_encrypted_save(m, (uint8_t *) buf, (uint8_t *) user_password.pass,
|
|
|
|
user_password.len);
|
|
|
|
else
|
|
|
|
tox_save(m, (uint8_t *) buf);
|
2013-07-30 01:32:39 +02:00
|
|
|
|
2014-07-17 09:35:18 +02:00
|
|
|
FILE *fd = fopen(path, "wb");
|
2013-08-16 19:11:09 +02:00
|
|
|
|
2013-08-07 00:27:51 +02:00
|
|
|
if (fd == NULL) {
|
2013-08-15 12:11:48 +02:00
|
|
|
free(buf);
|
2014-07-31 18:48:49 +02:00
|
|
|
return -3;
|
2013-07-30 01:32:39 +02:00
|
|
|
}
|
|
|
|
|
2013-08-15 12:11:48 +02:00
|
|
|
if (fwrite(buf, len, 1, fd) != 1) {
|
|
|
|
free(buf);
|
|
|
|
fclose(fd);
|
2014-07-31 18:48:49 +02:00
|
|
|
return -4;
|
2013-08-15 12:11:48 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
free(buf);
|
|
|
|
fclose(fd);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2013-08-23 23:03:44 +02:00
|
|
|
static void load_data(Tox *m, char *path)
|
2013-08-15 12:11:48 +02:00
|
|
|
{
|
2014-06-22 02:18:23 +02:00
|
|
|
if (arg_opts.ignore_data_file)
|
2013-08-16 02:56:22 +02:00
|
|
|
return;
|
2013-08-16 19:11:09 +02:00
|
|
|
|
2013-08-15 12:11:48 +02:00
|
|
|
FILE *fd;
|
|
|
|
|
2013-09-24 21:23:09 +02:00
|
|
|
if ((fd = fopen(path, "rb")) != NULL) {
|
2013-08-15 12:11:48 +02:00
|
|
|
fseek(fd, 0, SEEK_END);
|
2014-07-17 09:35:18 +02:00
|
|
|
int len = ftell(fd);
|
2013-08-15 12:11:48 +02:00
|
|
|
fseek(fd, 0, SEEK_SET);
|
|
|
|
|
2014-07-17 09:35:18 +02:00
|
|
|
char *buf = malloc(len);
|
2013-08-16 19:11:09 +02:00
|
|
|
|
2013-08-15 12:11:48 +02:00
|
|
|
if (buf == NULL) {
|
|
|
|
fclose(fd);
|
2014-06-22 02:18:23 +02:00
|
|
|
exit_toxic_err("failed in load_data", FATALERR_MEMORY);
|
2013-08-15 12:11:48 +02:00
|
|
|
}
|
2013-08-16 19:11:09 +02:00
|
|
|
|
2013-08-15 12:11:48 +02:00
|
|
|
if (fread(buf, len, 1, fd) != 1) {
|
|
|
|
free(buf);
|
|
|
|
fclose(fd);
|
2014-06-22 02:18:23 +02:00
|
|
|
exit_toxic_err("failed in load_data", FATALERR_FREAD);
|
2013-08-15 12:11:48 +02:00
|
|
|
}
|
2013-08-16 19:11:09 +02:00
|
|
|
|
2014-09-14 23:46:28 +02:00
|
|
|
user_password.data_is_encrypted = tox_is_data_encrypted((uint8_t *) buf);
|
|
|
|
int pwlen = 0;
|
|
|
|
|
|
|
|
if (user_password.data_is_encrypted) {
|
|
|
|
system("clear");
|
2014-09-15 03:49:38 +02:00
|
|
|
printf("Enter password (q to quit)\n");
|
2014-09-14 23:46:28 +02:00
|
|
|
|
2014-09-15 03:49:38 +02:00
|
|
|
while (true) {
|
2014-09-14 23:46:28 +02:00
|
|
|
pwlen = password_prompt(user_password.pass, sizeof(user_password.pass));
|
|
|
|
user_password.len = pwlen;
|
|
|
|
|
2014-09-15 03:49:38 +02:00
|
|
|
if (strcasecmp(user_password.pass, "q") == 0)
|
|
|
|
exit(0);
|
|
|
|
|
|
|
|
if (tox_encrypted_load(m, (uint8_t *) buf, len, (uint8_t *) user_password.pass, pwlen) == 0) {
|
2014-09-14 23:46:28 +02:00
|
|
|
break;
|
|
|
|
} else {
|
|
|
|
sleep(2);
|
2014-09-15 03:49:38 +02:00
|
|
|
system("clear");
|
2014-09-14 23:46:28 +02:00
|
|
|
printf("Invalid password. Try again.\n");
|
|
|
|
}
|
2014-09-15 03:49:38 +02:00
|
|
|
}
|
2014-09-14 23:46:28 +02:00
|
|
|
|
|
|
|
system("clear");
|
|
|
|
} else {
|
|
|
|
tox_load(m, (uint8_t *) buf, len);
|
|
|
|
}
|
|
|
|
|
2014-03-05 14:01:12 +01:00
|
|
|
load_friendlist(m);
|
2014-07-31 18:48:49 +02:00
|
|
|
load_blocklist(BLOCK_FILE);
|
2013-08-15 12:11:48 +02:00
|
|
|
|
|
|
|
free(buf);
|
|
|
|
fclose(fd);
|
|
|
|
} else {
|
2014-07-10 05:40:46 +02:00
|
|
|
if (store_data(m, path) != 0)
|
2014-06-22 02:18:23 +02:00
|
|
|
exit_toxic_err("failed in load_data", FATALERR_STORE_DATA);
|
2013-07-30 01:32:39 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-02-22 23:58:36 +01:00
|
|
|
static void do_toxic(Tox *m, ToxWindow *prompt)
|
|
|
|
{
|
2014-06-30 17:42:11 +02:00
|
|
|
pthread_mutex_lock(&Winthread.lock);
|
2014-02-22 23:58:36 +01:00
|
|
|
do_connection(m, prompt);
|
2014-06-30 08:40:58 +02:00
|
|
|
do_file_senders(m);
|
2014-08-13 01:13:57 +02:00
|
|
|
|
|
|
|
if (arg_opts.no_connect == 0)
|
|
|
|
tox_do(m); /* main tox-core loop */
|
|
|
|
|
2014-07-09 06:05:13 +02:00
|
|
|
pthread_mutex_unlock(&Winthread.lock);
|
2014-03-13 11:06:53 +01:00
|
|
|
}
|
|
|
|
|
2014-07-06 22:18:34 +02:00
|
|
|
#define INACTIVE_WIN_REFRESH_RATE 10
|
|
|
|
|
2014-03-13 11:06:53 +01:00
|
|
|
void *thread_winref(void *data)
|
|
|
|
{
|
|
|
|
Tox *m = (Tox *) data;
|
2014-07-06 22:18:34 +02:00
|
|
|
uint8_t draw_count = 0;
|
2014-03-13 11:06:53 +01:00
|
|
|
|
2014-06-22 02:18:23 +02:00
|
|
|
while (true) {
|
2014-03-13 11:06:53 +01:00
|
|
|
draw_active_window(m);
|
2014-07-06 22:18:34 +02:00
|
|
|
draw_count++;
|
2014-07-01 05:56:47 +02:00
|
|
|
|
|
|
|
if (Winthread.flag_resize) {
|
|
|
|
on_window_resize();
|
|
|
|
Winthread.flag_resize = false;
|
2014-07-06 22:18:34 +02:00
|
|
|
} else if (draw_count >= INACTIVE_WIN_REFRESH_RATE) {
|
2014-07-01 05:56:47 +02:00
|
|
|
refresh_inactive_windows();
|
2014-07-06 22:18:34 +02:00
|
|
|
draw_count = 0;
|
2014-07-01 05:56:47 +02:00
|
|
|
}
|
2014-07-09 06:05:13 +02:00
|
|
|
|
|
|
|
if (Winthread.sig_exit_toxic) {
|
|
|
|
pthread_mutex_lock(&Winthread.lock);
|
|
|
|
exit_toxic_success(m);
|
|
|
|
}
|
2014-06-22 02:18:23 +02:00
|
|
|
}
|
2014-02-22 23:58:36 +01:00
|
|
|
}
|
|
|
|
|
2014-09-06 19:18:42 +02:00
|
|
|
void *thread_cqueue(void *data)
|
|
|
|
{
|
|
|
|
Tox *m = (Tox *) data;
|
|
|
|
|
|
|
|
while (true) {
|
|
|
|
pthread_mutex_lock(&Winthread.lock);
|
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i = 0; i < MAX_WINDOWS_NUM; ++i) {
|
|
|
|
ToxWindow *toxwin = get_window_ptr(i);
|
|
|
|
|
|
|
|
if (toxwin != NULL && toxwin->is_chat && tox_get_friend_connection_status(m, toxwin->num) == 1)
|
2014-09-10 22:18:37 +02:00
|
|
|
cqueue_try_send(toxwin, m);
|
2014-09-06 19:18:42 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
pthread_mutex_unlock(&Winthread.lock);
|
2014-09-09 20:06:28 +02:00
|
|
|
usleep(7000);
|
2014-09-06 19:18:42 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-06-22 02:18:23 +02:00
|
|
|
static void print_usage(void)
|
2014-06-21 01:58:00 +02:00
|
|
|
{
|
2014-06-22 02:18:23 +02:00
|
|
|
fprintf(stderr, "usage: toxic [OPTION] [FILE ...]\n");
|
2014-06-30 00:14:28 +02:00
|
|
|
fprintf(stderr, " -4, --ipv4 Force IPv4 connection\n");
|
2014-08-16 08:35:21 +02:00
|
|
|
fprintf(stderr, " -b --debug Enable stderr for debugging\n");
|
2014-06-30 00:14:28 +02:00
|
|
|
fprintf(stderr, " -c, --config Use specified config file\n");
|
2014-08-26 08:28:05 +02:00
|
|
|
fprintf(stderr, " -d, --default-locale Use default POSIX locale\n");
|
2014-08-13 00:59:27 +02:00
|
|
|
fprintf(stderr, " -f, --file Use specified data file\n");
|
2014-06-30 00:14:28 +02:00
|
|
|
fprintf(stderr, " -h, --help Show this message and exit\n");
|
2014-08-13 00:59:27 +02:00
|
|
|
fprintf(stderr, " -n, --nodes Use specified DHTnodes file\n");
|
|
|
|
fprintf(stderr, " -o, --noconnect Do not connect to the DHT network\n");
|
2014-08-15 02:31:52 +02:00
|
|
|
fprintf(stderr, " -p, --proxy Use proxy: Requires [IP] [port]\n");
|
2014-08-13 01:13:57 +02:00
|
|
|
fprintf(stderr, " -r, --dnslist Use specified DNSservers file\n");
|
2014-08-15 02:31:52 +02:00
|
|
|
fprintf(stderr, " -t, --force-tcp Force TCP connection (use this with proxies)\n");
|
2014-08-13 00:59:27 +02:00
|
|
|
fprintf(stderr, " -x, --nodata Ignore data file\n");
|
2014-06-22 02:18:23 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
static void set_default_opts(void)
|
|
|
|
{
|
|
|
|
arg_opts.use_ipv4 = 0;
|
|
|
|
arg_opts.ignore_data_file = 0;
|
2014-08-16 01:04:39 +02:00
|
|
|
arg_opts.debug = 0;
|
2014-06-30 00:14:28 +02:00
|
|
|
arg_opts.default_locale = 0;
|
2014-08-02 19:04:29 +02:00
|
|
|
arg_opts.use_custom_data = 0;
|
2014-08-13 00:59:27 +02:00
|
|
|
arg_opts.no_connect = 0;
|
2014-08-15 00:45:41 +02:00
|
|
|
arg_opts.force_tcp = 0;
|
2014-08-15 02:31:52 +02:00
|
|
|
arg_opts.use_proxy = 0;
|
2014-06-22 02:18:23 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
static void parse_args(int argc, char *argv[])
|
|
|
|
{
|
|
|
|
set_default_opts();
|
|
|
|
|
|
|
|
static struct option long_opts[] = {
|
|
|
|
{"file", required_argument, 0, 'f'},
|
|
|
|
{"nodata", no_argument, 0, 'x'},
|
|
|
|
{"ipv4", no_argument, 0, '4'},
|
2014-08-16 01:04:39 +02:00
|
|
|
{"debug", no_argument, 0, 'b'},
|
2014-08-15 00:45:41 +02:00
|
|
|
{"default-locale", no_argument, 0, 'd'},
|
2014-06-22 02:18:23 +02:00
|
|
|
{"config", required_argument, 0, 'c'},
|
|
|
|
{"nodes", required_argument, 0, 'n'},
|
|
|
|
{"help", no_argument, 0, 'h'},
|
2014-08-13 00:59:27 +02:00
|
|
|
{"noconnect", no_argument, 0, 'o'},
|
2014-08-13 01:13:57 +02:00
|
|
|
{"dnslist", required_argument, 0, 'r'},
|
2014-08-15 00:45:41 +02:00
|
|
|
{"force-tcp", no_argument, 0, 't'},
|
2014-08-15 02:31:52 +02:00
|
|
|
{"proxy", required_argument, 0, 'p'},
|
2014-08-27 20:30:06 +02:00
|
|
|
{NULL, no_argument, NULL, 0},
|
2014-06-22 02:18:23 +02:00
|
|
|
};
|
|
|
|
|
2014-08-16 01:04:39 +02:00
|
|
|
const char *opts_str = "4bdhotxc:f:n:r:p:";
|
2014-06-22 02:18:23 +02:00
|
|
|
int opt, indexptr;
|
|
|
|
|
|
|
|
while ((opt = getopt_long(argc, argv, opts_str, long_opts, &indexptr)) != -1) {
|
|
|
|
switch (opt) {
|
2014-08-13 00:59:27 +02:00
|
|
|
case '4':
|
|
|
|
arg_opts.use_ipv4 = 1;
|
|
|
|
break;
|
|
|
|
|
2014-08-16 01:04:39 +02:00
|
|
|
case 'b':
|
|
|
|
arg_opts.debug = 1;
|
2014-08-26 08:28:05 +02:00
|
|
|
queue_init_message("stderr enabled");
|
2014-08-16 01:04:39 +02:00
|
|
|
break;
|
|
|
|
|
2014-08-13 00:59:27 +02:00
|
|
|
case 'c':
|
|
|
|
snprintf(arg_opts.config_path, sizeof(arg_opts.config_path), "%s", optarg);
|
2014-08-26 08:28:05 +02:00
|
|
|
|
2014-08-28 04:45:11 +02:00
|
|
|
if (!file_exists(arg_opts.config_path))
|
2014-08-26 08:28:05 +02:00
|
|
|
queue_init_message("Config file not found");
|
2014-08-27 05:21:32 +02:00
|
|
|
|
2014-08-13 00:59:27 +02:00
|
|
|
break;
|
|
|
|
|
|
|
|
case 'd':
|
|
|
|
arg_opts.default_locale = 1;
|
2014-08-26 08:28:05 +02:00
|
|
|
queue_init_message("Using default POSIX locale");
|
2014-08-13 00:59:27 +02:00
|
|
|
break;
|
|
|
|
|
2014-06-22 02:18:23 +02:00
|
|
|
case 'f':
|
2014-08-02 19:04:29 +02:00
|
|
|
arg_opts.use_custom_data = 1;
|
2014-06-22 02:18:23 +02:00
|
|
|
DATA_FILE = strdup(optarg);
|
2014-08-02 05:00:52 +02:00
|
|
|
BLOCK_FILE = malloc(strlen(optarg) + strlen("-blocklist") + 1);
|
2014-07-17 09:35:18 +02:00
|
|
|
|
2014-07-31 18:48:49 +02:00
|
|
|
if (DATA_FILE == NULL || BLOCK_FILE == NULL)
|
2014-07-17 09:35:18 +02:00
|
|
|
exit_toxic_err("failed in parse_args", FATALERR_MEMORY);
|
|
|
|
|
2014-08-02 05:00:52 +02:00
|
|
|
strcpy(BLOCK_FILE, optarg);
|
2014-07-31 18:48:49 +02:00
|
|
|
strcat(BLOCK_FILE, "-blocklist");
|
2014-08-26 08:28:05 +02:00
|
|
|
|
2014-08-27 05:21:32 +02:00
|
|
|
char tmp[PATH_MAX];
|
2014-08-26 08:28:05 +02:00
|
|
|
snprintf(tmp, sizeof(tmp), "Using '%s' data file", DATA_FILE);
|
|
|
|
queue_init_message(tmp);
|
2014-06-22 02:18:23 +02:00
|
|
|
break;
|
|
|
|
|
|
|
|
case 'n':
|
|
|
|
snprintf(arg_opts.nodes_path, sizeof(arg_opts.nodes_path), "%s", optarg);
|
2014-08-26 08:28:05 +02:00
|
|
|
|
2014-08-28 04:45:11 +02:00
|
|
|
if (!file_exists(arg_opts.nodes_path))
|
2014-08-26 08:28:05 +02:00
|
|
|
queue_init_message("DHTnodes file not found");
|
|
|
|
|
2014-06-22 02:18:23 +02:00
|
|
|
break;
|
|
|
|
|
2014-08-13 00:59:27 +02:00
|
|
|
case 'o':
|
|
|
|
arg_opts.no_connect = 1;
|
2014-08-26 08:28:05 +02:00
|
|
|
queue_init_message("DHT disabled");
|
2014-08-13 00:59:27 +02:00
|
|
|
break;
|
|
|
|
|
2014-08-15 02:31:52 +02:00
|
|
|
case 'p':
|
|
|
|
arg_opts.use_proxy = 1;
|
|
|
|
snprintf(arg_opts.proxy_address, sizeof(arg_opts.proxy_address), "%s", optarg);
|
2014-08-15 21:13:35 +02:00
|
|
|
|
|
|
|
if (++optind > argc || argv[optind-1][0] == '-')
|
|
|
|
exit_toxic_err("Proxy error", FATALERR_PROXY);
|
|
|
|
|
|
|
|
arg_opts.proxy_port = (uint16_t) atoi(argv[optind-1]);
|
2014-08-15 02:31:52 +02:00
|
|
|
break;
|
|
|
|
|
2014-08-13 01:13:57 +02:00
|
|
|
case 'r':
|
|
|
|
snprintf(arg_opts.dns_path, sizeof(arg_opts.dns_path), "%s", optarg);
|
2014-08-26 08:28:05 +02:00
|
|
|
|
2014-08-28 04:45:11 +02:00
|
|
|
if (!file_exists(arg_opts.dns_path))
|
2014-08-26 08:28:05 +02:00
|
|
|
queue_init_message("DNSservers file not found");
|
|
|
|
|
2014-08-13 01:13:57 +02:00
|
|
|
break;
|
|
|
|
|
2014-08-15 00:45:41 +02:00
|
|
|
case 't':
|
|
|
|
arg_opts.force_tcp = 1;
|
|
|
|
break;
|
|
|
|
|
2014-08-13 00:59:27 +02:00
|
|
|
case 'x':
|
|
|
|
arg_opts.ignore_data_file = 1;
|
2014-08-26 08:28:05 +02:00
|
|
|
queue_init_message("Ignoring data file");
|
2014-06-30 00:14:28 +02:00
|
|
|
break;
|
|
|
|
|
2014-06-22 02:18:23 +02:00
|
|
|
case 'h':
|
|
|
|
default:
|
|
|
|
print_usage();
|
|
|
|
exit(EXIT_SUCCESS);
|
|
|
|
}
|
2014-06-21 01:58:00 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-07-31 18:48:49 +02:00
|
|
|
#define DATANAME "data"
|
|
|
|
#define BLOCKNAME "data-blocklist"
|
2014-09-14 23:46:28 +02:00
|
|
|
static int init_default_data_files(void)
|
2013-08-07 00:27:51 +02:00
|
|
|
{
|
2014-08-02 19:04:29 +02:00
|
|
|
if (arg_opts.use_custom_data)
|
|
|
|
return 0;
|
|
|
|
|
2014-06-22 02:18:23 +02:00
|
|
|
char *user_config_dir = get_user_config_dir();
|
2014-08-03 03:01:40 +02:00
|
|
|
int config_err = create_user_config_dirs(user_config_dir);
|
2014-04-19 23:58:13 +02:00
|
|
|
|
2014-09-14 23:46:28 +02:00
|
|
|
if (config_err) {
|
|
|
|
DATA_FILE = strdup(DATANAME);
|
|
|
|
BLOCK_FILE = strdup(BLOCKNAME);
|
2014-07-17 09:35:18 +02:00
|
|
|
|
2014-09-14 23:46:28 +02:00
|
|
|
if (DATA_FILE == NULL || BLOCK_FILE == NULL)
|
|
|
|
exit_toxic_err("failed in load_data_structures", FATALERR_MEMORY);
|
|
|
|
} else {
|
|
|
|
DATA_FILE = malloc(strlen(user_config_dir) + strlen(CONFIGDIR) + strlen(DATANAME) + 1);
|
|
|
|
BLOCK_FILE = malloc(strlen(user_config_dir) + strlen(CONFIGDIR) + strlen(BLOCKNAME) + 1);
|
2014-04-19 23:58:13 +02:00
|
|
|
|
2014-09-14 23:46:28 +02:00
|
|
|
if (DATA_FILE == NULL || BLOCK_FILE == NULL)
|
|
|
|
exit_toxic_err("failed in load_data_structures", FATALERR_MEMORY);
|
2014-06-22 02:18:23 +02:00
|
|
|
|
2014-09-14 23:46:28 +02:00
|
|
|
strcpy(DATA_FILE, user_config_dir);
|
|
|
|
strcat(DATA_FILE, CONFIGDIR);
|
|
|
|
strcat(DATA_FILE, DATANAME);
|
2014-07-31 18:48:49 +02:00
|
|
|
|
2014-09-14 23:46:28 +02:00
|
|
|
strcpy(BLOCK_FILE, user_config_dir);
|
|
|
|
strcat(BLOCK_FILE, CONFIGDIR);
|
|
|
|
strcat(BLOCK_FILE, BLOCKNAME);
|
2013-08-16 19:11:09 +02:00
|
|
|
}
|
2013-09-14 11:21:38 +02:00
|
|
|
|
2013-08-16 19:11:09 +02:00
|
|
|
free(user_config_dir);
|
2014-07-31 18:48:49 +02:00
|
|
|
return config_err;
|
|
|
|
}
|
|
|
|
|
2014-08-01 19:56:49 +02:00
|
|
|
#define REC_TOX_DO_LOOPS_PER_SEC 25
|
|
|
|
|
|
|
|
/* Adjusts usleep value so that tox_do runs close to the recommended number of times per second */
|
2014-08-01 21:05:10 +02:00
|
|
|
static useconds_t optimal_msleepval(uint64_t *looptimer, uint64_t *loopcount, uint64_t cur_time, useconds_t msleepval)
|
2014-08-01 19:56:49 +02:00
|
|
|
{
|
|
|
|
useconds_t new_sleep = msleepval;
|
|
|
|
++(*loopcount);
|
|
|
|
|
2014-08-01 21:05:10 +02:00
|
|
|
if (*looptimer == cur_time)
|
2014-08-01 19:56:49 +02:00
|
|
|
return new_sleep;
|
|
|
|
|
2014-08-01 21:05:10 +02:00
|
|
|
if (*loopcount != REC_TOX_DO_LOOPS_PER_SEC)
|
|
|
|
new_sleep *= (double) *loopcount / REC_TOX_DO_LOOPS_PER_SEC;
|
2014-08-01 19:56:49 +02:00
|
|
|
|
|
|
|
*looptimer = cur_time;
|
|
|
|
*loopcount = 0;
|
|
|
|
return new_sleep;
|
|
|
|
}
|
|
|
|
|
2014-07-31 18:48:49 +02:00
|
|
|
int main(int argc, char *argv[])
|
|
|
|
{
|
2014-08-03 06:26:44 +02:00
|
|
|
init_signal_catchers();
|
2014-07-31 18:48:49 +02:00
|
|
|
parse_args(argc, argv);
|
2014-08-03 06:26:44 +02:00
|
|
|
|
2014-07-31 18:48:49 +02:00
|
|
|
/* Make sure all written files are read/writeable only by the current user. */
|
|
|
|
umask(S_IRGRP | S_IWGRP | S_IROTH | S_IWOTH);
|
2014-09-14 23:46:28 +02:00
|
|
|
int config_err = init_default_data_files();
|
|
|
|
|
2014-09-15 00:25:13 +02:00
|
|
|
/* if first time using given data file prompt for data encryption */
|
|
|
|
if (!file_exists(DATA_FILE))
|
2014-09-14 23:46:28 +02:00
|
|
|
first_time_running();
|
2013-08-16 19:11:09 +02:00
|
|
|
|
2014-04-07 10:42:10 +02:00
|
|
|
/* init user_settings struct and load settings from conf file */
|
2014-07-21 01:12:13 +02:00
|
|
|
user_settings_ = calloc(1, sizeof(struct user_settings));
|
2014-04-07 10:42:10 +02:00
|
|
|
|
2014-07-21 01:12:13 +02:00
|
|
|
if (user_settings_ == NULL)
|
2014-06-22 02:18:23 +02:00
|
|
|
exit_toxic_err("failed in main", FATALERR_MEMORY);
|
2014-04-07 10:42:10 +02:00
|
|
|
|
2014-09-14 23:46:28 +02:00
|
|
|
const char *p = arg_opts.config_path[0] ? arg_opts.config_path : NULL;
|
2014-07-21 01:12:13 +02:00
|
|
|
int settings_err = settings_load(user_settings_, p);
|
2014-06-22 02:18:23 +02:00
|
|
|
|
2014-08-15 00:45:41 +02:00
|
|
|
Tox *m = init_tox();
|
2014-04-07 12:22:51 +02:00
|
|
|
|
2014-08-16 08:35:21 +02:00
|
|
|
/* enable stderr for debugging */
|
2014-08-16 01:04:39 +02:00
|
|
|
if (!arg_opts.debug)
|
|
|
|
freopen("/dev/null", "w", stderr);
|
2014-08-15 03:31:28 +02:00
|
|
|
|
2014-06-22 02:18:23 +02:00
|
|
|
if (m == NULL)
|
|
|
|
exit_toxic_err("failed in main", FATALERR_NETWORKINIT);
|
2014-04-07 12:22:51 +02:00
|
|
|
|
2014-06-22 02:18:23 +02:00
|
|
|
if (!arg_opts.ignore_data_file)
|
2014-04-12 09:54:43 +02:00
|
|
|
load_data(m, DATA_FILE);
|
|
|
|
|
2014-09-14 23:46:28 +02:00
|
|
|
init_term();
|
2013-09-07 01:59:45 +02:00
|
|
|
prompt = init_windows(m);
|
2014-07-26 01:55:16 +02:00
|
|
|
prompt_init_statusbar(prompt, m);
|
2014-03-13 11:06:53 +01:00
|
|
|
|
2014-06-28 18:14:43 +02:00
|
|
|
/* thread for ncurses stuff */
|
2014-06-22 02:18:23 +02:00
|
|
|
if (pthread_mutex_init(&Winthread.lock, NULL) != 0)
|
|
|
|
exit_toxic_err("failed in main", FATALERR_MUTEX_INIT);
|
2014-03-13 11:06:53 +01:00
|
|
|
|
2014-06-22 02:18:23 +02:00
|
|
|
if (pthread_create(&Winthread.tid, NULL, thread_winref, (void *) m) != 0)
|
|
|
|
exit_toxic_err("failed in main", FATALERR_THREAD_CREATE);
|
2013-08-16 19:11:09 +02:00
|
|
|
|
2014-09-06 19:18:42 +02:00
|
|
|
/* thread for message queue */
|
|
|
|
if (pthread_create(&cqueue_thread.tid, NULL, thread_cqueue, (void *) m) != 0)
|
|
|
|
exit_toxic_err("failed in main", FATALERR_THREAD_CREATE);
|
|
|
|
|
2014-07-21 03:25:21 +02:00
|
|
|
#ifdef _AUDIO
|
2014-03-14 04:30:44 +01:00
|
|
|
|
2014-03-08 16:36:42 +01:00
|
|
|
av = init_audio(prompt, m);
|
2014-07-26 01:55:16 +02:00
|
|
|
|
2014-07-21 01:12:13 +02:00
|
|
|
set_primary_device(input, user_settings_->audio_in_dev);
|
|
|
|
set_primary_device(output, user_settings_->audio_out_dev);
|
2014-08-26 01:26:41 +02:00
|
|
|
|
2014-07-21 03:25:21 +02:00
|
|
|
#elif _SOUND_NOTIFY
|
|
|
|
if ( init_devices() == de_InternalError )
|
2014-08-26 01:26:41 +02:00
|
|
|
queue_init_message("Failed to init audio devices");
|
2014-07-22 20:38:32 +02:00
|
|
|
|
2014-07-21 03:25:21 +02:00
|
|
|
#endif /* _AUDIO */
|
2014-07-21 01:12:13 +02:00
|
|
|
|
2014-07-27 01:49:59 +02:00
|
|
|
init_notify(60, 3000);
|
2014-07-22 20:38:32 +02:00
|
|
|
|
|
|
|
#ifdef _SOUND_NOTIFY
|
2014-08-02 00:37:02 +02:00
|
|
|
// sound_notify(prompt, self_log_in, 0, NULL);
|
2014-07-22 20:38:32 +02:00
|
|
|
#endif /* _SOUND_NOTIFY */
|
2014-07-27 01:49:59 +02:00
|
|
|
|
2014-07-26 01:55:16 +02:00
|
|
|
const char *msg;
|
2014-08-02 00:37:02 +02:00
|
|
|
|
2013-08-14 19:21:36 +02:00
|
|
|
if (config_err) {
|
2014-07-31 18:48:49 +02:00
|
|
|
msg = "Unable to determine configuration directory. Defaulting to 'data' for data file...";
|
2014-08-26 01:26:41 +02:00
|
|
|
queue_init_message(msg);
|
2013-08-16 19:11:09 +02:00
|
|
|
}
|
|
|
|
|
2014-08-15 02:31:52 +02:00
|
|
|
if (settings_err == -1)
|
2014-08-26 01:26:41 +02:00
|
|
|
queue_init_message("Failed to load user settings");
|
2014-08-15 02:31:52 +02:00
|
|
|
|
2014-08-26 01:26:41 +02:00
|
|
|
print_init_messages(prompt);
|
2014-08-27 05:21:32 +02:00
|
|
|
cleanup_init_messages();
|
2014-04-19 23:58:13 +02:00
|
|
|
|
2014-07-16 18:47:14 +02:00
|
|
|
uint64_t last_save = (uint64_t) time(NULL);
|
2014-08-01 19:56:49 +02:00
|
|
|
uint64_t looptimer = last_save;
|
|
|
|
useconds_t msleepval = 40000;
|
|
|
|
uint64_t loopcount = 0;
|
2014-07-08 20:46:50 +02:00
|
|
|
|
2014-03-13 11:06:53 +01:00
|
|
|
while (true) {
|
2014-03-14 04:56:46 +01:00
|
|
|
update_unix_time();
|
2014-02-21 06:45:29 +01:00
|
|
|
do_toxic(m, prompt);
|
2014-07-08 20:46:50 +02:00
|
|
|
uint64_t cur_time = get_unix_time();
|
|
|
|
|
|
|
|
if (timed_out(last_save, cur_time, AUTOSAVE_FREQ)) {
|
2014-07-09 06:05:13 +02:00
|
|
|
pthread_mutex_lock(&Winthread.lock);
|
2014-07-08 20:46:50 +02:00
|
|
|
store_data(m, DATA_FILE);
|
2014-07-09 06:05:13 +02:00
|
|
|
pthread_mutex_unlock(&Winthread.lock);
|
|
|
|
|
2014-07-08 20:46:50 +02:00
|
|
|
last_save = cur_time;
|
|
|
|
}
|
|
|
|
|
2014-08-01 19:56:49 +02:00
|
|
|
msleepval = optimal_msleepval(&looptimer, &loopcount, cur_time, msleepval);
|
|
|
|
usleep(msleepval);
|
2014-03-13 11:06:53 +01:00
|
|
|
}
|
2014-04-19 23:58:13 +02:00
|
|
|
|
2013-08-16 19:11:09 +02:00
|
|
|
return 0;
|
2013-07-30 01:32:39 +02:00
|
|
|
}
|