ds2.4.1/bin/
ds2.4.1/extra/creremote/
ds2.4.1/extra/wolfpaw/
ds2.4.1/lib/cmds/admins/
ds2.4.1/lib/cmds/common/
ds2.4.1/lib/cmds/creators/include/
ds2.4.1/lib/cmds/creators/include/SCCS/
ds2.4.1/lib/daemon/services/
ds2.4.1/lib/doc/
ds2.4.1/lib/doc/efun/all/
ds2.4.1/lib/doc/efun/arrays/
ds2.4.1/lib/doc/efun/buffers/
ds2.4.1/lib/doc/efun/compile/
ds2.4.1/lib/doc/efun/floats/
ds2.4.1/lib/doc/efun/functions/
ds2.4.1/lib/doc/efun/general/
ds2.4.1/lib/doc/efun/mixed/
ds2.4.1/lib/doc/efun/numbers/
ds2.4.1/lib/doc/efun/parsing/
ds2.4.1/lib/doc/faq/
ds2.4.1/lib/doc/hbook/
ds2.4.1/lib/doc/help/classes/
ds2.4.1/lib/doc/help/races/
ds2.4.1/lib/doc/lfun/
ds2.4.1/lib/doc/lfun/all/
ds2.4.1/lib/doc/lfun/lib/abilities/
ds2.4.1/lib/doc/lfun/lib/armor/
ds2.4.1/lib/doc/lfun/lib/bot/
ds2.4.1/lib/doc/lfun/lib/clay/
ds2.4.1/lib/doc/lfun/lib/clean/
ds2.4.1/lib/doc/lfun/lib/client/
ds2.4.1/lib/doc/lfun/lib/combat/
ds2.4.1/lib/doc/lfun/lib/connect/
ds2.4.1/lib/doc/lfun/lib/corpse/
ds2.4.1/lib/doc/lfun/lib/creator/
ds2.4.1/lib/doc/lfun/lib/daemon/
ds2.4.1/lib/doc/lfun/lib/damage/
ds2.4.1/lib/doc/lfun/lib/deterioration/
ds2.4.1/lib/doc/lfun/lib/donate/
ds2.4.1/lib/doc/lfun/lib/door/
ds2.4.1/lib/doc/lfun/lib/equip/
ds2.4.1/lib/doc/lfun/lib/file/
ds2.4.1/lib/doc/lfun/lib/fish/
ds2.4.1/lib/doc/lfun/lib/flashlight/
ds2.4.1/lib/doc/lfun/lib/follow/
ds2.4.1/lib/doc/lfun/lib/ftp_client/
ds2.4.1/lib/doc/lfun/lib/ftp_data_connection/
ds2.4.1/lib/doc/lfun/lib/fuel/
ds2.4.1/lib/doc/lfun/lib/genetics/
ds2.4.1/lib/doc/lfun/lib/id/
ds2.4.1/lib/doc/lfun/lib/interactive/
ds2.4.1/lib/doc/lfun/lib/lamp/
ds2.4.1/lib/doc/lfun/lib/leader/
ds2.4.1/lib/doc/lfun/lib/light/
ds2.4.1/lib/doc/lfun/lib/limb/
ds2.4.1/lib/doc/lfun/lib/living/
ds2.4.1/lib/doc/lfun/lib/look/
ds2.4.1/lib/doc/lfun/lib/manipulate/
ds2.4.1/lib/doc/lfun/lib/meal/
ds2.4.1/lib/doc/lfun/lib/messages/
ds2.4.1/lib/doc/lfun/lib/npc/
ds2.4.1/lib/doc/lfun/lib/player/
ds2.4.1/lib/doc/lfun/lib/poison/
ds2.4.1/lib/doc/lfun/lib/position/
ds2.4.1/lib/doc/lfun/lib/potion/
ds2.4.1/lib/doc/lfun/lib/room/
ds2.4.1/lib/doc/lfun/lib/server/
ds2.4.1/lib/doc/lfun/lib/spell/
ds2.4.1/lib/doc/lfun/lib/torch/
ds2.4.1/lib/doc/lfun/lib/vendor/
ds2.4.1/lib/doc/lfun/lib/virt_sky/
ds2.4.1/lib/doc/lfun/lib/weapon/
ds2.4.1/lib/doc/lfun/lib/worn_storage/
ds2.4.1/lib/doc/lpc/basic/
ds2.4.1/lib/doc/lpc/concepts/
ds2.4.1/lib/doc/lpc/constructs/
ds2.4.1/lib/doc/lpc/etc/
ds2.4.1/lib/doc/lpc/intermediate/
ds2.4.1/lib/doc/lpc/types/
ds2.4.1/lib/doc/misc/
ds2.4.1/lib/doc/old/
ds2.4.1/lib/domains/Praxis/adm/
ds2.4.1/lib/domains/Praxis/attic/
ds2.4.1/lib/domains/Praxis/cemetery/mon/
ds2.4.1/lib/domains/Praxis/data/
ds2.4.1/lib/domains/Praxis/death/
ds2.4.1/lib/domains/Praxis/mountains/
ds2.4.1/lib/domains/Praxis/obj/armour/
ds2.4.1/lib/domains/Praxis/obj/magic/
ds2.4.1/lib/domains/Praxis/obj/weapon/
ds2.4.1/lib/domains/Praxis/orc_valley/
ds2.4.1/lib/domains/Ylsrim/
ds2.4.1/lib/domains/Ylsrim/adm/
ds2.4.1/lib/domains/Ylsrim/armor/
ds2.4.1/lib/domains/Ylsrim/broken/
ds2.4.1/lib/domains/Ylsrim/fish/
ds2.4.1/lib/domains/Ylsrim/meal/
ds2.4.1/lib/domains/Ylsrim/npc/
ds2.4.1/lib/domains/Ylsrim/obj/
ds2.4.1/lib/domains/Ylsrim/virtual/
ds2.4.1/lib/domains/Ylsrim/weapon/
ds2.4.1/lib/domains/campus/adm/
ds2.4.1/lib/domains/campus/etc/
ds2.4.1/lib/domains/campus/meals/
ds2.4.1/lib/domains/campus/npc/
ds2.4.1/lib/domains/campus/save/
ds2.4.1/lib/domains/campus/txt/ai/charles/
ds2.4.1/lib/domains/campus/txt/ai/charles/bak2/
ds2.4.1/lib/domains/campus/txt/ai/charles/bak2/bak1/
ds2.4.1/lib/domains/campus/txt/ai/charly/
ds2.4.1/lib/domains/campus/txt/ai/charly/bak/
ds2.4.1/lib/domains/campus/txt/jenny/
ds2.4.1/lib/domains/default/creator/
ds2.4.1/lib/domains/default/doors/
ds2.4.1/lib/domains/default/etc/
ds2.4.1/lib/domains/default/weap/
ds2.4.1/lib/domains/town/doors/
ds2.4.1/lib/domains/town/txt/shame/
ds2.4.1/lib/domains/town/virtual/
ds2.4.1/lib/lib/comp/
ds2.4.1/lib/lib/lvs/
ds2.4.1/lib/lib/user/
ds2.4.1/lib/lib/virtual/
ds2.4.1/lib/log/
ds2.4.1/lib/obj/book_source/
ds2.4.1/lib/obj/include/
ds2.4.1/lib/realms/template/
ds2.4.1/lib/realms/template/adm/
ds2.4.1/lib/realms/template/area/armor/
ds2.4.1/lib/realms/template/area/npc/
ds2.4.1/lib/realms/template/area/obj/
ds2.4.1/lib/realms/template/area/room/
ds2.4.1/lib/realms/template/area/weap/
ds2.4.1/lib/realms/template/bak/
ds2.4.1/lib/realms/template/cmds/
ds2.4.1/lib/save/kills/o/
ds2.4.1/lib/secure/cfg/
ds2.4.1/lib/secure/cfg/classes/
ds2.4.1/lib/secure/cmds/creators/include/
ds2.4.1/lib/secure/cmds/players/
ds2.4.1/lib/secure/cmds/players/include/
ds2.4.1/lib/secure/daemon/include/
ds2.4.1/lib/secure/lib/
ds2.4.1/lib/secure/lib/include/
ds2.4.1/lib/secure/lib/net/include/
ds2.4.1/lib/secure/lib/std/
ds2.4.1/lib/secure/modules/
ds2.4.1/lib/secure/npc/
ds2.4.1/lib/secure/obj/include/
ds2.4.1/lib/secure/room/
ds2.4.1/lib/secure/save/
ds2.4.1/lib/secure/save/boards/
ds2.4.1/lib/secure/save/players/g/
ds2.4.1/lib/secure/scripts/
ds2.4.1/lib/secure/tmp/
ds2.4.1/lib/secure/upgrades/files/
ds2.4.1/lib/secure/verbs/creators/
ds2.4.1/lib/shadows/
ds2.4.1/lib/spells/
ds2.4.1/lib/std/board/
ds2.4.1/lib/std/lib/
ds2.4.1/lib/tmp/
ds2.4.1/lib/verbs/admins/include/
ds2.4.1/lib/verbs/common/
ds2.4.1/lib/verbs/common/include/
ds2.4.1/lib/verbs/creators/include/
ds2.4.1/lib/verbs/players/include/SCCS/
ds2.4.1/lib/verbs/rooms/
ds2.4.1/lib/verbs/rooms/include/
ds2.4.1/lib/www/errors/
ds2.4.1/lib/www/images/
ds2.4.1/v22.2b14/
ds2.4.1/v22.2b14/ChangeLog.old/
ds2.4.1/v22.2b14/Win32/
ds2.4.1/v22.2b14/compat/
ds2.4.1/v22.2b14/compat/simuls/
ds2.4.1/v22.2b14/include/
ds2.4.1/v22.2b14/testsuite/
ds2.4.1/v22.2b14/testsuite/clone/
ds2.4.1/v22.2b14/testsuite/command/
ds2.4.1/v22.2b14/testsuite/data/
ds2.4.1/v22.2b14/testsuite/etc/
ds2.4.1/v22.2b14/testsuite/include/
ds2.4.1/v22.2b14/testsuite/inherit/
ds2.4.1/v22.2b14/testsuite/inherit/master/
ds2.4.1/v22.2b14/testsuite/log/
ds2.4.1/v22.2b14/testsuite/single/
ds2.4.1/v22.2b14/testsuite/single/tests/compiler/
ds2.4.1/v22.2b14/testsuite/single/tests/efuns/
ds2.4.1/v22.2b14/testsuite/single/tests/operators/
ds2.4.1/v22.2b14/testsuite/u/
ds2.4.1/v22.2b14/tmp/
ds2.4.1/win32/
#include <network.h>
#include <message_class.h>
#include <daemons.h>

inherit LIB_DAEMON;
inherit LIB_CLIENT;

string globalmud;
string array allfiles;
string mcolor = "magenta";

mapping RequestedFiles = ([]);

mapping SentMudTokens = ([]);
mapping ReceivedMudTokens = ([]);

mapping OutgoingSessions = ([]);
mapping IncomingSessions = ([]);

string array waiting_auth = ({});
object array Clients = ({});

mixed globalvar, g1, g2;

void StartServer();
void StopServer();

static private void validate() {
    if( !((int)master()->valid_apply(({ "SECURE" }))) )
	error("Illegal attempt to access OOB_D: "+get_stack()+" "+identify(previous_object(-1)));
}

void create(){
    daemon::create();
}

varargs mixed eventBeginOOB(string mud, int token, mixed *data){
    object ob;
    mapping MudList = INTERMUD_D->GetMudList();
    int port = MudList[mud][11]["oob"];
    string ip = MudList[mud][1];
    if(sizeof(MudList[mud][12]) &&
      MudList[mud][12]["ip"] &&
      MudList[mud][12]["ip"] != "127.0.0.1")
	ip = MudList[mud][12]["ip"];
    //tc("IP: "+ip, "cyan");
    //tc("token: "+token, "cyan");
    //tc("port: "+port, "cyan");
    //if(data) tc("data: "+(identify(data)), "cyan");
    validate();
    //tc("?");
    trr("OOB_D.eventBeginOOB, mud: "+mud+", token: "+token,"yellow",MSG_OOB);
    if(!port || !ip) return;
    if(!OutgoingSessions[mud]) OutgoingSessions[mud] = ({});
    if(data && sizeof(data)) ob = new(LIB_OOB, ip, token, port, data);
    else ob = new(LIB_OOB, ip, token, port);
    if(ob){
	trr("OOB_D.eventBeginOOB, ob: "+identify(ob),"yellow",MSG_OOB);
	OutgoingSessions[mud] += ({ ob });
	Clients += ({ ob });
	return ob;
    }
    else {
	trr("OOB_D.eventBeginOOB: there is no new ob created. Weird.","red",MSG_OOB);
	return 0;
    }
}

string clean_fd(string fd){
    if(grepp(fd," ")){
	string *ip_split=explode(fd," ");
	fd = ip_split[0];
    }
    return fd;
}

void Report(){
    validate();
    tc("SentMudTokens: "+identify(SentMudTokens),"yellow");
    tc("ReceivedMudTokens: "+identify(ReceivedMudTokens),"cyan");
    tc("IncomingSessions: "+identify(IncomingSessions),"white");
    tc("OutgoingSessions: "+identify(OutgoingSessions),"green");
    tc("RequestedFiles: "+identify(RequestedFiles),"blue");
}

void SentToken(string mud, int token){
    //trr("OOB_D.SentToken prev: "+identify(previous_object()), mcolor, MSG_OOB);
    if(base_name(previous_object()) != SERVICES_D) return 0;
    if(!SentMudTokens[mud]) SentMudTokens[mud] = ([]);
    SentMudTokens[mud]["token"] = token;
    SentMudTokens[mud]["token_time"] = time();
}

void ReceivedToken(string mud, int token){
    //trr("OOB_D.ReceivedToken prev: "+identify(previous_object()), mcolor, MSG_OOB);
    if(base_name(previous_object()) != SERVICES_D) return 0;
    if(!ReceivedMudTokens[mud]) ReceivedMudTokens[mud] = ([]);
    ReceivedMudTokens[mud]["token"] = token;
    ReceivedMudTokens[mud]["token_time"] = time();
    if(member_array(mud, waiting_auth) != -1){
	//eventWrite( ({ "oob-begin", mud_name(), 1, token }) );
	eventBeginOOB(mud, token);
	waiting_auth -= ({ mud });
    }
}

int AuthenticateReceivedToken(string mud){
    if( ReceivedMudTokens[mud] &&  ReceivedMudTokens[mud]["token"] ) return 1;
    else return 0;
}

mapping GetTokens(string arg){
    //tc("OOB_D.GetTokens prev: "+identify(previous_object()),"yellow");
    if(base_name(previous_object()) != SERVICES_D) return 0;
    if(arg) return ReceivedMudTokens[arg];
    else return copy(ReceivedMudTokens);
}

int RequestToken(string target){
    if(!target || !(target = INTERMUD_D->GetMudName(target))) return 0;
    if(!ReceivedMudTokens[target] || !ReceivedMudTokens[target]["token"])
	INTERMUD_D->eventWrite(({ "auth-mud-req", 5, mud_name(), 0,target, 0 }));
    return 1;
}

varargs mixed RequestBegin(string target, mixed *data){
    string ip;
    int port;
    int token;
    mixed ret = 1;
    validate();
    //tc("OOB_D.RequestBegin hit.");
    //tc("OOB_D.RequestBegin Report:"+this_object()->Report());
    if(!target || !(target = INTERMUD_D->GetMudName(target))) return 0;
    if(!ReceivedMudTokens[target] || !ReceivedMudTokens[target]["token"])
	RequestToken(target);
    ip = INTERMUD_D->GetMudList()[target][1];
    if(sizeof(INTERMUD_D->GetMudList()[target][12]) &&
      INTERMUD_D->GetMudList()[target][12]["ip"] &&
      INTERMUD_D->GetMudList()[target][12]["ip"] != "127.0.0.1")
	ip = INTERMUD_D->GetMudList()[target][12]["ip"];
    port = INTERMUD_D->GetMudList()[target][11]["oob"];
    //tc("ip: "+ip,"white");
    if( eventCreateSocket(ip, port) < 0 ){
	trr("OOB_D.RequestBegin: couldn't create outbound socket",mcolor,MSG_OOB);
	return 0;
    }
    else trr("OOB_D.RequestBegin socket created",mcolor,MSG_OOB);
    //token = ReceivedMudTokens[target]["token"];
    //eventWrite( ({ "oob-begin", mud_name(), 1, ReceivedMudTokens[target]["token"] }) );
    //eventWrite( ({ "oob-begin", mud_name(), 1, token }) );
    if(member_array(target, waiting_auth) == -1 && (!ReceivedMudTokens[target] ||
	!ReceivedMudTokens[target]["token"]) ){
	//waiting_auth += ({ target });
	//tc("1");
	RequestToken(target);
	if(data) call_out( (: RequestBegin( $(target), $(data) ) :), 5);
	else call_out( (: RequestBegin( $(target) ) :), 5);
	return 0;
    }
    else if( ReceivedMudTokens[target] && ReceivedMudTokens[target]["token"] ){
	//tc("2");
	//eventWrite( ({ "oob-begin", mud_name(), 1, token }) );
	if(data && sizeof(data)) 
	    ret = eventBeginOOB(target, ReceivedMudTokens[target]["token"], data);
	else ret = eventBeginOOB(target, ReceivedMudTokens[target]["token"]);
    }
    //tc("OOB_D.RequestBegin: ret: "+identify(ret));
    return ret;
}

int RequestEnd(int fd){
    validate();
    eventWrite( ({ "oob-end", mud_name() }) );
    return 1;
}

varargs void write_data(mixed arg, object oob){
    validate();
    if(sizeof(Clients) && !oob){
	foreach(object ob in Clients){
	    if(ob) ob->write_data(arg);
	}
	return;
    }
    oob->write_data(arg);
}

void eventRead(mixed foo){
    validate();
    //tc("OOB_D.eventRead: "+identify(foo));
}

varargs mixed send_file(string str, object oob){
    string *arr;
    string tmp;
    int i = 0;
    validate();
    //tc("OOB_D.send_file: 1","cyan");
    trr("OOB_D.send_file str: "+identify(str),"cyan",MSG_OOB);
    if(oob) trr("OOB_D.send_file oob: "+identify(oob),"cyan",MSG_OOB);

    if( !str ) trr("You must specify a file to cat.","cyan",MSG_OOB);
    str = trim(str);
    if( !file_exists(str) ) trr("File " + str + " not found.","cyan",MSG_OOB);
    else if( !(tmp = read_file(str)) )
	trr("Unable to read file " + str + ".","cyan",MSG_OOB);
    if( !(tmp = read_file(str)) ) {
	trr("File " + str + " not readable","cyan",MSG_OOB);
	return 0;
    }
    arr = explode(tmp,"\n");
    if(file_size(str) > 60000){
	trr("OOB_D.send_file: file too large. Send of "+str+" %^WHITE%^FAILED%^RESET%^.");
	return 1;
    }
    if(!strsrch(str,"/secure/upgrades/txt/upgrades."))
	str = "/secure/upgrades/txt/upgrades.txt";
    if(!strsrch(str,"/secure/upgrades/txt/mud_info."))
	str = "/secure/sefun/mud_info.c";
    trr("OOB_D.send_file str: "+identify(str),"cyan",MSG_OOB);
    foreach(string line in arr){
	i++;
	if(oob) write_data( ({ "oob-file", str, i, line }), oob );
	else write_data( ({ "oob-file", str, i, line }) );
    }
    trr("OOB_D.send_file: sent.","cyan",MSG_OOB);
    return 1;
}

varargs void call_send_file(string str, object oob){
    g1 = str;
    g2 = oob;
    call_out( (:send_file, g1, g2 :), 2);
}

string FindMud(object ob){
    validate();
    foreach(mixed key, mixed val in OutgoingSessions){
	foreach(mixed element in val){
	    if(ob && ob == element) return key;
	}
    }
    foreach(mixed key, mixed val in IncomingSessions){
	foreach(mixed element in val){
	    if(ob && ob == element) return key;
	}
    }
    return "";
}

void RegisterNewIncoming(string name){
    validate();
    if(!IncomingSessions[name]) IncomingSessions[name] = ({});
    IncomingSessions[name] += ({ previous_object() });
    Clients += ({ previous_object() });
}

void RemoveIncoming(string mud){
    validate();
    trr("OOB_D.RemoveIncoming: "+identify(previous_object())+" is asking to be removed from "+mud,mcolor,MSG_OOB);
    if(!IncomingSessions[mud]) IncomingSessions[mud] = ({});
    IncomingSessions[mud] -= ({ previous_object() });
    Clients -= ({ previous_object() });
}

void AddRequestedFile(string mud, string file){
    validate();
    //tc("OOB_D.AddRequestedFile prev: "+identify(previous_object(-1)));
    if((this_player() && securep(this_player())) || base_name(previous_object()) == LIB_OOB){
	if(!RequestedFiles[mud]) RequestedFiles[mud] = ({});
	RequestedFiles[mud] += ({ file });
    }
    //else tc("OOB_D.AddRequestedFile bad thing.");
}

void RemoveRequestedFile(string mud, string file){
    validate();
    if(base_name(previous_object()) == LIB_OOB){
	if(!RequestedFiles[mud]) RequestedFiles[mud] = ({});
	RequestedFiles[mud] -= ({ file });
    }
}

int AuthenticateFile(string mud, string file){
    if(!RequestedFiles[mud] || member_array(file, RequestedFiles[mud]) == -1) return 0;
    else return 1;
}

mixed SendFile(string str){
    mixed target;
    object which = previous_object();
    string mud = FindMud(which);
    validate();
    trr("OOB_D.SendFile: which: "+file_name(which),mcolor,MSG_OOB);
    if(base_name(which) != LIB_OOB) return 0;
    target = RequestBegin(mud);
    trr("OOB_D.SendFile: target: "+identify(target),mcolor,MSG_OOB);
    trr("OOB_D.SendFile: str: "+identify(str),mcolor,MSG_OOB);
    trr("OOB_D.SendFile: mud: "+identify(mud),mcolor,MSG_OOB);
    if(target && objectp(target)){
	trr("OOB_D.SendFile: target found!",mcolor,MSG_OOB);
	send_file(str, target);
	target->write_data(({"oob-end", "oob-file send complete." }) );
    }
    else {
	trr("OOB_D.SendFile: no target",mcolor,MSG_OOB);
	send_file(str);
	write_data(({"oob-end", "oob-file send complete." }) );
    }
    return 1;}

mixed GetFile(string mud, mixed file){
    validate();
    if(stringp(file)) AddRequestedFile(mud, file);
    else if(arrayp(file))
	foreach(string element in file){
	tc("file: "+element);
	AddRequestedFile(mud, element);
    }
    //tc("file: "+identify(file),"yellow");
    RequestBegin(mud, ({ "oob-file-req", file }) );
    return 1;
}

int eventMajorUpgrade(string mud, string *files){
    int interval = 0;
    validate();
    allfiles = sort_array(files,1);
    globalmud = mud;
    GetFile(globalmud, allfiles);
    //foreach(string element in allfiles){
    //interval += 3;
    //globalvar = element;
    //call_out( (: GetFile, globalmud, globalvar :), interval );
    //}

    return 1;
}

mixed SendMail(mapping mail){
    mixed target;
    validate();
    //tc("ok, mail is: "+identify(mail),"yellow");
    trr("OOB_D.SendMail: mail: "+identify(mail),mcolor,MSG_OOB);
    foreach(mixed key, mixed val in mail){
	//target = RequestBegin(key);
	if(sizeof(val)){
	    foreach(mixed id, mixed message in val){
		//tc("message: "+identify(message));
		target = RequestBegin(key, message);
		trr("OOB_D.SendMail: target: "+identify(target),mcolor,MSG_OOB);
		trr("OOB_D.SendMail: mud: "+identify(key),mcolor,MSG_OOB);
		if(target && objectp(target)){
		    trr("OOB_D.SendMail: target found!",mcolor,MSG_OOB);
		    target->write_data(message);
		}
		else {
		    trr("OOB_D.SendMail: no target",mcolor,MSG_OOB);
		}
	    }
	}
    }
    return 1;
}