X-Git-Url: https://git.mxchange.org/?a=blobdiff_plain;f=mod%2Fdfrn_confirm.php;h=13353a3641c1424acb90f64c5840092b6a2c3e6b;hb=1b14c1733ba9fcd016eb7c8ed79a25633a5d08ae;hp=a8a4b3b99cf3c9f734665fe0b7a18531e8780d1b;hpb=b294ff63024da5629a0d7b6f66aaa9af6d1dd400;p=friendica.git diff --git a/mod/dfrn_confirm.php b/mod/dfrn_confirm.php index a8a4b3b99c..13353a3641 100644 --- a/mod/dfrn_confirm.php +++ b/mod/dfrn_confirm.php @@ -1,339 +1,549 @@ argc > 1) - $node = $a->argv[1]; +function dfrn_confirm_post(&$a,$handsfree = null) { - if(x($_POST,'source_url')) { + if(is_array($handsfree)) { - // We are processing an external confirmation to an introduction created by our user. + // called directly from dfrn_request due to automatic friend acceptance + // any $_POST parameters we may require are supplied in the $handsfree array - $public_key = $_POST['public_key']; - $dfrn_id = $_POST['dfrn_id']; - $source_url = $_POST['source_url']; - $aes_key = $_POST['aes_key']; + $node = $handsfree['node']; + $a->interactive = false; // notice() becomes a no-op since nobody is there to see it - // Find our user's account + } + else { + if($a->argc > 1) + $node = $a->argv[1]; + } - $r = q("SELECT * FROM `user` WHERE `nickname` = '%s' LIMIT 1", - dbesc($node)); + // Main entry point. Our user received a friend request notification (perhaps + // from another site) and clicked 'Approve'. $POST['source_url'] is not set. + // OR we have been called directly from dfrn_request ($handsfree != null) due to + // this being a page type which supports automatic friend acceptance. - if(! count($r)) { - xml_status(3); // failure - } + if(! x($_POST,'source_url')) { - $my_prvkey = $r[0]['prvkey']; - $local_uid = $r[0]['uid']; + $uid = ((is_array($handsfree)) ? $handsfree['uid'] : local_user()); - $decrypted_source_url = ""; + if(! $uid) { + notice( t('Permission denied.') . EOL ); + return; + } - // verify everything + $user = q("SELECT * FROM `user` WHERE `uid` = %d LIMIT 1", + intval($uid) + ); - openssl_private_decrypt($source_url,$decrypted_source_url,$my_prvkey); + if(! $user) { + notice( t('Profile not found.') . EOL ); + return; + } - $ret = q("SELECT * FROM `contact` WHERE `url` = '%s' AND `uid` = %d LIMIT 1", - dbesc($decrypted_source_url), - intval($local_uid)); + // These come from either the friend request notification form or $handsfree array. - if(! count($ret)) { - // this is either a bogus confirmation or we deleted the original introduction. - xml_status(3); + if(is_array($handsfree)) { + $dfrn_id = $handsfree['dfrn_id']; + $intro_id = $handsfree['intro_id']; + $duplex = $handsfree['duplex']; + logger('dfrn_confirm: Confirm in handsfree mode'); + } + else { + $dfrn_id = ((x($_POST,'dfrn_id')) ? notags(trim($_POST['dfrn_id'])) : ""); + $intro_id = intval($_POST['intro_id']); + $duplex = intval($_POST['duplex']); + $cid = intval($_POST['contact_id']); } - // Decrypt all this stuff we just received + logger('dfrn_confirm: Confirming request for dfrn_id (issued) ' . $dfrn_id); - $foreign_pubkey = $ret[0]['site-pubkey']; - $dfrn_record = $ret[0]['id']; - $decrypted_dfrn_id = ""; - openssl_public_decrypt($dfrn_id,$decrypted_dfrn_id,$foreign_pubkey); - if(strlen($aes_key)) { - $decrypted_aes_key = ""; - openssl_private_decrypt($aes_key,$decrypted_aes_key,$my_prvkey); - $dfrn_pubkey = openssl_decrypt($public_key,'AES-256-CBC',$decrypted_aes_key); - } - else { - $dfrn_pubkey = $public_key; + // The other person will have been issued an ID when they first requested friendship. + // Locate their record. At this time, their record will have both pending and blocked set to 1. + // There won't be any dfrn_id if this is a network follower, so use the contact_id instead. + + $r = q("SELECT * FROM `contact` WHERE ( ( `issued-id` != '' AND `issued-id` = '%s' ) OR ( `id` = %d AND `id` != 0 ) ) AND `uid` = %d LIMIT 1", + dbesc($dfrn_id), + intval($cid), + intval($uid) + ); + + if(! count($r)) { + notice( t('Contact not found.') . EOL ); + return; } - $r = q("SELECT * FROM `contact` WHERE `dfrn-id` = '%s' LIMIT 1", - dbesc($decrypted_dfrn_id), - intval($local_uid)); - if(count($r)) - xml_status(1); // Birthday paradox - duplicate dfrn-id + $contact = $r[0]; - $r = q("UPDATE `contact` SET `dfrn-id` = '%s', `pubkey` = '%s' WHERE `id` = %d LIMIT 1", - dbesc($decrypted_dfrn_id), - dbesc($dfrn_pubkey), - intval($dfrn_record)); - if($r) { + $contact_id = $contact['id']; + $relation = $contact['rel']; + $site_pubkey = $contact['site-pubkey']; + $dfrn_confirm = $contact['confirm']; + $aes_allow = $contact['aes_allow']; + + $network = ((strlen($contact['issued-id'])) ? 'dfrn' : 'stat'); - // We're good but now we have to scrape the profile photo and send notifications. + if($network === 'dfrn') { - require_once("Photo.php"); + // Generate a key pair for all further communications with this person. + // We have a keypair for every contact, and a site key for unknown people. + // This provides a means to carry on relationships with other people if + // any single key is compromised. It is a robust key. We're much more + // worried about key leakage than anybody cracking it. - $photo_failure = false; + $res = openssl_pkey_new(array( + 'digest_alg' => 'whirlpool', + 'private_key_bits' => 4096, + 'encrypt_key' => false ) + ); - $r = q("SELECT `photo` FROM `contact` WHERE `id` = %d LIMIT 1", - intval($dfrn_record)); - if(count($r)) { - $filename = basename($r[0]['photo']); - $img_str = fetch_url($r[0]['photo'],true); - $img = new Photo($img_str); - if($img) { + $private_key = ''; - $img->scaleImageSquare(175); - - $hash = hash('md5',uniqid(mt_rand(),true)); + openssl_pkey_export($res, $private_key); - $r = $img->store($local_uid, $dfrn_record, $hash, $filename, t('Contact Photos') , 4); + $pubkey = openssl_pkey_get_details($res); + $public_key = $pubkey["key"]; - if($r === false) - $photo_failure = true; - - $img->scaleImage(80); - $r = $img->store($local_uid, $dfrn_record, $hash, $filename, t('Contact Photos') , 5); + // Save the private key. Send them the public key. - if($r === false) - $photo_failure = true; + $r = q("UPDATE `contact` SET `prvkey` = '%s' WHERE `id` = %d AND `uid` = %d LIMIT 1", + dbesc($private_key), + intval($contact_id), + intval($uid) + ); - $photo = $a->get_baseurl() . '/photo/' . $hash . '-4.jpg'; - $thumb = $a->get_baseurl() . '/photo/' . $hash . '-5.jpg'; - } - else - $photo_failure = true; + $params = array(); + + // Per the protocol document, we will verify both ends by encrypting the dfrn_id with our + // site private key (person on the other end can decrypt it with our site public key). + // Then encrypt our profile URL with the other person's site public key. They can decrypt + // it with their site private key. If the decryption on the other end fails for either + // item, it indicates tampering or key failure on at least one site and we will not be + // able to provide a secure communication pathway. + + // If other site is willing to accept full encryption, (aes_allow is 1 AND we have php5.3 + // or later) then we encrypt the personal public key we send them using AES-256-CBC and a + // random key which is encrypted with their site public key. + + $src_aes_key = random_string(); + + $result = ''; + openssl_private_encrypt($dfrn_id,$result,$user[0]['prvkey']); + + $params['dfrn_id'] = bin2hex($result); + $params['public_key'] = $public_key; + + + $my_url = $a->get_baseurl() . '/profile/' . $user[0]['nickname']; + + openssl_public_encrypt($my_url, $params['source_url'], $site_pubkey); + $params['source_url'] = bin2hex($params['source_url']); + + if($aes_allow && function_exists('openssl_encrypt')) { + openssl_public_encrypt($src_aes_key, $params['aes_key'], $site_pubkey); + $params['aes_key'] = bin2hex($params['aes_key']); + $params['public_key'] = bin2hex(openssl_encrypt($public_key,'AES-256-CBC',$src_aes_key)); } - else - $photo_failure = true; - if($photo_failure) { - $photo = $a->get_baseurl() . '/images/default-profile.jpg'; - $thumb = $a->get_baseurl() . '/images/default-profile-sm.jpg'; + $params['dfrn_version'] = DFRN_PROTOCOL_VERSION ; + if($duplex == 1) + $params['duplex'] = 1; + + logger('dfrn_confirm: Confirm: posted data: ' . print_r($params,true), LOGGER_DATA); + + // POST all this stuff to the other site. + + $res = post_url($dfrn_confirm,$params); + + logger('dfrn_confirm: Confirm: received data: ' . $res, LOGGER_DATA); + + // Now figure out what they responded. Try to be robust if the remote site is + // having difficulty and throwing up errors of some kind. + + $leading_junk = substr($res,0,strpos($res,' $a->config['sitename'], - '$siteurl' => $a->get_baseurl(), - '$username' => $r[0]['username'], - '$email' => $r[0]['email'], - '$fn' => $r[0]['name'], - '$dfrn_url' => $r[0]['url'], - '$uid' => $newuid ) - ); + if(strlen($leading_junk) && get_config('system','debugging')) { - $res = mail($r[0]['email'], t("Introduction accepted at ") . $a->config['sitename'], - $email_tpl,t("From: Administrator@") . $_SERVER[SERVER_NAME] ); - if(!$res) { - notice( t("Email notification failed.") . EOL ); + // This might be more common. Mixed error text and some XML. + // If we're configured for debugging, show the text. Proceed in either case. + + notice( t('Unexpected response from remote site: ') . EOL . $leading_junk . EOL ); + } + + $xml = simplexml_load_string($res); + $status = (int) $xml->status; + $message = unxmlify($xml->message); // human readable text of what may have gone wrong. + switch($status) { + case 0: + notice( t("Confirmation completed successfully.") . EOL); + if(strlen($message)) + notice( t('Remote site reported: ') . $message . EOL); + break; + case 1: + // birthday paradox - generate new dfrn-id and fall through. + $new_dfrn_id = random_string(); + $r = q("UPDATE contact SET `issued-id` = '%s' WHERE `id` = %d AND `uid` = %d LIMIT 1", + dbesc($new_dfrn_id), + intval($contact_id), + intval($uid) + ); + + case 2: + notice( t("Temporary failure. Please wait and try again.") . EOL); + if(strlen($message)) + notice( t('Remote site reported: ') . $message . EOL); + break; + + + case 3: + notice( t("Introduction failed or was revoked.") . EOL); + if(strlen($message)) + notice( t('Remote site reported: ') . $message . EOL); + break; } + + if(($status == 0) && ($intro_id)) { + + // Success. Delete the notification. + + $r = q("DELETE FROM `intro` WHERE `id` = %d AND `uid` = %d LIMIT 1", + intval($intro_id), + intval($uid) + ); + } - xml_status(0); // Success - return; // NOTREACHED + if($status != 0) + return; } - else { - xml_status(2); // Hopefully temporary problem that can be retried. - } - return; // NOTREACHED - ////////////////////// End of this scenario /////////////////////////////////////////////// - } - else { + // We have now established a relationship with the other site. + // Let's make our own personal copy of their profile photo so we don't have + // to always load it from their site. - // We are processing a local confirmation initiated on this system by our user to an external introduction. + require_once("Photo.php"); - $uid = $_SESSION['uid']; + $photos = import_profile_photo($contact['photo'],$uid,$contact_id); + + logger('dfrn_confirm: confirm - imported photos'); + + if($network === 'dfrn') { + + $new_relation = REL_VIP; + if(($relation == REL_FAN) || ($duplex)) + $new_relation = REL_BUD; + + if(($relation == REL_FAN) && ($duplex)) + $duplex = 0; + + $r = q("UPDATE `contact` SET `photo` = '%s', + `thumb` = '%s', + `micro` = '%s', + `rel` = %d, + `name-date` = '%s', + `uri-date` = '%s', + `avatar-date` = '%s', + `blocked` = 0, + `pending` = 0, + `duplex` = %d, + `network` = 'dfrn' WHERE `id` = %d LIMIT 1 + ", + dbesc($photos[0]), + dbesc($photos[1]), + dbesc($photos[2]), + intval($new_relation), + dbesc(datetime_convert()), + dbesc(datetime_convert()), + dbesc(datetime_convert()), + intval($duplex), + intval($contact_id) + ); + } + else { - if(! $uid) { - notice( t("Permission denied.") . EOL ); - return; - } - - $dfrn_id = ((x($_POST,'dfrn_id')) ? notags(trim($_POST['dfrn_id'])) : ""); - $intro_id = intval($_POST['intro_id']); + $notify = ''; + $poll = ''; - $r = q("SELECT * FROM `contact` WHERE `issued-id` = '%s' AND `uid` = %d LIMIT 1", - dbesc($dfrn_id), + // $network !== 'dfrn' + + $arr = lrdd($contact['url']); + if(count($arr)) { + foreach($arr as $link) { + if($link['@attributes']['rel'] === 'salmon') + $notify = $link['@attributes']['href']; + if($link['@attributes']['rel'] === NAMESPACE_FEED) + $poll = $link['@attributes']['href']; + } + } + + $r = q("DELETE FROM `intro` WHERE `id` = %d AND `uid` = %d LIMIT 1", + intval($intro_id), intval($uid) - ); + ); - if((! $r) || (! count($r))) { - notice( t('Node does not exist.') . EOL ); - return; + + $r = q("UPDATE `contact` SET `photo` = '%s', + `thumb` = '%s', + `micro` = '%s', + `name-date` = '%s', + `uri-date` = '%s', + `avatar-date` = '%s', + `notify` = '%s', + `poll` = '%s', + `blocked` = 0, + `pending` = 0, + `network` = 'stat' + WHERE `id` = %d LIMIT 1 + ", + dbesc($photos[0]), + dbesc($photos[1]), + dbesc($photos[2]), + dbesc(datetime_convert()), + dbesc(datetime_convert()), + dbesc(datetime_convert()), + dbesc($notify), + dbesc($poll), + intval($contact_id) + ); } - $contact_id = $r[0]['id']; - $site_pubkey = $r[0]['site-pubkey']; - $dfrn_confirm = $r[0]['confirm']; - $aes_allow = $r[0]['aes_allow']; + if($r === false) + notice( t('Unable to set contact photo.') . EOL); + - $res=openssl_pkey_new(array( - 'digest_alg' => 'whirlpool', - 'private_key_bits' => 4096, - 'encrypt_key' => false )); + // Let's send our user to the contact editor in case they want to + // do anything special with this new friend. + if($handsfree === null) + goaway($a->get_baseurl() . '/contacts/' . intval($contact_id)); + return; //NOTREACHED - $private_key = ''; + } - openssl_pkey_export($res, $private_key); - $pubkey = openssl_pkey_get_details($res); - $public_key = $pubkey["key"]; + // End of first scenario. [Local confirmation of remote friend request]. - $r = q("UPDATE `contact` SET `issued-pubkey` = '%s', `prvkey` = '%s' WHERE `id` = %d AND `uid` = %d LIMIT 1", - dbesc($public_key), - dbesc($private_key), - intval($contact_id), - intval($uid) - ); - $params = array(); + // Begin scenario two. This is the remote response to the above scenario. + // This will take place on the site that originally initiated the friend request. + // In the section above where the confirming party makes a POST and + // retrieves xml status information, they are communicating with the following code. - $src_aes_key = random_string(); - $result = ""; + if(x($_POST,'source_url')) { - openssl_private_encrypt($dfrn_id,$result,$a->user['prvkey']); + // We are processing an external confirmation to an introduction created by our user. - $params['dfrn_id'] = $result; - $params['public_key'] = $public_key; + $public_key = $_POST['public_key']; + $dfrn_id = hex2bin($_POST['dfrn_id']); + $source_url = hex2bin($_POST['source_url']); + $aes_key = $_POST['aes_key']; + $duplex = $_POST['duplex']; + $version_id = (float) $_POST['dfrn_version']; + + logger('dfrn_confirm: requestee contacted: ' . $node); + logger('dfrn_confirm: request: POST=' . print_r($_POST,true), LOGGER_DATA); - openssl_public_encrypt($_SESSION['my_url'], $params['source_url'], $site_pubkey); + // If $aes_key is set, both of these items require unpacking from the hex transport encoding. - if($aes_allow && function_exists('openssl_encrypt')) { - openssl_public_encrypt($src_aes_key, $params['aes_key'], $site_pubkey); - $params['public_key'] = openssl_encrypt($public_key,'AES-256-CBC',$src_aes_key); + if(x($aes_key)) { + $aes_key = hex2bin($aes_key); + $public_key = hex2bin($public_key); } - $res = post_url($dfrn_confirm,$params); + // Find our user's account -// uncomment the following two lines and comment the following xml/status lines -// to debug the remote confirmation section (when both confirmations -// and responses originate on this system) + $r = q("SELECT * FROM `user` WHERE `nickname` = '%s' LIMIT 1", + dbesc($node)); -// echo $res; -// $status = 0; + if(! count($r)) { + $message = t('No user record found for ') . '\'' . $node . '\''; + xml_status(3,$message); // failure + // NOTREACHED + } - $xml = simplexml_load_string($res); - $status = (int) $xml->status; - switch($status) { - case 0: - notice( t("Confirmation completed successfully") . EOL); - break; - case 1: + $my_prvkey = $r[0]['prvkey']; + $local_uid = $r[0]['uid']; - // birthday paradox - generate new dfrn-id and fall through. - $new_dfrn_id = random_string(); - $r = q("UPDATE contact SET `issued-id` = '%s' WHERE `id` = %d AND `uid` = %d LIMIT 1", - dbesc($new_dfrn_id), - intval($contact_id), - intval($uid) - ); + if(! strstr($my_prvkey,'BEGIN RSA PRIVATE KEY')) { + $message = t('Our site encryption key is apparently messed up.'); + xml_status(3,$message); + } + + // verify everything - case 2: - notice( t("Temporary failure. Please wait and try again.") . EOL); - break; + $decrypted_source_url = ""; + openssl_private_decrypt($source_url,$decrypted_source_url,$my_prvkey); - case 3: - notice( t("Introduction failed or was revoked. Cannot complete.") . EOL); - break; + if(! strlen($decrypted_source_url)) { + $message = t('Empty site URL was provided or URL could not be decrypted by us.'); + xml_status(3,$message); + // NOTREACHED } - if(($status == 0 || $status == 3) && ($intro_id)) { - - //delete the notification + $ret = q("SELECT * FROM `contact` WHERE `url` = '%s' AND `uid` = %d LIMIT 1", + dbesc($decrypted_source_url), + intval($local_uid) + ); - $r = q("DELETE FROM `intro` WHERE `id` = %d AND `uid` = %d LIMIT 1", - intval($intro_id), - intval($uid) - ); - + if(! count($ret)) { + // this is either a bogus confirmation (?) or we deleted the original introduction. + $message = t('Contact record was not found for you on our site.'); + xml_status(3,$message); + return; // NOTREACHED } - if($status != 0) - return; - - require_once("Photo.php"); + $relation = $ret[0]['rel']; - $photo_failure = false; + // Decrypt all this stuff we just received - $r = q("SELECT `photo` FROM `contact` WHERE `id` = %d LIMIT 1", - intval($contact_id)); - if(count($r)) { + $foreign_pubkey = $ret[0]['site-pubkey']; + $dfrn_record = $ret[0]['id']; - $filename = basename($r[0]['photo']); - $img_str = fetch_url($r[0]['photo'],true); - $img = new Photo($img_str); - if($img) { + $decrypted_dfrn_id = ""; + openssl_public_decrypt($dfrn_id,$decrypted_dfrn_id,$foreign_pubkey); - $img->scaleImageSquare(175); - - $hash = hash('md5',uniqid(mt_rand(),true)); + if(strlen($aes_key)) { + $decrypted_aes_key = ""; + openssl_private_decrypt($aes_key,$decrypted_aes_key,$my_prvkey); + $dfrn_pubkey = openssl_decrypt($public_key,'AES-256-CBC',$decrypted_aes_key); + } + else { + $dfrn_pubkey = $public_key; + } - $r = $img->store($uid, $contact_id, $hash, $filename, t('Contact Photos'), 4 ); + $r = q("SELECT * FROM `contact` WHERE `dfrn-id` = '%s' LIMIT 1", + dbesc($decrypted_dfrn_id) + ); + if(count($r)) { + $message = t('The ID provided by your system is a duplicate on our system. It should work if you try again.'); + xml_status(1,$message); // Birthday paradox - duplicate dfrn-id + // NOTREACHED + } - if($r === false) - $photo_failure = true; - $img->scaleImage(80); + $r = q("UPDATE `contact` SET `dfrn-id` = '%s', `pubkey` = '%s' WHERE `id` = %d LIMIT 1", + dbesc($decrypted_dfrn_id), + dbesc($dfrn_pubkey), + intval($dfrn_record) + ); + if(! count($r)) { + $message = t('Unable to set your contact credentials on our system.'); + xml_status(3,$message); + } - $r = $img->store($uid, $contact_id, $hash, $filename, t('Contact Photos'), 5 ); + // We're good but now we have to scrape the profile photo and send notifications. - if($r === false) - $photo_failure = true; - $photo = $a->get_baseurl() . '/photo/' . $hash . '-4.jpg'; - $thumb = $a->get_baseurl() . '/photo/' . $hash . '-5.jpg'; - } - else - $photo_failure = true; - } - else - $photo_failure = true; - if($photo_failure) { + $r = q("SELECT `photo` FROM `contact` WHERE `id` = %d LIMIT 1", + intval($dfrn_record)); + + if(count($r)) + $photo = $r[0]['photo']; + else $photo = $a->get_baseurl() . '/images/default-profile.jpg'; - $thumb = $a->get_baseurl() . '/images/default-profile-sm.jpg'; + + require_once("Photo.php"); + + $photos = import_profile_photo($photo,$local_uid,$dfrn_record); + + logger('dfrn_confirm: request - photos imported'); + + $new_relation = REL_FAN; + if(($relation == REL_VIP) || ($duplex)) + $new_relation = REL_BUD; + + if(($relation == REL_VIP) && ($duplex)) + $duplex = 0; + + $r = q("UPDATE `contact` SET + `photo` = '%s', + `thumb` = '%s', + `micro` = '%s', + `rel` = %d, + `name-date` = '%s', + `uri-date` = '%s', + `avatar-date` = '%s', + `blocked` = 0, + `pending` = 0, + `duplex` = %d, + `network` = 'dfrn' WHERE `id` = %d LIMIT 1 + ", + dbesc($photos[0]), + dbesc($photos[1]), + dbesc($photos[2]), + intval($new_relation), + dbesc(datetime_convert()), + dbesc(datetime_convert()), + dbesc(datetime_convert()), + intval($duplex), + intval($dfrn_record) + ); + if($r === false) { // indicates schema is messed up or total db failure + $message = t('Unable to update your contact profile details on our system'); + xml_status(3,$message); } - $r = q("UPDATE `contact` SET `photo` = '%s', `thumb` = '%s', `blocked` = 0, `pending` = 0 WHERE `id` = %d LIMIT 1", - dbesc($photo), - dbesc($thumb), - intval($contact_id) + // Otherwise everything seems to have worked and we are almost done. Yay! + // Send an email notification + + logger('dfrn_confirm: request: info updated'); + + $r = q("SELECT * FROM `contact` LEFT JOIN `user` ON `contact`.`uid` = `user`.`uid` + WHERE `contact`.`id` = %d LIMIT 1", + intval($dfrn_record) ); - if($r === false) - notice( t('Unable to set contact photo.') . EOL); + if((count($r)) && ($r[0]['notify-flags'] & NOTIFY_CONFIRM)) { - goaway($a->get_baseurl() . '/contacts/' . intval($contact_id)); - return; //NOTREACHED + $tpl = (($new_relation == REL_BUD) + ? load_view_file('view/friend_complete_eml.tpl') + : load_view_file('view/intro_complete_eml.tpl')); + + $email_tpl = replace_macros($tpl, array( + '$sitename' => $a->config['sitename'], + '$siteurl' => $a->get_baseurl(), + '$username' => $r[0]['username'], + '$email' => $r[0]['email'], + '$fn' => $r[0]['name'], + '$dfrn_url' => $r[0]['url'], + '$uid' => $newuid ) + ); + + $res = mail($r[0]['email'], t("Connection accepted at ") . $a->config['sitename'], + $email_tpl, 'From: ' . t('Administrator') . '@' . $_SERVER['SERVER_NAME'] ); + if(!$res) { + // pointless throwing an error here and confusing the person at the other end of the wire. + } + } + xml_status(0); // Success + return; // NOTREACHED + ////////////////////// End of this scenario /////////////////////////////////////////////// } - return; + // somebody arrived here by mistake or they are fishing. Send them to the homepage. + + goaway($a->get_baseurl()); + // NOTREACHED + }