5 * TODO: Seperate a lot of this into an aim_bos.c.
19 * Should set your current idle time in seconds. Idealy, OSCAR should
20 * do this for us. But, it doesn't. The client must call this to set idle
24 faim_export unsigned long aim_bos_setidle(struct aim_session_t *sess,
25 struct aim_conn_t *conn,
28 return aim_genericreq_l(sess, conn, 0x0001, 0x0011, &idletime);
33 * aim_bos_changevisibility(conn, changtype, namelist)
35 * Changes your visibility depending on changetype:
37 * AIM_VISIBILITYCHANGE_PERMITADD: Lets provided list of names see you
38 * AIM_VISIBILITYCHANGE_PERMIDREMOVE: Removes listed names from permit list
39 * AIM_VISIBILITYCHANGE_DENYADD: Hides you from provided list of names
40 * AIM_VISIBILITYCHANGE_DENYREMOVE: Lets list see you again
42 * list should be a list of
43 * screen names in the form "Screen Name One&ScreenNameTwo&" etc.
45 * Equivelents to options in WinAIM:
46 * - Allow all users to contact me: Send an AIM_VISIBILITYCHANGE_DENYADD
47 * with only your name on it.
48 * - Allow only users on my Buddy List: Send an
49 * AIM_VISIBILITYCHANGE_PERMITADD with the list the same as your
51 * - Allow only the uesrs below: Send an AIM_VISIBILITYCHANGE_PERMITADD
52 * with everyone listed that you want to see you.
53 * - Block all users: Send an AIM_VISIBILITYCHANGE_PERMITADD with only
54 * yourself in the list
55 * - Block the users below: Send an AIM_VISIBILITYCHANGE_DENYADD with
56 * the list of users to be blocked
60 faim_export unsigned long aim_bos_changevisibility(struct aim_session_t *sess,
61 struct aim_conn_t *conn,
65 struct command_tx_struct *newpacket;
69 char *localcpy = NULL;
77 localcpy = (char *) malloc(strlen(denylist)+1);
78 memcpy(localcpy, denylist, strlen(denylist)+1);
80 listcount = aimutil_itemcnt(localcpy, '&');
81 packlen = aimutil_tokslen(localcpy, 99, '&') + listcount + 9;
83 if (!(newpacket = aim_tx_new(AIM_FRAMETYPE_OSCAR, 0x0002, conn, packlen)))
90 case AIM_VISIBILITYCHANGE_PERMITADD: subtype = 0x05; break;
91 case AIM_VISIBILITYCHANGE_PERMITREMOVE: subtype = 0x06; break;
92 case AIM_VISIBILITYCHANGE_DENYADD: subtype = 0x07; break;
93 case AIM_VISIBILITYCHANGE_DENYREMOVE: subtype = 0x08; break;
95 free(newpacket->data);
100 /* We actually DO NOT send a SNAC ID with this one! */
101 aim_putsnac(newpacket->data, 0x0009, subtype, 0x00, 0);
103 j = 10; /* the next byte */
105 for (i=0; (i < (listcount - 1)) && (i < 99); i++)
107 tmpptr = aimutil_itemidx(localcpy, i, '&');
109 newpacket->data[j] = strlen(tmpptr);
110 memcpy(&(newpacket->data[j+1]), tmpptr, strlen(tmpptr));
111 j += strlen(tmpptr)+1;
118 aim_tx_enqueue(sess, newpacket);
120 return (sess->snac_nextid); /* dont increment */
127 * aim_bos_setbuddylist(buddylist)
129 * This just builds the "set buddy list" command then queues it.
131 * buddy_list = "Screen Name One&ScreenNameTwo&";
133 * TODO: Clean this up.
135 * XXX: I can't stress the TODO enough.
138 faim_export unsigned long aim_bos_setbuddylist(struct aim_session_t *sess,
139 struct aim_conn_t *conn,
144 struct command_tx_struct *newpacket;
148 char *localcpy = NULL;
151 len = 10; /* 10B SNAC headers */
153 if (!buddy_list || !(localcpy = (char *) malloc(strlen(buddy_list)+1)))
155 strncpy(localcpy, buddy_list, strlen(buddy_list)+1);
158 tmpptr = strtok(localcpy, "&");
159 while ((tmpptr != NULL) && (i < 150)) {
161 printf("---adding %d: %s (%d)\n", i, tmpptr, strlen(tmpptr));
163 len += 1+strlen(tmpptr);
165 tmpptr = strtok(NULL, "&");
168 printf("*** send buddy list len: %d (%x)\n", len, len);
171 if (!(newpacket = aim_tx_new(AIM_FRAMETYPE_OSCAR, 0x0002, conn, len)))
176 aim_putsnac(newpacket->data, 0x0003, 0x0004, 0x0000, 0);
178 j = 10; /* the next byte */
180 strncpy(localcpy, buddy_list, strlen(buddy_list)+1);
182 tmpptr = strtok(localcpy, "&");
183 while ((tmpptr != NULL) & (i < 150)) {
185 printf("---adding %d: %s (%d)\n", i, tmpptr, strlen(tmpptr));
187 newpacket->data[j] = strlen(tmpptr);
188 memcpy(&(newpacket->data[j+1]), tmpptr, strlen(tmpptr));
189 j += 1+strlen(tmpptr);
191 tmpptr = strtok(NULL, "&");
196 aim_tx_enqueue(sess, newpacket);
200 return (sess->snac_nextid);
204 * aim_bos_setprofile(profile)
206 * Gives BOS your profile.
210 faim_export unsigned long aim_bos_setprofile(struct aim_session_t *sess,
211 struct aim_conn_t *conn,
216 struct command_tx_struct *newpacket;
217 int i = 0, tmp, caplen;
219 if (!(newpacket = aim_tx_new(AIM_FRAMETYPE_OSCAR, 0x0002, conn, 1152+strlen(profile)+1+(awaymsg?strlen(awaymsg):0))))
222 i += aim_putsnac(newpacket->data, 0x0002, 0x004, 0x0000, sess->snac_nextid);
223 i += aim_puttlv_str(newpacket->data+i, 0x0001, strlen("text/x-aolrtf; charset=\"us-ascii\""), "text/x-aolrtf; charset=\"us-ascii\"");
224 i += aim_puttlv_str(newpacket->data+i, 0x0002, strlen(profile), profile);
225 /* why do we send this twice? */
226 i += aim_puttlv_str(newpacket->data+i, 0x0003, strlen("text/x-aolrtf; charset=\"us-ascii\""), "text/x-aolrtf; charset=\"us-ascii\"");
228 /* Away message -- we send this no matter what, even if its blank */
230 i += aim_puttlv_str(newpacket->data+i, 0x0004, strlen(awaymsg), awaymsg);
232 i += aim_puttlv_str(newpacket->data+i, 0x0004, 0x0000, NULL);
234 /* Capability information. */
236 tmp = (i += aimutil_put16(newpacket->data+i, 0x0005));
237 i += aimutil_put16(newpacket->data+i, 0x0000); /* rewritten later */
238 i += (caplen = aim_putcap(newpacket->data+i, 512, caps));
239 aimutil_put16(newpacket->data+tmp, caplen); /* rewrite TLV size */
241 newpacket->commandlen = i;
242 aim_tx_enqueue(sess, newpacket);
244 return (sess->snac_nextid++);
248 * aim_bos_setgroupperm(mask)
250 * Set group permisson mask. Normally 0x1f (all classes).
252 * The group permission mask allows you to keep users of a certain
253 * class or classes from talking to you. The mask should be
254 * a bitwise OR of all the user classes you want to see you.
257 faim_export unsigned long aim_bos_setgroupperm(struct aim_session_t *sess,
258 struct aim_conn_t *conn,
261 return aim_genericreq_l(sess, conn, 0x0009, 0x0004, &mask);
264 faim_internal int aim_parse_bosrights(struct aim_session_t *sess,
265 struct command_rx_struct *command, ...)
267 rxcallback_t userfunc = NULL;
269 struct aim_tlvlist_t *tlvlist;
270 unsigned short maxpermits = 0, maxdenies = 0;
275 if (!(tlvlist = aim_readtlvchain(command->data+10, command->commandlen-10)))
279 * TLV type 0x0001: Maximum number of buddies on permit list.
281 if (aim_gettlv(tlvlist, 0x0001, 1))
282 maxpermits = aim_gettlv16(tlvlist, 0x0001, 1);
285 * TLV type 0x0002: Maximum number of buddies on deny list.
288 if (aim_gettlv(tlvlist, 0x0002, 1))
289 maxdenies = aim_gettlv16(tlvlist, 0x0002, 1);
291 if ((userfunc = aim_callhandler(command->conn, 0x0009, 0x0003)))
292 ret = userfunc(sess, command, maxpermits, maxdenies);
294 aim_freetlvchain(&tlvlist);
300 * aim_bos_clientready()
305 faim_export unsigned long aim_bos_clientready(struct aim_session_t *sess,
306 struct aim_conn_t *conn)
308 #define AIM_TOOL_JAVA 0x0001
309 #define AIM_TOOL_MAC 0x0002
310 #define AIM_TOOL_WIN16 0x0003
311 #define AIM_TOOL_WIN32 0x0004
312 #define AIM_TOOL_MAC68K 0x0005
313 #define AIM_TOOL_MACPPC 0x0006
314 struct aim_tool_version {
315 unsigned short group;
316 unsigned short version;
318 unsigned short toolversion;
320 {0x0001, 0x0003, AIM_TOOL_WIN32, 0x0686},
321 {0x0002, 0x0001, AIM_TOOL_WIN32, 0x0001},
322 {0x0003, 0x0001, AIM_TOOL_WIN32, 0x0001},
323 {0x0004, 0x0001, AIM_TOOL_WIN32, 0x0001},
324 {0x0006, 0x0001, AIM_TOOL_WIN32, 0x0001},
325 {0x0008, 0x0001, AIM_TOOL_WIN32, 0x0001},
326 {0x0009, 0x0001, AIM_TOOL_WIN32, 0x0001},
327 {0x000a, 0x0001, AIM_TOOL_WIN32, 0x0001},
328 {0x000b, 0x0001, AIM_TOOL_WIN32, 0x0001}
331 struct command_tx_struct *newpacket;
332 int toolcount = sizeof(tools)/sizeof(struct aim_tool_version);
334 if (!(newpacket = aim_tx_new(AIM_FRAMETYPE_OSCAR, 0x0002, conn, 1152)))
339 i = aim_putsnac(newpacket->data, 0x0001, 0x0002, 0x0000, sess->snac_nextid);
340 aim_cachesnac(sess, 0x0001, 0x0002, 0x0000, NULL, 0);
342 for (j = 0; j < toolcount; j++) {
343 i += aimutil_put16(newpacket->data+i, tools[j].group);
344 i += aimutil_put16(newpacket->data+i, tools[j].version);
345 i += aimutil_put16(newpacket->data+i, tools[j].tool);
346 i += aimutil_put16(newpacket->data+i, tools[j].toolversion);
349 newpacket->commandlen = i;
352 aim_tx_enqueue(sess, newpacket);
354 return sess->snac_nextid;
358 * Request Rate Information.
361 faim_export unsigned long aim_bos_reqrate(struct aim_session_t *sess,
362 struct aim_conn_t *conn)
364 return aim_genericreq_n(sess, conn, 0x0001, 0x0006);
368 * Rate Information Response Acknowledge.
371 faim_export unsigned long aim_bos_ackrateresp(struct aim_session_t *sess,
372 struct aim_conn_t *conn)
374 struct command_tx_struct *newpacket;
375 int packlen = 20, i=0;
377 if(!(newpacket = aim_tx_new(AIM_FRAMETYPE_OSCAR, 0x0002, conn, packlen)))
378 return (sess->snac_nextid);
382 i = aim_putsnac(newpacket->data, 0x0001, 0x0008, 0x0000, 0);
383 i += aimutil_put16(newpacket->data+i, 0x0001);
384 i += aimutil_put16(newpacket->data+i, 0x0002);
385 i += aimutil_put16(newpacket->data+i, 0x0003);
386 i += aimutil_put16(newpacket->data+i, 0x0004);
387 i += aimutil_put16(newpacket->data+i, 0x0005);
389 newpacket->commandlen = i;
392 aim_tx_enqueue(sess, newpacket);
394 return (sess->snac_nextid);
398 * aim_bos_setprivacyflags()
400 * Sets privacy flags. Normally 0x03.
402 * Bit 1: Allows other AIM users to see how long you've been idle.
403 * Bit 2: Allows other AIM users to see how long you've been a member.
406 faim_export unsigned long aim_bos_setprivacyflags(struct aim_session_t *sess,
407 struct aim_conn_t *conn,
410 return aim_genericreq_l(sess, conn, 0x0001, 0x0014, &flags);
414 * aim_bos_reqpersonalinfo()
416 * Requests the current user's information. Can't go generic on this one
417 * because aparently it uses SNAC flags.
420 faim_export unsigned long aim_bos_reqpersonalinfo(struct aim_session_t *sess,
421 struct aim_conn_t *conn)
423 return aim_genericreq_n(sess, conn, 0x0001, 0x000e);
426 faim_export unsigned long aim_setversions(struct aim_session_t *sess,
427 struct aim_conn_t *conn)
429 struct command_tx_struct *newpacket;
432 if (!(newpacket = aim_tx_new(AIM_FRAMETYPE_OSCAR, 0x0002, conn, 10 + (4*12))))
437 i = aim_putsnac(newpacket->data, 0x0001, 0x0017, 0x0000, sess->snac_nextid);
438 aim_cachesnac(sess, 0x0001, 0x0017, 0x0000, NULL, 0);
440 i += aimutil_put16(newpacket->data+i, 0x0001);
441 i += aimutil_put16(newpacket->data+i, 0x0003);
443 i += aimutil_put16(newpacket->data+i, 0x0013);
444 i += aimutil_put16(newpacket->data+i, 0x0001);
446 i += aimutil_put16(newpacket->data+i, 0x0002);
447 i += aimutil_put16(newpacket->data+i, 0x0001);
449 i += aimutil_put16(newpacket->data+i, 0x0003);
450 i += aimutil_put16(newpacket->data+i, 0x0001);
452 i += aimutil_put16(newpacket->data+i, 0x0004);
453 i += aimutil_put16(newpacket->data+i, 0x0001);
455 i += aimutil_put16(newpacket->data+i, 0x0006);
456 i += aimutil_put16(newpacket->data+i, 0x0001);
458 i += aimutil_put16(newpacket->data+i, 0x0008);
459 i += aimutil_put16(newpacket->data+i, 0x0001);
461 i += aimutil_put16(newpacket->data+i, 0x0009);
462 i += aimutil_put16(newpacket->data+i, 0x0001);
464 i += aimutil_put16(newpacket->data+i, 0x000a);
465 i += aimutil_put16(newpacket->data+i, 0x0001);
467 i += aimutil_put16(newpacket->data+i, 0x000b);
468 i += aimutil_put16(newpacket->data+i, 0x0001);
470 i += aimutil_put16(newpacket->data+i, 0x000c);
471 i += aimutil_put16(newpacket->data+i, 0x0001);
473 newpacket->commandlen = i;
475 aim_tx_enqueue(sess, newpacket);
477 return sess->snac_nextid;
482 * aim_bos_reqservice(serviceid)
487 faim_export unsigned long aim_bos_reqservice(struct aim_session_t *sess,
488 struct aim_conn_t *conn,
491 return aim_genericreq_s(sess, conn, 0x0001, 0x0004, &serviceid);
497 * No-op. WinAIM sends these every 4min or so to keep
498 * the connection alive. Its not real necessary.
501 faim_export unsigned long aim_bos_nop(struct aim_session_t *sess,
502 struct aim_conn_t *conn)
504 return aim_genericreq_n(sess, conn, 0x0001, 0x0016);
510 * No-op. WinAIM 4.x sends these _every minute_ to keep
511 * the connection alive.
513 faim_export unsigned long aim_flap_nop(struct aim_session_t *sess,
514 struct aim_conn_t *conn)
516 struct command_tx_struct *newpacket;
518 if (!(newpacket = aim_tx_new(AIM_FRAMETYPE_OSCAR, 0x0005, conn, 0)))
519 return sess->snac_nextid;
522 newpacket->commandlen = 0;
525 aim_tx_enqueue(sess, newpacket);
527 return (sess->snac_nextid);
531 * aim_bos_reqrights()
533 * Request BOS rights.
536 faim_export unsigned long aim_bos_reqrights(struct aim_session_t *sess,
537 struct aim_conn_t *conn)
539 return aim_genericreq_n(sess, conn, 0x0009, 0x0002);
543 * aim_bos_reqbuddyrights()
545 * Request Buddy List rights.
548 faim_export unsigned long aim_bos_reqbuddyrights(struct aim_session_t *sess,
549 struct aim_conn_t *conn)
551 return aim_genericreq_n(sess, conn, 0x0003, 0x0002);
555 * aim_send_warning(struct aim_session_t *sess,
556 * struct aim_conn_t *conn, char *destsn, int anon)
557 * send a warning to destsn.
558 * anon is anonymous or not;
559 * AIM_WARN_ANON anonymous
561 * returns -1 on error (couldn't alloc packet), next snacid on success.
564 faim_export int aim_send_warning(struct aim_session_t *sess, struct aim_conn_t *conn, char *destsn, int anon)
566 struct command_tx_struct *newpacket;
569 if (!(newpacket = aim_tx_new(AIM_FRAMETYPE_OSCAR, 0x0002, conn, strlen(destsn)+13)))
575 curbyte += aim_putsnac(newpacket->data+curbyte,
576 0x0004, 0x0008, 0x0000, sess->snac_nextid);
578 curbyte += aimutil_put16(newpacket->data+curbyte, (anon & AIM_WARN_ANON)?1:0);
580 curbyte += aimutil_put8(newpacket->data+curbyte, strlen(destsn));
582 curbyte += aimutil_putstr(newpacket->data+curbyte, destsn, strlen(destsn));
584 newpacket->commandlen = curbyte;
587 aim_tx_enqueue(sess, newpacket);
589 return (sess->snac_nextid++);
593 * aim_debugconn_sendconnect()
595 * For aimdebugd. If you don't know what it is, you don't want to.
597 faim_export unsigned long aim_debugconn_sendconnect(struct aim_session_t *sess,
598 struct aim_conn_t *conn)
600 return aim_genericreq_n(sess, conn, AIM_CB_FAM_SPECIAL, AIM_CB_SPECIAL_DEBUGCONN_CONNECT);
604 * Generic routine for sending commands.
607 * I know I can do this in a smarter way...but I'm not thinking straight
610 * I had one big function that handled all three cases, but then it broke
611 * and I split it up into three. But then I fixed it. I just never went
612 * back to the single. I don't see any advantage to doing it either way.
615 faim_internal unsigned long aim_genericreq_n(struct aim_session_t *sess,
616 struct aim_conn_t *conn,
617 u_short family, u_short subtype)
619 struct command_tx_struct *newpacket;
621 if (!(newpacket = aim_tx_new(AIM_FRAMETYPE_OSCAR, 0x0002, conn, 10)))
626 aim_putsnac(newpacket->data, family, subtype, 0x0000, sess->snac_nextid);
628 aim_cachesnac(sess, family, subtype, 0x0000, NULL, 0);
630 aim_tx_enqueue(sess, newpacket);
631 return sess->snac_nextid;
638 faim_internal unsigned long aim_genericreq_l(struct aim_session_t *sess,
639 struct aim_conn_t *conn,
640 u_short family, u_short subtype,
643 struct command_tx_struct *newpacket;
646 /* If we don't have data, there's no reason to use this function */
648 return aim_genericreq_n(sess, conn, family, subtype);
650 if (!(newpacket = aim_tx_new(AIM_FRAMETYPE_OSCAR, 0x0002, conn, 10+sizeof(u_long))))
655 aim_putsnac(newpacket->data, family, subtype, 0x0000, sess->snac_nextid);
656 aim_cachesnac(sess, family, subtype, 0x0000, NULL, 0);
659 newlong = htonl(*longdata);
660 memcpy(&(newpacket->data[10]), &newlong, sizeof(u_long));
662 aim_tx_enqueue(sess, newpacket);
663 return sess->snac_nextid;
666 faim_internal unsigned long aim_genericreq_s(struct aim_session_t *sess,
667 struct aim_conn_t *conn,
668 u_short family, u_short subtype,
671 struct command_tx_struct *newpacket;
674 /* If we don't have data, there's no reason to use this function */
676 return aim_genericreq_n(sess, conn, family, subtype);
678 if (!(newpacket = aim_tx_new(AIM_FRAMETYPE_OSCAR, 0x0002, conn, 10+sizeof(u_short))))
683 aim_putsnac(newpacket->data, family, subtype, 0x0000, sess->snac_nextid);
684 aim_cachesnac(sess, family, subtype, 0x0000, NULL, 0);
687 newshort = htons(*shortdata);
688 memcpy(&(newpacket->data[10]), &newshort, sizeof(u_short));
690 aim_tx_enqueue(sess, newpacket);
691 return sess->snac_nextid;
695 * aim_bos_reqlocaterights()
697 * Request Location services rights.
700 faim_export unsigned long aim_bos_reqlocaterights(struct aim_session_t *sess,
701 struct aim_conn_t *conn)
703 return aim_genericreq_n(sess, conn, 0x0002, 0x0002);
707 * aim_bos_reqicbmparaminfo()
709 * Request ICBM parameter information.
712 faim_export unsigned long aim_bos_reqicbmparaminfo(struct aim_session_t *sess,
713 struct aim_conn_t *conn)
715 return aim_genericreq_n(sess, conn, 0x0004, 0x0004);
719 * Add ICBM parameter? Huh?
721 faim_export unsigned long aim_addicbmparam(struct aim_session_t *sess,
722 struct aim_conn_t *conn)
724 struct command_tx_struct *newpacket;
725 int packlen = 10+16, i=0;
727 if(!(newpacket = aim_tx_new(AIM_FRAMETYPE_OSCAR, 0x0002, conn, packlen)))
728 return (sess->snac_nextid);
732 i = aim_putsnac(newpacket->data, 0x0004, 0x0002, 0x0000, sess->snac_nextid);
733 aim_cachesnac(sess, 0x0004, 0x0002, 0x0000, NULL, 0);
735 i += aimutil_put16(newpacket->data+i, 0x0000);
736 i += aimutil_put16(newpacket->data+i, 0x0000);
737 i += aimutil_put16(newpacket->data+i, 0x0003);
738 i += aimutil_put16(newpacket->data+i, 0x1f40);
739 i += aimutil_put16(newpacket->data+i, 0x03e7);
740 i += aimutil_put16(newpacket->data+i, 0x03e7);
741 i += aimutil_put16(newpacket->data+i, 0x0000);
742 i += aimutil_put16(newpacket->data+i, 0x0000);
744 aim_tx_enqueue(sess, newpacket);
746 return sess->snac_nextid;
750 * Set directory profile data (not the same as aim_bos_setprofile!)
752 faim_export unsigned long aim_setdirectoryinfo(struct aim_session_t *sess, struct aim_conn_t *conn, char *first, char *middle, char *last, char *maiden, char *nickname, char *street, char *city, char *state, char *zip, int country, unsigned short privacy)
754 struct command_tx_struct *newpacket;
755 int packlen = 0, i = 0;
759 if(first) /* TLV 0001 */
760 packlen += (strlen(first) + 4);
762 packlen += (strlen(middle) + 4);
764 packlen += (strlen(last) + 4);
766 packlen += (strlen(maiden) + 4);
768 packlen += (strlen(nickname) + 4);
770 packlen += (strlen(street) + 4);
772 packlen += (strlen(state) + 4);
774 packlen += (strlen(city) + 4);
776 packlen += (strlen(zip) + 4);
778 if(!(newpacket = aim_tx_new(AIM_FRAMETYPE_OSCAR, 0x0002, conn, packlen+10)))
783 i = aim_putsnac(newpacket->data, 0x0002, 0x0009, 0x0000, 0);
785 /* 000a/0002: privacy: 1 to allow search/disp, 0 to disallow */
786 i += aim_puttlv_16(newpacket->data+i, 0x000a, privacy);
790 i += aim_puttlv_str(newpacket->data+i, 0x0001, strlen(first), first);
792 i += aim_puttlv_str(newpacket->data+i, 0x0003, strlen(middle), middle);
794 i += aim_puttlv_str(newpacket->data+i, 0x0002, strlen(last), last);
796 i += aim_puttlv_str(newpacket->data+i, 0x0004, strlen(maiden), maiden);
798 i += aim_puttlv_str(newpacket->data+i, 0x000c, strlen(nickname), nickname);
800 i += aim_puttlv_str(newpacket->data+i, 0x0021, strlen(street), street);
802 i += aim_puttlv_str(newpacket->data+i, 0x0008, strlen(city), city);
804 i += aim_puttlv_str(newpacket->data+i, 0x0007, strlen(state), state);
806 i += aim_puttlv_str(newpacket->data+i, 0x000d, strlen(zip), zip);
808 newpacket->commandlen = i;
811 aim_tx_enqueue(sess, newpacket);
813 return(sess->snac_nextid);
816 faim_export unsigned long aim_setuserinterests(struct aim_session_t *sess, struct aim_conn_t *conn, char *interest1, char *interest2, char *interest3, char *interest4, char *interest5, unsigned short privacy)
818 struct command_tx_struct *newpacket;
819 int packlen = 0, i = 0;
824 packlen += (strlen(interest1) + 4);
826 packlen += (strlen(interest2) + 4);
828 packlen += (strlen(interest3) + 4);
830 packlen += (strlen(interest4) + 4);
832 packlen += (strlen(interest5) + 4) ;
835 if(!(newpacket = aim_tx_new(AIM_FRAMETYPE_OSCAR, 0x0002, conn, packlen+10)))
840 i = aim_putsnac(newpacket->data, 0x0002, 0x000f, 0x0000, 0);
842 /* 000a/0002: 0000 ?? ?privacy? */
843 i += aim_puttlv_16(newpacket->data+i, 0x000a, privacy);
846 i += aim_puttlv_str(newpacket->data+i, 0x000b, strlen(interest1), interest1);
848 i += aim_puttlv_str(newpacket->data+i, 0x000b, strlen(interest2), interest2);
850 i += aim_puttlv_str(newpacket->data+i, 0x000b, strlen(interest3), interest3);
852 i += aim_puttlv_str(newpacket->data+i, 0x000b, strlen(interest4), interest4);
854 i += aim_puttlv_str(newpacket->data+i, 0x000b, strlen(interest1), interest5);
856 newpacket->commandlen = i;
859 aim_tx_enqueue(sess, newpacket);
861 return(sess->snac_nextid);
864 faim_export unsigned long aim_icq_setstatus(struct aim_session_t *sess,
865 struct aim_conn_t *conn,
866 unsigned long status)
868 struct command_tx_struct *newpacket;
872 data = 0x00030000 | status; /* yay for error checking ;^) */
874 if(!(newpacket = aim_tx_new(AIM_FRAMETYPE_OSCAR, 0x0002, conn, 10 + 4)))
879 i = aim_putsnac(newpacket->data, 0x0001, 0x001e, 0x0000, 0x0000001e);
880 i += aim_puttlv_32(newpacket->data+i, 0x0006, data);
882 newpacket->commandlen = i;
885 aim_tx_enqueue(sess, newpacket);
887 return(sess->snac_nextid);