4 * The routines for sending/receiving Instant Messages.
11 * Send an ICBM (instant message).
15 * AIM_IMFLAGS_AWAY -- Marks the message as an autoresponse
16 * AIM_IMFLAGS_ACK -- Requests that the server send an ack
17 * when the message is received (of type 0x0004/0x000c)
20 u_long aim_send_im(struct aim_session_t *sess,
21 struct aim_conn_t *conn,
22 char *destsn, u_int flags, char *msg)
26 struct command_tx_struct *newpacket;
28 if (strlen(msg) >= MAXMSGLEN)
31 if (!(newpacket = aim_tx_new(0x0002, conn, strlen(msg)+256)))
34 newpacket->lock = 1; /* lock struct */
37 curbyte += aim_putsnac(newpacket->data+curbyte,
38 0x0004, 0x0006, 0x0000, sess->snac_nextid);
41 * Generate a random message cookie
43 * We could cache these like we do SNAC IDs. (In fact, it
44 * might be a good idea.) In the message error functions,
45 * the 8byte message cookie is returned as well as the
50 curbyte += aimutil_put8(newpacket->data+curbyte, (u_char) random());
55 curbyte += aimutil_put16(newpacket->data+curbyte,0x0001);
58 * Destination SN (prepended with byte length)
60 curbyte += aimutil_put8(newpacket->data+curbyte,strlen(destsn));
61 curbyte += aimutil_putstr(newpacket->data+curbyte, destsn, strlen(destsn));
66 curbyte += aimutil_put16(newpacket->data+curbyte, 0x0002);
67 curbyte += aimutil_put16(newpacket->data+curbyte, strlen(msg) + 0x0d);
72 curbyte += aimutil_put16(newpacket->data+curbyte, 0x0501);
73 curbyte += aimutil_put16(newpacket->data+curbyte, 0x0001);
74 curbyte += aimutil_put16(newpacket->data+curbyte, 0x0101);
75 curbyte += aimutil_put8 (newpacket->data+curbyte, 0x01);
78 * Message block length.
80 curbyte += aimutil_put16(newpacket->data+curbyte, strlen(msg) + 0x04);
85 curbyte += aimutil_put16(newpacket->data+curbyte, 0x0000);
86 curbyte += aimutil_put16(newpacket->data+curbyte, 0x0000);
89 * Message. Not terminated.
91 curbyte += aimutil_putstr(newpacket->data+curbyte,msg, strlen(msg));
94 * Set the Request Acknowledge flag.
96 if (flags & AIM_IMFLAGS_ACK) {
97 curbyte += aimutil_put16(newpacket->data+curbyte,0x0003);
98 curbyte += aimutil_put16(newpacket->data+curbyte,0x0000);
102 * Set the Autoresponse flag.
104 if (flags & AIM_IMFLAGS_AWAY) {
105 curbyte += aimutil_put16(newpacket->data+curbyte,0x0004);
106 curbyte += aimutil_put16(newpacket->data+curbyte,0x0000);
109 newpacket->commandlen = curbyte;
112 aim_tx_enqueue(sess, newpacket);
114 #ifdef USE_SNAC_FOR_IMS
116 struct aim_snac_t snac;
118 snac.id = sess->snac_nextid;
119 snac.family = 0x0004;
123 snac.data = malloc(strlen(destsn)+1);
124 memcpy(snac.data, destsn, strlen(destsn)+1);
126 aim_newsnac(sess, &snac);
129 aim_cleansnacs(sess, 60); /* clean out all SNACs over 60sec old */
132 return (sess->snac_nextid++);
136 * It can easily be said that parsing ICBMs is THE single
137 * most difficult thing to do in the in AIM protocol. In
138 * fact, I think I just did say that.
140 * Below is the best damned solution I've come up with
141 * over the past sixteen months of battling with it. This
142 * can parse both away and normal messages from every client
143 * I have access to. Its not fast, its not clean. But it works.
145 * We should also support at least minimal parsing of
146 * Channel 2, so that we can at least know the name of the
147 * room we're invited to, but obviously can't attend...
150 int aim_parse_incoming_im_middle(struct aim_session_t *sess,
151 struct command_rx_struct *command)
154 rxcallback_t userfunc = NULL;
157 struct aim_tlvlist_t *tlvlist;
158 struct aim_userinfo_s userinfo;
161 memset(&userinfo, 0x00, sizeof(struct aim_userinfo_s));
163 i = 10; /* Skip SNAC header */
166 * Read ICBM Cookie. And throw away.
168 for (z=0; z<8; z++,i++)
169 cookie[z] = command->data[i];
174 * Channel 0x0001 is the message channel. There are
175 * other channels for things called "rendevous"
176 * which represent chat and some of the other new
177 * features of AIM2/3/3.5.
179 * Channel 0x0002 is the Rendevous channel, which
180 * is where Chat Invitiations and various client-client
181 * connection negotiations come from.
184 channel = aimutil_get16(command->data+i);
190 if ((channel != 0x01) && (channel != 0x02))
192 printf("faim: icbm: ICBM received on an unsupported channel. Ignoring.\n (chan = %04x)", channel);
197 * Source screen name.
199 memcpy(userinfo.sn, command->data+i+1, (int)command->data[i]);
200 userinfo.sn[(int)command->data[i]] = '\0';
201 i += 1 + (int)command->data[i];
206 userinfo.warnlevel = aimutil_get16(command->data+i); /* guess */
210 * Number of TLVs that follow. Not needed.
212 wastebits = aimutil_get16(command->data+i);
216 * Read block of TLVs. All further data is derived
217 * from what is parsed here.
219 tlvlist = aim_readtlvchain(command->data+i, command->commandlen-i);
222 * From here on, its depends on what channel we're on.
226 u_int j = 0, y = 0, z = 0;
229 struct aim_tlv_t *msgblocktlv, *tmptlv;
234 * Check Autoresponse status. If it is an autoresponse,
235 * it will contain a second type 0x0004 TLV, with zero length.
237 if (aim_gettlv(tlvlist, 0x0004, 2))
238 icbmflags |= AIM_IMFLAGS_AWAY;
241 * Check Ack Request status.
243 if (aim_gettlv(tlvlist, 0x0003, 2))
244 icbmflags |= AIM_IMFLAGS_ACK;
247 * Extract the various pieces of the userinfo struct.
250 if ((tmptlv = aim_gettlv(tlvlist, 0x0001, 1)))
251 userinfo.class = aimutil_get16(tmptlv->value);
252 /* Member-since date. */
253 if ((tmptlv = aim_gettlv(tlvlist, 0x0002, 1)))
255 /* If this is larger than 4, its probably the message block, skip */
256 if (tmptlv->length <= 4)
257 userinfo.membersince = aimutil_get32(tmptlv->value);
260 if ((tmptlv = aim_gettlv(tlvlist, 0x0003, 1)))
261 userinfo.onlinesince = aimutil_get32(tmptlv->value);
263 if ((tmptlv = aim_gettlv(tlvlist, 0x0004, 1)))
264 userinfo.idletime = aimutil_get16(tmptlv->value);
265 /* Session Length (AIM) */
266 if ((tmptlv = aim_gettlv(tlvlist, 0x000f, 1)))
267 userinfo.sessionlen = aimutil_get16(tmptlv->value);
268 /* Session Length (AOL) */
269 if ((tmptlv = aim_gettlv(tlvlist, 0x0010, 1)))
270 userinfo.sessionlen = aimutil_get16(tmptlv->value);
275 * XXX: Will the msgblock always be the second 0x0002?
277 msgblocktlv = aim_gettlv(tlvlist, 0x0002, 1);
280 printf("faim: icbm: major error! no message block TLV found!\n");
281 aim_freetlvchain(&tlvlist);
286 * Extracting the message from the unknown cruft.
288 * This is a bit messy, and I'm not really qualified,
289 * even as the author, to comment on it. At least
290 * its not as bad as a while loop shooting into infinity.
292 * "Do you believe in magic?"
295 msgblock = msgblocktlv->value;
298 wastebits = aimutil_get8(msgblock+j++);
299 wastebits = aimutil_get8(msgblock+j++);
301 y = aimutil_get16(msgblock+j);
303 for (z = 0; z < y; z++)
304 wastebits = aimutil_get8(msgblock+j++);
305 wastebits = aimutil_get8(msgblock+j++);
306 wastebits = aimutil_get8(msgblock+j++);
309 * Message string length, including flag words.
311 i = aimutil_get16(msgblock+j);
317 * Its rumored that these can kick in some funky
318 * 16bit-wide char stuff that used to really kill
319 * libfaim. Hopefully the latter is no longer true.
321 * Though someone should investiagte the former.
324 flag1 = aimutil_get16(msgblock+j);
326 flag2 = aimutil_get16(msgblock+j);
330 printf("faim: icbm: **warning: encoding flags are being used! {%04x, %04x}\n", flag1, flag2);
336 msg = (char *)malloc(i+1);
337 memcpy(msg, msgblock+j, i);
343 userfunc = aim_callhandler(command->conn, 0x0004, 0x0007);
345 i = userfunc(sess, command, channel, &userinfo, msg, icbmflags, flag1, flag2);
351 else if (channel == 0x0002)
354 struct aim_tlv_t *block1;
355 struct aim_tlvlist_t *list2;
356 struct aim_tlv_t *tmptlv;
360 if ((tmptlv = aim_gettlv(tlvlist, 0x0001, 1)))
361 userinfo.class = aimutil_get16(tmptlv->value);
363 if ((tmptlv = aim_gettlv(tlvlist, 0x0003, 1)))
364 userinfo.onlinesince = aimutil_get32(tmptlv->value);
366 if ((tmptlv = aim_gettlv(tlvlist, 0x0004, 1)))
367 userinfo.idletime = aimutil_get16(tmptlv->value);
368 /* Session Length (AIM) */
369 if ((tmptlv = aim_gettlv(tlvlist, 0x000f, 1)))
370 userinfo.sessionlen = aimutil_get16(tmptlv->value);
371 /* Session Length (AOL) */
372 if ((tmptlv = aim_gettlv(tlvlist, 0x0010, 1)))
373 userinfo.sessionlen = aimutil_get16(tmptlv->value);
376 * There's another block of TLVs embedded in the type 5 here.
378 block1 = aim_gettlv(tlvlist, 0x0005, 1);
380 return 1; /* major problem */
382 a = 0x1a; /* skip -- not sure what this information is! */
385 * XXX: Ignore if there's no data, only cookie information.
387 * Its probably just an accepted invitation or something.
390 if (block1->length <= 0x1a)
392 aim_freetlvchain(&tlvlist);
396 list2 = aim_readtlvchain(block1->value+a, block1->length-a);
398 if (aim_gettlv(list2, 0x0004, 1) /* start connection */ ||
399 aim_gettlv(list2, 0x000b, 1) /* close conncetion */)
401 rendtype = 1; /* voice request */
406 userfunc = aim_callhandler(command->conn, 0x0004, 0x0007);
418 struct aim_chat_roominfo roominfo;
419 char *msg=NULL,*encoding=NULL,*lang=NULL;
421 rendtype = 0; /* chat invite */
422 if (aim_gettlv(list2, 0x2711, 1))
424 struct aim_tlv_t *nametlv;
426 nametlv = aim_gettlv(list2, 0x2711, 1);
427 aim_chat_readroominfo(nametlv->value, &roominfo);
430 if (aim_gettlv(list2, 0x000c, 1))
431 msg = aim_gettlv_str(list2, 0x000c, 1);
433 if (aim_gettlv(list2, 0x000d, 1))
434 encoding = aim_gettlv_str(list2, 0x000d, 1);
436 if (aim_gettlv(list2, 0x000e, 1))
437 lang = aim_gettlv_str(list2, 0x000e, 1);
442 userfunc = aim_callhandler(command->conn, 0x0004, 0x0007);
451 encoding?encoding+1:NULL,
461 aim_freetlvchain(&list2);
465 * Free up the TLV chain.
467 aim_freetlvchain(&tlvlist);
474 * Not real sure what this does, nor does anyone I've talk to.
476 * Didn't use to send it. But now I think it might be a good
480 u_long aim_seticbmparam(struct aim_session_t *sess,
481 struct aim_conn_t *conn)
483 struct command_tx_struct *newpacket;
486 if(!(newpacket = aim_tx_new(0x0002, conn, 10+16)))
491 curbyte = aim_putsnac(newpacket->data, 0x0004, 0x0002, 0x0000, sess->snac_nextid);
492 curbyte += aimutil_put16(newpacket->data+curbyte, 0x0000);
493 curbyte += aimutil_put32(newpacket->data+curbyte, 0x00000003);
494 curbyte += aimutil_put8(newpacket->data+curbyte, 0x1f);
495 curbyte += aimutil_put8(newpacket->data+curbyte, 0x40);
496 curbyte += aimutil_put8(newpacket->data+curbyte, 0x03);
497 curbyte += aimutil_put8(newpacket->data+curbyte, 0xe7);
498 curbyte += aimutil_put8(newpacket->data+curbyte, 0x03);
499 curbyte += aimutil_put8(newpacket->data+curbyte, 0xe7);
500 curbyte += aimutil_put16(newpacket->data+curbyte, 0x0000);
501 curbyte += aimutil_put16(newpacket->data+curbyte, 0x0000);
504 aim_tx_enqueue(sess, newpacket);
506 return (sess->snac_nextid++);
509 int aim_parse_msgerror_middle(struct aim_session_t *sess,
510 struct command_rx_struct *command)
512 u_long snacid = 0x000000000;
513 struct aim_snac_t *snac = NULL;
515 rxcallback_t userfunc = NULL;
518 * Get SNAC from packet and look it up
519 * the list of unrepliedto/outstanding
522 * After its looked up, the SN that the
523 * message should've gone to will be
524 * in the ->data element of the snac struct.
527 snacid = aimutil_get32(command->data+6);
528 snac = aim_remsnac(sess, snacid);
532 printf("faim: msgerr: got an ICBM-failed error on an unknown SNAC ID! (%08lx)\n", snacid);
538 userfunc = aim_callhandler(command->conn, 0x0004, 0x0001);
540 ret = userfunc(sess, command, (snac)?snac->data:"(UNKNOWN)");