4 * The routines for sending/receiving Instant Messages.
6 * Note the term ICBM (Inter-Client Basic Message) which blankets
7 * all types of genericly routed through-server messages. Within
8 * the ICBM types (family 4), a channel is defined. Each channel
9 * represents a different type of message. Channel 1 is used for
10 * what would commonly be called an "instant message". Channel 2
11 * is used for negotiating "rendezvous". These transactions end in
12 * something more complex happening, such as a chat invitation, or
15 * In addition to the channel, every ICBM contains a cookie. For
16 * standard IMs, these are only used for error messages. However,
17 * the more complex rendezvous messages make suitably more complex
26 * Takes a msghdr (and a length) and returns a client type
27 * code. Note that this is *only a guess* and has a low likelihood
28 * of actually being accurate.
30 * Its based on experimental data, with the help of Eric Warmenhoven
31 * who seems to have collected a wide variety of different AIM clients.
34 * Heres the current collection:
35 * 0501 0003 0101 0101 01 AOL Mobile Communicator, WinAIM 1.0.414
36 * 0501 0003 0101 0201 01 WinAIM 2.0.847, 2.1.1187, 3.0.1464,
38 * 0501 0004 0101 0102 0101 WinAIM 4.1.2010, libfaim (right here)
39 * 0501 0001 0101 01 AOL v6.0, CompuServe 2000 v6.0, any
42 * Note that in this function, only the feature bytes are tested, since
43 * the rest will always be the same.
46 faim_export fu16_t aim_fingerprintclient(fu8_t *msghdr, int len)
53 /* AOL Mobile Communicator, WinAIM 1.0.414 */
55 3, {0x01, 0x01, 0x01}},
57 /* WinAIM 2.0.847, 2.1.1187, 3.0.1464, 4.3.2229, 4.4.2286 */
58 { AIM_CLIENTTYPE_WINAIM,
59 3, {0x01, 0x01, 0x02}},
61 /* WinAIM 4.1.2010, libfaim */
62 { AIM_CLIENTTYPE_WINAIM41,
63 4, {0x01, 0x01, 0x01, 0x02}},
65 /* AOL v6.0, CompuServe 2000 v6.0, any TOC client */
66 { AIM_CLIENTTYPE_AOL_TOC,
73 if (!msghdr || (len <= 0))
74 return AIM_CLIENTTYPE_UNKNOWN;
76 for (i = 0; fingerprints[i].len; i++) {
77 if (fingerprints[i].len != len)
79 if (memcmp(fingerprints[i].data, msghdr, fingerprints[i].len) == 0)
80 return fingerprints[i].clientid;
83 return AIM_CLIENTTYPE_UNKNOWN;
86 /* This should be endian-safe now... but who knows... */
87 faim_export fu32_t aim_iconsum(const fu8_t *buf, int buflen)
92 for (i = 0, sum = 0; i < buflen; i += 2)
93 sum += (buf[i+1] << 8) + buf[i];
95 sum = ((sum & 0xffff0000) >> 16) + (sum & 0x0000ffff);
101 * Send an ICBM (instant message).
105 * AIM_IMFLAGS_AWAY -- Marks the message as an autoresponse
106 * AIM_IMFLAGS_ACK -- Requests that the server send an ack
107 * when the message is received (of type 0x0004/0x000c)
108 * AIM_IMFLAGS_UNICODE--Instead of ASCII7, the passed message is
109 * made up of UNICODE duples. If you set
110 * this, you'd better be damn sure you know
112 * AIM_IMFLAGS_ISO_8859_1 -- The message contains the ASCII8 subset
113 * known as ISO-8859-1.
115 * Generally, you should use the lowest encoding possible to send
116 * your message. If you only use basic punctuation and the generic
117 * Latin alphabet, use ASCII7 (no flags). If you happen to use non-ASCII7
118 * characters, but they are all clearly defined in ISO-8859-1, then
119 * use that. Keep in mind that not all characters in the PC ASCII8
120 * character set are defined in the ISO standard. For those cases (most
121 * notably when the (r) symbol is used), you must use the full UNICODE
122 * encoding for your message. In UNICODE mode, _all_ characters must
123 * occupy 16bits, including ones that are not special. (Remember that
124 * the first 128 UNICODE symbols are equivelent to ASCII7, however they
125 * must be prefixed with a zero high order byte.)
127 * I strongly discourage the use of UNICODE mode, mainly because none
128 * of the clients I use can parse those messages (and besides that,
129 * wchars are difficult and non-portable to handle in most UNIX environments).
130 * If you really need to include special characters, use the HTML UNICODE
131 * entities. These are of the form ߪ where 2026 is the hex
132 * representation of the UNICODE index (in this case, UNICODE
133 * "Horizontal Ellipsis", or 133 in in ASCII8).
135 * Implementation note: Since this is one of the most-used functions
136 * in all of libfaim, it is written with performance in mind. As such,
137 * it is not as clear as it could be in respect to how this message is
138 * supposed to be layed out. Most obviously, tlvlists should be used
139 * instead of writing out the bytes manually.
141 * XXX support multipart
144 faim_export int aim_send_im_ext(aim_session_t *sess, aim_conn_t *conn, struct aim_sendimext_args *args)
146 static const fu8_t deffeatures[] = {
147 0x01, 0x01, 0x01, 0x02, 0x42,
153 if (!sess || !conn || !args)
156 if (!args->msg || (args->msglen <= 0))
159 if (args->msglen >= MAXMSGLEN)
162 msgtlvlen = 12 + args->msglen;
163 if (args->flags & AIM_IMFLAGS_CUSTOMFEATURES)
164 msgtlvlen += args->featureslen;
166 msgtlvlen += sizeof(deffeatures);
168 if (!(fr = aim_tx_new(sess, conn, AIM_FRAMETYPE_FLAP, 0x02, args->msglen+512)))
171 /* XXX should be optional */
172 snacid = aim_cachesnac(sess, 0x0004, 0x0006, 0x0000, args->destsn, strlen(args->destsn)+1);
173 aim_putsnac(&fr->data, 0x0004, 0x0006, 0x0000, snacid);
176 * Generate a random message cookie
178 * We could cache these like we do SNAC IDs. (In fact, it
179 * might be a good idea.) In the message error functions,
180 * the 8byte message cookie is returned as well as the
184 for (i = 0; i < 8; i++)
185 aimbs_put8(&fr->data, (fu8_t) rand());
190 aimbs_put16(&fr->data, 0x0001);
193 * Destination SN (prepended with byte length)
195 aimbs_put8(&fr->data, strlen(args->destsn));
196 aimbs_putraw(&fr->data, args->destsn, strlen(args->destsn));
201 aimbs_put16(&fr->data, 0x0002);
202 aimbs_put16(&fr->data, msgtlvlen);
208 aimbs_put8(&fr->data, 0x05);
209 aimbs_put8(&fr->data, 0x01);
211 if (args->flags & AIM_IMFLAGS_CUSTOMFEATURES) {
212 aimbs_put16(&fr->data, args->featureslen);
213 aimbs_putraw(&fr->data, args->features, args->featureslen);
215 aimbs_put16(&fr->data, sizeof(deffeatures));
216 aimbs_putraw(&fr->data, deffeatures, sizeof(deffeatures));
219 aimbs_put16(&fr->data, 0x0101);
222 * Message block length.
224 aimbs_put16(&fr->data, args->msglen + 0x04);
229 if (args->flags & AIM_IMFLAGS_UNICODE)
230 aimbs_put16(&fr->data, 0x0002);
231 else if (args->flags & AIM_IMFLAGS_ISO_8859_1)
232 aimbs_put16(&fr->data, 0x0003);
234 aimbs_put16(&fr->data, 0x0000);
236 aimbs_put16(&fr->data, 0x0000);
239 * Message. Not terminated.
241 aimbs_putraw(&fr->data, args->msg, args->msglen);
244 * Set the Request Acknowledge flag.
246 if (args->flags & AIM_IMFLAGS_ACK) {
247 aimbs_put16(&fr->data, 0x0003);
248 aimbs_put16(&fr->data, 0x0000);
252 * Set the Autoresponse flag.
254 if (args->flags & AIM_IMFLAGS_AWAY) {
255 aimbs_put16(&fr->data, 0x0004);
256 aimbs_put16(&fr->data, 0x0000);
260 * Set the Buddy Icon Requested flag.
262 if (args->flags & AIM_IMFLAGS_BUDDYREQ) {
263 aimbs_put16(&fr->data, 0x0009);
264 aimbs_put16(&fr->data, 0x0000);
268 * Set the I HAVE A REALLY PURTY ICON flag.
270 if (args->flags & AIM_IMFLAGS_HASICON) {
271 aimbs_put16(&fr->data, 0x0008);
272 aimbs_put16(&fr->data, 0x000c);
273 aimbs_put32(&fr->data, args->iconlen);
274 aimbs_put32(&fr->data, args->iconsum);
275 aimbs_put32(&fr->data, args->iconstamp);
278 aim_tx_enqueue(sess, fr);
280 #if 1 /* XXX do this with autoconf or something... */
281 aim_cleansnacs(sess, 60); /* clean out all SNACs over 60sec old */
288 * Simple wrapper for aim_send_im_ext()
290 * You cannot use aim_send_im if you need the HASICON flag. You must
291 * use aim_send_im_ext directly for that.
293 * aim_send_im also cannot be used if you require UNICODE messages, because
294 * that requires an explicit message length. Use aim_send_im_ext().
297 faim_export int aim_send_im(aim_session_t *sess, aim_conn_t *conn, const char *destsn, fu16_t flags, const char *msg)
299 struct aim_sendimext_args args;
301 args.destsn = destsn;
304 args.msglen = strlen(msg);
306 /* Make these don't get set by accident -- they need aim_send_im_ext */
307 args.flags &= ~(AIM_IMFLAGS_CUSTOMFEATURES | AIM_IMFLAGS_HASICON);
309 return aim_send_im_ext(sess, conn, &args);
313 * This is also performance sensative. (If you can believe it...)
316 faim_export int aim_send_icon(aim_session_t *sess, aim_conn_t *conn, const char *sn, const fu8_t *icon, int iconlen, time_t stamp, fu32_t iconsum)
323 if (!sess || !conn || !sn || !icon || (iconlen <= 0) || (iconlen >= MAXICONLEN))
326 if (conn->type != AIM_CONN_TYPE_BOS)
329 for (i = 0; i < 8; i++)
330 aimutil_put8(ck+i, (fu8_t) rand());
332 if (!(fr = aim_tx_new(sess, conn, AIM_FRAMETYPE_FLAP, 0x02, 10+8+2+1+strlen(sn)+2+2+2+8+16+2+2+2+2+2+2+2+4+4+4+iconlen+strlen(AIM_ICONIDENT)+2+2)))
335 snacid = aim_cachesnac(sess, 0x0004, 0x0006, 0x0000, NULL, 0);
336 aim_putsnac(&fr->data, 0x0004, 0x0006, 0x0000, snacid);
341 aimbs_putraw(&fr->data, ck, 8);
346 aimbs_put16(&fr->data, 0x0002);
351 aimbs_put8(&fr->data, strlen(sn));
352 aimbs_putraw(&fr->data, sn, strlen(sn));
357 * Encompasses everything below.
359 aimbs_put16(&fr->data, 0x0005);
360 aimbs_put16(&fr->data, 2+8+16+6+4+4+iconlen+4+4+4+strlen(AIM_ICONIDENT));
362 aimbs_put16(&fr->data, 0x0000);
363 aimbs_putraw(&fr->data, ck, 8);
364 aim_putcap(&fr->data, AIM_CAPS_BUDDYICON);
367 aimbs_put16(&fr->data, 0x000a);
368 aimbs_put16(&fr->data, 0x0002);
369 aimbs_put16(&fr->data, 0x0001);
372 aimbs_put16(&fr->data, 0x000f);
373 aimbs_put16(&fr->data, 0x0000);
376 aimbs_put16(&fr->data, 0x2711);
377 aimbs_put16(&fr->data, 4+4+4+iconlen+strlen(AIM_ICONIDENT));
378 aimbs_put32(&fr->data, iconsum);
379 aimbs_put32(&fr->data, iconlen);
380 aimbs_put32(&fr->data, stamp);
381 aimbs_putraw(&fr->data, icon, iconlen);
382 aimbs_putraw(&fr->data, AIM_ICONIDENT, strlen(AIM_ICONIDENT));
385 aimbs_put16(&fr->data, 0x0003);
386 aimbs_put16(&fr->data, 0x0000);
388 aim_tx_enqueue(sess, fr);
393 static int outgoingim(aim_session_t *sess, aim_module_t *mod, aim_frame_t *rx, aim_modsnac_t *snac, aim_bstream_t *bs)
396 aim_rxcallback_t userfunc;
399 aim_tlvlist_t *tlvlist;
402 fu16_t icbmflags = 0;
403 fu8_t flag1 = 0, flag2 = 0;
408 for (i = 0; i < 8; i++)
409 cookie[i] = aimbs_get8(bs);
412 channel = aimbs_get16(bs);
414 if (channel != 0x01) {
415 faimdprintf(sess, 0, "icbm: ICBM recieved on unsupported channel. Ignoring. (chan = %04x)\n", channel);
419 snlen = aimbs_get8(bs);
420 sn = aimbs_getstr(bs, snlen);
422 tlvlist = aim_readtlvchain(bs);
424 if (aim_gettlv(tlvlist, 0x0003, 1))
425 icbmflags |= AIM_IMFLAGS_ACK;
426 if (aim_gettlv(tlvlist, 0x0004, 1))
427 icbmflags |= AIM_IMFLAGS_AWAY;
429 if ((msgblock = aim_gettlv(tlvlist, 0x0002, 1))) {
431 int featurelen, msglen;
433 aim_bstream_init(&mbs, msgblock->value, msgblock->length);
437 for (featurelen = aimbs_get16(&mbs); featurelen; featurelen--)
442 msglen = aimbs_get16(&mbs) - 4; /* final block length */
444 flag1 = aimbs_get16(&mbs);
445 flag2 = aimbs_get16(&mbs);
447 msg = aimbs_getstr(&mbs, msglen);
450 if ((userfunc = aim_callhandler(sess, rx->conn, snac->family, snac->subtype)))
451 ret = userfunc(sess, rx, channel, sn, msg, icbmflags, flag1, flag2);
454 aim_freetlvchain(&tlvlist);
461 * This should use tlvlists, but doesn't for performance reasons.
463 * XXX support multipart IMs:
465 * 0004 0007 0000 8f08 d295
466 * 0031 6520 3b7b f9fd
472 * 0010 0004 0000 01a3
473 * 0002 0004 3ab6 94fa
474 * 0003 0004 3b7b f85a
477 * 0101 000a 0000 0000 3c48 544d 4c3e ASCII part
479 * 0101 0016 0003 0000 6c6b 7364 6a6b 6c6a 676c a56b 3b73 646a 6b6a
480 * 0101 000b 0000 0000 3c2f 4854 4d4c 3e another ASCII part
483 static int incomingim_ch1(aim_session_t *sess, aim_module_t *mod, aim_frame_t *rx, aim_modsnac_t *snac, fu16_t channel, struct aim_userinfo_s *userinfo, aim_bstream_t *bs, fu8_t *cookie)
486 aim_rxcallback_t userfunc;
488 struct aim_incomingim_ch1_args args;
491 memset(&args, 0, sizeof(args));
494 * This used to be done using tlvchains. For performance reasons,
495 * I've changed it to process the TLVs in-place. This avoids lots
496 * of per-IM memory allocations.
498 while (aim_bstream_empty(bs)) {
500 type = aimbs_get16(bs);
501 length = aimbs_get16(bs);
503 endpos = aim_bstream_curpos(bs) + length;
505 if (type == 0x0002) { /* Message Block */
508 * This TLV consists of the following:
510 * - Features: Don't know how to interpret these
516 aimbs_get8(bs); /* 05 */
517 aimbs_get8(bs); /* 01 */
519 args.featureslen = aimbs_get16(bs);
520 /* XXX XXX this is all evil! */
521 args.features = bs->data + bs->offset;
522 aim_bstream_advance(bs, args.featureslen);
523 args.icbmflags |= AIM_IMFLAGS_CUSTOMFEATURES;
525 aimbs_get8(bs); /* 01 */
526 aimbs_get8(bs); /* 01 */
528 /* Message string length, including flag words. */
529 args.msglen = aimbs_get16(bs);
532 args.flag1 = aimbs_get16(bs);
533 if (args.flag1 == 0x0000)
535 else if (args.flag1 == 0x0002)
536 args.icbmflags |= AIM_IMFLAGS_UNICODE;
537 else if (args.flag1 == 0x0003)
538 args.icbmflags |= AIM_IMFLAGS_ISO_8859_1;
539 else if (args.flag1 == 0xffff)
540 ; /* no encoding (yeep!) */
542 args.flag2 = aimbs_get16(bs);
543 if (args.flag2 == 0x0000)
544 ; /* standard subencoding? */
545 else if (args.flag2 == 0x000b)
546 args.icbmflags |= AIM_IMFLAGS_SUBENC_MACINTOSH;
547 else if (args.flag2 == 0xffff)
548 ; /* no subencoding */
550 /* XXX this isn't really necesary... */
551 if ( ((args.flag1 != 0x0000) &&
552 (args.flag1 != 0x0002) &&
553 (args.flag1 != 0x0003) &&
554 (args.flag1 != 0xffff)) ||
555 ((args.flag2 != 0x0000) &&
556 (args.flag2 != 0x000b) &&
557 (args.flag2 != 0xffff))) {
558 faimdprintf(sess, 0, "icbm: **warning: encoding flags are being used! {%04x, %04x}\n", args.flag1, args.flag2);
563 if (args.icbmflags & AIM_IMFLAGS_UNICODE) {
566 /* Can't use getstr because of wide null */
567 umsg = aimbs_getraw(bs, args.msglen);
568 args.msg = malloc(args.msglen+2);
569 memcpy(args.msg, umsg, args.msglen);
570 args.msg[args.msglen] = '\0'; /* wide NULL */
571 args.msg[args.msglen+1] = '\0';
576 args.msg = aimbs_getstr(bs, args.msglen);
578 } else if (type == 0x0003) { /* Server Ack Requested */
580 args.icbmflags |= AIM_IMFLAGS_ACK;
582 } else if (type == 0x0004) { /* Message is Auto Response */
584 args.icbmflags |= AIM_IMFLAGS_AWAY;
586 } else if (type == 0x0008) { /* I-HAVE-A-REALLY-PURTY-ICON Flag */
588 args.iconsum = aimbs_get32(bs);
589 args.iconlen = aimbs_get32(bs);
590 args.iconstamp = aimbs_get32(bs);
591 args.icbmflags |= AIM_IMFLAGS_HASICON;
593 } else if (type == 0x0009) {
595 args.icbmflags |= AIM_IMFLAGS_BUDDYREQ;
597 } else if (type == 0x0017) {
599 args.extdatalen = length;
600 args.extdata = aimbs_getraw(bs, args.extdatalen);
603 faimdprintf(sess, 0, "incomingim_ch1: unknown TLV 0x%04x (len %d)\n", type, length);
607 * This is here to protect ourselves from ourselves. That
608 * is, if something above doesn't completly parse its value
609 * section, or, worse, overparses it, this will set the
610 * stream where it needs to be in order to land on the next
611 * TLV when the loop continues.
614 aim_bstream_setpos(bs, endpos);
618 if ((userfunc = aim_callhandler(sess, rx->conn, snac->family, snac->subtype)))
619 ret = userfunc(sess, rx, channel, userinfo, &args);
627 static int incomingim_ch2_buddyicon(aim_session_t *sess, aim_module_t *mod, aim_frame_t *rx, aim_modsnac_t *snac, struct aim_userinfo_s *userinfo, struct aim_incomingim_ch2_args *args, aim_tlvlist_t *list2)
629 aim_rxcallback_t userfunc;
634 miscinfo = aim_gettlv(list2, 0x2711, 1);
635 aim_bstream_init(&tbs, miscinfo->value, miscinfo->length);
637 args->info.icon.checksum = aimbs_get32(&tbs);
638 args->info.icon.length = aimbs_get32(&tbs);
639 args->info.icon.timestamp = aimbs_get32(&tbs);
640 args->info.icon.icon = aimbs_getraw(&tbs, args->info.icon.length);
642 if ((userfunc = aim_callhandler(sess, rx->conn, snac->family, snac->subtype)))
643 ret = userfunc(sess, rx, 0x0002, userinfo, args);
645 free(args->info.icon.icon);
650 static int incomingim_ch2_imimage(aim_session_t *sess, aim_module_t *mod, aim_frame_t *rx, aim_modsnac_t *snac, struct aim_userinfo_s *userinfo, struct aim_incomingim_ch2_args *args, aim_tlvlist_t *list2)
652 aim_rxcallback_t userfunc;
655 /* Primary IP address */
656 if (aim_gettlv(list2, 0x0003, 1)) {
659 tlv = aim_gettlv(list2, 0x0003, 1);
661 snprintf(args->info.imimage.ip, sizeof(args->info.imimage.ip),
670 * Alternate IP address
672 * Sort of. The peer doesn't send this -- the OSCAR
673 * server does. So it will be the IP address that the
674 * peer is directly connected to the internet with, which
675 * may not be the same as the IP above. If these two
676 * values differ, it's rather unlikely that this
677 * rendezvous is going to happen...
680 if (aim_gettlv(list2, 0x0004, 1))
683 /* Port number (not correct -- ignore) */
684 if (aim_gettlv(list2, 0x0005, 1))
687 /* Unknown -- two bytes = 0x0001 */
688 if (aim_gettlv(list2, 0x000a, 1))
691 /* Unknown -- no value */
692 if (aim_gettlv(list2, 0x000f, 1))
695 faimdprintf(sess, 1, "rend: directIM request from %s (%s)\n", userinfo->sn, args->info.imimage.ip);
698 * XXX: there are a couple of different request packets for
702 if ((userfunc = aim_callhandler(sess, rx->conn, snac->family, snac->subtype)))
703 ret = userfunc(sess, rx, 0x0002, userinfo, args);
708 /* XXX Ugh. I think its obvious. */
709 static int incomingim_ch2(aim_session_t *sess, aim_module_t *mod, aim_frame_t *rx, aim_modsnac_t *snac, fu16_t channel, struct aim_userinfo_s *userinfo, aim_tlvlist_t *tlvlist, fu8_t *cookie)
711 aim_rxcallback_t userfunc;
713 aim_tlvlist_t *list2;
715 struct aim_incomingim_ch2_args args;
719 memset(&args, 0, sizeof(args));
722 * There's another block of TLVs embedded in the type 5 here.
724 if (!(block1 = aim_gettlv(tlvlist, 0x0005, 1)) || !block1->value) {
725 faimdprintf(sess, 0, "no tlv 0x0005 in rendezvous transaction!\n");
729 aim_bstream_init(&bbs, block1->value, block1->length);
732 * First two bytes represent the status of the connection.
734 * 0 is a request, 2 is an accept
736 args.status = aimbs_get16(&bbs);
739 * Next comes the cookie. Should match the ICBM cookie.
741 cookie2 = aimbs_getraw(&bbs, 8);
742 if (memcmp(cookie, cookie2, 8) != 0)
743 faimdprintf(sess, 0, "rend: warning cookies don't match!\n");
744 memcpy(args.cookie, cookie2, 8);
748 * The next 16bytes are a capability block so we can
749 * identify what type of rendezvous this is.
751 * Thanks to Eric Warmenhoven <warmenhoven@linux.com> (of GAIM)
752 * for pointing some of this out to me. In fact, a lot of
753 * the client-to-client info comes from the work of the GAIM
754 * developers. Thanks!
756 * Read off one capability string and we should have it ID'd.
759 if ((args.reqclass = aim_getcap(sess, &bbs, 0x10)) == 0x0000) {
760 faimdprintf(sess, 0, "rend: no ID block\n");
765 * What follows may be TLVs or nothing, depending on the
766 * purpose of the message.
768 * Ack packets for instance have nothing more to them.
770 list2 = aim_readtlvchain(&bbs);
772 #if 0 /* this should be in the per-type blocks */
773 if (!list2 || ((args.reqclass != AIM_CAPS_IMIMAGE) && !(aim_gettlv(list2, 0x2711, 1)))) {
774 aim_msgcookie_t *cook;
777 type = aim_msgcookie_gettype(args.reqclass); /* XXX: fix this shitty code */
779 if ((cook = aim_checkcookie(sess, cookie, type)) == NULL) {
780 faimdprintf(sess, 0, "non-data rendezvous thats not in cache (type %d)\n", type);
781 aim_freetlvchain(&list2);
785 if (cook->type == AIM_COOKIETYPE_OFTGET) {
786 struct aim_filetransfer_priv *ft;
789 int errorcode = -1; /* XXX shouldnt this be 0? */
791 ft = (struct aim_filetransfer_priv *)cook->data;
793 if (args.status != 0x0002) {
795 if (aim_gettlv(list2, 0x000b, 1))
796 errorcode = aim_gettlv16(list2, 0x000b, 1);
798 /* XXX this should make it up to the client, you know.. */
800 faimdprintf(sess, 0, "transfer from %s (%s) for %s cancelled (error code %d)\n", ft->sn, ft->ip, ft->fh.name, errorcode);
801 } /* args.status != 0x0002 */
804 faimdprintf(sess, 0, "no data attached to file transfer\n");
807 } else if (cook->type == AIM_CAPS_VOICE) {
809 faimdprintf(sess, 0, "voice request cancelled\n");
813 faimdprintf(sess, 0, "unknown cookie cache type %d\n", cook->type);
816 aim_freetlvchain(&list2);
823 * The rest of the handling depends on what type it is.
825 if (args.reqclass & AIM_CAPS_BUDDYICON) {
827 ret = incomingim_ch2_buddyicon(sess, mod, rx, snac, userinfo, &args, list2);
829 } else if (args.reqclass & AIM_CAPS_VOICE) {
830 aim_msgcookie_t *cachedcook;
832 faimdprintf(sess, 1, "rend: voice!\n");
834 if(!(cachedcook = (aim_msgcookie_t*)calloc(1, sizeof(aim_msgcookie_t)))) {
835 aim_freetlvchain(&list2);
839 memcpy(cachedcook->cookie, cookie, 8);
840 cachedcook->type = AIM_COOKIETYPE_OFTVOICE;
841 cachedcook->data = NULL;
843 if (aim_cachecookie(sess, cachedcook) == -1)
844 faimdprintf(sess, 0, "ERROR caching message cookie\n");
846 /* XXX: implement all this */
848 if ((userfunc = aim_callhandler(sess, rx->conn, snac->family, snac->subtype)))
849 ret = userfunc(sess, rx, channel, userinfo, &args);
851 } else if (args.reqclass & AIM_CAPS_IMIMAGE) {
853 ret = incomingim_ch2_imimage(sess, mod, rx, snac, userinfo, &args, list2);
855 } else if (args.reqclass & AIM_CAPS_CHAT) {
859 miscinfo = aim_gettlv(list2, 0x2711, 1);
861 aim_bstream_init(&tbs, miscinfo->value, miscinfo->length);
863 aim_chat_readroominfo(&tbs, &args.info.chat.roominfo);
865 if (aim_gettlv(list2, 0x000c, 1))
866 args.info.chat.msg = aim_gettlv_str(list2, 0x000c, 1);
868 if (aim_gettlv(list2, 0x000d, 1))
869 args.info.chat.encoding = aim_gettlv_str(list2, 0x000d, 1);
871 if (aim_gettlv(list2, 0x000e, 1))
872 args.info.chat.lang = aim_gettlv_str(list2, 0x000e, 1);
874 if ((userfunc = aim_callhandler(sess, rx->conn, snac->family, snac->subtype)))
875 ret = userfunc(sess, rx, channel, userinfo, &args);
877 free(args.info.chat.roominfo.name);
878 free(args.info.chat.msg);
879 free(args.info.chat.encoding);
880 free(args.info.chat.lang);
882 } else if (args.reqclass & AIM_CAPS_GETFILE) {
884 aim_msgcookie_t *cachedcook;
886 aim_tlv_t *iptlv, *porttlv;
890 if (!(cachedcook = calloc(1, sizeof(aim_msgcookie_t)))) {
891 aim_freetlvchain(&list2);
895 if (!(miscinfo = aim_gettlv(list2, 0x2711, 1)) ||
896 !(iptlv = aim_gettlv(list2, 0x0003, 1)) ||
897 !(porttlv = aim_gettlv(list2, 0x0005, 1))) {
899 faimdprintf(sess, 0, "rend: badly damaged file get request from %s...\n", userinfo->sn);
900 aim_cookie_free(sess, cachedcook);
901 aim_freetlvchain(&list2);
906 snprintf(ip, 30, "%d.%d.%d.%d:%d",
907 aimutil_get8(iptlv->value+0),
908 aimutil_get8(iptlv->value+1),
909 aimutil_get8(iptlv->value+2),
910 aimutil_get8(iptlv->value+3),
911 aimutil_get16(porttlv->value));
913 faimdprintf(sess, 0, "rend: file get request from %s (%s)\n", userinfo->sn, ip);
915 args.info.getfile.ip = ip;
916 args.info.getfile.cookie = cookie;
918 if ((userfunc = aim_callhandler(sess, rx->conn, snac->family, snac->subtype)))
919 ret = userfunc(sess, rx, channel, userinfo, &args);
921 } else if (args.reqclass & AIM_CAPS_SENDFILE) {
924 aim_msgcookie_t *cachedcook;
926 aim_tlv_t *iptlv, *porttlv;
930 if (!(cachedcook = calloc(1, sizeof(aim_msgcookie_t)))) {
931 aim_freetlvchain(&list2);
935 if (!(miscinfo = aim_gettlv(list2, 0x2711, 1)) ||
936 !(iptlv = aim_gettlv(list2, 0x0003, 1)) ||
937 !(porttlv = aim_gettlv(list2, 0x0005, 1))) {
939 faimdprintf(sess, 0, "rend: badly damaged file get request from %s...\n", userinfo->sn);
940 aim_cookie_free(sess, cachedcook);
941 aim_freetlvchain(&list2);
946 snprintf(ip, 30, "%d.%d.%d.%d:%d",
947 aimutil_get8(iptlv->value+0),
948 aimutil_get8(iptlv->value+1),
949 aimutil_get8(iptlv->value+2),
950 aimutil_get8(iptlv->value+3),
951 aimutil_get16(porttlv->value));
953 if (aim_gettlv(list2, 0x000c, 1))
954 desc = aim_gettlv_str(list2, 0x000c, 1);
956 faimdprintf(sess, 0, "rend: file transfer request from %s: %s (%s)\n",
957 userinfo->sn, desc, ip);
959 memcpy(cachedcook->cookie, cookie, 8);
961 ft = malloc(sizeof(struct aim_filetransfer_priv)); /* XXX */
962 strncpy(ft->sn, userinfo.sn, sizeof(ft->sn));
963 strncpy(ft->ip, ip, sizeof(ft->ip));
964 strncpy(ft->fh.name, miscinfo->value+8, sizeof(ft->fh.name));
965 cachedcook->type = AIM_COOKIETYPE_OFTSEND;
966 cachedcook->data = ft;
968 if (aim_cachecookie(sess, cachedcook) == -1)
969 faimdprintf(sess, 0, "ERROR caching message cookie\n");
971 aim_accepttransfer(sess, rx->conn, ft->sn, cookie, AIM_CAPS_SENDFILE);
976 if ((userfunc = aim_callhandler(sess, rx->conn, snac->family, snac->subtype)))
977 ret = userfunc(sess, rx, channel, userinfo, &args);
981 faimdprintf(sess, 0, "rend: unknown rendezvous 0x%04x\n", args.reqclass);
983 aim_freetlvchain(&list2);
989 * It can easily be said that parsing ICBMs is THE single
990 * most difficult thing to do in the in AIM protocol. In
991 * fact, I think I just did say that.
993 * Below is the best damned solution I've come up with
994 * over the past sixteen months of battling with it. This
995 * can parse both away and normal messages from every client
996 * I have access to. Its not fast, its not clean. But it works.
999 static int incomingim(aim_session_t *sess, aim_module_t *mod, aim_frame_t *rx, aim_modsnac_t *snac, aim_bstream_t *bs)
1004 struct aim_userinfo_s userinfo;
1006 memset(&userinfo, 0x00, sizeof(struct aim_userinfo_s));
1009 * Read ICBM Cookie. And throw away.
1011 for (i = 0; i < 8; i++)
1012 cookie[i] = aimbs_get8(bs);
1017 * Channel 0x0001 is the message channel. There are
1018 * other channels for things called "rendevous"
1019 * which represent chat and some of the other new
1020 * features of AIM2/3/3.5.
1022 * Channel 0x0002 is the Rendevous channel, which
1023 * is where Chat Invitiations and various client-client
1024 * connection negotiations come from.
1027 channel = aimbs_get16(bs);
1030 * Technically Channel 3 in chat could be done here too.
1032 if ((channel != 0x01) && (channel != 0x02)) {
1033 faimdprintf(sess, 0, "icbm: ICBM received on an unsupported channel. Ignoring.\n (chan = %04x)", channel);
1038 * Extract the standard user info block.
1040 * Note that although this contains TLVs that appear contiguous
1041 * with the TLVs read below, they are two different pieces. The
1042 * userinfo block contains the number of TLVs that contain user
1043 * information, the rest are not even though there is no seperation.
1044 * aim_extractuserinfo() returns the number of bytes used by the
1045 * userinfo tlvs, so you can start reading the rest of them right
1048 * That also means that TLV types can be duplicated between the
1049 * userinfo block and the rest of the message, however there should
1050 * never be two TLVs of the same type in one block.
1053 aim_extractuserinfo(sess, bs, &userinfo);
1056 * From here on, its depends on what channel we're on.
1058 * Technically all channels have a TLV list have this, however,
1059 * for the common channel 1 case, in-place parsing is used for
1060 * performance reasons (less memory allocation).
1064 ret = incomingim_ch1(sess, mod, rx, snac, channel, &userinfo, bs, cookie);
1066 } else if (channel == 0x0002) {
1067 aim_tlvlist_t *tlvlist;
1070 * Read block of TLVs (not including the userinfo data). All
1071 * further data is derived from what is parsed here.
1073 tlvlist = aim_readtlvchain(bs);
1075 ret = incomingim_ch2(sess, mod, rx, snac, channel, &userinfo, tlvlist, cookie);
1078 * Free up the TLV chain.
1080 aim_freetlvchain(&tlvlist);
1088 * AIM_TRANSFER_DENY_NOTSUPPORTED -- "client does not support"
1089 * AIM_TRANSFER_DENY_DECLINE -- "client has declined transfer"
1090 * AIM_TRANSFER_DENY_NOTACCEPTING -- "client is not accepting transfers"
1093 faim_export int aim_denytransfer(aim_session_t *sess, aim_conn_t *conn, const char *sender, const char *cookie, fu16_t code)
1096 aim_snacid_t snacid;
1097 aim_tlvlist_t *tl = NULL;
1099 if (!(fr = aim_tx_new(sess, conn, AIM_FRAMETYPE_FLAP, 0x02, 10+8+2+1+strlen(sender)+6)))
1102 snacid = aim_cachesnac(sess, 0x0004, 0x000b, 0x0000, NULL, 0);
1103 aim_putsnac(&fr->data, 0x0004, 0x000b, 0x0000, snacid);
1105 aimbs_putraw(&fr->data, cookie, 8);
1107 aimbs_put16(&fr->data, 0x0002); /* channel */
1108 aimbs_put8(&fr->data, strlen(sender));
1109 aimbs_putraw(&fr->data, sender, strlen(sender));
1111 aim_addtlvtochain16(&tl, 0x0003, code);
1112 aim_writetlvchain(&fr->data, &tl);
1113 aim_freetlvchain(&tl);
1115 aim_tx_enqueue(sess, fr);
1121 * aim_reqicbmparaminfo()
1123 * Request ICBM parameter information.
1126 faim_export int aim_reqicbmparams(aim_session_t *sess, aim_conn_t *conn)
1128 return aim_genericreq_n(sess, conn, 0x0004, 0x0004);
1133 * I definitly recommend sending this. If you don't, you'll be stuck
1134 * with the rather unreasonable defaults. You don't want those. Send this.
1137 faim_export int aim_seticbmparam(aim_session_t *sess, aim_conn_t *conn, struct aim_icbmparameters *params)
1140 aim_snacid_t snacid;
1142 if (!sess || !conn || !params)
1145 if (!(fr = aim_tx_new(sess, conn, AIM_FRAMETYPE_FLAP, 0x02, 10+16)))
1148 snacid = aim_cachesnac(sess, 0x0004, 0x0002, 0x0000, NULL, 0);
1149 aim_putsnac(&fr->data, 0x0004, 0x0002, 0x0000, snacid);
1151 /* This is read-only (see Parameter Reply). Must be set to zero here. */
1152 aimbs_put16(&fr->data, 0x0000);
1154 /* These are all read-write */
1155 aimbs_put32(&fr->data, params->flags);
1156 aimbs_put16(&fr->data, params->maxmsglen);
1157 aimbs_put16(&fr->data, params->maxsenderwarn);
1158 aimbs_put16(&fr->data, params->maxrecverwarn);
1159 aimbs_put32(&fr->data, params->minmsginterval);
1161 aim_tx_enqueue(sess, fr);
1166 static int paraminfo(aim_session_t *sess, aim_module_t *mod, aim_frame_t *rx, aim_modsnac_t *snac, aim_bstream_t *bs)
1168 struct aim_icbmparameters params;
1169 aim_rxcallback_t userfunc;
1171 params.maxchan = aimbs_get16(bs);
1172 params.flags = aimbs_get32(bs);
1173 params.maxmsglen = aimbs_get16(bs);
1174 params.maxsenderwarn = aimbs_get16(bs);
1175 params.maxrecverwarn = aimbs_get16(bs);
1176 params.minmsginterval = aimbs_get32(bs);
1178 if ((userfunc = aim_callhandler(sess, rx->conn, snac->family, snac->subtype)))
1179 return userfunc(sess, rx, ¶ms);
1184 static int missedcall(aim_session_t *sess, aim_module_t *mod, aim_frame_t *rx, aim_modsnac_t *snac, aim_bstream_t *bs)
1187 aim_rxcallback_t userfunc;
1188 fu16_t channel, nummissed, reason;
1189 struct aim_userinfo_s userinfo;
1191 while (aim_bstream_empty(bs)) {
1193 channel = aimbs_get16(bs);
1194 aim_extractuserinfo(sess, bs, &userinfo);
1195 nummissed = aimbs_get16(bs);
1196 reason = aimbs_get16(bs);
1198 if ((userfunc = aim_callhandler(sess, rx->conn, snac->family, snac->subtype)))
1199 ret = userfunc(sess, rx, channel, &userinfo, nummissed, reason);
1205 static int clienterr(aim_session_t *sess, aim_module_t *mod, aim_frame_t *rx, aim_modsnac_t *snac, aim_bstream_t *bs)
1208 aim_rxcallback_t userfunc;
1209 fu16_t channel, reason;
1213 ck = aimbs_getraw(bs, 8);
1214 channel = aimbs_get16(bs);
1215 snlen = aimbs_get8(bs);
1216 sn = aimbs_getstr(bs, snlen);
1217 reason = aimbs_get16(bs);
1219 if ((userfunc = aim_callhandler(sess, rx->conn, snac->family, snac->subtype)))
1220 ret = userfunc(sess, rx, channel, sn, reason);
1225 static int msgack(aim_session_t *sess, aim_module_t *mod, aim_frame_t *rx, aim_modsnac_t *snac, aim_bstream_t *bs)
1227 aim_rxcallback_t userfunc;
1232 ck = aimbs_getraw(bs, 8);
1233 type = aimbs_get16(bs);
1234 snlen = aimbs_get8(bs);
1235 sn = aimbs_getstr(bs, snlen);
1237 if ((userfunc = aim_callhandler(sess, rx->conn, snac->family, snac->subtype)))
1238 return userfunc(sess, rx, type, sn);
1246 static int snachandler(aim_session_t *sess, aim_module_t *mod, aim_frame_t *rx, aim_modsnac_t *snac, aim_bstream_t *bs)
1249 if (snac->subtype == 0x0005)
1250 return paraminfo(sess, mod, rx, snac, bs);
1251 else if (snac->subtype == 0x0006)
1252 return outgoingim(sess, mod, rx, snac, bs);
1253 else if (snac->subtype == 0x0007)
1254 return incomingim(sess, mod, rx, snac, bs);
1255 else if (snac->subtype == 0x000a)
1256 return missedcall(sess, mod, rx, snac, bs);
1257 else if (snac->subtype == 0x000b)
1258 return clienterr(sess, mod, rx, snac, bs);
1259 else if (snac->subtype == 0x000c)
1260 return msgack(sess, mod, rx, snac, bs);
1265 faim_internal int msg_modfirst(aim_session_t *sess, aim_module_t *mod)
1268 mod->family = 0x0004;
1269 mod->version = 0x0000;
1271 strncpy(mod->name, "messaging", sizeof(mod->name));
1272 mod->snachandler = snachandler;