5 * TODO: Seperate a lot of this into an aim_bos.c.
20 * Should set your current idle time in seconds. Idealy, OSCAR should
21 * do this for us. But, it doesn't. The client must call this to set idle
25 faim_export unsigned long aim_bos_setidle(struct aim_session_t *sess,
26 struct aim_conn_t *conn,
29 return aim_genericreq_l(sess, conn, 0x0001, 0x0011, &idletime);
34 * aim_bos_changevisibility(conn, changtype, namelist)
36 * Changes your visibility depending on changetype:
38 * AIM_VISIBILITYCHANGE_PERMITADD: Lets provided list of names see you
39 * AIM_VISIBILITYCHANGE_PERMIDREMOVE: Removes listed names from permit list
40 * AIM_VISIBILITYCHANGE_DENYADD: Hides you from provided list of names
41 * AIM_VISIBILITYCHANGE_DENYREMOVE: Lets list see you again
43 * list should be a list of
44 * screen names in the form "Screen Name One&ScreenNameTwo&" etc.
46 * Equivelents to options in WinAIM:
47 * - Allow all users to contact me: Send an AIM_VISIBILITYCHANGE_DENYADD
48 * with only your name on it.
49 * - Allow only users on my Buddy List: Send an
50 * AIM_VISIBILITYCHANGE_PERMITADD with the list the same as your
52 * - Allow only the uesrs below: Send an AIM_VISIBILITYCHANGE_PERMITADD
53 * with everyone listed that you want to see you.
54 * - Block all users: Send an AIM_VISIBILITYCHANGE_PERMITADD with only
55 * yourself in the list
56 * - Block the users below: Send an AIM_VISIBILITYCHANGE_DENYADD with
57 * the list of users to be blocked
61 faim_export unsigned long aim_bos_changevisibility(struct aim_session_t *sess,
62 struct aim_conn_t *conn,
66 struct command_tx_struct *newpacket;
70 char *localcpy = NULL;
78 localcpy = (char *) malloc(strlen(denylist)+1);
79 memcpy(localcpy, denylist, strlen(denylist)+1);
81 listcount = aimutil_itemcnt(localcpy, '&');
82 packlen = aimutil_tokslen(localcpy, 99, '&') + listcount + 9;
84 if (!(newpacket = aim_tx_new(sess, conn, AIM_FRAMETYPE_OSCAR, 0x0002, packlen)))
91 case AIM_VISIBILITYCHANGE_PERMITADD: subtype = 0x05; break;
92 case AIM_VISIBILITYCHANGE_PERMITREMOVE: subtype = 0x06; break;
93 case AIM_VISIBILITYCHANGE_DENYADD: subtype = 0x07; break;
94 case AIM_VISIBILITYCHANGE_DENYREMOVE: subtype = 0x08; break;
96 free(newpacket->data);
101 /* We actually DO NOT send a SNAC ID with this one! */
102 aim_putsnac(newpacket->data, 0x0009, subtype, 0x00, 0);
104 j = 10; /* the next byte */
106 for (i=0; (i < (listcount - 1)) && (i < 99); i++)
108 tmpptr = aimutil_itemidx(localcpy, i, '&');
110 newpacket->data[j] = strlen(tmpptr);
111 memcpy(&(newpacket->data[j+1]), tmpptr, strlen(tmpptr));
112 j += strlen(tmpptr)+1;
119 aim_tx_enqueue(sess, newpacket);
121 return (sess->snac_nextid); /* dont increment */
128 * aim_bos_setbuddylist(buddylist)
130 * This just builds the "set buddy list" command then queues it.
132 * buddy_list = "Screen Name One&ScreenNameTwo&";
134 * TODO: Clean this up.
136 * XXX: I can't stress the TODO enough.
139 faim_export unsigned long aim_bos_setbuddylist(struct aim_session_t *sess,
140 struct aim_conn_t *conn,
145 struct command_tx_struct *newpacket;
149 char *localcpy = NULL;
152 len = 10; /* 10B SNAC headers */
154 if (!buddy_list || !(localcpy = (char *) malloc(strlen(buddy_list)+1)))
156 strncpy(localcpy, buddy_list, strlen(buddy_list)+1);
159 tmpptr = strtok(localcpy, "&");
160 while ((tmpptr != NULL) && (i < 150)) {
161 faimdprintf(sess, 2, "---adding %d: %s (%d)\n", i, tmpptr, strlen(tmpptr));
162 len += 1+strlen(tmpptr);
164 tmpptr = strtok(NULL, "&");
166 faimdprintf(sess, 2, "*** send buddy list len: %d (%x)\n", len, len);
168 if (!(newpacket = aim_tx_new(sess, conn, AIM_FRAMETYPE_OSCAR, 0x0002, len)))
173 aim_putsnac(newpacket->data, 0x0003, 0x0004, 0x0000, 0);
175 j = 10; /* the next byte */
177 strncpy(localcpy, buddy_list, strlen(buddy_list)+1);
179 tmpptr = strtok(localcpy, "&");
180 while ((tmpptr != NULL) & (i < 150)) {
181 faimdprintf(sess, 2, "---adding %d: %s (%d)\n", i, tmpptr, strlen(tmpptr));
182 newpacket->data[j] = strlen(tmpptr);
183 memcpy(&(newpacket->data[j+1]), tmpptr, strlen(tmpptr));
184 j += 1+strlen(tmpptr);
186 tmpptr = strtok(NULL, "&");
191 aim_tx_enqueue(sess, newpacket);
195 return (sess->snac_nextid);
199 * aim_bos_setprofile(profile)
201 * Gives BOS your profile.
205 faim_export unsigned long aim_bos_setprofile(struct aim_session_t *sess,
206 struct aim_conn_t *conn,
211 struct command_tx_struct *newpacket;
212 int i = 0, tmp, caplen;
214 if (!(newpacket = aim_tx_new(sess, conn, AIM_FRAMETYPE_OSCAR, 0x0002, 1152+strlen(profile)+1+(awaymsg?strlen(awaymsg):0))))
217 i += aim_putsnac(newpacket->data, 0x0002, 0x004, 0x0000, sess->snac_nextid);
218 i += aim_puttlv_str(newpacket->data+i, 0x0001, strlen("text/x-aolrtf; charset=\"us-ascii\""), "text/x-aolrtf; charset=\"us-ascii\"");
219 i += aim_puttlv_str(newpacket->data+i, 0x0002, strlen(profile), profile);
220 /* why do we send this twice? */
221 i += aim_puttlv_str(newpacket->data+i, 0x0003, strlen("text/x-aolrtf; charset=\"us-ascii\""), "text/x-aolrtf; charset=\"us-ascii\"");
223 /* Away message -- we send this no matter what, even if its blank */
225 i += aim_puttlv_str(newpacket->data+i, 0x0004, strlen(awaymsg), awaymsg);
227 i += aim_puttlv_str(newpacket->data+i, 0x0004, 0x0000, NULL);
229 /* Capability information. */
231 tmp = (i += aimutil_put16(newpacket->data+i, 0x0005));
232 i += aimutil_put16(newpacket->data+i, 0x0000); /* rewritten later */
233 i += (caplen = aim_putcap(newpacket->data+i, 512, caps));
234 aimutil_put16(newpacket->data+tmp, caplen); /* rewrite TLV size */
236 newpacket->commandlen = i;
237 aim_tx_enqueue(sess, newpacket);
239 return (sess->snac_nextid++);
243 * aim_bos_setgroupperm(mask)
245 * Set group permisson mask. Normally 0x1f (all classes).
247 * The group permission mask allows you to keep users of a certain
248 * class or classes from talking to you. The mask should be
249 * a bitwise OR of all the user classes you want to see you.
252 faim_export unsigned long aim_bos_setgroupperm(struct aim_session_t *sess,
253 struct aim_conn_t *conn,
256 return aim_genericreq_l(sess, conn, 0x0009, 0x0004, &mask);
259 faim_internal int aim_parse_bosrights(struct aim_session_t *sess,
260 struct command_rx_struct *command, ...)
262 rxcallback_t userfunc = NULL;
264 struct aim_tlvlist_t *tlvlist;
265 unsigned short maxpermits = 0, maxdenies = 0;
270 if (!(tlvlist = aim_readtlvchain(command->data+10, command->commandlen-10)))
274 * TLV type 0x0001: Maximum number of buddies on permit list.
276 if (aim_gettlv(tlvlist, 0x0001, 1))
277 maxpermits = aim_gettlv16(tlvlist, 0x0001, 1);
280 * TLV type 0x0002: Maximum number of buddies on deny list.
283 if (aim_gettlv(tlvlist, 0x0002, 1))
284 maxdenies = aim_gettlv16(tlvlist, 0x0002, 1);
286 if ((userfunc = aim_callhandler(sess, command->conn, 0x0009, 0x0003)))
287 ret = userfunc(sess, command, maxpermits, maxdenies);
289 aim_freetlvchain(&tlvlist);
295 * aim_bos_clientready()
300 faim_export unsigned long aim_bos_clientready(struct aim_session_t *sess,
301 struct aim_conn_t *conn)
303 struct aim_tool_version tools[] = {
304 {0x0001, 0x0003, AIM_TOOL_WIN32, 0x0686},
305 {0x0002, 0x0001, AIM_TOOL_WIN32, 0x0001},
306 {0x0003, 0x0001, AIM_TOOL_WIN32, 0x0001},
307 {0x0004, 0x0001, AIM_TOOL_WIN32, 0x0001},
308 {0x0006, 0x0001, AIM_TOOL_WIN32, 0x0001},
309 {0x0008, 0x0001, AIM_TOOL_WIN32, 0x0001},
310 {0x0009, 0x0001, AIM_TOOL_WIN32, 0x0001},
311 {0x000a, 0x0001, AIM_TOOL_WIN32, 0x0001},
312 {0x000b, 0x0001, AIM_TOOL_WIN32, 0x0001}
315 struct command_tx_struct *newpacket;
316 int toolcount = sizeof(tools)/sizeof(struct aim_tool_version);
318 if (!(newpacket = aim_tx_new(sess, conn, AIM_FRAMETYPE_OSCAR, 0x0002, 1152)))
323 i = aim_putsnac(newpacket->data, 0x0001, 0x0002, 0x0000, sess->snac_nextid);
324 aim_cachesnac(sess, 0x0001, 0x0002, 0x0000, NULL, 0);
326 for (j = 0; j < toolcount; j++) {
327 i += aimutil_put16(newpacket->data+i, tools[j].group);
328 i += aimutil_put16(newpacket->data+i, tools[j].version);
329 i += aimutil_put16(newpacket->data+i, tools[j].tool);
330 i += aimutil_put16(newpacket->data+i, tools[j].toolversion);
333 newpacket->commandlen = i;
336 aim_tx_enqueue(sess, newpacket);
338 return sess->snac_nextid;
342 * Request Rate Information.
345 faim_export unsigned long aim_bos_reqrate(struct aim_session_t *sess,
346 struct aim_conn_t *conn)
348 return aim_genericreq_n(sess, conn, 0x0001, 0x0006);
352 * Rate Information Response Acknowledge.
355 faim_export unsigned long aim_bos_ackrateresp(struct aim_session_t *sess,
356 struct aim_conn_t *conn)
358 struct command_tx_struct *newpacket;
359 int packlen = 20, i=0;
361 if(!(newpacket = aim_tx_new(sess, conn, AIM_FRAMETYPE_OSCAR, 0x0002, packlen)))
362 return (sess->snac_nextid);
366 i = aim_putsnac(newpacket->data, 0x0001, 0x0008, 0x0000, 0);
367 i += aimutil_put16(newpacket->data+i, 0x0001);
368 i += aimutil_put16(newpacket->data+i, 0x0002);
369 i += aimutil_put16(newpacket->data+i, 0x0003);
370 i += aimutil_put16(newpacket->data+i, 0x0004);
371 i += aimutil_put16(newpacket->data+i, 0x0005);
373 newpacket->commandlen = i;
376 aim_tx_enqueue(sess, newpacket);
378 return (sess->snac_nextid);
382 * aim_bos_setprivacyflags()
384 * Sets privacy flags. Normally 0x03.
386 * Bit 1: Allows other AIM users to see how long you've been idle.
387 * Bit 2: Allows other AIM users to see how long you've been a member.
390 faim_export unsigned long aim_bos_setprivacyflags(struct aim_session_t *sess,
391 struct aim_conn_t *conn,
394 return aim_genericreq_l(sess, conn, 0x0001, 0x0014, &flags);
398 * aim_bos_reqpersonalinfo()
400 * Requests the current user's information. Can't go generic on this one
401 * because aparently it uses SNAC flags.
404 faim_export unsigned long aim_bos_reqpersonalinfo(struct aim_session_t *sess,
405 struct aim_conn_t *conn)
407 return aim_genericreq_n(sess, conn, 0x0001, 0x000e);
410 faim_export unsigned long aim_setversions(struct aim_session_t *sess,
411 struct aim_conn_t *conn)
413 struct command_tx_struct *newpacket;
416 if (!(newpacket = aim_tx_new(sess, conn, AIM_FRAMETYPE_OSCAR, 0x0002, 10 + (4*12))))
421 i = aim_putsnac(newpacket->data, 0x0001, 0x0017, 0x0000, sess->snac_nextid);
422 aim_cachesnac(sess, 0x0001, 0x0017, 0x0000, NULL, 0);
424 i += aimutil_put16(newpacket->data+i, 0x0001);
425 i += aimutil_put16(newpacket->data+i, 0x0003);
427 i += aimutil_put16(newpacket->data+i, 0x0013);
428 i += aimutil_put16(newpacket->data+i, 0x0001);
430 i += aimutil_put16(newpacket->data+i, 0x0002);
431 i += aimutil_put16(newpacket->data+i, 0x0001);
433 i += aimutil_put16(newpacket->data+i, 0x0003);
434 i += aimutil_put16(newpacket->data+i, 0x0001);
436 i += aimutil_put16(newpacket->data+i, 0x0004);
437 i += aimutil_put16(newpacket->data+i, 0x0001);
439 i += aimutil_put16(newpacket->data+i, 0x0006);
440 i += aimutil_put16(newpacket->data+i, 0x0001);
442 i += aimutil_put16(newpacket->data+i, 0x0008);
443 i += aimutil_put16(newpacket->data+i, 0x0001);
445 i += aimutil_put16(newpacket->data+i, 0x0009);
446 i += aimutil_put16(newpacket->data+i, 0x0001);
448 i += aimutil_put16(newpacket->data+i, 0x000a);
449 i += aimutil_put16(newpacket->data+i, 0x0001);
451 i += aimutil_put16(newpacket->data+i, 0x000b);
452 i += aimutil_put16(newpacket->data+i, 0x0001);
454 i += aimutil_put16(newpacket->data+i, 0x000c);
455 i += aimutil_put16(newpacket->data+i, 0x0001);
457 newpacket->commandlen = i;
459 aim_tx_enqueue(sess, newpacket);
461 return sess->snac_nextid;
466 * aim_bos_reqservice(serviceid)
471 faim_export unsigned long aim_bos_reqservice(struct aim_session_t *sess,
472 struct aim_conn_t *conn,
475 return aim_genericreq_s(sess, conn, 0x0001, 0x0004, &serviceid);
481 * No-op. WinAIM sends these every 4min or so to keep
482 * the connection alive. Its not real necessary.
485 faim_export unsigned long aim_bos_nop(struct aim_session_t *sess,
486 struct aim_conn_t *conn)
488 return aim_genericreq_n(sess, conn, 0x0001, 0x0016);
494 * No-op. WinAIM 4.x sends these _every minute_ to keep
495 * the connection alive.
497 faim_export unsigned long aim_flap_nop(struct aim_session_t *sess,
498 struct aim_conn_t *conn)
500 struct command_tx_struct *newpacket;
502 if (!(newpacket = aim_tx_new(sess, conn, AIM_FRAMETYPE_OSCAR, 0x0005, 0)))
503 return sess->snac_nextid;
506 newpacket->commandlen = 0;
509 aim_tx_enqueue(sess, newpacket);
511 return (sess->snac_nextid);
515 * aim_bos_reqrights()
517 * Request BOS rights.
520 faim_export unsigned long aim_bos_reqrights(struct aim_session_t *sess,
521 struct aim_conn_t *conn)
523 return aim_genericreq_n(sess, conn, 0x0009, 0x0002);
527 * aim_bos_reqbuddyrights()
529 * Request Buddy List rights.
532 faim_export unsigned long aim_bos_reqbuddyrights(struct aim_session_t *sess,
533 struct aim_conn_t *conn)
535 return aim_genericreq_n(sess, conn, 0x0003, 0x0002);
539 * aim_send_warning(struct aim_session_t *sess,
540 * struct aim_conn_t *conn, char *destsn, int anon)
541 * send a warning to destsn.
542 * anon is anonymous or not;
543 * AIM_WARN_ANON anonymous
545 * returns -1 on error (couldn't alloc packet), next snacid on success.
548 faim_export int aim_send_warning(struct aim_session_t *sess, struct aim_conn_t *conn, char *destsn, int anon)
550 struct command_tx_struct *newpacket;
553 if (!(newpacket = aim_tx_new(sess, conn, AIM_FRAMETYPE_OSCAR, 0x0002, strlen(destsn)+13)))
559 curbyte += aim_putsnac(newpacket->data+curbyte,
560 0x0004, 0x0008, 0x0000, sess->snac_nextid);
562 curbyte += aimutil_put16(newpacket->data+curbyte, (anon & AIM_WARN_ANON)?1:0);
564 curbyte += aimutil_put8(newpacket->data+curbyte, strlen(destsn));
566 curbyte += aimutil_putstr(newpacket->data+curbyte, destsn, strlen(destsn));
568 newpacket->commandlen = curbyte;
571 aim_tx_enqueue(sess, newpacket);
573 return (sess->snac_nextid++);
577 * aim_debugconn_sendconnect()
579 * For aimdebugd. If you don't know what it is, you don't want to.
581 faim_export unsigned long aim_debugconn_sendconnect(struct aim_session_t *sess,
582 struct aim_conn_t *conn)
584 return aim_genericreq_n(sess, conn, AIM_CB_FAM_SPECIAL, AIM_CB_SPECIAL_DEBUGCONN_CONNECT);
588 * Generic routine for sending commands.
591 * I know I can do this in a smarter way...but I'm not thinking straight
594 * I had one big function that handled all three cases, but then it broke
595 * and I split it up into three. But then I fixed it. I just never went
596 * back to the single. I don't see any advantage to doing it either way.
599 faim_internal unsigned long aim_genericreq_n(struct aim_session_t *sess,
600 struct aim_conn_t *conn,
601 u_short family, u_short subtype)
603 struct command_tx_struct *newpacket;
605 if (!(newpacket = aim_tx_new(sess, conn, AIM_FRAMETYPE_OSCAR, 0x0002, 10)))
610 aim_putsnac(newpacket->data, family, subtype, 0x0000, sess->snac_nextid);
612 aim_cachesnac(sess, family, subtype, 0x0000, NULL, 0);
614 aim_tx_enqueue(sess, newpacket);
615 return sess->snac_nextid;
622 faim_internal unsigned long aim_genericreq_l(struct aim_session_t *sess,
623 struct aim_conn_t *conn,
624 u_short family, u_short subtype,
627 struct command_tx_struct *newpacket;
630 /* If we don't have data, there's no reason to use this function */
632 return aim_genericreq_n(sess, conn, family, subtype);
634 if (!(newpacket = aim_tx_new(sess, conn, AIM_FRAMETYPE_OSCAR, 0x0002, 10+sizeof(u_long))))
639 aim_putsnac(newpacket->data, family, subtype, 0x0000, sess->snac_nextid);
640 aim_cachesnac(sess, family, subtype, 0x0000, NULL, 0);
643 newlong = htonl(*longdata);
644 memcpy(&(newpacket->data[10]), &newlong, sizeof(u_long));
646 aim_tx_enqueue(sess, newpacket);
647 return sess->snac_nextid;
650 faim_internal unsigned long aim_genericreq_s(struct aim_session_t *sess,
651 struct aim_conn_t *conn,
652 u_short family, u_short subtype,
655 struct command_tx_struct *newpacket;
658 /* If we don't have data, there's no reason to use this function */
660 return aim_genericreq_n(sess, conn, family, subtype);
662 if (!(newpacket = aim_tx_new(sess, conn, AIM_FRAMETYPE_OSCAR, 0x0002, 10+sizeof(u_short))))
667 aim_putsnac(newpacket->data, family, subtype, 0x0000, sess->snac_nextid);
668 aim_cachesnac(sess, family, subtype, 0x0000, NULL, 0);
671 newshort = htons(*shortdata);
672 memcpy(&(newpacket->data[10]), &newshort, sizeof(u_short));
674 aim_tx_enqueue(sess, newpacket);
675 return sess->snac_nextid;
679 * aim_bos_reqlocaterights()
681 * Request Location services rights.
684 faim_export unsigned long aim_bos_reqlocaterights(struct aim_session_t *sess,
685 struct aim_conn_t *conn)
687 return aim_genericreq_n(sess, conn, 0x0002, 0x0002);
691 * aim_bos_reqicbmparaminfo()
693 * Request ICBM parameter information.
696 faim_export unsigned long aim_bos_reqicbmparaminfo(struct aim_session_t *sess,
697 struct aim_conn_t *conn)
699 return aim_genericreq_n(sess, conn, 0x0004, 0x0004);
703 * Add ICBM parameter? Huh?
705 faim_export unsigned long aim_addicbmparam(struct aim_session_t *sess,
706 struct aim_conn_t *conn)
708 struct command_tx_struct *newpacket;
709 int packlen = 10+16, i=0;
711 if(!(newpacket = aim_tx_new(sess, conn, AIM_FRAMETYPE_OSCAR, 0x0002, packlen)))
712 return (sess->snac_nextid);
716 i = aim_putsnac(newpacket->data, 0x0004, 0x0002, 0x0000, sess->snac_nextid);
717 aim_cachesnac(sess, 0x0004, 0x0002, 0x0000, NULL, 0);
719 i += aimutil_put16(newpacket->data+i, 0x0000);
720 i += aimutil_put16(newpacket->data+i, 0x0000);
721 i += aimutil_put16(newpacket->data+i, 0x0003);
722 i += aimutil_put16(newpacket->data+i, 0x1f40);
723 i += aimutil_put16(newpacket->data+i, 0x03e7);
724 i += aimutil_put16(newpacket->data+i, 0x03e7);
725 i += aimutil_put16(newpacket->data+i, 0x0000);
726 i += aimutil_put16(newpacket->data+i, 0x0000);
728 aim_tx_enqueue(sess, newpacket);
730 return sess->snac_nextid;
734 * Set directory profile data (not the same as aim_bos_setprofile!)
736 faim_export unsigned long aim_setdirectoryinfo(struct aim_session_t *sess, struct aim_conn_t *conn, char *first, char *middle, char *last, char *maiden, char *nickname, char *street, char *city, char *state, char *zip, int country, unsigned short privacy)
738 struct command_tx_struct *newpacket;
739 int packlen = 0, i = 0;
743 if(first) /* TLV 0001 */
744 packlen += (strlen(first) + 4);
746 packlen += (strlen(middle) + 4);
748 packlen += (strlen(last) + 4);
750 packlen += (strlen(maiden) + 4);
752 packlen += (strlen(nickname) + 4);
754 packlen += (strlen(street) + 4);
756 packlen += (strlen(state) + 4);
758 packlen += (strlen(city) + 4);
760 packlen += (strlen(zip) + 4);
762 if(!(newpacket = aim_tx_new(sess, conn, AIM_FRAMETYPE_OSCAR, 0x0002, packlen+10)))
767 i = aim_putsnac(newpacket->data, 0x0002, 0x0009, 0x0000, 0);
769 /* 000a/0002: privacy: 1 to allow search/disp, 0 to disallow */
770 i += aim_puttlv_16(newpacket->data+i, 0x000a, privacy);
774 i += aim_puttlv_str(newpacket->data+i, 0x0001, strlen(first), first);
776 i += aim_puttlv_str(newpacket->data+i, 0x0003, strlen(middle), middle);
778 i += aim_puttlv_str(newpacket->data+i, 0x0002, strlen(last), last);
780 i += aim_puttlv_str(newpacket->data+i, 0x0004, strlen(maiden), maiden);
782 i += aim_puttlv_str(newpacket->data+i, 0x000c, strlen(nickname), nickname);
784 i += aim_puttlv_str(newpacket->data+i, 0x0021, strlen(street), street);
786 i += aim_puttlv_str(newpacket->data+i, 0x0008, strlen(city), city);
788 i += aim_puttlv_str(newpacket->data+i, 0x0007, strlen(state), state);
790 i += aim_puttlv_str(newpacket->data+i, 0x000d, strlen(zip), zip);
792 newpacket->commandlen = i;
795 aim_tx_enqueue(sess, newpacket);
797 return(sess->snac_nextid);
800 faim_export unsigned long aim_setuserinterests(struct aim_session_t *sess, struct aim_conn_t *conn, char *interest1, char *interest2, char *interest3, char *interest4, char *interest5, unsigned short privacy)
802 struct command_tx_struct *newpacket;
803 int packlen = 0, i = 0;
808 packlen += (strlen(interest1) + 4);
810 packlen += (strlen(interest2) + 4);
812 packlen += (strlen(interest3) + 4);
814 packlen += (strlen(interest4) + 4);
816 packlen += (strlen(interest5) + 4) ;
819 if(!(newpacket = aim_tx_new(sess, conn, AIM_FRAMETYPE_OSCAR, 0x0002, packlen+10)))
824 i = aim_putsnac(newpacket->data, 0x0002, 0x000f, 0x0000, 0);
826 /* 000a/0002: 0000 ?? ?privacy? */
827 i += aim_puttlv_16(newpacket->data+i, 0x000a, privacy);
830 i += aim_puttlv_str(newpacket->data+i, 0x000b, strlen(interest1), interest1);
832 i += aim_puttlv_str(newpacket->data+i, 0x000b, strlen(interest2), interest2);
834 i += aim_puttlv_str(newpacket->data+i, 0x000b, strlen(interest3), interest3);
836 i += aim_puttlv_str(newpacket->data+i, 0x000b, strlen(interest4), interest4);
838 i += aim_puttlv_str(newpacket->data+i, 0x000b, strlen(interest1), interest5);
840 newpacket->commandlen = i;
843 aim_tx_enqueue(sess, newpacket);
845 return(sess->snac_nextid);
848 faim_export unsigned long aim_icq_setstatus(struct aim_session_t *sess,
849 struct aim_conn_t *conn,
850 unsigned long status)
852 struct command_tx_struct *newpacket;
856 data = 0x00030000 | status; /* yay for error checking ;^) */
858 if(!(newpacket = aim_tx_new(sess, conn, AIM_FRAMETYPE_OSCAR, 0x0002, 10 + 4)))
863 i = aim_putsnac(newpacket->data, 0x0001, 0x001e, 0x0000, 0x0000001e);
864 i += aim_puttlv_32(newpacket->data+i, 0x0006, data);
866 newpacket->commandlen = i;
869 aim_tx_enqueue(sess, newpacket);
871 return(sess->snac_nextid);