4 * The routines for sending/receiving Instant Messages.
6 * Note the term ICBM (Inter-Client Basic Message) which blankets
7 * all types of genericly routed through-server messages. Within
8 * the ICBM types (family 4), a channel is defined. Each channel
9 * represents a different type of message. Channel 1 is used for
10 * what would commonly be called an "instant message". Channel 2
11 * is used for negotiating "rendezvous". These transactions end in
12 * something more complex happening, such as a chat invitation, or
15 * In addition to the channel, every ICBM contains a cookie. For
16 * standard IMs, these are only used for error messages. However,
17 * the more complex rendezvous messages make suitably more complex
26 * Takes a msghdr (and a length) and returns a client type
27 * code. Note that this is *only a guess* and has a low likelihood
28 * of actually being accurate.
30 * Its based on experimental data, with the help of Eric Warmenhoven
31 * who seems to have collected a wide variety of different AIM clients.
34 * Heres the current collection:
35 * 0501 0003 0101 0101 01 AOL Mobile Communicator, WinAIM 1.0.414
36 * 0501 0003 0101 0201 01 WinAIM 2.0.847, 2.1.1187, 3.0.1464,
38 * 0501 0004 0101 0102 0101 WinAIM 4.1.2010, libfaim (right here)
39 * 0501 0001 0101 01 AOL v6.0, CompuServe 2000 v6.0, any
42 * Note that in this function, only the feature bytes are tested, since
43 * the rest will always be the same.
46 faim_export fu16_t aim_fingerprintclient(fu8_t *msghdr, int len)
53 /* AOL Mobile Communicator, WinAIM 1.0.414 */
55 3, {0x01, 0x01, 0x01}},
57 /* WinAIM 2.0.847, 2.1.1187, 3.0.1464, 4.3.2229, 4.4.2286 */
58 { AIM_CLIENTTYPE_WINAIM,
59 3, {0x01, 0x01, 0x02}},
61 /* WinAIM 4.1.2010, libfaim */
62 { AIM_CLIENTTYPE_WINAIM41,
63 4, {0x01, 0x01, 0x01, 0x02}},
65 /* AOL v6.0, CompuServe 2000 v6.0, any TOC client */
66 { AIM_CLIENTTYPE_AOL_TOC,
73 if (!msghdr || (len <= 0))
74 return AIM_CLIENTTYPE_UNKNOWN;
76 for (i = 0; fingerprints[i].len; i++) {
77 if (fingerprints[i].len != len)
79 if (memcmp(fingerprints[i].data, msghdr, fingerprints[i].len) == 0)
80 return fingerprints[i].clientid;
83 return AIM_CLIENTTYPE_UNKNOWN;
86 /* This should be endian-safe now... but who knows... */
87 faim_export fu16_t aim_iconsum(const fu8_t *buf, int buflen)
92 for (i = 0, sum = 0; i < buflen; i += 2)
93 sum += (buf[i+1] << 8) + buf[i];
95 sum = ((sum & 0xffff0000) >> 16) + (sum & 0x0000ffff);
101 * Send an ICBM (instant message).
105 * AIM_IMFLAGS_AWAY -- Marks the message as an autoresponse
106 * AIM_IMFLAGS_ACK -- Requests that the server send an ack
107 * when the message is received (of type 0x0004/0x000c)
108 * AIM_IMFLAGS_UNICODE--Instead of ASCII7, the passed message is
109 * made up of UNICODE duples. If you set
110 * this, you'd better be damn sure you know
112 * AIM_IMFLAGS_ISO_8859_1 -- The message contains the ASCII8 subset
113 * known as ISO-8859-1.
115 * Generally, you should use the lowest encoding possible to send
116 * your message. If you only use basic punctuation and the generic
117 * Latin alphabet, use ASCII7 (no flags). If you happen to use non-ASCII7
118 * characters, but they are all clearly defined in ISO-8859-1, then
119 * use that. Keep in mind that not all characters in the PC ASCII8
120 * character set are defined in the ISO standard. For those cases (most
121 * notably when the (r) symbol is used), you must use the full UNICODE
122 * encoding for your message. In UNICODE mode, _all_ characters must
123 * occupy 16bits, including ones that are not special. (Remember that
124 * the first 128 UNICODE symbols are equivelent to ASCII7, however they
125 * must be prefixed with a zero high order byte.)
127 * I strongly discourage the use of UNICODE mode, mainly because none
128 * of the clients I use can parse those messages (and besides that,
129 * wchars are difficult and non-portable to handle in most UNIX environments).
130 * If you really need to include special characters, use the HTML UNICODE
131 * entities. These are of the form ߪ where 2026 is the hex
132 * representation of the UNICODE index (in this case, UNICODE
133 * "Horizontal Ellipsis", or 133 in in ASCII8).
135 * Implementation note: Since this is one of the most-used functions
136 * in all of libfaim, it is written with performance in mind. As such,
137 * it is not as clear as it could be in respect to how this message is
138 * supposed to be layed out. Most obviously, tlvlists should be used
139 * instead of writing out the bytes manually.
141 * XXX support multipart
144 faim_export int aim_send_im_ext(aim_session_t *sess, aim_conn_t *conn, struct aim_sendimext_args *args)
150 if (!sess || !conn || !args)
153 if (!args->msg || (args->msglen <= 0))
156 if (args->msglen >= MAXMSGLEN)
159 if (!(fr = aim_tx_new(sess, conn, AIM_FRAMETYPE_FLAP, 0x02, args->msglen+512)))
162 /* XXX should be optional */
163 snacid = aim_cachesnac(sess, 0x0004, 0x0006, 0x0000, args->destsn, strlen(args->destsn)+1);
164 aim_putsnac(&fr->data, 0x0004, 0x0006, 0x0000, snacid);
167 * Generate a random message cookie
169 * We could cache these like we do SNAC IDs. (In fact, it
170 * might be a good idea.) In the message error functions,
171 * the 8byte message cookie is returned as well as the
175 for (i = 0; i < 8; i++)
176 aimbs_put8(&fr->data, (fu8_t) rand());
181 aimbs_put16(&fr->data, 0x0001);
184 * Destination SN (prepended with byte length)
186 aimbs_put8(&fr->data, strlen(args->destsn));
187 aimbs_putraw(&fr->data, args->destsn, strlen(args->destsn));
192 aimbs_put16(&fr->data, 0x0002);
193 aimbs_put16(&fr->data, args->msglen + 0x10);
196 * Flag data / ICBM Parameters?
198 * I don't know what these are...
201 aimbs_put8(&fr->data, 0x05);
202 aimbs_put8(&fr->data, 0x01);
204 /* number of bytes to follow */
205 aimbs_put16(&fr->data, 0x0004);
206 aimbs_put8(&fr->data, 0x01);
207 aimbs_put8(&fr->data, 0x01);
208 aimbs_put8(&fr->data, 0x01);
209 aimbs_put8(&fr->data, 0x02);
211 aimbs_put16(&fr->data, 0x0101);
214 * Message block length.
216 aimbs_put16(&fr->data, args->msglen + 0x04);
221 if (args->flags & AIM_IMFLAGS_UNICODE)
222 aimbs_put16(&fr->data, 0x0002);
223 else if (args->flags & AIM_IMFLAGS_ISO_8859_1)
224 aimbs_put16(&fr->data, 0x0003);
226 aimbs_put16(&fr->data, 0x0000);
228 aimbs_put16(&fr->data, 0x0000);
231 * Message. Not terminated.
233 aimbs_putraw(&fr->data, args->msg, args->msglen);
236 * Set the Request Acknowledge flag.
238 if (args->flags & AIM_IMFLAGS_ACK) {
239 aimbs_put16(&fr->data, 0x0003);
240 aimbs_put16(&fr->data, 0x0000);
244 * Set the Autoresponse flag.
246 if (args->flags & AIM_IMFLAGS_AWAY) {
247 aimbs_put16(&fr->data, 0x0004);
248 aimbs_put16(&fr->data, 0x0000);
252 * Set the Buddy Icon Requested flag.
254 if (args->flags & AIM_IMFLAGS_BUDDYREQ) {
255 aimbs_put16(&fr->data, 0x0009);
256 aimbs_put16(&fr->data, 0x0000);
260 * Set the I HAVE A REALLY PURTY ICON flag.
262 if (args->flags & AIM_IMFLAGS_HASICON) {
263 aimbs_put16(&fr->data, 0x0009);
264 aimbs_put16(&fr->data, 0x000c);
265 aimbs_put32(&fr->data, args->iconlen);
266 aimbs_put16(&fr->data, 0x0001); /* XXX is this right?! */
267 aimbs_put16(&fr->data, args->iconsum);
268 aimbs_put32(&fr->data, args->iconstamp);
271 aim_tx_enqueue(sess, fr);
273 #if 1 /* XXX do this with autoconf or something... */
274 aim_cleansnacs(sess, 60); /* clean out all SNACs over 60sec old */
281 * Simple wrapper for aim_send_im_ext()
283 * You cannot use aim_send_im if you need the HASICON flag. You must
284 * use aim_send_im_ext directly for that.
286 * aim_send_im also cannot be used if you require UNICODE messages, because
287 * that requires an explicit message length. Use aim_send_im_ext().
290 faim_export int aim_send_im(aim_session_t *sess, aim_conn_t *conn, const char *destsn, fu16_t flags, const char *msg)
292 struct aim_sendimext_args args;
294 args.destsn = destsn;
297 args.msglen = strlen(msg);
299 return aim_send_im_ext(sess, conn, &args);
303 * This is also performance sensative. (If you can believe it...)
306 faim_export int aim_send_icon(aim_session_t *sess, aim_conn_t *conn, const char *sn, const fu8_t *icon, int iconlen, time_t stamp, fu16_t iconsum)
313 if (!sess || !conn || !sn || !icon || (iconlen <= 0) || (iconlen >= MAXICONLEN))
316 if (conn->type != AIM_CONN_TYPE_BOS)
319 for (i = 0; i < 8; i++)
320 aimutil_put8(ck+i, (fu8_t) rand());
322 if (!(fr = aim_tx_new(sess, conn, AIM_FRAMETYPE_FLAP, 0x02, 10+8+2+1+strlen(sn)+2+2+2+8+16+2+2+2+2+2+2+2+4+4+4+iconlen+strlen(AIM_ICONIDENT)+2+2)))
325 snacid = aim_cachesnac(sess, 0x0004, 0x0006, 0x0000, NULL, 0);
326 aim_putsnac(&fr->data, 0x0004, 0x0006, 0x0000, snacid);
331 aimbs_putraw(&fr->data, ck, 8);
336 aimbs_put16(&fr->data, 0x0002);
341 aimbs_put8(&fr->data, strlen(sn));
342 aimbs_putraw(&fr->data, sn, strlen(sn));
347 * Encompasses everything below.
349 aimbs_put16(&fr->data, 0x0005);
350 aimbs_put16(&fr->data, 2+8+16+6+4+4+iconlen+4+4+4+strlen(AIM_ICONIDENT));
352 aimbs_put16(&fr->data, 0x0000);
353 aimbs_putraw(&fr->data, ck, 8);
354 aim_putcap(&fr->data, AIM_CAPS_BUDDYICON);
357 aimbs_put16(&fr->data, 0x000a);
358 aimbs_put16(&fr->data, 0x0002);
359 aimbs_put16(&fr->data, 0x0001);
362 aimbs_put16(&fr->data, 0x000f);
363 aimbs_put16(&fr->data, 0x0000);
366 aimbs_put16(&fr->data, 0x2711);
367 aimbs_put16(&fr->data, 4+4+4+iconlen+strlen(AIM_ICONIDENT));
368 aimbs_put16(&fr->data, 0x0000); /* XXX is this right?! */
369 aimbs_put16(&fr->data, iconsum);
370 aimbs_put32(&fr->data, iconlen);
371 aimbs_put32(&fr->data, stamp);
372 aimbs_putraw(&fr->data, icon, iconlen);
373 aimbs_putraw(&fr->data, AIM_ICONIDENT, strlen(AIM_ICONIDENT));
376 aimbs_put16(&fr->data, 0x0003);
377 aimbs_put16(&fr->data, 0x0000);
379 aim_tx_enqueue(sess, fr);
384 static int outgoingim(aim_session_t *sess, aim_module_t *mod, aim_frame_t *rx, aim_modsnac_t *snac, aim_bstream_t *bs)
387 aim_rxcallback_t userfunc;
390 aim_tlvlist_t *tlvlist;
393 fu16_t icbmflags = 0;
394 fu8_t flag1 = 0, flag2 = 0;
399 for (i = 0; i < 8; i++)
400 cookie[i] = aimbs_get8(bs);
403 channel = aimbs_get16(bs);
405 if (channel != 0x01) {
406 faimdprintf(sess, 0, "icbm: ICBM recieved on unsupported channel. Ignoring. (chan = %04x)\n", channel);
410 snlen = aimbs_get8(bs);
411 sn = aimbs_getstr(bs, snlen);
413 tlvlist = aim_readtlvchain(bs);
415 if (aim_gettlv(tlvlist, 0x0003, 1))
416 icbmflags |= AIM_IMFLAGS_ACK;
417 if (aim_gettlv(tlvlist, 0x0004, 1))
418 icbmflags |= AIM_IMFLAGS_AWAY;
420 if ((msgblock = aim_gettlv(tlvlist, 0x0002, 1))) {
422 int featurelen, msglen;
424 aim_bstream_init(&mbs, msgblock->value, msgblock->length);
428 for (featurelen = aimbs_get16(&mbs); featurelen; featurelen--)
433 msglen = aimbs_get16(&mbs) - 4; /* final block length */
435 flag1 = aimbs_get16(&mbs);
436 flag2 = aimbs_get16(&mbs);
438 msg = aimbs_getstr(&mbs, msglen);
441 if ((userfunc = aim_callhandler(sess, rx->conn, snac->family, snac->subtype)))
442 ret = userfunc(sess, rx, channel, sn, msg, icbmflags, flag1, flag2);
445 aim_freetlvchain(&tlvlist);
452 * This should use tlvlists, but doesn't for performance reasons.
454 * XXX support multipart IMs:
456 * 0004 0007 0000 8f08 d295
457 * 0031 6520 3b7b f9fd
463 * 0010 0004 0000 01a3
464 * 0002 0004 3ab6 94fa
465 * 0003 0004 3b7b f85a
468 * 0101 000a 0000 0000 3c48 544d 4c3e ASCII part
470 * 0101 0016 0003 0000 6c6b 7364 6a6b 6c6a 676c a56b 3b73 646a 6b6a
471 * 0101 000b 0000 0000 3c2f 4854 4d4c 3e another ASCII part
474 static int incomingim_ch1(aim_session_t *sess, aim_module_t *mod, aim_frame_t *rx, aim_modsnac_t *snac, fu16_t channel, struct aim_userinfo_s *userinfo, aim_bstream_t *bs, fu8_t *cookie)
477 aim_rxcallback_t userfunc;
479 struct aim_incomingim_ch1_args args;
482 memset(&args, 0, sizeof(args));
485 * This used to be done using tlvchains. For performance reasons,
486 * I've changed it to process the TLVs in-place. This avoids lots
487 * of per-IM memory allocations.
489 while (aim_bstream_empty(bs)) {
491 type = aimbs_get16(bs);
492 length = aimbs_get16(bs);
494 endpos = aim_bstream_curpos(bs) + length;
496 if (type == 0x0002) { /* Message Block */
501 * This TLV consists of the following:
503 * - Features: Don't know how to interpret these
509 aimbs_get8(bs); /* 05 */
510 aimbs_get8(bs); /* 01 */
511 featureslen = aimbs_get16(bs);
512 for (z = 0, args.finlen = 0; z < featureslen; z++) {
515 tmp = aimbs_get8(bs);
516 if (z < sizeof(args.fingerprint)) {
517 args.fingerprint[z] = tmp;
521 aimbs_get8(bs); /* 01 */
522 aimbs_get8(bs); /* 01 */
524 /* Message string length, including flag words. */
525 args.msglen = aimbs_get16(bs);
528 args.flag1 = aimbs_get16(bs);
529 if (args.flag1 == 0x0000)
531 else if (args.flag1 == 0x0002)
532 args.icbmflags |= AIM_IMFLAGS_UNICODE;
533 else if (args.flag1 == 0x0003)
534 args.icbmflags |= AIM_IMFLAGS_ISO_8859_1;
535 else if (args.flag1 == 0xffff)
536 ; /* no encoding (yeep!) */
538 args.flag2 = aimbs_get16(bs);
539 if (args.flag2 == 0x0000)
540 ; /* standard subencoding? */
541 else if (args.flag2 == 0x000b)
542 args.icbmflags |= AIM_IMFLAGS_SUBENC_MACINTOSH;
543 else if (args.flag2 == 0xffff)
544 ; /* no subencoding */
546 /* XXX this isn't really necesary... */
547 if ( ((args.flag1 != 0x0000) &&
548 (args.flag1 != 0x0002) &&
549 (args.flag1 != 0x0003) &&
550 (args.flag1 != 0xffff)) ||
551 ((args.flag2 != 0x0000) &&
552 (args.flag2 != 0x000b) &&
553 (args.flag2 != 0xffff))) {
554 faimdprintf(sess, 0, "icbm: **warning: encoding flags are being used! {%04x, %04x}\n", args.flag1, args.flag2);
559 if (args.icbmflags & AIM_IMFLAGS_UNICODE) {
562 /* Can't use getstr because of wide null */
563 umsg = aimbs_getraw(bs, args.msglen);
564 args.msg = malloc(args.msglen+2);
565 memcpy(args.msg, umsg, args.msglen);
566 args.msg[args.msglen] = '\0'; /* wide NULL */
567 args.msg[args.msglen+1] = '\0';
572 args.msg = aimbs_getstr(bs, args.msglen);
574 } else if (type == 0x0003) { /* Server Ack Requested */
576 args.icbmflags |= AIM_IMFLAGS_ACK;
578 } else if (type == 0x0004) { /* Message is Auto Response */
580 args.icbmflags |= AIM_IMFLAGS_AWAY;
582 } else if (type == 0x0008) { /* I-HAVE-A-REALLY-PURTY-ICON Flag */
584 args.iconchecksum = aimbs_get32(bs);
585 args.iconlength = aimbs_get32(bs);
586 args.iconstamp = aimbs_get32(bs);
587 args.icbmflags |= AIM_IMFLAGS_HASICON;
589 } else if (type == 0x0009) {
591 args.icbmflags |= AIM_IMFLAGS_BUDDYREQ;
593 } else if (type == 0x0017) {
595 args.extdatalen = length;
596 args.extdata = aimbs_getraw(bs, args.extdatalen);
599 faimdprintf(sess, 0, "incomingim_ch1: unknown TLV 0x%04x (len %d)\n", type, length);
603 * This is here to protect ourselves from ourselves. That
604 * is, if something above doesn't completly parse its value
605 * section, or, worse, overparses it, this will set the
606 * stream where it needs to be in order to land on the next
607 * TLV when the loop continues.
610 aim_bstream_setpos(bs, endpos);
614 if ((userfunc = aim_callhandler(sess, rx->conn, snac->family, snac->subtype)))
615 ret = userfunc(sess, rx, channel, userinfo, &args);
623 /* XXX Ugh. I think its obvious. */
624 static int incomingim_ch2(aim_session_t *sess, aim_module_t *mod, aim_frame_t *rx, aim_modsnac_t *snac, fu16_t channel, struct aim_userinfo_s *userinfo, aim_tlvlist_t *tlvlist, fu8_t *cookie)
626 aim_rxcallback_t userfunc;
628 aim_tlvlist_t *list2;
630 struct aim_incomingim_ch2_args args;
634 memset(&args, 0, sizeof(args));
637 * There's another block of TLVs embedded in the type 5 here.
639 if (!(block1 = aim_gettlv(tlvlist, 0x0005, 1)) || !block1->value) {
640 faimdprintf(sess, 0, "no tlv 0x0005 in rendezvous transaction!\n");
644 aim_bstream_init(&bbs, block1->value, block1->length);
647 * First two bytes represent the status of the connection.
649 * 0 is a request, 2 is an accept
651 args.status = aimbs_get16(&bbs);
654 * Next comes the cookie. Should match the ICBM cookie.
656 cookie2 = aimbs_getraw(&bbs, 8);
657 if (memcmp(cookie, cookie2, 8) != 0)
658 faimdprintf(sess, 0, "rend: warning cookies don't match!\n");
662 * The next 16bytes are a capability block so we can
663 * identify what type of rendezvous this is.
665 * Thanks to Eric Warmenhoven <warmenhoven@linux.com> (of GAIM)
666 * for pointing some of this out to me. In fact, a lot of
667 * the client-to-client info comes from the work of the GAIM
668 * developers. Thanks!
670 * Read off one capability string and we should have it ID'd.
673 if ((args.reqclass = aim_getcap(sess, &bbs, 0x10)) == 0x0000) {
674 faimdprintf(sess, 0, "rend: no ID block\n");
679 * What follows may be TLVs or nothing, depending on the
680 * purpose of the message.
682 * Ack packets for instance have nothing more to them.
684 list2 = aim_readtlvchain(&bbs);
686 if (!list2 || ((args.reqclass != AIM_CAPS_IMIMAGE) && !(aim_gettlv(list2, 0x2711, 1)))) {
687 aim_msgcookie_t *cook;
690 type = aim_msgcookie_gettype(args.reqclass); /* XXX: fix this shitty code */
692 if ((cook = aim_checkcookie(sess, cookie, type)) == NULL) {
693 faimdprintf(sess, 0, "non-data rendezvous thats not in cache (type %d)\n", type);
694 aim_freetlvchain(&list2);
698 if (cook->type == AIM_COOKIETYPE_OFTGET) {
699 struct aim_filetransfer_priv *ft;
702 int errorcode = -1; /* XXX shouldnt this be 0? */
704 ft = (struct aim_filetransfer_priv *)cook->data;
706 if (args.status != 0x0002) {
708 if (aim_gettlv(list2, 0x000b, 1))
709 errorcode = aim_gettlv16(list2, 0x000b, 1);
711 /* XXX this should make it up to the client, you know.. */
713 faimdprintf(sess, 0, "transfer from %s (%s) for %s cancelled (error code %d)\n", ft->sn, ft->ip, ft->fh.name, errorcode);
714 } /* args.status != 0x0002 */
717 faimdprintf(sess, 0, "no data attached to file transfer\n");
720 } else if (cook->type == AIM_CAPS_VOICE) {
722 faimdprintf(sess, 0, "voice request cancelled\n");
726 faimdprintf(sess, 0, "unknown cookie cache type %d\n", cook->type);
729 aim_freetlvchain(&list2);
735 * The rest of the handling depends on what type it is.
737 if (args.reqclass & AIM_CAPS_BUDDYICON) {
741 miscinfo = aim_gettlv(list2, 0x2711, 1);
742 aim_bstream_init(&tbs, miscinfo->value, miscinfo->length);
744 args.info.icon.checksum = aimbs_get32(&tbs);
745 args.info.icon.length = aimbs_get32(&tbs);
746 args.info.icon.timestamp = aimbs_get32(&tbs);
747 args.info.icon.icon = aimbs_getraw(&tbs, args.info.icon.length);
749 if ((userfunc = aim_callhandler(sess, rx->conn, snac->family, snac->subtype)))
750 ret = userfunc(sess, rx, channel, userinfo, &args);
752 free(args.info.icon.icon);
754 } else if (args.reqclass & AIM_CAPS_VOICE) {
755 aim_msgcookie_t *cachedcook;
757 faimdprintf(sess, 1, "rend: voice!\n");
759 if(!(cachedcook = (aim_msgcookie_t*)calloc(1, sizeof(aim_msgcookie_t)))) {
760 aim_freetlvchain(&list2);
764 memcpy(cachedcook->cookie, cookie, 8);
765 cachedcook->type = AIM_COOKIETYPE_OFTVOICE;
766 cachedcook->data = NULL;
768 if (aim_cachecookie(sess, cachedcook) == -1)
769 faimdprintf(sess, 0, "ERROR caching message cookie\n");
771 /* XXX: implement all this */
773 if ((userfunc = aim_callhandler(sess, rx->conn, snac->family, snac->subtype)))
774 ret = userfunc(sess, rx, channel, userinfo, &args);
776 } else if (args.reqclass & AIM_CAPS_IMIMAGE) {
778 struct aim_directim_priv *priv;
780 memset(ip, 0, sizeof(ip));
782 if (aim_gettlv(list2, 0x0003, 1) && aim_gettlv(list2, 0x0005, 1)) {
783 aim_tlv_t *iptlv, *porttlv;
785 iptlv = aim_gettlv(list2, 0x0003, 1);
786 porttlv = aim_gettlv(list2, 0x0005, 1);
788 snprintf(ip, 30, "%d.%d.%d.%d:%d",
789 aimutil_get8(iptlv->value+0),
790 aimutil_get8(iptlv->value+1),
791 aimutil_get8(iptlv->value+2),
792 aimutil_get8(iptlv->value+3),
793 4443 /*aimutil_get16(porttlv->value)*/);
796 faimdprintf(sess, 1, "rend: directIM request from %s (%s)\n",
800 * XXX: there are a couple of different request packets for
804 args.info.directim = priv = (struct aim_directim_priv *)calloc(1, sizeof(struct aim_directim_priv)); /* XXX error */
805 memcpy(priv->ip, ip, sizeof(priv->ip));
806 memcpy(priv->sn, userinfo->sn, sizeof(priv->sn));
807 memcpy(priv->cookie, cookie, sizeof(priv->cookie));
809 if ((userfunc = aim_callhandler(sess, rx->conn, snac->family, snac->subtype)))
810 ret = userfunc(sess, rx, channel, userinfo, &args);
812 } else if (args.reqclass & AIM_CAPS_CHAT) {
816 miscinfo = aim_gettlv(list2, 0x2711, 1);
818 aim_bstream_init(&tbs, miscinfo->value, miscinfo->length);
820 aim_chat_readroominfo(&tbs, &args.info.chat.roominfo);
822 if (aim_gettlv(list2, 0x000c, 1))
823 args.info.chat.msg = aim_gettlv_str(list2, 0x000c, 1);
825 if (aim_gettlv(list2, 0x000d, 1))
826 args.info.chat.encoding = aim_gettlv_str(list2, 0x000d, 1);
828 if (aim_gettlv(list2, 0x000e, 1))
829 args.info.chat.lang = aim_gettlv_str(list2, 0x000e, 1);
831 if ((userfunc = aim_callhandler(sess, rx->conn, snac->family, snac->subtype)))
832 ret = userfunc(sess, rx, channel, userinfo, &args);
834 free(args.info.chat.roominfo.name);
835 free(args.info.chat.msg);
836 free(args.info.chat.encoding);
837 free(args.info.chat.lang);
839 } else if (args.reqclass & AIM_CAPS_GETFILE) {
841 aim_msgcookie_t *cachedcook;
843 aim_tlv_t *iptlv, *porttlv;
847 if (!(cachedcook = calloc(1, sizeof(aim_msgcookie_t)))) {
848 aim_freetlvchain(&list2);
852 if (!(miscinfo = aim_gettlv(list2, 0x2711, 1)) ||
853 !(iptlv = aim_gettlv(list2, 0x0003, 1)) ||
854 !(porttlv = aim_gettlv(list2, 0x0005, 1))) {
856 faimdprintf(sess, 0, "rend: badly damaged file get request from %s...\n", userinfo->sn);
857 aim_cookie_free(sess, cachedcook);
858 aim_freetlvchain(&list2);
863 snprintf(ip, 30, "%d.%d.%d.%d:%d",
864 aimutil_get8(iptlv->value+0),
865 aimutil_get8(iptlv->value+1),
866 aimutil_get8(iptlv->value+2),
867 aimutil_get8(iptlv->value+3),
868 aimutil_get16(porttlv->value));
870 faimdprintf(sess, 0, "rend: file get request from %s (%s)\n", userinfo->sn, ip);
872 args.info.getfile.ip = ip;
873 args.info.getfile.cookie = cookie;
875 if ((userfunc = aim_callhandler(sess, rx->conn, snac->family, snac->subtype)))
876 ret = userfunc(sess, rx, channel, userinfo, &args);
878 } else if (args.reqclass & AIM_CAPS_SENDFILE) {
881 aim_msgcookie_t *cachedcook;
883 aim_tlv_t *iptlv, *porttlv;
887 if (!(cachedcook = calloc(1, sizeof(aim_msgcookie_t)))) {
888 aim_freetlvchain(&list2);
892 if (!(miscinfo = aim_gettlv(list2, 0x2711, 1)) ||
893 !(iptlv = aim_gettlv(list2, 0x0003, 1)) ||
894 !(porttlv = aim_gettlv(list2, 0x0005, 1))) {
896 faimdprintf(sess, 0, "rend: badly damaged file get request from %s...\n", userinfo->sn);
897 aim_cookie_free(sess, cachedcook);
898 aim_freetlvchain(&list2);
903 snprintf(ip, 30, "%d.%d.%d.%d:%d",
904 aimutil_get8(iptlv->value+0),
905 aimutil_get8(iptlv->value+1),
906 aimutil_get8(iptlv->value+2),
907 aimutil_get8(iptlv->value+3),
908 aimutil_get16(porttlv->value));
910 if (aim_gettlv(list2, 0x000c, 1))
911 desc = aim_gettlv_str(list2, 0x000c, 1);
913 faimdprintf(sess, 0, "rend: file transfer request from %s: %s (%s)\n",
914 userinfo->sn, desc, ip);
916 memcpy(cachedcook->cookie, cookie, 8);
918 ft = malloc(sizeof(struct aim_filetransfer_priv)); /* XXX */
919 strncpy(ft->sn, userinfo.sn, sizeof(ft->sn));
920 strncpy(ft->ip, ip, sizeof(ft->ip));
921 strncpy(ft->fh.name, miscinfo->value+8, sizeof(ft->fh.name));
922 cachedcook->type = AIM_COOKIETYPE_OFTSEND;
923 cachedcook->data = ft;
925 if (aim_cachecookie(sess, cachedcook) == -1)
926 faimdprintf(sess, 0, "ERROR caching message cookie\n");
928 aim_accepttransfer(sess, rx->conn, ft->sn, cookie, AIM_CAPS_SENDFILE);
933 if ((userfunc = aim_callhandler(sess, rx->conn, snac->family, snac->subtype)))
934 ret = userfunc(sess, rx, channel, userinfo, &args);
938 faimdprintf(sess, 0, "rend: unknown rendezvous 0x%04x\n", args.reqclass);
940 aim_freetlvchain(&list2);
946 * It can easily be said that parsing ICBMs is THE single
947 * most difficult thing to do in the in AIM protocol. In
948 * fact, I think I just did say that.
950 * Below is the best damned solution I've come up with
951 * over the past sixteen months of battling with it. This
952 * can parse both away and normal messages from every client
953 * I have access to. Its not fast, its not clean. But it works.
956 static int incomingim(aim_session_t *sess, aim_module_t *mod, aim_frame_t *rx, aim_modsnac_t *snac, aim_bstream_t *bs)
961 struct aim_userinfo_s userinfo;
963 memset(&userinfo, 0x00, sizeof(struct aim_userinfo_s));
966 * Read ICBM Cookie. And throw away.
968 for (i = 0; i < 8; i++)
969 cookie[i] = aimbs_get8(bs);
974 * Channel 0x0001 is the message channel. There are
975 * other channels for things called "rendevous"
976 * which represent chat and some of the other new
977 * features of AIM2/3/3.5.
979 * Channel 0x0002 is the Rendevous channel, which
980 * is where Chat Invitiations and various client-client
981 * connection negotiations come from.
984 channel = aimbs_get16(bs);
987 * Technically Channel 3 in chat could be done here too.
989 if ((channel != 0x01) && (channel != 0x02)) {
990 faimdprintf(sess, 0, "icbm: ICBM received on an unsupported channel. Ignoring.\n (chan = %04x)", channel);
995 * Extract the standard user info block.
997 * Note that although this contains TLVs that appear contiguous
998 * with the TLVs read below, they are two different pieces. The
999 * userinfo block contains the number of TLVs that contain user
1000 * information, the rest are not even though there is no seperation.
1001 * aim_extractuserinfo() returns the number of bytes used by the
1002 * userinfo tlvs, so you can start reading the rest of them right
1005 * That also means that TLV types can be duplicated between the
1006 * userinfo block and the rest of the message, however there should
1007 * never be two TLVs of the same type in one block.
1010 aim_extractuserinfo(sess, bs, &userinfo);
1013 * From here on, its depends on what channel we're on.
1015 * Technically all channels have a TLV list have this, however,
1016 * for the common channel 1 case, in-place parsing is used for
1017 * performance reasons (less memory allocation).
1021 ret = incomingim_ch1(sess, mod, rx, snac, channel, &userinfo, bs, cookie);
1023 } else if (channel == 0x0002) {
1024 aim_tlvlist_t *tlvlist;
1027 * Read block of TLVs (not including the userinfo data). All
1028 * further data is derived from what is parsed here.
1030 tlvlist = aim_readtlvchain(bs);
1032 ret = incomingim_ch2(sess, mod, rx, snac, channel, &userinfo, tlvlist, cookie);
1035 * Free up the TLV chain.
1037 aim_freetlvchain(&tlvlist);
1045 * AIM_TRANSFER_DENY_NOTSUPPORTED -- "client does not support"
1046 * AIM_TRANSFER_DENY_DECLINE -- "client has declined transfer"
1047 * AIM_TRANSFER_DENY_NOTACCEPTING -- "client is not accepting transfers"
1050 faim_export int aim_denytransfer(aim_session_t *sess, aim_conn_t *conn, const char *sender, const char *cookie, fu16_t code)
1053 aim_snacid_t snacid;
1054 aim_tlvlist_t *tl = NULL;
1056 if (!(fr = aim_tx_new(sess, conn, AIM_FRAMETYPE_FLAP, 0x02, 10+8+2+1+strlen(sender)+6)))
1059 snacid = aim_cachesnac(sess, 0x0004, 0x000b, 0x0000, NULL, 0);
1060 aim_putsnac(&fr->data, 0x0004, 0x000b, 0x0000, snacid);
1062 aimbs_putraw(&fr->data, cookie, 8);
1064 aimbs_put16(&fr->data, 0x0002); /* channel */
1065 aimbs_put8(&fr->data, strlen(sender));
1066 aimbs_putraw(&fr->data, sender, strlen(sender));
1068 aim_addtlvtochain16(&tl, 0x0003, code);
1069 aim_writetlvchain(&fr->data, &tl);
1070 aim_freetlvchain(&tl);
1072 aim_tx_enqueue(sess, fr);
1078 * aim_reqicbmparaminfo()
1080 * Request ICBM parameter information.
1083 faim_export int aim_reqicbmparams(aim_session_t *sess, aim_conn_t *conn)
1085 return aim_genericreq_n(sess, conn, 0x0004, 0x0004);
1090 * I definitly recommend sending this. If you don't, you'll be stuck
1091 * with the rather unreasonable defaults. You don't want those. Send this.
1094 faim_export int aim_seticbmparam(aim_session_t *sess, aim_conn_t *conn, struct aim_icbmparameters *params)
1097 aim_snacid_t snacid;
1099 if (!sess || !conn || !params)
1102 if (!(fr = aim_tx_new(sess, conn, AIM_FRAMETYPE_FLAP, 0x02, 10+16)))
1105 snacid = aim_cachesnac(sess, 0x0004, 0x0002, 0x0000, NULL, 0);
1106 aim_putsnac(&fr->data, 0x0004, 0x0002, 0x0000, snacid);
1108 /* This is read-only (see Parameter Reply). Must be set to zero here. */
1109 aimbs_put16(&fr->data, 0x0000);
1111 /* These are all read-write */
1112 aimbs_put32(&fr->data, params->flags);
1113 aimbs_put16(&fr->data, params->maxmsglen);
1114 aimbs_put16(&fr->data, params->maxsenderwarn);
1115 aimbs_put16(&fr->data, params->maxrecverwarn);
1116 aimbs_put32(&fr->data, params->minmsginterval);
1118 aim_tx_enqueue(sess, fr);
1123 static int paraminfo(aim_session_t *sess, aim_module_t *mod, aim_frame_t *rx, aim_modsnac_t *snac, aim_bstream_t *bs)
1125 struct aim_icbmparameters params;
1126 aim_rxcallback_t userfunc;
1128 params.maxchan = aimbs_get16(bs);
1129 params.flags = aimbs_get32(bs);
1130 params.maxmsglen = aimbs_get16(bs);
1131 params.maxsenderwarn = aimbs_get16(bs);
1132 params.maxrecverwarn = aimbs_get16(bs);
1133 params.minmsginterval = aimbs_get32(bs);
1135 if ((userfunc = aim_callhandler(sess, rx->conn, snac->family, snac->subtype)))
1136 return userfunc(sess, rx, ¶ms);
1141 static int missedcall(aim_session_t *sess, aim_module_t *mod, aim_frame_t *rx, aim_modsnac_t *snac, aim_bstream_t *bs)
1144 aim_rxcallback_t userfunc;
1145 fu16_t channel, nummissed, reason;
1146 struct aim_userinfo_s userinfo;
1148 while (aim_bstream_empty(bs)) {
1150 channel = aimbs_get16(bs);
1151 aim_extractuserinfo(sess, bs, &userinfo);
1152 nummissed = aimbs_get16(bs);
1153 reason = aimbs_get16(bs);
1155 if ((userfunc = aim_callhandler(sess, rx->conn, snac->family, snac->subtype)))
1156 ret = userfunc(sess, rx, channel, &userinfo, nummissed, reason);
1162 static int clienterr(aim_session_t *sess, aim_module_t *mod, aim_frame_t *rx, aim_modsnac_t *snac, aim_bstream_t *bs)
1165 aim_rxcallback_t userfunc;
1166 fu16_t channel, reason;
1170 ck = aimbs_getraw(bs, 8);
1171 channel = aimbs_get16(bs);
1172 snlen = aimbs_get8(bs);
1173 sn = aimbs_getstr(bs, snlen);
1174 reason = aimbs_get16(bs);
1176 if ((userfunc = aim_callhandler(sess, rx->conn, snac->family, snac->subtype)))
1177 ret = userfunc(sess, rx, channel, sn, reason);
1182 static int msgack(aim_session_t *sess, aim_module_t *mod, aim_frame_t *rx, aim_modsnac_t *snac, aim_bstream_t *bs)
1184 aim_rxcallback_t userfunc;
1189 ck = aimbs_getraw(bs, 8);
1190 type = aimbs_get16(bs);
1191 snlen = aimbs_get8(bs);
1192 sn = aimbs_getstr(bs, snlen);
1194 if ((userfunc = aim_callhandler(sess, rx->conn, snac->family, snac->subtype)))
1195 return userfunc(sess, rx, type, sn);
1203 static int snachandler(aim_session_t *sess, aim_module_t *mod, aim_frame_t *rx, aim_modsnac_t *snac, aim_bstream_t *bs)
1206 if (snac->subtype == 0x0005)
1207 return paraminfo(sess, mod, rx, snac, bs);
1208 else if (snac->subtype == 0x0006)
1209 return outgoingim(sess, mod, rx, snac, bs);
1210 else if (snac->subtype == 0x0007)
1211 return incomingim(sess, mod, rx, snac, bs);
1212 else if (snac->subtype == 0x000a)
1213 return missedcall(sess, mod, rx, snac, bs);
1214 else if (snac->subtype == 0x000b)
1215 return clienterr(sess, mod, rx, snac, bs);
1216 else if (snac->subtype == 0x000c)
1217 return msgack(sess, mod, rx, snac, bs);
1222 faim_internal int msg_modfirst(aim_session_t *sess, aim_module_t *mod)
1225 mod->family = 0x0004;
1226 mod->version = 0x0000;
1228 strncpy(mod->name, "messaging", sizeof(mod->name));
1229 mod->snachandler = snachandler;