2 * -----------------------------------------------------------
3 * ProtoFAIM: v1.xx.xxplxx
4 * -----------------------------------------------------------
6 * This is ProtoFAIM v1.xx.xxplxx!!! Its nearly completely
7 * different than that ugly thing called v0. This app is
8 * compatible with the latest version of the libfaim library.
11 * ProtoFAIM should only be used for two things...
12 * 1) Testing the libfaim backend.
13 * 2) For reference on the libfaim API when developing clients.
15 * Its very ugly. Probably always will be. Nothing is more
16 * ugly than the backend itself, however.
18 * -----------------------------------------------------------
20 * I'm releasing this code and all it's associated linkage
21 * under the GNU General Public License. For more information,
22 * please refer to http://www.fsf.org. For any questions,
23 * please contact me at the address below.
26 * (c) 1998 Adam Fritzler, PST, mid@zigamoprh.net
28 * The password algorithms
29 * (c) 1998 Brock Wilcox, awwaiid@zigamorph.net
31 * THERE IS NO CODE FROM AOL'S AIM IN THIS CODE, NOR
32 * WAS THERE ANY DISASSEMBLAGE TO DEFINE PROTOCOL. All
33 * information was gained through painstakingly comparing
34 * TCP dumps while the AIM Java client was running. Nothing
35 * more than that, except for a lot of experimenting.
37 * -----------------------------------------------------------
44 static char *dprintf_ctime(void)
46 static char retbuf[64];
51 gettimeofday(&tv, &tz);
52 lt = localtime((time_t *)&tv.tv_sec);
53 strftime(retbuf, 64, "%a %b %e %H:%M:%S %Z %Y", lt);
57 #define DPRINTF_OUTSTREAM stdout
58 #define dprintf(x) { \
59 fprintf(DPRINTF_OUTSTREAM, "%s %s: " x, dprintf_ctime(), "faimtest"); \
60 fflush(DPRINTF_OUTSTREAM); \
62 #define dvprintf(x, y...) { \
63 fprintf(DPRINTF_OUTSTREAM, "%s %s: " x, dprintf_ctime(), "faimtest", y); \
64 fflush(DPRINTF_OUTSTREAM); \
66 #define dinlineprintf(x) { \
67 fprintf(DPRINTF_OUTSTREAM, x); \
68 fflush(DPRINTF_OUTSTREAM); \
70 #define dvinlineprintf(x, y...) { \
71 fprintf(DPRINTF_OUTSTREAM, x, y); \
72 fflush(DPRINTF_OUTSTREAM); \
74 #define dperror(x) dvprintf("%s: %s\n", x, strerror(errno));
76 int faimtest_parse_oncoming(struct aim_session_t *, struct command_rx_struct *, ...);
77 int faimtest_parse_offgoing(struct aim_session_t *, struct command_rx_struct *, ...);
78 int faimtest_parse_login_phase3d_f(struct aim_session_t *, struct command_rx_struct *, ...);
79 static int faimtest_parse_authresp(struct aim_session_t *, struct command_rx_struct *, ...);
80 int faimtest_parse_incoming_im(struct aim_session_t *, struct command_rx_struct *command, ...);
81 int faimtest_parse_userinfo(struct aim_session_t *, struct command_rx_struct *command, ...);
82 int faimtest_handleredirect(struct aim_session_t *, struct command_rx_struct *command, ...);
83 int faimtest_infochange(struct aim_session_t *sess, struct command_rx_struct *command, ...);
84 int faimtest_serverready(struct aim_session_t *, struct command_rx_struct *command, ...);
85 int faimtest_hostversions(struct aim_session_t *sess, struct command_rx_struct *command, ...);
86 int faimtest_parse_misses(struct aim_session_t *, struct command_rx_struct *command, ...);
87 int faimtest_parse_msgack(struct aim_session_t *, struct command_rx_struct *command, ...);
88 int faimtest_parse_motd(struct aim_session_t *, struct command_rx_struct *command, ...);
89 int faimtest_parse_login(struct aim_session_t *, struct command_rx_struct *command, ...);
90 int faimtest_chatnav_info(struct aim_session_t *, struct command_rx_struct *command, ...);
91 int faimtest_chat_incomingmsg(struct aim_session_t *sess, struct command_rx_struct *command, ...);
92 int faimtest_chat_infoupdate(struct aim_session_t *sess, struct command_rx_struct *command, ...);
93 int faimtest_chat_leave(struct aim_session_t *sess, struct command_rx_struct *command, ...);
94 int faimtest_chat_join(struct aim_session_t *sess, struct command_rx_struct *command, ...);
95 int faimtest_parse_connerr(struct aim_session_t *sess, struct command_rx_struct *command, ...);
96 int faimtest_debugconn_connect(struct aim_session_t *sess, struct command_rx_struct *command, ...);
98 int faimtest_directim_request(struct aim_session_t *sess, struct command_rx_struct *command, ...);
99 int faimtest_directim_initiate(struct aim_session_t *sess, struct command_rx_struct *command, ...);
100 int faimtest_directim_connect(struct aim_session_t *sess, struct command_rx_struct *command, ...);
101 int faimtest_directim_incoming(struct aim_session_t *sess, struct command_rx_struct *command, ...);
102 int faimtest_directim_disconnect(struct aim_session_t *sess, struct command_rx_struct *command, ...);
103 int faimtest_directim_typing(struct aim_session_t *sess, struct command_rx_struct *command, ...);
105 int faimtest_getfile_filereq(struct aim_session_t *sess, struct command_rx_struct *command, ...);
106 int faimtest_getfile_filesend(struct aim_session_t *sess, struct command_rx_struct *command, ...);
107 int faimtest_getfile_complete(struct aim_session_t *sess, struct command_rx_struct *command, ...);
108 int faimtest_getfile_disconnect(struct aim_session_t *sess, struct command_rx_struct *command, ...);
109 int faimtest_getfile_initiate(struct aim_session_t *sess, struct command_rx_struct *command, ...);
110 int faimtest_getfile_listing(struct aim_session_t *sess, struct command_rx_struct *command, ...);
111 int faimtest_getfile_listingreq(struct aim_session_t *sess, struct command_rx_struct *command, ...);
112 int faimtest_getfile_receive(struct aim_session_t *sess, struct command_rx_struct *command, ...);
113 int faimtest_getfile_state4(struct aim_session_t *sess, struct command_rx_struct *command, ...);
115 int faimtest_parse_ratechange(struct aim_session_t *sess, struct command_rx_struct *command, ...);
116 int faimtest_parse_evilnotify(struct aim_session_t *sess, struct command_rx_struct *command, ...);
117 int faimtest_parse_searcherror(struct aim_session_t *sess, struct command_rx_struct *command, ...);
118 int faimtest_parse_searchreply(struct aim_session_t *sess, struct command_rx_struct *command, ...);
119 int faimtest_parse_msgerr(struct aim_session_t *sess, struct command_rx_struct *command, ...);
120 int faimtest_parse_buddyrights(struct aim_session_t *sess, struct command_rx_struct *command, ...);
121 int faimtest_parse_locerr(struct aim_session_t *sess, struct command_rx_struct *command, ...);
122 int faimtest_parse_genericerr(struct aim_session_t *sess, struct command_rx_struct *command, ...);
124 static char *msgerrreasons[] = {
130 "Service unavailable",
131 "Service not defined",
133 "Not supported by host",
134 "Not supported by client",
139 "Busted SNAC payload",
140 "Insufficient rights",
141 "In local permit/deny",
143 "Too evil (receiver)",
144 "User temporarily unavailable",
150 static int msgerrreasonslen = 25;
152 static char *aimbinarypath = NULL;
153 static char *screenname,*password,*server=NULL;
154 static char *proxy = NULL, *proxyusername = NULL, *proxypass = NULL;
155 static char *ohcaptainmycaptain = NULL;
156 static int connected = 0;
158 struct aim_session_t aimsess;
161 static FILE *listingfile;
162 static char *listingpath;
164 static unsigned char *buddyicon = NULL;
165 static int buddyiconlen = 0;
166 static time_t buddyiconstamp = 0;
167 static unsigned short buddyiconsum = 0;
169 static void faimtest_debugcb(struct aim_session_t *sess, int level, const char *format, va_list va)
172 vfprintf(stderr, format, va);
177 int faimtest_reportinterval(struct aim_session_t *sess, struct command_rx_struct *command, ...)
180 unsigned short interval = 0;
182 va_start(ap, command);
183 interval = va_arg(ap, int);
186 dvprintf("aim: minimum report interval: %d (seconds?)\n", interval);
191 int faimtest_flapversion(struct aim_session_t *sess, struct command_rx_struct *command, ...)
194 dvprintf("faimtest: using FLAP version %u\n", aimutil_get32(command->data));
198 * This is an alternate location for starting the login process.
200 /* XXX should do more checking to make sure its really the right AUTH conn */
201 if (command->conn->type == AIM_CONN_TYPE_AUTH) {
202 /* do NOT send a connack/flapversion, request_login will send it if needed */
203 aim_request_login(sess, command->conn, screenname);
204 dprintf("faimtest: login request sent\n");
212 * This is a frivilous callback. You don't need it. I only used it for
213 * debugging non-blocking connects.
215 * If packets are sent to a conn before its fully connected, they
216 * will be queued and then transmitted when the connection completes.
219 int faimtest_conncomplete(struct aim_session_t *sess, struct command_rx_struct *command, ...)
222 struct aim_conn_t *conn;
224 va_start(ap, command);
225 conn = va_arg(ap, struct aim_conn_t *);
229 dvprintf("faimtest: connection on %d completed\n", conn->fd);
236 * This is really all thats needed to link against libfaim on win32.
238 * Note that this particular version of faimtest has never been tested
239 * on win32, but I'm fairly sure it should.
243 WORD wVersionRequested;
246 wVersionRequested = MAKEWORD(2,2);
247 return WSAStartup(wVersionRequested, &wsaData);
251 int faimtest_init(void)
253 struct aim_conn_t *stdinconn = NULL;
255 if (!(stdinconn = aim_newconn(&aimsess, 0, NULL))) {
256 dprintf("unable to create connection for stdin!\n");
260 stdinconn->fd = STDIN_FILENO;
268 if (ohcaptainmycaptain)
269 aim_send_im(&aimsess, aim_getconn_type(&aimsess, AIM_CONN_TYPE_BOS), ohcaptainmycaptain, 0, "ta ta...");
271 aim_session_kill(&aimsess);
273 if (faimtest_init() == -1)
274 dprintf("faimtest_init failed\n");
279 int login(const char *sn, const char *passwd)
281 struct aim_conn_t *authconn;
284 screenname = strdup(sn);
286 password = strdup(passwd);
289 aim_setupproxy(&aimsess, proxy, proxyusername, proxypass);
291 if (!screenname || !password) {
292 dprintf("need SN and password\n");
296 if (!(authconn = aim_newconn(&aimsess, AIM_CONN_TYPE_AUTH, server?server:FAIM_LOGIN_SERVER))) {
297 dprintf("faimtest: internal connection error while in aim_login. bailing out.\n");
299 } else if (authconn->fd == -1) {
300 if (authconn->status & AIM_CONN_STATUS_RESOLVERR) {
301 dprintf("faimtest: could not resolve authorizer name\n");
302 } else if (authconn->status & AIM_CONN_STATUS_CONNERR) {
303 dprintf("faimtest: could not connect to authorizer\n");
305 aim_conn_kill(&aimsess, &authconn);
309 aim_conn_addhandler(&aimsess, authconn, AIM_CB_FAM_SPECIAL, AIM_CB_SPECIAL_FLAPVER, faimtest_flapversion, 0);
310 aim_conn_addhandler(&aimsess, authconn, AIM_CB_FAM_SPECIAL, AIM_CB_SPECIAL_CONNCOMPLETE, faimtest_conncomplete, 0);
311 aim_conn_addhandler(&aimsess, authconn, 0x0017, 0x0007, faimtest_parse_login, 0);
312 aim_conn_addhandler(&aimsess, authconn, 0x0017, 0x0003, faimtest_parse_authresp, 0);
314 aim_conn_addhandler(&aimsess, authconn, AIM_CB_FAM_SPECIAL, AIM_CB_SPECIAL_DEBUGCONN_CONNECT, faimtest_debugconn_connect, 0);
316 /* If the connection is in progress, this will just be queued */
317 aim_request_login(&aimsess, authconn, screenname);
318 dprintf("faimtest: login request sent\n");
323 int main(int argc, char **argv)
325 struct aim_conn_t *waitingconn = NULL;
328 static int faimtest_mode = 0;
331 const char *buddyiconpath = NULL;
333 screenname = getenv("SCREENNAME");
334 password = getenv("PASSWORD");
335 server = getenv("AUTHSERVER");
336 proxy = getenv("SOCKSPROXY");
337 proxyusername = getenv("SOCKSNAME");
338 proxypass = getenv("SOCKSPASS");
340 listingpath = getenv("LISTINGPATH");
342 while ((i = getopt(argc, argv, "u:p:a:U:P:A:l:c:hoOb:i:")) != EOF) {
344 case 'u': screenname = optarg; break;
345 case 'p': password = optarg; break;
346 case 'a': server = optarg; break;
347 case 'U': proxyusername = optarg; break;
348 case 'P': proxypass = optarg; break;
349 case 'A': proxy = optarg; break;
350 case 'l': listingpath = optarg; break;
351 case 'c': ohcaptainmycaptain = optarg; break;
352 case 'o': faimtest_mode = 1; break; /* half old interface */
353 case 'O': faimtest_mode = 2; break; /* full old interface */
354 case 'b': aimbinarypath = optarg; break;
355 case 'i': buddyiconpath = optarg; break;
358 printf("faimtest\n");
359 printf(" Options: \n");
360 printf(" -u name Screen name ($SCREENNAME)\n");
361 printf(" -p passwd Password ($PASSWORD)\n");
362 printf(" -a host:port Authorizer ($AUTHSERVER)\n");
363 printf(" -U name Proxy user name ($SOCKSPROXY)\n");
364 printf(" -P passwd Proxy password ($SOCKSNAME)\n");
365 printf(" -A host:port Proxy host ($SOCKSPASS)\n");
366 printf(" -l path Path to listing file ($LISTINGPATH)\n");
367 printf(" -c name Screen name of owner\n");
368 printf(" -o Login at startup, then prompt\n");
369 printf(" -O Login, never give prompt\n");
370 printf(" -b path Path to AIM 3.5.1670 binaries\n");
371 printf(" -i file Buddy Icon to send\n");
377 if (initwsa() != 0) {
378 dprintf("faimtest: could not initialize windows sockets\n");
383 /* Pass zero as flags if you want blocking connects */
384 aim_session_init(&aimsess, AIM_SESS_FLAGS_NONBLOCKCONNECT, 1);
385 aim_setdebuggingcb(&aimsess, faimtest_debugcb); /* still needed even if debuglevel = 0 ! */
389 if(!(listingname = (char *)calloc(1, strlen(listingpath)+strlen("/listing.txt")))) {
390 dperror("listingname calloc");
393 sprintf(listingname, "%s/listing.txt", listingpath);
394 if( (listingfile = fopen(listingname, "r")) == NULL) {
395 dvprintf("Couldn't open %s... disabling that shit.\n", listingname);
405 if ((stat(buddyiconpath, &st) != -1) && (st.st_size <= MAXICONLEN) && (f = fopen(buddyiconpath, "r"))) {
407 buddyiconlen = st.st_size;
408 buddyiconstamp = st.st_mtime;
409 buddyicon = malloc(buddyiconlen);
410 fread(buddyicon, 1, st.st_size, f);
412 buddyiconsum = aim_iconsum(buddyicon, buddyiconlen);
414 dvprintf("read %d bytes of %s for buddy icon (sum 0x%08x)\n", buddyiconlen, buddyiconpath, buddyiconsum);
419 dvprintf("could not open buddy icon %s\n", buddyiconpath);
425 if (faimtest_mode < 2)
428 if (faimtest_mode >= 1) {
429 if (login(screenname, password) == -1) {
430 if (faimtest_mode < 2)
441 waitingconn = aim_select(&aimsess, &tv, &selstat);
443 if (connected && ((time(NULL) - lastnop) > 30)) {
444 lastnop = time(NULL);
445 aim_flap_nop(&aimsess, aim_getconn_type(&aimsess, AIM_CONN_TYPE_BOS));
448 if (selstat == -1) { /* error */
449 keepgoing = 0; /* fall through */
450 } else if (selstat == 0) { /* no events pending */
452 } else if (selstat == 1) { /* outgoing data pending */
453 aim_tx_flushqueue(&aimsess);
454 } else if (selstat == 2) { /* incoming data pending */
455 if ((faimtest_mode < 2) && (waitingconn->fd == STDIN_FILENO)) {
458 if (waitingconn->type == AIM_CONN_TYPE_RENDEZVOUS_OUT) {
459 if (aim_handlerendconnect(&aimsess, waitingconn) < 0) {
460 dprintf("connection error (rend out)\n");
461 aim_conn_kill(&aimsess, &waitingconn);
464 if (aim_get_command(&aimsess, waitingconn) >= 0) {
465 aim_rxdispatch(&aimsess);
467 dvprintf("connection error (type 0x%04x:0x%04x)\n", waitingconn->type, waitingconn->subtype);
468 /* we should have callbacks for all these, else the library will do the conn_kill for us. */
469 if(waitingconn->type == AIM_CONN_TYPE_RENDEZVOUS) {
470 dprintf("connection error: rendezvous connection. you forgot register a disconnect callback, right?\n");
471 aim_conn_kill(&aimsess, &waitingconn);
473 aim_conn_kill(&aimsess, &waitingconn);
474 if (!aim_getconn_type(&aimsess, AIM_CONN_TYPE_BOS)) {
475 dprintf("major connection error\n");
476 if (faimtest_mode == 2)
485 /* close up all connections, dead or no */
486 aim_session_kill(&aimsess);
488 if (faimtest_mode < 2) {
499 int faimtest_rateresp(struct aim_session_t *sess, struct command_rx_struct *command, ...)
502 switch(command->conn->type) {
503 case AIM_CONN_TYPE_BOS: {
504 /* this is the new buddy list */
506 /* this is the new profile */
509 /* Caution: Buddy1 and Buddy2 are real people! (who I don't know) */
510 snprintf(buddies, sizeof(buddies), "Buddy1&Buddy2&%s&", ohcaptainmycaptain?ohcaptainmycaptain:"blah");
511 snprintf(profile, sizeof(profile), "Hello.<br>My captain is %s. They were dumb enough to leave this message in their client, or they are using faimtest. Shame on them.", ohcaptainmycaptain);
513 aim_bos_ackrateresp(sess, command->conn); /* ack rate info response */
514 aim_bos_reqpersonalinfo(sess, command->conn);
515 aim_bos_reqlocaterights(sess, command->conn);
516 aim_bos_setprofile(sess, command->conn, profile, NULL, AIM_CAPS_BUDDYICON | AIM_CAPS_CHAT | AIM_CAPS_GETFILE | AIM_CAPS_SENDFILE | AIM_CAPS_IMIMAGE /*| AIM_CAPS_GAMES | AIM_CAPS_SAVESTOCKS*/);
517 aim_bos_reqbuddyrights(sess, command->conn);
519 /* send the buddy list and profile (required, even if empty) */
520 aim_bos_setbuddylist(sess, command->conn, buddies);
522 /* dont really know what this does */
523 aim_addicbmparam(sess, command->conn);
524 aim_bos_reqicbmparaminfo(sess, command->conn);
526 aim_bos_reqrights(sess, command->conn);
527 /* set group permissions -- all user classes */
528 aim_bos_setgroupperm(sess, command->conn, AIM_FLAG_ALLUSERS);
529 aim_bos_setprivacyflags(sess, command->conn, AIM_PRIVFLAGS_ALLOWIDLE);
533 case AIM_CONN_TYPE_AUTH:
534 aim_bos_ackrateresp(sess, command->conn);
535 aim_auth_clientready(sess, command->conn);
536 dprintf("faimtest: connected to authorization/admin service\n");
540 dvprintf("faimtest: got rate response for unhandled connection type %04x\n", command->conn->type);
547 static int faimtest_icbmparaminfo(struct aim_session_t *sess, struct command_rx_struct *command, ...)
549 unsigned long defflags, minmsginterval;
550 unsigned short maxicbmlen, maxsenderwarn, maxrecverwarn, maxchannel;
553 va_start(ap, command);
554 maxchannel = va_arg(ap, unsigned short);
555 defflags = va_arg(ap, unsigned long);
556 maxicbmlen = va_arg(ap, unsigned short);
557 maxsenderwarn = va_arg(ap, unsigned short);
558 maxrecverwarn = va_arg(ap, unsigned short);
559 minmsginterval = va_arg(ap, unsigned long);
562 dvprintf("ICBM Parameters: maxchannel = %d, default flags = 0x%08lx, max msg len = %d, max sender evil = %f, max reciever evil = %f, min msg interval = %ld\n", maxchannel, defflags, maxicbmlen, ((float)maxsenderwarn)/10.0, ((float)maxrecverwarn)/10.0, minmsginterval);
567 int faimtest_hostversions(struct aim_session_t *sess, struct command_rx_struct *command, ...)
570 unsigned char *versions;
573 va_start(ap, command);
574 vercount = va_arg(ap, int); /* number of family/version pairs */
575 versions = va_arg(ap, unsigned char *);
578 dprintf("faimtest: SNAC versions supported by this host: ");
579 for (i = 0; i < vercount*4; i += 4)
580 dvinlineprintf("0x%04x:0x%04x ",
581 aimutil_get16(versions+i), /* SNAC family */
582 aimutil_get16(versions+i+2) /* Version number */);
588 int faimtest_accountconfirm(struct aim_session_t *sess, struct command_rx_struct *command, ...)
593 va_start(ap, command);
594 status = va_arg(ap, int); /* status code of confirmation request */
597 dvprintf("account confirmation returned status 0x%04x (%s)\n", status, (status==0x0000)?"email sent":"unknown");
602 int faimtest_serverready(struct aim_session_t *sess, struct command_rx_struct *command, ...)
605 unsigned short *families;
608 va_start(ap, command);
609 famcount = va_arg(ap, int);
610 families = va_arg(ap, unsigned short *);
613 dvprintf("faimtest: SNAC families supported by this host (type %d): ", command->conn->type);
614 for (i = 0; i < famcount; i++)
615 dvinlineprintf("0x%04x ", families[i]);
618 switch (command->conn->type) {
619 case AIM_CONN_TYPE_AUTH:
620 aim_auth_setversions(sess, command->conn);
621 aim_bos_reqrate(sess, command->conn); /* request rate info */
623 dprintf("faimtest: done with auth ServerReady\n");
626 case AIM_CONN_TYPE_BOS:
628 aim_setversions(sess, command->conn);
629 aim_bos_reqrate(sess, command->conn); /* request rate info */
631 dprintf("faimtest: done with BOS ServerReady\n");
634 case AIM_CONN_TYPE_CHATNAV:
635 dprintf("faimtest: chatnav: got server ready\n");
636 aim_conn_addhandler(sess, command->conn, AIM_CB_FAM_CTN, AIM_CB_CTN_INFO, faimtest_chatnav_info, 0);
637 aim_bos_reqrate(sess, command->conn);
638 aim_bos_ackrateresp(sess, command->conn);
639 aim_chatnav_clientready(sess, command->conn);
640 aim_chatnav_reqrights(sess, command->conn);
644 case AIM_CONN_TYPE_CHAT:
645 aim_conn_addhandler(sess, command->conn, AIM_CB_FAM_CHT, AIM_CB_CHT_USERJOIN, faimtest_chat_join, 0);
646 aim_conn_addhandler(sess, command->conn, AIM_CB_FAM_CHT, AIM_CB_CHT_USERLEAVE, faimtest_chat_leave, 0);
647 aim_conn_addhandler(sess, command->conn, AIM_CB_FAM_CHT, AIM_CB_CHT_ROOMINFOUPDATE, faimtest_chat_infoupdate, 0);
648 aim_conn_addhandler(sess, command->conn, AIM_CB_FAM_CHT, AIM_CB_CHT_INCOMINGMSG, faimtest_chat_incomingmsg, 0);
649 aim_bos_reqrate(sess, command->conn);
650 aim_bos_ackrateresp(sess, command->conn);
651 aim_chat_clientready(sess, command->conn);
654 case AIM_CONN_TYPE_RENDEZVOUS: /* empty */
658 dvprintf("faimtest: unknown connection type on Host Online (0x%04x)\n", command->conn->type);
664 int faimtest_parse_buddyrights(struct aim_session_t *sess, struct command_rx_struct *command, ...)
667 unsigned short maxbuddies, maxwatchers;
669 va_start(ap, command);
670 maxbuddies = va_arg(ap, int);
671 maxwatchers = va_arg(ap, int);
674 dvprintf("faimtest: buddy list rights: Max buddies = %d / Max watchers = %d\n", maxbuddies, maxwatchers);
679 int faimtest_bosrights(struct aim_session_t *sess, struct command_rx_struct *command, ...)
681 unsigned short maxpermits, maxdenies;
684 va_start(ap, command);
685 maxpermits = va_arg(ap, int);
686 maxdenies = va_arg(ap, int);
689 dvprintf("faimtest: BOS rights: Max permit = %d / Max deny = %d\n", maxpermits, maxdenies);
691 aim_bos_clientready(sess, command->conn);
693 dprintf("faimtest: officially connected to BOS.\n");
698 int faimtest_locrights(struct aim_session_t *sess, struct command_rx_struct *command, ...)
700 unsigned short maxsiglen;
703 va_start(ap, command);
704 maxsiglen = va_arg(ap, int);
707 dvprintf("faimtest: locate rights: max signature length = %d\n", maxsiglen);
712 int faimtest_parse_unknown(struct aim_session_t *sess, struct command_rx_struct *command, ...)
716 if (!sess || !command)
719 dprintf("\nReceived unknown packet:");
720 for (i = 0; i < command->commandlen; i++) {
722 dinlineprintf("\n\t");
723 dvinlineprintf("0x%2x ", command->data[i]);
725 dinlineprintf("\n\n");
733 This, of course, handles Service Redirects from OSCAR.
735 Should get passed in the following:
736 struct command_rx_struct *command
739 the destination service ID
741 the IP address of the service's server
745 int faimtest_handleredirect(struct aim_session_t *sess, struct command_rx_struct *command, ...)
750 unsigned char *cookie;
752 va_start(ap, command);
753 serviceid = va_arg(ap, int);
754 ip = va_arg(ap, char *);
755 cookie = va_arg(ap, unsigned char *);
758 case 0x0005: { /* Adverts */
759 struct aim_conn_t *tstconn;
761 tstconn = aim_newconn(sess, AIM_CONN_TYPE_ADS, ip);
762 if ((tstconn==NULL) || (tstconn->status & AIM_CONN_STATUS_RESOLVERR)) {
763 dprintf("faimtest: unable to reconnect with authorizer\n");
765 aim_conn_addhandler(sess, tstconn, AIM_CB_FAM_SPECIAL, AIM_CB_SPECIAL_FLAPVER, faimtest_flapversion, 0);
766 aim_conn_addhandler(sess, tstconn, AIM_CB_FAM_SPECIAL, AIM_CB_SPECIAL_CONNCOMPLETE, faimtest_conncomplete, 0);
767 aim_conn_addhandler(sess, tstconn, 0x0001, 0x0003, faimtest_serverready, 0);
768 aim_conn_addhandler(sess, tstconn, 0x0001, 0x0007, faimtest_rateresp, 0); /* rate info */
769 aim_conn_addhandler(sess, tstconn, AIM_CB_FAM_GEN, 0x0018, faimtest_hostversions, 0);
770 aim_auth_sendcookie(sess, tstconn, cookie);
771 dprintf("sent cookie to adverts host\n");
775 case 0x0007: { /* Authorizer */
776 struct aim_conn_t *tstconn;
777 /* Open a connection to the Auth */
778 tstconn = aim_newconn(sess, AIM_CONN_TYPE_AUTH, ip);
779 if ((tstconn==NULL) || (tstconn->status & AIM_CONN_STATUS_RESOLVERR)) {
780 dprintf("faimtest: unable to reconnect with authorizer\n");
782 aim_conn_addhandler(sess, tstconn, AIM_CB_FAM_SPECIAL, AIM_CB_SPECIAL_FLAPVER, faimtest_flapversion, 0);
783 aim_conn_addhandler(sess, tstconn, AIM_CB_FAM_SPECIAL, AIM_CB_SPECIAL_CONNCOMPLETE, faimtest_conncomplete, 0);
784 aim_conn_addhandler(sess, tstconn, 0x0001, 0x0003, faimtest_serverready, 0);
785 aim_conn_addhandler(sess, tstconn, 0x0001, 0x0007, faimtest_rateresp, 0); /* rate info */
786 aim_conn_addhandler(sess, tstconn, AIM_CB_FAM_GEN, 0x0018, faimtest_hostversions, 0);
787 aim_conn_addhandler(sess, tstconn, 0x0007, 0x0007, faimtest_accountconfirm, 0);
788 aim_conn_addhandler(sess, tstconn, 0x0007, 0x0003, faimtest_infochange, 0);
789 aim_conn_addhandler(sess, tstconn, 0x0007, 0x0005, faimtest_infochange, 0);
790 /* Send the cookie to the Auth */
791 aim_auth_sendcookie(sess, tstconn, cookie);
792 dprintf("sent cookie to authorizer host\n");
796 case 0x000d: { /* ChatNav */
797 struct aim_conn_t *tstconn = NULL;
798 tstconn = aim_newconn(sess, AIM_CONN_TYPE_CHATNAV, ip);
799 if ( (tstconn==NULL) || (tstconn->status & AIM_CONN_STATUS_RESOLVERR)) {
800 dprintf("faimtest: unable to connect to chatnav server\n");
801 if (tstconn) aim_conn_kill(sess, &tstconn);
805 aim_conn_addhandler(sess, tstconn, 0x0001, 0x0003, faimtest_serverready, 0);
806 aim_conn_addhandler(sess, tstconn, AIM_CB_FAM_SPECIAL, AIM_CB_SPECIAL_CONNCOMPLETE, faimtest_conncomplete, 0);
807 aim_auth_sendcookie(sess, tstconn, cookie);
808 dprintf("\achatnav: connected\n");
811 case 0x000e: { /* Chat */
812 char *roomname = NULL;
814 struct aim_conn_t *tstconn = NULL;
816 roomname = va_arg(ap, char *);
817 exchange = va_arg(ap, int);
819 tstconn = aim_newconn(sess, AIM_CONN_TYPE_CHAT, ip);
820 if ( (tstconn==NULL) || (tstconn->status & AIM_CONN_STATUS_RESOLVERR)) {
821 dprintf("faimtest: unable to connect to chat server\n");
822 if (tstconn) aim_conn_kill(sess, &tstconn);
825 dvprintf("faimtest: chat: connected to %s on exchange %d\n", roomname, exchange);
828 * We must do this to attach the stored name to the connection!
830 aim_chat_attachname(tstconn, roomname);
832 aim_conn_addhandler(sess, tstconn, 0x0001, 0x0003, faimtest_serverready, 0);
833 aim_conn_addhandler(sess, tstconn, AIM_CB_FAM_SPECIAL, AIM_CB_SPECIAL_CONNCOMPLETE, faimtest_conncomplete, 0);
834 aim_auth_sendcookie(sess, tstconn, cookie);
839 dvprintf("uh oh... got redirect for unknown service 0x%04x!!\n", serviceid);
849 * This is a little more complicated than it looks. The module
850 * name (proto, boscore, etc) may or may not be given. If it is
851 * not given, then use aim.exe. If it is given, put ".ocm" on the
854 * Now, if the offset or length requested would cause a read past
855 * the end of the file, then the request is considered invalid. Invalid
856 * requests are processed specially. The value hashed is the
857 * the request, put into little-endian (eight bytes: offset followed
860 * Additionally, if the request is valid, the length is mod 4096. It is
861 * important that the length is checked for validity first before doing
864 * Note to Bosco's Brigade: if you'd like to break this, put the
865 * module name on an invalid request.
868 static int getaimdata(unsigned char **bufret, int *buflenret, unsigned long offset, unsigned long len, const char *modname)
871 static const char defaultmod[] = "aim.exe";
872 char *filename = NULL;
877 if (!bufret || !buflenret)
882 if (!(filename = malloc(strlen(aimbinarypath)+1+strlen(modname)+4+1))) {
883 dperror("memrequest: malloc");
887 sprintf(filename, "%s/%s.ocm", aimbinarypath, modname);
891 if (!(filename = malloc(strlen(aimbinarypath)+1+strlen(defaultmod)+1))) {
892 dperror("memrequest: malloc");
896 sprintf(filename, "%s/%s", aimbinarypath, defaultmod);
900 if (stat(filename, &st) == -1) {
902 dperror("memrequest: stat");
910 if ((offset > st.st_size) || (len > st.st_size))
912 else if ((st.st_size - offset) < len)
913 len = st.st_size - offset;
914 else if ((st.st_size - len) < len)
915 len = st.st_size - len;
924 free(filename); /* not needed */
926 dvprintf("memrequest: recieved invalid request for 0x%08lx bytes at 0x%08lx (file %s)\n", len, offset, modname);
930 i += strlen(modname);
932 if (!(buf = malloc(i)))
938 memcpy(buf, modname, strlen(modname));
939 i += strlen(modname);
942 /* Damn endianness. This must be little (LSB first) endian. */
943 buf[i++] = offset & 0xff;
944 buf[i++] = (offset >> 8) & 0xff;
945 buf[i++] = (offset >> 16) & 0xff;
946 buf[i++] = (offset >> 24) & 0xff;
947 buf[i++] = len & 0xff;
948 buf[i++] = (len >> 8) & 0xff;
949 buf[i++] = (len >> 16) & 0xff;
950 buf[i++] = (len >> 24) & 0xff;
957 if (!(buf = malloc(len))) {
962 dvprintf("memrequest: loading %ld bytes from 0x%08lx in \"%s\"...\n", len, offset, filename);
964 if (!(f = fopen(filename, "r"))) {
965 dperror("memrequest: fopen");
973 if (fseek(f, offset, SEEK_SET) == -1) {
974 dperror("memrequest: fseek");
980 if (fread(buf, len, 1, f) != 1) {
981 dperror("memrequest: fread");
994 return 0; /* success! */
998 * This will get an offset and a length. The client should read this
999 * data out of whatever AIM.EXE binary the user has provided (hopefully
1000 * it matches the client information thats sent at login) and pass a
1001 * buffer back to libfaim so it can hash the data and send it to AOL for
1002 * inspection by the client police.
1004 static int faimtest_memrequest(struct aim_session_t *sess, struct command_rx_struct *command, ...)
1007 unsigned long offset, len;
1012 va_start(ap, command);
1013 offset = va_arg(ap, unsigned long);
1014 len = va_arg(ap, unsigned long);
1015 modname = va_arg(ap, char *);
1018 if (aimbinarypath && (getaimdata(&buf, &buflen, offset, len, modname) == 0)) {
1020 aim_sendmemblock(sess, command->conn, offset, buflen, buf, AIM_SENDMEMBLOCK_FLAG_ISREQUEST);
1026 dvprintf("memrequest: unable to use AIM binary (\"%s/%s\"), sending defaults...\n", aimbinarypath, modname);
1028 aim_sendmemblock(sess, command->conn, offset, len, NULL, AIM_SENDMEMBLOCK_FLAG_ISREQUEST);
1035 static int faimtest_parse_authresp(struct aim_session_t *sess, struct command_rx_struct *command, ...)
1038 struct aim_conn_t *bosconn = NULL;
1039 char *sn = NULL, *bosip = NULL, *errurl = NULL, *email = NULL;
1040 unsigned char *cookie = NULL;
1041 int errorcode = 0, regstatus = 0;
1042 int latestbuild = 0, latestbetabuild = 0;
1043 char *latestrelease = NULL, *latestbeta = NULL;
1044 char *latestreleaseurl = NULL, *latestbetaurl = NULL;
1045 char *latestreleaseinfo = NULL, *latestbetainfo = NULL;
1047 va_start(ap, command);
1048 sn = va_arg(ap, char *);
1049 errorcode = va_arg(ap, int);
1050 errurl = va_arg(ap, char *);
1051 regstatus = va_arg(ap, int);
1052 email = va_arg(ap, char *);
1053 bosip = va_arg(ap, char *);
1054 cookie = va_arg(ap, unsigned char *);
1056 latestrelease = va_arg(ap, char *);
1057 latestbuild = va_arg(ap, int);
1058 latestreleaseurl = va_arg(ap, char *);
1059 latestreleaseinfo = va_arg(ap, char *);
1061 latestbeta = va_arg(ap, char *);
1062 latestbetabuild = va_arg(ap, int);
1063 latestbetaurl = va_arg(ap, char *);
1064 latestbetainfo = va_arg(ap, char *);
1068 dvprintf("Screen name: %s\n", sn);
1073 if (errorcode || !bosip || !cookie) {
1074 dvprintf("Login Error Code 0x%04x\n", errorcode);
1075 dvprintf("Error URL: %s\n", errurl);
1076 aim_conn_kill(sess, &command->conn);
1080 dvprintf("Reg status: %2d\n", regstatus);
1081 dvprintf("Email: %s\n", email);
1082 dvprintf("BOS IP: %s\n", bosip);
1085 dvprintf("Latest beta version: %s, build %d, at %s (more info at %s)\n", latestbeta, latestbetabuild, latestbetaurl, latestbetainfo);
1088 dvprintf("Latest released version: %s, build %d, at %s (more info at %s)\n", latestrelease, latestbuild, latestreleaseurl, latestreleaseinfo);
1090 dprintf("Closing auth connection...\n");
1091 aim_conn_kill(sess, &command->conn);
1092 if (!(bosconn = aim_newconn(sess, AIM_CONN_TYPE_BOS, bosip))) {
1093 dprintf("faimtest: could not connect to BOS: internal error\n");
1095 } else if (bosconn->status & AIM_CONN_STATUS_CONNERR) {
1096 dprintf("faimtest: could not connect to BOS\n");
1097 aim_conn_kill(sess, &bosconn);
1101 aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_SPECIAL, AIM_CB_SPECIAL_CONNCOMPLETE, faimtest_conncomplete, 0);
1102 aim_conn_addhandler(sess, bosconn, 0x0009, 0x0003, faimtest_bosrights, 0);
1103 aim_conn_addhandler(sess, bosconn, 0x0001, 0x0007, faimtest_rateresp, 0); /* rate info */
1104 aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_ACK, AIM_CB_ACK_ACK, NULL, 0);
1105 aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_GEN, 0x0018, faimtest_hostversions, 0);
1106 aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_GEN, AIM_CB_GEN_SERVERREADY, faimtest_serverready, 0);
1107 aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_GEN, AIM_CB_GEN_RATEINFO, NULL, 0);
1108 aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_GEN, AIM_CB_GEN_REDIRECT, faimtest_handleredirect, 0);
1109 aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_STS, AIM_CB_STS_SETREPORTINTERVAL, faimtest_reportinterval, 0);
1110 aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_BUD, AIM_CB_BUD_RIGHTSINFO, faimtest_parse_buddyrights, 0);
1111 aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_BUD, AIM_CB_BUD_ONCOMING, faimtest_parse_oncoming, 0);
1112 aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_BUD, AIM_CB_BUD_OFFGOING, faimtest_parse_offgoing, 0);
1113 aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_MSG, AIM_CB_MSG_INCOMING, faimtest_parse_incoming_im, 0);
1114 aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_LOC, AIM_CB_LOC_ERROR, faimtest_parse_locerr, 0);
1115 aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_MSG, AIM_CB_MSG_MISSEDCALL, faimtest_parse_misses, 0);
1116 aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_GEN, AIM_CB_GEN_RATECHANGE, faimtest_parse_ratechange, 0);
1117 aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_GEN, AIM_CB_GEN_EVIL, faimtest_parse_evilnotify, 0);
1118 aim_conn_addhandler(sess, bosconn, 0x000a, 0x0001, faimtest_parse_searcherror, 0);
1119 aim_conn_addhandler(sess, bosconn, 0x000a, 0x0003, faimtest_parse_searchreply, 0);
1120 aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_MSG, AIM_CB_MSG_ERROR, faimtest_parse_msgerr, 0);
1121 aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_LOC, AIM_CB_LOC_USERINFO, faimtest_parse_userinfo, 0);
1122 aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_LOC, AIM_CB_LOC_RIGHTSINFO, faimtest_locrights, 0);
1123 aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_MSG, AIM_CB_MSG_ACK, faimtest_parse_msgack, 0);
1125 aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_GEN, AIM_CB_GEN_MOTD, faimtest_parse_motd, 0);
1127 aim_conn_addhandler(sess, bosconn, 0x0004, 0x0005, faimtest_icbmparaminfo, 0);
1128 aim_conn_addhandler(sess, bosconn, 0x0001, 0x0001, faimtest_parse_genericerr, 0);
1129 aim_conn_addhandler(sess, bosconn, 0x0003, 0x0001, faimtest_parse_genericerr, 0);
1130 aim_conn_addhandler(sess, bosconn, 0x0009, 0x0001, faimtest_parse_genericerr, 0);
1132 aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_SPECIAL, AIM_CB_SPECIAL_CONNERR, faimtest_parse_connerr, 0);
1133 aim_conn_addhandler(sess, bosconn, 0x0001, 0x001f, faimtest_memrequest, 0);
1134 aim_conn_addhandler(sess, bosconn, 0xffff, 0xffff, faimtest_parse_unknown, 0);
1136 aim_auth_sendcookie(sess, bosconn, cookie);
1141 static void printuserflags(unsigned short flags)
1143 if (flags & AIM_FLAG_UNCONFIRMED)
1144 dinlineprintf("UNCONFIRMED ");
1145 if (flags & AIM_FLAG_ADMINISTRATOR)
1146 dinlineprintf("ADMINISTRATOR ");
1147 if (flags & AIM_FLAG_AOL)
1148 dinlineprintf("AOL ");
1149 if (flags & AIM_FLAG_OSCAR_PAY)
1150 dinlineprintf("OSCAR_PAY ");
1151 if (flags & AIM_FLAG_FREE)
1152 dinlineprintf("FREE ");
1153 if (flags & AIM_FLAG_AWAY)
1154 dinlineprintf("AWAY ");
1155 if (flags & AIM_FLAG_UNKNOWN40)
1156 dinlineprintf("ICQ? ");
1157 if (flags & AIM_FLAG_UNKNOWN80)
1158 dinlineprintf("UNKNOWN80 ");
1162 int faimtest_parse_userinfo(struct aim_session_t *sess, struct command_rx_struct *command, ...)
1164 struct aim_userinfo_s *userinfo;
1165 char *prof_encoding = NULL;
1167 unsigned short inforeq = 0;
1170 va_start(ap, command);
1171 userinfo = va_arg(ap, struct aim_userinfo_s *);
1172 prof_encoding = va_arg(ap, char *);
1173 prof = va_arg(ap, char *);
1174 inforeq = va_arg(ap, int);
1177 dvprintf("faimtest: userinfo: sn: %s\n", userinfo->sn);
1178 dvprintf("faimtest: userinfo: warnlevel: 0x%04x\n", userinfo->warnlevel);
1179 dvprintf("faimtest: userinfo: flags: 0x%04x = ", userinfo->flags);
1180 printuserflags(userinfo->flags);
1181 dinlineprintf("\n");
1183 dvprintf("faimtest: userinfo: membersince: %lu\n", userinfo->membersince);
1184 dvprintf("faimtest: userinfo: onlinesince: %lu\n", userinfo->onlinesince);
1185 dvprintf("faimtest: userinfo: idletime: 0x%04x\n", userinfo->idletime);
1187 if (inforeq == AIM_GETINFO_GENERALINFO) {
1188 dvprintf("faimtest: userinfo: profile_encoding: %s\n", prof_encoding ? prof_encoding : "[none]");
1189 dvprintf("faimtest: userinfo: prof: %s\n", prof ? prof : "[none]");
1190 } else if (inforeq == AIM_GETINFO_AWAYMESSAGE) {
1191 dvprintf("faimtest: userinfo: awaymsg_encoding: %s\n", prof_encoding ? prof_encoding : "[none]");
1192 dvprintf("faimtest: userinfo: awaymsg: %s\n", prof ? prof : "[none]");
1194 dprintf("faimtest: userinfo: unknown info request\n");
1199 static int faimtest_handlecmd(struct aim_session_t *sess, struct command_rx_struct *command, struct aim_userinfo_s *userinfo, char *tmpstr)
1202 if (!strncmp(tmpstr, "disconnect", 10)) {
1206 } else if (strstr(tmpstr, "goodday")) {
1208 aim_send_im(sess, command->conn, userinfo->sn, AIM_IMFLAGS_ACK, "Good day to you too.");
1210 } else if (strstr(tmpstr, "haveicon") && buddyicon) {
1211 struct aim_sendimext_args args;
1212 static const char iconmsg[] = {"I have an icon"};
1214 args.destsn = userinfo->sn;
1215 args.flags = AIM_IMFLAGS_HASICON;
1217 args.msglen = strlen(iconmsg);
1218 args.iconlen = buddyiconlen;
1219 args.iconstamp = buddyiconstamp;
1220 args.iconsum = buddyiconsum;
1222 aim_send_im_ext(sess, command->conn, &args);
1224 } else if (strstr(tmpstr, "sendicon") && buddyicon) {
1226 aim_send_icon(sess, command->conn, userinfo->sn, buddyicon, buddyiconlen, buddyiconstamp, buddyiconsum);
1228 } else if (strstr(tmpstr, "warnme")) {
1230 dprintf("faimtest: icbm: sending non-anon warning\n");
1231 aim_send_warning(sess, command->conn, userinfo->sn, 0);
1233 } else if (strstr(tmpstr, "anonwarn")) {
1235 dprintf("faimtest: icbm: sending anon warning\n");
1236 aim_send_warning(sess, command->conn, userinfo->sn, AIM_WARN_ANON);
1238 } else if (strstr(tmpstr, "setdirectoryinfo")) {
1240 dprintf("faimtest: icbm: sending backwards profile data\n");
1241 aim_setdirectoryinfo(sess, command->conn, "tsrif", "elddim", "tsal", "nediam", "emankcin", "teerts", "ytic", "etats", "piz", 0, 1);
1243 } else if (strstr(tmpstr, "setinterests")) {
1245 dprintf("faimtest: icbm: setting fun interests\n");
1246 aim_setuserinterests(sess, command->conn, "interest1", "interest2", "interest3", "interest4", "interest5", 1);
1248 } else if (!strncmp(tmpstr, "getfile", 7)) {
1250 if (!ohcaptainmycaptain) {
1252 aim_send_im(sess, command->conn, userinfo->sn, AIM_IMFLAGS_ACK, "I have no owner!");
1255 struct aim_conn_t *newconn;
1257 newconn = aim_getfile_initiate(sess, command->conn, (strlen(tmpstr) < 8)?ohcaptainmycaptain:tmpstr+8);
1258 dvprintf("faimtest: getting file listing from %s\n", (strlen(tmpstr) < 8)?ohcaptainmycaptain:tmpstr+8);
1259 aim_conn_addhandler(sess, newconn, AIM_CB_FAM_OFT, AIM_CB_OFT_GETFILEINITIATE, faimtest_getfile_initiate,0);
1262 } else if (!strncmp(tmpstr, "open chatnav", 12)) {
1264 aim_bos_reqservice(sess, command->conn, AIM_CONN_TYPE_CHATNAV);
1266 } else if (!strncmp(tmpstr, "create", 6)) {
1268 aim_chatnav_createroom(sess,aim_getconn_type(sess, AIM_CONN_TYPE_CHATNAV), (strlen(tmpstr) < 7)?"WorldDomination":tmpstr+7, 0x0004);
1270 } else if (!strncmp(tmpstr, "close chatnav", 13)) {
1271 struct aim_conn_t *chatnavconn;
1273 chatnavconn = aim_getconn_type(sess, AIM_CONN_TYPE_CHATNAV);
1274 aim_conn_kill(sess, &chatnavconn);
1276 } else if (!strncmp(tmpstr, "join", 4)) {
1278 aim_chat_join(sess, command->conn, 0x0004, "worlddomination");
1280 } else if (!strncmp(tmpstr, "leave", 5)) {
1282 aim_chat_leaveroom(sess, "worlddomination");
1284 } else if (!strncmp(tmpstr, "getinfo", 7)) {
1286 aim_getinfo(sess, command->conn, "75784102", AIM_GETINFO_GENERALINFO);
1287 aim_getinfo(sess, command->conn, "15853637", AIM_GETINFO_AWAYMESSAGE);
1288 aim_getinfo(sess, command->conn, "midendian", AIM_GETINFO_GENERALINFO);
1289 aim_getinfo(sess, command->conn, "midendian", AIM_GETINFO_AWAYMESSAGE);
1291 } else if (!strncmp(tmpstr, "open directim", 13)) {
1292 struct aim_conn_t *newconn;
1294 printf("faimtest: opening directim to %s\n", (strlen(tmpstr) < 14)?userinfo->sn:tmpstr+14);
1295 newconn = aim_directim_initiate(sess, command->conn, NULL, (strlen(tmpstr) < 14)?userinfo->sn:tmpstr+14);
1296 if(!newconn || newconn->fd == -1)
1297 printf("connection failed!\n");
1298 aim_conn_addhandler(sess, newconn, AIM_CB_FAM_OFT, AIM_CB_OFT_DIRECTIMINITIATE, faimtest_directim_initiate,0);
1300 } else if(!(strncmp(tmpstr, "lookup", 6))) {
1302 aim_usersearch_address(sess, command->conn, tmpstr+7);
1304 } else if (!strncmp(tmpstr, "reqsendmsg", 10)) {
1306 aim_send_im(sess, command->conn, ohcaptainmycaptain, 0, "sendmsg 7900");
1308 } else if (!strncmp(tmpstr, "reqauth", 7)) {
1310 aim_bos_reqservice(sess, command->conn, AIM_CONN_TYPE_AUTH);
1312 } else if (!strncmp(tmpstr, "reqconfirm", 10)) {
1314 aim_auth_reqconfirm(sess, aim_getconn_type(sess, AIM_CONN_TYPE_AUTH));
1316 } else if (!strncmp(tmpstr, "reqemail", 8)) {
1318 aim_auth_getinfo(sess, aim_getconn_type(sess, AIM_CONN_TYPE_AUTH), 0x0011);
1320 } else if (!strncmp(tmpstr, "changepass", 8)) {
1322 aim_auth_changepasswd(sess, aim_getconn_type(sess, AIM_CONN_TYPE_AUTH), "NEWPASSWORD", "OLDPASSWORD");
1324 } else if (!strncmp(tmpstr, "setemail", 8)) {
1326 aim_auth_setemail(sess, aim_getconn_type(sess, AIM_CONN_TYPE_AUTH), "NEWEMAILADDRESS");
1328 } else if (!strncmp(tmpstr, "sendmsg", 7)) {
1335 newbuf = malloc(i+1);
1336 for (z = 0; z < i; z++) {
1337 newbuf[z] = (z % 10)+0x30;
1340 aim_send_im(sess, command->conn, userinfo->sn, 0, newbuf);
1346 dprintf("unknown command.\n");
1347 aim_add_buddy(sess, command->conn, userinfo->sn);
1355 * The user-level Incoming ICBM callback.
1358 int faimtest_parse_incoming_im(struct aim_session_t *sess, struct command_rx_struct *command, ...)
1361 struct aim_userinfo_s *userinfo;
1364 va_start(ap, command);
1365 channel = va_arg(ap, int);
1366 userinfo = va_arg(ap, struct aim_userinfo_s *);
1369 * Channel 1: Standard Message
1373 struct aim_incomingim_ch1_args *args;
1374 int clienttype = AIM_CLIENTTYPE_UNKNOWN;
1376 args = va_arg(ap, struct aim_incomingim_ch1_args *);
1379 clienttype = aim_fingerprintclient(args->fingerprint, args->finlen);
1381 dvprintf("faimtest: icbm: sn = \"%s\"\n", userinfo->sn);
1382 dvprintf("faimtest: icbm: probable client type: %d\n", clienttype);
1383 dvprintf("faimtest: icbm: warnlevel = 0x%04x\n", userinfo->warnlevel);
1384 dvprintf("faimtest: icbm: flags = 0x%04x = ", userinfo->flags);
1385 printuserflags(userinfo->flags);
1386 dinlineprintf("\n");
1388 dvprintf("faimtest: icbm: membersince = %lu\n", userinfo->membersince);
1389 dvprintf("faimtest: icbm: onlinesince = %lu\n", userinfo->onlinesince);
1390 dvprintf("faimtest: icbm: idletime = 0x%04x\n", userinfo->idletime);
1391 dvprintf("faimtest: icbm: capabilities = 0x%04x\n", userinfo->capabilities);
1393 dprintf("faimtest: icbm: icbmflags = ");
1394 if (args->icbmflags & AIM_IMFLAGS_AWAY)
1395 dinlineprintf("away ");
1396 if (args->icbmflags & AIM_IMFLAGS_ACK)
1397 dinlineprintf("ackrequest ");
1398 if (args->icbmflags & AIM_IMFLAGS_BUDDYREQ)
1399 dinlineprintf("buddyreq ");
1400 if (args->icbmflags & AIM_IMFLAGS_HASICON)
1401 dinlineprintf("hasicon ");
1402 dinlineprintf("\n");
1404 dvprintf("faimtest: icbm: encoding flags = {%04x, %04x}\n", args->flag1, args->flag2);
1406 dvprintf("faimtest: icbm: message: %s\n", args->msg);
1408 if (args->icbmflags & AIM_IMFLAGS_HASICON)
1409 aim_send_im(sess, command->conn, userinfo->sn, AIM_IMFLAGS_BUDDYREQ, "You have an icon");
1414 while (args->msg[i] == '<') {
1415 if (args->msg[i] == '<') {
1416 while (args->msg[i] != '>')
1421 tmpstr = args->msg+i;
1423 faimtest_handlecmd(sess, command, userinfo, tmpstr);
1428 * Channel 2: Rendevous Request
1430 else if (channel == 2) {
1431 struct aim_incomingim_ch2_args *args;
1433 args = va_arg(ap, struct aim_incomingim_ch2_args *);
1436 switch (args->reqclass) {
1437 case AIM_CAPS_VOICE: {
1439 dvprintf("faimtest: voice invitation: source sn = %s\n", userinfo->sn);
1440 dvprintf("faimtest: voice invitation: \twarnlevel = 0x%04x\n", userinfo->warnlevel);
1441 dvprintf("faimtest: voice invitation: \tclass = 0x%04x = ", userinfo->flags);
1442 printuserflags(userinfo->flags);
1443 dinlineprintf("\n");
1445 /* we dont get membersince on chat invites! */
1446 dvprintf("faimtest: voice invitation: \tonlinesince = %lu\n", userinfo->onlinesince);
1447 dvprintf("faimtest: voice invitation: \tidletime = 0x%04x\n", userinfo->idletime);
1451 case AIM_CAPS_GETFILE: {
1452 struct aim_conn_t *newconn;
1453 struct aim_fileheader_t *fh;
1455 dvprintf("faimtest: get file request from %s (at %s) %x\n", userinfo->sn, args->info.getfile.ip, args->reqclass);
1457 fh = aim_getlisting(sess, listingfile);
1459 newconn = aim_accepttransfer(sess, command->conn, userinfo->sn, args->info.getfile.cookie, args->info.getfile.ip, fh->totfiles, fh->totsize, fh->size, fh->checksum, args->reqclass);
1461 if ( (!newconn) || (newconn->fd == -1) ) {
1462 dprintf("faimtest: getfile: requestconn: apparent error in accepttransfer\n");
1464 aim_conn_kill(sess, &newconn);
1470 aim_conn_addhandler(sess, newconn, AIM_CB_FAM_OFT, AIM_CB_OFT_GETFILELISTINGREQ, faimtest_getfile_listingreq, 0);
1471 aim_conn_addhandler(sess, newconn, AIM_CB_FAM_OFT, AIM_CB_OFT_GETFILEFILEREQ, faimtest_getfile_filereq, 0);
1472 aim_conn_addhandler(sess, newconn, AIM_CB_FAM_OFT, AIM_CB_OFT_GETFILEFILESEND, faimtest_getfile_filesend, 0);
1473 aim_conn_addhandler(sess, newconn, AIM_CB_FAM_OFT, AIM_CB_OFT_GETFILECOMPLETE, faimtest_getfile_complete, 0);
1475 aim_conn_addhandler(sess, newconn, AIM_CB_FAM_OFT, AIM_CB_OFT_GETFILEDISCONNECT, faimtest_getfile_disconnect, 0);
1477 dprintf("faimtest: getfile connect succeeded, handlers added.\n");
1481 case AIM_CAPS_SENDFILE: {
1482 dprintf("faimtest: send file!\n");
1485 case AIM_CAPS_CHAT: {
1487 dvprintf("faimtest: chat invitation: source sn = %s\n", userinfo->sn);
1488 dvprintf("faimtest: chat invitation: \twarnlevel = 0x%04x\n", userinfo->warnlevel);
1489 dvprintf("faimtest: chat invitation: \tclass = 0x%04x = ", userinfo->flags);
1490 printuserflags(userinfo->flags);
1491 dinlineprintf("\n");
1493 /* we dont get membersince on chat invites! */
1494 dvprintf("faimtest: chat invitation: \tonlinesince = %lu\n", userinfo->onlinesince);
1495 dvprintf("faimtest: chat invitation: \tidletime = 0x%04x\n", userinfo->idletime);
1497 dvprintf("faimtest: chat invitation: message = %s\n", args->info.chat.msg);
1498 dvprintf("faimtest: chat invitation: room name = %s\n", args->info.chat.roominfo.name);
1499 dvprintf("faimtest: chat invitation: encoding = %s\n", args->info.chat.encoding);
1500 dvprintf("faimtest: chat invitation: language = %s\n", args->info.chat.lang);
1501 dvprintf("faimtest: chat invitation: exchange = 0x%04x\n", args->info.chat.roominfo.exchange);
1502 dvprintf("faimtest: chat invitation: instance = 0x%04x\n", args->info.chat.roominfo.instance);
1503 dvprintf("faimtest: chat invitiation: autojoining %s...\n", args->info.chat.roominfo.name);
1506 * Automatically join room...
1508 aim_chat_join(sess, command->conn, args->info.chat.roominfo.exchange, args->info.chat.roominfo.name);
1511 case AIM_CAPS_IMIMAGE: {
1512 struct aim_conn_t *newconn;
1514 dprintf("faimtest: icbm: rendezvous imimage\n");
1516 dvprintf("faimtest: OFT: DirectIM: request from %s (%s)\n", userinfo->sn, args->info.directim->ip);
1518 newconn = aim_directim_connect(sess, command->conn, args->info.directim);
1520 if ( (!newconn) || (newconn->fd == -1) ) {
1521 dprintf("faimtest: icbm: imimage: could not connect\n");
1524 aim_conn_kill(sess, &newconn);
1529 aim_conn_addhandler(sess, newconn, AIM_CB_FAM_OFT, AIM_CB_OFT_DIRECTIMINCOMING, faimtest_directim_incoming, 0);
1530 aim_conn_addhandler(sess, newconn, AIM_CB_FAM_OFT, AIM_CB_OFT_DIRECTIMDISCONNECT, faimtest_directim_disconnect, 0);
1531 aim_conn_addhandler(sess, newconn, AIM_CB_FAM_OFT, AIM_CB_OFT_DIRECTIMTYPING, faimtest_directim_typing, 0);
1533 dvprintf("faimtest: OFT: DirectIM: connected to %s\n", userinfo->sn);
1535 aim_send_im_direct(sess, newconn, "goodday");
1539 case AIM_CAPS_BUDDYICON: {
1541 dvprintf("faimtest: Buddy Icon from %s, length = %u\n", userinfo->sn, args->info.icon.length);
1545 dvprintf("faimtest: icbm: unknown reqclass (%d)\n", args->reqclass);
1548 dvprintf("faimtest does not support channels > 2 (chan = %02x)\n", channel);
1550 dprintf("faimtest: icbm: done with ICBM handling\n");
1555 int faimtest_directim_initiate(struct aim_session_t *sess, struct command_rx_struct *command, ...)
1558 struct aim_directim_priv *priv;
1559 struct aim_conn_t *newconn, *listenerconn;
1561 va_start(ap, command);
1562 newconn = va_arg(ap, struct aim_conn_t *);
1563 listenerconn = va_arg(ap, struct aim_conn_t *);
1566 aim_conn_close(listenerconn);
1567 aim_conn_kill(sess, &listenerconn);
1569 priv = (struct aim_directim_priv *)newconn->priv;
1571 dvprintf("faimtest: OFT: DirectIM: intitiate success to %s\n", priv->ip);
1573 aim_conn_addhandler(sess, newconn, AIM_CB_FAM_OFT, AIM_CB_OFT_DIRECTIMINCOMING, faimtest_directim_incoming, 0);
1574 aim_conn_addhandler(sess, newconn, AIM_CB_FAM_OFT, AIM_CB_OFT_DIRECTIMDISCONNECT, faimtest_directim_disconnect, 0);
1575 aim_conn_addhandler(sess, newconn, AIM_CB_FAM_OFT, AIM_CB_OFT_DIRECTIMTYPING, faimtest_directim_typing, 0);
1577 aim_send_im_direct(sess, newconn, "goodday");
1579 dvprintf("faimtest: OFT: DirectIM: connected to %s\n", priv->sn);
1584 int faimtest_directim_connect(struct aim_session_t *sess, struct command_rx_struct *command, ...)
1587 struct aim_directim_priv *priv;
1589 va_start(ap, command);
1590 priv = va_arg(ap, struct aim_directim_priv *);
1594 dprintf("faimtest: directim_connect\n");
1599 int faimtest_directim_incoming(struct aim_session_t *sess, struct command_rx_struct *command, ...)
1603 struct aim_conn_t *conn;
1604 struct aim_directim_priv *priv;
1606 va_start(ap, command);
1607 conn = va_arg(ap, struct aim_conn_t *);
1608 msg = va_arg(ap, char *);
1611 if(!(priv = conn->priv)) {
1612 dvprintf("faimtest: directim: no private struct on conn with fd %d\n", conn->fd);
1616 dvprintf("faimtest: Directim from %s: %s\n", priv->sn, msg);
1617 if (!strncmp(msg, "sendmsg", 7)) {
1624 newbuf = malloc(i+1);
1625 for (z = 0; z < i; z++) {
1626 newbuf[z] = (z % 10)+0x30;
1629 aim_send_im_direct(sess, conn, newbuf);
1632 } else if (!strncmp(msg, "goodday", 7)) {
1633 aim_send_im_direct(sess, conn, "Good day to you, too");
1636 snprintf(newmsg, sizeof(newmsg), "unknown (%s)\n", msg);
1637 aim_send_im_direct(sess, conn, newmsg);
1642 int faimtest_directim_disconnect(struct aim_session_t *sess, struct command_rx_struct *command, ...)
1645 struct aim_conn_t *conn;
1648 va_start(ap, command);
1649 conn = va_arg(ap, struct aim_conn_t *);
1650 sn = va_arg(ap, char *);
1653 dvprintf("faimtest: directim: disconnected from %s\n", sn);
1655 aim_conn_kill(sess, &conn);
1659 int faimtest_directim_typing(struct aim_session_t *sess, struct command_rx_struct *command, ...)
1662 struct aim_conn_t *conn;
1663 struct aim_directim_priv *priv;
1665 va_start(ap, command);
1666 conn = va_arg(ap, struct aim_conn_t *);
1669 if(!(priv = (struct aim_directim_priv *)conn->priv)) {
1670 dvprintf("faimtest: no private struct on conn with fd %d!\n", conn->fd);
1674 dvprintf("faimtest: ohmigod! %s has started typing (DirectIM). He's going to send you a message! *squeal*\n", priv->sn);
1678 int faimtest_infochange(struct aim_session_t *sess, struct command_rx_struct *command, ...)
1680 unsigned short change = 0;
1681 int perms, type, length, str;
1685 va_start(ap, command);
1686 perms = va_arg(ap, int);
1687 type = va_arg(ap, int);
1688 length = va_arg(ap, int);
1689 val = va_arg(ap, char *);
1690 str = va_arg(ap, int);
1693 if (aimutil_get16(command->data+2) == 0x0005)
1696 dvprintf("info%s: perms = %d, type = %x, length = %d, val = %s\n", change?" change":"", perms, type, length, str?val:"(not string)");
1701 int faimtest_parse_oncoming(struct aim_session_t *sess, struct command_rx_struct *command, ...)
1703 struct aim_userinfo_s *userinfo;
1706 va_start(ap, command);
1707 userinfo = va_arg(ap, struct aim_userinfo_s *);
1710 dvprintf("%ld %s is now online (flags: %04x = %s%s%s%s%s%s%s%s) (caps = 0x%04x)\n",
1712 userinfo->sn, userinfo->flags,
1713 (userinfo->flags&AIM_FLAG_UNCONFIRMED)?" UNCONFIRMED":"",
1714 (userinfo->flags&AIM_FLAG_ADMINISTRATOR)?" ADMINISTRATOR":"",
1715 (userinfo->flags&AIM_FLAG_AOL)?" AOL":"",
1716 (userinfo->flags&AIM_FLAG_OSCAR_PAY)?" OSCAR_PAY":"",
1717 (userinfo->flags&AIM_FLAG_FREE)?" FREE":"",
1718 (userinfo->flags&AIM_FLAG_AWAY)?" AWAY":"",
1719 (userinfo->flags&AIM_FLAG_UNKNOWN40)?" UNKNOWN40":"",
1720 (userinfo->flags&AIM_FLAG_UNKNOWN80)?" UNKNOWN80":"",
1721 userinfo->capabilities);
1725 int faimtest_parse_offgoing(struct aim_session_t *sess, struct command_rx_struct *command, ...)
1727 struct aim_userinfo_s *userinfo;
1730 va_start(ap, command);
1731 userinfo = va_arg(ap, struct aim_userinfo_s *);
1734 dvprintf("%ld %s is now offline (flags: %04x = %s%s%s%s%s%s%s%s) (caps = 0x%04x)\n",
1736 userinfo->sn, userinfo->flags,
1737 (userinfo->flags&AIM_FLAG_UNCONFIRMED)?" UNCONFIRMED":"",
1738 (userinfo->flags&AIM_FLAG_ADMINISTRATOR)?" ADMINISTRATOR":"",
1739 (userinfo->flags&AIM_FLAG_AOL)?" AOL":"",
1740 (userinfo->flags&AIM_FLAG_OSCAR_PAY)?" OSCAR_PAY":"",
1741 (userinfo->flags&AIM_FLAG_FREE)?" FREE":"",
1742 (userinfo->flags&AIM_FLAG_AWAY)?" AWAY":"",
1743 (userinfo->flags&AIM_FLAG_UNKNOWN40)?" UNKNOWN40":"",
1744 (userinfo->flags&AIM_FLAG_UNKNOWN80)?" UNKNOWN80":"",
1745 userinfo->capabilities);
1749 int faimtest_parse_motd(struct aim_session_t *sess, struct command_rx_struct *command, ...)
1751 static char *codes[] = {
1753 "Mandatory upgrade",
1756 "Top o' the world!"};
1757 static int codeslen = 5;
1763 va_start(ap, command);
1764 id = va_arg(ap, int);
1765 msg = va_arg(ap, char *);
1768 dvprintf("faimtest: motd: %s (%d / %s)\n", msg, id,
1769 (id < codeslen)?codes[id]:"unknown");
1775 aim_bos_reqservice(sess, command->conn, 0x0005); /* adverts */
1776 aim_bos_reqservice(sess, command->conn, 0x000f); /* user directory */
1778 /* Don't know what this does... */
1779 /* XXX sess->sn should be normalized by the 0001/000f handler */
1780 aim_0002_000b(sess, command->conn, sess->sn);
1786 int faimtest_parse_genericerr(struct aim_session_t *sess, struct command_rx_struct *command, ...)
1789 unsigned short reason;
1791 va_start(ap, command);
1792 reason = va_arg(ap, int);
1795 dvprintf("faimtest: snac threw error (reason 0x%04x: %s)\n", reason, (reason<msgerrreasonslen)?msgerrreasons[reason]:"unknown");
1800 int faimtest_parse_msgerr(struct aim_session_t *sess, struct command_rx_struct *command, ...)
1804 unsigned short reason;
1806 va_start(ap, command);
1807 reason = va_arg(ap, int);
1808 destsn = va_arg(ap, char *);
1811 dvprintf("faimtest: message to %s bounced (reason 0x%04x: %s)\n", destsn, reason, (reason<msgerrreasonslen)?msgerrreasons[reason]:"unknown");
1816 int faimtest_parse_locerr(struct aim_session_t *sess, struct command_rx_struct *command, ...)
1820 unsigned short reason;
1822 va_start(ap, command);
1823 reason = va_arg(ap, int);
1824 destsn = va_arg(ap, char *);
1827 dvprintf("faimtest: user information for %s unavailable (reason 0x%04x: %s)\n", destsn, reason, (reason<msgerrreasonslen)?msgerrreasons[reason]:"unknown");
1833 * Handles callbacks for AIM_CB_MISSED_CALL.
1835 int faimtest_parse_misses(struct aim_session_t *sess, struct command_rx_struct *command, ...)
1837 static char *missedreasons[] = {
1839 "Message too large"};
1840 static int missedreasonslen = 2;
1843 unsigned short chan, nummissed, reason;
1844 struct aim_userinfo_s *userinfo;
1846 va_start(ap, command);
1847 chan = va_arg(ap, int);
1848 userinfo = va_arg(ap, struct aim_userinfo_s *);
1849 nummissed = va_arg(ap, int);
1850 reason = va_arg(ap, int);
1853 dvprintf("faimtest: missed %d messages from %s (reason %d: %s)\n", nummissed, userinfo->sn, reason, (reason<missedreasonslen)?missedreasons[reason]:"unknown");
1858 int faimtest_parse_login(struct aim_session_t *sess, struct command_rx_struct *command, ...)
1860 struct client_info_s info = AIM_CLIENTINFO_KNOWNGOOD;
1864 va_start(ap, command);
1865 key = va_arg(ap, char *);
1868 aim_send_login(sess, command->conn, screenname, password, &info, key);
1873 int faimtest_chat_join(struct aim_session_t *sess, struct command_rx_struct *command, ...)
1876 struct aim_userinfo_s *userinfo;
1877 int count = 0, i = 0;
1879 va_start(ap, command);
1880 count = va_arg(ap, int);
1881 userinfo = va_arg(ap, struct aim_userinfo_s *);
1884 dvprintf("faimtest: chat: %s: New occupants have joined:\n", (char *)command->conn->priv);
1886 dvprintf("faimtest: chat: %s: \t%s\n", (char *)command->conn->priv, userinfo[i++].sn);
1891 int faimtest_chat_leave(struct aim_session_t *sess, struct command_rx_struct *command, ...)
1894 struct aim_userinfo_s *userinfo;
1895 int count = 0, i = 0;
1897 va_start(ap, command);
1898 count = va_arg(ap, int);
1899 userinfo = va_arg(ap, struct aim_userinfo_s *);
1902 dvprintf("faimtest: chat: %s: Some occupants have left:\n", (char *)command->conn->priv);
1904 for (i = 0; i < count; )
1905 dvprintf("faimtest: chat: %s: \t%s\n", (char *)command->conn->priv, userinfo[i++].sn);
1910 int faimtest_chat_infoupdate(struct aim_session_t *sess, struct command_rx_struct *command, ...)
1913 struct aim_userinfo_s *userinfo;
1914 struct aim_chat_roominfo *roominfo;
1918 unsigned short unknown_c9, unknown_d2, unknown_d5, maxmsglen;
1919 unsigned long creationtime;
1921 va_start(ap, command);
1922 roominfo = va_arg(ap, struct aim_chat_roominfo *);
1923 roomname = va_arg(ap, char *);
1924 usercount= va_arg(ap, int);
1925 userinfo = va_arg(ap, struct aim_userinfo_s *);
1926 roomdesc = va_arg(ap, char *);
1927 unknown_c9 = va_arg(ap, int);
1928 creationtime = va_arg(ap, unsigned long);
1929 maxmsglen = va_arg(ap, int);
1930 unknown_d2 = va_arg(ap, int);
1931 unknown_d5 = va_arg(ap, int);
1934 dvprintf("faimtest: chat: %s: info update:\n", (char *)command->conn->priv);
1935 dvprintf("faimtest: chat: %s: \tRoominfo: {%04x, %s, %04x}\n",
1936 (char *)command->conn->priv,
1939 roominfo->instance);
1940 dvprintf("faimtest: chat: %s: \tRoomname: %s\n", (char *)command->conn->priv, roomname);
1941 dvprintf("faimtest: chat: %s: \tRoomdesc: %s\n", (char *)command->conn->priv, roomdesc);
1942 dvprintf("faimtest: chat: %s: \tOccupants: (%d)\n", (char *)command->conn->priv, usercount);
1944 for (i = 0; i < usercount; )
1945 dvprintf("faimtest: chat: %s: \t\t%s\n", (char *)command->conn->priv, userinfo[i++].sn);
1947 dvprintf("faimtest: chat: %s: \tUnknown_c9: 0x%04x\n", (char *)command->conn->priv, unknown_c9);
1948 dvprintf("faimtest: chat: %s: \tCreation time: %lu (time_t)\n", (char *)command->conn->priv, creationtime);
1949 dvprintf("faimtest: chat: %s: \tMax message length: %d bytes\n", (char *)command->conn->priv, maxmsglen);
1950 dvprintf("faimtest: chat: %s: \tUnknown_d2: 0x%04x\n", (char *)command->conn->priv, unknown_d2);
1951 dvprintf("faimtest: chat: %s: \tUnknown_d5: 0x%02x\n", (char *)command->conn->priv, unknown_d5);
1956 int faimtest_chat_incomingmsg(struct aim_session_t *sess, struct command_rx_struct *command, ...)
1959 struct aim_userinfo_s *userinfo;
1963 va_start(ap, command);
1964 userinfo = va_arg(ap, struct aim_userinfo_s *);
1965 msg = va_arg(ap, char *);
1968 dvprintf("faimtest: chat: %s: incoming msg from %s: %s\n", (char *)command->conn->priv, userinfo->sn, msg);
1971 * Do an echo for testing purposes. But not for ourselves ("oops!")
1973 if (strcmp(userinfo->sn, sess->sn) != 0)
1975 sprintf(tmpbuf, "(%s said \"%s\")", userinfo->sn, msg);
1976 aim_chat_send_im(sess, command->conn, 0, tmpbuf, strlen(tmpbuf));
1982 int faimtest_chatnav_info(struct aim_session_t *sess, struct command_rx_struct *command, ...)
1984 unsigned short type;
1987 va_start(ap, command);
1988 type = va_arg(ap, int);
1993 struct aim_chat_exchangeinfo *exchanges;
1994 int exchangecount,i = 0;
1996 maxrooms = va_arg(ap, int);
1997 exchangecount = va_arg(ap, int);
1998 exchanges = va_arg(ap, struct aim_chat_exchangeinfo *);
2001 dprintf("faimtest: chat info: Chat Rights:\n");
2002 dvprintf("faimtest: chat info: \tMax Concurrent Rooms: %d\n", maxrooms);
2004 dvprintf("faimtest: chat info: \tExchange List: (%d total)\n", exchangecount);
2005 for (i = 0; i < exchangecount; i++) {
2006 dvprintf("faimtest: chat info: \t\t%x: %s (%s/%s)\n",
2007 exchanges[i].number,
2009 exchanges[i].charset1,
2010 exchanges[i].lang1);
2016 char *fqcn, *name, *ck;
2017 unsigned short instance, flags, maxmsglen, maxoccupancy, unknown, exchange;
2018 unsigned char createperms;
2019 unsigned long createtime;
2021 fqcn = va_arg(ap, char *);
2022 instance = va_arg(ap, int);
2023 exchange = va_arg(ap, int);
2024 flags = va_arg(ap, int);
2025 createtime = va_arg(ap, unsigned long);
2026 maxmsglen = va_arg(ap, int);
2027 maxoccupancy = va_arg(ap, int);
2028 createperms = va_arg(ap, int);
2029 unknown = va_arg(ap, int);
2030 name = va_arg(ap, char *);
2031 ck = va_arg(ap, char *);
2034 dvprintf("faimtest: received room create reply for %s/0x%04x\n", fqcn, exchange);
2039 dvprintf("faimtest: chatnav info: unknown type (%04x)\n", type);
2044 int faimtest_parse_connerr(struct aim_session_t *sess, struct command_rx_struct *command, ...)
2047 unsigned short code;
2050 va_start(ap, command);
2051 code = va_arg(ap, int);
2052 msg = va_arg(ap, char *);
2055 dvprintf("faimtest: connerr: Code 0x%04x: %s\n", code, msg);
2056 aim_conn_kill(sess, &command->conn); /* this will break the main loop */
2063 int faimtest_debugconn_connect(struct aim_session_t *sess, struct command_rx_struct *command, ...)
2065 dprintf("faimtest: connecting to an aimdebugd!\n");
2067 /* convert the authorizer connection to a BOS connection */
2068 command->conn->type = AIM_CONN_TYPE_BOS;
2070 aim_conn_addhandler(sess, command->conn, AIM_CB_FAM_MSG, AIM_CB_MSG_INCOMING, faimtest_parse_incoming_im, 0);
2072 /* tell the aimddebugd we're ready */
2073 aim_debugconn_sendconnect(sess, command->conn);
2075 /* go right into main loop (don't open a BOS connection, etc) */
2080 * Received in response to an IM sent with the AIM_IMFLAGS_ACK option.
2082 int faimtest_parse_msgack(struct aim_session_t *sess, struct command_rx_struct *command, ...)
2085 unsigned short type;
2088 va_start(ap, command);
2089 type = va_arg(ap, int);
2090 sn = va_arg(ap, char *);
2093 dvprintf("faimtest: msgack: 0x%04x / %s\n", type, sn);
2098 int faimtest_getfile_filereq(struct aim_session_t *ses, struct command_rx_struct *command, ...)
2101 struct aim_conn_t *oftconn;
2102 struct aim_fileheader_t *fh;
2105 va_start(ap, command);
2106 oftconn = va_arg(ap, struct aim_conn_t *);
2107 fh = va_arg(ap, struct aim_fileheader_t *);
2108 cookie = va_arg(ap, char *);
2111 dvprintf("faimtest: request for file %s.\n", fh->name);
2117 int faimtest_getfile_filesend(struct aim_session_t *sess, struct command_rx_struct *command, ...)
2120 struct aim_conn_t *oftconn;
2121 struct aim_fileheader_t *fh;
2122 char *path, *cookie;
2123 int pos, bufpos = 0, bufsize = 2048, i;
2128 va_start(ap, command);
2129 oftconn = va_arg(ap, struct aim_conn_t *);
2130 fh = va_arg(ap, struct aim_fileheader_t *);
2131 cookie = va_arg(ap, char *);
2134 dvprintf("faimtest: sending file %s(%ld).\n", fh->name, fh->size);
2136 if(!(buf = malloc(2048)))
2139 if( (path = (char *)calloc(1, strlen(listingpath) +strlen(fh->name)+2)) == NULL) {
2141 dprintf("faimtest: error in calloc of path\n");
2142 return 0; /* XXX: no idea what winaim expects here =) */
2145 snprintf(path, strlen(listingpath)+strlen(fh->name)+2, "%s/%s", listingpath, fh->name);
2148 if( (file = fopen(path, "r")) == NULL) {
2149 dvprintf("faimtest: getfile_send fopen failed for %s. damn.\n", path);
2154 * This is a mess. Remember that faimtest is demonstration code
2155 * only and for the sake of the gods, don't use this code in any
2156 * of your clients. --mid
2158 for(pos = 0; pos < fh->size; pos++) {
2159 bufpos = pos % bufsize;
2161 if(bufpos == 0 && pos > 0) { /* filled our buffer. spit it across the wire */
2162 if ( (i = send(oftconn->fd, buf, bufsize, 0)) != bufsize ) {
2163 dperror("faim: getfile_send: write1");
2164 dprintf("faim: getfile_send: whoopsy, didn't write it all...\n");
2169 if( (buf[bufpos] = fgetc(file)) == EOF) {
2170 if(pos != fh->size) {
2171 dvprintf("faim: getfile_send: hrm... apparent early EOF at pos 0x%x of 0x%lx\n", pos, fh->size);
2176 dvprintf("%c(0x%02x) ", buf[pos], buf[pos]);
2179 if( (i = send(oftconn->fd, buf, bufpos+1, 0)) != (bufpos+1)) {
2180 dperror("faim: getfile_send: write2");
2181 dprintf("faim: getfile_send cleanup: whoopsy, didn't write it all...\n");
2191 int faimtest_getfile_complete(struct aim_session_t *sess, struct command_rx_struct *command, ...)
2194 struct aim_conn_t *conn;
2195 struct aim_fileheader_t *fh;
2197 va_start(ap, command);
2198 conn = va_arg(ap, struct aim_conn_t *);
2199 fh = va_arg(ap, struct aim_fileheader_t *);
2202 dvprintf("faimtest: completed file transfer for %s.\n", fh->name);
2204 aim_conn_close(conn);
2205 aim_conn_kill(sess, &conn);
2209 int faimtest_getfile_disconnect(struct aim_session_t *sess, struct command_rx_struct *command, ...)
2212 struct aim_conn_t *conn;
2215 va_start(ap, command);
2216 conn = va_arg(ap, struct aim_conn_t *);
2217 sn = va_arg(ap, char *);
2220 aim_conn_kill(sess, &conn);
2222 dvprintf("faimtest: getfile: disconnected from %s\n", sn);
2225 int faimtest_getfile_initiate(struct aim_session_t *sess, struct command_rx_struct *command, ...)
2228 struct aim_conn_t *conn, *listenerconn;
2229 struct aim_filetransfer_priv *priv;
2231 va_start(ap, command);
2232 conn = va_arg(ap, struct aim_conn_t *);
2233 listenerconn = va_arg(ap, struct aim_conn_t *);
2236 aim_conn_close(listenerconn);
2237 aim_conn_kill(sess, &listenerconn);
2239 aim_conn_addhandler(sess, conn, AIM_CB_FAM_OFT, AIM_CB_OFT_GETFILEFILEREQ, faimtest_getfile_filereq, 0);
2240 aim_conn_addhandler(sess, conn, AIM_CB_FAM_OFT, AIM_CB_OFT_GETFILEFILESEND, faimtest_getfile_filesend, 0);
2241 aim_conn_addhandler(sess, conn, AIM_CB_FAM_OFT, AIM_CB_OFT_GETFILECOMPLETE, faimtest_getfile_complete, 0);
2242 aim_conn_addhandler(sess, conn, AIM_CB_FAM_OFT, AIM_CB_OFT_GETFILEDISCONNECT, faimtest_getfile_disconnect, 0);
2243 aim_conn_addhandler(sess, conn, AIM_CB_FAM_OFT, AIM_CB_OFT_GETFILELISTING, faimtest_getfile_listing, 0);
2244 aim_conn_addhandler(sess, conn, AIM_CB_FAM_OFT, AIM_CB_OFT_GETFILELISTINGREQ, faimtest_getfile_listingreq, 0);
2245 aim_conn_addhandler(sess, conn, AIM_CB_FAM_OFT, AIM_CB_OFT_GETFILERECEIVE, faimtest_getfile_receive, 0);
2246 aim_conn_addhandler(sess, conn, AIM_CB_FAM_OFT, AIM_CB_OFT_GETFILESTATE4, faimtest_getfile_state4, 0);
2248 priv = (struct aim_filetransfer_priv *)conn->priv;
2250 dvprintf("faimtest: getfile: %s (%s) connected to us on %d\n", priv->sn, priv->ip, conn->fd);
2254 int faimtest_getfile_listing(struct aim_session_t *sess, struct command_rx_struct *command, ...)
2257 struct aim_conn_t *conn;
2259 struct aim_filetransfer_priv *ft;
2260 char *filename, *nameend, *sizec;
2261 int filesize, namelen;
2263 va_start(ap, command);
2264 conn = va_arg(ap, struct aim_conn_t *);
2265 ft = va_arg(ap, struct aim_filetransfer_priv *);
2266 listing = va_arg(ap, char *);
2269 dvprintf("listing on %d==================\n%s\n===========\n", conn->fd, listing);
2271 nameend = strstr(listing+0x1a, "\r");
2273 namelen = nameend - (listing + 0x1a);
2275 filename = malloc(namelen + 1);
2276 strncpy(filename, listing+0x1a, namelen);
2277 filename[namelen] = 0x00;
2279 sizec = malloc(8+1);
2280 memcpy(sizec, listing + 0x11, 8);
2283 filesize = strtol(sizec, (char **)NULL, 10);
2285 dvprintf("faimtest: requesting %d %s(%d long)\n", namelen, filename, filesize);
2287 aim_oft_getfile_request(sess, conn, filename, filesize);
2295 int faimtest_getfile_listingreq(struct aim_session_t *sess, struct command_rx_struct *command, ...)
2298 struct aim_conn_t *oftconn;
2299 struct aim_fileheader_t *fh;
2300 int pos, bufpos = 0, bufsize = 2048, i;
2303 va_start(ap, command);
2304 oftconn = va_arg(ap, struct aim_conn_t *);
2305 fh = va_arg(ap, struct aim_fileheader_t *);
2308 dvprintf("faimtest: sending listing of size %ld\n", fh->size);
2310 if(!(buf = malloc(2048)))
2313 for(pos = 0; pos < fh->size; pos++) {
2314 bufpos = pos % bufsize;
2316 if(bufpos == 0 && pos > 0) { /* filled our buffer. spit it across the wire */
2317 if ( (i = send(oftconn->fd, buf, bufsize, 0)) != bufsize ) {
2318 dperror("faim: getfile_send: write1");
2319 dprintf("faim: getfile_send: whoopsy, didn't write it all...\n");
2324 if( (buf[bufpos] = fgetc(listingfile)) == EOF) {
2325 if(pos != fh->size) {
2326 dvprintf("faim: getfile_send: hrm... apparent early EOF at pos 0x%x of 0x%lx\n", pos, fh->size);
2333 if( (i = send(oftconn->fd, buf, bufpos+1, 0)) != (bufpos+1)) {
2334 dperror("faim: getfile_send: write2");
2335 dprintf("faim: getfile_send cleanup: whoopsy, didn't write it all...\n");
2340 dprintf("faimtest: sent listing\n");
2345 int faimtest_getfile_receive(struct aim_session_t *sess, struct command_rx_struct *command, ...)
2348 struct aim_conn_t *conn;
2349 struct aim_filetransfer_priv *ft;
2353 va_start(ap, command);
2354 conn = va_arg(ap, struct aim_conn_t *);
2355 ft = va_arg(ap, struct aim_filetransfer_priv *);
2358 dvprintf("faimtest: receiving %ld bytes of file data for %s:\n\t", ft->fh.size, ft->fh.name);
2360 for(pos = 0; pos < ft->fh.size; pos++) {
2361 read(conn->fd, &data, 1);
2362 printf("%c(%02x) ", data, data);
2367 aim_oft_getfile_end(sess, conn);
2372 int faimtest_getfile_state4(struct aim_session_t *sess, struct command_rx_struct *command, ...)
2375 struct aim_conn_t *conn;
2377 va_start(ap, command);
2378 conn = va_arg(ap, struct aim_conn_t *);
2381 aim_conn_close(conn);
2382 aim_conn_kill(sess, &conn);
2387 int faimtest_parse_ratechange(struct aim_session_t *sess, struct command_rx_struct *command, ...)
2389 static char *codes[5] = {"invalid",
2396 unsigned long rateclass, windowsize, clear, alert, limit, disconnect;
2397 unsigned long currentavg, maxavg;
2399 va_start(ap, command);
2401 /* See code explanations below */
2402 code = va_arg(ap, int);
2405 * See comments above aim_parse_ratechange_middle() in aim_rxhandlers.c.
2407 rateclass = va_arg(ap, unsigned long);
2410 * Not sure what this is exactly. I think its the temporal
2411 * relation factor (ie, how to make the rest of the numbers
2412 * make sense in the real world).
2414 windowsize = va_arg(ap, unsigned long);
2416 /* Explained below */
2417 clear = va_arg(ap, unsigned long);
2418 alert = va_arg(ap, unsigned long);
2419 limit = va_arg(ap, unsigned long);
2420 disconnect = va_arg(ap, unsigned long);
2421 currentavg = va_arg(ap, unsigned long);
2422 maxavg = va_arg(ap, unsigned long);
2427 dvprintf("faimtest: rate %s (rate class 0x%04lx): curavg = %ld, maxavg = %ld, alert at %ld, clear warning at %ld, limit at %ld, disconnect at %ld (window size = %ld)\n",
2428 (code < 5)?codes[code]:"invalid",
2435 if (code == AIM_RATE_CODE_CHANGE) {
2437 * Not real sure when these get sent.
2439 if (currentavg >= clear)
2440 aim_conn_setlatency(command->conn, 0);
2442 } else if (code == AIM_RATE_CODE_WARNING) {
2444 * We start getting WARNINGs the first time we go below the 'alert'
2445 * limit (currentavg < alert) and they stop when either we pause
2446 * long enough for currentavg to go above 'clear', or until we
2447 * flood it bad enough to go below 'limit' (and start getting
2448 * LIMITs instead) or even further and go below 'disconnect' and
2449 * get disconnected completely (and won't be able to login right
2452 aim_conn_setlatency(command->conn, windowsize/4); /* XXX this is bogus! */
2454 } else if (code == AIM_RATE_CODE_LIMIT) {
2456 * When we hit LIMIT, messages will start getting dropped.
2458 aim_conn_setlatency(command->conn, windowsize/2); /* XXX this is bogus! */
2460 } else if (code == AIM_RATE_CODE_CLEARLIMIT) {
2462 * The limit is cleared when curavg goes above 'clear'.
2464 aim_conn_setlatency(command->conn, 0);
2470 int faimtest_parse_evilnotify(struct aim_session_t *sess, struct command_rx_struct *command, ...)
2474 struct aim_userinfo_s *userinfo;
2476 va_start(ap, command);
2477 newevil = va_arg(ap, int);
2478 userinfo = va_arg(ap, struct aim_userinfo_s *);
2482 * Evil Notifications that are lacking userinfo->sn are anon-warns
2483 * if they are an evil increases, but are not warnings at all if its
2484 * a decrease (its the natural backoff happening).
2486 * newevil is passed as an int representing the new evil value times
2489 dvprintf("faimtest: evil level change: new value = %2.1f%% (caused by %s)\n", ((float)newevil)/10, (userinfo && strlen(userinfo->sn))?userinfo->sn:"anonymous");
2494 int faimtest_parse_searchreply(struct aim_session_t *sess, struct command_rx_struct *command, ...)
2497 char *address, *SNs;
2500 va_start(ap, command);
2501 address = va_arg(ap, char *);
2502 num = va_arg(ap, int);
2503 SNs = va_arg(ap, char *);
2506 dvprintf("faimtest: E-Mail Search Results for %s: ", address);
2508 for(i = 0; i < num; i++)
2509 dvinlineprintf("%s, ", &SNs[i*(MAXSNLEN+1)]);
2510 dinlineprintf("\n");
2515 int faimtest_parse_searcherror(struct aim_session_t *sess, struct command_rx_struct *command, ...)
2520 va_start(ap, command);
2521 address = va_arg(ap, char *);
2524 dvprintf("faimtest: E-Mail Search Results for %s: No Results or Invalid Email\n", address);