4 Deals with the authorizer.
10 /* this just pushes the passed cookie onto the passed connection -- NO SNAC! */
11 int aim_auth_sendcookie(struct aim_session_t *sess,
12 struct aim_conn_t *conn,
15 struct command_tx_struct *newpacket;
18 if (!(newpacket = aim_tx_new(AIM_FRAMETYPE_OSCAR, 0x0001, conn, 4+2+2+AIM_COOKIELEN)))
23 curbyte += aimutil_put16(newpacket->data+curbyte, 0x0000);
24 curbyte += aimutil_put16(newpacket->data+curbyte, 0x0001);
25 curbyte += aimutil_put16(newpacket->data+curbyte, 0x0006);
26 curbyte += aimutil_put16(newpacket->data+curbyte, AIM_COOKIELEN);
27 memcpy(newpacket->data+curbyte, chipsahoy, AIM_COOKIELEN);
29 return aim_tx_enqueue(sess, newpacket);
32 u_long aim_auth_clientready(struct aim_session_t *sess,
33 struct aim_conn_t *conn)
35 struct command_tx_struct *newpacket;
38 if (!(newpacket = aim_tx_new(AIM_FRAMETYPE_OSCAR, 0x0002, conn, 26)))
43 curbyte += aim_putsnac(newpacket->data+curbyte, 0x0001, 0x0002, 0x0000, sess->snac_nextid);
44 curbyte += aimutil_put16(newpacket->data+curbyte, 0x0001);
45 curbyte += aimutil_put16(newpacket->data+curbyte, 0x0002);
46 curbyte += aimutil_put16(newpacket->data+curbyte, 0x0001);
47 curbyte += aimutil_put16(newpacket->data+curbyte, 0x0013);
48 curbyte += aimutil_put16(newpacket->data+curbyte, 0x0007);
49 curbyte += aimutil_put16(newpacket->data+curbyte, 0x0001);
50 curbyte += aimutil_put16(newpacket->data+curbyte, 0x0001);
51 curbyte += aimutil_put16(newpacket->data+curbyte, 0x0001);
53 aim_tx_enqueue(sess, newpacket);
56 struct aim_snac_t snac;
58 snac.id = sess->snac_nextid;
65 aim_newsnac(sess, &snac);
68 return (sess->snac_nextid++);
71 u_long aim_auth_changepasswd(struct aim_session_t *sess,
72 struct aim_conn_t *conn,
73 char *new, char *current)
75 struct command_tx_struct *newpacket;
78 if (!(newpacket = aim_tx_new(AIM_FRAMETYPE_OSCAR, 0x0002, conn, 10+4+strlen(current)+4+strlen(new))))
83 i = aim_putsnac(newpacket->data, 0x0007, 0x0004, 0x0000, sess->snac_nextid);
85 /* current password TLV t(0002) */
86 i += aim_puttlv_str(newpacket->data+i, 0x0002, strlen(current), current);
88 /* new password TLV t(0012) */
89 i += aim_puttlv_str(newpacket->data+i, 0x0012, strlen(new), new);
91 aim_tx_enqueue(sess, newpacket);
94 struct aim_snac_t snac;
96 snac.id = sess->snac_nextid;
103 aim_newsnac(sess, &snac);
106 return (sess->snac_nextid++);