*/
+#define FAIM_INTERNAL
#include <faim/aim.h>
/* this just pushes the passed cookie onto the passed connection -- NO SNAC! */
-int aim_auth_sendcookie(struct aim_session_t *sess,
- struct aim_conn_t *conn,
- u_char *chipsahoy)
+faim_export int aim_auth_sendcookie(struct aim_session_t *sess,
+ struct aim_conn_t *conn,
+ unsigned char *chipsahoy)
{
- struct command_tx_struct newpacket;
+ struct command_tx_struct *newpacket;
int curbyte=0;
- newpacket.lock = 1;
+ if (!(newpacket = aim_tx_new(AIM_FRAMETYPE_OSCAR, 0x0001, conn, 4+2+2+AIM_COOKIELEN)))
+ return -1;
- if (conn==NULL)
- newpacket.conn = aim_getconn_type(sess, AIM_CONN_TYPE_AUTH);
- else
- newpacket.conn = conn;
+ newpacket->lock = 1;
- newpacket.type = 0x0001; /* channel 1 (no SNACs, you know) */
-
- newpacket.commandlen = 4 + 2 + 2 + AIM_COOKIELEN;
- newpacket.data = (char *) calloc(1, newpacket.commandlen);
-
- curbyte += aimutil_put16(newpacket.data+curbyte, 0x0000);
- curbyte += aimutil_put16(newpacket.data+curbyte, 0x0001);
- curbyte += aimutil_put16(newpacket.data+curbyte, 0x0006);
- curbyte += aimutil_put16(newpacket.data+curbyte, AIM_COOKIELEN);
- memcpy(&(newpacket.data[curbyte]), chipsahoy, AIM_COOKIELEN);
+ curbyte += aimutil_put16(newpacket->data+curbyte, 0x0000);
+ curbyte += aimutil_put16(newpacket->data+curbyte, 0x0001);
+ curbyte += aimutil_put16(newpacket->data+curbyte, 0x0006);
+ curbyte += aimutil_put16(newpacket->data+curbyte, AIM_COOKIELEN);
+ memcpy(newpacket->data+curbyte, chipsahoy, AIM_COOKIELEN);
- aim_tx_enqueue(sess, &newpacket);
-
- return 0;
+ return aim_tx_enqueue(sess, newpacket);
}
-u_long aim_auth_clientready(struct aim_session_t *sess,
- struct aim_conn_t *conn)
+faim_export unsigned long aim_auth_clientready(struct aim_session_t *sess,
+ struct aim_conn_t *conn)
{
- struct command_tx_struct newpacket;
+ struct command_tx_struct *newpacket;
int curbyte = 0;
- newpacket.lock = 1;
+ if (!(newpacket = aim_tx_new(AIM_FRAMETYPE_OSCAR, 0x0002, conn, 26)))
+ return -1;
- if (conn==NULL)
- newpacket.conn = aim_getconn_type(sess, AIM_CONN_TYPE_AUTH);
- else
- newpacket.conn = conn;
+ newpacket->lock = 1;
- newpacket.type = 0x0002;
-
- newpacket.commandlen = 26;
- newpacket.data = (u_char *) malloc(newpacket.commandlen);
-
- curbyte += aim_putsnac(newpacket.data+curbyte, 0x0001, 0x0002, 0x0000, sess->snac_nextid);
- curbyte += aimutil_put16(newpacket.data+curbyte, 0x0001);
- curbyte += aimutil_put16(newpacket.data+curbyte, 0x0002);
- curbyte += aimutil_put16(newpacket.data+curbyte, 0x0001);
- curbyte += aimutil_put16(newpacket.data+curbyte, 0x0013);
- curbyte += aimutil_put16(newpacket.data+curbyte, 0x0007);
- curbyte += aimutil_put16(newpacket.data+curbyte, 0x0001);
- curbyte += aimutil_put16(newpacket.data+curbyte, 0x0001);
- curbyte += aimutil_put16(newpacket.data+curbyte, 0x0001);
-
- aim_tx_enqueue(sess, &newpacket);
-
- {
- struct aim_snac_t snac;
-
- snac.id = sess->snac_nextid;
- snac.family = 0x0001;
- snac.type = 0x0004;
- snac.flags = 0x0000;
-
- snac.data = NULL;
-
- aim_newsnac(sess, &snac);
- }
-
- return (sess->snac_nextid++);
+ curbyte += aim_putsnac(newpacket->data+curbyte, 0x0001, 0x0002, 0x0000, sess->snac_nextid);
+ curbyte += aimutil_put16(newpacket->data+curbyte, 0x0001);
+ curbyte += aimutil_put16(newpacket->data+curbyte, 0x0002);
+ curbyte += aimutil_put16(newpacket->data+curbyte, 0x0001);
+ curbyte += aimutil_put16(newpacket->data+curbyte, 0x0013);
+ curbyte += aimutil_put16(newpacket->data+curbyte, 0x0007);
+ curbyte += aimutil_put16(newpacket->data+curbyte, 0x0001);
+ curbyte += aimutil_put16(newpacket->data+curbyte, 0x0001);
+ curbyte += aimutil_put16(newpacket->data+curbyte, 0x0001);
+
+ aim_tx_enqueue(sess, newpacket);
+
+ aim_cachesnac(sess, 0x0001, 0x0004, 0x0000, NULL, 0);
+
+ return sess->snac_nextid;
}
-u_long aim_auth_changepasswd(struct aim_session_t *sess,
- struct aim_conn_t *conn,
- char *new, char *current)
+faim_export unsigned long aim_auth_changepasswd(struct aim_session_t *sess,
+ struct aim_conn_t *conn,
+ char *new, char *current)
{
- struct command_tx_struct newpacket;
+ struct command_tx_struct *newpacket;
int i;
- newpacket.lock = 1;
-
- if (conn==NULL)
- newpacket.conn = aim_getconn_type(sess, AIM_CONN_TYPE_AUTH);
- else
- newpacket.conn = conn;
+ if (!(newpacket = aim_tx_new(AIM_FRAMETYPE_OSCAR, 0x0002, conn, 10+4+strlen(current)+4+strlen(new))))
+ return -1;
- newpacket.type = 0x0002;
-
- newpacket.commandlen = 10 + 4 + strlen(current) + 4 + strlen(new);
- newpacket.data = (char *) malloc(newpacket.commandlen);
+ newpacket->lock = 1;
- aim_putsnac(newpacket.data, 0x0007, 0x0004, 0x0000, sess->snac_nextid);
+ i = aim_putsnac(newpacket->data, 0x0007, 0x0004, 0x0000, sess->snac_nextid);
/* current password TLV t(0002) */
- i = 10;
- newpacket.data[i++] = 0x00;
- newpacket.data[i++] = 0x02;
- newpacket.data[i++] = 0x00;
- newpacket.data[i++] = strlen(current) & 0xff;
- memcpy(&(newpacket.data[i]), current, strlen(current));
- i += strlen(current);
+ i += aim_puttlv_str(newpacket->data+i, 0x0002, strlen(current), current);
/* new password TLV t(0012) */
- newpacket.data[i++] = 0x00;
- newpacket.data[i++] = 0x12;
- newpacket.data[i++] = 0x00;
- newpacket.data[i++] = strlen(new) & 0xff;
- memcpy(&(newpacket.data[i]), new, strlen(new));
- i+=strlen(new);
-
- aim_tx_enqueue(sess, &newpacket);
-
- {
- struct aim_snac_t snac;
-
- snac.id = sess->snac_nextid;
- snac.family = 0x0001;
- snac.type = 0x0004;
- snac.flags = 0x0000;
+ i += aim_puttlv_str(newpacket->data+i, 0x0012, strlen(new), new);
- snac.data = NULL;
+ aim_tx_enqueue(sess, newpacket);
- aim_newsnac(sess, &snac);
- }
+ aim_cachesnac(sess, 0x0001, 0x0004, 0x0000, NULL, 0);
- return (sess->snac_nextid++);
+ return sess->snac_nextid;
}