X-Git-Url: http://andersk.mit.edu/gitweb/libfaim.git/blobdiff_plain/b8d0da450de7ce933bd9cf9622baa650e469693d..9031e2e38cf7f951e7b624245be27eec659e46df:/utils/faimtest/faimtest.c diff --git a/utils/faimtest/faimtest.c b/utils/faimtest/faimtest.c index fc400f5..0c8264a 100644 --- a/utils/faimtest/faimtest.c +++ b/utils/faimtest/faimtest.c @@ -23,10 +23,10 @@ * please contact me at the address below. * * Most everything: - * (c) 1998 Adam Fritzler, PST, afritz@iname.com + * (c) 1998 Adam Fritzler, PST, mid@zigamoprh.net * * The password algorithms - * (c) 1998 Brock Wilcox, awwaiid@iname.com + * (c) 1998 Brock Wilcox, awwaiid@zigamorph.net * * THERE IS NO CODE FROM AOL'S AIM IN THIS CODE, NOR * WAS THERE ANY DISASSEMBLAGE TO DEFINE PROTOCOL. All @@ -38,25 +38,53 @@ * */ -/* - Current status: - +#include "faimtest.h" +#include - */ +static char *dprintf_ctime(void) +{ + static char retbuf[64]; + struct tm *lt; + struct timeval tv; + struct timezone tz; + + gettimeofday(&tv, &tz); + lt = localtime((time_t *)&tv.tv_sec); + strftime(retbuf, 64, "%a %b %e %H:%M:%S %Z %Y", lt); + return retbuf; +} -#include +#define DPRINTF_OUTSTREAM stdout +#define dprintf(x) { \ + fprintf(DPRINTF_OUTSTREAM, "%s %s: " x, dprintf_ctime(), "faimtest"); \ + fflush(DPRINTF_OUTSTREAM); \ +} +#define dvprintf(x, y...) { \ + fprintf(DPRINTF_OUTSTREAM, "%s %s: " x, dprintf_ctime(), "faimtest", y); \ + fflush(DPRINTF_OUTSTREAM); \ +} +#define dinlineprintf(x) { \ + fprintf(DPRINTF_OUTSTREAM, x); \ + fflush(DPRINTF_OUTSTREAM); \ +} +#define dvinlineprintf(x, y...) { \ + fprintf(DPRINTF_OUTSTREAM, x, y); \ + fflush(DPRINTF_OUTSTREAM); \ +} +#define dperror(x) dvprintf("%s: %s\n", x, strerror(errno)); int faimtest_parse_oncoming(struct aim_session_t *, struct command_rx_struct *, ...); int faimtest_parse_offgoing(struct aim_session_t *, struct command_rx_struct *, ...); int faimtest_parse_login_phase3d_f(struct aim_session_t *, struct command_rx_struct *, ...); -int faimtest_parse_authresp(struct aim_session_t *, struct command_rx_struct *, ...); +static int faimtest_parse_authresp(struct aim_session_t *, struct command_rx_struct *, ...); int faimtest_parse_incoming_im(struct aim_session_t *, struct command_rx_struct *command, ...); int faimtest_parse_userinfo(struct aim_session_t *, struct command_rx_struct *command, ...); int faimtest_handleredirect(struct aim_session_t *, struct command_rx_struct *command, ...); -int faimtest_authsvrready(struct aim_session_t *, struct command_rx_struct *command, ...); -int faimtest_pwdchngdone(struct aim_session_t *, struct command_rx_struct *command, ...); +int faimtest_infochange(struct aim_session_t *sess, struct command_rx_struct *command, ...); int faimtest_serverready(struct aim_session_t *, struct command_rx_struct *command, ...); +int faimtest_hostversions(struct aim_session_t *sess, struct command_rx_struct *command, ...); int faimtest_parse_misses(struct aim_session_t *, struct command_rx_struct *command, ...); +int faimtest_parse_msgack(struct aim_session_t *, struct command_rx_struct *command, ...); int faimtest_parse_motd(struct aim_session_t *, struct command_rx_struct *command, ...); int faimtest_parse_login(struct aim_session_t *, struct command_rx_struct *command, ...); int faimtest_chatnav_info(struct aim_session_t *, struct command_rx_struct *command, ...); @@ -64,848 +92,2495 @@ int faimtest_chat_incomingmsg(struct aim_session_t *sess, struct command_rx_stru int faimtest_chat_infoupdate(struct aim_session_t *sess, struct command_rx_struct *command, ...); int faimtest_chat_leave(struct aim_session_t *sess, struct command_rx_struct *command, ...); int faimtest_chat_join(struct aim_session_t *sess, struct command_rx_struct *command, ...); +int faimtest_parse_connerr(struct aim_session_t *sess, struct command_rx_struct *command, ...); +int faimtest_debugconn_connect(struct aim_session_t *sess, struct command_rx_struct *command, ...); + +int faimtest_directim_request(struct aim_session_t *sess, struct command_rx_struct *command, ...); +int faimtest_directim_initiate(struct aim_session_t *sess, struct command_rx_struct *command, ...); +int faimtest_directim_connect(struct aim_session_t *sess, struct command_rx_struct *command, ...); +int faimtest_directim_incoming(struct aim_session_t *sess, struct command_rx_struct *command, ...); +int faimtest_directim_disconnect(struct aim_session_t *sess, struct command_rx_struct *command, ...); +int faimtest_directim_typing(struct aim_session_t *sess, struct command_rx_struct *command, ...); + +int faimtest_getfile_filereq(struct aim_session_t *sess, struct command_rx_struct *command, ...); +int faimtest_getfile_filesend(struct aim_session_t *sess, struct command_rx_struct *command, ...); +int faimtest_getfile_complete(struct aim_session_t *sess, struct command_rx_struct *command, ...); +int faimtest_getfile_disconnect(struct aim_session_t *sess, struct command_rx_struct *command, ...); +int faimtest_getfile_initiate(struct aim_session_t *sess, struct command_rx_struct *command, ...); +int faimtest_getfile_listing(struct aim_session_t *sess, struct command_rx_struct *command, ...); +int faimtest_getfile_listingreq(struct aim_session_t *sess, struct command_rx_struct *command, ...); +int faimtest_getfile_receive(struct aim_session_t *sess, struct command_rx_struct *command, ...); +int faimtest_getfile_state4(struct aim_session_t *sess, struct command_rx_struct *command, ...); + +int faimtest_parse_ratechange(struct aim_session_t *sess, struct command_rx_struct *command, ...); +int faimtest_parse_evilnotify(struct aim_session_t *sess, struct command_rx_struct *command, ...); +int faimtest_parse_searcherror(struct aim_session_t *sess, struct command_rx_struct *command, ...); +int faimtest_parse_searchreply(struct aim_session_t *sess, struct command_rx_struct *command, ...); +int faimtest_parse_msgerr(struct aim_session_t *sess, struct command_rx_struct *command, ...); +int faimtest_parse_buddyrights(struct aim_session_t *sess, struct command_rx_struct *command, ...); +int faimtest_parse_locerr(struct aim_session_t *sess, struct command_rx_struct *command, ...); +int faimtest_parse_genericerr(struct aim_session_t *sess, struct command_rx_struct *command, ...); + +static char *msgerrreasons[] = { + "Invalid error", + "Invalid SNAC", + "Rate to host", + "Rate to client", + "Not logged on", + "Service unavailable", + "Service not defined", + "Obsolete SNAC", + "Not supported by host", + "Not supported by client", + "Refused by client", + "Reply too big", + "Responses lost", + "Request denied", + "Busted SNAC payload", + "Insufficient rights", + "In local permit/deny", + "Too evil (sender)", + "Too evil (receiver)", + "User temporarily unavailable", + "No match", + "List overflow", + "Request ambiguous", + "Queue full", + "Not while on AOL"}; +static int msgerrreasonslen = 25; + +static char *aimbinarypath = NULL; +static char *screenname,*password,*server=NULL; +static char *proxy = NULL, *proxyusername = NULL, *proxypass = NULL; +static char *ohcaptainmycaptain = NULL; +static int connected = 0; + +struct aim_session_t aimsess; +int keepgoing = 1; + +static FILE *listingfile; +static char *listingpath; + +static unsigned char *buddyicon = NULL; +static int buddyiconlen = 0; +static time_t buddyiconstamp = 0; +static unsigned short buddyiconsum = 0; + +static void faimtest_debugcb(struct aim_session_t *sess, int level, const char *format, va_list va) +{ -static char *screenname,*password; + vfprintf(stderr, format, va); + + return; +} -int main(void) +int faimtest_reportinterval(struct aim_session_t *sess, struct command_rx_struct *command, ...) { - struct aim_session_t aimsess; - struct aim_conn_t *authconn = NULL; - int keepgoing = 1, stayconnected = 1; - struct client_info_s info = {"FAIMtest (Hi guys!)", 3, 5, 1670, "us", "en"}; - int selstat = 0; + va_list ap; + unsigned short interval = 0; - aim_session_init(&aimsess); + va_start(ap, command); + interval = va_arg(ap, int); + va_end(ap); - if ( !(screenname = getenv("SCREENNAME")) || - !(password = getenv("PASSWORD"))) - { - printf("Must specify SCREENAME and PASSWORD in environment.\n"); - return -1; - } + dvprintf("aim: minimum report interval: %d (seconds?)\n", interval); - /* - * (I used a goto-based loop here because n wanted quick proof - * that reconnecting without restarting was actually possible...) - */ - enter: - authconn = aim_newconn(&aimsess, AIM_CONN_TYPE_AUTH, FAIM_LOGIN_SERVER); + if (!connected) + connected++; - if (authconn == NULL) - { - fprintf(stderr, "faimtest: internal connection error while in aim_login. bailing out.\n"); - return -1; - } - else if (authconn->fd == -1) - { - if (authconn->status & AIM_CONN_STATUS_RESOLVERR) - fprintf(stderr, "faimtest: could not resolve authorizer name\n"); - else if (authconn->status & AIM_CONN_STATUS_CONNERR) - fprintf(stderr, "faimtest: could not connect to authorizer\n"); - return -1; - } - else - { -#ifdef SNACLOGIN - /* new login code -- not default -- pending new password encryption algo */ - aim_conn_addhandler(&aimsess, authconn, 0x0017, 0x0007, faimtest_parse_login, 0); - aim_conn_addhandler(&aimsess, authconn, 0x0017, 0x0003, faimtest_parse_authresp, 0); - - aim_sendconnack(&aimsess, authconn); - aim_request_login(&aimsess, authconn, FAIMTEST_SCREENNAME); -#else - aim_conn_addhandler(&aimsess, authconn, AIM_CB_FAM_SPECIAL, AIM_CB_SPECIAL_AUTHSUCCESS, faimtest_parse_authresp, 0); - aim_conn_addhandler(&aimsess, authconn, AIM_CB_FAM_GEN, AIM_CB_GEN_SERVERREADY, faimtest_authsvrready, 0); - aim_send_login(&aimsess, authconn, screenname, password, &info); - +#if 0 + aim_bos_reqservice(sess, command->conn, 0x0005); /* adverts */ + aim_bos_reqservice(sess, command->conn, 0x000f); /* user directory */ + + /* Don't know what this does... */ + /* XXX sess->sn should be normalized by the 0001/000f handler */ + aim_0002_000b(sess, command->conn, sess->sn); #endif - } - while (keepgoing) { - aim_select(&aimsess, NULL, &selstat); + aim_reqicbmparams(sess, command->conn); - switch(selstat) { - case -1: /* error */ - keepgoing = 0; - break; + return 1; +} - case 0: /* no events pending */ - break; +int faimtest_flapversion(struct aim_session_t *sess, struct command_rx_struct *command, ...) +{ - case 1: /* outgoing data pending */ - aim_tx_flushqueue(&aimsess); - break; + dvprintf("faimtest: using FLAP version %u\n", aimutil_get32(command->data)); - case 2: /* incoming data pending */ - if (aim_get_command(&aimsess) < 0) { - printf("\afaimtest: connection error!\n"); - } else - aim_rxdispatch(&aimsess); - break; - - default: - break; /* invalid */ +#if 0 + /* + * This is an alternate location for starting the login process. + */ + /* XXX should do more checking to make sure its really the right AUTH conn */ + if (command->conn->type == AIM_CONN_TYPE_AUTH) { + /* do NOT send a flapversion, request_login will send it if needed */ + aim_request_login(sess, command->conn, screenname); + dprintf("faimtest: login request sent\n"); + } +#endif + + return 1; +} + +/* + * This is a frivilous callback. You don't need it. I only used it for + * debugging non-blocking connects. + * + * If packets are sent to a conn before its fully connected, they + * will be queued and then transmitted when the connection completes. + * + */ +int faimtest_conncomplete(struct aim_session_t *sess, struct command_rx_struct *command, ...) +{ + va_list ap; + struct aim_conn_t *conn; + + va_start(ap, command); + conn = va_arg(ap, struct aim_conn_t *); + va_end(ap); + + if (conn) + dvprintf("faimtest: connection on %d completed\n", conn->fd); + + return 1; +} + +#ifdef _WIN32 +/* + * This is really all thats needed to link against libfaim on win32. + * + * Note that this particular version of faimtest has never been tested + * on win32, but I'm fairly sure it should. + */ +int initwsa(void) +{ + WORD wVersionRequested; + WSADATA wsaData; + + wVersionRequested = MAKEWORD(2,2); + return WSAStartup(wVersionRequested, &wsaData); +} +#endif /* _WIN32 */ + +int faimtest_init(void) +{ + struct aim_conn_t *stdinconn = NULL; + + if (!(stdinconn = aim_newconn(&aimsess, 0, NULL))) { + dprintf("unable to create connection for stdin!\n"); + return -1; + } + + stdinconn->fd = STDIN_FILENO; + + return 0; +} + +int logout(void) +{ + + if (ohcaptainmycaptain) + aim_send_im(&aimsess, aim_getconn_type(&aimsess, AIM_CONN_TYPE_BOS), ohcaptainmycaptain, 0, "ta ta..."); + + aim_session_kill(&aimsess); + + if (faimtest_init() == -1) + dprintf("faimtest_init failed\n"); + + return 0; +} + +int login(const char *sn, const char *passwd) +{ + struct aim_conn_t *authconn; + + if (sn) + screenname = strdup(sn); + if (passwd) + password = strdup(passwd); + + if (proxy) + aim_setupproxy(&aimsess, proxy, proxyusername, proxypass); + + if (!screenname || !password) { + dprintf("need SN and password\n"); + return -1; + } + + if (!(authconn = aim_newconn(&aimsess, AIM_CONN_TYPE_AUTH, server?server:FAIM_LOGIN_SERVER))) { + dprintf("faimtest: internal connection error while in aim_login. bailing out.\n"); + return -1; + } else if (authconn->fd == -1) { + if (authconn->status & AIM_CONN_STATUS_RESOLVERR) { + dprintf("faimtest: could not resolve authorizer name\n"); + } else if (authconn->status & AIM_CONN_STATUS_CONNERR) { + dprintf("faimtest: could not connect to authorizer\n"); + } + aim_conn_kill(&aimsess, &authconn); + return -1; + } + + aim_conn_addhandler(&aimsess, authconn, AIM_CB_FAM_SPECIAL, AIM_CB_SPECIAL_FLAPVER, faimtest_flapversion, 0); + aim_conn_addhandler(&aimsess, authconn, AIM_CB_FAM_SPECIAL, AIM_CB_SPECIAL_CONNCOMPLETE, faimtest_conncomplete, 0); + aim_conn_addhandler(&aimsess, authconn, 0x0017, 0x0007, faimtest_parse_login, 0); + aim_conn_addhandler(&aimsess, authconn, 0x0017, 0x0003, faimtest_parse_authresp, 0); + + aim_conn_addhandler(&aimsess, authconn, AIM_CB_FAM_SPECIAL, AIM_CB_SPECIAL_DEBUGCONN_CONNECT, faimtest_debugconn_connect, 0); + + /* If the connection is in progress, this will just be queued */ + aim_request_login(&aimsess, authconn, screenname); + dprintf("faimtest: login request sent\n"); + + return 0; +} + +int main(int argc, char **argv) +{ + struct aim_conn_t *waitingconn = NULL; + int i; + int selstat = 0; + static int faimtest_mode = 0; + struct timeval tv; + time_t lastnop = 0; + const char *buddyiconpath = NULL; + + screenname = getenv("SCREENNAME"); + password = getenv("PASSWORD"); + server = getenv("AUTHSERVER"); + proxy = getenv("SOCKSPROXY"); + proxyusername = getenv("SOCKSNAME"); + proxypass = getenv("SOCKSPASS"); + + listingpath = getenv("LISTINGPATH"); + + while ((i = getopt(argc, argv, "u:p:a:U:P:A:l:c:hoOb:i:")) != EOF) { + switch (i) { + case 'u': screenname = optarg; break; + case 'p': password = optarg; break; + case 'a': server = optarg; break; + case 'U': proxyusername = optarg; break; + case 'P': proxypass = optarg; break; + case 'A': proxy = optarg; break; + case 'l': listingpath = optarg; break; + case 'c': ohcaptainmycaptain = optarg; break; + case 'o': faimtest_mode = 1; break; /* half old interface */ + case 'O': faimtest_mode = 2; break; /* full old interface */ + case 'b': aimbinarypath = optarg; break; + case 'i': buddyiconpath = optarg; break; + case 'h': + default: + printf("faimtest\n"); + printf(" Options: \n"); + printf(" -u name Screen name ($SCREENNAME)\n"); + printf(" -p passwd Password ($PASSWORD)\n"); + printf(" -a host:port Authorizer ($AUTHSERVER)\n"); + printf(" -U name Proxy user name ($SOCKSPROXY)\n"); + printf(" -P passwd Proxy password ($SOCKSNAME)\n"); + printf(" -A host:port Proxy host ($SOCKSPASS)\n"); + printf(" -l path Path to listing file ($LISTINGPATH)\n"); + printf(" -c name Screen name of owner\n"); + printf(" -o Login at startup, then prompt\n"); + printf(" -O Login, never give prompt\n"); + printf(" -b path Path to AIM 3.5.1670 binaries\n"); + printf(" -i file Buddy Icon to send\n"); + exit(0); + } + } + +#ifdef _WIN32 + if (initwsa() != 0) { + dprintf("faimtest: could not initialize windows sockets\n"); + return -1; + } +#endif /* _WIN32 */ + + /* Pass zero as flags if you want blocking connects */ + aim_session_init(&aimsess, AIM_SESS_FLAGS_NONBLOCKCONNECT, 1); + aim_setdebuggingcb(&aimsess, faimtest_debugcb); /* still needed even if debuglevel = 0 ! */ + + if (listingpath) { + char *listingname; + + if (!(listingname = (char *)calloc(1, strlen(listingpath)+strlen("/listing.txt")))) { + dperror("listingname calloc"); + exit(-1); + } + + sprintf(listingname, "%s/listing.txt", listingpath); + + if ((listingfile = fopen(listingname, "r")) == NULL) + dvprintf("Couldn't open %s... disabling that shit.\n", listingname); + + free(listingname); + } + + if (buddyiconpath) { + struct stat st; + FILE *f; + + if ((stat(buddyiconpath, &st) != -1) && (st.st_size <= MAXICONLEN) && (f = fopen(buddyiconpath, "r"))) { + + buddyiconlen = st.st_size; + buddyiconstamp = st.st_mtime; + buddyicon = malloc(buddyiconlen); + fread(buddyicon, 1, st.st_size, f); + + buddyiconsum = aim_iconsum(buddyicon, buddyiconlen); + + dvprintf("read %d bytes of %s for buddy icon (sum 0x%08x)\n", buddyiconlen, buddyiconpath, buddyiconsum); + + fclose(f); + + } else + dvprintf("could not open buddy icon %s\n", buddyiconpath); + + } + + faimtest_init(); + + if (faimtest_mode < 2) + cmd_init(); + + if (faimtest_mode >= 1) { + if (login(screenname, password) == -1) { + if (faimtest_mode < 2) + cmd_uninit(); + exit(-1); + } + } + + while (keepgoing) { + + tv.tv_sec = 5; + tv.tv_usec = 0; + + waitingconn = aim_select(&aimsess, &tv, &selstat); + + if (connected && ((time(NULL) - lastnop) > 30)) { + lastnop = time(NULL); + aim_flap_nop(&aimsess, aim_getconn_type(&aimsess, AIM_CONN_TYPE_BOS)); + } + + if (selstat == -1) { /* error */ + keepgoing = 0; /* fall through */ + } else if (selstat == 0) { /* no events pending */ + ; + } else if (selstat == 1) { /* outgoing data pending */ + aim_tx_flushqueue(&aimsess); + } else if (selstat == 2) { /* incoming data pending */ + if ((faimtest_mode < 2) && (waitingconn->fd == STDIN_FILENO)) { + cmd_gotkey(); + } else { + if (waitingconn->type == AIM_CONN_TYPE_RENDEZVOUS_OUT) { + if (aim_handlerendconnect(&aimsess, waitingconn) < 0) { + dprintf("connection error (rend out)\n"); + aim_conn_kill(&aimsess, &waitingconn); + } + } else { + if (aim_get_command(&aimsess, waitingconn) >= 0) { + aim_rxdispatch(&aimsess); + } else { + dvprintf("connection error (type 0x%04x:0x%04x)\n", waitingconn->type, waitingconn->subtype); + /* we should have callbacks for all these, else the library will do the conn_kill for us. */ + if (waitingconn->type == AIM_CONN_TYPE_RENDEZVOUS) { + dprintf("connection error: rendezvous connection. you forgot register a disconnect callback, right?\n"); + aim_conn_kill(&aimsess, &waitingconn); + } else + aim_conn_kill(&aimsess, &waitingconn); + if (!aim_getconn_type(&aimsess, AIM_CONN_TYPE_BOS)) { + dprintf("major connection error\n"); + if (faimtest_mode == 2) + break; + } + } + } + } + } + } + + /* close up all connections, dead or no */ + aim_session_kill(&aimsess); + + if (faimtest_mode < 2) { + printf("\n"); + cmd_uninit(); + } + + free(buddyicon); + + /* Get out */ + exit(0); +} + +int faimtest_rateresp(struct aim_session_t *sess, struct command_rx_struct *command, ...) +{ + + switch(command->conn->type) { + case AIM_CONN_TYPE_BOS: { + /* this is the new buddy list */ + char buddies[128]; + /* this is the new profile */ + char profile[256]; + char awaymsg[] = {"blah blah blah Ole! blah blah blah"}; + + /* Caution: Buddy1 and Buddy2 are real people! (who I don't know) */ + snprintf(buddies, sizeof(buddies), "Buddy1&Buddy2&%s&", ohcaptainmycaptain?ohcaptainmycaptain:"blah"); + snprintf(profile, sizeof(profile), "Hello.
My captain is %s. They were dumb enough to leave this message in their client, or they are using faimtest. Shame on them.", ohcaptainmycaptain); + + aim_bos_ackrateresp(sess, command->conn); /* ack rate info response */ + aim_bos_reqpersonalinfo(sess, command->conn); + aim_bos_reqlocaterights(sess, command->conn); + aim_bos_setprofile(sess, command->conn, profile, awaymsg, AIM_CAPS_BUDDYICON | AIM_CAPS_CHAT | AIM_CAPS_GETFILE | AIM_CAPS_SENDFILE | AIM_CAPS_IMIMAGE /*| AIM_CAPS_GAMES | AIM_CAPS_SAVESTOCKS*/); + aim_bos_reqbuddyrights(sess, command->conn); + + /* send the buddy list and profile (required, even if empty) */ + aim_bos_setbuddylist(sess, command->conn, buddies); + + aim_reqicbmparams(sess, command->conn); + + aim_bos_reqrights(sess, command->conn); + /* set group permissions -- all user classes */ + aim_bos_setgroupperm(sess, command->conn, AIM_FLAG_ALLUSERS); + aim_bos_setprivacyflags(sess, command->conn, AIM_PRIVFLAGS_ALLOWIDLE); + + break; + } + case AIM_CONN_TYPE_AUTH: + aim_bos_ackrateresp(sess, command->conn); + aim_auth_clientready(sess, command->conn); + dprintf("faimtest: connected to authorization/admin service\n"); + break; + + default: + dvprintf("faimtest: got rate response for unhandled connection type %04x\n", command->conn->type); + break; + } + + return 1; +} + +static int faimtest_icbmparaminfo(struct aim_session_t *sess, struct command_rx_struct *command, ...) +{ + struct aim_icbmparameters *params; + va_list ap; + + va_start(ap, command); + params = va_arg(ap, struct aim_icbmparameters *); + va_end(ap); + + dvprintf("ICBM Parameters: maxchannel = %d, default flags = 0x%08lx, max msg len = %d, max sender evil = %f, max reciever evil = %f, min msg interval = %ld\n", params->maxchan, params->flags, params->maxmsglen, ((float)params->maxsenderwarn)/10.0, ((float)params->maxrecverwarn)/10.0, params->minmsginterval); + + /* + * Set these to your taste, or client medium. Setting minmsginterval + * higher is good for keeping yourself from getting flooded (esp + * if you're on a slow connection or something where that would be + * useful). + */ + params->maxmsglen = 8000; + params->minmsginterval = 0; /* in milliseconds */ + + aim_seticbmparam(sess, command->conn, params); + + return 1; +} + +int faimtest_hostversions(struct aim_session_t *sess, struct command_rx_struct *command, ...) +{ + int vercount, i; + unsigned char *versions; + va_list ap; + + va_start(ap, command); + vercount = va_arg(ap, int); /* number of family/version pairs */ + versions = va_arg(ap, unsigned char *); + va_end(ap); + + dprintf("faimtest: SNAC versions supported by this host: "); + for (i = 0; i < vercount*4; i += 4) { + dvinlineprintf("0x%04x:0x%04x ", + aimutil_get16(versions+i), /* SNAC family */ + aimutil_get16(versions+i+2) /* Version number */); + } + dinlineprintf("\n"); + + return 1; +} + +int faimtest_accountconfirm(struct aim_session_t *sess, struct command_rx_struct *command, ...) +{ + int status; + va_list ap; + + va_start(ap, command); + status = va_arg(ap, int); /* status code of confirmation request */ + va_end(ap); + + dvprintf("account confirmation returned status 0x%04x (%s)\n", status, (status==0x0000)?"email sent":"unknown"); + + return 1; +} + +int faimtest_serverready(struct aim_session_t *sess, struct command_rx_struct *command, ...) +{ + int famcount, i; + unsigned short *families; + va_list ap; + + va_start(ap, command); + famcount = va_arg(ap, int); + families = va_arg(ap, unsigned short *); + va_end(ap); + + dvprintf("faimtest: SNAC families supported by this host (type %d): ", command->conn->type); + for (i = 0; i < famcount; i++) + dvinlineprintf("0x%04x ", families[i]); + dinlineprintf("\n"); + + switch (command->conn->type) { + case AIM_CONN_TYPE_AUTH: + aim_auth_setversions(sess, command->conn); + aim_bos_reqrate(sess, command->conn); /* request rate info */ + + dprintf("faimtest: done with auth ServerReady\n"); + break; + + case AIM_CONN_TYPE_BOS: + + aim_setversions(sess, command->conn); + aim_bos_reqrate(sess, command->conn); /* request rate info */ + + dprintf("faimtest: done with BOS ServerReady\n"); + break; + + case AIM_CONN_TYPE_CHATNAV: + dprintf("faimtest: chatnav: got server ready\n"); + aim_conn_addhandler(sess, command->conn, AIM_CB_FAM_CTN, AIM_CB_CTN_INFO, faimtest_chatnav_info, 0); + aim_bos_reqrate(sess, command->conn); + aim_bos_ackrateresp(sess, command->conn); + aim_chatnav_clientready(sess, command->conn); + aim_chatnav_reqrights(sess, command->conn); + + break; + + case AIM_CONN_TYPE_CHAT: + aim_conn_addhandler(sess, command->conn, AIM_CB_FAM_CHT, AIM_CB_CHT_USERJOIN, faimtest_chat_join, 0); + aim_conn_addhandler(sess, command->conn, AIM_CB_FAM_CHT, AIM_CB_CHT_USERLEAVE, faimtest_chat_leave, 0); + aim_conn_addhandler(sess, command->conn, AIM_CB_FAM_CHT, AIM_CB_CHT_ROOMINFOUPDATE, faimtest_chat_infoupdate, 0); + aim_conn_addhandler(sess, command->conn, AIM_CB_FAM_CHT, AIM_CB_CHT_INCOMINGMSG, faimtest_chat_incomingmsg, 0); + aim_bos_reqrate(sess, command->conn); + aim_bos_ackrateresp(sess, command->conn); + aim_chat_clientready(sess, command->conn); + break; + + case AIM_CONN_TYPE_RENDEZVOUS: /* empty */ + break; + + default: + dvprintf("faimtest: unknown connection type on Host Online (0x%04x)\n", command->conn->type); + } + + return 1; +} + +int faimtest_parse_buddyrights(struct aim_session_t *sess, struct command_rx_struct *command, ...) +{ + va_list ap; + unsigned short maxbuddies, maxwatchers; + + va_start(ap, command); + maxbuddies = va_arg(ap, int); + maxwatchers = va_arg(ap, int); + va_end(ap); + + dvprintf("faimtest: buddy list rights: Max buddies = %d / Max watchers = %d\n", maxbuddies, maxwatchers); + + return 1; +} + +int faimtest_bosrights(struct aim_session_t *sess, struct command_rx_struct *command, ...) +{ + unsigned short maxpermits, maxdenies; + va_list ap; + + va_start(ap, command); + maxpermits = va_arg(ap, int); + maxdenies = va_arg(ap, int); + va_end(ap); + + dvprintf("faimtest: BOS rights: Max permit = %d / Max deny = %d\n", maxpermits, maxdenies); + + aim_bos_clientready(sess, command->conn); + + dprintf("faimtest: officially connected to BOS.\n"); + + return 1; +} + +int faimtest_locrights(struct aim_session_t *sess, struct command_rx_struct *command, ...) +{ + unsigned short maxsiglen; + va_list ap; + + va_start(ap, command); + maxsiglen = va_arg(ap, int); + va_end(ap); + + dvprintf("faimtest: locate rights: max signature length = %d\n", maxsiglen); + + return 1; +} + +int faimtest_parse_unknown(struct aim_session_t *sess, struct command_rx_struct *command, ...) +{ + int i = 0; + + if (!sess || !command) + return 1; + + dprintf("\nReceived unknown packet:"); + for (i = 0; i < command->commandlen; i++) { + if ((i % 8) == 0) + dinlineprintf("\n\t"); + dvinlineprintf("0x%2x ", command->data[i]); + } + dinlineprintf("\n\n"); + + return 1; +} + +/* + handleredirect()... + + This, of course, handles Service Redirects from OSCAR. + + Should get passed in the following: + struct command_rx_struct *command + the raw command data + int serviceid + the destination service ID + char *serverip + the IP address of the service's server + char *cookie + the raw auth cookie + */ +int faimtest_handleredirect(struct aim_session_t *sess, struct command_rx_struct *command, ...) +{ + va_list ap; + int serviceid; + char *ip; + unsigned char *cookie; + + va_start(ap, command); + serviceid = va_arg(ap, int); + ip = va_arg(ap, char *); + cookie = va_arg(ap, unsigned char *); + + switch(serviceid) { + case 0x0005: { /* Adverts */ + struct aim_conn_t *tstconn; + + tstconn = aim_newconn(sess, AIM_CONN_TYPE_ADS, ip); + if ((tstconn==NULL) || (tstconn->status & AIM_CONN_STATUS_RESOLVERR)) { + dprintf("faimtest: unable to reconnect with authorizer\n"); + } else { + aim_conn_addhandler(sess, tstconn, AIM_CB_FAM_SPECIAL, AIM_CB_SPECIAL_FLAPVER, faimtest_flapversion, 0); + aim_conn_addhandler(sess, tstconn, AIM_CB_FAM_SPECIAL, AIM_CB_SPECIAL_CONNCOMPLETE, faimtest_conncomplete, 0); + aim_conn_addhandler(sess, tstconn, 0x0001, 0x0003, faimtest_serverready, 0); + aim_conn_addhandler(sess, tstconn, 0x0001, 0x0007, faimtest_rateresp, 0); /* rate info */ + aim_conn_addhandler(sess, tstconn, AIM_CB_FAM_GEN, 0x0018, faimtest_hostversions, 0); + aim_auth_sendcookie(sess, tstconn, cookie); + dprintf("sent cookie to adverts host\n"); + } + break; + } + case 0x0007: { /* Authorizer */ + struct aim_conn_t *tstconn; + /* Open a connection to the Auth */ + tstconn = aim_newconn(sess, AIM_CONN_TYPE_AUTH, ip); + if ((tstconn==NULL) || (tstconn->status & AIM_CONN_STATUS_RESOLVERR)) { + dprintf("faimtest: unable to reconnect with authorizer\n"); + } else { + aim_conn_addhandler(sess, tstconn, AIM_CB_FAM_SPECIAL, AIM_CB_SPECIAL_FLAPVER, faimtest_flapversion, 0); + aim_conn_addhandler(sess, tstconn, AIM_CB_FAM_SPECIAL, AIM_CB_SPECIAL_CONNCOMPLETE, faimtest_conncomplete, 0); + aim_conn_addhandler(sess, tstconn, 0x0001, 0x0003, faimtest_serverready, 0); + aim_conn_addhandler(sess, tstconn, 0x0001, 0x0007, faimtest_rateresp, 0); /* rate info */ + aim_conn_addhandler(sess, tstconn, AIM_CB_FAM_GEN, 0x0018, faimtest_hostversions, 0); + aim_conn_addhandler(sess, tstconn, 0x0007, 0x0007, faimtest_accountconfirm, 0); + aim_conn_addhandler(sess, tstconn, 0x0007, 0x0003, faimtest_infochange, 0); + aim_conn_addhandler(sess, tstconn, 0x0007, 0x0005, faimtest_infochange, 0); + /* Send the cookie to the Auth */ + aim_auth_sendcookie(sess, tstconn, cookie); + dprintf("sent cookie to authorizer host\n"); + } + break; + } + case 0x000d: { /* ChatNav */ + struct aim_conn_t *tstconn = NULL; + tstconn = aim_newconn(sess, AIM_CONN_TYPE_CHATNAV, ip); + if ( (tstconn==NULL) || (tstconn->status & AIM_CONN_STATUS_RESOLVERR)) { + dprintf("faimtest: unable to connect to chatnav server\n"); + if (tstconn) aim_conn_kill(sess, &tstconn); + return 1; } + + aim_conn_addhandler(sess, tstconn, 0x0001, 0x0003, faimtest_serverready, 0); + aim_conn_addhandler(sess, tstconn, AIM_CB_FAM_SPECIAL, AIM_CB_SPECIAL_CONNCOMPLETE, faimtest_conncomplete, 0); + aim_auth_sendcookie(sess, tstconn, cookie); + dprintf("\achatnav: connected\n"); + break; + } + case 0x000e: { /* Chat */ + char *roomname = NULL; + int exchange; + struct aim_conn_t *tstconn = NULL; + + roomname = va_arg(ap, char *); + exchange = va_arg(ap, int); + + tstconn = aim_newconn(sess, AIM_CONN_TYPE_CHAT, ip); + if ( (tstconn==NULL) || (tstconn->status & AIM_CONN_STATUS_RESOLVERR)) { + dprintf("faimtest: unable to connect to chat server\n"); + if (tstconn) aim_conn_kill(sess, &tstconn); + return 1; + } + dvprintf("faimtest: chat: connected to %s on exchange %d\n", roomname, exchange); + + /* + * We must do this to attach the stored name to the connection! + */ + aim_chat_attachname(tstconn, roomname); + + aim_conn_addhandler(sess, tstconn, 0x0001, 0x0003, faimtest_serverready, 0); + aim_conn_addhandler(sess, tstconn, AIM_CB_FAM_SPECIAL, AIM_CB_SPECIAL_CONNCOMPLETE, faimtest_conncomplete, 0); + aim_auth_sendcookie(sess, tstconn, cookie); + + break; } + default: + dvprintf("uh oh... got redirect for unknown service 0x%04x!!\n", serviceid); + /* dunno */ + } + + va_end(ap); + + return 1; +} + +/* + * This is a little more complicated than it looks. The module + * name (proto, boscore, etc) may or may not be given. If it is + * not given, then use aim.exe. If it is given, put ".ocm" on the + * end of it. + * + * Now, if the offset or length requested would cause a read past + * the end of the file, then the request is considered invalid. Invalid + * requests are processed specially. The value hashed is the + * the request, put into little-endian (eight bytes: offset followed + * by length). + * + * Additionally, if the request is valid, the length is mod 4096. It is + * important that the length is checked for validity first before doing + * the mod. + * + * Note to Bosco's Brigade: if you'd like to break this, put the + * module name on an invalid request. + * + */ +static int getaimdata(unsigned char **bufret, int *buflenret, unsigned long offset, unsigned long len, const char *modname) +{ + FILE *f; + static const char defaultmod[] = "aim.exe"; + char *filename = NULL; + struct stat st; + unsigned char *buf; + int invalid = 0; + + if (!bufret || !buflenret) + return -1; + + if (modname) { + + if (!(filename = malloc(strlen(aimbinarypath)+1+strlen(modname)+4+1))) { + dperror("memrequest: malloc"); + return -1; + } + + sprintf(filename, "%s/%s.ocm", aimbinarypath, modname); + + } else { + + if (!(filename = malloc(strlen(aimbinarypath)+1+strlen(defaultmod)+1))) { + dperror("memrequest: malloc"); + return -1; + } + + sprintf(filename, "%s/%s", aimbinarypath, defaultmod); + + } + + if (stat(filename, &st) == -1) { + if (!modname) { + dperror("memrequest: stat"); + free(filename); + return -1; + } + invalid = 1; + } + + if (!invalid) { + if ((offset > st.st_size) || (len > st.st_size)) + invalid = 1; + else if ((st.st_size - offset) < len) + len = st.st_size - offset; + else if ((st.st_size - len) < len) + len = st.st_size - len; + } + + if (!invalid && len) + len %= 4096; + + if (invalid) { + int i; + + free(filename); /* not needed */ + + dvprintf("memrequest: recieved invalid request for 0x%08lx bytes at 0x%08lx (file %s)\n", len, offset, modname); + + i = 8; + if (modname) + i += strlen(modname); + + if (!(buf = malloc(i))) + return -1; + + i = 0; + + if (modname) { + memcpy(buf, modname, strlen(modname)); + i += strlen(modname); + } + + /* Damn endianness. This must be little (LSB first) endian. */ + buf[i++] = offset & 0xff; + buf[i++] = (offset >> 8) & 0xff; + buf[i++] = (offset >> 16) & 0xff; + buf[i++] = (offset >> 24) & 0xff; + buf[i++] = len & 0xff; + buf[i++] = (len >> 8) & 0xff; + buf[i++] = (len >> 16) & 0xff; + buf[i++] = (len >> 24) & 0xff; + + *bufret = buf; + *buflenret = i; + + } else { + + if (!(buf = malloc(len))) { + free(filename); + return -1; + } + + dvprintf("memrequest: loading %ld bytes from 0x%08lx in \"%s\"...\n", len, offset, filename); + + if (!(f = fopen(filename, "r"))) { + dperror("memrequest: fopen"); + free(filename); + free(buf); + return -1; + } + + free(filename); + + if (fseek(f, offset, SEEK_SET) == -1) { + dperror("memrequest: fseek"); + fclose(f); + free(buf); + return -1; + } + + if (fread(buf, len, 1, f) != 1) { + dperror("memrequest: fread"); + fclose(f); + free(buf); + return -1; + } + + fclose(f); + + *bufret = buf; + *buflenret = len; + + } + + return 0; /* success! */ +} + +/* + * This will get an offset and a length. The client should read this + * data out of whatever AIM.EXE binary the user has provided (hopefully + * it matches the client information thats sent at login) and pass a + * buffer back to libfaim so it can hash the data and send it to AOL for + * inspection by the client police. + */ +static int faimtest_memrequest(struct aim_session_t *sess, struct command_rx_struct *command, ...) +{ + va_list ap; + unsigned long offset, len; + char *modname; + unsigned char *buf; + int buflen; + + va_start(ap, command); + offset = va_arg(ap, unsigned long); + len = va_arg(ap, unsigned long); + modname = va_arg(ap, char *); + va_end(ap); + + if (aimbinarypath && (getaimdata(&buf, &buflen, offset, len, modname) == 0)) { + + aim_sendmemblock(sess, command->conn, offset, buflen, buf, AIM_SENDMEMBLOCK_FLAG_ISREQUEST); + + free(buf); + + } else { + + dvprintf("memrequest: unable to use AIM binary (\"%s/%s\"), sending defaults...\n", aimbinarypath, modname); + + aim_sendmemblock(sess, command->conn, offset, len, NULL, AIM_SENDMEMBLOCK_FLAG_ISREQUEST); + + } + + return 1; +} + +static int faimtest_parse_authresp(struct aim_session_t *sess, struct command_rx_struct *command, ...) +{ + va_list ap; + struct aim_conn_t *bosconn = NULL; + char *sn = NULL, *bosip = NULL, *errurl = NULL, *email = NULL; + unsigned char *cookie = NULL; + int errorcode = 0, regstatus = 0; + int latestbuild = 0, latestbetabuild = 0; + char *latestrelease = NULL, *latestbeta = NULL; + char *latestreleaseurl = NULL, *latestbetaurl = NULL; + char *latestreleaseinfo = NULL, *latestbetainfo = NULL; + + va_start(ap, command); + sn = va_arg(ap, char *); + errorcode = va_arg(ap, int); + errurl = va_arg(ap, char *); + regstatus = va_arg(ap, int); + email = va_arg(ap, char *); + bosip = va_arg(ap, char *); + cookie = va_arg(ap, unsigned char *); + + latestrelease = va_arg(ap, char *); + latestbuild = va_arg(ap, int); + latestreleaseurl = va_arg(ap, char *); + latestreleaseinfo = va_arg(ap, char *); + + latestbeta = va_arg(ap, char *); + latestbetabuild = va_arg(ap, int); + latestbetaurl = va_arg(ap, char *); + latestbetainfo = va_arg(ap, char *); + + va_end(ap); + + dvprintf("Screen name: %s\n", sn); + + /* + * Check for error. + */ + if (errorcode || !bosip || !cookie) { + dvprintf("Login Error Code 0x%04x\n", errorcode); + dvprintf("Error URL: %s\n", errurl); + aim_conn_kill(sess, &command->conn); + return 1; + } + + dvprintf("Reg status: %2d\n", regstatus); + dvprintf("Email: %s\n", email); + dvprintf("BOS IP: %s\n", bosip); + + if (latestbeta) + dvprintf("Latest beta version: %s, build %d, at %s (more info at %s)\n", latestbeta, latestbetabuild, latestbetaurl, latestbetainfo); + + if (latestrelease) + dvprintf("Latest released version: %s, build %d, at %s (more info at %s)\n", latestrelease, latestbuild, latestreleaseurl, latestreleaseinfo); + + dprintf("Closing auth connection...\n"); + aim_conn_kill(sess, &command->conn); + if (!(bosconn = aim_newconn(sess, AIM_CONN_TYPE_BOS, bosip))) { + dprintf("faimtest: could not connect to BOS: internal error\n"); + return 1; + } else if (bosconn->status & AIM_CONN_STATUS_CONNERR) { + dprintf("faimtest: could not connect to BOS\n"); + aim_conn_kill(sess, &bosconn); + return 1; + } + + aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_SPECIAL, AIM_CB_SPECIAL_CONNCOMPLETE, faimtest_conncomplete, 0); + aim_conn_addhandler(sess, bosconn, 0x0009, 0x0003, faimtest_bosrights, 0); + aim_conn_addhandler(sess, bosconn, 0x0001, 0x0007, faimtest_rateresp, 0); /* rate info */ + aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_ACK, AIM_CB_ACK_ACK, NULL, 0); + aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_GEN, 0x0018, faimtest_hostversions, 0); + aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_GEN, AIM_CB_GEN_SERVERREADY, faimtest_serverready, 0); + aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_GEN, AIM_CB_GEN_RATEINFO, NULL, 0); + aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_GEN, AIM_CB_GEN_REDIRECT, faimtest_handleredirect, 0); + aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_STS, AIM_CB_STS_SETREPORTINTERVAL, faimtest_reportinterval, 0); + aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_BUD, AIM_CB_BUD_RIGHTSINFO, faimtest_parse_buddyrights, 0); + aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_BUD, AIM_CB_BUD_ONCOMING, faimtest_parse_oncoming, 0); + aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_BUD, AIM_CB_BUD_OFFGOING, faimtest_parse_offgoing, 0); + aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_MSG, AIM_CB_MSG_INCOMING, faimtest_parse_incoming_im, 0); + aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_LOC, AIM_CB_LOC_ERROR, faimtest_parse_locerr, 0); + aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_MSG, AIM_CB_MSG_MISSEDCALL, faimtest_parse_misses, 0); + aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_GEN, AIM_CB_GEN_RATECHANGE, faimtest_parse_ratechange, 0); + aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_GEN, AIM_CB_GEN_EVIL, faimtest_parse_evilnotify, 0); + aim_conn_addhandler(sess, bosconn, 0x000a, 0x0001, faimtest_parse_searcherror, 0); + aim_conn_addhandler(sess, bosconn, 0x000a, 0x0003, faimtest_parse_searchreply, 0); + aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_MSG, AIM_CB_MSG_ERROR, faimtest_parse_msgerr, 0); + aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_LOC, AIM_CB_LOC_USERINFO, faimtest_parse_userinfo, 0); + aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_LOC, AIM_CB_LOC_RIGHTSINFO, faimtest_locrights, 0); + aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_MSG, AIM_CB_MSG_ACK, faimtest_parse_msgack, 0); + + aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_GEN, AIM_CB_GEN_MOTD, faimtest_parse_motd, 0); + + aim_conn_addhandler(sess, bosconn, 0x0004, 0x0005, faimtest_icbmparaminfo, 0); + aim_conn_addhandler(sess, bosconn, 0x0001, 0x0001, faimtest_parse_genericerr, 0); + aim_conn_addhandler(sess, bosconn, 0x0003, 0x0001, faimtest_parse_genericerr, 0); + aim_conn_addhandler(sess, bosconn, 0x0009, 0x0001, faimtest_parse_genericerr, 0); + + aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_SPECIAL, AIM_CB_SPECIAL_CONNERR, faimtest_parse_connerr, 0); + aim_conn_addhandler(sess, bosconn, 0x0001, 0x001f, faimtest_memrequest, 0); + aim_conn_addhandler(sess, bosconn, 0xffff, 0xffff, faimtest_parse_unknown, 0); + + aim_auth_sendcookie(sess, bosconn, cookie); + + return 1; +} + +static void printuserflags(unsigned short flags) +{ + if (flags & AIM_FLAG_UNCONFIRMED) + dinlineprintf("UNCONFIRMED "); + if (flags & AIM_FLAG_ADMINISTRATOR) + dinlineprintf("ADMINISTRATOR "); + if (flags & AIM_FLAG_AOL) + dinlineprintf("AOL "); + if (flags & AIM_FLAG_OSCAR_PAY) + dinlineprintf("OSCAR_PAY "); + if (flags & AIM_FLAG_FREE) + dinlineprintf("FREE "); + if (flags & AIM_FLAG_AWAY) + dinlineprintf("AWAY "); + if (flags & AIM_FLAG_UNKNOWN40) + dinlineprintf("ICQ? "); + if (flags & AIM_FLAG_UNKNOWN80) + dinlineprintf("UNKNOWN80 "); + return; +} + +int faimtest_parse_userinfo(struct aim_session_t *sess, struct command_rx_struct *command, ...) +{ + struct aim_userinfo_s *userinfo; + char *prof_encoding = NULL; + char *prof = NULL; + unsigned short inforeq = 0; + + va_list ap; + va_start(ap, command); + userinfo = va_arg(ap, struct aim_userinfo_s *); + prof_encoding = va_arg(ap, char *); + prof = va_arg(ap, char *); + inforeq = va_arg(ap, int); + va_end(ap); + + dvprintf("faimtest: userinfo: sn: %s\n", userinfo->sn); + dvprintf("faimtest: userinfo: warnlevel: 0x%04x\n", userinfo->warnlevel); + dvprintf("faimtest: userinfo: flags: 0x%04x = ", userinfo->flags); + printuserflags(userinfo->flags); + dinlineprintf("\n"); + + dvprintf("faimtest: userinfo: membersince: %lu\n", userinfo->membersince); + dvprintf("faimtest: userinfo: onlinesince: %lu\n", userinfo->onlinesince); + dvprintf("faimtest: userinfo: idletime: 0x%04x\n", userinfo->idletime); + + if (inforeq == AIM_GETINFO_GENERALINFO) { + dvprintf("faimtest: userinfo: profile_encoding: %s\n", prof_encoding ? prof_encoding : "[none]"); + dvprintf("faimtest: userinfo: prof: %s\n", prof ? prof : "[none]"); + } else if (inforeq == AIM_GETINFO_AWAYMESSAGE) { + dvprintf("faimtest: userinfo: awaymsg_encoding: %s\n", prof_encoding ? prof_encoding : "[none]"); + dvprintf("faimtest: userinfo: awaymsg: %s\n", prof ? prof : "[none]"); + } else + dprintf("faimtest: userinfo: unknown info request\n"); + + return 1; +} + +static int faimtest_handlecmd(struct aim_session_t *sess, struct command_rx_struct *command, struct aim_userinfo_s *userinfo, char *tmpstr) +{ + + if (!strncmp(tmpstr, "disconnect", 10)) { + + logout(); + + } else if (strstr(tmpstr, "goodday")) { + + aim_send_im(sess, command->conn, userinfo->sn, AIM_IMFLAGS_ACK, "Good day to you too."); + + } else if (strstr(tmpstr, "haveicon") && buddyicon) { + struct aim_sendimext_args args; + static const char iconmsg[] = {"I have an icon"}; + + args.destsn = userinfo->sn; + args.flags = AIM_IMFLAGS_HASICON; + args.msg = iconmsg; + args.msglen = strlen(iconmsg); + args.iconlen = buddyiconlen; + args.iconstamp = buddyiconstamp; + args.iconsum = buddyiconsum; + + aim_send_im_ext(sess, command->conn, &args); + + } else if (strstr(tmpstr, "sendicon") && buddyicon) { + + aim_send_icon(sess, command->conn, userinfo->sn, buddyicon, buddyiconlen, buddyiconstamp, buddyiconsum); + + } else if (strstr(tmpstr, "warnme")) { + + dprintf("faimtest: icbm: sending non-anon warning\n"); + aim_send_warning(sess, command->conn, userinfo->sn, 0); + + } else if (strstr(tmpstr, "anonwarn")) { + + dprintf("faimtest: icbm: sending anon warning\n"); + aim_send_warning(sess, command->conn, userinfo->sn, AIM_WARN_ANON); + + } else if (strstr(tmpstr, "setdirectoryinfo")) { + + dprintf("faimtest: icbm: sending backwards profile data\n"); + aim_setdirectoryinfo(sess, command->conn, "tsrif", "elddim", "tsal", "nediam", "emankcin", "teerts", "ytic", "etats", "piz", 0, 1); + + } else if (strstr(tmpstr, "setinterests")) { + + dprintf("faimtest: icbm: setting fun interests\n"); + aim_setuserinterests(sess, command->conn, "interest1", "interest2", "interest3", "interest4", "interest5", 1); + + } else if (!strncmp(tmpstr, "getfile", 7)) { + + if (!ohcaptainmycaptain) { + + aim_send_im(sess, command->conn, userinfo->sn, AIM_IMFLAGS_ACK, "I have no owner!"); + + } else { + struct aim_conn_t *newconn; + + newconn = aim_getfile_initiate(sess, command->conn, (strlen(tmpstr) < 8)?ohcaptainmycaptain:tmpstr+8); + dvprintf("faimtest: getting file listing from %s\n", (strlen(tmpstr) < 8)?ohcaptainmycaptain:tmpstr+8); + aim_conn_addhandler(sess, newconn, AIM_CB_FAM_OFT, AIM_CB_OFT_GETFILEINITIATE, faimtest_getfile_initiate,0); + } + + } else if (!strncmp(tmpstr, "open chatnav", 12)) { + + aim_bos_reqservice(sess, command->conn, AIM_CONN_TYPE_CHATNAV); + + } else if (!strncmp(tmpstr, "create", 6)) { + + aim_chatnav_createroom(sess,aim_getconn_type(sess, AIM_CONN_TYPE_CHATNAV), (strlen(tmpstr) < 7)?"WorldDomination":tmpstr+7, 0x0004); + + } else if (!strncmp(tmpstr, "close chatnav", 13)) { + struct aim_conn_t *chatnavconn; + + chatnavconn = aim_getconn_type(sess, AIM_CONN_TYPE_CHATNAV); + aim_conn_kill(sess, &chatnavconn); + + } else if (!strncmp(tmpstr, "join", 4)) { + + aim_chat_join(sess, command->conn, 0x0004, "worlddomination"); + + } else if (!strncmp(tmpstr, "leave", 5)) { + + aim_chat_leaveroom(sess, "worlddomination"); + + } else if (!strncmp(tmpstr, "getinfo", 7)) { + + aim_getinfo(sess, command->conn, "75784102", AIM_GETINFO_GENERALINFO); + aim_getinfo(sess, command->conn, "15853637", AIM_GETINFO_AWAYMESSAGE); + aim_getinfo(sess, command->conn, "midendian", AIM_GETINFO_GENERALINFO); + aim_getinfo(sess, command->conn, "midendian", AIM_GETINFO_AWAYMESSAGE); + + } else if (!strncmp(tmpstr, "open directim", 13)) { + struct aim_conn_t *newconn; + + printf("faimtest: opening directim to %s\n", (strlen(tmpstr) < 14)?userinfo->sn:tmpstr+14); + newconn = aim_directim_initiate(sess, command->conn, NULL, (strlen(tmpstr) < 14)?userinfo->sn:tmpstr+14); + if(!newconn || newconn->fd == -1) + printf("connection failed!\n"); + aim_conn_addhandler(sess, newconn, AIM_CB_FAM_OFT, AIM_CB_OFT_DIRECTIMINITIATE, faimtest_directim_initiate,0); + + } else if(!(strncmp(tmpstr, "lookup", 6))) { + + aim_usersearch_address(sess, command->conn, tmpstr+7); + + } else if (!strncmp(tmpstr, "reqsendmsg", 10)) { + + aim_send_im(sess, command->conn, ohcaptainmycaptain, 0, "sendmsg 7900"); + + } else if (!strncmp(tmpstr, "reqauth", 7)) { + + aim_bos_reqservice(sess, command->conn, AIM_CONN_TYPE_AUTH); + + } else if (!strncmp(tmpstr, "reqconfirm", 10)) { + + aim_auth_reqconfirm(sess, aim_getconn_type(sess, AIM_CONN_TYPE_AUTH)); + + } else if (!strncmp(tmpstr, "reqemail", 8)) { + + aim_auth_getinfo(sess, aim_getconn_type(sess, AIM_CONN_TYPE_AUTH), 0x0011); + + } else if (!strncmp(tmpstr, "changepass", 8)) { + + aim_auth_changepasswd(sess, aim_getconn_type(sess, AIM_CONN_TYPE_AUTH), "NEWPASSWORD", "OLDPASSWORD"); + + } else if (!strncmp(tmpstr, "setemail", 8)) { + + aim_auth_setemail(sess, aim_getconn_type(sess, AIM_CONN_TYPE_AUTH), "NEWEMAILADDRESS"); + + } else if (!strncmp(tmpstr, "sendmsg", 7)) { + int i; + i = atoi(tmpstr+8); + if (i < 10000) { + char *newbuf; + int z; + + newbuf = malloc(i+1); + for (z = 0; z < i; z++) { + newbuf[z] = (z % 10)+0x30; + } + newbuf[i] = '\0'; + aim_send_im(sess, command->conn, userinfo->sn, 0, newbuf); + free(newbuf); + } + + } else { + + dprintf("unknown command.\n"); + aim_add_buddy(sess, command->conn, userinfo->sn); + + } + + return 0; +} + +/* + * The user-level Incoming ICBM callback. + * + */ +int faimtest_parse_incoming_im(struct aim_session_t *sess, struct command_rx_struct *command, ...) +{ + int channel; + struct aim_userinfo_s *userinfo; + va_list ap; + + va_start(ap, command); + channel = va_arg(ap, int); + userinfo = va_arg(ap, struct aim_userinfo_s *); + + /* + * Channel 1: Standard Message + */ + if (channel == 1) { + char *tmpstr; + struct aim_incomingim_ch1_args *args; + int clienttype = AIM_CLIENTTYPE_UNKNOWN; + char realmsg[8192+1] = {""}; + + args = va_arg(ap, struct aim_incomingim_ch1_args *); + va_end(ap); + + clienttype = aim_fingerprintclient(args->fingerprint, args->finlen); + + dvprintf("faimtest: icbm: sn = \"%s\"\n", userinfo->sn); + dvprintf("faimtest: icbm: probable client type: %d\n", clienttype); + dvprintf("faimtest: icbm: warnlevel = 0x%04x\n", userinfo->warnlevel); + dvprintf("faimtest: icbm: flags = 0x%04x = ", userinfo->flags); + printuserflags(userinfo->flags); + dinlineprintf("\n"); + + dvprintf("faimtest: icbm: membersince = %lu\n", userinfo->membersince); + dvprintf("faimtest: icbm: onlinesince = %lu\n", userinfo->onlinesince); + dvprintf("faimtest: icbm: idletime = 0x%04x\n", userinfo->idletime); + dvprintf("faimtest: icbm: capabilities = 0x%04x\n", userinfo->capabilities); + + dprintf("faimtest: icbm: icbmflags = "); + if (args->icbmflags & AIM_IMFLAGS_AWAY) + dinlineprintf("away "); + if (args->icbmflags & AIM_IMFLAGS_ACK) + dinlineprintf("ackrequest "); + if (args->icbmflags & AIM_IMFLAGS_BUDDYREQ) + dinlineprintf("buddyreq "); + if (args->icbmflags & AIM_IMFLAGS_HASICON) + dinlineprintf("hasicon "); + dinlineprintf("\n"); + + dvprintf("faimtest: icbm: encoding flags = {%04x, %04x}\n", args->flag1, args->flag2); + + /* + * Quickly convert it to eight bit format, replacing non-ASCII UNICODE + * characters with their equivelent HTML entity. + */ + if (args->icbmflags & AIM_IMFLAGS_UNICODE) { + int i; + + for (i = 0; i < args->msglen; i += 2) { + unsigned short uni; + + uni = ((args->msg[i] & 0xff) << 8) | (args->msg[i+1] & 0xff); + + if ((uni < 128) || ((uni >= 160) && (uni <= 255))) { /* ISO 8859-1 */ + + snprintf(realmsg+strlen(realmsg), sizeof(realmsg)-strlen(realmsg), + "%c", uni); + + } else { /* something else, do UNICODE entity */ + + snprintf(realmsg+strlen(realmsg), sizeof(realmsg)-strlen(realmsg), + "&#%04x;", uni); + + } + + } + + } else { + + /* + * For non-UNICODE encodings (ASCII and ISO 8859-1), there is no + * need to do anything special here. Most terminals/whatever will + * be able to display such characters unmodified. + * + * Beware that PC-ASCII 128 through 159 are _not_ actually defined in + * ASCII or ISO 8859-1, and you should send them as UNICODE. WinAIM + * will send these characters in a UNICODE message, so you need + * to do so as well. + * + * You may not think it necessary to handle UNICODE messages. You're + * probably wrong. For one thing, Microsoft "Smart Quotes" will + * be sent by WinAIM as UNICODE (not HTML UNICODE, but real UNICODE). + * If you don't parse UNICODE at all, your users will get a blank + * message instead of the message containing Smart Quotes. + * + */ + strncpy(realmsg, args->msg, sizeof(realmsg)); + } + + dvprintf("faimtest: icbm: message: %s\n", realmsg); + + if (args->icbmflags & AIM_IMFLAGS_HASICON) + aim_send_im(sess, command->conn, userinfo->sn, AIM_IMFLAGS_BUDDYREQ, "You have an icon"); + + if (realmsg) { + int i = 0; + + while (realmsg[i] == '<') { + if (realmsg[i] == '<') { + while (realmsg[i] != '>') + i++; + i++; + } + } + tmpstr = realmsg+i; + + faimtest_handlecmd(sess, command, userinfo, tmpstr); + + } + } + /* + * Channel 2: Rendevous Request + */ + else if (channel == 2) { + struct aim_incomingim_ch2_args *args; + + args = va_arg(ap, struct aim_incomingim_ch2_args *); + va_end(ap); + + switch (args->reqclass) { + case AIM_CAPS_VOICE: { + + dvprintf("faimtest: voice invitation: source sn = %s\n", userinfo->sn); + dvprintf("faimtest: voice invitation: \twarnlevel = 0x%04x\n", userinfo->warnlevel); + dvprintf("faimtest: voice invitation: \tclass = 0x%04x = ", userinfo->flags); + printuserflags(userinfo->flags); + dinlineprintf("\n"); + + /* we dont get membersince on chat invites! */ + dvprintf("faimtest: voice invitation: \tonlinesince = %lu\n", userinfo->onlinesince); + dvprintf("faimtest: voice invitation: \tidletime = 0x%04x\n", userinfo->idletime); + + break; + } + case AIM_CAPS_GETFILE: { + struct aim_conn_t *newconn; + struct aim_fileheader_t *fh; + + dvprintf("faimtest: get file request from %s (at %s) %x\n", userinfo->sn, args->info.getfile.ip, args->reqclass); + + fh = aim_getlisting(sess, listingfile); + + newconn = aim_accepttransfer(sess, command->conn, userinfo->sn, args->info.getfile.cookie, args->info.getfile.ip, fh->totfiles, fh->totsize, fh->size, fh->checksum, args->reqclass); + + if ( (!newconn) || (newconn->fd == -1) ) { + dprintf("faimtest: getfile: requestconn: apparent error in accepttransfer\n"); + if(newconn) + aim_conn_kill(sess, &newconn); + break; + } + + free(fh); + + aim_conn_addhandler(sess, newconn, AIM_CB_FAM_OFT, AIM_CB_OFT_GETFILELISTINGREQ, faimtest_getfile_listingreq, 0); + aim_conn_addhandler(sess, newconn, AIM_CB_FAM_OFT, AIM_CB_OFT_GETFILEFILEREQ, faimtest_getfile_filereq, 0); + aim_conn_addhandler(sess, newconn, AIM_CB_FAM_OFT, AIM_CB_OFT_GETFILEFILESEND, faimtest_getfile_filesend, 0); + aim_conn_addhandler(sess, newconn, AIM_CB_FAM_OFT, AIM_CB_OFT_GETFILECOMPLETE, faimtest_getfile_complete, 0); + + aim_conn_addhandler(sess, newconn, AIM_CB_FAM_OFT, AIM_CB_OFT_GETFILEDISCONNECT, faimtest_getfile_disconnect, 0); + + dprintf("faimtest: getfile connect succeeded, handlers added.\n"); + + break; + } + case AIM_CAPS_SENDFILE: { + dprintf("faimtest: send file!\n"); + break; + } + case AIM_CAPS_CHAT: { + + dvprintf("faimtest: chat invitation: source sn = %s\n", userinfo->sn); + dvprintf("faimtest: chat invitation: \twarnlevel = 0x%04x\n", userinfo->warnlevel); + dvprintf("faimtest: chat invitation: \tclass = 0x%04x = ", userinfo->flags); + printuserflags(userinfo->flags); + dinlineprintf("\n"); + + /* we dont get membersince on chat invites! */ + dvprintf("faimtest: chat invitation: \tonlinesince = %lu\n", userinfo->onlinesince); + dvprintf("faimtest: chat invitation: \tidletime = 0x%04x\n", userinfo->idletime); + + dvprintf("faimtest: chat invitation: message = %s\n", args->info.chat.msg); + dvprintf("faimtest: chat invitation: room name = %s\n", args->info.chat.roominfo.name); + dvprintf("faimtest: chat invitation: encoding = %s\n", args->info.chat.encoding); + dvprintf("faimtest: chat invitation: language = %s\n", args->info.chat.lang); + dvprintf("faimtest: chat invitation: exchange = 0x%04x\n", args->info.chat.roominfo.exchange); + dvprintf("faimtest: chat invitation: instance = 0x%04x\n", args->info.chat.roominfo.instance); + dvprintf("faimtest: chat invitiation: autojoining %s...\n", args->info.chat.roominfo.name); + + /* + * Automatically join room... + */ + aim_chat_join(sess, command->conn, args->info.chat.roominfo.exchange, args->info.chat.roominfo.name); + break; + } + case AIM_CAPS_IMIMAGE: { + struct aim_conn_t *newconn; + + dprintf("faimtest: icbm: rendezvous imimage\n"); + + dvprintf("faimtest: OFT: DirectIM: request from %s (%s)\n", userinfo->sn, args->info.directim->ip); + + newconn = aim_directim_connect(sess, command->conn, args->info.directim); + + if ( (!newconn) || (newconn->fd == -1) ) { + dprintf("faimtest: icbm: imimage: could not connect\n"); + + if (newconn) + aim_conn_kill(sess, &newconn); + + break; + } + + aim_conn_addhandler(sess, newconn, AIM_CB_FAM_OFT, AIM_CB_OFT_DIRECTIMINCOMING, faimtest_directim_incoming, 0); + aim_conn_addhandler(sess, newconn, AIM_CB_FAM_OFT, AIM_CB_OFT_DIRECTIMDISCONNECT, faimtest_directim_disconnect, 0); + aim_conn_addhandler(sess, newconn, AIM_CB_FAM_OFT, AIM_CB_OFT_DIRECTIMTYPING, faimtest_directim_typing, 0); + + dvprintf("faimtest: OFT: DirectIM: connected to %s\n", userinfo->sn); + + aim_send_im_direct(sess, newconn, "goodday"); + + break; + } + case AIM_CAPS_BUDDYICON: { + + dvprintf("faimtest: Buddy Icon from %s, length = %u\n", userinfo->sn, args->info.icon.length); + break; + } + default: + dvprintf("faimtest: icbm: unknown reqclass (%d)\n", args->reqclass); + } /* switch */ + } else + dvprintf("faimtest does not support channels > 2 (chan = %02x)\n", channel); + + dprintf("faimtest: icbm: done with ICBM handling\n"); + + return 1; +} + +int faimtest_directim_initiate(struct aim_session_t *sess, struct command_rx_struct *command, ...) +{ + va_list ap; + struct aim_directim_priv *priv; + struct aim_conn_t *newconn, *listenerconn; + + va_start(ap, command); + newconn = va_arg(ap, struct aim_conn_t *); + listenerconn = va_arg(ap, struct aim_conn_t *); + va_end(ap); + + aim_conn_close(listenerconn); + aim_conn_kill(sess, &listenerconn); + + priv = (struct aim_directim_priv *)newconn->priv; + + dvprintf("faimtest: OFT: DirectIM: intitiate success to %s\n", priv->ip); + + aim_conn_addhandler(sess, newconn, AIM_CB_FAM_OFT, AIM_CB_OFT_DIRECTIMINCOMING, faimtest_directim_incoming, 0); + aim_conn_addhandler(sess, newconn, AIM_CB_FAM_OFT, AIM_CB_OFT_DIRECTIMDISCONNECT, faimtest_directim_disconnect, 0); + aim_conn_addhandler(sess, newconn, AIM_CB_FAM_OFT, AIM_CB_OFT_DIRECTIMTYPING, faimtest_directim_typing, 0); + + aim_send_im_direct(sess, newconn, "goodday"); + + dvprintf("faimtest: OFT: DirectIM: connected to %s\n", priv->sn); + + return 1; +} + +int faimtest_directim_connect(struct aim_session_t *sess, struct command_rx_struct *command, ...) +{ + va_list ap; + struct aim_directim_priv *priv; + + va_start(ap, command); + priv = va_arg(ap, struct aim_directim_priv *); + + va_end(ap); + + dprintf("faimtest: directim_connect\n"); + + return 1; +} + +int faimtest_directim_incoming(struct aim_session_t *sess, struct command_rx_struct *command, ...) +{ + va_list ap; + char *msg = NULL; + struct aim_conn_t *conn; + struct aim_directim_priv *priv; + + va_start(ap, command); + conn = va_arg(ap, struct aim_conn_t *); + msg = va_arg(ap, char *); + va_end(ap); + + if(!(priv = conn->priv)) { + dvprintf("faimtest: directim: no private struct on conn with fd %d\n", conn->fd); + return -1; + } + + dvprintf("faimtest: Directim from %s: %s\n", priv->sn, msg); + if (!strncmp(msg, "sendmsg", 7)) { + int i; + i = atoi(msg+8); + if (i < 10000) { + char *newbuf; + int z; + + newbuf = malloc(i+1); + for (z = 0; z < i; z++) { + newbuf[z] = (z % 10)+0x30; + } + newbuf[i] = '\0'; + aim_send_im_direct(sess, conn, newbuf); + free(newbuf); + } + } else if (!strncmp(msg, "goodday", 7)) { + aim_send_im_direct(sess, conn, "Good day to you, too"); + } else { + char newmsg[1024]; + snprintf(newmsg, sizeof(newmsg), "unknown (%s)\n", msg); + aim_send_im_direct(sess, conn, newmsg); + } + return 1; +} + +int faimtest_directim_disconnect(struct aim_session_t *sess, struct command_rx_struct *command, ...) +{ + va_list ap; + struct aim_conn_t *conn; + char *sn; + + va_start(ap, command); + conn = va_arg(ap, struct aim_conn_t *); + sn = va_arg(ap, char *); + va_end(ap); + + dvprintf("faimtest: directim: disconnected from %s\n", sn); + + aim_conn_kill(sess, &conn); + return 1; +} + +int faimtest_directim_typing(struct aim_session_t *sess, struct command_rx_struct *command, ...) +{ + va_list ap; + struct aim_conn_t *conn; + struct aim_directim_priv *priv; + + va_start(ap, command); + conn = va_arg(ap, struct aim_conn_t *); + va_end(ap); + + if(!(priv = (struct aim_directim_priv *)conn->priv)) { + dvprintf("faimtest: no private struct on conn with fd %d!\n", conn->fd); + return -1; + } + + dvprintf("faimtest: ohmigod! %s has started typing (DirectIM). He's going to send you a message! *squeal*\n", priv->sn); + return 1; +} + +int faimtest_infochange(struct aim_session_t *sess, struct command_rx_struct *command, ...) +{ + unsigned short change = 0; + int perms, type, length, str; + char *val; + va_list ap; + + va_start(ap, command); + perms = va_arg(ap, int); + type = va_arg(ap, int); + length = va_arg(ap, int); + val = va_arg(ap, char *); + str = va_arg(ap, int); + va_end(ap); + + if (aimutil_get16(command->data+2) == 0x0005) + change = 1; + + dvprintf("info%s: perms = %d, type = %x, length = %d, val = %s\n", change?" change":"", perms, type, length, str?val:"(not string)"); + + return 1; +} + +int faimtest_parse_oncoming(struct aim_session_t *sess, struct command_rx_struct *command, ...) +{ + struct aim_userinfo_s *userinfo; + + va_list ap; + va_start(ap, command); + userinfo = va_arg(ap, struct aim_userinfo_s *); + va_end(ap); + + dvprintf("%ld %s is now online (flags: %04x = %s%s%s%s%s%s%s%s) (caps = 0x%04x)\n", + time(NULL), + userinfo->sn, userinfo->flags, + (userinfo->flags&AIM_FLAG_UNCONFIRMED)?" UNCONFIRMED":"", + (userinfo->flags&AIM_FLAG_ADMINISTRATOR)?" ADMINISTRATOR":"", + (userinfo->flags&AIM_FLAG_AOL)?" AOL":"", + (userinfo->flags&AIM_FLAG_OSCAR_PAY)?" OSCAR_PAY":"", + (userinfo->flags&AIM_FLAG_FREE)?" FREE":"", + (userinfo->flags&AIM_FLAG_AWAY)?" AWAY":"", + (userinfo->flags&AIM_FLAG_UNKNOWN40)?" UNKNOWN40":"", + (userinfo->flags&AIM_FLAG_UNKNOWN80)?" UNKNOWN80":"", + userinfo->capabilities); + return 1; +} + +int faimtest_parse_offgoing(struct aim_session_t *sess, struct command_rx_struct *command, ...) +{ + struct aim_userinfo_s *userinfo; + + va_list ap; + va_start(ap, command); + userinfo = va_arg(ap, struct aim_userinfo_s *); + va_end(ap); + + dvprintf("%ld %s is now offline (flags: %04x = %s%s%s%s%s%s%s%s) (caps = 0x%04x)\n", + time(NULL), + userinfo->sn, userinfo->flags, + (userinfo->flags&AIM_FLAG_UNCONFIRMED)?" UNCONFIRMED":"", + (userinfo->flags&AIM_FLAG_ADMINISTRATOR)?" ADMINISTRATOR":"", + (userinfo->flags&AIM_FLAG_AOL)?" AOL":"", + (userinfo->flags&AIM_FLAG_OSCAR_PAY)?" OSCAR_PAY":"", + (userinfo->flags&AIM_FLAG_FREE)?" FREE":"", + (userinfo->flags&AIM_FLAG_AWAY)?" AWAY":"", + (userinfo->flags&AIM_FLAG_UNKNOWN40)?" UNKNOWN40":"", + (userinfo->flags&AIM_FLAG_UNKNOWN80)?" UNKNOWN80":"", + userinfo->capabilities); + return 1; +} + +int faimtest_parse_motd(struct aim_session_t *sess, struct command_rx_struct *command, ...) +{ + static char *codes[] = { + "Unknown", + "Mandatory upgrade", + "Advisory upgrade", + "System bulletin", + "Top o' the world!" + }; + static int codeslen = 5; + char *msg; + unsigned short id; + va_list ap; + + va_start(ap, command); + id = va_arg(ap, int); + msg = va_arg(ap, char *); + va_end(ap); + + dvprintf("faimtest: motd: %s (%d / %s)\n", msg, id, (id < codeslen)?codes[id]:"unknown"); + + return 1; +} + +int faimtest_parse_genericerr(struct aim_session_t *sess, struct command_rx_struct *command, ...) +{ + va_list ap; + unsigned short reason; + + va_start(ap, command); + reason = va_arg(ap, int); + va_end(ap); + + dvprintf("faimtest: snac threw error (reason 0x%04x: %s)\n", reason, (reasonsn, chan, reason, (reasonconn, screenname, password, &info, key); + + return 1; +} + +int faimtest_chat_join(struct aim_session_t *sess, struct command_rx_struct *command, ...) +{ + va_list ap; + struct aim_userinfo_s *userinfo; + int count = 0, i = 0; + + va_start(ap, command); + count = va_arg(ap, int); + userinfo = va_arg(ap, struct aim_userinfo_s *); + va_end(ap); + + dvprintf("faimtest: chat: %s: New occupants have joined:\n", (char *)command->conn->priv); + while (i < count) + dvprintf("faimtest: chat: %s: \t%s\n", (char *)command->conn->priv, userinfo[i++].sn); + + return 1; +} + +int faimtest_chat_leave(struct aim_session_t *sess, struct command_rx_struct *command, ...) +{ + va_list ap; + struct aim_userinfo_s *userinfo; + int count = 0, i = 0; + + va_start(ap, command); + count = va_arg(ap, int); + userinfo = va_arg(ap, struct aim_userinfo_s *); + va_end(ap); + + dvprintf("faimtest: chat: %s: Some occupants have left:\n", (char *)command->conn->priv); + + for (i = 0; i < count; ) + dvprintf("faimtest: chat: %s: \t%s\n", (char *)command->conn->priv, userinfo[i++].sn); + + return 1; +} + +int faimtest_chat_infoupdate(struct aim_session_t *sess, struct command_rx_struct *command, ...) +{ + va_list ap; + struct aim_userinfo_s *userinfo; + struct aim_chat_roominfo *roominfo; + char *roomname; + int usercount,i; + char *roomdesc; + unsigned short unknown_c9, unknown_d2, unknown_d5, maxmsglen, maxvisiblemsglen; + unsigned long creationtime; + + va_start(ap, command); + roominfo = va_arg(ap, struct aim_chat_roominfo *); + roomname = va_arg(ap, char *); + usercount= va_arg(ap, int); + userinfo = va_arg(ap, struct aim_userinfo_s *); + roomdesc = va_arg(ap, char *); + unknown_c9 = va_arg(ap, int); + creationtime = va_arg(ap, unsigned long); + maxmsglen = va_arg(ap, int); + unknown_d2 = va_arg(ap, int); + unknown_d5 = va_arg(ap, int); + maxvisiblemsglen = va_arg(ap, int); + va_end(ap); + + dvprintf("faimtest: chat: %s: info update:\n", (char *)command->conn->priv); + dvprintf("faimtest: chat: %s: \tRoominfo: {%04x, %s, %04x}\n", (char *)command->conn->priv, roominfo->exchange, roominfo->name, roominfo->instance); + dvprintf("faimtest: chat: %s: \tRoomname: %s\n", (char *)command->conn->priv, roomname); + dvprintf("faimtest: chat: %s: \tRoomdesc: %s\n", (char *)command->conn->priv, roomdesc); + dvprintf("faimtest: chat: %s: \tOccupants: (%d)\n", (char *)command->conn->priv, usercount); + + for (i = 0; i < usercount; ) + dvprintf("faimtest: chat: %s: \t\t%s\n", (char *)command->conn->priv, userinfo[i++].sn); + + dvprintf("faimtest: chat: %s: \tUnknown_c9: 0x%04x\n", (char *)command->conn->priv, unknown_c9); + dvprintf("faimtest: chat: %s: \tCreation time: %lu (time_t)\n", (char *)command->conn->priv, creationtime); + dvprintf("faimtest: chat: %s: \tUnknown_d2: 0x%04x\n", (char *)command->conn->priv, unknown_d2); + dvprintf("faimtest: chat: %s: \tUnknown_d5: 0x%02x\n", (char *)command->conn->priv, unknown_d5); + dvprintf("faimtest: chat: %s: \tMax message length: %d bytes\n", (char *)command->conn->priv, maxmsglen); + dvprintf("faimtest: chat: %s: \tMax visible message length: %d bytes\n", (char *)command->conn->priv, maxvisiblemsglen); + + return 1; +} + +int faimtest_chat_incomingmsg(struct aim_session_t *sess, struct command_rx_struct *command, ...) +{ + va_list ap; + struct aim_userinfo_s *userinfo; + char *msg; + char tmpbuf[1152]; + + va_start(ap, command); + userinfo = va_arg(ap, struct aim_userinfo_s *); + msg = va_arg(ap, char *); + va_end(ap); + + dvprintf("faimtest: chat: %s: incoming msg from %s: %s\n", (char *)command->conn->priv, userinfo->sn, msg); + + /* + * Do an echo for testing purposes. But not for ourselves ("oops!") + */ + if (strcmp(userinfo->sn, sess->sn) != 0) { + sprintf(tmpbuf, "(%s said \"%s\")", userinfo->sn, msg); + aim_chat_send_im(sess, command->conn, 0, tmpbuf, strlen(tmpbuf)); + } + + return 1; +} + +int faimtest_chatnav_info(struct aim_session_t *sess, struct command_rx_struct *command, ...) +{ + unsigned short type; + va_list ap; + + va_start(ap, command); + type = va_arg(ap, int); + + switch(type) { + case 0x0002: { + int maxrooms; + struct aim_chat_exchangeinfo *exchanges; + int exchangecount,i = 0; + + maxrooms = va_arg(ap, int); + exchangecount = va_arg(ap, int); + exchanges = va_arg(ap, struct aim_chat_exchangeinfo *); + va_end(ap); + + dprintf("faimtest: chat info: Chat Rights:\n"); + dvprintf("faimtest: chat info: \tMax Concurrent Rooms: %d\n", maxrooms); + + dvprintf("faimtest: chat info: \tExchange List: (%d total)\n", exchangecount); + for (i = 0; i < exchangecount; i++) { + dvprintf("faimtest: chat info: \t\t%x: %s (%s/%s)\n", + exchanges[i].number, + exchanges[i].name, + exchanges[i].charset1, + exchanges[i].lang1); + } + + } + break; + case 0x0008: { + char *fqcn, *name, *ck; + unsigned short instance, flags, maxmsglen, maxoccupancy, unknown, exchange; + unsigned char createperms; + unsigned long createtime; + + fqcn = va_arg(ap, char *); + instance = va_arg(ap, int); + exchange = va_arg(ap, int); + flags = va_arg(ap, int); + createtime = va_arg(ap, unsigned long); + maxmsglen = va_arg(ap, int); + maxoccupancy = va_arg(ap, int); + createperms = va_arg(ap, int); + unknown = va_arg(ap, int); + name = va_arg(ap, char *); + ck = va_arg(ap, char *); + va_end(ap); + + dvprintf("faimtest: received room create reply for %s/0x%04x\n", fqcn, exchange); + } + break; + default: + va_end(ap); + dvprintf("faimtest: chatnav info: unknown type (%04x)\n", type); + } + return 1; +} + +int faimtest_parse_connerr(struct aim_session_t *sess, struct command_rx_struct *command, ...) +{ + va_list ap; + unsigned short code; + char *msg = NULL; - /* Close up */ - printf("AIM just decided we didn't need to be here anymore, closing up...\n"); - - /* close up all connections, dead or no */ - aim_logoff(&aimsess); + va_start(ap, command); + code = va_arg(ap, int); + msg = va_arg(ap, char *); + va_end(ap); - if (stayconnected) { - printf("\nTrying to reconnect in 2 seconds...\n"); - sleep(2); - goto enter; - } + dvprintf("faimtest: connerr: Code 0x%04x: %s\n", code, msg); + aim_conn_kill(sess, &command->conn); /* this will break the main loop */ + + connected = 0; - /* Get out */ - exit(0); + return 1; } -int faimtest_serverready(struct aim_session_t *sess, struct command_rx_struct *command, ...) -{ - switch (command->conn->type) - { - case AIM_CONN_TYPE_BOS: +int faimtest_debugconn_connect(struct aim_session_t *sess, struct command_rx_struct *command, ...) +{ + dprintf("faimtest: connecting to an aimdebugd!\n"); - aim_bos_reqrate(sess, command->conn); /* request rate info */ - aim_bos_ackrateresp(sess, command->conn); /* ack rate info response -- can we say timing? */ - aim_bos_setprivacyflags(sess, command->conn, 0x00000003); - -#if 0 - aim_bos_reqpersonalinfo(sess, command->conn); -#endif - - /* Request advertisement service -- see comment in handleredirect */ - aim_bos_reqservice(sess, command->conn, AIM_CONN_TYPE_ADS); - aim_setversions(sess, command->conn); + /* convert the authorizer connection to a BOS connection */ + command->conn->type = AIM_CONN_TYPE_BOS; -#if 0 - aim_bos_reqrights(sess, command->conn); - aim_bos_reqbuddyrights(sess, command->conn); - aim_bos_reqlocaterights(sess, command->conn); - aim_bos_reqicbmparaminfo(sess, command->conn); -#endif - - /* set group permissions */ - aim_bos_setgroupperm(sess, command->conn, 0x1f); - fprintf(stderr, "faimtest: done with BOS ServerReady\n"); - break; + aim_conn_addhandler(sess, command->conn, AIM_CB_FAM_MSG, AIM_CB_MSG_INCOMING, faimtest_parse_incoming_im, 0); - case AIM_CONN_TYPE_CHATNAV: - fprintf(stderr, "faimtest: chatnav: got server ready\n"); - aim_conn_addhandler(sess, command->conn, AIM_CB_FAM_CTN, AIM_CB_CTN_INFO, faimtest_chatnav_info, 0); - aim_bos_reqrate(sess, command->conn); - aim_bos_ackrateresp(sess, command->conn); - aim_chatnav_clientready(sess, command->conn); - aim_chatnav_reqrights(sess, command->conn); + /* tell the aimddebugd we're ready */ + aim_debugconn_sendconnect(sess, command->conn); - break; - case AIM_CONN_TYPE_CHAT: - aim_conn_addhandler(sess, command->conn, AIM_CB_FAM_CHT, AIM_CB_CHT_USERJOIN, faimtest_chat_join, 0); - aim_conn_addhandler(sess, command->conn, AIM_CB_FAM_CHT, AIM_CB_CHT_USERLEAVE, faimtest_chat_leave, 0); - aim_conn_addhandler(sess, command->conn, AIM_CB_FAM_CHT, AIM_CB_CHT_ROOMINFOUPDATE, faimtest_chat_infoupdate, 0); - aim_conn_addhandler(sess, command->conn, AIM_CB_FAM_CHT, AIM_CB_CHT_INCOMINGMSG, faimtest_chat_incomingmsg, 0); - aim_bos_reqrate(sess, command->conn); - aim_bos_ackrateresp(sess, command->conn); - aim_chat_clientready(sess, command->conn); - break; - default: - fprintf(stderr, "faimtest: unknown connection type on Server Ready\n"); - } - return 1; + /* go right into main loop (don't open a BOS connection, etc) */ + return 1; } /* - handleredirect()... - - This, of course, handles Service Redirects from OSCAR. - - Should get passed in the following: - struct command_rx_struct *command - the raw command data - int serviceid - the destination service ID - char *serverip - the IP address of the service's server - char *cookie - the raw auth cookie + * Received in response to an IM sent with the AIM_IMFLAGS_ACK option. */ -int faimtest_handleredirect(struct aim_session_t *sess, struct command_rx_struct *command, ...) +int faimtest_parse_msgack(struct aim_session_t *sess, struct command_rx_struct *command, ...) { - va_list ap; - int serviceid; - char *ip; - char *cookie; + va_list ap; + unsigned short type; + char *sn = NULL; - /* this is the new buddy list */ - char buddies[] = "Buddy1&Buddy2&ThisHereIsAName2&"; - /* this is the new profile */ - char profile[] = "Hello"; - - va_start(ap, command); - serviceid = va_arg(ap, int); - ip = va_arg(ap, char *); - cookie = va_arg(ap, char *); - - switch(serviceid) - { - case 0x0005: /* Advertisements */ - /* - * The craziest explanation yet as to why we finish logging in when - * we get the advertisements redirect, of which we don't use anyway.... - * IT WAS EASY! - */ + va_start(ap, command); + type = va_arg(ap, int); + sn = va_arg(ap, char *); + va_end(ap); - /* send the buddy list and profile (required, even if empty) */ - aim_bos_setbuddylist(sess, command->conn, buddies); - aim_bos_setprofile(sess, command->conn, profile, NULL); + dvprintf("faimtest: msgack: 0x%04x / %s\n", type, sn); - /* send final login command (required) */ - aim_bos_clientready(sess, command->conn); /* tell BOS we're ready to go live */ + return 1; +} - /* you should now be ready to go */ - printf("\nYou are now officially online.\n"); +int faimtest_getfile_filereq(struct aim_session_t *ses, struct command_rx_struct *command, ...) +{ + va_list ap; + struct aim_conn_t *oftconn; + struct aim_fileheader_t *fh; + char *cookie; + + va_start(ap, command); + oftconn = va_arg(ap, struct aim_conn_t *); + fh = va_arg(ap, struct aim_fileheader_t *); + cookie = va_arg(ap, char *); + va_end(ap); - break; - case 0x0007: /* Authorizer */ - { - struct aim_conn_t *tstconn; - /* Open a connection to the Auth */ - tstconn = aim_newconn(sess, AIM_CONN_TYPE_AUTH, ip); - if ( (tstconn==NULL) || (tstconn->status >= AIM_CONN_STATUS_RESOLVERR) ) - fprintf(stderr, "faimtest: unable to reconnect with authorizer\n"); - else - /* Send the cookie to the Auth */ - aim_auth_sendcookie(sess, tstconn, cookie); - - } - break; - case 0x000d: /* ChatNav */ - { - struct aim_conn_t *tstconn = NULL; - tstconn = aim_newconn(sess, AIM_CONN_TYPE_CHATNAV, ip); - if ( (tstconn==NULL) || (tstconn->status >= AIM_CONN_STATUS_RESOLVERR)) - { - fprintf(stderr, "faimtest: unable to connect to chatnav server\n"); - return 1; - } -#if 0 - aim_conn_addhandler(sess, tstconn, AIM_CB_FAM_CTN, AIM_CB_SPECIAL_DEFAULT, aim_parse_unknown, 0); - aim_conn_addhandler(sess, tstconn, AIM_CB_FAM_GEN, AIM_CB_SPECIAL_DEFAULT, aim_parse_unknown, 0); -#endif - aim_conn_addhandler(sess, tstconn, 0x0001, 0x0003, faimtest_serverready, 0); - aim_auth_sendcookie(sess, tstconn, cookie); - fprintf(stderr, "\achatnav: connected\n"); - } - break; - case 0x000e: /* Chat */ - { - char *roomname = NULL; - struct aim_conn_t *tstconn = NULL; + dvprintf("faimtest: request for file %s.\n", fh->name); - roomname = va_arg(ap, char *); + return 1; +} - tstconn = aim_newconn(sess, AIM_CONN_TYPE_CHAT, ip); - if ( (tstconn==NULL) || (tstconn->status >= AIM_CONN_STATUS_RESOLVERR)) - { - fprintf(stderr, "faimtest: unable to connect to chat server\n"); - return 1; - } - printf("faimtest: chat: connected\n"); - /* - * We must do this to attach the stored name to the connection! - */ - aim_chat_attachname(tstconn, roomname); +int faimtest_getfile_filesend(struct aim_session_t *sess, struct command_rx_struct *command, ...) +{ + va_list ap; + struct aim_conn_t *oftconn; + struct aim_fileheader_t *fh; + char *path, *cookie; + int pos, bufpos = 0, bufsize = 2048, i; + char *buf; - aim_conn_addhandler(sess, tstconn, 0x0001, 0x0003, faimtest_serverready, 0); - aim_auth_sendcookie(sess, tstconn, cookie); - } - break; - default: - printf("uh oh... got redirect for unknown service 0x%04x!!\n", serviceid); - /* dunno */ - } + FILE *file; + va_start(ap, command); + oftconn = va_arg(ap, struct aim_conn_t *); + fh = va_arg(ap, struct aim_fileheader_t *); + cookie = va_arg(ap, char *); va_end(ap); - return 1; -} + dvprintf("faimtest: sending file %s(%ld).\n", fh->name, fh->size); -int faimtest_parse_authresp(struct aim_session_t *sess, struct command_rx_struct *command, ...) -{ - struct aim_conn_t *bosconn = NULL; + if(!(buf = malloc(2048))) + return -1; + + if( (path = (char *)calloc(1, strlen(listingpath) +strlen(fh->name)+2)) == NULL) { + dperror("calloc"); + dprintf("faimtest: error in calloc of path\n"); + return 0; /* XXX: no idea what winaim expects here =) */ + } + snprintf(path, strlen(listingpath)+strlen(fh->name)+2, "%s/%s", listingpath, fh->name); - printf("Screen name: %s\n", sess->logininfo.screen_name); - /* - * Check for error. + if( (file = fopen(path, "r")) == NULL) { + dvprintf("faimtest: getfile_send fopen failed for %s. damn.\n", path); + return 0; + } + + /* + * This is a mess. Remember that faimtest is demonstration code + * only and for the sake of the gods, don't use this code in any + * of your clients. --mid */ - if (sess->logininfo.errorcode) - { - printf("Login Error Code 0x%04x\n", sess->logininfo.errorcode); - printf("Error URL: %s\n", sess->logininfo.errorurl); - aim_conn_close(command->conn); - exit(0); /* XXX: should return in order to let the above things get free()'d. */ + for(pos = 0; pos < fh->size; pos++) { + bufpos = pos % bufsize; + + if(bufpos == 0 && pos > 0) { /* filled our buffer. spit it across the wire */ + if ( (i = send(oftconn->fd, buf, bufsize, 0)) != bufsize ) { + dperror("faim: getfile_send: write1"); + dprintf("faim: getfile_send: whoopsy, didn't write it all...\n"); + free(buf); + return -1; + } } + if( (buf[bufpos] = fgetc(file)) == EOF) { + if(pos != fh->size) { + dvprintf("faim: getfile_send: hrm... apparent early EOF at pos 0x%x of 0x%lx\n", pos, fh->size); + free(buf); + return -1; + } + } + dvprintf("%c(0x%02x) ", buf[pos], buf[pos]); + } - printf("Reg status: %2d\n", sess->logininfo.regstatus); - printf("Email: %s\n", sess->logininfo.email); - printf("BOS IP: %s\n", sess->logininfo.BOSIP); + if( (i = send(oftconn->fd, buf, bufpos+1, 0)) != (bufpos+1)) { + dperror("faim: getfile_send: write2"); + dprintf("faim: getfile_send cleanup: whoopsy, didn't write it all...\n"); + free(buf); + return -1; + } - printf("Closing auth connection...\n"); - aim_conn_close(command->conn); - bosconn = aim_newconn(sess, AIM_CONN_TYPE_BOS, sess->logininfo.BOSIP); - if (bosconn == NULL) - { - fprintf(stderr, "faimtest: could not connect to BOS: internal error\n"); - } - else if (bosconn->status != 0) - { - fprintf(stderr, "faimtest: could not connect to BOS\n"); - } - else - { - aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_ACK, AIM_CB_ACK_ACK, NULL, 0); - aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_GEN, AIM_CB_GEN_SERVERREADY, faimtest_serverready, 0); - aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_GEN, AIM_CB_GEN_RATEINFO, NULL, 0); - aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_GEN, AIM_CB_GEN_REDIRECT, faimtest_handleredirect, 0); - aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_STS, AIM_CB_STS_SETREPORTINTERVAL, NULL, 0); - aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_BUD, AIM_CB_BUD_ONCOMING, faimtest_parse_oncoming, 0); - aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_BUD, AIM_CB_BUD_OFFGOING, faimtest_parse_offgoing, 0); - aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_MSG, AIM_CB_MSG_INCOMING, faimtest_parse_incoming_im, 0); - aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_LOC, AIM_CB_LOC_ERROR, faimtest_parse_misses, 0); - aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_MSG, AIM_CB_MSG_MISSEDCALL, faimtest_parse_misses, 0); - aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_GEN, AIM_CB_GEN_RATECHANGE, faimtest_parse_misses, 0); - aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_MSG, AIM_CB_MSG_ERROR, faimtest_parse_misses, 0); - aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_LOC, AIM_CB_LOC_USERINFO, faimtest_parse_userinfo, 0); - - aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_CTN, AIM_CB_CTN_DEFAULT, aim_parse_unknown, 0); - aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_SPECIAL, AIM_CB_SPECIAL_DEFAULT, aim_parse_unknown, 0); - aim_conn_addhandler(sess, bosconn, AIM_CB_FAM_GEN, AIM_CB_GEN_MOTD, faimtest_parse_motd, 0); - aim_auth_sendcookie(sess, bosconn, sess->logininfo.cookie); - } + free(buf); + free(fh); return 1; } -int faimtest_parse_userinfo(struct aim_session_t *sess, struct command_rx_struct *command, ...) +int faimtest_getfile_complete(struct aim_session_t *sess, struct command_rx_struct *command, ...) { - struct aim_userinfo_s *userinfo; - char *prof_encoding = NULL; - char *prof = NULL; - va_list ap; + struct aim_conn_t *conn; + struct aim_fileheader_t *fh; + va_start(ap, command); - userinfo = va_arg(ap, struct aim_userinfo_s *); - prof_encoding = va_arg(ap, char *); - prof = va_arg(ap, char *); + conn = va_arg(ap, struct aim_conn_t *); + fh = va_arg(ap, struct aim_fileheader_t *); va_end(ap); - - printf("faimtest: userinfo: sn: %s\n", userinfo->sn); - printf("faimtest: userinfo: warnlevel: 0x%04x\n", userinfo->warnlevel); - printf("faimtest: userinfo: class: 0x%04x = ", userinfo->class); - /* - * 00000000 (binary) - * 1 Trial - * 2 Unknown - * 3 AOL - * 4 Unknown - * 5 Free - * - * ORed together. - * - */ + dvprintf("faimtest: completed file transfer for %s.\n", fh->name); - if (userinfo->class & 0x0001) - printf("TRIAL "); - if (userinfo->class & 0x0002) - printf("UNKNOWN_BIT2 "); - if (userinfo->class & 0x0004) - printf("AOL "); - if (userinfo->class & 0x0008) - printf("UNKNOWN_BIT4 "); - if (userinfo->class & 0x0010) - printf("FREE "); - printf("\n"); - - printf("faimtest: userinfo: membersince: %lu\n", userinfo->membersince); - printf("faimtest: userinfo: onlinesince: %lu\n", userinfo->onlinesince); - printf("faimtest: userinfo: idletime: 0x%04x\n", userinfo->idletime); - - printf("faimtest: userinfo: profile_encoding: %s\n", prof_encoding ? prof_encoding : "[none]"); - printf("faimtest: userinfo: prof: %s\n", prof ? prof : "[none]"); - + aim_conn_close(conn); + aim_conn_kill(sess, &conn); return 1; } -/* - * The user-level Incoming ICBM callback. - * - * Arguments: - * struct command_rx_struct * command if you feel like doing it yourself - * char * srcsn the source name - * char * msg message - * int warnlevel warning/evil level - * int class user class - * ulong membersince time_t of date of signup - * ulong onsince time_t of date of singon - * int idletime min (sec?) idle - * u_int icbmflags sets AIM_IMFLAGS_{AWAY,ACK} - * - */ -int faimtest_parse_incoming_im(struct aim_session_t *sess, struct command_rx_struct *command, ...) +int faimtest_getfile_disconnect(struct aim_session_t *sess, struct command_rx_struct *command, ...) { - int channel; va_list ap; + struct aim_conn_t *conn; + char *sn; va_start(ap, command); - channel = va_arg(ap, int); + conn = va_arg(ap, struct aim_conn_t *); + sn = va_arg(ap, char *); + va_end(ap); - /* - * Channel 1: Standard Message - */ - if (channel == 1) - { - struct aim_userinfo_s *userinfo; - char *msg = NULL; - u_int icbmflags = 0; - char *tmpstr = NULL; - u_short flag1, flag2; - - userinfo = va_arg(ap, struct aim_userinfo_s *); - msg = va_arg(ap, char *); - icbmflags = va_arg(ap, u_int); - flag1 = va_arg(ap, u_short); - flag2 = va_arg(ap, u_short); - va_end(ap); - - printf("faimtest: icbm: sn = \"%s\"\n", userinfo->sn); - printf("faimtest: icbm: warnlevel = 0x%04x\n", userinfo->warnlevel); - printf("faimtest: icbm: class = 0x%04x ", userinfo->class); - if (userinfo->class & 0x0010) - printf("(FREE) "); - if (userinfo->class & 0x0001) - printf("(TRIAL) "); - if (userinfo->class & 0x0004) - printf("(AOL) "); - printf("\n"); - printf("faimtest: icbm: membersince = %lu\n", userinfo->membersince); - printf("faimtest: icbm: onlinesince = %lu\n", userinfo->onlinesince); - printf("faimtest: icbm: idletime = 0x%04x\n", userinfo->idletime); - - printf("faimtest: icbm: icbmflags = "); - if (icbmflags & AIM_IMFLAGS_AWAY) - printf("away "); - if (icbmflags & AIM_IMFLAGS_ACK) - printf("ackrequest "); - printf("\n"); - - printf("faimtest: icbm: encoding flags = {%04x, %04x}\n", flag1, flag2); - - printf("faimtest: icbm: message: %s\n", msg); - - if (msg) - { - tmpstr = index(msg, '>'); - if (tmpstr != NULL) - tmpstr+=1; - else - tmpstr = msg; - - if ( (strlen(tmpstr) >= 10) && - (!strncmp(tmpstr, "disconnect", 10)) ) - { - aim_send_im(sess, command->conn, "midendian", 0, "ta ta..."); - aim_logoff(sess); - } - else if (strstr(tmpstr, "goodday")) - { - printf("faimtest: icbm: sending response\n"); - aim_send_im(sess, command->conn, userinfo->sn, 0, "Good day to you too."); - } - else if (!strncmp(tmpstr, "open chatnav", 12)) - { - aim_bos_reqservice(sess, command->conn, AIM_CONN_TYPE_CHATNAV); - //aim_chat_join(sess, command->conn, "thishereisaname2_chat85"); - } - else if (!strncmp(tmpstr, "create", 6)) - { - aim_chatnav_createroom(sess, aim_getconn_type(sess, AIM_CONN_TYPE_CHATNAV), "WorldDomination", 0x0004); - } - else if (!strncmp(tmpstr, "close chatnav", 13)) - aim_conn_close(aim_getconn_type(sess, AIM_CONN_TYPE_CHATNAV)); - else if (!strncmp(tmpstr, "join", 4)) - { - aim_chat_join(sess, command->conn, 0x0004, "worlddomination"); - } - else if (!strncmp(tmpstr, "leave", 5)) - aim_chat_leaveroom(sess, "worlddomination"); - else - { -#if 0 - printf("faimtest: icbm: starting chat...\n"); - aim_bos_reqservice(sess, command->conn, AIM_CONN_TYPE_CHATNAV); -#else - aim_bos_setidle(sess, command->conn, 0x0ffffffe); -#endif - } - - } - } - /* - * Channel 2: Rendevous Request - */ - else if (channel == 2) - { - struct aim_userinfo_s *userinfo; - int rendtype = 0; - - rendtype = va_arg(ap, int); - if (rendtype == 0) - { - char *msg,*encoding,*lang; - struct aim_chat_roominfo *roominfo; - - userinfo = va_arg(ap, struct aim_userinfo_s *); - roominfo = va_arg(ap, struct aim_chat_roominfo *); - msg = va_arg(ap, char *); - encoding = va_arg(ap, char *); - lang = va_arg(ap, char *); - va_end(ap); - - printf("faimtest: chat invitation: source sn = %s\n", userinfo->sn); - printf("faimtest: chat invitation: \twarnlevel = 0x%04x\n", userinfo->warnlevel); - printf("faimtest: chat invitation: \tclass = 0x%04x ", userinfo->class); - if (userinfo->class & 0x0010) - printf("(FREE) "); - if (userinfo->class & 0x0001) - printf("(TRIAL) "); - if (userinfo->class & 0x0004) - printf("(AOL) "); - printf("\n"); - /* we dont get membersince on chat invites! */ - printf("faimtest: chat invitation: \tonlinesince = %lu\n", userinfo->onlinesince); - printf("faimtest: chat invitation: \tidletime = 0x%04x\n", userinfo->idletime); - - printf("faimtest: chat invitation: message = %s\n", msg); - printf("faimtest: chat invitation: room name = %s\n", roominfo->name); - printf("faimtest: chat invitation: encoding = %s\n", encoding); - printf("faimtest: chat invitation: language = %s\n", lang); - printf("faimtest: chat invitation: exchange = 0x%04x\n", roominfo->exchange); - printf("faimtest: chat invitation: instance = 0x%04x\n", roominfo->instance); - printf("faimtest: chat invitiation: autojoining %s...\n", roominfo->name); - /* - * Automatically join room... - */ - aim_chat_join(sess, command->conn, 0x0004, roominfo->name); - } - else if (rendtype == 1) - { - userinfo = va_arg(ap, struct aim_userinfo_s *); - va_end(ap); - - printf("faimtest: voice invitation: source sn = %s\n", userinfo->sn); - printf("faimtest: voice invitation: \twarnlevel = 0x%04x\n", userinfo->warnlevel); - printf("faimtest: voice invitation: \tclass = 0x%04x ", userinfo->class); - if (userinfo->class & 0x0010) - printf("(FREE) "); - if (userinfo->class & 0x0001) - printf("(TRIAL) "); - if (userinfo->class & 0x0004) - printf("(AOL) "); - printf("\n"); - /* we dont get membersince on chat invites! */ - printf("faimtest: voice invitation: \tonlinesince = %lu\n", userinfo->onlinesince); - printf("faimtest: voice invitation: \tidletime = 0x%04x\n", userinfo->idletime); - - } - else - printf("faimtest: icbm: unknown rendtype (%d)\n", rendtype); - } - else - printf("faimtest does not support channels > 2 (chan = %02x)\n", channel); - printf("faimtest: icbm: done with ICBM handling\n"); + aim_conn_kill(sess, &conn); + dvprintf("faimtest: getfile: disconnected from %s\n", sn); return 1; } -int faimtest_authsvrready(struct aim_session_t *sess, struct command_rx_struct *command, ...) +int faimtest_getfile_initiate(struct aim_session_t *sess, struct command_rx_struct *command, ...) { - printf("faimtest_authsvrready: called (contype: %d)\n", command->conn->type); - sleep(10); - /* should just be able to tell it we're ready too... */ - aim_auth_clientready(sess, command->conn); + va_list ap; + struct aim_conn_t *conn, *listenerconn; + struct aim_filetransfer_priv *priv; -#if 0 - /* - * This is where you'd really begin changing your password. - * However, this callback may get called for reasons other - * than you wanting to change your password. You should - * probably check that before actually doing it. - */ - aim_auth_changepasswd(sess, command->conn, "PWD1", "PWD2"); -#endif + va_start(ap, command); + conn = va_arg(ap, struct aim_conn_t *); + listenerconn = va_arg(ap, struct aim_conn_t *); + va_end(ap); - return 1; -} + aim_conn_close(listenerconn); + aim_conn_kill(sess, &listenerconn); + + aim_conn_addhandler(sess, conn, AIM_CB_FAM_OFT, AIM_CB_OFT_GETFILEFILEREQ, faimtest_getfile_filereq, 0); + aim_conn_addhandler(sess, conn, AIM_CB_FAM_OFT, AIM_CB_OFT_GETFILEFILESEND, faimtest_getfile_filesend, 0); + aim_conn_addhandler(sess, conn, AIM_CB_FAM_OFT, AIM_CB_OFT_GETFILECOMPLETE, faimtest_getfile_complete, 0); + aim_conn_addhandler(sess, conn, AIM_CB_FAM_OFT, AIM_CB_OFT_GETFILEDISCONNECT, faimtest_getfile_disconnect, 0); + aim_conn_addhandler(sess, conn, AIM_CB_FAM_OFT, AIM_CB_OFT_GETFILELISTING, faimtest_getfile_listing, 0); + aim_conn_addhandler(sess, conn, AIM_CB_FAM_OFT, AIM_CB_OFT_GETFILELISTINGREQ, faimtest_getfile_listingreq, 0); + aim_conn_addhandler(sess, conn, AIM_CB_FAM_OFT, AIM_CB_OFT_GETFILERECEIVE, faimtest_getfile_receive, 0); + aim_conn_addhandler(sess, conn, AIM_CB_FAM_OFT, AIM_CB_OFT_GETFILESTATE4, faimtest_getfile_state4, 0); + + priv = (struct aim_filetransfer_priv *)conn->priv; -int faimtest_pwdchngdone(struct aim_session_t *sess, struct command_rx_struct *command, ...) -{ - printf("PASSWORD CHANGE SUCCESSFUL!!!\n"); + dvprintf("faimtest: getfile: %s (%s) connected to us on %d\n", priv->sn, priv->ip, conn->fd); return 1; } -int faimtest_parse_oncoming(struct aim_session_t *sess, struct command_rx_struct *command, ...) +int faimtest_getfile_listing(struct aim_session_t *sess, struct command_rx_struct *command, ...) { - struct aim_userinfo_s *userinfo; - va_list ap; + struct aim_conn_t *conn; + char *listing; + struct aim_filetransfer_priv *ft; + char *filename, *nameend, *sizec; + int filesize, namelen; + va_start(ap, command); - userinfo = va_arg(ap, struct aim_userinfo_s *); + conn = va_arg(ap, struct aim_conn_t *); + ft = va_arg(ap, struct aim_filetransfer_priv *); + listing = va_arg(ap, char *); va_end(ap); - printf("\n%s is now online (class: %04x = %s%s%s%s%s%s%s%s)\n", userinfo->sn, userinfo->class, - (userinfo->class&AIM_CLASS_TRIAL)?" TRIAL":"", - (userinfo->class&AIM_CLASS_UNKNOWN2)?" UNKNOWN2":"", - (userinfo->class&AIM_CLASS_AOL)?" AOL":"", - (userinfo->class&AIM_CLASS_UNKNOWN4)?" UNKNOWN4":"", - (userinfo->class&AIM_CLASS_FREE)?" FREE":"", - (userinfo->class&AIM_CLASS_AWAY)?" AWAY":"", - (userinfo->class&AIM_CLASS_UNKNOWN40)?" UNKNOWN40":"", - (userinfo->class&AIM_CLASS_UNKNOWN80)?" UNKNOWN80":""); + dvprintf("listing on %d==================\n%s\n===========\n", conn->fd, listing); - return 1; -} + nameend = strstr(listing+0x1a, "\r"); -int faimtest_parse_offgoing(struct aim_session_t *sess, struct command_rx_struct *command, ...) -{ - char *sn; - va_list ap; - - va_start(ap, command); - sn = va_arg(ap, char *); - va_end(ap); + namelen = nameend - (listing + 0x1a); - printf("\n%s has left\n", sn); + filename = malloc(namelen + 1); + strncpy(filename, listing+0x1a, namelen); + filename[namelen] = 0x00; - return 1; + sizec = malloc(8+1); + memcpy(sizec, listing + 0x11, 8); + sizec[8] = 0x00; + + filesize = strtol(sizec, (char **)NULL, 10); + + dvprintf("faimtest: requesting %d %s(%d long)\n", namelen, filename, filesize); + + aim_oft_getfile_request(sess, conn, filename, filesize); + + free(filename); + free(sizec); + + return 0; } -int faimtest_parse_motd(struct aim_session_t *sess, struct command_rx_struct *command, ...) +int faimtest_getfile_listingreq(struct aim_session_t *sess, struct command_rx_struct *command, ...) { - char *msg; - u_short id; va_list ap; - + struct aim_conn_t *oftconn; + struct aim_fileheader_t *fh; + int pos, bufpos = 0, bufsize = 2048, i; + char *buf; + va_start(ap, command); - id = va_arg(ap, u_short); - msg = va_arg(ap, char *); + oftconn = va_arg(ap, struct aim_conn_t *); + fh = va_arg(ap, struct aim_fileheader_t *); va_end(ap); - printf("faimtest: motd: %s\n", msg); + dvprintf("faimtest: sending listing of size %ld\n", fh->size); - return 1; -} + if(!(buf = malloc(2048))) + return -1; -/* - * Handles callbacks for: AIM_CB_RATECHANGE, AIM_CB_USERERROR, - * AIM_CB_MISSED_IM, and AIM_CB_MISSED_CALL. - */ -int faimtest_parse_misses(struct aim_session_t *sess, struct command_rx_struct *command, ...) -{ - u_short family; - u_short subtype; + for(pos = 0; pos < fh->size; pos++) { + bufpos = pos % bufsize; - family = aimutil_get16(command->data+0); - subtype= aimutil_get16(command->data+2); - - switch (family) - { - case 0x0001: - if (subtype == 0x000a) /* or AIM_CB_RATECHANGE */ - printf("\n****STOP SENDING/RECIEVING MESSAGES SO FAST!****\n\n"); - break; - case 0x0002: - if (subtype == 0x0001) /* or AIM_CB_USERERROR */ - { - u_long snacid = 0x00000000; - - snacid = aimutil_get32(&command->data[6]); - - printf("Received unknown error in SNAC family 0x0002 (snacid = %08lx)\n", snacid); - } - break; - case 0x0004: - if (subtype == 0x0001) /* or AIM_CB_MISSED_IM */ - printf("\n***LAST IM DIDN\'T MAKE IT BECAUSE THE BUDDY IS NOT ONLINE***\n\n"); - else if (subtype == 0x000a) /* or AIM_CB_MISSED_CALL */ - printf("You missed some messages from %s because they were sent too fast\n", &(command->data[13])); - break; + if(bufpos == 0 && pos > 0) { /* filled our buffer. spit it across the wire */ + if ( (i = send(oftconn->fd, buf, bufsize, 0)) != bufsize ) { + dperror("faim: getfile_send: write1"); + dprintf("faim: getfile_send: whoopsy, didn't write it all...\n"); + free(buf); + return -1; + } } + if( (buf[bufpos] = fgetc(listingfile)) == EOF) { + if(pos != fh->size) { + dvprintf("faim: getfile_send: hrm... apparent early EOF at pos 0x%x of 0x%lx\n", pos, fh->size); + free(buf); + return -1; + } + } + } + + if( (i = send(oftconn->fd, buf, bufpos+1, 0)) != (bufpos+1)) { + dperror("faim: getfile_send: write2"); + dprintf("faim: getfile_send cleanup: whoopsy, didn't write it all...\n"); + free(buf); + return -1; + } + dprintf("faimtest: sent listing\n"); + free(buf); return 0; } -#ifdef SNACLOGIN -int faimtest_parse_login(struct aim_session_t *sess, struct command_rx_struct *command, ...) +int faimtest_getfile_receive(struct aim_session_t *sess, struct command_rx_struct *command, ...) { - struct client_info_s info = {"FAIMtest (Hi guys!)", 3, 5, 1670, "us", "en"}; - u_char authcookie[11]; - int i; - - for (i = 0; i < (int)command->data[11]; i++) - authcookie[i] = command->data[12+i]; - authcookie[i] = '\0'; + va_list ap; + struct aim_conn_t *conn; + struct aim_filetransfer_priv *ft; + unsigned char data; + int pos; - printf("faimtest: logincookie: %s\n", authcookie); - - aim_send_login(sess, command->conn, FAIMTEST_SCREENNAME, FAIMTEST_PASSWORD, &info); - - return 1; + va_start(ap, command); + conn = va_arg(ap, struct aim_conn_t *); + ft = va_arg(ap, struct aim_filetransfer_priv *); + va_end(ap); + + dvprintf("faimtest: receiving %ld bytes of file data for %s:\n\t", ft->fh.size, ft->fh.name); + + for(pos = 0; pos < ft->fh.size; pos++) { + read(conn->fd, &data, 1); + printf("%c(%02x) ", data, data); + } + + printf("\n"); + + aim_oft_getfile_end(sess, conn); + + return 0; } -#endif -int faimtest_chat_join(struct aim_session_t *sess, struct command_rx_struct *command, ...) +int faimtest_getfile_state4(struct aim_session_t *sess, struct command_rx_struct *command, ...) { va_list ap; - struct aim_userinfo_s *userinfo; - int count = 0, i = 0; - + struct aim_conn_t *conn; + va_start(ap, command); - count = va_arg(ap, int); - userinfo = va_arg(ap, struct aim_userinfo_s *); + conn = va_arg(ap, struct aim_conn_t *); va_end(ap); - printf("faimtest: chat: %s: New occupants have joined:\n", (char *)command->conn->priv); - while (i < count) - printf("faimtest: chat: %s: \t%s\n", (char *)command->conn->priv, userinfo[i++].sn); - - return 1; + aim_conn_close(conn); + aim_conn_kill(sess, &conn); + return 0; } -int faimtest_chat_leave(struct aim_session_t *sess, struct command_rx_struct *command, ...) + +int faimtest_parse_ratechange(struct aim_session_t *sess, struct command_rx_struct *command, ...) { + static char *codes[5] = {"invalid", + "change", + "warning", + "limit", + "limit cleared"}; va_list ap; - struct aim_userinfo_s *userinfo; - int count = 0, i = 0; - - va_start(ap, command); - count = va_arg(ap, int); - userinfo = va_arg(ap, struct aim_userinfo_s *); + int code; + unsigned long rateclass, windowsize, clear, alert, limit, disconnect; + unsigned long currentavg, maxavg; + + va_start(ap, command); + + /* See code explanations below */ + code = va_arg(ap, int); + + /* + * See comments above aim_parse_ratechange_middle() in aim_rxhandlers.c. + */ + rateclass = va_arg(ap, unsigned long); + + /* + * Not sure what this is exactly. I think its the temporal + * relation factor (ie, how to make the rest of the numbers + * make sense in the real world). + */ + windowsize = va_arg(ap, unsigned long); + + /* Explained below */ + clear = va_arg(ap, unsigned long); + alert = va_arg(ap, unsigned long); + limit = va_arg(ap, unsigned long); + disconnect = va_arg(ap, unsigned long); + currentavg = va_arg(ap, unsigned long); + maxavg = va_arg(ap, unsigned long); + va_end(ap); - printf("faimtest: chat: %s: Some occupants have left:\n", (char *)command->conn->priv); - while (i < count) - printf("faimtest: chat: %s: \t%s\n", (char *)command->conn->priv, userinfo[i++].sn); + + dvprintf("faimtest: rate %s (rate class 0x%04lx): curavg = %ld, maxavg = %ld, alert at %ld, clear warning at %ld, limit at %ld, disconnect at %ld (window size = %ld)\n", + (code < 5)?codes[code]:"invalid", + rateclass, + currentavg, maxavg, + alert, clear, + limit, disconnect, + windowsize); + + if (code == AIM_RATE_CODE_CHANGE) { + /* + * Not real sure when these get sent. + */ + if (currentavg >= clear) + aim_conn_setlatency(command->conn, 0); + + } else if (code == AIM_RATE_CODE_WARNING) { + /* + * We start getting WARNINGs the first time we go below the 'alert' + * limit (currentavg < alert) and they stop when either we pause + * long enough for currentavg to go above 'clear', or until we + * flood it bad enough to go below 'limit' (and start getting + * LIMITs instead) or even further and go below 'disconnect' and + * get disconnected completely (and won't be able to login right + * away either). + */ + aim_conn_setlatency(command->conn, windowsize/4); /* XXX this is bogus! */ + + } else if (code == AIM_RATE_CODE_LIMIT) { + /* + * When we hit LIMIT, messages will start getting dropped. + */ + aim_conn_setlatency(command->conn, windowsize/2); /* XXX this is bogus! */ + + } else if (code == AIM_RATE_CODE_CLEARLIMIT) { + /* + * The limit is cleared when curavg goes above 'clear'. + */ + aim_conn_setlatency(command->conn, 0); + } return 1; } -int faimtest_chat_infoupdate(struct aim_session_t *sess, struct command_rx_struct *command, ...) +int faimtest_parse_evilnotify(struct aim_session_t *sess, struct command_rx_struct *command, ...) { - va_list ap; - struct aim_userinfo_s *userinfo; - struct aim_chat_roominfo *roominfo; - char *roomname; - int usercount,i; - char *roomdesc; + va_list ap; + int newevil; + struct aim_userinfo_s *userinfo; - va_start(ap, command); - roominfo = va_arg(ap, struct aim_chat_roominfo *); - roomname = va_arg(ap, char *); - usercount= va_arg(ap, int); - userinfo = va_arg(ap, struct aim_userinfo_s *); - roomdesc = va_arg(ap, char *); - va_end(ap); + va_start(ap, command); + newevil = va_arg(ap, int); + userinfo = va_arg(ap, struct aim_userinfo_s *); + va_end(ap); - printf("faimtest: chat: %s: info update:\n", (char *)command->conn->priv); - printf("faimtest: chat: %s: \tRoominfo: {%04x, %s, %04x}\n", - (char *)command->conn->priv, - roominfo->exchange, - roominfo->name, - roominfo->instance); - printf("faimtest: chat: %s: \tRoomname: %s\n", (char *)command->conn->priv, roomname); - printf("faimtest: chat: %s: \tRoomdesc: %s\n", (char *)command->conn->priv, roomdesc); - printf("faimtest: chat: %s: \tOccupants: (%d)\n", (char *)command->conn->priv, usercount); - - i = 0; - while (i < usercount) - printf("faimtest: chat: %s: \t\t%s\n", (char *)command->conn->priv, userinfo[i++].sn); + /* + * Evil Notifications that are lacking userinfo->sn are anon-warns + * if they are an evil increases, but are not warnings at all if its + * a decrease (its the natural backoff happening). + * + * newevil is passed as an int representing the new evil value times + * ten. + */ + dvprintf("faimtest: evil level change: new value = %2.1f%% (caused by %s)\n", ((float)newevil)/10, (userinfo && strlen(userinfo->sn))?userinfo->sn:"anonymous"); - return 1; + return 1; } -int faimtest_chat_incomingmsg(struct aim_session_t *sess, struct command_rx_struct *command, ...) +int faimtest_parse_searchreply(struct aim_session_t *sess, struct command_rx_struct *command, ...) { - va_list ap; - struct aim_userinfo_s *userinfo; - char *msg; - char tmpbuf[1152]; - - va_start(ap, command); - userinfo = va_arg(ap, struct aim_userinfo_s *); - msg = va_arg(ap, char *); - va_end(ap); + va_list ap; + char *address, *SNs; + int i, num; + + va_start(ap, command); + address = va_arg(ap, char *); + num = va_arg(ap, int); + SNs = va_arg(ap, char *); + va_end(ap); - printf("faimtest: chat: %s: incoming msg from %s: %s\n", (char *)command->conn->priv, userinfo->sn, msg); + dvprintf("faimtest: E-Mail Search Results for %s: ", address); - /* - * Do an echo for testing purposes. But not for ourselves ("oops!") - */ - if (strcmp(userinfo->sn, sess->logininfo.screen_name) != 0) - { - sprintf(tmpbuf, "(%s said \"%s\")", userinfo->sn, msg); - aim_chat_send_im(sess, command->conn, tmpbuf); - } + for(i = 0; i < num; i++) + dvinlineprintf("%s, ", &SNs[i*(MAXSNLEN+1)]); + dinlineprintf("\n"); - return 1; + return 1; } -int faimtest_chatnav_info(struct aim_session_t *sess, struct command_rx_struct *command, ...) +int faimtest_parse_searcherror(struct aim_session_t *sess, struct command_rx_struct *command, ...) { - u_short type; - va_list ap; + va_list ap; + char *address; - ap = va_start(ap, command); - type = va_arg(ap, u_short); - - switch(type) - { - case 0x0002: - { - int maxrooms; - struct aim_chat_exchangeinfo *exchanges; - int exchangecount,i = 0; - - maxrooms = va_arg(ap, u_char); - exchangecount = va_arg(ap, int); - exchanges = va_arg(ap, struct aim_chat_exchangeinfo *); + va_start(ap, command); + address = va_arg(ap, char *); va_end(ap); - printf("faimtest: chat info: Chat Rights:\n"); - printf("faimtest: chat info: \tMax Concurrent Rooms: %d\n", maxrooms); - - printf("faimtest: chat info: \tExchange List: (%d total)\n", exchangecount); - while (i < exchangecount) - { - printf("faimtest: chat info: \t\t%x: %s (%s/%s)\n", - exchanges[i].number, - exchanges[i].name, - exchanges[i].charset1, - exchanges[i].lang1); - i++; - } - - } - break; - default: - va_end(ap); - printf("faimtest: chatnav info: unknown type (%04x)\n", type); - } - return 1; + dvprintf("faimtest: E-Mail Search Results for %s: No Results or Invalid Email\n", address); + + return 1; }