+ rxcallback_t userfunc;
+ unsigned long offset, len;
+
+ offset = aimutil_get32(data);
+ len = aimutil_get32(data+4);
+
+ faimdprintf(sess, 1, "data at 0x%08lx (%d bytes) requested\n", offset, len);
+
+ if ((userfunc = aim_callhandler(sess, rx->conn, snac->family, snac->subtype)))
+ return userfunc(sess, rx, offset, len);
+
+ return 0;
+}
+
+faim_export int aim_sendmemblock(struct aim_session_t *sess, struct aim_conn_t *conn, unsigned long offset, unsigned long len, const unsigned char *buf)
+{
+ struct command_tx_struct *tx;
+ int i = 0;
+
+ if (!sess || !conn || ((offset == 0) && !buf))
+ return 0;
+
+ if (!(tx = aim_tx_new(sess, conn, AIM_FRAMETYPE_OSCAR, 0x0002, 10+2+16)))
+ return -1;
+
+ tx->lock = 1;
+
+ i = aim_putsnac(tx->data, 0x0001, 0x0020, 0x0000, sess->snac_nextid++);
+ i += aimutil_put16(tx->data+i, 0x0010); /* md5 is always 16 bytes */
+
+ if (buf && (len > 0)) { /* use input buffer */
+ md5_state_t state;
+
+ md5_init(&state);
+ md5_append(&state, (const md5_byte_t *)buf, len);
+ md5_finish(&state, (md5_byte_t *)(tx->data+i));
+ i += 0x10;
+
+ } else {
+
+ if ((offset != 0x00001004) || (len != 0x00000004))
+ faimdprintf(sess, 0, "sendmemblock: WARNING: sending bad hash... you will be disconnected soon...\n");
+
+ /*
+ * This data is correct for AIM 3.5.1670, offset 0x1004, length 4
+ *
+ * Using this block is as close to "legal" as you can get without
+ * using an AIM binary.
+ */
+ i += aimutil_put32(tx->data+i, 0x92bd6757);
+ i += aimutil_put32(tx->data+i, 0x3722cbd3);
+ i += aimutil_put32(tx->data+i, 0x2b048ab9);
+ i += aimutil_put32(tx->data+i, 0xd0b1e4ab);
+
+ }
+
+ tx->commandlen = i;
+ tx->lock = 0;
+ aim_tx_enqueue(sess, tx);
+
+ return 0;