diff libfaim/aim_ft.c @ 503:6e318907bcce

[gaim-migrate @ 513] bringing gaim up to latest libfaim committer: Tailor Script <tailor@pidgin.im>
author Eric Warmenhoven <eric@warmenhoven.org>
date Tue, 18 Jul 2000 05:37:39 +0000
parents
children 2c0a7d245bd2
line wrap: on
line diff
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/libfaim/aim_ft.c	Tue Jul 18 05:37:39 2000 +0000
@@ -0,0 +1,1091 @@
+#include <faim/aim.h>
+
+#include <sys/utsname.h> /* for aim_directim_initiate */
+#include <arpa/inet.h> /* for inet_ntoa */
+
+/* aim_msgcookies.c is mostly new. just look at the diff and replace yours, easiest. */
+
+/* 
+   function name       where i had it
+   aim_send_im_direct aim_im.c
+   aim_directim_initiate aim_im.c
+   aim_filetransfer_accept aim_im.c
+   aim_getlisting aim_misc.c (?!) -- prototype function. can be ignored.
+   establish aim_misc.c
+   aim_get_command_rendezvous aim_rxqueue.c
+   oft_getfh aim_rxqueue.c
+*/
+
+int aim_handlerendconnect(struct aim_session_t *sess, struct aim_conn_t *cur)
+{
+  int acceptfd = 0;
+  rxcallback_t userfunc;
+  struct sockaddr cliaddr;
+  socklen_t clilen = sizeof(cliaddr);
+  int ret = 0;
+
+  /*
+   * Listener sockets only have incoming connections. No data.
+   */
+  if( (acceptfd = accept(cur->fd, &cliaddr, &clilen)) == -1)
+    return -1;
+
+  if (cliaddr.sa_family != AF_INET) /* just in case IPv6 really is happening */
+    return -1;
+
+  switch(cur->subtype) {
+  case AIM_CONN_SUBTYPE_OFT_DIRECTIM: {
+    struct aim_directim_priv *priv;
+    
+    priv = (struct aim_directim_priv *)calloc(1, sizeof(struct aim_directim_priv));
+
+    snprintf(priv->ip, sizeof(priv->ip), "%s:%u", inet_ntoa(((struct sockaddr_in *)&cliaddr)->sin_addr), ntohs(((struct sockaddr_in *)&cliaddr)->sin_port));
+
+    if(!cur->priv)
+      cur->priv = priv; /* what happens if there is one?! -- mid */
+
+    cur->type = AIM_CONN_TYPE_RENDEZVOUS;
+    close(cur->fd); /* should we really do this? seems like the client should decide. maybe clone the connection and keep the listener open. -- mid */
+    cur->fd = acceptfd;
+
+    if ( (userfunc = aim_callhandler(cur, AIM_CB_FAM_OFT, AIM_CB_OFT_DIRECTIMINITIATE)))
+      ret = userfunc(sess, NULL, cur);
+				   
+    break;
+  }
+  case AIM_CONN_SUBTYPE_OFT_GETFILE: {
+    struct aim_filetransfer_priv *priv;
+
+    priv->state = 0;
+
+    priv = (struct aim_filetransfer_priv *)calloc(1, sizeof(struct aim_filetransfer_priv));
+
+    snprintf(priv->ip, sizeof(priv->ip), "%s:%u", inet_ntoa(((struct sockaddr_in *)&cliaddr)->sin_addr), ntohs(((struct sockaddr_in *)&cliaddr)->sin_port));
+
+    if(!cur->priv)
+      cur->priv = priv;
+
+    if ( (userfunc = aim_callhandler(cur, AIM_CB_FAM_OFT, AIM_CB_OFT_GETFILEINITIATE)))
+      ret = userfunc(sess, NULL, cur);
+    break;
+  } 
+  default: {
+    /* XXX */
+  }
+  }
+  return ret;
+}
+
+
+/*
+ * aim_send_im_direct:
+ * sess - session
+ * conn - directim connection
+ * msg  - null-terminated string to send
+ */
+
+int aim_send_im_direct(struct aim_session_t *sess, 
+		       struct aim_conn_t *conn,
+		       char *msg)
+{
+  struct command_tx_struct *newpacket , *newpacket2; 
+
+  /* newpacket contains a real header with data, newpacket2 is just a
+     null packet, with a cookie and a lot of 0x00s. newpacket is the
+     "i'm sending", newpacket2 is the "i'm typing".*/
+
+  /* uhm. the client should send those as two seperate things -- mid */
+
+  struct aim_directim_priv *priv = NULL;
+  int i;
+
+  if (strlen(msg) >= MAXMSGLEN)
+    return -1;
+
+  if (!sess || !conn || !(conn->type) || (conn->type != AIM_CONN_TYPE_RENDEZVOUS) || !conn->priv) {
+    printf("faim: directim: invalid arguments\n");
+    return -1;
+  };
+
+  priv = (struct aim_directim_priv *)conn->priv;
+
+  /* NULLish Header */
+
+  if (!(newpacket2 = aim_tx_new(AIM_FRAMETYPE_OFT, 0x0001, conn, 0))) {
+    printf("faim: directim: tx_new2 failed\n");
+    return -1;
+  }                                                                           
+
+  newpacket2->lock = 1; /* lock struct */
+
+  memcpy(newpacket2->hdr.oft.magic, "ODC2", 4);
+  newpacket2->hdr.oft.hdr2len = 0x44;
+
+  if (!(newpacket2->hdr.oft.hdr2 = calloc(1,newpacket2->hdr.oft.hdr2len))) {
+    free(newpacket2);
+    return -1;
+  }
+
+  i = 0;
+  i += aimutil_put16(newpacket2->hdr.oft.hdr2+i, 0x0006);
+  i += aimutil_put16(newpacket2->hdr.oft.hdr2+i, 0x0000);
+
+  i += aimutil_putstr(newpacket2->hdr.oft.hdr2+i, priv->cookie, 8);
+
+  i += aimutil_put16(newpacket2->hdr.oft.hdr2+i, 0x0000);
+  i += aimutil_put16(newpacket2->hdr.oft.hdr2+i, 0x0000);
+  i += aimutil_put16(newpacket2->hdr.oft.hdr2+i, 0x0000);
+  i += aimutil_put16(newpacket2->hdr.oft.hdr2+i, 0x0000);
+
+  i += aimutil_put32(newpacket2->hdr.oft.hdr2+i, 0x00000000);
+
+  i += aimutil_put16(newpacket2->hdr.oft.hdr2+i, 0x0000);
+  i += aimutil_put16(newpacket2->hdr.oft.hdr2+i, 0x0000);
+  i += aimutil_put16(newpacket2->hdr.oft.hdr2+i, 0x0000);
+
+  i += aimutil_put16(newpacket2->hdr.oft.hdr2+i, 0x000e);
+
+  i += aimutil_put16(newpacket2->hdr.oft.hdr2+i, 0x0000);
+  i += aimutil_put16(newpacket2->hdr.oft.hdr2+i, 0x0000);
+
+  i += aimutil_putstr(newpacket2->hdr.oft.hdr2+i, sess->logininfo.screen_name, strlen(sess->logininfo.screen_name));
+  
+  i = 52; /* 0x34 */
+  i += aimutil_put8(newpacket2->hdr.oft.hdr2+i, 0x00); /* 53 */
+  i += aimutil_put16(newpacket2->hdr.oft.hdr2+i, 0x0000); /* 55 */
+  i += aimutil_put16(newpacket2->hdr.oft.hdr2+i, 0x0000);
+  i += aimutil_put16(newpacket2->hdr.oft.hdr2+i, 0x0000);
+  i += aimutil_put16(newpacket2->hdr.oft.hdr2+i, 0x0000);/* 61 */
+  i += aimutil_put16(newpacket2->hdr.oft.hdr2+i, 0x0000);
+  i += aimutil_put16(newpacket2->hdr.oft.hdr2+i, 0x0000);/* 65 */
+  i += aimutil_put16(newpacket2->hdr.oft.hdr2+i, 0x0000);/* end of hdr2 */
+
+  newpacket2->lock = 0;
+  newpacket2->data = NULL;
+  
+  aim_tx_enqueue(sess, newpacket2);
+
+  /* Header packet */
+
+  if (!(newpacket = aim_tx_new(AIM_FRAMETYPE_OFT, 0x0001, conn, strlen(msg)))) {
+    printf("faim: directim: tx_new failed\n");
+    return -1;
+  }
+
+  newpacket->lock = 1; /* lock struct */
+
+  memcpy(newpacket->hdr.oft.magic, "ODC2", 4);
+  newpacket->hdr.oft.hdr2len = 0x54;
+
+  if (!(newpacket->hdr.oft.hdr2 = calloc(1,newpacket->hdr.oft.hdr2len))) {
+    free(newpacket);
+    return -1;
+  }
+
+  i = 0;
+  i += aimutil_put16(newpacket->hdr.oft.hdr2+i, 0x0006);
+  i += aimutil_put16(newpacket->hdr.oft.hdr2+i, 0x0000);
+
+  i += aimutil_putstr(newpacket->hdr.oft.hdr2+i, priv->cookie, 8);
+
+  i += aimutil_put16(newpacket->hdr.oft.hdr2+i, 0x0000);
+  i += aimutil_put16(newpacket->hdr.oft.hdr2+i, 0x0000);
+  i += aimutil_put16(newpacket->hdr.oft.hdr2+i, 0x0000);
+  i += aimutil_put16(newpacket->hdr.oft.hdr2+i, 0x0000);
+
+  i += aimutil_put32(newpacket->hdr.oft.hdr2+i, strlen(msg));
+
+  i += aimutil_put16(newpacket->hdr.oft.hdr2+i, 0x0000);
+  i += aimutil_put16(newpacket->hdr.oft.hdr2+i, 0x0000);
+  i += aimutil_put16(newpacket->hdr.oft.hdr2+i, 0x0000);
+  i += aimutil_put16(newpacket->hdr.oft.hdr2+i, 0x0000);
+  i += aimutil_put16(newpacket->hdr.oft.hdr2+i, 0x0000);
+  i += aimutil_put16(newpacket->hdr.oft.hdr2+i, 0x0000);
+
+  i += aimutil_putstr(newpacket->hdr.oft.hdr2+i, sess->logininfo.screen_name, strlen(sess->logininfo.screen_name));
+  
+  i = 52; /* 0x34 */
+  i += aimutil_put8(newpacket->hdr.oft.hdr2+i, 0x00); /* 53 */
+  i += aimutil_put16(newpacket->hdr.oft.hdr2+i, 0x0000); /* 55 */
+  i += aimutil_put16(newpacket->hdr.oft.hdr2+i, 0x0000);
+  i += aimutil_put16(newpacket->hdr.oft.hdr2+i, 0x0000);
+  i += aimutil_put16(newpacket->hdr.oft.hdr2+i, 0x0000);/* 61 */
+  i += aimutil_put16(newpacket->hdr.oft.hdr2+i, 0x0000);
+  i += aimutil_put16(newpacket->hdr.oft.hdr2+i, 0x0000);/* 65 */
+  i += aimutil_put16(newpacket->hdr.oft.hdr2+i, 0x0000);/* end of hdr2 */
+
+  /* values grabbed from a dump */
+  i += aimutil_put16(newpacket->hdr.oft.hdr2+i, 0x0008); /* 69 */
+  i += aimutil_put16(newpacket->hdr.oft.hdr2+i, 0x000c);
+  i += aimutil_put16(newpacket->hdr.oft.hdr2+i, 0x0000);/* 71 */
+  i += aimutil_put16(newpacket->hdr.oft.hdr2+i, 0x1466);/* 73 */ 
+  i += aimutil_put16(newpacket->hdr.oft.hdr2+i, 0x0001);/* 73 */ 
+  i += aimutil_put16(newpacket->hdr.oft.hdr2+i, 0x2e0f);
+  i += aimutil_put16(newpacket->hdr.oft.hdr2+i, 0x393e);
+  i += aimutil_put16(newpacket->hdr.oft.hdr2+i, 0xcac8);
+
+  memcpy(newpacket->data, msg, strlen(msg));
+
+  newpacket->lock = 0;
+
+  aim_tx_enqueue(sess, newpacket);
+
+  return 0;
+}
+
+/*
+ * aim_directim_intitiate:
+ * For those times when we want to open up the directim channel ourselves.
+ * sess is your session,
+ * conn is the BOS conn,
+ * priv is a dummy priv value (we'll let it get filled in later) (if
+ * you pass a NULL, we alloc one) 
+ * destsn is the SN to connect to.  
+ */
+
+
+struct aim_conn_t *aim_directim_initiate(struct aim_session_t *sess,
+			  struct aim_conn_t *conn,
+			  struct aim_directim_priv *priv,
+			  char *destsn)
+{
+  struct command_tx_struct *newpacket;
+  struct aim_conn_t *newconn;
+
+  struct aim_msgcookie_t *cookie;
+
+  int curbyte, i, listenfd;
+  short port = 4443;
+
+  struct hostent *hptr;
+  struct utsname myname;
+
+  char cap[16];
+  char d[4]; /* XXX: IPv6. *cough* */
+
+  /*
+   * Open our socket
+   */
+
+  if( (listenfd = aim_listenestablish(port)) == -1)
+    return NULL;
+
+  /*
+   * get our local IP
+   */
+
+  if(uname(&myname) < 0)
+    return NULL;
+
+  if( (hptr = gethostbyname(myname.nodename)) == NULL)
+    return NULL;
+
+  memcpy(&d, hptr->h_addr_list[0], 4); /* XXX: this probably isn't quite kosher, but it works */
+
+  aim_putcap(cap, 16, AIM_CAPS_IMIMAGE);
+
+  /*
+   * create the OSCAR packet
+   */
+
+  if (!(newpacket = aim_tx_new(AIM_FRAMETYPE_OSCAR, 0x0002, conn, 10+8+2+1+strlen(destsn)+4+4+0x32)))
+    return NULL;
+
+  newpacket->lock = 1; /* lock struct */
+
+  curbyte  = 0;
+  curbyte += aim_putsnac(newpacket->data+curbyte, 
+			 0x0004, 0x0006, 0x0000, sess->snac_nextid);
+
+  /* 
+   * Generate a random message cookie 
+   * This cookie needs to be alphanumeric and NULL-terminated to be TOC-compatible.
+   */
+  for (i=0;i<7;i++)
+    curbyte += aimutil_put8(newpacket->data+curbyte, 0x30 + ((u_char) random() % 20));
+  curbyte += aimutil_put8(newpacket->data+curbyte, 0x00);
+
+  /*
+   * grab all the data for cookie caching.
+   */
+  cookie = (struct aim_msgcookie_t *)calloc(1, sizeof(struct aim_msgcookie_t));
+
+  memcpy(cookie->cookie, newpacket->data+curbyte-8, 8);
+  cookie->type = AIM_COOKIETYPE_OFTIM;
+  
+  if(!priv)
+    priv = (struct aim_directim_priv *)calloc(1, sizeof(struct aim_directim_priv));
+
+  memcpy(priv->cookie, cookie, 8);
+  memcpy(priv->sn, destsn, sizeof(priv->sn));
+ 
+  cookie->data = priv;
+
+  aim_cachecookie(sess, cookie);  /* cache da cookie */
+
+  /*
+   * Channel ID
+   */
+  curbyte += aimutil_put16(newpacket->data+curbyte,0x0002);
+
+  /* 
+   * Destination SN (prepended with byte length)
+   */
+  curbyte += aimutil_put8(newpacket->data+curbyte,strlen(destsn));
+  curbyte += aimutil_putstr(newpacket->data+curbyte, destsn, strlen(destsn));
+
+  curbyte += aimutil_put16(newpacket->data+curbyte, 0x0003);
+  curbyte += aimutil_put16(newpacket->data+curbyte, 0x0000);
+
+  /* 
+   * enTLV start
+   */
+  curbyte += aimutil_put16(newpacket->data+curbyte, 0x0005);
+  curbyte += aimutil_put16(newpacket->data+curbyte, 0x0032);
+
+  /*
+   * Flag data / ICBM Parameters?
+   */
+  curbyte += aimutil_put8(newpacket->data+curbyte, 0x00);
+  curbyte += aimutil_put8(newpacket->data+curbyte, 0x00);
+
+  /*
+   * Cookie 
+   */
+  curbyte += aimutil_putstr(newpacket->data+curbyte, (char *)cookie, 8);
+
+  /*
+   * Capability String
+   */
+  curbyte += aimutil_putstr(newpacket->data+curbyte, (char *)cap, 0x10);
+
+  /*
+   * 000a/0002 : 0001
+   */
+  curbyte += aimutil_put16(newpacket->data+curbyte, 0x000a);
+  curbyte += aimutil_put16(newpacket->data+curbyte, 0x0002);
+  curbyte += aimutil_put16(newpacket->data+curbyte, 0x0001);
+
+  /*
+   * 0003/0004: IP address
+   */
+
+  curbyte += aimutil_put16(newpacket->data+curbyte, 0x0003);
+  curbyte += aimutil_put16(newpacket->data+curbyte, 0x0004);
+
+  for(i = 0; i < 4; i++)
+    curbyte += aimutil_put8(newpacket->data+curbyte, d[i]); /* already in network byte order */
+
+  /*
+   * 0005/0002: Port
+   */
+
+  curbyte += aimutil_put16(newpacket->data+curbyte, 0x0005);
+  curbyte += aimutil_put16(newpacket->data+curbyte, 0x0002);
+  curbyte += aimutil_put16(newpacket->data+curbyte, port);
+
+  /*
+   * 000f/0000: umm.. dunno. Zigamorph[1]?
+   * [1]: see esr's TNHD.
+   */
+
+  curbyte += aimutil_put16(newpacket->data+curbyte, 0x000f);
+  curbyte += aimutil_put16(newpacket->data+curbyte, 0x0000);
+
+  printf("curbyte: 0x%x\n",curbyte);
+
+  newpacket->commandlen = curbyte;
+  newpacket->lock = 0;
+
+  aim_tx_enqueue(sess, newpacket);
+
+  /*
+   * allocate and set up our connection
+   */
+
+  i = fcntl(listenfd, F_GETFL, 0);
+  fcntl(listenfd, F_SETFL, i | O_NONBLOCK);
+
+  newconn = aim_newconn(sess, AIM_CONN_TYPE_RENDEZVOUS_OUT, NULL);
+  if (!newconn) { 
+    perror("aim_newconn");
+    aim_conn_kill(sess, &newconn);
+    return NULL;
+  } 
+
+  newconn->fd = listenfd;
+  newconn->subtype = AIM_CONN_SUBTYPE_OFT_DIRECTIM;
+  newconn->priv = priv;
+  printf("faim: listening (fd = %d, unconnected)\n", newconn->fd);
+
+  /*
+   * XXX We need some way of closing the listener socket after
+   * n seconds of no connection. -- mid
+   */
+
+#ifdef USE_SNAC_FOR_IMS
+ {
+    struct aim_snac_t snac;
+
+    snac.id = sess->snac_nextid;
+    snac.family = 0x0004;
+    snac.type = 0x0006;
+    snac.flags = 0x0000;
+
+    snac.data = malloc(strlen(destsn)+1);
+    memcpy(snac.data, destsn, strlen(destsn)+1);
+
+    aim_newsnac(sess, &snac);
+
+    aim_cleansnacs(sess, 60); /* clean out all SNACs over 60sec old */
+  }
+#endif
+  
+  return (newconn);
+} 
+
+
+struct aim_conn_t *aim_directim_connect(struct aim_session_t *sess,
+					struct aim_conn_t *conn,
+					struct aim_directim_priv *priv )
+{
+  struct aim_conn_t *newconn = NULL;;
+
+  newconn = aim_newconn(sess, AIM_CONN_TYPE_RENDEZVOUS, priv->ip);
+  if (!newconn || (newconn->fd == -1)) { 
+    printf("could not connect to %s\n", priv->ip);
+    perror("aim_newconn");
+    aim_conn_kill(sess, &newconn);
+    return NULL;
+  } else {    
+    newconn->subtype = AIM_CONN_SUBTYPE_OFT_DIRECTIM;
+    newconn->priv = priv;
+    printf("faim: connected to peer (fd = %d)\n", newconn->fd);
+    return newconn;
+  }
+  return newconn;
+}
+
+u_long aim_accepttransfer(struct aim_session_t *sess,
+			  struct aim_conn_t *conn, 
+			  struct aim_conn_t *oftconn,
+			  char *sn,
+			  char *cookie,
+			  unsigned short rendid)
+{
+  struct command_tx_struct *newpacket, *newoft;
+  struct aim_fileheader_t *listingfh;
+  int curbyte, i;
+  /* now for the oft bits */
+
+  if(rendid == AIM_CAPS_GETFILE) {
+    printf("jbm: getfile request accept\n");
+    if(!(newoft = aim_tx_new(AIM_FRAMETYPE_OFT, 0x1108, oftconn, 0))) {
+      printf("faim: accept_transfer: tx_new OFT failed\n");
+      return -1;
+    }
+    
+    newoft->lock = 1;
+    
+    memcpy(newoft->hdr.oft.magic, "OFT2", 4);
+    newoft->hdr.oft.hdr2len = 0xf8; /* 0x100 - 8 */
+    
+    if (!(newoft->hdr.oft.hdr2 = calloc(1,newoft->hdr.oft.hdr2len))) {
+      free(newoft);
+      return -1;
+    }  
+
+    listingfh = aim_getlisting(sess);
+
+    memcpy(listingfh->bcookie, cookie, 8);
+
+    curbyte = 0;
+    
+    for(i = 0; i < 8; i++)
+      curbyte += aimutil_put8(newoft->hdr.oft.hdr2+curbyte, cookie[i]);
+    curbyte += aimutil_put16(newoft->hdr.oft.hdr2+curbyte, listingfh->encrypt);
+    curbyte += aimutil_put16(newoft->hdr.oft.hdr2+curbyte, listingfh->compress);
+    curbyte += aimutil_put16(newoft->hdr.oft.hdr2+curbyte, listingfh->totfiles);
+    curbyte += aimutil_put16(newoft->hdr.oft.hdr2+curbyte, listingfh->filesleft);
+    curbyte += aimutil_put16(newoft->hdr.oft.hdr2+curbyte, listingfh->totparts);
+    curbyte += aimutil_put16(newoft->hdr.oft.hdr2+curbyte, listingfh->partsleft);
+    curbyte += aimutil_put32(newoft->hdr.oft.hdr2+curbyte, listingfh->totsize);
+    curbyte += aimutil_put32(newoft->hdr.oft.hdr2+curbyte, listingfh->size);
+    curbyte += aimutil_put32(newoft->hdr.oft.hdr2+curbyte, listingfh->modtime);
+    curbyte += aimutil_put32(newoft->hdr.oft.hdr2+curbyte, listingfh->checksum);
+    curbyte += aimutil_put32(newoft->hdr.oft.hdr2+curbyte, listingfh->rfrcsum);
+    curbyte += aimutil_put32(newoft->hdr.oft.hdr2+curbyte, listingfh->rfsize);
+    curbyte += aimutil_put32(newoft->hdr.oft.hdr2+curbyte, listingfh->cretime);
+    curbyte += aimutil_put32(newoft->hdr.oft.hdr2+curbyte, listingfh->rfcsum);
+    curbyte += aimutil_put32(newoft->hdr.oft.hdr2+curbyte, listingfh->nrecvd);
+    curbyte += aimutil_put32(newoft->hdr.oft.hdr2+curbyte, listingfh->recvcsum);
+
+    memcpy(newoft->hdr.oft.hdr2+curbyte, listingfh->idstring, 32);
+    curbyte += 32;
+
+    curbyte += aimutil_put8(newoft->hdr.oft.hdr2+curbyte, listingfh->flags);
+    curbyte += aimutil_put8(newoft->hdr.oft.hdr2+curbyte, listingfh->lnameoffset);
+    curbyte += aimutil_put8(newoft->hdr.oft.hdr2+curbyte, listingfh->lsizeoffset);
+
+    memcpy(newoft->hdr.oft.hdr2+curbyte, listingfh->dummy, 69);
+    curbyte += 69;
+    
+    memcpy(newoft->hdr.oft.hdr2+curbyte, listingfh->macfileinfo, 16);
+    curbyte += 16;
+
+    curbyte += aimutil_put16(newoft->hdr.oft.hdr2+curbyte, listingfh->nencode);
+    curbyte += aimutil_put16(newoft->hdr.oft.hdr2+curbyte, listingfh->nlanguage);
+
+    memcpy(newoft->hdr.oft.hdr2+curbyte, listingfh->name, 64);
+    curbyte += 64;
+
+    free(listingfh);
+
+    newoft->lock = 0;
+    aim_tx_enqueue(sess, newoft);
+    printf("faim: getfile: OFT listing enqueued.\n");
+    
+  }
+
+
+  if(!(newpacket = aim_tx_new(AIM_FRAMETYPE_OSCAR, 0x0002, conn, 10+8+2+1+strlen(sn)+4+2+8+16)))
+    return -1;
+  
+  newpacket->lock = 1;
+  
+  curbyte = aim_putsnac(newpacket->data, 0x0004, 0x0006, 0x0000, sess->snac_nextid);
+  for (i = 0; i < 8; i++)
+    curbyte += aimutil_put8(newpacket->data+curbyte, cookie[i]);
+  curbyte += aimutil_put16(newpacket->data+curbyte, 0x0002);
+  curbyte += aimutil_put8(newpacket->data+curbyte, strlen(sn));
+  curbyte += aimutil_putstr(newpacket->data+curbyte, sn, strlen(sn));
+  curbyte += aimutil_put16(newpacket->data+curbyte, 0x0005);
+  curbyte += aimutil_put16(newpacket->data+curbyte, 0x001a);
+  curbyte += aimutil_put16(newpacket->data+curbyte, 0x0002 /* accept */);
+  for (i = 0; i < 8; i++)
+    curbyte += aimutil_put8(newpacket->data+curbyte, cookie[i]);
+  curbyte += aim_putcap(newpacket->data+curbyte, 0x10, rendid);
+
+  newpacket->lock = 0;
+  aim_tx_enqueue(sess, newpacket);
+
+
+
+  return (sess->snac_nextid++);
+}
+
+/*
+ * aim_getlisting()
+ * 
+ * Get file listing.txt info. where else to put it? i
+ * dunno. client-side issue for sure tho. for now we just side-step
+ * the issue with a nice default. =)
+ *  
+ */
+
+struct aim_fileheader_t *aim_getlisting(struct aim_session_t *sess) 
+{
+  struct aim_fileheader_t *fh;
+
+  if(!(fh = (struct aim_fileheader_t*)calloc(1, sizeof(struct aim_fileheader_t))))
+    return NULL;
+
+  fh->encrypt     = 0x0000;
+  fh->compress    = 0x0000;
+  fh->totfiles    = 0x0001;
+  fh->filesleft   = 0x0001;
+  fh->totparts    = 0x0001;
+  fh->partsleft   = 0x0001;
+  fh->totsize     = 0x00000064;
+  fh->size        = 0x00000024; /* ls -l listing.txt */
+  fh->modtime     = (int)time(NULL); /*0x39441fb4; */
+  fh->checksum    = 0xb8350000;
+  fh->rfcsum      = 0x00000000;
+  fh->rfsize      = 0x00000000;
+  fh->cretime     = 0x00000000;
+  fh->rfcsum      = 0x00000000;
+  fh->nrecvd      = 0x00000000;
+  fh->recvcsum    = 0x00000000;
+
+  memset(fh->idstring, 0, 32/*sizeof(fh->idstring)*/);
+  memcpy(fh->idstring, "OFT_Windows ICBMFT V1.1 32", 32/*sizeof(fh->idstring)*/);
+  memset(fh->idstring+strlen(fh->idstring), 0, 32-strlen(fh->idstring)); /* jbm hack */ 
+
+  fh->flags       = 0x02;
+  fh->lnameoffset = 0x1a;
+  fh->lsizeoffset = 0x10;
+
+  memset(fh->dummy, 0, 69/*sizeof(fh->dummy)*/);
+  /*  fh->dummy = ;*/
+
+  memset(fh->macfileinfo, 0, 16/*sizeof(fh->macfileinfo)*/);
+  /*  fh->macfileinfo = ; */
+
+  fh->nencode     = 0x0000;
+  fh->nlanguage   = 0x0000;
+
+  memset(fh->name, 0, 64/*sizeof(fh->name)*/);
+  memcpy(fh->name, "listing.txt", 64 /*sizeof(fh->name)*/);
+  memset(fh->name+strlen(fh->name), 0, 64-strlen(fh->name)); /* jbm hack */
+
+  printf("jbm: fh name %s / %s\n", fh->name, (fh->name+(strlen(fh->name))));
+  return fh;
+}
+
+/*
+ * establish: create a listening socket on a port. you need to call
+ * accept() when it's connected.
+ * portnum is the port number to bind to.
+ * returns your fd
+ */
+
+int aim_listenestablish(u_short portnum)
+{
+  int listenfd;
+  const int on = 1;
+  struct addrinfo hints, *res, *ressave;
+  char serv[5];
+  sprintf(serv, "%d", portnum);
+  memset(&hints, 0, sizeof(struct addrinfo));
+  hints.ai_flags = AI_PASSIVE;
+  hints.ai_family = AF_UNSPEC;
+  hints.ai_socktype = SOCK_STREAM;
+  if (getaddrinfo(NULL/*any IP*/, serv, &hints, &res) != 0) {
+    perror("getaddrinfo");
+    return -1;
+  }
+  ressave = res;
+  do {
+    listenfd = socket(res->ai_family, res->ai_socktype, res->ai_protocol);
+    if (listenfd < 0)
+      continue;
+    setsockopt(listenfd, SOL_SOCKET, SO_REUSEADDR, &on, sizeof(on));
+    if (bind(listenfd, res->ai_addr, res->ai_addrlen) == 0)
+      break; /* success */
+    close(listenfd);
+  } while ( (res = res->ai_next) );
+  if (!res)
+    return -1;
+  if (listen(listenfd, 1024)!=0) {
+    perror("listen");
+    return -1;
+  }
+  freeaddrinfo(ressave);
+  return listenfd;
+}
+
+int aim_get_command_rendezvous(struct aim_session_t *sess, struct aim_conn_t *conn)
+{
+
+  /* XXX: NOT THREAD SAFE RIGHT NOW. the locks are acting up. deal. -- jbm */
+
+  unsigned char hdrbuf1[6];
+  unsigned char *hdr = NULL;
+  int hdrlen, hdrtype;
+  int flags = 0;
+  rxcallback_t userfunc = NULL;
+
+
+  memset(hdrbuf1, 0, sizeof(hdrbuf1));
+
+  faim_mutex_lock(&conn->active); /* gets locked down for the entirety */
+
+  if ( (hdrlen = read(conn->fd, hdrbuf1, 6)) < 6) {    
+    if(hdrlen < 0)
+      perror("read");
+    printf("faim: rend: read error (fd: %i) %02x%02x%02x%02x%02x%02x (%i)\n", conn->fd, hdrbuf1[0],hdrbuf1[1],hdrbuf1[0],hdrbuf1[0],hdrbuf1[0],hdrbuf1[0],hdrlen);
+    faim_mutex_unlock(&conn->active);
+    aim_conn_close(conn);
+    return -1;
+  }
+
+  hdrlen = aimutil_get16(hdrbuf1+4);
+
+  hdrlen -= 6;
+  if (!(hdr = malloc(hdrlen)))
+    return -1;
+
+  if (read(conn->fd, hdr, hdrlen) < hdrlen) {
+    perror("read");
+    printf("faim: rend: read2 error\n");
+    free(hdr);
+    faim_mutex_unlock(&conn->active);
+    aim_conn_close(conn);
+    return 0; /* see comment on previous read check */
+  }
+
+  hdrtype = aimutil_get16(hdr);  
+
+  switch (hdrtype) {
+  case 0x0001: { /* directim */
+    int payloadlength = 0;
+    char *snptr = NULL;
+    struct aim_directim_priv *priv;
+    int i;
+
+    priv = (struct aim_directim_priv *)calloc(1, sizeof(struct aim_directim_priv));
+
+    payloadlength = aimutil_get32(hdr+22);
+    flags = aimutil_get16(hdr+32);
+    snptr = hdr+38;
+
+    strncpy(priv->sn, snptr, MAXSNLEN);
+
+#if 0
+    printf("faim: OFT frame: %04x / %04x / %04x / %s\n", hdrtype, payloadlength, flags, snptr); 
+#endif
+
+    if (flags == 0x000e) {
+      faim_mutex_unlock(&conn->active);
+      if ( (userfunc = aim_callhandler(conn, AIM_CB_FAM_OFT, AIM_CB_OFT_DIRECTIMTYPING)) )
+	return userfunc(sess, NULL, snptr);
+    } else if ((flags == 0x0000) && payloadlength) {
+      unsigned char *msg;
+
+      if(! (msg = calloc(1, payloadlength+1)) ) {
+	faim_mutex_unlock(&conn->active);
+	return 0;
+      }
+      
+      if (recv(conn->fd, msg, payloadlength, MSG_WAITALL) < payloadlength) {
+	perror("read");
+	printf("faim: rend: read3 error\n");
+	free(msg);
+	faim_mutex_unlock(&conn->active);
+	aim_conn_close(conn);
+	return -1;
+      }
+      faim_mutex_unlock(&conn->active);
+      msg[payloadlength] = '\0';
+#if 0     
+      printf("faim: directim: %s/%04x/%04x/%s\n", snptr, payloadlength, flags, msg);
+#endif
+
+      if ( (userfunc = aim_callhandler(conn, AIM_CB_FAM_OFT, AIM_CB_OFT_DIRECTIMINCOMING)) )
+	i = userfunc(sess, NULL, conn, snptr, msg);
+      
+      free(msg);
+      return i;
+    }
+    break;
+  } 
+  case 0x1209: { /* get file first */
+    struct aim_filetransfer_priv *ft;
+    struct aim_fileheader_t *fh;
+    struct aim_msgcookie_t *cook;
+
+    int commandlen;
+    char *data;
+
+    printf("faim: rend: fileget 0x1209\n");
+
+    if(hdrlen != 0x100)
+      printf("faim: fileget_command(1209): um. hdrlen != 0x100.. 0x%x\n", hdrlen);
+    
+    if(!(ft = (struct aim_filetransfer_priv *)calloc(1, sizeof(struct aim_filetransfer_priv)))) {
+      printf("faim: couldn't malloc ft. um. bad. bad bad. file transfer will likely fail, sorry.\n");
+      faim_mutex_unlock(&conn->active);
+      return 0;
+    }
+
+    fh = aim_oft_getfh(hdr);
+
+    memcpy(&(ft->fh), fh, sizeof(struct aim_fileheader_t));
+    
+    cook = aim_checkcookie(sess, ft->fh.bcookie, AIM_COOKIETYPE_OFTGET);
+
+    if(cook->data)
+      free(cook->data); /* XXX */
+  
+    cook->data = ft;
+    
+    aim_cachecookie(sess, cook);
+
+    commandlen = 36;
+
+    data = calloc(1, commandlen);
+    memcpy(data, "01/01/1999 00:00      100 file.txt\r\n", commandlen);
+
+    if (write(conn->fd, data, commandlen) != commandlen) {
+      perror("listing write error");
+    }
+    faim_mutex_unlock(&conn->active);
+
+    printf("jbm: hit end of 1209\n");
+
+    break;
+  }
+  case 0x120b: { /* get file second */
+    struct aim_filetransfer_priv *ft;
+    struct aim_msgcookie_t *cook;
+
+    struct aim_fileheader_t *fh;
+
+    printf("faim: rend: fileget 120b\n");
+
+    if(!(ft = (struct aim_filetransfer_priv *)calloc(1, sizeof(struct aim_filetransfer_priv)))) {
+      printf("faim: couldn't malloc ft. um. bad. bad bad. file transfer will likely fail, sorry.\n");
+      faim_mutex_unlock(&conn->active);
+      return 0;
+    }
+
+    if(hdrlen != 0x100)
+      printf("faim: fileget_command(120b): um. hdrlen != 0x100..\n");
+    
+    fh = aim_oft_getfh(hdr);
+
+    memcpy(&(ft->fh), fh, sizeof(struct aim_fileheader_t));
+    
+    cook = aim_checkcookie(sess, ft->fh.bcookie, AIM_COOKIETYPE_OFTGET);
+  
+    if(cook->data)
+      free(cook->data); /* XXX: integrate cookie caching */
+
+    cook->data = ft;
+    
+    aim_cachecookie(sess, cook);
+
+    faim_mutex_unlock(&conn->active);
+    
+    break;
+  }
+  case 0x120c: { /* yet more get file */
+    struct aim_filetransfer_priv *ft;
+    struct aim_msgcookie_t *cook;
+    struct aim_fileheader_t *listingfh;
+    struct command_tx_struct *newoft;
+    int curbyte, i;
+    
+    printf("faim: rend: fileget 120c\n");
+
+    if(!(ft = (struct aim_filetransfer_priv *)calloc(1, sizeof(struct aim_filetransfer_priv)))) {
+      printf("faim: couldn't malloc ft. um. bad. bad bad. file transfer will likely fail, sorry.\n");
+      faim_mutex_unlock(&conn->active);
+      return 0;
+    }
+
+    if(hdrlen != 0x100)
+      printf("faim: fileget_command(120c): um. hdrlen != 0x100..\n");
+
+    listingfh = aim_oft_getfh((char *)hdr);
+
+    memcpy(&(ft->fh), listingfh, sizeof(struct aim_fileheader_t));
+    
+    cook = aim_checkcookie(sess, ft->fh.bcookie, AIM_COOKIETYPE_OFTGET);
+  
+    if(cook->data)
+      free(cook->data); /* XXX */
+
+    cook->data = ft;
+    
+    aim_cachecookie(sess, cook);
+
+    faim_mutex_unlock(&conn->active);
+
+    printf("faim: fileget: %s seems to want %s\n", ft->sn, ft->fh.name);
+ 
+    if(!(newoft = aim_tx_new(AIM_FRAMETYPE_OFT, 0x0101, conn, 0/*listingfh->size*/))) {
+      printf("faim: send_final_transfer: tx_new OFT failed\n");
+      return 0;
+    }
+    
+    /* XXX: actually implement Real Handling of all this */
+
+    printf("jbm: listingfh->size: 0x%lx\n", listingfh->size);
+
+    newoft->lock = 1;
+
+    /*    if(!(newoft->data = calloc(1, listingfh->size))) {
+      printf("newoft data malloc failed. bombing.\n");
+      return 0;
+      }*/
+
+    if(newoft->commandlen > 0) {
+      int i;
+      bzero(newoft->data, newoft->commandlen);
+      for(i = 0; i < newoft->commandlen; i++)
+	newoft->data[i] = 0x30 + (i%10);
+
+      //      memcpy(newoft->data, "This has been a Test\r\n-josh\r\n", newoft->commandlen);
+    }
+
+    memcpy(newoft->hdr.oft.magic, "OFT2", 4);
+    newoft->hdr.oft.hdr2len = 0xf8; /* 0x100 - 8 */
+    
+    if (!(newoft->hdr.oft.hdr2 = calloc(1,newoft->hdr.oft.hdr2len))) {
+      if(newoft->data)
+	free(newoft->data); /* XXX: make this into a destructor function */
+      free(newoft);
+      return 0;
+    }  
+
+    memcpy(listingfh->bcookie, ft->fh.bcookie, 8);
+
+    curbyte = 0;
+    
+    for(i = 0; i < 8; i++)
+      curbyte += aimutil_put8(newoft->hdr.oft.hdr2+curbyte, listingfh->bcookie[i]);
+    curbyte += aimutil_put16(newoft->hdr.oft.hdr2+curbyte, listingfh->encrypt);
+    curbyte += aimutil_put16(newoft->hdr.oft.hdr2+curbyte, listingfh->compress);
+    curbyte += aimutil_put16(newoft->hdr.oft.hdr2+curbyte, listingfh->totfiles);
+    curbyte += aimutil_put16(newoft->hdr.oft.hdr2+curbyte, listingfh->filesleft);
+    curbyte += aimutil_put16(newoft->hdr.oft.hdr2+curbyte, listingfh->totparts);
+    curbyte += aimutil_put16(newoft->hdr.oft.hdr2+curbyte, listingfh->partsleft);
+    curbyte += aimutil_put32(newoft->hdr.oft.hdr2+curbyte, listingfh->totsize);
+    curbyte += aimutil_put32(newoft->hdr.oft.hdr2+curbyte, listingfh->size);
+    curbyte += aimutil_put32(newoft->hdr.oft.hdr2+curbyte, listingfh->modtime);
+    curbyte += aimutil_put32(newoft->hdr.oft.hdr2+curbyte, listingfh->checksum);
+    curbyte += aimutil_put32(newoft->hdr.oft.hdr2+curbyte, listingfh->rfrcsum);
+    curbyte += aimutil_put32(newoft->hdr.oft.hdr2+curbyte, listingfh->rfsize);
+    curbyte += aimutil_put32(newoft->hdr.oft.hdr2+curbyte, listingfh->cretime);
+    curbyte += aimutil_put32(newoft->hdr.oft.hdr2+curbyte, listingfh->rfcsum);
+    curbyte += aimutil_put32(newoft->hdr.oft.hdr2+curbyte, 0 /*listingfh->nrecvd*/);
+    curbyte += aimutil_put32(newoft->hdr.oft.hdr2+curbyte, 0/*listingfh->recvcsum*/);
+
+    strncpy(newoft->hdr.oft.hdr2+curbyte, listingfh->idstring, 32);
+    curbyte += 32;
+
+    curbyte += aimutil_put8(newoft->hdr.oft.hdr2+curbyte, 0x20 /*listingfh->flags */);
+    curbyte += aimutil_put8(newoft->hdr.oft.hdr2+curbyte, listingfh->lnameoffset);
+    curbyte += aimutil_put8(newoft->hdr.oft.hdr2+curbyte, listingfh->lsizeoffset);
+
+    memcpy(newoft->hdr.oft.hdr2+curbyte, listingfh->dummy, 69);
+    curbyte += 69;
+    
+    memcpy(newoft->hdr.oft.hdr2+curbyte, listingfh->macfileinfo, 16);
+    curbyte += 16;
+
+    curbyte += aimutil_put16(newoft->hdr.oft.hdr2+curbyte, listingfh->nencode);
+    curbyte += aimutil_put16(newoft->hdr.oft.hdr2+curbyte, listingfh->nlanguage);
+
+    strncpy(newoft->hdr.oft.hdr2+curbyte, listingfh->name, 64);
+    curbyte += 64;
+
+    free(listingfh);
+
+    newoft->lock = 0;
+    aim_tx_enqueue(sess, newoft);
+    printf("jbm: OFT listing enqueued.\n");
+
+    break;
+  }
+  case 0x0202: { /* get file: ready to recieve data */
+    char *c;
+    int i;
+
+    struct aim_fileheader_t *fh;    
+    fh = aim_oft_getfh((char *)hdr);
+
+    c = (char *)calloc(1, fh->size);
+
+    printf("looks like we're ready to send data.(oft 0x0202)\n");
+
+
+    
+    for(i = 0; i < fh->size; i++)
+      c[i] = 0x30 + (i%10);
+
+    if ( (i = write(conn->fd, c, fh->size)) != fh->size ) {
+      printf("whoopsy, didn't write it all...\n");
+    }
+
+    faim_mutex_unlock(&conn->active);
+
+    break;
+  }
+  case 0x0204: { /* get file: finished. close it up */
+    printf("looks like we're done with a transfer (oft 0x0204)\n");
+    faim_mutex_unlock(&conn->active);
+    aim_conn_close(conn);
+    break;
+  }
+  default: {
+    printf("OFT frame: type %04x\n", hdrtype);  
+    /* data connection may be unreliable here */
+    faim_mutex_unlock(&conn->active);
+    break;
+  }
+  } /* switch */
+
+  free(hdr);
+  
+  return 0;
+}
+
+/*
+ * this currently feeds totally bogus data
+ */
+
+struct aim_fileheader_t *aim_oft_getfh(char *hdr) 
+{
+  struct aim_fileheader_t *fh;
+  int i, j;
+
+  if(!(fh = calloc(1, sizeof(struct aim_fileheader_t))))
+    return NULL;
+
+  /* [0] and [1] are the type. we can ignore those here. */
+
+  i = 2;
+
+  for(j = 0; j < 8; j++, i++)
+    fh->bcookie[j] = hdr[i];
+  fh->encrypt = aimutil_get16(hdr+i);
+  i += 2;
+  fh->compress = aimutil_get16(hdr+i);
+  i += 2;
+  fh->totfiles = aimutil_get16(hdr+i);
+  i += 2;
+  fh->filesleft = aimutil_get16(hdr+i);
+  i += 2;
+  fh->totparts = aimutil_get16(hdr+i);
+  i += 2;
+  fh->partsleft = aimutil_get16(hdr+i);
+  i += 2;
+  fh->totsize = aimutil_get32(hdr+i);
+  i += 4;
+  fh->size = aimutil_get32(hdr+i);
+  i += 4;
+  fh->modtime = aimutil_get32(hdr+i);
+  i += 4;
+  fh->checksum = aimutil_get32(hdr+i);
+  i += 4;
+  fh->rfrcsum = aimutil_get32(hdr+i);
+  i += 4;
+  fh->rfsize = aimutil_get32(hdr+i);
+  i += 4;
+  fh->cretime = aimutil_get32(hdr+i);
+  i += 4;
+  fh->rfcsum = aimutil_get32(hdr+i);
+  i += 4;
+  fh->nrecvd = aimutil_get32(hdr+i);
+  i += 4;
+  fh->recvcsum = aimutil_get32(hdr+i);
+  i += 4;
+
+  memcpy(fh->idstring, hdr+i, 32);
+  i += 32;
+
+  fh->flags = aimutil_get8(hdr+i);
+  i += 1;
+  fh->lnameoffset = aimutil_get8(hdr+i);
+  i += 1;
+  fh->lsizeoffset = aimutil_get8(hdr+i);
+  i += 1;
+
+  memcpy(fh->dummy, hdr+i, 69);
+  i += 69;
+
+  memcpy(fh->macfileinfo, hdr+i, 16);
+  i += 16;
+
+  fh->nencode = aimutil_get16(hdr+i);
+  i += 2;
+  fh->nlanguage = aimutil_get16(hdr+i);
+  i += 2;
+
+  memcpy(fh->name, hdr+i, 64);
+  i += 64;
+
+  return fh;
+}