Mercurial > pidgin
view libfaim/aim_auth.c @ 42:f22855014b5d
[gaim-migrate @ 51]
Mistakes are alright as long as I fix them, right?
committer: Tailor Script <tailor@pidgin.im>
author | Eric Warmenhoven <eric@warmenhoven.org> |
---|---|
date | Sat, 25 Mar 2000 17:36:14 +0000 |
parents | 68b230f8da5f |
children | 6ced2f1c8b24 |
line wrap: on
line source
/* aim_auth.c Deals with the authorizer. */ #include "aim.h" /* this just pushes the passed cookie onto the passed connection -- NO SNAC! */ int aim_auth_sendcookie(struct aim_conn_t *conn, char *chipsahoy) { struct command_tx_struct newpacket; int curbyte=0; newpacket.lock = 1; if (conn==NULL) newpacket.conn = aim_getconn_type(AIM_CONN_TYPE_AUTH); else newpacket.conn = conn; newpacket.type = 0x0001; /* channel 1 (no SNACs, you know) */ newpacket.commandlen = 4 + 2 + 2 + 0x100; newpacket.data = (char *) calloc(1, newpacket.commandlen); curbyte += aimutil_put16(newpacket.data+curbyte, 0x0000); curbyte += aimutil_put16(newpacket.data+curbyte, 0x0001); curbyte += aimutil_put16(newpacket.data+curbyte, 0x0006); curbyte += aimutil_put16(newpacket.data+curbyte, 0x0100); memcpy(&(newpacket.data[curbyte]), chipsahoy, 0x100); aim_tx_enqueue(&newpacket); return 0; } u_long aim_auth_clientready(struct aim_conn_t *conn) { struct command_tx_struct newpacket; int curbyte = 0; newpacket.lock = 1; if (conn==NULL) newpacket.conn = aim_getconn_type(AIM_CONN_TYPE_AUTH); else newpacket.conn = conn; newpacket.type = 0x0002; newpacket.commandlen = 26; newpacket.data = (char *) malloc(newpacket.commandlen); curbyte += aim_putsnac(newpacket.data+curbyte, 0x0001, 0x0002, 0x0000, aim_snac_nextid); curbyte += aimutil_put16(newpacket.data+curbyte, 0x0001); curbyte += aimutil_put16(newpacket.data+curbyte, 0x0002); curbyte += aimutil_put16(newpacket.data+curbyte, 0x0001); curbyte += aimutil_put16(newpacket.data+curbyte, 0x0013); curbyte += aimutil_put16(newpacket.data+curbyte, 0x0007); curbyte += aimutil_put16(newpacket.data+curbyte, 0x0001); curbyte += aimutil_put16(newpacket.data+curbyte, 0x0001); curbyte += aimutil_put16(newpacket.data+curbyte, 0x0001); aim_tx_enqueue(&newpacket); { struct aim_snac_t snac; snac.id = aim_snac_nextid; snac.family = 0x0001; snac.type = 0x0004; snac.flags = 0x0000; snac.data = NULL; aim_newsnac(&snac); } return (aim_snac_nextid++); } u_long aim_auth_changepasswd(struct aim_conn_t *conn, char *new, char *current) { struct command_tx_struct newpacket; int i; newpacket.lock = 1; if (conn==NULL) newpacket.conn = aim_getconn_type(AIM_CONN_TYPE_AUTH); else newpacket.conn = conn; newpacket.type = 0x0002; newpacket.commandlen = 10 + 4 + strlen(current) + 4 + strlen(new); newpacket.data = (char *) malloc(newpacket.commandlen); newpacket.data[0] = 0x00; newpacket.data[1] = 0x07; newpacket.data[2] = 0x00; newpacket.data[3] = 0x04; newpacket.data[4] = 0x00; newpacket.data[5] = 0x00; /* SNAC reqid */ newpacket.data[6] = (aim_snac_nextid >> 24) & 0xFF; newpacket.data[7] = (aim_snac_nextid >> 16) & 0xFF; newpacket.data[8] = (aim_snac_nextid >> 8) & 0xFF; newpacket.data[9] = (aim_snac_nextid) & 0xFF; /* current password TLV t(0002) */ i = 10; newpacket.data[i++] = 0x00; newpacket.data[i++] = 0x02; newpacket.data[i++] = 0x00; newpacket.data[i++] = strlen(current) & 0xff; memcpy(&(newpacket.data[i]), current, strlen(current)); i += strlen(current); /* new password TLV t(0012) */ newpacket.data[i++] = 0x00; newpacket.data[i++] = 0x12; newpacket.data[i++] = 0x00; newpacket.data[i++] = strlen(new) & 0xff; memcpy(&(newpacket.data[i]), new, strlen(new)); i+=strlen(new); aim_tx_enqueue(&newpacket); { struct aim_snac_t snac; snac.id = aim_snac_nextid; snac.family = 0x0001; snac.type = 0x0004; snac.flags = 0x0000; snac.data = NULL; aim_newsnac(&snac); } return (aim_snac_nextid++); }