16 #include <sys/types.h>
23 #include <sys/socket.h>
24 #include <arpa/inet.h>
25 #include <netinet/in.h>
29 #ifdef THREADED_CLIENT
33 #include "citadel_ipc.h"
34 #include "citadel_decls.h"
37 #ifdef THREADED_CLIENT
38 pthread_mutex_t rwlock;
42 static SSL_CTX *ssl_ctx;
45 #ifdef THREADED_CLIENT
46 pthread_mutex_t **Critters; /* Things that need locking */
47 #endif /* THREADED_CLIENT */
49 #endif /* HAVE_OPENSSL */
52 #define INADDR_NONE 0xffffffff
55 static void (*status_hook)(char *s) = NULL;
57 void setCryptoStatusHook(void (*hook)(char *s)) {
61 void CtdlIPC_SetNetworkStatusCallback(CtdlIPC *ipc, void (*hook)(int state)) {
62 ipc->network_status_cb = hook;
66 char express_msgs = 0;
69 static void serv_read(CtdlIPC *ipc, char *buf, unsigned int bytes);
70 static void serv_write(CtdlIPC *ipc, const char *buf, unsigned int nbytes);
72 static void serv_read_ssl(CtdlIPC *ipc, char *buf, unsigned int bytes);
73 static void serv_write_ssl(CtdlIPC *ipc, const char *buf, unsigned int nbytes);
74 static void ssl_lock(int mode, int n, const char *file, int line);
75 static void endtls(SSL *ssl);
76 #ifdef THREADED_CLIENT
77 static unsigned long id_callback(void);
78 #endif /* THREADED_CLIENT */
79 #endif /* HAVE_OPENSSL */
83 * Does nothing. The server should always return 200.
85 int CtdlIPCNoop(CtdlIPC *ipc)
89 return CtdlIPCGenericCommand(ipc, "NOOP", NULL, 0, NULL, NULL, aaa);
94 * Does nothing interesting. The server should always return 200
95 * along with your string.
97 int CtdlIPCEcho(CtdlIPC *ipc, const char *arg, char *cret)
103 if (!cret) return -2;
105 aaa = (char *)malloc((size_t)(strlen(arg) + 6));
108 sprintf(aaa, "ECHO %s", arg);
109 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
116 * Asks the server to close the connecction.
117 * Should always return 200.
119 int CtdlIPCQuit(CtdlIPC *ipc)
125 CtdlIPC_putline(ipc, "QUIT");
126 CtdlIPC_getline(ipc, aaa);
134 * Asks the server to logout. Should always return 200, even if no user
135 * was logged in. The user will not be logged in after this!
137 int CtdlIPCLogout(CtdlIPC *ipc)
143 CtdlIPC_putline(ipc, "LOUT");
144 CtdlIPC_getline(ipc, aaa);
152 * First stage of authentication - pass the username. Returns 300 if the
153 * username is able to log in, with the username correctly spelled in cret.
154 * Returns various 500 error codes if the user doesn't exist, etc.
156 int CtdlIPCTryLogin(CtdlIPC *ipc, const char *username, char *cret)
161 if (!username) return -2;
162 if (!cret) return -2;
164 aaa = (char *)malloc((size_t)(strlen(username) + 6));
167 sprintf(aaa, "USER %s", username);
168 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
175 * Second stage of authentication - provide password. The server returns
176 * 200 and several arguments in cret relating to the user's account.
178 int CtdlIPCTryPassword(CtdlIPC *ipc, const char *passwd, char *cret)
183 if (!passwd) return -2;
184 if (!cret) return -2;
186 aaa = (char *)malloc((size_t)(strlen(passwd) + 6));
189 sprintf(aaa, "PASS %s", passwd);
190 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
197 * Second stage of authentication - provide password. The server returns
198 * 200 and several arguments in cret relating to the user's account.
200 int CtdlIPCTryApopPassword(CtdlIPC *ipc, const char *response, char *cret)
205 if (!response) return -2;
206 if (!cret) return -2;
208 aaa = (char *)malloc((size_t)(strlen(response) + 6));
211 sprintf(aaa, "PAS2 %s", response);
212 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
219 * Create a new user. This returns 200 plus the same arguments as TryPassword
220 * if selfservice is nonzero, unless there was a problem creating the account.
221 * If selfservice is zero, creates a new user but does not log out the existing
222 * user - intended for use by system administrators to create accounts on
223 * behalf of other users.
225 int CtdlIPCCreateUser(CtdlIPC *ipc, const char *username, int selfservice, char *cret)
230 if (!username) return -2;
231 if (!cret) return -2;
233 aaa = (char *)malloc((size_t)(strlen(username) + 6));
236 sprintf(aaa, "%s %s", selfservice ? "NEWU" : "CREU", username);
237 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
244 * Changes the user's password. Returns 200 if changed, errors otherwise.
246 int CtdlIPCChangePassword(CtdlIPC *ipc, const char *passwd, char *cret)
251 if (!passwd) return -2;
252 if (!cret) return -2;
254 aaa = (char *)malloc((size_t)(strlen(passwd) + 6));
257 sprintf(aaa, "SETP %s", passwd);
258 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
265 /* Caller must free the march list */
266 /* Room types are defined in enum RoomList; keep these in sync! */
267 /* floor is -1 for all, or floornum */
268 int CtdlIPCKnownRooms(CtdlIPC *ipc, enum RoomList which, int floor, struct march **listing, char *cret)
271 struct march *march = NULL;
272 static char *proto[] =
273 {"LKRA", "LKRN", "LKRO", "LZRM", "LRMS", "LPRM" };
278 if (!listing) return -2;
279 if (*listing) return -2; /* Free the listing first */
280 if (!cret) return -2;
281 /* if (which < 0 || which > 4) return -2; */
282 if (floor < -1) return -2; /* Can't validate upper bound, sorry */
284 sprintf(aaa, "%s %d", proto[which], floor);
285 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, &bbb, &bbbsize, cret);
286 if (ret / 100 == 1) {
289 while (bbb && strlen(bbb)) {
292 extract_token(aaa, bbb, 0, '\n');
294 memmove(bbb, bbb + a + 1, strlen(bbb) - a);
295 mptr = (struct march *) malloc(sizeof (struct march));
298 extract(mptr->march_name, aaa, 0);
299 mptr->march_flags = (unsigned int) extract_int(aaa, 1);
300 mptr->march_floor = (char) extract_int(aaa, 2);
301 mptr->march_order = (char) extract_int(aaa, 3);
302 mptr->march_flags2 = (unsigned int) extract_int(aaa, 4);
303 mptr->march_access = (char) extract_int(aaa, 5);
310 while (mptr2->next != NULL)
323 /* Caller must free the struct ctdluser; caller may pass an existing one */
324 int CtdlIPCGetConfig(CtdlIPC *ipc, struct ctdluser **uret, char *cret)
328 if (!cret) return -2;
329 if (!uret) return -2;
330 if (!*uret) *uret = (struct ctdluser *)calloc(1, sizeof (struct ctdluser));
331 if (!*uret) return -1;
333 ret = CtdlIPCGenericCommand(ipc, "GETU", NULL, 0, NULL, NULL, cret);
334 if (ret / 100 == 2) {
335 uret[0]->USscreenwidth = extract_int(cret, 0);
336 uret[0]->USscreenheight = extract_int(cret, 1);
337 uret[0]->flags = extract_int(cret, 2);
344 int CtdlIPCSetConfig(CtdlIPC *ipc, struct ctdluser *uret, char *cret)
348 if (!uret) return -2;
349 if (!cret) return -2;
351 sprintf(aaa, "SETU %d|%d|%d",
352 uret->USscreenwidth, uret->USscreenheight,
354 return CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
359 int CtdlIPCGotoRoom(CtdlIPC *ipc, const char *room, const char *passwd,
360 struct ctdlipcroom **rret, char *cret)
365 if (!cret) return -2;
366 if (!rret) return -2;
367 if (!*rret) *rret = (struct ctdlipcroom *)calloc(1, sizeof (struct ctdlipcroom));
368 if (!*rret) return -1;
371 aaa = (char *)malloc(strlen(room) + strlen(passwd) + 7);
376 sprintf(aaa, "GOTO %s|%s", room, passwd);
378 aaa = (char *)malloc(strlen(room) + 6);
383 sprintf(aaa, "GOTO %s", room);
385 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
386 if (ret / 100 == 2) {
387 extract(rret[0]->RRname, cret, 0);
388 rret[0]->RRunread = extract_long(cret, 1);
389 rret[0]->RRtotal = extract_long(cret, 2);
390 rret[0]->RRinfoupdated = extract_int(cret, 3);
391 rret[0]->RRflags = extract_int(cret, 4);
392 rret[0]->RRhighest = extract_long(cret, 5);
393 rret[0]->RRlastread = extract_long(cret, 6);
394 rret[0]->RRismailbox = extract_int(cret, 7);
395 rret[0]->RRaide = extract_int(cret, 8);
396 rret[0]->RRnewmail = extract_long(cret, 9);
397 rret[0]->RRfloor = extract_int(cret, 10);
406 /* which is 0 = all, 1 = old, 2 = new, 3 = last, 4 = first, 5 = gt, 6 = lt */
407 /* whicharg is number of messages, applies to last, first, gt, lt */
408 int CtdlIPCGetMessages(CtdlIPC *ipc, enum MessageList which, int whicharg,
409 const char *mtemplate, unsigned long **mret, char *cret)
412 register unsigned long count = 0;
413 static char *proto[] =
414 { "ALL", "OLD", "NEW", "LAST", "FIRST", "GT", "LT" };
419 if (!cret) return -2;
420 if (!mret) return -2;
421 if (*mret) return -2;
422 if (which < 0 || which > 6) return -2;
425 sprintf(aaa, "MSGS %s||%d", proto[which],
426 (mtemplate) ? 1 : 0);
428 sprintf(aaa, "MSGS %s|%d|%d", proto[which], whicharg,
429 (mtemplate) ? 1 : 0);
430 if (mtemplate) count = strlen(mtemplate);
431 ret = CtdlIPCGenericCommand(ipc, aaa, mtemplate, count, &bbb, &bbbsize, cret);
435 *mret = (unsigned long *)calloc(1, sizeof(unsigned long));
438 while (bbb && strlen(bbb)) {
439 extract_token(aaa, bbb, 0, '\n');
440 remove_token(bbb, 0, '\n');
441 *mret = (unsigned long *)realloc(*mret, (size_t)((count + 2) *
442 sizeof (unsigned long)));
444 (*mret)[count++] = atol(aaa);
456 int CtdlIPCGetSingleMessage(CtdlIPC *ipc, long msgnum, int headers, int as_mime,
457 struct ctdlipcmessage **mret, char *cret)
463 int multipart_hunting = 0;
464 char multipart_prefix[SIZ];
466 if (!cret) return -1;
467 if (!mret) return -1;
468 if (!*mret) *mret = (struct ctdlipcmessage *)calloc(1, sizeof (struct ctdlipcmessage));
469 if (!*mret) return -1;
470 if (!msgnum) return -1;
472 strcpy(mret[0]->content_type, "");
473 sprintf(aaa, "MSG%d %ld|%d", as_mime, msgnum, headers);
474 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, &bbb, &bbbsize, cret);
475 if (ret / 100 == 1) {
477 strcpy(mret[0]->mime_chosen, "1"); /* Default chosen-part is "1" */
478 while (strlen(bbb) > 4 && bbb[4] == '=') {
479 extract_token(aaa, bbb, 0, '\n');
480 remove_token(bbb, 0, '\n');
482 if (!strncasecmp(aaa, "nhdr=yes", 8))
484 else if (!strncasecmp(aaa, "from=", 5))
485 safestrncpy(mret[0]->author, &aaa[5], SIZ);
486 else if (!strncasecmp(aaa, "type=", 5))
487 mret[0]->type = atoi(&aaa[5]);
488 else if (!strncasecmp(aaa, "msgn=", 5))
489 safestrncpy(mret[0]->msgid, &aaa[5], SIZ);
490 else if (!strncasecmp(aaa, "subj=", 5))
491 safestrncpy(mret[0]->subject, &aaa[5], SIZ);
492 else if (!strncasecmp(aaa, "rfca=", 5))
493 safestrncpy(mret[0]->email, &aaa[5], SIZ);
494 else if (!strncasecmp(aaa, "hnod=", 5))
495 safestrncpy(mret[0]->hnod, &aaa[5], SIZ);
496 else if (!strncasecmp(aaa, "room=", 5))
497 safestrncpy(mret[0]->room, &aaa[5], SIZ);
498 else if (!strncasecmp(aaa, "node=", 5))
499 safestrncpy(mret[0]->node, &aaa[5], SIZ);
500 else if (!strncasecmp(aaa, "rcpt=", 5))
501 safestrncpy(mret[0]->recipient, &aaa[5], SIZ);
502 else if (!strncasecmp(aaa, "time=", 5))
503 mret[0]->time = atol(&aaa[5]);
505 /* Multipart/alternative prefix & suffix strings help
506 * us to determine which part we want to download.
508 else if (!strncasecmp(aaa, "pref=", 5)) {
509 extract(multipart_prefix, &aaa[5], 1);
510 if (!strcasecmp(multipart_prefix,
511 "multipart/alternative")) {
515 else if (!strncasecmp(aaa, "suff=", 5)) {
516 extract(multipart_prefix, &aaa[5], 1);
517 if (!strcasecmp(multipart_prefix,
518 "multipart/alternative")) {
523 else if (!strncasecmp(aaa, "part=", 5)) {
524 struct parts *ptr, *chain;
526 ptr = (struct parts *)calloc(1, sizeof (struct parts));
529 /* Fill the buffers for the caller */
530 extract(ptr->name, &aaa[5], 0);
531 extract(ptr->filename, &aaa[5], 1);
532 extract(ptr->number, &aaa[5], 2);
533 extract(ptr->disposition, &aaa[5], 3);
534 extract(ptr->mimetype, &aaa[5], 4);
535 ptr->length = extract_long(&aaa[5], 5);
536 if (!mret[0]->attachments)
537 mret[0]->attachments = ptr;
539 chain = mret[0]->attachments;
545 /* Now handle multipart/alternative */
546 if (multipart_hunting > 0) {
547 if ( (!strcasecmp(ptr->mimetype,
549 || (!strcasecmp(ptr->mimetype,
551 strcpy(mret[0]->mime_chosen,
559 /* Eliminate "text\n" */
560 remove_token(bbb, 0, '\n');
562 /* If doing a MIME thing, pull out the extra headers */
565 if (!strncasecmp(bbb, "Content-type: ", 14)) {
566 extract_token(mret[0]->content_type, bbb, 0, '\n');
567 strcpy(mret[0]->content_type,
568 &mret[0]->content_type[14]);
569 striplt(mret[0]->content_type);
571 remove_token(bbb, 0, '\n');
572 } while ((bbb[0] != 0) && (bbb[0] != '\n'));
573 remove_token(bbb, 0, '\n');
579 /* FIXME: Strip trailing whitespace */
580 bbb = (char *)realloc(bbb, (size_t)(strlen(bbb) + 1));
582 bbb = (char *)realloc(bbb, 1);
592 int CtdlIPCWhoKnowsRoom(CtdlIPC *ipc, char **listing, char *cret)
597 if (!cret) return -2;
598 if (!listing) return -2;
599 if (*listing) return -2;
601 ret = CtdlIPCGenericCommand(ipc, "WHOK", NULL, 0, listing, &bytes, cret);
607 int CtdlIPCServerInfo(CtdlIPC *ipc, char *cret)
611 char *listing = NULL;
614 if (!cret) return -2;
616 ret = CtdlIPCGenericCommand(ipc, "INFO", NULL, 0, &listing, &bytes, cret);
617 if (ret / 100 == 1) {
620 while (*listing && strlen(listing)) {
621 extract_token(buf, listing, 0, '\n');
622 remove_token(listing, 0, '\n');
624 case 0: ipc->ServInfo.pid = atoi(buf);
626 case 1: strcpy(ipc->ServInfo.nodename,buf);
628 case 2: strcpy(ipc->ServInfo.humannode,buf);
630 case 3: strcpy(ipc->ServInfo.fqdn,buf);
632 case 4: strcpy(ipc->ServInfo.software,buf);
634 case 5: ipc->ServInfo.rev_level = atoi(buf);
636 case 6: strcpy(ipc->ServInfo.bbs_city,buf);
638 case 7: strcpy(ipc->ServInfo.sysadm,buf);
640 case 9: strcpy(ipc->ServInfo.moreprompt,buf);
642 case 10: ipc->ServInfo.ok_floors = atoi(buf);
644 case 11: ipc->ServInfo.paging_level = atoi(buf);
646 case 13: ipc->ServInfo.supports_qnop = atoi(buf);
648 case 14: ipc->ServInfo.supports_ldap = atoi(buf);
659 int CtdlIPCReadDirectory(CtdlIPC *ipc, char **listing, char *cret)
664 if (!cret) return -2;
665 if (!listing) return -2;
666 if (*listing) return -2;
668 ret = CtdlIPCGenericCommand(ipc, "RDIR", NULL, 0, listing, &bytes, cret);
674 * Set last-read pointer in this room to msgnum, or 0 for HIGHEST.
676 int CtdlIPCSetLastRead(CtdlIPC *ipc, long msgnum, char *cret)
681 if (!cret) return -2;
684 sprintf(aaa, "SLRP %ld", msgnum);
687 sprintf(aaa, "SLRP HIGHEST");
689 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
695 int CtdlIPCInviteUserToRoom(CtdlIPC *ipc, const char *username, char *cret)
700 if (!cret) return -2;
701 if (!username) return -2;
703 aaa = (char *)malloc(strlen(username) + 6);
706 sprintf(aaa, "INVT %s", username);
707 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
714 int CtdlIPCKickoutUserFromRoom(CtdlIPC *ipc, const char *username, char *cret)
719 if (!cret) return -1;
720 if (!username) return -1;
722 aaa = (char *)malloc(strlen(username) + 6);
724 sprintf(aaa, "KICK %s", username);
725 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
732 int CtdlIPCGetRoomAttributes(CtdlIPC *ipc, struct ctdlroom **qret, char *cret)
736 if (!cret) return -2;
737 if (!qret) return -2;
738 if (!*qret) *qret = (struct ctdlroom *)calloc(1, sizeof (struct ctdlroom));
739 if (!*qret) return -1;
741 ret = CtdlIPCGenericCommand(ipc, "GETR", NULL, 0, NULL, NULL, cret);
742 if (ret / 100 == 2) {
743 extract(qret[0]->QRname, cret, 0);
744 extract(qret[0]->QRpasswd, cret, 1);
745 extract(qret[0]->QRdirname, cret, 2);
746 qret[0]->QRflags = extract_int(cret, 3);
747 qret[0]->QRfloor = extract_int(cret, 4);
748 qret[0]->QRorder = extract_int(cret, 5);
749 qret[0]->QRdefaultview = extract_int(cret, 6);
750 qret[0]->QRflags2 = extract_int(cret, 7);
757 /* set forget to kick all users out of room */
758 int CtdlIPCSetRoomAttributes(CtdlIPC *ipc, int forget, struct ctdlroom *qret, char *cret)
763 if (!cret) return -2;
764 if (!qret) return -2;
766 aaa = (char *)malloc(strlen(qret->QRname) + strlen(qret->QRpasswd) +
767 strlen(qret->QRdirname) + 52);
770 sprintf(aaa, "SETR %s|%s|%s|%d|%d|%d|%d",
771 qret->QRname, qret->QRpasswd, qret->QRdirname,
772 qret->QRflags, forget, qret->QRfloor, qret->QRorder);
773 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
780 int CtdlIPCGetRoomAide(CtdlIPC *ipc, char *cret)
782 if (!cret) return -1;
784 return CtdlIPCGenericCommand(ipc, "GETA", NULL, 0, NULL, NULL, cret);
789 int CtdlIPCSetRoomAide(CtdlIPC *ipc, const char *username, char *cret)
794 if (!cret) return -2;
795 if (!username) return -2;
797 aaa = (char *)malloc(strlen(username) + 6);
800 sprintf(aaa, "SETA %s", username);
801 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
808 int CtdlIPCPostMessage(CtdlIPC *ipc, int flag, const struct ctdlipcmessage *mr, char *cret)
813 if (!cret) return -2;
816 snprintf(cmd, sizeof cmd,
817 "ENT0 %d|%s|%d|%d|%s|%s", flag, mr->recipient,
818 mr->anonymous, mr->type, mr->subject, mr->author);
819 ret = CtdlIPCGenericCommand(ipc, cmd, mr->text, strlen(mr->text), NULL,
826 int CtdlIPCRoomInfo(CtdlIPC *ipc, char **iret, char *cret)
830 if (!cret) return -2;
831 if (!iret) return -2;
832 if (*iret) return -2;
834 return CtdlIPCGenericCommand(ipc, "RINF", NULL, 0, iret, &bytes, cret);
839 int CtdlIPCDeleteMessage(CtdlIPC *ipc, long msgnum, char *cret)
843 if (!cret) return -2;
844 if (!msgnum) return -2;
846 sprintf(aaa, "DELE %ld", msgnum);
847 return CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
852 int CtdlIPCMoveMessage(CtdlIPC *ipc, int copy, long msgnum, const char *destroom, char *cret)
857 if (!cret) return -2;
858 if (!destroom) return -2;
859 if (!msgnum) return -2;
861 aaa = (char *)malloc(strlen(destroom) + 28);
864 sprintf(aaa, "MOVE %ld|%s|%d", msgnum, destroom, copy);
865 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
872 int CtdlIPCDeleteRoom(CtdlIPC *ipc, int for_real, char *cret)
876 if (!cret) return -2;
878 sprintf(aaa, "KILL %d", for_real);
879 return CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
884 int CtdlIPCCreateRoom(CtdlIPC *ipc, int for_real, const char *roomname, int type,
885 const char *password, int floor, char *cret)
890 if (!cret) return -2;
891 if (!roomname) return -2;
894 aaa = (char *)malloc(strlen(roomname) + strlen(password) + 40);
896 sprintf(aaa, "CRE8 %d|%s|%d|%s|%d", for_real, roomname, type,
899 aaa = (char *)malloc(strlen(roomname) + 40);
901 sprintf(aaa, "CRE8 %d|%s|%d||%d", for_real, roomname, type,
904 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
911 int CtdlIPCForgetRoom(CtdlIPC *ipc, char *cret)
913 if (!cret) return -2;
915 return CtdlIPCGenericCommand(ipc, "FORG", NULL, 0, NULL, NULL, cret);
920 int CtdlIPCSystemMessage(CtdlIPC *ipc, const char *message, char **mret, char *cret)
926 if (!cret) return -2;
927 if (!mret) return -2;
928 if (*mret) return -2;
929 if (!message) return -2;
931 aaa = (char *)malloc(strlen(message) + 6);
934 sprintf(aaa, "MESG %s", message);
935 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, mret, &bytes, cret);
942 int CtdlIPCNextUnvalidatedUser(CtdlIPC *ipc, char *cret)
944 if (!cret) return -2;
946 return CtdlIPCGenericCommand(ipc, "GNUR", NULL, 0, NULL, NULL, cret);
951 int CtdlIPCGetUserRegistration(CtdlIPC *ipc, const char *username, char **rret, char *cret)
957 if (!cret) return -2;
958 if (!rret) return -2;
959 if (*rret) return -2;
962 aaa = (char *)malloc(strlen(username) + 6);
964 aaa = (char *)malloc(12);
968 sprintf(aaa, "GREG %s", username);
970 sprintf(aaa, "GREG _SELF_");
971 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, rret, &bytes, cret);
978 int CtdlIPCValidateUser(CtdlIPC *ipc, const char *username, int axlevel, char *cret)
983 if (!cret) return -2;
984 if (!username) return -2;
985 if (axlevel < 0 || axlevel > 7) return -2;
987 aaa = (char *)malloc(strlen(username) + 17);
990 sprintf(aaa, "VALI %s|%d", username, axlevel);
991 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
998 int CtdlIPCSetRoomInfo(CtdlIPC *ipc, int for_real, const char *info, char *cret)
1002 if (!cret) return -1;
1003 if (!info) return -1;
1005 sprintf(aaa, "EINF %d", for_real);
1006 return CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1011 int CtdlIPCUserListing(CtdlIPC *ipc, char **listing, char *cret)
1015 if (!cret) return -1;
1016 if (!listing) return -1;
1017 if (*listing) return -1;
1019 return CtdlIPCGenericCommand(ipc, "LIST", NULL, 0, listing, &bytes, cret);
1024 int CtdlIPCSetRegistration(CtdlIPC *ipc, const char *info, char *cret)
1026 if (!cret) return -1;
1027 if (!info) return -1;
1029 return CtdlIPCGenericCommand(ipc, "REGI", info, strlen(info),
1035 int CtdlIPCMiscCheck(CtdlIPC *ipc, struct ctdlipcmisc *chek, char *cret)
1039 if (!cret) return -1;
1040 if (!chek) return -1;
1042 ret = CtdlIPCGenericCommand(ipc, "CHEK", NULL, 0, NULL, NULL, cret);
1043 if (ret / 100 == 2) {
1044 chek->newmail = extract_long(cret, 0);
1045 chek->needregis = extract_int(cret, 1);
1046 chek->needvalid = extract_int(cret, 2);
1053 int CtdlIPCDeleteFile(CtdlIPC *ipc, const char *filename, char *cret)
1058 if (!cret) return -2;
1059 if (!filename) return -2;
1061 aaa = (char *)malloc(strlen(filename) + 6);
1062 if (!aaa) return -1;
1064 sprintf(aaa, "DELF %s", filename);
1065 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1072 int CtdlIPCMoveFile(CtdlIPC *ipc, const char *filename, const char *destroom, char *cret)
1077 if (!cret) return -2;
1078 if (!filename) return -2;
1079 if (!destroom) return -2;
1081 aaa = (char *)malloc(strlen(filename) + strlen(destroom) + 7);
1082 if (!aaa) return -1;
1084 sprintf(aaa, "MOVF %s|%s", filename, destroom);
1085 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1092 int CtdlIPCNetSendFile(CtdlIPC *ipc, const char *filename, const char *destnode, char *cret)
1097 if (!cret) return -2;
1098 if (!filename) return -2;
1099 if (!destnode) return -2;
1101 aaa = (char *)malloc(strlen(filename) + strlen(destnode) + 7);
1102 if (!aaa) return -1;
1104 sprintf(aaa, "NETF %s|%s", filename, destnode);
1105 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1112 int CtdlIPCOnlineUsers(CtdlIPC *ipc, char **listing, time_t *stamp, char *cret)
1117 if (!cret) return -1;
1118 if (!listing) return -1;
1119 if (*listing) return -1;
1121 *stamp = CtdlIPCServerTime(ipc, cret);
1123 *stamp = time(NULL);
1124 ret = CtdlIPCGenericCommand(ipc, "RWHO", NULL, 0, listing, &bytes, cret);
1130 int CtdlIPCFileDownload(CtdlIPC *ipc, const char *filename, void **buf,
1132 void (*progress_gauge_callback)
1133 (CtdlIPC*, unsigned long, unsigned long),
1142 if (!cret) return -2;
1143 if (!filename) return -2;
1144 if (!buf) return -2;
1145 if (*buf) return -2;
1146 if (ipc->downloading) return -2;
1148 aaa = (char *)malloc(strlen(filename) + 6);
1149 if (!aaa) return -1;
1151 sprintf(aaa, "OPEN %s", filename);
1152 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1154 if (ret / 100 == 2) {
1155 ipc->downloading = 1;
1156 bytes = extract_long(cret, 0);
1157 last_mod = extract_int(cret, 1);
1158 extract(mimetype, cret, 2);
1160 ret = CtdlIPCReadDownload(ipc, buf, bytes, resume,
1161 progress_gauge_callback, cret);
1163 ret = CtdlIPCHighSpeedReadDownload(ipc, buf, bytes, resume,
1164 progress_gauge_callback, cret);
1167 ret = CtdlIPCEndDownload(ipc, cret);
1169 sprintf(cret, "%d|%ld|%s|%s", (int)bytes, last_mod,
1170 filename, mimetype);
1177 int CtdlIPCAttachmentDownload(CtdlIPC *ipc, long msgnum, const char *part,
1179 void (*progress_gauge_callback)
1180 (CtdlIPC*, unsigned long, unsigned long),
1190 if (!cret) return -2;
1191 if (!buf) return -2;
1192 if (*buf) return -2;
1193 if (!part) return -2;
1194 if (!msgnum) return -2;
1195 if (ipc->downloading) return -2;
1197 sprintf(aaa, "OPNA %ld|%s", msgnum, part);
1198 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1199 if (ret / 100 == 2) {
1200 ipc->downloading = 1;
1201 bytes = extract_long(cret, 0);
1202 last_mod = extract_int(cret, 1);
1203 extract(filename, cret, 2);
1204 extract(mimetype, cret, 3);
1205 /* ret = CtdlIPCReadDownload(ipc, buf, bytes, 0, progress_gauge_callback, cret); */
1206 ret = CtdlIPCHighSpeedReadDownload(ipc, buf, bytes, 0, progress_gauge_callback, cret);
1207 ret = CtdlIPCEndDownload(ipc, cret);
1209 sprintf(cret, "%d|%ld|%s|%s", (int)bytes, last_mod,
1210 filename, mimetype);
1217 int CtdlIPCImageDownload(CtdlIPC *ipc, const char *filename, void **buf,
1218 void (*progress_gauge_callback)
1219 (CtdlIPC*, unsigned long, unsigned long),
1228 if (!cret) return -1;
1229 if (!buf) return -1;
1230 if (*buf) return -1;
1231 if (!filename) return -1;
1232 if (ipc->downloading) return -1;
1234 aaa = (char *)malloc(strlen(filename) + 6);
1235 if (!aaa) return -1;
1237 sprintf(aaa, "OIMG %s", filename);
1238 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1240 if (ret / 100 == 2) {
1241 ipc->downloading = 1;
1242 bytes = extract_long(cret, 0);
1243 last_mod = extract_int(cret, 1);
1244 extract(mimetype, cret, 2);
1245 /* ret = CtdlIPCReadDownload(ipc, buf, bytes, 0, progress_gauge_callback, cret); */
1246 ret = CtdlIPCHighSpeedReadDownload(ipc, buf, bytes, 0, progress_gauge_callback, cret);
1247 ret = CtdlIPCEndDownload(ipc, cret);
1249 sprintf(cret, "%d|%ld|%s|%s", (int)bytes, last_mod,
1250 filename, mimetype);
1257 int CtdlIPCFileUpload(CtdlIPC *ipc, const char *save_as, const char *comment,
1259 void (*progress_gauge_callback)
1260 (CtdlIPC*, unsigned long, unsigned long),
1266 if (!cret) return -1;
1267 if (!save_as) return -1;
1268 if (!comment) return -1;
1269 if (!path) return -1;
1270 if (!*path) return -1;
1271 if (ipc->uploading) return -1;
1273 aaa = (char *)malloc(strlen(save_as) + strlen(comment) + 7);
1274 if (!aaa) return -1;
1276 sprintf(aaa, "UOPN %s|%s", save_as, comment);
1277 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1279 if (ret / 100 == 2) {
1281 ret = CtdlIPCWriteUpload(ipc, path, progress_gauge_callback, cret);
1282 ret = CtdlIPCEndUpload(ipc, (ret == -2 ? 1 : 0), cret);
1290 int CtdlIPCImageUpload(CtdlIPC *ipc, int for_real, const char *path,
1291 const char *save_as,
1292 void (*progress_gauge_callback)
1293 (CtdlIPC*, unsigned long, unsigned long),
1299 if (!cret) return -1;
1300 if (!save_as) return -1;
1301 if (!path && for_real) return -1;
1302 if (!*path && for_real) return -1;
1303 if (ipc->uploading) return -1;
1305 aaa = (char *)malloc(strlen(save_as) + 17);
1306 if (!aaa) return -1;
1308 sprintf(aaa, "UIMG %d|%s", for_real, save_as);
1309 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1311 if (ret / 100 == 2 && for_real) {
1313 ret = CtdlIPCWriteUpload(ipc, path, progress_gauge_callback, cret);
1314 ret = CtdlIPCEndUpload(ipc, (ret == -2 ? 1 : 0), cret);
1322 int CtdlIPCQueryUsername(CtdlIPC *ipc, const char *username, char *cret)
1327 if (!cret) return -2;
1328 if (!username) return -2;
1330 aaa = (char *)malloc(strlen(username) + 6);
1331 if (!aaa) return -1;
1333 sprintf(aaa, "QUSR %s", username);
1334 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1341 int CtdlIPCFloorListing(CtdlIPC *ipc, char **listing, char *cret)
1345 if (!cret) return -2;
1346 if (!listing) return -2;
1347 if (*listing) return -2;
1349 return CtdlIPCGenericCommand(ipc, "LFLR", NULL, 0, listing, &bytes, cret);
1354 int CtdlIPCCreateFloor(CtdlIPC *ipc, int for_real, const char *name, char *cret)
1359 if (!cret) return -2;
1360 if (!name) return -2;
1362 sprintf(aaa, "CFLR %s|%d", name, for_real);
1363 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1369 int CtdlIPCDeleteFloor(CtdlIPC *ipc, int for_real, int floornum, char *cret)
1373 if (!cret) return -1;
1374 if (floornum < 0) return -1;
1376 sprintf(aaa, "KFLR %d|%d", floornum, for_real);
1377 return CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1382 int CtdlIPCEditFloor(CtdlIPC *ipc, int floornum, const char *floorname, char *cret)
1387 if (!cret) return -2;
1388 if (!floorname) return -2;
1389 if (floornum < 0) return -2;
1391 sprintf(aaa, "EFLR %d|%s", floornum, floorname);
1392 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1400 * You only need to fill out hostname, the defaults will be used if any of the
1401 * other fields are not set properly.
1403 int CtdlIPCIdentifySoftware(CtdlIPC *ipc, int developerid, int clientid,
1404 int revision, const char *software_name, const char *hostname,
1410 if (developerid < 0 || clientid < 0 || revision < 0 ||
1414 revision = REV_LEVEL - 600;
1415 software_name = "Citadel/UX (libcitadel)";
1417 if (!hostname) return -2;
1419 aaa = (char *)malloc(strlen(software_name) + strlen(hostname) + 29);
1420 if (!aaa) return -1;
1422 sprintf(aaa, "IDEN %d|%d|%d|%s|%s", developerid, clientid,
1423 revision, software_name, hostname);
1424 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1431 int CtdlIPCSendInstantMessage(CtdlIPC *ipc, const char *username, const char *text,
1437 if (!cret) return -2;
1438 if (!username) return -2;
1440 aaa = (char *)malloc(strlen(username) + 8);
1441 if (!aaa) return -1;
1444 sprintf(aaa, "SEXP %s|-", username);
1445 ret = CtdlIPCGenericCommand(ipc, aaa, text, strlen(text),
1448 sprintf(aaa, "SEXP %s||", username);
1449 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1457 int CtdlIPCGetInstantMessage(CtdlIPC *ipc, char **listing, char *cret)
1461 if (!cret) return -2;
1462 if (!listing) return -2;
1463 if (*listing) return -2;
1465 return CtdlIPCGenericCommand(ipc, "GEXP", NULL, 0, listing, &bytes, cret);
1470 /* mode is 0 = enable, 1 = disable, 2 = status */
1471 int CtdlIPCEnableInstantMessageReceipt(CtdlIPC *ipc, int mode, char *cret)
1475 if (!cret) return -2;
1477 sprintf(aaa, "DEXP %d", mode);
1478 return CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1483 int CtdlIPCSetBio(CtdlIPC *ipc, char *bio, char *cret)
1485 if (!cret) return -2;
1486 if (!bio) return -2;
1488 return CtdlIPCGenericCommand(ipc, "EBIO", bio, strlen(bio),
1494 int CtdlIPCGetBio(CtdlIPC *ipc, const char *username, char **listing, char *cret)
1500 if (!cret) return -2;
1501 if (!username) return -2;
1502 if (!listing) return -2;
1503 if (*listing) return -2;
1505 aaa = (char *)malloc(strlen(username) + 6);
1506 if (!aaa) return -1;
1508 sprintf(aaa, "RBIO %s", username);
1509 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, listing, &bytes, cret);
1516 int CtdlIPCListUsersWithBios(CtdlIPC *ipc, char **listing, char *cret)
1520 if (!cret) return -2;
1521 if (!listing) return -2;
1522 if (*listing) return -2;
1524 return CtdlIPCGenericCommand(ipc, "LBIO", NULL, 0, listing, &bytes, cret);
1529 int CtdlIPCStealthMode(CtdlIPC *ipc, int mode, char *cret)
1533 if (!cret) return -1;
1535 sprintf(aaa, "STEL %d", mode ? 1 : 0);
1536 return CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1541 int CtdlIPCTerminateSession(CtdlIPC *ipc, int sid, char *cret)
1545 if (!cret) return -1;
1547 sprintf(aaa, "TERM %d", sid);
1548 return CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1553 int CtdlIPCTerminateServerNow(CtdlIPC *ipc, char *cret)
1555 if (!cret) return -1;
1557 return CtdlIPCGenericCommand(ipc, "DOWN", NULL, 0, NULL, NULL, cret);
1562 int CtdlIPCTerminateServerScheduled(CtdlIPC *ipc, int mode, char *cret)
1566 if (!cret) return -1;
1568 sprintf(aaa, "SCDN %d", mode ? 1 : 0);
1569 return CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1574 int CtdlIPCEnterSystemMessage(CtdlIPC *ipc, const char *filename, const char *text,
1580 if (!cret) return -2;
1581 if (!text) return -2;
1582 if (!filename) return -2;
1584 aaa = (char *)malloc(strlen(filename) + 6);
1585 if (!aaa) return -1;
1587 sprintf(aaa, "EMSG %s", filename);
1588 ret = CtdlIPCGenericCommand(ipc, aaa, text, strlen(text), NULL, NULL, cret);
1595 int CtdlIPCChangeHostname(CtdlIPC *ipc, const char *hostname, char *cret)
1600 if (!cret) return -2;
1601 if (!hostname) return -2;
1603 aaa = (char *)malloc(strlen(hostname) + 6);
1604 if (!aaa) return -1;
1606 sprintf(aaa, "HCHG %s", hostname);
1607 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1614 int CtdlIPCChangeRoomname(CtdlIPC *ipc, const char *roomname, char *cret)
1619 if (!cret) return -2;
1620 if (!roomname) return -2;
1622 aaa = (char *)malloc(strlen(roomname) + 6);
1623 if (!aaa) return -1;
1625 sprintf(aaa, "RCHG %s", roomname);
1626 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1633 int CtdlIPCChangeUsername(CtdlIPC *ipc, const char *username, char *cret)
1638 if (!cret) return -2;
1639 if (!username) return -2;
1641 aaa = (char *)malloc(strlen(username) + 6);
1642 if (!aaa) return -1;
1644 sprintf(aaa, "UCHG %s", username);
1645 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1652 /* This function returns the actual server time reported, or 0 if error */
1653 time_t CtdlIPCServerTime(CtdlIPC *ipc, char *cret)
1655 register time_t tret;
1658 ret = CtdlIPCGenericCommand(ipc, "TIME", NULL, 0, NULL, NULL, cret);
1659 if (ret / 100 == 2) {
1660 tret = extract_long(cret, 0);
1669 int CtdlIPCAideGetUserParameters(CtdlIPC *ipc, const char *who,
1670 struct ctdluser **uret, char *cret)
1675 if (!cret) return -2;
1676 if (!uret) return -2;
1677 if (!*uret) *uret = (struct ctdluser *)calloc(1, sizeof(struct ctdluser));
1678 if (!*uret) return -1;
1680 sprintf(aaa, "AGUP %s", who);
1681 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1683 if (ret / 100 == 2) {
1684 extract(uret[0]->fullname, cret, 0);
1685 extract(uret[0]->password, cret, 1);
1686 uret[0]->flags = extract_int(cret, 2);
1687 uret[0]->timescalled = extract_long(cret, 3);
1688 uret[0]->posted = extract_long(cret, 4);
1689 uret[0]->axlevel = extract_int(cret, 5);
1690 uret[0]->usernum = extract_long(cret, 6);
1691 uret[0]->lastcall = extract_long(cret, 7);
1692 uret[0]->USuserpurge = extract_int(cret, 8);
1699 int CtdlIPCAideSetUserParameters(CtdlIPC *ipc, const struct ctdluser *uret, char *cret)
1704 if (!cret) return -2;
1705 if (!uret) return -2;
1707 aaa = (char *)malloc(strlen(uret->fullname) + strlen(uret->password) + 84);
1708 if (!aaa) return -1;
1710 sprintf(aaa, "ASUP %s|%s|%d|%ld|%ld|%d|%ld|%ld|%d",
1711 uret->fullname, uret->password, uret->flags,
1712 uret->timescalled, uret->posted, uret->axlevel,
1713 uret->usernum, uret->lastcall, uret->USuserpurge);
1714 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1721 /* which is 0 = room, 1 = floor, 2 = site, 3 = default for mailboxes */
1722 /* caller must free the struct ExpirePolicy */
1723 int CtdlIPCGetMessageExpirationPolicy(CtdlIPC *ipc, int which,
1724 struct ExpirePolicy **policy, char *cret)
1726 static char *proto[] = {"room", "floor", "site", "mailboxes" };
1730 if (!cret) return -2;
1731 if (!policy) return -2;
1732 if (!*policy) *policy = (struct ExpirePolicy *)calloc(1, sizeof(struct ExpirePolicy));
1733 if (!*policy) return -1;
1734 if (which < 0 || which > 3) return -2;
1736 sprintf(aaa, "GPEX %s", proto[which]);
1737 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1738 if (ret / 100 == 2) {
1739 policy[0]->expire_mode = extract_int(cret, 0);
1740 policy[0]->expire_value = extract_int(cret, 1);
1748 /* which is 0 = room, 1 = floor, 2 = site, 3 = default for mailboxes */
1749 /* policy is 0 = inherit, 1 = no purge, 2 = by count, 3 = by age (days) */
1750 int CtdlIPCSetMessageExpirationPolicy(CtdlIPC *ipc, int which,
1751 struct ExpirePolicy *policy, char *cret)
1754 char *whichvals[] = { "room", "floor", "site", "mailboxes" };
1756 if (!cret) return -2;
1757 if (which < 0 || which > 3) return -2;
1758 if (!policy) return -2;
1759 if (policy->expire_mode < 0 || policy->expire_mode > 3) return -2;
1760 if (policy->expire_mode >= 2 && policy->expire_value < 1) return -2;
1762 sprintf(aaa, "SPEX %s|%d|%d", whichvals[which],
1763 policy->expire_mode, policy->expire_value);
1764 return CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1769 int CtdlIPCGetSystemConfig(CtdlIPC *ipc, char **listing, char *cret)
1773 if (!cret) return -2;
1774 if (!listing) return -2;
1775 if (*listing) return -2;
1777 return CtdlIPCGenericCommand(ipc, "CONF GET", NULL, 0,
1778 listing, &bytes, cret);
1783 int CtdlIPCSetSystemConfig(CtdlIPC *ipc, const char *listing, char *cret)
1785 if (!cret) return -2;
1786 if (!listing) return -2;
1788 return CtdlIPCGenericCommand(ipc, "CONF SET", listing, strlen(listing),
1794 int CtdlIPCGetSystemConfigByType(CtdlIPC *ipc, const char *mimetype,
1795 char **listing, char *cret)
1800 if (!cret) return -2;
1801 if (!mimetype) return -2;
1802 if (!listing) return -2;
1803 if (*listing) return -2;
1805 aaa = malloc(strlen(mimetype) + 13);
1806 if (!aaa) return -1;
1807 sprintf(aaa, "CONF GETSYS|%s", mimetype);
1808 return CtdlIPCGenericCommand(ipc, aaa, NULL, 0,
1809 listing, &bytes, cret);
1814 int CtdlIPCSetSystemConfigByType(CtdlIPC *ipc, const char *mimetype,
1815 const char *listing, char *cret)
1819 if (!cret) return -2;
1820 if (!mimetype) return -2;
1821 if (!listing) return -2;
1823 aaa = malloc(strlen(mimetype) + 13);
1824 if (!aaa) return -1;
1825 sprintf(aaa, "CONF PUTSYS|%s", mimetype);
1826 return CtdlIPCGenericCommand(ipc, aaa, listing, strlen(listing),
1832 int CtdlIPCRequestClientLogout(CtdlIPC *ipc, int session, char *cret)
1836 if (!cret) return -2;
1837 if (session < 0) return -2;
1839 sprintf(aaa, "REQT %d", session);
1840 return CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1845 int CtdlIPCSetMessageSeen(CtdlIPC *ipc, long msgnum, int seen, char *cret)
1849 if (!cret) return -2;
1850 if (msgnum < 0) return -2;
1852 sprintf(aaa, "SEEN %ld|%d", msgnum, seen ? 1 : 0);
1853 return CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1858 int CtdlIPCStartEncryption(CtdlIPC *ipc, char *cret)
1867 /* New SSL object */
1868 temp_ssl = SSL_new(ssl_ctx);
1870 error_printf("SSL_new failed: %s\n",
1871 ERR_reason_error_string(ERR_get_error()));
1874 /* Pointless flag waving */
1875 #if SSLEAY_VERSION_NUMBER >= 0x0922
1876 SSL_set_session_id_context(temp_ssl, "Citadel/UX SID", 14);
1879 if (!access("/var/run/egd-pool", F_OK))
1880 RAND_egd("/var/run/egd-pool");
1882 if (!RAND_status()) {
1883 error_printf("PRNG not properly seeded\n");
1887 /* Associate network connection with SSL object */
1888 if (SSL_set_fd(temp_ssl, ipc->sock) < 1) {
1889 error_printf("SSL_set_fd failed: %s\n",
1890 ERR_reason_error_string(ERR_get_error()));
1894 if (status_hook != NULL)
1895 status_hook("Requesting encryption...\r");
1897 /* Ready to start SSL/TLS */
1899 CtdlIPC_putline(ipc, "STLS");
1900 CtdlIPC_getline(ipc, buf);
1901 if (buf[0] != '2') {
1902 error_printf("Server can't start TLS: %s\n", buf);
1906 r = CtdlIPCGenericCommand(ipc,
1907 "STLS", NULL, 0, NULL, NULL, cret);
1909 error_printf("Server can't start TLS: %s\n", buf);
1914 /* Do SSL/TLS handshake */
1915 if ((a = SSL_connect(temp_ssl)) < 1) {
1916 error_printf("SSL_connect failed: %s\n",
1917 ERR_reason_error_string(ERR_get_error()));
1921 ipc->ssl = temp_ssl;
1923 BIO_set_close(ipc->ssl->rbio, BIO_NOCLOSE);
1927 bits = SSL_CIPHER_get_bits(SSL_get_current_cipher(ipc->ssl), &alg_bits);
1928 error_printf("Encrypting with %s cipher %s (%d of %d bits)\n",
1929 SSL_CIPHER_get_version(SSL_get_current_cipher(ipc->ssl)),
1930 SSL_CIPHER_get_name(SSL_get_current_cipher(ipc->ssl)),
1936 #endif /* HAVE_OPENSSL */
1941 static void endtls(SSL *ssl)
1952 int CtdlIPCDirectoryLookup(CtdlIPC *ipc, const char *address, char *cret)
1956 if (!address) return -2;
1957 if (!cret) return -2;
1959 aaa = (char *)malloc(strlen(address) + 6);
1960 if (!aaa) return -1;
1962 sprintf(aaa, "QDIR %s", address);
1963 return CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1968 int CtdlIPCInternalProgram(CtdlIPC *ipc, int secret, char *cret)
1972 if (!cret) return -2;
1973 sprintf(aaa, "IPGM %d", secret);
1974 return CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1979 int CtdlIPCMessageBaseCheck(CtdlIPC *ipc, char **mret, char *cret)
1983 if (!cret) return -2;
1984 if (!mret) return -2;
1985 if (*mret) return -2;
1987 return CtdlIPCGenericCommand(ipc, "FSCK", NULL, 0, mret, &size, cret);
2008 /* ************************************************************************** */
2009 /* Stuff below this line is not for public consumption */
2010 /* ************************************************************************** */
2013 INLINE void CtdlIPC_lock(CtdlIPC *ipc)
2015 if (ipc->network_status_cb) ipc->network_status_cb(1);
2016 #ifdef THREADED_CLIENT
2017 pthread_mutex_lock(&(ipc->mutex));
2022 INLINE void CtdlIPC_unlock(CtdlIPC *ipc)
2024 #ifdef THREADED_CLIENT
2025 pthread_mutex_unlock(&(ipc->mutex));
2027 if (ipc->network_status_cb) ipc->network_status_cb(0);
2031 /* Read a listing from the server up to 000. Append to dest if it exists */
2032 char *CtdlIPCReadListing(CtdlIPC *ipc, char *dest)
2041 length = strlen(ret);
2046 while (CtdlIPC_getline(ipc, aaa), strcmp(aaa, "000")) {
2047 linelength = strlen(aaa);
2048 ret = (char *)realloc(ret, (size_t)(length + linelength + 2));
2050 strcpy(&ret[length], aaa);
2051 length += linelength;
2052 strcpy(&ret[length++], "\n");
2060 /* Send a listing to the server; generate the ending 000. */
2061 int CtdlIPCSendListing(CtdlIPC *ipc, const char *listing)
2065 text = (char *)malloc(strlen(listing) + 6);
2067 strcpy(text, listing);
2068 while (text[strlen(text) - 1] == '\n')
2069 text[strlen(text) - 1] = '\0';
2070 strcat(text, "\n000");
2071 CtdlIPC_putline(ipc, text);
2075 /* Malloc failed but we are committed to send */
2076 /* This may result in extra blanks at the bottom */
2077 CtdlIPC_putline(ipc, text);
2078 CtdlIPC_putline(ipc, "000");
2084 /* Partial read of file from server */
2085 size_t CtdlIPCPartialRead(CtdlIPC *ipc, void **buf, size_t offset, size_t bytes, char *cret)
2087 register size_t len = 0;
2091 if (!cret) return 0;
2092 if (bytes < 1) return 0;
2093 if (offset < 0) return 0;
2096 sprintf(aaa, "READ %d|%d", (int)offset, (int)bytes);
2097 CtdlIPC_putline(ipc, aaa);
2098 CtdlIPC_getline(ipc, aaa);
2100 strcpy(cret, &aaa[4]);
2102 len = extract_long(&aaa[4], 0);
2103 *buf = (void *)realloc(*buf, (size_t)(offset + len));
2105 /* I know what I'm doing */
2106 serv_read(ipc, (*buf + offset), len);
2108 /* We have to read regardless */
2109 serv_read(ipc, aaa, len);
2113 CtdlIPC_unlock(ipc);
2119 int CtdlIPCEndDownload(CtdlIPC *ipc, char *cret)
2123 if (!cret) return -2;
2124 if (!ipc->downloading) return -2;
2126 ret = CtdlIPCGenericCommand(ipc, "CLOS", NULL, 0, NULL, NULL, cret);
2128 ipc->downloading = 0;
2134 int CtdlIPCSpecifyPreferredFormats(CtdlIPC *ipc, char *cret, char *formats) {
2138 snprintf(cmd, sizeof cmd, "MSGP %s", formats);
2139 ret = CtdlIPCGenericCommand(ipc, cmd, NULL, 0, NULL, NULL, cret);
2146 int CtdlIPCReadDownload(CtdlIPC *ipc, void **buf, size_t bytes, size_t resume,
2147 void (*progress_gauge_callback)
2148 (CtdlIPC*, unsigned long, unsigned long),
2151 register size_t len;
2153 if (!cret) return -1;
2154 if (!buf) return -1;
2155 if (*buf) return -1;
2156 if (!ipc->downloading) return -1;
2159 if (progress_gauge_callback)
2160 progress_gauge_callback(ipc, len, bytes);
2161 while (len < bytes) {
2162 register size_t block;
2164 block = CtdlIPCPartialRead(ipc, buf, len, 4096, cret);
2170 if (progress_gauge_callback)
2171 progress_gauge_callback(ipc, len, bytes);
2176 /* READ - pipelined */
2177 int CtdlIPCHighSpeedReadDownload(CtdlIPC *ipc, void **buf, size_t bytes,
2179 void (*progress_gauge_callback)
2180 (CtdlIPC*, unsigned long, unsigned long),
2183 register size_t len;
2184 register int calls; /* How many calls in the pipeline */
2185 register int i; /* iterator */
2188 if (!cret) return -1;
2189 if (!buf) return -1;
2190 if (*buf) return -1;
2191 if (!ipc->downloading) return -1;
2193 *buf = (void *)realloc(*buf, bytes - resume);
2194 if (!*buf) return -1;
2198 if (progress_gauge_callback)
2199 progress_gauge_callback(ipc, len, bytes);
2201 /* How many calls will be in the pipeline? */
2202 calls = (bytes - resume) / 4096;
2203 if ((bytes - resume) % 4096) calls++;
2205 /* Send all requests at once */
2206 for (i = 0; i < calls; i++) {
2207 sprintf(aaa, "READ %d|4096", (int)(i * 4096 + resume) );
2208 CtdlIPC_putline(ipc, aaa);
2211 /* Receive all responses at once */
2212 for (i = 0; i < calls; i++) {
2213 CtdlIPC_getline(ipc, aaa);
2215 strcpy(cret, &aaa[4]);
2217 len = extract_long(&aaa[4], 0);
2218 /* I know what I'm doing */
2219 serv_read(ipc, ((*buf) + (i * 4096)), len);
2221 if (progress_gauge_callback)
2222 progress_gauge_callback(ipc, i * 4096 + len, bytes);
2224 CtdlIPC_unlock(ipc);
2230 int CtdlIPCEndUpload(CtdlIPC *ipc, int discard, char *cret)
2235 if (!cret) return -1;
2236 if (!ipc->uploading) return -1;
2238 sprintf(cmd, "UCLS %d", discard ? 0 : 1);
2239 ret = CtdlIPCGenericCommand(ipc, cmd, NULL, 0, NULL, NULL, cret);
2246 int CtdlIPCWriteUpload(CtdlIPC *ipc, const char *path,
2247 void (*progress_gauge_callback)
2248 (CtdlIPC*, unsigned long, unsigned long),
2251 register int ret = -1;
2252 register size_t offset = 0;
2258 if (!cret) return -1;
2259 if (!path) return -1;
2260 if (!*path) return -1;
2262 fd = fopen(path, "r");
2265 fseek(fd, 0L, SEEK_END);
2269 if (progress_gauge_callback)
2270 progress_gauge_callback(ipc, 0, bytes);
2272 while (offset < bytes) {
2273 register size_t to_write;
2275 /* Read some data in */
2276 to_write = fread(buf, 1, 4096, fd);
2278 if (feof(fd) || ferror(fd)) break;
2280 sprintf(aaa, "WRIT %d", (int)to_write);
2281 CtdlIPC_putline(ipc, aaa);
2282 CtdlIPC_getline(ipc, aaa);
2283 strcpy(cret, &aaa[4]);
2285 if (aaa[0] == '7') {
2286 to_write = extract_long(&aaa[4], 0);
2288 serv_write(ipc, buf, to_write);
2290 if (progress_gauge_callback)
2291 progress_gauge_callback(ipc, offset, bytes);
2292 /* Detect short reads and back up if needed */
2293 /* offset will never be negative anyway */
2294 fseek(fd, (signed)offset, SEEK_SET);
2299 if (progress_gauge_callback)
2300 progress_gauge_callback(ipc, 1, 1);
2301 return (!ferror(fd) ? ret : -2);
2306 * Generic command method. This method should handle any server command
2307 * except for CHAT. It takes the following arguments:
2309 * ipc The server to speak with
2310 * command Preformatted command to send to server
2311 * to_send A text or binary file to send to server
2312 * (only sent if server requests it)
2313 * bytes_to_send The number of bytes in to_send (required if
2314 * sending binary, optional if sending listing)
2315 * to_receive Pointer to a NULL pointer, if the server
2316 * sends text or binary we will allocate memory
2317 * for the file and stuff it here
2318 * bytes_to_receive If a file is received, we will store its
2320 * proto_response The protocol response. Caller must provide
2321 * this buffer and ensure that it is at least
2322 * 128 bytes in length.
2324 * This function returns a number equal to the protocol response number,
2325 * -1 if an internal error occurred, -2 if caller provided bad values,
2326 * or 0 - the protocol response number if bad values were found during
2327 * the protocol exchange.
2328 * It stores the protocol response string (minus the number) in
2329 * protocol_response as described above. Some commands send additional
2330 * data in this string.
2332 int CtdlIPCGenericCommand(CtdlIPC *ipc,
2333 const char *command, const char *to_send,
2334 size_t bytes_to_send, char **to_receive,
2335 size_t *bytes_to_receive, char *proto_response)
2341 if (!command) return -2;
2342 if (!proto_response) return -2;
2345 if (ipc->ssl) watch_ssl = 1;
2349 CtdlIPC_putline(ipc, command);
2351 CtdlIPC_getline(ipc, proto_response);
2352 if (proto_response[3] == '*')
2354 ret = atoi(proto_response);
2355 strcpy(proto_response, &proto_response[4]);
2356 switch (ret / 100) {
2357 default: /* Unknown, punt */
2359 case 3: /* MORE_DATA */
2361 /* Don't need to do anything */
2363 case 1: /* LISTING_FOLLOWS */
2364 if (to_receive && !*to_receive && bytes_to_receive) {
2365 *to_receive = CtdlIPCReadListing(ipc, NULL);
2366 } else { /* Drain */
2367 while (CtdlIPC_getline(ipc, buf), strcmp(buf, "000")) ;
2371 case 4: /* SEND_LISTING */
2373 CtdlIPCSendListing(ipc, to_send);
2375 /* No listing given, fake it */
2376 CtdlIPC_putline(ipc, "000");
2380 case 6: /* BINARY_FOLLOWS */
2381 if (to_receive && !*to_receive && bytes_to_receive) {
2383 extract_long(proto_response, 0);
2384 *to_receive = (char *)
2385 malloc((size_t)*bytes_to_receive);
2389 serv_read(ipc, *to_receive,
2396 drain = extract_long(proto_response, 0);
2397 while (drain > SIZ) {
2398 serv_read(ipc, buf, SIZ);
2401 serv_read(ipc, buf, drain);
2405 case 7: /* SEND_BINARY */
2406 if (to_send && bytes_to_send) {
2407 serv_write(ipc, to_send, bytes_to_send);
2408 } else if (bytes_to_send) {
2409 /* Fake it, send nulls */
2412 fake = bytes_to_send;
2413 memset(buf, '\0', SIZ);
2414 while (fake > SIZ) {
2415 serv_write(ipc, buf, SIZ);
2418 serv_write(ipc, buf, fake);
2420 } /* else who knows? DANGER WILL ROBINSON */
2422 case 8: /* START_CHAT_MODE */
2423 if (!strncasecmp(command, "CHAT", 4)) {
2424 /* Don't call chatmode with generic! */
2425 CtdlIPC_putline(ipc, "/quit");
2428 /* In this mode we send then receive listing */
2430 CtdlIPCSendListing(ipc, to_send);
2432 /* No listing given, fake it */
2433 CtdlIPC_putline(ipc, "000");
2436 if (to_receive && !*to_receive
2437 && bytes_to_receive) {
2438 *to_receive = CtdlIPCReadListing(ipc, NULL);
2439 } else { /* Drain */
2440 while (CtdlIPC_getline(ipc, buf),
2441 strcmp(buf, "000")) ;
2446 case 9: /* ASYNC_MSG */
2447 /* CtdlIPCDoAsync(ret, proto_response); */
2448 free(CtdlIPCReadListing(ipc, NULL)); /* STUB FIXME */
2454 CtdlIPC_unlock(ipc);
2459 static int connectsock(char *host, char *service, char *protocol, int defaultPort)
2461 struct hostent *phe;
2462 struct servent *pse;
2463 struct protoent *ppe;
2464 struct sockaddr_in sin;
2467 memset(&sin, 0, sizeof(sin));
2468 sin.sin_family = AF_INET;
2470 pse = getservbyname(service, protocol);
2472 sin.sin_port = pse->s_port;
2474 else if (atoi(service) > 0) {
2475 sin.sin_port = htons(atoi(service));
2478 sin.sin_port = htons(defaultPort);
2480 phe = gethostbyname(host);
2482 memcpy(&sin.sin_addr, phe->h_addr, phe->h_length);
2483 } else if ((sin.sin_addr.s_addr = inet_addr(host)) == INADDR_NONE) {
2486 if ((ppe = getprotobyname(protocol)) == 0) {
2489 if (!strcmp(protocol, "udp")) {
2495 s = socket(PF_INET, type, ppe->p_proto);
2500 if (connect(s, (struct sockaddr *) &sin, sizeof(sin)) < 0) {
2508 static int uds_connectsock(int *isLocal, char *sockpath)
2510 struct sockaddr_un addr;
2513 memset(&addr, 0, sizeof(addr));
2514 addr.sun_family = AF_UNIX;
2515 safestrncpy(addr.sun_path, sockpath, sizeof addr.sun_path);
2517 s = socket(AF_UNIX, SOCK_STREAM, 0);
2522 if (connect(s, (struct sockaddr *) &addr, sizeof(addr)) < 0) {
2533 * input binary data from socket
2535 static void serv_read(CtdlIPC *ipc, char *buf, unsigned int bytes)
2537 unsigned int len, rlen;
2539 #if defined(HAVE_OPENSSL)
2541 serv_read_ssl(ipc, buf, bytes);
2546 while (len < bytes) {
2547 rlen = read(ipc->sock, &buf[len], bytes - len);
2549 connection_died(ipc, 0);
2558 * send binary to server
2560 static void serv_write(CtdlIPC *ipc, const char *buf, unsigned int nbytes)
2562 unsigned int bytes_written = 0;
2565 #if defined(HAVE_OPENSSL)
2567 serv_write_ssl(ipc, buf, nbytes);
2571 while (bytes_written < nbytes) {
2572 retval = write(ipc->sock, &buf[bytes_written],
2573 nbytes - bytes_written);
2575 connection_died(ipc, 0);
2578 bytes_written += retval;
2585 * input binary data from encrypted connection
2587 static void serv_read_ssl(CtdlIPC* ipc, char *buf, unsigned int bytes)
2593 while (len < bytes) {
2594 if (SSL_want_read(ipc->ssl)) {
2595 if ((SSL_write(ipc->ssl, junk, 0)) < 1) {
2596 error_printf("SSL_write in serv_read:\n");
2597 ERR_print_errors_fp(stderr);
2600 rlen = SSL_read(ipc->ssl, &buf[len], bytes - len);
2604 errval = SSL_get_error(ipc->ssl, rlen);
2605 if (errval == SSL_ERROR_WANT_READ ||
2606 errval == SSL_ERROR_WANT_WRITE) {
2610 if (errval == SSL_ERROR_ZERO_RETURN ||
2611 errval == SSL_ERROR_SSL) {
2612 serv_read(ipc, &buf[len], bytes - len);
2615 error_printf("SSL_read in serv_read: %s\n",
2616 ERR_reason_error_string(ERR_peek_error()));
2617 connection_died(ipc, 1);
2626 * send binary to server encrypted
2628 static void serv_write_ssl(CtdlIPC *ipc, const char *buf, unsigned int nbytes)
2630 unsigned int bytes_written = 0;
2634 while (bytes_written < nbytes) {
2635 if (SSL_want_write(ipc->ssl)) {
2636 if ((SSL_read(ipc->ssl, junk, 0)) < 1) {
2637 error_printf("SSL_read in serv_write:\n");
2638 ERR_print_errors_fp(stderr);
2641 retval = SSL_write(ipc->ssl, &buf[bytes_written],
2642 nbytes - bytes_written);
2646 errval = SSL_get_error(ipc->ssl, retval);
2647 if (errval == SSL_ERROR_WANT_READ ||
2648 errval == SSL_ERROR_WANT_WRITE) {
2652 if (errval == SSL_ERROR_ZERO_RETURN ||
2653 errval == SSL_ERROR_SSL) {
2654 serv_write(ipc, &buf[bytes_written],
2655 nbytes - bytes_written);
2658 error_printf("SSL_write in serv_write: %s\n",
2659 ERR_reason_error_string(ERR_peek_error()));
2660 connection_died(ipc, 1);
2663 bytes_written += retval;
2668 static void CtdlIPC_init_OpenSSL(void)
2671 SSL_METHOD *ssl_method;
2674 /* already done init */
2682 SSL_load_error_strings();
2683 SSLeay_add_ssl_algorithms();
2685 /* Set up the SSL context in which we will oeprate */
2686 ssl_method = SSLv23_client_method();
2687 ssl_ctx = SSL_CTX_new(ssl_method);
2689 error_printf("SSL_CTX_new failed: %s\n",
2690 ERR_reason_error_string(ERR_get_error()));
2693 /* Any reasonable cipher we can get */
2694 if (!(SSL_CTX_set_cipher_list(ssl_ctx, CIT_CIPHERS))) {
2695 error_printf("No ciphers available for encryption\n");
2698 SSL_CTX_set_session_cache_mode(ssl_ctx, SSL_SESS_CACHE_BOTH);
2700 /* Load DH parameters into the context */
2703 error_printf("Can't allocate a DH object: %s\n",
2704 ERR_reason_error_string(ERR_get_error()));
2707 if (!(BN_hex2bn(&(dh->p), DH_P))) {
2708 error_printf("Can't assign DH_P: %s\n",
2709 ERR_reason_error_string(ERR_get_error()));
2713 if (!(BN_hex2bn(&(dh->g), DH_G))) {
2714 error_printf("Can't assign DH_G: %s\n",
2715 ERR_reason_error_string(ERR_get_error()));
2720 SSL_CTX_set_tmp_dh(ssl_ctx, dh);
2723 #ifdef THREADED_CLIENT
2724 /* OpenSSL requires callbacks for threaded clients */
2725 CRYPTO_set_locking_callback(ssl_lock);
2726 CRYPTO_set_id_callback(id_callback);
2728 /* OpenSSL requires us to do semaphores for threaded clients */
2729 Critters = malloc(CRYPTO_num_locks() * sizeof (pthread_mutex_t *));
2731 perror("malloc failed");
2734 for (a = 0; a < CRYPTO_num_locks(); a++) {
2735 Critters[a] = malloc(sizeof (pthread_mutex_t));
2737 perror("malloc failed");
2740 pthread_mutex_init(Critters[a], NULL);
2743 #endif /* THREADED_CLIENT */
2747 static void ssl_lock(int mode, int n, const char *file, int line)
2749 #ifdef THREADED_CLIENT
2750 if (mode & CRYPTO_LOCK)
2751 pthread_mutex_lock(Critters[n]);
2753 pthread_mutex_unlock(Critters[n]);
2754 #endif /* THREADED_CLIENT */
2757 #ifdef THREADED_CLIENT
2758 static unsigned long id_callback(void) {
2759 return (unsigned long)pthread_self();
2761 #endif /* THREADED_CLIENT */
2762 #endif /* HAVE_OPENSSL */
2766 * input string from socket - implemented in terms of serv_read()
2768 void CtdlIPC_getline(CtdlIPC* ipc, char *buf)
2772 /* Read one character at a time. */
2774 serv_read(ipc, &buf[i], 1);
2775 if (buf[i] == '\n' || i == (SIZ-1))
2779 /* If we got a long line, discard characters until the newline. */
2781 while (buf[i] != '\n')
2782 serv_read(ipc, &buf[i], 1);
2784 /* Strip the trailing newline (and carriage return, if present) */
2785 if (buf[i] == 10) buf[i--] = 0;
2786 if (buf[i] == 13) buf[i--] = 0;
2791 * send line to server - implemented in terms of serv_write()
2793 void CtdlIPC_putline(CtdlIPC *ipc, const char *buf)
2795 /* error_printf("< %s\n", buf); */
2796 serv_write(ipc, buf, strlen(buf));
2797 serv_write(ipc, "\n", 1);
2799 ipc->last_command_sent = time(NULL);
2806 CtdlIPC* CtdlIPC_new(int argc, char **argv, char *hostbuf, char *portbuf)
2813 CtdlIPC *ipc = ialloc(CtdlIPC);
2817 #if defined(HAVE_OPENSSL)
2819 CtdlIPC_init_OpenSSL();
2821 #if defined(HAVE_PTHREAD_H)
2822 pthread_mutex_init(&(ipc->mutex), NULL); /* Default fast mutex */
2824 ipc->sock = -1; /* Not connected */
2825 ipc->isLocal = 0; /* Not local, of course! */
2826 ipc->downloading = 0;
2828 ipc->last_command_sent = 0L;
2829 ipc->network_status_cb = NULL;
2831 strcpy(cithost, DEFAULT_HOST); /* default host */
2832 strcpy(citport, DEFAULT_PORT); /* default port */
2834 /* Allow caller to supply our values (Windows) */
2835 if (hostbuf && strlen(hostbuf) > 0)
2836 strcpy(cithost, hostbuf);
2837 if (portbuf && strlen(portbuf) > 0)
2838 strcpy(citport, portbuf);
2840 /* Read host/port from command line if present */
2841 for (a = 0; a < argc; ++a) {
2844 } else if (a == 1) {
2845 strcpy(cithost, argv[a]);
2846 } else if (a == 2) {
2847 strcpy(citport, argv[a]);
2849 error_printf("%s: usage: ",argv[0]);
2850 error_printf("%s [host] [port] ",argv[0]);
2857 if ((!strcmp(cithost, "localhost"))
2858 || (!strcmp(cithost, "127.0.0.1"))) {
2862 /* If we're using a unix domain socket we can do a bunch of stuff */
2863 if (!strcmp(cithost, UDS)) {
2864 if (!strcasecmp(citport, DEFAULT_PORT)) {
2865 snprintf(sockpath, sizeof sockpath, "%s%s",
2866 BBSDIR, "/citadel.socket");
2869 snprintf(sockpath, sizeof sockpath, "%s%s",
2870 citport, "/citadel.socket");
2872 ipc->sock = uds_connectsock(&(ipc->isLocal), sockpath);
2873 if (ipc->sock == -1) {
2877 if (hostbuf != NULL) strcpy(hostbuf, cithost);
2878 if (portbuf != NULL) strcpy(portbuf, sockpath);
2882 ipc->sock = connectsock(cithost, citport, "tcp", 504);
2883 if (ipc->sock == -1) {
2887 if (hostbuf != NULL) strcpy(hostbuf, cithost);
2888 if (portbuf != NULL) strcpy(portbuf, citport);
2893 * return the file descriptor of the server socket so we can select() on it.
2895 * FIXME: This is only used in chat mode; eliminate it when chat mode gets
2898 int CtdlIPC_getsockfd(CtdlIPC* ipc)
2905 * return one character
2907 * FIXME: This is only used in chat mode; eliminate it when chat mode gets
2910 char CtdlIPC_get(CtdlIPC* ipc)
2915 serv_read(ipc, buf, 1);