4 #define DEFAULT_HOST UDS
5 #define DEFAULT_PORT "citadel"
13 # include <sys/time.h>
20 #include <sys/types.h>
27 #include <sys/socket.h>
28 #include <arpa/inet.h>
29 #include <netinet/in.h>
33 #ifdef THREADED_CLIENT
37 #include "citadel_ipc.h"
38 #include "citadel_decls.h"
41 #ifdef THREADED_CLIENT
42 pthread_mutex_t rwlock;
46 static SSL_CTX *ssl_ctx;
49 #ifdef THREADED_CLIENT
50 pthread_mutex_t **Critters; /* Things that need locking */
51 #endif /* THREADED_CLIENT */
53 #endif /* HAVE_OPENSSL */
56 #define INADDR_NONE 0xffffffff
59 static void (*status_hook)(char *s) = NULL;
61 void setCryptoStatusHook(void (*hook)(char *s)) {
65 void CtdlIPC_SetNetworkStatusCallback(CtdlIPC *ipc, void (*hook)(int state)) {
66 ipc->network_status_cb = hook;
70 char express_msgs = 0;
73 static void serv_read(CtdlIPC *ipc, char *buf, unsigned int bytes);
74 static void serv_write(CtdlIPC *ipc, const char *buf, unsigned int nbytes);
76 static void serv_read_ssl(CtdlIPC *ipc, char *buf, unsigned int bytes);
77 static void serv_write_ssl(CtdlIPC *ipc, const char *buf, unsigned int nbytes);
78 static void ssl_lock(int mode, int n, const char *file, int line);
79 static void endtls(SSL *ssl);
80 #ifdef THREADED_CLIENT
81 static unsigned long id_callback(void);
82 #endif /* THREADED_CLIENT */
83 #endif /* HAVE_OPENSSL */
87 * Does nothing. The server should always return 200.
89 int CtdlIPCNoop(CtdlIPC *ipc)
93 return CtdlIPCGenericCommand(ipc, "NOOP", NULL, 0, NULL, NULL, aaa);
98 * Does nothing interesting. The server should always return 200
99 * along with your string.
101 int CtdlIPCEcho(CtdlIPC *ipc, const char *arg, char *cret)
107 if (!cret) return -2;
109 aaa = (char *)malloc((size_t)(strlen(arg) + 6));
112 sprintf(aaa, "ECHO %s", arg);
113 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
120 * Asks the server to close the connecction.
121 * Should always return 200.
123 int CtdlIPCQuit(CtdlIPC *ipc)
129 CtdlIPC_putline(ipc, "QUIT");
130 CtdlIPC_getline(ipc, aaa);
138 * Asks the server to logout. Should always return 200, even if no user
139 * was logged in. The user will not be logged in after this!
141 int CtdlIPCLogout(CtdlIPC *ipc)
147 CtdlIPC_putline(ipc, "LOUT");
148 CtdlIPC_getline(ipc, aaa);
156 * First stage of authentication - pass the username. Returns 300 if the
157 * username is able to log in, with the username correctly spelled in cret.
158 * Returns various 500 error codes if the user doesn't exist, etc.
160 int CtdlIPCTryLogin(CtdlIPC *ipc, const char *username, char *cret)
165 if (!username) return -2;
166 if (!cret) return -2;
168 aaa = (char *)malloc((size_t)(strlen(username) + 6));
171 sprintf(aaa, "USER %s", username);
172 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
179 * Second stage of authentication - provide password. The server returns
180 * 200 and several arguments in cret relating to the user's account.
182 int CtdlIPCTryPassword(CtdlIPC *ipc, const char *passwd, char *cret)
187 if (!passwd) return -2;
188 if (!cret) return -2;
190 aaa = (char *)malloc((size_t)(strlen(passwd) + 6));
193 sprintf(aaa, "PASS %s", passwd);
194 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
201 * Second stage of authentication - provide password. The server returns
202 * 200 and several arguments in cret relating to the user's account.
204 int CtdlIPCTryApopPassword(CtdlIPC *ipc, const char *response, char *cret)
209 if (!response) return -2;
210 if (!cret) return -2;
212 aaa = (char *)malloc((size_t)(strlen(response) + 6));
215 sprintf(aaa, "PAS2 %s", response);
216 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
223 * Create a new user. This returns 200 plus the same arguments as TryPassword
224 * if selfservice is nonzero, unless there was a problem creating the account.
225 * If selfservice is zero, creates a new user but does not log out the existing
226 * user - intended for use by system administrators to create accounts on
227 * behalf of other users.
229 int CtdlIPCCreateUser(CtdlIPC *ipc, const char *username, int selfservice, char *cret)
234 if (!username) return -2;
235 if (!cret) return -2;
237 aaa = (char *)malloc((size_t)(strlen(username) + 6));
240 sprintf(aaa, "%s %s", selfservice ? "NEWU" : "CREU", username);
241 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
248 * Changes the user's password. Returns 200 if changed, errors otherwise.
250 int CtdlIPCChangePassword(CtdlIPC *ipc, const char *passwd, char *cret)
255 if (!passwd) return -2;
256 if (!cret) return -2;
258 aaa = (char *)malloc((size_t)(strlen(passwd) + 6));
261 sprintf(aaa, "SETP %s", passwd);
262 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
269 /* Caller must free the march list */
270 /* Room types are defined in enum RoomList; keep these in sync! */
271 /* floor is -1 for all, or floornum */
272 int CtdlIPCKnownRooms(CtdlIPC *ipc, enum RoomList which, int floor, struct march **listing, char *cret)
275 struct march *march = NULL;
276 static char *proto[] =
277 {"LKRA", "LKRN", "LKRO", "LZRM", "LRMS", "LPRM" };
282 if (!listing) return -2;
283 if (*listing) return -2; /* Free the listing first */
284 if (!cret) return -2;
285 /* if (which < 0 || which > 4) return -2; */
286 if (floor < -1) return -2; /* Can't validate upper bound, sorry */
288 sprintf(aaa, "%s %d", proto[which], floor);
289 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, &bbb, &bbbsize, cret);
290 if (ret / 100 == 1) {
293 while (bbb && strlen(bbb)) {
296 extract_token(aaa, bbb, 0, '\n');
298 memmove(bbb, bbb + a + 1, strlen(bbb) - a);
299 mptr = (struct march *) malloc(sizeof (struct march));
302 extract(mptr->march_name, aaa, 0);
303 mptr->march_flags = (unsigned int) extract_int(aaa, 1);
304 mptr->march_floor = (char) extract_int(aaa, 2);
305 mptr->march_order = (char) extract_int(aaa, 3);
312 while (mptr2->next != NULL)
325 /* Caller must free the struct usersupp; caller may pass an existing one */
326 int CtdlIPCGetConfig(CtdlIPC *ipc, struct usersupp **uret, char *cret)
330 if (!cret) return -2;
331 if (!uret) return -2;
332 if (!*uret) *uret = (struct usersupp *)calloc(1, sizeof (struct usersupp));
333 if (!*uret) return -1;
335 ret = CtdlIPCGenericCommand(ipc, "GETU", NULL, 0, NULL, NULL, cret);
336 if (ret / 100 == 2) {
337 uret[0]->USscreenwidth = extract_int(cret, 0);
338 uret[0]->USscreenheight = extract_int(cret, 1);
339 uret[0]->flags = extract_int(cret, 2);
346 int CtdlIPCSetConfig(CtdlIPC *ipc, struct usersupp *uret, char *cret)
350 if (!uret) return -2;
351 if (!cret) return -2;
353 sprintf(aaa, "SETU %d|%d|%d",
354 uret->USscreenwidth, uret->USscreenheight,
356 return CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
361 int CtdlIPCGotoRoom(CtdlIPC *ipc, const char *room, const char *passwd,
362 struct ctdlipcroom **rret, char *cret)
367 if (!cret) return -2;
368 if (!rret) return -2;
369 if (!*rret) *rret = (struct ctdlipcroom *)calloc(1, sizeof (struct ctdlipcroom));
370 if (!*rret) return -1;
373 aaa = (char *)malloc(strlen(room) + strlen(passwd) + 7);
378 sprintf(aaa, "GOTO %s|%s", room, passwd);
380 aaa = (char *)malloc(strlen(room) + 6);
385 sprintf(aaa, "GOTO %s", room);
387 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
388 if (ret / 100 == 2) {
389 extract(rret[0]->RRname, cret, 0);
390 rret[0]->RRunread = extract_long(cret, 1);
391 rret[0]->RRtotal = extract_long(cret, 2);
392 rret[0]->RRinfoupdated = extract_int(cret, 3);
393 rret[0]->RRflags = extract_int(cret, 4);
394 rret[0]->RRhighest = extract_long(cret, 5);
395 rret[0]->RRlastread = extract_long(cret, 6);
396 rret[0]->RRismailbox = extract_int(cret, 7);
397 rret[0]->RRaide = extract_int(cret, 8);
398 rret[0]->RRnewmail = extract_long(cret, 9);
399 rret[0]->RRfloor = extract_int(cret, 10);
408 /* which is 0 = all, 1 = old, 2 = new, 3 = last, 4 = first, 5 = gt, 6 = lt */
409 /* whicharg is number of messages, applies to last, first, gt, lt */
410 int CtdlIPCGetMessages(CtdlIPC *ipc, enum MessageList which, int whicharg,
411 const char *mtemplate, unsigned long **mret, char *cret)
414 register unsigned long count = 0;
415 static char *proto[] =
416 { "ALL", "OLD", "NEW", "LAST", "FIRST", "GT", "LT" };
421 if (!cret) return -2;
422 if (!mret) return -2;
423 if (*mret) return -2;
424 if (which < 0 || which > 6) return -2;
427 sprintf(aaa, "MSGS %s||%d", proto[which],
428 (mtemplate) ? 1 : 0);
430 sprintf(aaa, "MSGS %s|%d|%d", proto[which], whicharg,
431 (mtemplate) ? 1 : 0);
432 if (mtemplate) count = strlen(mtemplate);
433 ret = CtdlIPCGenericCommand(ipc, aaa, mtemplate, count, &bbb, &bbbsize, cret);
437 *mret = (unsigned long *)calloc(1, sizeof(unsigned long));
440 while (bbb && strlen(bbb)) {
441 extract_token(aaa, bbb, 0, '\n');
442 remove_token(bbb, 0, '\n');
443 *mret = (unsigned long *)realloc(*mret, (size_t)((count + 2) *
444 sizeof (unsigned long)));
446 (*mret)[count++] = atol(aaa);
458 int CtdlIPCGetSingleMessage(CtdlIPC *ipc, long msgnum, int headers, int as_mime,
459 struct ctdlipcmessage **mret, char *cret)
465 int multipart_hunting = 0;
466 char multipart_prefix[SIZ];
468 if (!cret) return -1;
469 if (!mret) return -1;
470 if (!*mret) *mret = (struct ctdlipcmessage *)calloc(1, sizeof (struct ctdlipcmessage));
471 if (!*mret) return -1;
472 if (!msgnum) return -1;
474 strcpy(mret[0]->content_type, "");
475 sprintf(aaa, "MSG%d %ld|%d", as_mime, msgnum, headers);
476 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, &bbb, &bbbsize, cret);
477 if (ret / 100 == 1) {
479 strcpy(mret[0]->mime_chosen, "1"); /* Default chosen-part is "1" */
480 while (strlen(bbb) > 4 && bbb[4] == '=') {
481 extract_token(aaa, bbb, 0, '\n');
482 remove_token(bbb, 0, '\n');
484 if (!strncasecmp(aaa, "nhdr=yes", 8))
486 else if (!strncasecmp(aaa, "from=", 5))
487 strcpy(mret[0]->author, &aaa[5]);
488 else if (!strncasecmp(aaa, "type=", 5))
489 mret[0]->type = atoi(&aaa[5]);
490 else if (!strncasecmp(aaa, "msgn=", 5))
491 strcpy(mret[0]->msgid, &aaa[5]);
492 else if (!strncasecmp(aaa, "subj=", 5))
493 strcpy(mret[0]->subject, &aaa[5]);
494 else if (!strncasecmp(aaa, "rfca=", 5))
495 strcpy(mret[0]->email, &aaa[5]);
496 else if (!strncasecmp(aaa, "hnod=", 5))
497 strcpy(mret[0]->hnod, &aaa[5]);
498 else if (!strncasecmp(aaa, "room=", 5))
499 strcpy(mret[0]->room, &aaa[5]);
500 else if (!strncasecmp(aaa, "node=", 5))
501 strcpy(mret[0]->node, &aaa[5]);
502 else if (!strncasecmp(aaa, "rcpt=", 5))
503 strcpy(mret[0]->recipient, &aaa[5]);
504 else if (!strncasecmp(aaa, "time=", 5))
505 mret[0]->time = atol(&aaa[5]);
507 /* Multipart/alternative prefix & suffix strings help
508 * us to determine which part we want to download.
510 else if (!strncasecmp(aaa, "pref=", 5)) {
511 extract(multipart_prefix, &aaa[5], 1);
512 if (!strcasecmp(multipart_prefix,
513 "multipart/alternative")) {
517 else if (!strncasecmp(aaa, "suff=", 5)) {
518 extract(multipart_prefix, &aaa[5], 1);
519 if (!strcasecmp(multipart_prefix,
520 "multipart/alternative")) {
525 else if (!strncasecmp(aaa, "part=", 5)) {
526 struct parts *ptr, *chain;
528 ptr = (struct parts *)calloc(1, sizeof (struct parts));
531 /* Fill the buffers for the caller */
532 extract(ptr->name, &aaa[5], 0);
533 extract(ptr->filename, &aaa[5], 1);
534 extract(ptr->number, &aaa[5], 2);
535 extract(ptr->disposition, &aaa[5], 3);
536 extract(ptr->mimetype, &aaa[5], 4);
537 ptr->length = extract_long(&aaa[5], 5);
538 if (!mret[0]->attachments)
539 mret[0]->attachments = ptr;
541 chain = mret[0]->attachments;
547 /* Now handle multipart/alternative */
548 if (multipart_hunting > 0) {
549 if ( (!strcasecmp(ptr->mimetype,
551 || (!strcasecmp(ptr->mimetype,
553 strcpy(mret[0]->mime_chosen,
561 /* Eliminate "text\n" */
562 remove_token(bbb, 0, '\n');
564 /* If doing a MIME thing, pull out the extra headers */
567 if (!strncasecmp(bbb, "Content-type: ", 14)) {
568 extract_token(mret[0]->content_type, bbb, 0, '\n');
569 strcpy(mret[0]->content_type,
570 &mret[0]->content_type[14]);
571 striplt(mret[0]->content_type);
573 remove_token(bbb, 0, '\n');
574 } while ((bbb[0] != 0) && (bbb[0] != '\n'));
575 /*ooga*/ remove_token(bbb, 0, '\n');
581 /* FIXME: Strip trailing whitespace */
582 bbb = (char *)realloc(bbb, (size_t)(strlen(bbb) + 1));
584 bbb = (char *)realloc(bbb, 1);
594 int CtdlIPCWhoKnowsRoom(CtdlIPC *ipc, char **listing, char *cret)
599 if (!cret) return -2;
600 if (!listing) return -2;
601 if (*listing) return -2;
603 ret = CtdlIPCGenericCommand(ipc, "WHOK", NULL, 0, listing, &bytes, cret);
609 int CtdlIPCServerInfo(CtdlIPC *ipc, struct CtdlServInfo *ServInfo, char *cret)
613 char *listing = NULL;
616 if (!cret) return -2;
617 if (!ServInfo) return -2;
619 ret = CtdlIPCGenericCommand(ipc, "INFO", NULL, 0, &listing, &bytes, cret);
620 if (ret / 100 == 1) {
623 while (*listing && strlen(listing)) {
624 extract_token(buf, listing, 0, '\n');
625 remove_token(listing, 0, '\n');
627 case 0: ServInfo->serv_pid = atoi(buf);
629 case 1: strcpy(ServInfo->serv_nodename,buf);
631 case 2: strcpy(ServInfo->serv_humannode,buf);
633 case 3: strcpy(ServInfo->serv_fqdn,buf);
635 case 4: strcpy(ServInfo->serv_software,buf);
637 case 5: ServInfo->serv_rev_level = atoi(buf);
639 case 6: strcpy(ServInfo->serv_bbs_city,buf);
641 case 7: strcpy(ServInfo->serv_sysadm,buf);
643 case 9: strcpy(ServInfo->serv_moreprompt,buf);
645 case 10: ServInfo->serv_ok_floors = atoi(buf);
647 case 11: ServInfo->serv_paging_level = atoi(buf);
649 case 13: ServInfo->serv_supports_qnop = atoi(buf);
660 int CtdlIPCReadDirectory(CtdlIPC *ipc, char **listing, char *cret)
665 if (!cret) return -2;
666 if (!listing) return -2;
667 if (*listing) return -2;
669 ret = CtdlIPCGenericCommand(ipc, "RDIR", NULL, 0, listing, &bytes, cret);
675 * Set last-read pointer in this room to msgnum, or 0 for HIGHEST.
677 int CtdlIPCSetLastRead(CtdlIPC *ipc, long msgnum, char *cret)
682 if (!cret) return -2;
685 sprintf(aaa, "SLRP %ld", msgnum);
688 sprintf(aaa, "SLRP HIGHEST");
690 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
696 int CtdlIPCInviteUserToRoom(CtdlIPC *ipc, const char *username, char *cret)
701 if (!cret) return -2;
702 if (!username) return -2;
704 aaa = (char *)malloc(strlen(username) + 6);
707 sprintf(aaa, "INVT %s", username);
708 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
715 int CtdlIPCKickoutUserFromRoom(CtdlIPC *ipc, const char *username, char *cret)
720 if (!cret) return -1;
721 if (!username) return -1;
723 aaa = (char *)malloc(strlen(username) + 6);
725 sprintf(aaa, "KICK %s", username);
726 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
733 int CtdlIPCGetRoomAttributes(CtdlIPC *ipc, struct quickroom **qret, char *cret)
737 if (!cret) return -2;
738 if (!qret) return -2;
739 if (!*qret) *qret = (struct quickroom *)calloc(1, sizeof (struct quickroom));
740 if (!*qret) return -1;
742 ret = CtdlIPCGenericCommand(ipc, "GETR", NULL, 0, NULL, NULL, cret);
743 if (ret / 100 == 2) {
744 extract(qret[0]->QRname, cret, 0);
745 extract(qret[0]->QRpasswd, cret, 1);
746 extract(qret[0]->QRdirname, cret, 2);
747 qret[0]->QRflags = extract_int(cret, 3);
748 qret[0]->QRfloor = extract_int(cret, 4);
749 qret[0]->QRorder = extract_int(cret, 5);
750 qret[0]->QRdefaultview = extract_int(cret, 6);
751 qret[0]->QRflags2 = extract_int(cret, 7);
758 /* set forget to kick all users out of room */
759 int CtdlIPCSetRoomAttributes(CtdlIPC *ipc, int forget, struct quickroom *qret, char *cret)
764 if (!cret) return -2;
765 if (!qret) return -2;
767 aaa = (char *)malloc(strlen(qret->QRname) + strlen(qret->QRpasswd) +
768 strlen(qret->QRdirname) + 52);
771 sprintf(aaa, "SETR %s|%s|%s|%d|%d|%d|%d",
772 qret->QRname, qret->QRpasswd, qret->QRdirname,
773 qret->QRflags, forget, qret->QRfloor, qret->QRorder);
774 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
781 int CtdlIPCGetRoomAide(CtdlIPC *ipc, char *cret)
783 if (!cret) return -1;
785 return CtdlIPCGenericCommand(ipc, "GETA", NULL, 0, NULL, NULL, cret);
790 int CtdlIPCSetRoomAide(CtdlIPC *ipc, const char *username, char *cret)
795 if (!cret) return -2;
796 if (!username) return -2;
798 aaa = (char *)malloc(strlen(username) + 6);
801 sprintf(aaa, "SETA %s", username);
802 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
809 int CtdlIPCPostMessage(CtdlIPC *ipc, int flag, const struct ctdlipcmessage *mr, char *cret)
814 if (!cret) return -2;
817 aaa = (char *)malloc(strlen(mr->recipient) + strlen(mr->author) + 40);
820 sprintf(aaa, "ENT0 %d|%s|%d|%d|%s|%s", flag, mr->recipient,
821 mr->anonymous, mr->type, mr->subject, mr->author);
822 ret = CtdlIPCGenericCommand(ipc, aaa, mr->text, strlen(mr->text), NULL,
830 int CtdlIPCRoomInfo(CtdlIPC *ipc, char **iret, char *cret)
834 if (!cret) return -2;
835 if (!iret) return -2;
836 if (*iret) return -2;
838 return CtdlIPCGenericCommand(ipc, "RINF", NULL, 0, iret, &bytes, cret);
843 int CtdlIPCDeleteMessage(CtdlIPC *ipc, long msgnum, char *cret)
847 if (!cret) return -2;
848 if (!msgnum) return -2;
850 sprintf(aaa, "DELE %ld", msgnum);
851 return CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
856 int CtdlIPCMoveMessage(CtdlIPC *ipc, int copy, long msgnum, const char *destroom, char *cret)
861 if (!cret) return -2;
862 if (!destroom) return -2;
863 if (!msgnum) return -2;
865 aaa = (char *)malloc(strlen(destroom) + 28);
868 sprintf(aaa, "MOVE %ld|%s|%d", msgnum, destroom, copy);
869 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
876 int CtdlIPCDeleteRoom(CtdlIPC *ipc, int for_real, char *cret)
880 if (!cret) return -2;
882 sprintf(aaa, "KILL %d", for_real);
883 return CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
888 int CtdlIPCCreateRoom(CtdlIPC *ipc, int for_real, const char *roomname, int type,
889 const char *password, int floor, char *cret)
894 if (!cret) return -2;
895 if (!roomname) return -2;
898 aaa = (char *)malloc(strlen(roomname) + strlen(password) + 40);
900 sprintf(aaa, "CRE8 %d|%s|%d|%s|%d", for_real, roomname, type,
903 aaa = (char *)malloc(strlen(roomname) + 40);
905 sprintf(aaa, "CRE8 %d|%s|%d||%d", for_real, roomname, type,
908 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
915 int CtdlIPCForgetRoom(CtdlIPC *ipc, char *cret)
917 if (!cret) return -2;
919 return CtdlIPCGenericCommand(ipc, "FORG", NULL, 0, NULL, NULL, cret);
924 int CtdlIPCSystemMessage(CtdlIPC *ipc, const char *message, char **mret, char *cret)
930 if (!cret) return -2;
931 if (!mret) return -2;
932 if (*mret) return -2;
933 if (!message) return -2;
935 aaa = (char *)malloc(strlen(message) + 6);
938 sprintf(aaa, "MESG %s", message);
939 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, mret, &bytes, cret);
946 int CtdlIPCNextUnvalidatedUser(CtdlIPC *ipc, char *cret)
948 if (!cret) return -2;
950 return CtdlIPCGenericCommand(ipc, "GNUR", NULL, 0, NULL, NULL, cret);
955 int CtdlIPCGetUserRegistration(CtdlIPC *ipc, const char *username, char **rret, char *cret)
961 if (!cret) return -2;
962 if (!rret) return -2;
963 if (*rret) return -2;
966 aaa = (char *)malloc(strlen(username) + 6);
968 aaa = (char *)malloc(12);
972 sprintf(aaa, "GREG %s", username);
974 sprintf(aaa, "GREG _SELF_");
975 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, rret, &bytes, cret);
982 int CtdlIPCValidateUser(CtdlIPC *ipc, const char *username, int axlevel, char *cret)
987 if (!cret) return -2;
988 if (!username) return -2;
989 if (axlevel < 0 || axlevel > 7) return -2;
991 aaa = (char *)malloc(strlen(username) + 17);
994 sprintf(aaa, "VALI %s|%d", username, axlevel);
995 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1002 int CtdlIPCSetRoomInfo(CtdlIPC *ipc, int for_real, const char *info, char *cret)
1006 if (!cret) return -1;
1007 if (!info) return -1;
1009 sprintf(aaa, "EINF %d", for_real);
1010 return CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1015 int CtdlIPCUserListing(CtdlIPC *ipc, char **listing, char *cret)
1019 if (!cret) return -1;
1020 if (!listing) return -1;
1021 if (*listing) return -1;
1023 return CtdlIPCGenericCommand(ipc, "LIST", NULL, 0, listing, &bytes, cret);
1028 int CtdlIPCSetRegistration(CtdlIPC *ipc, const char *info, char *cret)
1030 if (!cret) return -1;
1031 if (!info) return -1;
1033 return CtdlIPCGenericCommand(ipc, "REGI", info, strlen(info),
1039 int CtdlIPCMiscCheck(CtdlIPC *ipc, struct ctdlipcmisc *chek, char *cret)
1043 if (!cret) return -1;
1044 if (!chek) return -1;
1046 ret = CtdlIPCGenericCommand(ipc, "CHEK", NULL, 0, NULL, NULL, cret);
1047 if (ret / 100 == 2) {
1048 chek->newmail = extract_long(cret, 0);
1049 chek->needregis = extract_int(cret, 1);
1050 chek->needvalid = extract_int(cret, 2);
1057 int CtdlIPCDeleteFile(CtdlIPC *ipc, const char *filename, char *cret)
1062 if (!cret) return -2;
1063 if (!filename) return -2;
1065 aaa = (char *)malloc(strlen(filename) + 6);
1066 if (!aaa) return -1;
1068 sprintf(aaa, "DELF %s", filename);
1069 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1076 int CtdlIPCMoveFile(CtdlIPC *ipc, const char *filename, const char *destroom, char *cret)
1081 if (!cret) return -2;
1082 if (!filename) return -2;
1083 if (!destroom) return -2;
1085 aaa = (char *)malloc(strlen(filename) + strlen(destroom) + 7);
1086 if (!aaa) return -1;
1088 sprintf(aaa, "MOVF %s|%s", filename, destroom);
1089 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1096 int CtdlIPCNetSendFile(CtdlIPC *ipc, const char *filename, const char *destnode, char *cret)
1101 if (!cret) return -2;
1102 if (!filename) return -2;
1103 if (!destnode) return -2;
1105 aaa = (char *)malloc(strlen(filename) + strlen(destnode) + 7);
1106 if (!aaa) return -1;
1108 sprintf(aaa, "NETF %s|%s", filename, destnode);
1109 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1116 int CtdlIPCOnlineUsers(CtdlIPC *ipc, char **listing, time_t *stamp, char *cret)
1121 if (!cret) return -1;
1122 if (!listing) return -1;
1123 if (*listing) return -1;
1125 *stamp = CtdlIPCServerTime(ipc, cret);
1127 *stamp = time(NULL);
1128 ret = CtdlIPCGenericCommand(ipc, "RWHO", NULL, 0, listing, &bytes, cret);
1134 int CtdlIPCFileDownload(CtdlIPC *ipc, const char *filename, void **buf,
1136 void (*progress_gauge_callback)(unsigned long, unsigned long),
1145 if (!cret) return -2;
1146 if (!filename) return -2;
1147 if (!buf) return -2;
1148 if (*buf) return -2;
1149 if (ipc->downloading) return -2;
1151 aaa = (char *)malloc(strlen(filename) + 6);
1152 if (!aaa) return -1;
1154 sprintf(aaa, "OPEN %s", filename);
1155 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1157 if (ret / 100 == 2) {
1158 ipc->downloading = 1;
1159 bytes = extract_long(cret, 0);
1160 last_mod = extract_int(cret, 1);
1161 extract(mimetype, cret, 2);
1162 /* ret = CtdlIPCReadDownload(ipc, buf, bytes, resume, progress_gauge_callback, cret); */
1163 ret = CtdlIPCHighSpeedReadDownload(ipc, buf, bytes, resume, progress_gauge_callback, cret);
1164 ret = CtdlIPCEndDownload(ipc, cret);
1166 sprintf(cret, "%d|%ld|%s|%s", (int)bytes, last_mod,
1167 filename, mimetype);
1174 int CtdlIPCAttachmentDownload(CtdlIPC *ipc, long msgnum, const char *part,
1176 void (*progress_gauge_callback)(unsigned long, unsigned long),
1186 if (!cret) return -2;
1187 if (!buf) return -2;
1188 if (*buf) return -2;
1189 if (!part) return -2;
1190 if (!msgnum) return -2;
1191 if (ipc->downloading) return -2;
1193 aaa = (char *)malloc(strlen(part) + 17);
1194 if (!aaa) return -1;
1196 sprintf(aaa, "OPNA %ld|%s", msgnum, part);
1197 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1199 if (ret / 100 == 2) {
1200 ipc->downloading = 1;
1201 bytes = extract_long(cret, 0);
1202 last_mod = extract_int(cret, 1);
1203 extract(mimetype, cret, 2);
1204 /* ret = CtdlIPCReadDownload(ipc, buf, bytes, 0, progress_gauge_callback, cret); */
1205 ret = CtdlIPCHighSpeedReadDownload(ipc, buf, bytes, 0, progress_gauge_callback, cret);
1206 ret = CtdlIPCEndDownload(ipc, cret);
1208 sprintf(cret, "%d|%ld|%s|%s", (int)bytes, last_mod,
1209 filename, mimetype);
1216 int CtdlIPCImageDownload(CtdlIPC *ipc, const char *filename, void **buf,
1217 void (*progress_gauge_callback)(unsigned long, unsigned long),
1226 if (!cret) return -1;
1227 if (!buf) return -1;
1228 if (*buf) return -1;
1229 if (!filename) return -1;
1230 if (ipc->downloading) return -1;
1232 aaa = (char *)malloc(strlen(filename) + 6);
1233 if (!aaa) return -1;
1235 sprintf(aaa, "OIMG %s", filename);
1236 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1238 if (ret / 100 == 2) {
1239 ipc->downloading = 1;
1240 bytes = extract_long(cret, 0);
1241 last_mod = extract_int(cret, 1);
1242 extract(mimetype, cret, 2);
1243 /* ret = CtdlIPCReadDownload(ipc, buf, bytes, 0, progress_gauge_callback, cret); */
1244 ret = CtdlIPCHighSpeedReadDownload(ipc, buf, bytes, 0, progress_gauge_callback, cret);
1245 ret = CtdlIPCEndDownload(ipc, cret);
1247 sprintf(cret, "%d|%ld|%s|%s", (int)bytes, last_mod,
1248 filename, mimetype);
1255 int CtdlIPCFileUpload(CtdlIPC *ipc, const char *save_as, const char *comment,
1257 void (*progress_gauge_callback)(unsigned long, unsigned long),
1263 if (!cret) return -1;
1264 if (!save_as) return -1;
1265 if (!comment) return -1;
1266 if (!path) return -1;
1267 if (!*path) return -1;
1268 if (ipc->uploading) return -1;
1270 aaa = (char *)malloc(strlen(save_as) + strlen(comment) + 7);
1271 if (!aaa) return -1;
1273 sprintf(aaa, "UOPN %s|%s", save_as, comment);
1274 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1276 if (ret / 100 == 2) {
1278 ret = CtdlIPCWriteUpload(ipc, path, progress_gauge_callback, cret);
1279 ret = CtdlIPCEndUpload(ipc, (ret == -2 ? 1 : 0), cret);
1287 int CtdlIPCImageUpload(CtdlIPC *ipc, int for_real, const char *path,
1288 const char *save_as,
1289 void (*progress_gauge_callback)(unsigned long, unsigned long),
1295 if (!cret) return -1;
1296 if (!save_as) return -1;
1297 if (!path && for_real) return -1;
1298 if (!*path && for_real) return -1;
1299 if (ipc->uploading) return -1;
1301 aaa = (char *)malloc(strlen(save_as) + 17);
1302 if (!aaa) return -1;
1304 sprintf(aaa, "UIMG %d|%s", for_real, save_as);
1305 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1307 if (ret / 100 == 2 && for_real) {
1309 ret = CtdlIPCWriteUpload(ipc, path, progress_gauge_callback, cret);
1310 ret = CtdlIPCEndUpload(ipc, (ret == -2 ? 1 : 0), cret);
1318 int CtdlIPCQueryUsername(CtdlIPC *ipc, const char *username, char *cret)
1323 if (!cret) return -2;
1324 if (!username) return -2;
1326 aaa = (char *)malloc(strlen(username) + 6);
1327 if (!aaa) return -1;
1329 sprintf(aaa, "QUSR %s", username);
1330 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1337 int CtdlIPCFloorListing(CtdlIPC *ipc, char **listing, char *cret)
1341 if (!cret) return -2;
1342 if (!listing) return -2;
1343 if (*listing) return -2;
1345 return CtdlIPCGenericCommand(ipc, "LFLR", NULL, 0, listing, &bytes, cret);
1350 int CtdlIPCCreateFloor(CtdlIPC *ipc, int for_real, const char *name, char *cret)
1355 if (!cret) return -2;
1356 if (!name) return -2;
1357 if (!*name) return -2;
1359 aaa = (char *)malloc(strlen(name) + 17);
1360 if (!aaa) return -1;
1362 sprintf(aaa, "CFLR %s|%d", name, for_real);
1363 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1370 int CtdlIPCDeleteFloor(CtdlIPC *ipc, int for_real, int floornum, char *cret)
1374 if (!cret) return -1;
1375 if (floornum < 0) return -1;
1377 sprintf(aaa, "KFLR %d|%d", floornum, for_real);
1378 return CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1383 int CtdlIPCEditFloor(CtdlIPC *ipc, int floornum, const char *floorname, char *cret)
1388 if (!cret) return -2;
1389 if (!floorname) return -2;
1390 if (floornum < 0) return -2;
1392 aaa = (char *)malloc(strlen(floorname) + 17);
1393 if (!aaa) return -1;
1395 sprintf(aaa, "EFLR %d|%s", floornum, floorname);
1396 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1405 * You only need to fill out hostname, the defaults will be used if any of the
1406 * other fields are not set properly.
1408 int CtdlIPCIdentifySoftware(CtdlIPC *ipc, int developerid, int clientid,
1409 int revision, const char *software_name, const char *hostname,
1415 if (developerid < 0 || clientid < 0 || revision < 0 ||
1419 revision = REV_LEVEL - 600;
1420 software_name = "Citadel/UX (libcitadel)";
1422 if (!hostname) return -2;
1424 aaa = (char *)malloc(strlen(software_name) + strlen(hostname) + 29);
1425 if (!aaa) return -1;
1427 sprintf(aaa, "IDEN %d|%d|%d|%s|%s", developerid, clientid,
1428 revision, software_name, hostname);
1429 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1436 int CtdlIPCSendInstantMessage(CtdlIPC *ipc, const char *username, const char *text,
1442 if (!cret) return -2;
1443 if (!username) return -2;
1445 aaa = (char *)malloc(strlen(username) + 8);
1446 if (!aaa) return -1;
1449 sprintf(aaa, "SEXP %s|-", username);
1450 ret = CtdlIPCGenericCommand(ipc, aaa, text, strlen(text),
1453 sprintf(aaa, "SEXP %s||", username);
1454 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1462 int CtdlIPCGetInstantMessage(CtdlIPC *ipc, char **listing, char *cret)
1466 if (!cret) return -2;
1467 if (!listing) return -2;
1468 if (*listing) return -2;
1470 return CtdlIPCGenericCommand(ipc, "GEXP", NULL, 0, listing, &bytes, cret);
1475 /* mode is 0 = enable, 1 = disable, 2 = status */
1476 int CtdlIPCEnableInstantMessageReceipt(CtdlIPC *ipc, int mode, char *cret)
1480 if (!cret) return -2;
1482 sprintf(aaa, "DEXP %d", mode);
1483 return CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1488 int CtdlIPCSetBio(CtdlIPC *ipc, char *bio, char *cret)
1490 if (!cret) return -2;
1491 if (!bio) return -2;
1493 return CtdlIPCGenericCommand(ipc, "EBIO", bio, strlen(bio),
1499 int CtdlIPCGetBio(CtdlIPC *ipc, const char *username, char **listing, char *cret)
1505 if (!cret) return -2;
1506 if (!username) return -2;
1507 if (!listing) return -2;
1508 if (*listing) return -2;
1510 aaa = (char *)malloc(strlen(username) + 6);
1511 if (!aaa) return -1;
1513 sprintf(aaa, "RBIO %s", username);
1514 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, listing, &bytes, cret);
1521 int CtdlIPCListUsersWithBios(CtdlIPC *ipc, char **listing, char *cret)
1525 if (!cret) return -2;
1526 if (!listing) return -2;
1527 if (*listing) return -2;
1529 return CtdlIPCGenericCommand(ipc, "LBIO", NULL, 0, listing, &bytes, cret);
1534 int CtdlIPCStealthMode(CtdlIPC *ipc, int mode, char *cret)
1538 if (!cret) return -1;
1540 sprintf(aaa, "STEL %d", mode ? 1 : 0);
1541 return CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1546 int CtdlIPCTerminateSession(CtdlIPC *ipc, int sid, char *cret)
1550 if (!cret) return -1;
1552 sprintf(aaa, "TERM %d", sid);
1553 return CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1558 int CtdlIPCTerminateServerNow(CtdlIPC *ipc, char *cret)
1560 if (!cret) return -1;
1562 return CtdlIPCGenericCommand(ipc, "DOWN", NULL, 0, NULL, NULL, cret);
1567 int CtdlIPCTerminateServerScheduled(CtdlIPC *ipc, int mode, char *cret)
1571 if (!cret) return -1;
1573 sprintf(aaa, "SCDN %d", mode ? 1 : 0);
1574 return CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1579 int CtdlIPCEnterSystemMessage(CtdlIPC *ipc, const char *filename, const char *text,
1585 if (!cret) return -2;
1586 if (!text) return -2;
1587 if (!filename) return -2;
1589 aaa = (char *)malloc(strlen(filename) + 6);
1590 if (!aaa) return -1;
1592 sprintf(aaa, "EMSG %s", filename);
1593 ret = CtdlIPCGenericCommand(ipc, aaa, text, strlen(text), NULL, NULL, cret);
1600 int CtdlIPCChangeHostname(CtdlIPC *ipc, const char *hostname, char *cret)
1605 if (!cret) return -2;
1606 if (!hostname) return -2;
1608 aaa = (char *)malloc(strlen(hostname) + 6);
1609 if (!aaa) return -1;
1611 sprintf(aaa, "HCHG %s", hostname);
1612 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1619 int CtdlIPCChangeRoomname(CtdlIPC *ipc, const char *roomname, char *cret)
1624 if (!cret) return -2;
1625 if (!roomname) return -2;
1627 aaa = (char *)malloc(strlen(roomname) + 6);
1628 if (!aaa) return -1;
1630 sprintf(aaa, "RCHG %s", roomname);
1631 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1638 int CtdlIPCChangeUsername(CtdlIPC *ipc, const char *username, char *cret)
1643 if (!cret) return -2;
1644 if (!username) return -2;
1646 aaa = (char *)malloc(strlen(username) + 6);
1647 if (!aaa) return -1;
1649 sprintf(aaa, "UCHG %s", username);
1650 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1657 /* This function returns the actual server time reported, or 0 if error */
1658 time_t CtdlIPCServerTime(CtdlIPC *ipc, char *cret)
1660 register time_t tret;
1663 ret = CtdlIPCGenericCommand(ipc, "TIME", NULL, 0, NULL, NULL, cret);
1664 if (ret / 100 == 2) {
1665 tret = extract_long(cret, 0);
1674 int CtdlIPCAideGetUserParameters(CtdlIPC *ipc, const char *who,
1675 struct usersupp **uret, char *cret)
1680 if (!cret) return -2;
1681 if (!uret) return -2;
1682 if (!*uret) *uret = (struct usersupp *)calloc(1, sizeof(struct usersupp));
1683 if (!*uret) return -1;
1685 sprintf(aaa, "AGUP %s", who);
1686 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1688 if (ret / 100 == 2) {
1689 extract(uret[0]->fullname, cret, 0);
1690 extract(uret[0]->password, cret, 1);
1691 uret[0]->flags = extract_int(cret, 2);
1692 uret[0]->timescalled = extract_long(cret, 3);
1693 uret[0]->posted = extract_long(cret, 4);
1694 uret[0]->axlevel = extract_int(cret, 5);
1695 uret[0]->usernum = extract_long(cret, 6);
1696 uret[0]->lastcall = extract_long(cret, 7);
1697 uret[0]->USuserpurge = extract_int(cret, 8);
1704 int CtdlIPCAideSetUserParameters(CtdlIPC *ipc, const struct usersupp *uret, char *cret)
1709 if (!cret) return -2;
1710 if (!uret) return -2;
1712 aaa = (char *)malloc(strlen(uret->fullname) + strlen(uret->password) + 84);
1713 if (!aaa) return -1;
1715 sprintf(aaa, "ASUP %s|%s|%d|%ld|%ld|%d|%ld|%ld|%d",
1716 uret->fullname, uret->password, uret->flags,
1717 uret->timescalled, uret->posted, uret->axlevel,
1718 uret->usernum, uret->lastcall, uret->USuserpurge);
1719 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1726 /* which is 0 = room, 1 = floor, 2 = site */
1727 /* caller must free the struct ExpirePolicy */
1728 int CtdlIPCGetMessageExpirationPolicy(CtdlIPC *ipc, int which,
1729 struct ExpirePolicy **policy, char *cret)
1731 static char *proto[] = {"room", "floor", "site"};
1735 if (!cret) return -2;
1736 if (!policy) return -2;
1737 if (!*policy) *policy = (struct ExpirePolicy *)calloc(1, sizeof(struct ExpirePolicy));
1738 if (!*policy) return -1;
1739 if (which < 0 || which > 2) return -2;
1741 sprintf(aaa, "GPEX %s", proto[which]);
1742 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1743 if (ret / 100 == 2) {
1744 policy[0]->expire_mode = extract_int(cret, 0);
1745 policy[0]->expire_value = extract_int(cret, 1);
1753 /* which is 0 = room, 1 = floor, 2 = site */
1754 /* policy is 0 = inherit, 1 = no purge, 2 = by count, 3 = by age (days) */
1755 int CtdlIPCSetMessageExpirationPolicy(CtdlIPC *ipc, int which,
1756 struct ExpirePolicy *policy, char *cret)
1759 char *whichvals[] = { "room", "floor", "site" };
1761 if (!cret) return -2;
1762 if (which < 0 || which > 2) return -2;
1763 if (!policy) return -2;
1764 if (policy->expire_mode < 0 || policy->expire_mode > 3) return -2;
1765 if (policy->expire_mode >= 2 && policy->expire_value < 1) return -2;
1767 sprintf(aaa, "SPEX %s|%d|%d", whichvals[which],
1768 policy->expire_mode, policy->expire_value);
1769 return CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1774 int CtdlIPCGetSystemConfig(CtdlIPC *ipc, char **listing, char *cret)
1778 if (!cret) return -2;
1779 if (!listing) return -2;
1780 if (*listing) return -2;
1782 return CtdlIPCGenericCommand(ipc, "CONF GET", NULL, 0,
1783 listing, &bytes, cret);
1788 int CtdlIPCSetSystemConfig(CtdlIPC *ipc, const char *listing, char *cret)
1790 if (!cret) return -2;
1791 if (!listing) return -2;
1793 return CtdlIPCGenericCommand(ipc, "CONF SET", listing, strlen(listing),
1799 int CtdlIPCGetSystemConfigByType(CtdlIPC *ipc, const char *mimetype,
1800 char **listing, char *cret)
1805 if (!cret) return -2;
1806 if (!mimetype) return -2;
1807 if (!listing) return -2;
1808 if (*listing) return -2;
1810 aaa = malloc(strlen(mimetype) + 13);
1811 if (!aaa) return -1;
1812 sprintf(aaa, "CONF GETSYS|%s", mimetype);
1813 return CtdlIPCGenericCommand(ipc, aaa, NULL, 0,
1814 listing, &bytes, cret);
1819 int CtdlIPCSetSystemConfigByType(CtdlIPC *ipc, const char *mimetype,
1820 const char *listing, char *cret)
1824 if (!cret) return -2;
1825 if (!mimetype) return -2;
1826 if (!listing) return -2;
1828 aaa = malloc(strlen(mimetype) + 13);
1829 if (!aaa) return -1;
1830 sprintf(aaa, "CONF PUTSYS|%s", mimetype);
1831 return CtdlIPCGenericCommand(ipc, aaa, listing, strlen(listing),
1837 int CtdlIPCRequestClientLogout(CtdlIPC *ipc, int session, char *cret)
1841 if (!cret) return -2;
1842 if (session < 0) return -2;
1844 sprintf(aaa, "REQT %d", session);
1845 return CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1850 int CtdlIPCSetMessageSeen(CtdlIPC *ipc, long msgnum, int seen, char *cret)
1854 if (!cret) return -2;
1855 if (msgnum < 0) return -2;
1857 sprintf(aaa, "SEEN %ld|%d", msgnum, seen ? 1 : 0);
1858 return CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1863 int CtdlIPCStartEncryption(CtdlIPC *ipc, char *cret)
1872 /* New SSL object */
1873 temp_ssl = SSL_new(ssl_ctx);
1875 error_printf("SSL_new failed: %s\n",
1876 ERR_reason_error_string(ERR_get_error()));
1879 /* Pointless flag waving */
1880 #if SSLEAY_VERSION_NUMBER >= 0x0922
1881 SSL_set_session_id_context(temp_ssl, "Citadel/UX SID", 14);
1884 if (!access("/var/run/egd-pool", F_OK))
1885 RAND_egd("/var/run/egd-pool");
1887 if (!RAND_status()) {
1888 error_printf("PRNG not properly seeded\n");
1892 /* Associate network connection with SSL object */
1893 if (SSL_set_fd(temp_ssl, ipc->sock) < 1) {
1894 error_printf("SSL_set_fd failed: %s\n",
1895 ERR_reason_error_string(ERR_get_error()));
1899 if (status_hook != NULL)
1900 status_hook("Requesting encryption...\r");
1902 /* Ready to start SSL/TLS */
1904 CtdlIPC_putline(ipc, "STLS");
1905 CtdlIPC_getline(ipc, buf);
1906 if (buf[0] != '2') {
1907 error_printf("Server can't start TLS: %s\n", buf);
1911 r = CtdlIPCGenericCommand(ipc,
1912 "STLS", NULL, 0, NULL, NULL, cret);
1914 error_printf("Server can't start TLS: %s\n", buf);
1919 /* Do SSL/TLS handshake */
1920 if ((a = SSL_connect(temp_ssl)) < 1) {
1921 error_printf("SSL_connect failed: %s\n",
1922 ERR_reason_error_string(ERR_get_error()));
1926 ipc->ssl = temp_ssl;
1928 BIO_set_close(ipc->ssl->rbio, BIO_NOCLOSE);
1932 bits = SSL_CIPHER_get_bits(SSL_get_current_cipher(ipc->ssl), &alg_bits);
1933 error_printf("Encrypting with %s cipher %s (%d of %d bits)\n",
1934 SSL_CIPHER_get_version(SSL_get_current_cipher(ipc->ssl)),
1935 SSL_CIPHER_get_name(SSL_get_current_cipher(ipc->ssl)),
1941 #endif /* HAVE_OPENSSL */
1946 static void endtls(SSL *ssl)
1957 int CtdlIPCDirectoryLookup(CtdlIPC *ipc, const char *address, char *cret)
1961 if (!address) return -2;
1962 if (!cret) return -2;
1964 aaa = (char *)malloc(strlen(address) + 6);
1965 if (!aaa) return -1;
1967 sprintf(aaa, "QDIR %s", address);
1968 return CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1973 int CtdlIPCInternalProgram(CtdlIPC *ipc, int secret, char *cret)
1977 if (!cret) return -2;
1978 sprintf(aaa, "IPGM %d", secret);
1979 return CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1984 int CtdlIPCMessageBaseCheck(CtdlIPC *ipc, char **mret, char *cret)
1988 if (!cret) return -2;
1989 if (!mret) return -2;
1990 if (*mret) return -2;
1992 return CtdlIPCGenericCommand(ipc, "FSCK", NULL, 0, mret, &size, cret);
2013 /* ************************************************************************** */
2014 /* Stuff below this line is not for public consumption */
2015 /* ************************************************************************** */
2018 inline void CtdlIPC_lock(CtdlIPC *ipc)
2020 if (ipc->network_status_cb) ipc->network_status_cb(1);
2021 #ifdef THREADED_CLIENT
2022 pthread_mutex_lock(&(ipc->mutex));
2027 inline void CtdlIPC_unlock(CtdlIPC *ipc)
2029 #ifdef THREADED_CLIENT
2030 pthread_mutex_unlock(&(ipc->mutex));
2032 if (ipc->network_status_cb) ipc->network_status_cb(0);
2036 /* Read a listing from the server up to 000. Append to dest if it exists */
2037 char *CtdlIPCReadListing(CtdlIPC *ipc, char *dest)
2046 length = strlen(ret);
2051 while (CtdlIPC_getline(ipc, aaa), strcmp(aaa, "000")) {
2052 linelength = strlen(aaa);
2053 ret = (char *)realloc(ret, (size_t)(length + linelength + 2));
2055 strcpy(&ret[length], aaa);
2056 length += linelength;
2057 strcpy(&ret[length++], "\n");
2065 /* Send a listing to the server; generate the ending 000. */
2066 int CtdlIPCSendListing(CtdlIPC *ipc, const char *listing)
2070 text = (char *)malloc(strlen(listing) + 6);
2072 strcpy(text, listing);
2073 while (text[strlen(text) - 1] == '\n')
2074 text[strlen(text) - 1] = '\0';
2075 strcat(text, "\n000");
2076 CtdlIPC_putline(ipc, text);
2080 /* Malloc failed but we are committed to send */
2081 /* This may result in extra blanks at the bottom */
2082 CtdlIPC_putline(ipc, text);
2083 CtdlIPC_putline(ipc, "000");
2089 /* Partial read of file from server */
2090 size_t CtdlIPCPartialRead(CtdlIPC *ipc, void **buf, size_t offset, size_t bytes, char *cret)
2092 register size_t len = 0;
2096 if (!cret) return 0;
2097 if (bytes < 1) return 0;
2098 if (offset < 0) return 0;
2101 sprintf(aaa, "READ %d|%d", (int)offset, (int)bytes);
2102 CtdlIPC_putline(ipc, aaa);
2103 CtdlIPC_getline(ipc, aaa);
2105 strcpy(cret, &aaa[4]);
2107 len = extract_long(&aaa[4], 0);
2108 *buf = (void *)realloc(*buf, (size_t)(offset + len));
2110 /* I know what I'm doing */
2111 serv_read(ipc, (*buf + offset), len);
2113 /* We have to read regardless */
2114 serv_read(ipc, aaa, len);
2118 CtdlIPC_unlock(ipc);
2124 int CtdlIPCEndDownload(CtdlIPC *ipc, char *cret)
2128 if (!cret) return -2;
2129 if (!ipc->downloading) return -2;
2131 ret = CtdlIPCGenericCommand(ipc, "CLOS", NULL, 0, NULL, NULL, cret);
2133 ipc->downloading = 0;
2139 int CtdlIPCSpecifyPreferredFormats(CtdlIPC *ipc, char *cret, char *formats) {
2143 snprintf(cmd, sizeof cmd, "MSGP %s", formats);
2144 ret = CtdlIPCGenericCommand(ipc, cmd, NULL, 0, NULL, NULL, cret);
2151 int CtdlIPCReadDownload(CtdlIPC *ipc, void **buf, size_t bytes, size_t resume,
2152 void (*progress_gauge_callback)(unsigned long, unsigned long),
2155 register size_t len;
2157 if (!cret) return -1;
2158 if (!buf) return -1;
2159 if (*buf) return -1;
2160 if (!ipc->downloading) return -1;
2163 if (progress_gauge_callback)
2164 progress_gauge_callback(len, bytes);
2165 while (len < bytes) {
2166 register size_t block;
2168 block = CtdlIPCPartialRead(ipc, buf, len, 4096, cret);
2174 if (progress_gauge_callback)
2175 progress_gauge_callback(len, bytes);
2181 /* READ - pipelined */
2182 int CtdlIPCHighSpeedReadDownload(CtdlIPC *ipc, void **buf, size_t bytes,
2184 void (*progress_gauge_callback)(unsigned long, unsigned long),
2187 register size_t len;
2188 register int calls; /* How many calls in the pipeline */
2189 register int i; /* iterator */
2192 if (!cret) return -1;
2193 if (!buf) return -1;
2194 if (*buf) return -1;
2195 if (!ipc->downloading) return -1;
2197 *buf = (void *)realloc(*buf, bytes - resume);
2198 if (!*buf) return -1;
2202 if (progress_gauge_callback)
2203 progress_gauge_callback(len, bytes);
2205 /* How many calls will be in the pipeline? */
2206 calls = (bytes - resume) / 4096;
2207 if ((bytes - resume) % 4096) calls++;
2209 /* Send all requests at once */
2210 for (i = 0; i < calls; i++) {
2211 sprintf(aaa, "READ %d|4096", (int)(i * 4096 + resume) );
2212 CtdlIPC_putline(ipc, aaa);
2215 /* Receive all responses at once */
2216 for (i = 0; i < calls; i++) {
2217 CtdlIPC_getline(ipc, aaa);
2219 strcpy(cret, &aaa[4]);
2221 len = extract_long(&aaa[4], 0);
2222 /* I know what I'm doing */
2223 serv_read(ipc, ((*buf) + (i * 4096)), len);
2225 if (progress_gauge_callback)
2226 progress_gauge_callback(i * 4096 + len, bytes);
2228 CtdlIPC_unlock(ipc);
2234 int CtdlIPCEndUpload(CtdlIPC *ipc, int discard, char *cret)
2239 if (!cret) return -1;
2240 if (!ipc->uploading) return -1;
2242 sprintf(cmd, "UCLS %d", discard ? 0 : 1);
2243 ret = CtdlIPCGenericCommand(ipc, cmd, NULL, 0, NULL, NULL, cret);
2250 int CtdlIPCWriteUpload(CtdlIPC *ipc, const char *path,
2251 void (*progress_gauge_callback)(unsigned long, unsigned long),
2254 register int ret = -1;
2255 register size_t offset = 0;
2261 if (!cret) return -1;
2262 if (!path) return -1;
2263 if (!*path) return -1;
2265 fd = fopen(path, "r");
2268 fseek(fd, 0L, SEEK_END);
2272 if (progress_gauge_callback)
2273 progress_gauge_callback(0, bytes);
2275 while (offset < bytes) {
2276 register size_t to_write;
2278 /* Read some data in */
2279 to_write = fread(buf, 1, 4096, fd);
2281 if (feof(fd) || ferror(fd)) break;
2283 sprintf(aaa, "WRIT %d", (int)to_write);
2284 CtdlIPC_putline(ipc, aaa);
2285 CtdlIPC_getline(ipc, aaa);
2286 strcpy(cret, &aaa[4]);
2288 if (aaa[0] == '7') {
2289 to_write = extract_long(&aaa[4], 0);
2291 serv_write(ipc, buf, to_write);
2293 if (progress_gauge_callback)
2294 progress_gauge_callback(offset, bytes);
2295 /* Detect short reads and back up if needed */
2296 /* offset will never be negative anyway */
2297 fseek(fd, (signed)offset, SEEK_SET);
2302 if (progress_gauge_callback)
2303 progress_gauge_callback(1, 1);
2304 return (!ferror(fd) ? ret : -2);
2309 * Generic command method. This method should handle any server command
2310 * except for CHAT. It takes the following arguments:
2312 * ipc The server to speak with
2313 * command Preformatted command to send to server
2314 * to_send A text or binary file to send to server
2315 * (only sent if server requests it)
2316 * bytes_to_send The number of bytes in to_send (required if
2317 * sending binary, optional if sending listing)
2318 * to_receive Pointer to a NULL pointer, if the server
2319 * sends text or binary we will allocate memory
2320 * for the file and stuff it here
2321 * bytes_to_receive If a file is received, we will store its
2323 * proto_response The protocol response. Caller must provide
2324 * this buffer and ensure that it is at least
2325 * 128 bytes in length.
2327 * This function returns a number equal to the protocol response number,
2328 * -1 if an internal error occurred, -2 if caller provided bad values,
2329 * or 0 - the protocol response number if bad values were found during
2330 * the protocol exchange.
2331 * It stores the protocol response string (minus the number) in
2332 * protocol_response as described above. Some commands send additional
2333 * data in this string.
2335 int CtdlIPCGenericCommand(CtdlIPC *ipc,
2336 const char *command, const char *to_send,
2337 size_t bytes_to_send, char **to_receive,
2338 size_t *bytes_to_receive, char *proto_response)
2344 if (!command) return -2;
2345 if (!proto_response) return -2;
2348 if (ipc->ssl) watch_ssl = 1;
2352 CtdlIPC_putline(ipc, command);
2354 CtdlIPC_getline(ipc, proto_response);
2355 if (proto_response[3] == '*')
2357 ret = atoi(proto_response);
2358 strcpy(proto_response, &proto_response[4]);
2359 switch (ret / 100) {
2360 default: /* Unknown, punt */
2362 case 3: /* MORE_DATA */
2364 /* Don't need to do anything */
2366 case 1: /* LISTING_FOLLOWS */
2367 if (to_receive && !*to_receive && bytes_to_receive) {
2368 *to_receive = CtdlIPCReadListing(ipc, NULL);
2369 } else { /* Drain */
2370 while (CtdlIPC_getline(ipc, buf), strcmp(buf, "000")) ;
2374 case 4: /* SEND_LISTING */
2376 CtdlIPCSendListing(ipc, to_send);
2378 /* No listing given, fake it */
2379 CtdlIPC_putline(ipc, "000");
2383 case 6: /* BINARY_FOLLOWS */
2384 if (to_receive && !*to_receive && bytes_to_receive) {
2386 extract_long(proto_response, 0);
2387 *to_receive = (char *)
2388 malloc((size_t)*bytes_to_receive);
2392 serv_read(ipc, *to_receive,
2399 drain = extract_long(proto_response, 0);
2400 while (drain > SIZ) {
2401 serv_read(ipc, buf, SIZ);
2404 serv_read(ipc, buf, drain);
2408 case 7: /* SEND_BINARY */
2409 if (to_send && bytes_to_send) {
2410 serv_write(ipc, to_send, bytes_to_send);
2411 } else if (bytes_to_send) {
2412 /* Fake it, send nulls */
2415 fake = bytes_to_send;
2416 memset(buf, '\0', SIZ);
2417 while (fake > SIZ) {
2418 serv_write(ipc, buf, SIZ);
2421 serv_write(ipc, buf, fake);
2423 } /* else who knows? DANGER WILL ROBINSON */
2425 case 8: /* START_CHAT_MODE */
2426 if (!strncasecmp(command, "CHAT", 4)) {
2427 /* Don't call chatmode with generic! */
2428 CtdlIPC_putline(ipc, "/quit");
2431 /* In this mode we send then receive listing */
2433 CtdlIPCSendListing(ipc, to_send);
2435 /* No listing given, fake it */
2436 CtdlIPC_putline(ipc, "000");
2439 if (to_receive && !*to_receive
2440 && bytes_to_receive) {
2441 *to_receive = CtdlIPCReadListing(ipc, NULL);
2442 } else { /* Drain */
2443 while (CtdlIPC_getline(ipc, buf),
2444 strcmp(buf, "000")) ;
2449 case 9: /* ASYNC_MSG */
2450 /* CtdlIPCDoAsync(ret, proto_response); */
2451 free(CtdlIPCReadListing(ipc, NULL)); /* STUB FIXME */
2457 CtdlIPC_unlock(ipc);
2462 static int connectsock(char *host, char *service, char *protocol, int defaultPort)
2464 struct hostent *phe;
2465 struct servent *pse;
2466 struct protoent *ppe;
2467 struct sockaddr_in sin;
2470 memset(&sin, 0, sizeof(sin));
2471 sin.sin_family = AF_INET;
2473 pse = getservbyname(service, protocol);
2475 sin.sin_port = pse->s_port;
2477 else if (atoi(service) > 0) {
2478 sin.sin_port = htons(atoi(service));
2481 sin.sin_port = htons(defaultPort);
2483 phe = gethostbyname(host);
2485 memcpy(&sin.sin_addr, phe->h_addr, phe->h_length);
2486 } else if ((sin.sin_addr.s_addr = inet_addr(host)) == INADDR_NONE) {
2489 if ((ppe = getprotobyname(protocol)) == 0) {
2492 if (!strcmp(protocol, "udp")) {
2498 s = socket(PF_INET, type, ppe->p_proto);
2503 if (connect(s, (struct sockaddr *) &sin, sizeof(sin)) < 0) {
2510 static int uds_connectsock(int *isLocal, char *sockpath)
2512 struct sockaddr_un addr;
2515 memset(&addr, 0, sizeof(addr));
2516 addr.sun_family = AF_UNIX;
2517 safestrncpy(addr.sun_path, sockpath, sizeof addr.sun_path);
2519 s = socket(AF_UNIX, SOCK_STREAM, 0);
2524 if (connect(s, (struct sockaddr *) &addr, sizeof(addr)) < 0) {
2534 * input binary data from socket
2536 static void serv_read(CtdlIPC *ipc, char *buf, unsigned int bytes)
2538 unsigned int len, rlen;
2540 #if defined(HAVE_OPENSSL)
2542 serv_read_ssl(ipc, buf, bytes);
2547 while (len < bytes) {
2548 rlen = read(ipc->sock, &buf[len], bytes - len);
2550 connection_died(ipc);
2559 * send binary to server
2561 static void serv_write(CtdlIPC *ipc, const char *buf, unsigned int nbytes)
2563 unsigned int bytes_written = 0;
2566 #if defined(HAVE_OPENSSL)
2568 serv_write_ssl(ipc, buf, nbytes);
2572 while (bytes_written < nbytes) {
2573 retval = write(ipc->sock, &buf[bytes_written],
2574 nbytes - bytes_written);
2576 connection_died(ipc);
2579 bytes_written += retval;
2586 * input binary data from encrypted connection
2588 static void serv_read_ssl(CtdlIPC* ipc, char *buf, unsigned int bytes)
2594 while (len < bytes) {
2595 if (SSL_want_read(ipc->ssl)) {
2596 if ((SSL_write(ipc->ssl, junk, 0)) < 1) {
2597 error_printf("SSL_write in serv_read:\n");
2598 ERR_print_errors_fp(stderr);
2601 rlen = SSL_read(ipc->ssl, &buf[len], bytes - len);
2605 errval = SSL_get_error(ipc->ssl, rlen);
2606 if (errval == SSL_ERROR_WANT_READ ||
2607 errval == SSL_ERROR_WANT_WRITE) {
2611 if (errval == SSL_ERROR_ZERO_RETURN ||
2612 errval == SSL_ERROR_SSL) {
2613 serv_read(ipc, &buf[len], bytes - len);
2616 error_printf("SSL_read in serv_read:\n");
2617 ERR_print_errors_fp(stderr);
2618 connection_died(NULL);
2627 * send binary to server encrypted
2629 static void serv_write_ssl(CtdlIPC *ipc, const char *buf, unsigned int nbytes)
2631 unsigned int bytes_written = 0;
2635 while (bytes_written < nbytes) {
2636 if (SSL_want_write(ipc->ssl)) {
2637 if ((SSL_read(ipc->ssl, junk, 0)) < 1) {
2638 error_printf("SSL_read in serv_write:\n");
2639 ERR_print_errors_fp(stderr);
2642 retval = SSL_write(ipc->ssl, &buf[bytes_written],
2643 nbytes - bytes_written);
2647 errval = SSL_get_error(ipc->ssl, retval);
2648 if (errval == SSL_ERROR_WANT_READ ||
2649 errval == SSL_ERROR_WANT_WRITE) {
2653 if (errval == SSL_ERROR_ZERO_RETURN ||
2654 errval == SSL_ERROR_SSL) {
2655 serv_write(ipc, &buf[bytes_written],
2656 nbytes - bytes_written);
2659 error_printf("SSL_write in serv_write:\n");
2660 ERR_print_errors_fp(stderr);
2661 connection_died(NULL);
2664 bytes_written += retval;
2669 static void CtdlIPC_init_OpenSSL(void)
2672 SSL_METHOD *ssl_method;
2675 /* already done init */
2683 SSL_load_error_strings();
2684 SSLeay_add_ssl_algorithms();
2686 /* Set up the SSL context in which we will oeprate */
2687 ssl_method = SSLv23_client_method();
2688 ssl_ctx = SSL_CTX_new(ssl_method);
2690 error_printf("SSL_CTX_new failed: %s\n",
2691 ERR_reason_error_string(ERR_get_error()));
2694 /* Any reasonable cipher we can get */
2695 if (!(SSL_CTX_set_cipher_list(ssl_ctx, CIT_CIPHERS))) {
2696 error_printf("No ciphers available for encryption\n");
2699 SSL_CTX_set_session_cache_mode(ssl_ctx, SSL_SESS_CACHE_BOTH);
2701 /* Load DH parameters into the context */
2704 error_printf("Can't allocate a DH object: %s\n",
2705 ERR_reason_error_string(ERR_get_error()));
2708 if (!(BN_hex2bn(&(dh->p), DH_P))) {
2709 error_printf("Can't assign DH_P: %s\n",
2710 ERR_reason_error_string(ERR_get_error()));
2714 if (!(BN_hex2bn(&(dh->g), DH_G))) {
2715 error_printf("Can't assign DH_G: %s\n",
2716 ERR_reason_error_string(ERR_get_error()));
2721 SSL_CTX_set_tmp_dh(ssl_ctx, dh);
2724 #ifdef THREADED_CLIENT
2725 /* OpenSSL requires callbacks for threaded clients */
2726 CRYPTO_set_locking_callback(ssl_lock);
2727 CRYPTO_set_id_callback(id_callback);
2729 /* OpenSSL requires us to do semaphores for threaded clients */
2730 Critters = malloc(CRYPTO_num_locks() * sizeof (pthread_mutex_t *));
2732 perror("malloc failed");
2735 for (a = 0; a < CRYPTO_num_locks(); a++) {
2736 Critters[a] = malloc(sizeof (pthread_mutex_t));
2738 perror("malloc failed");
2741 pthread_mutex_init(Critters[a], NULL);
2744 #endif /* THREADED_CLIENT */
2748 static void ssl_lock(int mode, int n, const char *file, int line)
2750 #ifdef THREADED_CLIENT
2751 if (mode & CRYPTO_LOCK)
2752 pthread_mutex_lock(Critters[n]);
2754 pthread_mutex_unlock(Critters[n]);
2755 #endif /* THREADED_CLIENT */
2758 #ifdef THREADED_CLIENT
2759 static unsigned long id_callback(void) {
2760 return (unsigned long)pthread_self();
2762 #endif /* THREADED_CLIENT */
2763 #endif /* HAVE_OPENSSL */
2767 * input string from socket - implemented in terms of serv_read()
2769 void CtdlIPC_getline(CtdlIPC* ipc, char *buf)
2773 /* Read one character at a time. */
2775 serv_read(ipc, &buf[i], 1);
2776 if (buf[i] == '\n' || i == (SIZ-1))
2780 /* If we got a long line, discard characters until the newline. */
2782 while (buf[i] != '\n')
2783 serv_read(ipc, &buf[i], 1);
2785 /* Strip the trailing newline.
2792 * send line to server - implemented in terms of serv_write()
2794 void CtdlIPC_putline(CtdlIPC *ipc, const char *buf)
2796 /* error_printf("< %s\n", buf); */
2797 serv_write(ipc, buf, strlen(buf));
2798 serv_write(ipc, "\n", 1);
2800 ipc->last_command_sent = time(NULL);
2807 CtdlIPC* CtdlIPC_new(int argc, char **argv, char *hostbuf, char *portbuf)
2814 CtdlIPC *ipc = ialloc(CtdlIPC);
2818 #if defined(HAVE_OPENSSL)
2820 CtdlIPC_init_OpenSSL();
2822 #if defined(HAVE_PTHREAD_H)
2823 pthread_mutex_init(&(ipc->mutex), NULL); /* Default fast mutex */
2825 ipc->sock = -1; /* Not connected */
2826 ipc->isLocal = 0; /* Not local, of course! */
2827 ipc->downloading = 0;
2829 ipc->last_command_sent = 0L;
2830 ipc->network_status_cb = NULL;
2832 strcpy(cithost, DEFAULT_HOST); /* default host */
2833 strcpy(citport, DEFAULT_PORT); /* default port */
2835 for (a = 0; a < argc; ++a) {
2838 } else if (a == 1) {
2839 strcpy(cithost, argv[a]);
2840 } else if (a == 2) {
2841 strcpy(citport, argv[a]);
2843 error_printf("%s: usage: ",argv[0]);
2844 error_printf("%s [host] [port] ",argv[0]);
2851 if ((!strcmp(cithost, "localhost"))
2852 || (!strcmp(cithost, "127.0.0.1"))) {
2856 /* If we're using a unix domain socket we can do a bunch of stuff */
2857 if (!strcmp(cithost, UDS)) {
2858 snprintf(sockpath, sizeof sockpath, BBSDIR "/citadel.socket");
2859 ipc->sock = uds_connectsock(&(ipc->isLocal), sockpath);
2860 if (ipc->sock == -1) {
2864 if (hostbuf != NULL) strcpy(hostbuf, cithost);
2865 if (portbuf != NULL) strcpy(portbuf, sockpath);
2869 ipc->sock = connectsock(cithost, citport, "tcp", 504);
2870 if (ipc->sock == -1) {
2874 if (hostbuf != NULL) strcpy(hostbuf, cithost);
2875 if (portbuf != NULL) strcpy(portbuf, citport);
2880 * return the file descriptor of the server socket so we can select() on it.
2882 * FIXME: This is only used in chat mode; eliminate it when chat mode gets
2885 int CtdlIPC_getsockfd(CtdlIPC* ipc)
2892 * return one character
2894 * FIXME: This is only used in chat mode; eliminate it when chat mode gets
2897 char CtdlIPC_get(CtdlIPC* ipc)
2902 serv_read(ipc, buf, 1);