1 /* needed to properly enable crypt() stuff on some systems */
10 #include <sys/types.h>
19 extern struct config config;
23 * hash() - hash table function for user lookup
30 for (i=0; i<strlen(str); ++i) h=h+((i+1)*tolower(str[i]));
36 * getuser() - retrieve named user into supplied buffer.
37 * returns 0 on success
39 int getuser(struct usersupp *usbuf, char name[]) {
41 char lowercase_name[32];
43 struct cdbdata *cdbus;
45 bzero(usbuf, sizeof(struct usersupp));
46 for (a=0; a<=strlen(name); ++a) {
47 lowercase_name[a] = tolower(name[a]);
50 cdbus = cdb_fetch(CDB_USERSUPP, lowercase_name, strlen(lowercase_name));
51 if (cdbus == NULL) { /* not found */
55 memcpy(usbuf, cdbus->ptr, cdbus->len);
62 * lgetuser() - same as getuser() but locks the record
64 int lgetuser(struct usersupp *usbuf, char *name)
68 retcode = getuser(usbuf,name);
70 begin_critical_section(S_USERSUPP);
77 * putuser() - write user buffer into the correct place on disk
79 void putuser(struct usersupp *usbuf, char *name)
81 char lowercase_name[32];
84 for (a=0; a<=strlen(name); ++a) {
85 lowercase_name[a] = tolower(name[a]);
88 cdb_store(CDB_USERSUPP, lowercase_name, strlen(lowercase_name),
89 usbuf, sizeof(struct usersupp));
95 * lputuser() - same as putuser() but locks the record
97 void lputuser(struct usersupp *usbuf, char *name)
100 end_critical_section(S_USERSUPP);
105 * Is the user currently logged in an Aide?
108 if (CC->usersupp.axlevel >= 6) return(1);
114 * Is the user currently logged in an Aide *or* the room aide for this room?
116 int is_room_aide(void) {
117 if ( (CC->usersupp.axlevel >= 6)
118 || (CC->quickroom.QRroomaide == CC->usersupp.usernum) ) return(1);
123 * getuserbynumber() - get user by number
124 * returns 0 if user was found
126 int getuserbynumber(struct usersupp *usbuf, long int number)
128 struct cdbdata *cdbus;
130 cdb_rewind(CDB_USERSUPP);
132 while(cdbus = cdb_next_item(CDB_USERSUPP), cdbus != NULL) {
133 bzero(usbuf, sizeof(struct usersupp));
134 memcpy(usbuf, cdbus->ptr, cdbus->len);
136 if (usbuf->usernum == number) {
147 void cmd_user(char *cmdbuf)
155 extract(username,cmdbuf,0);
159 if ((CC->logged_in)) {
160 cprintf("%d Already logged in.\n",ERROR);
164 found_user = getuser(&CC->usersupp,username);
165 if (found_user != 0) {
166 p = (struct passwd *)getpwnam(username);
168 strcpy(autoname,p->pw_gecos);
169 for (a=0; a<strlen(autoname); ++a)
170 if (autoname[a]==',') autoname[a]=0;
171 found_user = getuser(&CC->usersupp,autoname);
174 if (found_user == 0) {
175 if (((CC->nologin)) && (CC->usersupp.axlevel < 6)) {
176 cprintf("%d %s: Too many users are already online (maximum is %d)\n",
177 ERROR+MAX_SESSIONS_EXCEEDED,
178 config.c_nodename,config.c_maxsessions);
181 strcpy(CC->curr_user,CC->usersupp.fullname);
182 cprintf("%d Password required for %s\n",
183 MORE_DATA,CC->curr_user);
187 cprintf("%d %s not found.\n",ERROR,username);
194 * session startup code which is common to both cmd_pass() and cmd_newu()
196 void session_startup(void) {
200 syslog(LOG_NOTICE,"user <%s> logged in",CC->curr_user);
201 hook_user_login(CC->cs_pid, CC->curr_user);
202 lgetuser(&CC->usersupp,CC->curr_user);
203 ++(CC->usersupp.timescalled);
204 CC->fake_username[0] = '\0';
205 CC->fake_postname[0] = '\0';
206 CC->fake_hostname[0] = '\0';
207 CC->fake_roomname[0] = '\0';
208 CC->last_pager[0] = '\0';
209 time(&CC->usersupp.lastcall);
211 /* If this user's name is the name of the system administrator
212 * (as specified in setup), automatically assign access level 6.
214 if (!strcasecmp(CC->usersupp.fullname, config.c_sysadm)) {
215 CC->usersupp.axlevel = 6;
218 /* A room's generation number changes each time it is recycled. Users are kept
219 * out of private rooms or forget rooms by matching the generation numbers. To
220 * avoid an accidental matchup, unmatched numbers are set to -1 here.
222 for (a=0; a<MAXROOMS; ++a) {
224 if (CC->usersupp.generation[a] != qr.QRgen)
225 CC->usersupp.generation[a]=(-1);
226 if (CC->usersupp.forget[a] != qr.QRgen)
227 CC->usersupp.forget[a]=(-1);
230 lputuser(&CC->usersupp,CC->curr_user);
232 cprintf("%d %s|%d|%d|%d|%u|%ld\n",OK,CC->usersupp.fullname,CC->usersupp.axlevel,
233 CC->usersupp.timescalled,CC->usersupp.posted,CC->usersupp.flags,
234 CC->usersupp.usernum);
235 usergoto(0,0); /* Enter the lobby */
236 rec_log(CL_LOGIN,CC->curr_user);
242 * misc things to be taken care of when a user is logged out
244 void logout(struct CitContext *who)
247 if (who->download_fp != NULL) {
248 fclose(who->download_fp);
249 who->download_fp = NULL;
251 if (who->upload_fp != NULL) {
257 void cmd_pass(char *buf)
263 extract(password,buf,0);
265 if ((CC->logged_in)) {
266 cprintf("%d Already logged in.\n",ERROR);
269 if (!strcmp(CC->curr_user,"")) {
270 cprintf("%d You must send a name with USER first.\n",ERROR);
273 if (getuser(&CC->usersupp,CC->curr_user)) {
274 cprintf("%d Can't find user record!\n",ERROR+INTERNAL_ERROR);
279 if (CC->usersupp.USuid == BBSUID) {
281 strproc(CC->usersupp.password);
282 code = strcasecmp(CC->usersupp.password,password);
285 p = (struct passwd *)getpwuid(CC->usersupp.USuid);
286 #ifdef ENABLE_AUTOLOGIN
288 if (!strcmp(p->pw_passwd,
289 (char *)crypt(password,p->pw_passwd))) {
291 lgetuser(&CC->usersupp, CC->curr_user);
292 strcpy(CC->usersupp.password, password);
293 lputuser(&CC->usersupp, CC->curr_user);
304 cprintf("%d Wrong password.\n",ERROR);
305 rec_log(CL_BADPW,CC->curr_user);
311 * purge related files when removing or overwriting a user record
313 void purge_user(char *pname) {
315 struct usersupp usbuf;
317 struct cdbdata *cdbmb;
321 if (getuser(&usbuf, pname) != 0) {
322 lprintf(5, "Cannot purge user <%s> - not found\n", pname);
326 /* delete any messages in the user's mailbox */
327 cdbmb = cdb_fetch(CDB_MAILBOXES, &usbuf.usernum, sizeof(long));
329 num_mails = cdbmb->len / sizeof(long);
330 mailbox = (long *) cdbmb->ptr;
331 if (num_mails > 0) for (a=0; a<num_mails; ++a) {
332 cdb_delete(CDB_MSGMAIN, &mailbox[a], sizeof(long));
335 /* now delete the mailbox itself */
336 cdb_delete(CDB_MAILBOXES, &usbuf.usernum, sizeof(long));
340 /* delete the userlog entry */
341 cdb_delete(CDB_USERSUPP, pname, strlen(pname));
343 /* remove the user's bio file */
344 sprintf(filename, "./bio/%ld", usbuf.usernum);
347 /* remove the user's picture */
348 sprintf(filename, "./userpics/%ld.gif", usbuf.usernum);
355 * create_user() - back end processing to create a new user
357 int create_user(char *newusername)
359 struct usersupp usbuf;
361 struct passwd *p = NULL;
364 strcpy(username, newusername);
367 #ifdef ENABLE_AUTOLOGIN
368 p = (struct passwd *)getpwnam(username);
371 strcpy(username, p->pw_gecos);
372 for (a=0; a<strlen(username); ++a) {
373 if (username[a] == ',') username[a] = 0;
375 CC->usersupp.USuid = p->pw_uid;
378 CC->usersupp.USuid = BBSUID;
381 if (!getuser(&usbuf,username)) {
382 return(ERROR+ALREADY_EXISTS);
385 strcpy(CC->curr_user,username);
386 strcpy(CC->usersupp.fullname,username);
389 for (a=0; a<MAXROOMS; ++a) {
390 CC->usersupp.lastseen[a]=0L;
391 CC->usersupp.generation[a]=(-1);
392 CC->usersupp.forget[a]=(-1);
394 strcpy(CC->usersupp.password,"");
396 /* These are the default flags on new accounts */
398 US_NEEDVALID|US_LASTOLD|US_DISAPPEAR|US_PAGINATOR|US_FLOORS;
400 CC->usersupp.timescalled = 0;
401 CC->usersupp.posted = 0;
402 CC->usersupp.axlevel = INITAX;
403 CC->usersupp.USscreenwidth = 80;
404 CC->usersupp.USscreenheight = 24;
405 time(&CC->usersupp.lastcall);
406 strcpy(CC->usersupp.USname, "");
407 strcpy(CC->usersupp.USaddr, "");
408 strcpy(CC->usersupp.UScity, "");
409 strcpy(CC->usersupp.USstate, "");
410 strcpy(CC->usersupp.USzip, "");
411 strcpy(CC->usersupp.USphone, "");
413 /* fetch a new user number */
414 CC->usersupp.usernum = get_new_user_number();
416 if (CC->usersupp.usernum == 1L) {
417 CC->usersupp.axlevel = 6;
420 /* add user to userlog */
421 putuser(&CC->usersupp,CC->curr_user);
422 if (getuser(&CC->usersupp,CC->curr_user)) {
423 return(ERROR+INTERNAL_ERROR);
425 rec_log(CL_NEWUSER,CC->curr_user);
433 * cmd_newu() - create a new user account
435 void cmd_newu(char *cmdbuf)
440 if ((CC->logged_in)) {
441 cprintf("%d Already logged in.\n",ERROR);
446 cprintf("%d %s: Too many users are already online (maximum is %d)\n",
447 ERROR+MAX_SESSIONS_EXCEEDED,
448 config.c_nodename,config.c_maxsessions);
451 extract(username,cmdbuf,0);
455 if (strlen(username)==0) {
456 cprintf("%d You must supply a user name.\n",ERROR);
460 a = create_user(username);
461 if ((!strcasecmp(username, "bbs")) ||
462 (!strcasecmp(username, "new")) ||
463 (!strcasecmp(username, ".")))
465 cprintf("%d '%s' is an invalid login name.\n", ERROR);
468 if (a==ERROR+ALREADY_EXISTS) {
469 cprintf("%d '%s' already exists.\n",
470 ERROR+ALREADY_EXISTS,username);
473 else if (a==ERROR+INTERNAL_ERROR) {
474 cprintf("%d Internal error - user record disappeared?\n",
475 ERROR+INTERNAL_ERROR);
482 cprintf("%d unknown error\n",ERROR);
484 rec_log(CL_NEWUSER,CC->curr_user);
492 void cmd_setp(char *new_pw)
494 if (!(CC->logged_in)) {
495 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
498 if (CC->usersupp.USuid != BBSUID) {
499 cprintf("%d Not allowed. Use the 'passwd' command.\n",ERROR);
503 if (strlen(new_pw)==0) {
504 cprintf("%d Password unchanged.\n",OK);
507 lgetuser(&CC->usersupp,CC->curr_user);
508 strcpy(CC->usersupp.password,new_pw);
509 lputuser(&CC->usersupp,CC->curr_user);
510 cprintf("%d Password changed.\n",OK);
511 rec_log(CL_PWCHANGE,CC->curr_user);
515 * get user parameters
517 void cmd_getu(void) {
518 if (!(CC->logged_in)) {
519 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
522 getuser(&CC->usersupp,CC->curr_user);
523 cprintf("%d %d|%d|%d\n",OK,CC->usersupp.USscreenwidth,
524 CC->usersupp.USscreenheight,(CC->usersupp.flags & US_USER_SET));
528 * set user parameters
530 void cmd_setu(char *new_parms)
533 if (num_parms(new_parms)!=3) {
534 cprintf("%d Usage error.\n",ERROR);
537 if (!(CC->logged_in)) {
538 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
541 lgetuser(&CC->usersupp,CC->curr_user);
542 CC->usersupp.USscreenwidth = extract_int(new_parms,0);
543 CC->usersupp.USscreenheight = extract_int(new_parms,1);
544 CC->usersupp.flags = CC->usersupp.flags & (~US_USER_SET);
545 CC->usersupp.flags = CC->usersupp.flags |
546 (extract_int(new_parms,2) & US_USER_SET);
547 lputuser(&CC->usersupp,CC->curr_user);
548 cprintf("%d Ok\n",OK);
552 * set last read pointer
554 void cmd_slrp(char *new_ptr)
558 if (!(CC->logged_in)) {
559 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
563 if (CC->curr_rm < 0) {
564 cprintf("%d No current room.\n",ERROR);
568 if (!strncasecmp(new_ptr,"highest",7)) {
569 newlr = CC->quickroom.QRhighest;
572 newlr = atol(new_ptr);
575 lgetuser(&CC->usersupp, CC->curr_user);
576 CC->usersupp.lastseen[CC->curr_rm] = newlr;
577 lputuser(&CC->usersupp, CC->curr_user);
578 cprintf("%d %ld\n",OK,newlr);
583 * INVT and KICK commands
585 void cmd_invt_kick(char *iuser, int op)
587 { /* 1 = invite, 0 = kick out */
588 struct usersupp USscratch;
591 if (!(CC->logged_in)) {
592 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
596 if (CC->curr_rm < 0) {
597 cprintf("%d No current room.\n",ERROR);
601 if (is_room_aide()==0) {
602 cprintf("%d Higher access required.\n",
603 ERROR+HIGHER_ACCESS_REQUIRED);
607 if ( (op==1) && ((CC->quickroom.QRflags&QR_PRIVATE)==0) ) {
608 cprintf("%d Not a private room.\n",ERROR+NOT_HERE);
612 if (lgetuser(&USscratch,iuser)!=0) {
613 cprintf("%d No such user.\n",ERROR);
618 USscratch.generation[CC->curr_rm]=CC->quickroom.QRgen;
619 USscratch.forget[CC->curr_rm]=(-1);
623 USscratch.generation[CC->curr_rm]=(-1);
624 USscratch.forget[CC->curr_rm]=CC->quickroom.QRgen;
627 lputuser(&USscratch,iuser);
629 /* post a message in Aide> saying what we just did */
630 sprintf(bbb,"%s %s %s> by %s",
632 ((op == 1) ? "invited to" : "kicked out of"),
633 CC->quickroom.QRname,
634 CC->usersupp.fullname);
637 if ((op==0)&&((CC->quickroom.QRflags&QR_PRIVATE)==0)) {
638 cprintf("%d Ok. (Not a private room, <Z>ap effect only)\n",OK);
641 cprintf("%d Ok.\n",OK);
648 * forget (Zap) the current room
650 void cmd_forg(void) {
651 if (!(CC->logged_in)) {
652 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
656 if (CC->curr_rm < 0) {
657 cprintf("%d No current room.\n",ERROR);
661 if (CC->curr_rm < 3) {
662 cprintf("%d You cannot forget this room.\n",ERROR+NOT_HERE);
667 cprintf("%d Aides cannot forget rooms.\n",ERROR);
671 lgetuser(&CC->usersupp,CC->curr_user);
672 CC->usersupp.forget[CC->curr_rm] = CC->quickroom.QRgen;
673 CC->usersupp.generation[CC->curr_rm] = (-1);
674 lputuser(&CC->usersupp,CC->curr_user);
675 cprintf("%d Ok\n",OK);
680 * Get Next Unregistered User
682 void cmd_gnur(void) {
683 struct cdbdata *cdbus;
684 struct usersupp usbuf;
686 if (!(CC->logged_in)) {
687 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
691 if (CC->usersupp.axlevel < 6) {
692 cprintf("%d Higher access required.\n",
693 ERROR+HIGHER_ACCESS_REQUIRED);
697 if ((CitControl.MMflags&MM_VALID)==0) {
698 cprintf("%d There are no unvalidated users.\n",OK);
702 /* There are unvalidated users. Traverse the usersupp database,
703 * and return the first user we find that needs validation.
705 cdb_rewind(CDB_USERSUPP);
706 while (cdbus = cdb_next_item(CDB_USERSUPP), cdbus != NULL) {
707 bzero(&usbuf, sizeof(struct usersupp));
708 memcpy(&usbuf, cdbus->ptr, cdbus->len);
710 if ((usbuf.flags & US_NEEDVALID)
711 &&(usbuf.axlevel > 0)) {
712 cprintf("%d %s\n",MORE_DATA,usbuf.fullname);
717 /* If we get to this point, there are no more unvalidated users.
718 * Therefore we clear the "users need validation" flag.
721 begin_critical_section(S_CONTROL);
723 CitControl.MMflags = CitControl.MMflags&(~MM_VALID);
725 end_critical_section(S_CONTROL);
726 cprintf("%d *** End of registration.\n",OK);
733 * get registration info for a user
735 void cmd_greg(char *who)
737 struct usersupp usbuf;
741 if (!(CC->logged_in)) {
742 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
746 if (!strcasecmp(who,"_SELF_")) strcpy(who,CC->curr_user);
748 if ((CC->usersupp.axlevel < 6) && (strcasecmp(who,CC->curr_user))) {
749 cprintf("%d Higher access required.\n",
750 ERROR+HIGHER_ACCESS_REQUIRED);
754 if (getuser(&usbuf,who) != 0) {
755 cprintf("%d '%s' not found.\n",ERROR+NO_SUCH_USER,who);
759 cprintf("%d %s\n",LISTING_FOLLOWS,usbuf.fullname);
760 cprintf("%ld\n",usbuf.usernum);
761 cprintf("%s\n",usbuf.password);
762 cprintf("%s\n",usbuf.USname);
763 cprintf("%s\n",usbuf.USaddr);
764 cprintf("%s\n%s\n%s\n",
765 usbuf.UScity,usbuf.USstate,usbuf.USzip);
766 strcpy(pbuf,usbuf.USphone);
768 for (a=0; a<strlen(pbuf); ++a) {
769 if ((pbuf[a]>='0')&&(pbuf[a]<='9')) {
770 b=strlen(usbuf.USphone);
771 usbuf.USphone[b]=pbuf[a];
772 usbuf.USphone[b+1]=0;
775 while(strlen(usbuf.USphone)<10) {
776 strcpy(pbuf,usbuf.USphone);
777 strcpy(usbuf.USphone," ");
778 strcat(usbuf.USphone,pbuf);
781 cprintf("(%c%c%c) %c%c%c-%c%c%c%c\n",
782 usbuf.USphone[0],usbuf.USphone[1],
783 usbuf.USphone[2],usbuf.USphone[3],
784 usbuf.USphone[4],usbuf.USphone[5],
785 usbuf.USphone[6],usbuf.USphone[7],
786 usbuf.USphone[8],usbuf.USphone[9]);
788 cprintf("%d\n",usbuf.axlevel);
789 cprintf("%s\n",usbuf.USemail);
796 void cmd_vali(char *v_args)
800 struct usersupp userbuf;
802 extract(user,v_args,0);
803 newax = extract_int(v_args,1);
805 if (!(CC->logged_in)) {
806 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
810 if (CC->usersupp.axlevel < 6) {
811 cprintf("%d Higher access required.\n",
812 ERROR+HIGHER_ACCESS_REQUIRED);
816 if (lgetuser(&userbuf,user)!=0) {
817 cprintf("%d '%s' not found.\n",ERROR+NO_SUCH_USER,user);
821 userbuf.axlevel = newax;
822 userbuf.flags = (userbuf.flags & ~US_NEEDVALID);
824 lputuser(&userbuf,user);
826 /* If the access level was set to zero, delete the user */
829 cprintf("%d %s Deleted.\n", OK, userbuf.fullname);
833 cprintf("%d ok\n",OK);
841 void cmd_list(void) {
842 struct usersupp usbuf;
843 struct cdbdata *cdbus;
845 cdb_rewind(CDB_USERSUPP);
846 cprintf("%d \n",LISTING_FOLLOWS);
848 while(cdbus = cdb_next_item(CDB_USERSUPP), cdbus != NULL) {
849 bzero(&usbuf, sizeof(struct usersupp));
850 memcpy(&usbuf, cdbus->ptr, cdbus->len);
853 if (usbuf.axlevel > 0) {
854 if ((CC->usersupp.axlevel>=6)
855 ||((usbuf.flags&US_UNLISTED)==0)
856 ||((CC->internal_pgm))) {
857 cprintf("%s|%d|%ld|%ld|%d|%d|",
864 if (CC->usersupp.axlevel >= 6) cprintf("%s",usbuf.password);
873 * enter registration info
875 void cmd_regi(void) {
887 if (!(CC->logged_in)) {
888 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
900 cprintf("%d Send registration...\n",SEND_LISTING);
902 while (client_gets(buf), strcmp(buf,"000")) {
903 if (a==0) strcpy(tmpname,buf);
904 if (a==1) strcpy(tmpaddr,buf);
905 if (a==2) strcpy(tmpcity,buf);
906 if (a==3) strcpy(tmpstate,buf);
908 for (c=0; c<strlen(buf); ++c) {
909 if ((buf[c]>='0')&&(buf[c]<='9')) {
917 for (c=0; c<strlen(buf); ++c) {
918 if ((buf[c]>='0')&&(buf[c]<='9')) {
925 if (a==6) strncpy(tmpemail,buf,31);
937 lgetuser(&CC->usersupp,CC->curr_user);
938 strcpy(CC->usersupp.USname,tmpname);
939 strcpy(CC->usersupp.USaddr,tmpaddr);
940 strcpy(CC->usersupp.UScity,tmpcity);
941 strcpy(CC->usersupp.USstate,tmpstate);
942 strcpy(CC->usersupp.USzip,tmpzip);
943 strcpy(CC->usersupp.USphone,tmpphone);
944 strcpy(CC->usersupp.USemail,tmpemail);
945 CC->usersupp.flags=(CC->usersupp.flags|US_REGIS|US_NEEDVALID);
946 lputuser(&CC->usersupp,CC->curr_user);
948 /* set global flag calling for validation */
949 begin_critical_section(S_CONTROL);
951 CitControl.MMflags = CitControl.MMflags | MM_VALID ;
953 end_critical_section(S_CONTROL);
954 cprintf("%d *** End of registration.\n",OK);
959 * assorted info we need to check at login
961 void cmd_chek(void) {
966 struct cdbdata *cdbmb;
971 if (!(CC->logged_in)) {
972 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
976 getuser(&CC->usersupp,CC->curr_user); /* no lock is needed here */
977 if ((REGISCALL!=0)&&((CC->usersupp.flags&US_REGIS)==0)) regis = 1;
979 if (CC->usersupp.axlevel >= 6) {
981 if (CitControl.MMflags&MM_VALID) vali = 1;
987 cdbmb = cdb_fetch(CDB_MAILBOXES, &CC->usersupp.usernum, sizeof(long));
989 num_mails = cdbmb->len / sizeof(long);
990 mailbox = (long *) cdbmb->ptr;
991 if (num_mails > 0) for (a=0; a<num_mails; ++a) {
992 if (mailbox[a] > (CC->usersupp.lastseen[1])) ++mail;
998 cprintf("%d %d|%d|%d\n",OK,mail,regis,vali);
1003 * check to see if a user exists
1005 void cmd_qusr(char *who)
1007 struct usersupp usbuf;
1009 if (getuser(&usbuf,who) == 0) {
1010 cprintf("%d %s\n",OK,usbuf.fullname);
1013 cprintf("%d No such user.\n",ERROR+NO_SUCH_USER);
1021 void cmd_ebio(void) {
1025 if (!(CC->logged_in)) {
1026 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
1030 sprintf(buf,"./bio/%ld",CC->usersupp.usernum);
1031 fp = fopen(buf,"w");
1033 cprintf("%d Cannot create file\n",ERROR);
1036 cprintf("%d \n",SEND_LISTING);
1037 while(client_gets(buf), strcmp(buf,"000")) {
1038 fprintf(fp,"%s\n",buf);
1046 void cmd_rbio(char *cmdbuf)
1048 struct usersupp ruser;
1052 extract(buf,cmdbuf,0);
1053 if (getuser(&ruser,buf)!=0) {
1054 cprintf("%d No such user.\n",ERROR+NO_SUCH_USER);
1057 sprintf(buf,"./bio/%ld",ruser.usernum);
1059 fp = fopen(buf,"r");
1061 cprintf("%d %s has no bio on file.\n",
1062 ERROR+FILE_NOT_FOUND,ruser.fullname);
1065 cprintf("%d \n",LISTING_FOLLOWS);
1066 while (fgets(buf,256,fp)!=NULL) cprintf("%s",buf);
1072 * list of users who have entered bios
1074 void cmd_lbio(void) {
1077 struct usersupp usbuf;
1079 ls=popen("cd ./bio; ls","r");
1081 cprintf("%d Cannot open listing.\n",ERROR+FILE_NOT_FOUND);
1085 cprintf("%d\n",LISTING_FOLLOWS);
1086 while (fgets(buf,255,ls)!=NULL)
1087 if (getuserbynumber(&usbuf,atol(buf))==0)
1088 cprintf("%s\n",usbuf.fullname);