1 #define _XOPEN_SOURCE /* needed to properly enable crypt() stuff on some systems */
18 extern struct config config;
22 * pwcrypt() - simple password encryption
24 void pwcrypt(char *text, int code)
27 for (a=0; a<strlen(text); ++a) text[a]=(text[a]^(((code|128)^a)&0xFF));
32 * hash() - hash table function for user lookup
39 for (i=0; i<strlen(str); ++i) h=h+((i+1)*tolower(str[i]));
45 * getuser() - retrieve named user into supplied buffer.
46 * returns 0 on success
48 int getuser(struct usersupp *usbuf, char name[]) {
50 char lowercase_name[32];
52 struct cdbdata *cdbus;
54 bzero(usbuf, sizeof(struct usersupp));
55 for (a=0; a<=strlen(name); ++a) {
56 lowercase_name[a] = tolower(name[a]);
59 cdbus = cdb_fetch(CDB_USERSUPP, lowercase_name, strlen(lowercase_name));
60 if (cdbus == NULL) { /* not found */
64 memcpy(usbuf, cdbus->ptr, cdbus->len);
71 * lgetuser() - same as getuser() but locks the record
73 int lgetuser(struct usersupp *usbuf, char *name)
77 retcode = getuser(usbuf,name);
79 begin_critical_section(S_USERSUPP);
86 * putuser() - write user buffer into the correct place on disk
88 void putuser(struct usersupp *usbuf, char *name)
90 char lowercase_name[32];
93 for (a=0; a<=strlen(name); ++a) {
94 lowercase_name[a] = tolower(name[a]);
97 cdb_store(CDB_USERSUPP, lowercase_name, strlen(lowercase_name),
98 usbuf, sizeof(struct usersupp));
104 * lputuser() - same as putuser() but locks the record
106 void lputuser(struct usersupp *usbuf, char *name)
109 end_critical_section(S_USERSUPP);
114 * Is the user currently logged in an Aide?
117 if (CC->usersupp.axlevel >= 6) return(1);
123 * Is the user currently logged in an Aide *or* the room aide for this room?
125 int is_room_aide(void) {
126 if ( (CC->usersupp.axlevel >= 6)
127 || (CC->quickroom.QRroomaide == CC->usersupp.usernum) ) return(1);
132 * getuserbynumber() - get user by number
133 * returns 0 if user was found
135 int getuserbynumber(struct usersupp *usbuf, long int number)
137 struct cdbdata *cdbus;
139 cdb_rewind(CDB_USERSUPP);
141 while(cdbus = cdb_next_item(CDB_USERSUPP), cdbus != NULL) {
142 bzero(usbuf, sizeof(struct usersupp));
143 memcpy(usbuf, cdbus->ptr, cdbus->len);
145 if (usbuf->usernum == number) {
156 void cmd_user(char *cmdbuf)
164 extract(username,cmdbuf,0);
168 if ((CC->logged_in)) {
169 cprintf("%d Already logged in.\n",ERROR);
173 found_user = getuser(&CC->usersupp,username);
174 if (found_user != 0) {
175 p = (struct passwd *)getpwnam(username);
177 strcpy(autoname,p->pw_gecos);
178 for (a=0; a<strlen(autoname); ++a)
179 if (autoname[a]==',') autoname[a]=0;
180 found_user = getuser(&CC->usersupp,autoname);
183 if (found_user == 0) {
184 if (((CC->nologin)) && (CC->usersupp.axlevel < 6)) {
185 cprintf("%d %s: Too many users are already online (maximum is %d)\n",
186 ERROR+MAX_SESSIONS_EXCEEDED,
187 config.c_nodename,config.c_maxsessions);
190 strcpy(CC->curr_user,CC->usersupp.fullname);
191 cprintf("%d Password required for %s\n",
192 MORE_DATA,CC->curr_user);
196 cprintf("%d %s not found.\n",ERROR,username);
203 * session startup code which is common to both cmd_pass() and cmd_newu()
205 void session_startup(void) {
209 syslog(LOG_NOTICE,"user <%s> logged in",CC->curr_user);
210 hook_user_login(CC->cs_pid, CC->curr_user);
211 lgetuser(&CC->usersupp,CC->curr_user);
212 ++(CC->usersupp.timescalled);
214 CC->fake_username[0] = '\0';
215 CC->fake_postname[0] = '\0';
216 CC->fake_hostname[0] = '\0';
217 CC->fake_roomname[0] = '\0';
218 CC->last_pager[0] = '\0';
220 time(&CC->usersupp.lastcall);
222 /* If this user's name is the name of the system administrator
223 * (as specified in setup), automatically assign access level 6.
225 if (!strucmp(CC->usersupp.fullname, config.c_sysadm)) {
226 CC->usersupp.axlevel = 6;
229 /* A room's generation number changes each time it is recycled. Users are kept
230 * out of private rooms or forget rooms by matching the generation numbers. To
231 * avoid an accidental matchup, unmatched numbers are set to -1 here.
233 for (a=0; a<MAXROOMS; ++a) {
235 if (CC->usersupp.generation[a] != qr.QRgen)
236 CC->usersupp.generation[a]=(-1);
237 if (CC->usersupp.forget[a] != qr.QRgen)
238 CC->usersupp.forget[a]=(-1);
241 lputuser(&CC->usersupp,CC->curr_user);
243 cprintf("%d %s|%d|%d|%d|%u|%ld\n",OK,CC->usersupp.fullname,CC->usersupp.axlevel,
244 CC->usersupp.timescalled,CC->usersupp.posted,CC->usersupp.flags,
245 CC->usersupp.usernum);
246 usergoto(0,0); /* Enter the lobby */
247 rec_log(CL_LOGIN,CC->curr_user);
253 * misc things to be taken care of when a user is logged out
255 void logout(struct CitContext *who)
258 if (who->download_fp != NULL) {
259 fclose(who->download_fp);
260 who->download_fp = NULL;
262 if (who->upload_fp != NULL) {
268 void cmd_pass(char *buf)
274 extract(password,buf,0);
276 if ((CC->logged_in)) {
277 cprintf("%d Already logged in.\n",ERROR);
280 if (!strcmp(CC->curr_user,"")) {
281 cprintf("%d You must send a name with USER first.\n",ERROR);
284 if (getuser(&CC->usersupp,CC->curr_user)) {
285 cprintf("%d Can't find user record!\n",ERROR+INTERNAL_ERROR);
290 if (CC->usersupp.USuid == BBSUID) {
292 pwcrypt(CC->usersupp.password,config.c_pwcrypt);
293 strproc(CC->usersupp.password);
294 code = strucmp(CC->usersupp.password,password);
295 pwcrypt(CC->usersupp.password,config.c_pwcrypt);
298 p = (struct passwd *)getpwuid(CC->usersupp.USuid);
299 #ifdef ENABLE_AUTOLOGIN
301 if (!strcmp(p->pw_passwd,
302 (char *)crypt(password,p->pw_passwd))) {
304 lgetuser(&CC->usersupp, CC->curr_user);
305 strcpy(CC->usersupp.password, password);
306 pwcrypt(CC->usersupp.password, config.c_pwcrypt);
307 lputuser(&CC->usersupp, CC->curr_user);
318 cprintf("%d Wrong password.\n",ERROR);
319 rec_log(CL_BADPW,CC->curr_user);
325 * purge related files when removing or overwriting a user record
327 void purge_user(pnum)
331 /* remove the user's bio file */
332 sprintf(filename, "./bio/%ld", pnum);
335 /* remove the user's picture */
336 sprintf(filename, "./userpics/%ld.gif", pnum);
343 * create_user() - back end processing to create a new user
345 int create_user(char *newusername)
347 struct usersupp usbuf;
350 struct passwd *p = NULL;
353 strcpy(username, newusername);
356 #ifdef ENABLE_AUTOLOGIN
357 p = (struct passwd *)getpwnam(username);
360 strcpy(username, p->pw_gecos);
361 for (a=0; a<strlen(username); ++a) {
362 if (username[a] == ',') username[a] = 0;
364 CC->usersupp.USuid = p->pw_uid;
367 CC->usersupp.USuid = BBSUID;
370 if (!getuser(&usbuf,username)) {
371 return(ERROR+ALREADY_EXISTS);
374 strcpy(CC->curr_user,username);
375 strcpy(CC->usersupp.fullname,username);
378 for (a=0; a<MAXROOMS; ++a) {
379 CC->usersupp.lastseen[a]=0L;
380 CC->usersupp.generation[a]=(-1);
381 CC->usersupp.forget[a]=(-1);
383 for (a=0; a<MAILSLOTS; ++a) {
384 CC->usersupp.mailnum[a]=0L;
386 strcpy(CC->usersupp.password,"");
388 /* These are the default flags on new accounts */
390 US_NEEDVALID|US_LASTOLD|US_DISAPPEAR|US_PAGINATOR|US_FLOORS;
392 CC->usersupp.timescalled = 0;
393 CC->usersupp.posted = 0;
394 CC->usersupp.axlevel = INITAX;
395 CC->usersupp.USscreenwidth = 80;
396 CC->usersupp.USscreenheight = 24;
397 time(&CC->usersupp.lastcall);
398 strcpy(CC->usersupp.USname, "");
399 strcpy(CC->usersupp.USaddr, "");
400 strcpy(CC->usersupp.UScity, "");
401 strcpy(CC->usersupp.USstate, "");
402 strcpy(CC->usersupp.USzip, "");
403 strcpy(CC->usersupp.USphone, "");
405 /* fetch a new user number */
406 CC->usersupp.usernum = get_new_user_number();
408 if (CC->usersupp.usernum == 1L) {
409 CC->usersupp.axlevel = 6;
412 /* add user to userlog */
413 putuser(&CC->usersupp,CC->curr_user);
414 if (getuser(&CC->usersupp,CC->curr_user)) {
415 return(ERROR+INTERNAL_ERROR);
417 rec_log(CL_NEWUSER,CC->curr_user);
425 * cmd_newu() - create a new user account
427 void cmd_newu(char *cmdbuf)
432 if ((CC->logged_in)) {
433 cprintf("%d Already logged in.\n",ERROR);
438 cprintf("%d %s: Too many users are already online (maximum is %d)\n",
439 ERROR+MAX_SESSIONS_EXCEEDED,
440 config.c_nodename,config.c_maxsessions);
443 extract(username,cmdbuf,0);
447 if (strlen(username)==0) {
448 cprintf("%d You must supply a user name.\n",ERROR);
452 a = create_user(username);
453 if ((!strucmp(username, "bbs")) ||
454 (!strucmp(username, "new")) ||
455 (!strucmp(username, ".")))
457 cprintf("%d '%s' is an invalid login name.\n", ERROR);
460 if (a==ERROR+ALREADY_EXISTS) {
461 cprintf("%d '%s' already exists.\n",
462 ERROR+ALREADY_EXISTS,username);
465 else if (a==ERROR+INTERNAL_ERROR) {
466 cprintf("%d Internal error - user record disappeared?\n",
467 ERROR+INTERNAL_ERROR);
474 cprintf("%d unknown error\n",ERROR);
476 rec_log(CL_NEWUSER,CC->curr_user);
484 void cmd_setp(char *new_pw)
486 if (!(CC->logged_in)) {
487 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
490 if (CC->usersupp.USuid != BBSUID) {
491 cprintf("%d Not allowed. Use the 'passwd' command.\n",ERROR);
495 if (strlen(new_pw)==0) {
496 cprintf("%d Password unchanged.\n",OK);
499 lgetuser(&CC->usersupp,CC->curr_user);
500 strcpy(CC->usersupp.password,new_pw);
501 pwcrypt(CC->usersupp.password,config.c_pwcrypt);
502 lputuser(&CC->usersupp,CC->curr_user);
503 cprintf("%d Password changed.\n",OK);
504 rec_log(CL_PWCHANGE,CC->curr_user);
508 * get user parameters
510 void cmd_getu(void) {
511 if (!(CC->logged_in)) {
512 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
515 getuser(&CC->usersupp,CC->curr_user);
516 cprintf("%d %d|%d|%d\n",OK,CC->usersupp.USscreenwidth,
517 CC->usersupp.USscreenheight,(CC->usersupp.flags & US_USER_SET));
521 * set user parameters
523 void cmd_setu(char *new_parms)
526 if (num_parms(new_parms)!=3) {
527 cprintf("%d Usage error.\n",ERROR);
530 if (!(CC->logged_in)) {
531 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
534 lgetuser(&CC->usersupp,CC->curr_user);
535 CC->usersupp.USscreenwidth = extract_int(new_parms,0);
536 CC->usersupp.USscreenheight = extract_int(new_parms,1);
537 CC->usersupp.flags = CC->usersupp.flags & (~US_USER_SET);
538 CC->usersupp.flags = CC->usersupp.flags |
539 (extract_int(new_parms,2) & US_USER_SET);
540 lputuser(&CC->usersupp,CC->curr_user);
541 cprintf("%d Ok\n",OK);
545 * set last read pointer
547 void cmd_slrp(char *new_ptr)
551 if (!(CC->logged_in)) {
552 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
556 if (CC->curr_rm < 0) {
557 cprintf("%d No current room.\n",ERROR);
561 if (!struncmp(new_ptr,"highest",7)) {
562 newlr = CC->quickroom.QRhighest;
565 newlr = atol(new_ptr);
568 lgetuser(&CC->usersupp, CC->curr_user);
569 CC->usersupp.lastseen[CC->curr_rm] = newlr;
570 lputuser(&CC->usersupp, CC->curr_user);
571 cprintf("%d %ld\n",OK,newlr);
576 * INVT and KICK commands
578 void cmd_invt_kick(char *iuser, int op)
580 { /* 1 = invite, 0 = kick out */
581 struct usersupp USscratch;
584 if (!(CC->logged_in)) {
585 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
589 if (CC->curr_rm < 0) {
590 cprintf("%d No current room.\n",ERROR);
594 if (is_room_aide()==0) {
595 cprintf("%d Higher access required.\n",
596 ERROR+HIGHER_ACCESS_REQUIRED);
600 if ( (op==1) && ((CC->quickroom.QRflags&QR_PRIVATE)==0) ) {
601 cprintf("%d Not a private room.\n",ERROR+NOT_HERE);
605 if (lgetuser(&USscratch,iuser)!=0) {
606 cprintf("%d No such user.\n",ERROR);
611 USscratch.generation[CC->curr_rm]=CC->quickroom.QRgen;
612 USscratch.forget[CC->curr_rm]=(-1);
616 USscratch.generation[CC->curr_rm]=(-1);
617 USscratch.forget[CC->curr_rm]=CC->quickroom.QRgen;
620 lputuser(&USscratch,iuser);
622 /* post a message in Aide> saying what we just did */
623 sprintf(bbb,"%s %s %s> by %s",
625 ((op == 1) ? "invited to" : "kicked out of"),
626 CC->quickroom.QRname,
627 CC->usersupp.fullname);
630 if ((op==0)&&((CC->quickroom.QRflags&QR_PRIVATE)==0)) {
631 cprintf("%d Ok. (Not a private room, <Z>ap effect only)\n",OK);
634 cprintf("%d Ok.\n",OK);
641 * forget (Zap) the current room
643 void cmd_forg(void) {
644 if (!(CC->logged_in)) {
645 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
649 if (CC->curr_rm < 0) {
650 cprintf("%d No current room.\n",ERROR);
654 if (CC->curr_rm < 3) {
655 cprintf("%d You cannot forget this room.\n",ERROR+NOT_HERE);
660 cprintf("%d Aides cannot forget rooms.\n",ERROR);
664 lgetuser(&CC->usersupp,CC->curr_user);
665 CC->usersupp.forget[CC->curr_rm] = CC->quickroom.QRgen;
666 CC->usersupp.generation[CC->curr_rm] = (-1);
667 lputuser(&CC->usersupp,CC->curr_user);
668 cprintf("%d Ok\n",OK);
673 * Get Next Unregistered User
675 void cmd_gnur(void) {
676 struct cdbdata *cdbus;
677 struct usersupp usbuf;
680 if (!(CC->logged_in)) {
681 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
685 if (CC->usersupp.axlevel < 6) {
686 cprintf("%d Higher access required.\n",
687 ERROR+HIGHER_ACCESS_REQUIRED);
691 if ((CitControl.MMflags&MM_VALID)==0) {
692 cprintf("%d There are no unvalidated users.\n",OK);
696 /* There are unvalidated users. Traverse the usersupp database,
697 * and return the first user we find that needs validation.
699 cdb_rewind(CDB_USERSUPP);
700 while (cdbus = cdb_next_item(CDB_USERSUPP), cdbus != NULL) {
701 bzero(&usbuf, sizeof(struct usersupp));
702 memcpy(&usbuf, cdbus->ptr, cdbus->len);
704 if ((usbuf.flags & US_NEEDVALID)
705 &&(usbuf.axlevel > 0)) {
706 cprintf("%d %s\n",MORE_DATA,usbuf.fullname);
711 /* If we get to this point, there are no more unvalidated users.
712 * Therefore we clear the "users need validation" flag.
715 begin_critical_section(S_CONTROL);
717 CitControl.MMflags = CitControl.MMflags&(~MM_VALID);
719 end_critical_section(S_CONTROL);
720 cprintf("%d *** End of registration.\n",OK);
727 * get registration info for a user
729 void cmd_greg(char *who)
731 struct usersupp usbuf;
735 if (!(CC->logged_in)) {
736 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
740 if (!strucmp(who,"_SELF_")) strcpy(who,CC->curr_user);
742 if ((CC->usersupp.axlevel < 6) && (strucmp(who,CC->curr_user))) {
743 cprintf("%d Higher access required.\n",
744 ERROR+HIGHER_ACCESS_REQUIRED);
748 if (getuser(&usbuf,who) != 0) {
749 cprintf("%d '%s' not found.\n",ERROR+NO_SUCH_USER,who);
753 cprintf("%d %s\n",LISTING_FOLLOWS,usbuf.fullname);
754 cprintf("%ld\n",usbuf.usernum);
755 pwcrypt(usbuf.password,PWCRYPT);
756 cprintf("%s\n",usbuf.password);
757 cprintf("%s\n",usbuf.USname);
758 cprintf("%s\n",usbuf.USaddr);
759 cprintf("%s\n%s\n%s\n",
760 usbuf.UScity,usbuf.USstate,usbuf.USzip);
761 strcpy(pbuf,usbuf.USphone);
763 for (a=0; a<strlen(pbuf); ++a) {
764 if ((pbuf[a]>='0')&&(pbuf[a]<='9')) {
765 b=strlen(usbuf.USphone);
766 usbuf.USphone[b]=pbuf[a];
767 usbuf.USphone[b+1]=0;
770 while(strlen(usbuf.USphone)<10) {
771 strcpy(pbuf,usbuf.USphone);
772 strcpy(usbuf.USphone," ");
773 strcat(usbuf.USphone,pbuf);
776 cprintf("(%c%c%c) %c%c%c-%c%c%c%c\n",
777 usbuf.USphone[0],usbuf.USphone[1],
778 usbuf.USphone[2],usbuf.USphone[3],
779 usbuf.USphone[4],usbuf.USphone[5],
780 usbuf.USphone[6],usbuf.USphone[7],
781 usbuf.USphone[8],usbuf.USphone[9]);
783 cprintf("%d\n",usbuf.axlevel);
784 cprintf("%s\n",usbuf.USemail);
791 void cmd_vali(char *v_args)
795 struct usersupp userbuf;
797 extract(user,v_args,0);
798 newax = extract_int(v_args,1);
800 if (!(CC->logged_in)) {
801 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
805 if (CC->usersupp.axlevel < 6) {
806 cprintf("%d Higher access required.\n",
807 ERROR+HIGHER_ACCESS_REQUIRED);
811 if (lgetuser(&userbuf,user)!=0) {
812 cprintf("%d '%s' not found.\n",ERROR+NO_SUCH_USER,user);
816 userbuf.axlevel = newax;
817 userbuf.flags = (userbuf.flags & ~US_NEEDVALID);
819 lputuser(&userbuf,user);
820 cprintf("%d ok\n",OK);
828 void cmd_list(void) {
829 struct usersupp usbuf;
830 struct cdbdata *cdbus;
832 cdb_rewind(CDB_USERSUPP);
833 cprintf("%d \n",LISTING_FOLLOWS);
835 while(cdbus = cdb_next_item(CDB_USERSUPP), cdbus != NULL) {
836 bzero(&usbuf, sizeof(struct usersupp));
837 memcpy(&usbuf, cdbus->ptr, cdbus->len);
840 if (usbuf.axlevel > 0) {
841 if ((CC->usersupp.axlevel>=6)
842 ||((usbuf.flags&US_UNLISTED)==0)
843 ||((CC->internal_pgm))) {
844 cprintf("%s|%d|%ld|%ld|%d|%d|",
851 pwcrypt(usbuf.password,config.c_pwcrypt);
852 if (CC->usersupp.axlevel >= 6) cprintf("%s",usbuf.password);
861 * enter registration info
863 void cmd_regi(void) {
876 if (!(CC->logged_in)) {
877 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
889 cprintf("%d Send registration...\n",SEND_LISTING);
891 while (client_gets(buf), strcmp(buf,"000")) {
892 if (a==0) strcpy(tmpname,buf);
893 if (a==1) strcpy(tmpaddr,buf);
894 if (a==2) strcpy(tmpcity,buf);
895 if (a==3) strcpy(tmpstate,buf);
897 for (c=0; c<strlen(buf); ++c) {
898 if ((buf[c]>='0')&&(buf[c]<='9')) {
906 for (c=0; c<strlen(buf); ++c) {
907 if ((buf[c]>='0')&&(buf[c]<='9')) {
914 if (a==6) strncpy(tmpemail,buf,31);
926 lgetuser(&CC->usersupp,CC->curr_user);
927 strcpy(CC->usersupp.USname,tmpname);
928 strcpy(CC->usersupp.USaddr,tmpaddr);
929 strcpy(CC->usersupp.UScity,tmpcity);
930 strcpy(CC->usersupp.USstate,tmpstate);
931 strcpy(CC->usersupp.USzip,tmpzip);
932 strcpy(CC->usersupp.USphone,tmpphone);
933 strcpy(CC->usersupp.USemail,tmpemail);
934 CC->usersupp.flags=(CC->usersupp.flags|US_REGIS|US_NEEDVALID);
935 lputuser(&CC->usersupp,CC->curr_user);
937 /* set global flag calling for validation */
938 begin_critical_section(S_CONTROL);
940 CitControl.MMflags = CitControl.MMflags | MM_VALID ;
942 end_critical_section(S_CONTROL);
943 cprintf("%d *** End of registration.\n",OK);
948 * assorted info we need to check at login
950 void cmd_chek(void) {
956 if (!(CC->logged_in)) {
957 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
961 getuser(&CC->usersupp,CC->curr_user); /* no lock is needed here */
962 if ((REGISCALL!=0)&&((CC->usersupp.flags&US_REGIS)==0)) regis = 1;
964 if (CC->usersupp.axlevel >= 6) {
966 if (CitControl.MMflags&MM_VALID) vali = 1;
969 mail=0; /* check for mail */
970 for (a=0; a<MAILSLOTS; ++a)
971 if ((CC->usersupp.mailnum[a])>(CC->usersupp.lastseen[1]))
974 cprintf("%d %d|%d|%d\n",OK,mail,regis,vali);
979 * check to see if a user exists
981 void cmd_qusr(char *who)
983 struct usersupp usbuf;
985 if (getuser(&usbuf,who) == 0) {
986 cprintf("%d %s\n",OK,usbuf.fullname);
989 cprintf("%d No such user.\n",ERROR+NO_SUCH_USER);
997 void cmd_ebio(void) {
1001 if (!(CC->logged_in)) {
1002 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
1006 sprintf(buf,"./bio/%ld",CC->usersupp.usernum);
1007 fp = fopen(buf,"w");
1009 cprintf("%d Cannot create file\n",ERROR);
1012 cprintf("%d \n",SEND_LISTING);
1013 while(client_gets(buf), strcmp(buf,"000")) {
1014 fprintf(fp,"%s\n",buf);
1022 void cmd_rbio(char *cmdbuf)
1024 struct usersupp ruser;
1028 extract(buf,cmdbuf,0);
1029 if (getuser(&ruser,buf)!=0) {
1030 cprintf("%d No such user.\n",ERROR+NO_SUCH_USER);
1033 sprintf(buf,"./bio/%ld",ruser.usernum);
1035 fp = fopen(buf,"r");
1037 cprintf("%d %s has no bio on file.\n",
1038 ERROR+FILE_NOT_FOUND,ruser.fullname);
1041 cprintf("%d \n",LISTING_FOLLOWS);
1042 while (fgets(buf,256,fp)!=NULL) cprintf("%s",buf);
1048 * list of users who have entered bios
1050 void cmd_lbio(void) {
1053 struct usersupp usbuf;
1055 ls=popen("cd ./bio; ls","r");
1057 cprintf("%d Cannot open listing.\n",ERROR+FILE_NOT_FOUND);
1061 cprintf("%d\n",LISTING_FOLLOWS);
1062 while (fgets(buf,255,ls)!=NULL)
1063 if (getuserbynumber(&usbuf,atol(buf))==0)
1064 cprintf("%s\n",usbuf.fullname);