1 /* needed to properly enable crypt() stuff on some systems */
3 /* needed for str[n]casecmp() on some systems if the above is defined */
4 #define _XOPEN_SOURCE_EXTENDED
12 #include <sys/types.h>
21 extern struct config config;
25 * hash() - hash table function for user lookup
32 for (i=0; i<strlen(str); ++i) h=h+((i+1)*tolower(str[i]));
38 * getuser() - retrieve named user into supplied buffer.
39 * returns 0 on success
41 int getuser(struct usersupp *usbuf, char name[]) {
43 char lowercase_name[32];
45 struct cdbdata *cdbus;
47 bzero(usbuf, sizeof(struct usersupp));
48 for (a=0; a<=strlen(name); ++a) {
49 lowercase_name[a] = tolower(name[a]);
52 cdbus = cdb_fetch(CDB_USERSUPP, lowercase_name, strlen(lowercase_name));
54 return(1); /* user not found */
57 memcpy(usbuf, cdbus->ptr, cdbus->len);
64 * lgetuser() - same as getuser() but locks the record
66 int lgetuser(struct usersupp *usbuf, char *name)
70 retcode = getuser(usbuf,name);
72 begin_critical_section(S_USERSUPP);
79 * putuser() - write user buffer into the correct place on disk
81 void putuser(struct usersupp *usbuf, char *name)
83 char lowercase_name[32];
86 for (a=0; a<=strlen(name); ++a) {
87 lowercase_name[a] = tolower(name[a]);
90 cdb_store(CDB_USERSUPP,
91 lowercase_name, strlen(lowercase_name),
92 usbuf, sizeof(struct usersupp));
98 * lputuser() - same as putuser() but locks the record
100 void lputuser(struct usersupp *usbuf, char *name) {
102 end_critical_section(S_USERSUPP);
107 * Is the user currently logged in an Aide?
110 if (CC->usersupp.axlevel >= 6) return(1);
116 * Is the user currently logged in an Aide *or* the room aide for this room?
118 int is_room_aide(void) {
119 if ( (CC->usersupp.axlevel >= 6)
120 || (CC->quickroom.QRroomaide == CC->usersupp.usernum) ) {
129 * getuserbynumber() - get user by number
130 * returns 0 if user was found
132 int getuserbynumber(struct usersupp *usbuf, long int number)
134 struct cdbdata *cdbus;
136 cdb_rewind(CDB_USERSUPP);
138 while(cdbus = cdb_next_item(CDB_USERSUPP), cdbus != NULL) {
139 bzero(usbuf, sizeof(struct usersupp));
140 memcpy(usbuf, cdbus->ptr, cdbus->len);
142 if (usbuf->usernum == number) {
153 void cmd_user(char *cmdbuf)
161 extract(username,cmdbuf,0);
165 if ((CC->logged_in)) {
166 cprintf("%d Already logged in.\n",ERROR);
170 found_user = getuser(&CC->usersupp,username);
171 if (found_user != 0) {
172 p = (struct passwd *)getpwnam(username);
174 strcpy(autoname,p->pw_gecos);
175 for (a=0; a<strlen(autoname); ++a)
176 if (autoname[a]==',') autoname[a]=0;
177 found_user = getuser(&CC->usersupp,autoname);
180 if (found_user == 0) {
181 if (((CC->nologin)) && (CC->usersupp.axlevel < 6)) {
182 cprintf("%d %s: Too many users are already online (maximum is %d)\n",
183 ERROR+MAX_SESSIONS_EXCEEDED,
184 config.c_nodename,config.c_maxsessions);
187 strcpy(CC->curr_user,CC->usersupp.fullname);
188 cprintf("%d Password required for %s\n",
189 MORE_DATA,CC->curr_user);
193 cprintf("%d %s not found.\n",ERROR,username);
200 * session startup code which is common to both cmd_pass() and cmd_newu()
202 void session_startup(void) {
206 syslog(LOG_NOTICE,"user <%s> logged in",CC->curr_user);
207 hook_user_login(CC->cs_pid, CC->curr_user);
208 lgetuser(&CC->usersupp,CC->curr_user);
209 ++(CC->usersupp.timescalled);
210 CC->fake_username[0] = '\0';
211 CC->fake_postname[0] = '\0';
212 CC->fake_hostname[0] = '\0';
213 CC->fake_roomname[0] = '\0';
214 CC->last_pager[0] = '\0';
215 time(&CC->usersupp.lastcall);
217 /* If this user's name is the name of the system administrator
218 * (as specified in setup), automatically assign access level 6.
220 if (!strcasecmp(CC->usersupp.fullname, config.c_sysadm)) {
221 CC->usersupp.axlevel = 6;
224 /* A room's generation number changes each time it is recycled. Users are kept
225 * out of private rooms or forget rooms by matching the generation numbers. To
226 * avoid an accidental matchup, unmatched numbers are set to -1 here.
228 for (a=0; a<MAXROOMS; ++a) {
230 if (CC->usersupp.generation[a] != qr.QRgen)
231 CC->usersupp.generation[a]=(-1);
232 if (CC->usersupp.forget[a] != qr.QRgen)
233 CC->usersupp.forget[a]=(-1);
236 lputuser(&CC->usersupp,CC->curr_user);
238 cprintf("%d %s|%d|%d|%d|%u|%ld\n",OK,CC->usersupp.fullname,CC->usersupp.axlevel,
239 CC->usersupp.timescalled,CC->usersupp.posted,CC->usersupp.flags,
240 CC->usersupp.usernum);
241 usergoto(0,0); /* Enter the lobby */
242 rec_log(CL_LOGIN,CC->curr_user);
248 * misc things to be taken care of when a user is logged out
250 void logout(struct CitContext *who)
253 if (who->download_fp != NULL) {
254 fclose(who->download_fp);
255 who->download_fp = NULL;
257 if (who->upload_fp != NULL) {
263 void cmd_pass(char *buf)
269 extract(password,buf,0);
271 if ((CC->logged_in)) {
272 cprintf("%d Already logged in.\n",ERROR);
275 if (!strcmp(CC->curr_user,"")) {
276 cprintf("%d You must send a name with USER first.\n",ERROR);
279 if (getuser(&CC->usersupp,CC->curr_user)) {
280 cprintf("%d Can't find user record!\n",ERROR+INTERNAL_ERROR);
285 if (CC->usersupp.USuid == BBSUID) {
287 strproc(CC->usersupp.password);
288 code = strcasecmp(CC->usersupp.password,password);
291 p = (struct passwd *)getpwuid(CC->usersupp.USuid);
292 #ifdef ENABLE_AUTOLOGIN
294 if (!strcmp(p->pw_passwd,
295 (char *)crypt(password,p->pw_passwd))) {
297 lgetuser(&CC->usersupp, CC->curr_user);
298 strcpy(CC->usersupp.password, password);
299 lputuser(&CC->usersupp, CC->curr_user);
310 cprintf("%d Wrong password.\n",ERROR);
311 rec_log(CL_BADPW,CC->curr_user);
317 * purge related files when removing or overwriting a user record
319 void purge_user(char *pname) {
321 struct usersupp usbuf;
323 struct cdbdata *cdbmb;
327 if (getuser(&usbuf, pname) != 0) {
328 lprintf(5, "Cannot purge user <%s> - not found\n", pname);
332 /* delete any messages in the user's mailbox */
333 cdbmb = cdb_fetch(CDB_MAILBOXES, &usbuf.usernum, sizeof(long));
335 num_mails = cdbmb->len / sizeof(long);
336 mailbox = (long *) cdbmb->ptr;
337 if (num_mails > 0) for (a=0; a<num_mails; ++a) {
338 cdb_delete(CDB_MSGMAIN, &mailbox[a], sizeof(long));
341 /* now delete the mailbox itself */
342 cdb_delete(CDB_MAILBOXES, &usbuf.usernum, sizeof(long));
346 /* delete the userlog entry */
347 cdb_delete(CDB_USERSUPP, pname, strlen(pname));
349 /* remove the user's bio file */
350 sprintf(filename, "./bio/%ld", usbuf.usernum);
353 /* remove the user's picture */
354 sprintf(filename, "./userpics/%ld.gif", usbuf.usernum);
361 * create_user() - back end processing to create a new user
363 int create_user(char *newusername)
365 struct usersupp usbuf;
367 struct passwd *p = NULL;
370 strcpy(username, newusername);
373 #ifdef ENABLE_AUTOLOGIN
374 p = (struct passwd *)getpwnam(username);
377 strcpy(username, p->pw_gecos);
378 for (a=0; a<strlen(username); ++a) {
379 if (username[a] == ',') username[a] = 0;
381 CC->usersupp.USuid = p->pw_uid;
384 CC->usersupp.USuid = BBSUID;
387 if (!getuser(&usbuf,username)) {
388 return(ERROR+ALREADY_EXISTS);
391 strcpy(CC->curr_user,username);
392 strcpy(CC->usersupp.fullname,username);
395 for (a=0; a<MAXROOMS; ++a) {
396 CC->usersupp.lastseen[a]=0L;
397 CC->usersupp.generation[a]=(-1);
398 CC->usersupp.forget[a]=(-1);
400 strcpy(CC->usersupp.password,"");
402 /* These are the default flags on new accounts */
404 US_NEEDVALID|US_LASTOLD|US_DISAPPEAR|US_PAGINATOR|US_FLOORS;
406 CC->usersupp.timescalled = 0;
407 CC->usersupp.posted = 0;
408 CC->usersupp.axlevel = INITAX;
409 CC->usersupp.USscreenwidth = 80;
410 CC->usersupp.USscreenheight = 24;
411 time(&CC->usersupp.lastcall);
412 strcpy(CC->usersupp.USname, "");
413 strcpy(CC->usersupp.USaddr, "");
414 strcpy(CC->usersupp.UScity, "");
415 strcpy(CC->usersupp.USstate, "");
416 strcpy(CC->usersupp.USzip, "");
417 strcpy(CC->usersupp.USphone, "");
419 /* fetch a new user number */
420 CC->usersupp.usernum = get_new_user_number();
422 if (CC->usersupp.usernum == 1L) {
423 CC->usersupp.axlevel = 6;
426 /* add user to userlog */
427 putuser(&CC->usersupp,CC->curr_user);
428 if (getuser(&CC->usersupp,CC->curr_user)) {
429 return(ERROR+INTERNAL_ERROR);
431 rec_log(CL_NEWUSER,CC->curr_user);
439 * cmd_newu() - create a new user account
441 void cmd_newu(char *cmdbuf)
446 if ((CC->logged_in)) {
447 cprintf("%d Already logged in.\n",ERROR);
452 cprintf("%d %s: Too many users are already online (maximum is %d)\n",
453 ERROR+MAX_SESSIONS_EXCEEDED,
454 config.c_nodename,config.c_maxsessions);
457 extract(username,cmdbuf,0);
461 if (strlen(username)==0) {
462 cprintf("%d You must supply a user name.\n",ERROR);
466 a = create_user(username);
467 if ((!strcasecmp(username, "bbs")) ||
468 (!strcasecmp(username, "new")) ||
469 (!strcasecmp(username, ".")))
471 cprintf("%d '%s' is an invalid login name.\n", ERROR);
474 if (a==ERROR+ALREADY_EXISTS) {
475 cprintf("%d '%s' already exists.\n",
476 ERROR+ALREADY_EXISTS,username);
479 else if (a==ERROR+INTERNAL_ERROR) {
480 cprintf("%d Internal error - user record disappeared?\n",
481 ERROR+INTERNAL_ERROR);
488 cprintf("%d unknown error\n",ERROR);
490 rec_log(CL_NEWUSER,CC->curr_user);
498 void cmd_setp(char *new_pw)
500 if (!(CC->logged_in)) {
501 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
504 if (CC->usersupp.USuid != BBSUID) {
505 cprintf("%d Not allowed. Use the 'passwd' command.\n",ERROR);
509 if (strlen(new_pw)==0) {
510 cprintf("%d Password unchanged.\n",OK);
513 lgetuser(&CC->usersupp,CC->curr_user);
514 strcpy(CC->usersupp.password,new_pw);
515 lputuser(&CC->usersupp,CC->curr_user);
516 cprintf("%d Password changed.\n",OK);
517 rec_log(CL_PWCHANGE,CC->curr_user);
521 * get user parameters
523 void cmd_getu(void) {
524 if (!(CC->logged_in)) {
525 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
528 getuser(&CC->usersupp,CC->curr_user);
529 cprintf("%d %d|%d|%d\n",
531 CC->usersupp.USscreenwidth,
532 CC->usersupp.USscreenheight,
533 (CC->usersupp.flags & US_USER_SET)
538 * set user parameters
540 void cmd_setu(char *new_parms)
543 if (num_parms(new_parms)!=3) {
544 cprintf("%d Usage error.\n",ERROR);
547 if (!(CC->logged_in)) {
548 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
551 lgetuser(&CC->usersupp,CC->curr_user);
552 CC->usersupp.USscreenwidth = extract_int(new_parms,0);
553 CC->usersupp.USscreenheight = extract_int(new_parms,1);
554 CC->usersupp.flags = CC->usersupp.flags & (~US_USER_SET);
555 CC->usersupp.flags = CC->usersupp.flags |
556 (extract_int(new_parms,2) & US_USER_SET);
557 lputuser(&CC->usersupp,CC->curr_user);
558 cprintf("%d Ok\n",OK);
562 * set last read pointer
564 void cmd_slrp(char *new_ptr)
568 if (!(CC->logged_in)) {
569 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
573 if (CC->curr_rm < 0) {
574 cprintf("%d No current room.\n",ERROR);
578 if (!strncasecmp(new_ptr,"highest",7)) {
579 newlr = CC->quickroom.QRhighest;
582 newlr = atol(new_ptr);
585 lgetuser(&CC->usersupp, CC->curr_user);
586 CC->usersupp.lastseen[CC->curr_rm] = newlr;
587 lputuser(&CC->usersupp, CC->curr_user);
588 cprintf("%d %ld\n",OK,newlr);
593 * INVT and KICK commands
595 void cmd_invt_kick(char *iuser, int op)
597 { /* 1 = invite, 0 = kick out */
598 struct usersupp USscratch;
601 if (!(CC->logged_in)) {
602 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
606 if (CC->curr_rm < 0) {
607 cprintf("%d No current room.\n",ERROR);
611 if (is_room_aide()==0) {
612 cprintf("%d Higher access required.\n",
613 ERROR+HIGHER_ACCESS_REQUIRED);
617 if ( (op==1) && ((CC->quickroom.QRflags&QR_PRIVATE)==0) ) {
618 cprintf("%d Not a private room.\n",ERROR+NOT_HERE);
622 if (lgetuser(&USscratch,iuser)!=0) {
623 cprintf("%d No such user.\n",ERROR);
628 USscratch.generation[CC->curr_rm]=CC->quickroom.QRgen;
629 USscratch.forget[CC->curr_rm]=(-1);
633 USscratch.generation[CC->curr_rm]=(-1);
634 USscratch.forget[CC->curr_rm]=CC->quickroom.QRgen;
637 lputuser(&USscratch,iuser);
639 /* post a message in Aide> saying what we just did */
640 sprintf(bbb,"%s %s %s> by %s",
642 ((op == 1) ? "invited to" : "kicked out of"),
643 CC->quickroom.QRname,
644 CC->usersupp.fullname);
647 if ((op==0)&&((CC->quickroom.QRflags&QR_PRIVATE)==0)) {
648 cprintf("%d Ok. (Not a private room, <Z>ap effect only)\n",OK);
651 cprintf("%d Ok.\n",OK);
658 * forget (Zap) the current room
660 void cmd_forg(void) {
661 if (!(CC->logged_in)) {
662 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
666 if (CC->curr_rm < 0) {
667 cprintf("%d No current room.\n",ERROR);
671 if (CC->curr_rm < 3) {
672 cprintf("%d You cannot forget this room.\n",ERROR+NOT_HERE);
677 cprintf("%d Aides cannot forget rooms.\n",ERROR);
681 lgetuser(&CC->usersupp,CC->curr_user);
682 CC->usersupp.forget[CC->curr_rm] = CC->quickroom.QRgen;
683 CC->usersupp.generation[CC->curr_rm] = (-1);
684 lputuser(&CC->usersupp,CC->curr_user);
685 cprintf("%d Ok\n",OK);
690 * Get Next Unregistered User
692 void cmd_gnur(void) {
693 struct cdbdata *cdbus;
694 struct usersupp usbuf;
696 if (!(CC->logged_in)) {
697 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
701 if (CC->usersupp.axlevel < 6) {
702 cprintf("%d Higher access required.\n",
703 ERROR+HIGHER_ACCESS_REQUIRED);
707 if ((CitControl.MMflags&MM_VALID)==0) {
708 cprintf("%d There are no unvalidated users.\n",OK);
712 /* There are unvalidated users. Traverse the usersupp database,
713 * and return the first user we find that needs validation.
715 cdb_rewind(CDB_USERSUPP);
716 while (cdbus = cdb_next_item(CDB_USERSUPP), cdbus != NULL) {
717 bzero(&usbuf, sizeof(struct usersupp));
718 memcpy(&usbuf, cdbus->ptr, cdbus->len);
720 if ((usbuf.flags & US_NEEDVALID)
721 &&(usbuf.axlevel > 0)) {
722 cprintf("%d %s\n",MORE_DATA,usbuf.fullname);
727 /* If we get to this point, there are no more unvalidated users.
728 * Therefore we clear the "users need validation" flag.
731 begin_critical_section(S_CONTROL);
733 CitControl.MMflags = CitControl.MMflags&(~MM_VALID);
735 end_critical_section(S_CONTROL);
736 cprintf("%d *** End of registration.\n",OK);
743 * get registration info for a user
745 void cmd_greg(char *who)
747 struct usersupp usbuf;
751 if (!(CC->logged_in)) {
752 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
756 if (!strcasecmp(who,"_SELF_")) strcpy(who,CC->curr_user);
758 if ((CC->usersupp.axlevel < 6) && (strcasecmp(who,CC->curr_user))) {
759 cprintf("%d Higher access required.\n",
760 ERROR+HIGHER_ACCESS_REQUIRED);
764 if (getuser(&usbuf,who) != 0) {
765 cprintf("%d '%s' not found.\n",ERROR+NO_SUCH_USER,who);
769 cprintf("%d %s\n",LISTING_FOLLOWS,usbuf.fullname);
770 cprintf("%ld\n",usbuf.usernum);
771 cprintf("%s\n",usbuf.password);
772 cprintf("%s\n",usbuf.USname);
773 cprintf("%s\n",usbuf.USaddr);
774 cprintf("%s\n%s\n%s\n",
775 usbuf.UScity,usbuf.USstate,usbuf.USzip);
776 strcpy(pbuf,usbuf.USphone);
778 for (a=0; a<strlen(pbuf); ++a) {
779 if ((pbuf[a]>='0')&&(pbuf[a]<='9')) {
780 b=strlen(usbuf.USphone);
781 usbuf.USphone[b]=pbuf[a];
782 usbuf.USphone[b+1]=0;
785 while(strlen(usbuf.USphone)<10) {
786 strcpy(pbuf,usbuf.USphone);
787 strcpy(usbuf.USphone," ");
788 strcat(usbuf.USphone,pbuf);
791 cprintf("(%c%c%c) %c%c%c-%c%c%c%c\n",
792 usbuf.USphone[0],usbuf.USphone[1],
793 usbuf.USphone[2],usbuf.USphone[3],
794 usbuf.USphone[4],usbuf.USphone[5],
795 usbuf.USphone[6],usbuf.USphone[7],
796 usbuf.USphone[8],usbuf.USphone[9]);
798 cprintf("%d\n",usbuf.axlevel);
799 cprintf("%s\n",usbuf.USemail);
806 void cmd_vali(char *v_args)
810 struct usersupp userbuf;
812 extract(user,v_args,0);
813 newax = extract_int(v_args,1);
815 if (!(CC->logged_in)) {
816 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
820 if (CC->usersupp.axlevel < 6) {
821 cprintf("%d Higher access required.\n",
822 ERROR+HIGHER_ACCESS_REQUIRED);
826 if (lgetuser(&userbuf,user)!=0) {
827 cprintf("%d '%s' not found.\n",ERROR+NO_SUCH_USER,user);
831 userbuf.axlevel = newax;
832 userbuf.flags = (userbuf.flags & ~US_NEEDVALID);
834 lputuser(&userbuf,user);
836 /* If the access level was set to zero, delete the user */
839 cprintf("%d %s Deleted.\n", OK, userbuf.fullname);
843 cprintf("%d ok\n",OK);
851 void cmd_list(void) {
852 struct usersupp usbuf;
853 struct cdbdata *cdbus;
855 cdb_rewind(CDB_USERSUPP);
856 cprintf("%d \n",LISTING_FOLLOWS);
858 while(cdbus = cdb_next_item(CDB_USERSUPP), cdbus != NULL) {
859 bzero(&usbuf, sizeof(struct usersupp));
860 memcpy(&usbuf, cdbus->ptr, cdbus->len);
863 if (usbuf.axlevel > 0) {
864 if ((CC->usersupp.axlevel>=6)
865 ||((usbuf.flags&US_UNLISTED)==0)
866 ||((CC->internal_pgm))) {
867 cprintf("%s|%d|%ld|%ld|%d|%d|",
874 if (CC->usersupp.axlevel >= 6) cprintf("%s",usbuf.password);
883 * enter registration info
885 void cmd_regi(void) {
897 if (!(CC->logged_in)) {
898 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
910 cprintf("%d Send registration...\n",SEND_LISTING);
912 while (client_gets(buf), strcmp(buf,"000")) {
913 if (a==0) strcpy(tmpname,buf);
914 if (a==1) strcpy(tmpaddr,buf);
915 if (a==2) strcpy(tmpcity,buf);
916 if (a==3) strcpy(tmpstate,buf);
918 for (c=0; c<strlen(buf); ++c) {
919 if ((buf[c]>='0')&&(buf[c]<='9')) {
927 for (c=0; c<strlen(buf); ++c) {
928 if ((buf[c]>='0')&&(buf[c]<='9')) {
935 if (a==6) strncpy(tmpemail,buf,31);
947 lgetuser(&CC->usersupp,CC->curr_user);
948 strcpy(CC->usersupp.USname,tmpname);
949 strcpy(CC->usersupp.USaddr,tmpaddr);
950 strcpy(CC->usersupp.UScity,tmpcity);
951 strcpy(CC->usersupp.USstate,tmpstate);
952 strcpy(CC->usersupp.USzip,tmpzip);
953 strcpy(CC->usersupp.USphone,tmpphone);
954 strcpy(CC->usersupp.USemail,tmpemail);
955 CC->usersupp.flags=(CC->usersupp.flags|US_REGIS|US_NEEDVALID);
956 lputuser(&CC->usersupp,CC->curr_user);
958 /* set global flag calling for validation */
959 begin_critical_section(S_CONTROL);
961 CitControl.MMflags = CitControl.MMflags | MM_VALID ;
963 end_critical_section(S_CONTROL);
964 cprintf("%d *** End of registration.\n",OK);
969 * assorted info we need to check at login
971 void cmd_chek(void) {
976 struct cdbdata *cdbmb;
981 if (!(CC->logged_in)) {
982 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
986 getuser(&CC->usersupp,CC->curr_user); /* no lock is needed here */
987 if ((REGISCALL!=0)&&((CC->usersupp.flags&US_REGIS)==0)) regis = 1;
989 if (CC->usersupp.axlevel >= 6) {
991 if (CitControl.MMflags&MM_VALID) vali = 1;
997 cdbmb = cdb_fetch(CDB_MAILBOXES, &CC->usersupp.usernum, sizeof(long));
999 num_mails = cdbmb->len / sizeof(long);
1000 mailbox = (long *) cdbmb->ptr;
1001 if (num_mails > 0) for (a=0; a<num_mails; ++a) {
1002 if (mailbox[a] > (CC->usersupp.lastseen[1])) ++mail;
1008 cprintf("%d %d|%d|%d\n",OK,mail,regis,vali);
1013 * check to see if a user exists
1015 void cmd_qusr(char *who)
1017 struct usersupp usbuf;
1019 if (getuser(&usbuf,who) == 0) {
1020 cprintf("%d %s\n",OK,usbuf.fullname);
1023 cprintf("%d No such user.\n",ERROR+NO_SUCH_USER);
1031 void cmd_ebio(void) {
1035 if (!(CC->logged_in)) {
1036 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
1040 sprintf(buf,"./bio/%ld",CC->usersupp.usernum);
1041 fp = fopen(buf,"w");
1043 cprintf("%d Cannot create file\n",ERROR);
1046 cprintf("%d \n",SEND_LISTING);
1047 while(client_gets(buf), strcmp(buf,"000")) {
1048 fprintf(fp,"%s\n",buf);
1056 void cmd_rbio(char *cmdbuf)
1058 struct usersupp ruser;
1062 extract(buf,cmdbuf,0);
1063 if (getuser(&ruser,buf)!=0) {
1064 cprintf("%d No such user.\n",ERROR+NO_SUCH_USER);
1067 sprintf(buf,"./bio/%ld",ruser.usernum);
1069 fp = fopen(buf,"r");
1071 cprintf("%d %s has no bio on file.\n",
1072 ERROR+FILE_NOT_FOUND,ruser.fullname);
1075 cprintf("%d \n",LISTING_FOLLOWS);
1076 while (fgets(buf,256,fp)!=NULL) cprintf("%s",buf);
1082 * list of users who have entered bios
1084 void cmd_lbio(void) {
1087 struct usersupp usbuf;
1089 ls=popen("cd ./bio; ls","r");
1091 cprintf("%d Cannot open listing.\n",ERROR+FILE_NOT_FOUND);
1095 cprintf("%d\n",LISTING_FOLLOWS);
1096 while (fgets(buf,255,ls)!=NULL)
1097 if (getuserbynumber(&usbuf,atol(buf))==0)
1098 cprintf("%s\n",usbuf.fullname);
1105 * Administrative Get User Parameters
1107 void cmd_agup(char *cmdbuf) {
1108 struct usersupp usbuf;
1109 char requested_user[256];
1111 if ( (CC->internal_pgm==0)
1112 && ( (CC->logged_in == 0) || (is_aide()==0) ) ) {
1113 cprintf("%d Higher access required.\n",
1114 ERROR + HIGHER_ACCESS_REQUIRED);
1118 extract(requested_user, cmdbuf, 0);
1119 lprintf(9, "Requesting <%s>\n", requested_user);
1120 if (getuser(&usbuf, requested_user) != 0) {
1121 cprintf("%d No such user.\n", ERROR + NO_SUCH_USER);
1124 lprintf(9, "getuser() returned zero\n");
1126 cprintf("%d %s|%s|%u|%d|%d|%d|%ld\n",
1136 lprintf(9, "Done.\n");
1142 * Administrative Set User Parameters
1144 void cmd_asup(char *cmdbuf) {
1145 struct usersupp usbuf;
1146 char requested_user[256];
1149 if ( (CC->internal_pgm==0)
1150 && ( (CC->logged_in == 0) || (is_aide()==0) ) ) {
1151 cprintf("%d Higher access required.\n",
1152 ERROR + HIGHER_ACCESS_REQUIRED);
1156 extract(requested_user, cmdbuf, 0);
1157 if (lgetuser(&usbuf, requested_user) != 0) {
1158 cprintf("%d No such user.\n", ERROR + NO_SUCH_USER);
1162 np = num_parms(cmdbuf);
1163 if (np > 1) extract(usbuf.password, cmdbuf, 1);
1164 if (np > 2) usbuf.flags = extract_int(cmdbuf, 2);
1165 if (np > 3) usbuf.timescalled = extract_int(cmdbuf, 3);
1166 if (np > 4) usbuf.posted = extract_int(cmdbuf, 4);
1167 if (np > 5) usbuf.axlevel = extract_int(cmdbuf, 5);
1169 lputuser(&usbuf, requested_user);
1170 cprintf("%d Ok\n", OK);