1 /* needed to properly enable crypt() stuff on some systems */
3 /* needed for str[n]casecmp() on some systems if the above is defined */
4 #define _XOPEN_SOURCE_EXTENDED
12 #include <sys/types.h>
21 #include "sysdep_decls.h"
30 extern struct config config;
34 * hash() - hash table function for user lookup
41 for (i=0; i<strlen(str); ++i) h=h+((i+1)*tolower(str[i]));
47 * getuser() - retrieve named user into supplied buffer.
48 * returns 0 on success
50 int getuser(struct usersupp *usbuf, char name[]) {
52 char lowercase_name[32];
54 struct cdbdata *cdbus;
56 bzero(usbuf, sizeof(struct usersupp));
57 for (a=0; a<=strlen(name); ++a) {
58 lowercase_name[a] = tolower(name[a]);
61 cdbus = cdb_fetch(CDB_USERSUPP, lowercase_name, strlen(lowercase_name));
63 return(1); /* user not found */
66 memcpy(usbuf, cdbus->ptr,
67 ( (cdbus->len > sizeof(struct usersupp)) ?
68 sizeof(struct usersupp) : cdbus->len) );
75 * lgetuser() - same as getuser() but locks the record
77 int lgetuser(struct usersupp *usbuf, char *name)
81 retcode = getuser(usbuf,name);
83 begin_critical_section(S_USERSUPP);
90 * putuser() - write user buffer into the correct place on disk
92 void putuser(struct usersupp *usbuf, char *name)
94 char lowercase_name[32];
97 for (a=0; a<=strlen(name); ++a) {
98 lowercase_name[a] = tolower(name[a]);
101 cdb_store(CDB_USERSUPP,
102 lowercase_name, strlen(lowercase_name),
103 usbuf, sizeof(struct usersupp));
109 * lputuser() - same as putuser() but locks the record
111 void lputuser(struct usersupp *usbuf, char *name) {
113 end_critical_section(S_USERSUPP);
118 * Is the user currently logged in an Aide?
121 if (CC->usersupp.axlevel >= 6) return(1);
127 * Is the user currently logged in an Aide *or* the room aide for this room?
129 int is_room_aide(void) {
130 if ( (CC->usersupp.axlevel >= 6)
131 || (CC->quickroom.QRroomaide == CC->usersupp.usernum) ) {
140 * getuserbynumber() - get user by number
141 * returns 0 if user was found
143 int getuserbynumber(struct usersupp *usbuf, long int number)
145 struct cdbdata *cdbus;
147 cdb_rewind(CDB_USERSUPP);
149 while(cdbus = cdb_next_item(CDB_USERSUPP), cdbus != NULL) {
150 bzero(usbuf, sizeof(struct usersupp));
151 memcpy(usbuf, cdbus->ptr,
152 ( (cdbus->len > sizeof(struct usersupp)) ?
153 sizeof(struct usersupp) : cdbus->len) );
155 if (usbuf->usernum == number) {
166 void cmd_user(char *cmdbuf)
174 extract(username,cmdbuf,0);
178 if ((CC->logged_in)) {
179 cprintf("%d Already logged in.\n",ERROR);
183 found_user = getuser(&CC->usersupp,username);
184 if (found_user != 0) {
185 p = (struct passwd *)getpwnam(username);
187 strcpy(autoname,p->pw_gecos);
188 for (a=0; a<strlen(autoname); ++a)
189 if (autoname[a]==',') autoname[a]=0;
190 found_user = getuser(&CC->usersupp,autoname);
193 if (found_user == 0) {
194 if (((CC->nologin)) && (CC->usersupp.axlevel < 6)) {
195 cprintf("%d %s: Too many users are already online (maximum is %d)\n",
196 ERROR+MAX_SESSIONS_EXCEEDED,
197 config.c_nodename,config.c_maxsessions);
200 strcpy(CC->curr_user,CC->usersupp.fullname);
201 cprintf("%d Password required for %s\n",
202 MORE_DATA,CC->curr_user);
206 cprintf("%d %s not found.\n",ERROR,username);
213 * session startup code which is common to both cmd_pass() and cmd_newu()
215 void session_startup(void) {
219 syslog(LOG_NOTICE,"user <%s> logged in",CC->curr_user);
220 hook_user_login(CC->cs_pid, CC->curr_user);
221 lgetuser(&CC->usersupp,CC->curr_user);
222 ++(CC->usersupp.timescalled);
223 CC->fake_username[0] = '\0';
224 CC->fake_postname[0] = '\0';
225 CC->fake_hostname[0] = '\0';
226 CC->fake_roomname[0] = '\0';
227 CC->last_pager[0] = '\0';
228 time(&CC->usersupp.lastcall);
230 /* If this user's name is the name of the system administrator
231 * (as specified in setup), automatically assign access level 6.
233 if (!strcasecmp(CC->usersupp.fullname, config.c_sysadm)) {
234 CC->usersupp.axlevel = 6;
237 /* A room's generation number changes each time it is recycled. Users are kept
238 * out of private rooms or forget rooms by matching the generation numbers. To
239 * avoid an accidental matchup, unmatched numbers are set to -1 here.
241 for (a=0; a<MAXROOMS; ++a) {
243 if (CC->usersupp.generation[a] != qr.QRgen)
244 CC->usersupp.generation[a]=(-1);
245 if (CC->usersupp.forget[a] != qr.QRgen)
246 CC->usersupp.forget[a]=(-1);
249 lputuser(&CC->usersupp,CC->curr_user);
251 cprintf("%d %s|%d|%d|%d|%u|%ld\n",OK,CC->usersupp.fullname,CC->usersupp.axlevel,
252 CC->usersupp.timescalled,CC->usersupp.posted,CC->usersupp.flags,
253 CC->usersupp.usernum);
254 usergoto(0,0); /* Enter the lobby */
255 rec_log(CL_LOGIN,CC->curr_user);
261 * misc things to be taken care of when a user is logged out
263 void logout(struct CitContext *who)
266 if (who->download_fp != NULL) {
267 fclose(who->download_fp);
268 who->download_fp = NULL;
270 if (who->upload_fp != NULL) {
276 void cmd_pass(char *buf)
282 extract(password,buf,0);
284 if ((CC->logged_in)) {
285 cprintf("%d Already logged in.\n",ERROR);
288 if (!strcmp(CC->curr_user,"")) {
289 cprintf("%d You must send a name with USER first.\n",ERROR);
292 if (getuser(&CC->usersupp,CC->curr_user)) {
293 cprintf("%d Can't find user record!\n",ERROR+INTERNAL_ERROR);
298 if (CC->usersupp.USuid == BBSUID) {
300 strproc(CC->usersupp.password);
301 code = strcasecmp(CC->usersupp.password,password);
304 p = (struct passwd *)getpwuid(CC->usersupp.USuid);
305 #ifdef ENABLE_AUTOLOGIN
307 if (!strcmp(p->pw_passwd,
308 (char *)crypt(password,p->pw_passwd))) {
310 lgetuser(&CC->usersupp, CC->curr_user);
311 strcpy(CC->usersupp.password, password);
312 lputuser(&CC->usersupp, CC->curr_user);
323 cprintf("%d Wrong password.\n",ERROR);
324 rec_log(CL_BADPW,CC->curr_user);
330 * Delete a user record *and* all of its related resources.
332 int purge_user(char *pname) {
334 struct usersupp usbuf;
336 struct cdbdata *cdbmb;
340 if (getuser(&usbuf, pname) != 0) {
341 lprintf(5, "Cannot purge user <%s> - not found\n", pname);
345 /* FIX Don't delete a user who is currently logged in. */
347 /* delete any messages in the user's mailbox */
348 cdbmb = cdb_fetch(CDB_MAILBOXES, &usbuf.usernum, sizeof(long));
350 num_mails = cdbmb->len / sizeof(long);
351 mailbox = (long *) cdbmb->ptr;
352 if (num_mails > 0) for (a=0; a<num_mails; ++a) {
353 cdb_delete(CDB_MSGMAIN, &mailbox[a], sizeof(long));
356 /* now delete the mailbox itself */
357 cdb_delete(CDB_MAILBOXES, &usbuf.usernum, sizeof(long));
361 /* delete the userlog entry */
362 cdb_delete(CDB_USERSUPP, pname, strlen(pname));
364 /* remove the user's bio file */
365 sprintf(filename, "./bio/%ld", usbuf.usernum);
368 /* remove the user's picture */
369 sprintf(filename, "./userpics/%ld.gif", usbuf.usernum);
377 * create_user() - back end processing to create a new user
379 int create_user(char *newusername)
381 struct usersupp usbuf;
383 struct passwd *p = NULL;
386 strcpy(username, newusername);
389 #ifdef ENABLE_AUTOLOGIN
390 p = (struct passwd *)getpwnam(username);
393 strcpy(username, p->pw_gecos);
394 for (a=0; a<strlen(username); ++a) {
395 if (username[a] == ',') username[a] = 0;
397 CC->usersupp.USuid = p->pw_uid;
400 CC->usersupp.USuid = BBSUID;
403 if (!getuser(&usbuf,username)) {
404 return(ERROR+ALREADY_EXISTS);
407 strcpy(CC->curr_user,username);
408 strcpy(CC->usersupp.fullname,username);
411 for (a=0; a<MAXROOMS; ++a) {
412 CC->usersupp.lastseen[a]=0L;
413 CC->usersupp.generation[a]=(-1);
414 CC->usersupp.forget[a]=(-1);
416 strcpy(CC->usersupp.password,"");
418 /* These are the default flags on new accounts */
420 US_NEEDVALID|US_LASTOLD|US_DISAPPEAR|US_PAGINATOR|US_FLOORS;
422 CC->usersupp.timescalled = 0;
423 CC->usersupp.posted = 0;
424 CC->usersupp.axlevel = INITAX;
425 CC->usersupp.USscreenwidth = 80;
426 CC->usersupp.USscreenheight = 24;
427 time(&CC->usersupp.lastcall);
428 strcpy(CC->usersupp.USname, "");
429 strcpy(CC->usersupp.USaddr, "");
430 strcpy(CC->usersupp.UScity, "");
431 strcpy(CC->usersupp.USstate, "");
432 strcpy(CC->usersupp.USzip, "");
433 strcpy(CC->usersupp.USphone, "");
435 /* fetch a new user number */
436 CC->usersupp.usernum = get_new_user_number();
438 if (CC->usersupp.usernum == 1L) {
439 CC->usersupp.axlevel = 6;
442 /* add user to userlog */
443 putuser(&CC->usersupp,CC->curr_user);
444 if (getuser(&CC->usersupp,CC->curr_user)) {
445 return(ERROR+INTERNAL_ERROR);
447 rec_log(CL_NEWUSER,CC->curr_user);
455 * cmd_newu() - create a new user account
457 void cmd_newu(char *cmdbuf)
462 if ((CC->logged_in)) {
463 cprintf("%d Already logged in.\n",ERROR);
468 cprintf("%d %s: Too many users are already online (maximum is %d)\n",
469 ERROR+MAX_SESSIONS_EXCEEDED,
470 config.c_nodename,config.c_maxsessions);
473 extract(username,cmdbuf,0);
477 if (strlen(username)==0) {
478 cprintf("%d You must supply a user name.\n",ERROR);
482 a = create_user(username);
483 if ((!strcasecmp(username, "bbs")) ||
484 (!strcasecmp(username, "new")) ||
485 (!strcasecmp(username, ".")))
487 cprintf("%d '%s' is an invalid login name.\n", ERROR);
490 if (a==ERROR+ALREADY_EXISTS) {
491 cprintf("%d '%s' already exists.\n",
492 ERROR+ALREADY_EXISTS,username);
495 else if (a==ERROR+INTERNAL_ERROR) {
496 cprintf("%d Internal error - user record disappeared?\n",
497 ERROR+INTERNAL_ERROR);
504 cprintf("%d unknown error\n",ERROR);
506 rec_log(CL_NEWUSER,CC->curr_user);
514 void cmd_setp(char *new_pw)
516 if (!(CC->logged_in)) {
517 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
520 if (CC->usersupp.USuid != BBSUID) {
521 cprintf("%d Not allowed. Use the 'passwd' command.\n",ERROR);
525 if (strlen(new_pw)==0) {
526 cprintf("%d Password unchanged.\n",OK);
529 lgetuser(&CC->usersupp,CC->curr_user);
530 strcpy(CC->usersupp.password,new_pw);
531 lputuser(&CC->usersupp,CC->curr_user);
532 cprintf("%d Password changed.\n",OK);
533 rec_log(CL_PWCHANGE,CC->curr_user);
537 * get user parameters
539 void cmd_getu(void) {
540 if (!(CC->logged_in)) {
541 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
544 getuser(&CC->usersupp,CC->curr_user);
545 cprintf("%d %d|%d|%d\n",
547 CC->usersupp.USscreenwidth,
548 CC->usersupp.USscreenheight,
549 (CC->usersupp.flags & US_USER_SET)
554 * set user parameters
556 void cmd_setu(char *new_parms)
559 if (num_parms(new_parms)!=3) {
560 cprintf("%d Usage error.\n",ERROR);
563 if (!(CC->logged_in)) {
564 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
567 lgetuser(&CC->usersupp,CC->curr_user);
568 CC->usersupp.USscreenwidth = extract_int(new_parms,0);
569 CC->usersupp.USscreenheight = extract_int(new_parms,1);
570 CC->usersupp.flags = CC->usersupp.flags & (~US_USER_SET);
571 CC->usersupp.flags = CC->usersupp.flags |
572 (extract_int(new_parms,2) & US_USER_SET);
573 lputuser(&CC->usersupp,CC->curr_user);
574 cprintf("%d Ok\n",OK);
578 * set last read pointer
580 void cmd_slrp(char *new_ptr)
584 if (!(CC->logged_in)) {
585 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
589 if (CC->curr_rm < 0) {
590 cprintf("%d No current room.\n",ERROR);
594 if (!strncasecmp(new_ptr,"highest",7)) {
595 newlr = CC->quickroom.QRhighest;
598 newlr = atol(new_ptr);
601 lgetuser(&CC->usersupp, CC->curr_user);
602 CC->usersupp.lastseen[CC->curr_rm] = newlr;
603 lputuser(&CC->usersupp, CC->curr_user);
604 cprintf("%d %ld\n",OK,newlr);
609 * INVT and KICK commands
611 void cmd_invt_kick(char *iuser, int op)
613 { /* 1 = invite, 0 = kick out */
614 struct usersupp USscratch;
617 if (!(CC->logged_in)) {
618 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
622 if (CC->curr_rm < 0) {
623 cprintf("%d No current room.\n",ERROR);
627 if (is_room_aide()==0) {
628 cprintf("%d Higher access required.\n",
629 ERROR+HIGHER_ACCESS_REQUIRED);
633 if ( (op==1) && ((CC->quickroom.QRflags&QR_PRIVATE)==0) ) {
634 cprintf("%d Not a private room.\n",ERROR+NOT_HERE);
638 if (lgetuser(&USscratch,iuser)!=0) {
639 cprintf("%d No such user.\n",ERROR);
644 USscratch.generation[CC->curr_rm]=CC->quickroom.QRgen;
645 USscratch.forget[CC->curr_rm]=(-1);
649 USscratch.generation[CC->curr_rm]=(-1);
650 USscratch.forget[CC->curr_rm]=CC->quickroom.QRgen;
653 lputuser(&USscratch,iuser);
655 /* post a message in Aide> saying what we just did */
656 sprintf(bbb,"%s %s %s> by %s",
658 ((op == 1) ? "invited to" : "kicked out of"),
659 CC->quickroom.QRname,
660 CC->usersupp.fullname);
663 if ((op==0)&&((CC->quickroom.QRflags&QR_PRIVATE)==0)) {
664 cprintf("%d Ok. (Not a private room, <Z>ap effect only)\n",OK);
667 cprintf("%d Ok.\n",OK);
674 * forget (Zap) the current room
676 void cmd_forg(void) {
677 if (!(CC->logged_in)) {
678 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
682 if (CC->curr_rm < 0) {
683 cprintf("%d No current room.\n",ERROR);
687 if (CC->curr_rm < 3) {
688 cprintf("%d You cannot forget this room.\n",ERROR+NOT_HERE);
693 cprintf("%d Aides cannot forget rooms.\n",ERROR);
697 lgetuser(&CC->usersupp,CC->curr_user);
698 CC->usersupp.forget[CC->curr_rm] = CC->quickroom.QRgen;
699 CC->usersupp.generation[CC->curr_rm] = (-1);
700 lputuser(&CC->usersupp,CC->curr_user);
701 cprintf("%d Ok\n",OK);
706 * Get Next Unregistered User
708 void cmd_gnur(void) {
709 struct cdbdata *cdbus;
710 struct usersupp usbuf;
712 if (!(CC->logged_in)) {
713 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
717 if (CC->usersupp.axlevel < 6) {
718 cprintf("%d Higher access required.\n",
719 ERROR+HIGHER_ACCESS_REQUIRED);
723 if ((CitControl.MMflags&MM_VALID)==0) {
724 cprintf("%d There are no unvalidated users.\n",OK);
728 /* There are unvalidated users. Traverse the usersupp database,
729 * and return the first user we find that needs validation.
731 cdb_rewind(CDB_USERSUPP);
732 while (cdbus = cdb_next_item(CDB_USERSUPP), cdbus != NULL) {
733 bzero(&usbuf, sizeof(struct usersupp));
734 memcpy(&usbuf, cdbus->ptr,
735 ( (cdbus->len > sizeof(struct usersupp)) ?
736 sizeof(struct usersupp) : cdbus->len) );
738 if ((usbuf.flags & US_NEEDVALID)
739 &&(usbuf.axlevel > 0)) {
740 cprintf("%d %s\n",MORE_DATA,usbuf.fullname);
745 /* If we get to this point, there are no more unvalidated users.
746 * Therefore we clear the "users need validation" flag.
749 begin_critical_section(S_CONTROL);
751 CitControl.MMflags = CitControl.MMflags&(~MM_VALID);
753 end_critical_section(S_CONTROL);
754 cprintf("%d *** End of registration.\n",OK);
761 * get registration info for a user
763 void cmd_greg(char *who)
765 struct usersupp usbuf;
769 if (!(CC->logged_in)) {
770 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
774 if (!strcasecmp(who,"_SELF_")) strcpy(who,CC->curr_user);
776 if ((CC->usersupp.axlevel < 6) && (strcasecmp(who,CC->curr_user))) {
777 cprintf("%d Higher access required.\n",
778 ERROR+HIGHER_ACCESS_REQUIRED);
782 if (getuser(&usbuf,who) != 0) {
783 cprintf("%d '%s' not found.\n",ERROR+NO_SUCH_USER,who);
787 cprintf("%d %s\n",LISTING_FOLLOWS,usbuf.fullname);
788 cprintf("%ld\n",usbuf.usernum);
789 cprintf("%s\n",usbuf.password);
790 cprintf("%s\n",usbuf.USname);
791 cprintf("%s\n",usbuf.USaddr);
792 cprintf("%s\n%s\n%s\n",
793 usbuf.UScity,usbuf.USstate,usbuf.USzip);
794 strcpy(pbuf,usbuf.USphone);
796 for (a=0; a<strlen(pbuf); ++a) {
797 if ((pbuf[a]>='0')&&(pbuf[a]<='9')) {
798 b=strlen(usbuf.USphone);
799 usbuf.USphone[b]=pbuf[a];
800 usbuf.USphone[b+1]=0;
803 while(strlen(usbuf.USphone)<10) {
804 strcpy(pbuf,usbuf.USphone);
805 strcpy(usbuf.USphone," ");
806 strcat(usbuf.USphone,pbuf);
809 cprintf("(%c%c%c) %c%c%c-%c%c%c%c\n",
810 usbuf.USphone[0],usbuf.USphone[1],
811 usbuf.USphone[2],usbuf.USphone[3],
812 usbuf.USphone[4],usbuf.USphone[5],
813 usbuf.USphone[6],usbuf.USphone[7],
814 usbuf.USphone[8],usbuf.USphone[9]);
816 cprintf("%d\n",usbuf.axlevel);
817 cprintf("%s\n",usbuf.USemail);
824 void cmd_vali(char *v_args)
828 struct usersupp userbuf;
830 extract(user,v_args,0);
831 newax = extract_int(v_args,1);
833 if (!(CC->logged_in)) {
834 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
838 if (CC->usersupp.axlevel < 6) {
839 cprintf("%d Higher access required.\n",
840 ERROR+HIGHER_ACCESS_REQUIRED);
844 if (lgetuser(&userbuf,user)!=0) {
845 cprintf("%d '%s' not found.\n",ERROR+NO_SUCH_USER,user);
849 userbuf.axlevel = newax;
850 userbuf.flags = (userbuf.flags & ~US_NEEDVALID);
852 lputuser(&userbuf,user);
854 /* If the access level was set to zero, delete the user */
856 if (purge_user(user)==0) {
857 cprintf("%d %s Deleted.\n", OK, userbuf.fullname);
862 cprintf("%d ok\n",OK);
870 void cmd_list(void) {
871 struct usersupp usbuf;
872 struct cdbdata *cdbus;
874 cdb_rewind(CDB_USERSUPP);
875 cprintf("%d \n",LISTING_FOLLOWS);
877 while(cdbus = cdb_next_item(CDB_USERSUPP), cdbus != NULL) {
878 bzero(&usbuf, sizeof(struct usersupp));
879 memcpy(&usbuf, cdbus->ptr,
880 ( (cdbus->len > sizeof(struct usersupp)) ?
881 sizeof(struct usersupp) : cdbus->len) );
884 if (usbuf.axlevel > 0) {
885 if ((CC->usersupp.axlevel>=6)
886 ||((usbuf.flags&US_UNLISTED)==0)
887 ||((CC->internal_pgm))) {
888 cprintf("%s|%d|%ld|%ld|%d|%d|",
895 if (CC->usersupp.axlevel >= 6) cprintf("%s",usbuf.password);
904 * enter registration info
906 void cmd_regi(void) {
918 if (!(CC->logged_in)) {
919 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
931 cprintf("%d Send registration...\n",SEND_LISTING);
933 while (client_gets(buf), strcmp(buf,"000")) {
934 if (a==0) strcpy(tmpname,buf);
935 if (a==1) strcpy(tmpaddr,buf);
936 if (a==2) strcpy(tmpcity,buf);
937 if (a==3) strcpy(tmpstate,buf);
939 for (c=0; c<strlen(buf); ++c) {
940 if ((buf[c]>='0')&&(buf[c]<='9')) {
948 for (c=0; c<strlen(buf); ++c) {
949 if ((buf[c]>='0')&&(buf[c]<='9')) {
956 if (a==6) strncpy(tmpemail,buf,31);
968 lgetuser(&CC->usersupp,CC->curr_user);
969 strcpy(CC->usersupp.USname,tmpname);
970 strcpy(CC->usersupp.USaddr,tmpaddr);
971 strcpy(CC->usersupp.UScity,tmpcity);
972 strcpy(CC->usersupp.USstate,tmpstate);
973 strcpy(CC->usersupp.USzip,tmpzip);
974 strcpy(CC->usersupp.USphone,tmpphone);
975 strcpy(CC->usersupp.USemail,tmpemail);
976 CC->usersupp.flags=(CC->usersupp.flags|US_REGIS|US_NEEDVALID);
977 lputuser(&CC->usersupp,CC->curr_user);
979 /* set global flag calling for validation */
980 begin_critical_section(S_CONTROL);
982 CitControl.MMflags = CitControl.MMflags | MM_VALID ;
984 end_critical_section(S_CONTROL);
985 cprintf("%d *** End of registration.\n",OK);
990 * assorted info we need to check at login
992 void cmd_chek(void) {
997 struct cdbdata *cdbmb;
1002 if (!(CC->logged_in)) {
1003 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
1007 getuser(&CC->usersupp,CC->curr_user); /* no lock is needed here */
1008 if ((REGISCALL!=0)&&((CC->usersupp.flags&US_REGIS)==0)) regis = 1;
1010 if (CC->usersupp.axlevel >= 6) {
1012 if (CitControl.MMflags&MM_VALID) vali = 1;
1016 /* check for mail */
1018 cdbmb = cdb_fetch(CDB_MAILBOXES, &CC->usersupp.usernum, sizeof(long));
1019 if (cdbmb != NULL) {
1020 num_mails = cdbmb->len / sizeof(long);
1021 mailbox = (long *) cdbmb->ptr;
1022 if (num_mails > 0) for (a=0; a<num_mails; ++a) {
1023 if (mailbox[a] > (CC->usersupp.lastseen[1])) ++mail;
1029 cprintf("%d %d|%d|%d\n",OK,mail,regis,vali);
1034 * check to see if a user exists
1036 void cmd_qusr(char *who)
1038 struct usersupp usbuf;
1040 if (getuser(&usbuf,who) == 0) {
1041 cprintf("%d %s\n",OK,usbuf.fullname);
1044 cprintf("%d No such user.\n",ERROR+NO_SUCH_USER);
1052 void cmd_ebio(void) {
1056 if (!(CC->logged_in)) {
1057 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
1061 sprintf(buf,"./bio/%ld",CC->usersupp.usernum);
1062 fp = fopen(buf,"w");
1064 cprintf("%d Cannot create file\n",ERROR);
1067 cprintf("%d \n",SEND_LISTING);
1068 while(client_gets(buf), strcmp(buf,"000")) {
1069 fprintf(fp,"%s\n",buf);
1077 void cmd_rbio(char *cmdbuf)
1079 struct usersupp ruser;
1083 extract(buf,cmdbuf,0);
1084 if (getuser(&ruser,buf)!=0) {
1085 cprintf("%d No such user.\n",ERROR+NO_SUCH_USER);
1088 sprintf(buf,"./bio/%ld",ruser.usernum);
1090 fp = fopen(buf,"r");
1092 cprintf("%d %s has no bio on file.\n",
1093 ERROR+FILE_NOT_FOUND,ruser.fullname);
1096 cprintf("%d \n",LISTING_FOLLOWS);
1097 while (fgets(buf,256,fp)!=NULL) cprintf("%s",buf);
1103 * list of users who have entered bios
1105 void cmd_lbio(void) {
1108 struct usersupp usbuf;
1110 ls=popen("cd ./bio; ls","r");
1112 cprintf("%d Cannot open listing.\n",ERROR+FILE_NOT_FOUND);
1116 cprintf("%d\n",LISTING_FOLLOWS);
1117 while (fgets(buf,255,ls)!=NULL)
1118 if (getuserbynumber(&usbuf,atol(buf))==0)
1119 cprintf("%s\n",usbuf.fullname);
1126 * Administrative Get User Parameters
1128 void cmd_agup(char *cmdbuf) {
1129 struct usersupp usbuf;
1130 char requested_user[256];
1132 if ( (CC->internal_pgm==0)
1133 && ( (CC->logged_in == 0) || (is_aide()==0) ) ) {
1134 cprintf("%d Higher access required.\n",
1135 ERROR + HIGHER_ACCESS_REQUIRED);
1139 extract(requested_user, cmdbuf, 0);
1140 if (getuser(&usbuf, requested_user) != 0) {
1141 cprintf("%d No such user.\n", ERROR + NO_SUCH_USER);
1145 cprintf("%d %s|%s|%u|%d|%d|%d|%ld\n",
1160 * Administrative Set User Parameters
1162 void cmd_asup(char *cmdbuf) {
1163 struct usersupp usbuf;
1164 char requested_user[256];
1168 if ( (CC->internal_pgm==0)
1169 && ( (CC->logged_in == 0) || (is_aide()==0) ) ) {
1170 cprintf("%d Higher access required.\n",
1171 ERROR + HIGHER_ACCESS_REQUIRED);
1175 extract(requested_user, cmdbuf, 0);
1176 if (lgetuser(&usbuf, requested_user) != 0) {
1177 cprintf("%d No such user.\n", ERROR + NO_SUCH_USER);
1181 np = num_parms(cmdbuf);
1182 if (np > 1) extract(usbuf.password, cmdbuf, 1);
1183 if (np > 2) usbuf.flags = extract_int(cmdbuf, 2);
1184 if (np > 3) usbuf.timescalled = extract_int(cmdbuf, 3);
1185 if (np > 4) usbuf.posted = extract_int(cmdbuf, 4);
1187 newax = extract_int(cmdbuf, 5);
1188 if ((newax >=0) && (newax <= 6)) {
1189 usbuf.axlevel = extract_int(cmdbuf, 5);
1193 lputuser(&usbuf, requested_user);
1194 if (usbuf.axlevel == 0) {
1195 if (purge_user(requested_user)==0) {
1196 cprintf("%d %s deleted.\n", OK, requested_user);
1199 cprintf("%d Ok\n", OK);