1 /* needed to properly enable crypt() stuff on some systems */
3 /* needed for str[n]casecmp() on some systems if the above is defined */
4 #define _XOPEN_SOURCE_EXTENDED
12 #include <sys/types.h>
21 extern struct config config;
25 * hash() - hash table function for user lookup
32 for (i=0; i<strlen(str); ++i) h=h+((i+1)*tolower(str[i]));
38 * getuser() - retrieve named user into supplied buffer.
39 * returns 0 on success
41 int getuser(struct usersupp *usbuf, char name[]) {
43 char lowercase_name[32];
45 struct cdbdata *cdbus;
47 bzero(usbuf, sizeof(struct usersupp));
48 for (a=0; a<=strlen(name); ++a) {
49 lowercase_name[a] = tolower(name[a]);
52 cdbus = cdb_fetch(CDB_USERSUPP, lowercase_name, strlen(lowercase_name));
54 return(1); /* user not found */
57 memcpy(usbuf, cdbus->ptr,
58 ( (cdbus->len > sizeof(struct usersupp)) ?
59 sizeof(struct usersupp) : cdbus->len) );
66 * lgetuser() - same as getuser() but locks the record
68 int lgetuser(struct usersupp *usbuf, char *name)
72 retcode = getuser(usbuf,name);
74 begin_critical_section(S_USERSUPP);
81 * putuser() - write user buffer into the correct place on disk
83 void putuser(struct usersupp *usbuf, char *name)
85 char lowercase_name[32];
88 for (a=0; a<=strlen(name); ++a) {
89 lowercase_name[a] = tolower(name[a]);
92 cdb_store(CDB_USERSUPP,
93 lowercase_name, strlen(lowercase_name),
94 usbuf, sizeof(struct usersupp));
100 * lputuser() - same as putuser() but locks the record
102 void lputuser(struct usersupp *usbuf, char *name) {
104 end_critical_section(S_USERSUPP);
109 * Is the user currently logged in an Aide?
112 if (CC->usersupp.axlevel >= 6) return(1);
118 * Is the user currently logged in an Aide *or* the room aide for this room?
120 int is_room_aide(void) {
121 if ( (CC->usersupp.axlevel >= 6)
122 || (CC->quickroom.QRroomaide == CC->usersupp.usernum) ) {
131 * getuserbynumber() - get user by number
132 * returns 0 if user was found
134 int getuserbynumber(struct usersupp *usbuf, long int number)
136 struct cdbdata *cdbus;
138 cdb_rewind(CDB_USERSUPP);
140 while(cdbus = cdb_next_item(CDB_USERSUPP), cdbus != NULL) {
141 bzero(usbuf, sizeof(struct usersupp));
142 memcpy(usbuf, cdbus->ptr,
143 ( (cdbus->len > sizeof(struct usersupp)) ?
144 sizeof(struct usersupp) : cdbus->len) );
146 if (usbuf->usernum == number) {
157 void cmd_user(char *cmdbuf)
165 extract(username,cmdbuf,0);
169 if ((CC->logged_in)) {
170 cprintf("%d Already logged in.\n",ERROR);
174 found_user = getuser(&CC->usersupp,username);
175 if (found_user != 0) {
176 p = (struct passwd *)getpwnam(username);
178 strcpy(autoname,p->pw_gecos);
179 for (a=0; a<strlen(autoname); ++a)
180 if (autoname[a]==',') autoname[a]=0;
181 found_user = getuser(&CC->usersupp,autoname);
184 if (found_user == 0) {
185 if (((CC->nologin)) && (CC->usersupp.axlevel < 6)) {
186 cprintf("%d %s: Too many users are already online (maximum is %d)\n",
187 ERROR+MAX_SESSIONS_EXCEEDED,
188 config.c_nodename,config.c_maxsessions);
191 strcpy(CC->curr_user,CC->usersupp.fullname);
192 cprintf("%d Password required for %s\n",
193 MORE_DATA,CC->curr_user);
197 cprintf("%d %s not found.\n",ERROR,username);
204 * session startup code which is common to both cmd_pass() and cmd_newu()
206 void session_startup(void) {
210 syslog(LOG_NOTICE,"user <%s> logged in",CC->curr_user);
211 hook_user_login(CC->cs_pid, CC->curr_user);
212 lgetuser(&CC->usersupp,CC->curr_user);
213 ++(CC->usersupp.timescalled);
214 CC->fake_username[0] = '\0';
215 CC->fake_postname[0] = '\0';
216 CC->fake_hostname[0] = '\0';
217 CC->fake_roomname[0] = '\0';
218 CC->last_pager[0] = '\0';
219 time(&CC->usersupp.lastcall);
221 /* If this user's name is the name of the system administrator
222 * (as specified in setup), automatically assign access level 6.
224 if (!strcasecmp(CC->usersupp.fullname, config.c_sysadm)) {
225 CC->usersupp.axlevel = 6;
228 /* A room's generation number changes each time it is recycled. Users are kept
229 * out of private rooms or forget rooms by matching the generation numbers. To
230 * avoid an accidental matchup, unmatched numbers are set to -1 here.
232 for (a=0; a<MAXROOMS; ++a) {
234 if (CC->usersupp.generation[a] != qr.QRgen)
235 CC->usersupp.generation[a]=(-1);
236 if (CC->usersupp.forget[a] != qr.QRgen)
237 CC->usersupp.forget[a]=(-1);
240 lputuser(&CC->usersupp,CC->curr_user);
242 cprintf("%d %s|%d|%d|%d|%u|%ld\n",OK,CC->usersupp.fullname,CC->usersupp.axlevel,
243 CC->usersupp.timescalled,CC->usersupp.posted,CC->usersupp.flags,
244 CC->usersupp.usernum);
245 usergoto(0,0); /* Enter the lobby */
246 rec_log(CL_LOGIN,CC->curr_user);
252 * misc things to be taken care of when a user is logged out
254 void logout(struct CitContext *who)
257 if (who->download_fp != NULL) {
258 fclose(who->download_fp);
259 who->download_fp = NULL;
261 if (who->upload_fp != NULL) {
267 void cmd_pass(char *buf)
273 extract(password,buf,0);
275 if ((CC->logged_in)) {
276 cprintf("%d Already logged in.\n",ERROR);
279 if (!strcmp(CC->curr_user,"")) {
280 cprintf("%d You must send a name with USER first.\n",ERROR);
283 if (getuser(&CC->usersupp,CC->curr_user)) {
284 cprintf("%d Can't find user record!\n",ERROR+INTERNAL_ERROR);
289 if (CC->usersupp.USuid == BBSUID) {
291 strproc(CC->usersupp.password);
292 code = strcasecmp(CC->usersupp.password,password);
295 p = (struct passwd *)getpwuid(CC->usersupp.USuid);
296 #ifdef ENABLE_AUTOLOGIN
298 if (!strcmp(p->pw_passwd,
299 (char *)crypt(password,p->pw_passwd))) {
301 lgetuser(&CC->usersupp, CC->curr_user);
302 strcpy(CC->usersupp.password, password);
303 lputuser(&CC->usersupp, CC->curr_user);
314 cprintf("%d Wrong password.\n",ERROR);
315 rec_log(CL_BADPW,CC->curr_user);
321 * purge related files when removing or overwriting a user record
323 void purge_user(char *pname) {
325 struct usersupp usbuf;
327 struct cdbdata *cdbmb;
331 if (getuser(&usbuf, pname) != 0) {
332 lprintf(5, "Cannot purge user <%s> - not found\n", pname);
336 /* delete any messages in the user's mailbox */
337 cdbmb = cdb_fetch(CDB_MAILBOXES, &usbuf.usernum, sizeof(long));
339 num_mails = cdbmb->len / sizeof(long);
340 mailbox = (long *) cdbmb->ptr;
341 if (num_mails > 0) for (a=0; a<num_mails; ++a) {
342 cdb_delete(CDB_MSGMAIN, &mailbox[a], sizeof(long));
345 /* now delete the mailbox itself */
346 cdb_delete(CDB_MAILBOXES, &usbuf.usernum, sizeof(long));
350 /* delete the userlog entry */
351 cdb_delete(CDB_USERSUPP, pname, strlen(pname));
353 /* remove the user's bio file */
354 sprintf(filename, "./bio/%ld", usbuf.usernum);
357 /* remove the user's picture */
358 sprintf(filename, "./userpics/%ld.gif", usbuf.usernum);
365 * create_user() - back end processing to create a new user
367 int create_user(char *newusername)
369 struct usersupp usbuf;
371 struct passwd *p = NULL;
374 strcpy(username, newusername);
377 #ifdef ENABLE_AUTOLOGIN
378 p = (struct passwd *)getpwnam(username);
381 strcpy(username, p->pw_gecos);
382 for (a=0; a<strlen(username); ++a) {
383 if (username[a] == ',') username[a] = 0;
385 CC->usersupp.USuid = p->pw_uid;
388 CC->usersupp.USuid = BBSUID;
391 if (!getuser(&usbuf,username)) {
392 return(ERROR+ALREADY_EXISTS);
395 strcpy(CC->curr_user,username);
396 strcpy(CC->usersupp.fullname,username);
399 for (a=0; a<MAXROOMS; ++a) {
400 CC->usersupp.lastseen[a]=0L;
401 CC->usersupp.generation[a]=(-1);
402 CC->usersupp.forget[a]=(-1);
404 strcpy(CC->usersupp.password,"");
406 /* These are the default flags on new accounts */
408 US_NEEDVALID|US_LASTOLD|US_DISAPPEAR|US_PAGINATOR|US_FLOORS;
410 CC->usersupp.timescalled = 0;
411 CC->usersupp.posted = 0;
412 CC->usersupp.axlevel = INITAX;
413 CC->usersupp.USscreenwidth = 80;
414 CC->usersupp.USscreenheight = 24;
415 time(&CC->usersupp.lastcall);
416 strcpy(CC->usersupp.USname, "");
417 strcpy(CC->usersupp.USaddr, "");
418 strcpy(CC->usersupp.UScity, "");
419 strcpy(CC->usersupp.USstate, "");
420 strcpy(CC->usersupp.USzip, "");
421 strcpy(CC->usersupp.USphone, "");
423 /* fetch a new user number */
424 CC->usersupp.usernum = get_new_user_number();
426 if (CC->usersupp.usernum == 1L) {
427 CC->usersupp.axlevel = 6;
430 /* add user to userlog */
431 putuser(&CC->usersupp,CC->curr_user);
432 if (getuser(&CC->usersupp,CC->curr_user)) {
433 return(ERROR+INTERNAL_ERROR);
435 rec_log(CL_NEWUSER,CC->curr_user);
443 * cmd_newu() - create a new user account
445 void cmd_newu(char *cmdbuf)
450 if ((CC->logged_in)) {
451 cprintf("%d Already logged in.\n",ERROR);
456 cprintf("%d %s: Too many users are already online (maximum is %d)\n",
457 ERROR+MAX_SESSIONS_EXCEEDED,
458 config.c_nodename,config.c_maxsessions);
461 extract(username,cmdbuf,0);
465 if (strlen(username)==0) {
466 cprintf("%d You must supply a user name.\n",ERROR);
470 a = create_user(username);
471 if ((!strcasecmp(username, "bbs")) ||
472 (!strcasecmp(username, "new")) ||
473 (!strcasecmp(username, ".")))
475 cprintf("%d '%s' is an invalid login name.\n", ERROR);
478 if (a==ERROR+ALREADY_EXISTS) {
479 cprintf("%d '%s' already exists.\n",
480 ERROR+ALREADY_EXISTS,username);
483 else if (a==ERROR+INTERNAL_ERROR) {
484 cprintf("%d Internal error - user record disappeared?\n",
485 ERROR+INTERNAL_ERROR);
492 cprintf("%d unknown error\n",ERROR);
494 rec_log(CL_NEWUSER,CC->curr_user);
502 void cmd_setp(char *new_pw)
504 if (!(CC->logged_in)) {
505 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
508 if (CC->usersupp.USuid != BBSUID) {
509 cprintf("%d Not allowed. Use the 'passwd' command.\n",ERROR);
513 if (strlen(new_pw)==0) {
514 cprintf("%d Password unchanged.\n",OK);
517 lgetuser(&CC->usersupp,CC->curr_user);
518 strcpy(CC->usersupp.password,new_pw);
519 lputuser(&CC->usersupp,CC->curr_user);
520 cprintf("%d Password changed.\n",OK);
521 rec_log(CL_PWCHANGE,CC->curr_user);
525 * get user parameters
527 void cmd_getu(void) {
528 if (!(CC->logged_in)) {
529 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
532 getuser(&CC->usersupp,CC->curr_user);
533 cprintf("%d %d|%d|%d\n",
535 CC->usersupp.USscreenwidth,
536 CC->usersupp.USscreenheight,
537 (CC->usersupp.flags & US_USER_SET)
542 * set user parameters
544 void cmd_setu(char *new_parms)
547 if (num_parms(new_parms)!=3) {
548 cprintf("%d Usage error.\n",ERROR);
551 if (!(CC->logged_in)) {
552 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
555 lgetuser(&CC->usersupp,CC->curr_user);
556 CC->usersupp.USscreenwidth = extract_int(new_parms,0);
557 CC->usersupp.USscreenheight = extract_int(new_parms,1);
558 CC->usersupp.flags = CC->usersupp.flags & (~US_USER_SET);
559 CC->usersupp.flags = CC->usersupp.flags |
560 (extract_int(new_parms,2) & US_USER_SET);
561 lputuser(&CC->usersupp,CC->curr_user);
562 cprintf("%d Ok\n",OK);
566 * set last read pointer
568 void cmd_slrp(char *new_ptr)
572 if (!(CC->logged_in)) {
573 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
577 if (CC->curr_rm < 0) {
578 cprintf("%d No current room.\n",ERROR);
582 if (!strncasecmp(new_ptr,"highest",7)) {
583 newlr = CC->quickroom.QRhighest;
586 newlr = atol(new_ptr);
589 lgetuser(&CC->usersupp, CC->curr_user);
590 CC->usersupp.lastseen[CC->curr_rm] = newlr;
591 lputuser(&CC->usersupp, CC->curr_user);
592 cprintf("%d %ld\n",OK,newlr);
597 * INVT and KICK commands
599 void cmd_invt_kick(char *iuser, int op)
601 { /* 1 = invite, 0 = kick out */
602 struct usersupp USscratch;
605 if (!(CC->logged_in)) {
606 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
610 if (CC->curr_rm < 0) {
611 cprintf("%d No current room.\n",ERROR);
615 if (is_room_aide()==0) {
616 cprintf("%d Higher access required.\n",
617 ERROR+HIGHER_ACCESS_REQUIRED);
621 if ( (op==1) && ((CC->quickroom.QRflags&QR_PRIVATE)==0) ) {
622 cprintf("%d Not a private room.\n",ERROR+NOT_HERE);
626 if (lgetuser(&USscratch,iuser)!=0) {
627 cprintf("%d No such user.\n",ERROR);
632 USscratch.generation[CC->curr_rm]=CC->quickroom.QRgen;
633 USscratch.forget[CC->curr_rm]=(-1);
637 USscratch.generation[CC->curr_rm]=(-1);
638 USscratch.forget[CC->curr_rm]=CC->quickroom.QRgen;
641 lputuser(&USscratch,iuser);
643 /* post a message in Aide> saying what we just did */
644 sprintf(bbb,"%s %s %s> by %s",
646 ((op == 1) ? "invited to" : "kicked out of"),
647 CC->quickroom.QRname,
648 CC->usersupp.fullname);
651 if ((op==0)&&((CC->quickroom.QRflags&QR_PRIVATE)==0)) {
652 cprintf("%d Ok. (Not a private room, <Z>ap effect only)\n",OK);
655 cprintf("%d Ok.\n",OK);
662 * forget (Zap) the current room
664 void cmd_forg(void) {
665 if (!(CC->logged_in)) {
666 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
670 if (CC->curr_rm < 0) {
671 cprintf("%d No current room.\n",ERROR);
675 if (CC->curr_rm < 3) {
676 cprintf("%d You cannot forget this room.\n",ERROR+NOT_HERE);
681 cprintf("%d Aides cannot forget rooms.\n",ERROR);
685 lgetuser(&CC->usersupp,CC->curr_user);
686 CC->usersupp.forget[CC->curr_rm] = CC->quickroom.QRgen;
687 CC->usersupp.generation[CC->curr_rm] = (-1);
688 lputuser(&CC->usersupp,CC->curr_user);
689 cprintf("%d Ok\n",OK);
694 * Get Next Unregistered User
696 void cmd_gnur(void) {
697 struct cdbdata *cdbus;
698 struct usersupp usbuf;
700 if (!(CC->logged_in)) {
701 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
705 if (CC->usersupp.axlevel < 6) {
706 cprintf("%d Higher access required.\n",
707 ERROR+HIGHER_ACCESS_REQUIRED);
711 if ((CitControl.MMflags&MM_VALID)==0) {
712 cprintf("%d There are no unvalidated users.\n",OK);
716 /* There are unvalidated users. Traverse the usersupp database,
717 * and return the first user we find that needs validation.
719 cdb_rewind(CDB_USERSUPP);
720 while (cdbus = cdb_next_item(CDB_USERSUPP), cdbus != NULL) {
721 bzero(&usbuf, sizeof(struct usersupp));
722 memcpy(&usbuf, cdbus->ptr,
723 ( (cdbus->len > sizeof(struct usersupp)) ?
724 sizeof(struct usersupp) : cdbus->len) );
726 if ((usbuf.flags & US_NEEDVALID)
727 &&(usbuf.axlevel > 0)) {
728 cprintf("%d %s\n",MORE_DATA,usbuf.fullname);
733 /* If we get to this point, there are no more unvalidated users.
734 * Therefore we clear the "users need validation" flag.
737 begin_critical_section(S_CONTROL);
739 CitControl.MMflags = CitControl.MMflags&(~MM_VALID);
741 end_critical_section(S_CONTROL);
742 cprintf("%d *** End of registration.\n",OK);
749 * get registration info for a user
751 void cmd_greg(char *who)
753 struct usersupp usbuf;
757 if (!(CC->logged_in)) {
758 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
762 if (!strcasecmp(who,"_SELF_")) strcpy(who,CC->curr_user);
764 if ((CC->usersupp.axlevel < 6) && (strcasecmp(who,CC->curr_user))) {
765 cprintf("%d Higher access required.\n",
766 ERROR+HIGHER_ACCESS_REQUIRED);
770 if (getuser(&usbuf,who) != 0) {
771 cprintf("%d '%s' not found.\n",ERROR+NO_SUCH_USER,who);
775 cprintf("%d %s\n",LISTING_FOLLOWS,usbuf.fullname);
776 cprintf("%ld\n",usbuf.usernum);
777 cprintf("%s\n",usbuf.password);
778 cprintf("%s\n",usbuf.USname);
779 cprintf("%s\n",usbuf.USaddr);
780 cprintf("%s\n%s\n%s\n",
781 usbuf.UScity,usbuf.USstate,usbuf.USzip);
782 strcpy(pbuf,usbuf.USphone);
784 for (a=0; a<strlen(pbuf); ++a) {
785 if ((pbuf[a]>='0')&&(pbuf[a]<='9')) {
786 b=strlen(usbuf.USphone);
787 usbuf.USphone[b]=pbuf[a];
788 usbuf.USphone[b+1]=0;
791 while(strlen(usbuf.USphone)<10) {
792 strcpy(pbuf,usbuf.USphone);
793 strcpy(usbuf.USphone," ");
794 strcat(usbuf.USphone,pbuf);
797 cprintf("(%c%c%c) %c%c%c-%c%c%c%c\n",
798 usbuf.USphone[0],usbuf.USphone[1],
799 usbuf.USphone[2],usbuf.USphone[3],
800 usbuf.USphone[4],usbuf.USphone[5],
801 usbuf.USphone[6],usbuf.USphone[7],
802 usbuf.USphone[8],usbuf.USphone[9]);
804 cprintf("%d\n",usbuf.axlevel);
805 cprintf("%s\n",usbuf.USemail);
812 void cmd_vali(char *v_args)
816 struct usersupp userbuf;
818 extract(user,v_args,0);
819 newax = extract_int(v_args,1);
821 if (!(CC->logged_in)) {
822 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
826 if (CC->usersupp.axlevel < 6) {
827 cprintf("%d Higher access required.\n",
828 ERROR+HIGHER_ACCESS_REQUIRED);
832 if (lgetuser(&userbuf,user)!=0) {
833 cprintf("%d '%s' not found.\n",ERROR+NO_SUCH_USER,user);
837 userbuf.axlevel = newax;
838 userbuf.flags = (userbuf.flags & ~US_NEEDVALID);
840 lputuser(&userbuf,user);
842 /* If the access level was set to zero, delete the user */
845 cprintf("%d %s Deleted.\n", OK, userbuf.fullname);
849 cprintf("%d ok\n",OK);
857 void cmd_list(void) {
858 struct usersupp usbuf;
859 struct cdbdata *cdbus;
861 cdb_rewind(CDB_USERSUPP);
862 cprintf("%d \n",LISTING_FOLLOWS);
864 while(cdbus = cdb_next_item(CDB_USERSUPP), cdbus != NULL) {
865 bzero(&usbuf, sizeof(struct usersupp));
866 memcpy(&usbuf, cdbus->ptr,
867 ( (cdbus->len > sizeof(struct usersupp)) ?
868 sizeof(struct usersupp) : cdbus->len) );
871 if (usbuf.axlevel > 0) {
872 if ((CC->usersupp.axlevel>=6)
873 ||((usbuf.flags&US_UNLISTED)==0)
874 ||((CC->internal_pgm))) {
875 cprintf("%s|%d|%ld|%ld|%d|%d|",
882 if (CC->usersupp.axlevel >= 6) cprintf("%s",usbuf.password);
891 * enter registration info
893 void cmd_regi(void) {
905 if (!(CC->logged_in)) {
906 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
918 cprintf("%d Send registration...\n",SEND_LISTING);
920 while (client_gets(buf), strcmp(buf,"000")) {
921 if (a==0) strcpy(tmpname,buf);
922 if (a==1) strcpy(tmpaddr,buf);
923 if (a==2) strcpy(tmpcity,buf);
924 if (a==3) strcpy(tmpstate,buf);
926 for (c=0; c<strlen(buf); ++c) {
927 if ((buf[c]>='0')&&(buf[c]<='9')) {
935 for (c=0; c<strlen(buf); ++c) {
936 if ((buf[c]>='0')&&(buf[c]<='9')) {
943 if (a==6) strncpy(tmpemail,buf,31);
955 lgetuser(&CC->usersupp,CC->curr_user);
956 strcpy(CC->usersupp.USname,tmpname);
957 strcpy(CC->usersupp.USaddr,tmpaddr);
958 strcpy(CC->usersupp.UScity,tmpcity);
959 strcpy(CC->usersupp.USstate,tmpstate);
960 strcpy(CC->usersupp.USzip,tmpzip);
961 strcpy(CC->usersupp.USphone,tmpphone);
962 strcpy(CC->usersupp.USemail,tmpemail);
963 CC->usersupp.flags=(CC->usersupp.flags|US_REGIS|US_NEEDVALID);
964 lputuser(&CC->usersupp,CC->curr_user);
966 /* set global flag calling for validation */
967 begin_critical_section(S_CONTROL);
969 CitControl.MMflags = CitControl.MMflags | MM_VALID ;
971 end_critical_section(S_CONTROL);
972 cprintf("%d *** End of registration.\n",OK);
977 * assorted info we need to check at login
979 void cmd_chek(void) {
984 struct cdbdata *cdbmb;
989 if (!(CC->logged_in)) {
990 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
994 getuser(&CC->usersupp,CC->curr_user); /* no lock is needed here */
995 if ((REGISCALL!=0)&&((CC->usersupp.flags&US_REGIS)==0)) regis = 1;
997 if (CC->usersupp.axlevel >= 6) {
999 if (CitControl.MMflags&MM_VALID) vali = 1;
1003 /* check for mail */
1005 cdbmb = cdb_fetch(CDB_MAILBOXES, &CC->usersupp.usernum, sizeof(long));
1006 if (cdbmb != NULL) {
1007 num_mails = cdbmb->len / sizeof(long);
1008 mailbox = (long *) cdbmb->ptr;
1009 if (num_mails > 0) for (a=0; a<num_mails; ++a) {
1010 if (mailbox[a] > (CC->usersupp.lastseen[1])) ++mail;
1016 cprintf("%d %d|%d|%d\n",OK,mail,regis,vali);
1021 * check to see if a user exists
1023 void cmd_qusr(char *who)
1025 struct usersupp usbuf;
1027 if (getuser(&usbuf,who) == 0) {
1028 cprintf("%d %s\n",OK,usbuf.fullname);
1031 cprintf("%d No such user.\n",ERROR+NO_SUCH_USER);
1039 void cmd_ebio(void) {
1043 if (!(CC->logged_in)) {
1044 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
1048 sprintf(buf,"./bio/%ld",CC->usersupp.usernum);
1049 fp = fopen(buf,"w");
1051 cprintf("%d Cannot create file\n",ERROR);
1054 cprintf("%d \n",SEND_LISTING);
1055 while(client_gets(buf), strcmp(buf,"000")) {
1056 fprintf(fp,"%s\n",buf);
1064 void cmd_rbio(char *cmdbuf)
1066 struct usersupp ruser;
1070 extract(buf,cmdbuf,0);
1071 if (getuser(&ruser,buf)!=0) {
1072 cprintf("%d No such user.\n",ERROR+NO_SUCH_USER);
1075 sprintf(buf,"./bio/%ld",ruser.usernum);
1077 fp = fopen(buf,"r");
1079 cprintf("%d %s has no bio on file.\n",
1080 ERROR+FILE_NOT_FOUND,ruser.fullname);
1083 cprintf("%d \n",LISTING_FOLLOWS);
1084 while (fgets(buf,256,fp)!=NULL) cprintf("%s",buf);
1090 * list of users who have entered bios
1092 void cmd_lbio(void) {
1095 struct usersupp usbuf;
1097 ls=popen("cd ./bio; ls","r");
1099 cprintf("%d Cannot open listing.\n",ERROR+FILE_NOT_FOUND);
1103 cprintf("%d\n",LISTING_FOLLOWS);
1104 while (fgets(buf,255,ls)!=NULL)
1105 if (getuserbynumber(&usbuf,atol(buf))==0)
1106 cprintf("%s\n",usbuf.fullname);
1113 * Administrative Get User Parameters
1115 void cmd_agup(char *cmdbuf) {
1116 struct usersupp usbuf;
1117 char requested_user[256];
1119 if ( (CC->internal_pgm==0)
1120 && ( (CC->logged_in == 0) || (is_aide()==0) ) ) {
1121 cprintf("%d Higher access required.\n",
1122 ERROR + HIGHER_ACCESS_REQUIRED);
1126 extract(requested_user, cmdbuf, 0);
1127 if (getuser(&usbuf, requested_user) != 0) {
1128 cprintf("%d No such user.\n", ERROR + NO_SUCH_USER);
1132 cprintf("%d %s|%s|%u|%d|%d|%d|%ld\n",
1147 * Administrative Set User Parameters
1149 void cmd_asup(char *cmdbuf) {
1150 struct usersupp usbuf;
1151 char requested_user[256];
1154 if ( (CC->internal_pgm==0)
1155 && ( (CC->logged_in == 0) || (is_aide()==0) ) ) {
1156 cprintf("%d Higher access required.\n",
1157 ERROR + HIGHER_ACCESS_REQUIRED);
1161 extract(requested_user, cmdbuf, 0);
1162 if (lgetuser(&usbuf, requested_user) != 0) {
1163 cprintf("%d No such user.\n", ERROR + NO_SUCH_USER);
1167 np = num_parms(cmdbuf);
1168 if (np > 1) extract(usbuf.password, cmdbuf, 1);
1169 if (np > 2) usbuf.flags = extract_int(cmdbuf, 2);
1170 if (np > 3) usbuf.timescalled = extract_int(cmdbuf, 3);
1171 if (np > 4) usbuf.posted = extract_int(cmdbuf, 4);
1172 if (np > 5) usbuf.axlevel = extract_int(cmdbuf, 5);
1174 lputuser(&usbuf, requested_user);
1175 cprintf("%d Ok\n", OK);