11 #include <sys/types.h>
24 #include "sysdep_decls.h"
32 #include "dynloader.h"
37 * getuser() - retrieve named user into supplied buffer.
38 * returns 0 on success
40 int getuser(struct usersupp *usbuf, char name[]) {
42 char lowercase_name[32];
44 struct cdbdata *cdbus;
46 memset(usbuf, 0, sizeof(struct usersupp));
47 for (a=0; a<=strlen(name); ++a) {
48 if (a < sizeof(lowercase_name))
49 lowercase_name[a] = tolower(name[a]);
51 lowercase_name[sizeof(lowercase_name)-1] = 0;
53 cdbus = cdb_fetch(CDB_USERSUPP, lowercase_name, strlen(lowercase_name));
55 return(1); /* user not found */
58 memcpy(usbuf, cdbus->ptr,
59 ( (cdbus->len > sizeof(struct usersupp)) ?
60 sizeof(struct usersupp) : cdbus->len) );
63 if (usbuf->version < 573) {
64 CC->usersupp.moderation_filter = config.c_default_filter;
72 * lgetuser() - same as getuser() but locks the record
74 int lgetuser(struct usersupp *usbuf, char *name)
78 retcode = getuser(usbuf,name);
80 begin_critical_section(S_USERSUPP);
87 * putuser() - write user buffer into the correct place on disk
89 void putuser(struct usersupp *usbuf)
91 char lowercase_name[32];
94 for (a=0; a<=strlen(usbuf->fullname); ++a) {
95 if (a < sizeof(lowercase_name))
96 lowercase_name[a] = tolower(usbuf->fullname[a]);
98 lowercase_name[sizeof(lowercase_name)-1] = 0;
100 usbuf->version = REV_LEVEL;
101 cdb_store(CDB_USERSUPP,
102 lowercase_name, strlen(lowercase_name),
103 usbuf, sizeof(struct usersupp));
109 * lputuser() - same as putuser() but locks the record
111 void lputuser(struct usersupp *usbuf) {
113 end_critical_section(S_USERSUPP);
117 * Index-generating function used by Ctdl[Get|Set]Relationship
119 int GenerateRelationshipIndex( char *IndexBuf,
130 TheIndex.iRoomID = RoomID;
131 TheIndex.iRoomGen = RoomGen;
132 TheIndex.iUserID = UserID;
134 memcpy(IndexBuf, &TheIndex, sizeof(TheIndex));
135 return(sizeof(TheIndex));
139 * Define a relationship between a user and a room
141 void CtdlSetRelationship(struct visit *newvisit,
142 struct usersupp *rel_user,
143 struct quickroom *rel_room) {
148 /* We don't use these in Citadel because they're implicit by the
149 * index, but they must be present if the database is exported.
151 newvisit->v_roomnum = rel_room->QRnumber;
152 newvisit->v_roomgen = rel_room->QRgen;
153 newvisit->v_usernum = rel_user->usernum;
155 /* Generate an index */
156 IndexLen = GenerateRelationshipIndex(IndexBuf,
161 /* Store the record */
162 cdb_store(CDB_VISIT, IndexBuf, IndexLen,
163 newvisit, sizeof(struct visit)
168 * Locate a relationship between a user and a room
170 void CtdlGetRelationship(struct visit *vbuf,
171 struct usersupp *rel_user,
172 struct quickroom *rel_room) {
176 struct cdbdata *cdbvisit;
178 /* Generate an index */
179 IndexLen = GenerateRelationshipIndex(IndexBuf,
184 /* Clear out the buffer */
185 memset(vbuf, 0, sizeof(struct visit));
187 cdbvisit = cdb_fetch(CDB_VISIT, IndexBuf, IndexLen);
188 if (cdbvisit != NULL) {
189 memcpy(vbuf, cdbvisit->ptr,
190 ( (cdbvisit->len > sizeof(struct visit)) ?
191 sizeof(struct visit) : cdbvisit->len) );
198 void MailboxName(char *buf, struct usersupp *who, char *prefix) {
199 sprintf(buf, "%010ld.%s", who->usernum, prefix);
204 * Is the user currently logged in an Aide?
207 if (CC->usersupp.axlevel >= 6) return(1);
213 * Is the user currently logged in an Aide *or* the room aide for this room?
215 int is_room_aide(void) {
216 if ( (CC->usersupp.axlevel >= 6)
217 || (CC->quickroom.QRroomaide == CC->usersupp.usernum) ) {
226 * getuserbynumber() - get user by number
227 * returns 0 if user was found
229 int getuserbynumber(struct usersupp *usbuf, long int number)
231 struct cdbdata *cdbus;
233 cdb_rewind(CDB_USERSUPP);
235 while(cdbus = cdb_next_item(CDB_USERSUPP), cdbus != NULL) {
236 memset(usbuf, 0, sizeof(struct usersupp));
237 memcpy(usbuf, cdbus->ptr,
238 ( (cdbus->len > sizeof(struct usersupp)) ?
239 sizeof(struct usersupp) : cdbus->len) );
241 if (usbuf->usernum == number) {
250 * Back end for cmd_user() and its ilk
252 int CtdlLoginExistingUser(char *username)
262 if ((CC->logged_in)) {
263 return login_already_logged_in;
266 found_user = getuser(&CC->usersupp,username);
267 if (found_user != 0) {
268 p = (struct passwd *)getpwnam(username);
270 strcpy(autoname,p->pw_gecos);
271 for (a=0; a<strlen(autoname); ++a)
272 if (autoname[a]==',') autoname[a]=0;
273 found_user = getuser(&CC->usersupp,autoname);
276 if (found_user == 0) {
277 if (((CC->nologin)) && (CC->usersupp.axlevel < 6)) {
278 return login_too_many_users;
281 strcpy(CC->curr_user,CC->usersupp.fullname);
285 return login_not_found;
293 void cmd_user(char *cmdbuf)
298 extract(username,cmdbuf,0);
302 a = CtdlLoginExistingUser(username);
304 case login_already_logged_in:
305 cprintf("%d Already logged in.\n",ERROR);
307 case login_too_many_users:
309 "Too many users are already online "
311 ERROR+MAX_SESSIONS_EXCEEDED,
312 config.c_nodename,config.c_maxsessions);
315 cprintf("%d Password required for %s\n",
316 MORE_DATA,CC->curr_user);
318 case login_not_found:
319 cprintf("%d %s not found.\n", ERROR, username);
321 cprintf("%d Internal error\n", ERROR);
328 * session startup code which is common to both cmd_pass() and cmd_newu()
330 void session_startup(void) {
331 syslog(LOG_NOTICE,"user <%s> logged in",CC->curr_user);
333 lgetuser(&CC->usersupp,CC->curr_user);
334 ++(CC->usersupp.timescalled);
335 CC->fake_username[0] = '\0';
336 CC->fake_postname[0] = '\0';
337 CC->fake_hostname[0] = '\0';
338 CC->fake_roomname[0] = '\0';
339 time(&CC->usersupp.lastcall);
341 /* If this user's name is the name of the system administrator
342 * (as specified in setup), automatically assign access level 6.
344 if (!strcasecmp(CC->usersupp.fullname, config.c_sysadm)) {
345 CC->usersupp.axlevel = 6;
348 lputuser(&CC->usersupp);
350 /* Run any cleanup routines registered by loadable modules */
351 PerformSessionHooks(EVT_LOGIN);
353 usergoto(BASEROOM,0); /* Enter the lobby */
354 rec_log(CL_LOGIN,CC->curr_user);
358 void logged_in_response(void) {
359 cprintf("%d %s|%d|%d|%d|%u|%ld\n",
360 OK, CC->usersupp.fullname, CC->usersupp.axlevel,
361 CC->usersupp.timescalled, CC->usersupp.posted,
363 CC->usersupp.usernum);
369 * misc things to be taken care of when a user is logged out
371 void logout(struct CitContext *who)
374 if (who->download_fp != NULL) {
375 fclose(who->download_fp);
376 who->download_fp = NULL;
378 if (who->upload_fp != NULL) {
382 /* Do modular stuff... */
383 PerformSessionHooks(EVT_LOGOUT);
388 * an alternate version of validpw() which executes `chkpwd' instead of
389 * verifying the password directly
391 static int validpw(uid_t uid, const char *pass)
394 int status, pipev[2];
398 lprintf(1, "pipe failed (%s): denying autologin access for "
399 "uid %u\n", strerror(errno), uid);
403 switch (pid = fork()) {
405 lprintf(1, "fork failed (%s): denying autologin access for "
406 "uid %u\n", strerror(errno), uid);
413 if (dup2(pipev[0], 0) == -1) {
419 execl(BBSDIR "/chkpwd", BBSDIR "/chkpwd", NULL);
420 perror(BBSDIR "/chkpwd");
425 write(pipev[1], buf, sprintf(buf, "%lu\n", (unsigned long)uid));
426 write(pipev[1], pass, strlen(pass));
427 write(pipev[1], "\n", 1);
430 while (waitpid(pid, &status, 0) == -1)
431 if (errno != EINTR) {
432 lprintf(1, "waitpid failed (%s): denying autologin "
433 "access for uid %u\n",
434 strerror(errno), uid);
438 if (WIFEXITED(status) && !WEXITSTATUS(status))
447 int CtdlTryPassword(char *password)
451 if ((CC->logged_in)) {
452 return pass_already_logged_in;
454 if (!strcmp(CC->curr_user, NLI)) {
457 if (getuser(&CC->usersupp, CC->curr_user)) {
458 return pass_internal_error;
462 if (CC->usersupp.uid == BBSUID) {
464 strproc(CC->usersupp.password);
465 code = strcasecmp(CC->usersupp.password,password);
467 #ifdef ENABLE_AUTOLOGIN
469 if (validpw(CC->usersupp.uid, password)) {
471 lgetuser(&CC->usersupp, CC->curr_user);
472 safestrncpy(CC->usersupp.password, password,
473 sizeof CC->usersupp.password);
474 lputuser(&CC->usersupp);
485 rec_log(CL_BADPW,CC->curr_user);
486 return pass_wrong_password;
491 void cmd_pass(char *buf)
496 extract(password, buf, 0);
497 a = CtdlTryPassword(password);
500 case pass_already_logged_in:
501 cprintf("%d Already logged in.\n",ERROR);
504 cprintf("%d You must send a name with USER first.\n",
507 case pass_wrong_password:
508 cprintf("%d Wrong password.\n", ERROR);
511 logged_in_response();
513 cprintf("%d Can't find user record!\n",
514 ERROR+INTERNAL_ERROR);
521 * Delete a user record *and* all of its related resources.
523 int purge_user(char pname[]) {
525 struct usersupp usbuf;
526 char lowercase_name[32];
528 struct CitContext *ccptr;
529 int user_is_logged_in = 0;
531 for (a=0; a<=strlen(pname); ++a) {
532 lowercase_name[a] = tolower(pname[a]);
535 if (getuser(&usbuf, pname) != 0) {
536 lprintf(5, "Cannot purge user <%s> - not found\n", pname);
537 return(ERROR+NO_SUCH_USER);
540 /* Don't delete a user who is currently logged in. Instead, just
541 * set the access level to 0, and let the account get swept up
542 * during the next purge.
544 user_is_logged_in = 0;
545 begin_critical_section(S_SESSION_TABLE);
546 for (ccptr=ContextList; ccptr!=NULL; ccptr=ccptr->next) {
547 if (ccptr->usersupp.usernum == usbuf.usernum) {
548 user_is_logged_in = 1;
551 end_critical_section(S_SESSION_TABLE);
552 if (user_is_logged_in == 1) {
553 lprintf(5, "User <%s> is logged in; not deleting.\n", pname);
559 lprintf(5, "Deleting user <%s>\n", pname);
561 /* Perform any purge functions registered by server extensions */
562 PerformUserHooks(usbuf.fullname, usbuf.usernum, EVT_PURGEUSER);
564 /* delete any existing user/room relationships */
565 cdb_delete(CDB_VISIT, &usbuf.usernum, sizeof(long));
567 /* delete the userlog entry */
568 cdb_delete(CDB_USERSUPP, lowercase_name, strlen(lowercase_name));
570 /* remove the user's bio file */
571 sprintf(filename, "./bio/%ld", usbuf.usernum);
574 /* remove the user's picture */
575 sprintf(filename, "./userpics/%ld.gif", usbuf.usernum);
583 * create_user() - back end processing to create a new user
585 int create_user(char *newusername)
587 struct usersupp usbuf;
589 struct passwd *p = NULL;
591 char mailboxname[ROOMNAMELEN];
593 strcpy(username, newusername);
596 #ifdef ENABLE_AUTOLOGIN
597 p = (struct passwd *)getpwnam(username);
600 strcpy(username, p->pw_gecos);
601 for (a=0; a<strlen(username); ++a) {
602 if (username[a] == ',') username[a] = 0;
604 CC->usersupp.uid = p->pw_uid;
607 CC->usersupp.uid = BBSUID;
610 if (!getuser(&usbuf,username)) {
611 return(ERROR+ALREADY_EXISTS);
614 strcpy(CC->curr_user,username);
615 strcpy(CC->usersupp.fullname,username);
616 strcpy(CC->usersupp.password,"");
619 /* These are the default flags on new accounts */
620 CC->usersupp.flags = US_LASTOLD|US_DISAPPEAR|US_PAGINATOR|US_FLOORS;
622 CC->usersupp.timescalled = 0;
623 CC->usersupp.posted = 0;
624 CC->usersupp.axlevel = config.c_initax;
625 CC->usersupp.USscreenwidth = 80;
626 CC->usersupp.USscreenheight = 24;
627 time(&CC->usersupp.lastcall);
628 CC->usersupp.moderation_filter = config.c_default_filter;
630 /* fetch a new user number */
631 CC->usersupp.usernum = get_new_user_number();
633 if (CC->usersupp.usernum == 1L) {
634 CC->usersupp.axlevel = 6;
637 /* add user to userlog */
638 putuser(&CC->usersupp);
639 if (getuser(&CC->usersupp,CC->curr_user)) {
640 return(ERROR+INTERNAL_ERROR);
643 /* give the user a private mailbox */
644 MailboxName(mailboxname, &CC->usersupp, MAILROOM);
645 create_room(mailboxname, 4, "", 0);
647 rec_log(CL_NEWUSER,CC->curr_user);
655 * cmd_newu() - create a new user account
657 void cmd_newu(char *cmdbuf)
662 if ((CC->logged_in)) {
663 cprintf("%d Already logged in.\n",ERROR);
668 cprintf("%d %s: Too many users are already online (maximum is %d)\n",
669 ERROR+MAX_SESSIONS_EXCEEDED,
670 config.c_nodename,config.c_maxsessions);
673 extract(username,cmdbuf,0);
677 if (strlen(username)==0) {
678 cprintf("%d You must supply a user name.\n",ERROR);
682 a = create_user(username);
683 if ((!strcasecmp(username, "bbs")) ||
684 (!strcasecmp(username, "new")) ||
685 (!strcasecmp(username, ".")))
687 cprintf("%d '%s' is an invalid login name.\n", ERROR);
690 if (a==ERROR+ALREADY_EXISTS) {
691 cprintf("%d '%s' already exists.\n",
692 ERROR+ALREADY_EXISTS,username);
695 else if (a==ERROR+INTERNAL_ERROR) {
696 cprintf("%d Internal error - user record disappeared?\n",
697 ERROR+INTERNAL_ERROR);
702 logged_in_response();
705 cprintf("%d unknown error\n",ERROR);
707 rec_log(CL_NEWUSER,CC->curr_user);
715 void cmd_setp(char *new_pw)
717 if (!(CC->logged_in)) {
718 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
721 if (CC->usersupp.uid != BBSUID) {
722 cprintf("%d Not allowed. Use the 'passwd' command.\n",ERROR);
726 if (strlen(new_pw)==0) {
727 cprintf("%d Password unchanged.\n",OK);
730 lgetuser(&CC->usersupp,CC->curr_user);
731 strcpy(CC->usersupp.password,new_pw);
732 lputuser(&CC->usersupp);
733 cprintf("%d Password changed.\n",OK);
734 rec_log(CL_PWCHANGE,CC->curr_user);
735 PerformSessionHooks(EVT_SETPASS);
739 * get user parameters
741 void cmd_getu(void) {
742 if (!(CC->logged_in)) {
743 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
746 getuser(&CC->usersupp,CC->curr_user);
747 cprintf("%d %d|%d|%d|%d\n",
749 CC->usersupp.USscreenwidth,
750 CC->usersupp.USscreenheight,
751 (CC->usersupp.flags & US_USER_SET),
752 CC->usersupp.moderation_filter
757 * set user parameters
759 void cmd_setu(char *new_parms)
763 if (num_parms(new_parms) < 3) {
764 cprintf("%d Usage error.\n",ERROR);
767 if (!(CC->logged_in)) {
768 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
771 lgetuser(&CC->usersupp,CC->curr_user);
772 CC->usersupp.USscreenwidth = extract_int(new_parms,0);
773 CC->usersupp.USscreenheight = extract_int(new_parms,1);
774 CC->usersupp.flags = CC->usersupp.flags & (~US_USER_SET);
775 CC->usersupp.flags = CC->usersupp.flags |
776 (extract_int(new_parms,2) & US_USER_SET);
778 if (num_parms(new_parms) >= 4) {
779 new_mod = extract_int(new_parms, 3);
780 lprintf(9, "new_mod extracted to %d\n", new_mod);
782 /* Aides cannot set the filter level lower than -100 */
783 if (new_mod < (-100) ) new_mod = -100;
785 /* Normal users cannot set the filter level lower than -63 */
786 if ( (new_mod < (-63)) && (CC->usersupp.axlevel < 6) )
789 /* Nobody can set the filter level higher than +63 */
790 if (new_mod > 63) new_mod = 63;
792 CC->usersupp.moderation_filter = new_mod;
793 lprintf(9, "new_mod processed to %d\n", new_mod);
796 lputuser(&CC->usersupp);
797 cprintf("%d Ok\n",OK);
801 * set last read pointer
803 void cmd_slrp(char *new_ptr)
808 if (!(CC->logged_in)) {
809 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
813 if (!strncasecmp(new_ptr,"highest",7)) {
814 newlr = CC->quickroom.QRhighest;
817 newlr = atol(new_ptr);
820 lgetuser(&CC->usersupp, CC->curr_user);
822 CtdlGetRelationship(&vbuf, &CC->usersupp, &CC->quickroom);
823 vbuf.v_lastseen = newlr;
824 CtdlSetRelationship(&vbuf, &CC->usersupp, &CC->quickroom);
826 lputuser(&CC->usersupp);
827 cprintf("%d %ld\n",OK,newlr);
832 * INVT and KICK commands
834 void cmd_invt_kick(char *iuser, int op)
836 { /* 1 = invite, 0 = kick out */
837 struct usersupp USscratch;
841 if (!(CC->logged_in)) {
842 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
846 if (is_room_aide()==0) {
847 cprintf("%d Higher access required.\n",
848 ERROR+HIGHER_ACCESS_REQUIRED);
852 if (lgetuser(&USscratch,iuser)!=0) {
853 cprintf("%d No such user.\n",ERROR);
857 CtdlGetRelationship(&vbuf, &USscratch, &CC->quickroom);
860 vbuf.v_flags = vbuf.v_flags & ~V_FORGET & ~V_LOCKOUT;
861 vbuf.v_flags = vbuf.v_flags | V_ACCESS;
865 vbuf.v_flags = vbuf.v_flags & ~V_ACCESS;
866 vbuf.v_flags = vbuf.v_flags | V_FORGET | V_LOCKOUT;
869 CtdlSetRelationship(&vbuf, &USscratch, &CC->quickroom);
871 lputuser(&USscratch);
873 /* post a message in Aide> saying what we just did */
874 sprintf(bbb,"%s %s %s> by %s\n",
876 ((op == 1) ? "invited to" : "kicked out of"),
877 CC->quickroom.QRname,
878 CC->usersupp.fullname);
881 cprintf("%d %s %s %s.\n",
883 ((op == 1) ? "invited to" : "kicked out of"),
884 CC->quickroom.QRname);
890 * forget (Zap) the current room
892 void cmd_forg(void) {
895 if (!(CC->logged_in)) {
896 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
901 cprintf("%d Aides cannot forget rooms.\n",ERROR);
905 lgetuser(&CC->usersupp,CC->curr_user);
906 CtdlGetRelationship(&vbuf, &CC->usersupp, &CC->quickroom);
908 vbuf.v_flags = vbuf.v_flags | V_FORGET;
909 vbuf.v_flags = vbuf.v_flags & ~V_ACCESS;
911 CtdlSetRelationship(&vbuf, &CC->usersupp, &CC->quickroom);
912 lputuser(&CC->usersupp);
913 cprintf("%d Ok\n",OK);
914 usergoto(BASEROOM, 0);
918 * Get Next Unregistered User
920 void cmd_gnur(void) {
921 struct cdbdata *cdbus;
922 struct usersupp usbuf;
924 if (!(CC->logged_in)) {
925 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
929 if (CC->usersupp.axlevel < 6) {
930 cprintf("%d Higher access required.\n",
931 ERROR+HIGHER_ACCESS_REQUIRED);
935 if ((CitControl.MMflags&MM_VALID)==0) {
936 cprintf("%d There are no unvalidated users.\n",OK);
940 /* There are unvalidated users. Traverse the usersupp database,
941 * and return the first user we find that needs validation.
943 cdb_rewind(CDB_USERSUPP);
944 while (cdbus = cdb_next_item(CDB_USERSUPP), cdbus != NULL) {
945 memset(&usbuf, 0, sizeof(struct usersupp));
946 memcpy(&usbuf, cdbus->ptr,
947 ( (cdbus->len > sizeof(struct usersupp)) ?
948 sizeof(struct usersupp) : cdbus->len) );
950 if ((usbuf.flags & US_NEEDVALID)
951 &&(usbuf.axlevel > 0)) {
952 cprintf("%d %s\n",MORE_DATA,usbuf.fullname);
957 /* If we get to this point, there are no more unvalidated users.
958 * Therefore we clear the "users need validation" flag.
961 begin_critical_section(S_CONTROL);
963 CitControl.MMflags = CitControl.MMflags&(~MM_VALID);
965 end_critical_section(S_CONTROL);
966 cprintf("%d *** End of registration.\n",OK);
975 void cmd_vali(char *v_args)
979 struct usersupp userbuf;
981 extract(user,v_args,0);
982 newax = extract_int(v_args,1);
984 if (!(CC->logged_in)) {
985 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
989 if (CC->usersupp.axlevel < 6) {
990 cprintf("%d Higher access required.\n",
991 ERROR+HIGHER_ACCESS_REQUIRED);
995 if (lgetuser(&userbuf,user)!=0) {
996 cprintf("%d '%s' not found.\n",ERROR+NO_SUCH_USER,user);
1000 userbuf.axlevel = newax;
1001 userbuf.flags = (userbuf.flags & ~US_NEEDVALID);
1005 /* If the access level was set to zero, delete the user */
1007 if (purge_user(user)==0) {
1008 cprintf("%d %s Deleted.\n", OK, userbuf.fullname);
1013 cprintf("%d ok\n",OK);
1019 * Traverse the user file...
1021 void ForEachUser(void (*CallBack)(struct usersupp *EachUser, void *out_data),
1023 struct usersupp usbuf;
1024 struct cdbdata *cdbus;
1026 cdb_rewind(CDB_USERSUPP);
1028 while(cdbus = cdb_next_item(CDB_USERSUPP), cdbus != NULL) {
1029 memset(&usbuf, 0, sizeof(struct usersupp));
1030 memcpy(&usbuf, cdbus->ptr,
1031 ( (cdbus->len > sizeof(struct usersupp)) ?
1032 sizeof(struct usersupp) : cdbus->len) );
1034 (*CallBack)(&usbuf, in_data);
1040 * List one user (this works with cmd_list)
1042 void ListThisUser(struct usersupp *usbuf, void *data) {
1043 if (usbuf->axlevel > 0) {
1044 if ((CC->usersupp.axlevel>=6)
1045 ||((usbuf->flags&US_UNLISTED)==0)
1046 ||((CC->internal_pgm))) {
1047 cprintf("%s|%d|%ld|%ld|%d|%d|",
1054 if (CC->usersupp.axlevel >= 6)
1055 cprintf("%s",usbuf->password);
1064 void cmd_list(void) {
1065 cprintf("%d \n",LISTING_FOLLOWS);
1066 ForEachUser(ListThisUser, NULL);
1074 * assorted info we need to check at login
1076 void cmd_chek(void) {
1081 if (!(CC->logged_in)) {
1082 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
1086 getuser(&CC->usersupp,CC->curr_user); /* no lock is needed here */
1087 if ((REGISCALL!=0)&&((CC->usersupp.flags&US_REGIS)==0)) regis = 1;
1089 if (CC->usersupp.axlevel >= 6) {
1091 if (CitControl.MMflags&MM_VALID) vali = 1;
1095 /* check for mail */
1096 mail = NewMailCount();
1098 cprintf("%d %d|%d|%d\n",OK,mail,regis,vali);
1103 * check to see if a user exists
1105 void cmd_qusr(char *who)
1107 struct usersupp usbuf;
1109 if (getuser(&usbuf,who) == 0) {
1110 cprintf("%d %s\n",OK,usbuf.fullname);
1113 cprintf("%d No such user.\n",ERROR+NO_SUCH_USER);
1119 * Administrative Get User Parameters
1121 void cmd_agup(char *cmdbuf) {
1122 struct usersupp usbuf;
1123 char requested_user[256];
1125 if ( (CC->internal_pgm==0)
1126 && ( (CC->logged_in == 0) || (is_aide()==0) ) ) {
1127 cprintf("%d Higher access required.\n",
1128 ERROR + HIGHER_ACCESS_REQUIRED);
1132 extract(requested_user, cmdbuf, 0);
1133 if (getuser(&usbuf, requested_user) != 0) {
1134 cprintf("%d No such user.\n", ERROR + NO_SUCH_USER);
1138 cprintf("%d %s|%s|%u|%d|%d|%d|%ld|%ld|%d\n",
1154 * Administrative Set User Parameters
1156 void cmd_asup(char *cmdbuf) {
1157 struct usersupp usbuf;
1158 char requested_user[256];
1163 if ( (CC->internal_pgm==0)
1164 && ( (CC->logged_in == 0) || (is_aide()==0) ) ) {
1165 cprintf("%d Higher access required.\n",
1166 ERROR + HIGHER_ACCESS_REQUIRED);
1170 extract(requested_user, cmdbuf, 0);
1171 if (lgetuser(&usbuf, requested_user) != 0) {
1172 cprintf("%d No such user.\n", ERROR + NO_SUCH_USER);
1176 np = num_parms(cmdbuf);
1177 if (np > 1) extract(usbuf.password, cmdbuf, 1);
1178 if (np > 2) usbuf.flags = extract_int(cmdbuf, 2);
1179 if (np > 3) usbuf.timescalled = extract_int(cmdbuf, 3);
1180 if (np > 4) usbuf.posted = extract_int(cmdbuf, 4);
1182 newax = extract_int(cmdbuf, 5);
1183 if ((newax >=0) && (newax <= 6)) {
1184 usbuf.axlevel = extract_int(cmdbuf, 5);
1188 usbuf.lastcall = extract_long(cmdbuf, 7);
1191 usbuf.USuserpurge = extract_int(cmdbuf, 8);
1195 if (usbuf.axlevel == 0) {
1196 if (purge_user(requested_user)==0) {
1200 cprintf("%d Ok", OK);
1201 if (deleted) cprintf(" (%s deleted)", requested_user);
1207 * Count the number of new mail messages the user has
1209 int NewMailCount() {
1210 int num_newmsgs = 0;
1212 char mailboxname[ROOMNAMELEN];
1213 struct quickroom mailbox;
1215 struct cdbdata *cdbfr;
1216 long *msglist = NULL;
1219 MailboxName(mailboxname, &CC->usersupp, MAILROOM);
1220 if (getroom(&mailbox, mailboxname)!=0) return(0);
1221 CtdlGetRelationship(&vbuf, &CC->usersupp, &mailbox);
1223 cdbfr = cdb_fetch(CDB_MSGLISTS, &mailbox.QRnumber, sizeof(long));
1225 if (cdbfr != NULL) {
1226 msglist = mallok(cdbfr->len);
1227 memcpy(msglist, cdbfr->ptr, cdbfr->len);
1228 num_msgs = cdbfr->len / sizeof(long);
1232 if (num_msgs > 0) for (a=0; a<num_msgs; ++a) {
1233 if (msglist[a]>0L) {
1234 if (msglist[a] > vbuf.v_lastseen) {
1240 if (msglist != NULL) phree(msglist);
1242 return(num_newmsgs);