1 /* needed to properly enable crypt() stuff on some systems */
10 #include <sys/types.h>
19 extern struct config config;
23 * pwcrypt() - simple password encryption
25 void pwcrypt(char *text, int code)
28 for (a=0; a<strlen(text); ++a) text[a]=(text[a]^(((code|128)^a)&0xFF));
33 * hash() - hash table function for user lookup
40 for (i=0; i<strlen(str); ++i) h=h+((i+1)*tolower(str[i]));
46 * getuser() - retrieve named user into supplied buffer.
47 * returns 0 on success
49 int getuser(struct usersupp *usbuf, char name[]) {
51 char lowercase_name[32];
53 struct cdbdata *cdbus;
55 bzero(usbuf, sizeof(struct usersupp));
56 for (a=0; a<=strlen(name); ++a) {
57 lowercase_name[a] = tolower(name[a]);
60 cdbus = cdb_fetch(CDB_USERSUPP, lowercase_name, strlen(lowercase_name));
61 if (cdbus == NULL) { /* not found */
65 memcpy(usbuf, cdbus->ptr, cdbus->len);
72 * lgetuser() - same as getuser() but locks the record
74 int lgetuser(struct usersupp *usbuf, char *name)
78 retcode = getuser(usbuf,name);
80 begin_critical_section(S_USERSUPP);
87 * putuser() - write user buffer into the correct place on disk
89 void putuser(struct usersupp *usbuf, char *name)
91 char lowercase_name[32];
94 for (a=0; a<=strlen(name); ++a) {
95 lowercase_name[a] = tolower(name[a]);
98 cdb_store(CDB_USERSUPP, lowercase_name, strlen(lowercase_name),
99 usbuf, sizeof(struct usersupp));
105 * lputuser() - same as putuser() but locks the record
107 void lputuser(struct usersupp *usbuf, char *name)
110 end_critical_section(S_USERSUPP);
115 * Is the user currently logged in an Aide?
118 if (CC->usersupp.axlevel >= 6) return(1);
124 * Is the user currently logged in an Aide *or* the room aide for this room?
126 int is_room_aide(void) {
127 if ( (CC->usersupp.axlevel >= 6)
128 || (CC->quickroom.QRroomaide == CC->usersupp.usernum) ) return(1);
133 * getuserbynumber() - get user by number
134 * returns 0 if user was found
136 int getuserbynumber(struct usersupp *usbuf, long int number)
138 struct cdbdata *cdbus;
140 cdb_rewind(CDB_USERSUPP);
142 while(cdbus = cdb_next_item(CDB_USERSUPP), cdbus != NULL) {
143 bzero(usbuf, sizeof(struct usersupp));
144 memcpy(usbuf, cdbus->ptr, cdbus->len);
146 if (usbuf->usernum == number) {
157 void cmd_user(char *cmdbuf)
165 extract(username,cmdbuf,0);
169 if ((CC->logged_in)) {
170 cprintf("%d Already logged in.\n",ERROR);
174 found_user = getuser(&CC->usersupp,username);
175 if (found_user != 0) {
176 p = (struct passwd *)getpwnam(username);
178 strcpy(autoname,p->pw_gecos);
179 for (a=0; a<strlen(autoname); ++a)
180 if (autoname[a]==',') autoname[a]=0;
181 found_user = getuser(&CC->usersupp,autoname);
184 if (found_user == 0) {
185 if (((CC->nologin)) && (CC->usersupp.axlevel < 6)) {
186 cprintf("%d %s: Too many users are already online (maximum is %d)\n",
187 ERROR+MAX_SESSIONS_EXCEEDED,
188 config.c_nodename,config.c_maxsessions);
191 strcpy(CC->curr_user,CC->usersupp.fullname);
192 cprintf("%d Password required for %s\n",
193 MORE_DATA,CC->curr_user);
197 cprintf("%d %s not found.\n",ERROR,username);
204 * session startup code which is common to both cmd_pass() and cmd_newu()
206 void session_startup(void) {
210 syslog(LOG_NOTICE,"user <%s> logged in",CC->curr_user);
211 hook_user_login(CC->cs_pid, CC->curr_user);
212 lgetuser(&CC->usersupp,CC->curr_user);
213 ++(CC->usersupp.timescalled);
215 CC->fake_username[0] = '\0';
216 CC->fake_postname[0] = '\0';
217 CC->fake_hostname[0] = '\0';
218 CC->fake_roomname[0] = '\0';
219 CC->last_pager[0] = '\0';
221 time(&CC->usersupp.lastcall);
223 /* If this user's name is the name of the system administrator
224 * (as specified in setup), automatically assign access level 6.
226 if (!strucmp(CC->usersupp.fullname, config.c_sysadm)) {
227 CC->usersupp.axlevel = 6;
230 /* A room's generation number changes each time it is recycled. Users are kept
231 * out of private rooms or forget rooms by matching the generation numbers. To
232 * avoid an accidental matchup, unmatched numbers are set to -1 here.
234 for (a=0; a<MAXROOMS; ++a) {
236 if (CC->usersupp.generation[a] != qr.QRgen)
237 CC->usersupp.generation[a]=(-1);
238 if (CC->usersupp.forget[a] != qr.QRgen)
239 CC->usersupp.forget[a]=(-1);
242 lputuser(&CC->usersupp,CC->curr_user);
244 cprintf("%d %s|%d|%d|%d|%u|%ld\n",OK,CC->usersupp.fullname,CC->usersupp.axlevel,
245 CC->usersupp.timescalled,CC->usersupp.posted,CC->usersupp.flags,
246 CC->usersupp.usernum);
247 usergoto(0,0); /* Enter the lobby */
248 rec_log(CL_LOGIN,CC->curr_user);
254 * misc things to be taken care of when a user is logged out
256 void logout(struct CitContext *who)
259 if (who->download_fp != NULL) {
260 fclose(who->download_fp);
261 who->download_fp = NULL;
263 if (who->upload_fp != NULL) {
269 void cmd_pass(char *buf)
275 extract(password,buf,0);
277 if ((CC->logged_in)) {
278 cprintf("%d Already logged in.\n",ERROR);
281 if (!strcmp(CC->curr_user,"")) {
282 cprintf("%d You must send a name with USER first.\n",ERROR);
285 if (getuser(&CC->usersupp,CC->curr_user)) {
286 cprintf("%d Can't find user record!\n",ERROR+INTERNAL_ERROR);
291 if (CC->usersupp.USuid == BBSUID) {
293 pwcrypt(CC->usersupp.password,config.c_pwcrypt);
294 strproc(CC->usersupp.password);
295 code = strucmp(CC->usersupp.password,password);
296 pwcrypt(CC->usersupp.password,config.c_pwcrypt);
299 p = (struct passwd *)getpwuid(CC->usersupp.USuid);
300 #ifdef ENABLE_AUTOLOGIN
302 if (!strcmp(p->pw_passwd,
303 (char *)crypt(password,p->pw_passwd))) {
305 lgetuser(&CC->usersupp, CC->curr_user);
306 strcpy(CC->usersupp.password, password);
307 pwcrypt(CC->usersupp.password, config.c_pwcrypt);
308 lputuser(&CC->usersupp, CC->curr_user);
319 cprintf("%d Wrong password.\n",ERROR);
320 rec_log(CL_BADPW,CC->curr_user);
326 * purge related files when removing or overwriting a user record
328 void purge_user(char *pname) {
330 struct usersupp usbuf;
333 if (getuser(&usbuf, pname) != 0) {
334 lprintf(5, "Cannot purge user <%s> - not found\n", pname);
338 /* delete any messages in the user's mailbox */
339 for (a=0; a<MAILSLOTS; ++a) {
340 if (usbuf.mailnum[a] > 0L) {
341 cdb_delete(CDB_MSGMAIN, &usbuf.mailnum[a],
346 /* remove the user's bio file */
347 sprintf(filename, "./bio/%ld", usbuf.usernum);
350 /* remove the user's picture */
351 sprintf(filename, "./userpics/%ld.gif", usbuf.usernum);
358 * create_user() - back end processing to create a new user
360 int create_user(char *newusername)
362 struct usersupp usbuf;
365 struct passwd *p = NULL;
368 strcpy(username, newusername);
371 #ifdef ENABLE_AUTOLOGIN
372 p = (struct passwd *)getpwnam(username);
375 strcpy(username, p->pw_gecos);
376 for (a=0; a<strlen(username); ++a) {
377 if (username[a] == ',') username[a] = 0;
379 CC->usersupp.USuid = p->pw_uid;
382 CC->usersupp.USuid = BBSUID;
385 if (!getuser(&usbuf,username)) {
386 return(ERROR+ALREADY_EXISTS);
389 strcpy(CC->curr_user,username);
390 strcpy(CC->usersupp.fullname,username);
393 for (a=0; a<MAXROOMS; ++a) {
394 CC->usersupp.lastseen[a]=0L;
395 CC->usersupp.generation[a]=(-1);
396 CC->usersupp.forget[a]=(-1);
398 for (a=0; a<MAILSLOTS; ++a) {
399 CC->usersupp.mailnum[a]=0L;
401 strcpy(CC->usersupp.password,"");
403 /* These are the default flags on new accounts */
405 US_NEEDVALID|US_LASTOLD|US_DISAPPEAR|US_PAGINATOR|US_FLOORS;
407 CC->usersupp.timescalled = 0;
408 CC->usersupp.posted = 0;
409 CC->usersupp.axlevel = INITAX;
410 CC->usersupp.USscreenwidth = 80;
411 CC->usersupp.USscreenheight = 24;
412 time(&CC->usersupp.lastcall);
413 strcpy(CC->usersupp.USname, "");
414 strcpy(CC->usersupp.USaddr, "");
415 strcpy(CC->usersupp.UScity, "");
416 strcpy(CC->usersupp.USstate, "");
417 strcpy(CC->usersupp.USzip, "");
418 strcpy(CC->usersupp.USphone, "");
420 /* fetch a new user number */
421 CC->usersupp.usernum = get_new_user_number();
423 if (CC->usersupp.usernum == 1L) {
424 CC->usersupp.axlevel = 6;
427 /* add user to userlog */
428 putuser(&CC->usersupp,CC->curr_user);
429 if (getuser(&CC->usersupp,CC->curr_user)) {
430 return(ERROR+INTERNAL_ERROR);
432 rec_log(CL_NEWUSER,CC->curr_user);
440 * cmd_newu() - create a new user account
442 void cmd_newu(char *cmdbuf)
447 if ((CC->logged_in)) {
448 cprintf("%d Already logged in.\n",ERROR);
453 cprintf("%d %s: Too many users are already online (maximum is %d)\n",
454 ERROR+MAX_SESSIONS_EXCEEDED,
455 config.c_nodename,config.c_maxsessions);
458 extract(username,cmdbuf,0);
462 if (strlen(username)==0) {
463 cprintf("%d You must supply a user name.\n",ERROR);
467 a = create_user(username);
468 if ((!strucmp(username, "bbs")) ||
469 (!strucmp(username, "new")) ||
470 (!strucmp(username, ".")))
472 cprintf("%d '%s' is an invalid login name.\n", ERROR);
475 if (a==ERROR+ALREADY_EXISTS) {
476 cprintf("%d '%s' already exists.\n",
477 ERROR+ALREADY_EXISTS,username);
480 else if (a==ERROR+INTERNAL_ERROR) {
481 cprintf("%d Internal error - user record disappeared?\n",
482 ERROR+INTERNAL_ERROR);
489 cprintf("%d unknown error\n",ERROR);
491 rec_log(CL_NEWUSER,CC->curr_user);
499 void cmd_setp(char *new_pw)
501 if (!(CC->logged_in)) {
502 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
505 if (CC->usersupp.USuid != BBSUID) {
506 cprintf("%d Not allowed. Use the 'passwd' command.\n",ERROR);
510 if (strlen(new_pw)==0) {
511 cprintf("%d Password unchanged.\n",OK);
514 lgetuser(&CC->usersupp,CC->curr_user);
515 strcpy(CC->usersupp.password,new_pw);
516 pwcrypt(CC->usersupp.password,config.c_pwcrypt);
517 lputuser(&CC->usersupp,CC->curr_user);
518 cprintf("%d Password changed.\n",OK);
519 rec_log(CL_PWCHANGE,CC->curr_user);
523 * get user parameters
525 void cmd_getu(void) {
526 if (!(CC->logged_in)) {
527 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
530 getuser(&CC->usersupp,CC->curr_user);
531 cprintf("%d %d|%d|%d\n",OK,CC->usersupp.USscreenwidth,
532 CC->usersupp.USscreenheight,(CC->usersupp.flags & US_USER_SET));
536 * set user parameters
538 void cmd_setu(char *new_parms)
541 if (num_parms(new_parms)!=3) {
542 cprintf("%d Usage error.\n",ERROR);
545 if (!(CC->logged_in)) {
546 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
549 lgetuser(&CC->usersupp,CC->curr_user);
550 CC->usersupp.USscreenwidth = extract_int(new_parms,0);
551 CC->usersupp.USscreenheight = extract_int(new_parms,1);
552 CC->usersupp.flags = CC->usersupp.flags & (~US_USER_SET);
553 CC->usersupp.flags = CC->usersupp.flags |
554 (extract_int(new_parms,2) & US_USER_SET);
555 lputuser(&CC->usersupp,CC->curr_user);
556 cprintf("%d Ok\n",OK);
560 * set last read pointer
562 void cmd_slrp(char *new_ptr)
566 if (!(CC->logged_in)) {
567 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
571 if (CC->curr_rm < 0) {
572 cprintf("%d No current room.\n",ERROR);
576 if (!struncmp(new_ptr,"highest",7)) {
577 newlr = CC->quickroom.QRhighest;
580 newlr = atol(new_ptr);
583 lgetuser(&CC->usersupp, CC->curr_user);
584 CC->usersupp.lastseen[CC->curr_rm] = newlr;
585 lputuser(&CC->usersupp, CC->curr_user);
586 cprintf("%d %ld\n",OK,newlr);
591 * INVT and KICK commands
593 void cmd_invt_kick(char *iuser, int op)
595 { /* 1 = invite, 0 = kick out */
596 struct usersupp USscratch;
599 if (!(CC->logged_in)) {
600 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
604 if (CC->curr_rm < 0) {
605 cprintf("%d No current room.\n",ERROR);
609 if (is_room_aide()==0) {
610 cprintf("%d Higher access required.\n",
611 ERROR+HIGHER_ACCESS_REQUIRED);
615 if ( (op==1) && ((CC->quickroom.QRflags&QR_PRIVATE)==0) ) {
616 cprintf("%d Not a private room.\n",ERROR+NOT_HERE);
620 if (lgetuser(&USscratch,iuser)!=0) {
621 cprintf("%d No such user.\n",ERROR);
626 USscratch.generation[CC->curr_rm]=CC->quickroom.QRgen;
627 USscratch.forget[CC->curr_rm]=(-1);
631 USscratch.generation[CC->curr_rm]=(-1);
632 USscratch.forget[CC->curr_rm]=CC->quickroom.QRgen;
635 lputuser(&USscratch,iuser);
637 /* post a message in Aide> saying what we just did */
638 sprintf(bbb,"%s %s %s> by %s",
640 ((op == 1) ? "invited to" : "kicked out of"),
641 CC->quickroom.QRname,
642 CC->usersupp.fullname);
645 if ((op==0)&&((CC->quickroom.QRflags&QR_PRIVATE)==0)) {
646 cprintf("%d Ok. (Not a private room, <Z>ap effect only)\n",OK);
649 cprintf("%d Ok.\n",OK);
656 * forget (Zap) the current room
658 void cmd_forg(void) {
659 if (!(CC->logged_in)) {
660 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
664 if (CC->curr_rm < 0) {
665 cprintf("%d No current room.\n",ERROR);
669 if (CC->curr_rm < 3) {
670 cprintf("%d You cannot forget this room.\n",ERROR+NOT_HERE);
675 cprintf("%d Aides cannot forget rooms.\n",ERROR);
679 lgetuser(&CC->usersupp,CC->curr_user);
680 CC->usersupp.forget[CC->curr_rm] = CC->quickroom.QRgen;
681 CC->usersupp.generation[CC->curr_rm] = (-1);
682 lputuser(&CC->usersupp,CC->curr_user);
683 cprintf("%d Ok\n",OK);
688 * Get Next Unregistered User
690 void cmd_gnur(void) {
691 struct cdbdata *cdbus;
692 struct usersupp usbuf;
695 if (!(CC->logged_in)) {
696 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
700 if (CC->usersupp.axlevel < 6) {
701 cprintf("%d Higher access required.\n",
702 ERROR+HIGHER_ACCESS_REQUIRED);
706 if ((CitControl.MMflags&MM_VALID)==0) {
707 cprintf("%d There are no unvalidated users.\n",OK);
711 /* There are unvalidated users. Traverse the usersupp database,
712 * and return the first user we find that needs validation.
714 cdb_rewind(CDB_USERSUPP);
715 while (cdbus = cdb_next_item(CDB_USERSUPP), cdbus != NULL) {
716 bzero(&usbuf, sizeof(struct usersupp));
717 memcpy(&usbuf, cdbus->ptr, cdbus->len);
719 if ((usbuf.flags & US_NEEDVALID)
720 &&(usbuf.axlevel > 0)) {
721 cprintf("%d %s\n",MORE_DATA,usbuf.fullname);
726 /* If we get to this point, there are no more unvalidated users.
727 * Therefore we clear the "users need validation" flag.
730 begin_critical_section(S_CONTROL);
732 CitControl.MMflags = CitControl.MMflags&(~MM_VALID);
734 end_critical_section(S_CONTROL);
735 cprintf("%d *** End of registration.\n",OK);
742 * get registration info for a user
744 void cmd_greg(char *who)
746 struct usersupp usbuf;
750 if (!(CC->logged_in)) {
751 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
755 if (!strucmp(who,"_SELF_")) strcpy(who,CC->curr_user);
757 if ((CC->usersupp.axlevel < 6) && (strucmp(who,CC->curr_user))) {
758 cprintf("%d Higher access required.\n",
759 ERROR+HIGHER_ACCESS_REQUIRED);
763 if (getuser(&usbuf,who) != 0) {
764 cprintf("%d '%s' not found.\n",ERROR+NO_SUCH_USER,who);
768 cprintf("%d %s\n",LISTING_FOLLOWS,usbuf.fullname);
769 cprintf("%ld\n",usbuf.usernum);
770 pwcrypt(usbuf.password,PWCRYPT);
771 cprintf("%s\n",usbuf.password);
772 cprintf("%s\n",usbuf.USname);
773 cprintf("%s\n",usbuf.USaddr);
774 cprintf("%s\n%s\n%s\n",
775 usbuf.UScity,usbuf.USstate,usbuf.USzip);
776 strcpy(pbuf,usbuf.USphone);
778 for (a=0; a<strlen(pbuf); ++a) {
779 if ((pbuf[a]>='0')&&(pbuf[a]<='9')) {
780 b=strlen(usbuf.USphone);
781 usbuf.USphone[b]=pbuf[a];
782 usbuf.USphone[b+1]=0;
785 while(strlen(usbuf.USphone)<10) {
786 strcpy(pbuf,usbuf.USphone);
787 strcpy(usbuf.USphone," ");
788 strcat(usbuf.USphone,pbuf);
791 cprintf("(%c%c%c) %c%c%c-%c%c%c%c\n",
792 usbuf.USphone[0],usbuf.USphone[1],
793 usbuf.USphone[2],usbuf.USphone[3],
794 usbuf.USphone[4],usbuf.USphone[5],
795 usbuf.USphone[6],usbuf.USphone[7],
796 usbuf.USphone[8],usbuf.USphone[9]);
798 cprintf("%d\n",usbuf.axlevel);
799 cprintf("%s\n",usbuf.USemail);
806 void cmd_vali(char *v_args)
810 struct usersupp userbuf;
812 extract(user,v_args,0);
813 newax = extract_int(v_args,1);
815 if (!(CC->logged_in)) {
816 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
820 if (CC->usersupp.axlevel < 6) {
821 cprintf("%d Higher access required.\n",
822 ERROR+HIGHER_ACCESS_REQUIRED);
826 if (lgetuser(&userbuf,user)!=0) {
827 cprintf("%d '%s' not found.\n",ERROR+NO_SUCH_USER,user);
831 userbuf.axlevel = newax;
832 userbuf.flags = (userbuf.flags & ~US_NEEDVALID);
834 lputuser(&userbuf,user);
835 cprintf("%d ok\n",OK);
843 void cmd_list(void) {
844 struct usersupp usbuf;
845 struct cdbdata *cdbus;
847 cdb_rewind(CDB_USERSUPP);
848 cprintf("%d \n",LISTING_FOLLOWS);
850 while(cdbus = cdb_next_item(CDB_USERSUPP), cdbus != NULL) {
851 bzero(&usbuf, sizeof(struct usersupp));
852 memcpy(&usbuf, cdbus->ptr, cdbus->len);
855 if (usbuf.axlevel > 0) {
856 if ((CC->usersupp.axlevel>=6)
857 ||((usbuf.flags&US_UNLISTED)==0)
858 ||((CC->internal_pgm))) {
859 cprintf("%s|%d|%ld|%ld|%d|%d|",
866 pwcrypt(usbuf.password,config.c_pwcrypt);
867 if (CC->usersupp.axlevel >= 6) cprintf("%s",usbuf.password);
876 * enter registration info
878 void cmd_regi(void) {
891 if (!(CC->logged_in)) {
892 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
904 cprintf("%d Send registration...\n",SEND_LISTING);
906 while (client_gets(buf), strcmp(buf,"000")) {
907 if (a==0) strcpy(tmpname,buf);
908 if (a==1) strcpy(tmpaddr,buf);
909 if (a==2) strcpy(tmpcity,buf);
910 if (a==3) strcpy(tmpstate,buf);
912 for (c=0; c<strlen(buf); ++c) {
913 if ((buf[c]>='0')&&(buf[c]<='9')) {
921 for (c=0; c<strlen(buf); ++c) {
922 if ((buf[c]>='0')&&(buf[c]<='9')) {
929 if (a==6) strncpy(tmpemail,buf,31);
941 lgetuser(&CC->usersupp,CC->curr_user);
942 strcpy(CC->usersupp.USname,tmpname);
943 strcpy(CC->usersupp.USaddr,tmpaddr);
944 strcpy(CC->usersupp.UScity,tmpcity);
945 strcpy(CC->usersupp.USstate,tmpstate);
946 strcpy(CC->usersupp.USzip,tmpzip);
947 strcpy(CC->usersupp.USphone,tmpphone);
948 strcpy(CC->usersupp.USemail,tmpemail);
949 CC->usersupp.flags=(CC->usersupp.flags|US_REGIS|US_NEEDVALID);
950 lputuser(&CC->usersupp,CC->curr_user);
952 /* set global flag calling for validation */
953 begin_critical_section(S_CONTROL);
955 CitControl.MMflags = CitControl.MMflags | MM_VALID ;
957 end_critical_section(S_CONTROL);
958 cprintf("%d *** End of registration.\n",OK);
963 * assorted info we need to check at login
965 void cmd_chek(void) {
971 if (!(CC->logged_in)) {
972 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
976 getuser(&CC->usersupp,CC->curr_user); /* no lock is needed here */
977 if ((REGISCALL!=0)&&((CC->usersupp.flags&US_REGIS)==0)) regis = 1;
979 if (CC->usersupp.axlevel >= 6) {
981 if (CitControl.MMflags&MM_VALID) vali = 1;
984 mail=0; /* check for mail */
985 for (a=0; a<MAILSLOTS; ++a)
986 if ((CC->usersupp.mailnum[a])>(CC->usersupp.lastseen[1]))
989 cprintf("%d %d|%d|%d\n",OK,mail,regis,vali);
994 * check to see if a user exists
996 void cmd_qusr(char *who)
998 struct usersupp usbuf;
1000 if (getuser(&usbuf,who) == 0) {
1001 cprintf("%d %s\n",OK,usbuf.fullname);
1004 cprintf("%d No such user.\n",ERROR+NO_SUCH_USER);
1012 void cmd_ebio(void) {
1016 if (!(CC->logged_in)) {
1017 cprintf("%d Not logged in.\n",ERROR+NOT_LOGGED_IN);
1021 sprintf(buf,"./bio/%ld",CC->usersupp.usernum);
1022 fp = fopen(buf,"w");
1024 cprintf("%d Cannot create file\n",ERROR);
1027 cprintf("%d \n",SEND_LISTING);
1028 while(client_gets(buf), strcmp(buf,"000")) {
1029 fprintf(fp,"%s\n",buf);
1037 void cmd_rbio(char *cmdbuf)
1039 struct usersupp ruser;
1043 extract(buf,cmdbuf,0);
1044 if (getuser(&ruser,buf)!=0) {
1045 cprintf("%d No such user.\n",ERROR+NO_SUCH_USER);
1048 sprintf(buf,"./bio/%ld",ruser.usernum);
1050 fp = fopen(buf,"r");
1052 cprintf("%d %s has no bio on file.\n",
1053 ERROR+FILE_NOT_FOUND,ruser.fullname);
1056 cprintf("%d \n",LISTING_FOLLOWS);
1057 while (fgets(buf,256,fp)!=NULL) cprintf("%s",buf);
1063 * list of users who have entered bios
1065 void cmd_lbio(void) {
1068 struct usersupp usbuf;
1070 ls=popen("cd ./bio; ls","r");
1072 cprintf("%d Cannot open listing.\n",ERROR+FILE_NOT_FOUND);
1076 cprintf("%d\n",LISTING_FOLLOWS);
1077 while (fgets(buf,255,ls)!=NULL)
1078 if (getuserbynumber(&usbuf,atol(buf))==0)
1079 cprintf("%s\n",usbuf.fullname);