4 #define DEFAULT_HOST UDS
5 #define DEFAULT_PORT "citadel"
13 # include <sys/time.h>
20 #include <sys/types.h>
27 #include <sys/socket.h>
28 #include <arpa/inet.h>
29 #include <netinet/in.h>
33 #ifdef THREADED_CLIENT
37 #include "citadel_ipc.h"
38 #include "citadel_decls.h"
41 #ifdef THREADED_CLIENT
42 pthread_mutex_t rwlock;
46 static SSL_CTX *ssl_ctx;
49 #ifdef THREADED_CLIENT
50 pthread_mutex_t **Critters; /* Things that need locking */
51 #endif /* THREADED_CLIENT */
53 #endif /* HAVE_OPENSSL */
56 #define INADDR_NONE 0xffffffff
59 static void (*status_hook)(char *s) = NULL;
61 void setCryptoStatusHook(void (*hook)(char *s)) {
65 static void (*lock_hook)(int onoff) = NULL;
67 void setLockHook(void (*hook)(int onoff)) {
72 char express_msgs = 0;
75 static void serv_read(CtdlIPC *ipc, char *buf, unsigned int bytes);
76 static void serv_write(CtdlIPC *ipc, const char *buf, unsigned int nbytes);
78 static void serv_read_ssl(CtdlIPC *ipc, char *buf, unsigned int bytes);
79 static void serv_write_ssl(CtdlIPC *ipc, const char *buf, unsigned int nbytes);
80 static void ssl_lock(int mode, int n, const char *file, int line);
81 static void endtls(SSL *ssl);
82 #ifdef THREADED_CLIENT
83 static unsigned long id_callback(void);
84 #endif /* THREADED_CLIENT */
85 #endif /* HAVE_OPENSSL */
89 * Does nothing. The server should always return 200.
91 int CtdlIPCNoop(CtdlIPC *ipc)
95 return CtdlIPCGenericCommand(ipc, "NOOP", NULL, 0, NULL, NULL, aaa);
100 * Does nothing interesting. The server should always return 200
101 * along with your string.
103 int CtdlIPCEcho(CtdlIPC *ipc, const char *arg, char *cret)
109 if (!cret) return -2;
111 aaa = (char *)malloc((size_t)(strlen(arg) + 6));
114 sprintf(aaa, "ECHO %s", arg);
115 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
122 * Asks the server to close the connecction.
123 * Should always return 200.
125 int CtdlIPCQuit(CtdlIPC *ipc)
131 CtdlIPC_putline(ipc, "QUIT");
132 CtdlIPC_getline(ipc, aaa);
140 * Asks the server to logout. Should always return 200, even if no user
141 * was logged in. The user will not be logged in after this!
143 int CtdlIPCLogout(CtdlIPC *ipc)
149 CtdlIPC_putline(ipc, "LOUT");
150 CtdlIPC_getline(ipc, aaa);
158 * First stage of authentication - pass the username. Returns 300 if the
159 * username is able to log in, with the username correctly spelled in cret.
160 * Returns various 500 error codes if the user doesn't exist, etc.
162 int CtdlIPCTryLogin(CtdlIPC *ipc, const char *username, char *cret)
167 if (!username) return -2;
168 if (!cret) return -2;
170 aaa = (char *)malloc((size_t)(strlen(username) + 6));
173 sprintf(aaa, "USER %s", username);
174 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
181 * Second stage of authentication - provide password. The server returns
182 * 200 and several arguments in cret relating to the user's account.
184 int CtdlIPCTryPassword(CtdlIPC *ipc, const char *passwd, char *cret)
189 if (!passwd) return -2;
190 if (!cret) return -2;
192 aaa = (char *)malloc((size_t)(strlen(passwd) + 6));
195 sprintf(aaa, "PASS %s", passwd);
196 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
203 * Second stage of authentication - provide password. The server returns
204 * 200 and several arguments in cret relating to the user's account.
206 int CtdlIPCTryApopPassword(CtdlIPC *ipc, const char *response, char *cret)
211 if (!response) return -2;
212 if (!cret) return -2;
214 aaa = (char *)malloc((size_t)(strlen(response) + 6));
217 sprintf(aaa, "PAS2 %s", response);
218 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
225 * Create a new user. This returns 200 plus the same arguments as TryPassword
226 * if selfservice is nonzero, unless there was a problem creating the account.
227 * If selfservice is zero, creates a new user but does not log out the existing
228 * user - intended for use by system administrators to create accounts on
229 * behalf of other users.
231 int CtdlIPCCreateUser(CtdlIPC *ipc, const char *username, int selfservice, char *cret)
236 if (!username) return -2;
237 if (!cret) return -2;
239 aaa = (char *)malloc((size_t)(strlen(username) + 6));
242 sprintf(aaa, "%s %s", selfservice ? "NEWU" : "CREU", username);
243 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
250 * Changes the user's password. Returns 200 if changed, errors otherwise.
252 int CtdlIPCChangePassword(CtdlIPC *ipc, const char *passwd, char *cret)
257 if (!passwd) return -2;
258 if (!cret) return -2;
260 aaa = (char *)malloc((size_t)(strlen(passwd) + 6));
263 sprintf(aaa, "SETP %s", passwd);
264 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
271 /* Caller must free the march list */
272 /* Room types are defined in enum RoomList; keep these in sync! */
273 /* floor is -1 for all, or floornum */
274 int CtdlIPCKnownRooms(CtdlIPC *ipc, enum RoomList which, int floor, struct march **listing, char *cret)
277 struct march *march = NULL;
278 static char *proto[] =
279 {"LKRA", "LKRN", "LKRO", "LZRM", "LRMS", "LPRM" };
284 if (!listing) return -2;
285 if (*listing) return -2; /* Free the listing first */
286 if (!cret) return -2;
287 /* if (which < 0 || which > 4) return -2; */
288 if (floor < -1) return -2; /* Can't validate upper bound, sorry */
290 sprintf(aaa, "%s %d", proto[which], floor);
291 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, &bbb, &bbbsize, cret);
292 if (ret / 100 == 1) {
295 while (bbb && strlen(bbb)) {
298 extract_token(aaa, bbb, 0, '\n');
300 memmove(bbb, bbb + a + 1, strlen(bbb) - a);
301 mptr = (struct march *) malloc(sizeof (struct march));
304 extract(mptr->march_name, aaa, 0);
305 mptr->march_flags = (unsigned int) extract_int(aaa, 1);
306 mptr->march_floor = (char) extract_int(aaa, 2);
307 mptr->march_order = (char) extract_int(aaa, 3);
314 while (mptr2->next != NULL)
327 /* Caller must free the struct usersupp; caller may pass an existing one */
328 int CtdlIPCGetConfig(CtdlIPC *ipc, struct usersupp **uret, char *cret)
332 if (!cret) return -2;
333 if (!uret) return -2;
334 if (!*uret) *uret = (struct usersupp *)calloc(1, sizeof (struct usersupp));
335 if (!*uret) return -1;
337 ret = CtdlIPCGenericCommand(ipc, "GETU", NULL, 0, NULL, NULL, cret);
338 if (ret / 100 == 2) {
339 uret[0]->USscreenwidth = extract_int(cret, 0);
340 uret[0]->USscreenheight = extract_int(cret, 1);
341 uret[0]->flags = extract_int(cret, 2);
348 int CtdlIPCSetConfig(CtdlIPC *ipc, struct usersupp *uret, char *cret)
352 if (!uret) return -2;
353 if (!cret) return -2;
355 sprintf(aaa, "SETU %d|%d|%d",
356 uret->USscreenwidth, uret->USscreenheight,
358 return CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
363 int CtdlIPCGotoRoom(CtdlIPC *ipc, const char *room, const char *passwd,
364 struct ctdlipcroom **rret, char *cret)
369 if (!cret) return -2;
370 if (!rret) return -2;
371 if (!*rret) *rret = (struct ctdlipcroom *)calloc(1, sizeof (struct ctdlipcroom));
372 if (!*rret) return -1;
375 aaa = (char *)malloc(strlen(room) + strlen(passwd) + 7);
380 sprintf(aaa, "GOTO %s|%s", room, passwd);
382 aaa = (char *)malloc(strlen(room) + 6);
387 sprintf(aaa, "GOTO %s", room);
389 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
390 if (ret / 100 == 2) {
391 extract(rret[0]->RRname, cret, 0);
392 rret[0]->RRunread = extract_long(cret, 1);
393 rret[0]->RRtotal = extract_long(cret, 2);
394 rret[0]->RRinfoupdated = extract_int(cret, 3);
395 rret[0]->RRflags = extract_int(cret, 4);
396 rret[0]->RRhighest = extract_long(cret, 5);
397 rret[0]->RRlastread = extract_long(cret, 6);
398 rret[0]->RRismailbox = extract_int(cret, 7);
399 rret[0]->RRaide = extract_int(cret, 8);
400 rret[0]->RRnewmail = extract_long(cret, 9);
401 rret[0]->RRfloor = extract_int(cret, 10);
410 /* which is 0 = all, 1 = old, 2 = new, 3 = last, 4 = first, 5 = gt, 6 = lt */
411 /* whicharg is number of messages, applies to last, first, gt, lt */
412 int CtdlIPCGetMessages(CtdlIPC *ipc, int which, int whicharg,
413 const char *mtemplate, long **mret, char *cret)
416 register unsigned long count = 0;
417 static char *proto[] =
418 { "ALL", "OLD", "NEW", "LAST", "FIRST", "GT", "LT" };
423 if (!cret) return -2;
424 if (!mret) return -2;
425 if (*mret) return -2;
426 if (which < 0 || which > 6) return -2;
429 sprintf(aaa, "MSGS %s||%d", proto[which],
430 (mtemplate) ? 1 : 0);
432 sprintf(aaa, "MSGS %s|%d|%d", proto[which], whicharg,
433 (mtemplate) ? 1 : 0);
434 if (mtemplate) count = strlen(mtemplate);
435 ret = CtdlIPCGenericCommand(ipc, aaa, mtemplate, count, &bbb, &bbbsize, cret);
437 while (strlen(bbb)) {
440 extract_token(aaa, bbb, 0, '\n');
442 memmove(aaa, bbb + a + 1, strlen(bbb) - a - 1);
443 *mret = (long *)realloc(mret,
444 (size_t)((count + 1) * sizeof (long)));
446 *mret[count++] = atol(aaa);
454 int CtdlIPCGetSingleMessage(CtdlIPC *ipc, long msgnum, int headers, int as_mime,
455 struct ctdlipcmessage **mret, char *cret)
461 int multipart_hunting = 0;
462 char multipart_prefix[SIZ];
464 if (!cret) return -1;
465 if (!mret) return -1;
466 if (!*mret) *mret = (struct ctdlipcmessage *)calloc(1, sizeof (struct ctdlipcmessage));
467 if (!*mret) return -1;
468 if (!msgnum) return -1;
470 strcpy(mret[0]->content_type, "");
471 sprintf(aaa, "MSG%d %ld|%d", as_mime, msgnum, headers);
472 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, &bbb, &bbbsize, cret);
473 if (ret / 100 == 1) {
475 strcpy(mret[0]->mime_chosen, "1"); /* Default chosen-part is "1" */
476 while (strlen(bbb) > 4 && bbb[4] == '=') {
477 extract_token(aaa, bbb, 0, '\n');
478 remove_token(bbb, 0, '\n');
480 if (!strncasecmp(aaa, "nhdr=yes", 8))
482 else if (!strncasecmp(aaa, "from=", 5))
483 strcpy(mret[0]->author, &aaa[5]);
484 else if (!strncasecmp(aaa, "type=", 5))
485 mret[0]->type = atoi(&aaa[5]);
486 else if (!strncasecmp(aaa, "msgn=", 5))
487 strcpy(mret[0]->msgid, &aaa[5]);
488 else if (!strncasecmp(aaa, "subj=", 5))
489 strcpy(mret[0]->subject, &aaa[5]);
490 else if (!strncasecmp(aaa, "rfca=", 5))
491 strcpy(mret[0]->email, &aaa[5]);
492 else if (!strncasecmp(aaa, "hnod=", 5))
493 strcpy(mret[0]->hnod, &aaa[5]);
494 else if (!strncasecmp(aaa, "room=", 5))
495 strcpy(mret[0]->room, &aaa[5]);
496 else if (!strncasecmp(aaa, "node=", 5))
497 strcpy(mret[0]->node, &aaa[5]);
498 else if (!strncasecmp(aaa, "rcpt=", 5))
499 strcpy(mret[0]->recipient, &aaa[5]);
500 else if (!strncasecmp(aaa, "time=", 5))
501 mret[0]->time = atol(&aaa[5]);
503 /* Multipart/alternative prefix & suffix strings help
504 * us to determine which part we want to download.
506 else if (!strncasecmp(aaa, "pref=", 5)) {
507 extract(multipart_prefix, &aaa[5], 1);
508 if (!strcasecmp(multipart_prefix,
509 "multipart/alternative")) {
513 else if (!strncasecmp(aaa, "suff=", 5)) {
514 extract(multipart_prefix, &aaa[5], 1);
515 if (!strcasecmp(multipart_prefix,
516 "multipart/alternative")) {
521 else if (!strncasecmp(aaa, "part=", 5)) {
522 struct parts *ptr, *chain;
524 ptr = (struct parts *)calloc(1, sizeof (struct parts));
527 /* Fill the buffers for the caller */
528 extract(ptr->name, &aaa[5], 0);
529 extract(ptr->filename, &aaa[5], 1);
530 extract(ptr->number, &aaa[5], 2);
531 extract(ptr->disposition, &aaa[5], 3);
532 extract(ptr->mimetype, &aaa[5], 4);
533 ptr->length = extract_long(&aaa[5], 5);
534 if (!mret[0]->attachments)
535 mret[0]->attachments = ptr;
537 chain = mret[0]->attachments;
543 /* Now handle multipart/alternative */
544 if (multipart_hunting > 0) {
545 if ( (!strcasecmp(ptr->mimetype,
547 || (!strcasecmp(ptr->mimetype,
549 strcpy(mret[0]->mime_chosen,
557 /* Eliminate "text\n" */
558 remove_token(bbb, 0, '\n');
560 /* If doing a MIME thing, pull out the extra headers */
563 if (!strncasecmp(bbb, "Content-type: ", 14)) {
564 extract_token(mret[0]->content_type, bbb, 0, '\n');
565 strcpy(mret[0]->content_type,
566 &mret[0]->content_type[14]);
567 striplt(mret[0]->content_type);
569 remove_token(bbb, 0, '\n');
570 } while ((bbb[0] != 0) && (bbb[0] != '\n'));
576 /* Strip trailing whitespace */
577 bbb = (char *)realloc(bbb, (size_t)(strlen(bbb) + 1));
579 bbb = (char *)realloc(bbb, 1);
589 int CtdlIPCWhoKnowsRoom(CtdlIPC *ipc, char **listing, char *cret)
594 if (!cret) return -2;
595 if (!listing) return -2;
596 if (*listing) return -2;
598 ret = CtdlIPCGenericCommand(ipc, "WHOK", NULL, 0, listing, &bytes, cret);
604 int CtdlIPCServerInfo(CtdlIPC *ipc, struct CtdlServInfo *ServInfo, char *cret)
608 char *listing = NULL;
611 if (!cret) return -2;
612 if (!ServInfo) return -2;
614 ret = CtdlIPCGenericCommand(ipc, "INFO", NULL, 0, &listing, &bytes, cret);
615 if (ret / 100 == 1) {
618 while (*listing && strlen(listing)) {
619 extract_token(buf, listing, 0, '\n');
620 remove_token(listing, 0, '\n');
622 case 0: ServInfo->serv_pid = atoi(buf);
624 case 1: strcpy(ServInfo->serv_nodename,buf);
626 case 2: strcpy(ServInfo->serv_humannode,buf);
628 case 3: strcpy(ServInfo->serv_fqdn,buf);
630 case 4: strcpy(ServInfo->serv_software,buf);
632 case 5: ServInfo->serv_rev_level = atoi(buf);
634 case 6: strcpy(ServInfo->serv_bbs_city,buf);
636 case 7: strcpy(ServInfo->serv_sysadm,buf);
638 case 9: strcpy(ServInfo->serv_moreprompt,buf);
640 case 10: ServInfo->serv_ok_floors = atoi(buf);
642 case 11: ServInfo->serv_paging_level = atoi(buf);
644 case 13: ServInfo->serv_supports_qnop = atoi(buf);
655 int CtdlIPCReadDirectory(CtdlIPC *ipc, char **listing, char *cret)
660 if (!cret) return -2;
661 if (!listing) return -2;
662 if (*listing) return -2;
664 ret = CtdlIPCGenericCommand(ipc, "RDIR", NULL, 0, listing, &bytes, cret);
670 * Set last-read pointer in this room to msgnum, or 0 for HIGHEST.
672 int CtdlIPCSetLastRead(CtdlIPC *ipc, long msgnum, char *cret)
677 if (!cret) return -2;
680 sprintf(aaa, "SLRP %ld", msgnum);
682 sprintf(aaa, "SLRP HIGHEST");
683 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
689 int CtdlIPCInviteUserToRoom(CtdlIPC *ipc, const char *username, char *cret)
694 if (!cret) return -2;
695 if (!username) return -2;
697 aaa = (char *)malloc(strlen(username) + 6);
700 sprintf(aaa, "INVT %s", username);
701 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
708 int CtdlIPCKickoutUserFromRoom(CtdlIPC *ipc, const char *username, char *cret)
713 if (!cret) return -1;
714 if (!username) return -1;
716 aaa = (char *)malloc(strlen(username) + 6);
718 sprintf(aaa, "KICK %s", username);
719 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
726 int CtdlIPCGetRoomAttributes(CtdlIPC *ipc, struct quickroom **qret, char *cret)
730 if (!cret) return -2;
731 if (!qret) return -2;
732 if (!*qret) *qret = (struct quickroom *)calloc(1, sizeof (struct quickroom));
733 if (!*qret) return -1;
735 ret = CtdlIPCGenericCommand(ipc, "GETR", NULL, 0, NULL, NULL, cret);
736 if (ret / 100 == 2) {
737 extract(qret[0]->QRname, cret, 0);
738 extract(qret[0]->QRpasswd, cret, 1);
739 extract(qret[0]->QRdirname, cret, 2);
740 qret[0]->QRflags = extract_int(cret, 3);
741 qret[0]->QRfloor = extract_int(cret, 4);
742 qret[0]->QRorder = extract_int(cret, 5);
743 qret[0]->QRdefaultview = extract_int(cret, 6);
744 qret[0]->QRflags2 = extract_int(cret, 7);
751 /* set forget to kick all users out of room */
752 int CtdlIPCSetRoomAttributes(CtdlIPC *ipc, int forget, struct quickroom *qret, char *cret)
757 if (!cret) return -2;
758 if (!qret) return -2;
760 aaa = (char *)malloc(strlen(qret->QRname) + strlen(qret->QRpasswd) +
761 strlen(qret->QRdirname) + 52);
764 sprintf(aaa, "SETR %s|%s|%s|%d|%d|%d|%d",
765 qret->QRname, qret->QRpasswd, qret->QRdirname,
766 qret->QRflags, forget, qret->QRfloor, qret->QRorder);
767 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
774 int CtdlIPCGetRoomAide(CtdlIPC *ipc, char *cret)
776 if (!cret) return -1;
778 return CtdlIPCGenericCommand(ipc, "GETA", NULL, 0, NULL, NULL, cret);
783 int CtdlIPCSetRoomAide(CtdlIPC *ipc, const char *username, char *cret)
788 if (!cret) return -2;
789 if (!username) return -2;
791 aaa = (char *)malloc(strlen(username) + 6);
794 sprintf(aaa, "SETA %s", username);
795 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
802 int CtdlIPCPostMessage(CtdlIPC *ipc, int flag, const struct ctdlipcmessage *mr, char *cret)
807 if (!cret) return -2;
810 aaa = (char *)malloc(strlen(mr->recipient) + strlen(mr->author) + 40);
813 sprintf(aaa, "ENT0 %d|%s|%d|%d|%s", flag, mr->recipient, mr->anonymous,
814 mr->type, mr->author);
815 ret = CtdlIPCGenericCommand(ipc, aaa, mr->text, strlen(mr->text), NULL,
823 int CtdlIPCRoomInfo(CtdlIPC *ipc, char **iret, char *cret)
827 if (!cret) return -2;
828 if (!iret) return -2;
829 if (*iret) return -2;
831 return CtdlIPCGenericCommand(ipc, "RINF", NULL, 0, iret, &bytes, cret);
836 int CtdlIPCDeleteMessage(CtdlIPC *ipc, long msgnum, char *cret)
840 if (!cret) return -2;
841 if (!msgnum) return -2;
843 sprintf(aaa, "DELE %ld", msgnum);
844 return CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
849 int CtdlIPCMoveMessage(CtdlIPC *ipc, int copy, long msgnum, const char *destroom, char *cret)
854 if (!cret) return -2;
855 if (!destroom) return -2;
856 if (!msgnum) return -2;
858 aaa = (char *)malloc(strlen(destroom) + 28);
861 sprintf(aaa, "MOVE %ld|%s|%d", msgnum, destroom, copy);
862 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
869 int CtdlIPCDeleteRoom(CtdlIPC *ipc, int for_real, char *cret)
873 if (!cret) return -2;
875 sprintf(aaa, "KILL %d", for_real);
876 return CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
881 int CtdlIPCCreateRoom(CtdlIPC *ipc, int for_real, const char *roomname, int type,
882 const char *password, int floor, char *cret)
887 if (!cret) return -2;
888 if (!roomname) return -2;
891 aaa = (char *)malloc(strlen(roomname) + strlen(password) + 40);
893 sprintf(aaa, "CRE8 %d|%s|%d|%s|%d", for_real, roomname, type,
896 aaa = (char *)malloc(strlen(roomname) + 40);
898 sprintf(aaa, "CRE8 %d|%s|%d||%d", for_real, roomname, type,
901 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
908 int CtdlIPCForgetRoom(CtdlIPC *ipc, char *cret)
910 if (!cret) return -2;
912 return CtdlIPCGenericCommand(ipc, "FORG", NULL, 0, NULL, NULL, cret);
917 int CtdlIPCSystemMessage(CtdlIPC *ipc, const char *message, char **mret, char *cret)
923 if (!cret) return -2;
924 if (!mret) return -2;
925 if (*mret) return -2;
926 if (!message) return -2;
928 aaa = (char *)malloc(strlen(message) + 6);
931 sprintf(aaa, "MESG %s", message);
932 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, mret, &bytes, cret);
939 int CtdlIPCNextUnvalidatedUser(CtdlIPC *ipc, char *cret)
941 if (!cret) return -2;
943 return CtdlIPCGenericCommand(ipc, "GNUR", NULL, 0, NULL, NULL, cret);
948 int CtdlIPCGetUserRegistration(CtdlIPC *ipc, const char *username, char **rret, char *cret)
954 if (!cret) return -2;
955 if (!rret) return -2;
956 if (*rret) return -2;
959 aaa = (char *)malloc(strlen(username) + 6);
961 aaa = (char *)malloc(12);
965 sprintf(aaa, "GREG %s", username);
967 sprintf(aaa, "GREG _SELF_");
968 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, rret, &bytes, cret);
975 int CtdlIPCValidateUser(CtdlIPC *ipc, const char *username, int axlevel, char *cret)
980 if (!cret) return -2;
981 if (!username) return -2;
982 if (axlevel < 0 || axlevel > 7) return -2;
984 aaa = (char *)malloc(strlen(username) + 17);
987 sprintf(aaa, "VALI %s|%d", username, axlevel);
988 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
995 int CtdlIPCSetRoomInfo(CtdlIPC *ipc, int for_real, const char *info, char *cret)
999 if (!cret) return -1;
1000 if (!info) return -1;
1002 sprintf(aaa, "EINF %d", for_real);
1003 return CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1008 int CtdlIPCUserListing(CtdlIPC *ipc, char **listing, char *cret)
1012 if (!cret) return -1;
1013 if (!listing) return -1;
1014 if (*listing) return -1;
1016 return CtdlIPCGenericCommand(ipc, "LIST", NULL, 0, listing, &bytes, cret);
1021 int CtdlIPCSetRegistration(CtdlIPC *ipc, const char *info, char *cret)
1023 if (!cret) return -1;
1024 if (!info) return -1;
1026 return CtdlIPCGenericCommand(ipc, "REGI", info, strlen(info),
1032 int CtdlIPCMiscCheck(CtdlIPC *ipc, struct ctdlipcmisc *chek, char *cret)
1036 if (!cret) return -1;
1037 if (!chek) return -1;
1039 ret = CtdlIPCGenericCommand(ipc, "CHEK", NULL, 0, NULL, NULL, cret);
1040 if (ret / 100 == 2) {
1041 chek->newmail = extract_long(cret, 0);
1042 chek->needregis = extract_int(cret, 1);
1043 chek->needvalid = extract_int(cret, 2);
1050 int CtdlIPCDeleteFile(CtdlIPC *ipc, const char *filename, char *cret)
1055 if (!cret) return -2;
1056 if (!filename) return -2;
1058 aaa = (char *)malloc(strlen(filename) + 6);
1059 if (!aaa) return -1;
1061 sprintf(aaa, "DELF %s", filename);
1062 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1069 int CtdlIPCMoveFile(CtdlIPC *ipc, const char *filename, const char *destroom, char *cret)
1074 if (!cret) return -2;
1075 if (!filename) return -2;
1076 if (!destroom) return -2;
1078 aaa = (char *)malloc(strlen(filename) + strlen(destroom) + 7);
1079 if (!aaa) return -1;
1081 sprintf(aaa, "MOVF %s|%s", filename, destroom);
1082 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1089 int CtdlIPCNetSendFile(CtdlIPC *ipc, const char *filename, const char *destnode, char *cret)
1094 if (!cret) return -2;
1095 if (!filename) return -2;
1096 if (!destnode) return -2;
1098 aaa = (char *)malloc(strlen(filename) + strlen(destnode) + 7);
1099 if (!aaa) return -1;
1101 sprintf(aaa, "NETF %s|%s", filename, destnode);
1102 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1109 int CtdlIPCOnlineUsers(CtdlIPC *ipc, char **listing, time_t *stamp, char *cret)
1114 if (!cret) return -1;
1115 if (!listing) return -1;
1116 if (*listing) return -1;
1118 *stamp = CtdlIPCServerTime(ipc, cret);
1120 *stamp = time(NULL);
1121 ret = CtdlIPCGenericCommand(ipc, "RWHO", NULL, 0, listing, &bytes, cret);
1127 int CtdlIPCFileDownload(CtdlIPC *ipc, const char *filename, void **buf,
1129 void (*progress_gauge_callback)(unsigned long, unsigned long),
1138 if (!cret) return -2;
1139 if (!filename) return -2;
1140 if (!buf) return -2;
1141 if (*buf) return -2;
1142 if (ipc->downloading) return -2;
1144 aaa = (char *)malloc(strlen(filename) + 6);
1145 if (!aaa) return -1;
1147 sprintf(aaa, "OPEN %s", filename);
1148 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1150 if (ret / 100 == 2) {
1151 ipc->downloading = 1;
1152 bytes = extract_long(cret, 0);
1153 last_mod = extract_int(cret, 1);
1154 extract(mimetype, cret, 2);
1155 ret = CtdlIPCReadDownload(ipc, buf, bytes, resume, progress_gauge_callback, cret);
1156 /* ret = CtdlIPCHighSpeedReadDownload(ipc, buf, bytes, resume, progress_gauge_callback, cret); */
1157 ret = CtdlIPCEndDownload(ipc, cret);
1159 sprintf(cret, "%d|%ld|%s|%s", (int)bytes, last_mod,
1160 filename, mimetype);
1167 int CtdlIPCAttachmentDownload(CtdlIPC *ipc, long msgnum, const char *part,
1169 void (*progress_gauge_callback)(unsigned long, unsigned long),
1179 if (!cret) return -2;
1180 if (!buf) return -2;
1181 if (*buf) return -2;
1182 if (!part) return -2;
1183 if (!msgnum) return -2;
1184 if (ipc->downloading) return -2;
1186 aaa = (char *)malloc(strlen(part) + 17);
1187 if (!aaa) return -1;
1189 sprintf(aaa, "OPNA %ld|%s", msgnum, part);
1190 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1192 if (ret / 100 == 2) {
1193 ipc->downloading = 1;
1194 bytes = extract_long(cret, 0);
1195 last_mod = extract_int(cret, 1);
1196 extract(mimetype, cret, 2);
1197 ret = CtdlIPCHighSpeedReadDownload(ipc, buf, bytes, 0, progress_gauge_callback, cret);
1198 ret = CtdlIPCEndDownload(ipc, cret);
1200 sprintf(cret, "%d|%ld|%s|%s", (int)bytes, last_mod,
1201 filename, mimetype);
1208 int CtdlIPCImageDownload(CtdlIPC *ipc, const char *filename, void **buf,
1209 void (*progress_gauge_callback)(unsigned long, unsigned long),
1218 if (!cret) return -1;
1219 if (!buf) return -1;
1220 if (*buf) return -1;
1221 if (!filename) return -1;
1222 if (ipc->downloading) return -1;
1224 aaa = (char *)malloc(strlen(filename) + 6);
1225 if (!aaa) return -1;
1227 sprintf(aaa, "OIMG %s", filename);
1228 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1230 if (ret / 100 == 2) {
1231 ipc->downloading = 1;
1232 bytes = extract_long(cret, 0);
1233 last_mod = extract_int(cret, 1);
1234 extract(mimetype, cret, 2);
1235 ret = CtdlIPCReadDownload(ipc, buf, bytes, 0, progress_gauge_callback, cret);
1236 ret = CtdlIPCEndDownload(ipc, cret);
1238 sprintf(cret, "%d|%ld|%s|%s", (int)bytes, last_mod,
1239 filename, mimetype);
1246 int CtdlIPCFileUpload(CtdlIPC *ipc, const char *save_as, const char *comment,
1248 void (*progress_gauge_callback)(unsigned long, unsigned long),
1254 if (!cret) return -1;
1255 if (!save_as) return -1;
1256 if (!comment) return -1;
1257 if (!path) return -1;
1258 if (!*path) return -1;
1259 if (ipc->uploading) return -1;
1261 aaa = (char *)malloc(strlen(save_as) + strlen(comment) + 7);
1262 if (!aaa) return -1;
1264 sprintf(aaa, "UOPN %s|%s", save_as, comment);
1265 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1267 if (ret / 100 == 2) {
1269 ret = CtdlIPCWriteUpload(ipc, path, progress_gauge_callback, cret);
1270 ret = CtdlIPCEndUpload(ipc, (ret == -2 ? 1 : 0), cret);
1278 int CtdlIPCImageUpload(CtdlIPC *ipc, int for_real, const char *path,
1279 const char *save_as,
1280 void (*progress_gauge_callback)(unsigned long, unsigned long),
1286 if (!cret) return -1;
1287 if (!save_as) return -1;
1288 if (!path && for_real) return -1;
1289 if (!*path && for_real) return -1;
1290 if (ipc->uploading) return -1;
1292 aaa = (char *)malloc(strlen(save_as) + 17);
1293 if (!aaa) return -1;
1295 sprintf(aaa, "UIMG %d|%s", for_real, save_as);
1296 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1298 if (ret / 100 == 2 && for_real) {
1300 ret = CtdlIPCWriteUpload(ipc, path, progress_gauge_callback, cret);
1301 ret = CtdlIPCEndUpload(ipc, (ret == -2 ? 1 : 0), cret);
1309 int CtdlIPCQueryUsername(CtdlIPC *ipc, const char *username, char *cret)
1314 if (!cret) return -2;
1315 if (!username) return -2;
1317 aaa = (char *)malloc(strlen(username) + 6);
1318 if (!aaa) return -1;
1320 sprintf(aaa, "QUSR %s", username);
1321 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1328 int CtdlIPCFloorListing(CtdlIPC *ipc, char **listing, char *cret)
1332 if (!cret) return -2;
1333 if (!listing) return -2;
1334 if (*listing) return -2;
1336 return CtdlIPCGenericCommand(ipc, "LFLR", NULL, 0, listing, &bytes, cret);
1341 int CtdlIPCCreateFloor(CtdlIPC *ipc, int for_real, const char *name, char *cret)
1346 if (!cret) return -2;
1347 if (!name) return -2;
1349 aaa = (char *)malloc(strlen(name) + 17);
1350 if (!aaa) return -1;
1352 sprintf(aaa, "CFLR %s|%d", name, for_real);
1353 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1360 int CtdlIPCDeleteFloor(CtdlIPC *ipc, int for_real, int floornum, char *cret)
1364 if (!cret) return -1;
1365 if (floornum < 0) return -1;
1367 sprintf(aaa, "KFLR %d|%d", floornum, for_real);
1368 return CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1373 int CtdlIPCEditFloor(CtdlIPC *ipc, int floornum, const char *floorname, char *cret)
1378 if (!cret) return -2;
1379 if (!floorname) return -2;
1380 if (floornum < 0) return -2;
1382 aaa = (char *)malloc(strlen(floorname) + 17);
1383 if (!aaa) return -1;
1385 sprintf(aaa, "EFLR %d|%s", floornum, floorname);
1386 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1393 int CtdlIPCIdentifySoftware(CtdlIPC *ipc, int developerid, int clientid, int revision,
1394 const char *software_name, const char *hostname, char *cret)
1399 if (developerid < 0) return -2;
1400 if (clientid < 0) return -2;
1401 if (revision < 0) return -2;
1402 if (!software_name) return -2;
1403 if (!hostname) return -2;
1405 aaa = (char *)malloc(strlen(software_name) + strlen(hostname) + 29);
1406 if (!aaa) return -1;
1408 sprintf(aaa, "IDEN %d|%d|%d|%s|%s", developerid, clientid,
1409 revision, software_name, hostname);
1410 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1417 int CtdlIPCSendInstantMessage(CtdlIPC *ipc, const char *username, const char *text,
1423 if (!cret) return -2;
1424 if (!username) return -2;
1426 aaa = (char *)malloc(strlen(username) + 8);
1427 if (!aaa) return -1;
1430 sprintf(aaa, "SEXP %s|-", username);
1431 ret = CtdlIPCGenericCommand(ipc, aaa, text, strlen(text),
1434 sprintf(aaa, "SEXP %s||", username);
1435 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1443 int CtdlIPCGetInstantMessage(CtdlIPC *ipc, char **listing, char *cret)
1447 if (!cret) return -2;
1448 if (!listing) return -2;
1449 if (*listing) return -2;
1451 return CtdlIPCGenericCommand(ipc, "GEXP", NULL, 0, listing, &bytes, cret);
1456 /* mode is 0 = enable, 1 = disable, 2 = status */
1457 int CtdlIPCEnableInstantMessageReceipt(CtdlIPC *ipc, int mode, char *cret)
1461 if (!cret) return -2;
1463 sprintf(aaa, "DEXP %d", mode);
1464 return CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1469 int CtdlIPCSetBio(CtdlIPC *ipc, char *bio, char *cret)
1471 if (!cret) return -2;
1472 if (!bio) return -2;
1474 return CtdlIPCGenericCommand(ipc, "EBIO", bio, strlen(bio),
1480 int CtdlIPCGetBio(CtdlIPC *ipc, const char *username, char **listing, char *cret)
1486 if (!cret) return -2;
1487 if (!username) return -2;
1488 if (!listing) return -2;
1489 if (*listing) return -2;
1491 aaa = (char *)malloc(strlen(username) + 6);
1492 if (!aaa) return -1;
1494 sprintf(aaa, "RBIO %s", username);
1495 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, listing, &bytes, cret);
1502 int CtdlIPCListUsersWithBios(CtdlIPC *ipc, char **listing, char *cret)
1506 if (!cret) return -2;
1507 if (!listing) return -2;
1508 if (*listing) return -2;
1510 return CtdlIPCGenericCommand(ipc, "LBIO", NULL, 0, listing, &bytes, cret);
1515 int CtdlIPCStealthMode(CtdlIPC *ipc, int mode, char *cret)
1519 if (!cret) return -1;
1521 sprintf(aaa, "STEL %d", mode ? 1 : 0);
1522 return CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1527 int CtdlIPCTerminateSession(CtdlIPC *ipc, int sid, char *cret)
1531 if (!cret) return -1;
1533 sprintf(aaa, "TERM %d", sid);
1534 return CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1539 int CtdlIPCTerminateServerNow(CtdlIPC *ipc, char *cret)
1541 if (!cret) return -1;
1543 return CtdlIPCGenericCommand(ipc, "DOWN", NULL, 0, NULL, NULL, cret);
1548 int CtdlIPCTerminateServerScheduled(CtdlIPC *ipc, int mode, char *cret)
1552 if (!cret) return -1;
1554 sprintf(aaa, "SCDN %d", mode ? 1 : 0);
1555 return CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1560 int CtdlIPCEnterSystemMessage(CtdlIPC *ipc, const char *filename, const char *text,
1566 if (!cret) return -2;
1567 if (!text) return -2;
1568 if (!filename) return -2;
1570 aaa = (char *)malloc(strlen(filename) + 6);
1571 if (!aaa) return -1;
1573 sprintf(aaa, "EMSG %s", filename);
1574 ret = CtdlIPCGenericCommand(ipc, aaa, text, strlen(text), NULL, NULL, cret);
1581 int CtdlIPCChangeHostname(CtdlIPC *ipc, const char *hostname, char *cret)
1586 if (!cret) return -2;
1587 if (!hostname) return -2;
1589 aaa = (char *)malloc(strlen(hostname) + 6);
1590 if (!aaa) return -1;
1592 sprintf(aaa, "HCHG %s", hostname);
1593 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1600 int CtdlIPCChangeRoomname(CtdlIPC *ipc, const char *roomname, char *cret)
1605 if (!cret) return -2;
1606 if (!roomname) return -2;
1608 aaa = (char *)malloc(strlen(roomname) + 6);
1609 if (!aaa) return -1;
1611 sprintf(aaa, "RCHG %s", roomname);
1612 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1619 int CtdlIPCChangeUsername(CtdlIPC *ipc, const char *username, char *cret)
1624 if (!cret) return -2;
1625 if (!username) return -2;
1627 aaa = (char *)malloc(strlen(username) + 6);
1628 if (!aaa) return -1;
1630 sprintf(aaa, "UCHG %s", username);
1631 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1638 /* This function returns the actual server time reported, or 0 if error */
1639 time_t CtdlIPCServerTime(CtdlIPC *ipc, char *cret)
1641 register time_t tret;
1644 ret = CtdlIPCGenericCommand(ipc, "TIME", NULL, 0, NULL, NULL, cret);
1645 if (ret / 100 == 2) {
1646 tret = extract_long(cret, 0);
1655 int CtdlIPCAideGetUserParameters(CtdlIPC *ipc, const char *who,
1656 struct usersupp **uret, char *cret)
1661 if (!cret) return -2;
1662 if (!uret) return -2;
1663 if (!*uret) *uret = (struct usersupp *)calloc(1, sizeof(struct usersupp));
1664 if (!*uret) return -1;
1666 sprintf(aaa, "AGUP %s", who);
1667 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1669 if (ret / 100 == 2) {
1670 extract(uret[0]->fullname, cret, 0);
1671 extract(uret[0]->password, cret, 1);
1672 uret[0]->flags = extract_int(cret, 2);
1673 uret[0]->timescalled = extract_long(cret, 3);
1674 uret[0]->posted = extract_long(cret, 4);
1675 uret[0]->axlevel = extract_int(cret, 5);
1676 uret[0]->usernum = extract_long(cret, 6);
1677 uret[0]->lastcall = extract_long(cret, 7);
1678 uret[0]->USuserpurge = extract_int(cret, 8);
1685 int CtdlIPCAideSetUserParameters(CtdlIPC *ipc, const struct usersupp *uret, char *cret)
1690 if (!cret) return -2;
1691 if (!uret) return -2;
1693 aaa = (char *)malloc(strlen(uret->fullname) + strlen(uret->password) + 84);
1694 if (!aaa) return -1;
1696 sprintf(aaa, "ASUP %s|%s|%d|%ld|%ld|%d|%ld|%ld|%d",
1697 uret->fullname, uret->password, uret->flags,
1698 uret->timescalled, uret->posted, uret->axlevel,
1699 uret->usernum, uret->lastcall, uret->USuserpurge);
1700 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1707 /* which is 0 = room, 1 = floor, 2 = site */
1708 /* caller must free the struct ExpirePolicy */
1709 int CtdlIPCGetMessageExpirationPolicy(CtdlIPC *ipc, int which,
1710 struct ExpirePolicy **policy, char *cret)
1712 static char *proto[] = {"room", "floor", "site"};
1716 if (!cret) return -2;
1717 if (!policy) return -2;
1718 if (!*policy) *policy = (struct ExpirePolicy *)calloc(1, sizeof(struct ExpirePolicy));
1719 if (!*policy) return -1;
1720 if (which < 0 || which > 2) return -2;
1722 sprintf(aaa, "GPEX %s", proto[which]);
1723 ret = CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1724 if (ret / 100 == 2) {
1725 policy[0]->expire_mode = extract_int(cret, 0);
1726 policy[0]->expire_value = extract_int(cret, 1);
1734 /* which is 0 = room, 1 = floor, 2 = site */
1735 /* policy is 0 = inherit, 1 = no purge, 2 = by count, 3 = by age (days) */
1736 int CtdlIPCSetMessageExpirationPolicy(CtdlIPC *ipc, int which,
1737 struct ExpirePolicy *policy, char *cret)
1741 if (!cret) return -2;
1742 if (which < 0 || which > 2) return -2;
1743 if (!policy) return -2;
1744 if (policy->expire_mode < 0 || policy->expire_mode > 3) return -2;
1745 if (policy->expire_mode >= 2 && policy->expire_value < 1) return -2;
1747 sprintf(aaa, "SPEX %d|%d|%d", which,
1748 policy->expire_mode, policy->expire_value);
1749 return CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1754 int CtdlGetSystemConfig(CtdlIPC *ipc, char **listing, char *cret)
1758 if (!cret) return -2;
1759 if (!listing) return -2;
1760 if (*listing) return -2;
1762 return CtdlIPCGenericCommand(ipc, "CONF GET", NULL, 0,
1763 listing, &bytes, cret);
1768 int CtdlSetSystemConfig(CtdlIPC *ipc, const char *listing, char *cret)
1770 if (!cret) return -2;
1771 if (!listing) return -2;
1773 return CtdlIPCGenericCommand(ipc, "CONF SET", listing, strlen(listing),
1779 int CtdlGetSystemConfigByType(CtdlIPC *ipc, const char *mimetype,
1780 char **listing, char *cret)
1785 if (!cret) return -2;
1786 if (!mimetype) return -2;
1787 if (!listing) return -2;
1788 if (*listing) return -2;
1790 aaa = malloc(strlen(mimetype) + 13);
1791 if (!aaa) return -1;
1792 sprintf(aaa, "CONF GETSYS|%s", mimetype);
1793 return CtdlIPCGenericCommand(ipc, aaa, NULL, 0,
1794 listing, &bytes, cret);
1799 int CtdlSetSystemConfigByType(CtdlIPC *ipc, const char *mimetype,
1800 const char *listing, char *cret)
1804 if (!cret) return -2;
1805 if (!mimetype) return -2;
1806 if (!listing) return -2;
1808 aaa = malloc(strlen(mimetype) + 13);
1809 if (!aaa) return -1;
1810 sprintf(aaa, "CONF PUTSYS|%s", mimetype);
1811 return CtdlIPCGenericCommand(ipc, aaa, listing, strlen(listing),
1816 int CtdlIPCModerateMessage(CtdlIPC *ipc, long msgnum, int level, char *cret)
1820 if (!cret) return -2;
1821 if (!msgnum) return -2;
1823 sprintf(aaa, "MMOD %ld|%d", msgnum, level);
1824 return CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1829 int CtdlIPCRequestClientLogout(CtdlIPC *ipc, int session, char *cret)
1833 if (!cret) return -2;
1834 if (session < 0) return -2;
1836 sprintf(aaa, "REQT %d", session);
1837 return CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1842 int CtdlIPCSetMessageSeen(CtdlIPC *ipc, long msgnum, int seen, char *cret)
1846 if (!cret) return -2;
1847 if (msgnum < 0) return -2;
1849 sprintf(aaa, "SEEN %ld|%d", msgnum, seen ? 1 : 0);
1850 return CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1855 int CtdlIPCStartEncryption(CtdlIPC *ipc, char *cret)
1864 /* New SSL object */
1865 temp_ssl = SSL_new(ssl_ctx);
1867 error_printf("SSL_new failed: %s\n",
1868 ERR_reason_error_string(ERR_get_error()));
1871 /* Pointless flag waving */
1872 #if SSLEAY_VERSION_NUMBER >= 0x0922
1873 SSL_set_session_id_context(temp_ssl, "Citadel/UX SID", 14);
1876 if (!access("/var/run/egd-pool", F_OK))
1877 RAND_egd("/var/run/egd-pool");
1879 if (!RAND_status()) {
1880 error_printf("PRNG not properly seeded\n");
1884 /* Associate network connection with SSL object */
1885 if (SSL_set_fd(temp_ssl, ipc->sock) < 1) {
1886 error_printf("SSL_set_fd failed: %s\n",
1887 ERR_reason_error_string(ERR_get_error()));
1891 if (status_hook != NULL)
1892 status_hook("Requesting encryption...\r");
1894 /* Ready to start SSL/TLS */
1896 CtdlIPC_putline(ipc, "STLS");
1897 CtdlIPC_getline(ipc, buf);
1898 if (buf[0] != '2') {
1899 error_printf("Server can't start TLS: %s\n", buf);
1903 r = CtdlIPCGenericCommand(ipc,
1904 "STLS", NULL, 0, NULL, NULL, cret);
1906 error_printf("Server can't start TLS: %s\n", buf);
1911 /* Do SSL/TLS handshake */
1912 if ((a = SSL_connect(temp_ssl)) < 1) {
1913 error_printf("SSL_connect failed: %s\n",
1914 ERR_reason_error_string(ERR_get_error()));
1918 ipc->ssl = temp_ssl;
1920 BIO_set_close(ipc->ssl->rbio, BIO_NOCLOSE);
1924 bits = SSL_CIPHER_get_bits(SSL_get_current_cipher(ipc->ssl), &alg_bits);
1925 error_printf("Encrypting with %s cipher %s (%d of %d bits)\n",
1926 SSL_CIPHER_get_version(SSL_get_current_cipher(ipc->ssl)),
1927 SSL_CIPHER_get_name(SSL_get_current_cipher(ipc->ssl)),
1933 #endif /* HAVE_OPENSSL */
1938 static void endtls(SSL *ssl)
1949 int CtdlIPCDirectoryLookup(CtdlIPC *ipc, const char *address, char *cret)
1953 if (!address) return -2;
1954 if (!cret) return -2;
1956 aaa = (char *)malloc(strlen(address) + 6);
1957 if (!aaa) return -1;
1959 sprintf(aaa, "QDIR %s", address);
1960 return CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1965 int CtdlIPCInternalProgram(CtdlIPC *ipc, int secret, char *cret)
1969 if (!cret) return -2;
1970 sprintf(aaa, "IPGM %d", secret);
1971 return CtdlIPCGenericCommand(ipc, aaa, NULL, 0, NULL, NULL, cret);
1992 /* ************************************************************************** */
1993 /* Stuff below this line is not for public consumption */
1994 /* ************************************************************************** */
1997 inline void CtdlIPC_lock(CtdlIPC *ipc)
1999 if (lock_hook != NULL)
2001 #ifdef THREADED_CLIENT
2002 pthread_mutex_lock(&(ipc->mutex));
2007 inline void CtdlIPC_unlock(CtdlIPC *ipc)
2009 #ifdef THREADED_CLIENT
2010 pthread_mutex_unlock(&(ipc->mutex));
2012 if (lock_hook != NULL)
2017 /* Read a listing from the server up to 000. Append to dest if it exists */
2018 char *CtdlIPCReadListing(CtdlIPC *ipc, char *dest)
2027 length = strlen(ret);
2034 while (CtdlIPC_getline(ipc, aaa), strcmp(aaa, "000")) {
2035 linelength = strlen(aaa);
2036 ret = (char *)realloc(ret, (size_t)(length + linelength + 2));
2038 strcpy(&ret[length], aaa);
2039 length += linelength;
2040 strcpy(&ret[length++], "\n");
2048 /* Send a listing to the server; generate the ending 000. */
2049 int CtdlIPCSendListing(CtdlIPC *ipc, const char *listing)
2053 text = (char *)malloc(strlen(listing) + 6);
2055 strcpy(text, listing);
2056 while (text[strlen(text) - 1] == '\n')
2057 text[strlen(text) - 1] = '\0';
2058 strcat(text, "\n000");
2059 CtdlIPC_putline(ipc, text);
2063 /* Malloc failed but we are committed to send */
2064 /* This may result in extra blanks at the bottom */
2065 CtdlIPC_putline(ipc, text);
2066 CtdlIPC_putline(ipc, "000");
2072 /* Partial read of file from server */
2073 size_t CtdlIPCPartialRead(CtdlIPC *ipc, void **buf, size_t offset, size_t bytes, char *cret)
2075 register size_t len = 0;
2079 if (!cret) return 0;
2080 if (bytes < 1) return 0;
2081 if (offset < 0) return 0;
2084 sprintf(aaa, "READ %d|%d", (int)offset, (int)bytes);
2085 CtdlIPC_putline(ipc, aaa);
2086 CtdlIPC_getline(ipc, aaa);
2088 strcpy(cret, &aaa[4]);
2090 len = extract_long(&aaa[4], 0);
2091 *buf = (void *)realloc(*buf, (size_t)(offset + len));
2093 /* I know what I'm doing */
2094 serv_read(ipc, (*buf + offset), len);
2096 /* We have to read regardless */
2097 serv_read(ipc, aaa, len);
2101 CtdlIPC_unlock(ipc);
2107 int CtdlIPCEndDownload(CtdlIPC *ipc, char *cret)
2111 if (!cret) return -2;
2112 if (!ipc->downloading) return -2;
2114 ret = CtdlIPCGenericCommand(ipc, "CLOS", NULL, 0, NULL, NULL, cret);
2116 ipc->downloading = 0;
2122 int CtdlIPCSpecifyPreferredFormats(CtdlIPC *ipc, char *cret, char *formats) {
2126 snprintf(cmd, sizeof cmd, "MSGP %s", formats);
2127 ret = CtdlIPCGenericCommand(ipc, cmd, NULL, 0, NULL, NULL, cret);
2134 int CtdlIPCReadDownload(CtdlIPC *ipc, void **buf, size_t bytes, size_t resume,
2135 void (*progress_gauge_callback)(unsigned long, unsigned long),
2138 register size_t len;
2140 if (!cret) return -1;
2141 if (!buf) return -1;
2142 if (*buf) return -1;
2143 if (!ipc->downloading) return -1;
2146 if (progress_gauge_callback)
2147 progress_gauge_callback(len, bytes);
2148 while (len < bytes) {
2149 register size_t block;
2151 block = CtdlIPCPartialRead(ipc, buf, len, 4096, cret);
2157 if (progress_gauge_callback)
2158 progress_gauge_callback(len, bytes);
2164 /* READ - pipelined */
2165 int CtdlIPCHighSpeedReadDownload(CtdlIPC *ipc, void **buf, size_t bytes,
2167 void (*progress_gauge_callback)(unsigned long, unsigned long),
2170 register size_t len;
2171 register int calls; /* How many calls in the pipeline */
2172 register int i; /* iterator */
2175 if (!cret) return -1;
2176 if (!buf) return -1;
2177 if (*buf) return -1;
2178 if (!ipc->downloading) return -1;
2180 *buf = (void *)realloc(*buf, bytes - resume);
2181 if (!*buf) return -1;
2185 if (progress_gauge_callback)
2186 progress_gauge_callback(len, bytes);
2188 /* How many calls will be in the pipeline? */
2189 calls = (bytes - resume) / 4096;
2190 if ((bytes - resume) % 4096) calls++;
2192 /* Send all requests at once */
2193 for (i = 0; i < calls; i++) {
2194 sprintf(aaa, "READ %d|4096", (int)(i * 4096 + resume) );
2195 CtdlIPC_putline(ipc, aaa);
2198 /* Receive all responses at once */
2199 for (i = 0; i < calls; i++) {
2200 CtdlIPC_getline(ipc, aaa);
2202 strcpy(cret, &aaa[4]);
2204 len = extract_long(&aaa[4], 0);
2205 /* I know what I'm doing */
2206 serv_read(ipc, ((*buf) + (i * 4096)), len);
2208 if (progress_gauge_callback)
2209 progress_gauge_callback(i * 4096 + len, bytes);
2211 CtdlIPC_unlock(ipc);
2217 int CtdlIPCEndUpload(CtdlIPC *ipc, int discard, char *cret)
2222 if (!cret) return -1;
2223 if (!ipc->uploading) return -1;
2225 sprintf(cmd, "UCLS %d", discard ? 0 : 1);
2226 ret = CtdlIPCGenericCommand(ipc, cmd, NULL, 0, NULL, NULL, cret);
2233 int CtdlIPCWriteUpload(CtdlIPC *ipc, const char *path,
2234 void (*progress_gauge_callback)(unsigned long, unsigned long),
2237 register int ret = -1;
2238 register size_t offset = 0;
2244 if (!cret) return -1;
2245 if (!path) return -1;
2246 if (!*path) return -1;
2248 fd = fopen(path, "r");
2251 fseek(fd, 0L, SEEK_END);
2255 if (progress_gauge_callback)
2256 progress_gauge_callback(0, bytes);
2258 while (offset < bytes) {
2259 register size_t to_write;
2261 /* Read some data in */
2262 to_write = fread(buf, 1, 4096, fd);
2264 if (feof(fd) || ferror(fd)) break;
2266 sprintf(aaa, "WRIT %d", (int)to_write);
2267 CtdlIPC_putline(ipc, aaa);
2268 CtdlIPC_getline(ipc, aaa);
2269 strcpy(cret, &aaa[4]);
2271 if (aaa[0] == '7') {
2272 to_write = extract_long(&aaa[4], 0);
2274 serv_write(ipc, buf, to_write);
2276 if (progress_gauge_callback)
2277 progress_gauge_callback(offset, bytes);
2278 /* Detect short reads and back up if needed */
2279 /* offset will never be negative anyway */
2280 fseek(fd, (signed)offset, SEEK_SET);
2285 if (progress_gauge_callback)
2286 progress_gauge_callback(1, 1);
2287 return (!ferror(fd) ? ret : -2);
2292 * Generic command method. This method should handle any server command
2293 * except for CHAT. It takes the following arguments:
2295 * ipc The server to speak with
2296 * command Preformatted command to send to server
2297 * to_send A text or binary file to send to server
2298 * (only sent if server requests it)
2299 * bytes_to_send The number of bytes in to_send (required if
2300 * sending binary, optional if sending listing)
2301 * to_receive Pointer to a NULL pointer, if the server
2302 * sends text or binary we will allocate memory
2303 * for the file and stuff it here
2304 * bytes_to_receive If a file is received, we will store its
2306 * proto_response The protocol response. Caller must provide
2307 * this buffer and ensure that it is at least
2308 * 128 bytes in length.
2310 * This function returns a number equal to the protocol response number,
2311 * -1 if an internal error occurred, -2 if caller provided bad values,
2312 * or 0 - the protocol response number if bad values were found during
2313 * the protocol exchange.
2314 * It stores the protocol response string (minus the number) in
2315 * protocol_response as described above. Some commands send additional
2316 * data in this string.
2318 int CtdlIPCGenericCommand(CtdlIPC *ipc,
2319 const char *command, const char *to_send,
2320 size_t bytes_to_send, char **to_receive,
2321 size_t *bytes_to_receive, char *proto_response)
2327 if (!command) return -2;
2328 if (!proto_response) return -2;
2331 if (ipc->ssl) watch_ssl = 1;
2335 CtdlIPC_putline(ipc, command);
2337 CtdlIPC_getline(ipc, proto_response);
2338 if (proto_response[3] == '*')
2340 ret = atoi(proto_response);
2341 strcpy(proto_response, &proto_response[4]);
2342 switch (ret / 100) {
2343 default: /* Unknown, punt */
2345 case 3: /* MORE_DATA */
2347 /* Don't need to do anything */
2349 case 1: /* LISTING_FOLLOWS */
2350 if (to_receive && !*to_receive && bytes_to_receive) {
2351 *to_receive = CtdlIPCReadListing(ipc, NULL);
2352 } else { /* Drain */
2353 while (CtdlIPC_getline(ipc, buf), strcmp(buf, "000")) ;
2357 case 4: /* SEND_LISTING */
2359 CtdlIPCSendListing(ipc, to_send);
2361 /* No listing given, fake it */
2362 CtdlIPC_putline(ipc, "000");
2366 case 6: /* BINARY_FOLLOWS */
2367 if (to_receive && !*to_receive && bytes_to_receive) {
2369 extract_long(proto_response, 0);
2370 *to_receive = (char *)
2371 malloc((size_t)*bytes_to_receive);
2375 serv_read(ipc, *to_receive,
2382 drain = extract_long(proto_response, 0);
2383 while (drain > SIZ) {
2384 serv_read(ipc, buf, SIZ);
2387 serv_read(ipc, buf, drain);
2391 case 7: /* SEND_BINARY */
2392 if (to_send && bytes_to_send) {
2393 serv_write(ipc, to_send, bytes_to_send);
2394 } else if (bytes_to_send) {
2395 /* Fake it, send nulls */
2398 fake = bytes_to_send;
2399 memset(buf, '\0', SIZ);
2400 while (fake > SIZ) {
2401 serv_write(ipc, buf, SIZ);
2404 serv_write(ipc, buf, fake);
2406 } /* else who knows? DANGER WILL ROBINSON */
2408 case 8: /* START_CHAT_MODE */
2409 if (!strncasecmp(command, "CHAT", 4)) {
2410 /* Don't call chatmode with generic! */
2411 CtdlIPC_putline(ipc, "/quit");
2414 /* In this mode we send then receive listing */
2416 CtdlIPCSendListing(ipc, to_send);
2418 /* No listing given, fake it */
2419 CtdlIPC_putline(ipc, "000");
2422 if (to_receive && !*to_receive
2423 && bytes_to_receive) {
2424 *to_receive = CtdlIPCReadListing(ipc, NULL);
2425 } else { /* Drain */
2426 while (CtdlIPC_getline(ipc, buf),
2427 strcmp(buf, "000")) ;
2432 case 9: /* ASYNC_MSG */
2433 /* CtdlIPCDoAsync(ret, proto_response); */
2434 free(CtdlIPCReadListing(ipc, NULL)); /* STUB FIXME */
2440 CtdlIPC_unlock(ipc);
2445 static int connectsock(char *host, char *service, char *protocol, int defaultPort)
2447 struct hostent *phe;
2448 struct servent *pse;
2449 struct protoent *ppe;
2450 struct sockaddr_in sin;
2453 memset(&sin, 0, sizeof(sin));
2454 sin.sin_family = AF_INET;
2456 pse = getservbyname(service, protocol);
2458 sin.sin_port = pse->s_port;
2460 else if (atoi(service) > 0) {
2461 sin.sin_port = htons(atoi(service));
2464 sin.sin_port = htons(defaultPort);
2466 phe = gethostbyname(host);
2468 memcpy(&sin.sin_addr, phe->h_addr, phe->h_length);
2469 } else if ((sin.sin_addr.s_addr = inet_addr(host)) == INADDR_NONE) {
2472 if ((ppe = getprotobyname(protocol)) == 0) {
2475 if (!strcmp(protocol, "udp")) {
2481 s = socket(PF_INET, type, ppe->p_proto);
2486 if (connect(s, (struct sockaddr *) &sin, sizeof(sin)) < 0) {
2493 static int uds_connectsock(int *isLocal, char *sockpath)
2495 struct sockaddr_un addr;
2498 memset(&addr, 0, sizeof(addr));
2499 addr.sun_family = AF_UNIX;
2500 safestrncpy(addr.sun_path, sockpath, sizeof addr.sun_path);
2502 s = socket(AF_UNIX, SOCK_STREAM, 0);
2507 if (connect(s, (struct sockaddr *) &addr, sizeof(addr)) < 0) {
2517 * input binary data from socket
2519 static void serv_read(CtdlIPC *ipc, char *buf, unsigned int bytes)
2521 unsigned int len, rlen;
2523 #if defined(HAVE_OPENSSL)
2525 serv_read_ssl(ipc, buf, bytes);
2530 while (len < bytes) {
2531 rlen = read(ipc->sock, &buf[len], bytes - len);
2533 connection_died(ipc);
2542 * send binary to server
2544 static void serv_write(CtdlIPC *ipc, const char *buf, unsigned int nbytes)
2546 unsigned int bytes_written = 0;
2549 #if defined(HAVE_OPENSSL)
2551 serv_write_ssl(ipc, buf, nbytes);
2555 while (bytes_written < nbytes) {
2556 retval = write(ipc->sock, &buf[bytes_written],
2557 nbytes - bytes_written);
2559 connection_died(ipc);
2562 bytes_written += retval;
2569 * input binary data from encrypted connection
2571 static void serv_read_ssl(CtdlIPC* ipc, char *buf, unsigned int bytes)
2577 while (len < bytes) {
2578 if (SSL_want_read(ipc->ssl)) {
2579 if ((SSL_write(ipc->ssl, junk, 0)) < 1) {
2580 error_printf("SSL_write in serv_read:\n");
2581 ERR_print_errors_fp(stderr);
2584 rlen = SSL_read(ipc->ssl, &buf[len], bytes - len);
2588 errval = SSL_get_error(ipc->ssl, rlen);
2589 if (errval == SSL_ERROR_WANT_READ ||
2590 errval == SSL_ERROR_WANT_WRITE) {
2594 if (errval == SSL_ERROR_ZERO_RETURN ||
2595 errval == SSL_ERROR_SSL) {
2596 serv_read(ipc, &buf[len], bytes - len);
2599 error_printf("SSL_read in serv_read:\n");
2600 ERR_print_errors_fp(stderr);
2601 connection_died(NULL);
2610 * send binary to server encrypted
2612 static void serv_write_ssl(CtdlIPC *ipc, const char *buf, unsigned int nbytes)
2614 unsigned int bytes_written = 0;
2618 while (bytes_written < nbytes) {
2619 if (SSL_want_write(ipc->ssl)) {
2620 if ((SSL_read(ipc->ssl, junk, 0)) < 1) {
2621 error_printf("SSL_read in serv_write:\n");
2622 ERR_print_errors_fp(stderr);
2625 retval = SSL_write(ipc->ssl, &buf[bytes_written],
2626 nbytes - bytes_written);
2630 errval = SSL_get_error(ipc->ssl, retval);
2631 if (errval == SSL_ERROR_WANT_READ ||
2632 errval == SSL_ERROR_WANT_WRITE) {
2636 if (errval == SSL_ERROR_ZERO_RETURN ||
2637 errval == SSL_ERROR_SSL) {
2638 serv_write(ipc, &buf[bytes_written],
2639 nbytes - bytes_written);
2642 error_printf("SSL_write in serv_write:\n");
2643 ERR_print_errors_fp(stderr);
2644 connection_died(NULL);
2647 bytes_written += retval;
2652 static void CtdlIPC_init_OpenSSL(void)
2655 SSL_METHOD *ssl_method;
2658 /* already done init */
2666 SSL_load_error_strings();
2667 SSLeay_add_ssl_algorithms();
2669 /* Set up the SSL context in which we will oeprate */
2670 ssl_method = SSLv23_client_method();
2671 ssl_ctx = SSL_CTX_new(ssl_method);
2673 error_printf("SSL_CTX_new failed: %s\n",
2674 ERR_reason_error_string(ERR_get_error()));
2677 /* Any reasonable cipher we can get */
2678 if (!(SSL_CTX_set_cipher_list(ssl_ctx, CIT_CIPHERS))) {
2679 error_printf("No ciphers available for encryption\n");
2682 SSL_CTX_set_session_cache_mode(ssl_ctx, SSL_SESS_CACHE_BOTH);
2684 /* Load DH parameters into the context */
2687 error_printf("Can't allocate a DH object: %s\n",
2688 ERR_reason_error_string(ERR_get_error()));
2691 if (!(BN_hex2bn(&(dh->p), DH_P))) {
2692 error_printf("Can't assign DH_P: %s\n",
2693 ERR_reason_error_string(ERR_get_error()));
2697 if (!(BN_hex2bn(&(dh->g), DH_G))) {
2698 error_printf("Can't assign DH_G: %s\n",
2699 ERR_reason_error_string(ERR_get_error()));
2704 SSL_CTX_set_tmp_dh(ssl_ctx, dh);
2707 #ifdef THREADED_CLIENT
2708 /* OpenSSL requires callbacks for threaded clients */
2709 CRYPTO_set_locking_callback(ssl_lock);
2710 CRYPTO_set_id_callback(id_callback);
2712 /* OpenSSL requires us to do semaphores for threaded clients */
2713 Critters = malloc(CRYPTO_num_locks() * sizeof (pthread_mutex_t *));
2715 perror("malloc failed");
2718 for (a = 0; a < CRYPTO_num_locks(); a++) {
2719 Critters[a] = malloc(sizeof (pthread_mutex_t));
2721 perror("malloc failed");
2724 pthread_mutex_init(Critters[a], NULL);
2727 #endif /* THREADED_CLIENT */
2731 static void ssl_lock(int mode, int n, const char *file, int line)
2733 #ifdef THREADED_CLIENT
2734 if (mode & CRYPTO_LOCK)
2735 pthread_mutex_lock(Critters[n]);
2737 pthread_mutex_unlock(Critters[n]);
2738 #endif /* THREADED_CLIENT */
2741 #ifdef THREADED_CLIENT
2742 static unsigned long id_callback(void) {
2743 return (unsigned long)pthread_self();
2745 #endif /* THREADED_CLIENT */
2746 #endif /* HAVE_OPENSSL */
2750 * input string from socket - implemented in terms of serv_read()
2752 void CtdlIPC_getline(CtdlIPC* ipc, char *buf)
2756 /* Read one character at a time. */
2758 serv_read(ipc, &buf[i], 1);
2759 if (buf[i] == '\n' || i == (SIZ-1))
2763 /* If we got a long line, discard characters until the newline. */
2765 while (buf[i] != '\n')
2766 serv_read(ipc, &buf[i], 1);
2768 /* Strip the trailing newline.
2775 * send line to server - implemented in terms of serv_write()
2777 void CtdlIPC_putline(CtdlIPC *ipc, const char *buf)
2779 /* error_printf("< %s\n", buf); */
2780 serv_write(ipc, buf, strlen(buf));
2781 serv_write(ipc, "\n", 1);
2783 ipc->last_command_sent = time(NULL);
2790 CtdlIPC* CtdlIPC_new(int argc, char **argv, char *hostbuf, char *portbuf)
2797 CtdlIPC *ipc = ialloc(CtdlIPC);
2801 #if defined(HAVE_OPENSSL)
2803 CtdlIPC_init_OpenSSL();
2805 #if defined(HAVE_PTHREAD_H)
2806 pthread_mutex_init(&(ipc->mutex), NULL); /* Default fast mutex */
2808 ipc->sock = -1; /* Not connected */
2809 ipc->isLocal = 0; /* Not local, of course! */
2810 ipc->downloading = 0;
2812 ipc->last_command_sent = 0L;
2814 strcpy(cithost, DEFAULT_HOST); /* default host */
2815 strcpy(citport, DEFAULT_PORT); /* default port */
2817 for (a = 0; a < argc; ++a) {
2820 } else if (a == 1) {
2821 strcpy(cithost, argv[a]);
2822 } else if (a == 2) {
2823 strcpy(citport, argv[a]);
2825 error_printf("%s: usage: ",argv[0]);
2826 error_printf("%s [host] [port] ",argv[0]);
2833 if ((!strcmp(cithost, "localhost"))
2834 || (!strcmp(cithost, "127.0.0.1"))) {
2838 /* If we're using a unix domain socket we can do a bunch of stuff */
2839 if (!strcmp(cithost, UDS)) {
2840 snprintf(sockpath, sizeof sockpath, BBSDIR "/citadel.socket");
2841 ipc->sock = uds_connectsock(&(ipc->isLocal), sockpath);
2842 if (ipc->sock == -1) {
2846 if (hostbuf != NULL) strcpy(hostbuf, cithost);
2847 if (portbuf != NULL) strcpy(portbuf, sockpath);
2851 ipc->sock = connectsock(cithost, citport, "tcp", 504);
2852 if (ipc->sock == -1) {
2856 if (hostbuf != NULL) strcpy(hostbuf, cithost);
2857 if (portbuf != NULL) strcpy(portbuf, citport);
2862 * return the file descriptor of the server socket so we can select() on it.
2864 * FIXME: This is only used in chat mode; eliminate it when chat mode gets
2867 int CtdlIPC_getsockfd(CtdlIPC* ipc)
2874 * return one character
2876 * FIXME: This is only used in chat mode; eliminate it when chat mode gets
2879 char CtdlIPC_get(CtdlIPC* ipc)
2884 serv_read(ipc, buf, 1);