netconfig is not a function.
[dragonfly.git] / libexec / talkd / process.c
blob88ceb461c91da99a57f5ff46160ba7d870bd9955
1 /*
2 * Copyright (c) 1983, 1993
3 * The Regents of the University of California. All rights reserved.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 * must display the following acknowledgement:
15 * This product includes software developed by the University of
16 * California, Berkeley and its contributors.
17 * 4. Neither the name of the University nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
33 * @(#)process.c 8.2 (Berkeley) 11/16/93
34 * $FreeBSD: src/libexec/talkd/process.c,v 1.9 1999/08/28 00:10:16 peter Exp $
35 * $DragonFly: src/libexec/talkd/process.c,v 1.3 2003/11/14 03:54:31 dillon Exp $
39 * process.c handles the requests, which can be of three types:
40 * ANNOUNCE - announce to a user that a talk is wanted
41 * LEAVE_INVITE - insert the request into the table
42 * LOOK_UP - look up to see if a request is waiting in
43 * in the table for the local user
44 * DELETE - delete invitation
46 #include <sys/param.h>
47 #include <sys/stat.h>
48 #include <sys/socket.h>
49 #include <netinet/in.h>
50 #include <protocols/talkd.h>
51 #include <ctype.h>
52 #include <err.h>
53 #include <netdb.h>
54 #include <paths.h>
55 #include <stdio.h>
56 #include <string.h>
57 #include <syslog.h>
59 int announce (CTL_MSG *, char *);
60 int delete_invite (int);
61 void do_announce (CTL_MSG *, CTL_RESPONSE *);
62 CTL_MSG *find_request();
63 CTL_MSG *find_match();
64 int find_user (char *, char *);
65 void insert_table (CTL_MSG *, CTL_RESPONSE *);
66 int new_id (void);
67 void print_request (char *, CTL_MSG *);
68 void print_response (char *, CTL_RESPONSE *);
70 void
71 process_request(mp, rp)
72 register CTL_MSG *mp;
73 register CTL_RESPONSE *rp;
75 register CTL_MSG *ptr;
76 extern int debug;
77 char *s;
79 rp->vers = TALK_VERSION;
80 rp->type = mp->type;
81 rp->id_num = htonl(0);
82 if (mp->vers != TALK_VERSION) {
83 syslog(LOG_WARNING, "bad protocol version %d", mp->vers);
84 rp->answer = BADVERSION;
85 return;
87 mp->id_num = ntohl(mp->id_num);
88 mp->addr.sa_family = ntohs(mp->addr.sa_family);
89 if (mp->addr.sa_family != AF_INET) {
90 syslog(LOG_WARNING, "bad address, family %d",
91 mp->addr.sa_family);
92 rp->answer = BADADDR;
93 return;
95 mp->ctl_addr.sa_family = ntohs(mp->ctl_addr.sa_family);
96 if (mp->ctl_addr.sa_family != AF_INET) {
97 syslog(LOG_WARNING, "bad control address, family %d",
98 mp->ctl_addr.sa_family);
99 rp->answer = BADCTLADDR;
100 return;
102 for (s = mp->l_name; *s; s++)
103 if (!isprint(*s)) {
104 syslog(LOG_NOTICE, "illegal user name. Aborting");
105 rp->answer = FAILED;
106 return;
108 mp->pid = ntohl(mp->pid);
109 if (debug)
110 print_request("process_request", mp);
111 switch (mp->type) {
113 case ANNOUNCE:
114 do_announce(mp, rp);
115 break;
117 case LEAVE_INVITE:
118 ptr = find_request(mp);
119 if (ptr != (CTL_MSG *)0) {
120 rp->id_num = htonl(ptr->id_num);
121 rp->answer = SUCCESS;
122 } else
123 insert_table(mp, rp);
124 break;
126 case LOOK_UP:
127 ptr = find_match(mp);
128 if (ptr != (CTL_MSG *)0) {
129 rp->id_num = htonl(ptr->id_num);
130 rp->addr = ptr->addr;
131 rp->addr.sa_family = htons(ptr->addr.sa_family);
132 rp->answer = SUCCESS;
133 } else
134 rp->answer = NOT_HERE;
135 break;
137 case DELETE:
138 rp->answer = delete_invite(mp->id_num);
139 break;
141 default:
142 rp->answer = UNKNOWN_REQUEST;
143 break;
145 if (debug)
146 print_response("process_request", rp);
149 void
150 do_announce(mp, rp)
151 register CTL_MSG *mp;
152 CTL_RESPONSE *rp;
154 struct hostent *hp;
155 CTL_MSG *ptr;
156 int result;
158 /* see if the user is logged */
159 result = find_user(mp->r_name, mp->r_tty);
160 if (result != SUCCESS) {
161 rp->answer = result;
162 return;
164 #define satosin(sa) ((struct sockaddr_in *)(sa))
165 hp = gethostbyaddr(&satosin(&mp->ctl_addr)->sin_addr,
166 sizeof (struct in_addr), AF_INET);
167 if (hp == (struct hostent *)0) {
168 rp->answer = MACHINE_UNKNOWN;
169 return;
171 ptr = find_request(mp);
172 if (ptr == (CTL_MSG *) 0) {
173 insert_table(mp, rp);
174 rp->answer = announce(mp, hp->h_name);
175 return;
177 if (mp->id_num > ptr->id_num) {
179 * This is an explicit re-announce, so update the id_num
180 * field to avoid duplicates and re-announce the talk.
182 ptr->id_num = new_id();
183 rp->id_num = htonl(ptr->id_num);
184 rp->answer = announce(mp, hp->h_name);
185 } else {
186 /* a duplicated request, so ignore it */
187 rp->id_num = htonl(ptr->id_num);
188 rp->answer = SUCCESS;
192 #include <utmp.h>
195 * Search utmp for the local user
198 find_user(name, tty)
199 char *name, *tty;
201 struct utmp ubuf;
202 int status;
203 FILE *fd;
204 struct stat statb;
205 time_t best = 0;
206 char line[sizeof(ubuf.ut_line) + 1];
207 char ftty[sizeof(_PATH_DEV) - 1 + sizeof(line)];
209 if ((fd = fopen(_PATH_UTMP, "r")) == NULL) {
210 warnx("can't read %s", _PATH_UTMP);
211 return (FAILED);
213 #define SCMPN(a, b) strncmp(a, b, sizeof (a))
214 status = NOT_HERE;
215 (void) strcpy(ftty, _PATH_DEV);
216 while (fread((char *) &ubuf, sizeof ubuf, 1, fd) == 1)
217 if (SCMPN(ubuf.ut_name, name) == 0) {
218 strncpy(line, ubuf.ut_line, sizeof(ubuf.ut_line));
219 line[sizeof(ubuf.ut_line)] = '\0';
220 if (*tty == '\0' || best != 0) {
221 if (best == 0)
222 status = PERMISSION_DENIED;
223 /* no particular tty was requested */
224 (void) strcpy(ftty + sizeof(_PATH_DEV) - 1,
225 line);
226 if (stat(ftty, &statb) == 0) {
227 if (!(statb.st_mode & 020))
228 continue;
229 if (statb.st_atime > best) {
230 best = statb.st_atime;
231 (void) strcpy(tty, line);
232 status = SUCCESS;
233 continue;
237 if (strcmp(line, tty) == 0) {
238 status = SUCCESS;
239 break;
242 fclose(fd);
243 return (status);