122774Smckusick /* 222774Smckusick * Copyright (c) 1983 Regents of the University of California. 3*34360Sbostic * All rights reserved. 4*34360Sbostic * 5*34360Sbostic * Redistribution and use in source and binary forms are permitted 6*34360Sbostic * provided that this notice is preserved and that due credit is given 7*34360Sbostic * to the University of California at Berkeley. The name of the University 8*34360Sbostic * may not be used to endorse or promote products derived from this 9*34360Sbostic * software without specific prior written permission. This software 10*34360Sbostic * is provided ``as is'' without express or implied warranty. 1122774Smckusick */ 1222774Smckusick 1316365Skarels #ifndef lint 14*34360Sbostic static char sccsid[] = "@(#)process.c 5.5 (Berkeley) 05/20/88"; 15*34360Sbostic #endif /* not lint */ 1616355Skarels 1716365Skarels /* 1816365Skarels * process.c handles the requests, which can be of three types: 1916365Skarels * ANNOUNCE - announce to a user that a talk is wanted 2016365Skarels * LEAVE_INVITE - insert the request into the table 2116365Skarels * LOOK_UP - look up to see if a request is waiting in 2216365Skarels * in the table for the local user 2316365Skarels * DELETE - delete invitation 2416365Skarels */ 2526839Smckusick #include <sys/types.h> 2617560Sbloom #include <sys/stat.h> 2723462Sbloom #include <stdio.h> 2826839Smckusick #include <syslog.h> 2926839Smckusick #include <netdb.h> 3026839Smckusick #include <netinet/in.h> 3116355Skarels 3226839Smckusick #include <protocols/talkd.h> 3326839Smckusick 3426839Smckusick char *strcpy(); 3516355Skarels CTL_MSG *find_request(); 3616355Skarels CTL_MSG *find_match(); 3716355Skarels 3826839Smckusick process_request(mp, rp) 3926839Smckusick register CTL_MSG *mp; 4026839Smckusick register CTL_RESPONSE *rp; 4116355Skarels { 4226839Smckusick register CTL_MSG *ptr; 4326839Smckusick extern int debug; 4416355Skarels 4526839Smckusick rp->vers = TALK_VERSION; 4626839Smckusick rp->type = mp->type; 4726839Smckusick rp->id_num = htonl(0); 4826839Smckusick if (mp->vers != TALK_VERSION) { 4926839Smckusick syslog(LOG_WARNING, "Bad protocol version %d", mp->vers); 5026839Smckusick rp->answer = BADVERSION; 5126839Smckusick return; 5226839Smckusick } 5326839Smckusick mp->id_num = ntohl(mp->id_num); 5426839Smckusick mp->addr.sa_family = ntohs(mp->addr.sa_family); 5526839Smckusick if (mp->addr.sa_family != AF_INET) { 5626839Smckusick syslog(LOG_WARNING, "Bad address, family %d", 5726839Smckusick mp->addr.sa_family); 5826839Smckusick rp->answer = BADADDR; 5926839Smckusick return; 6026839Smckusick } 6126839Smckusick mp->ctl_addr.sa_family = ntohs(mp->ctl_addr.sa_family); 6226839Smckusick if (mp->ctl_addr.sa_family != AF_INET) { 6326839Smckusick syslog(LOG_WARNING, "Bad control address, family %d", 6426839Smckusick mp->ctl_addr.sa_family); 6526839Smckusick rp->answer = BADCTLADDR; 6626839Smckusick return; 6726839Smckusick } 6826839Smckusick mp->pid = ntohl(mp->pid); 6926839Smckusick if (debug) 7026839Smckusick print_request("process_request", mp); 7126839Smckusick switch (mp->type) { 7216355Skarels 7326839Smckusick case ANNOUNCE: 7426839Smckusick do_announce(mp, rp); 7516365Skarels break; 7616355Skarels 7726839Smckusick case LEAVE_INVITE: 7826839Smckusick ptr = find_request(mp); 7926839Smckusick if (ptr != (CTL_MSG *)0) { 8026839Smckusick rp->id_num = htonl(ptr->id_num); 8126839Smckusick rp->answer = SUCCESS; 8216365Skarels } else 8326839Smckusick insert_table(mp, rp); 8416365Skarels break; 8516355Skarels 8626839Smckusick case LOOK_UP: 8726839Smckusick ptr = find_match(mp); 8826839Smckusick if (ptr != (CTL_MSG *)0) { 8926839Smckusick rp->id_num = htonl(ptr->id_num); 9026839Smckusick rp->addr = ptr->addr; 9126839Smckusick rp->addr.sa_family = htons(ptr->addr.sa_family); 9226839Smckusick rp->answer = SUCCESS; 9316365Skarels } else 9426839Smckusick rp->answer = NOT_HERE; 9516365Skarels break; 9616355Skarels 9726839Smckusick case DELETE: 9826839Smckusick rp->answer = delete_invite(mp->id_num); 9916365Skarels break; 10016355Skarels 10126839Smckusick default: 10226839Smckusick rp->answer = UNKNOWN_REQUEST; 10316365Skarels break; 10416365Skarels } 10526839Smckusick if (debug) 10626839Smckusick print_response("process_request", rp); 10716355Skarels } 10816355Skarels 10926839Smckusick do_announce(mp, rp) 11026839Smckusick register CTL_MSG *mp; 11126839Smckusick CTL_RESPONSE *rp; 11216355Skarels { 11316365Skarels struct hostent *hp; 11416365Skarels CTL_MSG *ptr; 11516365Skarels int result; 11616355Skarels 11716355Skarels /* see if the user is logged */ 11826839Smckusick result = find_user(mp->r_name, mp->r_tty); 11916365Skarels if (result != SUCCESS) { 12026839Smckusick rp->answer = result; 12116365Skarels return; 12216365Skarels } 12326839Smckusick #define satosin(sa) ((struct sockaddr_in *)(sa)) 12426839Smckusick hp = gethostbyaddr(&satosin(&mp->ctl_addr)->sin_addr, 12526839Smckusick sizeof (struct in_addr), AF_INET); 12616365Skarels if (hp == (struct hostent *)0) { 12726839Smckusick rp->answer = MACHINE_UNKNOWN; 12816365Skarels return; 12916365Skarels } 13026839Smckusick ptr = find_request(mp); 13116365Skarels if (ptr == (CTL_MSG *) 0) { 13226839Smckusick insert_table(mp, rp); 13326839Smckusick rp->answer = announce(mp, hp->h_name); 13416365Skarels return; 13516365Skarels } 13626839Smckusick if (mp->id_num > ptr->id_num) { 13716365Skarels /* 13826839Smckusick * This is an explicit re-announce, so update the id_num 13926839Smckusick * field to avoid duplicates and re-announce the talk. 14016365Skarels */ 14126839Smckusick ptr->id_num = new_id(); 14226839Smckusick rp->id_num = htonl(ptr->id_num); 14326839Smckusick rp->answer = announce(mp, hp->h_name); 14426839Smckusick } else { 14526839Smckusick /* a duplicated request, so ignore it */ 14626839Smckusick rp->id_num = htonl(ptr->id_num); 14726839Smckusick rp->answer = SUCCESS; 14816365Skarels } 14916355Skarels } 15016355Skarels 15116355Skarels #include <utmp.h> 15216355Skarels 15316355Skarels /* 15416355Skarels * Search utmp for the local user 15516355Skarels */ 15616355Skarels find_user(name, tty) 15726839Smckusick char *name, *tty; 15816355Skarels { 15916365Skarels struct utmp ubuf; 16023462Sbloom int status; 16123462Sbloom FILE *fd; 16217560Sbloom struct stat statb; 16317560Sbloom char ftty[20]; 16416355Skarels 16523462Sbloom if ((fd = fopen("/etc/utmp", "r")) == NULL) { 16616365Skarels perror("Can't open /etc/utmp"); 16716365Skarels return (FAILED); 16816355Skarels } 16916365Skarels #define SCMPN(a, b) strncmp(a, b, sizeof (a)) 17016365Skarels status = NOT_HERE; 17117560Sbloom (void) strcpy(ftty, "/dev/"); 17223462Sbloom while (fread((char *) &ubuf, sizeof ubuf, 1, fd) == 1) 17316365Skarels if (SCMPN(ubuf.ut_name, name) == 0) { 17416365Skarels if (*tty == '\0') { 17517560Sbloom status = PERMISSION_DENIED; 17616365Skarels /* no particular tty was requested */ 17717560Sbloom (void) strcpy(ftty+5, ubuf.ut_line); 17817560Sbloom if (stat(ftty,&statb) == 0) { 17926854Smckusick if (!(statb.st_mode & 020)) 18017560Sbloom continue; 18117560Sbloom (void) strcpy(tty, ubuf.ut_line); 18217560Sbloom status = SUCCESS; 18317560Sbloom break; 18417560Sbloom } 18516365Skarels } 18616365Skarels if (strcmp(ubuf.ut_line, tty) == 0) { 18716365Skarels status = SUCCESS; 18816365Skarels break; 18916365Skarels } 19016365Skarels } 19123462Sbloom fclose(fd); 19216365Skarels return (status); 19316355Skarels } 194