xref: /csrg-svn/libexec/talkd/process.c (revision 34360)
122774Smckusick /*
222774Smckusick  * Copyright (c) 1983 Regents of the University of California.
3*34360Sbostic  * All rights reserved.
4*34360Sbostic  *
5*34360Sbostic  * Redistribution and use in source and binary forms are permitted
6*34360Sbostic  * provided that this notice is preserved and that due credit is given
7*34360Sbostic  * to the University of California at Berkeley. The name of the University
8*34360Sbostic  * may not be used to endorse or promote products derived from this
9*34360Sbostic  * software without specific prior written permission. This software
10*34360Sbostic  * is provided ``as is'' without express or implied warranty.
1122774Smckusick  */
1222774Smckusick 
1316365Skarels #ifndef lint
14*34360Sbostic static char sccsid[] = "@(#)process.c	5.5 (Berkeley) 05/20/88";
15*34360Sbostic #endif /* not lint */
1616355Skarels 
1716365Skarels /*
1816365Skarels  * process.c handles the requests, which can be of three types:
1916365Skarels  *	ANNOUNCE - announce to a user that a talk is wanted
2016365Skarels  *	LEAVE_INVITE - insert the request into the table
2116365Skarels  *	LOOK_UP - look up to see if a request is waiting in
2216365Skarels  *		  in the table for the local user
2316365Skarels  *	DELETE - delete invitation
2416365Skarels  */
2526839Smckusick #include <sys/types.h>
2617560Sbloom #include <sys/stat.h>
2723462Sbloom #include <stdio.h>
2826839Smckusick #include <syslog.h>
2926839Smckusick #include <netdb.h>
3026839Smckusick #include <netinet/in.h>
3116355Skarels 
3226839Smckusick #include <protocols/talkd.h>
3326839Smckusick 
3426839Smckusick char	*strcpy();
3516355Skarels CTL_MSG *find_request();
3616355Skarels CTL_MSG *find_match();
3716355Skarels 
3826839Smckusick process_request(mp, rp)
3926839Smckusick 	register CTL_MSG *mp;
4026839Smckusick 	register CTL_RESPONSE *rp;
4116355Skarels {
4226839Smckusick 	register CTL_MSG *ptr;
4326839Smckusick 	extern int debug;
4416355Skarels 
4526839Smckusick 	rp->vers = TALK_VERSION;
4626839Smckusick 	rp->type = mp->type;
4726839Smckusick 	rp->id_num = htonl(0);
4826839Smckusick 	if (mp->vers != TALK_VERSION) {
4926839Smckusick 		syslog(LOG_WARNING, "Bad protocol version %d", mp->vers);
5026839Smckusick 		rp->answer = BADVERSION;
5126839Smckusick 		return;
5226839Smckusick 	}
5326839Smckusick 	mp->id_num = ntohl(mp->id_num);
5426839Smckusick 	mp->addr.sa_family = ntohs(mp->addr.sa_family);
5526839Smckusick 	if (mp->addr.sa_family != AF_INET) {
5626839Smckusick 		syslog(LOG_WARNING, "Bad address, family %d",
5726839Smckusick 		    mp->addr.sa_family);
5826839Smckusick 		rp->answer = BADADDR;
5926839Smckusick 		return;
6026839Smckusick 	}
6126839Smckusick 	mp->ctl_addr.sa_family = ntohs(mp->ctl_addr.sa_family);
6226839Smckusick 	if (mp->ctl_addr.sa_family != AF_INET) {
6326839Smckusick 		syslog(LOG_WARNING, "Bad control address, family %d",
6426839Smckusick 		    mp->ctl_addr.sa_family);
6526839Smckusick 		rp->answer = BADCTLADDR;
6626839Smckusick 		return;
6726839Smckusick 	}
6826839Smckusick 	mp->pid = ntohl(mp->pid);
6926839Smckusick 	if (debug)
7026839Smckusick 		print_request("process_request", mp);
7126839Smckusick 	switch (mp->type) {
7216355Skarels 
7326839Smckusick 	case ANNOUNCE:
7426839Smckusick 		do_announce(mp, rp);
7516365Skarels 		break;
7616355Skarels 
7726839Smckusick 	case LEAVE_INVITE:
7826839Smckusick 		ptr = find_request(mp);
7926839Smckusick 		if (ptr != (CTL_MSG *)0) {
8026839Smckusick 			rp->id_num = htonl(ptr->id_num);
8126839Smckusick 			rp->answer = SUCCESS;
8216365Skarels 		} else
8326839Smckusick 			insert_table(mp, rp);
8416365Skarels 		break;
8516355Skarels 
8626839Smckusick 	case LOOK_UP:
8726839Smckusick 		ptr = find_match(mp);
8826839Smckusick 		if (ptr != (CTL_MSG *)0) {
8926839Smckusick 			rp->id_num = htonl(ptr->id_num);
9026839Smckusick 			rp->addr = ptr->addr;
9126839Smckusick 			rp->addr.sa_family = htons(ptr->addr.sa_family);
9226839Smckusick 			rp->answer = SUCCESS;
9316365Skarels 		} else
9426839Smckusick 			rp->answer = NOT_HERE;
9516365Skarels 		break;
9616355Skarels 
9726839Smckusick 	case DELETE:
9826839Smckusick 		rp->answer = delete_invite(mp->id_num);
9916365Skarels 		break;
10016355Skarels 
10126839Smckusick 	default:
10226839Smckusick 		rp->answer = UNKNOWN_REQUEST;
10316365Skarels 		break;
10416365Skarels 	}
10526839Smckusick 	if (debug)
10626839Smckusick 		print_response("process_request", rp);
10716355Skarels }
10816355Skarels 
10926839Smckusick do_announce(mp, rp)
11026839Smckusick 	register CTL_MSG *mp;
11126839Smckusick 	CTL_RESPONSE *rp;
11216355Skarels {
11316365Skarels 	struct hostent *hp;
11416365Skarels 	CTL_MSG *ptr;
11516365Skarels 	int result;
11616355Skarels 
11716355Skarels 	/* see if the user is logged */
11826839Smckusick 	result = find_user(mp->r_name, mp->r_tty);
11916365Skarels 	if (result != SUCCESS) {
12026839Smckusick 		rp->answer = result;
12116365Skarels 		return;
12216365Skarels 	}
12326839Smckusick #define	satosin(sa)	((struct sockaddr_in *)(sa))
12426839Smckusick 	hp = gethostbyaddr(&satosin(&mp->ctl_addr)->sin_addr,
12526839Smckusick 		sizeof (struct in_addr), AF_INET);
12616365Skarels 	if (hp == (struct hostent *)0) {
12726839Smckusick 		rp->answer = MACHINE_UNKNOWN;
12816365Skarels 		return;
12916365Skarels 	}
13026839Smckusick 	ptr = find_request(mp);
13116365Skarels 	if (ptr == (CTL_MSG *) 0) {
13226839Smckusick 		insert_table(mp, rp);
13326839Smckusick 		rp->answer = announce(mp, hp->h_name);
13416365Skarels 		return;
13516365Skarels 	}
13626839Smckusick 	if (mp->id_num > ptr->id_num) {
13716365Skarels 		/*
13826839Smckusick 		 * This is an explicit re-announce, so update the id_num
13926839Smckusick 		 * field to avoid duplicates and re-announce the talk.
14016365Skarels 		 */
14126839Smckusick 		ptr->id_num = new_id();
14226839Smckusick 		rp->id_num = htonl(ptr->id_num);
14326839Smckusick 		rp->answer = announce(mp, hp->h_name);
14426839Smckusick 	} else {
14526839Smckusick 		/* a duplicated request, so ignore it */
14626839Smckusick 		rp->id_num = htonl(ptr->id_num);
14726839Smckusick 		rp->answer = SUCCESS;
14816365Skarels 	}
14916355Skarels }
15016355Skarels 
15116355Skarels #include <utmp.h>
15216355Skarels 
15316355Skarels /*
15416355Skarels  * Search utmp for the local user
15516355Skarels  */
15616355Skarels find_user(name, tty)
15726839Smckusick 	char *name, *tty;
15816355Skarels {
15916365Skarels 	struct utmp ubuf;
16023462Sbloom 	int status;
16123462Sbloom 	FILE *fd;
16217560Sbloom 	struct stat statb;
16317560Sbloom 	char ftty[20];
16416355Skarels 
16523462Sbloom 	if ((fd = fopen("/etc/utmp", "r")) == NULL) {
16616365Skarels 		perror("Can't open /etc/utmp");
16716365Skarels 		return (FAILED);
16816355Skarels 	}
16916365Skarels #define SCMPN(a, b)	strncmp(a, b, sizeof (a))
17016365Skarels 	status = NOT_HERE;
17117560Sbloom 	(void) strcpy(ftty, "/dev/");
17223462Sbloom 	while (fread((char *) &ubuf, sizeof ubuf, 1, fd) == 1)
17316365Skarels 		if (SCMPN(ubuf.ut_name, name) == 0) {
17416365Skarels 			if (*tty == '\0') {
17517560Sbloom 				status = PERMISSION_DENIED;
17616365Skarels 				/* no particular tty was requested */
17717560Sbloom 				(void) strcpy(ftty+5, ubuf.ut_line);
17817560Sbloom 				if (stat(ftty,&statb) == 0) {
17926854Smckusick 					if (!(statb.st_mode & 020))
18017560Sbloom 						continue;
18117560Sbloom 					(void) strcpy(tty, ubuf.ut_line);
18217560Sbloom 					status = SUCCESS;
18317560Sbloom 					break;
18417560Sbloom 				}
18516365Skarels 			}
18616365Skarels 			if (strcmp(ubuf.ut_line, tty) == 0) {
18716365Skarels 				status = SUCCESS;
18816365Skarels 				break;
18916365Skarels 			}
19016365Skarels 		}
19123462Sbloom 	fclose(fd);
19216365Skarels 	return (status);
19316355Skarels }
194