xref: /csrg-svn/libexec/talkd/process.c (revision 37303)
122774Smckusick /*
222774Smckusick  * Copyright (c) 1983 Regents of the University of California.
334360Sbostic  * All rights reserved.
434360Sbostic  *
534360Sbostic  * Redistribution and use in source and binary forms are permitted
634776Sbostic  * provided that the above copyright notice and this paragraph are
734776Sbostic  * duplicated in all such forms and that any documentation,
834776Sbostic  * advertising materials, and other materials related to such
934776Sbostic  * distribution and use acknowledge that the software was developed
1034776Sbostic  * by the University of California, Berkeley.  The name of the
1134776Sbostic  * University may not be used to endorse or promote products derived
1234776Sbostic  * from this software without specific prior written permission.
1334776Sbostic  * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
1434776Sbostic  * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
1534776Sbostic  * WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
1622774Smckusick  */
1722774Smckusick 
1816365Skarels #ifndef lint
19*37303Sbostic static char sccsid[] = "@(#)process.c	5.7 (Berkeley) 04/02/89";
2034360Sbostic #endif /* not lint */
2116355Skarels 
2216365Skarels /*
2316365Skarels  * process.c handles the requests, which can be of three types:
2416365Skarels  *	ANNOUNCE - announce to a user that a talk is wanted
2516365Skarels  *	LEAVE_INVITE - insert the request into the table
2616365Skarels  *	LOOK_UP - look up to see if a request is waiting in
2716365Skarels  *		  in the table for the local user
2816365Skarels  *	DELETE - delete invitation
2916365Skarels  */
3026839Smckusick #include <sys/types.h>
3117560Sbloom #include <sys/stat.h>
3223462Sbloom #include <stdio.h>
3326839Smckusick #include <syslog.h>
3426839Smckusick #include <netdb.h>
3526839Smckusick #include <netinet/in.h>
3616355Skarels 
3726839Smckusick #include <protocols/talkd.h>
3826839Smckusick 
3926839Smckusick char	*strcpy();
4016355Skarels CTL_MSG *find_request();
4116355Skarels CTL_MSG *find_match();
4216355Skarels 
4326839Smckusick process_request(mp, rp)
4426839Smckusick 	register CTL_MSG *mp;
4526839Smckusick 	register CTL_RESPONSE *rp;
4616355Skarels {
4726839Smckusick 	register CTL_MSG *ptr;
4826839Smckusick 	extern int debug;
4916355Skarels 
5026839Smckusick 	rp->vers = TALK_VERSION;
5126839Smckusick 	rp->type = mp->type;
5226839Smckusick 	rp->id_num = htonl(0);
5326839Smckusick 	if (mp->vers != TALK_VERSION) {
5426839Smckusick 		syslog(LOG_WARNING, "Bad protocol version %d", mp->vers);
5526839Smckusick 		rp->answer = BADVERSION;
5626839Smckusick 		return;
5726839Smckusick 	}
5826839Smckusick 	mp->id_num = ntohl(mp->id_num);
5926839Smckusick 	mp->addr.sa_family = ntohs(mp->addr.sa_family);
6026839Smckusick 	if (mp->addr.sa_family != AF_INET) {
6126839Smckusick 		syslog(LOG_WARNING, "Bad address, family %d",
6226839Smckusick 		    mp->addr.sa_family);
6326839Smckusick 		rp->answer = BADADDR;
6426839Smckusick 		return;
6526839Smckusick 	}
6626839Smckusick 	mp->ctl_addr.sa_family = ntohs(mp->ctl_addr.sa_family);
6726839Smckusick 	if (mp->ctl_addr.sa_family != AF_INET) {
6826839Smckusick 		syslog(LOG_WARNING, "Bad control address, family %d",
6926839Smckusick 		    mp->ctl_addr.sa_family);
7026839Smckusick 		rp->answer = BADCTLADDR;
7126839Smckusick 		return;
7226839Smckusick 	}
7326839Smckusick 	mp->pid = ntohl(mp->pid);
7426839Smckusick 	if (debug)
7526839Smckusick 		print_request("process_request", mp);
7626839Smckusick 	switch (mp->type) {
7716355Skarels 
7826839Smckusick 	case ANNOUNCE:
7926839Smckusick 		do_announce(mp, rp);
8016365Skarels 		break;
8116355Skarels 
8226839Smckusick 	case LEAVE_INVITE:
8326839Smckusick 		ptr = find_request(mp);
8426839Smckusick 		if (ptr != (CTL_MSG *)0) {
8526839Smckusick 			rp->id_num = htonl(ptr->id_num);
8626839Smckusick 			rp->answer = SUCCESS;
8716365Skarels 		} else
8826839Smckusick 			insert_table(mp, rp);
8916365Skarels 		break;
9016355Skarels 
9126839Smckusick 	case LOOK_UP:
9226839Smckusick 		ptr = find_match(mp);
9326839Smckusick 		if (ptr != (CTL_MSG *)0) {
9426839Smckusick 			rp->id_num = htonl(ptr->id_num);
9526839Smckusick 			rp->addr = ptr->addr;
9626839Smckusick 			rp->addr.sa_family = htons(ptr->addr.sa_family);
9726839Smckusick 			rp->answer = SUCCESS;
9816365Skarels 		} else
9926839Smckusick 			rp->answer = NOT_HERE;
10016365Skarels 		break;
10116355Skarels 
10226839Smckusick 	case DELETE:
10326839Smckusick 		rp->answer = delete_invite(mp->id_num);
10416365Skarels 		break;
10516355Skarels 
10626839Smckusick 	default:
10726839Smckusick 		rp->answer = UNKNOWN_REQUEST;
10816365Skarels 		break;
10916365Skarels 	}
11026839Smckusick 	if (debug)
11126839Smckusick 		print_response("process_request", rp);
11216355Skarels }
11316355Skarels 
11426839Smckusick do_announce(mp, rp)
11526839Smckusick 	register CTL_MSG *mp;
11626839Smckusick 	CTL_RESPONSE *rp;
11716355Skarels {
11816365Skarels 	struct hostent *hp;
11916365Skarels 	CTL_MSG *ptr;
12016365Skarels 	int result;
12116355Skarels 
12216355Skarels 	/* see if the user is logged */
12326839Smckusick 	result = find_user(mp->r_name, mp->r_tty);
12416365Skarels 	if (result != SUCCESS) {
12526839Smckusick 		rp->answer = result;
12616365Skarels 		return;
12716365Skarels 	}
12826839Smckusick #define	satosin(sa)	((struct sockaddr_in *)(sa))
12926839Smckusick 	hp = gethostbyaddr(&satosin(&mp->ctl_addr)->sin_addr,
13026839Smckusick 		sizeof (struct in_addr), AF_INET);
13116365Skarels 	if (hp == (struct hostent *)0) {
13226839Smckusick 		rp->answer = MACHINE_UNKNOWN;
13316365Skarels 		return;
13416365Skarels 	}
13526839Smckusick 	ptr = find_request(mp);
13616365Skarels 	if (ptr == (CTL_MSG *) 0) {
13726839Smckusick 		insert_table(mp, rp);
13826839Smckusick 		rp->answer = announce(mp, hp->h_name);
13916365Skarels 		return;
14016365Skarels 	}
14126839Smckusick 	if (mp->id_num > ptr->id_num) {
14216365Skarels 		/*
14326839Smckusick 		 * This is an explicit re-announce, so update the id_num
14426839Smckusick 		 * field to avoid duplicates and re-announce the talk.
14516365Skarels 		 */
14626839Smckusick 		ptr->id_num = new_id();
14726839Smckusick 		rp->id_num = htonl(ptr->id_num);
14826839Smckusick 		rp->answer = announce(mp, hp->h_name);
14926839Smckusick 	} else {
15026839Smckusick 		/* a duplicated request, so ignore it */
15126839Smckusick 		rp->id_num = htonl(ptr->id_num);
15226839Smckusick 		rp->answer = SUCCESS;
15316365Skarels 	}
15416355Skarels }
15516355Skarels 
15616355Skarels #include <utmp.h>
15716355Skarels 
15816355Skarels /*
15916355Skarels  * Search utmp for the local user
16016355Skarels  */
16116355Skarels find_user(name, tty)
16226839Smckusick 	char *name, *tty;
16316355Skarels {
16416365Skarels 	struct utmp ubuf;
16523462Sbloom 	int status;
16623462Sbloom 	FILE *fd;
16717560Sbloom 	struct stat statb;
16817560Sbloom 	char ftty[20];
16916355Skarels 
170*37303Sbostic 	if ((fd = fopen(_PATH_UTMP, "r")) == NULL) {
171*37303Sbostic 		fprintf(stderr, "talkd: can't read %s.\n", _PATH_UTMP);
17216365Skarels 		return (FAILED);
17316355Skarels 	}
17416365Skarels #define SCMPN(a, b)	strncmp(a, b, sizeof (a))
17516365Skarels 	status = NOT_HERE;
17617560Sbloom 	(void) strcpy(ftty, "/dev/");
17723462Sbloom 	while (fread((char *) &ubuf, sizeof ubuf, 1, fd) == 1)
17816365Skarels 		if (SCMPN(ubuf.ut_name, name) == 0) {
17916365Skarels 			if (*tty == '\0') {
18017560Sbloom 				status = PERMISSION_DENIED;
18116365Skarels 				/* no particular tty was requested */
18217560Sbloom 				(void) strcpy(ftty+5, ubuf.ut_line);
18317560Sbloom 				if (stat(ftty,&statb) == 0) {
18426854Smckusick 					if (!(statb.st_mode & 020))
18517560Sbloom 						continue;
18617560Sbloom 					(void) strcpy(tty, ubuf.ut_line);
18717560Sbloom 					status = SUCCESS;
18817560Sbloom 					break;
18917560Sbloom 				}
19016365Skarels 			}
19116365Skarels 			if (strcmp(ubuf.ut_line, tty) == 0) {
19216365Skarels 				status = SUCCESS;
19316365Skarels 				break;
19416365Skarels 			}
19516365Skarels 		}
19623462Sbloom 	fclose(fd);
19716365Skarels 	return (status);
19816355Skarels }
199