122774Smckusick /* 222774Smckusick * Copyright (c) 1983 Regents of the University of California. 334360Sbostic * All rights reserved. 434360Sbostic * 534360Sbostic * Redistribution and use in source and binary forms are permitted 634776Sbostic * provided that the above copyright notice and this paragraph are 734776Sbostic * duplicated in all such forms and that any documentation, 834776Sbostic * advertising materials, and other materials related to such 934776Sbostic * distribution and use acknowledge that the software was developed 1034776Sbostic * by the University of California, Berkeley. The name of the 1134776Sbostic * University may not be used to endorse or promote products derived 1234776Sbostic * from this software without specific prior written permission. 1334776Sbostic * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR 1434776Sbostic * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED 1534776Sbostic * WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE. 1622774Smckusick */ 1722774Smckusick 1816365Skarels #ifndef lint 19*37991Sbostic static char sccsid[] = "@(#)process.c 5.8 (Berkeley) 05/11/89"; 2034360Sbostic #endif /* not lint */ 2116355Skarels 2216365Skarels /* 2316365Skarels * process.c handles the requests, which can be of three types: 2416365Skarels * ANNOUNCE - announce to a user that a talk is wanted 2516365Skarels * LEAVE_INVITE - insert the request into the table 2616365Skarels * LOOK_UP - look up to see if a request is waiting in 2716365Skarels * in the table for the local user 2816365Skarels * DELETE - delete invitation 2916365Skarels */ 3026839Smckusick #include <sys/types.h> 3117560Sbloom #include <sys/stat.h> 3223462Sbloom #include <stdio.h> 3326839Smckusick #include <syslog.h> 3426839Smckusick #include <netdb.h> 3526839Smckusick #include <netinet/in.h> 3616355Skarels 3726839Smckusick #include <protocols/talkd.h> 38*37991Sbostic #include <paths.h> 3926839Smckusick 4026839Smckusick char *strcpy(); 4116355Skarels CTL_MSG *find_request(); 4216355Skarels CTL_MSG *find_match(); 4316355Skarels 4426839Smckusick process_request(mp, rp) 4526839Smckusick register CTL_MSG *mp; 4626839Smckusick register CTL_RESPONSE *rp; 4716355Skarels { 4826839Smckusick register CTL_MSG *ptr; 4926839Smckusick extern int debug; 5016355Skarels 5126839Smckusick rp->vers = TALK_VERSION; 5226839Smckusick rp->type = mp->type; 5326839Smckusick rp->id_num = htonl(0); 5426839Smckusick if (mp->vers != TALK_VERSION) { 5526839Smckusick syslog(LOG_WARNING, "Bad protocol version %d", mp->vers); 5626839Smckusick rp->answer = BADVERSION; 5726839Smckusick return; 5826839Smckusick } 5926839Smckusick mp->id_num = ntohl(mp->id_num); 6026839Smckusick mp->addr.sa_family = ntohs(mp->addr.sa_family); 6126839Smckusick if (mp->addr.sa_family != AF_INET) { 6226839Smckusick syslog(LOG_WARNING, "Bad address, family %d", 6326839Smckusick mp->addr.sa_family); 6426839Smckusick rp->answer = BADADDR; 6526839Smckusick return; 6626839Smckusick } 6726839Smckusick mp->ctl_addr.sa_family = ntohs(mp->ctl_addr.sa_family); 6826839Smckusick if (mp->ctl_addr.sa_family != AF_INET) { 6926839Smckusick syslog(LOG_WARNING, "Bad control address, family %d", 7026839Smckusick mp->ctl_addr.sa_family); 7126839Smckusick rp->answer = BADCTLADDR; 7226839Smckusick return; 7326839Smckusick } 7426839Smckusick mp->pid = ntohl(mp->pid); 7526839Smckusick if (debug) 7626839Smckusick print_request("process_request", mp); 7726839Smckusick switch (mp->type) { 7816355Skarels 7926839Smckusick case ANNOUNCE: 8026839Smckusick do_announce(mp, rp); 8116365Skarels break; 8216355Skarels 8326839Smckusick case LEAVE_INVITE: 8426839Smckusick ptr = find_request(mp); 8526839Smckusick if (ptr != (CTL_MSG *)0) { 8626839Smckusick rp->id_num = htonl(ptr->id_num); 8726839Smckusick rp->answer = SUCCESS; 8816365Skarels } else 8926839Smckusick insert_table(mp, rp); 9016365Skarels break; 9116355Skarels 9226839Smckusick case LOOK_UP: 9326839Smckusick ptr = find_match(mp); 9426839Smckusick if (ptr != (CTL_MSG *)0) { 9526839Smckusick rp->id_num = htonl(ptr->id_num); 9626839Smckusick rp->addr = ptr->addr; 9726839Smckusick rp->addr.sa_family = htons(ptr->addr.sa_family); 9826839Smckusick rp->answer = SUCCESS; 9916365Skarels } else 10026839Smckusick rp->answer = NOT_HERE; 10116365Skarels break; 10216355Skarels 10326839Smckusick case DELETE: 10426839Smckusick rp->answer = delete_invite(mp->id_num); 10516365Skarels break; 10616355Skarels 10726839Smckusick default: 10826839Smckusick rp->answer = UNKNOWN_REQUEST; 10916365Skarels break; 11016365Skarels } 11126839Smckusick if (debug) 11226839Smckusick print_response("process_request", rp); 11316355Skarels } 11416355Skarels 11526839Smckusick do_announce(mp, rp) 11626839Smckusick register CTL_MSG *mp; 11726839Smckusick CTL_RESPONSE *rp; 11816355Skarels { 11916365Skarels struct hostent *hp; 12016365Skarels CTL_MSG *ptr; 12116365Skarels int result; 12216355Skarels 12316355Skarels /* see if the user is logged */ 12426839Smckusick result = find_user(mp->r_name, mp->r_tty); 12516365Skarels if (result != SUCCESS) { 12626839Smckusick rp->answer = result; 12716365Skarels return; 12816365Skarels } 12926839Smckusick #define satosin(sa) ((struct sockaddr_in *)(sa)) 13026839Smckusick hp = gethostbyaddr(&satosin(&mp->ctl_addr)->sin_addr, 13126839Smckusick sizeof (struct in_addr), AF_INET); 13216365Skarels if (hp == (struct hostent *)0) { 13326839Smckusick rp->answer = MACHINE_UNKNOWN; 13416365Skarels return; 13516365Skarels } 13626839Smckusick ptr = find_request(mp); 13716365Skarels if (ptr == (CTL_MSG *) 0) { 13826839Smckusick insert_table(mp, rp); 13926839Smckusick rp->answer = announce(mp, hp->h_name); 14016365Skarels return; 14116365Skarels } 14226839Smckusick if (mp->id_num > ptr->id_num) { 14316365Skarels /* 14426839Smckusick * This is an explicit re-announce, so update the id_num 14526839Smckusick * field to avoid duplicates and re-announce the talk. 14616365Skarels */ 14726839Smckusick ptr->id_num = new_id(); 14826839Smckusick rp->id_num = htonl(ptr->id_num); 14926839Smckusick rp->answer = announce(mp, hp->h_name); 15026839Smckusick } else { 15126839Smckusick /* a duplicated request, so ignore it */ 15226839Smckusick rp->id_num = htonl(ptr->id_num); 15326839Smckusick rp->answer = SUCCESS; 15416365Skarels } 15516355Skarels } 15616355Skarels 15716355Skarels #include <utmp.h> 15816355Skarels 15916355Skarels /* 16016355Skarels * Search utmp for the local user 16116355Skarels */ 16216355Skarels find_user(name, tty) 16326839Smckusick char *name, *tty; 16416355Skarels { 16516365Skarels struct utmp ubuf; 16623462Sbloom int status; 16723462Sbloom FILE *fd; 16817560Sbloom struct stat statb; 16917560Sbloom char ftty[20]; 17016355Skarels 17137303Sbostic if ((fd = fopen(_PATH_UTMP, "r")) == NULL) { 17237303Sbostic fprintf(stderr, "talkd: can't read %s.\n", _PATH_UTMP); 17316365Skarels return (FAILED); 17416355Skarels } 17516365Skarels #define SCMPN(a, b) strncmp(a, b, sizeof (a)) 17616365Skarels status = NOT_HERE; 177*37991Sbostic (void) strcpy(ftty, _PATH_DEV); 17823462Sbloom while (fread((char *) &ubuf, sizeof ubuf, 1, fd) == 1) 17916365Skarels if (SCMPN(ubuf.ut_name, name) == 0) { 18016365Skarels if (*tty == '\0') { 18117560Sbloom status = PERMISSION_DENIED; 18216365Skarels /* no particular tty was requested */ 18317560Sbloom (void) strcpy(ftty+5, ubuf.ut_line); 18417560Sbloom if (stat(ftty,&statb) == 0) { 18526854Smckusick if (!(statb.st_mode & 020)) 18617560Sbloom continue; 18717560Sbloom (void) strcpy(tty, ubuf.ut_line); 18817560Sbloom status = SUCCESS; 18917560Sbloom break; 19017560Sbloom } 19116365Skarels } 19216365Skarels if (strcmp(ubuf.ut_line, tty) == 0) { 19316365Skarels status = SUCCESS; 19416365Skarels break; 19516365Skarels } 19616365Skarels } 19723462Sbloom fclose(fd); 19816365Skarels return (status); 19916355Skarels } 200