Google
 

Trailing-Edge - PDP-10 Archives - BB-KL11J-BM_1990 - t20src/acjdec.mac
There are 9 other files named acjdec.mac in the archive. Click here to see a list.
;RIP:<7.UTILITIES>ACJDEC.MAC.1248  4-Apr-89 20:14:57, Edit by GSCOTT
;(125) Sweep log file cache at time that system is going to be shutdown.
;RIP:<7.UTILITIES>ACJDEC.MAC.1235 30-Mar-89 11:59:54, Edit by GSCOTT
;(124) Substitute "*" in log file name for the current time.
;RIP:<7.UTILITIES>ACJDEC.MAC.1230 30-Mar-89 10:57:16, Edit by GSCOTT
;(123) Read LSN ACCESS.CONTROL files for feeble users.
;RIP:<7.UTILITIES>ACJDEC.MAC.1227 29-Mar-89 15:33:03, Edit by GSCOTT
;(122) Small log file fixes, cause entry into MDDT to sweep the log file cache.
;RIP:<7.UTILITIES>ACJDEC.MAC.1215 29-Mar-89 11:52:00, Edit by GSCOTT
;(121) Check for user deletion of access.control file to flush cache.
;RIP:<7.UTILITIES>ACJDEC.MAC.1210 29-Mar-89 01:44:11, Edit by GSCOTT
;(120) Write summary info to log file when closing it.
;RIP:<7.UTILITIES>ACJDEC.MAC.1193 29-Mar-89 00:16:04, Edit by GSCOTT
;(116) Fix log file line counter.
;RIP:<7.UTILITIES>ACJDEC.MAC.1183 28-Mar-89 23:31:06, Edit by GSCOTT
;(115) Look for filename first in cache flush of access.control files.
;RIP:<7.UTILITIES>ACJDEC.MAC.1178 28-Mar-89 22:38:19, Edit by GSCOTT
;(114) Add counter for cache flushes.
;RIP:<7.UTILITIES>ACJDEC.MAC.1159 28-Mar-89 10:50:17, Edit by GSCOTT
;(113) Log file cache sweep interval of zero disables the cache.
;RIP:<7.UTILITIES>ACJDEC.MAC.1157 28-Mar-89 10:43:02, Edit by GSCOTT
;(112) Make the log buffer three pages.
;RIP:<7.UTILITIES>ACJDEC.MAC.1155 24-Mar-89 02:13:10, Edit by GSCOTT
;(111) Implement the access control cache.
;RIP:<7.UTILITIES>ACJDEC.MAC.1083 21-Mar-89 17:20:03, Edit by GSCOTT
;(110) Sweep log file cache if reading log file, get new log file if renaming.
;RIP:<7.UTILITIES>ACJDEC.MAC.1070 20-Mar-89 13:31:36, Edit by GSCOTT
;(107) Implement the log file cache.
;RIP:<7.UTILITIES>ACJDEC.MAC.1042  2-Feb-89 10:23:25, Edit by GSCOTT
;(101) Don't output cap mask if job 0 in LOGSTA routine.
;RIP:<7.UTILITIES>ACJDEC.MAC.1040  1-Feb-89 11:38:29, Edit by GSCOTT
;(100) Bug in TAKCHK broke TAKE command lines over half the buffer size.
;RIP:<7.UTILITIES>ACJDEC.MAC.1039 31-Jan-89 18:23:01, Edit by GSCOTT
;(77) Make the log files secure when writing them.
;RIP:<7.UTILITIES>ACJDEC.MAC.1037 30-Jan-89 10:54:49, Edit by GSCOTT
;(75) Don't output bad information in spy file trailer.
;RIP:<7.UTILITIES>ACJDEC.MAC.1036 30-Jan-89 10:22:08, Edit by GSCOTT
;(74) Kill all inferior forks when crashing.
;RIP:<7.UTILITIES>ACJDEC.MAC.1033 30-Jan-89 10:02:23, Edit by GSCOTT
;(73) Output spy filename to log file if we can't open the spy file.
;RIP:<7.UTILITIES>ACJDEC.MAC.1031 26-Jan-89 11:20:21, Edit by GSCOTT
;(72) Add NOSECURE keyword to ACCESS.CONTROL
;RIP:<7.UTILITIES>ACJDEC.MAC.1030 26-Jan-89 10:07:01, Edit by GSCOTT
;(71) Add DENY-CTY and LOGIN-CTY support.
;RIP:<7.UTILITIES>ACJDEC.MAC.1028 24-Jan-89 17:01:52, Edit by GSCOTT
;(67) Make job information blocks, clean up attach and login policy code.
;RIP:<7.UTILITIES>ACJDEC.MAC.1010 19-Jan-89 22:50:33, Edit by GSCOTT
;(66) Fill text displayed by the SHOW command.
;RIP:<7.UTILITIES>ACJDEC.MAC.999 19-Jan-89 21:21:06, Edit by GSCOTT
;(65) Fill command lines output by the WRITE command.
;RIP:<7.UTILITIES>ACJDEC.MAC.996 19-Jan-89 17:46:14, Edit by GSCOTT
;(64) Improve logging of illegal requests.
;RIP:<7.UTILITIES>ACJDEC.MAC.985 19-Jan-89 13:28:48, Edit by GSCOTT
;(63) Add support for user functions.
;RIP:<7.UTILITIES>ACJDEC.MAC.982 12-Jan-89 23:12:28, Edit by GSCOTT
;(62) Ignore increment mount counts for ACJ just to be sure.
;RIP:<7.UTILITIES>ACJDEC.MAC.981 12-Jan-89 22:00:36, Edit by GSCOTT
;(60) Remove extra definition of RSKP, use MACREL's instead.
;RIP:<7.UTILITIES>ACJDEC.MAC.967  3-Jan-89 15:20:00, Edit by GSCOTT
;(51) Update copyright date.
;RIP:<7.UTILITIES>ACJDEC.MAC.966  3-Jan-89 15:18:48, Edit by GSCOTT
;(50) Add output in log file of number requests failed.
;RIP:<7.UTILITIES>ACJDEC.MAC.964  3-Jan-89 14:37:02, Edit by GSCOTT
;(47) Log more information for CRDIRs.
;RIP:<7.UTILITIES>ACJDEC.MAC.962 29-Dec-88 10:48:50, Edit by GSCOTT
;(45) Change policy to allow and log any secure operation if no ACCESS.CONTROL.
;RIP:<7.UTILITIES>ACJDEC.MAC.961 20-Dec-88 10:05:24, Edit by GSCOTT
;(41) Problem with previous edit (extra comma in BYTE 7 statement).
;RIP:<7.UTILITIES>ACJDEC.MAC.956 16-Dec-88 10:56:47, Edit by GSCOTT
;(40) Paginate the logging file.
;RIP:<7.UTILITIES>ACJDEC.MAC.955 14-Dec-88 18:50:16, Edit by GSCOTT
;(37) Add LOGIN-xxxx keywords to user profile.
;RIP:<7.UTILITIES>ACJDEC.MAC.950 14-Dec-88 17:56:36, Edit by GSCOTT
;(36) Restart ourselves if under job 0.
;RIP:<7.UTILITIES>ACJDEC.MAC.949 13-Dec-88 11:17:19, Edit by GSCOTT
;(35) Put username first in logging for easier reading.
;RIP:<7.UTILITIES>ACJDEC.MAC.948 12-Dec-88 14:04:11, Edit by GSCOTT
;(34) Add invisible bit when looking for ACCESS.CONTROL.
;RIP:<7.UTILITIES>ACJDEC.MAC.946  7-Dec-88 15:46:55, Edit by GSCOTT
;(32) In WRITE command only send keywords that differ from default enable bits.
;RIP:<7.UTILITIES>ACJDEC.MAC.940  7-Dec-88 01:33:04, Edit by GSCOTT
;(30) Implement DENY-xxx keywords for functions.
;RIP:<7.UTILITIES>ACJDEC.MAC.935  6-Dec-88 21:35:15, Edit by GSCOTT
;(27) Implement ALL as keyword in ACCESS.CONTROL, clean up here and there.
;RIP:<7.UTILITIES>ACJDEC.MAC.913  6-Dec-88 19:02:28, Edit by GSCOTT
;(26) Implement SET PRIME-TIME-BEGIN and SET PRIME-TIME-END
;RIP:<7.UTILITIES>ACJDEC.MAC.906  6-Dec-88 18:01:00, Edit by GSCOTT
;(25) Check for no functions enabled in SAVE command.
;RIP:<7.UTILITIES>ACJDEC.MAC.902  6-Dec-88 17:55:53, Edit by GSCOTT
;(24) Use TIME rather than HPTIM for uptime to prevent overflows after 4 days.
;RIP:<7.UTILITIES>ACJDEC.MAC.892  3-Dec-88 02:52:35, Edit by GSCOTT
;(23) OTIME routine needs to handle times in the range of days.
;RIP:<7.UTILITIES>ACJDEC.MAC.891  1-Dec-88 11:08:20, Edit by GSCOTT
;(22) Wrong AC tested in FINDIT after call to WTBLUK.
;RIP:<7.UTILITIES>ACJDEC.MAC.888 30-Nov-88 13:35:18, Edit by GSCOTT
;(21) Don't use TEXTBU in HDRLOG routine as logging routines could be using it.
;RIP:<7.UTILITIES>ACJDEC.MAC.883 30-Nov-88 10:05:27, Edit by GSCOTT
;(17) Add POLICY keyword.
;RIP:<7.UTILITIES>ACJDEC.MAC.880 29-Nov-88 17:34:19, Edit by GSCOTT
;(16) Move ACCESS.CONTROL code here, allow hyphen at end of line.
;RIP:<7.UTILITIES>ACJDEC.MAC.879 28-Nov-88 09:43:58, Edit by GSCOTT
;(14) Ignore errors from SPRIW.
;RIP:<7.UTILITIES>ACJDEC.MAC.872 22-Nov-88 20:27:01, Edit by GSCOTT
;(13) Support wild username specifications.
;RIP:<7.UTILITIES>ACJDEC.MAC.827 22-Nov-88 11:09:42, Edit by GSCOTT
;(12) Calculation of next midnight time was flawed.  Again.
;RIP:<7.UTILITIES>ACJDEC.MAC.817 21-Nov-88 21:12:02, Edit by GSCOTT
;(11) Another log file bug, smashed AC in NEWLOG.
;RIP:<7.UTILITIES>ACJDEC.MAC.811 21-Nov-88 15:12:38, Edit by GSCOTT
;(7) Statistics should be sent to log file.
;RIP:<7.UTILITIES>ACJDEC.MAC.807 21-Nov-88 14:29:59, Edit by GSCOTT
;(6) Repair setting timer interrupt in midnight routine.
;RIP:<7.UTILITIES>ACJDEC.MAC.801 20-Nov-88 22:53:48, Edit by GSCOTT
;(4) Suppress created symbol on ERSKP, support log file switch at midnight.
;RIP:<7.UTILITIES>ACJDEC.MAC.781 20-Nov-88 14:37:06, Edit by GSCOTT
;(3) Send JSYS error messages to log file if we have a log file JFN.
;RIP:<7.UTILITIES>ACJDEC.MAC.770 20-Nov-88 12:24:13, Edit by GSCOTT
;(2) Fix problem with DISFNC.
;RIP:<GSCOTT>ACJDEC.MAC.768 20-Nov-88 12:04:50, Edit by GSCOTT
;(1) Creation.

;	COPYRIGHT (c) DIGITAL EQUIPMENT CORPORATION 1988, 1989.
;	ALL RIGHTS RESERVED.
;
;	THIS SOFTWARE IS FURNISHED UNDER A  LICENSE AND MAY BE USED AND  COPIED
;	ONLY IN  ACCORDANCE  WITH  THE  TERMS OF  SUCH  LICENSE  AND  WITH  THE
;	INCLUSION OF THE ABOVE  COPYRIGHT NOTICE.  THIS  SOFTWARE OR ANY  OTHER
;	COPIES THEREOF MAY NOT BE PROVIDED  OR OTHERWISE MADE AVAILABLE TO  ANY
;	OTHER PERSON.  NO  TITLE TO  AND OWNERSHIP  OF THE  SOFTWARE IS  HEREBY
;	TRANSFERRED.
;
;	THE INFORMATION IN THIS  SOFTWARE IS SUBJECT  TO CHANGE WITHOUT  NOTICE
;	AND SHOULD  NOT  BE CONSTRUED  AS  A COMMITMENT  BY  DIGITAL  EQUIPMENT
;	CORPORATION.
;
;	DIGITAL ASSUMES NO  RESPONSIBILITY FOR  THE USE OR  RELIABILITY OF  ITS
;	SOFTWARE ON EQUIPMENT THAT IS NOT SUPPLIED BY DIGITAL.

	TITLE ACJDEC - Access Control Facility Profile and Policy Driver 
	SUBTTL Gregory A. Scott
	Subttl	Table of Contents

;		     Table of Contents for ACJDEC
;
;				  Section		      Page
;
;
;    1. General Comments . . . . . . . . . . . . . . . . . . .   5
;    2. Definitions
;        2.1    Environment  . . . . . . . . . . . . . . . . .   6
;        2.2    Version and Entry Vector . . . . . . . . . . .   7
;        2.3    Storage
;            2.3.1    Low Segment Pages  . . . . . . . . . . .   8
;            2.3.2    Low Segment Writable . . . . . . . . . .   9
;            2.3.3    High Segment Writable  . . . . . . . . .  13
;        2.4    Interrupt System . . . . . . . . . . . . . . .  14
;        2.5    Command GTJFN Blocks . . . . . . . . . . . . .  16
;        2.6    Command State Block  . . . . . . . . . . . . .  18
;        2.7    Command Tables . . . . . . . . . . . . . . . .  19
;        2.8    Set Command Tables . . . . . . . . . . . . . .  20
;    3. Commands
;        3.1    Initialization . . . . . . . . . . . . . . . .  21
;        3.2    Top Level  . . . . . . . . . . . . . . . . . .  22
;        3.3    Disable Command  . . . . . . . . . . . . . . .  23
;        3.4    Enable Command . . . . . . . . . . . . . . . .  24
;        3.5    Help Command . . . . . . . . . . . . . . . . .  25
;        3.6    Save Command . . . . . . . . . . . . . . . . .  26
;        3.7    Set Command  . . . . . . . . . . . . . . . . .  27
;            3.7.1    Access Log File  . . . . . . . . . . . .  28
;            3.7.2    Log File Cache Sweep Interval  . . . . .  29
;            3.7.3    Prime Time . . . . . . . . . . . . . . .  30
;            3.7.4    Spy Check Interval . . . . . . . . . . .  31
;            3.7.5    Spy Log Directory  . . . . . . . . . . .  32
;        3.8    Show Command . . . . . . . . . . . . . . . . .  33
;            3.8.1    Show Functions . . . . . . . . . . . . .  34
;            3.8.2    Show Settings  . . . . . . . . . . . . .  36
;            3.8.3    Show User  . . . . . . . . . . . . . . .  37
;            3.8.4    Show Text On Terminal  . . . . . . . . .  40
;        3.9    Take Command . . . . . . . . . . . . . . . . .  41
;        3.10   User Command . . . . . . . . . . . . . . . . .  44
;        3.11   Write Command  . . . . . . . . . . . . . . . .  47
;            3.11.1   Write Settings . . . . . . . . . . . . .  49
;            3.11.2   Write User Profiles  . . . . . . . . . .  50
;            3.11.3   Write Function Profiles  . . . . . . . .  51
;            3.11.4   File Header  . . . . . . . . . . . . . .  52
;            3.11.5   Fill and Write Line to File  . . . . . .  53
;            3.11.6   Open/Close File  . . . . . . . . . . . .  54
;        3.12   Command Subroutines  . . . . . . . . . . . . .  55
	Subttl	Table of Contents (page 2)

;		     Table of Contents for ACJDEC
;
;				  Section		      Page
;
;
;    4. Access Control
;        4.1    Initialization . . . . . . . . . . . . . . . .  56
;            4.1.1    Capabilities and Interrupts  . . . . . .  57
;            4.1.2    Configuration  . . . . . . . . . . . . .  58
;            4.1.3    Access Control Functions . . . . . . . .  59
;        4.2    Processing Loop  . . . . . . . . . . . . . . .  61
;            4.2.1    Find Function Profile  . . . . . . . . .  62
;            4.2.2    Find User Profile  . . . . . . . . . . .  63
;            4.2.3    Check Request  . . . . . . . . . . . . .  64
;            4.2.4    Wait for failure . . . . . . . . . . . .  65
;            4.2.5    Log Request  . . . . . . . . . . . . . .  66
;        4.3    Subroutines
;            4.3.1    Wild TBLUK Routine . . . . . . . . . . .  67
;            4.3.2    Get User Information . . . . . . . . . .  68
;    5. Logging Routines
;        5.1    Midnight Timer Routines  . . . . . . . . . . .  72
;        5.2    System Shutdown Time Routines  . . . . . . . .  73
;        5.3    Initialization of Log File . . . . . . . . . .  75
;        5.4    Send Text to Log File  . . . . . . . . . . . .  78
;        5.5    Log File Cached Write  . . . . . . . . . . . .  79
;        5.6    Log File Cache Sweep Interrupts  . . . . . . .  80
;        5.7    Log File Cache Sweep . . . . . . . . . . . . .  81
;        5.8    Open/Close/Checkpoint Log File . . . . . . . .  82
;        5.9    New Page for Log File  . . . . . . . . . . . .  83
;        5.10   Statistics Logging . . . . . . . . . . . . . .  84
;        5.11   Start Logging a Request  . . . . . . . . . . .  87
;    6. Spy on Intruder  . . . . . . . . . . . . . . . . . . .  88
;        6.1    Start a Spy Fork . . . . . . . . . . . . . . .  89
;        6.2    Kill Spy Fork  . . . . . . . . . . . . . . . .  91
;        6.3    Start a Spy Fork
;            6.3.1    Get a Spy File . . . . . . . . . . . . .  92
;            6.3.2    Get a PTY  . . . . . . . . . . . . . . .  94
;        6.4    Spy Fork
;            6.4.1    Initialization . . . . . . . . . . . . .  95
;            6.4.2    Main Loop  . . . . . . . . . . . . . . .  96
;            6.4.3    Spy File I/O Routines  . . . . . . . . .  97
;            6.4.4    Error Recovery and Termination . . . . .  98
;            6.4.5    Timer Interrupts . . . . . . . . . . . .  99
;            6.4.6    Setup Spy Link . . . . . . . . . . . . . 100
;        6.5    Spy File Header/Trailer  . . . . . . . . . . . 101
;        6.6    Inferior Fork Termination Interrupt  . . . . . 102
	Subttl	Table of Contents (page 3)

;		     Table of Contents for ACJDEC
;
;				  Section		      Page
;
;
;    7. Secure Files . . . . . . . . . . . . . . . . . . . . . 103
;        7.1    Find File's Entry  . . . . . . . . . . . . . . 104
;        7.2    Check Desired Access . . . . . . . . . . . . . 105
;        7.3    Access Keywords  . . . . . . . . . . . . . . . 106
;        7.4    Access Control Cache . . . . . . . . . . . . . 107
;            7.4.1    Open File  . . . . . . . . . . . . . . . 108
;                7.4.1.1    Split Filename . . . . . . . . . . 109
;                7.4.1.2    Cache Find . . . . . . . . . . . . 110
;                7.4.1.3    Cache Stale Check  . . . . . . . . 111
;                7.4.1.4    Cached Open  . . . . . . . . . . . 112
;                7.4.1.5    Cached Input Setup . . . . . . . . 114
;            7.4.2    Close File
;                7.4.2.1    Read Finished  . . . . . . . . . . 115
;                7.4.2.2    Flush Cache  . . . . . . . . . . . 116
;        7.5    Action for Successful Access . . . . . . . . . 117
;        7.6    Read Line from File  . . . . . . . . . . . . . 119
;        7.7    Read Character from File . . . . . . . . . . . 120
;        7.8    Read Character from Line Buffer  . . . . . . . 121
;        7.9    Read Field from Line Buffer  . . . . . . . . . 122
;    8. Subroutines
;        8.1    Simulate STCMP . . . . . . . . . . . . . . . . 123
;        8.2    Simulate SOUT  . . . . . . . . . . . . . . . . 124
;    9. Output Subroutines
;        9.1    Output Information about Job . . . . . . . . . 125
;        9.2    Output Username/Device/Filename  . . . . . . . 126
;        9.3    Output Capability Mask . . . . . . . . . . . . 127
;        9.4    Small Output Routines  . . . . . . . . . . . . 128
;        9.5    Output Sixbit Word . . . . . . . . . . . . . . 129
;        9.6    Output Numbers . . . . . . . . . . . . . . . . 130
;        9.7    Output Floating Point Numbers  . . . . . . . . 132
;        9.8    Output Millisecond Times . . . . . . . . . . . 133
;        9.9    Output Standard Date/Time  . . . . . . . . . . 135
;        9.10   Output JSYS Error Message  . . . . . . . . . . 136
;   10. Error Handler
;       10.1    Error Messages . . . . . . . . . . . . . . . . 137
;       10.2    Panic and Control-C Interrupt  . . . . . . . . 138
;       10.3    Crash Handler  . . . . . . . . . . . . . . . . 139
;   11. End of ACJDEC  . . . . . . . . . . . . . . . . . . . . 142
	SUBTTL General Comments

	COMMENT ~

This Access Control Facility operates in two phases.  In the first ("profile")
phase, commands are entered to set up a database of which GETOK functions are
desired and which users need special treatment.  In the second ("policy") phase
the program implements the policy specified in the first phase by running as
the system access control facility.

This is the ACJDEC module.  This module of the access control facility
implements the initial phase (profile phase).  After the policy profile data
has been specified, a command generates a runnable ACJ.EXE which implements the
policy.

The ACJDEC module also contains the core Access Control Facility policy
program, which gets access control requests from the monitor and implements the
policy specified in the profile phase.  This module also contains subroutines
called by this module in the profile and policy phases.  These subroutines are
also called by the ACJUSR module.

The design of the program allows site specific policy implementations and
access control functions to be changed in the ACJUSR module.  It is expected
that any site should not have to change any code in the ACJDEC module,
particularly in the core access control code.  The ACJSYM module contains all
symbols that need to be shared between ACJDEC and ACJUSR.

This program was written in November 1988 by Gregory A. Scott, Digital
Equipment Corporation, Marlboro, Massachusetts.

Future enhancements to consider:
	Write logfiles with date and/or time included in filespec.
	Create some kind of idle job killer functionality.
	~
	SUBTTL Definitions -- Environment

;Normalize MACRO, load TOPS-20 standard definitions, define ACs, get MACREL.

	SALL			;Clean listing
	.DIREC FLBLST		;First line binary only

	SEARCH MONSYM		;Get the usual monitor symbols

	SEARCH MACSYM		;Get the usual macros

	STDAC.			;Get the usual ACs

;ACJ specific initialization.

	SEARCH ACJSYM		;Get our symbols

	LOHIGH			;Tell me we need two segments for this
	LOWCD			;Start off in low memory
	SUBTTL Definitions -- Version and Entry Vector

;Set copyright.

	.CPYRT <<1989>>		;Use the usual copyright macro there

;Define the entry vector

EV:	JRST START		;Normal start
	JRST START		;Reenter start
	EXP VACJ		;Version
	EVLEN==.-EV		;Length of entry vector
	SUBTTL Definitions -- Storage -- Low Segment Pages

;[107] This section defines pages allocated in the low segment.
;[107] Pages 0-77 and 400-477 are reserved for code.

	FLPAGE==000		;[107] First page allocated to low code
	LLPAGE==077		;[107] Last page allocated to low code
	FHPAGE==400		;[107] First page allocated to high code
	LHPAGE==477		;[107] Last page allocated to high code

	APAGE==LLPAGE+1		;[111] Start at page after low code

;[107] Define a macro to allocate pages in memory.

DEFINE ALLOCP (ASIZE,SYMBPG,SYMBBU,SYMBLP),< ;[107]
	IFL APAGE-<LHPAGE+1>,<	;[111] If current free page in low sen
	  IFGE <APAGE+ASIZE>-FHPAGE,< ;[111] and not enough space for block
	    APAGE==LHPAGE+1>>	;[111] Switch to high sec
	IFG <APAGE+ASIZE-1>-777,< ;[111] No more memory?
	  PRINTX ? Too much buffer space allocated
	  PASS2			;[107] Punt
	  END			;[107]  and get out of here
	>			;[107] End of IFE APAGE-LLPAGE
	IFNB <SYMBPG>,<SYMBPG==APAGE> ;[120] Define first page number if needed
	IFNB <SYMBLP>,<SYMBLP==APAGE+ASIZE-1> ;[120] Last page of buffer
	SYMBBU=APAGE_PGSFT	;[121] Address of page map buffer
	APAGE==APAGE+ASIZE	;[111] Point to next free page
>				;[107] End of DEFINE ALLOCP

;[111] First allocate pages for the access control file cache buffers.

	DEFINE ALLOCC(A),<ALLOCP (SCACHE,<CBXF'A>,<CBX'A>,<CBXL'A>)> ;[111] 
	......==0		;[111] Start with zero
	REPEAT NCACHE,<		;[111] For each cache entry
	  ALLOCC(\......)	;[111] Allocate the pages for it
	  ......==......+1>	;[111]  and count to next entry

;Now allocate some other page aligned space.

	ALLOCP (LOGBPC,LOGBFP,LOGBUF,LOGBLP) ;[112] Log file cache buffer
	ALLOCP (1,SECOPG,SECOBU,) ;[120] Map access.control overflow pages here
	ALLOCP (1,,TEXTBU,)	;[120] Place to put text into
	ALLOCP (1,,HEADBU,)	;[120] Place to make header text into
	SUBTTL Definitions -- Storage -- Low Segment Writable

	LOWCD			;Low segment code

;Misc storage.

STACK:	BLOCK PLEN		;Program stack
TEXTBP:	BLOCK 1			;Pointer into TEXTBU

;Storage used in statistics gathering.

NALLOW:	BLOCK 1			;Number of GETOKs allowed
NDENY:	BLOCK 1			;Number of GETOKs denied
NFAIL:	BLOCK 1			;Number of requests that failed
NHIT:	BLOCK 1			;[111] Number of access control cache hits
NMISS:	BLOCK 1			;[111] Number of access control cache misses
NFLUSH:	BLOCK 1			;[114] Number of access control cache flushes
RUNTIM:	BLOCK 1			;Program initial run time
PEOPLE:	BLOCK 1			;Program initial connect time

;Storage used in error reporting and crashing.

ERRBUF:	BLOCK ^D400/5		;Place to make error strings
ERRADR:	BLOCK 1			;Address of error string to print
LASERR:	BLOCK 1			;Last error at time of crash
BUGACS:	BLOCK 20		;ACs at time of crash
BUGPDL:	BLOCK BUGLEN		;Stack for the crash
BUGFIL:	BLOCK ^D<7+4+6+6+7+4+1>/5 ;Place to build filename

;Configuration information

TTYPTY:	BLOCK 1			;TTY number of first PTY
MAXPTY:	BLOCK 1			;Number of PTYs
CTYLNO:	BLOCK 1			;Line number of the CTY
OURNAM:	BLOCK 2			;Place to keep our ASCIZ node name
OPRUNO:	BLOCK 1			;User number of OPERATOR
OURUNO:	BLOCK 1			;User number of runner of profile generator
OURJOB:	BLOCK 1			;Our job number (0 or global job number)
LOGFIL:	BLOCK ^D<40*5>/5	;Log file name
PRIMEB:	BLOCK 1			;Time that prime time begins
PRIMEE:	BLOCK 1			;Time that prime time ends
;Storage used for access control housekeeping.

ARGBLK:	BLOCK ARGLEN		;RCVOK argument block
USRSTR:	BLOCK ^D<40*2>/5	;Store a username here
TODCLK:	BLOCK 1			;[107] Uptime at the time of the last request

;Job information blocks

JIBLK:	BLOCK JISIZ		;GETJI information for source job
CJBLK:	BLOCK JISIZ		;Controlling job information block
TJBLK:	BLOCK JISIZ		;Target job information block

;Storage used in remembering user profile.
;NOTE:	Offset in right half of USRKEY is the index into USRPRO.
;	Relative address in USRKEY is the index into USRNUM.

USRTBL:	BLOCK 1			;TBLUK table of [ASCIZ/user/],,profile offset
USRKEY:	BLOCK NUSERS		;Data for USRTBL
USRSTG:	BLOCK NUSERS*<USRCHR/5>	;ASCIZ username strings
USRPRO:	BLOCK NUSERS		;Profile word for each user in table
;Storage used in writing the log file.

LOGLIN:	BLOCK 1			;Place to keep number of lines on this page
LOGPAG:	BLOCK 1			;Place to keep page number of this log file
LOGJFN:	BLOCK 1			;Place to keep the log file JFN
LOGPTR:	BLOCK 1			;[107] Pointer into log buffer
LOGCNT:	BLOCK 1			;[107] Count of freespace remaining in LOGBUF
LOGINT:	EXP -1			;[113] Interval in seconds between sweeps
LOGFNA:	BLOCK ^D<5*40>/5	;[110] Currently open log file name
LOGFTI:	BLOCK ^D<2+1+3+1+4+1+2+1+2+1+2+1+1>/5 ;[124] Time used in log filename
LOGHSY:	BLOCK 1			;[125] Time that system is expected to HSYS

;Storage used in intruder spy facility.

SPYSLD:	BLOCK ^D160/5		;Spy log directory
SPYFIL: BLOCK ^D160/5		;Place to build temp string for filename
SPYINT:	BLOCK 1			;Interval between spy fork checks
	SPYFWZ==.		;First word to zero
SPYFRK:	BLOCK NSPYS		;Save inferior handles here
SPYJOB:	BLOCK NSPYS		;Job fork is watching
SPYUSR:	BLOCK NSPYS		;Usernumber that fork is monitoring
SPYJFN:	BLOCK NSPYS		;Log file JFN,,PTY JFN
SPYPDL:	BLOCK NSPYS*SPLEN	;Stacks for the spy forks
	SPYLWZ==.-1		;Last word to zero
;Storage used in ACCESS.CONTROL routines.

SECGTJ:	BLOCK .GJNOD+1		;Place to build long form GTJFN 
SECDIR:	BLOCK ^D<40*3>/5	;[111] Place to build "str:<directory>"
SECFNA:	BLOCK ^D<40*5>/5	;Place to build "file.type.gen"
SECFNV:	BLOCK ^D<40*5>/5	;[115] Place to build "file.type"
SECWRD:	BLOCK ^D<40*5>/5	;Place to read a field into
SECUSR:	BLOCK ^D<40*2>/5	;[115] Place to construct username
SECLIN:	BLOCK SECCPL		;Place to read in the access control line
SECPMP:	BLOCK 1			;Page of file that is mapped now
SECPCT:	BLOCK 1			;Count of pages left to map
SECBCT:	BLOCK 1			;Byte count of mapped data area
SECBPT:	BLOCK 1			;Pointer into mapped data area

;[111] Access control cache blocks

	DEFINE ALLOCC(A),<
	XLIST			;[121] Turn listing off
	PHASE 0			;[111] Start definition of cache block
CBXJFN:!BLOCK 1			;[111] JFN of this file
CBXCTL:!BLOCK 1			;[111] FBCTL word of file
CBXPTR:!POINT 7,CBX'A		;[111] Byte pointer to read cached buffer
CBXPAG:!XWD .FHSLF,CBXF'A	;[111] Page number of the buffer
CBXMAP:!BLOCK 1			;[111] Page count of cached file pages
CBXPCT:!BLOCK 1			;[111] Page count of entire file
CBXRTI:!BLOCK 1			;[111] Uptime at time that file was referenced
CBXMTI:!BLOCK 1			;[111] Uptime at time that file was mapped
CBXDIR:!BLOCK ^D<6+1+1+<39*2>+1+1>/5 ;[111] Directory where file lives
CBXFIL:!BLOCK ^D<6+1+1+<39*2>+1+6+1+7+1>/5 ;[115] str:<dir>access.control
CBXSIZ:!			;[111] Define size of the block
	DEPHASE			;[111] Get back to normal addressing
	LIST			;[121] Turn listing on
>				;[111] End of DEFINE ALLOCC

CBPOOL:	......==0		;[111] Start with zero
	REPEAT NCACHE,<		;[111] For each cache entry
	  ALLOCC(\......)	;[111] Allocate the storage for it
	  ......==......+1>	;[111]  and count to next entry
	SUBTTL Definitions -- Storage -- High Segment Writable

	HIGHCD			;High segment code/data

;Storage for command parsing

CMDBUF:	BLOCK <CBUFSZ==100>	;Command buffer
ATMBUF:	BLOCK <ABUFSZ==40>	;Atom buffer
GTJBLK:	BLOCK .GJATR+1		;Long form GTJFN buffer
CSBLOK:	BLOCK .CMGJB+1		;Command state block
CMTADB:	BLOCK 3			;Block to parse time into

LINWID:	BLOCK 1			;Width of the terminal for showing text
TAKJFN:	BLOCK 1			;Take file JFN
PRSJFN:	BLOCK 1			;JFN used while parsing
	SUBTTL Definitions -- Interrupt System

	LOWCD			;Low segment code

;First create macro to assign each channel we desire.
;If channel not specified assign one from the range 0-6.

DEFINE ASSCHN(LEV,CHN,ADR,NAM),< ;Level, channel, routine, symbol

	ONCHNS==ONCHNS!1B<^O<CHN>> ;Count this channel as one to enable

	IFNB <CHN>,<		;If channel specified
		CHAN'CHN==<LEV,,ADR> ;Construct this symbol for later
		IFNB <NAM>,<NAM==CHN> ;Name it if desired
	>			;End of IFNB <CHN>

	IFB <CHN>,<		;If we want to assign one
		ASSCHN(LEV,\FRECHN,ADR,NAM) ;Get one assigned and named
		FRECHN==FRECHN+1 ;Count up one channel
		IFE FRECHN-.ICAOV,< ;[125] If channel 0-5 now in use
			FRECHN==.ICNXP+1 ;[125] Jump over panics to chan 23
		>		;[125] End of IFE FRECHN-.ICAOV
	>			;End of IFB <CHN>

>				;End of DEFINE ASSCHN

	FRECHN==0		;Start assigning with channel zero
	ONCHNS==0		;Start with no channels enabled

;Macro to grow the channel table from definitions set with ASSCHN.

DEFINE CHNGEN,<			;Macro to expand channel table
	DEFINE PLANTC(NUM),<	;Macro to generate CHNTAB entry
		XLIST		;Stop listing momentarily
		IFNDEF CHAN'NUM,<EXP 0>	;Zero if no assignment
		IFDEF CHAN'NUM,<EXP CHAN'NUM> ;Plant one channel table entry
		LIST		;Resume listing now
		......==......+1 ;Ratchet the channel number by one
	>			;End of DEFINE PLANTC
	......==0		;Starting at channel 0
	REPEAT ^D36,<PLANTC (\......)> ;Plant each channel
>				;End of DEFINE CHNGEN

;Assign panic channels first.

	ASSCHN(1,\.ICPOV,PANIC)	;PDL overflows to PANIC
	ASSCHN(1,\.ICDAE,PANIC)	;Data errors to PANIC
	ASSCHN(1,\.ICQTA,PANIC)	;Disk full to PANIC
	ASSCHN(1,\.ICILI,PANIC)	;Ill inst to PANIC
	ASSCHN(1,\.ICIRD,PANIC)	;Ill mem read to PANIC
	ASSCHN(1,\.ICIWR,PANIC)	;Ill mem write to PANIC
	ASSCHN(1,\.ICMSE,PANIC)	;Sys resources exhausted to PANIC

;Assign other channels as needed.

	ASSCHN(1,,CNTRLC,CCCHAN) ;Control-C trap on same as panic channel
	ASSCHN(2,,MIDNIT,MDCHAN) ;Midnight interrupts
	ASSCHN(2,,INTLFF,LFCHAN) ;[107] Log file cache sweeps
	ASSCHN(2,,INTHSY,HFCHAN) ;[125] Hsys interrupt for log file sweep
	ASSCHN(3,\.ICIFT,FRKTRM) ;Inferior fork termination interrupt
	ASSCHN(3,,TIMINT,TICHAN) ;TIMER% interrupt (inferior fork use only)

;Make CHNTAB.

CHNTAB:	CHNGEN			;Generate channel table

;Set the level table here.

LEVTAB:	EXP LEV1PC		;Location to save level 1 PC return address
	EXP LEV2PC		;Location to save level 2 PC return address
	EXP LEV3PC		;Location to save level 3 PC return address

LEV1PC:	BLOCK 1			;Level 1 interrupt return PC
LEV2PC:	BLOCK 1			;Level 2 interrupt return PC
LEV3PC:	BLOCK 1			;Level 3 interrupt return PC
	SUBTTL Definitions -- Command GTJFN Blocks

	HIGHCD			;Back to high segment only code

;Save command GTJFN block

SAVGTJ:	GJ%FOU!GJ%MSG		;(.GJGEN) Flags and generation
	XWD .NULIO,.NULIO	;(.GJSRC) JFNs
	0			;(.GJDEV) Default device
	0			;(.GJDIR) Default directory
	POINT 7,[ASCIZ/ACJ/]	;(.GJNAM) Default file
	POINT 7,[ASCIZ/EXE/]	;(.GJEXT) Default type
	0			;(.GJPRO) Default protection
	0			;(.GJACT) Default account
	0			;(.GJJFN) Specified JFN
	0			;(.GJF2)  Additional flags

;Set Access-log-file command GTJFN block

ALFGTJ:	GJ%OFG			;(.GJGEN) Flags and generation parse only
	XWD .NULIO,.NULIO	;(.GJSRC) Jfns
	0			;(.GJDEV) Default device
	0			;(.GJDIR) Default directory
	0			;(.GJNAM) Default file
	0			;(.GJEXT) Default type
	0			;(.GJPRO) Default protection
	0			;(.GJACT) Default account
	0			;(.GJJFN) Specified JFN
	G1%SLN			;(.GJF2)  Additional flags

;Set Spy-log-directory command GTJFN block

SLDGTJ:	GJ%OFG			;(.GJGEN) Flags and generation parse only
	XWD .NULIO,.NULIO	;(.GJSRC) Jfns
	0			;(.GJDEV) Default device
	0			;(.GJDIR) Default directory
	0			;(.GJNAM) Default file
	0			;(.GJEXT) Default type
	0			;(.GJPRO) Default protection
	0			;(.GJACT) Default account
	0			;(.GJJFN) Specified JFN
	G1%SLN			;(.GJF2)  Additional flags
;Take command GTJFN block

TAKGTJ:	GJ%OLD			;(.GJGEN) Flags and generation
	XWD .NULIO,.NULIO	;(.GJSRC) Jfns
	0			;(.GJDEV) Default device
	0			;(.GJDIR) Default directory
	POINT 7,[ASCIZ/ACJPROFILE/] ;(.GJNAM) Default file
	POINT 7,[ASCIZ/CMD/]	;(.GJEXT) Default type
	0			;(.GJPRO) Default protection
	0			;(.GJACT) Default account
	0			;(.GJJFN) Specified JFN
	G1%IIN			;(.GJF2)  Additional flags

;Write command GTJFN block

WRIGTJ:	GJ%FOU!GJ%MSG		;(.GJGEN) Flags and generation
	XWD .NULIO,.NULIO	;(.GJSRC) Jfns
	0			;(.GJDEV) Default device
	0			;(.GJDIR) Default directory
	POINT 7,[ASCIZ/ACJPROFILE/] ;(.GJNAM) Default file
	POINT 7,[ASCIZ/CMD/]	;(.GJEXT) Default type
	0			;(.GJPRO) Default protection
	0			;(.GJACT) Default account
	0			;(.GJJFN) Specified JFN
	0			;(.GJF2)  Additional flags
	SUBTTL Definitions -- Command State Block

;Command state block template.

CSBTPL:	EXP COM2		;(.CMFLG) Reparse at COM2
	XWD .PRIIN,.PRIOU	;(.CMIOJ) Input and output JFNs
	POINT 7,[EXP ASCII "ACJDE",<BYTE(7)"C",76,0>] ;(.CMRTY) Ptr to prompt
	POINT 7,CMDBUF		;(.CMBFP) Pointer to start of buffer
	POINT 7,CMDBUF		;(.CMPTR) Pointer to next input
	EXP 5*CBUFSZ-1		;(.CMCNT) Count of space remaining after .CMPTR
	EXP 0			;(.CMINC) Number of unparsed chars after .CMPTR
	POINT 7,ATMBUF		;(.CMABP) Atom buffer pointer
	EXP 5*ABUFSZ-1		;(.CMABC) Atom buffer size in characters
	EXP GTJBLK		;(.CMGJB) Address of long form GTJFN block


;Break mask for user names when they are being read by CMKEY.

USRBRK:	EXP USRB0.,USRB1.,USRB2.,USRB3.
	SUBTTL Definitions -- Command Tables

;Command table - must be in alphabetical order
;	One entry for each command in the table
;	CMND(name,help,routine,noflag)

DEFINE COMGEN<
	XLIST
	CMND(DISABLE,<(function) ALL|name>,DODISA)
	CMND(ENABLE,<(function) ALL|name [profile]>,DOENAB)
	CMND(HELP,<(message)>,DOHELP)
	CMND(SAVE,<(program in) ACJ.EXE>,DOSAVE)
	CMND(SET,<(mode) keywords>,DOSET)
	CMND(SHOW,<ALL|FUNCTION [f]|SETTING [s]|USER [u]>,DOSHOW)
	CMND(TAKE,<(commands from) acjprofile.cmd.0>,DOTAKE)
	CMND(USER,<name [profile]>,DOUSER)
	CMND(WRITE,<(commands to) acjprofile.cmd.-1>,DOWRIT)
	LIST
>

;Command table suitable for use from COMND.

DEFINE CMND(A,B,C)<
	XWD [ASCIZ/A/],C
>

CMDTBL:	TBEGIN			;Insert table header
	COMGEN			;Generate top level keywords
	TEND			;Compute number of commands for header

;Table of keywords for HELP command.

DEFINE CMND(A,B,C)<
	[ASCIZ\  A 'B'
\]
>
COMHLP:	COMGEN			;Generate help text
	HLPNUM==.-COMHLP	;Set number of entries
	SUBTTL Definitions -- Set Command Tables

;Define a table of SET command keywords for setting and display

DEFINE SETGEN,<
	XLIST
	SETFUN(ACCESS-LOG-FILE,<Access Control log file>,<[-1,,LOGFIL]>,ISOUT,SETALF)
	SETFUN(LOG-FILE-CACHE-SWEEP-INTERVAL,<Log file cache sweep interval in seconds>,LOGINT,ODEC,SETLFI) ;[107]
	SETFUN(PRIME-TIME-BEGIN,<Prime time begin>,PRIMEB,OTOD,SETPTB)
	SETFUN(PRIME-TIME-END,<Prime time end>,PRIMEE,OTOD,SETPTB)
	SETFUN(SPY-CHECK-INTERVAL,<Spy check interval in seconds>,SPYINT,ODEC,SETSCI)
	SETFUN(SPY-LOG-DIRECTORY,<Spy log directory and file>,<[-1,,SPYSLD]>,ISOUT,SETSLD)
	LIST
>				;End of define SETGEN

;Table for SHOW SETTINGS command.

	DEFINE SETFUN(A,B,C,D,E),<XWD [ASCIZ/B is set to /],D>

SETSHT:	SETGEN			;Generate table of show text adr,,show routine
	SETNUM==.-SETSHT	;Compute load number in table

;Table for command keywords and storing the data.

	DEFINE SETFUN(A,B,C,D,E),<TENTRY(A,E)>
SETTBL:	TBEGIN			;Table header
SETKEY:	SETGEN			;Generate table
	TEND			;End of commands table

	DEFINE SETFUN(A,B,C,D,E),<EXP C>
SETDAT:	SETGEN			;Generate table of data to show

;Define a microtable used to string "SETTINGS" onto command keyword lists.

SHOTBL:	TBEGIN			;Plant the header
	TENTRY(ALL,DOSHOA)	;SHOW ALL
	TENTRY(FUNCTION,DOSHOF)	;SHOW FUNCTION function
	TENTRY(SETTINGS,DOSHOS)	;SHOW SETTINGS 
	TENTRY(USER,DOSHOU)	;SHOW USER user
	TEND			;Count that one keyword

;Define a microtable used to string "ALL" onto command keyword lists.

ALLTBL:	TBEGIN			;Plant the header
ALLKEY:	TENTRY(ALL,0)		;Just one keyword and that is all
	TEND			;Count that one keyword
	SUBTTL Commands -- Initialization 

	HIGHCD

;Here to start up the configuration phase of the program

START:	RESET%			;The world
	SETZ F,			;Load default flags
	MOVE P,[IOWD PLEN,STACK] ;Load stack pointer

	MOVE T1,[XWD CSBTPL,CSBLOK] ;Get BLT pointer for command state block
	BLT T1,CSBLOK+.CMGJB	;Move it to the command state block
	SETZM TAKJFN		;Not in a take file (any more)
	SETZM PRSJFN		;Not filename parsing (any more)

	MOVEI T1,NUSERS		;Load size of user table
	SKIPN USRTBL		;Is the user table already set up?
	MOVEM T1,USRTBL		;Save size of user table in the user table

	MOVEI T1,SPYDCI		;Load default spy interval
	SKIPN SPYINT		;Is one set?
	MOVEM T1,SPYINT		;Nope, set default

	MOVEI T1,LOGDCI		;[107] Load default spy interval
	SKIPGE LOGINT		;[113] Is one set (-1 at startup)?
	MOVEM T1,LOGINT		;[107] Nope, set default

	HRROI T1,LOGFIL		;Point to log file area
	HRROI T2,[ASCIZ/SYSTEM:LOGFILE.LOG/] ;Load default filespec
	SKIPN LOGFIL		;Is log file spec set up?
	CALL ISOUT		;(T1,T2/T1) Set it up now

	HRROI T1,SPYSLD		;Point to spy log file area
	HRROI T2,[ASCIZ/SYSTEM:ACJ-SPY/] ;Load default filespec
	SKIPN SPYSLD		;Is spy log file spec set up?
	CALL ISOUT		;(T1,T2/T1) Set it up now

	MOVEI T1,PRIMDB		;Load default begin time
	SKIPN PRIMEB		;Prime time begin set?
	MOVEM T1,PRIMEB		;No, set it now
	MOVEI T1,PRIMDE		;Load default end time
	SKIPN PRIMEE		;Prime time end set?
	MOVEM T1,PRIMEE		;No, set it now

	GJINF%			;Get this job's information
	MOVEM T1,OURUNO		;Save our user number for later
	MOVEI T1,.PRIIN		;Load primary terminal
	MOVEI T2,.MORLW		;Read line width
	MTOPR%			;Get the terminal line width
	 ERSKP.			;Skip if error
	CAIGE T3,^D40		;At least 40?
	MOVEI T3,^D40		;Don't look bad if width zero
	MOVEM T3,LINWID		;Save this here for later use

;	JRST COM1		;Start scanning commands
	SUBTTL Commands -- Top Level

;Here when ready to read a command from the terminal.

COM1:	MOVEI T2,[FLDDB. .CMINI] ;Get init function
	CALL COMANE		;(T2/T1,T2,T3) Do it

;See if we are doing a TAKE file and if so process another line out of it.

	CALL TAKCHK		;(/) Read a line from the TAKE file

;Here on a reparse

COM2:	SKIPE T1,PRSJFN		;Is there a parse JFN?
	RLJFN%			;Yes, release it please
	 ERNOP.			;Ignore errors
	SETZM PRSJFN		;No parse JFN any more

	MOVE P,[IOWD PLEN,STACK] ;Load stack pointer
	MOVEI T2,[FLDDB. .CMKEY,,CMDTBL,<a command,>] ;Point to commands
	CALL COMANE		;(T2/T1,T2,T3) Get a command
	HRRZ T2,(T2)		;Get dispatch address
	CALL (T2)		;(/) Do it
	JRST COM1		;Loop for more commands
	SUBTTL Commands -- Disable Command

;DISABLE (function) ALL|name

DODISA:	NOISE (function)	;Set noise words in front of the user
	MOVEI T2,[FLDDB. .CMKEY,,FUNTBL,<a function,>,,[
		  FLDDB. .CMKEY,CM%SDH,ALLTBL,<ALL for all functions>]]
	CALL COMANE		;(T2/T1-T3) Get a command
	HRRZ P3,(T2)		;Get the function code (or 0 for all)
	MOVEI P1,-FUNKEY(T2)	;Get address of enable bits
	CALL CONFIR		;(/) Confirm that please

;Single function specified, disable it and return.

	JUMPE P3,DODIS3		;Jump if ALL specified
	HRRZS FUNCTB(P1)	;Zero the left half of this entry
	RET			;Return

;All functions specified, disable all of them and return.

DODIS3:	MOVE T1,FUNAOB		;Load -number,,0
	DO.			;For each function
	  HRRZS FUNCTB(T1)	;Zero an entry into the table
	  AOBJN T1,TOP.		;Loop for all of them
	OD.			;End of clearing loop
	RET			;Return to get more commands
	SUBTTL Commands -- Enable Command

;ENABLE (function) ALL|name switch

DOENAB:	NOISE (function)	;Set noise words in front of the user
	MOVEI T2,[FLDDB. .CMKEY,,FUNTBL,<a function,>,,[
		  FLDDB. .CMKEY,CM%SDH,ALLTBL,<ALL for all functions>]]
	CALL COMANE		;(T2/T1-T3) Get a command
	HRRZ P3,(T2)		;Get the function code (or 0 for all)
	MOVEI P1,-FUNKEY(T2)	;Get offset for this function bits
	MOVE P2,ENADEF		;Load default bits to set in the mode word

;Parse profile keywords after function name.

DOENA1:	MOVEI T2,[FLDDB. .CMCFM,,,,,[
		FLDDB. .CMKEY,,ENATBL,<a profile keyword,>]]
	CALL COMANE		;(T2/T1-T3) Parse a switch or confirm
	LDB T3,[POINTR .CMFNP(T3),CM%FNC] ;Load the function parsed
	CAIN T3,.CMCFM		;Was it the confirm?
	JRST DOENA2		;Yep, it certainly was this time

	HRRZ T2,(T2)		;Load the address of the word with bits in it
	SKIPN T2,(T2)		;Skip if there is a bit to set
	IFSKP.			;There was a bit to set
	  TDO P2,T2		;Set the bit please
	  JRST DOENA1		;Loop until confirm seen
	ENDIF.			;Otherwise it must be "NO", parse keyword
	MOVEI T2,[FLDDB. .CMKEY,,ENANOT,<a profile keyword,>]
	CALL COMANE		;(T2/T1,T2,T3) Get the thing parsed
	HRRZ T2,(T2)		;Load address where the bits are
	TDZ P2,(T2)		;Clear specified bit
	JRST DOENA1		;Loop until confirm seen

;Bits for this function are now in P2, if single function set them and return.

DOENA2:	JUMPE P3,DOENA3		;Loop for all of them if ALL specified
	HLLM P2,FUNCTB(P1)	;Set bits the word where bits go today
	RET			;Return happily to the caller

;All functions specified, set each one of them with bits in P2 and return.

DOENA3:	MOVE T1,FUNAOB		;Load number of -functions,,0
DOENA4:	HLLM P2,FUNCTB(T1)	;Zero an entry into the table
	AOBJN T1,DOENA4		;Loop for all of them
	RET			;Return to get more commands
	SUBTTL Commands -- Help Command

;HELP (message)

DOHELP:	NOISE (message)		;Parse noise word por favor
	CALL CONFIR		;(/) Confirm the command, maybe log or echo it
	HRROI T1,TEXTBU		;Point to text buffer
	CALL OCRLF		;(T1/T1) Start with crlf
	HRROI T2,[VERSIO]	;Point to version string 
	CALL ISOUT		;(T1,T2/T1) Append version of this program 
	HRROI T2,HLPTXT		;Point to text
	CALL ISOUT		;(T1,T2/T1) Append that help text next
	CALL PTEXT		;(/) Print all of that on the terminal

	MOVSI T3,-HLPNUM	;Get number of elements in table
HELPLP:	HRRO T1,COMHLP(T3)	;Get pointer to help text
	PSOUT%			;Tell that one
	AOBJN T3,HELPLP		;Loop for all commands
	CALLRET PCRLF		;(/) Output extra crlf and return

HLPTXT:	ASCIZ/ commands:

/
	SUBTTL Commands -- Save Command

;SAVE (program in) ACJ.EXE

DOSAVE:	NOISE (program in)	;Mumble

;See if there is any functions enabled.

	MOVE T1,FUNAOB		;Load -number,,0
	MOVX T2,FU%ENA		;Load enable bits to test
	DO.			;For each function
	  TDNE T2,FUNCTB(T1)	;Is this function enabled?
	  EXIT.			;Get out, there is at least one enabled
	  AOBJN T1,TOP.		;Loop for all of them
	  EMSG <No functions enabled> ;This isn't making sense
	  RET			;Return now
	OD.			;So, there is at least function enabled	

;Parse the rest of the command.

	MOVE T1,[XWD SAVGTJ,GTJBLK] ;Make BLT pointer for source GTJFN
	BLT T1,GTJBLK+.GJF2	;Copy GTJFN block over there
	MOVEI T2,[FLDDB. .CMFIL,CM%SDH,,<filename to save into>]
	CALL COMANE		;(T1/T1-T3) Get filename
	MOVEM T2,PRSJFN		;Save JFN for a sec
	CALL CONFIR		;(/) Confirm that please

;Save ourselves as a runnable access control policy program.

	HRROI T1,TEXTBU		;Point to text buffer
	CALL OSPACE		;(T1/T1) Start with a space please
	MOVE T2,PRSJFN		;Load the JFN today
	CALL OJFNS		;(T1,T2/T1) Send the saved filename
	HRROI T2,[ASCIZ/ Saved
/]				;Label the preceeding filename
	CALL ISOUT		;(T1,T2/T1) Send that along as the end

	MOVEI T1,ASTART		;Load new start address
	HRRM T1,EV		;Save as new start address
IFE DBUGSW,HRRM T1,EV+1		; and as reenter address

	MOVE T1,PRSJFN		;Load the JFN back
	SETZM PRSJFN		;Don't try to release the JFN later
	HRLI T1,.FHSLF		;This fork
	MOVX T2,SS%CPY!SS%RD!SS%EXE!FLD(-SAVCNT,SS%NNP)!FLD(0,SS%FPN)
	SSAVE%			;Save our image
	 JSERRO (<Cannot create image>,,R) ;Owie!

	CALL PTEXT		;(/) Output the "saved" message

	HALTF%			;Halt the ACJ fork
	JRST .-1		;Don't allow continue
	SUBTTL Commands -- Set Command

;SET keyword value

DOSET:	MOVEI T2,[FLDDB. .CMKEY,,SETTBL,<item to set,>]
	CALL COMANE		;(T2/T1-T3) Get a set command
	MOVEI P1,-SETKEY(T2)	;Get offset for this function bits
	HRRZ T2,(T2)		;Get dispatch address
	CALLRET (T2)		;(/) Do it and return
	SUBTTL Commands -- Set Command -- Access Log File

;SET ACCESS-LOG-FILE str:<dir>file.typ

SETALF:	MOVE T1,[XWD ALFGTJ,GTJBLK] ;Make BLT pointer for source GTJFN
	BLT T1,GTJBLK+.GJF2	;Copy GTJFN block over there
	MOVEI T2,[FLDDB. .CMFIL,CM%SDH,,<filespec for access control logging>,SYSTEM:LOGFILE.LOG]
	CALL COMANE		;(T1/T1,T2,T3) Get filename
	MOVEM T2,PRSJFN		;Save JFN for a sec
	CALL CONFIR		;(/) Confirm that please

	HRROI T1,LOGFIL		;Point to log directory area
	MOVE T2,PRSJFN		;Load the JFN back, COM2 will release it
	MOVX T3,JS%PAF!FLD(.JSAOF,JS%DEV)!FLD(.JSAOF,JS%DIR)!FLD(.JSAOF,JS%NAM)!FLD(.JSAOF,JS%TYP)
	JFNS%			;Make a string out of that
	 JSERRO (<Can't make access control filespec string>)
	RET			;Return to get more commands
	SUBTTL Commands -- Set Command -- Log File Cache Sweep Interval

;SET LOG-FILE-CACHE-INTERVAL n (seconds)

SETLFI:	NOISE (seconds)		;[107] Mumble

	MOVEI T2,[FLDDB. .CMNUM,CM%SDH,^D10,<cache sweep interval in seconds>] ;[107]
	CALL COMANE		;[107] (T2/T1-T3) Parse that number
	SKIPL P1,T2		;[113] Skip if greater than zero or zero
	IFSKP.			;[107] If zero or less
	  EMSG <Interval must be non-negative number> ;[113] Owie
	  RET			;[107] Return now
	ENDIF.			;[107] End of error code

	CALL CONFIR		;[107] (/) Confirm that command
	MOVEM P1,LOGINT		;[107] Save log file interval time
	RET			;[107]  and return
	SUBTTL Commands -- Set Command -- Prime Time

;SET PRIMT-TIME-BEGIN hh:mm
;SET PRIME-TIME-END hh:mm

SETPTB:	MOVEI T2,[FLDDB. .CMTAD,CM%SDH,CM%ITM!CM%NCI!CMTADB,<time in form hh:mm>]
	CALL COMANE		;(T2/T1,T2,T3) Parse that time
	CALL CONFIR		;(/) Confirm that

	MOVE T2,CMTADB+2	;Load the time in seconds since midnight
	HRRZM T2,@SETDAT(P1)	;Save the time
	RET			; and return
	SUBTTL Commands -- Set Command -- Spy Check Interval

;SET SPY-CHECK-INTERVAL n (seconds)

SETSCI:	NOISE (seconds)		;Mumble

	MOVEI T2,[FLDDB. .CMNUM,CM%SDH,^D10,<spy interval in seconds>]
	CALL COMANE		;(T2/T1-T3) Parse that number
	SKIPLE P1,T2		;Skip if greater than zero
	IFSKP.			;If zero or less
	  EMSG <Interval must be positive number>
	  RET			;Return now
	ENDIF.			;End of error code

	CALL CONFIR		;(/) Confirm that command
	MOVEM P1,SPYINT		;Save spy interval time
	RET			; and return
	SUBTTL Commands -- Set Command -- Spy Log Directory

;SET SPY-LOG-DIRECTORY str:<dir>file

SETSLD:	MOVE T1,[XWD SLDGTJ,GTJBLK] ;Make BLT pointer for source GTJFN
	BLT T1,GTJBLK+.GJF2	;Copy GTJFN block over there
	MOVEI T2,[FLDDB. .CMFIL,CM%SDH,,<directory to save spy logs into>,SYSTEM:ACJ-SPY]
	CALL COMANE		;(T1/T1-T3) Get filename
	MOVEM T2,PRSJFN		;Save JFN for a sec
	CALL CONFIR		;(/) Confirm that please

	HRROI T1,SPYSLD		;Point to spy log directory area
	MOVE T2,PRSJFN		;Load the JFN back, COM2 will release it
	MOVX T3,JS%PAF!FLD(.JSAOF,JS%DEV)!FLD(.JSAOF,JS%DIR)!FLD(.JSAOF,JS%NAM)
	JFNS%			;Make a string out of that
	 JSERRO (<Can't make spy log filespec string>)
	RET			;Return to get more commands
	SUBTTL Commands -- Show Command

;SHOW ALL|FUNCTION [ALL|fun]|SETTING [ALL|setting]|USER [ALL|user]

DOSHOW:	MOVEI T2,[FLDDB. .CMKEY,,SHOTBL,<item to show,>,ALL] ;Parse keyword
	CALL COMANE		;(T2/T1-T3) Parse that please
	HRRZ T2,(T2)		;Load address to dispatch to
	CALLRET (T2)		;(/) Perform show function and return

;Here for SHOW ALL, confirm it first.  Show all possible things.
;Returns +1 always with all possible things showed.

DOSHOA:	CALL CONFIR		;(/) Confirm this event
	CALL SHOSEA		;(/) Show settings all
	CALL SHOFUA		;(/) Show functions all
	CALLRET SHOUSA		;(/) Show user all and return
	SUBTTL Commands -- Show Command -- Show Functions

;Here for SHOW FUNCTION ALL|function.

DOSHOF:	MOVEI T2,[FLDDB. .CMKEY,,FUNTBL,<a function,>,ALL,[
		  FLDDB. .CMKEY,,ALLTBL,<ALL for all functions>]]
	CALL COMANE		;(T2/T1,T2,T3) Parse that
	DMOVE P2,T2		;Save entry from table and which adr used
	CALL CONFIR		;(T1/T1) Confirm it
	HRRZ T2,(P2)		;Get rh of returned keyword entry
	JUMPE T2,SHOFUA		;(/) Use routine to perform ALL

	MOVEI P1,-FUNKEY(P2)	;Load offset for this function
	MOVE T2,FUNCTB(P1)	;Load the function enable bits
	TXNN T2,FU%ENA		;Is it enabled?
	SKIPA T2,[-1,,[ASCIZ/ Disabled function /]] ;Disabled function
	HRROI T2,[ASCIZ/ Enabled function /] ;Enabled function
;	CALLRET SHOFUN		;(T2,P1/) Yes, a function, send it and return

;Here to show information about a single function.
;Call with
;	T2/ pointer to ASCIZ starting text
;	P1/ function offset (into FUNKEY, etc.)
;Returns +1 always

SHOFUN:	HRROI T1,HEADBU		;Point to text buffer buffer
	CALL ISOUT		;(T1,T2/T1) Start off with this
	HLRO T2,FUNKEY(P1)	;Load name of this function string
	CALL ISOUT		;(T1,T2/T1) Append function name string
	MOVE T4,ENAAOB		;Load -n,,0 where n is the count of ENATBL
	DO.			;Loop through elements in table
	  HRRZ T3,ENAKEY(T4)	;Point to flag word
	  MOVE T3,(T3)		;Get that word with the bits in it
	  TDNN T3,FUNCTB(P1)	;Is this bit lit for this function?
	  IFSKP.		;Yes, tell me about this one
	    HRROI T2,[ASCIZ/, /] ;Load seperator
	    CALL ISOUT		;(T1,T2/T1) Append that
	    HLRO T2,ENASHO(T4)	;Point to string
	    CALL ISOUT		;(T1,T2/T1) Append that
	  ENDIF.		;End of output code
	  AOBJN T4,TOP.		;Loop for all function profile bits
	OD.			;End of loop
	CALL OCRLF		;(T1/T1) Append in a crlf
	CALLRET SHOWIT		;(/) Output all of that and return
;Show all enabled and disabled functions.
;Returns +1 always.

SHOFUA:	HRROI P3,[ASCIZ/The following functions are enabled:
	/]			;Start the list off right with this text
	MOVE P4,[TXNN T3,FU%ENA] ;Load instruction to execute
	CALL SHOFU2		;(T1,P3,P4/) Show all of the enabled ones

	HRROI P3,[ASCIZ/The following functions are disabled:
	/]			;Load initial text
	MOVE P4,[TXNE T3,FU%ENA] ;Load instruction to execute
;	CALLRET SHOFU2		;(T1,P3,P4/) Show all of the disabled ones

;Worker routine for SHOFUA, shows all enabled or disabled functions.
;Call with 
;	P3/ pointer to identifier string
;	P4/ TXN% T3,FU%ENA
;Returns +1 always, P1 and P3 smashed

SHOFU2:	MOVE P1,FUNAOB		;Load -functions,,0
	DO.			;Loop for all functions
	  MOVE T3,FUNCTB(P1)	;Load enable bits from the table
	  XCT P4		;Skip if we should show this one
	  IFSKP.		;Yes, show this one
	    MOVE T2,P3		;Load the next prepending text
	    HRROI P3,[ASCIZ/	/] ;Point to tab for next one
	    CALL SHOFUN		;(T2,P1/) Show this function
	  ENDIF.		;End of Missouri (show me) code
	  AOBJN P1,TOP.		;Loop for all function
	OD.			;End of for all functions loop
	RET			; and return when done
	SUBTTL Commands -- Show Command -- Show Settings

;Here for SHOW SETTINGS.

DOSHOS:	MOVEI T2,[FLDDB. .CMKEY,,SETTBL,<a setting,>,ALL,[
		  FLDDB. .CMKEY,,ALLTBL,<ALL for all settings>]]
	CALL COMANE		;(T2/T1,T2,T3) Parse that
	DMOVE P2,T2		;Save entry from table and which adr used
	CALL CONFIR		;(T1/T1) Confirm it
	HRRZ T2,(P2)		;Get rh of returned keyword entry
	JUMPE T2,SHOSEA		;(/) If ALL then use special routine
	MOVEI P1,-SETKEY(P2)	;Load offset of entry from table
	HRROI P3,[ASCIZ/ /]	;Load pointer to just a space string
;	CALLRET SHOSET		;(P1,P3/) Show settings and return

;Here to show program settings.
;Call with P1/ offset to SETTBL P3/ string for beginning of each line
;Returns +1 always.

SHOSET:	HRROI T1,HEADBU		;Point to text buffer buffer
	MOVE T2,P3		;Load initial text first
	CALL ISOUT		;(T1,T2/T1) Send it first
	HLRO T2,SETSHT(P1)	;Load text to print first
	CALL ISOUT		;(T1,T2/T1) Send that
	HRRZ T3,SETSHT(P1)	;Load address of routine to call
	MOVE T2,@SETDAT(P1)	;Get the data itself to pass to show routine
	CALL (T3)		;(T1,T2/T1) Show this item
	CALL OCRLF		;(T1/T1) Append a CRLF to all of that
	CALLRET SHOWIT		;(/) Show all of that and return

;Here to show all program settings.
;Returns +1 always.
	
SHOSEA:	HRROI T1,[ASCIZ/The following program settings are in effect:
/]				;Load the header
	PSOUT%			;Type it on terminal
	HRROI P3,[ASCIZ/	/] ;Load pointer to a tab
	MOVSI P1,-SETNUM	;Load -ive things to show,,0
	DO.			;Loop for all things to show
	  CALL SHOSET		;(P1,P3/) Send one to terminal
	  AOBJN P1,TOP.		;Loop for all of them
	OD.			;End of loop
	RET			;Return
	SUBTTL Commands -- Show Command -- Show User

;Here for SHOW USER ALL|wildusername.

DOSHOU:	MOVEI T2,[FLDDB. .CMKEY,,USRTBL,<a user profile,>,ALL,[
		  FLDDB. .CMKEY,CM%SDH,ALLTBL,<ALL for all user profiles>]]
	CALL COMANE		;(T2/T1,T2,T3) Parse that
	DMOVE P2,T2		;Save entry from table and which adr used
	CALL CONFIR		;(T1/T1) Confirm it
	HRRZ T2,(P2)		;Get rh of returned keyword entry
	JUMPE T2,SHOUSA		;(/) If it was ALL use special routine
	MOVEI P1,-USRKEY(P2)	;Load offset of entry from table
	HRROI T2,[ASCIZ/ /]	;Load prepending text
;	CALLRET SHOUSR		;(T2,P1/) Do just this user please

;Here to display information about a single user.
;Call with T2/ prepending text, P1/ offset into user table.
;Returns +1 always.

SHOUSR:	HRROI T1,HEADBU		;Point to text buffer
	CALL ISOUT		;(T1,T2/T1) Start with prepended text
	HRROI T2,[ASCIZ/User /]	;Label the next string
	CALL ISOUT		;(T1,T2/T1) Start off with this
	HLRO T2,USRKEY(P1)	;Load pointer to username string
	CALL ISOUT		;(T1,T2/T1) Append username string

	MOVE T4,USEAOB		;Load -n,,0
	DO.			;Loop through elements in table
	  HRRZ T2,USESHO(T4)	;Get dispatch address
	  CALL (T2)		;(T1,T3,P1/T1,P1) Output that
	  AOBJN T4,TOP.		;Loop for all function profile bits
	OD.			;End of loop
	CALL OCRLF		;(T1/T1) Append in a crlf
	CALLRET SHOWIT		;(/) Print that and return
;Here to show user profile that happens to be a bit.
;Output "keyword" if bit (in data word) is lit in profile.
;Call with T1/ output pointer, T4/ USExxx offset, P1/ USRxxx offset
;Returns +1 always with T1/ updated

SHOBIT:	HRRZ T3,USEKEY(T4)	;Load address of this keyword's flag word
	HRRZ T2,USRKEY(P1)	;Load offset into profile table
	MOVE T2,USRPRO(T2)	;Load user profile bits into T3
	XOR T2,USEDEF		;Set not-default bits to 1
	TDNN T2,(T3)		;Does this user not have default?
	RET			;Default, return now
	HRROI T2,[ASCIZ/, /]	;Load seperator
	CALL ISOUT		;(T1,T2/T1) Append that
	HRRZ T2,USRKEY(P1)	;Have to say something, load profile offset
	MOVE T2,USRPRO(T2)	;Load user profile bits
	TDNE T2,(T3)		;Skip if the bit is not lit
	IFSKP.			;If bit is off
	  HRROI T2,[ASCIZ/no /]	;Load no keyword
	  CALL ISOUT		;(T1,T2/T1) Just say no
	ENDIF.			;End of no code
	HLRO T2,USESHO(T4)	;Point to string
	CALLRET ISOUT		;(T1,T2/T1) Append that and return

;Here to show user profile that happens to be a decimal number.
;Output "keyword n", data word is byte pointer with 0 address.
;Call with T1/ output pointer, T4/ USExxx offset, P1/ USRxxx offset
;Returns +1 always with T1/ updated

SHODEC:	HRRZ T2,USEKEY(T4)	;Load address of byte pointer
	MOVE T2,(T2)		;Get bp into T2
	HRRZ T3,USRKEY(P1)	;Load offset into profile table
	HRRI T2,USRPRO(T3)	;Load user profile bits address into T3
	LDB T3,T2		;Get the value 
	JUMPE T3,R		;Return if zero
	HRROI T2,[ASCIZ/, /]	;Load seperator
	CALL ISOUT		;(T1,T2/T1) Append that
	HLRO T2,USESHO(T4)	;Point to string
	CALL ISOUT		;(T1,T2/T1) Append that 
	CALL OSPACE		;(T1/T1) A space next please
	MOVE T2,T3		;Reload the value
	CALLRET ODEC		;(T1,T2/T1) Output that and return
;Here when SHOW USER ALL command.
;Returns +1 always.

SHOUSA:	HLRZ P1,USRTBL		;Point to user table
	JUMPE P1,R		;Return if no user defined
	IMUL P1,[XWD -1,0]	;Make -users,,0
	HRROI P3,[ASCIZ/The following user profiles are defined:
	/]			;Label following
	DO.			;Loop to show user profiles
	  MOVE T2,P3		;Load the prependin text
	  HRROI P3,[ASCIZ/	/] ;Load a tab for the next one
	  CALL SHOUSR		;(T2,P1/) Show user profile
	  AOBJN P1,TOP.		;Loop for all of them
	OD.			;End of loop for each user profile
	RET			;Return
	SUBTTL Commands -- Show Command -- Show Text On Terminal

;Here to display show text on terminal based on its line width.
;Call with HEADBU/ ASCIZ text
;Returns +1 always.

;ACs:	T1/ destination pointer (TEXTBU)
;	T2/ source pointer (HEADBU)
;	T3/ current character
;	T4/ space available on this line
;	Q1/ copy of T1 at last space character
;	Q2/ copy of T2 at last space character

SHOWIT:	SAVEAC <Q1,Q2>		;Preserve these two ACs
	MOVE T1,[POINT 7,TEXTBU] ;Point to destination buffer
	MOVE T2,[POINT 7,HEADBU] ;Point to source buffer

SHOWI1:	MOVE T4,LINWID		;Load maximum characters per line
SHOWI2:	ILDB T3,T2		;Load a source byte
	IDPB T3,T1		;Store it in destination
	JUMPE T3,PTEXT		;Publish if a null seen

	CAIE T3,.CHLFD		;Is it a linefeed
	CAIN T3,.CHCRT		; or a return?
	JRST SHOWI1		;Yes, reset line counter and continue
	CAIN T3,","		;Is it a comma?
	DMOVEM T1,Q1		;Yes, remember where the last comma was
	CAIN T3,.CHTAB		;Is it a tab?
	SUBI T4,7		;Yes, account for it as 8 positions always
	SOJG T4,SHOWI2		;Loop for all characters on the line

	MOVE T1,Q1		;Reload destination pointer after space char
	HRROI T2,[BYTE(7).CHCRT,.CHLFD,.CHTAB,.CHTAB,0] ;Text is cr lf tab tab
	CALL ISOUT		;(T1,T2/T1) Break the line here
	MOVE T2,Q2		;Reload source pointer
	MOVE T4,LINWID		;Reload the terminal width
	SUBI T4,^D16		; account for those two tabs
	JRST SHOWI2		;  and reenter the loop
	SUBTTL Commands -- Take Command

;TAKE (commands from) file.typ

DOTAKE:	SKIPN TAKJFN		;Are we in a TAKE now?
	IFSKP.			;Yes
	  EMSG (Nested TAKE commands are illegal)
	  JRST TAKEOF		;Abort this take command
	ENDIF.			;That's all

	NOISE (commands from file) ;Mumble
	MOVE T1,[XWD TAKGTJ,GTJBLK] ;Make BLT pointer for source GTJFN
	BLT T1,GTJBLK+.GJF2	;Copy GTJFN block over there
	MOVEI T2,[FLDDB. .CMFIL,CM%SDH,,<take filename>]
	CALL COMANE		;(T1/T1-T3) Get filename
	MOVEM T2,PRSJFN		;Save JFN
	CALL CONFIR		;(/) Confirm that command

;Open up the file, set the I/o JFNs and so forth, and then return.

 	MOVE T1,PRSJFN		;Load JFN again
	MOVX T2,<FLD(7,OF%BSZ)!OF%RD> ;Read 7-bit bytes
	OPENF%			;Pry it open
	 ERJMP COMERR		;Error, return
	SETZM PRSJFN		;Don't release the JFN now
	MOVEM T1,TAKJFN		;Reload that JFN please
	MOVE T1,TAKGTJ+.GJSRC	;Load .NULIO,,.NULIO JFNs
	MOVEM T1,CSBLOK+.CMIOJ	;That is the input JFN now
	RET			;Return for all commands
;Routine to call after call to .CMINI function to process take file.
;Returns +1 always

TAKCHK:	SKIPN T1,TAKJFN		;Do we have a take JFN?
	RET			;Nope, return now
	HRROI T2,CMDBUF		;Point to command buffer
	MOVEI T3,<CBUFSZ*5>-1	;Load characters we can supply to buffer
	MOVEI T4,.CHLFD		;Load terminating character

;Loop reading one command from the file.  Check for hyphen at end of line.

TAKCH1:	SIN%			;String INput
	 ERJMP TAKEOF		;Check for EOF if error
	CAILE T3,<CBUFSZ*5>-4	;Have at least 3 characters been read?
	JRST TAKCH5		;Nope, no continuation possible
	MOVNI Q1,3		;Backup by this many bytes
	ADJBP Q1,T2		;Point back three
	ILDB Q2,Q1		;Get character two back
	CAIE Q2,"-"		;Hyphen?
	JRST TAKCH5		;No, cannot be continuation then
	ILDB Q2,Q1		;Get the next character
	CAIN Q2,.CHCRT		;Was it a return?
	JRST TAKCH1		;Yes, get the next line also please

;Entire command line has been read now, set up CSB, echo command, and return.

TAKCH5:	MOVEI T4,<CBUFSZ*5>-1	;Load mas possible characters transferred
	SUB T4,T3		;Compute number stored in buffer
	MOVEM T4,CSBLOK+.CMINC	;Save that as number of unparsed characters
	MOVEI T3,0		;Load a null character
	IDPB T3,T2		;Insure a null at end of text string
	MOVE T1,CSBLOK+.CMRTY	;Load the pointer to prompt string
	PSOUT%			;Send that to the terminal please
	HRROI T1,CMDBUF		;Point to command buffer again
	PSOUT%			;Send it to the terminal
	RET			;Back in the saddle again
;Come here when error reading from take file.  If IOX4 it must be the end of
;the take file, otherwise give error message.  Then close the TAKE file and go
;to COM1 to start getting commands from the terminal.

TAKEOF:	CALL GETERR		;(/T2) Get last error code into T2
	CAIE T2,IOX4		;Is it end of file on take command?
	OJSERR (<Error reading command file>) ;Nope, mumble about error instead

	HRROI T1,TEXTBU		;Point to text buffer
	HRROI T2,[ASCIZ/[End of /] ;Point bracket and start of message
	CALL ISOUT		;(T1,T2/T1) Send that along
	MOVE T2,TAKJFN		;Reload the JFN
	CALL OJFNS		;(T1,T2/T1) Send along the filename
	HRROI T2,[ASCIZ/]
/]				;Point to bracket cr lf string
	CALL ISOUT		;(T1,T2/T1) Send that along
	CALL PTEXT		;(/) Send all of that to terminal
	CALL TAKCLS		;(/) Close out the take file JFN
	JRST COM1		;Restart command

;Here to close TAKE file.
;Returns +1 always.

TAKCLS:	SKIPN T1,TAKJFN		;Reload the file's JFN
	RET			;None there
	CLOSF%			;Close it
	 ERCAL TAKCL3		;Maybe it wasn't open
	SETZM TAKJFN		;No more JFN
	MOVE T1,CSBTPL+.CMIOJ	;Load the primary input JFN
	MOVEM T1,CSBLOK+.CMIOJ	;That is the input JFN now
	RET

TAKCL3:	MOVE T1,TAKJFN		;Reload the JFN
	RLJFN%			;Release it
	 ERNOP.			;HFO?
	RET			;Return to above
	SUBTTL Commands -- User Command

;USER name profile

;AC usage in this routine
;	P2/ accumulated profile
;	P3/ offset to USExxx tables 

DOUSER:	MOVEI T2,[FLDDB. .CMUSR,CM%SDH,,<Username to set profile for>,,[
		  FLDBK. .CMFLD,CM%SDH,,<Wild user specification to set profile for>,,USRBRK]]
	CALL COMANE		;(T2/T1-T3) Parse username field
	LDB T3,[POINTR .CMFNP(T3),CM%FNC] ;Load the function parsed
	HRROI T1,USRSTR		;Place to keep user string
	CAIE T3,.CMFLD		;Was it the field parse?
	IFSKP.			;Yes
	  HRROI T2,ATMBUF	;Point to atom buffer source
	  CALL ISOUT		;(T1,T2/T1) Copy the user name down there 
	ELSE.			;Otherwise it was the username parse
	  CALL ODIRST		;(T1,T2/T1) Send username in there
	ENDIF.			;End of field/username parse code
	MOVE P2,USEDEF		;Load the default profile for a user 

;Get this user's profile.

DOUSE1:	MOVEI T2,[FLDDB. .CMCFM,,,,,[
		  FLDDB. .CMKEY,,USETBL,<a user profile keyword,>]]
	CALL COMANE		;(T2/T1-T3) Parse a keyword or confirm
	LDB T3,[POINTR .CMFNP(T3),CM%FNC] ;Load the function parsed
	CAIN T3,.CMCFM		;Was it the confirm?
	JRST DOUSE2		;Yep, it certainly was this time

	MOVEI P3,-USEKEY(T2)	;Load offset for USExxx tables
	CALL @USEPRS(P3)	;(P2,P3/P2) Parse this field
	JRST DOUSE1		;Loop for more keywords or confirm
;Here when we are ready to store this user's profile.

DOUSE2:	HLRZ T4,USRTBL		;Load entry count of table
	IMULI T4,USRCHR/5	;Compute offset into username storage area
	HRROI T1,USRSTG(T4)	;Point to storage area
	HRROI T2,USRSTR		;Point to atom buffer string we copied earlier
	CALL ISOUT		;(T1,T2/T1) Send that as the user name string

;See if user already in table.

	MOVEI T1,USRTBL		;See if this user is in the table
	HRROI T2,USRSTG(T4)	;Load the address of the string
	TBLUK%			;Is the user in the table already?
	 ERJMP DOUSE3		;Nope
	TXNE T2,TL%EXM		;Exact match for user in table?
	JRST DOUSE4		;Yep

;Add user to table.

DOUSE3:	MOVEI T1,USRTBL		;Point to user table
	HLRZ T2,USRTBL		;Get the offset again
	HRLI T2,USRSTG(T4)	;Get address of string,,offset
	TBADD%			;Add it to the table
	 JSERRO (<Cannot add user to table>)

;Set profile bits of user, entry address is now in T1 (from TBLUK or TBADD).

DOUSE4:	HRRZ T1,(T1)		;Load the entry offset for this user
	MOVEM P2,USRPRO(T1)	;Store new profile word
	RET			;Return for more commands
;Here to parse format field that is just a bit.
;"NO keyword" clears the bit an "keyword" sets the bit.
;Call with P2/ accumulated format bits, P3/ offset to USExxx 
;Returns +1 always with P2/ updated bits

PRSBIT:	HRRZ T2,USEKEY(P3)	;Load the address of the word with bits in it
	SKIPN T2,(T2)		;Skip if there is a bit to set
	IFSKP.			;There was a bit to set
	  TDO P2,T2		;Set the bit please
	  RET			;Loop until confirm seen
	ENDIF.			;Otherwise it must be "NO", parse keyword
	MOVEI T2,[FLDDB. .CMKEY,,USENOT,<a user profile keyword,>]
	CALL COMANE		;(T2/T1,T2,T3) Get the thing parsed
	HRRZ T2,(T2)		;Load address where the bits are
	TDZ P2,(T2)		;Clear specified bit
	RET			;Return to loop until confirm seen

;Here when parsing a keyword followed by a number.
;Call with P2/ accumulated format bits, P3/ offset to USExxx 
;Returns +1 always with P2/ updated bits

PRSDEC:	MOVEI T2,[FLDDB. .CMNUM,,^D10] ;Get a decimal number
	CALL COMANE		;(T2/T1,T2,T3) Parse that
	HRRZ T1,USEKEY(P3)	;Load address of data word
	MOVE T1,(T1)		;Load the data which is the byte pointer
	TXO T1,P2		;Address to store in is P2
	DPB T2,T1		;Store the value
	RET			;Return for more
	SUBTTL Commands -- Write Command

;WRITE (commands to) acjprofile.com.-1

DOWRIT:	NOISE (commands to)	;Mumble about this
	MOVE T1,[XWD WRIGTJ,GTJBLK] ;Make BLT pointer for source GTJFN
	BLT T1,GTJBLK+.GJF2	;Copy GTJFN block over there
	MOVEI T2,[FLDDB. .CMFIL,CM%SDH,,<filename to write profile to>]
	CALL COMANE		;(T1/T1-T3) Get filename
	MOVEM T2,PRSJFN		;Save JFN
	CALL CONFIR		;(/) Confirm that command
;Open the file and write a header to it.

	MOVE P2,PRSJFN		;Reload the JFN we parsed
	SETZM PRSJFN		;Don't let anyone else try to release it
	CALL WRIOPN		;(P2/) Open the file
	 CALLRET WRICLS		;(P2/) Error, return
	CALL WRIHDR		;(P2/) Construct header text in TEXTBU
	CALL WRITXT		;(P2/) Write that to the file

;Write program settings.

	MOVSI P1,-SETNUM	;Load -ive things to show,,0
	DO.			;Loop for all things to show
	  CALL WRISET		;(P1/) Send one line information to text buffer
	  CALL WRITXT		;(P2/) Send that to the file
	  AOBJN P1,TOP.		;Loop for all items
	OD.			;End of loop

;Write function settings.

	MOVE P1,FUNAOB		;Load number of functions to do
	DO.			;Loop for each function
	  CALL WRIFUN		;(P1/) Show this function to text buffer
	  CALL WRITXT		;(P2/) Send the text buffer to the file
	  AOBJN P1,TOP.		;Loop for all function
	OD.			;End of for each function loop

;Write user profiles.

	HLRZ P1,USRTBL		;Point to user table
	IFN. P1			;If there are userd defined today
	  IMUL P1,[XWD -1,0]	;Make -users,,0
	  DO.			;Loop for each user
	    CALL WRIUSR		;(P1/) Show user profile to buffer
	    CALL WRITXT		;(P2/) Send that text to the file
	    AOBJN P1,TOP.	;Loop for all of them
	  OD.			;End of short loop
	ENDIF.			;End of user write code

	CALLRET WRICLS		;(P2/) Close JFN and return
	SUBTTL Commands -- Write Command -- Write Settings

;Here to write all program settings.
;Returns +1 always with TEXTBU filled.

WRISET:	HRROI T1,TEXTBU		;Point to text buffer
	HRROI T2,[ASCIZ/Set /] ;Load initial text
	CALL ISOUT		;(T1,T2/T1) Send that
	HLRO T2,SETKEY(P1)	;Load text to print first
	CALL ISOUT		;(T1,T2/T1) Send that
	CALL OSPACE		;(T1/T1) Space it out
	HRRZ T3,SETSHT(P1)	;Load address of routine to call
	MOVE T2,@SETDAT(P1)	;Get the data itself to pass to show routine
	CALL (T3)		;(T1,T2/T1) Show this item
	CALLRET OCRLF		;(T1/T1) Append a CRLF to all of that
	SUBTTL Commands -- Write Command -- Write User Profiles

;Here to display information about a single user, P1/ offset into USRTBL.
;Returns +1 always with TEXTBU set up.

WRIUSR:	HRROI T1,TEXTBU		;Point to text buffer
	HRROI T2,[ASCIZ/User /]	;Label the next string
	CALL ISOUT		;(T1,T2/T1) Start off with this
	HLRO T2,USRKEY(P1)	;Load username string
	CALL ISOUT		;(T1,T2/T1) Append username string
	MOVE T4,USEAOB		;Load AOB pointer to user profile table (-n,,0)
	DO.			;Loop through elements in table
	  CALL @USEWRI(T4)	;(T1,T4,P1/T1,T4,P1) Call routine to write
	  AOBJN T4,TOP.		;Loop for all function profile bits
	OD.			;End of loop
	CALLRET OCRLF		;(T1/T1) Append in a crlf and return

;Here to write user profile that happens to be a bit.
;Call with T1/ string pointer, T4/ USEKEY offset, P1/ USRKEY offset
;Returns +1 always, T1/ updated

WRIBIT:	HRRZ T3,USEKEY(T4)	;Load address of the flags mask for this bit
	HRRZ T2,USRKEY(P1)	;Load offset into profile table
	MOVE T2,USRPRO(T2)	;Load user profile
	XOR T2,USEDEF		;Set non-default bit setting to 1
	TDNN T2,(T3)		;Is the bit not the default setting?
	RET			;Bit is default setting, say nothing
	CALL OSPACE		;(T1/T1) Output a space
	HRRZ T2,USRKEY(P1)	;Have to say something, load profile offset
	MOVE T2,USRPRO(T2)	;Load user profile bits
	TDNE T2,(T3)		;Skip if the bit is not lit
	IFSKP.			;If bit is off
	  HRROI T2,[ASCIZ/NO#/]	;Load NO keyword
	  CALL ISOUT		;(T1,T2/T1) Just say no
	ENDIF.			;End of no code
	HLRO T2,USEKEY(T4)	;Point to string containing keyword
	CALLRET ISOUT		;(T1,T2/T1) Append that keyword and return

;Here to write user profile that happens to be a decimal number.
;Call with T1/ string pointer, T4/ USEKEY offset, P1/ USRKEY offset
;Returns +1 always, T1/ updated

WRIDEC:	HRRZ T2,USEKEY(T4)	;Get address of the data
	MOVE T2,(T2)		;Get the byte pointer which is the data word
	HRRZ T3,USRKEY(P1)	;Load offset into profile table
	HRRI T2,USRPRO(T3)	;Load user profile address
	LDB T3,T2		;Get the data
	JUMPE T3,R		;Return if its zero
	CALL OSPACE		;(T1/T1) Space first
	HLRO T2,USEKEY(T4)	;Point to string containing keyword
	CALL ISOUT		;(T1,T2/T1) Append that keyword
	CALL OSPACE		;(T1/T1) Output a space next
	MOVE T2,T3		;Reload the value
	CALLRET ODEC		;(T1,T2/T1) Make it decimal and return
	SUBTTL Commands -- Write Command -- Write Function Profiles

;Here to show information about a single function, P1/ function offset
;Returns +1 always with TEXTBU set up.

WRIFUN:	HRROI T1,TEXTBU		;Point to text buffer
	MOVE T3,FUNCTB(P1)	;Load bits for this function
	HRROI T2,[ASCIZ/Enable /] ;Assume enabled
	TXNN T3,FU%ENA		;Skip if this is true
	HRROI T2,[ASCIZ/Disable /] ;The function is disabled
	CALL ISOUT		;(T1,T2/T1) Start off with this
	HLRO T2,FUNKEY(P1)	;Load function name string
	CALL ISOUT		;(T1,T2/T1) Append function name string
	TXNN T3,FU%ENA		;Is this function enabled?
	CALLRET OCRLF		;(T1/T1) Nope, output crlf and return now

	MOVE T4,ENAAOB		;Load -n,,0
	DO.			;Loop through elements in table
	  HRRZ T3,ENAKEY(T4)	;Point to flag word
	  MOVE T3,(T3)		;Get that word with the bits in it
	  MOVE T2,FUNCTB(P1)	;Load the profile word for this bit
	  XOR T2,ENADEF		;Set not equal bits to one
	  TDNN T2,T3		;Skip if the bit is not set to default value
	  IFSKP.		;Yes, need keyword output
	    CALL OSPACE		;(T1/T1) Output a space
	    HRROI T2,[ASCIZ/NO#/] ;Load NO keyword
	    TDNN T3,FUNCTB(P1)	;Skip if the bit is lit
	    CALL ISOUT		;(T1,T2/T1) Just say no
	    HLRO T2,ENAKEY(T4)	;Point to keyword string
	    CALL ISOUT		;(T1,T2/T1) Append that
	  ENDIF.		;OK, done with that one
	  AOBJN T4,TOP.		;Loop for all function profile bits
	OD.			;End of loop
	CALLRET OCRLF		;(T1/T1) Append in a crlf
	SUBTTL Commands -- Write Command -- File Header

;Here to write a header to the file for later use.
;Call with P2/ file jfn
;Returns +1 always, TEXTBU/ header

WRIHDR:	HRROI T1,TEXTBU		;Point to text buffer
	HRROI T2,[ASCIZ/! /]	;Start with header string
	CALL ISOUT		;(T1,T2/T1) Start with this please
	HRROI T2,[VERSIO]	;Point to version string
	CALL ISOUT		;(T1,T2/T1) Append that text next
	HRROI T2,[ASCIZ/ profile written by /] ;Label the user who did this
	CALL ISOUT		;(T1,T2/T1) Start with this please
	MOVE T2,OURUNO		;Load our user number
	CALL ODIRST		;(T1,T2/T1) Send that text next
	HRROI T2,[ASCIZ/ at /]	;Label the time
	CALL ISOUT		;(T1,T2/T1) Append that text next
	CALL OODTIN		;(T1/T1) Send current date and time
	CALLRET OCRLF		;(T1/T1) Output a crlf and return
	SUBTTL Commands -- Write Command -- Fill and Write Line to File

;Here to send command in text buffer to the file, makes 79 character lines.
;Changes "#" to spaces that are not broken across lines.
;Call with
;	P2/ JFN
;	TEXTBU/ ASCIZ text
;Returns +1 always.

;ACs:	T1/ destination pointer (HEADBU)
;	T2/ source pointer (TEXTBU)
;	T3/ current character
;	T4/ space available on this line
;	Q1/ copy of T1 at last space character
;	Q2/ copy of T2 at last space character

WRITXT:	SAVEAC <Q1,Q2>		;Get some more scratch storage
	MOVE T1,[POINT 7,HEADBU] ;Point to destination buffer
	MOVE T2,[POINT 7,TEXTBU] ;Point to source buffer

WRITX1:	MOVEI T4,WRICPL		;Load maximum characters per line
WRITX2:	ILDB T3,T2		;Load a source byte
	CAIE T3,"#"		;Nonbreakable space?
	SKIPA CX,T3		;Nope, use origional character
	MOVEI CX," "		;Yes it is, make it a space please
	IDPB CX,T1		;Store it in destination
	JUMPE T3,WRITX5		;Get out if a null seen

	CAIE T3,.CHCRT		;Is it a return
	CAIN T3,.CHLFD		; or linefeed?
	JRST WRITX1		;Yes, reset line counter and continue
	CAIN T3," "		;Is it a space?
	DMOVEM T1,Q1		;Yes, remember where the last space was
	SOJG T4,WRITX2		;Loop for all characters on the line

	MOVE T1,Q1		;Reload destination pointer after space char
	HRROI T2,[BYTE(7)"-",.CHCRT,.CHLFD,.CHTAB,0] ;Point to dash cr lf tab
	CALL ISOUT		;(T1.T2/T1) Break the line here
	MOVE T2,Q2		;Reload source pointer
	MOVEI T4,WRICPL-^D8	; and reload the character counter
	JRST WRITX2		;  and reenter the loop

WRITX5:	MOVE T1,P2		;Load JFN of the file
	HRROI T2,HEADBU		;Point to the text buffer
	SETZB T3,T4		;Terminate on a null please
	SOUT%			;Send that to the file
	 JSERRO (<Can't write file>,<CALL WRICLS>,COM1) ;Owie
	RET			;Return to caller
	SUBTTL Commands -- Write Command -- Open/Close File

;Here to open the file for writing all profile commands into.
;Call with P2/ JFN
;Returns +1 if error
;Returns +2 if success

WRIOPN:	MOVE T1,P2		;Load JFN 
	MOVX T2,<FLD(7,OF%BSZ)!OF%WR> ;Write 7-bit bytes
	OPENF%			;Pry it open
	 JSERRO (<Can't open file to write>,,R) ;Error, punt and return +1
	RETSKP			;Skip return

;Here to close the file we are writing
;Call with P2/ JFN
;Returns +1 always with file closed.

WRICLS:	MOVE T1,P2		;Load the JFN again
	CLOSF%			;Close it please
	 ERSKP.			;Skip if error
	RET			;Return
	MOVE T1,P2		;Load the JFN back
	RLJFN%			;Release it now
	 ERNOP.			;Well I tried
	RET			;Return
	SUBTTL Commands -- Command Subroutines 

;Here to parse something using COMND JSYS.
;Call with T2/ address of command function block chain
;Returns +1 if no parse
;Returns +2 if parsed OK

COMAND:	MOVEI T1,CSBLOK		;Point to command state block
	COMND%			;Parse that function please
	 ERJMP COMAN3		;Owie if error!
	TXNN T1,CM%NOP		;Error during confirm parse?
	AOS (P)			;Nope, give skip return
	RET			;Nope, return OK

COMAN3:	CALL GETERR		;(/T2) Get last error code
	CAIN T2,IOX4		;Is it "End of file reached"?
	JRST COM1		;Yes, handle it by going to COM1
	RET			;No, return

;Call CONFIR to parse a confirm, echo command if in take file.
;Returns +1 always, goes to COMERR if there is a problem.

CONFIR:	MOVEI T2,[FLDDB. .CMCFM] ;Point to confirm function
;	CALLRET COMANE		;(T2/T1-T3) Get the function done and return

;Here to perform a COMND JSYS function and go to COMERR if error.
;Call with T2/ function block
;Returns +1 always (goes to COMERR if there is a problem).

COMANE:	CALL COMAND		;(T2/T1-T3) Do the function
	 JRST COMERR		;Give error message
	RET			;Return to caller

;Here when some kind of command error.

COMERR:	OJSERR (<Command error>) ;Nope, an owie instead of EOF
	JRST COM1		;Reset stack and continue parsing commands
	SUBTTL Access Control -- Initialization

	LOWCD			;Switch back to low seg

ASTART:	RESET%			;Init the world again
	MOVX F,FL%ACJ!FL%NOI	;Running as the ACJ now, no ints for now
	MOVE P,[IOWD PLEN,STACK] ;Load stack pointer
	SETZM LOGJFN		;No log file because of reset above
	SETZM SPYFWZ		;Zero first word to zero
	MOVE T1,[SPYFWZ,,SPYFWZ+1] ;Load BLT pointer to clear
	BLT T1,SPYLWZ		;Clear storage (including old fork handles!)

;Call various initialization routines.

	CALL INICAP		;(/) Turn on capabilities
	CALL INICON		;(/) Get configuration information

	CALL NEWLOG		;(/) Get a new log file JFN and put stuff in it
	CALL INIMID		;(/) Set interrupt for midnight
	CALL INILFF		;(/) Set interrupt for log file cache sweeps

	CALL DEFFNC		;(/) Get defaults for all functions
	CALL ENAFNC		;(/) Enable the access control functions

	JRST MAIN		;Start processing access control requests 
	SUBTTL Access Control -- Initialization -- Capabilities and Interrupts

;Here to enable capabilities and PI system.

INICAP:	MOVEI T1,.FHSLF		;Read this fork's capabilities
	RPCAP%			;Read Process CAPabilities
	TRNN T2,SC%WHL!SC%OPR	;Must be able to set wheel or operator today
	BUG(HLT,NEP,<Not enough privs available>) ;Crash
	MOVE T3,T2		;Enable all capabilities
	EPCAP%			;Enable Process CAPabilities
	 ERJMP [BUG(HLT,CEP,<Can't enable privs>)] ;Crash

	MOVEI T1,.FHSLF		;For this fork
	MOVE T2,[LEVTAB,,CHNTAB] ;Point to level and channel table
	SIR%			;Set the interrupt table addresses
	MOVX T2,ONCHNS		;For these channels
	AIC%			;Activate Interrupt Channels
	EIR%			;Enable interrupt system
	MOVX T1,<.TICCC,,CCCHAN> ;Load code for control c and control c channel
	ATI%			;Attach terminal interrupt character
	 JSERRO (<Could not enable control-C trapping>)

	MOVEI T1,.MSIIC		;Load ignore increment mount count function
	MSTR%			;Now we don't have to mount structures
	 JSERRO (<Could not ignore increment mount counts>)
	RET			;Return
	SUBTTL Access Control -- Initialization -- Configuration

;Get configuration information today.

INICON:	GJINF%			;Get job information for us
	MOVEM T1,OURUNO		;Save our user number
	MOVEM T3,OURJOB		;Save our job number

	MOVEI T1,.NDGLN		;Function to read local node name
	MOVEI T2,T3		;Argument block address
	HRROI T3,OURNAM		;Point to storage
	NODE%			;Get our local node name
	 ERNOP.			;What?

	MOVX T1,RC%EMO		;Exact match only
	HRROI T2,[ASCIZ/OPERATOR/] ;For this user
	RCUSR%			;Get operator user number
	 ERSKP.			;[112] Skip if error
	MOVEM T3,OPRUNO		;Save operator user number

	MOVE T1,[SIXBIT/PTYPAR/] ;Name of table telling how many PTYs
	SYSGT%			;Get number of PTYs,, TTY number of first PTY
	HRRZM T1,TTYPTY		;Put TTY number of first PTY here
	HLRZM T1,MAXPTY		;Put number of PTYs here

	MOVX T1,<1,,.LOGDE>	;Get LOGDES+1
	GETAB%			; which is the designator for job 0 output
	IFNJE.			;If no error getting it
	  TXZ T1,.TTDES		;Make it just a line number
	  MOVEM T1,CTYLNO	; and save it as the CTY line number
	ENDIF.			;End of GETAB worked code

	RET			;Return for more work
	SUBTTL Access Control -- Initialization -- Access Control Functions

;Here to enable trapping of access control functions that are enabled by the
;access control profile phase.  All access control functions listed in our
;table are enabled (if FU%ENA) after disabling all functions.
;Returns +1 always.

ENAFNC:	CALL DISFNC		;(/) First clear all enabled functions
	MOVE T4,FUNAOB		;Load -ive count of functions,,0
	DO.			;Loop for all functions
	  MOVEI T1,.SFSOK	;Set GETOK function
	  MOVE T2,FUNTMO(T4)	;Load default for this 
	  TXO T2,SF%EOK		;Light the enable bit for this function
	  HRR T2,FUNKEY(T4)	;Get function code
	  TXNE T2,.GOUSR	;Is it a user function code?
	  HRRI T2,.GOUSR	;Yes, make it just 1B18 please
	  MOVE T3,FUNCTB(T4)	;Load enable bits
	  TXNE T3,FU%ENA	;Enable this function?
	  SMON%			;Yes, enable the function
	   IFNJE.		;If no JSYS error
	     TXO T3,FU%GOK	;Record we are now fully awake for the 1st time
	   ELSE.		;If a JSYS error
	     TXZ T3,FU%GOK	;Then we didn't enable GETOKs for this one
	     HRROI T1,TEXTBU	;Point to usual text place this rainy afternoon
	     HRROI T2,[ASCIZ/Can't enable /] ;Start out mess 
	     CALL ISOUT		;(T1,T2/T1) Start with that string
	     HLRO T2,FUNKEY(T4)	;Point to text describing function
	     CALL ISOUT		;Send that along next please
	     HRROI T2,[ASCIZ/: /] ;Start out mess 
	     CALL ISOUT		;(T1,T2/T1) Start with that string
	     CALL GETERR	;(/T2) Get last error
	     HRROI CX,TEXTBU	;Point to text buffer now
	     CAIE T2,SMONX2	;"Invalid SMON function" is OK
	     CALL JSERR1	;(CX/) Print the error message
	   ENDIF.		;End of that testing
	  MOVEM T3,FUNCTB(T4)	;Store the updated function bits
	  AOBJN T4,TOP.		;Loop for all functions in the table
	OD.			;End of function enable loop
	RET			;Return to caller with functions enabled
;Here to disable all access control functions we enabled.  Called when we crash
;and before enabling any functions.
;Returns +1 always.

DISFNC:	MOVE T4,FUNAOB		;Load -ive count of functions,,0
	DO.			;Loop for all functions we know about
	  MOVEI T1,.SFSOK	;Reload the SMON GETOK function code
	  HLL T2,FUNTMO(T4)	;Get the default action for this function
	  HRR T2,FUNKEY(T4)	;Get function code
	  TXNE T2,.GOUSR	;Is it a user function code?
	  HRRI T2,.GOUSR	;Yes, make it just 1B18 please
	  MOVE T3,FUNCTB(T4)	;Load enable bits for this function
	  TXZE T3,FU%GOK	;Were we enabled for this function?
	  SMON%			;Yes, disable the function
	   ERNOP.		;Ignore all errors for now
	  MOVEM T3,FUNCTB(T4)	;Store the bit back please
	  AOBJN T4,TOP.		;Loop for all functions in the table
	OD.			;End of loop
	RET			;Return to caller

;Here to remember the GETOK function settings for all functions on startup.
;Returns +1 always with FUNTMO set up

DEFFNC:	MOVE T4,FUNAOB		;Load the -n,,0 for the function table
	DO.			;For every function that we know today
	  MOVEI T1,.SFSOK	;Load the function for SMON
	  HRRZ T2,FUNKEY(T4)	;Load the function code
	  TXNE T2,.GOUSR	;Is it a user function code?
	  HRRI T2,.GOUSR	;Yes, make it just 1B18 please
	  TMON%			;Test MONitor
	   ERSKP.		;If error, function probably not in monitor
	  TDZA T2,[^-SF%DOK]	;Keep just the interesting bit for later use
	  MOVX T2,SF%DOK	;Allow whatever this is if TMON failed
	  MOVEM T2,FUNTMO(T4)	;Save the flag for resetting later
	  AOBJN T4,TOP.		;Do this for all of them
	OD.			;End of loop to get them
	RET			;Return now
	SUBTTL Access Control -- Processing Loop

;This is the main processing loop for access control.

MAIN:	TXZ F,FL%DEN!FL%UNU!FL%FAI!FL%NOI ;Clear flags set per request, OKINT
	SETZM ARGBLK		;Clear first word of argument block
	MOVE T1,[XWD ARGBLK,ARGBLK+1] ;Load BLT pointer to block
	BLT T1,ARGBLK+20	;Clear only first twenty words today

	MOVEI T1,ARGBLK		;Get address of answer block
	MOVEI T2,ARGLEN		;and length of block
	RCVOK%			;Get next function to check/log
	 ERJMP [BUG(HLT,NRA,<Could not receive access requests>)]
	TXO F,FL%NOI		;We got one, set noint flag

	TIME%			;[107] Get system uptime
	MOVEM T1,TODCLK		;[107] Save this for later use
	
	CALL FINDUS		;(/P3,P4) Try to find the job and user profile
	CALL FINDIT		;(/P1,P2,T2,T3) Try to find the request
	 CAIA			;Skip if illegal request with T2 and T3 setup
	CALL REQUES		;(P1,P2,P3,P4/T2,T3,Q1,P2) Perform the checking

	SKIPE T2		;Are we allowing the thing?
	AOSA NDENY		;Nope, count the deny
	AOS NALLOW		;Count the allow
	MOVE T1,ARGBLK+.RCRQN	;Get the request number
	GIVOK%			;Allow or deny request
	 ERJMP [BUG(HLT,FOK,<Failed to give OK>)] ;Hell is freezin' over 

	CALL WAITFO		;(Q1,P1,P2,P3,P4/) Wait only if needed today
	CALL LOGREQ		;(Q1,P1,P2,P3,P4/) Log this request or not

	TXZE F,FL%NLF		;Do we need a new log file?
	CALL NEWLOG		;(/) Yes, get a new log file
	SKIPLE LOGINT		;[113] Is the log file cache disabled?
	TXZE F,FL%SLF		;[107] Do we need to sweep log file cache?
	CALL SWPLOG		;[107] (/) Yes, sweep the log file cache now

	JRST MAIN		;Loop for more requests
	SUBTTL Access Control -- Processing Loop -- Find Function Profile

;Here to find the function offset for this request.
;Returns +1 if error, log text filled in and
;	T2/ error code
;	T3/ error string
;	P1/ 0 to indicate no profile found
;	P2/ contents of ENADEF (default bits for a function profile)
;Returns +2 if found and should be processed, with
;	P1/ offset into function tables
;	P2/ FUNCTB bits from tables

FINDIT:	HLRZ T1,ARGBLK+.RCFCJ	;Get function code to look for
	MOVE P1,FUNAOB		;Load number of functions built with
	DO.			;Looping to find the function code
	  MOVE P2,FUNCTB(P1)	;Load bits for this function
	  CAMN T1,FUNCOD(P1)	;Match this one
	  RETSKP		;Yes, return +2
	  AOBJN P1,TOP.		;Loop for all of them
	OD.			;Uh oh, it wasn't found

;Request is not found and is therefore illegal and will be denied.

	HRROI T2,[ASCIZ/illegal/] ;Load identification string
	CALL LOGSTA		;(T2/T1) Start a log file entry
	HRROI T2,[ASCIZ/, code /] ;Label for following number
	HLRZ T3,ARGBLK+.RCFCJ	;Get function code to report
	CALL OLOCT		;(T1,T2,T3/T1) Send that to logging text
	MOVEM T1,TEXTBP		;Save the pointer to to text buffer

	MOVEI T1,ERRILR		;Not found, illegal request
	HRROI T2,[ASCIZ/Unexpected request for access - denied/]
	SETZ P1,		;Indicate that none found, no logging
	MOVE P2,ENADEF		;Load default bits (hopefully logging)
	TXO F,FL%DEN		;Deny flag
	RET			;Deny whatever it was
	SUBTTL Access Control -- Processing Loop -- Find User Profile

;Try to find user profile for this request.
;Returns +1 always with USRSTR and JIBLK set up and
;	P3/ offset for user profile tables
;	P4/ USRPRO profile bits for this user

FINDUS:	SETZ P3,		;Load default which is user not found in table
	MOVE P4,USEDEF		;Load default bits to allow logins at least

;Fill in JIBLK which contains all information about the job for later checking.

	HRRZ T1,ARGBLK+.RCFCJ	;Get the job number
	MOVEI T4,JIBLK		;Point to job info block
	CALL GETINF		;(T1,T4/T4) Get job information
	 BUG(HLT,GIJ,<Can't get information on job>)

	HLRZ T1,ARGBLK+.RCFCJ	;Load the function again
	MOVE T3,ARGBLK+.RCARA	;Point to the supplied argument block address
	MOVE T3,.GELUN(T3)	;Get user number for login
	CAIN T1,.GOLOG		;Is it the login function?
	MOVEM T3,JIBLK+.JIUNO	;Yes, fix up GETJI argument block

;Find out the username, returning default P2 and P3 if error or illegal.

	HRROI T1,USRSTR		;Point to user string storage area
	MOVE T2,JIBLK+.JIUNO	;Load user number not from ARGBLK mind you
	CALL ODIRST		;(T1,T2/T1,T2) Send that to the username string
	TLNN T2,-1		;Not logged in or unknown user?
	RET			;Yes, return +1 now with P3 and P4 defaulted

;Find user in our database, returning default P2 and P3 if not found.

	MOVEI T1,USRTBL		;Point to the usr keyword table
	HRROI T2,USRSTR		;Point to string to compare against
	CALL WTBLUK		;(T1,T2/T1,T2,T3) Do a wild TBLUK function
	TXNE T2,TL%NOM		;No match?
	RET			;Return P3 and P4 as defaults
	HRRZ P3,(T1)		;Return the offset into USRPRO and such tables
	MOVE P4,USRPRO(P3)	;Reload the profile bits
	RET			;Skip return with P1 through P4 set up
	SUBTTL Access Control -- Processing Loop -- Check Request

;Here to check on the request, called with
;	P1/ offset into function tables
;	P2/ FUNCTB bits from tables
;	P3/ offset for user profile tables
;	P4/ USRPRO profile bits for this user
;Returns +1 always, T2 and T3/ set up for GIVOK

REQUES:	HLRO T2,FUNLOG(P1)	;Point to name of this function
	CALL LOGSTA		;(T2/T1) Start filling in log information

	MOVE Q1,ARGBLK+.RCARA	;Point to argument block
	HRRZ T2,FUNLOG(P1)	;Load address of the routine
	CALL (T2)		;(T1,Q1,P1,P2,P3,P4/T1) Fill in the log text
	MOVEM T1,TEXTBP		;Store updated pointer

	TXNE P2,FU%POL		;Enforce policy for this function?
	IFSKP.			;No, just allow (or deny) always
	  SETZB T2,T3		;Assume we will allow this
	  MOVE T4,FUNTMO(P1)	;Load TMON bits for this function
	  TXNE T4,SF%DOK	;Should we allow this?
	  RET			;Yes, allow the function
	  TXO F,FL%DEN		;Light the deny bit please
	  MOVEI T2,400000	;Deny the request
	  HRROI T3,[ASCIZ/Denied by access control facility/]
	  RET			;Deny the request
	ENDIF.			;Otherwise call routine to test policy

	CALL @FUNTST(P1)	;(Q1,P1,P2,P3,P4/T2,T3) Should be allowed?
	IFSKP.			;Skip means yes
	  CALL USRPOL		;(Q1,P1,P2,P3,P4/T2,T3) Should be allowed?
	  ANSKP.		;Skip means yes
	    SETZB T2,T3		;Yes, allow the request
	    RET			; and return
	ENDIF.			;Deny the request, insure T2 and T3 are OK
	TRNE T2,400000		;Is this a legal error code?
	TLNE T2,-1		;Cannot have bits in left half
	MOVEI T2,ERRAEC		;Illegal access control code
	TLC T3,-1		;Check the left half
	TLCE T3,-1		;Is it -1,,address?
	HRROI T3,[ASCIZ/Denied by access control facility/] ;Generic message
	RET			;Return ready for GIVOK JSYS
	SUBTTL Access Control -- Processing Loop -- Wait for failure

;Here to perform special checks after a request has been disposed of.
;Called with
;	Q1/ ARGBLK+.RCARA ("user" argument block for .Gxxxx offsets)
;	P1/ offset into function tables
;	P2/ FUNCTB bits from tables (FU%xxx)
;	P3/ offset for user profile tables
;	P4/ USRPRO profile bits for this user (US%xxx)
;Returns +1 always.

WAITFO:	HLRZ T1,ARGBLK+.RCFCJ	;Get function code

;Check for login or attach complete.

	CAIE T1,.GOLOG		;Was it a login ?
	CAIN T1,.GOATJ		; or an attach?
	IFNSK.			;Yes
	  MOVEI T1,^D1000	;Wait a sec...
	  DISMS%		; for the job to LOGIN or not
	  HRRZ T1,ARGBLK+.RCFCJ	;Get this job number
	  HRROI T2,T4		;Want one word returned in T4
	  MOVEI T3,.JIUNO	;Job's user number
	  GETJI%		;Get it
	   ERNOP.		;Ignore error for now
	  TRNE T4,-1		;Did user get logged in?
	  RET			;So then return
	  TXO F,FL%FAI		;Nope, failed
	  AOS NFAIL		;Count the failed attempt
	  RET			; and then return
	ENDIF.			;It wasn't a login or attach

;[122] Check for functions that must cause a log file sweep.

	CAIN T1,.GOHSY		;[125] HSYS setting?
	CALLRET HSYLOG		;[125] (Q1/) Please set a timer interrupt then

	CAIN T1,.GOMDD		;[122] Is it a MDDT entry?
	TXO F,FL%SLF		;[122] Yes, sweep the log file

;Other special waits should go here.

	RET			;Return
	SUBTTL Access Control -- Processing Loop -- Log Request

;Here to possibly send the request to the log file.
;Call with P2/ function bits

LOGREQ:	MOVE T1,TEXTBP		;Point to text buffer today please
	HRROI T2,[ASCIZ/ [Denied]/] ;Load denied indicator
	TXNE F,FL%DEN		;Denied?
	CALL ISOUT		;(T1,T2/T1) Yes book 'em
	HRROI T2,[ASCIZ/ [Unusual]/] ;Load unusual indicator
	TXNE F,FL%UNU		;Unusual?
	CALL ISOUT		;(T1,T2/T1) Yes tell me so
	HRROI T2,[ASCIZ/ [Failed]/] ;Load failed indicator
	TXNE F,FL%FAI		;Failed?
	CALL ISOUT		;(T1,T2/T1) Yes the unfortunate consequences
	CALL OCRLF		;(T1/T1) Append a CRLF to all of that stuff
	CALLRET USRLOG		;(P1,P2,P3,P4/) Log if desired
	SUBTTL Access Control -- Subroutines -- Wild TBLUK Routine

;Routine to do a wild TBLUK function.
;Call with TBLUK% ACs:
;	T1/ address of table
;	T2/ byte pointer to string to be compared with strings in table
;Returns +1 always
;	T1/ address of entry that matches or would have
;	T2/ Recognition flags (TL%NOM and TL%EXM being the interesting ones)

WTBLUK:	SAVEAC <Q1,Q2,Q3>	;Save ACs to save calling arguments in
	DMOVE Q1,T1		;Copy the ACs over to the Qs
	TBLUK%			;Look this user up
	 ERNOP.			;Never ITRAPs, but be careful anyway
	TXNE T2,TL%EXM		;Exact match?
	RET			;Yes, return T1, T2, T3

	MOVEI Q3,(T1)		;Save address to be returned if no match
	MOVEI T4,(T1)		;Load address returned by TBLUK%
	DO.			;Start looping through the table backwards
	  MOVEI T1,.WLSTR	;Load wild string match function
	  HLRO T2,(T4)		;Point to the ASCIZ user argument
	  HRROI T3,USRSTR	;Point to username to compare against
	  WILD%			;Try and match this one
	   ERNOP.		;Never is supposed to ITRAP, but ya never know
	  IFN. T1		;If no match
	    CAIE T4,1(Q1)	;Was this the last entry in the table?
	    SOJA T4,TOP.	;Nope, keep looking
	    MOVEI T1,(Q3)	;Return address where the TBLUK wanted it to be
	    MOVX T2,TL%NOM	;Return no match bit 
	    RET			;Return +1 always
	  ENDIF.		;Otherwise it must have matched
	OD.			; so fall out of the loop
	MOVEI T1,(T4)		;Point to the entry that matched today
	MOVX T2,TL%EXM		;Return exact match flag for caller
	RET			;Return +1 always
	SUBTTL Access Control -- Subroutines -- Get User Information

;Here to find out all about a job.
;Call with T1/ job, T4/ address of our GETJI block
;Returns +1 always if GETJI% error
;Returns +2 if no error in the GETJI%, and with following:
;	GETJI block, NTINFB+.NWTTF, NTBLK, and MORSPW set up, T4 preserved

GETINF:	SAVEAC <Q1,Q2,Q3>	;Save the Qs
	MOVEI T2,(T4)		;Point to start of block
	HRLI T2,-<.JIMAX+1>	;Load size of this block
	SETZ T3,		;All info
	GETJI%			;Get info on this job
	 ERJMP R		;Return +1 if error here

;Got basic job info, now get job origin information.

	SETZM NTBLK(T4)		;Insure first work is zero for local lines
	MOVX T1,<NW%NNT>B17	;Load default which is non network terminal
	MOVEM T1,NTINFB+.NWTTF(T4) ;Save this in case NTINF JSYS fails
	SETZM MORSPW(T4)	;Clear returned speed word

;Danger Will Robinson!  Since NTINF% will give you a free null at the end of
;the origin string if it is a LAT terminal in older (6.1 and early 7.0)
;monitors, we cannot just write the string to our output pointer.  We have
;write to it NTBLK instead and copy it to the output pointer later.

	HRROI T1,NTBLK(T4)	;Point to place to store the string
	MOVEM T1,NTINFB+.NWNNP(T4) ;Save output pointer
	MOVE T2,.JIJNO(T4)	;Load job number
	MOVEM T2,NTINFB+.NWLIN(T4) ;Save job number for NTINF
	DMOVE T1,[EXP .NWNU1+1,.NWRRH] ;Load size of arg block and arg type
	DMOVEM T1,NTINFB+.NWABC(T4) ;Save size of the block and arg block type
	MOVEI T1,NTINFB(T4)	;Load address of information block
	NTINF%			;Get information on this user
	 ERJMP GETIN1		;If error, assume local terminal

;Check result, if non network terminal we say nothing.

	MOVE T2,NTINFB+.NWTTF(T4) ;Load returned type and flags
	LDB T3,[POINT 9,NTINFB+.NWTTF(T4),17] ;(no symbol for this field)
	CAIE T3,NW%NNT		;Non network terminal?
	JRST GETIN2		;Nope, a network terminal
;	JRST GETIN1		;Fall through if non network terminal
;Here if the line appears to be a non network (front end) terminal.

GETIN1:	SKIPGE .JICPJ(T4)	;Is this a PTY job?
	SKIPGE T1,.JITNO(T4)	; or is this a detached job?
	RETSKP			;Yes, return now
	TXO T1,.TTDES		;Make designator out of terminal number
	MOVEI T2,.MORSP		;Read terminal speed word
	MTOPR%			;Read terminal speed
	 ERJMP RSKP		;Return now if error
	MOVEM T3,MORSPW(T4)	;Return to the user for later
	RETSKP			;Now return

;Here if the line appears to be a network terminal.  If name found copy it to
;the output pointer.  If name not known, but network type is, return a properly
;formatted number.

GETIN2:	MOVEI T1,NTBLK(T4)	;Point to place where we stored the string
	HRLI T1,(POINT 7)	;Make a pointer to that please
	TXNE T2,NW%NNN		;No name known for this network terminal?
	JRST GETIN3		;Yes, print a number instead
	MOVE T3,T1		;Get current pointer
	DO.			;Find the end of that name string
	  ILDB T2,T3		;Load a character
	  JUMPN T2,TOP.		;Loop if not a null
	OD.			;End of null search loop
	MOVNI T1,1		;Load a -1
	ADJBP T1,T3		;Back up one so we can write over the null
	JRST GETIN7		;Nope, name known, add type next

;Here when network name not known.

GETIN3:	CAIN T3,NW%TCP		;Unknown TCP host connection?
	JRST GETIN4		;Yes, do it
	CAIN T3,NW%DNA		;Unknown DECnet host connection?
	JRST GETIN5		;Yes, handle it
	CAIN T3,NW%LAT		;Unknown LAT connection?
	JRST GETIN6		;Yes
	RET			;None of those return with T1 unchanged
	
;Here if its a TCP connection, output "0.0.0.0".

GETIN4: CALL OSPACE		;(T1/T1) Send a space along next
	MOVEI Q1,4		;Load number of octets to print
	MOVE Q2,[POINT 8,NTINFB+.NWNNU(T4),3] ;Make ILDB pointer to data
	DO.			;For each octet
	  ILDB T2,Q2		;Load a TCP octet
	  CALL ODEC		;(T1,T2/T1) Output a octet in decimal
	  SOJG Q1,GETIN7	;(T1/T1) Output connection type
	  HRROI T2,[ASCIZ/./]	;Point to a dot
	  CALL ISOUT		;(T1,T2/T1) Append that to the string
	  JRST TOP.		;Loop for all octets
	OD.			;End of TCP loop

;Here if its a DECnet connection, output "0.0".

GETIN5: CALL OSPACE		;(T1/T1) Send a space along next
	LDB T2,[POINT 6,NTINFB+.NWNNU(T4),25] ;Get area of DECnet node number
	CALL ODEC		;(T1,T2/T1) Print it
	HRROI T2,[ASCIZ/./]	;Load a pointer to a dot
	CALL ISOUT		;(T1,T2/T1) Output the dot next
	LDB T2,[POINT 10,NTINFB+.NWNNU(T4),35] ;Get node number part
	CALL ODEC		;(T1,T2/T1) Output that and return
	CALLRET	GETIN7		;(T1/T1) Output connection type and return

;Here if it is a LAT connection, output "00-00-00-00-00-00".

GETIN6: CALL OSPACE		;(T1/T1) Send a space along next
	MOVEI Q1,6		;Load number of hex bytes to print
	MOVE Q2,[POINT 8,NTINFB+.NWNNU(T4)] ;Make ILDB pointer to data
	MOVX T3,NO%LFL!NO%ZRO!FLD(2,NO%COL)!FLD(^D16,NO%RDX) ;Hex output
	DO.			;For each octet
	  ILDB T2,Q2		;Load a TCP octet
	  NOUT%			;Output that hex digit
	   ERNOP.		;Ignore errors for now
	  SOJG Q1,GETIN7	;(T1/T1) Output connection type and retutn
	  HRROI T2,[ASCIZ/./]	;Point to a dot
	  CALL ISOUT		;(T1,T2/T1) Append that to the string
	  JRST TOP.		;Loop for all octets
	OD.			;End of TCP loop
;Here to output type of connection from the table.

GETIN7:	HRRZ T2,NTINFB+.NWTTF(T4) ;(no symbol for this field) Get line type 
	MOVSI Q1,-OORSIZ	;Load number of things in table,,0
	DO.			;Loop for things in table
	  HRRZ Q2,OORTAB(Q1)	;Load type of connection from table
	  CAMN Q2,T2		;Match the type we want to hear about?
	  EXIT.			;Yes
	  AOBJN Q1,TOP.		;Loop for all of them
	  RETSKP		;Unknown type
	OD.			;End of loop
	HLRO T2,OORTAB(Q1)	;Match, load address of text
	CALL ISOUT		;(T1,T2/T1) Add that in 
	RETSKP			; and then skip return

;Table of network connection types for above code.

OORTAB:	TENTRY (<(NRT)>,NW%MC)	;MCB (NRT) terminal
	TENTRY (<(TCP)>,NW%TV)	;TVT (TCP) terminal
	TENTRY (<(CTM)>,NW%CH)	;CTERM terminal
	TENTRY (<(LAT)>,NW%LH)	;LAT terminal
	OORSIZ==.-OORTAB	;Make size of table
	SUBTTL Logging Routines -- Midnight Timer Routines

;Here on a timer interrupt at midnight to start a new log file.  See if we can
;do it now and if so do it, otherwise set a flag and do it later.
;Returns +1 always.

MIDNIT:	CALL MIDHAN		;(/) Handle the midnight interrupt
	DEBRK%			;Dismiss from interrupt

MIDHAN:	SAVEAC <T1,T2,T3,T4,Q1,Q2,Q3> ;Save all of the suspect ACs
	TXNE F,FL%NOI		;Are we NOINT?
	TXOA F,FL%NLF		;Yes, remember to do log file stuff later
	CALL NEWLOG		;(/) OKINT, get a new log file now please
;	CALLRET INIMID		;(/) Get back here again please at midnight

;Here to set the timer interrupt that goes off each night at midnight.
;Returns +1 always, T1-T4 smashed.

INIMID:	SETO T2,		;The time is now
	SETZ T4,		;No flags for this please
	ODCNV%			;Get all seperate pieces of time
	 JSERRO (<ODCNV failure>,,R) ;This will never happen I hope 
	HRRI T4,0		;Load time of midnight today
	IDCNV%			;Convert midnight today back to internal format
	 JSERRO (<IDCNV failed>,,R) ;This should never happen
	ADD T2,[1,,0]		;Get midnight tomorrow
	MOVX T1,<.FHSLF,,.TIMDT> ;Set interrupt at particular time
	MOVEI T3,MDCHAN		;Load channel number to interrupt on
	TIMER%			;Set the interrupt
	 JSERRO (<Failed to set midnight timer>) ;Too many timer blocks?
	RET			;Just return +1 no matter what happens
	SUBTTL Logging Routines -- System Shutdown Time Routines

;[125] Here when ACJ is initializing to get any possible HSYS time.
;Sets a TIMER for the time specified that the system will go down.
;Returns +1 always.

INIHSY:	MOVEI T1,.DWNTI		;[125] Load GETAB table for down time
	GETAB%			;[125] Get this from the monitor
	 SETZ T1,		;[125] Assume no shutdown if that failed
	MOVE T2,T1		;[125] Copy time to T2
	CALLRET HSSLOG		;[125] (T2/) Set a timer for that time please

;[125] Here when a GOHSY GETOK function has been processed.
;Call with Q1/ ARGBLK+.RCARA ("user" argument block for .Gxxxx offsets).
;Returns +1 always.

HSYLOG:	MOVE T2,.GESDT(Q1)	;[125] Load the shutdown time specified
;	CALLRET HSSLOG		;[125] (T2/) Set a timer interrupt at that time

;[125] Here to set a timer because we think the system will be shutdown.
;Call with T2/ time that the system is expected to be shutdown
;Returns +1 always.

HSSLOG:	MOVEI T3,HFCHAN		;[125] Load channel number to interrupt on

	SKIPN LOGHSY		;[125] Do we have a timer set now?
	IFSKP.			;[125] Yes, we do in fact
	  EXCH T2,LOGHSY	;[125] Save new time, get old time
	  MOVX T1,<.FHSLF,,.TIMDD> ;[125] Get function for delete and this fork
	  TIMER%		;[125] Remove the old interrupt time
	   ERNOP.		;[125] Ignore error for now
	  MOVE T2,LOGHSY	;[125] Get new time in T2 again
	ENDIF.			;[125] End of timer set previously code

	MOVEM T2,LOGHSY		;[125] Save time of expected HSYS
	JUMPE T2,R		;[125] Return now if shutdown canceled
	GTAD%			;[125] Get current date time
	ADDI T1,<<2,,0>/^D<60*60*24>> ;[125] Get time two seconds from now
	CAMGE T1,T2		;[125] Shutdown time is in the next 2 seconds?
	IFSKP.			;[125] Yes, don't set a timer
	  SETZM LOGHSY		;[125] Not expecting an interrupt now
	  TXO F,FL%NLF		;[125] Get a new log file now
	  RET			;[125]  and then return
	ENDIF.			;[125] End of shutdown in the near future code
	MOVX T1,<.FHSLF,,.TIMDT> ;[125] Set interrupt at time in T2
	TIMER%			;[125] Yes, please set the interrupt
	 ERNOP.			;[125] Not that important today anyway
	RET			;[125] Just return +1 no matter what happens
;[125] Here when timer interrupt goes off to get a new log file.  Does not get
;a new log file if we get the timer interrupt when we don't expect to get one.
;Does the work now if OKINT, sets flag to do it later if NOINT.

INTHSY:	SKIPE LOGHSY		;[125] Expecting system to go down?
	CALL HSYINT		;[125] (/) Yes, call routine to do the work
	DEBRK%			;[125] Return from interrupt

HSYINT:	SAVEAC <T1,T2,T3,T4,Q1,Q2,Q3> ;[125] Save all of the suspect ACs
	TXNE F,FL%NOI		;[125] Are we NOINT?
	TXOA F,FL%NLF		;[125] Yes, remember to do log file stuff later
	CALL NEWLOG		;[125] (/) A new broom sweeps the best
	RET			;[125] Return from interrupt
	SUBTTL Logging Routines -- Initialization of Log File

;Routine to get a JFN on a new log file.
;Returns +1 always.

NEWLOG:	CALL CLOLOG		;(/) First try and close any old file
	CALL NAMLOG		;[124] (/) Get a new log file name	

;[107] Open a JFN up and then get the resulting filename for later use.

	MOVX T1,GJ%SHT!GJ%FOU	;Load new log file bits
	HRROI T2,LOGFNA		;[124] Point to log file spec
	GTJFN%			;Try getting new file JFN
	 JSERRO (<Can't get JFN for log file>,<SETZ T1,>) ;Owie, return T1/ 0
	MOVEM T1,LOGJFN		;[107] Save the JFN (zero if none)
	JUMPE T1,R		;[107] Return now if no log file JFN
	MOVE T2,T1		;[110] Copy JFN of the log file
	HRROI T1,LOGFNA		;[110] Point to log file area
	MOVX T3,JS%SPC		;[110] We want the entire filespec por favor
	JFNS%			;[110] Get the filename we are using
	 ERNOP.			;[110] Ignore errors for now

;[107] Open up the log file, set pointers to it, write header, and return.
	
	CALL OPNLOG		;[107] (/) Open up that log file now
	CALL NPTLOG		;[107] (/) Set up new log file cache pointers
	CALL SECLOG		;(T1/T1) Make the log file secure
	SETZM LOGLIN		;We have written no lines to this file
	SETZM LOGPAG		;We have written no pages to this file
	CALLRET HDRLOG		;[107] (/) Get a new header on the log file
;Local routine for NEWLOG to make a log file secure, call with T1/ JFN
;Returns +1 always.

SECLOG:	SKIPN T1,LOGJFN		;[124] Reload the JFN of the log file
	RET			;[124] Log file not open now
	TXO T1,CF%NUD!FLD(.FBCTL,CF%DSP) ;Load the FBCTL word
	MOVX T2,FB%SEC		;The secure bit mask
	MOVX T3,FB%SEC		;We want the secure bit to be set
	CHFDB%			;Set the file secure
	 ERNOP.			;Don't care about errors
	RET			;Return +1 always

;[124] Local routine for NEWLOG to create a new log file name.
;The log filename is made by by moving the LOGFIL string into LOGFNA,
;replacing the character "*" with a string to output the time.
;Returns +1 always, LOGFNA set up.

NAMLOG:	SETZM LOGFTI		;[124] Be sure to get a fresh time if needed
	MOVE T4,[POINT 7,LOGFIL] ;[124] Point to the log file name
	MOVE T1,[POINT 7,LOGFNA] ;[124] Point to place to build log file spec
	DO.			;[124] Loop for all characters in the filename
	  ILDB T3,T4		;[124] Load a character for the log file
	  CAIE T3,"*"		;[124] Is it the wild thing?
	  IFSKP.		;[124] Yes, substitute the time
	    SKIPN LOGFTI	;[124] Any time string set up?
	    CALL FNTLOG		;[124] (/) Make the time string
	    HRROI T2,LOGFTI	;[124] Point to formatted time
	    CALL ISOUT		;[124] (T1,T2/T1) Store the time
	  ELSE.			;[124] Otherwise it was not wild
	    IDPB T3,T1		;[124] Not wild, store that character
	  ENDIF.		;[124] End of wild/nonwild check
	  JUMPN T3,TOP.		;[124] Loop until input null seen
	OD.			;[124] End of loop for characters
	RET			;[124] Return to caller with LOGFNA set up
;[124] Local routine called only from NAMLOG.
;Call to create time string "year-month-day-hours-minutes-seconds" in LOGFTI.
;Returns +1 always with LOGFTI filled.

FNTLOG:	SAVEAC <T1,T2,T3,T4,Q1,Q2,Q3> ;[124] Save the Ts and Qs
	SETO T2,		;[124] Load time of now
	SETZ T4,		;[124] No particular options
	ODCNV%			;[124] Get seperate numbers for time and so on
	 ERJMP R		;[124] This will not fail today
	HRRZ Q3,T2		;[124] Copy month to Q3
	HLRZ Q2,T3		;[124] Copy day to Q2
	HRRZ Q1,T4		;[124] Copy seconds since midnight to Q1

	HRROI T1,LOGFTI		;[124] Point to place to build the time
	HLRZ T2,T2		;[124] Load the year
	CALL ODEC		;[124] (T1,T2/T1) Send the year first
	HRRZ T2,Q3		;[124] Load numeric month
	CALL FNTLON		;[124] (T1,T2/T1) Send hyphen and month
	HRRZ T2,Q2		;[124] Load the numeric day
	CALL FNTLON		;[124] (T1,T2/T1) Send hyphen and day
	IDIVI Q1,^D60*^D60	;[124] Get hours in Q1, 
	IDIVI Q2,^D60		;[124]  minutes in Q2, seconds in Q3
	MOVE T2,Q1		;[124] Load hours
	CALL FNTLON		;[124] (T1,T2/T1) Send hyphen and hours
	MOVE T2,Q2		;[124] Load the minutes
	CALL FNTLON		;[124] (T1,T2/T1) Send hyphen and minutes
	MOVE T2,Q3		;[124] Load the seconds
	CALL FNTLON		;[124] (T1,T2/T1) Send hyphen and seconds
	MOVEI T2,0		;[124] Load a null
	IDPB T2,T1		;[124]  and store it there
	RET			;[124] Return

;[124] Local routine called only from FNTLOG.
;Stores a hyphen followed by two ASCII digits from a binary number in T2.
;Returns +1 always.

FNTLON:	MOVEI T3,"-"		;[124] Load hyphen
	IDPB T3,T1		;[124]  store hyphen first
	IDIVI T2,^D10		;[124] Get the two digits
	ADDI T2,"0"		;[124] Convert tens digit to ASCIZ
	ADDI T3,"0"		;[124] And the ones digit to ASCIZ
	IDPB T2,T1		;[124] Store the tens digit
	IDPB T3,T1		;[124]  and the ones digit
	RET			;[124] Return to caller
	SUBTTL Logging Routines -- Send Text to Log File

;Routine to send text to the log file, used for all logging of GETOK functions.
;Call with T1/ pointer to ASCIZ text.
;Returns +1 always, string written

SENLOG:	SAVEAC Q1		;Save an AC
	MOVEM T1,Q1		;Save the pointer to the string please
	MOVE T1,LOGLIN		;[120] Skip if no lines printed on this page 
	CAIL T1,PAGLEN		;[120] Lines sent, over maximum number on page?
	CALL HDRLOG		;[120] (/) Send header to log file
	MOVE T1,Q1		;[107] Restore pointer to string
	CALLRET SOULOG		;[107] (T2/) Write that string to the log file

;[116] Here to write header and statistic information to the log file.
;Returns +1 always

HDRLOG:	HRROI T1,HEADBU		;[116] Point to the header buffer 
	CALL NPGLOG		;[116] (T1/T1) Output first line of header
	CALL STALOG		;[116] (T1/T1) Output second through nth lines
	CALL OCRLF		;[116] (T1/T1) Repeat myself
	HRROI T1,HEADBU		;[116] Point to text buffer
	CALLRET SOULOG		;[116] (T1/) Send all of that to log file 

;[120] Here to write summary information to the log file.
;Returns +1 always.

SUMLOG:	MOVE T1,LOGLIN		;[120] Load lines printed
	CAILE T1,PAGLEN-5	;[120] Is there enough room on this page?
	CALLRET HDRLOG		;[120] (/) Do a new header instead
	HRROI T1,HEADBU		;[120] Point to the header buffer
	CALL OCRLF		;[120] (/) First we want a CRLF output
	CALL STALOG		;[120] (T1/T1) Output second through nth lines
	HRROI T1,HEADBU		;[120] Point to text buffer
	CALLRET SOULOG		;[120] (T1/) Send all of that to log file 
	SUBTTL Logging Routines -- Log File Cached Write

;[107] Routine to set up for new log file buffer.
;Uses CX so that no real ACs are damaged.
;Returns +1 always with pointers and counts reset.

NPTLOG:	MOVEI CX,<<1+LOGBLP-LOGBFP>*5*1000>-1 ;[107] Load number of characters
	MOVEM CX,LOGCNT		;[107]  and save it here
	MOVE CX,[POINT 7,LOGBUF] ;[107] Point to the log buffer
	MOVEM CX,LOGPTR		;[107] Save that there
	SETZM LOGBUF		;[107] Insure first word zero for checks
	RET			;[107] Return always

;[107] Routine to do a SOUT to the log file.
;Note: this routine is called ONLY from SENLOG, HDRLOG, and SUMLOG.
;Call with T1/ pointer to ASCIZ text.
;Returns +1 always, string written (to cache or real file).

SOULOG:	TLC T1,-1		;[107] Complement left half
	TLCN T1,-1		;[107] Was the left half -1?
	HRLI T1,(Point 7)	;[107] Yes, make it a byte pointer
	DO.			;[107] Loop for entire string
	  ILDB T2,T1		;[107] Load a character from the file
	  CAIN T2,.CHLFD	;[116] Is it a line feed?
	  AOS LOGLIN		;[116] Count this line as sent to log
	  JUMPE T2,ENDLP.	;[107] Get out if a null seen
	  CALL CHRLOG		;[107] (T2/) Send character to log file
	  LOOP.			;[107] Loop for all of them
	OD.			;[107] End of copy loop
	MOVE T1,LOGPTR		;[107] Load the pointer
	IDPB T2,T1		;[107] Store null to bind off string
	RET			;[107]  and return

;[107] Routine to store a log file character in log file cache buffer.
;Call with T2/ character.
;Returns +1 always.

CHRLOG:	SOSLE LOGCNT		;[107] Is there space for that character?
	IFSKP.			;[107] Nope
	  SETZ CX,		;[107] Load a null
	  IDPB CX,LOGPTR	;[107]  and bind off the end of the buffer
	  CALL SWPLOG		;[107] (/) Sweep the log file out to disk
	  TXO F,FL%SLF		;[107] Perform another sweep later please
	  CALLRET CHRLOG	;[107] (/) Now output the character and return
	ENDIF.			;[107] End of no more room code
	IDPB T2,LOGPTR		;[107] Save the character in buffer
	RET			;[107]  and return to caller
	SUBTTL Logging Routines -- Log File Cache Sweep Interrupts

;[107] Here on a interrupt to log file sweep every LOGINT seconds.
;Returns +1 always with log file cache swept.

INTLFF:	CALL LFFHAN		;[107] (/) Handle the interrupt
	DEBRK%			;[107] Dismiss from interrupt

LFFHAN:	SAVEAC <T1,T2,T3,T4,Q1,Q2,Q3> ;[107] Save all of the suspect ACs
	TXNE F,FL%NOI		;[107] Are we NOINT?
	TXOA F,FL%SLF		;[107] Yes, remember to do log file stuff later
	CALL SWPLOG		;[107] (/) Sweep out the log file cache please
;	CALLRET INILFF		;[107] (/) Get back here again in LOGINT secs

;[107] Here to set the timer interrupt that goes off to sweep log file cache.
;Returns +1 always, T1-T4 smashed.

INILFF:	MOVX T1,<.FHSLF,,.TIMEL> ;[107] Set interrupt at elapsed time
	SKIPG T2,LOGINT		;[113] Load interval for log file updates
	RET			;[113] If zero cache is disabled
	IMULI T2,^D1000		;[107]  and convert it to milliseconds
	MOVEI T3,LFCHAN		;[107] Load channel number to interrupt on
	TIMER%			;[107] Set the interrupt
	 JSERRO (<Failed to set log file timer>) ;[107] Too many timer blocks?
	RET			;[107] Just return +1 no matter what happens
	SUBTTL Logging Routines -- Log File Cache Sweep

;[107] Routine to sweep contents of log file to disk.
;Returns +1 always with LOGBUF copied to log file.

SWPLOG:	SKIPE LOGBUF		;[107] Is there anything to write or
	SKIPN LOGJFN		;[107]  any JFN on the log file?
	RET			;[107] Nope, get out now

	SAVEAC <T1,T2,T3,T4>	;[107] Save the temps as they are really needed
	HRROI T2,LOGBUF		;[107] Point to the log buffer
	SETZB T3,T4		;[107] Terminate on a null
	SKIPE T1,LOGJFN		;[107] Load the JFN for the log file
	SOUT%			;[107] Send that text to the log file
	IFJER.			;[107] If there was a problem
	  OJSERR (<Error writing to log file>) ;[107] Mumble about the error
	  HRROI T1,LOGBUF	;[107] Reload pointer to string
	  PSOUT%		;[107] Send to console terminal
	ENDIF.			;[107] End of log file write problem code
	CALL NPTLOG		;[107] (/) Set up new pointers and so on
;	CALLRET CKPLOG		;[107] (/) Try closing and reopening log file
	SUBTTL Logging Routines -- Open/Close/Checkpoint Log File

;[107] Routine to checkpoint the log file.
;Called only from SWPLOG, closes and then reopens the log file.
;Returns +1 always

CKPLOG:	SKIPN T1,LOGJFN		;Get JFN, skip if there is one
	CALLRET NEWLOG		;[107] (/) None there, try for a new one

	TXO T1,CO%NRJ		;Keep the JFN but close the file
	CLOSF%			;Yes, close the log file
	 ERCAL NEWLOG		;(/T1) Oh no!  Holy OFN, something smells bad
;	CALLRET OPNLOG		;[107] (/) Reopen the log file

;[107] Routine to open the log file.
;Returns +1 always.

OPNLOG:	SKIPN T1,LOGJFN		;[107] Skip if a log file JFN assigned today
	RET			;[107] No log file to open
	MOVX T2,FLD(7,OF%BSZ)!OF%APP ;[107] 7 bit append mode
	OPENF%			;[107] Open the jfn for append
	 JSERRO (<Can't open log file>,<CALL CLOLOX>) ;[107] Report error
	RET			;[107] Return

;Here to close the log file JFN.
;Returns +1 always with log file closed.

CLOLOG:	SKIPN LOGJFN		;[120] Anything to do?
	RET			;[120] Nope, return now
	CALL SUMLOG		;[120] (/) Send summary to log file
	CALL SWPLOG		;[107] (/) Sweep log file cache
CLOLOX:	SKIPE T1,LOGJFN		;[107] Load the log file JFN, skip if none
	CLOSF%			;Shake rattle and roll
	 ERCAL RLSLOG		;Try to release the JFN if error
	SETZM LOGJFN		;No longer a JFN to worry about
	CALLRET NPTLOG		;[110] (/) Don't worry be happy 

RLSLOG:	MOVE T1,LOGJFN		;Load the JFN again
	RLJFN%			;Release it today
	 ERNOP.			;Really don't care if this fails
	RET			;In any case we tried to dump the JFN
	SUBTTL Logging Routines -- New Page for Log File

;[116] Local routine to output first line of new page header.
;Call with T1/ output pointer
;Returns+1 always, T1/ updated pointer

NPGLOG:	SETZM LOGLIN		;[116] Clear number of lines this page
	HRROI T2,[BYTE(7).CHFFD,.CHCRT,.CHLFD,.CHTAB,0] ;Form feed crlf tab
	CALL ISOUT		;(T1,T2/T1) Start with that
	HRROI T2,[VERSIO]	;Point to my name and version
	CALL ISOUT		;(T1,T2/T1) Send that out
	HRROI T2,[ASCIZ/ on /]	;Label the node
	CALL ISOUT		;(T1,T2/T1) Append that text next
	HRROI T2,OURNAM		;Point to this node's name
	CALL ISOUT		;(T1,T2/T1) Append that text next
	HRROI T2,[ASCIZ/, /]	;Load the little seperator
	CALL ISOUT		;(T1,T2/T1) Append that text next
	SETOB T2,T3		;The time is now, long format please
	CALL OODTI1		;(T1,T2,T3/T1) Do the ODTIM JSYS
	AOS T3,LOGPAG		;Get the page number we are writing today
	HRROI T2,[ASCIZ/, page /] ;Label for page number
	CALL OLDEC		;(T1,T2,T3/T1) Output that label and number
	CALLRET OCRLF		;[116] (T1/T1) Output a crlf and return
	SUBTTL Logging Routines -- Statistics Logging

;[116] Local routine to output statistics, second through nth header lines.
;Call with T1/ output pointer
;Returns+1 always, T1/ updated pointer

STALOG:	SKIPN NALLOW		;[116] [111] Any allowed?
	SKIPE NDENY		;[111] Any denied?
	IFNSK.			;[111] Yes to either
	  HRROI T2,[ASCIZ/	Allowed /] ;Space out for rest of text
	  CALL ISOUT		;Append that label
	  MOVE T2,NALLOW	;Load number allowed
	  HRROI T3,[ASCIZ/ request/] ;Label number
	  CALL OPLURA		;(T1,T2,T3/T1) Output number and label
	  HRROI T2,[ASCIZ/, denied /] ;Label for next number
	  CALL ISOUT		;Append that label
	  MOVE T2,NDENY		;Load number allowed
	  HRROI T3,[ASCIZ/ request/] ;Label number
	  CALL OPLURA		;(T1,T2,T3/T1) Output number and label
	  HRROI T2,[ASCIZ/, /]	;Label for next number
	  CALL ISOUT		;Append that label
	  MOVE T2,NFAIL		;Load number failed
	  HRROI T3,[ASCIZ/ request/] ;Label number
	  CALL OPLURA		;(T1,T2,T3/T1) Output number and label
	  HRROI T2,[ASCIZ/ failed
/]				;[111] 
	  CALL ISOUT		;[111] Append that label
	ENDIF.			;[111] That's all of the allow deny code
;[111] Output access control hit, misses, and ratio.

	SKIPN NMISS		;[111] We will always have at least 1 miss
	IFSKP.			;[111] Yes
	  MOVE T3,NHIT		;[113] Load (100*hits/hits+misses)
	  IMULI T3,^D100	;[113] Make into percentage (times millisecs)
	  MOVE T2,NMISS		;[113] Load misses
	  ADD T2,NHIT		;[113] Count hits
	  IDIV T3,T2		;[113] Compute percentage
	  HRROI T2,[ASCIZ/	Cache /] ;[113] What hit percentage
	  CALL OLDEC		;[113] (T1,T2/T1) Send hit percentage
	  HRROI T2,[ASCIZ/%, hit /] ;[113] Seperate hits
	  MOVE T3,NHIT		;[111] Load hits
	  CALL OLDEC		;[113] (T1,T2/T1) Send hits
	  HRROI T2,[ASCIZ/, missed /] ;[111] Seperate misses
	  MOVE T3,NMISS		;[111] Load misses
	  CALL OLDEC		;[111] (T1,T2/T1) Send misses along
	  HRROI T2,[ASCIZ/, flushed /] ;[113] Seperate flishes
	  MOVE T3,NFLUSH	;[113] Load flushes
	  CALL OLDEC		;[113] (T1,T2/T1) Send flushes
	  CALL OCRLF		;[111] (T1/T1) and a crlf
	ENDIF.			;[111] End of access control cache display
;Get and save elapsed runtime and connect time.

	SAVEAC <Q1,Q2>		;Save a couple of ACs today
	MOVEM T1,Q2		;[113] Save current pointer to text string
	MOVEI T1,.HPRNT		;Get our runtime
	HPTIM%			;In high precsion units
	 JSERRO (<HPTIM failure to get runtime>,<SETZ T1,>) ;Big owie
	SKIPN RUNTIM		;Is there any runtime set?
	MOVEM T1,RUNTIM		;Nope, set it now
	MOVE Q1,T1		;Copy that to T1
	SUB Q1,RUNTIM		;Get our elapsed runtime
	TIME%			;Get system uptime in milliseconds
	SKIPN PEOPLE		;Any elapsed people time
	MOVEM T1,PEOPLE		;Nope, store initial value
	EXCH Q2,T1		;[113] Swap uptime for saved pointer
	SUB Q2,PEOPLE		;Get our elapsed people time

	IFN. Q2			;If there has been elapsed connect time
	  HRROI T2,[ASCIZ/	Used /]	;[111] Label for next number
	  CALL ISOUT		;Append that label
	  MOVE T2,Q1		;Load run time
	  CALL OTIMEH		;(T1,T2/T1) Output time in HPTIM units
	  HRROI T2,[ASCIZ/ in /] ;In
	  CALL ISOUT		;Append that tiny string
	  MOVE T2,Q2		;Load people time in milliseconds
	  CALL OTIME		;(T1,T2/T1) Output elapsed people time
	  CALL OCRLF		;(T1/T1) Output a CRLF
	ELSE.			;Otherwise we are running for first time
	  HRROI T2,[ASCIZ/	ACJ restart
/]				;Load the pointer to message
	  CALL ISOUT		;(T1,T2/T1) Send that along please
	ENDIF.			;[111] Done with logging time
	RET			;[116] Done
	SUBTTL Logging Routines -- Start Logging a Request

;Here to start out the log file text which is kept in TEXTBU until sending it
;to the log file.  This routine should be called with
;	JIBLK/ info about job in question
;	USRSTR/ username string for the request
;	T2/ pointer to function description string
;Returns +1 always, TEXTBP and T1/ pointer to log buffer

LOGSTA:	SAVEAC <Q1>		;Place to keep text pointer
	HRROI T1,TEXTBU		;Point to text buffer first of all
	MOVEM T2,Q1		;Save the pointer to text

	SETO T2,		;Want current time
	MOVX T3,OT%NDA		;No date
	CALL OODTI1		;(T1,T2,T3/T1) Do the ODTIM JSYS

	CALL OSPACE		;(T1/T1) Append in a single space
	HRROI T2,USRSTR		;Point to the username in question
	CALL ISOUT		;(T1,T2/T1) Send username string to log file

	CALL OSPACE		;(T1/T1) Append in a single space
	MOVE T2,Q1		;Load pointer to entry type name
	CALL ISOUT		;(T1,T2/T1) Send name to log file

	MOVEI T4,JIBLK		;Point to the GETJI block we made for this job
	CALL OGETJ1		;(T1,T4/T1) Output non-username job information

	HRRZ T4,ARGBLK+.RCCAP	;Get capability mask enabled
	SKIPE JIBLK+.JIJNO	;Is it job 0?
	CALL OCAPAB		;(T1,T4/T1) Asciify caps if not job 0

	MOVEM T1,TEXTBP		;Store the byte pointer for later
	RET			;Return +1 with T1/ pointer
	SUBTTL Spy on Intruder

;In order to spy on intruders (an excellent technique to discover unwanted
;tourists) the SPYON routine was stolen from another ACJ.  This intruder spy
;facility puts the user's output to a file.  

;For each intruder there is a fork in a BIN%/BIN% loop between a PTY TLINKed to
;the intruder's terminal and the suspected intruder's job.  The fork runs in
;ACJ's address space so that it can be started quickly, and is started sharing
;adress space with the top level ACJ fork.  Each fork has its own acs of course
;but also its own private stack.  The private fork's stack and the ACs are the
;only storage the subfork writes into.  Every 10 seconds it takes a TIMER
;interrupt to see if the job has moved to another terminal, logged out, or
;typed BREAK (it always redoes the spy link in case the user typed BREAK).
;After the spy fork halts, the superior fork notices on a fork termination
;interrupt and kills any spy forks that smell bad (halt or error halt status).

;AC usage in the spy on intruder fork startup code and in the spy fork:
;	P1/  User number
;	P2/  Job number
;	P3/  Log file JFN
;	P4/  PTY designator
;	P5/  PTY's TTY I/O designator

;Define a little macro to catch spy fork errors and punt the spying session.
;This is done because the fork by design does not touch any memory that the
;superior ACJ main fork might be using.

DEFINE ERSPY(TEXT),<
	ERJMP [	JSP T1,SPYERR
		ASCIZ/ ACJ Spy: TEXT/]
>
DEFINE SPYER(TEXT),<
	JRST [	JSP T1,SPYERR
		ASCIZ/ ACJ Spy: TEXT/]
>
	SUBTTL Spy on Intruder -- Start a Spy Fork

;Here to start spying on a suspected attacker.
;Call with
;	T1/ user number to spy on
;	T2/ job number to spy on
;Returns +1 Already logging or can't log
;Returns +2 Spy fork started

;AC usage in this routine, all of which are passed to inferior fork:
;	Q1/ inferior fork's stack pointer
;	Q2/ inferior fork's offset in SPYxxx tables
;	P1/  User number
;	P2/  Job number
;	P3/  Log file JFN
;	P4/  PTY designator
;	P5/  PTY's TTY I/O designator

SPYON:	SAVEAC <P1,P2,P3,P4,P5,Q1,Q2> ;Save the perms
	DMOVE P1,T1		;Copy user number to P1, job number to P2
	SETZ Q2,		;Indicate no free slot found yet
	MOVSI T4,-NSPYS		;Get number of forks we can have
	DO.			;Search job/user table
	  CAME P2,SPYJOB(T4)	;Does the job match?
	  IFSKP.		;Yes
	    CAMN P1,SPYUSR(T4)	;Does the user match?
	    RET			;Yes, just return +1 for now
	    EXIT.		;Same job, not same user, start another spy
	  ENDIF.		;Job didn't match
	  SKIPE SPYFRK(T4)	;Is this slot used?
	  IFSKP.		;No, we have found a free slot then
	    SKIPN Q2		;Do we have a free slot yet?
	    MOVE Q2,T4		;Nope, we do now though
	  ENDIF.		;End of free slot code
	  AOBJN T4,TOP.		;Loop for all possible forks we are running 
	OD.			;End of search loop
	JUMPE Q2,R		;Return if no fork slot available in table
;Create stack pointer for inferior fork.

	MOVEI Q1,(Q2)		;Load which spy fork this is
	IMULI Q1,SPLEN		;Point to proper stack start address
	ADDI Q1,SPYPDL		;Make offset into address of stack
	HRLI Q1,-SPLEN		;Make -n,,0

;Open up the spy log file.

	CALL SPYGTJ		;(Q1,P2/P3) Get JFN on spy file
	 JRST SPYPNT		;(Q2/) Punt if error
	HRLM P3,SPYJFN(Q2)	;Save log file JFN

;Get a PTY and remember which one.

	CALL GETPTY		;(/T1,T2) Try to get a PTY
	 JRST SPYPNT		;(Q2/) Couldn't, punt JFN and return	
	DMOVE P4,T1		;Save PTY JFN and TTY designator for fork
	HRRM T1,SPYJFN(Q2)	;Save PTY JFN here too

;Create fork with our caps, our ACs, our map, starting it at SPYSTA.

	MOVX T1,CR%CAP!CR%ACS!CR%MAP!CR%ST!FLD(SPYSTA,CR%PCV) ;All implemented
	SETZ T2,		;Indicate that fork should get copy of our ACs
	CFORK%			;Create a fork
	 IFJER.			;If error
	   CAIE T1,CFRKX3	;No more forks?
	   OJSERR (<Can't create fork>,,SPYPNT)	;(Q2/) No, some other error
	   JRST SPYPNT		;(Q2/) Clean up and return
	 ENDIF.			;End of CFORK error recovery

;We have a bouncing baby fork, set up the SPYxxx tables for later use.

	HRRZM T1,SPYFRK(Q2)	;Remember fork handle
	MOVEM P1,SPYUSR(Q2)	;Save user number,
	MOVEM P2,SPYJOB(Q2)	; and job that the fork is spying

	RETSKP			;Spying fork running now
	
	SUBTTL Spy on Intruder -- Kill Spy Fork

;Here to kill off the spy fork.
;Call SPYKIL with T4/ spy fork table offset
;Call SPYPNT with Q2/ spy fork table offset
;Returns +1 always fork is gone, PTY JFN released, log file closed

SPYPNT:	MOVEI T4,(Q2)		;Load offset to tables
SPYKIL:	MOVE T1,SPYFRK(T4)	;Load the fork handle again
	KFORK%			;Kill it off now
	 ERNOP.			;Well at least I tried
	CALL SPYTRL		;(T4/) Perform finishing functions
	HLRZ T1,SPYJFN(T4)	;Load spy file JFN
	SKIPE T1		;Was there a JFN?
	CLOSF%			;Yes, close it
	 ERNOP.			;Well, not much we can do at this point
	HRRZ T1,SPYJFN(T4)	;Load PTY JFN
	SKIPE T1		;Was there a JFN?
	CLOSF%			;Close that too
	 ERNOP.			;Crunch?
	SETZM SPYFRK(T4)	;Clear table entry for fork
	SETZM SPYJOB(T4)	;Clear job being spyed on
	SETZM SPYUSR(T4)	;Clear user being spyed on
	SETZM SPYJFN(T4)	;Clear JFN words 
	RET			;Return with all cleaned up
	SUBTTL Spy on Intruder -- Start a Spy Fork -- Get a Spy File

;Here to get a JFN on the spy fork log file.
;Call with P2/ user number
;Returns +1 if error
;Returns +2 with spy log file open and header written, P3/ JFN

;First construct file name from "predefinedstring-OURNAM.USERNAME"

SPYGTJ:	HRROI T1,SPYFIL		;Point to destination area
	HRROI T2,SPYSLD		;Load initial text of filespec
	CALL ISOUT		;(T1,T2/T1) Copy that string
	HRROI T2,[ASCIZ/-/]	;Delimit the string
	CALL ISOUT		;(T1,T2/T1) Send the delimiter
	HRROI T2,OURNAM		;Point to our node name string
	CALL ISOUT		;(T1,T2/T1) Append node name to filespec
	HRROI T2,[ASCIZ/./]	;Point to a seperator character
	CALL ISOUT		;(T1,T2/T1) Append seperator to filespec
	MOVE T2,P1		;Get user number back
	CALL ODIRST		;(T1,T2/T1) Change it to up to 39 characters
	CALL ISOUT		;(T1,T2/T1) Append that string in there

;Get a JFN on the file.

	MOVX T1,GJ%FOU!GJ%SHT	;Load these flags
	HRROI T2,SPYFIL		;Use this string
	GTJFN%			;Get JFN for spying
	 JSERRO (<Unable to get JFN for spy file>,,SPYLFD)
	MOVEI P3,(T1)		;Copy JFN for handing down to fork
	TXO T1,CF%NUD!FLD(.FBCTL,CF%DSP) ;Load the FBCTL word, don't update
	MOVX T2,FB%INV!FB%SEC	;Load the invisible and secure bits for mask
	MOVX T3,FB%INV!FB%SEC	;Load the invisible and secure bits to set
	CHFDB%			;Change file descriptor block
	 JSERRO (<Can't make spy file secure and invisible>,<CALL SPYLFD>)
	MOVEI T1,(P3)		;Reload T1 incase previous CHFDB fails
	TXO T1,CF%NUD!FLD(.FBBYV,CF%DSP) ;Load the FBBYV word and no updates
	HRLI T1,.FBBYV		;We want to keep infinite generations
	MOVX T2,FB%RET		;Load set retention bit
	SETZ T3,		;Keep 0 generations
	CHFDB%			;Change file descriptor block
	 JSERRO (<Can't make spy file generation retention count 0>,<CALL SPYLFD>)
	CALL SPYOPN		;(P3/) Open up the file
	 OJSERR (<Can't open spy file>,,SPYLFD) ;Punt if errors

;Send header to spy file and then return.

	CALL SPYHDR		;(P3/) Construct header and send it to file
	CALL SPYCLS		;(P3/) Close spy file
	 OJSERR (<Can't close spy file>,,SPYLFD)
	CALL SPYOPN		;(P3/) Reopen the file
	 OJSERR (<Can't reopen spy file>,,SPYLFD) ;Owie!
	RETSKP			;Return OK
;Small local routine to append spy filename into log file.
;Called only from SPYGTJ because otherwise SPYFIL isn't set up.
;Returns +1 always with filename string sent to log file.

SPYLFD:	TXO F,FL%ERR		;Indicate we are in error processing
	HRROI T1,ERRBUF		;Point to error string buffer
	HRROI T2,[ASCIZ/    File /] ;Space over four
	CALL ISOUT		;(T1,T2/T1) Send some space along
	HRROI T2,SPYFIL		;Point to the spy filename
	CALL ISOUT		;(T1,T2/T1) Send that along 
	CALL OCRLF		;(T1/T1) and a crlf
	HRROI T1,ERRBUF		;Point to error buffer again
	CALL SENLOG		;(T1/) Send that to the usual log file
	TXZ F,FL%ERR		;No longer in error processing
	RET			;Return +1
	SUBTTL Spy on Intruder -- Start a Spy Fork -- Get a PTY

;Called to get a PTY assigned to spy on intruder.
;Returns +1 always, T1/ PTY JFN, T2/ TTY designator for that PTY

GETPTY:	MOVE T4,MAXPTY		;Load maximum number of PTYs on system
	IMUL T4,[XWD -1,0]	;Make -n,,0

GETPT1:	MOVSI T1,.DVDES!.DVPTY	;Load PTY designator value
	HRRI T1,(T4)		;Make designator for particular PTY
	DVCHR%			;Get characteristics of the device
	 ERJMP GETPT2		;Owie
	TXNN T2,DV%AV		;Is this PTY available?
	JRST GETPT2		;Nope, try next one

	MOVE T2,T1		;Load device designator
	HRROI T1,SPYFIL		;Point to tempoary area
	DEVST%			;Now convert the device to a string
	 JRST GETPT2		;Bad, well try the next one
	HRROI T2,[ASCIZ/:/]	;Point to the appropriate puctuation
	CALL ISOUT		;(T1,T2/T1) Append that and a null

	MOVX T1,GJ%SHT		;Load short form bit
	HRROI T2,SPYFIL		;Point to string we just built
	GTJFN%			;Now try to get a JFN on that PTY
	 ERJMP GETPT2		;Well, try the next one then

	MOVEI T3,(T1)		;Save JFN here for now
	MOVX T2,FLD(7,OF%BSZ)!OF%RD!OF%WR ;Load the open bits
	OPENF%			;Open the PTY for read/write
	 ERJMP GETPT3		;This is got to be a problem

	HRRZ T2,T4		;Load the PTY unit number
	ADD T2,TTYPTY		;Convert PTY unit to TTY unit
	TXO T2,.TTDES		; and then make it a device designator
	RETSKP			;Successful return with T1, T2 set up

;Here if some problem getting the PTY, release JFN and try again.

GETPT3:	MOVEI T1,(T3)		;Get the JFN back
	RLJFN%			;Give up the JFN
	 ERNOP.			;Ignore error here 

;Here to try next PTY unit number.

GETPT2:	AOBJN T4,GETPT1		;Try next PTY unit
	RET			;Out of units, return failure
	SUBTTL Spy on Intruder -- Spy Fork -- Initialization

;This is the start of the fork that spys on intruders.  It runs in ACJ's
;address space so that it can be started quickly.  

;DANGER Will Robinson: the code running in the inferior fork cannot use any
;storage other than its ACs and stack!  All private storage other than the ACs
;must be on the stack or in the big TRVAR at SPYSTA.

;AC usage:
;	Q1/  Initial stack pointer
;	P1/  User number
;	P2/  Job number
;	P3/  Spy file JFN
;	P4/  PTY designator
;	P5/  TTY designator (TTY end of PTY)

SPYSTA:	MOVE P,Q1		;Set up the stack for this fork
	TRVAR <<SPYBUF,^D200/5>,<FRKLEV,3>,FRK3PC>

	MOVEI T1,.FHSLF		;Load my own fork handle
	MOVX T2,JP%SYS		;We are a system fork
	SPRIW%			;Do this so we are fast and elude detection
	 ERNOP.			;Well, at least we tried today

	MOVEI T2,FRK3PC		;Load level 3 PC return address
	MOVEM T2,2+FRKLEV	;Save as return for level 3
	SETZM 0+FRKLEV		;Clear level 1 PC return
	SETZM 1+FRKLEV		;Clear level 1 PC return
	HRLI T2,FRKLEV		;Load that address
	HRRI T2,CHNTAB		;Make LEVTAB,,CHNTAB
	SIR%			;Setup our interrupt tables
	MOVX T2,1B<TICHAN>	;Load the bit for the timer channel
	AIC%			;Activate interrupt channel
	EIR%			;Enable interrupt system

	CALL INITIM		;(/) Start timer interrupt
	CALL SETSPY		;(P1,P2,P5/) Setup spy link
	 SPYER (<Cannot set up link to user>)
;	JRST SPYLOP		;Start up main loop
	SUBTTL Spy on Intruder -- Spy Fork -- Main Loop

;This is the loop that takes all of the output of the user's session to spy it.

SPYLOP:	MOVE T1,P4		;Load PTY JFN
	BIN%			;Get a byte from the PTY into T2
	 ERNOP.			;Ignore error for the present time
	MOVE T1,P3		;Load the spy file JFN
	BOUT%			;Put the character into the spy file
	 ERJMP SPYEND		;Punt everything if error writing to file
	TXO F,FL%SIO		;Indicate the characters have been sent
	JRST SPYLOP		;Loop for more characters to spy
	SUBTTL Spy on Intruder -- Spy Fork -- Spy File I/O Routines

;Here to open up the spy file, called with P3/ spy file JFN
;Returns +1 if error
;Returns +2 if success

SPYOPN:	MOVE T1,P3		;Get just the JFN again, this time, all right?
	MOVX T2,FLD(7,OF%BSZ)!OF%APP ;Load 7 bit append mode please today sir
	OPENF%			;Pry the spy file open
	 ERJMP R		;Return if error
	RETSKP			;Skip return, ok sir, that'll be all sir

;Here to close up the spy file, called with P3/ spy file JFN
;Returns +1 if error
;Returns +2 if success

SPYCLS:	MOVE T1,P3		;Load the JFN again
	TXO T1,CO%NRJ		;Close spy file to make it real
	CLOSF%			;Crunch
	 ERJMP R		;Return +1 if error
	RETSKP			;Skip return

;Here to send a string to the spy file.
;Call with T2/ pointer to text, P3/ JFN
;Returns +1 if error
;Returns +2 if OK

SENSPY:	MOVE T1,P3		;Load the JFN of the file
	SETZB T3,T4		;Clear this so terminate on null
	SOUT%			;Send that to the file
	 ERJMP R		;Return +1 if error
	RETSKP			;Return to caller
	SUBTTL Spy on Intruder -- Spy Fork -- Error Recovery and Termination

;Here to output an error message to the spy file, cleanup and halt.
;Call with T1/ address of ASCIZ text
;Kills the fork.

SPYERR:	PUSH P,T1		;Save message string
	HRROI T1,SPYBUF		;Point to spy buffer
	HRROI T2,[ASCIZ/
[/]				;Point to CRLF bracket
	CALL ISOUT		;(T1,T2/T1) Send that along first
	CALL OODTIN		;(T1/T1) Current date time
	POP P,T2		;Now send the message
	TLO T2,-1		;Make -1,,address
	CALL ISOUT		;(T1,T2/T1) Send message next
	HRROI T2,[ASCIZ/, /]	;Send some white space
	CALL ISOUT		;(T1,T2/T1) Make it look nice
	CALL OERSTR		;(T1/T1) Send last JSYS error
	HRROI T2,[ASCIZ/]
/]				;Send closing bracket
	CALL ISOUT		;Append all of that together
	HRROI T2,SPYBUF		;Point to buffer
	CALL SENSPY		;(T2,P3/) Send all of that to the log file
	 SKIPA T1,SPYBUF	;Uh oh
	JRST SPYEND		;Now end this spying session
	PSOUT%			;Send to terminal if nothing else possible

;Here when we want to end this spying session.  Halts the spy fork.

SPYEND:	HALTF%			;Halt the spy fork
	JRST .-1		;What?
	SUBTTL Spy on Intruder -- Spy Fork -- Timer Interrupts

;Here when the spy fork wants to do a periodic check to see if job has logged
;out, changed terminals (i.e. got detached, and re-attached), or maybe typed a
;BREAK.

TIMINT:	CALL SPYTIM		;(/) Handle the interrupt please
	DEBRK%			;Return from interrupt

;Routine to do the work of checking things out at timer interrupts.

SPYTIM:	SAVEAC <T1,T2,T3,T4>	;Save the temps for a second
	TXZN F,FL%SIO		;Spy file I/O happened?
	IFSKP.			;Yes
	  CALL SPYCLS		;(P3/) Close spy file
	   JRST SPYABT		;Abort this session if error
	  CALL SPYOPN		;(P3/) Reopen the spy file
	   JRST SPYABT		;Abort this session if error
	ENDIF.			;End of file checkpoint code
	CALL SETSPY		;(P1,P2,P5/) Fix the spy link if needed
	 JRST SPYABT		;Abort if failure
	CALLRET	INITIM		;(/) Start timer again and return

;Here to abort the spy fork by changing the interrupt return PC to SPYEND.

SPYABT:	MOVEI T1,SPYEND		;Victim is gone, done logging
	MOVEM T1,FRK3PC		;Save the return PC as where to return to
	RET			;Return to dismiss interrupt and so on

;Setup a timer interrupt for 10 seconds from now

INITIM:	MOVE T1,[.FHSLF,,.TIMEL] ;Set interrupt this fork, elapsed time
	MOVE T2,SPYINT		;Load interval for spying
	IMULI T2,^D1000		;Convert seconds to milliseconds
	MOVX T3,TICHAN		;Load channel for timer interrupts
	TIMER%			;Have the monitor do that for us
	 ERSPY (<TIMER% failed>);Punt this session
	RET			;Return as it all went well
	SUBTTL Spy on Intruder -- Spy Fork -- Setup Spy Link

;Routine to set up spy link between our PTY and the victim's job.
;Called with
; 	P1/  Victim's user number
;	P2/  Victim's job number
;	P5/  TTY designator for our PTY
;Returns +1 no such job
;Returns +2 spy link setup (unless detached)

SETSPY:	MOVE T1,P2		;Get victim's job number
	MOVE T2,[-2,,Q1]	;Get TTY and user number
	MOVEI T3,.JITNO		; from the monitor on the victim
	GETJI%			;Get Job Information
	 IFJER.			;If that failed
	   CAIN T1,GTJIX4	;Did she go away?
	   RET			;Yes, return +1
	   SPYER (<GETJI% failed>)
	 ENDIF.			;End of error 

	IFN. Q2			;If there is a user logged in
	  CAME P1,Q2		;Is it the user we expect?
	  RET			;Nope, return +1
	ENDIF.			;User not logged in or is who we expect

	MOVE T1,P5		;Get TTY end of the PTY
	TXO T1,TL%ERO		;Setup spy link
	SKIPGE T2,Q1		;Load terminal of user's job
	RETSKP			;Don't try TLINK if detached
	TXO T2,.TTDES		;Make terminal number into designator
	TLINK%			;Make link from user terminal to our PTY
	 ERSPY (<TLINK% failed>) ;Owie!
	RETSKP			;Give +2 return

	ENDTV.			;End of fork's private storage
	SUBTTL Spy on Intruder -- Spy File Header/Trailer

;Here to write header shortly after the file is opened as as file is closed.
;Call with Q1/ freespace pointer
;Returns +1 always.

SPYTRL:	SAVEAC <Q1,Q2,Q3>	;Need more ACs today
	HRROI Q1,[ASCIZ/ end spying/] ;Here for trailer
	HLRZ Q2,SPYJFN(T4)	;Load JFN to Q2
	SETZ Q3,		;No job information please
	JRST SPYMSG		;Send the message

SPYHDR:	SAVEAC <Q1,Q2,Q3>	;Need more ACs today again
	HRROI Q1,[ASCIZ/ spying on/] ;Here for header
	MOVE Q2,P3		;Copy the JFN to Q2
	MOVEI Q3,JIBLK		;Point to that job's GETJI block

;Here with Q1/ message pointer and Q2/ JFN

SPYMSG:	MOVE T1,TEXTBU		;Get current text pointer area
	HRROI T1,1(T1)		;Point to some free space
	HRROI T2,[ASCIZ/
[/]				;Point to crlf bracket
	CALL ISOUT		;(T1,T2/T1) Start off
	CALL OODTIN		;(T1/T1) Send time and date
	CALL OSPACE		;(T1/T1)  and a space
	HRROI T2,[VERSIO]	;Load our version text
	CALL ISOUT		;(T1,T2/T1) Send that to the line 
	HRROI T2,[ASCIZ/ on /]	;Label next little part
	CALL ISOUT		;(T1,T2/T1) Send that to the line 
	HRROI T2,OURNAM		;Point to our node name
	CALL ISOUT		;(T1,T2/T1) Send that to the line 
	MOVE T2,Q1		;Load the mumble string
	CALL ISOUT		;(T1,T2/T1) Send that
	SKIPE T4,Q3		;Telling about a job?
	CALL OGETJI		;(T1,T4/T1) Tell about this job
	HRROI T2,[ASCIZ/]

/]				;Load ending text
	CALL ISOUT		;(T1,T2/T1) Send that to the line last

	MOVE T1,Q2		;Load the JFN of the file
	MOVE T2,TEXTBU		;Get current text pointer area
	HRROI T2,1(T2)		;Point to some free space
	SETZB T3,T4		;Clear this so terminate on null
	SOUT%			;Send that to the file, don't use SENSPY
	 ERNOP.			;Return +1 if error
	RET			;Return +1 always as a matter of fact
	SUBTTL Spy on Intruder -- Inferior Fork Termination Interrupt

;Come here on fork termination interrupt to check for dead forks.

FRKTRM:	CALL SPYTRM		;(/) Call worker routine to do the work
	DEBRK%			;Return from interrupt

;Routine to look for spy forks that are halted and kill them off.
;Returns +1 always

SPYTRM:	SAVEAC <T1,T2,T3,T4>	;Save those ACs on the stack
	MOVSI T4,-NSPYS		;Get number of forks in table

SPYTR1:	SKIPN T1,SPYFRK(T4)	;Is there a fork handle for this fork?
	JRST SPYTR6		;Nope, check next one
	RFSTS%			;Get fork's status
	 ERJMP SPYTR2		;If error kill it
	HLRZ T2,T1		;Load the fork status code
	CAIE T2,.RFHLT		;Halted
	CAIN T2,.RFFPT		; or forced termination?
SPYTR2:	CALL SPYKIL		;(T4/) Yes, kill that fork please
SPYTR6:	AOBJN T4,SPYTR1		;Loop for all of forks in table
	RET			;Return to sender
	SUBTTL Secure Files

;This routine is called to determine if the user has access to a particular
;file that is set secure.  This routine is called with the following arguments

;The format of the ACCESS.CONTROL file is as follows:
;	filename access-keyword user user, access-keyword user user, ...
;The first entry that matches the filename (as determined by WILD%) is used.

;Call with:
;	Q1/ ARGBLK+.RCARA
;	Q2/ SF.xxx for the type of desired access 
;Returns +1 if access is not allowed
;Returns +2 if access is allowed (or access control file is not found)

;ACs used in these routines:
;	P1/ free
;	P2/ byte pointer to current line from that file
;	P3/ last character read from that file
;	P4/ CBX (cache block index)

SECFIL:	SAVEAC <P1,P2,P3,P4>	;Save the perms for our use today

;First try and find the file ACCESS.CONTROL in the same directory as the file
;in question.  If this file is not found or is damaged, then the all secure
;operations are allowed and are logged as unusual.  Change the "CALLRET SETUNU"
;to "RET" if all secure operations are to be denied if the access control file
;is not found.

	CALL SECOPN		;(Q1/Q1,P4) Open up ACCESS.CONTROL
	 CALLRET SETUNU		;Not there, allow access but log as unusual

;Try and locate the filename in the ACCESS.CONTROL file.

	CALL SECFND		;(Q1,P4/P2,P3) Locate this filename
	 CALLRET SECCLS		;(P4/) Not found, close the file and return +1

;Check desired access against listed allowed access.

	HRROI T1,SECUSR		;Point to username build block
	MOVE T2,JIBLK+.JIUNO	;Load user number in question
	CALL ODIRST		;(T1,T2/T1) Get username made into string

	CALL SECACC		;(Q2,P2,P3/) See if user has proper access
	 CALLRET SECCLS		;(P4/) Nope, close file and return +1

;Access is allowed, close the file and skip return.

	CALL SECCLS		;(P4/) Yes, close file
	CALL SECACT		;(Q1,Q2/) See if special action is needed
	RETSKP			;Return +1 indicating the access is allowed
	SUBTTL Secure Files -- Find File's Entry

;Here to try to locate an entry for the file in question in the ACCESS.CONTROL
;file.  We are called with SECFNA/ "file.type.gen" and P4/ CBX
;Returns +1 if entry not found
;Returns +2 if entry found, P2/ line pointer and P3/ last character read

SECFND:	CALL SECSIN		;(P4/P2,P3) Read a line in from file
	 RET			;If EOF return +1 (not found)

;We have a line read in, eat white space.  If comment line get another line.

	CALL SECSPN		;(P2/P2,P3) Eat until first non blank character
	 JRST SECFND		;None on that line, get another line
	CAIN P3,";"		;Comment character semicolon first nonblank?
	JRST SECFND		;Yes, this was a comment, get next line please

;Line has been read in, get the first field in it which should be the filename.

	CALL SECFLD		;(P2,P3/P2,P3) Read a field into the word area
	 RET			;If EOL before field read, return +1

;We have a field read in.  See if the file in question matches this entry.

	MOVX T1,.WLSTR		;Load wild string match function
	HRROI T2,SECWRD		;Point to the (possibly wild) entry from file
	HRROI T3,SECFNA		;Point to the "file.type.gen" requested by user
	WILD%			;Get the monitor's help here
	 ERJMP SECFND		;Should never ITRAP, but ya never know
	JUMPN T1,SECFND		;Continue looping if the string didn't match

;Filename matched!  Check terminator of field, it must be space or tab.

	CAIE P3,.CHTAB		;Was previous field terminator a tab
	CAIN P3," "		; or was it a space?
	RETSKP			;Return +2 since the entry matched
	JRST SECFND		;Look some more if illegal terminator
	SUBTTL Secure Files -- Check Desired Access

;Called here after the entry for this file has been found to check the
;desired access, with Q2/ access code, P2 and P3 set up from SECFND.
;Returns +1 if access not allowed (not found)
;Returns +2 if access is allowed (user found)

SECACC:	CALL SECFLD		;(P2,P3/P2,P3) Read in a field
	 RET			;If end of line return +1

;See if the keyword read is something we recognize.

	MOVEI T1,SECTBL		;Point to table of keywords
	HRROI T2,SECWRD		;Point to the word to match please
	TBLUK%			;Look it up in our keyword table
	 ERJMP SECAC2		;Shouldn't ITRAP, but if error check next one
	TXNE T2,TL%NOM!TL%AMB	;No match or ambig?
	JRST SECAC2		;Yes, eat until end of line or comma seen
	HRRZ T2,(T1)		;Get the value for this keyword
	TDNN Q2,T2		;Match the desired access?
	JRST SECAC2		;Nope, keep looking
	CAIE P3,.CHTAB		;Was previous field terminator a tab
	CAIN P3," "		; or was it a space?
	JRST SECAC5		;Yes, we have a winner on this particular entry

;The keyword didn't match or wasn't the desired access keyword, eat until ",".

SECAC2:	CALL SECCHR		;(P2/P2,P3) Get the next character
	 RET			;Return badly if end of line
	CAIE P3,","		;Looking for a comma
	JRST SECAC2		;Keep looking until comma or end of line seen
SECAC4:	CALL SECCHR		;(P2/P2,P3) Get the character after the comma
	 RET			;End of line?  Not here, not after all of this!
	JRST SECACC		;Char after comma loaded, examine next field

;We have reached the desired access keyword.  See if desired user is in list.

SECAC5:	CALL SECFLD		;(P2,P3/P2,P3) Read the next field in
	 RET			;Owie if end of line
	MOVX T1,.WLSTR		;Load wild string match function
	HRROI T2,SECWRD		;Point to the (possibly wild) entry from file
	HRROI T3,SECUSR		;Point to the username we are concerned about
	WILD%			;Get the monitor's help here
	 ERSKP.			;Should never ITRAP, but ya never know
	JUMPE T1,RSKP		;User can do this!  Our work is done
	CAIN P3,","		;Was terminator a comma?
	JRST SECAC4		;Yes keep looking on this line
	CAIE P3,.CHTAB		;Was previous field terminator a tab
	CAIN P3," "		; or was it a space?
	JRST SECAC5		;OK terminator, continue looping through users
	RET			;Return badly if illegal terminator
	SUBTTL Secure Files -- Access Keywords

;This is a TBLUK style table of access keywords and access keyword values.
;It is used when reading the keywords after the filenames in ACCESS.CONTROL.
;Lines commented out are ideas for future functions.  A priv scheme must be
;thought about before implementation.  There is also the possibility that the
;ACJ could cause quota or blocking problems with these same ideas.

SECTBL:	TBEGIN			;Plant the header here
	TENTRY (ALL,SF.ALL)	;All access (app, del, rea, ren, sec, wri)
	TENTRY (APPEND,SF.APP)	;Append access (OPENF)
;	TENTRY (ANNOUNCE,SF.ANN) ;Send message to user list specified (priv)
;	TENTRY (CONSOLE,SF.CON)	;TTMSG to CTY when file touched (priv)
	TENTRY (DELETE,SF.DEL)	;Delete access (DELF)
;	TENTRY (LOG,SF.LOG)	;Log access in samestr:<user>ACCESS.LOG (priv?)
	TENTRY (NOSECURE,SF.NOS) ;Clear secure access (CHFDB)
	TENTRY (READ,SF.REA)	;Read access (OPENF)
	TENTRY (RENAME,SF.REN)	;Rename access (RNAMF)
	TENTRY (SECURE,SF.SEC)	;Set secure access (CHFDB)
	TENTRY (WRITE,SF.WRI)	;Write access (OPENF)
	TEND			;End of table
	SUBTTL Secure Files -- Access Control Cache

;[111] The Access Control Cache maintains the last NCACHE files open read for
;secure files access control.

;The SECOPN routine is called to open an ACCESS.CONTROL file for parsing.  This
;routine tries to find an entry in the cache for the directory of the filename
;passed to this routine.  Routine SECOSF is called to split the given filename
;string apart into a string containing the structure and directory and other
;string containing just the file.type.version.

;Routine SECOCF is called to find a cache entry for the str:<directory> where
;the given file resides.  If there is no entry for this directory, an entry is
;found by searching the cache for the first free cache block.  If there is no
;free block the oldest referenced cache block which is then used for this
;opening of the file.

;The cache is organized into NCACHE non-contiguous fixed buffers in memory,
;each of SCACHE contiguous pages.  A table of CBXSIZ words is used for each
;fixed buffer and contains the address of the buffer as determined at assembly
;time as well as the ASCIZ directory for which the cache is a part.

;After the cache block is idenitified, SECOCS is called to check to see that
;the entry is not "stale".  Stale entries are determined by checking the time
;that the data pages were mapped.  If stale entries were not flushed, changes
;in the ACCESS.CONTROL files would never be picked up.  If the entry is
;considered stale the cache block is invalidated.  This invalidation causes the
;file to be remapped (as if it was a new entry in the cache).  This period
;should be fairly long to avoid overhead.

;Routine SECOCO is called after the stale check.  This routine opens and maps
;the file if the cache block indicates that the file is not currently mapped.
;Finally, routine SECOCI is called to set up the pointers and counts needed to
;for routines that scan the ACCESS.CONTROL file.  

;The cached paged are then read by the normal SECCIN routine.  If the scan of
;the file causes all cached pages to be looked at, and the file was larger than
;SCACHE pages, routine SECMAP is called to map the next page in the file into
;the "overflow" buffer.  Pages are then looked at one at a time until all pages
;in the file have been mapped.

;When SECCLS is called to close the file only the overflow buffer is unmapped.
;The file stays open along with its JFNs for possible future access.  Routine
;SECFLU is called to flush an entry from the cache, unmapping all pages and
;releasing the JFN.
	SUBTTL Secure Files -- Access Control Cache -- Open File

;Here to open the ACCESS.CONTROL file in the same directory as the secure file.
;	Sets up SECDIR/ "str:<directory>" and SECFNA/ "file.type.gen"
;	Finds cache entry for this file.
;	If file not in cache, open and map SCACHE pages from it.
;	Set up variables for reading the file.
;Called with Q1/ ARGBLK+.RCARA
;Returns +1 if file not found
;Returns +2 if file found, P4/ cache block

SECOPN:	CALL SECOSF		;[111] (Q1/) Split filespec first
	
;Find cache entry, and try to open the file.

	CALL SECOCF		;[111] (/P4) Find cache entry for this

	CALL SECOCS		;[111] (P4/) Flush stale entry if needed

	CALL SECOCO		;[111] (P4/) Open up the file if possible
	 RET 			;[111] Owie, return +1

	CALL SECOCI		;[111] (P4/) Setup for I/O

	RETSKP			;Give the +2 return please
	SUBTTL Secure Files -- Access Control Cache -- Open File -- Split Filename

;[111] Routine to split up filename strings.  Sets SECDIR "str:<directory>",
;SECFNA "file.type.gen" and SECFNV "file.type"
;Called with Q1/ ARGBLK+.RCARA
;Returns +1 always with SECDIR and SECFNA and SECFNV set up.

SECOSF:	MOVEI T2,.GEFIL(Q1)	;[111] Load address of the with the filename
	HRLI T2,(POINT 7)	;[111] Point to the thing with a byte pointer
	MOVE T1,[POINT 7,SECDIR] ;[111] Point to "str:<directory>" build area
	DO.			;[111] Loop to grab the str:<dir>
	  ILDB T3,T2		;[111] Load a source byte
	  IDPB T3,T1		;[111] Store a byte please
	  CAIN T3,76		;[111] Is it a close angly?
	  EXIT.			;[111] Yes, exit
	  JUMPN T3,TOP.		;[111] Continue looping if not end of string
	  RET			;[111] Return now if premature end of filename
	OD.			;[111] Now we have the "str:<dir>" done
	SETZ T3,		;[111] Load up a null
	IDPB T3,T1		;[111]  and store it there to bind off dir
	HRROI T1,SECFNA		;[111] Point to "file.type.gen" storage area
	CALL ISOUT		;[111] (T1,T2/T1) Copy rest of filename there

	HRROI T1,SECFNV		;[115] Point to filename area
	HRROI T2,SECFNA		;[111] Load address of "file.type.gen"
	CALL ISOUT		;[111] (T1,T2/T1) Copy string, ending bp in T1
	DO.			;[111] Loop back from end to find first dot
	  SETO T2,		;[111] Load a -1 in T2
	  ADJBP T2,T1		;[111] Back it up one
	  MOVEM T2,T1		;[111] Store it back
	  LDB T2,T1		;[111] Load character from there
	  CAIE T2,"."		;[111] Period?
	  JUMPN T2,TOP.		;[111] Not yet, go back another character
	OD.			;[111] Found start of version
	SETZ T2,		;[111] Load a null
	DPB T2,T1		;[111] Store it over period

	RET			;[111] Return
	SUBTTL Secure Files -- Access Control Cache -- Open File -- Cache Find

;[111] SECOPN routine to examine the cache and find entry for str:<directory>.
;It may return with
;	1) an existing valid cache block (cache hit)
;	2) a free cache entry (cache miss)
;	3) a reused cache entry (cache miss)
;Call with SECDIR set up.
;Returns +1 always with P4/ offset to cache block entry

SECOCF:	MOVE P4,[-NCACHE,,CBPOOL] ;[111] Load number of entries in the cache
	DO.			;[111] Loop for all cache blocks
	  SKIPN CBXJFN(P4)	;[111] Is this one free?
	  IFSKP.		;[111] Nope
	    HRROI T1,SECDIR	;[111] Point to "str:<directory>"
	    HRROI T2,CBXDIR(P4)	;[111] Point to filename for this entry
	    CALL ISTCMP		;[111] (T1,T2/T1) Compare the strings
	    IFE. T1		;[111] If a match
	      AOS NHIT		;[111] Count as a cache hit
	      RET		;[111] Return
	    ENDIF.		;[111] End of string match code
	  ENDIF.		;[111] End of check
	  ADDI P4,CBXSIZ-1	;[111] Point to next block -1
	  AOBJN P4,TOP.		;[111] Loop if more blocks to consider
	OD.			;[111] End of loop to check old entries
	AOS NMISS		;[111] Count a cache miss

;[111] Entry was not in the cache, locate a place for it and fill in the CB.

	MOVE P4,[-NCACHE,,CBPOOL] ;[111] Now we find an empty slot or oldest
	MOVX T1,.INFIN		;[111] Load a real log uptime about a year
	DO.			;[111] Loop to find a free spot
	  SKIPN CBXJFN(P4)	;[111] Is this one free?
	  EXIT.			;[111] Yes, we found one
	  CAMG T1,CBXRTI(P4)	;[111] Is this the oldest one yet?
	  IFSKP.		;[111] Yes, this entry is older than last one
	    MOVE T1,CBXRTI(P4)	;[111] Load the time of the oldest one
	    MOVEI T2,(P4)	;[111]  and remember which entry this was
	  ENDIF.		;[111] Continue
	  ADDI P4,CBXSIZ-1	;[111] Point to next block -1
	  AOBJN P4,TOP.		;[111] Loop for each one
	  MOVEI P4,(T2)		;[111] Load the address of the one matching
	  CALL SECFLU		;[111] (P4/) Remove this entry from cache
	OD.			;[111] End of loop

	HRROI T1,CBXDIR(P4)	;[111] Point to filename for this entry
	HRROI T2,SECDIR		;[111] Point to "str:<directory>"
	CALLRET ISOUT		;[111] (T1,T2/T1) Copy the str:<dir> to CBX
	SUBTTL Secure Files -- Access Control Cache -- Open File -- Cache Stale Check

;[111] SECOPN routine to check that cached entry found is not too stale to use.
;If the cache block entry specified is too old it is flushed before use.
;Call with P4/ CBX
;Returns +1 always.

SECOCS:	SKIPN CBXJFN(P4)	;[111] Is this entry in use now?
	RET			;[111] Nope, get out

;[111] Files are always kept in the cache we know when they change.

	MOVX T1,FB%SEC		;[111] Load secure bit
	TDNN T1,CBXCTL(P4)	;[111] Was this file secure when we looked?
	IFSKP.			;[111] Yes
	  MOVX T1,FU%GOK	;[111] Load we are doing GETOKs bit
	  TDNE T1,GOOPNB	;[111] Can we tell a secure OPENF on this file?
	  RET			;[111] Yes, do nothing to interfere
	ENDIF.			;[111] Let the timer take care of it

;[111] Non secure file, check for maximum map time.

	MOVE T1,TODCLK		;[111] Load the uptime at last RCVOK function
	SUB T1,CBXMTI(P4)	;[111] Get elapsed time that file mapped
	CAILE T1,SECDCI*^D1000	;[111] Is this entry too old?
	CALL SECFLU		;[111] (P4/) Yes, abort it now and remap it
	RET			;[111] Return
	SUBTTL Secure Files -- Access Control Cache -- Open File -- Cached Open

;[111] SECOPN routine to open up a file that is not currently in the cache.
;Call with P4/ cache block offset
;Returns +1 if error
;Returns +2 if already open or just opened and cached file set up for reading.

SECOCO:	SKIPE CBXJFN(P4)	;[111] Is there a cached entry?
	RETSKP			;[111] Yes, it is all set up

;[111] Construct filename to use.

	HRROI T1,CBXFIL(P4)	;[111] Point to filename area
	HRROI T2,CBXDIR(P4)	;[111] Point to str:<directory>
	CALL ISOUT		;[111] (T1,T2/T1) Copy that first
	HRROI T2,[ASCIZ/ACCESS.CONTROL/] ;[111] Point to the filename we desire
	CALL ISOUT		;[111] (T1,T2/T1) Append in the desired file

;[111] Get a JFN on the access.control file.

	MOVX T1,GJ%OLD!GJ%XTN	;[111] Load old file flags long form block
	MOVEM T1,SECGTJ+.GJGEN	;[111]  and set in long form block
	MOVX T1,G1%IIN		;[111] Include invisible files
	MOVEM T1,SECGTJ+.GJF2	;[111]  and set this in second flag word
	MOVEI T1,SECGTJ		;[111] Point to long form GTJFN block
	MOVX T1,GJ%OLD!GJ%SHT	;[111] Load short form and old file flags
	HRROI T2,CBXFIL(P4)	;[111] Point to the filename please
	GTJFN%			;[111] Try to find that file
	 ERJMP R		;[111] Return +1 if file not found

;[111] Open up the access control file.

	MOVEM T1,CBXJFN(P4)	;[111] Save the JFN
	MOVX T2,OF%PDT!OF%RD!FLD(7,OF%BSZ) ;[111] Preserve dates, 7 bit, read
	OPENF%			;[111] Pry that file open please
	 ERJMP SECFLU		;[111] (P4/) Close file and return +1 if errors
;[111] Get FBCTL word for this file and store it.

	SETZM CBXCTL(P4)	;[111] Default FBCTL work to zero
	MOVX T2,<1,,.FBCTL>	;[111] Just this word
	MOVEI T3,CBXCTL(P4)	;[111] Poimt to block for storing this
	GTFDB%			;[111] Get the file's FDB word
	 ERJMP SECFLU		;[111] (P4/) We must be able to get this word 

;[111] Get size of file and compute how many pages to map.

	MOVE T1,CBXJFN(P4)	;[111] Load the JFN for the file again
	SIZEF%			;[111] Get the size of the file
	 ERJMP SECFLU		;[111] (P4/) If error, close it now
	MOVEM T3,CBXPCT(P4)	;[111] Save file page count
	CAILE T3,SCACHE		;[111] Is it over the size of the cache buffer?
	MOVEI T3,SCACHE		;[111] Reduce pages to map to the size 
	MOVEM T3,CBXMAP(P4)	;[111] Save as mapped page count

;[111] We know all about the file, map the first SCACHE pages into cache.

	HRLZ T1,CBXJFN(P4)	;[111] Load JFN of that file please
	MOVE T2,CBXPAG(P4)	;[111] Load fork,,page number of cache buffer
	TXO T3,PM%RD!PM%CNT	;[111] We have to read and have a count please
	PMAP%			;[111] Map those pages into cache please
	 ERJMP SECFLU		;[111] (P4/) If error we are screwed now

;[111] Update the mapped time for this cache entry.

	MOVE T1,TODCLK		;[111] Load now
	MOVEM T1,CBXMTI(P4)	;[111]  and save it as time of mapping
	RETSKP			;[111] Return OK
	SUBTTL Secure Files -- Access Control Cache -- Open File -- Cached Input Setup

;[111] SECOPN routine to set up the pointers and counts to read cached pages.
;Call with P4/ CBX
;Returns +1 always with pointers and counts set up.

SECOCI:	MOVE T1,TODCLK		;[111] Load now
	MOVEM T1,CBXRTI(P4)	;[111]  and save it as time of reference

	MOVE T1,CBXPTR(P4)	;[111] Get byte pointer to cache buffer
	MOVEM T1,SECBPT		;[111] Save as byte pointer to data

	MOVE T1,CBXMAP(P4)	;[111] Load number of pages mapped today
	IMULI T1,PGSIZ*5	;[111] Compute possible bytes there
	MOVEM T1,SECBCT		;[111] Save as byte count

	MOVE T1,CBXMAP(P4)	;[111] Load number of pages mapped today
	SUBI T1,1		;[111] Get next page to map-1 for SECMAP
	MOVEM T1,SECPMP		;[111] Save the logical last page mapped

	MOVE T1,CBXPCT(P4)	;[111] Reload the total size of the file
	SUB T1,CBXMAP(P4)	;[111] Compute pages that are NOT cached
	SKIPGE T1		;[111] Did it fit in the cache?
	SETZ T1,		;[111] Yes, load zero non cached page count
	MOVEM T1,SECPCT		;[111] Save non cached page count

	RET			;[111] Return
	SUBTTL Secure Files -- Access Control Cache -- Close File -- Read Finished

;[111] Here when finished with ACCESS.CONTROL file.  This routine just returns
;after unmapping the page used when the entire file does not fit into one
;cache buffer (greater than SPAGES pages).  The cached part of the file will
;remain so it's JFN must remain as well.
;Call with P4/ CBX
;Returns +1 always

SECCLS:	SETO T1,		;Load a -1 for no mapping
	MOVX T2,<.FHSLF,,SECOPG> ;[111] This fork that page
	MOVEI T3,0		;Load no flags and junk
	TXZE F,FL%LAC		;[111] Long access control file mapped?
	PMAP%			;Unmap that stuff
	 ERNOP.			;[111] Ignore errors or nothing to unmap
	RET			;[111] Return, that's all there is to do
	SUBTTL Secure Files -- Access Control Cache -- Close File -- Flush Cache

;[111] Here when aborting use of ACCESS.CONTROL file.
;Unmaps all pages, closes JFN, frees cache block.
;Call with P4/ cache block address
;Returns +1 always.

SECFLU:	CALL SECCLS		;[111] (P4/) First unmap junk page if any
	SKIPN T3,CBXMAP(P4)	;[111] Load mapped page count, skip if some
	IFSKP.			;[111] Pages were in fact mapped today
	  SETO T1,		;[111] Get ready to unmap the cache paged
	  MOVE T2,CBXPAG(P4)	;[111] Load page number and this fork
	  TXO T3,PM%CNT		;[111] We have to have a count please
	  PMAP%			;[111] Unmap all of those pages 
	   ERNOP.		;[111] Forget errors
	  SETZM CBXMAP(P4)	;[111] Perform housekeeping
	ENDIF.			;[111] End of unmap code

	MOVE T1,CBXJFN(P4)	;[111] Load the JFN
	CLOSF%			;[111] Close and release the JFN
	 ERCAL SECABR		;[111] (P4/) If that failed, try releasing it
	SETZM CBXJFN(P4)	;[111] Clear this cache entry then now

	AOS NFLUSH		;[115] Count a flushed one
	RET			;[111] Return +1 please

SECABR:	MOVE T1,CBXJFN(P4)	;[111] JFN must not be open (OPENF failed!)
	RLJFN%			;[111] So release the JFN already
	 ERNOP.			;[111] Ignore errors this fine spring day
	RET			;[111] Return +1 always

;[111] Here when wanting to abort all cache entries.
;Called from the crash routine.
;Returns +1 always.

SECCLA:	MOVE P4,[-NCACHE,,CBPOOL] ;[111] For all entries in the cache
	DO.			;[111] Loop through eache entry
	  CALL SECFLU		;[111] (P4/) Flush this entry
	  ADDI P4,CBXSIZ-1	;[111] Count to next block address-1
	  AOBJN P4,TOP.		;[111] Loop for all cache entries
	OD.			;[111] End of that loop
	RET			;[111] Return to caller
	SUBTTL Secure Files -- Action for Successful Access

;[110] Here to check to see if the secure file being touched is our log file.
;If a read of the log file is requested, then we set the sweep cache flag.  If
;a rename of the log file is requested, then we get a new log file.  
;[111] Then if a rename or a write, check each access control block to see if
;it matches the filename of one of our cached files, and if so flush entry.
;
;Call only after determining that access is allowed with
;	Q1/ ARGBLK+.RCARA
;	Q2/ SF.xxx for the type of desired access 
;Returns +1 always.

SECACT:	TXNE Q2,SF.REN!SF.REA	;[121] Is it a rename or read function?
	CALL SECACL		;[121] (/) Yes, have to check log file spec

	TXNE Q2,SF.REN!SF.WRI!SF.DEL ;[121] Is it a rename, write, or delete?
	CALL SECACA		;[121] (/) Check for access.control file

	RET			;[121] Return to caller
;[121] Local routine for SECACT to check for access.control file.
;Called here if a rename or write function was specified.
;Returns +1 always, access.control cache entry flushed if a match.

SECACA:	HRROI T1,SECFNV		;[121] Point to "file.type" of the file
	HRROI T2,[ASCIZ/ACCESS.CONTROL/] ;[121] Point to the usual filename
	CALL ISTCMP		;[121] (T1,T2/T1) See if it is the magic one
	JUMPN T1,R		;[121] If no match return now
	SAVEAC <P4>		;[111] Save an AC
	MOVE P4,[-NCACHE,,CBPOOL] ;[111] For all entries in the cache
	DO.			;[111] Loop through eache entry
	  SKIPN CBXJFN(P4)	;[111] Is this entry active?
	  IFSKP.		;[111] Yes see if access.control file
	    HRROI T1,SECDIR	;[115] Load address of "str:<directory>"
	    HRROI T2,CBXDIR(P4) ;[115] Point to cache block str:<directory>
	    CALL ISTCMP		;[111] (T1,T2/T1) See if a match
	    SKIPN T1		;[111] Skip if no match
	    CALLRET SECFLU	;[121] (P4/) Flush if touching access.control
	  ENDIF.		;[111] End of check for entry to flush
	  ADDI P4,CBXSIZ-1	;[111] Count to next block address-1
	  AOBJN P4,TOP.		;[111] Loop for all cache entries
	OD.			;[111] End of that loop
	RET			;[121] Return to caller

;[121] Local routine for SECACT to check for manipulation of the log file.
;Called here if a rename or read function is being performed.
;Returns +1 always, with new log file or flush log file bit set.

SECACL:	SKIPN LOGJFN		;[121] Log file open now?
	RET			;[121] Nope, return now
	HRROI T1,.GEFIL(Q1)	;[111] Point to filename
	HRROI T2,LOGFNA		;[111] Point to log filename
	CALL ISTCMP		;[111] (T1,T2/T1) Compare those strings now
	JUMPN T1,R		;[121] Return now if not a match on filename
	CAIN Q2,SF.REA		;[110] Reading the log file?
	TXO F,FL%SLF		;[110] It was a match, we need to sweep
	CAIN Q2,SF.REN		;[110] Rename log file?
	CALL NEWLOG		;[110] (/) Yes, we need a new log file then
	RET			;[121] Return to caller
	SUBTTL Secure Files -- Read Line from File

;Here to read one non-comment line from ACCESS.CONTROL into the buffer.
;Called with P4/ CBX
;Returns +1 if EOF (or any other error)
;Returns +2 if line read, P2/ pointer to line, P3/ first nonblank character

SECSIN:	MOVE P2,[POINT 7,SECLIN] ;Point to the line first of all
	MOVEI P3,<SECCPL*5>-1	;Load maximum characters per line today
	DO.			;Loop to read in a line from the file
	  CALL SECCIN		;(P4/T1) Get a character from the file
	   EXIT.		;End the loop if not possible
	  CAIE T1,"-"		;Is it a hyphen?
	  IFSKP.		;Yes, possibly a line continuation character
	    CALL SECCIN		;(P4/T1) Get next character
	     EXIT.		;End loop if end of file
	    CAIE T1,.CHCRT	;Return after hyphen?
	    IFSKP.		;Yes, return after hyphen
	      CALL SECCIN	;(P4/T1) Get next character
	       EXIT.		;End loop if end of file
	      CAIN T1,.CHLFD	;Must be a line feed next
	      LOOP.		;Yes, it was, continue as if nothing happened
	      EXIT.		;Format error in file, lets get out of here now
	    ELSE.		;Otherwise hyphen not followed by a return
	      MOVEI T2,"-"	;Reload the hyphen
	      IDPB T2,P2	;Store it followed by character we just read
	      SOJLE P3,ENDLP.	;Count this character, fall thru to store T1
	    ENDIF.		;End of hyphen not followed by return case
	  ENDIF.		;End of hyphen seen case
	  IDPB T1,P2		;Store that byte please
	  CAIN T1,.CHLFD	;Is it a line feed?
	  EXIT.			;Yes, get out of here with a line read
	  SOJG P3,TOP.		;Loop for all possible characters
	OD.			;End of loop to read line of characters
	MOVEI T1,0		;Load zero also known as the null character
	IDPB T1,P2		;Store that there to insure null on end
	MOVE P2,[POINT 7,SECLIN] ;Point to line please
	RETSKP			;Skip return
	SUBTTL Secure Files -- Read Character from File

;Local routine to read a character from the file, call with P4/ CBX.
;Returns +1 if error
;Returns +2 if no error, T1/ character

SECCIN:	SOSL SECBCT		;See if any bytes left in buffer
	IFSKP.			;If none left there
	  CALL SECMAP		;(P4/) Map a page of the file
	   RET			;If no mapping possible return +1
	  JRST SECCIN		;Try again please
	ENDIF.			;Otherwise we do not need to get more bytes
	ILDB T1,SECBPT		;Load a byte from the file
	MOVE CX,SECBPT		;[123] Load the byte pointer
	MOVE CX,(CX)		;[123] Load the data word
	TRNE CX,1B35		;[123] Is this a LSN line?
	JRST SECCIN		;[123] Yes, ignore it now
	JUMPN T1,RSKP		;If a real character, skip return
	JRST SECCIN		;A null was seen, check next character

;Here to map another page of the access control file.  [111] We only get here
;when the cached page count is exhausted, that is the file is larger than
;SCACHE pages long, after thatn this routine is called for each remainting page
;in the file.  It is felt that files over SCACHE pages are unusual, and at
;least the first SCACHE pages are cached.
;Call with P4/ CBX and SECPCT/ count of pages left to map
;Returns +1 if end of file or other problem with mapping.
;Returns +2 if file mapped, SECBPT and SECPTR set up

SECMAP:	SOSGE SECPCT		;Count a page that is mapped
	RET			;End of file
	AOS T1,SECPMP		;Load the next page number
	HRL T1,CBXJFN(P4)	;Load the JFN into the proper place
	MOVX T2,<.FHSLF,,SECOPG> ;[111] This fork and this page
	MOVX T3,PM%RD		;Reading only the one page today
	PMAP%			;Map those pages in please
	 ERJMP R		;If error we are done
	TXO F,FL%LAC		;[111] Indicate long access control file
	MOVE T1,[POINT 7,SECOBU] ;[111] Point to proper place
	MOVEM T1,SECBPT		;Store this in the correct place
	MOVEI T1,PGSIZ*5	;Load byte count of the page
	MOVEM T1,SECBCT		;Save the byte count of this page
	RETSKP			;Skip return
	SUBTTL Secure Files -- Read Character from Line Buffer

;Here to read a character from the line.  Eats embedded comments.
;Call with P2/ pointer to the line
;Returns +1 if end of line seen
;Returns +2 if not end of line, P2/ updated pointer P3/ character

SECCHR:	CALL SECCH2		;(P2/P2,P3) Load a character
	 RET			;End of line!
	CAIE P3,"!"		;Is it a embedded comment character?
	RETSKP			;Nope, return +2 now

SECCH1:	CALL SECCH2		;(P2/P2,P3) Get next character
	 RET			;Returns +1 at end of line
	CAIE P3,"!"		;Is it the end of embedded comment?
	JRST SECCH1		;Nope, keep looking for end of comment 
;	CALLRET SECCH2		;(P2/P2,P3) Yes, get next character and return

SECCH2:	ILDB P3,P2		;Load a character please
	CAIE P3,.CHCRT		;Return?
	CAIN P3,.CHFFD		;Form feed?
	JRST SECCHR		;Yes, eat those
	CAIN P3,.CHLFD		;End of line?
	RET			;Yes, return +1
	CAIL P3,"a"		;Is it
	CAILE P3,"z"		; lowercase?
	RETSKP			;Nope, return +2
	SUBI P3,"a"-"A"		;Yes, convert to upper case
	RETSKP			; and return +2

;Here to eat characters from pointer in P2 until a nonblank character is found.
;Call SECSPA with P2/ pointer to the line, P3/ 0 or last character read
;Call SECSPN to ignore last character read, P2/ pointer to the line
;Returns +1 if end of line
;Returns +2 if not end of line with P2/ updated pointer and P3/ character

SECSPN:	CALL SECCHR		;(P2/P2,P3) Read a character
	 RET			;Return +1 if end of line
SECSPA:	CAIE P3," "		;Was the last character read a space?
	CAIN P3,.CHTAB		;Was the last character read a tab?
	JRST SECSPN		;Yes, get another character then please
	RETSKP			;Return +2, P3/ nonblank character
	SUBTTL Secure Files -- Read Field from Line Buffer

;Here to read in a field from the access control listing file.
;Legal field characters are alphanumerics, asterisk, dot, percent.
;Call with P2/ pointer to the line, P3/ last character read
;Returns +1 if blank field (EOL or field terminator detected before field read)
;Returns +2 if non-blank field, P2/ updated, P3/ field terminator

SECFLD:	CALL SECSPA		;(P2,P3/P2,P3) Eat any leading spaces
	 RET			;End of line
	MOVE T1,[POINT 7,SECWRD] ;Point to output area (word/field to match)
	SETZM SECWRD		;Make it easy to see blank fields

SECFL1:	CAIL P3,"0"		;OK, well is it a character we can consider
	CAILE P3,"9"		; a numeric character?
	CAIN P3,"."		;Is it a hot dot?  (dot is less than zero)
	JRST SECFL5		;Yes in fact this is a legal character
	CAIE P3,"*"		;Is it a going to be
	CAIN P3,"%"		; a wild character?
	JRST SECFL5		;Yes, proceed to store it and loop
	CAIN P3,"$"		;Is it money?
	JRST SECFL5		;Yes
	CAIE P3,"_"		;Is it a going to be underscore
	CAIN P3,"-"		; or a hyphen?
	JRST SECFL5		;Yes, proceed to store it and loop
	CAIL P3,"A"		;Is the character one that we consider
	CAILE P3,"Z"		; alphabetic?
	JRST SECFL6		;Nope, it is a field terminator

;Here if non-terminator character.  Store it, get next character, and loop.
	
SECFL5:	IDPB P3,T1		;It is a legal character, store the character
	CALL SECCHR		;(P2,P2/P3) Read a non blank character
	 JRST SECFL6		;End of line, check it out
	JRST SECFL1		; and loop for more of them today please sir

;Here if field terminator seen.  Store a null, return +2 if non-null word read.

SECFL6:	SETZ T2,		;Load a zero or null character to tie it off
	IDPB T2,T1		;Stick a null at end of the string 
	SKIPE SECWRD		;Here if end of line, did we store something?
	AOS (P)			;Yes, skip return
	RET			;Return +1 or +2
	SUBTTL Subroutines -- Simulate STCMP

;[111] Here to quickly/cheaply compare to ASCIZ strings.
;Call with T1 and T2 pointing to two ASCIZ strings.
;CAUTION!  This routine smashes T1 through T4!
;Returns +1 always, T1/0 if strings matched.

ISTCMP:	TLC T1,-1		;[111] Complement left half
	TLCN T1,-1		;[111] Was the left half -1?
	HRLI T1,(Point 7)	;[111] Yes, make it a byte pointer
	TLC T2,-1		;[111] Complement left half
	TLCN T2,-1		;[111] Was the left half -1?
	HRLI T2,(Point 7)	;[111] Yes, make it a byte pointer
	DMOVE T3,T1		;[111] Copy the pointers to T3 and T4
	DO.			;[111] Loop through the characters
	  ILDB T2,T4		;[111] Get character from user's filespec
	  ILDB T1,T3		;[111] Get character from log filespec
	  CAIN T1,(T2)		;[111] Do the characters match?
	  JUMPN T1,TOP.		;[111] Yes, continue to loop unless null seen
	OD.			;[111] End of loop, null in T1 if a match seen
	RET			;[111] Return with T1 set up
	SUBTTL Subroutines -- Simulate SOUT

;Here to quickly/cheaply copy ASCIZ string, insures null at end of string.
;Call with T1/ destination byte pointer, T2/ source byte pointer
;CAUTION!  This routine MUST preserve all ACs except T1 and T2.
;Returns +1 always, string copied, T1 and T2 updated

ISOUT:	TLC T1,-1		;Complement left half
	TLCN T1,-1		;Was the neft half -1?
	HRLI T1,(Point 7)	;Yes, make it a byte pointer
	TLC T2,-1		;Complement left half
	TLCN T2,-1		;Was the neft half -1?
	HRLI T2,(Point 7)	;Yes, make it a byte pointer

ISOUT1:	ILDB CX,T2		;Load a byte
	IDPB CX,T1		;Store it
	JUMPN CX,ISOUT1		;Jump if not done
	MOVNI CX,1		;Back up the byte pointer
	ADJBP CX,T1		; by one and
	MOVEM CX,T1		;  store back the byte pointer
	RET			;Return
	SUBTTL Output Subroutines -- Output Information about Job

;Here to output information about a particular job.
;Call with T1/ output pointer and T4/ address of GETJI block.
;Returns +1 always

OGETJI:	CALL OSPACE		;(T1/T1) Output a space next please

;Output username.

	MOVE T2,.JIUNO(T4)	;Load the user number
	CALL ODIRST		;(T1,T2/T1) Output directory name

;Output any controlling job information next.

OGETJ1:	HRROI T2,[ASCIZ/ job /]	;Label the job number, first part of data
	MOVE T3,.JIJNO(T4)	;Load the job number
	CALL OLDEC		;(T1,T2,T3/T1) Append in the job number
	SKIPGE .JICPJ(T4)	;Is there a controlling job ?
	IFSKP.			;Yes
	  SKIPL .JIBAT(T4)	;Is the controlling job BATCON?
	  IFSKP.		;Yes it is batch
	    HRROI T2,[ASCIZ/ batch/] ;Label it as such
	    CALL ISOUT		;(T1,T2/T1) Append that to the string
	  ELSE.			;Job is controllied and not batch
	    HRROI T2,[ASCIZ/ ctrl /] ;Label next field
	    MOVE T3,.JICPJ(T4)	;Load the controlling job again
	    CALL OLDEC		;(T1,T2,T3/T1) Output label and job in decimal
	  ENDIF.		;End of job not batch code
	ENDIF.			;End of controlling job check

;Output terminal number and origin.

	SKIPGE T3,.JITNO(T4)	;Have a terminal number?
	IFSKP.			;Yes
	  HRROI T2,[ASCIZ/ TTY/] ;Label the number
	  CALL OLOCT		;(T1,T2,T3/T1) Append the label and octal line
	  SKIPN NTBLK(T4)	;Have network terminal information?
	  IFSKP.		;Yes, output that
	    CALL OSPACE		;(T1/T1) First a space
	    HRROI T2,NTBLK(T4)	;Point to block with name in it
	    CALL ISOUT		;(T1,T2/T1) Send that along next
	  ENDIF.		;End of network org available code
	ELSE.			;We don't have a terminal number
	  HRROI T2,[ASCIZ/ Det/] ;Its detached
	  CALL ISOUT		;(T1,T2/T1) Append detached string
	ENDIF.			;End of terminal number output

;Output program name.

	CALL OSPACE		;(T1/T1) Output a space
	SKIPN T2,.JIPNM(T4)	;Get program name
	MOVE T2,.JISNM(T4)	;If none, use subsystem name
	CALLRET OSIXBI		;(T1,T2/T1) Output sixbit word
	SUBTTL Output Subroutines -- Output Username/Device/Filename

;Routine to do a DIRST.
;Call with T1/ output designator, T2/ user or directory number (5B2+n)
;Returns +1 always, T1/ updated pointer
;                   T2/ user or directory number if legal,
;			0,,error if unknown or 0,,0 if not logged in

ODIRST:	TRNE T2,-1		;Not logged in?
	IFSKP.			;If not logged in
	  HRROI T2,[ASCIZ/not-logged-in/] ;Indicate not logged in today
	  CALL ISOUT		;(T1,T2/T1) Send all of that to string and ret
	  SETZ T2,		;Indicate not logged in
	  RET			;Return with T1/ updated pointer and T2/ 0
	ENDIF.			;End of not logged in case
	MOVE T3,T1		;Copy pointer in case error
	DIRST%			;DIRectory number to STring
	 ERSKP.			;Skip if error
	RET			;Return to caller
	EXCH T1,T3		;Swap pointer with error code
	HRROI T2,[ASCIZ/unknown/] ;Say something if failure
	CALL ISOUT		;(T1,T2/T1) Return a string
	MOVE T2,T3		;Return error code in T2 
	RET			;Return pointer in T1

;Routine to do a DEVST.
;Call with T1/ output designator, T2/ directory number
;Returns +1 always

ODEVST:	MOVE T3,T1		;Copy designator to T3 in case of error
	DEVST%			;Convert to string
	 ERSKP.			;Skip if error
	RET			;Return if success
	MOVE T1,T3		;Reload the pointer
	HRROI T2,[ASCIZ/unknown/] ;Load unknown tag
	CALLRET ISOUT		;(T1,T2/T1) Send that and return

;Routine to do a JFNS.
;Call with T1/ output designator, T2/ JFN
;Returns +1 always

OJFNS:	SETZ T3,		;Default format today
	JFNS%			;JFN to String
	 JSERRO (<JFNS failure>) ;Owie
	RET			;Return +1
	SUBTTL Output Subroutines -- Output Capability Mask

;Here to output text for bits in capability mask
;Call with
;	T1/ output pointer
;	T4/ capability bits
;Returns +1 always, T1/ updated pointer, T2 and T3 smashed

OCAPAB:	MOVSI T3,-CAPNUM	;Load AOBJN pointer to capabilities
	DO.			;Loop for these capabilities
	  HLRO T2,CAPTBL(T3)	;Load ASCIZ string for this capability
	  TDNE T4,CAPTBL(T3)	;Is this one lit?
	  CALL ISOUT		;(T1,T2/T1) Yes, dump its string
	  AOBJN T3,TOP.		;Loop for all of them
	OD.			;End of loop
	RET			;Return to caller

;Table of interesting (right halfword) capabilities.

CAPTBL:	TENTRY (< whl>,SC%WHL)
	TENTRY (< opr>,SC%OPR)
	TENTRY (< cnf>,SC%CNF)
	TENTRY (< mnt>,SC%MNT)
	TENTRY (< enq>,SC%ENQ)
	TENTRY (< ipc>,SC%IPC)
	TENTRY (< nwz>,SC%NWZ)
	TENTRY (< nas>,SC%NAS)
	TENTRY (< dna>,SC%DNA)
	TENTRY (< ana>,SC%ANA)
	TENTRY (< sem>,SC%SEM)
	CAPNUM==.-CAPTBL	;Compute number in table
	SUBTTL Output Subroutines -- Small Output Routines

;Here to output CRLF (PCRLF) or text buffer (PTEXT).
;Returns +1 always.

PTEXT:	SKIPA T1,[XWD -1,TEXTBU] ;Point to text area and skip always
PCRLF:	HRROI T1,[BYTE(7).CHCRT,.CHLFD]	;Point to crlf
	PSOUT%			;Send to terminal
	RET			; and return

;Here to print error buffer as an error message.
;Returns +1 always.

PERRO:	HRROI T1,ERRBUF		;Point to the finished message
	ESOUT%			;Output that error string to terminal
	RET			;Return +1 always

;Here to append a CRLF to the string pointed to by T1.
;Returns +1 always, T1/ updated pointer.

OCRLF:	HRROI T2,[BYTE(7).CHCRT,.CHLFD]	;Point to crlf
	CALLRET ISOUT		;(T1,T2/T1) Append that to the string and ret

;Here to output a space or comma, insures a null after character of course.
;Call with T1/ output pointer
;Returns +1 always, T1/ updated pointer.

OCOMMA:	SKIPA T2,[XWD -1,[ASCIZ/,/]] ;Load pointer to a comma and skip
OSPACE:	HRROI T2,[ASCIZ/ /]	;Load pointer to a space
	CALLRET ISOUT		;Send that along and return

;Small routine to check on the byte pointer in T1.
;Call with T1/ suspected pointer
;Returns +1 always T1/ real byte pointer

PCHECK:	TLC T1,-1		;Complement left half
	TLCN T1,-1		;Was the neft half -1?
	HRLI T1,(Point 7)	;Yes, make it a byte pointer
	RET			;Return +1 always
	SUBTTL Output Subroutines -- Output Sixbit Word

;Here to output a SIXBIT word.
;Call with
;	T1/ output pointer
;	T2/ SIXBIT word
;Returns +1 always, T1/ updated, T2 smashed

OSIXBI:	SAVEAC <T3,T4>		;Save some ACs for scratch
	CALL PCHECK		;(T1/T1) Insure real byte pointer in T1
	MOVE T4,[POINT 6,T2]	;Load byte pointer to string

OSIXB3:	ILDB T3,T4		;Load character 
	JUMPE T3,OSIXB6		;Done if null (space) seen
	ADDI T3,"A"-'A'		;Convert to ASCII
	IDPB T3,T1		;Store character
	JRST OSIXB3		;Loop for all characters

OSIXB6:	MOVEM T1,T4		;Get a copy of the current byte pointer
	IDPB T3,T4		;Store a null past the last real character
	RET			; and then return
	SUBTTL Output Subroutines -- Output Numbers

;Here to prepend a text string and then output a number in decimal radix.
;	T1/ destination pointer
;	T2/ pointer to ASCIZ text
;	T3/ number to be output
;Returns +1 always, T1/ updated pointer

OLDEC:	CALL ISOUT		;(T1,T2/T1) Output string (preserves T3!)
	MOVE T2,T3		;Load number to print into T2
	CAME T2,[INFQUO]	;Is it +inf quota?
	CALLRET ODEC		;Nope, print the number
	HRROI T2,[ASCIZ/inf/]	;Load infinity string
	CALLRET ISOUT		;(T1,T2/T1) Output that and return

;Here to prepend a text string and then output a number in octal radix.
;	T1/ destination pointer
;	T2/ pointer to ASCIZ text
;	T3/ number to be output
;Returns +1 always, T1/ updated pointer

OLOCT:	CALL ISOUT		;(T1,T2/T1) Send label string first
	MOVE T2,T3		;Load number
;	CALLRET OOCT		;(T1,T2/T1) Send octal number and return

;Here to output number quickly (without using a JSYS to do so).
;	T1/ destination pointer
;	T2/ number to be output
;Returns +1 always, T1/ updated pointer, T2/ 0, T3/ smashed

OOCT:	SKIPA CX,[4+4]		;Radix 8
ODEC:	MOVEI CX,5+5		;Radix 10
	CALL PCHECK		;(T1/T1) Insure real byte pointer in T1
	CALL ONUMB		;(T1,T2,CX/T1,T2) Call local routine for output
	MOVE T3,T1		;Copy output pointer
	IDPB T2,T3		;Store that null after the useful text
	RET			; and quickly return to the caller

ONUMB:	IDIVI T2,(CX)		;Extract digit from the number in proper radix
	ADDI T3,"0"		;Convert that binary digit to ASCII
	PUSH P,T3		;Save this on the stack
	SKIPE T2		;Skip if we are all done
	CALL ONUMB		;(T1,T2/T1) Loop for all numbers
	POP P,T3		;Restore a digit from the stack
	IDPB T3,T1		;Store that in the output pointer
	RET			;Return to caller or to get another digit
;Here to output a label and number in octal halfword format such as a PPN.
;Call with
;	T1/ destination pointer
;	T2/ pointer to ASCIZ text
;	T3/ number to be output
;Returns +1 always, T1/ updated pointer

OLPPN:	CALL ISOUT		;(T1,T2/T1) Output string (preserves T3!)
	MOVE T2,T3		;Load number to print into T2
;	CALLRET OPPN		;(T1,T2/T1) Output number in halfword format

;Here to output a number in octal halfword format such as a PPN.
;Call with
;	T1/ destination pointer
;	T2/ number to be output
;Returns +1 always, T1/ updated pointer.

OPPN:	PUSH P,T2		;Save the number
	HLRZ T2,T2		;Load the project number into the right half
	CALL OOCT		;(T1,T2/T1) Send that project number out
	MOVEI T2,","		;Load a comma for the halfword seperator
	IDPB T2,T1		;Store that comma next please 
	POP P,T2		;Restore the project-programmer number
	ANDI T2,-1		;Clear the left half leaving programmer number
	CALLRET OOCT		;(T1,T2/T1) Output programmer and return

;Here to output number and name of it with "s" as appropriate.
;Call with
;	T1/ destination
;	T2/ number
;	T3/ pointer to ASCIZ text
;Returns +1 always, T1/ updated pointer.

OPLURA:	SAVEAC <Q1,Q2>		;Save a couple of ACs first
	DMOVEM T2,Q1		;Save the number and pointer to text
	CALL ODEC		;(T1/T1,T2) Output number
	MOVE T2,Q2		;Load pointer to the text
	CALL ISOUT		;(T1,T2/T1) Output that string next
	SOSN Q1			;Was the number just one?
	RET			;Yep, done
	HRROI T2,[ASCIZ/s/]	;Load your S up
	CALLRET ISOUT		;(T1,T2/T1) Output and insure a null on end
	SUBTTL Output Subroutines -- Output Floating Point Numbers

;Here to output floating point number
;	T1/ destination pointer
;	T2/ floating point number to be output
;Returns +1 always, T1/ updated

OFLOUT:	MOVX T3,FL%ONE!FL%PNT!FLD(4,FL%RND)!FLD(3,FL%SND) ;Format bits
	FLOUT%			;Output that
	 JSERRO (<FLOUT failure>) ;Snowballs exist in hell today
	RET			;Return to sender
	SUBTTL Output Subroutines -- Output Millisecond Times

;Routine to output time in the form "h:mm:ss.tt" or "n days hh:mm:ss".
;Call at OTIMEH with T1/ destination byte pointer, T2/ time in HPTIM units
;Call at OTIME with T1/ destination byte pointer, T2/ time in milliseconds
;Returns +1 always, T1/ updated pointer

OTIME:	IDIV T2,[^D<24*60*60*1000>] ;Milliseconds, get days in T2, time in T3
	IMULI T3,^D100		;Convert milliseconds to HPTIM units
	JRST OTIME1		; and enter the high precision units output

OTIMEH:	IDIV T2,[^D<24*60*60*1000*100>] ;HPTIM unit, get days in T2, time in T3
OTIME1:	SAVEAC <P1,P2,P3,P4,P5>	;Save the Ps

;Now T1/ output pointer, T2/ days, T3/ time in HPTIM units.

	MOVEM T3,P1		;Save the time in HPTIM units for later
	HRROI T3,[ASCIZ/ day/]	;Label the number as "day" or "days"
	SKIPN P5,T2		;Skip if days, load P5 with number of days
	JRST OTIME2		;No days to output today
	CALL OPLURA		;(T1,T2,T3/T1) Output that
	CALL OSPACE		;(T1/T1) followed by a space

;Now P1/ time, T1/ output pointer, breakup the time into its components.

OTIME2:	EXCH T1,P1		;Get time in T1, save output pointer
	ADDI T1,^D500		;Round up the hundredths of seconds
	IDIVI T1,^D1000		;Get units into hundredths of seconds
	IDIV T1,[^D<100*60*60>]	;Get hours from hundreths of seconds
	IDIVI T2,^D<100*60>	;Get minutes from fractional hours
	IDIVI T3,^D100		;Get seconds from fractional minutes
	DMOVEM T3,P3		;Save seconds in P3 and hundreths of secs in P4
	MOVEM T2,P2		;Save minutes in P2
	EXCH T1,P1		;Save hours in P1, get string pointer back
;Now P1/ hours, P2/ minutes, P3/ seconds, P4/ hundreths, P5/ days.  
;Output hours and colon if days output or if hours are not zero.

	MOVX T3,^D10		;Load radix 10 for the hours please
	MOVEI T4,":"		;Load a colon for a suffix
	SKIPN T2,P1		;Always output nonzero hours
	SKIPE P5		;If any days always output hours even if zero
	CALL OTIME3		;(T1,T2,T3,T4/T1,T3) Output hours and a colon

;Output minutes and a colon if hours output or if minutes is nonzero.

	SKIPN T2,P2		;Always output minutes if nonzero 
	TXNE T3,NO%LFL		;Mins zero, output mins if hours or days output
	CALL OTIME3		;(T1,T2,T3,T4/T1,T3) Output minutes and colon

;Output seconds always, suffix is a dot only if no hours output.

	MOVE T2,P3		;Load seconds as they are always output
	SKIPE P5		;If no hours were output
	TDZA T4,T4		; then no suffix will be printed
	MOVEI T4,"."		;Suffix after seconds should be a hot dot
	CALL OTIME3		;(T1,T2,T3,T4/T1,T3) Output seconds and a dot

;Output hundreths with no suffix only if no days have been output.

	JUMPN P5,R		;Return now if hours were output
	SETZ T4,		;No seperator now
	MOVE T2,P4		;Load hundredths of seconds and fall through

;Local routine called from above to output parts of the time and a suffix.

OTIME3:	NOUT%			;Output number
	 JSERRO (<NOUT failed>)	;Owie
	SKIPE T4		;Any seperator character?
	IDPB T4,T1		;Yes, store it now
	MOVX T3,NO%LFL!NO%ZRO!FLD(2,NO%COL)!FLD(^D10,NO%RDX) ;2 for the rest
	RET			;Return to above
	SUBTTL Output Subroutines -- Output Standard Date/Time

;Outputs time of day from internal format, call with T1/ output byte pointer.
;Call at OODTIN with T1/ pointer, current time, suppressing columnation.
;Call at OODTIM with T1/ pointer, T2/ time, suppressing columnation.
;Call at OODTI1 with T1/ pointer, T2/ time, and T3/ time format bits.
;Returns +1 always with T1/ updated pointer.

OODTIN:	SETO T2,		;The time is now
OODTIM:	MOVX T3,OT%SCL		;Suppress columnation 9 days of the month
OODTI1:	ODTIM%			;Zap it to terminal
	 JSERRO (<ODTIM failed>) ;Owie
	RET			;Return

;Routine to output time of day as expressed in seconds since midnight.
;Call with T1/ pointer, T2/ time as seconds since midnight.
;Returns +1 always T1/ updated.

OTOD:	SAVEAC <P1,P2>		;Save some space
	CALL PCHECK		;(T1/T1) Insure real byte pointer in T1
	IDIVI T2,^D60*^D60	;Get hours in T2 
	IDIVI T3,^D60		;Get minutes in T3 and seconds in T4
	DMOVEM T3,P1		;Put minutes in P1 and seconds in P2
	CALL OTOD2		;(T1,T2/T1) Use local routine for just numbers
	MOVE T2,P1		;Load the number of minutes
	CALL OTOD1		;(T1,T2/T1) Use routine sending colon and time
	SKIPE T2,P2		;Load the seconds, don't output if its zero
	CALL OTOD1		;(T1,T2/T1) Use routine sending colon and time
	MOVEI T2,0		;Load a null
	IDPB T2,T1		;Store it last
	MOVNI T2,1		;Back up the byte pointer
	ADJBP T2,T1		; by one and
	MOVEM T2,T1		;  store back the byte pointer
	RET			;Return

;Local routine to send time (OTOD2) or colon and time (OTOD1).
;Accepts T1/ output pointer, T2/ number.
;Returns +1 always, T1/ updated

OTOD1:	MOVEI T3,":"		;Load suffix character next
	IDPB T3,T1		;Store seperator
OTOD2:	IDIVI T2,^D10		;Get the two digits 
	ADDI T2,"0"		;Convert to ASCII
	IDPB T2,T1		;Send that first digit out
	ADDI T3,"0"		;Pump up another ASCII digit
	IDPB T3,T1		;Send that too
	RET			;Return
	SUBTTL Output Subroutines -- Output JSYS Error Message

;Subroutine to send along the last JSYS error
;Call with T1/ output designator
;Returns +1 always with T1/ updated

OERSTR:	MOVX T2,<.FHSLF,,-1>	;This fork's last error
	SETZ T3,		;No limit
	ERSTR%			;Get string to error
	 CALLRET OERSTE		;(T1/T1) Undefined error number
	 JFCL			;String size out of bounds or bad designator?
	RET			;Return to caller with T1 updated

OERSTE:	HRROI T2,[ASCIZ/Undefined error /] ;Output label for string
	CALL ISOUT		;(T1,T2/T1) Append that string too
	CALL GETERR		;(/T2) Get fork's last error
	MOVEI T3,4+4		;Radix 8
	NOUT%			;Don't use OOCT routine to output that number
	 ERNOP.			;Ignore error within error within error
	RET			;Return with T1 updated
	SUBTTL Error Handler -- Error Messages

;Subroutine to handle JSYS errors
;Call with CX/address of ASCIZ string
;Returns +1 always, message, error, and trailing CRLF printed

JSERR1:	TXOE F,FL%ERR		;Error within an error?
	RET			;Return before additional damage can occur
	HRROM CX,ERRADR		;Save address of string to print
	SAVEAC <T1,T2,T3,T4>	;Save some ACs today please
	HRROI T1,ERRBUF		;Point to text buffer
	TXNN F,FL%ACJ		;Acting like the ACJ?
	IFSKP.			;Yes
	  HRROI T2,[ASCIZ/Access Control Facility error detected at /] ;Label
	  CALL ISOUT		;(T1,T2/T1) Send that
	  CALL OODTIN		;(T1/T1) Output date time of now
	  HRROI T2,[ASCIZ/
    /]				;Label the next little bit
	  CALL ISOUT		;(T1,T2/T1) Send that and return
	ENDIF.			;End of acting like the ACJ code
	MOVE T2,ERRADR		;Load pointer to error text string
	CALL ISOUT		;(T1,T2/T1) Start off with that text
	CALL OERSTR		;(T1/T1) Append in the last error text please
	CALL OCRLF		;(T1/T1) Append a CRLF to all of that

	CALL PERRO		;(/) Send all of that to terminal as error mess
	HRROI T1,ERRBUF		;Point to text buffer again
	TXNE F,FL%ACJ		;[116] Acting like the ACJ?
	CALL SENLOG		;[116] (T1/) Send to log file if possible
	TXZ F,FL%ERR		;Clear error bit
	RET			; and return

;Small routine to return this fork's last error in T2
;Returns +1 always, T2/ error number, T1 preserved

GETERR:	PUSH P,T1		;Save T1
	MOVEI T1,.FHSLF		;Load this fork
	GETER%			;Get last error in T2
	TLZ T2,-1		;Zap junk in LH
	POP P,T1		;Restore T1
	RET			;Return
	SUBTTL Error Handler -- Panic and Control-C Interrupt

;Here when a panic interrupt hits us.  For now we just crash.

PANIC:	BUG(HLT,PAN,<Panic interrupt>) ;Just say crash

;Here when a control-C seen, terminate the world by crashing.

CNTRLC:	BUG(HLT,CCC,<Control-C Crash>) ;Boom
	SUBTTL Error Handler -- Crash Handler

;Here when we want to crash, save all of the ACs, save ourself, then crash.
;Called by JSR BUGHLT, following is ASCIZ/crash code/ and ASCIZ/crash reason/.

BUGHLT:	EXP 0			;Called by JSR BUGHLT

;Save all the ACs, get a new stack.

	MOVEM 17,BUGACS+17	;Save all of the ACs here please
	MOVEI 17,BUGACS		;Get source,,destination (0,,BUGACS)
	BLT 17,BUGACS+16	;Move all of the rest of them to memory please
	MOVE P,[IOWD BUGLEN,BUGPDL] ;Load a new stack pointer

;Save last TOPS-20 error, send message to terminal about this problem.

	CALL GETERR		;(/T2) Get last JSYS error code
	HRRZM T2,LASERR		;Save it here
	CALL FATALE		;(/) Let me tall ya sumthin ma ma ma ma mannn

;Save our image in a good place today.

	HRROI T2,[ASCIZ/DMP:ACJ-/] ;Load the initial part of filename
	CALL BUGSAV		;(T2/) Save ourselves
	IFNSK.			;If it failed
	  HRROI T2,[ASCIZ/SYSTEM:ACJ-/] ;Try SYSTEM: this time
	  CALL BUGSAV		;(T2/) Try again
	   OJSERR (<Can't save crash>) ;This will be interesting debugging
	ENDIF.			;We did all we could

;Kill inferiors, disable all GETOK functions, close log file.

	MOVX T1,.FHINF		;Load fork handle for all inferiors
	KFORK%			;Kill all of them
	 ERNOP.			;Ignore errors at this point
	TXO F,FL%ERR		;[110] Light error in progress bit please
	CALL DISFNC		;(/) Disable all functions before crashing
	CALL CLOLOG		;[110] (/) Sweep and close the log file
	CALL SECCLA		;[111] (/) Close all cached access.control

;Restore ACs.  Halt if not running as job 0.  Restart if running as job 0.

	MOVSI 17,BUGACS		;Get source,,destination (BUGACS,,0)
	BLT 17,16		;Move all but one of them back from memory
	MOVE 17,BUGACS+17	;Reload the last AC
	RESET%			;Dump all resources we might have
	SKIPN OURJOB		;Are we running under job 0?
	JRST ASTART		;For security reasons, restart ourselves
	HALTF%			;Halt
	JRST .-1		; and don't continue either
;Print a message on the console about this problem, only called from BUGHLT.
;Returns +1 always.

FATALE:	HRROI T1,ERRBUF		;Point to error buffer today
	HRROI T2,[ASCIZ/
 Access control program fatal error "/]
	CALL ISOUT		;(T1,T2/T1) Send that along first
	MOVE T2,BUGHLT		;Point to ASCIZ strings
	HRLI T2,(Point 7)	;Make a byte pointer to it
	CALL ISOUT		;(T1,T2/T1) Copy the reason code
	MOVE Q1,T2		;Save this for a little bit
	HRROI T2,[ASCIZ/" (/]	;Load the next little bit
	CALL ISOUT		;(T1,T2/T1) Copy the string
	MOVEI T2,1(Q1)		;Get next address after null
	HRLI T2,(Point 7)	;Point to rest of string
	CALL ISOUT		;(T1,T2/T1) Send that along
	HRROI T2,[ASCIZ/)
  Last TOPS-20 error: /]	;Label next string
	CALL ISOUT		;(T1,T2/T1) Send that along
	CALL OERSTR		;(T1/T1) Send last JSYS error next
	HRROI T2,[ASCIZ/
  Access control terminated at /] ;Start the next line
	CALL ISOUT		;(T1,T2/T1) Send that along also
	CALL OODTIN		;(T1/T1) Output the time of now
	CALL OCRLF		;(T1/T1) Append a crlf
	HRROI T1,ERRBUF		;Point to error buffer again
	PSOUT%			;Send to the console
	RET			;Return to caller
;Here to get a JFN on a crash filename and save ourselves.
;Call with T2/ pointer to initial part of crash filename
;Returns +1 if error.
;Returns +2 if crash saved.

BUGSAV:	HRROI T1,BUGFIL		;Point to place to store filename
	CALL ISOUT		;(T1,T2/T1) Copy first part of string
	HRRZ T2,EV+2		;Load the edit number of the ACJ
	CALL OOCT		;(T1,T2/T1) Send the OCTAL edit number next
	HRROI T2,[ASCIZ/-/]	;Delimit the string
	CALL ISOUT		;(T1,T2/T1) Send the delimiter
	MOVE T2,BUGHLT		;Load the stop address again
	HRLI T2,(Point 7)	;Make a byte pointer again
	CALL ISOUT		;(T1,T2/T1) Copy the crash code next
	HRROI T2,[ASCIZ/-CRASH.EXE/] ;Finish up the string
	CALL ISOUT		;(T1,T2/T1) Send the file type last

	MOVX T1,GJ%SHT!GJ%FOU	;Load short form and for output bits
	HRROI T2,BUGFIL		;Point to file we just made up
	GTJFN%			;Try to get a JFN on dump file
	 ERJMP R		;Return +1 for error
	MOVE T4,T1		;We got a JFN, copy it for a sec

	HRROI T1,ERRBUF		;Point back to error buffer again
	HRROI T2,[ASCIZ/  Access control crash saved as /] ;Load label
	CALL ISOUT		;(T1,T2/T1) Start the text right
	MOVE T2,T4		;Load the JFN
	CALL ISOUT		;(T1,T2/T1) Save initial text
	CALL OJFNS		;(T1,T2/T1) Send the filename next
	CALL OCRLF		;(T1/T1) Make it neat

	MOVE T1,T4		;Reload the JFN again
	HRLI T1,.FHSLF		;Make this fork,,jfn
	MOVX T2,SS%CPY!SS%RD!SS%EXE!FLD(-770,SS%NNP)!FLD(0,SS%FPN) ;Page 0-767
	SSAVE%			;Save our image, closes the JFN today
	 ERJMP R		;Return +1 if errors today

	HRROI T1,ERRBUF		;Point to error buffer
	PSOUT%			;Send to console
	RETSKP			;Return +2 for success
	SUBTTL End of ACJDEC

;Dump literals here

	LOWCD			;Get to low seg
DECLIT:	XLIST			;Remove literals from listing
	LIT			;Dump them here
	LIST			;Resume listing

;Get globular symbols

	GGLOBS

	END <EVLEN,,EV>