2 * Copyright (c) 1995 Danny Gasparovski.
4 * Please read the file COPYRIGHT for the
5 * terms and conditions of the copyright.
8 #define WANT_SYS_IOCTL_H
11 u_int curtime, time_fasttimo, last_slowtimo;
24 lprint("X Redir: X not being redirected.\r\n");
26 lprint("X Redir: In sh/bash/zsh/etc. type: DISPLAY=%s:%d.%d; export DISPLAY\r\n",
27 inet_ntoa(our_addr), x_port, x_screen);
28 lprint("X Redir: In csh/tcsh/etc. type: setenv DISPLAY %s:%d.%d\r\n",
29 inet_ntoa(our_addr), x_port, x_screen);
31 lprint("X Redir: Redirecting to display %d\r\n", x_display);
39 * XXX Allow more than one X redirection?
42 redir_x(inaddr, start_port, display, screen)
51 lprint("X Redir: X already being redirected.\r\n");
54 for (i = 6001 + (start_port-1); i <= 6100; i++) {
55 if (solisten(htons(i), inaddr, htons(6000 + display), 0)) {
64 lprint("X Redir: Error: Couldn't redirect a port for X. Weird.\r\n");
69 #ifndef HAVE_INET_ATON
75 u_int32_t addr = inet_addr(cp);
76 if (addr == 0xffffffff)
84 * Get our IP address and put it in our_addr
90 struct hostent *he = NULL;
92 if (gethostname(buff,256) == 0)
93 he = gethostbyname(buff);
95 our_addr = *(struct in_addr *)he->h_addr;
96 if (our_addr.s_addr == 0)
97 our_addr.s_addr = loopback_addr.s_addr;
100 #if SIZEOF_CHAR_P == 8
112 register struct quehead_32 *element = (struct quehead_32 *) a;
113 register struct quehead_32 *head = (struct quehead_32 *) b;
114 element->qh_link = head->qh_link;
115 head->qh_link = (u_int32_t)element;
116 element->qh_rlink = (u_int32_t)head;
117 ((struct quehead_32 *)(element->qh_link))->qh_rlink
118 = (u_int32_t)element;
125 register struct quehead_32 *element = (struct quehead_32 *) a;
126 ((struct quehead_32 *)(element->qh_link))->qh_rlink = element->qh_rlink;
127 ((struct quehead_32 *)(element->qh_rlink))->qh_link = element->qh_link;
128 element->qh_rlink = 0;
131 #endif /* SIZEOF_CHAR_P == 8 */
134 struct quehead *qh_link;
135 struct quehead *qh_rlink;
142 register struct quehead *element = (struct quehead *) a;
143 register struct quehead *head = (struct quehead *) b;
144 element->qh_link = head->qh_link;
145 head->qh_link = (struct quehead *)element;
146 element->qh_rlink = (struct quehead *)head;
147 ((struct quehead *)(element->qh_link))->qh_rlink
148 = (struct quehead *)element;
155 register struct quehead *element = (struct quehead *) a;
156 ((struct quehead *)(element->qh_link))->qh_rlink = element->qh_rlink;
157 ((struct quehead *)(element->qh_rlink))->qh_link = element->qh_link;
158 element->qh_rlink = NULL;
159 /* element->qh_link = NULL; TCP FIN1 crashes if you do this. Why ? */
166 add_exec(ex_ptr, do_pty, exec, addr, port)
167 struct ex_list **ex_ptr;
173 struct ex_list *tmp_ptr;
175 /* First, check if the port is "bound" */
176 for (tmp_ptr = *ex_ptr; tmp_ptr; tmp_ptr = tmp_ptr->ex_next) {
177 if (port == tmp_ptr->ex_fport && addr == tmp_ptr->ex_addr)
182 *ex_ptr = (struct ex_list *)malloc(sizeof(struct ex_list));
183 (*ex_ptr)->ex_fport = port;
184 (*ex_ptr)->ex_addr = addr;
185 (*ex_ptr)->ex_pty = do_pty;
186 (*ex_ptr)->ex_exec = strdup(exec);
187 (*ex_ptr)->ex_next = tmp_ptr;
191 #ifndef HAVE_STRERROR
194 * For systems with no strerror
198 extern char *sys_errlist[];
204 if (error < sys_nerr)
205 return sys_errlist[error];
207 return "Unknown error.";
216 fork_exec(struct socket *so, const char *ex, int do_pty)
218 /* not implemented */
226 slirp_openpty(amaster, aslave)
227 int *amaster, *aslave;
229 register int master, slave;
234 if ((master = open("/dev/ptmx", O_RDWR)) < 0 ||
235 grantpt(master) < 0 ||
236 unlockpt(master) < 0 ||
237 (ptr = ptsname(master)) == NULL) {
242 if ((slave = open(ptr, O_RDWR)) < 0 ||
243 ioctl(slave, I_PUSH, "ptem") < 0 ||
244 ioctl(slave, I_PUSH, "ldterm") < 0 ||
245 ioctl(slave, I_PUSH, "ttcompat") < 0) {
257 static char line[] = "/dev/ptyXX";
258 register const char *cp1, *cp2;
260 for (cp1 = "pqrsPQRS"; *cp1; cp1++) {
262 for (cp2 = "0123456789abcdefghijklmnopqrstuv"; *cp2; cp2++) {
264 if ((master = open(line, O_RDWR, 0)) == -1) {
266 return (-1); /* out of ptys */
269 /* These will fail */
270 (void) chown(line, getuid(), 0);
271 (void) chmod(line, S_IRUSR|S_IWUSR|S_IWGRP);
275 if ((slave = open(line, O_RDWR, 0)) != -1) {
280 (void) close(master);
285 errno = ENOENT; /* out of ptys */
293 * We create and bind a socket, then fork off to another
294 * process, which connects to this socket, after which we
295 * exec the wanted program. If something (strange) happens,
296 * the accept() call could block us forever.
298 * do_pty = 0 Fork/exec inetd style
299 * do_pty = 1 Fork/exec using slirp.telnetd
300 * do_ptr = 2 Fork/exec using pty
303 fork_exec(struct socket *so, const char *ex, int do_pty)
306 struct sockaddr_in addr;
307 int addrlen = sizeof(addr);
314 /* don't want to clobber the original */
319 DEBUG_CALL("fork_exec");
320 DEBUG_ARG("so = %lx", (long)so);
321 DEBUG_ARG("ex = %lx", (long)ex);
322 DEBUG_ARG("do_pty = %lx", (long)do_pty);
326 if (slirp_openpty(&master, &s) == -1) {
327 lprint("Error: openpty failed: %s\n", strerror(errno));
334 addr.sin_family = AF_INET;
336 addr.sin_addr.s_addr = INADDR_ANY;
338 if ((s = socket(AF_INET, SOCK_STREAM, 0)) < 0 ||
339 bind(s, (struct sockaddr *)&addr, addrlen) < 0 ||
341 lprint("Error: inet socket: %s\n", strerror(errno));
350 lprint("Error: fork failed: %s\n", strerror(errno));
357 /* Set the DISPLAY */
359 (void) close(master);
360 #ifdef TIOCSCTTY /* XXXXX */
362 ioctl(s, TIOCSCTTY, (char *)NULL);
365 getsockname(s, (struct sockaddr *)&addr, &addrlen);
368 * Connect to the socket
369 * XXX If any of these fail, we're in trouble!
371 s = socket(AF_INET, SOCK_STREAM, 0);
372 addr.sin_addr = loopback_addr;
374 ret = connect(s, (struct sockaddr *)&addr, addrlen);
375 } while (ret < 0 && errno == EINTR);
381 sprintf(buff, "%s:%d.%d", inet_ntoa(our_addr), x_port, x_screen);
382 setenv("DISPLAY", buff, 1);
384 sprintf(buff, "DISPLAY=%s:%d.%d", inet_ntoa(our_addr), x_port, x_screen);
392 for (s = getdtablesize() - 1; s >= 3; s--)
396 bptr = strdup(ex); /* No need to free() this */
398 /* Setup "slirp.telnetd -x" */
399 argv[i++] = "slirp.telnetd";
404 /* Change the string into argv[] */
406 while (*bptr != ' ' && *bptr != (char)0)
410 argv[i++] = strdup(curarg);
414 execvp(argv[0], argv);
416 /* Ooops, failed, let's tell the user why */
420 sprintf(buff, "Error: execvp of %s failed: %s\n",
421 argv[0], strerror(errno));
422 write(2, buff, strlen(buff)+1);
424 close(0); close(1); close(2); /* XXX */
433 * XXX this could block us...
434 * XXX Should set a timer here, and if accept() doesn't
435 * return after X seconds, declare it a failure
436 * The only reason this will block forever is if socket()
437 * of connect() fail in the child process
440 so->s = accept(s, (struct sockaddr *)&addr, &addrlen);
441 } while (so->s < 0 && errno == EINTR);
444 setsockopt(so->s,SOL_SOCKET,SO_REUSEADDR,(char *)&opt,sizeof(int));
446 setsockopt(so->s,SOL_SOCKET,SO_OOBINLINE,(char *)&opt,sizeof(int));
450 /* Append the telnet options now */
451 if (so->so_m != 0 && do_pty == 1) {
452 sbappend(so, so->so_m);
468 bptr = (char *)malloc(strlen(str)+1);
481 #ifndef NO_UNIX_SOCKETS
482 struct sockaddr_un sock_un;
484 struct sockaddr_in sock_in;
488 if (slirp_socket_passwd) {
489 s = socket(AF_INET, SOCK_STREAM, 0);
492 sock_in.sin_family = AF_INET;
493 sock_in.sin_addr.s_addr = slirp_socket_addr;
494 sock_in.sin_port = htons(slirp_socket_port);
495 if (connect(s, (struct sockaddr *)&sock_in, sizeof(sock_in)) != 0)
496 slirp_exit(1); /* just exit...*/
497 sprintf(buff, "kill %s:%d", slirp_socket_passwd, slirp_socket_unit);
498 write(s, buff, strlen(buff)+1);
500 #ifndef NO_UNIX_SOCKETS
502 s = socket(AF_UNIX, SOCK_STREAM, 0);
505 sock_un.sun_family = AF_UNIX;
506 strcpy(sock_un.sun_path, socket_path);
507 if (connect(s, (struct sockaddr *)&sock_un,
508 sizeof(sock_un.sun_family) + sizeof(sock_un.sun_path)) != 0)
510 sprintf(buff, "kill none:%d", slirp_socket_unit);
511 write(s, buff, strlen(buff)+1);
524 /* Don't need our data anymore */
525 /* XXX This makes SunOS barf */
529 for (i = 255; i >= 0; i--)
532 signal(SIGQUIT, slirp_exit);
533 signal(SIGHUP, snooze_hup);
536 /* Wait for any signal */
539 /* Just in case ... */
552 /* Don't need our data anymore */
553 /* XXX This makes SunOS barf */
556 signal(SIGQUIT, slirp_exit);
557 signal(SIGHUP, slirp_exit);
558 signal(SIGINT, slirp_exit);
559 signal(SIGTERM, slirp_exit);
561 /* Fudge to get term_raw and term_restore to work */
562 if (NULL == (ttyp = tty_attach (0, slirp_tty))) {
563 lprint ("Error: tty_attach failed in misc.c:relay()\r\n");
567 ttyp->flags |= TTY_CTTY;
576 n = select(s+1, &readfds, (fd_set *)0, (fd_set *)0, (struct timeval *)0);
581 if (FD_ISSET(0, &readfds)) {
582 n = read(0, buf, 8192);
585 n = writen(s, buf, n);
590 if (FD_ISSET(s, &readfds)) {
591 n = read(s, buf, 8192);
594 n = writen(0, buf, n);
600 /* Just in case.... */
606 extern void term_vprintf(const char *fmt, va_list ap);
608 void lprint(const char *format, ...)
612 va_start(args, format);
613 term_vprintf(format, args);
617 int (*lprint_print) _P((void *, const char *, va_list));
618 char *lprint_ptr, *lprint_ptr2, **lprint_arg;
622 lprint(const char *format, ...)
624 lprint(va_alist) va_dcl
630 va_start(args, format);
634 format = va_arg(args, char *);
637 /* If we're printing to an sbuf, make sure there's enough room */
640 if ((lprint_ptr - lprint_sb->sb_wptr) >=
641 (lprint_sb->sb_datalen - (strlen(format) + 100))) {
642 int deltaw = lprint_sb->sb_wptr - lprint_sb->sb_data;
643 int deltar = lprint_sb->sb_rptr - lprint_sb->sb_data;
644 int deltap = lprint_ptr - lprint_sb->sb_data;
646 lprint_sb->sb_data = (char *)realloc(lprint_sb->sb_data,
647 lprint_sb->sb_datalen + TCP_SNDSPACE);
649 /* Adjust all values */
650 lprint_sb->sb_wptr = lprint_sb->sb_data + deltaw;
651 lprint_sb->sb_rptr = lprint_sb->sb_data + deltar;
652 lprint_ptr = lprint_sb->sb_data + deltap;
654 lprint_sb->sb_datalen += TCP_SNDSPACE;
659 lprint_ptr += (*lprint_print)(*lprint_arg, format, args);
661 /* Check if they want output to be logged to file as well */
665 * otherwise you'll get ^M all over the file
667 int len = strlen(format);
670 bptr1 = bptr2 = strdup(format);
674 memcpy(bptr1, bptr1+1, len+1);
678 vfprintf(lfd, bptr2, args);
689 u_int8_t tos = 0, emu = 0;
690 char buff1[256], buff2[256], buff4[128];
695 if (sscanf(buff, "%256s %256s", buff2, buff1) != 2) {
696 lprint("Error: Bad arguments\r\n");
700 if (sscanf(buff1, "%d:%d", &lport, &fport) != 2) {
702 if (sscanf(buff1, "%d", &fport) != 1) {
703 lprint("Error: Bad first argument\r\n");
708 if (sscanf(buff2, "%128[^:]:%128s", buff1, buff3) != 2) {
710 if (sscanf(buff2, "%256s", buff1) != 1) {
711 lprint("Error: Bad second argument\r\n");
717 if (strcmp(buff3, "lowdelay") == 0)
718 tos = IPTOS_LOWDELAY;
719 else if (strcmp(buff3, "throughput") == 0)
720 tos = IPTOS_THROUGHPUT;
722 lprint("Error: Expecting \"lowdelay\"/\"throughput\"\r\n");
727 if (strcmp(buff1, "ftp") == 0)
729 else if (strcmp(buff1, "irc") == 0)
731 else if (strcmp(buff1, "none") == 0)
732 emu = EMU_NONE; /* ie: no emulation */
734 lprint("Error: Unknown service\r\n");
738 /* First, check that it isn't already emulated */
739 for (emup = tcpemu; emup; emup = emup->next) {
740 if (emup->lport == lport && emup->fport == fport) {
741 lprint("Error: port already emulated\r\n");
747 emup = (struct emu_t *)malloc(sizeof (struct emu_t));
748 emup->lport = (u_int16_t)lport;
749 emup->fport = (u_int16_t)fport;
755 /* And finally, mark all current sessions, if any, as being emulated */
756 for (so = tcb.so_next; so != &tcb; so = so->so_next) {
757 if ((lport && lport == ntohs(so->so_lport)) ||
758 (fport && fport == ntohs(so->so_fport))) {
766 lprint("Adding emulation for %s to port %d/%d\r\n", buff1, emup->lport, emup->fport);
776 * Some BSD-derived systems have a sprintf which returns char *
780 vsprintf_len(string, format, args)
785 vsprintf(string, format, args);
786 return strlen(string);
791 sprintf_len(char *string, const char *format, ...)
793 sprintf_len(va_alist) va_dcl
798 va_start(args, format);
803 string = va_arg(args, char *);
804 format = va_arg(args, char *);
806 vsprintf(string, format, args);
807 return strlen(string);
822 t.tv_usec = usec * 1000;
824 select(0, &fdset, &fdset, &fdset, &t);
828 * Set fd blocking and non-blocking
838 ioctlsocket(fd, FIONBIO, &opt);
842 opt = fcntl(fd, F_GETFL, 0);
844 fcntl(fd, F_SETFL, opt);
855 ioctlsocket(fd, FIONBIO, &opt);
859 opt = fcntl(fd, F_GETFL, 0);
861 fcntl(fd, F_SETFL, opt);
871 rsh_exec(so,ns, user, host, args)
883 DEBUG_CALL("rsh_exec");
884 DEBUG_ARG("so = %lx", (long)so);
887 lprint("Error: pipe failed: %s\n", strerror(errno));
890 /* #ifdef HAVE_SOCKETPAIR */
892 if (socketpair(PF_UNIX,SOCK_STREAM,0, fd0) == -1) {
895 lprint("Error: openpty failed: %s\n", strerror(errno));
899 if (slirp_openpty(&fd0[0], &fd0[1]) == -1) {
902 lprint("Error: openpty failed: %s\n", strerror(errno));
909 lprint("Error: fork failed: %s\n", strerror(errno));
920 /* Set the DISPLAY */
923 sprintf(buff, "%s:%d.%d", inet_ntoa(our_addr), x_port, x_screen);
924 setenv("DISPLAY", buff, 1);
926 sprintf(buff, "DISPLAY=%s:%d.%d", inet_ntoa(our_addr), x_port, x_screen);
934 for (s = 3; s <= 255; s++)
937 execlp("rsh","rsh","-l", user, host, args, NULL);
939 /* Ooops, failed, let's tell the user why */
941 sprintf(buff, "Error: execlp of %s failed: %s\n",
942 "rsh", strerror(errno));
943 write(2, buff, strlen(buff)+1);
944 close(0); close(1); close(2); /* XXX */