mirror of
https://github.com/sheumann/telnetd.git
synced 2024-11-26 12:49:21 +00:00
32ca7e751c
ftp, telnet, ftpd, faithd also telnet related sync with crypto, secure, kerberosIV Obtained from: KAME project git-svn-id: http://svn0.us-east.freebsd.org/base/head/contrib/telnet@56668 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f
390 lines
8.8 KiB
C
390 lines
8.8 KiB
C
/*
|
|
* Copyright (c) 1988, 1990, 1993
|
|
* The Regents of the University of California. All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
* 3. All advertising materials mentioning features or use of this software
|
|
* must display the following acknowledgement:
|
|
* This product includes software developed by the University of
|
|
* California, Berkeley and its contributors.
|
|
* 4. Neither the name of the University nor the names of its contributors
|
|
* may be used to endorse or promote products derived from this software
|
|
* without specific prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
* SUCH DAMAGE.
|
|
*
|
|
* $FreeBSD$
|
|
*/
|
|
|
|
#ifndef lint
|
|
static const char copyright[] =
|
|
"@(#) Copyright (c) 1988, 1990, 1993\n\
|
|
The Regents of the University of California. All rights reserved.\n";
|
|
#endif /* not lint */
|
|
|
|
#ifndef lint
|
|
static const char sccsid[] = "@(#)main.c 8.3 (Berkeley) 5/30/95";
|
|
#endif /* not lint */
|
|
|
|
#include <sys/types.h>
|
|
#include <sys/socket.h>
|
|
#include <stdlib.h>
|
|
|
|
#include "ring.h"
|
|
#include "externs.h"
|
|
#include "defines.h"
|
|
|
|
#if defined(AUTHENTICATION)
|
|
#include <libtelnet/auth.h>
|
|
#endif
|
|
#if defined(ENCRYPTION)
|
|
#include <libtelnet/encrypt.h>
|
|
#endif
|
|
|
|
/* These values need to be the same as defined in libtelnet/kerberos5.c */
|
|
/* Either define them in both places, or put in some common header file. */
|
|
#define OPTS_FORWARD_CREDS 0x00000002
|
|
#define OPTS_FORWARDABLE_CREDS 0x00000001
|
|
|
|
#if 0
|
|
#define FORWARD
|
|
#endif
|
|
|
|
void init_terminal(void);
|
|
void init_network(void);
|
|
void init_telnet(void);
|
|
void init_sys(void);
|
|
void init_3270(void);
|
|
|
|
#if defined(IPSEC) && defined(IPSEC_POLICY_IPSEC)
|
|
char *ipsec_policy_in = NULL;
|
|
char *ipsec_policy_out = NULL;
|
|
#endif
|
|
|
|
int family = AF_UNSPEC;
|
|
|
|
/*
|
|
* Initialize variables.
|
|
*/
|
|
void
|
|
tninit()
|
|
{
|
|
init_terminal();
|
|
|
|
init_network();
|
|
|
|
init_telnet();
|
|
|
|
init_sys();
|
|
|
|
#if defined(TN3270)
|
|
init_3270();
|
|
#endif
|
|
}
|
|
|
|
void
|
|
usage()
|
|
{
|
|
fprintf(stderr, "Usage: %s %s%s%s%s\n",
|
|
prompt,
|
|
#ifdef AUTHENTICATION
|
|
"[-4] [-6] [-8] [-E] [-K] [-L] [-N] [-S tos] [-X atype] [-a] [-c] [-d]",
|
|
"\n\t[-e char] [-k realm] [-l user] [-f/-F] [-n tracefile] ",
|
|
#else
|
|
"[-4] [-6] [-8] [-E] [-L] [-N] [-S tos] [-a] [-c] [-d] [-e char] [-l user]",
|
|
"\n\t[-n tracefile] ",
|
|
#endif
|
|
#if defined(TN3270) && defined(unix)
|
|
# ifdef AUTHENTICATION
|
|
"[-noasynch] [-noasynctty]\n\t"
|
|
"[-noasyncnet] [-r] [-s src_addr] [-t transcom] ",
|
|
# else
|
|
"[-noasynch] [-noasynctty] [-noasyncnet] [-r]\n\t"
|
|
"[-s src_addr] [-t transcom]",
|
|
# endif
|
|
#else
|
|
"[-r] [-s src_addr] ",
|
|
#endif
|
|
#if defined(IPSEC) && defined(IPSEC_POLICY_IPSEC)
|
|
"[-P policy]"
|
|
#endif
|
|
#ifdef ENCRYPTION
|
|
"[-x] [host-name [port]]"
|
|
#else /* ENCRYPTION */
|
|
"[host-name [port]]"
|
|
#endif /* ENCRYPTION */
|
|
);
|
|
exit(1);
|
|
}
|
|
|
|
/*
|
|
* main. Parse arguments, invoke the protocol or command parser.
|
|
*/
|
|
|
|
int
|
|
main(argc, argv)
|
|
int argc;
|
|
char *argv[];
|
|
{
|
|
extern char *optarg;
|
|
extern int optind;
|
|
int ch;
|
|
char *user, *strrchr();
|
|
char *src_addr = NULL;
|
|
#ifdef FORWARD
|
|
extern int forward_flags;
|
|
#endif /* FORWARD */
|
|
|
|
tninit(); /* Clear out things */
|
|
#if defined(CRAY) && !defined(__STDC__)
|
|
_setlist_init(); /* Work around compiler bug */
|
|
#endif
|
|
|
|
TerminalSaveState();
|
|
|
|
if ((prompt = strrchr(argv[0], '/')))
|
|
++prompt;
|
|
else
|
|
prompt = argv[0];
|
|
|
|
user = NULL;
|
|
|
|
rlogin = (strncmp(prompt, "rlog", 4) == 0) ? '~' : _POSIX_VDISABLE;
|
|
autologin = -1;
|
|
|
|
#if defined(IPSEC) && defined(IPSEC_POLICY_IPSEC)
|
|
#define IPSECOPT "P:"
|
|
#else
|
|
#define IPSECOPT
|
|
#endif
|
|
while ((ch = getopt(argc, argv,
|
|
"468EKLNS:X:acde:fFk:l:n:rs:t:x" IPSECOPT)) != -1)
|
|
#undef IPSECOPT
|
|
{
|
|
switch(ch) {
|
|
case '4':
|
|
family = AF_INET;
|
|
break;
|
|
#ifdef INET6
|
|
case '6':
|
|
family = AF_INET6;
|
|
break;
|
|
#endif
|
|
case '8':
|
|
eight = 3; /* binary output and input */
|
|
break;
|
|
case 'E':
|
|
rlogin = escape = _POSIX_VDISABLE;
|
|
break;
|
|
case 'K':
|
|
#ifdef AUTHENTICATION
|
|
autologin = 0;
|
|
#endif
|
|
break;
|
|
case 'L':
|
|
eight |= 2; /* binary output only */
|
|
break;
|
|
case 'N':
|
|
doaddrlookup = 0;
|
|
break;
|
|
case 'S':
|
|
{
|
|
#ifdef HAS_GETTOS
|
|
extern int tos;
|
|
|
|
if ((tos = parsetos(optarg, "tcp")) < 0)
|
|
fprintf(stderr, "%s%s%s%s\n",
|
|
prompt, ": Bad TOS argument '",
|
|
optarg,
|
|
"; will try to use default TOS");
|
|
#else
|
|
fprintf(stderr,
|
|
"%s: Warning: -S ignored, no parsetos() support.\n",
|
|
prompt);
|
|
#endif
|
|
}
|
|
break;
|
|
case 'X':
|
|
#ifdef AUTHENTICATION
|
|
auth_disable_name(optarg);
|
|
#endif
|
|
break;
|
|
case 'a':
|
|
autologin = 1;
|
|
break;
|
|
case 'c':
|
|
skiprc = 1;
|
|
break;
|
|
case 'd':
|
|
debug = 1;
|
|
break;
|
|
case 'e':
|
|
set_escape_char(optarg);
|
|
break;
|
|
case 'f':
|
|
#if defined(AUTHENTICATION) && defined(KRB5) && defined(FORWARD)
|
|
if (forward_flags & OPTS_FORWARD_CREDS) {
|
|
fprintf(stderr,
|
|
"%s: Only one of -f and -F allowed.\n",
|
|
prompt);
|
|
usage();
|
|
}
|
|
forward_flags |= OPTS_FORWARD_CREDS;
|
|
#else
|
|
fprintf(stderr,
|
|
"%s: Warning: -f ignored, no Kerberos V5 support.\n",
|
|
prompt);
|
|
#endif
|
|
break;
|
|
case 'F':
|
|
#if defined(AUTHENTICATION) && defined(KRB5) && defined(FORWARD)
|
|
if (forward_flags & OPTS_FORWARD_CREDS) {
|
|
fprintf(stderr,
|
|
"%s: Only one of -f and -F allowed.\n",
|
|
prompt);
|
|
usage();
|
|
}
|
|
forward_flags |= OPTS_FORWARD_CREDS;
|
|
forward_flags |= OPTS_FORWARDABLE_CREDS;
|
|
#else
|
|
fprintf(stderr,
|
|
"%s: Warning: -F ignored, no Kerberos V5 support.\n",
|
|
prompt);
|
|
#endif
|
|
break;
|
|
case 'k':
|
|
#if defined(AUTHENTICATION) && defined(KRB4)
|
|
{
|
|
extern char *dest_realm, dst_realm_buf[], dst_realm_sz;
|
|
dest_realm = dst_realm_buf;
|
|
(void)strncpy(dest_realm, optarg, dst_realm_sz);
|
|
}
|
|
#else
|
|
fprintf(stderr,
|
|
"%s: Warning: -k ignored, no Kerberos V4 support.\n",
|
|
prompt);
|
|
#endif
|
|
break;
|
|
case 'l':
|
|
autologin = 1;
|
|
user = optarg;
|
|
break;
|
|
case 'n':
|
|
#if defined(TN3270) && defined(unix)
|
|
/* distinguish between "-n oasynch" and "-noasynch" */
|
|
if (argv[optind - 1][0] == '-' && argv[optind - 1][1]
|
|
== 'n' && argv[optind - 1][2] == 'o') {
|
|
if (!strcmp(optarg, "oasynch")) {
|
|
noasynchtty = 1;
|
|
noasynchnet = 1;
|
|
} else if (!strcmp(optarg, "oasynchtty"))
|
|
noasynchtty = 1;
|
|
else if (!strcmp(optarg, "oasynchnet"))
|
|
noasynchnet = 1;
|
|
} else
|
|
#endif /* defined(TN3270) && defined(unix) */
|
|
SetNetTrace(optarg);
|
|
break;
|
|
case 'r':
|
|
rlogin = '~';
|
|
break;
|
|
case 's':
|
|
src_addr = optarg;
|
|
break;
|
|
case 't':
|
|
#if defined(TN3270) && defined(unix)
|
|
transcom = tline;
|
|
(void)strcpy(transcom, optarg);
|
|
#else
|
|
fprintf(stderr,
|
|
"%s: Warning: -t ignored, no TN3270 support.\n",
|
|
prompt);
|
|
#endif
|
|
break;
|
|
case 'x':
|
|
#ifdef ENCRYPTION
|
|
encrypt_auto(1);
|
|
decrypt_auto(1);
|
|
#else /* ENCRYPTION */
|
|
fprintf(stderr,
|
|
"%s: Warning: -x ignored, no ENCRYPT support.\n",
|
|
prompt);
|
|
#endif /* ENCRYPTION */
|
|
break;
|
|
#if defined(IPSEC) && defined(IPSEC_POLICY_IPSEC)
|
|
case 'P':
|
|
if (!strncmp("in", optarg, 2))
|
|
ipsec_policy_in = strdup(optarg);
|
|
else if (!strncmp("out", optarg, 3))
|
|
ipsec_policy_out = strdup(optarg);
|
|
else
|
|
usage();
|
|
break;
|
|
#endif
|
|
case '?':
|
|
default:
|
|
usage();
|
|
/* NOTREACHED */
|
|
}
|
|
}
|
|
if (autologin == -1)
|
|
autologin = (rlogin == _POSIX_VDISABLE) ? 0 : 1;
|
|
|
|
argc -= optind;
|
|
argv += optind;
|
|
|
|
if (argc) {
|
|
char *args[9], **argp = args;
|
|
|
|
if (argc > 2)
|
|
usage();
|
|
*argp++ = prompt;
|
|
if (user) {
|
|
*argp++ = "-l";
|
|
*argp++ = user;
|
|
}
|
|
if (src_addr) {
|
|
*argp++ = "-s";
|
|
*argp++ = src_addr;
|
|
}
|
|
*argp++ = argv[0]; /* host */
|
|
if (argc > 1)
|
|
*argp++ = argv[1]; /* port */
|
|
*argp = 0;
|
|
|
|
if (setjmp(toplevel) != 0)
|
|
Exit(0);
|
|
if (tn(argp - args, args) == 1)
|
|
return (0);
|
|
else
|
|
return (1);
|
|
}
|
|
(void)setjmp(toplevel);
|
|
for (;;) {
|
|
#ifdef TN3270
|
|
if (shell_active)
|
|
shell_continue();
|
|
else
|
|
#endif
|
|
command(1, 0, 0);
|
|
}
|
|
return 0;
|
|
}
|