Make key file import robust against a PPK file that has somehow lost its
[u/mdw/putty] / telnet.c
CommitLineData
eaf1e20a 1/*
2 * Telnet backend.
3 */
4
374330e2 5#include <stdio.h>
6#include <stdlib.h>
374330e2 7
8#include "putty.h"
9
10#ifndef FALSE
11#define FALSE 0
12#endif
13#ifndef TRUE
14#define TRUE 1
15#endif
16
32874aea 17#define IAC 255 /* interpret as command: */
18#define DONT 254 /* you are not to use option */
19#define DO 253 /* please, you use option */
20#define WONT 252 /* I won't use option */
21#define WILL 251 /* I will use option */
22#define SB 250 /* interpret as subnegotiation */
23#define SE 240 /* end sub negotiation */
24
25#define GA 249 /* you may reverse the line */
26#define EL 248 /* erase the current line */
27#define EC 247 /* erase the current character */
28#define AYT 246 /* are you there */
29#define AO 245 /* abort output--but let prog finish */
30#define IP 244 /* interrupt process--permanently */
31#define BREAK 243 /* break */
32#define DM 242 /* data mark--for connect. cleaning */
33#define NOP 241 /* nop */
34#define EOR 239 /* end of record (transparent mode) */
35#define ABORT 238 /* Abort process */
36#define SUSP 237 /* Suspend process */
37#define xEOF 236 /* End of file: EOF is already used... */
38
6196fb7e 39#define TELOPTS(X) \
40 X(BINARY, 0) /* 8-bit data path */ \
41 X(ECHO, 1) /* echo */ \
42 X(RCP, 2) /* prepare to reconnect */ \
43 X(SGA, 3) /* suppress go ahead */ \
44 X(NAMS, 4) /* approximate message size */ \
45 X(STATUS, 5) /* give status */ \
46 X(TM, 6) /* timing mark */ \
47 X(RCTE, 7) /* remote controlled transmission and echo */ \
48 X(NAOL, 8) /* negotiate about output line width */ \
49 X(NAOP, 9) /* negotiate about output page size */ \
50 X(NAOCRD, 10) /* negotiate about CR disposition */ \
51 X(NAOHTS, 11) /* negotiate about horizontal tabstops */ \
52 X(NAOHTD, 12) /* negotiate about horizontal tab disposition */ \
53 X(NAOFFD, 13) /* negotiate about formfeed disposition */ \
54 X(NAOVTS, 14) /* negotiate about vertical tab stops */ \
55 X(NAOVTD, 15) /* negotiate about vertical tab disposition */ \
56 X(NAOLFD, 16) /* negotiate about output LF disposition */ \
57 X(XASCII, 17) /* extended ascic character set */ \
58 X(LOGOUT, 18) /* force logout */ \
59 X(BM, 19) /* byte macro */ \
60 X(DET, 20) /* data entry terminal */ \
61 X(SUPDUP, 21) /* supdup protocol */ \
62 X(SUPDUPOUTPUT, 22) /* supdup output */ \
63 X(SNDLOC, 23) /* send location */ \
64 X(TTYPE, 24) /* terminal type */ \
65 X(EOR, 25) /* end or record */ \
66 X(TUID, 26) /* TACACS user identification */ \
67 X(OUTMRK, 27) /* output marking */ \
68 X(TTYLOC, 28) /* terminal location number */ \
69 X(3270REGIME, 29) /* 3270 regime */ \
70 X(X3PAD, 30) /* X.3 PAD */ \
71 X(NAWS, 31) /* window size */ \
72 X(TSPEED, 32) /* terminal speed */ \
73 X(LFLOW, 33) /* remote flow control */ \
74 X(LINEMODE, 34) /* Linemode option */ \
75 X(XDISPLOC, 35) /* X Display Location */ \
76 X(OLD_ENVIRON, 36) /* Old - Environment variables */ \
77 X(AUTHENTICATION, 37) /* Authenticate */ \
78 X(ENCRYPT, 38) /* Encryption option */ \
79 X(NEW_ENVIRON, 39) /* New - Environment variables */ \
80 X(TN3270E, 40) /* TN3270 enhancements */ \
81 X(XAUTH, 41) \
82 X(CHARSET, 42) /* Character set */ \
83 X(RSP, 43) /* Remote serial port */ \
84 X(COM_PORT_OPTION, 44) /* Com port control */ \
85 X(SLE, 45) /* Suppress local echo */ \
86 X(STARTTLS, 46) /* Start TLS */ \
87 X(KERMIT, 47) /* Automatic Kermit file transfer */ \
88 X(SEND_URL, 48) \
89 X(FORWARD_X, 49) \
90 X(PRAGMA_LOGON, 138) \
91 X(SSPI_LOGON, 139) \
92 X(PRAGMA_HEARTBEAT, 140) \
93 X(EXOPL, 255) /* extended-options-list */
94
95#define telnet_enum(x,y) TELOPT_##x = y,
96enum { TELOPTS(telnet_enum) dummy=0 };
97#undef telnet_enum
32874aea 98
99#define TELQUAL_IS 0 /* option is... */
100#define TELQUAL_SEND 1 /* send option */
101#define TELQUAL_INFO 2 /* ENVIRON: informational version of IS */
374330e2 102#define BSD_VAR 1
103#define BSD_VALUE 0
104#define RFC_VAR 0
105#define RFC_VALUE 1
106
107#define CR 13
108#define LF 10
109#define NUL 0
110
656fa244 111#define iswritable(x) \
112 ( (x) != IAC && \
113 (telnet->opt_states[o_we_bin.index] == ACTIVE || (x) != CR))
374330e2 114
32874aea 115static char *telopt(int opt)
116{
6196fb7e 117#define telnet_str(x,y) case TELOPT_##x: return #x;
118 switch (opt) {
119 TELOPTS(telnet_str)
120 default:
121 return "<unknown>";
122 }
123#undef telnet_str
374330e2 124}
125
51470298 126static void telnet_size(void *handle, int width, int height);
374330e2 127
128struct Opt {
129 int send; /* what we initially send */
130 int nsend; /* -ve send if requested to stop it */
131 int ack, nak; /* +ve and -ve acknowledgements */
132 int option; /* the option code */
51470298 133 int index; /* index into telnet->opt_states[] */
374330e2 134 enum {
135 REQUESTED, ACTIVE, INACTIVE, REALLY_INACTIVE
51470298 136 } initial_state;
137};
138
139enum {
140 OPTINDEX_NAWS,
141 OPTINDEX_TSPEED,
142 OPTINDEX_TTYPE,
143 OPTINDEX_OENV,
144 OPTINDEX_NENV,
145 OPTINDEX_ECHO,
146 OPTINDEX_WE_SGA,
147 OPTINDEX_THEY_SGA,
656fa244 148 OPTINDEX_WE_BIN,
149 OPTINDEX_THEY_BIN,
51470298 150 NUM_OPTS
374330e2 151};
152
51470298 153static const struct Opt o_naws =
154 { WILL, WONT, DO, DONT, TELOPT_NAWS, OPTINDEX_NAWS, REQUESTED };
155static const struct Opt o_tspeed =
156 { WILL, WONT, DO, DONT, TELOPT_TSPEED, OPTINDEX_TSPEED, REQUESTED };
157static const struct Opt o_ttype =
158 { WILL, WONT, DO, DONT, TELOPT_TTYPE, OPTINDEX_TTYPE, REQUESTED };
5f95fdf1 159static const struct Opt o_oenv =
160 { WILL, WONT, DO, DONT, TELOPT_OLD_ENVIRON, OPTINDEX_OENV, INACTIVE };
161static const struct Opt o_nenv =
162 { WILL, WONT, DO, DONT, TELOPT_NEW_ENVIRON, OPTINDEX_NENV, REQUESTED };
51470298 163static const struct Opt o_echo =
164 { DO, DONT, WILL, WONT, TELOPT_ECHO, OPTINDEX_ECHO, REQUESTED };
165static const struct Opt o_we_sga =
166 { WILL, WONT, DO, DONT, TELOPT_SGA, OPTINDEX_WE_SGA, REQUESTED };
167static const struct Opt o_they_sga =
168 { DO, DONT, WILL, WONT, TELOPT_SGA, OPTINDEX_THEY_SGA, REQUESTED };
656fa244 169static const struct Opt o_we_bin =
170 { WILL, WONT, DO, DONT, TELOPT_BINARY, OPTINDEX_WE_BIN, INACTIVE };
171static const struct Opt o_they_bin =
172 { DO, DONT, WILL, WONT, TELOPT_BINARY, OPTINDEX_THEY_BIN, INACTIVE };
51470298 173
174static const struct Opt *const opts[] = {
374330e2 175 &o_naws, &o_tspeed, &o_ttype, &o_oenv, &o_nenv, &o_echo,
656fa244 176 &o_we_sga, &o_they_sga, &o_we_bin, &o_they_bin, NULL
374330e2 177};
178
51470298 179typedef struct telnet_tag {
180 const struct plug_function_table *fn;
181 /* the above field _must_ be first in the structure */
182
183 Socket s;
184
185 void *frontend;
b9d7bcad 186 void *ldisc;
51470298 187 int term_width, term_height;
188
189 int opt_states[NUM_OPTS];
190
191 int echoing, editing;
192 int activated;
193 int bufsize;
194 int in_synch;
195 int sb_opt, sb_len;
a1fd562d 196 unsigned char *sb_buf;
51470298 197 int sb_size;
198
199 enum {
200 TOP_LEVEL, SEENIAC, SEENWILL, SEENWONT, SEENDO, SEENDONT,
201 SEENSB, SUBNEGOT, SUBNEG_IAC, SEENCR
202 } state;
203
86916870 204 Config cfg;
39934deb 205
206 Pinger pinger;
51470298 207} *Telnet;
208
5471d09a 209#define TELNET_MAX_BACKLOG 4096
210
374330e2 211#define SB_DELTA 1024
212
ee00c99a 213static void c_write(Telnet telnet, char *buf, int len)
32874aea 214{
5471d09a 215 int backlog;
ee00c99a 216 backlog = from_backend(telnet->frontend, 0, buf, len);
51470298 217 sk_set_frozen(telnet->s, backlog > TELNET_MAX_BACKLOG);
fe50e814 218}
219
a8327734 220static void log_option(Telnet telnet, char *sender, int cmd, int option)
32874aea 221{
57356d63 222 char *buf;
24d7f854 223 /*
224 * The strange-looking "<?""?>" below is there to avoid a
225 * trigraph - a double question mark followed by > maps to a
226 * closing brace character!
227 */
57356d63 228 buf = dupprintf("%s:\t%s %s", sender,
229 (cmd == WILL ? "WILL" : cmd == WONT ? "WONT" :
230 cmd == DO ? "DO" : cmd == DONT ? "DONT" : "<?""?>"),
231 telopt(option));
a8327734 232 logevent(telnet->frontend, buf);
57356d63 233 sfree(buf);
374330e2 234}
235
51470298 236static void send_opt(Telnet telnet, int cmd, int option)
32874aea 237{
374330e2 238 unsigned char b[3];
239
32874aea 240 b[0] = IAC;
241 b[1] = cmd;
242 b[2] = option;
a1fd562d 243 telnet->bufsize = sk_write(telnet->s, (char *)b, 3);
a8327734 244 log_option(telnet, "client", cmd, option);
374330e2 245}
246
51470298 247static void deactivate_option(Telnet telnet, const struct Opt *o)
32874aea 248{
51470298 249 if (telnet->opt_states[o->index] == REQUESTED ||
250 telnet->opt_states[o->index] == ACTIVE)
251 send_opt(telnet, o->nsend, o->option);
252 telnet->opt_states[o->index] = REALLY_INACTIVE;
374330e2 253}
254
708bbbbe 255/*
256 * Generate side effects of enabling or disabling an option.
257 */
51470298 258static void option_side_effects(Telnet telnet, const struct Opt *o, int enabled)
32874aea 259{
0965bee0 260 if (o->option == TELOPT_ECHO && o->send == DO)
51470298 261 telnet->echoing = !enabled;
b6c680d4 262 else if (o->option == TELOPT_SGA && o->send == DO)
51470298 263 telnet->editing = !enabled;
b9d7bcad 264 if (telnet->ldisc) /* cause ldisc to notice the change */
265 ldisc_send(telnet->ldisc, NULL, 0, 0);
8faa456c 266
267 /* Ensure we get the minimum options */
51470298 268 if (!telnet->activated) {
269 if (telnet->opt_states[o_echo.index] == INACTIVE) {
270 telnet->opt_states[o_echo.index] = REQUESTED;
271 send_opt(telnet, o_echo.send, o_echo.option);
8faa456c 272 }
51470298 273 if (telnet->opt_states[o_we_sga.index] == INACTIVE) {
274 telnet->opt_states[o_we_sga.index] = REQUESTED;
275 send_opt(telnet, o_we_sga.send, o_we_sga.option);
8faa456c 276 }
51470298 277 if (telnet->opt_states[o_they_sga.index] == INACTIVE) {
278 telnet->opt_states[o_they_sga.index] = REQUESTED;
279 send_opt(telnet, o_they_sga.send, o_they_sga.option);
8faa456c 280 }
51470298 281 telnet->activated = TRUE;
8faa456c 282 }
708bbbbe 283}
284
51470298 285static void activate_option(Telnet telnet, const struct Opt *o)
32874aea 286{
374330e2 287 if (o->send == WILL && o->option == TELOPT_NAWS)
51470298 288 telnet_size(telnet, telnet->term_width, telnet->term_height);
374330e2 289 if (o->send == WILL &&
290 (o->option == TELOPT_NEW_ENVIRON ||
291 o->option == TELOPT_OLD_ENVIRON)) {
292 /*
293 * We may only have one kind of ENVIRON going at a time.
294 * This is a hack, but who cares.
295 */
51470298 296 deactivate_option(telnet, o->option ==
32874aea 297 TELOPT_NEW_ENVIRON ? &o_oenv : &o_nenv);
374330e2 298 }
51470298 299 option_side_effects(telnet, o, 1);
374330e2 300}
301
51470298 302static void refused_option(Telnet telnet, const struct Opt *o)
32874aea 303{
374330e2 304 if (o->send == WILL && o->option == TELOPT_NEW_ENVIRON &&
51470298 305 telnet->opt_states[o_oenv.index] == INACTIVE) {
306 send_opt(telnet, WILL, TELOPT_OLD_ENVIRON);
307 telnet->opt_states[o_oenv.index] = REQUESTED;
374330e2 308 }
51470298 309 option_side_effects(telnet, o, 0);
374330e2 310}
311
51470298 312static void proc_rec_opt(Telnet telnet, int cmd, int option)
32874aea 313{
51470298 314 const struct Opt *const *o;
374330e2 315
a8327734 316 log_option(telnet, "server", cmd, option);
374330e2 317 for (o = opts; *o; o++) {
318 if ((*o)->option == option && (*o)->ack == cmd) {
51470298 319 switch (telnet->opt_states[(*o)->index]) {
374330e2 320 case REQUESTED:
51470298 321 telnet->opt_states[(*o)->index] = ACTIVE;
322 activate_option(telnet, *o);
374330e2 323 break;
324 case ACTIVE:
325 break;
326 case INACTIVE:
51470298 327 telnet->opt_states[(*o)->index] = ACTIVE;
328 send_opt(telnet, (*o)->send, option);
329 activate_option(telnet, *o);
374330e2 330 break;
331 case REALLY_INACTIVE:
51470298 332 send_opt(telnet, (*o)->nsend, option);
374330e2 333 break;
334 }
335 return;
336 } else if ((*o)->option == option && (*o)->nak == cmd) {
51470298 337 switch (telnet->opt_states[(*o)->index]) {
374330e2 338 case REQUESTED:
51470298 339 telnet->opt_states[(*o)->index] = INACTIVE;
340 refused_option(telnet, *o);
374330e2 341 break;
342 case ACTIVE:
51470298 343 telnet->opt_states[(*o)->index] = INACTIVE;
344 send_opt(telnet, (*o)->nsend, option);
345 option_side_effects(telnet, *o, 0);
374330e2 346 break;
347 case INACTIVE:
348 case REALLY_INACTIVE:
349 break;
350 }
351 return;
352 }
353 }
354 /*
355 * If we reach here, the option was one we weren't prepared to
108b0b94 356 * cope with. If the request was positive (WILL or DO), we send
357 * a negative ack to indicate refusal. If the request was
358 * negative (WONT / DONT), we must do nothing.
374330e2 359 */
108b0b94 360 if (cmd == WILL || cmd == DO)
361 send_opt(telnet, (cmd == WILL ? DONT : WONT), option);
374330e2 362}
363
51470298 364static void process_subneg(Telnet telnet)
32874aea 365{
374330e2 366 unsigned char b[2048], *p, *q;
367 int var, value, n;
368 char *e;
369
51470298 370 switch (telnet->sb_opt) {
374330e2 371 case TELOPT_TSPEED:
51470298 372 if (telnet->sb_len == 1 && telnet->sb_buf[0] == TELQUAL_SEND) {
57356d63 373 char *logbuf;
32874aea 374 b[0] = IAC;
375 b[1] = SB;
376 b[2] = TELOPT_TSPEED;
374330e2 377 b[3] = TELQUAL_IS;
86916870 378 strcpy((char *)(b + 4), telnet->cfg.termspeed);
379 n = 4 + strlen(telnet->cfg.termspeed);
32874aea 380 b[n] = IAC;
381 b[n + 1] = SE;
a1fd562d 382 telnet->bufsize = sk_write(telnet->s, (char *)b, n + 2);
a8327734 383 logevent(telnet->frontend, "server:\tSB TSPEED SEND");
86916870 384 logbuf = dupprintf("client:\tSB TSPEED IS %s", telnet->cfg.termspeed);
a8327734 385 logevent(telnet->frontend, logbuf);
57356d63 386 sfree(logbuf);
374330e2 387 } else
a8327734 388 logevent(telnet->frontend, "server:\tSB TSPEED <something weird>");
374330e2 389 break;
390 case TELOPT_TTYPE:
51470298 391 if (telnet->sb_len == 1 && telnet->sb_buf[0] == TELQUAL_SEND) {
57356d63 392 char *logbuf;
32874aea 393 b[0] = IAC;
394 b[1] = SB;
395 b[2] = TELOPT_TTYPE;
374330e2 396 b[3] = TELQUAL_IS;
86916870 397 for (n = 0; telnet->cfg.termtype[n]; n++)
398 b[n + 4] = (telnet->cfg.termtype[n] >= 'a'
399 && telnet->cfg.termtype[n] <=
400 'z' ? telnet->cfg.termtype[n] + 'A' -
401 'a' : telnet->cfg.termtype[n]);
32874aea 402 b[n + 4] = IAC;
403 b[n + 5] = SE;
a1fd562d 404 telnet->bufsize = sk_write(telnet->s, (char *)b, n + 6);
32874aea 405 b[n + 4] = 0;
a8327734 406 logevent(telnet->frontend, "server:\tSB TTYPE SEND");
57356d63 407 logbuf = dupprintf("client:\tSB TTYPE IS %s", b + 4);
a8327734 408 logevent(telnet->frontend, logbuf);
57356d63 409 sfree(logbuf);
374330e2 410 } else
a8327734 411 logevent(telnet->frontend, "server:\tSB TTYPE <something weird>\r\n");
374330e2 412 break;
413 case TELOPT_OLD_ENVIRON:
32874aea 414 case TELOPT_NEW_ENVIRON:
51470298 415 p = telnet->sb_buf;
416 q = p + telnet->sb_len;
374330e2 417 if (p < q && *p == TELQUAL_SEND) {
57356d63 418 char *logbuf;
374330e2 419 p++;
57356d63 420 logbuf = dupprintf("server:\tSB %s SEND", telopt(telnet->sb_opt));
a8327734 421 logevent(telnet->frontend, logbuf);
57356d63 422 sfree(logbuf);
51470298 423 if (telnet->sb_opt == TELOPT_OLD_ENVIRON) {
86916870 424 if (telnet->cfg.rfc_environ) {
374330e2 425 value = RFC_VALUE;
426 var = RFC_VAR;
427 } else {
428 value = BSD_VALUE;
429 var = BSD_VAR;
430 }
431 /*
432 * Try to guess the sense of VAR and VALUE.
433 */
434 while (p < q) {
435 if (*p == RFC_VAR) {
436 value = RFC_VALUE;
437 var = RFC_VAR;
438 } else if (*p == BSD_VAR) {
439 value = BSD_VALUE;
440 var = BSD_VAR;
441 }
442 p++;
443 }
444 } else {
445 /*
446 * With NEW_ENVIRON, the sense of VAR and VALUE
447 * isn't in doubt.
448 */
449 value = RFC_VALUE;
450 var = RFC_VAR;
451 }
32874aea 452 b[0] = IAC;
453 b[1] = SB;
51470298 454 b[2] = telnet->sb_opt;
374330e2 455 b[3] = TELQUAL_IS;
456 n = 4;
86916870 457 e = telnet->cfg.environmt;
374330e2 458 while (*e) {
459 b[n++] = var;
32874aea 460 while (*e && *e != '\t')
461 b[n++] = *e++;
462 if (*e == '\t')
463 e++;
374330e2 464 b[n++] = value;
32874aea 465 while (*e)
466 b[n++] = *e++;
374330e2 467 e++;
468 }
86916870 469 if (*telnet->cfg.username) {
32874aea 470 b[n++] = var;
471 b[n++] = 'U';
472 b[n++] = 'S';
473 b[n++] = 'E';
474 b[n++] = 'R';
475 b[n++] = value;
86916870 476 e = telnet->cfg.username;
32874aea 477 while (*e)
478 b[n++] = *e++;
374330e2 479 }
32874aea 480 b[n++] = IAC;
481 b[n++] = SE;
a1fd562d 482 telnet->bufsize = sk_write(telnet->s, (char *)b, n);
afaa639b 483 logbuf = dupprintf("client:\tSB %s IS %s%s%s%s",
484 telopt(telnet->sb_opt),
485 *telnet->cfg.username ? "USER=" : "",
486 telnet->cfg.username,
487 *telnet->cfg.username ? " " : "",
488 n == 6 ? "<nothing>" :
489 (*telnet->cfg.environmt ? "<stuff>" : ""));
a8327734 490 logevent(telnet->frontend, logbuf);
57356d63 491 sfree(logbuf);
374330e2 492 }
493 break;
494 }
495}
496
51470298 497static void do_telnet_read(Telnet telnet, char *buf, int len)
32874aea 498{
ee00c99a 499 char *outbuf = NULL;
500 int outbuflen = 0, outbufsize = 0;
501
502#define ADDTOBUF(c) do { \
503 if (outbuflen >= outbufsize) { \
504 outbufsize = outbuflen + 256; \
505 outbuf = sresize(outbuf, outbufsize, char); \
506 } \
507 outbuf[outbuflen++] = (c); \
508} while (0)
374330e2 509
510 while (len--) {
511 int c = (unsigned char) *buf++;
512
51470298 513 switch (telnet->state) {
887035a5 514 case TOP_LEVEL:
374330e2 515 case SEENCR:
51470298 516 if (c == NUL && telnet->state == SEENCR)
517 telnet->state = TOP_LEVEL;
374330e2 518 else if (c == IAC)
51470298 519 telnet->state = SEENIAC;
374330e2 520 else {
51470298 521 if (!telnet->in_synch)
ee00c99a 522 ADDTOBUF(c);
2f938b83 523
524#if 1
525 /* I can't get the F***ing winsock to insert the urgent IAC
526 * into the right position! Even with SO_OOBINLINE it gives
527 * it to recv too soon. And of course the DM byte (that
528 * arrives in the same packet!) appears several K later!!
529 *
530 * Oh well, we do get the DM in the right place so I'll
531 * just stop hiding on the next 0xf2 and hope for the best.
532 */
32874aea 533 else if (c == DM)
51470298 534 telnet->in_synch = 0;
2f938b83 535#endif
656fa244 536 if (c == CR && telnet->opt_states[o_they_bin.index] != ACTIVE)
51470298 537 telnet->state = SEENCR;
374330e2 538 else
51470298 539 telnet->state = TOP_LEVEL;
374330e2 540 }
541 break;
542 case SEENIAC:
32874aea 543 if (c == DO)
51470298 544 telnet->state = SEENDO;
32874aea 545 else if (c == DONT)
51470298 546 telnet->state = SEENDONT;
32874aea 547 else if (c == WILL)
51470298 548 telnet->state = SEENWILL;
32874aea 549 else if (c == WONT)
51470298 550 telnet->state = SEENWONT;
32874aea 551 else if (c == SB)
51470298 552 telnet->state = SEENSB;
2f938b83 553 else if (c == DM) {
51470298 554 telnet->in_synch = 0;
555 telnet->state = TOP_LEVEL;
32874aea 556 } else {
ded38628 557 /* ignore everything else; print it if it's IAC */
558 if (c == IAC) {
ee00c99a 559 ADDTOBUF(c);
ded38628 560 }
51470298 561 telnet->state = TOP_LEVEL;
300d41b0 562 }
374330e2 563 break;
564 case SEENWILL:
51470298 565 proc_rec_opt(telnet, WILL, c);
566 telnet->state = TOP_LEVEL;
374330e2 567 break;
568 case SEENWONT:
51470298 569 proc_rec_opt(telnet, WONT, c);
570 telnet->state = TOP_LEVEL;
374330e2 571 break;
572 case SEENDO:
51470298 573 proc_rec_opt(telnet, DO, c);
574 telnet->state = TOP_LEVEL;
374330e2 575 break;
576 case SEENDONT:
51470298 577 proc_rec_opt(telnet, DONT, c);
578 telnet->state = TOP_LEVEL;
374330e2 579 break;
580 case SEENSB:
51470298 581 telnet->sb_opt = c;
582 telnet->sb_len = 0;
583 telnet->state = SUBNEGOT;
374330e2 584 break;
585 case SUBNEGOT:
586 if (c == IAC)
51470298 587 telnet->state = SUBNEG_IAC;
374330e2 588 else {
32874aea 589 subneg_addchar:
51470298 590 if (telnet->sb_len >= telnet->sb_size) {
51470298 591 telnet->sb_size += SB_DELTA;
3d88e64d 592 telnet->sb_buf = sresize(telnet->sb_buf, telnet->sb_size,
593 unsigned char);
374330e2 594 }
3d88e64d 595 telnet->sb_buf[telnet->sb_len++] = c;
51470298 596 telnet->state = SUBNEGOT; /* in case we came here by goto */
374330e2 597 }
598 break;
599 case SUBNEG_IAC:
600 if (c != SE)
601 goto subneg_addchar; /* yes, it's a hack, I know, but... */
602 else {
51470298 603 process_subneg(telnet);
604 telnet->state = TOP_LEVEL;
374330e2 605 }
606 break;
607 }
608 }
ee00c99a 609
610 if (outbuflen)
611 c_write(telnet, outbuf, outbuflen);
612 sfree(outbuf);
374330e2 613}
614
7555d6a5 615static void telnet_log(Plug plug, int type, SockAddr addr, int port,
616 const char *error_msg, int error_code)
617{
618 Telnet telnet = (Telnet) plug;
619 char addrbuf[256], *msg;
620
621 sk_getaddr(addr, addrbuf, lenof(addrbuf));
622
623 if (type == 0)
624 msg = dupprintf("Connecting to %s port %d", addrbuf, port);
625 else
626 msg = dupprintf("Failed to connect to %s: %s", addrbuf, error_msg);
627
628 logevent(telnet->frontend, msg);
629}
630
cbe2d68f 631static int telnet_closing(Plug plug, const char *error_msg, int error_code,
32874aea 632 int calling_back)
633{
51470298 634 Telnet telnet = (Telnet) plug;
635
636 if (telnet->s) {
637 sk_close(telnet->s);
638 telnet->s = NULL;
39934deb 639 notify_remote_exit(telnet->frontend);
f3ab576e 640 }
7e78000d 641 if (error_msg) {
a8327734 642 logevent(telnet->frontend, error_msg);
971bcc0a 643 connection_fatal(telnet->frontend, "%s", error_msg);
7555d6a5 644 }
645 /* Otherwise, the remote side closed the connection normally. */
7e78000d 646 return 0;
647}
648
32874aea 649static int telnet_receive(Plug plug, int urgent, char *data, int len)
650{
51470298 651 Telnet telnet = (Telnet) plug;
32874aea 652 if (urgent)
51470298 653 telnet->in_synch = TRUE;
654 do_telnet_read(telnet, data, len);
8df7a775 655 return 1;
656}
657
3ad9d396 658static void telnet_sent(Plug plug, int bufsize)
659{
51470298 660 Telnet telnet = (Telnet) plug;
661 telnet->bufsize = bufsize;
3ad9d396 662}
663
374330e2 664/*
8df7a775 665 * Called to set up the Telnet connection.
374330e2 666 *
667 * Returns an error message, or NULL on success.
668 *
6e1ebb76 669 * Also places the canonical host name into `realhost'. It must be
670 * freed by the caller.
374330e2 671 */
cbe2d68f 672static const char *telnet_init(void *frontend_handle, void **backend_handle,
673 Config *cfg,
674 char *host, int port, char **realhost,
79bf227b 675 int nodelay, int keepalive)
32874aea 676{
51470298 677 static const struct plug_function_table fn_table = {
7555d6a5 678 telnet_log,
7e78000d 679 telnet_closing,
3ad9d396 680 telnet_receive,
681 telnet_sent
51470298 682 };
8df7a775 683 SockAddr addr;
cbe2d68f 684 const char *err;
51470298 685 Telnet telnet;
686
3d88e64d 687 telnet = snew(struct telnet_tag);
51470298 688 telnet->fn = &fn_table;
86916870 689 telnet->cfg = *cfg; /* STRUCTURE COPY */
51470298 690 telnet->s = NULL;
691 telnet->echoing = TRUE;
692 telnet->editing = TRUE;
693 telnet->activated = FALSE;
694 telnet->sb_buf = NULL;
695 telnet->sb_size = 0;
696 telnet->frontend = frontend_handle;
86916870 697 telnet->term_width = telnet->cfg.width;
698 telnet->term_height = telnet->cfg.height;
51470298 699 telnet->state = TOP_LEVEL;
cc31ab78 700 telnet->ldisc = NULL;
39934deb 701 telnet->pinger = NULL;
51470298 702 *backend_handle = telnet;
887035a5 703
374330e2 704 /*
705 * Try to find host.
706 */
3ad9d396 707 {
57356d63 708 char *buf;
05581745 709 buf = dupprintf("Looking up host \"%s\"%s", host,
710 (cfg->addressfamily == ADDRTYPE_IPV4 ? " (IPv4)" :
711 (cfg->addressfamily == ADDRTYPE_IPV6 ? " (IPv6)" :
712 "")));
a8327734 713 logevent(telnet->frontend, buf);
57356d63 714 sfree(buf);
3ad9d396 715 }
05581745 716 addr = name_lookup(host, port, realhost, &telnet->cfg, cfg->addressfamily);
f85e6f6e 717 if ((err = sk_addr_error(addr)) != NULL) {
718 sk_addr_free(addr);
8df7a775 719 return err;
f85e6f6e 720 }
374330e2 721
722 if (port < 0)
723 port = 23; /* default telnet port */
724
725 /*
726 * Open socket.
727 */
51470298 728 telnet->s = new_connection(addr, *realhost, port, 0, 1,
79bf227b 729 nodelay, keepalive, (Plug) telnet, &telnet->cfg);
a1fd562d 730 if ((err = sk_socket_error(telnet->s)) != NULL)
8df7a775 731 return err;
374330e2 732
39934deb 733 telnet->pinger = pinger_new(&telnet->cfg, &telnet_backend, telnet);
734
374330e2 735 /*
736 * Initialise option states.
737 */
86916870 738 if (telnet->cfg.passive_telnet) {
51470298 739 const struct Opt *const *o;
8faa456c 740
741 for (o = opts; *o; o++)
51470298 742 telnet->opt_states[(*o)->index] = INACTIVE;
8faa456c 743 } else {
51470298 744 const struct Opt *const *o;
374330e2 745
51470298 746 for (o = opts; *o; o++) {
747 telnet->opt_states[(*o)->index] = (*o)->initial_state;
748 if (telnet->opt_states[(*o)->index] == REQUESTED)
749 send_opt(telnet, (*o)->send, (*o)->option);
750 }
751 telnet->activated = TRUE;
374330e2 752 }
753
374330e2 754 /*
755 * Set up SYNCH state.
756 */
51470298 757 telnet->in_synch = FALSE;
6f34e365 758
533b1743 759 /*
760 * We can send special commands from the start.
761 */
762 update_specials_menu(telnet->frontend);
763
881da168 764 /*
765 * loghost overrides realhost, if specified.
766 */
767 if (*telnet->cfg.loghost) {
768 char *colon;
769
770 sfree(*realhost);
771 *realhost = dupstr(telnet->cfg.loghost);
772 colon = strrchr(*realhost, ':');
773 if (colon) {
774 /*
775 * FIXME: if we ever update this aspect of ssh.c for
776 * IPv6 literal management, this should change in line
777 * with it.
778 */
779 *colon++ = '\0';
780 }
781 }
782
374330e2 783 return NULL;
784}
785
fabd1805 786static void telnet_free(void *handle)
787{
788 Telnet telnet = (Telnet) handle;
789
790 sfree(telnet->sb_buf);
791 if (telnet->s)
792 sk_close(telnet->s);
39934deb 793 if (telnet->pinger)
794 pinger_free(telnet->pinger);
fabd1805 795 sfree(telnet);
796}
374330e2 797/*
86916870 798 * Reconfigure the Telnet backend. There's no immediate action
799 * necessary, in this backend: we just save the fresh config for
800 * any subsequent negotiations.
801 */
802static void telnet_reconfig(void *handle, Config *cfg)
803{
804 Telnet telnet = (Telnet) handle;
39934deb 805 pinger_reconfig(telnet->pinger, &telnet->cfg, cfg);
86916870 806 telnet->cfg = *cfg; /* STRUCTURE COPY */
807}
808
809/*
374330e2 810 * Called to send data down the Telnet connection.
811 */
51470298 812static int telnet_send(void *handle, char *buf, int len)
32874aea 813{
51470298 814 Telnet telnet = (Telnet) handle;
a1fd562d 815 unsigned char *p, *end;
c85623f9 816 static const unsigned char iac[2] = { IAC, IAC };
817 static const unsigned char cr[2] = { CR, NUL };
a5f3e637 818#if 0
c85623f9 819 static const unsigned char nl[2] = { CR, LF };
a5f3e637 820#endif
374330e2 821
51470298 822 if (telnet->s == NULL)
5471d09a 823 return 0;
374330e2 824
a1fd562d 825 p = (unsigned char *)buf;
826 end = (unsigned char *)(buf + len);
827 while (p < end) {
828 unsigned char *q = p;
374330e2 829
a1fd562d 830 while (p < end && iswritable(*p))
32874aea 831 p++;
a1fd562d 832 telnet->bufsize = sk_write(telnet->s, (char *)q, p - q);
374330e2 833
a1fd562d 834 while (p < end && !iswritable(*p)) {
51470298 835 telnet->bufsize =
a1fd562d 836 sk_write(telnet->s, (char *)(*p == IAC ? iac : cr), 2);
374330e2 837 p++;
838 }
839 }
5471d09a 840
51470298 841 return telnet->bufsize;
5471d09a 842}
843
844/*
845 * Called to query the current socket sendability status.
846 */
51470298 847static int telnet_sendbuffer(void *handle)
5471d09a 848{
51470298 849 Telnet telnet = (Telnet) handle;
850 return telnet->bufsize;
374330e2 851}
852
853/*
854 * Called to set the size of the window from Telnet's POV.
855 */
51470298 856static void telnet_size(void *handle, int width, int height)
32874aea 857{
51470298 858 Telnet telnet = (Telnet) handle;
ef41972c 859 unsigned char b[24];
860 int n;
57356d63 861 char *logbuf;
374330e2 862
51470298 863 telnet->term_width = width;
864 telnet->term_height = height;
f278d6f8 865
51470298 866 if (telnet->s == NULL || telnet->opt_states[o_naws.index] != ACTIVE)
374330e2 867 return;
ef41972c 868 n = 0;
869 b[n++] = IAC;
870 b[n++] = SB;
871 b[n++] = TELOPT_NAWS;
872 b[n++] = telnet->term_width >> 8;
873 if (b[n-1] == IAC) b[n++] = IAC; /* duplicate any IAC byte occurs */
874 b[n++] = telnet->term_width & 0xFF;
875 if (b[n-1] == IAC) b[n++] = IAC; /* duplicate any IAC byte occurs */
876 b[n++] = telnet->term_height >> 8;
877 if (b[n-1] == IAC) b[n++] = IAC; /* duplicate any IAC byte occurs */
878 b[n++] = telnet->term_height & 0xFF;
879 if (b[n-1] == IAC) b[n++] = IAC; /* duplicate any IAC byte occurs */
880 b[n++] = IAC;
881 b[n++] = SE;
a1fd562d 882 telnet->bufsize = sk_write(telnet->s, (char *)b, n);
57356d63 883 logbuf = dupprintf("client:\tSB NAWS %d,%d",
ef41972c 884 telnet->term_width, telnet->term_height);
a8327734 885 logevent(telnet->frontend, logbuf);
57356d63 886 sfree(logbuf);
374330e2 887}
888
889/*
890 * Send Telnet special codes.
891 */
51470298 892static void telnet_special(void *handle, Telnet_Special code)
32874aea 893{
51470298 894 Telnet telnet = (Telnet) handle;
374330e2 895 unsigned char b[2];
896
51470298 897 if (telnet->s == NULL)
374330e2 898 return;
899
900 b[0] = IAC;
901 switch (code) {
32874aea 902 case TS_AYT:
903 b[1] = AYT;
a1fd562d 904 telnet->bufsize = sk_write(telnet->s, (char *)b, 2);
32874aea 905 break;
906 case TS_BRK:
907 b[1] = BREAK;
a1fd562d 908 telnet->bufsize = sk_write(telnet->s, (char *)b, 2);
32874aea 909 break;
910 case TS_EC:
911 b[1] = EC;
a1fd562d 912 telnet->bufsize = sk_write(telnet->s, (char *)b, 2);
32874aea 913 break;
914 case TS_EL:
915 b[1] = EL;
a1fd562d 916 telnet->bufsize = sk_write(telnet->s, (char *)b, 2);
32874aea 917 break;
918 case TS_GA:
919 b[1] = GA;
a1fd562d 920 telnet->bufsize = sk_write(telnet->s, (char *)b, 2);
32874aea 921 break;
922 case TS_NOP:
923 b[1] = NOP;
a1fd562d 924 telnet->bufsize = sk_write(telnet->s, (char *)b, 2);
32874aea 925 break;
926 case TS_ABORT:
927 b[1] = ABORT;
a1fd562d 928 telnet->bufsize = sk_write(telnet->s, (char *)b, 2);
32874aea 929 break;
930 case TS_AO:
931 b[1] = AO;
a1fd562d 932 telnet->bufsize = sk_write(telnet->s, (char *)b, 2);
32874aea 933 break;
934 case TS_IP:
935 b[1] = IP;
a1fd562d 936 telnet->bufsize = sk_write(telnet->s, (char *)b, 2);
32874aea 937 break;
938 case TS_SUSP:
939 b[1] = SUSP;
a1fd562d 940 telnet->bufsize = sk_write(telnet->s, (char *)b, 2);
32874aea 941 break;
942 case TS_EOR:
943 b[1] = EOR;
a1fd562d 944 telnet->bufsize = sk_write(telnet->s, (char *)b, 2);
32874aea 945 break;
946 case TS_EOF:
947 b[1] = xEOF;
a1fd562d 948 telnet->bufsize = sk_write(telnet->s, (char *)b, 2);
32874aea 949 break;
a5f3e637 950 case TS_EOL:
6ee0cb6d 951 /* In BINARY mode, CR-LF becomes just CR -
952 * and without the NUL suffix too. */
656fa244 953 if (telnet->opt_states[o_we_bin.index] == ACTIVE)
6ee0cb6d 954 telnet->bufsize = sk_write(telnet->s, "\r", 1);
656fa244 955 else
956 telnet->bufsize = sk_write(telnet->s, "\r\n", 2);
a5f3e637 957 break;
374330e2 958 case TS_SYNCH:
32874aea 959 b[1] = DM;
a1fd562d 960 telnet->bufsize = sk_write(telnet->s, (char *)b, 1);
961 telnet->bufsize = sk_write_oob(telnet->s, (char *)(b + 1), 1);
32874aea 962 break;
684d367c 963 case TS_RECHO:
51470298 964 if (telnet->opt_states[o_echo.index] == INACTIVE ||
965 telnet->opt_states[o_echo.index] == REALLY_INACTIVE) {
966 telnet->opt_states[o_echo.index] = REQUESTED;
967 send_opt(telnet, o_echo.send, o_echo.option);
684d367c 968 }
969 break;
970 case TS_LECHO:
51470298 971 if (telnet->opt_states[o_echo.index] == ACTIVE) {
972 telnet->opt_states[o_echo.index] = REQUESTED;
973 send_opt(telnet, o_echo.nsend, o_echo.option);
684d367c 974 }
374330e2 975 break;
32874aea 976 case TS_PING:
51470298 977 if (telnet->opt_states[o_they_sga.index] == ACTIVE) {
32874aea 978 b[1] = NOP;
a1fd562d 979 telnet->bufsize = sk_write(telnet->s, (char *)b, 2);
ec55b220 980 }
32874aea 981 break;
6f2d0cde 982 default:
983 break; /* never heard of it */
374330e2 984 }
985}
986
125105d1 987static const struct telnet_special *telnet_get_specials(void *handle)
988{
989 static const struct telnet_special specials[] = {
990 {"Are You There", TS_AYT},
991 {"Break", TS_BRK},
992 {"Synch", TS_SYNCH},
993 {"Erase Character", TS_EC},
994 {"Erase Line", TS_EL},
995 {"Go Ahead", TS_GA},
996 {"No Operation", TS_NOP},
6f2d0cde 997 {NULL, TS_SEP},
125105d1 998 {"Abort Process", TS_ABORT},
999 {"Abort Output", TS_AO},
1000 {"Interrupt Process", TS_IP},
1001 {"Suspend Process", TS_SUSP},
6f2d0cde 1002 {NULL, TS_SEP},
125105d1 1003 {"End Of Record", TS_EOR},
1004 {"End Of File", TS_EOF},
6f2d0cde 1005 {NULL, TS_EXITMENU}
125105d1 1006 };
1007 return specials;
1008}
1009
6226c939 1010static int telnet_connected(void *handle)
32874aea 1011{
51470298 1012 Telnet telnet = (Telnet) handle;
6226c939 1013 return telnet->s != NULL;
32874aea 1014}
8ccc75b0 1015
51470298 1016static int telnet_sendok(void *handle)
32874aea 1017{
68a49acb 1018 /* Telnet telnet = (Telnet) handle; */
32874aea 1019 return 1;
1020}
4017be6d 1021
51470298 1022static void telnet_unthrottle(void *handle, int backlog)
5471d09a 1023{
51470298 1024 Telnet telnet = (Telnet) handle;
1025 sk_set_frozen(telnet->s, backlog > TELNET_MAX_BACKLOG);
5471d09a 1026}
1027
51470298 1028static int telnet_ldisc(void *handle, int option)
32874aea 1029{
51470298 1030 Telnet telnet = (Telnet) handle;
32874aea 1031 if (option == LD_ECHO)
51470298 1032 return telnet->echoing;
32874aea 1033 if (option == LD_EDIT)
51470298 1034 return telnet->editing;
0965bee0 1035 return FALSE;
1036}
1037
b9d7bcad 1038static void telnet_provide_ldisc(void *handle, void *ldisc)
1039{
1040 Telnet telnet = (Telnet) handle;
1041 telnet->ldisc = ldisc;
1042}
1043
a8327734 1044static void telnet_provide_logctx(void *handle, void *logctx)
1045{
1046 /* This is a stub. */
1047}
1048
51470298 1049static int telnet_exitcode(void *handle)
d8d6c7e5 1050{
0da1a790 1051 Telnet telnet = (Telnet) handle;
1052 if (telnet->s != NULL)
1053 return -1; /* still connected */
1054 else
1055 /* Telnet doesn't transmit exit codes back to the client */
1056 return 0;
d8d6c7e5 1057}
1058
f89c3294 1059/*
1060 * cfg_info for Telnet does nothing at all.
1061 */
1062static int telnet_cfg_info(void *handle)
1063{
1064 return 0;
1065}
1066
374330e2 1067Backend telnet_backend = {
1068 telnet_init,
fabd1805 1069 telnet_free,
86916870 1070 telnet_reconfig,
374330e2 1071 telnet_send,
5471d09a 1072 telnet_sendbuffer,
374330e2 1073 telnet_size,
4017be6d 1074 telnet_special,
125105d1 1075 telnet_get_specials,
6226c939 1076 telnet_connected,
d8d6c7e5 1077 telnet_exitcode,
97db3be4 1078 telnet_sendok,
0965bee0 1079 telnet_ldisc,
b9d7bcad 1080 telnet_provide_ldisc,
a8327734 1081 telnet_provide_logctx,
5471d09a 1082 telnet_unthrottle,
f89c3294 1083 telnet_cfg_info,
9e164d82 1084 "telnet",
1085 PROT_TELNET,
97db3be4 1086 23
374330e2 1087};