It's critically important that the local proxy process should not
[u/mdw/putty] / rlogin.c
CommitLineData
eaf1e20a 1/*
2 * Rlogin backend.
3 */
4
c91409da 5#include <stdio.h>
6#include <stdlib.h>
b6c680d4 7#include <ctype.h>
c91409da 8
9#include "putty.h"
10
11#ifndef FALSE
12#define FALSE 0
13#endif
14#ifndef TRUE
15#define TRUE 1
16#endif
17
5471d09a 18#define RLOGIN_MAX_BACKLOG 4096
19
51470298 20typedef struct rlogin_tag {
21 const struct plug_function_table *fn;
22 /* the above field _must_ be first in the structure */
c91409da 23
51470298 24 Socket s;
25 int bufsize;
c85623f9 26 int firstbyte;
2c42b725 27 int cansize;
51470298 28 int term_width, term_height;
29 void *frontend;
30} *Rlogin;
c91409da 31
51470298 32static void rlogin_size(void *handle, int width, int height);
33
34static void c_write(Rlogin rlogin, char *buf, int len)
32874aea 35{
51470298 36 int backlog = from_backend(rlogin->frontend, 0, buf, len);
37 sk_set_frozen(rlogin->s, backlog > RLOGIN_MAX_BACKLOG);
c91409da 38}
39
7555d6a5 40static void rlogin_log(Plug plug, int type, SockAddr addr, int port,
41 const char *error_msg, int error_code)
42{
43 Rlogin rlogin = (Rlogin) plug;
44 char addrbuf[256], *msg;
45
46 sk_getaddr(addr, addrbuf, lenof(addrbuf));
47
48 if (type == 0)
49 msg = dupprintf("Connecting to %s port %d", addrbuf, port);
50 else
51 msg = dupprintf("Failed to connect to %s: %s", addrbuf, error_msg);
52
53 logevent(rlogin->frontend, msg);
54}
55
cbe2d68f 56static int rlogin_closing(Plug plug, const char *error_msg, int error_code,
32874aea 57 int calling_back)
58{
51470298 59 Rlogin rlogin = (Rlogin) plug;
60 if (rlogin->s) {
61 sk_close(rlogin->s);
62 rlogin->s = NULL;
39934deb 63 notify_remote_exit(rlogin->frontend);
f3ab576e 64 }
7e78000d 65 if (error_msg) {
32874aea 66 /* A socket error has occurred. */
a8327734 67 logevent(rlogin->frontend, error_msg);
971bcc0a 68 connection_fatal(rlogin->frontend, "%s", error_msg);
32874aea 69 } /* Otherwise, the remote side closed the connection normally. */
7e78000d 70 return 0;
71}
72
32874aea 73static int rlogin_receive(Plug plug, int urgent, char *data, int len)
74{
51470298 75 Rlogin rlogin = (Rlogin) plug;
c91409da 76 if (urgent == 2) {
32874aea 77 char c;
78
79 c = *data++;
80 len--;
2c42b725 81 if (c == '\x80') {
82 rlogin->cansize = 1;
51470298 83 rlogin_size(rlogin, rlogin->term_width, rlogin->term_height);
2c42b725 84 }
32874aea 85 /*
86 * We should flush everything (aka Telnet SYNCH) if we see
87 * 0x02, and we should turn off and on _local_ flow control
88 * on 0x10 and 0x20 respectively. I'm not convinced it's
89 * worth it...
90 */
8a5fb9e3 91 } else {
32874aea 92 /*
93 * Main rlogin protocol. This is really simple: the first
94 * byte is expected to be NULL and is ignored, and the rest
95 * is printed.
96 */
c85623f9 97 if (rlogin->firstbyte) {
32874aea 98 if (data[0] == '\0') {
99 data++;
100 len--;
101 }
c85623f9 102 rlogin->firstbyte = 0;
32874aea 103 }
2b0c045b 104 if (len > 0)
51470298 105 c_write(rlogin, data, len);
c91409da 106 }
c91409da 107 return 1;
108}
109
3ad9d396 110static void rlogin_sent(Plug plug, int bufsize)
111{
51470298 112 Rlogin rlogin = (Rlogin) plug;
113 rlogin->bufsize = bufsize;
3ad9d396 114}
115
c91409da 116/*
117 * Called to set up the rlogin connection.
118 *
119 * Returns an error message, or NULL on success.
120 *
6e1ebb76 121 * Also places the canonical host name into `realhost'. It must be
122 * freed by the caller.
c91409da 123 */
cbe2d68f 124static const char *rlogin_init(void *frontend_handle, void **backend_handle,
125 Config *cfg,
126 char *host, int port, char **realhost,
79bf227b 127 int nodelay, int keepalive)
32874aea 128{
51470298 129 static const struct plug_function_table fn_table = {
7555d6a5 130 rlogin_log,
7e78000d 131 rlogin_closing,
3ad9d396 132 rlogin_receive,
133 rlogin_sent
51470298 134 };
c91409da 135 SockAddr addr;
cbe2d68f 136 const char *err;
51470298 137 Rlogin rlogin;
c91409da 138
3d88e64d 139 rlogin = snew(struct rlogin_tag);
51470298 140 rlogin->fn = &fn_table;
141 rlogin->s = NULL;
142 rlogin->frontend = frontend_handle;
86916870 143 rlogin->term_width = cfg->width;
144 rlogin->term_height = cfg->height;
c85623f9 145 rlogin->firstbyte = 1;
2c42b725 146 rlogin->cansize = 0;
51470298 147 *backend_handle = rlogin;
887035a5 148
c91409da 149 /*
150 * Try to find host.
151 */
3ad9d396 152 {
57356d63 153 char *buf;
05581745 154 buf = dupprintf("Looking up host \"%s\"%s", host,
155 (cfg->addressfamily == ADDRTYPE_IPV4 ? " (IPv4)" :
156 (cfg->addressfamily == ADDRTYPE_IPV6 ? " (IPv6)" :
157 "")));
a8327734 158 logevent(rlogin->frontend, buf);
57356d63 159 sfree(buf);
3ad9d396 160 }
05581745 161 addr = name_lookup(host, port, realhost, cfg, cfg->addressfamily);
f85e6f6e 162 if ((err = sk_addr_error(addr)) != NULL) {
163 sk_addr_free(addr);
c91409da 164 return err;
f85e6f6e 165 }
c91409da 166
167 if (port < 0)
168 port = 513; /* default rlogin port */
169
170 /*
171 * Open socket.
172 */
51470298 173 rlogin->s = new_connection(addr, *realhost, port, 1, 0,
79bf227b 174 nodelay, keepalive, (Plug) rlogin, cfg);
6f1e7b78 175 if ((err = sk_socket_error(rlogin->s)) != NULL)
c91409da 176 return err;
177
c91409da 178 /*
179 * Send local username, remote username, terminal/speed
180 */
181
182 {
32874aea 183 char z = 0;
184 char *p;
51470298 185 sk_write(rlogin->s, &z, 1);
86916870 186 sk_write(rlogin->s, cfg->localusername,
187 strlen(cfg->localusername));
51470298 188 sk_write(rlogin->s, &z, 1);
86916870 189 sk_write(rlogin->s, cfg->username,
190 strlen(cfg->username));
51470298 191 sk_write(rlogin->s, &z, 1);
86916870 192 sk_write(rlogin->s, cfg->termtype,
193 strlen(cfg->termtype));
51470298 194 sk_write(rlogin->s, "/", 1);
e93ed432 195 for (p = cfg->termspeed; isdigit((unsigned char)*p); p++) continue;
86916870 196 sk_write(rlogin->s, cfg->termspeed, p - cfg->termspeed);
51470298 197 rlogin->bufsize = sk_write(rlogin->s, &z, 1);
c91409da 198 }
199
c91409da 200 return NULL;
201}
202
fabd1805 203static void rlogin_free(void *handle)
204{
205 Rlogin rlogin = (Rlogin) handle;
206
207 if (rlogin->s)
208 sk_close(rlogin->s);
209 sfree(rlogin);
210}
211
c91409da 212/*
86916870 213 * Stub routine (we don't have any need to reconfigure this backend).
214 */
215static void rlogin_reconfig(void *handle, Config *cfg)
216{
217}
218
219/*
c91409da 220 * Called to send data down the rlogin connection.
221 */
51470298 222static int rlogin_send(void *handle, char *buf, int len)
32874aea 223{
51470298 224 Rlogin rlogin = (Rlogin) handle;
225
226 if (rlogin->s == NULL)
b5a460cd 227 return 0;
c91409da 228
51470298 229 rlogin->bufsize = sk_write(rlogin->s, buf, len);
5471d09a 230
51470298 231 return rlogin->bufsize;
5471d09a 232}
233
234/*
235 * Called to query the current socket sendability status.
236 */
51470298 237static int rlogin_sendbuffer(void *handle)
5471d09a 238{
51470298 239 Rlogin rlogin = (Rlogin) handle;
240 return rlogin->bufsize;
c91409da 241}
242
243/*
244 * Called to set the size of the window
245 */
51470298 246static void rlogin_size(void *handle, int width, int height)
32874aea 247{
51470298 248 Rlogin rlogin = (Rlogin) handle;
e418595a 249 char b[12] = { '\xFF', '\xFF', 0x73, 0x73, 0, 0, 0, 0, 0, 0, 0, 0 };
c91409da 250
51470298 251 rlogin->term_width = width;
252 rlogin->term_height = height;
f278d6f8 253
2c42b725 254 if (rlogin->s == NULL || !rlogin->cansize)
cf293dd4 255 return;
f278d6f8 256
51470298 257 b[6] = rlogin->term_width >> 8;
258 b[7] = rlogin->term_width & 0xFF;
259 b[4] = rlogin->term_height >> 8;
260 b[5] = rlogin->term_height & 0xFF;
261 rlogin->bufsize = sk_write(rlogin->s, b, 12);
c91409da 262 return;
263}
264
265/*
266 * Send rlogin special codes.
267 */
51470298 268static void rlogin_special(void *handle, Telnet_Special code)
32874aea 269{
c91409da 270 /* Do nothing! */
271 return;
272}
273
125105d1 274/*
275 * Return a list of the special codes that make sense in this
276 * protocol.
277 */
278static const struct telnet_special *rlogin_get_specials(void *handle)
279{
280 return NULL;
281}
282
51470298 283static Socket rlogin_socket(void *handle)
32874aea 284{
51470298 285 Rlogin rlogin = (Rlogin) handle;
286 return rlogin->s;
32874aea 287}
c91409da 288
51470298 289static int rlogin_sendok(void *handle)
32874aea 290{
68a49acb 291 /* Rlogin rlogin = (Rlogin) handle; */
32874aea 292 return 1;
293}
c91409da 294
51470298 295static void rlogin_unthrottle(void *handle, int backlog)
5471d09a 296{
51470298 297 Rlogin rlogin = (Rlogin) handle;
298 sk_set_frozen(rlogin->s, backlog > RLOGIN_MAX_BACKLOG);
5471d09a 299}
300
51470298 301static int rlogin_ldisc(void *handle, int option)
32874aea 302{
68a49acb 303 /* Rlogin rlogin = (Rlogin) handle; */
0965bee0 304 return 0;
305}
306
b9d7bcad 307static void rlogin_provide_ldisc(void *handle, void *ldisc)
308{
309 /* This is a stub. */
310}
311
a8327734 312static void rlogin_provide_logctx(void *handle, void *logctx)
313{
314 /* This is a stub. */
315}
316
51470298 317static int rlogin_exitcode(void *handle)
d8d6c7e5 318{
0da1a790 319 Rlogin rlogin = (Rlogin) handle;
320 if (rlogin->s != NULL)
321 return -1; /* still connected */
322 else
323 /* If we ever implement RSH, we'll probably need to do this properly */
324 return 0;
d8d6c7e5 325}
326
f89c3294 327/*
328 * cfg_info for rlogin does nothing at all.
329 */
330static int rlogin_cfg_info(void *handle)
331{
332 return 0;
333}
334
c91409da 335Backend rlogin_backend = {
336 rlogin_init,
fabd1805 337 rlogin_free,
86916870 338 rlogin_reconfig,
c91409da 339 rlogin_send,
5471d09a 340 rlogin_sendbuffer,
c91409da 341 rlogin_size,
342 rlogin_special,
125105d1 343 rlogin_get_specials,
c91409da 344 rlogin_socket,
d8d6c7e5 345 rlogin_exitcode,
c91409da 346 rlogin_sendok,
0965bee0 347 rlogin_ldisc,
b9d7bcad 348 rlogin_provide_ldisc,
a8327734 349 rlogin_provide_logctx,
5471d09a 350 rlogin_unthrottle,
f89c3294 351 rlogin_cfg_info,
c91409da 352 1
353};