Plink now honours the Default Settings protocol and supports -l for username.
[u/mdw/putty] / telnet.c
CommitLineData
374330e2 1#include <windows.h>
2#include <stdio.h>
3#include <stdlib.h>
4d331a77 4#ifndef AUTO_WINSOCK
5#ifdef WINSOCK_TWO
6#include <winsock2.h>
7#else
374330e2 8#include <winsock.h>
4d331a77 9#endif
10#endif
374330e2 11
12#include "putty.h"
13
14#ifndef FALSE
15#define FALSE 0
16#endif
17#ifndef TRUE
18#define TRUE 1
19#endif
20
21static SOCKET s = INVALID_SOCKET;
22
23#define IAC 255 /* interpret as command: */
24#define DONT 254 /* you are not to use option */
25#define DO 253 /* please, you use option */
26#define WONT 252 /* I won't use option */
27#define WILL 251 /* I will use option */
28#define SB 250 /* interpret as subnegotiation */
29#define SE 240 /* end sub negotiation */
30
31#define GA 249 /* you may reverse the line */
32#define EL 248 /* erase the current line */
33#define EC 247 /* erase the current character */
34#define AYT 246 /* are you there */
35#define AO 245 /* abort output--but let prog finish */
36#define IP 244 /* interrupt process--permanently */
37#define BREAK 243 /* break */
38#define DM 242 /* data mark--for connect. cleaning */
39#define NOP 241 /* nop */
40#define EOR 239 /* end of record (transparent mode) */
41#define ABORT 238 /* Abort process */
42#define SUSP 237 /* Suspend process */
43#define xEOF 236 /* End of file: EOF is already used... */
44
45#define TELOPT_BINARY 0 /* 8-bit data path */
46#define TELOPT_ECHO 1 /* echo */
47#define TELOPT_RCP 2 /* prepare to reconnect */
48#define TELOPT_SGA 3 /* suppress go ahead */
49#define TELOPT_NAMS 4 /* approximate message size */
50#define TELOPT_STATUS 5 /* give status */
51#define TELOPT_TM 6 /* timing mark */
52#define TELOPT_RCTE 7 /* remote controlled transmission and echo */
53#define TELOPT_NAOL 8 /* negotiate about output line width */
54#define TELOPT_NAOP 9 /* negotiate about output page size */
55#define TELOPT_NAOCRD 10 /* negotiate about CR disposition */
56#define TELOPT_NAOHTS 11 /* negotiate about horizontal tabstops */
57#define TELOPT_NAOHTD 12 /* negotiate about horizontal tab disposition */
58#define TELOPT_NAOFFD 13 /* negotiate about formfeed disposition */
59#define TELOPT_NAOVTS 14 /* negotiate about vertical tab stops */
60#define TELOPT_NAOVTD 15 /* negotiate about vertical tab disposition */
61#define TELOPT_NAOLFD 16 /* negotiate about output LF disposition */
62#define TELOPT_XASCII 17 /* extended ascic character set */
63#define TELOPT_LOGOUT 18 /* force logout */
64#define TELOPT_BM 19 /* byte macro */
65#define TELOPT_DET 20 /* data entry terminal */
66#define TELOPT_SUPDUP 21 /* supdup protocol */
67#define TELOPT_SUPDUPOUTPUT 22 /* supdup output */
68#define TELOPT_SNDLOC 23 /* send location */
69#define TELOPT_TTYPE 24 /* terminal type */
70#define TELOPT_EOR 25 /* end or record */
71#define TELOPT_TUID 26 /* TACACS user identification */
72#define TELOPT_OUTMRK 27 /* output marking */
73#define TELOPT_TTYLOC 28 /* terminal location number */
74#define TELOPT_3270REGIME 29 /* 3270 regime */
75#define TELOPT_X3PAD 30 /* X.3 PAD */
76#define TELOPT_NAWS 31 /* window size */
77#define TELOPT_TSPEED 32 /* terminal speed */
78#define TELOPT_LFLOW 33 /* remote flow control */
79#define TELOPT_LINEMODE 34 /* Linemode option */
80#define TELOPT_XDISPLOC 35 /* X Display Location */
81#define TELOPT_OLD_ENVIRON 36 /* Old - Environment variables */
82#define TELOPT_AUTHENTICATION 37/* Authenticate */
83#define TELOPT_ENCRYPT 38 /* Encryption option */
84#define TELOPT_NEW_ENVIRON 39 /* New - Environment variables */
85#define TELOPT_EXOPL 255 /* extended-options-list */
86
87#define TELQUAL_IS 0 /* option is... */
88#define TELQUAL_SEND 1 /* send option */
89#define TELQUAL_INFO 2 /* ENVIRON: informational version of IS */
90#define BSD_VAR 1
91#define BSD_VALUE 0
92#define RFC_VAR 0
93#define RFC_VALUE 1
94
95#define CR 13
96#define LF 10
97#define NUL 0
98
99#define iswritable(x) ( (x) != IAC && (x) != CR )
100
101static char *telopt(int opt) {
102#define i(x) if (opt == TELOPT_ ## x) return #x;
103 i(BINARY); i(ECHO); i(RCP); i(SGA); i(NAMS); i(STATUS); i(TM); i(RCTE);
104 i(NAOL); i(NAOP); i(NAOCRD); i(NAOHTS); i(NAOHTD); i(NAOFFD); i(NAOVTS);
105 i(NAOVTD); i(NAOLFD); i(XASCII); i(LOGOUT); i(BM); i(DET); i(SUPDUP);
106 i(SUPDUPOUTPUT); i(SNDLOC); i(TTYPE); i(EOR); i(TUID); i(OUTMRK);
107 i(TTYLOC); i(X3PAD); i(NAWS); i(TSPEED); i(LFLOW); i(LINEMODE);
108 i(XDISPLOC); i(OLD_ENVIRON); i(AUTHENTICATION); i(ENCRYPT);
109 i(NEW_ENVIRON); i(EXOPL);
110#undef i
111 return "<unknown>";
112}
113
114static void telnet_size(void);
115
116struct Opt {
117 int send; /* what we initially send */
118 int nsend; /* -ve send if requested to stop it */
119 int ack, nak; /* +ve and -ve acknowledgements */
120 int option; /* the option code */
121 enum {
122 REQUESTED, ACTIVE, INACTIVE, REALLY_INACTIVE
123 } state;
124};
125
126static struct Opt o_naws = {WILL, WONT, DO, DONT, TELOPT_NAWS, REQUESTED};
127static struct Opt o_tspeed = {WILL, WONT, DO, DONT, TELOPT_TSPEED, REQUESTED};
128static struct Opt o_ttype = {WILL, WONT, DO, DONT, TELOPT_TTYPE, REQUESTED};
129static struct Opt o_oenv = {WILL, WONT, DO, DONT, TELOPT_OLD_ENVIRON,
130 INACTIVE};
131static struct Opt o_nenv = {WILL, WONT, DO, DONT, TELOPT_NEW_ENVIRON,
132 REQUESTED};
133static struct Opt o_echo = {DO, DONT, WILL, WONT, TELOPT_ECHO, REQUESTED};
134static struct Opt o_we_sga = {WILL, WONT, DO, DONT, TELOPT_SGA, REQUESTED};
135static struct Opt o_they_sga = {DO, DONT, WILL, WONT, TELOPT_SGA, REQUESTED};
136
137static struct Opt *opts[] = {
138 &o_naws, &o_tspeed, &o_ttype, &o_oenv, &o_nenv, &o_echo,
139 &o_we_sga, &o_they_sga, NULL
140};
141
374330e2 142static int in_synch;
374330e2 143static int sb_opt, sb_len;
144static char *sb_buf = NULL;
145static int sb_size = 0;
146#define SB_DELTA 1024
147
148static void try_write (void) {
149 while (outbuf_head != outbuf_reap) {
150 int end = (outbuf_reap < outbuf_head ? outbuf_head : OUTBUF_SIZE);
151 int len = end - outbuf_reap;
152 int ret;
153
154 ret = send (s, outbuf+outbuf_reap, len, 0);
155 if (ret > 0)
156 outbuf_reap = (outbuf_reap + ret) & OUTBUF_MASK;
157 if (ret < len)
158 return;
159 }
160}
161
162static void s_write (void *buf, int len) {
163 unsigned char *p = buf;
164 while (len--) {
165 int new_head = (outbuf_head + 1) & OUTBUF_MASK;
166 if (new_head != outbuf_reap) {
167 outbuf[outbuf_head] = *p++;
168 outbuf_head = new_head;
169 }
170 }
171 try_write();
172}
173
374330e2 174static void log_option (char *sender, int cmd, int option) {
175 char buf[50];
176 sprintf(buf, "%s:\t%s %s", sender,
177 (cmd == WILL ? "WILL" : cmd == WONT ? "WONT" :
178 cmd == DO ? "DO" : cmd == DONT ? "DONT" : "<??>"),
179 telopt(option));
c5e9c988 180 logevent(buf);
374330e2 181}
182
183static void send_opt (int cmd, int option) {
184 unsigned char b[3];
185
186 b[0] = IAC; b[1] = cmd; b[2] = option;
187 s_write (b, 3);
188 log_option("client", cmd, option);
189}
190
191static void deactivate_option (struct Opt *o) {
192 if (o->state == REQUESTED || o->state == ACTIVE)
193 send_opt (o->nsend, o->option);
194 o->state = REALLY_INACTIVE;
195}
196
197static void activate_option (struct Opt *o) {
198 if (o->send == WILL && o->option == TELOPT_NAWS)
199 telnet_size();
200 if (o->send == WILL &&
201 (o->option == TELOPT_NEW_ENVIRON ||
202 o->option == TELOPT_OLD_ENVIRON)) {
203 /*
204 * We may only have one kind of ENVIRON going at a time.
205 * This is a hack, but who cares.
206 */
207 deactivate_option (o->option==TELOPT_NEW_ENVIRON ? &o_oenv : &o_nenv);
208 }
2f938b83 209 if (o->option == TELOPT_ECHO && cfg.ldisc_term)
684d367c 210 ldisc = &ldisc_simple;
374330e2 211}
212
213static void refused_option (struct Opt *o) {
214 if (o->send == WILL && o->option == TELOPT_NEW_ENVIRON &&
215 o_oenv.state == INACTIVE) {
216 send_opt (WILL, TELOPT_OLD_ENVIRON);
217 o_oenv.state = REQUESTED;
218 }
2f938b83 219 if (o->option == TELOPT_ECHO && cfg.ldisc_term)
684d367c 220 ldisc = &ldisc_term;
374330e2 221}
222
223static void proc_rec_opt (int cmd, int option) {
224 struct Opt **o;
225
226 log_option ("server", cmd, option);
227 for (o = opts; *o; o++) {
228 if ((*o)->option == option && (*o)->ack == cmd) {
229 switch ((*o)->state) {
230 case REQUESTED:
231 (*o)->state = ACTIVE;
232 activate_option (*o);
233 break;
234 case ACTIVE:
235 break;
236 case INACTIVE:
237 (*o)->state = ACTIVE;
238 send_opt ((*o)->send, option);
239 activate_option (*o);
240 break;
241 case REALLY_INACTIVE:
242 send_opt ((*o)->nsend, option);
243 break;
244 }
245 return;
246 } else if ((*o)->option == option && (*o)->nak == cmd) {
247 switch ((*o)->state) {
248 case REQUESTED:
249 (*o)->state = INACTIVE;
250 refused_option (*o);
251 break;
252 case ACTIVE:
253 (*o)->state = INACTIVE;
254 send_opt ((*o)->nsend, option);
255 break;
256 case INACTIVE:
257 case REALLY_INACTIVE:
258 break;
259 }
260 return;
261 }
262 }
263 /*
264 * If we reach here, the option was one we weren't prepared to
265 * cope with. So send a negative ack.
266 */
267 send_opt ((cmd == WILL ? DONT : WONT), option);
268}
269
270static void process_subneg (void) {
271 unsigned char b[2048], *p, *q;
272 int var, value, n;
273 char *e;
274
275 switch (sb_opt) {
276 case TELOPT_TSPEED:
277 if (sb_len == 1 && sb_buf[0] == TELQUAL_SEND) {
278 char logbuf[sizeof(cfg.termspeed)+80];
279 b[0] = IAC; b[1] = SB; b[2] = TELOPT_TSPEED;
280 b[3] = TELQUAL_IS;
281 strcpy(b+4, cfg.termspeed);
282 n = 4 + strlen(cfg.termspeed);
283 b[n] = IAC; b[n+1] = SE;
284 s_write (b, n+2);
c5e9c988 285 logevent("server:\tSB TSPEED SEND");
374330e2 286 sprintf(logbuf, "client:\tSB TSPEED IS %s", cfg.termspeed);
c5e9c988 287 logevent (logbuf);
374330e2 288 } else
c5e9c988 289 logevent ("server:\tSB TSPEED <something weird>");
374330e2 290 break;
291 case TELOPT_TTYPE:
292 if (sb_len == 1 && sb_buf[0] == TELQUAL_SEND) {
293 char logbuf[sizeof(cfg.termtype)+80];
294 b[0] = IAC; b[1] = SB; b[2] = TELOPT_TTYPE;
295 b[3] = TELQUAL_IS;
296 for (n = 0; cfg.termtype[n]; n++)
297 b[n+4] = (cfg.termtype[n] >= 'a' && cfg.termtype[n] <= 'z' ?
298 cfg.termtype[n] + 'A'-'a' : cfg.termtype[n]);
299 b[n+4] = IAC; b[n+5] = SE;
300 s_write (b, n+6);
301 b[n+4] = 0;
c5e9c988 302 logevent("server:\tSB TTYPE SEND");
374330e2 303 sprintf(logbuf, "client:\tSB TTYPE IS %s", b+4);
c5e9c988 304 logevent(logbuf);
374330e2 305 } else
c5e9c988 306 logevent("server:\tSB TTYPE <something weird>\r\n");
374330e2 307 break;
308 case TELOPT_OLD_ENVIRON:
309 case TELOPT_NEW_ENVIRON:
310 p = sb_buf;
311 q = p + sb_len;
312 if (p < q && *p == TELQUAL_SEND) {
313 char logbuf[50];
314 p++;
315 sprintf (logbuf, "server:\tSB %s SEND", telopt(sb_opt));
c5e9c988 316 logevent (logbuf);
374330e2 317 if (sb_opt == TELOPT_OLD_ENVIRON) {
318 if (cfg.rfc_environ) {
319 value = RFC_VALUE;
320 var = RFC_VAR;
321 } else {
322 value = BSD_VALUE;
323 var = BSD_VAR;
324 }
325 /*
326 * Try to guess the sense of VAR and VALUE.
327 */
328 while (p < q) {
329 if (*p == RFC_VAR) {
330 value = RFC_VALUE;
331 var = RFC_VAR;
332 } else if (*p == BSD_VAR) {
333 value = BSD_VALUE;
334 var = BSD_VAR;
335 }
336 p++;
337 }
338 } else {
339 /*
340 * With NEW_ENVIRON, the sense of VAR and VALUE
341 * isn't in doubt.
342 */
343 value = RFC_VALUE;
344 var = RFC_VAR;
345 }
346 b[0] = IAC; b[1] = SB; b[2] = sb_opt;
347 b[3] = TELQUAL_IS;
348 n = 4;
37508af4 349 e = cfg.environmt;
374330e2 350 while (*e) {
351 b[n++] = var;
352 while (*e && *e != '\t') b[n++] = *e++;
353 if (*e == '\t') e++;
354 b[n++] = value;
355 while (*e) b[n++] = *e++;
356 e++;
357 }
358 if (*cfg.username) {
359 b[n++] = var; b[n++] = 'U'; b[n++] = 'S';
360 b[n++] = 'E'; b[n++] = 'R'; b[n++] = value;
361 e = cfg.username;
362 while (*e) b[n++] = *e++;
363 }
364 b[n++] = IAC; b[n++] = SE;
365 s_write (b, n);
366 sprintf(logbuf, "client:\tSB %s IS %s", telopt(sb_opt),
367 n==6 ? "<nothing>" : "<stuff>");
c5e9c988 368 logevent (logbuf);
374330e2 369 }
370 break;
371 }
372}
373
374static enum {
375 TOPLEVEL, SEENIAC, SEENWILL, SEENWONT, SEENDO, SEENDONT,
376 SEENSB, SUBNEGOT, SUBNEG_IAC, SEENCR
377} telnet_state = TOPLEVEL;
378
379static void do_telnet_read (char *buf, int len) {
374330e2 380
381 while (len--) {
382 int c = (unsigned char) *buf++;
383
384 switch (telnet_state) {
385 case TOPLEVEL:
386 case SEENCR:
387 if (c == NUL && telnet_state == SEENCR)
388 telnet_state = TOPLEVEL;
389 else if (c == IAC)
390 telnet_state = SEENIAC;
391 else {
374330e2 392 if (!in_synch)
c9def1b8 393 c_write1(c);
2f938b83 394
395#if 1
396 /* I can't get the F***ing winsock to insert the urgent IAC
397 * into the right position! Even with SO_OOBINLINE it gives
398 * it to recv too soon. And of course the DM byte (that
399 * arrives in the same packet!) appears several K later!!
400 *
401 * Oh well, we do get the DM in the right place so I'll
402 * just stop hiding on the next 0xf2 and hope for the best.
403 */
404 else if (c == DM) in_synch = 0;
405#endif
374330e2 406 if (c == CR)
407 telnet_state = SEENCR;
408 else
409 telnet_state = TOPLEVEL;
410 }
411 break;
412 case SEENIAC:
413 if (c == DO) telnet_state = SEENDO;
414 else if (c == DONT) telnet_state = SEENDONT;
415 else if (c == WILL) telnet_state = SEENWILL;
416 else if (c == WONT) telnet_state = SEENWONT;
417 else if (c == SB) telnet_state = SEENSB;
2f938b83 418 else if (c == DM) {
419 in_synch = 0;
420 telnet_state = TOPLEVEL;
421 }
300d41b0 422 else {
ded38628 423 /* ignore everything else; print it if it's IAC */
424 if (c == IAC) {
c9def1b8 425 c_write1(c);
ded38628 426 }
300d41b0 427 telnet_state = TOPLEVEL;
428 }
374330e2 429 break;
430 case SEENWILL:
431 proc_rec_opt (WILL, c);
432 telnet_state = TOPLEVEL;
433 break;
434 case SEENWONT:
435 proc_rec_opt (WONT, c);
436 telnet_state = TOPLEVEL;
437 break;
438 case SEENDO:
439 proc_rec_opt (DO, c);
440 telnet_state = TOPLEVEL;
441 break;
442 case SEENDONT:
443 proc_rec_opt (DONT, c);
444 telnet_state = TOPLEVEL;
445 break;
446 case SEENSB:
447 sb_opt = c;
448 sb_len = 0;
449 telnet_state = SUBNEGOT;
450 break;
451 case SUBNEGOT:
452 if (c == IAC)
453 telnet_state = SUBNEG_IAC;
454 else {
455 subneg_addchar:
456 if (sb_len >= sb_size) {
457 char *newbuf;
458 sb_size += SB_DELTA;
459 newbuf = (sb_buf ?
c9def1b8 460 srealloc(sb_buf, sb_size) :
461 smalloc(sb_size));
374330e2 462 if (newbuf)
463 sb_buf = newbuf;
464 else
465 sb_size -= SB_DELTA;
466 }
467 if (sb_len < sb_size)
468 sb_buf[sb_len++] = c;
469 telnet_state = SUBNEGOT;/* in case we came here by goto */
470 }
471 break;
472 case SUBNEG_IAC:
473 if (c != SE)
474 goto subneg_addchar; /* yes, it's a hack, I know, but... */
475 else {
476 process_subneg();
477 telnet_state = TOPLEVEL;
478 }
479 break;
480 }
481 }
482}
483
484/*
485 * Called to set up the Telnet connection. Will arrange for
486 * WM_NETEVENT messages to be passed to the specified window, whose
487 * window procedure should then call telnet_msg().
488 *
489 * Returns an error message, or NULL on success.
490 *
491 * Also places the canonical host name into `realhost'.
492 */
493static char *telnet_init (HWND hwnd, char *host, int port, char **realhost) {
494 SOCKADDR_IN addr;
495 struct hostent *h;
496 unsigned long a;
497
498 /*
499 * Try to find host.
500 */
501 if ( (a = inet_addr(host)) == (unsigned long) INADDR_NONE) {
502 if ( (h = gethostbyname(host)) == NULL)
503 switch (WSAGetLastError()) {
504 case WSAENETDOWN: return "Network is down";
505 case WSAHOST_NOT_FOUND: case WSANO_DATA:
506 return "Host does not exist";
507 case WSATRY_AGAIN: return "Host not found";
508 default: return "gethostbyname: unknown error";
509 }
510 memcpy (&a, h->h_addr, sizeof(a));
511 *realhost = h->h_name;
512 } else
513 *realhost = host;
514 a = ntohl(a);
515
516 if (port < 0)
517 port = 23; /* default telnet port */
518
519 /*
520 * Open socket.
521 */
522 s = socket(AF_INET, SOCK_STREAM, 0);
523 if (s == INVALID_SOCKET)
524 switch (WSAGetLastError()) {
525 case WSAENETDOWN: return "Network is down";
526 case WSAEAFNOSUPPORT: return "TCP/IP support not present";
527 default: return "socket(): unknown error";
528 }
529
374330e2 530 {
531 BOOL b = TRUE;
532 setsockopt (s, SOL_SOCKET, SO_OOBINLINE, (void *)&b, sizeof(b));
533 }
374330e2 534
535 /*
536 * Bind to local address.
537 */
538 addr.sin_family = AF_INET;
539 addr.sin_addr.s_addr = htonl(INADDR_ANY);
540 addr.sin_port = htons(0);
541 if (bind (s, (struct sockaddr *)&addr, sizeof(addr)) == SOCKET_ERROR)
542 switch (WSAGetLastError()) {
543 case WSAENETDOWN: return "Network is down";
544 default: return "bind(): unknown error";
545 }
546
547 /*
548 * Connect to remote address.
549 */
550 addr.sin_addr.s_addr = htonl(a);
551 addr.sin_port = htons((short)port);
552 if (connect (s, (struct sockaddr *)&addr, sizeof(addr)) == SOCKET_ERROR)
553 switch (WSAGetLastError()) {
554 case WSAENETDOWN: return "Network is down";
555 case WSAECONNREFUSED: return "Connection refused";
556 case WSAENETUNREACH: return "Network is unreachable";
557 case WSAEHOSTUNREACH: return "No route to host";
558 default: return "connect(): unknown error";
559 }
560
4017be6d 561 if (hwnd && WSAAsyncSelect (s, hwnd, WM_NETEVENT, FD_READ |
374330e2 562 FD_WRITE | FD_OOB | FD_CLOSE) == SOCKET_ERROR)
563 switch (WSAGetLastError()) {
564 case WSAENETDOWN: return "Network is down";
565 default: return "WSAAsyncSelect(): unknown error";
566 }
567
568 /*
569 * Initialise option states.
570 */
eb5e1db9 571 if( cfg.ldisc_term )
572 {
573 struct Opt **o;
574
575 for (o = opts; *o; o++)
576 if ((*o)->state == REQUESTED)
577 (*o)->state = INACTIVE;
578 }
579 else
374330e2 580 {
581 struct Opt **o;
582
583 for (o = opts; *o; o++)
584 if ((*o)->state == REQUESTED)
585 send_opt ((*o)->send, (*o)->option);
586 }
587
374330e2 588 /*
589 * Set up SYNCH state.
590 */
591 in_synch = FALSE;
6f34e365 592
593 /*
594 * We have no pre-session phase.
595 */
596 begin_session();
597
374330e2 598 return NULL;
599}
600
601/*
602 * Process a WM_NETEVENT message. Will return 0 if the connection
603 * has closed, or <0 for a socket error.
604 */
605static int telnet_msg (WPARAM wParam, LPARAM lParam) {
606 int ret;
c9def1b8 607 /* This needs to be larger than the packet size now that inbuf
608 * cannot overflow, in fact the fewer calls we make to windows
609 * the faster we will run!
610 */
611 char buf[16384];
374330e2 612
8ce72d2c 613 /*
614 * Because reading less than the whole of the available pending
615 * data can generate an FD_READ event, we need to allow for the
616 * possibility that FD_READ may arrive with FD_CLOSE already in
617 * the queue; so it's possible that we can get here even with s
618 * invalid. If so, we return 1 and don't worry about it.
619 */
620 if (s == INVALID_SOCKET)
621 return 1;
374330e2 622
8d5de777 623 if (WSAGETSELECTERROR(lParam) != 0) {
624 closesocket(s);
625 s = INVALID_SOCKET;
374330e2 626 return -WSAGETSELECTERROR(lParam);
8d5de777 627 }
374330e2 628
629 switch (WSAGETSELECTEVENT(lParam)) {
630 case FD_READ:
8ce72d2c 631 case FD_CLOSE:
2f938b83 632 {
633 int clear_of_oob = 1;
634 if (ioctlsocket (s, SIOCATMARK, &clear_of_oob) < 0 )
374330e2 635 return -20000-WSAGetLastError();
2f938b83 636
637 in_synch = !clear_of_oob;
638
639 do {
640 ret = recv(s, buf, sizeof(buf), 0);
641 if (ret < 0 && WSAGetLastError() == WSAEWOULDBLOCK)
642 return 1;
8d5de777 643 if (ret < 0) { /* any _other_ error */
644 closesocket(s);
645 s = INVALID_SOCKET;
2f938b83 646 return -10000-WSAGetLastError();
8d5de777 647 }
2f938b83 648 if (ret == 0) {
649 s = INVALID_SOCKET;
650 return 0;
651 }
2f938b83 652 do_telnet_read (buf, ret);
653 } while (in_synch);
374330e2 654 }
374330e2 655 return 1;
656 case FD_WRITE:
657 if (outbuf_head != outbuf_reap)
658 try_write();
659 return 1;
374330e2 660 }
661 return 1; /* shouldn't happen, but WTF */
662}
663
664/*
665 * Called to send data down the Telnet connection.
666 */
667static void telnet_send (char *buf, int len) {
668 char *p;
669 static unsigned char iac[2] = { IAC, IAC };
670 static unsigned char cr[2] = { CR, NUL };
eb5e1db9 671 static unsigned char nl[2] = { CR, LF };
374330e2 672
673 if (s == INVALID_SOCKET)
674 return;
675
676 p = buf;
2f938b83 677 while (p < buf+len) {
374330e2 678 char *q = p;
679
680 while (iswritable((unsigned char)*p) && p < buf+len) p++;
681 s_write (q, p-q);
682
683 while (p < buf+len && !iswritable((unsigned char)*p)) {
eb5e1db9 684 s_write ((unsigned char)*p == IAC ? iac : nl, 2);
374330e2 685 p++;
686 }
687 }
688}
689
690/*
691 * Called to set the size of the window from Telnet's POV.
692 */
693static void telnet_size(void) {
694 unsigned char b[16];
695 char logbuf[50];
696
697 if (s == INVALID_SOCKET || o_naws.state != ACTIVE)
698 return;
699 b[0] = IAC; b[1] = SB; b[2] = TELOPT_NAWS;
700 b[3] = cols >> 8; b[4] = cols & 0xFF;
701 b[5] = rows >> 8; b[6] = rows & 0xFF;
702 b[7] = IAC; b[8] = SE;
703 s_write (b, 9);
704 sprintf(logbuf, "client:\tSB NAWS %d,%d",
705 ((unsigned char)b[3] << 8) + (unsigned char)b[4],
706 ((unsigned char)b[5] << 8) + (unsigned char)b[6]);
c5e9c988 707 logevent (logbuf);
374330e2 708}
709
710/*
711 * Send Telnet special codes.
712 */
713static void telnet_special (Telnet_Special code) {
714 unsigned char b[2];
715
716 if (s == INVALID_SOCKET)
717 return;
718
719 b[0] = IAC;
720 switch (code) {
721 case TS_AYT: b[1] = AYT; s_write (b, 2); break;
722 case TS_BRK: b[1] = BREAK; s_write (b, 2); break;
723 case TS_EC: b[1] = EC; s_write (b, 2); break;
724 case TS_EL: b[1] = EL; s_write (b, 2); break;
725 case TS_GA: b[1] = GA; s_write (b, 2); break;
726 case TS_NOP: b[1] = NOP; s_write (b, 2); break;
727 case TS_ABORT: b[1] = ABORT; s_write (b, 2); break;
728 case TS_AO: b[1] = AO; s_write (b, 2); break;
729 case TS_IP: b[1] = IP; s_write (b, 2); break;
730 case TS_SUSP: b[1] = SUSP; s_write (b, 2); break;
731 case TS_EOR: b[1] = EOR; s_write (b, 2); break;
732 case TS_EOF: b[1] = xEOF; s_write (b, 2); break;
733 case TS_SYNCH:
734 outbuf_head = outbuf_reap = 0;
684d367c 735 b[1] = DM;
736 send (s, b, 2, MSG_OOB);
737 break;
738 case TS_RECHO:
739 if (o_echo.state == INACTIVE || o_echo.state == REALLY_INACTIVE) {
740 o_echo.state = REQUESTED;
741 send_opt (o_echo.send, o_echo.option);
742 }
743 break;
744 case TS_LECHO:
745 if (o_echo.state == ACTIVE) {
746 o_echo.state = REQUESTED;
747 send_opt (o_echo.nsend, o_echo.option);
748 }
374330e2 749 break;
750 }
751}
752
8ccc75b0 753static SOCKET telnet_socket(void) { return s; }
754
755static int telnet_sendok(void) { return 1; }
4017be6d 756
374330e2 757Backend telnet_backend = {
758 telnet_init,
759 telnet_msg,
760 telnet_send,
761 telnet_size,
4017be6d 762 telnet_special,
8ccc75b0 763 telnet_socket,
764 telnet_sendok
374330e2 765};