2 * Copyright (c) 1980, 1993
3 * The Regents of the University of California. All rights reserved.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 * must display the following acknowledgement:
15 * This product includes software developed by the University of
16 * California, Berkeley and its contributors.
17 * 4. Neither the name of the University nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33 * $FreeBSD: src/lib/libcompat/4.3/rexec.c,v 1.5.8.3 2000/11/22 13:36:00 ben Exp $
35 * @(#)rexec.c 8.1 (Berkeley) 6/4/93
38 #include <sys/types.h>
40 #include <sys/socket.h>
41 #include <sys/param.h>
44 #include <netinet/in.h>
55 #define SA_LEN(addr) ((addr)->sa_len)
56 #define __set_errno(val) errno = (val)
59 char *getpass(), *getlogin();
62 * Options and other state info.
65 char mac_name[9]; /* macro name */
66 char *mac_start; /* start of macro in macbuf */
67 char *mac_end; /* end of macro in macbuf */
70 int macnum; /* number of defined macros */
71 struct macel macros[16];
84 static char tokval[100];
86 static struct toktab {
90 { "default", DEFAULT },
92 { "password", PASSWD },
94 { "account", ACCOUNT },
107 if (feof(cfile) || ferror(cfile))
109 while ((c = getc(cfile)) != EOF &&
110 (c == '\n' || c == '\t' || c == ' ' || c == ','))
116 while ((c = getc(cfile)) != EOF && c != '"') {
123 while ((c = getc(cfile)) != EOF
124 && c != '\n' && c != '\t' && c != ' ' && c != ',') {
133 for (t = toktab; t->tokstr; t++)
134 if (!strcmp(t->tokstr, tokval))
140 ruserpass(char *host, const char **aname, const char **apass, char **aacct)
142 char *hdir, buf[BUFSIZ], *tmp;
143 char myname[MAXHOSTNAMELEN], *mydomain;
144 int t, i, c, usedefault = 0;
147 hdir = getenv("HOME");
150 if (strlen(hdir) + 8 > sizeof(buf))
152 (void) sprintf(buf, "%s/.netrc", hdir);
153 cfile = fopen(buf, "r");
159 if (gethostname(myname, sizeof(myname)) < 0)
161 if ((mydomain = strchr(myname, '.')) == NULL)
164 while ((t = token())) switch(t) {
175 * Allow match either for user's input host name
176 * or official hostname. Also allow match of
177 * incompletely-specified host in local domain.
179 if (strcasecmp(host, tokval) == 0)
181 if ((tmp = strchr(host, '.')) != NULL &&
182 strcasecmp(tmp, mydomain) == 0 &&
183 strncasecmp(host, tokval, tmp - host) == 0 &&
184 tokval[tmp - host] == '\0')
189 while ((t = token()) && t != MACH && t != DEFAULT) switch(t) {
193 if (*aname == NULL) {
195 tmp = malloc(strlen(tokval) + 1);
199 if (strcmp(*aname, tokval))
205 if ((*aname == NULL || strcmp(*aname, "anonymous")) &&
206 fstat(fileno(cfile), &stb) >= 0 &&
207 (stb.st_mode & 077) != 0) {
208 warnx("Error: .netrc file is readable by others.");
209 warnx("Remove password or make file unreadable by others.");
212 if (token() && *apass == NULL) {
214 tmp = malloc(strlen(tokval) + 1);
220 if (fstat(fileno(cfile), &stb) >= 0
221 && (stb.st_mode & 077) != 0) {
222 warnx("Error: .netrc file is readable by others.");
223 warnx("Remove account or make file unreadable by others.");
226 if (token() && *aacct == NULL) {
227 *aacct = malloc((unsigned) strlen(tokval) + 1);
228 (void) strcpy(*aacct, tokval);
232 while ((c=getc(cfile)) != EOF &&
233 (c == ' ' || c == '\t'))
235 if (c == EOF || c == '\n') {
236 printf("Missing macdef name argument.\n");
240 printf("Limit of 16 macros have already been defined\n");
243 tmp = macros[macnum].mac_name;
245 for (i=0; i < 8 && (c=getc(cfile)) != EOF &&
250 printf("Macro definition missing null line terminator.\n");
255 while ((c=getc(cfile)) != EOF && c != '\n');
258 printf("Macro definition missing null line terminator.\n");
262 macros[macnum].mac_start = macbuf;
265 macros[macnum].mac_start = macros[macnum-1].mac_end + 1;
267 tmp = macros[macnum].mac_start;
268 while (tmp != macbuf + 4096) {
269 if ((c=getc(cfile)) == EOF) {
270 printf("Macro definition missing null line terminator.\n");
275 if (*(tmp-1) == '\0') {
276 macros[macnum++].mac_end = tmp - 1;
283 if (tmp == macbuf + 4096) {
284 printf("4K macro buffer exceeded\n");
289 warnx("Unknown .netrc keyword %s", tokval);
295 (void) fclose(cfile);
298 (void) fclose(cfile);
303 rexec_af(char **ahost, int rport, const char *name, const char *pass,
304 const char *cmd, int *fd2p, sa_family_t *af)
306 struct sockaddr_storage sa2, from;
307 struct addrinfo hints, *res0;
308 const char *orig_name = name;
309 const char *orig_pass = pass;
310 static char *ahostbuf;
315 char servbuff[NI_MAXSERV];
317 snprintf(servbuff, sizeof(servbuff), "%d", ntohs(rport));
318 servbuff[sizeof(servbuff) - 1] = '\0';
320 memset(&hints, '\0', sizeof(hints));
322 hints.ai_family = *af;
323 hints.ai_socktype = SOCK_STREAM;
324 hints.ai_flags = AI_CANONNAME;
325 gai = getaddrinfo(*ahost, servbuff, &hints, &res0);
327 /* XXX: set errno? */
331 if (res0->ai_canonname){
333 ahostbuf = strdup (res0->ai_canonname);
334 if (ahostbuf == NULL) {
335 perror ("rexec: strdup");
341 __set_errno (ENOENT);
344 ruserpass(res0->ai_canonname, &name, &pass, 0);
346 s = socket(res0->ai_family, res0->ai_socktype, 0);
348 perror("rexec: socket");
351 if (connect(s, res0->ai_addr, res0->ai_addrlen) < 0) {
352 if (errno == ECONNREFUSED && timo <= 16) {
358 perror(res0->ai_canonname);
362 (void) write(s, "", 1);
369 s2 = socket(res0->ai_family, res0->ai_socktype, 0);
375 sa2len = sizeof (sa2);
376 if (getsockname(s2, (struct sockaddr *)&sa2, &sa2len) < 0) {
377 perror("getsockname");
380 } else if (sa2len != SA_LEN((struct sockaddr *)&sa2)) {
386 if (!getnameinfo((struct sockaddr *)&sa2, sa2len,
387 NULL, 0, servbuff, sizeof(servbuff),
389 port = atoi(servbuff);
390 (void) sprintf(num, "%u", port);
391 (void) write(s, num, strlen(num)+1);
392 { socklen_t len = sizeof (from);
393 s3 = accept(s2, (struct sockaddr *)&from,
405 (void) write(s, name, strlen(name) + 1);
406 /* should public key encypt the password here */
407 (void) write(s, pass, strlen(pass) + 1);
408 (void) write(s, cmd, strlen(cmd) + 1);
410 /* We don't need the memory allocated for the name and the password
411 in ruserpass anymore. */
412 if (name != orig_name)
413 free ((char *) name);
414 if (pass != orig_pass)
415 free ((char *) pass);
417 if (read(s, &c, 1) != 1) {
422 while (read(s, &c, 1) == 1) {
423 (void) write(2, &c, 1);
441 rexec(char **ahost, int rport, const char *name, const char *pass, char *cmd, int *fd2p)
443 struct sockaddr_in sin, sin2, from;
450 hp = gethostbyname(*ahost);
456 ruserpass(hp->h_name, &name, &pass, &acct);
460 s = socket(AF_INET, SOCK_STREAM, 0);
462 perror("rexec: socket");
465 sin.sin_family = hp->h_addrtype;
466 sin.sin_port = rport;
467 bcopy(hp->h_addr, (caddr_t)&sin.sin_addr, hp->h_length);
468 if (connect(s, (struct sockaddr *)&sin, sizeof(sin)) < 0) {
469 if (errno == ECONNREFUSED && timo <= 16) {
479 (void) write(s, "", 1);
485 s2 = socket(AF_INET, SOCK_STREAM, 0);
491 sin2len = sizeof (sin2);
492 if (getsockname(s2, (struct sockaddr *)&sin2, &sin2len) < 0 ||
493 sin2len != sizeof (sin2)) {
494 perror("getsockname");
498 port = ntohs((u_short)sin2.sin_port);
499 (void) sprintf(num, "%u", port);
500 (void) write(s, num, strlen(num)+1);
501 { int len = sizeof (from);
502 s3 = accept(s2, (struct sockaddr *)&from, &len);
512 (void) write(s, name, strlen(name) + 1);
513 /* should public key encypt the password here */
514 (void) write(s, pass, strlen(pass) + 1);
515 (void) write(s, cmd, strlen(cmd) + 1);
516 if (read(s, &c, 1) != 1) {
521 while (read(s, &c, 1) == 1) {
522 (void) write(2, &c, 1);