📄 rsh.c
字号:
/*- * Copyright (c) 1983, 1990 The Regents of the University of California. * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. All advertising materials mentioning features or use of this software * must display the following acknowledgement: * This product includes software developed by the University of * California, Berkeley and its contributors. * 4. Neither the name of the University nor the names of its contributors * may be used to endorse or promote products derived from this software * without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. */#ifndef lintchar copyright[] ="@(#) Copyright (c) 1983, 1990 The Regents of the University of California.\n\ All rights reserved.\n";#endif /* not lint */#ifndef lintstatic char sccsid[] = "@(#)rsh.c 5.24 (Berkeley) 7/1/91";#endif /* not lint *//* * $Source: mit/rsh/RCS/rsh.c,v $ * $Header: mit/rsh/RCS/rsh.c,v 5.1 89/07/31 19:28:59 kfall Exp Locker: kfall $ */#if _MINIX#include <sys/types.h>#include <sys/ioctl.h>#include <errno.h>#include <pwd.h>#include <signal.h>#include <stdio.h>#include <stdlib.h>#include <string.h>#include <unistd.h>#include <net/netlib.h>#include <net/gen/netdb.h>void main _ARGS(( int argc, char *argv[] ));void usage _ARGS(( void ));char *copyargs _ARGS(( char **argv ));void sendsig _ARGS(( int signo ));void talk _ARGS(( int nflag, long omask, int pid, int rem ));#define _PATH_RLOGIN "/usr/bin/rlogin"typedef unsigned u_int;#else#include <sys/types.h>#include <sys/signal.h>#include <sys/socket.h>#include <sys/ioctl.h>#include <sys/file.h>#include <netinet/in.h>#include <netdb.h>#include <pwd.h>#include <stdio.h>#include <errno.h>#include <string.h>#include <varargs.h>#include "pathnames.h"#endif#ifdef KERBEROS#include <kerberosIV/des.h>#include <kerberosIV/krb.h>CREDENTIALS cred;Key_schedule schedule;int use_kerberos = 1, doencrypt;char dst_realm_buf[REALM_SZ], *dest_realm;extern char *krb_realmofhost();#endif/* * rsh - remote shell */extern int errno;int rfd2;voidmain(argc, argv) int argc; char **argv;{ extern char *optarg; extern int optind; struct passwd *pw; struct servent *sp; long omask; int argoff, asrsh, ch, dflag, nflag, one, pid, rem, uid; register char *p; char *args, *host, *user;#if !_MINIX char *copyargs(); void sendsig();#endif argoff = asrsh = dflag = nflag = 0; one = 1; host = user = NULL; /* if called as something other than "rsh", use it as the host name */ if (p = rindex(argv[0], '/')) ++p; else p = argv[0]; if (strcmp(p, "rsh")) host = p; else asrsh = 1; /* handle "rsh host flags" */ if (!host && argc > 2 && argv[1][0] != '-') { host = argv[1]; argoff = 1; }#ifdef KERBEROS#ifdef CRYPT#define OPTIONS "8KLdek:l:nwx"#else#define OPTIONS "8KLdek:l:nw"#endif#else#define OPTIONS "8KLdel:nw"#endif while ((ch = getopt(argc - argoff, argv + argoff, OPTIONS)) != EOF) switch(ch) { case 'K':#ifdef KERBEROS use_kerberos = 0;#endif break; case 'L': /* -8Lew are ignored to allow rlogin aliases */ case 'e': case 'w': case '8': break; case 'd': dflag = 1; break; case 'l': user = optarg; break;#ifdef KERBEROS case 'k': dest_realm = dst_realm_buf; strncpy(dest_realm, optarg, REALM_SZ); break;#endif case 'n': nflag = 1; break;#ifdef KERBEROS#ifdef CRYPT case 'x': doencrypt = 1; des_set_key(cred.session, schedule); break;#endif#endif case '?': default: usage(); } optind += argoff; /* if haven't gotten a host yet, do so */ if (!host && !(host = argv[optind++])) usage(); /* if no further arguments, must have been called as rlogin. */ if (!argv[optind]) { if (asrsh) *argv = "rlogin"; execv(_PATH_RLOGIN, argv); (void)fprintf(stderr, "rsh: can't exec %s.\n", _PATH_RLOGIN); exit(1); } argc -= optind; argv += optind; if (!(pw = getpwuid(uid = getuid()))) { (void)fprintf(stderr, "rsh: unknown user id.\n"); exit(1); } if (!user) user = pw->pw_name;#ifdef KERBEROS#ifdef CRYPT /* -x turns off -n */ if (doencrypt) nflag = 0;#endif#endif args = copyargs(argv); sp = NULL;#ifdef KERBEROS if (use_kerberos) { sp = getservbyname((doencrypt ? "ekshell" : "kshell"), "tcp"); if (sp == NULL) { use_kerberos = 0; warning("can't get entry for %s/tcp service", doencrypt ? "ekshell" : "kshell"); } }#endif if (sp == NULL) sp = getservbyname("shell", "tcp"); if (sp == NULL) { (void)fprintf(stderr, "rsh: shell/tcp: unknown service.\n"); exit(1); }#ifdef KERBEROStry_connect: if (use_kerberos) { rem = KSUCCESS; errno = 0; if (dest_realm == NULL) dest_realm = krb_realmofhost(host);#ifdef CRYPT if (doencrypt) rem = krcmd_mutual(&host, sp->s_port, user, args, &rfd2, dest_realm, &cred, schedule); else#endif rem = krcmd(&host, sp->s_port, user, args, &rfd2, dest_realm); if (rem < 0) { use_kerberos = 0; sp = getservbyname("shell", "tcp"); if (sp == NULL) { (void)fprintf(stderr, "rsh: unknown service shell/tcp.\n"); exit(1); } if (errno == ECONNREFUSED) warning("remote host doesn't support Kerberos"); if (errno == ENOENT) warning("can't provide Kerberos auth data"); goto try_connect; } } else { if (doencrypt) { (void)fprintf(stderr, "rsh: the -x flag requires Kerberos authentication.\n"); exit(1); } rem = rcmd(&host, sp->s_port, pw->pw_name, user, args, &rfd2); }#else rem = rcmd(&host, sp->s_port, pw->pw_name, user, args, &rfd2);#endif if (rem < 0) exit(1); if (rfd2 < 0) { (void)fprintf(stderr, "rsh: can't establish stderr.\n"); exit(1); }#if !_MINIX if (dflag) { if (setsockopt(rem, SOL_SOCKET, SO_DEBUG, &one, sizeof(one)) < 0) (void)fprintf(stderr, "rsh: setsockopt: %s.\n", strerror(errno)); if (setsockopt(rfd2, SOL_SOCKET, SO_DEBUG, &one, sizeof(one)) < 0) (void)fprintf(stderr, "rsh: setsockopt: %s.\n", strerror(errno)); }#endif (void)setuid(uid);#if !_MINIX omask = sigblock(sigmask(SIGINT)|sigmask(SIGQUIT)|sigmask(SIGTERM));#endif if (signal(SIGINT, SIG_IGN) != SIG_IGN) (void)signal(SIGINT, sendsig); if (signal(SIGQUIT, SIG_IGN) != SIG_IGN) (void)signal(SIGQUIT, sendsig); if (signal(SIGTERM, SIG_IGN) != SIG_IGN) (void)signal(SIGTERM, sendsig); if (!nflag) { pid = fork(); if (pid < 0) { (void)fprintf(stderr, "rsh: fork: %s.\n", strerror(errno)); exit(1); } }#ifdef KERBEROS#ifdef CRYPT if (!doencrypt)#endif#endif {#if _MINIX ;#else (void)ioctl(rfd2, FIONBIO, &one); (void)ioctl(rem, FIONBIO, &one);#endif } talk(nflag, omask, pid, rem); if (!nflag && pid) { /* printf("killing %d with %d\n", pid, SIGKILL); */ (void)kill(pid, SIGKILL); } exit(0);}voidtalk(nflag, omask, pid, rem) int nflag, pid; long omask; register int rem;{ register int cc, wc; register char *bp; int readfrom, ready, rembits; char buf[BUFSIZ];#if _MINIX int pid1;#endif if (!nflag && pid == 0) { (void)close(rfd2);reread: errno = 0; if ((cc = read(0, buf, sizeof buf)) <= 0) goto done; bp = buf;rewrite:#if !_MINIX rembits = 1 << rem; if (select(16, 0, &rembits, 0, 0) < 0) { if (errno != EINTR) { (void)fprintf(stderr, "rsh: select: %s.\n", strerror(errno)); exit(1); } goto rewrite; } if ((rembits & (1 << rem)) == 0) goto rewrite;#endif#ifdef KERBEROS#ifdef CRYPT if (doencrypt) wc = des_write(rem, bp, cc); else#endif#endif wc = write(rem, bp, cc); if (wc < 0) {#if !_MINIX if (errno == EWOULDBLOCK) goto rewrite;#endif goto done; } bp += wc; cc -= wc; if (cc == 0) goto reread; goto rewrite;done:#if _MINIX ioctl(rem, NWIOTCPSHUTDOWN, NULL);#else (void)shutdown(rem, 1);#endif exit(0); }#if _MINIX pid1= fork(); if (pid1 == -1) { (void)fprintf(stderr, "rsh: fork: %s.\n", strerror(errno)); exit(1); } close (pid1 ? rfd2 : rem); for(;;) { errno = 0; cc = read(pid1 ? rem : rfd2, buf, sizeof buf); if (cc <= 0) { if (pid1) { /* printf("killing %d with %d\n", pid1, SIGKILL); */ kill(pid1, SIGKILL); return; } exit(0); } (void)write(pid1 ? 1 : 2, buf, cc); }#else (void)sigsetmask(omask); readfrom = (1 << rfd2) | (1 << rem); do { ready = readfrom; if (select(16, &ready, 0, 0, 0) < 0) { if (errno != EINTR) { (void)fprintf(stderr, "rsh: select: %s.\n", strerror(errno)); exit(1); } continue; } if (ready & (1 << rfd2)) { errno = 0;#ifdef KERBEROS#ifdef CRYPT if (doencrypt) cc = des_read(rfd2, buf, sizeof buf); else#endif#endif cc = read(rfd2, buf, sizeof buf); if (cc <= 0) { if (errno != EWOULDBLOCK) readfrom &= ~(1 << rfd2); } else (void)write(2, buf, cc); } if (ready & (1 << rem)) { errno = 0;#ifdef KERBEROS#ifdef CRYPT if (doencrypt) cc = des_read(rem, buf, sizeof buf); else#endif#endif cc = read(rem, buf, sizeof buf); if (cc <= 0) { if (errno != EWOULDBLOCK) readfrom &= ~(1 << rem); } else (void)write(1, buf, cc); } } while (readfrom);#endif}voidsendsig(signo) char signo;{#ifdef KERBEROS#ifdef CRYPT if (doencrypt) (void)des_write(rfd2, &signo, 1); else#endif#endif (void)write(rfd2, &signo, 1);}#ifdef KERBEROS/* VARARGS */warning(va_alist)va_dcl{ va_list ap; char *fmt; (void)fprintf(stderr, "rsh: warning, using standard rsh: "); va_start(ap); fmt = va_arg(ap, char *); vfprintf(stderr, fmt, ap); va_end(ap); (void)fprintf(stderr, ".\n");}#endifchar *copyargs(argv) char **argv;{ register int cc; register char **ap, *p; char *args;#if !_MINIX char *malloc();#endif cc = 0; for (ap = argv; *ap; ++ap) cc += strlen(*ap) + 1; if (!(args = malloc((u_int)cc))) { (void)fprintf(stderr, "rsh: %s.\n", strerror(ENOMEM)); exit(1); } for (p = args, ap = argv; *ap; ++ap) { (void)strcpy(p, *ap); for (p = strcpy(p, *ap); *p; ++p); if (ap[1]) *p++ = ' '; } return(args);}voidusage(){ (void)fprintf(stderr, "usage: rsh [-nd%s]%s[-l login] host [command]\n",#ifdef KERBEROS#ifdef CRYPT "x", " [-k realm] ");#else "", " [-k realm] ");#endif#else "", " ");#endif exit(1);}
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -