⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rsh.c

📁 操作系统源代码
💻 C
字号:
/*- * Copyright (c) 1983, 1990 The Regents of the University of California. * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright *    notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright *    notice, this list of conditions and the following disclaimer in the *    documentation and/or other materials provided with the distribution. * 3. All advertising materials mentioning features or use of this software *    must display the following acknowledgement: *	This product includes software developed by the University of *	California, Berkeley and its contributors. * 4. Neither the name of the University nor the names of its contributors *    may be used to endorse or promote products derived from this software *    without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. */#ifndef lintchar copyright[] ="@(#) Copyright (c) 1983, 1990 The Regents of the University of California.\n\ All rights reserved.\n";#endif /* not lint */#ifndef lintstatic char sccsid[] = "@(#)rsh.c	5.24 (Berkeley) 7/1/91";#endif /* not lint *//* * $Source: mit/rsh/RCS/rsh.c,v $ * $Header: mit/rsh/RCS/rsh.c,v 5.1 89/07/31 19:28:59 kfall Exp Locker: kfall $ */#if _MINIX#include <sys/types.h>#include <sys/ioctl.h>#include <errno.h>#include <pwd.h>#include <signal.h>#include <stdio.h>#include <stdlib.h>#include <string.h>#include <unistd.h>#include <net/netlib.h>#include <net/gen/netdb.h>void main _ARGS(( int argc, char *argv[] ));void usage _ARGS(( void ));char *copyargs _ARGS(( char **argv ));void sendsig _ARGS(( int signo ));void talk _ARGS(( int nflag, long omask, int pid, int rem ));#define _PATH_RLOGIN	"/usr/bin/rlogin"typedef unsigned u_int;#else#include <sys/types.h>#include <sys/signal.h>#include <sys/socket.h>#include <sys/ioctl.h>#include <sys/file.h>#include <netinet/in.h>#include <netdb.h>#include <pwd.h>#include <stdio.h>#include <errno.h>#include <string.h>#include <varargs.h>#include "pathnames.h"#endif#ifdef KERBEROS#include <kerberosIV/des.h>#include <kerberosIV/krb.h>CREDENTIALS cred;Key_schedule schedule;int use_kerberos = 1, doencrypt;char dst_realm_buf[REALM_SZ], *dest_realm;extern char *krb_realmofhost();#endif/* * rsh - remote shell */extern int errno;int rfd2;voidmain(argc, argv)	int argc;	char **argv;{	extern char *optarg;	extern int optind;	struct passwd *pw;	struct servent *sp;	long omask;	int argoff, asrsh, ch, dflag, nflag, one, pid, rem, uid;	register char *p;	char *args, *host, *user;#if !_MINIX	char *copyargs();	void sendsig();#endif	argoff = asrsh = dflag = nflag = 0;	one = 1;	host = user = NULL;	/* if called as something other than "rsh", use it as the host name */	if (p = rindex(argv[0], '/'))		++p;	else		p = argv[0];	if (strcmp(p, "rsh"))		host = p;	else		asrsh = 1;	/* handle "rsh host flags" */	if (!host && argc > 2 && argv[1][0] != '-') {		host = argv[1];		argoff = 1;	}#ifdef KERBEROS#ifdef CRYPT#define	OPTIONS	"8KLdek:l:nwx"#else#define	OPTIONS	"8KLdek:l:nw"#endif#else#define	OPTIONS	"8KLdel:nw"#endif	while ((ch = getopt(argc - argoff, argv + argoff, OPTIONS)) != EOF)		switch(ch) {		case 'K':#ifdef KERBEROS			use_kerberos = 0;#endif			break;		case 'L':	/* -8Lew are ignored to allow rlogin aliases */		case 'e':		case 'w':		case '8':			break;		case 'd':			dflag = 1;			break;		case 'l':			user = optarg;			break;#ifdef KERBEROS		case 'k':			dest_realm = dst_realm_buf;			strncpy(dest_realm, optarg, REALM_SZ);			break;#endif		case 'n':			nflag = 1;			break;#ifdef KERBEROS#ifdef CRYPT		case 'x':			doencrypt = 1;			des_set_key(cred.session, schedule);			break;#endif#endif		case '?':		default:			usage();		}	optind += argoff;	/* if haven't gotten a host yet, do so */	if (!host && !(host = argv[optind++]))		usage();	/* if no further arguments, must have been called as rlogin. */	if (!argv[optind]) {		if (asrsh)			*argv = "rlogin";		execv(_PATH_RLOGIN, argv);		(void)fprintf(stderr, "rsh: can't exec %s.\n", _PATH_RLOGIN);		exit(1);	}	argc -= optind;	argv += optind;	if (!(pw = getpwuid(uid = getuid()))) {		(void)fprintf(stderr, "rsh: unknown user id.\n");		exit(1);	}	if (!user)		user = pw->pw_name;#ifdef KERBEROS#ifdef CRYPT	/* -x turns off -n */	if (doencrypt)		nflag = 0;#endif#endif	args = copyargs(argv);	sp = NULL;#ifdef KERBEROS	if (use_kerberos) {		sp = getservbyname((doencrypt ? "ekshell" : "kshell"), "tcp");		if (sp == NULL) {			use_kerberos = 0;			warning("can't get entry for %s/tcp service",			    doencrypt ? "ekshell" : "kshell");		}	}#endif	if (sp == NULL)		sp = getservbyname("shell", "tcp");	if (sp == NULL) {		(void)fprintf(stderr, "rsh: shell/tcp: unknown service.\n");		exit(1);	}#ifdef KERBEROStry_connect:	if (use_kerberos) {		rem = KSUCCESS;		errno = 0;		if (dest_realm == NULL)			dest_realm = krb_realmofhost(host);#ifdef CRYPT		if (doencrypt)			rem = krcmd_mutual(&host, sp->s_port, user, args,			    &rfd2, dest_realm, &cred, schedule);		else#endif			rem = krcmd(&host, sp->s_port, user, args, &rfd2,			    dest_realm);		if (rem < 0) {			use_kerberos = 0;			sp = getservbyname("shell", "tcp");			if (sp == NULL) {				(void)fprintf(stderr,				    "rsh: unknown service shell/tcp.\n");				exit(1);			}			if (errno == ECONNREFUSED)				warning("remote host doesn't support Kerberos");			if (errno == ENOENT)				warning("can't provide Kerberos auth data");			goto try_connect;		}	} else {		if (doencrypt) {			(void)fprintf(stderr,			    "rsh: the -x flag requires Kerberos authentication.\n");			exit(1);		}		rem = rcmd(&host, sp->s_port, pw->pw_name, user, args, &rfd2);	}#else	rem = rcmd(&host, sp->s_port, pw->pw_name, user, args, &rfd2);#endif	if (rem < 0)		exit(1);	if (rfd2 < 0) {		(void)fprintf(stderr, "rsh: can't establish stderr.\n");		exit(1);	}#if !_MINIX	if (dflag) {		if (setsockopt(rem, SOL_SOCKET, SO_DEBUG, &one,		    sizeof(one)) < 0)			(void)fprintf(stderr, "rsh: setsockopt: %s.\n",			    strerror(errno));		if (setsockopt(rfd2, SOL_SOCKET, SO_DEBUG, &one,		    sizeof(one)) < 0)			(void)fprintf(stderr, "rsh: setsockopt: %s.\n",			    strerror(errno));	}#endif	(void)setuid(uid);#if !_MINIX	omask = sigblock(sigmask(SIGINT)|sigmask(SIGQUIT)|sigmask(SIGTERM));#endif	if (signal(SIGINT, SIG_IGN) != SIG_IGN)		(void)signal(SIGINT, sendsig);	if (signal(SIGQUIT, SIG_IGN) != SIG_IGN)		(void)signal(SIGQUIT, sendsig);	if (signal(SIGTERM, SIG_IGN) != SIG_IGN)		(void)signal(SIGTERM, sendsig);	if (!nflag) {		pid = fork();		if (pid < 0) {			(void)fprintf(stderr,			    "rsh: fork: %s.\n", strerror(errno));			exit(1);		}	}#ifdef KERBEROS#ifdef CRYPT	if (!doencrypt)#endif#endif	{#if _MINIX		;#else		(void)ioctl(rfd2, FIONBIO, &one);		(void)ioctl(rem, FIONBIO, &one);#endif	}	talk(nflag, omask, pid, rem);	if (!nflag && pid)	{		/* printf("killing %d with %d\n", pid, SIGKILL); */		(void)kill(pid, SIGKILL);	}	exit(0);}voidtalk(nflag, omask, pid, rem)	int nflag, pid;	long omask;	register int rem;{	register int cc, wc;	register char *bp;	int readfrom, ready, rembits;	char buf[BUFSIZ];#if _MINIX	int pid1;#endif	if (!nflag && pid == 0) {		(void)close(rfd2);reread:		errno = 0;		if ((cc = read(0, buf, sizeof buf)) <= 0)			goto done;		bp = buf;rewrite:#if !_MINIX		rembits = 1 << rem;		if (select(16, 0, &rembits, 0, 0) < 0) {			if (errno != EINTR) {				(void)fprintf(stderr,				    "rsh: select: %s.\n", strerror(errno));				exit(1);			}			goto rewrite;		}		if ((rembits & (1 << rem)) == 0)			goto rewrite;#endif#ifdef KERBEROS#ifdef CRYPT		if (doencrypt)			wc = des_write(rem, bp, cc);		else#endif#endif			wc = write(rem, bp, cc);		if (wc < 0) {#if !_MINIX			if (errno == EWOULDBLOCK)				goto rewrite;#endif			goto done;		}		bp += wc;		cc -= wc;		if (cc == 0)			goto reread;		goto rewrite;done:#if _MINIX		ioctl(rem, NWIOTCPSHUTDOWN, NULL);#else		(void)shutdown(rem, 1);#endif		exit(0);	}#if _MINIX	pid1= fork();	if (pid1 == -1)	{		(void)fprintf(stderr, "rsh: fork: %s.\n", strerror(errno));		exit(1);	}	close (pid1 ? rfd2 : rem);	for(;;)	{		errno = 0;		cc = read(pid1 ? rem : rfd2, buf, sizeof buf);		if (cc <= 0)		{			if (pid1)			{				/*				printf("killing %d with %d\n", pid1, SIGKILL);				*/				kill(pid1, SIGKILL);				return;			}			exit(0);		}		(void)write(pid1 ? 1 : 2, buf, cc);	}#else	(void)sigsetmask(omask);	readfrom = (1 << rfd2) | (1 << rem);	do {		ready = readfrom;		if (select(16, &ready, 0, 0, 0) < 0) {			if (errno != EINTR) {				(void)fprintf(stderr,				    "rsh: select: %s.\n", strerror(errno));				exit(1);			}			continue;		}		if (ready & (1 << rfd2)) {			errno = 0;#ifdef KERBEROS#ifdef CRYPT			if (doencrypt)				cc = des_read(rfd2, buf, sizeof buf);			else#endif#endif				cc = read(rfd2, buf, sizeof buf);			if (cc <= 0) {				if (errno != EWOULDBLOCK)					readfrom &= ~(1 << rfd2);			} else				(void)write(2, buf, cc);		}		if (ready & (1 << rem)) {			errno = 0;#ifdef KERBEROS#ifdef CRYPT			if (doencrypt)				cc = des_read(rem, buf, sizeof buf);			else#endif#endif				cc = read(rem, buf, sizeof buf);			if (cc <= 0) {				if (errno != EWOULDBLOCK)					readfrom &= ~(1 << rem);			} else				(void)write(1, buf, cc);		}	} while (readfrom);#endif}voidsendsig(signo)	char signo;{#ifdef KERBEROS#ifdef CRYPT	if (doencrypt)		(void)des_write(rfd2, &signo, 1);	else#endif#endif		(void)write(rfd2, &signo, 1);}#ifdef KERBEROS/* VARARGS */warning(va_alist)va_dcl{	va_list ap;	char *fmt;	(void)fprintf(stderr, "rsh: warning, using standard rsh: ");	va_start(ap);	fmt = va_arg(ap, char *);	vfprintf(stderr, fmt, ap);	va_end(ap);	(void)fprintf(stderr, ".\n");}#endifchar *copyargs(argv)	char **argv;{	register int cc;	register char **ap, *p;	char *args;#if !_MINIX	char *malloc();#endif	cc = 0;	for (ap = argv; *ap; ++ap)		cc += strlen(*ap) + 1;	if (!(args = malloc((u_int)cc))) {		(void)fprintf(stderr, "rsh: %s.\n", strerror(ENOMEM));		exit(1);	}	for (p = args, ap = argv; *ap; ++ap) {		(void)strcpy(p, *ap);		for (p = strcpy(p, *ap); *p; ++p);		if (ap[1])			*p++ = ' ';	}	return(args);}voidusage(){	(void)fprintf(stderr,	    "usage: rsh [-nd%s]%s[-l login] host [command]\n",#ifdef KERBEROS#ifdef CRYPT	    "x", " [-k realm] ");#else	    "", " [-k realm] ");#endif#else	    "", " ");#endif	exit(1);}

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -