blob: 51bd0c012fd5b5d620c6a97f9444690a0eab8b47 [file] [log] [blame]
Bernhard Reutner-Fischer2c998512006-04-12 18:09:26 +00001/* vi: set sw=4 ts=4: */
Bernhard Reutner-Fischerdac7ff12006-04-12 17:55:51 +00002/*
Eric Andersen08a72202002-09-30 20:52:10 +00003 * Simple telnet server
4 * Bjorn Wesen, Axis Communications AB (bjornw@axis.com)
5 *
Rob Landley1ec5b292006-05-29 07:42:02 +00006 * Licensed under GPLv2 or later, see file LICENSE in this tarball for details.
Eric Andersen08a72202002-09-30 20:52:10 +00007 *
8 * ---------------------------------------------------------------------------
9 * (C) Copyright 2000, Axis Communications AB, LUND, SWEDEN
10 ****************************************************************************
11 *
12 * The telnetd manpage says it all:
13 *
14 * Telnetd operates by allocating a pseudo-terminal device (see pty(4)) for
15 * a client, then creating a login process which has the slave side of the
16 * pseudo-terminal as stdin, stdout, and stderr. Telnetd manipulates the
17 * master side of the pseudo-terminal, implementing the telnet protocol and
18 * passing characters between the remote client and the login process.
19 *
20 * Vladimir Oleynik <dzo@simtreas.ru> 2001
21 * Set process group corrections, initial busybox port
22 */
23
24/*#define DEBUG 1 */
Denis Vlasenko75f8d082006-11-22 15:54:52 +000025#define DEBUG 0
Eric Andersen08a72202002-09-30 20:52:10 +000026
Rob Landley099ed502006-08-28 09:41:49 +000027#include "busybox.h"
28
Denis Vlasenko75f8d082006-11-22 15:54:52 +000029#if DEBUG
Eric Andersen08a72202002-09-30 20:52:10 +000030#define TELCMDS
31#define TELOPTS
32#endif
33#include <arpa/telnet.h>
Eric Andersen08a72202002-09-30 20:52:10 +000034#include <sys/syslog.h>
35
Eric Andersen08a72202002-09-30 20:52:10 +000036
37#define BUFSIZE 4000
38
Denis Vlasenko75f8d082006-11-22 15:54:52 +000039#if ENABLE_LOGIN
Glenn L McGrathd4004ee2004-09-14 17:24:59 +000040static const char *loginpath = "/bin/login";
Glenn L McGrath9e5d6c02003-01-21 20:55:56 +000041#else
Denis Vlasenko75f8d082006-11-22 15:54:52 +000042static const char *loginpath = DEFAULT_SHELL;
Glenn L McGrath9e5d6c02003-01-21 20:55:56 +000043#endif
Denis Vlasenko75f8d082006-11-22 15:54:52 +000044
Glenn L McGrath9e5d6c02003-01-21 20:55:56 +000045static const char *issuefile = "/etc/issue.net";
Eric Andersen08a72202002-09-30 20:52:10 +000046
47/* shell name and arguments */
48
Denis Vlasenko75f8d082006-11-22 15:54:52 +000049static const char *argv_init[2];
Eric Andersen08a72202002-09-30 20:52:10 +000050
51/* structure that describes a session */
52
53struct tsession {
54 struct tsession *next;
Denis Vlasenko75f8d082006-11-22 15:54:52 +000055 int sockfd_read, sockfd_write, ptyfd;
Eric Andersen08a72202002-09-30 20:52:10 +000056 int shell_pid;
57 /* two circular buffers */
58 char *buf1, *buf2;
59 int rdidx1, wridx1, size1;
60 int rdidx2, wridx2, size2;
61};
62
63/*
Eric Andersen08a72202002-09-30 20:52:10 +000064 This is how the buffers are used. The arrows indicate the movement
65 of data.
66
67 +-------+ wridx1++ +------+ rdidx1++ +----------+
68 | | <-------------- | buf1 | <-------------- | |
69 | | size1-- +------+ size1++ | |
Mike Frysingerd2c8fd62006-05-10 17:17:09 +000070 | pty | | socket |
Eric Andersen08a72202002-09-30 20:52:10 +000071 | | rdidx2++ +------+ wridx2++ | |
72 | | --------------> | buf2 | --------------> | |
73 +-------+ size2++ +------+ size2-- +----------+
74
75 Each session has got two buffers.
Eric Andersen08a72202002-09-30 20:52:10 +000076*/
77
78static int maxfd;
79
80static struct tsession *sessions;
81
82
83/*
Bernhard Reutner-Fischere0387a62006-06-07 13:31:59 +000084 Remove all IAC's from the buffer pointed to by bf (received IACs are ignored
Eric Andersen08a72202002-09-30 20:52:10 +000085 and must be removed so as to not be interpreted by the terminal). Make an
86 uninterrupted string of characters fit for the terminal. Do this by packing
87 all characters meant for the terminal sequentially towards the end of bf.
88
89 Return a pointer to the beginning of the characters meant for the terminal.
90 and make *num_totty the number of characters that should be sent to
91 the terminal.
92
93 Note - If an IAC (3 byte quantity) starts before (bf + len) but extends
94 past (bf + len) then that IAC will be left unprocessed and *processed will be
95 less than len.
96
97 FIXME - if we mean to send 0xFF to the terminal then it will be escaped,
98 what is the escape character? We aren't handling that situation here.
99
Eric Andersen3752d332003-12-19 11:30:13 +0000100 CR-LF ->'s CR mapping is also done here, for convenience
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000101 */
Eric Andersen08a72202002-09-30 20:52:10 +0000102static char *
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000103remove_iacs(struct tsession *ts, int *pnum_totty)
104{
Eric Andersen0cb6f352006-01-30 22:30:41 +0000105 unsigned char *ptr0 = (unsigned char *)ts->buf1 + ts->wridx1;
Eric Andersen08a72202002-09-30 20:52:10 +0000106 unsigned char *ptr = ptr0;
107 unsigned char *totty = ptr;
108 unsigned char *end = ptr + MIN(BUFSIZE - ts->wridx1, ts->size1);
109 int processed;
110 int num_totty;
111
112 while (ptr < end) {
113 if (*ptr != IAC) {
Eric Andersen3752d332003-12-19 11:30:13 +0000114 int c = *ptr;
Eric Andersen08a72202002-09-30 20:52:10 +0000115 *totty++ = *ptr++;
Eric Andersen3752d332003-12-19 11:30:13 +0000116 /* We now map \r\n ==> \r for pragmatic reasons.
117 * Many client implementations send \r\n when
118 * the user hits the CarriageReturn key.
119 */
120 if (c == '\r' && (*ptr == '\n' || *ptr == 0) && ptr < end)
121 ptr++;
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000122 } else {
Glenn L McGrath90ed9a02004-02-22 09:45:57 +0000123 /*
124 * TELOPT_NAWS support!
125 */
126 if ((ptr+2) >= end) {
Eric Andersen08a72202002-09-30 20:52:10 +0000127 /* only the beginning of the IAC is in the
128 buffer we were asked to process, we can't
129 process this char. */
130 break;
131 }
Glenn L McGrath90ed9a02004-02-22 09:45:57 +0000132
133 /*
134 * IAC -> SB -> TELOPT_NAWS -> 4-byte -> IAC -> SE
135 */
136 else if (ptr[1] == SB && ptr[2] == TELOPT_NAWS) {
137 struct winsize ws;
138 if ((ptr+8) >= end)
Tim Rikerc1ef7bd2006-01-25 00:08:53 +0000139 break; /* incomplete, can't process */
Glenn L McGrath90ed9a02004-02-22 09:45:57 +0000140 ws.ws_col = (ptr[3] << 8) | ptr[4];
141 ws.ws_row = (ptr[5] << 8) | ptr[6];
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000142 ioctl(ts->ptyfd, TIOCSWINSZ, (char *)&ws);
Glenn L McGrath90ed9a02004-02-22 09:45:57 +0000143 ptr += 9;
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000144 } else {
Glenn L McGrath90ed9a02004-02-22 09:45:57 +0000145 /* skip 3-byte IAC non-SB cmd */
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000146#if DEBUG
Glenn L McGrath90ed9a02004-02-22 09:45:57 +0000147 fprintf(stderr, "Ignoring IAC %s,%s\n",
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000148 TELCMD(ptr[1]), TELOPT(ptr[2]));
Glenn L McGrath90ed9a02004-02-22 09:45:57 +0000149#endif
150 ptr += 3;
151 }
Eric Andersen08a72202002-09-30 20:52:10 +0000152 }
153 }
154
155 processed = ptr - ptr0;
156 num_totty = totty - ptr0;
157 /* the difference between processed and num_to tty
158 is all the iacs we removed from the stream.
159 Adjust buf1 accordingly. */
160 ts->wridx1 += processed - num_totty;
161 ts->size1 -= processed - num_totty;
162 *pnum_totty = num_totty;
163 /* move the chars meant for the terminal towards the end of the
164 buffer. */
165 return memmove(ptr - num_totty, ptr0, num_totty);
166}
167
168
169static int
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000170getpty(char *line, int size)
Eric Andersen08a72202002-09-30 20:52:10 +0000171{
172 int p;
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000173#if ENABLE_FEATURE_DEVPTS
Denis Vlasenkoc6ec8c92006-10-15 18:22:05 +0000174 p = open("/dev/ptmx", O_RDWR);
Eric Andersen08a72202002-09-30 20:52:10 +0000175 if (p > 0) {
Denis Vlasenkoc6ec8c92006-10-15 18:22:05 +0000176 const char *name;
Eric Andersen08a72202002-09-30 20:52:10 +0000177 grantpt(p);
178 unlockpt(p);
Denis Vlasenkoc6ec8c92006-10-15 18:22:05 +0000179 name = ptsname(p);
180 if (!name) {
181 bb_perror_msg("ptsname error (is /dev/pts mounted?)");
182 return -1;
183 }
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000184 safe_strncpy(line, name, size);
Denis Vlasenkoc6ec8c92006-10-15 18:22:05 +0000185 return p;
Eric Andersen08a72202002-09-30 20:52:10 +0000186 }
187#else
188 struct stat stb;
189 int i;
190 int j;
191
192 strcpy(line, "/dev/ptyXX");
193
194 for (i = 0; i < 16; i++) {
195 line[8] = "pqrstuvwxyzabcde"[i];
196 line[9] = '0';
197 if (stat(line, &stb) < 0) {
198 continue;
199 }
200 for (j = 0; j < 16; j++) {
201 line[9] = j < 10 ? j + '0' : j - 10 + 'a';
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000202 if (DEBUG)
203 fprintf(stderr, "Trying to open device: %s\n", line);
Denis Vlasenkoc6ec8c92006-10-15 18:22:05 +0000204 p = open(line, O_RDWR | O_NOCTTY);
205 if (p >= 0) {
Eric Andersen08a72202002-09-30 20:52:10 +0000206 line[5] = 't';
207 return p;
208 }
209 }
210 }
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000211#endif /* FEATURE_DEVPTS */
Eric Andersen08a72202002-09-30 20:52:10 +0000212 return -1;
213}
214
215
216static void
217send_iac(struct tsession *ts, unsigned char command, int option)
218{
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000219 /* We rely on that there is space in the buffer for now. */
Eric Andersen08a72202002-09-30 20:52:10 +0000220 char *b = ts->buf2 + ts->rdidx2;
221 *b++ = IAC;
222 *b++ = command;
223 *b++ = option;
224 ts->rdidx2 += 3;
225 ts->size2 += 3;
226}
227
228
229static struct tsession *
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000230make_new_session(
231 USE_FEATURE_TELNETD_STANDALONE(int sock_r, int sock_w)
232 SKIP_FEATURE_TELNETD_STANDALONE(void)
233) {
Eric Andersen08a72202002-09-30 20:52:10 +0000234 struct termios termbuf;
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000235 int fd, pid;
Eric Andersen08a72202002-09-30 20:52:10 +0000236 char tty_name[32];
Rob Landley1ec5b292006-05-29 07:42:02 +0000237 struct tsession *ts = xzalloc(sizeof(struct tsession) + BUFSIZE * 2);
Eric Andersen08a72202002-09-30 20:52:10 +0000238
239 ts->buf1 = (char *)(&ts[1]);
240 ts->buf2 = ts->buf1 + BUFSIZE;
241
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000242 /* Got a new connection, set up a tty. */
243 fd = getpty(tty_name, 32);
244 if (fd < 0) {
Denis Vlasenko3538b9a2006-09-06 18:36:50 +0000245 bb_error_msg("all terminals in use");
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000246 return NULL;
Eric Andersen08a72202002-09-30 20:52:10 +0000247 }
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000248 if (fd > maxfd) maxfd = fd;
249 ndelay_on(ts->ptyfd = fd);
250#if ENABLE_FEATURE_TELNETD_STANDALONE
251 if (sock_w > maxfd) maxfd = sock_w;
252 if (sock_r > maxfd) maxfd = sock_r;
253 ndelay_on(ts->sockfd_write = sock_w);
254 ndelay_on(ts->sockfd_read = sock_r);
255#else
256 ts->sockfd_write = 1;
257 /* xzalloc: ts->sockfd_read = 0; */
258 ndelay_on(0);
259 ndelay_on(1);
260#endif
Eric Andersen08a72202002-09-30 20:52:10 +0000261 /* Make the telnet client understand we will echo characters so it
262 * should not do it locally. We don't tell the client to run linemode,
263 * because we want to handle line editing and tab completion and other
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000264 * stuff that requires char-by-char support. */
Eric Andersen08a72202002-09-30 20:52:10 +0000265 send_iac(ts, DO, TELOPT_ECHO);
Glenn L McGrath90ed9a02004-02-22 09:45:57 +0000266 send_iac(ts, DO, TELOPT_NAWS);
Eric Andersen08a72202002-09-30 20:52:10 +0000267 send_iac(ts, DO, TELOPT_LFLOW);
268 send_iac(ts, WILL, TELOPT_ECHO);
269 send_iac(ts, WILL, TELOPT_SGA);
270
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000271 pid = fork();
272 if (pid < 0) {
273 free(ts);
274 close(fd);
Denis Vlasenko3538b9a2006-09-06 18:36:50 +0000275 bb_perror_msg("fork");
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000276 return NULL;
Eric Andersen08a72202002-09-30 20:52:10 +0000277 }
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000278 if (pid > 0) {
279 /* parent */
280 ts->shell_pid = pid;
281 return ts;
Eric Andersen08a72202002-09-30 20:52:10 +0000282 }
Denis Vlasenkof7996f32007-01-11 17:20:00 +0000283
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000284 /* child */
Eric Andersen08a72202002-09-30 20:52:10 +0000285
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000286 /* open the child's side of the tty. */
287 fd = xopen(tty_name, O_RDWR /*| O_NOCTTY*/);
288 dup2(fd, 0);
289 dup2(fd, 1);
290 dup2(fd, 2);
291 while (fd > 2) close(fd--);
292 /* make new process group */
293 setsid();
294 tcsetpgrp(0, getpid());
Eric Andersen08a72202002-09-30 20:52:10 +0000295
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000296 /* The pseudo-terminal allocated to the client is configured to operate in
297 * cooked mode, and with XTABS CRMOD enabled (see tty(4)). */
298 tcgetattr(0, &termbuf);
299 termbuf.c_lflag |= ECHO; /* if we use readline we dont want this */
300 termbuf.c_oflag |= ONLCR|XTABS;
301 termbuf.c_iflag |= ICRNL;
302 termbuf.c_iflag &= ~IXOFF;
303 /*termbuf.c_lflag &= ~ICANON;*/
304 tcsetattr(0, TCSANOW, &termbuf);
305
306 print_login_issue(issuefile, NULL);
307
308 /* exec shell, with correct argv and env */
309 execv(loginpath, (char *const *)argv_init);
310 bb_perror_msg_and_die("execv");
Eric Andersen08a72202002-09-30 20:52:10 +0000311}
312
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000313#if ENABLE_FEATURE_TELNETD_STANDALONE
314
Eric Andersen08a72202002-09-30 20:52:10 +0000315static void
316free_session(struct tsession *ts)
317{
318 struct tsession *t = sessions;
319
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000320 /* unlink this telnet session from the session list */
Mike Frysinger731f81c2006-05-10 15:23:12 +0000321 if (t == ts)
Eric Andersen08a72202002-09-30 20:52:10 +0000322 sessions = ts->next;
323 else {
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000324 while (t->next != ts)
Eric Andersen08a72202002-09-30 20:52:10 +0000325 t = t->next;
326 t->next = ts->next;
327 }
328
329 kill(ts->shell_pid, SIGKILL);
Eric Andersen08a72202002-09-30 20:52:10 +0000330 wait4(ts->shell_pid, NULL, 0, NULL);
Eric Andersen08a72202002-09-30 20:52:10 +0000331 close(ts->ptyfd);
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000332 close(ts->sockfd_read);
333 /* error if ts->sockfd_read == ts->sockfd_write. So what? ;) */
334 close(ts->sockfd_write);
Eric Andersen08a72202002-09-30 20:52:10 +0000335 free(ts);
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000336
337 /* scan all sessions and find new maxfd */
Denis Vlasenko150f4022007-01-13 21:06:21 +0000338 ts = sessions;
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000339 maxfd = 0;
340 while (ts) {
341 if (maxfd < ts->ptyfd)
342 maxfd = ts->ptyfd;
343 if (maxfd < ts->sockfd_read)
344 maxfd = ts->sockfd_read;
345 if (maxfd < ts->sockfd_write)
346 maxfd = ts->sockfd_write;
347 ts = ts->next;
348 }
Eric Andersen08a72202002-09-30 20:52:10 +0000349}
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000350
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000351#else /* !FEATURE_TELNETD_STANDALONE */
352
353/* Never actually called */
354void free_session(struct tsession *ts);
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000355
356#endif
357
Eric Andersen08a72202002-09-30 20:52:10 +0000358
359int
360telnetd_main(int argc, char **argv)
361{
Eric Andersen08a72202002-09-30 20:52:10 +0000362 fd_set rdfdset, wrfdset;
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000363 unsigned opt;
364 int selret, maxlen, w, r;
365 struct tsession *ts;
366#if ENABLE_FEATURE_TELNETD_STANDALONE
367#define IS_INETD (opt & OPT_INETD)
368 int master_fd = -1; /* be happy, gcc */
Denis Vlasenko13858992006-10-08 12:49:22 +0000369 unsigned portnbr = 23;
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000370 char *opt_bindaddr = NULL;
371 char *opt_portnbr;
372#else
373 enum {
374 IS_INETD = 1,
375 master_fd = -1,
376 portnbr = 23,
377 };
Glenn L McGrathc2b91862003-09-12 11:27:15 +0000378#endif
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000379 enum {
380 OPT_PORT = 4 * ENABLE_FEATURE_TELNETD_STANDALONE,
381 OPT_FOREGROUND = 0x10 * ENABLE_FEATURE_TELNETD_STANDALONE,
382 OPT_INETD = 0x20 * ENABLE_FEATURE_TELNETD_STANDALONE,
383 };
Glenn L McGrathc2b91862003-09-12 11:27:15 +0000384
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000385 opt = getopt32(argc, argv, "f:l:" USE_FEATURE_TELNETD_STANDALONE("p:b:Fi"),
Denis Vlasenko0e87d342006-09-22 08:50:29 +0000386 &issuefile, &loginpath
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000387 USE_FEATURE_TELNETD_STANDALONE(, &opt_portnbr, &opt_bindaddr));
388 /* Redirect log to syslog early, if needed */
389 if (IS_INETD || !(opt & OPT_FOREGROUND)) {
390 openlog(applet_name, 0, LOG_USER);
391 logmode = LOGMODE_SYSLOG;
392 }
Denis Vlasenko0e87d342006-09-22 08:50:29 +0000393 //if (opt & 1) // -f
394 //if (opt & 2) // -l
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000395 USE_FEATURE_TELNETD_STANDALONE(
396 if (opt & OPT_PORT) // -p
397 portnbr = xatou16(opt_portnbr);
398 //if (opt & 8) // -b
399 //if (opt & 0x10) // -F
400 //if (opt & 0x20) // -i
401 );
Eric Andersen08a72202002-09-30 20:52:10 +0000402
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000403 /* Used to check access(loginpath, X_OK) here. Pointless.
404 * exec will do this for us for free later. */
Eric Andersen08a72202002-09-30 20:52:10 +0000405 argv_init[0] = loginpath;
Glenn L McGrath9e5d6c02003-01-21 20:55:56 +0000406
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000407#if ENABLE_FEATURE_TELNETD_STANDALONE
408 if (IS_INETD) {
409 sessions = make_new_session(0, 1);
410 } else {
Denis Vlasenko9de420c2007-01-10 09:28:01 +0000411 master_fd = create_and_bind_stream_or_die(opt_bindaddr, portnbr);
Denis Vlasenkoc8717cd2006-11-22 16:10:39 +0000412 xlisten(master_fd, 1);
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000413 if (!(opt & OPT_FOREGROUND))
414 xdaemon(0, 0);
415 }
Rob Landley00e76cb2005-05-10 23:53:33 +0000416#else
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000417 sessions = make_new_session();
Rob Landley00e76cb2005-05-10 23:53:33 +0000418#endif
Eric Andersen08a72202002-09-30 20:52:10 +0000419
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000420 /* We don't want to die if just one session is broken */
421 signal(SIGPIPE, SIG_IGN);
Eric Andersen08a72202002-09-30 20:52:10 +0000422
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000423 again:
424 FD_ZERO(&rdfdset);
425 FD_ZERO(&wrfdset);
426 if (!IS_INETD) {
Eric Andersen08a72202002-09-30 20:52:10 +0000427 FD_SET(master_fd, &rdfdset);
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000428 /* This is needed because free_session() does not
429 * take into account master_fd when it finds new
430 * maxfd among remaining fd's: */
431 if (master_fd > maxfd)
432 maxfd = master_fd;
433 }
Eric Andersen08a72202002-09-30 20:52:10 +0000434
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000435 /* select on the master socket, all telnet sockets and their
436 * ptys if there is room in their session buffers. */
437 ts = sessions;
438 while (ts) {
439 /* buf1 is used from socket to pty
440 * buf2 is used from pty to socket */
441 if (ts->size1 > 0) /* can write to pty */
442 FD_SET(ts->ptyfd, &wrfdset);
443 if (ts->size1 < BUFSIZE) /* can read from socket */
444 FD_SET(ts->sockfd_read, &rdfdset);
445 if (ts->size2 > 0) /* can write to socket */
446 FD_SET(ts->sockfd_write, &wrfdset);
447 if (ts->size2 < BUFSIZE) /* can read from pty */
448 FD_SET(ts->ptyfd, &rdfdset);
449 ts = ts->next;
450 }
451
452 selret = select(maxfd + 1, &rdfdset, &wrfdset, 0, 0);
453 if (!selret)
454 return 0;
455
456#if ENABLE_FEATURE_TELNETD_STANDALONE
457 /* First check for and accept new sessions. */
458 if (!IS_INETD && FD_ISSET(master_fd, &rdfdset)) {
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000459 int fd;
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000460 struct tsession *new_ts;
461
Denis Vlasenko2c916522007-01-12 14:57:37 +0000462 fd = accept(master_fd, NULL, 0);
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000463 if (fd < 0)
464 goto again;
465 /* Create a new session and link it into our active list */
466 new_ts = make_new_session(fd, fd);
467 if (new_ts) {
468 new_ts->next = sessions;
469 sessions = new_ts;
470 } else {
471 close(fd);
Eric Andersen08a72202002-09-30 20:52:10 +0000472 }
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000473 }
474#endif
Eric Andersen08a72202002-09-30 20:52:10 +0000475
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000476 /* Then check for data tunneling. */
477 ts = sessions;
478 while (ts) { /* For all sessions... */
479 struct tsession *next = ts->next; /* in case we free ts. */
Eric Andersen08a72202002-09-30 20:52:10 +0000480
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000481 if (ts->size1 && FD_ISSET(ts->ptyfd, &wrfdset)) {
482 int num_totty;
483 char *ptr;
484 /* Write to pty from buffer 1. */
485 ptr = remove_iacs(ts, &num_totty);
486 w = safe_write(ts->ptyfd, ptr, num_totty);
487 /* needed? if (w < 0 && errno == EAGAIN) continue; */
488 if (w < 0) {
489 if (IS_INETD)
490 return 0;
491 free_session(ts);
492 ts = next;
Eric Andersen08a72202002-09-30 20:52:10 +0000493 continue;
Eric Andersen08a72202002-09-30 20:52:10 +0000494 }
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000495 ts->wridx1 += w;
496 ts->size1 -= w;
497 if (ts->wridx1 == BUFSIZE)
Eric Andersen08a72202002-09-30 20:52:10 +0000498 ts->wridx1 = 0;
Eric Andersen08a72202002-09-30 20:52:10 +0000499 }
Eric Andersen08a72202002-09-30 20:52:10 +0000500
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000501 if (ts->size2 && FD_ISSET(ts->sockfd_write, &wrfdset)) {
502 /* Write to socket from buffer 2. */
503 maxlen = MIN(BUFSIZE - ts->wridx2, ts->size2);
504 w = safe_write(ts->sockfd_write, ts->buf2 + ts->wridx2, maxlen);
505 /* needed? if (w < 0 && errno == EAGAIN) continue; */
506 if (w < 0) {
507 if (IS_INETD)
508 return 0;
509 free_session(ts);
510 ts = next;
511 continue;
512 }
513 ts->wridx2 += w;
514 ts->size2 -= w;
515 if (ts->wridx2 == BUFSIZE)
516 ts->wridx2 = 0;
517 }
Eric Andersen08a72202002-09-30 20:52:10 +0000518
Denis Vlasenko75f8d082006-11-22 15:54:52 +0000519 if (ts->size1 < BUFSIZE && FD_ISSET(ts->sockfd_read, &rdfdset)) {
520 /* Read from socket to buffer 1. */
521 maxlen = MIN(BUFSIZE - ts->rdidx1, BUFSIZE - ts->size1);
522 r = safe_read(ts->sockfd_read, ts->buf1 + ts->rdidx1, maxlen);
523 if (r < 0 && errno == EAGAIN) continue;
524 if (r <= 0) {
525 if (IS_INETD)
526 return 0;
527 free_session(ts);
528 ts = next;
529 continue;
530 }
531 if (!ts->buf1[ts->rdidx1 + r - 1])
532 if (!--r)
533 continue;
534 ts->rdidx1 += r;
535 ts->size1 += r;
536 if (ts->rdidx1 == BUFSIZE)
537 ts->rdidx1 = 0;
538 }
539
540 if (ts->size2 < BUFSIZE && FD_ISSET(ts->ptyfd, &rdfdset)) {
541 /* Read from pty to buffer 2. */
542 maxlen = MIN(BUFSIZE - ts->rdidx2, BUFSIZE - ts->size2);
543 r = safe_read(ts->ptyfd, ts->buf2 + ts->rdidx2, maxlen);
544 if (r < 0 && errno == EAGAIN) continue;
545 if (r <= 0) {
546 if (IS_INETD)
547 return 0;
548 free_session(ts);
549 ts = next;
550 continue;
551 }
552 ts->rdidx2 += r;
553 ts->size2 += r;
554 if (ts->rdidx2 == BUFSIZE)
555 ts->rdidx2 = 0;
556 }
557
558 if (ts->size1 == 0) {
559 ts->rdidx1 = 0;
560 ts->wridx1 = 0;
561 }
562 if (ts->size2 == 0) {
563 ts->rdidx2 = 0;
564 ts->wridx2 = 0;
565 }
566 ts = next;
567 }
568 goto again;
Eric Andersen08a72202002-09-30 20:52:10 +0000569}