/* * CDDL HEADER START * * The contents of this file are subject to the terms of the * Common Development and Distribution License, Version 1.0 only * (the "License"). You may not use this file except in compliance * with the License. * * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE * or http://www.opensolaris.org/os/licensing. * See the License for the specific language governing permissions * and limitations under the License. * * When distributing Covered Code, include this CDDL HEADER in each * file and include the License file at usr/src/OPENSOLARIS.LICENSE. * If applicable, add the following below this CDDL HEADER, with the * fields enclosed by brackets "[]" replaced with your own identifying * information: Portions Copyright [yyyy] [name of copyright owner] * * CDDL HEADER END */ /* * Copyright 1999 Sun Microsystems, Inc. All rights reserved. * Use is subject to license terms. */ /* Copyright (c) 1983, 1984, 1985, 1986, 1987, 1988, 1989 AT&T */ /* All Rights Reserved */ /* * Portions of this source code were derived from Berkeley 4.3 BSD * under license from the Regents of the University of California. */ #pragma ident "%Z%%M% %I% %E% SMI" #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #define index(s, c) strchr(s, c) char *strchr(); char *inet_ntoa(); char myrcmd_stderr[1024]; int myrcmd(char **ahost, unsigned short rport, char *locuser, char *remuser, char *cmd) { uint_t loclen, remlen, cmdlen; int s, timo, retval; int tries = 0; pid_t pid; struct sockaddr_in sin; char c; int lport; int saverr; struct hostent *hp; sigset_t oldmask; sigset_t newmask; struct sigaction oldaction; struct sigaction newaction; static struct hostent numhp; static char numhostname[32]; /* big enough for "255.255.255.255" */ struct in_addr numaddr; struct in_addr *numaddrlist[2]; myrcmd_stderr[0] = '\0'; /* empty error string */ pid = getpid(); hp = gethostbyname(*ahost); if (hp == 0) { char *straddr; bzero((char *)numaddrlist, sizeof (numaddrlist)); if ((numaddr.s_addr = inet_addr(*ahost)) == (in_addr_t)-1) { (void) snprintf(myrcmd_stderr, sizeof (myrcmd_stderr), gettext("%s: unknown host\n"), *ahost); return (MYRCMD_NOHOST); } else { bzero((char *)&numhp, sizeof (numhp)); bzero(numhostname, sizeof (numhostname)); if ((straddr = inet_ntoa(numaddr)) == (char *)0) { (void) snprintf(myrcmd_stderr, sizeof (myrcmd_stderr), gettext("%s: unknown host\n"), *ahost); return (MYRCMD_NOHOST); } (void) strncpy(numhostname, straddr, sizeof (numhostname)); numhostname[sizeof (numhostname) - 1] = '\0'; numhp.h_name = numhostname; numhp.h_addrtype = AF_INET; numhp.h_length = sizeof (numaddr); numaddrlist[0] = &numaddr; numaddrlist[1] = NULL; numhp.h_addr_list = (char **)numaddrlist; hp = &numhp; } } *ahost = hp->h_name; /* This provides a bounds-test for the bcopy()s below. */ if ((unsigned)(hp->h_length) > sizeof (sin.sin_addr)) { (void) snprintf(myrcmd_stderr, sizeof (myrcmd_stderr), gettext("rcmd: address size: %d larger than limit %d\n"), hp->h_length, sizeof (sin.sin_addr)); return (MYRCMD_EBAD); } /* ignore SIGPIPE */ bzero((char *)&newaction, sizeof (newaction)); newaction.sa_handler = SIG_IGN; newaction.sa_flags = SA_ONSTACK; (void) sigaction(SIGPIPE, &newaction, &oldaction); /* block SIGURG */ bzero((char *)&newmask, sizeof (newmask)); (void) sigaddset(&newmask, SIGURG); (void) sigprocmask(SIG_BLOCK, &newmask, &oldmask); again: timo = 1; /* * Use 0 as lport means that rresvport() will bind to a port in * the anonymous priviledged port range. */ lport = 0; for (;;) { s = rresvport(&lport); if (s < 0) { int err; if (errno == EAGAIN) { (void) snprintf(myrcmd_stderr, sizeof (myrcmd_stderr), gettext("socket: All ports in use\n")); err = MYRCMD_ENOPORT; } else { saverr = errno; (void) snprintf(myrcmd_stderr, sizeof (myrcmd_stderr), gettext("rcmd: socket: %s\n"), strerror(saverr)); err = MYRCMD_ENOSOCK; } /* restore original SIGPIPE handler */ (void) sigaction(SIGPIPE, &oldaction, (struct sigaction *)0); /* restore original signal mask */ (void) sigprocmask(SIG_SETMASK, &oldmask, (sigset_t *)0); return (err); } /* Can't fail, according to fcntl(2) */ (void) fcntl(s, F_SETOWN, pid); sin.sin_family = hp->h_addrtype; bcopy(hp->h_addr_list[0], (caddr_t)&sin.sin_addr, hp->h_length); sin.sin_port = rport; if (connect(s, (struct sockaddr *)&sin, sizeof (sin)) >= 0) break; saverr = errno; (void) close(s); if (saverr == EADDRINUSE) { continue; } if (saverr == ECONNREFUSED && timo <= 16) { sleep(timo); timo *= 2; continue; } if (hp->h_addr_list[1] != NULL) { saverr = errno; fprintf(stderr, gettext("connect to address %s: "), inet_ntoa(sin.sin_addr)); errno = saverr; perror(0); hp->h_addr_list++; bcopy(hp->h_addr_list[0], (caddr_t)&sin.sin_addr, hp->h_length); fprintf(stderr, gettext("Trying %s...\n"), inet_ntoa(sin.sin_addr)); continue; } (void) snprintf(myrcmd_stderr, sizeof (myrcmd_stderr), "%s: %s\n", hp->h_name, strerror(saverr)); /* restore original SIGPIPE handler */ (void) sigaction(SIGPIPE, &oldaction, (struct sigaction *)0); /* restore original signal mask */ (void) sigprocmask(SIG_SETMASK, &oldmask, (sigset_t *)0); return (MYRCMD_ENOCONNECT); } if (write(s, "", 1) < 0) { (void) close(s); return (MYRCMD_ENOCONNECT); } loclen = strlen(locuser) + 1; remlen = strlen(remuser) + 1; cmdlen = strlen(cmd) + 1; if (((retval = write(s, locuser, loclen)) != loclen) || ((retval = write(s, remuser, remlen)) != remlen) || ((retval = write(s, cmd, cmdlen)) != cmdlen)) { if (retval == -1) (void) snprintf(myrcmd_stderr, sizeof (myrcmd_stderr), "write: %s\n", strerror(errno)); else (void) snprintf(myrcmd_stderr, sizeof (myrcmd_stderr), gettext("write unexpectedly truncated\n")); goto bad; } retval = read(s, &c, 1); if (retval != 1) { if (retval == 0) { /* * Solaris 2.0 bug alert. Sometimes, if the * tapehost is a Solaris 2.0 system, the connection * will be dropped at this point. Let's try again, * three times, before we throw in the towel. */ if (++tries < 3) { (void) close(s); goto again; } (void) snprintf(myrcmd_stderr, sizeof (myrcmd_stderr), gettext("Protocol error, %s closed connection\n"), *ahost); } else if (retval < 0) { (void) snprintf(myrcmd_stderr, sizeof (myrcmd_stderr), "%s: %s\n", *ahost, strerror(errno)); } else { (void) snprintf(myrcmd_stderr, sizeof (myrcmd_stderr), gettext("Protocol error, %s sent %d bytes\n"), *ahost, retval); } goto bad; } if (c != 0) { char *cp = myrcmd_stderr; char *ecp = &myrcmd_stderr[sizeof (myrcmd_stderr) - 1]; while (read(s, &c, 1) == 1) { *cp++ = c; if (c == '\n' || cp >= ecp) break; } *cp = '\0'; goto bad; } /* restore original SIGPIPE handler */ (void) sigaction(SIGPIPE, &oldaction, (struct sigaction *)0); /* restore original signal mask */ (void) sigprocmask(SIG_SETMASK, &oldmask, (sigset_t *)0); return (s); bad: (void) close(s); /* restore original SIGPIPE handler */ (void) sigaction(SIGPIPE, &oldaction, (struct sigaction *)0); /* restore original signal mask */ (void) sigprocmask(SIG_SETMASK, &oldmask, (sigset_t *)0); return (MYRCMD_EBAD); }