xref: /freebsd/crypto/heimdal/appl/telnet/telnet/main.c (revision 2f1217877e155a8a7de97e74eb7e82096a5ef316)
1 /*
2  * Copyright (c) 1988, 1990, 1993
3  *	The Regents of the University of California.  All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  * 1. Redistributions of source code must retain the above copyright
9  *    notice, this list of conditions and the following disclaimer.
10  * 2. Redistributions in binary form must reproduce the above copyright
11  *    notice, this list of conditions and the following disclaimer in the
12  *    documentation and/or other materials provided with the distribution.
13  * 3. All advertising materials mentioning features or use of this software
14  *    must display the following acknowledgement:
15  *	This product includes software developed by the University of
16  *	California, Berkeley and its contributors.
17  * 4. Neither the name of the University nor the names of its contributors
18  *    may be used to endorse or promote products derived from this software
19  *    without specific prior written permission.
20  *
21  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31  * SUCH DAMAGE.
32  */
33 
34 static char *copyright[] = {
35     "@(#) Copyright (c) 1988, 1990, 1993\n"
36     "\tThe Regents of the University of California.  All rights reserved.\n",
37     (char*)copyright
38 };
39 
40 #include "telnet_locl.h"
41 RCSID("$Id$");
42 
43 #if KRB5
44 #define FORWARD
45 #endif
46 
47 /*
48  * Initialize variables.
49  */
50 void
51 tninit(void)
52 {
53     init_terminal();
54 
55     init_network();
56 
57     init_telnet();
58 
59     init_sys();
60 }
61 
62 static void
63 usage(int exit_code)
64 {
65   fprintf(stderr, "Usage: %s %s%s%s%s\n", prompt,
66 #ifdef	AUTHENTICATION
67 	  "[-8] [-E] [-K] [-L] [-G] [-S tos] [-X atype] [-a] [-c] [-d] [-e char]",
68 	  "\n\t[-k realm] [-l user] [-f/-F] [-n tracefile] ",
69 #else
70 	  "[-8] [-E] [-L] [-S tos] [-a] [-c] [-d] [-e char] [-l user]",
71 	  "\n\t[-n tracefile]",
72 #endif
73 	  "[-r] ",
74 #ifdef	ENCRYPTION
75 	  "[-x] [host-name [port]]"
76 #else
77 	  "[host-name [port]]"
78 #endif
79     );
80   exit(exit_code);
81 }
82 
83 /*
84  * main.  Parse arguments, invoke the protocol or command parser.
85  */
86 
87 
88 #ifdef	FORWARD
89 int forward_option = 0; /* forward flags set from command line */
90 #endif	/* FORWARD */
91 void
92 set_forward_options(void)
93 {
94 #ifdef FORWARD
95 	switch(forward_option) {
96 	case 'f':
97 		kerberos5_set_forward(1);
98 		kerberos5_set_forwardable(0);
99 		break;
100 	case 'F':
101 		kerberos5_set_forward(1);
102 		kerberos5_set_forwardable(1);
103 		break;
104 	case 'G':
105 		kerberos5_set_forward(0);
106 		kerberos5_set_forwardable(0);
107 		break;
108 	default:
109 		break;
110 	}
111 #endif
112 }
113 
114 #ifdef KRB5
115 #define Authenticator asn1_Authenticator
116 #include <krb5.h>
117 static void
118 krb5_init(void)
119 {
120     krb5_context context;
121     krb5_error_code ret;
122     krb5_boolean ret_val;
123 
124     ret = krb5_init_context(&context);
125     if (ret)
126 	return;
127 
128 #if defined(AUTHENTICATION) && defined(FORWARD)
129     krb5_appdefault_boolean(context, NULL,
130 			    NULL, "forward",
131 			    0, &ret_val);
132     if (ret_val)
133 	    kerberos5_set_forward(1);
134     krb5_appdefault_boolean(context, NULL,
135 			    NULL, "forwardable",
136 			    0, &ret_val);
137     if (ret_val)
138 	    kerberos5_set_forwardable(1);
139 #endif
140 #ifdef  ENCRYPTION
141     krb5_appdefault_boolean(context, NULL,
142 			    NULL, "encrypt",
143 			    0, &ret_val);
144     if (ret_val) {
145           encrypt_auto(1);
146           decrypt_auto(1);
147 	  wantencryption = 1;
148           EncryptVerbose(1);
149         }
150 #endif
151 
152     krb5_free_context(context);
153 }
154 #endif
155 
156 int
157 main(int argc, char **argv)
158 {
159 	int ch;
160 	char *user;
161 
162 	setprogname(argv[0]);
163 
164 #ifdef KRB5
165 	krb5_init();
166 #endif
167 
168 	tninit();		/* Clear out things */
169 
170 	TerminalSaveState();
171 
172 	if ((prompt = strrchr(argv[0], '/')))
173 		++prompt;
174 	else
175 		prompt = argv[0];
176 
177 	user = NULL;
178 
179 	rlogin = (strncmp(prompt, "rlog", 4) == 0) ? '~' : _POSIX_VDISABLE;
180 
181 	/*
182 	 * if AUTHENTICATION and ENCRYPTION is set autologin will be
183 	 * se to true after the getopt switch; unless the -K option is
184 	 * passed
185 	 */
186 	autologin = -1;
187 
188 	if (argc == 2 && strcmp(argv[1], "--version") == 0) {
189 	    print_version(NULL);
190 	    exit(0);
191 	}
192 	if (argc == 2 && strcmp(argv[1], "--help") == 0)
193 	    usage(0);
194 
195 
196 	while((ch = getopt(argc, argv,
197 			   "78DEKLS:X:abcde:fFk:l:n:rxG")) != -1) {
198 		switch(ch) {
199 		case '8':
200 			eight = 3;	/* binary output and input */
201 			break;
202 		case '7':
203 			eight = 0;
204 			break;
205 		case 'b':
206 		    binary = 3;
207 		    break;
208 		case 'D': {
209 		    /* sometimes we don't want a mangled display */
210 		    char *p;
211 		    if((p = getenv("DISPLAY")))
212 			env_define((unsigned char*)"DISPLAY", (unsigned char*)p);
213 		    break;
214 		}
215 		case 'E':
216 			rlogin = escape = _POSIX_VDISABLE;
217 			break;
218 		case 'K':
219 #ifdef	AUTHENTICATION
220 			autologin = 0;
221 #endif
222 			break;
223 		case 'L':
224 			eight |= 2;	/* binary output only */
225 			break;
226 		case 'S':
227 		    {
228 #ifdef	HAVE_PARSETOS
229 			extern int tos;
230 
231 			if ((tos = parsetos(optarg, "tcp")) < 0)
232 				fprintf(stderr, "%s%s%s%s\n",
233 					prompt, ": Bad TOS argument '",
234 					optarg,
235 					"; will try to use default TOS");
236 #else
237 			fprintf(stderr,
238 			   "%s: Warning: -S ignored, no parsetos() support.\n",
239 								prompt);
240 #endif
241 		    }
242 			break;
243 		case 'X':
244 #ifdef	AUTHENTICATION
245 			auth_disable_name(optarg);
246 #endif
247 			break;
248 		case 'a':
249 			autologin = 1;
250 			break;
251 		case 'c':
252 			skiprc = 1;
253 			break;
254 		case 'd':
255 			debug = 1;
256 			break;
257 		case 'e':
258 			set_escape_char(optarg);
259 			break;
260 		case 'f':
261 		case 'F':
262 		case 'G':
263 #if defined(AUTHENTICATION) && defined(KRB5) && defined(FORWARD)
264 			if (forward_option) {
265 			    fprintf(stderr,
266 				    "%s: Only one of -f, -F and -G allowed.\n",
267 				    prompt);
268 			    usage(1);
269 			}
270 			forward_option = ch;
271 #else
272 			fprintf(stderr,
273 			 "%s: Warning: -%c ignored, no Kerberos V5 support.\n",
274 				prompt, ch);
275 #endif
276 			break;
277 		case 'k':
278 		    fprintf(stderr,
279 			    "%s: Warning: -k ignored, no Kerberos V4 support.\n",
280 			    prompt);
281 		    break;
282 		case 'l':
283 		  if(autologin == 0){
284 		    fprintf(stderr, "%s: Warning: -K ignored\n", prompt);
285 		    autologin = -1;
286 		  }
287 			user = optarg;
288 			break;
289 		case 'n':
290 				SetNetTrace(optarg);
291 			break;
292 		case 'r':
293 			rlogin = '~';
294 			break;
295 		case 'x':
296 #ifdef	ENCRYPTION
297 			encrypt_auto(1);
298 			decrypt_auto(1);
299 			wantencryption = 1;
300 			EncryptVerbose(1);
301 #else
302 			fprintf(stderr,
303 			    "%s: Warning: -x ignored, no ENCRYPT support.\n",
304 								prompt);
305 #endif
306 			break;
307 
308 		case '?':
309 		default:
310 			usage(1);
311 			/* NOTREACHED */
312 		}
313 	}
314 
315 	if (autologin == -1) {		/* esc@magic.fi; force  */
316 #if defined(AUTHENTICATION)
317 		autologin = 1;
318 #endif
319 #if defined(ENCRYPTION)
320 		encrypt_auto(1);
321 		decrypt_auto(1);
322 		wantencryption = -1;
323 #endif
324 	}
325 
326 	if (autologin == -1)
327 		autologin = (rlogin == _POSIX_VDISABLE) ? 0 : 1;
328 
329 	argc -= optind;
330 	argv += optind;
331 
332 	if (argc) {
333 		char *args[7], **argp = args;
334 
335 		if (argc > 2)
336 			usage(1);
337 		*argp++ = prompt;
338 		if (user) {
339 			*argp++ = "-l";
340 			*argp++ = user;
341 		}
342 		*argp++ = argv[0];		/* host */
343 		if (argc > 1)
344 			*argp++ = argv[1];	/* port */
345 		*argp = 0;
346 
347 		if (setjmp(toplevel) != 0)
348 			Exit(0);
349 		if (tn(argp - args, args) == 1)
350 			return (0);
351 		else
352 			return (1);
353 	}
354 	setjmp(toplevel);
355 	for (;;) {
356 			command(1, 0, 0);
357 	}
358 }
359