xref: /freebsd/crypto/heimdal/appl/telnet/telnet/main.c (revision c19800e8cd5640693f36f2040db4ab5e8d738146)
1 /*
2  * Copyright (c) 1988, 1990, 1993
3  *	The Regents of the University of California.  All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  * 1. Redistributions of source code must retain the above copyright
9  *    notice, this list of conditions and the following disclaimer.
10  * 2. Redistributions in binary form must reproduce the above copyright
11  *    notice, this list of conditions and the following disclaimer in the
12  *    documentation and/or other materials provided with the distribution.
13  * 3. All advertising materials mentioning features or use of this software
14  *    must display the following acknowledgement:
15  *	This product includes software developed by the University of
16  *	California, Berkeley and its contributors.
17  * 4. Neither the name of the University nor the names of its contributors
18  *    may be used to endorse or promote products derived from this software
19  *    without specific prior written permission.
20  *
21  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31  * SUCH DAMAGE.
32  */
33 
34 static char *copyright[] = {
35     "@(#) Copyright (c) 1988, 1990, 1993\n"
36     "\tThe Regents of the University of California.  All rights reserved.\n",
37     (char*)copyright
38 };
39 
40 #include "telnet_locl.h"
41 RCSID("$Id: main.c 21731 2007-07-30 20:01:26Z lha $");
42 
43 #if KRB5
44 #define FORWARD
45 #endif
46 
47 /*
48  * Initialize variables.
49  */
50 void
51 tninit(void)
52 {
53     init_terminal();
54 
55     init_network();
56 
57     init_telnet();
58 
59     init_sys();
60 }
61 
62 static void
63 usage(int exit_code)
64 {
65   fprintf(stderr, "Usage: %s %s%s%s%s\n", prompt,
66 #ifdef	AUTHENTICATION
67 	  "[-8] [-E] [-K] [-L] [-G] [-S tos] [-X atype] [-a] [-c] [-d] [-e char]",
68 	  "\n\t[-k realm] [-l user] [-f/-F] [-n tracefile] ",
69 #else
70 	  "[-8] [-E] [-L] [-S tos] [-a] [-c] [-d] [-e char] [-l user]",
71 	  "\n\t[-n tracefile]",
72 #endif
73 	  "[-r] ",
74 #ifdef	ENCRYPTION
75 	  "[-x] [host-name [port]]"
76 #else
77 	  "[host-name [port]]"
78 #endif
79     );
80   exit(exit_code);
81 }
82 
83 /*
84  * main.  Parse arguments, invoke the protocol or command parser.
85  */
86 
87 
88 #ifdef	FORWARD
89 int forward_option = 0; /* forward flags set from command line */
90 #endif	/* FORWARD */
91 void
92 set_forward_options(void)
93 {
94 #ifdef FORWARD
95 	switch(forward_option) {
96 	case 'f':
97 		kerberos5_set_forward(1);
98 		kerberos5_set_forwardable(0);
99 		break;
100 	case 'F':
101 		kerberos5_set_forward(1);
102 		kerberos5_set_forwardable(1);
103 		break;
104 	case 'G':
105 		kerberos5_set_forward(0);
106 		kerberos5_set_forwardable(0);
107 		break;
108 	default:
109 		break;
110 	}
111 #endif
112 }
113 
114 #ifdef KRB5
115 #define Authenticator asn1_Authenticator
116 #include <krb5.h>
117 static void
118 krb5_init(void)
119 {
120     krb5_context context;
121     krb5_error_code ret;
122     krb5_boolean ret_val;
123 
124     ret = krb5_init_context(&context);
125     if (ret)
126 	return;
127 
128 #if defined(AUTHENTICATION) && defined(FORWARD)
129     krb5_appdefault_boolean(context, NULL,
130 			    NULL, "forward",
131 			    0, &ret_val);
132     if (ret_val)
133 	    kerberos5_set_forward(1);
134     krb5_appdefault_boolean(context, NULL,
135 			    NULL, "forwardable",
136 			    0, &ret_val);
137     if (ret_val)
138 	    kerberos5_set_forwardable(1);
139 #endif
140 #ifdef  ENCRYPTION
141     krb5_appdefault_boolean(context, NULL,
142 			    NULL, "encrypt",
143 			    0, &ret_val);
144     if (ret_val) {
145           encrypt_auto(1);
146           decrypt_auto(1);
147 	  wantencryption = 1;
148           EncryptVerbose(1);
149         }
150 #endif
151 
152     krb5_free_context(context);
153 }
154 #endif
155 
156 #if defined(AUTHENTICATION) && defined(KRB4)
157 extern char *dest_realm, dst_realm_buf[];
158 extern int dst_realm_sz;
159 #endif
160 
161 int
162 main(int argc, char **argv)
163 {
164 	int ch;
165 	char *user;
166 
167 	setprogname(argv[0]);
168 
169 #ifdef KRB5
170 	krb5_init();
171 #endif
172 
173 	tninit();		/* Clear out things */
174 
175 	TerminalSaveState();
176 
177 	if ((prompt = strrchr(argv[0], '/')))
178 		++prompt;
179 	else
180 		prompt = argv[0];
181 
182 	user = NULL;
183 
184 	rlogin = (strncmp(prompt, "rlog", 4) == 0) ? '~' : _POSIX_VDISABLE;
185 
186 	/*
187 	 * if AUTHENTICATION and ENCRYPTION is set autologin will be
188 	 * se to true after the getopt switch; unless the -K option is
189 	 * passed
190 	 */
191 	autologin = -1;
192 
193 	if (argc == 2 && strcmp(argv[1], "--version") == 0) {
194 	    print_version(NULL);
195 	    exit(0);
196 	}
197 	if (argc == 2 && strcmp(argv[1], "--help") == 0)
198 	    usage(0);
199 
200 
201 	while((ch = getopt(argc, argv,
202 			   "78DEKLS:X:abcde:fFk:l:n:rxG")) != -1) {
203 		switch(ch) {
204 		case '8':
205 			eight = 3;	/* binary output and input */
206 			break;
207 		case '7':
208 			eight = 0;
209 			break;
210 		case 'b':
211 		    binary = 3;
212 		    break;
213 		case 'D': {
214 		    /* sometimes we don't want a mangled display */
215 		    char *p;
216 		    if((p = getenv("DISPLAY")))
217 			env_define((unsigned char*)"DISPLAY", (unsigned char*)p);
218 		    break;
219 		}
220 		case 'E':
221 			rlogin = escape = _POSIX_VDISABLE;
222 			break;
223 		case 'K':
224 #ifdef	AUTHENTICATION
225 			autologin = 0;
226 #endif
227 			break;
228 		case 'L':
229 			eight |= 2;	/* binary output only */
230 			break;
231 		case 'S':
232 		    {
233 #ifdef	HAVE_PARSETOS
234 			extern int tos;
235 
236 			if ((tos = parsetos(optarg, "tcp")) < 0)
237 				fprintf(stderr, "%s%s%s%s\n",
238 					prompt, ": Bad TOS argument '",
239 					optarg,
240 					"; will try to use default TOS");
241 #else
242 			fprintf(stderr,
243 			   "%s: Warning: -S ignored, no parsetos() support.\n",
244 								prompt);
245 #endif
246 		    }
247 			break;
248 		case 'X':
249 #ifdef	AUTHENTICATION
250 			auth_disable_name(optarg);
251 #endif
252 			break;
253 		case 'a':
254 			autologin = 1;
255 			break;
256 		case 'c':
257 			skiprc = 1;
258 			break;
259 		case 'd':
260 			debug = 1;
261 			break;
262 		case 'e':
263 			set_escape_char(optarg);
264 			break;
265 		case 'f':
266 		case 'F':
267 		case 'G':
268 #if defined(AUTHENTICATION) && defined(KRB5) && defined(FORWARD)
269 			if (forward_option) {
270 			    fprintf(stderr,
271 				    "%s: Only one of -f, -F and -G allowed.\n",
272 				    prompt);
273 			    usage(1);
274 			}
275 			forward_option = ch;
276 #else
277 			fprintf(stderr,
278 			 "%s: Warning: -%c ignored, no Kerberos V5 support.\n",
279 				prompt, ch);
280 #endif
281 			break;
282 		case 'k':
283 #if defined(AUTHENTICATION) && defined(KRB4)
284 		    {
285 			dest_realm = dst_realm_buf;
286 			strlcpy(dest_realm, optarg, dst_realm_sz);
287 		    }
288 #else
289 			fprintf(stderr,
290 			   "%s: Warning: -k ignored, no Kerberos V4 support.\n",
291 								prompt);
292 #endif
293 			break;
294 		case 'l':
295 		  if(autologin == 0){
296 		    fprintf(stderr, "%s: Warning: -K ignored\n", prompt);
297 		    autologin = -1;
298 		  }
299 			user = optarg;
300 			break;
301 		case 'n':
302 				SetNetTrace(optarg);
303 			break;
304 		case 'r':
305 			rlogin = '~';
306 			break;
307 		case 'x':
308 #ifdef	ENCRYPTION
309 			encrypt_auto(1);
310 			decrypt_auto(1);
311 			wantencryption = 1;
312 			EncryptVerbose(1);
313 #else
314 			fprintf(stderr,
315 			    "%s: Warning: -x ignored, no ENCRYPT support.\n",
316 								prompt);
317 #endif
318 			break;
319 
320 		case '?':
321 		default:
322 			usage(1);
323 			/* NOTREACHED */
324 		}
325 	}
326 
327 	if (autologin == -1) {		/* esc@magic.fi; force  */
328 #if defined(AUTHENTICATION)
329 		autologin = 1;
330 #endif
331 #if defined(ENCRYPTION)
332 		encrypt_auto(1);
333 		decrypt_auto(1);
334 		wantencryption = -1;
335 #endif
336 	}
337 
338 	if (autologin == -1)
339 		autologin = (rlogin == _POSIX_VDISABLE) ? 0 : 1;
340 
341 	argc -= optind;
342 	argv += optind;
343 
344 	if (argc) {
345 		char *args[7], **argp = args;
346 
347 		if (argc > 2)
348 			usage(1);
349 		*argp++ = prompt;
350 		if (user) {
351 			*argp++ = "-l";
352 			*argp++ = user;
353 		}
354 		*argp++ = argv[0];		/* host */
355 		if (argc > 1)
356 			*argp++ = argv[1];	/* port */
357 		*argp = 0;
358 
359 		if (setjmp(toplevel) != 0)
360 			Exit(0);
361 		if (tn(argp - args, args) == 1)
362 			return (0);
363 		else
364 			return (1);
365 	}
366 	setjmp(toplevel);
367 	for (;;) {
368 			command(1, 0, 0);
369 	}
370 }
371