1 /* 2 * CDDL HEADER START 3 * 4 * The contents of this file are subject to the terms of the 5 * Common Development and Distribution License (the "License"). 6 * You may not use this file except in compliance with the License. 7 * 8 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE 9 * or http://www.opensolaris.org/os/licensing. 10 * See the License for the specific language governing permissions 11 * and limitations under the License. 12 * 13 * When distributing Covered Code, include this CDDL HEADER in each 14 * file and include the License file at usr/src/OPENSOLARIS.LICENSE. 15 * If applicable, add the following below this CDDL HEADER, with the 16 * fields enclosed by brackets "[]" replaced with your own identifying 17 * information: Portions Copyright [yyyy] [name of copyright owner] 18 * 19 * CDDL HEADER END 20 */ 21 /* 22 * Copyright 2014 Garrett D'Amore 23 */ 24 /* 25 * Copyright 2009 Sun Microsystems, Inc. All rights reserved. 26 * Use is subject to license terms. 27 */ 28 29 /* Copyright (c) 1984, 1986, 1987, 1988, 1989 AT&T */ 30 /* All Rights Reserved */ 31 32 33 /* 34 35 * uucp file transfer program: 36 * to place a call to a remote machine, login, and 37 * copy files between the two machines. 38 39 */ 40 /* 41 * Added check to limit the total number of uucicos as defined 42 * in the Limits file. 43 * 44 * Added -f flag to "force execution", ignoring the limit on the 45 * number of uucicos. This will be used when invoking uucico from 46 * Uutry. 47 */ 48 49 #include "uucp.h" 50 #include "log.h" 51 52 #ifndef V7 53 #include <sys/mkdev.h> 54 #endif /* V7 */ 55 56 #ifdef TLI 57 #include <sys/tiuser.h> 58 #endif /* TLI */ 59 60 jmp_buf Sjbuf; 61 extern unsigned msgtime; 62 char uuxqtarg[MAXBASENAME] = {'\0'}; 63 int uuxqtflag = 0; 64 65 extern int (*Setup)(), (*Teardown)(); /* defined in interface.c */ 66 67 #define USAGE "Usage: %s [-x NUM] [-r [0|1]] -s SYSTEM -u USERID -d SPOOL -i INTERFACE [-f]\n" 68 extern void closedem(); 69 void cleanup(), cleanTM(); 70 71 extern int sysaccess(), guinfo(), eaccess(), countProcs(), interface(), 72 savline(), omsg(), restline(), imsg(), callok(), gnxseq(), 73 cmtseq(), conn(), startup(), cntrl(); 74 extern void setuucp(), fixline(), gename(), ulkseq(), pfEndfile(); 75 76 #ifdef NOSTRANGERS 77 static void checkrmt(); /* See if we want to talk to remote. */ 78 #endif /* NOSTRANGERS */ 79 80 extern char *Mytype; 81 82 static char *pskip(); 83 84 int 85 main(argc, argv, envp) 86 int argc; 87 char *argv[]; 88 char **envp; 89 { 90 91 extern void intrEXIT(), onintr(), timeout(); 92 extern void setservice(); 93 #ifndef ATTSVR3 94 void setTZ(); 95 #endif /* ATTSVR3 */ 96 int ret, seq, exitcode; 97 char file[NAMESIZE]; 98 char msg[BUFSIZ], *p, *q; 99 char xflag[6]; /* -xN N is single digit */ 100 char *ttyn; 101 char *iface; /* interface name */ 102 char cb[128]; 103 time_t ts, tconv; 104 char lockname[MAXFULLNAME]; 105 struct limits limitval; 106 int maxnumb; 107 int force = 0; /* set to force execution, ignoring uucico limit */ 108 char gradedir[2*NAMESIZE]; 109 110 /* Set locale environment variables local definitions */ 111 (void) setlocale(LC_ALL, ""); 112 #if !defined(TEXT_DOMAIN) /* Should be defined by cc -D */ 113 #define TEXT_DOMAIN "SYS_TEST" /* Use this only if it wasn't */ 114 #endif 115 (void) textdomain(TEXT_DOMAIN); 116 117 Ulimit = ulimit(1,0L); 118 Uid = getuid(); 119 Euid = geteuid(); /* this should be UUCPUID */ 120 if (Uid == 0) 121 setuid(UUCPUID); 122 Env = envp; 123 Role = SLAVE; 124 strcpy(Logfile, LOGCICO); 125 *Rmtname = NULLCHAR; 126 Ifn = Ofn = -1; /* must be set before signal handlers */ 127 128 closedem(); 129 time(&Nstat.t_qtime); 130 tconv = Nstat.t_start = Nstat.t_qtime; 131 strcpy(Progname, "uucico"); 132 setservice(Progname); 133 ret = sysaccess(EACCESS_SYSTEMS); 134 ASSERT(ret == 0, Ct_OPEN, "Systems", ret); 135 ret = sysaccess(EACCESS_DEVICES); 136 ASSERT(ret == 0, Ct_OPEN, "Devices", ret); 137 ret = sysaccess(EACCESS_DIALERS); 138 ASSERT(ret == 0, Ct_OPEN, "Dialers", ret); 139 Pchar = 'C'; 140 (void) signal(SIGILL, intrEXIT); 141 (void) signal(SIGTRAP, intrEXIT); 142 (void) signal(SIGIOT, intrEXIT); 143 (void) signal(SIGEMT, intrEXIT); 144 (void) signal(SIGFPE, intrEXIT); 145 (void) signal(SIGBUS, intrEXIT); 146 (void) signal(SIGSEGV, intrEXIT); 147 (void) signal(SIGSYS, intrEXIT); 148 if (signal(SIGPIPE, SIG_IGN) != SIG_IGN) /* This for sockets */ 149 (void) signal(SIGPIPE, intrEXIT); 150 (void) signal(SIGINT, onintr); 151 (void) signal(SIGHUP, onintr); 152 (void) signal(SIGQUIT, onintr); 153 (void) signal(SIGTERM, onintr); 154 #ifdef SIGUSR1 155 (void) signal(SIGUSR1, SIG_IGN); 156 #endif 157 #ifdef SIGUSR2 158 (void) signal(SIGUSR2, SIG_IGN); 159 #endif 160 #ifdef BSD4_2 161 (void) sigsetmask(sigblock(0) & ~(1 << (SIGALRM - 1))); 162 #endif /*BSD4_2*/ 163 164 pfInit(); 165 scInit("xfer"); 166 ret = guinfo(Euid, User); 167 ASSERT(ret == 0, "BAD UID ", "", ret); 168 strncpy(Uucp, User, NAMESIZE); 169 170 setuucp(User); 171 172 *xflag = NULLCHAR; 173 iface = "UNIX"; 174 175 while ((ret = getopt(argc, argv, "fd:c:r:s:x:u:i:")) != EOF) { 176 switch (ret) { 177 case 'd': 178 if ( eaccess(optarg, 01) != 0 ) { 179 (void) fprintf(stderr, gettext("%s: cannot" 180 " access spool directory %s\n"), 181 Progname, optarg); 182 exit(1); 183 } 184 Spool = optarg; 185 break; 186 case 'c': 187 Mytype = optarg; 188 break; 189 case 'f': 190 ++force; 191 break; 192 case 'r': 193 if ( (Role = atoi(optarg)) != MASTER && Role != SLAVE ) { 194 (void) fprintf(stderr, gettext("%s: bad value" 195 " '%s' for -r argument\n" USAGE), 196 Progname, optarg, Progname); 197 exit(1); 198 } 199 break; 200 case 's': 201 strncpy(Rmtname, optarg, MAXFULLNAME-1); 202 if (versys(Rmtname)) { 203 (void) fprintf(stderr, 204 gettext("%s: %s not in Systems file\n"), 205 Progname, optarg); 206 cleanup(101); 207 } 208 /* set args for possible xuuxqt call */ 209 strcpy(uuxqtarg, Rmtname); 210 /* if versys put a longer name in, truncate it again */ 211 Rmtname[MAXBASENAME] = '\0'; 212 break; 213 case 'x': 214 Debug = atoi(optarg); 215 if (Debug <= 0) 216 Debug = 1; 217 if (Debug > 9) 218 Debug = 9; 219 (void) sprintf(xflag, "-x%d", Debug); 220 break; 221 case 'u': 222 DEBUG(4, "Loginuser %s specified\n", optarg); 223 strncpy(Loginuser, optarg, NAMESIZE); 224 Loginuser[NAMESIZE - 1] = NULLCHAR; 225 break; 226 case 'i': 227 /* interface type */ 228 iface = optarg; 229 break; 230 default: 231 (void) fprintf(stderr, gettext(USAGE), Progname); 232 exit(1); 233 } 234 } 235 236 if (Role == MASTER || *Loginuser == NULLCHAR) { 237 ret = guinfo(Uid, Loginuser); 238 ASSERT(ret == 0, "BAD LOGIN_UID ", "", ret); 239 } 240 241 /* limit the total number of uucicos */ 242 if (force) { 243 DEBUG(4, "force flag set (ignoring uucico limit)\n%s", ""); 244 } else if (scanlimit("uucico", &limitval) == FAIL) { 245 DEBUG(1, "No limits for uucico in %s\n", LIMITS); 246 } else { 247 maxnumb = limitval.totalmax; 248 if (maxnumb < 0) { 249 DEBUG(4, "Non-positive limit for uucico in %s\n", LIMITS); 250 DEBUG(1, "No limits for uucico\n%s", ""); 251 } else { 252 DEBUG(4, "Uucico limit %d -- ", maxnumb); 253 (void) sprintf(lockname, "%s.", LOCKPRE); 254 if (countProcs(lockname, (maxnumb-1)) == FALSE) { 255 DEBUG(4, "exiting\n%s", ""); 256 cleanup(101); 257 } 258 DEBUG(4, "continuing\n%s", ""); 259 } 260 } 261 262 pfStrtConn((Role == MASTER) ? 'M' : 'S'); 263 if (Role == MASTER) { 264 if (*Rmtname == NULLCHAR) { 265 DEBUG(5, "No -s specified\n%s" , ""); 266 cleanup(101); 267 } 268 /* get Myname - it depends on who I'm calling--Rmtname */ 269 (void) mchFind(Rmtname); 270 myName(Myname); 271 if (EQUALSN(Rmtname, Myname, MAXBASENAME)) { 272 DEBUG(5, "This system specified: -sMyname: %s, ", Myname); 273 cleanup(101); 274 } 275 acInit("xfer"); 276 } 277 278 ASSERT(chdir(Spool) == 0, Ct_CHDIR, Spool, errno); 279 strcpy(Wrkdir, Spool); 280 281 scReqsys((Role == MASTER) ? Myname : Rmtname); /* log requestor system */ 282 283 if (Role == SLAVE) { 284 285 #ifndef ATTSVR3 286 setTZ(); 287 #endif /* ATTSVR3 */ 288 289 if (freopen(RMTDEBUG, "a", stderr) == 0) { 290 errent(Ct_OPEN, RMTDEBUG, errno, __FILE__, __LINE__); 291 freopen("/dev/null", "w", stderr); 292 } 293 if ( interface(iface) ) { 294 (void)fprintf(stderr, 295 "%s: invalid interface %s\n", Progname, iface); 296 cleanup(101); 297 } 298 /*master setup will be called from processdev()*/ 299 if ( (*Setup)( Role, &Ifn, &Ofn ) ) { 300 DEBUG(5, "SLAVE Setup failed%s", ""); 301 cleanup(101); 302 } 303 304 /* 305 * initial handshake 306 */ 307 (void) savline(); 308 fixline(Ifn, 0, D_ACU); 309 /* get MyName - use logFind to check PERMISSIONS file */ 310 (void) logFind(Loginuser, ""); 311 myName(Myname); 312 313 DEBUG(4,"cico.c: Myname - %s\n",Myname); 314 DEBUG(4,"cico.c: Loginuser - %s\n",Loginuser); 315 fflush(stderr); 316 Nstat.t_scall = times(&Nstat.t_tga); 317 (void) sprintf(msg, "here=%s", Myname); 318 omsg('S', msg, Ofn); 319 (void) signal(SIGALRM, timeout); 320 (void) alarm(msgtime); /* give slow machines a second chance */ 321 if (setjmp(Sjbuf)) { 322 323 /* 324 * timed out 325 */ 326 (void) restline(); 327 rmlock(CNULL); 328 exit(0); 329 } 330 for (;;) { 331 ret = imsg(msg, Ifn); 332 if (ret != 0) { 333 (void) alarm(0); 334 (void) restline(); 335 rmlock(CNULL); 336 exit(0); 337 } 338 if (msg[0] == 'S') 339 break; 340 } 341 Nstat.t_ecall = times(&Nstat.t_tga); 342 (void) alarm(0); 343 q = &msg[1]; 344 p = pskip(q); 345 strncpy(Rmtname, q, MAXBASENAME); 346 Rmtname[MAXBASENAME] = '\0'; 347 348 seq = 0; 349 while (p && *p == '-') { 350 q = pskip(p); 351 switch(*(++p)) { 352 case 'x': 353 Debug = atoi(++p); 354 if (Debug <= 0) 355 Debug = 1; 356 (void) sprintf(xflag, "-x%d", Debug); 357 break; 358 case 'Q': 359 seq = atoi(++p); 360 if (seq < 0) 361 seq = 0; 362 break; 363 #ifdef MAXGRADE 364 case 'v': /* version -- -vname=val or -vname */ 365 if (strncmp(++p, "grade=", 6) == 0 && 366 isalnum(p[6])) 367 MaxGrade = p[6]; 368 break; 369 #endif /* MAXGRADE */ 370 case 'R': 371 Restart++; 372 p++; 373 break; 374 case 'U': 375 SizeCheck++; 376 RemUlimit = strtol(++p, (char **) NULL,0); 377 break; 378 default: 379 break; 380 } 381 p = q; 382 } 383 DEBUG(4, "sys-%s\n", Rmtname); 384 if (strpbrk(Rmtname, Shchar) != NULL) { 385 DEBUG(4, "Bad remote system name '%s'\n", Rmtname); 386 logent(Rmtname, "BAD REMOTE SYSTEM NAME"); 387 omsg('R', "Bad remote system name", Ofn); 388 cleanup(101); 389 } 390 if (Restart) 391 CDEBUG(1,"Checkpoint Restart enabled\n%s", ""); 392 393 #ifdef NOSTRANGERS 394 checkrmt(); /* Do we know the remote system. */ 395 #else 396 (void) versys(Rmtname); /* in case the real name is longer */ 397 #endif /* NOSTRANGERS */ 398 399 (void) sprintf(lockname, "%ld", (long) getpid()); 400 if (umlock(LOCKPRE, lockname)) { 401 omsg('R', "LCK", Ofn); 402 cleanup(101); 403 } 404 405 /* validate login using PERMISSIONS file */ 406 if (logFind(Loginuser, Rmtname) == FAIL) { 407 scWrite(); /* log security violation */ 408 Uerror = SS_BAD_LOG_MCH; 409 logent(UERRORTEXT, "FAILED"); 410 systat(Rmtname, SS_BAD_LOG_MCH, UERRORTEXT, 411 Retrytime); 412 omsg('R', "LOGIN", Ofn); 413 cleanup(101); 414 } 415 416 ret = callBack(); 417 DEBUG(4,"return from callcheck: %s",ret ? "TRUE" : "FALSE"); 418 if (ret==TRUE) { 419 (void) signal(SIGINT, SIG_IGN); 420 (void) signal(SIGHUP, SIG_IGN); 421 omsg('R', "CB", Ofn); 422 logent("CALLBACK", "REQUIRED"); 423 /* 424 * set up for call back 425 */ 426 chremdir(Rmtname); 427 (void) sprintf(file, "%s/%c", Rmtname, D_QUEUE); 428 chremdir(file); 429 gename(CMDPRE, Rmtname, 'C', file); 430 (void) close(creat(file, CFILEMODE)); 431 if (callok(Rmtname) == SS_CALLBACK_LOOP) { 432 systat(Rmtname, SS_CALLBACK_LOOP, "CALL BACK - LOOP", Retrytime); 433 } else { 434 systat(Rmtname, SS_CALLBACK, "CALL BACK", Retrytime); 435 xuucico(Rmtname); 436 } 437 cleanup(101); 438 } 439 440 if (callok(Rmtname) == SS_SEQBAD) { 441 Uerror = SS_SEQBAD; 442 logent(UERRORTEXT, "PREVIOUS"); 443 omsg('R', "BADSEQ", Ofn); 444 cleanup(101); 445 } 446 447 if (gnxseq(Rmtname) == seq) { 448 if (Restart) { 449 if (SizeCheck) 450 (void) sprintf (msg, "OK -R -U0x%lx %s", 451 Ulimit, xflag); 452 else 453 (void) sprintf (msg, "OK -R %s", xflag); 454 omsg('R', msg, Ofn); 455 } else 456 omsg('R', "OK", Ofn); 457 (void) cmtseq(); 458 } else { 459 Uerror = SS_SEQBAD; 460 systat(Rmtname, SS_SEQBAD, UERRORTEXT, Retrytime); 461 logent(UERRORTEXT, "HANDSHAKE FAILED"); 462 ulkseq(); 463 omsg('R', "BADSEQ", Ofn); 464 cleanup(101); 465 } 466 ttyn = ttyname(Ifn); 467 if (ttyn != CNULL && *ttyn != NULLCHAR) { 468 struct stat ttysbuf; 469 if ( fstat(Ifn,&ttysbuf) == 0 ) 470 Dev_mode = ttysbuf.st_mode; 471 else 472 Dev_mode = R_DEVICEMODE; 473 if ( EQUALSN(ttyn,"/dev/",5) ) 474 strcpy(Dc, ttyn+5); 475 else 476 strcpy(Dc, ttyn); 477 chmod(ttyn, S_DEVICEMODE); 478 } else 479 strcpy(Dc, "notty"); 480 /* set args for possible xuuxqt call */ 481 strcpy(uuxqtarg, Rmtname); 482 } 483 484 strcpy(User, Uucp); 485 /* 486 * Ensure reasonable ulimit (MINULIMIT) 487 */ 488 489 #ifndef V7 490 { 491 long minulimit; 492 minulimit = ulimit(1, (long) 0); 493 ASSERT(minulimit >= MINULIMIT, "ULIMIT TOO SMALL", 494 Loginuser, (int) minulimit); 495 } 496 #endif 497 if (Role == MASTER && callok(Rmtname) != 0) { 498 logent("SYSTEM STATUS", "CAN NOT CALL"); 499 cleanup(101); 500 } 501 502 chremdir(Rmtname); 503 504 (void) strcpy(Wrkdir, RemSpool); 505 if (Role == MASTER) { 506 507 /* 508 * master part 509 */ 510 (void) signal(SIGINT, SIG_IGN); 511 (void) signal(SIGHUP, SIG_IGN); 512 (void) signal(SIGQUIT, SIG_IGN); 513 if (Ifn != -1 && Role == MASTER) { 514 (void) (*Write)(Ofn, EOTMSG, strlen(EOTMSG)); 515 (void) close(Ofn); 516 (void) close(Ifn); 517 Ifn = Ofn = -1; 518 rmlock(CNULL); 519 sleep(3); 520 } 521 522 /* 523 * Find the highest priority job grade that has 524 * jobs to do. This is needed to form the lock name. 525 */ 526 527 findgrade(RemSpool, JobGrade); 528 DEBUG(4, "Job grade to process - %s\n", JobGrade); 529 530 /* 531 * Lock the job grade if there is one to process. 532 */ 533 534 if (*JobGrade != NULLCHAR) { 535 (void) sprintf(gradedir, "%s/%s", Rmtname, JobGrade); 536 chremdir(gradedir); 537 538 (void) sprintf(lockname, "%.*s.%s", SYSNSIZE, Rmtname, JobGrade); 539 (void) sprintf(msg, "call to %s - process job grade %s ", 540 Rmtname, JobGrade); 541 if (umlock(LOCKPRE, lockname) != 0) { 542 logent(msg, "LOCKED"); 543 CDEBUG(1, "Currently Talking With %s\n", 544 Rmtname); 545 cleanup(100); 546 } 547 } else { 548 (void) sprintf(msg, "call to %s - no work", Rmtname); 549 } 550 551 Nstat.t_scall = times(&Nstat.t_tga); 552 Ofn = Ifn = conn(Rmtname); 553 Nstat.t_ecall = times(&Nstat.t_tga); 554 if (Ofn < 0) { 555 delock(LOCKPRE, lockname); 556 logent(UERRORTEXT, "CONN FAILED"); 557 systat(Rmtname, Uerror, UERRORTEXT, Retrytime); 558 cleanup(101); 559 } else { 560 logent(msg, "SUCCEEDED"); 561 ttyn = ttyname(Ifn); 562 if (ttyn != CNULL && *ttyn != NULLCHAR) { 563 struct stat ttysbuf; 564 if ( fstat(Ifn,&ttysbuf) == 0 ) 565 Dev_mode = ttysbuf.st_mode; 566 else 567 Dev_mode = R_DEVICEMODE; 568 chmod(ttyn, M_DEVICEMODE); 569 } 570 } 571 572 if (setjmp(Sjbuf)) { 573 delock(LOCKPRE, lockname); 574 Uerror = SS_LOGIN_FAILED; 575 logent(Rmtname, UERRORTEXT); 576 systat(Rmtname, SS_LOGIN_FAILED, 577 UERRORTEXT, Retrytime); 578 DEBUG(4, "%s - failed\n", UERRORTEXT); 579 cleanup(101); 580 } 581 (void) signal(SIGALRM, timeout); 582 /* give slow guys lots of time to thrash */ 583 (void) alarm(2 * msgtime); 584 for (;;) { 585 ret = imsg(msg, Ifn); 586 if (ret != 0) { 587 continue; /* try again */ 588 } 589 if (msg[0] == 'S') 590 break; 591 } 592 (void) alarm(0); 593 if(EQUALSN("here=", &msg[1], 5)){ 594 /* This may be a problem, we check up to MAXBASENAME 595 * characters now. The old comment was: 596 * this is a problem. We'd like to compare with an 597 * untruncated Rmtname but we fear incompatability. 598 * So we'll look at most 6 chars (at most). 599 */ 600 (void) pskip(&msg[6]); 601 if (!EQUALSN(&msg[6], Rmtname, MAXBASENAME)) { 602 delock(LOCKPRE, lockname); 603 Uerror = SS_WRONG_MCH; 604 logent(&msg[6], UERRORTEXT); 605 systat(Rmtname, SS_WRONG_MCH, UERRORTEXT, 606 Retrytime); 607 DEBUG(4, "%s - failed\n", UERRORTEXT); 608 cleanup(101); 609 } 610 } 611 CDEBUG(1,"Login Successful: System=%s\n",&msg[6]); 612 seq = gnxseq(Rmtname); 613 (void) sprintf(msg, "%s -Q%d -R -U0x%lx %s", 614 Myname, seq, Ulimit, xflag); 615 #ifdef MAXGRADE 616 if (MaxGrade != NULLCHAR) { 617 p = strchr(msg, NULLCHAR); 618 sprintf(p, " -vgrade=%c", MaxGrade); 619 } 620 #endif /* MAXGRADE */ 621 omsg('S', msg, Ofn); 622 (void) alarm(msgtime); /* give slow guys some thrash time */ 623 for (;;) { 624 ret = imsg(msg, Ifn); 625 DEBUG(4, "msg-%s\n", msg); 626 if (ret != 0) { 627 (void) alarm(0); 628 delock(LOCKPRE, lockname); 629 ulkseq(); 630 cleanup(101); 631 } 632 if (msg[0] == 'R') 633 break; 634 } 635 (void) alarm(0); 636 637 /* check for rejects from remote */ 638 Uerror = 0; 639 if (EQUALS(&msg[1], "LCK")) 640 Uerror = SS_RLOCKED; 641 else if (EQUALS(&msg[1], "LOGIN")) 642 Uerror = SS_RLOGIN; 643 else if (EQUALS(&msg[1], "CB")) 644 Uerror = (callBack() ? SS_CALLBACK_LOOP : SS_CALLBACK); 645 else if (EQUALS(&msg[1], "You are unknown to me")) 646 Uerror = SS_RUNKNOWN; 647 else if (EQUALS(&msg[1], "BADSEQ")) 648 Uerror = SS_SEQBAD; 649 else if (!EQUALSN(&msg[1], "OK", 2)) 650 Uerror = SS_UNKNOWN_RESPONSE; 651 if (Uerror) { 652 delock(LOCKPRE, lockname); 653 systat(Rmtname, Uerror, UERRORTEXT, Retrytime); 654 logent(UERRORTEXT, "HANDSHAKE FAILED"); 655 CDEBUG(1, "HANDSHAKE FAILED: %s\n", UERRORTEXT); 656 ulkseq(); 657 cleanup(101); 658 } 659 (void) cmtseq(); 660 661 /* 662 * See if we have any additional parameters on the OK 663 */ 664 665 if (strlen(&msg[3])) { 666 p = pskip(&msg[3]); 667 while (p && *p == '-') { 668 q = pskip(p); 669 switch(*(++p)) { 670 case 'R': 671 Restart++; 672 p++; 673 break; 674 case 'U': 675 SizeCheck++; 676 RemUlimit = strtol(++p, (char **) NULL, 0); 677 break; 678 case 'x': 679 if (!Debug) { 680 Debug = atoi(++p); 681 if (Debug <= 0) 682 Debug = 1; 683 } 684 break; 685 default: 686 break; 687 } 688 p = q; 689 } 690 } 691 692 } 693 DEBUG(4, " Rmtname %s, ", Rmtname); 694 DEBUG(4, " Restart %s, ", (Restart ? "YES" : "NO")); 695 DEBUG(4, "Role %s, ", Role ? "MASTER" : "SLAVE"); 696 DEBUG(4, "Ifn - %d, ", Ifn); 697 DEBUG(4, "Loginuser - %s\n", Loginuser); 698 699 /* alarm/setjmp added here due to experience with uucico 700 * hanging for hours in imsg(). 701 */ 702 if (setjmp(Sjbuf)) { 703 delock(LOCKPRE, lockname); 704 logent("startup", "TIMEOUT"); 705 DEBUG(4, "%s - timeout\n", "startup"); 706 cleanup(101); 707 } 708 (void) alarm(MAXSTART); 709 ret = startup(); 710 (void) alarm(0); 711 712 if (ret != SUCCESS) { 713 delock(LOCKPRE, lockname); 714 logent("startup", "FAILED"); 715 Uerror = SS_STARTUP; 716 CDEBUG(1, "%s\n", UERRORTEXT); 717 systat(Rmtname, Uerror, UERRORTEXT, Retrytime); 718 exitcode = 101; 719 } else { 720 pfConnected(Rmtname, Dc); 721 acConnected(Rmtname, Dc); 722 logent("startup", "OK"); 723 systat(Rmtname, SS_INPROGRESS, UTEXT(SS_INPROGRESS),Retrytime); 724 Nstat.t_sftp = times(&Nstat.t_tga); 725 726 exitcode = cntrl(); 727 Nstat.t_eftp = times(&Nstat.t_tga); 728 DEBUG(4, "cntrl - %d\n", exitcode); 729 (void) signal(SIGINT, SIG_IGN); 730 (void) signal(SIGHUP, SIG_IGN); 731 (void) signal(SIGALRM, timeout); 732 733 if (exitcode == 0) { 734 (void) time(&ts); 735 (void) sprintf(cb, "conversation complete %s %ld", 736 Dc, ts - tconv); 737 logent(cb, "OK"); 738 systat(Rmtname, SS_OK, UTEXT(SS_OK), Retrytime); 739 740 } else { 741 logent("conversation complete", "FAILED"); 742 systat(Rmtname, SS_CONVERSATION, 743 UTEXT(SS_CONVERSATION), Retrytime); 744 } 745 (void) alarm(msgtime); /* give slow guys some thrash time */ 746 omsg('O', "OOOOO", Ofn); 747 CDEBUG(4, "send OO %d,", ret); 748 if (!setjmp(Sjbuf)) { 749 for (;;) { 750 omsg('O', "OOOOO", Ofn); 751 ret = imsg(msg, Ifn); 752 if (ret != 0) 753 break; 754 if (msg[0] == 'O') 755 break; 756 } 757 } 758 (void) alarm(0); 759 } 760 cleanup(exitcode); 761 /*NOTREACHED*/ 762 return (0); 763 } 764 765 /* 766 * clean and exit with "code" status 767 */ 768 void 769 cleanup(code) 770 int code; 771 { 772 (void) signal(SIGINT, SIG_IGN); 773 (void) signal(SIGHUP, SIG_IGN); 774 rmlock(CNULL); 775 closedem(); 776 alarm(msgtime); /* Start timer in case closes hang. */ 777 if (setjmp(Sjbuf) == 0) 778 (*Teardown)( Role, Ifn, Ofn ); 779 alarm(0); /* Turn off timer. */ 780 DEBUG(4, "exit code %d\n", code); 781 CDEBUG(1, "Conversation Complete: Status %s\n\n", 782 code ? "FAILED" : "SUCCEEDED"); 783 784 cleanTM(); 785 if ((code == 0) && (uuxqtflag == 1)) 786 xuuxqt(uuxqtarg); 787 exit(code); 788 } 789 790 short TM_cnt = 0; 791 char TM_name[MAXNAMESIZE]; 792 793 void 794 cleanTM() 795 { 796 int i; 797 char tm_name[MAXNAMESIZE]; 798 799 DEBUG(7,"TM_cnt: %d\n",TM_cnt); 800 for(i=0; i < TM_cnt; i++) { 801 (void) sprintf(tm_name, "%s.%3.3d", TM_name, i); 802 DEBUG(7, "tm_name: %s\n", tm_name); 803 unlink(tm_name); 804 } 805 return; 806 } 807 808 void 809 TMname(file, pnum) 810 char *file; 811 pid_t pnum; 812 { 813 814 (void) sprintf(file, "%s/TM.%.5ld.%.3d", RemSpool, (long) pnum, TM_cnt); 815 if (TM_cnt == 0) 816 (void) sprintf(TM_name, "%s/TM.%.5ld", RemSpool, (long) pnum); 817 DEBUG(7, "TMname(%s)\n", file); 818 TM_cnt++; 819 return; 820 } 821 822 /* 823 * intrrupt - remove locks and exit 824 */ 825 void 826 onintr(inter) 827 int inter; 828 { 829 char str[30]; 830 /* I'm putting a test for zero here because I saw it happen 831 * and don't know how or why, but it seemed to then loop 832 * here for ever? 833 */ 834 if (inter == 0) 835 exit(99); 836 (void) signal(inter, SIG_IGN); 837 (void) sprintf(str, "SIGNAL %d", inter); 838 logent(str, "CAUGHT"); 839 pfEndfile("PARTIAL FILE"); 840 acEnd(PARTIAL); /*stop collecting accounting log */ 841 cleanup(inter); 842 } 843 844 void 845 intrEXIT(inter) 846 int inter; 847 { 848 char cb[20]; 849 850 (void) sprintf(cb, "SIGNAL %d", inter); 851 logent("INTREXIT", cb); 852 (void) signal(SIGIOT, SIG_DFL); 853 (void) signal(SIGILL, SIG_DFL); 854 rmlock(CNULL); 855 closedem(); 856 (void) setuid(Uid); 857 abort(); 858 } 859 860 /* 861 * catch SIGALRM routine 862 */ 863 void 864 timeout() 865 { 866 longjmp(Sjbuf, 1); 867 } 868 869 /* skip to next field */ 870 static char * 871 pskip(p) 872 char *p; 873 { 874 if ((p = strchr(p, ' ')) != CNULL) 875 do 876 *p++ = NULLCHAR; 877 while (*p == ' '); 878 return(p); 879 } 880 881 void 882 closedem() 883 { 884 int i, maxfiles; 885 886 #ifdef ATTSVR3 887 maxfiles = ulimit(4,0); 888 #else /* !ATTSVR3 */ 889 #ifdef BSD4_2 890 maxfiles = getdtablesize(); 891 #else /* BSD4_2 */ 892 maxfiles = _NFILE; 893 #endif /* BSD4_2 */ 894 #endif /* ATTSVR3 */ 895 896 for ( i = 3; i < maxfiles; i++ ) 897 if ( i != Ifn && i != Ofn && i != fileno(stderr) ) 898 (void) close(i); 899 return; 900 } 901 902 #ifndef ATTSVR3 903 904 /* 905 * setTZ() 906 * 907 * if login "shell" is uucico (i.e., Role == SLAVE), must set 908 * timezone env variable TZ. otherwise will default to EST. 909 */ 910 911 #define LINELEN 81 912 913 void 914 setTZ() 915 { 916 static char buf[LINELEN], *bp; 917 extern char *fgets(); 918 FILE *tzfp; 919 extern FILE *fopen(); 920 int i; 921 extern int fclose(), strncmp(); 922 923 if ( (tzfp = fopen("/etc/default/init","r")) == (FILE *)NULL ) 924 return; 925 while ( (bp = fgets(buf,LINELEN,tzfp)) != (char *)NULL ) { 926 while ( isspace(*bp) ) 927 ++bp; 928 if ( strncmp(bp, "TZ=", 3) == 0 ) { 929 for ( i = strlen(bp) - 1; i > 0 && isspace(*(bp+i)); --i ) 930 *(bp+i) = '\0'; 931 putenv(bp); 932 (void)fclose(tzfp); 933 return; 934 } 935 } 936 (void)fclose(tzfp); 937 return; 938 } 939 #endif /* ATTSVR3 */ 940 941 #ifdef NOSTRANGERS 942 /* 943 * Function: checkrmt 944 * 945 * If NOSTRANGERS is defined, see if the remote system is in our systems 946 * file. If it is not, execute NOSTRANGERS and then reject the call. 947 */ 948 949 static void 950 checkrmt () 951 952 { 953 char ** eVarPtr; /* Pointer to environment variable. */ 954 char msgbuf[BUFSIZ]; /* Place to build messages. */ 955 pid_t procid; /* ID of Nostranger process. */ 956 static char * safePath = PATH; 957 int status; /* Exit status of child. */ 958 pid_t waitrv; /* Return value from wait system call. */ 959 960 /* here's the place to look the remote system up in the Systems file. 961 * If the command NOSTRANGERS is executable and 962 * If they're not in my file then hang up */ 963 964 if (versys(Rmtname) && (access(NOSTRANGERS, 1) == 0)) { 965 sprintf(msgbuf, "Invoking %s for %%s\n", NOSTRANGERS); 966 DEBUG(4, msgbuf, Rmtname); 967 968 /* 969 * Ignore hangup in case remote goes away before we can 970 * finish logging. 971 */ 972 973 (void) signal(SIGHUP, SIG_IGN); 974 omsg('R', "You are unknown to me", Ofn); 975 scWrite(); /* log unknown remote system */ 976 procid = fork(); 977 if ( procid == 0 ) { 978 /* 979 * Before execing the no strangers program, there is 980 * a security aspect to consider. If NOSTRANGERS is 981 * not a full path name, then the PATH environment 982 * variable will provide places to look for the file. 983 * To be safe, we will set the PATH environment 984 * variable before we do the exec. 985 */ 986 987 /* Find PATH in current environment and change it. */ 988 989 for (eVarPtr = Env; *eVarPtr != CNULL; eVarPtr++) { 990 if (PREFIX("PATH=", *eVarPtr)) 991 *eVarPtr = safePath; 992 } 993 execlp( NOSTRANGERS, "stranger", Rmtname, (char *) 0); 994 sprintf(msgbuf, "Execlp of %s failed with errno=%%d\n", 995 NOSTRANGERS); 996 DEBUG(4, msgbuf, errno); 997 perror(gettext("cico.c: execlp NOSTRANGERS failed")); 998 cleanup(errno); 999 } else if (procid < 0) { 1000 perror(gettext("cico.c: execlp NOSTRANGERS failed")); 1001 cleanup(errno); 1002 } else { 1003 while ((waitrv = wait(&status)) != procid) 1004 if (waitrv == -1 && errno != EINTR) 1005 cleanup(errno); 1006 sprintf(msgbuf, "%s exit status was %%#x\n", 1007 NOSTRANGERS); 1008 DEBUG(4, msgbuf, status); 1009 } 1010 cleanup(101); 1011 } 1012 } 1013 #endif /* NOSTRANGERS */ 1014