xref: /titanic_41/usr/src/lib/libsocket/inet/rexec.c (revision 0a44ef6d9afbfe052a7e975f55ea0d2954b62a82)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 /*
22  * Copyright 2006 Sun Microsystems, Inc.  All rights reserved.
23  * Use is subject to license terms.
24  */
25 
26 /*	Copyright (c) 1984, 1986, 1987, 1988, 1989 AT&T	*/
27 /*	  All Rights Reserved  	*/
28 
29 /*
30  * University Copyright- Copyright (c) 1982, 1986, 1988
31  * The Regents of the University of California
32  * All Rights Reserved
33  *
34  * University Acknowledgment- Portions of this document are derived from
35  * software developed by the University of California, Berkeley, and its
36  * contributors.
37  */
38 
39 #pragma ident	"%Z%%M%	%I%	%E% SMI"
40 
41 #include <sys/types.h>
42 #include <sys/socket.h>
43 
44 #include <netinet/in.h>
45 
46 #include <stdio.h>
47 #include <netdb.h>
48 #include <errno.h>
49 #include <unistd.h>
50 #include <string.h>
51 #include <stdlib.h>
52 #include <libintl.h>
53 
54 #ifdef SYSV
55 #define	bcopy(a, b, c)	(void) memcpy((b), (a), (c))
56 #endif
57 
58 #define	MAX_SHORTSTRLEN 6
59 
60 extern char *_dgettext();
61 
62 void _ruserpass(const char *host, char **aname, char **apass);
63 
64 int rexec(char **ahost, unsigned short rport, const char *name,
65     const char *pass, const char *cmd, int *fd2p)
66 {
67 		return (rexec_af(ahost, rport, name, pass, cmd, fd2p, AF_INET));
68 }
69 
70 int rexec_af(char **ahost, unsigned short rport, const char *name,
71     const char *pass, const char *cmd, int *fd2p, int af)
72 {
73 	int s, timo = 1, s3;
74 	char c;
75 	ushort_t port;
76 	static char hostname[MAXHOSTNAMELEN];
77 	int rc;
78 	struct addrinfo *res;
79 	struct addrinfo hints;
80 	char aport[MAX_SHORTSTRLEN];
81 
82 	if (!(af == AF_INET || af == AF_INET6 || af == AF_UNSPEC)) {
83 		(void) fprintf(stderr,
84 		    _dgettext(TEXT_DOMAIN, "%d: Address family not "
85 		    "supported\n"), af);
86 		errno = EAFNOSUPPORT;
87 		return (-1);
88 	}
89 	memset(&hints, 0, sizeof (hints));
90 	(void) snprintf(aport, MAX_SHORTSTRLEN, "%u", ntohs(rport));
91 	hints.ai_flags = AI_CANONNAME|AI_ADDRCONFIG|AI_V4MAPPED;
92 	hints.ai_socktype = SOCK_STREAM;
93 	hints.ai_family = af;
94 	rc = getaddrinfo(*ahost, aport, &hints, &res);
95 
96 	if (rc != 0) {
97 		(void) fprintf(stderr,
98 		    _dgettext(TEXT_DOMAIN, "%s: unknown host\n"),
99 		    *ahost);
100 		return (-1);
101 	}
102 	(void) strlcpy(hostname, res->ai_canonname, MAXHOSTNAMELEN);
103 	*ahost = hostname;
104 	_ruserpass(res->ai_canonname, (char **)&name, (char **)&pass);
105 retry:
106 	s = socket(res->ai_addr->sa_family, res->ai_socktype, res->ai_protocol);
107 	if (s < 0) {
108 		perror("rexec: socket");
109 		freeaddrinfo(res);
110 		return (-1);
111 	}
112 	if (connect(s, res->ai_addr, res->ai_addrlen) != 0) {
113 		if (errno == ECONNREFUSED && timo <= 16) {
114 			(void) close(s);
115 			(void) sleep(timo);
116 			timo *= 2;
117 			goto retry;
118 		}
119 		perror(*ahost);
120 		(void) close(s);
121 		freeaddrinfo(res);
122 		return (-1);
123 	}
124 	if (fd2p == 0) {
125 		(void) write(s, "", 1);
126 		port = 0;
127 	} else {
128 		int s2;
129 		socklen_t sin2len;
130 		struct sockaddr_storage sin2, from;
131 
132 		s2 = socket(res->ai_family, SOCK_STREAM, 0);
133 		if (s2 < 0) {
134 			(void) close(s);
135 			freeaddrinfo(res);
136 			return (-1);
137 		}
138 		(void) listen(s2, 1);
139 		sin2len = (socklen_t)sizeof (sin2);
140 		if (getsockname(s2, (struct sockaddr *)&sin2, &sin2len) < 0) {
141 			perror("getsockname");
142 			(void) close(s2);
143 			goto bad;
144 		}
145 		if (res->ai_family == AF_INET6) {
146 			port = ntohs(((struct sockaddr_in6 *)&sin2)->sin6_port);
147 		} else {
148 			port = ntohs(((struct sockaddr_in *)&sin2)->sin_port);
149 		}
150 		(void) snprintf(aport, MAX_SHORTSTRLEN, "%u", port);
151 		(void) write(s, aport, strlen(aport)+1);
152 		{
153 			socklen_t len = (socklen_t)sizeof (from);
154 			s3 = accept(s2, (struct sockaddr *)&from, &len);
155 			(void) close(s2);
156 			if (s3 < 0) {
157 				perror("accept");
158 				port = 0;
159 				goto bad;
160 			}
161 		}
162 		*fd2p = s3;
163 	}
164 	(void) write(s, name, strlen(name) + 1);
165 	/* should public key encypt the password here */
166 	(void) write(s, pass, strlen(pass) + 1);
167 	(void) write(s, cmd, strlen(cmd) + 1);
168 	if (read(s, &c, 1) != 1) {
169 		perror(*ahost);
170 		goto bad;
171 	}
172 	if (c != 0) {
173 		while (read(s, &c, 1) == 1) {
174 			(void) write(2, &c, 1);
175 			if (c == '\n')
176 				break;
177 		}
178 		goto bad;
179 	}
180 	freeaddrinfo(res);
181 	return (s);
182 bad:
183 	if (port)
184 		(void) close(*fd2p);
185 	(void) close(s);
186 	freeaddrinfo(res);
187 	return (-1);
188 }
189