]> git.proxmox.com Git - qemu.git/blame - slirp/misc.c
slirp: Rework external configuration interface
[qemu.git] / slirp / misc.c
CommitLineData
f0cbd3ec
FB
1/*
2 * Copyright (c) 1995 Danny Gasparovski.
5fafdf24 3 *
f0cbd3ec
FB
4 * Please read the file COPYRIGHT for the
5 * terms and conditions of the copyright.
6 */
7
f0cbd3ec
FB
8#include <slirp.h>
9
9634d903 10u_int curtime, time_fasttimo, last_slowtimo;
f0cbd3ec
FB
11
12#if 0
13int x_port = -1;
14int x_display = 0;
15int x_screen = 0;
16
17int
18show_x(buff, inso)
19 char *buff;
20 struct socket *inso;
21{
22 if (x_port < 0) {
23 lprint("X Redir: X not being redirected.\r\n");
24 } else {
25 lprint("X Redir: In sh/bash/zsh/etc. type: DISPLAY=%s:%d.%d; export DISPLAY\r\n",
26 inet_ntoa(our_addr), x_port, x_screen);
27 lprint("X Redir: In csh/tcsh/etc. type: setenv DISPLAY %s:%d.%d\r\n",
28 inet_ntoa(our_addr), x_port, x_screen);
29 if (x_display)
30 lprint("X Redir: Redirecting to display %d\r\n", x_display);
31 }
5fafdf24 32
f0cbd3ec
FB
33 return CFG_OK;
34}
35
36
37/*
38 * XXX Allow more than one X redirection?
39 */
40void
41redir_x(inaddr, start_port, display, screen)
42 u_int32_t inaddr;
43 int start_port;
44 int display;
45 int screen;
46{
47 int i;
5fafdf24 48
f0cbd3ec
FB
49 if (x_port >= 0) {
50 lprint("X Redir: X already being redirected.\r\n");
51 show_x(0, 0);
52 } else {
53 for (i = 6001 + (start_port-1); i <= 6100; i++) {
54 if (solisten(htons(i), inaddr, htons(6000 + display), 0)) {
55 /* Success */
56 x_port = i - 6000;
57 x_display = display;
58 x_screen = screen;
59 show_x(0, 0);
60 return;
61 }
62 }
63 lprint("X Redir: Error: Couldn't redirect a port for X. Weird.\r\n");
64 }
65}
66#endif
67
f0cbd3ec
FB
68/*
69 * Get our IP address and put it in our_addr
70 */
71void
511d2b14 72getouraddr(void)
f0cbd3ec
FB
73{
74 char buff[256];
f4e15b4b 75 struct hostent *he = NULL;
5fafdf24 76
f4e15b4b
PB
77 if (gethostname(buff,256) == 0)
78 he = gethostbyname(buff);
79 if (he)
80 our_addr = *(struct in_addr *)he->h_addr;
8dbca8dd
FB
81 if (our_addr.s_addr == 0)
82 our_addr.s_addr = loopback_addr.s_addr;
f0cbd3ec
FB
83}
84
f0cbd3ec
FB
85struct quehead {
86 struct quehead *qh_link;
87 struct quehead *qh_rlink;
88};
89
90inline void
511d2b14 91insque(void *a, void *b)
f0cbd3ec
FB
92{
93 register struct quehead *element = (struct quehead *) a;
94 register struct quehead *head = (struct quehead *) b;
95 element->qh_link = head->qh_link;
96 head->qh_link = (struct quehead *)element;
97 element->qh_rlink = (struct quehead *)head;
98 ((struct quehead *)(element->qh_link))->qh_rlink
99 = (struct quehead *)element;
100}
101
102inline void
511d2b14 103remque(void *a)
f0cbd3ec
FB
104{
105 register struct quehead *element = (struct quehead *) a;
106 ((struct quehead *)(element->qh_link))->qh_rlink = element->qh_rlink;
107 ((struct quehead *)(element->qh_rlink))->qh_link = element->qh_link;
108 element->qh_rlink = NULL;
109 /* element->qh_link = NULL; TCP FIN1 crashes if you do this. Why ? */
110}
111
112/* #endif */
113
114
a13a4126
JK
115int add_exec(struct ex_list **ex_ptr, int do_pty, char *exec,
116 struct in_addr addr, int port)
f0cbd3ec
FB
117{
118 struct ex_list *tmp_ptr;
5fafdf24 119
f0cbd3ec
FB
120 /* First, check if the port is "bound" */
121 for (tmp_ptr = *ex_ptr; tmp_ptr; tmp_ptr = tmp_ptr->ex_next) {
a13a4126
JK
122 if (port == tmp_ptr->ex_fport &&
123 addr.s_addr == tmp_ptr->ex_addr.s_addr)
124 return -1;
f0cbd3ec 125 }
5fafdf24 126
f0cbd3ec
FB
127 tmp_ptr = *ex_ptr;
128 *ex_ptr = (struct ex_list *)malloc(sizeof(struct ex_list));
129 (*ex_ptr)->ex_fport = port;
130 (*ex_ptr)->ex_addr = addr;
131 (*ex_ptr)->ex_pty = do_pty;
e1c5a2b3 132 (*ex_ptr)->ex_exec = (do_pty == 3) ? exec : strdup(exec);
f0cbd3ec
FB
133 (*ex_ptr)->ex_next = tmp_ptr;
134 return 0;
135}
136
137#ifndef HAVE_STRERROR
138
139/*
140 * For systems with no strerror
141 */
142
143extern int sys_nerr;
144extern char *sys_errlist[];
145
146char *
147strerror(error)
148 int error;
149{
150 if (error < sys_nerr)
151 return sys_errlist[error];
152 else
153 return "Unknown error.";
154}
155
156#endif
157
158
a3d4af03
FB
159#ifdef _WIN32
160
161int
9634d903 162fork_exec(struct socket *so, const char *ex, int do_pty)
a3d4af03
FB
163{
164 /* not implemented */
165 return 0;
166}
167
168#else
169
9634d903 170#ifndef CONFIG_QEMU
f0cbd3ec 171int
f3ff649d
FB
172slirp_openpty(amaster, aslave)
173 int *amaster, *aslave;
f0cbd3ec
FB
174{
175 register int master, slave;
176
177#ifdef HAVE_GRANTPT
178 char *ptr;
5fafdf24 179
f0cbd3ec
FB
180 if ((master = open("/dev/ptmx", O_RDWR)) < 0 ||
181 grantpt(master) < 0 ||
182 unlockpt(master) < 0 ||
183 (ptr = ptsname(master)) == NULL) {
184 close(master);
185 return -1;
186 }
5fafdf24 187
f0cbd3ec
FB
188 if ((slave = open(ptr, O_RDWR)) < 0 ||
189 ioctl(slave, I_PUSH, "ptem") < 0 ||
190 ioctl(slave, I_PUSH, "ldterm") < 0 ||
191 ioctl(slave, I_PUSH, "ttcompat") < 0) {
192 close(master);
193 close(slave);
194 return -1;
195 }
5fafdf24 196
f0cbd3ec
FB
197 *amaster = master;
198 *aslave = slave;
199 return 0;
5fafdf24 200
f0cbd3ec 201#else
5fafdf24 202
f0cbd3ec
FB
203 static char line[] = "/dev/ptyXX";
204 register const char *cp1, *cp2;
5fafdf24 205
f0cbd3ec
FB
206 for (cp1 = "pqrsPQRS"; *cp1; cp1++) {
207 line[8] = *cp1;
208 for (cp2 = "0123456789abcdefghijklmnopqrstuv"; *cp2; cp2++) {
209 line[9] = *cp2;
210 if ((master = open(line, O_RDWR, 0)) == -1) {
211 if (errno == ENOENT)
212 return (-1); /* out of ptys */
213 } else {
214 line[5] = 't';
215 /* These will fail */
216 (void) chown(line, getuid(), 0);
217 (void) chmod(line, S_IRUSR|S_IWUSR|S_IWGRP);
218#ifdef HAVE_REVOKE
219 (void) revoke(line);
220#endif
221 if ((slave = open(line, O_RDWR, 0)) != -1) {
222 *amaster = master;
223 *aslave = slave;
224 return 0;
225 }
226 (void) close(master);
227 line[5] = 'p';
228 }
229 }
230 }
231 errno = ENOENT; /* out of ptys */
232 return (-1);
233#endif
234}
9634d903 235#endif
f0cbd3ec
FB
236
237/*
238 * XXX This is ugly
239 * We create and bind a socket, then fork off to another
240 * process, which connects to this socket, after which we
241 * exec the wanted program. If something (strange) happens,
242 * the accept() call could block us forever.
5fafdf24 243 *
f0cbd3ec
FB
244 * do_pty = 0 Fork/exec inetd style
245 * do_pty = 1 Fork/exec using slirp.telnetd
246 * do_ptr = 2 Fork/exec using pty
247 */
248int
9634d903 249fork_exec(struct socket *so, const char *ex, int do_pty)
f0cbd3ec
FB
250{
251 int s;
252 struct sockaddr_in addr;
242acf3a 253 socklen_t addrlen = sizeof(addr);
f0cbd3ec 254 int opt;
9634d903 255 int master = -1;
7ccfb2eb 256 const char *argv[256];
a3d4af03 257#if 0
f0cbd3ec 258 char buff[256];
a3d4af03 259#endif
f0cbd3ec
FB
260 /* don't want to clobber the original */
261 char *bptr;
9634d903 262 const char *curarg;
7b91a172 263 int c, i, ret;
5fafdf24 264
f0cbd3ec
FB
265 DEBUG_CALL("fork_exec");
266 DEBUG_ARG("so = %lx", (long)so);
267 DEBUG_ARG("ex = %lx", (long)ex);
268 DEBUG_ARG("do_pty = %lx", (long)do_pty);
5fafdf24 269
f0cbd3ec 270 if (do_pty == 2) {
9634d903 271#if 0
f3ff649d 272 if (slirp_openpty(&master, &s) == -1) {
f0cbd3ec
FB
273 lprint("Error: openpty failed: %s\n", strerror(errno));
274 return 0;
275 }
3f9b2b1f
AZ
276#else
277 return 0;
9634d903 278#endif
f0cbd3ec
FB
279 } else {
280 addr.sin_family = AF_INET;
281 addr.sin_port = 0;
282 addr.sin_addr.s_addr = INADDR_ANY;
3b46e624 283
f0cbd3ec
FB
284 if ((s = socket(AF_INET, SOCK_STREAM, 0)) < 0 ||
285 bind(s, (struct sockaddr *)&addr, addrlen) < 0 ||
286 listen(s, 1) < 0) {
287 lprint("Error: inet socket: %s\n", strerror(errno));
379ff53d 288 closesocket(s);
3b46e624 289
f0cbd3ec
FB
290 return 0;
291 }
292 }
5fafdf24 293
f0cbd3ec
FB
294 switch(fork()) {
295 case -1:
296 lprint("Error: fork failed: %s\n", strerror(errno));
297 close(s);
298 if (do_pty == 2)
299 close(master);
300 return 0;
3b46e624 301
f0cbd3ec
FB
302 case 0:
303 /* Set the DISPLAY */
304 if (do_pty == 2) {
305 (void) close(master);
306#ifdef TIOCSCTTY /* XXXXX */
307 (void) setsid();
308 ioctl(s, TIOCSCTTY, (char *)NULL);
309#endif
310 } else {
311 getsockname(s, (struct sockaddr *)&addr, &addrlen);
312 close(s);
313 /*
314 * Connect to the socket
315 * XXX If any of these fail, we're in trouble!
316 */
317 s = socket(AF_INET, SOCK_STREAM, 0);
318 addr.sin_addr = loopback_addr;
7b91a172
FB
319 do {
320 ret = connect(s, (struct sockaddr *)&addr, addrlen);
321 } while (ret < 0 && errno == EINTR);
f0cbd3ec 322 }
3b46e624 323
a3d4af03 324#if 0
f0cbd3ec
FB
325 if (x_port >= 0) {
326#ifdef HAVE_SETENV
327 sprintf(buff, "%s:%d.%d", inet_ntoa(our_addr), x_port, x_screen);
328 setenv("DISPLAY", buff, 1);
329#else
330 sprintf(buff, "DISPLAY=%s:%d.%d", inet_ntoa(our_addr), x_port, x_screen);
331 putenv(buff);
332#endif
333 }
5fafdf24 334#endif
f0cbd3ec
FB
335 dup2(s, 0);
336 dup2(s, 1);
337 dup2(s, 2);
9634d903 338 for (s = getdtablesize() - 1; s >= 3; s--)
f0cbd3ec 339 close(s);
3b46e624 340
f0cbd3ec
FB
341 i = 0;
342 bptr = strdup(ex); /* No need to free() this */
343 if (do_pty == 1) {
344 /* Setup "slirp.telnetd -x" */
345 argv[i++] = "slirp.telnetd";
346 argv[i++] = "-x";
347 argv[i++] = bptr;
348 } else
349 do {
350 /* Change the string into argv[] */
351 curarg = bptr;
352 while (*bptr != ' ' && *bptr != (char)0)
353 bptr++;
354 c = *bptr;
355 *bptr++ = (char)0;
356 argv[i++] = strdup(curarg);
357 } while (c);
3b46e624 358
511d2b14 359 argv[i] = NULL;
7ccfb2eb 360 execvp(argv[0], (char **)argv);
3b46e624 361
f0cbd3ec
FB
362 /* Ooops, failed, let's tell the user why */
363 {
364 char buff[256];
3b46e624 365
363a37d5
BS
366 snprintf(buff, sizeof(buff),
367 "Error: execvp of %s failed: %s\n",
368 argv[0], strerror(errno));
f0cbd3ec
FB
369 write(2, buff, strlen(buff)+1);
370 }
371 close(0); close(1); close(2); /* XXX */
372 exit(1);
3b46e624 373
f0cbd3ec
FB
374 default:
375 if (do_pty == 2) {
376 close(s);
377 so->s = master;
378 } else {
379 /*
380 * XXX this could block us...
381 * XXX Should set a timer here, and if accept() doesn't
382 * return after X seconds, declare it a failure
383 * The only reason this will block forever is if socket()
384 * of connect() fail in the child process
385 */
7b91a172
FB
386 do {
387 so->s = accept(s, (struct sockaddr *)&addr, &addrlen);
388 } while (so->s < 0 && errno == EINTR);
389 closesocket(s);
f0cbd3ec
FB
390 opt = 1;
391 setsockopt(so->s,SOL_SOCKET,SO_REUSEADDR,(char *)&opt,sizeof(int));
392 opt = 1;
393 setsockopt(so->s,SOL_SOCKET,SO_OOBINLINE,(char *)&opt,sizeof(int));
394 }
395 fd_nonblock(so->s);
3b46e624 396
f0cbd3ec 397 /* Append the telnet options now */
511d2b14 398 if (so->so_m != NULL && do_pty == 1) {
f0cbd3ec 399 sbappend(so, so->so_m);
511d2b14 400 so->so_m = NULL;
f0cbd3ec 401 }
3b46e624 402
f0cbd3ec
FB
403 return 1;
404 }
405}
406#endif
407
408#ifndef HAVE_STRDUP
409char *
410strdup(str)
411 const char *str;
412{
413 char *bptr;
5fafdf24 414
f0cbd3ec
FB
415 bptr = (char *)malloc(strlen(str)+1);
416 strcpy(bptr, str);
5fafdf24 417
f0cbd3ec
FB
418 return bptr;
419}
420#endif
421
422#if 0
423void
424snooze_hup(num)
425 int num;
426{
427 int s, ret;
428#ifndef NO_UNIX_SOCKETS
429 struct sockaddr_un sock_un;
430#endif
431 struct sockaddr_in sock_in;
432 char buff[256];
5fafdf24 433
f0cbd3ec
FB
434 ret = -1;
435 if (slirp_socket_passwd) {
436 s = socket(AF_INET, SOCK_STREAM, 0);
437 if (s < 0)
438 slirp_exit(1);
439 sock_in.sin_family = AF_INET;
440 sock_in.sin_addr.s_addr = slirp_socket_addr;
441 sock_in.sin_port = htons(slirp_socket_port);
442 if (connect(s, (struct sockaddr *)&sock_in, sizeof(sock_in)) != 0)
443 slirp_exit(1); /* just exit...*/
444 sprintf(buff, "kill %s:%d", slirp_socket_passwd, slirp_socket_unit);
445 write(s, buff, strlen(buff)+1);
446 }
447#ifndef NO_UNIX_SOCKETS
448 else {
449 s = socket(AF_UNIX, SOCK_STREAM, 0);
450 if (s < 0)
451 slirp_exit(1);
452 sock_un.sun_family = AF_UNIX;
453 strcpy(sock_un.sun_path, socket_path);
454 if (connect(s, (struct sockaddr *)&sock_un,
455 sizeof(sock_un.sun_family) + sizeof(sock_un.sun_path)) != 0)
456 slirp_exit(1);
457 sprintf(buff, "kill none:%d", slirp_socket_unit);
458 write(s, buff, strlen(buff)+1);
459 }
460#endif
461 slirp_exit(0);
462}
5fafdf24
TS
463
464
f0cbd3ec
FB
465void
466snooze()
467{
468 sigset_t s;
469 int i;
5fafdf24 470
f0cbd3ec
FB
471 /* Don't need our data anymore */
472 /* XXX This makes SunOS barf */
473/* brk(0); */
5fafdf24 474
f0cbd3ec
FB
475 /* Close all fd's */
476 for (i = 255; i >= 0; i--)
477 close(i);
5fafdf24 478
f0cbd3ec
FB
479 signal(SIGQUIT, slirp_exit);
480 signal(SIGHUP, snooze_hup);
481 sigemptyset(&s);
5fafdf24 482
f0cbd3ec
FB
483 /* Wait for any signal */
484 sigsuspend(&s);
5fafdf24 485
f0cbd3ec
FB
486 /* Just in case ... */
487 exit(255);
488}
489
490void
491relay(s)
492 int s;
493{
494 char buf[8192];
495 int n;
496 fd_set readfds;
497 struct ttys *ttyp;
5fafdf24 498
f0cbd3ec
FB
499 /* Don't need our data anymore */
500 /* XXX This makes SunOS barf */
501/* brk(0); */
5fafdf24 502
f0cbd3ec
FB
503 signal(SIGQUIT, slirp_exit);
504 signal(SIGHUP, slirp_exit);
505 signal(SIGINT, slirp_exit);
506 signal(SIGTERM, slirp_exit);
5fafdf24 507
f0cbd3ec
FB
508 /* Fudge to get term_raw and term_restore to work */
509 if (NULL == (ttyp = tty_attach (0, slirp_tty))) {
510 lprint ("Error: tty_attach failed in misc.c:relay()\r\n");
511 slirp_exit (1);
512 }
513 ttyp->fd = 0;
514 ttyp->flags |= TTY_CTTY;
515 term_raw(ttyp);
5fafdf24 516
f0cbd3ec
FB
517 while (1) {
518 FD_ZERO(&readfds);
3b46e624 519
f0cbd3ec
FB
520 FD_SET(0, &readfds);
521 FD_SET(s, &readfds);
3b46e624 522
f0cbd3ec 523 n = select(s+1, &readfds, (fd_set *)0, (fd_set *)0, (struct timeval *)0);
3b46e624 524
f0cbd3ec
FB
525 if (n <= 0)
526 slirp_exit(0);
3b46e624 527
f0cbd3ec
FB
528 if (FD_ISSET(0, &readfds)) {
529 n = read(0, buf, 8192);
530 if (n <= 0)
531 slirp_exit(0);
532 n = writen(s, buf, n);
533 if (n <= 0)
534 slirp_exit(0);
535 }
3b46e624 536
f0cbd3ec
FB
537 if (FD_ISSET(s, &readfds)) {
538 n = read(s, buf, 8192);
539 if (n <= 0)
540 slirp_exit(0);
541 n = writen(0, buf, n);
542 if (n <= 0)
543 slirp_exit(0);
544 }
545 }
5fafdf24 546
f0cbd3ec
FB
547 /* Just in case.... */
548 exit(1);
549}
550#endif
551
31a60e22 552#ifdef CONFIG_QEMU
376253ec 553#include "monitor.h"
c9f10306 554
31a60e22
BS
555void lprint(const char *format, ...)
556{
557 va_list args;
558
559 va_start(args, format);
376253ec 560 monitor_vprintf(cur_mon, format, args);
31a60e22
BS
561 va_end(args);
562}
563#else
f0cbd3ec
FB
564int (*lprint_print) _P((void *, const char *, va_list));
565char *lprint_ptr, *lprint_ptr2, **lprint_arg;
566
567void
568#ifdef __STDC__
569lprint(const char *format, ...)
570#else
571lprint(va_alist) va_dcl
572#endif
573{
574 va_list args;
3b46e624 575
f0cbd3ec
FB
576#ifdef __STDC__
577 va_start(args, format);
578#else
579 char *format;
580 va_start(args);
581 format = va_arg(args, char *);
582#endif
583#if 0
584 /* If we're printing to an sbuf, make sure there's enough room */
585 /* XXX +100? */
586 if (lprint_sb) {
587 if ((lprint_ptr - lprint_sb->sb_wptr) >=
588 (lprint_sb->sb_datalen - (strlen(format) + 100))) {
589 int deltaw = lprint_sb->sb_wptr - lprint_sb->sb_data;
590 int deltar = lprint_sb->sb_rptr - lprint_sb->sb_data;
591 int deltap = lprint_ptr - lprint_sb->sb_data;
3b46e624 592
f0cbd3ec
FB
593 lprint_sb->sb_data = (char *)realloc(lprint_sb->sb_data,
594 lprint_sb->sb_datalen + TCP_SNDSPACE);
3b46e624 595
f0cbd3ec
FB
596 /* Adjust all values */
597 lprint_sb->sb_wptr = lprint_sb->sb_data + deltaw;
598 lprint_sb->sb_rptr = lprint_sb->sb_data + deltar;
599 lprint_ptr = lprint_sb->sb_data + deltap;
3b46e624 600
f0cbd3ec
FB
601 lprint_sb->sb_datalen += TCP_SNDSPACE;
602 }
603 }
5fafdf24 604#endif
f0cbd3ec
FB
605 if (lprint_print)
606 lprint_ptr += (*lprint_print)(*lprint_arg, format, args);
5fafdf24 607
f0cbd3ec
FB
608 /* Check if they want output to be logged to file as well */
609 if (lfd) {
5fafdf24 610 /*
f0cbd3ec
FB
611 * Remove \r's
612 * otherwise you'll get ^M all over the file
613 */
614 int len = strlen(format);
615 char *bptr1, *bptr2;
3b46e624 616
f0cbd3ec 617 bptr1 = bptr2 = strdup(format);
3b46e624 618
f0cbd3ec
FB
619 while (len--) {
620 if (*bptr1 == '\r')
621 memcpy(bptr1, bptr1+1, len+1);
622 else
623 bptr1++;
624 }
625 vfprintf(lfd, bptr2, args);
626 free(bptr2);
627 }
628 va_end(args);
629}
630
631void
632add_emu(buff)
633 char *buff;
634{
635 u_int lport, fport;
636 u_int8_t tos = 0, emu = 0;
637 char buff1[256], buff2[256], buff4[128];
638 char *buff3 = buff4;
639 struct emu_t *emup;
640 struct socket *so;
5fafdf24 641
f0cbd3ec
FB
642 if (sscanf(buff, "%256s %256s", buff2, buff1) != 2) {
643 lprint("Error: Bad arguments\r\n");
644 return;
645 }
5fafdf24 646
f0cbd3ec
FB
647 if (sscanf(buff1, "%d:%d", &lport, &fport) != 2) {
648 lport = 0;
649 if (sscanf(buff1, "%d", &fport) != 1) {
650 lprint("Error: Bad first argument\r\n");
651 return;
652 }
653 }
5fafdf24 654
f0cbd3ec
FB
655 if (sscanf(buff2, "%128[^:]:%128s", buff1, buff3) != 2) {
656 buff3 = 0;
657 if (sscanf(buff2, "%256s", buff1) != 1) {
658 lprint("Error: Bad second argument\r\n");
659 return;
660 }
661 }
5fafdf24 662
f0cbd3ec
FB
663 if (buff3) {
664 if (strcmp(buff3, "lowdelay") == 0)
665 tos = IPTOS_LOWDELAY;
666 else if (strcmp(buff3, "throughput") == 0)
667 tos = IPTOS_THROUGHPUT;
668 else {
669 lprint("Error: Expecting \"lowdelay\"/\"throughput\"\r\n");
670 return;
671 }
672 }
5fafdf24 673
f0cbd3ec
FB
674 if (strcmp(buff1, "ftp") == 0)
675 emu = EMU_FTP;
676 else if (strcmp(buff1, "irc") == 0)
677 emu = EMU_IRC;
678 else if (strcmp(buff1, "none") == 0)
679 emu = EMU_NONE; /* ie: no emulation */
680 else {
681 lprint("Error: Unknown service\r\n");
682 return;
683 }
5fafdf24 684
f0cbd3ec
FB
685 /* First, check that it isn't already emulated */
686 for (emup = tcpemu; emup; emup = emup->next) {
687 if (emup->lport == lport && emup->fport == fport) {
688 lprint("Error: port already emulated\r\n");
689 return;
690 }
691 }
5fafdf24 692
f0cbd3ec
FB
693 /* link it */
694 emup = (struct emu_t *)malloc(sizeof (struct emu_t));
695 emup->lport = (u_int16_t)lport;
696 emup->fport = (u_int16_t)fport;
697 emup->tos = tos;
698 emup->emu = emu;
699 emup->next = tcpemu;
700 tcpemu = emup;
5fafdf24 701
f0cbd3ec
FB
702 /* And finally, mark all current sessions, if any, as being emulated */
703 for (so = tcb.so_next; so != &tcb; so = so->so_next) {
704 if ((lport && lport == ntohs(so->so_lport)) ||
705 (fport && fport == ntohs(so->so_fport))) {
706 if (emu)
707 so->so_emu = emu;
708 if (tos)
709 so->so_iptos = tos;
710 }
711 }
5fafdf24 712
f0cbd3ec
FB
713 lprint("Adding emulation for %s to port %d/%d\r\n", buff1, emup->lport, emup->fport);
714}
31a60e22 715#endif
f0cbd3ec
FB
716
717#ifdef BAD_SPRINTF
718
719#undef vsprintf
720#undef sprintf
721
722/*
723 * Some BSD-derived systems have a sprintf which returns char *
724 */
725
726int
727vsprintf_len(string, format, args)
728 char *string;
729 const char *format;
730 va_list args;
731{
732 vsprintf(string, format, args);
733 return strlen(string);
734}
735
736int
737#ifdef __STDC__
738sprintf_len(char *string, const char *format, ...)
739#else
740sprintf_len(va_alist) va_dcl
741#endif
742{
743 va_list args;
744#ifdef __STDC__
745 va_start(args, format);
746#else
747 char *string;
748 char *format;
749 va_start(args);
750 string = va_arg(args, char *);
751 format = va_arg(args, char *);
752#endif
753 vsprintf(string, format, args);
754 return strlen(string);
755}
756
757#endif
758
759void
511d2b14 760u_sleep(int usec)
f0cbd3ec
FB
761{
762 struct timeval t;
763 fd_set fdset;
5fafdf24 764
f0cbd3ec 765 FD_ZERO(&fdset);
5fafdf24 766
f0cbd3ec
FB
767 t.tv_sec = 0;
768 t.tv_usec = usec * 1000;
5fafdf24 769
f0cbd3ec
FB
770 select(0, &fdset, &fdset, &fdset, &t);
771}
772
773/*
774 * Set fd blocking and non-blocking
775 */
776
777void
511d2b14 778fd_nonblock(int fd)
f0cbd3ec
FB
779{
780#ifdef FIONBIO
b9e82a59 781#ifdef _WIN32
c5b76b38 782 unsigned long opt = 1;
b9e82a59
BS
783#else
784 int opt = 1;
785#endif
5fafdf24 786
379ff53d 787 ioctlsocket(fd, FIONBIO, &opt);
f0cbd3ec
FB
788#else
789 int opt;
5fafdf24 790
f0cbd3ec
FB
791 opt = fcntl(fd, F_GETFL, 0);
792 opt |= O_NONBLOCK;
793 fcntl(fd, F_SETFL, opt);
794#endif
795}
796
797void
511d2b14 798fd_block(int fd)
f0cbd3ec
FB
799{
800#ifdef FIONBIO
c5b76b38
BS
801#ifdef _WIN32
802 unsigned long opt = 0;
803#else
f0cbd3ec 804 int opt = 0;
c5b76b38 805#endif
5fafdf24 806
379ff53d 807 ioctlsocket(fd, FIONBIO, &opt);
f0cbd3ec
FB
808#else
809 int opt;
5fafdf24 810
f0cbd3ec
FB
811 opt = fcntl(fd, F_GETFL, 0);
812 opt &= ~O_NONBLOCK;
813 fcntl(fd, F_SETFL, opt);
814#endif
815}
816
817
818#if 0
819/*
820 * invoke RSH
821 */
822int
823rsh_exec(so,ns, user, host, args)
824 struct socket *so;
825 struct socket *ns;
826 char *user;
827 char *host;
828 char *args;
829{
830 int fd[2];
831 int fd0[2];
832 int s;
833 char buff[256];
5fafdf24 834
f0cbd3ec
FB
835 DEBUG_CALL("rsh_exec");
836 DEBUG_ARG("so = %lx", (long)so);
5fafdf24 837
f0cbd3ec
FB
838 if (pipe(fd)<0) {
839 lprint("Error: pipe failed: %s\n", strerror(errno));
840 return 0;
841 }
842/* #ifdef HAVE_SOCKETPAIR */
843#if 1
844 if (socketpair(PF_UNIX,SOCK_STREAM,0, fd0) == -1) {
845 close(fd[0]);
846 close(fd[1]);
847 lprint("Error: openpty failed: %s\n", strerror(errno));
848 return 0;
849 }
850#else
f3ff649d 851 if (slirp_openpty(&fd0[0], &fd0[1]) == -1) {
f0cbd3ec
FB
852 close(fd[0]);
853 close(fd[1]);
854 lprint("Error: openpty failed: %s\n", strerror(errno));
855 return 0;
856 }
857#endif
5fafdf24 858
f0cbd3ec
FB
859 switch(fork()) {
860 case -1:
861 lprint("Error: fork failed: %s\n", strerror(errno));
862 close(fd[0]);
863 close(fd[1]);
864 close(fd0[0]);
865 close(fd0[1]);
866 return 0;
3b46e624 867
f0cbd3ec
FB
868 case 0:
869 close(fd[0]);
870 close(fd0[0]);
3b46e624 871
f0cbd3ec
FB
872 /* Set the DISPLAY */
873 if (x_port >= 0) {
874#ifdef HAVE_SETENV
875 sprintf(buff, "%s:%d.%d", inet_ntoa(our_addr), x_port, x_screen);
876 setenv("DISPLAY", buff, 1);
877#else
878 sprintf(buff, "DISPLAY=%s:%d.%d", inet_ntoa(our_addr), x_port, x_screen);
879 putenv(buff);
880#endif
881 }
3b46e624 882
f0cbd3ec
FB
883 dup2(fd0[1], 0);
884 dup2(fd0[1], 1);
885 dup2(fd[1], 2);
886 for (s = 3; s <= 255; s++)
887 close(s);
3b46e624 888
f0cbd3ec 889 execlp("rsh","rsh","-l", user, host, args, NULL);
3b46e624 890
f0cbd3ec 891 /* Ooops, failed, let's tell the user why */
3b46e624 892
5fafdf24 893 sprintf(buff, "Error: execlp of %s failed: %s\n",
f0cbd3ec
FB
894 "rsh", strerror(errno));
895 write(2, buff, strlen(buff)+1);
896 close(0); close(1); close(2); /* XXX */
897 exit(1);
3b46e624 898
f0cbd3ec
FB
899 default:
900 close(fd[1]);
901 close(fd0[1]);
902 ns->s=fd[0];
903 so->s=fd0[0];
3b46e624 904
f0cbd3ec
FB
905 return 1;
906 }
907}
908#endif