]> git.proxmox.com Git - qemu.git/blame - slirp/misc.c
Use const and static as needed, disable unused code
[qemu.git] / slirp / misc.c
CommitLineData
f0cbd3ec
FB
1/*
2 * Copyright (c) 1995 Danny Gasparovski.
5fafdf24 3 *
f0cbd3ec
FB
4 * Please read the file COPYRIGHT for the
5 * terms and conditions of the copyright.
6 */
7
8#define WANT_SYS_IOCTL_H
9#include <slirp.h>
10
9634d903 11u_int curtime, time_fasttimo, last_slowtimo;
f0cbd3ec
FB
12
13#if 0
14int x_port = -1;
15int x_display = 0;
16int x_screen = 0;
17
18int
19show_x(buff, inso)
20 char *buff;
21 struct socket *inso;
22{
23 if (x_port < 0) {
24 lprint("X Redir: X not being redirected.\r\n");
25 } else {
26 lprint("X Redir: In sh/bash/zsh/etc. type: DISPLAY=%s:%d.%d; export DISPLAY\r\n",
27 inet_ntoa(our_addr), x_port, x_screen);
28 lprint("X Redir: In csh/tcsh/etc. type: setenv DISPLAY %s:%d.%d\r\n",
29 inet_ntoa(our_addr), x_port, x_screen);
30 if (x_display)
31 lprint("X Redir: Redirecting to display %d\r\n", x_display);
32 }
5fafdf24 33
f0cbd3ec
FB
34 return CFG_OK;
35}
36
37
38/*
39 * XXX Allow more than one X redirection?
40 */
41void
42redir_x(inaddr, start_port, display, screen)
43 u_int32_t inaddr;
44 int start_port;
45 int display;
46 int screen;
47{
48 int i;
5fafdf24 49
f0cbd3ec
FB
50 if (x_port >= 0) {
51 lprint("X Redir: X already being redirected.\r\n");
52 show_x(0, 0);
53 } else {
54 for (i = 6001 + (start_port-1); i <= 6100; i++) {
55 if (solisten(htons(i), inaddr, htons(6000 + display), 0)) {
56 /* Success */
57 x_port = i - 6000;
58 x_display = display;
59 x_screen = screen;
60 show_x(0, 0);
61 return;
62 }
63 }
64 lprint("X Redir: Error: Couldn't redirect a port for X. Weird.\r\n");
65 }
66}
67#endif
68
69#ifndef HAVE_INET_ATON
70int
71inet_aton(cp, ia)
72 const char *cp;
73 struct in_addr *ia;
74{
75 u_int32_t addr = inet_addr(cp);
76 if (addr == 0xffffffff)
77 return 0;
78 ia->s_addr = addr;
79 return 1;
80}
81#endif
82
83/*
84 * Get our IP address and put it in our_addr
85 */
86void
87getouraddr()
88{
89 char buff[256];
f4e15b4b 90 struct hostent *he = NULL;
5fafdf24 91
f4e15b4b
PB
92 if (gethostname(buff,256) == 0)
93 he = gethostbyname(buff);
94 if (he)
95 our_addr = *(struct in_addr *)he->h_addr;
8dbca8dd
FB
96 if (our_addr.s_addr == 0)
97 our_addr.s_addr = loopback_addr.s_addr;
f0cbd3ec
FB
98}
99
100#if SIZEOF_CHAR_P == 8
101
102struct quehead_32 {
103 u_int32_t qh_link;
104 u_int32_t qh_rlink;
105};
106
107inline void
108insque_32(a, b)
109 void *a;
110 void *b;
111{
112 register struct quehead_32 *element = (struct quehead_32 *) a;
113 register struct quehead_32 *head = (struct quehead_32 *) b;
114 element->qh_link = head->qh_link;
115 head->qh_link = (u_int32_t)element;
116 element->qh_rlink = (u_int32_t)head;
117 ((struct quehead_32 *)(element->qh_link))->qh_rlink
118 = (u_int32_t)element;
119}
120
121inline void
122remque_32(a)
123 void *a;
124{
125 register struct quehead_32 *element = (struct quehead_32 *) a;
126 ((struct quehead_32 *)(element->qh_link))->qh_rlink = element->qh_rlink;
127 ((struct quehead_32 *)(element->qh_rlink))->qh_link = element->qh_link;
128 element->qh_rlink = 0;
129}
130
131#endif /* SIZEOF_CHAR_P == 8 */
132
133struct quehead {
134 struct quehead *qh_link;
135 struct quehead *qh_rlink;
136};
137
138inline void
139insque(a, b)
140 void *a, *b;
141{
142 register struct quehead *element = (struct quehead *) a;
143 register struct quehead *head = (struct quehead *) b;
144 element->qh_link = head->qh_link;
145 head->qh_link = (struct quehead *)element;
146 element->qh_rlink = (struct quehead *)head;
147 ((struct quehead *)(element->qh_link))->qh_rlink
148 = (struct quehead *)element;
149}
150
151inline void
152remque(a)
153 void *a;
154{
155 register struct quehead *element = (struct quehead *) a;
156 ((struct quehead *)(element->qh_link))->qh_rlink = element->qh_rlink;
157 ((struct quehead *)(element->qh_rlink))->qh_link = element->qh_link;
158 element->qh_rlink = NULL;
159 /* element->qh_link = NULL; TCP FIN1 crashes if you do this. Why ? */
160}
161
162/* #endif */
163
164
165int
166add_exec(ex_ptr, do_pty, exec, addr, port)
167 struct ex_list **ex_ptr;
168 int do_pty;
169 char *exec;
170 int addr;
171 int port;
172{
173 struct ex_list *tmp_ptr;
5fafdf24 174
f0cbd3ec
FB
175 /* First, check if the port is "bound" */
176 for (tmp_ptr = *ex_ptr; tmp_ptr; tmp_ptr = tmp_ptr->ex_next) {
177 if (port == tmp_ptr->ex_fport && addr == tmp_ptr->ex_addr)
178 return -1;
179 }
5fafdf24 180
f0cbd3ec
FB
181 tmp_ptr = *ex_ptr;
182 *ex_ptr = (struct ex_list *)malloc(sizeof(struct ex_list));
183 (*ex_ptr)->ex_fport = port;
184 (*ex_ptr)->ex_addr = addr;
185 (*ex_ptr)->ex_pty = do_pty;
186 (*ex_ptr)->ex_exec = strdup(exec);
187 (*ex_ptr)->ex_next = tmp_ptr;
188 return 0;
189}
190
191#ifndef HAVE_STRERROR
192
193/*
194 * For systems with no strerror
195 */
196
197extern int sys_nerr;
198extern char *sys_errlist[];
199
200char *
201strerror(error)
202 int error;
203{
204 if (error < sys_nerr)
205 return sys_errlist[error];
206 else
207 return "Unknown error.";
208}
209
210#endif
211
212
a3d4af03
FB
213#ifdef _WIN32
214
215int
9634d903 216fork_exec(struct socket *so, const char *ex, int do_pty)
a3d4af03
FB
217{
218 /* not implemented */
219 return 0;
220}
221
222#else
223
9634d903 224#ifndef CONFIG_QEMU
f0cbd3ec 225int
f3ff649d
FB
226slirp_openpty(amaster, aslave)
227 int *amaster, *aslave;
f0cbd3ec
FB
228{
229 register int master, slave;
230
231#ifdef HAVE_GRANTPT
232 char *ptr;
5fafdf24 233
f0cbd3ec
FB
234 if ((master = open("/dev/ptmx", O_RDWR)) < 0 ||
235 grantpt(master) < 0 ||
236 unlockpt(master) < 0 ||
237 (ptr = ptsname(master)) == NULL) {
238 close(master);
239 return -1;
240 }
5fafdf24 241
f0cbd3ec
FB
242 if ((slave = open(ptr, O_RDWR)) < 0 ||
243 ioctl(slave, I_PUSH, "ptem") < 0 ||
244 ioctl(slave, I_PUSH, "ldterm") < 0 ||
245 ioctl(slave, I_PUSH, "ttcompat") < 0) {
246 close(master);
247 close(slave);
248 return -1;
249 }
5fafdf24 250
f0cbd3ec
FB
251 *amaster = master;
252 *aslave = slave;
253 return 0;
5fafdf24 254
f0cbd3ec 255#else
5fafdf24 256
f0cbd3ec
FB
257 static char line[] = "/dev/ptyXX";
258 register const char *cp1, *cp2;
5fafdf24 259
f0cbd3ec
FB
260 for (cp1 = "pqrsPQRS"; *cp1; cp1++) {
261 line[8] = *cp1;
262 for (cp2 = "0123456789abcdefghijklmnopqrstuv"; *cp2; cp2++) {
263 line[9] = *cp2;
264 if ((master = open(line, O_RDWR, 0)) == -1) {
265 if (errno == ENOENT)
266 return (-1); /* out of ptys */
267 } else {
268 line[5] = 't';
269 /* These will fail */
270 (void) chown(line, getuid(), 0);
271 (void) chmod(line, S_IRUSR|S_IWUSR|S_IWGRP);
272#ifdef HAVE_REVOKE
273 (void) revoke(line);
274#endif
275 if ((slave = open(line, O_RDWR, 0)) != -1) {
276 *amaster = master;
277 *aslave = slave;
278 return 0;
279 }
280 (void) close(master);
281 line[5] = 'p';
282 }
283 }
284 }
285 errno = ENOENT; /* out of ptys */
286 return (-1);
287#endif
288}
9634d903 289#endif
f0cbd3ec
FB
290
291/*
292 * XXX This is ugly
293 * We create and bind a socket, then fork off to another
294 * process, which connects to this socket, after which we
295 * exec the wanted program. If something (strange) happens,
296 * the accept() call could block us forever.
5fafdf24 297 *
f0cbd3ec
FB
298 * do_pty = 0 Fork/exec inetd style
299 * do_pty = 1 Fork/exec using slirp.telnetd
300 * do_ptr = 2 Fork/exec using pty
301 */
302int
9634d903 303fork_exec(struct socket *so, const char *ex, int do_pty)
f0cbd3ec
FB
304{
305 int s;
306 struct sockaddr_in addr;
307 int addrlen = sizeof(addr);
308 int opt;
9634d903 309 int master = -1;
f0cbd3ec 310 char *argv[256];
a3d4af03 311#if 0
f0cbd3ec 312 char buff[256];
a3d4af03 313#endif
f0cbd3ec
FB
314 /* don't want to clobber the original */
315 char *bptr;
9634d903 316 const char *curarg;
7b91a172 317 int c, i, ret;
5fafdf24 318
f0cbd3ec
FB
319 DEBUG_CALL("fork_exec");
320 DEBUG_ARG("so = %lx", (long)so);
321 DEBUG_ARG("ex = %lx", (long)ex);
322 DEBUG_ARG("do_pty = %lx", (long)do_pty);
5fafdf24 323
f0cbd3ec 324 if (do_pty == 2) {
9634d903 325#if 0
f3ff649d 326 if (slirp_openpty(&master, &s) == -1) {
f0cbd3ec
FB
327 lprint("Error: openpty failed: %s\n", strerror(errno));
328 return 0;
329 }
9634d903 330#endif
f0cbd3ec
FB
331 } else {
332 addr.sin_family = AF_INET;
333 addr.sin_port = 0;
334 addr.sin_addr.s_addr = INADDR_ANY;
3b46e624 335
f0cbd3ec
FB
336 if ((s = socket(AF_INET, SOCK_STREAM, 0)) < 0 ||
337 bind(s, (struct sockaddr *)&addr, addrlen) < 0 ||
338 listen(s, 1) < 0) {
339 lprint("Error: inet socket: %s\n", strerror(errno));
379ff53d 340 closesocket(s);
3b46e624 341
f0cbd3ec
FB
342 return 0;
343 }
344 }
5fafdf24 345
f0cbd3ec
FB
346 switch(fork()) {
347 case -1:
348 lprint("Error: fork failed: %s\n", strerror(errno));
349 close(s);
350 if (do_pty == 2)
351 close(master);
352 return 0;
3b46e624 353
f0cbd3ec
FB
354 case 0:
355 /* Set the DISPLAY */
356 if (do_pty == 2) {
357 (void) close(master);
358#ifdef TIOCSCTTY /* XXXXX */
359 (void) setsid();
360 ioctl(s, TIOCSCTTY, (char *)NULL);
361#endif
362 } else {
363 getsockname(s, (struct sockaddr *)&addr, &addrlen);
364 close(s);
365 /*
366 * Connect to the socket
367 * XXX If any of these fail, we're in trouble!
368 */
369 s = socket(AF_INET, SOCK_STREAM, 0);
370 addr.sin_addr = loopback_addr;
7b91a172
FB
371 do {
372 ret = connect(s, (struct sockaddr *)&addr, addrlen);
373 } while (ret < 0 && errno == EINTR);
f0cbd3ec 374 }
3b46e624 375
a3d4af03 376#if 0
f0cbd3ec
FB
377 if (x_port >= 0) {
378#ifdef HAVE_SETENV
379 sprintf(buff, "%s:%d.%d", inet_ntoa(our_addr), x_port, x_screen);
380 setenv("DISPLAY", buff, 1);
381#else
382 sprintf(buff, "DISPLAY=%s:%d.%d", inet_ntoa(our_addr), x_port, x_screen);
383 putenv(buff);
384#endif
385 }
5fafdf24 386#endif
f0cbd3ec
FB
387 dup2(s, 0);
388 dup2(s, 1);
389 dup2(s, 2);
9634d903 390 for (s = getdtablesize() - 1; s >= 3; s--)
f0cbd3ec 391 close(s);
3b46e624 392
f0cbd3ec
FB
393 i = 0;
394 bptr = strdup(ex); /* No need to free() this */
395 if (do_pty == 1) {
396 /* Setup "slirp.telnetd -x" */
397 argv[i++] = "slirp.telnetd";
398 argv[i++] = "-x";
399 argv[i++] = bptr;
400 } else
401 do {
402 /* Change the string into argv[] */
403 curarg = bptr;
404 while (*bptr != ' ' && *bptr != (char)0)
405 bptr++;
406 c = *bptr;
407 *bptr++ = (char)0;
408 argv[i++] = strdup(curarg);
409 } while (c);
3b46e624 410
f0cbd3ec
FB
411 argv[i] = 0;
412 execvp(argv[0], argv);
3b46e624 413
f0cbd3ec
FB
414 /* Ooops, failed, let's tell the user why */
415 {
416 char buff[256];
3b46e624 417
5fafdf24 418 sprintf(buff, "Error: execvp of %s failed: %s\n",
f0cbd3ec
FB
419 argv[0], strerror(errno));
420 write(2, buff, strlen(buff)+1);
421 }
422 close(0); close(1); close(2); /* XXX */
423 exit(1);
3b46e624 424
f0cbd3ec
FB
425 default:
426 if (do_pty == 2) {
427 close(s);
428 so->s = master;
429 } else {
430 /*
431 * XXX this could block us...
432 * XXX Should set a timer here, and if accept() doesn't
433 * return after X seconds, declare it a failure
434 * The only reason this will block forever is if socket()
435 * of connect() fail in the child process
436 */
7b91a172
FB
437 do {
438 so->s = accept(s, (struct sockaddr *)&addr, &addrlen);
439 } while (so->s < 0 && errno == EINTR);
440 closesocket(s);
f0cbd3ec
FB
441 opt = 1;
442 setsockopt(so->s,SOL_SOCKET,SO_REUSEADDR,(char *)&opt,sizeof(int));
443 opt = 1;
444 setsockopt(so->s,SOL_SOCKET,SO_OOBINLINE,(char *)&opt,sizeof(int));
445 }
446 fd_nonblock(so->s);
3b46e624 447
f0cbd3ec
FB
448 /* Append the telnet options now */
449 if (so->so_m != 0 && do_pty == 1) {
450 sbappend(so, so->so_m);
451 so->so_m = 0;
452 }
3b46e624 453
f0cbd3ec
FB
454 return 1;
455 }
456}
457#endif
458
459#ifndef HAVE_STRDUP
460char *
461strdup(str)
462 const char *str;
463{
464 char *bptr;
5fafdf24 465
f0cbd3ec
FB
466 bptr = (char *)malloc(strlen(str)+1);
467 strcpy(bptr, str);
5fafdf24 468
f0cbd3ec
FB
469 return bptr;
470}
471#endif
472
473#if 0
474void
475snooze_hup(num)
476 int num;
477{
478 int s, ret;
479#ifndef NO_UNIX_SOCKETS
480 struct sockaddr_un sock_un;
481#endif
482 struct sockaddr_in sock_in;
483 char buff[256];
5fafdf24 484
f0cbd3ec
FB
485 ret = -1;
486 if (slirp_socket_passwd) {
487 s = socket(AF_INET, SOCK_STREAM, 0);
488 if (s < 0)
489 slirp_exit(1);
490 sock_in.sin_family = AF_INET;
491 sock_in.sin_addr.s_addr = slirp_socket_addr;
492 sock_in.sin_port = htons(slirp_socket_port);
493 if (connect(s, (struct sockaddr *)&sock_in, sizeof(sock_in)) != 0)
494 slirp_exit(1); /* just exit...*/
495 sprintf(buff, "kill %s:%d", slirp_socket_passwd, slirp_socket_unit);
496 write(s, buff, strlen(buff)+1);
497 }
498#ifndef NO_UNIX_SOCKETS
499 else {
500 s = socket(AF_UNIX, SOCK_STREAM, 0);
501 if (s < 0)
502 slirp_exit(1);
503 sock_un.sun_family = AF_UNIX;
504 strcpy(sock_un.sun_path, socket_path);
505 if (connect(s, (struct sockaddr *)&sock_un,
506 sizeof(sock_un.sun_family) + sizeof(sock_un.sun_path)) != 0)
507 slirp_exit(1);
508 sprintf(buff, "kill none:%d", slirp_socket_unit);
509 write(s, buff, strlen(buff)+1);
510 }
511#endif
512 slirp_exit(0);
513}
5fafdf24
TS
514
515
f0cbd3ec
FB
516void
517snooze()
518{
519 sigset_t s;
520 int i;
5fafdf24 521
f0cbd3ec
FB
522 /* Don't need our data anymore */
523 /* XXX This makes SunOS barf */
524/* brk(0); */
5fafdf24 525
f0cbd3ec
FB
526 /* Close all fd's */
527 for (i = 255; i >= 0; i--)
528 close(i);
5fafdf24 529
f0cbd3ec
FB
530 signal(SIGQUIT, slirp_exit);
531 signal(SIGHUP, snooze_hup);
532 sigemptyset(&s);
5fafdf24 533
f0cbd3ec
FB
534 /* Wait for any signal */
535 sigsuspend(&s);
5fafdf24 536
f0cbd3ec
FB
537 /* Just in case ... */
538 exit(255);
539}
540
541void
542relay(s)
543 int s;
544{
545 char buf[8192];
546 int n;
547 fd_set readfds;
548 struct ttys *ttyp;
5fafdf24 549
f0cbd3ec
FB
550 /* Don't need our data anymore */
551 /* XXX This makes SunOS barf */
552/* brk(0); */
5fafdf24 553
f0cbd3ec
FB
554 signal(SIGQUIT, slirp_exit);
555 signal(SIGHUP, slirp_exit);
556 signal(SIGINT, slirp_exit);
557 signal(SIGTERM, slirp_exit);
5fafdf24 558
f0cbd3ec
FB
559 /* Fudge to get term_raw and term_restore to work */
560 if (NULL == (ttyp = tty_attach (0, slirp_tty))) {
561 lprint ("Error: tty_attach failed in misc.c:relay()\r\n");
562 slirp_exit (1);
563 }
564 ttyp->fd = 0;
565 ttyp->flags |= TTY_CTTY;
566 term_raw(ttyp);
5fafdf24 567
f0cbd3ec
FB
568 while (1) {
569 FD_ZERO(&readfds);
3b46e624 570
f0cbd3ec
FB
571 FD_SET(0, &readfds);
572 FD_SET(s, &readfds);
3b46e624 573
f0cbd3ec 574 n = select(s+1, &readfds, (fd_set *)0, (fd_set *)0, (struct timeval *)0);
3b46e624 575
f0cbd3ec
FB
576 if (n <= 0)
577 slirp_exit(0);
3b46e624 578
f0cbd3ec
FB
579 if (FD_ISSET(0, &readfds)) {
580 n = read(0, buf, 8192);
581 if (n <= 0)
582 slirp_exit(0);
583 n = writen(s, buf, n);
584 if (n <= 0)
585 slirp_exit(0);
586 }
3b46e624 587
f0cbd3ec
FB
588 if (FD_ISSET(s, &readfds)) {
589 n = read(s, buf, 8192);
590 if (n <= 0)
591 slirp_exit(0);
592 n = writen(0, buf, n);
593 if (n <= 0)
594 slirp_exit(0);
595 }
596 }
5fafdf24 597
f0cbd3ec
FB
598 /* Just in case.... */
599 exit(1);
600}
601#endif
602
31a60e22
BS
603#ifdef CONFIG_QEMU
604void lprint(const char *format, ...)
605{
606 va_list args;
607
608 va_start(args, format);
609 term_vprintf(format, args);
610 va_end(args);
611}
612#else
f0cbd3ec
FB
613int (*lprint_print) _P((void *, const char *, va_list));
614char *lprint_ptr, *lprint_ptr2, **lprint_arg;
615
616void
617#ifdef __STDC__
618lprint(const char *format, ...)
619#else
620lprint(va_alist) va_dcl
621#endif
622{
623 va_list args;
3b46e624 624
f0cbd3ec
FB
625#ifdef __STDC__
626 va_start(args, format);
627#else
628 char *format;
629 va_start(args);
630 format = va_arg(args, char *);
631#endif
632#if 0
633 /* If we're printing to an sbuf, make sure there's enough room */
634 /* XXX +100? */
635 if (lprint_sb) {
636 if ((lprint_ptr - lprint_sb->sb_wptr) >=
637 (lprint_sb->sb_datalen - (strlen(format) + 100))) {
638 int deltaw = lprint_sb->sb_wptr - lprint_sb->sb_data;
639 int deltar = lprint_sb->sb_rptr - lprint_sb->sb_data;
640 int deltap = lprint_ptr - lprint_sb->sb_data;
3b46e624 641
f0cbd3ec
FB
642 lprint_sb->sb_data = (char *)realloc(lprint_sb->sb_data,
643 lprint_sb->sb_datalen + TCP_SNDSPACE);
3b46e624 644
f0cbd3ec
FB
645 /* Adjust all values */
646 lprint_sb->sb_wptr = lprint_sb->sb_data + deltaw;
647 lprint_sb->sb_rptr = lprint_sb->sb_data + deltar;
648 lprint_ptr = lprint_sb->sb_data + deltap;
3b46e624 649
f0cbd3ec
FB
650 lprint_sb->sb_datalen += TCP_SNDSPACE;
651 }
652 }
5fafdf24 653#endif
f0cbd3ec
FB
654 if (lprint_print)
655 lprint_ptr += (*lprint_print)(*lprint_arg, format, args);
5fafdf24 656
f0cbd3ec
FB
657 /* Check if they want output to be logged to file as well */
658 if (lfd) {
5fafdf24 659 /*
f0cbd3ec
FB
660 * Remove \r's
661 * otherwise you'll get ^M all over the file
662 */
663 int len = strlen(format);
664 char *bptr1, *bptr2;
3b46e624 665
f0cbd3ec 666 bptr1 = bptr2 = strdup(format);
3b46e624 667
f0cbd3ec
FB
668 while (len--) {
669 if (*bptr1 == '\r')
670 memcpy(bptr1, bptr1+1, len+1);
671 else
672 bptr1++;
673 }
674 vfprintf(lfd, bptr2, args);
675 free(bptr2);
676 }
677 va_end(args);
678}
679
680void
681add_emu(buff)
682 char *buff;
683{
684 u_int lport, fport;
685 u_int8_t tos = 0, emu = 0;
686 char buff1[256], buff2[256], buff4[128];
687 char *buff3 = buff4;
688 struct emu_t *emup;
689 struct socket *so;
5fafdf24 690
f0cbd3ec
FB
691 if (sscanf(buff, "%256s %256s", buff2, buff1) != 2) {
692 lprint("Error: Bad arguments\r\n");
693 return;
694 }
5fafdf24 695
f0cbd3ec
FB
696 if (sscanf(buff1, "%d:%d", &lport, &fport) != 2) {
697 lport = 0;
698 if (sscanf(buff1, "%d", &fport) != 1) {
699 lprint("Error: Bad first argument\r\n");
700 return;
701 }
702 }
5fafdf24 703
f0cbd3ec
FB
704 if (sscanf(buff2, "%128[^:]:%128s", buff1, buff3) != 2) {
705 buff3 = 0;
706 if (sscanf(buff2, "%256s", buff1) != 1) {
707 lprint("Error: Bad second argument\r\n");
708 return;
709 }
710 }
5fafdf24 711
f0cbd3ec
FB
712 if (buff3) {
713 if (strcmp(buff3, "lowdelay") == 0)
714 tos = IPTOS_LOWDELAY;
715 else if (strcmp(buff3, "throughput") == 0)
716 tos = IPTOS_THROUGHPUT;
717 else {
718 lprint("Error: Expecting \"lowdelay\"/\"throughput\"\r\n");
719 return;
720 }
721 }
5fafdf24 722
f0cbd3ec
FB
723 if (strcmp(buff1, "ftp") == 0)
724 emu = EMU_FTP;
725 else if (strcmp(buff1, "irc") == 0)
726 emu = EMU_IRC;
727 else if (strcmp(buff1, "none") == 0)
728 emu = EMU_NONE; /* ie: no emulation */
729 else {
730 lprint("Error: Unknown service\r\n");
731 return;
732 }
5fafdf24 733
f0cbd3ec
FB
734 /* First, check that it isn't already emulated */
735 for (emup = tcpemu; emup; emup = emup->next) {
736 if (emup->lport == lport && emup->fport == fport) {
737 lprint("Error: port already emulated\r\n");
738 return;
739 }
740 }
5fafdf24 741
f0cbd3ec
FB
742 /* link it */
743 emup = (struct emu_t *)malloc(sizeof (struct emu_t));
744 emup->lport = (u_int16_t)lport;
745 emup->fport = (u_int16_t)fport;
746 emup->tos = tos;
747 emup->emu = emu;
748 emup->next = tcpemu;
749 tcpemu = emup;
5fafdf24 750
f0cbd3ec
FB
751 /* And finally, mark all current sessions, if any, as being emulated */
752 for (so = tcb.so_next; so != &tcb; so = so->so_next) {
753 if ((lport && lport == ntohs(so->so_lport)) ||
754 (fport && fport == ntohs(so->so_fport))) {
755 if (emu)
756 so->so_emu = emu;
757 if (tos)
758 so->so_iptos = tos;
759 }
760 }
5fafdf24 761
f0cbd3ec
FB
762 lprint("Adding emulation for %s to port %d/%d\r\n", buff1, emup->lport, emup->fport);
763}
31a60e22 764#endif
f0cbd3ec
FB
765
766#ifdef BAD_SPRINTF
767
768#undef vsprintf
769#undef sprintf
770
771/*
772 * Some BSD-derived systems have a sprintf which returns char *
773 */
774
775int
776vsprintf_len(string, format, args)
777 char *string;
778 const char *format;
779 va_list args;
780{
781 vsprintf(string, format, args);
782 return strlen(string);
783}
784
785int
786#ifdef __STDC__
787sprintf_len(char *string, const char *format, ...)
788#else
789sprintf_len(va_alist) va_dcl
790#endif
791{
792 va_list args;
793#ifdef __STDC__
794 va_start(args, format);
795#else
796 char *string;
797 char *format;
798 va_start(args);
799 string = va_arg(args, char *);
800 format = va_arg(args, char *);
801#endif
802 vsprintf(string, format, args);
803 return strlen(string);
804}
805
806#endif
807
808void
809u_sleep(usec)
810 int usec;
811{
812 struct timeval t;
813 fd_set fdset;
5fafdf24 814
f0cbd3ec 815 FD_ZERO(&fdset);
5fafdf24 816
f0cbd3ec
FB
817 t.tv_sec = 0;
818 t.tv_usec = usec * 1000;
5fafdf24 819
f0cbd3ec
FB
820 select(0, &fdset, &fdset, &fdset, &t);
821}
822
823/*
824 * Set fd blocking and non-blocking
825 */
826
827void
828fd_nonblock(fd)
829 int fd;
830{
831#ifdef FIONBIO
832 int opt = 1;
5fafdf24 833
379ff53d 834 ioctlsocket(fd, FIONBIO, &opt);
f0cbd3ec
FB
835#else
836 int opt;
5fafdf24 837
f0cbd3ec
FB
838 opt = fcntl(fd, F_GETFL, 0);
839 opt |= O_NONBLOCK;
840 fcntl(fd, F_SETFL, opt);
841#endif
842}
843
844void
845fd_block(fd)
846 int fd;
847{
848#ifdef FIONBIO
849 int opt = 0;
5fafdf24 850
379ff53d 851 ioctlsocket(fd, FIONBIO, &opt);
f0cbd3ec
FB
852#else
853 int opt;
5fafdf24 854
f0cbd3ec
FB
855 opt = fcntl(fd, F_GETFL, 0);
856 opt &= ~O_NONBLOCK;
857 fcntl(fd, F_SETFL, opt);
858#endif
859}
860
861
862#if 0
863/*
864 * invoke RSH
865 */
866int
867rsh_exec(so,ns, user, host, args)
868 struct socket *so;
869 struct socket *ns;
870 char *user;
871 char *host;
872 char *args;
873{
874 int fd[2];
875 int fd0[2];
876 int s;
877 char buff[256];
5fafdf24 878
f0cbd3ec
FB
879 DEBUG_CALL("rsh_exec");
880 DEBUG_ARG("so = %lx", (long)so);
5fafdf24 881
f0cbd3ec
FB
882 if (pipe(fd)<0) {
883 lprint("Error: pipe failed: %s\n", strerror(errno));
884 return 0;
885 }
886/* #ifdef HAVE_SOCKETPAIR */
887#if 1
888 if (socketpair(PF_UNIX,SOCK_STREAM,0, fd0) == -1) {
889 close(fd[0]);
890 close(fd[1]);
891 lprint("Error: openpty failed: %s\n", strerror(errno));
892 return 0;
893 }
894#else
f3ff649d 895 if (slirp_openpty(&fd0[0], &fd0[1]) == -1) {
f0cbd3ec
FB
896 close(fd[0]);
897 close(fd[1]);
898 lprint("Error: openpty failed: %s\n", strerror(errno));
899 return 0;
900 }
901#endif
5fafdf24 902
f0cbd3ec
FB
903 switch(fork()) {
904 case -1:
905 lprint("Error: fork failed: %s\n", strerror(errno));
906 close(fd[0]);
907 close(fd[1]);
908 close(fd0[0]);
909 close(fd0[1]);
910 return 0;
3b46e624 911
f0cbd3ec
FB
912 case 0:
913 close(fd[0]);
914 close(fd0[0]);
3b46e624 915
f0cbd3ec
FB
916 /* Set the DISPLAY */
917 if (x_port >= 0) {
918#ifdef HAVE_SETENV
919 sprintf(buff, "%s:%d.%d", inet_ntoa(our_addr), x_port, x_screen);
920 setenv("DISPLAY", buff, 1);
921#else
922 sprintf(buff, "DISPLAY=%s:%d.%d", inet_ntoa(our_addr), x_port, x_screen);
923 putenv(buff);
924#endif
925 }
3b46e624 926
f0cbd3ec
FB
927 dup2(fd0[1], 0);
928 dup2(fd0[1], 1);
929 dup2(fd[1], 2);
930 for (s = 3; s <= 255; s++)
931 close(s);
3b46e624 932
f0cbd3ec 933 execlp("rsh","rsh","-l", user, host, args, NULL);
3b46e624 934
f0cbd3ec 935 /* Ooops, failed, let's tell the user why */
3b46e624 936
5fafdf24 937 sprintf(buff, "Error: execlp of %s failed: %s\n",
f0cbd3ec
FB
938 "rsh", strerror(errno));
939 write(2, buff, strlen(buff)+1);
940 close(0); close(1); close(2); /* XXX */
941 exit(1);
3b46e624 942
f0cbd3ec
FB
943 default:
944 close(fd[1]);
945 close(fd0[1]);
946 ns->s=fd[0];
947 so->s=fd0[0];
3b46e624 948
f0cbd3ec
FB
949 return 1;
950 }
951}
952#endif