hunt.c 5.92 KB
Newer Older
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38
/*
 * Copyright (c) 1983, 1993
 *	The Regents of the University of California.  All rights reserved.
 *
 * Redistribution and use in source and binary forms, with or without
 * modification, are permitted provided that the following conditions
 * are met:
 * 1. Redistributions of source code must retain the above copyright
 *    notice, this list of conditions and the following disclaimer.
 * 2. Redistributions in binary form must reproduce the above copyright
 *    notice, this list of conditions and the following disclaimer in the
 *    documentation and/or other materials provided with the distribution.
 * 3. All advertising materials mentioning features or use of this software
 *    must display the following acknowledgement:
 *	This product includes software developed by the University of
 *	California, Berkeley and its contributors.
 * 4. Neither the name of the University nor the names of its contributors
 *    may be used to endorse or promote products derived from this software
 *    without specific prior written permission.
 *
 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
 * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
 * SUCH DAMAGE.
 */

#ifndef lint
#if 0
static char sccsid[] = "@(#)hunt.c	8.1 (Berkeley) 6/6/93";
#endif
static const char rcsid[] =
39
	"$Id: hunt.c,v 1.10 2001-08-29 19:36:09 stoller Exp $";
40 41
#endif /* not lint */

42 43 44 45 46 47 48 49 50 51
#ifdef USESOCKETS
#include <sys/param.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <netdb.h>
#include "capdecls.h"

int	socket_open(char *devname);
#endif

52 53
#include "tip.h"

54 55 56 57 58
#include <sys/types.h>
#include <err.h>
#ifndef LINUX
#include <libutil.h>
#endif
59

60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79
extern char *getremote();
extern char *rindex();

static	jmp_buf deadline;
static	int deadfl;

void
dead()
{
	deadfl = 1;
	longjmp(deadline, 1);
}

int
hunt(name)
	char *name;
{
	register char *cp;
	sig_t f;
	int res;
80

81 82 83
	f = signal(SIGALRM, dead);
	while ((cp = getremote(name))) {
		deadfl = 0;
84
#if HAVE_UUCPLOCK
85 86 87 88 89 90
		uucplock = rindex(cp, '/')+1;
		if ((res = uu_lock(uucplock)) != UU_LOCK_OK) {
			if (res != UU_LOCK_INUSE)
				fprintf(stderr, "uu_lock: %s\n", uu_lockerr(res));
			continue;
		}
91
#endif
92 93 94 95 96 97 98 99 100 101 102
		/*
		 * Straight through call units, such as the BIZCOMP,
		 * VADIC and the DF, must indicate they're hardwired in
		 *  order to get an open file descriptor placed in FD.
		 * Otherwise, as for a DN-11, the open will have to
		 *  be done in the "open" routine.
		 */
		if (!HW)
			break;
		if (setjmp(deadline) == 0) {
			alarm(10);
103 104 105 106 107 108 109 110
#ifdef USESOCKETS
			if ((FD = socket_open(name)) >= 0) {
				alarm(0);
				HW = 0;
				goto done;
			}
			else
#endif
111 112
			if ((FD = open(cp, O_RDWR)) >= 0)
				ioctl(FD, TIOCEXCL, 0);
113 114 115 116 117 118 119 120
		}
		alarm(0);
		if (FD < 0) {
			warn("%s", cp);
			deadfl = 1;
		}
		if (!deadfl) {
#if HAVE_TERMIOS
121 122 123 124 125
			struct termios t;

			if (tcgetattr(FD, &t) == 0) {
				t.c_cflag |= HUPCL;
				(void)tcsetattr(FD, TCSANOW, &t);
126 127 128 129 130 131 132 133 134
			}
#else /* HAVE_TERMIOS */
#ifdef TIOCHPCL
			ioctl(FD, TIOCHPCL, 0);
#endif
#endif /* HAVE_TERMIOS */
			signal(SIGALRM, SIG_DFL);
			return ((int)cp);
		}
135
#if HAVE_UUCPLOCK
136
		(void)uu_unlock(uucplock);
137
#endif
138
	}
139
 done:
140 141 142
	signal(SIGALRM, f);
	return (deadfl ? -1 : (int)cp);
}
143 144 145 146 147 148

#ifdef USESOCKETS
/*
 *
 */
int
149
socket_open(char *tipname)
150 151 152
{
	int			sock;
	struct sockaddr_in	name;
153 154 155
	char			aclname[BUFSIZ];
	char			b1[256], b2[256];
	secretkey_t		key;
156 157
	capret_t		capret;
	int			port, cc;
158
	char			hostname[MAXHOSTNAMELEN];
159
	FILE		       *fp;
160
	struct hostent	       *he;
161

162
	(void) sprintf(aclname, "%s/%s.acl", ACLPATH, tipname);
163

164
	if ((fp = fopen(aclname, "r")) == NULL) {
165 166
		return -1;
	}
167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191

	/* For sanity check below */
	bzero(hostname, sizeof(hostname));
	bzero(&key, sizeof(key));
	port = 0;
	
	while (fscanf(fp, "%s %s\n", &b1, &b2) != EOF) {
		if (strcmp(b1, "host:") == 0) {
			strcpy(hostname, b2);
		}
		else if (strcmp(b1, "port:") == 0) {
			port = atoi(b2);
		}
		else if (strcmp(b1, "keylen:") == 0) {
			key.keylen = atoi(b2);
		}
		else if (strcmp(b1, "key:") == 0) {
			strcpy(key.key, b2);
		}
		else {
			fprintf(stderr, "Unknown ACL: %s %s\n", b1, b2);
			fclose(fp);
			return -1;
		}
	}
192 193
	fclose(fp);

194 195 196 197 198
	/* Make sure we got everything we need */
	if (port == 0 || strlen(hostname) == 0 ||
	    key.keylen == 0 || strlen(key.key) == 0) {
		fprintf(stderr, "Incomplete ACL\n");
		return -1;
199 200 201 202 203 204
	}

	/* Create name. */
	name.sin_family = AF_INET;
	name.sin_port   = htons(port);

205 206 207 208 209 210 211 212 213 214 215 216 217 218
	he = gethostbyname(hostname);
	if (! he) {
		fprintf(stderr, "Unknown hostname %s: %s\n",
			hostname, hstrerror(h_errno));
		return -1;
	}
	memcpy ((char *)&name.sin_addr, he->h_addr, he->h_length);

	/* Create socket from which to read. */
	sock = socket(AF_INET, SOCK_STREAM, 0);
	if (sock < 0) {
		return sock;
	}

219 220 221
	/* Caller picks up and displays error */
	if (connect(sock, (struct sockaddr *) &name, sizeof(name)) < 0) {
		close(sock);
222 223
		fprintf(stderr,
			"Socket connect failed. Falling back to tty line.\n");
224 225 226 227
		return -1;
	}

	/*
228
	 * Send the secretkey.
229
	 */
230 231
	if (write(sock, &key, sizeof(key)) != sizeof(key))
		goto screwed;
232

233 234 235 236 237 238 239 240 241 242 243 244 245
	/*
	 * Wait for the response.
	 */
	if ((cc = read(sock, &capret, sizeof(capret))) <= 0)
		goto screwed;

	if (capret != CAPOK) {
		if (capret == CAPBUSY)
			fprintf(stderr, "Tip line busy. Try again later?\n");
		if (capret == CAPNOPERM)
			fprintf(stderr, "You do not have permission!\n");
		goto screwed;
	}
246
	return sock;
247 248 249 250 251

 screwed:
	close(sock);
	deadfl = 1;
	longjmp(deadline, 1);
252 253
}
#endif