19 #define RLOGIN_MAX_BACKLOG 4096
21 typedef struct rlogin_tag {
22 const struct plug_function_table *fn;
23 /* the above field _must_ be first in the structure */
26 int closed_on_socket_error;
30 int term_width, term_height;
35 /* In case we need to read a username from the terminal before starting */
39 static void rlogin_size(void *handle, int width, int height);
41 static void c_write(Rlogin rlogin, char *buf, int len)
43 int backlog = from_backend(rlogin->frontend, 0, buf, len);
44 sk_set_frozen(rlogin->s, backlog > RLOGIN_MAX_BACKLOG);
47 static void rlogin_log(Plug plug, int type, SockAddr addr, int port,
48 const char *error_msg, int error_code)
50 Rlogin rlogin = (Rlogin) plug;
51 char addrbuf[256], *msg;
53 sk_getaddr(addr, addrbuf, lenof(addrbuf));
56 msg = dupprintf("Connecting to %s port %d", addrbuf, port);
58 msg = dupprintf("Failed to connect to %s: %s", addrbuf, error_msg);
60 logevent(rlogin->frontend, msg);
64 static int rlogin_closing(Plug plug, const char *error_msg, int error_code,
67 Rlogin rlogin = (Rlogin) plug;
70 * We don't implement independent EOF in each direction for Telnet
71 * connections; as soon as we get word that the remote side has
72 * sent us EOF, we wind up the whole connection.
79 rlogin->closed_on_socket_error = TRUE;
80 notify_remote_exit(rlogin->frontend);
83 /* A socket error has occurred. */
84 logevent(rlogin->frontend, error_msg);
85 connection_fatal(rlogin->frontend, "%s", error_msg);
86 } /* Otherwise, the remote side closed the connection normally. */
90 static int rlogin_receive(Plug plug, int urgent, char *data, int len)
92 Rlogin rlogin = (Rlogin) plug;
100 rlogin_size(rlogin, rlogin->term_width, rlogin->term_height);
103 * We should flush everything (aka Telnet SYNCH) if we see
104 * 0x02, and we should turn off and on _local_ flow control
105 * on 0x10 and 0x20 respectively. I'm not convinced it's
110 * Main rlogin protocol. This is really simple: the first
111 * byte is expected to be NULL and is ignored, and the rest
114 if (rlogin->firstbyte) {
115 if (data[0] == '\0') {
119 rlogin->firstbyte = 0;
122 c_write(rlogin, data, len);
127 static void rlogin_sent(Plug plug, int bufsize)
129 Rlogin rlogin = (Rlogin) plug;
130 rlogin->bufsize = bufsize;
133 static void rlogin_startup(Rlogin rlogin, const char *ruser)
138 sk_write(rlogin->s, &z, 1);
139 p = conf_get_str(rlogin->conf, CONF_localusername);
140 sk_write(rlogin->s, p, strlen(p));
141 sk_write(rlogin->s, &z, 1);
142 sk_write(rlogin->s, ruser, strlen(ruser));
143 sk_write(rlogin->s, &z, 1);
144 p = conf_get_str(rlogin->conf, CONF_termtype);
145 sk_write(rlogin->s, p, strlen(p));
146 sk_write(rlogin->s, "/", 1);
147 p = conf_get_str(rlogin->conf, CONF_termspeed);
148 sk_write(rlogin->s, p, strspn(p, "0123456789"));
149 rlogin->bufsize = sk_write(rlogin->s, &z, 1);
151 rlogin->prompt = NULL;
155 * Called to set up the rlogin connection.
157 * Returns an error message, or NULL on success.
159 * Also places the canonical host name into `realhost'. It must be
160 * freed by the caller.
162 static const char *rlogin_init(void *frontend_handle, void **backend_handle,
164 const char *host, int port, char **realhost,
165 int nodelay, int keepalive)
167 static const struct plug_function_table fn_table = {
180 rlogin = snew(struct rlogin_tag);
181 rlogin->fn = &fn_table;
183 rlogin->closed_on_socket_error = FALSE;
184 rlogin->frontend = frontend_handle;
185 rlogin->term_width = conf_get_int(conf, CONF_width);
186 rlogin->term_height = conf_get_int(conf, CONF_height);
187 rlogin->firstbyte = 1;
189 rlogin->prompt = NULL;
190 rlogin->conf = conf_copy(conf);
191 *backend_handle = rlogin;
193 addressfamily = conf_get_int(conf, CONF_addressfamily);
199 buf = dupprintf("Looking up host \"%s\"%s", host,
200 (addressfamily == ADDRTYPE_IPV4 ? " (IPv4)" :
201 (addressfamily == ADDRTYPE_IPV6 ? " (IPv6)" :
203 logevent(rlogin->frontend, buf);
206 addr = name_lookup(host, port, realhost, conf, addressfamily);
207 if ((err = sk_addr_error(addr)) != NULL) {
213 port = 513; /* default rlogin port */
218 rlogin->s = new_connection(addr, *realhost, port, 1, 0,
219 nodelay, keepalive, (Plug) rlogin, conf);
220 if ((err = sk_socket_error(rlogin->s)) != NULL)
223 loghost = conf_get_str(conf, CONF_loghost);
228 *realhost = dupstr(loghost);
230 colon = host_strrchr(*realhost, ':');
236 * Send local username, remote username, terminal type and
237 * terminal speed - unless we don't have the remote username yet,
238 * in which case we prompt for it and may end up deferring doing
239 * anything else until the local prompt mechanism returns.
241 if ((ruser = get_remote_username(conf)) != NULL) {
242 rlogin_startup(rlogin, ruser);
247 rlogin->prompt = new_prompts(rlogin->frontend);
248 rlogin->prompt->to_server = TRUE;
249 rlogin->prompt->name = dupstr("Rlogin login name");
250 add_prompt(rlogin->prompt, dupstr("rlogin username: "), TRUE);
251 ret = get_userpass_input(rlogin->prompt, NULL, 0);
253 rlogin_startup(rlogin, rlogin->prompt->prompts[0]->result);
260 static void rlogin_free(void *handle)
262 Rlogin rlogin = (Rlogin) handle;
265 free_prompts(rlogin->prompt);
268 conf_free(rlogin->conf);
273 * Stub routine (we don't have any need to reconfigure this backend).
275 static void rlogin_reconfig(void *handle, Conf *conf)
280 * Called to send data down the rlogin connection.
282 static int rlogin_send(void *handle, const char *buf, int len)
284 Rlogin rlogin = (Rlogin) handle;
286 if (rlogin->s == NULL)
289 if (rlogin->prompt) {
291 * We're still prompting for a username, and aren't talking
292 * directly to the network connection yet.
294 int ret = get_userpass_input(rlogin->prompt,
295 (unsigned char *)buf, len);
297 rlogin_startup(rlogin, rlogin->prompt->prompts[0]->result);
298 /* that nulls out rlogin->prompt, so then we'll start sending
299 * data down the wire in the obvious way */
302 rlogin->bufsize = sk_write(rlogin->s, buf, len);
305 return rlogin->bufsize;
309 * Called to query the current socket sendability status.
311 static int rlogin_sendbuffer(void *handle)
313 Rlogin rlogin = (Rlogin) handle;
314 return rlogin->bufsize;
318 * Called to set the size of the window
320 static void rlogin_size(void *handle, int width, int height)
322 Rlogin rlogin = (Rlogin) handle;
323 char b[12] = { '\xFF', '\xFF', 0x73, 0x73, 0, 0, 0, 0, 0, 0, 0, 0 };
325 rlogin->term_width = width;
326 rlogin->term_height = height;
328 if (rlogin->s == NULL || !rlogin->cansize)
331 b[6] = rlogin->term_width >> 8;
332 b[7] = rlogin->term_width & 0xFF;
333 b[4] = rlogin->term_height >> 8;
334 b[5] = rlogin->term_height & 0xFF;
335 rlogin->bufsize = sk_write(rlogin->s, b, 12);
340 * Send rlogin special codes.
342 static void rlogin_special(void *handle, Telnet_Special code)
349 * Return a list of the special codes that make sense in this
352 static const struct telnet_special *rlogin_get_specials(void *handle)
357 static int rlogin_connected(void *handle)
359 Rlogin rlogin = (Rlogin) handle;
360 return rlogin->s != NULL;
363 static int rlogin_sendok(void *handle)
365 /* Rlogin rlogin = (Rlogin) handle; */
369 static void rlogin_unthrottle(void *handle, int backlog)
371 Rlogin rlogin = (Rlogin) handle;
372 sk_set_frozen(rlogin->s, backlog > RLOGIN_MAX_BACKLOG);
375 static int rlogin_ldisc(void *handle, int option)
377 /* Rlogin rlogin = (Rlogin) handle; */
381 static void rlogin_provide_ldisc(void *handle, void *ldisc)
383 /* This is a stub. */
386 static void rlogin_provide_logctx(void *handle, void *logctx)
388 /* This is a stub. */
391 static int rlogin_exitcode(void *handle)
393 Rlogin rlogin = (Rlogin) handle;
394 if (rlogin->s != NULL)
395 return -1; /* still connected */
396 else if (rlogin->closed_on_socket_error)
397 return INT_MAX; /* a socket error counts as an unclean exit */
399 /* If we ever implement RSH, we'll probably need to do this properly */
404 * cfg_info for rlogin does nothing at all.
406 static int rlogin_cfg_info(void *handle)
411 Backend rlogin_backend = {
424 rlogin_provide_ldisc,
425 rlogin_provide_logctx,