X-Git-Url: https://asedeno.scripts.mit.edu/gitweb/?a=blobdiff_plain;f=rlogin.c;h=d73f7f9f97b7349025f1c566672178f5c63b5b7c;hb=0014ffb70c9ed234984595d6c9ca3b5c175996aa;hp=7cfe7837a962f53c80d12e664be7320a7faed19f;hpb=a1f3b7a358adaa7c2a98359cd0373aa823eeb14b;p=PuTTY.git diff --git a/rlogin.c b/rlogin.c index 7cfe7837..d73f7f9f 100644 --- a/rlogin.c +++ b/rlogin.c @@ -4,6 +4,7 @@ #include #include +#include #include #include "putty.h" @@ -22,6 +23,7 @@ typedef struct rlogin_tag { /* the above field _must_ be first in the structure */ Socket s; + int closed_on_socket_error; int bufsize; int firstbyte; int cansize; @@ -56,15 +58,25 @@ static void rlogin_log(Plug plug, int type, SockAddr addr, int port, msg = dupprintf("Failed to connect to %s: %s", addrbuf, error_msg); logevent(rlogin->frontend, msg); + sfree(msg); } static int rlogin_closing(Plug plug, const char *error_msg, int error_code, int calling_back) { Rlogin rlogin = (Rlogin) plug; + + /* + * We don't implement independent EOF in each direction for Telnet + * connections; as soon as we get word that the remote side has + * sent us EOF, we wind up the whole connection. + */ + if (rlogin->s) { sk_close(rlogin->s); rlogin->s = NULL; + if (error_msg) + rlogin->closed_on_socket_error = TRUE; notify_remote_exit(rlogin->frontend); } if (error_msg) { @@ -149,7 +161,7 @@ static void rlogin_startup(Rlogin rlogin, const char *ruser) */ static const char *rlogin_init(void *frontend_handle, void **backend_handle, Conf *conf, - char *host, int port, char **realhost, + const char *host, int port, char **realhost, int nodelay, int keepalive) { static const struct plug_function_table fn_table = { @@ -168,6 +180,7 @@ static const char *rlogin_init(void *frontend_handle, void **backend_handle, rlogin = snew(struct rlogin_tag); rlogin->fn = &fn_table; rlogin->s = NULL; + rlogin->closed_on_socket_error = FALSE; rlogin->frontend = frontend_handle; rlogin->term_width = conf_get_int(conf, CONF_width); rlogin->term_height = conf_get_int(conf, CONF_height); @@ -213,15 +226,10 @@ static const char *rlogin_init(void *frontend_handle, void **backend_handle, sfree(*realhost); *realhost = dupstr(loghost); - colon = strrchr(*realhost, ':'); - if (colon) { - /* - * FIXME: if we ever update this aspect of ssh.c for - * IPv6 literal management, this should change in line - * with it. - */ + + colon = host_strrchr(*realhost, ':'); + if (colon) *colon++ = '\0'; - } } /* @@ -230,7 +238,7 @@ static const char *rlogin_init(void *frontend_handle, void **backend_handle, * in which case we prompt for it and may end up deferring doing * anything else until the local prompt mechanism returns. */ - if ((ruser = get_remote_username(conf)) == NULL) { + if ((ruser = get_remote_username(conf)) != NULL) { rlogin_startup(rlogin, ruser); sfree(ruser); } else { @@ -239,8 +247,7 @@ static const char *rlogin_init(void *frontend_handle, void **backend_handle, rlogin->prompt = new_prompts(rlogin->frontend); rlogin->prompt->to_server = TRUE; rlogin->prompt->name = dupstr("Rlogin login name"); - /* 512 is an arbitrary limit :-( */ - add_prompt(rlogin->prompt, dupstr("rlogin username: "), TRUE, 512); + add_prompt(rlogin->prompt, dupstr("rlogin username: "), TRUE); ret = get_userpass_input(rlogin->prompt, NULL, 0); if (ret >= 0) { rlogin_startup(rlogin, rlogin->prompt->prompts[0]->result); @@ -272,7 +279,7 @@ static void rlogin_reconfig(void *handle, Conf *conf) /* * Called to send data down the rlogin connection. */ -static int rlogin_send(void *handle, char *buf, int len) +static int rlogin_send(void *handle, const char *buf, int len) { Rlogin rlogin = (Rlogin) handle; @@ -386,6 +393,8 @@ static int rlogin_exitcode(void *handle) Rlogin rlogin = (Rlogin) handle; if (rlogin->s != NULL) return -1; /* still connected */ + else if (rlogin->closed_on_socket_error) + return INT_MAX; /* a socket error counts as an unclean exit */ else /* If we ever implement RSH, we'll probably need to do this properly */ return 0; @@ -416,6 +425,7 @@ Backend rlogin_backend = { rlogin_provide_logctx, rlogin_unthrottle, rlogin_cfg_info, + NULL /* test_for_upstream */, "rlogin", PROT_RLOGIN, 513