stupid mistake in execl
[unix-history] / usr / src / usr.bin / rsh / rsh.c
index ec07ef8..a65c3c5 100644 (file)
@@ -1,18 +1,35 @@
+
 /*
 /*
- * Copyright (c) 1983 Regents of the University of California.
- * All rights reserved.  The Berkeley software License Agreement
- * specifies the terms and conditions for redistribution.
+ *     $Source: /a/staff/kfall/mit/rsh/RCS/rsh.c,v $
+ *     $Header: /a/staff/kfall/mit/rsh/RCS/rsh.c,v 5.1 89/07/31 19:28:59 kfall Exp Locker: kfall $
+ */
+
+/*
+ * Copyright (c) 1983 The Regents of the University of California.
+ * All rights reserved.
+ *
+ * Redistribution and use in source and binary forms are permitted
+ * provided that the above copyright notice and this paragraph are
+ * duplicated in all such forms and that any documentation,
+ * advertising materials, and other materials related to such
+ * distribution and use acknowledge that the software was developed
+ * by the University of California, Berkeley.  The name of the
+ * University may not be used to endorse or promote products derived
+ * from this software without specific prior written permission.
+ * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
+ * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
+ * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
  */
 
 #ifndef lint
 char copyright[] =
  */
 
 #ifndef lint
 char copyright[] =
-"@(#) Copyright (c) 1983 Regents of the University of California.\n\
+"@(#) Copyright (c) 1983 The Regents of the University of California.\n\
  All rights reserved.\n";
  All rights reserved.\n";
-#endif not lint
+#endif /* not lint */
 
 #ifndef lint
 
 #ifndef lint
-static char sccsid[] = "@(#)rsh.c      5.3 (Berkeley) %G%";
-#endif not lint
+static char sccsid[] = "@(#)rsh.c      5.12 (Berkeley) 5/11/89";
+#endif /* not lint */
 
 #include <sys/types.h>
 #include <sys/socket.h>
 
 #include <sys/types.h>
 #include <sys/socket.h>
@@ -26,19 +43,31 @@ static char sccsid[] = "@(#)rsh.c   5.3 (Berkeley) %G%";
 #include <signal.h>
 #include <pwd.h>
 #include <netdb.h>
 #include <signal.h>
 #include <pwd.h>
 #include <netdb.h>
+#include "pathnames.h"
+
+#ifdef KERBEROS
+#include <krb.h>
+char   dst_realm_buf[REALM_SZ];
+char   *dest_realm = NULL;
+int    use_kerberos = 1, encrypt = 0;
+CREDENTIALS    cred;
+Key_schedule   schedule;
+extern char    *krb_realmofhost();
+#endif /* KERBEROS */
 
 /*
  * rsh - remote shell
  */
 /* VARARGS */
 int    error();
 
 /*
  * rsh - remote shell
  */
 /* VARARGS */
 int    error();
-char   *index(), *rindex(), *malloc(), *getpass(), *sprintf(), *strcpy();
+char   *index(), *rindex(), *malloc(), *getpass(), *strcpy();
 
 struct passwd *getpwuid();
 
 int    errno;
 int    options;
 int    rfd2;
 
 struct passwd *getpwuid();
 
 int    errno;
 int    options;
 int    rfd2;
+int    nflag;
 int    sendsig();
 
 #define        mask(s) (1 << ((s) - 1))
 int    sendsig();
 
 #define        mask(s) (1 << ((s) - 1))
@@ -76,8 +105,10 @@ another:
        }
        if (argc > 0 && !strcmp(*argv, "-n")) {
                argv++, argc--;
        }
        if (argc > 0 && !strcmp(*argv, "-n")) {
                argv++, argc--;
-               (void) close(0);
-               (void) open("/dev/null", 0);
+#ifdef KERBEROS
+               if (!encrypt)
+                       nflag++;
+#endif
                goto another;
        }
        if (argc > 0 && !strcmp(*argv, "-d")) {
                goto another;
        }
        if (argc > 0 && !strcmp(*argv, "-d")) {
@@ -107,13 +138,37 @@ another:
                argv++, argc--;
                goto another;
        }
                argv++, argc--;
                goto another;
        }
+
+#ifdef KERBEROS
+       if(argc > 0 && !strncmp(*argv, "-x", 2)) {
+               encrypt = 1;
+               des_set_key(cred.session, schedule);
+               if (nflag)
+                       nflag = 0;
+               argv++, argc--;
+               goto another;
+       }
+
+       if(argc > 0 && !strcmp(*argv, "-k")) {
+               argv++, argc--;
+               if(argc <= 0 || (**argv == '-')) {
+                       fprintf(stderr, "-k option requires an argument\n");
+                       exit(1);
+               }
+               dest_realm = dst_realm_buf;
+               strncpy(dest_realm, *argv, REALM_SZ);
+               argv++, argc--;
+               goto another;
+       }
+#endif
+
        if (host == 0)
                goto usage;
        if (argv[0] == 0) {
                if (asrsh)
                        *argv0 = "rlogin";
        if (host == 0)
                goto usage;
        if (argv[0] == 0) {
                if (asrsh)
                        *argv0 = "rlogin";
-               execv("/usr/ucb/rlogin", argv0);
-               perror("/usr/ucb/rlogin");
+               execv(_PATH_RLOGIN, argv0);
+               perror(_PATH_RLOGIN);
                exit(1);
        }
        pwd = getpwuid(getuid());
                exit(1);
        }
        pwd = getpwuid(getuid());
@@ -132,15 +187,81 @@ another:
                if (ap[1])
                        *cp++ = ' ';
        }
                if (ap[1])
                        *cp++ = ' ';
        }
+#ifdef KERBEROS
+       sp = getservbyname((encrypt ? "ekshell" : "kshell"), "tcp");
+       if (sp == NULL) {
+               char    msgbuf[64];
+               use_kerberos = 0;
+               (void) sprintf(msgbuf, "can't get entry for %s/tcp service",
+                       (encrypt ? "ekshell" : "kshell"));
+               old_warning(msgbuf);
+               sp = getservbyname("shell", "tcp");
+       }
+#else
        sp = getservbyname("shell", "tcp");
        sp = getservbyname("shell", "tcp");
-       if (sp == 0) {
+#endif
+
+       if (sp == NULL) {
                fprintf(stderr, "rsh: shell/tcp: unknown service\n");
                exit(1);
        }
                fprintf(stderr, "rsh: shell/tcp: unknown service\n");
                exit(1);
        }
+
+#ifdef KERBEROS
+try_connect:
+       if (use_kerberos) {
+               rem = KSUCCESS;
+               errno = 0;
+               if (dest_realm == NULL)
+                       dest_realm = krb_realmofhost(host);
+
+               if (encrypt) {
+                       rem = krcmd_mutual(
+                               &host, sp->s_port,
+                               user ? user : pwd->pw_name,
+                               args,
+                               &rfd2,
+                               dest_realm,
+                               &cred, schedule);
+               } else {
+                       rem = krcmd(
+                               &host,
+                               sp->s_port,
+                               user ? user : pwd->pw_name,
+                               args,
+                               &rfd2,
+                               dest_realm);
+               }
+               if (rem < 0) {
+                       use_kerberos = 0;
+                       sp = getservbyname("shell", "tcp");
+                       if (sp == NULL) {
+                               fprintf(stderr, "unknown service shell/tcp\n");
+                               exit(1);
+                       }
+                       if (errno == ECONNREFUSED)
+                               old_warning("remote host doesn't support Kerberos");
+                       if (errno == ENOENT)
+                               old_warning("Can't provide Kerberos auth data");
+                       goto try_connect;
+               }
+       } else {
+               if (encrypt) {
+                       fprintf(stderr,"The -x flag requires Kerberos authentication\n");
+                       exit(1);
+               }
+               rem = rcmd(&host, sp->s_port, pwd->pw_name,
+                       user ? user : pwd->pw_name, args, &rfd2);
+       }
+
+#else
+                          
         rem = rcmd(&host, sp->s_port, pwd->pw_name,
         rem = rcmd(&host, sp->s_port, pwd->pw_name,
-           user ? user : pwd->pw_name, args, &rfd2);
+               user ? user : pwd->pw_name, args, &rfd2);
+#endif
+
         if (rem < 0)
                 exit(1);
         if (rem < 0)
                 exit(1);
+
        if (rfd2 < 0) {
                fprintf(stderr, "rsh: can't establish stderr\n");
                exit(2);
        if (rfd2 < 0) {
                fprintf(stderr, "rsh: can't establish stderr\n");
                exit(2);
@@ -153,17 +274,27 @@ another:
        }
        (void) setuid(getuid());
        omask = sigblock(mask(SIGINT)|mask(SIGQUIT)|mask(SIGTERM));
        }
        (void) setuid(getuid());
        omask = sigblock(mask(SIGINT)|mask(SIGQUIT)|mask(SIGTERM));
-       signal(SIGINT, sendsig);
-       signal(SIGQUIT, sendsig);
-       signal(SIGTERM, sendsig);
-        pid = fork();
-        if (pid < 0) {
-               perror("fork");
-                exit(1);
-        }
-       ioctl(rfd2, FIONBIO, &one);
-       ioctl(rem, FIONBIO, &one);
-        if (pid == 0) {
+       if (signal(SIGINT, SIG_IGN) != SIG_IGN)
+               signal(SIGINT, sendsig);
+       if (signal(SIGQUIT, SIG_IGN) != SIG_IGN)
+               signal(SIGQUIT, sendsig);
+       if (signal(SIGTERM, SIG_IGN) != SIG_IGN)
+               signal(SIGTERM, sendsig);
+       if (nflag == 0) {
+               pid = fork();
+               if (pid < 0) {
+                       perror("fork");
+                       exit(1);
+               }
+       }
+#ifdef KERBEROS
+       if (!encrypt)
+#endif
+       {
+               ioctl(rfd2, FIONBIO, &one);
+               ioctl(rem, FIONBIO, &one);
+       }
+        if (nflag == 0 && pid == 0) {
                char *bp; int rembits, wc;
                (void) close(rfd2);
        reread:
                char *bp; int rembits, wc;
                (void) close(rfd2);
        reread:
@@ -183,7 +314,12 @@ another:
                }
                if ((rembits & (1<<rem)) == 0)
                        goto rewrite;
                }
                if ((rembits & (1<<rem)) == 0)
                        goto rewrite;
-               wc = write(rem, bp, cc);
+#ifdef KERBEROS
+               if (encrypt)
+                       wc = des_write(rem, bp, cc);
+               else
+                       wc = write(rem, bp, cc);
+#endif
                if (wc < 0) {
                        if (errno == EWOULDBLOCK)
                                goto rewrite;
                if (wc < 0) {
                        if (errno == EWOULDBLOCK)
                                goto rewrite;
@@ -210,7 +346,12 @@ another:
                }
                if (ready & (1<<rfd2)) {
                        errno = 0;
                }
                if (ready & (1<<rfd2)) {
                        errno = 0;
-                       cc = read(rfd2, buf, sizeof buf);
+#ifdef KERBEROS
+                       if (encrypt)
+                               cc = des_read(rfd2, buf, sizeof buf);
+                       else
+#endif
+                               cc = read(rfd2, buf, sizeof buf);
                        if (cc <= 0) {
                                if (errno != EWOULDBLOCK)
                                        readfrom &= ~(1<<rfd2);
                        if (cc <= 0) {
                                if (errno != EWOULDBLOCK)
                                        readfrom &= ~(1<<rfd2);
@@ -219,7 +360,12 @@ another:
                }
                if (ready & (1<<rem)) {
                        errno = 0;
                }
                if (ready & (1<<rem)) {
                        errno = 0;
-                       cc = read(rem, buf, sizeof buf);
+#ifdef KERBEROS
+                       if (encrypt)
+                               cc = des_read(rem, buf, sizeof buf);
+                       else
+                               cc = read(rem, buf, sizeof buf);
+#endif
                        if (cc <= 0) {
                                if (errno != EWOULDBLOCK)
                                        readfrom &= ~(1<<rem);
                        if (cc <= 0) {
                                if (errno != EWOULDBLOCK)
                                        readfrom &= ~(1<<rem);
@@ -227,17 +373,35 @@ another:
                                (void) write(1, buf, cc);
                }
         } while (readfrom);
                                (void) write(1, buf, cc);
                }
         } while (readfrom);
-        (void) kill(pid, SIGKILL);
+       if (nflag == 0)
+               (void) kill(pid, SIGKILL);
        exit(0);
 usage:
        fprintf(stderr,
        exit(0);
 usage:
        fprintf(stderr,
+#ifdef KERBEROS
+           "usage: rsh host [ -l login ] [ -n ] [ -k realm ] command\n");
+#else
            "usage: rsh host [ -l login ] [ -n ] command\n");
            "usage: rsh host [ -l login ] [ -n ] command\n");
+#endif
        exit(1);
 }
 
 sendsig(signo)
        char signo;
 {
        exit(1);
 }
 
 sendsig(signo)
        char signo;
 {
+#ifdef KERBEROS
+       if (encrypt)
+               (void) des_write(rfd2, &signo, 1);
+       else
+#endif
+               (void) write(rfd2, &signo, 1);
+}
 
 
-       (void) write(rfd2, &signo, 1);
+#ifdef KERBEROS
+int
+old_warning(str)
+       char    *str;
+{
+       fprintf(stderr,"Warning: %s, using standard rsh\n", str);
 }
 }
+#endif