SCCS-vsn: bin/rcp/rcp.c 5.30
#endif /* not lint */
#ifndef lint
#endif /* not lint */
#ifndef lint
-static char sccsid[] = "@(#)rcp.c 5.29 (Berkeley) %G%";
+static char sccsid[] = "@(#)rcp.c 5.30 (Berkeley) %G%";
#include <kerberosIV/krb.h>
char dst_realm_buf[REALM_SZ];
char *dest_realm = NULL;
#include <kerberosIV/krb.h>
char dst_realm_buf[REALM_SZ];
char *dest_realm = NULL;
-int use_kerberos = 1, encrypt = 0;
CREDENTIALS cred;
Key_schedule schedule;
extern char *krb_realmofhost();
CREDENTIALS cred;
Key_schedule schedule;
extern char *krb_realmofhost();
+#ifdef CRYPT
+int encrypt = 0;
#define OPTIONS "dfkprtx"
#else
#define OPTIONS "dfkprtx"
#else
+#define OPTIONS "dfkprt"
+#endif
+#else
#define OPTIONS "dfprt"
#endif
#define OPTIONS "dfprt"
#endif
extern int optind;
struct servent *sp;
int ch, fflag, tflag;
extern int optind;
struct servent *sp;
int ch, fflag, tflag;
+ char *targ, *shell, *colon();
struct passwd *getpwuid();
int lostconn();
struct passwd *getpwuid();
int lostconn();
strncpy(dst_realm_buf, ++argv, REALM_SZ);
dest_realm = dst_realm_buf;
break;
strncpy(dst_realm_buf, ++argv, REALM_SZ);
dest_realm = dst_realm_buf;
break;
case 'x':
encrypt = 1;
/* des_set_key(cred.session, schedule); */
break;
case 'x':
encrypt = 1;
/* des_set_key(cred.session, schedule); */
break;
#endif
/* rshd-invoked options (server) */
case 'd':
#endif
/* rshd-invoked options (server) */
case 'd':
argv += optind;
#ifdef KERBEROS
argv += optind;
#ifdef KERBEROS
- sp = getservbyname((encrypt ? "ekshell" : "kshell"), "tcp");
+#ifdef CRYPT
+ shell = encrypt ? "ekshell" : "kshell";
+#else
+ shell = "kshell";
+#endif
+ sp = getservbyname(shell, "tcp");
if (sp == NULL) {
char msgbuf[64];
use_kerberos = 0;
(void) sprintf(msgbuf, "can't get entry for %s/tcp service",
if (sp == NULL) {
char msgbuf[64];
use_kerberos = 0;
(void) sprintf(msgbuf, "can't get entry for %s/tcp service",
- (encrypt ? "ekshell" : "kshell"));
old_warning(msgbuf);
sp = getservbyname("shell", "tcp");
}
old_warning(msgbuf);
sp = getservbyname("shell", "tcp");
}
/* command to be executed on remote system using "rsh" */
#ifdef KERBEROS
(void)sprintf(cmd, "rcp%s%s%s%s", iamrecursive ? " -r" : "",
/* command to be executed on remote system using "rsh" */
#ifdef KERBEROS
(void)sprintf(cmd, "rcp%s%s%s%s", iamrecursive ? " -r" : "",
((encrypt && use_kerberos) ? " -x" : ""),
((encrypt && use_kerberos) ? " -x" : ""),
pflag ? " -p" : "", targetshouldbedirectory ? " -d" : "");
#else
(void)sprintf(cmd, "rcp%s%s%s", iamrecursive ? " -r" : "",
pflag ? " -p" : "", targetshouldbedirectory ? " -d" : "");
#else
(void)sprintf(cmd, "rcp%s%s%s", iamrecursive ? " -r" : "",
usage()
{
#ifdef KERBEROS
usage()
{
#ifdef KERBEROS
(void)fprintf(stderr, "%s\n\t%s\n",
"usage: rcp [-k realm] [-px] f1 f2",
"or: rcp [-k realm] [-rpx] f1 ... fn directory");
(void)fprintf(stderr, "%s\n\t%s\n",
"usage: rcp [-k realm] [-px] f1 f2",
"or: rcp [-k realm] [-rpx] f1 ... fn directory");
+#else
+ (void)fprintf(stderr, "%s\n\t%s\n",
+ "usage: rcp [-k realm] [-p] f1 f2",
+ "or: rcp [-k realm] [-rp] f1 ... fn directory");
+#endif
#else
(void)fprintf(stderr,
"usage: rcp [-p] f1 f2; or: rcp [-rp] f1 ... fn directory\n");
#else
(void)fprintf(stderr,
"usage: rcp [-p] f1 f2; or: rcp [-rp] f1 ... fn directory\n");
if (dest_realm == NULL)
dest_realm = krb_realmofhost(*host);
if (dest_realm == NULL)
dest_realm = krb_realmofhost(*host);
if (encrypt)
rem = krcmd_mutual(
host, port,
if (encrypt)
rem = krcmd_mutual(
host, port,
dest_realm,
&cred, schedule);
else
dest_realm,
&cred, schedule);
else
rem = krcmd(
host, port,
user, bp, 0, dest_realm);
rem = krcmd(
host, port,
user, bp, 0, dest_realm);
if (encrypt) {
fprintf(stderr,
"The -x option requires Kerberos authentication\n");
exit(1);
}
if (encrypt) {
fprintf(stderr,
"The -x option requires Kerberos authentication\n");
exit(1);
}
rem = rcmd(host, sp->s_port, locuser, user, bp, 0);
}
return(rem);
rem = rcmd(host, sp->s_port, locuser, user, bp, 0);
}
return(rem);