fix musl compatibility
[project/librpc-uclibc.git] / rexec.c
1 /*
2 * Copyright (c) 1980, 1993
3 * The Regents of the University of California. All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 4. Neither the name of the University nor the names of its contributors
14 * may be used to endorse or promote products derived from this software
15 * without specific prior written permission.
16 *
17 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
18 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
21 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
27 * SUCH DAMAGE.
28 */
29
30 #define __FORCE_GLIBC
31 #include <features.h>
32 #include <sys/types.h>
33 #include <sys/socket.h>
34
35 #include <netinet/in.h>
36
37 #include <alloca.h>
38 #include <stdio.h>
39 #include <netdb.h>
40 #include <errno.h>
41 #include <stdlib.h>
42 #include <string.h>
43 #include <unistd.h>
44
45 #define SA_LEN(_x) __libc_sa_len((_x)->sa_family)
46 extern int __libc_sa_len(sa_family_t __af) __THROW attribute_hidden;
47
48 /* int rexecoptions; - google does not know it */
49 static char ahostbuf[NI_MAXHOST];
50
51 int
52 rexec_af(char **ahost, int rport, const char *name, const char *pass, const char *cmd, int *fd2p, sa_family_t af)
53 {
54 struct sockaddr_storage sa2, from;
55 struct addrinfo hints, *res0;
56 const char *orig_name = name;
57 const char *orig_pass = pass;
58 u_short port = 0;
59 int s, timo = 1, s3;
60 char c;
61 int gai;
62 char servbuff[NI_MAXSERV];
63
64 if (sizeof(servbuff) < sizeof(int)*3 + 2) {
65 snprintf(servbuff, sizeof(servbuff), "%d", ntohs(rport));
66 servbuff[sizeof(servbuff) - 1] = '\0';
67 } else {
68 sprintf(servbuff, "%d", ntohs(rport));
69 }
70
71 memset(&hints, '\0', sizeof(hints));
72 hints.ai_family = af;
73 hints.ai_socktype = SOCK_STREAM;
74 hints.ai_flags = AI_CANONNAME;
75 gai = getaddrinfo(*ahost, servbuff, &hints, &res0);
76 if (gai) {
77 /* XXX: set errno? */
78 return -1;
79 }
80
81 if (res0->ai_canonname) {
82 strncpy(ahostbuf, res0->ai_canonname, sizeof(ahostbuf));
83 ahostbuf[sizeof(ahostbuf)-1] = '\0';
84 *ahost = ahostbuf;
85 }
86 else {
87 *ahost = NULL;
88 __set_errno(ENOENT);
89 return -1;
90 }
91 ruserpass(res0->ai_canonname, &name, &pass);
92 retry:
93 s = socket(res0->ai_family, res0->ai_socktype, 0);
94 if (s < 0) {
95 perror("rexec: socket");
96 return -1;
97 }
98 if (connect(s, res0->ai_addr, res0->ai_addrlen) < 0) {
99 if (errno == ECONNREFUSED && timo <= 16) {
100 (void) close(s);
101 sleep(timo);
102 timo *= 2;
103 goto retry;
104 }
105 perror(res0->ai_canonname);
106 return -1;
107 }
108 if (fd2p == 0) {
109 (void) write(s, "", 1);
110 port = 0;
111 } else {
112 char num[32];
113 int s2;
114 socklen_t sa2len;
115
116 s2 = socket(res0->ai_family, res0->ai_socktype, 0);
117 if (s2 < 0) {
118 (void) close(s);
119 return -1;
120 }
121 listen(s2, 1);
122 sa2len = sizeof(sa2);
123 if (getsockname(s2, (struct sockaddr *)&sa2, &sa2len) < 0) {
124 perror("getsockname");
125 (void) close(s2);
126 goto bad;
127 } else if (sa2len != SA_LEN((struct sockaddr *)&sa2)) {
128 __set_errno(EINVAL);
129 (void) close(s2);
130 goto bad;
131 }
132 port = 0;
133 if (!getnameinfo((struct sockaddr *)&sa2, sa2len,
134 NULL, 0, servbuff, sizeof(servbuff),
135 NI_NUMERICSERV))
136 port = atoi(servbuff);
137 (void) sprintf(num, "%u", port);
138 (void) write(s, num, strlen(num)+1);
139 {
140 socklen_t len = sizeof(from);
141 s3 = TEMP_FAILURE_RETRY(accept(s2,
142 (struct sockaddr *)&from, &len));
143 close(s2);
144 if (s3 < 0) {
145 perror("accept");
146 port = 0;
147 goto bad;
148 }
149 }
150 *fd2p = s3;
151 }
152 (void) write(s, name, strlen(name) + 1);
153 /* should public key encypt the password here */
154 (void) write(s, pass, strlen(pass) + 1);
155 (void) write(s, cmd, strlen(cmd) + 1);
156
157 /* We don't need the memory allocated for the name and the password
158 in ruserpass anymore. */
159 if (name != orig_name)
160 free((char *) name);
161 if (pass != orig_pass)
162 free((char *) pass);
163
164 if (read(s, &c, 1) != 1) {
165 perror(*ahost);
166 goto bad;
167 }
168 if (c != 0) {
169 while (read(s, &c, 1) == 1) {
170 (void) write(2, &c, 1);
171 if (c == '\n')
172 break;
173 }
174 goto bad;
175 }
176 freeaddrinfo(res0);
177 return s;
178 bad:
179 if (port)
180 (void) close(*fd2p);
181 (void) close(s);
182 freeaddrinfo(res0);
183 return -1;
184 }
185 libc_hidden_def(rexec_af)
186
187 int
188 rexec(char **ahost, int rport, const char *name, const char *pass,
189 const char *cmd, int *fd2p)
190 {
191 return rexec_af(ahost, rport, name, pass, cmd, fd2p, AF_INET);
192 }