1 /* vi: set sw=4 ts=4: */
2 /* nc: mini-netcat - built from the ground up for LRP
3 Copyright (C) 1998 Charles P. Wright
6 0.0.2 5K Smaller and you can also check the exit condition if you wish.
9 19980918 Busy Boxed! Dave Cinege
10 19990512 Uses Select. Charles P. Wright
11 19990513 Fixes stdin stupidity and uses buffers. Charles P. Wright
13 This program is free software; you can redistribute it and/or modify
14 it under the terms of the GNU General Public License as published by
15 the Free Software Foundation; either version 2 of the License, or
16 (at your option) any later version.
18 This program is distributed in the hope that it will be useful,
19 but WITHOUT ANY WARRANTY; without even the implied warranty of
20 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
21 GNU General Public License for more details.
23 You should have received a copy of the GNU General Public License
24 along with this program; if not, write to the Free Software
25 Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
34 #include <sys/types.h>
35 #include <sys/socket.h>
36 #include <netinet/in.h>
37 #include <arpa/inet.h>
40 #include <sys/ioctl.h>
43 #define GAPING_SECURITY_HOLE
45 int nc_main(int argc, char **argv)
47 int do_listen = 0, lport = 0, delay = 0, tmpfd, opt, sfd, x;
49 #ifdef GAPING_SECURITY_HOLE
50 char * pr00gie = NULL;
53 struct sockaddr_in address;
54 struct hostent *hostinfo;
56 fd_set readfds, testfds;
58 while ((opt = getopt(argc, argv, "lp:i:e:")) > 0) {
69 #ifdef GAPING_SECURITY_HOLE
79 #ifdef GAPING_SECURITY_HOLE
81 /* won't need stdin */
82 close (fileno(stdin));
84 #endif /* GAPING_SECURITY_HOLE */
87 if ((do_listen && optind != argc) || (!do_listen && optind + 2 != argc))
90 if ((sfd = socket(AF_INET, SOCK_STREAM, 0)) < 0)
91 bb_perror_msg_and_die("socket");
93 if (setsockopt (sfd, SOL_SOCKET, SO_REUSEADDR, &x, sizeof (x)) == -1)
94 bb_perror_msg_and_die ("reuseaddr failed");
95 address.sin_family = AF_INET;
98 memset(&address.sin_addr, 0, sizeof(address.sin_addr));
99 address.sin_port = htons(lport);
101 if (bind(sfd, (struct sockaddr *) &address, sizeof(address)) < 0)
102 bb_perror_msg_and_die("bind");
106 socklen_t addrlen = sizeof(address);
108 if (listen(sfd, 1) < 0)
109 bb_perror_msg_and_die("listen");
111 if ((tmpfd = accept(sfd, (struct sockaddr *) &address, &addrlen)) < 0)
112 bb_perror_msg_and_die("accept");
117 hostinfo = xgethostbyname(argv[optind]);
119 address.sin_addr = *(struct in_addr *) *hostinfo->h_addr_list;
120 address.sin_port = htons(atoi(argv[optind+1]));
122 if (connect(sfd, (struct sockaddr *) &address, sizeof(address)) < 0)
123 bb_perror_msg_and_die("connect");
126 #ifdef GAPING_SECURITY_HOLE
133 execl (pr00gie, pr00gie, NULL);
134 /* Don't print stuff or it will go over the wire.... */
137 #endif /* GAPING_SECURITY_HOLE */
141 FD_SET(sfd, &readfds);
142 FD_SET(STDIN_FILENO, &readfds);
151 if (select(FD_SETSIZE, &testfds, NULL, NULL, NULL) < 0)
152 bb_perror_msg_and_die("select");
154 for (fd = 0; fd < FD_SETSIZE; fd++) {
155 if (FD_ISSET(fd, &testfds)) {
156 if ((nread = safe_read(fd, buf, sizeof(buf))) < 0)
157 bb_perror_msg_and_die("read");
169 if (bb_full_write(ofd, buf, nread) < 0)
170 bb_perror_msg_and_die("write");