1 /* vi: set sw=4 ts=4: */
2 /* nc: mini-netcat - built from the ground up for LRP
3 Copyright (C) 1998 Charles P. Wright
6 0.0.2 5K Smaller and you can also check the exit condition if you wish.
9 19980918 Busy Boxed! Dave Cinege
10 19990512 Uses Select. Charles P. Wright
11 19990513 Fixes stdin stupidity and uses buffers. Charles P. Wright
13 This program is free software; you can redistribute it and/or modify
14 it under the terms of the GNU General Public License as published by
15 the Free Software Foundation; either version 2 of the License, or
16 (at your option) any later version.
18 This program is distributed in the hope that it will be useful,
19 but WITHOUT ANY WARRANTY; without even the implied warranty of
20 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
21 GNU General Public License for more details.
23 You should have received a copy of the GNU General Public License
24 along with this program; if not, write to the Free Software
25 Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
34 #include <sys/types.h>
35 #include <sys/socket.h>
36 #include <netinet/in.h>
37 #include <arpa/inet.h>
40 #include <sys/ioctl.h>
43 static void timeout(int signum)
45 bb_error_msg_and_die("Timed out");
48 int nc_main(int argc, char **argv)
50 int do_listen = 0, lport = 0, delay = 0, wsecs = 0, tmpfd, opt, sfd, x;
52 #define buf bb_common_bufsiz1
54 #ifdef CONFIG_NC_GAPING_SECURITY_HOLE
58 struct sockaddr_in address;
59 struct hostent *hostinfo;
61 fd_set readfds, testfds;
63 while ((opt = getopt(argc, argv, "lp:i:e:w:")) > 0) {
69 lport = bb_lookup_port(optarg, "tcp", 0);
74 #ifdef CONFIG_NC_GAPING_SECURITY_HOLE
87 if ((do_listen && optind != argc) || (!do_listen && optind + 2 != argc))
90 if ((sfd = socket(AF_INET, SOCK_STREAM, 0)) < 0)
91 bb_perror_msg_and_die("socket");
93 if (setsockopt(sfd, SOL_SOCKET, SO_REUSEADDR, &x, sizeof (x)) == -1)
94 bb_perror_msg_and_die("reuseaddr");
95 address.sin_family = AF_INET;
98 signal(SIGALRM, timeout);
103 memset(&address.sin_addr, 0, sizeof(address.sin_addr));
104 address.sin_port = lport;
106 if (bind(sfd, (struct sockaddr *) &address, sizeof(address)) < 0)
107 bb_perror_msg_and_die("bind");
111 socklen_t addrlen = sizeof(address);
113 if (listen(sfd, 1) < 0)
114 bb_perror_msg_and_die("listen");
116 if ((tmpfd = accept(sfd, (struct sockaddr *) &address, &addrlen)) < 0)
117 bb_perror_msg_and_die("accept");
122 hostinfo = xgethostbyname(argv[optind]);
124 address.sin_addr = *(struct in_addr *) *hostinfo->h_addr_list;
125 address.sin_port = bb_lookup_port(argv[optind+1], "tcp", 0);
127 if (connect(sfd, (struct sockaddr *) &address, sizeof(address)) < 0)
128 bb_perror_msg_and_die("connect");
133 signal(SIGALRM, SIG_DFL);
136 #ifdef CONFIG_NC_GAPING_SECURITY_HOLE
143 execl(pr00gie, pr00gie, NULL);
144 /* Don't print stuff or it will go over the wire.... */
147 #endif /* CONFIG_NC_GAPING_SECURITY_HOLE */
150 FD_SET(sfd, &readfds);
151 FD_SET(STDIN_FILENO, &readfds);
160 if (select(FD_SETSIZE, &testfds, NULL, NULL, NULL) < 0)
161 bb_perror_msg_and_die("select");
163 for (fd = 0; fd < FD_SETSIZE; fd++) {
164 if (FD_ISSET(fd, &testfds)) {
165 if ((nread = safe_read(fd, buf, sizeof(buf))) < 0)
166 bb_perror_msg_and_die(bb_msg_read_error);
174 shutdown(sfd, 1 /* send */ );
176 FD_CLR(STDIN_FILENO, &readfds);
181 if (bb_full_write(ofd, buf, nread) < 0)
182 bb_perror_msg_and_die(bb_msg_write_error);