1 /* vi: set sw=4 ts=4: */
2 /* nc: mini-netcat - built from the ground up for LRP
3 Copyright (C) 1998 Charles P. Wright
6 0.0.2 5K Smaller and you can also check the exit condition if you wish.
9 19980918 Busy Boxed! Dave Cinege
10 19990512 Uses Select. Charles P. Wright
11 19990513 Fixes stdin stupidity and uses buffers. Charles P. Wright
13 This program is free software; you can redistribute it and/or modify
14 it under the terms of the GNU General Public License as published by
15 the Free Software Foundation; either version 2 of the License, or
16 (at your option) any later version.
18 This program is distributed in the hope that it will be useful,
19 but WITHOUT ANY WARRANTY; without even the implied warranty of
20 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
21 GNU General Public License for more details.
23 You should have received a copy of the GNU General Public License
24 along with this program; if not, write to the Free Software
25 Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
34 #include <sys/types.h>
35 #include <sys/socket.h>
36 #include <netinet/in.h>
37 #include <arpa/inet.h>
40 #include <sys/ioctl.h>
43 static void timeout(int signum)
45 bb_error_msg_and_die("Timed out");
48 int nc_main(int argc, char **argv)
50 int do_listen = 0, lport = 0, delay = 0, wsecs = 0, tmpfd, opt, sfd, x;
52 #ifdef CONFIG_NC_GAPING_SECURITY_HOLE
56 struct sockaddr_in address;
57 struct hostent *hostinfo;
59 fd_set readfds, testfds;
61 while ((opt = getopt(argc, argv, "lp:i:e:w:")) > 0) {
67 lport = bb_lookup_port(optarg, "tcp", 0);
72 #ifdef CONFIG_NC_GAPING_SECURITY_HOLE
85 if ((do_listen && optind != argc) || (!do_listen && optind + 2 != argc))
88 if ((sfd = socket(AF_INET, SOCK_STREAM, 0)) < 0)
89 bb_perror_msg_and_die("socket");
91 if (setsockopt(sfd, SOL_SOCKET, SO_REUSEADDR, &x, sizeof (x)) == -1)
92 bb_perror_msg_and_die("reuseaddr");
93 address.sin_family = AF_INET;
96 signal(SIGALRM, timeout);
101 memset(&address.sin_addr, 0, sizeof(address.sin_addr));
102 address.sin_port = lport;
104 if (bind(sfd, (struct sockaddr *) &address, sizeof(address)) < 0)
105 bb_perror_msg_and_die("bind");
109 socklen_t addrlen = sizeof(address);
111 if (listen(sfd, 1) < 0)
112 bb_perror_msg_and_die("listen");
114 if ((tmpfd = accept(sfd, (struct sockaddr *) &address, &addrlen)) < 0)
115 bb_perror_msg_and_die("accept");
120 hostinfo = xgethostbyname(argv[optind]);
122 address.sin_addr = *(struct in_addr *) *hostinfo->h_addr_list;
123 address.sin_port = bb_lookup_port(argv[optind+1], "tcp", 0);
125 if (connect(sfd, (struct sockaddr *) &address, sizeof(address)) < 0)
126 bb_perror_msg_and_die("connect");
131 signal(SIGALRM, SIG_DFL);
134 #ifdef CONFIG_NC_GAPING_SECURITY_HOLE
141 execl(pr00gie, pr00gie, NULL);
142 /* Don't print stuff or it will go over the wire.... */
145 #endif /* CONFIG_NC_GAPING_SECURITY_HOLE */
148 FD_SET(sfd, &readfds);
149 FD_SET(STDIN_FILENO, &readfds);
158 if (select(FD_SETSIZE, &testfds, NULL, NULL, NULL) < 0)
159 bb_perror_msg_and_die("select");
161 for (fd = 0; fd < FD_SETSIZE; fd++) {
162 if (FD_ISSET(fd, &testfds)) {
163 if ((nread = safe_read(fd, buf, sizeof(buf))) < 0)
164 bb_perror_msg_and_die(bb_msg_read_error);
172 shutdown(sfd, 1 /* send */ );
174 FD_CLR(STDIN_FILENO, &readfds);
179 if (bb_full_write(ofd, buf, nread) < 0)
180 bb_perror_msg_and_die(bb_msg_write_error);