1 /* vi: set sw=4 ts=4: */
2 /* nc: mini-netcat - built from the ground up for LRP
3 Copyright (C) 1998 Charles P. Wright
6 0.0.2 5K Smaller and you can also check the exit condition if you wish.
9 19980918 Busy Boxed! Dave Cinege
10 19990512 Uses Select. Charles P. Wright
11 19990513 Fixes stdin stupidity and uses buffers. Charles P. Wright
13 This program is free software; you can redistribute it and/or modify
14 it under the terms of the GNU General Public License as published by
15 the Free Software Foundation; either version 2 of the License, or
16 (at your option) any later version.
18 This program is distributed in the hope that it will be useful,
19 but WITHOUT ANY WARRANTY; without even the implied warranty of
20 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
21 GNU General Public License for more details.
23 You should have received a copy of the GNU General Public License
24 along with this program; if not, write to the Free Software
25 Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
35 #include <sys/types.h>
36 #include <sys/socket.h>
37 #include <netinet/in.h>
38 #include <arpa/inet.h>
41 #include <sys/ioctl.h>
44 #define GAPING_SECURITY_HOLE
46 static void timeout(int signum)
48 bb_error_msg_and_die("Timed out");
51 int nc_main(int argc, char **argv)
53 int do_listen = 0, lport = 0, delay = 0, wsecs = 0, tmpfd, opt, sfd, x;
55 #ifdef GAPING_SECURITY_HOLE
56 char * pr00gie = NULL;
59 struct sockaddr_in address;
60 struct hostent *hostinfo;
62 fd_set readfds, testfds;
64 while ((opt = getopt(argc, argv, "lp:i:e:w:")) > 0) {
70 lport = bb_lookup_port(optarg, "tcp", 0);
75 #ifdef GAPING_SECURITY_HOLE
88 #ifdef GAPING_SECURITY_HOLE
90 /* won't need stdin */
93 #endif /* GAPING_SECURITY_HOLE */
96 if ((do_listen && optind != argc) || (!do_listen && optind + 2 != argc))
99 if ((sfd = socket(AF_INET, SOCK_STREAM, 0)) < 0)
100 bb_perror_msg_and_die("socket");
102 if (setsockopt (sfd, SOL_SOCKET, SO_REUSEADDR, &x, sizeof (x)) == -1)
103 bb_perror_msg_and_die ("reuseaddr failed");
104 address.sin_family = AF_INET;
107 signal(SIGALRM, timeout);
112 memset(&address.sin_addr, 0, sizeof(address.sin_addr));
113 address.sin_port = lport;
115 if (bind(sfd, (struct sockaddr *) &address, sizeof(address)) < 0)
116 bb_perror_msg_and_die("bind");
120 socklen_t addrlen = sizeof(address);
122 if (listen(sfd, 1) < 0)
123 bb_perror_msg_and_die("listen");
125 if ((tmpfd = accept(sfd, (struct sockaddr *) &address, &addrlen)) < 0)
126 bb_perror_msg_and_die("accept");
131 hostinfo = xgethostbyname(argv[optind]);
133 address.sin_addr = *(struct in_addr *) *hostinfo->h_addr_list;
134 address.sin_port = bb_lookup_port(argv[optind+1], "tcp", 0);
136 if (connect(sfd, (struct sockaddr *) &address, sizeof(address)) < 0)
137 bb_perror_msg_and_die("connect");
142 signal(SIGALRM, SIG_DFL);
145 #ifdef GAPING_SECURITY_HOLE
152 execl (pr00gie, pr00gie, NULL);
153 /* Don't print stuff or it will go over the wire.... */
156 #endif /* GAPING_SECURITY_HOLE */
160 FD_SET(sfd, &readfds);
161 FD_SET(STDIN_FILENO, &readfds);
170 if (select(FD_SETSIZE, &testfds, NULL, NULL, NULL) < 0)
171 bb_perror_msg_and_die("select");
173 for (fd = 0; fd < FD_SETSIZE; fd++) {
174 if (FD_ISSET(fd, &testfds)) {
175 if ((nread = safe_read(fd, buf, sizeof(buf))) < 0)
176 bb_perror_msg_and_die("read");
188 if (bb_full_write(ofd, buf, nread) < 0)
189 bb_perror_msg_and_die("write");