1 #pragma ident	"%Z%%M%	%I%	%E% SMI"
2 
3 /*
4  * Copyright (c) 1988, 1993
5  *	The Regents of the University of California.  All rights reserved.
6  *
7  * Redistribution and use in source and binary forms, with or without
8  * modification, are permitted provided that the following conditions
9  * are met:
10  * 1. Redistributions of source code must retain the above copyright
11  *    notice, this list of conditions and the following disclaimer.
12  * 2. Redistributions in binary form must reproduce the above copyright
13  *    notice, this list of conditions and the following disclaimer in the
14  *    documentation and/or other materials provided with the distribution.
15  * 3. All advertising materials mentioning features or use of this software
16  *    must display the following acknowledgement:
17  *	This product includes software developed by the University of
18  *	California, Berkeley and its contributors.
19  * 4. Neither the name of the University nor the names of its contributors
20  *    may be used to endorse or promote products derived from this software
21  *    without specific prior written permission.
22  *
23  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
24  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
27  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33  * SUCH DAMAGE.
34  *
35  * Copyright 2006 Sun Microsystems, Inc.  All rights reserved.
36  * Use is subject to license terms.
37  */
38 
39 #ifndef lint
40 static char sccsid[] = "@(#)network.c	8.1 (Berkeley) 6/6/93";
41 #endif /* not lint */
42 
43 #include <sys/types.h>
44 #include <sys/socket.h>
45 #include <sys/time.h>
46 
47 #include <errno.h>
48 
49 #include <arpa/telnet.h>
50 
51 #include "ring.h"
52 
53 #include "defines.h"
54 #include "externs.h"
55 
56 Ring	netoring;
57 Ring	netiring;
58 
59 /*
60  * Use large buffers to handle larger tickets when doing
61  * Kerberos authentication.  Microsoft generates large
62  * tickets that exceed the buffer size which causes authentication
63  * to fail.
64  */
65 static unsigned char netobuf[10*BUFSIZ];
66 static unsigned char netibuf[10*BUFSIZ];
67 
68 /*
69  * Initialize internal network data structures.
70  */
71 
72 void
73 init_network()
74 {
75 	if (ring_init(&netoring, netobuf, sizeof (netobuf)) != 1) {
76 		exit(1);
77 	}
78 	if (ring_init(&netiring, netibuf, sizeof (netibuf)) != 1) {
79 		exit(1);
80 	}
81 	NetTrace = stdout;
82 }
83 
84 
85 /*
86  * Check to see if any out-of-band data exists on a socket (for
87  * Telnet "synch" processing).
88  */
89 
90 int
91 stilloob()
92 {
93 	static struct timeval timeout = { 0 };
94 	fd_set	excepts;
95 	int value;
96 
97 	do {
98 		FD_ZERO(&excepts);
99 		FD_SET(net, &excepts);
100 		value = select(net+1, NULL, NULL, &excepts, &timeout);
101 	} while ((value == -1) && (errno == EINTR));
102 
103 	if (value < 0) {
104 		perror("select");
105 		(void) quit();
106 		/* NOTREACHED */
107 	}
108 	if (FD_ISSET(net, &excepts)) {
109 		return (1);
110 	} else {
111 		return (0);
112 	}
113 }
114 
115 
116 /*
117  *  setneturg()
118  *
119  *	Sets "neturg" to the current location.
120  */
121 
122 void
123 setneturg()
124 {
125 	ring_mark(&netoring);
126 }
127 
128 
129 /*
130  *  netflush
131  *		Send as much data as possible to the network,
132  *	handling requests for urgent data.
133  *
134  *		The return value indicates whether we did any
135  *	useful work.
136  */
137 
138 
139 int
140 netflush()
141 {
142 	register int n, n1;
143 
144 	if (encrypt_output)
145 		ring_encrypt(&netoring, encrypt_output);
146 
147 	if ((n1 = n = ring_full_consecutive(&netoring)) > 0) {
148 		if (!ring_at_mark(&netoring)) {
149 			/* normal write */
150 			n = send(net, netoring.consume, n, 0);
151 		} else {
152 			/*
153 			 * In 4.2(and 4.3) systems, there is some question about
154 			 * what byte in a sendOOB operation is the "OOB" data.
155 			 * To make ourselves compatible, we only send ONE byte
156 			 * out of band, the one WE THINK should be OOB (though
157 			 * we really have more the TCP philosophy of urgent data
158 			 * rather than the Unix philosophy of OOB data).
159 			 */
160 			n = send(net, netoring.consume, 1, MSG_OOB);
161 		}
162 	}
163 	if (n < 0) {
164 		if (errno != ENOBUFS && errno != EWOULDBLOCK) {
165 			setcommandmode();
166 			perror(hostname);
167 			ring_clear_mark(&netoring);
168 			longjmp(peerdied, -1);
169 			/*NOTREACHED*/
170 		}
171 		n = 0;
172 	}
173 	if (netdata && n) {
174 		Dump('>', netoring.consume, n);
175 	}
176 	if (n) {
177 		ring_consumed(&netoring, n);
178 		/*
179 		 * If we sent all, and more to send, then recurse to pick
180 		 * up the other half.
181 		 */
182 		if ((n1 == n) && ring_full_consecutive(&netoring)) {
183 			(void) netflush();
184 		}
185 		return (1);
186 	} else {
187 		return (0);
188 	}
189 }
190