... | ... |
@@ -33,7 +33,6 @@ int |
33 | 33 |
main(int argc, char *argv[]) |
34 | 34 |
{ |
35 | 35 |
char id[MAXIDSIZE]; |
36 |
- int fd,n; |
|
37 | 36 |
char *ptr; |
38 | 37 |
char *host; |
39 | 38 |
int port; |
... | ... |
@@ -48,17 +47,14 @@ main(int argc, char *argv[]) |
48 | 47 |
int nwritefds; |
49 | 48 |
int i; |
50 | 49 |
int queued; |
51 |
- /* get the id */ |
|
52 |
- if((fd=open(".sshchat",O_RDONLY))==-1) |
|
53 |
- return(-1); /* error */ |
|
54 |
- if((n=read(fd,id,MAXIDSIZE))<1 || id[0]=='\n') { |
|
55 |
- close(fd),fd=-1; |
|
56 |
- return(-2); /* no id */ |
|
50 |
+ if(argc!=2 || strcmp(argv[argc-1],"--help")==0) { |
|
51 |
+ fprintf(stderr,"Syntax: %s username",argv[0]); |
|
52 |
+ return(1); /* no id */ |
|
57 | 53 |
} |
58 |
- close(fd),fd=-1; |
|
59 |
- id[(n>=MAXIDSIZE)?MAXIDSIZE-1:n]='\0'; |
|
60 |
- if((ptr=strchr(id,'\n'))!=NULL) |
|
61 |
- *ptr='\0'; |
|
54 |
+ strncpy(id,argv[1],sizeof(MAXIDSIZE)); |
|
55 |
+ id[MAXIDSIZE-1]='\0'; |
|
56 |
+ if((ptr=strchr(id,' '))!=NULL) |
|
57 |
+ *id='\0'; /* spaces not allowed */ |
|
62 | 58 |
/* open socket to server */ |
63 | 59 |
if((host=ipv4_genip("127.0.0.1",&hostsize))==NULL) |
64 | 60 |
return(-3); /* couldn't resolv localhost */ |
... | ... |
@@ -35,7 +35,8 @@ main(int argc, char *argv[]) |
35 | 35 |
char id[MAXIDSIZE]; |
36 | 36 |
int fd,n; |
37 | 37 |
char *ptr; |
38 |
- char *host,port; |
|
38 |
+ char *host; |
|
39 |
+ int port; |
|
39 | 40 |
long hostsize; |
40 | 41 |
int socket; |
41 | 42 |
sbuf *c2s,*s2c; |
... | ... |
@@ -103,7 +104,7 @@ main(int argc, char *argv[]) |
103 | 104 |
continue; |
104 | 105 |
nreadfds=sselect_getread(ssel,readfds,sizeof(readfds)/sizeof(readfds[1])); |
105 | 106 |
nwritefds=sselect_getwrite(ssel,writefds,sizeof(writefds)/sizeof(writefds[1])); |
106 |
- for(i=0;i<nreadfds;i++) { |
|
107 |
+ for(i=0;i<nreadfds && i<(sizeof(readfds)/sizeof(readfds[0]));i++) { |
|
107 | 108 |
if(readfds[i]==INFD && sbuf_count(c2s)<BUFSIZE) { |
108 | 109 |
if((queued=sock_queued(readfds[i]))==0) { |
109 | 110 |
forcedexit=1; |
... | ... |
@@ -121,7 +122,7 @@ main(int argc, char *argv[]) |
121 | 122 |
sbuf_fill(s2c,socket,queued); |
122 | 123 |
} |
123 | 124 |
} |
124 |
- for(i=0;i<nwritefds;i++) { |
|
125 |
+ for(i=0;i<nwritefds && i<(sizeof(writefds)/sizeof(writefds[0]));i++) { |
|
125 | 126 |
if(writefds[i]==OUTFD && sbuf_count(s2c)>0) |
126 | 127 |
sbuf_send(s2c,OUTFD,sbuf_count(s2c)); |
127 | 128 |
if(writefds[i]==socket && sbuf_count(c2s)>0) |
1 | 1 |
new file mode 100644 |
... | ... |
@@ -0,0 +1,138 @@ |
1 |
+/* |
|
2 |
+ * sshchat.c |
|
3 |
+ * |
|
4 |
+ * Client component of sshchat, connects to server, identifies itself using ~/.sshchat file and forwards stdin/stdout. |
|
5 |
+ * |
|
6 |
+ * Author: Dario Rodriguez dario@softhome.net |
|
7 |
+ * This program is licensed under the terms of the GPL v2.1+ |
|
8 |
+ */ |
|
9 |
+ |
|
10 |
+#include <stdlib.h> |
|
11 |
+#include <stdio.h> |
|
12 |
+#include <unistd.h> |
|
13 |
+#include <string.h> |
|
14 |
+#include <sys/types.h> |
|
15 |
+#include <sys/stat.h> |
|
16 |
+#include <fcntl.h> |
|
17 |
+ |
|
18 |
+#include "socklib.h" |
|
19 |
+#include "sbuf.h" |
|
20 |
+ |
|
21 |
+#include "sshchat.h" |
|
22 |
+ |
|
23 |
+#define MAXIDSIZE 128 |
|
24 |
+#define CONNTIMEOUT 2000 |
|
25 |
+#define SELECTTIMEOUT 1000 |
|
26 |
+ |
|
27 |
+#define BUFSIZE 16384 |
|
28 |
+ |
|
29 |
+#define INFD 0 |
|
30 |
+#define OUTFD 1 |
|
31 |
+ |
|
32 |
+int |
|
33 |
+main(int argc, char *argv[]) |
|
34 |
+{ |
|
35 |
+ char id[MAXIDSIZE]; |
|
36 |
+ int fd,n; |
|
37 |
+ char *ptr; |
|
38 |
+ char *host,port; |
|
39 |
+ long hostsize; |
|
40 |
+ int socket; |
|
41 |
+ sbuf *c2s,*s2c; |
|
42 |
+ sselect *ssel; |
|
43 |
+ int forcedexit; |
|
44 |
+ int readfds[2]; |
|
45 |
+ int writefds[2]; |
|
46 |
+ int nreadfds; |
|
47 |
+ int nwritefds; |
|
48 |
+ int i; |
|
49 |
+ int queued; |
|
50 |
+ /* get the id */ |
|
51 |
+ if((fd=open(".sshchat",O_RDONLY))==-1) |
|
52 |
+ return(-1); /* error */ |
|
53 |
+ if((n=read(fd,id,MAXIDSIZE))<1 || id[0]=='\n') { |
|
54 |
+ close(fd),fd=-1; |
|
55 |
+ return(-2); /* no id */ |
|
56 |
+ } |
|
57 |
+ close(fd),fd=-1; |
|
58 |
+ id[(n>=MAXIDSIZE)?MAXIDSIZE-1:n]='\0'; |
|
59 |
+ if((ptr=strchr(id,'\n'))!=NULL) |
|
60 |
+ *ptr='\0'; |
|
61 |
+ /* open socket to server */ |
|
62 |
+ if((host=ipv4_genip("127.0.0.1",&hostsize))==NULL) |
|
63 |
+ return(-3); /* couldn't resolv localhost */ |
|
64 |
+ if((port=ipv4_genport("sshchat",SERVERPORT))==-1) { |
|
65 |
+ free(host),host=NULL; |
|
66 |
+ return(-4); /* couldn't resolv port */ |
|
67 |
+ } |
|
68 |
+ if((socket=ipv4_preconnect(host,hostsize,port))==-1) { |
|
69 |
+ free(host),host=NULL; |
|
70 |
+ return(-5); /* couldn't connect to localhost (1) */ |
|
71 |
+ } |
|
72 |
+ if(ipv4_connect(socket,CONNTIMEOUT)==-1) { |
|
73 |
+ free(host),host=NULL; |
|
74 |
+ return(-6); /* couldn't connect to localhost (2) */ |
|
75 |
+ } |
|
76 |
+ ipv4_postconnect(socket); |
|
77 |
+ free(host),host=NULL,hostsize=0; |
|
78 |
+ /* alloc I/O buffers */ |
|
79 |
+ if((c2s=sbuf_init(BUFSIZE))==NULL || (s2c=sbuf_init(BUFSIZE))==NULL) { |
|
80 |
+ close(socket),socket=-1,sbuf_free(c2s),c2s=NULL; |
|
81 |
+ return(-7); /* couldn't alloc buffers */ |
|
82 |
+ } |
|
83 |
+ if((ssel=sselect_init())==NULL) { |
|
84 |
+ close(socket),socket=-1,sbuf_free(c2s),c2s=NULL,sbuf_free(s2c),s2c=NULL; |
|
85 |
+ return(-8); /* couldn't alloc select struct */ |
|
86 |
+ } |
|
87 |
+ /* prefeed the identification */ |
|
88 |
+ sbuf_addstr(c2s,id); |
|
89 |
+ sbuf_addstr(c2s,"\n"); |
|
90 |
+ /* forward data */ |
|
91 |
+ forcedexit=0; |
|
92 |
+ while(!forcedexit) { |
|
93 |
+ sselect_reset(ssel); |
|
94 |
+ if(sbuf_count(c2s)<BUFSIZE) |
|
95 |
+ sselect_addread(ssel,INFD,NULL); |
|
96 |
+ if(sbuf_count(c2s)>0) |
|
97 |
+ sselect_addwrite(ssel,socket,NULL); |
|
98 |
+ if(sbuf_count(s2c)>0) |
|
99 |
+ sselect_addwrite(ssel,OUTFD,NULL); |
|
100 |
+ if(sbuf_count(s2c)<BUFSIZE) |
|
101 |
+ sselect_addread(ssel,socket,NULL); |
|
102 |
+ if(sselect_wait(ssel,SELECTTIMEOUT)<1) |
|
103 |
+ continue; |
|
104 |
+ nreadfds=sselect_getread(ssel,readfds,sizeof(readfds)/sizeof(readfds[1])); |
|
105 |
+ nwritefds=sselect_getwrite(ssel,writefds,sizeof(writefds)/sizeof(writefds[1])); |
|
106 |
+ for(i=0;i<nreadfds;i++) { |
|
107 |
+ if(readfds[i]==INFD && sbuf_count(c2s)<BUFSIZE) { |
|
108 |
+ if((queued=sock_queued(readfds[i]))==0) { |
|
109 |
+ forcedexit=1; |
|
110 |
+ break; |
|
111 |
+ } |
|
112 |
+ sbuf_discard(c2s); |
|
113 |
+ sbuf_fill(c2s,INFD,queued); |
|
114 |
+ } |
|
115 |
+ if(readfds[i]==socket && sbuf_count(s2c)<BUFSIZE) { |
|
116 |
+ if((queued=sock_queued(readfds[i]))==0) { |
|
117 |
+ forcedexit=1; |
|
118 |
+ break; |
|
119 |
+ } |
|
120 |
+ sbuf_discard(s2c); |
|
121 |
+ sbuf_fill(s2c,socket,queued); |
|
122 |
+ } |
|
123 |
+ } |
|
124 |
+ for(i=0;i<nwritefds;i++) { |
|
125 |
+ if(writefds[i]==OUTFD && sbuf_count(s2c)>0) |
|
126 |
+ sbuf_send(s2c,OUTFD,sbuf_count(s2c)); |
|
127 |
+ if(writefds[i]==socket && sbuf_count(c2s)>0) |
|
128 |
+ sbuf_send(c2s,socket,sbuf_count(c2s)); |
|
129 |
+ } |
|
130 |
+ } |
|
131 |
+ /* normal exit */ |
|
132 |
+ close(socket),socket=-1; |
|
133 |
+ sbuf_free(c2s),c2s=NULL; |
|
134 |
+ sbuf_free(s2c),s2c=NULL; |
|
135 |
+ sselect_free(ssel),ssel=NULL; |
|
136 |
+ return(0); |
|
137 |
+} |
|
138 |
+ |