2002-09-03 19:52:59 +08:00
|
|
|
/***************************************************************************
|
2004-06-24 15:43:48 +08:00
|
|
|
* _ _ ____ _
|
|
|
|
* Project ___| | | | _ \| |
|
|
|
|
* / __| | | | |_) | |
|
|
|
|
* | (__| |_| | _ <| |___
|
1999-12-29 22:20:26 +08:00
|
|
|
* \___|\___/|_| \_\_____|
|
|
|
|
*
|
2023-01-02 20:51:48 +08:00
|
|
|
* Copyright (C) Daniel Stenberg, <daniel@haxx.se>, et al.
|
1999-12-29 22:20:26 +08:00
|
|
|
*
|
2002-09-03 19:52:59 +08:00
|
|
|
* This software is licensed as described in the file COPYING, which
|
|
|
|
* you should have received as part of this distribution. The terms
|
2020-11-04 21:02:01 +08:00
|
|
|
* are also available at https://curl.se/docs/copyright.html.
|
2004-06-24 15:43:48 +08:00
|
|
|
*
|
2001-01-03 17:29:33 +08:00
|
|
|
* You may opt to use, copy, modify, merge, publish, distribute and/or sell
|
|
|
|
* copies of the Software, and permit persons to whom the Software is
|
2002-09-03 19:52:59 +08:00
|
|
|
* furnished to do so, under the terms of the COPYING file.
|
1999-12-29 22:20:26 +08:00
|
|
|
*
|
2001-01-03 17:29:33 +08:00
|
|
|
* This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
|
|
|
|
* KIND, either express or implied.
|
1999-12-29 22:20:26 +08:00
|
|
|
*
|
2002-09-03 19:52:59 +08:00
|
|
|
* SPDX-License-Identifier: curl
|
2022-05-17 17:16:50 +08:00
|
|
|
*
|
2002-09-03 19:52:59 +08:00
|
|
|
***************************************************************************/
|
1999-12-29 22:20:26 +08:00
|
|
|
|
2013-01-07 02:06:49 +08:00
|
|
|
#include "curl_setup.h"
|
2000-08-24 22:26:33 +08:00
|
|
|
|
2002-06-11 19:13:01 +08:00
|
|
|
#ifndef CURL_DISABLE_TELNET
|
1999-12-29 22:20:26 +08:00
|
|
|
|
2011-07-25 11:30:14 +08:00
|
|
|
#ifdef HAVE_NETINET_IN_H
|
1999-12-29 22:20:26 +08:00
|
|
|
#include <netinet/in.h>
|
2011-07-25 11:30:14 +08:00
|
|
|
#endif
|
|
|
|
#ifdef HAVE_NETDB_H
|
1999-12-29 22:20:26 +08:00
|
|
|
#include <netdb.h>
|
2011-07-25 11:30:14 +08:00
|
|
|
#endif
|
1999-12-29 22:20:26 +08:00
|
|
|
#ifdef HAVE_ARPA_INET_H
|
|
|
|
#include <arpa/inet.h>
|
|
|
|
#endif
|
|
|
|
#ifdef HAVE_NET_IF_H
|
|
|
|
#include <net/if.h>
|
|
|
|
#endif
|
2008-11-15 07:17:32 +08:00
|
|
|
#ifdef HAVE_SYS_IOCTL_H
|
1999-12-29 22:20:26 +08:00
|
|
|
#include <sys/ioctl.h>
|
2008-11-15 07:17:32 +08:00
|
|
|
#endif
|
1999-12-29 22:20:26 +08:00
|
|
|
|
|
|
|
#ifdef HAVE_SYS_PARAM_H
|
|
|
|
#include <sys/param.h>
|
|
|
|
#endif
|
|
|
|
|
2013-01-04 09:50:28 +08:00
|
|
|
#include "urldata.h"
|
1999-12-29 22:20:26 +08:00
|
|
|
#include <curl/curl.h>
|
2013-01-04 09:50:28 +08:00
|
|
|
#include "transfer.h"
|
|
|
|
#include "sendf.h"
|
|
|
|
#include "telnet.h"
|
|
|
|
#include "connect.h"
|
|
|
|
#include "progress.h"
|
2016-05-30 04:57:40 +08:00
|
|
|
#include "system_win32.h"
|
2013-01-04 09:50:28 +08:00
|
|
|
#include "arpa_telnet.h"
|
|
|
|
#include "select.h"
|
2016-10-01 00:54:02 +08:00
|
|
|
#include "strcase.h"
|
2013-01-04 09:50:28 +08:00
|
|
|
#include "warnless.h"
|
1999-12-29 22:20:26 +08:00
|
|
|
|
2016-04-29 21:46:40 +08:00
|
|
|
/* The last 3 #include files should be in this order */
|
|
|
|
#include "curl_printf.h"
|
2015-03-25 06:12:03 +08:00
|
|
|
#include "curl_memory.h"
|
2013-01-04 09:50:28 +08:00
|
|
|
#include "memdebug.h"
|
2001-03-16 23:19:36 +08:00
|
|
|
|
1999-12-29 22:20:26 +08:00
|
|
|
#define SUBBUFSIZE 512
|
|
|
|
|
2011-11-25 17:56:18 +08:00
|
|
|
#define CURL_SB_CLEAR(x) x->subpointer = x->subbuffer
|
|
|
|
#define CURL_SB_TERM(x) \
|
|
|
|
do { \
|
|
|
|
x->subend = x->subpointer; \
|
|
|
|
CURL_SB_CLEAR(x); \
|
2019-11-30 16:29:36 +08:00
|
|
|
} while(0)
|
2018-05-12 05:40:58 +08:00
|
|
|
#define CURL_SB_ACCUM(x,c) \
|
|
|
|
do { \
|
|
|
|
if(x->subpointer < (x->subbuffer + sizeof(x->subbuffer))) \
|
|
|
|
*x->subpointer++ = (c); \
|
2019-11-30 16:29:36 +08:00
|
|
|
} while(0)
|
1999-12-29 22:20:26 +08:00
|
|
|
|
2003-03-12 16:40:45 +08:00
|
|
|
#define CURL_SB_GET(x) ((*x->subpointer++)&0xff)
|
|
|
|
#define CURL_SB_LEN(x) (x->subend - x->subpointer)
|
1999-12-29 22:20:26 +08:00
|
|
|
|
2017-04-25 14:36:13 +08:00
|
|
|
/* For posterity:
|
|
|
|
#define CURL_SB_PEEK(x) ((*x->subpointer)&0xff)
|
|
|
|
#define CURL_SB_EOF(x) (x->subpointer >= x->subend) */
|
|
|
|
|
2007-03-25 10:30:58 +08:00
|
|
|
#ifdef CURL_DISABLE_VERBOSE_STRINGS
|
2011-09-03 22:06:10 +08:00
|
|
|
#define printoption(a,b,c,d) Curl_nop_stmt
|
2007-03-25 10:30:58 +08:00
|
|
|
#endif
|
|
|
|
|
2001-01-05 18:11:41 +08:00
|
|
|
static
|
2021-01-18 18:56:50 +08:00
|
|
|
CURLcode telrcv(struct Curl_easy *data,
|
2009-03-12 21:18:25 +08:00
|
|
|
const unsigned char *inbuf, /* Data received from socket */
|
|
|
|
ssize_t count); /* Number of bytes received */
|
1999-12-29 22:20:26 +08:00
|
|
|
|
2007-03-25 10:30:58 +08:00
|
|
|
#ifndef CURL_DISABLE_VERBOSE_STRINGS
|
2016-06-21 21:47:12 +08:00
|
|
|
static void printoption(struct Curl_easy *data,
|
2004-10-06 15:50:18 +08:00
|
|
|
const char *direction,
|
|
|
|
int cmd, int option);
|
2007-03-25 10:30:58 +08:00
|
|
|
#endif
|
1999-12-29 22:20:26 +08:00
|
|
|
|
2021-01-18 18:56:50 +08:00
|
|
|
static void negotiate(struct Curl_easy *data);
|
|
|
|
static void send_negotiation(struct Curl_easy *data, int cmd, int option);
|
|
|
|
static void set_local_option(struct Curl_easy *data,
|
2018-06-03 04:52:56 +08:00
|
|
|
int option, int newstate);
|
2021-01-18 18:56:50 +08:00
|
|
|
static void set_remote_option(struct Curl_easy *data,
|
2018-06-03 04:52:56 +08:00
|
|
|
int option, int newstate);
|
1999-12-29 22:20:26 +08:00
|
|
|
|
2016-06-21 21:47:12 +08:00
|
|
|
static void printsub(struct Curl_easy *data,
|
2004-10-06 15:50:18 +08:00
|
|
|
int direction, unsigned char *pointer,
|
2004-07-01 16:10:21 +08:00
|
|
|
size_t length);
|
2021-01-18 18:56:50 +08:00
|
|
|
static void suboption(struct Curl_easy *data);
|
|
|
|
static void sendsuboption(struct Curl_easy *data, int option);
|
1999-12-29 22:20:26 +08:00
|
|
|
|
2021-01-09 00:58:15 +08:00
|
|
|
static CURLcode telnet_do(struct Curl_easy *data, bool *done);
|
|
|
|
static CURLcode telnet_done(struct Curl_easy *data,
|
2007-10-12 21:36:37 +08:00
|
|
|
CURLcode, bool premature);
|
2021-01-09 00:58:15 +08:00
|
|
|
static CURLcode send_telnet_data(struct Curl_easy *data,
|
2011-11-25 17:35:34 +08:00
|
|
|
char *buffer, ssize_t nread);
|
2007-10-12 21:36:37 +08:00
|
|
|
|
2001-03-05 21:59:43 +08:00
|
|
|
/* For negotiation compliant to RFC 1143 */
|
2004-10-06 15:50:18 +08:00
|
|
|
#define CURL_NO 0
|
|
|
|
#define CURL_YES 1
|
|
|
|
#define CURL_WANTYES 2
|
|
|
|
#define CURL_WANTNO 3
|
2001-03-05 21:59:43 +08:00
|
|
|
|
2004-10-06 15:50:18 +08:00
|
|
|
#define CURL_EMPTY 0
|
2003-03-12 16:40:45 +08:00
|
|
|
#define CURL_OPPOSITE 1
|
1999-12-29 22:20:26 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Telnet receiver states for fsm
|
|
|
|
*/
|
2001-03-05 21:59:43 +08:00
|
|
|
typedef enum
|
1999-12-29 22:20:26 +08:00
|
|
|
{
|
2003-03-12 16:40:45 +08:00
|
|
|
CURL_TS_DATA = 0,
|
|
|
|
CURL_TS_IAC,
|
|
|
|
CURL_TS_WILL,
|
|
|
|
CURL_TS_WONT,
|
|
|
|
CURL_TS_DO,
|
|
|
|
CURL_TS_DONT,
|
|
|
|
CURL_TS_CR,
|
|
|
|
CURL_TS_SB, /* sub-option collection */
|
|
|
|
CURL_TS_SE /* looking for sub-option end */
|
2001-03-05 21:59:43 +08:00
|
|
|
} TelnetReceive;
|
|
|
|
|
|
|
|
struct TELNET {
|
|
|
|
int please_negotiate;
|
|
|
|
int already_negotiated;
|
2004-06-24 15:43:48 +08:00
|
|
|
int us[256];
|
|
|
|
int usq[256];
|
|
|
|
int us_preferred[256];
|
|
|
|
int him[256];
|
|
|
|
int himq[256];
|
|
|
|
int him_preferred[256];
|
2011-11-25 17:35:34 +08:00
|
|
|
int subnegotiation[256];
|
2001-09-17 22:10:38 +08:00
|
|
|
char subopt_ttype[32]; /* Set with suboption TTYPE */
|
2011-11-25 17:35:34 +08:00
|
|
|
char subopt_xdisploc[128]; /* Set with suboption XDISPLOC */
|
|
|
|
unsigned short subopt_wsx; /* Set with suboption NAWS */
|
|
|
|
unsigned short subopt_wsy; /* Set with suboption NAWS */
|
2021-01-17 05:17:51 +08:00
|
|
|
TelnetReceive telrcv_state;
|
2011-11-25 17:35:34 +08:00
|
|
|
struct curl_slist *telnet_vars; /* Environment variables */
|
2024-01-07 23:28:15 +08:00
|
|
|
struct dynbuf out; /* output buffer */
|
2001-03-05 21:59:43 +08:00
|
|
|
|
|
|
|
/* suboptions */
|
2006-04-07 19:46:16 +08:00
|
|
|
unsigned char subbuffer[SUBBUFSIZE];
|
|
|
|
unsigned char *subpointer, *subend; /* buffer for sub-options */
|
2001-03-05 21:59:43 +08:00
|
|
|
};
|
1999-12-29 22:20:26 +08:00
|
|
|
|
2007-10-12 21:36:37 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* TELNET protocol handler.
|
|
|
|
*/
|
|
|
|
|
|
|
|
const struct Curl_handler Curl_handler_telnet = {
|
2024-05-07 22:55:23 +08:00
|
|
|
"telnet", /* scheme */
|
2007-10-18 00:58:32 +08:00
|
|
|
ZERO_NULL, /* setup_connection */
|
2007-12-09 06:50:55 +08:00
|
|
|
telnet_do, /* do_it */
|
|
|
|
telnet_done, /* done */
|
2007-10-18 00:58:32 +08:00
|
|
|
ZERO_NULL, /* do_more */
|
|
|
|
ZERO_NULL, /* connect_it */
|
|
|
|
ZERO_NULL, /* connecting */
|
|
|
|
ZERO_NULL, /* doing */
|
|
|
|
ZERO_NULL, /* proto_getsock */
|
|
|
|
ZERO_NULL, /* doing_getsock */
|
2011-10-22 05:36:54 +08:00
|
|
|
ZERO_NULL, /* domore_getsock */
|
2008-12-20 05:14:52 +08:00
|
|
|
ZERO_NULL, /* perform_getsock */
|
2007-10-18 00:58:32 +08:00
|
|
|
ZERO_NULL, /* disconnect */
|
lib: replace readwrite with write_resp
This clarifies the handling of server responses by folding the code for
the complicated protocols into their protocol handlers. This concerns
mainly HTTP and its bastard sibling RTSP.
The terms "read" and "write" are often used without clear context if
they refer to the connect or the client/application side of a
transfer. This PR uses "read/write" for operations on the client side
and "send/receive" for the connection, e.g. server side. If this is
considered useful, we can revisit renaming of further methods in another
PR.
Curl's protocol handler `readwrite()` method been changed:
```diff
- CURLcode (*readwrite)(struct Curl_easy *data, struct connectdata *conn,
- const char *buf, size_t blen,
- size_t *pconsumed, bool *readmore);
+ CURLcode (*write_resp)(struct Curl_easy *data, const char *buf, size_t blen,
+ bool is_eos, bool *done);
```
The name was changed to clarify that this writes reponse data to the
client side. The parameter changes are:
* `conn` removed as it always operates on `data->conn`
* `pconsumed` removed as the method needs to handle all data on success
* `readmore` removed as no longer necessary
* `is_eos` as indicator that this is the last call for the transfer
response (end-of-stream).
* `done` TRUE on return iff the transfer response is to be treated as
finished
This change affects many files only because of updated comments in
handlers that provide no implementation. The real change is that the
HTTP protocol handlers now provide an implementation.
The HTTP protocol handlers `write_resp()` implementation will get passed
**all** raw data of a server response for the transfer. The HTTP/1.x
formatted status and headers, as well as the undecoded response
body. `Curl_http_write_resp_hds()` is used internally to parse the
response headers and pass them on. This method is public as the RTSP
protocol handler also uses it.
HTTP/1.1 "chunked" transport encoding is now part of the general
*content encoding* writer stack, just like other encodings. A new flag
`CLIENTWRITE_EOS` was added for the last client write. This allows
writers to verify that they are in a valid end state. The chunked
decoder will check if it indeed has seen the last chunk.
The general response handling in `transfer.c:466` happens in function
`readwrite_data()`. This mainly operates now like:
```
static CURLcode readwrite_data(data, ...)
{
do {
Curl_xfer_recv_resp(data, buf)
...
Curl_xfer_write_resp(data, buf)
...
} while(interested);
...
}
```
All the response data handling is implemented in
`Curl_xfer_write_resp()`. It calls the protocol handler's `write_resp()`
implementation if available, or does the default behaviour.
All raw response data needs to pass through this function. Which also
means that anyone in possession of such data may call
`Curl_xfer_write_resp()`.
Closes #12480
2023-12-01 20:50:32 +08:00
|
|
|
ZERO_NULL, /* write_resp */
|
2024-03-21 19:15:59 +08:00
|
|
|
ZERO_NULL, /* write_resp_hd */
|
2017-05-31 19:09:56 +08:00
|
|
|
ZERO_NULL, /* connection_check */
|
2021-05-17 14:54:00 +08:00
|
|
|
ZERO_NULL, /* attach connection */
|
2007-10-12 21:36:37 +08:00
|
|
|
PORT_TELNET, /* defport */
|
2011-03-15 05:52:14 +08:00
|
|
|
CURLPROTO_TELNET, /* protocol */
|
2020-09-21 19:45:24 +08:00
|
|
|
CURLPROTO_TELNET, /* family */
|
2011-11-25 06:28:54 +08:00
|
|
|
PROTOPT_NONE | PROTOPT_NOURLQUERY /* flags */
|
2007-10-12 21:36:37 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
|
2001-03-05 21:59:43 +08:00
|
|
|
static
|
2021-01-18 18:56:50 +08:00
|
|
|
CURLcode init_telnet(struct Curl_easy *data)
|
2001-03-05 21:59:43 +08:00
|
|
|
{
|
|
|
|
struct TELNET *tn;
|
1999-12-29 22:20:26 +08:00
|
|
|
|
2008-09-06 12:47:14 +08:00
|
|
|
tn = calloc(1, sizeof(struct TELNET));
|
2001-03-05 21:59:43 +08:00
|
|
|
if(!tn)
|
|
|
|
return CURLE_OUT_OF_MEMORY;
|
1999-12-29 22:20:26 +08:00
|
|
|
|
2024-01-07 23:28:15 +08:00
|
|
|
Curl_dyn_init(&tn->out, 0xffff);
|
2021-01-18 18:56:50 +08:00
|
|
|
data->req.p.telnet = tn; /* make us known */
|
2001-02-21 01:35:51 +08:00
|
|
|
|
2003-03-12 16:40:45 +08:00
|
|
|
tn->telrcv_state = CURL_TS_DATA;
|
2001-02-21 01:35:51 +08:00
|
|
|
|
|
|
|
/* Init suboptions */
|
2003-03-12 16:40:45 +08:00
|
|
|
CURL_SB_CLEAR(tn);
|
2001-02-21 01:35:51 +08:00
|
|
|
|
|
|
|
/* Set the options we want by default */
|
2003-03-12 16:40:45 +08:00
|
|
|
tn->us_preferred[CURL_TELOPT_SGA] = CURL_YES;
|
|
|
|
tn->him_preferred[CURL_TELOPT_SGA] = CURL_YES;
|
2001-03-05 21:59:43 +08:00
|
|
|
|
2011-11-25 17:35:34 +08:00
|
|
|
/* To be compliant with previous releases of libcurl
|
2020-12-31 17:11:49 +08:00
|
|
|
we enable this option by default. This behavior
|
2011-11-25 17:35:34 +08:00
|
|
|
can be changed thanks to the "BINARY" option in
|
|
|
|
CURLOPT_TELNETOPTIONS
|
|
|
|
*/
|
|
|
|
tn->us_preferred[CURL_TELOPT_BINARY] = CURL_YES;
|
|
|
|
tn->him_preferred[CURL_TELOPT_BINARY] = CURL_YES;
|
|
|
|
|
|
|
|
/* We must allow the server to echo what we sent
|
|
|
|
but it is not necessary to request the server
|
|
|
|
to do so (it might forces the server to close
|
|
|
|
the connection). Hence, we ignore ECHO in the
|
|
|
|
negotiate function
|
|
|
|
*/
|
|
|
|
tn->him_preferred[CURL_TELOPT_ECHO] = CURL_YES;
|
|
|
|
|
|
|
|
/* Set the subnegotiation fields to send information
|
|
|
|
just after negotiation passed (do/will)
|
|
|
|
|
|
|
|
Default values are (0,0) initialized by calloc.
|
|
|
|
According to the RFC1013 it is valid:
|
|
|
|
A value equal to zero is acceptable for the width (or height),
|
|
|
|
and means that no character width (or height) is being sent.
|
|
|
|
In this case, the width (or height) that will be assumed by the
|
|
|
|
Telnet server is operating system specific (it will probably be
|
|
|
|
based upon the terminal type information that may have been sent
|
|
|
|
using the TERMINAL TYPE Telnet option). */
|
|
|
|
tn->subnegotiation[CURL_TELOPT_NAWS] = CURL_YES;
|
2001-03-05 21:59:43 +08:00
|
|
|
return CURLE_OK;
|
1999-12-29 22:20:26 +08:00
|
|
|
}
|
|
|
|
|
2021-01-18 18:56:50 +08:00
|
|
|
static void negotiate(struct Curl_easy *data)
|
1999-12-29 22:20:26 +08:00
|
|
|
{
|
2001-02-21 01:35:51 +08:00
|
|
|
int i;
|
2021-01-18 18:56:50 +08:00
|
|
|
struct TELNET *tn = data->req.p.telnet;
|
2004-06-24 15:43:48 +08:00
|
|
|
|
2017-09-11 15:27:06 +08:00
|
|
|
for(i = 0; i < CURL_NTELOPTS; i++) {
|
2017-09-10 05:09:06 +08:00
|
|
|
if(i == CURL_TELOPT_ECHO)
|
2011-11-25 17:35:34 +08:00
|
|
|
continue;
|
|
|
|
|
2003-03-12 16:40:45 +08:00
|
|
|
if(tn->us_preferred[i] == CURL_YES)
|
2021-01-18 18:56:50 +08:00
|
|
|
set_local_option(data, i, CURL_YES);
|
2004-06-24 15:43:48 +08:00
|
|
|
|
2003-03-12 16:40:45 +08:00
|
|
|
if(tn->him_preferred[i] == CURL_YES)
|
2021-01-18 18:56:50 +08:00
|
|
|
set_remote_option(data, i, CURL_YES);
|
2001-02-21 01:35:51 +08:00
|
|
|
}
|
1999-12-29 22:20:26 +08:00
|
|
|
}
|
|
|
|
|
2007-03-25 10:30:58 +08:00
|
|
|
#ifndef CURL_DISABLE_VERBOSE_STRINGS
|
2016-06-21 21:47:12 +08:00
|
|
|
static void printoption(struct Curl_easy *data,
|
2004-10-06 15:50:18 +08:00
|
|
|
const char *direction, int cmd, int option)
|
1999-12-29 22:20:26 +08:00
|
|
|
{
|
2011-04-20 21:17:42 +08:00
|
|
|
if(data->set.verbose) {
|
|
|
|
if(cmd == CURL_IAC) {
|
2007-11-05 17:45:09 +08:00
|
|
|
if(CURL_TELCMD_OK(option))
|
2021-07-06 23:05:17 +08:00
|
|
|
infof(data, "%s IAC %s", direction, CURL_TELCMD(option));
|
1999-12-29 22:20:26 +08:00
|
|
|
else
|
2021-07-06 23:05:17 +08:00
|
|
|
infof(data, "%s IAC %d", direction, option);
|
2001-02-21 01:35:51 +08:00
|
|
|
}
|
2011-04-20 21:17:42 +08:00
|
|
|
else {
|
2018-06-03 04:52:56 +08:00
|
|
|
const char *fmt = (cmd == CURL_WILL) ? "WILL" :
|
|
|
|
(cmd == CURL_WONT) ? "WONT" :
|
|
|
|
(cmd == CURL_DO) ? "DO" :
|
|
|
|
(cmd == CURL_DONT) ? "DONT" : 0;
|
2011-04-20 21:17:42 +08:00
|
|
|
if(fmt) {
|
2018-06-03 04:52:56 +08:00
|
|
|
const char *opt;
|
2007-11-05 17:45:09 +08:00
|
|
|
if(CURL_TELOPT_OK(option))
|
2003-03-12 16:40:45 +08:00
|
|
|
opt = CURL_TELOPT(option);
|
2007-11-05 17:45:09 +08:00
|
|
|
else if(option == CURL_TELOPT_EXOPL)
|
2001-02-21 01:35:51 +08:00
|
|
|
opt = "EXOPL";
|
|
|
|
else
|
|
|
|
opt = NULL;
|
|
|
|
|
|
|
|
if(opt)
|
2021-07-06 23:05:17 +08:00
|
|
|
infof(data, "%s %s %s", direction, fmt, opt);
|
2001-02-21 01:35:51 +08:00
|
|
|
else
|
2021-07-06 23:05:17 +08:00
|
|
|
infof(data, "%s %s %d", direction, fmt, option);
|
1999-12-29 22:20:26 +08:00
|
|
|
}
|
2001-02-21 01:35:51 +08:00
|
|
|
else
|
2021-07-06 23:05:17 +08:00
|
|
|
infof(data, "%s %d %d", direction, cmd, option);
|
2001-02-21 01:35:51 +08:00
|
|
|
}
|
|
|
|
}
|
1999-12-29 22:20:26 +08:00
|
|
|
}
|
2007-03-25 10:30:58 +08:00
|
|
|
#endif
|
1999-12-29 22:20:26 +08:00
|
|
|
|
2021-01-18 18:56:50 +08:00
|
|
|
static void send_negotiation(struct Curl_easy *data, int cmd, int option)
|
1999-12-29 22:20:26 +08:00
|
|
|
{
|
2021-01-18 18:56:50 +08:00
|
|
|
unsigned char buf[3];
|
|
|
|
ssize_t bytes_written;
|
|
|
|
struct connectdata *conn = data->conn;
|
1999-12-29 22:20:26 +08:00
|
|
|
|
2021-01-18 18:56:50 +08:00
|
|
|
buf[0] = CURL_IAC;
|
|
|
|
buf[1] = (unsigned char)cmd;
|
|
|
|
buf[2] = (unsigned char)option;
|
2004-06-24 15:43:48 +08:00
|
|
|
|
2021-01-18 18:56:50 +08:00
|
|
|
bytes_written = swrite(conn->sock[FIRSTSOCKET], buf, 3);
|
|
|
|
if(bytes_written < 0) {
|
|
|
|
int err = SOCKERRNO;
|
|
|
|
failf(data,"Sending data failed (%d)",err);
|
|
|
|
}
|
2004-06-24 15:43:48 +08:00
|
|
|
|
2021-01-18 18:56:50 +08:00
|
|
|
printoption(data, "SENT", cmd, option);
|
1999-12-29 22:20:26 +08:00
|
|
|
}
|
|
|
|
|
2001-01-05 18:11:41 +08:00
|
|
|
static
|
2021-01-18 18:56:50 +08:00
|
|
|
void set_remote_option(struct Curl_easy *data, int option, int newstate)
|
1999-12-29 22:20:26 +08:00
|
|
|
{
|
2021-01-18 18:56:50 +08:00
|
|
|
struct TELNET *tn = data->req.p.telnet;
|
2011-04-20 21:17:42 +08:00
|
|
|
if(newstate == CURL_YES) {
|
|
|
|
switch(tn->him[option]) {
|
|
|
|
case CURL_NO:
|
|
|
|
tn->him[option] = CURL_WANTYES;
|
2021-01-18 18:56:50 +08:00
|
|
|
send_negotiation(data, CURL_DO, option);
|
2011-04-20 21:17:42 +08:00
|
|
|
break;
|
2004-06-24 15:43:48 +08:00
|
|
|
|
2011-04-20 21:17:42 +08:00
|
|
|
case CURL_YES:
|
|
|
|
/* Already enabled */
|
|
|
|
break;
|
2004-06-24 15:43:48 +08:00
|
|
|
|
2011-04-20 21:17:42 +08:00
|
|
|
case CURL_WANTNO:
|
|
|
|
switch(tn->himq[option]) {
|
|
|
|
case CURL_EMPTY:
|
|
|
|
/* Already negotiating for CURL_YES, queue the request */
|
|
|
|
tn->himq[option] = CURL_OPPOSITE;
|
2001-02-21 01:35:51 +08:00
|
|
|
break;
|
2011-04-20 21:17:42 +08:00
|
|
|
case CURL_OPPOSITE:
|
|
|
|
/* Error: already queued an enable request */
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
break;
|
2004-06-24 15:43:48 +08:00
|
|
|
|
2011-04-20 21:17:42 +08:00
|
|
|
case CURL_WANTYES:
|
|
|
|
switch(tn->himq[option]) {
|
|
|
|
case CURL_EMPTY:
|
|
|
|
/* Error: already negotiating for enable */
|
2001-02-21 01:35:51 +08:00
|
|
|
break;
|
2011-04-20 21:17:42 +08:00
|
|
|
case CURL_OPPOSITE:
|
|
|
|
tn->himq[option] = CURL_EMPTY;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
break;
|
2001-02-21 01:35:51 +08:00
|
|
|
}
|
|
|
|
}
|
2011-04-20 21:17:42 +08:00
|
|
|
else { /* NO */
|
|
|
|
switch(tn->him[option]) {
|
|
|
|
case CURL_NO:
|
|
|
|
/* Already disabled */
|
|
|
|
break;
|
2004-06-24 15:43:48 +08:00
|
|
|
|
2011-04-20 21:17:42 +08:00
|
|
|
case CURL_YES:
|
|
|
|
tn->him[option] = CURL_WANTNO;
|
2021-01-18 18:56:50 +08:00
|
|
|
send_negotiation(data, CURL_DONT, option);
|
2011-04-20 21:17:42 +08:00
|
|
|
break;
|
2004-06-24 15:43:48 +08:00
|
|
|
|
2011-04-20 21:17:42 +08:00
|
|
|
case CURL_WANTNO:
|
|
|
|
switch(tn->himq[option]) {
|
|
|
|
case CURL_EMPTY:
|
|
|
|
/* Already negotiating for NO */
|
2001-02-21 01:35:51 +08:00
|
|
|
break;
|
2011-04-20 21:17:42 +08:00
|
|
|
case CURL_OPPOSITE:
|
|
|
|
tn->himq[option] = CURL_EMPTY;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
break;
|
2004-06-24 15:43:48 +08:00
|
|
|
|
2011-04-20 21:17:42 +08:00
|
|
|
case CURL_WANTYES:
|
|
|
|
switch(tn->himq[option]) {
|
|
|
|
case CURL_EMPTY:
|
|
|
|
tn->himq[option] = CURL_OPPOSITE;
|
2001-02-21 01:35:51 +08:00
|
|
|
break;
|
2011-04-20 21:17:42 +08:00
|
|
|
case CURL_OPPOSITE:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
break;
|
2001-02-21 01:35:51 +08:00
|
|
|
}
|
|
|
|
}
|
1999-12-29 22:20:26 +08:00
|
|
|
}
|
|
|
|
|
2001-01-05 18:11:41 +08:00
|
|
|
static
|
2021-01-18 18:56:50 +08:00
|
|
|
void rec_will(struct Curl_easy *data, int option)
|
1999-12-29 22:20:26 +08:00
|
|
|
{
|
2021-01-18 18:56:50 +08:00
|
|
|
struct TELNET *tn = data->req.p.telnet;
|
2011-04-20 21:17:42 +08:00
|
|
|
switch(tn->him[option]) {
|
|
|
|
case CURL_NO:
|
|
|
|
if(tn->him_preferred[option] == CURL_YES) {
|
|
|
|
tn->him[option] = CURL_YES;
|
2021-01-18 18:56:50 +08:00
|
|
|
send_negotiation(data, CURL_DO, option);
|
2011-04-20 21:17:42 +08:00
|
|
|
}
|
|
|
|
else
|
2021-01-18 18:56:50 +08:00
|
|
|
send_negotiation(data, CURL_DONT, option);
|
2004-06-24 15:43:48 +08:00
|
|
|
|
2011-04-20 21:17:42 +08:00
|
|
|
break;
|
2004-06-24 15:43:48 +08:00
|
|
|
|
2011-04-20 21:17:42 +08:00
|
|
|
case CURL_YES:
|
|
|
|
/* Already enabled */
|
|
|
|
break;
|
|
|
|
|
|
|
|
case CURL_WANTNO:
|
|
|
|
switch(tn->himq[option]) {
|
|
|
|
case CURL_EMPTY:
|
|
|
|
/* Error: DONT answered by WILL */
|
|
|
|
tn->him[option] = CURL_NO;
|
|
|
|
break;
|
|
|
|
case CURL_OPPOSITE:
|
|
|
|
/* Error: DONT answered by WILL */
|
|
|
|
tn->him[option] = CURL_YES;
|
|
|
|
tn->himq[option] = CURL_EMPTY;
|
1999-12-29 22:20:26 +08:00
|
|
|
break;
|
2011-04-20 21:17:42 +08:00
|
|
|
}
|
|
|
|
break;
|
2004-06-24 15:43:48 +08:00
|
|
|
|
2011-04-20 21:17:42 +08:00
|
|
|
case CURL_WANTYES:
|
|
|
|
switch(tn->himq[option]) {
|
|
|
|
case CURL_EMPTY:
|
|
|
|
tn->him[option] = CURL_YES;
|
1999-12-29 22:20:26 +08:00
|
|
|
break;
|
2011-04-20 21:17:42 +08:00
|
|
|
case CURL_OPPOSITE:
|
|
|
|
tn->him[option] = CURL_WANTNO;
|
|
|
|
tn->himq[option] = CURL_EMPTY;
|
2021-01-18 18:56:50 +08:00
|
|
|
send_negotiation(data, CURL_DONT, option);
|
2011-04-20 21:17:42 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
break;
|
2001-02-21 01:35:51 +08:00
|
|
|
}
|
1999-12-29 22:20:26 +08:00
|
|
|
}
|
2004-06-24 15:43:48 +08:00
|
|
|
|
2001-01-05 18:11:41 +08:00
|
|
|
static
|
2021-01-18 18:56:50 +08:00
|
|
|
void rec_wont(struct Curl_easy *data, int option)
|
1999-12-29 22:20:26 +08:00
|
|
|
{
|
2021-01-18 18:56:50 +08:00
|
|
|
struct TELNET *tn = data->req.p.telnet;
|
2011-04-20 21:17:42 +08:00
|
|
|
switch(tn->him[option]) {
|
|
|
|
case CURL_NO:
|
|
|
|
/* Already disabled */
|
|
|
|
break;
|
2004-06-24 15:43:48 +08:00
|
|
|
|
2011-04-20 21:17:42 +08:00
|
|
|
case CURL_YES:
|
|
|
|
tn->him[option] = CURL_NO;
|
2021-01-18 18:56:50 +08:00
|
|
|
send_negotiation(data, CURL_DONT, option);
|
2011-04-20 21:17:42 +08:00
|
|
|
break;
|
|
|
|
|
|
|
|
case CURL_WANTNO:
|
|
|
|
switch(tn->himq[option]) {
|
|
|
|
case CURL_EMPTY:
|
2003-03-12 16:40:45 +08:00
|
|
|
tn->him[option] = CURL_NO;
|
1999-12-29 22:20:26 +08:00
|
|
|
break;
|
2004-06-24 15:43:48 +08:00
|
|
|
|
2011-04-20 21:17:42 +08:00
|
|
|
case CURL_OPPOSITE:
|
|
|
|
tn->him[option] = CURL_WANTYES;
|
|
|
|
tn->himq[option] = CURL_EMPTY;
|
2021-01-18 18:56:50 +08:00
|
|
|
send_negotiation(data, CURL_DO, option);
|
1999-12-29 22:20:26 +08:00
|
|
|
break;
|
2011-04-20 21:17:42 +08:00
|
|
|
}
|
|
|
|
break;
|
2004-06-24 15:43:48 +08:00
|
|
|
|
2011-04-20 21:17:42 +08:00
|
|
|
case CURL_WANTYES:
|
|
|
|
switch(tn->himq[option]) {
|
|
|
|
case CURL_EMPTY:
|
|
|
|
tn->him[option] = CURL_NO;
|
|
|
|
break;
|
|
|
|
case CURL_OPPOSITE:
|
|
|
|
tn->him[option] = CURL_NO;
|
|
|
|
tn->himq[option] = CURL_EMPTY;
|
1999-12-29 22:20:26 +08:00
|
|
|
break;
|
2011-04-20 21:17:42 +08:00
|
|
|
}
|
|
|
|
break;
|
2001-02-21 01:35:51 +08:00
|
|
|
}
|
1999-12-29 22:20:26 +08:00
|
|
|
}
|
2004-06-24 15:43:48 +08:00
|
|
|
|
2003-03-12 16:44:00 +08:00
|
|
|
static void
|
2021-01-18 18:56:50 +08:00
|
|
|
set_local_option(struct Curl_easy *data, int option, int newstate)
|
1999-12-29 22:20:26 +08:00
|
|
|
{
|
2021-01-18 18:56:50 +08:00
|
|
|
struct TELNET *tn = data->req.p.telnet;
|
2011-04-20 21:17:42 +08:00
|
|
|
if(newstate == CURL_YES) {
|
|
|
|
switch(tn->us[option]) {
|
|
|
|
case CURL_NO:
|
|
|
|
tn->us[option] = CURL_WANTYES;
|
2021-01-18 18:56:50 +08:00
|
|
|
send_negotiation(data, CURL_WILL, option);
|
2011-04-20 21:17:42 +08:00
|
|
|
break;
|
2004-06-24 15:43:48 +08:00
|
|
|
|
2011-04-20 21:17:42 +08:00
|
|
|
case CURL_YES:
|
|
|
|
/* Already enabled */
|
|
|
|
break;
|
2004-06-24 15:43:48 +08:00
|
|
|
|
2011-04-20 21:17:42 +08:00
|
|
|
case CURL_WANTNO:
|
|
|
|
switch(tn->usq[option]) {
|
|
|
|
case CURL_EMPTY:
|
|
|
|
/* Already negotiating for CURL_YES, queue the request */
|
|
|
|
tn->usq[option] = CURL_OPPOSITE;
|
|
|
|
break;
|
|
|
|
case CURL_OPPOSITE:
|
|
|
|
/* Error: already queued an enable request */
|
2001-02-21 01:35:51 +08:00
|
|
|
break;
|
2011-04-20 21:17:42 +08:00
|
|
|
}
|
|
|
|
break;
|
2004-06-24 15:43:48 +08:00
|
|
|
|
2011-04-20 21:17:42 +08:00
|
|
|
case CURL_WANTYES:
|
|
|
|
switch(tn->usq[option]) {
|
|
|
|
case CURL_EMPTY:
|
|
|
|
/* Error: already negotiating for enable */
|
|
|
|
break;
|
|
|
|
case CURL_OPPOSITE:
|
|
|
|
tn->usq[option] = CURL_EMPTY;
|
2001-02-21 01:35:51 +08:00
|
|
|
break;
|
2011-04-20 21:17:42 +08:00
|
|
|
}
|
|
|
|
break;
|
2001-02-21 01:35:51 +08:00
|
|
|
}
|
|
|
|
}
|
2011-04-20 21:17:42 +08:00
|
|
|
else { /* NO */
|
|
|
|
switch(tn->us[option]) {
|
|
|
|
case CURL_NO:
|
|
|
|
/* Already disabled */
|
|
|
|
break;
|
2004-06-24 15:43:48 +08:00
|
|
|
|
2011-04-20 21:17:42 +08:00
|
|
|
case CURL_YES:
|
|
|
|
tn->us[option] = CURL_WANTNO;
|
2021-01-18 18:56:50 +08:00
|
|
|
send_negotiation(data, CURL_WONT, option);
|
2011-04-20 21:17:42 +08:00
|
|
|
break;
|
2004-06-24 15:43:48 +08:00
|
|
|
|
2011-04-20 21:17:42 +08:00
|
|
|
case CURL_WANTNO:
|
|
|
|
switch(tn->usq[option]) {
|
|
|
|
case CURL_EMPTY:
|
|
|
|
/* Already negotiating for NO */
|
|
|
|
break;
|
|
|
|
case CURL_OPPOSITE:
|
|
|
|
tn->usq[option] = CURL_EMPTY;
|
2001-02-21 01:35:51 +08:00
|
|
|
break;
|
2011-04-20 21:17:42 +08:00
|
|
|
}
|
|
|
|
break;
|
2004-06-24 15:43:48 +08:00
|
|
|
|
2011-04-20 21:17:42 +08:00
|
|
|
case CURL_WANTYES:
|
|
|
|
switch(tn->usq[option]) {
|
|
|
|
case CURL_EMPTY:
|
|
|
|
tn->usq[option] = CURL_OPPOSITE;
|
|
|
|
break;
|
|
|
|
case CURL_OPPOSITE:
|
2001-02-21 01:35:51 +08:00
|
|
|
break;
|
2011-04-20 21:17:42 +08:00
|
|
|
}
|
|
|
|
break;
|
2001-02-21 01:35:51 +08:00
|
|
|
}
|
|
|
|
}
|
1999-12-29 22:20:26 +08:00
|
|
|
}
|
|
|
|
|
2001-01-05 18:11:41 +08:00
|
|
|
static
|
2021-01-18 18:56:50 +08:00
|
|
|
void rec_do(struct Curl_easy *data, int option)
|
1999-12-29 22:20:26 +08:00
|
|
|
{
|
2021-01-18 18:56:50 +08:00
|
|
|
struct TELNET *tn = data->req.p.telnet;
|
2011-04-20 21:17:42 +08:00
|
|
|
switch(tn->us[option]) {
|
|
|
|
case CURL_NO:
|
|
|
|
if(tn->us_preferred[option] == CURL_YES) {
|
|
|
|
tn->us[option] = CURL_YES;
|
2021-01-18 18:56:50 +08:00
|
|
|
send_negotiation(data, CURL_WILL, option);
|
2011-11-25 17:35:34 +08:00
|
|
|
if(tn->subnegotiation[option] == CURL_YES)
|
|
|
|
/* transmission of data option */
|
2021-01-18 18:56:50 +08:00
|
|
|
sendsuboption(data, option);
|
2011-11-25 17:35:34 +08:00
|
|
|
}
|
|
|
|
else if(tn->subnegotiation[option] == CURL_YES) {
|
2022-10-31 00:38:16 +08:00
|
|
|
/* send information to achieve this option */
|
2011-11-25 17:35:34 +08:00
|
|
|
tn->us[option] = CURL_YES;
|
2021-01-18 18:56:50 +08:00
|
|
|
send_negotiation(data, CURL_WILL, option);
|
|
|
|
sendsuboption(data, option);
|
2011-04-20 21:17:42 +08:00
|
|
|
}
|
|
|
|
else
|
2021-01-18 18:56:50 +08:00
|
|
|
send_negotiation(data, CURL_WONT, option);
|
2011-04-20 21:17:42 +08:00
|
|
|
break;
|
2004-06-24 15:43:48 +08:00
|
|
|
|
2011-04-20 21:17:42 +08:00
|
|
|
case CURL_YES:
|
|
|
|
/* Already enabled */
|
|
|
|
break;
|
2004-06-24 15:43:48 +08:00
|
|
|
|
2011-04-20 21:17:42 +08:00
|
|
|
case CURL_WANTNO:
|
|
|
|
switch(tn->usq[option]) {
|
|
|
|
case CURL_EMPTY:
|
|
|
|
/* Error: DONT answered by WILL */
|
|
|
|
tn->us[option] = CURL_NO;
|
|
|
|
break;
|
|
|
|
case CURL_OPPOSITE:
|
|
|
|
/* Error: DONT answered by WILL */
|
|
|
|
tn->us[option] = CURL_YES;
|
|
|
|
tn->usq[option] = CURL_EMPTY;
|
1999-12-29 22:20:26 +08:00
|
|
|
break;
|
2011-04-20 21:17:42 +08:00
|
|
|
}
|
|
|
|
break;
|
2004-06-24 15:43:48 +08:00
|
|
|
|
2011-04-20 21:17:42 +08:00
|
|
|
case CURL_WANTYES:
|
|
|
|
switch(tn->usq[option]) {
|
|
|
|
case CURL_EMPTY:
|
|
|
|
tn->us[option] = CURL_YES;
|
2011-11-25 17:35:34 +08:00
|
|
|
if(tn->subnegotiation[option] == CURL_YES) {
|
|
|
|
/* transmission of data option */
|
2021-01-18 18:56:50 +08:00
|
|
|
sendsuboption(data, option);
|
2011-11-25 17:35:34 +08:00
|
|
|
}
|
2011-04-20 21:17:42 +08:00
|
|
|
break;
|
|
|
|
case CURL_OPPOSITE:
|
|
|
|
tn->us[option] = CURL_WANTNO;
|
|
|
|
tn->himq[option] = CURL_EMPTY;
|
2021-01-18 18:56:50 +08:00
|
|
|
send_negotiation(data, CURL_WONT, option);
|
1999-12-29 22:20:26 +08:00
|
|
|
break;
|
2011-04-20 21:17:42 +08:00
|
|
|
}
|
|
|
|
break;
|
2001-02-21 01:35:51 +08:00
|
|
|
}
|
1999-12-29 22:20:26 +08:00
|
|
|
}
|
2001-01-05 18:11:41 +08:00
|
|
|
|
2004-06-24 15:43:48 +08:00
|
|
|
static
|
2021-01-18 18:56:50 +08:00
|
|
|
void rec_dont(struct Curl_easy *data, int option)
|
1999-12-29 22:20:26 +08:00
|
|
|
{
|
2021-01-18 18:56:50 +08:00
|
|
|
struct TELNET *tn = data->req.p.telnet;
|
2011-04-20 21:17:42 +08:00
|
|
|
switch(tn->us[option]) {
|
|
|
|
case CURL_NO:
|
|
|
|
/* Already disabled */
|
|
|
|
break;
|
2004-06-24 15:43:48 +08:00
|
|
|
|
2011-04-20 21:17:42 +08:00
|
|
|
case CURL_YES:
|
|
|
|
tn->us[option] = CURL_NO;
|
2021-01-18 18:56:50 +08:00
|
|
|
send_negotiation(data, CURL_WONT, option);
|
2011-04-20 21:17:42 +08:00
|
|
|
break;
|
|
|
|
|
|
|
|
case CURL_WANTNO:
|
|
|
|
switch(tn->usq[option]) {
|
|
|
|
case CURL_EMPTY:
|
2003-03-12 16:40:45 +08:00
|
|
|
tn->us[option] = CURL_NO;
|
1999-12-29 22:20:26 +08:00
|
|
|
break;
|
2004-06-24 15:43:48 +08:00
|
|
|
|
2011-04-20 21:17:42 +08:00
|
|
|
case CURL_OPPOSITE:
|
|
|
|
tn->us[option] = CURL_WANTYES;
|
|
|
|
tn->usq[option] = CURL_EMPTY;
|
2021-01-18 18:56:50 +08:00
|
|
|
send_negotiation(data, CURL_WILL, option);
|
1999-12-29 22:20:26 +08:00
|
|
|
break;
|
2011-04-20 21:17:42 +08:00
|
|
|
}
|
|
|
|
break;
|
2004-06-24 15:43:48 +08:00
|
|
|
|
2011-04-20 21:17:42 +08:00
|
|
|
case CURL_WANTYES:
|
|
|
|
switch(tn->usq[option]) {
|
|
|
|
case CURL_EMPTY:
|
|
|
|
tn->us[option] = CURL_NO;
|
|
|
|
break;
|
|
|
|
case CURL_OPPOSITE:
|
|
|
|
tn->us[option] = CURL_NO;
|
|
|
|
tn->usq[option] = CURL_EMPTY;
|
1999-12-29 22:20:26 +08:00
|
|
|
break;
|
2011-04-20 21:17:42 +08:00
|
|
|
}
|
|
|
|
break;
|
2001-02-21 01:35:51 +08:00
|
|
|
}
|
1999-12-29 22:20:26 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-06-21 21:47:12 +08:00
|
|
|
static void printsub(struct Curl_easy *data,
|
2004-10-06 15:50:18 +08:00
|
|
|
int direction, /* '<' or '>' */
|
|
|
|
unsigned char *pointer, /* where suboption data is */
|
|
|
|
size_t length) /* length of suboption data */
|
1999-12-29 22:20:26 +08:00
|
|
|
{
|
2011-04-20 21:17:42 +08:00
|
|
|
if(data->set.verbose) {
|
2018-06-03 04:52:56 +08:00
|
|
|
unsigned int i = 0;
|
2011-04-20 21:17:42 +08:00
|
|
|
if(direction) {
|
2004-11-12 00:34:24 +08:00
|
|
|
infof(data, "%s IAC SB ", (direction == '<')? "RCVD":"SENT");
|
2011-04-20 21:17:42 +08:00
|
|
|
if(length >= 3) {
|
2001-02-21 01:35:51 +08:00
|
|
|
int j;
|
|
|
|
|
|
|
|
i = pointer[length-2];
|
|
|
|
j = pointer[length-1];
|
|
|
|
|
2011-04-20 21:17:42 +08:00
|
|
|
if(i != CURL_IAC || j != CURL_SE) {
|
2004-11-12 00:34:24 +08:00
|
|
|
infof(data, "(terminated by ");
|
2007-11-05 17:45:09 +08:00
|
|
|
if(CURL_TELOPT_OK(i))
|
2004-11-12 00:34:24 +08:00
|
|
|
infof(data, "%s ", CURL_TELOPT(i));
|
2007-11-05 17:45:09 +08:00
|
|
|
else if(CURL_TELCMD_OK(i))
|
2004-11-12 00:34:24 +08:00
|
|
|
infof(data, "%s ", CURL_TELCMD(i));
|
2001-02-21 01:35:51 +08:00
|
|
|
else
|
2010-02-05 03:44:31 +08:00
|
|
|
infof(data, "%u ", i);
|
2007-11-05 17:45:09 +08:00
|
|
|
if(CURL_TELOPT_OK(j))
|
2004-11-12 00:34:24 +08:00
|
|
|
infof(data, "%s", CURL_TELOPT(j));
|
2007-11-05 17:45:09 +08:00
|
|
|
else if(CURL_TELCMD_OK(j))
|
2004-11-12 00:34:24 +08:00
|
|
|
infof(data, "%s", CURL_TELCMD(j));
|
2001-02-21 01:35:51 +08:00
|
|
|
else
|
2004-11-12 00:34:24 +08:00
|
|
|
infof(data, "%d", j);
|
2022-04-16 17:55:05 +08:00
|
|
|
infof(data, ", not IAC SE) ");
|
2001-02-21 01:35:51 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
length -= 2;
|
|
|
|
}
|
2011-04-20 21:17:42 +08:00
|
|
|
if(length < 1) {
|
2004-11-12 00:34:24 +08:00
|
|
|
infof(data, "(Empty suboption?)");
|
2001-02-21 01:35:51 +08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2007-11-05 17:45:09 +08:00
|
|
|
if(CURL_TELOPT_OK(pointer[0])) {
|
2001-02-21 01:35:51 +08:00
|
|
|
switch(pointer[0]) {
|
2011-11-25 17:35:34 +08:00
|
|
|
case CURL_TELOPT_TTYPE:
|
|
|
|
case CURL_TELOPT_XDISPLOC:
|
|
|
|
case CURL_TELOPT_NEW_ENVIRON:
|
|
|
|
case CURL_TELOPT_NAWS:
|
|
|
|
infof(data, "%s", CURL_TELOPT(pointer[0]));
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
infof(data, "%s (unsupported)", CURL_TELOPT(pointer[0]));
|
|
|
|
break;
|
2001-02-21 01:35:51 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
2004-11-12 00:34:24 +08:00
|
|
|
infof(data, "%d (unknown)", pointer[i]);
|
2001-02-21 01:35:51 +08:00
|
|
|
|
2011-11-25 17:35:34 +08:00
|
|
|
switch(pointer[0]) {
|
|
|
|
case CURL_TELOPT_NAWS:
|
2014-12-11 16:15:04 +08:00
|
|
|
if(length > 4)
|
2018-05-29 03:46:22 +08:00
|
|
|
infof(data, "Width: %d ; Height: %d", (pointer[1]<<8) | pointer[2],
|
2014-12-11 16:15:04 +08:00
|
|
|
(pointer[3]<<8) | pointer[4]);
|
2011-11-25 17:35:34 +08:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
switch(pointer[1]) {
|
2003-03-12 16:40:45 +08:00
|
|
|
case CURL_TELQUAL_IS:
|
2004-11-12 00:34:24 +08:00
|
|
|
infof(data, " IS");
|
2001-02-21 01:35:51 +08:00
|
|
|
break;
|
2003-03-12 16:40:45 +08:00
|
|
|
case CURL_TELQUAL_SEND:
|
2004-11-12 00:34:24 +08:00
|
|
|
infof(data, " SEND");
|
2001-02-21 01:35:51 +08:00
|
|
|
break;
|
2003-03-12 16:40:45 +08:00
|
|
|
case CURL_TELQUAL_INFO:
|
2004-11-12 00:34:24 +08:00
|
|
|
infof(data, " INFO/REPLY");
|
2001-02-21 01:35:51 +08:00
|
|
|
break;
|
2003-03-12 16:40:45 +08:00
|
|
|
case CURL_TELQUAL_NAME:
|
2004-11-12 00:34:24 +08:00
|
|
|
infof(data, " NAME");
|
2001-02-21 01:35:51 +08:00
|
|
|
break;
|
2011-11-25 17:35:34 +08:00
|
|
|
}
|
2004-06-24 15:43:48 +08:00
|
|
|
|
2011-11-25 17:35:34 +08:00
|
|
|
switch(pointer[0]) {
|
2003-03-12 16:40:45 +08:00
|
|
|
case CURL_TELOPT_TTYPE:
|
|
|
|
case CURL_TELOPT_XDISPLOC:
|
2001-02-21 01:35:51 +08:00
|
|
|
pointer[length] = 0;
|
2004-11-12 00:34:24 +08:00
|
|
|
infof(data, " \"%s\"", &pointer[2]);
|
2001-02-21 01:35:51 +08:00
|
|
|
break;
|
2003-03-12 16:40:45 +08:00
|
|
|
case CURL_TELOPT_NEW_ENVIRON:
|
|
|
|
if(pointer[1] == CURL_TELQUAL_IS) {
|
2004-11-12 00:34:24 +08:00
|
|
|
infof(data, " ");
|
2017-09-11 15:27:06 +08:00
|
|
|
for(i = 3; i < length; i++) {
|
2001-02-21 01:35:51 +08:00
|
|
|
switch(pointer[i]) {
|
2011-11-25 17:35:34 +08:00
|
|
|
case CURL_NEW_ENV_VAR:
|
|
|
|
infof(data, ", ");
|
|
|
|
break;
|
|
|
|
case CURL_NEW_ENV_VALUE:
|
|
|
|
infof(data, " = ");
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
infof(data, "%c", pointer[i]);
|
|
|
|
break;
|
1999-12-29 22:20:26 +08:00
|
|
|
}
|
2001-02-21 01:35:51 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
default:
|
2011-04-20 21:17:42 +08:00
|
|
|
for(i = 2; i < length; i++)
|
2004-11-12 00:34:24 +08:00
|
|
|
infof(data, " %.2x", pointer[i]);
|
2001-02-21 01:35:51 +08:00
|
|
|
break;
|
2011-11-25 17:35:34 +08:00
|
|
|
}
|
2001-02-21 01:35:51 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-03-29 05:37:25 +08:00
|
|
|
#ifdef _MSC_VER
|
|
|
|
#pragma warning(push)
|
|
|
|
/* warning C4706: assignment within conditional expression */
|
|
|
|
#pragma warning(disable:4706)
|
|
|
|
#endif
|
2023-03-06 19:07:33 +08:00
|
|
|
static bool str_is_nonascii(const char *str)
|
|
|
|
{
|
2023-03-28 19:41:57 +08:00
|
|
|
char c;
|
|
|
|
while((c = *str++))
|
|
|
|
if(c & 0x80)
|
2023-03-06 19:07:33 +08:00
|
|
|
return TRUE;
|
2023-03-28 19:41:57 +08:00
|
|
|
|
2023-03-06 19:07:33 +08:00
|
|
|
return FALSE;
|
|
|
|
}
|
2023-03-29 05:37:25 +08:00
|
|
|
#ifdef _MSC_VER
|
|
|
|
#pragma warning(pop)
|
|
|
|
#endif
|
2023-03-06 19:07:33 +08:00
|
|
|
|
2021-01-18 18:56:50 +08:00
|
|
|
static CURLcode check_telnet_options(struct Curl_easy *data)
|
2001-02-21 01:35:51 +08:00
|
|
|
{
|
|
|
|
struct curl_slist *head;
|
2011-10-08 02:50:57 +08:00
|
|
|
struct curl_slist *beg;
|
2021-01-18 18:56:50 +08:00
|
|
|
struct TELNET *tn = data->req.p.telnet;
|
2011-10-08 02:50:57 +08:00
|
|
|
CURLcode result = CURLE_OK;
|
2001-02-21 01:35:51 +08:00
|
|
|
|
2024-07-01 22:47:21 +08:00
|
|
|
/* Add the username as an environment variable if it
|
2001-02-21 01:35:51 +08:00
|
|
|
was given on the command line */
|
2022-02-15 00:33:50 +08:00
|
|
|
if(data->state.aptr.user) {
|
2023-02-24 01:14:35 +08:00
|
|
|
char buffer[256];
|
2024-01-08 17:34:06 +08:00
|
|
|
if(str_is_nonascii(data->conn->user)) {
|
2024-07-01 22:47:21 +08:00
|
|
|
DEBUGF(infof(data, "set a non ASCII username in telnet"));
|
2023-03-06 19:07:33 +08:00
|
|
|
return CURLE_BAD_FUNCTION_ARGUMENT;
|
2024-01-08 17:34:06 +08:00
|
|
|
}
|
2023-02-24 01:14:35 +08:00
|
|
|
msnprintf(buffer, sizeof(buffer), "USER,%s", data->conn->user);
|
|
|
|
beg = curl_slist_append(tn->telnet_vars, buffer);
|
2011-10-08 02:50:57 +08:00
|
|
|
if(!beg) {
|
|
|
|
curl_slist_free_all(tn->telnet_vars);
|
|
|
|
tn->telnet_vars = NULL;
|
|
|
|
return CURLE_OUT_OF_MEMORY;
|
|
|
|
}
|
|
|
|
tn->telnet_vars = beg;
|
2003-03-12 16:40:45 +08:00
|
|
|
tn->us_preferred[CURL_TELOPT_NEW_ENVIRON] = CURL_YES;
|
2001-02-21 01:35:51 +08:00
|
|
|
}
|
|
|
|
|
2023-02-24 01:14:35 +08:00
|
|
|
for(head = data->set.telnet_options; head && !result; head = head->next) {
|
|
|
|
size_t olen;
|
|
|
|
char *option = head->data;
|
|
|
|
char *arg;
|
|
|
|
char *sep = strchr(option, '=');
|
|
|
|
if(sep) {
|
|
|
|
olen = sep - option;
|
|
|
|
arg = ++sep;
|
2023-03-06 19:07:33 +08:00
|
|
|
if(str_is_nonascii(arg))
|
|
|
|
continue;
|
2023-02-24 01:14:35 +08:00
|
|
|
switch(olen) {
|
|
|
|
case 5:
|
|
|
|
/* Terminal type */
|
|
|
|
if(strncasecompare(option, "TTYPE", 5)) {
|
2023-12-11 23:15:57 +08:00
|
|
|
size_t l = strlen(arg);
|
|
|
|
if(l < sizeof(tn->subopt_ttype)) {
|
|
|
|
strcpy(tn->subopt_ttype, arg);
|
|
|
|
tn->us_preferred[CURL_TELOPT_TTYPE] = CURL_YES;
|
|
|
|
break;
|
|
|
|
}
|
2023-02-24 01:14:35 +08:00
|
|
|
}
|
2023-12-11 23:15:57 +08:00
|
|
|
result = CURLE_UNKNOWN_OPTION;
|
2023-02-24 01:14:35 +08:00
|
|
|
break;
|
2001-02-21 01:35:51 +08:00
|
|
|
|
2023-02-24 01:14:35 +08:00
|
|
|
case 8:
|
|
|
|
/* Display variable */
|
|
|
|
if(strncasecompare(option, "XDISPLOC", 8)) {
|
2023-12-11 23:15:57 +08:00
|
|
|
size_t l = strlen(arg);
|
|
|
|
if(l < sizeof(tn->subopt_xdisploc)) {
|
|
|
|
strcpy(tn->subopt_xdisploc, arg);
|
|
|
|
tn->us_preferred[CURL_TELOPT_XDISPLOC] = CURL_YES;
|
|
|
|
break;
|
|
|
|
}
|
2023-02-24 01:14:35 +08:00
|
|
|
}
|
2023-12-11 23:15:57 +08:00
|
|
|
result = CURLE_UNKNOWN_OPTION;
|
2023-02-24 01:14:35 +08:00
|
|
|
break;
|
1999-12-29 22:20:26 +08:00
|
|
|
|
2023-02-24 01:14:35 +08:00
|
|
|
case 7:
|
|
|
|
/* Environment variable */
|
|
|
|
if(strncasecompare(option, "NEW_ENV", 7)) {
|
|
|
|
beg = curl_slist_append(tn->telnet_vars, arg);
|
|
|
|
if(!beg) {
|
|
|
|
result = CURLE_OUT_OF_MEMORY;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
tn->telnet_vars = beg;
|
|
|
|
tn->us_preferred[CURL_TELOPT_NEW_ENVIRON] = CURL_YES;
|
2011-10-08 02:50:57 +08:00
|
|
|
}
|
2023-02-24 01:14:35 +08:00
|
|
|
else
|
|
|
|
result = CURLE_UNKNOWN_OPTION;
|
|
|
|
break;
|
2001-02-21 01:35:51 +08:00
|
|
|
|
2023-02-24 01:14:35 +08:00
|
|
|
case 2:
|
|
|
|
/* Window Size */
|
|
|
|
if(strncasecompare(option, "WS", 2)) {
|
2023-02-24 01:20:16 +08:00
|
|
|
char *p;
|
|
|
|
unsigned long x = strtoul(arg, &p, 10);
|
|
|
|
unsigned long y = 0;
|
2023-02-25 01:38:32 +08:00
|
|
|
if(x && (x <= 0xffff) && Curl_raw_tolower(*p) == 'x') {
|
2023-02-24 01:20:16 +08:00
|
|
|
p++;
|
|
|
|
y = strtoul(p, NULL, 10);
|
2023-02-25 01:38:32 +08:00
|
|
|
if(y && (y <= 0xffff)) {
|
2023-02-24 01:20:16 +08:00
|
|
|
tn->subopt_wsx = (unsigned short)x;
|
|
|
|
tn->subopt_wsy = (unsigned short)y;
|
|
|
|
tn->us_preferred[CURL_TELOPT_NAWS] = CURL_YES;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if(!y) {
|
2023-02-24 01:14:35 +08:00
|
|
|
failf(data, "Syntax error in telnet option: %s", head->data);
|
|
|
|
result = CURLE_SETOPT_OPTION_SYNTAX;
|
|
|
|
}
|
2011-11-25 17:35:34 +08:00
|
|
|
}
|
2023-02-24 01:14:35 +08:00
|
|
|
else
|
|
|
|
result = CURLE_UNKNOWN_OPTION;
|
|
|
|
break;
|
2011-11-25 17:35:34 +08:00
|
|
|
|
2023-02-24 01:14:35 +08:00
|
|
|
case 6:
|
|
|
|
/* To take care or not of the 8th bit in data exchange */
|
|
|
|
if(strncasecompare(option, "BINARY", 6)) {
|
|
|
|
int binary_option = atoi(arg);
|
|
|
|
if(binary_option != 1) {
|
|
|
|
tn->us_preferred[CURL_TELOPT_BINARY] = CURL_NO;
|
|
|
|
tn->him_preferred[CURL_TELOPT_BINARY] = CURL_NO;
|
|
|
|
}
|
2011-11-25 17:35:34 +08:00
|
|
|
}
|
2023-02-24 01:14:35 +08:00
|
|
|
else
|
|
|
|
result = CURLE_UNKNOWN_OPTION;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
failf(data, "Unknown telnet option %s", head->data);
|
|
|
|
result = CURLE_UNKNOWN_OPTION;
|
|
|
|
break;
|
2011-11-25 17:35:34 +08:00
|
|
|
}
|
2011-04-20 21:17:42 +08:00
|
|
|
}
|
2023-02-24 01:14:35 +08:00
|
|
|
else {
|
|
|
|
failf(data, "Syntax error in telnet option: %s", head->data);
|
|
|
|
result = CURLE_SETOPT_OPTION_SYNTAX;
|
|
|
|
}
|
2001-02-21 01:35:51 +08:00
|
|
|
}
|
|
|
|
|
2011-10-08 02:50:57 +08:00
|
|
|
if(result) {
|
|
|
|
curl_slist_free_all(tn->telnet_vars);
|
|
|
|
tn->telnet_vars = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
return result;
|
1999-12-29 22:20:26 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* suboption()
|
|
|
|
*
|
|
|
|
* Look at the sub-option buffer, and try to be helpful to the other
|
|
|
|
* side.
|
|
|
|
*/
|
|
|
|
|
2021-01-18 18:56:50 +08:00
|
|
|
static void suboption(struct Curl_easy *data)
|
1999-12-29 22:20:26 +08:00
|
|
|
{
|
2001-02-21 01:35:51 +08:00
|
|
|
struct curl_slist *v;
|
|
|
|
unsigned char temp[2048];
|
2006-07-12 13:19:00 +08:00
|
|
|
ssize_t bytes_written;
|
2004-03-23 23:28:31 +08:00
|
|
|
size_t len;
|
2006-07-12 15:33:54 +08:00
|
|
|
int err;
|
2021-01-18 18:56:50 +08:00
|
|
|
struct TELNET *tn = data->req.p.telnet;
|
|
|
|
struct connectdata *conn = data->conn;
|
2001-02-21 01:35:51 +08:00
|
|
|
|
2017-09-10 05:55:08 +08:00
|
|
|
printsub(data, '<', (unsigned char *)tn->subbuffer, CURL_SB_LEN(tn) + 2);
|
2016-12-14 06:34:59 +08:00
|
|
|
switch(CURL_SB_GET(tn)) {
|
2003-03-12 16:40:45 +08:00
|
|
|
case CURL_TELOPT_TTYPE:
|
2001-03-05 21:59:43 +08:00
|
|
|
len = strlen(tn->subopt_ttype) + 4 + 2;
|
2018-11-22 16:01:24 +08:00
|
|
|
msnprintf((char *)temp, sizeof(temp),
|
|
|
|
"%c%c%c%c%s%c%c", CURL_IAC, CURL_SB, CURL_TELOPT_TTYPE,
|
|
|
|
CURL_TELQUAL_IS, tn->subopt_ttype, CURL_IAC, CURL_SE);
|
2006-07-12 13:19:00 +08:00
|
|
|
bytes_written = swrite(conn->sock[FIRSTSOCKET], temp, len);
|
2006-07-12 15:33:54 +08:00
|
|
|
if(bytes_written < 0) {
|
2007-02-17 02:19:35 +08:00
|
|
|
err = SOCKERRNO;
|
2006-07-12 15:33:54 +08:00
|
|
|
failf(data,"Sending data failed (%d)",err);
|
|
|
|
}
|
2001-02-21 01:35:51 +08:00
|
|
|
printsub(data, '>', &temp[2], len-2);
|
|
|
|
break;
|
2003-03-12 16:40:45 +08:00
|
|
|
case CURL_TELOPT_XDISPLOC:
|
2001-03-05 21:59:43 +08:00
|
|
|
len = strlen(tn->subopt_xdisploc) + 4 + 2;
|
2018-11-22 16:01:24 +08:00
|
|
|
msnprintf((char *)temp, sizeof(temp),
|
|
|
|
"%c%c%c%c%s%c%c", CURL_IAC, CURL_SB, CURL_TELOPT_XDISPLOC,
|
|
|
|
CURL_TELQUAL_IS, tn->subopt_xdisploc, CURL_IAC, CURL_SE);
|
2006-07-12 13:19:00 +08:00
|
|
|
bytes_written = swrite(conn->sock[FIRSTSOCKET], temp, len);
|
2006-07-12 15:33:54 +08:00
|
|
|
if(bytes_written < 0) {
|
2007-02-17 02:19:35 +08:00
|
|
|
err = SOCKERRNO;
|
2006-07-12 15:33:54 +08:00
|
|
|
failf(data,"Sending data failed (%d)",err);
|
|
|
|
}
|
2001-02-21 01:35:51 +08:00
|
|
|
printsub(data, '>', &temp[2], len-2);
|
|
|
|
break;
|
2003-03-12 16:40:45 +08:00
|
|
|
case CURL_TELOPT_NEW_ENVIRON:
|
2018-11-22 16:01:24 +08:00
|
|
|
msnprintf((char *)temp, sizeof(temp),
|
|
|
|
"%c%c%c%c", CURL_IAC, CURL_SB, CURL_TELOPT_NEW_ENVIRON,
|
|
|
|
CURL_TELQUAL_IS);
|
2001-02-21 01:35:51 +08:00
|
|
|
len = 4;
|
|
|
|
|
2017-09-11 15:27:06 +08:00
|
|
|
for(v = tn->telnet_vars; v; v = v->next) {
|
2018-06-03 04:52:56 +08:00
|
|
|
size_t tmplen = (strlen(v->data) + 1);
|
2023-02-24 01:26:50 +08:00
|
|
|
/* Add the variable if it fits */
|
2001-08-14 16:38:08 +08:00
|
|
|
if(len + tmplen < (int)sizeof(temp)-6) {
|
2023-02-24 01:26:50 +08:00
|
|
|
char *s = strchr(v->data, ',');
|
|
|
|
if(!s)
|
2021-06-13 00:25:15 +08:00
|
|
|
len += msnprintf((char *)&temp[len], sizeof(temp) - len,
|
2023-02-24 01:26:50 +08:00
|
|
|
"%c%s", CURL_NEW_ENV_VAR, v->data);
|
|
|
|
else {
|
|
|
|
size_t vlen = s - v->data;
|
2021-06-13 00:25:15 +08:00
|
|
|
len += msnprintf((char *)&temp[len], sizeof(temp) - len,
|
2023-02-24 01:26:50 +08:00
|
|
|
"%c%.*s%c%s", CURL_NEW_ENV_VAR,
|
|
|
|
(int)vlen, v->data, CURL_NEW_ENV_VALUE, ++s);
|
|
|
|
}
|
2001-02-21 01:35:51 +08:00
|
|
|
}
|
|
|
|
}
|
2018-11-22 16:01:24 +08:00
|
|
|
msnprintf((char *)&temp[len], sizeof(temp) - len,
|
|
|
|
"%c%c", CURL_IAC, CURL_SE);
|
2001-02-21 01:35:51 +08:00
|
|
|
len += 2;
|
2006-07-12 13:19:00 +08:00
|
|
|
bytes_written = swrite(conn->sock[FIRSTSOCKET], temp, len);
|
2006-07-12 15:33:54 +08:00
|
|
|
if(bytes_written < 0) {
|
2007-02-17 02:19:35 +08:00
|
|
|
err = SOCKERRNO;
|
2006-07-12 15:33:54 +08:00
|
|
|
failf(data,"Sending data failed (%d)",err);
|
|
|
|
}
|
2001-02-21 01:35:51 +08:00
|
|
|
printsub(data, '>', &temp[2], len-2);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
return;
|
1999-12-29 22:20:26 +08:00
|
|
|
}
|
|
|
|
|
2011-11-25 17:35:34 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* sendsuboption()
|
|
|
|
*
|
|
|
|
* Send suboption information to the server side.
|
|
|
|
*/
|
|
|
|
|
2021-01-18 18:56:50 +08:00
|
|
|
static void sendsuboption(struct Curl_easy *data, int option)
|
2011-11-25 17:35:34 +08:00
|
|
|
{
|
|
|
|
ssize_t bytes_written;
|
|
|
|
int err;
|
|
|
|
unsigned short x, y;
|
2016-11-23 15:30:18 +08:00
|
|
|
unsigned char *uc1, *uc2;
|
2021-01-18 18:56:50 +08:00
|
|
|
struct TELNET *tn = data->req.p.telnet;
|
|
|
|
struct connectdata *conn = data->conn;
|
2011-11-25 17:35:34 +08:00
|
|
|
|
2016-12-14 06:34:59 +08:00
|
|
|
switch(option) {
|
2011-11-25 17:35:34 +08:00
|
|
|
case CURL_TELOPT_NAWS:
|
|
|
|
/* We prepare data to be sent */
|
2011-11-25 17:56:18 +08:00
|
|
|
CURL_SB_CLEAR(tn);
|
|
|
|
CURL_SB_ACCUM(tn, CURL_IAC);
|
|
|
|
CURL_SB_ACCUM(tn, CURL_SB);
|
|
|
|
CURL_SB_ACCUM(tn, CURL_TELOPT_NAWS);
|
2018-06-03 20:14:45 +08:00
|
|
|
/* We must deal either with little or big endian processors */
|
2011-11-25 17:35:34 +08:00
|
|
|
/* Window size must be sent according to the 'network order' */
|
2017-09-10 05:09:06 +08:00
|
|
|
x = htons(tn->subopt_wsx);
|
|
|
|
y = htons(tn->subopt_wsy);
|
2016-11-23 15:30:18 +08:00
|
|
|
uc1 = (unsigned char *)&x;
|
|
|
|
uc2 = (unsigned char *)&y;
|
2011-11-25 17:56:18 +08:00
|
|
|
CURL_SB_ACCUM(tn, uc1[0]);
|
|
|
|
CURL_SB_ACCUM(tn, uc1[1]);
|
|
|
|
CURL_SB_ACCUM(tn, uc2[0]);
|
|
|
|
CURL_SB_ACCUM(tn, uc2[1]);
|
|
|
|
|
|
|
|
CURL_SB_ACCUM(tn, CURL_IAC);
|
|
|
|
CURL_SB_ACCUM(tn, CURL_SE);
|
|
|
|
CURL_SB_TERM(tn);
|
|
|
|
/* data suboption is now ready */
|
|
|
|
|
2017-09-10 05:55:08 +08:00
|
|
|
printsub(data, '>', (unsigned char *)tn->subbuffer + 2,
|
2011-11-25 17:56:18 +08:00
|
|
|
CURL_SB_LEN(tn)-2);
|
2011-11-25 17:35:34 +08:00
|
|
|
|
|
|
|
/* we send the header of the suboption... */
|
|
|
|
bytes_written = swrite(conn->sock[FIRSTSOCKET], tn->subbuffer, 3);
|
|
|
|
if(bytes_written < 0) {
|
|
|
|
err = SOCKERRNO;
|
|
|
|
failf(data, "Sending data failed (%d)", err);
|
|
|
|
}
|
|
|
|
/* ... then the window size with the send_telnet_data() function
|
|
|
|
to deal with 0xFF cases ... */
|
2021-01-09 00:58:15 +08:00
|
|
|
send_telnet_data(data, (char *)tn->subbuffer + 3, 4);
|
2011-11-25 17:35:34 +08:00
|
|
|
/* ... and the footer */
|
2017-09-10 05:55:08 +08:00
|
|
|
bytes_written = swrite(conn->sock[FIRSTSOCKET], tn->subbuffer + 7, 2);
|
2011-11-25 17:35:34 +08:00
|
|
|
if(bytes_written < 0) {
|
|
|
|
err = SOCKERRNO;
|
|
|
|
failf(data, "Sending data failed (%d)", err);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2001-01-05 18:11:41 +08:00
|
|
|
static
|
2021-01-18 18:56:50 +08:00
|
|
|
CURLcode telrcv(struct Curl_easy *data,
|
2009-03-12 21:18:25 +08:00
|
|
|
const unsigned char *inbuf, /* Data received from socket */
|
|
|
|
ssize_t count) /* Number of bytes received */
|
1999-12-29 22:20:26 +08:00
|
|
|
{
|
2001-02-21 01:35:51 +08:00
|
|
|
unsigned char c;
|
2009-03-12 21:18:25 +08:00
|
|
|
CURLcode result;
|
2003-10-19 04:24:54 +08:00
|
|
|
int in = 0;
|
2017-09-10 05:09:06 +08:00
|
|
|
int startwrite = -1;
|
2021-01-18 18:56:50 +08:00
|
|
|
struct TELNET *tn = data->req.p.telnet;
|
1999-12-29 22:20:26 +08:00
|
|
|
|
2010-04-29 06:49:04 +08:00
|
|
|
#define startskipping() \
|
|
|
|
if(startwrite >= 0) { \
|
2021-01-09 00:58:15 +08:00
|
|
|
result = Curl_client_write(data, \
|
2010-04-29 06:49:04 +08:00
|
|
|
CLIENTWRITE_BODY, \
|
|
|
|
(char *)&inbuf[startwrite], \
|
|
|
|
in-startwrite); \
|
2014-10-24 04:56:35 +08:00
|
|
|
if(result) \
|
2010-04-29 06:49:04 +08:00
|
|
|
return result; \
|
|
|
|
} \
|
|
|
|
startwrite = -1
|
2007-11-07 13:52:03 +08:00
|
|
|
|
|
|
|
#define writebyte() \
|
2007-11-07 17:21:35 +08:00
|
|
|
if(startwrite < 0) \
|
2007-11-07 13:52:03 +08:00
|
|
|
startwrite = in
|
|
|
|
|
|
|
|
#define bufferflush() startskipping()
|
|
|
|
|
2011-04-20 21:17:42 +08:00
|
|
|
while(count--) {
|
2007-11-07 13:52:03 +08:00
|
|
|
c = inbuf[in];
|
1999-12-29 22:20:26 +08:00
|
|
|
|
2016-12-14 06:34:59 +08:00
|
|
|
switch(tn->telrcv_state) {
|
2011-04-20 21:17:42 +08:00
|
|
|
case CURL_TS_CR:
|
|
|
|
tn->telrcv_state = CURL_TS_DATA;
|
|
|
|
if(c == '\0') {
|
|
|
|
startskipping();
|
|
|
|
break; /* Ignore \0 after CR */
|
|
|
|
}
|
|
|
|
writebyte();
|
|
|
|
break;
|
1999-12-29 22:20:26 +08:00
|
|
|
|
2011-04-20 21:17:42 +08:00
|
|
|
case CURL_TS_DATA:
|
|
|
|
if(c == CURL_IAC) {
|
|
|
|
tn->telrcv_state = CURL_TS_IAC;
|
|
|
|
startskipping();
|
2007-11-07 13:52:03 +08:00
|
|
|
break;
|
2011-04-20 21:17:42 +08:00
|
|
|
}
|
|
|
|
else if(c == '\r')
|
|
|
|
tn->telrcv_state = CURL_TS_CR;
|
|
|
|
writebyte();
|
|
|
|
break;
|
1999-12-29 22:20:26 +08:00
|
|
|
|
2011-04-20 21:17:42 +08:00
|
|
|
case CURL_TS_IAC:
|
2023-05-18 12:54:18 +08:00
|
|
|
process_iac:
|
2007-11-07 13:52:03 +08:00
|
|
|
DEBUGASSERT(startwrite < 0);
|
2016-12-14 06:34:59 +08:00
|
|
|
switch(c) {
|
2011-04-20 21:17:42 +08:00
|
|
|
case CURL_WILL:
|
|
|
|
tn->telrcv_state = CURL_TS_WILL;
|
|
|
|
break;
|
|
|
|
case CURL_WONT:
|
|
|
|
tn->telrcv_state = CURL_TS_WONT;
|
|
|
|
break;
|
|
|
|
case CURL_DO:
|
|
|
|
tn->telrcv_state = CURL_TS_DO;
|
|
|
|
break;
|
|
|
|
case CURL_DONT:
|
|
|
|
tn->telrcv_state = CURL_TS_DONT;
|
|
|
|
break;
|
|
|
|
case CURL_SB:
|
|
|
|
CURL_SB_CLEAR(tn);
|
|
|
|
tn->telrcv_state = CURL_TS_SB;
|
|
|
|
break;
|
|
|
|
case CURL_IAC:
|
|
|
|
tn->telrcv_state = CURL_TS_DATA;
|
|
|
|
writebyte();
|
|
|
|
break;
|
|
|
|
case CURL_DM:
|
|
|
|
case CURL_NOP:
|
|
|
|
case CURL_GA:
|
|
|
|
default:
|
|
|
|
tn->telrcv_state = CURL_TS_DATA;
|
|
|
|
printoption(data, "RCVD", CURL_IAC, c);
|
|
|
|
break;
|
2001-02-21 01:35:51 +08:00
|
|
|
}
|
2007-11-07 13:52:03 +08:00
|
|
|
break;
|
1999-12-29 22:20:26 +08:00
|
|
|
|
2003-03-12 16:40:45 +08:00
|
|
|
case CURL_TS_WILL:
|
|
|
|
printoption(data, "RCVD", CURL_WILL, c);
|
2001-03-05 21:59:43 +08:00
|
|
|
tn->please_negotiate = 1;
|
2021-01-18 18:56:50 +08:00
|
|
|
rec_will(data, c);
|
2003-03-12 16:40:45 +08:00
|
|
|
tn->telrcv_state = CURL_TS_DATA;
|
2007-11-07 13:52:03 +08:00
|
|
|
break;
|
2004-06-24 15:43:48 +08:00
|
|
|
|
2003-03-12 16:40:45 +08:00
|
|
|
case CURL_TS_WONT:
|
|
|
|
printoption(data, "RCVD", CURL_WONT, c);
|
2001-03-05 21:59:43 +08:00
|
|
|
tn->please_negotiate = 1;
|
2021-01-18 18:56:50 +08:00
|
|
|
rec_wont(data, c);
|
2003-03-12 16:40:45 +08:00
|
|
|
tn->telrcv_state = CURL_TS_DATA;
|
2007-11-07 13:52:03 +08:00
|
|
|
break;
|
2004-06-24 15:43:48 +08:00
|
|
|
|
2003-03-12 16:40:45 +08:00
|
|
|
case CURL_TS_DO:
|
|
|
|
printoption(data, "RCVD", CURL_DO, c);
|
2001-03-05 21:59:43 +08:00
|
|
|
tn->please_negotiate = 1;
|
2021-01-18 18:56:50 +08:00
|
|
|
rec_do(data, c);
|
2003-03-12 16:40:45 +08:00
|
|
|
tn->telrcv_state = CURL_TS_DATA;
|
2007-11-07 13:52:03 +08:00
|
|
|
break;
|
2004-06-24 15:43:48 +08:00
|
|
|
|
2003-03-12 16:40:45 +08:00
|
|
|
case CURL_TS_DONT:
|
|
|
|
printoption(data, "RCVD", CURL_DONT, c);
|
2001-03-05 21:59:43 +08:00
|
|
|
tn->please_negotiate = 1;
|
2021-01-18 18:56:50 +08:00
|
|
|
rec_dont(data, c);
|
2003-03-12 16:40:45 +08:00
|
|
|
tn->telrcv_state = CURL_TS_DATA;
|
2007-11-07 13:52:03 +08:00
|
|
|
break;
|
1999-12-29 22:20:26 +08:00
|
|
|
|
2003-03-12 16:40:45 +08:00
|
|
|
case CURL_TS_SB:
|
2007-11-05 17:45:09 +08:00
|
|
|
if(c == CURL_IAC)
|
2003-03-12 16:40:45 +08:00
|
|
|
tn->telrcv_state = CURL_TS_SE;
|
2001-02-21 01:35:51 +08:00
|
|
|
else
|
2015-03-17 20:41:49 +08:00
|
|
|
CURL_SB_ACCUM(tn, c);
|
2007-11-07 13:52:03 +08:00
|
|
|
break;
|
1999-12-29 22:20:26 +08:00
|
|
|
|
2003-03-12 16:40:45 +08:00
|
|
|
case CURL_TS_SE:
|
2011-04-20 21:17:42 +08:00
|
|
|
if(c != CURL_SE) {
|
|
|
|
if(c != CURL_IAC) {
|
2001-02-21 01:35:51 +08:00
|
|
|
/*
|
2024-07-01 22:47:21 +08:00
|
|
|
* This is an error. We only expect to get "IAC IAC" or "IAC SE".
|
|
|
|
* Several things may have happened. An IAC was not doubled, the
|
2006-04-07 19:46:16 +08:00
|
|
|
* IAC SE was left off, or another option got inserted into the
|
2024-07-01 22:47:21 +08:00
|
|
|
* suboption are all possibilities. If we assume that the IAC was
|
2006-04-07 19:46:16 +08:00
|
|
|
* not doubled, and really the IAC SE was left off, we could get
|
2024-07-01 22:47:21 +08:00
|
|
|
* into an infinite loop here. So, instead, we terminate the
|
2006-04-07 19:46:16 +08:00
|
|
|
* suboption, and process the partial suboption if we can.
|
2001-02-21 01:35:51 +08:00
|
|
|
*/
|
2006-04-07 19:46:16 +08:00
|
|
|
CURL_SB_ACCUM(tn, CURL_IAC);
|
2003-03-12 16:40:45 +08:00
|
|
|
CURL_SB_ACCUM(tn, c);
|
2001-03-05 21:59:43 +08:00
|
|
|
tn->subpointer -= 2;
|
2003-03-12 16:40:45 +08:00
|
|
|
CURL_SB_TERM(tn);
|
2004-06-24 15:43:48 +08:00
|
|
|
|
2003-03-12 16:40:45 +08:00
|
|
|
printoption(data, "In SUBOPTION processing, RCVD", CURL_IAC, c);
|
2021-01-18 18:56:50 +08:00
|
|
|
suboption(data); /* handle sub-option */
|
2003-03-12 16:40:45 +08:00
|
|
|
tn->telrcv_state = CURL_TS_IAC;
|
2001-02-21 01:35:51 +08:00
|
|
|
goto process_iac;
|
|
|
|
}
|
2015-03-17 20:41:49 +08:00
|
|
|
CURL_SB_ACCUM(tn, c);
|
2003-03-12 16:40:45 +08:00
|
|
|
tn->telrcv_state = CURL_TS_SB;
|
2001-02-21 01:35:51 +08:00
|
|
|
}
|
2018-04-26 03:53:27 +08:00
|
|
|
else {
|
2006-04-07 19:46:16 +08:00
|
|
|
CURL_SB_ACCUM(tn, CURL_IAC);
|
|
|
|
CURL_SB_ACCUM(tn, CURL_SE);
|
2001-03-05 21:59:43 +08:00
|
|
|
tn->subpointer -= 2;
|
2003-03-12 16:40:45 +08:00
|
|
|
CURL_SB_TERM(tn);
|
2021-01-18 18:56:50 +08:00
|
|
|
suboption(data); /* handle sub-option */
|
2003-03-12 16:40:45 +08:00
|
|
|
tn->telrcv_state = CURL_TS_DATA;
|
2001-02-21 01:35:51 +08:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
2007-11-07 13:52:03 +08:00
|
|
|
++in;
|
2001-02-21 01:35:51 +08:00
|
|
|
}
|
2007-11-07 13:52:03 +08:00
|
|
|
bufferflush();
|
2009-03-12 21:18:25 +08:00
|
|
|
return CURLE_OK;
|
1999-12-29 22:20:26 +08:00
|
|
|
}
|
|
|
|
|
2008-06-04 02:03:11 +08:00
|
|
|
/* Escape and send a telnet data block */
|
2021-01-09 00:58:15 +08:00
|
|
|
static CURLcode send_telnet_data(struct Curl_easy *data,
|
2009-02-27 16:53:10 +08:00
|
|
|
char *buffer, ssize_t nread)
|
2008-06-04 02:03:11 +08:00
|
|
|
{
|
lib: Curl_read/Curl_write clarifications
- replace `Curl_read()`, `Curl_write()` and `Curl_nwrite()` to
clarify when and at what level they operate
- send/recv of transfer related data is now done via
`Curl_xfer_send()/Curl_xfer_recv()` which no longer has
socket/socketindex as parameter. It decides on the transfer
setup of `conn->sockfd` and `conn->writesockfd` on which
connection filter chain to operate.
- send/recv on a specific connection filter chain is done via
`Curl_conn_send()/Curl_conn_recv()` which get the socket index
as parameter.
- rename `Curl_setup_transfer()` to `Curl_xfer_setup()` for
naming consistency
- clarify that the special CURLE_AGAIN hangling to return
`CURLE_OK` with length 0 only applies to `Curl_xfer_send()`
and CURLE_AGAIN is returned by all other send() variants.
- fix a bug in websocket `curl_ws_recv()` that mixed up data
when it arrived in more than a single chunk
The method for sending not just raw bytes, but bytes that are either
"headers" or "body". The send abstraction stack, to to bottom, now is:
* `Curl_req_send()`: has parameter to indicate amount of header bytes,
buffers all data.
* `Curl_xfer_send()`: knows on which socket index to send, returns
amount of bytes sent.
* `Curl_conn_send()`: called with socket index, returns amount of bytes
sent.
In addition there is `Curl_req_flush()` for writing out all buffered
bytes.
`Curl_req_send()` is active for requests without body,
`Curl_buffer_send()` still being used for others. This is because the
special quirks need to be addressed in future parts:
* `expect-100` handling
* `Curl_fillreadbuffer()` needs to add directly to the new
`data->req.sendbuf`
* special body handlings, like `chunked` encodings and line end
conversions will be moved into something like a Client Reader.
In functions of the pattern `CURLcode xxx_send(..., ssize_t *written)`,
replace the `ssize_t` with a `size_t`. It makes no sense to allow for negative
values as the returned `CURLcode` already specifies error conditions. This
allows easier handling of lengths without casting.
Closes #12964
2024-02-15 23:22:53 +08:00
|
|
|
size_t i, outlen;
|
2024-01-07 23:28:15 +08:00
|
|
|
unsigned char *outbuf;
|
2014-10-24 04:56:35 +08:00
|
|
|
CURLcode result = CURLE_OK;
|
lib: Curl_read/Curl_write clarifications
- replace `Curl_read()`, `Curl_write()` and `Curl_nwrite()` to
clarify when and at what level they operate
- send/recv of transfer related data is now done via
`Curl_xfer_send()/Curl_xfer_recv()` which no longer has
socket/socketindex as parameter. It decides on the transfer
setup of `conn->sockfd` and `conn->writesockfd` on which
connection filter chain to operate.
- send/recv on a specific connection filter chain is done via
`Curl_conn_send()/Curl_conn_recv()` which get the socket index
as parameter.
- rename `Curl_setup_transfer()` to `Curl_xfer_setup()` for
naming consistency
- clarify that the special CURLE_AGAIN hangling to return
`CURLE_OK` with length 0 only applies to `Curl_xfer_send()`
and CURLE_AGAIN is returned by all other send() variants.
- fix a bug in websocket `curl_ws_recv()` that mixed up data
when it arrived in more than a single chunk
The method for sending not just raw bytes, but bytes that are either
"headers" or "body". The send abstraction stack, to to bottom, now is:
* `Curl_req_send()`: has parameter to indicate amount of header bytes,
buffers all data.
* `Curl_xfer_send()`: knows on which socket index to send, returns
amount of bytes sent.
* `Curl_conn_send()`: called with socket index, returns amount of bytes
sent.
In addition there is `Curl_req_flush()` for writing out all buffered
bytes.
`Curl_req_send()` is active for requests without body,
`Curl_buffer_send()` still being used for others. This is because the
special quirks need to be addressed in future parts:
* `expect-100` handling
* `Curl_fillreadbuffer()` needs to add directly to the new
`data->req.sendbuf`
* special body handlings, like `chunked` encodings and line end
conversions will be moved into something like a Client Reader.
In functions of the pattern `CURLcode xxx_send(..., ssize_t *written)`,
replace the `ssize_t` with a `size_t`. It makes no sense to allow for negative
values as the returned `CURLcode` already specifies error conditions. This
allows easier handling of lengths without casting.
Closes #12964
2024-02-15 23:22:53 +08:00
|
|
|
size_t bytes_written;
|
|
|
|
size_t total_written = 0;
|
2021-01-09 00:58:15 +08:00
|
|
|
struct connectdata *conn = data->conn;
|
2024-01-07 23:28:15 +08:00
|
|
|
struct TELNET *tn = data->req.p.telnet;
|
2008-06-04 02:03:11 +08:00
|
|
|
|
2024-01-07 23:28:15 +08:00
|
|
|
DEBUGASSERT(tn);
|
lib: Curl_read/Curl_write clarifications
- replace `Curl_read()`, `Curl_write()` and `Curl_nwrite()` to
clarify when and at what level they operate
- send/recv of transfer related data is now done via
`Curl_xfer_send()/Curl_xfer_recv()` which no longer has
socket/socketindex as parameter. It decides on the transfer
setup of `conn->sockfd` and `conn->writesockfd` on which
connection filter chain to operate.
- send/recv on a specific connection filter chain is done via
`Curl_conn_send()/Curl_conn_recv()` which get the socket index
as parameter.
- rename `Curl_setup_transfer()` to `Curl_xfer_setup()` for
naming consistency
- clarify that the special CURLE_AGAIN hangling to return
`CURLE_OK` with length 0 only applies to `Curl_xfer_send()`
and CURLE_AGAIN is returned by all other send() variants.
- fix a bug in websocket `curl_ws_recv()` that mixed up data
when it arrived in more than a single chunk
The method for sending not just raw bytes, but bytes that are either
"headers" or "body". The send abstraction stack, to to bottom, now is:
* `Curl_req_send()`: has parameter to indicate amount of header bytes,
buffers all data.
* `Curl_xfer_send()`: knows on which socket index to send, returns
amount of bytes sent.
* `Curl_conn_send()`: called with socket index, returns amount of bytes
sent.
In addition there is `Curl_req_flush()` for writing out all buffered
bytes.
`Curl_req_send()` is active for requests without body,
`Curl_buffer_send()` still being used for others. This is because the
special quirks need to be addressed in future parts:
* `expect-100` handling
* `Curl_fillreadbuffer()` needs to add directly to the new
`data->req.sendbuf`
* special body handlings, like `chunked` encodings and line end
conversions will be moved into something like a Client Reader.
In functions of the pattern `CURLcode xxx_send(..., ssize_t *written)`,
replace the `ssize_t` with a `size_t`. It makes no sense to allow for negative
values as the returned `CURLcode` already specifies error conditions. This
allows easier handling of lengths without casting.
Closes #12964
2024-02-15 23:22:53 +08:00
|
|
|
DEBUGASSERT(nread > 0);
|
|
|
|
if(nread < 0)
|
|
|
|
return CURLE_TOO_LARGE;
|
2017-04-05 10:26:29 +08:00
|
|
|
|
2024-01-07 23:28:15 +08:00
|
|
|
if(memchr(buffer, CURL_IAC, nread)) {
|
|
|
|
/* only use the escape buffer when necessary */
|
|
|
|
Curl_dyn_reset(&tn->out);
|
2017-04-05 10:26:29 +08:00
|
|
|
|
lib: Curl_read/Curl_write clarifications
- replace `Curl_read()`, `Curl_write()` and `Curl_nwrite()` to
clarify when and at what level they operate
- send/recv of transfer related data is now done via
`Curl_xfer_send()/Curl_xfer_recv()` which no longer has
socket/socketindex as parameter. It decides on the transfer
setup of `conn->sockfd` and `conn->writesockfd` on which
connection filter chain to operate.
- send/recv on a specific connection filter chain is done via
`Curl_conn_send()/Curl_conn_recv()` which get the socket index
as parameter.
- rename `Curl_setup_transfer()` to `Curl_xfer_setup()` for
naming consistency
- clarify that the special CURLE_AGAIN hangling to return
`CURLE_OK` with length 0 only applies to `Curl_xfer_send()`
and CURLE_AGAIN is returned by all other send() variants.
- fix a bug in websocket `curl_ws_recv()` that mixed up data
when it arrived in more than a single chunk
The method for sending not just raw bytes, but bytes that are either
"headers" or "body". The send abstraction stack, to to bottom, now is:
* `Curl_req_send()`: has parameter to indicate amount of header bytes,
buffers all data.
* `Curl_xfer_send()`: knows on which socket index to send, returns
amount of bytes sent.
* `Curl_conn_send()`: called with socket index, returns amount of bytes
sent.
In addition there is `Curl_req_flush()` for writing out all buffered
bytes.
`Curl_req_send()` is active for requests without body,
`Curl_buffer_send()` still being used for others. This is because the
special quirks need to be addressed in future parts:
* `expect-100` handling
* `Curl_fillreadbuffer()` needs to add directly to the new
`data->req.sendbuf`
* special body handlings, like `chunked` encodings and line end
conversions will be moved into something like a Client Reader.
In functions of the pattern `CURLcode xxx_send(..., ssize_t *written)`,
replace the `ssize_t` with a `size_t`. It makes no sense to allow for negative
values as the returned `CURLcode` already specifies error conditions. This
allows easier handling of lengths without casting.
Closes #12964
2024-02-15 23:22:53 +08:00
|
|
|
for(i = 0; i < (size_t)nread && !result; i++) {
|
2024-01-07 23:28:15 +08:00
|
|
|
result = Curl_dyn_addn(&tn->out, &buffer[i], 1);
|
|
|
|
if(!result && ((unsigned char)buffer[i] == CURL_IAC))
|
|
|
|
/* IAC is FF in hex */
|
|
|
|
result = Curl_dyn_addn(&tn->out, "\xff", 1);
|
2017-04-05 10:26:29 +08:00
|
|
|
}
|
|
|
|
|
2024-01-07 23:28:15 +08:00
|
|
|
outlen = Curl_dyn_len(&tn->out);
|
|
|
|
outbuf = Curl_dyn_uptr(&tn->out);
|
|
|
|
}
|
|
|
|
else {
|
lib: Curl_read/Curl_write clarifications
- replace `Curl_read()`, `Curl_write()` and `Curl_nwrite()` to
clarify when and at what level they operate
- send/recv of transfer related data is now done via
`Curl_xfer_send()/Curl_xfer_recv()` which no longer has
socket/socketindex as parameter. It decides on the transfer
setup of `conn->sockfd` and `conn->writesockfd` on which
connection filter chain to operate.
- send/recv on a specific connection filter chain is done via
`Curl_conn_send()/Curl_conn_recv()` which get the socket index
as parameter.
- rename `Curl_setup_transfer()` to `Curl_xfer_setup()` for
naming consistency
- clarify that the special CURLE_AGAIN hangling to return
`CURLE_OK` with length 0 only applies to `Curl_xfer_send()`
and CURLE_AGAIN is returned by all other send() variants.
- fix a bug in websocket `curl_ws_recv()` that mixed up data
when it arrived in more than a single chunk
The method for sending not just raw bytes, but bytes that are either
"headers" or "body". The send abstraction stack, to to bottom, now is:
* `Curl_req_send()`: has parameter to indicate amount of header bytes,
buffers all data.
* `Curl_xfer_send()`: knows on which socket index to send, returns
amount of bytes sent.
* `Curl_conn_send()`: called with socket index, returns amount of bytes
sent.
In addition there is `Curl_req_flush()` for writing out all buffered
bytes.
`Curl_req_send()` is active for requests without body,
`Curl_buffer_send()` still being used for others. This is because the
special quirks need to be addressed in future parts:
* `expect-100` handling
* `Curl_fillreadbuffer()` needs to add directly to the new
`data->req.sendbuf`
* special body handlings, like `chunked` encodings and line end
conversions will be moved into something like a Client Reader.
In functions of the pattern `CURLcode xxx_send(..., ssize_t *written)`,
replace the `ssize_t` with a `size_t`. It makes no sense to allow for negative
values as the returned `CURLcode` already specifies error conditions. This
allows easier handling of lengths without casting.
Closes #12964
2024-02-15 23:22:53 +08:00
|
|
|
outlen = (size_t)nread;
|
2024-01-07 23:28:15 +08:00
|
|
|
outbuf = (unsigned char *)buffer;
|
|
|
|
}
|
2017-04-05 10:26:29 +08:00
|
|
|
while(!result && total_written < outlen) {
|
|
|
|
/* Make sure socket is writable to avoid EWOULDBLOCK condition */
|
|
|
|
struct pollfd pfd[1];
|
|
|
|
pfd[0].fd = conn->sock[FIRSTSOCKET];
|
|
|
|
pfd[0].events = POLLOUT;
|
|
|
|
switch(Curl_poll(pfd, 1, -1)) {
|
|
|
|
case -1: /* error, abort writing */
|
|
|
|
case 0: /* timeout (will never happen) */
|
|
|
|
result = CURLE_SEND_ERROR;
|
|
|
|
break;
|
|
|
|
default: /* write! */
|
|
|
|
bytes_written = 0;
|
2024-02-14 19:09:32 +08:00
|
|
|
result = Curl_xfer_send(data, outbuf + total_written,
|
2024-07-19 07:38:05 +08:00
|
|
|
outlen - total_written, &bytes_written);
|
2017-04-05 10:26:29 +08:00
|
|
|
total_written += bytes_written;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-10-24 04:56:35 +08:00
|
|
|
return result;
|
2008-06-04 02:03:11 +08:00
|
|
|
}
|
|
|
|
|
2021-01-09 00:58:15 +08:00
|
|
|
static CURLcode telnet_done(struct Curl_easy *data,
|
|
|
|
CURLcode status, bool premature)
|
1999-12-29 22:20:26 +08:00
|
|
|
{
|
2021-01-18 18:56:50 +08:00
|
|
|
struct TELNET *tn = data->req.p.telnet;
|
2004-05-12 20:06:39 +08:00
|
|
|
(void)status; /* unused */
|
2007-01-17 06:22:10 +08:00
|
|
|
(void)premature; /* not used */
|
2004-05-12 20:06:39 +08:00
|
|
|
|
2012-01-20 07:11:15 +08:00
|
|
|
if(!tn)
|
|
|
|
return CURLE_OK;
|
|
|
|
|
2001-03-05 21:59:43 +08:00
|
|
|
curl_slist_free_all(tn->telnet_vars);
|
2011-10-08 02:50:57 +08:00
|
|
|
tn->telnet_vars = NULL;
|
2024-01-07 23:28:15 +08:00
|
|
|
Curl_dyn_free(&tn->out);
|
2000-05-22 22:12:12 +08:00
|
|
|
return CURLE_OK;
|
|
|
|
}
|
|
|
|
|
2021-01-09 00:58:15 +08:00
|
|
|
static CURLcode telnet_do(struct Curl_easy *data, bool *done)
|
2000-05-22 22:12:12 +08:00
|
|
|
{
|
2015-02-04 08:09:31 +08:00
|
|
|
CURLcode result;
|
2021-01-09 00:58:15 +08:00
|
|
|
struct connectdata *conn = data->conn;
|
2004-03-10 06:52:50 +08:00
|
|
|
curl_socket_t sockfd = conn->sock[FIRSTSOCKET];
|
2006-10-19 05:05:40 +08:00
|
|
|
#ifdef USE_WINSOCK
|
2001-09-17 22:10:38 +08:00
|
|
|
WSAEVENT event_handle;
|
|
|
|
WSANETWORKEVENTS events;
|
|
|
|
HANDLE stdin_handle;
|
2004-06-24 15:43:48 +08:00
|
|
|
HANDLE objs[2];
|
2004-04-26 15:50:51 +08:00
|
|
|
DWORD obj_count;
|
|
|
|
DWORD wait_timeout;
|
2004-03-11 21:13:35 +08:00
|
|
|
DWORD readfile_read;
|
2009-03-11 12:15:33 +08:00
|
|
|
int err;
|
2001-09-17 22:10:38 +08:00
|
|
|
#else
|
2020-06-01 14:49:20 +08:00
|
|
|
timediff_t interval_ms;
|
2004-11-19 16:52:33 +08:00
|
|
|
struct pollfd pfd[2];
|
2010-04-29 06:49:04 +08:00
|
|
|
int poll_cnt;
|
2010-05-08 11:38:42 +08:00
|
|
|
curl_off_t total_dl = 0;
|
|
|
|
curl_off_t total_ul = 0;
|
2001-09-17 22:10:38 +08:00
|
|
|
#endif
|
2004-06-24 15:43:48 +08:00
|
|
|
ssize_t nread;
|
2017-07-28 21:49:36 +08:00
|
|
|
struct curltime now;
|
2000-05-22 22:12:12 +08:00
|
|
|
bool keepon = TRUE;
|
2024-01-25 22:43:14 +08:00
|
|
|
char buffer[4*1024];
|
2001-03-05 21:59:43 +08:00
|
|
|
struct TELNET *tn;
|
|
|
|
|
2007-11-07 13:52:03 +08:00
|
|
|
*done = TRUE; /* unconditionally */
|
2005-02-09 21:06:40 +08:00
|
|
|
|
2021-01-18 18:56:50 +08:00
|
|
|
result = init_telnet(data);
|
2015-02-04 08:09:31 +08:00
|
|
|
if(result)
|
|
|
|
return result;
|
2001-03-05 21:59:43 +08:00
|
|
|
|
2020-11-23 15:32:41 +08:00
|
|
|
tn = data->req.p.telnet;
|
1999-12-29 22:20:26 +08:00
|
|
|
|
2021-01-18 18:56:50 +08:00
|
|
|
result = check_telnet_options(data);
|
2015-02-04 08:09:31 +08:00
|
|
|
if(result)
|
|
|
|
return result;
|
2001-09-17 22:10:38 +08:00
|
|
|
|
2006-10-19 05:05:40 +08:00
|
|
|
#ifdef USE_WINSOCK
|
2001-09-17 22:10:38 +08:00
|
|
|
/* We want to wait for both stdin and the socket. Since
|
|
|
|
** the select() function in winsock only works on sockets
|
|
|
|
** we have to use the WaitForMultipleObjects() call.
|
|
|
|
*/
|
|
|
|
|
|
|
|
/* First, create a sockets event object */
|
2020-08-29 03:54:03 +08:00
|
|
|
event_handle = WSACreateEvent();
|
2007-11-05 17:45:09 +08:00
|
|
|
if(event_handle == WSA_INVALID_EVENT) {
|
2015-03-17 20:41:49 +08:00
|
|
|
failf(data, "WSACreateEvent failed (%d)", SOCKERRNO);
|
2004-03-03 21:32:56 +08:00
|
|
|
return CURLE_FAILED_INIT;
|
|
|
|
}
|
2001-09-17 22:10:38 +08:00
|
|
|
|
|
|
|
/* Tell winsock what events we want to listen to */
|
2020-08-29 03:54:03 +08:00
|
|
|
if(WSAEventSelect(sockfd, event_handle, FD_READ|FD_CLOSE) == SOCKET_ERROR) {
|
|
|
|
WSACloseEvent(event_handle);
|
2008-09-13 09:12:07 +08:00
|
|
|
return CURLE_OK;
|
2001-09-17 22:10:38 +08:00
|
|
|
}
|
2004-06-24 15:43:48 +08:00
|
|
|
|
2011-08-15 05:26:09 +08:00
|
|
|
/* The get the Windows file handle for stdin */
|
|
|
|
stdin_handle = GetStdHandle(STD_INPUT_HANDLE);
|
|
|
|
|
|
|
|
/* Create the list of objects to wait for */
|
|
|
|
objs[0] = event_handle;
|
|
|
|
objs[1] = stdin_handle;
|
|
|
|
|
2004-06-24 15:43:48 +08:00
|
|
|
/* If stdin_handle is a pipe, use PeekNamedPipe() method to check it,
|
|
|
|
else use the old WaitForMultipleObjects() way */
|
2011-08-15 05:26:09 +08:00
|
|
|
if(GetFileType(stdin_handle) == FILE_TYPE_PIPE ||
|
|
|
|
data->set.is_fread_set) {
|
2024-07-01 22:47:21 +08:00
|
|
|
/* Do not wait for stdin_handle, just wait for event_handle */
|
2004-06-24 15:43:48 +08:00
|
|
|
obj_count = 1;
|
2004-04-26 15:50:51 +08:00
|
|
|
/* Check stdin_handle per 100 milliseconds */
|
2004-06-24 15:43:48 +08:00
|
|
|
wait_timeout = 100;
|
2011-04-20 21:17:42 +08:00
|
|
|
}
|
|
|
|
else {
|
2004-04-26 15:50:51 +08:00
|
|
|
obj_count = 2;
|
2009-03-11 12:15:33 +08:00
|
|
|
wait_timeout = 1000;
|
2004-04-26 15:50:51 +08:00
|
|
|
}
|
2004-06-24 15:43:48 +08:00
|
|
|
|
2001-09-17 22:10:38 +08:00
|
|
|
/* Keep on listening and act on events */
|
|
|
|
while(keepon) {
|
2024-01-25 22:43:14 +08:00
|
|
|
const DWORD buf_size = (DWORD)sizeof(buffer);
|
2018-06-03 04:52:56 +08:00
|
|
|
DWORD waitret = WaitForMultipleObjects(obj_count, objs,
|
|
|
|
FALSE, wait_timeout);
|
2004-04-26 15:50:51 +08:00
|
|
|
switch(waitret) {
|
2020-08-29 03:54:03 +08:00
|
|
|
|
2004-04-26 15:50:51 +08:00
|
|
|
case WAIT_TIMEOUT:
|
|
|
|
{
|
2010-02-03 00:25:07 +08:00
|
|
|
for(;;) {
|
2015-02-25 07:01:14 +08:00
|
|
|
if(data->set.is_fread_set) {
|
2017-03-31 20:20:13 +08:00
|
|
|
size_t n;
|
2011-08-15 05:26:09 +08:00
|
|
|
/* read from user-supplied method */
|
2024-01-25 22:43:14 +08:00
|
|
|
n = data->state.fread_func(buffer, 1, buf_size, data->state.in);
|
2017-03-31 20:20:13 +08:00
|
|
|
if(n == CURL_READFUNC_ABORT) {
|
2011-08-15 05:26:09 +08:00
|
|
|
keepon = FALSE;
|
2015-02-04 08:09:31 +08:00
|
|
|
result = CURLE_READ_ERROR;
|
2011-08-15 05:26:09 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2017-03-31 20:20:13 +08:00
|
|
|
if(n == CURL_READFUNC_PAUSE)
|
2011-08-15 05:26:09 +08:00
|
|
|
break;
|
|
|
|
|
2017-03-31 20:20:13 +08:00
|
|
|
if(n == 0) /* no bytes */
|
2011-08-15 05:26:09 +08:00
|
|
|
break;
|
|
|
|
|
2018-02-24 07:29:01 +08:00
|
|
|
/* fall through with number of bytes read */
|
|
|
|
readfile_read = (DWORD)n;
|
2004-04-26 15:50:51 +08:00
|
|
|
}
|
2011-08-15 05:26:09 +08:00
|
|
|
else {
|
|
|
|
/* read from stdin */
|
|
|
|
if(!PeekNamedPipe(stdin_handle, NULL, 0, NULL,
|
|
|
|
&readfile_read, NULL)) {
|
|
|
|
keepon = FALSE;
|
2015-02-04 08:09:31 +08:00
|
|
|
result = CURLE_READ_ERROR;
|
2011-08-15 05:26:09 +08:00
|
|
|
break;
|
|
|
|
}
|
2004-06-24 15:43:48 +08:00
|
|
|
|
2011-08-15 05:26:09 +08:00
|
|
|
if(!readfile_read)
|
|
|
|
break;
|
2004-06-24 15:43:48 +08:00
|
|
|
|
2024-01-25 22:43:14 +08:00
|
|
|
if(!ReadFile(stdin_handle, buffer, buf_size,
|
2011-08-15 05:26:09 +08:00
|
|
|
&readfile_read, NULL)) {
|
|
|
|
keepon = FALSE;
|
2015-02-04 08:09:31 +08:00
|
|
|
result = CURLE_READ_ERROR;
|
2011-08-15 05:26:09 +08:00
|
|
|
break;
|
|
|
|
}
|
2004-04-26 15:50:51 +08:00
|
|
|
}
|
2004-06-24 15:43:48 +08:00
|
|
|
|
2024-01-25 22:43:14 +08:00
|
|
|
result = send_telnet_data(data, buffer, readfile_read);
|
2015-02-04 08:09:31 +08:00
|
|
|
if(result) {
|
2008-06-04 02:03:11 +08:00
|
|
|
keepon = FALSE;
|
2009-02-27 16:53:10 +08:00
|
|
|
break;
|
|
|
|
}
|
2004-04-26 15:50:51 +08:00
|
|
|
}
|
2004-06-24 15:43:48 +08:00
|
|
|
}
|
2004-04-26 15:50:51 +08:00
|
|
|
break;
|
2004-06-24 15:43:48 +08:00
|
|
|
|
2004-04-26 15:50:51 +08:00
|
|
|
case WAIT_OBJECT_0 + 1:
|
2001-09-17 22:10:38 +08:00
|
|
|
{
|
2024-01-25 22:43:14 +08:00
|
|
|
if(!ReadFile(stdin_handle, buffer, buf_size,
|
2004-03-11 21:13:35 +08:00
|
|
|
&readfile_read, NULL)) {
|
2004-02-05 21:25:14 +08:00
|
|
|
keepon = FALSE;
|
2015-02-04 08:09:31 +08:00
|
|
|
result = CURLE_READ_ERROR;
|
2004-02-05 21:25:14 +08:00
|
|
|
break;
|
|
|
|
}
|
2004-06-24 15:43:48 +08:00
|
|
|
|
2024-01-25 22:43:14 +08:00
|
|
|
result = send_telnet_data(data, buffer, readfile_read);
|
2015-02-04 08:09:31 +08:00
|
|
|
if(result) {
|
2009-02-27 16:53:10 +08:00
|
|
|
keepon = FALSE;
|
|
|
|
break;
|
2001-09-17 22:10:38 +08:00
|
|
|
}
|
2004-02-05 21:25:14 +08:00
|
|
|
}
|
|
|
|
break;
|
2004-06-24 15:43:48 +08:00
|
|
|
|
2004-04-26 15:50:51 +08:00
|
|
|
case WAIT_OBJECT_0:
|
2020-08-29 03:54:03 +08:00
|
|
|
{
|
2014-04-19 21:18:19 +08:00
|
|
|
events.lNetworkEvents = 0;
|
2020-08-29 03:54:03 +08:00
|
|
|
if(WSAEnumNetworkEvents(sockfd, event_handle, &events) == SOCKET_ERROR) {
|
2016-12-14 08:29:44 +08:00
|
|
|
err = SOCKERRNO;
|
|
|
|
if(err != EINPROGRESS) {
|
2015-03-17 20:41:49 +08:00
|
|
|
infof(data, "WSAEnumNetworkEvents failed (%d)", err);
|
2004-02-05 21:25:14 +08:00
|
|
|
keepon = FALSE;
|
2015-02-04 08:09:31 +08:00
|
|
|
result = CURLE_READ_ERROR;
|
2009-03-11 12:15:33 +08:00
|
|
|
}
|
2009-03-11 12:45:18 +08:00
|
|
|
break;
|
2009-03-11 12:15:33 +08:00
|
|
|
}
|
|
|
|
if(events.lNetworkEvents & FD_READ) {
|
2009-03-12 10:12:05 +08:00
|
|
|
/* read data from network */
|
2024-02-14 19:09:32 +08:00
|
|
|
result = Curl_xfer_recv(data, buffer, sizeof(buffer), &nread);
|
2024-07-01 22:47:21 +08:00
|
|
|
/* read would have blocked. Loop again */
|
2015-02-04 08:09:31 +08:00
|
|
|
if(result == CURLE_AGAIN)
|
2009-03-12 10:12:05 +08:00
|
|
|
break;
|
|
|
|
/* returned not-zero, this an error */
|
2015-02-04 08:09:31 +08:00
|
|
|
else if(result) {
|
2009-03-12 10:12:05 +08:00
|
|
|
keepon = FALSE;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
/* returned zero but actually received 0 or less here,
|
|
|
|
the server closed the connection and we bail out */
|
|
|
|
else if(nread <= 0) {
|
|
|
|
keepon = FALSE;
|
|
|
|
break;
|
|
|
|
}
|
2009-03-11 12:15:33 +08:00
|
|
|
|
2024-01-25 22:43:14 +08:00
|
|
|
result = telrcv(data, (unsigned char *) buffer, nread);
|
2015-02-04 08:09:31 +08:00
|
|
|
if(result) {
|
2009-03-12 21:18:25 +08:00
|
|
|
keepon = FALSE;
|
|
|
|
break;
|
|
|
|
}
|
2009-03-11 12:15:33 +08:00
|
|
|
|
|
|
|
/* Negotiate if the peer has started negotiating,
|
2024-07-01 22:47:21 +08:00
|
|
|
otherwise do not. We do not want to speak telnet with
|
2009-03-11 12:15:33 +08:00
|
|
|
non-telnet servers, like POP or SMTP. */
|
|
|
|
if(tn->please_negotiate && !tn->already_negotiated) {
|
2021-01-18 18:56:50 +08:00
|
|
|
negotiate(data);
|
2009-03-11 12:15:33 +08:00
|
|
|
tn->already_negotiated = 1;
|
2001-09-17 22:10:38 +08:00
|
|
|
}
|
2004-02-05 21:25:14 +08:00
|
|
|
}
|
2009-03-11 12:15:33 +08:00
|
|
|
if(events.lNetworkEvents & FD_CLOSE) {
|
|
|
|
keepon = FALSE;
|
|
|
|
}
|
2020-08-29 03:54:03 +08:00
|
|
|
}
|
|
|
|
break;
|
2009-03-11 12:15:33 +08:00
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
if(data->set.timeout) {
|
2017-10-25 17:59:43 +08:00
|
|
|
now = Curl_now();
|
2017-10-23 18:05:49 +08:00
|
|
|
if(Curl_timediff(now, conn->created) >= data->set.timeout) {
|
2009-03-11 12:15:33 +08:00
|
|
|
failf(data, "Time-out");
|
2015-02-04 08:09:31 +08:00
|
|
|
result = CURLE_OPERATION_TIMEDOUT;
|
2009-03-11 12:15:33 +08:00
|
|
|
keepon = FALSE;
|
|
|
|
}
|
2001-09-17 22:10:38 +08:00
|
|
|
}
|
|
|
|
}
|
2004-03-03 21:32:56 +08:00
|
|
|
|
|
|
|
/* We called WSACreateEvent, so call WSACloseEvent */
|
2020-08-29 03:54:03 +08:00
|
|
|
if(!WSACloseEvent(event_handle)) {
|
2015-03-17 20:41:49 +08:00
|
|
|
infof(data, "WSACloseEvent failed (%d)", SOCKERRNO);
|
2004-03-03 21:32:56 +08:00
|
|
|
}
|
2001-09-17 22:10:38 +08:00
|
|
|
#else
|
2004-11-19 16:52:33 +08:00
|
|
|
pfd[0].fd = sockfd;
|
|
|
|
pfd[0].events = POLLIN;
|
2010-04-29 06:49:04 +08:00
|
|
|
|
2015-10-06 02:39:10 +08:00
|
|
|
if(data->set.is_fread_set) {
|
2010-04-29 06:49:04 +08:00
|
|
|
poll_cnt = 1;
|
|
|
|
interval_ms = 100; /* poll user-supplied read function */
|
|
|
|
}
|
|
|
|
else {
|
2012-01-04 19:21:38 +08:00
|
|
|
/* really using fread, so infile is a FILE* */
|
2015-10-06 02:39:10 +08:00
|
|
|
pfd[1].fd = fileno((FILE *)data->state.in);
|
2010-04-29 06:49:04 +08:00
|
|
|
pfd[1].events = POLLIN;
|
|
|
|
poll_cnt = 2;
|
|
|
|
interval_ms = 1 * 1000;
|
2024-04-24 14:07:34 +08:00
|
|
|
if(pfd[1].fd < 0) {
|
|
|
|
failf(data, "cannot read input");
|
|
|
|
result = CURLE_RECV_ERROR;
|
|
|
|
keepon = FALSE;
|
|
|
|
}
|
2010-04-29 06:49:04 +08:00
|
|
|
}
|
1999-12-29 22:20:26 +08:00
|
|
|
|
2007-11-05 17:45:09 +08:00
|
|
|
while(keepon) {
|
2023-05-23 18:48:58 +08:00
|
|
|
DEBUGF(infof(data, "telnet_do, poll %d fds", poll_cnt));
|
2024-06-03 04:30:52 +08:00
|
|
|
switch(Curl_poll(pfd, (unsigned int)poll_cnt, interval_ms)) {
|
2004-10-06 15:50:18 +08:00
|
|
|
case -1: /* error, stop reading */
|
2001-01-25 20:22:17 +08:00
|
|
|
keepon = FALSE;
|
|
|
|
continue;
|
2004-10-06 15:50:18 +08:00
|
|
|
case 0: /* timeout */
|
2010-04-29 06:49:04 +08:00
|
|
|
pfd[0].revents = 0;
|
|
|
|
pfd[1].revents = 0;
|
2023-12-08 21:05:09 +08:00
|
|
|
FALLTHROUGH();
|
2004-10-06 15:50:18 +08:00
|
|
|
default: /* read! */
|
2004-11-19 16:52:33 +08:00
|
|
|
if(pfd[0].revents & POLLIN) {
|
2009-03-12 10:12:05 +08:00
|
|
|
/* read data from network */
|
2024-02-14 19:09:32 +08:00
|
|
|
result = Curl_xfer_recv(data, buffer, sizeof(buffer), &nread);
|
2024-07-01 22:47:21 +08:00
|
|
|
/* read would have blocked. Loop again */
|
2015-02-04 08:09:31 +08:00
|
|
|
if(result == CURLE_AGAIN)
|
2009-03-12 10:12:05 +08:00
|
|
|
break;
|
|
|
|
/* returned not-zero, this an error */
|
2017-03-10 21:28:37 +08:00
|
|
|
if(result) {
|
2009-03-12 10:12:05 +08:00
|
|
|
keepon = FALSE;
|
2022-11-11 18:45:34 +08:00
|
|
|
/* TODO: in test 1452, macOS sees a ECONNRESET sometimes?
|
|
|
|
* Is this the telnet test server not shutting down the socket
|
|
|
|
* in a clean way? Seems to be timing related, happens more
|
|
|
|
* on slow debug build */
|
|
|
|
if(data->state.os_errno == ECONNRESET) {
|
2023-05-23 18:48:58 +08:00
|
|
|
DEBUGF(infof(data, "telnet_do, unexpected ECONNRESET on recv"));
|
2022-11-11 18:45:34 +08:00
|
|
|
}
|
2009-03-12 10:12:05 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
/* returned zero but actually received 0 or less here,
|
|
|
|
the server closed the connection and we bail out */
|
|
|
|
else if(nread <= 0) {
|
2001-01-31 23:05:44 +08:00
|
|
|
keepon = FALSE;
|
|
|
|
break;
|
|
|
|
}
|
2001-01-25 20:22:17 +08:00
|
|
|
|
2010-04-29 06:49:04 +08:00
|
|
|
total_dl += nread;
|
2023-09-23 17:20:00 +08:00
|
|
|
result = Curl_pgrsSetDownloadCounter(data, total_dl);
|
|
|
|
if(!result)
|
2024-01-25 22:43:14 +08:00
|
|
|
result = telrcv(data, (unsigned char *)buffer, nread);
|
2015-02-04 08:09:31 +08:00
|
|
|
if(result) {
|
2009-03-12 21:18:25 +08:00
|
|
|
keepon = FALSE;
|
|
|
|
break;
|
|
|
|
}
|
2001-02-21 01:35:51 +08:00
|
|
|
|
|
|
|
/* Negotiate if the peer has started negotiating,
|
2024-07-01 22:47:21 +08:00
|
|
|
otherwise do not. We do not want to speak telnet with
|
2001-02-21 01:35:51 +08:00
|
|
|
non-telnet servers, like POP or SMTP. */
|
2001-03-05 21:59:43 +08:00
|
|
|
if(tn->please_negotiate && !tn->already_negotiated) {
|
2021-01-18 18:56:50 +08:00
|
|
|
negotiate(data);
|
2001-03-05 21:59:43 +08:00
|
|
|
tn->already_negotiated = 1;
|
2001-02-21 01:35:51 +08:00
|
|
|
}
|
2001-01-31 23:05:44 +08:00
|
|
|
}
|
2010-04-29 06:49:04 +08:00
|
|
|
|
|
|
|
nread = 0;
|
2011-04-20 21:17:42 +08:00
|
|
|
if(poll_cnt == 2) {
|
2012-01-04 19:21:38 +08:00
|
|
|
if(pfd[1].revents & POLLIN) { /* read from in file */
|
2024-01-25 22:43:14 +08:00
|
|
|
nread = read(pfd[1].fd, buffer, sizeof(buffer));
|
2010-04-29 06:49:04 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
/* read from user-supplied method */
|
2024-01-25 22:43:14 +08:00
|
|
|
nread = (int)data->state.fread_func(buffer, 1, sizeof(buffer),
|
2015-10-06 02:39:10 +08:00
|
|
|
data->state.in);
|
2011-04-20 21:17:42 +08:00
|
|
|
if(nread == CURL_READFUNC_ABORT) {
|
2010-04-29 06:49:04 +08:00
|
|
|
keepon = FALSE;
|
|
|
|
break;
|
|
|
|
}
|
2011-04-20 21:17:42 +08:00
|
|
|
if(nread == CURL_READFUNC_PAUSE)
|
2010-04-29 06:49:04 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2011-04-20 21:17:42 +08:00
|
|
|
if(nread > 0) {
|
2024-01-25 22:43:14 +08:00
|
|
|
result = send_telnet_data(data, buffer, nread);
|
2015-02-04 08:09:31 +08:00
|
|
|
if(result) {
|
2010-04-29 06:49:04 +08:00
|
|
|
keepon = FALSE;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
total_ul += nread;
|
|
|
|
Curl_pgrsSetUploadCounter(data, total_ul);
|
|
|
|
}
|
2011-04-20 21:17:42 +08:00
|
|
|
else if(nread < 0)
|
2010-04-29 06:49:04 +08:00
|
|
|
keepon = FALSE;
|
|
|
|
|
|
|
|
break;
|
|
|
|
} /* poll switch statement */
|
|
|
|
|
2002-10-08 21:03:26 +08:00
|
|
|
if(data->set.timeout) {
|
2017-10-25 17:59:43 +08:00
|
|
|
now = Curl_now();
|
2017-10-23 18:05:49 +08:00
|
|
|
if(Curl_timediff(now, conn->created) >= data->set.timeout) {
|
2002-10-08 21:03:26 +08:00
|
|
|
failf(data, "Time-out");
|
2015-02-04 08:09:31 +08:00
|
|
|
result = CURLE_OPERATION_TIMEDOUT;
|
2002-10-08 21:03:26 +08:00
|
|
|
keepon = FALSE;
|
|
|
|
}
|
|
|
|
}
|
2010-04-29 06:49:04 +08:00
|
|
|
|
2021-01-18 18:56:50 +08:00
|
|
|
if(Curl_pgrsUpdate(data)) {
|
2015-02-04 08:09:31 +08:00
|
|
|
result = CURLE_ABORTED_BY_CALLBACK;
|
2011-04-20 21:17:42 +08:00
|
|
|
break;
|
2010-04-29 06:49:04 +08:00
|
|
|
}
|
2001-01-25 20:22:17 +08:00
|
|
|
}
|
2001-09-17 22:10:38 +08:00
|
|
|
#endif
|
2001-01-31 23:05:44 +08:00
|
|
|
/* mark this as "no further transfer wanted" */
|
2024-06-10 19:32:13 +08:00
|
|
|
Curl_xfer_setup_nop(data);
|
2002-10-08 21:03:26 +08:00
|
|
|
|
2015-02-04 08:09:31 +08:00
|
|
|
return result;
|
1999-12-29 22:20:26 +08:00
|
|
|
}
|
2002-06-11 19:13:01 +08:00
|
|
|
#endif
|