亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? telnetd.c

?? 經典的unix下telnetd代碼
?? C
?? 第 1 頁 / 共 3 頁
字號:
/* * Copyright (c) 1989, 1993 *	The Regents of the University of California.  All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright *    notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright *    notice, this list of conditions and the following disclaimer in the *    documentation and/or other materials provided with the distribution. * 3. Neither the name of the University nor the names of its contributors *    may be used to endorse or promote products derived from this software *    without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. */#include "telnetd.h"#include <sys/socket.h>#include <netdb.h>#include <fcntl.h>#include <syslog.h>#include <unistd.h>#include <sys/ioctl.h>/* RCSID("$KTH: telnetd.c,v 1.64 2001/02/08 16:06:27 assar Exp $"); */#ifdef _SC_CRAY_SECURE_SYS#include <sys/sysv.h>#include <sys/secdev.h>#include <sys/secparm.h>#include <sys/usrv.h>int	secflag;char	tty_dev[16];struct	secdev dv;struct	sysv sysv;struct	socksec ss;#endif	/* _SC_CRAY_SECURE_SYS */#ifndef ENCRYPTION#define	encrypt_delay()	0#endif#ifdef AUTHENTICATIONint	auth_level = 0;#endifextern	int utmp_len;int	registerd_host_only = 0;#ifdef	STREAMSPTY# include <stropts.h># include <termios.h>#ifdef HAVE_SYS_UIO_H#include <sys/uio.h>#endif /* HAVE_SYS_UIO_H */#ifdef HAVE_SYS_STREAM_H#include <sys/stream.h>#endif#ifdef _AIX#include <sys/termio.h>#endif# ifdef HAVE_SYS_STRTTY_H# include <sys/strtty.h># endif# ifdef HAVE_SYS_STR_TTY_H# include <sys/str_tty.h># endif/* make sure we don't get the bsd version *//* what is this here for? solaris? /joda */# ifdef HAVE_SYS_TTY_H# include "/usr/include/sys/tty.h"# endif# ifdef HAVE_SYS_PTYVAR_H# include <sys/ptyvar.h># endif/* * Because of the way ptyibuf is used with streams messages, we need * ptyibuf+1 to be on a full-word boundary.  The following weirdness * is simply to make that happen. */long	ptyibufbuf[BUFSIZ/sizeof(long)+1];char	*ptyibuf = ((char *)&ptyibufbuf[1])-1;char	*ptyip = ((char *)&ptyibufbuf[1])-1;char	ptyibuf2[BUFSIZ];unsigned char ctlbuf[BUFSIZ];struct	strbuf strbufc, strbufd;int readstream(int, char*, int);#else	/* ! STREAMPTY *//* * I/O data buffers, * pointers, and counters. */char	ptyibuf[BUFSIZ], *ptyip = ptyibuf;char	ptyibuf2[BUFSIZ];#endif /* ! STREAMPTY */int	hostinfo = 1;			/* do we print login banner? */#ifdef	_CRAYextern int      newmap; /* nonzero if \n maps to ^M^J */int	lowpty = 0, highpty;	/* low, high pty numbers */#endif /* CRAY */int debug = 0;int keepalive = 1;char *progname;char *gettyent = "default";char *gettytab[2] = { "/etc/gettytab", NULL };static void usage (void);/* * The string to pass to getopt().  We do it this way so * that only the actual options that we support will be * passed off to getopt(). */char valid_opts[] = "Bd:g:hklnS:u:UL:y"#ifdef AUTHENTICATION		    "a:X:z"#endif#ifdef DIAGNOSTICS		    "D:"#endif#ifdef _CRAY		    "r:"#endif		    ;static void doit(struct sockaddr*, int);intmain(int argc, char **argv){    struct sockaddr_storage __ss;    struct sockaddr *sa = (struct sockaddr *)&__ss;    int on = 1;    socklen_t sa_size;    int ch;#if	defined(IPPROTO_IP) && defined(IP_TOS)    int tos = -1;#endif#ifdef ENCRYPTION    extern int des_check_key;    des_check_key = 1;	/* Kludge for Mac NCSA telnet 2.6 /bg */#endif    pfrontp = pbackp = ptyobuf;    netip = netibuf;    nfrontp = nbackp = netobuf;    progname = *argv;#ifdef ENCRYPTION    nclearto = 0;#endif#ifdef _CRAY    /*     * Get number of pty's before trying to process options,     * which may include changing pty range.     */    highpty = getnpty();#endif /* CRAY */    while ((ch = getopt(argc, argv, valid_opts)) != -1) {	switch(ch) {#ifdef	AUTHENTICATION	case 'a':	    /*	     * Check for required authentication level	     */	    if (strcmp(optarg, "debug") == 0) {		auth_debug_mode = 1;	    } else if (strcasecmp(optarg, "none") == 0) {		auth_level = 0;	    } else if (strcasecmp(optarg, "other") == 0) {		auth_level = AUTH_OTHER;	    } else if (strcasecmp(optarg, "user") == 0) {		auth_level = AUTH_USER;	    } else if (strcasecmp(optarg, "valid") == 0) {		auth_level = AUTH_VALID;	    } else if (strcasecmp(optarg, "off") == 0) {		/*		 * This hack turns off authentication		 */		auth_level = -1;	    } else {		fprintf(stderr,			"telnetd: unknown authorization level for -a\n");	    }	    break;#endif	/* AUTHENTICATION */	case 'B': /* BFTP mode is not supported any more */	    break;	case 'd':	    if (strcmp(optarg, "ebug") == 0) {		debug++;		break;	    }	    usage();	    /* NOTREACHED */	    break;#ifdef DIAGNOSTICS	case 'D':	    /*	     * Check for desired diagnostics capabilities.	     */	    if (!strcmp(optarg, "report")) {		diagnostic |= TD_REPORT|TD_OPTIONS;	    } else if (!strcmp(optarg, "exercise")) {		diagnostic |= TD_EXERCISE;	    } else if (!strcmp(optarg, "netdata")) {		diagnostic |= TD_NETDATA;	    } else if (!strcmp(optarg, "ptydata")) {		diagnostic |= TD_PTYDATA;	    } else if (!strcmp(optarg, "options")) {		diagnostic |= TD_OPTIONS;	    } else {		usage();		/* NOT REACHED */	    }	    break;#endif /* DIAGNOSTICS */	case 'g':	    gettyent = optarg;	    break;	case 'h':	    hostinfo = 0;	    break;	case 'k': /* Linemode is not supported any more */	case 'l':	    break;	case 'n':	    keepalive = 0;	    break;#ifdef _CRAY	case 'r':	    {		char *strchr();		char *c;		/*		 * Allow the specification of alterations		 * to the pty search range.  It is legal to		 * specify only one, and not change the		 * other from its default.		 */		c = strchr(optarg, '-');		if (c) {		    *c++ = '\0';		    highpty = atoi(c);		}		if (*optarg != '\0')		    lowpty = atoi(optarg);		if ((lowpty > highpty) || (lowpty < 0) ||		    (highpty > 32767)) {		    usage();		    /* NOT REACHED */		}		break;	    }#endif	/* CRAY */	case 'S':#ifdef	HAVE_PARSETOS	    if ((tos = parsetos(optarg, "tcp")) < 0)		fprintf(stderr, "%s%s%s\n",			"telnetd: Bad TOS argument '", optarg,			"'; will try to use default TOS");#else	    fprintf(stderr, "%s%s\n", "TOS option unavailable; ",		    "-S flag not supported\n");#endif	    break;	case 'u': {	    char *eptr;	    utmp_len = strtol(optarg, &eptr, 0);	    if (optarg == eptr)		fprintf(stderr, "telnetd: unknown utmp len (%s)\n", optarg);	    break;	}	case 'U':	    registerd_host_only = 1;	    break;#ifdef	AUTHENTICATION	case 'X':	    /*	     * Check for invalid authentication types	     */	    auth_disable_name(optarg);	    break;#endif	case 'y':	    no_warn = 1;	    break;#ifdef AUTHENTICATION	case 'z':	    log_unauth = 1;	    break;#endif	/* AUTHENTICATION */	case 'L':	    new_login = optarg;	    break;				default:	    fprintf(stderr, "telnetd: %c: unknown option\n", ch);	    /* FALLTHROUGH */	case '?':	    usage();	    /* NOTREACHED */	}    }    argc -= optind;    argv += optind;    if (debug) {	int port = 0;	struct servent *sp;	if (argc > 1) {	    usage ();	} else if (argc == 1) {	    sp = getservbyname (*argv, "tcp");	    if (sp)		port = sp->s_port;	    else		port = htons(atoi(*argv));	} else {	    sp = getservbyname ("telnet", "tcp");	    port = sp ? sp->s_port : htons(23);	}	mini_inetd (port);    } else if (argc > 0) {	usage();	/* NOT REACHED */    }#ifdef _SC_CRAY_SECURE_SYS    secflag = sysconf(_SC_CRAY_SECURE_SYS);    /*     *	Get socket's security label     */    if (secflag)  {	socklen_t szss = sizeof(ss);	int sock_multi;	socklen_t szi = sizeof(int);	memset(&dv, 0, sizeof(dv));	if (getsysv(&sysv, sizeof(struct sysv)) != 0) 	    fatalperror(net, "getsysv");	/*	 *	Get socket security label and set device values	 *	   {security label to be set on ttyp device}	 */#ifdef SO_SEC_MULTI			/* 8.0 code */	if ((getsockopt(0, SOL_SOCKET, SO_SECURITY,			(void *)&ss, &szss) < 0) ||	    (getsockopt(0, SOL_SOCKET, SO_SEC_MULTI,			(void *)&sock_multi, &szi) < 0)) 	    fatalperror(net, "getsockopt");	else {	    dv.dv_actlvl = ss.ss_actlabel.lt_level;	    dv.dv_actcmp = ss.ss_actlabel.lt_compart;	    if (!sock_multi) {		dv.dv_minlvl = dv.dv_maxlvl = dv.dv_actlvl;		dv.dv_valcmp = dv.dv_actcmp;	    } else {		dv.dv_minlvl = ss.ss_minlabel.lt_level;		dv.dv_maxlvl = ss.ss_maxlabel.lt_level;		dv.dv_valcmp = ss.ss_maxlabel.lt_compart;	    }	    dv.dv_devflg = 0;	}#else /* SO_SEC_MULTI */		/* 7.0 code */	if (getsockopt(0, SOL_SOCKET, SO_SECURITY,		       (void *)&ss, &szss) >= 0) {	    dv.dv_actlvl = ss.ss_slevel;	    dv.dv_actcmp = ss.ss_compart;	    dv.dv_minlvl = ss.ss_minlvl;	    dv.dv_maxlvl = ss.ss_maxlvl;	    dv.dv_valcmp = ss.ss_maxcmp;	}#endif /* SO_SEC_MULTI */    }#endif	/* _SC_CRAY_SECURE_SYS */    openlog("telnetd", LOG_PID | LOG_ODELAY, LOG_DAEMON);    sa_size = sizeof (__ss);    if (getpeername(STDIN_FILENO, sa, &sa_size) < 0) {	fprintf(stderr, "%s: ", progname);	perror("getpeername");	_exit(1);    }    if (keepalive &&	setsockopt(STDIN_FILENO, SOL_SOCKET, SO_KEEPALIVE,		   (void *)&on, sizeof (on)) < 0) {	syslog(LOG_WARNING, "setsockopt (SO_KEEPALIVE): %m");    }#if	defined(IPPROTO_IP) && defined(IP_TOS) && defined(HAVE_SETSOCKOPT)    {# ifdef HAVE_GETTOSBYNAME	struct tosent *tp;	if (tos < 0 && (tp = gettosbyname("telnet", "tcp")))	    tos = tp->t_tos;# endif	if (tos < 0)	    tos = 020;	/* Low Delay bit */	if (tos	    && sa->sa_family == AF_INET	    && (setsockopt(STDIN_FILENO, IPPROTO_IP, IP_TOS,			   (void *)&tos, sizeof(tos)) < 0)	    && (errno != ENOPROTOOPT) )	    syslog(LOG_WARNING, "setsockopt (IP_TOS): %m");    }#endif	/* defined(IPPROTO_IP) && defined(IP_TOS) */    net = STDIN_FILENO;    doit(sa, sa_size);    /* NOTREACHED */    return 0;}  /* end of main */static voidusage(void){    fprintf(stderr, "Usage: telnetd");#ifdef	AUTHENTICATION    fprintf(stderr, " [-a (debug|other|user|valid|off|none)]\n\t");#endif    fprintf(stderr, " [-debug]");#ifdef DIAGNOSTICS    fprintf(stderr, " [-D (options|report|exercise|netdata|ptydata)]\n\t");

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
最新欧美精品一区二区三区| 日韩欧美国产系列| 狠狠色丁香久久婷婷综合_中| 亚洲午夜一区二区| 一区二区三区高清不卡| 一区二区三区四区不卡在线| 亚洲在线观看免费| 性欧美大战久久久久久久久| 亚洲va天堂va国产va久| 爽爽淫人综合网网站| 亚洲超碰精品一区二区| 蜜臀av亚洲一区中文字幕| 久久99久久99小草精品免视看| 国产原创一区二区三区| 国产大陆精品国产| 色婷婷精品大视频在线蜜桃视频| 欧美在线你懂得| 91精品久久久久久久久99蜜臂| 欧美xxxx老人做受| 中文乱码免费一区二区| 一区二区欧美国产| 久久精品久久综合| 国产91丝袜在线播放0| 91免费版pro下载短视频| 欧美日韩国产中文| 久久美女艺术照精彩视频福利播放 | 亚洲天堂中文字幕| 亚洲国产成人av网| 久久99蜜桃精品| 色综合色综合色综合| 91精品欧美福利在线观看| 久久久久88色偷偷免费| 亚洲精品欧美二区三区中文字幕| 视频一区二区不卡| 成人国产亚洲欧美成人综合网| 欧美视频在线不卡| 欧美激情一区二区三区四区| 亚洲第一成人在线| 国产99精品国产| 在线观看91精品国产麻豆| 欧美国产一区视频在线观看| 午夜激情久久久| 99麻豆久久久国产精品免费| 欧美一级久久久久久久大片| 亚洲欧美日韩综合aⅴ视频| 免费一级欧美片在线观看| 91丨porny丨首页| 久久久久88色偷偷免费| 日韩成人精品在线| 在线亚洲免费视频| 日韩一区在线看| 国产一本一道久久香蕉| 在线播放91灌醉迷j高跟美女| 自拍偷拍国产精品| 国产一区二区免费看| 欧美一区日本一区韩国一区| 亚洲视频在线一区观看| 成人免费观看男女羞羞视频| 精品少妇一区二区三区视频免付费| 亚洲国产日产av| 色婷婷亚洲精品| 国产精品毛片久久久久久| 精品无码三级在线观看视频| 51精品国自产在线| 亚洲国产精品麻豆| 欧美性xxxxxxxx| 亚洲激情网站免费观看| 91香蕉视频污在线| 国产精品二区一区二区aⅴ污介绍| 国产又黄又大久久| 精品国产自在久精品国产| 美女尤物国产一区| 欧美xxxxx裸体时装秀| 美女mm1313爽爽久久久蜜臀| 91精品国产综合久久久久久| 日韩电影免费在线| 欧美一区二区网站| 麻豆成人在线观看| 久久久久久免费| 国产成人一级电影| 国产欧美一区二区三区鸳鸯浴 | 中文字幕乱码一区二区免费| 国产精品羞羞答答xxdd| 2024国产精品| 国产成人免费在线| 亚洲欧洲美洲综合色网| 91啪亚洲精品| 亚洲高清不卡在线| 91麻豆精品国产91久久久使用方法| 日韩国产精品久久久| 欧美成人一区二区三区片免费| 国产一区二区三区在线观看免费 | 日韩一区二区电影在线| 久久99国产精品免费网站| 久久蜜桃av一区精品变态类天堂| 成人黄色片在线观看| 亚洲精品成人在线| 欧美一级日韩一级| 成人午夜在线播放| 亚洲一区在线看| 亚洲精品一线二线三线无人区| 粉嫩一区二区三区在线看| 亚洲同性同志一二三专区| 欧美日本在线播放| 国产馆精品极品| 亚洲综合色成人| 精品国产免费视频| 91国产精品成人| 黑人巨大精品欧美一区| 日韩理论在线观看| 日韩一级在线观看| 97精品久久久午夜一区二区三区 | 欧洲视频一区二区| 韩国三级在线一区| 一片黄亚洲嫩模| 久久欧美中文字幕| 在线观看亚洲专区| 国产成人在线视频免费播放| 亚洲高清一区二区三区| 国产视频在线观看一区二区三区 | 一区二区三区精密机械公司| 精品日韩一区二区| 欧美色图在线观看| 成人丝袜18视频在线观看| 毛片av一区二区| 亚洲国产一区二区视频| 中文一区在线播放| 欧美电影免费观看高清完整版在| 色狠狠av一区二区三区| 国产经典欧美精品| 久久国产精品无码网站| 天天综合天天综合色| 亚洲色欲色欲www| 欧美国产1区2区| 亚洲精品一区二区在线观看| 欧美剧情电影在线观看完整版免费励志电影 | 色诱亚洲精品久久久久久| 久久精品国产一区二区| 亚洲国产精品久久人人爱| 亚洲欧美日韩国产成人精品影院| 国产午夜精品理论片a级大结局 | 亚洲嫩草精品久久| 亚洲国产精品t66y| 国产日韩精品视频一区| 精品美女一区二区| 欧美一区二区播放| 日韩一区二区精品在线观看| 欧美精品v日韩精品v韩国精品v| 色8久久人人97超碰香蕉987| 91社区在线播放| 日本高清不卡一区| 色综合一个色综合亚洲| 色综合久久综合中文综合网| 国产精品77777| 国产一区二区不卡老阿姨| 免费精品99久久国产综合精品| 亚洲激情男女视频| 一区二区三区日韩| 亚洲综合男人的天堂| 五月天精品一区二区三区| 香蕉影视欧美成人| 久久精品国产久精国产| 精品伊人久久久久7777人| 激情综合色播五月| 国产乱国产乱300精品| 高清免费成人av| 不卡电影一区二区三区| 色伊人久久综合中文字幕| 欧美在线视频你懂得| 欧美日韩二区三区| 欧美大片在线观看一区二区| 国产日韩欧美在线一区| 中文字幕亚洲一区二区av在线| 亚洲美女屁股眼交3| 爽好久久久欧美精品| 国产美女久久久久| 日本乱码高清不卡字幕| 91精品综合久久久久久| 国产亚洲婷婷免费| 一区二区高清免费观看影视大全| 日韩1区2区日韩1区2区| 国产高清成人在线| 欧美亚洲国产bt| 久久精品男人天堂av| 亚洲乱码一区二区三区在线观看| 亚洲成av人在线观看| 韩国av一区二区三区四区| 99国产精品久久久久久久久久久 | 国产一区激情在线| 日本精品免费观看高清观看| 91麻豆精品91久久久久同性| 久久精品一区二区三区不卡牛牛| 中文字幕一区二区三区不卡| 日本欧美加勒比视频| 不卡电影免费在线播放一区| 91精品国产入口在线| 最新不卡av在线| 激情图片小说一区| 欧美三级午夜理伦三级中视频| www激情久久|