Radix cross Linux

The main Radix cross Linux repository contains the build scripts of packages, which have the most complete and common functionality for desktop machines

452 Commits   2 Branches   1 Tag
Index: create.patch.sh
===================================================================
--- create.patch.sh	(nonexistent)
+++ create.patch.sh	(revision 5)
@@ -0,0 +1,15 @@
+#!/bin/sh
+
+VERSION=0.17
+
+tar --files-from=file.list -xzvf ../netkit-telnet-$VERSION.tar.gz
+mv netkit-telnet-$VERSION netkit-telnet-$VERSION-orig
+
+cp -rf ./netkit-telnet-$VERSION-new ./netkit-telnet-$VERSION
+
+diff --unified -Nr  netkit-telnet-$VERSION-orig  netkit-telnet-$VERSION > netkit-telnet-$VERSION-telnetd.patch
+
+mv netkit-telnet-$VERSION-telnetd.patch ../patches
+
+rm -rf ./netkit-telnet-$VERSION
+rm -rf ./netkit-telnet-$VERSION-orig

Property changes on: create.patch.sh
___________________________________________________________________
Added: svn:executable
## -0,0 +1 ##
+*
\ No newline at end of property
Index: file.list
===================================================================
--- file.list	(nonexistent)
+++ file.list	(revision 5)
@@ -0,0 +1,4 @@
+netkit-telnet-0.17/configure
+netkit-telnet-0.17/telnetd/state.c
+netkit-telnet-0.17/telnetd/telnetd.c
+netkit-telnet-0.17/telnetd/utility.c
Index: netkit-telnet-0.17-new/configure
===================================================================
--- netkit-telnet-0.17-new/configure	(nonexistent)
+++ netkit-telnet-0.17-new/configure	(revision 5)
@@ -0,0 +1,572 @@
+#!/bin/sh
+#
+# This file was generated by confgen version 2.
+# Do not edit.
+#
+
+PREFIX='/usr'
+#EXECPREFIX='$PREFIX'
+INSTALLROOT=''
+BINMODE='755'
+#DAEMONMODE='$BINMODE'
+MANMODE='644'
+
+while [ x$1 != x ]; do case $1 in
+
+	--help)
+	cat <<EOF
+Usage: configure [options]
+    --help                Show this message
+    --with-debug          Enable debugging
+    --prefix=path         Prefix for location of files [/usr]
+    --exec-prefix=path    Location for arch-depedent files [prefix]
+    --installroot=root    Top of filesystem tree to install in [/]
+    --binmode=mode        Mode for binaries [755]
+    --daemonmode=mode     Mode for daemon binaries [same as binmode]
+    --manmode=mode        Mode for manual pages [644]
+    --with-c-compiler=cc  Program for compiling C source [guessed]
+    --with-c++-compiler=cc Program for compiling C++ source [guessed]
+EOF
+	exit 0;;
+	--verbose) ;;
+	--quiet) ;;
+
+	--subdir) . ../configure.defs;;
+
+	--with-debug|--debug) DEBUG=1;;
+	--prefix=*) PREFIX=`echo $1 | sed 's/^[^=]*=//'` ;;
+	--exec-prefix=*) EXECPREFIX=`echo $1 | sed 's/^[^=]*=//'` ;;
+	--installroot=*) INSTALLROOT=`echo $1 | sed 's/^[^=]*=//'` ;;
+	--binmode=*) BINMODE=`echo $1 | sed 's/^[^=]*=//'` ;;
+	--daemonmode=*) DAEMONMODE=`echo $1 | sed 's/^[^=]*=//'` ;;
+	--manmode=*) MANMODE=`echo $1 | sed 's/^[^=]*=//'` ;;
+	--with-c-compiler=*) CC=`echo $1 | sed 's/^[^=]*=//'` ;;
+	--with-c++-compiler=*) CXX=`echo $1 | sed 's/^[^=]*=//'` ;;
+	*) echo "Unrecognized option: $1"; exit 1;;
+esac 
+shift
+done
+
+if [ x$EXECPREFIX = x ]; then 
+	EXECPREFIX="$PREFIX"
+fi
+
+if [ x$DAEMONMODE = x ]; then 
+	DAEMONMODE="$BINMODE"
+fi
+
+BINDIR="$EXECPREFIX/bin"
+SBINDIR="$EXECPREFIX/sbin"
+MANDIR="$PREFIX/share/man"
+
+echo "Directories: $BINDIR $SBINDIR $MANDIR "
+
+if [ x$INSTALLROOT != x ]; then
+    echo "Installing in chroot tree rooted at $INSTALLROOT"
+fi
+
+##################################################
+
+WARNINGS='-Wall -W -Wno-unused-variable -Wno-unused-parameter -Wno-sign-compare -Wno-implicit-int -Wpointer-arith -Wbad-function-cast -Wcast-qual -Wno-strict-prototypes -Wno-missing-prototypes -Wno-missing-declarations -Wno-missing-field-initializers -Wno-pointer-sign -Wno-nested-externs -Winline '
+
+cat << EOF > __conftest.c
+    int main() { int class=0; return class; }
+EOF
+
+if [ x"$CC" = x ]; then
+    echo -n 'Looking for a C compiler... '
+    for TRY in egcs gcc g++ CC c++ cc; do
+       (
+           $TRY __conftest.c -o __conftest || exit 1;
+#           ./__conftest || exit 1;
+       ) >/dev/null 2>&1 || continue;
+       CC=$TRY
+       break;
+    done
+    if [ x"$CC" = x ]; then
+        echo 'failed.'
+        echo 'Cannot find a C compiler. Run configure with --with-c-compiler.'
+        rm -f __conftest*
+        exit
+    fi
+    echo "$CC"
+else
+    echo -n 'Checking if C compiler works... '
+    if (
+          $CC __conftest.c -o __conftest || exit 1
+#          ./__conftest || exit 1
+       ) >/dev/null 2>&1; then
+         echo 'yes'
+     else
+         echo 'no'
+         echo 'Compiler '"$CC"' does not exist or cannot compile C; try another.'
+         rm -f __conftest*
+         exit
+     fi
+fi
+
+echo -n "Checking if $CC accepts gcc warnings... "
+if (
+    $CC $WARNINGS __conftest.c -o __conftest || exit 1
+   ) >/dev/null 2>&1; then
+     echo 'yes'
+     CC_WARNINGS=1
+else
+     echo 'no'
+fi
+
+cat << EOF > __conftest.cc
+    template <class T> class fnord { public: T x; fnord(T y) { x=y; }};
+    int main() { fnord<int> a(0); return a.x; }
+EOF
+
+if [ x"$CXX" = x ]; then
+    echo -n 'Looking for a C++ compiler... '
+    for TRY in egcs gcc g++ CC c++ cc; do
+       (
+           $TRY __conftest.cc -o __conftest || exit 1;
+#           ./__conftest || exit 1;
+       ) >/dev/null 2>&1 || continue;
+       CXX=$TRY
+       break;
+    done
+    if [ x"$CXX" = x ]; then
+        echo 'failed.'
+        echo 'Cannot find a C++ compiler. Run configure with --with-cpp-compiler.'
+        rm -f __conftest*
+        exit
+    fi
+    echo "$CXX"
+else
+    echo -n 'Checking if C++ compiler works... '
+    if (
+          $CXX __conftest.cc -o __conftest || exit 1
+#          ./__conftest || exit 1
+       ) >/dev/null 2>&1; then
+         echo 'yes'
+     else
+         echo 'no'
+         echo 'Compiler '"$CXX"' does not exist or cannot compile C++; try another.'
+         rm -f __conftest*
+         exit
+     fi
+fi
+
+echo -n "Checking if $CXX accepts gcc warnings... "
+if (
+    $CXX $WARNINGS __conftest.cc -o __conftest || exit 1
+   ) >/dev/null 2>&1; then
+     echo 'yes'
+     CXX_WARNINGS=1
+else
+     echo 'no'
+fi
+
+if [ x$DEBUG = x ]; then
+    echo -n "Checking if $CC accepts -O2... "
+    if (
+         $CC -O2 __conftest.c -o __conftest
+       ) >/dev/null 2>&1; then
+         echo 'yes'
+         CFLAGS="$CFLAGS -O2"
+    else
+         echo 'no'
+         echo -n "Checking if $CC accepts -O... "
+         if (
+              $CC -O __conftest.c -o __conftest
+            ) >/dev/null 2>&1; then
+              echo 'yes'
+              CFLAGS="$CFLAGS -O"
+         else
+              echo 'no'
+         fi
+    fi
+
+else
+    echo -n "Checking if $CC accepts -g... "
+    if (
+         $CC -g __conftest.c -o __conftest
+       ) >/dev/null 2>&1; then
+         echo 'yes'
+         CFLAGS="$CFLAGS -g"
+    else
+         echo 'no'
+    fi
+
+fi
+
+if [ x"$CC" != x"$CXX" ]; then
+    if [ x$DEBUG = x ]; then
+        echo -n "Checking if $CXX accepts -O2... "
+        if (
+             $CXX -O2 __conftest.cc -o __conftest
+           ) >/dev/null 2>&1; then
+             echo 'yes'
+             CXXFLAGS="$CXXFLAGS -O2"
+        else
+             echo 'no'
+             echo -n "Checking if $CXX accepts -O... "
+             if (
+                  $CXX -O __conftest.cc -o __conftest
+                ) >/dev/null 2>&1; then
+                  echo 'yes'
+                  CXXFLAGS="$CXXFLAGS -O"
+             else
+                  echo 'no'
+             fi
+        fi
+
+    else
+        echo -n "Checking if $CXX accepts -g... "
+        if (
+             $CXX -g __conftest.cc -o __conftest
+           ) >/dev/null 2>&1; then
+             echo 'yes'
+             CXXFLAGS="$CXXFLAGS -g"
+        else
+             echo 'no'
+        fi
+
+    fi
+else
+    CXXFLAGS="$CFLAGS"
+fi
+echo -n "Checking if $CXX accepts -fno-rtti... "
+if (
+     $CXX -fno-rtti __conftest.cc -o __conftest
+   ) >/dev/null 2>&1; then
+     echo 'yes'
+     CXXFLAGS="$CXXFLAGS -fno-rtti"
+else
+     echo 'no'
+fi
+
+echo -n "Checking if $CXX accepts -fno-exceptions... "
+if (
+     $CXX -fno-exceptions __conftest.cc -o __conftest
+   ) >/dev/null 2>&1; then
+     echo 'yes'
+     CXXFLAGS="$CXXFLAGS -fno-exceptions"
+else
+     echo 'no'
+fi
+
+
+LDFLAGS=
+LIBS=
+
+rm -f __conftest*
+
+##################################################
+
+echo -n 'Checking for BSD signal semantics... '
+cat <<EOF >__conftest.cc
+#include <unistd.h>
+#include <signal.h>
+int count=0;
+void handle(int foo) { count++; }
+int main() {
+    int pid=getpid();
+    signal(SIGINT, handle);
+    kill(pid,SIGINT);
+    kill(pid,SIGINT);
+    kill(pid,SIGINT);
+    if (count!=3) return 1;
+    return 0;
+}
+
+EOF
+if (
+      $CXX $CXXFLAGS  __conftest.cc  -o __conftest || exit 1
+#      ./__conftest || exit 1
+   ) >/dev/null 2>&1; then
+    echo 'yes'
+else
+    if (
+          $CXX $CXXFLAGS -D__USE_BSD_SIGNAL __conftest.cc  -o __conftest || exit 1
+#          ./__conftest || exit 1
+       ) >/dev/null 2>&1; then
+        echo '-D__USE_BSD_SIGNAL'
+        CFLAGS="$CFLAGS -D__USE_BSD_SIGNAL"
+        CXXFLAGS="$CXXFLAGS -D__USE_BSD_SIGNAL"
+    else
+        echo 'no'
+        echo 'This package needs BSD signal semantics to run.'
+        rm -f __conftest*
+        exit
+    fi
+fi
+rm -f __conftest*
+
+##################################################
+
+echo -n 'Checking for ncurses... '
+cat <<EOF >__conftest.cc
+#include <stdio.h>
+#include <curses.h>
+#ifndef KEY_DOWN
+syntax error. /* not ncurses */
+#endif
+int main() {
+    endwin();
+    return 0;
+}
+
+EOF
+if (
+      $CXX $CXXFLAGS  __conftest.cc -lncurses -o __conftest || exit 1
+   ) >/dev/null 2>&1; then
+    echo 'yes'
+    NCURSES=1
+else
+    if (
+          $CXX $CXXFLAGS -I/usr/include/ncurses __conftest.cc -lncurses -o __conftest || exit 1
+       ) >/dev/null 2>&1; then
+        echo '-I/usr/include/ncurses'
+        CFLAGS="$CFLAGS -I/usr/include/ncurses"
+        CXXFLAGS="$CXXFLAGS -I/usr/include/ncurses"
+        NCURSES=1
+    else
+        echo 'no'
+    fi
+fi
+
+if [ x$NCURSES != x ]; then
+    LIBTERMCAP=-lncurses
+else
+    echo -n 'Checking for traditional termcap... '
+cat <<EOF >__conftest.cc
+#include <stdio.h>
+#include <termcap.h>
+int main() {
+    tgetent(NULL, NULL); return 0;
+}
+
+EOF
+    if (
+          $CXX $CXXFLAGS  __conftest.cc -ltermcap -o __conftest || exit 1
+       ) >/dev/null 2>&1; then
+        echo '-ltermcap'
+        LIBTERMCAP=-ltermcap
+    else
+        echo 'not found'
+        echo 'This package needs termcap to run.'
+        rm -f __conftest*
+        exit
+    fi
+fi
+rm -f __conftest*
+
+##################################################
+
+echo -n 'Checking for GNU libc... '
+cat <<EOF >__conftest.cc
+#include <stdio.h>
+#if defined(__GLIBC__) && (__GLIBC__ >= 2)
+int tester;
+#endif
+int main() { tester=6; return 0; }
+
+EOF
+if (
+      $CXX $CXXFLAGS  __conftest.cc  -o __conftest || exit 1
+   ) >/dev/null 2>&1; then
+    echo 'yes'
+    USE_GLIBC=1
+else
+    echo 'no'
+fi
+rm -f __conftest*
+
+##################################################
+
+echo -n 'Checking for forkpty... '
+cat <<EOF >__conftest.cc
+#include <pty.h>
+int main() { forkpty(0, 0, 0, 0); }
+
+EOF
+if (
+      $CXX $CXXFLAGS  __conftest.cc  -o __conftest || exit 1
+   ) >/dev/null 2>&1; then
+    echo 'yes'
+else
+    if (
+          $CXX $CXXFLAGS  __conftest.cc -lutil -o __conftest || exit 1
+       ) >/dev/null 2>&1; then
+        echo '-lutil'
+        LIBS="$LIBS -lutil"
+    else
+        if (
+              $CXX $CXXFLAGS  __conftest.cc -lbsd -o __conftest || exit 1
+           ) >/dev/null 2>&1; then
+            echo '-lbsd'
+            LIBBSD="-lbsd"
+        else
+            echo 'no'
+            echo 'This package requires forkpty.'
+            rm -f __conftest*
+            exit
+        fi
+    fi
+fi
+rm -f __conftest*
+
+##################################################
+
+echo -n 'Checking for logwtmp... '
+cat <<EOF >__conftest.cc
+#ifdef __cplusplus
+extern "C"
+#endif
+void logwtmp(const char *, const char *, const char *);
+int main() { logwtmp(0, 0, 0); }
+
+EOF
+if (
+      $CXX $CXXFLAGS  __conftest.cc  -o __conftest || exit 1
+   ) >/dev/null 2>&1; then
+    echo 'yes'
+else
+    if (
+          $CXX $CXXFLAGS  __conftest.cc -lutil -o __conftest || exit 1
+       ) >/dev/null 2>&1; then
+        echo '-lutil'
+        LIBS="$LIBS -lutil"
+    else
+        if (
+              $CXX $CXXFLAGS  __conftest.cc -lbsd -o __conftest || exit 1
+           ) >/dev/null 2>&1; then
+            echo '-lbsd'
+            LIBBSD="-lbsd"
+        else
+            echo 'no'
+            echo 'This package requires logwtmp.'
+            rm -f __conftest*
+            exit
+        fi
+    fi
+fi
+rm -f __conftest*
+
+##################################################
+
+echo -n 'Checking for snprintf declaration... '
+cat <<EOF >__conftest.cc
+#include <stdio.h>
+int main() {
+    void *x = (void *)snprintf;
+    printf("%lx", (long)x);
+    return 0;
+}
+
+EOF
+if (
+      $CXX $CXXFLAGS  __conftest.cc  -o __conftest || exit 1
+   ) >/dev/null 2>&1; then
+    echo 'ok'
+else
+    if (
+          $CXX $CXXFLAGS -D_GNU_SOURCE __conftest.cc  -o __conftest || exit 1
+#          ./__conftest || exit 1
+       ) >/dev/null 2>&1; then
+        echo '-D_GNU_SOURCE'
+        CFLAGS="$CFLAGS -D_GNU_SOURCE"
+        CXXFLAGS="$CXXFLAGS -D_GNU_SOURCE"
+    else
+        echo 'manual'
+        CFLAGS="$CFLAGS -DDECLARE_SNPRINTF"
+        CXXFLAGS="$CXXFLAGS -DDECLARE_SNPRINTF"
+    fi
+fi
+rm -f __conftest*
+
+echo -n 'Checking for snprintf implementation... '
+cat <<EOF >__conftest.cc
+#include <stdio.h>
+#include <string.h>
+#ifdef DECLARE_SNPRINTF
+#ifdef __cplusplus
+extern "C"
+#endif /*__cplusplus*/
+int snprintf(char *, int, const char *, ...);
+#endif /*DECLARE_SNPRINTF*/
+int main() {
+    char buf[32];
+    snprintf(buf, 8, "%s", "1234567890");
+    if (strlen(buf)!=7) return 1;
+    return 0;
+}
+
+EOF
+if (
+      $CXX $CXXFLAGS  __conftest.cc $LIBBSD -o __conftest || exit 1
+#      ./__conftest || exit 1
+   ) >/dev/null 2>&1; then
+    echo 'ok'
+else
+    if (
+          $CXX $CXXFLAGS  __conftest.cc -lsnprintf $LIBBSD -o __conftest || exit 1
+#          ./__conftest || exit 1
+       ) >/dev/null 2>&1; then
+        echo '-lsnprintf'
+        LIBS="$LIBS -lsnprintf"
+    else
+        if (
+              $CXX $CXXFLAGS  __conftest.cc -ldb $LIBBSD -o __conftest || exit 1
+#              ./__conftest || exit 1
+           ) >/dev/null 2>&1; then
+            echo '-ldb'
+            LIBS="$LIBS -ldb"
+        else
+            echo 'missing'
+            echo 'This package requires snprintf.'
+            rm -f __conftest*
+            exit
+        fi
+    fi
+fi
+rm -f __conftest*
+
+##################################################
+
+## libbsd should go last in case it's broken
+if [ "x$LIBBSD" != x ]; then
+    LIBS="$LIBS $LIBBSD"
+fi
+
+echo 'Generating MCONFIG...'
+(
+    echo -n '# Generated by configure (confgen version 2) on '
+    date
+    echo '#'
+    echo
+
+    echo "BINDIR=$BINDIR"
+    echo "SBINDIR=$SBINDIR"
+    echo "MANDIR=$MANDIR"
+    echo "BINMODE=$BINMODE"
+    echo "DAEMONMODE=$DAEMONMODE"
+    echo "MANMODE=$MANMODE"
+    echo "PREFIX=$PREFIX"
+    echo "EXECPREFIX=$EXECPREFIX"
+    echo "INSTALLROOT=$INSTALLROOT"
+    echo "CC=$CC"
+    echo "CXX=$CXX"
+    if [ x$CC_WARNINGS != x ]; then
+        CFLAGS="$CFLAGS $WARNINGS"
+    fi
+
+    if [ x$CXX_WARNINGS != x ]; then
+        CXXFLAGS="$CXXFLAGS $WARNINGS"
+    fi
+
+    echo "CFLAGS=$CFLAGS" | sed 's/= */=/'
+    echo "CXXFLAGS=$CXXFLAGS" | sed 's/= */=/'
+    echo "LDFLAGS=$LDFLAGS" | sed 's/= */=/'
+    echo "LIBS=$LIBS" | sed 's/= */=/'
+
+    echo "LIBTERMCAP=$LIBTERMCAP"
+    echo "USE_GLIBC=$USE_GLIBC"
+) > MCONFIG
+

Property changes on: netkit-telnet-0.17-new/configure
___________________________________________________________________
Added: svn:executable
## -0,0 +1 ##
+*
\ No newline at end of property
Index: netkit-telnet-0.17-new/telnetd/state.c
===================================================================
--- netkit-telnet-0.17-new/telnetd/state.c	(nonexistent)
+++ netkit-telnet-0.17-new/telnetd/state.c	(revision 5)
@@ -0,0 +1,1408 @@
+/*
+ * Copyright (c) 1989 Regents of the University of California.
+ * All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ * 1. Redistributions of source code must retain the above copyright
+ *    notice, this list of conditions and the following disclaimer.
+ * 2. Redistributions in binary form must reproduce the above copyright
+ *    notice, this list of conditions and the following disclaimer in the
+ *    documentation and/or other materials provided with the distribution.
+ * 3. All advertising materials mentioning features or use of this software
+ *    must display the following acknowledgement:
+ *	This product includes software developed by the University of
+ *	California, Berkeley and its contributors.
+ * 4. Neither the name of the University nor the names of its contributors
+ *    may be used to endorse or promote products derived from this software
+ *    without specific prior written permission.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+ * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+ * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+ * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+ * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+ * SUCH DAMAGE.
+ */
+
+/*
+ * From: @(#)state.c	5.10 (Berkeley) 3/22/91
+ */
+char state_rcsid[] = 
+  "$Id: state.c,v 1.12 1999/12/12 19:41:44 dholland Exp $";
+
+#include "telnetd.h"
+
+int not42 = 1;
+
+static int envvarok(char *varp);
+
+static unsigned char doopt[] = { IAC, DO, '%', 'c', 0 };
+static unsigned char dont[] = { IAC, DONT, '%', 'c', 0 };
+unsigned char	will[] = { IAC, WILL, '%', 'c', 0 };
+unsigned char	wont[] = { IAC, WONT, '%', 'c', 0 };
+
+/*
+ * Buffer for sub-options, and macros
+ * for suboptions buffer manipulations
+ */
+unsigned char subbuffer[512], *subpointer=subbuffer, *subend=subbuffer;
+
+#define	SB_CLEAR()	subpointer = subbuffer;
+#define	SB_TERM()	{ subend = subpointer; SB_CLEAR(); }
+#define	SB_ACCUM(c)	if (subpointer < (subbuffer + sizeof(subbuffer)-1)) { \
+				*subpointer++ = (c); \
+			}
+#define	SB_GET()	((*subpointer++)&0xff)
+#define	SB_EOF()	(subpointer >= subend)
+#define	SB_LEN()	(subend - subpointer)
+
+
+
+/*
+ * State for recv fsm
+ */
+#define	TS_DATA		0	/* base state */
+#define	TS_IAC		1	/* look for double IAC's */
+#define	TS_CR		2	/* CR-LF ->'s CR */
+#define	TS_SB		3	/* throw away begin's... */
+#define	TS_SE		4	/* ...end's (suboption negotiation) */
+#define	TS_WILL		5	/* will option negotiation */
+#define	TS_WONT		6	/* wont " */
+#define	TS_DO		7	/* do " */
+#define	TS_DONT		8	/* dont " */
+
+void telrcv(void) {
+    register int c;
+    static int state = TS_DATA;
+
+    while (ncc > 0) {
+	if ((&ptyobuf[BUFSIZ] - pfrontp) < 2) break;
+	c = *netip++ & 0377;
+	ncc--;
+
+#if defined(ENCRYPT)
+	if (decrypt_input) {
+	    c = (*decrypt_input)(c);
+	}
+#endif
+	switch (state) {
+	 case TS_CR:
+	     state = TS_DATA;
+	     /* Strip off \n or \0 after a \r */
+	     if ((c == 0) || (c == '\n')) {
+		 break;
+	     }
+	     /* FALL THROUGH */
+
+	 case TS_DATA:
+	     if (c == IAC) {
+		 state = TS_IAC;
+		 break;
+	     }
+	     /*
+	      * We now map \r\n ==> \r for pragmatic reasons.
+	      * Many client implementations send \r\n when
+	      * the user hits the CarriageReturn key.
+	      *
+	      * We USED to map \r\n ==> \n, since \r\n says
+	      * that we want to be in column 1 of the next
+	      * printable line, and \n is the standard
+	      * unix way of saying that (\r is only good
+	      * if CRMOD is set, which it normally is).
+	      */
+	     if ((c == '\r') && his_state_is_wont(TELOPT_BINARY)) {
+#if defined(ENCRYPT)
+		 int nc = *netip;
+		 if (decrypt_input) {
+		     nc = (*decrypt_input)(nc & 0xff);
+		 }
+#endif
+#ifdef	LINEMODE
+		 /*
+		  * If we are operating in linemode,
+		  * convert to local end-of-line.
+		  */
+		 if (linemode && (ncc > 0) && (('\n' == nc) ||
+					       ((0 == nc) && tty_iscrnl())) ) {
+		     netip++; ncc--;
+		     c = '\n';
+		 } 
+		 else 
+#endif
+		 {
+#if defined(ENCRYPT)
+		     if (decrypt_input)
+			 (void)(*decrypt_input)(-1);
+#endif
+		     state = TS_CR;
+		 }
+	     }
+	     *pfrontp++ = c;
+	     break;
+
+	 case TS_IAC:
+	 gotiac:
+	     switch (c) {
+		 
+		 /*
+		  * Send the process on the pty side an
+		  * interrupt.  Do this with a NULL or
+		  * interrupt char; depending on the tty mode.
+		  */
+	      case IP:
+		  DIAG(TD_OPTIONS, printoption("td: recv IAC", c));
+		  interrupt();
+		  break;
+	      case BREAK:
+		  DIAG(TD_OPTIONS, printoption("td: recv IAC", c));
+		  sendbrk();
+		  break;
+		  
+		  /*
+		   * Are You There?
+		   */
+	      case AYT:
+		 DIAG(TD_OPTIONS,
+		      printoption("td: recv IAC", c));
+		  recv_ayt();
+		  break;
+
+		  /*
+		   * Abort Output
+		   */
+	      case AO:
+		  {
+		      DIAG(TD_OPTIONS, printoption("td: recv IAC", c));
+		      ptyflush();	/* half-hearted */
+		      init_termbuf();
+		      
+		      if (slctab[SLC_AO].sptr &&
+			  *slctab[SLC_AO].sptr != (cc_t)(_POSIX_VDISABLE)) 
+		      {
+			  *pfrontp++ =
+			      (unsigned char)*slctab[SLC_AO].sptr;
+		      }
+
+		      netclear();	/* clear buffer back */
+		      *nfrontp++ = (char)IAC;
+		      *nfrontp++ = (char)DM;
+		      neturg = nfrontp-1; /* off by one XXX */
+		      DIAG(TD_OPTIONS, printoption("td: send IAC", DM));
+		      break;
+		  }
+
+		  /*
+		   * Erase Character and
+		   * Erase Line
+		   */
+	      case EC:
+	      case EL:
+		 {
+		     cc_t ch;
+		     DIAG(TD_OPTIONS, printoption("td: recv IAC", c));
+		     ptyflush();	/* half-hearted */
+		     init_termbuf();
+		     if (c == EC) ch = *slctab[SLC_EC].sptr;
+		     else ch = *slctab[SLC_EL].sptr;
+		     if (ch != (cc_t)(_POSIX_VDISABLE))
+			 *pfrontp++ = (unsigned char)ch;
+		     break;
+		 }
+		  
+		  /*
+		   * Check for urgent data...
+		   */
+	      case DM:
+		  DIAG(TD_OPTIONS, printoption("td: recv IAC", c));
+		  SYNCHing = stilloob(net);
+		  settimer(gotDM);
+		  break;
+		  
+		  /*
+		   * Begin option subnegotiation...
+		   */
+	      case SB:
+		  state = TS_SB;
+		  SB_CLEAR();
+		  continue;
+
+	      case WILL:
+		  state = TS_WILL;
+		  continue;
+
+	      case WONT:
+		  state = TS_WONT;
+		  continue;
+
+	      case DO:
+		  state = TS_DO;
+		  continue;
+		  
+	      case DONT:
+		  state = TS_DONT;
+		  continue;
+
+	      case EOR:
+		  if (his_state_is_will(TELOPT_EOR)) doeof();
+		  break;
+		  
+		  /*
+		   * Handle RFC 10xx Telnet linemode option additions
+		   * to command stream (EOF, SUSP, ABORT).
+		   */
+	      case xEOF:
+		  doeof();
+		  break;
+		  
+	      case SUSP:
+		  sendsusp();
+		  break;
+
+	      case ABORT:
+		  sendbrk();
+		  break;
+
+	      case IAC:
+		 *pfrontp++ = c;
+		  break;
+	     }
+	     state = TS_DATA;
+	     break;
+
+	 case TS_SB:
+	     if (c == IAC) {
+		 state = TS_SE;
+	     } 
+	     else {
+		 SB_ACCUM(c);
+	     }
+	     break;
+	     
+	 case TS_SE:
+	     if (c != SE) {
+		 if (c != IAC) {
+				/*
+				 * bad form of suboption negotiation.
+				 * handle it in such a way as to avoid
+				 * damage to local state.  Parse
+				 * suboption buffer found so far,
+				 * then treat remaining stream as
+				 * another command sequence.
+				 */
+		     
+				/* for DIAGNOSTICS */
+		     SB_ACCUM(IAC);
+		     SB_ACCUM(c);
+		     subpointer -= 2;
+		     
+		     SB_TERM();
+		     suboption();
+		     state = TS_IAC;
+		     goto gotiac;
+		 }
+		 SB_ACCUM(c);
+		 state = TS_SB;
+	     }
+	     else {
+		 /* for DIAGNOSTICS */
+		 SB_ACCUM(IAC);
+		 SB_ACCUM(SE);
+		 subpointer -= 2;
+		 
+		 SB_TERM();
+		 suboption();	/* handle sub-option */
+		 state = TS_DATA;
+	     }
+	     break;
+	     
+	 case TS_WILL:
+	     willoption(c);
+	     state = TS_DATA;
+	     continue;
+
+	 case TS_WONT:
+	     wontoption(c);
+	     state = TS_DATA;
+	     continue;
+
+	 case TS_DO:
+	     dooption(c);
+	     state = TS_DATA;
+	     continue;
+	     
+	 case TS_DONT:
+	     dontoption(c);
+	     state = TS_DATA;
+	     continue;
+	     
+	 default:
+	     syslog(LOG_ERR, "telnetd: panic state=%d\n", state);
+	     printf("telnetd: panic state=%d\n", state);
+	     exit(1);
+	}
+    }
+}
+
+/*
+ * The will/wont/do/dont state machines are based on Dave Borman's
+ * Telnet option processing state machine.
+ *
+ * These correspond to the following states:
+ *	my_state = the last negotiated state
+ *	want_state = what I want the state to go to
+ *	want_resp = how many requests I have sent
+ * All state defaults are negative, and resp defaults to 0.
+ *
+ * When initiating a request to change state to new_state:
+ * 
+ * if ((want_resp == 0 && new_state == my_state) || want_state == new_state) {
+ *	do nothing;
+ * } else {
+ *	want_state = new_state;
+ *	send new_state;
+ *	want_resp++;
+ * }
+ *
+ * When receiving new_state:
+ *
+ * if (want_resp) {
+ *	want_resp--;
+ *	if (want_resp && (new_state == my_state))
+ *		want_resp--;
+ * }
+ * if ((want_resp == 0) && (new_state != want_state)) {
+ *	if (ok_to_switch_to new_state)
+ *		want_state = new_state;
+ *	else
+ *		want_resp++;
+ *	send want_state;
+ * }
+ * my_state = new_state;
+ *
+ * Note that new_state is implied in these functions by the function itself.
+ * will and do imply positive new_state, wont and dont imply negative.
+ *
+ * Finally, there is one catch.  If we send a negative response to a
+ * positive request, my_state will be the positive while want_state will
+ * remain negative.  my_state will revert to negative when the negative
+ * acknowlegment arrives from the peer.  Thus, my_state generally tells
+ * us not only the last negotiated state, but also tells us what the peer
+ * wants to be doing as well.  It is important to understand this difference
+ * as we may wish to be processing data streams based on our desired state
+ * (want_state) or based on what the peer thinks the state is (my_state).
+ *
+ * This all works fine because if the peer sends a positive request, the data
+ * that we receive prior to negative acknowlegment will probably be affected
+ * by the positive state, and we can process it as such (if we can; if we
+ * can't then it really doesn't matter).  If it is that important, then the
+ * peer probably should be buffering until this option state negotiation
+ * is complete.
+ *
+ */
+void send_do(int option, int init) {
+    if (init) {
+	if ((do_dont_resp[option] == 0 && his_state_is_will(option)) ||
+	    his_want_state_is_will(option))
+	    return;
+	/*
+	 * Special case for TELOPT_TM:  We send a DO, but pretend
+	 * that we sent a DONT, so that we can send more DOs if
+	 * we want to.
+	 */
+	if (option == TELOPT_TM)
+	    set_his_want_state_wont(option);
+	else
+	    set_his_want_state_will(option);
+	do_dont_resp[option]++;
+    }
+    netoprintf((char *)doopt, option);
+    
+    DIAG(TD_OPTIONS, printoption("td: send do", option));
+}
+
+#ifdef	AUTHENTICATE
+extern void auth_request();
+#endif
+
+#ifdef	LINEMODE
+static void doclientstat(void);
+#endif
+
+#ifdef	ENCRYPT
+extern void encrypt_send_support();
+#endif
+
+void willoption(int option) {
+    int changeok = 0;
+    void (*func)(void) = 0;
+    
+    /*
+     * process input from peer.
+     */
+    
+    DIAG(TD_OPTIONS, printoption("td: recv will", option));
+    
+    if (do_dont_resp[option]) {
+	do_dont_resp[option]--;
+	if (do_dont_resp[option] && his_state_is_will(option))
+	    do_dont_resp[option]--;
+    }
+    if (do_dont_resp[option] == 0) {
+	if (his_want_state_is_wont(option)) {
+	    switch (option) {
+		
+	    case TELOPT_BINARY:
+		init_termbuf();
+		tty_binaryin(1);
+		set_termbuf();
+		changeok++;
+		break;
+		
+	    case TELOPT_ECHO:
+		/*
+		 * See comments below for more info.
+		 */
+		not42 = 0;	/* looks like a 4.2 system */
+		break;
+		
+	    case TELOPT_TM:
+#if defined(LINEMODE) && defined(KLUDGELINEMODE)
+		/*
+		 * This telnetd implementation does not really
+		 * support timing marks, it just uses them to
+		 * support the kludge linemode stuff.  If we
+		 * receive a will or wont TM in response to our
+		 * do TM request that may have been sent to
+		 * determine kludge linemode support, process
+		 * it, otherwise TM should get a negative
+		 * response back.
+		 */
+		/*
+		 * Handle the linemode kludge stuff.
+		 * If we are not currently supporting any
+		 * linemode at all, then we assume that this
+		 * is the client telling us to use kludge
+		 * linemode in response to our query.  Set the
+		 * linemode type that is to be supported, note
+		 * that the client wishes to use linemode, and
+		 * eat the will TM as though it never arrived.
+		 */
+		if (lmodetype < KLUDGE_LINEMODE) {
+		    lmodetype = KLUDGE_LINEMODE;
+		    clientstat(TELOPT_LINEMODE, WILL, 0);
+		    send_wont(TELOPT_SGA, 1);
+		}
+#endif	/* defined(LINEMODE) && defined(KLUDGELINEMODE) */
+		/*
+		 * We never respond to a WILL TM, and
+		 * we leave the state WONT.
+		 */
+		return;
+
+	    case TELOPT_LFLOW:
+		 /*
+		  * If we are going to support flow control
+		  * option, then don't worry peer that we can't
+		  * change the flow control characters.
+		  */
+		slctab[SLC_XON].defset.flag &= ~SLC_LEVELBITS;
+		slctab[SLC_XON].defset.flag |= SLC_DEFAULT;
+		slctab[SLC_XOFF].defset.flag &= ~SLC_LEVELBITS;
+		slctab[SLC_XOFF].defset.flag |= SLC_DEFAULT;
+	    case TELOPT_TTYPE:
+	    case TELOPT_SGA:
+	    case TELOPT_NAWS:
+	    case TELOPT_TSPEED:
+	    case TELOPT_XDISPLOC:
+	    case TELOPT_ENVIRON:
+		changeok++;
+		break;
+		
+#ifdef LINEMODE
+	    case TELOPT_LINEMODE:
+#ifdef KLUDGELINEMODE
+		/*
+		 * Note client's desire to use linemode.
+		 */
+		lmodetype = REAL_LINEMODE;
+#endif	/* KLUDGELINEMODE */
+		func = doclientstat;
+		changeok++;
+		break;
+#endif	/* LINEMODE */
+		
+#ifdef	AUTHENTICATE
+	    case TELOPT_AUTHENTICATION:
+		func = auth_request;
+		changeok++;
+		break;
+#endif
+		
+#ifdef ENCRYPT
+	    case TELOPT_ENCRYPT:
+		func = encrypt_send_support;
+		changeok++;
+		break;
+#endif
+
+	    default:
+		break;
+	    }
+	    if (changeok) {
+		set_his_want_state_will(option);
+		send_do(option, 0);
+	    } 
+	    else {
+		do_dont_resp[option]++;
+		send_dont(option, 0);
+	    }
+	} 
+	else {
+	    /*
+	     * Option processing that should happen when
+	     * we receive conformation of a change in
+	     * state that we had requested.
+	     */
+	    switch (option) {
+	     case TELOPT_ECHO:
+		not42 = 0;	/* looks like a 4.2 system */
+		/*
+		 * Egads, he responded "WILL ECHO".  Turn
+		 * it off right now!
+		 */
+		send_dont(option, 1);
+		/*
+		 * "WILL ECHO".  Kludge upon kludge!
+		 * A 4.2 client is now echoing user input at
+		 * the tty.  This is probably undesireable and
+		 * it should be stopped.  The client will
+		 * respond WONT TM to the DO TM that we send to
+		 * check for kludge linemode.  When the WONT TM
+		 * arrives, linemode will be turned off and a
+		 * change propogated to the pty.  This change
+		 * will cause us to process the new pty state
+		 * in localstat(), which will notice that
+		 * linemode is off and send a WILL ECHO
+		 * so that we are properly in character mode and
+		 * all is well.
+		 */
+		break;
+#ifdef	LINEMODE
+	     case TELOPT_LINEMODE:
+# ifdef	KLUDGELINEMODE
+		 /*
+		  * Note client's desire to use linemode.
+		  */
+		 lmodetype = REAL_LINEMODE;
+# endif	/* KLUDGELINEMODE */
+		func = doclientstat;
+		break;
+#endif	/* LINEMODE */
+
+#ifdef	AUTHENTICATE
+	    case TELOPT_AUTHENTICATION:
+		func = auth_request;
+		break;
+#endif
+
+#ifdef	ENCRYPT
+	    case TELOPT_ENCRYPT:
+		func = encrypt_send_support;
+		break;
+#endif
+	    }
+	}
+    }
+    set_his_state_will(option);
+    if (func) (*func)();
+}
+
+void send_dont(int option, int init) {
+    if (init) {
+	if ((do_dont_resp[option] == 0 && his_state_is_wont(option)) ||
+	    his_want_state_is_wont(option))
+	    return;
+	set_his_want_state_wont(option);
+	do_dont_resp[option]++;
+    }
+    netoprintf((char *) dont, option);
+
+    DIAG(TD_OPTIONS, printoption("td: send dont", option));
+}
+
+void wontoption(int option) {
+    /*
+     * Process client input.
+     */
+
+    DIAG(TD_OPTIONS, printoption("td: recv wont", option));
+    
+    if (do_dont_resp[option]) {
+	do_dont_resp[option]--;
+	if (do_dont_resp[option] && his_state_is_wont(option))
+	    do_dont_resp[option]--;
+    }
+    if (do_dont_resp[option] == 0) {
+	if (his_want_state_is_will(option)) {
+	    /* it is always ok to change to negative state */
+	    switch (option) {
+	    case TELOPT_ECHO:
+		not42 = 1; /* doesn't seem to be a 4.2 system */
+		break;
+		
+	    case TELOPT_BINARY:
+		init_termbuf();
+		tty_binaryin(0);
+		set_termbuf();
+		break;
+		
+#ifdef LINEMODE
+	    case TELOPT_LINEMODE:
+#ifdef KLUDGELINEMODE
+		/*
+		 * If real linemode is supported, then client is
+		 * asking to turn linemode off.
+		 */
+		if (lmodetype != REAL_LINEMODE)
+		    break;
+		lmodetype = KLUDGE_LINEMODE;
+# endif	/* KLUDGELINEMODE */
+		clientstat(TELOPT_LINEMODE, WONT, 0);
+		break;
+#endif	/* LINEMODE */
+		
+	    case TELOPT_TM:
+		/*
+		 * If we get a WONT TM, and had sent a DO TM,
+		 * don't respond with a DONT TM, just leave it
+		 * as is.  Short circut the state machine to
+		 * achive this.
+		 */
+		set_his_want_state_wont(TELOPT_TM);
+		return;
+		
+	    case TELOPT_LFLOW:
+		/*
+		 * If we are not going to support flow control
+		 * option, then let peer know that we can't
+		 * change the flow control characters.
+		 */
+		slctab[SLC_XON].defset.flag &= ~SLC_LEVELBITS;
+		slctab[SLC_XON].defset.flag |= SLC_CANTCHANGE;
+		slctab[SLC_XOFF].defset.flag &= ~SLC_LEVELBITS;
+		slctab[SLC_XOFF].defset.flag |= SLC_CANTCHANGE;
+		break;
+		
+#if defined(AUTHENTICATE)
+	     case TELOPT_AUTHENTICATION:
+		auth_finished(0, AUTH_REJECT);
+		break;
+#endif
+
+		/*
+		 * For options that we might spin waiting for
+		 * sub-negotiation, if the client turns off the
+		 * option rather than responding to the request,
+		 * we have to treat it here as if we got a response
+		 * to the sub-negotiation, (by updating the timers)
+		 * so that we'll break out of the loop.
+		 */
+	    case TELOPT_TTYPE:
+		settimer(ttypesubopt);
+		break;
+
+	    case TELOPT_TSPEED:
+		settimer(tspeedsubopt);
+		break;
+
+	    case TELOPT_XDISPLOC:
+		settimer(xdisplocsubopt);
+		break;
+		
+	    case TELOPT_ENVIRON:
+		settimer(environsubopt);
+		break;
+
+	    default:
+		break;
+	    }
+	    set_his_want_state_wont(option);
+	    if (his_state_is_will(option)) send_dont(option, 0);
+	} 
+	else {
+	    switch (option) {
+	     case TELOPT_TM:
+#if defined(LINEMODE) && defined(KLUDGELINEMODE)
+		 if (lmodetype < REAL_LINEMODE) {
+		     lmodetype = NO_LINEMODE;
+		     clientstat(TELOPT_LINEMODE, WONT, 0);
+		     send_will(TELOPT_SGA, 1);
+		     send_will(TELOPT_ECHO, 1);
+		 }
+#endif	/* defined(LINEMODE) && defined(KLUDGELINEMODE) */
+		 break;
+
+#if	defined(AUTHENTICATE)
+	    case TELOPT_AUTHENTICATION:
+		auth_finished(0, AUTH_REJECT);
+		 break;
+#endif
+	    default:
+		break;
+	    }
+	}
+    }
+}  /* end of wontoption */
+
+void send_will(int option, int init) {
+    if (init) {
+	if ((will_wont_resp[option] == 0 && my_state_is_will(option))||
+	    my_want_state_is_will(option))
+	    return;
+	set_my_want_state_will(option);
+	will_wont_resp[option]++;
+    }
+    netoprintf((char *) will, option);
+
+    DIAG(TD_OPTIONS, printoption("td: send will", option));
+}
+
+#if !defined(LINEMODE) || !defined(KLUDGELINEMODE)
+/*
+ * When we get a DONT SGA, we will try once to turn it
+ * back on.  If the other side responds DONT SGA, we
+ * leave it at that.  This is so that when we talk to
+ * clients that understand KLUDGELINEMODE but not LINEMODE,
+ * we'll keep them in char-at-a-time mode.
+ */
+int turn_on_sga = 0;
+#endif
+
+void dooption(int option) {
+    int changeok = 0;
+
+    /*
+     * Process client input.
+     */
+    
+    DIAG(TD_OPTIONS, printoption("td: recv do", option));
+    
+    if (will_wont_resp[option]) {
+	will_wont_resp[option]--;
+	if (will_wont_resp[option] && my_state_is_will(option))
+	    will_wont_resp[option]--;
+    }
+    if ((will_wont_resp[option] == 0) && (my_want_state_is_wont(option))) {
+	switch (option) {
+	case TELOPT_ECHO:
+#ifdef	LINEMODE
+#ifdef	KLUDGELINEMODE
+	    if (lmodetype == NO_LINEMODE)
+#else
+            if (his_state_is_wont(TELOPT_LINEMODE))
+#endif
+#endif
+	    {
+		init_termbuf();
+		tty_setecho(1);
+		set_termbuf();
+	    }
+	    changeok++;
+	    break;
+
+	case TELOPT_BINARY:
+	    init_termbuf();
+	    tty_binaryout(1);
+	    set_termbuf();
+	    changeok++;
+	    break;
+
+	case TELOPT_SGA:
+#if defined(LINEMODE) && defined(KLUDGELINEMODE)
+	    /*
+	     * If kludge linemode is in use, then we must
+	     * process an incoming do SGA for linemode
+	     * purposes.
+	     */
+	    if (lmodetype == KLUDGE_LINEMODE) {
+		/*
+		 * Receipt of "do SGA" in kludge
+		 * linemode is the peer asking us to
+		 * turn off linemode.  Make note of
+		 * the request.
+		 */
+		clientstat(TELOPT_LINEMODE, WONT, 0);
+		/*
+		 * If linemode did not get turned off
+		 * then don't tell peer that we did.
+		 * Breaking here forces a wont SGA to
+		 * be returned.
+		 */
+		if (linemode)  break;
+	    }
+#else
+	    turn_on_sga = 0;
+#endif	/* defined(LINEMODE) && defined(KLUDGELINEMODE) */
+	    changeok++;
+	    break;
+
+	case TELOPT_STATUS:
+	    changeok++;
+	    break;
+	    
+	case TELOPT_TM:
+	    /*
+	     * Special case for TM.  We send a WILL, but
+	     * pretend we sent a WONT.
+	     */
+	    send_will(option, 0);
+	    set_my_want_state_wont(option);
+	    set_my_state_wont(option);
+	    return;
+	    
+	case TELOPT_LOGOUT:
+	    /*
+	     * When we get a LOGOUT option, respond
+	     * with a WILL LOGOUT, make sure that
+	     * it gets written out to the network,
+	     * and then just go away...
+	     */
+	    set_my_want_state_will(TELOPT_LOGOUT);
+	    send_will(TELOPT_LOGOUT, 0);
+	    set_my_state_will(TELOPT_LOGOUT);
+	    (void)netflush();
+	    cleanup(0);
+	    /* NOT REACHED */
+	    break;
+
+#if defined(ENCRYPT)
+	case TELOPT_ENCRYPT:
+	    changeok++;
+	    break;
+#endif
+	case TELOPT_LINEMODE:
+	case TELOPT_TTYPE:
+	case TELOPT_NAWS:
+	case TELOPT_TSPEED:
+	case TELOPT_LFLOW:
+	case TELOPT_XDISPLOC:
+	case TELOPT_ENVIRON:
+	default:
+	    break;
+	}
+	if (changeok) {
+	    set_my_want_state_will(option);
+	    send_will(option, 0);
+	} 
+	else {
+	    will_wont_resp[option]++;
+	    send_wont(option, 0);
+	}
+    }
+    set_my_state_will(option);
+}
+
+void send_wont(int option, int init) {
+    if (init) {
+	if ((will_wont_resp[option] == 0 && my_state_is_wont(option)) ||
+	    my_want_state_is_wont(option))
+	    return;
+	set_my_want_state_wont(option);
+	will_wont_resp[option]++;
+    }
+    netoprintf((char *)wont, option);
+    
+    DIAG(TD_OPTIONS, printoption("td: send wont", option));
+}
+
+void dontoption(int option) {
+    /*
+     * Process client input.
+     */
+    DIAG(TD_OPTIONS, printoption("td: recv dont", option));
+
+    if (will_wont_resp[option]) {
+	will_wont_resp[option]--;
+	if (will_wont_resp[option] && my_state_is_wont(option))
+	    will_wont_resp[option]--;
+    }
+    if ((will_wont_resp[option] == 0) && (my_want_state_is_will(option))) {
+	switch (option) {
+	case TELOPT_BINARY:
+	    init_termbuf();
+	    tty_binaryout(0);
+	    set_termbuf();
+	    break;
+
+	case TELOPT_ECHO:	/* we should stop echoing */
+#ifdef	LINEMODE
+#ifdef	KLUDGELINEMODE
+	    if (lmodetype == NO_LINEMODE)
+#else
+    	    if (his_state_is_wont(TELOPT_LINEMODE))
+#endif
+#endif
+	    {
+		init_termbuf();
+		tty_setecho(0);
+		set_termbuf();
+	    }
+	    break;
+
+	case TELOPT_SGA:
+#if defined(LINEMODE) && defined(KLUDGELINEMODE)
+	    /*
+	     * If kludge linemode is in use, then we
+	     * must process an incoming do SGA for
+	     * linemode purposes.
+	     */
+	    if (lmodetype == KLUDGE_LINEMODE) {
+		/*
+		 * The client is asking us to turn
+		 * linemode on.
+		 */
+		clientstat(TELOPT_LINEMODE, WILL, 0);
+		/*
+		 * If we did not turn line mode on,
+		 * then what do we say?  Will SGA?
+		 * This violates design of telnet.
+		 * Gross.  Very Gross.
+		 */
+	    }
+	    break;
+#else
+	    set_my_want_state_wont(option);
+	    if (my_state_is_will(option))
+		send_wont(option, 0);
+	    set_my_state_wont(option);
+	    if (turn_on_sga ^= 1) send_will(option,1);
+	    return;
+#endif	/* defined(LINEMODE) && defined(KLUDGELINEMODE) */
+	    
+	 default:
+	    break;
+	}
+
+	set_my_want_state_wont(option);
+	if (my_state_is_will(option))
+	    send_wont(option, 0);
+    }
+    set_my_state_wont(option);
+}
+
+/*
+ * suboption()
+ *
+ *	Look at the sub-option buffer, and try to be helpful to the other
+ * side.
+ *
+ *	Currently we recognize:
+ *
+ *	Terminal type is
+ *	Linemode
+ *	Window size
+ *	Terminal speed
+ */
+void suboption(void) {
+    int subchar;
+
+    DIAG(TD_OPTIONS, {netflush(); printsub('<', subpointer, SB_LEN()+2);});
+
+    subchar = SB_GET();
+    switch (subchar) {
+     case TELOPT_TSPEED: {
+	int xspeed, rspeed;
+	if (his_state_is_wont(TELOPT_TSPEED))	/* Ignore if option disabled */
+	    break;
+
+	settimer(tspeedsubopt);
+	if (SB_EOF() || SB_GET() != TELQUAL_IS) return;
+	xspeed = atoi((char *)subpointer);
+
+	while (SB_GET() != ',' && !SB_EOF());
+	if (SB_EOF()) return;
+	
+	rspeed = atoi((char *)subpointer);
+	clientstat(TELOPT_TSPEED, xspeed, rspeed);
+	break;
+    }
+
+    case TELOPT_TTYPE: {		/* Yaaaay! */
+	static char terminalname[41];
+
+	if (his_state_is_wont(TELOPT_TTYPE))	/* Ignore if option disabled */
+	    break;
+	settimer(ttypesubopt);
+	
+	if (SB_EOF() || SB_GET() != TELQUAL_IS) {
+	    return;		/* ??? XXX but, this is the most robust */
+	}
+
+	terminaltype = terminalname;
+
+	while ((terminaltype < (terminalname + sizeof (terminalname) -1) ) &&
+	       !SB_EOF()) 
+	{
+	    int c;
+	    c = SB_GET();
+	    if (isupper(c)) {
+		c = tolower(c);
+	    }
+	    *terminaltype++ = c;    /* accumulate name */
+	}
+	*terminaltype = 0;
+	terminaltype = terminalname;
+	break;
+    }
+
+    case TELOPT_NAWS: {
+	int xwinsize, ywinsize;
+	if (his_state_is_wont(TELOPT_NAWS))	/* Ignore if option disabled */
+	    break;
+
+	if (SB_EOF()) return;
+	xwinsize = SB_GET() << 8;
+	if (SB_EOF()) return;
+	xwinsize |= SB_GET();
+	if (SB_EOF()) return;
+	ywinsize = SB_GET() << 8;
+	if (SB_EOF()) return;
+	ywinsize |= SB_GET();
+	clientstat(TELOPT_NAWS, xwinsize, ywinsize);
+	break;
+    }
+
+#ifdef	LINEMODE
+    case TELOPT_LINEMODE: {
+	register int request;
+
+	if (his_state_is_wont(TELOPT_LINEMODE))	/* Ignore if option disabled */
+		break;
+	/*
+	 * Process linemode suboptions.
+	 */
+	if (SB_EOF())
+	    break;		/* garbage was sent */
+	request = SB_GET();	/* get will/wont */
+
+	if (SB_EOF())
+	    break;		/* another garbage check */
+
+	if (request == LM_SLC) {  /* SLC is not preceeded by WILL or WONT */
+		/*
+		 * Process suboption buffer of slc's
+		 */
+		start_slc(1);
+		do_opt_slc(subpointer, subend - subpointer);
+		(void) end_slc(0);
+		break;
+	} else if (request == LM_MODE) {
+		if (SB_EOF())
+		    return;
+		useeditmode = SB_GET();  /* get mode flag */
+		clientstat(LM_MODE, 0, 0);
+		break;
+	}
+
+	if (SB_EOF())
+	    break;
+	switch (SB_GET()) {  /* what suboption? */
+	case LM_FORWARDMASK:
+		/*
+		 * According to spec, only server can send request for
+		 * forwardmask, and client can only return a positive response.
+		 * So don't worry about it.
+		 */
+
+	default:
+		break;
+	}
+	break;
+    }  /* end of case TELOPT_LINEMODE */
+#endif
+    case TELOPT_STATUS: {
+	int mode;
+
+	if (SB_EOF())
+	    break;
+	mode = SB_GET();
+	switch (mode) {
+	case TELQUAL_SEND:
+	    if (my_state_is_will(TELOPT_STATUS))
+		send_status();
+	    break;
+
+	case TELQUAL_IS:
+	    break;
+
+	default:
+	    break;
+	}
+	break;
+    }  /* end of case TELOPT_STATUS */
+
+    case TELOPT_XDISPLOC: {
+	if (SB_EOF() || SB_GET() != TELQUAL_IS)
+		return;
+	settimer(xdisplocsubopt);
+	subpointer[SB_LEN()] = '\0';
+	(void)setenv("DISPLAY", (char *)subpointer, 1);
+	break;
+    }  /* end of case TELOPT_XDISPLOC */
+
+    case TELOPT_ENVIRON: {
+	register int c;
+	register char *cp, *varp, *valp;
+
+	if (SB_EOF())
+		return;
+	c = SB_GET();
+	if (c == TELQUAL_IS)
+		settimer(environsubopt);
+	else if (c != TELQUAL_INFO)
+		return;
+
+	while (!SB_EOF() && SB_GET() != ENV_VAR)
+		;
+
+	if (SB_EOF())
+		return;
+
+	cp = varp = (char *)subpointer;
+	valp = 0;
+
+	while (!SB_EOF()) {
+	    switch (c = SB_GET()) {
+	    case ENV_VALUE:
+		*cp = '\0';
+		cp = valp = (char *)subpointer;
+		break;
+		
+	    case ENV_VAR:
+		*cp = '\0';
+		if (envvarok(varp)) {
+		    if (valp)
+			(void)setenv(varp, valp, 1);
+		    else
+			unsetenv(varp);
+		}
+		cp = varp = (char *)subpointer;
+		valp = 0;
+		break;
+		
+	    case ENV_ESC:
+		if (SB_EOF())
+		    break;
+		c = SB_GET();
+		/* FALL THROUGH */
+	    default:
+	        /* I think this test is correct... */
+		if ((unsigned char *)cp < subbuffer+sizeof(subbuffer)-1) *cp++ = c;
+		break;
+	    }
+	}
+	*cp = '\0';
+	if (envvarok(varp)) {
+	    if (valp)
+		(void)setenv(varp, valp, 1);
+	    else
+		unsetenv(varp);
+	}
+	break;
+    }  /* end of case TELOPT_ENVIRON */
+#if defined(AUTHENTICATE)
+    case TELOPT_AUTHENTICATION:
+	if (SB_EOF())
+	    break;
+	switch(SB_GET()) {
+	case TELQUAL_SEND:
+	case TELQUAL_REPLY:
+	    /*
+	     * These are sent by us and cannot be sent by
+	     * the client.
+	     */
+	    break;
+	case TELQUAL_IS:
+	    auth_is(subpointer, SB_LEN());
+	    break;
+	case TELQUAL_NAME:
+	    auth_name(subpointer, SB_LEN());
+	    break;
+	}
+	break;
+#endif
+#if defined(ENCRYPT)
+    case TELOPT_ENCRYPT:
+	if (SB_EOF())
+	    break;
+	switch(SB_GET()) {
+	case ENCRYPT_SUPPORT:
+	    encrypt_support(subpointer, SB_LEN());
+	    break;
+	case ENCRYPT_IS:
+	    encrypt_is(subpointer, SB_LEN());
+	    break;
+	case ENCRYPT_REPLY:
+	    encrypt_reply(subpointer, SB_LEN());
+	    break;
+	case ENCRYPT_START:
+	    encrypt_start(subpointer, SB_LEN());
+	    break;
+	case ENCRYPT_END:
+	    encrypt_end();
+	    break;
+	case ENCRYPT_REQSTART:
+	    encrypt_request_start(subpointer, SB_LEN());
+	    break;
+	case ENCRYPT_REQEND:
+	    /*
+	     * We can always send an REQEND so that we cannot
+	     * get stuck encrypting.  We should only get this
+	     * if we have been able to get in the correct mode
+	     * anyhow.
+	     */
+	    encrypt_request_end();
+	    break;
+	case ENCRYPT_ENC_KEYID:
+	    encrypt_enc_keyid(subpointer, SB_LEN());
+	    break;
+	case ENCRYPT_DEC_KEYID:
+	    encrypt_dec_keyid(subpointer, SB_LEN());
+	    break;
+	default:
+	    break;
+	}
+	break;
+#endif
+
+    default:
+	break;
+    }  /* end of switch */
+
+}  /* end of suboption */
+
+#ifdef LINEMODE
+static void doclientstat(void) {
+    clientstat(TELOPT_LINEMODE, WILL, 0);
+}
+#endif
+
+#define	ADD(c)	 *ncp++ = c;
+#define	ADD_DATA(c) { *ncp++ = c; if (c == SE) *ncp++ = c; }
+
+void send_status(void) {
+    unsigned char statusbuf[256];
+    register unsigned char *ncp;
+    register unsigned char i;
+    
+    ncp = statusbuf;
+    
+    netflush();	/* get rid of anything waiting to go out */
+    
+    ADD(IAC);
+    ADD(SB);
+    ADD(TELOPT_STATUS);
+    ADD(TELQUAL_IS);
+    
+    /*
+     * We check the want_state rather than the current state,
+     * because if we received a DO/WILL for an option that we
+     * don't support, and the other side didn't send a DONT/WONT
+     * in response to our WONT/DONT, then the "state" will be
+     * WILL/DO, and the "want_state" will be WONT/DONT.  We
+     * need to go by the latter.
+     */
+    for (i = 0; i < NTELOPTS; i++) {
+	if (my_want_state_is_will(i)) {
+	    ADD(WILL);
+	    ADD_DATA(i);
+	    if (i == IAC) ADD(IAC);
+	}
+	if (his_want_state_is_will(i)) {
+	    ADD(DO);
+	    ADD_DATA(i);
+	    if (i == IAC) ADD(IAC);
+	}
+    }
+
+    if (his_want_state_is_will(TELOPT_LFLOW)) {
+	ADD(SB);
+	ADD(TELOPT_LFLOW);
+	ADD(flowmode);
+	ADD(SE);
+    }
+
+#ifdef LINEMODE
+    if (his_want_state_is_will(TELOPT_LINEMODE)) {
+	unsigned char *cp, *cpe;
+	int len;
+	
+	ADD(SB);
+	ADD(TELOPT_LINEMODE);
+	ADD(LM_MODE);
+	ADD_DATA(editmode);
+	if (editmode == IAC) ADD(IAC);
+	ADD(SE);
+	
+	ADD(SB);
+	ADD(TELOPT_LINEMODE);
+	ADD(LM_SLC);
+	start_slc(0);
+	send_slc();
+	len = end_slc(&cp);
+	for (cpe = cp + len; cp < cpe; cp++) ADD_DATA(*cp);
+	ADD(SE);
+    }
+#endif	/* LINEMODE */
+
+    ADD(IAC);
+    ADD(SE);
+
+    writenet(statusbuf, ncp - statusbuf);
+    netflush();	/* Send it on its way */
+
+    DIAG(TD_OPTIONS, {printsub('>', statusbuf, ncp - statusbuf); netflush();});
+}
+
+/* check that variable is safe to pass to login or shell */
+#if 0  /* insecure version */
+static int envvarok(char *varp) {
+    if (strncmp(varp, "LD_", strlen("LD_")) &&
+	strncmp(varp, "ELF_LD_", strlen("ELF_LD_")) &&
+	strncmp(varp, "AOUT_LD_", strlen("AOUT_LD_")) &&
+	strncmp(varp, "_RLD_", strlen("_RLD_")) &&
+	strcmp(varp, "LIBPATH") &&
+	strcmp(varp, "ENV") &&
+	strcmp(varp, "IFS")) 
+    {
+	return 1;
+    } 
+    else {
+	/* optionally syslog(LOG_INFO) here */
+	return 0;
+    }
+}
+
+#else
+static int envvarok(char *varp) {
+    /*
+     * Allow only these variables.
+     */
+    if (!strcmp(varp, "TERM")) return 1;
+    if (!strcmp(varp, "DISPLAY")) return 1;
+    if (!strcmp(varp, "USER")) return 1;
+    if (!strcmp(varp, "LOGNAME")) return 1;
+    if (!strcmp(varp, "POSIXLY_CORRECT")) return 1;
+
+    /* optionally syslog(LOG_INFO) here */
+    return 0;
+}
+
+#endif
Index: netkit-telnet-0.17-new/telnetd/telnetd.c
===================================================================
--- netkit-telnet-0.17-new/telnetd/telnetd.c	(nonexistent)
+++ netkit-telnet-0.17-new/telnetd/telnetd.c	(revision 5)
@@ -0,0 +1,1164 @@
+/*
+ * Copyright (c) 1989 Regents of the University of California.
+ * All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ * 1. Redistributions of source code must retain the above copyright
+ *    notice, this list of conditions and the following disclaimer.
+ * 2. Redistributions in binary form must reproduce the above copyright
+ *    notice, this list of conditions and the following disclaimer in the
+ *    documentation and/or other materials provided with the distribution.
+ * 3. All advertising materials mentioning features or use of this software
+ *    must display the following acknowledgement:
+ *	This product includes software developed by the University of
+ *	California, Berkeley and its contributors.
+ * 4. Neither the name of the University nor the names of its contributors
+ *    may be used to endorse or promote products derived from this software
+ *    without specific prior written permission.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+ * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+ * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+ * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+ * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+ * SUCH DAMAGE.
+ */
+
+char copyright[] =
+  "@(#) Copyright (c) 1989 Regents of the University of California.\n"
+  "All rights reserved.\n";
+
+/*
+ * From: @(#)telnetd.c	5.48 (Berkeley) 3/1/91
+ */
+char telnetd_rcsid[] = 
+  "$Id: telnetd.c,v 1.24 2000/04/12 21:36:12 dholland Exp $";
+
+#include "../version.h"
+
+#include <netdb.h>
+#include <termcap.h>
+#include <netinet/in.h>
+/* #include <netinet/ip.h> */ /* Don't think this is used at all here */
+#include <arpa/inet.h>
+#include <assert.h>
+#include "telnetd.h"
+#include "pathnames.h"
+#include "setproctitle.h"
+
+#if	defined(AUTHENTICATE)
+#include <libtelnet/auth.h>
+#include <libtelnet/auth-proto.h>
+#include <libtelnet/misc-proto.h>
+int	auth_level = 0;
+#endif
+#if	defined(SecurID)
+int	require_SecurID = 0;
+#endif
+
+/* In Linux, this is an enum */
+#if defined(__linux__) || defined(IPPROTO_IP)
+#define HAS_IPPROTO_IP
+#endif
+
+static void doit(struct sockaddr_in *who);
+static int terminaltypeok(const char *s);
+
+/*
+ * I/O data buffers,
+ * pointers, and counters.
+ */
+char	ptyibuf[BUFSIZ], *ptyip = ptyibuf;
+char	ptyibuf2[BUFSIZ];
+
+int	hostinfo = 1;			/* do we print login banner? */
+
+int debug = 0;
+int keepalive = 1;
+char *loginprg = _PATH_LOGIN;
+char *progname;
+
+extern void usage(void);
+
+int
+main(int argc, char *argv[], char *env[])
+{
+	struct sockaddr_in from;
+	int on = 1;
+	socklen_t fromlen;
+	register int ch;
+
+#if	defined(HAS_IPPROTO_IP) && defined(IP_TOS)
+	int tos = -1;
+#endif
+
+	initsetproctitle(argc, argv, env);
+
+	pfrontp = pbackp = ptyobuf;
+	netip = netibuf;
+	nfrontp = nbackp = netobuf;
+#if	defined(ENCRYPT)
+	nclearto = 0;
+#endif
+
+	progname = *argv;
+
+	while ((ch = getopt(argc, argv, "d:a:e:lhnr:I:D:B:sS:a:X:L:")) != EOF) {
+		switch(ch) {
+
+#ifdef	AUTHENTICATE
+		case 'a':
+			/*
+			 * Check for required authentication level
+			 */
+			if (strcmp(optarg, "debug") == 0) {
+				extern int auth_debug_mode;
+				auth_debug_mode = 1;
+			} else if (strcasecmp(optarg, "none") == 0) {
+				auth_level = 0;
+			} else if (strcasecmp(optarg, "other") == 0) {
+				auth_level = AUTH_OTHER;
+			} else if (strcasecmp(optarg, "user") == 0) {
+				auth_level = AUTH_USER;
+			} else if (strcasecmp(optarg, "valid") == 0) {
+				auth_level = AUTH_VALID;
+			} else if (strcasecmp(optarg, "off") == 0) {
+				/*
+				 * This hack turns off authentication
+				 */
+				auth_level = -1;
+			} else {
+				fprintf(stderr,
+			    "telnetd: unknown authorization level for -a\n");
+			}
+			break;
+#endif	/* AUTHENTICATE */
+
+#ifdef BFTPDAEMON
+		case 'B':
+			bftpd++;
+			break;
+#endif /* BFTPDAEMON */
+
+		case 'd':
+			if (strcmp(optarg, "ebug") == 0) {
+				debug++;
+				break;
+			}
+			usage();
+			/* NOTREACHED */
+			break;
+
+#ifdef DIAGNOSTICS
+		case 'D':
+			/*
+			 * Check for desired diagnostics capabilities.
+			 */
+			if (!strcmp(optarg, "report")) {
+				diagnostic |= TD_REPORT|TD_OPTIONS;
+			} else if (!strcmp(optarg, "exercise")) {
+				diagnostic |= TD_EXERCISE;
+			} else if (!strcmp(optarg, "netdata")) {
+				diagnostic |= TD_NETDATA;
+			} else if (!strcmp(optarg, "ptydata")) {
+				diagnostic |= TD_PTYDATA;
+			} else if (!strcmp(optarg, "options")) {
+				diagnostic |= TD_OPTIONS;
+			} else {
+				usage();
+				/* NOT REACHED */
+			}
+			break;
+#endif /* DIAGNOSTICS */
+
+#ifdef	AUTHENTICATE
+		case 'e':
+			if (strcmp(optarg, "debug") == 0) {
+				extern int auth_debug_mode;
+				auth_debug_mode = 1;
+				break;
+			}
+			usage();
+			/* NOTREACHED */
+			break;
+#endif	/* AUTHENTICATE */
+
+		case 'h':
+			hostinfo = 0;
+			break;
+
+#ifdef	LINEMODE
+		case 'l':
+			alwayslinemode = 1;
+			break;
+#endif	/* LINEMODE */
+
+		case 'L':
+			loginprg = strdup(optarg);
+			/* XXX what if strdup fails? */
+			break;
+
+		case 'n':
+			keepalive = 0;
+			break;
+
+#ifdef	SecurID
+		case 's':
+			/* SecurID required */
+			require_SecurID = 1;
+			break;
+#endif	/* SecurID */
+		case 'S':
+#ifdef	HAS_GETTOS
+			if ((tos = parsetos(optarg, "tcp")) < 0)
+				fprintf(stderr, "%s%s%s\n",
+					"telnetd: Bad TOS argument '", optarg,
+					"'; will try to use default TOS");
+#else
+			fprintf(stderr, "%s%s\n", "TOS option unavailable; ",
+						"-S flag not supported\n");
+#endif
+			break;
+
+#ifdef	AUTHENTICATE
+		case 'X':
+			/*
+			 * Check for invalid authentication types
+			 */
+			auth_disable_name(optarg);
+			break;
+#endif	/* AUTHENTICATE */
+
+		default:
+			fprintf(stderr, "telnetd: %c: unknown option\n", ch);
+			/* FALLTHROUGH */
+		case '?':
+			usage();
+			/* NOTREACHED */
+		}
+	}
+
+	argc -= optind;
+	argv += optind;
+
+	if (debug) {
+	    int s, ns;
+	    socklen_t foo;
+	    struct servent *sp;
+	    struct sockaddr_in sn;
+
+	    memset(&sn, 0, sizeof(sn));
+	    sn.sin_family = AF_INET;
+
+	    if (argc > 1) {
+		usage();
+		/* NOTREACHED */
+	    } else if (argc == 1) {
+		    if ((sp = getservbyname(*argv, "tcp"))!=NULL) {
+			sn.sin_port = sp->s_port;
+		    } 
+		    else {
+			int pt = atoi(*argv);
+			if (pt <= 0) {
+			    fprintf(stderr, "telnetd: %s: bad port number\n",
+				    *argv);
+			    usage();
+			    /* NOTREACHED */
+			}
+			sn.sin_port = htons(pt);
+		   }
+	    } else {
+		sp = getservbyname("telnet", "tcp");
+		if (sp == 0) {
+		    fprintf(stderr, "telnetd: tcp/telnet: unknown service\n");
+		    exit(1);
+		}
+		sn.sin_port = sp->s_port;
+	    }
+
+	    s = socket(AF_INET, SOCK_STREAM, 0);
+	    if (s < 0) {
+		    perror("telnetd: socket");;
+		    exit(1);
+	    }
+	    (void) setsockopt(s, SOL_SOCKET, SO_REUSEADDR, &on, sizeof(on));
+	    if (bind(s, (struct sockaddr *)&sn, sizeof(sn)) < 0) {
+		perror("bind");
+		exit(1);
+	    }
+	    if (listen(s, 1) < 0) {
+		perror("listen");
+		exit(1);
+	    }
+	    foo = sizeof(sn);
+	    ns = accept(s, (struct sockaddr *)&sn, &foo);
+	    if (ns < 0) {
+		perror("accept");
+		exit(1);
+	    }
+	    (void) dup2(ns, 0);
+	    (void) close(ns);
+	    (void) close(s);
+	} else if (argc > 0) {
+		usage();
+		/* NOT REACHED */
+	}
+
+	openlog("telnetd", LOG_PID | LOG_ODELAY, LOG_DAEMON);
+	fromlen = sizeof (from);
+	if (getpeername(0, (struct sockaddr *)&from, &fromlen) < 0) {
+		fprintf(stderr, "%s: ", progname);
+		perror("getpeername");
+		_exit(1);
+	}
+	if (keepalive &&
+	    setsockopt(0, SOL_SOCKET, SO_KEEPALIVE, &on, sizeof (on)) < 0) {
+		syslog(LOG_WARNING, "setsockopt (SO_KEEPALIVE): %m");
+	}
+
+#if	defined(HAS_IPPROTO_IP) && defined(IP_TOS)
+	{
+# if	defined(HAS_GETTOS)
+		struct tosent *tp;
+		if (tos < 0 && (tp = gettosbyname("telnet", "tcp")))
+			tos = tp->t_tos;
+# endif
+		if (tos < 0)
+			tos = 020;	/* Low Delay bit */
+		if (tos
+		   && (setsockopt(0, IPPROTO_IP, IP_TOS, &tos, sizeof(tos)) < 0)
+		   && (errno != ENOPROTOOPT) )
+			syslog(LOG_WARNING, "setsockopt (IP_TOS): %m");
+	}
+#endif	/* defined(HAS_IPPROTO_IP) && defined(IP_TOS) */
+	net = 0;
+	doit(&from);
+	/* NOTREACHED */
+	return 0;
+}  /* end of main */
+
+void
+usage(void)
+{
+	fprintf(stderr, "Usage: telnetd");
+#ifdef	AUTHENTICATE
+	fprintf(stderr, " [-a (debug|other|user|valid|off)]\n\t");
+#endif
+#ifdef BFTPDAEMON
+	fprintf(stderr, " [-B]");
+#endif
+	fprintf(stderr, " [-debug]");
+#ifdef DIAGNOSTICS
+	fprintf(stderr, " [-D (options|report|exercise|netdata|ptydata)]\n\t");
+#endif
+#ifdef	AUTHENTICATE
+	fprintf(stderr, " [-edebug]");
+#endif
+	fprintf(stderr, " [-h]");
+#ifdef LINEMODE
+	fprintf(stderr, " [-l]");
+#endif
+	fprintf(stderr, " [-L login_program]");
+	fprintf(stderr, " [-n]");
+#ifdef	SecurID
+	fprintf(stderr, " [-s]");
+#endif
+#ifdef	AUTHENTICATE
+	fprintf(stderr, " [-X auth-type]");
+#endif
+	fprintf(stderr, " [port]\n");
+	exit(1);
+}
+
+/*
+ * getterminaltype
+ *
+ *	Ask the other end to send along its terminal type and speed.
+ * Output is the variable terminaltype filled in.
+ */
+
+static void _gettermname(void);
+
+static
+int
+getterminaltype(char *name)
+{
+    int retval = -1;
+    (void)name;
+
+    settimer(baseline);
+#if defined(AUTHENTICATE)
+    /*
+     * Handle the Authentication option before we do anything else.
+     */
+    send_do(TELOPT_AUTHENTICATION, 1);
+    while (his_will_wont_is_changing(TELOPT_AUTHENTICATION))
+	ttloop();
+    if (his_state_is_will(TELOPT_AUTHENTICATION)) {
+	retval = auth_wait(name);
+    }
+#endif
+
+#if	defined(ENCRYPT)
+    send_will(TELOPT_ENCRYPT, 1);
+#endif
+    send_do(TELOPT_TTYPE, 1);
+    send_do(TELOPT_TSPEED, 1);
+    send_do(TELOPT_XDISPLOC, 1);
+    send_do(TELOPT_ENVIRON, 1);
+    while (
+#if	defined(ENCRYPT)
+	   his_do_dont_is_changing(TELOPT_ENCRYPT) ||
+#endif
+	   his_will_wont_is_changing(TELOPT_TTYPE) ||
+	   his_will_wont_is_changing(TELOPT_TSPEED) ||
+	   his_will_wont_is_changing(TELOPT_XDISPLOC) ||
+	   his_will_wont_is_changing(TELOPT_ENVIRON)) {
+	ttloop();
+    }
+#if	defined(ENCRYPT)
+    /*
+     * Wait for the negotiation of what type of encryption we can
+     * send with.  If autoencrypt is not set, this will just return.
+     */
+    if (his_state_is_will(TELOPT_ENCRYPT)) {
+	encrypt_wait();
+    }
+#endif
+    if (his_state_is_will(TELOPT_TSPEED)) {
+	netoprintf("%c%c%c%c%c%c", 
+		   IAC, SB, TELOPT_TSPEED, TELQUAL_SEND, IAC, SE);
+    }
+    if (his_state_is_will(TELOPT_XDISPLOC)) {
+	netoprintf("%c%c%c%c%c%c", 
+		   IAC, SB, TELOPT_XDISPLOC, TELQUAL_SEND, IAC, SE);
+    }
+    if (his_state_is_will(TELOPT_ENVIRON)) {
+	netoprintf("%c%c%c%c%c%c", 
+		   IAC, SB, TELOPT_ENVIRON, TELQUAL_SEND, IAC, SE);
+    }
+    if (his_state_is_will(TELOPT_TTYPE)) {
+       netoprintf("%c%c%c%c%c%c", 
+		  IAC, SB, TELOPT_TTYPE, TELQUAL_SEND, IAC, SE);
+    }
+    if (his_state_is_will(TELOPT_TSPEED)) {
+	while (sequenceIs(tspeedsubopt, baseline))
+	    ttloop();
+    }
+    if (his_state_is_will(TELOPT_XDISPLOC)) {
+	while (sequenceIs(xdisplocsubopt, baseline))
+	    ttloop();
+    }
+    if (his_state_is_will(TELOPT_ENVIRON)) {
+	while (sequenceIs(environsubopt, baseline))
+	    ttloop();
+    }
+    if (his_state_is_will(TELOPT_TTYPE)) {
+	char first[256], last[256];
+
+	while (sequenceIs(ttypesubopt, baseline))
+	    ttloop();
+
+	/*
+	 * If the other side has already disabled the option, then
+	 * we have to just go with what we (might) have already gotten.
+	 */
+	if (his_state_is_will(TELOPT_TTYPE) && !terminaltypeok(terminaltype)) {
+	    /*
+	     * Due to state.c, terminaltype points to a static char[41].
+	     * Therefore, this assert cannot fail, and therefore, strings
+	     * arising from "terminaltype" can be safely strcpy'd into
+	     * first[] or last[].
+	     */
+	    assert(strlen(terminaltype) < sizeof(first));
+
+	    strcpy(first, terminaltype);
+
+	    for(;;) {
+		/*
+		 * Save the unknown name, and request the next name.
+		 */
+		strcpy(last, terminaltype);
+
+		_gettermname();
+		assert(strlen(terminaltype) < sizeof(first));
+
+		if (terminaltypeok(terminaltype))
+		    break;
+
+		if (!strcmp(last, terminaltype) ||
+		    his_state_is_wont(TELOPT_TTYPE)) {
+		    /*
+		     * We've hit the end.  If this is the same as
+		     * the first name, just go with it.
+		     */
+		    if (!strcmp(first, terminaltype))
+			break;
+		    /*
+		     * Get the terminal name one more time, so that
+		     * RFC1091 compliant telnets will cycle back to
+		     * the start of the list.
+		     */
+		     _gettermname();
+		    assert(strlen(terminaltype) < sizeof(first));
+
+		    if (strcmp(first, terminaltype)) {
+			/*
+			 * first[] came from terminaltype, so it must fit
+			 * back in.
+			 */
+			strcpy(terminaltype, first);
+		    }
+		    break;
+		}
+	    }
+	}
+    }
+    return(retval);
+}  /* end of getterminaltype */
+
+static
+void
+_gettermname(void)
+{
+    /*
+     * If the client turned off the option,
+     * we can't send another request, so we
+     * just return.
+     */
+    if (his_state_is_wont(TELOPT_TTYPE))
+	return;
+
+    settimer(baseline);
+    netoprintf("%c%c%c%c%c%c", IAC, SB, TELOPT_TTYPE, TELQUAL_SEND, IAC, SE);
+    while (sequenceIs(ttypesubopt, baseline))
+	ttloop();
+}
+
+static int
+terminaltypeok(const char *s)
+{
+    /* char buf[2048]; */
+
+    if (terminaltype == NULL)
+	return(1);
+
+    /*
+     * Fix from Chris Evans: if it has a / in it, termcap will
+     * treat it as a filename. Oops.
+     */
+    if (strchr(s, '/')) {
+	return 0;
+    }
+
+    /*
+     * If it's absurdly long, accept it without asking termcap.
+     *
+     * This means that it won't get seen again until after login,
+     * at which point exploiting buffer problems in termcap doesn't
+     * gain one anything.
+     *
+     * It's possible this limit ought to be raised to 128, but nothing
+     * in my termcap is more than 64, 64 is _plenty_ for most, and while
+     * buffers aren't likely to be smaller than 64, they might be 80 and
+     * thus less than 128.
+     */
+    if (strlen(s) > 63) {
+       return 0;
+    }
+
+    /*
+     * tgetent() will return 1 if the type is known, and
+     * 0 if it is not known.  If it returns -1, it couldn't
+     * open the database.  But if we can't open the database,
+     * it won't help to say we failed, because we won't be
+     * able to verify anything else.  So, we treat -1 like 1.
+     */
+
+    /*
+     * Don't do this - tgetent is not really trustworthy. Assume
+     * the terminal type is one we know; terminal types are pretty
+     * standard now. And if it isn't, it's unlikely we're going to
+     * know anything else the remote telnet might send as an alias
+     * for it.
+     *
+     * if (tgetent(buf, s) == 0)
+     *    return(0);
+     */
+    return(1);
+}
+
+#ifndef	MAXHOSTNAMELEN
+#define	MAXHOSTNAMELEN 64
+#endif	/* MAXHOSTNAMELEN */
+
+char host_name[MAXHOSTNAMELEN];
+char remote_host_name[MAXHOSTNAMELEN];
+
+extern void telnet(int, int);
+
+/*
+ * Get a pty, scan input lines.
+ */
+static void
+doit(struct sockaddr_in *who)
+{
+	const char *host;
+	struct hostent *hp;
+	int level;
+	char user_name[256];
+
+	/*
+	 * Find an available pty to use.
+	 */
+	pty = getpty();
+	if (pty < 0)
+		fatal(net, "All network ports in use");
+
+	/* get name of connected client */
+	hp = gethostbyaddr((char *)&who->sin_addr, sizeof (struct in_addr),
+		who->sin_family);
+	if (hp)
+		host = hp->h_name;
+	else
+		host = inet_ntoa(who->sin_addr);
+
+	/*
+	 * We must make a copy because Kerberos is probably going
+	 * to also do a gethost* and overwrite the static data...
+	 */
+	{
+		int i;
+		strncpy(remote_host_name, host, sizeof(remote_host_name)-1);
+		remote_host_name[sizeof(remote_host_name)-1] = 0;
+
+		/* Disallow funnies. */
+		for (i=0; remote_host_name[i]; i++) {
+		    if (remote_host_name[i]<=32 || remote_host_name[i]>126) 
+			remote_host_name[i] = '?';
+		}
+	}
+	host = remote_host_name;
+
+	/* Get local host name */
+	{
+		struct hostent *h;
+		gethostname(host_name, sizeof(host_name));
+		h = gethostbyname(host_name);
+		if (h) {
+		    strncpy(host_name, h->h_name, sizeof(host_name));
+		    host_name[sizeof(host_name)-1] = 0;
+		}
+	}
+
+#if	defined(AUTHENTICATE) || defined(ENCRYPT)
+	auth_encrypt_init(host_name, host, "TELNETD", 1);
+#endif
+
+	init_env();
+	/*
+	 * get terminal type.
+	 */
+	*user_name = 0;
+	level = getterminaltype(user_name);
+	setenv("TERM", terminaltype ? terminaltype : "network", 1);
+
+	/* TODO list stuff provided by Laszlo Vecsey <master@internexus.net> */
+
+	/*
+	 * Set REMOTEHOST environment variable
+	 */
+	setproctitle("%s", host);
+	setenv("REMOTEHOST", host, 0);
+
+	/*
+	 * Start up the login process on the slave side of the terminal
+	 */
+	startslave(host, level, user_name);
+
+	telnet(net, pty);  /* begin server processing */
+
+	/*NOTREACHED*/
+}  /* end of doit */
+
+/*
+ * Main loop.  Select from pty and network, and
+ * hand data to telnet receiver finite state machine.
+ */
+void telnet(int f, int p)
+{
+    int on = 1;
+    char *HE;
+    const char *IM;
+
+    /*
+     * Initialize the slc mapping table.
+     */
+    get_slc_defaults();
+
+    /*
+     * Do some tests where it is desireable to wait for a response.
+     * Rather than doing them slowly, one at a time, do them all
+     * at once.
+     */
+    if (my_state_is_wont(TELOPT_SGA))
+	send_will(TELOPT_SGA, 1);
+    /*
+     * Is the client side a 4.2 (NOT 4.3) system?  We need to know this
+     * because 4.2 clients are unable to deal with TCP urgent data.
+     *
+     * To find out, we send out a "DO ECHO".  If the remote system
+     * answers "WILL ECHO" it is probably a 4.2 client, and we note
+     * that fact ("WILL ECHO" ==> that the client will echo what
+     * WE, the server, sends it; it does NOT mean that the client will
+     * echo the terminal input).
+     */
+    send_do(TELOPT_ECHO, 1);
+    
+#ifdef	LINEMODE
+    if (his_state_is_wont(TELOPT_LINEMODE)) {
+	/*
+	 * Query the peer for linemode support by trying to negotiate
+	 * the linemode option.
+	 */
+	linemode = 0;
+	editmode = 0;
+	send_do(TELOPT_LINEMODE, 1);  /* send do linemode */
+    }
+#endif	/* LINEMODE */
+
+    /*
+     * Send along a couple of other options that we wish to negotiate.
+     */
+    send_do(TELOPT_NAWS, 1);
+    send_will(TELOPT_STATUS, 1);
+    flowmode = 1;  /* default flow control state */
+    send_do(TELOPT_LFLOW, 1);
+    
+    /*
+     * Spin, waiting for a response from the DO ECHO.  However,
+     * some REALLY DUMB telnets out there might not respond
+     * to the DO ECHO.  So, we spin looking for NAWS, (most dumb
+     * telnets so far seem to respond with WONT for a DO that
+     * they don't understand...) because by the time we get the
+     * response, it will already have processed the DO ECHO.
+     * Kludge upon kludge.
+     */
+    while (his_will_wont_is_changing(TELOPT_NAWS)) {
+	ttloop();
+    }
+    
+    /*
+     * But...
+     * The client might have sent a WILL NAWS as part of its
+     * startup code; if so, we'll be here before we get the
+     * response to the DO ECHO.  We'll make the assumption
+     * that any implementation that understands about NAWS
+     * is a modern enough implementation that it will respond
+     * to our DO ECHO request; hence we'll do another spin
+     * waiting for the ECHO option to settle down, which is
+     * what we wanted to do in the first place...
+     */
+    if (his_want_state_is_will(TELOPT_ECHO) &&
+	his_state_is_will(TELOPT_NAWS)) {
+	while (his_will_wont_is_changing(TELOPT_ECHO))
+	    ttloop();
+    }
+    /*
+     * On the off chance that the telnet client is broken and does not
+     * respond to the DO ECHO we sent, (after all, we did send the
+     * DO NAWS negotiation after the DO ECHO, and we won't get here
+     * until a response to the DO NAWS comes back) simulate the
+     * receipt of a will echo.  This will also send a WONT ECHO
+     * to the client, since we assume that the client failed to
+     * respond because it believes that it is already in DO ECHO
+     * mode, which we do not want.
+     */
+    if (his_want_state_is_will(TELOPT_ECHO)) {
+	DIAG(TD_OPTIONS, netoprintf("td: simulating recv\r\n"););
+	willoption(TELOPT_ECHO);
+    }
+    
+    /*
+     * Finally, to clean things up, we turn on our echo.  This
+     * will break stupid 4.2 telnets out of local terminal echo.
+     */
+    
+    if (my_state_is_wont(TELOPT_ECHO))
+	send_will(TELOPT_ECHO, 1);
+    
+    /*
+     * Turn on packet mode
+     */
+    ioctl(p, TIOCPKT, (char *)&on);
+#if defined(LINEMODE) && defined(KLUDGELINEMODE)
+    /*
+     * Continuing line mode support.  If client does not support
+     * real linemode, attempt to negotiate kludge linemode by sending
+     * the do timing mark sequence.
+     */
+    if (lmodetype < REAL_LINEMODE)
+	send_do(TELOPT_TM, 1);
+#endif	/* defined(LINEMODE) && defined(KLUDGELINEMODE) */
+    
+    /*
+     * Call telrcv() once to pick up anything received during
+     * terminal type negotiation, 4.2/4.3 determination, and
+     * linemode negotiation.
+     */
+    telrcv();
+    
+    ioctl(f, FIONBIO, (char *)&on);
+    ioctl(p, FIONBIO, (char *)&on);
+
+#if defined(SO_OOBINLINE)
+    setsockopt(net, SOL_SOCKET, SO_OOBINLINE, &on, sizeof on);
+#endif	/* defined(SO_OOBINLINE) */
+    
+#ifdef	SIGTSTP
+    signal(SIGTSTP, SIG_IGN);
+#endif
+#ifdef	SIGTTOU
+    /*
+     * Ignoring SIGTTOU keeps the kernel from blocking us
+     * in ttioct() in /sys/tty.c.
+     */
+    signal(SIGTTOU, SIG_IGN);
+#endif
+    
+    signal(SIGCHLD, cleanup);
+    
+#ifdef TIOCNOTTY
+    {
+	register int t;
+	t = open(_PATH_TTY, O_RDWR);
+	if (t >= 0) {
+	    (void) ioctl(t, TIOCNOTTY, (char *)0);
+	    (void) close(t);
+	}
+    }
+#endif
+    
+    /*
+     * Show banner that getty never gave.
+     *
+     * We put the banner in the pty input buffer.  This way, it
+     * gets carriage return null processing, etc., just like all
+     * other pty --> client data.
+     */
+    
+    if (getenv("USER"))
+	hostinfo = 0;
+    
+    IM = DEFAULT_IM;
+    HE = 0;
+
+    edithost(HE, host_name);
+    if (hostinfo && *IM)
+	putf(IM, ptyibuf2);
+    
+    if (pcc) strncat(ptyibuf2, ptyip, pcc+1);
+    ptyip = ptyibuf2;
+    pcc = strlen(ptyip);
+#ifdef LINEMODE
+    /*
+     * Last check to make sure all our states are correct.
+     */
+    init_termbuf();
+    localstat();
+#endif	/* LINEMODE */
+
+    DIAG(TD_REPORT, netoprintf("td: Entering processing loop\r\n"););
+    
+    for (;;) {
+	fd_set ibits, obits, xbits;
+	int c, hifd;
+	
+	if (ncc < 0 && pcc < 0)
+	    break;
+	
+	FD_ZERO(&ibits);
+	FD_ZERO(&obits);
+	FD_ZERO(&xbits);
+	hifd=0;
+	/*
+	 * Never look for input if there's still
+	 * stuff in the corresponding output buffer
+	 */
+	if (nfrontp - nbackp || pcc > 0) {
+	    FD_SET(f, &obits);
+	    if (f >= hifd) hifd = f+1;
+	} 
+	else {
+	    FD_SET(p, &ibits);
+	    if (p >= hifd) hifd = p+1;
+	}
+	if (pfrontp - pbackp || ncc > 0) {
+	    FD_SET(p, &obits);
+	    if (p >= hifd) hifd = p+1;
+	} 
+	else {
+	    FD_SET(f, &ibits);
+	    if (f >= hifd) hifd = f+1;
+	}
+	if (!SYNCHing) {
+	    FD_SET(f, &xbits);
+	    if (f >= hifd) hifd = f+1;
+	}
+	if ((c = select(hifd, &ibits, &obits, &xbits,
+			(struct timeval *)0)) < 1) {
+	    if (c == -1) {
+		if (errno == EINTR) {
+		    continue;
+		}
+	    }
+	    sleep(5);
+	    continue;
+	}
+	
+	/*
+	 * Any urgent data?
+	 */
+	if (FD_ISSET(net, &xbits)) {
+	    SYNCHing = 1;
+	}
+	
+	/*
+	 * Something to read from the network...
+	 */
+	if (FD_ISSET(net, &ibits)) {
+#if !defined(SO_OOBINLINE)
+	    /*
+	     * In 4.2 (and 4.3 beta) systems, the
+	     * OOB indication and data handling in the kernel
+	     * is such that if two separate TCP Urgent requests
+	     * come in, one byte of TCP data will be overlaid.
+	     * This is fatal for Telnet, but we try to live
+	     * with it.
+	     *
+	     * In addition, in 4.2 (and...), a special protocol
+	     * is needed to pick up the TCP Urgent data in
+	     * the correct sequence.
+	     *
+	     * What we do is:  if we think we are in urgent
+	     * mode, we look to see if we are "at the mark".
+	     * If we are, we do an OOB receive.  If we run
+	     * this twice, we will do the OOB receive twice,
+	     * but the second will fail, since the second
+	     * time we were "at the mark", but there wasn't
+	     * any data there (the kernel doesn't reset
+	     * "at the mark" until we do a normal read).
+	     * Once we've read the OOB data, we go ahead
+	     * and do normal reads.
+	     *
+	     * There is also another problem, which is that
+	     * since the OOB byte we read doesn't put us
+	     * out of OOB state, and since that byte is most
+	     * likely the TELNET DM (data mark), we would
+	     * stay in the TELNET SYNCH (SYNCHing) state.
+	     * So, clocks to the rescue.  If we've "just"
+	     * received a DM, then we test for the
+	     * presence of OOB data when the receive OOB
+	     * fails (and AFTER we did the normal mode read
+	     * to clear "at the mark").
+	     */
+	    if (SYNCHing) {
+		int atmark;
+		
+		ioctl(net, SIOCATMARK, (char *)&atmark);
+		if (atmark) {
+		    ncc = recv(net, netibuf, sizeof (netibuf), MSG_OOB);
+		    if ((ncc == -1) && (errno == EINVAL)) {
+			ncc = read(net, netibuf, sizeof (netibuf));
+			if (sequenceIs(didnetreceive, gotDM)) {
+			    SYNCHing = stilloob(net);
+			}
+		    }
+		} 
+		else {
+		    ncc = read(net, netibuf, sizeof (netibuf));
+		}
+	    } 
+	    else {
+		ncc = read(net, netibuf, sizeof (netibuf));
+	    }
+	    settimer(didnetreceive);
+#else	/* !defined(SO_OOBINLINE)) */
+	    ncc = read(net, netibuf, sizeof (netibuf));
+#endif	/* !defined(SO_OOBINLINE)) */
+	    if (ncc < 0 && errno == EWOULDBLOCK)
+		ncc = 0;
+	    else {
+		if (ncc <= 0) {
+		    break;
+		}
+		netip = netibuf;
+	    }
+	    DIAG((TD_REPORT | TD_NETDATA),
+		 netoprintf("td: netread %d chars\r\n", ncc););
+	    DIAG(TD_NETDATA, printdata("nd", netip, ncc));
+	}
+	
+	/*
+	 * Something to read from the pty...
+	 */
+	if (FD_ISSET(p, &ibits)) {
+	    pcc = read(p, ptyibuf, BUFSIZ);
+	    /*
+	     * On some systems, if we try to read something
+	     * off the master side before the slave side is
+	     * opened, we get EIO.
+	     */
+	    if (pcc < 0 && (errno == EWOULDBLOCK || errno == EIO)) {
+		pcc = 0;
+	    } 
+	    else {
+		if (pcc <= 0)
+		    break;
+#ifdef	LINEMODE
+				/*
+				 * If ioctl from pty, pass it through net
+				 */
+		if (ptyibuf[0] & TIOCPKT_IOCTL) {
+		    copy_termbuf(ptyibuf+1, pcc-1);
+		    localstat();
+		    pcc = 1;
+		}
+#endif	/* LINEMODE */
+		if (ptyibuf[0] & TIOCPKT_FLUSHWRITE) {
+		    netclear();	/* clear buffer back */
+#ifndef	NO_URGENT
+		    /*
+		     * There are client telnets on some
+		     * operating systems get screwed up
+		     * royally if we send them urgent
+		     * mode data.
+		     */
+		    netoprintf("%c%c", IAC, DM);
+		    neturg = nfrontp-1; /* off by one XXX */
+#endif
+		}
+		if (his_state_is_will(TELOPT_LFLOW) &&
+		    (ptyibuf[0] &
+		     (TIOCPKT_NOSTOP|TIOCPKT_DOSTOP))) {
+			netoprintf("%c%c%c%c%c%c",
+				   IAC, SB, TELOPT_LFLOW,
+				   ptyibuf[0] & TIOCPKT_DOSTOP ? 1 : 0,
+				   IAC, SE);
+		}
+		pcc--;
+		ptyip = ptyibuf+1;
+	    }
+	}
+	
+	while (pcc > 0) {
+	    if ((&netobuf[BUFSIZ] - nfrontp) < 2)
+		break;
+	    c = *ptyip++ & 0377, pcc--;
+	    if (c == IAC)
+		*nfrontp++ = c;
+	    *nfrontp++ = c;
+	    if ((c == '\r'  ) && (my_state_is_wont(TELOPT_BINARY))) {
+		if (pcc > 0 && ((*ptyip & 0377) == '\n')) {
+		    *nfrontp++ = *ptyip++ & 0377;
+		    pcc--;
+		} 
+		else *nfrontp++ = '\0';
+	    }
+	}
+
+	if (FD_ISSET(f, &obits) && (nfrontp - nbackp) > 0)
+	    netflush();
+	if (ncc > 0)
+	    telrcv();
+	if (FD_ISSET(p, &obits) && (pfrontp - pbackp) > 0)
+	    ptyflush();
+    }
+    cleanup(0);
+}  /* end of telnet */
+	
+#ifndef	TCSIG
+# ifdef	TIOCSIG
+#  define TCSIG TIOCSIG
+# endif
+#endif
+
+/*
+ * Send interrupt to process on other side of pty.
+ * If it is in raw mode, just write NULL;
+ * otherwise, write intr char.
+ */
+void interrupt(void) {
+    ptyflush();	/* half-hearted */
+    
+#ifdef	TCSIG
+    (void) ioctl(pty, TCSIG, (char *)SIGINT);
+#else	/* TCSIG */
+    init_termbuf();
+    *pfrontp++ = slctab[SLC_IP].sptr ?
+	 (unsigned char)*slctab[SLC_IP].sptr : '\177';
+#endif	/* TCSIG */
+}
+
+/*
+ * Send quit to process on other side of pty.
+ * If it is in raw mode, just write NULL;
+ * otherwise, write quit char.
+ */
+void sendbrk(void) {
+    ptyflush();	/* half-hearted */
+#ifdef	TCSIG
+    (void) ioctl(pty, TCSIG, (char *)SIGQUIT);
+#else	/* TCSIG */
+    init_termbuf();
+    *pfrontp++ = slctab[SLC_ABORT].sptr ?
+	 (unsigned char)*slctab[SLC_ABORT].sptr : '\034';
+#endif	/* TCSIG */
+}
+
+void sendsusp(void) {
+#ifdef	SIGTSTP
+    ptyflush();	/* half-hearted */
+# ifdef	TCSIG
+    (void) ioctl(pty, TCSIG, (char *)SIGTSTP);
+# else	/* TCSIG */
+    *pfrontp++ = slctab[SLC_SUSP].sptr ?
+	(unsigned char)*slctab[SLC_SUSP].sptr : '\032';
+# endif	/* TCSIG */
+#endif	/* SIGTSTP */
+}
+
+/*
+ * When we get an AYT, if ^T is enabled, use that.  Otherwise,
+ * just send back "[Yes]".
+ */
+void recv_ayt(void) {
+#if	defined(SIGINFO) && defined(TCSIG)
+    if (slctab[SLC_AYT].sptr && *slctab[SLC_AYT].sptr != _POSIX_VDISABLE) {
+	(void) ioctl(pty, TCSIG, (char *)SIGINFO);
+	return;
+    }
+#endif
+    netoprintf("\r\n[Yes]\r\n");
+}
+
+void doeof(void) {
+    init_termbuf();
+
+#if	defined(LINEMODE) && (VEOF == VMIN)
+    if (!tty_isediting()) {
+	extern char oldeofc;
+	*pfrontp++ = oldeofc;
+	return;
+    }
+#endif
+    *pfrontp++ = slctab[SLC_EOF].sptr ?
+	     (unsigned char)*slctab[SLC_EOF].sptr : '\004';
+}
Index: netkit-telnet-0.17-new/telnetd/utility.c
===================================================================
--- netkit-telnet-0.17-new/telnetd/utility.c	(nonexistent)
+++ netkit-telnet-0.17-new/telnetd/utility.c	(revision 5)
@@ -0,0 +1,1153 @@
+/*
+ * Copyright (c) 1989 Regents of the University of California.
+ * All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ * 1. Redistributions of source code must retain the above copyright
+ *    notice, this list of conditions and the following disclaimer.
+ * 2. Redistributions in binary form must reproduce the above copyright
+ *    notice, this list of conditions and the following disclaimer in the
+ *    documentation and/or other materials provided with the distribution.
+ * 3. All advertising materials mentioning features or use of this software
+ *    must display the following acknowledgement:
+ *	This product includes software developed by the University of
+ *	California, Berkeley and its contributors.
+ * 4. Neither the name of the University nor the names of its contributors
+ *    may be used to endorse or promote products derived from this software
+ *    without specific prior written permission.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+ * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+ * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+ * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+ * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+ * SUCH DAMAGE.
+ */
+
+/*
+ * From: @(#)utility.c	5.8 (Berkeley) 3/22/91
+ */
+char util_rcsid[] = 
+  "$Id: utility.c,v 1.11 1999/12/12 14:59:45 dholland Exp $";
+
+#define PRINTOPTIONS
+
+#include <stdarg.h>
+#include <sys/utsname.h>
+#include <time.h>
+
+#ifdef AUTHENTICATE
+#include <libtelnet/auth.h>
+#endif
+
+#include "telnetd.h"
+
+/*
+ * utility functions performing io related tasks
+ */
+
+void
+netoprintf(const char *fmt, ...)
+{
+   int len = 0, maxsize;
+   va_list ap;
+   int done=0;
+
+   while (!done) {
+      maxsize = sizeof(netobuf) - (nfrontp - netobuf);
+      if (maxsize < 0) {
+	/* no way this is gonna fit - try to flush some */
+	netflush();
+        maxsize = sizeof(netobuf) - (nfrontp - netobuf);
+	if (maxsize < 0)
+	  break;
+      }
+
+      va_start(ap, fmt);
+      len = vsnprintf(nfrontp, maxsize, fmt, ap);
+      va_end(ap);
+
+      if (len<=0 || len==maxsize) {
+	 /* didn't fit */
+	 netflush();
+      }
+      else {
+	 done = 1;
+      }
+   }
+   nfrontp += len;
+}
+
+/*
+ * ttloop
+ *
+ *	A small subroutine to flush the network output buffer, get some data
+ * from the network, and pass it through the telnet state machine.  We
+ * also flush the pty input buffer (by dropping its data) if it becomes
+ * too full.
+ */
+
+void
+ttloop(void)
+{
+
+    DIAG(TD_REPORT, netoprintf("td: ttloop\r\n"););
+		     
+    if (nfrontp-nbackp) {
+	netflush();
+    }
+    ncc = read(net, netibuf, sizeof(netibuf));
+    if (ncc < 0) {
+	syslog(LOG_INFO, "ttloop: read: %m\n");
+	exit(1);
+    } else if (ncc == 0) {
+	syslog(LOG_INFO, "ttloop: peer died: EOF\n");
+	exit(1);
+    }
+    DIAG(TD_REPORT, netoprintf("td: ttloop read %d chars\r\n", ncc););
+    netip = netibuf;
+    telrcv();			/* state machine */
+    if (ncc > 0) {
+	pfrontp = pbackp = ptyobuf;
+	telrcv();
+    }
+}  /* end of ttloop */
+
+/*
+ * Check a descriptor to see if out of band data exists on it.
+ */
+int stilloob(int s)		/* socket number */
+{
+    static struct timeval timeout = { 0, 0 };
+    fd_set	excepts;
+    int value;
+
+    do {
+	FD_ZERO(&excepts);
+	FD_SET(s, &excepts);
+	value = select(s+1, (fd_set *)0, (fd_set *)0, &excepts, &timeout);
+    } while ((value == -1) && (errno == EINTR));
+
+    if (value < 0) {
+	fatalperror(pty, "select");
+    }
+    if (FD_ISSET(s, &excepts)) {
+	return 1;
+    } else {
+	return 0;
+    }
+}
+
+void 	ptyflush(void)
+{
+	int n;
+
+	if ((n = pfrontp - pbackp) > 0) {
+		DIAG((TD_REPORT | TD_PTYDATA),
+		     netoprintf("td: ptyflush %d chars\r\n", n););
+		DIAG(TD_PTYDATA, printdata("pd", pbackp, n));
+		n = write(pty, pbackp, n);
+	}
+	if (n < 0) {
+		if (errno == EWOULDBLOCK || errno == EINTR)
+			return;
+		cleanup(0);
+	}
+	pbackp += n;
+	if (pbackp == pfrontp)
+		pbackp = pfrontp = ptyobuf;
+}
+
+/*
+ * nextitem()
+ *
+ *	Return the address of the next "item" in the TELNET data
+ * stream.  This will be the address of the next character if
+ * the current address is a user data character, or it will
+ * be the address of the character following the TELNET command
+ * if the current address is a TELNET IAC ("I Am a Command")
+ * character.
+ */
+static
+char *
+nextitem(char *current)
+{
+    if ((*current&0xff) != IAC) {
+	return current+1;
+    }
+    switch (*(current+1)&0xff) {
+    case DO:
+    case DONT:
+    case WILL:
+    case WONT:
+	return current+3;
+    case SB:		/* loop forever looking for the SE */
+	{
+	    register char *look = current+2;
+
+	    for (;;) {
+		if ((*look++&0xff) == IAC) {
+		    if ((*look++&0xff) == SE) {
+			return look;
+		    }
+		}
+	    }
+	}
+    default:
+	return current+2;
+    }
+}  /* end of nextitem */
+
+
+/*
+ * netclear()
+ *
+ *	We are about to do a TELNET SYNCH operation.  Clear
+ * the path to the network.
+ *
+ *	Things are a bit tricky since we may have sent the first
+ * byte or so of a previous TELNET command into the network.
+ * So, we have to scan the network buffer from the beginning
+ * until we are up to where we want to be.
+ *
+ *	A side effect of what we do, just to keep things
+ * simple, is to clear the urgent data pointer.  The principal
+ * caller should be setting the urgent data pointer AFTER calling
+ * us in any case.
+ */
+void netclear(void)
+{
+    register char *thisitem, *next;
+    char *good;
+#define	wewant(p)	((nfrontp > p) && ((*p&0xff) == IAC) && \
+				((*(p+1)&0xff) != EC) && ((*(p+1)&0xff) != EL))
+
+#if	defined(ENCRYPT)
+    thisitem = nclearto > netobuf ? nclearto : netobuf;
+#else
+    thisitem = netobuf;
+#endif
+
+    while ((next = nextitem(thisitem)) <= nbackp) {
+	thisitem = next;
+    }
+
+    /* Now, thisitem is first before/at boundary. */
+
+#if	defined(ENCRYPT)
+    good = nclearto > netobuf ? nclearto : netobuf;
+#else
+    good = netobuf;	/* where the good bytes go */
+#endif
+
+    while (nfrontp > thisitem) {
+	if (wewant(thisitem)) {
+	    int length;
+
+	    next = thisitem;
+	    do {
+		next = nextitem(next);
+	    } while (wewant(next) && (nfrontp > next));
+	    length = next-thisitem;
+	    bcopy(thisitem, good, length);
+	    good += length;
+	    thisitem = next;
+	} else {
+	    thisitem = nextitem(thisitem);
+	}
+    }
+
+    nbackp = netobuf;
+    nfrontp = good;		/* next byte to be sent */
+    neturg = 0;
+}  /* end of netclear */
+
+/*
+ *  netflush
+ *		Send as much data as possible to the network,
+ *	handling requests for urgent data.
+ */
+extern int not42;
+void
+netflush(void)
+{
+    int n;
+
+    if ((n = nfrontp - nbackp) > 0) {
+	DIAG(TD_REPORT,
+	    { netoprintf("td: netflush %d chars\r\n", n);
+	      n = nfrontp - nbackp;  /* update count */
+	    });
+#if	defined(ENCRYPT)
+	if (encrypt_output) {
+		char *s = nclearto ? nclearto : nbackp;
+		if (nfrontp - s > 0) {
+			(*encrypt_output)((unsigned char *)s, nfrontp-s);
+			nclearto = nfrontp;
+		}
+	}
+#endif
+	/*
+	 * if no urgent data, or if the other side appears to be an
+	 * old 4.2 client (and thus unable to survive TCP urgent data),
+	 * write the entire buffer in non-OOB mode.
+	 */
+	if ((neturg == 0) || (not42 == 0)) {
+	    n = write(net, nbackp, n);	/* normal write */
+	} else {
+	    n = neturg - nbackp;
+	    /*
+	     * In 4.2 (and 4.3) systems, there is some question about
+	     * what byte in a sendOOB operation is the "OOB" data.
+	     * To make ourselves compatible, we only send ONE byte
+	     * out of band, the one WE THINK should be OOB (though
+	     * we really have more the TCP philosophy of urgent data
+	     * rather than the Unix philosophy of OOB data).
+	     */
+	    if (n > 1) {
+		n = send(net, nbackp, n-1, 0);	/* send URGENT all by itself */
+	    } else {
+		n = send(net, nbackp, n, MSG_OOB);	/* URGENT data */
+	    }
+	}
+    }
+    if (n < 0) {
+	if (errno == EWOULDBLOCK || errno == EINTR)
+		return;
+	cleanup(0);
+    }
+    nbackp += n;
+#if	defined(ENCRYPT)
+    if (nbackp > nclearto)
+	nclearto = 0;
+#endif
+    if (nbackp >= neturg) {
+	neturg = 0;
+    }
+    if (nbackp == nfrontp) {
+	nbackp = nfrontp = netobuf;
+#if	defined(ENCRYPT)
+	nclearto = 0;
+#endif
+    }
+    return;
+}  /* end of netflush */
+
+
+/*
+ * writenet
+ *
+ * Just a handy little function to write a bit of raw data to the net.
+ * It will force a transmit of the buffer if necessary
+ *
+ * arguments
+ *    ptr - A pointer to a character string to write
+ *    len - How many bytes to write
+ */
+void writenet(register unsigned char *ptr, register int len)
+{
+	/* flush buffer if no room for new data) */
+	if ((&netobuf[BUFSIZ] - nfrontp) < len) {
+		/* if this fails, don't worry, buffer is a little big */
+		netflush();
+	}
+
+	bcopy(ptr, nfrontp, len);
+	nfrontp += len;
+
+}  /* end of writenet */
+
+
+/*
+ * miscellaneous functions doing a variety of little jobs follow ...
+ */
+
+
+void
+fatal(int f, const char *msg)
+{
+	char buf[BUFSIZ];
+
+	(void) snprintf(buf, sizeof(buf), "telnetd: %s.\r\n", msg);
+#if	defined(ENCRYPT)
+	if (encrypt_output) {
+		/*
+		 * Better turn off encryption first....
+		 * Hope it flushes...
+		 */
+		encrypt_send_end();
+		netflush();
+	}
+#endif
+	(void) write(f, buf, (int)strlen(buf));
+	sleep(1);	/*XXX*/
+	exit(1);
+}
+
+void
+fatalperror(int f, const char *msg)
+{
+	char buf[BUFSIZ];
+	snprintf(buf, sizeof(buf), "%s: %s\r\n", msg, strerror(errno));
+	fatal(f, buf);
+}
+
+char editedhost[32];
+struct utsname kerninfo;
+
+void
+edithost(const char *pat, const char *host)
+{
+	char *res = editedhost;
+
+	uname(&kerninfo);
+
+	if (!pat)
+		pat = "";
+	while (*pat) {
+		switch (*pat) {
+
+		case '#':
+			if (*host)
+				host++;
+			break;
+
+		case '@':
+			if (*host)
+				*res++ = *host++;
+			break;
+
+		default:
+			*res++ = *pat;
+			break;
+		}
+		if (res == &editedhost[sizeof editedhost - 1]) {
+			*res = '\0';
+			return;
+		}
+		pat++;
+	}
+	if (*host)
+		(void) strncpy(res, host,
+				sizeof editedhost - (res - editedhost) -1);
+	else
+		*res = '\0';
+	editedhost[sizeof editedhost - 1] = '\0';
+}
+
+static char *putlocation;
+
+static 
+void
+putstr(const char *s)
+{
+    while (*s) putchr(*s++);
+}
+
+void putchr(int cc)
+{
+	*putlocation++ = cc;
+}
+
+static char fmtstr[] = { "%H:%M on %A, %d %B %Y" };
+
+void putf(const char *cp, char *where)
+{
+	char *slash;
+	time_t t;
+	char db[100];
+
+	if (where)
+	putlocation = where;
+
+	while (*cp) {
+		if (*cp != '%') {
+			putchr(*cp++);
+			continue;
+		}
+		switch (*++cp) {
+
+		case 't':
+			slash = strrchr(line, '/');
+			if (slash == NULL)
+				putstr(line);
+			else
+				putstr(slash+1);
+			break;
+
+		case 'h':
+			putstr(editedhost);
+			break;
+
+		case 'd':
+			(void)time(&t);
+			(void)strftime(db, sizeof(db), fmtstr, localtime(&t));
+			putstr(db);
+			break;
+
+		case '%':
+			putchr('%');
+			break;
+
+		case 'D':
+			{
+				char	buff[128];
+
+				if (getdomainname(buff,sizeof(buff)) < 0
+					|| buff[0] == '\0'
+					|| strcmp(buff, "(none)") == 0)
+					break;
+				putstr(buff);
+			}
+			break;
+
+		case 'i':
+			{
+				char buff[3];
+				FILE *fp;
+				int p, c;
+
+				if ((fp = fopen(ISSUE_FILE, "r")) == NULL)
+					break;
+				p = '\n';
+				while ((c = fgetc(fp)) != EOF) {
+					if (p == '\n' && c == '#') {
+						do {
+							c = fgetc(fp);
+						} while (c != EOF && c != '\n');
+						continue;
+					} else if (c == '%') {
+						buff[0] = c;
+						c = fgetc(fp);
+						if (c == EOF) break;
+						buff[1] = c;
+						buff[2] = '\0';
+						putf(buff, NULL);
+					} else {
+						if (c == '\n') putchr('\r');
+						putchr(c);
+						p = c;
+					}
+				};
+				(void) fclose(fp);
+			}
+			return; /* ignore remainder of the banner string */
+			/*NOTREACHED*/
+
+		case 's':
+			putstr(kerninfo.sysname);
+			break;
+
+		case 'm':
+			putstr(kerninfo.machine);
+			break;
+
+		case 'r':
+			putstr(kerninfo.release);
+			break;
+
+		case 'v':
+#ifdef __linux__
+			putstr(kerninfo.version);
+#else
+			puts(kerninfo.version);
+#endif
+			break;
+		}
+		cp++;
+	}
+}
+
+#ifdef DIAGNOSTICS
+/*
+ * Print telnet options and commands in plain text, if possible.
+ */
+void
+printoption(const char *fmt, int option)
+{
+	if (TELOPT_OK(option))
+		netoprintf("%s %s\r\n", fmt, TELOPT(option));
+	else if (TELCMD_OK(option))
+		netoprintf("%s %s\r\n", fmt, TELCMD(option));
+	else
+		netoprintf("%s %d\r\n", fmt, option);
+}
+
+/* direction: '<' or '>' */
+/* pointer: where suboption data sits */
+/* length: length of suboption data */
+void
+printsub(char direction, unsigned char *pointer, int length)
+{
+    register int i = -1;
+#ifdef AUTHENTICATE
+    char buf[512];
+#endif
+
+        if (!(diagnostic & TD_OPTIONS))
+		return;
+
+	if (direction) {
+	    netoprintf("td: %s suboption ",
+		       direction == '<' ? "recv" : "send");
+	    if (length >= 3) {
+		register int j;
+
+		i = pointer[length-2];
+		j = pointer[length-1];
+
+		if (i != IAC || j != SE) {
+		    netoprintf("(terminated by ");
+		    if (TELOPT_OK(i))
+			netoprintf("%s ", TELOPT(i));
+		    else if (TELCMD_OK(i))
+			netoprintf("%s ", TELCMD(i));
+		    else
+			netoprintf("%d ", i);
+		    if (TELOPT_OK(j))
+			netoprintf("%s", TELOPT(j));
+		    else if (TELCMD_OK(j))
+			netoprintf("%s", TELCMD(j));
+		    else
+			netoprintf("%d", j);
+		    netoprintf(", not IAC SE!) ");
+		}
+	    }
+	    length -= 2;
+	}
+	if (length < 1) {
+	    netoprintf("(Empty suboption ? ? ?)");
+	    return;
+	}
+	switch (pointer[0]) {
+	case TELOPT_TTYPE:
+	    netoprintf("TERMINAL-TYPE ");
+	    switch (pointer[1]) {
+	    case TELQUAL_IS:
+		netoprintf("IS \"%.*s\"", length-2, (char *)pointer+2);
+		break;
+	    case TELQUAL_SEND:
+		netoprintf("SEND");
+		break;
+	    default:
+		netoprintf("- unknown qualifier %d (0x%x).",
+				pointer[1], pointer[1]);
+	    }
+	    break;
+	case TELOPT_TSPEED:
+	    netoprintf("TERMINAL-SPEED");
+	    if (length < 2) {
+		netoprintf(" (empty suboption ? ? ?)");
+		break;
+	    }
+	    switch (pointer[1]) {
+	    case TELQUAL_IS:
+		netoprintf(" IS %.*s", length-2, (char *)pointer+2);
+		break;
+	    default:
+		if (pointer[1] == 1)
+		    netoprintf(" SEND");
+		else
+		    netoprintf(" %d (unknown)", pointer[1]);
+		for (i = 2; i < length; i++) {
+		    netoprintf(" ?%d?", pointer[i]);
+		}
+		break;
+	    }
+	    break;
+
+	case TELOPT_LFLOW:
+	    netoprintf("TOGGLE-FLOW-CONTROL");
+	    if (length < 2) {
+		netoprintf(" (empty suboption ? ? ?)");
+		break;
+	    }
+	    switch (pointer[1]) {
+	    case 0:
+		netoprintf(" OFF"); break;
+	    case 1:
+		netoprintf(" ON"); break;
+	    default:
+		netoprintf(" %d (unknown)", pointer[1]);
+	    }
+	    for (i = 2; i < length; i++) {
+		netoprintf(" ?%d?", pointer[i]);
+	    }
+	    break;
+
+	case TELOPT_NAWS:
+	    netoprintf("NAWS");
+	    if (length < 2) {
+		netoprintf(" (empty suboption ? ? ?)");
+		break;
+	    }
+	    if (length == 2) {
+		netoprintf(" ?%d?", pointer[1]);
+		break;
+	    }
+	    netoprintf(" %d %d (%d)",
+		pointer[1], pointer[2],
+		(int)((((unsigned int)pointer[1])<<8)|((unsigned int)pointer[2])));
+	    if (length == 4) {
+		netoprintf(" ?%d?", pointer[3]);
+		break;
+	    }
+	    netoprintf(" %d %d (%d)",
+		pointer[3], pointer[4],
+		(int)((((unsigned int)pointer[3])<<8)|((unsigned int)pointer[4])));
+	    for (i = 5; i < length; i++) {
+		netoprintf(" ?%d?", pointer[i]);
+	    }
+	    break;
+
+	case TELOPT_LINEMODE:
+	    netoprintf("LINEMODE ");
+	    if (length < 2) {
+		netoprintf(" (empty suboption ? ? ?)");
+		break;
+	    }
+	    switch (pointer[1]) {
+	    case WILL:
+		netoprintf("WILL ");
+		goto common;
+	    case WONT:
+		netoprintf("WONT ");
+		goto common;
+	    case DO:
+		netoprintf("DO ");
+		goto common;
+	    case DONT:
+		netoprintf("DONT ");
+	    common:
+		if (length < 3) {
+		    netoprintf("(no option ? ? ?)");
+		    break;
+		}
+		switch (pointer[2]) {
+		case LM_FORWARDMASK:
+		    netoprintf("Forward Mask");
+		    for (i = 3; i < length; i++) {
+			netoprintf(" %x", pointer[i]);
+		    }
+		    break;
+		default:
+		    netoprintf("%d (unknown)", pointer[2]);
+		    for (i = 3; i < length; i++) {
+			netoprintf(" %d", pointer[i]);
+		    }
+		    break;
+		}
+		break;
+		
+	    case LM_SLC:
+		netoprintf("SLC");
+		for (i = 2; i < length - 2; i += 3) {
+		    if (SLC_NAME_OK(pointer[i+SLC_FUNC]))
+			netoprintf(" %s", SLC_NAME(pointer[i+SLC_FUNC]));
+		    else
+			netoprintf(" %d", pointer[i+SLC_FUNC]);
+		    switch (pointer[i+SLC_FLAGS]&SLC_LEVELBITS) {
+		    case SLC_NOSUPPORT:
+			netoprintf(" NOSUPPORT"); break;
+		    case SLC_CANTCHANGE:
+			netoprintf(" CANTCHANGE"); break;
+		    case SLC_VARIABLE:
+			netoprintf(" VARIABLE"); break;
+		    case SLC_DEFAULT:
+			netoprintf(" DEFAULT"); break;
+		    }
+		    netoprintf("%s%s%s",
+			pointer[i+SLC_FLAGS]&SLC_ACK ? "|ACK" : "",
+			pointer[i+SLC_FLAGS]&SLC_FLUSHIN ? "|FLUSHIN" : "",
+			pointer[i+SLC_FLAGS]&SLC_FLUSHOUT ? "|FLUSHOUT" : "");
+		    if (pointer[i+SLC_FLAGS]& ~(SLC_ACK|SLC_FLUSHIN|
+						SLC_FLUSHOUT| SLC_LEVELBITS)) {
+			netoprintf("(0x%x)", pointer[i+SLC_FLAGS]);
+		    }
+		    netoprintf(" %d;", pointer[i+SLC_VALUE]);
+		    if ((pointer[i+SLC_VALUE] == IAC) &&
+			(pointer[i+SLC_VALUE+1] == IAC))
+				i++;
+		}
+		for (; i < length; i++) {
+		    netoprintf(" ?%d?", pointer[i]);
+		}
+		break;
+
+	    case LM_MODE:
+		netoprintf("MODE ");
+		if (length < 3) {
+		    netoprintf("(no mode ? ? ?)");
+		    break;
+		}
+		{
+		    char tbuf[32];
+		    snprintf(tbuf, sizeof(tbuf), "%s%s%s%s%s",
+			pointer[2]&MODE_EDIT ? "|EDIT" : "",
+			pointer[2]&MODE_TRAPSIG ? "|TRAPSIG" : "",
+			pointer[2]&MODE_SOFT_TAB ? "|SOFT_TAB" : "",
+			pointer[2]&MODE_LIT_ECHO ? "|LIT_ECHO" : "",
+			pointer[2]&MODE_ACK ? "|ACK" : "");
+		    netoprintf("%s", tbuf[1] ? &tbuf[1] : "0");
+		}
+		if (pointer[2]&~(MODE_EDIT|MODE_TRAPSIG|MODE_ACK)) {
+		    netoprintf(" (0x%x)", pointer[2]);
+		}
+		for (i = 3; i < length; i++) {
+		    netoprintf(" ?0x%x?", pointer[i]);
+		}
+		break;
+	    default:
+		netoprintf("%d (unknown)", pointer[1]);
+		for (i = 2; i < length; i++) {
+		    netoprintf(" %d", pointer[i]);
+		}
+	    }
+	    break;
+
+	case TELOPT_STATUS: {
+	    const char *cp;
+	    register int j, k;
+
+	    netoprintf("STATUS");
+
+	    switch (pointer[1]) {
+	    default:
+		if (pointer[1] == TELQUAL_SEND)
+		    netoprintf(" SEND");
+		else
+		    netoprintf(" %d (unknown)", pointer[1]);
+		for (i = 2; i < length; i++) {
+		    netoprintf(" ?%d?", pointer[i]);
+		}
+		break;
+	    case TELQUAL_IS:
+		netoprintf(" IS\r\n");
+
+		for (i = 2; i < length; i++) {
+		    switch(pointer[i]) {
+		    case DO:	cp = "DO"; goto common2;
+		    case DONT:	cp = "DONT"; goto common2;
+		    case WILL:	cp = "WILL"; goto common2;
+		    case WONT:	cp = "WONT"; goto common2;
+		    common2:
+			i++;
+			if (TELOPT_OK((int)pointer[i]))
+			    netoprintf(" %s %s", cp, TELOPT(pointer[i]));
+			else
+			    netoprintf(" %s %d", cp, pointer[i]);
+
+			netoprintf("\r\n");
+			break;
+
+		    case SB:
+			netoprintf(" SB ");
+			i++;
+			j = k = i;
+			while (j < length) {
+			    if (pointer[j] == SE) {
+				if (j+1 == length)
+				    break;
+				if (pointer[j+1] == SE)
+				    j++;
+				else
+				    break;
+			    }
+			    pointer[k++] = pointer[j++];
+			}
+			printsub(0, &pointer[i], k - i);
+			if (i < length) {
+			    netoprintf(" SE");
+			    i = j;
+			} else
+			    i = j - 1;
+
+			netoprintf("\r\n");
+
+			break;
+				
+		    default:
+			netoprintf(" %d", pointer[i]);
+			break;
+		    }
+		}
+		break;
+	    }
+	    break;
+	  }
+
+	case TELOPT_XDISPLOC:
+	    netoprintf("X-DISPLAY-LOCATION ");
+	    switch (pointer[1]) {
+	    case TELQUAL_IS:
+		netoprintf("IS \"%.*s\"", length-2, (char *)pointer+2);
+		break;
+	    case TELQUAL_SEND:
+		netoprintf("SEND");
+		break;
+	    default:
+		netoprintf("- unknown qualifier %d (0x%x).",
+				pointer[1], pointer[1]);
+	    }
+	    break;
+
+	case TELOPT_ENVIRON:
+	    netoprintf("ENVIRON ");
+	    switch (pointer[1]) {
+	    case TELQUAL_IS:
+		netoprintf("IS ");
+		goto env_common;
+	    case TELQUAL_SEND:
+		netoprintf("SEND ");
+		goto env_common;
+	    case TELQUAL_INFO:
+		netoprintf("INFO ");
+	    env_common:
+		{
+		    register int noquote = 2;
+		    for (i = 2; i < length; i++ ) {
+			switch (pointer[i]) {
+			case ENV_VAR:
+			    if (pointer[1] == TELQUAL_SEND)
+				goto def_case;
+			    netoprintf("\" VAR " + noquote);
+			    noquote = 2;
+			    break;
+
+			case ENV_VALUE:
+			    netoprintf("\" VALUE " + noquote);
+			    noquote = 2;
+			    break;
+
+			case ENV_ESC:
+			    netoprintf("\" ESC " + noquote);
+			    noquote = 2;
+			    break;
+
+			default:
+			def_case:
+			    if (isprint(pointer[i]) && pointer[i] != '"') {
+				if (noquote) {
+				    netoprintf("\"");
+				    noquote = 0;
+				}
+				netoprintf("%c", pointer[i]);
+			    } else {
+				netoprintf("\" %03o " + noquote,
+							pointer[i]);
+				noquote = 2;
+			    }
+			    break;
+			}
+		    }
+		    if (!noquote)
+			netoprintf("\"");
+		    break;
+		}
+	    }
+	    break;
+
+#if	defined(AUTHENTICATE)
+	case TELOPT_AUTHENTICATION:
+	    netoprintf("AUTHENTICATION");
+	
+	    if (length < 2) {
+		netoprintf(" (empty suboption ? ? ?)");
+		break;
+	    }
+	    switch (pointer[1]) {
+	    case TELQUAL_REPLY:
+	    case TELQUAL_IS:
+		netoprintf(" %s ", (pointer[1] == TELQUAL_IS) ?
+							"IS" : "REPLY");
+		if (AUTHTYPE_NAME_OK(pointer[2]))
+		    netoprintf("%s ", AUTHTYPE_NAME(pointer[2]));
+		else
+		    netoprintf("%d ", pointer[2]);
+		if (length < 3) {
+		    netoprintf("(partial suboption ? ? ?)");
+		    break;
+		}
+		netoprintf("%s|%s",
+			((pointer[3] & AUTH_WHO_MASK) == AUTH_WHO_CLIENT) ?
+			"CLIENT" : "SERVER",
+			((pointer[3] & AUTH_HOW_MASK) == AUTH_HOW_MUTUAL) ?
+			"MUTUAL" : "ONE-WAY");
+
+		auth_printsub(&pointer[1], length - 1, buf, sizeof(buf));
+		netoprintf("%s", buf);
+		break;
+
+	    case TELQUAL_SEND:
+		i = 2;
+		netoprintf(" SEND ");
+		while (i < length) {
+		    if (AUTHTYPE_NAME_OK(pointer[i]))
+			netoprintf("%s ", AUTHTYPE_NAME(pointer[i]));
+		    else
+			netoprintf("%d ", pointer[i]);
+		    if (++i >= length) {
+			netoprintf("(partial suboption ? ? ?)");
+			break;
+		    }
+		    netoprintf("%s|%s ",
+			((pointer[i] & AUTH_WHO_MASK) == AUTH_WHO_CLIENT) ?
+							"CLIENT" : "SERVER",
+			((pointer[i] & AUTH_HOW_MASK) == AUTH_HOW_MUTUAL) ?
+							"MUTUAL" : "ONE-WAY");
+		    ++i;
+		}
+		break;
+
+	    case TELQUAL_NAME:
+		i = 2;
+		netoprintf(" NAME \"");
+		/*
+		 * Was:
+		 *    while (i < length)
+		 *       *nfrontp += pointer[i++];
+		 *    *nfrontp += '"';
+		 *
+		 * but I'm pretty sure that's wrong...
+		 */
+		while (i < length)
+		    netoprintf("%c", pointer[i++]);
+		netoprintf("\"");
+		break;
+
+	    default:
+		    for (i = 2; i < length; i++) {
+			netoprintf(" ?%d?", pointer[i]);
+		    }
+		    break;
+	    }
+	    break;
+#endif
+
+#if	defined(ENCRYPT)
+	case TELOPT_ENCRYPT:
+	    netoprintf("ENCRYPT");
+	    if (length < 2) {
+		netoprintf(" (empty suboption ? ? ?)");
+		break;
+	    }
+	    switch (pointer[1]) {
+	    case ENCRYPT_START:
+		netoprintf(" START");
+		break;
+
+	    case ENCRYPT_END:
+		netoprintf(" END");
+		break;
+
+	    case ENCRYPT_REQSTART:
+		netoprintf(" REQUEST-START");
+		break;
+
+	    case ENCRYPT_REQEND:
+		netoprintf(" REQUEST-END");
+		break;
+
+	    case ENCRYPT_IS:
+	    case ENCRYPT_REPLY:
+		netoprintf(" %s ", (pointer[1] == ENCRYPT_IS) ?
+							"IS" : "REPLY");
+		if (length < 3) {
+		    netoprintf(" (partial suboption ? ? ?)");
+		    break;
+		}
+		if (ENCTYPE_NAME_OK(pointer[2]))
+		    netoprintf("%s ", ENCTYPE_NAME(pointer[2]));
+		else
+		    netoprintf(" %d (unknown)", pointer[2]);
+
+		encrypt_printsub(&pointer[1], length - 1, buf, sizeof(buf));
+		netoprintf("%s", buf);
+		break;
+
+	    case ENCRYPT_SUPPORT:
+		i = 2;
+		netoprintf(" SUPPORT ");
+		while (i < length) {
+		    if (ENCTYPE_NAME_OK(pointer[i]))
+			netoprintf("%s ", ENCTYPE_NAME(pointer[i]));
+		    else
+			netoprintf("%d ", pointer[i]);
+		    i++;
+		}
+		break;
+
+	    case ENCRYPT_ENC_KEYID:
+		netoprintf(" ENC_KEYID", pointer[1]);
+		goto encommon;
+
+	    case ENCRYPT_DEC_KEYID:
+		netoprintf(" DEC_KEYID", pointer[1]);
+		goto encommon;
+
+	    default:
+		netoprintf(" %d (unknown)", pointer[1]);
+	    encommon:
+		for (i = 2; i < length; i++) {
+		    netoprintf(" %d", pointer[i]);
+		}
+		break;
+	    }
+	    break;
+#endif
+
+	default:
+	    if (TELOPT_OK(pointer[0]))
+	        netoprintf("%s (unknown)", TELOPT(pointer[0]));
+	    else
+	        netoprintf("%d (unknown)", pointer[i]);
+	    for (i = 1; i < length; i++) {
+		netoprintf(" %d", pointer[i]);
+	    }
+	    break;
+	}
+	netoprintf("\r\n");
+}
+
+/*
+ * Dump a data buffer in hex and ascii to the output data stream.
+ */
+void
+printdata(const char *tag, const char *ptr, int cnt)
+{
+	register int i;
+	char xbuf[30];
+
+	while (cnt) {
+		/* flush net output buffer if no room for new data) */
+		if ((&netobuf[BUFSIZ] - nfrontp) < 80) {
+			netflush();
+		}
+
+		/* add a line of output */
+		netoprintf("%s: ", tag);
+		for (i = 0; i < 20 && cnt; i++) {
+			netoprintf("%02x", *ptr);
+			if (isprint(*ptr)) {
+				xbuf[i] = *ptr;
+			} else {
+				xbuf[i] = '.';
+			}
+			if (i % 2) { 
+				netoprintf(" ");
+			}
+			cnt--;
+			ptr++;
+		}
+		xbuf[i] = '\0';
+		netoprintf(" %s\r\n", xbuf );
+	} 
+}
+#endif /* DIAGNOSTICS */
Index: netkit-telnet-0.17-new/telnetd
===================================================================
--- netkit-telnet-0.17-new/telnetd	(nonexistent)
+++ netkit-telnet-0.17-new/telnetd	(revision 5)

Property changes on: netkit-telnet-0.17-new/telnetd
___________________________________________________________________
Added: svn:ignore
## -0,0 +1,73 ##
+
+# install dir
+dist
+
+# Target build dirs
+.a1x-newlib
+.a2x-newlib
+.at91sam7s-newlib
+
+.build-machine
+
+.a1x-glibc
+.a2x-glibc
+.h3-glibc
+.h5-glibc
+.i586-glibc
+.i686-glibc
+.imx6-glibc
+.jz47xx-glibc
+.makefile
+.am335x-glibc
+.omap543x-glibc
+.p5600-glibc
+.power8-glibc
+.power8le-glibc
+.power9-glibc
+.power9le-glibc
+.m1000-glibc
+.riscv64-glibc
+.rk328x-glibc
+.rk33xx-glibc
+.rk339x-glibc
+.s8xx-glibc
+.s9xx-glibc
+.x86_64-glibc
+
+# Hidden files (each file)
+.makefile
+.dist
+.rootfs
+
+# src & hw requires
+.src_requires
+.src_requires_depend
+.requires
+.requires_depend
+
+# Tarballs
+*.gz
+*.bz2
+*.lz
+*.xz
+*.tgz
+*.txz
+
+# Signatures
+*.asc
+*.sig
+*.sign
+*.sha1sum
+
+# Patches
+*.patch
+
+# Descriptions
+*.dsc
+*.txt
+
+# Default linux config files
+*.defconfig
+
+# backup copies
+*~
Index: netkit-telnet-0.17-new
===================================================================
--- netkit-telnet-0.17-new	(nonexistent)
+++ netkit-telnet-0.17-new	(revision 5)

Property changes on: netkit-telnet-0.17-new
___________________________________________________________________
Added: svn:ignore
## -0,0 +1,73 ##
+
+# install dir
+dist
+
+# Target build dirs
+.a1x-newlib
+.a2x-newlib
+.at91sam7s-newlib
+
+.build-machine
+
+.a1x-glibc
+.a2x-glibc
+.h3-glibc
+.h5-glibc
+.i586-glibc
+.i686-glibc
+.imx6-glibc
+.jz47xx-glibc
+.makefile
+.am335x-glibc
+.omap543x-glibc
+.p5600-glibc
+.power8-glibc
+.power8le-glibc
+.power9-glibc
+.power9le-glibc
+.m1000-glibc
+.riscv64-glibc
+.rk328x-glibc
+.rk33xx-glibc
+.rk339x-glibc
+.s8xx-glibc
+.s9xx-glibc
+.x86_64-glibc
+
+# Hidden files (each file)
+.makefile
+.dist
+.rootfs
+
+# src & hw requires
+.src_requires
+.src_requires_depend
+.requires
+.requires_depend
+
+# Tarballs
+*.gz
+*.bz2
+*.lz
+*.xz
+*.tgz
+*.txz
+
+# Signatures
+*.asc
+*.sig
+*.sign
+*.sha1sum
+
+# Patches
+*.patch
+
+# Descriptions
+*.dsc
+*.txt
+
+# Default linux config files
+*.defconfig
+
+# backup copies
+*~
Index: .
===================================================================
--- .	(nonexistent)
+++ .	(revision 5)

Property changes on: .
___________________________________________________________________
Added: svn:ignore
## -0,0 +1,73 ##
+
+# install dir
+dist
+
+# Target build dirs
+.a1x-newlib
+.a2x-newlib
+.at91sam7s-newlib
+
+.build-machine
+
+.a1x-glibc
+.a2x-glibc
+.h3-glibc
+.h5-glibc
+.i586-glibc
+.i686-glibc
+.imx6-glibc
+.jz47xx-glibc
+.makefile
+.am335x-glibc
+.omap543x-glibc
+.p5600-glibc
+.power8-glibc
+.power8le-glibc
+.power9-glibc
+.power9le-glibc
+.m1000-glibc
+.riscv64-glibc
+.rk328x-glibc
+.rk33xx-glibc
+.rk339x-glibc
+.s8xx-glibc
+.s9xx-glibc
+.x86_64-glibc
+
+# Hidden files (each file)
+.makefile
+.dist
+.rootfs
+
+# src & hw requires
+.src_requires
+.src_requires_depend
+.requires
+.requires_depend
+
+# Tarballs
+*.gz
+*.bz2
+*.lz
+*.xz
+*.tgz
+*.txz
+
+# Signatures
+*.asc
+*.sig
+*.sign
+*.sha1sum
+
+# Patches
+*.patch
+
+# Descriptions
+*.dsc
+*.txt
+
+# Default linux config files
+*.defconfig
+
+# backup copies
+*~