Radix cross Linux

The main Radix cross Linux repository contains the build scripts of packages, which have the most complete and common functionality for desktop machines

452 Commits   2 Branches   1 Tag
Index: telnetd.c
===================================================================
--- telnetd.c	(nonexistent)
+++ telnetd.c	(revision 5)
@@ -0,0 +1,1164 @@
+/*
+ * Copyright (c) 1989 Regents of the University of California.
+ * All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ * 1. Redistributions of source code must retain the above copyright
+ *    notice, this list of conditions and the following disclaimer.
+ * 2. Redistributions in binary form must reproduce the above copyright
+ *    notice, this list of conditions and the following disclaimer in the
+ *    documentation and/or other materials provided with the distribution.
+ * 3. All advertising materials mentioning features or use of this software
+ *    must display the following acknowledgement:
+ *	This product includes software developed by the University of
+ *	California, Berkeley and its contributors.
+ * 4. Neither the name of the University nor the names of its contributors
+ *    may be used to endorse or promote products derived from this software
+ *    without specific prior written permission.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+ * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+ * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+ * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+ * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+ * SUCH DAMAGE.
+ */
+
+char copyright[] =
+  "@(#) Copyright (c) 1989 Regents of the University of California.\n"
+  "All rights reserved.\n";
+
+/*
+ * From: @(#)telnetd.c	5.48 (Berkeley) 3/1/91
+ */
+char telnetd_rcsid[] = 
+  "$Id: telnetd.c,v 1.24 2000/04/12 21:36:12 dholland Exp $";
+
+#include "../version.h"
+
+#include <netdb.h>
+#include <termcap.h>
+#include <netinet/in.h>
+/* #include <netinet/ip.h> */ /* Don't think this is used at all here */
+#include <arpa/inet.h>
+#include <assert.h>
+#include "telnetd.h"
+#include "pathnames.h"
+#include "setproctitle.h"
+
+#if	defined(AUTHENTICATE)
+#include <libtelnet/auth.h>
+#include <libtelnet/auth-proto.h>
+#include <libtelnet/misc-proto.h>
+int	auth_level = 0;
+#endif
+#if	defined(SecurID)
+int	require_SecurID = 0;
+#endif
+
+/* In Linux, this is an enum */
+#if defined(__linux__) || defined(IPPROTO_IP)
+#define HAS_IPPROTO_IP
+#endif
+
+static void doit(struct sockaddr_in *who);
+static int terminaltypeok(const char *s);
+
+/*
+ * I/O data buffers,
+ * pointers, and counters.
+ */
+char	ptyibuf[BUFSIZ], *ptyip = ptyibuf;
+char	ptyibuf2[BUFSIZ];
+
+int	hostinfo = 1;			/* do we print login banner? */
+
+int debug = 0;
+int keepalive = 1;
+char *loginprg = _PATH_LOGIN;
+char *progname;
+
+extern void usage(void);
+
+int
+main(int argc, char *argv[], char *env[])
+{
+	struct sockaddr_in from;
+	int on = 1;
+	socklen_t fromlen;
+	register int ch;
+
+#if	defined(HAS_IPPROTO_IP) && defined(IP_TOS)
+	int tos = -1;
+#endif
+
+	initsetproctitle(argc, argv, env);
+
+	pfrontp = pbackp = ptyobuf;
+	netip = netibuf;
+	nfrontp = nbackp = netobuf;
+#if	defined(ENCRYPT)
+	nclearto = 0;
+#endif
+
+	progname = *argv;
+
+	while ((ch = getopt(argc, argv, "d:a:e:lhnr:I:D:B:sS:a:X:L:")) != EOF) {
+		switch(ch) {
+
+#ifdef	AUTHENTICATE
+		case 'a':
+			/*
+			 * Check for required authentication level
+			 */
+			if (strcmp(optarg, "debug") == 0) {
+				extern int auth_debug_mode;
+				auth_debug_mode = 1;
+			} else if (strcasecmp(optarg, "none") == 0) {
+				auth_level = 0;
+			} else if (strcasecmp(optarg, "other") == 0) {
+				auth_level = AUTH_OTHER;
+			} else if (strcasecmp(optarg, "user") == 0) {
+				auth_level = AUTH_USER;
+			} else if (strcasecmp(optarg, "valid") == 0) {
+				auth_level = AUTH_VALID;
+			} else if (strcasecmp(optarg, "off") == 0) {
+				/*
+				 * This hack turns off authentication
+				 */
+				auth_level = -1;
+			} else {
+				fprintf(stderr,
+			    "telnetd: unknown authorization level for -a\n");
+			}
+			break;
+#endif	/* AUTHENTICATE */
+
+#ifdef BFTPDAEMON
+		case 'B':
+			bftpd++;
+			break;
+#endif /* BFTPDAEMON */
+
+		case 'd':
+			if (strcmp(optarg, "ebug") == 0) {
+				debug++;
+				break;
+			}
+			usage();
+			/* NOTREACHED */
+			break;
+
+#ifdef DIAGNOSTICS
+		case 'D':
+			/*
+			 * Check for desired diagnostics capabilities.
+			 */
+			if (!strcmp(optarg, "report")) {
+				diagnostic |= TD_REPORT|TD_OPTIONS;
+			} else if (!strcmp(optarg, "exercise")) {
+				diagnostic |= TD_EXERCISE;
+			} else if (!strcmp(optarg, "netdata")) {
+				diagnostic |= TD_NETDATA;
+			} else if (!strcmp(optarg, "ptydata")) {
+				diagnostic |= TD_PTYDATA;
+			} else if (!strcmp(optarg, "options")) {
+				diagnostic |= TD_OPTIONS;
+			} else {
+				usage();
+				/* NOT REACHED */
+			}
+			break;
+#endif /* DIAGNOSTICS */
+
+#ifdef	AUTHENTICATE
+		case 'e':
+			if (strcmp(optarg, "debug") == 0) {
+				extern int auth_debug_mode;
+				auth_debug_mode = 1;
+				break;
+			}
+			usage();
+			/* NOTREACHED */
+			break;
+#endif	/* AUTHENTICATE */
+
+		case 'h':
+			hostinfo = 0;
+			break;
+
+#ifdef	LINEMODE
+		case 'l':
+			alwayslinemode = 1;
+			break;
+#endif	/* LINEMODE */
+
+		case 'L':
+			loginprg = strdup(optarg);
+			/* XXX what if strdup fails? */
+			break;
+
+		case 'n':
+			keepalive = 0;
+			break;
+
+#ifdef	SecurID
+		case 's':
+			/* SecurID required */
+			require_SecurID = 1;
+			break;
+#endif	/* SecurID */
+		case 'S':
+#ifdef	HAS_GETTOS
+			if ((tos = parsetos(optarg, "tcp")) < 0)
+				fprintf(stderr, "%s%s%s\n",
+					"telnetd: Bad TOS argument '", optarg,
+					"'; will try to use default TOS");
+#else
+			fprintf(stderr, "%s%s\n", "TOS option unavailable; ",
+						"-S flag not supported\n");
+#endif
+			break;
+
+#ifdef	AUTHENTICATE
+		case 'X':
+			/*
+			 * Check for invalid authentication types
+			 */
+			auth_disable_name(optarg);
+			break;
+#endif	/* AUTHENTICATE */
+
+		default:
+			fprintf(stderr, "telnetd: %c: unknown option\n", ch);
+			/* FALLTHROUGH */
+		case '?':
+			usage();
+			/* NOTREACHED */
+		}
+	}
+
+	argc -= optind;
+	argv += optind;
+
+	if (debug) {
+	    int s, ns;
+	    socklen_t foo;
+	    struct servent *sp;
+	    struct sockaddr_in sn;
+
+	    memset(&sn, 0, sizeof(sn));
+	    sn.sin_family = AF_INET;
+
+	    if (argc > 1) {
+		usage();
+		/* NOTREACHED */
+	    } else if (argc == 1) {
+		    if ((sp = getservbyname(*argv, "tcp"))!=NULL) {
+			sn.sin_port = sp->s_port;
+		    } 
+		    else {
+			int pt = atoi(*argv);
+			if (pt <= 0) {
+			    fprintf(stderr, "telnetd: %s: bad port number\n",
+				    *argv);
+			    usage();
+			    /* NOTREACHED */
+			}
+			sn.sin_port = htons(pt);
+		   }
+	    } else {
+		sp = getservbyname("telnet", "tcp");
+		if (sp == 0) {
+		    fprintf(stderr, "telnetd: tcp/telnet: unknown service\n");
+		    exit(1);
+		}
+		sn.sin_port = sp->s_port;
+	    }
+
+	    s = socket(AF_INET, SOCK_STREAM, 0);
+	    if (s < 0) {
+		    perror("telnetd: socket");;
+		    exit(1);
+	    }
+	    (void) setsockopt(s, SOL_SOCKET, SO_REUSEADDR, &on, sizeof(on));
+	    if (bind(s, (struct sockaddr *)&sn, sizeof(sn)) < 0) {
+		perror("bind");
+		exit(1);
+	    }
+	    if (listen(s, 1) < 0) {
+		perror("listen");
+		exit(1);
+	    }
+	    foo = sizeof(sn);
+	    ns = accept(s, (struct sockaddr *)&sn, &foo);
+	    if (ns < 0) {
+		perror("accept");
+		exit(1);
+	    }
+	    (void) dup2(ns, 0);
+	    (void) close(ns);
+	    (void) close(s);
+	} else if (argc > 0) {
+		usage();
+		/* NOT REACHED */
+	}
+
+	openlog("telnetd", LOG_PID | LOG_ODELAY, LOG_DAEMON);
+	fromlen = sizeof (from);
+	if (getpeername(0, (struct sockaddr *)&from, &fromlen) < 0) {
+		fprintf(stderr, "%s: ", progname);
+		perror("getpeername");
+		_exit(1);
+	}
+	if (keepalive &&
+	    setsockopt(0, SOL_SOCKET, SO_KEEPALIVE, &on, sizeof (on)) < 0) {
+		syslog(LOG_WARNING, "setsockopt (SO_KEEPALIVE): %m");
+	}
+
+#if	defined(HAS_IPPROTO_IP) && defined(IP_TOS)
+	{
+# if	defined(HAS_GETTOS)
+		struct tosent *tp;
+		if (tos < 0 && (tp = gettosbyname("telnet", "tcp")))
+			tos = tp->t_tos;
+# endif
+		if (tos < 0)
+			tos = 020;	/* Low Delay bit */
+		if (tos
+		   && (setsockopt(0, IPPROTO_IP, IP_TOS, &tos, sizeof(tos)) < 0)
+		   && (errno != ENOPROTOOPT) )
+			syslog(LOG_WARNING, "setsockopt (IP_TOS): %m");
+	}
+#endif	/* defined(HAS_IPPROTO_IP) && defined(IP_TOS) */
+	net = 0;
+	doit(&from);
+	/* NOTREACHED */
+	return 0;
+}  /* end of main */
+
+void
+usage(void)
+{
+	fprintf(stderr, "Usage: telnetd");
+#ifdef	AUTHENTICATE
+	fprintf(stderr, " [-a (debug|other|user|valid|off)]\n\t");
+#endif
+#ifdef BFTPDAEMON
+	fprintf(stderr, " [-B]");
+#endif
+	fprintf(stderr, " [-debug]");
+#ifdef DIAGNOSTICS
+	fprintf(stderr, " [-D (options|report|exercise|netdata|ptydata)]\n\t");
+#endif
+#ifdef	AUTHENTICATE
+	fprintf(stderr, " [-edebug]");
+#endif
+	fprintf(stderr, " [-h]");
+#ifdef LINEMODE
+	fprintf(stderr, " [-l]");
+#endif
+	fprintf(stderr, " [-L login_program]");
+	fprintf(stderr, " [-n]");
+#ifdef	SecurID
+	fprintf(stderr, " [-s]");
+#endif
+#ifdef	AUTHENTICATE
+	fprintf(stderr, " [-X auth-type]");
+#endif
+	fprintf(stderr, " [port]\n");
+	exit(1);
+}
+
+/*
+ * getterminaltype
+ *
+ *	Ask the other end to send along its terminal type and speed.
+ * Output is the variable terminaltype filled in.
+ */
+
+static void _gettermname(void);
+
+static
+int
+getterminaltype(char *name)
+{
+    int retval = -1;
+    (void)name;
+
+    settimer(baseline);
+#if defined(AUTHENTICATE)
+    /*
+     * Handle the Authentication option before we do anything else.
+     */
+    send_do(TELOPT_AUTHENTICATION, 1);
+    while (his_will_wont_is_changing(TELOPT_AUTHENTICATION))
+	ttloop();
+    if (his_state_is_will(TELOPT_AUTHENTICATION)) {
+	retval = auth_wait(name);
+    }
+#endif
+
+#if	defined(ENCRYPT)
+    send_will(TELOPT_ENCRYPT, 1);
+#endif
+    send_do(TELOPT_TTYPE, 1);
+    send_do(TELOPT_TSPEED, 1);
+    send_do(TELOPT_XDISPLOC, 1);
+    send_do(TELOPT_ENVIRON, 1);
+    while (
+#if	defined(ENCRYPT)
+	   his_do_dont_is_changing(TELOPT_ENCRYPT) ||
+#endif
+	   his_will_wont_is_changing(TELOPT_TTYPE) ||
+	   his_will_wont_is_changing(TELOPT_TSPEED) ||
+	   his_will_wont_is_changing(TELOPT_XDISPLOC) ||
+	   his_will_wont_is_changing(TELOPT_ENVIRON)) {
+	ttloop();
+    }
+#if	defined(ENCRYPT)
+    /*
+     * Wait for the negotiation of what type of encryption we can
+     * send with.  If autoencrypt is not set, this will just return.
+     */
+    if (his_state_is_will(TELOPT_ENCRYPT)) {
+	encrypt_wait();
+    }
+#endif
+    if (his_state_is_will(TELOPT_TSPEED)) {
+	netoprintf("%c%c%c%c%c%c", 
+		   IAC, SB, TELOPT_TSPEED, TELQUAL_SEND, IAC, SE);
+    }
+    if (his_state_is_will(TELOPT_XDISPLOC)) {
+	netoprintf("%c%c%c%c%c%c", 
+		   IAC, SB, TELOPT_XDISPLOC, TELQUAL_SEND, IAC, SE);
+    }
+    if (his_state_is_will(TELOPT_ENVIRON)) {
+	netoprintf("%c%c%c%c%c%c", 
+		   IAC, SB, TELOPT_ENVIRON, TELQUAL_SEND, IAC, SE);
+    }
+    if (his_state_is_will(TELOPT_TTYPE)) {
+       netoprintf("%c%c%c%c%c%c", 
+		  IAC, SB, TELOPT_TTYPE, TELQUAL_SEND, IAC, SE);
+    }
+    if (his_state_is_will(TELOPT_TSPEED)) {
+	while (sequenceIs(tspeedsubopt, baseline))
+	    ttloop();
+    }
+    if (his_state_is_will(TELOPT_XDISPLOC)) {
+	while (sequenceIs(xdisplocsubopt, baseline))
+	    ttloop();
+    }
+    if (his_state_is_will(TELOPT_ENVIRON)) {
+	while (sequenceIs(environsubopt, baseline))
+	    ttloop();
+    }
+    if (his_state_is_will(TELOPT_TTYPE)) {
+	char first[256], last[256];
+
+	while (sequenceIs(ttypesubopt, baseline))
+	    ttloop();
+
+	/*
+	 * If the other side has already disabled the option, then
+	 * we have to just go with what we (might) have already gotten.
+	 */
+	if (his_state_is_will(TELOPT_TTYPE) && !terminaltypeok(terminaltype)) {
+	    /*
+	     * Due to state.c, terminaltype points to a static char[41].
+	     * Therefore, this assert cannot fail, and therefore, strings
+	     * arising from "terminaltype" can be safely strcpy'd into
+	     * first[] or last[].
+	     */
+	    assert(strlen(terminaltype) < sizeof(first));
+
+	    strcpy(first, terminaltype);
+
+	    for(;;) {
+		/*
+		 * Save the unknown name, and request the next name.
+		 */
+		strcpy(last, terminaltype);
+
+		_gettermname();
+		assert(strlen(terminaltype) < sizeof(first));
+
+		if (terminaltypeok(terminaltype))
+		    break;
+
+		if (!strcmp(last, terminaltype) ||
+		    his_state_is_wont(TELOPT_TTYPE)) {
+		    /*
+		     * We've hit the end.  If this is the same as
+		     * the first name, just go with it.
+		     */
+		    if (!strcmp(first, terminaltype))
+			break;
+		    /*
+		     * Get the terminal name one more time, so that
+		     * RFC1091 compliant telnets will cycle back to
+		     * the start of the list.
+		     */
+		     _gettermname();
+		    assert(strlen(terminaltype) < sizeof(first));
+
+		    if (strcmp(first, terminaltype)) {
+			/*
+			 * first[] came from terminaltype, so it must fit
+			 * back in.
+			 */
+			strcpy(terminaltype, first);
+		    }
+		    break;
+		}
+	    }
+	}
+    }
+    return(retval);
+}  /* end of getterminaltype */
+
+static
+void
+_gettermname(void)
+{
+    /*
+     * If the client turned off the option,
+     * we can't send another request, so we
+     * just return.
+     */
+    if (his_state_is_wont(TELOPT_TTYPE))
+	return;
+
+    settimer(baseline);
+    netoprintf("%c%c%c%c%c%c", IAC, SB, TELOPT_TTYPE, TELQUAL_SEND, IAC, SE);
+    while (sequenceIs(ttypesubopt, baseline))
+	ttloop();
+}
+
+static int
+terminaltypeok(const char *s)
+{
+    /* char buf[2048]; */
+
+    if (terminaltype == NULL)
+	return(1);
+
+    /*
+     * Fix from Chris Evans: if it has a / in it, termcap will
+     * treat it as a filename. Oops.
+     */
+    if (strchr(s, '/')) {
+	return 0;
+    }
+
+    /*
+     * If it's absurdly long, accept it without asking termcap.
+     *
+     * This means that it won't get seen again until after login,
+     * at which point exploiting buffer problems in termcap doesn't
+     * gain one anything.
+     *
+     * It's possible this limit ought to be raised to 128, but nothing
+     * in my termcap is more than 64, 64 is _plenty_ for most, and while
+     * buffers aren't likely to be smaller than 64, they might be 80 and
+     * thus less than 128.
+     */
+    if (strlen(s) > 63) {
+       return 0;
+    }
+
+    /*
+     * tgetent() will return 1 if the type is known, and
+     * 0 if it is not known.  If it returns -1, it couldn't
+     * open the database.  But if we can't open the database,
+     * it won't help to say we failed, because we won't be
+     * able to verify anything else.  So, we treat -1 like 1.
+     */
+
+    /*
+     * Don't do this - tgetent is not really trustworthy. Assume
+     * the terminal type is one we know; terminal types are pretty
+     * standard now. And if it isn't, it's unlikely we're going to
+     * know anything else the remote telnet might send as an alias
+     * for it.
+     *
+     * if (tgetent(buf, s) == 0)
+     *    return(0);
+     */
+    return(1);
+}
+
+#ifndef	MAXHOSTNAMELEN
+#define	MAXHOSTNAMELEN 64
+#endif	/* MAXHOSTNAMELEN */
+
+char host_name[MAXHOSTNAMELEN];
+char remote_host_name[MAXHOSTNAMELEN];
+
+extern void telnet(int, int);
+
+/*
+ * Get a pty, scan input lines.
+ */
+static void
+doit(struct sockaddr_in *who)
+{
+	const char *host;
+	struct hostent *hp;
+	int level;
+	char user_name[256];
+
+	/*
+	 * Find an available pty to use.
+	 */
+	pty = getpty();
+	if (pty < 0)
+		fatal(net, "All network ports in use");
+
+	/* get name of connected client */
+	hp = gethostbyaddr((char *)&who->sin_addr, sizeof (struct in_addr),
+		who->sin_family);
+	if (hp)
+		host = hp->h_name;
+	else
+		host = inet_ntoa(who->sin_addr);
+
+	/*
+	 * We must make a copy because Kerberos is probably going
+	 * to also do a gethost* and overwrite the static data...
+	 */
+	{
+		int i;
+		strncpy(remote_host_name, host, sizeof(remote_host_name)-1);
+		remote_host_name[sizeof(remote_host_name)-1] = 0;
+
+		/* Disallow funnies. */
+		for (i=0; remote_host_name[i]; i++) {
+		    if (remote_host_name[i]<=32 || remote_host_name[i]>126) 
+			remote_host_name[i] = '?';
+		}
+	}
+	host = remote_host_name;
+
+	/* Get local host name */
+	{
+		struct hostent *h;
+		gethostname(host_name, sizeof(host_name));
+		h = gethostbyname(host_name);
+		if (h) {
+		    strncpy(host_name, h->h_name, sizeof(host_name));
+		    host_name[sizeof(host_name)-1] = 0;
+		}
+	}
+
+#if	defined(AUTHENTICATE) || defined(ENCRYPT)
+	auth_encrypt_init(host_name, host, "TELNETD", 1);
+#endif
+
+	init_env();
+	/*
+	 * get terminal type.
+	 */
+	*user_name = 0;
+	level = getterminaltype(user_name);
+	setenv("TERM", terminaltype ? terminaltype : "network", 1);
+
+	/* TODO list stuff provided by Laszlo Vecsey <master@internexus.net> */
+
+	/*
+	 * Set REMOTEHOST environment variable
+	 */
+	setproctitle("%s", host);
+	setenv("REMOTEHOST", host, 0);
+
+	/*
+	 * Start up the login process on the slave side of the terminal
+	 */
+	startslave(host, level, user_name);
+
+	telnet(net, pty);  /* begin server processing */
+
+	/*NOTREACHED*/
+}  /* end of doit */
+
+/*
+ * Main loop.  Select from pty and network, and
+ * hand data to telnet receiver finite state machine.
+ */
+void telnet(int f, int p)
+{
+    int on = 1;
+    char *HE;
+    const char *IM;
+
+    /*
+     * Initialize the slc mapping table.
+     */
+    get_slc_defaults();
+
+    /*
+     * Do some tests where it is desireable to wait for a response.
+     * Rather than doing them slowly, one at a time, do them all
+     * at once.
+     */
+    if (my_state_is_wont(TELOPT_SGA))
+	send_will(TELOPT_SGA, 1);
+    /*
+     * Is the client side a 4.2 (NOT 4.3) system?  We need to know this
+     * because 4.2 clients are unable to deal with TCP urgent data.
+     *
+     * To find out, we send out a "DO ECHO".  If the remote system
+     * answers "WILL ECHO" it is probably a 4.2 client, and we note
+     * that fact ("WILL ECHO" ==> that the client will echo what
+     * WE, the server, sends it; it does NOT mean that the client will
+     * echo the terminal input).
+     */
+    send_do(TELOPT_ECHO, 1);
+    
+#ifdef	LINEMODE
+    if (his_state_is_wont(TELOPT_LINEMODE)) {
+	/*
+	 * Query the peer for linemode support by trying to negotiate
+	 * the linemode option.
+	 */
+	linemode = 0;
+	editmode = 0;
+	send_do(TELOPT_LINEMODE, 1);  /* send do linemode */
+    }
+#endif	/* LINEMODE */
+
+    /*
+     * Send along a couple of other options that we wish to negotiate.
+     */
+    send_do(TELOPT_NAWS, 1);
+    send_will(TELOPT_STATUS, 1);
+    flowmode = 1;  /* default flow control state */
+    send_do(TELOPT_LFLOW, 1);
+    
+    /*
+     * Spin, waiting for a response from the DO ECHO.  However,
+     * some REALLY DUMB telnets out there might not respond
+     * to the DO ECHO.  So, we spin looking for NAWS, (most dumb
+     * telnets so far seem to respond with WONT for a DO that
+     * they don't understand...) because by the time we get the
+     * response, it will already have processed the DO ECHO.
+     * Kludge upon kludge.
+     */
+    while (his_will_wont_is_changing(TELOPT_NAWS)) {
+	ttloop();
+    }
+    
+    /*
+     * But...
+     * The client might have sent a WILL NAWS as part of its
+     * startup code; if so, we'll be here before we get the
+     * response to the DO ECHO.  We'll make the assumption
+     * that any implementation that understands about NAWS
+     * is a modern enough implementation that it will respond
+     * to our DO ECHO request; hence we'll do another spin
+     * waiting for the ECHO option to settle down, which is
+     * what we wanted to do in the first place...
+     */
+    if (his_want_state_is_will(TELOPT_ECHO) &&
+	his_state_is_will(TELOPT_NAWS)) {
+	while (his_will_wont_is_changing(TELOPT_ECHO))
+	    ttloop();
+    }
+    /*
+     * On the off chance that the telnet client is broken and does not
+     * respond to the DO ECHO we sent, (after all, we did send the
+     * DO NAWS negotiation after the DO ECHO, and we won't get here
+     * until a response to the DO NAWS comes back) simulate the
+     * receipt of a will echo.  This will also send a WONT ECHO
+     * to the client, since we assume that the client failed to
+     * respond because it believes that it is already in DO ECHO
+     * mode, which we do not want.
+     */
+    if (his_want_state_is_will(TELOPT_ECHO)) {
+	DIAG(TD_OPTIONS, netoprintf("td: simulating recv\r\n"););
+	willoption(TELOPT_ECHO);
+    }
+    
+    /*
+     * Finally, to clean things up, we turn on our echo.  This
+     * will break stupid 4.2 telnets out of local terminal echo.
+     */
+    
+    if (my_state_is_wont(TELOPT_ECHO))
+	send_will(TELOPT_ECHO, 1);
+    
+    /*
+     * Turn on packet mode
+     */
+    ioctl(p, TIOCPKT, (char *)&on);
+#if defined(LINEMODE) && defined(KLUDGELINEMODE)
+    /*
+     * Continuing line mode support.  If client does not support
+     * real linemode, attempt to negotiate kludge linemode by sending
+     * the do timing mark sequence.
+     */
+    if (lmodetype < REAL_LINEMODE)
+	send_do(TELOPT_TM, 1);
+#endif	/* defined(LINEMODE) && defined(KLUDGELINEMODE) */
+    
+    /*
+     * Call telrcv() once to pick up anything received during
+     * terminal type negotiation, 4.2/4.3 determination, and
+     * linemode negotiation.
+     */
+    telrcv();
+    
+    ioctl(f, FIONBIO, (char *)&on);
+    ioctl(p, FIONBIO, (char *)&on);
+
+#if defined(SO_OOBINLINE)
+    setsockopt(net, SOL_SOCKET, SO_OOBINLINE, &on, sizeof on);
+#endif	/* defined(SO_OOBINLINE) */
+    
+#ifdef	SIGTSTP
+    signal(SIGTSTP, SIG_IGN);
+#endif
+#ifdef	SIGTTOU
+    /*
+     * Ignoring SIGTTOU keeps the kernel from blocking us
+     * in ttioct() in /sys/tty.c.
+     */
+    signal(SIGTTOU, SIG_IGN);
+#endif
+    
+    signal(SIGCHLD, cleanup);
+    
+#ifdef TIOCNOTTY
+    {
+	register int t;
+	t = open(_PATH_TTY, O_RDWR);
+	if (t >= 0) {
+	    (void) ioctl(t, TIOCNOTTY, (char *)0);
+	    (void) close(t);
+	}
+    }
+#endif
+    
+    /*
+     * Show banner that getty never gave.
+     *
+     * We put the banner in the pty input buffer.  This way, it
+     * gets carriage return null processing, etc., just like all
+     * other pty --> client data.
+     */
+    
+    if (getenv("USER"))
+	hostinfo = 0;
+    
+    IM = DEFAULT_IM;
+    HE = 0;
+
+    edithost(HE, host_name);
+    if (hostinfo && *IM)
+	putf(IM, ptyibuf2);
+    
+    if (pcc) strncat(ptyibuf2, ptyip, pcc+1);
+    ptyip = ptyibuf2;
+    pcc = strlen(ptyip);
+#ifdef LINEMODE
+    /*
+     * Last check to make sure all our states are correct.
+     */
+    init_termbuf();
+    localstat();
+#endif	/* LINEMODE */
+
+    DIAG(TD_REPORT, netoprintf("td: Entering processing loop\r\n"););
+    
+    for (;;) {
+	fd_set ibits, obits, xbits;
+	int c, hifd;
+	
+	if (ncc < 0 && pcc < 0)
+	    break;
+	
+	FD_ZERO(&ibits);
+	FD_ZERO(&obits);
+	FD_ZERO(&xbits);
+	hifd=0;
+	/*
+	 * Never look for input if there's still
+	 * stuff in the corresponding output buffer
+	 */
+	if (nfrontp - nbackp || pcc > 0) {
+	    FD_SET(f, &obits);
+	    if (f >= hifd) hifd = f+1;
+	} 
+	else {
+	    FD_SET(p, &ibits);
+	    if (p >= hifd) hifd = p+1;
+	}
+	if (pfrontp - pbackp || ncc > 0) {
+	    FD_SET(p, &obits);
+	    if (p >= hifd) hifd = p+1;
+	} 
+	else {
+	    FD_SET(f, &ibits);
+	    if (f >= hifd) hifd = f+1;
+	}
+	if (!SYNCHing) {
+	    FD_SET(f, &xbits);
+	    if (f >= hifd) hifd = f+1;
+	}
+	if ((c = select(hifd, &ibits, &obits, &xbits,
+			(struct timeval *)0)) < 1) {
+	    if (c == -1) {
+		if (errno == EINTR) {
+		    continue;
+		}
+	    }
+	    sleep(5);
+	    continue;
+	}
+	
+	/*
+	 * Any urgent data?
+	 */
+	if (FD_ISSET(net, &xbits)) {
+	    SYNCHing = 1;
+	}
+	
+	/*
+	 * Something to read from the network...
+	 */
+	if (FD_ISSET(net, &ibits)) {
+#if !defined(SO_OOBINLINE)
+	    /*
+	     * In 4.2 (and 4.3 beta) systems, the
+	     * OOB indication and data handling in the kernel
+	     * is such that if two separate TCP Urgent requests
+	     * come in, one byte of TCP data will be overlaid.
+	     * This is fatal for Telnet, but we try to live
+	     * with it.
+	     *
+	     * In addition, in 4.2 (and...), a special protocol
+	     * is needed to pick up the TCP Urgent data in
+	     * the correct sequence.
+	     *
+	     * What we do is:  if we think we are in urgent
+	     * mode, we look to see if we are "at the mark".
+	     * If we are, we do an OOB receive.  If we run
+	     * this twice, we will do the OOB receive twice,
+	     * but the second will fail, since the second
+	     * time we were "at the mark", but there wasn't
+	     * any data there (the kernel doesn't reset
+	     * "at the mark" until we do a normal read).
+	     * Once we've read the OOB data, we go ahead
+	     * and do normal reads.
+	     *
+	     * There is also another problem, which is that
+	     * since the OOB byte we read doesn't put us
+	     * out of OOB state, and since that byte is most
+	     * likely the TELNET DM (data mark), we would
+	     * stay in the TELNET SYNCH (SYNCHing) state.
+	     * So, clocks to the rescue.  If we've "just"
+	     * received a DM, then we test for the
+	     * presence of OOB data when the receive OOB
+	     * fails (and AFTER we did the normal mode read
+	     * to clear "at the mark").
+	     */
+	    if (SYNCHing) {
+		int atmark;
+		
+		ioctl(net, SIOCATMARK, (char *)&atmark);
+		if (atmark) {
+		    ncc = recv(net, netibuf, sizeof (netibuf), MSG_OOB);
+		    if ((ncc == -1) && (errno == EINVAL)) {
+			ncc = read(net, netibuf, sizeof (netibuf));
+			if (sequenceIs(didnetreceive, gotDM)) {
+			    SYNCHing = stilloob(net);
+			}
+		    }
+		} 
+		else {
+		    ncc = read(net, netibuf, sizeof (netibuf));
+		}
+	    } 
+	    else {
+		ncc = read(net, netibuf, sizeof (netibuf));
+	    }
+	    settimer(didnetreceive);
+#else	/* !defined(SO_OOBINLINE)) */
+	    ncc = read(net, netibuf, sizeof (netibuf));
+#endif	/* !defined(SO_OOBINLINE)) */
+	    if (ncc < 0 && errno == EWOULDBLOCK)
+		ncc = 0;
+	    else {
+		if (ncc <= 0) {
+		    break;
+		}
+		netip = netibuf;
+	    }
+	    DIAG((TD_REPORT | TD_NETDATA),
+		 netoprintf("td: netread %d chars\r\n", ncc););
+	    DIAG(TD_NETDATA, printdata("nd", netip, ncc));
+	}
+	
+	/*
+	 * Something to read from the pty...
+	 */
+	if (FD_ISSET(p, &ibits)) {
+	    pcc = read(p, ptyibuf, BUFSIZ);
+	    /*
+	     * On some systems, if we try to read something
+	     * off the master side before the slave side is
+	     * opened, we get EIO.
+	     */
+	    if (pcc < 0 && (errno == EWOULDBLOCK || errno == EIO)) {
+		pcc = 0;
+	    } 
+	    else {
+		if (pcc <= 0)
+		    break;
+#ifdef	LINEMODE
+				/*
+				 * If ioctl from pty, pass it through net
+				 */
+		if (ptyibuf[0] & TIOCPKT_IOCTL) {
+		    copy_termbuf(ptyibuf+1, pcc-1);
+		    localstat();
+		    pcc = 1;
+		}
+#endif	/* LINEMODE */
+		if (ptyibuf[0] & TIOCPKT_FLUSHWRITE) {
+		    netclear();	/* clear buffer back */
+#ifndef	NO_URGENT
+		    /*
+		     * There are client telnets on some
+		     * operating systems get screwed up
+		     * royally if we send them urgent
+		     * mode data.
+		     */
+		    netoprintf("%c%c", IAC, DM);
+		    neturg = nfrontp-1; /* off by one XXX */
+#endif
+		}
+		if (his_state_is_will(TELOPT_LFLOW) &&
+		    (ptyibuf[0] &
+		     (TIOCPKT_NOSTOP|TIOCPKT_DOSTOP))) {
+			netoprintf("%c%c%c%c%c%c",
+				   IAC, SB, TELOPT_LFLOW,
+				   ptyibuf[0] & TIOCPKT_DOSTOP ? 1 : 0,
+				   IAC, SE);
+		}
+		pcc--;
+		ptyip = ptyibuf+1;
+	    }
+	}
+	
+	while (pcc > 0) {
+	    if ((&netobuf[BUFSIZ] - nfrontp) < 2)
+		break;
+	    c = *ptyip++ & 0377, pcc--;
+	    if (c == IAC)
+		*nfrontp++ = c;
+	    *nfrontp++ = c;
+	    if ((c == '\r'  ) && (my_state_is_wont(TELOPT_BINARY))) {
+		if (pcc > 0 && ((*ptyip & 0377) == '\n')) {
+		    *nfrontp++ = *ptyip++ & 0377;
+		    pcc--;
+		} 
+		else *nfrontp++ = '\0';
+	    }
+	}
+
+	if (FD_ISSET(f, &obits) && (nfrontp - nbackp) > 0)
+	    netflush();
+	if (ncc > 0)
+	    telrcv();
+	if (FD_ISSET(p, &obits) && (pfrontp - pbackp) > 0)
+	    ptyflush();
+    }
+    cleanup(0);
+}  /* end of telnet */
+	
+#ifndef	TCSIG
+# ifdef	TIOCSIG
+#  define TCSIG TIOCSIG
+# endif
+#endif
+
+/*
+ * Send interrupt to process on other side of pty.
+ * If it is in raw mode, just write NULL;
+ * otherwise, write intr char.
+ */
+void interrupt(void) {
+    ptyflush();	/* half-hearted */
+    
+#ifdef	TCSIG
+    (void) ioctl(pty, TCSIG, (char *)SIGINT);
+#else	/* TCSIG */
+    init_termbuf();
+    *pfrontp++ = slctab[SLC_IP].sptr ?
+	 (unsigned char)*slctab[SLC_IP].sptr : '\177';
+#endif	/* TCSIG */
+}
+
+/*
+ * Send quit to process on other side of pty.
+ * If it is in raw mode, just write NULL;
+ * otherwise, write quit char.
+ */
+void sendbrk(void) {
+    ptyflush();	/* half-hearted */
+#ifdef	TCSIG
+    (void) ioctl(pty, TCSIG, (char *)SIGQUIT);
+#else	/* TCSIG */
+    init_termbuf();
+    *pfrontp++ = slctab[SLC_ABORT].sptr ?
+	 (unsigned char)*slctab[SLC_ABORT].sptr : '\034';
+#endif	/* TCSIG */
+}
+
+void sendsusp(void) {
+#ifdef	SIGTSTP
+    ptyflush();	/* half-hearted */
+# ifdef	TCSIG
+    (void) ioctl(pty, TCSIG, (char *)SIGTSTP);
+# else	/* TCSIG */
+    *pfrontp++ = slctab[SLC_SUSP].sptr ?
+	(unsigned char)*slctab[SLC_SUSP].sptr : '\032';
+# endif	/* TCSIG */
+#endif	/* SIGTSTP */
+}
+
+/*
+ * When we get an AYT, if ^T is enabled, use that.  Otherwise,
+ * just send back "[Yes]".
+ */
+void recv_ayt(void) {
+#if	defined(SIGINFO) && defined(TCSIG)
+    if (slctab[SLC_AYT].sptr && *slctab[SLC_AYT].sptr != _POSIX_VDISABLE) {
+	(void) ioctl(pty, TCSIG, (char *)SIGINFO);
+	return;
+    }
+#endif
+    netoprintf("\r\n[Yes]\r\n");
+}
+
+void doeof(void) {
+    init_termbuf();
+
+#if	defined(LINEMODE) && (VEOF == VMIN)
+    if (!tty_isediting()) {
+	extern char oldeofc;
+	*pfrontp++ = oldeofc;
+	return;
+    }
+#endif
+    *pfrontp++ = slctab[SLC_EOF].sptr ?
+	     (unsigned char)*slctab[SLC_EOF].sptr : '\004';
+}
Index: utility.c
===================================================================
--- utility.c	(nonexistent)
+++ utility.c	(revision 5)
@@ -0,0 +1,1153 @@
+/*
+ * Copyright (c) 1989 Regents of the University of California.
+ * All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ * 1. Redistributions of source code must retain the above copyright
+ *    notice, this list of conditions and the following disclaimer.
+ * 2. Redistributions in binary form must reproduce the above copyright
+ *    notice, this list of conditions and the following disclaimer in the
+ *    documentation and/or other materials provided with the distribution.
+ * 3. All advertising materials mentioning features or use of this software
+ *    must display the following acknowledgement:
+ *	This product includes software developed by the University of
+ *	California, Berkeley and its contributors.
+ * 4. Neither the name of the University nor the names of its contributors
+ *    may be used to endorse or promote products derived from this software
+ *    without specific prior written permission.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+ * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+ * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+ * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+ * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+ * SUCH DAMAGE.
+ */
+
+/*
+ * From: @(#)utility.c	5.8 (Berkeley) 3/22/91
+ */
+char util_rcsid[] = 
+  "$Id: utility.c,v 1.11 1999/12/12 14:59:45 dholland Exp $";
+
+#define PRINTOPTIONS
+
+#include <stdarg.h>
+#include <sys/utsname.h>
+#include <time.h>
+
+#ifdef AUTHENTICATE
+#include <libtelnet/auth.h>
+#endif
+
+#include "telnetd.h"
+
+/*
+ * utility functions performing io related tasks
+ */
+
+void
+netoprintf(const char *fmt, ...)
+{
+   int len = 0, maxsize;
+   va_list ap;
+   int done=0;
+
+   while (!done) {
+      maxsize = sizeof(netobuf) - (nfrontp - netobuf);
+      if (maxsize < 0) {
+	/* no way this is gonna fit - try to flush some */
+	netflush();
+        maxsize = sizeof(netobuf) - (nfrontp - netobuf);
+	if (maxsize < 0)
+	  break;
+      }
+
+      va_start(ap, fmt);
+      len = vsnprintf(nfrontp, maxsize, fmt, ap);
+      va_end(ap);
+
+      if (len<=0 || len==maxsize) {
+	 /* didn't fit */
+	 netflush();
+      }
+      else {
+	 done = 1;
+      }
+   }
+   nfrontp += len;
+}
+
+/*
+ * ttloop
+ *
+ *	A small subroutine to flush the network output buffer, get some data
+ * from the network, and pass it through the telnet state machine.  We
+ * also flush the pty input buffer (by dropping its data) if it becomes
+ * too full.
+ */
+
+void
+ttloop(void)
+{
+
+    DIAG(TD_REPORT, netoprintf("td: ttloop\r\n"););
+		     
+    if (nfrontp-nbackp) {
+	netflush();
+    }
+    ncc = read(net, netibuf, sizeof(netibuf));
+    if (ncc < 0) {
+	syslog(LOG_INFO, "ttloop: read: %m\n");
+	exit(1);
+    } else if (ncc == 0) {
+	syslog(LOG_INFO, "ttloop: peer died: EOF\n");
+	exit(1);
+    }
+    DIAG(TD_REPORT, netoprintf("td: ttloop read %d chars\r\n", ncc););
+    netip = netibuf;
+    telrcv();			/* state machine */
+    if (ncc > 0) {
+	pfrontp = pbackp = ptyobuf;
+	telrcv();
+    }
+}  /* end of ttloop */
+
+/*
+ * Check a descriptor to see if out of band data exists on it.
+ */
+int stilloob(int s)		/* socket number */
+{
+    static struct timeval timeout = { 0, 0 };
+    fd_set	excepts;
+    int value;
+
+    do {
+	FD_ZERO(&excepts);
+	FD_SET(s, &excepts);
+	value = select(s+1, (fd_set *)0, (fd_set *)0, &excepts, &timeout);
+    } while ((value == -1) && (errno == EINTR));
+
+    if (value < 0) {
+	fatalperror(pty, "select");
+    }
+    if (FD_ISSET(s, &excepts)) {
+	return 1;
+    } else {
+	return 0;
+    }
+}
+
+void 	ptyflush(void)
+{
+	int n;
+
+	if ((n = pfrontp - pbackp) > 0) {
+		DIAG((TD_REPORT | TD_PTYDATA),
+		     netoprintf("td: ptyflush %d chars\r\n", n););
+		DIAG(TD_PTYDATA, printdata("pd", pbackp, n));
+		n = write(pty, pbackp, n);
+	}
+	if (n < 0) {
+		if (errno == EWOULDBLOCK || errno == EINTR)
+			return;
+		cleanup(0);
+	}
+	pbackp += n;
+	if (pbackp == pfrontp)
+		pbackp = pfrontp = ptyobuf;
+}
+
+/*
+ * nextitem()
+ *
+ *	Return the address of the next "item" in the TELNET data
+ * stream.  This will be the address of the next character if
+ * the current address is a user data character, or it will
+ * be the address of the character following the TELNET command
+ * if the current address is a TELNET IAC ("I Am a Command")
+ * character.
+ */
+static
+char *
+nextitem(char *current)
+{
+    if ((*current&0xff) != IAC) {
+	return current+1;
+    }
+    switch (*(current+1)&0xff) {
+    case DO:
+    case DONT:
+    case WILL:
+    case WONT:
+	return current+3;
+    case SB:		/* loop forever looking for the SE */
+	{
+	    register char *look = current+2;
+
+	    for (;;) {
+		if ((*look++&0xff) == IAC) {
+		    if ((*look++&0xff) == SE) {
+			return look;
+		    }
+		}
+	    }
+	}
+    default:
+	return current+2;
+    }
+}  /* end of nextitem */
+
+
+/*
+ * netclear()
+ *
+ *	We are about to do a TELNET SYNCH operation.  Clear
+ * the path to the network.
+ *
+ *	Things are a bit tricky since we may have sent the first
+ * byte or so of a previous TELNET command into the network.
+ * So, we have to scan the network buffer from the beginning
+ * until we are up to where we want to be.
+ *
+ *	A side effect of what we do, just to keep things
+ * simple, is to clear the urgent data pointer.  The principal
+ * caller should be setting the urgent data pointer AFTER calling
+ * us in any case.
+ */
+void netclear(void)
+{
+    register char *thisitem, *next;
+    char *good;
+#define	wewant(p)	((nfrontp > p) && ((*p&0xff) == IAC) && \
+				((*(p+1)&0xff) != EC) && ((*(p+1)&0xff) != EL))
+
+#if	defined(ENCRYPT)
+    thisitem = nclearto > netobuf ? nclearto : netobuf;
+#else
+    thisitem = netobuf;
+#endif
+
+    while ((next = nextitem(thisitem)) <= nbackp) {
+	thisitem = next;
+    }
+
+    /* Now, thisitem is first before/at boundary. */
+
+#if	defined(ENCRYPT)
+    good = nclearto > netobuf ? nclearto : netobuf;
+#else
+    good = netobuf;	/* where the good bytes go */
+#endif
+
+    while (nfrontp > thisitem) {
+	if (wewant(thisitem)) {
+	    int length;
+
+	    next = thisitem;
+	    do {
+		next = nextitem(next);
+	    } while (wewant(next) && (nfrontp > next));
+	    length = next-thisitem;
+	    bcopy(thisitem, good, length);
+	    good += length;
+	    thisitem = next;
+	} else {
+	    thisitem = nextitem(thisitem);
+	}
+    }
+
+    nbackp = netobuf;
+    nfrontp = good;		/* next byte to be sent */
+    neturg = 0;
+}  /* end of netclear */
+
+/*
+ *  netflush
+ *		Send as much data as possible to the network,
+ *	handling requests for urgent data.
+ */
+extern int not42;
+void
+netflush(void)
+{
+    int n;
+
+    if ((n = nfrontp - nbackp) > 0) {
+	DIAG(TD_REPORT,
+	    { netoprintf("td: netflush %d chars\r\n", n);
+	      n = nfrontp - nbackp;  /* update count */
+	    });
+#if	defined(ENCRYPT)
+	if (encrypt_output) {
+		char *s = nclearto ? nclearto : nbackp;
+		if (nfrontp - s > 0) {
+			(*encrypt_output)((unsigned char *)s, nfrontp-s);
+			nclearto = nfrontp;
+		}
+	}
+#endif
+	/*
+	 * if no urgent data, or if the other side appears to be an
+	 * old 4.2 client (and thus unable to survive TCP urgent data),
+	 * write the entire buffer in non-OOB mode.
+	 */
+	if ((neturg == 0) || (not42 == 0)) {
+	    n = write(net, nbackp, n);	/* normal write */
+	} else {
+	    n = neturg - nbackp;
+	    /*
+	     * In 4.2 (and 4.3) systems, there is some question about
+	     * what byte in a sendOOB operation is the "OOB" data.
+	     * To make ourselves compatible, we only send ONE byte
+	     * out of band, the one WE THINK should be OOB (though
+	     * we really have more the TCP philosophy of urgent data
+	     * rather than the Unix philosophy of OOB data).
+	     */
+	    if (n > 1) {
+		n = send(net, nbackp, n-1, 0);	/* send URGENT all by itself */
+	    } else {
+		n = send(net, nbackp, n, MSG_OOB);	/* URGENT data */
+	    }
+	}
+    }
+    if (n < 0) {
+	if (errno == EWOULDBLOCK || errno == EINTR)
+		return;
+	cleanup(0);
+    }
+    nbackp += n;
+#if	defined(ENCRYPT)
+    if (nbackp > nclearto)
+	nclearto = 0;
+#endif
+    if (nbackp >= neturg) {
+	neturg = 0;
+    }
+    if (nbackp == nfrontp) {
+	nbackp = nfrontp = netobuf;
+#if	defined(ENCRYPT)
+	nclearto = 0;
+#endif
+    }
+    return;
+}  /* end of netflush */
+
+
+/*
+ * writenet
+ *
+ * Just a handy little function to write a bit of raw data to the net.
+ * It will force a transmit of the buffer if necessary
+ *
+ * arguments
+ *    ptr - A pointer to a character string to write
+ *    len - How many bytes to write
+ */
+void writenet(register unsigned char *ptr, register int len)
+{
+	/* flush buffer if no room for new data) */
+	if ((&netobuf[BUFSIZ] - nfrontp) < len) {
+		/* if this fails, don't worry, buffer is a little big */
+		netflush();
+	}
+
+	bcopy(ptr, nfrontp, len);
+	nfrontp += len;
+
+}  /* end of writenet */
+
+
+/*
+ * miscellaneous functions doing a variety of little jobs follow ...
+ */
+
+
+void
+fatal(int f, const char *msg)
+{
+	char buf[BUFSIZ];
+
+	(void) snprintf(buf, sizeof(buf), "telnetd: %s.\r\n", msg);
+#if	defined(ENCRYPT)
+	if (encrypt_output) {
+		/*
+		 * Better turn off encryption first....
+		 * Hope it flushes...
+		 */
+		encrypt_send_end();
+		netflush();
+	}
+#endif
+	(void) write(f, buf, (int)strlen(buf));
+	sleep(1);	/*XXX*/
+	exit(1);
+}
+
+void
+fatalperror(int f, const char *msg)
+{
+	char buf[BUFSIZ];
+	snprintf(buf, sizeof(buf), "%s: %s\r\n", msg, strerror(errno));
+	fatal(f, buf);
+}
+
+char editedhost[32];
+struct utsname kerninfo;
+
+void
+edithost(const char *pat, const char *host)
+{
+	char *res = editedhost;
+
+	uname(&kerninfo);
+
+	if (!pat)
+		pat = "";
+	while (*pat) {
+		switch (*pat) {
+
+		case '#':
+			if (*host)
+				host++;
+			break;
+
+		case '@':
+			if (*host)
+				*res++ = *host++;
+			break;
+
+		default:
+			*res++ = *pat;
+			break;
+		}
+		if (res == &editedhost[sizeof editedhost - 1]) {
+			*res = '\0';
+			return;
+		}
+		pat++;
+	}
+	if (*host)
+		(void) strncpy(res, host,
+				sizeof editedhost - (res - editedhost) -1);
+	else
+		*res = '\0';
+	editedhost[sizeof editedhost - 1] = '\0';
+}
+
+static char *putlocation;
+
+static 
+void
+putstr(const char *s)
+{
+    while (*s) putchr(*s++);
+}
+
+void putchr(int cc)
+{
+	*putlocation++ = cc;
+}
+
+static char fmtstr[] = { "%H:%M on %A, %d %B %Y" };
+
+void putf(const char *cp, char *where)
+{
+	char *slash;
+	time_t t;
+	char db[100];
+
+	if (where)
+	putlocation = where;
+
+	while (*cp) {
+		if (*cp != '%') {
+			putchr(*cp++);
+			continue;
+		}
+		switch (*++cp) {
+
+		case 't':
+			slash = strrchr(line, '/');
+			if (slash == NULL)
+				putstr(line);
+			else
+				putstr(slash+1);
+			break;
+
+		case 'h':
+			putstr(editedhost);
+			break;
+
+		case 'd':
+			(void)time(&t);
+			(void)strftime(db, sizeof(db), fmtstr, localtime(&t));
+			putstr(db);
+			break;
+
+		case '%':
+			putchr('%');
+			break;
+
+		case 'D':
+			{
+				char	buff[128];
+
+				if (getdomainname(buff,sizeof(buff)) < 0
+					|| buff[0] == '\0'
+					|| strcmp(buff, "(none)") == 0)
+					break;
+				putstr(buff);
+			}
+			break;
+
+		case 'i':
+			{
+				char buff[3];
+				FILE *fp;
+				int p, c;
+
+				if ((fp = fopen(ISSUE_FILE, "r")) == NULL)
+					break;
+				p = '\n';
+				while ((c = fgetc(fp)) != EOF) {
+					if (p == '\n' && c == '#') {
+						do {
+							c = fgetc(fp);
+						} while (c != EOF && c != '\n');
+						continue;
+					} else if (c == '%') {
+						buff[0] = c;
+						c = fgetc(fp);
+						if (c == EOF) break;
+						buff[1] = c;
+						buff[2] = '\0';
+						putf(buff, NULL);
+					} else {
+						if (c == '\n') putchr('\r');
+						putchr(c);
+						p = c;
+					}
+				};
+				(void) fclose(fp);
+			}
+			return; /* ignore remainder of the banner string */
+			/*NOTREACHED*/
+
+		case 's':
+			putstr(kerninfo.sysname);
+			break;
+
+		case 'm':
+			putstr(kerninfo.machine);
+			break;
+
+		case 'r':
+			putstr(kerninfo.release);
+			break;
+
+		case 'v':
+#ifdef __linux__
+			putstr(kerninfo.version);
+#else
+			puts(kerninfo.version);
+#endif
+			break;
+		}
+		cp++;
+	}
+}
+
+#ifdef DIAGNOSTICS
+/*
+ * Print telnet options and commands in plain text, if possible.
+ */
+void
+printoption(const char *fmt, int option)
+{
+	if (TELOPT_OK(option))
+		netoprintf("%s %s\r\n", fmt, TELOPT(option));
+	else if (TELCMD_OK(option))
+		netoprintf("%s %s\r\n", fmt, TELCMD(option));
+	else
+		netoprintf("%s %d\r\n", fmt, option);
+}
+
+/* direction: '<' or '>' */
+/* pointer: where suboption data sits */
+/* length: length of suboption data */
+void
+printsub(char direction, unsigned char *pointer, int length)
+{
+    register int i = -1;
+#ifdef AUTHENTICATE
+    char buf[512];
+#endif
+
+        if (!(diagnostic & TD_OPTIONS))
+		return;
+
+	if (direction) {
+	    netoprintf("td: %s suboption ",
+		       direction == '<' ? "recv" : "send");
+	    if (length >= 3) {
+		register int j;
+
+		i = pointer[length-2];
+		j = pointer[length-1];
+
+		if (i != IAC || j != SE) {
+		    netoprintf("(terminated by ");
+		    if (TELOPT_OK(i))
+			netoprintf("%s ", TELOPT(i));
+		    else if (TELCMD_OK(i))
+			netoprintf("%s ", TELCMD(i));
+		    else
+			netoprintf("%d ", i);
+		    if (TELOPT_OK(j))
+			netoprintf("%s", TELOPT(j));
+		    else if (TELCMD_OK(j))
+			netoprintf("%s", TELCMD(j));
+		    else
+			netoprintf("%d", j);
+		    netoprintf(", not IAC SE!) ");
+		}
+	    }
+	    length -= 2;
+	}
+	if (length < 1) {
+	    netoprintf("(Empty suboption ? ? ?)");
+	    return;
+	}
+	switch (pointer[0]) {
+	case TELOPT_TTYPE:
+	    netoprintf("TERMINAL-TYPE ");
+	    switch (pointer[1]) {
+	    case TELQUAL_IS:
+		netoprintf("IS \"%.*s\"", length-2, (char *)pointer+2);
+		break;
+	    case TELQUAL_SEND:
+		netoprintf("SEND");
+		break;
+	    default:
+		netoprintf("- unknown qualifier %d (0x%x).",
+				pointer[1], pointer[1]);
+	    }
+	    break;
+	case TELOPT_TSPEED:
+	    netoprintf("TERMINAL-SPEED");
+	    if (length < 2) {
+		netoprintf(" (empty suboption ? ? ?)");
+		break;
+	    }
+	    switch (pointer[1]) {
+	    case TELQUAL_IS:
+		netoprintf(" IS %.*s", length-2, (char *)pointer+2);
+		break;
+	    default:
+		if (pointer[1] == 1)
+		    netoprintf(" SEND");
+		else
+		    netoprintf(" %d (unknown)", pointer[1]);
+		for (i = 2; i < length; i++) {
+		    netoprintf(" ?%d?", pointer[i]);
+		}
+		break;
+	    }
+	    break;
+
+	case TELOPT_LFLOW:
+	    netoprintf("TOGGLE-FLOW-CONTROL");
+	    if (length < 2) {
+		netoprintf(" (empty suboption ? ? ?)");
+		break;
+	    }
+	    switch (pointer[1]) {
+	    case 0:
+		netoprintf(" OFF"); break;
+	    case 1:
+		netoprintf(" ON"); break;
+	    default:
+		netoprintf(" %d (unknown)", pointer[1]);
+	    }
+	    for (i = 2; i < length; i++) {
+		netoprintf(" ?%d?", pointer[i]);
+	    }
+	    break;
+
+	case TELOPT_NAWS:
+	    netoprintf("NAWS");
+	    if (length < 2) {
+		netoprintf(" (empty suboption ? ? ?)");
+		break;
+	    }
+	    if (length == 2) {
+		netoprintf(" ?%d?", pointer[1]);
+		break;
+	    }
+	    netoprintf(" %d %d (%d)",
+		pointer[1], pointer[2],
+		(int)((((unsigned int)pointer[1])<<8)|((unsigned int)pointer[2])));
+	    if (length == 4) {
+		netoprintf(" ?%d?", pointer[3]);
+		break;
+	    }
+	    netoprintf(" %d %d (%d)",
+		pointer[3], pointer[4],
+		(int)((((unsigned int)pointer[3])<<8)|((unsigned int)pointer[4])));
+	    for (i = 5; i < length; i++) {
+		netoprintf(" ?%d?", pointer[i]);
+	    }
+	    break;
+
+	case TELOPT_LINEMODE:
+	    netoprintf("LINEMODE ");
+	    if (length < 2) {
+		netoprintf(" (empty suboption ? ? ?)");
+		break;
+	    }
+	    switch (pointer[1]) {
+	    case WILL:
+		netoprintf("WILL ");
+		goto common;
+	    case WONT:
+		netoprintf("WONT ");
+		goto common;
+	    case DO:
+		netoprintf("DO ");
+		goto common;
+	    case DONT:
+		netoprintf("DONT ");
+	    common:
+		if (length < 3) {
+		    netoprintf("(no option ? ? ?)");
+		    break;
+		}
+		switch (pointer[2]) {
+		case LM_FORWARDMASK:
+		    netoprintf("Forward Mask");
+		    for (i = 3; i < length; i++) {
+			netoprintf(" %x", pointer[i]);
+		    }
+		    break;
+		default:
+		    netoprintf("%d (unknown)", pointer[2]);
+		    for (i = 3; i < length; i++) {
+			netoprintf(" %d", pointer[i]);
+		    }
+		    break;
+		}
+		break;
+		
+	    case LM_SLC:
+		netoprintf("SLC");
+		for (i = 2; i < length - 2; i += 3) {
+		    if (SLC_NAME_OK(pointer[i+SLC_FUNC]))
+			netoprintf(" %s", SLC_NAME(pointer[i+SLC_FUNC]));
+		    else
+			netoprintf(" %d", pointer[i+SLC_FUNC]);
+		    switch (pointer[i+SLC_FLAGS]&SLC_LEVELBITS) {
+		    case SLC_NOSUPPORT:
+			netoprintf(" NOSUPPORT"); break;
+		    case SLC_CANTCHANGE:
+			netoprintf(" CANTCHANGE"); break;
+		    case SLC_VARIABLE:
+			netoprintf(" VARIABLE"); break;
+		    case SLC_DEFAULT:
+			netoprintf(" DEFAULT"); break;
+		    }
+		    netoprintf("%s%s%s",
+			pointer[i+SLC_FLAGS]&SLC_ACK ? "|ACK" : "",
+			pointer[i+SLC_FLAGS]&SLC_FLUSHIN ? "|FLUSHIN" : "",
+			pointer[i+SLC_FLAGS]&SLC_FLUSHOUT ? "|FLUSHOUT" : "");
+		    if (pointer[i+SLC_FLAGS]& ~(SLC_ACK|SLC_FLUSHIN|
+						SLC_FLUSHOUT| SLC_LEVELBITS)) {
+			netoprintf("(0x%x)", pointer[i+SLC_FLAGS]);
+		    }
+		    netoprintf(" %d;", pointer[i+SLC_VALUE]);
+		    if ((pointer[i+SLC_VALUE] == IAC) &&
+			(pointer[i+SLC_VALUE+1] == IAC))
+				i++;
+		}
+		for (; i < length; i++) {
+		    netoprintf(" ?%d?", pointer[i]);
+		}
+		break;
+
+	    case LM_MODE:
+		netoprintf("MODE ");
+		if (length < 3) {
+		    netoprintf("(no mode ? ? ?)");
+		    break;
+		}
+		{
+		    char tbuf[32];
+		    snprintf(tbuf, sizeof(tbuf), "%s%s%s%s%s",
+			pointer[2]&MODE_EDIT ? "|EDIT" : "",
+			pointer[2]&MODE_TRAPSIG ? "|TRAPSIG" : "",
+			pointer[2]&MODE_SOFT_TAB ? "|SOFT_TAB" : "",
+			pointer[2]&MODE_LIT_ECHO ? "|LIT_ECHO" : "",
+			pointer[2]&MODE_ACK ? "|ACK" : "");
+		    netoprintf("%s", tbuf[1] ? &tbuf[1] : "0");
+		}
+		if (pointer[2]&~(MODE_EDIT|MODE_TRAPSIG|MODE_ACK)) {
+		    netoprintf(" (0x%x)", pointer[2]);
+		}
+		for (i = 3; i < length; i++) {
+		    netoprintf(" ?0x%x?", pointer[i]);
+		}
+		break;
+	    default:
+		netoprintf("%d (unknown)", pointer[1]);
+		for (i = 2; i < length; i++) {
+		    netoprintf(" %d", pointer[i]);
+		}
+	    }
+	    break;
+
+	case TELOPT_STATUS: {
+	    const char *cp;
+	    register int j, k;
+
+	    netoprintf("STATUS");
+
+	    switch (pointer[1]) {
+	    default:
+		if (pointer[1] == TELQUAL_SEND)
+		    netoprintf(" SEND");
+		else
+		    netoprintf(" %d (unknown)", pointer[1]);
+		for (i = 2; i < length; i++) {
+		    netoprintf(" ?%d?", pointer[i]);
+		}
+		break;
+	    case TELQUAL_IS:
+		netoprintf(" IS\r\n");
+
+		for (i = 2; i < length; i++) {
+		    switch(pointer[i]) {
+		    case DO:	cp = "DO"; goto common2;
+		    case DONT:	cp = "DONT"; goto common2;
+		    case WILL:	cp = "WILL"; goto common2;
+		    case WONT:	cp = "WONT"; goto common2;
+		    common2:
+			i++;
+			if (TELOPT_OK((int)pointer[i]))
+			    netoprintf(" %s %s", cp, TELOPT(pointer[i]));
+			else
+			    netoprintf(" %s %d", cp, pointer[i]);
+
+			netoprintf("\r\n");
+			break;
+
+		    case SB:
+			netoprintf(" SB ");
+			i++;
+			j = k = i;
+			while (j < length) {
+			    if (pointer[j] == SE) {
+				if (j+1 == length)
+				    break;
+				if (pointer[j+1] == SE)
+				    j++;
+				else
+				    break;
+			    }
+			    pointer[k++] = pointer[j++];
+			}
+			printsub(0, &pointer[i], k - i);
+			if (i < length) {
+			    netoprintf(" SE");
+			    i = j;
+			} else
+			    i = j - 1;
+
+			netoprintf("\r\n");
+
+			break;
+				
+		    default:
+			netoprintf(" %d", pointer[i]);
+			break;
+		    }
+		}
+		break;
+	    }
+	    break;
+	  }
+
+	case TELOPT_XDISPLOC:
+	    netoprintf("X-DISPLAY-LOCATION ");
+	    switch (pointer[1]) {
+	    case TELQUAL_IS:
+		netoprintf("IS \"%.*s\"", length-2, (char *)pointer+2);
+		break;
+	    case TELQUAL_SEND:
+		netoprintf("SEND");
+		break;
+	    default:
+		netoprintf("- unknown qualifier %d (0x%x).",
+				pointer[1], pointer[1]);
+	    }
+	    break;
+
+	case TELOPT_ENVIRON:
+	    netoprintf("ENVIRON ");
+	    switch (pointer[1]) {
+	    case TELQUAL_IS:
+		netoprintf("IS ");
+		goto env_common;
+	    case TELQUAL_SEND:
+		netoprintf("SEND ");
+		goto env_common;
+	    case TELQUAL_INFO:
+		netoprintf("INFO ");
+	    env_common:
+		{
+		    register int noquote = 2;
+		    for (i = 2; i < length; i++ ) {
+			switch (pointer[i]) {
+			case ENV_VAR:
+			    if (pointer[1] == TELQUAL_SEND)
+				goto def_case;
+			    netoprintf("\" VAR " + noquote);
+			    noquote = 2;
+			    break;
+
+			case ENV_VALUE:
+			    netoprintf("\" VALUE " + noquote);
+			    noquote = 2;
+			    break;
+
+			case ENV_ESC:
+			    netoprintf("\" ESC " + noquote);
+			    noquote = 2;
+			    break;
+
+			default:
+			def_case:
+			    if (isprint(pointer[i]) && pointer[i] != '"') {
+				if (noquote) {
+				    netoprintf("\"");
+				    noquote = 0;
+				}
+				netoprintf("%c", pointer[i]);
+			    } else {
+				netoprintf("\" %03o " + noquote,
+							pointer[i]);
+				noquote = 2;
+			    }
+			    break;
+			}
+		    }
+		    if (!noquote)
+			netoprintf("\"");
+		    break;
+		}
+	    }
+	    break;
+
+#if	defined(AUTHENTICATE)
+	case TELOPT_AUTHENTICATION:
+	    netoprintf("AUTHENTICATION");
+	
+	    if (length < 2) {
+		netoprintf(" (empty suboption ? ? ?)");
+		break;
+	    }
+	    switch (pointer[1]) {
+	    case TELQUAL_REPLY:
+	    case TELQUAL_IS:
+		netoprintf(" %s ", (pointer[1] == TELQUAL_IS) ?
+							"IS" : "REPLY");
+		if (AUTHTYPE_NAME_OK(pointer[2]))
+		    netoprintf("%s ", AUTHTYPE_NAME(pointer[2]));
+		else
+		    netoprintf("%d ", pointer[2]);
+		if (length < 3) {
+		    netoprintf("(partial suboption ? ? ?)");
+		    break;
+		}
+		netoprintf("%s|%s",
+			((pointer[3] & AUTH_WHO_MASK) == AUTH_WHO_CLIENT) ?
+			"CLIENT" : "SERVER",
+			((pointer[3] & AUTH_HOW_MASK) == AUTH_HOW_MUTUAL) ?
+			"MUTUAL" : "ONE-WAY");
+
+		auth_printsub(&pointer[1], length - 1, buf, sizeof(buf));
+		netoprintf("%s", buf);
+		break;
+
+	    case TELQUAL_SEND:
+		i = 2;
+		netoprintf(" SEND ");
+		while (i < length) {
+		    if (AUTHTYPE_NAME_OK(pointer[i]))
+			netoprintf("%s ", AUTHTYPE_NAME(pointer[i]));
+		    else
+			netoprintf("%d ", pointer[i]);
+		    if (++i >= length) {
+			netoprintf("(partial suboption ? ? ?)");
+			break;
+		    }
+		    netoprintf("%s|%s ",
+			((pointer[i] & AUTH_WHO_MASK) == AUTH_WHO_CLIENT) ?
+							"CLIENT" : "SERVER",
+			((pointer[i] & AUTH_HOW_MASK) == AUTH_HOW_MUTUAL) ?
+							"MUTUAL" : "ONE-WAY");
+		    ++i;
+		}
+		break;
+
+	    case TELQUAL_NAME:
+		i = 2;
+		netoprintf(" NAME \"");
+		/*
+		 * Was:
+		 *    while (i < length)
+		 *       *nfrontp += pointer[i++];
+		 *    *nfrontp += '"';
+		 *
+		 * but I'm pretty sure that's wrong...
+		 */
+		while (i < length)
+		    netoprintf("%c", pointer[i++]);
+		netoprintf("\"");
+		break;
+
+	    default:
+		    for (i = 2; i < length; i++) {
+			netoprintf(" ?%d?", pointer[i]);
+		    }
+		    break;
+	    }
+	    break;
+#endif
+
+#if	defined(ENCRYPT)
+	case TELOPT_ENCRYPT:
+	    netoprintf("ENCRYPT");
+	    if (length < 2) {
+		netoprintf(" (empty suboption ? ? ?)");
+		break;
+	    }
+	    switch (pointer[1]) {
+	    case ENCRYPT_START:
+		netoprintf(" START");
+		break;
+
+	    case ENCRYPT_END:
+		netoprintf(" END");
+		break;
+
+	    case ENCRYPT_REQSTART:
+		netoprintf(" REQUEST-START");
+		break;
+
+	    case ENCRYPT_REQEND:
+		netoprintf(" REQUEST-END");
+		break;
+
+	    case ENCRYPT_IS:
+	    case ENCRYPT_REPLY:
+		netoprintf(" %s ", (pointer[1] == ENCRYPT_IS) ?
+							"IS" : "REPLY");
+		if (length < 3) {
+		    netoprintf(" (partial suboption ? ? ?)");
+		    break;
+		}
+		if (ENCTYPE_NAME_OK(pointer[2]))
+		    netoprintf("%s ", ENCTYPE_NAME(pointer[2]));
+		else
+		    netoprintf(" %d (unknown)", pointer[2]);
+
+		encrypt_printsub(&pointer[1], length - 1, buf, sizeof(buf));
+		netoprintf("%s", buf);
+		break;
+
+	    case ENCRYPT_SUPPORT:
+		i = 2;
+		netoprintf(" SUPPORT ");
+		while (i < length) {
+		    if (ENCTYPE_NAME_OK(pointer[i]))
+			netoprintf("%s ", ENCTYPE_NAME(pointer[i]));
+		    else
+			netoprintf("%d ", pointer[i]);
+		    i++;
+		}
+		break;
+
+	    case ENCRYPT_ENC_KEYID:
+		netoprintf(" ENC_KEYID", pointer[1]);
+		goto encommon;
+
+	    case ENCRYPT_DEC_KEYID:
+		netoprintf(" DEC_KEYID", pointer[1]);
+		goto encommon;
+
+	    default:
+		netoprintf(" %d (unknown)", pointer[1]);
+	    encommon:
+		for (i = 2; i < length; i++) {
+		    netoprintf(" %d", pointer[i]);
+		}
+		break;
+	    }
+	    break;
+#endif
+
+	default:
+	    if (TELOPT_OK(pointer[0]))
+	        netoprintf("%s (unknown)", TELOPT(pointer[0]));
+	    else
+	        netoprintf("%d (unknown)", pointer[i]);
+	    for (i = 1; i < length; i++) {
+		netoprintf(" %d", pointer[i]);
+	    }
+	    break;
+	}
+	netoprintf("\r\n");
+}
+
+/*
+ * Dump a data buffer in hex and ascii to the output data stream.
+ */
+void
+printdata(const char *tag, const char *ptr, int cnt)
+{
+	register int i;
+	char xbuf[30];
+
+	while (cnt) {
+		/* flush net output buffer if no room for new data) */
+		if ((&netobuf[BUFSIZ] - nfrontp) < 80) {
+			netflush();
+		}
+
+		/* add a line of output */
+		netoprintf("%s: ", tag);
+		for (i = 0; i < 20 && cnt; i++) {
+			netoprintf("%02x", *ptr);
+			if (isprint(*ptr)) {
+				xbuf[i] = *ptr;
+			} else {
+				xbuf[i] = '.';
+			}
+			if (i % 2) { 
+				netoprintf(" ");
+			}
+			cnt--;
+			ptr++;
+		}
+		xbuf[i] = '\0';
+		netoprintf(" %s\r\n", xbuf );
+	} 
+}
+#endif /* DIAGNOSTICS */
Index: .
===================================================================
--- .	(nonexistent)
+++ .	(revision 5)

Property changes on: .
___________________________________________________________________
Added: svn:ignore
## -0,0 +1,73 ##
+
+# install dir
+dist
+
+# Target build dirs
+.a1x-newlib
+.a2x-newlib
+.at91sam7s-newlib
+
+.build-machine
+
+.a1x-glibc
+.a2x-glibc
+.h3-glibc
+.h5-glibc
+.i586-glibc
+.i686-glibc
+.imx6-glibc
+.jz47xx-glibc
+.makefile
+.am335x-glibc
+.omap543x-glibc
+.p5600-glibc
+.power8-glibc
+.power8le-glibc
+.power9-glibc
+.power9le-glibc
+.m1000-glibc
+.riscv64-glibc
+.rk328x-glibc
+.rk33xx-glibc
+.rk339x-glibc
+.s8xx-glibc
+.s9xx-glibc
+.x86_64-glibc
+
+# Hidden files (each file)
+.makefile
+.dist
+.rootfs
+
+# src & hw requires
+.src_requires
+.src_requires_depend
+.requires
+.requires_depend
+
+# Tarballs
+*.gz
+*.bz2
+*.lz
+*.xz
+*.tgz
+*.txz
+
+# Signatures
+*.asc
+*.sig
+*.sign
+*.sha1sum
+
+# Patches
+*.patch
+
+# Descriptions
+*.dsc
+*.txt
+
+# Default linux config files
+*.defconfig
+
+# backup copies
+*~