2015-12-07 16:26:57 +01:00
|
|
|
/****************************************************************************
|
2015-12-07 20:48:06 +01:00
|
|
|
* drivers/net/telnet.c
|
2015-12-07 16:26:57 +01:00
|
|
|
*
|
2019-01-05 19:14:05 +01:00
|
|
|
* Copyright (C) 2007, 2009, 2011-2013, 2017, 2019 Gregory Nutt. All
|
|
|
|
* rights reserved.
|
2015-12-07 16:26:57 +01:00
|
|
|
* Author: Gregory Nutt <gnutt@nuttx.org>
|
|
|
|
*
|
|
|
|
* This is a leverage of similar logic from uIP which has a compatible BSD
|
|
|
|
* license:
|
|
|
|
*
|
|
|
|
* Author: Adam Dunkels <adam@sics.se>
|
|
|
|
* Copyright (c) 2003, Adam Dunkels.
|
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
*
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
2019-01-05 19:14:05 +01:00
|
|
|
* 3. Neither the name of the Institute, NuttX nor the names of its
|
|
|
|
* contributors may be used to endorse or promote products derived
|
|
|
|
* from this software without specific prior written permission.
|
2015-12-07 16:26:57 +01:00
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Included Files
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#include <nuttx/config.h>
|
|
|
|
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/socket.h>
|
2015-12-07 20:48:06 +01:00
|
|
|
#include <sys/stat.h>
|
2015-12-07 16:26:57 +01:00
|
|
|
|
|
|
|
#include <stdint.h>
|
|
|
|
#include <stdbool.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <fcntl.h>
|
|
|
|
#include <semaphore.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <poll.h>
|
|
|
|
#include <errno.h>
|
|
|
|
#include <debug.h>
|
|
|
|
|
|
|
|
#include <nuttx/fs/fs.h>
|
|
|
|
#include <nuttx/net/net.h>
|
|
|
|
#include <nuttx/net/telnet.h>
|
|
|
|
|
2015-12-07 20:48:06 +01:00
|
|
|
#ifdef CONFIG_NETDEV_TELNET
|
|
|
|
|
2015-12-07 16:26:57 +01:00
|
|
|
/****************************************************************************
|
|
|
|
* Pre-processor Definitions
|
|
|
|
****************************************************************************/
|
2019-01-05 19:14:05 +01:00
|
|
|
|
2015-12-07 16:26:57 +01:00
|
|
|
/* Configuration ************************************************************/
|
|
|
|
|
|
|
|
#ifndef CONFIG_TELNET_RXBUFFER_SIZE
|
|
|
|
# define CONFIG_TELNET_RXBUFFER_SIZE 256
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifndef CONFIG_TELNET_TXBUFFER_SIZE
|
|
|
|
# define CONFIG_TELNET_TXBUFFER_SIZE 256
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/* Telnet protocol stuff ****************************************************/
|
|
|
|
|
2019-01-05 19:14:05 +01:00
|
|
|
#define ISO_nl 0x0a
|
|
|
|
#define ISO_cr 0x0d
|
|
|
|
|
|
|
|
/* Telnet commands */
|
|
|
|
|
|
|
|
#define TELNET_ECHO 1
|
|
|
|
#define TELNET_SGA 3 /* Suppress Go Ahead */
|
|
|
|
#define TELNET_NAWS 31 /* Negotiate about window size */
|
|
|
|
|
|
|
|
/* Telnet control */
|
2015-12-07 16:26:57 +01:00
|
|
|
|
2019-01-05 19:14:05 +01:00
|
|
|
#define TELNET_IAC 255
|
|
|
|
#define TELNET_WILL 251
|
|
|
|
#define TELNET_WONT 252
|
|
|
|
#define TELNET_DO 253
|
|
|
|
#define TELNET_DONT 254
|
|
|
|
#define TELNET_SB 250
|
|
|
|
#define TELNET_SE 240
|
2018-01-09 12:16:02 +01:00
|
|
|
|
2019-01-05 19:14:05 +01:00
|
|
|
/* Linemode sub options */
|
|
|
|
|
|
|
|
#define TELNET_LM_MODE 1
|
|
|
|
#define TELNET_LM_FORWARDMASK 2
|
|
|
|
#define TELNET_LM_SLC 3
|
2015-12-07 16:26:57 +01:00
|
|
|
|
|
|
|
/* Device stuff *************************************************************/
|
|
|
|
|
|
|
|
#define TELNETD_DEVFMT "/dev/telnet%d"
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Private Types
|
|
|
|
****************************************************************************/
|
2019-01-05 19:14:05 +01:00
|
|
|
|
2015-12-07 16:26:57 +01:00
|
|
|
/* The state of the telnet parser */
|
|
|
|
|
|
|
|
enum telnet_state_e
|
|
|
|
{
|
|
|
|
STATE_NORMAL = 0,
|
|
|
|
STATE_IAC,
|
|
|
|
STATE_WILL,
|
|
|
|
STATE_WONT,
|
|
|
|
STATE_DO,
|
2019-01-05 19:14:05 +01:00
|
|
|
STATE_DONT,
|
|
|
|
STATE_SB,
|
|
|
|
STATE_SB_NAWS,
|
|
|
|
STATE_SE
|
2015-12-07 16:26:57 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
/* This structure describes the internal state of the driver */
|
|
|
|
|
|
|
|
struct telnet_dev_s
|
|
|
|
{
|
2019-01-05 19:14:05 +01:00
|
|
|
sem_t td_exclsem; /* Enforces mutually exclusive access */
|
|
|
|
uint8_t td_state; /* (See telnet_state_e) */
|
|
|
|
uint8_t td_pending; /* Number of valid, pending bytes in the rxbuffer */
|
|
|
|
uint8_t td_offset; /* Offset to the valid, pending bytes in the rxbuffer */
|
|
|
|
uint8_t td_crefs; /* The number of open references to the session */
|
|
|
|
int td_minor; /* Minor device number */
|
|
|
|
#ifdef CONFIG_TELNET_SUPPORT_NAWS
|
|
|
|
uint16_t td_rows; /* Number of NAWS rows */
|
|
|
|
uint16_t td_cols; /* Number of NAWS cols */
|
|
|
|
int td_sb_count; /* Count of TELNET_SB bytes received */
|
|
|
|
#endif
|
|
|
|
FAR struct socket td_psock; /* A clone of the internal socket structure */
|
2015-12-07 16:26:57 +01:00
|
|
|
char td_rxbuffer[CONFIG_TELNET_RXBUFFER_SIZE];
|
|
|
|
char td_txbuffer[CONFIG_TELNET_TXBUFFER_SIZE];
|
|
|
|
};
|
|
|
|
|
2019-01-05 19:14:05 +01:00
|
|
|
/* This structure contains global information visible to all telnet driver
|
2015-12-07 16:26:57 +01:00
|
|
|
* instances.
|
|
|
|
*/
|
|
|
|
|
|
|
|
struct telnet_common_s
|
|
|
|
{
|
2019-01-05 19:14:05 +01:00
|
|
|
sem_t tc_exclsem; /* Enforces exclusive access to 'minor' */
|
|
|
|
uint16_t tc_minor; /* The next minor number to use */
|
2015-12-07 16:26:57 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Private Function Prototypes
|
|
|
|
****************************************************************************/
|
2019-01-05 19:14:05 +01:00
|
|
|
|
2015-12-07 16:26:57 +01:00
|
|
|
/* Support functions */
|
|
|
|
|
|
|
|
#ifdef CONFIG_TELNET_DUMPBUFFER
|
|
|
|
static inline void telnet_dumpbuffer(FAR const char *msg,
|
|
|
|
FAR const char *buffer, unsigned int nbytes);
|
|
|
|
#else
|
|
|
|
# define telnet_dumpbuffer(msg,buffer,nbytes)
|
|
|
|
#endif
|
|
|
|
static void telnet_getchar(FAR struct telnet_dev_s *priv, uint8_t ch,
|
|
|
|
FAR char *dest, int *nread);
|
|
|
|
static ssize_t telnet_receive(FAR struct telnet_dev_s *priv,
|
|
|
|
FAR const char *src, size_t srclen, FAR char *dest,
|
|
|
|
size_t destlen);
|
|
|
|
static bool telnet_putchar(FAR struct telnet_dev_s *priv, uint8_t ch,
|
|
|
|
int *nwritten);
|
|
|
|
static void telnet_sendopt(FAR struct telnet_dev_s *priv, uint8_t option,
|
|
|
|
uint8_t value);
|
|
|
|
|
2015-12-07 20:48:06 +01:00
|
|
|
/* Telnet character driver methods */
|
2015-12-07 16:26:57 +01:00
|
|
|
|
|
|
|
static int telnet_open(FAR struct file *filep);
|
|
|
|
static int telnet_close(FAR struct file *filep);
|
2019-01-05 19:14:05 +01:00
|
|
|
static ssize_t telnet_read(FAR struct file *filep, FAR char *buffer,
|
|
|
|
size_t len);
|
|
|
|
static ssize_t telnet_write(FAR struct file *filep, FAR const char *buffer,
|
|
|
|
size_t len);
|
|
|
|
#ifndef CONFIG_DISABLE_POLL
|
|
|
|
static int telnet_poll(FAR struct file *filep, FAR struct pollfd *fds,
|
|
|
|
bool setup);
|
|
|
|
#endif
|
2015-12-07 20:48:06 +01:00
|
|
|
|
|
|
|
/* Telnet session creation */
|
|
|
|
|
|
|
|
static int telnet_session(FAR struct telnet_session_s *session);
|
|
|
|
|
|
|
|
/* Telnet factory driver methods */
|
|
|
|
|
|
|
|
static ssize_t factory_read(FAR struct file *filep, FAR char *buffer,
|
|
|
|
size_t buflen);
|
|
|
|
static ssize_t factory_write(FAR struct file *filep, FAR const char *buffer,
|
|
|
|
size_t buflen);
|
|
|
|
static int common_ioctl(FAR struct file *filep, int cmd,
|
2015-12-07 16:26:57 +01:00
|
|
|
unsigned long arg);
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Private Data
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
static const struct file_operations g_telnet_fops =
|
|
|
|
{
|
2015-12-07 20:48:06 +01:00
|
|
|
telnet_open, /* open */
|
|
|
|
telnet_close, /* close */
|
|
|
|
telnet_read, /* read */
|
|
|
|
telnet_write, /* write */
|
2019-01-13 21:04:20 +01:00
|
|
|
NULL, /* seek */
|
2015-12-07 20:48:06 +01:00
|
|
|
common_ioctl /* ioctl */
|
|
|
|
#ifndef CONFIG_DISABLE_POLL
|
2019-01-05 19:14:05 +01:00
|
|
|
, telnet_poll /* poll */
|
2015-12-07 20:48:06 +01:00
|
|
|
#endif
|
2019-01-13 21:04:20 +01:00
|
|
|
#ifndef CONFIG_DISABLE_PSEUDOFS_OPERATIONS
|
|
|
|
, NULL /* unlink */
|
|
|
|
#endif
|
2015-12-07 20:48:06 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
static const struct file_operations g_factory_fops =
|
|
|
|
{
|
2019-01-13 21:04:20 +01:00
|
|
|
NULL, /* open */
|
|
|
|
NULL, /* close */
|
2015-12-07 20:48:06 +01:00
|
|
|
factory_read, /* read */
|
|
|
|
factory_write, /* write */
|
2019-01-13 21:04:20 +01:00
|
|
|
NULL, /* seek */
|
|
|
|
common_ioctl /* ioctl */
|
2015-12-07 16:26:57 +01:00
|
|
|
#ifndef CONFIG_DISABLE_POLL
|
2019-01-05 19:14:05 +01:00
|
|
|
, telnet_poll /* poll */
|
2015-12-07 16:26:57 +01:00
|
|
|
#endif
|
2019-01-13 21:04:20 +01:00
|
|
|
#ifndef CONFIG_DISABLE_PSEUDOFS_OPERATIONS
|
|
|
|
, NULL /* unlink */
|
|
|
|
#endif
|
2015-12-07 16:26:57 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
/* Global information shared amongst telnet driver instanaces. */
|
|
|
|
|
|
|
|
static struct telnet_common_s g_telnet_common =
|
|
|
|
{
|
|
|
|
SEM_INITIALIZER(1),
|
|
|
|
0
|
|
|
|
};
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Private Functions
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: telnet_dumpbuffer
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Dump a buffer of data (debug only)
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
#ifdef CONFIG_TELNET_DUMPBUFFER
|
|
|
|
static inline void telnet_dumpbuffer(FAR const char *msg,
|
|
|
|
FAR const char *buffer,
|
|
|
|
unsigned int nbytes)
|
|
|
|
{
|
2016-06-11 22:14:08 +02:00
|
|
|
/* CONFIG_DEBUG_FEATURES, CONFIG_DEBUG_INFO, and CONFIG_DEBUG_NET have to be
|
2019-01-05 19:14:05 +01:00
|
|
|
* defined or the following does nothing.
|
|
|
|
*/
|
2015-12-07 16:26:57 +01:00
|
|
|
|
2019-01-05 19:14:05 +01:00
|
|
|
ninfodumpbuffer(msg, (FAR const uint8_t *)buffer, nbytes);
|
2015-12-07 16:26:57 +01:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: telnet_getchar
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Get another character for the user received buffer from the RX buffer
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
static void telnet_getchar(FAR struct telnet_dev_s *priv, uint8_t ch,
|
|
|
|
FAR char *dest, int *nread)
|
|
|
|
{
|
|
|
|
register int index;
|
|
|
|
|
2018-01-09 12:16:02 +01:00
|
|
|
#ifndef CONFIG_TELNET_CHARACTER_MODE
|
2015-12-07 16:26:57 +01:00
|
|
|
/* Ignore carriage returns */
|
|
|
|
|
|
|
|
if (ch != ISO_cr)
|
2018-01-09 12:16:02 +01:00
|
|
|
#endif
|
2015-12-07 16:26:57 +01:00
|
|
|
{
|
|
|
|
/* Add all other characters to the destination buffer */
|
|
|
|
|
|
|
|
index = *nread;
|
|
|
|
dest[index++] = ch;
|
|
|
|
*nread = index;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: telnet_receive
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Process a received Telnet buffer
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2019-01-05 19:14:05 +01:00
|
|
|
static ssize_t telnet_receive(FAR struct telnet_dev_s *priv,
|
|
|
|
FAR const char *src, size_t srclen,
|
|
|
|
FAR char *dest, size_t destlen)
|
2015-12-07 16:26:57 +01:00
|
|
|
{
|
|
|
|
int nread;
|
|
|
|
uint8_t ch;
|
|
|
|
|
2016-06-20 19:59:15 +02:00
|
|
|
ninfo("srclen: %d destlen: %d\n", srclen, destlen);
|
2015-12-07 16:26:57 +01:00
|
|
|
|
|
|
|
for (nread = 0; srclen > 0 && nread < destlen; srclen--)
|
|
|
|
{
|
|
|
|
ch = *src++;
|
2016-06-20 19:59:15 +02:00
|
|
|
ninfo("ch=%02x state=%d\n", ch, priv->td_state);
|
2015-12-07 16:26:57 +01:00
|
|
|
|
|
|
|
switch (priv->td_state)
|
|
|
|
{
|
|
|
|
case STATE_IAC:
|
|
|
|
if (ch == TELNET_IAC)
|
|
|
|
{
|
|
|
|
telnet_getchar(priv, ch, dest, &nread);
|
|
|
|
priv->td_state = STATE_NORMAL;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
switch (ch)
|
|
|
|
{
|
|
|
|
case TELNET_WILL:
|
|
|
|
priv->td_state = STATE_WILL;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case TELNET_WONT:
|
|
|
|
priv->td_state = STATE_WONT;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case TELNET_DO:
|
|
|
|
priv->td_state = STATE_DO;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case TELNET_DONT:
|
|
|
|
priv->td_state = STATE_DONT;
|
|
|
|
break;
|
|
|
|
|
2019-01-05 19:14:05 +01:00
|
|
|
#ifdef CONFIG_TELNET_SUPPORT_NAWS
|
|
|
|
case TELNET_SB:
|
|
|
|
priv->td_state = STATE_SB;
|
|
|
|
priv->td_sb_count = 0;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case TELNET_SE:
|
|
|
|
priv->td_state = STATE_NORMAL;
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
|
2015-12-07 16:26:57 +01:00
|
|
|
default:
|
|
|
|
priv->td_state = STATE_NORMAL;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case STATE_WILL:
|
2019-01-05 19:14:05 +01:00
|
|
|
#ifdef CONFIG_TELNET_SUPPORT_NAWS
|
|
|
|
/* For NAWS, Reply with a DO */
|
|
|
|
|
|
|
|
if (ch == TELNET_NAWS)
|
|
|
|
{
|
|
|
|
telnet_sendopt(priv, TELNET_DO, ch);
|
|
|
|
}
|
|
|
|
|
2015-12-07 16:26:57 +01:00
|
|
|
/* Reply with a DONT */
|
|
|
|
|
2019-01-05 19:14:05 +01:00
|
|
|
else
|
|
|
|
#endif
|
|
|
|
{
|
|
|
|
telnet_sendopt(priv, TELNET_DONT, ch);
|
|
|
|
ninfo("Suppress: 0x%02X (%d)\n", ch, ch);
|
|
|
|
}
|
|
|
|
|
2015-12-07 16:26:57 +01:00
|
|
|
priv->td_state = STATE_NORMAL;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case STATE_WONT:
|
|
|
|
telnet_sendopt(priv, TELNET_DONT, ch);
|
|
|
|
priv->td_state = STATE_NORMAL;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case STATE_DO:
|
2018-01-09 12:16:02 +01:00
|
|
|
#ifdef CONFIG_TELNET_CHARACTER_MODE
|
|
|
|
if (ch == TELNET_SGA)
|
|
|
|
{
|
|
|
|
/* If it received 'Suppress Go Ahead', reply with a WILL */
|
|
|
|
|
|
|
|
telnet_sendopt(priv, TELNET_WILL, ch);
|
|
|
|
|
|
|
|
/* Also, send 'WILL ECHO' */
|
|
|
|
|
|
|
|
telnet_sendopt(priv, TELNET_WILL, TELNET_ECHO);
|
|
|
|
}
|
|
|
|
else if (ch == TELNET_ECHO)
|
|
|
|
{
|
|
|
|
/* If it received 'ECHO', then do nothing */
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* Reply with a WONT */
|
|
|
|
|
|
|
|
telnet_sendopt(priv, TELNET_WONT, ch);
|
2019-01-05 19:14:05 +01:00
|
|
|
ninfo("WONT: 0x%02X\n", ch);
|
2018-01-09 12:16:02 +01:00
|
|
|
}
|
|
|
|
#else
|
2015-12-07 16:26:57 +01:00
|
|
|
/* Reply with a WONT */
|
|
|
|
|
|
|
|
telnet_sendopt(priv, TELNET_WONT, ch);
|
2018-01-09 12:16:02 +01:00
|
|
|
#endif
|
2015-12-07 16:26:57 +01:00
|
|
|
priv->td_state = STATE_NORMAL;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case STATE_DONT:
|
|
|
|
/* Reply with a WONT */
|
|
|
|
|
|
|
|
telnet_sendopt(priv, TELNET_WONT, ch);
|
|
|
|
priv->td_state = STATE_NORMAL;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case STATE_NORMAL:
|
|
|
|
if (ch == TELNET_IAC)
|
|
|
|
{
|
|
|
|
priv->td_state = STATE_IAC;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
telnet_getchar(priv, ch, dest, &nread);
|
|
|
|
}
|
|
|
|
break;
|
2019-01-05 19:14:05 +01:00
|
|
|
|
|
|
|
#ifdef CONFIG_TELNET_SUPPORT_NAWS
|
|
|
|
/* Handle Telnet Sub negotation request */
|
|
|
|
|
|
|
|
case STATE_SB:
|
|
|
|
switch (ch)
|
|
|
|
{
|
|
|
|
case TELNET_NAWS:
|
|
|
|
priv->td_state = STATE_SB_NAWS;
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
priv->td_state = STATE_NORMAL;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
/* Handle NAWS sub-option negotiation */
|
|
|
|
|
|
|
|
case STATE_SB_NAWS:
|
|
|
|
/* Update cols / rows based on received byte count */
|
|
|
|
|
|
|
|
switch (priv->td_sb_count)
|
|
|
|
{
|
|
|
|
case 0:
|
|
|
|
priv->td_cols = (priv->td_cols & 0x00FF) | (ch << 8);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case 1:
|
|
|
|
priv->td_cols = (priv->td_cols & 0xFF00) | ch;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case 2:
|
|
|
|
priv->td_rows = (priv->td_rows & 0x00FF) | (ch << 8);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case 3:
|
|
|
|
priv->td_rows = (priv->td_rows & 0xFF00) | ch;
|
|
|
|
ninfo("NAWS: %d,%d", priv->td_cols, priv->td_rows);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Increment SB count and switch to NORMAL when complete */
|
|
|
|
|
|
|
|
if (++priv->td_sb_count == 4)
|
|
|
|
{
|
|
|
|
priv->td_state = STATE_NORMAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
break;
|
|
|
|
#endif
|
2015-12-07 16:26:57 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* We get here if (1) all of the received bytes have been processed, or
|
|
|
|
* (2) if the user's buffer has become full.
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (srclen > 0)
|
|
|
|
{
|
|
|
|
/* Remember where we left off. These bytes will be returned the next
|
|
|
|
* time that telnet_read() is called.
|
|
|
|
*/
|
|
|
|
|
|
|
|
priv->td_pending = srclen;
|
|
|
|
priv->td_offset = (src - priv->td_rxbuffer);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* All of the received bytes were consumed */
|
|
|
|
|
|
|
|
priv->td_pending = 0;
|
|
|
|
priv->td_offset = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
return nread;
|
|
|
|
}
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: telnet_putchar
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Put another character from the user buffer to the TX buffer.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
static bool telnet_putchar(FAR struct telnet_dev_s *priv, uint8_t ch,
|
|
|
|
int *nread)
|
|
|
|
{
|
|
|
|
register int index;
|
|
|
|
bool ret = false;
|
|
|
|
|
|
|
|
/* Ignore carriage returns (we will put these in automatically as necesary) */
|
|
|
|
|
|
|
|
if (ch != ISO_cr)
|
|
|
|
{
|
|
|
|
/* Add all other characters to the destination buffer */
|
|
|
|
|
|
|
|
index = *nread;
|
|
|
|
priv->td_txbuffer[index++] = ch;
|
|
|
|
|
|
|
|
/* Check for line feeds */
|
|
|
|
|
|
|
|
if (ch == ISO_nl)
|
|
|
|
{
|
|
|
|
/* Now add the carriage return */
|
|
|
|
|
|
|
|
priv->td_txbuffer[index++] = ISO_cr;
|
|
|
|
priv->td_txbuffer[index++] = '\0';
|
|
|
|
|
|
|
|
/* End of line */
|
|
|
|
|
|
|
|
ret = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
*nread = index;
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: telnet_sendopt
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Send the telnet option bytes
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
static void telnet_sendopt(FAR struct telnet_dev_s *priv, uint8_t option,
|
|
|
|
uint8_t value)
|
|
|
|
{
|
|
|
|
uint8_t optbuf[4];
|
2017-09-30 01:48:15 +02:00
|
|
|
int ret;
|
|
|
|
|
2015-12-07 16:26:57 +01:00
|
|
|
optbuf[0] = TELNET_IAC;
|
|
|
|
optbuf[1] = option;
|
|
|
|
optbuf[2] = value;
|
|
|
|
optbuf[3] = 0;
|
|
|
|
|
|
|
|
telnet_dumpbuffer("Send optbuf", optbuf, 4);
|
2017-09-30 01:48:15 +02:00
|
|
|
|
|
|
|
ret = psock_send(&priv->td_psock, optbuf, 4, 0);
|
|
|
|
if (ret < 0)
|
2015-12-07 16:26:57 +01:00
|
|
|
{
|
2017-09-30 01:48:15 +02:00
|
|
|
nerr("ERROR: Failed to send TELNET_IAC: %d\n", ret);
|
2015-12-07 16:26:57 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: telnet_open
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
static int telnet_open(FAR struct file *filep)
|
|
|
|
{
|
|
|
|
FAR struct inode *inode = filep->f_inode;
|
|
|
|
FAR struct telnet_dev_s *priv = inode->i_private;
|
|
|
|
int tmp;
|
|
|
|
int ret;
|
|
|
|
|
2016-06-20 19:59:15 +02:00
|
|
|
ninfo("td_crefs: %d\n", priv->td_crefs);
|
2015-12-07 16:26:57 +01:00
|
|
|
|
|
|
|
/* O_NONBLOCK is not supported */
|
|
|
|
|
|
|
|
if (filep->f_oflags & O_NONBLOCK)
|
|
|
|
{
|
|
|
|
ret = -ENOSYS;
|
|
|
|
goto errout;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Get exclusive access to the device structures */
|
|
|
|
|
2017-10-04 23:22:27 +02:00
|
|
|
ret = nxsem_wait(&priv->td_exclsem);
|
2015-12-07 16:26:57 +01:00
|
|
|
if (ret < 0)
|
|
|
|
{
|
2017-10-04 23:22:27 +02:00
|
|
|
nerr("ERROR: nxsem_wait failed: %d\n", ret);
|
2018-02-20 19:24:53 +01:00
|
|
|
DEBUGASSERT(ret == -EINTR || ret == -ECANCELED);
|
2015-12-07 16:26:57 +01:00
|
|
|
goto errout;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Increment the count of references to the device. If this the first
|
|
|
|
* time that the driver has been opened for this device, then initialize
|
|
|
|
* the device.
|
|
|
|
*/
|
|
|
|
|
|
|
|
tmp = priv->td_crefs + 1;
|
|
|
|
if (tmp > 255)
|
|
|
|
{
|
|
|
|
/* More than 255 opens; uint8_t would overflow to zero */
|
|
|
|
|
|
|
|
ret = -EMFILE;
|
|
|
|
goto errout_with_sem;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Save the new open count on success */
|
|
|
|
|
|
|
|
priv->td_crefs = tmp;
|
|
|
|
ret = OK;
|
|
|
|
|
|
|
|
errout_with_sem:
|
2017-10-03 23:35:24 +02:00
|
|
|
nxsem_post(&priv->td_exclsem);
|
2015-12-07 16:26:57 +01:00
|
|
|
|
|
|
|
errout:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: telnet_close
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
static int telnet_close(FAR struct file *filep)
|
|
|
|
{
|
|
|
|
FAR struct inode *inode = filep->f_inode;
|
|
|
|
FAR struct telnet_dev_s *priv = inode->i_private;
|
|
|
|
FAR char *devpath;
|
|
|
|
int ret;
|
|
|
|
|
2016-06-20 19:59:15 +02:00
|
|
|
ninfo("td_crefs: %d\n", priv->td_crefs);
|
2015-12-07 16:26:57 +01:00
|
|
|
|
|
|
|
/* Get exclusive access to the device structures */
|
|
|
|
|
2017-10-04 23:22:27 +02:00
|
|
|
ret = nxsem_wait(&priv->td_exclsem);
|
2015-12-07 16:26:57 +01:00
|
|
|
if (ret < 0)
|
|
|
|
{
|
2017-10-04 23:22:27 +02:00
|
|
|
nerr("ERROR: nxsem_wait failed: %d\n", ret);
|
2018-02-20 19:24:53 +01:00
|
|
|
DEBUGASSERT(ret == -EINTR || ret == -ECANCELED);
|
2015-12-07 16:26:57 +01:00
|
|
|
goto errout;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Decrement the references to the driver. If the reference count will
|
|
|
|
* decrement to 0, then uninitialize the driver.
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (priv->td_crefs > 1)
|
|
|
|
{
|
|
|
|
/* Just decrement the reference count and release the semaphore */
|
|
|
|
|
|
|
|
priv->td_crefs--;
|
2017-10-03 23:35:24 +02:00
|
|
|
nxsem_post(&priv->td_exclsem);
|
2015-12-07 16:26:57 +01:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* Re-create the path to the driver. */
|
|
|
|
|
|
|
|
sched_lock();
|
|
|
|
ret = asprintf(&devpath, TELNETD_DEVFMT, priv->td_minor);
|
|
|
|
if (ret < 0)
|
|
|
|
{
|
2016-06-20 20:44:38 +02:00
|
|
|
nerr("ERROR: Failed to allocate the driver path\n");
|
2015-12-07 16:26:57 +01:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
/* Un-register the character driver */
|
|
|
|
|
|
|
|
ret = unregister_driver(devpath);
|
|
|
|
if (ret < 0)
|
|
|
|
{
|
|
|
|
/* NOTE: a return value of -EBUSY is not an error, it simply
|
|
|
|
* means that the Telnet driver is busy now and cannot be
|
|
|
|
* registered now because there are other sessions using the
|
|
|
|
* connection. The driver will be properly unregistered when
|
|
|
|
* the final session terminates.
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (ret != -EBUSY)
|
|
|
|
{
|
2016-06-20 20:44:38 +02:00
|
|
|
nerr("ERROR: Failed to unregister the driver %s: %d\n",
|
|
|
|
devpath, ret);
|
2015-12-07 16:26:57 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
free(devpath);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Close the socket */
|
|
|
|
|
|
|
|
psock_close(&priv->td_psock);
|
|
|
|
|
2019-01-05 19:14:05 +01:00
|
|
|
#ifdef CONFIG_TERMCURSES
|
|
|
|
if (priv->tcurs != NULL)
|
|
|
|
{
|
|
|
|
free(priv->tcurs);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2015-12-07 16:26:57 +01:00
|
|
|
/* Release the driver memory. What if there are threads waiting on
|
|
|
|
* td_exclsem? They will never be awakened! How could this happen?
|
|
|
|
* crefs == 1 so there are no other open references to the driver.
|
|
|
|
* But this could have if someone were trying to re-open the driver
|
|
|
|
* after every other thread has closed it. That really should not
|
|
|
|
* happen in the intended usage model.
|
|
|
|
*/
|
|
|
|
|
|
|
|
DEBUGASSERT(priv->td_exclsem.semcount == 0);
|
2017-10-03 23:35:24 +02:00
|
|
|
nxsem_destroy(&priv->td_exclsem);
|
2015-12-07 16:26:57 +01:00
|
|
|
free(priv);
|
|
|
|
sched_unlock();
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = OK;
|
|
|
|
|
|
|
|
errout:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: telnet_read
|
|
|
|
****************************************************************************/
|
|
|
|
|
2019-01-05 19:14:05 +01:00
|
|
|
static ssize_t telnet_read(FAR struct file *filep, FAR char *buffer,
|
|
|
|
size_t len)
|
2015-12-07 16:26:57 +01:00
|
|
|
{
|
|
|
|
FAR struct inode *inode = filep->f_inode;
|
|
|
|
FAR struct telnet_dev_s *priv = inode->i_private;
|
|
|
|
ssize_t ret;
|
|
|
|
|
2016-06-20 19:59:15 +02:00
|
|
|
ninfo("len: %d\n", len);
|
2015-12-07 16:26:57 +01:00
|
|
|
|
|
|
|
/* First, handle the case where there are still valid bytes left in the
|
|
|
|
* I/O buffer from the last time that read was called. NOTE: Much of
|
|
|
|
* what we read may be protocol stuff and may not correspond to user
|
|
|
|
* data. Hence we need the loop and we need may need to call psock_recv()
|
|
|
|
* multiple times in order to get data that the client is interested in.
|
|
|
|
*/
|
|
|
|
|
|
|
|
do
|
|
|
|
{
|
|
|
|
if (priv->td_pending > 0)
|
|
|
|
{
|
|
|
|
/* Process the buffered telnet data */
|
|
|
|
|
|
|
|
FAR const char *src = &priv->td_rxbuffer[priv->td_offset];
|
|
|
|
ret = telnet_receive(priv, src, priv->td_pending, buffer, len);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Read a buffer of data from the telnet client */
|
|
|
|
|
|
|
|
else
|
|
|
|
{
|
2019-01-05 19:14:05 +01:00
|
|
|
/* Test for non-blocking read */
|
|
|
|
|
|
|
|
if (filep->f_oflags & O_NONBLOCK)
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-12-07 16:26:57 +01:00
|
|
|
ret = psock_recv(&priv->td_psock, priv->td_rxbuffer,
|
2019-01-05 19:14:05 +01:00
|
|
|
CONFIG_TELNET_RXBUFFER_SIZE, 0);
|
2015-12-07 16:26:57 +01:00
|
|
|
|
|
|
|
/* Did we receive anything? */
|
|
|
|
|
|
|
|
if (ret > 0)
|
|
|
|
{
|
|
|
|
/* Yes.. Process the newly received telnet data */
|
|
|
|
|
|
|
|
telnet_dumpbuffer("Received buffer", priv->td_rxbuffer, ret);
|
|
|
|
ret = telnet_receive(priv, priv->td_rxbuffer, ret, buffer, len);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Otherwise the peer closed the connection (ret == 0) or an error
|
|
|
|
* occurred (ret < 0).
|
|
|
|
*/
|
|
|
|
|
|
|
|
else
|
|
|
|
{
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
while (ret == 0);
|
|
|
|
|
2018-02-01 17:00:02 +01:00
|
|
|
/* Returned Value:
|
2015-12-07 16:26:57 +01:00
|
|
|
*
|
|
|
|
* ret > 0: The number of characters copied into the user buffer by
|
|
|
|
* telnet_receive().
|
|
|
|
* ret <= 0: Loss of connection or error events reported by recv().
|
|
|
|
*/
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: telnet_write
|
|
|
|
****************************************************************************/
|
|
|
|
|
2019-01-05 19:14:05 +01:00
|
|
|
static ssize_t telnet_write(FAR struct file *filep, FAR const char *buffer,
|
|
|
|
size_t len)
|
2015-12-07 16:26:57 +01:00
|
|
|
{
|
|
|
|
FAR struct inode *inode = filep->f_inode;
|
|
|
|
FAR struct telnet_dev_s *priv = inode->i_private;
|
|
|
|
FAR const char *src = buffer;
|
|
|
|
ssize_t nsent;
|
|
|
|
ssize_t ret;
|
|
|
|
int ncopied;
|
|
|
|
char ch;
|
|
|
|
bool eol;
|
|
|
|
|
2016-06-20 19:59:15 +02:00
|
|
|
ninfo("len: %d\n", len);
|
2015-12-07 16:26:57 +01:00
|
|
|
|
|
|
|
/* Process each character from the user buffer */
|
|
|
|
|
|
|
|
for (nsent = 0, ncopied = 0; nsent < len; nsent++)
|
|
|
|
{
|
|
|
|
/* Get the next character from the user buffer */
|
|
|
|
|
|
|
|
ch = *src++;
|
|
|
|
|
|
|
|
/* Add the character to the TX buffer */
|
|
|
|
|
|
|
|
eol = telnet_putchar(priv, ch, &ncopied);
|
|
|
|
|
|
|
|
/* Was that the end of a line? Or is the buffer too full to hold the
|
|
|
|
* next largest character sequence ("\r\n\0")?
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (eol || ncopied > CONFIG_TELNET_TXBUFFER_SIZE-3)
|
|
|
|
{
|
|
|
|
/* Yes... send the data now */
|
|
|
|
|
|
|
|
ret = psock_send(&priv->td_psock, priv->td_txbuffer, ncopied, 0);
|
|
|
|
if (ret < 0)
|
|
|
|
{
|
2019-01-05 19:14:05 +01:00
|
|
|
nerr("ERROR: psock_send failed '%s': %d\n",
|
|
|
|
priv->td_txbuffer, ret);
|
2015-12-07 16:26:57 +01:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Reset the index to the beginning of the TX buffer. */
|
|
|
|
|
|
|
|
ncopied = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Send anything remaining in the TX buffer */
|
|
|
|
|
|
|
|
if (ncopied > 0)
|
|
|
|
{
|
|
|
|
ret = psock_send(&priv->td_psock, priv->td_txbuffer, ncopied, 0);
|
|
|
|
if (ret < 0)
|
|
|
|
{
|
2016-06-20 20:44:38 +02:00
|
|
|
nerr("ERROR: psock_send failed '%s': %d\n", priv->td_txbuffer, ret);
|
2015-12-07 16:26:57 +01:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Notice that we don't actually return the number of bytes sent, but
|
|
|
|
* rather, the number of bytes that the caller asked us to send. We may
|
|
|
|
* have sent more bytes (because of CR-LF expansion and because of NULL
|
|
|
|
* termination). But it confuses some logic if you report that you sent
|
|
|
|
* more than you were requested to.
|
|
|
|
*/
|
|
|
|
|
|
|
|
return len;
|
|
|
|
}
|
|
|
|
|
|
|
|
/****************************************************************************
|
2015-12-07 20:48:06 +01:00
|
|
|
* Name: telnet_session
|
2015-12-07 16:26:57 +01:00
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Create a character driver to "wrap" the telnet session. This function
|
|
|
|
* will select and return a unique path for the new telnet device.
|
|
|
|
*
|
2018-03-13 16:52:27 +01:00
|
|
|
* Input Parameters:
|
2015-12-07 20:48:06 +01:00
|
|
|
* session - On input, contains the socket descriptor that represents the
|
2019-01-05 19:14:05 +01:00
|
|
|
* new telnet connection. On output, it holds the path to the new Telnet
|
|
|
|
* driver.
|
2015-12-07 16:26:57 +01:00
|
|
|
*
|
2018-02-01 17:00:02 +01:00
|
|
|
* Returned Value:
|
2015-12-07 20:48:06 +01:00
|
|
|
* Zero (OK) on success; a negated errno value on failure.
|
2015-12-07 16:26:57 +01:00
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2015-12-07 20:48:06 +01:00
|
|
|
static int telnet_session(FAR struct telnet_session_s *session)
|
2015-12-07 16:26:57 +01:00
|
|
|
{
|
|
|
|
FAR struct telnet_dev_s *priv;
|
|
|
|
FAR struct socket *psock;
|
2015-12-07 20:48:06 +01:00
|
|
|
struct stat statbuf;
|
|
|
|
uint16_t start;
|
2015-12-07 16:26:57 +01:00
|
|
|
int ret;
|
|
|
|
|
|
|
|
/* Allocate instance data for this driver */
|
|
|
|
|
2019-01-05 19:14:05 +01:00
|
|
|
priv = (FAR struct telnet_dev_s *)malloc(sizeof(struct telnet_dev_s));
|
2015-12-07 16:26:57 +01:00
|
|
|
if (!priv)
|
|
|
|
{
|
2016-06-20 20:44:38 +02:00
|
|
|
nerr("ERROR: Failed to allocate the driver data structure\n");
|
2015-12-07 20:48:06 +01:00
|
|
|
return -ENOMEM;
|
2015-12-07 16:26:57 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Initialize the allocated driver instance */
|
|
|
|
|
2017-10-03 20:51:15 +02:00
|
|
|
nxsem_init(&priv->td_exclsem, 0, 1);
|
2015-12-07 16:26:57 +01:00
|
|
|
|
2019-01-05 19:14:05 +01:00
|
|
|
priv->td_state = STATE_NORMAL;
|
|
|
|
priv->td_crefs = 0;
|
|
|
|
priv->td_pending = 0;
|
|
|
|
priv->td_offset = 0;
|
|
|
|
#ifdef CONFIG_TELNET_SUPPORT_NAWS
|
|
|
|
priv->td_rows = 25;
|
|
|
|
priv->td_cols = 80;
|
|
|
|
priv->td_sb_count = 0;
|
|
|
|
#endif
|
|
|
|
#ifdef CONFIG_TERMCURSES
|
|
|
|
priv->tcurs = NULL;
|
|
|
|
#endif
|
2015-12-07 16:26:57 +01:00
|
|
|
|
|
|
|
/* Clone the internal socket structure. We do this so that it will be
|
|
|
|
* independent of threads and of socket descriptors (the original socket
|
|
|
|
* instance resided in the daemon's task group`).
|
|
|
|
*/
|
|
|
|
|
2015-12-07 20:48:06 +01:00
|
|
|
psock = sockfd_socket(session->ts_sd);
|
2015-12-07 16:26:57 +01:00
|
|
|
if (!psock)
|
|
|
|
{
|
2019-01-05 19:14:05 +01:00
|
|
|
nerr("ERROR: Failed to convert sd=%d to a socket structure\n",
|
|
|
|
session->ts_sd);
|
2015-12-07 20:48:06 +01:00
|
|
|
ret = -EINVAL;
|
2015-12-07 16:26:57 +01:00
|
|
|
goto errout_with_dev;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = net_clone(psock, &priv->td_psock);
|
|
|
|
if (ret < 0)
|
|
|
|
{
|
2016-06-20 20:44:38 +02:00
|
|
|
nerr("ERROR: net_clone failed: %d\n", ret);
|
2015-12-07 16:26:57 +01:00
|
|
|
goto errout_with_dev;
|
|
|
|
}
|
|
|
|
|
2015-12-07 20:48:06 +01:00
|
|
|
/* Allocate a unique minor device number of the telnet drvier.
|
|
|
|
* Get exclusive access to the minor counter.
|
|
|
|
*/
|
2015-12-07 16:26:57 +01:00
|
|
|
|
|
|
|
do
|
|
|
|
{
|
2017-10-04 23:22:27 +02:00
|
|
|
ret = nxsem_wait(&g_telnet_common.tc_exclsem);
|
|
|
|
if (ret < 0 && ret != -EINTR)
|
2015-12-07 16:26:57 +01:00
|
|
|
{
|
2017-10-04 23:22:27 +02:00
|
|
|
nerr("ERROR: nxsem_wait failed: %d\n", ret);
|
2015-12-07 20:48:06 +01:00
|
|
|
goto errout_with_clone;
|
2015-12-07 16:26:57 +01:00
|
|
|
}
|
|
|
|
}
|
2017-10-04 23:22:27 +02:00
|
|
|
while (ret == -EINTR);
|
2015-12-07 16:26:57 +01:00
|
|
|
|
2015-12-07 20:48:06 +01:00
|
|
|
/* Loop until the device name is verified to be unique. */
|
2015-12-07 16:26:57 +01:00
|
|
|
|
2015-12-07 20:48:06 +01:00
|
|
|
start = g_telnet_common.tc_minor;
|
|
|
|
do
|
|
|
|
{
|
|
|
|
/* Get the next candiate minor number */
|
2015-12-07 16:26:57 +01:00
|
|
|
|
2015-12-07 20:48:06 +01:00
|
|
|
priv->td_minor = g_telnet_common.tc_minor;
|
|
|
|
g_telnet_common.tc_minor++;
|
|
|
|
|
|
|
|
snprintf(session->ts_devpath, TELNET_DEVPATH_MAX, TELNETD_DEVFMT,
|
|
|
|
priv->td_minor);
|
|
|
|
|
|
|
|
ret = stat(session->ts_devpath, &statbuf);
|
2018-01-31 00:57:36 +01:00
|
|
|
DEBUGASSERT(ret >= 0 || get_errno() == ENOENT);
|
2015-12-07 20:48:06 +01:00
|
|
|
}
|
|
|
|
while (ret >= 0 && start != g_telnet_common.tc_minor);
|
|
|
|
|
|
|
|
if (ret >= 0)
|
2015-12-07 16:26:57 +01:00
|
|
|
{
|
2016-06-20 20:44:38 +02:00
|
|
|
nerr("ERROR: Too many sessions\n");
|
2015-12-07 20:48:06 +01:00
|
|
|
ret = -ENFILE;
|
|
|
|
goto errout_with_semaphore;
|
2015-12-07 16:26:57 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Register the driver */
|
|
|
|
|
2015-12-07 20:48:06 +01:00
|
|
|
ret = register_driver(session->ts_devpath, &g_telnet_fops, 0666, priv);
|
2015-12-07 16:26:57 +01:00
|
|
|
if (ret < 0)
|
|
|
|
{
|
2016-06-20 20:44:38 +02:00
|
|
|
nerr("ERROR: Failed to register the driver %s: %d\n",
|
|
|
|
session->ts_devpath, ret);
|
2015-12-07 20:48:06 +01:00
|
|
|
goto errout_with_semaphore;
|
2015-12-07 16:26:57 +01:00
|
|
|
}
|
|
|
|
|
2015-12-07 20:48:06 +01:00
|
|
|
/* Close the original psoock (keeping the clone) */
|
|
|
|
|
|
|
|
psock_close(psock);
|
|
|
|
|
2019-01-19 13:43:21 +01:00
|
|
|
#ifdef CONFIG_TELNET_SUPPORT_NAWS
|
2019-01-05 19:14:05 +01:00
|
|
|
telnet_sendopt(priv, TELNET_DO, TELNET_NAWS);
|
2019-01-19 13:43:21 +01:00
|
|
|
#endif
|
2019-01-05 19:14:05 +01:00
|
|
|
|
2015-12-07 16:26:57 +01:00
|
|
|
/* Return the path to the new telnet driver */
|
|
|
|
|
2017-10-03 23:35:24 +02:00
|
|
|
nxsem_post(&g_telnet_common.tc_exclsem);
|
2015-12-07 20:48:06 +01:00
|
|
|
return OK;
|
|
|
|
|
|
|
|
errout_with_semaphore:
|
2017-10-03 23:35:24 +02:00
|
|
|
nxsem_post(&g_telnet_common.tc_exclsem);
|
2015-12-07 20:48:06 +01:00
|
|
|
|
|
|
|
errout_with_clone:
|
|
|
|
psock_close(&priv->td_psock);
|
2015-12-07 16:26:57 +01:00
|
|
|
|
|
|
|
errout_with_dev:
|
|
|
|
free(priv);
|
2015-12-07 20:48:06 +01:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: factory_read
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
static ssize_t factory_read(FAR struct file *filep, FAR char *buffer,
|
|
|
|
size_t len)
|
|
|
|
{
|
|
|
|
return 0; /* Return EOF */
|
|
|
|
}
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: factory_write
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
static ssize_t factory_write(FAR struct file *filep, FAR const char *buffer,
|
|
|
|
size_t len)
|
|
|
|
{
|
|
|
|
return len; /* Say that everything was written */
|
|
|
|
}
|
|
|
|
|
2019-01-05 19:14:05 +01:00
|
|
|
/****************************************************************************
|
|
|
|
* Name: telnet_poll
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* The standard poll() operation redirects operations on socket descriptors
|
|
|
|
* to this function.
|
|
|
|
*
|
|
|
|
* Input Parameters:
|
|
|
|
* fd - The socket descriptor of interest
|
|
|
|
* fds - The structure describing the events to be monitored, OR NULL if
|
|
|
|
* this is a request to stop monitoring events.
|
|
|
|
* setup - true: Setup up the poll; false: Teardown the poll
|
|
|
|
*
|
|
|
|
* Returned Value:
|
|
|
|
* 0: Success; Negated errno on failure
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
2019-01-13 21:04:20 +01:00
|
|
|
#ifndef CONFIG_DISABLE_POLL
|
2019-01-05 19:14:05 +01:00
|
|
|
static int telnet_poll(FAR struct file *filep, FAR struct pollfd *fds,
|
|
|
|
bool setup)
|
|
|
|
{
|
|
|
|
FAR struct inode *inode = filep->f_inode;
|
|
|
|
FAR struct telnet_dev_s *priv = inode->i_private;
|
|
|
|
FAR struct socket *psock;
|
|
|
|
|
|
|
|
DEBUGASSERT(fds != NULL);
|
|
|
|
|
|
|
|
/* Get the underlying socket structure and verify that the sockfd
|
|
|
|
* corresponds to valid, allocated socket
|
|
|
|
*/
|
|
|
|
|
|
|
|
psock = &priv->td_psock;
|
|
|
|
if (!psock || psock->s_crefs <= 0)
|
|
|
|
{
|
|
|
|
return -EBADF;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Test if we have cached data waiting to be read */
|
|
|
|
|
|
|
|
if (priv->td_pending > 0)
|
|
|
|
{
|
|
|
|
/* Yes.. then signal the poll logic */
|
|
|
|
|
2019-01-08 15:16:43 +01:00
|
|
|
fds->revents |= (POLLRDNORM & fds->events);
|
2019-01-05 19:14:05 +01:00
|
|
|
nxsem_post(fds->sem);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Then let psock_poll() do the heavy lifting */
|
|
|
|
|
|
|
|
return psock_poll(psock, fds, setup);
|
|
|
|
}
|
2019-01-13 21:04:20 +01:00
|
|
|
#endif
|
2019-01-05 19:14:05 +01:00
|
|
|
|
2015-12-07 20:48:06 +01:00
|
|
|
/****************************************************************************
|
|
|
|
* Name: common_ioctl
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
static int common_ioctl(FAR struct file *filep, int cmd, unsigned long arg)
|
|
|
|
{
|
2019-01-06 17:15:56 +01:00
|
|
|
#ifdef CONFIG_TELNET_SUPPORT_NAWS
|
2019-01-07 15:19:48 +01:00
|
|
|
FAR struct inode *inode = filep->f_inode;
|
2019-01-05 19:14:05 +01:00
|
|
|
FAR struct telnet_dev_s *priv = inode->i_private;
|
2019-01-06 17:15:56 +01:00
|
|
|
#endif
|
2015-12-07 20:48:06 +01:00
|
|
|
int ret;
|
|
|
|
|
|
|
|
switch (cmd)
|
|
|
|
{
|
|
|
|
/* Command: SIOCTELNET
|
|
|
|
* Description: Create a Telnet sessions.
|
|
|
|
* Argument: A pointer to a write-able instance of struct
|
|
|
|
* telnet_session_s.
|
|
|
|
* Dependencies: CONFIG_NETDEV_TELNET
|
|
|
|
*/
|
|
|
|
|
|
|
|
case SIOCTELNET:
|
|
|
|
{
|
|
|
|
FAR struct telnet_session_s *session =
|
|
|
|
(FAR struct telnet_session_s *)((uintptr_t)arg);
|
|
|
|
|
|
|
|
if (session == NULL)
|
|
|
|
{
|
|
|
|
ret = -EINVAL;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
ret = telnet_session(session);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
2019-01-05 19:14:05 +01:00
|
|
|
#ifdef CONFIG_TELNET_SUPPORT_NAWS
|
|
|
|
case TIOCGWINSZ:
|
|
|
|
{
|
|
|
|
FAR struct winsize *pW = (FAR struct winsize *)((uintptr_t)arg);
|
|
|
|
|
|
|
|
/* Get row/col from the private data */
|
|
|
|
|
|
|
|
pW->ws_row = priv->td_rows;
|
|
|
|
pW->ws_col = priv->td_cols;
|
|
|
|
|
|
|
|
ret = OK;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
|
2015-12-07 20:48:06 +01:00
|
|
|
default:
|
|
|
|
ret = -ENOTTY;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
2015-12-07 16:26:57 +01:00
|
|
|
}
|
2015-12-07 20:48:06 +01:00
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Public Functions
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
/****************************************************************************
|
|
|
|
* Name: telnet_initialize
|
|
|
|
*
|
|
|
|
* Description:
|
|
|
|
* Create the Telnet factory at /dev/telnet.
|
|
|
|
*
|
2018-03-13 16:52:27 +01:00
|
|
|
* Input Parameters:
|
2015-12-07 20:48:06 +01:00
|
|
|
* None
|
|
|
|
*
|
2018-02-01 17:00:02 +01:00
|
|
|
* Returned Value:
|
2015-12-07 20:48:06 +01:00
|
|
|
* Zero (OK) on success; a negated errno value on failure.
|
|
|
|
*
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
|
|
int telnet_initialize(void)
|
|
|
|
{
|
|
|
|
return register_driver("/dev/telnet", &g_factory_fops, 0666, NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif /* CONFIG_NETDEV_TELNET */
|