1  | 
     | 
     | 
    /*  | 
    
    
    2  | 
     | 
     | 
     * Copyright (c) 1995, 1996, 1998 Theo de Raadt.  All rights reserved.  | 
    
    
    3  | 
     | 
     | 
     * Copyright (c) 1983, 1993, 1994  | 
    
    
    4  | 
     | 
     | 
     *	The Regents of the University of California.  All rights reserved.  | 
    
    
    5  | 
     | 
     | 
     *  | 
    
    
    6  | 
     | 
     | 
     * Redistribution and use in source and binary forms, with or without  | 
    
    
    7  | 
     | 
     | 
     * modification, are permitted provided that the following conditions  | 
    
    
    8  | 
     | 
     | 
     * are met:  | 
    
    
    9  | 
     | 
     | 
     * 1. Redistributions of source code must retain the above copyright  | 
    
    
    10  | 
     | 
     | 
     *    notice, this list of conditions and the following disclaimer.  | 
    
    
    11  | 
     | 
     | 
     * 2. Redistributions in binary form must reproduce the above copyright  | 
    
    
    12  | 
     | 
     | 
     *    notice, this list of conditions and the following disclaimer in the  | 
    
    
    13  | 
     | 
     | 
     *    documentation and/or other materials provided with the distribution.  | 
    
    
    14  | 
     | 
     | 
     * 3. Neither the name of the University nor the names of its contributors  | 
    
    
    15  | 
     | 
     | 
     *    may be used to endorse or promote products derived from this software  | 
    
    
    16  | 
     | 
     | 
     *    without specific prior written permission.  | 
    
    
    17  | 
     | 
     | 
     *  | 
    
    
    18  | 
     | 
     | 
     * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND  | 
    
    
    19  | 
     | 
     | 
     * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE  | 
    
    
    20  | 
     | 
     | 
     * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE  | 
    
    
    21  | 
     | 
     | 
     * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE  | 
    
    
    22  | 
     | 
     | 
     * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL  | 
    
    
    23  | 
     | 
     | 
     * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS  | 
    
    
    24  | 
     | 
     | 
     * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)  | 
    
    
    25  | 
     | 
     | 
     * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT  | 
    
    
    26  | 
     | 
     | 
     * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY  | 
    
    
    27  | 
     | 
     | 
     * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF  | 
    
    
    28  | 
     | 
     | 
     * SUCH DAMAGE.  | 
    
    
    29  | 
     | 
     | 
     */  | 
    
    
    30  | 
     | 
     | 
     | 
    
    
    31  | 
     | 
     | 
    #include <sys/socket.h>  | 
    
    
    32  | 
     | 
     | 
    #include <sys/stat.h>  | 
    
    
    33  | 
     | 
     | 
     | 
    
    
    34  | 
     | 
     | 
    #include <netinet/in.h>  | 
    
    
    35  | 
     | 
     | 
    #include <arpa/inet.h>  | 
    
    
    36  | 
     | 
     | 
     | 
    
    
    37  | 
     | 
     | 
    #include <signal.h>  | 
    
    
    38  | 
     | 
     | 
    #include <fcntl.h>  | 
    
    
    39  | 
     | 
     | 
    #include <netdb.h>  | 
    
    
    40  | 
     | 
     | 
    #include <unistd.h>  | 
    
    
    41  | 
     | 
     | 
    #include <limits.h>  | 
    
    
    42  | 
     | 
     | 
    #include <pwd.h>  | 
    
    
    43  | 
     | 
     | 
    #include <errno.h>  | 
    
    
    44  | 
     | 
     | 
    #include <stdio.h>  | 
    
    
    45  | 
     | 
     | 
    #include <ctype.h>  | 
    
    
    46  | 
     | 
     | 
    #include <string.h>  | 
    
    
    47  | 
     | 
     | 
    #include <syslog.h>  | 
    
    
    48  | 
     | 
     | 
    #include <time.h>  | 
    
    
    49  | 
     | 
     | 
    #include <stdlib.h>  | 
    
    
    50  | 
     | 
     | 
    #include <poll.h>  | 
    
    
    51  | 
     | 
     | 
     | 
    
    
    52  | 
     | 
     | 
    int  | 
    
    
    53  | 
     | 
     | 
    rcmd(char **ahost, int rport, const char *locuser, const char *remuser,  | 
    
    
    54  | 
     | 
     | 
        const char *cmd, int *fd2p)  | 
    
    
    55  | 
     | 
     | 
    { | 
    
    
    56  | 
     | 
     | 
    	return rcmd_af(ahost, rport, locuser, remuser, cmd, fd2p, AF_INET);  | 
    
    
    57  | 
     | 
     | 
    }  | 
    
    
    58  | 
     | 
     | 
     | 
    
    
    59  | 
     | 
     | 
    int  | 
    
    
    60  | 
     | 
     | 
    rcmd_af(char **ahost, int porta, const char *locuser, const char *remuser,  | 
    
    
    61  | 
     | 
     | 
        const char *cmd, int *fd2p, int af)  | 
    
    
    62  | 
     | 
     | 
    { | 
    
    
    63  | 
     | 
     | 
    	static char hbuf[HOST_NAME_MAX+1];  | 
    
    
    64  | 
     | 
     | 
    	char pbuf[NI_MAXSERV];  | 
    
    
    65  | 
     | 
     | 
    	struct addrinfo hints, *res, *r;  | 
    
    
    66  | 
     | 
     | 
    	int error;  | 
    
    
    67  | 
     | 
     | 
    	struct sockaddr_storage from;  | 
    
    
    68  | 
     | 
     | 
    	sigset_t oldmask, mask;  | 
    
    
    69  | 
     | 
     | 
    	pid_t pid;  | 
    
    
    70  | 
     | 
     | 
    	int s, lport;  | 
    
    
    71  | 
     | 
     | 
    	struct timespec timo;  | 
    
    
    72  | 
     | 
     | 
    	char c, *p;  | 
    
    
    73  | 
     | 
     | 
    	int refused;  | 
    
    
    74  | 
     | 
     | 
    	in_port_t rport = porta;  | 
    
    
    75  | 
     | 
     | 
    	int numread;  | 
    
    
    76  | 
     | 
     | 
     | 
    
    
    77  | 
     | 
     | 
    	/* call rcmdsh() with specified remote shell if appropriate. */  | 
    
    
    78  | 
     | 
     | 
    	if (!issetugid() && (p = getenv("RSH")) && *p) { | 
    
    
    79  | 
     | 
     | 
    		struct servent *sp = getservbyname("shell", "tcp"); | 
    
    
    80  | 
     | 
     | 
     | 
    
    
    81  | 
     | 
     | 
    		if (sp && sp->s_port == rport)  | 
    
    
    82  | 
     | 
     | 
    			return (rcmdsh(ahost, rport, locuser, remuser,  | 
    
    
    83  | 
     | 
     | 
    			    cmd, p));  | 
    
    
    84  | 
     | 
     | 
    	}  | 
    
    
    85  | 
     | 
     | 
     | 
    
    
    86  | 
     | 
     | 
    	/* use rsh(1) if non-root and remote port is shell. */  | 
    
    
    87  | 
     | 
     | 
    	if (geteuid()) { | 
    
    
    88  | 
     | 
     | 
    		struct servent *sp = getservbyname("shell", "tcp"); | 
    
    
    89  | 
     | 
     | 
     | 
    
    
    90  | 
     | 
     | 
    		if (sp && sp->s_port == rport)  | 
    
    
    91  | 
     | 
     | 
    			return (rcmdsh(ahost, rport, locuser, remuser,  | 
    
    
    92  | 
     | 
     | 
    			    cmd, NULL));  | 
    
    
    93  | 
     | 
     | 
    	}  | 
    
    
    94  | 
     | 
     | 
     | 
    
    
    95  | 
     | 
     | 
    	pid = getpid();  | 
    
    
    96  | 
     | 
     | 
    	snprintf(pbuf, sizeof(pbuf), "%u", ntohs(rport));  | 
    
    
    97  | 
     | 
     | 
    	memset(&hints, 0, sizeof(hints));  | 
    
    
    98  | 
     | 
     | 
    	hints.ai_family = af;  | 
    
    
    99  | 
     | 
     | 
    	hints.ai_socktype = SOCK_STREAM;  | 
    
    
    100  | 
     | 
     | 
    	hints.ai_flags = AI_CANONNAME;  | 
    
    
    101  | 
     | 
     | 
    	error = getaddrinfo(*ahost, pbuf, &hints, &res);  | 
    
    
    102  | 
     | 
     | 
    	if (error) { | 
    
    
    103  | 
     | 
     | 
    		(void)fprintf(stderr, "rcmd: %s: %s\n", *ahost,  | 
    
    
    104  | 
     | 
     | 
    		    gai_strerror(error));  | 
    
    
    105  | 
     | 
     | 
    		return (-1);  | 
    
    
    106  | 
     | 
     | 
    	}  | 
    
    
    107  | 
     | 
     | 
    	if (res->ai_canonname) { | 
    
    
    108  | 
     | 
     | 
    		strlcpy(hbuf, res->ai_canonname, sizeof(hbuf));  | 
    
    
    109  | 
     | 
     | 
    		*ahost = hbuf;  | 
    
    
    110  | 
     | 
     | 
    	} else  | 
    
    
    111  | 
     | 
     | 
    		; /*XXX*/  | 
    
    
    112  | 
     | 
     | 
     | 
    
    
    113  | 
     | 
     | 
    	r = res;  | 
    
    
    114  | 
     | 
     | 
    	refused = 0;  | 
    
    
    115  | 
     | 
     | 
    	timespecclear(&timo);  | 
    
    
    116  | 
     | 
     | 
    	sigemptyset(&mask);  | 
    
    
    117  | 
     | 
     | 
    	sigaddset(&mask, SIGURG);  | 
    
    
    118  | 
     | 
     | 
    	sigprocmask(SIG_BLOCK, &mask, &oldmask);  | 
    
    
    119  | 
     | 
     | 
    	for (timo.tv_sec = 1, lport = IPPORT_RESERVED - 1;;) { | 
    
    
    120  | 
     | 
     | 
    		s = rresvport_af(&lport, r->ai_family);  | 
    
    
    121  | 
     | 
     | 
    		if (s < 0) { | 
    
    
    122  | 
     | 
     | 
    			if (errno == EAGAIN)  | 
    
    
    123  | 
     | 
     | 
    				(void)fprintf(stderr,  | 
    
    
    124  | 
     | 
     | 
    				    "rcmd: socket: All ports in use\n");  | 
    
    
    125  | 
     | 
     | 
    			else  | 
    
    
    126  | 
     | 
     | 
    				(void)fprintf(stderr, "rcmd: socket: %s\n",  | 
    
    
    127  | 
     | 
     | 
    				    strerror(errno));  | 
    
    
    128  | 
     | 
     | 
    			if (r->ai_next) { | 
    
    
    129  | 
     | 
     | 
    				r = r->ai_next;  | 
    
    
    130  | 
     | 
     | 
    				continue;  | 
    
    
    131  | 
     | 
     | 
    			} else { | 
    
    
    132  | 
     | 
     | 
    				sigprocmask(SIG_SETMASK, &oldmask, NULL);  | 
    
    
    133  | 
     | 
     | 
    				freeaddrinfo(res);  | 
    
    
    134  | 
     | 
     | 
    				return (-1);  | 
    
    
    135  | 
     | 
     | 
    			}  | 
    
    
    136  | 
     | 
     | 
    		}  | 
    
    
    137  | 
     | 
     | 
    		fcntl(s, F_SETOWN, pid);  | 
    
    
    138  | 
     | 
     | 
    		if (connect(s, r->ai_addr, r->ai_addrlen) >= 0)  | 
    
    
    139  | 
     | 
     | 
    			break;  | 
    
    
    140  | 
     | 
     | 
    		(void)close(s);  | 
    
    
    141  | 
     | 
     | 
    		if (errno == EADDRINUSE) { | 
    
    
    142  | 
     | 
     | 
    			lport--;  | 
    
    
    143  | 
     | 
     | 
    			continue;  | 
    
    
    144  | 
     | 
     | 
    		}  | 
    
    
    145  | 
     | 
     | 
    		if (errno == ECONNREFUSED)  | 
    
    
    146  | 
     | 
     | 
    			refused++;  | 
    
    
    147  | 
     | 
     | 
    		if (r->ai_next) { | 
    
    
    148  | 
     | 
     | 
    			int oerrno = errno;  | 
    
    
    149  | 
     | 
     | 
    			char hbuf[NI_MAXHOST];  | 
    
    
    150  | 
     | 
     | 
    			const int niflags = NI_NUMERICHOST;  | 
    
    
    151  | 
     | 
     | 
     | 
    
    
    152  | 
     | 
     | 
    			hbuf[0] = '\0';  | 
    
    
    153  | 
     | 
     | 
    			if (getnameinfo(r->ai_addr, r->ai_addrlen,  | 
    
    
    154  | 
     | 
     | 
    			    hbuf, sizeof(hbuf), NULL, 0, niflags) != 0)  | 
    
    
    155  | 
     | 
     | 
    				strlcpy(hbuf, "(invalid)", sizeof hbuf);  | 
    
    
    156  | 
     | 
     | 
    			(void)fprintf(stderr, "connect to address %s: ", hbuf);  | 
    
    
    157  | 
     | 
     | 
    			errno = oerrno;  | 
    
    
    158  | 
     | 
     | 
    			perror(0);  | 
    
    
    159  | 
     | 
     | 
    			r = r->ai_next;  | 
    
    
    160  | 
     | 
     | 
    			hbuf[0] = '\0';  | 
    
    
    161  | 
     | 
     | 
    			if (getnameinfo(r->ai_addr, r->ai_addrlen,  | 
    
    
    162  | 
     | 
     | 
    			    hbuf, sizeof(hbuf), NULL, 0, niflags) != 0)  | 
    
    
    163  | 
     | 
     | 
    				strlcpy(hbuf, "(invalid)", sizeof hbuf);  | 
    
    
    164  | 
     | 
     | 
    			(void)fprintf(stderr, "Trying %s...\n", hbuf);  | 
    
    
    165  | 
     | 
     | 
    			continue;  | 
    
    
    166  | 
     | 
     | 
    		}  | 
    
    
    167  | 
     | 
     | 
    		if (refused && timo.tv_sec <= 16) { | 
    
    
    168  | 
     | 
     | 
    			(void)nanosleep(&timo, NULL);  | 
    
    
    169  | 
     | 
     | 
    			timo.tv_sec *= 2;  | 
    
    
    170  | 
     | 
     | 
    			r = res;  | 
    
    
    171  | 
     | 
     | 
    			refused = 0;  | 
    
    
    172  | 
     | 
     | 
    			continue;  | 
    
    
    173  | 
     | 
     | 
    		}  | 
    
    
    174  | 
     | 
     | 
    		(void)fprintf(stderr, "%s: %s\n", res->ai_canonname,  | 
    
    
    175  | 
     | 
     | 
    		    strerror(errno));  | 
    
    
    176  | 
     | 
     | 
    		sigprocmask(SIG_SETMASK, &oldmask, NULL);  | 
    
    
    177  | 
     | 
     | 
    		freeaddrinfo(res);  | 
    
    
    178  | 
     | 
     | 
    		return (-1);  | 
    
    
    179  | 
     | 
     | 
    	}  | 
    
    
    180  | 
     | 
     | 
    	/* given "af" can be PF_UNSPEC, we need the real af for "s" */  | 
    
    
    181  | 
     | 
     | 
    	af = r->ai_family;  | 
    
    
    182  | 
     | 
     | 
    	freeaddrinfo(res);  | 
    
    
    183  | 
     | 
     | 
    	if (fd2p == 0) { | 
    
    
    184  | 
     | 
     | 
    		write(s, "", 1);  | 
    
    
    185  | 
     | 
     | 
    		lport = 0;  | 
    
    
    186  | 
     | 
     | 
    	} else { | 
    
    
    187  | 
     | 
     | 
    		struct pollfd pfd[2];  | 
    
    
    188  | 
     | 
     | 
    		char num[8];  | 
    
    
    189  | 
     | 
     | 
    		int s2 = rresvport_af(&lport, af), s3;  | 
    
    
    190  | 
     | 
     | 
    		socklen_t len = sizeof(from);  | 
    
    
    191  | 
     | 
     | 
     | 
    
    
    192  | 
     | 
     | 
    		if (s2 < 0)  | 
    
    
    193  | 
     | 
     | 
    			goto bad;  | 
    
    
    194  | 
     | 
     | 
     | 
    
    
    195  | 
     | 
     | 
    		listen(s2, 1);  | 
    
    
    196  | 
     | 
     | 
    		(void)snprintf(num, sizeof(num), "%d", lport);  | 
    
    
    197  | 
     | 
     | 
    		if (write(s, num, strlen(num)+1) != strlen(num)+1) { | 
    
    
    198  | 
     | 
     | 
    			(void)fprintf(stderr,  | 
    
    
    199  | 
     | 
     | 
    			    "rcmd: write (setting up stderr): %s\n",  | 
    
    
    200  | 
     | 
     | 
    			    strerror(errno));  | 
    
    
    201  | 
     | 
     | 
    			(void)close(s2);  | 
    
    
    202  | 
     | 
     | 
    			goto bad;  | 
    
    
    203  | 
     | 
     | 
    		}  | 
    
    
    204  | 
     | 
     | 
    again:  | 
    
    
    205  | 
     | 
     | 
    		pfd[0].fd = s;  | 
    
    
    206  | 
     | 
     | 
    		pfd[0].events = POLLIN;  | 
    
    
    207  | 
     | 
     | 
    		pfd[1].fd = s2;  | 
    
    
    208  | 
     | 
     | 
    		pfd[1].events = POLLIN;  | 
    
    
    209  | 
     | 
     | 
     | 
    
    
    210  | 
     | 
     | 
    		errno = 0;  | 
    
    
    211  | 
     | 
     | 
    		if (poll(pfd, 2, INFTIM) < 1 ||  | 
    
    
    212  | 
     | 
     | 
    		    (pfd[1].revents & (POLLIN|POLLHUP)) == 0) { | 
    
    
    213  | 
     | 
     | 
    			if (errno != 0)  | 
    
    
    214  | 
     | 
     | 
    				(void)fprintf(stderr,  | 
    
    
    215  | 
     | 
     | 
    				    "rcmd: poll (setting up stderr): %s\n",  | 
    
    
    216  | 
     | 
     | 
    				    strerror(errno));  | 
    
    
    217  | 
     | 
     | 
    			else  | 
    
    
    218  | 
     | 
     | 
    				(void)fprintf(stderr,  | 
    
    
    219  | 
     | 
     | 
    				"poll: protocol failure in circuit setup\n");  | 
    
    
    220  | 
     | 
     | 
    			(void)close(s2);  | 
    
    
    221  | 
     | 
     | 
    			goto bad;  | 
    
    
    222  | 
     | 
     | 
    		}  | 
    
    
    223  | 
     | 
     | 
    		s3 = accept(s2, (struct sockaddr *)&from, &len);  | 
    
    
    224  | 
     | 
     | 
    		if (s3 < 0) { | 
    
    
    225  | 
     | 
     | 
    			(void)fprintf(stderr,  | 
    
    
    226  | 
     | 
     | 
    			    "rcmd: accept: %s\n", strerror(errno));  | 
    
    
    227  | 
     | 
     | 
    			lport = 0;  | 
    
    
    228  | 
     | 
     | 
    			close(s2);  | 
    
    
    229  | 
     | 
     | 
    			goto bad;  | 
    
    
    230  | 
     | 
     | 
    		}  | 
    
    
    231  | 
     | 
     | 
     | 
    
    
    232  | 
     | 
     | 
    		/*  | 
    
    
    233  | 
     | 
     | 
    		 * XXX careful for ftp bounce attacks. If discovered, shut them  | 
    
    
    234  | 
     | 
     | 
    		 * down and check for the real auxiliary channel to connect.  | 
    
    
    235  | 
     | 
     | 
    		 */  | 
    
    
    236  | 
     | 
     | 
    		switch (from.ss_family) { | 
    
    
    237  | 
     | 
     | 
    		case AF_INET:  | 
    
    
    238  | 
     | 
     | 
    		case AF_INET6:  | 
    
    
    239  | 
     | 
     | 
    			if (getnameinfo((struct sockaddr *)&from, len,  | 
    
    
    240  | 
     | 
     | 
    			    NULL, 0, num, sizeof(num), NI_NUMERICSERV) == 0 &&  | 
    
    
    241  | 
     | 
     | 
    			    atoi(num) != 20) { | 
    
    
    242  | 
     | 
     | 
    				break;  | 
    
    
    243  | 
     | 
     | 
    			}  | 
    
    
    244  | 
     | 
     | 
    			close(s3);  | 
    
    
    245  | 
     | 
     | 
    			goto again;  | 
    
    
    246  | 
     | 
     | 
    		default:  | 
    
    
    247  | 
     | 
     | 
    			break;  | 
    
    
    248  | 
     | 
     | 
    		}  | 
    
    
    249  | 
     | 
     | 
    		(void)close(s2);  | 
    
    
    250  | 
     | 
     | 
     | 
    
    
    251  | 
     | 
     | 
    		*fd2p = s3;  | 
    
    
    252  | 
     | 
     | 
    		switch (from.ss_family) { | 
    
    
    253  | 
     | 
     | 
    		case AF_INET:  | 
    
    
    254  | 
     | 
     | 
    		case AF_INET6:  | 
    
    
    255  | 
     | 
     | 
    			if (getnameinfo((struct sockaddr *)&from, len,  | 
    
    
    256  | 
     | 
     | 
    			    NULL, 0, num, sizeof(num), NI_NUMERICSERV) != 0 ||  | 
    
    
    257  | 
     | 
     | 
    			    (atoi(num) >= IPPORT_RESERVED ||  | 
    
    
    258  | 
     | 
     | 
    			     atoi(num) < IPPORT_RESERVED / 2)) { | 
    
    
    259  | 
     | 
     | 
    				(void)fprintf(stderr,  | 
    
    
    260  | 
     | 
     | 
    				    "socket: protocol failure in circuit setup.\n");  | 
    
    
    261  | 
     | 
     | 
    				goto bad2;  | 
    
    
    262  | 
     | 
     | 
    			}  | 
    
    
    263  | 
     | 
     | 
    			break;  | 
    
    
    264  | 
     | 
     | 
    		default:  | 
    
    
    265  | 
     | 
     | 
    			break;  | 
    
    
    266  | 
     | 
     | 
    		}  | 
    
    
    267  | 
     | 
     | 
    	}  | 
    
    
    268  | 
     | 
     | 
    	(void)write(s, locuser, strlen(locuser)+1);  | 
    
    
    269  | 
     | 
     | 
    	(void)write(s, remuser, strlen(remuser)+1);  | 
    
    
    270  | 
     | 
     | 
    	(void)write(s, cmd, strlen(cmd)+1);  | 
    
    
    271  | 
     | 
     | 
    	if ((numread = read(s, &c, 1)) != 1) { | 
    
    
    272  | 
     | 
     | 
    		(void)fprintf(stderr,  | 
    
    
    273  | 
     | 
     | 
    		    "rcmd: %s: %s\n", *ahost,  | 
    
    
    274  | 
     | 
     | 
    		    numread == -1 ? strerror(errno) : "Short read");  | 
    
    
    275  | 
     | 
     | 
    		goto bad2;  | 
    
    
    276  | 
     | 
     | 
    	}  | 
    
    
    277  | 
     | 
     | 
    	if (c != 0) { | 
    
    
    278  | 
     | 
     | 
    		while (read(s, &c, 1) == 1) { | 
    
    
    279  | 
     | 
     | 
    			(void)write(STDERR_FILENO, &c, 1);  | 
    
    
    280  | 
     | 
     | 
    			if (c == '\n')  | 
    
    
    281  | 
     | 
     | 
    				break;  | 
    
    
    282  | 
     | 
     | 
    		}  | 
    
    
    283  | 
     | 
     | 
    		goto bad2;  | 
    
    
    284  | 
     | 
     | 
    	}  | 
    
    
    285  | 
     | 
     | 
    	sigprocmask(SIG_SETMASK, &oldmask, NULL);  | 
    
    
    286  | 
     | 
     | 
    	return (s);  | 
    
    
    287  | 
     | 
     | 
    bad2:  | 
    
    
    288  | 
     | 
     | 
    	if (lport)  | 
    
    
    289  | 
     | 
     | 
    		(void)close(*fd2p);  | 
    
    
    290  | 
     | 
     | 
    bad:  | 
    
    
    291  | 
     | 
     | 
    	(void)close(s);  | 
    
    
    292  | 
     | 
     | 
    	sigprocmask(SIG_SETMASK, &oldmask, NULL);  | 
    
    
    293  | 
     | 
     | 
    	return (-1);  | 
    
    
    294  | 
     | 
     | 
    }  | 
    
    
    295  | 
     | 
     | 
    DEF_WEAK(rcmd_af);  | 
    
    
    296  | 
     | 
     | 
     |