xtrn.cpp 62.3 KB
Newer Older
1
/* xtrn.cpp */
rswindell's avatar
rswindell committed
2
// vi: tabstop=4
3
4
5

/* Synchronet external program support routines */

6
/* $Id: xtrn.cpp,v 1.263 2020/08/02 20:23:34 rswindell Exp $ */
7
8
9
10
11

/****************************************************************************
 * @format.tab-size 4		(Plain Text/Source Code File Header)			*
 * @format.use-tabs true	(see http://www.synchro.net/ptsc_hdr.html)		*
 *																			*
rswindell's avatar
rswindell committed
12
 * Copyright Rob Swindell - http://www.synchro.net/copyright.html			*
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
 *																			*
 * This program is free software; you can redistribute it and/or			*
 * modify it under the terms of the GNU General Public License				*
 * as published by the Free Software Foundation; either version 2			*
 * of the License, or (at your option) any later version.					*
 * See the GNU General Public License for more details: gpl.txt or			*
 * http://www.fsf.org/copyleft/gpl.html										*
 *																			*
 * Anonymous FTP access to the most recent released source is available at	*
 * ftp://vert.synchro.net, ftp://cvs.synchro.net and ftp://ftp.synchro.net	*
 *																			*
 * Anonymous CVS access to the development source and modification history	*
 * is available at cvs.synchro.net:/cvsroot/sbbs, example:					*
 * cvs -d :pserver:anonymous@cvs.synchro.net:/cvsroot/sbbs login			*
 *     (just hit return, no password is necessary)							*
 * cvs -d :pserver:anonymous@cvs.synchro.net:/cvsroot/sbbs checkout src		*
 *																			*
 * For Synchronet coding style and modification guidelines, see				*
 * http://www.synchro.net/source.html										*
 *																			*
 * You are encouraged to submit any modifications (preferably in Unix diff	*
 * format) via e-mail to mods@synchro.net									*
 *																			*
 * Note: If this box doesn't appear square, then you need to fix your tabs.	*
 ****************************************************************************/
#include "sbbs.h"
#include "cmdshell.h"
#include "telnet.h"

42
43
#include <signal.h>			// kill()

44
45
46
#ifdef __unix__
	#include <sys/wait.h>	// WEXITSTATUS

deuce's avatar
deuce committed
47
48
	#define TTYDEFCHARS		// needed for ttydefchars definition
	#include <sys/ttydefaults.h>	// Linux - it's motherfucked.
rswindell's avatar
rswindell committed
49
#if defined(__FreeBSD__)
50
	#include <libutil.h>	// forkpty()
deuce's avatar
deuce committed
51
#elif defined(__OpenBSD__) || defined(__NetBSD__) || defined(__DARWIN__)
rswindell's avatar
rswindell committed
52
53
	#include <util.h>
#elif defined(__linux__)
54
	#include <pty.h>
55
#elif defined(__QNX__)
56
#if 0
57
	#include <unix.h>
58
59
60
#else
	#define NEEDS_FORKPTY
#endif
61
#endif
62
63
64
65
66

	#ifdef NEEDS_FORKPTY
	#include <grp.h>
	#endif

67
	#include <termios.h>
68

deuce's avatar
deuce committed
69
70
71
72
/*
 * Control Character Defaults
 */
#ifndef CTRL
73
	#define CTRL(x)	(x&037)
deuce's avatar
deuce committed
74
75
#endif
#ifndef CEOF
76
	#define	CEOF		CTRL('d')
deuce's avatar
deuce committed
77
78
#endif
#ifndef CEOL
79
	#define	CEOL		0xff		/* XXX avoid _POSIX_VDISABLE */
deuce's avatar
deuce committed
80
81
#endif
#ifndef CERASE
82
	#define	CERASE		0177
deuce's avatar
deuce committed
83
84
#endif
#ifndef CERASE2
85
	#define	CERASE2		CTRL('h')
deuce's avatar
deuce committed
86
87
#endif
#ifndef CINTR
88
	#define	CINTR		CTRL('c')
deuce's avatar
deuce committed
89
90
#endif
#ifndef CSTATUS
91
	#define	CSTATUS		CTRL('t')
deuce's avatar
deuce committed
92
93
#endif
#ifndef CKILL
94
	#define	CKILL		CTRL('u')
deuce's avatar
deuce committed
95
96
#endif
#ifndef CMIN
97
	#define	CMIN		1
deuce's avatar
deuce committed
98
99
#endif
#ifndef CQUIT
100
	#define	CQUIT		034		/* FS, ^\ */
deuce's avatar
deuce committed
101
102
#endif
#ifndef CSUSP
103
	#define	CSUSP		CTRL('z')
deuce's avatar
deuce committed
104
105
#endif
#ifndef CTIME
106
	#define	CTIME		0
deuce's avatar
deuce committed
107
108
#endif
#ifndef CDSUSP
109
	#define	CDSUSP		CTRL('y')
deuce's avatar
deuce committed
110
111
#endif
#ifndef CSTART
112
	#define	CSTART		CTRL('q')
deuce's avatar
deuce committed
113
114
#endif
#ifndef CSTOP
115
	#define	CSTOP		CTRL('s')
deuce's avatar
deuce committed
116
117
#endif
#ifndef CLNEXT
118
	#define	CLNEXT		CTRL('v')
deuce's avatar
deuce committed
119
120
#endif
#ifndef CDISCARD
121
	#define	CDISCARD 	CTRL('o')
deuce's avatar
deuce committed
122
123
#endif
#ifndef CWERASE
124
	#define	CWERASE 	CTRL('w')
deuce's avatar
deuce committed
125
126
#endif
#ifndef CREPRINT
127
	#define	CREPRINT 	CTRL('r')
deuce's avatar
deuce committed
128
129
#endif
#ifndef CEOT
130
	#define	CEOT		CEOF
deuce's avatar
deuce committed
131
132
133
#endif
/* compat */
#ifndef CBRK
134
	#define	CBRK		CEOL
deuce's avatar
deuce committed
135
136
#endif
#ifndef CRPRNT
137
	#define CRPRNT		CREPRINT
deuce's avatar
deuce committed
138
139
#endif
#ifndef CFLUSH
140
141
142
	#define	CFLUSH		CDISCARD
#endif

deuce's avatar
deuce committed
143
#ifndef TTYDEF_IFLAG
144
	#define TTYDEF_IFLAG    (BRKINT | ICRNL | IMAXBEL | IXON | IXANY)
deuce's avatar
deuce committed
145
146
#endif
#ifndef TTYDEF_OFLAG
147
	#define TTYDEF_OFLAG    (OPOST | ONLCR)
deuce's avatar
deuce committed
148
149
#endif
#ifndef TTYDEF_LFLAG
150
	#define TTYDEF_LFLAG    (ECHO | ICANON | ISIG | IEXTEN | ECHOE|ECHOKE|ECHOCTL)
deuce's avatar
deuce committed
151
152
#endif
#ifndef TTYDEF_CFLAG
153
	#define TTYDEF_CFLAG    (CREAD | CS8 | HUPCL)
deuce's avatar
deuce committed
154
#endif
deuce's avatar
deuce committed
155
#if defined(__QNX__) || defined(__solaris__) || defined(__NetBSD__)
156
157
158
	static cc_t     ttydefchars[NCCS] = {
        CEOF,   CEOL,   CEOL,   CERASE, CWERASE, CKILL, CREPRINT,
        CERASE2, CINTR, CQUIT,  CSUSP,  CDSUSP, CSTART, CSTOP,  CLNEXT,
deuce's avatar
deuce committed
159
160
161
162
        CDISCARD, CMIN, CTIME,  CSTATUS
#ifndef __solaris__
	, _POSIX_VDISABLE
#endif
163
	};
164
165
#endif

166
167
#endif	/* __unix__ */

168
#define XTRN_IO_BUF_LEN 10000	/* 50% of IO_THREAD_BUF_SIZE */
169

170
171
172
173
174
175
176
177
178
179
/*****************************************************************************/
/* Interrupt routine to expand WWIV Ctrl-C# codes into ANSI escape sequences */
/*****************************************************************************/
BYTE* wwiv_expand(BYTE* buf, ulong buflen, BYTE* outbuf, ulong& newlen
	,ulong user_misc, bool& ctrl_c)
{
    char	ansi_seq[32];
	ulong 	i,j,k;

    for(i=j=0;i<buflen;i++) {
180
        if(buf[i]==CTRL_C) {	/* WWIV color escape char */
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
            ctrl_c=true;
            continue;
        }
        if(!ctrl_c) {
            outbuf[j++]=buf[i];
            continue;
        }
        ctrl_c=false;
        if(user_misc&ANSI) {
            switch(buf[i]) {
                default:
                    strcpy(ansi_seq,"\x1b[0m");          /* low grey */
                    break;
                case '1':
                    strcpy(ansi_seq,"\x1b[0;1;36m");     /* high cyan */
                    break;
                case '2':
                    strcpy(ansi_seq,"\x1b[0;1;33m");     /* high yellow */
                    break;
                case '3':
                    strcpy(ansi_seq,"\x1b[0;35m");       /* low magenta */
                    break;
                case '4':
                    strcpy(ansi_seq,"\x1b[0;1;44m");     /* white on blue */
                    break;
                case '5':
                    strcpy(ansi_seq,"\x1b[0;32m");       /* low green */
                    break;
                case '6':
                    strcpy(ansi_seq,"\x1b[0;1;5;31m");   /* high blinking red */
                    break;
                case '7':
                    strcpy(ansi_seq,"\x1b[0;1;34m");     /* high blue */
                    break;
                case '8':
                    strcpy(ansi_seq,"\x1b[0;34m");       /* low blue */
                    break;
                case '9':
                    strcpy(ansi_seq,"\x1b[0;36m");       /* low cyan */
                    break;
            }
            for(k=0;ansi_seq[k];k++)
                outbuf[j++]=ansi_seq[k];
        }
    }
    newlen=j;
    return(outbuf);
}
229

230
231
232
233
234
235
236
static void petscii_convert(BYTE* buf, ulong len)
{
    for(ulong i=0; i<len; i++) {
		buf[i] = cp437_to_petscii(buf[i]);
	}
}

237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
static bool native_executable(scfg_t* cfg, const char* cmdline, long mode)
{
	char*	p;
	char	str[MAX_PATH+1];
	char	name[64];
	char	base[64];
	unsigned i;

	if(mode&EX_NATIVE)
		return(TRUE);

    SAFECOPY(str,cmdline);				/* Set str to program name only */
	truncstr(str," ");
    SAFECOPY(name,getfname(str));
	SAFECOPY(base,name);
	if((p=getfext(base))!=NULL)
		*p=0;

    for(i=0;i<cfg->total_natvpgms;i++)
        if(stricmp(name,cfg->natvpgm[i]->name)==0
		|| stricmp(base,cfg->natvpgm[i]->name)==0)
            break;
    return(i<cfg->total_natvpgms);
}

262
#define XTRN_LOADABLE_MODULE(cmdline,startup_dir)			\
263
	if(cmdline[0]=='*')		/* Baja module or JavaScript */	\
rswindell's avatar
rswindell committed
264
		return(exec_bin(cmdline+1,&main_csi,startup_dir))
265
#ifdef JAVASCRIPT
266
	#define XTRN_LOADABLE_JS_MODULE(cmdline,mode,startup_dir)	\
267
268
269
270
	if(cmdline[0]=='?' && (mode&EX_SH))						\
		return(js_execxtrn(cmdline+1, startup_dir))			\
	if(cmdline[0]=='?')										\
		return(js_execfile(cmdline+1,startup_dir))
271
272
273
#else
	#define XTRN_LOADABLE_JS_MODULE
#endif
274
275
276

#ifdef _WIN32

277
#include "execvxd.h"	/* DOSXTRN.EXE API */
278
279
280

extern SOCKET node_socket[];

281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
/*****************************************************************************/
// Expands Single CR to CRLF
/*****************************************************************************/
BYTE* cr_expand(BYTE* inbuf, ulong inlen, BYTE* outbuf, ulong& newlen)
{
	ulong	i,j;

	for(i=j=0;i<inlen;i++) {
		outbuf[j++]=inbuf[i];
		if(inbuf[i]=='\r')
			outbuf[j++]='\n';
	}
	newlen=j;
    return(outbuf);
}

297
298
299
300
301
302
303
304
static void add_env_var(str_list_t* list, const char* var, const char* val)
{
	char	str[MAX_PATH*2];
	SetEnvironmentVariable(var,NULL);	/* Delete in current process env */
	SAFEPRINTF2(str,"%s=%s",var,val);
	strListPush(list,str);
}

305
306
307
308
309
310
311
312
/* Clean-up resources while preserving current LastError value */
#define XTRN_CLEANUP												\
	last_error=GetLastError();										\
    if(vxd!=INVALID_HANDLE_VALUE)		CloseHandle(vxd);			\
	if(rdslot!=INVALID_HANDLE_VALUE)	CloseHandle(rdslot);		\
	if(wrslot!=INVALID_HANDLE_VALUE)	CloseHandle(wrslot);		\
	if(start_event!=NULL)				CloseHandle(start_event);	\
	if(hungup_event!=NULL)				CloseHandle(hungup_event);	\
313
	if(hangup_event!=NULL)				CloseHandle(hangup_event);	\
314
315
	SetLastError(last_error)

316
317
318
/****************************************************************************/
/* Runs an external program 												*/
/****************************************************************************/
319
int sbbs_t::external(const char* cmdline, long mode, const char* startup_dir)
320
{
321
322
323
	char	str[MAX_PATH+1];
	char*	env_block=NULL;
	char*	env_strings;
324
	const char* p_startup_dir;
325
	char	path[MAX_PATH+1];
326
327
328
329
    char	fullcmdline[MAX_PATH+1];
	char	realcmdline[MAX_PATH+1];
	char	comspec_str[MAX_PATH+1];
	char	title[MAX_PATH+1];
330
331
	BYTE	buf[XTRN_IO_BUF_LEN],*bp;
    BYTE 	telnet_buf[XTRN_IO_BUF_LEN*2];
332
    BYTE 	output_buf[XTRN_IO_BUF_LEN*2];
333
334
    BYTE 	wwiv_buf[XTRN_IO_BUF_LEN*2];
    bool	wwiv_flag=false;
335
    bool	native=false;			// DOS program by default
336
    bool	was_online=true;
337
	bool	rio_abortable_save=rio_abortable;
338
	bool	use_pipes=false;	// NT-compatible console redirection
339
	BOOL	success;
340
	BOOL	processTerminated=false;
341
	uint	i;
342
343
344
345
    time_t	hungup=0;
	HANDLE	vxd=INVALID_HANDLE_VALUE;
	HANDLE	rdslot=INVALID_HANDLE_VALUE;
	HANDLE	wrslot=INVALID_HANDLE_VALUE;
346
	HANDLE  start_event=NULL;
347
	HANDLE	hungup_event=NULL;
348
	HANDLE	hangup_event=NULL;
349
350
	HANDLE	rdoutpipe;
	HANDLE	wrinpipe;
351
    PROCESS_INFORMATION process_info;
deuce's avatar
deuce committed
352
	unsigned long	rd;
353
    unsigned long	wr;
deuce's avatar
deuce committed
354
    unsigned long	len;
355
    DWORD	avail;
deuce's avatar
deuce committed
356
357
	unsigned long	msglen;
	unsigned long	retval;
358
359
	DWORD	last_error;
	DWORD	loop_since_io=0;
360
	struct	tm tm;
361
	str_list_t	env_list;
362

363
	xtrn_mode = mode;
364
	lprintf(LOG_DEBUG,"Executing external: %s",cmdline);
365

366
367
368
369
370
	if(startup_dir!=NULL && startup_dir[0] && !isdir(startup_dir)) {
		errormsg(WHERE, ERR_CHK, startup_dir, 0);
		return -1;
	}

371
	XTRN_LOADABLE_MODULE(cmdline,startup_dir);
372
	XTRN_LOADABLE_JS_MODULE(cmdline,mode,startup_dir);
373

374
	attr(cfg.color[clr_external]);		/* setup default attributes */
375

376
	native = native_executable(&cfg, cmdline, mode);
377

378
	if(!native && (startup->options&BBS_OPT_NO_DOS)) {
379
		lprintf((mode&EX_OFFLINE) ? LOG_ERR : LOG_WARNING, "DOS programs not supported: %s", cmdline);
380
381
382
383
		bprintf("Sorry, DOS programs are not supported on this node.\r\n");
		return -1;
	}

rswindell's avatar
rswindell committed
384
	if(mode&EX_SH || strcspn(cmdline,"<>|")!=strlen(cmdline))
385
386
387
388
389
390
		sprintf(comspec_str,"%s /C ", comspec);
	else
		comspec_str[0]=0;

    if(startup_dir && cmdline[1]!=':' && cmdline[0]!='/'
    	&& cmdline[0]!='\\' && cmdline[0]!='.')
391
       	SAFEPRINTF3(fullcmdline, "%s%s%s", comspec_str, startup_dir, cmdline);
392
    else
393
    	SAFEPRINTF2(fullcmdline, "%s%s", comspec_str, cmdline);
394

395
	SAFECOPY(realcmdline, fullcmdline);	// for errormsg if failed to execute
396
397

	now=time(NULL);
398
399
	if(localtime_r(&now,&tm)==NULL)
		memset(&tm,0,sizeof(tm));
400

401
	if(native && mode&EX_STDOUT && !(mode&EX_OFFLINE))
402
403
		use_pipes=true;

404
 	if(native) { // Native (32-bit) external
405

406
407
408
409
410
411
		if((env_list=strListInit())==NULL) {
			XTRN_CLEANUP;
        	errormsg(WHERE, ERR_CREATE, "env_list", 0);
            return(errno);
		}

412
		// Current environment passed to child process
rswindell's avatar
rswindell committed
413
		sprintf(str,"%sprotocol.log",cfg.node_dir);
414
415
416
417
418
419
420
		add_env_var(&env_list,"DSZLOG",str);
		add_env_var(&env_list,"SBBSNODE",cfg.node_dir);
		add_env_var(&env_list,"SBBSCTRL",cfg.ctrl_dir);
		add_env_var(&env_list,"SBBSDATA",cfg.data_dir);
		add_env_var(&env_list,"SBBSEXEC",cfg.exec_dir);
		sprintf(str,"%d",cfg.node_num);
		add_env_var(&env_list,"SBBSNNUM",str);
421
		/* date/time env vars */
rswindell's avatar
rswindell committed
422
		sprintf(str,"%02u",tm.tm_mday);
423
424
425
426
427
428
429
		add_env_var(&env_list,"DAY",str);
		add_env_var(&env_list,"WEEKDAY",wday[tm.tm_wday]);
		add_env_var(&env_list,"MONTHNAME",mon[tm.tm_mon]);
		sprintf(str,"%02u",tm.tm_mon+1);
		add_env_var(&env_list,"MONTH",str);
		sprintf(str,"%u",1900+tm.tm_year);
		add_env_var(&env_list,"YEAR",str);
430
431
432
433
434
435
436
437
438
439
440
441

		env_strings=GetEnvironmentStrings();
		env_block=strListCopyBlock(env_strings);
		if(env_strings!=NULL)
			FreeEnvironmentStrings(env_strings);
		env_block=strListAppendBlock(env_block,env_list);
		strListFree(&env_list);
		if(env_block==NULL) {
			XTRN_CLEANUP;
        	errormsg(WHERE, ERR_CREATE, "env_block", 0);
            return(errno);
		}
442
443
444

    } else { // DOS external

445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
		// DOS-compatible (short) paths
		char node_dir[MAX_PATH+1];
		char ctrl_dir[MAX_PATH+1];
		char data_dir[MAX_PATH+1];
		char exec_dir[MAX_PATH+1];

		// in case GetShortPathName fails
		SAFECOPY(node_dir,cfg.node_dir);
		SAFECOPY(ctrl_dir,cfg.ctrl_dir);
		SAFECOPY(data_dir,cfg.data_dir);
		SAFECOPY(exec_dir,cfg.exec_dir);

		GetShortPathName(cfg.node_dir,node_dir,sizeof(node_dir));
		GetShortPathName(cfg.ctrl_dir,ctrl_dir,sizeof(node_dir));
		GetShortPathName(cfg.data_dir,data_dir,sizeof(data_dir));
		GetShortPathName(cfg.exec_dir,exec_dir,sizeof(exec_dir));

462
463
		sprintf(path,"%sDOSXTRN.RET", cfg.node_dir);
		remove(path);
464
465

    	// Create temporary environment file
466
    	sprintf(path,"%sDOSXTRN.ENV", node_dir);
467
        FILE* fp=fopen(path,"w");
468
        if(fp==NULL) {
469
			XTRN_CLEANUP;
470
        	errormsg(WHERE, ERR_CREATE, path, 0);
471
            return(errno);
472
473
        }
        fprintf(fp, "%s\n", fullcmdline);
474
475
476
477
478
		fprintf(fp, "DSZLOG=%sPROTOCOL.LOG\n", node_dir);
        fprintf(fp, "SBBSNODE=%s\n", node_dir);
        fprintf(fp, "SBBSCTRL=%s\n", ctrl_dir);
		fprintf(fp, "SBBSDATA=%s\n", data_dir);
		fprintf(fp, "SBBSEXEC=%s\n", exec_dir);
479
        fprintf(fp, "SBBSNNUM=%d\n", cfg.node_num);
480
		fprintf(fp, "PCBNODE=%d\n", cfg.node_num);
481
482
		fprintf(fp, "PCBDRIVE=%.2s\n", node_dir);
		fprintf(fp, "PCBDIR=%s\n", node_dir + 2);
483
484
485
486
487
488
		/* date/time env vars */
		fprintf(fp, "DAY=%02u\n", tm.tm_mday);
		fprintf(fp, "WEEKDAY=%s\n",wday[tm.tm_wday]);
		fprintf(fp, "MONTHNAME=%s\n",mon[tm.tm_mon]);
		fprintf(fp, "MONTH=%02u\n",tm.tm_mon+1);
		fprintf(fp, "YEAR=%u\n",1900+tm.tm_year);
489
490
        fclose(fp);

491
        SAFEPRINTF2(fullcmdline, "%sDOSXTRN.EXE %s", cfg.exec_dir, path);
492

493
		if(!(mode&EX_OFFLINE)) {
494
			i=SBBSEXEC_MODE_FOSSIL;
495
			if(mode&EX_STDIN)
496
           		i|=SBBSEXEC_MODE_DOS_IN;
497
			if(mode&EX_STDOUT)
498
        		i|=SBBSEXEC_MODE_DOS_OUT;
499
500
			sprintf(str," NT %u %u"
				,cfg.node_num,i);
501
502
503
504
505
506
507
508
509
			strcat(fullcmdline,str);

			sprintf(str,"sbbsexec_hungup%d",cfg.node_num);
			if((hungup_event=CreateEvent(
				 NULL	// pointer to security attributes
				,TRUE	// flag for manual-reset event
				,FALSE  // flag for initial state
				,str	// pointer to event-object name
				))==NULL) {
510
				XTRN_CLEANUP;
511
				errormsg(WHERE, ERR_CREATE, str, 0);
512
513
514
				return(GetLastError());
			}

515
516
517
518
519
520
521
522
523
524
525
526
			sprintf(str,"sbbsexec_hangup%d",cfg.node_num);
			if((hangup_event=CreateEvent(
				 NULL	// pointer to security attributes
				,TRUE	// flag for manual-reset event
				,FALSE  // flag for initial state
				,str	// pointer to event-object name
				))==NULL) {
				XTRN_CLEANUP;
				errormsg(WHERE, ERR_CREATE, str, 0);
				return(GetLastError());
			}

527
528
529
			sprintf(str,"\\\\.\\mailslot\\sbbsexec\\rd%d"
				,cfg.node_num);
			rdslot=CreateMailslot(str
530
				,sizeof(buf)/2			// Maximum message size (0=unlimited)
531
532
533
				,0						// Read time-out
				,NULL);                 // Security
			if(rdslot==INVALID_HANDLE_VALUE) {
534
				XTRN_CLEANUP;
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
				errormsg(WHERE, ERR_CREATE, str, 0);
				return(GetLastError());
			}
		}
    }

	if(startup_dir!=NULL && startup_dir[0])
		p_startup_dir=startup_dir;
	else
		p_startup_dir=NULL;
    STARTUPINFO startup_info={0};
    startup_info.cb=sizeof(startup_info);
	if(mode&EX_OFFLINE)
		startup_info.lpTitle=NULL;
	else {
550
		SAFEPRINTF3(title,"%s running %s on node %d"
551
552
553
554
555
			,useron.number ? useron.alias : "Event"
			,realcmdline
			,cfg.node_num);
		startup_info.lpTitle=title;
	}
556
    if(startup->options&BBS_OPT_XTRN_MINIMIZED) {
557
558
559
    	startup_info.wShowWindow=SW_SHOWMINNOACTIVE;
        startup_info.dwFlags|=STARTF_USESHOWWINDOW;
    }
560
561
562
563
564
565
566
567
	if(use_pipes) {
		// Set up the security attributes struct.
		SECURITY_ATTRIBUTES sa;
		memset(&sa,0,sizeof(sa));
		sa.nLength= sizeof(SECURITY_ATTRIBUTES);
		sa.lpSecurityDescriptor = NULL;
		sa.bInheritHandle = TRUE;

568
569
		// Create the child output pipe (override default 4K buffer size)
		if(!CreatePipe(&rdoutpipe,&startup_info.hStdOutput,&sa,sizeof(buf))) {
570
571
572
573
574
575
			errormsg(WHERE,ERR_CREATE,"stdout pipe",0);
			return(GetLastError());
		}
		startup_info.hStdError=startup_info.hStdOutput;

		// Create the child input pipe.
576
		if(!CreatePipe(&startup_info.hStdInput,&wrinpipe,&sa,sizeof(buf))) {
577
578
579
			errormsg(WHERE,ERR_CREATE,"stdin pipe",0);
			return(GetLastError());
		}
580

581
582
583
584
585
586
587
588
589
590
591
592
593
594
		DuplicateHandle(
			GetCurrentProcess(), rdoutpipe,
			GetCurrentProcess(), &rdslot, 0, FALSE, DUPLICATE_SAME_ACCESS);

		DuplicateHandle(
			GetCurrentProcess(), wrinpipe,
			GetCurrentProcess(), &wrslot, 0, FALSE, DUPLICATE_SAME_ACCESS);

		CloseHandle(rdoutpipe);
		CloseHandle(wrinpipe);

		startup_info.dwFlags|=STARTF_USESTDHANDLES|STARTF_USESHOWWINDOW;
    	startup_info.wShowWindow=SW_HIDE;
	}
595
	if(native && !(mode&EX_OFFLINE)) {
596

597
		if(!(mode&EX_STDIN)) {
598
			if(passthru_thread_running)
599
				passthru_socket_activate(true);
600
601
			else
				pthread_mutex_lock(&input_thread_mutex);
602
		}
603
604
	}

605
    success=CreateProcess(
606
607
608
609
		NULL,			// pointer to name of executable module
		fullcmdline,  	// pointer to command line string
		NULL,  			// process security attributes
		NULL,   		// thread security attributes
610
		native && !(mode&EX_OFFLINE),	 			// handle inheritance flag
611
		CREATE_NEW_CONSOLE/*|CREATE_SEPARATE_WOW_VDM*/, // creation flags
612
        env_block, 		// pointer to new environment block
613
614
615
		p_startup_dir,	// pointer to current directory name
		&startup_info,  // pointer to STARTUPINFO
		&process_info  	// pointer to PROCESS_INFORMATION
616
617
618
619
620
		);

	strListFreeBlock(env_block);

	if(!success) {
621
		XTRN_CLEANUP;
622
623
		if(!(mode&EX_STDIN)) {
			if(passthru_thread_running)
624
				passthru_socket_activate(false);
625
626
627
			else
				pthread_mutex_unlock(&input_thread_mutex);
		}
628
		SetLastError(last_error);	/* Restore LastError */
629
        errormsg(WHERE, ERR_EXEC, realcmdline, mode);
630
		SetLastError(last_error);	/* Restore LastError */
631
632
633
        return(GetLastError());
    }

634
635
636
637
#if 0
	char dbgstr[256];
	sprintf(dbgstr,"Node %d created: hProcess %X hThread %X processID %X threadID %X\n"
		,cfg.node_num
rswindell's avatar
rswindell committed
638
639
640
641
		,process_info.hProcess
		,process_info.hThread
		,process_info.dwProcessId
		,process_info.dwThreadId);
642
643
644
	OutputDebugString(dbgstr);
#endif

645
646
	CloseHandle(process_info.hThread);

647
	/* Disable Ctrl-C checking */
648
	if(!(mode&EX_OFFLINE))
649
		rio_abortable=false;
650

651
    // Executing app in foreground?, monitor
652
    retval=STILL_ACTIVE;
653
    while(!(mode&EX_BG)) {
654
655
		if(mode&EX_CHKTIME)
			gettimeleft();
656
657
        if(!online && !(mode&EX_OFFLINE)) { // Tell VXD/VDD and external that user hung-up
        	if(was_online) {
658
				logline(LOG_NOTICE,"X!","hung-up in external program");
659
660
            	hungup=time(NULL);
				if(!native) {
661
					SetEvent(hungup_event);
662
663
664
				}
	            was_online=false;
            }
665
            if(hungup && time(NULL)-hungup>5 && !processTerminated) {
666
				lprintf(LOG_INFO,"Terminating process from line %d", __LINE__);
667
668
				processTerminated=TerminateProcess(process_info.hProcess, 2112);
			}
669
        }
rswindell's avatar
rswindell committed
670
		if((native && !use_pipes) || mode&EX_OFFLINE) {
671
			/* Monitor for process termination only */
672
673
			if(WaitForSingleObject(process_info.hProcess,1000)==WAIT_OBJECT_0)
				break;
674
675
		} else {

676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
			/* Write to VDD */

			wr=RingBufPeek(&inbuf,buf,sizeof(buf));
			if(wr) {
				if(!use_pipes && wrslot==INVALID_HANDLE_VALUE) {
					sprintf(str,"\\\\.\\mailslot\\sbbsexec\\wr%d"
						,cfg.node_num);
					wrslot=CreateFile(str
						,GENERIC_WRITE
						,FILE_SHARE_READ
						,NULL
						,OPEN_EXISTING
						,FILE_ATTRIBUTE_NORMAL
						,(HANDLE) NULL);
					if(wrslot==INVALID_HANDLE_VALUE)
						lprintf(LOG_DEBUG,"!ERROR %u (%s) opening %s", GetLastError(), strerror(errno), str);
692
					else
693
694
						lprintf(LOG_DEBUG,"CreateFile(%s)=0x%x", str, wrslot);
				}
695

696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
				/* CR expansion */
				if(use_pipes)
					bp=cr_expand(buf,wr,output_buf,wr);
				else
					bp=buf;

				len=0;
				if(wrslot==INVALID_HANDLE_VALUE)
					lprintf(LOG_WARNING,"VDD Open failed (not loaded yet?)");
				else if(!WriteFile(wrslot,bp,wr,&len,NULL)) {
					lprintf(LOG_ERR,"!VDD WriteFile(0x%x, %u) FAILURE (Error=%u)", wrslot, wr, GetLastError());
					if(GetMailslotInfo(wrslot,&wr,NULL,NULL,NULL))
						lprintf(LOG_DEBUG,"!VDD MailSlot max_msg_size=%u", wr);
					else
						lprintf(LOG_DEBUG,"!GetMailslotInfo(0x%x)=%u", wrslot, GetLastError());
				} else {
					if(len!=wr)
						lprintf(LOG_WARNING,"VDD short write (%u instead of %u)", len,wr);
					RingBufRead(&inbuf, NULL, len);
					if(use_pipes && !(mode&EX_NOECHO)) {
						/* echo */
						RingBufWrite(&outbuf, bp, len);
718
					}
719
				}
720
721
				wr=len;
			}
722

723
			/* Read from VDD */
724

725
726
727
			rd=0;
			len=sizeof(buf);
			avail=RingBufFree(&outbuf)/2;	// leave room for wwiv/telnet expansion
728
#if 0
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
			if(avail==0)
				lprintf("Node %d !output buffer full (%u bytes)"
					,cfg.node_num,RingBufFull(&outbuf));
#endif
			if(len>avail)
            	len=avail;

			while(rd<len) {
				unsigned long waiting=0;

				if(use_pipes)
					PeekNamedPipe(
						rdslot,             // handle to pipe to copy from
						NULL,               // pointer to data buffer
						0,					// size, in bytes, of data buffer
						NULL,				// pointer to number of bytes read
						&waiting,			// pointer to total number of bytes available
						NULL				// pointer to unread bytes in this message
						);
				else
					GetMailslotInfo(
						rdslot,				// mailslot handle
 						NULL,				// address of maximum message size
						NULL,				// address of size of next message
						&waiting,			// address of number of messages
 						NULL				// address of read time-out
						);
				if(!waiting)
					break;
				if(ReadFile(rdslot,buf+rd,len-rd,&msglen,NULL)==FALSE || msglen<1)
					break;
				rd+=msglen;
			}
762

763
764
765
766
767
768
769
770
771
			if(rd) {
				if(mode&EX_WWIV) {
                	bp=wwiv_expand(buf, rd, wwiv_buf, rd, useron.misc, wwiv_flag);
					if(rd>sizeof(wwiv_buf))
						lprintf(LOG_ERR,"WWIV_BUF OVERRUN");
				} else if(telnet_mode&TELNET_MODE_OFF) {
					bp=buf;
				} else {
                	rd = telnet_expand(buf, rd, telnet_buf, sizeof(telnet_buf), /* expand_cr: */false, &bp);
772
				}
773
774
775
				if(rd>RingBufFree(&outbuf)) {
					lprintf(LOG_ERR,"output buffer overflow");
					rd=RingBufFree(&outbuf);
776
				}
777
				if(mode&EX_BIN)
778
					RingBufWrite(&outbuf, bp, rd);
779
780
				else
					rputs((char*)bp, rd);
781
			}
782
#if defined(_DEBUG) && 0
783
784
785
786
787
788
			if(rd>1) {
				sprintf(str,"Node %d read %5d bytes from xtrn", cfg.node_num, rd);
				OutputDebugString(str);
			}
#endif
            if((!rd && !wr) || hungup) {
789
790
791
792
793

				loop_since_io++;	/* number of loop iterations with no I/O */

				/* only check process termination after 300 milliseconds of no I/O */
				/* to allow for last minute reception of output from DOS programs */
794
795
				if(loop_since_io>=3) {

796
					if(online && hangup_event!=NULL
797
798
799
800
801
802
803
804
805
						&& WaitForSingleObject(hangup_event,0)==WAIT_OBJECT_0) {
						lprintf(LOG_NOTICE,"Node %d External program requested hangup (dropped DTR)"
							,cfg.node_num);
						hangup();
					}

					if(WaitForSingleObject(process_info.hProcess,0)==WAIT_OBJECT_0)
						break;	/* Process Terminated */
				}
806
807

				/* only check node for interrupt flag every 3 seconds of no I/O */
rswindell's avatar
rswindell committed
808
				if((loop_since_io%30)==0) {
809
810
811
812
813
814
815
					// Check if the node has been interrupted
					getnodedat(cfg.node_num,&thisnode,0);
					if(thisnode.misc&NODE_INTR)
						break;
				}

				/* only send telnet GA every 30 seconds of no I/O */
816
				if((loop_since_io%300)==0) {
817
#if defined(_DEBUG)
818
819
820
821
822
823
824
					sprintf(str,"Node %d xtrn idle\n",cfg.node_num);
					OutputDebugString(str);
#endif
					// Let's make sure the socket is up
					// Sending will trigger a socket d/c detection
					if(!(startup->options&BBS_OPT_NO_TELNET_GA))
						send_telnet_cmd(TELNET_GA,0);
825
				}
826
				sem_trywait_block(&inbuf.sem,100);
827
828
829
830
831
            } else
				loop_since_io=0;
        }
	}

832
    if(!(mode&EX_BG)) {			/* !background execution */
833

834
835
836
        if(GetExitCodeProcess(process_info.hProcess, &retval)==FALSE)
            errormsg(WHERE, ERR_CHK, "ExitCodeProcess",(DWORD)process_info.hProcess);

837
		if(retval==STILL_ACTIVE) {
838
			lprintf(LOG_INFO,"Node %d Terminating process from line %d",cfg.node_num,__LINE__);
839
			TerminateProcess(process_info.hProcess, GetLastError());
rswindell's avatar
rswindell committed
840
		}
841

842
	 	// Get return value
843
844
845
846
847
848
849
		if(!native) {
    		sprintf(str,"%sDOSXTRN.RET", cfg.node_dir);
			FILE* fp=fopen(str,"r");
			if(fp!=NULL) {
				fscanf(fp,"%d",&retval);
				fclose(fp);
			}
850
851
852
		}
	}

853
	XTRN_CLEANUP;
854
	CloseHandle(process_info.hProcess);
855
856
857

	if(!(mode&EX_OFFLINE)) {	/* !off-line execution */

858
		if(native) {
859
860
			if(!(mode&EX_STDIN)) {
				if(passthru_thread_running)
861
					passthru_socket_activate(false);
862
863
864
				else
					pthread_mutex_unlock(&input_thread_mutex);
			}
865
		}
866

867
868
		curatr=~0;			// Can't guarantee current attributes
		attr(LIGHTGRAY);	// Force to "normal"
869

870
		rio_abortable=rio_abortable_save;	// Restore abortable state
871

872
		/* Got back to Text/NVT mode */
873
		request_telnet_opt(TELNET_DONT,TELNET_BINARY_TX);
874
	}
875

876
877
//	lprintf("%s returned %d",realcmdline, retval);

878
	errorlevel = retval; // Baja or JS retrievable error value
879

880
881
882
	return(retval);
}

883
884
#else	/* !WIN32 */

885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
/*****************************************************************************/
// Expands Unix LF to CRLF
/*****************************************************************************/
BYTE* lf_expand(BYTE* inbuf, ulong inlen, BYTE* outbuf, ulong& newlen)
{
	ulong	i,j;

	for(i=j=0;i<inlen;i++) {
		if(inbuf[i]=='\n' && (!i || inbuf[i-1]!='\r'))
			outbuf[j++]='\r';
		outbuf[j++]=inbuf[i];
	}
	newlen=j;
    return(outbuf);
}

901
902
#define MAX_ARGS 1000

deuce's avatar
deuce committed
903
904
905
906
907
908
909
910
911
912
913
#ifdef NEEDS_SETENV
static int setenv(const char *name, const char *value, int overwrite)
{
	char *envstr;
	char *oldenv;
	if(overwrite || getenv(name)==NULL) {
		envstr=(char *)malloc(strlen(name)+strlen(value)+2);
		if(envstr==NULL) {
			errno=ENOMEM;
			return(-1);
		}
deuce's avatar
deuce committed
914
915
		/* Note, on some platforms, this can be free()d... */
		sprintf(envstr,"%s=%s",name,value);
deuce's avatar
deuce committed
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
		putenv(envstr);
	}
	return(0);
}
#endif

#ifdef NEEDS_CFMAKERAW
void
cfmakeraw(struct termios *t)
{
	t->c_iflag &= ~(IMAXBEL|IGNBRK|BRKINT|PARMRK|ISTRIP|INLCR|IGNCR|ICRNL|IXON);
	t->c_oflag &= ~OPOST;
	t->c_lflag &= ~(ECHO|ECHONL|ICANON|ISIG|IEXTEN);
	t->c_cflag &= ~(CSIZE|PARENB);
	t->c_cflag |= CS8;
}
#endif

934
935
936
937
938
939
940
941
942
943
944
945
946
947
#ifdef NEEDS_FORKPTY
static int login_tty(int fd)
{
	(void) setsid();
	if (!isatty(fd))
		return (-1);
	(void) dup2(fd, 0);
	(void) dup2(fd, 1);
	(void) dup2(fd, 2);
	if (fd > 2)
		(void) close(fd);
	return (0);
}

948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
#ifdef NEEDS_DAEMON
/****************************************************************************/
/* Daemonizes the process                                                   */
/****************************************************************************/
int
daemon(int nochdir, int noclose)
{
    int fd;

    switch (fork()) {
    case -1:
        return (-1);
    case 0:
        break;
    default:
        _exit(0);
    }

    if (setsid() == -1)
        return (-1);

    if (!nochdir)
        (void)chdir("/");

    if (!noclose && (fd = open(_PATH_DEVNULL, O_RDWR, 0)) != -1) {
        (void)dup2(fd, STDIN_FILENO);
        (void)dup2(fd, STDOUT_FILENO);
        (void)dup2(fd, STDERR_FILENO);
        if (fd > 2)
            (void)close(fd);
    }
    return (0);
}
#endif

983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
static int openpty(int *amaster, int *aslave, char *name, struct termios *termp, winsize *winp)
{
	char line[] = "/dev/ptyXX";
	const char *cp1, *cp2;
	int master, slave, ttygid;
	struct group *gr;

	if ((gr = getgrnam("tty")) != NULL)
		ttygid = gr->gr_gid;
	else
		ttygid = -1;

	for (cp1 = "pqrsPQRS"; *cp1; cp1++) {
		line[8] = *cp1;
		for (cp2 = "0123456789abcdefghijklmnopqrstuv"; *cp2; cp2++) {
			line[5] = 'p';
			line[9] = *cp2;
			if ((master = open(line, O_RDWR, 0)) == -1) {
				if (errno == ENOENT)
					break; /* try the next pty group */
			} else {
				line[5] = 't';
				(void) chown(line, getuid(), ttygid);
				(void) chmod(line, S_IRUSR|S_IWUSR|S_IWGRP);
				/* Hrm... SunOS doesn't seem to have revoke
				(void) revoke(line); */
				if ((slave = open(line, O_RDWR, 0)) != -1) {
					*amaster = master;
					*aslave = slave;
					if (name)
						strcpy(name, line);
					if (termp)
						(void) tcsetattr(slave,
							TCSAFLUSH, termp);
					if (winp)
						(void) ioctl(slave, TIOCSWINSZ,
							(char *)winp);
					return (0);
				}
				(void) close(master);
			}
		}
	}
	errno = ENOENT;	/* out of ptys */
	return (-1);
}

static int forkpty(int *amaster, char *name, termios *termp, winsize *winp)
{
	int master, slave, pid;

	if (openpty(&master, &slave, name, termp, winp) == -1)
		return (-1);
1036
	switch (pid = FORK()) {
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
	case -1:
		return (-1);
	case 0:
		/*
		 * child
		 */
		(void) close(master);
		login_tty(slave);
		return (0);
	}
	/*
	 * parent
	 */
	*amaster = master;
	(void) close(slave);
	return (pid);
}
#endif /* NEED_FORKPTY */

1056
int sbbs_t::external(const char* cmdline, long mode, const char* startup_dir)
1057
{
1058
1059
	char	str[MAX_PATH+1];
	char	fname[MAX_PATH+1];
1060
	char	fullpath[MAX_PATH+1];
1061
	char	fullcmdline[MAX_PATH+1];
1062
	char*	argv[MAX_ARGS];
1063
1064
1065
	BYTE*	bp;
	BYTE	buf[XTRN_IO_BUF_LEN];
    BYTE 	output_buf[XTRN_IO_BUF_LEN*2];
1066
	ulong	avail;
1067
1068
    ulong	output_len;
	bool	native=false;			// DOS program by default
1069
	bool	rio_abortable_save=rio_abortable;
rswindell's avatar
rswindell committed
1070
	int		i;
1071
	bool	data_waiting;
1072
1073
	int		rd;
	int		wr;
1074
	int		argc;
1075
	pid_t	pid;
1076
1077
	int		in_pipe[2];
	int		out_pipe[2];
1078
	int		err_pipe[2];
1079
	fd_set ibits;
1080
	int	high_fd;
1081
	struct timeval timeout;
1082
1083
    BYTE 	wwiv_buf[XTRN_IO_BUF_LEN*2];
    bool	wwiv_flag=false;
1084
1085
1086
#if defined(__FreeBSD__) || (defined(__linux__) && defined(USE_DOSEMU))
 	char* p;
#endif
1087

1088
	xtrn_mode = mode;
rswindell's avatar
rswindell committed
1089
	lprintf(LOG_DEBUG, "Executing external: %s", cmdline);
1090

1091
1092
1093
1094
1095
	if(startup_dir!=NULL && startup_dir[0] && !isdir(startup_dir)) {
		errormsg(WHERE, ERR_CHK, startup_dir, 0);
		return -1;
	}

1096
1097
	if(startup_dir==NULL)
		startup_dir=nulstr;
1098

1099
	XTRN_LOADABLE_MODULE(cmdline,startup_dir);
1100
	XTRN_LOADABLE_JS_MODULE(cmdline,mode,startup_dir);
1101

1102
	attr(cfg.color[clr_external]);  /* setup default attributes */
1103

1104
1105
	native = native_executable(&cfg, cmdline, mode);

1106
1107
1108
    SAFECOPY(str,cmdline);			/* Set fname to program name only */
	truncstr(str," ");
    SAFECOPY(fname,getfname(str));
1109

1110
1111
	sprintf(fullpath,"%s%s",startup_dir,fname);
	if(startup_dir!=NULL && cmdline[0]!='/' && cmdline[0]!='.' && fexist(fullpath))
1112
1113
1114
		sprintf(fullcmdline,"%s%s",startup_dir,cmdline);
	else
		SAFECOPY(fullcmdline,cmdline);
1115
1116
1117
1118

 	if(native) { // Native (32-bit) external

		// Current environment passed to child process
1119
1120
1121
1122
1123
1124
		sprintf(dszlog,"%sPROTOCOL.LOG",cfg.node_dir);
		setenv("DSZLOG",dszlog,1); 		/* Makes the DSZ LOG active */
		setenv("SBBSNODE",cfg.node_dir,1);
		setenv("SBBSCTRL",cfg.ctrl_dir,1);
		setenv("SBBSDATA",cfg.data_dir,1);
		setenv("SBBSEXEC",cfg.exec_dir,1);
1125
		sprintf(str,"%u",cfg.node_num);
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
1136
1137
1138
1139
1140
1141
		setenv("SBBSNNUM",str,1);

		/* date/time env vars */
		now = time(NULL);
		struct	tm tm;
		if(localtime_r(&now, &tm) == NULL)
			memset(&tm, 0, sizeof(tm));
		sprintf(str," %02u", tm.tm_mday);
		setenv("DAY", str, /* overwrite */TRUE);
		setenv("WEEKDAY", wday[tm.tm_wday], /* overwrite */TRUE);
		setenv("MONTHNAME", mon[tm.tm_mon], /* overwrite */TRUE);
		sprintf(str, "%02u", tm.tm_mon + 1);
		setenv("MONTH", str, /* overwrite */TRUE);
		sprintf(str,"%u", 1900 + tm.tm_year);
		if(setenv("YEAR", str, /* overwrite */TRUE) != 0)
			errormsg(WHERE,ERR_WRITE,"environment",0);
1142
1143

	} else {
1144
		if(startup->options&BBS_OPT_NO_DOS) {
1145
			lprintf((mode&EX_OFFLINE) ? LOG_ERR : LOG_WARNING, "DOS programs not supported: %s", cmdline);
1146
1147
1148
			bprintf("Sorry, DOS programs are not supported on this node.\r\n");
			return -1;
		}
1149
#if defined(__FreeBSD__)
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1170
1171
1172
1173
1174
1175
		/* ToDo: This seems to work for every door except Iron Ox
		   ToDo: Iron Ox is unique in that it runs perfectly from
		   ToDo: tcsh but not at all from anywhere else, complaining
		   ToDo: about corrupt files.  I've ruled out the possibilty
		   ToDo: of it being a terminal mode issue... no other ideas
		   ToDo: come to mind. */

		FILE * doscmdrc;

		sprintf(str,"%s.doscmdrc",cfg.node_dir);
		if((doscmdrc=fopen(str,"w+"))==NULL)  {
			errormsg(WHERE,ERR_CREATE,str,0);