Remove rogue sfree()s inside new wildcard action functions -- were causing
[u/mdw/putty] / psftp.c
CommitLineData
4c7f0d61 1/*
f4ff9455 2 * psftp.c: (platform-independent) front end for PSFTP.
4c7f0d61 3 */
4
5#include <stdio.h>
6#include <stdlib.h>
f9e162aa 7#include <stdarg.h>
4c7f0d61 8#include <assert.h>
d92624dc 9#include <limits.h>
4c7f0d61 10
4a8fc3c4 11#define PUTTY_DO_GLOBALS
12#include "putty.h"
d6cc41e6 13#include "psftp.h"
4a8fc3c4 14#include "storage.h"
15#include "ssh.h"
4c7f0d61 16#include "sftp.h"
17#include "int64.h"
18
5471d09a 19/*
20 * Since SFTP is a request-response oriented protocol, it requires
21 * no buffer management: when we send data, we stop and wait for an
22 * acknowledgement _anyway_, and so we can't possibly overfill our
23 * send buffer.
24 */
25
fa3db767 26static int psftp_connect(char *userhost, char *user, int portnumber);
07534184 27static int do_sftp_init(void);
679539d7 28void do_sftp_cleanup();
fa3db767 29
4c7f0d61 30/* ----------------------------------------------------------------------
4c7f0d61 31 * sftp client state.
32 */
33
34char *pwd, *homedir;
6b78788a 35static Backend *back;
36static void *backhandle;
3ea863a3 37static Config cfg;
4c7f0d61 38
39/* ----------------------------------------------------------------------
40 * Higher-level helper functions used in commands.
41 */
42
43/*
f9e162aa 44 * Attempt to canonify a pathname starting from the pwd. If
45 * canonification fails, at least fall back to returning a _valid_
46 * pathname (though it may be ugly, eg /home/simon/../foobar).
4c7f0d61 47 */
32874aea 48char *canonify(char *name)
49{
f9e162aa 50 char *fullname, *canonname;
1bc24185 51 struct sftp_packet *pktin;
52 struct sftp_request *req, *rreq;
4a8fc3c4 53
f9e162aa 54 if (name[0] == '/') {
55 fullname = dupstr(name);
56 } else {
4a8fc3c4 57 char *slash;
32874aea 58 if (pwd[strlen(pwd) - 1] == '/')
4a8fc3c4 59 slash = "";
60 else
61 slash = "/";
62 fullname = dupcat(pwd, slash, name, NULL);
f9e162aa 63 }
4a8fc3c4 64
1bc24185 65 sftp_register(req = fxp_realpath_send(fullname));
66 rreq = sftp_find_request(pktin = sftp_recv());
67 assert(rreq == req);
7b7de4f4 68 canonname = fxp_realpath_recv(pktin, rreq);
4a8fc3c4 69
f9e162aa 70 if (canonname) {
71 sfree(fullname);
72 return canonname;
50d7e054 73 } else {
32874aea 74 /*
75 * Attempt number 2. Some FXP_REALPATH implementations
76 * (glibc-based ones, in particular) require the _whole_
77 * path to point to something that exists, whereas others
78 * (BSD-based) only require all but the last component to
79 * exist. So if the first call failed, we should strip off
80 * everything from the last slash onwards and try again,
81 * then put the final component back on.
82 *
83 * Special cases:
84 *
85 * - if the last component is "/." or "/..", then we don't
86 * bother trying this because there's no way it can work.
87 *
88 * - if the thing actually ends with a "/", we remove it
89 * before we start. Except if the string is "/" itself
90 * (although I can't see why we'd have got here if so,
91 * because surely "/" would have worked the first
92 * time?), in which case we don't bother.
93 *
94 * - if there's no slash in the string at all, give up in
95 * confusion (we expect at least one because of the way
96 * we constructed the string).
97 */
98
99 int i;
100 char *returnname;
101
102 i = strlen(fullname);
103 if (i > 2 && fullname[i - 1] == '/')
104 fullname[--i] = '\0'; /* strip trailing / unless at pos 0 */
105 while (i > 0 && fullname[--i] != '/');
106
107 /*
108 * Give up on special cases.
109 */
110 if (fullname[i] != '/' || /* no slash at all */
111 !strcmp(fullname + i, "/.") || /* ends in /. */
112 !strcmp(fullname + i, "/..") || /* ends in /.. */
113 !strcmp(fullname, "/")) {
114 return fullname;
115 }
116
117 /*
118 * Now i points at the slash. Deal with the final special
119 * case i==0 (ie the whole path was "/nonexistentfile").
120 */
121 fullname[i] = '\0'; /* separate the string */
122 if (i == 0) {
1bc24185 123 sftp_register(req = fxp_realpath_send("/"));
32874aea 124 } else {
1bc24185 125 sftp_register(req = fxp_realpath_send(fullname));
32874aea 126 }
1bc24185 127 rreq = sftp_find_request(pktin = sftp_recv());
128 assert(rreq == req);
7b7de4f4 129 canonname = fxp_realpath_recv(pktin, rreq);
32874aea 130
131 if (!canonname)
132 return fullname; /* even that failed; give up */
133
134 /*
135 * We have a canonical name for all but the last path
136 * component. Concatenate the last component and return.
137 */
138 returnname = dupcat(canonname,
139 canonname[strlen(canonname) - 1] ==
140 '/' ? "" : "/", fullname + i + 1, NULL);
141 sfree(fullname);
142 sfree(canonname);
143 return returnname;
50d7e054 144 }
4c7f0d61 145}
146
dcf8495c 147/*
148 * Return a pointer to the portion of str that comes after the last
149 * slash (or backslash or colon, if `local' is TRUE).
150 */
151static char *stripslashes(char *str, int local)
152{
153 char *p;
154
155 if (local) {
156 p = strchr(str, ':');
157 if (p) str = p+1;
158 }
159
160 p = strrchr(str, '/');
161 if (p) str = p+1;
162
163 if (local) {
164 p = strrchr(str, '\\');
165 if (p) str = p+1;
166 }
167
168 return str;
169}
170
4c7f0d61 171/*
93e86a8b 172 * qsort comparison routine for fxp_name structures. Sorts by real
173 * file name.
4c7f0d61 174 */
93e86a8b 175static int sftp_name_compare(const void *av, const void *bv)
32874aea 176{
7d2c1789 177 const struct fxp_name *const *a = (const struct fxp_name *const *) av;
178 const struct fxp_name *const *b = (const struct fxp_name *const *) bv;
179 return strcmp((*a)->filename, (*b)->filename);
4c7f0d61 180}
4c7f0d61 181
182/*
93e86a8b 183 * Likewise, but for a bare char *.
4f2b387f 184 */
93e86a8b 185static int bare_name_compare(const void *av, const void *bv)
4f2b387f 186{
93e86a8b 187 const char **a = (const char **) av;
188 const char **b = (const char **) bv;
189 return strcmp(*a, *b);
4f2b387f 190}
191
93e86a8b 192/* ----------------------------------------------------------------------
193 * The meat of the `get' and `put' commands.
4c7f0d61 194 */
5079ee6d 195int sftp_get_file(char *fname, char *outfname, int recurse, int restart)
32874aea 196{
4c7f0d61 197 struct fxp_handle *fh;
1bc24185 198 struct sftp_packet *pktin;
199 struct sftp_request *req, *rreq;
c606c42d 200 struct fxp_xfer *xfer;
4c7f0d61 201 uint64 offset;
202 FILE *fp;
479fe1ba 203 int ret, shown_err = FALSE;
4c7f0d61 204
93e86a8b 205 /*
206 * In recursive mode, see if we're dealing with a directory.
207 * (If we're not in recursive mode, we need not even check: the
208 * subsequent FXP_OPEN will return a usable error message.)
209 */
5079ee6d 210 if (recurse) {
93e86a8b 211 struct fxp_attrs attrs;
212 int result;
fa3db767 213
5079ee6d 214 sftp_register(req = fxp_stat_send(fname));
215 rreq = sftp_find_request(pktin = sftp_recv());
216 assert(rreq == req);
217 result = fxp_stat_recv(pktin, rreq, &attrs);
9c77ddf6 218
5079ee6d 219 if (result &&
220 (attrs.flags & SSH_FILEXFER_ATTR_PERMISSIONS) &&
221 (attrs.permissions & 0040000)) {
93e86a8b 222
223 struct fxp_handle *dirhandle;
224 int nnames, namesize;
225 struct fxp_name **ournames;
226 struct fxp_names *names;
227 int i;
228
229 /*
230 * First, attempt to create the destination directory,
5079ee6d 231 * unless it already exists.
93e86a8b 232 */
5079ee6d 233 if (file_type(outfname) != FILE_TYPE_DIRECTORY &&
93e86a8b 234 !create_directory(outfname)) {
235 printf("%s: Cannot create directory\n", outfname);
236 return 0;
237 }
4c7f0d61 238
93e86a8b 239 /*
240 * Now get the list of filenames in the remote
241 * directory.
242 */
243 sftp_register(req = fxp_opendir_send(fname));
244 rreq = sftp_find_request(pktin = sftp_recv());
245 assert(rreq == req);
246 dirhandle = fxp_opendir_recv(pktin, rreq);
247
248 if (!dirhandle) {
249 printf("%s: unable to open directory: %s\n",
250 fname, fxp_error());
251 return 0;
252 }
253 nnames = namesize = 0;
254 ournames = NULL;
255 while (1) {
256 int i;
257
258 sftp_register(req = fxp_readdir_send(dirhandle));
259 rreq = sftp_find_request(pktin = sftp_recv());
260 assert(rreq == req);
261 names = fxp_readdir_recv(pktin, rreq);
262
263 if (names == NULL) {
264 if (fxp_error_type() == SSH_FX_EOF)
265 break;
266 printf("%s: reading directory: %s\n", fname, fxp_error());
267 sfree(ournames);
268 return 0;
269 }
270 if (names->nnames == 0) {
271 fxp_free_names(names);
272 break;
273 }
274 if (nnames + names->nnames >= namesize) {
275 namesize += names->nnames + 128;
276 ournames = sresize(ournames, namesize, struct fxp_name *);
277 }
278 for (i = 0; i < names->nnames; i++)
e9d14678 279 if (strcmp(names->names[i].filename, ".") &&
5079ee6d 280 strcmp(names->names[i].filename, "..")) {
e9d14678 281 if (!vet_filename(names->names[i].filename)) {
282 printf("ignoring potentially dangerous server-"
283 "supplied filename '%s'\n",
284 names->names[i].filename);
285 } else {
286 ournames[nnames++] =
287 fxp_dup_name(&names->names[i]);
288 }
289 }
93e86a8b 290 fxp_free_names(names);
291 }
292 sftp_register(req = fxp_close_send(dirhandle));
293 rreq = sftp_find_request(pktin = sftp_recv());
294 assert(rreq == req);
295 fxp_close_recv(pktin, rreq);
296
297 /*
298 * Sort the names into a clear order. This ought to
299 * make things more predictable when we're doing a
300 * reget of the same directory, just in case two
301 * readdirs on the same remote directory return a
302 * different order.
303 */
304 qsort(ournames, nnames, sizeof(*ournames), sftp_name_compare);
305
306 /*
307 * If we're in restart mode, find the last filename on
308 * this list that already exists. We may have to do a
309 * reget on _that_ file, but shouldn't have to do
310 * anything on the previous files.
311 *
312 * If none of them exists, of course, we start at 0.
313 */
314 i = 0;
315 while (i < nnames) {
316 char *nextoutfname;
317 int ret;
9c77ddf6 318 if (outfname)
319 nextoutfname = dir_file_cat(outfname,
320 ournames[i]->filename);
321 else
322 nextoutfname = dupstr(ournames[i]->filename);
93e86a8b 323 ret = (file_type(nextoutfname) == FILE_TYPE_NONEXISTENT);
324 sfree(nextoutfname);
325 if (ret)
326 break;
327 i++;
328 }
329 if (i > 0)
330 i--;
331
332 /*
333 * Now we're ready to recurse. Starting at ournames[i]
334 * and continuing on to the end of the list, we
335 * construct a new source and target file name, and
336 * call sftp_get_file again.
337 */
338 for (; i < nnames; i++) {
339 char *nextfname, *nextoutfname;
340 int ret;
341
342 nextfname = dupcat(fname, "/", ournames[i]->filename, NULL);
9c77ddf6 343 if (outfname)
344 nextoutfname = dir_file_cat(outfname,
345 ournames[i]->filename);
346 else
347 nextoutfname = dupstr(ournames[i]->filename);
5079ee6d 348 ret = sftp_get_file(nextfname, nextoutfname, recurse, restart);
93e86a8b 349 restart = FALSE; /* after first partial file, do full */
350 sfree(nextoutfname);
351 sfree(nextfname);
352 if (!ret) {
353 for (i = 0; i < nnames; i++) {
354 fxp_free_name(ournames[i]);
355 }
356 sfree(ournames);
357 return 0;
358 }
359 }
360
361 /*
362 * Done this recursion level. Free everything.
363 */
364 for (i = 0; i < nnames; i++) {
365 fxp_free_name(ournames[i]);
366 }
367 sfree(ournames);
368
369 return 1;
370 }
4c7f0d61 371 }
4c7f0d61 372
1bc24185 373 sftp_register(req = fxp_open_send(fname, SSH_FXF_READ));
374 rreq = sftp_find_request(pktin = sftp_recv());
375 assert(rreq == req);
7b7de4f4 376 fh = fxp_open_recv(pktin, rreq);
1bc24185 377
4c7f0d61 378 if (!fh) {
379 printf("%s: %s\n", fname, fxp_error());
4c7f0d61 380 return 0;
381 }
d92624dc 382
383 if (restart) {
384 fp = fopen(outfname, "rb+");
385 } else {
386 fp = fopen(outfname, "wb");
387 }
388
4c7f0d61 389 if (!fp) {
390 printf("local: unable to open %s\n", outfname);
1bc24185 391
392 sftp_register(req = fxp_close_send(fh));
393 rreq = sftp_find_request(pktin = sftp_recv());
394 assert(rreq == req);
7b7de4f4 395 fxp_close_recv(pktin, rreq);
1bc24185 396
4c7f0d61 397 return 0;
398 }
399
d92624dc 400 if (restart) {
401 long posn;
402 fseek(fp, 0L, SEEK_END);
403 posn = ftell(fp);
404 printf("reget: restarting at file position %ld\n", posn);
405 offset = uint64_make(0, posn);
406 } else {
407 offset = uint64_make(0, 0);
408 }
4c7f0d61 409
d92624dc 410 printf("remote:%s => local:%s\n", fname, outfname);
4c7f0d61 411
412 /*
413 * FIXME: we can use FXP_FSTAT here to get the file size, and
414 * thus put up a progress bar.
415 */
df49ff19 416 ret = 1;
c606c42d 417 xfer = xfer_download_init(fh, offset);
df0870fc 418 while (!xfer_done(xfer)) {
c606c42d 419 void *vbuf;
420 int ret, len;
4c7f0d61 421 int wpos, wlen;
422
c606c42d 423 xfer_download_queue(xfer);
424 pktin = sftp_recv();
425 ret = xfer_download_gotpkt(xfer, pktin);
426
427 if (ret < 0) {
479fe1ba 428 if (!shown_err) {
429 printf("error while reading: %s\n", fxp_error());
430 shown_err = TRUE;
431 }
c606c42d 432 ret = 0;
4c7f0d61 433 }
32874aea 434
c606c42d 435 while (xfer_download_data(xfer, &vbuf, &len)) {
436 unsigned char *buf = (unsigned char *)vbuf;
437
438 wpos = 0;
439 while (wpos < len) {
440 wlen = fwrite(buf + wpos, 1, len - wpos, fp);
441 if (wlen <= 0) {
442 printf("error while writing local file\n");
443 ret = 0;
444 xfer_set_error(xfer);
445 }
446 wpos += wlen;
447 }
448 if (wpos < len) { /* we had an error */
df49ff19 449 ret = 0;
c606c42d 450 xfer_set_error(xfer);
4c7f0d61 451 }
9ff4e23d 452
453 sfree(vbuf);
df49ff19 454 }
4c7f0d61 455 }
456
c606c42d 457 xfer_cleanup(xfer);
458
4c7f0d61 459 fclose(fp);
1bc24185 460
461 sftp_register(req = fxp_close_send(fh));
462 rreq = sftp_find_request(pktin = sftp_recv());
463 assert(rreq == req);
7b7de4f4 464 fxp_close_recv(pktin, rreq);
1bc24185 465
df49ff19 466 return ret;
4c7f0d61 467}
468
5079ee6d 469int sftp_put_file(char *fname, char *outfname, int recurse, int restart)
32874aea 470{
4c7f0d61 471 struct fxp_handle *fh;
df0870fc 472 struct fxp_xfer *xfer;
1bc24185 473 struct sftp_packet *pktin;
474 struct sftp_request *req, *rreq;
4c7f0d61 475 uint64 offset;
476 FILE *fp;
df0870fc 477 int ret, err, eof;
4c7f0d61 478
93e86a8b 479 /*
480 * In recursive mode, see if we're dealing with a directory.
481 * (If we're not in recursive mode, we need not even check: the
482 * subsequent fopen will return an error message.)
483 */
5079ee6d 484 if (recurse && file_type(fname) == FILE_TYPE_DIRECTORY) {
93e86a8b 485 struct fxp_attrs attrs;
486 int result;
487 int nnames, namesize;
488 char *name, **ournames;
489 DirHandle *dh;
490 int i;
4c7f0d61 491
5079ee6d 492 /*
493 * First, attempt to create the destination directory,
494 * unless it already exists.
495 */
496 sftp_register(req = fxp_stat_send(outfname));
497 rreq = sftp_find_request(pktin = sftp_recv());
498 assert(rreq == req);
499 result = fxp_stat_recv(pktin, rreq, &attrs);
500 if (!result ||
501 !(attrs.flags & SSH_FILEXFER_ATTR_PERMISSIONS) ||
502 !(attrs.permissions & 0040000)) {
503 sftp_register(req = fxp_mkdir_send(outfname));
93e86a8b 504 rreq = sftp_find_request(pktin = sftp_recv());
505 assert(rreq == req);
5079ee6d 506 result = fxp_mkdir_recv(pktin, rreq);
93e86a8b 507
5079ee6d 508 if (!result) {
509 printf("%s: create directory: %s\n",
510 outfname, fxp_error());
511 return 0;
93e86a8b 512 }
513 }
514
515 /*
516 * Now get the list of filenames in the local directory.
517 */
93e86a8b 518 nnames = namesize = 0;
519 ournames = NULL;
9c77ddf6 520
5079ee6d 521 dh = open_directory(fname);
522 if (!dh) {
523 printf("%s: unable to open directory\n", fname);
524 return 0;
9c77ddf6 525 }
5079ee6d 526 while ((name = read_filename(dh)) != NULL) {
527 if (nnames >= namesize) {
528 namesize += 128;
529 ournames = sresize(ournames, namesize, char *);
530 }
531 ournames[nnames++] = name;
93e86a8b 532 }
5079ee6d 533 close_directory(dh);
93e86a8b 534
535 /*
536 * Sort the names into a clear order. This ought to make
537 * things more predictable when we're doing a reput of the
538 * same directory, just in case two readdirs on the same
539 * local directory return a different order.
540 */
541 qsort(ournames, nnames, sizeof(*ournames), bare_name_compare);
542
543 /*
544 * If we're in restart mode, find the last filename on this
545 * list that already exists. We may have to do a reput on
546 * _that_ file, but shouldn't have to do anything on the
547 * previous files.
548 *
549 * If none of them exists, of course, we start at 0.
550 */
551 i = 0;
552 while (i < nnames) {
553 char *nextoutfname;
554 nextoutfname = dupcat(outfname, "/", ournames[i], NULL);
555 sftp_register(req = fxp_stat_send(nextoutfname));
556 rreq = sftp_find_request(pktin = sftp_recv());
557 assert(rreq == req);
558 result = fxp_stat_recv(pktin, rreq, &attrs);
559 sfree(nextoutfname);
560 if (!result)
561 break;
562 i++;
563 }
564 if (i > 0)
565 i--;
566
567 /*
568 * Now we're ready to recurse. Starting at ournames[i]
569 * and continuing on to the end of the list, we
570 * construct a new source and target file name, and
571 * call sftp_put_file again.
572 */
573 for (; i < nnames; i++) {
574 char *nextfname, *nextoutfname;
575 int ret;
576
9c77ddf6 577 if (fname)
578 nextfname = dir_file_cat(fname, ournames[i]);
579 else
580 nextfname = dupstr(ournames[i]);
93e86a8b 581 nextoutfname = dupcat(outfname, "/", ournames[i], NULL);
5079ee6d 582 ret = sftp_put_file(nextfname, nextoutfname, recurse, restart);
93e86a8b 583 restart = FALSE; /* after first partial file, do full */
584 sfree(nextoutfname);
585 sfree(nextfname);
586 if (!ret) {
587 for (i = 0; i < nnames; i++) {
588 sfree(ournames[i]);
589 }
590 sfree(ournames);
591 return 0;
592 }
593 }
594
595 /*
596 * Done this recursion level. Free everything.
597 */
598 for (i = 0; i < nnames; i++) {
599 sfree(ournames[i]);
600 }
601 sfree(ournames);
602
603 return 1;
4c7f0d61 604 }
605
606 fp = fopen(fname, "rb");
607 if (!fp) {
608 printf("local: unable to open %s\n", fname);
4c7f0d61 609 return 0;
610 }
d92624dc 611 if (restart) {
1bc24185 612 sftp_register(req = fxp_open_send(outfname, SSH_FXF_WRITE));
d92624dc 613 } else {
1bc24185 614 sftp_register(req = fxp_open_send(outfname, SSH_FXF_WRITE |
615 SSH_FXF_CREAT | SSH_FXF_TRUNC));
d92624dc 616 }
1bc24185 617 rreq = sftp_find_request(pktin = sftp_recv());
618 assert(rreq == req);
7b7de4f4 619 fh = fxp_open_recv(pktin, rreq);
1bc24185 620
4c7f0d61 621 if (!fh) {
622 printf("%s: %s\n", outfname, fxp_error());
4c7f0d61 623 return 0;
624 }
625
d92624dc 626 if (restart) {
627 char decbuf[30];
628 struct fxp_attrs attrs;
1bc24185 629 int ret;
630
631 sftp_register(req = fxp_fstat_send(fh));
632 rreq = sftp_find_request(pktin = sftp_recv());
633 assert(rreq == req);
7b7de4f4 634 ret = fxp_fstat_recv(pktin, rreq, &attrs);
1bc24185 635
636 if (!ret) {
d92624dc 637 printf("read size of %s: %s\n", outfname, fxp_error());
d92624dc 638 return 0;
639 }
640 if (!(attrs.flags & SSH_FILEXFER_ATTR_SIZE)) {
641 printf("read size of %s: size was not given\n", outfname);
d92624dc 642 return 0;
643 }
644 offset = attrs.size;
645 uint64_decimal(offset, decbuf);
646 printf("reput: restarting at file position %s\n", decbuf);
647 if (uint64_compare(offset, uint64_make(0, LONG_MAX)) > 0) {
648 printf("reput: remote file is larger than we can deal with\n");
d92624dc 649 return 0;
650 }
651 if (fseek(fp, offset.lo, SEEK_SET) != 0)
652 fseek(fp, 0, SEEK_END); /* *shrug* */
653 } else {
654 offset = uint64_make(0, 0);
655 }
4c7f0d61 656
d92624dc 657 printf("local:%s => remote:%s\n", fname, outfname);
4c7f0d61 658
659 /*
660 * FIXME: we can use FXP_FSTAT here to get the file size, and
661 * thus put up a progress bar.
662 */
df49ff19 663 ret = 1;
df0870fc 664 xfer = xfer_upload_init(fh, offset);
665 err = eof = 0;
666 while ((!err && !eof) || !xfer_done(xfer)) {
4c7f0d61 667 char buffer[4096];
1bc24185 668 int len, ret;
4c7f0d61 669
df0870fc 670 while (xfer_upload_ready(xfer) && !err && !eof) {
671 len = fread(buffer, 1, sizeof(buffer), fp);
672 if (len == -1) {
673 printf("error while reading local file\n");
674 err = 1;
675 } else if (len == 0) {
676 eof = 1;
677 } else {
678 xfer_upload_data(xfer, buffer, len);
679 }
4c7f0d61 680 }
1bc24185 681
2dbd915a 682 if (!xfer_done(xfer)) {
683 pktin = sftp_recv();
684 ret = xfer_upload_gotpkt(xfer, pktin);
685 if (!ret) {
686 printf("error while writing: %s\n", fxp_error());
687 err = 1;
688 }
4c7f0d61 689 }
4c7f0d61 690 }
691
df0870fc 692 xfer_cleanup(xfer);
693
1bc24185 694 sftp_register(req = fxp_close_send(fh));
695 rreq = sftp_find_request(pktin = sftp_recv());
696 assert(rreq == req);
7b7de4f4 697 fxp_close_recv(pktin, rreq);
1bc24185 698
4c7f0d61 699 fclose(fp);
93e86a8b 700
701 return ret;
702}
703
704/* ----------------------------------------------------------------------
5079ee6d 705 * A remote wildcard matcher, providing a similar interface to the
706 * local one in psftp.h.
707 */
708
709typedef struct SftpWildcardMatcher {
710 struct fxp_handle *dirh;
711 struct fxp_names *names;
712 int namepos;
713 char *wildcard, *prefix;
714} SftpWildcardMatcher;
715
716SftpWildcardMatcher *sftp_begin_wildcard_matching(char *name)
717{
718 struct sftp_packet *pktin;
719 struct sftp_request *req, *rreq;
720 char *wildcard;
721 char *unwcdir, *tmpdir, *cdir;
722 int len, check;
723 SftpWildcardMatcher *swcm;
724 struct fxp_handle *dirh;
725
726 /*
727 * We don't handle multi-level wildcards; so we expect to find
728 * a fully specified directory part, followed by a wildcard
729 * after that.
730 */
731 wildcard = stripslashes(name, 0);
732
733 unwcdir = dupstr(name);
734 len = wildcard - name;
735 unwcdir[len] = '\0';
736 if (len > 0 && unwcdir[len-1] == '/')
737 unwcdir[len-1] = '\0';
738 tmpdir = snewn(1 + len, char);
739 check = wc_unescape(tmpdir, unwcdir);
740 sfree(tmpdir);
741
742 if (!check) {
743 printf("Multiple-level wildcards are not supported\n");
744 sfree(unwcdir);
745 return NULL;
746 }
747
748 cdir = canonify(unwcdir);
749
750 sftp_register(req = fxp_opendir_send(cdir));
751 rreq = sftp_find_request(pktin = sftp_recv());
752 assert(rreq == req);
753 dirh = fxp_opendir_recv(pktin, rreq);
754
755 if (dirh) {
756 swcm = snew(SftpWildcardMatcher);
757 swcm->dirh = dirh;
758 swcm->names = NULL;
759 swcm->wildcard = dupstr(wildcard);
760 swcm->prefix = unwcdir;
761 } else {
762 printf("Unable to open %s: %s\n", cdir, fxp_error());
763 swcm = NULL;
764 sfree(unwcdir);
765 }
766
767 sfree(cdir);
768
769 return swcm;
770}
771
772char *sftp_wildcard_get_filename(SftpWildcardMatcher *swcm)
773{
774 struct fxp_name *name;
775 struct sftp_packet *pktin;
776 struct sftp_request *req, *rreq;
777
778 while (1) {
779 if (swcm->names && swcm->namepos >= swcm->names->nnames) {
780 fxp_free_names(swcm->names);
781 swcm->names = NULL;
782 }
783
784 if (!swcm->names) {
785 sftp_register(req = fxp_readdir_send(swcm->dirh));
786 rreq = sftp_find_request(pktin = sftp_recv());
787 assert(rreq == req);
788 swcm->names = fxp_readdir_recv(pktin, rreq);
789
790 if (!swcm->names) {
791 if (fxp_error_type() != SSH_FX_EOF)
792 printf("%s: reading directory: %s\n", swcm->prefix,
793 fxp_error());
794 return NULL;
795 }
796
797 swcm->namepos = 0;
798 }
799
800 assert(swcm->names && swcm->namepos < swcm->names->nnames);
801
802 name = &swcm->names->names[swcm->namepos++];
803
804 if (!strcmp(name->filename, ".") || !strcmp(name->filename, ".."))
805 continue; /* expected bad filenames */
806
807 if (!vet_filename(name->filename)) {
808 printf("ignoring potentially dangerous server-"
809 "supplied filename '%s'\n", name->filename);
810 continue; /* unexpected bad filename */
811 }
812
813 if (!wc_match(swcm->wildcard, name->filename))
814 continue; /* doesn't match the wildcard */
815
816 /*
817 * We have a working filename. Return it.
818 */
819 return dupprintf("%s%s%s", swcm->prefix,
83567e43 820 (!swcm->prefix[0] ||
821 swcm->prefix[strlen(swcm->prefix)-1]=='/' ?
822 "" : "/"),
5079ee6d 823 name->filename);
824 }
825}
826
827void sftp_finish_wildcard_matching(SftpWildcardMatcher *swcm)
828{
829 struct sftp_packet *pktin;
830 struct sftp_request *req, *rreq;
831
832 sftp_register(req = fxp_close_send(swcm->dirh));
833 rreq = sftp_find_request(pktin = sftp_recv());
834 assert(rreq == req);
835 fxp_close_recv(pktin, rreq);
836
837 if (swcm->names)
838 fxp_free_names(swcm->names);
839
840 sfree(swcm->prefix);
841 sfree(swcm->wildcard);
842
843 sfree(swcm);
844}
845
83567e43 846/*
847 * General function to match a potential wildcard in a filename
848 * argument and iterate over every matching file. Used in several
849 * PSFTP commands (rmdir, rm, chmod, mv).
850 */
851int wildcard_iterate(char *filename, int (*func)(void *, char *), void *ctx)
852{
853 char *unwcfname, *newname, *cname;
854 int is_wc, ret;
855
856 unwcfname = snewn(strlen(filename)+1, char);
857 is_wc = !wc_unescape(unwcfname, filename);
858
859 if (is_wc) {
860 SftpWildcardMatcher *swcm = sftp_begin_wildcard_matching(filename);
861 int matched = FALSE;
862 sfree(unwcfname);
863
864 if (!swcm)
865 return 0;
866
867 ret = 1;
868
869 while ( (newname = sftp_wildcard_get_filename(swcm)) != NULL ) {
870 cname = canonify(newname);
871 if (!cname) {
872 printf("%s: %s\n", newname, fxp_error());
873 ret = 0;
874 }
875 matched = TRUE;
876 ret &= func(ctx, cname);
877 sfree(cname);
878 }
879
880 if (!matched) {
881 /* Politely warn the user that nothing matched. */
882 printf("%s: nothing matched\n", filename);
883 }
884
885 sftp_finish_wildcard_matching(swcm);
886 } else {
887 cname = canonify(unwcfname);
888 if (!cname) {
889 printf("%s: %s\n", filename, fxp_error());
890 ret = 0;
891 }
892 ret = func(ctx, cname);
893 sfree(cname);
894 sfree(unwcfname);
895 }
896
897 return ret;
898}
899
900/*
901 * Handy helper function.
902 */
903int is_wildcard(char *name)
904{
905 char *unwcfname = snewn(strlen(name)+1, char);
906 int is_wc = !wc_unescape(unwcfname, name);
907 sfree(unwcfname);
908 return is_wc;
909}
910
5079ee6d 911/* ----------------------------------------------------------------------
93e86a8b 912 * Actual sftp commands.
913 */
914struct sftp_command {
915 char **words;
916 int nwords, wordssize;
917 int (*obey) (struct sftp_command *); /* returns <0 to quit */
918};
919
920int sftp_cmd_null(struct sftp_command *cmd)
921{
922 return 1; /* success */
923}
924
925int sftp_cmd_unknown(struct sftp_command *cmd)
926{
927 printf("psftp: unknown command \"%s\"\n", cmd->words[0]);
928 return 0; /* failure */
929}
930
931int sftp_cmd_quit(struct sftp_command *cmd)
932{
933 return -1;
934}
935
b614ce89 936int sftp_cmd_close(struct sftp_command *cmd)
937{
938 if (back == NULL) {
939 printf("psftp: not connected to a host; use \"open host.name\"\n");
940 return 0;
941 }
942
943 if (back != NULL && back->socket(backhandle) != NULL) {
944 char ch;
945 back->special(backhandle, TS_EOF);
946 sftp_recvdata(&ch, 1);
947 }
948 do_sftp_cleanup();
949
950 return 0;
951}
952
93e86a8b 953/*
954 * List a directory. If no arguments are given, list pwd; otherwise
955 * list the directory given in words[1].
956 */
957int sftp_cmd_ls(struct sftp_command *cmd)
958{
959 struct fxp_handle *dirh;
960 struct fxp_names *names;
961 struct fxp_name **ournames;
962 int nnames, namesize;
3394416c 963 char *dir, *cdir, *unwcdir, *wildcard;
93e86a8b 964 struct sftp_packet *pktin;
965 struct sftp_request *req, *rreq;
966 int i;
967
968 if (back == NULL) {
969 printf("psftp: not connected to a host; use \"open host.name\"\n");
970 return 0;
971 }
972
973 if (cmd->nwords < 2)
974 dir = ".";
975 else
976 dir = cmd->words[1];
977
3394416c 978 unwcdir = snewn(1 + strlen(dir), char);
979 if (wc_unescape(unwcdir, dir)) {
980 dir = unwcdir;
981 wildcard = NULL;
982 } else {
983 char *tmpdir;
984 int len, check;
985
986 wildcard = stripslashes(dir, 0);
987 unwcdir = dupstr(dir);
988 len = wildcard - dir;
989 unwcdir[len] = '\0';
990 if (len > 0 && unwcdir[len-1] == '/')
991 unwcdir[len-1] = '\0';
992 tmpdir = snewn(1 + len, char);
993 check = wc_unescape(tmpdir, unwcdir);
994 sfree(tmpdir);
995 if (!check) {
996 printf("Multiple-level wildcards are not supported\n");
997 sfree(unwcdir);
998 return 0;
999 }
1000 dir = unwcdir;
1001 }
1002
93e86a8b 1003 cdir = canonify(dir);
1004 if (!cdir) {
1005 printf("%s: %s\n", dir, fxp_error());
3394416c 1006 sfree(unwcdir);
93e86a8b 1007 return 0;
1008 }
1009
1010 printf("Listing directory %s\n", cdir);
1011
1012 sftp_register(req = fxp_opendir_send(cdir));
1013 rreq = sftp_find_request(pktin = sftp_recv());
1014 assert(rreq == req);
1015 dirh = fxp_opendir_recv(pktin, rreq);
1016
1017 if (dirh == NULL) {
1018 printf("Unable to open %s: %s\n", dir, fxp_error());
1019 } else {
1020 nnames = namesize = 0;
1021 ournames = NULL;
1022
1023 while (1) {
1024
1025 sftp_register(req = fxp_readdir_send(dirh));
1026 rreq = sftp_find_request(pktin = sftp_recv());
1027 assert(rreq == req);
1028 names = fxp_readdir_recv(pktin, rreq);
1029
1030 if (names == NULL) {
1031 if (fxp_error_type() == SSH_FX_EOF)
1032 break;
1033 printf("Reading directory %s: %s\n", dir, fxp_error());
1034 break;
1035 }
1036 if (names->nnames == 0) {
1037 fxp_free_names(names);
1038 break;
1039 }
1040
1041 if (nnames + names->nnames >= namesize) {
1042 namesize += names->nnames + 128;
1043 ournames = sresize(ournames, namesize, struct fxp_name *);
1044 }
1045
1046 for (i = 0; i < names->nnames; i++)
3394416c 1047 if (!wildcard || wc_match(wildcard, names->names[i].filename))
1048 ournames[nnames++] = fxp_dup_name(&names->names[i]);
93e86a8b 1049
1050 fxp_free_names(names);
1051 }
1052 sftp_register(req = fxp_close_send(dirh));
1053 rreq = sftp_find_request(pktin = sftp_recv());
1054 assert(rreq == req);
1055 fxp_close_recv(pktin, rreq);
1056
1057 /*
1058 * Now we have our filenames. Sort them by actual file
1059 * name, and then output the longname parts.
1060 */
1061 qsort(ournames, nnames, sizeof(*ournames), sftp_name_compare);
1062
1063 /*
1064 * And print them.
1065 */
1066 for (i = 0; i < nnames; i++) {
1067 printf("%s\n", ournames[i]->longname);
1068 fxp_free_name(ournames[i]);
1069 }
1070 sfree(ournames);
1071 }
1072
1073 sfree(cdir);
3394416c 1074 sfree(unwcdir);
93e86a8b 1075
1076 return 1;
1077}
1078
1079/*
1080 * Change directories. We do this by canonifying the new name, then
1081 * trying to OPENDIR it. Only if that succeeds do we set the new pwd.
1082 */
1083int sftp_cmd_cd(struct sftp_command *cmd)
1084{
1085 struct fxp_handle *dirh;
1086 struct sftp_packet *pktin;
1087 struct sftp_request *req, *rreq;
1088 char *dir;
1089
1090 if (back == NULL) {
1091 printf("psftp: not connected to a host; use \"open host.name\"\n");
1092 return 0;
1093 }
1094
1095 if (cmd->nwords < 2)
1096 dir = dupstr(homedir);
1097 else
1098 dir = canonify(cmd->words[1]);
1099
1100 if (!dir) {
1101 printf("%s: %s\n", dir, fxp_error());
1102 return 0;
1103 }
1104
1105 sftp_register(req = fxp_opendir_send(dir));
1106 rreq = sftp_find_request(pktin = sftp_recv());
1107 assert(rreq == req);
1108 dirh = fxp_opendir_recv(pktin, rreq);
1109
1110 if (!dirh) {
1111 printf("Directory %s: %s\n", dir, fxp_error());
1112 sfree(dir);
1113 return 0;
1114 }
1115
1116 sftp_register(req = fxp_close_send(dirh));
1117 rreq = sftp_find_request(pktin = sftp_recv());
1118 assert(rreq == req);
1119 fxp_close_recv(pktin, rreq);
1120
1121 sfree(pwd);
1122 pwd = dir;
1123 printf("Remote directory is now %s\n", pwd);
1124
1125 return 1;
1126}
1127
1128/*
1129 * Print current directory. Easy as pie.
1130 */
1131int sftp_cmd_pwd(struct sftp_command *cmd)
1132{
1133 if (back == NULL) {
1134 printf("psftp: not connected to a host; use \"open host.name\"\n");
1135 return 0;
1136 }
1137
1138 printf("Remote directory is %s\n", pwd);
1139 return 1;
1140}
1141
1142/*
9c77ddf6 1143 * Get a file and save it at the local end. We have three very
1144 * similar commands here. The basic one is `get'; `reget' differs
1145 * in that it checks for the existence of the destination file and
1146 * starts from where a previous aborted transfer left off; `mget'
1147 * differs in that it interprets all its arguments as files to
1148 * transfer (never as a different local name for a remote file) and
1149 * can handle wildcards.
93e86a8b 1150 */
9c77ddf6 1151int sftp_general_get(struct sftp_command *cmd, int restart, int multiple)
93e86a8b 1152{
5079ee6d 1153 char *fname, *unwcfname, *origfname, *origwfname, *outfname;
93e86a8b 1154 int i, ret;
1155 int recurse = FALSE;
1156
1157 if (back == NULL) {
1158 printf("psftp: not connected to a host; use \"open host.name\"\n");
1159 return 0;
1160 }
1161
1162 i = 1;
1163 while (i < cmd->nwords && cmd->words[i][0] == '-') {
1164 if (!strcmp(cmd->words[i], "--")) {
1165 /* finish processing options */
1166 i++;
1167 break;
1168 } else if (!strcmp(cmd->words[i], "-r")) {
1169 recurse = TRUE;
1170 } else {
9033711a 1171 printf("%s: unrecognised option '%s'\n", cmd->words[0], cmd->words[i]);
93e86a8b 1172 return 0;
1173 }
1174 i++;
1175 }
1176
1177 if (i >= cmd->nwords) {
9033711a 1178 printf("%s: expects a filename\n", cmd->words[0]);
93e86a8b 1179 return 0;
1180 }
1181
5079ee6d 1182 ret = 1;
9c77ddf6 1183 do {
5079ee6d 1184 SftpWildcardMatcher *swcm;
1185
9c77ddf6 1186 origfname = cmd->words[i++];
5079ee6d 1187 unwcfname = snewn(strlen(origfname)+1, char);
93e86a8b 1188
5079ee6d 1189 if (multiple && !wc_unescape(unwcfname, origfname)) {
1190 swcm = sftp_begin_wildcard_matching(origfname);
1191 if (!swcm) {
1192 sfree(unwcfname);
1193 continue;
1194 }
1195 origwfname = sftp_wildcard_get_filename(swcm);
1196 if (!origwfname) {
1197 /* Politely warn the user that nothing matched. */
1198 printf("%s: nothing matched\n", origfname);
1199 sftp_finish_wildcard_matching(swcm);
1200 sfree(unwcfname);
1201 continue;
1202 }
9c77ddf6 1203 } else {
5079ee6d 1204 origwfname = origfname;
1205 swcm = NULL;
1206 }
1207
1208 while (origwfname) {
1209 fname = canonify(origwfname);
1210
9c77ddf6 1211 if (!fname) {
5079ee6d 1212 printf("%s: %s\n", origwfname, fxp_error());
9c77ddf6 1213 sfree(unwcfname);
1214 return 0;
1215 }
93e86a8b 1216
9c77ddf6 1217 if (!multiple && i < cmd->nwords)
1218 outfname = cmd->words[i++];
1219 else
5079ee6d 1220 outfname = stripslashes(origwfname, 0);
93e86a8b 1221
5079ee6d 1222 ret = sftp_get_file(fname, outfname, recurse, restart);
9c77ddf6 1223
1224 sfree(fname);
5079ee6d 1225
1226 if (swcm) {
1227 sfree(origwfname);
1228 origwfname = sftp_wildcard_get_filename(swcm);
1229 } else {
1230 origwfname = NULL;
1231 }
9c77ddf6 1232 }
1233 sfree(unwcfname);
5079ee6d 1234 if (swcm)
1235 sftp_finish_wildcard_matching(swcm);
9c77ddf6 1236 if (!ret)
1237 return ret;
1238
1239 } while (multiple && i < cmd->nwords);
93e86a8b 1240
1241 return ret;
1242}
1243int sftp_cmd_get(struct sftp_command *cmd)
1244{
9c77ddf6 1245 return sftp_general_get(cmd, 0, 0);
1246}
1247int sftp_cmd_mget(struct sftp_command *cmd)
1248{
1249 return sftp_general_get(cmd, 0, 1);
93e86a8b 1250}
1251int sftp_cmd_reget(struct sftp_command *cmd)
1252{
9c77ddf6 1253 return sftp_general_get(cmd, 1, 0);
93e86a8b 1254}
1255
1256/*
9c77ddf6 1257 * Send a file and store it at the remote end. We have three very
1258 * similar commands here. The basic one is `put'; `reput' differs
1259 * in that it checks for the existence of the destination file and
1260 * starts from where a previous aborted transfer left off; `mput'
1261 * differs in that it interprets all its arguments as files to
1262 * transfer (never as a different remote name for a local file) and
1263 * can handle wildcards.
93e86a8b 1264 */
9c77ddf6 1265int sftp_general_put(struct sftp_command *cmd, int restart, int multiple)
93e86a8b 1266{
5079ee6d 1267 char *fname, *wfname, *origoutfname, *outfname;
93e86a8b 1268 int i, ret;
1269 int recurse = FALSE;
1270
1271 if (back == NULL) {
1272 printf("psftp: not connected to a host; use \"open host.name\"\n");
1273 return 0;
1274 }
1275
1276 i = 1;
1277 while (i < cmd->nwords && cmd->words[i][0] == '-') {
1278 if (!strcmp(cmd->words[i], "--")) {
1279 /* finish processing options */
1280 i++;
1281 break;
1282 } else if (!strcmp(cmd->words[i], "-r")) {
1283 recurse = TRUE;
1284 } else {
9033711a 1285 printf("%s: unrecognised option '%s'\n", cmd->words[0], cmd->words[i]);
93e86a8b 1286 return 0;
1287 }
1288 i++;
1289 }
1290
1291 if (i >= cmd->nwords) {
9033711a 1292 printf("%s: expects a filename\n", cmd->words[0]);
93e86a8b 1293 return 0;
1294 }
1295
5079ee6d 1296 ret = 1;
9c77ddf6 1297 do {
5079ee6d 1298 WildcardMatcher *wcm;
9c77ddf6 1299 fname = cmd->words[i++];
93e86a8b 1300
9c77ddf6 1301 if (multiple && test_wildcard(fname, FALSE) == WCTYPE_WILDCARD) {
5079ee6d 1302 wcm = begin_wildcard_matching(fname);
1303 wfname = wildcard_get_filename(wcm);
1304 if (!wfname) {
1305 /* Politely warn the user that nothing matched. */
1306 printf("%s: nothing matched\n", fname);
1307 finish_wildcard_matching(wcm);
1308 continue;
1309 }
9c77ddf6 1310 } else {
5079ee6d 1311 wfname = fname;
1312 wcm = NULL;
1313 }
1314
1315 while (wfname) {
9c77ddf6 1316 if (!multiple && i < cmd->nwords)
1317 origoutfname = cmd->words[i++];
1318 else
5079ee6d 1319 origoutfname = stripslashes(wfname, 1);
9c77ddf6 1320
1321 outfname = canonify(origoutfname);
1322 if (!outfname) {
1323 printf("%s: %s\n", origoutfname, fxp_error());
5079ee6d 1324 if (wcm) {
1325 sfree(wfname);
1326 finish_wildcard_matching(wcm);
1327 }
9c77ddf6 1328 return 0;
1329 }
5079ee6d 1330 ret = sftp_put_file(wfname, outfname, recurse, restart);
9c77ddf6 1331 sfree(outfname);
5079ee6d 1332
1333 if (wcm) {
1334 sfree(wfname);
1335 wfname = wildcard_get_filename(wcm);
1336 } else {
1337 wfname = NULL;
1338 }
9c77ddf6 1339 }
5079ee6d 1340
1341 if (wcm)
1342 finish_wildcard_matching(wcm);
1343
9c77ddf6 1344 if (!ret)
1345 return ret;
93e86a8b 1346
9c77ddf6 1347 } while (multiple && i < cmd->nwords);
4c7f0d61 1348
df49ff19 1349 return ret;
4c7f0d61 1350}
d92624dc 1351int sftp_cmd_put(struct sftp_command *cmd)
1352{
9c77ddf6 1353 return sftp_general_put(cmd, 0, 0);
1354}
1355int sftp_cmd_mput(struct sftp_command *cmd)
1356{
1357 return sftp_general_put(cmd, 0, 1);
d92624dc 1358}
1359int sftp_cmd_reput(struct sftp_command *cmd)
1360{
9c77ddf6 1361 return sftp_general_put(cmd, 1, 0);
d92624dc 1362}
4c7f0d61 1363
9954aaa3 1364int sftp_cmd_mkdir(struct sftp_command *cmd)
1365{
1366 char *dir;
1bc24185 1367 struct sftp_packet *pktin;
1368 struct sftp_request *req, *rreq;
9954aaa3 1369 int result;
83567e43 1370 int i, ret;
9954aaa3 1371
fa3db767 1372 if (back == NULL) {
1373 printf("psftp: not connected to a host; use \"open host.name\"\n");
1374 return 0;
1375 }
9954aaa3 1376
1377 if (cmd->nwords < 2) {
1378 printf("mkdir: expects a directory\n");
1379 return 0;
1380 }
1381
83567e43 1382 ret = 1;
1383 for (i = 1; i < cmd->nwords; i++) {
1384 dir = canonify(cmd->words[i]);
1385 if (!dir) {
1386 printf("%s: %s\n", dir, fxp_error());
1387 return 0;
1388 }
1389
1390 sftp_register(req = fxp_mkdir_send(dir));
1391 rreq = sftp_find_request(pktin = sftp_recv());
1392 assert(rreq == req);
1393 result = fxp_mkdir_recv(pktin, rreq);
1394
1395 if (!result) {
1396 printf("mkdir %s: %s\n", dir, fxp_error());
1397 sfree(dir);
1398 ret = 0;
1399 }
1400
1401 sfree(dir);
9954aaa3 1402 }
1403
83567e43 1404 return ret;
1405}
1406
1407static int sftp_action_rmdir(void *vctx, char *dir)
1408{
1409 struct sftp_packet *pktin;
1410 struct sftp_request *req, *rreq;
1411 int result;
1412
1413 sftp_register(req = fxp_rmdir_send(dir));
1bc24185 1414 rreq = sftp_find_request(pktin = sftp_recv());
1415 assert(rreq == req);
83567e43 1416 result = fxp_rmdir_recv(pktin, rreq);
1bc24185 1417
9954aaa3 1418 if (!result) {
83567e43 1419 printf("rmdir %s: %s\n", dir, fxp_error());
9954aaa3 1420 return 0;
1421 }
1422
df49ff19 1423 return 1;
9954aaa3 1424}
1425
1426int sftp_cmd_rmdir(struct sftp_command *cmd)
1427{
83567e43 1428 int i, ret;
9954aaa3 1429
fa3db767 1430 if (back == NULL) {
1431 printf("psftp: not connected to a host; use \"open host.name\"\n");
1432 return 0;
1433 }
9954aaa3 1434
1435 if (cmd->nwords < 2) {
1436 printf("rmdir: expects a directory\n");
1437 return 0;
1438 }
1439
83567e43 1440 ret = 1;
1441 for (i = 1; i < cmd->nwords; i++)
1442 ret &= wildcard_iterate(cmd->words[i], sftp_action_rmdir, NULL);
9954aaa3 1443
83567e43 1444 return ret;
1445}
1446
1447static int sftp_action_rm(void *vctx, char *fname)
1448{
1449 struct sftp_packet *pktin;
1450 struct sftp_request *req, *rreq;
1451 int result;
1452
1453 sftp_register(req = fxp_remove_send(fname));
1bc24185 1454 rreq = sftp_find_request(pktin = sftp_recv());
1455 assert(rreq == req);
83567e43 1456 result = fxp_remove_recv(pktin, rreq);
1bc24185 1457
9954aaa3 1458 if (!result) {
83567e43 1459 printf("rm %s: %s\n", fname, fxp_error());
9954aaa3 1460 return 0;
1461 }
1462
df49ff19 1463 return 1;
9954aaa3 1464}
1465
1466int sftp_cmd_rm(struct sftp_command *cmd)
1467{
83567e43 1468 int i, ret;
9954aaa3 1469
fa3db767 1470 if (back == NULL) {
1471 printf("psftp: not connected to a host; use \"open host.name\"\n");
1472 return 0;
1473 }
1474
9954aaa3 1475 if (cmd->nwords < 2) {
1476 printf("rm: expects a filename\n");
1477 return 0;
1478 }
1479
83567e43 1480 ret = 1;
1481 for (i = 1; i < cmd->nwords; i++)
1482 ret &= wildcard_iterate(cmd->words[i], sftp_action_rm, NULL);
1483
1484 return ret;
1485}
1486
1487static int check_is_dir(char *dstfname)
1488{
1489 struct sftp_packet *pktin;
1490 struct sftp_request *req, *rreq;
1491 struct fxp_attrs attrs;
1492 int result;
1493
1494 sftp_register(req = fxp_stat_send(dstfname));
1495 rreq = sftp_find_request(pktin = sftp_recv());
1496 assert(rreq == req);
1497 result = fxp_stat_recv(pktin, rreq, &attrs);
1498
1499 if (result &&
1500 (attrs.flags & SSH_FILEXFER_ATTR_PERMISSIONS) &&
1501 (attrs.permissions & 0040000))
1502 return TRUE;
1503 else
1504 return FALSE;
1505}
1506
1507struct sftp_context_mv {
1508 char *dstfname;
1509 int dest_is_dir;
1510};
1511
1512static int sftp_action_mv(void *vctx, char *srcfname)
1513{
1514 struct sftp_context_mv *ctx = (struct sftp_context_mv *)vctx;
1515 struct sftp_packet *pktin;
1516 struct sftp_request *req, *rreq;
1517 const char *error;
1518 char *finalfname, *newcanon = NULL;
1519 int ret, result;
1520
1521 if (ctx->dest_is_dir) {
1522 char *p;
1523 char *newname;
1524
1525 p = srcfname + strlen(srcfname);
1526 while (p > srcfname && p[-1] != '/') p--;
1527 newname = dupcat(ctx->dstfname, "/", p, NULL);
1528 newcanon = canonify(newname);
1529 if (!newcanon) {
1530 printf("%s: %s\n", newname, fxp_error());
1531 sfree(newname);
1532 return 0;
1533 }
1534 sfree(newname);
1535
1536 finalfname = newcanon;
1537 } else {
1538 finalfname = ctx->dstfname;
9954aaa3 1539 }
1540
83567e43 1541 sftp_register(req = fxp_rename_send(srcfname, finalfname));
1bc24185 1542 rreq = sftp_find_request(pktin = sftp_recv());
1543 assert(rreq == req);
83567e43 1544 result = fxp_rename_recv(pktin, rreq);
1bc24185 1545
83567e43 1546 error = result ? NULL : fxp_error();
1547
1548 if (error) {
1549 printf("mv %s %s: %s\n", srcfname, finalfname, error);
1550 ret = 0;
1551 } else {
1552 printf("%s -> %s\n", srcfname, finalfname);
1553 ret = 1;
9954aaa3 1554 }
1555
83567e43 1556 sfree(newcanon);
1557 return ret;
d92624dc 1558}
1559
1560int sftp_cmd_mv(struct sftp_command *cmd)
1561{
83567e43 1562 struct sftp_context_mv actx, *ctx = &actx;
1563 int i, ret;
d92624dc 1564
fa3db767 1565 if (back == NULL) {
1566 printf("psftp: not connected to a host; use \"open host.name\"\n");
1567 return 0;
1568 }
1569
d92624dc 1570 if (cmd->nwords < 3) {
1571 printf("mv: expects two filenames\n");
9954aaa3 1572 return 0;
d92624dc 1573 }
83567e43 1574
1575 ctx->dstfname = canonify(cmd->words[cmd->nwords-1]);
1576 if (!ctx->dstfname) {
1577 printf("%s: %s\n", ctx->dstfname, fxp_error());
d92624dc 1578 return 0;
1579 }
1580
83567e43 1581 /*
1582 * If there's more than one source argument, or one source
1583 * argument which is a wildcard, we _require_ that the
1584 * destination is a directory.
1585 */
1586 ctx->dest_is_dir = check_is_dir(ctx->dstfname);
1587 if ((cmd->nwords > 3 || is_wildcard(cmd->words[1])) && !ctx->dest_is_dir) {
1588 printf("mv: multiple or wildcard arguments require the destination"
1589 " to be a directory\n");
c4acc08c 1590 sfree(ctx->dstfname);
d92624dc 1591 return 0;
1592 }
9954aaa3 1593
83567e43 1594 /*
1595 * Now iterate over the source arguments.
1596 */
1597 ret = 1;
1598 for (i = 1; i < cmd->nwords-1; i++)
1599 ret &= wildcard_iterate(cmd->words[i], sftp_action_mv, ctx);
1600
c4acc08c 1601 sfree(ctx->dstfname);
83567e43 1602 return ret;
1603}
1604
1605struct sftp_context_chmod {
1606 unsigned attrs_clr, attrs_xor;
1607};
1608
1609static int sftp_action_chmod(void *vctx, char *fname)
1610{
1611 struct fxp_attrs attrs;
1612 struct sftp_packet *pktin;
1613 struct sftp_request *req, *rreq;
1614 int result;
1615 unsigned oldperms, newperms;
1616 struct sftp_context_chmod *ctx = (struct sftp_context_chmod *)vctx;
1617
1618 sftp_register(req = fxp_stat_send(fname));
1bc24185 1619 rreq = sftp_find_request(pktin = sftp_recv());
1620 assert(rreq == req);
83567e43 1621 result = fxp_stat_recv(pktin, rreq, &attrs);
1bc24185 1622
83567e43 1623 if (!result || !(attrs.flags & SSH_FILEXFER_ATTR_PERMISSIONS)) {
1624 printf("get attrs for %s: %s\n", fname,
1625 result ? "file permissions not provided" : fxp_error());
83567e43 1626 return 0;
1627 }
d92624dc 1628
83567e43 1629 attrs.flags = SSH_FILEXFER_ATTR_PERMISSIONS; /* perms _only_ */
1630 oldperms = attrs.permissions & 07777;
1631 attrs.permissions &= ~ctx->attrs_clr;
1632 attrs.permissions ^= ctx->attrs_xor;
1633 newperms = attrs.permissions & 07777;
1bc24185 1634
83567e43 1635 if (oldperms == newperms)
1636 return 1; /* no need to do anything! */
1bc24185 1637
83567e43 1638 sftp_register(req = fxp_setstat_send(fname, attrs));
1639 rreq = sftp_find_request(pktin = sftp_recv());
1640 assert(rreq == req);
1641 result = fxp_setstat_recv(pktin, rreq);
1bc24185 1642
83567e43 1643 if (!result) {
1644 printf("set attrs for %s: %s\n", fname, fxp_error());
83567e43 1645 return 0;
d92624dc 1646 }
d92624dc 1647
83567e43 1648 printf("%s: %04o -> %04o\n", fname, oldperms, newperms);
1649
df49ff19 1650 return 1;
9954aaa3 1651}
1652
d92624dc 1653int sftp_cmd_chmod(struct sftp_command *cmd)
1654{
83567e43 1655 char *mode;
1656 int i, ret;
1657 struct sftp_context_chmod actx, *ctx = &actx;
d92624dc 1658
fa3db767 1659 if (back == NULL) {
1660 printf("psftp: not connected to a host; use \"open host.name\"\n");
1661 return 0;
1662 }
1663
d92624dc 1664 if (cmd->nwords < 3) {
1665 printf("chmod: expects a mode specifier and a filename\n");
1666 return 0;
1667 }
1668
1669 /*
1670 * Attempt to parse the mode specifier in cmd->words[1]. We
1671 * don't support the full horror of Unix chmod; instead we
1672 * support a much simpler syntax in which the user can either
1673 * specify an octal number, or a comma-separated sequence of
1674 * [ugoa]*[-+=][rwxst]+. (The initial [ugoa] sequence may
1675 * _only_ be omitted if the only attribute mentioned is t,
1676 * since all others require a user/group/other specification.
1677 * Additionally, the s attribute may not be specified for any
1678 * [ugoa] specifications other than exactly u or exactly g.
1679 */
83567e43 1680 ctx->attrs_clr = ctx->attrs_xor = 0;
d92624dc 1681 mode = cmd->words[1];
1682 if (mode[0] >= '0' && mode[0] <= '9') {
1683 if (mode[strspn(mode, "01234567")]) {
1684 printf("chmod: numeric file modes should"
1685 " contain digits 0-7 only\n");
1686 return 0;
1687 }
83567e43 1688 ctx->attrs_clr = 07777;
1689 sscanf(mode, "%o", &ctx->attrs_xor);
1690 ctx->attrs_xor &= ctx->attrs_clr;
d92624dc 1691 } else {
1692 while (*mode) {
1693 char *modebegin = mode;
1694 unsigned subset, perms;
1695 int action;
1696
1697 subset = 0;
1698 while (*mode && *mode != ',' &&
1699 *mode != '+' && *mode != '-' && *mode != '=') {
1700 switch (*mode) {
1701 case 'u': subset |= 04700; break; /* setuid, user perms */
1702 case 'g': subset |= 02070; break; /* setgid, group perms */
1703 case 'o': subset |= 00007; break; /* just other perms */
1704 case 'a': subset |= 06777; break; /* all of the above */
1705 default:
1706 printf("chmod: file mode '%.*s' contains unrecognised"
1707 " user/group/other specifier '%c'\n",
b51259f6 1708 (int)strcspn(modebegin, ","), modebegin, *mode);
d92624dc 1709 return 0;
1710 }
1711 mode++;
1712 }
1713 if (!*mode || *mode == ',') {
1714 printf("chmod: file mode '%.*s' is incomplete\n",
b51259f6 1715 (int)strcspn(modebegin, ","), modebegin);
d92624dc 1716 return 0;
1717 }
1718 action = *mode++;
1719 if (!*mode || *mode == ',') {
1720 printf("chmod: file mode '%.*s' is incomplete\n",
b51259f6 1721 (int)strcspn(modebegin, ","), modebegin);
d92624dc 1722 return 0;
1723 }
1724 perms = 0;
1725 while (*mode && *mode != ',') {
1726 switch (*mode) {
1727 case 'r': perms |= 00444; break;
1728 case 'w': perms |= 00222; break;
1729 case 'x': perms |= 00111; break;
1730 case 't': perms |= 01000; subset |= 01000; break;
1731 case 's':
1732 if ((subset & 06777) != 04700 &&
1733 (subset & 06777) != 02070) {
1734 printf("chmod: file mode '%.*s': set[ug]id bit should"
1735 " be used with exactly one of u or g only\n",
b51259f6 1736 (int)strcspn(modebegin, ","), modebegin);
d92624dc 1737 return 0;
1738 }
1739 perms |= 06000;
1740 break;
1741 default:
1742 printf("chmod: file mode '%.*s' contains unrecognised"
1743 " permission specifier '%c'\n",
b51259f6 1744 (int)strcspn(modebegin, ","), modebegin, *mode);
d92624dc 1745 return 0;
1746 }
1747 mode++;
1748 }
1749 if (!(subset & 06777) && (perms &~ subset)) {
1750 printf("chmod: file mode '%.*s' contains no user/group/other"
1751 " specifier and permissions other than 't' \n",
b51259f6 1752 (int)strcspn(modebegin, ","), modebegin);
d92624dc 1753 return 0;
1754 }
1755 perms &= subset;
1756 switch (action) {
1757 case '+':
83567e43 1758 ctx->attrs_clr |= perms;
1759 ctx->attrs_xor |= perms;
d92624dc 1760 break;
1761 case '-':
83567e43 1762 ctx->attrs_clr |= perms;
1763 ctx->attrs_xor &= ~perms;
d92624dc 1764 break;
1765 case '=':
83567e43 1766 ctx->attrs_clr |= subset;
1767 ctx->attrs_xor |= perms;
d92624dc 1768 break;
1769 }
1770 if (*mode) mode++; /* eat comma */
1771 }
1772 }
1773
83567e43 1774 ret = 1;
1775 for (i = 2; i < cmd->nwords; i++)
1776 ret &= wildcard_iterate(cmd->words[i], sftp_action_chmod, ctx);
d92624dc 1777
83567e43 1778 return ret;
d92624dc 1779}
9954aaa3 1780
fa3db767 1781static int sftp_cmd_open(struct sftp_command *cmd)
1782{
f11233cb 1783 int portnumber;
1784
fa3db767 1785 if (back != NULL) {
1786 printf("psftp: already connected\n");
1787 return 0;
1788 }
1789
1790 if (cmd->nwords < 2) {
1791 printf("open: expects a host name\n");
1792 return 0;
1793 }
1794
f11233cb 1795 if (cmd->nwords > 2) {
1796 portnumber = atoi(cmd->words[2]);
1797 if (portnumber == 0) {
1798 printf("open: invalid port number\n");
1799 return 0;
1800 }
1801 } else
1802 portnumber = 0;
1803
1804 if (psftp_connect(cmd->words[1], NULL, portnumber)) {
fa3db767 1805 back = NULL; /* connection is already closed */
1806 return -1; /* this is fatal */
1807 }
1808 do_sftp_init();
df49ff19 1809 return 1;
fa3db767 1810}
1811
3af97463 1812static int sftp_cmd_lcd(struct sftp_command *cmd)
1813{
d6cc41e6 1814 char *currdir, *errmsg;
3af97463 1815
1816 if (cmd->nwords < 2) {
1817 printf("lcd: expects a local directory name\n");
1818 return 0;
1819 }
1820
d6cc41e6 1821 errmsg = psftp_lcd(cmd->words[1]);
1822 if (errmsg) {
1823 printf("lcd: unable to change directory: %s\n", errmsg);
1824 sfree(errmsg);
3af97463 1825 return 0;
1826 }
1827
d6cc41e6 1828 currdir = psftp_getcwd();
3af97463 1829 printf("New local directory is %s\n", currdir);
1830 sfree(currdir);
1831
1832 return 1;
1833}
1834
1835static int sftp_cmd_lpwd(struct sftp_command *cmd)
1836{
1837 char *currdir;
3af97463 1838
d6cc41e6 1839 currdir = psftp_getcwd();
3af97463 1840 printf("Current local directory is %s\n", currdir);
1841 sfree(currdir);
1842
1843 return 1;
1844}
1845
1846static int sftp_cmd_pling(struct sftp_command *cmd)
1847{
1848 int exitcode;
1849
1850 exitcode = system(cmd->words[1]);
1851 return (exitcode == 0);
1852}
1853
bf5240cd 1854static int sftp_cmd_help(struct sftp_command *cmd);
1855
4c7f0d61 1856static struct sftp_cmd_lookup {
1857 char *name;
bf5240cd 1858 /*
1859 * For help purposes, there are two kinds of command:
1860 *
1861 * - primary commands, in which `longhelp' is non-NULL. In
1862 * this case `shorthelp' is descriptive text, and `longhelp'
1863 * is longer descriptive text intended to be printed after
1864 * the command name.
1865 *
1866 * - alias commands, in which `longhelp' is NULL. In this case
1867 * `shorthelp' is the name of a primary command, which
1868 * contains the help that should double up for this command.
1869 */
3af97463 1870 int listed; /* do we list this in primary help? */
bf5240cd 1871 char *shorthelp;
1872 char *longhelp;
32874aea 1873 int (*obey) (struct sftp_command *);
4c7f0d61 1874} sftp_lookup[] = {
1875 /*
1876 * List of sftp commands. This is binary-searched so it MUST be
1877 * in ASCII order.
1878 */
32874aea 1879 {
d6cc41e6 1880 "!", TRUE, "run a local command",
3af97463 1881 "<command>\n"
d6cc41e6 1882 /* FIXME: this example is crap for non-Windows. */
1883 " Runs a local command. For example, \"!del myfile\".\n",
3af97463 1884 sftp_cmd_pling
1885 },
1886 {
1887 "bye", TRUE, "finish your SFTP session",
bf5240cd 1888 "\n"
1889 " Terminates your SFTP session and quits the PSFTP program.\n",
1890 sftp_cmd_quit
1891 },
1892 {
3af97463 1893 "cd", TRUE, "change your remote working directory",
bf5240cd 1894 " [ <New working directory> ]\n"
1895 " Change the remote working directory for your SFTP session.\n"
1896 " If a new working directory is not supplied, you will be\n"
1897 " returned to your home directory.\n",
1898 sftp_cmd_cd
1899 },
1900 {
3af97463 1901 "chmod", TRUE, "change file permissions and modes",
bf5240cd 1902 " ( <octal-digits> | <modifiers> ) <filename>\n"
1903 " Change the file permissions on a file or directory.\n"
1904 " <octal-digits> can be any octal Unix permission specifier.\n"
1905 " Alternatively, <modifiers> can include:\n"
1906 " u+r make file readable by owning user\n"
1907 " u+w make file writable by owning user\n"
1908 " u+x make file executable by owning user\n"
1909 " u-r make file not readable by owning user\n"
1910 " [also u-w, u-x]\n"
1911 " g+r make file readable by members of owning group\n"
1912 " [also g+w, g+x, g-r, g-w, g-x]\n"
1913 " o+r make file readable by all other users\n"
1914 " [also o+w, o+x, o-r, o-w, o-x]\n"
1915 " a+r make file readable by absolutely everybody\n"
1916 " [also a+w, a+x, a-r, a-w, a-x]\n"
1917 " u+s enable the Unix set-user-ID bit\n"
1918 " u-s disable the Unix set-user-ID bit\n"
1919 " g+s enable the Unix set-group-ID bit\n"
1920 " g-s disable the Unix set-group-ID bit\n"
1921 " +t enable the Unix \"sticky bit\"\n"
1922 " You can give more than one modifier for the same user (\"g-rwx\"), and\n"
1923 " more than one user for the same modifier (\"ug+w\"). You can\n"
1924 " use commas to separate different modifiers (\"u+rwx,g+s\").\n",
1925 sftp_cmd_chmod
1926 },
1927 {
b614ce89 1928 "close", TRUE, "finish your SFTP session but do not quit PSFTP",
1929 "\n"
1930 " Terminates your SFTP session, but does not quit the PSFTP\n"
1931 " program. You can then use \"open\" to start another SFTP\n"
1932 " session, to the same server or to a different one.\n",
1933 sftp_cmd_close
1934 },
1935 {
3af97463 1936 "del", TRUE, "delete a file",
bf5240cd 1937 " <filename>\n"
1938 " Delete a file.\n",
1939 sftp_cmd_rm
1940 },
1941 {
3af97463 1942 "delete", FALSE, "del", NULL, sftp_cmd_rm
bf5240cd 1943 },
1944 {
3af97463 1945 "dir", TRUE, "list contents of a remote directory",
9033711a 1946 " [ <directory-name> ]/[ <wildcard> ]\n"
bf5240cd 1947 " List the contents of a specified directory on the server.\n"
1948 " If <directory-name> is not given, the current working directory\n"
9033711a 1949 " is assumed.\n"
1950 " If <wildcard> is given, it is treated as a set of files to\n"
1951 " list; otherwise, all files are listed.\n",
bf5240cd 1952 sftp_cmd_ls
1953 },
1954 {
3af97463 1955 "exit", TRUE, "bye", NULL, sftp_cmd_quit
bf5240cd 1956 },
1957 {
3af97463 1958 "get", TRUE, "download a file from the server to your local machine",
9033711a 1959 " [ -r ] [ -- ] <filename> [ <local-filename> ]\n"
bf5240cd 1960 " Downloads a file on the server and stores it locally under\n"
1961 " the same name, or under a different one if you supply the\n"
9033711a 1962 " argument <local-filename>.\n"
1963 " If -r specified, recursively fetch a directory.\n",
bf5240cd 1964 sftp_cmd_get
1965 },
1966 {
3af97463 1967 "help", TRUE, "give help",
bf5240cd 1968 " [ <command> [ <command> ... ] ]\n"
1969 " Give general help if no commands are specified.\n"
1970 " If one or more commands are specified, give specific help on\n"
1971 " those particular commands.\n",
1972 sftp_cmd_help
1973 },
1974 {
3af97463 1975 "lcd", TRUE, "change local working directory",
1976 " <local-directory-name>\n"
1977 " Change the local working directory of the PSFTP program (the\n"
1978 " default location where the \"get\" command will save files).\n",
1979 sftp_cmd_lcd
1980 },
1981 {
1982 "lpwd", TRUE, "print local working directory",
1983 "\n"
1984 " Print the local working directory of the PSFTP program (the\n"
1985 " default location where the \"get\" command will save files).\n",
1986 sftp_cmd_lpwd
1987 },
1988 {
1989 "ls", TRUE, "dir", NULL,
bf5240cd 1990 sftp_cmd_ls
1991 },
1992 {
9c77ddf6 1993 "mget", TRUE, "download multiple files at once",
9033711a 1994 " [ -r ] [ -- ] <filename-or-wildcard> [ <filename-or-wildcard>... ]\n"
9c77ddf6 1995 " Downloads many files from the server, storing each one under\n"
1996 " the same name it has on the server side. You can use wildcards\n"
9033711a 1997 " such as \"*.c\" to specify lots of files at once.\n"
1998 " If -r specified, recursively fetch files and directories.\n",
9c77ddf6 1999 sftp_cmd_mget
2000 },
2001 {
3af97463 2002 "mkdir", TRUE, "create a directory on the remote server",
bf5240cd 2003 " <directory-name>\n"
2004 " Creates a directory with the given name on the server.\n",
2005 sftp_cmd_mkdir
2006 },
2007 {
9c77ddf6 2008 "mput", TRUE, "upload multiple files at once",
96515f61 2009 " [ -r ] [ -- ] <filename-or-wildcard> [ <filename-or-wildcard>... ]\n"
9c77ddf6 2010 " Uploads many files to the server, storing each one under the\n"
2011 " same name it has on the client side. You can use wildcards\n"
9033711a 2012 " such as \"*.c\" to specify lots of files at once.\n"
2013 " If -r specified, recursively store files and directories.\n",
9c77ddf6 2014 sftp_cmd_mput
2015 },
2016 {
3af97463 2017 "mv", TRUE, "move or rename a file on the remote server",
bf5240cd 2018 " <source-filename> <destination-filename>\n"
2019 " Moves or renames the file <source-filename> on the server,\n"
2020 " so that it is accessible under the name <destination-filename>.\n",
2021 sftp_cmd_mv
2022 },
2023 {
3af97463 2024 "open", TRUE, "connect to a host",
f11233cb 2025 " [<user>@]<hostname> [<port>]\n"
fa3db767 2026 " Establishes an SFTP connection to a given host. Only usable\n"
2027 " when you did not already specify a host name on the command\n"
2028 " line.\n",
2029 sftp_cmd_open
2030 },
2031 {
56542985 2032 "put", TRUE, "upload a file from your local machine to the server",
9033711a 2033 " [ -r ] [ -- ] <filename> [ <remote-filename> ]\n"
56542985 2034 " Uploads a file to the server and stores it there under\n"
2035 " the same name, or under a different one if you supply the\n"
9033711a 2036 " argument <remote-filename>.\n"
2037 " If -r specified, recursively store a directory.\n",
56542985 2038 sftp_cmd_put
2039 },
2040 {
3af97463 2041 "pwd", TRUE, "print your remote working directory",
4f2b387f 2042 "\n"
2043 " Print the current remote working directory for your SFTP session.\n",
2044 sftp_cmd_pwd
2045 },
2046 {
3af97463 2047 "quit", TRUE, "bye", NULL,
bf5240cd 2048 sftp_cmd_quit
2049 },
2050 {
3af97463 2051 "reget", TRUE, "continue downloading a file",
9033711a 2052 " [ -r ] [ -- ] <filename> [ <local-filename> ]\n"
bf5240cd 2053 " Works exactly like the \"get\" command, but the local file\n"
2054 " must already exist. The download will begin at the end of the\n"
9033711a 2055 " file. This is for resuming a download that was interrupted.\n"
2056 " If -r specified, resume interrupted \"get -r\".\n",
bf5240cd 2057 sftp_cmd_reget
2058 },
2059 {
3af97463 2060 "ren", TRUE, "mv", NULL,
bf5240cd 2061 sftp_cmd_mv
2062 },
2063 {
3af97463 2064 "rename", FALSE, "mv", NULL,
bf5240cd 2065 sftp_cmd_mv
2066 },
2067 {
3af97463 2068 "reput", TRUE, "continue uploading a file",
9033711a 2069 " [ -r ] [ -- ] <filename> [ <remote-filename> ]\n"
bf5240cd 2070 " Works exactly like the \"put\" command, but the remote file\n"
2071 " must already exist. The upload will begin at the end of the\n"
9033711a 2072 " file. This is for resuming an upload that was interrupted.\n"
2073 " If -r specified, resume interrupted \"put -r\".\n",
bf5240cd 2074 sftp_cmd_reput
2075 },
2076 {
3af97463 2077 "rm", TRUE, "del", NULL,
bf5240cd 2078 sftp_cmd_rm
2079 },
2080 {
3af97463 2081 "rmdir", TRUE, "remove a directory on the remote server",
bf5240cd 2082 " <directory-name>\n"
2083 " Removes the directory with the given name on the server.\n"
2084 " The directory will not be removed unless it is empty.\n",
2085 sftp_cmd_rmdir
2086 }
2087};
2088
2089const struct sftp_cmd_lookup *lookup_command(char *name)
2090{
2091 int i, j, k, cmp;
2092
2093 i = -1;
2094 j = sizeof(sftp_lookup) / sizeof(*sftp_lookup);
2095 while (j - i > 1) {
2096 k = (j + i) / 2;
2097 cmp = strcmp(name, sftp_lookup[k].name);
2098 if (cmp < 0)
2099 j = k;
2100 else if (cmp > 0)
2101 i = k;
2102 else {
2103 return &sftp_lookup[k];
2104 }
2105 }
2106 return NULL;
2107}
2108
2109static int sftp_cmd_help(struct sftp_command *cmd)
2110{
2111 int i;
2112 if (cmd->nwords == 1) {
2113 /*
2114 * Give short help on each command.
2115 */
2116 int maxlen;
2117 maxlen = 0;
2118 for (i = 0; i < sizeof(sftp_lookup) / sizeof(*sftp_lookup); i++) {
3af97463 2119 int len;
2120 if (!sftp_lookup[i].listed)
2121 continue;
2122 len = strlen(sftp_lookup[i].name);
bf5240cd 2123 if (maxlen < len)
2124 maxlen = len;
2125 }
2126 for (i = 0; i < sizeof(sftp_lookup) / sizeof(*sftp_lookup); i++) {
2127 const struct sftp_cmd_lookup *lookup;
3af97463 2128 if (!sftp_lookup[i].listed)
2129 continue;
bf5240cd 2130 lookup = &sftp_lookup[i];
2131 printf("%-*s", maxlen+2, lookup->name);
2132 if (lookup->longhelp == NULL)
2133 lookup = lookup_command(lookup->shorthelp);
2134 printf("%s\n", lookup->shorthelp);
2135 }
2136 } else {
2137 /*
2138 * Give long help on specific commands.
2139 */
2140 for (i = 1; i < cmd->nwords; i++) {
2141 const struct sftp_cmd_lookup *lookup;
2142 lookup = lookup_command(cmd->words[i]);
2143 if (!lookup) {
2144 printf("help: %s: command not found\n", cmd->words[i]);
2145 } else {
2146 printf("%s", lookup->name);
2147 if (lookup->longhelp == NULL)
2148 lookup = lookup_command(lookup->shorthelp);
2149 printf("%s", lookup->longhelp);
2150 }
2151 }
2152 }
df49ff19 2153 return 1;
bf5240cd 2154}
4c7f0d61 2155
2156/* ----------------------------------------------------------------------
2157 * Command line reading and parsing.
2158 */
9954aaa3 2159struct sftp_command *sftp_getcmd(FILE *fp, int mode, int modeflags)
32874aea 2160{
4c7f0d61 2161 char *line;
4c7f0d61 2162 struct sftp_command *cmd;
2163 char *p, *q, *r;
2164 int quoting;
2165
3d88e64d 2166 cmd = snew(struct sftp_command);
4c7f0d61 2167 cmd->words = NULL;
2168 cmd->nwords = 0;
2169 cmd->wordssize = 0;
2170
2171 line = NULL;
39934deb 2172
2173 if (fp) {
2174 if (modeflags & 1)
2175 printf("psftp> ");
2176 line = fgetline(fp);
2177 } else {
65857773 2178 line = ssh_sftp_get_cmdline("psftp> ", back == NULL);
4c7f0d61 2179 }
39934deb 2180
2181 if (!line || !*line) {
2182 cmd->obey = sftp_cmd_quit;
2183 if ((mode == 0) || (modeflags & 1))
2184 printf("quit\n");
2185 return cmd; /* eof */
2186 }
2187
2188 line[strcspn(line, "\r\n")] = '\0';
2189
df49ff19 2190 if (modeflags & 1) {
2191 printf("%s\n", line);
2192 }
4c7f0d61 2193
4c7f0d61 2194 p = line;
3af97463 2195 while (*p && (*p == ' ' || *p == '\t'))
2196 p++;
2197
2198 if (*p == '!') {
2199 /*
2200 * Special case: the ! command. This is always parsed as
2201 * exactly two words: one containing the !, and the second
2202 * containing everything else on the line.
2203 */
2204 cmd->nwords = cmd->wordssize = 2;
3d88e64d 2205 cmd->words = sresize(cmd->words, cmd->wordssize, char *);
679539d7 2206 cmd->words[0] = dupstr("!");
2207 cmd->words[1] = dupstr(p+1);
3af97463 2208 } else {
2209
2210 /*
2211 * Parse the command line into words. The syntax is:
2212 * - double quotes are removed, but cause spaces within to be
2213 * treated as non-separating.
2214 * - a double-doublequote pair is a literal double quote, inside
2215 * _or_ outside quotes. Like this:
2216 *
2217 * firstword "second word" "this has ""quotes"" in" and""this""
2218 *
2219 * becomes
2220 *
2221 * >firstword<
2222 * >second word<
2223 * >this has "quotes" in<
2224 * >and"this"<
2225 */
4c7f0d61 2226 while (*p) {
3af97463 2227 /* skip whitespace */
2228 while (*p && (*p == ' ' || *p == '\t'))
2229 p++;
2230 /* mark start of word */
2231 q = r = p; /* q sits at start, r writes word */
2232 quoting = 0;
2233 while (*p) {
2234 if (!quoting && (*p == ' ' || *p == '\t'))
2235 break; /* reached end of word */
2236 else if (*p == '"' && p[1] == '"')
2237 p += 2, *r++ = '"'; /* a literal quote */
2238 else if (*p == '"')
2239 p++, quoting = !quoting;
2240 else
2241 *r++ = *p++;
2242 }
2243 if (*p)
2244 p++; /* skip over the whitespace */
2245 *r = '\0';
2246 if (cmd->nwords >= cmd->wordssize) {
2247 cmd->wordssize = cmd->nwords + 16;
3d88e64d 2248 cmd->words = sresize(cmd->words, cmd->wordssize, char *);
3af97463 2249 }
679539d7 2250 cmd->words[cmd->nwords++] = dupstr(q);
4c7f0d61 2251 }
4c7f0d61 2252 }
2253
39934deb 2254 sfree(line);
2255
4c7f0d61 2256 /*
2257 * Now parse the first word and assign a function.
2258 */
2259
2260 if (cmd->nwords == 0)
2261 cmd->obey = sftp_cmd_null;
2262 else {
bf5240cd 2263 const struct sftp_cmd_lookup *lookup;
2264 lookup = lookup_command(cmd->words[0]);
2265 if (!lookup)
2266 cmd->obey = sftp_cmd_unknown;
2267 else
2268 cmd->obey = lookup->obey;
4c7f0d61 2269 }
2270
2271 return cmd;
2272}
2273
774204f5 2274static int do_sftp_init(void)
32874aea 2275{
1bc24185 2276 struct sftp_packet *pktin;
2277 struct sftp_request *req, *rreq;
2278
4c7f0d61 2279 /*
2280 * Do protocol initialisation.
2281 */
2282 if (!fxp_init()) {
2283 fprintf(stderr,
32874aea 2284 "Fatal: unable to initialise SFTP: %s\n", fxp_error());
774204f5 2285 return 1; /* failure */
4c7f0d61 2286 }
2287
2288 /*
2289 * Find out where our home directory is.
2290 */
1bc24185 2291 sftp_register(req = fxp_realpath_send("."));
2292 rreq = sftp_find_request(pktin = sftp_recv());
2293 assert(rreq == req);
7b7de4f4 2294 homedir = fxp_realpath_recv(pktin, rreq);
1bc24185 2295
4c7f0d61 2296 if (!homedir) {
2297 fprintf(stderr,
2298 "Warning: failed to resolve home directory: %s\n",
2299 fxp_error());
2300 homedir = dupstr(".");
2301 } else {
2302 printf("Remote working directory is %s\n", homedir);
2303 }
2304 pwd = dupstr(homedir);
774204f5 2305 return 0;
fa3db767 2306}
2307
679539d7 2308void do_sftp_cleanup()
2309{
2310 char ch;
f11233cb 2311 if (back) {
2312 back->special(backhandle, TS_EOF);
2313 sftp_recvdata(&ch, 1);
2314 back->free(backhandle);
2315 sftp_cleanup_request();
65857773 2316 back = NULL;
2317 backhandle = NULL;
f11233cb 2318 }
679539d7 2319 if (pwd) {
2320 sfree(pwd);
2321 pwd = NULL;
2322 }
2323 if (homedir) {
2324 sfree(homedir);
2325 homedir = NULL;
2326 }
2327}
2328
fa3db767 2329void do_sftp(int mode, int modeflags, char *batchfile)
2330{
2331 FILE *fp;
df49ff19 2332 int ret;
4c7f0d61 2333
9954aaa3 2334 /*
2335 * Batch mode?
4c7f0d61 2336 */
9954aaa3 2337 if (mode == 0) {
2338
2339 /* ------------------------------------------------------------------
2340 * Now we're ready to do Real Stuff.
2341 */
2342 while (1) {
df49ff19 2343 struct sftp_command *cmd;
39934deb 2344 cmd = sftp_getcmd(NULL, 0, 0);
df49ff19 2345 if (!cmd)
2346 break;
679539d7 2347 ret = cmd->obey(cmd);
2348 if (cmd->words) {
2349 int i;
2350 for(i = 0; i < cmd->nwords; i++)
2351 sfree(cmd->words[i]);
2352 sfree(cmd->words);
2353 }
2354 sfree(cmd);
2355 if (ret < 0)
df49ff19 2356 break;
bf5240cd 2357 }
9954aaa3 2358 } else {
2359 fp = fopen(batchfile, "r");
2360 if (!fp) {
bf5240cd 2361 printf("Fatal: unable to open %s\n", batchfile);
2362 return;
9954aaa3 2363 }
2364 while (1) {
bf5240cd 2365 struct sftp_command *cmd;
2366 cmd = sftp_getcmd(fp, mode, modeflags);
2367 if (!cmd)
2368 break;
df49ff19 2369 ret = cmd->obey(cmd);
2370 if (ret < 0)
bf5240cd 2371 break;
df49ff19 2372 if (ret == 0) {
bf5240cd 2373 if (!(modeflags & 2))
9954aaa3 2374 break;
bf5240cd 2375 }
9954aaa3 2376 }
bf5240cd 2377 fclose(fp);
9954aaa3 2378
4c7f0d61 2379 }
4a8fc3c4 2380}
4c7f0d61 2381
4a8fc3c4 2382/* ----------------------------------------------------------------------
2383 * Dirty bits: integration with PuTTY.
2384 */
2385
2386static int verbose = 0;
2387
7bedb13c 2388/*
4a8fc3c4 2389 * Print an error message and perform a fatal exit.
2390 */
2391void fatalbox(char *fmt, ...)
2392{
57356d63 2393 char *str, *str2;
4a8fc3c4 2394 va_list ap;
2395 va_start(ap, fmt);
57356d63 2396 str = dupvprintf(fmt, ap);
2397 str2 = dupcat("Fatal: ", str, "\n", NULL);
2398 sfree(str);
4a8fc3c4 2399 va_end(ap);
57356d63 2400 fputs(str2, stderr);
2401 sfree(str2);
4a8fc3c4 2402
93b581bd 2403 cleanup_exit(1);
4a8fc3c4 2404}
1709795f 2405void modalfatalbox(char *fmt, ...)
2406{
57356d63 2407 char *str, *str2;
1709795f 2408 va_list ap;
2409 va_start(ap, fmt);
57356d63 2410 str = dupvprintf(fmt, ap);
2411 str2 = dupcat("Fatal: ", str, "\n", NULL);
2412 sfree(str);
1709795f 2413 va_end(ap);
57356d63 2414 fputs(str2, stderr);
2415 sfree(str2);
1709795f 2416
2417 cleanup_exit(1);
2418}
a8327734 2419void connection_fatal(void *frontend, char *fmt, ...)
4a8fc3c4 2420{
57356d63 2421 char *str, *str2;
4a8fc3c4 2422 va_list ap;
2423 va_start(ap, fmt);
57356d63 2424 str = dupvprintf(fmt, ap);
2425 str2 = dupcat("Fatal: ", str, "\n", NULL);
2426 sfree(str);
4a8fc3c4 2427 va_end(ap);
57356d63 2428 fputs(str2, stderr);
2429 sfree(str2);
4a8fc3c4 2430
93b581bd 2431 cleanup_exit(1);
4a8fc3c4 2432}
2433
6b78788a 2434void ldisc_send(void *handle, char *buf, int len, int interactive)
32874aea 2435{
4a8fc3c4 2436 /*
2437 * This is only here because of the calls to ldisc_send(NULL,
2438 * 0) in ssh.c. Nothing in PSFTP actually needs to use the
2439 * ldisc as an ldisc. So if we get called with any real data, I
2440 * want to know about it.
4c7f0d61 2441 */
4a8fc3c4 2442 assert(len == 0);
2443}
2444
2445/*
c44bf5bd 2446 * In psftp, all agent requests should be synchronous, so this is a
2447 * never-called stub.
2448 */
2449void agent_schedule_callback(void (*callback)(void *, void *, int),
2450 void *callback_ctx, void *data, int len)
2451{
2452 assert(!"We shouldn't be here");
2453}
2454
2455/*
4a8fc3c4 2456 * Receive a block of data from the SSH link. Block until all data
2457 * is available.
2458 *
2459 * To do this, we repeatedly call the SSH protocol module, with our
2460 * own trap in from_backend() to catch the data that comes back. We
2461 * do this until we have enough data.
2462 */
2463
32874aea 2464static unsigned char *outptr; /* where to put the data */
2465static unsigned outlen; /* how much data required */
4a8fc3c4 2466static unsigned char *pending = NULL; /* any spare data */
32874aea 2467static unsigned pendlen = 0, pendsize = 0; /* length and phys. size of buffer */
9fab77dc 2468int from_backend(void *frontend, int is_stderr, const char *data, int datalen)
32874aea 2469{
2470 unsigned char *p = (unsigned char *) data;
2471 unsigned len = (unsigned) datalen;
4a8fc3c4 2472
2473 /*
2474 * stderr data is just spouted to local stderr and otherwise
2475 * ignored.
2476 */
2477 if (is_stderr) {
bfa5400d 2478 if (len > 0)
2479 fwrite(data, 1, len, stderr);
5471d09a 2480 return 0;
4a8fc3c4 2481 }
2482
2483 /*
2484 * If this is before the real session begins, just return.
2485 */
2486 if (!outptr)
5471d09a 2487 return 0;
4a8fc3c4 2488
bfa5400d 2489 if ((outlen > 0) && (len > 0)) {
32874aea 2490 unsigned used = outlen;
2491 if (used > len)
2492 used = len;
2493 memcpy(outptr, p, used);
2494 outptr += used;
2495 outlen -= used;
2496 p += used;
2497 len -= used;
4a8fc3c4 2498 }
2499
2500 if (len > 0) {
32874aea 2501 if (pendsize < pendlen + len) {
2502 pendsize = pendlen + len + 4096;
3d88e64d 2503 pending = sresize(pending, pendsize, unsigned char);
32874aea 2504 }
2505 memcpy(pending + pendlen, p, len);
2506 pendlen += len;
4a8fc3c4 2507 }
5471d09a 2508
2509 return 0;
4a8fc3c4 2510}
32874aea 2511int sftp_recvdata(char *buf, int len)
2512{
2513 outptr = (unsigned char *) buf;
4a8fc3c4 2514 outlen = len;
2515
2516 /*
2517 * See if the pending-input block contains some of what we
2518 * need.
2519 */
2520 if (pendlen > 0) {
32874aea 2521 unsigned pendused = pendlen;
2522 if (pendused > outlen)
2523 pendused = outlen;
4a8fc3c4 2524 memcpy(outptr, pending, pendused);
32874aea 2525 memmove(pending, pending + pendused, pendlen - pendused);
4a8fc3c4 2526 outptr += pendused;
2527 outlen -= pendused;
32874aea 2528 pendlen -= pendused;
2529 if (pendlen == 0) {
2530 pendsize = 0;
2531 sfree(pending);
2532 pending = NULL;
2533 }
2534 if (outlen == 0)
2535 return 1;
4a8fc3c4 2536 }
2537
2538 while (outlen > 0) {
d6cc41e6 2539 if (ssh_sftp_loop_iteration() < 0)
32874aea 2540 return 0; /* doom */
4a8fc3c4 2541 }
2542
2543 return 1;
2544}
32874aea 2545int sftp_senddata(char *buf, int len)
2546{
776792d7 2547 back->send(backhandle, buf, len);
4a8fc3c4 2548 return 1;
2549}
2550
2551/*
4a8fc3c4 2552 * Short description of parameters.
2553 */
2554static void usage(void)
2555{
2556 printf("PuTTY Secure File Transfer (SFTP) client\n");
2557 printf("%s\n", ver);
90767715 2558 printf("Usage: psftp [options] [user@]host\n");
4a8fc3c4 2559 printf("Options:\n");
9954aaa3 2560 printf(" -b file use specified batchfile\n");
2561 printf(" -bc output batchfile commands\n");
2562 printf(" -be don't stop batchfile processing if errors\n");
4a8fc3c4 2563 printf(" -v show verbose messages\n");
e2a197cf 2564 printf(" -load sessname Load settings from saved session\n");
2565 printf(" -l user connect with specified username\n");
4a8fc3c4 2566 printf(" -P port connect to specified port\n");
2567 printf(" -pw passw login with specified password\n");
e2a197cf 2568 printf(" -1 -2 force use of particular SSH protocol version\n");
05581745 2569 printf(" -4 -6 force use of IPv4 or IPv6\n");
e2a197cf 2570 printf(" -C enable compression\n");
2571 printf(" -i key private key file for authentication\n");
2572 printf(" -batch disable all interactive prompts\n");
dc108ebc 2573 printf(" -V print version information\n");
93b581bd 2574 cleanup_exit(1);
4a8fc3c4 2575}
2576
dc108ebc 2577static void version(void)
2578{
2579 printf("psftp: %s\n", ver);
2580 cleanup_exit(1);
2581}
2582
4a8fc3c4 2583/*
fa3db767 2584 * Connect to a host.
4a8fc3c4 2585 */
fa3db767 2586static int psftp_connect(char *userhost, char *user, int portnumber)
4a8fc3c4 2587{
fa3db767 2588 char *host, *realhost;
cbe2d68f 2589 const char *err;
b51259f6 2590 void *logctx;
4a8fc3c4 2591
2592 /* Separate host and username */
2593 host = userhost;
2594 host = strrchr(host, '@');
2595 if (host == NULL) {
2596 host = userhost;
2597 } else {
2598 *host++ = '\0';
2599 if (user) {
32874aea 2600 printf("psftp: multiple usernames specified; using \"%s\"\n",
2601 user);
4a8fc3c4 2602 } else
2603 user = userhost;
2604 }
2605
18e62ad8 2606 /*
2607 * If we haven't loaded session details already (e.g., from -load),
2608 * try looking for a session called "host".
2609 */
2610 if (!loaded_session) {
2611 /* Try to load settings for `host' into a temporary config */
2612 Config cfg2;
2613 cfg2.host[0] = '\0';
2614 do_defaults(host, &cfg2);
2615 if (cfg2.host[0] != '\0') {
2616 /* Settings present and include hostname */
2617 /* Re-load data into the real config. */
2618 do_defaults(host, &cfg);
2619 } else {
2620 /* Session doesn't exist or mention a hostname. */
2621 /* Use `host' as a bare hostname. */
2622 strncpy(cfg.host, host, sizeof(cfg.host) - 1);
2623 cfg.host[sizeof(cfg.host) - 1] = '\0';
2624 }
2625 } else {
2626 /* Patch in hostname `host' to session details. */
32874aea 2627 strncpy(cfg.host, host, sizeof(cfg.host) - 1);
2628 cfg.host[sizeof(cfg.host) - 1] = '\0';
f133db8e 2629 }
2630
2631 /*
2632 * Force use of SSH. (If they got the protocol wrong we assume the
2633 * port is useless too.)
2634 */
2635 if (cfg.protocol != PROT_SSH) {
2636 cfg.protocol = PROT_SSH;
2637 cfg.port = 22;
4a8fc3c4 2638 }
2639
449925a6 2640 /*
4123fa9a 2641 * If saved session / Default Settings says SSH-1 (`1 only' or `1'),
2642 * then change it to SSH-2, on the grounds that that's more likely to
2643 * work for SFTP. (Can be overridden with `-1' option.)
2644 * But if it says `2 only' or `2', respect which.
2645 */
2646 if (cfg.sshprot != 2 && cfg.sshprot != 3)
2647 cfg.sshprot = 2;
2648
2649 /*
c0a81592 2650 * Enact command-line overrides.
2651 */
5555d393 2652 cmdline_run_saved(&cfg);
c0a81592 2653
2654 /*
449925a6 2655 * Trim leading whitespace off the hostname if it's there.
2656 */
2657 {
2658 int space = strspn(cfg.host, " \t");
2659 memmove(cfg.host, cfg.host+space, 1+strlen(cfg.host)-space);
2660 }
2661
2662 /* See if host is of the form user@host */
2663 if (cfg.host[0] != '\0') {
5dd103a8 2664 char *atsign = strrchr(cfg.host, '@');
449925a6 2665 /* Make sure we're not overflowing the user field */
2666 if (atsign) {
2667 if (atsign - cfg.host < sizeof cfg.username) {
2668 strncpy(cfg.username, cfg.host, atsign - cfg.host);
2669 cfg.username[atsign - cfg.host] = '\0';
2670 }
2671 memmove(cfg.host, atsign + 1, 1 + strlen(atsign + 1));
2672 }
2673 }
2674
2675 /*
2676 * Trim a colon suffix off the hostname if it's there.
2677 */
2678 cfg.host[strcspn(cfg.host, ":")] = '\0';
2679
cae0c023 2680 /*
2681 * Remove any remaining whitespace from the hostname.
2682 */
2683 {
2684 int p1 = 0, p2 = 0;
2685 while (cfg.host[p2] != '\0') {
2686 if (cfg.host[p2] != ' ' && cfg.host[p2] != '\t') {
2687 cfg.host[p1] = cfg.host[p2];
2688 p1++;
2689 }
2690 p2++;
2691 }
2692 cfg.host[p1] = '\0';
2693 }
2694
4a8fc3c4 2695 /* Set username */
2696 if (user != NULL && user[0] != '\0') {
32874aea 2697 strncpy(cfg.username, user, sizeof(cfg.username) - 1);
2698 cfg.username[sizeof(cfg.username) - 1] = '\0';
4a8fc3c4 2699 }
2700 if (!cfg.username[0]) {
b5af97b3 2701 if (!console_get_line("login as: ",
2702 cfg.username, sizeof(cfg.username), FALSE)) {
2703 fprintf(stderr, "psftp: no username, aborting\n");
93b581bd 2704 cleanup_exit(1);
4a8fc3c4 2705 } else {
2706 int len = strlen(cfg.username);
32874aea 2707 if (cfg.username[len - 1] == '\n')
2708 cfg.username[len - 1] = '\0';
4a8fc3c4 2709 }
2710 }
2711
4a8fc3c4 2712 if (portnumber)
2713 cfg.port = portnumber;
2714
d27b4a18 2715 /*
2716 * Disable scary things which shouldn't be enabled for simple
2717 * things like SCP and SFTP: agent forwarding, port forwarding,
2718 * X forwarding.
2719 */
2720 cfg.x11_forward = 0;
2721 cfg.agentfwd = 0;
2722 cfg.portfwd[0] = cfg.portfwd[1] = '\0';
2723
bebf22d0 2724 /* Set up subsystem name. */
4a8fc3c4 2725 strcpy(cfg.remote_cmd, "sftp");
2726 cfg.ssh_subsys = TRUE;
2727 cfg.nopty = TRUE;
2728
bebf22d0 2729 /*
2730 * Set up fallback option, for SSH1 servers or servers with the
2731 * sftp subsystem not enabled but the server binary installed
2732 * in the usual place. We only support fallback on Unix
248c0c5a 2733 * systems, and we use a kludgy piece of shellery which should
2734 * try to find sftp-server in various places (the obvious
2735 * systemwide spots /usr/lib and /usr/local/lib, and then the
2736 * user's PATH) and finally give up.
bebf22d0 2737 *
248c0c5a 2738 * test -x /usr/lib/sftp-server && exec /usr/lib/sftp-server
2739 * test -x /usr/local/lib/sftp-server && exec /usr/local/lib/sftp-server
2740 * exec sftp-server
bebf22d0 2741 *
2742 * the idea being that this will attempt to use either of the
2743 * obvious pathnames and then give up, and when it does give up
2744 * it will print the preferred pathname in the error messages.
2745 */
2746 cfg.remote_cmd_ptr2 =
248c0c5a 2747 "test -x /usr/lib/sftp-server && exec /usr/lib/sftp-server\n"
2748 "test -x /usr/local/lib/sftp-server && exec /usr/local/lib/sftp-server\n"
2749 "exec sftp-server";
bebf22d0 2750 cfg.ssh_subsys2 = FALSE;
2751
4a8fc3c4 2752 back = &ssh_backend;
2753
79bf227b 2754 err = back->init(NULL, &backhandle, &cfg, cfg.host, cfg.port, &realhost,
2755 0, cfg.tcp_keepalives);
4a8fc3c4 2756 if (err != NULL) {
fa3db767 2757 fprintf(stderr, "ssh_init: %s\n", err);
4a8fc3c4 2758 return 1;
2759 }
c229ef97 2760 logctx = log_init(NULL, &cfg);
a8327734 2761 back->provide_logctx(backhandle, logctx);
d3fef4a5 2762 console_provide_logctx(logctx);
d6cc41e6 2763 while (!back->sendok(backhandle)) {
2764 if (ssh_sftp_loop_iteration() < 0) {
2765 fprintf(stderr, "ssh_init: error during SSH connection setup\n");
2766 return 1;
2767 }
2768 }
4a8fc3c4 2769 if (verbose && realhost != NULL)
2770 printf("Connected to %s\n", realhost);
679539d7 2771 if (realhost != NULL)
2772 sfree(realhost);
fa3db767 2773 return 0;
2774}
2775
c0a81592 2776void cmdline_error(char *p, ...)
2777{
2778 va_list ap;
86256dc6 2779 fprintf(stderr, "psftp: ");
c0a81592 2780 va_start(ap, p);
2781 vfprintf(stderr, p, ap);
2782 va_end(ap);
86256dc6 2783 fprintf(stderr, "\n try typing \"psftp -h\" for help\n");
c0a81592 2784 exit(1);
2785}
2786
fa3db767 2787/*
2788 * Main program. Parse arguments etc.
2789 */
d6cc41e6 2790int psftp_main(int argc, char *argv[])
fa3db767 2791{
2792 int i;
2793 int portnumber = 0;
2794 char *userhost, *user;
2795 int mode = 0;
2796 int modeflags = 0;
2797 char *batchfile = NULL;
86256dc6 2798 int errors = 0;
fa3db767 2799
b51259f6 2800 flags = FLAG_STDERR | FLAG_INTERACTIVE
2801#ifdef FLAG_SYNCAGENT
2802 | FLAG_SYNCAGENT
2803#endif
2804 ;
c0a81592 2805 cmdline_tooltype = TOOLTYPE_FILETRANSFER;
ff2ae367 2806 ssh_get_line = &console_get_line;
fa3db767 2807 sk_init();
2808
2809 userhost = user = NULL;
2810
18e62ad8 2811 /* Load Default Settings before doing anything else. */
2812 do_defaults(NULL, &cfg);
2813 loaded_session = FALSE;
2814
86256dc6 2815 errors = 0;
fa3db767 2816 for (i = 1; i < argc; i++) {
c0a81592 2817 int ret;
fa3db767 2818 if (argv[i][0] != '-') {
c0a81592 2819 if (userhost)
2820 usage();
2821 else
2822 userhost = dupstr(argv[i]);
2823 continue;
2824 }
5555d393 2825 ret = cmdline_process_param(argv[i], i+1<argc?argv[i+1]:NULL, 1, &cfg);
c0a81592 2826 if (ret == -2) {
2827 cmdline_error("option \"%s\" requires an argument", argv[i]);
2828 } else if (ret == 2) {
2829 i++; /* skip next argument */
2830 } else if (ret == 1) {
2831 /* We have our own verbosity in addition to `flags'. */
2832 if (flags & FLAG_VERBOSE)
2833 verbose = 1;
fa3db767 2834 } else if (strcmp(argv[i], "-h") == 0 ||
2835 strcmp(argv[i], "-?") == 0) {
2836 usage();
dc108ebc 2837 } else if (strcmp(argv[i], "-V") == 0) {
2838 version();
c0a81592 2839 } else if (strcmp(argv[i], "-batch") == 0) {
2840 console_batch_mode = 1;
fa3db767 2841 } else if (strcmp(argv[i], "-b") == 0 && i + 1 < argc) {
2842 mode = 1;
2843 batchfile = argv[++i];
d13c2ee9 2844 } else if (strcmp(argv[i], "-bc") == 0) {
fa3db767 2845 modeflags = modeflags | 1;
d13c2ee9 2846 } else if (strcmp(argv[i], "-be") == 0) {
fa3db767 2847 modeflags = modeflags | 2;
2848 } else if (strcmp(argv[i], "--") == 0) {
2849 i++;
2850 break;
2851 } else {
86256dc6 2852 cmdline_error("unknown option \"%s\"", argv[i]);
fa3db767 2853 }
2854 }
2855 argc -= i;
2856 argv += i;
2857 back = NULL;
2858
2859 /*
e1bb41d1 2860 * If the loaded session provides a hostname, and a hostname has not
2861 * otherwise been specified, pop it in `userhost' so that
2862 * `psftp -load sessname' is sufficient to start a session.
2863 */
2864 if (!userhost && cfg.host[0] != '\0') {
2865 userhost = dupstr(cfg.host);
2866 }
2867
2868 /*
fa3db767 2869 * If a user@host string has already been provided, connect to
2870 * it now.
2871 */
2872 if (userhost) {
679539d7 2873 int ret;
2874 ret = psftp_connect(userhost, user, portnumber);
2875 sfree(userhost);
2876 if (ret)
fa3db767 2877 return 1;
774204f5 2878 if (do_sftp_init())
2879 return 1;
fa3db767 2880 } else {
2881 printf("psftp: no hostname specified; use \"open host.name\""
679539d7 2882 " to connect\n");
fa3db767 2883 }
4c7f0d61 2884
9954aaa3 2885 do_sftp(mode, modeflags, batchfile);
4a8fc3c4 2886
51470298 2887 if (back != NULL && back->socket(backhandle) != NULL) {
4a8fc3c4 2888 char ch;
51470298 2889 back->special(backhandle, TS_EOF);
4a8fc3c4 2890 sftp_recvdata(&ch, 1);
2891 }
b614ce89 2892 do_sftp_cleanup();
4a8fc3c4 2893 random_save_seed();
679539d7 2894 cmdline_cleanup();
2895 console_provide_logctx(NULL);
679539d7 2896 sk_cleanup();
4a8fc3c4 2897
4c7f0d61 2898 return 0;
2899}