When the comments say `if we're in restart mode', the code in
[u/mdw/putty] / psftp.c
CommitLineData
4c7f0d61 1/*
f4ff9455 2 * psftp.c: (platform-independent) front end for PSFTP.
4c7f0d61 3 */
4
5#include <stdio.h>
6#include <stdlib.h>
f9e162aa 7#include <stdarg.h>
4c7f0d61 8#include <assert.h>
d92624dc 9#include <limits.h>
4c7f0d61 10
4a8fc3c4 11#define PUTTY_DO_GLOBALS
12#include "putty.h"
d6cc41e6 13#include "psftp.h"
4a8fc3c4 14#include "storage.h"
15#include "ssh.h"
4c7f0d61 16#include "sftp.h"
17#include "int64.h"
18
5471d09a 19/*
20 * Since SFTP is a request-response oriented protocol, it requires
21 * no buffer management: when we send data, we stop and wait for an
22 * acknowledgement _anyway_, and so we can't possibly overfill our
23 * send buffer.
24 */
25
fa3db767 26static int psftp_connect(char *userhost, char *user, int portnumber);
07534184 27static int do_sftp_init(void);
679539d7 28void do_sftp_cleanup();
fa3db767 29
4c7f0d61 30/* ----------------------------------------------------------------------
4c7f0d61 31 * sftp client state.
32 */
33
34char *pwd, *homedir;
6b78788a 35static Backend *back;
36static void *backhandle;
3ea863a3 37static Config cfg;
4c7f0d61 38
39/* ----------------------------------------------------------------------
40 * Higher-level helper functions used in commands.
41 */
42
43/*
f9e162aa 44 * Attempt to canonify a pathname starting from the pwd. If
45 * canonification fails, at least fall back to returning a _valid_
46 * pathname (though it may be ugly, eg /home/simon/../foobar).
4c7f0d61 47 */
32874aea 48char *canonify(char *name)
49{
f9e162aa 50 char *fullname, *canonname;
1bc24185 51 struct sftp_packet *pktin;
52 struct sftp_request *req, *rreq;
4a8fc3c4 53
f9e162aa 54 if (name[0] == '/') {
55 fullname = dupstr(name);
56 } else {
4a8fc3c4 57 char *slash;
32874aea 58 if (pwd[strlen(pwd) - 1] == '/')
4a8fc3c4 59 slash = "";
60 else
61 slash = "/";
62 fullname = dupcat(pwd, slash, name, NULL);
f9e162aa 63 }
4a8fc3c4 64
1bc24185 65 sftp_register(req = fxp_realpath_send(fullname));
66 rreq = sftp_find_request(pktin = sftp_recv());
67 assert(rreq == req);
7b7de4f4 68 canonname = fxp_realpath_recv(pktin, rreq);
4a8fc3c4 69
f9e162aa 70 if (canonname) {
71 sfree(fullname);
72 return canonname;
50d7e054 73 } else {
32874aea 74 /*
75 * Attempt number 2. Some FXP_REALPATH implementations
76 * (glibc-based ones, in particular) require the _whole_
77 * path to point to something that exists, whereas others
78 * (BSD-based) only require all but the last component to
79 * exist. So if the first call failed, we should strip off
80 * everything from the last slash onwards and try again,
81 * then put the final component back on.
82 *
83 * Special cases:
84 *
85 * - if the last component is "/." or "/..", then we don't
86 * bother trying this because there's no way it can work.
87 *
88 * - if the thing actually ends with a "/", we remove it
89 * before we start. Except if the string is "/" itself
90 * (although I can't see why we'd have got here if so,
91 * because surely "/" would have worked the first
92 * time?), in which case we don't bother.
93 *
94 * - if there's no slash in the string at all, give up in
95 * confusion (we expect at least one because of the way
96 * we constructed the string).
97 */
98
99 int i;
100 char *returnname;
101
102 i = strlen(fullname);
103 if (i > 2 && fullname[i - 1] == '/')
104 fullname[--i] = '\0'; /* strip trailing / unless at pos 0 */
105 while (i > 0 && fullname[--i] != '/');
106
107 /*
108 * Give up on special cases.
109 */
110 if (fullname[i] != '/' || /* no slash at all */
111 !strcmp(fullname + i, "/.") || /* ends in /. */
112 !strcmp(fullname + i, "/..") || /* ends in /.. */
113 !strcmp(fullname, "/")) {
114 return fullname;
115 }
116
117 /*
118 * Now i points at the slash. Deal with the final special
119 * case i==0 (ie the whole path was "/nonexistentfile").
120 */
121 fullname[i] = '\0'; /* separate the string */
122 if (i == 0) {
1bc24185 123 sftp_register(req = fxp_realpath_send("/"));
32874aea 124 } else {
1bc24185 125 sftp_register(req = fxp_realpath_send(fullname));
32874aea 126 }
1bc24185 127 rreq = sftp_find_request(pktin = sftp_recv());
128 assert(rreq == req);
7b7de4f4 129 canonname = fxp_realpath_recv(pktin, rreq);
32874aea 130
e25883f8 131 if (!canonname) {
132 /* Even that failed. Restore our best guess at the
133 * constructed filename and give up */
134 fullname[i] = '/'; /* restore slash and last component */
135 return fullname;
136 }
32874aea 137
138 /*
139 * We have a canonical name for all but the last path
140 * component. Concatenate the last component and return.
141 */
142 returnname = dupcat(canonname,
143 canonname[strlen(canonname) - 1] ==
144 '/' ? "" : "/", fullname + i + 1, NULL);
145 sfree(fullname);
146 sfree(canonname);
147 return returnname;
50d7e054 148 }
4c7f0d61 149}
150
dcf8495c 151/*
152 * Return a pointer to the portion of str that comes after the last
153 * slash (or backslash or colon, if `local' is TRUE).
154 */
155static char *stripslashes(char *str, int local)
156{
157 char *p;
158
159 if (local) {
160 p = strchr(str, ':');
161 if (p) str = p+1;
162 }
163
164 p = strrchr(str, '/');
165 if (p) str = p+1;
166
167 if (local) {
168 p = strrchr(str, '\\');
169 if (p) str = p+1;
170 }
171
172 return str;
173}
174
4c7f0d61 175/*
93e86a8b 176 * qsort comparison routine for fxp_name structures. Sorts by real
177 * file name.
4c7f0d61 178 */
93e86a8b 179static int sftp_name_compare(const void *av, const void *bv)
32874aea 180{
7d2c1789 181 const struct fxp_name *const *a = (const struct fxp_name *const *) av;
182 const struct fxp_name *const *b = (const struct fxp_name *const *) bv;
183 return strcmp((*a)->filename, (*b)->filename);
4c7f0d61 184}
4c7f0d61 185
186/*
93e86a8b 187 * Likewise, but for a bare char *.
4f2b387f 188 */
93e86a8b 189static int bare_name_compare(const void *av, const void *bv)
4f2b387f 190{
93e86a8b 191 const char **a = (const char **) av;
192 const char **b = (const char **) bv;
193 return strcmp(*a, *b);
4f2b387f 194}
195
38f0c08e 196static void not_connected(void)
197{
198 printf("psftp: not connected to a host; use \"open host.name\"\n");
199}
200
93e86a8b 201/* ----------------------------------------------------------------------
202 * The meat of the `get' and `put' commands.
4c7f0d61 203 */
5079ee6d 204int sftp_get_file(char *fname, char *outfname, int recurse, int restart)
32874aea 205{
4c7f0d61 206 struct fxp_handle *fh;
1bc24185 207 struct sftp_packet *pktin;
208 struct sftp_request *req, *rreq;
c606c42d 209 struct fxp_xfer *xfer;
4c7f0d61 210 uint64 offset;
0ac1920c 211 WFile *file;
479fe1ba 212 int ret, shown_err = FALSE;
4c7f0d61 213
93e86a8b 214 /*
215 * In recursive mode, see if we're dealing with a directory.
216 * (If we're not in recursive mode, we need not even check: the
217 * subsequent FXP_OPEN will return a usable error message.)
218 */
5079ee6d 219 if (recurse) {
93e86a8b 220 struct fxp_attrs attrs;
221 int result;
fa3db767 222
5079ee6d 223 sftp_register(req = fxp_stat_send(fname));
224 rreq = sftp_find_request(pktin = sftp_recv());
225 assert(rreq == req);
226 result = fxp_stat_recv(pktin, rreq, &attrs);
9c77ddf6 227
5079ee6d 228 if (result &&
229 (attrs.flags & SSH_FILEXFER_ATTR_PERMISSIONS) &&
230 (attrs.permissions & 0040000)) {
93e86a8b 231
232 struct fxp_handle *dirhandle;
233 int nnames, namesize;
234 struct fxp_name **ournames;
235 struct fxp_names *names;
236 int i;
237
238 /*
239 * First, attempt to create the destination directory,
5079ee6d 240 * unless it already exists.
93e86a8b 241 */
5079ee6d 242 if (file_type(outfname) != FILE_TYPE_DIRECTORY &&
93e86a8b 243 !create_directory(outfname)) {
244 printf("%s: Cannot create directory\n", outfname);
245 return 0;
246 }
4c7f0d61 247
93e86a8b 248 /*
249 * Now get the list of filenames in the remote
250 * directory.
251 */
252 sftp_register(req = fxp_opendir_send(fname));
253 rreq = sftp_find_request(pktin = sftp_recv());
254 assert(rreq == req);
255 dirhandle = fxp_opendir_recv(pktin, rreq);
256
257 if (!dirhandle) {
258 printf("%s: unable to open directory: %s\n",
259 fname, fxp_error());
260 return 0;
261 }
262 nnames = namesize = 0;
263 ournames = NULL;
264 while (1) {
265 int i;
266
267 sftp_register(req = fxp_readdir_send(dirhandle));
268 rreq = sftp_find_request(pktin = sftp_recv());
269 assert(rreq == req);
270 names = fxp_readdir_recv(pktin, rreq);
271
272 if (names == NULL) {
273 if (fxp_error_type() == SSH_FX_EOF)
274 break;
275 printf("%s: reading directory: %s\n", fname, fxp_error());
276 sfree(ournames);
277 return 0;
278 }
279 if (names->nnames == 0) {
280 fxp_free_names(names);
281 break;
282 }
283 if (nnames + names->nnames >= namesize) {
284 namesize += names->nnames + 128;
285 ournames = sresize(ournames, namesize, struct fxp_name *);
286 }
287 for (i = 0; i < names->nnames; i++)
e9d14678 288 if (strcmp(names->names[i].filename, ".") &&
5079ee6d 289 strcmp(names->names[i].filename, "..")) {
e9d14678 290 if (!vet_filename(names->names[i].filename)) {
291 printf("ignoring potentially dangerous server-"
292 "supplied filename '%s'\n",
293 names->names[i].filename);
294 } else {
295 ournames[nnames++] =
296 fxp_dup_name(&names->names[i]);
297 }
298 }
93e86a8b 299 fxp_free_names(names);
300 }
301 sftp_register(req = fxp_close_send(dirhandle));
302 rreq = sftp_find_request(pktin = sftp_recv());
303 assert(rreq == req);
304 fxp_close_recv(pktin, rreq);
305
306 /*
307 * Sort the names into a clear order. This ought to
308 * make things more predictable when we're doing a
309 * reget of the same directory, just in case two
310 * readdirs on the same remote directory return a
311 * different order.
312 */
313 qsort(ournames, nnames, sizeof(*ournames), sftp_name_compare);
314
315 /*
316 * If we're in restart mode, find the last filename on
317 * this list that already exists. We may have to do a
318 * reget on _that_ file, but shouldn't have to do
319 * anything on the previous files.
320 *
321 * If none of them exists, of course, we start at 0.
322 */
323 i = 0;
60f9c221 324 if (restart) {
325 while (i < nnames) {
326 char *nextoutfname;
327 int ret;
328 if (outfname)
329 nextoutfname = dir_file_cat(outfname,
330 ournames[i]->filename);
331 else
332 nextoutfname = dupstr(ournames[i]->filename);
333 ret = (file_type(nextoutfname) == FILE_TYPE_NONEXISTENT);
334 sfree(nextoutfname);
335 if (ret)
336 break;
337 i++;
338 }
339 if (i > 0)
340 i--;
341 }
93e86a8b 342
343 /*
344 * Now we're ready to recurse. Starting at ournames[i]
345 * and continuing on to the end of the list, we
346 * construct a new source and target file name, and
347 * call sftp_get_file again.
348 */
349 for (; i < nnames; i++) {
350 char *nextfname, *nextoutfname;
351 int ret;
352
353 nextfname = dupcat(fname, "/", ournames[i]->filename, NULL);
9c77ddf6 354 if (outfname)
355 nextoutfname = dir_file_cat(outfname,
356 ournames[i]->filename);
357 else
358 nextoutfname = dupstr(ournames[i]->filename);
5079ee6d 359 ret = sftp_get_file(nextfname, nextoutfname, recurse, restart);
93e86a8b 360 restart = FALSE; /* after first partial file, do full */
361 sfree(nextoutfname);
362 sfree(nextfname);
363 if (!ret) {
364 for (i = 0; i < nnames; i++) {
365 fxp_free_name(ournames[i]);
366 }
367 sfree(ournames);
368 return 0;
369 }
370 }
371
372 /*
373 * Done this recursion level. Free everything.
374 */
375 for (i = 0; i < nnames; i++) {
376 fxp_free_name(ournames[i]);
377 }
378 sfree(ournames);
379
380 return 1;
381 }
4c7f0d61 382 }
4c7f0d61 383
1bc24185 384 sftp_register(req = fxp_open_send(fname, SSH_FXF_READ));
385 rreq = sftp_find_request(pktin = sftp_recv());
386 assert(rreq == req);
7b7de4f4 387 fh = fxp_open_recv(pktin, rreq);
1bc24185 388
4c7f0d61 389 if (!fh) {
4dc846cd 390 printf("%s: open for read: %s\n", fname, fxp_error());
4c7f0d61 391 return 0;
392 }
d92624dc 393
394 if (restart) {
0ac1920c 395 file = open_existing_wfile(outfname, NULL);
d92624dc 396 } else {
0ac1920c 397 file = open_new_file(outfname);
d92624dc 398 }
399
0ac1920c 400 if (!file) {
4c7f0d61 401 printf("local: unable to open %s\n", outfname);
1bc24185 402
403 sftp_register(req = fxp_close_send(fh));
404 rreq = sftp_find_request(pktin = sftp_recv());
405 assert(rreq == req);
7b7de4f4 406 fxp_close_recv(pktin, rreq);
1bc24185 407
4c7f0d61 408 return 0;
409 }
410
d92624dc 411 if (restart) {
0ac1920c 412 char decbuf[30];
413 if (seek_file(file, uint64_make(0,0) , FROM_END) == -1) {
414 printf("reget: cannot restart %s - file too large\n",
415 outfname);
416 sftp_register(req = fxp_close_send(fh));
417 rreq = sftp_find_request(pktin = sftp_recv());
418 assert(rreq == req);
419 fxp_close_recv(pktin, rreq);
420
421 return 0;
422 }
423
424 offset = get_file_posn(file);
425 uint64_decimal(offset, decbuf);
426 printf("reget: restarting at file position %s\n", decbuf);
d92624dc 427 } else {
428 offset = uint64_make(0, 0);
429 }
4c7f0d61 430
d92624dc 431 printf("remote:%s => local:%s\n", fname, outfname);
4c7f0d61 432
433 /*
434 * FIXME: we can use FXP_FSTAT here to get the file size, and
435 * thus put up a progress bar.
436 */
df49ff19 437 ret = 1;
c606c42d 438 xfer = xfer_download_init(fh, offset);
df0870fc 439 while (!xfer_done(xfer)) {
c606c42d 440 void *vbuf;
441 int ret, len;
4c7f0d61 442 int wpos, wlen;
443
c606c42d 444 xfer_download_queue(xfer);
445 pktin = sftp_recv();
446 ret = xfer_download_gotpkt(xfer, pktin);
447
448 if (ret < 0) {
479fe1ba 449 if (!shown_err) {
450 printf("error while reading: %s\n", fxp_error());
451 shown_err = TRUE;
452 }
c606c42d 453 ret = 0;
4c7f0d61 454 }
32874aea 455
c606c42d 456 while (xfer_download_data(xfer, &vbuf, &len)) {
457 unsigned char *buf = (unsigned char *)vbuf;
458
459 wpos = 0;
460 while (wpos < len) {
0ac1920c 461 wlen = write_to_file(file, buf + wpos, len - wpos);
c606c42d 462 if (wlen <= 0) {
463 printf("error while writing local file\n");
464 ret = 0;
465 xfer_set_error(xfer);
466 }
467 wpos += wlen;
468 }
469 if (wpos < len) { /* we had an error */
df49ff19 470 ret = 0;
c606c42d 471 xfer_set_error(xfer);
4c7f0d61 472 }
9ff4e23d 473
474 sfree(vbuf);
df49ff19 475 }
4c7f0d61 476 }
477
c606c42d 478 xfer_cleanup(xfer);
479
0ac1920c 480 close_wfile(file);
1bc24185 481
482 sftp_register(req = fxp_close_send(fh));
483 rreq = sftp_find_request(pktin = sftp_recv());
484 assert(rreq == req);
7b7de4f4 485 fxp_close_recv(pktin, rreq);
1bc24185 486
df49ff19 487 return ret;
4c7f0d61 488}
489
5079ee6d 490int sftp_put_file(char *fname, char *outfname, int recurse, int restart)
32874aea 491{
4c7f0d61 492 struct fxp_handle *fh;
df0870fc 493 struct fxp_xfer *xfer;
1bc24185 494 struct sftp_packet *pktin;
495 struct sftp_request *req, *rreq;
4c7f0d61 496 uint64 offset;
0ac1920c 497 RFile *file;
df0870fc 498 int ret, err, eof;
4c7f0d61 499
93e86a8b 500 /*
501 * In recursive mode, see if we're dealing with a directory.
502 * (If we're not in recursive mode, we need not even check: the
503 * subsequent fopen will return an error message.)
504 */
5079ee6d 505 if (recurse && file_type(fname) == FILE_TYPE_DIRECTORY) {
93e86a8b 506 struct fxp_attrs attrs;
507 int result;
508 int nnames, namesize;
509 char *name, **ournames;
510 DirHandle *dh;
511 int i;
4c7f0d61 512
5079ee6d 513 /*
514 * First, attempt to create the destination directory,
515 * unless it already exists.
516 */
517 sftp_register(req = fxp_stat_send(outfname));
518 rreq = sftp_find_request(pktin = sftp_recv());
519 assert(rreq == req);
520 result = fxp_stat_recv(pktin, rreq, &attrs);
521 if (!result ||
522 !(attrs.flags & SSH_FILEXFER_ATTR_PERMISSIONS) ||
523 !(attrs.permissions & 0040000)) {
524 sftp_register(req = fxp_mkdir_send(outfname));
93e86a8b 525 rreq = sftp_find_request(pktin = sftp_recv());
526 assert(rreq == req);
5079ee6d 527 result = fxp_mkdir_recv(pktin, rreq);
93e86a8b 528
5079ee6d 529 if (!result) {
530 printf("%s: create directory: %s\n",
531 outfname, fxp_error());
532 return 0;
93e86a8b 533 }
534 }
535
536 /*
537 * Now get the list of filenames in the local directory.
538 */
93e86a8b 539 nnames = namesize = 0;
540 ournames = NULL;
9c77ddf6 541
5079ee6d 542 dh = open_directory(fname);
543 if (!dh) {
544 printf("%s: unable to open directory\n", fname);
545 return 0;
9c77ddf6 546 }
5079ee6d 547 while ((name = read_filename(dh)) != NULL) {
548 if (nnames >= namesize) {
549 namesize += 128;
550 ournames = sresize(ournames, namesize, char *);
551 }
552 ournames[nnames++] = name;
93e86a8b 553 }
5079ee6d 554 close_directory(dh);
93e86a8b 555
556 /*
557 * Sort the names into a clear order. This ought to make
558 * things more predictable when we're doing a reput of the
559 * same directory, just in case two readdirs on the same
560 * local directory return a different order.
561 */
562 qsort(ournames, nnames, sizeof(*ournames), bare_name_compare);
563
564 /*
565 * If we're in restart mode, find the last filename on this
566 * list that already exists. We may have to do a reput on
567 * _that_ file, but shouldn't have to do anything on the
568 * previous files.
569 *
570 * If none of them exists, of course, we start at 0.
571 */
572 i = 0;
60f9c221 573 if (restart) {
574 while (i < nnames) {
575 char *nextoutfname;
576 nextoutfname = dupcat(outfname, "/", ournames[i], NULL);
577 sftp_register(req = fxp_stat_send(nextoutfname));
578 rreq = sftp_find_request(pktin = sftp_recv());
579 assert(rreq == req);
580 result = fxp_stat_recv(pktin, rreq, &attrs);
581 sfree(nextoutfname);
582 if (!result)
583 break;
584 i++;
585 }
586 if (i > 0)
587 i--;
588 }
589
590 /*
591 * Now we're ready to recurse. Starting at ournames[i]
93e86a8b 592 * and continuing on to the end of the list, we
593 * construct a new source and target file name, and
594 * call sftp_put_file again.
595 */
596 for (; i < nnames; i++) {
597 char *nextfname, *nextoutfname;
598 int ret;
599
9c77ddf6 600 if (fname)
601 nextfname = dir_file_cat(fname, ournames[i]);
602 else
603 nextfname = dupstr(ournames[i]);
93e86a8b 604 nextoutfname = dupcat(outfname, "/", ournames[i], NULL);
5079ee6d 605 ret = sftp_put_file(nextfname, nextoutfname, recurse, restart);
93e86a8b 606 restart = FALSE; /* after first partial file, do full */
607 sfree(nextoutfname);
608 sfree(nextfname);
609 if (!ret) {
610 for (i = 0; i < nnames; i++) {
611 sfree(ournames[i]);
612 }
613 sfree(ournames);
614 return 0;
615 }
616 }
617
618 /*
619 * Done this recursion level. Free everything.
620 */
621 for (i = 0; i < nnames; i++) {
622 sfree(ournames[i]);
623 }
624 sfree(ournames);
625
626 return 1;
4c7f0d61 627 }
628
0ac1920c 629 file = open_existing_file(fname, NULL, NULL, NULL);
630 if (!file) {
4c7f0d61 631 printf("local: unable to open %s\n", fname);
4c7f0d61 632 return 0;
633 }
d92624dc 634 if (restart) {
1bc24185 635 sftp_register(req = fxp_open_send(outfname, SSH_FXF_WRITE));
d92624dc 636 } else {
1bc24185 637 sftp_register(req = fxp_open_send(outfname, SSH_FXF_WRITE |
638 SSH_FXF_CREAT | SSH_FXF_TRUNC));
d92624dc 639 }
1bc24185 640 rreq = sftp_find_request(pktin = sftp_recv());
641 assert(rreq == req);
7b7de4f4 642 fh = fxp_open_recv(pktin, rreq);
1bc24185 643
4c7f0d61 644 if (!fh) {
4dc846cd 645 printf("%s: open for write: %s\n", outfname, fxp_error());
4c7f0d61 646 return 0;
647 }
648
d92624dc 649 if (restart) {
650 char decbuf[30];
651 struct fxp_attrs attrs;
1bc24185 652 int ret;
653
654 sftp_register(req = fxp_fstat_send(fh));
655 rreq = sftp_find_request(pktin = sftp_recv());
656 assert(rreq == req);
7b7de4f4 657 ret = fxp_fstat_recv(pktin, rreq, &attrs);
1bc24185 658
659 if (!ret) {
d92624dc 660 printf("read size of %s: %s\n", outfname, fxp_error());
d92624dc 661 return 0;
662 }
663 if (!(attrs.flags & SSH_FILEXFER_ATTR_SIZE)) {
664 printf("read size of %s: size was not given\n", outfname);
d92624dc 665 return 0;
666 }
667 offset = attrs.size;
668 uint64_decimal(offset, decbuf);
669 printf("reput: restarting at file position %s\n", decbuf);
0ac1920c 670
671 if (seek_file((WFile *)file, offset, FROM_START) != 0)
672 seek_file((WFile *)file, uint64_make(0,0), FROM_END); /* *shrug* */
d92624dc 673 } else {
674 offset = uint64_make(0, 0);
675 }
4c7f0d61 676
d92624dc 677 printf("local:%s => remote:%s\n", fname, outfname);
4c7f0d61 678
679 /*
680 * FIXME: we can use FXP_FSTAT here to get the file size, and
681 * thus put up a progress bar.
682 */
df49ff19 683 ret = 1;
df0870fc 684 xfer = xfer_upload_init(fh, offset);
685 err = eof = 0;
686 while ((!err && !eof) || !xfer_done(xfer)) {
4c7f0d61 687 char buffer[4096];
1bc24185 688 int len, ret;
4c7f0d61 689
df0870fc 690 while (xfer_upload_ready(xfer) && !err && !eof) {
0ac1920c 691 len = read_from_file(file, buffer, sizeof(buffer));
df0870fc 692 if (len == -1) {
693 printf("error while reading local file\n");
694 err = 1;
695 } else if (len == 0) {
696 eof = 1;
697 } else {
698 xfer_upload_data(xfer, buffer, len);
699 }
4c7f0d61 700 }
1bc24185 701
2dbd915a 702 if (!xfer_done(xfer)) {
703 pktin = sftp_recv();
704 ret = xfer_upload_gotpkt(xfer, pktin);
705 if (!ret) {
706 printf("error while writing: %s\n", fxp_error());
707 err = 1;
708 }
4c7f0d61 709 }
4c7f0d61 710 }
711
df0870fc 712 xfer_cleanup(xfer);
713
1bc24185 714 sftp_register(req = fxp_close_send(fh));
715 rreq = sftp_find_request(pktin = sftp_recv());
716 assert(rreq == req);
7b7de4f4 717 fxp_close_recv(pktin, rreq);
1bc24185 718
0ac1920c 719 close_rfile(file);
93e86a8b 720
721 return ret;
722}
723
724/* ----------------------------------------------------------------------
5079ee6d 725 * A remote wildcard matcher, providing a similar interface to the
726 * local one in psftp.h.
727 */
728
729typedef struct SftpWildcardMatcher {
730 struct fxp_handle *dirh;
731 struct fxp_names *names;
732 int namepos;
733 char *wildcard, *prefix;
734} SftpWildcardMatcher;
735
736SftpWildcardMatcher *sftp_begin_wildcard_matching(char *name)
737{
738 struct sftp_packet *pktin;
739 struct sftp_request *req, *rreq;
740 char *wildcard;
741 char *unwcdir, *tmpdir, *cdir;
742 int len, check;
743 SftpWildcardMatcher *swcm;
744 struct fxp_handle *dirh;
745
746 /*
747 * We don't handle multi-level wildcards; so we expect to find
748 * a fully specified directory part, followed by a wildcard
749 * after that.
750 */
751 wildcard = stripslashes(name, 0);
752
753 unwcdir = dupstr(name);
754 len = wildcard - name;
755 unwcdir[len] = '\0';
756 if (len > 0 && unwcdir[len-1] == '/')
757 unwcdir[len-1] = '\0';
758 tmpdir = snewn(1 + len, char);
759 check = wc_unescape(tmpdir, unwcdir);
760 sfree(tmpdir);
761
762 if (!check) {
763 printf("Multiple-level wildcards are not supported\n");
764 sfree(unwcdir);
765 return NULL;
766 }
767
768 cdir = canonify(unwcdir);
769
770 sftp_register(req = fxp_opendir_send(cdir));
771 rreq = sftp_find_request(pktin = sftp_recv());
772 assert(rreq == req);
773 dirh = fxp_opendir_recv(pktin, rreq);
774
775 if (dirh) {
776 swcm = snew(SftpWildcardMatcher);
777 swcm->dirh = dirh;
778 swcm->names = NULL;
779 swcm->wildcard = dupstr(wildcard);
780 swcm->prefix = unwcdir;
781 } else {
782 printf("Unable to open %s: %s\n", cdir, fxp_error());
783 swcm = NULL;
784 sfree(unwcdir);
785 }
786
787 sfree(cdir);
788
789 return swcm;
790}
791
792char *sftp_wildcard_get_filename(SftpWildcardMatcher *swcm)
793{
794 struct fxp_name *name;
795 struct sftp_packet *pktin;
796 struct sftp_request *req, *rreq;
797
798 while (1) {
799 if (swcm->names && swcm->namepos >= swcm->names->nnames) {
800 fxp_free_names(swcm->names);
801 swcm->names = NULL;
802 }
803
804 if (!swcm->names) {
805 sftp_register(req = fxp_readdir_send(swcm->dirh));
806 rreq = sftp_find_request(pktin = sftp_recv());
807 assert(rreq == req);
808 swcm->names = fxp_readdir_recv(pktin, rreq);
809
810 if (!swcm->names) {
811 if (fxp_error_type() != SSH_FX_EOF)
812 printf("%s: reading directory: %s\n", swcm->prefix,
813 fxp_error());
814 return NULL;
815 }
816
817 swcm->namepos = 0;
818 }
819
820 assert(swcm->names && swcm->namepos < swcm->names->nnames);
821
822 name = &swcm->names->names[swcm->namepos++];
823
824 if (!strcmp(name->filename, ".") || !strcmp(name->filename, ".."))
825 continue; /* expected bad filenames */
826
827 if (!vet_filename(name->filename)) {
828 printf("ignoring potentially dangerous server-"
829 "supplied filename '%s'\n", name->filename);
830 continue; /* unexpected bad filename */
831 }
832
833 if (!wc_match(swcm->wildcard, name->filename))
834 continue; /* doesn't match the wildcard */
835
836 /*
837 * We have a working filename. Return it.
838 */
839 return dupprintf("%s%s%s", swcm->prefix,
83567e43 840 (!swcm->prefix[0] ||
841 swcm->prefix[strlen(swcm->prefix)-1]=='/' ?
842 "" : "/"),
5079ee6d 843 name->filename);
844 }
845}
846
847void sftp_finish_wildcard_matching(SftpWildcardMatcher *swcm)
848{
849 struct sftp_packet *pktin;
850 struct sftp_request *req, *rreq;
851
852 sftp_register(req = fxp_close_send(swcm->dirh));
853 rreq = sftp_find_request(pktin = sftp_recv());
854 assert(rreq == req);
855 fxp_close_recv(pktin, rreq);
856
857 if (swcm->names)
858 fxp_free_names(swcm->names);
859
860 sfree(swcm->prefix);
861 sfree(swcm->wildcard);
862
863 sfree(swcm);
864}
865
83567e43 866/*
867 * General function to match a potential wildcard in a filename
868 * argument and iterate over every matching file. Used in several
869 * PSFTP commands (rmdir, rm, chmod, mv).
870 */
871int wildcard_iterate(char *filename, int (*func)(void *, char *), void *ctx)
872{
873 char *unwcfname, *newname, *cname;
874 int is_wc, ret;
875
876 unwcfname = snewn(strlen(filename)+1, char);
877 is_wc = !wc_unescape(unwcfname, filename);
878
879 if (is_wc) {
880 SftpWildcardMatcher *swcm = sftp_begin_wildcard_matching(filename);
881 int matched = FALSE;
882 sfree(unwcfname);
883
884 if (!swcm)
885 return 0;
886
887 ret = 1;
888
889 while ( (newname = sftp_wildcard_get_filename(swcm)) != NULL ) {
890 cname = canonify(newname);
891 if (!cname) {
4dc846cd 892 printf("%s: canonify: %s\n", newname, fxp_error());
83567e43 893 ret = 0;
894 }
895 matched = TRUE;
896 ret &= func(ctx, cname);
897 sfree(cname);
898 }
899
900 if (!matched) {
901 /* Politely warn the user that nothing matched. */
902 printf("%s: nothing matched\n", filename);
903 }
904
905 sftp_finish_wildcard_matching(swcm);
906 } else {
907 cname = canonify(unwcfname);
908 if (!cname) {
4dc846cd 909 printf("%s: canonify: %s\n", filename, fxp_error());
83567e43 910 ret = 0;
911 }
912 ret = func(ctx, cname);
913 sfree(cname);
914 sfree(unwcfname);
915 }
916
917 return ret;
918}
919
920/*
921 * Handy helper function.
922 */
923int is_wildcard(char *name)
924{
925 char *unwcfname = snewn(strlen(name)+1, char);
926 int is_wc = !wc_unescape(unwcfname, name);
927 sfree(unwcfname);
928 return is_wc;
929}
930
5079ee6d 931/* ----------------------------------------------------------------------
93e86a8b 932 * Actual sftp commands.
933 */
934struct sftp_command {
935 char **words;
936 int nwords, wordssize;
937 int (*obey) (struct sftp_command *); /* returns <0 to quit */
938};
939
940int sftp_cmd_null(struct sftp_command *cmd)
941{
942 return 1; /* success */
943}
944
945int sftp_cmd_unknown(struct sftp_command *cmd)
946{
947 printf("psftp: unknown command \"%s\"\n", cmd->words[0]);
948 return 0; /* failure */
949}
950
951int sftp_cmd_quit(struct sftp_command *cmd)
952{
953 return -1;
954}
955
b614ce89 956int sftp_cmd_close(struct sftp_command *cmd)
957{
958 if (back == NULL) {
38f0c08e 959 not_connected();
b614ce89 960 return 0;
961 }
962
6226c939 963 if (back != NULL && back->connected(backhandle)) {
b614ce89 964 char ch;
965 back->special(backhandle, TS_EOF);
966 sftp_recvdata(&ch, 1);
967 }
968 do_sftp_cleanup();
969
970 return 0;
971}
972
93e86a8b 973/*
974 * List a directory. If no arguments are given, list pwd; otherwise
975 * list the directory given in words[1].
976 */
977int sftp_cmd_ls(struct sftp_command *cmd)
978{
979 struct fxp_handle *dirh;
980 struct fxp_names *names;
981 struct fxp_name **ournames;
982 int nnames, namesize;
3394416c 983 char *dir, *cdir, *unwcdir, *wildcard;
93e86a8b 984 struct sftp_packet *pktin;
985 struct sftp_request *req, *rreq;
986 int i;
987
988 if (back == NULL) {
38f0c08e 989 not_connected();
93e86a8b 990 return 0;
991 }
992
993 if (cmd->nwords < 2)
994 dir = ".";
995 else
996 dir = cmd->words[1];
997
3394416c 998 unwcdir = snewn(1 + strlen(dir), char);
999 if (wc_unescape(unwcdir, dir)) {
1000 dir = unwcdir;
1001 wildcard = NULL;
1002 } else {
1003 char *tmpdir;
1004 int len, check;
1005
1006 wildcard = stripslashes(dir, 0);
1007 unwcdir = dupstr(dir);
1008 len = wildcard - dir;
1009 unwcdir[len] = '\0';
1010 if (len > 0 && unwcdir[len-1] == '/')
1011 unwcdir[len-1] = '\0';
1012 tmpdir = snewn(1 + len, char);
1013 check = wc_unescape(tmpdir, unwcdir);
1014 sfree(tmpdir);
1015 if (!check) {
1016 printf("Multiple-level wildcards are not supported\n");
1017 sfree(unwcdir);
1018 return 0;
1019 }
1020 dir = unwcdir;
1021 }
1022
93e86a8b 1023 cdir = canonify(dir);
1024 if (!cdir) {
4dc846cd 1025 printf("%s: canonify: %s\n", dir, fxp_error());
3394416c 1026 sfree(unwcdir);
93e86a8b 1027 return 0;
1028 }
1029
1030 printf("Listing directory %s\n", cdir);
1031
1032 sftp_register(req = fxp_opendir_send(cdir));
1033 rreq = sftp_find_request(pktin = sftp_recv());
1034 assert(rreq == req);
1035 dirh = fxp_opendir_recv(pktin, rreq);
1036
1037 if (dirh == NULL) {
1038 printf("Unable to open %s: %s\n", dir, fxp_error());
1039 } else {
1040 nnames = namesize = 0;
1041 ournames = NULL;
1042
1043 while (1) {
1044
1045 sftp_register(req = fxp_readdir_send(dirh));
1046 rreq = sftp_find_request(pktin = sftp_recv());
1047 assert(rreq == req);
1048 names = fxp_readdir_recv(pktin, rreq);
1049
1050 if (names == NULL) {
1051 if (fxp_error_type() == SSH_FX_EOF)
1052 break;
1053 printf("Reading directory %s: %s\n", dir, fxp_error());
1054 break;
1055 }
1056 if (names->nnames == 0) {
1057 fxp_free_names(names);
1058 break;
1059 }
1060
1061 if (nnames + names->nnames >= namesize) {
1062 namesize += names->nnames + 128;
1063 ournames = sresize(ournames, namesize, struct fxp_name *);
1064 }
1065
1066 for (i = 0; i < names->nnames; i++)
3394416c 1067 if (!wildcard || wc_match(wildcard, names->names[i].filename))
1068 ournames[nnames++] = fxp_dup_name(&names->names[i]);
93e86a8b 1069
1070 fxp_free_names(names);
1071 }
1072 sftp_register(req = fxp_close_send(dirh));
1073 rreq = sftp_find_request(pktin = sftp_recv());
1074 assert(rreq == req);
1075 fxp_close_recv(pktin, rreq);
1076
1077 /*
1078 * Now we have our filenames. Sort them by actual file
1079 * name, and then output the longname parts.
1080 */
1081 qsort(ournames, nnames, sizeof(*ournames), sftp_name_compare);
1082
1083 /*
1084 * And print them.
1085 */
1086 for (i = 0; i < nnames; i++) {
1087 printf("%s\n", ournames[i]->longname);
1088 fxp_free_name(ournames[i]);
1089 }
1090 sfree(ournames);
1091 }
1092
1093 sfree(cdir);
3394416c 1094 sfree(unwcdir);
93e86a8b 1095
1096 return 1;
1097}
1098
1099/*
1100 * Change directories. We do this by canonifying the new name, then
1101 * trying to OPENDIR it. Only if that succeeds do we set the new pwd.
1102 */
1103int sftp_cmd_cd(struct sftp_command *cmd)
1104{
1105 struct fxp_handle *dirh;
1106 struct sftp_packet *pktin;
1107 struct sftp_request *req, *rreq;
1108 char *dir;
1109
1110 if (back == NULL) {
38f0c08e 1111 not_connected();
93e86a8b 1112 return 0;
1113 }
1114
1115 if (cmd->nwords < 2)
1116 dir = dupstr(homedir);
1117 else
1118 dir = canonify(cmd->words[1]);
1119
1120 if (!dir) {
4dc846cd 1121 printf("%s: canonify: %s\n", dir, fxp_error());
93e86a8b 1122 return 0;
1123 }
1124
1125 sftp_register(req = fxp_opendir_send(dir));
1126 rreq = sftp_find_request(pktin = sftp_recv());
1127 assert(rreq == req);
1128 dirh = fxp_opendir_recv(pktin, rreq);
1129
1130 if (!dirh) {
1131 printf("Directory %s: %s\n", dir, fxp_error());
1132 sfree(dir);
1133 return 0;
1134 }
1135
1136 sftp_register(req = fxp_close_send(dirh));
1137 rreq = sftp_find_request(pktin = sftp_recv());
1138 assert(rreq == req);
1139 fxp_close_recv(pktin, rreq);
1140
1141 sfree(pwd);
1142 pwd = dir;
1143 printf("Remote directory is now %s\n", pwd);
1144
1145 return 1;
1146}
1147
1148/*
1149 * Print current directory. Easy as pie.
1150 */
1151int sftp_cmd_pwd(struct sftp_command *cmd)
1152{
1153 if (back == NULL) {
38f0c08e 1154 not_connected();
93e86a8b 1155 return 0;
1156 }
1157
1158 printf("Remote directory is %s\n", pwd);
1159 return 1;
1160}
1161
1162/*
9c77ddf6 1163 * Get a file and save it at the local end. We have three very
1164 * similar commands here. The basic one is `get'; `reget' differs
1165 * in that it checks for the existence of the destination file and
1166 * starts from where a previous aborted transfer left off; `mget'
1167 * differs in that it interprets all its arguments as files to
1168 * transfer (never as a different local name for a remote file) and
1169 * can handle wildcards.
93e86a8b 1170 */
9c77ddf6 1171int sftp_general_get(struct sftp_command *cmd, int restart, int multiple)
93e86a8b 1172{
5079ee6d 1173 char *fname, *unwcfname, *origfname, *origwfname, *outfname;
93e86a8b 1174 int i, ret;
1175 int recurse = FALSE;
1176
1177 if (back == NULL) {
38f0c08e 1178 not_connected();
93e86a8b 1179 return 0;
1180 }
1181
1182 i = 1;
1183 while (i < cmd->nwords && cmd->words[i][0] == '-') {
1184 if (!strcmp(cmd->words[i], "--")) {
1185 /* finish processing options */
1186 i++;
1187 break;
1188 } else if (!strcmp(cmd->words[i], "-r")) {
1189 recurse = TRUE;
1190 } else {
9033711a 1191 printf("%s: unrecognised option '%s'\n", cmd->words[0], cmd->words[i]);
93e86a8b 1192 return 0;
1193 }
1194 i++;
1195 }
1196
1197 if (i >= cmd->nwords) {
9033711a 1198 printf("%s: expects a filename\n", cmd->words[0]);
93e86a8b 1199 return 0;
1200 }
1201
5079ee6d 1202 ret = 1;
9c77ddf6 1203 do {
5079ee6d 1204 SftpWildcardMatcher *swcm;
1205
9c77ddf6 1206 origfname = cmd->words[i++];
5079ee6d 1207 unwcfname = snewn(strlen(origfname)+1, char);
93e86a8b 1208
5079ee6d 1209 if (multiple && !wc_unescape(unwcfname, origfname)) {
1210 swcm = sftp_begin_wildcard_matching(origfname);
1211 if (!swcm) {
1212 sfree(unwcfname);
1213 continue;
1214 }
1215 origwfname = sftp_wildcard_get_filename(swcm);
1216 if (!origwfname) {
1217 /* Politely warn the user that nothing matched. */
1218 printf("%s: nothing matched\n", origfname);
1219 sftp_finish_wildcard_matching(swcm);
1220 sfree(unwcfname);
1221 continue;
1222 }
9c77ddf6 1223 } else {
5079ee6d 1224 origwfname = origfname;
1225 swcm = NULL;
1226 }
1227
1228 while (origwfname) {
1229 fname = canonify(origwfname);
1230
9c77ddf6 1231 if (!fname) {
4dc846cd 1232 printf("%s: canonify: %s\n", origwfname, fxp_error());
9c77ddf6 1233 sfree(unwcfname);
1234 return 0;
1235 }
93e86a8b 1236
9c77ddf6 1237 if (!multiple && i < cmd->nwords)
1238 outfname = cmd->words[i++];
1239 else
5079ee6d 1240 outfname = stripslashes(origwfname, 0);
93e86a8b 1241
5079ee6d 1242 ret = sftp_get_file(fname, outfname, recurse, restart);
9c77ddf6 1243
1244 sfree(fname);
5079ee6d 1245
1246 if (swcm) {
1247 sfree(origwfname);
1248 origwfname = sftp_wildcard_get_filename(swcm);
1249 } else {
1250 origwfname = NULL;
1251 }
9c77ddf6 1252 }
1253 sfree(unwcfname);
5079ee6d 1254 if (swcm)
1255 sftp_finish_wildcard_matching(swcm);
9c77ddf6 1256 if (!ret)
1257 return ret;
1258
1259 } while (multiple && i < cmd->nwords);
93e86a8b 1260
1261 return ret;
1262}
1263int sftp_cmd_get(struct sftp_command *cmd)
1264{
9c77ddf6 1265 return sftp_general_get(cmd, 0, 0);
1266}
1267int sftp_cmd_mget(struct sftp_command *cmd)
1268{
1269 return sftp_general_get(cmd, 0, 1);
93e86a8b 1270}
1271int sftp_cmd_reget(struct sftp_command *cmd)
1272{
9c77ddf6 1273 return sftp_general_get(cmd, 1, 0);
93e86a8b 1274}
1275
1276/*
9c77ddf6 1277 * Send a file and store it at the remote end. We have three very
1278 * similar commands here. The basic one is `put'; `reput' differs
1279 * in that it checks for the existence of the destination file and
1280 * starts from where a previous aborted transfer left off; `mput'
1281 * differs in that it interprets all its arguments as files to
1282 * transfer (never as a different remote name for a local file) and
1283 * can handle wildcards.
93e86a8b 1284 */
9c77ddf6 1285int sftp_general_put(struct sftp_command *cmd, int restart, int multiple)
93e86a8b 1286{
5079ee6d 1287 char *fname, *wfname, *origoutfname, *outfname;
93e86a8b 1288 int i, ret;
1289 int recurse = FALSE;
1290
1291 if (back == NULL) {
38f0c08e 1292 not_connected();
93e86a8b 1293 return 0;
1294 }
1295
1296 i = 1;
1297 while (i < cmd->nwords && cmd->words[i][0] == '-') {
1298 if (!strcmp(cmd->words[i], "--")) {
1299 /* finish processing options */
1300 i++;
1301 break;
1302 } else if (!strcmp(cmd->words[i], "-r")) {
1303 recurse = TRUE;
1304 } else {
9033711a 1305 printf("%s: unrecognised option '%s'\n", cmd->words[0], cmd->words[i]);
93e86a8b 1306 return 0;
1307 }
1308 i++;
1309 }
1310
1311 if (i >= cmd->nwords) {
9033711a 1312 printf("%s: expects a filename\n", cmd->words[0]);
93e86a8b 1313 return 0;
1314 }
1315
5079ee6d 1316 ret = 1;
9c77ddf6 1317 do {
5079ee6d 1318 WildcardMatcher *wcm;
9c77ddf6 1319 fname = cmd->words[i++];
93e86a8b 1320
9c77ddf6 1321 if (multiple && test_wildcard(fname, FALSE) == WCTYPE_WILDCARD) {
5079ee6d 1322 wcm = begin_wildcard_matching(fname);
1323 wfname = wildcard_get_filename(wcm);
1324 if (!wfname) {
1325 /* Politely warn the user that nothing matched. */
1326 printf("%s: nothing matched\n", fname);
1327 finish_wildcard_matching(wcm);
1328 continue;
1329 }
9c77ddf6 1330 } else {
5079ee6d 1331 wfname = fname;
1332 wcm = NULL;
1333 }
1334
1335 while (wfname) {
9c77ddf6 1336 if (!multiple && i < cmd->nwords)
1337 origoutfname = cmd->words[i++];
1338 else
5079ee6d 1339 origoutfname = stripslashes(wfname, 1);
9c77ddf6 1340
1341 outfname = canonify(origoutfname);
1342 if (!outfname) {
4dc846cd 1343 printf("%s: canonify: %s\n", origoutfname, fxp_error());
5079ee6d 1344 if (wcm) {
1345 sfree(wfname);
1346 finish_wildcard_matching(wcm);
1347 }
9c77ddf6 1348 return 0;
1349 }
5079ee6d 1350 ret = sftp_put_file(wfname, outfname, recurse, restart);
9c77ddf6 1351 sfree(outfname);
5079ee6d 1352
1353 if (wcm) {
1354 sfree(wfname);
1355 wfname = wildcard_get_filename(wcm);
1356 } else {
1357 wfname = NULL;
1358 }
9c77ddf6 1359 }
5079ee6d 1360
1361 if (wcm)
1362 finish_wildcard_matching(wcm);
1363
9c77ddf6 1364 if (!ret)
1365 return ret;
93e86a8b 1366
9c77ddf6 1367 } while (multiple && i < cmd->nwords);
4c7f0d61 1368
df49ff19 1369 return ret;
4c7f0d61 1370}
d92624dc 1371int sftp_cmd_put(struct sftp_command *cmd)
1372{
9c77ddf6 1373 return sftp_general_put(cmd, 0, 0);
1374}
1375int sftp_cmd_mput(struct sftp_command *cmd)
1376{
1377 return sftp_general_put(cmd, 0, 1);
d92624dc 1378}
1379int sftp_cmd_reput(struct sftp_command *cmd)
1380{
9c77ddf6 1381 return sftp_general_put(cmd, 1, 0);
d92624dc 1382}
4c7f0d61 1383
9954aaa3 1384int sftp_cmd_mkdir(struct sftp_command *cmd)
1385{
1386 char *dir;
1bc24185 1387 struct sftp_packet *pktin;
1388 struct sftp_request *req, *rreq;
9954aaa3 1389 int result;
83567e43 1390 int i, ret;
9954aaa3 1391
fa3db767 1392 if (back == NULL) {
38f0c08e 1393 not_connected();
fa3db767 1394 return 0;
1395 }
9954aaa3 1396
1397 if (cmd->nwords < 2) {
1398 printf("mkdir: expects a directory\n");
1399 return 0;
1400 }
1401
83567e43 1402 ret = 1;
1403 for (i = 1; i < cmd->nwords; i++) {
1404 dir = canonify(cmd->words[i]);
1405 if (!dir) {
4dc846cd 1406 printf("%s: canonify: %s\n", dir, fxp_error());
83567e43 1407 return 0;
1408 }
1409
1410 sftp_register(req = fxp_mkdir_send(dir));
1411 rreq = sftp_find_request(pktin = sftp_recv());
1412 assert(rreq == req);
1413 result = fxp_mkdir_recv(pktin, rreq);
1414
1415 if (!result) {
1416 printf("mkdir %s: %s\n", dir, fxp_error());
83567e43 1417 ret = 0;
f68363d2 1418 } else
1419 printf("mkdir %s: OK\n", dir);
83567e43 1420
1421 sfree(dir);
9954aaa3 1422 }
1423
83567e43 1424 return ret;
1425}
1426
1427static int sftp_action_rmdir(void *vctx, char *dir)
1428{
1429 struct sftp_packet *pktin;
1430 struct sftp_request *req, *rreq;
1431 int result;
1432
1433 sftp_register(req = fxp_rmdir_send(dir));
1bc24185 1434 rreq = sftp_find_request(pktin = sftp_recv());
1435 assert(rreq == req);
83567e43 1436 result = fxp_rmdir_recv(pktin, rreq);
1bc24185 1437
9954aaa3 1438 if (!result) {
83567e43 1439 printf("rmdir %s: %s\n", dir, fxp_error());
9954aaa3 1440 return 0;
1441 }
1442
f68363d2 1443 printf("rmdir %s: OK\n", dir);
1444
df49ff19 1445 return 1;
9954aaa3 1446}
1447
1448int sftp_cmd_rmdir(struct sftp_command *cmd)
1449{
83567e43 1450 int i, ret;
9954aaa3 1451
fa3db767 1452 if (back == NULL) {
38f0c08e 1453 not_connected();
fa3db767 1454 return 0;
1455 }
9954aaa3 1456
1457 if (cmd->nwords < 2) {
1458 printf("rmdir: expects a directory\n");
1459 return 0;
1460 }
1461
83567e43 1462 ret = 1;
1463 for (i = 1; i < cmd->nwords; i++)
1464 ret &= wildcard_iterate(cmd->words[i], sftp_action_rmdir, NULL);
9954aaa3 1465
83567e43 1466 return ret;
1467}
1468
1469static int sftp_action_rm(void *vctx, char *fname)
1470{
1471 struct sftp_packet *pktin;
1472 struct sftp_request *req, *rreq;
1473 int result;
1474
1475 sftp_register(req = fxp_remove_send(fname));
1bc24185 1476 rreq = sftp_find_request(pktin = sftp_recv());
1477 assert(rreq == req);
83567e43 1478 result = fxp_remove_recv(pktin, rreq);
1bc24185 1479
9954aaa3 1480 if (!result) {
83567e43 1481 printf("rm %s: %s\n", fname, fxp_error());
9954aaa3 1482 return 0;
1483 }
1484
f68363d2 1485 printf("rm %s: OK\n", fname);
1486
df49ff19 1487 return 1;
9954aaa3 1488}
1489
1490int sftp_cmd_rm(struct sftp_command *cmd)
1491{
83567e43 1492 int i, ret;
9954aaa3 1493
fa3db767 1494 if (back == NULL) {
38f0c08e 1495 not_connected();
fa3db767 1496 return 0;
1497 }
1498
9954aaa3 1499 if (cmd->nwords < 2) {
1500 printf("rm: expects a filename\n");
1501 return 0;
1502 }
1503
83567e43 1504 ret = 1;
1505 for (i = 1; i < cmd->nwords; i++)
1506 ret &= wildcard_iterate(cmd->words[i], sftp_action_rm, NULL);
1507
1508 return ret;
1509}
1510
1511static int check_is_dir(char *dstfname)
1512{
1513 struct sftp_packet *pktin;
1514 struct sftp_request *req, *rreq;
1515 struct fxp_attrs attrs;
1516 int result;
1517
1518 sftp_register(req = fxp_stat_send(dstfname));
1519 rreq = sftp_find_request(pktin = sftp_recv());
1520 assert(rreq == req);
1521 result = fxp_stat_recv(pktin, rreq, &attrs);
1522
1523 if (result &&
1524 (attrs.flags & SSH_FILEXFER_ATTR_PERMISSIONS) &&
1525 (attrs.permissions & 0040000))
1526 return TRUE;
1527 else
1528 return FALSE;
1529}
1530
1531struct sftp_context_mv {
1532 char *dstfname;
1533 int dest_is_dir;
1534};
1535
1536static int sftp_action_mv(void *vctx, char *srcfname)
1537{
1538 struct sftp_context_mv *ctx = (struct sftp_context_mv *)vctx;
1539 struct sftp_packet *pktin;
1540 struct sftp_request *req, *rreq;
1541 const char *error;
1542 char *finalfname, *newcanon = NULL;
1543 int ret, result;
1544
1545 if (ctx->dest_is_dir) {
1546 char *p;
1547 char *newname;
1548
1549 p = srcfname + strlen(srcfname);
1550 while (p > srcfname && p[-1] != '/') p--;
1551 newname = dupcat(ctx->dstfname, "/", p, NULL);
1552 newcanon = canonify(newname);
1553 if (!newcanon) {
4dc846cd 1554 printf("%s: canonify: %s\n", newname, fxp_error());
83567e43 1555 sfree(newname);
1556 return 0;
1557 }
1558 sfree(newname);
1559
1560 finalfname = newcanon;
1561 } else {
1562 finalfname = ctx->dstfname;
9954aaa3 1563 }
1564
83567e43 1565 sftp_register(req = fxp_rename_send(srcfname, finalfname));
1bc24185 1566 rreq = sftp_find_request(pktin = sftp_recv());
1567 assert(rreq == req);
83567e43 1568 result = fxp_rename_recv(pktin, rreq);
1bc24185 1569
83567e43 1570 error = result ? NULL : fxp_error();
1571
1572 if (error) {
1573 printf("mv %s %s: %s\n", srcfname, finalfname, error);
1574 ret = 0;
1575 } else {
1576 printf("%s -> %s\n", srcfname, finalfname);
1577 ret = 1;
9954aaa3 1578 }
1579
83567e43 1580 sfree(newcanon);
1581 return ret;
d92624dc 1582}
1583
1584int sftp_cmd_mv(struct sftp_command *cmd)
1585{
83567e43 1586 struct sftp_context_mv actx, *ctx = &actx;
1587 int i, ret;
d92624dc 1588
fa3db767 1589 if (back == NULL) {
38f0c08e 1590 not_connected();
fa3db767 1591 return 0;
1592 }
1593
d92624dc 1594 if (cmd->nwords < 3) {
1595 printf("mv: expects two filenames\n");
9954aaa3 1596 return 0;
d92624dc 1597 }
83567e43 1598
1599 ctx->dstfname = canonify(cmd->words[cmd->nwords-1]);
1600 if (!ctx->dstfname) {
4dc846cd 1601 printf("%s: canonify: %s\n", ctx->dstfname, fxp_error());
d92624dc 1602 return 0;
1603 }
1604
83567e43 1605 /*
1606 * If there's more than one source argument, or one source
1607 * argument which is a wildcard, we _require_ that the
1608 * destination is a directory.
1609 */
1610 ctx->dest_is_dir = check_is_dir(ctx->dstfname);
1611 if ((cmd->nwords > 3 || is_wildcard(cmd->words[1])) && !ctx->dest_is_dir) {
1612 printf("mv: multiple or wildcard arguments require the destination"
1613 " to be a directory\n");
c4acc08c 1614 sfree(ctx->dstfname);
d92624dc 1615 return 0;
1616 }
9954aaa3 1617
83567e43 1618 /*
1619 * Now iterate over the source arguments.
1620 */
1621 ret = 1;
1622 for (i = 1; i < cmd->nwords-1; i++)
1623 ret &= wildcard_iterate(cmd->words[i], sftp_action_mv, ctx);
1624
c4acc08c 1625 sfree(ctx->dstfname);
83567e43 1626 return ret;
1627}
1628
1629struct sftp_context_chmod {
1630 unsigned attrs_clr, attrs_xor;
1631};
1632
1633static int sftp_action_chmod(void *vctx, char *fname)
1634{
1635 struct fxp_attrs attrs;
1636 struct sftp_packet *pktin;
1637 struct sftp_request *req, *rreq;
1638 int result;
1639 unsigned oldperms, newperms;
1640 struct sftp_context_chmod *ctx = (struct sftp_context_chmod *)vctx;
1641
1642 sftp_register(req = fxp_stat_send(fname));
1bc24185 1643 rreq = sftp_find_request(pktin = sftp_recv());
1644 assert(rreq == req);
83567e43 1645 result = fxp_stat_recv(pktin, rreq, &attrs);
1bc24185 1646
83567e43 1647 if (!result || !(attrs.flags & SSH_FILEXFER_ATTR_PERMISSIONS)) {
1648 printf("get attrs for %s: %s\n", fname,
1649 result ? "file permissions not provided" : fxp_error());
83567e43 1650 return 0;
1651 }
d92624dc 1652
83567e43 1653 attrs.flags = SSH_FILEXFER_ATTR_PERMISSIONS; /* perms _only_ */
1654 oldperms = attrs.permissions & 07777;
1655 attrs.permissions &= ~ctx->attrs_clr;
1656 attrs.permissions ^= ctx->attrs_xor;
1657 newperms = attrs.permissions & 07777;
1bc24185 1658
83567e43 1659 if (oldperms == newperms)
1660 return 1; /* no need to do anything! */
1bc24185 1661
83567e43 1662 sftp_register(req = fxp_setstat_send(fname, attrs));
1663 rreq = sftp_find_request(pktin = sftp_recv());
1664 assert(rreq == req);
1665 result = fxp_setstat_recv(pktin, rreq);
1bc24185 1666
83567e43 1667 if (!result) {
1668 printf("set attrs for %s: %s\n", fname, fxp_error());
83567e43 1669 return 0;
d92624dc 1670 }
d92624dc 1671
83567e43 1672 printf("%s: %04o -> %04o\n", fname, oldperms, newperms);
1673
df49ff19 1674 return 1;
9954aaa3 1675}
1676
d92624dc 1677int sftp_cmd_chmod(struct sftp_command *cmd)
1678{
83567e43 1679 char *mode;
1680 int i, ret;
1681 struct sftp_context_chmod actx, *ctx = &actx;
d92624dc 1682
fa3db767 1683 if (back == NULL) {
38f0c08e 1684 not_connected();
fa3db767 1685 return 0;
1686 }
1687
d92624dc 1688 if (cmd->nwords < 3) {
1689 printf("chmod: expects a mode specifier and a filename\n");
1690 return 0;
1691 }
1692
1693 /*
1694 * Attempt to parse the mode specifier in cmd->words[1]. We
1695 * don't support the full horror of Unix chmod; instead we
1696 * support a much simpler syntax in which the user can either
1697 * specify an octal number, or a comma-separated sequence of
1698 * [ugoa]*[-+=][rwxst]+. (The initial [ugoa] sequence may
1699 * _only_ be omitted if the only attribute mentioned is t,
1700 * since all others require a user/group/other specification.
1701 * Additionally, the s attribute may not be specified for any
1702 * [ugoa] specifications other than exactly u or exactly g.
1703 */
83567e43 1704 ctx->attrs_clr = ctx->attrs_xor = 0;
d92624dc 1705 mode = cmd->words[1];
1706 if (mode[0] >= '0' && mode[0] <= '9') {
1707 if (mode[strspn(mode, "01234567")]) {
1708 printf("chmod: numeric file modes should"
1709 " contain digits 0-7 only\n");
1710 return 0;
1711 }
83567e43 1712 ctx->attrs_clr = 07777;
1713 sscanf(mode, "%o", &ctx->attrs_xor);
1714 ctx->attrs_xor &= ctx->attrs_clr;
d92624dc 1715 } else {
1716 while (*mode) {
1717 char *modebegin = mode;
1718 unsigned subset, perms;
1719 int action;
1720
1721 subset = 0;
1722 while (*mode && *mode != ',' &&
1723 *mode != '+' && *mode != '-' && *mode != '=') {
1724 switch (*mode) {
1725 case 'u': subset |= 04700; break; /* setuid, user perms */
1726 case 'g': subset |= 02070; break; /* setgid, group perms */
1727 case 'o': subset |= 00007; break; /* just other perms */
1728 case 'a': subset |= 06777; break; /* all of the above */
1729 default:
1730 printf("chmod: file mode '%.*s' contains unrecognised"
1731 " user/group/other specifier '%c'\n",
b51259f6 1732 (int)strcspn(modebegin, ","), modebegin, *mode);
d92624dc 1733 return 0;
1734 }
1735 mode++;
1736 }
1737 if (!*mode || *mode == ',') {
1738 printf("chmod: file mode '%.*s' is incomplete\n",
b51259f6 1739 (int)strcspn(modebegin, ","), modebegin);
d92624dc 1740 return 0;
1741 }
1742 action = *mode++;
1743 if (!*mode || *mode == ',') {
1744 printf("chmod: file mode '%.*s' is incomplete\n",
b51259f6 1745 (int)strcspn(modebegin, ","), modebegin);
d92624dc 1746 return 0;
1747 }
1748 perms = 0;
1749 while (*mode && *mode != ',') {
1750 switch (*mode) {
1751 case 'r': perms |= 00444; break;
1752 case 'w': perms |= 00222; break;
1753 case 'x': perms |= 00111; break;
1754 case 't': perms |= 01000; subset |= 01000; break;
1755 case 's':
1756 if ((subset & 06777) != 04700 &&
1757 (subset & 06777) != 02070) {
1758 printf("chmod: file mode '%.*s': set[ug]id bit should"
1759 " be used with exactly one of u or g only\n",
b51259f6 1760 (int)strcspn(modebegin, ","), modebegin);
d92624dc 1761 return 0;
1762 }
1763 perms |= 06000;
1764 break;
1765 default:
1766 printf("chmod: file mode '%.*s' contains unrecognised"
1767 " permission specifier '%c'\n",
b51259f6 1768 (int)strcspn(modebegin, ","), modebegin, *mode);
d92624dc 1769 return 0;
1770 }
1771 mode++;
1772 }
1773 if (!(subset & 06777) && (perms &~ subset)) {
1774 printf("chmod: file mode '%.*s' contains no user/group/other"
1775 " specifier and permissions other than 't' \n",
b51259f6 1776 (int)strcspn(modebegin, ","), modebegin);
d92624dc 1777 return 0;
1778 }
1779 perms &= subset;
1780 switch (action) {
1781 case '+':
83567e43 1782 ctx->attrs_clr |= perms;
1783 ctx->attrs_xor |= perms;
d92624dc 1784 break;
1785 case '-':
83567e43 1786 ctx->attrs_clr |= perms;
1787 ctx->attrs_xor &= ~perms;
d92624dc 1788 break;
1789 case '=':
83567e43 1790 ctx->attrs_clr |= subset;
1791 ctx->attrs_xor |= perms;
d92624dc 1792 break;
1793 }
1794 if (*mode) mode++; /* eat comma */
1795 }
1796 }
1797
83567e43 1798 ret = 1;
1799 for (i = 2; i < cmd->nwords; i++)
1800 ret &= wildcard_iterate(cmd->words[i], sftp_action_chmod, ctx);
d92624dc 1801
83567e43 1802 return ret;
d92624dc 1803}
9954aaa3 1804
fa3db767 1805static int sftp_cmd_open(struct sftp_command *cmd)
1806{
f11233cb 1807 int portnumber;
1808
fa3db767 1809 if (back != NULL) {
1810 printf("psftp: already connected\n");
1811 return 0;
1812 }
1813
1814 if (cmd->nwords < 2) {
1815 printf("open: expects a host name\n");
1816 return 0;
1817 }
1818
f11233cb 1819 if (cmd->nwords > 2) {
1820 portnumber = atoi(cmd->words[2]);
1821 if (portnumber == 0) {
1822 printf("open: invalid port number\n");
1823 return 0;
1824 }
1825 } else
1826 portnumber = 0;
1827
1828 if (psftp_connect(cmd->words[1], NULL, portnumber)) {
fa3db767 1829 back = NULL; /* connection is already closed */
1830 return -1; /* this is fatal */
1831 }
1832 do_sftp_init();
df49ff19 1833 return 1;
fa3db767 1834}
1835
3af97463 1836static int sftp_cmd_lcd(struct sftp_command *cmd)
1837{
d6cc41e6 1838 char *currdir, *errmsg;
3af97463 1839
1840 if (cmd->nwords < 2) {
1841 printf("lcd: expects a local directory name\n");
1842 return 0;
1843 }
1844
d6cc41e6 1845 errmsg = psftp_lcd(cmd->words[1]);
1846 if (errmsg) {
1847 printf("lcd: unable to change directory: %s\n", errmsg);
1848 sfree(errmsg);
3af97463 1849 return 0;
1850 }
1851
d6cc41e6 1852 currdir = psftp_getcwd();
3af97463 1853 printf("New local directory is %s\n", currdir);
1854 sfree(currdir);
1855
1856 return 1;
1857}
1858
1859static int sftp_cmd_lpwd(struct sftp_command *cmd)
1860{
1861 char *currdir;
3af97463 1862
d6cc41e6 1863 currdir = psftp_getcwd();
3af97463 1864 printf("Current local directory is %s\n", currdir);
1865 sfree(currdir);
1866
1867 return 1;
1868}
1869
1870static int sftp_cmd_pling(struct sftp_command *cmd)
1871{
1872 int exitcode;
1873
1874 exitcode = system(cmd->words[1]);
1875 return (exitcode == 0);
1876}
1877
bf5240cd 1878static int sftp_cmd_help(struct sftp_command *cmd);
1879
4c7f0d61 1880static struct sftp_cmd_lookup {
1881 char *name;
bf5240cd 1882 /*
1883 * For help purposes, there are two kinds of command:
1884 *
1885 * - primary commands, in which `longhelp' is non-NULL. In
1886 * this case `shorthelp' is descriptive text, and `longhelp'
1887 * is longer descriptive text intended to be printed after
1888 * the command name.
1889 *
1890 * - alias commands, in which `longhelp' is NULL. In this case
1891 * `shorthelp' is the name of a primary command, which
1892 * contains the help that should double up for this command.
1893 */
3af97463 1894 int listed; /* do we list this in primary help? */
bf5240cd 1895 char *shorthelp;
1896 char *longhelp;
32874aea 1897 int (*obey) (struct sftp_command *);
4c7f0d61 1898} sftp_lookup[] = {
1899 /*
1900 * List of sftp commands. This is binary-searched so it MUST be
1901 * in ASCII order.
1902 */
32874aea 1903 {
d6cc41e6 1904 "!", TRUE, "run a local command",
3af97463 1905 "<command>\n"
d6cc41e6 1906 /* FIXME: this example is crap for non-Windows. */
1907 " Runs a local command. For example, \"!del myfile\".\n",
3af97463 1908 sftp_cmd_pling
1909 },
1910 {
1911 "bye", TRUE, "finish your SFTP session",
bf5240cd 1912 "\n"
1913 " Terminates your SFTP session and quits the PSFTP program.\n",
1914 sftp_cmd_quit
1915 },
1916 {
3af97463 1917 "cd", TRUE, "change your remote working directory",
c1b8799b 1918 " [ <new working directory> ]\n"
bf5240cd 1919 " Change the remote working directory for your SFTP session.\n"
1920 " If a new working directory is not supplied, you will be\n"
1921 " returned to your home directory.\n",
1922 sftp_cmd_cd
1923 },
1924 {
3af97463 1925 "chmod", TRUE, "change file permissions and modes",
c1b8799b 1926 " <modes> <filename-or-wildcard> [ <filename-or-wildcard>... ]\n"
1927 " Change the file permissions on one or more remote files or\n"
1928 " directories.\n"
1929 " <modes> can be any octal Unix permission specifier.\n"
1930 " Alternatively, <modes> can include the following modifiers:\n"
bf5240cd 1931 " u+r make file readable by owning user\n"
1932 " u+w make file writable by owning user\n"
1933 " u+x make file executable by owning user\n"
1934 " u-r make file not readable by owning user\n"
1935 " [also u-w, u-x]\n"
1936 " g+r make file readable by members of owning group\n"
1937 " [also g+w, g+x, g-r, g-w, g-x]\n"
1938 " o+r make file readable by all other users\n"
1939 " [also o+w, o+x, o-r, o-w, o-x]\n"
1940 " a+r make file readable by absolutely everybody\n"
1941 " [also a+w, a+x, a-r, a-w, a-x]\n"
1942 " u+s enable the Unix set-user-ID bit\n"
1943 " u-s disable the Unix set-user-ID bit\n"
1944 " g+s enable the Unix set-group-ID bit\n"
1945 " g-s disable the Unix set-group-ID bit\n"
1946 " +t enable the Unix \"sticky bit\"\n"
1947 " You can give more than one modifier for the same user (\"g-rwx\"), and\n"
1948 " more than one user for the same modifier (\"ug+w\"). You can\n"
1949 " use commas to separate different modifiers (\"u+rwx,g+s\").\n",
1950 sftp_cmd_chmod
1951 },
1952 {
b614ce89 1953 "close", TRUE, "finish your SFTP session but do not quit PSFTP",
1954 "\n"
1955 " Terminates your SFTP session, but does not quit the PSFTP\n"
1956 " program. You can then use \"open\" to start another SFTP\n"
1957 " session, to the same server or to a different one.\n",
1958 sftp_cmd_close
1959 },
1960 {
c1b8799b 1961 "del", TRUE, "delete files on the remote server",
1962 " <filename-or-wildcard> [ <filename-or-wildcard>... ]\n"
1963 " Delete a file or files from the server.\n",
bf5240cd 1964 sftp_cmd_rm
1965 },
1966 {
3af97463 1967 "delete", FALSE, "del", NULL, sftp_cmd_rm
bf5240cd 1968 },
1969 {
c1b8799b 1970 "dir", TRUE, "list remote files",
9033711a 1971 " [ <directory-name> ]/[ <wildcard> ]\n"
bf5240cd 1972 " List the contents of a specified directory on the server.\n"
1973 " If <directory-name> is not given, the current working directory\n"
9033711a 1974 " is assumed.\n"
1975 " If <wildcard> is given, it is treated as a set of files to\n"
1976 " list; otherwise, all files are listed.\n",
bf5240cd 1977 sftp_cmd_ls
1978 },
1979 {
3af97463 1980 "exit", TRUE, "bye", NULL, sftp_cmd_quit
bf5240cd 1981 },
1982 {
3af97463 1983 "get", TRUE, "download a file from the server to your local machine",
9033711a 1984 " [ -r ] [ -- ] <filename> [ <local-filename> ]\n"
bf5240cd 1985 " Downloads a file on the server and stores it locally under\n"
1986 " the same name, or under a different one if you supply the\n"
9033711a 1987 " argument <local-filename>.\n"
1988 " If -r specified, recursively fetch a directory.\n",
bf5240cd 1989 sftp_cmd_get
1990 },
1991 {
3af97463 1992 "help", TRUE, "give help",
bf5240cd 1993 " [ <command> [ <command> ... ] ]\n"
1994 " Give general help if no commands are specified.\n"
1995 " If one or more commands are specified, give specific help on\n"
1996 " those particular commands.\n",
1997 sftp_cmd_help
1998 },
1999 {
3af97463 2000 "lcd", TRUE, "change local working directory",
2001 " <local-directory-name>\n"
2002 " Change the local working directory of the PSFTP program (the\n"
2003 " default location where the \"get\" command will save files).\n",
2004 sftp_cmd_lcd
2005 },
2006 {
2007 "lpwd", TRUE, "print local working directory",
2008 "\n"
2009 " Print the local working directory of the PSFTP program (the\n"
2010 " default location where the \"get\" command will save files).\n",
2011 sftp_cmd_lpwd
2012 },
2013 {
2014 "ls", TRUE, "dir", NULL,
bf5240cd 2015 sftp_cmd_ls
2016 },
2017 {
9c77ddf6 2018 "mget", TRUE, "download multiple files at once",
9033711a 2019 " [ -r ] [ -- ] <filename-or-wildcard> [ <filename-or-wildcard>... ]\n"
9c77ddf6 2020 " Downloads many files from the server, storing each one under\n"
2021 " the same name it has on the server side. You can use wildcards\n"
9033711a 2022 " such as \"*.c\" to specify lots of files at once.\n"
2023 " If -r specified, recursively fetch files and directories.\n",
9c77ddf6 2024 sftp_cmd_mget
2025 },
2026 {
c1b8799b 2027 "mkdir", TRUE, "create directories on the remote server",
2028 " <directory-name> [ <directory-name>... ]\n"
2029 " Creates directories with the given names on the server.\n",
bf5240cd 2030 sftp_cmd_mkdir
2031 },
2032 {
9c77ddf6 2033 "mput", TRUE, "upload multiple files at once",
96515f61 2034 " [ -r ] [ -- ] <filename-or-wildcard> [ <filename-or-wildcard>... ]\n"
9c77ddf6 2035 " Uploads many files to the server, storing each one under the\n"
2036 " same name it has on the client side. You can use wildcards\n"
9033711a 2037 " such as \"*.c\" to specify lots of files at once.\n"
2038 " If -r specified, recursively store files and directories.\n",
9c77ddf6 2039 sftp_cmd_mput
2040 },
2041 {
c1b8799b 2042 "mv", TRUE, "move or rename file(s) on the remote server",
2043 " <source> [ <source>... ] <destination>\n"
2044 " Moves or renames <source>(s) on the server to <destination>,\n"
2045 " also on the server.\n"
2046 " If <destination> specifies an existing directory, then <source>\n"
2047 " may be a wildcard, and multiple <source>s may be given; all\n"
2048 " source files are moved into <destination>.\n"
2049 " Otherwise, <source> must specify a single file, which is moved\n"
2050 " or renamed so that it is accessible under the name <destination>.\n",
bf5240cd 2051 sftp_cmd_mv
2052 },
2053 {
3af97463 2054 "open", TRUE, "connect to a host",
f11233cb 2055 " [<user>@]<hostname> [<port>]\n"
fa3db767 2056 " Establishes an SFTP connection to a given host. Only usable\n"
c1b8799b 2057 " when you are not already connected to a server.\n",
fa3db767 2058 sftp_cmd_open
2059 },
2060 {
56542985 2061 "put", TRUE, "upload a file from your local machine to the server",
9033711a 2062 " [ -r ] [ -- ] <filename> [ <remote-filename> ]\n"
56542985 2063 " Uploads a file to the server and stores it there under\n"
2064 " the same name, or under a different one if you supply the\n"
9033711a 2065 " argument <remote-filename>.\n"
2066 " If -r specified, recursively store a directory.\n",
56542985 2067 sftp_cmd_put
2068 },
2069 {
3af97463 2070 "pwd", TRUE, "print your remote working directory",
4f2b387f 2071 "\n"
2072 " Print the current remote working directory for your SFTP session.\n",
2073 sftp_cmd_pwd
2074 },
2075 {
3af97463 2076 "quit", TRUE, "bye", NULL,
bf5240cd 2077 sftp_cmd_quit
2078 },
2079 {
c1b8799b 2080 "reget", TRUE, "continue downloading files",
9033711a 2081 " [ -r ] [ -- ] <filename> [ <local-filename> ]\n"
bf5240cd 2082 " Works exactly like the \"get\" command, but the local file\n"
2083 " must already exist. The download will begin at the end of the\n"
9033711a 2084 " file. This is for resuming a download that was interrupted.\n"
2085 " If -r specified, resume interrupted \"get -r\".\n",
bf5240cd 2086 sftp_cmd_reget
2087 },
2088 {
3af97463 2089 "ren", TRUE, "mv", NULL,
bf5240cd 2090 sftp_cmd_mv
2091 },
2092 {
3af97463 2093 "rename", FALSE, "mv", NULL,
bf5240cd 2094 sftp_cmd_mv
2095 },
2096 {
c1b8799b 2097 "reput", TRUE, "continue uploading files",
9033711a 2098 " [ -r ] [ -- ] <filename> [ <remote-filename> ]\n"
bf5240cd 2099 " Works exactly like the \"put\" command, but the remote file\n"
2100 " must already exist. The upload will begin at the end of the\n"
9033711a 2101 " file. This is for resuming an upload that was interrupted.\n"
2102 " If -r specified, resume interrupted \"put -r\".\n",
bf5240cd 2103 sftp_cmd_reput
2104 },
2105 {
3af97463 2106 "rm", TRUE, "del", NULL,
bf5240cd 2107 sftp_cmd_rm
2108 },
2109 {
c1b8799b 2110 "rmdir", TRUE, "remove directories on the remote server",
2111 " <directory-name> [ <directory-name>... ]\n"
bf5240cd 2112 " Removes the directory with the given name on the server.\n"
c1b8799b 2113 " The directory will not be removed unless it is empty.\n"
2114 " Wildcards may be used to specify multiple directories.\n",
bf5240cd 2115 sftp_cmd_rmdir
2116 }
2117};
2118
2119const struct sftp_cmd_lookup *lookup_command(char *name)
2120{
2121 int i, j, k, cmp;
2122
2123 i = -1;
2124 j = sizeof(sftp_lookup) / sizeof(*sftp_lookup);
2125 while (j - i > 1) {
2126 k = (j + i) / 2;
2127 cmp = strcmp(name, sftp_lookup[k].name);
2128 if (cmp < 0)
2129 j = k;
2130 else if (cmp > 0)
2131 i = k;
2132 else {
2133 return &sftp_lookup[k];
2134 }
2135 }
2136 return NULL;
2137}
2138
2139static int sftp_cmd_help(struct sftp_command *cmd)
2140{
2141 int i;
2142 if (cmd->nwords == 1) {
2143 /*
2144 * Give short help on each command.
2145 */
2146 int maxlen;
2147 maxlen = 0;
2148 for (i = 0; i < sizeof(sftp_lookup) / sizeof(*sftp_lookup); i++) {
3af97463 2149 int len;
2150 if (!sftp_lookup[i].listed)
2151 continue;
2152 len = strlen(sftp_lookup[i].name);
bf5240cd 2153 if (maxlen < len)
2154 maxlen = len;
2155 }
2156 for (i = 0; i < sizeof(sftp_lookup) / sizeof(*sftp_lookup); i++) {
2157 const struct sftp_cmd_lookup *lookup;
3af97463 2158 if (!sftp_lookup[i].listed)
2159 continue;
bf5240cd 2160 lookup = &sftp_lookup[i];
2161 printf("%-*s", maxlen+2, lookup->name);
2162 if (lookup->longhelp == NULL)
2163 lookup = lookup_command(lookup->shorthelp);
2164 printf("%s\n", lookup->shorthelp);
2165 }
2166 } else {
2167 /*
2168 * Give long help on specific commands.
2169 */
2170 for (i = 1; i < cmd->nwords; i++) {
2171 const struct sftp_cmd_lookup *lookup;
2172 lookup = lookup_command(cmd->words[i]);
2173 if (!lookup) {
2174 printf("help: %s: command not found\n", cmd->words[i]);
2175 } else {
2176 printf("%s", lookup->name);
2177 if (lookup->longhelp == NULL)
2178 lookup = lookup_command(lookup->shorthelp);
2179 printf("%s", lookup->longhelp);
2180 }
2181 }
2182 }
df49ff19 2183 return 1;
bf5240cd 2184}
4c7f0d61 2185
2186/* ----------------------------------------------------------------------
2187 * Command line reading and parsing.
2188 */
9954aaa3 2189struct sftp_command *sftp_getcmd(FILE *fp, int mode, int modeflags)
32874aea 2190{
4c7f0d61 2191 char *line;
4c7f0d61 2192 struct sftp_command *cmd;
2193 char *p, *q, *r;
2194 int quoting;
2195
3d88e64d 2196 cmd = snew(struct sftp_command);
4c7f0d61 2197 cmd->words = NULL;
2198 cmd->nwords = 0;
2199 cmd->wordssize = 0;
2200
2201 line = NULL;
39934deb 2202
2203 if (fp) {
2204 if (modeflags & 1)
2205 printf("psftp> ");
2206 line = fgetline(fp);
2207 } else {
65857773 2208 line = ssh_sftp_get_cmdline("psftp> ", back == NULL);
4c7f0d61 2209 }
39934deb 2210
2211 if (!line || !*line) {
2212 cmd->obey = sftp_cmd_quit;
2213 if ((mode == 0) || (modeflags & 1))
2214 printf("quit\n");
2215 return cmd; /* eof */
2216 }
2217
2218 line[strcspn(line, "\r\n")] = '\0';
2219
df49ff19 2220 if (modeflags & 1) {
2221 printf("%s\n", line);
2222 }
4c7f0d61 2223
4c7f0d61 2224 p = line;
3af97463 2225 while (*p && (*p == ' ' || *p == '\t'))
2226 p++;
2227
2228 if (*p == '!') {
2229 /*
2230 * Special case: the ! command. This is always parsed as
2231 * exactly two words: one containing the !, and the second
2232 * containing everything else on the line.
2233 */
2234 cmd->nwords = cmd->wordssize = 2;
3d88e64d 2235 cmd->words = sresize(cmd->words, cmd->wordssize, char *);
679539d7 2236 cmd->words[0] = dupstr("!");
2237 cmd->words[1] = dupstr(p+1);
3af97463 2238 } else {
2239
2240 /*
2241 * Parse the command line into words. The syntax is:
2242 * - double quotes are removed, but cause spaces within to be
2243 * treated as non-separating.
2244 * - a double-doublequote pair is a literal double quote, inside
2245 * _or_ outside quotes. Like this:
2246 *
2247 * firstword "second word" "this has ""quotes"" in" and""this""
2248 *
2249 * becomes
2250 *
2251 * >firstword<
2252 * >second word<
2253 * >this has "quotes" in<
2254 * >and"this"<
2255 */
4c7f0d61 2256 while (*p) {
3af97463 2257 /* skip whitespace */
2258 while (*p && (*p == ' ' || *p == '\t'))
2259 p++;
2260 /* mark start of word */
2261 q = r = p; /* q sits at start, r writes word */
2262 quoting = 0;
2263 while (*p) {
2264 if (!quoting && (*p == ' ' || *p == '\t'))
2265 break; /* reached end of word */
2266 else if (*p == '"' && p[1] == '"')
2267 p += 2, *r++ = '"'; /* a literal quote */
2268 else if (*p == '"')
2269 p++, quoting = !quoting;
2270 else
2271 *r++ = *p++;
2272 }
2273 if (*p)
2274 p++; /* skip over the whitespace */
2275 *r = '\0';
2276 if (cmd->nwords >= cmd->wordssize) {
2277 cmd->wordssize = cmd->nwords + 16;
3d88e64d 2278 cmd->words = sresize(cmd->words, cmd->wordssize, char *);
3af97463 2279 }
679539d7 2280 cmd->words[cmd->nwords++] = dupstr(q);
4c7f0d61 2281 }
4c7f0d61 2282 }
2283
39934deb 2284 sfree(line);
2285
4c7f0d61 2286 /*
2287 * Now parse the first word and assign a function.
2288 */
2289
2290 if (cmd->nwords == 0)
2291 cmd->obey = sftp_cmd_null;
2292 else {
bf5240cd 2293 const struct sftp_cmd_lookup *lookup;
2294 lookup = lookup_command(cmd->words[0]);
2295 if (!lookup)
2296 cmd->obey = sftp_cmd_unknown;
2297 else
2298 cmd->obey = lookup->obey;
4c7f0d61 2299 }
2300
2301 return cmd;
2302}
2303
774204f5 2304static int do_sftp_init(void)
32874aea 2305{
1bc24185 2306 struct sftp_packet *pktin;
2307 struct sftp_request *req, *rreq;
2308
4c7f0d61 2309 /*
2310 * Do protocol initialisation.
2311 */
2312 if (!fxp_init()) {
2313 fprintf(stderr,
32874aea 2314 "Fatal: unable to initialise SFTP: %s\n", fxp_error());
774204f5 2315 return 1; /* failure */
4c7f0d61 2316 }
2317
2318 /*
2319 * Find out where our home directory is.
2320 */
1bc24185 2321 sftp_register(req = fxp_realpath_send("."));
2322 rreq = sftp_find_request(pktin = sftp_recv());
2323 assert(rreq == req);
7b7de4f4 2324 homedir = fxp_realpath_recv(pktin, rreq);
1bc24185 2325
4c7f0d61 2326 if (!homedir) {
2327 fprintf(stderr,
2328 "Warning: failed to resolve home directory: %s\n",
2329 fxp_error());
2330 homedir = dupstr(".");
2331 } else {
2332 printf("Remote working directory is %s\n", homedir);
2333 }
2334 pwd = dupstr(homedir);
774204f5 2335 return 0;
fa3db767 2336}
2337
679539d7 2338void do_sftp_cleanup()
2339{
2340 char ch;
f11233cb 2341 if (back) {
2342 back->special(backhandle, TS_EOF);
2343 sftp_recvdata(&ch, 1);
2344 back->free(backhandle);
2345 sftp_cleanup_request();
65857773 2346 back = NULL;
2347 backhandle = NULL;
f11233cb 2348 }
679539d7 2349 if (pwd) {
2350 sfree(pwd);
2351 pwd = NULL;
2352 }
2353 if (homedir) {
2354 sfree(homedir);
2355 homedir = NULL;
2356 }
2357}
2358
fa3db767 2359void do_sftp(int mode, int modeflags, char *batchfile)
2360{
2361 FILE *fp;
df49ff19 2362 int ret;
4c7f0d61 2363
9954aaa3 2364 /*
2365 * Batch mode?
4c7f0d61 2366 */
9954aaa3 2367 if (mode == 0) {
2368
2369 /* ------------------------------------------------------------------
2370 * Now we're ready to do Real Stuff.
2371 */
2372 while (1) {
df49ff19 2373 struct sftp_command *cmd;
39934deb 2374 cmd = sftp_getcmd(NULL, 0, 0);
df49ff19 2375 if (!cmd)
2376 break;
679539d7 2377 ret = cmd->obey(cmd);
2378 if (cmd->words) {
2379 int i;
2380 for(i = 0; i < cmd->nwords; i++)
2381 sfree(cmd->words[i]);
2382 sfree(cmd->words);
2383 }
2384 sfree(cmd);
2385 if (ret < 0)
df49ff19 2386 break;
bf5240cd 2387 }
9954aaa3 2388 } else {
2389 fp = fopen(batchfile, "r");
2390 if (!fp) {
bf5240cd 2391 printf("Fatal: unable to open %s\n", batchfile);
2392 return;
9954aaa3 2393 }
2394 while (1) {
bf5240cd 2395 struct sftp_command *cmd;
2396 cmd = sftp_getcmd(fp, mode, modeflags);
2397 if (!cmd)
2398 break;
df49ff19 2399 ret = cmd->obey(cmd);
2400 if (ret < 0)
bf5240cd 2401 break;
df49ff19 2402 if (ret == 0) {
bf5240cd 2403 if (!(modeflags & 2))
9954aaa3 2404 break;
bf5240cd 2405 }
9954aaa3 2406 }
bf5240cd 2407 fclose(fp);
9954aaa3 2408
4c7f0d61 2409 }
4a8fc3c4 2410}
4c7f0d61 2411
4a8fc3c4 2412/* ----------------------------------------------------------------------
2413 * Dirty bits: integration with PuTTY.
2414 */
2415
2416static int verbose = 0;
2417
7bedb13c 2418/*
4a8fc3c4 2419 * Print an error message and perform a fatal exit.
2420 */
2421void fatalbox(char *fmt, ...)
2422{
57356d63 2423 char *str, *str2;
4a8fc3c4 2424 va_list ap;
2425 va_start(ap, fmt);
57356d63 2426 str = dupvprintf(fmt, ap);
2427 str2 = dupcat("Fatal: ", str, "\n", NULL);
2428 sfree(str);
4a8fc3c4 2429 va_end(ap);
57356d63 2430 fputs(str2, stderr);
2431 sfree(str2);
4a8fc3c4 2432
93b581bd 2433 cleanup_exit(1);
4a8fc3c4 2434}
1709795f 2435void modalfatalbox(char *fmt, ...)
2436{
57356d63 2437 char *str, *str2;
1709795f 2438 va_list ap;
2439 va_start(ap, fmt);
57356d63 2440 str = dupvprintf(fmt, ap);
2441 str2 = dupcat("Fatal: ", str, "\n", NULL);
2442 sfree(str);
1709795f 2443 va_end(ap);
57356d63 2444 fputs(str2, stderr);
2445 sfree(str2);
1709795f 2446
2447 cleanup_exit(1);
2448}
a8327734 2449void connection_fatal(void *frontend, char *fmt, ...)
4a8fc3c4 2450{
57356d63 2451 char *str, *str2;
4a8fc3c4 2452 va_list ap;
2453 va_start(ap, fmt);
57356d63 2454 str = dupvprintf(fmt, ap);
2455 str2 = dupcat("Fatal: ", str, "\n", NULL);
2456 sfree(str);
4a8fc3c4 2457 va_end(ap);
57356d63 2458 fputs(str2, stderr);
2459 sfree(str2);
4a8fc3c4 2460
93b581bd 2461 cleanup_exit(1);
4a8fc3c4 2462}
2463
6b78788a 2464void ldisc_send(void *handle, char *buf, int len, int interactive)
32874aea 2465{
4a8fc3c4 2466 /*
2467 * This is only here because of the calls to ldisc_send(NULL,
2468 * 0) in ssh.c. Nothing in PSFTP actually needs to use the
2469 * ldisc as an ldisc. So if we get called with any real data, I
2470 * want to know about it.
4c7f0d61 2471 */
4a8fc3c4 2472 assert(len == 0);
2473}
2474
2475/*
c44bf5bd 2476 * In psftp, all agent requests should be synchronous, so this is a
2477 * never-called stub.
2478 */
2479void agent_schedule_callback(void (*callback)(void *, void *, int),
2480 void *callback_ctx, void *data, int len)
2481{
2482 assert(!"We shouldn't be here");
2483}
2484
2485/*
4a8fc3c4 2486 * Receive a block of data from the SSH link. Block until all data
2487 * is available.
2488 *
2489 * To do this, we repeatedly call the SSH protocol module, with our
2490 * own trap in from_backend() to catch the data that comes back. We
2491 * do this until we have enough data.
2492 */
2493
32874aea 2494static unsigned char *outptr; /* where to put the data */
2495static unsigned outlen; /* how much data required */
4a8fc3c4 2496static unsigned char *pending = NULL; /* any spare data */
32874aea 2497static unsigned pendlen = 0, pendsize = 0; /* length and phys. size of buffer */
9fab77dc 2498int from_backend(void *frontend, int is_stderr, const char *data, int datalen)
32874aea 2499{
2500 unsigned char *p = (unsigned char *) data;
2501 unsigned len = (unsigned) datalen;
4a8fc3c4 2502
2503 /*
2504 * stderr data is just spouted to local stderr and otherwise
2505 * ignored.
2506 */
2507 if (is_stderr) {
bfa5400d 2508 if (len > 0)
2509 fwrite(data, 1, len, stderr);
5471d09a 2510 return 0;
4a8fc3c4 2511 }
2512
2513 /*
2514 * If this is before the real session begins, just return.
2515 */
2516 if (!outptr)
5471d09a 2517 return 0;
4a8fc3c4 2518
bfa5400d 2519 if ((outlen > 0) && (len > 0)) {
32874aea 2520 unsigned used = outlen;
2521 if (used > len)
2522 used = len;
2523 memcpy(outptr, p, used);
2524 outptr += used;
2525 outlen -= used;
2526 p += used;
2527 len -= used;
4a8fc3c4 2528 }
2529
2530 if (len > 0) {
32874aea 2531 if (pendsize < pendlen + len) {
2532 pendsize = pendlen + len + 4096;
3d88e64d 2533 pending = sresize(pending, pendsize, unsigned char);
32874aea 2534 }
2535 memcpy(pending + pendlen, p, len);
2536 pendlen += len;
4a8fc3c4 2537 }
5471d09a 2538
2539 return 0;
4a8fc3c4 2540}
edd0cb8a 2541int from_backend_untrusted(void *frontend_handle, const char *data, int len)
2542{
2543 /*
2544 * No "untrusted" output should get here (the way the code is
2545 * currently, it's all diverted by FLAG_STDERR).
2546 */
2547 assert(!"Unexpected call to from_backend_untrusted()");
2548 return 0; /* not reached */
2549}
32874aea 2550int sftp_recvdata(char *buf, int len)
2551{
2552 outptr = (unsigned char *) buf;
4a8fc3c4 2553 outlen = len;
2554
2555 /*
2556 * See if the pending-input block contains some of what we
2557 * need.
2558 */
2559 if (pendlen > 0) {
32874aea 2560 unsigned pendused = pendlen;
2561 if (pendused > outlen)
2562 pendused = outlen;
4a8fc3c4 2563 memcpy(outptr, pending, pendused);
32874aea 2564 memmove(pending, pending + pendused, pendlen - pendused);
4a8fc3c4 2565 outptr += pendused;
2566 outlen -= pendused;
32874aea 2567 pendlen -= pendused;
2568 if (pendlen == 0) {
2569 pendsize = 0;
2570 sfree(pending);
2571 pending = NULL;
2572 }
2573 if (outlen == 0)
2574 return 1;
4a8fc3c4 2575 }
2576
2577 while (outlen > 0) {
34580230 2578 if (back->exitcode(backhandle) >= 0 || ssh_sftp_loop_iteration() < 0)
32874aea 2579 return 0; /* doom */
4a8fc3c4 2580 }
2581
2582 return 1;
2583}
32874aea 2584int sftp_senddata(char *buf, int len)
2585{
776792d7 2586 back->send(backhandle, buf, len);
4a8fc3c4 2587 return 1;
2588}
2589
2590/*
4a8fc3c4 2591 * Short description of parameters.
2592 */
2593static void usage(void)
2594{
2595 printf("PuTTY Secure File Transfer (SFTP) client\n");
2596 printf("%s\n", ver);
90767715 2597 printf("Usage: psftp [options] [user@]host\n");
4a8fc3c4 2598 printf("Options:\n");
2285d016 2599 printf(" -V print version information and exit\n");
2600 printf(" -pgpfp print PGP key fingerprints and exit\n");
9954aaa3 2601 printf(" -b file use specified batchfile\n");
2602 printf(" -bc output batchfile commands\n");
2603 printf(" -be don't stop batchfile processing if errors\n");
4a8fc3c4 2604 printf(" -v show verbose messages\n");
e2a197cf 2605 printf(" -load sessname Load settings from saved session\n");
2606 printf(" -l user connect with specified username\n");
4a8fc3c4 2607 printf(" -P port connect to specified port\n");
2608 printf(" -pw passw login with specified password\n");
e2a197cf 2609 printf(" -1 -2 force use of particular SSH protocol version\n");
05581745 2610 printf(" -4 -6 force use of IPv4 or IPv6\n");
e2a197cf 2611 printf(" -C enable compression\n");
2612 printf(" -i key private key file for authentication\n");
e5708bc7 2613 printf(" -noagent disable use of Pageant\n");
2614 printf(" -agent enable use of Pageant\n");
e2a197cf 2615 printf(" -batch disable all interactive prompts\n");
93b581bd 2616 cleanup_exit(1);
4a8fc3c4 2617}
2618
dc108ebc 2619static void version(void)
2620{
2621 printf("psftp: %s\n", ver);
2622 cleanup_exit(1);
2623}
2624
4a8fc3c4 2625/*
fa3db767 2626 * Connect to a host.
4a8fc3c4 2627 */
fa3db767 2628static int psftp_connect(char *userhost, char *user, int portnumber)
4a8fc3c4 2629{
fa3db767 2630 char *host, *realhost;
cbe2d68f 2631 const char *err;
b51259f6 2632 void *logctx;
4a8fc3c4 2633
2634 /* Separate host and username */
2635 host = userhost;
2636 host = strrchr(host, '@');
2637 if (host == NULL) {
2638 host = userhost;
2639 } else {
2640 *host++ = '\0';
2641 if (user) {
32874aea 2642 printf("psftp: multiple usernames specified; using \"%s\"\n",
2643 user);
4a8fc3c4 2644 } else
2645 user = userhost;
2646 }
2647
18e62ad8 2648 /*
2649 * If we haven't loaded session details already (e.g., from -load),
2650 * try looking for a session called "host".
2651 */
2652 if (!loaded_session) {
2653 /* Try to load settings for `host' into a temporary config */
2654 Config cfg2;
2655 cfg2.host[0] = '\0';
2656 do_defaults(host, &cfg2);
2657 if (cfg2.host[0] != '\0') {
2658 /* Settings present and include hostname */
2659 /* Re-load data into the real config. */
2660 do_defaults(host, &cfg);
2661 } else {
2662 /* Session doesn't exist or mention a hostname. */
2663 /* Use `host' as a bare hostname. */
2664 strncpy(cfg.host, host, sizeof(cfg.host) - 1);
2665 cfg.host[sizeof(cfg.host) - 1] = '\0';
2666 }
2667 } else {
2668 /* Patch in hostname `host' to session details. */
32874aea 2669 strncpy(cfg.host, host, sizeof(cfg.host) - 1);
2670 cfg.host[sizeof(cfg.host) - 1] = '\0';
f133db8e 2671 }
2672
2673 /*
2674 * Force use of SSH. (If they got the protocol wrong we assume the
2675 * port is useless too.)
2676 */
2677 if (cfg.protocol != PROT_SSH) {
2678 cfg.protocol = PROT_SSH;
2679 cfg.port = 22;
4a8fc3c4 2680 }
2681
449925a6 2682 /*
4123fa9a 2683 * If saved session / Default Settings says SSH-1 (`1 only' or `1'),
2684 * then change it to SSH-2, on the grounds that that's more likely to
2685 * work for SFTP. (Can be overridden with `-1' option.)
2686 * But if it says `2 only' or `2', respect which.
2687 */
2688 if (cfg.sshprot != 2 && cfg.sshprot != 3)
2689 cfg.sshprot = 2;
2690
2691 /*
c0a81592 2692 * Enact command-line overrides.
2693 */
5555d393 2694 cmdline_run_saved(&cfg);
c0a81592 2695
2696 /*
449925a6 2697 * Trim leading whitespace off the hostname if it's there.
2698 */
2699 {
2700 int space = strspn(cfg.host, " \t");
2701 memmove(cfg.host, cfg.host+space, 1+strlen(cfg.host)-space);
2702 }
2703
2704 /* See if host is of the form user@host */
2705 if (cfg.host[0] != '\0') {
5dd103a8 2706 char *atsign = strrchr(cfg.host, '@');
449925a6 2707 /* Make sure we're not overflowing the user field */
2708 if (atsign) {
2709 if (atsign - cfg.host < sizeof cfg.username) {
2710 strncpy(cfg.username, cfg.host, atsign - cfg.host);
2711 cfg.username[atsign - cfg.host] = '\0';
2712 }
2713 memmove(cfg.host, atsign + 1, 1 + strlen(atsign + 1));
2714 }
2715 }
2716
2717 /*
2718 * Trim a colon suffix off the hostname if it's there.
2719 */
2720 cfg.host[strcspn(cfg.host, ":")] = '\0';
2721
cae0c023 2722 /*
2723 * Remove any remaining whitespace from the hostname.
2724 */
2725 {
2726 int p1 = 0, p2 = 0;
2727 while (cfg.host[p2] != '\0') {
2728 if (cfg.host[p2] != ' ' && cfg.host[p2] != '\t') {
2729 cfg.host[p1] = cfg.host[p2];
2730 p1++;
2731 }
2732 p2++;
2733 }
2734 cfg.host[p1] = '\0';
2735 }
2736
4a8fc3c4 2737 /* Set username */
2738 if (user != NULL && user[0] != '\0') {
32874aea 2739 strncpy(cfg.username, user, sizeof(cfg.username) - 1);
2740 cfg.username[sizeof(cfg.username) - 1] = '\0';
4a8fc3c4 2741 }
4a8fc3c4 2742
4a8fc3c4 2743 if (portnumber)
2744 cfg.port = portnumber;
2745
d27b4a18 2746 /*
2747 * Disable scary things which shouldn't be enabled for simple
2748 * things like SCP and SFTP: agent forwarding, port forwarding,
2749 * X forwarding.
2750 */
2751 cfg.x11_forward = 0;
2752 cfg.agentfwd = 0;
2753 cfg.portfwd[0] = cfg.portfwd[1] = '\0';
2754
bebf22d0 2755 /* Set up subsystem name. */
4a8fc3c4 2756 strcpy(cfg.remote_cmd, "sftp");
2757 cfg.ssh_subsys = TRUE;
2758 cfg.nopty = TRUE;
2759
bebf22d0 2760 /*
2e85c969 2761 * Set up fallback option, for SSH-1 servers or servers with the
bebf22d0 2762 * sftp subsystem not enabled but the server binary installed
2763 * in the usual place. We only support fallback on Unix
248c0c5a 2764 * systems, and we use a kludgy piece of shellery which should
2765 * try to find sftp-server in various places (the obvious
2766 * systemwide spots /usr/lib and /usr/local/lib, and then the
2767 * user's PATH) and finally give up.
bebf22d0 2768 *
248c0c5a 2769 * test -x /usr/lib/sftp-server && exec /usr/lib/sftp-server
2770 * test -x /usr/local/lib/sftp-server && exec /usr/local/lib/sftp-server
2771 * exec sftp-server
bebf22d0 2772 *
2773 * the idea being that this will attempt to use either of the
2774 * obvious pathnames and then give up, and when it does give up
2775 * it will print the preferred pathname in the error messages.
2776 */
2777 cfg.remote_cmd_ptr2 =
248c0c5a 2778 "test -x /usr/lib/sftp-server && exec /usr/lib/sftp-server\n"
2779 "test -x /usr/local/lib/sftp-server && exec /usr/local/lib/sftp-server\n"
2780 "exec sftp-server";
bebf22d0 2781 cfg.ssh_subsys2 = FALSE;
2782
4a8fc3c4 2783 back = &ssh_backend;
2784
79bf227b 2785 err = back->init(NULL, &backhandle, &cfg, cfg.host, cfg.port, &realhost,
2786 0, cfg.tcp_keepalives);
4a8fc3c4 2787 if (err != NULL) {
fa3db767 2788 fprintf(stderr, "ssh_init: %s\n", err);
4a8fc3c4 2789 return 1;
2790 }
c229ef97 2791 logctx = log_init(NULL, &cfg);
a8327734 2792 back->provide_logctx(backhandle, logctx);
d3fef4a5 2793 console_provide_logctx(logctx);
d6cc41e6 2794 while (!back->sendok(backhandle)) {
2795 if (ssh_sftp_loop_iteration() < 0) {
2796 fprintf(stderr, "ssh_init: error during SSH connection setup\n");
2797 return 1;
2798 }
2799 }
4a8fc3c4 2800 if (verbose && realhost != NULL)
2801 printf("Connected to %s\n", realhost);
679539d7 2802 if (realhost != NULL)
2803 sfree(realhost);
fa3db767 2804 return 0;
2805}
2806
c0a81592 2807void cmdline_error(char *p, ...)
2808{
2809 va_list ap;
86256dc6 2810 fprintf(stderr, "psftp: ");
c0a81592 2811 va_start(ap, p);
2812 vfprintf(stderr, p, ap);
2813 va_end(ap);
86256dc6 2814 fprintf(stderr, "\n try typing \"psftp -h\" for help\n");
c0a81592 2815 exit(1);
2816}
2817
fa3db767 2818/*
2819 * Main program. Parse arguments etc.
2820 */
d6cc41e6 2821int psftp_main(int argc, char *argv[])
fa3db767 2822{
2823 int i;
2824 int portnumber = 0;
2825 char *userhost, *user;
2826 int mode = 0;
2827 int modeflags = 0;
2828 char *batchfile = NULL;
86256dc6 2829 int errors = 0;
fa3db767 2830
b51259f6 2831 flags = FLAG_STDERR | FLAG_INTERACTIVE
2832#ifdef FLAG_SYNCAGENT
2833 | FLAG_SYNCAGENT
2834#endif
2835 ;
c0a81592 2836 cmdline_tooltype = TOOLTYPE_FILETRANSFER;
fa3db767 2837 sk_init();
2838
2839 userhost = user = NULL;
2840
18e62ad8 2841 /* Load Default Settings before doing anything else. */
2842 do_defaults(NULL, &cfg);
2843 loaded_session = FALSE;
2844
86256dc6 2845 errors = 0;
fa3db767 2846 for (i = 1; i < argc; i++) {
c0a81592 2847 int ret;
fa3db767 2848 if (argv[i][0] != '-') {
c0a81592 2849 if (userhost)
2850 usage();
2851 else
2852 userhost = dupstr(argv[i]);
2853 continue;
2854 }
5555d393 2855 ret = cmdline_process_param(argv[i], i+1<argc?argv[i+1]:NULL, 1, &cfg);
c0a81592 2856 if (ret == -2) {
2857 cmdline_error("option \"%s\" requires an argument", argv[i]);
2858 } else if (ret == 2) {
2859 i++; /* skip next argument */
2860 } else if (ret == 1) {
2861 /* We have our own verbosity in addition to `flags'. */
2862 if (flags & FLAG_VERBOSE)
2863 verbose = 1;
fa3db767 2864 } else if (strcmp(argv[i], "-h") == 0 ||
2865 strcmp(argv[i], "-?") == 0) {
2866 usage();
2285d016 2867 } else if (strcmp(argv[i], "-pgpfp") == 0) {
2868 pgp_fingerprints();
2869 return 1;
dc108ebc 2870 } else if (strcmp(argv[i], "-V") == 0) {
2871 version();
c0a81592 2872 } else if (strcmp(argv[i], "-batch") == 0) {
2873 console_batch_mode = 1;
fa3db767 2874 } else if (strcmp(argv[i], "-b") == 0 && i + 1 < argc) {
2875 mode = 1;
2876 batchfile = argv[++i];
d13c2ee9 2877 } else if (strcmp(argv[i], "-bc") == 0) {
fa3db767 2878 modeflags = modeflags | 1;
d13c2ee9 2879 } else if (strcmp(argv[i], "-be") == 0) {
fa3db767 2880 modeflags = modeflags | 2;
2881 } else if (strcmp(argv[i], "--") == 0) {
2882 i++;
2883 break;
2884 } else {
86256dc6 2885 cmdline_error("unknown option \"%s\"", argv[i]);
fa3db767 2886 }
2887 }
2888 argc -= i;
2889 argv += i;
2890 back = NULL;
2891
2892 /*
e1bb41d1 2893 * If the loaded session provides a hostname, and a hostname has not
2894 * otherwise been specified, pop it in `userhost' so that
2895 * `psftp -load sessname' is sufficient to start a session.
2896 */
2897 if (!userhost && cfg.host[0] != '\0') {
2898 userhost = dupstr(cfg.host);
2899 }
2900
2901 /*
fa3db767 2902 * If a user@host string has already been provided, connect to
2903 * it now.
2904 */
2905 if (userhost) {
679539d7 2906 int ret;
2907 ret = psftp_connect(userhost, user, portnumber);
2908 sfree(userhost);
2909 if (ret)
fa3db767 2910 return 1;
774204f5 2911 if (do_sftp_init())
2912 return 1;
fa3db767 2913 } else {
2914 printf("psftp: no hostname specified; use \"open host.name\""
679539d7 2915 " to connect\n");
fa3db767 2916 }
4c7f0d61 2917
9954aaa3 2918 do_sftp(mode, modeflags, batchfile);
4a8fc3c4 2919
6226c939 2920 if (back != NULL && back->connected(backhandle)) {
4a8fc3c4 2921 char ch;
51470298 2922 back->special(backhandle, TS_EOF);
4a8fc3c4 2923 sftp_recvdata(&ch, 1);
2924 }
b614ce89 2925 do_sftp_cleanup();
4a8fc3c4 2926 random_save_seed();
679539d7 2927 cmdline_cleanup();
2928 console_provide_logctx(NULL);
679539d7 2929 sk_cleanup();
4a8fc3c4 2930
4c7f0d61 2931 return 0;
2932}