Sebastian Kuschel reports that pfd_closing can be called for a socket
[u/mdw/putty] / psftp.c
CommitLineData
4c7f0d61 1/*
f4ff9455 2 * psftp.c: (platform-independent) front end for PSFTP.
4c7f0d61 3 */
4
5#include <stdio.h>
6#include <stdlib.h>
f9e162aa 7#include <stdarg.h>
4c7f0d61 8#include <assert.h>
d92624dc 9#include <limits.h>
4c7f0d61 10
4a8fc3c4 11#define PUTTY_DO_GLOBALS
12#include "putty.h"
d6cc41e6 13#include "psftp.h"
4a8fc3c4 14#include "storage.h"
15#include "ssh.h"
4c7f0d61 16#include "sftp.h"
17#include "int64.h"
18
42704c97 19const char *const appname = "PSFTP";
20
5471d09a 21/*
22 * Since SFTP is a request-response oriented protocol, it requires
23 * no buffer management: when we send data, we stop and wait for an
24 * acknowledgement _anyway_, and so we can't possibly overfill our
25 * send buffer.
26 */
27
fa3db767 28static int psftp_connect(char *userhost, char *user, int portnumber);
07534184 29static int do_sftp_init(void);
679539d7 30void do_sftp_cleanup();
fa3db767 31
4c7f0d61 32/* ----------------------------------------------------------------------
4c7f0d61 33 * sftp client state.
34 */
35
36char *pwd, *homedir;
6b78788a 37static Backend *back;
38static void *backhandle;
4a693cfc 39static Conf *conf;
bc06669b 40int sent_eof = FALSE;
4c7f0d61 41
42/* ----------------------------------------------------------------------
772e3166 43 * Manage sending requests and waiting for replies.
44 */
45struct sftp_packet *sftp_wait_for_reply(struct sftp_request *req)
46{
47 struct sftp_packet *pktin;
48 struct sftp_request *rreq;
49
50 sftp_register(req);
51 pktin = sftp_recv();
52 if (pktin == NULL)
53 connection_fatal(NULL, "did not receive SFTP response packet "
54 "from server");
55 rreq = sftp_find_request(pktin);
56 if (rreq != req)
57 connection_fatal(NULL, "unable to understand SFTP response packet "
58 "from server: %s", fxp_error());
59 return pktin;
60}
61
62/* ----------------------------------------------------------------------
4c7f0d61 63 * Higher-level helper functions used in commands.
64 */
65
66/*
f9e162aa 67 * Attempt to canonify a pathname starting from the pwd. If
68 * canonification fails, at least fall back to returning a _valid_
69 * pathname (though it may be ugly, eg /home/simon/../foobar).
4c7f0d61 70 */
32874aea 71char *canonify(char *name)
72{
f9e162aa 73 char *fullname, *canonname;
1bc24185 74 struct sftp_packet *pktin;
772e3166 75 struct sftp_request *req;
4a8fc3c4 76
f9e162aa 77 if (name[0] == '/') {
78 fullname = dupstr(name);
79 } else {
4a8fc3c4 80 char *slash;
32874aea 81 if (pwd[strlen(pwd) - 1] == '/')
4a8fc3c4 82 slash = "";
83 else
84 slash = "/";
85 fullname = dupcat(pwd, slash, name, NULL);
f9e162aa 86 }
4a8fc3c4 87
772e3166 88 req = fxp_realpath_send(fullname);
89 pktin = sftp_wait_for_reply(req);
90 canonname = fxp_realpath_recv(pktin, req);
4a8fc3c4 91
f9e162aa 92 if (canonname) {
93 sfree(fullname);
94 return canonname;
50d7e054 95 } else {
32874aea 96 /*
97 * Attempt number 2. Some FXP_REALPATH implementations
98 * (glibc-based ones, in particular) require the _whole_
99 * path to point to something that exists, whereas others
100 * (BSD-based) only require all but the last component to
101 * exist. So if the first call failed, we should strip off
102 * everything from the last slash onwards and try again,
103 * then put the final component back on.
104 *
105 * Special cases:
106 *
107 * - if the last component is "/." or "/..", then we don't
108 * bother trying this because there's no way it can work.
109 *
110 * - if the thing actually ends with a "/", we remove it
111 * before we start. Except if the string is "/" itself
112 * (although I can't see why we'd have got here if so,
113 * because surely "/" would have worked the first
114 * time?), in which case we don't bother.
115 *
116 * - if there's no slash in the string at all, give up in
117 * confusion (we expect at least one because of the way
118 * we constructed the string).
119 */
120
121 int i;
122 char *returnname;
123
124 i = strlen(fullname);
125 if (i > 2 && fullname[i - 1] == '/')
126 fullname[--i] = '\0'; /* strip trailing / unless at pos 0 */
127 while (i > 0 && fullname[--i] != '/');
128
129 /*
130 * Give up on special cases.
131 */
132 if (fullname[i] != '/' || /* no slash at all */
133 !strcmp(fullname + i, "/.") || /* ends in /. */
134 !strcmp(fullname + i, "/..") || /* ends in /.. */
135 !strcmp(fullname, "/")) {
136 return fullname;
137 }
138
139 /*
140 * Now i points at the slash. Deal with the final special
141 * case i==0 (ie the whole path was "/nonexistentfile").
142 */
143 fullname[i] = '\0'; /* separate the string */
144 if (i == 0) {
772e3166 145 req = fxp_realpath_send("/");
32874aea 146 } else {
772e3166 147 req = fxp_realpath_send(fullname);
32874aea 148 }
772e3166 149 pktin = sftp_wait_for_reply(req);
150 canonname = fxp_realpath_recv(pktin, req);
32874aea 151
e25883f8 152 if (!canonname) {
153 /* Even that failed. Restore our best guess at the
154 * constructed filename and give up */
155 fullname[i] = '/'; /* restore slash and last component */
156 return fullname;
157 }
32874aea 158
159 /*
160 * We have a canonical name for all but the last path
161 * component. Concatenate the last component and return.
162 */
163 returnname = dupcat(canonname,
164 canonname[strlen(canonname) - 1] ==
165 '/' ? "" : "/", fullname + i + 1, NULL);
166 sfree(fullname);
167 sfree(canonname);
168 return returnname;
50d7e054 169 }
4c7f0d61 170}
171
dcf8495c 172/*
173 * Return a pointer to the portion of str that comes after the last
174 * slash (or backslash or colon, if `local' is TRUE).
175 */
176static char *stripslashes(char *str, int local)
177{
178 char *p;
179
180 if (local) {
181 p = strchr(str, ':');
182 if (p) str = p+1;
183 }
184
185 p = strrchr(str, '/');
186 if (p) str = p+1;
187
188 if (local) {
189 p = strrchr(str, '\\');
190 if (p) str = p+1;
191 }
192
193 return str;
194}
195
4c7f0d61 196/*
93e86a8b 197 * qsort comparison routine for fxp_name structures. Sorts by real
198 * file name.
4c7f0d61 199 */
93e86a8b 200static int sftp_name_compare(const void *av, const void *bv)
32874aea 201{
7d2c1789 202 const struct fxp_name *const *a = (const struct fxp_name *const *) av;
203 const struct fxp_name *const *b = (const struct fxp_name *const *) bv;
204 return strcmp((*a)->filename, (*b)->filename);
4c7f0d61 205}
4c7f0d61 206
207/*
93e86a8b 208 * Likewise, but for a bare char *.
4f2b387f 209 */
93e86a8b 210static int bare_name_compare(const void *av, const void *bv)
4f2b387f 211{
93e86a8b 212 const char **a = (const char **) av;
213 const char **b = (const char **) bv;
214 return strcmp(*a, *b);
4f2b387f 215}
216
38f0c08e 217static void not_connected(void)
218{
219 printf("psftp: not connected to a host; use \"open host.name\"\n");
220}
221
93e86a8b 222/* ----------------------------------------------------------------------
223 * The meat of the `get' and `put' commands.
4c7f0d61 224 */
5079ee6d 225int sftp_get_file(char *fname, char *outfname, int recurse, int restart)
32874aea 226{
4c7f0d61 227 struct fxp_handle *fh;
1bc24185 228 struct sftp_packet *pktin;
772e3166 229 struct sftp_request *req;
c606c42d 230 struct fxp_xfer *xfer;
4c7f0d61 231 uint64 offset;
0ac1920c 232 WFile *file;
479fe1ba 233 int ret, shown_err = FALSE;
ee07dce4 234 struct fxp_attrs attrs;
4c7f0d61 235
93e86a8b 236 /*
237 * In recursive mode, see if we're dealing with a directory.
238 * (If we're not in recursive mode, we need not even check: the
239 * subsequent FXP_OPEN will return a usable error message.)
240 */
5079ee6d 241 if (recurse) {
93e86a8b 242 int result;
fa3db767 243
772e3166 244 req = fxp_stat_send(fname);
245 pktin = sftp_wait_for_reply(req);
246 result = fxp_stat_recv(pktin, req, &attrs);
9c77ddf6 247
5079ee6d 248 if (result &&
249 (attrs.flags & SSH_FILEXFER_ATTR_PERMISSIONS) &&
250 (attrs.permissions & 0040000)) {
93e86a8b 251
252 struct fxp_handle *dirhandle;
253 int nnames, namesize;
254 struct fxp_name **ournames;
255 struct fxp_names *names;
256 int i;
257
258 /*
259 * First, attempt to create the destination directory,
5079ee6d 260 * unless it already exists.
93e86a8b 261 */
5079ee6d 262 if (file_type(outfname) != FILE_TYPE_DIRECTORY &&
93e86a8b 263 !create_directory(outfname)) {
264 printf("%s: Cannot create directory\n", outfname);
265 return 0;
266 }
4c7f0d61 267
93e86a8b 268 /*
269 * Now get the list of filenames in the remote
270 * directory.
271 */
772e3166 272 req = fxp_opendir_send(fname);
273 pktin = sftp_wait_for_reply(req);
274 dirhandle = fxp_opendir_recv(pktin, req);
93e86a8b 275
276 if (!dirhandle) {
277 printf("%s: unable to open directory: %s\n",
278 fname, fxp_error());
279 return 0;
280 }
281 nnames = namesize = 0;
282 ournames = NULL;
283 while (1) {
284 int i;
285
772e3166 286 req = fxp_readdir_send(dirhandle);
287 pktin = sftp_wait_for_reply(req);
288 names = fxp_readdir_recv(pktin, req);
93e86a8b 289
290 if (names == NULL) {
291 if (fxp_error_type() == SSH_FX_EOF)
292 break;
293 printf("%s: reading directory: %s\n", fname, fxp_error());
e99bb8bf 294
295 req = fxp_close_send(dirhandle);
296 pktin = sftp_wait_for_reply(req);
297 fxp_close_recv(pktin, req);
298
93e86a8b 299 sfree(ournames);
300 return 0;
301 }
302 if (names->nnames == 0) {
303 fxp_free_names(names);
304 break;
305 }
306 if (nnames + names->nnames >= namesize) {
307 namesize += names->nnames + 128;
308 ournames = sresize(ournames, namesize, struct fxp_name *);
309 }
310 for (i = 0; i < names->nnames; i++)
e9d14678 311 if (strcmp(names->names[i].filename, ".") &&
5079ee6d 312 strcmp(names->names[i].filename, "..")) {
e9d14678 313 if (!vet_filename(names->names[i].filename)) {
314 printf("ignoring potentially dangerous server-"
315 "supplied filename '%s'\n",
316 names->names[i].filename);
317 } else {
318 ournames[nnames++] =
319 fxp_dup_name(&names->names[i]);
320 }
321 }
93e86a8b 322 fxp_free_names(names);
323 }
772e3166 324 req = fxp_close_send(dirhandle);
325 pktin = sftp_wait_for_reply(req);
326 fxp_close_recv(pktin, req);
93e86a8b 327
328 /*
329 * Sort the names into a clear order. This ought to
330 * make things more predictable when we're doing a
331 * reget of the same directory, just in case two
332 * readdirs on the same remote directory return a
333 * different order.
334 */
fb73b28d 335 if (nnames > 0)
336 qsort(ournames, nnames, sizeof(*ournames), sftp_name_compare);
93e86a8b 337
338 /*
339 * If we're in restart mode, find the last filename on
340 * this list that already exists. We may have to do a
341 * reget on _that_ file, but shouldn't have to do
342 * anything on the previous files.
343 *
344 * If none of them exists, of course, we start at 0.
345 */
346 i = 0;
60f9c221 347 if (restart) {
348 while (i < nnames) {
349 char *nextoutfname;
350 int ret;
9711e333 351 nextoutfname = dir_file_cat(outfname,
352 ournames[i]->filename);
60f9c221 353 ret = (file_type(nextoutfname) == FILE_TYPE_NONEXISTENT);
354 sfree(nextoutfname);
355 if (ret)
356 break;
357 i++;
358 }
359 if (i > 0)
360 i--;
361 }
93e86a8b 362
363 /*
364 * Now we're ready to recurse. Starting at ournames[i]
365 * and continuing on to the end of the list, we
366 * construct a new source and target file name, and
367 * call sftp_get_file again.
368 */
369 for (; i < nnames; i++) {
370 char *nextfname, *nextoutfname;
371 int ret;
372
373 nextfname = dupcat(fname, "/", ournames[i]->filename, NULL);
9711e333 374 nextoutfname = dir_file_cat(outfname, ournames[i]->filename);
5079ee6d 375 ret = sftp_get_file(nextfname, nextoutfname, recurse, restart);
93e86a8b 376 restart = FALSE; /* after first partial file, do full */
377 sfree(nextoutfname);
378 sfree(nextfname);
379 if (!ret) {
380 for (i = 0; i < nnames; i++) {
381 fxp_free_name(ournames[i]);
382 }
383 sfree(ournames);
384 return 0;
385 }
386 }
387
388 /*
389 * Done this recursion level. Free everything.
390 */
391 for (i = 0; i < nnames; i++) {
392 fxp_free_name(ournames[i]);
393 }
394 sfree(ournames);
395
396 return 1;
397 }
4c7f0d61 398 }
4c7f0d61 399
772e3166 400 req = fxp_stat_send(fname);
401 pktin = sftp_wait_for_reply(req);
402 if (!fxp_stat_recv(pktin, req, &attrs))
ee07dce4 403 attrs.flags = 0;
404
772e3166 405 req = fxp_open_send(fname, SSH_FXF_READ, NULL);
406 pktin = sftp_wait_for_reply(req);
407 fh = fxp_open_recv(pktin, req);
1bc24185 408
4c7f0d61 409 if (!fh) {
4dc846cd 410 printf("%s: open for read: %s\n", fname, fxp_error());
4c7f0d61 411 return 0;
412 }
d92624dc 413
414 if (restart) {
0ac1920c 415 file = open_existing_wfile(outfname, NULL);
d92624dc 416 } else {
ee07dce4 417 file = open_new_file(outfname, GET_PERMISSIONS(attrs));
d92624dc 418 }
419
0ac1920c 420 if (!file) {
4c7f0d61 421 printf("local: unable to open %s\n", outfname);
1bc24185 422
772e3166 423 req = fxp_close_send(fh);
424 pktin = sftp_wait_for_reply(req);
425 fxp_close_recv(pktin, req);
1bc24185 426
4c7f0d61 427 return 0;
428 }
429
d92624dc 430 if (restart) {
0ac1920c 431 char decbuf[30];
432 if (seek_file(file, uint64_make(0,0) , FROM_END) == -1) {
20c2ef84 433 close_wfile(file);
0ac1920c 434 printf("reget: cannot restart %s - file too large\n",
435 outfname);
772e3166 436 req = fxp_close_send(fh);
437 pktin = sftp_wait_for_reply(req);
438 fxp_close_recv(pktin, req);
0ac1920c 439
20c2ef84 440 return 0;
0ac1920c 441 }
442
443 offset = get_file_posn(file);
444 uint64_decimal(offset, decbuf);
445 printf("reget: restarting at file position %s\n", decbuf);
d92624dc 446 } else {
447 offset = uint64_make(0, 0);
448 }
4c7f0d61 449
d92624dc 450 printf("remote:%s => local:%s\n", fname, outfname);
4c7f0d61 451
452 /*
453 * FIXME: we can use FXP_FSTAT here to get the file size, and
454 * thus put up a progress bar.
455 */
df49ff19 456 ret = 1;
c606c42d 457 xfer = xfer_download_init(fh, offset);
df0870fc 458 while (!xfer_done(xfer)) {
c606c42d 459 void *vbuf;
460 int ret, len;
4c7f0d61 461 int wpos, wlen;
462
c606c42d 463 xfer_download_queue(xfer);
464 pktin = sftp_recv();
465 ret = xfer_download_gotpkt(xfer, pktin);
772e3166 466 if (ret <= 0) {
479fe1ba 467 if (!shown_err) {
468 printf("error while reading: %s\n", fxp_error());
469 shown_err = TRUE;
470 }
cb5488c5 471 if (ret == INT_MIN) /* pktin not even freed */
472 sfree(pktin);
c606c42d 473 ret = 0;
4c7f0d61 474 }
32874aea 475
c606c42d 476 while (xfer_download_data(xfer, &vbuf, &len)) {
477 unsigned char *buf = (unsigned char *)vbuf;
478
479 wpos = 0;
480 while (wpos < len) {
0ac1920c 481 wlen = write_to_file(file, buf + wpos, len - wpos);
c606c42d 482 if (wlen <= 0) {
483 printf("error while writing local file\n");
484 ret = 0;
485 xfer_set_error(xfer);
51618e4b 486 break;
c606c42d 487 }
488 wpos += wlen;
489 }
490 if (wpos < len) { /* we had an error */
df49ff19 491 ret = 0;
c606c42d 492 xfer_set_error(xfer);
4c7f0d61 493 }
9ff4e23d 494
495 sfree(vbuf);
df49ff19 496 }
4c7f0d61 497 }
498
c606c42d 499 xfer_cleanup(xfer);
500
0ac1920c 501 close_wfile(file);
1bc24185 502
772e3166 503 req = fxp_close_send(fh);
504 pktin = sftp_wait_for_reply(req);
505 fxp_close_recv(pktin, req);
1bc24185 506
df49ff19 507 return ret;
4c7f0d61 508}
509
5079ee6d 510int sftp_put_file(char *fname, char *outfname, int recurse, int restart)
32874aea 511{
4c7f0d61 512 struct fxp_handle *fh;
df0870fc 513 struct fxp_xfer *xfer;
1bc24185 514 struct sftp_packet *pktin;
772e3166 515 struct sftp_request *req;
4c7f0d61 516 uint64 offset;
0ac1920c 517 RFile *file;
df0870fc 518 int ret, err, eof;
ee07dce4 519 struct fxp_attrs attrs;
520 long permissions;
4c7f0d61 521
93e86a8b 522 /*
523 * In recursive mode, see if we're dealing with a directory.
524 * (If we're not in recursive mode, we need not even check: the
525 * subsequent fopen will return an error message.)
526 */
5079ee6d 527 if (recurse && file_type(fname) == FILE_TYPE_DIRECTORY) {
93e86a8b 528 int result;
529 int nnames, namesize;
530 char *name, **ournames;
531 DirHandle *dh;
532 int i;
4c7f0d61 533
5079ee6d 534 /*
535 * First, attempt to create the destination directory,
536 * unless it already exists.
537 */
772e3166 538 req = fxp_stat_send(outfname);
539 pktin = sftp_wait_for_reply(req);
540 result = fxp_stat_recv(pktin, req, &attrs);
5079ee6d 541 if (!result ||
542 !(attrs.flags & SSH_FILEXFER_ATTR_PERMISSIONS) ||
543 !(attrs.permissions & 0040000)) {
772e3166 544 req = fxp_mkdir_send(outfname);
545 pktin = sftp_wait_for_reply(req);
546 result = fxp_mkdir_recv(pktin, req);
93e86a8b 547
5079ee6d 548 if (!result) {
549 printf("%s: create directory: %s\n",
550 outfname, fxp_error());
551 return 0;
93e86a8b 552 }
553 }
554
555 /*
556 * Now get the list of filenames in the local directory.
557 */
93e86a8b 558 nnames = namesize = 0;
559 ournames = NULL;
9c77ddf6 560
5079ee6d 561 dh = open_directory(fname);
562 if (!dh) {
563 printf("%s: unable to open directory\n", fname);
564 return 0;
9c77ddf6 565 }
5079ee6d 566 while ((name = read_filename(dh)) != NULL) {
567 if (nnames >= namesize) {
568 namesize += 128;
569 ournames = sresize(ournames, namesize, char *);
570 }
571 ournames[nnames++] = name;
93e86a8b 572 }
5079ee6d 573 close_directory(dh);
93e86a8b 574
575 /*
576 * Sort the names into a clear order. This ought to make
577 * things more predictable when we're doing a reput of the
578 * same directory, just in case two readdirs on the same
579 * local directory return a different order.
580 */
fb73b28d 581 if (nnames > 0)
582 qsort(ournames, nnames, sizeof(*ournames), bare_name_compare);
93e86a8b 583
584 /*
585 * If we're in restart mode, find the last filename on this
586 * list that already exists. We may have to do a reput on
587 * _that_ file, but shouldn't have to do anything on the
588 * previous files.
589 *
590 * If none of them exists, of course, we start at 0.
591 */
592 i = 0;
60f9c221 593 if (restart) {
594 while (i < nnames) {
595 char *nextoutfname;
596 nextoutfname = dupcat(outfname, "/", ournames[i], NULL);
772e3166 597 req = fxp_stat_send(nextoutfname);
598 pktin = sftp_wait_for_reply(req);
599 result = fxp_stat_recv(pktin, req, &attrs);
60f9c221 600 sfree(nextoutfname);
601 if (!result)
602 break;
603 i++;
604 }
605 if (i > 0)
606 i--;
607 }
608
609 /*
610 * Now we're ready to recurse. Starting at ournames[i]
93e86a8b 611 * and continuing on to the end of the list, we
612 * construct a new source and target file name, and
613 * call sftp_put_file again.
614 */
615 for (; i < nnames; i++) {
616 char *nextfname, *nextoutfname;
617 int ret;
618
9711e333 619 nextfname = dir_file_cat(fname, ournames[i]);
93e86a8b 620 nextoutfname = dupcat(outfname, "/", ournames[i], NULL);
5079ee6d 621 ret = sftp_put_file(nextfname, nextoutfname, recurse, restart);
93e86a8b 622 restart = FALSE; /* after first partial file, do full */
623 sfree(nextoutfname);
624 sfree(nextfname);
625 if (!ret) {
626 for (i = 0; i < nnames; i++) {
627 sfree(ournames[i]);
628 }
629 sfree(ournames);
630 return 0;
631 }
632 }
633
634 /*
635 * Done this recursion level. Free everything.
636 */
637 for (i = 0; i < nnames; i++) {
638 sfree(ournames[i]);
639 }
640 sfree(ournames);
641
642 return 1;
4c7f0d61 643 }
644
ee07dce4 645 file = open_existing_file(fname, NULL, NULL, NULL, &permissions);
0ac1920c 646 if (!file) {
4c7f0d61 647 printf("local: unable to open %s\n", fname);
4c7f0d61 648 return 0;
649 }
ee07dce4 650 attrs.flags = 0;
651 PUT_PERMISSIONS(attrs, permissions);
d92624dc 652 if (restart) {
772e3166 653 req = fxp_open_send(outfname, SSH_FXF_WRITE, &attrs);
d92624dc 654 } else {
772e3166 655 req = fxp_open_send(outfname,
656 SSH_FXF_WRITE | SSH_FXF_CREAT | SSH_FXF_TRUNC,
657 &attrs);
d92624dc 658 }
772e3166 659 pktin = sftp_wait_for_reply(req);
660 fh = fxp_open_recv(pktin, req);
1bc24185 661
4c7f0d61 662 if (!fh) {
20c2ef84 663 close_rfile(file);
4dc846cd 664 printf("%s: open for write: %s\n", outfname, fxp_error());
4c7f0d61 665 return 0;
666 }
667
d92624dc 668 if (restart) {
669 char decbuf[30];
670 struct fxp_attrs attrs;
1bc24185 671 int ret;
672
772e3166 673 req = fxp_fstat_send(fh);
674 pktin = sftp_wait_for_reply(req);
675 ret = fxp_fstat_recv(pktin, req, &attrs);
1bc24185 676
677 if (!ret) {
20c2ef84 678 close_rfile(file);
d92624dc 679 printf("read size of %s: %s\n", outfname, fxp_error());
d92624dc 680 return 0;
681 }
682 if (!(attrs.flags & SSH_FILEXFER_ATTR_SIZE)) {
20c2ef84 683 close_rfile(file);
d92624dc 684 printf("read size of %s: size was not given\n", outfname);
d92624dc 685 return 0;
686 }
687 offset = attrs.size;
688 uint64_decimal(offset, decbuf);
689 printf("reput: restarting at file position %s\n", decbuf);
0ac1920c 690
691 if (seek_file((WFile *)file, offset, FROM_START) != 0)
692 seek_file((WFile *)file, uint64_make(0,0), FROM_END); /* *shrug* */
d92624dc 693 } else {
694 offset = uint64_make(0, 0);
695 }
4c7f0d61 696
d92624dc 697 printf("local:%s => remote:%s\n", fname, outfname);
4c7f0d61 698
699 /*
700 * FIXME: we can use FXP_FSTAT here to get the file size, and
701 * thus put up a progress bar.
702 */
df49ff19 703 ret = 1;
df0870fc 704 xfer = xfer_upload_init(fh, offset);
705 err = eof = 0;
706 while ((!err && !eof) || !xfer_done(xfer)) {
4c7f0d61 707 char buffer[4096];
1bc24185 708 int len, ret;
4c7f0d61 709
df0870fc 710 while (xfer_upload_ready(xfer) && !err && !eof) {
0ac1920c 711 len = read_from_file(file, buffer, sizeof(buffer));
df0870fc 712 if (len == -1) {
713 printf("error while reading local file\n");
714 err = 1;
715 } else if (len == 0) {
716 eof = 1;
717 } else {
718 xfer_upload_data(xfer, buffer, len);
719 }
4c7f0d61 720 }
1bc24185 721
2dbd915a 722 if (!xfer_done(xfer)) {
723 pktin = sftp_recv();
724 ret = xfer_upload_gotpkt(xfer, pktin);
cb5488c5 725 if (ret <= 0) {
726 if (ret == INT_MIN) /* pktin not even freed */
727 sfree(pktin);
728 if (!err) {
729 printf("error while writing: %s\n", fxp_error());
730 err = 1;
731 }
2dbd915a 732 }
4c7f0d61 733 }
4c7f0d61 734 }
735
df0870fc 736 xfer_cleanup(xfer);
737
772e3166 738 req = fxp_close_send(fh);
739 pktin = sftp_wait_for_reply(req);
740 fxp_close_recv(pktin, req);
1bc24185 741
0ac1920c 742 close_rfile(file);
93e86a8b 743
744 return ret;
745}
746
747/* ----------------------------------------------------------------------
5079ee6d 748 * A remote wildcard matcher, providing a similar interface to the
749 * local one in psftp.h.
750 */
751
752typedef struct SftpWildcardMatcher {
753 struct fxp_handle *dirh;
754 struct fxp_names *names;
755 int namepos;
756 char *wildcard, *prefix;
757} SftpWildcardMatcher;
758
759SftpWildcardMatcher *sftp_begin_wildcard_matching(char *name)
760{
761 struct sftp_packet *pktin;
772e3166 762 struct sftp_request *req;
5079ee6d 763 char *wildcard;
764 char *unwcdir, *tmpdir, *cdir;
765 int len, check;
766 SftpWildcardMatcher *swcm;
767 struct fxp_handle *dirh;
768
769 /*
770 * We don't handle multi-level wildcards; so we expect to find
771 * a fully specified directory part, followed by a wildcard
772 * after that.
773 */
774 wildcard = stripslashes(name, 0);
775
776 unwcdir = dupstr(name);
777 len = wildcard - name;
778 unwcdir[len] = '\0';
779 if (len > 0 && unwcdir[len-1] == '/')
780 unwcdir[len-1] = '\0';
781 tmpdir = snewn(1 + len, char);
782 check = wc_unescape(tmpdir, unwcdir);
783 sfree(tmpdir);
784
785 if (!check) {
786 printf("Multiple-level wildcards are not supported\n");
787 sfree(unwcdir);
788 return NULL;
789 }
790
791 cdir = canonify(unwcdir);
792
772e3166 793 req = fxp_opendir_send(cdir);
794 pktin = sftp_wait_for_reply(req);
795 dirh = fxp_opendir_recv(pktin, req);
5079ee6d 796
797 if (dirh) {
798 swcm = snew(SftpWildcardMatcher);
799 swcm->dirh = dirh;
800 swcm->names = NULL;
801 swcm->wildcard = dupstr(wildcard);
802 swcm->prefix = unwcdir;
803 } else {
804 printf("Unable to open %s: %s\n", cdir, fxp_error());
805 swcm = NULL;
806 sfree(unwcdir);
807 }
808
809 sfree(cdir);
810
811 return swcm;
812}
813
814char *sftp_wildcard_get_filename(SftpWildcardMatcher *swcm)
815{
816 struct fxp_name *name;
817 struct sftp_packet *pktin;
772e3166 818 struct sftp_request *req;
5079ee6d 819
820 while (1) {
821 if (swcm->names && swcm->namepos >= swcm->names->nnames) {
822 fxp_free_names(swcm->names);
823 swcm->names = NULL;
824 }
825
826 if (!swcm->names) {
772e3166 827 req = fxp_readdir_send(swcm->dirh);
828 pktin = sftp_wait_for_reply(req);
829 swcm->names = fxp_readdir_recv(pktin, req);
5079ee6d 830
831 if (!swcm->names) {
832 if (fxp_error_type() != SSH_FX_EOF)
833 printf("%s: reading directory: %s\n", swcm->prefix,
834 fxp_error());
835 return NULL;
6df3c104 836 } else if (swcm->names->nnames == 0) {
837 /*
838 * Another failure mode which we treat as EOF is if
839 * the server reports success from FXP_READDIR but
840 * returns no actual names. This is unusual, since
841 * from most servers you'd expect at least "." and
842 * "..", but there's nothing forbidding a server from
843 * omitting those if it wants to.
844 */
845 return NULL;
846 }
5079ee6d 847
848 swcm->namepos = 0;
849 }
850
851 assert(swcm->names && swcm->namepos < swcm->names->nnames);
852
853 name = &swcm->names->names[swcm->namepos++];
854
855 if (!strcmp(name->filename, ".") || !strcmp(name->filename, ".."))
856 continue; /* expected bad filenames */
857
858 if (!vet_filename(name->filename)) {
859 printf("ignoring potentially dangerous server-"
860 "supplied filename '%s'\n", name->filename);
861 continue; /* unexpected bad filename */
862 }
863
864 if (!wc_match(swcm->wildcard, name->filename))
865 continue; /* doesn't match the wildcard */
866
867 /*
868 * We have a working filename. Return it.
869 */
870 return dupprintf("%s%s%s", swcm->prefix,
83567e43 871 (!swcm->prefix[0] ||
872 swcm->prefix[strlen(swcm->prefix)-1]=='/' ?
873 "" : "/"),
5079ee6d 874 name->filename);
875 }
876}
877
878void sftp_finish_wildcard_matching(SftpWildcardMatcher *swcm)
879{
880 struct sftp_packet *pktin;
772e3166 881 struct sftp_request *req;
5079ee6d 882
772e3166 883 req = fxp_close_send(swcm->dirh);
884 pktin = sftp_wait_for_reply(req);
885 fxp_close_recv(pktin, req);
5079ee6d 886
887 if (swcm->names)
888 fxp_free_names(swcm->names);
889
890 sfree(swcm->prefix);
891 sfree(swcm->wildcard);
892
893 sfree(swcm);
894}
895
83567e43 896/*
897 * General function to match a potential wildcard in a filename
898 * argument and iterate over every matching file. Used in several
899 * PSFTP commands (rmdir, rm, chmod, mv).
900 */
901int wildcard_iterate(char *filename, int (*func)(void *, char *), void *ctx)
902{
903 char *unwcfname, *newname, *cname;
904 int is_wc, ret;
905
906 unwcfname = snewn(strlen(filename)+1, char);
907 is_wc = !wc_unescape(unwcfname, filename);
908
909 if (is_wc) {
910 SftpWildcardMatcher *swcm = sftp_begin_wildcard_matching(filename);
911 int matched = FALSE;
912 sfree(unwcfname);
913
914 if (!swcm)
915 return 0;
916
917 ret = 1;
918
919 while ( (newname = sftp_wildcard_get_filename(swcm)) != NULL ) {
920 cname = canonify(newname);
921 if (!cname) {
4dc846cd 922 printf("%s: canonify: %s\n", newname, fxp_error());
83567e43 923 ret = 0;
924 }
c570c83a 925 sfree(newname);
83567e43 926 matched = TRUE;
927 ret &= func(ctx, cname);
928 sfree(cname);
929 }
930
931 if (!matched) {
932 /* Politely warn the user that nothing matched. */
933 printf("%s: nothing matched\n", filename);
934 }
935
936 sftp_finish_wildcard_matching(swcm);
937 } else {
938 cname = canonify(unwcfname);
939 if (!cname) {
4dc846cd 940 printf("%s: canonify: %s\n", filename, fxp_error());
83567e43 941 ret = 0;
942 }
943 ret = func(ctx, cname);
944 sfree(cname);
945 sfree(unwcfname);
946 }
947
948 return ret;
949}
950
951/*
952 * Handy helper function.
953 */
954int is_wildcard(char *name)
955{
956 char *unwcfname = snewn(strlen(name)+1, char);
957 int is_wc = !wc_unescape(unwcfname, name);
958 sfree(unwcfname);
959 return is_wc;
960}
961
5079ee6d 962/* ----------------------------------------------------------------------
93e86a8b 963 * Actual sftp commands.
964 */
965struct sftp_command {
966 char **words;
967 int nwords, wordssize;
968 int (*obey) (struct sftp_command *); /* returns <0 to quit */
969};
970
971int sftp_cmd_null(struct sftp_command *cmd)
972{
973 return 1; /* success */
974}
975
976int sftp_cmd_unknown(struct sftp_command *cmd)
977{
978 printf("psftp: unknown command \"%s\"\n", cmd->words[0]);
979 return 0; /* failure */
980}
981
982int sftp_cmd_quit(struct sftp_command *cmd)
983{
984 return -1;
985}
986
b614ce89 987int sftp_cmd_close(struct sftp_command *cmd)
988{
989 if (back == NULL) {
38f0c08e 990 not_connected();
b614ce89 991 return 0;
992 }
993
6226c939 994 if (back != NULL && back->connected(backhandle)) {
b614ce89 995 char ch;
996 back->special(backhandle, TS_EOF);
bc06669b 997 sent_eof = TRUE;
b614ce89 998 sftp_recvdata(&ch, 1);
999 }
1000 do_sftp_cleanup();
1001
1002 return 0;
1003}
1004
93e86a8b 1005/*
1006 * List a directory. If no arguments are given, list pwd; otherwise
1007 * list the directory given in words[1].
1008 */
1009int sftp_cmd_ls(struct sftp_command *cmd)
1010{
1011 struct fxp_handle *dirh;
1012 struct fxp_names *names;
1013 struct fxp_name **ournames;
1014 int nnames, namesize;
3394416c 1015 char *dir, *cdir, *unwcdir, *wildcard;
93e86a8b 1016 struct sftp_packet *pktin;
772e3166 1017 struct sftp_request *req;
93e86a8b 1018 int i;
1019
1020 if (back == NULL) {
38f0c08e 1021 not_connected();
93e86a8b 1022 return 0;
1023 }
1024
1025 if (cmd->nwords < 2)
1026 dir = ".";
1027 else
1028 dir = cmd->words[1];
1029
3394416c 1030 unwcdir = snewn(1 + strlen(dir), char);
1031 if (wc_unescape(unwcdir, dir)) {
1032 dir = unwcdir;
1033 wildcard = NULL;
1034 } else {
1035 char *tmpdir;
1036 int len, check;
1037
038ec85e 1038 sfree(unwcdir);
3394416c 1039 wildcard = stripslashes(dir, 0);
1040 unwcdir = dupstr(dir);
1041 len = wildcard - dir;
1042 unwcdir[len] = '\0';
1043 if (len > 0 && unwcdir[len-1] == '/')
1044 unwcdir[len-1] = '\0';
1045 tmpdir = snewn(1 + len, char);
1046 check = wc_unescape(tmpdir, unwcdir);
1047 sfree(tmpdir);
1048 if (!check) {
1049 printf("Multiple-level wildcards are not supported\n");
1050 sfree(unwcdir);
1051 return 0;
1052 }
1053 dir = unwcdir;
1054 }
1055
93e86a8b 1056 cdir = canonify(dir);
1057 if (!cdir) {
4dc846cd 1058 printf("%s: canonify: %s\n", dir, fxp_error());
3394416c 1059 sfree(unwcdir);
93e86a8b 1060 return 0;
1061 }
1062
1063 printf("Listing directory %s\n", cdir);
1064
772e3166 1065 req = fxp_opendir_send(cdir);
1066 pktin = sftp_wait_for_reply(req);
1067 dirh = fxp_opendir_recv(pktin, req);
93e86a8b 1068
1069 if (dirh == NULL) {
1070 printf("Unable to open %s: %s\n", dir, fxp_error());
1071 } else {
1072 nnames = namesize = 0;
1073 ournames = NULL;
1074
1075 while (1) {
1076
772e3166 1077 req = fxp_readdir_send(dirh);
1078 pktin = sftp_wait_for_reply(req);
1079 names = fxp_readdir_recv(pktin, req);
93e86a8b 1080
1081 if (names == NULL) {
1082 if (fxp_error_type() == SSH_FX_EOF)
1083 break;
1084 printf("Reading directory %s: %s\n", dir, fxp_error());
1085 break;
1086 }
1087 if (names->nnames == 0) {
1088 fxp_free_names(names);
1089 break;
1090 }
1091
1092 if (nnames + names->nnames >= namesize) {
1093 namesize += names->nnames + 128;
1094 ournames = sresize(ournames, namesize, struct fxp_name *);
1095 }
1096
1097 for (i = 0; i < names->nnames; i++)
3394416c 1098 if (!wildcard || wc_match(wildcard, names->names[i].filename))
1099 ournames[nnames++] = fxp_dup_name(&names->names[i]);
93e86a8b 1100
1101 fxp_free_names(names);
1102 }
772e3166 1103 req = fxp_close_send(dirh);
1104 pktin = sftp_wait_for_reply(req);
1105 fxp_close_recv(pktin, req);
93e86a8b 1106
1107 /*
1108 * Now we have our filenames. Sort them by actual file
1109 * name, and then output the longname parts.
1110 */
fb73b28d 1111 if (nnames > 0)
1112 qsort(ournames, nnames, sizeof(*ournames), sftp_name_compare);
93e86a8b 1113
1114 /*
1115 * And print them.
1116 */
1117 for (i = 0; i < nnames; i++) {
1118 printf("%s\n", ournames[i]->longname);
1119 fxp_free_name(ournames[i]);
1120 }
1121 sfree(ournames);
1122 }
1123
1124 sfree(cdir);
3394416c 1125 sfree(unwcdir);
93e86a8b 1126
1127 return 1;
1128}
1129
1130/*
1131 * Change directories. We do this by canonifying the new name, then
1132 * trying to OPENDIR it. Only if that succeeds do we set the new pwd.
1133 */
1134int sftp_cmd_cd(struct sftp_command *cmd)
1135{
1136 struct fxp_handle *dirh;
1137 struct sftp_packet *pktin;
772e3166 1138 struct sftp_request *req;
93e86a8b 1139 char *dir;
1140
1141 if (back == NULL) {
38f0c08e 1142 not_connected();
93e86a8b 1143 return 0;
1144 }
1145
1146 if (cmd->nwords < 2)
1147 dir = dupstr(homedir);
1148 else
1149 dir = canonify(cmd->words[1]);
1150
1151 if (!dir) {
4dc846cd 1152 printf("%s: canonify: %s\n", dir, fxp_error());
93e86a8b 1153 return 0;
1154 }
1155
772e3166 1156 req = fxp_opendir_send(dir);
1157 pktin = sftp_wait_for_reply(req);
1158 dirh = fxp_opendir_recv(pktin, req);
93e86a8b 1159
1160 if (!dirh) {
1161 printf("Directory %s: %s\n", dir, fxp_error());
1162 sfree(dir);
1163 return 0;
1164 }
1165
772e3166 1166 req = fxp_close_send(dirh);
1167 pktin = sftp_wait_for_reply(req);
1168 fxp_close_recv(pktin, req);
93e86a8b 1169
1170 sfree(pwd);
1171 pwd = dir;
1172 printf("Remote directory is now %s\n", pwd);
1173
1174 return 1;
1175}
1176
1177/*
1178 * Print current directory. Easy as pie.
1179 */
1180int sftp_cmd_pwd(struct sftp_command *cmd)
1181{
1182 if (back == NULL) {
38f0c08e 1183 not_connected();
93e86a8b 1184 return 0;
1185 }
1186
1187 printf("Remote directory is %s\n", pwd);
1188 return 1;
1189}
1190
1191/*
9c77ddf6 1192 * Get a file and save it at the local end. We have three very
1193 * similar commands here. The basic one is `get'; `reget' differs
1194 * in that it checks for the existence of the destination file and
1195 * starts from where a previous aborted transfer left off; `mget'
1196 * differs in that it interprets all its arguments as files to
1197 * transfer (never as a different local name for a remote file) and
1198 * can handle wildcards.
93e86a8b 1199 */
9c77ddf6 1200int sftp_general_get(struct sftp_command *cmd, int restart, int multiple)
93e86a8b 1201{
5079ee6d 1202 char *fname, *unwcfname, *origfname, *origwfname, *outfname;
93e86a8b 1203 int i, ret;
1204 int recurse = FALSE;
1205
1206 if (back == NULL) {
38f0c08e 1207 not_connected();
93e86a8b 1208 return 0;
1209 }
1210
1211 i = 1;
1212 while (i < cmd->nwords && cmd->words[i][0] == '-') {
1213 if (!strcmp(cmd->words[i], "--")) {
1214 /* finish processing options */
1215 i++;
1216 break;
1217 } else if (!strcmp(cmd->words[i], "-r")) {
1218 recurse = TRUE;
1219 } else {
9033711a 1220 printf("%s: unrecognised option '%s'\n", cmd->words[0], cmd->words[i]);
93e86a8b 1221 return 0;
1222 }
1223 i++;
1224 }
1225
1226 if (i >= cmd->nwords) {
9033711a 1227 printf("%s: expects a filename\n", cmd->words[0]);
93e86a8b 1228 return 0;
1229 }
1230
5079ee6d 1231 ret = 1;
9c77ddf6 1232 do {
5079ee6d 1233 SftpWildcardMatcher *swcm;
1234
9c77ddf6 1235 origfname = cmd->words[i++];
5079ee6d 1236 unwcfname = snewn(strlen(origfname)+1, char);
93e86a8b 1237
5079ee6d 1238 if (multiple && !wc_unescape(unwcfname, origfname)) {
1239 swcm = sftp_begin_wildcard_matching(origfname);
1240 if (!swcm) {
1241 sfree(unwcfname);
1242 continue;
1243 }
1244 origwfname = sftp_wildcard_get_filename(swcm);
1245 if (!origwfname) {
1246 /* Politely warn the user that nothing matched. */
1247 printf("%s: nothing matched\n", origfname);
1248 sftp_finish_wildcard_matching(swcm);
1249 sfree(unwcfname);
1250 continue;
1251 }
9c77ddf6 1252 } else {
5079ee6d 1253 origwfname = origfname;
1254 swcm = NULL;
1255 }
1256
1257 while (origwfname) {
1258 fname = canonify(origwfname);
1259
9c77ddf6 1260 if (!fname) {
af723f29 1261 sftp_finish_wildcard_matching(swcm);
4dc846cd 1262 printf("%s: canonify: %s\n", origwfname, fxp_error());
af723f29 1263 sfree(origwfname);
9c77ddf6 1264 sfree(unwcfname);
1265 return 0;
1266 }
93e86a8b 1267
9c77ddf6 1268 if (!multiple && i < cmd->nwords)
1269 outfname = cmd->words[i++];
1270 else
5079ee6d 1271 outfname = stripslashes(origwfname, 0);
93e86a8b 1272
5079ee6d 1273 ret = sftp_get_file(fname, outfname, recurse, restart);
9c77ddf6 1274
1275 sfree(fname);
5079ee6d 1276
1277 if (swcm) {
1278 sfree(origwfname);
1279 origwfname = sftp_wildcard_get_filename(swcm);
1280 } else {
1281 origwfname = NULL;
1282 }
9c77ddf6 1283 }
1284 sfree(unwcfname);
5079ee6d 1285 if (swcm)
1286 sftp_finish_wildcard_matching(swcm);
9c77ddf6 1287 if (!ret)
1288 return ret;
1289
1290 } while (multiple && i < cmd->nwords);
93e86a8b 1291
1292 return ret;
1293}
1294int sftp_cmd_get(struct sftp_command *cmd)
1295{
9c77ddf6 1296 return sftp_general_get(cmd, 0, 0);
1297}
1298int sftp_cmd_mget(struct sftp_command *cmd)
1299{
1300 return sftp_general_get(cmd, 0, 1);
93e86a8b 1301}
1302int sftp_cmd_reget(struct sftp_command *cmd)
1303{
9c77ddf6 1304 return sftp_general_get(cmd, 1, 0);
93e86a8b 1305}
1306
1307/*
9c77ddf6 1308 * Send a file and store it at the remote end. We have three very
1309 * similar commands here. The basic one is `put'; `reput' differs
1310 * in that it checks for the existence of the destination file and
1311 * starts from where a previous aborted transfer left off; `mput'
1312 * differs in that it interprets all its arguments as files to
1313 * transfer (never as a different remote name for a local file) and
1314 * can handle wildcards.
93e86a8b 1315 */
9c77ddf6 1316int sftp_general_put(struct sftp_command *cmd, int restart, int multiple)
93e86a8b 1317{
5079ee6d 1318 char *fname, *wfname, *origoutfname, *outfname;
93e86a8b 1319 int i, ret;
1320 int recurse = FALSE;
1321
1322 if (back == NULL) {
38f0c08e 1323 not_connected();
93e86a8b 1324 return 0;
1325 }
1326
1327 i = 1;
1328 while (i < cmd->nwords && cmd->words[i][0] == '-') {
1329 if (!strcmp(cmd->words[i], "--")) {
1330 /* finish processing options */
1331 i++;
1332 break;
1333 } else if (!strcmp(cmd->words[i], "-r")) {
1334 recurse = TRUE;
1335 } else {
9033711a 1336 printf("%s: unrecognised option '%s'\n", cmd->words[0], cmd->words[i]);
93e86a8b 1337 return 0;
1338 }
1339 i++;
1340 }
1341
1342 if (i >= cmd->nwords) {
9033711a 1343 printf("%s: expects a filename\n", cmd->words[0]);
93e86a8b 1344 return 0;
1345 }
1346
5079ee6d 1347 ret = 1;
9c77ddf6 1348 do {
5079ee6d 1349 WildcardMatcher *wcm;
9c77ddf6 1350 fname = cmd->words[i++];
93e86a8b 1351
9c77ddf6 1352 if (multiple && test_wildcard(fname, FALSE) == WCTYPE_WILDCARD) {
5079ee6d 1353 wcm = begin_wildcard_matching(fname);
1354 wfname = wildcard_get_filename(wcm);
1355 if (!wfname) {
1356 /* Politely warn the user that nothing matched. */
1357 printf("%s: nothing matched\n", fname);
1358 finish_wildcard_matching(wcm);
1359 continue;
1360 }
9c77ddf6 1361 } else {
5079ee6d 1362 wfname = fname;
1363 wcm = NULL;
1364 }
1365
1366 while (wfname) {
9c77ddf6 1367 if (!multiple && i < cmd->nwords)
1368 origoutfname = cmd->words[i++];
1369 else
5079ee6d 1370 origoutfname = stripslashes(wfname, 1);
9c77ddf6 1371
1372 outfname = canonify(origoutfname);
1373 if (!outfname) {
4dc846cd 1374 printf("%s: canonify: %s\n", origoutfname, fxp_error());
5079ee6d 1375 if (wcm) {
1376 sfree(wfname);
1377 finish_wildcard_matching(wcm);
1378 }
9c77ddf6 1379 return 0;
1380 }
5079ee6d 1381 ret = sftp_put_file(wfname, outfname, recurse, restart);
9c77ddf6 1382 sfree(outfname);
5079ee6d 1383
1384 if (wcm) {
1385 sfree(wfname);
1386 wfname = wildcard_get_filename(wcm);
1387 } else {
1388 wfname = NULL;
1389 }
9c77ddf6 1390 }
5079ee6d 1391
1392 if (wcm)
1393 finish_wildcard_matching(wcm);
1394
9c77ddf6 1395 if (!ret)
1396 return ret;
93e86a8b 1397
9c77ddf6 1398 } while (multiple && i < cmd->nwords);
4c7f0d61 1399
df49ff19 1400 return ret;
4c7f0d61 1401}
d92624dc 1402int sftp_cmd_put(struct sftp_command *cmd)
1403{
9c77ddf6 1404 return sftp_general_put(cmd, 0, 0);
1405}
1406int sftp_cmd_mput(struct sftp_command *cmd)
1407{
1408 return sftp_general_put(cmd, 0, 1);
d92624dc 1409}
1410int sftp_cmd_reput(struct sftp_command *cmd)
1411{
9c77ddf6 1412 return sftp_general_put(cmd, 1, 0);
d92624dc 1413}
4c7f0d61 1414
9954aaa3 1415int sftp_cmd_mkdir(struct sftp_command *cmd)
1416{
1417 char *dir;
1bc24185 1418 struct sftp_packet *pktin;
772e3166 1419 struct sftp_request *req;
9954aaa3 1420 int result;
83567e43 1421 int i, ret;
9954aaa3 1422
fa3db767 1423 if (back == NULL) {
38f0c08e 1424 not_connected();
fa3db767 1425 return 0;
1426 }
9954aaa3 1427
1428 if (cmd->nwords < 2) {
1429 printf("mkdir: expects a directory\n");
1430 return 0;
1431 }
1432
83567e43 1433 ret = 1;
1434 for (i = 1; i < cmd->nwords; i++) {
1435 dir = canonify(cmd->words[i]);
1436 if (!dir) {
4dc846cd 1437 printf("%s: canonify: %s\n", dir, fxp_error());
83567e43 1438 return 0;
1439 }
1440
772e3166 1441 req = fxp_mkdir_send(dir);
1442 pktin = sftp_wait_for_reply(req);
1443 result = fxp_mkdir_recv(pktin, req);
83567e43 1444
1445 if (!result) {
1446 printf("mkdir %s: %s\n", dir, fxp_error());
83567e43 1447 ret = 0;
f68363d2 1448 } else
1449 printf("mkdir %s: OK\n", dir);
83567e43 1450
1451 sfree(dir);
9954aaa3 1452 }
1453
83567e43 1454 return ret;
1455}
1456
1457static int sftp_action_rmdir(void *vctx, char *dir)
1458{
1459 struct sftp_packet *pktin;
772e3166 1460 struct sftp_request *req;
83567e43 1461 int result;
1462
772e3166 1463 req = fxp_rmdir_send(dir);
1464 pktin = sftp_wait_for_reply(req);
1465 result = fxp_rmdir_recv(pktin, req);
1bc24185 1466
9954aaa3 1467 if (!result) {
83567e43 1468 printf("rmdir %s: %s\n", dir, fxp_error());
9954aaa3 1469 return 0;
1470 }
1471
f68363d2 1472 printf("rmdir %s: OK\n", dir);
1473
df49ff19 1474 return 1;
9954aaa3 1475}
1476
1477int sftp_cmd_rmdir(struct sftp_command *cmd)
1478{
83567e43 1479 int i, ret;
9954aaa3 1480
fa3db767 1481 if (back == NULL) {
38f0c08e 1482 not_connected();
fa3db767 1483 return 0;
1484 }
9954aaa3 1485
1486 if (cmd->nwords < 2) {
1487 printf("rmdir: expects a directory\n");
1488 return 0;
1489 }
1490
83567e43 1491 ret = 1;
1492 for (i = 1; i < cmd->nwords; i++)
1493 ret &= wildcard_iterate(cmd->words[i], sftp_action_rmdir, NULL);
9954aaa3 1494
83567e43 1495 return ret;
1496}
1497
1498static int sftp_action_rm(void *vctx, char *fname)
1499{
1500 struct sftp_packet *pktin;
772e3166 1501 struct sftp_request *req;
83567e43 1502 int result;
1503
772e3166 1504 req = fxp_remove_send(fname);
1505 pktin = sftp_wait_for_reply(req);
1506 result = fxp_remove_recv(pktin, req);
1bc24185 1507
9954aaa3 1508 if (!result) {
83567e43 1509 printf("rm %s: %s\n", fname, fxp_error());
9954aaa3 1510 return 0;
1511 }
1512
f68363d2 1513 printf("rm %s: OK\n", fname);
1514
df49ff19 1515 return 1;
9954aaa3 1516}
1517
1518int sftp_cmd_rm(struct sftp_command *cmd)
1519{
83567e43 1520 int i, ret;
9954aaa3 1521
fa3db767 1522 if (back == NULL) {
38f0c08e 1523 not_connected();
fa3db767 1524 return 0;
1525 }
1526
9954aaa3 1527 if (cmd->nwords < 2) {
1528 printf("rm: expects a filename\n");
1529 return 0;
1530 }
1531
83567e43 1532 ret = 1;
1533 for (i = 1; i < cmd->nwords; i++)
1534 ret &= wildcard_iterate(cmd->words[i], sftp_action_rm, NULL);
1535
1536 return ret;
1537}
1538
1539static int check_is_dir(char *dstfname)
1540{
1541 struct sftp_packet *pktin;
772e3166 1542 struct sftp_request *req;
83567e43 1543 struct fxp_attrs attrs;
1544 int result;
1545
772e3166 1546 req = fxp_stat_send(dstfname);
1547 pktin = sftp_wait_for_reply(req);
1548 result = fxp_stat_recv(pktin, req, &attrs);
83567e43 1549
1550 if (result &&
1551 (attrs.flags & SSH_FILEXFER_ATTR_PERMISSIONS) &&
1552 (attrs.permissions & 0040000))
1553 return TRUE;
1554 else
1555 return FALSE;
1556}
1557
1558struct sftp_context_mv {
1559 char *dstfname;
1560 int dest_is_dir;
1561};
1562
1563static int sftp_action_mv(void *vctx, char *srcfname)
1564{
1565 struct sftp_context_mv *ctx = (struct sftp_context_mv *)vctx;
1566 struct sftp_packet *pktin;
772e3166 1567 struct sftp_request *req;
83567e43 1568 const char *error;
1569 char *finalfname, *newcanon = NULL;
1570 int ret, result;
1571
1572 if (ctx->dest_is_dir) {
1573 char *p;
1574 char *newname;
1575
1576 p = srcfname + strlen(srcfname);
1577 while (p > srcfname && p[-1] != '/') p--;
1578 newname = dupcat(ctx->dstfname, "/", p, NULL);
1579 newcanon = canonify(newname);
1580 if (!newcanon) {
4dc846cd 1581 printf("%s: canonify: %s\n", newname, fxp_error());
83567e43 1582 sfree(newname);
1583 return 0;
1584 }
1585 sfree(newname);
1586
1587 finalfname = newcanon;
1588 } else {
1589 finalfname = ctx->dstfname;
9954aaa3 1590 }
1591
772e3166 1592 req = fxp_rename_send(srcfname, finalfname);
1593 pktin = sftp_wait_for_reply(req);
1594 result = fxp_rename_recv(pktin, req);
1bc24185 1595
83567e43 1596 error = result ? NULL : fxp_error();
1597
1598 if (error) {
1599 printf("mv %s %s: %s\n", srcfname, finalfname, error);
1600 ret = 0;
1601 } else {
1602 printf("%s -> %s\n", srcfname, finalfname);
1603 ret = 1;
9954aaa3 1604 }
1605
83567e43 1606 sfree(newcanon);
1607 return ret;
d92624dc 1608}
1609
1610int sftp_cmd_mv(struct sftp_command *cmd)
1611{
83567e43 1612 struct sftp_context_mv actx, *ctx = &actx;
1613 int i, ret;
d92624dc 1614
fa3db767 1615 if (back == NULL) {
38f0c08e 1616 not_connected();
fa3db767 1617 return 0;
1618 }
1619
d92624dc 1620 if (cmd->nwords < 3) {
1621 printf("mv: expects two filenames\n");
9954aaa3 1622 return 0;
d92624dc 1623 }
83567e43 1624
1625 ctx->dstfname = canonify(cmd->words[cmd->nwords-1]);
1626 if (!ctx->dstfname) {
4dc846cd 1627 printf("%s: canonify: %s\n", ctx->dstfname, fxp_error());
d92624dc 1628 return 0;
1629 }
1630
83567e43 1631 /*
1632 * If there's more than one source argument, or one source
1633 * argument which is a wildcard, we _require_ that the
1634 * destination is a directory.
1635 */
1636 ctx->dest_is_dir = check_is_dir(ctx->dstfname);
1637 if ((cmd->nwords > 3 || is_wildcard(cmd->words[1])) && !ctx->dest_is_dir) {
1638 printf("mv: multiple or wildcard arguments require the destination"
1639 " to be a directory\n");
c4acc08c 1640 sfree(ctx->dstfname);
d92624dc 1641 return 0;
1642 }
9954aaa3 1643
83567e43 1644 /*
1645 * Now iterate over the source arguments.
1646 */
1647 ret = 1;
1648 for (i = 1; i < cmd->nwords-1; i++)
1649 ret &= wildcard_iterate(cmd->words[i], sftp_action_mv, ctx);
1650
c4acc08c 1651 sfree(ctx->dstfname);
83567e43 1652 return ret;
1653}
1654
1655struct sftp_context_chmod {
1656 unsigned attrs_clr, attrs_xor;
1657};
1658
1659static int sftp_action_chmod(void *vctx, char *fname)
1660{
1661 struct fxp_attrs attrs;
1662 struct sftp_packet *pktin;
772e3166 1663 struct sftp_request *req;
83567e43 1664 int result;
1665 unsigned oldperms, newperms;
1666 struct sftp_context_chmod *ctx = (struct sftp_context_chmod *)vctx;
1667
772e3166 1668 req = fxp_stat_send(fname);
1669 pktin = sftp_wait_for_reply(req);
1670 result = fxp_stat_recv(pktin, req, &attrs);
1bc24185 1671
83567e43 1672 if (!result || !(attrs.flags & SSH_FILEXFER_ATTR_PERMISSIONS)) {
1673 printf("get attrs for %s: %s\n", fname,
1674 result ? "file permissions not provided" : fxp_error());
83567e43 1675 return 0;
1676 }
d92624dc 1677
83567e43 1678 attrs.flags = SSH_FILEXFER_ATTR_PERMISSIONS; /* perms _only_ */
1679 oldperms = attrs.permissions & 07777;
1680 attrs.permissions &= ~ctx->attrs_clr;
1681 attrs.permissions ^= ctx->attrs_xor;
1682 newperms = attrs.permissions & 07777;
1bc24185 1683
83567e43 1684 if (oldperms == newperms)
1685 return 1; /* no need to do anything! */
1bc24185 1686
772e3166 1687 req = fxp_setstat_send(fname, attrs);
1688 pktin = sftp_wait_for_reply(req);
1689 result = fxp_setstat_recv(pktin, req);
1bc24185 1690
83567e43 1691 if (!result) {
1692 printf("set attrs for %s: %s\n", fname, fxp_error());
83567e43 1693 return 0;
d92624dc 1694 }
d92624dc 1695
83567e43 1696 printf("%s: %04o -> %04o\n", fname, oldperms, newperms);
1697
df49ff19 1698 return 1;
9954aaa3 1699}
1700
d92624dc 1701int sftp_cmd_chmod(struct sftp_command *cmd)
1702{
83567e43 1703 char *mode;
1704 int i, ret;
1705 struct sftp_context_chmod actx, *ctx = &actx;
d92624dc 1706
fa3db767 1707 if (back == NULL) {
38f0c08e 1708 not_connected();
fa3db767 1709 return 0;
1710 }
1711
d92624dc 1712 if (cmd->nwords < 3) {
1713 printf("chmod: expects a mode specifier and a filename\n");
1714 return 0;
1715 }
1716
1717 /*
1718 * Attempt to parse the mode specifier in cmd->words[1]. We
1719 * don't support the full horror of Unix chmod; instead we
1720 * support a much simpler syntax in which the user can either
1721 * specify an octal number, or a comma-separated sequence of
1722 * [ugoa]*[-+=][rwxst]+. (The initial [ugoa] sequence may
1723 * _only_ be omitted if the only attribute mentioned is t,
1724 * since all others require a user/group/other specification.
1725 * Additionally, the s attribute may not be specified for any
1726 * [ugoa] specifications other than exactly u or exactly g.
1727 */
83567e43 1728 ctx->attrs_clr = ctx->attrs_xor = 0;
d92624dc 1729 mode = cmd->words[1];
1730 if (mode[0] >= '0' && mode[0] <= '9') {
1731 if (mode[strspn(mode, "01234567")]) {
1732 printf("chmod: numeric file modes should"
1733 " contain digits 0-7 only\n");
1734 return 0;
1735 }
83567e43 1736 ctx->attrs_clr = 07777;
1737 sscanf(mode, "%o", &ctx->attrs_xor);
1738 ctx->attrs_xor &= ctx->attrs_clr;
d92624dc 1739 } else {
1740 while (*mode) {
1741 char *modebegin = mode;
1742 unsigned subset, perms;
1743 int action;
1744
1745 subset = 0;
1746 while (*mode && *mode != ',' &&
1747 *mode != '+' && *mode != '-' && *mode != '=') {
1748 switch (*mode) {
1749 case 'u': subset |= 04700; break; /* setuid, user perms */
1750 case 'g': subset |= 02070; break; /* setgid, group perms */
1751 case 'o': subset |= 00007; break; /* just other perms */
1752 case 'a': subset |= 06777; break; /* all of the above */
1753 default:
1754 printf("chmod: file mode '%.*s' contains unrecognised"
1755 " user/group/other specifier '%c'\n",
b51259f6 1756 (int)strcspn(modebegin, ","), modebegin, *mode);
d92624dc 1757 return 0;
1758 }
1759 mode++;
1760 }
1761 if (!*mode || *mode == ',') {
1762 printf("chmod: file mode '%.*s' is incomplete\n",
b51259f6 1763 (int)strcspn(modebegin, ","), modebegin);
d92624dc 1764 return 0;
1765 }
1766 action = *mode++;
1767 if (!*mode || *mode == ',') {
1768 printf("chmod: file mode '%.*s' is incomplete\n",
b51259f6 1769 (int)strcspn(modebegin, ","), modebegin);
d92624dc 1770 return 0;
1771 }
1772 perms = 0;
1773 while (*mode && *mode != ',') {
1774 switch (*mode) {
1775 case 'r': perms |= 00444; break;
1776 case 'w': perms |= 00222; break;
1777 case 'x': perms |= 00111; break;
1778 case 't': perms |= 01000; subset |= 01000; break;
1779 case 's':
1780 if ((subset & 06777) != 04700 &&
1781 (subset & 06777) != 02070) {
1782 printf("chmod: file mode '%.*s': set[ug]id bit should"
1783 " be used with exactly one of u or g only\n",
b51259f6 1784 (int)strcspn(modebegin, ","), modebegin);
d92624dc 1785 return 0;
1786 }
1787 perms |= 06000;
1788 break;
1789 default:
1790 printf("chmod: file mode '%.*s' contains unrecognised"
1791 " permission specifier '%c'\n",
b51259f6 1792 (int)strcspn(modebegin, ","), modebegin, *mode);
d92624dc 1793 return 0;
1794 }
1795 mode++;
1796 }
1797 if (!(subset & 06777) && (perms &~ subset)) {
1798 printf("chmod: file mode '%.*s' contains no user/group/other"
1799 " specifier and permissions other than 't' \n",
b51259f6 1800 (int)strcspn(modebegin, ","), modebegin);
d92624dc 1801 return 0;
1802 }
1803 perms &= subset;
1804 switch (action) {
1805 case '+':
83567e43 1806 ctx->attrs_clr |= perms;
1807 ctx->attrs_xor |= perms;
d92624dc 1808 break;
1809 case '-':
83567e43 1810 ctx->attrs_clr |= perms;
1811 ctx->attrs_xor &= ~perms;
d92624dc 1812 break;
1813 case '=':
83567e43 1814 ctx->attrs_clr |= subset;
1815 ctx->attrs_xor |= perms;
d92624dc 1816 break;
1817 }
1818 if (*mode) mode++; /* eat comma */
1819 }
1820 }
1821
83567e43 1822 ret = 1;
1823 for (i = 2; i < cmd->nwords; i++)
1824 ret &= wildcard_iterate(cmd->words[i], sftp_action_chmod, ctx);
d92624dc 1825
83567e43 1826 return ret;
d92624dc 1827}
9954aaa3 1828
fa3db767 1829static int sftp_cmd_open(struct sftp_command *cmd)
1830{
f11233cb 1831 int portnumber;
1832
fa3db767 1833 if (back != NULL) {
1834 printf("psftp: already connected\n");
1835 return 0;
1836 }
1837
1838 if (cmd->nwords < 2) {
1839 printf("open: expects a host name\n");
1840 return 0;
1841 }
1842
f11233cb 1843 if (cmd->nwords > 2) {
1844 portnumber = atoi(cmd->words[2]);
1845 if (portnumber == 0) {
1846 printf("open: invalid port number\n");
1847 return 0;
1848 }
1849 } else
1850 portnumber = 0;
1851
1852 if (psftp_connect(cmd->words[1], NULL, portnumber)) {
fa3db767 1853 back = NULL; /* connection is already closed */
1854 return -1; /* this is fatal */
1855 }
1856 do_sftp_init();
df49ff19 1857 return 1;
fa3db767 1858}
1859
3af97463 1860static int sftp_cmd_lcd(struct sftp_command *cmd)
1861{
d6cc41e6 1862 char *currdir, *errmsg;
3af97463 1863
1864 if (cmd->nwords < 2) {
1865 printf("lcd: expects a local directory name\n");
1866 return 0;
1867 }
1868
d6cc41e6 1869 errmsg = psftp_lcd(cmd->words[1]);
1870 if (errmsg) {
1871 printf("lcd: unable to change directory: %s\n", errmsg);
1872 sfree(errmsg);
3af97463 1873 return 0;
1874 }
1875
d6cc41e6 1876 currdir = psftp_getcwd();
3af97463 1877 printf("New local directory is %s\n", currdir);
1878 sfree(currdir);
1879
1880 return 1;
1881}
1882
1883static int sftp_cmd_lpwd(struct sftp_command *cmd)
1884{
1885 char *currdir;
3af97463 1886
d6cc41e6 1887 currdir = psftp_getcwd();
3af97463 1888 printf("Current local directory is %s\n", currdir);
1889 sfree(currdir);
1890
1891 return 1;
1892}
1893
1894static int sftp_cmd_pling(struct sftp_command *cmd)
1895{
1896 int exitcode;
1897
1898 exitcode = system(cmd->words[1]);
1899 return (exitcode == 0);
1900}
1901
bf5240cd 1902static int sftp_cmd_help(struct sftp_command *cmd);
1903
4c7f0d61 1904static struct sftp_cmd_lookup {
1905 char *name;
bf5240cd 1906 /*
1907 * For help purposes, there are two kinds of command:
1908 *
1909 * - primary commands, in which `longhelp' is non-NULL. In
1910 * this case `shorthelp' is descriptive text, and `longhelp'
1911 * is longer descriptive text intended to be printed after
1912 * the command name.
1913 *
1914 * - alias commands, in which `longhelp' is NULL. In this case
1915 * `shorthelp' is the name of a primary command, which
1916 * contains the help that should double up for this command.
1917 */
3af97463 1918 int listed; /* do we list this in primary help? */
bf5240cd 1919 char *shorthelp;
1920 char *longhelp;
32874aea 1921 int (*obey) (struct sftp_command *);
4c7f0d61 1922} sftp_lookup[] = {
1923 /*
1924 * List of sftp commands. This is binary-searched so it MUST be
1925 * in ASCII order.
1926 */
32874aea 1927 {
d6cc41e6 1928 "!", TRUE, "run a local command",
3af97463 1929 "<command>\n"
d6cc41e6 1930 /* FIXME: this example is crap for non-Windows. */
1931 " Runs a local command. For example, \"!del myfile\".\n",
3af97463 1932 sftp_cmd_pling
1933 },
1934 {
1935 "bye", TRUE, "finish your SFTP session",
bf5240cd 1936 "\n"
1937 " Terminates your SFTP session and quits the PSFTP program.\n",
1938 sftp_cmd_quit
1939 },
1940 {
3af97463 1941 "cd", TRUE, "change your remote working directory",
c1b8799b 1942 " [ <new working directory> ]\n"
bf5240cd 1943 " Change the remote working directory for your SFTP session.\n"
1944 " If a new working directory is not supplied, you will be\n"
1945 " returned to your home directory.\n",
1946 sftp_cmd_cd
1947 },
1948 {
3af97463 1949 "chmod", TRUE, "change file permissions and modes",
c1b8799b 1950 " <modes> <filename-or-wildcard> [ <filename-or-wildcard>... ]\n"
1951 " Change the file permissions on one or more remote files or\n"
1952 " directories.\n"
1953 " <modes> can be any octal Unix permission specifier.\n"
1954 " Alternatively, <modes> can include the following modifiers:\n"
bf5240cd 1955 " u+r make file readable by owning user\n"
1956 " u+w make file writable by owning user\n"
1957 " u+x make file executable by owning user\n"
1958 " u-r make file not readable by owning user\n"
1959 " [also u-w, u-x]\n"
1960 " g+r make file readable by members of owning group\n"
1961 " [also g+w, g+x, g-r, g-w, g-x]\n"
1962 " o+r make file readable by all other users\n"
1963 " [also o+w, o+x, o-r, o-w, o-x]\n"
1964 " a+r make file readable by absolutely everybody\n"
1965 " [also a+w, a+x, a-r, a-w, a-x]\n"
1966 " u+s enable the Unix set-user-ID bit\n"
1967 " u-s disable the Unix set-user-ID bit\n"
1968 " g+s enable the Unix set-group-ID bit\n"
1969 " g-s disable the Unix set-group-ID bit\n"
1970 " +t enable the Unix \"sticky bit\"\n"
1971 " You can give more than one modifier for the same user (\"g-rwx\"), and\n"
1972 " more than one user for the same modifier (\"ug+w\"). You can\n"
1973 " use commas to separate different modifiers (\"u+rwx,g+s\").\n",
1974 sftp_cmd_chmod
1975 },
1976 {
b614ce89 1977 "close", TRUE, "finish your SFTP session but do not quit PSFTP",
1978 "\n"
1979 " Terminates your SFTP session, but does not quit the PSFTP\n"
1980 " program. You can then use \"open\" to start another SFTP\n"
1981 " session, to the same server or to a different one.\n",
1982 sftp_cmd_close
1983 },
1984 {
c1b8799b 1985 "del", TRUE, "delete files on the remote server",
1986 " <filename-or-wildcard> [ <filename-or-wildcard>... ]\n"
1987 " Delete a file or files from the server.\n",
bf5240cd 1988 sftp_cmd_rm
1989 },
1990 {
3af97463 1991 "delete", FALSE, "del", NULL, sftp_cmd_rm
bf5240cd 1992 },
1993 {
c1b8799b 1994 "dir", TRUE, "list remote files",
9033711a 1995 " [ <directory-name> ]/[ <wildcard> ]\n"
bf5240cd 1996 " List the contents of a specified directory on the server.\n"
1997 " If <directory-name> is not given, the current working directory\n"
9033711a 1998 " is assumed.\n"
1999 " If <wildcard> is given, it is treated as a set of files to\n"
2000 " list; otherwise, all files are listed.\n",
bf5240cd 2001 sftp_cmd_ls
2002 },
2003 {
3af97463 2004 "exit", TRUE, "bye", NULL, sftp_cmd_quit
bf5240cd 2005 },
2006 {
3af97463 2007 "get", TRUE, "download a file from the server to your local machine",
9033711a 2008 " [ -r ] [ -- ] <filename> [ <local-filename> ]\n"
bf5240cd 2009 " Downloads a file on the server and stores it locally under\n"
2010 " the same name, or under a different one if you supply the\n"
9033711a 2011 " argument <local-filename>.\n"
2012 " If -r specified, recursively fetch a directory.\n",
bf5240cd 2013 sftp_cmd_get
2014 },
2015 {
3af97463 2016 "help", TRUE, "give help",
bf5240cd 2017 " [ <command> [ <command> ... ] ]\n"
2018 " Give general help if no commands are specified.\n"
2019 " If one or more commands are specified, give specific help on\n"
2020 " those particular commands.\n",
2021 sftp_cmd_help
2022 },
2023 {
3af97463 2024 "lcd", TRUE, "change local working directory",
2025 " <local-directory-name>\n"
2026 " Change the local working directory of the PSFTP program (the\n"
2027 " default location where the \"get\" command will save files).\n",
2028 sftp_cmd_lcd
2029 },
2030 {
2031 "lpwd", TRUE, "print local working directory",
2032 "\n"
2033 " Print the local working directory of the PSFTP program (the\n"
2034 " default location where the \"get\" command will save files).\n",
2035 sftp_cmd_lpwd
2036 },
2037 {
2038 "ls", TRUE, "dir", NULL,
bf5240cd 2039 sftp_cmd_ls
2040 },
2041 {
9c77ddf6 2042 "mget", TRUE, "download multiple files at once",
9033711a 2043 " [ -r ] [ -- ] <filename-or-wildcard> [ <filename-or-wildcard>... ]\n"
9c77ddf6 2044 " Downloads many files from the server, storing each one under\n"
2045 " the same name it has on the server side. You can use wildcards\n"
9033711a 2046 " such as \"*.c\" to specify lots of files at once.\n"
2047 " If -r specified, recursively fetch files and directories.\n",
9c77ddf6 2048 sftp_cmd_mget
2049 },
2050 {
c1b8799b 2051 "mkdir", TRUE, "create directories on the remote server",
2052 " <directory-name> [ <directory-name>... ]\n"
2053 " Creates directories with the given names on the server.\n",
bf5240cd 2054 sftp_cmd_mkdir
2055 },
2056 {
9c77ddf6 2057 "mput", TRUE, "upload multiple files at once",
96515f61 2058 " [ -r ] [ -- ] <filename-or-wildcard> [ <filename-or-wildcard>... ]\n"
9c77ddf6 2059 " Uploads many files to the server, storing each one under the\n"
2060 " same name it has on the client side. You can use wildcards\n"
9033711a 2061 " such as \"*.c\" to specify lots of files at once.\n"
2062 " If -r specified, recursively store files and directories.\n",
9c77ddf6 2063 sftp_cmd_mput
2064 },
2065 {
c1b8799b 2066 "mv", TRUE, "move or rename file(s) on the remote server",
2067 " <source> [ <source>... ] <destination>\n"
2068 " Moves or renames <source>(s) on the server to <destination>,\n"
2069 " also on the server.\n"
2070 " If <destination> specifies an existing directory, then <source>\n"
2071 " may be a wildcard, and multiple <source>s may be given; all\n"
2072 " source files are moved into <destination>.\n"
2073 " Otherwise, <source> must specify a single file, which is moved\n"
2074 " or renamed so that it is accessible under the name <destination>.\n",
bf5240cd 2075 sftp_cmd_mv
2076 },
2077 {
3af97463 2078 "open", TRUE, "connect to a host",
f11233cb 2079 " [<user>@]<hostname> [<port>]\n"
fa3db767 2080 " Establishes an SFTP connection to a given host. Only usable\n"
c1b8799b 2081 " when you are not already connected to a server.\n",
fa3db767 2082 sftp_cmd_open
2083 },
2084 {
56542985 2085 "put", TRUE, "upload a file from your local machine to the server",
9033711a 2086 " [ -r ] [ -- ] <filename> [ <remote-filename> ]\n"
56542985 2087 " Uploads a file to the server and stores it there under\n"
2088 " the same name, or under a different one if you supply the\n"
9033711a 2089 " argument <remote-filename>.\n"
2090 " If -r specified, recursively store a directory.\n",
56542985 2091 sftp_cmd_put
2092 },
2093 {
3af97463 2094 "pwd", TRUE, "print your remote working directory",
4f2b387f 2095 "\n"
2096 " Print the current remote working directory for your SFTP session.\n",
2097 sftp_cmd_pwd
2098 },
2099 {
3af97463 2100 "quit", TRUE, "bye", NULL,
bf5240cd 2101 sftp_cmd_quit
2102 },
2103 {
c1b8799b 2104 "reget", TRUE, "continue downloading files",
9033711a 2105 " [ -r ] [ -- ] <filename> [ <local-filename> ]\n"
bf5240cd 2106 " Works exactly like the \"get\" command, but the local file\n"
2107 " must already exist. The download will begin at the end of the\n"
9033711a 2108 " file. This is for resuming a download that was interrupted.\n"
2109 " If -r specified, resume interrupted \"get -r\".\n",
bf5240cd 2110 sftp_cmd_reget
2111 },
2112 {
3af97463 2113 "ren", TRUE, "mv", NULL,
bf5240cd 2114 sftp_cmd_mv
2115 },
2116 {
3af97463 2117 "rename", FALSE, "mv", NULL,
bf5240cd 2118 sftp_cmd_mv
2119 },
2120 {
c1b8799b 2121 "reput", TRUE, "continue uploading files",
9033711a 2122 " [ -r ] [ -- ] <filename> [ <remote-filename> ]\n"
bf5240cd 2123 " Works exactly like the \"put\" command, but the remote file\n"
2124 " must already exist. The upload will begin at the end of the\n"
9033711a 2125 " file. This is for resuming an upload that was interrupted.\n"
2126 " If -r specified, resume interrupted \"put -r\".\n",
bf5240cd 2127 sftp_cmd_reput
2128 },
2129 {
3af97463 2130 "rm", TRUE, "del", NULL,
bf5240cd 2131 sftp_cmd_rm
2132 },
2133 {
c1b8799b 2134 "rmdir", TRUE, "remove directories on the remote server",
2135 " <directory-name> [ <directory-name>... ]\n"
bf5240cd 2136 " Removes the directory with the given name on the server.\n"
c1b8799b 2137 " The directory will not be removed unless it is empty.\n"
2138 " Wildcards may be used to specify multiple directories.\n",
bf5240cd 2139 sftp_cmd_rmdir
2140 }
2141};
2142
2143const struct sftp_cmd_lookup *lookup_command(char *name)
2144{
2145 int i, j, k, cmp;
2146
2147 i = -1;
2148 j = sizeof(sftp_lookup) / sizeof(*sftp_lookup);
2149 while (j - i > 1) {
2150 k = (j + i) / 2;
2151 cmp = strcmp(name, sftp_lookup[k].name);
2152 if (cmp < 0)
2153 j = k;
2154 else if (cmp > 0)
2155 i = k;
2156 else {
2157 return &sftp_lookup[k];
2158 }
2159 }
2160 return NULL;
2161}
2162
2163static int sftp_cmd_help(struct sftp_command *cmd)
2164{
2165 int i;
2166 if (cmd->nwords == 1) {
2167 /*
2168 * Give short help on each command.
2169 */
2170 int maxlen;
2171 maxlen = 0;
2172 for (i = 0; i < sizeof(sftp_lookup) / sizeof(*sftp_lookup); i++) {
3af97463 2173 int len;
2174 if (!sftp_lookup[i].listed)
2175 continue;
2176 len = strlen(sftp_lookup[i].name);
bf5240cd 2177 if (maxlen < len)
2178 maxlen = len;
2179 }
2180 for (i = 0; i < sizeof(sftp_lookup) / sizeof(*sftp_lookup); i++) {
2181 const struct sftp_cmd_lookup *lookup;
3af97463 2182 if (!sftp_lookup[i].listed)
2183 continue;
bf5240cd 2184 lookup = &sftp_lookup[i];
2185 printf("%-*s", maxlen+2, lookup->name);
2186 if (lookup->longhelp == NULL)
2187 lookup = lookup_command(lookup->shorthelp);
2188 printf("%s\n", lookup->shorthelp);
2189 }
2190 } else {
2191 /*
2192 * Give long help on specific commands.
2193 */
2194 for (i = 1; i < cmd->nwords; i++) {
2195 const struct sftp_cmd_lookup *lookup;
2196 lookup = lookup_command(cmd->words[i]);
2197 if (!lookup) {
2198 printf("help: %s: command not found\n", cmd->words[i]);
2199 } else {
2200 printf("%s", lookup->name);
2201 if (lookup->longhelp == NULL)
2202 lookup = lookup_command(lookup->shorthelp);
2203 printf("%s", lookup->longhelp);
2204 }
2205 }
2206 }
df49ff19 2207 return 1;
bf5240cd 2208}
4c7f0d61 2209
2210/* ----------------------------------------------------------------------
2211 * Command line reading and parsing.
2212 */
9954aaa3 2213struct sftp_command *sftp_getcmd(FILE *fp, int mode, int modeflags)
32874aea 2214{
4c7f0d61 2215 char *line;
4c7f0d61 2216 struct sftp_command *cmd;
2217 char *p, *q, *r;
2218 int quoting;
2219
3d88e64d 2220 cmd = snew(struct sftp_command);
4c7f0d61 2221 cmd->words = NULL;
2222 cmd->nwords = 0;
2223 cmd->wordssize = 0;
2224
2225 line = NULL;
39934deb 2226
2227 if (fp) {
2228 if (modeflags & 1)
2229 printf("psftp> ");
2230 line = fgetline(fp);
2231 } else {
65857773 2232 line = ssh_sftp_get_cmdline("psftp> ", back == NULL);
4c7f0d61 2233 }
39934deb 2234
2235 if (!line || !*line) {
2236 cmd->obey = sftp_cmd_quit;
2237 if ((mode == 0) || (modeflags & 1))
2238 printf("quit\n");
038ec85e 2239 sfree(line);
39934deb 2240 return cmd; /* eof */
2241 }
2242
2243 line[strcspn(line, "\r\n")] = '\0';
2244
df49ff19 2245 if (modeflags & 1) {
2246 printf("%s\n", line);
2247 }
4c7f0d61 2248
4c7f0d61 2249 p = line;
3af97463 2250 while (*p && (*p == ' ' || *p == '\t'))
2251 p++;
2252
2253 if (*p == '!') {
2254 /*
2255 * Special case: the ! command. This is always parsed as
2256 * exactly two words: one containing the !, and the second
2257 * containing everything else on the line.
2258 */
2259 cmd->nwords = cmd->wordssize = 2;
3d88e64d 2260 cmd->words = sresize(cmd->words, cmd->wordssize, char *);
679539d7 2261 cmd->words[0] = dupstr("!");
2262 cmd->words[1] = dupstr(p+1);
1ef4dce9 2263 } else if (*p == '#') {
2264 /*
2265 * Special case: comment. Entire line is ignored.
2266 */
2267 cmd->nwords = cmd->wordssize = 0;
3af97463 2268 } else {
2269
2270 /*
2271 * Parse the command line into words. The syntax is:
2272 * - double quotes are removed, but cause spaces within to be
2273 * treated as non-separating.
2274 * - a double-doublequote pair is a literal double quote, inside
2275 * _or_ outside quotes. Like this:
2276 *
2277 * firstword "second word" "this has ""quotes"" in" and""this""
2278 *
2279 * becomes
2280 *
2281 * >firstword<
2282 * >second word<
2283 * >this has "quotes" in<
2284 * >and"this"<
2285 */
5ab93329 2286 while (1) {
3af97463 2287 /* skip whitespace */
2288 while (*p && (*p == ' ' || *p == '\t'))
2289 p++;
5ab93329 2290 /* terminate loop */
2291 if (!*p)
2292 break;
3af97463 2293 /* mark start of word */
2294 q = r = p; /* q sits at start, r writes word */
2295 quoting = 0;
2296 while (*p) {
2297 if (!quoting && (*p == ' ' || *p == '\t'))
2298 break; /* reached end of word */
2299 else if (*p == '"' && p[1] == '"')
2300 p += 2, *r++ = '"'; /* a literal quote */
2301 else if (*p == '"')
2302 p++, quoting = !quoting;
2303 else
2304 *r++ = *p++;
2305 }
2306 if (*p)
2307 p++; /* skip over the whitespace */
2308 *r = '\0';
2309 if (cmd->nwords >= cmd->wordssize) {
2310 cmd->wordssize = cmd->nwords + 16;
3d88e64d 2311 cmd->words = sresize(cmd->words, cmd->wordssize, char *);
3af97463 2312 }
679539d7 2313 cmd->words[cmd->nwords++] = dupstr(q);
4c7f0d61 2314 }
4c7f0d61 2315 }
2316
39934deb 2317 sfree(line);
2318
4c7f0d61 2319 /*
2320 * Now parse the first word and assign a function.
2321 */
2322
2323 if (cmd->nwords == 0)
2324 cmd->obey = sftp_cmd_null;
2325 else {
bf5240cd 2326 const struct sftp_cmd_lookup *lookup;
2327 lookup = lookup_command(cmd->words[0]);
2328 if (!lookup)
2329 cmd->obey = sftp_cmd_unknown;
2330 else
2331 cmd->obey = lookup->obey;
4c7f0d61 2332 }
2333
2334 return cmd;
2335}
2336
774204f5 2337static int do_sftp_init(void)
32874aea 2338{
1bc24185 2339 struct sftp_packet *pktin;
772e3166 2340 struct sftp_request *req;
1bc24185 2341
4c7f0d61 2342 /*
2343 * Do protocol initialisation.
2344 */
2345 if (!fxp_init()) {
2346 fprintf(stderr,
32874aea 2347 "Fatal: unable to initialise SFTP: %s\n", fxp_error());
774204f5 2348 return 1; /* failure */
4c7f0d61 2349 }
2350
2351 /*
2352 * Find out where our home directory is.
2353 */
772e3166 2354 req = fxp_realpath_send(".");
2355 pktin = sftp_wait_for_reply(req);
2356 homedir = fxp_realpath_recv(pktin, req);
1bc24185 2357
4c7f0d61 2358 if (!homedir) {
2359 fprintf(stderr,
2360 "Warning: failed to resolve home directory: %s\n",
2361 fxp_error());
2362 homedir = dupstr(".");
2363 } else {
2364 printf("Remote working directory is %s\n", homedir);
2365 }
2366 pwd = dupstr(homedir);
774204f5 2367 return 0;
fa3db767 2368}
2369
679539d7 2370void do_sftp_cleanup()
2371{
2372 char ch;
f11233cb 2373 if (back) {
2374 back->special(backhandle, TS_EOF);
bc06669b 2375 sent_eof = TRUE;
f11233cb 2376 sftp_recvdata(&ch, 1);
2377 back->free(backhandle);
2378 sftp_cleanup_request();
65857773 2379 back = NULL;
2380 backhandle = NULL;
f11233cb 2381 }
679539d7 2382 if (pwd) {
2383 sfree(pwd);
2384 pwd = NULL;
2385 }
2386 if (homedir) {
2387 sfree(homedir);
2388 homedir = NULL;
2389 }
2390}
2391
fa3db767 2392void do_sftp(int mode, int modeflags, char *batchfile)
2393{
2394 FILE *fp;
df49ff19 2395 int ret;
4c7f0d61 2396
9954aaa3 2397 /*
2398 * Batch mode?
4c7f0d61 2399 */
9954aaa3 2400 if (mode == 0) {
2401
2402 /* ------------------------------------------------------------------
2403 * Now we're ready to do Real Stuff.
2404 */
2405 while (1) {
df49ff19 2406 struct sftp_command *cmd;
39934deb 2407 cmd = sftp_getcmd(NULL, 0, 0);
df49ff19 2408 if (!cmd)
2409 break;
679539d7 2410 ret = cmd->obey(cmd);
2411 if (cmd->words) {
2412 int i;
2413 for(i = 0; i < cmd->nwords; i++)
2414 sfree(cmd->words[i]);
2415 sfree(cmd->words);
2416 }
2417 sfree(cmd);
2418 if (ret < 0)
df49ff19 2419 break;
bf5240cd 2420 }
9954aaa3 2421 } else {
2422 fp = fopen(batchfile, "r");
2423 if (!fp) {
bf5240cd 2424 printf("Fatal: unable to open %s\n", batchfile);
2425 return;
9954aaa3 2426 }
2427 while (1) {
bf5240cd 2428 struct sftp_command *cmd;
2429 cmd = sftp_getcmd(fp, mode, modeflags);
2430 if (!cmd)
2431 break;
df49ff19 2432 ret = cmd->obey(cmd);
2433 if (ret < 0)
bf5240cd 2434 break;
df49ff19 2435 if (ret == 0) {
bf5240cd 2436 if (!(modeflags & 2))
9954aaa3 2437 break;
bf5240cd 2438 }
9954aaa3 2439 }
bf5240cd 2440 fclose(fp);
9954aaa3 2441
4c7f0d61 2442 }
4a8fc3c4 2443}
4c7f0d61 2444
4a8fc3c4 2445/* ----------------------------------------------------------------------
2446 * Dirty bits: integration with PuTTY.
2447 */
2448
2449static int verbose = 0;
2450
7bedb13c 2451/*
4a8fc3c4 2452 * Print an error message and perform a fatal exit.
2453 */
2454void fatalbox(char *fmt, ...)
2455{
57356d63 2456 char *str, *str2;
4a8fc3c4 2457 va_list ap;
2458 va_start(ap, fmt);
57356d63 2459 str = dupvprintf(fmt, ap);
2460 str2 = dupcat("Fatal: ", str, "\n", NULL);
2461 sfree(str);
4a8fc3c4 2462 va_end(ap);
57356d63 2463 fputs(str2, stderr);
2464 sfree(str2);
4a8fc3c4 2465
93b581bd 2466 cleanup_exit(1);
4a8fc3c4 2467}
1709795f 2468void modalfatalbox(char *fmt, ...)
2469{
57356d63 2470 char *str, *str2;
1709795f 2471 va_list ap;
2472 va_start(ap, fmt);
57356d63 2473 str = dupvprintf(fmt, ap);
2474 str2 = dupcat("Fatal: ", str, "\n", NULL);
2475 sfree(str);
1709795f 2476 va_end(ap);
57356d63 2477 fputs(str2, stderr);
2478 sfree(str2);
1709795f 2479
2480 cleanup_exit(1);
2481}
33f4bde2 2482void nonfatal(char *fmt, ...)
2483{
2484 char *str, *str2;
2485 va_list ap;
2486 va_start(ap, fmt);
2487 str = dupvprintf(fmt, ap);
2488 str2 = dupcat("Error: ", str, "\n", NULL);
2489 sfree(str);
2490 va_end(ap);
2491 fputs(str2, stderr);
2492 sfree(str2);
2493}
a8327734 2494void connection_fatal(void *frontend, char *fmt, ...)
4a8fc3c4 2495{
57356d63 2496 char *str, *str2;
4a8fc3c4 2497 va_list ap;
2498 va_start(ap, fmt);
57356d63 2499 str = dupvprintf(fmt, ap);
2500 str2 = dupcat("Fatal: ", str, "\n", NULL);
2501 sfree(str);
4a8fc3c4 2502 va_end(ap);
57356d63 2503 fputs(str2, stderr);
2504 sfree(str2);
4a8fc3c4 2505
93b581bd 2506 cleanup_exit(1);
4a8fc3c4 2507}
2508
6b78788a 2509void ldisc_send(void *handle, char *buf, int len, int interactive)
32874aea 2510{
4a8fc3c4 2511 /*
2512 * This is only here because of the calls to ldisc_send(NULL,
2513 * 0) in ssh.c. Nothing in PSFTP actually needs to use the
2514 * ldisc as an ldisc. So if we get called with any real data, I
2515 * want to know about it.
4c7f0d61 2516 */
4a8fc3c4 2517 assert(len == 0);
2518}
2519
2520/*
c44bf5bd 2521 * In psftp, all agent requests should be synchronous, so this is a
2522 * never-called stub.
2523 */
2524void agent_schedule_callback(void (*callback)(void *, void *, int),
2525 void *callback_ctx, void *data, int len)
2526{
2527 assert(!"We shouldn't be here");
2528}
2529
2530/*
4a8fc3c4 2531 * Receive a block of data from the SSH link. Block until all data
2532 * is available.
2533 *
2534 * To do this, we repeatedly call the SSH protocol module, with our
2535 * own trap in from_backend() to catch the data that comes back. We
2536 * do this until we have enough data.
2537 */
2538
32874aea 2539static unsigned char *outptr; /* where to put the data */
2540static unsigned outlen; /* how much data required */
4a8fc3c4 2541static unsigned char *pending = NULL; /* any spare data */
32874aea 2542static unsigned pendlen = 0, pendsize = 0; /* length and phys. size of buffer */
9fab77dc 2543int from_backend(void *frontend, int is_stderr, const char *data, int datalen)
32874aea 2544{
2545 unsigned char *p = (unsigned char *) data;
2546 unsigned len = (unsigned) datalen;
4a8fc3c4 2547
2548 /*
2549 * stderr data is just spouted to local stderr and otherwise
2550 * ignored.
2551 */
2552 if (is_stderr) {
bfa5400d 2553 if (len > 0)
ecb25722 2554 if (fwrite(data, 1, len, stderr) < len)
2555 /* oh well */;
5471d09a 2556 return 0;
4a8fc3c4 2557 }
2558
2559 /*
2560 * If this is before the real session begins, just return.
2561 */
2562 if (!outptr)
5471d09a 2563 return 0;
4a8fc3c4 2564
bfa5400d 2565 if ((outlen > 0) && (len > 0)) {
32874aea 2566 unsigned used = outlen;
2567 if (used > len)
2568 used = len;
2569 memcpy(outptr, p, used);
2570 outptr += used;
2571 outlen -= used;
2572 p += used;
2573 len -= used;
4a8fc3c4 2574 }
2575
2576 if (len > 0) {
32874aea 2577 if (pendsize < pendlen + len) {
2578 pendsize = pendlen + len + 4096;
3d88e64d 2579 pending = sresize(pending, pendsize, unsigned char);
32874aea 2580 }
2581 memcpy(pending + pendlen, p, len);
2582 pendlen += len;
4a8fc3c4 2583 }
5471d09a 2584
2585 return 0;
4a8fc3c4 2586}
edd0cb8a 2587int from_backend_untrusted(void *frontend_handle, const char *data, int len)
2588{
2589 /*
2590 * No "untrusted" output should get here (the way the code is
2591 * currently, it's all diverted by FLAG_STDERR).
2592 */
2593 assert(!"Unexpected call to from_backend_untrusted()");
2594 return 0; /* not reached */
2595}
bc06669b 2596int from_backend_eof(void *frontend)
2597{
2598 /*
2599 * We expect to be the party deciding when to close the
2600 * connection, so if we see EOF before we sent it ourselves, we
2601 * should panic.
2602 */
2603 if (!sent_eof) {
2604 connection_fatal(frontend,
2605 "Received unexpected end-of-file from SFTP server");
2606 }
2607 return FALSE;
2608}
32874aea 2609int sftp_recvdata(char *buf, int len)
2610{
2611 outptr = (unsigned char *) buf;
4a8fc3c4 2612 outlen = len;
2613
2614 /*
2615 * See if the pending-input block contains some of what we
2616 * need.
2617 */
2618 if (pendlen > 0) {
32874aea 2619 unsigned pendused = pendlen;
2620 if (pendused > outlen)
2621 pendused = outlen;
4a8fc3c4 2622 memcpy(outptr, pending, pendused);
32874aea 2623 memmove(pending, pending + pendused, pendlen - pendused);
4a8fc3c4 2624 outptr += pendused;
2625 outlen -= pendused;
32874aea 2626 pendlen -= pendused;
2627 if (pendlen == 0) {
2628 pendsize = 0;
2629 sfree(pending);
2630 pending = NULL;
2631 }
2632 if (outlen == 0)
2633 return 1;
4a8fc3c4 2634 }
2635
2636 while (outlen > 0) {
34580230 2637 if (back->exitcode(backhandle) >= 0 || ssh_sftp_loop_iteration() < 0)
32874aea 2638 return 0; /* doom */
4a8fc3c4 2639 }
2640
2641 return 1;
2642}
32874aea 2643int sftp_senddata(char *buf, int len)
2644{
776792d7 2645 back->send(backhandle, buf, len);
4a8fc3c4 2646 return 1;
2647}
2648
2649/*
4a8fc3c4 2650 * Short description of parameters.
2651 */
2652static void usage(void)
2653{
2654 printf("PuTTY Secure File Transfer (SFTP) client\n");
2655 printf("%s\n", ver);
90767715 2656 printf("Usage: psftp [options] [user@]host\n");
4a8fc3c4 2657 printf("Options:\n");
2285d016 2658 printf(" -V print version information and exit\n");
2659 printf(" -pgpfp print PGP key fingerprints and exit\n");
9954aaa3 2660 printf(" -b file use specified batchfile\n");
2661 printf(" -bc output batchfile commands\n");
2662 printf(" -be don't stop batchfile processing if errors\n");
4a8fc3c4 2663 printf(" -v show verbose messages\n");
e2a197cf 2664 printf(" -load sessname Load settings from saved session\n");
2665 printf(" -l user connect with specified username\n");
4a8fc3c4 2666 printf(" -P port connect to specified port\n");
2667 printf(" -pw passw login with specified password\n");
e2a197cf 2668 printf(" -1 -2 force use of particular SSH protocol version\n");
05581745 2669 printf(" -4 -6 force use of IPv4 or IPv6\n");
e2a197cf 2670 printf(" -C enable compression\n");
2671 printf(" -i key private key file for authentication\n");
e5708bc7 2672 printf(" -noagent disable use of Pageant\n");
2673 printf(" -agent enable use of Pageant\n");
e2a197cf 2674 printf(" -batch disable all interactive prompts\n");
93b581bd 2675 cleanup_exit(1);
4a8fc3c4 2676}
2677
dc108ebc 2678static void version(void)
2679{
2680 printf("psftp: %s\n", ver);
2681 cleanup_exit(1);
2682}
2683
4a8fc3c4 2684/*
fa3db767 2685 * Connect to a host.
4a8fc3c4 2686 */
fa3db767 2687static int psftp_connect(char *userhost, char *user, int portnumber)
4a8fc3c4 2688{
fa3db767 2689 char *host, *realhost;
cbe2d68f 2690 const char *err;
b51259f6 2691 void *logctx;
4a8fc3c4 2692
2693 /* Separate host and username */
2694 host = userhost;
2695 host = strrchr(host, '@');
2696 if (host == NULL) {
2697 host = userhost;
2698 } else {
2699 *host++ = '\0';
2700 if (user) {
32874aea 2701 printf("psftp: multiple usernames specified; using \"%s\"\n",
2702 user);
4a8fc3c4 2703 } else
2704 user = userhost;
2705 }
2706
18e62ad8 2707 /*
2708 * If we haven't loaded session details already (e.g., from -load),
2709 * try looking for a session called "host".
2710 */
2711 if (!loaded_session) {
2712 /* Try to load settings for `host' into a temporary config */
4a693cfc 2713 Conf *conf2 = conf_new();
2714 conf_set_str(conf2, CONF_host, "");
2715 do_defaults(host, conf2);
2716 if (conf_get_str(conf2, CONF_host)[0] != '\0') {
18e62ad8 2717 /* Settings present and include hostname */
2718 /* Re-load data into the real config. */
4a693cfc 2719 do_defaults(host, conf);
18e62ad8 2720 } else {
2721 /* Session doesn't exist or mention a hostname. */
2722 /* Use `host' as a bare hostname. */
4a693cfc 2723 conf_set_str(conf, CONF_host, host);
18e62ad8 2724 }
af723f29 2725 conf_free(conf2);
18e62ad8 2726 } else {
2727 /* Patch in hostname `host' to session details. */
4a693cfc 2728 conf_set_str(conf, CONF_host, host);
f133db8e 2729 }
2730
2731 /*
2732 * Force use of SSH. (If they got the protocol wrong we assume the
2733 * port is useless too.)
2734 */
4a693cfc 2735 if (conf_get_int(conf, CONF_protocol) != PROT_SSH) {
2736 conf_set_int(conf, CONF_protocol, PROT_SSH);
2737 conf_set_int(conf, CONF_port, 22);
4a8fc3c4 2738 }
2739
449925a6 2740 /*
4123fa9a 2741 * If saved session / Default Settings says SSH-1 (`1 only' or `1'),
2742 * then change it to SSH-2, on the grounds that that's more likely to
2743 * work for SFTP. (Can be overridden with `-1' option.)
2744 * But if it says `2 only' or `2', respect which.
2745 */
4a693cfc 2746 if ((conf_get_int(conf, CONF_sshprot) & ~1) != 2) /* is it 2 or 3? */
2747 conf_set_int(conf, CONF_sshprot, 2);
4123fa9a 2748
2749 /*
c0a81592 2750 * Enact command-line overrides.
2751 */
4a693cfc 2752 cmdline_run_saved(conf);
c0a81592 2753
2754 /*
4a693cfc 2755 * Muck about with the hostname in various ways.
449925a6 2756 */
2757 {
4a693cfc 2758 char *hostbuf = dupstr(conf_get_str(conf, CONF_host));
2759 char *host = hostbuf;
2760 char *p, *q;
449925a6 2761
4a693cfc 2762 /*
2763 * Trim leading whitespace.
2764 */
2765 host += strspn(host, " \t");
449925a6 2766
4a693cfc 2767 /*
2768 * See if host is of the form user@host, and separate out
2769 * the username if so.
2770 */
2771 if (host[0] != '\0') {
2772 char *atsign = strrchr(host, '@');
2773 if (atsign) {
2774 *atsign = '\0';
2775 conf_set_str(conf, CONF_username, host);
2776 host = atsign + 1;
cae0c023 2777 }
cae0c023 2778 }
4a693cfc 2779
2780 /*
2781 * Remove any remaining whitespace.
2782 */
2783 p = hostbuf;
2784 q = host;
2785 while (*q) {
2786 if (*q != ' ' && *q != '\t')
2787 *p++ = *q;
2788 q++;
2789 }
2790 *p = '\0';
2791
2792 conf_set_str(conf, CONF_host, hostbuf);
2793 sfree(hostbuf);
cae0c023 2794 }
2795
4a8fc3c4 2796 /* Set username */
2797 if (user != NULL && user[0] != '\0') {
4a693cfc 2798 conf_set_str(conf, CONF_username, user);
4a8fc3c4 2799 }
4a8fc3c4 2800
4a8fc3c4 2801 if (portnumber)
4a693cfc 2802 conf_set_int(conf, CONF_port, portnumber);
4a8fc3c4 2803
d27b4a18 2804 /*
2805 * Disable scary things which shouldn't be enabled for simple
2806 * things like SCP and SFTP: agent forwarding, port forwarding,
2807 * X forwarding.
2808 */
4a693cfc 2809 conf_set_int(conf, CONF_x11_forward, 0);
2810 conf_set_int(conf, CONF_agentfwd, 0);
2811 conf_set_int(conf, CONF_ssh_simple, TRUE);
2812 {
2813 char *key;
2814 while ((key = conf_get_str_nthstrkey(conf, CONF_portfwd, 0)) != NULL)
2815 conf_del_str_str(conf, CONF_portfwd, key);
2816 }
d27b4a18 2817
bebf22d0 2818 /* Set up subsystem name. */
4a693cfc 2819 conf_set_str(conf, CONF_remote_cmd, "sftp");
2820 conf_set_int(conf, CONF_ssh_subsys, TRUE);
2821 conf_set_int(conf, CONF_nopty, TRUE);
4a8fc3c4 2822
bebf22d0 2823 /*
2e85c969 2824 * Set up fallback option, for SSH-1 servers or servers with the
bebf22d0 2825 * sftp subsystem not enabled but the server binary installed
2826 * in the usual place. We only support fallback on Unix
248c0c5a 2827 * systems, and we use a kludgy piece of shellery which should
2828 * try to find sftp-server in various places (the obvious
2829 * systemwide spots /usr/lib and /usr/local/lib, and then the
2830 * user's PATH) and finally give up.
bebf22d0 2831 *
248c0c5a 2832 * test -x /usr/lib/sftp-server && exec /usr/lib/sftp-server
2833 * test -x /usr/local/lib/sftp-server && exec /usr/local/lib/sftp-server
2834 * exec sftp-server
bebf22d0 2835 *
2836 * the idea being that this will attempt to use either of the
2837 * obvious pathnames and then give up, and when it does give up
2838 * it will print the preferred pathname in the error messages.
2839 */
4a693cfc 2840 conf_set_str(conf, CONF_remote_cmd2,
2841 "test -x /usr/lib/sftp-server &&"
2842 " exec /usr/lib/sftp-server\n"
2843 "test -x /usr/local/lib/sftp-server &&"
2844 " exec /usr/local/lib/sftp-server\n"
2845 "exec sftp-server");
2846 conf_set_int(conf, CONF_ssh_subsys2, FALSE);
bebf22d0 2847
4a8fc3c4 2848 back = &ssh_backend;
2849
4a693cfc 2850 err = back->init(NULL, &backhandle, conf,
2851 conf_get_str(conf, CONF_host),
2852 conf_get_int(conf, CONF_port),
2853 &realhost, 0,
2854 conf_get_int(conf, CONF_tcp_keepalives));
4a8fc3c4 2855 if (err != NULL) {
fa3db767 2856 fprintf(stderr, "ssh_init: %s\n", err);
4a8fc3c4 2857 return 1;
2858 }
4a693cfc 2859 logctx = log_init(NULL, conf);
a8327734 2860 back->provide_logctx(backhandle, logctx);
d3fef4a5 2861 console_provide_logctx(logctx);
d6cc41e6 2862 while (!back->sendok(backhandle)) {
2e528220 2863 if (back->exitcode(backhandle) >= 0)
2864 return 1;
d6cc41e6 2865 if (ssh_sftp_loop_iteration() < 0) {
2866 fprintf(stderr, "ssh_init: error during SSH connection setup\n");
2867 return 1;
2868 }
2869 }
4a8fc3c4 2870 if (verbose && realhost != NULL)
2871 printf("Connected to %s\n", realhost);
679539d7 2872 if (realhost != NULL)
2873 sfree(realhost);
fa3db767 2874 return 0;
2875}
2876
c0a81592 2877void cmdline_error(char *p, ...)
2878{
2879 va_list ap;
86256dc6 2880 fprintf(stderr, "psftp: ");
c0a81592 2881 va_start(ap, p);
2882 vfprintf(stderr, p, ap);
2883 va_end(ap);
86256dc6 2884 fprintf(stderr, "\n try typing \"psftp -h\" for help\n");
c0a81592 2885 exit(1);
2886}
2887
fa3db767 2888/*
2889 * Main program. Parse arguments etc.
2890 */
d6cc41e6 2891int psftp_main(int argc, char *argv[])
fa3db767 2892{
2893 int i;
2894 int portnumber = 0;
2895 char *userhost, *user;
2896 int mode = 0;
2897 int modeflags = 0;
2898 char *batchfile = NULL;
2899
b51259f6 2900 flags = FLAG_STDERR | FLAG_INTERACTIVE
2901#ifdef FLAG_SYNCAGENT
2902 | FLAG_SYNCAGENT
2903#endif
2904 ;
c0a81592 2905 cmdline_tooltype = TOOLTYPE_FILETRANSFER;
fa3db767 2906 sk_init();
2907
2908 userhost = user = NULL;
2909
18e62ad8 2910 /* Load Default Settings before doing anything else. */
4a693cfc 2911 conf = conf_new();
2912 do_defaults(NULL, conf);
18e62ad8 2913 loaded_session = FALSE;
2914
fa3db767 2915 for (i = 1; i < argc; i++) {
c0a81592 2916 int ret;
fa3db767 2917 if (argv[i][0] != '-') {
c0a81592 2918 if (userhost)
2919 usage();
2920 else
2921 userhost = dupstr(argv[i]);
2922 continue;
2923 }
4a693cfc 2924 ret = cmdline_process_param(argv[i], i+1<argc?argv[i+1]:NULL, 1, conf);
c0a81592 2925 if (ret == -2) {
2926 cmdline_error("option \"%s\" requires an argument", argv[i]);
2927 } else if (ret == 2) {
2928 i++; /* skip next argument */
2929 } else if (ret == 1) {
2930 /* We have our own verbosity in addition to `flags'. */
2931 if (flags & FLAG_VERBOSE)
2932 verbose = 1;
fa3db767 2933 } else if (strcmp(argv[i], "-h") == 0 ||
bcb1823f 2934 strcmp(argv[i], "-?") == 0 ||
2935 strcmp(argv[i], "--help") == 0) {
fa3db767 2936 usage();
2285d016 2937 } else if (strcmp(argv[i], "-pgpfp") == 0) {
2938 pgp_fingerprints();
2939 return 1;
bcb1823f 2940 } else if (strcmp(argv[i], "-V") == 0 ||
2941 strcmp(argv[i], "--version") == 0) {
dc108ebc 2942 version();
c0a81592 2943 } else if (strcmp(argv[i], "-batch") == 0) {
2944 console_batch_mode = 1;
fa3db767 2945 } else if (strcmp(argv[i], "-b") == 0 && i + 1 < argc) {
2946 mode = 1;
2947 batchfile = argv[++i];
d13c2ee9 2948 } else if (strcmp(argv[i], "-bc") == 0) {
fa3db767 2949 modeflags = modeflags | 1;
d13c2ee9 2950 } else if (strcmp(argv[i], "-be") == 0) {
fa3db767 2951 modeflags = modeflags | 2;
2952 } else if (strcmp(argv[i], "--") == 0) {
2953 i++;
2954 break;
2955 } else {
86256dc6 2956 cmdline_error("unknown option \"%s\"", argv[i]);
fa3db767 2957 }
2958 }
2959 argc -= i;
2960 argv += i;
2961 back = NULL;
2962
2963 /*
e1bb41d1 2964 * If the loaded session provides a hostname, and a hostname has not
2965 * otherwise been specified, pop it in `userhost' so that
2966 * `psftp -load sessname' is sufficient to start a session.
2967 */
4a693cfc 2968 if (!userhost && conf_get_str(conf, CONF_host)[0] != '\0') {
2969 userhost = dupstr(conf_get_str(conf, CONF_host));
e1bb41d1 2970 }
2971
2972 /*
fa3db767 2973 * If a user@host string has already been provided, connect to
2974 * it now.
2975 */
2976 if (userhost) {
679539d7 2977 int ret;
2978 ret = psftp_connect(userhost, user, portnumber);
2979 sfree(userhost);
2980 if (ret)
fa3db767 2981 return 1;
774204f5 2982 if (do_sftp_init())
2983 return 1;
fa3db767 2984 } else {
2985 printf("psftp: no hostname specified; use \"open host.name\""
679539d7 2986 " to connect\n");
fa3db767 2987 }
4c7f0d61 2988
9954aaa3 2989 do_sftp(mode, modeflags, batchfile);
4a8fc3c4 2990
6226c939 2991 if (back != NULL && back->connected(backhandle)) {
4a8fc3c4 2992 char ch;
51470298 2993 back->special(backhandle, TS_EOF);
bc06669b 2994 sent_eof = TRUE;
4a8fc3c4 2995 sftp_recvdata(&ch, 1);
2996 }
b614ce89 2997 do_sftp_cleanup();
4a8fc3c4 2998 random_save_seed();
679539d7 2999 cmdline_cleanup();
3000 console_provide_logctx(NULL);
679539d7 3001 sk_cleanup();
4a8fc3c4 3002
4c7f0d61 3003 return 0;
3004}