Fix obviously stupid segfault. Ahem.
[u/mdw/putty] / psftp.c
CommitLineData
4c7f0d61 1/*
f4ff9455 2 * psftp.c: (platform-independent) front end for PSFTP.
4c7f0d61 3 */
4
5#include <stdio.h>
6#include <stdlib.h>
f9e162aa 7#include <stdarg.h>
4c7f0d61 8#include <assert.h>
d92624dc 9#include <limits.h>
4c7f0d61 10
4a8fc3c4 11#define PUTTY_DO_GLOBALS
12#include "putty.h"
d6cc41e6 13#include "psftp.h"
4a8fc3c4 14#include "storage.h"
15#include "ssh.h"
4c7f0d61 16#include "sftp.h"
17#include "int64.h"
18
5471d09a 19/*
20 * Since SFTP is a request-response oriented protocol, it requires
21 * no buffer management: when we send data, we stop and wait for an
22 * acknowledgement _anyway_, and so we can't possibly overfill our
23 * send buffer.
24 */
25
fa3db767 26static int psftp_connect(char *userhost, char *user, int portnumber);
07534184 27static int do_sftp_init(void);
679539d7 28void do_sftp_cleanup();
fa3db767 29
4c7f0d61 30/* ----------------------------------------------------------------------
4c7f0d61 31 * sftp client state.
32 */
33
34char *pwd, *homedir;
6b78788a 35static Backend *back;
36static void *backhandle;
3ea863a3 37static Config cfg;
4c7f0d61 38
39/* ----------------------------------------------------------------------
40 * Higher-level helper functions used in commands.
41 */
42
43/*
f9e162aa 44 * Attempt to canonify a pathname starting from the pwd. If
45 * canonification fails, at least fall back to returning a _valid_
46 * pathname (though it may be ugly, eg /home/simon/../foobar).
4c7f0d61 47 */
32874aea 48char *canonify(char *name)
49{
f9e162aa 50 char *fullname, *canonname;
1bc24185 51 struct sftp_packet *pktin;
52 struct sftp_request *req, *rreq;
4a8fc3c4 53
f9e162aa 54 if (name[0] == '/') {
55 fullname = dupstr(name);
56 } else {
4a8fc3c4 57 char *slash;
32874aea 58 if (pwd[strlen(pwd) - 1] == '/')
4a8fc3c4 59 slash = "";
60 else
61 slash = "/";
62 fullname = dupcat(pwd, slash, name, NULL);
f9e162aa 63 }
4a8fc3c4 64
1bc24185 65 sftp_register(req = fxp_realpath_send(fullname));
66 rreq = sftp_find_request(pktin = sftp_recv());
67 assert(rreq == req);
7b7de4f4 68 canonname = fxp_realpath_recv(pktin, rreq);
4a8fc3c4 69
f9e162aa 70 if (canonname) {
71 sfree(fullname);
72 return canonname;
50d7e054 73 } else {
32874aea 74 /*
75 * Attempt number 2. Some FXP_REALPATH implementations
76 * (glibc-based ones, in particular) require the _whole_
77 * path to point to something that exists, whereas others
78 * (BSD-based) only require all but the last component to
79 * exist. So if the first call failed, we should strip off
80 * everything from the last slash onwards and try again,
81 * then put the final component back on.
82 *
83 * Special cases:
84 *
85 * - if the last component is "/." or "/..", then we don't
86 * bother trying this because there's no way it can work.
87 *
88 * - if the thing actually ends with a "/", we remove it
89 * before we start. Except if the string is "/" itself
90 * (although I can't see why we'd have got here if so,
91 * because surely "/" would have worked the first
92 * time?), in which case we don't bother.
93 *
94 * - if there's no slash in the string at all, give up in
95 * confusion (we expect at least one because of the way
96 * we constructed the string).
97 */
98
99 int i;
100 char *returnname;
101
102 i = strlen(fullname);
103 if (i > 2 && fullname[i - 1] == '/')
104 fullname[--i] = '\0'; /* strip trailing / unless at pos 0 */
105 while (i > 0 && fullname[--i] != '/');
106
107 /*
108 * Give up on special cases.
109 */
110 if (fullname[i] != '/' || /* no slash at all */
111 !strcmp(fullname + i, "/.") || /* ends in /. */
112 !strcmp(fullname + i, "/..") || /* ends in /.. */
113 !strcmp(fullname, "/")) {
114 return fullname;
115 }
116
117 /*
118 * Now i points at the slash. Deal with the final special
119 * case i==0 (ie the whole path was "/nonexistentfile").
120 */
121 fullname[i] = '\0'; /* separate the string */
122 if (i == 0) {
1bc24185 123 sftp_register(req = fxp_realpath_send("/"));
32874aea 124 } else {
1bc24185 125 sftp_register(req = fxp_realpath_send(fullname));
32874aea 126 }
1bc24185 127 rreq = sftp_find_request(pktin = sftp_recv());
128 assert(rreq == req);
7b7de4f4 129 canonname = fxp_realpath_recv(pktin, rreq);
32874aea 130
131 if (!canonname)
132 return fullname; /* even that failed; give up */
133
134 /*
135 * We have a canonical name for all but the last path
136 * component. Concatenate the last component and return.
137 */
138 returnname = dupcat(canonname,
139 canonname[strlen(canonname) - 1] ==
140 '/' ? "" : "/", fullname + i + 1, NULL);
141 sfree(fullname);
142 sfree(canonname);
143 return returnname;
50d7e054 144 }
4c7f0d61 145}
146
dcf8495c 147/*
148 * Return a pointer to the portion of str that comes after the last
149 * slash (or backslash or colon, if `local' is TRUE).
150 */
151static char *stripslashes(char *str, int local)
152{
153 char *p;
154
155 if (local) {
156 p = strchr(str, ':');
157 if (p) str = p+1;
158 }
159
160 p = strrchr(str, '/');
161 if (p) str = p+1;
162
163 if (local) {
164 p = strrchr(str, '\\');
165 if (p) str = p+1;
166 }
167
168 return str;
169}
170
4c7f0d61 171/* ----------------------------------------------------------------------
172 * Actual sftp commands.
173 */
174struct sftp_command {
175 char **words;
176 int nwords, wordssize;
32874aea 177 int (*obey) (struct sftp_command *); /* returns <0 to quit */
4c7f0d61 178};
179
32874aea 180int sftp_cmd_null(struct sftp_command *cmd)
181{
df49ff19 182 return 1; /* success */
4c7f0d61 183}
184
32874aea 185int sftp_cmd_unknown(struct sftp_command *cmd)
186{
4c7f0d61 187 printf("psftp: unknown command \"%s\"\n", cmd->words[0]);
df49ff19 188 return 0; /* failure */
4c7f0d61 189}
190
32874aea 191int sftp_cmd_quit(struct sftp_command *cmd)
192{
4c7f0d61 193 return -1;
194}
195
196/*
197 * List a directory. If no arguments are given, list pwd; otherwise
198 * list the directory given in words[1].
199 */
32874aea 200static int sftp_ls_compare(const void *av, const void *bv)
201{
7d2c1789 202 const struct fxp_name *const *a = (const struct fxp_name *const *) av;
203 const struct fxp_name *const *b = (const struct fxp_name *const *) bv;
204 return strcmp((*a)->filename, (*b)->filename);
4c7f0d61 205}
32874aea 206int sftp_cmd_ls(struct sftp_command *cmd)
207{
4c7f0d61 208 struct fxp_handle *dirh;
209 struct fxp_names *names;
7d2c1789 210 struct fxp_name **ournames;
4c7f0d61 211 int nnames, namesize;
212 char *dir, *cdir;
1bc24185 213 struct sftp_packet *pktin;
214 struct sftp_request *req, *rreq;
4c7f0d61 215 int i;
216
fa3db767 217 if (back == NULL) {
218 printf("psftp: not connected to a host; use \"open host.name\"\n");
219 return 0;
220 }
221
4c7f0d61 222 if (cmd->nwords < 2)
223 dir = ".";
224 else
225 dir = cmd->words[1];
226
227 cdir = canonify(dir);
228 if (!cdir) {
229 printf("%s: %s\n", dir, fxp_error());
230 return 0;
231 }
232
233 printf("Listing directory %s\n", cdir);
234
1bc24185 235 sftp_register(req = fxp_opendir_send(cdir));
236 rreq = sftp_find_request(pktin = sftp_recv());
237 assert(rreq == req);
7b7de4f4 238 dirh = fxp_opendir_recv(pktin, rreq);
1bc24185 239
4c7f0d61 240 if (dirh == NULL) {
241 printf("Unable to open %s: %s\n", dir, fxp_error());
242 } else {
243 nnames = namesize = 0;
244 ournames = NULL;
245
246 while (1) {
247
1bc24185 248 sftp_register(req = fxp_readdir_send(dirh));
249 rreq = sftp_find_request(pktin = sftp_recv());
250 assert(rreq == req);
7b7de4f4 251 names = fxp_readdir_recv(pktin, rreq);
1bc24185 252
4c7f0d61 253 if (names == NULL) {
254 if (fxp_error_type() == SSH_FX_EOF)
255 break;
256 printf("Reading directory %s: %s\n", dir, fxp_error());
257 break;
258 }
259 if (names->nnames == 0) {
260 fxp_free_names(names);
261 break;
262 }
263
264 if (nnames + names->nnames >= namesize) {
265 namesize += names->nnames + 128;
3d88e64d 266 ournames = sresize(ournames, namesize, struct fxp_name *);
4c7f0d61 267 }
268
269 for (i = 0; i < names->nnames; i++)
7d2c1789 270 ournames[nnames++] = fxp_dup_name(&names->names[i]);
4c7f0d61 271
4c7f0d61 272 fxp_free_names(names);
273 }
1bc24185 274 sftp_register(req = fxp_close_send(dirh));
275 rreq = sftp_find_request(pktin = sftp_recv());
276 assert(rreq == req);
7b7de4f4 277 fxp_close_recv(pktin, rreq);
4c7f0d61 278
279 /*
280 * Now we have our filenames. Sort them by actual file
281 * name, and then output the longname parts.
282 */
283 qsort(ournames, nnames, sizeof(*ournames), sftp_ls_compare);
284
285 /*
286 * And print them.
287 */
7d2c1789 288 for (i = 0; i < nnames; i++) {
289 printf("%s\n", ournames[i]->longname);
290 fxp_free_name(ournames[i]);
291 }
292 sfree(ournames);
4c7f0d61 293 }
294
295 sfree(cdir);
296
df49ff19 297 return 1;
4c7f0d61 298}
299
300/*
301 * Change directories. We do this by canonifying the new name, then
302 * trying to OPENDIR it. Only if that succeeds do we set the new pwd.
303 */
32874aea 304int sftp_cmd_cd(struct sftp_command *cmd)
305{
4c7f0d61 306 struct fxp_handle *dirh;
1bc24185 307 struct sftp_packet *pktin;
308 struct sftp_request *req, *rreq;
4c7f0d61 309 char *dir;
310
fa3db767 311 if (back == NULL) {
312 printf("psftp: not connected to a host; use \"open host.name\"\n");
313 return 0;
314 }
315
4c7f0d61 316 if (cmd->nwords < 2)
f9e162aa 317 dir = dupstr(homedir);
4c7f0d61 318 else
319 dir = canonify(cmd->words[1]);
320
321 if (!dir) {
322 printf("%s: %s\n", dir, fxp_error());
323 return 0;
324 }
325
1bc24185 326 sftp_register(req = fxp_opendir_send(dir));
327 rreq = sftp_find_request(pktin = sftp_recv());
328 assert(rreq == req);
7b7de4f4 329 dirh = fxp_opendir_recv(pktin, rreq);
1bc24185 330
4c7f0d61 331 if (!dirh) {
332 printf("Directory %s: %s\n", dir, fxp_error());
333 sfree(dir);
334 return 0;
335 }
336
1bc24185 337 sftp_register(req = fxp_close_send(dirh));
338 rreq = sftp_find_request(pktin = sftp_recv());
339 assert(rreq == req);
7b7de4f4 340 fxp_close_recv(pktin, rreq);
4c7f0d61 341
342 sfree(pwd);
343 pwd = dir;
344 printf("Remote directory is now %s\n", pwd);
345
df49ff19 346 return 1;
4c7f0d61 347}
348
349/*
4f2b387f 350 * Print current directory. Easy as pie.
351 */
352int sftp_cmd_pwd(struct sftp_command *cmd)
353{
fa3db767 354 if (back == NULL) {
355 printf("psftp: not connected to a host; use \"open host.name\"\n");
356 return 0;
357 }
358
4f2b387f 359 printf("Remote directory is %s\n", pwd);
df49ff19 360 return 1;
4f2b387f 361}
362
363/*
d92624dc 364 * Get a file and save it at the local end. We have two very
365 * similar commands here: `get' and `reget', which differ in that
366 * `reget' checks for the existence of the destination file and
367 * starts from where a previous aborted transfer left off.
4c7f0d61 368 */
d92624dc 369int sftp_general_get(struct sftp_command *cmd, int restart)
32874aea 370{
4c7f0d61 371 struct fxp_handle *fh;
1bc24185 372 struct sftp_packet *pktin;
373 struct sftp_request *req, *rreq;
c606c42d 374 struct fxp_xfer *xfer;
4c7f0d61 375 char *fname, *outfname;
376 uint64 offset;
377 FILE *fp;
df49ff19 378 int ret;
4c7f0d61 379
fa3db767 380 if (back == NULL) {
381 printf("psftp: not connected to a host; use \"open host.name\"\n");
382 return 0;
383 }
384
4c7f0d61 385 if (cmd->nwords < 2) {
386 printf("get: expects a filename\n");
387 return 0;
388 }
389
390 fname = canonify(cmd->words[1]);
391 if (!fname) {
392 printf("%s: %s\n", cmd->words[1], fxp_error());
393 return 0;
394 }
dcf8495c 395 outfname = (cmd->nwords == 2 ?
396 stripslashes(cmd->words[1], 0) : cmd->words[2]);
4c7f0d61 397
1bc24185 398 sftp_register(req = fxp_open_send(fname, SSH_FXF_READ));
399 rreq = sftp_find_request(pktin = sftp_recv());
400 assert(rreq == req);
7b7de4f4 401 fh = fxp_open_recv(pktin, rreq);
1bc24185 402
4c7f0d61 403 if (!fh) {
404 printf("%s: %s\n", fname, fxp_error());
405 sfree(fname);
406 return 0;
407 }
d92624dc 408
409 if (restart) {
410 fp = fopen(outfname, "rb+");
411 } else {
412 fp = fopen(outfname, "wb");
413 }
414
4c7f0d61 415 if (!fp) {
416 printf("local: unable to open %s\n", outfname);
1bc24185 417
418 sftp_register(req = fxp_close_send(fh));
419 rreq = sftp_find_request(pktin = sftp_recv());
420 assert(rreq == req);
7b7de4f4 421 fxp_close_recv(pktin, rreq);
1bc24185 422
4c7f0d61 423 sfree(fname);
424 return 0;
425 }
426
d92624dc 427 if (restart) {
428 long posn;
429 fseek(fp, 0L, SEEK_END);
430 posn = ftell(fp);
431 printf("reget: restarting at file position %ld\n", posn);
432 offset = uint64_make(0, posn);
433 } else {
434 offset = uint64_make(0, 0);
435 }
4c7f0d61 436
d92624dc 437 printf("remote:%s => local:%s\n", fname, outfname);
4c7f0d61 438
439 /*
440 * FIXME: we can use FXP_FSTAT here to get the file size, and
441 * thus put up a progress bar.
442 */
df49ff19 443 ret = 1;
c606c42d 444 xfer = xfer_download_init(fh, offset);
df0870fc 445 while (!xfer_done(xfer)) {
c606c42d 446 void *vbuf;
447 int ret, len;
4c7f0d61 448 int wpos, wlen;
449
c606c42d 450 xfer_download_queue(xfer);
451 pktin = sftp_recv();
452 ret = xfer_download_gotpkt(xfer, pktin);
453
454 if (ret < 0) {
455 printf("error while reading: %s\n", fxp_error());
456 ret = 0;
4c7f0d61 457 }
32874aea 458
c606c42d 459 while (xfer_download_data(xfer, &vbuf, &len)) {
460 unsigned char *buf = (unsigned char *)vbuf;
461
462 wpos = 0;
463 while (wpos < len) {
464 wlen = fwrite(buf + wpos, 1, len - wpos, fp);
465 if (wlen <= 0) {
466 printf("error while writing local file\n");
467 ret = 0;
468 xfer_set_error(xfer);
469 }
470 wpos += wlen;
471 }
472 if (wpos < len) { /* we had an error */
df49ff19 473 ret = 0;
c606c42d 474 xfer_set_error(xfer);
4c7f0d61 475 }
9ff4e23d 476
477 sfree(vbuf);
df49ff19 478 }
4c7f0d61 479 }
480
c606c42d 481 xfer_cleanup(xfer);
482
4c7f0d61 483 fclose(fp);
1bc24185 484
485 sftp_register(req = fxp_close_send(fh));
486 rreq = sftp_find_request(pktin = sftp_recv());
487 assert(rreq == req);
7b7de4f4 488 fxp_close_recv(pktin, rreq);
1bc24185 489
4c7f0d61 490 sfree(fname);
491
df49ff19 492 return ret;
4c7f0d61 493}
d92624dc 494int sftp_cmd_get(struct sftp_command *cmd)
495{
496 return sftp_general_get(cmd, 0);
497}
498int sftp_cmd_reget(struct sftp_command *cmd)
499{
500 return sftp_general_get(cmd, 1);
501}
4c7f0d61 502
503/*
d92624dc 504 * Send a file and store it at the remote end. We have two very
505 * similar commands here: `put' and `reput', which differ in that
506 * `reput' checks for the existence of the destination file and
507 * starts from where a previous aborted transfer left off.
4c7f0d61 508 */
d92624dc 509int sftp_general_put(struct sftp_command *cmd, int restart)
32874aea 510{
4c7f0d61 511 struct fxp_handle *fh;
df0870fc 512 struct fxp_xfer *xfer;
4c7f0d61 513 char *fname, *origoutfname, *outfname;
1bc24185 514 struct sftp_packet *pktin;
515 struct sftp_request *req, *rreq;
4c7f0d61 516 uint64 offset;
517 FILE *fp;
df0870fc 518 int ret, err, eof;
4c7f0d61 519
fa3db767 520 if (back == NULL) {
521 printf("psftp: not connected to a host; use \"open host.name\"\n");
522 return 0;
523 }
524
4c7f0d61 525 if (cmd->nwords < 2) {
526 printf("put: expects a filename\n");
527 return 0;
528 }
529
530 fname = cmd->words[1];
dcf8495c 531 origoutfname = (cmd->nwords == 2 ?
532 stripslashes(cmd->words[1], 1) : cmd->words[2]);
4c7f0d61 533 outfname = canonify(origoutfname);
f9e162aa 534 if (!outfname) {
4c7f0d61 535 printf("%s: %s\n", origoutfname, fxp_error());
536 return 0;
537 }
538
539 fp = fopen(fname, "rb");
540 if (!fp) {
541 printf("local: unable to open %s\n", fname);
4c7f0d61 542 sfree(outfname);
543 return 0;
544 }
d92624dc 545 if (restart) {
1bc24185 546 sftp_register(req = fxp_open_send(outfname, SSH_FXF_WRITE));
d92624dc 547 } else {
1bc24185 548 sftp_register(req = fxp_open_send(outfname, SSH_FXF_WRITE |
549 SSH_FXF_CREAT | SSH_FXF_TRUNC));
d92624dc 550 }
1bc24185 551 rreq = sftp_find_request(pktin = sftp_recv());
552 assert(rreq == req);
7b7de4f4 553 fh = fxp_open_recv(pktin, rreq);
1bc24185 554
4c7f0d61 555 if (!fh) {
556 printf("%s: %s\n", outfname, fxp_error());
557 sfree(outfname);
558 return 0;
559 }
560
d92624dc 561 if (restart) {
562 char decbuf[30];
563 struct fxp_attrs attrs;
1bc24185 564 int ret;
565
566 sftp_register(req = fxp_fstat_send(fh));
567 rreq = sftp_find_request(pktin = sftp_recv());
568 assert(rreq == req);
7b7de4f4 569 ret = fxp_fstat_recv(pktin, rreq, &attrs);
1bc24185 570
571 if (!ret) {
d92624dc 572 printf("read size of %s: %s\n", outfname, fxp_error());
573 sfree(outfname);
574 return 0;
575 }
576 if (!(attrs.flags & SSH_FILEXFER_ATTR_SIZE)) {
577 printf("read size of %s: size was not given\n", outfname);
578 sfree(outfname);
579 return 0;
580 }
581 offset = attrs.size;
582 uint64_decimal(offset, decbuf);
583 printf("reput: restarting at file position %s\n", decbuf);
584 if (uint64_compare(offset, uint64_make(0, LONG_MAX)) > 0) {
585 printf("reput: remote file is larger than we can deal with\n");
586 sfree(outfname);
587 return 0;
588 }
589 if (fseek(fp, offset.lo, SEEK_SET) != 0)
590 fseek(fp, 0, SEEK_END); /* *shrug* */
591 } else {
592 offset = uint64_make(0, 0);
593 }
4c7f0d61 594
d92624dc 595 printf("local:%s => remote:%s\n", fname, outfname);
4c7f0d61 596
597 /*
598 * FIXME: we can use FXP_FSTAT here to get the file size, and
599 * thus put up a progress bar.
600 */
df49ff19 601 ret = 1;
df0870fc 602 xfer = xfer_upload_init(fh, offset);
603 err = eof = 0;
604 while ((!err && !eof) || !xfer_done(xfer)) {
4c7f0d61 605 char buffer[4096];
1bc24185 606 int len, ret;
4c7f0d61 607
df0870fc 608 while (xfer_upload_ready(xfer) && !err && !eof) {
609 len = fread(buffer, 1, sizeof(buffer), fp);
610 if (len == -1) {
611 printf("error while reading local file\n");
612 err = 1;
613 } else if (len == 0) {
614 eof = 1;
615 } else {
616 xfer_upload_data(xfer, buffer, len);
617 }
4c7f0d61 618 }
1bc24185 619
2dbd915a 620 if (!xfer_done(xfer)) {
621 pktin = sftp_recv();
622 ret = xfer_upload_gotpkt(xfer, pktin);
623 if (!ret) {
624 printf("error while writing: %s\n", fxp_error());
625 err = 1;
626 }
4c7f0d61 627 }
4c7f0d61 628 }
629
df0870fc 630 xfer_cleanup(xfer);
631
1bc24185 632 sftp_register(req = fxp_close_send(fh));
633 rreq = sftp_find_request(pktin = sftp_recv());
634 assert(rreq == req);
7b7de4f4 635 fxp_close_recv(pktin, rreq);
1bc24185 636
4c7f0d61 637 fclose(fp);
638 sfree(outfname);
639
df49ff19 640 return ret;
4c7f0d61 641}
d92624dc 642int sftp_cmd_put(struct sftp_command *cmd)
643{
644 return sftp_general_put(cmd, 0);
645}
646int sftp_cmd_reput(struct sftp_command *cmd)
647{
648 return sftp_general_put(cmd, 1);
649}
4c7f0d61 650
9954aaa3 651int sftp_cmd_mkdir(struct sftp_command *cmd)
652{
653 char *dir;
1bc24185 654 struct sftp_packet *pktin;
655 struct sftp_request *req, *rreq;
9954aaa3 656 int result;
657
fa3db767 658 if (back == NULL) {
659 printf("psftp: not connected to a host; use \"open host.name\"\n");
660 return 0;
661 }
9954aaa3 662
663 if (cmd->nwords < 2) {
664 printf("mkdir: expects a directory\n");
665 return 0;
666 }
667
668 dir = canonify(cmd->words[1]);
669 if (!dir) {
670 printf("%s: %s\n", dir, fxp_error());
671 return 0;
672 }
673
1bc24185 674 sftp_register(req = fxp_mkdir_send(dir));
675 rreq = sftp_find_request(pktin = sftp_recv());
676 assert(rreq == req);
7b7de4f4 677 result = fxp_mkdir_recv(pktin, rreq);
1bc24185 678
9954aaa3 679 if (!result) {
680 printf("mkdir %s: %s\n", dir, fxp_error());
681 sfree(dir);
682 return 0;
683 }
684
d92624dc 685 sfree(dir);
df49ff19 686 return 1;
9954aaa3 687}
688
689int sftp_cmd_rmdir(struct sftp_command *cmd)
690{
691 char *dir;
1bc24185 692 struct sftp_packet *pktin;
693 struct sftp_request *req, *rreq;
9954aaa3 694 int result;
695
fa3db767 696 if (back == NULL) {
697 printf("psftp: not connected to a host; use \"open host.name\"\n");
698 return 0;
699 }
9954aaa3 700
701 if (cmd->nwords < 2) {
702 printf("rmdir: expects a directory\n");
703 return 0;
704 }
705
706 dir = canonify(cmd->words[1]);
707 if (!dir) {
708 printf("%s: %s\n", dir, fxp_error());
709 return 0;
710 }
711
1bc24185 712 sftp_register(req = fxp_rmdir_send(dir));
713 rreq = sftp_find_request(pktin = sftp_recv());
714 assert(rreq == req);
7b7de4f4 715 result = fxp_rmdir_recv(pktin, rreq);
1bc24185 716
9954aaa3 717 if (!result) {
718 printf("rmdir %s: %s\n", dir, fxp_error());
719 sfree(dir);
720 return 0;
721 }
722
d92624dc 723 sfree(dir);
df49ff19 724 return 1;
9954aaa3 725}
726
727int sftp_cmd_rm(struct sftp_command *cmd)
728{
729 char *fname;
1bc24185 730 struct sftp_packet *pktin;
731 struct sftp_request *req, *rreq;
9954aaa3 732 int result;
733
fa3db767 734 if (back == NULL) {
735 printf("psftp: not connected to a host; use \"open host.name\"\n");
736 return 0;
737 }
738
9954aaa3 739 if (cmd->nwords < 2) {
740 printf("rm: expects a filename\n");
741 return 0;
742 }
743
744 fname = canonify(cmd->words[1]);
745 if (!fname) {
746 printf("%s: %s\n", fname, fxp_error());
747 return 0;
748 }
749
1bc24185 750 sftp_register(req = fxp_remove_send(fname));
751 rreq = sftp_find_request(pktin = sftp_recv());
752 assert(rreq == req);
7b7de4f4 753 result = fxp_remove_recv(pktin, rreq);
1bc24185 754
9954aaa3 755 if (!result) {
756 printf("rm %s: %s\n", fname, fxp_error());
757 sfree(fname);
758 return 0;
759 }
760
d92624dc 761 sfree(fname);
df49ff19 762 return 1;
d92624dc 763}
764
765int sftp_cmd_mv(struct sftp_command *cmd)
766{
767 char *srcfname, *dstfname;
1bc24185 768 struct sftp_packet *pktin;
769 struct sftp_request *req, *rreq;
d92624dc 770 int result;
771
fa3db767 772 if (back == NULL) {
773 printf("psftp: not connected to a host; use \"open host.name\"\n");
774 return 0;
775 }
776
d92624dc 777 if (cmd->nwords < 3) {
778 printf("mv: expects two filenames\n");
9954aaa3 779 return 0;
d92624dc 780 }
781 srcfname = canonify(cmd->words[1]);
782 if (!srcfname) {
783 printf("%s: %s\n", srcfname, fxp_error());
784 return 0;
785 }
786
787 dstfname = canonify(cmd->words[2]);
788 if (!dstfname) {
789 printf("%s: %s\n", dstfname, fxp_error());
790 return 0;
791 }
9954aaa3 792
1bc24185 793 sftp_register(req = fxp_rename_send(srcfname, dstfname));
794 rreq = sftp_find_request(pktin = sftp_recv());
795 assert(rreq == req);
7b7de4f4 796 result = fxp_rename_recv(pktin, rreq);
1bc24185 797
d92624dc 798 if (!result) {
799 char const *error = fxp_error();
800 struct fxp_attrs attrs;
801
802 /*
803 * The move might have failed because dstfname pointed at a
804 * directory. We check this possibility now: if dstfname
805 * _is_ a directory, we re-attempt the move by appending
806 * the basename of srcfname to dstfname.
807 */
1bc24185 808 sftp_register(req = fxp_stat_send(dstfname));
809 rreq = sftp_find_request(pktin = sftp_recv());
810 assert(rreq == req);
7b7de4f4 811 result = fxp_stat_recv(pktin, rreq, &attrs);
1bc24185 812
d92624dc 813 if (result &&
814 (attrs.flags & SSH_FILEXFER_ATTR_PERMISSIONS) &&
815 (attrs.permissions & 0040000)) {
816 char *p;
817 char *newname, *newcanon;
818 printf("(destination %s is a directory)\n", dstfname);
819 p = srcfname + strlen(srcfname);
820 while (p > srcfname && p[-1] != '/') p--;
821 newname = dupcat(dstfname, "/", p, NULL);
822 newcanon = canonify(newname);
823 sfree(newname);
824 if (newcanon) {
825 sfree(dstfname);
826 dstfname = newcanon;
1bc24185 827
828 sftp_register(req = fxp_rename_send(srcfname, dstfname));
829 rreq = sftp_find_request(pktin = sftp_recv());
830 assert(rreq == req);
7b7de4f4 831 result = fxp_rename_recv(pktin, rreq);
1bc24185 832
d92624dc 833 error = result ? NULL : fxp_error();
834 }
835 }
836 if (error) {
837 printf("mv %s %s: %s\n", srcfname, dstfname, error);
838 sfree(srcfname);
839 sfree(dstfname);
840 return 0;
841 }
842 }
843 printf("%s -> %s\n", srcfname, dstfname);
844
845 sfree(srcfname);
846 sfree(dstfname);
df49ff19 847 return 1;
9954aaa3 848}
849
d92624dc 850int sftp_cmd_chmod(struct sftp_command *cmd)
851{
852 char *fname, *mode;
853 int result;
854 struct fxp_attrs attrs;
855 unsigned attrs_clr, attrs_xor, oldperms, newperms;
1bc24185 856 struct sftp_packet *pktin;
857 struct sftp_request *req, *rreq;
d92624dc 858
fa3db767 859 if (back == NULL) {
860 printf("psftp: not connected to a host; use \"open host.name\"\n");
861 return 0;
862 }
863
d92624dc 864 if (cmd->nwords < 3) {
865 printf("chmod: expects a mode specifier and a filename\n");
866 return 0;
867 }
868
869 /*
870 * Attempt to parse the mode specifier in cmd->words[1]. We
871 * don't support the full horror of Unix chmod; instead we
872 * support a much simpler syntax in which the user can either
873 * specify an octal number, or a comma-separated sequence of
874 * [ugoa]*[-+=][rwxst]+. (The initial [ugoa] sequence may
875 * _only_ be omitted if the only attribute mentioned is t,
876 * since all others require a user/group/other specification.
877 * Additionally, the s attribute may not be specified for any
878 * [ugoa] specifications other than exactly u or exactly g.
879 */
880 attrs_clr = attrs_xor = 0;
881 mode = cmd->words[1];
882 if (mode[0] >= '0' && mode[0] <= '9') {
883 if (mode[strspn(mode, "01234567")]) {
884 printf("chmod: numeric file modes should"
885 " contain digits 0-7 only\n");
886 return 0;
887 }
888 attrs_clr = 07777;
889 sscanf(mode, "%o", &attrs_xor);
890 attrs_xor &= attrs_clr;
891 } else {
892 while (*mode) {
893 char *modebegin = mode;
894 unsigned subset, perms;
895 int action;
896
897 subset = 0;
898 while (*mode && *mode != ',' &&
899 *mode != '+' && *mode != '-' && *mode != '=') {
900 switch (*mode) {
901 case 'u': subset |= 04700; break; /* setuid, user perms */
902 case 'g': subset |= 02070; break; /* setgid, group perms */
903 case 'o': subset |= 00007; break; /* just other perms */
904 case 'a': subset |= 06777; break; /* all of the above */
905 default:
906 printf("chmod: file mode '%.*s' contains unrecognised"
907 " user/group/other specifier '%c'\n",
b51259f6 908 (int)strcspn(modebegin, ","), modebegin, *mode);
d92624dc 909 return 0;
910 }
911 mode++;
912 }
913 if (!*mode || *mode == ',') {
914 printf("chmod: file mode '%.*s' is incomplete\n",
b51259f6 915 (int)strcspn(modebegin, ","), modebegin);
d92624dc 916 return 0;
917 }
918 action = *mode++;
919 if (!*mode || *mode == ',') {
920 printf("chmod: file mode '%.*s' is incomplete\n",
b51259f6 921 (int)strcspn(modebegin, ","), modebegin);
d92624dc 922 return 0;
923 }
924 perms = 0;
925 while (*mode && *mode != ',') {
926 switch (*mode) {
927 case 'r': perms |= 00444; break;
928 case 'w': perms |= 00222; break;
929 case 'x': perms |= 00111; break;
930 case 't': perms |= 01000; subset |= 01000; break;
931 case 's':
932 if ((subset & 06777) != 04700 &&
933 (subset & 06777) != 02070) {
934 printf("chmod: file mode '%.*s': set[ug]id bit should"
935 " be used with exactly one of u or g only\n",
b51259f6 936 (int)strcspn(modebegin, ","), modebegin);
d92624dc 937 return 0;
938 }
939 perms |= 06000;
940 break;
941 default:
942 printf("chmod: file mode '%.*s' contains unrecognised"
943 " permission specifier '%c'\n",
b51259f6 944 (int)strcspn(modebegin, ","), modebegin, *mode);
d92624dc 945 return 0;
946 }
947 mode++;
948 }
949 if (!(subset & 06777) && (perms &~ subset)) {
950 printf("chmod: file mode '%.*s' contains no user/group/other"
951 " specifier and permissions other than 't' \n",
b51259f6 952 (int)strcspn(modebegin, ","), modebegin);
d92624dc 953 return 0;
954 }
955 perms &= subset;
956 switch (action) {
957 case '+':
958 attrs_clr |= perms;
959 attrs_xor |= perms;
960 break;
961 case '-':
962 attrs_clr |= perms;
963 attrs_xor &= ~perms;
964 break;
965 case '=':
966 attrs_clr |= subset;
967 attrs_xor |= perms;
968 break;
969 }
970 if (*mode) mode++; /* eat comma */
971 }
972 }
973
974 fname = canonify(cmd->words[2]);
975 if (!fname) {
976 printf("%s: %s\n", fname, fxp_error());
977 return 0;
978 }
979
1bc24185 980 sftp_register(req = fxp_stat_send(fname));
981 rreq = sftp_find_request(pktin = sftp_recv());
982 assert(rreq == req);
7b7de4f4 983 result = fxp_stat_recv(pktin, rreq, &attrs);
1bc24185 984
d92624dc 985 if (!result || !(attrs.flags & SSH_FILEXFER_ATTR_PERMISSIONS)) {
986 printf("get attrs for %s: %s\n", fname,
987 result ? "file permissions not provided" : fxp_error());
988 sfree(fname);
989 return 0;
990 }
991
992 attrs.flags = SSH_FILEXFER_ATTR_PERMISSIONS; /* perms _only_ */
993 oldperms = attrs.permissions & 07777;
994 attrs.permissions &= ~attrs_clr;
995 attrs.permissions ^= attrs_xor;
996 newperms = attrs.permissions & 07777;
997
1bc24185 998 sftp_register(req = fxp_setstat_send(fname, attrs));
999 rreq = sftp_find_request(pktin = sftp_recv());
1000 assert(rreq == req);
7b7de4f4 1001 result = fxp_setstat_recv(pktin, rreq);
d92624dc 1002
1003 if (!result) {
1004 printf("set attrs for %s: %s\n", fname, fxp_error());
1005 sfree(fname);
1006 return 0;
1007 }
1008
1009 printf("%s: %04o -> %04o\n", fname, oldperms, newperms);
1010
1011 sfree(fname);
df49ff19 1012 return 1;
d92624dc 1013}
9954aaa3 1014
fa3db767 1015static int sftp_cmd_open(struct sftp_command *cmd)
1016{
f11233cb 1017 int portnumber;
1018
fa3db767 1019 if (back != NULL) {
1020 printf("psftp: already connected\n");
1021 return 0;
1022 }
1023
1024 if (cmd->nwords < 2) {
1025 printf("open: expects a host name\n");
1026 return 0;
1027 }
1028
f11233cb 1029 if (cmd->nwords > 2) {
1030 portnumber = atoi(cmd->words[2]);
1031 if (portnumber == 0) {
1032 printf("open: invalid port number\n");
1033 return 0;
1034 }
1035 } else
1036 portnumber = 0;
1037
1038 if (psftp_connect(cmd->words[1], NULL, portnumber)) {
fa3db767 1039 back = NULL; /* connection is already closed */
1040 return -1; /* this is fatal */
1041 }
1042 do_sftp_init();
df49ff19 1043 return 1;
fa3db767 1044}
1045
3af97463 1046static int sftp_cmd_lcd(struct sftp_command *cmd)
1047{
d6cc41e6 1048 char *currdir, *errmsg;
3af97463 1049
1050 if (cmd->nwords < 2) {
1051 printf("lcd: expects a local directory name\n");
1052 return 0;
1053 }
1054
d6cc41e6 1055 errmsg = psftp_lcd(cmd->words[1]);
1056 if (errmsg) {
1057 printf("lcd: unable to change directory: %s\n", errmsg);
1058 sfree(errmsg);
3af97463 1059 return 0;
1060 }
1061
d6cc41e6 1062 currdir = psftp_getcwd();
3af97463 1063 printf("New local directory is %s\n", currdir);
1064 sfree(currdir);
1065
1066 return 1;
1067}
1068
1069static int sftp_cmd_lpwd(struct sftp_command *cmd)
1070{
1071 char *currdir;
3af97463 1072
d6cc41e6 1073 currdir = psftp_getcwd();
3af97463 1074 printf("Current local directory is %s\n", currdir);
1075 sfree(currdir);
1076
1077 return 1;
1078}
1079
1080static int sftp_cmd_pling(struct sftp_command *cmd)
1081{
1082 int exitcode;
1083
1084 exitcode = system(cmd->words[1]);
1085 return (exitcode == 0);
1086}
1087
bf5240cd 1088static int sftp_cmd_help(struct sftp_command *cmd);
1089
4c7f0d61 1090static struct sftp_cmd_lookup {
1091 char *name;
bf5240cd 1092 /*
1093 * For help purposes, there are two kinds of command:
1094 *
1095 * - primary commands, in which `longhelp' is non-NULL. In
1096 * this case `shorthelp' is descriptive text, and `longhelp'
1097 * is longer descriptive text intended to be printed after
1098 * the command name.
1099 *
1100 * - alias commands, in which `longhelp' is NULL. In this case
1101 * `shorthelp' is the name of a primary command, which
1102 * contains the help that should double up for this command.
1103 */
3af97463 1104 int listed; /* do we list this in primary help? */
bf5240cd 1105 char *shorthelp;
1106 char *longhelp;
32874aea 1107 int (*obey) (struct sftp_command *);
4c7f0d61 1108} sftp_lookup[] = {
1109 /*
1110 * List of sftp commands. This is binary-searched so it MUST be
1111 * in ASCII order.
1112 */
32874aea 1113 {
d6cc41e6 1114 "!", TRUE, "run a local command",
3af97463 1115 "<command>\n"
d6cc41e6 1116 /* FIXME: this example is crap for non-Windows. */
1117 " Runs a local command. For example, \"!del myfile\".\n",
3af97463 1118 sftp_cmd_pling
1119 },
1120 {
1121 "bye", TRUE, "finish your SFTP session",
bf5240cd 1122 "\n"
1123 " Terminates your SFTP session and quits the PSFTP program.\n",
1124 sftp_cmd_quit
1125 },
1126 {
3af97463 1127 "cd", TRUE, "change your remote working directory",
bf5240cd 1128 " [ <New working directory> ]\n"
1129 " Change the remote working directory for your SFTP session.\n"
1130 " If a new working directory is not supplied, you will be\n"
1131 " returned to your home directory.\n",
1132 sftp_cmd_cd
1133 },
1134 {
3af97463 1135 "chmod", TRUE, "change file permissions and modes",
bf5240cd 1136 " ( <octal-digits> | <modifiers> ) <filename>\n"
1137 " Change the file permissions on a file or directory.\n"
1138 " <octal-digits> can be any octal Unix permission specifier.\n"
1139 " Alternatively, <modifiers> can include:\n"
1140 " u+r make file readable by owning user\n"
1141 " u+w make file writable by owning user\n"
1142 " u+x make file executable by owning user\n"
1143 " u-r make file not readable by owning user\n"
1144 " [also u-w, u-x]\n"
1145 " g+r make file readable by members of owning group\n"
1146 " [also g+w, g+x, g-r, g-w, g-x]\n"
1147 " o+r make file readable by all other users\n"
1148 " [also o+w, o+x, o-r, o-w, o-x]\n"
1149 " a+r make file readable by absolutely everybody\n"
1150 " [also a+w, a+x, a-r, a-w, a-x]\n"
1151 " u+s enable the Unix set-user-ID bit\n"
1152 " u-s disable the Unix set-user-ID bit\n"
1153 " g+s enable the Unix set-group-ID bit\n"
1154 " g-s disable the Unix set-group-ID bit\n"
1155 " +t enable the Unix \"sticky bit\"\n"
1156 " You can give more than one modifier for the same user (\"g-rwx\"), and\n"
1157 " more than one user for the same modifier (\"ug+w\"). You can\n"
1158 " use commas to separate different modifiers (\"u+rwx,g+s\").\n",
1159 sftp_cmd_chmod
1160 },
1161 {
3af97463 1162 "del", TRUE, "delete a file",
bf5240cd 1163 " <filename>\n"
1164 " Delete a file.\n",
1165 sftp_cmd_rm
1166 },
1167 {
3af97463 1168 "delete", FALSE, "del", NULL, sftp_cmd_rm
bf5240cd 1169 },
1170 {
3af97463 1171 "dir", TRUE, "list contents of a remote directory",
bf5240cd 1172 " [ <directory-name> ]\n"
1173 " List the contents of a specified directory on the server.\n"
1174 " If <directory-name> is not given, the current working directory\n"
1175 " will be listed.\n",
1176 sftp_cmd_ls
1177 },
1178 {
3af97463 1179 "exit", TRUE, "bye", NULL, sftp_cmd_quit
bf5240cd 1180 },
1181 {
3af97463 1182 "get", TRUE, "download a file from the server to your local machine",
bf5240cd 1183 " <filename> [ <local-filename> ]\n"
1184 " Downloads a file on the server and stores it locally under\n"
1185 " the same name, or under a different one if you supply the\n"
1186 " argument <local-filename>.\n",
1187 sftp_cmd_get
1188 },
1189 {
3af97463 1190 "help", TRUE, "give help",
bf5240cd 1191 " [ <command> [ <command> ... ] ]\n"
1192 " Give general help if no commands are specified.\n"
1193 " If one or more commands are specified, give specific help on\n"
1194 " those particular commands.\n",
1195 sftp_cmd_help
1196 },
1197 {
3af97463 1198 "lcd", TRUE, "change local working directory",
1199 " <local-directory-name>\n"
1200 " Change the local working directory of the PSFTP program (the\n"
1201 " default location where the \"get\" command will save files).\n",
1202 sftp_cmd_lcd
1203 },
1204 {
1205 "lpwd", TRUE, "print local working directory",
1206 "\n"
1207 " Print the local working directory of the PSFTP program (the\n"
1208 " default location where the \"get\" command will save files).\n",
1209 sftp_cmd_lpwd
1210 },
1211 {
1212 "ls", TRUE, "dir", NULL,
bf5240cd 1213 sftp_cmd_ls
1214 },
1215 {
3af97463 1216 "mkdir", TRUE, "create a directory on the remote server",
bf5240cd 1217 " <directory-name>\n"
1218 " Creates a directory with the given name on the server.\n",
1219 sftp_cmd_mkdir
1220 },
1221 {
3af97463 1222 "mv", TRUE, "move or rename a file on the remote server",
bf5240cd 1223 " <source-filename> <destination-filename>\n"
1224 " Moves or renames the file <source-filename> on the server,\n"
1225 " so that it is accessible under the name <destination-filename>.\n",
1226 sftp_cmd_mv
1227 },
1228 {
3af97463 1229 "open", TRUE, "connect to a host",
f11233cb 1230 " [<user>@]<hostname> [<port>]\n"
fa3db767 1231 " Establishes an SFTP connection to a given host. Only usable\n"
1232 " when you did not already specify a host name on the command\n"
1233 " line.\n",
1234 sftp_cmd_open
1235 },
1236 {
56542985 1237 "put", TRUE, "upload a file from your local machine to the server",
1238 " <filename> [ <remote-filename> ]\n"
1239 " Uploads a file to the server and stores it there under\n"
1240 " the same name, or under a different one if you supply the\n"
1241 " argument <remote-filename>.\n",
1242 sftp_cmd_put
1243 },
1244 {
3af97463 1245 "pwd", TRUE, "print your remote working directory",
4f2b387f 1246 "\n"
1247 " Print the current remote working directory for your SFTP session.\n",
1248 sftp_cmd_pwd
1249 },
1250 {
3af97463 1251 "quit", TRUE, "bye", NULL,
bf5240cd 1252 sftp_cmd_quit
1253 },
1254 {
3af97463 1255 "reget", TRUE, "continue downloading a file",
bf5240cd 1256 " <filename> [ <local-filename> ]\n"
1257 " Works exactly like the \"get\" command, but the local file\n"
1258 " must already exist. The download will begin at the end of the\n"
1259 " file. This is for resuming a download that was interrupted.\n",
1260 sftp_cmd_reget
1261 },
1262 {
3af97463 1263 "ren", TRUE, "mv", NULL,
bf5240cd 1264 sftp_cmd_mv
1265 },
1266 {
3af97463 1267 "rename", FALSE, "mv", NULL,
bf5240cd 1268 sftp_cmd_mv
1269 },
1270 {
3af97463 1271 "reput", TRUE, "continue uploading a file",
bf5240cd 1272 " <filename> [ <remote-filename> ]\n"
1273 " Works exactly like the \"put\" command, but the remote file\n"
1274 " must already exist. The upload will begin at the end of the\n"
1275 " file. This is for resuming an upload that was interrupted.\n",
1276 sftp_cmd_reput
1277 },
1278 {
3af97463 1279 "rm", TRUE, "del", NULL,
bf5240cd 1280 sftp_cmd_rm
1281 },
1282 {
3af97463 1283 "rmdir", TRUE, "remove a directory on the remote server",
bf5240cd 1284 " <directory-name>\n"
1285 " Removes the directory with the given name on the server.\n"
1286 " The directory will not be removed unless it is empty.\n",
1287 sftp_cmd_rmdir
1288 }
1289};
1290
1291const struct sftp_cmd_lookup *lookup_command(char *name)
1292{
1293 int i, j, k, cmp;
1294
1295 i = -1;
1296 j = sizeof(sftp_lookup) / sizeof(*sftp_lookup);
1297 while (j - i > 1) {
1298 k = (j + i) / 2;
1299 cmp = strcmp(name, sftp_lookup[k].name);
1300 if (cmp < 0)
1301 j = k;
1302 else if (cmp > 0)
1303 i = k;
1304 else {
1305 return &sftp_lookup[k];
1306 }
1307 }
1308 return NULL;
1309}
1310
1311static int sftp_cmd_help(struct sftp_command *cmd)
1312{
1313 int i;
1314 if (cmd->nwords == 1) {
1315 /*
1316 * Give short help on each command.
1317 */
1318 int maxlen;
1319 maxlen = 0;
1320 for (i = 0; i < sizeof(sftp_lookup) / sizeof(*sftp_lookup); i++) {
3af97463 1321 int len;
1322 if (!sftp_lookup[i].listed)
1323 continue;
1324 len = strlen(sftp_lookup[i].name);
bf5240cd 1325 if (maxlen < len)
1326 maxlen = len;
1327 }
1328 for (i = 0; i < sizeof(sftp_lookup) / sizeof(*sftp_lookup); i++) {
1329 const struct sftp_cmd_lookup *lookup;
3af97463 1330 if (!sftp_lookup[i].listed)
1331 continue;
bf5240cd 1332 lookup = &sftp_lookup[i];
1333 printf("%-*s", maxlen+2, lookup->name);
1334 if (lookup->longhelp == NULL)
1335 lookup = lookup_command(lookup->shorthelp);
1336 printf("%s\n", lookup->shorthelp);
1337 }
1338 } else {
1339 /*
1340 * Give long help on specific commands.
1341 */
1342 for (i = 1; i < cmd->nwords; i++) {
1343 const struct sftp_cmd_lookup *lookup;
1344 lookup = lookup_command(cmd->words[i]);
1345 if (!lookup) {
1346 printf("help: %s: command not found\n", cmd->words[i]);
1347 } else {
1348 printf("%s", lookup->name);
1349 if (lookup->longhelp == NULL)
1350 lookup = lookup_command(lookup->shorthelp);
1351 printf("%s", lookup->longhelp);
1352 }
1353 }
1354 }
df49ff19 1355 return 1;
bf5240cd 1356}
4c7f0d61 1357
1358/* ----------------------------------------------------------------------
1359 * Command line reading and parsing.
1360 */
9954aaa3 1361struct sftp_command *sftp_getcmd(FILE *fp, int mode, int modeflags)
32874aea 1362{
4c7f0d61 1363 char *line;
4c7f0d61 1364 struct sftp_command *cmd;
1365 char *p, *q, *r;
1366 int quoting;
1367
3d88e64d 1368 cmd = snew(struct sftp_command);
4c7f0d61 1369 cmd->words = NULL;
1370 cmd->nwords = 0;
1371 cmd->wordssize = 0;
1372
1373 line = NULL;
39934deb 1374
1375 if (fp) {
1376 if (modeflags & 1)
1377 printf("psftp> ");
1378 line = fgetline(fp);
1379 } else {
1380 line = ssh_sftp_get_cmdline("psftp> ");
4c7f0d61 1381 }
39934deb 1382
1383 if (!line || !*line) {
1384 cmd->obey = sftp_cmd_quit;
1385 if ((mode == 0) || (modeflags & 1))
1386 printf("quit\n");
1387 return cmd; /* eof */
1388 }
1389
1390 line[strcspn(line, "\r\n")] = '\0';
1391
df49ff19 1392 if (modeflags & 1) {
1393 printf("%s\n", line);
1394 }
4c7f0d61 1395
4c7f0d61 1396 p = line;
3af97463 1397 while (*p && (*p == ' ' || *p == '\t'))
1398 p++;
1399
1400 if (*p == '!') {
1401 /*
1402 * Special case: the ! command. This is always parsed as
1403 * exactly two words: one containing the !, and the second
1404 * containing everything else on the line.
1405 */
1406 cmd->nwords = cmd->wordssize = 2;
3d88e64d 1407 cmd->words = sresize(cmd->words, cmd->wordssize, char *);
679539d7 1408 cmd->words[0] = dupstr("!");
1409 cmd->words[1] = dupstr(p+1);
3af97463 1410 } else {
1411
1412 /*
1413 * Parse the command line into words. The syntax is:
1414 * - double quotes are removed, but cause spaces within to be
1415 * treated as non-separating.
1416 * - a double-doublequote pair is a literal double quote, inside
1417 * _or_ outside quotes. Like this:
1418 *
1419 * firstword "second word" "this has ""quotes"" in" and""this""
1420 *
1421 * becomes
1422 *
1423 * >firstword<
1424 * >second word<
1425 * >this has "quotes" in<
1426 * >and"this"<
1427 */
4c7f0d61 1428 while (*p) {
3af97463 1429 /* skip whitespace */
1430 while (*p && (*p == ' ' || *p == '\t'))
1431 p++;
1432 /* mark start of word */
1433 q = r = p; /* q sits at start, r writes word */
1434 quoting = 0;
1435 while (*p) {
1436 if (!quoting && (*p == ' ' || *p == '\t'))
1437 break; /* reached end of word */
1438 else if (*p == '"' && p[1] == '"')
1439 p += 2, *r++ = '"'; /* a literal quote */
1440 else if (*p == '"')
1441 p++, quoting = !quoting;
1442 else
1443 *r++ = *p++;
1444 }
1445 if (*p)
1446 p++; /* skip over the whitespace */
1447 *r = '\0';
1448 if (cmd->nwords >= cmd->wordssize) {
1449 cmd->wordssize = cmd->nwords + 16;
3d88e64d 1450 cmd->words = sresize(cmd->words, cmd->wordssize, char *);
3af97463 1451 }
679539d7 1452 cmd->words[cmd->nwords++] = dupstr(q);
4c7f0d61 1453 }
4c7f0d61 1454 }
1455
39934deb 1456 sfree(line);
1457
4c7f0d61 1458 /*
1459 * Now parse the first word and assign a function.
1460 */
1461
1462 if (cmd->nwords == 0)
1463 cmd->obey = sftp_cmd_null;
1464 else {
bf5240cd 1465 const struct sftp_cmd_lookup *lookup;
1466 lookup = lookup_command(cmd->words[0]);
1467 if (!lookup)
1468 cmd->obey = sftp_cmd_unknown;
1469 else
1470 cmd->obey = lookup->obey;
4c7f0d61 1471 }
1472
1473 return cmd;
1474}
1475
774204f5 1476static int do_sftp_init(void)
32874aea 1477{
1bc24185 1478 struct sftp_packet *pktin;
1479 struct sftp_request *req, *rreq;
1480
4c7f0d61 1481 /*
1482 * Do protocol initialisation.
1483 */
1484 if (!fxp_init()) {
1485 fprintf(stderr,
32874aea 1486 "Fatal: unable to initialise SFTP: %s\n", fxp_error());
774204f5 1487 return 1; /* failure */
4c7f0d61 1488 }
1489
1490 /*
1491 * Find out where our home directory is.
1492 */
1bc24185 1493 sftp_register(req = fxp_realpath_send("."));
1494 rreq = sftp_find_request(pktin = sftp_recv());
1495 assert(rreq == req);
7b7de4f4 1496 homedir = fxp_realpath_recv(pktin, rreq);
1bc24185 1497
4c7f0d61 1498 if (!homedir) {
1499 fprintf(stderr,
1500 "Warning: failed to resolve home directory: %s\n",
1501 fxp_error());
1502 homedir = dupstr(".");
1503 } else {
1504 printf("Remote working directory is %s\n", homedir);
1505 }
1506 pwd = dupstr(homedir);
774204f5 1507 return 0;
fa3db767 1508}
1509
679539d7 1510void do_sftp_cleanup()
1511{
1512 char ch;
f11233cb 1513 if (back) {
1514 back->special(backhandle, TS_EOF);
1515 sftp_recvdata(&ch, 1);
1516 back->free(backhandle);
1517 sftp_cleanup_request();
1518 }
679539d7 1519 if (pwd) {
1520 sfree(pwd);
1521 pwd = NULL;
1522 }
1523 if (homedir) {
1524 sfree(homedir);
1525 homedir = NULL;
1526 }
1527}
1528
fa3db767 1529void do_sftp(int mode, int modeflags, char *batchfile)
1530{
1531 FILE *fp;
df49ff19 1532 int ret;
4c7f0d61 1533
9954aaa3 1534 /*
1535 * Batch mode?
4c7f0d61 1536 */
9954aaa3 1537 if (mode == 0) {
1538
1539 /* ------------------------------------------------------------------
1540 * Now we're ready to do Real Stuff.
1541 */
1542 while (1) {
df49ff19 1543 struct sftp_command *cmd;
39934deb 1544 cmd = sftp_getcmd(NULL, 0, 0);
df49ff19 1545 if (!cmd)
1546 break;
679539d7 1547 ret = cmd->obey(cmd);
1548 if (cmd->words) {
1549 int i;
1550 for(i = 0; i < cmd->nwords; i++)
1551 sfree(cmd->words[i]);
1552 sfree(cmd->words);
1553 }
1554 sfree(cmd);
1555 if (ret < 0)
df49ff19 1556 break;
bf5240cd 1557 }
9954aaa3 1558 } else {
1559 fp = fopen(batchfile, "r");
1560 if (!fp) {
bf5240cd 1561 printf("Fatal: unable to open %s\n", batchfile);
1562 return;
9954aaa3 1563 }
1564 while (1) {
bf5240cd 1565 struct sftp_command *cmd;
1566 cmd = sftp_getcmd(fp, mode, modeflags);
1567 if (!cmd)
1568 break;
df49ff19 1569 ret = cmd->obey(cmd);
1570 if (ret < 0)
bf5240cd 1571 break;
df49ff19 1572 if (ret == 0) {
bf5240cd 1573 if (!(modeflags & 2))
9954aaa3 1574 break;
bf5240cd 1575 }
9954aaa3 1576 }
bf5240cd 1577 fclose(fp);
9954aaa3 1578
4c7f0d61 1579 }
4a8fc3c4 1580}
4c7f0d61 1581
4a8fc3c4 1582/* ----------------------------------------------------------------------
1583 * Dirty bits: integration with PuTTY.
1584 */
1585
1586static int verbose = 0;
1587
7bedb13c 1588/*
4a8fc3c4 1589 * Print an error message and perform a fatal exit.
1590 */
1591void fatalbox(char *fmt, ...)
1592{
57356d63 1593 char *str, *str2;
4a8fc3c4 1594 va_list ap;
1595 va_start(ap, fmt);
57356d63 1596 str = dupvprintf(fmt, ap);
1597 str2 = dupcat("Fatal: ", str, "\n", NULL);
1598 sfree(str);
4a8fc3c4 1599 va_end(ap);
57356d63 1600 fputs(str2, stderr);
1601 sfree(str2);
4a8fc3c4 1602
93b581bd 1603 cleanup_exit(1);
4a8fc3c4 1604}
1709795f 1605void modalfatalbox(char *fmt, ...)
1606{
57356d63 1607 char *str, *str2;
1709795f 1608 va_list ap;
1609 va_start(ap, fmt);
57356d63 1610 str = dupvprintf(fmt, ap);
1611 str2 = dupcat("Fatal: ", str, "\n", NULL);
1612 sfree(str);
1709795f 1613 va_end(ap);
57356d63 1614 fputs(str2, stderr);
1615 sfree(str2);
1709795f 1616
1617 cleanup_exit(1);
1618}
a8327734 1619void connection_fatal(void *frontend, char *fmt, ...)
4a8fc3c4 1620{
57356d63 1621 char *str, *str2;
4a8fc3c4 1622 va_list ap;
1623 va_start(ap, fmt);
57356d63 1624 str = dupvprintf(fmt, ap);
1625 str2 = dupcat("Fatal: ", str, "\n", NULL);
1626 sfree(str);
4a8fc3c4 1627 va_end(ap);
57356d63 1628 fputs(str2, stderr);
1629 sfree(str2);
4a8fc3c4 1630
93b581bd 1631 cleanup_exit(1);
4a8fc3c4 1632}
1633
6b78788a 1634void ldisc_send(void *handle, char *buf, int len, int interactive)
32874aea 1635{
4a8fc3c4 1636 /*
1637 * This is only here because of the calls to ldisc_send(NULL,
1638 * 0) in ssh.c. Nothing in PSFTP actually needs to use the
1639 * ldisc as an ldisc. So if we get called with any real data, I
1640 * want to know about it.
4c7f0d61 1641 */
4a8fc3c4 1642 assert(len == 0);
1643}
1644
1645/*
c44bf5bd 1646 * In psftp, all agent requests should be synchronous, so this is a
1647 * never-called stub.
1648 */
1649void agent_schedule_callback(void (*callback)(void *, void *, int),
1650 void *callback_ctx, void *data, int len)
1651{
1652 assert(!"We shouldn't be here");
1653}
1654
1655/*
4a8fc3c4 1656 * Receive a block of data from the SSH link. Block until all data
1657 * is available.
1658 *
1659 * To do this, we repeatedly call the SSH protocol module, with our
1660 * own trap in from_backend() to catch the data that comes back. We
1661 * do this until we have enough data.
1662 */
1663
32874aea 1664static unsigned char *outptr; /* where to put the data */
1665static unsigned outlen; /* how much data required */
4a8fc3c4 1666static unsigned char *pending = NULL; /* any spare data */
32874aea 1667static unsigned pendlen = 0, pendsize = 0; /* length and phys. size of buffer */
9fab77dc 1668int from_backend(void *frontend, int is_stderr, const char *data, int datalen)
32874aea 1669{
1670 unsigned char *p = (unsigned char *) data;
1671 unsigned len = (unsigned) datalen;
4a8fc3c4 1672
1673 /*
1674 * stderr data is just spouted to local stderr and otherwise
1675 * ignored.
1676 */
1677 if (is_stderr) {
bfa5400d 1678 if (len > 0)
1679 fwrite(data, 1, len, stderr);
5471d09a 1680 return 0;
4a8fc3c4 1681 }
1682
1683 /*
1684 * If this is before the real session begins, just return.
1685 */
1686 if (!outptr)
5471d09a 1687 return 0;
4a8fc3c4 1688
bfa5400d 1689 if ((outlen > 0) && (len > 0)) {
32874aea 1690 unsigned used = outlen;
1691 if (used > len)
1692 used = len;
1693 memcpy(outptr, p, used);
1694 outptr += used;
1695 outlen -= used;
1696 p += used;
1697 len -= used;
4a8fc3c4 1698 }
1699
1700 if (len > 0) {
32874aea 1701 if (pendsize < pendlen + len) {
1702 pendsize = pendlen + len + 4096;
3d88e64d 1703 pending = sresize(pending, pendsize, unsigned char);
32874aea 1704 }
1705 memcpy(pending + pendlen, p, len);
1706 pendlen += len;
4a8fc3c4 1707 }
5471d09a 1708
1709 return 0;
4a8fc3c4 1710}
32874aea 1711int sftp_recvdata(char *buf, int len)
1712{
1713 outptr = (unsigned char *) buf;
4a8fc3c4 1714 outlen = len;
1715
1716 /*
1717 * See if the pending-input block contains some of what we
1718 * need.
1719 */
1720 if (pendlen > 0) {
32874aea 1721 unsigned pendused = pendlen;
1722 if (pendused > outlen)
1723 pendused = outlen;
4a8fc3c4 1724 memcpy(outptr, pending, pendused);
32874aea 1725 memmove(pending, pending + pendused, pendlen - pendused);
4a8fc3c4 1726 outptr += pendused;
1727 outlen -= pendused;
32874aea 1728 pendlen -= pendused;
1729 if (pendlen == 0) {
1730 pendsize = 0;
1731 sfree(pending);
1732 pending = NULL;
1733 }
1734 if (outlen == 0)
1735 return 1;
4a8fc3c4 1736 }
1737
1738 while (outlen > 0) {
d6cc41e6 1739 if (ssh_sftp_loop_iteration() < 0)
32874aea 1740 return 0; /* doom */
4a8fc3c4 1741 }
1742
1743 return 1;
1744}
32874aea 1745int sftp_senddata(char *buf, int len)
1746{
776792d7 1747 back->send(backhandle, buf, len);
4a8fc3c4 1748 return 1;
1749}
1750
1751/*
4a8fc3c4 1752 * Short description of parameters.
1753 */
1754static void usage(void)
1755{
1756 printf("PuTTY Secure File Transfer (SFTP) client\n");
1757 printf("%s\n", ver);
90767715 1758 printf("Usage: psftp [options] [user@]host\n");
4a8fc3c4 1759 printf("Options:\n");
9954aaa3 1760 printf(" -b file use specified batchfile\n");
1761 printf(" -bc output batchfile commands\n");
1762 printf(" -be don't stop batchfile processing if errors\n");
4a8fc3c4 1763 printf(" -v show verbose messages\n");
e2a197cf 1764 printf(" -load sessname Load settings from saved session\n");
1765 printf(" -l user connect with specified username\n");
4a8fc3c4 1766 printf(" -P port connect to specified port\n");
1767 printf(" -pw passw login with specified password\n");
e2a197cf 1768 printf(" -1 -2 force use of particular SSH protocol version\n");
1769 printf(" -C enable compression\n");
1770 printf(" -i key private key file for authentication\n");
1771 printf(" -batch disable all interactive prompts\n");
dc108ebc 1772 printf(" -V print version information\n");
93b581bd 1773 cleanup_exit(1);
4a8fc3c4 1774}
1775
dc108ebc 1776static void version(void)
1777{
1778 printf("psftp: %s\n", ver);
1779 cleanup_exit(1);
1780}
1781
4a8fc3c4 1782/*
fa3db767 1783 * Connect to a host.
4a8fc3c4 1784 */
fa3db767 1785static int psftp_connect(char *userhost, char *user, int portnumber)
4a8fc3c4 1786{
fa3db767 1787 char *host, *realhost;
cbe2d68f 1788 const char *err;
b51259f6 1789 void *logctx;
4a8fc3c4 1790
1791 /* Separate host and username */
1792 host = userhost;
1793 host = strrchr(host, '@');
1794 if (host == NULL) {
1795 host = userhost;
1796 } else {
1797 *host++ = '\0';
1798 if (user) {
32874aea 1799 printf("psftp: multiple usernames specified; using \"%s\"\n",
1800 user);
4a8fc3c4 1801 } else
1802 user = userhost;
1803 }
1804
18e62ad8 1805 /*
1806 * If we haven't loaded session details already (e.g., from -load),
1807 * try looking for a session called "host".
1808 */
1809 if (!loaded_session) {
1810 /* Try to load settings for `host' into a temporary config */
1811 Config cfg2;
1812 cfg2.host[0] = '\0';
1813 do_defaults(host, &cfg2);
1814 if (cfg2.host[0] != '\0') {
1815 /* Settings present and include hostname */
1816 /* Re-load data into the real config. */
1817 do_defaults(host, &cfg);
1818 } else {
1819 /* Session doesn't exist or mention a hostname. */
1820 /* Use `host' as a bare hostname. */
1821 strncpy(cfg.host, host, sizeof(cfg.host) - 1);
1822 cfg.host[sizeof(cfg.host) - 1] = '\0';
1823 }
1824 } else {
1825 /* Patch in hostname `host' to session details. */
32874aea 1826 strncpy(cfg.host, host, sizeof(cfg.host) - 1);
1827 cfg.host[sizeof(cfg.host) - 1] = '\0';
f133db8e 1828 }
1829
1830 /*
1831 * Force use of SSH. (If they got the protocol wrong we assume the
1832 * port is useless too.)
1833 */
1834 if (cfg.protocol != PROT_SSH) {
1835 cfg.protocol = PROT_SSH;
1836 cfg.port = 22;
4a8fc3c4 1837 }
1838
449925a6 1839 /*
4123fa9a 1840 * If saved session / Default Settings says SSH-1 (`1 only' or `1'),
1841 * then change it to SSH-2, on the grounds that that's more likely to
1842 * work for SFTP. (Can be overridden with `-1' option.)
1843 * But if it says `2 only' or `2', respect which.
1844 */
1845 if (cfg.sshprot != 2 && cfg.sshprot != 3)
1846 cfg.sshprot = 2;
1847
1848 /*
c0a81592 1849 * Enact command-line overrides.
1850 */
5555d393 1851 cmdline_run_saved(&cfg);
c0a81592 1852
1853 /*
449925a6 1854 * Trim leading whitespace off the hostname if it's there.
1855 */
1856 {
1857 int space = strspn(cfg.host, " \t");
1858 memmove(cfg.host, cfg.host+space, 1+strlen(cfg.host)-space);
1859 }
1860
1861 /* See if host is of the form user@host */
1862 if (cfg.host[0] != '\0') {
5dd103a8 1863 char *atsign = strrchr(cfg.host, '@');
449925a6 1864 /* Make sure we're not overflowing the user field */
1865 if (atsign) {
1866 if (atsign - cfg.host < sizeof cfg.username) {
1867 strncpy(cfg.username, cfg.host, atsign - cfg.host);
1868 cfg.username[atsign - cfg.host] = '\0';
1869 }
1870 memmove(cfg.host, atsign + 1, 1 + strlen(atsign + 1));
1871 }
1872 }
1873
1874 /*
1875 * Trim a colon suffix off the hostname if it's there.
1876 */
1877 cfg.host[strcspn(cfg.host, ":")] = '\0';
1878
cae0c023 1879 /*
1880 * Remove any remaining whitespace from the hostname.
1881 */
1882 {
1883 int p1 = 0, p2 = 0;
1884 while (cfg.host[p2] != '\0') {
1885 if (cfg.host[p2] != ' ' && cfg.host[p2] != '\t') {
1886 cfg.host[p1] = cfg.host[p2];
1887 p1++;
1888 }
1889 p2++;
1890 }
1891 cfg.host[p1] = '\0';
1892 }
1893
4a8fc3c4 1894 /* Set username */
1895 if (user != NULL && user[0] != '\0') {
32874aea 1896 strncpy(cfg.username, user, sizeof(cfg.username) - 1);
1897 cfg.username[sizeof(cfg.username) - 1] = '\0';
4a8fc3c4 1898 }
1899 if (!cfg.username[0]) {
b5af97b3 1900 if (!console_get_line("login as: ",
1901 cfg.username, sizeof(cfg.username), FALSE)) {
1902 fprintf(stderr, "psftp: no username, aborting\n");
93b581bd 1903 cleanup_exit(1);
4a8fc3c4 1904 } else {
1905 int len = strlen(cfg.username);
32874aea 1906 if (cfg.username[len - 1] == '\n')
1907 cfg.username[len - 1] = '\0';
4a8fc3c4 1908 }
1909 }
1910
4a8fc3c4 1911 if (portnumber)
1912 cfg.port = portnumber;
1913
d27b4a18 1914 /*
1915 * Disable scary things which shouldn't be enabled for simple
1916 * things like SCP and SFTP: agent forwarding, port forwarding,
1917 * X forwarding.
1918 */
1919 cfg.x11_forward = 0;
1920 cfg.agentfwd = 0;
1921 cfg.portfwd[0] = cfg.portfwd[1] = '\0';
1922
bebf22d0 1923 /* Set up subsystem name. */
4a8fc3c4 1924 strcpy(cfg.remote_cmd, "sftp");
1925 cfg.ssh_subsys = TRUE;
1926 cfg.nopty = TRUE;
1927
bebf22d0 1928 /*
1929 * Set up fallback option, for SSH1 servers or servers with the
1930 * sftp subsystem not enabled but the server binary installed
1931 * in the usual place. We only support fallback on Unix
248c0c5a 1932 * systems, and we use a kludgy piece of shellery which should
1933 * try to find sftp-server in various places (the obvious
1934 * systemwide spots /usr/lib and /usr/local/lib, and then the
1935 * user's PATH) and finally give up.
bebf22d0 1936 *
248c0c5a 1937 * test -x /usr/lib/sftp-server && exec /usr/lib/sftp-server
1938 * test -x /usr/local/lib/sftp-server && exec /usr/local/lib/sftp-server
1939 * exec sftp-server
bebf22d0 1940 *
1941 * the idea being that this will attempt to use either of the
1942 * obvious pathnames and then give up, and when it does give up
1943 * it will print the preferred pathname in the error messages.
1944 */
1945 cfg.remote_cmd_ptr2 =
248c0c5a 1946 "test -x /usr/lib/sftp-server && exec /usr/lib/sftp-server\n"
1947 "test -x /usr/local/lib/sftp-server && exec /usr/local/lib/sftp-server\n"
1948 "exec sftp-server";
bebf22d0 1949 cfg.ssh_subsys2 = FALSE;
1950
4a8fc3c4 1951 back = &ssh_backend;
1952
79bf227b 1953 err = back->init(NULL, &backhandle, &cfg, cfg.host, cfg.port, &realhost,
1954 0, cfg.tcp_keepalives);
4a8fc3c4 1955 if (err != NULL) {
fa3db767 1956 fprintf(stderr, "ssh_init: %s\n", err);
4a8fc3c4 1957 return 1;
1958 }
c229ef97 1959 logctx = log_init(NULL, &cfg);
a8327734 1960 back->provide_logctx(backhandle, logctx);
d3fef4a5 1961 console_provide_logctx(logctx);
d6cc41e6 1962 while (!back->sendok(backhandle)) {
1963 if (ssh_sftp_loop_iteration() < 0) {
1964 fprintf(stderr, "ssh_init: error during SSH connection setup\n");
1965 return 1;
1966 }
1967 }
4a8fc3c4 1968 if (verbose && realhost != NULL)
1969 printf("Connected to %s\n", realhost);
679539d7 1970 if (realhost != NULL)
1971 sfree(realhost);
fa3db767 1972 return 0;
1973}
1974
c0a81592 1975void cmdline_error(char *p, ...)
1976{
1977 va_list ap;
86256dc6 1978 fprintf(stderr, "psftp: ");
c0a81592 1979 va_start(ap, p);
1980 vfprintf(stderr, p, ap);
1981 va_end(ap);
86256dc6 1982 fprintf(stderr, "\n try typing \"psftp -h\" for help\n");
c0a81592 1983 exit(1);
1984}
1985
fa3db767 1986/*
1987 * Main program. Parse arguments etc.
1988 */
d6cc41e6 1989int psftp_main(int argc, char *argv[])
fa3db767 1990{
1991 int i;
1992 int portnumber = 0;
1993 char *userhost, *user;
1994 int mode = 0;
1995 int modeflags = 0;
1996 char *batchfile = NULL;
86256dc6 1997 int errors = 0;
fa3db767 1998
b51259f6 1999 flags = FLAG_STDERR | FLAG_INTERACTIVE
2000#ifdef FLAG_SYNCAGENT
2001 | FLAG_SYNCAGENT
2002#endif
2003 ;
c0a81592 2004 cmdline_tooltype = TOOLTYPE_FILETRANSFER;
ff2ae367 2005 ssh_get_line = &console_get_line;
fa3db767 2006 sk_init();
2007
2008 userhost = user = NULL;
2009
18e62ad8 2010 /* Load Default Settings before doing anything else. */
2011 do_defaults(NULL, &cfg);
2012 loaded_session = FALSE;
2013
86256dc6 2014 errors = 0;
fa3db767 2015 for (i = 1; i < argc; i++) {
c0a81592 2016 int ret;
fa3db767 2017 if (argv[i][0] != '-') {
c0a81592 2018 if (userhost)
2019 usage();
2020 else
2021 userhost = dupstr(argv[i]);
2022 continue;
2023 }
5555d393 2024 ret = cmdline_process_param(argv[i], i+1<argc?argv[i+1]:NULL, 1, &cfg);
c0a81592 2025 if (ret == -2) {
2026 cmdline_error("option \"%s\" requires an argument", argv[i]);
2027 } else if (ret == 2) {
2028 i++; /* skip next argument */
2029 } else if (ret == 1) {
2030 /* We have our own verbosity in addition to `flags'. */
2031 if (flags & FLAG_VERBOSE)
2032 verbose = 1;
fa3db767 2033 } else if (strcmp(argv[i], "-h") == 0 ||
2034 strcmp(argv[i], "-?") == 0) {
2035 usage();
dc108ebc 2036 } else if (strcmp(argv[i], "-V") == 0) {
2037 version();
c0a81592 2038 } else if (strcmp(argv[i], "-batch") == 0) {
2039 console_batch_mode = 1;
fa3db767 2040 } else if (strcmp(argv[i], "-b") == 0 && i + 1 < argc) {
2041 mode = 1;
2042 batchfile = argv[++i];
d13c2ee9 2043 } else if (strcmp(argv[i], "-bc") == 0) {
fa3db767 2044 modeflags = modeflags | 1;
d13c2ee9 2045 } else if (strcmp(argv[i], "-be") == 0) {
fa3db767 2046 modeflags = modeflags | 2;
2047 } else if (strcmp(argv[i], "--") == 0) {
2048 i++;
2049 break;
2050 } else {
86256dc6 2051 cmdline_error("unknown option \"%s\"", argv[i]);
fa3db767 2052 }
2053 }
2054 argc -= i;
2055 argv += i;
2056 back = NULL;
2057
2058 /*
e1bb41d1 2059 * If the loaded session provides a hostname, and a hostname has not
2060 * otherwise been specified, pop it in `userhost' so that
2061 * `psftp -load sessname' is sufficient to start a session.
2062 */
2063 if (!userhost && cfg.host[0] != '\0') {
2064 userhost = dupstr(cfg.host);
2065 }
2066
2067 /*
fa3db767 2068 * If a user@host string has already been provided, connect to
2069 * it now.
2070 */
2071 if (userhost) {
679539d7 2072 int ret;
2073 ret = psftp_connect(userhost, user, portnumber);
2074 sfree(userhost);
2075 if (ret)
fa3db767 2076 return 1;
774204f5 2077 if (do_sftp_init())
2078 return 1;
fa3db767 2079 } else {
2080 printf("psftp: no hostname specified; use \"open host.name\""
679539d7 2081 " to connect\n");
fa3db767 2082 }
4c7f0d61 2083
9954aaa3 2084 do_sftp(mode, modeflags, batchfile);
4a8fc3c4 2085
51470298 2086 if (back != NULL && back->socket(backhandle) != NULL) {
4a8fc3c4 2087 char ch;
51470298 2088 back->special(backhandle, TS_EOF);
4a8fc3c4 2089 sftp_recvdata(&ch, 1);
2090 }
4a8fc3c4 2091 random_save_seed();
679539d7 2092 cmdline_cleanup();
2093 console_provide_logctx(NULL);
2094 do_sftp_cleanup();
2095 backhandle = NULL;
2096 back = NULL;
2097 sk_cleanup();
4a8fc3c4 2098
4c7f0d61 2099 return 0;
2100}