Add missing checks in update_for_intended_size() in the font selector
[sgt/putty] / psftp.c
CommitLineData
4c7f0d61 1/*
f4ff9455 2 * psftp.c: (platform-independent) front end for PSFTP.
4c7f0d61 3 */
4
5#include <stdio.h>
6#include <stdlib.h>
f9e162aa 7#include <stdarg.h>
4c7f0d61 8#include <assert.h>
d92624dc 9#include <limits.h>
4c7f0d61 10
4a8fc3c4 11#define PUTTY_DO_GLOBALS
12#include "putty.h"
d6cc41e6 13#include "psftp.h"
4a8fc3c4 14#include "storage.h"
15#include "ssh.h"
4c7f0d61 16#include "sftp.h"
17#include "int64.h"
18
42704c97 19const char *const appname = "PSFTP";
20
5471d09a 21/*
22 * Since SFTP is a request-response oriented protocol, it requires
23 * no buffer management: when we send data, we stop and wait for an
24 * acknowledgement _anyway_, and so we can't possibly overfill our
25 * send buffer.
26 */
27
fa3db767 28static int psftp_connect(char *userhost, char *user, int portnumber);
07534184 29static int do_sftp_init(void);
679539d7 30void do_sftp_cleanup();
fa3db767 31
4c7f0d61 32/* ----------------------------------------------------------------------
4c7f0d61 33 * sftp client state.
34 */
35
36char *pwd, *homedir;
6b78788a 37static Backend *back;
38static void *backhandle;
4a693cfc 39static Conf *conf;
bc06669b 40int sent_eof = FALSE;
4c7f0d61 41
42/* ----------------------------------------------------------------------
772e3166 43 * Manage sending requests and waiting for replies.
44 */
45struct sftp_packet *sftp_wait_for_reply(struct sftp_request *req)
46{
47 struct sftp_packet *pktin;
48 struct sftp_request *rreq;
49
50 sftp_register(req);
51 pktin = sftp_recv();
52 if (pktin == NULL)
53 connection_fatal(NULL, "did not receive SFTP response packet "
54 "from server");
55 rreq = sftp_find_request(pktin);
56 if (rreq != req)
57 connection_fatal(NULL, "unable to understand SFTP response packet "
58 "from server: %s", fxp_error());
59 return pktin;
60}
61
62/* ----------------------------------------------------------------------
4c7f0d61 63 * Higher-level helper functions used in commands.
64 */
65
66/*
f9e162aa 67 * Attempt to canonify a pathname starting from the pwd. If
68 * canonification fails, at least fall back to returning a _valid_
69 * pathname (though it may be ugly, eg /home/simon/../foobar).
4c7f0d61 70 */
32874aea 71char *canonify(char *name)
72{
f9e162aa 73 char *fullname, *canonname;
1bc24185 74 struct sftp_packet *pktin;
772e3166 75 struct sftp_request *req;
4a8fc3c4 76
f9e162aa 77 if (name[0] == '/') {
78 fullname = dupstr(name);
79 } else {
4a8fc3c4 80 char *slash;
32874aea 81 if (pwd[strlen(pwd) - 1] == '/')
4a8fc3c4 82 slash = "";
83 else
84 slash = "/";
85 fullname = dupcat(pwd, slash, name, NULL);
f9e162aa 86 }
4a8fc3c4 87
772e3166 88 req = fxp_realpath_send(fullname);
89 pktin = sftp_wait_for_reply(req);
90 canonname = fxp_realpath_recv(pktin, req);
4a8fc3c4 91
f9e162aa 92 if (canonname) {
93 sfree(fullname);
94 return canonname;
50d7e054 95 } else {
32874aea 96 /*
97 * Attempt number 2. Some FXP_REALPATH implementations
98 * (glibc-based ones, in particular) require the _whole_
99 * path to point to something that exists, whereas others
100 * (BSD-based) only require all but the last component to
101 * exist. So if the first call failed, we should strip off
102 * everything from the last slash onwards and try again,
103 * then put the final component back on.
104 *
105 * Special cases:
106 *
107 * - if the last component is "/." or "/..", then we don't
108 * bother trying this because there's no way it can work.
109 *
110 * - if the thing actually ends with a "/", we remove it
111 * before we start. Except if the string is "/" itself
112 * (although I can't see why we'd have got here if so,
113 * because surely "/" would have worked the first
114 * time?), in which case we don't bother.
115 *
116 * - if there's no slash in the string at all, give up in
117 * confusion (we expect at least one because of the way
118 * we constructed the string).
119 */
120
121 int i;
122 char *returnname;
123
124 i = strlen(fullname);
125 if (i > 2 && fullname[i - 1] == '/')
126 fullname[--i] = '\0'; /* strip trailing / unless at pos 0 */
127 while (i > 0 && fullname[--i] != '/');
128
129 /*
130 * Give up on special cases.
131 */
132 if (fullname[i] != '/' || /* no slash at all */
133 !strcmp(fullname + i, "/.") || /* ends in /. */
134 !strcmp(fullname + i, "/..") || /* ends in /.. */
135 !strcmp(fullname, "/")) {
136 return fullname;
137 }
138
139 /*
140 * Now i points at the slash. Deal with the final special
141 * case i==0 (ie the whole path was "/nonexistentfile").
142 */
143 fullname[i] = '\0'; /* separate the string */
144 if (i == 0) {
772e3166 145 req = fxp_realpath_send("/");
32874aea 146 } else {
772e3166 147 req = fxp_realpath_send(fullname);
32874aea 148 }
772e3166 149 pktin = sftp_wait_for_reply(req);
150 canonname = fxp_realpath_recv(pktin, req);
32874aea 151
e25883f8 152 if (!canonname) {
153 /* Even that failed. Restore our best guess at the
154 * constructed filename and give up */
155 fullname[i] = '/'; /* restore slash and last component */
156 return fullname;
157 }
32874aea 158
159 /*
160 * We have a canonical name for all but the last path
161 * component. Concatenate the last component and return.
162 */
163 returnname = dupcat(canonname,
164 canonname[strlen(canonname) - 1] ==
165 '/' ? "" : "/", fullname + i + 1, NULL);
166 sfree(fullname);
167 sfree(canonname);
168 return returnname;
50d7e054 169 }
4c7f0d61 170}
171
dcf8495c 172/*
173 * Return a pointer to the portion of str that comes after the last
174 * slash (or backslash or colon, if `local' is TRUE).
175 */
176static char *stripslashes(char *str, int local)
177{
178 char *p;
179
180 if (local) {
181 p = strchr(str, ':');
182 if (p) str = p+1;
183 }
184
185 p = strrchr(str, '/');
186 if (p) str = p+1;
187
188 if (local) {
189 p = strrchr(str, '\\');
190 if (p) str = p+1;
191 }
192
193 return str;
194}
195
4c7f0d61 196/*
93e86a8b 197 * qsort comparison routine for fxp_name structures. Sorts by real
198 * file name.
4c7f0d61 199 */
93e86a8b 200static int sftp_name_compare(const void *av, const void *bv)
32874aea 201{
7d2c1789 202 const struct fxp_name *const *a = (const struct fxp_name *const *) av;
203 const struct fxp_name *const *b = (const struct fxp_name *const *) bv;
204 return strcmp((*a)->filename, (*b)->filename);
4c7f0d61 205}
4c7f0d61 206
207/*
93e86a8b 208 * Likewise, but for a bare char *.
4f2b387f 209 */
93e86a8b 210static int bare_name_compare(const void *av, const void *bv)
4f2b387f 211{
93e86a8b 212 const char **a = (const char **) av;
213 const char **b = (const char **) bv;
214 return strcmp(*a, *b);
4f2b387f 215}
216
38f0c08e 217static void not_connected(void)
218{
219 printf("psftp: not connected to a host; use \"open host.name\"\n");
220}
221
93e86a8b 222/* ----------------------------------------------------------------------
223 * The meat of the `get' and `put' commands.
4c7f0d61 224 */
5079ee6d 225int sftp_get_file(char *fname, char *outfname, int recurse, int restart)
32874aea 226{
4c7f0d61 227 struct fxp_handle *fh;
1bc24185 228 struct sftp_packet *pktin;
772e3166 229 struct sftp_request *req;
c606c42d 230 struct fxp_xfer *xfer;
4c7f0d61 231 uint64 offset;
0ac1920c 232 WFile *file;
479fe1ba 233 int ret, shown_err = FALSE;
ee07dce4 234 struct fxp_attrs attrs;
4c7f0d61 235
93e86a8b 236 /*
237 * In recursive mode, see if we're dealing with a directory.
238 * (If we're not in recursive mode, we need not even check: the
239 * subsequent FXP_OPEN will return a usable error message.)
240 */
5079ee6d 241 if (recurse) {
93e86a8b 242 int result;
fa3db767 243
772e3166 244 req = fxp_stat_send(fname);
245 pktin = sftp_wait_for_reply(req);
246 result = fxp_stat_recv(pktin, req, &attrs);
9c77ddf6 247
5079ee6d 248 if (result &&
249 (attrs.flags & SSH_FILEXFER_ATTR_PERMISSIONS) &&
250 (attrs.permissions & 0040000)) {
93e86a8b 251
252 struct fxp_handle *dirhandle;
253 int nnames, namesize;
254 struct fxp_name **ournames;
255 struct fxp_names *names;
256 int i;
257
258 /*
259 * First, attempt to create the destination directory,
5079ee6d 260 * unless it already exists.
93e86a8b 261 */
5079ee6d 262 if (file_type(outfname) != FILE_TYPE_DIRECTORY &&
93e86a8b 263 !create_directory(outfname)) {
264 printf("%s: Cannot create directory\n", outfname);
265 return 0;
266 }
4c7f0d61 267
93e86a8b 268 /*
269 * Now get the list of filenames in the remote
270 * directory.
271 */
772e3166 272 req = fxp_opendir_send(fname);
273 pktin = sftp_wait_for_reply(req);
274 dirhandle = fxp_opendir_recv(pktin, req);
93e86a8b 275
276 if (!dirhandle) {
277 printf("%s: unable to open directory: %s\n",
278 fname, fxp_error());
279 return 0;
280 }
281 nnames = namesize = 0;
282 ournames = NULL;
283 while (1) {
284 int i;
285
772e3166 286 req = fxp_readdir_send(dirhandle);
287 pktin = sftp_wait_for_reply(req);
288 names = fxp_readdir_recv(pktin, req);
93e86a8b 289
290 if (names == NULL) {
291 if (fxp_error_type() == SSH_FX_EOF)
292 break;
293 printf("%s: reading directory: %s\n", fname, fxp_error());
294 sfree(ournames);
295 return 0;
296 }
297 if (names->nnames == 0) {
298 fxp_free_names(names);
299 break;
300 }
301 if (nnames + names->nnames >= namesize) {
302 namesize += names->nnames + 128;
303 ournames = sresize(ournames, namesize, struct fxp_name *);
304 }
305 for (i = 0; i < names->nnames; i++)
e9d14678 306 if (strcmp(names->names[i].filename, ".") &&
5079ee6d 307 strcmp(names->names[i].filename, "..")) {
e9d14678 308 if (!vet_filename(names->names[i].filename)) {
309 printf("ignoring potentially dangerous server-"
310 "supplied filename '%s'\n",
311 names->names[i].filename);
312 } else {
313 ournames[nnames++] =
314 fxp_dup_name(&names->names[i]);
315 }
316 }
93e86a8b 317 fxp_free_names(names);
318 }
772e3166 319 req = fxp_close_send(dirhandle);
320 pktin = sftp_wait_for_reply(req);
321 fxp_close_recv(pktin, req);
93e86a8b 322
323 /*
324 * Sort the names into a clear order. This ought to
325 * make things more predictable when we're doing a
326 * reget of the same directory, just in case two
327 * readdirs on the same remote directory return a
328 * different order.
329 */
330 qsort(ournames, nnames, sizeof(*ournames), sftp_name_compare);
331
332 /*
333 * If we're in restart mode, find the last filename on
334 * this list that already exists. We may have to do a
335 * reget on _that_ file, but shouldn't have to do
336 * anything on the previous files.
337 *
338 * If none of them exists, of course, we start at 0.
339 */
340 i = 0;
60f9c221 341 if (restart) {
342 while (i < nnames) {
343 char *nextoutfname;
344 int ret;
9711e333 345 nextoutfname = dir_file_cat(outfname,
346 ournames[i]->filename);
60f9c221 347 ret = (file_type(nextoutfname) == FILE_TYPE_NONEXISTENT);
348 sfree(nextoutfname);
349 if (ret)
350 break;
351 i++;
352 }
353 if (i > 0)
354 i--;
355 }
93e86a8b 356
357 /*
358 * Now we're ready to recurse. Starting at ournames[i]
359 * and continuing on to the end of the list, we
360 * construct a new source and target file name, and
361 * call sftp_get_file again.
362 */
363 for (; i < nnames; i++) {
364 char *nextfname, *nextoutfname;
365 int ret;
366
367 nextfname = dupcat(fname, "/", ournames[i]->filename, NULL);
9711e333 368 nextoutfname = dir_file_cat(outfname, ournames[i]->filename);
5079ee6d 369 ret = sftp_get_file(nextfname, nextoutfname, recurse, restart);
93e86a8b 370 restart = FALSE; /* after first partial file, do full */
371 sfree(nextoutfname);
372 sfree(nextfname);
373 if (!ret) {
374 for (i = 0; i < nnames; i++) {
375 fxp_free_name(ournames[i]);
376 }
377 sfree(ournames);
378 return 0;
379 }
380 }
381
382 /*
383 * Done this recursion level. Free everything.
384 */
385 for (i = 0; i < nnames; i++) {
386 fxp_free_name(ournames[i]);
387 }
388 sfree(ournames);
389
390 return 1;
391 }
4c7f0d61 392 }
4c7f0d61 393
772e3166 394 req = fxp_stat_send(fname);
395 pktin = sftp_wait_for_reply(req);
396 if (!fxp_stat_recv(pktin, req, &attrs))
ee07dce4 397 attrs.flags = 0;
398
772e3166 399 req = fxp_open_send(fname, SSH_FXF_READ, NULL);
400 pktin = sftp_wait_for_reply(req);
401 fh = fxp_open_recv(pktin, req);
1bc24185 402
4c7f0d61 403 if (!fh) {
4dc846cd 404 printf("%s: open for read: %s\n", fname, fxp_error());
4c7f0d61 405 return 0;
406 }
d92624dc 407
408 if (restart) {
0ac1920c 409 file = open_existing_wfile(outfname, NULL);
d92624dc 410 } else {
ee07dce4 411 file = open_new_file(outfname, GET_PERMISSIONS(attrs));
d92624dc 412 }
413
0ac1920c 414 if (!file) {
4c7f0d61 415 printf("local: unable to open %s\n", outfname);
1bc24185 416
772e3166 417 req = fxp_close_send(fh);
418 pktin = sftp_wait_for_reply(req);
419 fxp_close_recv(pktin, req);
1bc24185 420
4c7f0d61 421 return 0;
422 }
423
d92624dc 424 if (restart) {
0ac1920c 425 char decbuf[30];
426 if (seek_file(file, uint64_make(0,0) , FROM_END) == -1) {
20c2ef84 427 close_wfile(file);
0ac1920c 428 printf("reget: cannot restart %s - file too large\n",
429 outfname);
772e3166 430 req = fxp_close_send(fh);
431 pktin = sftp_wait_for_reply(req);
432 fxp_close_recv(pktin, req);
0ac1920c 433
20c2ef84 434 return 0;
0ac1920c 435 }
436
437 offset = get_file_posn(file);
438 uint64_decimal(offset, decbuf);
439 printf("reget: restarting at file position %s\n", decbuf);
d92624dc 440 } else {
441 offset = uint64_make(0, 0);
442 }
4c7f0d61 443
d92624dc 444 printf("remote:%s => local:%s\n", fname, outfname);
4c7f0d61 445
446 /*
447 * FIXME: we can use FXP_FSTAT here to get the file size, and
448 * thus put up a progress bar.
449 */
df49ff19 450 ret = 1;
c606c42d 451 xfer = xfer_download_init(fh, offset);
df0870fc 452 while (!xfer_done(xfer)) {
c606c42d 453 void *vbuf;
454 int ret, len;
4c7f0d61 455 int wpos, wlen;
456
c606c42d 457 xfer_download_queue(xfer);
458 pktin = sftp_recv();
459 ret = xfer_download_gotpkt(xfer, pktin);
772e3166 460 if (ret <= 0) {
479fe1ba 461 if (!shown_err) {
462 printf("error while reading: %s\n", fxp_error());
463 shown_err = TRUE;
464 }
c606c42d 465 ret = 0;
4c7f0d61 466 }
32874aea 467
c606c42d 468 while (xfer_download_data(xfer, &vbuf, &len)) {
469 unsigned char *buf = (unsigned char *)vbuf;
470
471 wpos = 0;
472 while (wpos < len) {
0ac1920c 473 wlen = write_to_file(file, buf + wpos, len - wpos);
c606c42d 474 if (wlen <= 0) {
475 printf("error while writing local file\n");
476 ret = 0;
477 xfer_set_error(xfer);
51618e4b 478 break;
c606c42d 479 }
480 wpos += wlen;
481 }
482 if (wpos < len) { /* we had an error */
df49ff19 483 ret = 0;
c606c42d 484 xfer_set_error(xfer);
4c7f0d61 485 }
9ff4e23d 486
487 sfree(vbuf);
df49ff19 488 }
4c7f0d61 489 }
490
c606c42d 491 xfer_cleanup(xfer);
492
0ac1920c 493 close_wfile(file);
1bc24185 494
772e3166 495 req = fxp_close_send(fh);
496 pktin = sftp_wait_for_reply(req);
497 fxp_close_recv(pktin, req);
1bc24185 498
df49ff19 499 return ret;
4c7f0d61 500}
501
5079ee6d 502int sftp_put_file(char *fname, char *outfname, int recurse, int restart)
32874aea 503{
4c7f0d61 504 struct fxp_handle *fh;
df0870fc 505 struct fxp_xfer *xfer;
1bc24185 506 struct sftp_packet *pktin;
772e3166 507 struct sftp_request *req;
4c7f0d61 508 uint64 offset;
0ac1920c 509 RFile *file;
df0870fc 510 int ret, err, eof;
ee07dce4 511 struct fxp_attrs attrs;
512 long permissions;
4c7f0d61 513
93e86a8b 514 /*
515 * In recursive mode, see if we're dealing with a directory.
516 * (If we're not in recursive mode, we need not even check: the
517 * subsequent fopen will return an error message.)
518 */
5079ee6d 519 if (recurse && file_type(fname) == FILE_TYPE_DIRECTORY) {
93e86a8b 520 int result;
521 int nnames, namesize;
522 char *name, **ournames;
523 DirHandle *dh;
524 int i;
4c7f0d61 525
5079ee6d 526 /*
527 * First, attempt to create the destination directory,
528 * unless it already exists.
529 */
772e3166 530 req = fxp_stat_send(outfname);
531 pktin = sftp_wait_for_reply(req);
532 result = fxp_stat_recv(pktin, req, &attrs);
5079ee6d 533 if (!result ||
534 !(attrs.flags & SSH_FILEXFER_ATTR_PERMISSIONS) ||
535 !(attrs.permissions & 0040000)) {
772e3166 536 req = fxp_mkdir_send(outfname);
537 pktin = sftp_wait_for_reply(req);
538 result = fxp_mkdir_recv(pktin, req);
93e86a8b 539
5079ee6d 540 if (!result) {
541 printf("%s: create directory: %s\n",
542 outfname, fxp_error());
543 return 0;
93e86a8b 544 }
545 }
546
547 /*
548 * Now get the list of filenames in the local directory.
549 */
93e86a8b 550 nnames = namesize = 0;
551 ournames = NULL;
9c77ddf6 552
5079ee6d 553 dh = open_directory(fname);
554 if (!dh) {
555 printf("%s: unable to open directory\n", fname);
556 return 0;
9c77ddf6 557 }
5079ee6d 558 while ((name = read_filename(dh)) != NULL) {
559 if (nnames >= namesize) {
560 namesize += 128;
561 ournames = sresize(ournames, namesize, char *);
562 }
563 ournames[nnames++] = name;
93e86a8b 564 }
5079ee6d 565 close_directory(dh);
93e86a8b 566
567 /*
568 * Sort the names into a clear order. This ought to make
569 * things more predictable when we're doing a reput of the
570 * same directory, just in case two readdirs on the same
571 * local directory return a different order.
572 */
573 qsort(ournames, nnames, sizeof(*ournames), bare_name_compare);
574
575 /*
576 * If we're in restart mode, find the last filename on this
577 * list that already exists. We may have to do a reput on
578 * _that_ file, but shouldn't have to do anything on the
579 * previous files.
580 *
581 * If none of them exists, of course, we start at 0.
582 */
583 i = 0;
60f9c221 584 if (restart) {
585 while (i < nnames) {
586 char *nextoutfname;
587 nextoutfname = dupcat(outfname, "/", ournames[i], NULL);
772e3166 588 req = fxp_stat_send(nextoutfname);
589 pktin = sftp_wait_for_reply(req);
590 result = fxp_stat_recv(pktin, req, &attrs);
60f9c221 591 sfree(nextoutfname);
592 if (!result)
593 break;
594 i++;
595 }
596 if (i > 0)
597 i--;
598 }
599
600 /*
601 * Now we're ready to recurse. Starting at ournames[i]
93e86a8b 602 * and continuing on to the end of the list, we
603 * construct a new source and target file name, and
604 * call sftp_put_file again.
605 */
606 for (; i < nnames; i++) {
607 char *nextfname, *nextoutfname;
608 int ret;
609
9711e333 610 nextfname = dir_file_cat(fname, ournames[i]);
93e86a8b 611 nextoutfname = dupcat(outfname, "/", ournames[i], NULL);
5079ee6d 612 ret = sftp_put_file(nextfname, nextoutfname, recurse, restart);
93e86a8b 613 restart = FALSE; /* after first partial file, do full */
614 sfree(nextoutfname);
615 sfree(nextfname);
616 if (!ret) {
617 for (i = 0; i < nnames; i++) {
618 sfree(ournames[i]);
619 }
620 sfree(ournames);
621 return 0;
622 }
623 }
624
625 /*
626 * Done this recursion level. Free everything.
627 */
628 for (i = 0; i < nnames; i++) {
629 sfree(ournames[i]);
630 }
631 sfree(ournames);
632
633 return 1;
4c7f0d61 634 }
635
ee07dce4 636 file = open_existing_file(fname, NULL, NULL, NULL, &permissions);
0ac1920c 637 if (!file) {
4c7f0d61 638 printf("local: unable to open %s\n", fname);
4c7f0d61 639 return 0;
640 }
ee07dce4 641 attrs.flags = 0;
642 PUT_PERMISSIONS(attrs, permissions);
d92624dc 643 if (restart) {
772e3166 644 req = fxp_open_send(outfname, SSH_FXF_WRITE, &attrs);
d92624dc 645 } else {
772e3166 646 req = fxp_open_send(outfname,
647 SSH_FXF_WRITE | SSH_FXF_CREAT | SSH_FXF_TRUNC,
648 &attrs);
d92624dc 649 }
772e3166 650 pktin = sftp_wait_for_reply(req);
651 fh = fxp_open_recv(pktin, req);
1bc24185 652
4c7f0d61 653 if (!fh) {
20c2ef84 654 close_rfile(file);
4dc846cd 655 printf("%s: open for write: %s\n", outfname, fxp_error());
4c7f0d61 656 return 0;
657 }
658
d92624dc 659 if (restart) {
660 char decbuf[30];
661 struct fxp_attrs attrs;
1bc24185 662 int ret;
663
772e3166 664 req = fxp_fstat_send(fh);
665 pktin = sftp_wait_for_reply(req);
666 ret = fxp_fstat_recv(pktin, req, &attrs);
1bc24185 667
668 if (!ret) {
20c2ef84 669 close_rfile(file);
d92624dc 670 printf("read size of %s: %s\n", outfname, fxp_error());
d92624dc 671 return 0;
672 }
673 if (!(attrs.flags & SSH_FILEXFER_ATTR_SIZE)) {
20c2ef84 674 close_rfile(file);
d92624dc 675 printf("read size of %s: size was not given\n", outfname);
d92624dc 676 return 0;
677 }
678 offset = attrs.size;
679 uint64_decimal(offset, decbuf);
680 printf("reput: restarting at file position %s\n", decbuf);
0ac1920c 681
682 if (seek_file((WFile *)file, offset, FROM_START) != 0)
683 seek_file((WFile *)file, uint64_make(0,0), FROM_END); /* *shrug* */
d92624dc 684 } else {
685 offset = uint64_make(0, 0);
686 }
4c7f0d61 687
d92624dc 688 printf("local:%s => remote:%s\n", fname, outfname);
4c7f0d61 689
690 /*
691 * FIXME: we can use FXP_FSTAT here to get the file size, and
692 * thus put up a progress bar.
693 */
df49ff19 694 ret = 1;
df0870fc 695 xfer = xfer_upload_init(fh, offset);
696 err = eof = 0;
697 while ((!err && !eof) || !xfer_done(xfer)) {
4c7f0d61 698 char buffer[4096];
1bc24185 699 int len, ret;
4c7f0d61 700
df0870fc 701 while (xfer_upload_ready(xfer) && !err && !eof) {
0ac1920c 702 len = read_from_file(file, buffer, sizeof(buffer));
df0870fc 703 if (len == -1) {
704 printf("error while reading local file\n");
705 err = 1;
706 } else if (len == 0) {
707 eof = 1;
708 } else {
709 xfer_upload_data(xfer, buffer, len);
710 }
4c7f0d61 711 }
1bc24185 712
2dbd915a 713 if (!xfer_done(xfer)) {
714 pktin = sftp_recv();
715 ret = xfer_upload_gotpkt(xfer, pktin);
0bd57c0f 716 if (ret <= 0 && !err) {
2dbd915a 717 printf("error while writing: %s\n", fxp_error());
718 err = 1;
719 }
4c7f0d61 720 }
4c7f0d61 721 }
722
df0870fc 723 xfer_cleanup(xfer);
724
772e3166 725 req = fxp_close_send(fh);
726 pktin = sftp_wait_for_reply(req);
727 fxp_close_recv(pktin, req);
1bc24185 728
0ac1920c 729 close_rfile(file);
93e86a8b 730
731 return ret;
732}
733
734/* ----------------------------------------------------------------------
5079ee6d 735 * A remote wildcard matcher, providing a similar interface to the
736 * local one in psftp.h.
737 */
738
739typedef struct SftpWildcardMatcher {
740 struct fxp_handle *dirh;
741 struct fxp_names *names;
742 int namepos;
743 char *wildcard, *prefix;
744} SftpWildcardMatcher;
745
746SftpWildcardMatcher *sftp_begin_wildcard_matching(char *name)
747{
748 struct sftp_packet *pktin;
772e3166 749 struct sftp_request *req;
5079ee6d 750 char *wildcard;
751 char *unwcdir, *tmpdir, *cdir;
752 int len, check;
753 SftpWildcardMatcher *swcm;
754 struct fxp_handle *dirh;
755
756 /*
757 * We don't handle multi-level wildcards; so we expect to find
758 * a fully specified directory part, followed by a wildcard
759 * after that.
760 */
761 wildcard = stripslashes(name, 0);
762
763 unwcdir = dupstr(name);
764 len = wildcard - name;
765 unwcdir[len] = '\0';
766 if (len > 0 && unwcdir[len-1] == '/')
767 unwcdir[len-1] = '\0';
768 tmpdir = snewn(1 + len, char);
769 check = wc_unescape(tmpdir, unwcdir);
770 sfree(tmpdir);
771
772 if (!check) {
773 printf("Multiple-level wildcards are not supported\n");
774 sfree(unwcdir);
775 return NULL;
776 }
777
778 cdir = canonify(unwcdir);
779
772e3166 780 req = fxp_opendir_send(cdir);
781 pktin = sftp_wait_for_reply(req);
782 dirh = fxp_opendir_recv(pktin, req);
5079ee6d 783
784 if (dirh) {
785 swcm = snew(SftpWildcardMatcher);
786 swcm->dirh = dirh;
787 swcm->names = NULL;
788 swcm->wildcard = dupstr(wildcard);
789 swcm->prefix = unwcdir;
790 } else {
791 printf("Unable to open %s: %s\n", cdir, fxp_error());
792 swcm = NULL;
793 sfree(unwcdir);
794 }
795
796 sfree(cdir);
797
798 return swcm;
799}
800
801char *sftp_wildcard_get_filename(SftpWildcardMatcher *swcm)
802{
803 struct fxp_name *name;
804 struct sftp_packet *pktin;
772e3166 805 struct sftp_request *req;
5079ee6d 806
807 while (1) {
808 if (swcm->names && swcm->namepos >= swcm->names->nnames) {
809 fxp_free_names(swcm->names);
810 swcm->names = NULL;
811 }
812
813 if (!swcm->names) {
772e3166 814 req = fxp_readdir_send(swcm->dirh);
815 pktin = sftp_wait_for_reply(req);
816 swcm->names = fxp_readdir_recv(pktin, req);
5079ee6d 817
818 if (!swcm->names) {
819 if (fxp_error_type() != SSH_FX_EOF)
820 printf("%s: reading directory: %s\n", swcm->prefix,
821 fxp_error());
822 return NULL;
6df3c104 823 } else if (swcm->names->nnames == 0) {
824 /*
825 * Another failure mode which we treat as EOF is if
826 * the server reports success from FXP_READDIR but
827 * returns no actual names. This is unusual, since
828 * from most servers you'd expect at least "." and
829 * "..", but there's nothing forbidding a server from
830 * omitting those if it wants to.
831 */
832 return NULL;
833 }
5079ee6d 834
835 swcm->namepos = 0;
836 }
837
838 assert(swcm->names && swcm->namepos < swcm->names->nnames);
839
840 name = &swcm->names->names[swcm->namepos++];
841
842 if (!strcmp(name->filename, ".") || !strcmp(name->filename, ".."))
843 continue; /* expected bad filenames */
844
845 if (!vet_filename(name->filename)) {
846 printf("ignoring potentially dangerous server-"
847 "supplied filename '%s'\n", name->filename);
848 continue; /* unexpected bad filename */
849 }
850
851 if (!wc_match(swcm->wildcard, name->filename))
852 continue; /* doesn't match the wildcard */
853
854 /*
855 * We have a working filename. Return it.
856 */
857 return dupprintf("%s%s%s", swcm->prefix,
83567e43 858 (!swcm->prefix[0] ||
859 swcm->prefix[strlen(swcm->prefix)-1]=='/' ?
860 "" : "/"),
5079ee6d 861 name->filename);
862 }
863}
864
865void sftp_finish_wildcard_matching(SftpWildcardMatcher *swcm)
866{
867 struct sftp_packet *pktin;
772e3166 868 struct sftp_request *req;
5079ee6d 869
772e3166 870 req = fxp_close_send(swcm->dirh);
871 pktin = sftp_wait_for_reply(req);
872 fxp_close_recv(pktin, req);
5079ee6d 873
874 if (swcm->names)
875 fxp_free_names(swcm->names);
876
877 sfree(swcm->prefix);
878 sfree(swcm->wildcard);
879
880 sfree(swcm);
881}
882
83567e43 883/*
884 * General function to match a potential wildcard in a filename
885 * argument and iterate over every matching file. Used in several
886 * PSFTP commands (rmdir, rm, chmod, mv).
887 */
888int wildcard_iterate(char *filename, int (*func)(void *, char *), void *ctx)
889{
890 char *unwcfname, *newname, *cname;
891 int is_wc, ret;
892
893 unwcfname = snewn(strlen(filename)+1, char);
894 is_wc = !wc_unescape(unwcfname, filename);
895
896 if (is_wc) {
897 SftpWildcardMatcher *swcm = sftp_begin_wildcard_matching(filename);
898 int matched = FALSE;
899 sfree(unwcfname);
900
901 if (!swcm)
902 return 0;
903
904 ret = 1;
905
906 while ( (newname = sftp_wildcard_get_filename(swcm)) != NULL ) {
907 cname = canonify(newname);
908 if (!cname) {
4dc846cd 909 printf("%s: canonify: %s\n", newname, fxp_error());
83567e43 910 ret = 0;
911 }
912 matched = TRUE;
913 ret &= func(ctx, cname);
914 sfree(cname);
915 }
916
917 if (!matched) {
918 /* Politely warn the user that nothing matched. */
919 printf("%s: nothing matched\n", filename);
920 }
921
922 sftp_finish_wildcard_matching(swcm);
923 } else {
924 cname = canonify(unwcfname);
925 if (!cname) {
4dc846cd 926 printf("%s: canonify: %s\n", filename, fxp_error());
83567e43 927 ret = 0;
928 }
929 ret = func(ctx, cname);
930 sfree(cname);
931 sfree(unwcfname);
932 }
933
934 return ret;
935}
936
937/*
938 * Handy helper function.
939 */
940int is_wildcard(char *name)
941{
942 char *unwcfname = snewn(strlen(name)+1, char);
943 int is_wc = !wc_unescape(unwcfname, name);
944 sfree(unwcfname);
945 return is_wc;
946}
947
5079ee6d 948/* ----------------------------------------------------------------------
93e86a8b 949 * Actual sftp commands.
950 */
951struct sftp_command {
952 char **words;
953 int nwords, wordssize;
954 int (*obey) (struct sftp_command *); /* returns <0 to quit */
955};
956
957int sftp_cmd_null(struct sftp_command *cmd)
958{
959 return 1; /* success */
960}
961
962int sftp_cmd_unknown(struct sftp_command *cmd)
963{
964 printf("psftp: unknown command \"%s\"\n", cmd->words[0]);
965 return 0; /* failure */
966}
967
968int sftp_cmd_quit(struct sftp_command *cmd)
969{
970 return -1;
971}
972
b614ce89 973int sftp_cmd_close(struct sftp_command *cmd)
974{
975 if (back == NULL) {
38f0c08e 976 not_connected();
b614ce89 977 return 0;
978 }
979
6226c939 980 if (back != NULL && back->connected(backhandle)) {
b614ce89 981 char ch;
982 back->special(backhandle, TS_EOF);
bc06669b 983 sent_eof = TRUE;
b614ce89 984 sftp_recvdata(&ch, 1);
985 }
986 do_sftp_cleanup();
987
988 return 0;
989}
990
93e86a8b 991/*
992 * List a directory. If no arguments are given, list pwd; otherwise
993 * list the directory given in words[1].
994 */
995int sftp_cmd_ls(struct sftp_command *cmd)
996{
997 struct fxp_handle *dirh;
998 struct fxp_names *names;
999 struct fxp_name **ournames;
1000 int nnames, namesize;
3394416c 1001 char *dir, *cdir, *unwcdir, *wildcard;
93e86a8b 1002 struct sftp_packet *pktin;
772e3166 1003 struct sftp_request *req;
93e86a8b 1004 int i;
1005
1006 if (back == NULL) {
38f0c08e 1007 not_connected();
93e86a8b 1008 return 0;
1009 }
1010
1011 if (cmd->nwords < 2)
1012 dir = ".";
1013 else
1014 dir = cmd->words[1];
1015
3394416c 1016 unwcdir = snewn(1 + strlen(dir), char);
1017 if (wc_unescape(unwcdir, dir)) {
1018 dir = unwcdir;
1019 wildcard = NULL;
1020 } else {
1021 char *tmpdir;
1022 int len, check;
1023
1024 wildcard = stripslashes(dir, 0);
1025 unwcdir = dupstr(dir);
1026 len = wildcard - dir;
1027 unwcdir[len] = '\0';
1028 if (len > 0 && unwcdir[len-1] == '/')
1029 unwcdir[len-1] = '\0';
1030 tmpdir = snewn(1 + len, char);
1031 check = wc_unescape(tmpdir, unwcdir);
1032 sfree(tmpdir);
1033 if (!check) {
1034 printf("Multiple-level wildcards are not supported\n");
1035 sfree(unwcdir);
1036 return 0;
1037 }
1038 dir = unwcdir;
1039 }
1040
93e86a8b 1041 cdir = canonify(dir);
1042 if (!cdir) {
4dc846cd 1043 printf("%s: canonify: %s\n", dir, fxp_error());
3394416c 1044 sfree(unwcdir);
93e86a8b 1045 return 0;
1046 }
1047
1048 printf("Listing directory %s\n", cdir);
1049
772e3166 1050 req = fxp_opendir_send(cdir);
1051 pktin = sftp_wait_for_reply(req);
1052 dirh = fxp_opendir_recv(pktin, req);
93e86a8b 1053
1054 if (dirh == NULL) {
1055 printf("Unable to open %s: %s\n", dir, fxp_error());
1056 } else {
1057 nnames = namesize = 0;
1058 ournames = NULL;
1059
1060 while (1) {
1061
772e3166 1062 req = fxp_readdir_send(dirh);
1063 pktin = sftp_wait_for_reply(req);
1064 names = fxp_readdir_recv(pktin, req);
93e86a8b 1065
1066 if (names == NULL) {
1067 if (fxp_error_type() == SSH_FX_EOF)
1068 break;
1069 printf("Reading directory %s: %s\n", dir, fxp_error());
1070 break;
1071 }
1072 if (names->nnames == 0) {
1073 fxp_free_names(names);
1074 break;
1075 }
1076
1077 if (nnames + names->nnames >= namesize) {
1078 namesize += names->nnames + 128;
1079 ournames = sresize(ournames, namesize, struct fxp_name *);
1080 }
1081
1082 for (i = 0; i < names->nnames; i++)
3394416c 1083 if (!wildcard || wc_match(wildcard, names->names[i].filename))
1084 ournames[nnames++] = fxp_dup_name(&names->names[i]);
93e86a8b 1085
1086 fxp_free_names(names);
1087 }
772e3166 1088 req = fxp_close_send(dirh);
1089 pktin = sftp_wait_for_reply(req);
1090 fxp_close_recv(pktin, req);
93e86a8b 1091
1092 /*
1093 * Now we have our filenames. Sort them by actual file
1094 * name, and then output the longname parts.
1095 */
1096 qsort(ournames, nnames, sizeof(*ournames), sftp_name_compare);
1097
1098 /*
1099 * And print them.
1100 */
1101 for (i = 0; i < nnames; i++) {
1102 printf("%s\n", ournames[i]->longname);
1103 fxp_free_name(ournames[i]);
1104 }
1105 sfree(ournames);
1106 }
1107
1108 sfree(cdir);
3394416c 1109 sfree(unwcdir);
93e86a8b 1110
1111 return 1;
1112}
1113
1114/*
1115 * Change directories. We do this by canonifying the new name, then
1116 * trying to OPENDIR it. Only if that succeeds do we set the new pwd.
1117 */
1118int sftp_cmd_cd(struct sftp_command *cmd)
1119{
1120 struct fxp_handle *dirh;
1121 struct sftp_packet *pktin;
772e3166 1122 struct sftp_request *req;
93e86a8b 1123 char *dir;
1124
1125 if (back == NULL) {
38f0c08e 1126 not_connected();
93e86a8b 1127 return 0;
1128 }
1129
1130 if (cmd->nwords < 2)
1131 dir = dupstr(homedir);
1132 else
1133 dir = canonify(cmd->words[1]);
1134
1135 if (!dir) {
4dc846cd 1136 printf("%s: canonify: %s\n", dir, fxp_error());
93e86a8b 1137 return 0;
1138 }
1139
772e3166 1140 req = fxp_opendir_send(dir);
1141 pktin = sftp_wait_for_reply(req);
1142 dirh = fxp_opendir_recv(pktin, req);
93e86a8b 1143
1144 if (!dirh) {
1145 printf("Directory %s: %s\n", dir, fxp_error());
1146 sfree(dir);
1147 return 0;
1148 }
1149
772e3166 1150 req = fxp_close_send(dirh);
1151 pktin = sftp_wait_for_reply(req);
1152 fxp_close_recv(pktin, req);
93e86a8b 1153
1154 sfree(pwd);
1155 pwd = dir;
1156 printf("Remote directory is now %s\n", pwd);
1157
1158 return 1;
1159}
1160
1161/*
1162 * Print current directory. Easy as pie.
1163 */
1164int sftp_cmd_pwd(struct sftp_command *cmd)
1165{
1166 if (back == NULL) {
38f0c08e 1167 not_connected();
93e86a8b 1168 return 0;
1169 }
1170
1171 printf("Remote directory is %s\n", pwd);
1172 return 1;
1173}
1174
1175/*
9c77ddf6 1176 * Get a file and save it at the local end. We have three very
1177 * similar commands here. The basic one is `get'; `reget' differs
1178 * in that it checks for the existence of the destination file and
1179 * starts from where a previous aborted transfer left off; `mget'
1180 * differs in that it interprets all its arguments as files to
1181 * transfer (never as a different local name for a remote file) and
1182 * can handle wildcards.
93e86a8b 1183 */
9c77ddf6 1184int sftp_general_get(struct sftp_command *cmd, int restart, int multiple)
93e86a8b 1185{
5079ee6d 1186 char *fname, *unwcfname, *origfname, *origwfname, *outfname;
93e86a8b 1187 int i, ret;
1188 int recurse = FALSE;
1189
1190 if (back == NULL) {
38f0c08e 1191 not_connected();
93e86a8b 1192 return 0;
1193 }
1194
1195 i = 1;
1196 while (i < cmd->nwords && cmd->words[i][0] == '-') {
1197 if (!strcmp(cmd->words[i], "--")) {
1198 /* finish processing options */
1199 i++;
1200 break;
1201 } else if (!strcmp(cmd->words[i], "-r")) {
1202 recurse = TRUE;
1203 } else {
9033711a 1204 printf("%s: unrecognised option '%s'\n", cmd->words[0], cmd->words[i]);
93e86a8b 1205 return 0;
1206 }
1207 i++;
1208 }
1209
1210 if (i >= cmd->nwords) {
9033711a 1211 printf("%s: expects a filename\n", cmd->words[0]);
93e86a8b 1212 return 0;
1213 }
1214
5079ee6d 1215 ret = 1;
9c77ddf6 1216 do {
5079ee6d 1217 SftpWildcardMatcher *swcm;
1218
9c77ddf6 1219 origfname = cmd->words[i++];
5079ee6d 1220 unwcfname = snewn(strlen(origfname)+1, char);
93e86a8b 1221
5079ee6d 1222 if (multiple && !wc_unescape(unwcfname, origfname)) {
1223 swcm = sftp_begin_wildcard_matching(origfname);
1224 if (!swcm) {
1225 sfree(unwcfname);
1226 continue;
1227 }
1228 origwfname = sftp_wildcard_get_filename(swcm);
1229 if (!origwfname) {
1230 /* Politely warn the user that nothing matched. */
1231 printf("%s: nothing matched\n", origfname);
1232 sftp_finish_wildcard_matching(swcm);
1233 sfree(unwcfname);
1234 continue;
1235 }
9c77ddf6 1236 } else {
5079ee6d 1237 origwfname = origfname;
1238 swcm = NULL;
1239 }
1240
1241 while (origwfname) {
1242 fname = canonify(origwfname);
1243
9c77ddf6 1244 if (!fname) {
4dc846cd 1245 printf("%s: canonify: %s\n", origwfname, fxp_error());
9c77ddf6 1246 sfree(unwcfname);
1247 return 0;
1248 }
93e86a8b 1249
9c77ddf6 1250 if (!multiple && i < cmd->nwords)
1251 outfname = cmd->words[i++];
1252 else
5079ee6d 1253 outfname = stripslashes(origwfname, 0);
93e86a8b 1254
5079ee6d 1255 ret = sftp_get_file(fname, outfname, recurse, restart);
9c77ddf6 1256
1257 sfree(fname);
5079ee6d 1258
1259 if (swcm) {
1260 sfree(origwfname);
1261 origwfname = sftp_wildcard_get_filename(swcm);
1262 } else {
1263 origwfname = NULL;
1264 }
9c77ddf6 1265 }
1266 sfree(unwcfname);
5079ee6d 1267 if (swcm)
1268 sftp_finish_wildcard_matching(swcm);
9c77ddf6 1269 if (!ret)
1270 return ret;
1271
1272 } while (multiple && i < cmd->nwords);
93e86a8b 1273
1274 return ret;
1275}
1276int sftp_cmd_get(struct sftp_command *cmd)
1277{
9c77ddf6 1278 return sftp_general_get(cmd, 0, 0);
1279}
1280int sftp_cmd_mget(struct sftp_command *cmd)
1281{
1282 return sftp_general_get(cmd, 0, 1);
93e86a8b 1283}
1284int sftp_cmd_reget(struct sftp_command *cmd)
1285{
9c77ddf6 1286 return sftp_general_get(cmd, 1, 0);
93e86a8b 1287}
1288
1289/*
9c77ddf6 1290 * Send a file and store it at the remote end. We have three very
1291 * similar commands here. The basic one is `put'; `reput' differs
1292 * in that it checks for the existence of the destination file and
1293 * starts from where a previous aborted transfer left off; `mput'
1294 * differs in that it interprets all its arguments as files to
1295 * transfer (never as a different remote name for a local file) and
1296 * can handle wildcards.
93e86a8b 1297 */
9c77ddf6 1298int sftp_general_put(struct sftp_command *cmd, int restart, int multiple)
93e86a8b 1299{
5079ee6d 1300 char *fname, *wfname, *origoutfname, *outfname;
93e86a8b 1301 int i, ret;
1302 int recurse = FALSE;
1303
1304 if (back == NULL) {
38f0c08e 1305 not_connected();
93e86a8b 1306 return 0;
1307 }
1308
1309 i = 1;
1310 while (i < cmd->nwords && cmd->words[i][0] == '-') {
1311 if (!strcmp(cmd->words[i], "--")) {
1312 /* finish processing options */
1313 i++;
1314 break;
1315 } else if (!strcmp(cmd->words[i], "-r")) {
1316 recurse = TRUE;
1317 } else {
9033711a 1318 printf("%s: unrecognised option '%s'\n", cmd->words[0], cmd->words[i]);
93e86a8b 1319 return 0;
1320 }
1321 i++;
1322 }
1323
1324 if (i >= cmd->nwords) {
9033711a 1325 printf("%s: expects a filename\n", cmd->words[0]);
93e86a8b 1326 return 0;
1327 }
1328
5079ee6d 1329 ret = 1;
9c77ddf6 1330 do {
5079ee6d 1331 WildcardMatcher *wcm;
9c77ddf6 1332 fname = cmd->words[i++];
93e86a8b 1333
9c77ddf6 1334 if (multiple && test_wildcard(fname, FALSE) == WCTYPE_WILDCARD) {
5079ee6d 1335 wcm = begin_wildcard_matching(fname);
1336 wfname = wildcard_get_filename(wcm);
1337 if (!wfname) {
1338 /* Politely warn the user that nothing matched. */
1339 printf("%s: nothing matched\n", fname);
1340 finish_wildcard_matching(wcm);
1341 continue;
1342 }
9c77ddf6 1343 } else {
5079ee6d 1344 wfname = fname;
1345 wcm = NULL;
1346 }
1347
1348 while (wfname) {
9c77ddf6 1349 if (!multiple && i < cmd->nwords)
1350 origoutfname = cmd->words[i++];
1351 else
5079ee6d 1352 origoutfname = stripslashes(wfname, 1);
9c77ddf6 1353
1354 outfname = canonify(origoutfname);
1355 if (!outfname) {
4dc846cd 1356 printf("%s: canonify: %s\n", origoutfname, fxp_error());
5079ee6d 1357 if (wcm) {
1358 sfree(wfname);
1359 finish_wildcard_matching(wcm);
1360 }
9c77ddf6 1361 return 0;
1362 }
5079ee6d 1363 ret = sftp_put_file(wfname, outfname, recurse, restart);
9c77ddf6 1364 sfree(outfname);
5079ee6d 1365
1366 if (wcm) {
1367 sfree(wfname);
1368 wfname = wildcard_get_filename(wcm);
1369 } else {
1370 wfname = NULL;
1371 }
9c77ddf6 1372 }
5079ee6d 1373
1374 if (wcm)
1375 finish_wildcard_matching(wcm);
1376
9c77ddf6 1377 if (!ret)
1378 return ret;
93e86a8b 1379
9c77ddf6 1380 } while (multiple && i < cmd->nwords);
4c7f0d61 1381
df49ff19 1382 return ret;
4c7f0d61 1383}
d92624dc 1384int sftp_cmd_put(struct sftp_command *cmd)
1385{
9c77ddf6 1386 return sftp_general_put(cmd, 0, 0);
1387}
1388int sftp_cmd_mput(struct sftp_command *cmd)
1389{
1390 return sftp_general_put(cmd, 0, 1);
d92624dc 1391}
1392int sftp_cmd_reput(struct sftp_command *cmd)
1393{
9c77ddf6 1394 return sftp_general_put(cmd, 1, 0);
d92624dc 1395}
4c7f0d61 1396
9954aaa3 1397int sftp_cmd_mkdir(struct sftp_command *cmd)
1398{
1399 char *dir;
1bc24185 1400 struct sftp_packet *pktin;
772e3166 1401 struct sftp_request *req;
9954aaa3 1402 int result;
83567e43 1403 int i, ret;
9954aaa3 1404
fa3db767 1405 if (back == NULL) {
38f0c08e 1406 not_connected();
fa3db767 1407 return 0;
1408 }
9954aaa3 1409
1410 if (cmd->nwords < 2) {
1411 printf("mkdir: expects a directory\n");
1412 return 0;
1413 }
1414
83567e43 1415 ret = 1;
1416 for (i = 1; i < cmd->nwords; i++) {
1417 dir = canonify(cmd->words[i]);
1418 if (!dir) {
4dc846cd 1419 printf("%s: canonify: %s\n", dir, fxp_error());
83567e43 1420 return 0;
1421 }
1422
772e3166 1423 req = fxp_mkdir_send(dir);
1424 pktin = sftp_wait_for_reply(req);
1425 result = fxp_mkdir_recv(pktin, req);
83567e43 1426
1427 if (!result) {
1428 printf("mkdir %s: %s\n", dir, fxp_error());
83567e43 1429 ret = 0;
f68363d2 1430 } else
1431 printf("mkdir %s: OK\n", dir);
83567e43 1432
1433 sfree(dir);
9954aaa3 1434 }
1435
83567e43 1436 return ret;
1437}
1438
1439static int sftp_action_rmdir(void *vctx, char *dir)
1440{
1441 struct sftp_packet *pktin;
772e3166 1442 struct sftp_request *req;
83567e43 1443 int result;
1444
772e3166 1445 req = fxp_rmdir_send(dir);
1446 pktin = sftp_wait_for_reply(req);
1447 result = fxp_rmdir_recv(pktin, req);
1bc24185 1448
9954aaa3 1449 if (!result) {
83567e43 1450 printf("rmdir %s: %s\n", dir, fxp_error());
9954aaa3 1451 return 0;
1452 }
1453
f68363d2 1454 printf("rmdir %s: OK\n", dir);
1455
df49ff19 1456 return 1;
9954aaa3 1457}
1458
1459int sftp_cmd_rmdir(struct sftp_command *cmd)
1460{
83567e43 1461 int i, ret;
9954aaa3 1462
fa3db767 1463 if (back == NULL) {
38f0c08e 1464 not_connected();
fa3db767 1465 return 0;
1466 }
9954aaa3 1467
1468 if (cmd->nwords < 2) {
1469 printf("rmdir: expects a directory\n");
1470 return 0;
1471 }
1472
83567e43 1473 ret = 1;
1474 for (i = 1; i < cmd->nwords; i++)
1475 ret &= wildcard_iterate(cmd->words[i], sftp_action_rmdir, NULL);
9954aaa3 1476
83567e43 1477 return ret;
1478}
1479
1480static int sftp_action_rm(void *vctx, char *fname)
1481{
1482 struct sftp_packet *pktin;
772e3166 1483 struct sftp_request *req;
83567e43 1484 int result;
1485
772e3166 1486 req = fxp_remove_send(fname);
1487 pktin = sftp_wait_for_reply(req);
1488 result = fxp_remove_recv(pktin, req);
1bc24185 1489
9954aaa3 1490 if (!result) {
83567e43 1491 printf("rm %s: %s\n", fname, fxp_error());
9954aaa3 1492 return 0;
1493 }
1494
f68363d2 1495 printf("rm %s: OK\n", fname);
1496
df49ff19 1497 return 1;
9954aaa3 1498}
1499
1500int sftp_cmd_rm(struct sftp_command *cmd)
1501{
83567e43 1502 int i, ret;
9954aaa3 1503
fa3db767 1504 if (back == NULL) {
38f0c08e 1505 not_connected();
fa3db767 1506 return 0;
1507 }
1508
9954aaa3 1509 if (cmd->nwords < 2) {
1510 printf("rm: expects a filename\n");
1511 return 0;
1512 }
1513
83567e43 1514 ret = 1;
1515 for (i = 1; i < cmd->nwords; i++)
1516 ret &= wildcard_iterate(cmd->words[i], sftp_action_rm, NULL);
1517
1518 return ret;
1519}
1520
1521static int check_is_dir(char *dstfname)
1522{
1523 struct sftp_packet *pktin;
772e3166 1524 struct sftp_request *req;
83567e43 1525 struct fxp_attrs attrs;
1526 int result;
1527
772e3166 1528 req = fxp_stat_send(dstfname);
1529 pktin = sftp_wait_for_reply(req);
1530 result = fxp_stat_recv(pktin, req, &attrs);
83567e43 1531
1532 if (result &&
1533 (attrs.flags & SSH_FILEXFER_ATTR_PERMISSIONS) &&
1534 (attrs.permissions & 0040000))
1535 return TRUE;
1536 else
1537 return FALSE;
1538}
1539
1540struct sftp_context_mv {
1541 char *dstfname;
1542 int dest_is_dir;
1543};
1544
1545static int sftp_action_mv(void *vctx, char *srcfname)
1546{
1547 struct sftp_context_mv *ctx = (struct sftp_context_mv *)vctx;
1548 struct sftp_packet *pktin;
772e3166 1549 struct sftp_request *req;
83567e43 1550 const char *error;
1551 char *finalfname, *newcanon = NULL;
1552 int ret, result;
1553
1554 if (ctx->dest_is_dir) {
1555 char *p;
1556 char *newname;
1557
1558 p = srcfname + strlen(srcfname);
1559 while (p > srcfname && p[-1] != '/') p--;
1560 newname = dupcat(ctx->dstfname, "/", p, NULL);
1561 newcanon = canonify(newname);
1562 if (!newcanon) {
4dc846cd 1563 printf("%s: canonify: %s\n", newname, fxp_error());
83567e43 1564 sfree(newname);
1565 return 0;
1566 }
1567 sfree(newname);
1568
1569 finalfname = newcanon;
1570 } else {
1571 finalfname = ctx->dstfname;
9954aaa3 1572 }
1573
772e3166 1574 req = fxp_rename_send(srcfname, finalfname);
1575 pktin = sftp_wait_for_reply(req);
1576 result = fxp_rename_recv(pktin, req);
1bc24185 1577
83567e43 1578 error = result ? NULL : fxp_error();
1579
1580 if (error) {
1581 printf("mv %s %s: %s\n", srcfname, finalfname, error);
1582 ret = 0;
1583 } else {
1584 printf("%s -> %s\n", srcfname, finalfname);
1585 ret = 1;
9954aaa3 1586 }
1587
83567e43 1588 sfree(newcanon);
1589 return ret;
d92624dc 1590}
1591
1592int sftp_cmd_mv(struct sftp_command *cmd)
1593{
83567e43 1594 struct sftp_context_mv actx, *ctx = &actx;
1595 int i, ret;
d92624dc 1596
fa3db767 1597 if (back == NULL) {
38f0c08e 1598 not_connected();
fa3db767 1599 return 0;
1600 }
1601
d92624dc 1602 if (cmd->nwords < 3) {
1603 printf("mv: expects two filenames\n");
9954aaa3 1604 return 0;
d92624dc 1605 }
83567e43 1606
1607 ctx->dstfname = canonify(cmd->words[cmd->nwords-1]);
1608 if (!ctx->dstfname) {
4dc846cd 1609 printf("%s: canonify: %s\n", ctx->dstfname, fxp_error());
d92624dc 1610 return 0;
1611 }
1612
83567e43 1613 /*
1614 * If there's more than one source argument, or one source
1615 * argument which is a wildcard, we _require_ that the
1616 * destination is a directory.
1617 */
1618 ctx->dest_is_dir = check_is_dir(ctx->dstfname);
1619 if ((cmd->nwords > 3 || is_wildcard(cmd->words[1])) && !ctx->dest_is_dir) {
1620 printf("mv: multiple or wildcard arguments require the destination"
1621 " to be a directory\n");
c4acc08c 1622 sfree(ctx->dstfname);
d92624dc 1623 return 0;
1624 }
9954aaa3 1625
83567e43 1626 /*
1627 * Now iterate over the source arguments.
1628 */
1629 ret = 1;
1630 for (i = 1; i < cmd->nwords-1; i++)
1631 ret &= wildcard_iterate(cmd->words[i], sftp_action_mv, ctx);
1632
c4acc08c 1633 sfree(ctx->dstfname);
83567e43 1634 return ret;
1635}
1636
1637struct sftp_context_chmod {
1638 unsigned attrs_clr, attrs_xor;
1639};
1640
1641static int sftp_action_chmod(void *vctx, char *fname)
1642{
1643 struct fxp_attrs attrs;
1644 struct sftp_packet *pktin;
772e3166 1645 struct sftp_request *req;
83567e43 1646 int result;
1647 unsigned oldperms, newperms;
1648 struct sftp_context_chmod *ctx = (struct sftp_context_chmod *)vctx;
1649
772e3166 1650 req = fxp_stat_send(fname);
1651 pktin = sftp_wait_for_reply(req);
1652 result = fxp_stat_recv(pktin, req, &attrs);
1bc24185 1653
83567e43 1654 if (!result || !(attrs.flags & SSH_FILEXFER_ATTR_PERMISSIONS)) {
1655 printf("get attrs for %s: %s\n", fname,
1656 result ? "file permissions not provided" : fxp_error());
83567e43 1657 return 0;
1658 }
d92624dc 1659
83567e43 1660 attrs.flags = SSH_FILEXFER_ATTR_PERMISSIONS; /* perms _only_ */
1661 oldperms = attrs.permissions & 07777;
1662 attrs.permissions &= ~ctx->attrs_clr;
1663 attrs.permissions ^= ctx->attrs_xor;
1664 newperms = attrs.permissions & 07777;
1bc24185 1665
83567e43 1666 if (oldperms == newperms)
1667 return 1; /* no need to do anything! */
1bc24185 1668
772e3166 1669 req = fxp_setstat_send(fname, attrs);
1670 pktin = sftp_wait_for_reply(req);
1671 result = fxp_setstat_recv(pktin, req);
1bc24185 1672
83567e43 1673 if (!result) {
1674 printf("set attrs for %s: %s\n", fname, fxp_error());
83567e43 1675 return 0;
d92624dc 1676 }
d92624dc 1677
83567e43 1678 printf("%s: %04o -> %04o\n", fname, oldperms, newperms);
1679
df49ff19 1680 return 1;
9954aaa3 1681}
1682
d92624dc 1683int sftp_cmd_chmod(struct sftp_command *cmd)
1684{
83567e43 1685 char *mode;
1686 int i, ret;
1687 struct sftp_context_chmod actx, *ctx = &actx;
d92624dc 1688
fa3db767 1689 if (back == NULL) {
38f0c08e 1690 not_connected();
fa3db767 1691 return 0;
1692 }
1693
d92624dc 1694 if (cmd->nwords < 3) {
1695 printf("chmod: expects a mode specifier and a filename\n");
1696 return 0;
1697 }
1698
1699 /*
1700 * Attempt to parse the mode specifier in cmd->words[1]. We
1701 * don't support the full horror of Unix chmod; instead we
1702 * support a much simpler syntax in which the user can either
1703 * specify an octal number, or a comma-separated sequence of
1704 * [ugoa]*[-+=][rwxst]+. (The initial [ugoa] sequence may
1705 * _only_ be omitted if the only attribute mentioned is t,
1706 * since all others require a user/group/other specification.
1707 * Additionally, the s attribute may not be specified for any
1708 * [ugoa] specifications other than exactly u or exactly g.
1709 */
83567e43 1710 ctx->attrs_clr = ctx->attrs_xor = 0;
d92624dc 1711 mode = cmd->words[1];
1712 if (mode[0] >= '0' && mode[0] <= '9') {
1713 if (mode[strspn(mode, "01234567")]) {
1714 printf("chmod: numeric file modes should"
1715 " contain digits 0-7 only\n");
1716 return 0;
1717 }
83567e43 1718 ctx->attrs_clr = 07777;
1719 sscanf(mode, "%o", &ctx->attrs_xor);
1720 ctx->attrs_xor &= ctx->attrs_clr;
d92624dc 1721 } else {
1722 while (*mode) {
1723 char *modebegin = mode;
1724 unsigned subset, perms;
1725 int action;
1726
1727 subset = 0;
1728 while (*mode && *mode != ',' &&
1729 *mode != '+' && *mode != '-' && *mode != '=') {
1730 switch (*mode) {
1731 case 'u': subset |= 04700; break; /* setuid, user perms */
1732 case 'g': subset |= 02070; break; /* setgid, group perms */
1733 case 'o': subset |= 00007; break; /* just other perms */
1734 case 'a': subset |= 06777; break; /* all of the above */
1735 default:
1736 printf("chmod: file mode '%.*s' contains unrecognised"
1737 " user/group/other specifier '%c'\n",
b51259f6 1738 (int)strcspn(modebegin, ","), modebegin, *mode);
d92624dc 1739 return 0;
1740 }
1741 mode++;
1742 }
1743 if (!*mode || *mode == ',') {
1744 printf("chmod: file mode '%.*s' is incomplete\n",
b51259f6 1745 (int)strcspn(modebegin, ","), modebegin);
d92624dc 1746 return 0;
1747 }
1748 action = *mode++;
1749 if (!*mode || *mode == ',') {
1750 printf("chmod: file mode '%.*s' is incomplete\n",
b51259f6 1751 (int)strcspn(modebegin, ","), modebegin);
d92624dc 1752 return 0;
1753 }
1754 perms = 0;
1755 while (*mode && *mode != ',') {
1756 switch (*mode) {
1757 case 'r': perms |= 00444; break;
1758 case 'w': perms |= 00222; break;
1759 case 'x': perms |= 00111; break;
1760 case 't': perms |= 01000; subset |= 01000; break;
1761 case 's':
1762 if ((subset & 06777) != 04700 &&
1763 (subset & 06777) != 02070) {
1764 printf("chmod: file mode '%.*s': set[ug]id bit should"
1765 " be used with exactly one of u or g only\n",
b51259f6 1766 (int)strcspn(modebegin, ","), modebegin);
d92624dc 1767 return 0;
1768 }
1769 perms |= 06000;
1770 break;
1771 default:
1772 printf("chmod: file mode '%.*s' contains unrecognised"
1773 " permission specifier '%c'\n",
b51259f6 1774 (int)strcspn(modebegin, ","), modebegin, *mode);
d92624dc 1775 return 0;
1776 }
1777 mode++;
1778 }
1779 if (!(subset & 06777) && (perms &~ subset)) {
1780 printf("chmod: file mode '%.*s' contains no user/group/other"
1781 " specifier and permissions other than 't' \n",
b51259f6 1782 (int)strcspn(modebegin, ","), modebegin);
d92624dc 1783 return 0;
1784 }
1785 perms &= subset;
1786 switch (action) {
1787 case '+':
83567e43 1788 ctx->attrs_clr |= perms;
1789 ctx->attrs_xor |= perms;
d92624dc 1790 break;
1791 case '-':
83567e43 1792 ctx->attrs_clr |= perms;
1793 ctx->attrs_xor &= ~perms;
d92624dc 1794 break;
1795 case '=':
83567e43 1796 ctx->attrs_clr |= subset;
1797 ctx->attrs_xor |= perms;
d92624dc 1798 break;
1799 }
1800 if (*mode) mode++; /* eat comma */
1801 }
1802 }
1803
83567e43 1804 ret = 1;
1805 for (i = 2; i < cmd->nwords; i++)
1806 ret &= wildcard_iterate(cmd->words[i], sftp_action_chmod, ctx);
d92624dc 1807
83567e43 1808 return ret;
d92624dc 1809}
9954aaa3 1810
fa3db767 1811static int sftp_cmd_open(struct sftp_command *cmd)
1812{
f11233cb 1813 int portnumber;
1814
fa3db767 1815 if (back != NULL) {
1816 printf("psftp: already connected\n");
1817 return 0;
1818 }
1819
1820 if (cmd->nwords < 2) {
1821 printf("open: expects a host name\n");
1822 return 0;
1823 }
1824
f11233cb 1825 if (cmd->nwords > 2) {
1826 portnumber = atoi(cmd->words[2]);
1827 if (portnumber == 0) {
1828 printf("open: invalid port number\n");
1829 return 0;
1830 }
1831 } else
1832 portnumber = 0;
1833
1834 if (psftp_connect(cmd->words[1], NULL, portnumber)) {
fa3db767 1835 back = NULL; /* connection is already closed */
1836 return -1; /* this is fatal */
1837 }
1838 do_sftp_init();
df49ff19 1839 return 1;
fa3db767 1840}
1841
3af97463 1842static int sftp_cmd_lcd(struct sftp_command *cmd)
1843{
d6cc41e6 1844 char *currdir, *errmsg;
3af97463 1845
1846 if (cmd->nwords < 2) {
1847 printf("lcd: expects a local directory name\n");
1848 return 0;
1849 }
1850
d6cc41e6 1851 errmsg = psftp_lcd(cmd->words[1]);
1852 if (errmsg) {
1853 printf("lcd: unable to change directory: %s\n", errmsg);
1854 sfree(errmsg);
3af97463 1855 return 0;
1856 }
1857
d6cc41e6 1858 currdir = psftp_getcwd();
3af97463 1859 printf("New local directory is %s\n", currdir);
1860 sfree(currdir);
1861
1862 return 1;
1863}
1864
1865static int sftp_cmd_lpwd(struct sftp_command *cmd)
1866{
1867 char *currdir;
3af97463 1868
d6cc41e6 1869 currdir = psftp_getcwd();
3af97463 1870 printf("Current local directory is %s\n", currdir);
1871 sfree(currdir);
1872
1873 return 1;
1874}
1875
1876static int sftp_cmd_pling(struct sftp_command *cmd)
1877{
1878 int exitcode;
1879
1880 exitcode = system(cmd->words[1]);
1881 return (exitcode == 0);
1882}
1883
bf5240cd 1884static int sftp_cmd_help(struct sftp_command *cmd);
1885
4c7f0d61 1886static struct sftp_cmd_lookup {
1887 char *name;
bf5240cd 1888 /*
1889 * For help purposes, there are two kinds of command:
1890 *
1891 * - primary commands, in which `longhelp' is non-NULL. In
1892 * this case `shorthelp' is descriptive text, and `longhelp'
1893 * is longer descriptive text intended to be printed after
1894 * the command name.
1895 *
1896 * - alias commands, in which `longhelp' is NULL. In this case
1897 * `shorthelp' is the name of a primary command, which
1898 * contains the help that should double up for this command.
1899 */
3af97463 1900 int listed; /* do we list this in primary help? */
bf5240cd 1901 char *shorthelp;
1902 char *longhelp;
32874aea 1903 int (*obey) (struct sftp_command *);
4c7f0d61 1904} sftp_lookup[] = {
1905 /*
1906 * List of sftp commands. This is binary-searched so it MUST be
1907 * in ASCII order.
1908 */
32874aea 1909 {
d6cc41e6 1910 "!", TRUE, "run a local command",
3af97463 1911 "<command>\n"
d6cc41e6 1912 /* FIXME: this example is crap for non-Windows. */
1913 " Runs a local command. For example, \"!del myfile\".\n",
3af97463 1914 sftp_cmd_pling
1915 },
1916 {
1917 "bye", TRUE, "finish your SFTP session",
bf5240cd 1918 "\n"
1919 " Terminates your SFTP session and quits the PSFTP program.\n",
1920 sftp_cmd_quit
1921 },
1922 {
3af97463 1923 "cd", TRUE, "change your remote working directory",
c1b8799b 1924 " [ <new working directory> ]\n"
bf5240cd 1925 " Change the remote working directory for your SFTP session.\n"
1926 " If a new working directory is not supplied, you will be\n"
1927 " returned to your home directory.\n",
1928 sftp_cmd_cd
1929 },
1930 {
3af97463 1931 "chmod", TRUE, "change file permissions and modes",
c1b8799b 1932 " <modes> <filename-or-wildcard> [ <filename-or-wildcard>... ]\n"
1933 " Change the file permissions on one or more remote files or\n"
1934 " directories.\n"
1935 " <modes> can be any octal Unix permission specifier.\n"
1936 " Alternatively, <modes> can include the following modifiers:\n"
bf5240cd 1937 " u+r make file readable by owning user\n"
1938 " u+w make file writable by owning user\n"
1939 " u+x make file executable by owning user\n"
1940 " u-r make file not readable by owning user\n"
1941 " [also u-w, u-x]\n"
1942 " g+r make file readable by members of owning group\n"
1943 " [also g+w, g+x, g-r, g-w, g-x]\n"
1944 " o+r make file readable by all other users\n"
1945 " [also o+w, o+x, o-r, o-w, o-x]\n"
1946 " a+r make file readable by absolutely everybody\n"
1947 " [also a+w, a+x, a-r, a-w, a-x]\n"
1948 " u+s enable the Unix set-user-ID bit\n"
1949 " u-s disable the Unix set-user-ID bit\n"
1950 " g+s enable the Unix set-group-ID bit\n"
1951 " g-s disable the Unix set-group-ID bit\n"
1952 " +t enable the Unix \"sticky bit\"\n"
1953 " You can give more than one modifier for the same user (\"g-rwx\"), and\n"
1954 " more than one user for the same modifier (\"ug+w\"). You can\n"
1955 " use commas to separate different modifiers (\"u+rwx,g+s\").\n",
1956 sftp_cmd_chmod
1957 },
1958 {
b614ce89 1959 "close", TRUE, "finish your SFTP session but do not quit PSFTP",
1960 "\n"
1961 " Terminates your SFTP session, but does not quit the PSFTP\n"
1962 " program. You can then use \"open\" to start another SFTP\n"
1963 " session, to the same server or to a different one.\n",
1964 sftp_cmd_close
1965 },
1966 {
c1b8799b 1967 "del", TRUE, "delete files on the remote server",
1968 " <filename-or-wildcard> [ <filename-or-wildcard>... ]\n"
1969 " Delete a file or files from the server.\n",
bf5240cd 1970 sftp_cmd_rm
1971 },
1972 {
3af97463 1973 "delete", FALSE, "del", NULL, sftp_cmd_rm
bf5240cd 1974 },
1975 {
c1b8799b 1976 "dir", TRUE, "list remote files",
9033711a 1977 " [ <directory-name> ]/[ <wildcard> ]\n"
bf5240cd 1978 " List the contents of a specified directory on the server.\n"
1979 " If <directory-name> is not given, the current working directory\n"
9033711a 1980 " is assumed.\n"
1981 " If <wildcard> is given, it is treated as a set of files to\n"
1982 " list; otherwise, all files are listed.\n",
bf5240cd 1983 sftp_cmd_ls
1984 },
1985 {
3af97463 1986 "exit", TRUE, "bye", NULL, sftp_cmd_quit
bf5240cd 1987 },
1988 {
3af97463 1989 "get", TRUE, "download a file from the server to your local machine",
9033711a 1990 " [ -r ] [ -- ] <filename> [ <local-filename> ]\n"
bf5240cd 1991 " Downloads a file on the server and stores it locally under\n"
1992 " the same name, or under a different one if you supply the\n"
9033711a 1993 " argument <local-filename>.\n"
1994 " If -r specified, recursively fetch a directory.\n",
bf5240cd 1995 sftp_cmd_get
1996 },
1997 {
3af97463 1998 "help", TRUE, "give help",
bf5240cd 1999 " [ <command> [ <command> ... ] ]\n"
2000 " Give general help if no commands are specified.\n"
2001 " If one or more commands are specified, give specific help on\n"
2002 " those particular commands.\n",
2003 sftp_cmd_help
2004 },
2005 {
3af97463 2006 "lcd", TRUE, "change local working directory",
2007 " <local-directory-name>\n"
2008 " Change the local working directory of the PSFTP program (the\n"
2009 " default location where the \"get\" command will save files).\n",
2010 sftp_cmd_lcd
2011 },
2012 {
2013 "lpwd", TRUE, "print local working directory",
2014 "\n"
2015 " Print the local working directory of the PSFTP program (the\n"
2016 " default location where the \"get\" command will save files).\n",
2017 sftp_cmd_lpwd
2018 },
2019 {
2020 "ls", TRUE, "dir", NULL,
bf5240cd 2021 sftp_cmd_ls
2022 },
2023 {
9c77ddf6 2024 "mget", TRUE, "download multiple files at once",
9033711a 2025 " [ -r ] [ -- ] <filename-or-wildcard> [ <filename-or-wildcard>... ]\n"
9c77ddf6 2026 " Downloads many files from the server, storing each one under\n"
2027 " the same name it has on the server side. You can use wildcards\n"
9033711a 2028 " such as \"*.c\" to specify lots of files at once.\n"
2029 " If -r specified, recursively fetch files and directories.\n",
9c77ddf6 2030 sftp_cmd_mget
2031 },
2032 {
c1b8799b 2033 "mkdir", TRUE, "create directories on the remote server",
2034 " <directory-name> [ <directory-name>... ]\n"
2035 " Creates directories with the given names on the server.\n",
bf5240cd 2036 sftp_cmd_mkdir
2037 },
2038 {
9c77ddf6 2039 "mput", TRUE, "upload multiple files at once",
96515f61 2040 " [ -r ] [ -- ] <filename-or-wildcard> [ <filename-or-wildcard>... ]\n"
9c77ddf6 2041 " Uploads many files to the server, storing each one under the\n"
2042 " same name it has on the client side. You can use wildcards\n"
9033711a 2043 " such as \"*.c\" to specify lots of files at once.\n"
2044 " If -r specified, recursively store files and directories.\n",
9c77ddf6 2045 sftp_cmd_mput
2046 },
2047 {
c1b8799b 2048 "mv", TRUE, "move or rename file(s) on the remote server",
2049 " <source> [ <source>... ] <destination>\n"
2050 " Moves or renames <source>(s) on the server to <destination>,\n"
2051 " also on the server.\n"
2052 " If <destination> specifies an existing directory, then <source>\n"
2053 " may be a wildcard, and multiple <source>s may be given; all\n"
2054 " source files are moved into <destination>.\n"
2055 " Otherwise, <source> must specify a single file, which is moved\n"
2056 " or renamed so that it is accessible under the name <destination>.\n",
bf5240cd 2057 sftp_cmd_mv
2058 },
2059 {
3af97463 2060 "open", TRUE, "connect to a host",
f11233cb 2061 " [<user>@]<hostname> [<port>]\n"
fa3db767 2062 " Establishes an SFTP connection to a given host. Only usable\n"
c1b8799b 2063 " when you are not already connected to a server.\n",
fa3db767 2064 sftp_cmd_open
2065 },
2066 {
56542985 2067 "put", TRUE, "upload a file from your local machine to the server",
9033711a 2068 " [ -r ] [ -- ] <filename> [ <remote-filename> ]\n"
56542985 2069 " Uploads a file to the server and stores it there under\n"
2070 " the same name, or under a different one if you supply the\n"
9033711a 2071 " argument <remote-filename>.\n"
2072 " If -r specified, recursively store a directory.\n",
56542985 2073 sftp_cmd_put
2074 },
2075 {
3af97463 2076 "pwd", TRUE, "print your remote working directory",
4f2b387f 2077 "\n"
2078 " Print the current remote working directory for your SFTP session.\n",
2079 sftp_cmd_pwd
2080 },
2081 {
3af97463 2082 "quit", TRUE, "bye", NULL,
bf5240cd 2083 sftp_cmd_quit
2084 },
2085 {
c1b8799b 2086 "reget", TRUE, "continue downloading files",
9033711a 2087 " [ -r ] [ -- ] <filename> [ <local-filename> ]\n"
bf5240cd 2088 " Works exactly like the \"get\" command, but the local file\n"
2089 " must already exist. The download will begin at the end of the\n"
9033711a 2090 " file. This is for resuming a download that was interrupted.\n"
2091 " If -r specified, resume interrupted \"get -r\".\n",
bf5240cd 2092 sftp_cmd_reget
2093 },
2094 {
3af97463 2095 "ren", TRUE, "mv", NULL,
bf5240cd 2096 sftp_cmd_mv
2097 },
2098 {
3af97463 2099 "rename", FALSE, "mv", NULL,
bf5240cd 2100 sftp_cmd_mv
2101 },
2102 {
c1b8799b 2103 "reput", TRUE, "continue uploading files",
9033711a 2104 " [ -r ] [ -- ] <filename> [ <remote-filename> ]\n"
bf5240cd 2105 " Works exactly like the \"put\" command, but the remote file\n"
2106 " must already exist. The upload will begin at the end of the\n"
9033711a 2107 " file. This is for resuming an upload that was interrupted.\n"
2108 " If -r specified, resume interrupted \"put -r\".\n",
bf5240cd 2109 sftp_cmd_reput
2110 },
2111 {
3af97463 2112 "rm", TRUE, "del", NULL,
bf5240cd 2113 sftp_cmd_rm
2114 },
2115 {
c1b8799b 2116 "rmdir", TRUE, "remove directories on the remote server",
2117 " <directory-name> [ <directory-name>... ]\n"
bf5240cd 2118 " Removes the directory with the given name on the server.\n"
c1b8799b 2119 " The directory will not be removed unless it is empty.\n"
2120 " Wildcards may be used to specify multiple directories.\n",
bf5240cd 2121 sftp_cmd_rmdir
2122 }
2123};
2124
2125const struct sftp_cmd_lookup *lookup_command(char *name)
2126{
2127 int i, j, k, cmp;
2128
2129 i = -1;
2130 j = sizeof(sftp_lookup) / sizeof(*sftp_lookup);
2131 while (j - i > 1) {
2132 k = (j + i) / 2;
2133 cmp = strcmp(name, sftp_lookup[k].name);
2134 if (cmp < 0)
2135 j = k;
2136 else if (cmp > 0)
2137 i = k;
2138 else {
2139 return &sftp_lookup[k];
2140 }
2141 }
2142 return NULL;
2143}
2144
2145static int sftp_cmd_help(struct sftp_command *cmd)
2146{
2147 int i;
2148 if (cmd->nwords == 1) {
2149 /*
2150 * Give short help on each command.
2151 */
2152 int maxlen;
2153 maxlen = 0;
2154 for (i = 0; i < sizeof(sftp_lookup) / sizeof(*sftp_lookup); i++) {
3af97463 2155 int len;
2156 if (!sftp_lookup[i].listed)
2157 continue;
2158 len = strlen(sftp_lookup[i].name);
bf5240cd 2159 if (maxlen < len)
2160 maxlen = len;
2161 }
2162 for (i = 0; i < sizeof(sftp_lookup) / sizeof(*sftp_lookup); i++) {
2163 const struct sftp_cmd_lookup *lookup;
3af97463 2164 if (!sftp_lookup[i].listed)
2165 continue;
bf5240cd 2166 lookup = &sftp_lookup[i];
2167 printf("%-*s", maxlen+2, lookup->name);
2168 if (lookup->longhelp == NULL)
2169 lookup = lookup_command(lookup->shorthelp);
2170 printf("%s\n", lookup->shorthelp);
2171 }
2172 } else {
2173 /*
2174 * Give long help on specific commands.
2175 */
2176 for (i = 1; i < cmd->nwords; i++) {
2177 const struct sftp_cmd_lookup *lookup;
2178 lookup = lookup_command(cmd->words[i]);
2179 if (!lookup) {
2180 printf("help: %s: command not found\n", cmd->words[i]);
2181 } else {
2182 printf("%s", lookup->name);
2183 if (lookup->longhelp == NULL)
2184 lookup = lookup_command(lookup->shorthelp);
2185 printf("%s", lookup->longhelp);
2186 }
2187 }
2188 }
df49ff19 2189 return 1;
bf5240cd 2190}
4c7f0d61 2191
2192/* ----------------------------------------------------------------------
2193 * Command line reading and parsing.
2194 */
9954aaa3 2195struct sftp_command *sftp_getcmd(FILE *fp, int mode, int modeflags)
32874aea 2196{
4c7f0d61 2197 char *line;
4c7f0d61 2198 struct sftp_command *cmd;
2199 char *p, *q, *r;
2200 int quoting;
2201
3d88e64d 2202 cmd = snew(struct sftp_command);
4c7f0d61 2203 cmd->words = NULL;
2204 cmd->nwords = 0;
2205 cmd->wordssize = 0;
2206
2207 line = NULL;
39934deb 2208
2209 if (fp) {
2210 if (modeflags & 1)
2211 printf("psftp> ");
2212 line = fgetline(fp);
2213 } else {
65857773 2214 line = ssh_sftp_get_cmdline("psftp> ", back == NULL);
4c7f0d61 2215 }
39934deb 2216
2217 if (!line || !*line) {
2218 cmd->obey = sftp_cmd_quit;
2219 if ((mode == 0) || (modeflags & 1))
2220 printf("quit\n");
2221 return cmd; /* eof */
2222 }
2223
2224 line[strcspn(line, "\r\n")] = '\0';
2225
df49ff19 2226 if (modeflags & 1) {
2227 printf("%s\n", line);
2228 }
4c7f0d61 2229
4c7f0d61 2230 p = line;
3af97463 2231 while (*p && (*p == ' ' || *p == '\t'))
2232 p++;
2233
2234 if (*p == '!') {
2235 /*
2236 * Special case: the ! command. This is always parsed as
2237 * exactly two words: one containing the !, and the second
2238 * containing everything else on the line.
2239 */
2240 cmd->nwords = cmd->wordssize = 2;
3d88e64d 2241 cmd->words = sresize(cmd->words, cmd->wordssize, char *);
679539d7 2242 cmd->words[0] = dupstr("!");
2243 cmd->words[1] = dupstr(p+1);
1ef4dce9 2244 } else if (*p == '#') {
2245 /*
2246 * Special case: comment. Entire line is ignored.
2247 */
2248 cmd->nwords = cmd->wordssize = 0;
3af97463 2249 } else {
2250
2251 /*
2252 * Parse the command line into words. The syntax is:
2253 * - double quotes are removed, but cause spaces within to be
2254 * treated as non-separating.
2255 * - a double-doublequote pair is a literal double quote, inside
2256 * _or_ outside quotes. Like this:
2257 *
2258 * firstword "second word" "this has ""quotes"" in" and""this""
2259 *
2260 * becomes
2261 *
2262 * >firstword<
2263 * >second word<
2264 * >this has "quotes" in<
2265 * >and"this"<
2266 */
5ab93329 2267 while (1) {
3af97463 2268 /* skip whitespace */
2269 while (*p && (*p == ' ' || *p == '\t'))
2270 p++;
5ab93329 2271 /* terminate loop */
2272 if (!*p)
2273 break;
3af97463 2274 /* mark start of word */
2275 q = r = p; /* q sits at start, r writes word */
2276 quoting = 0;
2277 while (*p) {
2278 if (!quoting && (*p == ' ' || *p == '\t'))
2279 break; /* reached end of word */
2280 else if (*p == '"' && p[1] == '"')
2281 p += 2, *r++ = '"'; /* a literal quote */
2282 else if (*p == '"')
2283 p++, quoting = !quoting;
2284 else
2285 *r++ = *p++;
2286 }
2287 if (*p)
2288 p++; /* skip over the whitespace */
2289 *r = '\0';
2290 if (cmd->nwords >= cmd->wordssize) {
2291 cmd->wordssize = cmd->nwords + 16;
3d88e64d 2292 cmd->words = sresize(cmd->words, cmd->wordssize, char *);
3af97463 2293 }
679539d7 2294 cmd->words[cmd->nwords++] = dupstr(q);
4c7f0d61 2295 }
4c7f0d61 2296 }
2297
39934deb 2298 sfree(line);
2299
4c7f0d61 2300 /*
2301 * Now parse the first word and assign a function.
2302 */
2303
2304 if (cmd->nwords == 0)
2305 cmd->obey = sftp_cmd_null;
2306 else {
bf5240cd 2307 const struct sftp_cmd_lookup *lookup;
2308 lookup = lookup_command(cmd->words[0]);
2309 if (!lookup)
2310 cmd->obey = sftp_cmd_unknown;
2311 else
2312 cmd->obey = lookup->obey;
4c7f0d61 2313 }
2314
2315 return cmd;
2316}
2317
774204f5 2318static int do_sftp_init(void)
32874aea 2319{
1bc24185 2320 struct sftp_packet *pktin;
772e3166 2321 struct sftp_request *req;
1bc24185 2322
4c7f0d61 2323 /*
2324 * Do protocol initialisation.
2325 */
2326 if (!fxp_init()) {
2327 fprintf(stderr,
32874aea 2328 "Fatal: unable to initialise SFTP: %s\n", fxp_error());
774204f5 2329 return 1; /* failure */
4c7f0d61 2330 }
2331
2332 /*
2333 * Find out where our home directory is.
2334 */
772e3166 2335 req = fxp_realpath_send(".");
2336 pktin = sftp_wait_for_reply(req);
2337 homedir = fxp_realpath_recv(pktin, req);
1bc24185 2338
4c7f0d61 2339 if (!homedir) {
2340 fprintf(stderr,
2341 "Warning: failed to resolve home directory: %s\n",
2342 fxp_error());
2343 homedir = dupstr(".");
2344 } else {
2345 printf("Remote working directory is %s\n", homedir);
2346 }
2347 pwd = dupstr(homedir);
774204f5 2348 return 0;
fa3db767 2349}
2350
679539d7 2351void do_sftp_cleanup()
2352{
2353 char ch;
f11233cb 2354 if (back) {
2355 back->special(backhandle, TS_EOF);
bc06669b 2356 sent_eof = TRUE;
f11233cb 2357 sftp_recvdata(&ch, 1);
2358 back->free(backhandle);
2359 sftp_cleanup_request();
65857773 2360 back = NULL;
2361 backhandle = NULL;
f11233cb 2362 }
679539d7 2363 if (pwd) {
2364 sfree(pwd);
2365 pwd = NULL;
2366 }
2367 if (homedir) {
2368 sfree(homedir);
2369 homedir = NULL;
2370 }
2371}
2372
fa3db767 2373void do_sftp(int mode, int modeflags, char *batchfile)
2374{
2375 FILE *fp;
df49ff19 2376 int ret;
4c7f0d61 2377
9954aaa3 2378 /*
2379 * Batch mode?
4c7f0d61 2380 */
9954aaa3 2381 if (mode == 0) {
2382
2383 /* ------------------------------------------------------------------
2384 * Now we're ready to do Real Stuff.
2385 */
2386 while (1) {
df49ff19 2387 struct sftp_command *cmd;
39934deb 2388 cmd = sftp_getcmd(NULL, 0, 0);
df49ff19 2389 if (!cmd)
2390 break;
679539d7 2391 ret = cmd->obey(cmd);
2392 if (cmd->words) {
2393 int i;
2394 for(i = 0; i < cmd->nwords; i++)
2395 sfree(cmd->words[i]);
2396 sfree(cmd->words);
2397 }
2398 sfree(cmd);
2399 if (ret < 0)
df49ff19 2400 break;
bf5240cd 2401 }
9954aaa3 2402 } else {
2403 fp = fopen(batchfile, "r");
2404 if (!fp) {
bf5240cd 2405 printf("Fatal: unable to open %s\n", batchfile);
2406 return;
9954aaa3 2407 }
2408 while (1) {
bf5240cd 2409 struct sftp_command *cmd;
2410 cmd = sftp_getcmd(fp, mode, modeflags);
2411 if (!cmd)
2412 break;
df49ff19 2413 ret = cmd->obey(cmd);
2414 if (ret < 0)
bf5240cd 2415 break;
df49ff19 2416 if (ret == 0) {
bf5240cd 2417 if (!(modeflags & 2))
9954aaa3 2418 break;
bf5240cd 2419 }
9954aaa3 2420 }
bf5240cd 2421 fclose(fp);
9954aaa3 2422
4c7f0d61 2423 }
4a8fc3c4 2424}
4c7f0d61 2425
4a8fc3c4 2426/* ----------------------------------------------------------------------
2427 * Dirty bits: integration with PuTTY.
2428 */
2429
2430static int verbose = 0;
2431
7bedb13c 2432/*
4a8fc3c4 2433 * Print an error message and perform a fatal exit.
2434 */
2435void fatalbox(char *fmt, ...)
2436{
57356d63 2437 char *str, *str2;
4a8fc3c4 2438 va_list ap;
2439 va_start(ap, fmt);
57356d63 2440 str = dupvprintf(fmt, ap);
2441 str2 = dupcat("Fatal: ", str, "\n", NULL);
2442 sfree(str);
4a8fc3c4 2443 va_end(ap);
57356d63 2444 fputs(str2, stderr);
2445 sfree(str2);
4a8fc3c4 2446
93b581bd 2447 cleanup_exit(1);
4a8fc3c4 2448}
1709795f 2449void modalfatalbox(char *fmt, ...)
2450{
57356d63 2451 char *str, *str2;
1709795f 2452 va_list ap;
2453 va_start(ap, fmt);
57356d63 2454 str = dupvprintf(fmt, ap);
2455 str2 = dupcat("Fatal: ", str, "\n", NULL);
2456 sfree(str);
1709795f 2457 va_end(ap);
57356d63 2458 fputs(str2, stderr);
2459 sfree(str2);
1709795f 2460
2461 cleanup_exit(1);
2462}
a8327734 2463void connection_fatal(void *frontend, char *fmt, ...)
4a8fc3c4 2464{
57356d63 2465 char *str, *str2;
4a8fc3c4 2466 va_list ap;
2467 va_start(ap, fmt);
57356d63 2468 str = dupvprintf(fmt, ap);
2469 str2 = dupcat("Fatal: ", str, "\n", NULL);
2470 sfree(str);
4a8fc3c4 2471 va_end(ap);
57356d63 2472 fputs(str2, stderr);
2473 sfree(str2);
4a8fc3c4 2474
93b581bd 2475 cleanup_exit(1);
4a8fc3c4 2476}
2477
6b78788a 2478void ldisc_send(void *handle, char *buf, int len, int interactive)
32874aea 2479{
4a8fc3c4 2480 /*
2481 * This is only here because of the calls to ldisc_send(NULL,
2482 * 0) in ssh.c. Nothing in PSFTP actually needs to use the
2483 * ldisc as an ldisc. So if we get called with any real data, I
2484 * want to know about it.
4c7f0d61 2485 */
4a8fc3c4 2486 assert(len == 0);
2487}
2488
2489/*
c44bf5bd 2490 * In psftp, all agent requests should be synchronous, so this is a
2491 * never-called stub.
2492 */
2493void agent_schedule_callback(void (*callback)(void *, void *, int),
2494 void *callback_ctx, void *data, int len)
2495{
2496 assert(!"We shouldn't be here");
2497}
2498
2499/*
4a8fc3c4 2500 * Receive a block of data from the SSH link. Block until all data
2501 * is available.
2502 *
2503 * To do this, we repeatedly call the SSH protocol module, with our
2504 * own trap in from_backend() to catch the data that comes back. We
2505 * do this until we have enough data.
2506 */
2507
32874aea 2508static unsigned char *outptr; /* where to put the data */
2509static unsigned outlen; /* how much data required */
4a8fc3c4 2510static unsigned char *pending = NULL; /* any spare data */
32874aea 2511static unsigned pendlen = 0, pendsize = 0; /* length and phys. size of buffer */
9fab77dc 2512int from_backend(void *frontend, int is_stderr, const char *data, int datalen)
32874aea 2513{
2514 unsigned char *p = (unsigned char *) data;
2515 unsigned len = (unsigned) datalen;
4a8fc3c4 2516
2517 /*
2518 * stderr data is just spouted to local stderr and otherwise
2519 * ignored.
2520 */
2521 if (is_stderr) {
bfa5400d 2522 if (len > 0)
ecb25722 2523 if (fwrite(data, 1, len, stderr) < len)
2524 /* oh well */;
5471d09a 2525 return 0;
4a8fc3c4 2526 }
2527
2528 /*
2529 * If this is before the real session begins, just return.
2530 */
2531 if (!outptr)
5471d09a 2532 return 0;
4a8fc3c4 2533
bfa5400d 2534 if ((outlen > 0) && (len > 0)) {
32874aea 2535 unsigned used = outlen;
2536 if (used > len)
2537 used = len;
2538 memcpy(outptr, p, used);
2539 outptr += used;
2540 outlen -= used;
2541 p += used;
2542 len -= used;
4a8fc3c4 2543 }
2544
2545 if (len > 0) {
32874aea 2546 if (pendsize < pendlen + len) {
2547 pendsize = pendlen + len + 4096;
3d88e64d 2548 pending = sresize(pending, pendsize, unsigned char);
32874aea 2549 }
2550 memcpy(pending + pendlen, p, len);
2551 pendlen += len;
4a8fc3c4 2552 }
5471d09a 2553
2554 return 0;
4a8fc3c4 2555}
edd0cb8a 2556int from_backend_untrusted(void *frontend_handle, const char *data, int len)
2557{
2558 /*
2559 * No "untrusted" output should get here (the way the code is
2560 * currently, it's all diverted by FLAG_STDERR).
2561 */
2562 assert(!"Unexpected call to from_backend_untrusted()");
2563 return 0; /* not reached */
2564}
bc06669b 2565int from_backend_eof(void *frontend)
2566{
2567 /*
2568 * We expect to be the party deciding when to close the
2569 * connection, so if we see EOF before we sent it ourselves, we
2570 * should panic.
2571 */
2572 if (!sent_eof) {
2573 connection_fatal(frontend,
2574 "Received unexpected end-of-file from SFTP server");
2575 }
2576 return FALSE;
2577}
32874aea 2578int sftp_recvdata(char *buf, int len)
2579{
2580 outptr = (unsigned char *) buf;
4a8fc3c4 2581 outlen = len;
2582
2583 /*
2584 * See if the pending-input block contains some of what we
2585 * need.
2586 */
2587 if (pendlen > 0) {
32874aea 2588 unsigned pendused = pendlen;
2589 if (pendused > outlen)
2590 pendused = outlen;
4a8fc3c4 2591 memcpy(outptr, pending, pendused);
32874aea 2592 memmove(pending, pending + pendused, pendlen - pendused);
4a8fc3c4 2593 outptr += pendused;
2594 outlen -= pendused;
32874aea 2595 pendlen -= pendused;
2596 if (pendlen == 0) {
2597 pendsize = 0;
2598 sfree(pending);
2599 pending = NULL;
2600 }
2601 if (outlen == 0)
2602 return 1;
4a8fc3c4 2603 }
2604
2605 while (outlen > 0) {
34580230 2606 if (back->exitcode(backhandle) >= 0 || ssh_sftp_loop_iteration() < 0)
32874aea 2607 return 0; /* doom */
4a8fc3c4 2608 }
2609
2610 return 1;
2611}
32874aea 2612int sftp_senddata(char *buf, int len)
2613{
776792d7 2614 back->send(backhandle, buf, len);
4a8fc3c4 2615 return 1;
2616}
2617
2618/*
4a8fc3c4 2619 * Short description of parameters.
2620 */
2621static void usage(void)
2622{
2623 printf("PuTTY Secure File Transfer (SFTP) client\n");
2624 printf("%s\n", ver);
90767715 2625 printf("Usage: psftp [options] [user@]host\n");
4a8fc3c4 2626 printf("Options:\n");
2285d016 2627 printf(" -V print version information and exit\n");
2628 printf(" -pgpfp print PGP key fingerprints and exit\n");
9954aaa3 2629 printf(" -b file use specified batchfile\n");
2630 printf(" -bc output batchfile commands\n");
2631 printf(" -be don't stop batchfile processing if errors\n");
4a8fc3c4 2632 printf(" -v show verbose messages\n");
e2a197cf 2633 printf(" -load sessname Load settings from saved session\n");
2634 printf(" -l user connect with specified username\n");
4a8fc3c4 2635 printf(" -P port connect to specified port\n");
2636 printf(" -pw passw login with specified password\n");
e2a197cf 2637 printf(" -1 -2 force use of particular SSH protocol version\n");
05581745 2638 printf(" -4 -6 force use of IPv4 or IPv6\n");
e2a197cf 2639 printf(" -C enable compression\n");
2640 printf(" -i key private key file for authentication\n");
e5708bc7 2641 printf(" -noagent disable use of Pageant\n");
2642 printf(" -agent enable use of Pageant\n");
e2a197cf 2643 printf(" -batch disable all interactive prompts\n");
93b581bd 2644 cleanup_exit(1);
4a8fc3c4 2645}
2646
dc108ebc 2647static void version(void)
2648{
2649 printf("psftp: %s\n", ver);
2650 cleanup_exit(1);
2651}
2652
4a8fc3c4 2653/*
fa3db767 2654 * Connect to a host.
4a8fc3c4 2655 */
fa3db767 2656static int psftp_connect(char *userhost, char *user, int portnumber)
4a8fc3c4 2657{
fa3db767 2658 char *host, *realhost;
cbe2d68f 2659 const char *err;
b51259f6 2660 void *logctx;
4a8fc3c4 2661
2662 /* Separate host and username */
2663 host = userhost;
2664 host = strrchr(host, '@');
2665 if (host == NULL) {
2666 host = userhost;
2667 } else {
2668 *host++ = '\0';
2669 if (user) {
32874aea 2670 printf("psftp: multiple usernames specified; using \"%s\"\n",
2671 user);
4a8fc3c4 2672 } else
2673 user = userhost;
2674 }
2675
18e62ad8 2676 /*
2677 * If we haven't loaded session details already (e.g., from -load),
2678 * try looking for a session called "host".
2679 */
2680 if (!loaded_session) {
2681 /* Try to load settings for `host' into a temporary config */
4a693cfc 2682 Conf *conf2 = conf_new();
2683 conf_set_str(conf2, CONF_host, "");
2684 do_defaults(host, conf2);
2685 if (conf_get_str(conf2, CONF_host)[0] != '\0') {
18e62ad8 2686 /* Settings present and include hostname */
2687 /* Re-load data into the real config. */
4a693cfc 2688 do_defaults(host, conf);
18e62ad8 2689 } else {
2690 /* Session doesn't exist or mention a hostname. */
2691 /* Use `host' as a bare hostname. */
4a693cfc 2692 conf_set_str(conf, CONF_host, host);
18e62ad8 2693 }
2694 } else {
2695 /* Patch in hostname `host' to session details. */
4a693cfc 2696 conf_set_str(conf, CONF_host, host);
f133db8e 2697 }
2698
2699 /*
2700 * Force use of SSH. (If they got the protocol wrong we assume the
2701 * port is useless too.)
2702 */
4a693cfc 2703 if (conf_get_int(conf, CONF_protocol) != PROT_SSH) {
2704 conf_set_int(conf, CONF_protocol, PROT_SSH);
2705 conf_set_int(conf, CONF_port, 22);
4a8fc3c4 2706 }
2707
449925a6 2708 /*
4123fa9a 2709 * If saved session / Default Settings says SSH-1 (`1 only' or `1'),
2710 * then change it to SSH-2, on the grounds that that's more likely to
2711 * work for SFTP. (Can be overridden with `-1' option.)
2712 * But if it says `2 only' or `2', respect which.
2713 */
4a693cfc 2714 if ((conf_get_int(conf, CONF_sshprot) & ~1) != 2) /* is it 2 or 3? */
2715 conf_set_int(conf, CONF_sshprot, 2);
4123fa9a 2716
2717 /*
c0a81592 2718 * Enact command-line overrides.
2719 */
4a693cfc 2720 cmdline_run_saved(conf);
c0a81592 2721
2722 /*
4a693cfc 2723 * Muck about with the hostname in various ways.
449925a6 2724 */
2725 {
4a693cfc 2726 char *hostbuf = dupstr(conf_get_str(conf, CONF_host));
2727 char *host = hostbuf;
2728 char *p, *q;
449925a6 2729
4a693cfc 2730 /*
2731 * Trim leading whitespace.
2732 */
2733 host += strspn(host, " \t");
449925a6 2734
4a693cfc 2735 /*
2736 * See if host is of the form user@host, and separate out
2737 * the username if so.
2738 */
2739 if (host[0] != '\0') {
2740 char *atsign = strrchr(host, '@');
2741 if (atsign) {
2742 *atsign = '\0';
2743 conf_set_str(conf, CONF_username, host);
2744 host = atsign + 1;
cae0c023 2745 }
cae0c023 2746 }
4a693cfc 2747
2748 /*
2749 * Remove any remaining whitespace.
2750 */
2751 p = hostbuf;
2752 q = host;
2753 while (*q) {
2754 if (*q != ' ' && *q != '\t')
2755 *p++ = *q;
2756 q++;
2757 }
2758 *p = '\0';
2759
2760 conf_set_str(conf, CONF_host, hostbuf);
2761 sfree(hostbuf);
cae0c023 2762 }
2763
4a8fc3c4 2764 /* Set username */
2765 if (user != NULL && user[0] != '\0') {
4a693cfc 2766 conf_set_str(conf, CONF_username, user);
4a8fc3c4 2767 }
4a8fc3c4 2768
4a8fc3c4 2769 if (portnumber)
4a693cfc 2770 conf_set_int(conf, CONF_port, portnumber);
4a8fc3c4 2771
d27b4a18 2772 /*
2773 * Disable scary things which shouldn't be enabled for simple
2774 * things like SCP and SFTP: agent forwarding, port forwarding,
2775 * X forwarding.
2776 */
4a693cfc 2777 conf_set_int(conf, CONF_x11_forward, 0);
2778 conf_set_int(conf, CONF_agentfwd, 0);
2779 conf_set_int(conf, CONF_ssh_simple, TRUE);
2780 {
2781 char *key;
2782 while ((key = conf_get_str_nthstrkey(conf, CONF_portfwd, 0)) != NULL)
2783 conf_del_str_str(conf, CONF_portfwd, key);
2784 }
d27b4a18 2785
bebf22d0 2786 /* Set up subsystem name. */
4a693cfc 2787 conf_set_str(conf, CONF_remote_cmd, "sftp");
2788 conf_set_int(conf, CONF_ssh_subsys, TRUE);
2789 conf_set_int(conf, CONF_nopty, TRUE);
4a8fc3c4 2790
bebf22d0 2791 /*
2e85c969 2792 * Set up fallback option, for SSH-1 servers or servers with the
bebf22d0 2793 * sftp subsystem not enabled but the server binary installed
2794 * in the usual place. We only support fallback on Unix
248c0c5a 2795 * systems, and we use a kludgy piece of shellery which should
2796 * try to find sftp-server in various places (the obvious
2797 * systemwide spots /usr/lib and /usr/local/lib, and then the
2798 * user's PATH) and finally give up.
bebf22d0 2799 *
248c0c5a 2800 * test -x /usr/lib/sftp-server && exec /usr/lib/sftp-server
2801 * test -x /usr/local/lib/sftp-server && exec /usr/local/lib/sftp-server
2802 * exec sftp-server
bebf22d0 2803 *
2804 * the idea being that this will attempt to use either of the
2805 * obvious pathnames and then give up, and when it does give up
2806 * it will print the preferred pathname in the error messages.
2807 */
4a693cfc 2808 conf_set_str(conf, CONF_remote_cmd2,
2809 "test -x /usr/lib/sftp-server &&"
2810 " exec /usr/lib/sftp-server\n"
2811 "test -x /usr/local/lib/sftp-server &&"
2812 " exec /usr/local/lib/sftp-server\n"
2813 "exec sftp-server");
2814 conf_set_int(conf, CONF_ssh_subsys2, FALSE);
bebf22d0 2815
4a8fc3c4 2816 back = &ssh_backend;
2817
4a693cfc 2818 err = back->init(NULL, &backhandle, conf,
2819 conf_get_str(conf, CONF_host),
2820 conf_get_int(conf, CONF_port),
2821 &realhost, 0,
2822 conf_get_int(conf, CONF_tcp_keepalives));
4a8fc3c4 2823 if (err != NULL) {
fa3db767 2824 fprintf(stderr, "ssh_init: %s\n", err);
4a8fc3c4 2825 return 1;
2826 }
4a693cfc 2827 logctx = log_init(NULL, conf);
a8327734 2828 back->provide_logctx(backhandle, logctx);
d3fef4a5 2829 console_provide_logctx(logctx);
d6cc41e6 2830 while (!back->sendok(backhandle)) {
2e528220 2831 if (back->exitcode(backhandle) >= 0)
2832 return 1;
d6cc41e6 2833 if (ssh_sftp_loop_iteration() < 0) {
2834 fprintf(stderr, "ssh_init: error during SSH connection setup\n");
2835 return 1;
2836 }
2837 }
4a8fc3c4 2838 if (verbose && realhost != NULL)
2839 printf("Connected to %s\n", realhost);
679539d7 2840 if (realhost != NULL)
2841 sfree(realhost);
fa3db767 2842 return 0;
2843}
2844
c0a81592 2845void cmdline_error(char *p, ...)
2846{
2847 va_list ap;
86256dc6 2848 fprintf(stderr, "psftp: ");
c0a81592 2849 va_start(ap, p);
2850 vfprintf(stderr, p, ap);
2851 va_end(ap);
86256dc6 2852 fprintf(stderr, "\n try typing \"psftp -h\" for help\n");
c0a81592 2853 exit(1);
2854}
2855
fa3db767 2856/*
2857 * Main program. Parse arguments etc.
2858 */
d6cc41e6 2859int psftp_main(int argc, char *argv[])
fa3db767 2860{
2861 int i;
2862 int portnumber = 0;
2863 char *userhost, *user;
2864 int mode = 0;
2865 int modeflags = 0;
2866 char *batchfile = NULL;
2867
b51259f6 2868 flags = FLAG_STDERR | FLAG_INTERACTIVE
2869#ifdef FLAG_SYNCAGENT
2870 | FLAG_SYNCAGENT
2871#endif
2872 ;
c0a81592 2873 cmdline_tooltype = TOOLTYPE_FILETRANSFER;
fa3db767 2874 sk_init();
2875
2876 userhost = user = NULL;
2877
18e62ad8 2878 /* Load Default Settings before doing anything else. */
4a693cfc 2879 conf = conf_new();
2880 do_defaults(NULL, conf);
18e62ad8 2881 loaded_session = FALSE;
2882
fa3db767 2883 for (i = 1; i < argc; i++) {
c0a81592 2884 int ret;
fa3db767 2885 if (argv[i][0] != '-') {
c0a81592 2886 if (userhost)
2887 usage();
2888 else
2889 userhost = dupstr(argv[i]);
2890 continue;
2891 }
4a693cfc 2892 ret = cmdline_process_param(argv[i], i+1<argc?argv[i+1]:NULL, 1, conf);
c0a81592 2893 if (ret == -2) {
2894 cmdline_error("option \"%s\" requires an argument", argv[i]);
2895 } else if (ret == 2) {
2896 i++; /* skip next argument */
2897 } else if (ret == 1) {
2898 /* We have our own verbosity in addition to `flags'. */
2899 if (flags & FLAG_VERBOSE)
2900 verbose = 1;
fa3db767 2901 } else if (strcmp(argv[i], "-h") == 0 ||
bcb1823f 2902 strcmp(argv[i], "-?") == 0 ||
2903 strcmp(argv[i], "--help") == 0) {
fa3db767 2904 usage();
2285d016 2905 } else if (strcmp(argv[i], "-pgpfp") == 0) {
2906 pgp_fingerprints();
2907 return 1;
bcb1823f 2908 } else if (strcmp(argv[i], "-V") == 0 ||
2909 strcmp(argv[i], "--version") == 0) {
dc108ebc 2910 version();
c0a81592 2911 } else if (strcmp(argv[i], "-batch") == 0) {
2912 console_batch_mode = 1;
fa3db767 2913 } else if (strcmp(argv[i], "-b") == 0 && i + 1 < argc) {
2914 mode = 1;
2915 batchfile = argv[++i];
d13c2ee9 2916 } else if (strcmp(argv[i], "-bc") == 0) {
fa3db767 2917 modeflags = modeflags | 1;
d13c2ee9 2918 } else if (strcmp(argv[i], "-be") == 0) {
fa3db767 2919 modeflags = modeflags | 2;
2920 } else if (strcmp(argv[i], "--") == 0) {
2921 i++;
2922 break;
2923 } else {
86256dc6 2924 cmdline_error("unknown option \"%s\"", argv[i]);
fa3db767 2925 }
2926 }
2927 argc -= i;
2928 argv += i;
2929 back = NULL;
2930
2931 /*
e1bb41d1 2932 * If the loaded session provides a hostname, and a hostname has not
2933 * otherwise been specified, pop it in `userhost' so that
2934 * `psftp -load sessname' is sufficient to start a session.
2935 */
4a693cfc 2936 if (!userhost && conf_get_str(conf, CONF_host)[0] != '\0') {
2937 userhost = dupstr(conf_get_str(conf, CONF_host));
e1bb41d1 2938 }
2939
2940 /*
fa3db767 2941 * If a user@host string has already been provided, connect to
2942 * it now.
2943 */
2944 if (userhost) {
679539d7 2945 int ret;
2946 ret = psftp_connect(userhost, user, portnumber);
2947 sfree(userhost);
2948 if (ret)
fa3db767 2949 return 1;
774204f5 2950 if (do_sftp_init())
2951 return 1;
fa3db767 2952 } else {
2953 printf("psftp: no hostname specified; use \"open host.name\""
679539d7 2954 " to connect\n");
fa3db767 2955 }
4c7f0d61 2956
9954aaa3 2957 do_sftp(mode, modeflags, batchfile);
4a8fc3c4 2958
6226c939 2959 if (back != NULL && back->connected(backhandle)) {
4a8fc3c4 2960 char ch;
51470298 2961 back->special(backhandle, TS_EOF);
bc06669b 2962 sent_eof = TRUE;
4a8fc3c4 2963 sftp_recvdata(&ch, 1);
2964 }
b614ce89 2965 do_sftp_cleanup();
4a8fc3c4 2966 random_save_seed();
679539d7 2967 cmdline_cleanup();
2968 console_provide_logctx(NULL);
679539d7 2969 sk_cleanup();
4a8fc3c4 2970
4c7f0d61 2971 return 0;
2972}