1999-08-31 13:20:48 +04:00
|
|
|
/*
|
2001-09-10 12:39:37 +04:00
|
|
|
* scp.c - Scp (Secure Copy) client for PuTTY.
|
|
|
|
* Joris van Rantwijk, Simon Tatham
|
1999-08-31 13:20:48 +04:00
|
|
|
*
|
2001-09-10 12:39:37 +04:00
|
|
|
* This is mainly based on ssh-1.2.26/scp.c by Timo Rinne & Tatu Ylonen.
|
|
|
|
* They, in turn, used stuff from BSD rcp.
|
|
|
|
*
|
|
|
|
* (SGT, 2001-09-10: Joris van Rantwijk assures me that although
|
|
|
|
* this file as originally submitted was inspired by, and
|
|
|
|
* _structurally_ based on, ssh-1.2.26's scp.c, there wasn't any
|
|
|
|
* actual code duplicated, so the above comment shouldn't give rise
|
|
|
|
* to licensing issues.)
|
1999-08-31 13:20:48 +04:00
|
|
|
*/
|
|
|
|
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <string.h>
|
2001-08-26 22:32:28 +04:00
|
|
|
#include <limits.h>
|
1999-08-31 13:20:48 +04:00
|
|
|
#include <time.h>
|
2001-01-26 12:33:12 +03:00
|
|
|
#include <assert.h>
|
1999-08-31 13:20:48 +04:00
|
|
|
|
|
|
|
#define PUTTY_DO_GLOBALS
|
|
|
|
#include "putty.h"
|
2003-08-25 17:53:41 +04:00
|
|
|
#include "psftp.h"
|
2001-08-26 22:32:28 +04:00
|
|
|
#include "ssh.h"
|
|
|
|
#include "sftp.h"
|
2000-10-06 17:21:36 +04:00
|
|
|
#include "storage.h"
|
2006-08-12 19:20:19 +04:00
|
|
|
#include "int64.h"
|
1999-08-31 13:20:48 +04:00
|
|
|
|
2001-05-13 15:15:16 +04:00
|
|
|
static int list = 0;
|
2000-06-22 16:18:34 +04:00
|
|
|
static int verbose = 0;
|
1999-08-31 13:20:48 +04:00
|
|
|
static int recursive = 0;
|
|
|
|
static int preserve = 0;
|
|
|
|
static int targetshouldbedirectory = 0;
|
|
|
|
static int statistics = 1;
|
2001-05-19 17:41:18 +04:00
|
|
|
static int prev_stats_len = 0;
|
2001-08-27 19:02:52 +04:00
|
|
|
static int scp_unsafe_mode = 0;
|
1999-08-31 13:20:48 +04:00
|
|
|
static int errs = 0;
|
2004-04-26 02:18:19 +04:00
|
|
|
static int try_scp = 1;
|
|
|
|
static int try_sftp = 1;
|
|
|
|
static int main_cmd_is_sftp = 0;
|
|
|
|
static int fallback_cmd_is_sftp = 0;
|
2001-08-26 22:32:28 +04:00
|
|
|
static int using_sftp = 0;
|
2013-08-13 10:46:51 +04:00
|
|
|
static int uploading = 0;
|
1999-08-31 13:20:48 +04:00
|
|
|
|
2002-10-26 14:33:59 +04:00
|
|
|
static Backend *back;
|
|
|
|
static void *backhandle;
|
Post-release destabilisation! Completely remove the struct type
'Config' in putty.h, which stores all PuTTY's settings and includes an
arbitrary length limit on every single one of those settings which is
stored in string form. In place of it is 'Conf', an opaque data type
everywhere outside the new file conf.c, which stores a list of (key,
value) pairs in which every key contains an integer identifying a
configuration setting, and for some of those integers the key also
contains extra parts (so that, for instance, CONF_environmt is a
string-to-string mapping). Everywhere that a Config was previously
used, a Conf is now; everywhere there was a Config structure copy,
conf_copy() is called; every lookup, adjustment, load and save
operation on a Config has been rewritten; and there's a mechanism for
serialising a Conf into a binary blob and back for use with Duplicate
Session.
User-visible effects of this change _should_ be minimal, though I
don't doubt I've introduced one or two bugs here and there which will
eventually be found. The _intended_ visible effects of this change are
that all arbitrary limits on configuration strings and lists (e.g.
limit on number of port forwardings) should now disappear; that list
boxes in the configuration will now be displayed in a sorted order
rather than the arbitrary order in which they were added to the list
(since the underlying data structure is now a sorted tree234 rather
than an ad-hoc comma-separated string); and one more specific change,
which is that local and dynamic port forwardings on the same port
number are now mutually exclusive in the configuration (putting 'D' in
the key rather than the value was a mistake in the first place).
One other reorganisation as a result of this is that I've moved all
the dialog.c standard handlers (dlg_stdeditbox_handler and friends)
out into config.c, because I can't really justify calling them generic
any more. When they took a pointer to an arbitrary structure type and
the offset of a field within that structure, they were independent of
whether that structure was a Config or something completely different,
but now they really do expect to talk to a Conf, which can _only_ be
used for PuTTY configuration, so I've renamed them all things like
conf_editbox_handler and moved them out of the nominally independent
dialog-box management module into the PuTTY-specific config.c.
[originally from svn r9214]
2011-07-14 22:52:21 +04:00
|
|
|
static Conf *conf;
|
2011-09-13 15:44:03 +04:00
|
|
|
int sent_eof = FALSE;
|
2002-10-26 14:33:59 +04:00
|
|
|
|
2015-05-15 13:15:42 +03:00
|
|
|
static void source(const char *src);
|
|
|
|
static void rsource(const char *src);
|
|
|
|
static void sink(const char *targ, const char *src);
|
1999-08-31 13:20:48 +04:00
|
|
|
|
2009-04-23 21:39:36 +04:00
|
|
|
const char *const appname = "PSCP";
|
|
|
|
|
2001-08-25 21:09:23 +04:00
|
|
|
/*
|
|
|
|
* The maximum amount of queued data we accept before we stop and
|
|
|
|
* wait for the server to process some.
|
|
|
|
*/
|
|
|
|
#define MAX_SCP_BUFSIZE 16384
|
|
|
|
|
Move echo/edit state change functionality out of ldisc_send.
I'm not actually sure why we've always had back ends notify ldisc of
changes to echo/edit settings by giving ldisc_send(ldisc,NULL,0,0) a
special meaning, instead of by having a separate dedicated notify
function with its own prototype and parameter set. Coverity's recent
observation that the two kinds of call don't even have the same
requirements on the ldisc (particularly, whether ldisc->term can be
NULL) makes me realise that it's really high time I separated the two
conceptually different operations into actually different functions.
While I'm here, I've renamed the confusing ldisc_update() function
which that special operation ends up feeding to, because it's not
actually a function applying to an ldisc - it applies to a front end.
So ldisc_send(ldisc,NULL,0,0) is now ldisc_echoedit_update(ldisc), and
that in turn figures out the current echo/edit settings before passing
them on to frontend_echoedit_update(). I think that should be clearer.
2014-11-22 19:12:47 +03:00
|
|
|
void ldisc_echoedit_update(void *handle) { }
|
2001-01-26 12:33:12 +03:00
|
|
|
|
2015-05-15 13:15:42 +03:00
|
|
|
static void tell_char(FILE *stream, char c)
|
2000-09-15 19:54:04 +04:00
|
|
|
{
|
2006-08-12 19:20:19 +04:00
|
|
|
fputc(c, stream);
|
2000-09-15 19:54:04 +04:00
|
|
|
}
|
|
|
|
|
2015-05-15 13:15:42 +03:00
|
|
|
static void tell_str(FILE *stream, const char *str)
|
2000-09-15 19:54:04 +04:00
|
|
|
{
|
|
|
|
unsigned int i;
|
|
|
|
|
2001-05-06 18:35:20 +04:00
|
|
|
for (i = 0; i < strlen(str); ++i)
|
2000-09-15 19:54:04 +04:00
|
|
|
tell_char(stream, str[i]);
|
|
|
|
}
|
|
|
|
|
2015-05-15 13:15:42 +03:00
|
|
|
static void tell_user(FILE *stream, const char *fmt, ...)
|
2000-09-15 19:54:04 +04:00
|
|
|
{
|
2002-11-07 22:49:03 +03:00
|
|
|
char *str, *str2;
|
2000-09-15 19:54:04 +04:00
|
|
|
va_list ap;
|
|
|
|
va_start(ap, fmt);
|
2002-11-07 22:49:03 +03:00
|
|
|
str = dupvprintf(fmt, ap);
|
2000-09-15 19:54:04 +04:00
|
|
|
va_end(ap);
|
2002-11-07 22:49:03 +03:00
|
|
|
str2 = dupcat(str, "\n", NULL);
|
|
|
|
sfree(str);
|
|
|
|
tell_str(stream, str2);
|
|
|
|
sfree(str2);
|
2000-09-15 19:54:04 +04:00
|
|
|
}
|
|
|
|
|
1999-08-31 13:20:48 +04:00
|
|
|
/*
|
|
|
|
* Print an error message and perform a fatal exit.
|
|
|
|
*/
|
2015-05-15 13:15:42 +03:00
|
|
|
void modalfatalbox(const char *fmt, ...)
|
2002-10-09 22:09:42 +04:00
|
|
|
{
|
2002-11-07 22:49:03 +03:00
|
|
|
char *str, *str2;
|
2002-10-09 22:09:42 +04:00
|
|
|
va_list ap;
|
|
|
|
va_start(ap, fmt);
|
2002-11-07 22:49:03 +03:00
|
|
|
str = dupvprintf(fmt, ap);
|
|
|
|
str2 = dupcat("Fatal: ", str, "\n", NULL);
|
|
|
|
sfree(str);
|
2002-10-09 22:09:42 +04:00
|
|
|
va_end(ap);
|
2002-11-07 22:49:03 +03:00
|
|
|
tell_str(stderr, str2);
|
|
|
|
sfree(str2);
|
2002-10-09 22:09:42 +04:00
|
|
|
errs++;
|
|
|
|
|
|
|
|
cleanup_exit(1);
|
|
|
|
}
|
2015-05-15 13:15:42 +03:00
|
|
|
void nonfatal(const char *fmt, ...)
|
2013-07-19 21:44:28 +04:00
|
|
|
{
|
|
|
|
char *str, *str2;
|
|
|
|
va_list ap;
|
|
|
|
va_start(ap, fmt);
|
|
|
|
str = dupvprintf(fmt, ap);
|
|
|
|
str2 = dupcat("Error: ", str, "\n", NULL);
|
|
|
|
sfree(str);
|
|
|
|
va_end(ap);
|
|
|
|
tell_str(stderr, str2);
|
|
|
|
sfree(str2);
|
|
|
|
errs++;
|
|
|
|
}
|
2015-05-15 13:15:42 +03:00
|
|
|
void connection_fatal(void *frontend, const char *fmt, ...)
|
2000-09-22 15:04:57 +04:00
|
|
|
{
|
2002-11-07 22:49:03 +03:00
|
|
|
char *str, *str2;
|
2000-09-22 15:04:57 +04:00
|
|
|
va_list ap;
|
|
|
|
va_start(ap, fmt);
|
2002-11-07 22:49:03 +03:00
|
|
|
str = dupvprintf(fmt, ap);
|
|
|
|
str2 = dupcat("Fatal: ", str, "\n", NULL);
|
|
|
|
sfree(str);
|
2000-09-22 15:04:57 +04:00
|
|
|
va_end(ap);
|
2002-11-07 22:49:03 +03:00
|
|
|
tell_str(stderr, str2);
|
|
|
|
sfree(str2);
|
2001-05-13 15:15:16 +04:00
|
|
|
errs++;
|
|
|
|
|
2002-03-06 23:13:22 +03:00
|
|
|
cleanup_exit(1);
|
2000-09-22 15:04:57 +04:00
|
|
|
}
|
1999-08-31 13:20:48 +04:00
|
|
|
|
2003-04-28 17:59:32 +04:00
|
|
|
/*
|
|
|
|
* In pscp, all agent requests should be synchronous, so this is a
|
|
|
|
* never-called stub.
|
|
|
|
*/
|
|
|
|
void agent_schedule_callback(void (*callback)(void *, void *, int),
|
|
|
|
void *callback_ctx, void *data, int len)
|
|
|
|
{
|
|
|
|
assert(!"We shouldn't be here");
|
|
|
|
}
|
|
|
|
|
2000-09-27 13:36:39 +04:00
|
|
|
/*
|
|
|
|
* Receive a block of data from the SSH link. Block until all data
|
|
|
|
* is available.
|
|
|
|
*
|
|
|
|
* To do this, we repeatedly call the SSH protocol module, with our
|
2000-10-20 17:51:46 +04:00
|
|
|
* own trap in from_backend() to catch the data that comes back. We
|
|
|
|
* do this until we have enough data.
|
2000-09-27 13:36:39 +04:00
|
|
|
*/
|
2000-10-23 14:32:37 +04:00
|
|
|
|
2001-05-06 18:35:20 +04:00
|
|
|
static unsigned char *outptr; /* where to put the data */
|
|
|
|
static unsigned outlen; /* how much data required */
|
2000-09-27 13:36:39 +04:00
|
|
|
static unsigned char *pending = NULL; /* any spare data */
|
2001-05-06 18:35:20 +04:00
|
|
|
static unsigned pendlen = 0, pendsize = 0; /* length and phys. size of buffer */
|
2018-05-26 10:31:34 +03:00
|
|
|
int from_backend(void *frontend, int is_stderr, const void *data, int datalen)
|
2001-05-06 18:35:20 +04:00
|
|
|
{
|
|
|
|
unsigned char *p = (unsigned char *) data;
|
|
|
|
unsigned len = (unsigned) datalen;
|
2000-10-20 17:51:46 +04:00
|
|
|
|
2000-09-27 13:36:39 +04:00
|
|
|
/*
|
2000-10-20 17:51:46 +04:00
|
|
|
* stderr data is just spouted to local stderr and otherwise
|
|
|
|
* ignored.
|
2000-09-27 13:36:39 +04:00
|
|
|
*/
|
2000-10-20 17:51:46 +04:00
|
|
|
if (is_stderr) {
|
2003-10-12 17:16:39 +04:00
|
|
|
if (len > 0)
|
2009-08-07 04:19:04 +04:00
|
|
|
if (fwrite(data, 1, len, stderr) < len)
|
|
|
|
/* oh well */;
|
2001-08-25 21:09:23 +04:00
|
|
|
return 0;
|
2000-10-20 17:51:46 +04:00
|
|
|
}
|
2000-09-27 13:36:39 +04:00
|
|
|
|
2003-10-12 17:16:39 +04:00
|
|
|
if ((outlen > 0) && (len > 0)) {
|
2001-05-06 18:35:20 +04:00
|
|
|
unsigned used = outlen;
|
|
|
|
if (used > len)
|
|
|
|
used = len;
|
|
|
|
memcpy(outptr, p, used);
|
|
|
|
outptr += used;
|
|
|
|
outlen -= used;
|
|
|
|
p += used;
|
|
|
|
len -= used;
|
2000-09-27 13:36:39 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
if (len > 0) {
|
2001-05-06 18:35:20 +04:00
|
|
|
if (pendsize < pendlen + len) {
|
|
|
|
pendsize = pendlen + len + 4096;
|
2003-03-29 19:14:26 +03:00
|
|
|
pending = sresize(pending, pendsize, unsigned char);
|
2001-05-06 18:35:20 +04:00
|
|
|
}
|
|
|
|
memcpy(pending + pendlen, p, len);
|
|
|
|
pendlen += len;
|
2000-09-27 13:36:39 +04:00
|
|
|
}
|
2001-08-25 21:09:23 +04:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
2018-05-26 10:31:34 +03:00
|
|
|
int from_backend_untrusted(void *frontend_handle, const void *data, int len)
|
2005-10-30 23:24:09 +03:00
|
|
|
{
|
|
|
|
/*
|
|
|
|
* No "untrusted" output should get here (the way the code is
|
|
|
|
* currently, it's all diverted by FLAG_STDERR).
|
|
|
|
*/
|
|
|
|
assert(!"Unexpected call to from_backend_untrusted()");
|
|
|
|
return 0; /* not reached */
|
|
|
|
}
|
2011-09-13 15:44:03 +04:00
|
|
|
int from_backend_eof(void *frontend)
|
|
|
|
{
|
|
|
|
/*
|
2013-08-13 10:46:51 +04:00
|
|
|
* We usually expect to be the party deciding when to close the
|
2011-09-13 15:44:03 +04:00
|
|
|
* connection, so if we see EOF before we sent it ourselves, we
|
2013-08-13 10:46:51 +04:00
|
|
|
* should panic. The exception is if we're using old-style scp and
|
|
|
|
* downloading rather than uploading.
|
2011-09-13 15:44:03 +04:00
|
|
|
*/
|
2013-08-13 10:46:51 +04:00
|
|
|
if ((using_sftp || uploading) && !sent_eof) {
|
2011-09-13 15:44:03 +04:00
|
|
|
connection_fatal(frontend,
|
|
|
|
"Received unexpected end-of-file from server");
|
|
|
|
}
|
|
|
|
return FALSE;
|
|
|
|
}
|
2018-05-26 10:31:34 +03:00
|
|
|
static int ssh_scp_recv(void *buf, int len)
|
2001-05-06 18:35:20 +04:00
|
|
|
{
|
2000-09-27 13:36:39 +04:00
|
|
|
outptr = buf;
|
|
|
|
outlen = len;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* See if the pending-input block contains some of what we
|
|
|
|
* need.
|
|
|
|
*/
|
|
|
|
if (pendlen > 0) {
|
2001-05-06 18:35:20 +04:00
|
|
|
unsigned pendused = pendlen;
|
|
|
|
if (pendused > outlen)
|
|
|
|
pendused = outlen;
|
2000-09-27 13:36:39 +04:00
|
|
|
memcpy(outptr, pending, pendused);
|
2001-05-06 18:35:20 +04:00
|
|
|
memmove(pending, pending + pendused, pendlen - pendused);
|
2000-09-27 13:36:39 +04:00
|
|
|
outptr += pendused;
|
|
|
|
outlen -= pendused;
|
2001-05-06 18:35:20 +04:00
|
|
|
pendlen -= pendused;
|
|
|
|
if (pendlen == 0) {
|
|
|
|
pendsize = 0;
|
|
|
|
sfree(pending);
|
|
|
|
pending = NULL;
|
|
|
|
}
|
|
|
|
if (outlen == 0)
|
|
|
|
return len;
|
2000-09-27 13:36:39 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
while (outlen > 0) {
|
2006-08-26 14:17:39 +04:00
|
|
|
if (back->exitcode(backhandle) >= 0 || ssh_sftp_loop_iteration() < 0)
|
2001-05-06 18:35:20 +04:00
|
|
|
return 0; /* doom */
|
2000-09-27 13:36:39 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
return len;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Loop through the ssh connection and authentication process.
|
|
|
|
*/
|
2001-05-06 18:35:20 +04:00
|
|
|
static void ssh_scp_init(void)
|
|
|
|
{
|
2002-10-25 15:30:33 +04:00
|
|
|
while (!back->sendok(backhandle)) {
|
2008-07-11 23:24:56 +04:00
|
|
|
if (back->exitcode(backhandle) >= 0) {
|
|
|
|
errs++;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (ssh_sftp_loop_iteration() < 0) {
|
|
|
|
errs++;
|
2001-05-06 18:35:20 +04:00
|
|
|
return; /* doom */
|
2008-07-11 23:24:56 +04:00
|
|
|
}
|
2000-09-27 13:36:39 +04:00
|
|
|
}
|
2004-04-26 02:18:19 +04:00
|
|
|
|
|
|
|
/* Work out which backend we ended up using. */
|
|
|
|
if (!ssh_fallback_cmd(backhandle))
|
|
|
|
using_sftp = main_cmd_is_sftp;
|
|
|
|
else
|
|
|
|
using_sftp = fallback_cmd_is_sftp;
|
|
|
|
|
2003-06-26 19:08:05 +04:00
|
|
|
if (verbose) {
|
|
|
|
if (using_sftp)
|
|
|
|
tell_user(stderr, "Using SFTP");
|
|
|
|
else
|
|
|
|
tell_user(stderr, "Using SCP1");
|
|
|
|
}
|
2000-09-27 13:36:39 +04:00
|
|
|
}
|
|
|
|
|
1999-08-31 13:20:48 +04:00
|
|
|
/*
|
|
|
|
* Print an error message and exit after closing the SSH link.
|
|
|
|
*/
|
2015-05-15 13:15:42 +03:00
|
|
|
static void bump(const char *fmt, ...)
|
1999-08-31 13:20:48 +04:00
|
|
|
{
|
2002-11-07 22:49:03 +03:00
|
|
|
char *str, *str2;
|
1999-11-08 14:22:45 +03:00
|
|
|
va_list ap;
|
|
|
|
va_start(ap, fmt);
|
2002-11-07 22:49:03 +03:00
|
|
|
str = dupvprintf(fmt, ap);
|
1999-11-08 14:22:45 +03:00
|
|
|
va_end(ap);
|
2002-11-07 22:49:03 +03:00
|
|
|
str2 = dupcat(str, "\n", NULL);
|
|
|
|
sfree(str);
|
|
|
|
tell_str(stderr, str2);
|
|
|
|
sfree(str2);
|
2001-05-13 15:15:16 +04:00
|
|
|
errs++;
|
2000-09-15 19:54:04 +04:00
|
|
|
|
2006-08-27 12:03:19 +04:00
|
|
|
if (back != NULL && back->connected(backhandle)) {
|
1999-11-08 14:22:45 +03:00
|
|
|
char ch;
|
2002-10-25 15:30:33 +04:00
|
|
|
back->special(backhandle, TS_EOF);
|
2011-09-13 15:44:03 +04:00
|
|
|
sent_eof = TRUE;
|
2018-05-26 10:31:34 +03:00
|
|
|
ssh_scp_recv(&ch, 1);
|
1999-11-08 14:22:45 +03:00
|
|
|
}
|
2001-05-13 15:15:16 +04:00
|
|
|
|
2002-03-06 23:13:22 +03:00
|
|
|
cleanup_exit(1);
|
1999-08-31 13:20:48 +04:00
|
|
|
}
|
|
|
|
|
Clean up handling of the return value from sftp_find_request. In many
places we simply enforce by assertion that it will match the request
we sent out a moment ago: in fact it can also return NULL, so it makes
more sense to report a proper error message if it doesn't return the
expected value, and while we're at it, have that error message
whatever message was helpfully left in fxp_error() by
sftp_find_request when it failed.
To do this, I've written a centralised function in psftp.c called
sftp_wait_for_reply, which is handed a request that's just been sent
out and deals with the mechanics of waiting for its reply, returning
the reply when it arrives, and aborting with a sensible error if
anything else arrives instead. The numerous sites in psftp.c which
called sftp_find_request have all been rewritten to do this instead,
and as a side effect they now look more sensible. The only other uses
of sftp_find_request were in xfer_*load_gotpkt, which had to be
tweaked in its own way.
While I'm here, also fix memory management in sftp_find_request, which
was freeing its input packet on some but not all error return paths.
[originally from svn r9894]
2013-07-07 00:43:21 +04:00
|
|
|
/*
|
|
|
|
* Wait for the reply to a single SFTP request. Parallels the same
|
|
|
|
* function in psftp.c (but isn't centralised into sftp.c because the
|
|
|
|
* latter module handles SFTP only and shouldn't assume that SFTP is
|
|
|
|
* the only thing going on by calling connection_fatal).
|
|
|
|
*/
|
|
|
|
struct sftp_packet *sftp_wait_for_reply(struct sftp_request *req)
|
|
|
|
{
|
|
|
|
struct sftp_packet *pktin;
|
|
|
|
struct sftp_request *rreq;
|
|
|
|
|
|
|
|
sftp_register(req);
|
|
|
|
pktin = sftp_recv();
|
|
|
|
if (pktin == NULL)
|
|
|
|
connection_fatal(NULL, "did not receive SFTP response packet "
|
|
|
|
"from server");
|
|
|
|
rreq = sftp_find_request(pktin);
|
|
|
|
if (rreq != req)
|
|
|
|
connection_fatal(NULL, "unable to understand SFTP response packet "
|
|
|
|
"from server: %s", fxp_error());
|
|
|
|
return pktin;
|
|
|
|
}
|
|
|
|
|
1999-08-31 13:20:48 +04:00
|
|
|
/*
|
|
|
|
* Open an SSH connection to user@host and execute cmd.
|
|
|
|
*/
|
|
|
|
static void do_cmd(char *host, char *user, char *cmd)
|
|
|
|
{
|
2003-05-04 18:18:18 +04:00
|
|
|
const char *err;
|
|
|
|
char *realhost;
|
2003-08-25 17:53:41 +04:00
|
|
|
void *logctx;
|
1999-11-08 14:22:45 +03:00
|
|
|
|
|
|
|
if (host == NULL || host[0] == '\0')
|
|
|
|
bump("Empty host name");
|
|
|
|
|
2004-12-30 19:45:11 +03:00
|
|
|
/*
|
2014-01-25 19:58:54 +04:00
|
|
|
* Remove a colon suffix.
|
2004-12-30 19:45:11 +03:00
|
|
|
*/
|
2014-01-25 19:58:54 +04:00
|
|
|
host[host_strcspn(host, ":")] = '\0';
|
2004-12-30 19:45:11 +03:00
|
|
|
|
2004-07-25 18:00:26 +04:00
|
|
|
/*
|
|
|
|
* If we haven't loaded session details already (e.g., from -load),
|
|
|
|
* try looking for a session called "host".
|
|
|
|
*/
|
|
|
|
if (!loaded_session) {
|
|
|
|
/* Try to load settings for `host' into a temporary config */
|
Post-release destabilisation! Completely remove the struct type
'Config' in putty.h, which stores all PuTTY's settings and includes an
arbitrary length limit on every single one of those settings which is
stored in string form. In place of it is 'Conf', an opaque data type
everywhere outside the new file conf.c, which stores a list of (key,
value) pairs in which every key contains an integer identifying a
configuration setting, and for some of those integers the key also
contains extra parts (so that, for instance, CONF_environmt is a
string-to-string mapping). Everywhere that a Config was previously
used, a Conf is now; everywhere there was a Config structure copy,
conf_copy() is called; every lookup, adjustment, load and save
operation on a Config has been rewritten; and there's a mechanism for
serialising a Conf into a binary blob and back for use with Duplicate
Session.
User-visible effects of this change _should_ be minimal, though I
don't doubt I've introduced one or two bugs here and there which will
eventually be found. The _intended_ visible effects of this change are
that all arbitrary limits on configuration strings and lists (e.g.
limit on number of port forwardings) should now disappear; that list
boxes in the configuration will now be displayed in a sorted order
rather than the arbitrary order in which they were added to the list
(since the underlying data structure is now a sorted tree234 rather
than an ad-hoc comma-separated string); and one more specific change,
which is that local and dynamic port forwardings on the same port
number are now mutually exclusive in the configuration (putting 'D' in
the key rather than the value was a mistake in the first place).
One other reorganisation as a result of this is that I've moved all
the dialog.c standard handlers (dlg_stdeditbox_handler and friends)
out into config.c, because I can't really justify calling them generic
any more. When they took a pointer to an arbitrary structure type and
the offset of a field within that structure, they were independent of
whether that structure was a Config or something completely different,
but now they really do expect to talk to a Conf, which can _only_ be
used for PuTTY configuration, so I've renamed them all things like
conf_editbox_handler and moved them out of the nominally independent
dialog-box management module into the PuTTY-specific config.c.
[originally from svn r9214]
2011-07-14 22:52:21 +04:00
|
|
|
Conf *conf2 = conf_new();
|
|
|
|
conf_set_str(conf2, CONF_host, "");
|
|
|
|
do_defaults(host, conf2);
|
|
|
|
if (conf_get_str(conf2, CONF_host)[0] != '\0') {
|
2004-07-25 18:00:26 +04:00
|
|
|
/* Settings present and include hostname */
|
|
|
|
/* Re-load data into the real config. */
|
Post-release destabilisation! Completely remove the struct type
'Config' in putty.h, which stores all PuTTY's settings and includes an
arbitrary length limit on every single one of those settings which is
stored in string form. In place of it is 'Conf', an opaque data type
everywhere outside the new file conf.c, which stores a list of (key,
value) pairs in which every key contains an integer identifying a
configuration setting, and for some of those integers the key also
contains extra parts (so that, for instance, CONF_environmt is a
string-to-string mapping). Everywhere that a Config was previously
used, a Conf is now; everywhere there was a Config structure copy,
conf_copy() is called; every lookup, adjustment, load and save
operation on a Config has been rewritten; and there's a mechanism for
serialising a Conf into a binary blob and back for use with Duplicate
Session.
User-visible effects of this change _should_ be minimal, though I
don't doubt I've introduced one or two bugs here and there which will
eventually be found. The _intended_ visible effects of this change are
that all arbitrary limits on configuration strings and lists (e.g.
limit on number of port forwardings) should now disappear; that list
boxes in the configuration will now be displayed in a sorted order
rather than the arbitrary order in which they were added to the list
(since the underlying data structure is now a sorted tree234 rather
than an ad-hoc comma-separated string); and one more specific change,
which is that local and dynamic port forwardings on the same port
number are now mutually exclusive in the configuration (putting 'D' in
the key rather than the value was a mistake in the first place).
One other reorganisation as a result of this is that I've moved all
the dialog.c standard handlers (dlg_stdeditbox_handler and friends)
out into config.c, because I can't really justify calling them generic
any more. When they took a pointer to an arbitrary structure type and
the offset of a field within that structure, they were independent of
whether that structure was a Config or something completely different,
but now they really do expect to talk to a Conf, which can _only_ be
used for PuTTY configuration, so I've renamed them all things like
conf_editbox_handler and moved them out of the nominally independent
dialog-box management module into the PuTTY-specific config.c.
[originally from svn r9214]
2011-07-14 22:52:21 +04:00
|
|
|
do_defaults(host, conf);
|
2004-07-25 18:00:26 +04:00
|
|
|
} else {
|
|
|
|
/* Session doesn't exist or mention a hostname. */
|
|
|
|
/* Use `host' as a bare hostname. */
|
Post-release destabilisation! Completely remove the struct type
'Config' in putty.h, which stores all PuTTY's settings and includes an
arbitrary length limit on every single one of those settings which is
stored in string form. In place of it is 'Conf', an opaque data type
everywhere outside the new file conf.c, which stores a list of (key,
value) pairs in which every key contains an integer identifying a
configuration setting, and for some of those integers the key also
contains extra parts (so that, for instance, CONF_environmt is a
string-to-string mapping). Everywhere that a Config was previously
used, a Conf is now; everywhere there was a Config structure copy,
conf_copy() is called; every lookup, adjustment, load and save
operation on a Config has been rewritten; and there's a mechanism for
serialising a Conf into a binary blob and back for use with Duplicate
Session.
User-visible effects of this change _should_ be minimal, though I
don't doubt I've introduced one or two bugs here and there which will
eventually be found. The _intended_ visible effects of this change are
that all arbitrary limits on configuration strings and lists (e.g.
limit on number of port forwardings) should now disappear; that list
boxes in the configuration will now be displayed in a sorted order
rather than the arbitrary order in which they were added to the list
(since the underlying data structure is now a sorted tree234 rather
than an ad-hoc comma-separated string); and one more specific change,
which is that local and dynamic port forwardings on the same port
number are now mutually exclusive in the configuration (putting 'D' in
the key rather than the value was a mistake in the first place).
One other reorganisation as a result of this is that I've moved all
the dialog.c standard handlers (dlg_stdeditbox_handler and friends)
out into config.c, because I can't really justify calling them generic
any more. When they took a pointer to an arbitrary structure type and
the offset of a field within that structure, they were independent of
whether that structure was a Config or something completely different,
but now they really do expect to talk to a Conf, which can _only_ be
used for PuTTY configuration, so I've renamed them all things like
conf_editbox_handler and moved them out of the nominally independent
dialog-box management module into the PuTTY-specific config.c.
[originally from svn r9214]
2011-07-14 22:52:21 +04:00
|
|
|
conf_set_str(conf, CONF_host, host);
|
2004-07-25 18:00:26 +04:00
|
|
|
}
|
2017-02-14 23:42:26 +03:00
|
|
|
conf_free(conf2);
|
2004-07-25 18:00:26 +04:00
|
|
|
} else {
|
|
|
|
/* Patch in hostname `host' to session details. */
|
Post-release destabilisation! Completely remove the struct type
'Config' in putty.h, which stores all PuTTY's settings and includes an
arbitrary length limit on every single one of those settings which is
stored in string form. In place of it is 'Conf', an opaque data type
everywhere outside the new file conf.c, which stores a list of (key,
value) pairs in which every key contains an integer identifying a
configuration setting, and for some of those integers the key also
contains extra parts (so that, for instance, CONF_environmt is a
string-to-string mapping). Everywhere that a Config was previously
used, a Conf is now; everywhere there was a Config structure copy,
conf_copy() is called; every lookup, adjustment, load and save
operation on a Config has been rewritten; and there's a mechanism for
serialising a Conf into a binary blob and back for use with Duplicate
Session.
User-visible effects of this change _should_ be minimal, though I
don't doubt I've introduced one or two bugs here and there which will
eventually be found. The _intended_ visible effects of this change are
that all arbitrary limits on configuration strings and lists (e.g.
limit on number of port forwardings) should now disappear; that list
boxes in the configuration will now be displayed in a sorted order
rather than the arbitrary order in which they were added to the list
(since the underlying data structure is now a sorted tree234 rather
than an ad-hoc comma-separated string); and one more specific change,
which is that local and dynamic port forwardings on the same port
number are now mutually exclusive in the configuration (putting 'D' in
the key rather than the value was a mistake in the first place).
One other reorganisation as a result of this is that I've moved all
the dialog.c standard handlers (dlg_stdeditbox_handler and friends)
out into config.c, because I can't really justify calling them generic
any more. When they took a pointer to an arbitrary structure type and
the offset of a field within that structure, they were independent of
whether that structure was a Config or something completely different,
but now they really do expect to talk to a Conf, which can _only_ be
used for PuTTY configuration, so I've renamed them all things like
conf_editbox_handler and moved them out of the nominally independent
dialog-box management module into the PuTTY-specific config.c.
[originally from svn r9214]
2011-07-14 22:52:21 +04:00
|
|
|
conf_set_str(conf, CONF_host, host);
|
2002-10-07 20:52:55 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Force use of SSH. (If they got the protocol wrong we assume the
|
|
|
|
* port is useless too.)
|
|
|
|
*/
|
Post-release destabilisation! Completely remove the struct type
'Config' in putty.h, which stores all PuTTY's settings and includes an
arbitrary length limit on every single one of those settings which is
stored in string form. In place of it is 'Conf', an opaque data type
everywhere outside the new file conf.c, which stores a list of (key,
value) pairs in which every key contains an integer identifying a
configuration setting, and for some of those integers the key also
contains extra parts (so that, for instance, CONF_environmt is a
string-to-string mapping). Everywhere that a Config was previously
used, a Conf is now; everywhere there was a Config structure copy,
conf_copy() is called; every lookup, adjustment, load and save
operation on a Config has been rewritten; and there's a mechanism for
serialising a Conf into a binary blob and back for use with Duplicate
Session.
User-visible effects of this change _should_ be minimal, though I
don't doubt I've introduced one or two bugs here and there which will
eventually be found. The _intended_ visible effects of this change are
that all arbitrary limits on configuration strings and lists (e.g.
limit on number of port forwardings) should now disappear; that list
boxes in the configuration will now be displayed in a sorted order
rather than the arbitrary order in which they were added to the list
(since the underlying data structure is now a sorted tree234 rather
than an ad-hoc comma-separated string); and one more specific change,
which is that local and dynamic port forwardings on the same port
number are now mutually exclusive in the configuration (putting 'D' in
the key rather than the value was a mistake in the first place).
One other reorganisation as a result of this is that I've moved all
the dialog.c standard handlers (dlg_stdeditbox_handler and friends)
out into config.c, because I can't really justify calling them generic
any more. When they took a pointer to an arbitrary structure type and
the offset of a field within that structure, they were independent of
whether that structure was a Config or something completely different,
but now they really do expect to talk to a Conf, which can _only_ be
used for PuTTY configuration, so I've renamed them all things like
conf_editbox_handler and moved them out of the nominally independent
dialog-box management module into the PuTTY-specific config.c.
[originally from svn r9214]
2011-07-14 22:52:21 +04:00
|
|
|
if (conf_get_int(conf, CONF_protocol) != PROT_SSH) {
|
|
|
|
conf_set_int(conf, CONF_protocol, PROT_SSH);
|
|
|
|
conf_set_int(conf, CONF_port, 22);
|
1999-11-08 14:22:45 +03:00
|
|
|
}
|
|
|
|
|
2002-08-05 01:18:56 +04:00
|
|
|
/*
|
|
|
|
* Enact command-line overrides.
|
|
|
|
*/
|
Post-release destabilisation! Completely remove the struct type
'Config' in putty.h, which stores all PuTTY's settings and includes an
arbitrary length limit on every single one of those settings which is
stored in string form. In place of it is 'Conf', an opaque data type
everywhere outside the new file conf.c, which stores a list of (key,
value) pairs in which every key contains an integer identifying a
configuration setting, and for some of those integers the key also
contains extra parts (so that, for instance, CONF_environmt is a
string-to-string mapping). Everywhere that a Config was previously
used, a Conf is now; everywhere there was a Config structure copy,
conf_copy() is called; every lookup, adjustment, load and save
operation on a Config has been rewritten; and there's a mechanism for
serialising a Conf into a binary blob and back for use with Duplicate
Session.
User-visible effects of this change _should_ be minimal, though I
don't doubt I've introduced one or two bugs here and there which will
eventually be found. The _intended_ visible effects of this change are
that all arbitrary limits on configuration strings and lists (e.g.
limit on number of port forwardings) should now disappear; that list
boxes in the configuration will now be displayed in a sorted order
rather than the arbitrary order in which they were added to the list
(since the underlying data structure is now a sorted tree234 rather
than an ad-hoc comma-separated string); and one more specific change,
which is that local and dynamic port forwardings on the same port
number are now mutually exclusive in the configuration (putting 'D' in
the key rather than the value was a mistake in the first place).
One other reorganisation as a result of this is that I've moved all
the dialog.c standard handlers (dlg_stdeditbox_handler and friends)
out into config.c, because I can't really justify calling them generic
any more. When they took a pointer to an arbitrary structure type and
the offset of a field within that structure, they were independent of
whether that structure was a Config or something completely different,
but now they really do expect to talk to a Conf, which can _only_ be
used for PuTTY configuration, so I've renamed them all things like
conf_editbox_handler and moved them out of the nominally independent
dialog-box management module into the PuTTY-specific config.c.
[originally from svn r9214]
2011-07-14 22:52:21 +04:00
|
|
|
cmdline_run_saved(conf);
|
2002-08-05 01:18:56 +04:00
|
|
|
|
2001-10-31 00:45:27 +03:00
|
|
|
/*
|
Post-release destabilisation! Completely remove the struct type
'Config' in putty.h, which stores all PuTTY's settings and includes an
arbitrary length limit on every single one of those settings which is
stored in string form. In place of it is 'Conf', an opaque data type
everywhere outside the new file conf.c, which stores a list of (key,
value) pairs in which every key contains an integer identifying a
configuration setting, and for some of those integers the key also
contains extra parts (so that, for instance, CONF_environmt is a
string-to-string mapping). Everywhere that a Config was previously
used, a Conf is now; everywhere there was a Config structure copy,
conf_copy() is called; every lookup, adjustment, load and save
operation on a Config has been rewritten; and there's a mechanism for
serialising a Conf into a binary blob and back for use with Duplicate
Session.
User-visible effects of this change _should_ be minimal, though I
don't doubt I've introduced one or two bugs here and there which will
eventually be found. The _intended_ visible effects of this change are
that all arbitrary limits on configuration strings and lists (e.g.
limit on number of port forwardings) should now disappear; that list
boxes in the configuration will now be displayed in a sorted order
rather than the arbitrary order in which they were added to the list
(since the underlying data structure is now a sorted tree234 rather
than an ad-hoc comma-separated string); and one more specific change,
which is that local and dynamic port forwardings on the same port
number are now mutually exclusive in the configuration (putting 'D' in
the key rather than the value was a mistake in the first place).
One other reorganisation as a result of this is that I've moved all
the dialog.c standard handlers (dlg_stdeditbox_handler and friends)
out into config.c, because I can't really justify calling them generic
any more. When they took a pointer to an arbitrary structure type and
the offset of a field within that structure, they were independent of
whether that structure was a Config or something completely different,
but now they really do expect to talk to a Conf, which can _only_ be
used for PuTTY configuration, so I've renamed them all things like
conf_editbox_handler and moved them out of the nominally independent
dialog-box management module into the PuTTY-specific config.c.
[originally from svn r9214]
2011-07-14 22:52:21 +04:00
|
|
|
* Muck about with the hostname in various ways.
|
2001-10-31 00:45:27 +03:00
|
|
|
*/
|
|
|
|
{
|
Post-release destabilisation! Completely remove the struct type
'Config' in putty.h, which stores all PuTTY's settings and includes an
arbitrary length limit on every single one of those settings which is
stored in string form. In place of it is 'Conf', an opaque data type
everywhere outside the new file conf.c, which stores a list of (key,
value) pairs in which every key contains an integer identifying a
configuration setting, and for some of those integers the key also
contains extra parts (so that, for instance, CONF_environmt is a
string-to-string mapping). Everywhere that a Config was previously
used, a Conf is now; everywhere there was a Config structure copy,
conf_copy() is called; every lookup, adjustment, load and save
operation on a Config has been rewritten; and there's a mechanism for
serialising a Conf into a binary blob and back for use with Duplicate
Session.
User-visible effects of this change _should_ be minimal, though I
don't doubt I've introduced one or two bugs here and there which will
eventually be found. The _intended_ visible effects of this change are
that all arbitrary limits on configuration strings and lists (e.g.
limit on number of port forwardings) should now disappear; that list
boxes in the configuration will now be displayed in a sorted order
rather than the arbitrary order in which they were added to the list
(since the underlying data structure is now a sorted tree234 rather
than an ad-hoc comma-separated string); and one more specific change,
which is that local and dynamic port forwardings on the same port
number are now mutually exclusive in the configuration (putting 'D' in
the key rather than the value was a mistake in the first place).
One other reorganisation as a result of this is that I've moved all
the dialog.c standard handlers (dlg_stdeditbox_handler and friends)
out into config.c, because I can't really justify calling them generic
any more. When they took a pointer to an arbitrary structure type and
the offset of a field within that structure, they were independent of
whether that structure was a Config or something completely different,
but now they really do expect to talk to a Conf, which can _only_ be
used for PuTTY configuration, so I've renamed them all things like
conf_editbox_handler and moved them out of the nominally independent
dialog-box management module into the PuTTY-specific config.c.
[originally from svn r9214]
2011-07-14 22:52:21 +04:00
|
|
|
char *hostbuf = dupstr(conf_get_str(conf, CONF_host));
|
|
|
|
char *host = hostbuf;
|
|
|
|
char *p, *q;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Trim leading whitespace.
|
|
|
|
*/
|
|
|
|
host += strspn(host, " \t");
|
2001-10-31 00:45:27 +03:00
|
|
|
|
Post-release destabilisation! Completely remove the struct type
'Config' in putty.h, which stores all PuTTY's settings and includes an
arbitrary length limit on every single one of those settings which is
stored in string form. In place of it is 'Conf', an opaque data type
everywhere outside the new file conf.c, which stores a list of (key,
value) pairs in which every key contains an integer identifying a
configuration setting, and for some of those integers the key also
contains extra parts (so that, for instance, CONF_environmt is a
string-to-string mapping). Everywhere that a Config was previously
used, a Conf is now; everywhere there was a Config structure copy,
conf_copy() is called; every lookup, adjustment, load and save
operation on a Config has been rewritten; and there's a mechanism for
serialising a Conf into a binary blob and back for use with Duplicate
Session.
User-visible effects of this change _should_ be minimal, though I
don't doubt I've introduced one or two bugs here and there which will
eventually be found. The _intended_ visible effects of this change are
that all arbitrary limits on configuration strings and lists (e.g.
limit on number of port forwardings) should now disappear; that list
boxes in the configuration will now be displayed in a sorted order
rather than the arbitrary order in which they were added to the list
(since the underlying data structure is now a sorted tree234 rather
than an ad-hoc comma-separated string); and one more specific change,
which is that local and dynamic port forwardings on the same port
number are now mutually exclusive in the configuration (putting 'D' in
the key rather than the value was a mistake in the first place).
One other reorganisation as a result of this is that I've moved all
the dialog.c standard handlers (dlg_stdeditbox_handler and friends)
out into config.c, because I can't really justify calling them generic
any more. When they took a pointer to an arbitrary structure type and
the offset of a field within that structure, they were independent of
whether that structure was a Config or something completely different,
but now they really do expect to talk to a Conf, which can _only_ be
used for PuTTY configuration, so I've renamed them all things like
conf_editbox_handler and moved them out of the nominally independent
dialog-box management module into the PuTTY-specific config.c.
[originally from svn r9214]
2011-07-14 22:52:21 +04:00
|
|
|
/*
|
|
|
|
* See if host is of the form user@host, and separate out
|
|
|
|
* the username if so.
|
|
|
|
*/
|
|
|
|
if (host[0] != '\0') {
|
|
|
|
char *atsign = strrchr(host, '@');
|
|
|
|
if (atsign) {
|
|
|
|
*atsign = '\0';
|
|
|
|
conf_set_str(conf, CONF_username, host);
|
|
|
|
host = atsign + 1;
|
2001-10-31 00:45:27 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
Post-release destabilisation! Completely remove the struct type
'Config' in putty.h, which stores all PuTTY's settings and includes an
arbitrary length limit on every single one of those settings which is
stored in string form. In place of it is 'Conf', an opaque data type
everywhere outside the new file conf.c, which stores a list of (key,
value) pairs in which every key contains an integer identifying a
configuration setting, and for some of those integers the key also
contains extra parts (so that, for instance, CONF_environmt is a
string-to-string mapping). Everywhere that a Config was previously
used, a Conf is now; everywhere there was a Config structure copy,
conf_copy() is called; every lookup, adjustment, load and save
operation on a Config has been rewritten; and there's a mechanism for
serialising a Conf into a binary blob and back for use with Duplicate
Session.
User-visible effects of this change _should_ be minimal, though I
don't doubt I've introduced one or two bugs here and there which will
eventually be found. The _intended_ visible effects of this change are
that all arbitrary limits on configuration strings and lists (e.g.
limit on number of port forwardings) should now disappear; that list
boxes in the configuration will now be displayed in a sorted order
rather than the arbitrary order in which they were added to the list
(since the underlying data structure is now a sorted tree234 rather
than an ad-hoc comma-separated string); and one more specific change,
which is that local and dynamic port forwardings on the same port
number are now mutually exclusive in the configuration (putting 'D' in
the key rather than the value was a mistake in the first place).
One other reorganisation as a result of this is that I've moved all
the dialog.c standard handlers (dlg_stdeditbox_handler and friends)
out into config.c, because I can't really justify calling them generic
any more. When they took a pointer to an arbitrary structure type and
the offset of a field within that structure, they were independent of
whether that structure was a Config or something completely different,
but now they really do expect to talk to a Conf, which can _only_ be
used for PuTTY configuration, so I've renamed them all things like
conf_editbox_handler and moved them out of the nominally independent
dialog-box management module into the PuTTY-specific config.c.
[originally from svn r9214]
2011-07-14 22:52:21 +04:00
|
|
|
/*
|
|
|
|
* Remove any remaining whitespace.
|
|
|
|
*/
|
|
|
|
p = hostbuf;
|
|
|
|
q = host;
|
|
|
|
while (*q) {
|
|
|
|
if (*q != ' ' && *q != '\t')
|
|
|
|
*p++ = *q;
|
|
|
|
q++;
|
2002-10-16 15:35:13 +04:00
|
|
|
}
|
Post-release destabilisation! Completely remove the struct type
'Config' in putty.h, which stores all PuTTY's settings and includes an
arbitrary length limit on every single one of those settings which is
stored in string form. In place of it is 'Conf', an opaque data type
everywhere outside the new file conf.c, which stores a list of (key,
value) pairs in which every key contains an integer identifying a
configuration setting, and for some of those integers the key also
contains extra parts (so that, for instance, CONF_environmt is a
string-to-string mapping). Everywhere that a Config was previously
used, a Conf is now; everywhere there was a Config structure copy,
conf_copy() is called; every lookup, adjustment, load and save
operation on a Config has been rewritten; and there's a mechanism for
serialising a Conf into a binary blob and back for use with Duplicate
Session.
User-visible effects of this change _should_ be minimal, though I
don't doubt I've introduced one or two bugs here and there which will
eventually be found. The _intended_ visible effects of this change are
that all arbitrary limits on configuration strings and lists (e.g.
limit on number of port forwardings) should now disappear; that list
boxes in the configuration will now be displayed in a sorted order
rather than the arbitrary order in which they were added to the list
(since the underlying data structure is now a sorted tree234 rather
than an ad-hoc comma-separated string); and one more specific change,
which is that local and dynamic port forwardings on the same port
number are now mutually exclusive in the configuration (putting 'D' in
the key rather than the value was a mistake in the first place).
One other reorganisation as a result of this is that I've moved all
the dialog.c standard handlers (dlg_stdeditbox_handler and friends)
out into config.c, because I can't really justify calling them generic
any more. When they took a pointer to an arbitrary structure type and
the offset of a field within that structure, they were independent of
whether that structure was a Config or something completely different,
but now they really do expect to talk to a Conf, which can _only_ be
used for PuTTY configuration, so I've renamed them all things like
conf_editbox_handler and moved them out of the nominally independent
dialog-box management module into the PuTTY-specific config.c.
[originally from svn r9214]
2011-07-14 22:52:21 +04:00
|
|
|
*p = '\0';
|
|
|
|
|
|
|
|
conf_set_str(conf, CONF_host, hostbuf);
|
|
|
|
sfree(hostbuf);
|
2002-10-16 15:35:13 +04:00
|
|
|
}
|
|
|
|
|
1999-11-08 14:22:45 +03:00
|
|
|
/* Set username */
|
|
|
|
if (user != NULL && user[0] != '\0') {
|
Post-release destabilisation! Completely remove the struct type
'Config' in putty.h, which stores all PuTTY's settings and includes an
arbitrary length limit on every single one of those settings which is
stored in string form. In place of it is 'Conf', an opaque data type
everywhere outside the new file conf.c, which stores a list of (key,
value) pairs in which every key contains an integer identifying a
configuration setting, and for some of those integers the key also
contains extra parts (so that, for instance, CONF_environmt is a
string-to-string mapping). Everywhere that a Config was previously
used, a Conf is now; everywhere there was a Config structure copy,
conf_copy() is called; every lookup, adjustment, load and save
operation on a Config has been rewritten; and there's a mechanism for
serialising a Conf into a binary blob and back for use with Duplicate
Session.
User-visible effects of this change _should_ be minimal, though I
don't doubt I've introduced one or two bugs here and there which will
eventually be found. The _intended_ visible effects of this change are
that all arbitrary limits on configuration strings and lists (e.g.
limit on number of port forwardings) should now disappear; that list
boxes in the configuration will now be displayed in a sorted order
rather than the arbitrary order in which they were added to the list
(since the underlying data structure is now a sorted tree234 rather
than an ad-hoc comma-separated string); and one more specific change,
which is that local and dynamic port forwardings on the same port
number are now mutually exclusive in the configuration (putting 'D' in
the key rather than the value was a mistake in the first place).
One other reorganisation as a result of this is that I've moved all
the dialog.c standard handlers (dlg_stdeditbox_handler and friends)
out into config.c, because I can't really justify calling them generic
any more. When they took a pointer to an arbitrary structure type and
the offset of a field within that structure, they were independent of
whether that structure was a Config or something completely different,
but now they really do expect to talk to a Conf, which can _only_ be
used for PuTTY configuration, so I've renamed them all things like
conf_editbox_handler and moved them out of the nominally independent
dialog-box management module into the PuTTY-specific config.c.
[originally from svn r9214]
2011-07-14 22:52:21 +04:00
|
|
|
conf_set_str(conf, CONF_username, user);
|
|
|
|
} else if (conf_get_str(conf, CONF_username)[0] == '\0') {
|
2003-08-25 17:53:41 +04:00
|
|
|
user = get_username();
|
|
|
|
if (!user)
|
2001-01-07 16:31:49 +03:00
|
|
|
bump("Empty user name");
|
2003-08-25 17:53:41 +04:00
|
|
|
else {
|
|
|
|
if (verbose)
|
|
|
|
tell_user(stderr, "Guessing user name: %s", user);
|
Post-release destabilisation! Completely remove the struct type
'Config' in putty.h, which stores all PuTTY's settings and includes an
arbitrary length limit on every single one of those settings which is
stored in string form. In place of it is 'Conf', an opaque data type
everywhere outside the new file conf.c, which stores a list of (key,
value) pairs in which every key contains an integer identifying a
configuration setting, and for some of those integers the key also
contains extra parts (so that, for instance, CONF_environmt is a
string-to-string mapping). Everywhere that a Config was previously
used, a Conf is now; everywhere there was a Config structure copy,
conf_copy() is called; every lookup, adjustment, load and save
operation on a Config has been rewritten; and there's a mechanism for
serialising a Conf into a binary blob and back for use with Duplicate
Session.
User-visible effects of this change _should_ be minimal, though I
don't doubt I've introduced one or two bugs here and there which will
eventually be found. The _intended_ visible effects of this change are
that all arbitrary limits on configuration strings and lists (e.g.
limit on number of port forwardings) should now disappear; that list
boxes in the configuration will now be displayed in a sorted order
rather than the arbitrary order in which they were added to the list
(since the underlying data structure is now a sorted tree234 rather
than an ad-hoc comma-separated string); and one more specific change,
which is that local and dynamic port forwardings on the same port
number are now mutually exclusive in the configuration (putting 'D' in
the key rather than the value was a mistake in the first place).
One other reorganisation as a result of this is that I've moved all
the dialog.c standard handlers (dlg_stdeditbox_handler and friends)
out into config.c, because I can't really justify calling them generic
any more. When they took a pointer to an arbitrary structure type and
the offset of a field within that structure, they were independent of
whether that structure was a Config or something completely different,
but now they really do expect to talk to a Conf, which can _only_ be
used for PuTTY configuration, so I've renamed them all things like
conf_editbox_handler and moved them out of the nominally independent
dialog-box management module into the PuTTY-specific config.c.
[originally from svn r9214]
2011-07-14 22:52:21 +04:00
|
|
|
conf_set_str(conf, CONF_username, user);
|
2003-08-25 17:53:41 +04:00
|
|
|
sfree(user);
|
|
|
|
}
|
1999-11-08 14:22:45 +03:00
|
|
|
}
|
|
|
|
|
2001-09-13 00:11:48 +04:00
|
|
|
/*
|
|
|
|
* Disable scary things which shouldn't be enabled for simple
|
|
|
|
* things like SCP and SFTP: agent forwarding, port forwarding,
|
|
|
|
* X forwarding.
|
|
|
|
*/
|
Post-release destabilisation! Completely remove the struct type
'Config' in putty.h, which stores all PuTTY's settings and includes an
arbitrary length limit on every single one of those settings which is
stored in string form. In place of it is 'Conf', an opaque data type
everywhere outside the new file conf.c, which stores a list of (key,
value) pairs in which every key contains an integer identifying a
configuration setting, and for some of those integers the key also
contains extra parts (so that, for instance, CONF_environmt is a
string-to-string mapping). Everywhere that a Config was previously
used, a Conf is now; everywhere there was a Config structure copy,
conf_copy() is called; every lookup, adjustment, load and save
operation on a Config has been rewritten; and there's a mechanism for
serialising a Conf into a binary blob and back for use with Duplicate
Session.
User-visible effects of this change _should_ be minimal, though I
don't doubt I've introduced one or two bugs here and there which will
eventually be found. The _intended_ visible effects of this change are
that all arbitrary limits on configuration strings and lists (e.g.
limit on number of port forwardings) should now disappear; that list
boxes in the configuration will now be displayed in a sorted order
rather than the arbitrary order in which they were added to the list
(since the underlying data structure is now a sorted tree234 rather
than an ad-hoc comma-separated string); and one more specific change,
which is that local and dynamic port forwardings on the same port
number are now mutually exclusive in the configuration (putting 'D' in
the key rather than the value was a mistake in the first place).
One other reorganisation as a result of this is that I've moved all
the dialog.c standard handlers (dlg_stdeditbox_handler and friends)
out into config.c, because I can't really justify calling them generic
any more. When they took a pointer to an arbitrary structure type and
the offset of a field within that structure, they were independent of
whether that structure was a Config or something completely different,
but now they really do expect to talk to a Conf, which can _only_ be
used for PuTTY configuration, so I've renamed them all things like
conf_editbox_handler and moved them out of the nominally independent
dialog-box management module into the PuTTY-specific config.c.
[originally from svn r9214]
2011-07-14 22:52:21 +04:00
|
|
|
conf_set_int(conf, CONF_x11_forward, 0);
|
|
|
|
conf_set_int(conf, CONF_agentfwd, 0);
|
|
|
|
conf_set_int(conf, CONF_ssh_simple, TRUE);
|
|
|
|
{
|
|
|
|
char *key;
|
|
|
|
while ((key = conf_get_str_nthstrkey(conf, CONF_portfwd, 0)) != NULL)
|
|
|
|
conf_del_str_str(conf, CONF_portfwd, key);
|
|
|
|
}
|
2001-09-13 00:11:48 +04:00
|
|
|
|
2001-08-26 22:32:28 +04:00
|
|
|
/*
|
2004-04-26 02:18:19 +04:00
|
|
|
* Set up main and possibly fallback command depending on
|
|
|
|
* options specified by user.
|
2001-08-26 22:32:28 +04:00
|
|
|
* Attempt to start the SFTP subsystem as a first choice,
|
|
|
|
* falling back to the provided scp command if that fails.
|
|
|
|
*/
|
Post-release destabilisation! Completely remove the struct type
'Config' in putty.h, which stores all PuTTY's settings and includes an
arbitrary length limit on every single one of those settings which is
stored in string form. In place of it is 'Conf', an opaque data type
everywhere outside the new file conf.c, which stores a list of (key,
value) pairs in which every key contains an integer identifying a
configuration setting, and for some of those integers the key also
contains extra parts (so that, for instance, CONF_environmt is a
string-to-string mapping). Everywhere that a Config was previously
used, a Conf is now; everywhere there was a Config structure copy,
conf_copy() is called; every lookup, adjustment, load and save
operation on a Config has been rewritten; and there's a mechanism for
serialising a Conf into a binary blob and back for use with Duplicate
Session.
User-visible effects of this change _should_ be minimal, though I
don't doubt I've introduced one or two bugs here and there which will
eventually be found. The _intended_ visible effects of this change are
that all arbitrary limits on configuration strings and lists (e.g.
limit on number of port forwardings) should now disappear; that list
boxes in the configuration will now be displayed in a sorted order
rather than the arbitrary order in which they were added to the list
(since the underlying data structure is now a sorted tree234 rather
than an ad-hoc comma-separated string); and one more specific change,
which is that local and dynamic port forwardings on the same port
number are now mutually exclusive in the configuration (putting 'D' in
the key rather than the value was a mistake in the first place).
One other reorganisation as a result of this is that I've moved all
the dialog.c standard handlers (dlg_stdeditbox_handler and friends)
out into config.c, because I can't really justify calling them generic
any more. When they took a pointer to an arbitrary structure type and
the offset of a field within that structure, they were independent of
whether that structure was a Config or something completely different,
but now they really do expect to talk to a Conf, which can _only_ be
used for PuTTY configuration, so I've renamed them all things like
conf_editbox_handler and moved them out of the nominally independent
dialog-box management module into the PuTTY-specific config.c.
[originally from svn r9214]
2011-07-14 22:52:21 +04:00
|
|
|
conf_set_str(conf, CONF_remote_cmd2, "");
|
2004-04-26 02:18:19 +04:00
|
|
|
if (try_sftp) {
|
|
|
|
/* First choice is SFTP subsystem. */
|
|
|
|
main_cmd_is_sftp = 1;
|
Post-release destabilisation! Completely remove the struct type
'Config' in putty.h, which stores all PuTTY's settings and includes an
arbitrary length limit on every single one of those settings which is
stored in string form. In place of it is 'Conf', an opaque data type
everywhere outside the new file conf.c, which stores a list of (key,
value) pairs in which every key contains an integer identifying a
configuration setting, and for some of those integers the key also
contains extra parts (so that, for instance, CONF_environmt is a
string-to-string mapping). Everywhere that a Config was previously
used, a Conf is now; everywhere there was a Config structure copy,
conf_copy() is called; every lookup, adjustment, load and save
operation on a Config has been rewritten; and there's a mechanism for
serialising a Conf into a binary blob and back for use with Duplicate
Session.
User-visible effects of this change _should_ be minimal, though I
don't doubt I've introduced one or two bugs here and there which will
eventually be found. The _intended_ visible effects of this change are
that all arbitrary limits on configuration strings and lists (e.g.
limit on number of port forwardings) should now disappear; that list
boxes in the configuration will now be displayed in a sorted order
rather than the arbitrary order in which they were added to the list
(since the underlying data structure is now a sorted tree234 rather
than an ad-hoc comma-separated string); and one more specific change,
which is that local and dynamic port forwardings on the same port
number are now mutually exclusive in the configuration (putting 'D' in
the key rather than the value was a mistake in the first place).
One other reorganisation as a result of this is that I've moved all
the dialog.c standard handlers (dlg_stdeditbox_handler and friends)
out into config.c, because I can't really justify calling them generic
any more. When they took a pointer to an arbitrary structure type and
the offset of a field within that structure, they were independent of
whether that structure was a Config or something completely different,
but now they really do expect to talk to a Conf, which can _only_ be
used for PuTTY configuration, so I've renamed them all things like
conf_editbox_handler and moved them out of the nominally independent
dialog-box management module into the PuTTY-specific config.c.
[originally from svn r9214]
2011-07-14 22:52:21 +04:00
|
|
|
conf_set_str(conf, CONF_remote_cmd, "sftp");
|
|
|
|
conf_set_int(conf, CONF_ssh_subsys, TRUE);
|
2004-04-26 02:18:19 +04:00
|
|
|
if (try_scp) {
|
|
|
|
/* Fallback is to use the provided scp command. */
|
|
|
|
fallback_cmd_is_sftp = 0;
|
2011-08-18 14:47:45 +04:00
|
|
|
conf_set_str(conf, CONF_remote_cmd2, cmd);
|
Post-release destabilisation! Completely remove the struct type
'Config' in putty.h, which stores all PuTTY's settings and includes an
arbitrary length limit on every single one of those settings which is
stored in string form. In place of it is 'Conf', an opaque data type
everywhere outside the new file conf.c, which stores a list of (key,
value) pairs in which every key contains an integer identifying a
configuration setting, and for some of those integers the key also
contains extra parts (so that, for instance, CONF_environmt is a
string-to-string mapping). Everywhere that a Config was previously
used, a Conf is now; everywhere there was a Config structure copy,
conf_copy() is called; every lookup, adjustment, load and save
operation on a Config has been rewritten; and there's a mechanism for
serialising a Conf into a binary blob and back for use with Duplicate
Session.
User-visible effects of this change _should_ be minimal, though I
don't doubt I've introduced one or two bugs here and there which will
eventually be found. The _intended_ visible effects of this change are
that all arbitrary limits on configuration strings and lists (e.g.
limit on number of port forwardings) should now disappear; that list
boxes in the configuration will now be displayed in a sorted order
rather than the arbitrary order in which they were added to the list
(since the underlying data structure is now a sorted tree234 rather
than an ad-hoc comma-separated string); and one more specific change,
which is that local and dynamic port forwardings on the same port
number are now mutually exclusive in the configuration (putting 'D' in
the key rather than the value was a mistake in the first place).
One other reorganisation as a result of this is that I've moved all
the dialog.c standard handlers (dlg_stdeditbox_handler and friends)
out into config.c, because I can't really justify calling them generic
any more. When they took a pointer to an arbitrary structure type and
the offset of a field within that structure, they were independent of
whether that structure was a Config or something completely different,
but now they really do expect to talk to a Conf, which can _only_ be
used for PuTTY configuration, so I've renamed them all things like
conf_editbox_handler and moved them out of the nominally independent
dialog-box management module into the PuTTY-specific config.c.
[originally from svn r9214]
2011-07-14 22:52:21 +04:00
|
|
|
conf_set_int(conf, CONF_ssh_subsys2, FALSE);
|
2004-04-26 02:18:19 +04:00
|
|
|
} else {
|
|
|
|
/* Since we're not going to try SCP, we may as well try
|
|
|
|
* harder to find an SFTP server, since in the current
|
|
|
|
* implementation we have a spare slot. */
|
|
|
|
fallback_cmd_is_sftp = 1;
|
|
|
|
/* see psftp.c for full explanation of this kludge */
|
Post-release destabilisation! Completely remove the struct type
'Config' in putty.h, which stores all PuTTY's settings and includes an
arbitrary length limit on every single one of those settings which is
stored in string form. In place of it is 'Conf', an opaque data type
everywhere outside the new file conf.c, which stores a list of (key,
value) pairs in which every key contains an integer identifying a
configuration setting, and for some of those integers the key also
contains extra parts (so that, for instance, CONF_environmt is a
string-to-string mapping). Everywhere that a Config was previously
used, a Conf is now; everywhere there was a Config structure copy,
conf_copy() is called; every lookup, adjustment, load and save
operation on a Config has been rewritten; and there's a mechanism for
serialising a Conf into a binary blob and back for use with Duplicate
Session.
User-visible effects of this change _should_ be minimal, though I
don't doubt I've introduced one or two bugs here and there which will
eventually be found. The _intended_ visible effects of this change are
that all arbitrary limits on configuration strings and lists (e.g.
limit on number of port forwardings) should now disappear; that list
boxes in the configuration will now be displayed in a sorted order
rather than the arbitrary order in which they were added to the list
(since the underlying data structure is now a sorted tree234 rather
than an ad-hoc comma-separated string); and one more specific change,
which is that local and dynamic port forwardings on the same port
number are now mutually exclusive in the configuration (putting 'D' in
the key rather than the value was a mistake in the first place).
One other reorganisation as a result of this is that I've moved all
the dialog.c standard handlers (dlg_stdeditbox_handler and friends)
out into config.c, because I can't really justify calling them generic
any more. When they took a pointer to an arbitrary structure type and
the offset of a field within that structure, they were independent of
whether that structure was a Config or something completely different,
but now they really do expect to talk to a Conf, which can _only_ be
used for PuTTY configuration, so I've renamed them all things like
conf_editbox_handler and moved them out of the nominally independent
dialog-box management module into the PuTTY-specific config.c.
[originally from svn r9214]
2011-07-14 22:52:21 +04:00
|
|
|
conf_set_str(conf, CONF_remote_cmd2,
|
|
|
|
"test -x /usr/lib/sftp-server &&"
|
|
|
|
" exec /usr/lib/sftp-server\n"
|
|
|
|
"test -x /usr/local/lib/sftp-server &&"
|
|
|
|
" exec /usr/local/lib/sftp-server\n"
|
|
|
|
"exec sftp-server");
|
|
|
|
conf_set_int(conf, CONF_ssh_subsys2, FALSE);
|
2004-04-26 02:18:19 +04:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
/* Don't try SFTP at all; just try the scp command. */
|
|
|
|
main_cmd_is_sftp = 0;
|
Post-release destabilisation! Completely remove the struct type
'Config' in putty.h, which stores all PuTTY's settings and includes an
arbitrary length limit on every single one of those settings which is
stored in string form. In place of it is 'Conf', an opaque data type
everywhere outside the new file conf.c, which stores a list of (key,
value) pairs in which every key contains an integer identifying a
configuration setting, and for some of those integers the key also
contains extra parts (so that, for instance, CONF_environmt is a
string-to-string mapping). Everywhere that a Config was previously
used, a Conf is now; everywhere there was a Config structure copy,
conf_copy() is called; every lookup, adjustment, load and save
operation on a Config has been rewritten; and there's a mechanism for
serialising a Conf into a binary blob and back for use with Duplicate
Session.
User-visible effects of this change _should_ be minimal, though I
don't doubt I've introduced one or two bugs here and there which will
eventually be found. The _intended_ visible effects of this change are
that all arbitrary limits on configuration strings and lists (e.g.
limit on number of port forwardings) should now disappear; that list
boxes in the configuration will now be displayed in a sorted order
rather than the arbitrary order in which they were added to the list
(since the underlying data structure is now a sorted tree234 rather
than an ad-hoc comma-separated string); and one more specific change,
which is that local and dynamic port forwardings on the same port
number are now mutually exclusive in the configuration (putting 'D' in
the key rather than the value was a mistake in the first place).
One other reorganisation as a result of this is that I've moved all
the dialog.c standard handlers (dlg_stdeditbox_handler and friends)
out into config.c, because I can't really justify calling them generic
any more. When they took a pointer to an arbitrary structure type and
the offset of a field within that structure, they were independent of
whether that structure was a Config or something completely different,
but now they really do expect to talk to a Conf, which can _only_ be
used for PuTTY configuration, so I've renamed them all things like
conf_editbox_handler and moved them out of the nominally independent
dialog-box management module into the PuTTY-specific config.c.
[originally from svn r9214]
2011-07-14 22:52:21 +04:00
|
|
|
conf_set_str(conf, CONF_remote_cmd, cmd);
|
|
|
|
conf_set_int(conf, CONF_ssh_subsys, FALSE);
|
2004-04-26 02:18:19 +04:00
|
|
|
}
|
Post-release destabilisation! Completely remove the struct type
'Config' in putty.h, which stores all PuTTY's settings and includes an
arbitrary length limit on every single one of those settings which is
stored in string form. In place of it is 'Conf', an opaque data type
everywhere outside the new file conf.c, which stores a list of (key,
value) pairs in which every key contains an integer identifying a
configuration setting, and for some of those integers the key also
contains extra parts (so that, for instance, CONF_environmt is a
string-to-string mapping). Everywhere that a Config was previously
used, a Conf is now; everywhere there was a Config structure copy,
conf_copy() is called; every lookup, adjustment, load and save
operation on a Config has been rewritten; and there's a mechanism for
serialising a Conf into a binary blob and back for use with Duplicate
Session.
User-visible effects of this change _should_ be minimal, though I
don't doubt I've introduced one or two bugs here and there which will
eventually be found. The _intended_ visible effects of this change are
that all arbitrary limits on configuration strings and lists (e.g.
limit on number of port forwardings) should now disappear; that list
boxes in the configuration will now be displayed in a sorted order
rather than the arbitrary order in which they were added to the list
(since the underlying data structure is now a sorted tree234 rather
than an ad-hoc comma-separated string); and one more specific change,
which is that local and dynamic port forwardings on the same port
number are now mutually exclusive in the configuration (putting 'D' in
the key rather than the value was a mistake in the first place).
One other reorganisation as a result of this is that I've moved all
the dialog.c standard handlers (dlg_stdeditbox_handler and friends)
out into config.c, because I can't really justify calling them generic
any more. When they took a pointer to an arbitrary structure type and
the offset of a field within that structure, they were independent of
whether that structure was a Config or something completely different,
but now they really do expect to talk to a Conf, which can _only_ be
used for PuTTY configuration, so I've renamed them all things like
conf_editbox_handler and moved them out of the nominally independent
dialog-box management module into the PuTTY-specific config.c.
[originally from svn r9214]
2011-07-14 22:52:21 +04:00
|
|
|
conf_set_int(conf, CONF_nopty, TRUE);
|
2000-09-27 13:36:39 +04:00
|
|
|
|
|
|
|
back = &ssh_backend;
|
|
|
|
|
2017-02-11 03:23:36 +03:00
|
|
|
logctx = log_init(NULL, conf);
|
|
|
|
console_provide_logctx(logctx);
|
|
|
|
|
2017-02-11 03:44:00 +03:00
|
|
|
platform_psftp_pre_conn_setup();
|
|
|
|
|
Post-release destabilisation! Completely remove the struct type
'Config' in putty.h, which stores all PuTTY's settings and includes an
arbitrary length limit on every single one of those settings which is
stored in string form. In place of it is 'Conf', an opaque data type
everywhere outside the new file conf.c, which stores a list of (key,
value) pairs in which every key contains an integer identifying a
configuration setting, and for some of those integers the key also
contains extra parts (so that, for instance, CONF_environmt is a
string-to-string mapping). Everywhere that a Config was previously
used, a Conf is now; everywhere there was a Config structure copy,
conf_copy() is called; every lookup, adjustment, load and save
operation on a Config has been rewritten; and there's a mechanism for
serialising a Conf into a binary blob and back for use with Duplicate
Session.
User-visible effects of this change _should_ be minimal, though I
don't doubt I've introduced one or two bugs here and there which will
eventually be found. The _intended_ visible effects of this change are
that all arbitrary limits on configuration strings and lists (e.g.
limit on number of port forwardings) should now disappear; that list
boxes in the configuration will now be displayed in a sorted order
rather than the arbitrary order in which they were added to the list
(since the underlying data structure is now a sorted tree234 rather
than an ad-hoc comma-separated string); and one more specific change,
which is that local and dynamic port forwardings on the same port
number are now mutually exclusive in the configuration (putting 'D' in
the key rather than the value was a mistake in the first place).
One other reorganisation as a result of this is that I've moved all
the dialog.c standard handlers (dlg_stdeditbox_handler and friends)
out into config.c, because I can't really justify calling them generic
any more. When they took a pointer to an arbitrary structure type and
the offset of a field within that structure, they were independent of
whether that structure was a Config or something completely different,
but now they really do expect to talk to a Conf, which can _only_ be
used for PuTTY configuration, so I've renamed them all things like
conf_editbox_handler and moved them out of the nominally independent
dialog-box management module into the PuTTY-specific config.c.
[originally from svn r9214]
2011-07-14 22:52:21 +04:00
|
|
|
err = back->init(NULL, &backhandle, conf,
|
|
|
|
conf_get_str(conf, CONF_host),
|
|
|
|
conf_get_int(conf, CONF_port),
|
|
|
|
&realhost, 0,
|
|
|
|
conf_get_int(conf, CONF_tcp_keepalives));
|
1999-11-08 14:22:45 +03:00
|
|
|
if (err != NULL)
|
|
|
|
bump("ssh_init: %s", err);
|
2002-10-26 16:58:13 +04:00
|
|
|
back->provide_logctx(backhandle, logctx);
|
2000-09-27 13:36:39 +04:00
|
|
|
ssh_scp_init();
|
2008-07-11 23:24:56 +04:00
|
|
|
if (verbose && realhost != NULL && errs == 0)
|
2013-07-11 21:24:47 +04:00
|
|
|
tell_user(stderr, "Connected to %s", realhost);
|
2001-05-09 18:01:15 +04:00
|
|
|
sfree(realhost);
|
1999-08-31 13:20:48 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Update statistic information about current file.
|
|
|
|
*/
|
2015-05-15 13:15:42 +03:00
|
|
|
static void print_stats(const char *name, uint64 size, uint64 done,
|
2001-05-06 18:35:20 +04:00
|
|
|
time_t start, time_t now)
|
1999-08-31 13:20:48 +04:00
|
|
|
{
|
1999-11-08 14:22:45 +03:00
|
|
|
float ratebs;
|
|
|
|
unsigned long eta;
|
2004-04-27 22:23:48 +04:00
|
|
|
char *etastr;
|
1999-11-08 14:22:45 +03:00
|
|
|
int pct;
|
2001-05-19 17:41:18 +04:00
|
|
|
int len;
|
2001-11-22 01:58:01 +03:00
|
|
|
int elap;
|
2006-08-12 19:20:19 +04:00
|
|
|
double donedbl;
|
|
|
|
double sizedbl;
|
1999-11-08 14:22:45 +03:00
|
|
|
|
2001-11-22 01:58:01 +03:00
|
|
|
elap = (unsigned long) difftime(now, start);
|
1999-11-08 14:22:45 +03:00
|
|
|
|
2001-11-22 01:58:01 +03:00
|
|
|
if (now > start)
|
2006-08-12 19:20:19 +04:00
|
|
|
ratebs = (float) (uint64_to_double(done) / elap);
|
2001-11-22 01:58:01 +03:00
|
|
|
else
|
2006-08-12 19:20:19 +04:00
|
|
|
ratebs = (float) uint64_to_double(done);
|
2001-11-22 01:58:01 +03:00
|
|
|
|
|
|
|
if (ratebs < 1.0)
|
2006-08-12 19:20:19 +04:00
|
|
|
eta = (unsigned long) (uint64_to_double(uint64_subtract(size, done)));
|
|
|
|
else {
|
|
|
|
eta = (unsigned long)
|
|
|
|
((uint64_to_double(uint64_subtract(size, done)) / ratebs));
|
|
|
|
}
|
|
|
|
|
2004-04-27 22:23:48 +04:00
|
|
|
etastr = dupprintf("%02ld:%02ld:%02ld",
|
|
|
|
eta / 3600, (eta % 3600) / 60, eta % 60);
|
1999-11-08 14:22:45 +03:00
|
|
|
|
2006-08-12 19:20:19 +04:00
|
|
|
donedbl = uint64_to_double(done);
|
|
|
|
sizedbl = uint64_to_double(size);
|
|
|
|
pct = (int) (100 * (donedbl * 1.0 / sizedbl));
|
1999-11-08 14:22:45 +03:00
|
|
|
|
2006-08-12 19:20:19 +04:00
|
|
|
{
|
|
|
|
char donekb[40];
|
|
|
|
/* divide by 1024 to provide kB */
|
|
|
|
uint64_decimal(uint64_shift_right(done, 10), donekb);
|
|
|
|
len = printf("\r%-25.25s | %s kB | %5.1f kB/s | ETA: %8s | %3d%%",
|
|
|
|
name,
|
|
|
|
donekb, ratebs / 1024.0, etastr, pct);
|
2001-05-19 17:41:18 +04:00
|
|
|
if (len < prev_stats_len)
|
|
|
|
printf("%*s", prev_stats_len - len, "");
|
|
|
|
prev_stats_len = len;
|
1999-11-08 14:22:45 +03:00
|
|
|
|
2006-08-12 19:20:19 +04:00
|
|
|
if (uint64_compare(done, size) == 0)
|
2000-09-15 19:54:04 +04:00
|
|
|
printf("\n");
|
2003-12-04 01:45:32 +03:00
|
|
|
|
|
|
|
fflush(stdout);
|
2000-09-15 19:54:04 +04:00
|
|
|
}
|
2004-04-27 22:23:48 +04:00
|
|
|
|
|
|
|
free(etastr);
|
1999-08-31 13:20:48 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Find a colon in str and return a pointer to the colon.
|
2000-04-03 23:54:31 +04:00
|
|
|
* This is used to separate hostname from filename.
|
1999-08-31 13:20:48 +04:00
|
|
|
*/
|
2001-05-06 18:35:20 +04:00
|
|
|
static char *colon(char *str)
|
1999-08-31 13:20:48 +04:00
|
|
|
{
|
1999-11-08 14:22:45 +03:00
|
|
|
/* We ignore a leading colon, since the hostname cannot be
|
2001-05-06 18:35:20 +04:00
|
|
|
empty. We also ignore a colon as second character because
|
|
|
|
of filenames like f:myfile.txt. */
|
2006-02-11 22:10:01 +03:00
|
|
|
if (str[0] == '\0' || str[0] == ':' ||
|
|
|
|
(str[0] != '[' && str[1] == ':'))
|
1999-11-08 14:22:45 +03:00
|
|
|
return (NULL);
|
2014-01-25 19:58:54 +04:00
|
|
|
str += host_strcspn(str, ":/\\");
|
1999-11-08 14:22:45 +03:00
|
|
|
if (*str == ':')
|
|
|
|
return (str);
|
|
|
|
else
|
|
|
|
return (NULL);
|
1999-08-31 13:20:48 +04:00
|
|
|
}
|
|
|
|
|
2001-08-26 22:32:28 +04:00
|
|
|
/*
|
|
|
|
* Determine whether a string is entirely composed of dots.
|
|
|
|
*/
|
|
|
|
static int is_dots(char *str)
|
|
|
|
{
|
|
|
|
return str[strspn(str, ".")] == '\0';
|
|
|
|
}
|
|
|
|
|
1999-08-31 13:20:48 +04:00
|
|
|
/*
|
|
|
|
* Wait for a response from the other side.
|
|
|
|
* Return 0 if ok, -1 if error.
|
|
|
|
*/
|
|
|
|
static int response(void)
|
|
|
|
{
|
1999-11-08 14:22:45 +03:00
|
|
|
char ch, resp, rbuf[2048];
|
|
|
|
int p;
|
|
|
|
|
2018-05-26 10:31:34 +03:00
|
|
|
if (ssh_scp_recv(&resp, 1) <= 0)
|
1999-11-08 14:22:45 +03:00
|
|
|
bump("Lost connection");
|
|
|
|
|
|
|
|
p = 0;
|
|
|
|
switch (resp) {
|
2001-05-06 18:35:20 +04:00
|
|
|
case 0: /* ok */
|
1999-11-08 14:22:45 +03:00
|
|
|
return (0);
|
|
|
|
default:
|
|
|
|
rbuf[p++] = resp;
|
|
|
|
/* fallthrough */
|
2001-05-06 18:35:20 +04:00
|
|
|
case 1: /* error */
|
|
|
|
case 2: /* fatal error */
|
1999-11-08 14:22:45 +03:00
|
|
|
do {
|
2018-05-26 10:31:34 +03:00
|
|
|
if (ssh_scp_recv(&ch, 1) <= 0)
|
1999-11-08 14:22:45 +03:00
|
|
|
bump("Protocol error: Lost connection");
|
|
|
|
rbuf[p++] = ch;
|
|
|
|
} while (p < sizeof(rbuf) && ch != '\n');
|
2001-05-06 18:35:20 +04:00
|
|
|
rbuf[p - 1] = '\0';
|
1999-11-08 14:22:45 +03:00
|
|
|
if (resp == 1)
|
2013-07-11 21:24:47 +04:00
|
|
|
tell_user(stderr, "%s", rbuf);
|
1999-11-08 14:22:45 +03:00
|
|
|
else
|
|
|
|
bump("%s", rbuf);
|
|
|
|
errs++;
|
|
|
|
return (-1);
|
|
|
|
}
|
1999-08-31 13:20:48 +04:00
|
|
|
}
|
|
|
|
|
2001-08-26 22:32:28 +04:00
|
|
|
int sftp_recvdata(char *buf, int len)
|
|
|
|
{
|
2018-05-26 10:31:34 +03:00
|
|
|
return ssh_scp_recv(buf, len);
|
2001-08-26 22:32:28 +04:00
|
|
|
}
|
|
|
|
int sftp_senddata(char *buf, int len)
|
|
|
|
{
|
2004-01-21 22:45:44 +03:00
|
|
|
back->send(backhandle, buf, len);
|
2001-08-26 22:32:28 +04:00
|
|
|
return 1;
|
|
|
|
}
|
2016-04-09 02:24:12 +03:00
|
|
|
int sftp_sendbuffer(void)
|
|
|
|
{
|
|
|
|
return back->sendbuffer(backhandle);
|
|
|
|
}
|
2001-08-26 22:32:28 +04:00
|
|
|
|
|
|
|
/* ----------------------------------------------------------------------
|
|
|
|
* sftp-based replacement for the hacky `pscp -ls'.
|
|
|
|
*/
|
|
|
|
static int sftp_ls_compare(const void *av, const void *bv)
|
|
|
|
{
|
|
|
|
const struct fxp_name *a = (const struct fxp_name *) av;
|
|
|
|
const struct fxp_name *b = (const struct fxp_name *) bv;
|
|
|
|
return strcmp(a->filename, b->filename);
|
|
|
|
}
|
2015-05-15 13:15:42 +03:00
|
|
|
void scp_sftp_listdir(const char *dirname)
|
2001-08-26 22:32:28 +04:00
|
|
|
{
|
|
|
|
struct fxp_handle *dirh;
|
|
|
|
struct fxp_names *names;
|
|
|
|
struct fxp_name *ournames;
|
2003-06-29 18:26:09 +04:00
|
|
|
struct sftp_packet *pktin;
|
Clean up handling of the return value from sftp_find_request. In many
places we simply enforce by assertion that it will match the request
we sent out a moment ago: in fact it can also return NULL, so it makes
more sense to report a proper error message if it doesn't return the
expected value, and while we're at it, have that error message
whatever message was helpfully left in fxp_error() by
sftp_find_request when it failed.
To do this, I've written a centralised function in psftp.c called
sftp_wait_for_reply, which is handed a request that's just been sent
out and deals with the mechanics of waiting for its reply, returning
the reply when it arrives, and aborting with a sensible error if
anything else arrives instead. The numerous sites in psftp.c which
called sftp_find_request have all been rewritten to do this instead,
and as a side effect they now look more sensible. The only other uses
of sftp_find_request were in xfer_*load_gotpkt, which had to be
tweaked in its own way.
While I'm here, also fix memory management in sftp_find_request, which
was freeing its input packet on some but not all error return paths.
[originally from svn r9894]
2013-07-07 00:43:21 +04:00
|
|
|
struct sftp_request *req;
|
2001-08-26 22:32:28 +04:00
|
|
|
int nnames, namesize;
|
|
|
|
int i;
|
|
|
|
|
2002-06-25 22:51:06 +04:00
|
|
|
if (!fxp_init()) {
|
|
|
|
tell_user(stderr, "unable to initialise SFTP: %s", fxp_error());
|
|
|
|
errs++;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2001-08-26 22:32:28 +04:00
|
|
|
printf("Listing directory %s\n", dirname);
|
|
|
|
|
Clean up handling of the return value from sftp_find_request. In many
places we simply enforce by assertion that it will match the request
we sent out a moment ago: in fact it can also return NULL, so it makes
more sense to report a proper error message if it doesn't return the
expected value, and while we're at it, have that error message
whatever message was helpfully left in fxp_error() by
sftp_find_request when it failed.
To do this, I've written a centralised function in psftp.c called
sftp_wait_for_reply, which is handed a request that's just been sent
out and deals with the mechanics of waiting for its reply, returning
the reply when it arrives, and aborting with a sensible error if
anything else arrives instead. The numerous sites in psftp.c which
called sftp_find_request have all been rewritten to do this instead,
and as a side effect they now look more sensible. The only other uses
of sftp_find_request were in xfer_*load_gotpkt, which had to be
tweaked in its own way.
While I'm here, also fix memory management in sftp_find_request, which
was freeing its input packet on some but not all error return paths.
[originally from svn r9894]
2013-07-07 00:43:21 +04:00
|
|
|
req = fxp_opendir_send(dirname);
|
|
|
|
pktin = sftp_wait_for_reply(req);
|
|
|
|
dirh = fxp_opendir_recv(pktin, req);
|
2003-06-29 18:26:09 +04:00
|
|
|
|
2001-08-26 22:32:28 +04:00
|
|
|
if (dirh == NULL) {
|
2017-02-15 23:31:56 +03:00
|
|
|
tell_user(stderr, "Unable to open %s: %s\n", dirname, fxp_error());
|
|
|
|
errs++;
|
2001-08-26 22:32:28 +04:00
|
|
|
} else {
|
|
|
|
nnames = namesize = 0;
|
|
|
|
ournames = NULL;
|
|
|
|
|
|
|
|
while (1) {
|
|
|
|
|
Clean up handling of the return value from sftp_find_request. In many
places we simply enforce by assertion that it will match the request
we sent out a moment ago: in fact it can also return NULL, so it makes
more sense to report a proper error message if it doesn't return the
expected value, and while we're at it, have that error message
whatever message was helpfully left in fxp_error() by
sftp_find_request when it failed.
To do this, I've written a centralised function in psftp.c called
sftp_wait_for_reply, which is handed a request that's just been sent
out and deals with the mechanics of waiting for its reply, returning
the reply when it arrives, and aborting with a sensible error if
anything else arrives instead. The numerous sites in psftp.c which
called sftp_find_request have all been rewritten to do this instead,
and as a side effect they now look more sensible. The only other uses
of sftp_find_request were in xfer_*load_gotpkt, which had to be
tweaked in its own way.
While I'm here, also fix memory management in sftp_find_request, which
was freeing its input packet on some but not all error return paths.
[originally from svn r9894]
2013-07-07 00:43:21 +04:00
|
|
|
req = fxp_readdir_send(dirh);
|
|
|
|
pktin = sftp_wait_for_reply(req);
|
|
|
|
names = fxp_readdir_recv(pktin, req);
|
2003-06-29 18:26:09 +04:00
|
|
|
|
2001-08-26 22:32:28 +04:00
|
|
|
if (names == NULL) {
|
|
|
|
if (fxp_error_type() == SSH_FX_EOF)
|
|
|
|
break;
|
2001-08-28 12:08:43 +04:00
|
|
|
printf("Reading directory %s: %s\n", dirname, fxp_error());
|
2001-08-26 22:32:28 +04:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (names->nnames == 0) {
|
|
|
|
fxp_free_names(names);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (nnames + names->nnames >= namesize) {
|
|
|
|
namesize += names->nnames + 128;
|
2003-03-29 19:14:26 +03:00
|
|
|
ournames = sresize(ournames, namesize, struct fxp_name);
|
2001-08-26 22:32:28 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
for (i = 0; i < names->nnames; i++)
|
|
|
|
ournames[nnames++] = names->names[i];
|
|
|
|
names->nnames = 0; /* prevent free_names */
|
|
|
|
fxp_free_names(names);
|
|
|
|
}
|
Clean up handling of the return value from sftp_find_request. In many
places we simply enforce by assertion that it will match the request
we sent out a moment ago: in fact it can also return NULL, so it makes
more sense to report a proper error message if it doesn't return the
expected value, and while we're at it, have that error message
whatever message was helpfully left in fxp_error() by
sftp_find_request when it failed.
To do this, I've written a centralised function in psftp.c called
sftp_wait_for_reply, which is handed a request that's just been sent
out and deals with the mechanics of waiting for its reply, returning
the reply when it arrives, and aborting with a sensible error if
anything else arrives instead. The numerous sites in psftp.c which
called sftp_find_request have all been rewritten to do this instead,
and as a side effect they now look more sensible. The only other uses
of sftp_find_request were in xfer_*load_gotpkt, which had to be
tweaked in its own way.
While I'm here, also fix memory management in sftp_find_request, which
was freeing its input packet on some but not all error return paths.
[originally from svn r9894]
2013-07-07 00:43:21 +04:00
|
|
|
req = fxp_close_send(dirh);
|
|
|
|
pktin = sftp_wait_for_reply(req);
|
|
|
|
fxp_close_recv(pktin, req);
|
2001-08-26 22:32:28 +04:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Now we have our filenames. Sort them by actual file
|
|
|
|
* name, and then output the longname parts.
|
|
|
|
*/
|
2013-07-11 21:24:39 +04:00
|
|
|
if (nnames > 0)
|
|
|
|
qsort(ournames, nnames, sizeof(*ournames), sftp_ls_compare);
|
2001-08-26 22:32:28 +04:00
|
|
|
|
|
|
|
/*
|
|
|
|
* And print them.
|
|
|
|
*/
|
|
|
|
for (i = 0; i < nnames; i++)
|
|
|
|
printf("%s\n", ournames[i].longname);
|
2013-07-11 21:43:41 +04:00
|
|
|
|
|
|
|
sfree(ournames);
|
2001-08-26 22:32:28 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2001-08-26 18:53:51 +04:00
|
|
|
/* ----------------------------------------------------------------------
|
|
|
|
* Helper routines that contain the actual SCP protocol elements,
|
2001-08-26 22:32:28 +04:00
|
|
|
* implemented both as SCP1 and SFTP.
|
2001-08-26 18:53:51 +04:00
|
|
|
*/
|
|
|
|
|
2001-08-26 22:32:28 +04:00
|
|
|
static struct scp_sftp_dirstack {
|
|
|
|
struct scp_sftp_dirstack *next;
|
|
|
|
struct fxp_name *names;
|
|
|
|
int namepos, namelen;
|
|
|
|
char *dirpath;
|
2001-08-27 14:17:41 +04:00
|
|
|
char *wildcard;
|
2001-09-05 23:33:12 +04:00
|
|
|
int matched_something; /* wildcard match set was non-empty */
|
2001-08-26 22:32:28 +04:00
|
|
|
} *scp_sftp_dirstack_head;
|
|
|
|
static char *scp_sftp_remotepath, *scp_sftp_currentname;
|
2001-08-27 14:17:41 +04:00
|
|
|
static char *scp_sftp_wildcard;
|
2001-08-26 22:32:28 +04:00
|
|
|
static int scp_sftp_targetisdir, scp_sftp_donethistarget;
|
|
|
|
static int scp_sftp_preserve, scp_sftp_recursive;
|
|
|
|
static unsigned long scp_sftp_mtime, scp_sftp_atime;
|
|
|
|
static int scp_has_times;
|
|
|
|
static struct fxp_handle *scp_sftp_filehandle;
|
2003-09-29 19:39:56 +04:00
|
|
|
static struct fxp_xfer *scp_sftp_xfer;
|
2001-08-26 22:32:28 +04:00
|
|
|
static uint64 scp_sftp_fileoffset;
|
|
|
|
|
2015-05-15 13:15:42 +03:00
|
|
|
int scp_source_setup(const char *target, int shouldbedir)
|
2001-08-26 22:32:28 +04:00
|
|
|
{
|
|
|
|
if (using_sftp) {
|
|
|
|
/*
|
|
|
|
* Find out whether the target filespec is in fact a
|
|
|
|
* directory.
|
|
|
|
*/
|
2003-06-29 18:26:09 +04:00
|
|
|
struct sftp_packet *pktin;
|
Clean up handling of the return value from sftp_find_request. In many
places we simply enforce by assertion that it will match the request
we sent out a moment ago: in fact it can also return NULL, so it makes
more sense to report a proper error message if it doesn't return the
expected value, and while we're at it, have that error message
whatever message was helpfully left in fxp_error() by
sftp_find_request when it failed.
To do this, I've written a centralised function in psftp.c called
sftp_wait_for_reply, which is handed a request that's just been sent
out and deals with the mechanics of waiting for its reply, returning
the reply when it arrives, and aborting with a sensible error if
anything else arrives instead. The numerous sites in psftp.c which
called sftp_find_request have all been rewritten to do this instead,
and as a side effect they now look more sensible. The only other uses
of sftp_find_request were in xfer_*load_gotpkt, which had to be
tweaked in its own way.
While I'm here, also fix memory management in sftp_find_request, which
was freeing its input packet on some but not all error return paths.
[originally from svn r9894]
2013-07-07 00:43:21 +04:00
|
|
|
struct sftp_request *req;
|
2001-08-26 22:32:28 +04:00
|
|
|
struct fxp_attrs attrs;
|
2003-06-29 18:26:09 +04:00
|
|
|
int ret;
|
2001-08-26 22:32:28 +04:00
|
|
|
|
2002-04-10 23:54:42 +04:00
|
|
|
if (!fxp_init()) {
|
|
|
|
tell_user(stderr, "unable to initialise SFTP: %s", fxp_error());
|
|
|
|
errs++;
|
2005-06-26 01:43:09 +04:00
|
|
|
return 1;
|
2002-04-10 23:54:42 +04:00
|
|
|
}
|
|
|
|
|
Clean up handling of the return value from sftp_find_request. In many
places we simply enforce by assertion that it will match the request
we sent out a moment ago: in fact it can also return NULL, so it makes
more sense to report a proper error message if it doesn't return the
expected value, and while we're at it, have that error message
whatever message was helpfully left in fxp_error() by
sftp_find_request when it failed.
To do this, I've written a centralised function in psftp.c called
sftp_wait_for_reply, which is handed a request that's just been sent
out and deals with the mechanics of waiting for its reply, returning
the reply when it arrives, and aborting with a sensible error if
anything else arrives instead. The numerous sites in psftp.c which
called sftp_find_request have all been rewritten to do this instead,
and as a side effect they now look more sensible. The only other uses
of sftp_find_request were in xfer_*load_gotpkt, which had to be
tweaked in its own way.
While I'm here, also fix memory management in sftp_find_request, which
was freeing its input packet on some but not all error return paths.
[originally from svn r9894]
2013-07-07 00:43:21 +04:00
|
|
|
req = fxp_stat_send(target);
|
|
|
|
pktin = sftp_wait_for_reply(req);
|
|
|
|
ret = fxp_stat_recv(pktin, req, &attrs);
|
2003-06-29 18:26:09 +04:00
|
|
|
|
|
|
|
if (!ret || !(attrs.flags & SSH_FILEXFER_ATTR_PERMISSIONS))
|
2001-08-26 22:32:28 +04:00
|
|
|
scp_sftp_targetisdir = 0;
|
|
|
|
else
|
|
|
|
scp_sftp_targetisdir = (attrs.permissions & 0040000) != 0;
|
|
|
|
|
|
|
|
if (shouldbedir && !scp_sftp_targetisdir) {
|
|
|
|
bump("pscp: remote filespec %s: not a directory\n", target);
|
|
|
|
}
|
|
|
|
|
|
|
|
scp_sftp_remotepath = dupstr(target);
|
|
|
|
|
|
|
|
scp_has_times = 0;
|
|
|
|
} else {
|
|
|
|
(void) response();
|
|
|
|
}
|
2005-06-26 01:43:09 +04:00
|
|
|
return 0;
|
2001-08-26 22:32:28 +04:00
|
|
|
}
|
|
|
|
|
2001-08-26 18:53:51 +04:00
|
|
|
int scp_send_errmsg(char *str)
|
|
|
|
{
|
2001-08-26 22:32:28 +04:00
|
|
|
if (using_sftp) {
|
|
|
|
/* do nothing; we never need to send our errors to the server */
|
|
|
|
} else {
|
2002-10-25 15:30:33 +04:00
|
|
|
back->send(backhandle, "\001", 1);/* scp protocol error prefix */
|
|
|
|
back->send(backhandle, str, strlen(str));
|
2001-08-26 22:32:28 +04:00
|
|
|
}
|
2001-08-26 18:53:51 +04:00
|
|
|
return 0; /* can't fail */
|
|
|
|
}
|
|
|
|
|
|
|
|
int scp_send_filetimes(unsigned long mtime, unsigned long atime)
|
|
|
|
{
|
2001-08-26 22:32:28 +04:00
|
|
|
if (using_sftp) {
|
|
|
|
scp_sftp_mtime = mtime;
|
|
|
|
scp_sftp_atime = atime;
|
|
|
|
scp_has_times = 1;
|
|
|
|
return 0;
|
|
|
|
} else {
|
|
|
|
char buf[80];
|
|
|
|
sprintf(buf, "T%lu 0 %lu 0\n", mtime, atime);
|
2002-10-25 15:30:33 +04:00
|
|
|
back->send(backhandle, buf, strlen(buf));
|
2001-08-26 22:32:28 +04:00
|
|
|
return response();
|
|
|
|
}
|
2001-08-26 18:53:51 +04:00
|
|
|
}
|
|
|
|
|
2015-05-15 13:15:42 +03:00
|
|
|
int scp_send_filename(const char *name, uint64 size, int permissions)
|
2001-08-26 18:53:51 +04:00
|
|
|
{
|
2001-08-26 22:32:28 +04:00
|
|
|
if (using_sftp) {
|
|
|
|
char *fullname;
|
2003-06-29 18:26:09 +04:00
|
|
|
struct sftp_packet *pktin;
|
Clean up handling of the return value from sftp_find_request. In many
places we simply enforce by assertion that it will match the request
we sent out a moment ago: in fact it can also return NULL, so it makes
more sense to report a proper error message if it doesn't return the
expected value, and while we're at it, have that error message
whatever message was helpfully left in fxp_error() by
sftp_find_request when it failed.
To do this, I've written a centralised function in psftp.c called
sftp_wait_for_reply, which is handed a request that's just been sent
out and deals with the mechanics of waiting for its reply, returning
the reply when it arrives, and aborting with a sensible error if
anything else arrives instead. The numerous sites in psftp.c which
called sftp_find_request have all been rewritten to do this instead,
and as a side effect they now look more sensible. The only other uses
of sftp_find_request were in xfer_*load_gotpkt, which had to be
tweaked in its own way.
While I'm here, also fix memory management in sftp_find_request, which
was freeing its input packet on some but not all error return paths.
[originally from svn r9894]
2013-07-07 00:43:21 +04:00
|
|
|
struct sftp_request *req;
|
2011-08-11 21:59:30 +04:00
|
|
|
struct fxp_attrs attrs;
|
2003-06-29 18:26:09 +04:00
|
|
|
|
2001-08-26 22:32:28 +04:00
|
|
|
if (scp_sftp_targetisdir) {
|
|
|
|
fullname = dupcat(scp_sftp_remotepath, "/", name, NULL);
|
|
|
|
} else {
|
|
|
|
fullname = dupstr(scp_sftp_remotepath);
|
|
|
|
}
|
2003-06-29 18:26:09 +04:00
|
|
|
|
2011-08-11 21:59:30 +04:00
|
|
|
attrs.flags = 0;
|
|
|
|
PUT_PERMISSIONS(attrs, permissions);
|
|
|
|
|
Clean up handling of the return value from sftp_find_request. In many
places we simply enforce by assertion that it will match the request
we sent out a moment ago: in fact it can also return NULL, so it makes
more sense to report a proper error message if it doesn't return the
expected value, and while we're at it, have that error message
whatever message was helpfully left in fxp_error() by
sftp_find_request when it failed.
To do this, I've written a centralised function in psftp.c called
sftp_wait_for_reply, which is handed a request that's just been sent
out and deals with the mechanics of waiting for its reply, returning
the reply when it arrives, and aborting with a sensible error if
anything else arrives instead. The numerous sites in psftp.c which
called sftp_find_request have all been rewritten to do this instead,
and as a side effect they now look more sensible. The only other uses
of sftp_find_request were in xfer_*load_gotpkt, which had to be
tweaked in its own way.
While I'm here, also fix memory management in sftp_find_request, which
was freeing its input packet on some but not all error return paths.
[originally from svn r9894]
2013-07-07 00:43:21 +04:00
|
|
|
req = fxp_open_send(fullname,
|
|
|
|
SSH_FXF_WRITE | SSH_FXF_CREAT | SSH_FXF_TRUNC,
|
|
|
|
&attrs);
|
|
|
|
pktin = sftp_wait_for_reply(req);
|
|
|
|
scp_sftp_filehandle = fxp_open_recv(pktin, req);
|
2003-06-29 18:26:09 +04:00
|
|
|
|
2001-08-26 22:32:28 +04:00
|
|
|
if (!scp_sftp_filehandle) {
|
|
|
|
tell_user(stderr, "pscp: unable to open %s: %s",
|
|
|
|
fullname, fxp_error());
|
2013-07-11 21:43:41 +04:00
|
|
|
sfree(fullname);
|
2001-08-26 22:32:28 +04:00
|
|
|
errs++;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
scp_sftp_fileoffset = uint64_make(0, 0);
|
2003-09-29 19:39:56 +04:00
|
|
|
scp_sftp_xfer = xfer_upload_init(scp_sftp_filehandle,
|
|
|
|
scp_sftp_fileoffset);
|
2001-08-26 22:32:28 +04:00
|
|
|
sfree(fullname);
|
|
|
|
return 0;
|
|
|
|
} else {
|
|
|
|
char buf[40];
|
2006-08-12 19:20:19 +04:00
|
|
|
char sizestr[40];
|
|
|
|
uint64_decimal(size, sizestr);
|
2011-08-11 21:59:30 +04:00
|
|
|
if (permissions < 0)
|
|
|
|
permissions = 0644;
|
|
|
|
sprintf(buf, "C%04o %s ", (int)(permissions & 07777), sizestr);
|
2002-10-25 15:30:33 +04:00
|
|
|
back->send(backhandle, buf, strlen(buf));
|
|
|
|
back->send(backhandle, name, strlen(name));
|
|
|
|
back->send(backhandle, "\n", 1);
|
2001-08-26 22:32:28 +04:00
|
|
|
return response();
|
|
|
|
}
|
2001-08-26 18:53:51 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
int scp_send_filedata(char *data, int len)
|
|
|
|
{
|
2001-08-26 22:32:28 +04:00
|
|
|
if (using_sftp) {
|
2003-06-29 18:26:09 +04:00
|
|
|
int ret;
|
|
|
|
struct sftp_packet *pktin;
|
|
|
|
|
2001-08-26 22:32:28 +04:00
|
|
|
if (!scp_sftp_filehandle) {
|
|
|
|
return 1;
|
|
|
|
}
|
2003-06-29 18:26:09 +04:00
|
|
|
|
2003-09-29 19:39:56 +04:00
|
|
|
while (!xfer_upload_ready(scp_sftp_xfer)) {
|
|
|
|
pktin = sftp_recv();
|
|
|
|
ret = xfer_upload_gotpkt(scp_sftp_xfer, pktin);
|
Clean up handling of the return value from sftp_find_request. In many
places we simply enforce by assertion that it will match the request
we sent out a moment ago: in fact it can also return NULL, so it makes
more sense to report a proper error message if it doesn't return the
expected value, and while we're at it, have that error message
whatever message was helpfully left in fxp_error() by
sftp_find_request when it failed.
To do this, I've written a centralised function in psftp.c called
sftp_wait_for_reply, which is handed a request that's just been sent
out and deals with the mechanics of waiting for its reply, returning
the reply when it arrives, and aborting with a sensible error if
anything else arrives instead. The numerous sites in psftp.c which
called sftp_find_request have all been rewritten to do this instead,
and as a side effect they now look more sensible. The only other uses
of sftp_find_request were in xfer_*load_gotpkt, which had to be
tweaked in its own way.
While I'm here, also fix memory management in sftp_find_request, which
was freeing its input packet on some but not all error return paths.
[originally from svn r9894]
2013-07-07 00:43:21 +04:00
|
|
|
if (ret <= 0) {
|
2013-07-11 21:24:47 +04:00
|
|
|
tell_user(stderr, "error while writing: %s", fxp_error());
|
2013-07-11 21:24:53 +04:00
|
|
|
if (ret == INT_MIN) /* pktin not even freed */
|
|
|
|
sfree(pktin);
|
2003-09-29 19:39:56 +04:00
|
|
|
errs++;
|
|
|
|
return 1;
|
|
|
|
}
|
2001-08-26 22:32:28 +04:00
|
|
|
}
|
2003-09-29 19:39:56 +04:00
|
|
|
|
|
|
|
xfer_upload_data(scp_sftp_xfer, data, len);
|
|
|
|
|
2001-08-26 22:32:28 +04:00
|
|
|
scp_sftp_fileoffset = uint64_add32(scp_sftp_fileoffset, len);
|
|
|
|
return 0;
|
|
|
|
} else {
|
2002-10-25 15:30:33 +04:00
|
|
|
int bufsize = back->send(backhandle, data, len);
|
2001-08-26 18:53:51 +04:00
|
|
|
|
2001-08-26 22:32:28 +04:00
|
|
|
/*
|
|
|
|
* If the network transfer is backing up - that is, the
|
|
|
|
* remote site is not accepting data as fast as we can
|
|
|
|
* produce it - then we must loop on network events until
|
|
|
|
* we have space in the buffer again.
|
|
|
|
*/
|
|
|
|
while (bufsize > MAX_SCP_BUFSIZE) {
|
2003-08-25 17:53:41 +04:00
|
|
|
if (ssh_sftp_loop_iteration() < 0)
|
2001-08-26 22:32:28 +04:00
|
|
|
return 1;
|
2002-10-25 15:30:33 +04:00
|
|
|
bufsize = back->sendbuffer(backhandle);
|
2001-08-26 22:32:28 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
int scp_send_finish(void)
|
|
|
|
{
|
|
|
|
if (using_sftp) {
|
|
|
|
struct fxp_attrs attrs;
|
2003-06-29 18:26:09 +04:00
|
|
|
struct sftp_packet *pktin;
|
Clean up handling of the return value from sftp_find_request. In many
places we simply enforce by assertion that it will match the request
we sent out a moment ago: in fact it can also return NULL, so it makes
more sense to report a proper error message if it doesn't return the
expected value, and while we're at it, have that error message
whatever message was helpfully left in fxp_error() by
sftp_find_request when it failed.
To do this, I've written a centralised function in psftp.c called
sftp_wait_for_reply, which is handed a request that's just been sent
out and deals with the mechanics of waiting for its reply, returning
the reply when it arrives, and aborting with a sensible error if
anything else arrives instead. The numerous sites in psftp.c which
called sftp_find_request have all been rewritten to do this instead,
and as a side effect they now look more sensible. The only other uses
of sftp_find_request were in xfer_*load_gotpkt, which had to be
tweaked in its own way.
While I'm here, also fix memory management in sftp_find_request, which
was freeing its input packet on some but not all error return paths.
[originally from svn r9894]
2013-07-07 00:43:21 +04:00
|
|
|
struct sftp_request *req;
|
2003-06-29 18:26:09 +04:00
|
|
|
int ret;
|
|
|
|
|
2003-09-29 19:39:56 +04:00
|
|
|
while (!xfer_done(scp_sftp_xfer)) {
|
|
|
|
pktin = sftp_recv();
|
Clean up handling of the return value from sftp_find_request. In many
places we simply enforce by assertion that it will match the request
we sent out a moment ago: in fact it can also return NULL, so it makes
more sense to report a proper error message if it doesn't return the
expected value, and while we're at it, have that error message
whatever message was helpfully left in fxp_error() by
sftp_find_request when it failed.
To do this, I've written a centralised function in psftp.c called
sftp_wait_for_reply, which is handed a request that's just been sent
out and deals with the mechanics of waiting for its reply, returning
the reply when it arrives, and aborting with a sensible error if
anything else arrives instead. The numerous sites in psftp.c which
called sftp_find_request have all been rewritten to do this instead,
and as a side effect they now look more sensible. The only other uses
of sftp_find_request were in xfer_*load_gotpkt, which had to be
tweaked in its own way.
While I'm here, also fix memory management in sftp_find_request, which
was freeing its input packet on some but not all error return paths.
[originally from svn r9894]
2013-07-07 00:43:21 +04:00
|
|
|
ret = xfer_upload_gotpkt(scp_sftp_xfer, pktin);
|
|
|
|
if (ret <= 0) {
|
2013-07-11 21:24:47 +04:00
|
|
|
tell_user(stderr, "error while writing: %s", fxp_error());
|
2013-07-11 21:24:53 +04:00
|
|
|
if (ret == INT_MIN) /* pktin not even freed */
|
|
|
|
sfree(pktin);
|
Clean up handling of the return value from sftp_find_request. In many
places we simply enforce by assertion that it will match the request
we sent out a moment ago: in fact it can also return NULL, so it makes
more sense to report a proper error message if it doesn't return the
expected value, and while we're at it, have that error message
whatever message was helpfully left in fxp_error() by
sftp_find_request when it failed.
To do this, I've written a centralised function in psftp.c called
sftp_wait_for_reply, which is handed a request that's just been sent
out and deals with the mechanics of waiting for its reply, returning
the reply when it arrives, and aborting with a sensible error if
anything else arrives instead. The numerous sites in psftp.c which
called sftp_find_request have all been rewritten to do this instead,
and as a side effect they now look more sensible. The only other uses
of sftp_find_request were in xfer_*load_gotpkt, which had to be
tweaked in its own way.
While I'm here, also fix memory management in sftp_find_request, which
was freeing its input packet on some but not all error return paths.
[originally from svn r9894]
2013-07-07 00:43:21 +04:00
|
|
|
errs++;
|
|
|
|
return 1;
|
|
|
|
}
|
2003-09-29 19:39:56 +04:00
|
|
|
}
|
|
|
|
xfer_cleanup(scp_sftp_xfer);
|
|
|
|
|
2001-08-26 22:32:28 +04:00
|
|
|
if (!scp_sftp_filehandle) {
|
2001-08-26 18:53:51 +04:00
|
|
|
return 1;
|
2001-08-26 22:32:28 +04:00
|
|
|
}
|
|
|
|
if (scp_has_times) {
|
|
|
|
attrs.flags = SSH_FILEXFER_ATTR_ACMODTIME;
|
|
|
|
attrs.atime = scp_sftp_atime;
|
|
|
|
attrs.mtime = scp_sftp_mtime;
|
Clean up handling of the return value from sftp_find_request. In many
places we simply enforce by assertion that it will match the request
we sent out a moment ago: in fact it can also return NULL, so it makes
more sense to report a proper error message if it doesn't return the
expected value, and while we're at it, have that error message
whatever message was helpfully left in fxp_error() by
sftp_find_request when it failed.
To do this, I've written a centralised function in psftp.c called
sftp_wait_for_reply, which is handed a request that's just been sent
out and deals with the mechanics of waiting for its reply, returning
the reply when it arrives, and aborting with a sensible error if
anything else arrives instead. The numerous sites in psftp.c which
called sftp_find_request have all been rewritten to do this instead,
and as a side effect they now look more sensible. The only other uses
of sftp_find_request were in xfer_*load_gotpkt, which had to be
tweaked in its own way.
While I'm here, also fix memory management in sftp_find_request, which
was freeing its input packet on some but not all error return paths.
[originally from svn r9894]
2013-07-07 00:43:21 +04:00
|
|
|
req = fxp_fsetstat_send(scp_sftp_filehandle, attrs);
|
|
|
|
pktin = sftp_wait_for_reply(req);
|
|
|
|
ret = fxp_fsetstat_recv(pktin, req);
|
2003-06-29 18:26:09 +04:00
|
|
|
if (!ret) {
|
2013-07-11 21:24:47 +04:00
|
|
|
tell_user(stderr, "unable to set file times: %s", fxp_error());
|
2001-08-26 22:32:28 +04:00
|
|
|
errs++;
|
|
|
|
}
|
|
|
|
}
|
Clean up handling of the return value from sftp_find_request. In many
places we simply enforce by assertion that it will match the request
we sent out a moment ago: in fact it can also return NULL, so it makes
more sense to report a proper error message if it doesn't return the
expected value, and while we're at it, have that error message
whatever message was helpfully left in fxp_error() by
sftp_find_request when it failed.
To do this, I've written a centralised function in psftp.c called
sftp_wait_for_reply, which is handed a request that's just been sent
out and deals with the mechanics of waiting for its reply, returning
the reply when it arrives, and aborting with a sensible error if
anything else arrives instead. The numerous sites in psftp.c which
called sftp_find_request have all been rewritten to do this instead,
and as a side effect they now look more sensible. The only other uses
of sftp_find_request were in xfer_*load_gotpkt, which had to be
tweaked in its own way.
While I'm here, also fix memory management in sftp_find_request, which
was freeing its input packet on some but not all error return paths.
[originally from svn r9894]
2013-07-07 00:43:21 +04:00
|
|
|
req = fxp_close_send(scp_sftp_filehandle);
|
|
|
|
pktin = sftp_wait_for_reply(req);
|
|
|
|
fxp_close_recv(pktin, req);
|
2001-08-26 22:32:28 +04:00
|
|
|
scp_has_times = 0;
|
|
|
|
return 0;
|
|
|
|
} else {
|
2002-10-25 15:30:33 +04:00
|
|
|
back->send(backhandle, "", 1);
|
2001-08-26 22:32:28 +04:00
|
|
|
return response();
|
2001-08-26 18:53:51 +04:00
|
|
|
}
|
2001-08-26 22:32:28 +04:00
|
|
|
}
|
2001-08-26 18:53:51 +04:00
|
|
|
|
2001-08-26 22:32:28 +04:00
|
|
|
char *scp_save_remotepath(void)
|
|
|
|
{
|
|
|
|
if (using_sftp)
|
|
|
|
return scp_sftp_remotepath;
|
|
|
|
else
|
|
|
|
return NULL;
|
2001-08-26 18:53:51 +04:00
|
|
|
}
|
|
|
|
|
2001-08-26 22:32:28 +04:00
|
|
|
void scp_restore_remotepath(char *data)
|
2001-08-26 18:53:51 +04:00
|
|
|
{
|
2001-08-26 22:32:28 +04:00
|
|
|
if (using_sftp)
|
|
|
|
scp_sftp_remotepath = data;
|
2001-08-26 18:53:51 +04:00
|
|
|
}
|
|
|
|
|
2015-05-15 13:15:42 +03:00
|
|
|
int scp_send_dirname(const char *name, int modes)
|
2001-08-26 18:53:51 +04:00
|
|
|
{
|
2001-08-26 22:32:28 +04:00
|
|
|
if (using_sftp) {
|
|
|
|
char *fullname;
|
|
|
|
char const *err;
|
|
|
|
struct fxp_attrs attrs;
|
2003-06-29 18:26:09 +04:00
|
|
|
struct sftp_packet *pktin;
|
Clean up handling of the return value from sftp_find_request. In many
places we simply enforce by assertion that it will match the request
we sent out a moment ago: in fact it can also return NULL, so it makes
more sense to report a proper error message if it doesn't return the
expected value, and while we're at it, have that error message
whatever message was helpfully left in fxp_error() by
sftp_find_request when it failed.
To do this, I've written a centralised function in psftp.c called
sftp_wait_for_reply, which is handed a request that's just been sent
out and deals with the mechanics of waiting for its reply, returning
the reply when it arrives, and aborting with a sensible error if
anything else arrives instead. The numerous sites in psftp.c which
called sftp_find_request have all been rewritten to do this instead,
and as a side effect they now look more sensible. The only other uses
of sftp_find_request were in xfer_*load_gotpkt, which had to be
tweaked in its own way.
While I'm here, also fix memory management in sftp_find_request, which
was freeing its input packet on some but not all error return paths.
[originally from svn r9894]
2013-07-07 00:43:21 +04:00
|
|
|
struct sftp_request *req;
|
2003-06-29 18:26:09 +04:00
|
|
|
int ret;
|
|
|
|
|
2001-08-26 22:32:28 +04:00
|
|
|
if (scp_sftp_targetisdir) {
|
|
|
|
fullname = dupcat(scp_sftp_remotepath, "/", name, NULL);
|
|
|
|
} else {
|
|
|
|
fullname = dupstr(scp_sftp_remotepath);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* We don't worry about whether we managed to create the
|
|
|
|
* directory, because if it exists already it's OK just to
|
|
|
|
* use it. Instead, we will stat it afterwards, and if it
|
|
|
|
* exists and is a directory we will assume we were either
|
|
|
|
* successful or it didn't matter.
|
|
|
|
*/
|
Clean up handling of the return value from sftp_find_request. In many
places we simply enforce by assertion that it will match the request
we sent out a moment ago: in fact it can also return NULL, so it makes
more sense to report a proper error message if it doesn't return the
expected value, and while we're at it, have that error message
whatever message was helpfully left in fxp_error() by
sftp_find_request when it failed.
To do this, I've written a centralised function in psftp.c called
sftp_wait_for_reply, which is handed a request that's just been sent
out and deals with the mechanics of waiting for its reply, returning
the reply when it arrives, and aborting with a sensible error if
anything else arrives instead. The numerous sites in psftp.c which
called sftp_find_request have all been rewritten to do this instead,
and as a side effect they now look more sensible. The only other uses
of sftp_find_request were in xfer_*load_gotpkt, which had to be
tweaked in its own way.
While I'm here, also fix memory management in sftp_find_request, which
was freeing its input packet on some but not all error return paths.
[originally from svn r9894]
2013-07-07 00:43:21 +04:00
|
|
|
req = fxp_mkdir_send(fullname);
|
|
|
|
pktin = sftp_wait_for_reply(req);
|
|
|
|
ret = fxp_mkdir_recv(pktin, req);
|
2003-06-29 18:26:09 +04:00
|
|
|
|
|
|
|
if (!ret)
|
2001-08-26 22:32:28 +04:00
|
|
|
err = fxp_error();
|
|
|
|
else
|
|
|
|
err = "server reported no error";
|
2003-06-29 18:26:09 +04:00
|
|
|
|
Clean up handling of the return value from sftp_find_request. In many
places we simply enforce by assertion that it will match the request
we sent out a moment ago: in fact it can also return NULL, so it makes
more sense to report a proper error message if it doesn't return the
expected value, and while we're at it, have that error message
whatever message was helpfully left in fxp_error() by
sftp_find_request when it failed.
To do this, I've written a centralised function in psftp.c called
sftp_wait_for_reply, which is handed a request that's just been sent
out and deals with the mechanics of waiting for its reply, returning
the reply when it arrives, and aborting with a sensible error if
anything else arrives instead. The numerous sites in psftp.c which
called sftp_find_request have all been rewritten to do this instead,
and as a side effect they now look more sensible. The only other uses
of sftp_find_request were in xfer_*load_gotpkt, which had to be
tweaked in its own way.
While I'm here, also fix memory management in sftp_find_request, which
was freeing its input packet on some but not all error return paths.
[originally from svn r9894]
2013-07-07 00:43:21 +04:00
|
|
|
req = fxp_stat_send(fullname);
|
|
|
|
pktin = sftp_wait_for_reply(req);
|
|
|
|
ret = fxp_stat_recv(pktin, req, &attrs);
|
2003-06-29 18:26:09 +04:00
|
|
|
|
|
|
|
if (!ret || !(attrs.flags & SSH_FILEXFER_ATTR_PERMISSIONS) ||
|
2001-08-26 22:32:28 +04:00
|
|
|
!(attrs.permissions & 0040000)) {
|
|
|
|
tell_user(stderr, "unable to create directory %s: %s",
|
|
|
|
fullname, err);
|
2013-07-11 21:43:41 +04:00
|
|
|
sfree(fullname);
|
2001-08-26 22:32:28 +04:00
|
|
|
errs++;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
scp_sftp_remotepath = fullname;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
} else {
|
|
|
|
char buf[40];
|
|
|
|
sprintf(buf, "D%04o 0 ", modes);
|
2002-10-25 15:30:33 +04:00
|
|
|
back->send(backhandle, buf, strlen(buf));
|
|
|
|
back->send(backhandle, name, strlen(name));
|
|
|
|
back->send(backhandle, "\n", 1);
|
2001-08-26 22:32:28 +04:00
|
|
|
return response();
|
|
|
|
}
|
2001-08-26 18:53:51 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
int scp_send_enddir(void)
|
|
|
|
{
|
2001-08-26 22:32:28 +04:00
|
|
|
if (using_sftp) {
|
|
|
|
sfree(scp_sftp_remotepath);
|
|
|
|
return 0;
|
|
|
|
} else {
|
2002-10-25 15:30:33 +04:00
|
|
|
back->send(backhandle, "E\n", 2);
|
2001-08-26 22:32:28 +04:00
|
|
|
return response();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Yes, I know; I have an scp_sink_setup _and_ an scp_sink_init.
|
|
|
|
* That's bad. The difference is that scp_sink_setup is called once
|
|
|
|
* right at the start, whereas scp_sink_init is called to
|
|
|
|
* initialise every level of recursion in the protocol.
|
|
|
|
*/
|
2015-05-15 13:15:42 +03:00
|
|
|
int scp_sink_setup(const char *source, int preserve, int recursive)
|
2001-08-26 22:32:28 +04:00
|
|
|
{
|
|
|
|
if (using_sftp) {
|
2001-08-27 14:17:41 +04:00
|
|
|
char *newsource;
|
2002-04-10 23:54:42 +04:00
|
|
|
|
|
|
|
if (!fxp_init()) {
|
|
|
|
tell_user(stderr, "unable to initialise SFTP: %s", fxp_error());
|
|
|
|
errs++;
|
|
|
|
return 1;
|
|
|
|
}
|
2001-08-27 14:17:41 +04:00
|
|
|
/*
|
|
|
|
* It's possible that the source string we've been given
|
|
|
|
* contains a wildcard. If so, we must split the directory
|
|
|
|
* away from the wildcard itself (throwing an error if any
|
|
|
|
* wildcardness comes before the final slash) and arrange
|
|
|
|
* things so that a dirstack entry will be set up.
|
|
|
|
*/
|
2003-03-29 19:14:26 +03:00
|
|
|
newsource = snewn(1+strlen(source), char);
|
2001-08-27 14:17:41 +04:00
|
|
|
if (!wc_unescape(newsource, source)) {
|
|
|
|
/* Yes, here we go; it's a wildcard. Bah. */
|
|
|
|
char *dupsource, *lastpart, *dirpart, *wildcard;
|
2013-07-14 14:46:07 +04:00
|
|
|
|
|
|
|
sfree(newsource);
|
|
|
|
|
2001-08-27 14:17:41 +04:00
|
|
|
dupsource = dupstr(source);
|
|
|
|
lastpart = stripslashes(dupsource, 0);
|
|
|
|
wildcard = dupstr(lastpart);
|
|
|
|
*lastpart = '\0';
|
|
|
|
if (*dupsource && dupsource[1]) {
|
|
|
|
/*
|
|
|
|
* The remains of dupsource are at least two
|
|
|
|
* characters long, meaning the pathname wasn't
|
|
|
|
* empty or just `/'. Hence, we remove the trailing
|
|
|
|
* slash.
|
|
|
|
*/
|
|
|
|
lastpart[-1] = '\0';
|
2001-08-27 18:51:31 +04:00
|
|
|
} else if (!*dupsource) {
|
|
|
|
/*
|
|
|
|
* The remains of dupsource are _empty_ - the whole
|
|
|
|
* pathname was a wildcard. Hence we need to
|
|
|
|
* replace it with ".".
|
|
|
|
*/
|
|
|
|
sfree(dupsource);
|
|
|
|
dupsource = dupstr(".");
|
2001-08-27 14:17:41 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Now we have separated our string into dupsource (the
|
|
|
|
* directory part) and wildcard. Both of these will
|
|
|
|
* need freeing at some point. Next step is to remove
|
|
|
|
* wildcard escapes from the directory part, throwing
|
|
|
|
* an error if it contains a real wildcard.
|
|
|
|
*/
|
2003-03-29 19:14:26 +03:00
|
|
|
dirpart = snewn(1+strlen(dupsource), char);
|
2001-08-27 14:17:41 +04:00
|
|
|
if (!wc_unescape(dirpart, dupsource)) {
|
|
|
|
tell_user(stderr, "%s: multiple-level wildcards unsupported",
|
|
|
|
source);
|
|
|
|
errs++;
|
|
|
|
sfree(dirpart);
|
|
|
|
sfree(wildcard);
|
|
|
|
sfree(dupsource);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Now we have dirpart (unescaped, ie a valid remote
|
|
|
|
* path), and wildcard (a wildcard). This will be
|
|
|
|
* sufficient to arrange a dirstack entry.
|
|
|
|
*/
|
|
|
|
scp_sftp_remotepath = dirpart;
|
|
|
|
scp_sftp_wildcard = wildcard;
|
|
|
|
sfree(dupsource);
|
|
|
|
} else {
|
|
|
|
scp_sftp_remotepath = newsource;
|
|
|
|
scp_sftp_wildcard = NULL;
|
|
|
|
}
|
2001-08-26 22:32:28 +04:00
|
|
|
scp_sftp_preserve = preserve;
|
|
|
|
scp_sftp_recursive = recursive;
|
|
|
|
scp_sftp_donethistarget = 0;
|
|
|
|
scp_sftp_dirstack_head = NULL;
|
|
|
|
}
|
2001-08-27 14:17:41 +04:00
|
|
|
return 0;
|
2001-08-26 18:53:51 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
int scp_sink_init(void)
|
|
|
|
{
|
2001-08-26 22:32:28 +04:00
|
|
|
if (!using_sftp) {
|
2002-10-25 15:30:33 +04:00
|
|
|
back->send(backhandle, "", 1);
|
2001-08-26 22:32:28 +04:00
|
|
|
}
|
2001-08-26 18:53:51 +04:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
#define SCP_SINK_FILE 1
|
|
|
|
#define SCP_SINK_DIR 2
|
|
|
|
#define SCP_SINK_ENDDIR 3
|
2001-08-27 14:17:41 +04:00
|
|
|
#define SCP_SINK_RETRY 4 /* not an action; just try again */
|
2001-08-26 18:53:51 +04:00
|
|
|
struct scp_sink_action {
|
|
|
|
int action; /* FILE, DIR, ENDDIR */
|
|
|
|
char *buf; /* will need freeing after use */
|
|
|
|
char *name; /* filename or dirname (not ENDDIR) */
|
2011-08-11 21:59:30 +04:00
|
|
|
long permissions; /* access permissions (not ENDDIR) */
|
2006-08-12 19:20:19 +04:00
|
|
|
uint64 size; /* file size (not ENDDIR) */
|
2001-08-26 18:53:51 +04:00
|
|
|
int settime; /* 1 if atime and mtime are filled */
|
|
|
|
unsigned long atime, mtime; /* access times for the file */
|
|
|
|
};
|
|
|
|
|
|
|
|
int scp_get_sink_action(struct scp_sink_action *act)
|
|
|
|
{
|
2001-08-26 22:32:28 +04:00
|
|
|
if (using_sftp) {
|
|
|
|
char *fname;
|
|
|
|
int must_free_fname;
|
|
|
|
struct fxp_attrs attrs;
|
2003-06-29 18:26:09 +04:00
|
|
|
struct sftp_packet *pktin;
|
Clean up handling of the return value from sftp_find_request. In many
places we simply enforce by assertion that it will match the request
we sent out a moment ago: in fact it can also return NULL, so it makes
more sense to report a proper error message if it doesn't return the
expected value, and while we're at it, have that error message
whatever message was helpfully left in fxp_error() by
sftp_find_request when it failed.
To do this, I've written a centralised function in psftp.c called
sftp_wait_for_reply, which is handed a request that's just been sent
out and deals with the mechanics of waiting for its reply, returning
the reply when it arrives, and aborting with a sensible error if
anything else arrives instead. The numerous sites in psftp.c which
called sftp_find_request have all been rewritten to do this instead,
and as a side effect they now look more sensible. The only other uses
of sftp_find_request were in xfer_*load_gotpkt, which had to be
tweaked in its own way.
While I'm here, also fix memory management in sftp_find_request, which
was freeing its input packet on some but not all error return paths.
[originally from svn r9894]
2013-07-07 00:43:21 +04:00
|
|
|
struct sftp_request *req;
|
2001-08-26 22:32:28 +04:00
|
|
|
int ret;
|
|
|
|
|
|
|
|
if (!scp_sftp_dirstack_head) {
|
|
|
|
if (!scp_sftp_donethistarget) {
|
|
|
|
/*
|
|
|
|
* Simple case: we are only dealing with one file.
|
|
|
|
*/
|
|
|
|
fname = scp_sftp_remotepath;
|
|
|
|
must_free_fname = 0;
|
|
|
|
scp_sftp_donethistarget = 1;
|
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* Even simpler case: one file _which we've done_.
|
|
|
|
* Return 1 (finished).
|
|
|
|
*/
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* We're now in the middle of stepping through a list
|
|
|
|
* of names returned from fxp_readdir(); so let's carry
|
|
|
|
* on.
|
|
|
|
*/
|
|
|
|
struct scp_sftp_dirstack *head = scp_sftp_dirstack_head;
|
|
|
|
while (head->namepos < head->namelen &&
|
2001-08-27 14:17:41 +04:00
|
|
|
(is_dots(head->names[head->namepos].filename) ||
|
|
|
|
(head->wildcard &&
|
|
|
|
!wc_match(head->wildcard,
|
|
|
|
head->names[head->namepos].filename))))
|
2001-08-26 22:32:28 +04:00
|
|
|
head->namepos++; /* skip . and .. */
|
|
|
|
if (head->namepos < head->namelen) {
|
2001-09-05 23:33:12 +04:00
|
|
|
head->matched_something = 1;
|
2001-08-26 22:32:28 +04:00
|
|
|
fname = dupcat(head->dirpath, "/",
|
|
|
|
head->names[head->namepos++].filename,
|
|
|
|
NULL);
|
|
|
|
must_free_fname = 1;
|
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* We've come to the end of the list; pop it off
|
2001-08-27 14:17:41 +04:00
|
|
|
* the stack and return an ENDDIR action (or RETRY
|
|
|
|
* if this was a wildcard match).
|
2001-08-26 22:32:28 +04:00
|
|
|
*/
|
2001-08-27 14:17:41 +04:00
|
|
|
if (head->wildcard) {
|
|
|
|
act->action = SCP_SINK_RETRY;
|
2001-09-05 23:33:12 +04:00
|
|
|
if (!head->matched_something) {
|
|
|
|
tell_user(stderr, "pscp: wildcard '%s' matched "
|
|
|
|
"no files", head->wildcard);
|
|
|
|
errs++;
|
|
|
|
}
|
2001-08-27 14:17:41 +04:00
|
|
|
sfree(head->wildcard);
|
2001-09-05 23:33:12 +04:00
|
|
|
|
2001-08-27 14:17:41 +04:00
|
|
|
} else {
|
|
|
|
act->action = SCP_SINK_ENDDIR;
|
|
|
|
}
|
|
|
|
|
2001-08-26 22:32:28 +04:00
|
|
|
sfree(head->dirpath);
|
|
|
|
sfree(head->names);
|
|
|
|
scp_sftp_dirstack_head = head->next;
|
|
|
|
sfree(head);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
2001-08-27 19:02:52 +04:00
|
|
|
|
2001-08-26 22:32:28 +04:00
|
|
|
/*
|
|
|
|
* Now we have a filename. Stat it, and see if it's a file
|
|
|
|
* or a directory.
|
|
|
|
*/
|
Clean up handling of the return value from sftp_find_request. In many
places we simply enforce by assertion that it will match the request
we sent out a moment ago: in fact it can also return NULL, so it makes
more sense to report a proper error message if it doesn't return the
expected value, and while we're at it, have that error message
whatever message was helpfully left in fxp_error() by
sftp_find_request when it failed.
To do this, I've written a centralised function in psftp.c called
sftp_wait_for_reply, which is handed a request that's just been sent
out and deals with the mechanics of waiting for its reply, returning
the reply when it arrives, and aborting with a sensible error if
anything else arrives instead. The numerous sites in psftp.c which
called sftp_find_request have all been rewritten to do this instead,
and as a side effect they now look more sensible. The only other uses
of sftp_find_request were in xfer_*load_gotpkt, which had to be
tweaked in its own way.
While I'm here, also fix memory management in sftp_find_request, which
was freeing its input packet on some but not all error return paths.
[originally from svn r9894]
2013-07-07 00:43:21 +04:00
|
|
|
req = fxp_stat_send(fname);
|
|
|
|
pktin = sftp_wait_for_reply(req);
|
|
|
|
ret = fxp_stat_recv(pktin, req, &attrs);
|
2003-06-29 18:26:09 +04:00
|
|
|
|
2001-08-26 22:32:28 +04:00
|
|
|
if (!ret || !(attrs.flags & SSH_FILEXFER_ATTR_PERMISSIONS)) {
|
|
|
|
tell_user(stderr, "unable to identify %s: %s", fname,
|
|
|
|
ret ? "file type not supplied" : fxp_error());
|
2013-07-11 21:43:41 +04:00
|
|
|
if (must_free_fname) sfree(fname);
|
2001-08-26 22:32:28 +04:00
|
|
|
errs++;
|
2001-08-26 18:53:51 +04:00
|
|
|
return 1;
|
2001-08-26 22:32:28 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
if (attrs.permissions & 0040000) {
|
|
|
|
struct scp_sftp_dirstack *newitem;
|
|
|
|
struct fxp_handle *dirhandle;
|
|
|
|
int nnames, namesize;
|
|
|
|
struct fxp_name *ournames;
|
|
|
|
struct fxp_names *names;
|
|
|
|
|
|
|
|
/*
|
2001-08-27 14:24:55 +04:00
|
|
|
* It's a directory. If we're not in recursive mode,
|
|
|
|
* this merits a complaint (which is fatal if the name
|
|
|
|
* was specified directly, but not if it was matched by
|
|
|
|
* a wildcard).
|
|
|
|
*
|
|
|
|
* We skip this complaint completely if
|
|
|
|
* scp_sftp_wildcard is set, because that's an
|
|
|
|
* indication that we're not actually supposed to
|
|
|
|
* _recursively_ transfer the dir, just scan it for
|
|
|
|
* things matching the wildcard.
|
2001-08-26 22:32:28 +04:00
|
|
|
*/
|
2001-08-27 14:17:41 +04:00
|
|
|
if (!scp_sftp_recursive && !scp_sftp_wildcard) {
|
2001-08-26 22:32:28 +04:00
|
|
|
tell_user(stderr, "pscp: %s: is a directory", fname);
|
|
|
|
errs++;
|
|
|
|
if (must_free_fname) sfree(fname);
|
2001-08-27 14:24:55 +04:00
|
|
|
if (scp_sftp_dirstack_head) {
|
|
|
|
act->action = SCP_SINK_RETRY;
|
|
|
|
return 0;
|
|
|
|
} else {
|
|
|
|
return 1;
|
|
|
|
}
|
2001-08-26 18:53:51 +04:00
|
|
|
}
|
2001-08-26 22:32:28 +04:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Otherwise, the fun begins. We must fxp_opendir() the
|
|
|
|
* directory, slurp the filenames into memory, return
|
2001-08-27 14:17:41 +04:00
|
|
|
* SCP_SINK_DIR (unless this is a wildcard match), and
|
|
|
|
* set targetisdir. The next time we're called, we will
|
|
|
|
* run through the list of filenames one by one,
|
|
|
|
* matching them against a wildcard if present.
|
2001-08-26 22:32:28 +04:00
|
|
|
*
|
|
|
|
* If targetisdir is _already_ set (meaning we're
|
|
|
|
* already in the middle of going through another such
|
|
|
|
* list), we must push the other (target,namelist) pair
|
|
|
|
* on a stack.
|
|
|
|
*/
|
Clean up handling of the return value from sftp_find_request. In many
places we simply enforce by assertion that it will match the request
we sent out a moment ago: in fact it can also return NULL, so it makes
more sense to report a proper error message if it doesn't return the
expected value, and while we're at it, have that error message
whatever message was helpfully left in fxp_error() by
sftp_find_request when it failed.
To do this, I've written a centralised function in psftp.c called
sftp_wait_for_reply, which is handed a request that's just been sent
out and deals with the mechanics of waiting for its reply, returning
the reply when it arrives, and aborting with a sensible error if
anything else arrives instead. The numerous sites in psftp.c which
called sftp_find_request have all been rewritten to do this instead,
and as a side effect they now look more sensible. The only other uses
of sftp_find_request were in xfer_*load_gotpkt, which had to be
tweaked in its own way.
While I'm here, also fix memory management in sftp_find_request, which
was freeing its input packet on some but not all error return paths.
[originally from svn r9894]
2013-07-07 00:43:21 +04:00
|
|
|
req = fxp_opendir_send(fname);
|
|
|
|
pktin = sftp_wait_for_reply(req);
|
|
|
|
dirhandle = fxp_opendir_recv(pktin, req);
|
2003-06-29 18:26:09 +04:00
|
|
|
|
2001-08-26 22:32:28 +04:00
|
|
|
if (!dirhandle) {
|
2013-07-11 21:24:47 +04:00
|
|
|
tell_user(stderr, "pscp: unable to open directory %s: %s",
|
2001-08-26 22:32:28 +04:00
|
|
|
fname, fxp_error());
|
|
|
|
if (must_free_fname) sfree(fname);
|
|
|
|
errs++;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
nnames = namesize = 0;
|
|
|
|
ournames = NULL;
|
|
|
|
while (1) {
|
|
|
|
int i;
|
|
|
|
|
Clean up handling of the return value from sftp_find_request. In many
places we simply enforce by assertion that it will match the request
we sent out a moment ago: in fact it can also return NULL, so it makes
more sense to report a proper error message if it doesn't return the
expected value, and while we're at it, have that error message
whatever message was helpfully left in fxp_error() by
sftp_find_request when it failed.
To do this, I've written a centralised function in psftp.c called
sftp_wait_for_reply, which is handed a request that's just been sent
out and deals with the mechanics of waiting for its reply, returning
the reply when it arrives, and aborting with a sensible error if
anything else arrives instead. The numerous sites in psftp.c which
called sftp_find_request have all been rewritten to do this instead,
and as a side effect they now look more sensible. The only other uses
of sftp_find_request were in xfer_*load_gotpkt, which had to be
tweaked in its own way.
While I'm here, also fix memory management in sftp_find_request, which
was freeing its input packet on some but not all error return paths.
[originally from svn r9894]
2013-07-07 00:43:21 +04:00
|
|
|
req = fxp_readdir_send(dirhandle);
|
|
|
|
pktin = sftp_wait_for_reply(req);
|
|
|
|
names = fxp_readdir_recv(pktin, req);
|
2003-06-29 18:26:09 +04:00
|
|
|
|
2001-08-26 22:32:28 +04:00
|
|
|
if (names == NULL) {
|
|
|
|
if (fxp_error_type() == SSH_FX_EOF)
|
|
|
|
break;
|
2013-07-11 21:24:47 +04:00
|
|
|
tell_user(stderr, "pscp: reading directory %s: %s",
|
2001-08-26 22:32:28 +04:00
|
|
|
fname, fxp_error());
|
2013-07-11 21:24:44 +04:00
|
|
|
|
|
|
|
req = fxp_close_send(dirhandle);
|
|
|
|
pktin = sftp_wait_for_reply(req);
|
|
|
|
fxp_close_recv(pktin, req);
|
|
|
|
|
2001-08-26 22:32:28 +04:00
|
|
|
if (must_free_fname) sfree(fname);
|
|
|
|
sfree(ournames);
|
|
|
|
errs++;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
if (names->nnames == 0) {
|
|
|
|
fxp_free_names(names);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (nnames + names->nnames >= namesize) {
|
|
|
|
namesize += names->nnames + 128;
|
2003-03-29 19:14:26 +03:00
|
|
|
ournames = sresize(ournames, namesize, struct fxp_name);
|
2001-08-26 22:32:28 +04:00
|
|
|
}
|
2004-12-16 22:36:47 +03:00
|
|
|
for (i = 0; i < names->nnames; i++) {
|
|
|
|
if (!strcmp(names->names[i].filename, ".") ||
|
|
|
|
!strcmp(names->names[i].filename, "..")) {
|
|
|
|
/*
|
|
|
|
* . and .. are normal consequences of
|
|
|
|
* reading a directory, and aren't worth
|
|
|
|
* complaining about.
|
|
|
|
*/
|
|
|
|
} else if (!vet_filename(names->names[i].filename)) {
|
|
|
|
tell_user(stderr, "ignoring potentially dangerous server-"
|
2013-07-11 21:24:47 +04:00
|
|
|
"supplied filename '%s'",
|
2004-12-16 22:36:47 +03:00
|
|
|
names->names[i].filename);
|
|
|
|
} else
|
|
|
|
ournames[nnames++] = names->names[i];
|
|
|
|
}
|
2001-08-26 22:32:28 +04:00
|
|
|
names->nnames = 0; /* prevent free_names */
|
|
|
|
fxp_free_names(names);
|
|
|
|
}
|
Clean up handling of the return value from sftp_find_request. In many
places we simply enforce by assertion that it will match the request
we sent out a moment ago: in fact it can also return NULL, so it makes
more sense to report a proper error message if it doesn't return the
expected value, and while we're at it, have that error message
whatever message was helpfully left in fxp_error() by
sftp_find_request when it failed.
To do this, I've written a centralised function in psftp.c called
sftp_wait_for_reply, which is handed a request that's just been sent
out and deals with the mechanics of waiting for its reply, returning
the reply when it arrives, and aborting with a sensible error if
anything else arrives instead. The numerous sites in psftp.c which
called sftp_find_request have all been rewritten to do this instead,
and as a side effect they now look more sensible. The only other uses
of sftp_find_request were in xfer_*load_gotpkt, which had to be
tweaked in its own way.
While I'm here, also fix memory management in sftp_find_request, which
was freeing its input packet on some but not all error return paths.
[originally from svn r9894]
2013-07-07 00:43:21 +04:00
|
|
|
req = fxp_close_send(dirhandle);
|
|
|
|
pktin = sftp_wait_for_reply(req);
|
|
|
|
fxp_close_recv(pktin, req);
|
2001-08-26 22:32:28 +04:00
|
|
|
|
2003-03-29 19:14:26 +03:00
|
|
|
newitem = snew(struct scp_sftp_dirstack);
|
2001-08-26 22:32:28 +04:00
|
|
|
newitem->next = scp_sftp_dirstack_head;
|
|
|
|
newitem->names = ournames;
|
|
|
|
newitem->namepos = 0;
|
|
|
|
newitem->namelen = nnames;
|
|
|
|
if (must_free_fname)
|
|
|
|
newitem->dirpath = fname;
|
|
|
|
else
|
|
|
|
newitem->dirpath = dupstr(fname);
|
2001-08-27 14:17:41 +04:00
|
|
|
if (scp_sftp_wildcard) {
|
|
|
|
newitem->wildcard = scp_sftp_wildcard;
|
2001-09-05 23:33:12 +04:00
|
|
|
newitem->matched_something = 0;
|
2001-08-27 14:17:41 +04:00
|
|
|
scp_sftp_wildcard = NULL;
|
|
|
|
} else {
|
|
|
|
newitem->wildcard = NULL;
|
|
|
|
}
|
2001-08-26 22:32:28 +04:00
|
|
|
scp_sftp_dirstack_head = newitem;
|
|
|
|
|
2001-08-27 14:17:41 +04:00
|
|
|
if (newitem->wildcard) {
|
|
|
|
act->action = SCP_SINK_RETRY;
|
|
|
|
} else {
|
|
|
|
act->action = SCP_SINK_DIR;
|
|
|
|
act->buf = dupstr(stripslashes(fname, 0));
|
|
|
|
act->name = act->buf;
|
2006-08-12 19:20:19 +04:00
|
|
|
act->size = uint64_make(0,0); /* duhh, it's a directory */
|
2011-08-11 21:59:30 +04:00
|
|
|
act->permissions = 07777 & attrs.permissions;
|
2001-08-27 14:17:41 +04:00
|
|
|
if (scp_sftp_preserve &&
|
|
|
|
(attrs.flags & SSH_FILEXFER_ATTR_ACMODTIME)) {
|
|
|
|
act->atime = attrs.atime;
|
|
|
|
act->mtime = attrs.mtime;
|
|
|
|
act->settime = 1;
|
|
|
|
} else
|
|
|
|
act->settime = 0;
|
|
|
|
}
|
2001-08-26 18:53:51 +04:00
|
|
|
return 0;
|
2001-08-26 22:32:28 +04:00
|
|
|
|
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* It's a file. Return SCP_SINK_FILE.
|
|
|
|
*/
|
|
|
|
act->action = SCP_SINK_FILE;
|
2001-08-27 14:17:41 +04:00
|
|
|
act->buf = dupstr(stripslashes(fname, 0));
|
2001-08-26 22:32:28 +04:00
|
|
|
act->name = act->buf;
|
|
|
|
if (attrs.flags & SSH_FILEXFER_ATTR_SIZE) {
|
2006-08-12 19:20:19 +04:00
|
|
|
act->size = attrs.size;
|
2001-08-26 22:32:28 +04:00
|
|
|
} else
|
2006-08-12 19:20:19 +04:00
|
|
|
act->size = uint64_make(ULONG_MAX,ULONG_MAX); /* no idea */
|
2011-08-11 21:59:30 +04:00
|
|
|
act->permissions = 07777 & attrs.permissions;
|
2001-08-26 22:32:28 +04:00
|
|
|
if (scp_sftp_preserve &&
|
|
|
|
(attrs.flags & SSH_FILEXFER_ATTR_ACMODTIME)) {
|
|
|
|
act->atime = attrs.atime;
|
|
|
|
act->mtime = attrs.mtime;
|
2001-08-26 18:53:51 +04:00
|
|
|
act->settime = 1;
|
2001-08-26 22:32:28 +04:00
|
|
|
} else
|
|
|
|
act->settime = 0;
|
|
|
|
if (must_free_fname)
|
|
|
|
scp_sftp_currentname = fname;
|
|
|
|
else
|
|
|
|
scp_sftp_currentname = dupstr(fname);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
} else {
|
|
|
|
int done = 0;
|
|
|
|
int i, bufsize;
|
|
|
|
int action;
|
|
|
|
char ch;
|
|
|
|
|
|
|
|
act->settime = 0;
|
|
|
|
act->buf = NULL;
|
|
|
|
bufsize = 0;
|
|
|
|
|
|
|
|
while (!done) {
|
2018-05-26 10:31:34 +03:00
|
|
|
if (ssh_scp_recv(&ch, 1) <= 0)
|
2001-08-26 22:32:28 +04:00
|
|
|
return 1;
|
|
|
|
if (ch == '\n')
|
|
|
|
bump("Protocol error: Unexpected newline");
|
|
|
|
i = 0;
|
|
|
|
action = ch;
|
|
|
|
do {
|
2018-05-26 10:31:34 +03:00
|
|
|
if (ssh_scp_recv(&ch, 1) <= 0)
|
2001-08-26 22:32:28 +04:00
|
|
|
bump("Lost connection");
|
|
|
|
if (i >= bufsize) {
|
|
|
|
bufsize = i + 128;
|
2003-03-29 19:14:26 +03:00
|
|
|
act->buf = sresize(act->buf, bufsize, char);
|
2001-08-26 22:32:28 +04:00
|
|
|
}
|
|
|
|
act->buf[i++] = ch;
|
|
|
|
} while (ch != '\n');
|
|
|
|
act->buf[i - 1] = '\0';
|
|
|
|
switch (action) {
|
|
|
|
case '\01': /* error */
|
2013-07-11 21:24:47 +04:00
|
|
|
tell_user(stderr, "%s", act->buf);
|
2001-08-26 22:32:28 +04:00
|
|
|
errs++;
|
|
|
|
continue; /* go round again */
|
|
|
|
case '\02': /* fatal error */
|
|
|
|
bump("%s", act->buf);
|
|
|
|
case 'E':
|
2002-10-25 15:30:33 +04:00
|
|
|
back->send(backhandle, "", 1);
|
2001-08-26 22:32:28 +04:00
|
|
|
act->action = SCP_SINK_ENDDIR;
|
|
|
|
return 0;
|
|
|
|
case 'T':
|
2017-06-20 09:05:39 +03:00
|
|
|
if (sscanf(act->buf, "%lu %*d %lu %*d",
|
2001-08-26 22:32:28 +04:00
|
|
|
&act->mtime, &act->atime) == 2) {
|
|
|
|
act->settime = 1;
|
2002-10-25 15:30:33 +04:00
|
|
|
back->send(backhandle, "", 1);
|
2001-08-26 22:32:28 +04:00
|
|
|
continue; /* go round again */
|
|
|
|
}
|
|
|
|
bump("Protocol error: Illegal time format");
|
|
|
|
case 'C':
|
|
|
|
case 'D':
|
|
|
|
act->action = (action == 'C' ? SCP_SINK_FILE : SCP_SINK_DIR);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
bump("Protocol error: Expected control record");
|
2001-08-26 18:53:51 +04:00
|
|
|
}
|
2001-08-26 22:32:28 +04:00
|
|
|
/*
|
|
|
|
* We will go round this loop only once, unless we hit
|
|
|
|
* `continue' above.
|
|
|
|
*/
|
|
|
|
done = 1;
|
2001-08-26 18:53:51 +04:00
|
|
|
}
|
2001-08-26 22:32:28 +04:00
|
|
|
|
2001-08-26 18:53:51 +04:00
|
|
|
/*
|
2001-08-26 22:32:28 +04:00
|
|
|
* If we get here, we must have seen SCP_SINK_FILE or
|
|
|
|
* SCP_SINK_DIR.
|
2001-08-26 18:53:51 +04:00
|
|
|
*/
|
2006-08-12 19:20:19 +04:00
|
|
|
{
|
|
|
|
char sizestr[40];
|
|
|
|
|
2016-02-24 23:13:10 +03:00
|
|
|
if (sscanf(act->buf, "%lo %39s %n", &act->permissions,
|
2011-08-11 21:59:30 +04:00
|
|
|
sizestr, &i) != 2)
|
2006-08-12 19:20:19 +04:00
|
|
|
bump("Protocol error: Illegal file descriptor format");
|
|
|
|
act->size = uint64_from_decimal(sizestr);
|
|
|
|
act->name = act->buf + i;
|
|
|
|
return 0;
|
|
|
|
}
|
2001-08-26 18:53:51 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
int scp_accept_filexfer(void)
|
|
|
|
{
|
2001-08-26 22:32:28 +04:00
|
|
|
if (using_sftp) {
|
2003-06-29 18:26:09 +04:00
|
|
|
struct sftp_packet *pktin;
|
Clean up handling of the return value from sftp_find_request. In many
places we simply enforce by assertion that it will match the request
we sent out a moment ago: in fact it can also return NULL, so it makes
more sense to report a proper error message if it doesn't return the
expected value, and while we're at it, have that error message
whatever message was helpfully left in fxp_error() by
sftp_find_request when it failed.
To do this, I've written a centralised function in psftp.c called
sftp_wait_for_reply, which is handed a request that's just been sent
out and deals with the mechanics of waiting for its reply, returning
the reply when it arrives, and aborting with a sensible error if
anything else arrives instead. The numerous sites in psftp.c which
called sftp_find_request have all been rewritten to do this instead,
and as a side effect they now look more sensible. The only other uses
of sftp_find_request were in xfer_*load_gotpkt, which had to be
tweaked in its own way.
While I'm here, also fix memory management in sftp_find_request, which
was freeing its input packet on some but not all error return paths.
[originally from svn r9894]
2013-07-07 00:43:21 +04:00
|
|
|
struct sftp_request *req;
|
2003-06-29 18:26:09 +04:00
|
|
|
|
Clean up handling of the return value from sftp_find_request. In many
places we simply enforce by assertion that it will match the request
we sent out a moment ago: in fact it can also return NULL, so it makes
more sense to report a proper error message if it doesn't return the
expected value, and while we're at it, have that error message
whatever message was helpfully left in fxp_error() by
sftp_find_request when it failed.
To do this, I've written a centralised function in psftp.c called
sftp_wait_for_reply, which is handed a request that's just been sent
out and deals with the mechanics of waiting for its reply, returning
the reply when it arrives, and aborting with a sensible error if
anything else arrives instead. The numerous sites in psftp.c which
called sftp_find_request have all been rewritten to do this instead,
and as a side effect they now look more sensible. The only other uses
of sftp_find_request were in xfer_*load_gotpkt, which had to be
tweaked in its own way.
While I'm here, also fix memory management in sftp_find_request, which
was freeing its input packet on some but not all error return paths.
[originally from svn r9894]
2013-07-07 00:43:21 +04:00
|
|
|
req = fxp_open_send(scp_sftp_currentname, SSH_FXF_READ, NULL);
|
|
|
|
pktin = sftp_wait_for_reply(req);
|
|
|
|
scp_sftp_filehandle = fxp_open_recv(pktin, req);
|
2003-06-29 18:26:09 +04:00
|
|
|
|
2001-08-26 22:32:28 +04:00
|
|
|
if (!scp_sftp_filehandle) {
|
|
|
|
tell_user(stderr, "pscp: unable to open %s: %s",
|
|
|
|
scp_sftp_currentname, fxp_error());
|
|
|
|
errs++;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
scp_sftp_fileoffset = uint64_make(0, 0);
|
2003-09-29 19:39:56 +04:00
|
|
|
scp_sftp_xfer = xfer_download_init(scp_sftp_filehandle,
|
|
|
|
scp_sftp_fileoffset);
|
2001-08-26 22:32:28 +04:00
|
|
|
sfree(scp_sftp_currentname);
|
|
|
|
return 0;
|
|
|
|
} else {
|
2002-10-25 15:30:33 +04:00
|
|
|
back->send(backhandle, "", 1);
|
2001-08-26 22:32:28 +04:00
|
|
|
return 0; /* can't fail */
|
|
|
|
}
|
2001-08-26 18:53:51 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
int scp_recv_filedata(char *data, int len)
|
|
|
|
{
|
2001-08-26 22:32:28 +04:00
|
|
|
if (using_sftp) {
|
2003-06-29 18:26:09 +04:00
|
|
|
struct sftp_packet *pktin;
|
2003-09-29 19:39:56 +04:00
|
|
|
int ret, actuallen;
|
|
|
|
void *vbuf;
|
2003-06-29 18:26:09 +04:00
|
|
|
|
2003-09-29 19:39:56 +04:00
|
|
|
xfer_download_queue(scp_sftp_xfer);
|
|
|
|
pktin = sftp_recv();
|
|
|
|
ret = xfer_download_gotpkt(scp_sftp_xfer, pktin);
|
Clean up handling of the return value from sftp_find_request. In many
places we simply enforce by assertion that it will match the request
we sent out a moment ago: in fact it can also return NULL, so it makes
more sense to report a proper error message if it doesn't return the
expected value, and while we're at it, have that error message
whatever message was helpfully left in fxp_error() by
sftp_find_request when it failed.
To do this, I've written a centralised function in psftp.c called
sftp_wait_for_reply, which is handed a request that's just been sent
out and deals with the mechanics of waiting for its reply, returning
the reply when it arrives, and aborting with a sensible error if
anything else arrives instead. The numerous sites in psftp.c which
called sftp_find_request have all been rewritten to do this instead,
and as a side effect they now look more sensible. The only other uses
of sftp_find_request were in xfer_*load_gotpkt, which had to be
tweaked in its own way.
While I'm here, also fix memory management in sftp_find_request, which
was freeing its input packet on some but not all error return paths.
[originally from svn r9894]
2013-07-07 00:43:21 +04:00
|
|
|
if (ret <= 0) {
|
2001-08-26 22:32:28 +04:00
|
|
|
tell_user(stderr, "pscp: error while reading: %s", fxp_error());
|
2013-07-11 21:24:53 +04:00
|
|
|
if (ret == INT_MIN) /* pktin not even freed */
|
|
|
|
sfree(pktin);
|
2001-08-26 22:32:28 +04:00
|
|
|
errs++;
|
|
|
|
return -1;
|
|
|
|
}
|
2003-09-29 19:39:56 +04:00
|
|
|
|
|
|
|
if (xfer_download_data(scp_sftp_xfer, &vbuf, &actuallen)) {
|
2017-02-16 00:39:23 +03:00
|
|
|
if (actuallen <= 0) {
|
2017-02-16 00:41:28 +03:00
|
|
|
tell_user(stderr, "pscp: end of file while reading");
|
2017-02-16 00:39:23 +03:00
|
|
|
errs++;
|
|
|
|
sfree(vbuf);
|
|
|
|
return -1;
|
|
|
|
}
|
2003-09-29 19:39:56 +04:00
|
|
|
/*
|
|
|
|
* This assertion relies on the fact that the natural
|
|
|
|
* block size used in the xfer manager is at most that
|
|
|
|
* used in this module. I don't like crossing layers in
|
|
|
|
* this way, but it'll do for now.
|
|
|
|
*/
|
|
|
|
assert(actuallen <= len);
|
|
|
|
memcpy(data, vbuf, actuallen);
|
|
|
|
sfree(vbuf);
|
|
|
|
} else
|
2001-08-26 22:32:28 +04:00
|
|
|
actuallen = 0;
|
|
|
|
|
|
|
|
scp_sftp_fileoffset = uint64_add32(scp_sftp_fileoffset, actuallen);
|
|
|
|
|
|
|
|
return actuallen;
|
|
|
|
} else {
|
2018-05-26 10:31:34 +03:00
|
|
|
return ssh_scp_recv(data, len);
|
2001-08-26 22:32:28 +04:00
|
|
|
}
|
2001-08-26 18:53:51 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
int scp_finish_filerecv(void)
|
|
|
|
{
|
2001-08-26 22:32:28 +04:00
|
|
|
if (using_sftp) {
|
2003-06-29 18:26:09 +04:00
|
|
|
struct sftp_packet *pktin;
|
Clean up handling of the return value from sftp_find_request. In many
places we simply enforce by assertion that it will match the request
we sent out a moment ago: in fact it can also return NULL, so it makes
more sense to report a proper error message if it doesn't return the
expected value, and while we're at it, have that error message
whatever message was helpfully left in fxp_error() by
sftp_find_request when it failed.
To do this, I've written a centralised function in psftp.c called
sftp_wait_for_reply, which is handed a request that's just been sent
out and deals with the mechanics of waiting for its reply, returning
the reply when it arrives, and aborting with a sensible error if
anything else arrives instead. The numerous sites in psftp.c which
called sftp_find_request have all been rewritten to do this instead,
and as a side effect they now look more sensible. The only other uses
of sftp_find_request were in xfer_*load_gotpkt, which had to be
tweaked in its own way.
While I'm here, also fix memory management in sftp_find_request, which
was freeing its input packet on some but not all error return paths.
[originally from svn r9894]
2013-07-07 00:43:21 +04:00
|
|
|
struct sftp_request *req;
|
2003-06-29 18:26:09 +04:00
|
|
|
|
2003-09-29 19:39:56 +04:00
|
|
|
/*
|
|
|
|
* Ensure that xfer_done() will work correctly, so we can
|
|
|
|
* clean up any outstanding requests from the file
|
|
|
|
* transfer.
|
|
|
|
*/
|
|
|
|
xfer_set_error(scp_sftp_xfer);
|
|
|
|
while (!xfer_done(scp_sftp_xfer)) {
|
|
|
|
void *vbuf;
|
Clean up handling of the return value from sftp_find_request. In many
places we simply enforce by assertion that it will match the request
we sent out a moment ago: in fact it can also return NULL, so it makes
more sense to report a proper error message if it doesn't return the
expected value, and while we're at it, have that error message
whatever message was helpfully left in fxp_error() by
sftp_find_request when it failed.
To do this, I've written a centralised function in psftp.c called
sftp_wait_for_reply, which is handed a request that's just been sent
out and deals with the mechanics of waiting for its reply, returning
the reply when it arrives, and aborting with a sensible error if
anything else arrives instead. The numerous sites in psftp.c which
called sftp_find_request have all been rewritten to do this instead,
and as a side effect they now look more sensible. The only other uses
of sftp_find_request were in xfer_*load_gotpkt, which had to be
tweaked in its own way.
While I'm here, also fix memory management in sftp_find_request, which
was freeing its input packet on some but not all error return paths.
[originally from svn r9894]
2013-07-07 00:43:21 +04:00
|
|
|
int ret, len;
|
2003-09-29 19:39:56 +04:00
|
|
|
|
|
|
|
pktin = sftp_recv();
|
Clean up handling of the return value from sftp_find_request. In many
places we simply enforce by assertion that it will match the request
we sent out a moment ago: in fact it can also return NULL, so it makes
more sense to report a proper error message if it doesn't return the
expected value, and while we're at it, have that error message
whatever message was helpfully left in fxp_error() by
sftp_find_request when it failed.
To do this, I've written a centralised function in psftp.c called
sftp_wait_for_reply, which is handed a request that's just been sent
out and deals with the mechanics of waiting for its reply, returning
the reply when it arrives, and aborting with a sensible error if
anything else arrives instead. The numerous sites in psftp.c which
called sftp_find_request have all been rewritten to do this instead,
and as a side effect they now look more sensible. The only other uses
of sftp_find_request were in xfer_*load_gotpkt, which had to be
tweaked in its own way.
While I'm here, also fix memory management in sftp_find_request, which
was freeing its input packet on some but not all error return paths.
[originally from svn r9894]
2013-07-07 00:43:21 +04:00
|
|
|
ret = xfer_download_gotpkt(scp_sftp_xfer, pktin);
|
|
|
|
if (ret <= 0) {
|
|
|
|
tell_user(stderr, "pscp: error while reading: %s", fxp_error());
|
2013-07-11 21:24:53 +04:00
|
|
|
if (ret == INT_MIN) /* pktin not even freed */
|
|
|
|
sfree(pktin);
|
Clean up handling of the return value from sftp_find_request. In many
places we simply enforce by assertion that it will match the request
we sent out a moment ago: in fact it can also return NULL, so it makes
more sense to report a proper error message if it doesn't return the
expected value, and while we're at it, have that error message
whatever message was helpfully left in fxp_error() by
sftp_find_request when it failed.
To do this, I've written a centralised function in psftp.c called
sftp_wait_for_reply, which is handed a request that's just been sent
out and deals with the mechanics of waiting for its reply, returning
the reply when it arrives, and aborting with a sensible error if
anything else arrives instead. The numerous sites in psftp.c which
called sftp_find_request have all been rewritten to do this instead,
and as a side effect they now look more sensible. The only other uses
of sftp_find_request were in xfer_*load_gotpkt, which had to be
tweaked in its own way.
While I'm here, also fix memory management in sftp_find_request, which
was freeing its input packet on some but not all error return paths.
[originally from svn r9894]
2013-07-07 00:43:21 +04:00
|
|
|
errs++;
|
|
|
|
return -1;
|
|
|
|
}
|
2003-09-29 19:39:56 +04:00
|
|
|
if (xfer_download_data(scp_sftp_xfer, &vbuf, &len))
|
|
|
|
sfree(vbuf);
|
|
|
|
}
|
|
|
|
xfer_cleanup(scp_sftp_xfer);
|
|
|
|
|
Clean up handling of the return value from sftp_find_request. In many
places we simply enforce by assertion that it will match the request
we sent out a moment ago: in fact it can also return NULL, so it makes
more sense to report a proper error message if it doesn't return the
expected value, and while we're at it, have that error message
whatever message was helpfully left in fxp_error() by
sftp_find_request when it failed.
To do this, I've written a centralised function in psftp.c called
sftp_wait_for_reply, which is handed a request that's just been sent
out and deals with the mechanics of waiting for its reply, returning
the reply when it arrives, and aborting with a sensible error if
anything else arrives instead. The numerous sites in psftp.c which
called sftp_find_request have all been rewritten to do this instead,
and as a side effect they now look more sensible. The only other uses
of sftp_find_request were in xfer_*load_gotpkt, which had to be
tweaked in its own way.
While I'm here, also fix memory management in sftp_find_request, which
was freeing its input packet on some but not all error return paths.
[originally from svn r9894]
2013-07-07 00:43:21 +04:00
|
|
|
req = fxp_close_send(scp_sftp_filehandle);
|
|
|
|
pktin = sftp_wait_for_reply(req);
|
|
|
|
fxp_close_recv(pktin, req);
|
2001-08-26 22:32:28 +04:00
|
|
|
return 0;
|
|
|
|
} else {
|
2002-10-25 15:30:33 +04:00
|
|
|
back->send(backhandle, "", 1);
|
2001-08-26 22:32:28 +04:00
|
|
|
return response();
|
|
|
|
}
|
2001-08-26 18:53:51 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
/* ----------------------------------------------------------------------
|
1999-08-31 13:20:48 +04:00
|
|
|
* Send an error message to the other side and to the screen.
|
|
|
|
* Increment error counter.
|
|
|
|
*/
|
|
|
|
static void run_err(const char *fmt, ...)
|
|
|
|
{
|
2002-11-07 22:49:03 +03:00
|
|
|
char *str, *str2;
|
1999-11-08 14:22:45 +03:00
|
|
|
va_list ap;
|
|
|
|
va_start(ap, fmt);
|
|
|
|
errs++;
|
2002-11-07 22:49:03 +03:00
|
|
|
str = dupvprintf(fmt, ap);
|
2013-07-11 21:24:47 +04:00
|
|
|
str2 = dupcat("pscp: ", str, "\n", NULL);
|
2002-11-07 22:49:03 +03:00
|
|
|
sfree(str);
|
|
|
|
scp_send_errmsg(str2);
|
|
|
|
tell_user(stderr, "%s", str2);
|
1999-11-08 14:22:45 +03:00
|
|
|
va_end(ap);
|
2002-11-07 22:49:03 +03:00
|
|
|
sfree(str2);
|
1999-08-31 13:20:48 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Execute the source part of the SCP protocol.
|
|
|
|
*/
|
2015-05-15 13:15:42 +03:00
|
|
|
static void source(const char *src)
|
1999-08-31 13:20:48 +04:00
|
|
|
{
|
2006-08-12 19:20:19 +04:00
|
|
|
uint64 size;
|
2003-08-25 17:53:41 +04:00
|
|
|
unsigned long mtime, atime;
|
2011-08-11 21:59:30 +04:00
|
|
|
long permissions;
|
2015-05-15 13:15:42 +03:00
|
|
|
const char *last;
|
2003-08-25 17:53:41 +04:00
|
|
|
RFile *f;
|
|
|
|
int attr;
|
2006-08-12 19:20:19 +04:00
|
|
|
uint64 i;
|
|
|
|
uint64 stat_bytes;
|
1999-11-08 14:22:45 +03:00
|
|
|
time_t stat_starttime, stat_lasttime;
|
|
|
|
|
2003-08-25 17:53:41 +04:00
|
|
|
attr = file_type(src);
|
|
|
|
if (attr == FILE_TYPE_NONEXISTENT ||
|
|
|
|
attr == FILE_TYPE_WEIRD) {
|
|
|
|
run_err("%s: %s file or directory", src,
|
|
|
|
(attr == FILE_TYPE_WEIRD ? "Not a" : "No such"));
|
1999-11-08 14:22:45 +03:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2003-08-25 17:53:41 +04:00
|
|
|
if (attr == FILE_TYPE_DIRECTORY) {
|
1999-11-30 14:53:42 +03:00
|
|
|
if (recursive) {
|
2001-05-06 18:35:20 +04:00
|
|
|
/*
|
|
|
|
* Avoid . and .. directories.
|
|
|
|
*/
|
2015-05-15 13:15:42 +03:00
|
|
|
const char *p;
|
2001-05-06 18:35:20 +04:00
|
|
|
p = strrchr(src, '/');
|
|
|
|
if (!p)
|
|
|
|
p = strrchr(src, '\\');
|
|
|
|
if (!p)
|
|
|
|
p = src;
|
|
|
|
else
|
|
|
|
p++;
|
|
|
|
if (!strcmp(p, ".") || !strcmp(p, ".."))
|
|
|
|
/* skip . and .. */ ;
|
|
|
|
else
|
|
|
|
rsource(src);
|
|
|
|
} else {
|
1999-11-08 14:22:45 +03:00
|
|
|
run_err("%s: not a regular file", src);
|
2001-05-06 18:35:20 +04:00
|
|
|
}
|
1999-11-08 14:22:45 +03:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((last = strrchr(src, '/')) == NULL)
|
|
|
|
last = src;
|
|
|
|
else
|
|
|
|
last++;
|
|
|
|
if (strrchr(last, '\\') != NULL)
|
|
|
|
last = strrchr(last, '\\') + 1;
|
|
|
|
if (last == src && strchr(src, ':') != NULL)
|
|
|
|
last = strchr(src, ':') + 1;
|
|
|
|
|
2011-08-11 21:59:30 +04:00
|
|
|
f = open_existing_file(src, &size, &mtime, &atime, &permissions);
|
2003-08-25 17:53:41 +04:00
|
|
|
if (f == NULL) {
|
2000-02-21 17:20:19 +03:00
|
|
|
run_err("%s: Cannot open file", src);
|
1999-11-08 14:22:45 +03:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (preserve) {
|
2013-07-14 14:46:07 +04:00
|
|
|
if (scp_send_filetimes(mtime, atime)) {
|
|
|
|
close_rfile(f);
|
1999-11-08 14:22:45 +03:00
|
|
|
return;
|
2013-07-14 14:46:07 +04:00
|
|
|
}
|
1999-11-08 14:22:45 +03:00
|
|
|
}
|
|
|
|
|
2006-08-12 19:20:19 +04:00
|
|
|
if (verbose) {
|
|
|
|
char sizestr[40];
|
|
|
|
uint64_decimal(size, sizestr);
|
|
|
|
tell_user(stderr, "Sending file %s, size=%s", last, sizestr);
|
|
|
|
}
|
2013-07-14 14:46:07 +04:00
|
|
|
if (scp_send_filename(last, size, permissions)) {
|
|
|
|
close_rfile(f);
|
1999-11-08 14:22:45 +03:00
|
|
|
return;
|
2013-07-14 14:46:07 +04:00
|
|
|
}
|
1999-11-08 14:22:45 +03:00
|
|
|
|
2006-08-12 19:20:19 +04:00
|
|
|
stat_bytes = uint64_make(0,0);
|
2001-05-13 18:02:28 +04:00
|
|
|
stat_starttime = time(NULL);
|
|
|
|
stat_lasttime = 0;
|
1999-11-08 14:22:45 +03:00
|
|
|
|
2016-04-09 02:01:13 +03:00
|
|
|
#define PSCP_SEND_BLOCK 4096
|
2006-08-12 19:20:19 +04:00
|
|
|
for (i = uint64_make(0,0);
|
|
|
|
uint64_compare(i,size) < 0;
|
2016-04-09 02:01:13 +03:00
|
|
|
i = uint64_add32(i,PSCP_SEND_BLOCK)) {
|
|
|
|
char transbuf[PSCP_SEND_BLOCK];
|
|
|
|
int j, k = PSCP_SEND_BLOCK;
|
2001-08-25 21:09:23 +04:00
|
|
|
|
2006-08-12 19:20:19 +04:00
|
|
|
if (uint64_compare(uint64_add32(i, k),size) > 0) /* i + k > size */
|
|
|
|
k = (uint64_subtract(size, i)).lo; /* k = size - i; */
|
2003-08-25 17:53:41 +04:00
|
|
|
if ((j = read_from_file(f, transbuf, k)) != k) {
|
2001-05-06 18:35:20 +04:00
|
|
|
if (statistics)
|
|
|
|
printf("\n");
|
1999-11-08 14:22:45 +03:00
|
|
|
bump("%s: Read error", src);
|
1999-08-31 13:20:48 +04:00
|
|
|
}
|
2001-08-26 18:53:51 +04:00
|
|
|
if (scp_send_filedata(transbuf, k))
|
|
|
|
bump("%s: Network error occurred", src);
|
|
|
|
|
1999-11-08 14:22:45 +03:00
|
|
|
if (statistics) {
|
2006-08-12 19:20:19 +04:00
|
|
|
stat_bytes = uint64_add32(stat_bytes, k);
|
|
|
|
if (time(NULL) != stat_lasttime ||
|
|
|
|
(uint64_compare(uint64_add32(i, k), size) == 0)) {
|
1999-11-08 14:22:45 +03:00
|
|
|
stat_lasttime = time(NULL);
|
|
|
|
print_stats(last, size, stat_bytes,
|
|
|
|
stat_starttime, stat_lasttime);
|
|
|
|
}
|
1999-08-31 13:20:48 +04:00
|
|
|
}
|
2001-08-25 21:09:23 +04:00
|
|
|
|
1999-11-08 14:22:45 +03:00
|
|
|
}
|
2003-08-25 17:53:41 +04:00
|
|
|
close_rfile(f);
|
1999-08-31 13:20:48 +04:00
|
|
|
|
2001-08-26 18:53:51 +04:00
|
|
|
(void) scp_send_finish();
|
1999-08-31 13:20:48 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Recursively send the contents of a directory.
|
|
|
|
*/
|
2015-05-15 13:15:42 +03:00
|
|
|
static void rsource(const char *src)
|
1999-08-31 13:20:48 +04:00
|
|
|
{
|
2015-05-15 13:15:42 +03:00
|
|
|
const char *last;
|
2001-08-26 22:32:28 +04:00
|
|
|
char *save_target;
|
2003-08-25 17:53:41 +04:00
|
|
|
DirHandle *dir;
|
1999-11-08 14:22:45 +03:00
|
|
|
|
|
|
|
if ((last = strrchr(src, '/')) == NULL)
|
|
|
|
last = src;
|
|
|
|
else
|
|
|
|
last++;
|
|
|
|
if (strrchr(last, '\\') != NULL)
|
|
|
|
last = strrchr(last, '\\') + 1;
|
|
|
|
if (last == src && strchr(src, ':') != NULL)
|
|
|
|
last = strchr(src, ':') + 1;
|
|
|
|
|
|
|
|
/* maybe send filetime */
|
|
|
|
|
2001-08-26 22:32:28 +04:00
|
|
|
save_target = scp_save_remotepath();
|
|
|
|
|
1999-11-08 14:22:45 +03:00
|
|
|
if (verbose)
|
2001-08-26 18:53:51 +04:00
|
|
|
tell_user(stderr, "Entering directory: %s", last);
|
|
|
|
if (scp_send_dirname(last, 0755))
|
1999-11-08 14:22:45 +03:00
|
|
|
return;
|
|
|
|
|
2003-08-25 17:53:41 +04:00
|
|
|
dir = open_directory(src);
|
|
|
|
if (dir != NULL) {
|
|
|
|
char *filename;
|
|
|
|
while ((filename = read_filename(dir)) != NULL) {
|
|
|
|
char *foundfile = dupcat(src, "/", filename, NULL);
|
2001-08-26 19:31:29 +04:00
|
|
|
source(foundfile);
|
|
|
|
sfree(foundfile);
|
2003-08-25 17:53:41 +04:00
|
|
|
sfree(filename);
|
1999-08-31 13:20:48 +04:00
|
|
|
}
|
1999-11-08 14:22:45 +03:00
|
|
|
}
|
2003-08-25 17:53:41 +04:00
|
|
|
close_directory(dir);
|
1999-08-31 13:20:48 +04:00
|
|
|
|
2001-08-26 18:53:51 +04:00
|
|
|
(void) scp_send_enddir();
|
2001-08-26 22:32:28 +04:00
|
|
|
|
|
|
|
scp_restore_remotepath(save_target);
|
1999-08-31 13:20:48 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2001-08-26 19:31:29 +04:00
|
|
|
* Execute the sink part of the SCP protocol.
|
1999-08-31 13:20:48 +04:00
|
|
|
*/
|
2015-05-15 13:15:42 +03:00
|
|
|
static void sink(const char *targ, const char *src)
|
1999-08-31 13:20:48 +04:00
|
|
|
{
|
2001-08-26 19:31:29 +04:00
|
|
|
char *destfname;
|
1999-11-08 14:22:45 +03:00
|
|
|
int targisdir = 0;
|
|
|
|
int exists;
|
2003-08-25 17:53:41 +04:00
|
|
|
int attr;
|
|
|
|
WFile *f;
|
2006-08-12 19:20:19 +04:00
|
|
|
uint64 received;
|
1999-11-08 14:22:45 +03:00
|
|
|
int wrerror = 0;
|
2006-08-12 19:20:19 +04:00
|
|
|
uint64 stat_bytes;
|
1999-11-08 14:22:45 +03:00
|
|
|
time_t stat_starttime, stat_lasttime;
|
|
|
|
char *stat_name;
|
|
|
|
|
2003-08-25 17:53:41 +04:00
|
|
|
attr = file_type(targ);
|
|
|
|
if (attr == FILE_TYPE_DIRECTORY)
|
1999-11-08 14:22:45 +03:00
|
|
|
targisdir = 1;
|
|
|
|
|
|
|
|
if (targetshouldbedirectory && !targisdir)
|
|
|
|
bump("%s: Not a directory", targ);
|
|
|
|
|
2001-08-26 18:53:51 +04:00
|
|
|
scp_sink_init();
|
1999-11-08 14:22:45 +03:00
|
|
|
while (1) {
|
2001-08-26 18:53:51 +04:00
|
|
|
struct scp_sink_action act;
|
|
|
|
if (scp_get_sink_action(&act))
|
1999-11-08 14:22:45 +03:00
|
|
|
return;
|
1999-08-31 13:20:48 +04:00
|
|
|
|
2001-08-26 18:53:51 +04:00
|
|
|
if (act.action == SCP_SINK_ENDDIR)
|
|
|
|
return;
|
2001-08-26 19:31:29 +04:00
|
|
|
|
2001-08-27 14:17:41 +04:00
|
|
|
if (act.action == SCP_SINK_RETRY)
|
|
|
|
continue;
|
|
|
|
|
1999-11-08 14:22:45 +03:00
|
|
|
if (targisdir) {
|
2001-08-26 19:31:29 +04:00
|
|
|
/*
|
|
|
|
* Prevent the remote side from maliciously writing to
|
|
|
|
* files outside the target area by sending a filename
|
|
|
|
* containing `../'. In fact, it shouldn't be sending
|
2001-08-28 16:26:16 +04:00
|
|
|
* filenames with any slashes or colons in at all; so
|
|
|
|
* we'll find the last slash, backslash or colon in the
|
|
|
|
* filename and use only the part after that. (And
|
|
|
|
* warn!)
|
2001-08-26 19:31:29 +04:00
|
|
|
*
|
|
|
|
* In addition, we also ensure here that if we're
|
|
|
|
* copying a single file and the target is a directory
|
|
|
|
* (common usage: `pscp host:filename .') the remote
|
|
|
|
* can't send us a _different_ file name. We can
|
|
|
|
* distinguish this case because `src' will be non-NULL
|
|
|
|
* and the last component of that will fail to match
|
|
|
|
* (the last component of) the name sent.
|
2001-08-26 19:45:55 +04:00
|
|
|
*
|
2001-08-27 19:02:52 +04:00
|
|
|
* Well, not always; if `src' is a wildcard, we do
|
2001-08-26 19:45:55 +04:00
|
|
|
* expect to get back filenames that don't correspond
|
2001-08-27 19:02:52 +04:00
|
|
|
* exactly to it. Ideally in this case, we would like
|
|
|
|
* to ensure that the returned filename actually
|
|
|
|
* matches the wildcard pattern - but one of SCP's
|
|
|
|
* protocol infelicities is that wildcard matching is
|
|
|
|
* done at the server end _by the server's rules_ and
|
|
|
|
* so in general this is infeasible. Hence, we only
|
|
|
|
* accept filenames that don't correspond to `src' if
|
|
|
|
* unsafe mode is enabled or we are using SFTP (which
|
|
|
|
* resolves remote wildcards on the client side and can
|
|
|
|
* be trusted).
|
2001-08-26 19:31:29 +04:00
|
|
|
*/
|
|
|
|
char *striptarget, *stripsrc;
|
|
|
|
|
2001-08-27 14:17:41 +04:00
|
|
|
striptarget = stripslashes(act.name, 1);
|
2001-08-26 19:31:29 +04:00
|
|
|
if (striptarget != act.name) {
|
|
|
|
tell_user(stderr, "warning: remote host sent a compound"
|
2001-08-28 16:26:16 +04:00
|
|
|
" pathname '%s'", act.name);
|
|
|
|
tell_user(stderr, " renaming local file to '%s'",
|
|
|
|
striptarget);
|
2001-08-26 19:31:29 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Also check to see if the target filename is '.' or
|
|
|
|
* '..', or indeed '...' and so on because Windows
|
|
|
|
* appears to interpret those like '..'.
|
|
|
|
*/
|
2001-08-26 22:32:28 +04:00
|
|
|
if (is_dots(striptarget)) {
|
2001-08-26 19:31:29 +04:00
|
|
|
bump("security violation: remote host attempted to write to"
|
|
|
|
" a '.' or '..' path!");
|
|
|
|
}
|
|
|
|
|
|
|
|
if (src) {
|
2001-08-27 14:17:41 +04:00
|
|
|
stripsrc = stripslashes(src, 1);
|
2001-08-27 19:02:52 +04:00
|
|
|
if (strcmp(striptarget, stripsrc) &&
|
|
|
|
!using_sftp && !scp_unsafe_mode) {
|
|
|
|
tell_user(stderr, "warning: remote host tried to write "
|
|
|
|
"to a file called '%s'", striptarget);
|
|
|
|
tell_user(stderr, " when we requested a file "
|
|
|
|
"called '%s'.", stripsrc);
|
|
|
|
tell_user(stderr, " If this is a wildcard, "
|
2005-03-10 19:36:05 +03:00
|
|
|
"consider upgrading to SSH-2 or using");
|
2001-08-27 19:02:52 +04:00
|
|
|
tell_user(stderr, " the '-unsafe' option. Renaming"
|
|
|
|
" of this file has been disallowed.");
|
2001-08-26 19:45:55 +04:00
|
|
|
/* Override the name the server provided with our own. */
|
|
|
|
striptarget = stripsrc;
|
2001-08-26 19:31:29 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
1999-11-08 14:22:45 +03:00
|
|
|
if (targ[0] != '\0')
|
2003-08-25 18:30:59 +04:00
|
|
|
destfname = dir_file_cat(targ, striptarget);
|
2001-08-26 19:31:29 +04:00
|
|
|
else
|
|
|
|
destfname = dupstr(striptarget);
|
1999-11-08 14:22:45 +03:00
|
|
|
} else {
|
2001-08-26 19:31:29 +04:00
|
|
|
/*
|
|
|
|
* In this branch of the if, the target area is a
|
|
|
|
* single file with an explicitly specified name in any
|
|
|
|
* case, so there's no danger.
|
|
|
|
*/
|
|
|
|
destfname = dupstr(targ);
|
1999-11-08 14:22:45 +03:00
|
|
|
}
|
2003-08-25 17:53:41 +04:00
|
|
|
attr = file_type(destfname);
|
|
|
|
exists = (attr != FILE_TYPE_NONEXISTENT);
|
1999-11-08 14:22:45 +03:00
|
|
|
|
2001-08-26 18:53:51 +04:00
|
|
|
if (act.action == SCP_SINK_DIR) {
|
2003-08-25 17:53:41 +04:00
|
|
|
if (exists && attr != FILE_TYPE_DIRECTORY) {
|
2001-08-26 19:31:29 +04:00
|
|
|
run_err("%s: Not a directory", destfname);
|
2013-07-11 21:43:41 +04:00
|
|
|
sfree(destfname);
|
1999-11-08 14:22:45 +03:00
|
|
|
continue;
|
|
|
|
}
|
|
|
|
if (!exists) {
|
2003-08-25 17:53:41 +04:00
|
|
|
if (!create_directory(destfname)) {
|
2001-08-26 19:31:29 +04:00
|
|
|
run_err("%s: Cannot create directory", destfname);
|
2013-07-11 21:43:41 +04:00
|
|
|
sfree(destfname);
|
1999-11-08 14:22:45 +03:00
|
|
|
continue;
|
|
|
|
}
|
|
|
|
}
|
2001-08-26 19:31:29 +04:00
|
|
|
sink(destfname, NULL);
|
1999-11-08 14:22:45 +03:00
|
|
|
/* can we set the timestamp for directories ? */
|
2013-07-11 21:43:41 +04:00
|
|
|
sfree(destfname);
|
1999-11-08 14:22:45 +03:00
|
|
|
continue;
|
|
|
|
}
|
1999-08-31 13:20:48 +04:00
|
|
|
|
2011-08-11 21:59:30 +04:00
|
|
|
f = open_new_file(destfname, act.permissions);
|
2003-08-25 17:53:41 +04:00
|
|
|
if (f == NULL) {
|
2001-08-26 19:31:29 +04:00
|
|
|
run_err("%s: Cannot create file", destfname);
|
2013-07-11 21:43:41 +04:00
|
|
|
sfree(destfname);
|
1999-11-08 14:22:45 +03:00
|
|
|
continue;
|
|
|
|
}
|
1999-08-31 13:20:48 +04:00
|
|
|
|
2013-07-11 21:43:41 +04:00
|
|
|
if (scp_accept_filexfer()) {
|
|
|
|
sfree(destfname);
|
|
|
|
close_wfile(f);
|
2001-08-26 18:53:51 +04:00
|
|
|
return;
|
2013-07-11 21:43:41 +04:00
|
|
|
}
|
1999-08-31 13:20:48 +04:00
|
|
|
|
2006-08-12 19:20:19 +04:00
|
|
|
stat_bytes = uint64_make(0, 0);
|
2001-05-13 18:02:28 +04:00
|
|
|
stat_starttime = time(NULL);
|
|
|
|
stat_lasttime = 0;
|
2001-08-27 14:17:41 +04:00
|
|
|
stat_name = stripslashes(destfname, 1);
|
1999-08-31 13:20:48 +04:00
|
|
|
|
2006-08-12 19:20:19 +04:00
|
|
|
received = uint64_make(0, 0);
|
|
|
|
while (uint64_compare(received,act.size) < 0) {
|
2006-06-02 12:46:34 +04:00
|
|
|
char transbuf[32768];
|
2006-08-12 19:20:19 +04:00
|
|
|
uint64 blksize;
|
2004-04-27 22:16:33 +04:00
|
|
|
int read;
|
2006-08-12 19:20:19 +04:00
|
|
|
blksize = uint64_make(0, 32768);
|
|
|
|
if (uint64_compare(blksize,uint64_subtract(act.size,received)) > 0)
|
|
|
|
blksize = uint64_subtract(act.size,received);
|
|
|
|
read = scp_recv_filedata(transbuf, (int)blksize.lo);
|
2001-08-26 18:53:51 +04:00
|
|
|
if (read <= 0)
|
1999-11-08 14:22:45 +03:00
|
|
|
bump("Lost connection");
|
2017-02-16 00:41:28 +03:00
|
|
|
if (wrerror) {
|
|
|
|
received = uint64_add32(received, read);
|
2001-05-06 18:35:20 +04:00
|
|
|
continue;
|
2017-02-16 00:41:28 +03:00
|
|
|
}
|
2003-08-25 17:53:41 +04:00
|
|
|
if (write_to_file(f, transbuf, read) != (int)read) {
|
1999-11-08 14:22:45 +03:00
|
|
|
wrerror = 1;
|
2001-08-26 18:53:51 +04:00
|
|
|
/* FIXME: in sftp we can actually abort the transfer */
|
1999-11-08 14:22:45 +03:00
|
|
|
if (statistics)
|
|
|
|
printf("\r%-25.25s | %50s\n",
|
|
|
|
stat_name,
|
|
|
|
"Write error.. waiting for end of file");
|
2017-02-16 00:41:28 +03:00
|
|
|
received = uint64_add32(received, read);
|
1999-11-08 14:22:45 +03:00
|
|
|
continue;
|
|
|
|
}
|
|
|
|
if (statistics) {
|
2006-08-12 19:20:19 +04:00
|
|
|
stat_bytes = uint64_add32(stat_bytes,read);
|
2001-08-26 18:53:51 +04:00
|
|
|
if (time(NULL) > stat_lasttime ||
|
2006-08-12 19:20:19 +04:00
|
|
|
uint64_compare(uint64_add32(received, read), act.size) == 0) {
|
1999-11-08 14:22:45 +03:00
|
|
|
stat_lasttime = time(NULL);
|
2001-08-26 18:53:51 +04:00
|
|
|
print_stats(stat_name, act.size, stat_bytes,
|
1999-11-08 14:22:45 +03:00
|
|
|
stat_starttime, stat_lasttime);
|
1999-08-31 13:20:48 +04:00
|
|
|
}
|
1999-11-08 14:22:45 +03:00
|
|
|
}
|
2006-08-12 19:20:19 +04:00
|
|
|
received = uint64_add32(received, read);
|
1999-11-08 14:22:45 +03:00
|
|
|
}
|
2001-08-26 18:53:51 +04:00
|
|
|
if (act.settime) {
|
2003-08-25 17:53:41 +04:00
|
|
|
set_file_times(f, act.mtime, act.atime);
|
1999-08-31 13:20:48 +04:00
|
|
|
}
|
|
|
|
|
2003-08-25 17:53:41 +04:00
|
|
|
close_wfile(f);
|
1999-11-08 14:22:45 +03:00
|
|
|
if (wrerror) {
|
2001-08-26 19:31:29 +04:00
|
|
|
run_err("%s: Write error", destfname);
|
2013-07-11 21:43:41 +04:00
|
|
|
sfree(destfname);
|
1999-11-08 14:22:45 +03:00
|
|
|
continue;
|
|
|
|
}
|
2001-08-26 18:53:51 +04:00
|
|
|
(void) scp_finish_filerecv();
|
2001-08-26 19:31:29 +04:00
|
|
|
sfree(destfname);
|
2001-08-29 12:56:26 +04:00
|
|
|
sfree(act.buf);
|
1999-11-08 14:22:45 +03:00
|
|
|
}
|
|
|
|
}
|
1999-08-31 13:20:48 +04:00
|
|
|
|
|
|
|
/*
|
2001-08-26 18:53:51 +04:00
|
|
|
* We will copy local files to a remote server.
|
1999-08-31 13:20:48 +04:00
|
|
|
*/
|
|
|
|
static void toremote(int argc, char *argv[])
|
|
|
|
{
|
2015-05-15 13:15:42 +03:00
|
|
|
char *src, *wtarg, *host, *user;
|
|
|
|
const char *targ;
|
1999-11-08 14:22:45 +03:00
|
|
|
char *cmd;
|
2003-08-25 17:53:41 +04:00
|
|
|
int i, wc_type;
|
1999-11-08 14:22:45 +03:00
|
|
|
|
2013-08-13 10:46:51 +04:00
|
|
|
uploading = 1;
|
|
|
|
|
2015-05-15 13:15:42 +03:00
|
|
|
wtarg = argv[argc - 1];
|
1999-11-08 14:22:45 +03:00
|
|
|
|
2000-04-03 23:54:31 +04:00
|
|
|
/* Separate host from filename */
|
2015-05-15 13:15:42 +03:00
|
|
|
host = wtarg;
|
|
|
|
wtarg = colon(wtarg);
|
|
|
|
if (wtarg == NULL)
|
|
|
|
bump("wtarg == NULL in toremote()");
|
|
|
|
*wtarg++ = '\0';
|
2004-12-30 19:45:11 +03:00
|
|
|
/* Substitute "." for empty target */
|
2015-05-15 13:15:42 +03:00
|
|
|
if (*wtarg == '\0')
|
|
|
|
targ = ".";
|
|
|
|
else
|
|
|
|
targ = wtarg;
|
1999-11-08 14:22:45 +03:00
|
|
|
|
2000-04-03 23:54:31 +04:00
|
|
|
/* Separate host and username */
|
1999-11-08 14:22:45 +03:00
|
|
|
user = host;
|
|
|
|
host = strrchr(host, '@');
|
|
|
|
if (host == NULL) {
|
|
|
|
host = user;
|
|
|
|
user = NULL;
|
|
|
|
} else {
|
|
|
|
*host++ = '\0';
|
|
|
|
if (*user == '\0')
|
|
|
|
user = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (argc == 2) {
|
|
|
|
if (colon(argv[0]) != NULL)
|
|
|
|
bump("%s: Remote to remote not supported", argv[0]);
|
2003-08-25 17:53:41 +04:00
|
|
|
|
|
|
|
wc_type = test_wildcard(argv[0], 1);
|
|
|
|
if (wc_type == WCTYPE_NONEXISTENT)
|
1999-11-08 14:22:45 +03:00
|
|
|
bump("%s: No such file or directory\n", argv[0]);
|
2003-08-25 17:53:41 +04:00
|
|
|
else if (wc_type == WCTYPE_WILDCARD)
|
1999-11-08 14:22:45 +03:00
|
|
|
targetshouldbedirectory = 1;
|
|
|
|
}
|
|
|
|
|
2002-11-07 22:49:03 +03:00
|
|
|
cmd = dupprintf("scp%s%s%s%s -t %s",
|
|
|
|
verbose ? " -v" : "",
|
|
|
|
recursive ? " -r" : "",
|
|
|
|
preserve ? " -p" : "",
|
|
|
|
targetshouldbedirectory ? " -d" : "", targ);
|
1999-11-08 14:22:45 +03:00
|
|
|
do_cmd(host, user, cmd);
|
|
|
|
sfree(cmd);
|
|
|
|
|
2005-06-26 01:43:09 +04:00
|
|
|
if (scp_source_setup(targ, targetshouldbedirectory))
|
|
|
|
return;
|
1999-11-08 14:22:45 +03:00
|
|
|
|
|
|
|
for (i = 0; i < argc - 1; i++) {
|
|
|
|
src = argv[i];
|
|
|
|
if (colon(src) != NULL) {
|
2000-09-15 19:54:04 +04:00
|
|
|
tell_user(stderr, "%s: Remote to remote not supported\n", src);
|
1999-11-08 14:22:45 +03:00
|
|
|
errs++;
|
|
|
|
continue;
|
1999-08-31 13:20:48 +04:00
|
|
|
}
|
2001-08-26 19:31:29 +04:00
|
|
|
|
2003-08-25 17:53:41 +04:00
|
|
|
wc_type = test_wildcard(src, 1);
|
|
|
|
if (wc_type == WCTYPE_NONEXISTENT) {
|
1999-11-08 14:22:45 +03:00
|
|
|
run_err("%s: No such file or directory", src);
|
|
|
|
continue;
|
2003-08-25 17:53:41 +04:00
|
|
|
} else if (wc_type == WCTYPE_FILENAME) {
|
|
|
|
source(src);
|
|
|
|
continue;
|
|
|
|
} else {
|
|
|
|
WildcardMatcher *wc;
|
2001-08-26 19:31:29 +04:00
|
|
|
char *filename;
|
2003-08-25 17:53:41 +04:00
|
|
|
|
|
|
|
wc = begin_wildcard_matching(src);
|
|
|
|
if (wc == NULL) {
|
|
|
|
run_err("%s: No such file or directory", src);
|
|
|
|
continue;
|
2000-12-01 00:35:28 +03:00
|
|
|
}
|
2003-08-25 17:53:41 +04:00
|
|
|
|
|
|
|
while ((filename = wildcard_get_filename(wc)) != NULL) {
|
|
|
|
source(filename);
|
|
|
|
sfree(filename);
|
|
|
|
}
|
|
|
|
|
|
|
|
finish_wildcard_matching(wc);
|
|
|
|
}
|
1999-11-08 14:22:45 +03:00
|
|
|
}
|
1999-08-31 13:20:48 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* We will copy files from a remote server to the local machine.
|
|
|
|
*/
|
|
|
|
static void tolocal(int argc, char *argv[])
|
|
|
|
{
|
2015-05-15 13:15:42 +03:00
|
|
|
char *wsrc, *host, *user;
|
|
|
|
const char *src, *targ;
|
1999-11-08 14:22:45 +03:00
|
|
|
char *cmd;
|
|
|
|
|
2013-08-13 10:46:51 +04:00
|
|
|
uploading = 0;
|
|
|
|
|
1999-11-08 14:22:45 +03:00
|
|
|
if (argc != 2)
|
|
|
|
bump("More than one remote source not supported");
|
|
|
|
|
2015-05-15 13:15:42 +03:00
|
|
|
wsrc = argv[0];
|
1999-11-08 14:22:45 +03:00
|
|
|
targ = argv[1];
|
|
|
|
|
2000-04-03 23:54:31 +04:00
|
|
|
/* Separate host from filename */
|
2015-05-15 13:15:42 +03:00
|
|
|
host = wsrc;
|
|
|
|
wsrc = colon(wsrc);
|
|
|
|
if (wsrc == NULL)
|
1999-11-08 14:22:45 +03:00
|
|
|
bump("Local to local copy not supported");
|
2015-05-15 13:15:42 +03:00
|
|
|
*wsrc++ = '\0';
|
1999-11-08 14:22:45 +03:00
|
|
|
/* Substitute "." for empty filename */
|
2015-05-15 13:15:42 +03:00
|
|
|
if (*wsrc == '\0')
|
|
|
|
src = ".";
|
|
|
|
else
|
|
|
|
src = wsrc;
|
1999-11-08 14:22:45 +03:00
|
|
|
|
2000-04-03 23:54:31 +04:00
|
|
|
/* Separate username and hostname */
|
1999-11-08 14:22:45 +03:00
|
|
|
user = host;
|
|
|
|
host = strrchr(host, '@');
|
|
|
|
if (host == NULL) {
|
|
|
|
host = user;
|
|
|
|
user = NULL;
|
|
|
|
} else {
|
|
|
|
*host++ = '\0';
|
|
|
|
if (*user == '\0')
|
|
|
|
user = NULL;
|
|
|
|
}
|
|
|
|
|
2002-11-07 22:49:03 +03:00
|
|
|
cmd = dupprintf("scp%s%s%s%s -f %s",
|
|
|
|
verbose ? " -v" : "",
|
|
|
|
recursive ? " -r" : "",
|
|
|
|
preserve ? " -p" : "",
|
|
|
|
targetshouldbedirectory ? " -d" : "", src);
|
1999-11-08 14:22:45 +03:00
|
|
|
do_cmd(host, user, cmd);
|
|
|
|
sfree(cmd);
|
|
|
|
|
2001-08-27 14:17:41 +04:00
|
|
|
if (scp_sink_setup(src, preserve, recursive))
|
|
|
|
return;
|
2001-08-26 22:32:28 +04:00
|
|
|
|
2000-10-21 21:52:54 +04:00
|
|
|
sink(targ, src);
|
1999-08-31 13:20:48 +04:00
|
|
|
}
|
|
|
|
|
2000-04-03 23:54:31 +04:00
|
|
|
/*
|
|
|
|
* We will issue a list command to get a remote directory.
|
|
|
|
*/
|
|
|
|
static void get_dir_list(int argc, char *argv[])
|
|
|
|
{
|
2015-05-15 13:15:42 +03:00
|
|
|
char *wsrc, *host, *user;
|
|
|
|
const char *src;
|
|
|
|
char *cmd, *p;
|
|
|
|
const char *q;
|
2000-04-03 23:54:31 +04:00
|
|
|
char c;
|
|
|
|
|
2015-05-15 13:15:42 +03:00
|
|
|
wsrc = argv[0];
|
2000-04-03 23:54:31 +04:00
|
|
|
|
|
|
|
/* Separate host from filename */
|
2015-05-15 13:15:42 +03:00
|
|
|
host = wsrc;
|
|
|
|
wsrc = colon(wsrc);
|
|
|
|
if (wsrc == NULL)
|
2009-02-25 01:56:44 +03:00
|
|
|
bump("Local file listing not supported");
|
2015-05-15 13:15:42 +03:00
|
|
|
*wsrc++ = '\0';
|
2000-04-03 23:54:31 +04:00
|
|
|
/* Substitute "." for empty filename */
|
2015-05-15 13:15:42 +03:00
|
|
|
if (*wsrc == '\0')
|
|
|
|
src = ".";
|
|
|
|
else
|
|
|
|
src = wsrc;
|
2000-04-03 23:54:31 +04:00
|
|
|
|
|
|
|
/* Separate username and hostname */
|
|
|
|
user = host;
|
|
|
|
host = strrchr(host, '@');
|
|
|
|
if (host == NULL) {
|
|
|
|
host = user;
|
|
|
|
user = NULL;
|
|
|
|
} else {
|
|
|
|
*host++ = '\0';
|
|
|
|
if (*user == '\0')
|
|
|
|
user = NULL;
|
|
|
|
}
|
|
|
|
|
2003-03-29 19:14:26 +03:00
|
|
|
cmd = snewn(4 * strlen(src) + 100, char);
|
2000-04-03 23:54:31 +04:00
|
|
|
strcpy(cmd, "ls -la '");
|
|
|
|
p = cmd + strlen(cmd);
|
|
|
|
for (q = src; *q; q++) {
|
|
|
|
if (*q == '\'') {
|
2001-05-06 18:35:20 +04:00
|
|
|
*p++ = '\'';
|
|
|
|
*p++ = '\\';
|
|
|
|
*p++ = '\'';
|
|
|
|
*p++ = '\'';
|
2000-04-03 23:54:31 +04:00
|
|
|
} else {
|
|
|
|
*p++ = *q;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
*p++ = '\'';
|
|
|
|
*p = '\0';
|
2000-09-15 19:54:04 +04:00
|
|
|
|
2000-04-03 23:54:31 +04:00
|
|
|
do_cmd(host, user, cmd);
|
|
|
|
sfree(cmd);
|
|
|
|
|
2001-08-26 22:32:28 +04:00
|
|
|
if (using_sftp) {
|
|
|
|
scp_sftp_listdir(src);
|
|
|
|
} else {
|
2018-05-26 10:31:34 +03:00
|
|
|
while (ssh_scp_recv(&c, 1) > 0)
|
2001-08-26 22:32:28 +04:00
|
|
|
tell_char(stdout, c);
|
|
|
|
}
|
2000-04-03 23:54:31 +04:00
|
|
|
}
|
|
|
|
|
1999-08-31 13:20:48 +04:00
|
|
|
/*
|
|
|
|
* Short description of parameters.
|
|
|
|
*/
|
2000-03-08 13:21:13 +03:00
|
|
|
static void usage(void)
|
1999-08-31 13:20:48 +04:00
|
|
|
{
|
1999-11-08 14:22:45 +03:00
|
|
|
printf("PuTTY Secure Copy client\n");
|
|
|
|
printf("%s\n", ver);
|
2000-06-06 13:51:27 +04:00
|
|
|
printf("Usage: pscp [options] [user@]host:source target\n");
|
2001-05-06 18:35:20 +04:00
|
|
|
printf
|
|
|
|
(" pscp [options] source [source...] [user@]host:target\n");
|
2004-02-22 17:48:48 +03:00
|
|
|
printf(" pscp [options] -ls [user@]host:filespec\n");
|
1999-11-16 12:26:19 +03:00
|
|
|
printf("Options:\n");
|
2005-03-19 05:26:58 +03:00
|
|
|
printf(" -V print version information and exit\n");
|
|
|
|
printf(" -pgpfp print PGP key fingerprints and exit\n");
|
1999-11-16 12:26:19 +03:00
|
|
|
printf(" -p preserve file attributes\n");
|
|
|
|
printf(" -q quiet, don't show statistics\n");
|
|
|
|
printf(" -r copy directories recursively\n");
|
|
|
|
printf(" -v show verbose messages\n");
|
2002-09-11 21:30:36 +04:00
|
|
|
printf(" -load sessname Load settings from saved session\n");
|
1999-11-16 12:26:19 +03:00
|
|
|
printf(" -P port connect to specified port\n");
|
2002-09-11 21:30:36 +04:00
|
|
|
printf(" -l user connect with specified username\n");
|
1999-11-16 12:26:19 +03:00
|
|
|
printf(" -pw passw login with specified password\n");
|
2002-09-11 21:30:36 +04:00
|
|
|
printf(" -1 -2 force use of particular SSH protocol version\n");
|
2004-12-30 19:45:11 +03:00
|
|
|
printf(" -4 -6 force use of IPv4 or IPv6\n");
|
2002-09-11 21:30:36 +04:00
|
|
|
printf(" -C enable compression\n");
|
2014-09-21 02:49:47 +04:00
|
|
|
printf(" -i key private key file for user authentication\n");
|
2006-02-19 15:52:28 +03:00
|
|
|
printf(" -noagent disable use of Pageant\n");
|
|
|
|
printf(" -agent enable use of Pageant\n");
|
2014-09-21 02:49:47 +04:00
|
|
|
printf(" -hostkey aa:bb:cc:...\n");
|
|
|
|
printf(" manually specify a host key (may be repeated)\n");
|
2002-09-11 21:30:36 +04:00
|
|
|
printf(" -batch disable all interactive prompts\n");
|
2017-02-12 02:03:46 +03:00
|
|
|
printf(" -proxycmd command\n");
|
|
|
|
printf(" use 'command' as local proxy\n");
|
2001-08-27 19:02:52 +04:00
|
|
|
printf(" -unsafe allow server-side wildcards (DANGEROUS)\n");
|
2004-04-26 02:18:19 +04:00
|
|
|
printf(" -sftp force use of SFTP protocol\n");
|
|
|
|
printf(" -scp force use of SCP protocol\n");
|
2015-11-08 14:57:39 +03:00
|
|
|
printf(" -sshlog file\n");
|
|
|
|
printf(" -sshrawlog file\n");
|
|
|
|
printf(" log protocol details to a file\n");
|
2001-01-27 18:51:41 +03:00
|
|
|
#if 0
|
|
|
|
/*
|
|
|
|
* -gui is an internal option, used by GUI front ends to get
|
|
|
|
* pscp to pass progress reports back to them. It's not an
|
|
|
|
* ordinary user-accessible option, so it shouldn't be part of
|
|
|
|
* the command-line help. The only people who need to know
|
|
|
|
* about it are programmers, and they can read the source.
|
|
|
|
*/
|
2001-05-06 18:35:20 +04:00
|
|
|
printf
|
|
|
|
(" -gui hWnd GUI mode with the windows handle for receiving messages\n");
|
2001-01-27 18:51:41 +03:00
|
|
|
#endif
|
2002-03-06 23:13:22 +03:00
|
|
|
cleanup_exit(1);
|
1999-08-31 13:20:48 +04:00
|
|
|
}
|
|
|
|
|
2004-04-18 00:25:09 +04:00
|
|
|
void version(void)
|
|
|
|
{
|
2017-01-21 17:55:53 +03:00
|
|
|
char *buildinfo_text = buildinfo("\n");
|
|
|
|
printf("pscp: %s\n%s\n", ver, buildinfo_text);
|
|
|
|
sfree(buildinfo_text);
|
2017-02-15 22:50:14 +03:00
|
|
|
exit(0);
|
2004-04-18 00:25:09 +04:00
|
|
|
}
|
|
|
|
|
2015-05-15 13:15:42 +03:00
|
|
|
void cmdline_error(const char *p, ...)
|
2002-08-05 01:18:56 +04:00
|
|
|
{
|
|
|
|
va_list ap;
|
|
|
|
fprintf(stderr, "pscp: ");
|
|
|
|
va_start(ap, p);
|
|
|
|
vfprintf(stderr, p, ap);
|
|
|
|
va_end(ap);
|
2002-11-20 23:09:02 +03:00
|
|
|
fprintf(stderr, "\n try typing just \"pscp\" for help\n");
|
2002-08-05 01:18:56 +04:00
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
|
2013-11-17 18:05:41 +04:00
|
|
|
const int share_can_be_downstream = TRUE;
|
|
|
|
const int share_can_be_upstream = FALSE;
|
|
|
|
|
1999-08-31 13:20:48 +04:00
|
|
|
/*
|
2003-08-25 17:53:41 +04:00
|
|
|
* Main program. (Called `psftp_main' because it gets called from
|
|
|
|
* *sftp.c; bit silly, I know, but it had to be called _something_.)
|
1999-08-31 13:20:48 +04:00
|
|
|
*/
|
2003-08-25 17:53:41 +04:00
|
|
|
int psftp_main(int argc, char *argv[])
|
1999-08-31 13:20:48 +04:00
|
|
|
{
|
1999-11-08 14:22:45 +03:00
|
|
|
int i;
|
|
|
|
|
2000-06-22 16:18:34 +04:00
|
|
|
default_protocol = PROT_TELNET;
|
|
|
|
|
2003-08-25 17:53:41 +04:00
|
|
|
flags = FLAG_STDERR
|
|
|
|
#ifdef FLAG_SYNCAGENT
|
|
|
|
| FLAG_SYNCAGENT
|
|
|
|
#endif
|
|
|
|
;
|
2002-08-05 01:18:56 +04:00
|
|
|
cmdline_tooltype = TOOLTYPE_FILETRANSFER;
|
2000-10-23 14:32:37 +04:00
|
|
|
sk_init();
|
1999-11-08 14:22:45 +03:00
|
|
|
|
2004-07-25 18:00:26 +04:00
|
|
|
/* Load Default Settings before doing anything else. */
|
Post-release destabilisation! Completely remove the struct type
'Config' in putty.h, which stores all PuTTY's settings and includes an
arbitrary length limit on every single one of those settings which is
stored in string form. In place of it is 'Conf', an opaque data type
everywhere outside the new file conf.c, which stores a list of (key,
value) pairs in which every key contains an integer identifying a
configuration setting, and for some of those integers the key also
contains extra parts (so that, for instance, CONF_environmt is a
string-to-string mapping). Everywhere that a Config was previously
used, a Conf is now; everywhere there was a Config structure copy,
conf_copy() is called; every lookup, adjustment, load and save
operation on a Config has been rewritten; and there's a mechanism for
serialising a Conf into a binary blob and back for use with Duplicate
Session.
User-visible effects of this change _should_ be minimal, though I
don't doubt I've introduced one or two bugs here and there which will
eventually be found. The _intended_ visible effects of this change are
that all arbitrary limits on configuration strings and lists (e.g.
limit on number of port forwardings) should now disappear; that list
boxes in the configuration will now be displayed in a sorted order
rather than the arbitrary order in which they were added to the list
(since the underlying data structure is now a sorted tree234 rather
than an ad-hoc comma-separated string); and one more specific change,
which is that local and dynamic port forwardings on the same port
number are now mutually exclusive in the configuration (putting 'D' in
the key rather than the value was a mistake in the first place).
One other reorganisation as a result of this is that I've moved all
the dialog.c standard handlers (dlg_stdeditbox_handler and friends)
out into config.c, because I can't really justify calling them generic
any more. When they took a pointer to an arbitrary structure type and
the offset of a field within that structure, they were independent of
whether that structure was a Config or something completely different,
but now they really do expect to talk to a Conf, which can _only_ be
used for PuTTY configuration, so I've renamed them all things like
conf_editbox_handler and moved them out of the nominally independent
dialog-box management module into the PuTTY-specific config.c.
[originally from svn r9214]
2011-07-14 22:52:21 +04:00
|
|
|
conf = conf_new();
|
|
|
|
do_defaults(NULL, conf);
|
2004-07-25 18:00:26 +04:00
|
|
|
loaded_session = FALSE;
|
|
|
|
|
1999-11-08 14:22:45 +03:00
|
|
|
for (i = 1; i < argc; i++) {
|
2002-08-05 01:18:56 +04:00
|
|
|
int ret;
|
1999-11-08 14:22:45 +03:00
|
|
|
if (argv[i][0] != '-')
|
|
|
|
break;
|
Post-release destabilisation! Completely remove the struct type
'Config' in putty.h, which stores all PuTTY's settings and includes an
arbitrary length limit on every single one of those settings which is
stored in string form. In place of it is 'Conf', an opaque data type
everywhere outside the new file conf.c, which stores a list of (key,
value) pairs in which every key contains an integer identifying a
configuration setting, and for some of those integers the key also
contains extra parts (so that, for instance, CONF_environmt is a
string-to-string mapping). Everywhere that a Config was previously
used, a Conf is now; everywhere there was a Config structure copy,
conf_copy() is called; every lookup, adjustment, load and save
operation on a Config has been rewritten; and there's a mechanism for
serialising a Conf into a binary blob and back for use with Duplicate
Session.
User-visible effects of this change _should_ be minimal, though I
don't doubt I've introduced one or two bugs here and there which will
eventually be found. The _intended_ visible effects of this change are
that all arbitrary limits on configuration strings and lists (e.g.
limit on number of port forwardings) should now disappear; that list
boxes in the configuration will now be displayed in a sorted order
rather than the arbitrary order in which they were added to the list
(since the underlying data structure is now a sorted tree234 rather
than an ad-hoc comma-separated string); and one more specific change,
which is that local and dynamic port forwardings on the same port
number are now mutually exclusive in the configuration (putting 'D' in
the key rather than the value was a mistake in the first place).
One other reorganisation as a result of this is that I've moved all
the dialog.c standard handlers (dlg_stdeditbox_handler and friends)
out into config.c, because I can't really justify calling them generic
any more. When they took a pointer to an arbitrary structure type and
the offset of a field within that structure, they were independent of
whether that structure was a Config or something completely different,
but now they really do expect to talk to a Conf, which can _only_ be
used for PuTTY configuration, so I've renamed them all things like
conf_editbox_handler and moved them out of the nominally independent
dialog-box management module into the PuTTY-specific config.c.
[originally from svn r9214]
2011-07-14 22:52:21 +04:00
|
|
|
ret = cmdline_process_param(argv[i], i+1<argc?argv[i+1]:NULL, 1, conf);
|
2002-08-05 01:18:56 +04:00
|
|
|
if (ret == -2) {
|
|
|
|
cmdline_error("option \"%s\" requires an argument", argv[i]);
|
|
|
|
} else if (ret == 2) {
|
|
|
|
i++; /* skip next argument */
|
|
|
|
} else if (ret == 1) {
|
|
|
|
/* We have our own verbosity in addition to `flags'. */
|
|
|
|
if (flags & FLAG_VERBOSE)
|
|
|
|
verbose = 1;
|
2005-03-19 05:26:58 +03:00
|
|
|
} else if (strcmp(argv[i], "-pgpfp") == 0) {
|
|
|
|
pgp_fingerprints();
|
|
|
|
return 1;
|
2002-08-05 01:18:56 +04:00
|
|
|
} else if (strcmp(argv[i], "-r") == 0) {
|
1999-11-08 14:22:45 +03:00
|
|
|
recursive = 1;
|
2002-08-05 01:18:56 +04:00
|
|
|
} else if (strcmp(argv[i], "-p") == 0) {
|
1999-11-08 14:22:45 +03:00
|
|
|
preserve = 1;
|
2002-08-05 01:18:56 +04:00
|
|
|
} else if (strcmp(argv[i], "-q") == 0) {
|
1999-11-08 14:22:45 +03:00
|
|
|
statistics = 0;
|
2012-09-19 21:08:15 +04:00
|
|
|
} else if (strcmp(argv[i], "-h") == 0 ||
|
|
|
|
strcmp(argv[i], "-?") == 0 ||
|
|
|
|
strcmp(argv[i], "--help") == 0) {
|
1999-11-08 14:22:45 +03:00
|
|
|
usage();
|
2012-09-19 21:08:15 +04:00
|
|
|
} else if (strcmp(argv[i], "-V") == 0 ||
|
|
|
|
strcmp(argv[i], "--version") == 0) {
|
2004-04-18 00:25:09 +04:00
|
|
|
version();
|
2002-08-05 01:18:56 +04:00
|
|
|
} else if (strcmp(argv[i], "-ls") == 0) {
|
2001-05-06 18:35:20 +04:00
|
|
|
list = 1;
|
2002-08-05 01:18:56 +04:00
|
|
|
} else if (strcmp(argv[i], "-batch") == 0) {
|
|
|
|
console_batch_mode = 1;
|
|
|
|
} else if (strcmp(argv[i], "-unsafe") == 0) {
|
2001-08-27 19:02:52 +04:00
|
|
|
scp_unsafe_mode = 1;
|
2004-04-26 02:18:19 +04:00
|
|
|
} else if (strcmp(argv[i], "-sftp") == 0) {
|
|
|
|
try_scp = 0; try_sftp = 1;
|
|
|
|
} else if (strcmp(argv[i], "-scp") == 0) {
|
|
|
|
try_scp = 1; try_sftp = 0;
|
2002-08-05 01:18:56 +04:00
|
|
|
} else if (strcmp(argv[i], "--") == 0) {
|
2001-05-06 18:35:20 +04:00
|
|
|
i++;
|
|
|
|
break;
|
2002-11-20 23:09:02 +03:00
|
|
|
} else {
|
|
|
|
cmdline_error("unknown option \"%s\"", argv[i]);
|
|
|
|
}
|
1999-11-08 14:22:45 +03:00
|
|
|
}
|
|
|
|
argc -= i;
|
|
|
|
argv += i;
|
2000-11-15 14:13:22 +03:00
|
|
|
back = NULL;
|
1999-11-08 14:22:45 +03:00
|
|
|
|
2000-04-03 23:54:31 +04:00
|
|
|
if (list) {
|
|
|
|
if (argc != 1)
|
|
|
|
usage();
|
|
|
|
get_dir_list(argc, argv);
|
1999-11-08 14:22:45 +03:00
|
|
|
|
2000-04-03 23:54:31 +04:00
|
|
|
} else {
|
|
|
|
|
|
|
|
if (argc < 2)
|
|
|
|
usage();
|
|
|
|
if (argc > 2)
|
|
|
|
targetshouldbedirectory = 1;
|
|
|
|
|
2001-05-06 18:35:20 +04:00
|
|
|
if (colon(argv[argc - 1]) != NULL)
|
2000-04-03 23:54:31 +04:00
|
|
|
toremote(argc, argv);
|
|
|
|
else
|
|
|
|
tolocal(argc, argv);
|
|
|
|
}
|
1999-11-08 14:22:45 +03:00
|
|
|
|
2006-08-27 12:03:19 +04:00
|
|
|
if (back != NULL && back->connected(backhandle)) {
|
1999-11-08 14:22:45 +03:00
|
|
|
char ch;
|
2002-10-25 15:30:33 +04:00
|
|
|
back->special(backhandle, TS_EOF);
|
2011-09-13 15:44:03 +04:00
|
|
|
sent_eof = TRUE;
|
2018-05-26 10:31:34 +03:00
|
|
|
ssh_scp_recv(&ch, 1);
|
1999-11-08 14:22:45 +03:00
|
|
|
}
|
|
|
|
random_save_seed();
|
1999-08-31 13:20:48 +04:00
|
|
|
|
2003-12-19 15:44:46 +03:00
|
|
|
cmdline_cleanup();
|
|
|
|
console_provide_logctx(NULL);
|
|
|
|
back->free(backhandle);
|
|
|
|
backhandle = NULL;
|
|
|
|
back = NULL;
|
|
|
|
sk_cleanup();
|
1999-11-08 14:22:45 +03:00
|
|
|
return (errs == 0 ? 0 : 1);
|
1999-08-31 13:20:48 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
/* end */
|