[BACK]Return to sftp-client.c CVS log [TXT][DIR] Up to [local] / src / usr.bin / ssh

Annotation of src/usr.bin/ssh/sftp-client.c, Revision 1.33

1.1       djm         1: /*
1.23      djm         2:  * Copyright (c) 2001,2002 Damien Miller.  All rights reserved.
1.1       djm         3:  *
                      4:  * Redistribution and use in source and binary forms, with or without
                      5:  * modification, are permitted provided that the following conditions
                      6:  * are met:
                      7:  * 1. Redistributions of source code must retain the above copyright
                      8:  *    notice, this list of conditions and the following disclaimer.
                      9:  * 2. Redistributions in binary form must reproduce the above copyright
                     10:  *    notice, this list of conditions and the following disclaimer in the
                     11:  *    documentation and/or other materials provided with the distribution.
                     12:  *
                     13:  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
                     14:  * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
                     15:  * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
                     16:  * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
                     17:  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
                     18:  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
                     19:  * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
                     20:  * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
                     21:  * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
                     22:  * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
                     23:  */
                     24:
                     25: /* XXX: memleaks */
                     26: /* XXX: signed vs unsigned */
1.23      djm        27: /* XXX: remove all logging, only return status codes */
1.1       djm        28: /* XXX: copy between two remote sites */
                     29:
                     30: #include "includes.h"
1.33    ! deraadt    31: RCSID("$OpenBSD: sftp-client.c,v 1.32 2002/06/09 13:32:01 markus Exp $");
1.21      djm        32:
                     33: #include <sys/queue.h>
1.1       djm        34:
                     35: #include "buffer.h"
                     36: #include "bufaux.h"
                     37: #include "getput.h"
                     38: #include "xmalloc.h"
                     39: #include "log.h"
                     40: #include "atomicio.h"
                     41:
                     42: #include "sftp.h"
                     43: #include "sftp-common.h"
                     44: #include "sftp-client.h"
                     45:
1.21      djm        46: /* Minimum amount of data to read at at time */
                     47: #define MIN_READ_SIZE  512
                     48:
1.23      djm        49: struct sftp_conn {
                     50:        int fd_in;
                     51:        int fd_out;
                     52:        u_int transfer_buflen;
                     53:        u_int num_requests;
                     54:        u_int version;
                     55:        u_int msg_id;
                     56: };
1.4       djm        57:
1.17      itojun     58: static void
1.1       djm        59: send_msg(int fd, Buffer *m)
                     60: {
                     61:        int mlen = buffer_len(m);
                     62:        int len;
                     63:        Buffer oqueue;
                     64:
                     65:        buffer_init(&oqueue);
                     66:        buffer_put_int(&oqueue, mlen);
                     67:        buffer_append(&oqueue, buffer_ptr(m), mlen);
                     68:        buffer_consume(m, mlen);
                     69:
                     70:        len = atomicio(write, fd, buffer_ptr(&oqueue), buffer_len(&oqueue));
                     71:        if (len <= 0)
                     72:                fatal("Couldn't send packet: %s", strerror(errno));
                     73:
                     74:        buffer_free(&oqueue);
                     75: }
                     76:
1.17      itojun     77: static void
1.1       djm        78: get_msg(int fd, Buffer *m)
                     79: {
                     80:        u_int len, msg_len;
                     81:        unsigned char buf[4096];
                     82:
                     83:        len = atomicio(read, fd, buf, 4);
1.15      djm        84:        if (len == 0)
                     85:                fatal("Connection closed");
                     86:        else if (len == -1)
1.1       djm        87:                fatal("Couldn't read packet: %s", strerror(errno));
                     88:
                     89:        msg_len = GET_32BIT(buf);
                     90:        if (msg_len > 256 * 1024)
1.33    ! deraadt    91:                fatal("Received message too long %u", msg_len);
1.1       djm        92:
                     93:        while (msg_len) {
                     94:                len = atomicio(read, fd, buf, MIN(msg_len, sizeof(buf)));
1.15      djm        95:                if (len == 0)
                     96:                        fatal("Connection closed");
                     97:                else if (len == -1)
1.1       djm        98:                        fatal("Couldn't read packet: %s", strerror(errno));
                     99:
                    100:                msg_len -= len;
                    101:                buffer_append(m, buf, len);
                    102:        }
                    103: }
                    104:
1.17      itojun    105: static void
1.1       djm       106: send_string_request(int fd, u_int id, u_int code, char *s,
                    107:     u_int len)
                    108: {
                    109:        Buffer msg;
                    110:
                    111:        buffer_init(&msg);
                    112:        buffer_put_char(&msg, code);
                    113:        buffer_put_int(&msg, id);
                    114:        buffer_put_string(&msg, s, len);
                    115:        send_msg(fd, &msg);
1.33    ! deraadt   116:        debug3("Sent message fd %d T:%u I:%u", fd, code, id);
1.1       djm       117:        buffer_free(&msg);
                    118: }
                    119:
1.17      itojun    120: static void
1.1       djm       121: send_string_attrs_request(int fd, u_int id, u_int code, char *s,
                    122:     u_int len, Attrib *a)
                    123: {
                    124:        Buffer msg;
                    125:
                    126:        buffer_init(&msg);
                    127:        buffer_put_char(&msg, code);
                    128:        buffer_put_int(&msg, id);
                    129:        buffer_put_string(&msg, s, len);
                    130:        encode_attrib(&msg, a);
                    131:        send_msg(fd, &msg);
1.33    ! deraadt   132:        debug3("Sent message fd %d T:%u I:%u", fd, code, id);
1.1       djm       133:        buffer_free(&msg);
                    134: }
                    135:
1.17      itojun    136: static u_int
1.33    ! deraadt   137: get_status(int fd, u_int expected_id)
1.1       djm       138: {
                    139:        Buffer msg;
                    140:        u_int type, id, status;
                    141:
                    142:        buffer_init(&msg);
                    143:        get_msg(fd, &msg);
                    144:        type = buffer_get_char(&msg);
                    145:        id = buffer_get_int(&msg);
                    146:
                    147:        if (id != expected_id)
1.33    ! deraadt   148:                fatal("ID mismatch (%u != %u)", id, expected_id);
1.1       djm       149:        if (type != SSH2_FXP_STATUS)
1.33    ! deraadt   150:                fatal("Expected SSH2_FXP_STATUS(%u) packet, got %u",
1.1       djm       151:                    SSH2_FXP_STATUS, type);
                    152:
                    153:        status = buffer_get_int(&msg);
                    154:        buffer_free(&msg);
                    155:
1.33    ! deraadt   156:        debug3("SSH2_FXP_STATUS %u", status);
1.1       djm       157:
                    158:        return(status);
                    159: }
                    160:
1.17      itojun    161: static char *
1.1       djm       162: get_handle(int fd, u_int expected_id, u_int *len)
                    163: {
                    164:        Buffer msg;
                    165:        u_int type, id;
                    166:        char *handle;
                    167:
                    168:        buffer_init(&msg);
                    169:        get_msg(fd, &msg);
                    170:        type = buffer_get_char(&msg);
                    171:        id = buffer_get_int(&msg);
                    172:
                    173:        if (id != expected_id)
1.33    ! deraadt   174:                fatal("ID mismatch (%u != %u)", id, expected_id);
1.1       djm       175:        if (type == SSH2_FXP_STATUS) {
                    176:                int status = buffer_get_int(&msg);
                    177:
                    178:                error("Couldn't get handle: %s", fx2txt(status));
                    179:                return(NULL);
                    180:        } else if (type != SSH2_FXP_HANDLE)
1.33    ! deraadt   181:                fatal("Expected SSH2_FXP_HANDLE(%u) packet, got %u",
1.1       djm       182:                    SSH2_FXP_HANDLE, type);
                    183:
                    184:        handle = buffer_get_string(&msg, len);
                    185:        buffer_free(&msg);
                    186:
                    187:        return(handle);
                    188: }
                    189:
1.17      itojun    190: static Attrib *
1.14      djm       191: get_decode_stat(int fd, u_int expected_id, int quiet)
1.1       djm       192: {
                    193:        Buffer msg;
                    194:        u_int type, id;
                    195:        Attrib *a;
                    196:
                    197:        buffer_init(&msg);
                    198:        get_msg(fd, &msg);
                    199:
                    200:        type = buffer_get_char(&msg);
                    201:        id = buffer_get_int(&msg);
                    202:
1.33    ! deraadt   203:        debug3("Received stat reply T:%u I:%u", type, id);
1.1       djm       204:        if (id != expected_id)
1.33    ! deraadt   205:                fatal("ID mismatch (%u != %u)", id, expected_id);
1.1       djm       206:        if (type == SSH2_FXP_STATUS) {
                    207:                int status = buffer_get_int(&msg);
                    208:
1.14      djm       209:                if (quiet)
                    210:                        debug("Couldn't stat remote file: %s", fx2txt(status));
                    211:                else
                    212:                        error("Couldn't stat remote file: %s", fx2txt(status));
1.1       djm       213:                return(NULL);
                    214:        } else if (type != SSH2_FXP_ATTRS) {
1.33    ! deraadt   215:                fatal("Expected SSH2_FXP_ATTRS(%u) packet, got %u",
1.1       djm       216:                    SSH2_FXP_ATTRS, type);
                    217:        }
                    218:        a = decode_attrib(&msg);
                    219:        buffer_free(&msg);
                    220:
                    221:        return(a);
                    222: }
                    223:
1.23      djm       224: struct sftp_conn *
                    225: do_init(int fd_in, int fd_out, u_int transfer_buflen, u_int num_requests)
1.1       djm       226: {
1.33    ! deraadt   227:        u_int type;
        !           228:        int version;
1.1       djm       229:        Buffer msg;
1.23      djm       230:        struct sftp_conn *ret;
1.1       djm       231:
                    232:        buffer_init(&msg);
                    233:        buffer_put_char(&msg, SSH2_FXP_INIT);
                    234:        buffer_put_int(&msg, SSH2_FILEXFER_VERSION);
                    235:        send_msg(fd_out, &msg);
                    236:
                    237:        buffer_clear(&msg);
                    238:
                    239:        get_msg(fd_in, &msg);
                    240:
1.3       stevesk   241:        /* Expecting a VERSION reply */
1.1       djm       242:        if ((type = buffer_get_char(&msg)) != SSH2_FXP_VERSION) {
1.33    ! deraadt   243:                error("Invalid packet back from SSH2_FXP_INIT (type %u)",
1.1       djm       244:                    type);
                    245:                buffer_free(&msg);
1.23      djm       246:                return(NULL);
1.1       djm       247:        }
                    248:        version = buffer_get_int(&msg);
                    249:
                    250:        debug2("Remote version: %d", version);
                    251:
                    252:        /* Check for extensions */
                    253:        while (buffer_len(&msg) > 0) {
                    254:                char *name = buffer_get_string(&msg, NULL);
                    255:                char *value = buffer_get_string(&msg, NULL);
                    256:
                    257:                debug2("Init extension: \"%s\"", name);
                    258:                xfree(name);
                    259:                xfree(value);
                    260:        }
                    261:
                    262:        buffer_free(&msg);
1.11      djm       263:
1.23      djm       264:        ret = xmalloc(sizeof(*ret));
                    265:        ret->fd_in = fd_in;
                    266:        ret->fd_out = fd_out;
                    267:        ret->transfer_buflen = transfer_buflen;
                    268:        ret->num_requests = num_requests;
                    269:        ret->version = version;
                    270:        ret->msg_id = 1;
                    271:
                    272:        /* Some filexfer v.0 servers don't support large packets */
                    273:        if (version == 0)
1.29      markus    274:                ret->transfer_buflen = MIN(ret->transfer_buflen, 20480);
1.23      djm       275:
                    276:        return(ret);
                    277: }
                    278:
                    279: u_int
                    280: sftp_proto_version(struct sftp_conn *conn)
                    281: {
                    282:        return(conn->version);
1.1       djm       283: }
                    284:
                    285: int
1.23      djm       286: do_close(struct sftp_conn *conn, char *handle, u_int handle_len)
1.1       djm       287: {
                    288:        u_int id, status;
                    289:        Buffer msg;
                    290:
                    291:        buffer_init(&msg);
                    292:
1.23      djm       293:        id = conn->msg_id++;
1.1       djm       294:        buffer_put_char(&msg, SSH2_FXP_CLOSE);
                    295:        buffer_put_int(&msg, id);
                    296:        buffer_put_string(&msg, handle, handle_len);
1.23      djm       297:        send_msg(conn->fd_out, &msg);
1.33    ! deraadt   298:        debug3("Sent message SSH2_FXP_CLOSE I:%u", id);
1.1       djm       299:
1.23      djm       300:        status = get_status(conn->fd_in, id);
1.1       djm       301:        if (status != SSH2_FX_OK)
                    302:                error("Couldn't close file: %s", fx2txt(status));
                    303:
                    304:        buffer_free(&msg);
                    305:
                    306:        return(status);
                    307: }
                    308:
1.12      djm       309:
1.17      itojun    310: static int
1.23      djm       311: do_lsreaddir(struct sftp_conn *conn, char *path, int printflag,
1.12      djm       312:     SFTP_DIRENT ***dir)
1.1       djm       313: {
                    314:        Buffer msg;
1.13      markus    315:        u_int type, id, handle_len, i, expected_id, ents = 0;
1.1       djm       316:        char *handle;
                    317:
1.23      djm       318:        id = conn->msg_id++;
1.1       djm       319:
                    320:        buffer_init(&msg);
                    321:        buffer_put_char(&msg, SSH2_FXP_OPENDIR);
                    322:        buffer_put_int(&msg, id);
                    323:        buffer_put_cstring(&msg, path);
1.23      djm       324:        send_msg(conn->fd_out, &msg);
1.1       djm       325:
                    326:        buffer_clear(&msg);
                    327:
1.23      djm       328:        handle = get_handle(conn->fd_in, id, &handle_len);
1.1       djm       329:        if (handle == NULL)
                    330:                return(-1);
                    331:
1.12      djm       332:        if (dir) {
                    333:                ents = 0;
                    334:                *dir = xmalloc(sizeof(**dir));
                    335:                (*dir)[0] = NULL;
                    336:        }
                    337:
1.19      deraadt   338:        for (;;) {
1.1       djm       339:                int count;
                    340:
1.23      djm       341:                id = expected_id = conn->msg_id++;
1.1       djm       342:
1.33    ! deraadt   343:                debug3("Sending SSH2_FXP_READDIR I:%u", id);
1.1       djm       344:
                    345:                buffer_clear(&msg);
                    346:                buffer_put_char(&msg, SSH2_FXP_READDIR);
                    347:                buffer_put_int(&msg, id);
                    348:                buffer_put_string(&msg, handle, handle_len);
1.23      djm       349:                send_msg(conn->fd_out, &msg);
1.1       djm       350:
                    351:                buffer_clear(&msg);
                    352:
1.23      djm       353:                get_msg(conn->fd_in, &msg);
1.1       djm       354:
                    355:                type = buffer_get_char(&msg);
                    356:                id = buffer_get_int(&msg);
                    357:
1.33    ! deraadt   358:                debug3("Received reply T:%u I:%u", type, id);
1.1       djm       359:
                    360:                if (id != expected_id)
1.33    ! deraadt   361:                        fatal("ID mismatch (%u != %u)", id, expected_id);
1.1       djm       362:
                    363:                if (type == SSH2_FXP_STATUS) {
                    364:                        int status = buffer_get_int(&msg);
                    365:
                    366:                        debug3("Received SSH2_FXP_STATUS %d", status);
                    367:
                    368:                        if (status == SSH2_FX_EOF) {
                    369:                                break;
                    370:                        } else {
                    371:                                error("Couldn't read directory: %s",
                    372:                                    fx2txt(status));
1.23      djm       373:                                do_close(conn, handle, handle_len);
1.9       djm       374:                                return(status);
1.1       djm       375:                        }
                    376:                } else if (type != SSH2_FXP_NAME)
1.33    ! deraadt   377:                        fatal("Expected SSH2_FXP_NAME(%u) packet, got %u",
1.1       djm       378:                            SSH2_FXP_NAME, type);
                    379:
                    380:                count = buffer_get_int(&msg);
1.7       markus    381:                if (count == 0)
                    382:                        break;
1.8       stevesk   383:                debug3("Received %d SSH2_FXP_NAME responses", count);
1.19      deraadt   384:                for (i = 0; i < count; i++) {
1.1       djm       385:                        char *filename, *longname;
                    386:                        Attrib *a;
                    387:
                    388:                        filename = buffer_get_string(&msg, NULL);
                    389:                        longname = buffer_get_string(&msg, NULL);
                    390:                        a = decode_attrib(&msg);
                    391:
1.12      djm       392:                        if (printflag)
                    393:                                printf("%s\n", longname);
                    394:
                    395:                        if (dir) {
1.16      markus    396:                                *dir = xrealloc(*dir, sizeof(**dir) *
1.12      djm       397:                                    (ents + 2));
                    398:                                (*dir)[ents] = xmalloc(sizeof(***dir));
                    399:                                (*dir)[ents]->filename = xstrdup(filename);
                    400:                                (*dir)[ents]->longname = xstrdup(longname);
                    401:                                memcpy(&(*dir)[ents]->a, a, sizeof(*a));
                    402:                                (*dir)[++ents] = NULL;
                    403:                        }
1.1       djm       404:
                    405:                        xfree(filename);
                    406:                        xfree(longname);
                    407:                }
                    408:        }
                    409:
                    410:        buffer_free(&msg);
1.23      djm       411:        do_close(conn, handle, handle_len);
1.1       djm       412:        xfree(handle);
                    413:
                    414:        return(0);
                    415: }
                    416:
                    417: int
1.23      djm       418: do_ls(struct sftp_conn *conn, char *path)
1.12      djm       419: {
1.23      djm       420:        return(do_lsreaddir(conn, path, 1, NULL));
1.12      djm       421: }
                    422:
                    423: int
1.23      djm       424: do_readdir(struct sftp_conn *conn, char *path, SFTP_DIRENT ***dir)
1.12      djm       425: {
1.23      djm       426:        return(do_lsreaddir(conn, path, 0, dir));
1.12      djm       427: }
                    428:
                    429: void free_sftp_dirents(SFTP_DIRENT **s)
                    430: {
                    431:        int i;
1.19      deraadt   432:
                    433:        for (i = 0; s[i]; i++) {
1.12      djm       434:                xfree(s[i]->filename);
                    435:                xfree(s[i]->longname);
                    436:                xfree(s[i]);
                    437:        }
                    438:        xfree(s);
                    439: }
                    440:
                    441: int
1.23      djm       442: do_rm(struct sftp_conn *conn, char *path)
1.1       djm       443: {
                    444:        u_int status, id;
                    445:
                    446:        debug2("Sending SSH2_FXP_REMOVE \"%s\"", path);
                    447:
1.23      djm       448:        id = conn->msg_id++;
1.28      markus    449:        send_string_request(conn->fd_out, id, SSH2_FXP_REMOVE, path,
1.23      djm       450:            strlen(path));
                    451:        status = get_status(conn->fd_in, id);
1.1       djm       452:        if (status != SSH2_FX_OK)
                    453:                error("Couldn't delete file: %s", fx2txt(status));
                    454:        return(status);
                    455: }
                    456:
                    457: int
1.23      djm       458: do_mkdir(struct sftp_conn *conn, char *path, Attrib *a)
1.1       djm       459: {
                    460:        u_int status, id;
                    461:
1.23      djm       462:        id = conn->msg_id++;
                    463:        send_string_attrs_request(conn->fd_out, id, SSH2_FXP_MKDIR, path,
1.1       djm       464:            strlen(path), a);
                    465:
1.23      djm       466:        status = get_status(conn->fd_in, id);
1.1       djm       467:        if (status != SSH2_FX_OK)
                    468:                error("Couldn't create directory: %s", fx2txt(status));
                    469:
                    470:        return(status);
                    471: }
                    472:
                    473: int
1.23      djm       474: do_rmdir(struct sftp_conn *conn, char *path)
1.1       djm       475: {
                    476:        u_int status, id;
                    477:
1.23      djm       478:        id = conn->msg_id++;
                    479:        send_string_request(conn->fd_out, id, SSH2_FXP_RMDIR, path,
                    480:            strlen(path));
1.1       djm       481:
1.23      djm       482:        status = get_status(conn->fd_in, id);
1.1       djm       483:        if (status != SSH2_FX_OK)
                    484:                error("Couldn't remove directory: %s", fx2txt(status));
                    485:
                    486:        return(status);
                    487: }
                    488:
                    489: Attrib *
1.23      djm       490: do_stat(struct sftp_conn *conn, char *path, int quiet)
1.1       djm       491: {
                    492:        u_int id;
                    493:
1.23      djm       494:        id = conn->msg_id++;
                    495:
1.28      markus    496:        send_string_request(conn->fd_out, id,
                    497:            conn->version == 0 ? SSH2_FXP_STAT_VERSION_0 : SSH2_FXP_STAT,
1.23      djm       498:            path, strlen(path));
                    499:
                    500:        return(get_decode_stat(conn->fd_in, id, quiet));
1.1       djm       501: }
                    502:
                    503: Attrib *
1.23      djm       504: do_lstat(struct sftp_conn *conn, char *path, int quiet)
1.1       djm       505: {
                    506:        u_int id;
                    507:
1.23      djm       508:        if (conn->version == 0) {
                    509:                if (quiet)
                    510:                        debug("Server version does not support lstat operation");
                    511:                else
1.30      markus    512:                        log("Server version does not support lstat operation");
                    513:                return(do_stat(conn, path, quiet));
1.23      djm       514:        }
                    515:
                    516:        id = conn->msg_id++;
                    517:        send_string_request(conn->fd_out, id, SSH2_FXP_LSTAT, path,
                    518:            strlen(path));
                    519:
                    520:        return(get_decode_stat(conn->fd_in, id, quiet));
1.1       djm       521: }
                    522:
                    523: Attrib *
1.23      djm       524: do_fstat(struct sftp_conn *conn, char *handle, u_int handle_len, int quiet)
1.1       djm       525: {
                    526:        u_int id;
                    527:
1.23      djm       528:        id = conn->msg_id++;
                    529:        send_string_request(conn->fd_out, id, SSH2_FXP_FSTAT, handle,
                    530:            handle_len);
                    531:
                    532:        return(get_decode_stat(conn->fd_in, id, quiet));
1.1       djm       533: }
                    534:
                    535: int
1.23      djm       536: do_setstat(struct sftp_conn *conn, char *path, Attrib *a)
1.1       djm       537: {
                    538:        u_int status, id;
                    539:
1.23      djm       540:        id = conn->msg_id++;
                    541:        send_string_attrs_request(conn->fd_out, id, SSH2_FXP_SETSTAT, path,
1.1       djm       542:            strlen(path), a);
                    543:
1.23      djm       544:        status = get_status(conn->fd_in, id);
1.1       djm       545:        if (status != SSH2_FX_OK)
                    546:                error("Couldn't setstat on \"%s\": %s", path,
                    547:                    fx2txt(status));
                    548:
                    549:        return(status);
                    550: }
                    551:
                    552: int
1.23      djm       553: do_fsetstat(struct sftp_conn *conn, char *handle, u_int handle_len,
1.1       djm       554:     Attrib *a)
                    555: {
                    556:        u_int status, id;
                    557:
1.23      djm       558:        id = conn->msg_id++;
                    559:        send_string_attrs_request(conn->fd_out, id, SSH2_FXP_FSETSTAT, handle,
1.1       djm       560:            handle_len, a);
                    561:
1.23      djm       562:        status = get_status(conn->fd_in, id);
1.1       djm       563:        if (status != SSH2_FX_OK)
                    564:                error("Couldn't fsetstat: %s", fx2txt(status));
                    565:
                    566:        return(status);
                    567: }
                    568:
                    569: char *
1.23      djm       570: do_realpath(struct sftp_conn *conn, char *path)
1.1       djm       571: {
                    572:        Buffer msg;
                    573:        u_int type, expected_id, count, id;
                    574:        char *filename, *longname;
                    575:        Attrib *a;
                    576:
1.23      djm       577:        expected_id = id = conn->msg_id++;
                    578:        send_string_request(conn->fd_out, id, SSH2_FXP_REALPATH, path,
                    579:            strlen(path));
1.1       djm       580:
                    581:        buffer_init(&msg);
                    582:
1.23      djm       583:        get_msg(conn->fd_in, &msg);
1.1       djm       584:        type = buffer_get_char(&msg);
                    585:        id = buffer_get_int(&msg);
                    586:
                    587:        if (id != expected_id)
1.33    ! deraadt   588:                fatal("ID mismatch (%u != %u)", id, expected_id);
1.1       djm       589:
                    590:        if (type == SSH2_FXP_STATUS) {
                    591:                u_int status = buffer_get_int(&msg);
                    592:
                    593:                error("Couldn't canonicalise: %s", fx2txt(status));
                    594:                return(NULL);
                    595:        } else if (type != SSH2_FXP_NAME)
1.33    ! deraadt   596:                fatal("Expected SSH2_FXP_NAME(%u) packet, got %u",
1.1       djm       597:                    SSH2_FXP_NAME, type);
                    598:
                    599:        count = buffer_get_int(&msg);
                    600:        if (count != 1)
                    601:                fatal("Got multiple names (%d) from SSH_FXP_REALPATH", count);
                    602:
                    603:        filename = buffer_get_string(&msg, NULL);
                    604:        longname = buffer_get_string(&msg, NULL);
                    605:        a = decode_attrib(&msg);
                    606:
                    607:        debug3("SSH_FXP_REALPATH %s -> %s", path, filename);
                    608:
                    609:        xfree(longname);
                    610:
                    611:        buffer_free(&msg);
                    612:
                    613:        return(filename);
                    614: }
                    615:
                    616: int
1.23      djm       617: do_rename(struct sftp_conn *conn, char *oldpath, char *newpath)
1.1       djm       618: {
                    619:        Buffer msg;
                    620:        u_int status, id;
                    621:
                    622:        buffer_init(&msg);
                    623:
                    624:        /* Send rename request */
1.23      djm       625:        id = conn->msg_id++;
1.1       djm       626:        buffer_put_char(&msg, SSH2_FXP_RENAME);
                    627:        buffer_put_int(&msg, id);
                    628:        buffer_put_cstring(&msg, oldpath);
                    629:        buffer_put_cstring(&msg, newpath);
1.23      djm       630:        send_msg(conn->fd_out, &msg);
1.1       djm       631:        debug3("Sent message SSH2_FXP_RENAME \"%s\" -> \"%s\"", oldpath,
                    632:            newpath);
                    633:        buffer_free(&msg);
                    634:
1.23      djm       635:        status = get_status(conn->fd_in, id);
1.1       djm       636:        if (status != SSH2_FX_OK)
1.23      djm       637:                error("Couldn't rename file \"%s\" to \"%s\": %s", oldpath,
                    638:                    newpath, fx2txt(status));
1.1       djm       639:
                    640:        return(status);
1.11      djm       641: }
                    642:
                    643: int
1.23      djm       644: do_symlink(struct sftp_conn *conn, char *oldpath, char *newpath)
1.11      djm       645: {
                    646:        Buffer msg;
                    647:        u_int status, id;
                    648:
1.23      djm       649:        if (conn->version < 3) {
                    650:                error("This server does not support the symlink operation");
                    651:                return(SSH2_FX_OP_UNSUPPORTED);
                    652:        }
                    653:
1.11      djm       654:        buffer_init(&msg);
                    655:
                    656:        /* Send rename request */
1.23      djm       657:        id = conn->msg_id++;
1.11      djm       658:        buffer_put_char(&msg, SSH2_FXP_SYMLINK);
                    659:        buffer_put_int(&msg, id);
                    660:        buffer_put_cstring(&msg, oldpath);
                    661:        buffer_put_cstring(&msg, newpath);
1.23      djm       662:        send_msg(conn->fd_out, &msg);
1.11      djm       663:        debug3("Sent message SSH2_FXP_SYMLINK \"%s\" -> \"%s\"", oldpath,
                    664:            newpath);
                    665:        buffer_free(&msg);
                    666:
1.23      djm       667:        status = get_status(conn->fd_in, id);
1.11      djm       668:        if (status != SSH2_FX_OK)
1.23      djm       669:                error("Couldn't rename file \"%s\" to \"%s\": %s", oldpath,
                    670:                    newpath, fx2txt(status));
1.11      djm       671:
                    672:        return(status);
                    673: }
                    674:
                    675: char *
1.23      djm       676: do_readlink(struct sftp_conn *conn, char *path)
1.11      djm       677: {
                    678:        Buffer msg;
                    679:        u_int type, expected_id, count, id;
                    680:        char *filename, *longname;
                    681:        Attrib *a;
                    682:
1.23      djm       683:        expected_id = id = conn->msg_id++;
                    684:        send_string_request(conn->fd_out, id, SSH2_FXP_READLINK, path,
                    685:            strlen(path));
1.11      djm       686:
                    687:        buffer_init(&msg);
                    688:
1.23      djm       689:        get_msg(conn->fd_in, &msg);
1.11      djm       690:        type = buffer_get_char(&msg);
                    691:        id = buffer_get_int(&msg);
                    692:
                    693:        if (id != expected_id)
1.33    ! deraadt   694:                fatal("ID mismatch (%u != %u)", id, expected_id);
1.11      djm       695:
                    696:        if (type == SSH2_FXP_STATUS) {
                    697:                u_int status = buffer_get_int(&msg);
                    698:
                    699:                error("Couldn't readlink: %s", fx2txt(status));
                    700:                return(NULL);
                    701:        } else if (type != SSH2_FXP_NAME)
1.33    ! deraadt   702:                fatal("Expected SSH2_FXP_NAME(%u) packet, got %u",
1.11      djm       703:                    SSH2_FXP_NAME, type);
                    704:
                    705:        count = buffer_get_int(&msg);
                    706:        if (count != 1)
                    707:                fatal("Got multiple names (%d) from SSH_FXP_READLINK", count);
                    708:
                    709:        filename = buffer_get_string(&msg, NULL);
                    710:        longname = buffer_get_string(&msg, NULL);
                    711:        a = decode_attrib(&msg);
                    712:
                    713:        debug3("SSH_FXP_READLINK %s -> %s", path, filename);
                    714:
                    715:        xfree(longname);
                    716:
                    717:        buffer_free(&msg);
                    718:
                    719:        return(filename);
1.1       djm       720: }
                    721:
1.21      djm       722: static void
                    723: send_read_request(int fd_out, u_int id, u_int64_t offset, u_int len,
                    724:     char *handle, u_int handle_len)
                    725: {
                    726:        Buffer msg;
1.28      markus    727:
1.21      djm       728:        buffer_init(&msg);
                    729:        buffer_clear(&msg);
                    730:        buffer_put_char(&msg, SSH2_FXP_READ);
                    731:        buffer_put_int(&msg, id);
                    732:        buffer_put_string(&msg, handle, handle_len);
                    733:        buffer_put_int64(&msg, offset);
                    734:        buffer_put_int(&msg, len);
                    735:        send_msg(fd_out, &msg);
                    736:        buffer_free(&msg);
1.28      markus    737: }
1.21      djm       738:
1.1       djm       739: int
1.23      djm       740: do_download(struct sftp_conn *conn, char *remote_path, char *local_path,
                    741:     int pflag)
1.1       djm       742: {
1.21      djm       743:        Attrib junk, *a;
                    744:        Buffer msg;
1.1       djm       745:        char *handle;
1.21      djm       746:        int local_fd, status, num_req, max_req, write_error;
                    747:        int read_error, write_errno;
                    748:        u_int64_t offset, size;
1.23      djm       749:        u_int handle_len, mode, type, id, buflen;
1.21      djm       750:        struct request {
                    751:                u_int id;
                    752:                u_int len;
                    753:                u_int64_t offset;
1.28      markus    754:                TAILQ_ENTRY(request) tq;
1.21      djm       755:        };
                    756:        TAILQ_HEAD(reqhead, request) requests;
                    757:        struct request *req;
                    758:
                    759:        TAILQ_INIT(&requests);
1.1       djm       760:
1.23      djm       761:        a = do_stat(conn, remote_path, 0);
1.1       djm       762:        if (a == NULL)
                    763:                return(-1);
                    764:
                    765:        /* XXX: should we preserve set[ug]id? */
                    766:        if (a->flags & SSH2_FILEXFER_ATTR_PERMISSIONS)
                    767:                mode = S_IWRITE | (a->perm & 0777);
                    768:        else
                    769:                mode = 0666;
                    770:
1.14      djm       771:        if ((a->flags & SSH2_FILEXFER_ATTR_PERMISSIONS) &&
                    772:            (a->perm & S_IFDIR)) {
                    773:                error("Cannot download a directory: %s", remote_path);
                    774:                return(-1);
                    775:        }
                    776:
1.21      djm       777:        if (a->flags & SSH2_FILEXFER_ATTR_SIZE)
                    778:                size = a->size;
                    779:        else
                    780:                size = 0;
                    781:
1.23      djm       782:        buflen = conn->transfer_buflen;
1.1       djm       783:        buffer_init(&msg);
                    784:
                    785:        /* Send open request */
1.23      djm       786:        id = conn->msg_id++;
1.1       djm       787:        buffer_put_char(&msg, SSH2_FXP_OPEN);
                    788:        buffer_put_int(&msg, id);
                    789:        buffer_put_cstring(&msg, remote_path);
                    790:        buffer_put_int(&msg, SSH2_FXF_READ);
                    791:        attrib_clear(&junk); /* Send empty attributes */
                    792:        encode_attrib(&msg, &junk);
1.23      djm       793:        send_msg(conn->fd_out, &msg);
1.33    ! deraadt   794:        debug3("Sent message SSH2_FXP_OPEN I:%u P:%s", id, remote_path);
1.1       djm       795:
1.23      djm       796:        handle = get_handle(conn->fd_in, id, &handle_len);
1.1       djm       797:        if (handle == NULL) {
                    798:                buffer_free(&msg);
                    799:                return(-1);
                    800:        }
                    801:
1.23      djm       802:        local_fd = open(local_path, O_WRONLY | O_CREAT | O_TRUNC, mode);
                    803:        if (local_fd == -1) {
                    804:                error("Couldn't open local file \"%s\" for writing: %s",
                    805:                    local_path, strerror(errno));
1.24      markus    806:                buffer_free(&msg);
                    807:                xfree(handle);
1.23      djm       808:                return(-1);
                    809:        }
                    810:
1.1       djm       811:        /* Read from remote and write to local */
1.21      djm       812:        write_error = read_error = write_errno = num_req = offset = 0;
                    813:        max_req = 1;
                    814:        while (num_req > 0 || max_req > 0) {
                    815:                char *data;
1.1       djm       816:                u_int len;
                    817:
1.21      djm       818:                /* Send some more requests */
                    819:                while (num_req < max_req) {
1.28      markus    820:                        debug3("Request range %llu -> %llu (%d/%d)",
1.25      itojun    821:                            (unsigned long long)offset,
                    822:                            (unsigned long long)offset + buflen - 1,
                    823:                            num_req, max_req);
1.21      djm       824:                        req = xmalloc(sizeof(*req));
1.23      djm       825:                        req->id = conn->msg_id++;
1.21      djm       826:                        req->len = buflen;
                    827:                        req->offset = offset;
                    828:                        offset += buflen;
                    829:                        num_req++;
                    830:                        TAILQ_INSERT_TAIL(&requests, req, tq);
1.28      markus    831:                        send_read_request(conn->fd_out, req->id, req->offset,
1.21      djm       832:                            req->len, handle, handle_len);
                    833:                }
1.1       djm       834:
                    835:                buffer_clear(&msg);
1.23      djm       836:                get_msg(conn->fd_in, &msg);
1.1       djm       837:                type = buffer_get_char(&msg);
                    838:                id = buffer_get_int(&msg);
1.33    ! deraadt   839:                debug3("Received reply T:%u I:%u R:%d", type, id, max_req);
1.21      djm       840:
                    841:                /* Find the request in our queue */
                    842:                for(req = TAILQ_FIRST(&requests);
                    843:                    req != NULL && req->id != id;
                    844:                    req = TAILQ_NEXT(req, tq))
                    845:                        ;
                    846:                if (req == NULL)
                    847:                        fatal("Unexpected reply %u", id);
                    848:
                    849:                switch (type) {
                    850:                case SSH2_FXP_STATUS:
1.5       djm       851:                        status = buffer_get_int(&msg);
1.21      djm       852:                        if (status != SSH2_FX_EOF)
                    853:                                read_error = 1;
                    854:                        max_req = 0;
                    855:                        TAILQ_REMOVE(&requests, req, tq);
                    856:                        xfree(req);
                    857:                        num_req--;
                    858:                        break;
                    859:                case SSH2_FXP_DATA:
                    860:                        data = buffer_get_string(&msg, &len);
1.26      itojun    861:                        debug3("Received data %llu -> %llu",
1.28      markus    862:                            (unsigned long long)req->offset,
1.26      itojun    863:                            (unsigned long long)req->offset + len - 1);
1.21      djm       864:                        if (len > req->len)
                    865:                                fatal("Received more data than asked for "
1.33    ! deraadt   866:                                      "%u > %u", len, req->len);
1.21      djm       867:                        if ((lseek(local_fd, req->offset, SEEK_SET) == -1 ||
                    868:                             atomicio(write, local_fd, data, len) != len) &&
                    869:                            !write_error) {
                    870:                                write_errno = errno;
                    871:                                write_error = 1;
                    872:                                max_req = 0;
                    873:                        }
                    874:                        xfree(data);
1.1       djm       875:
1.21      djm       876:                        if (len == req->len) {
                    877:                                TAILQ_REMOVE(&requests, req, tq);
                    878:                                xfree(req);
                    879:                                num_req--;
                    880:                        } else {
                    881:                                /* Resend the request for the missing data */
                    882:                                debug3("Short data block, re-requesting "
1.26      itojun    883:                                    "%llu -> %llu (%2d)",
1.28      markus    884:                                    (unsigned long long)req->offset + len,
1.27      itojun    885:                                    (unsigned long long)req->offset +
                    886:                                    req->len - 1, num_req);
1.23      djm       887:                                req->id = conn->msg_id++;
1.21      djm       888:                                req->len -= len;
                    889:                                req->offset += len;
1.28      markus    890:                                send_read_request(conn->fd_out, req->id,
1.23      djm       891:                                    req->offset, req->len, handle, handle_len);
1.21      djm       892:                                /* Reduce the request size */
                    893:                                if (len < buflen)
                    894:                                        buflen = MAX(MIN_READ_SIZE, len);
                    895:                        }
                    896:                        if (max_req > 0) { /* max_req = 0 iff EOF received */
                    897:                                if (size > 0 && offset > size) {
                    898:                                        /* Only one request at a time
                    899:                                         * after the expected EOF */
                    900:                                        debug3("Finish at %llu (%2d)",
1.26      itojun    901:                                            (unsigned long long)offset,
                    902:                                            num_req);
1.21      djm       903:                                        max_req = 1;
                    904:                                }
1.23      djm       905:                                else if (max_req < conn->num_requests + 1) {
1.21      djm       906:                                        ++max_req;
                    907:                                }
1.1       djm       908:                        }
1.21      djm       909:                        break;
                    910:                default:
1.33    ! deraadt   911:                        fatal("Expected SSH2_FXP_DATA(%u) packet, got %u",
1.1       djm       912:                            SSH2_FXP_DATA, type);
                    913:                }
1.21      djm       914:        }
1.1       djm       915:
1.21      djm       916:        /* Sanity check */
                    917:        if (TAILQ_FIRST(&requests) != NULL)
                    918:                fatal("Transfer complete, but requests still in queue");
                    919:
                    920:        if (read_error) {
1.28      markus    921:                error("Couldn't read from remote file \"%s\" : %s",
1.21      djm       922:                    remote_path, fx2txt(status));
1.23      djm       923:                do_close(conn, handle, handle_len);
1.21      djm       924:        } else if (write_error) {
                    925:                error("Couldn't write to \"%s\": %s", local_path,
                    926:                    strerror(write_errno));
                    927:                status = -1;
1.23      djm       928:                do_close(conn, handle, handle_len);
1.21      djm       929:        } else {
1.23      djm       930:                status = do_close(conn, handle, handle_len);
1.21      djm       931:
                    932:                /* Override umask and utimes if asked */
                    933:                if (pflag && fchmod(local_fd, mode) == -1)
                    934:                        error("Couldn't set mode on \"%s\": %s", local_path,
                    935:                              strerror(errno));
                    936:                if (pflag && (a->flags & SSH2_FILEXFER_ATTR_ACMODTIME)) {
                    937:                        struct timeval tv[2];
                    938:                        tv[0].tv_sec = a->atime;
                    939:                        tv[1].tv_sec = a->mtime;
                    940:                        tv[0].tv_usec = tv[1].tv_usec = 0;
                    941:                        if (utimes(local_path, tv) == -1)
                    942:                                error("Can't set times on \"%s\": %s",
                    943:                                      local_path, strerror(errno));
1.1       djm       944:                }
1.10      djm       945:        }
1.5       djm       946:        close(local_fd);
                    947:        buffer_free(&msg);
1.1       djm       948:        xfree(handle);
1.23      djm       949:
                    950:        return(status);
1.1       djm       951: }
                    952:
                    953: int
1.23      djm       954: do_upload(struct sftp_conn *conn, char *local_path, char *remote_path,
                    955:     int pflag)
1.1       djm       956: {
1.20      djm       957:        int local_fd, status;
1.22      djm       958:        u_int handle_len, id, type;
1.1       djm       959:        u_int64_t offset;
1.20      djm       960:        char *handle, *data;
1.1       djm       961:        Buffer msg;
                    962:        struct stat sb;
                    963:        Attrib a;
1.21      djm       964:        u_int32_t startid;
                    965:        u_int32_t ackid;
1.22      djm       966:        struct outstanding_ack {
                    967:                u_int id;
                    968:                u_int len;
                    969:                u_int64_t offset;
1.28      markus    970:                TAILQ_ENTRY(outstanding_ack) tq;
1.22      djm       971:        };
                    972:        TAILQ_HEAD(ackhead, outstanding_ack) acks;
                    973:        struct outstanding_ack *ack;
                    974:
                    975:        TAILQ_INIT(&acks);
1.1       djm       976:
                    977:        if ((local_fd = open(local_path, O_RDONLY, 0)) == -1) {
                    978:                error("Couldn't open local file \"%s\" for reading: %s",
                    979:                    local_path, strerror(errno));
                    980:                return(-1);
                    981:        }
                    982:        if (fstat(local_fd, &sb) == -1) {
                    983:                error("Couldn't fstat local file \"%s\": %s",
                    984:                    local_path, strerror(errno));
                    985:                close(local_fd);
                    986:                return(-1);
                    987:        }
                    988:        stat_to_attrib(&sb, &a);
                    989:
                    990:        a.flags &= ~SSH2_FILEXFER_ATTR_SIZE;
                    991:        a.flags &= ~SSH2_FILEXFER_ATTR_UIDGID;
                    992:        a.perm &= 0777;
                    993:        if (!pflag)
                    994:                a.flags &= ~SSH2_FILEXFER_ATTR_ACMODTIME;
                    995:
                    996:        buffer_init(&msg);
                    997:
                    998:        /* Send open request */
1.23      djm       999:        id = conn->msg_id++;
1.1       djm      1000:        buffer_put_char(&msg, SSH2_FXP_OPEN);
                   1001:        buffer_put_int(&msg, id);
                   1002:        buffer_put_cstring(&msg, remote_path);
                   1003:        buffer_put_int(&msg, SSH2_FXF_WRITE|SSH2_FXF_CREAT|SSH2_FXF_TRUNC);
                   1004:        encode_attrib(&msg, &a);
1.23      djm      1005:        send_msg(conn->fd_out, &msg);
1.33    ! deraadt  1006:        debug3("Sent message SSH2_FXP_OPEN I:%u P:%s", id, remote_path);
1.1       djm      1007:
                   1008:        buffer_clear(&msg);
                   1009:
1.23      djm      1010:        handle = get_handle(conn->fd_in, id, &handle_len);
1.1       djm      1011:        if (handle == NULL) {
                   1012:                close(local_fd);
                   1013:                buffer_free(&msg);
                   1014:                return(-1);
                   1015:        }
                   1016:
1.21      djm      1017:        startid = ackid = id + 1;
1.23      djm      1018:        data = xmalloc(conn->transfer_buflen);
1.20      djm      1019:
1.1       djm      1020:        /* Read from local and write to remote */
                   1021:        offset = 0;
1.19      deraadt  1022:        for (;;) {
1.1       djm      1023:                int len;
                   1024:
                   1025:                /*
                   1026:                 * Can't use atomicio here because it returns 0 on EOF, thus losing
                   1027:                 * the last block of the file
                   1028:                 */
                   1029:                do
1.23      djm      1030:                        len = read(local_fd, data, conn->transfer_buflen);
1.1       djm      1031:                while ((len == -1) && (errno == EINTR || errno == EAGAIN));
                   1032:
                   1033:                if (len == -1)
                   1034:                        fatal("Couldn't read from \"%s\": %s", local_path,
                   1035:                            strerror(errno));
1.21      djm      1036:
                   1037:                if (len != 0) {
1.22      djm      1038:                        ack = xmalloc(sizeof(*ack));
                   1039:                        ack->id = ++id;
                   1040:                        ack->offset = offset;
                   1041:                        ack->len = len;
                   1042:                        TAILQ_INSERT_TAIL(&acks, ack, tq);
                   1043:
1.21      djm      1044:                        buffer_clear(&msg);
                   1045:                        buffer_put_char(&msg, SSH2_FXP_WRITE);
1.22      djm      1046:                        buffer_put_int(&msg, ack->id);
1.21      djm      1047:                        buffer_put_string(&msg, handle, handle_len);
                   1048:                        buffer_put_int64(&msg, offset);
                   1049:                        buffer_put_string(&msg, data, len);
1.23      djm      1050:                        send_msg(conn->fd_out, &msg);
1.33    ! deraadt  1051:                        debug3("Sent message SSH2_FXP_WRITE I:%u O:%llu S:%u",
1.26      itojun   1052:                               id, (unsigned long long)offset, len);
1.22      djm      1053:                } else if (TAILQ_FIRST(&acks) == NULL)
1.1       djm      1054:                        break;
                   1055:
1.22      djm      1056:                if (ack == NULL)
                   1057:                        fatal("Unexpected ACK %u", id);
                   1058:
1.28      markus   1059:                if (id == startid || len == 0 ||
1.23      djm      1060:                    id - ackid >= conn->num_requests) {
1.32      markus   1061:                        u_int r_id;
1.31      djm      1062:
1.22      djm      1063:                        buffer_clear(&msg);
1.23      djm      1064:                        get_msg(conn->fd_in, &msg);
1.22      djm      1065:                        type = buffer_get_char(&msg);
1.31      djm      1066:                        r_id = buffer_get_int(&msg);
1.22      djm      1067:
                   1068:                        if (type != SSH2_FXP_STATUS)
                   1069:                                fatal("Expected SSH2_FXP_STATUS(%d) packet, "
                   1070:                                    "got %d", SSH2_FXP_STATUS, type);
                   1071:
                   1072:                        status = buffer_get_int(&msg);
                   1073:                        debug3("SSH2_FXP_STATUS %d", status);
                   1074:
                   1075:                        /* Find the request in our queue */
                   1076:                        for(ack = TAILQ_FIRST(&acks);
1.31      djm      1077:                            ack != NULL && ack->id != r_id;
1.22      djm      1078:                            ack = TAILQ_NEXT(ack, tq))
                   1079:                                ;
                   1080:                        if (ack == NULL)
1.33    ! deraadt  1081:                                fatal("Can't find request for ID %u", r_id);
1.22      djm      1082:                        TAILQ_REMOVE(&acks, ack, tq);
                   1083:
1.21      djm      1084:                        if (status != SSH2_FX_OK) {
                   1085:                                error("Couldn't write to remote file \"%s\": %s",
                   1086:                                      remote_path, fx2txt(status));
1.23      djm      1087:                                do_close(conn, handle, handle_len);
1.21      djm      1088:                                close(local_fd);
                   1089:                                goto done;
                   1090:                        }
1.33    ! deraadt  1091:                        debug3("In write loop, ack for %u %u bytes at %llu",
1.26      itojun   1092:                           ack->id, ack->len, (unsigned long long)ack->offset);
1.21      djm      1093:                        ++ackid;
1.22      djm      1094:                        free(ack);
1.1       djm      1095:                }
                   1096:                offset += len;
                   1097:        }
1.20      djm      1098:        xfree(data);
1.1       djm      1099:
                   1100:        if (close(local_fd) == -1) {
                   1101:                error("Couldn't close local file \"%s\": %s", local_path,
                   1102:                    strerror(errno));
1.23      djm      1103:                do_close(conn, handle, handle_len);
1.5       djm      1104:                status = -1;
                   1105:                goto done;
1.1       djm      1106:        }
                   1107:
1.10      djm      1108:        /* Override umask and utimes if asked */
                   1109:        if (pflag)
1.23      djm      1110:                do_fsetstat(conn, handle, handle_len, &a);
1.10      djm      1111:
1.23      djm      1112:        status = do_close(conn, handle, handle_len);
1.5       djm      1113:
                   1114: done:
                   1115:        xfree(handle);
                   1116:        buffer_free(&msg);
1.23      djm      1117:        return(status);
1.1       djm      1118: }