[BACK]Return to sftp-client.c CVS log [TXT][DIR] Up to [local] / src / usr.bin / ssh

Annotation of src/usr.bin/ssh/sftp-client.c, Revision 1.73

1.73    ! stevesk     1: /* $OpenBSD: sftp-client.c,v 1.72 2006/07/26 02:35:17 stevesk Exp $ */
1.1       djm         2: /*
1.46      djm         3:  * Copyright (c) 2001-2004 Damien Miller <djm@openbsd.org>
1.1       djm         4:  *
1.46      djm         5:  * Permission to use, copy, modify, and distribute this software for any
                      6:  * purpose with or without fee is hereby granted, provided that the above
                      7:  * copyright notice and this permission notice appear in all copies.
1.1       djm         8:  *
1.46      djm         9:  * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
                     10:  * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
                     11:  * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
                     12:  * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
                     13:  * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
                     14:  * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
                     15:  * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
1.1       djm        16:  */
                     17:
                     18: /* XXX: memleaks */
                     19: /* XXX: signed vs unsigned */
1.23      djm        20: /* XXX: remove all logging, only return status codes */
1.1       djm        21: /* XXX: copy between two remote sites */
                     22:
                     23: #include "includes.h"
1.21      djm        24:
                     25: #include <sys/queue.h>
1.60      stevesk    26: #include <sys/types.h>
                     27: #include <sys/stat.h>
1.71      stevesk    28: #include <sys/time.h>
1.72      stevesk    29: #include <sys/param.h>
1.66      stevesk    30:
1.67      stevesk    31: #include <errno.h>
1.66      stevesk    32: #include <fcntl.h>
1.70      stevesk    33: #include <signal.h>
1.73    ! stevesk    34: #include <stdio.h>
1.69      stevesk    35: #include <string.h>
1.68      stevesk    36: #include <unistd.h>
1.1       djm        37:
                     38: #include "buffer.h"
                     39: #include "bufaux.h"
                     40: #include "xmalloc.h"
                     41: #include "log.h"
                     42: #include "atomicio.h"
1.39      fgsch      43: #include "progressmeter.h"
1.64      djm        44: #include "misc.h"
1.1       djm        45:
                     46: #include "sftp.h"
                     47: #include "sftp-common.h"
                     48: #include "sftp-client.h"
                     49:
1.49      djm        50: extern volatile sig_atomic_t interrupted;
1.39      fgsch      51: extern int showprogress;
                     52:
1.59      david      53: /* Minimum amount of data to read at a time */
1.21      djm        54: #define MIN_READ_SIZE  512
                     55:
1.23      djm        56: struct sftp_conn {
                     57:        int fd_in;
                     58:        int fd_out;
                     59:        u_int transfer_buflen;
                     60:        u_int num_requests;
                     61:        u_int version;
                     62:        u_int msg_id;
                     63: };
1.4       djm        64:
1.17      itojun     65: static void
1.1       djm        66: send_msg(int fd, Buffer *m)
                     67: {
1.40      djm        68:        u_char mlen[4];
1.65      djm        69:        struct iovec iov[2];
1.40      djm        70:
1.58      djm        71:        if (buffer_len(m) > SFTP_MAX_MSG_LENGTH)
1.40      djm        72:                fatal("Outbound message too long %u", buffer_len(m));
                     73:
                     74:        /* Send length first */
1.64      djm        75:        put_u32(mlen, buffer_len(m));
1.65      djm        76:        iov[0].iov_base = mlen;
                     77:        iov[0].iov_len = sizeof(mlen);
                     78:        iov[1].iov_base = buffer_ptr(m);
                     79:        iov[1].iov_len = buffer_len(m);
                     80:
                     81:        if (atomiciov(writev, fd, iov, 2) != buffer_len(m) + sizeof(mlen))
1.1       djm        82:                fatal("Couldn't send packet: %s", strerror(errno));
                     83:
1.40      djm        84:        buffer_clear(m);
1.1       djm        85: }
                     86:
1.17      itojun     87: static void
1.1       djm        88: get_msg(int fd, Buffer *m)
                     89: {
1.40      djm        90:        u_int msg_len;
1.1       djm        91:
1.40      djm        92:        buffer_append_space(m, 4);
1.54      avsm       93:        if (atomicio(read, fd, buffer_ptr(m), 4) != 4) {
                     94:                if (errno == EPIPE)
                     95:                        fatal("Connection closed");
                     96:                else
                     97:                        fatal("Couldn't read packet: %s", strerror(errno));
                     98:        }
1.1       djm        99:
1.40      djm       100:        msg_len = buffer_get_int(m);
1.58      djm       101:        if (msg_len > SFTP_MAX_MSG_LENGTH)
1.33      deraadt   102:                fatal("Received message too long %u", msg_len);
1.1       djm       103:
1.40      djm       104:        buffer_append_space(m, msg_len);
1.54      avsm      105:        if (atomicio(read, fd, buffer_ptr(m), msg_len) != msg_len) {
                    106:                if (errno == EPIPE)
                    107:                        fatal("Connection closed");
                    108:                else
                    109:                        fatal("Read packet: %s", strerror(errno));
                    110:        }
1.1       djm       111: }
                    112:
1.17      itojun    113: static void
1.1       djm       114: send_string_request(int fd, u_int id, u_int code, char *s,
                    115:     u_int len)
                    116: {
                    117:        Buffer msg;
                    118:
                    119:        buffer_init(&msg);
                    120:        buffer_put_char(&msg, code);
                    121:        buffer_put_int(&msg, id);
                    122:        buffer_put_string(&msg, s, len);
                    123:        send_msg(fd, &msg);
1.33      deraadt   124:        debug3("Sent message fd %d T:%u I:%u", fd, code, id);
1.1       djm       125:        buffer_free(&msg);
                    126: }
                    127:
1.17      itojun    128: static void
1.1       djm       129: send_string_attrs_request(int fd, u_int id, u_int code, char *s,
                    130:     u_int len, Attrib *a)
                    131: {
                    132:        Buffer msg;
                    133:
                    134:        buffer_init(&msg);
                    135:        buffer_put_char(&msg, code);
                    136:        buffer_put_int(&msg, id);
                    137:        buffer_put_string(&msg, s, len);
                    138:        encode_attrib(&msg, a);
                    139:        send_msg(fd, &msg);
1.33      deraadt   140:        debug3("Sent message fd %d T:%u I:%u", fd, code, id);
1.1       djm       141:        buffer_free(&msg);
                    142: }
                    143:
1.17      itojun    144: static u_int
1.33      deraadt   145: get_status(int fd, u_int expected_id)
1.1       djm       146: {
                    147:        Buffer msg;
                    148:        u_int type, id, status;
                    149:
                    150:        buffer_init(&msg);
                    151:        get_msg(fd, &msg);
                    152:        type = buffer_get_char(&msg);
                    153:        id = buffer_get_int(&msg);
                    154:
                    155:        if (id != expected_id)
1.33      deraadt   156:                fatal("ID mismatch (%u != %u)", id, expected_id);
1.1       djm       157:        if (type != SSH2_FXP_STATUS)
1.33      deraadt   158:                fatal("Expected SSH2_FXP_STATUS(%u) packet, got %u",
1.1       djm       159:                    SSH2_FXP_STATUS, type);
                    160:
                    161:        status = buffer_get_int(&msg);
                    162:        buffer_free(&msg);
                    163:
1.33      deraadt   164:        debug3("SSH2_FXP_STATUS %u", status);
1.1       djm       165:
                    166:        return(status);
                    167: }
                    168:
1.17      itojun    169: static char *
1.1       djm       170: get_handle(int fd, u_int expected_id, u_int *len)
                    171: {
                    172:        Buffer msg;
                    173:        u_int type, id;
                    174:        char *handle;
                    175:
                    176:        buffer_init(&msg);
                    177:        get_msg(fd, &msg);
                    178:        type = buffer_get_char(&msg);
                    179:        id = buffer_get_int(&msg);
                    180:
                    181:        if (id != expected_id)
1.33      deraadt   182:                fatal("ID mismatch (%u != %u)", id, expected_id);
1.1       djm       183:        if (type == SSH2_FXP_STATUS) {
                    184:                int status = buffer_get_int(&msg);
                    185:
                    186:                error("Couldn't get handle: %s", fx2txt(status));
1.52      markus    187:                buffer_free(&msg);
1.1       djm       188:                return(NULL);
                    189:        } else if (type != SSH2_FXP_HANDLE)
1.33      deraadt   190:                fatal("Expected SSH2_FXP_HANDLE(%u) packet, got %u",
1.1       djm       191:                    SSH2_FXP_HANDLE, type);
                    192:
                    193:        handle = buffer_get_string(&msg, len);
                    194:        buffer_free(&msg);
                    195:
                    196:        return(handle);
                    197: }
                    198:
1.17      itojun    199: static Attrib *
1.14      djm       200: get_decode_stat(int fd, u_int expected_id, int quiet)
1.1       djm       201: {
                    202:        Buffer msg;
                    203:        u_int type, id;
                    204:        Attrib *a;
                    205:
                    206:        buffer_init(&msg);
                    207:        get_msg(fd, &msg);
                    208:
                    209:        type = buffer_get_char(&msg);
                    210:        id = buffer_get_int(&msg);
                    211:
1.33      deraadt   212:        debug3("Received stat reply T:%u I:%u", type, id);
1.1       djm       213:        if (id != expected_id)
1.33      deraadt   214:                fatal("ID mismatch (%u != %u)", id, expected_id);
1.1       djm       215:        if (type == SSH2_FXP_STATUS) {
                    216:                int status = buffer_get_int(&msg);
                    217:
1.14      djm       218:                if (quiet)
                    219:                        debug("Couldn't stat remote file: %s", fx2txt(status));
                    220:                else
                    221:                        error("Couldn't stat remote file: %s", fx2txt(status));
1.52      markus    222:                buffer_free(&msg);
1.1       djm       223:                return(NULL);
                    224:        } else if (type != SSH2_FXP_ATTRS) {
1.33      deraadt   225:                fatal("Expected SSH2_FXP_ATTRS(%u) packet, got %u",
1.1       djm       226:                    SSH2_FXP_ATTRS, type);
                    227:        }
                    228:        a = decode_attrib(&msg);
                    229:        buffer_free(&msg);
                    230:
                    231:        return(a);
                    232: }
                    233:
1.23      djm       234: struct sftp_conn *
                    235: do_init(int fd_in, int fd_out, u_int transfer_buflen, u_int num_requests)
1.1       djm       236: {
1.33      deraadt   237:        u_int type;
                    238:        int version;
1.1       djm       239:        Buffer msg;
1.23      djm       240:        struct sftp_conn *ret;
1.1       djm       241:
                    242:        buffer_init(&msg);
                    243:        buffer_put_char(&msg, SSH2_FXP_INIT);
                    244:        buffer_put_int(&msg, SSH2_FILEXFER_VERSION);
                    245:        send_msg(fd_out, &msg);
                    246:
                    247:        buffer_clear(&msg);
                    248:
                    249:        get_msg(fd_in, &msg);
                    250:
1.3       stevesk   251:        /* Expecting a VERSION reply */
1.1       djm       252:        if ((type = buffer_get_char(&msg)) != SSH2_FXP_VERSION) {
1.33      deraadt   253:                error("Invalid packet back from SSH2_FXP_INIT (type %u)",
1.1       djm       254:                    type);
                    255:                buffer_free(&msg);
1.23      djm       256:                return(NULL);
1.1       djm       257:        }
                    258:        version = buffer_get_int(&msg);
                    259:
                    260:        debug2("Remote version: %d", version);
                    261:
                    262:        /* Check for extensions */
                    263:        while (buffer_len(&msg) > 0) {
                    264:                char *name = buffer_get_string(&msg, NULL);
                    265:                char *value = buffer_get_string(&msg, NULL);
                    266:
                    267:                debug2("Init extension: \"%s\"", name);
                    268:                xfree(name);
                    269:                xfree(value);
                    270:        }
                    271:
                    272:        buffer_free(&msg);
1.11      djm       273:
1.23      djm       274:        ret = xmalloc(sizeof(*ret));
                    275:        ret->fd_in = fd_in;
                    276:        ret->fd_out = fd_out;
                    277:        ret->transfer_buflen = transfer_buflen;
                    278:        ret->num_requests = num_requests;
                    279:        ret->version = version;
                    280:        ret->msg_id = 1;
                    281:
                    282:        /* Some filexfer v.0 servers don't support large packets */
                    283:        if (version == 0)
1.29      markus    284:                ret->transfer_buflen = MIN(ret->transfer_buflen, 20480);
1.23      djm       285:
                    286:        return(ret);
                    287: }
                    288:
                    289: u_int
                    290: sftp_proto_version(struct sftp_conn *conn)
                    291: {
                    292:        return(conn->version);
1.1       djm       293: }
                    294:
                    295: int
1.23      djm       296: do_close(struct sftp_conn *conn, char *handle, u_int handle_len)
1.1       djm       297: {
                    298:        u_int id, status;
                    299:        Buffer msg;
                    300:
                    301:        buffer_init(&msg);
                    302:
1.23      djm       303:        id = conn->msg_id++;
1.1       djm       304:        buffer_put_char(&msg, SSH2_FXP_CLOSE);
                    305:        buffer_put_int(&msg, id);
                    306:        buffer_put_string(&msg, handle, handle_len);
1.23      djm       307:        send_msg(conn->fd_out, &msg);
1.33      deraadt   308:        debug3("Sent message SSH2_FXP_CLOSE I:%u", id);
1.1       djm       309:
1.23      djm       310:        status = get_status(conn->fd_in, id);
1.1       djm       311:        if (status != SSH2_FX_OK)
                    312:                error("Couldn't close file: %s", fx2txt(status));
                    313:
                    314:        buffer_free(&msg);
                    315:
                    316:        return(status);
                    317: }
                    318:
1.12      djm       319:
1.17      itojun    320: static int
1.23      djm       321: do_lsreaddir(struct sftp_conn *conn, char *path, int printflag,
1.12      djm       322:     SFTP_DIRENT ***dir)
1.1       djm       323: {
                    324:        Buffer msg;
1.55      djm       325:        u_int count, type, id, handle_len, i, expected_id, ents = 0;
1.1       djm       326:        char *handle;
                    327:
1.23      djm       328:        id = conn->msg_id++;
1.1       djm       329:
                    330:        buffer_init(&msg);
                    331:        buffer_put_char(&msg, SSH2_FXP_OPENDIR);
                    332:        buffer_put_int(&msg, id);
                    333:        buffer_put_cstring(&msg, path);
1.23      djm       334:        send_msg(conn->fd_out, &msg);
1.1       djm       335:
                    336:        buffer_clear(&msg);
                    337:
1.23      djm       338:        handle = get_handle(conn->fd_in, id, &handle_len);
1.1       djm       339:        if (handle == NULL)
                    340:                return(-1);
                    341:
1.12      djm       342:        if (dir) {
                    343:                ents = 0;
                    344:                *dir = xmalloc(sizeof(**dir));
                    345:                (*dir)[0] = NULL;
                    346:        }
                    347:
1.49      djm       348:        for (; !interrupted;) {
1.23      djm       349:                id = expected_id = conn->msg_id++;
1.1       djm       350:
1.33      deraadt   351:                debug3("Sending SSH2_FXP_READDIR I:%u", id);
1.1       djm       352:
                    353:                buffer_clear(&msg);
                    354:                buffer_put_char(&msg, SSH2_FXP_READDIR);
                    355:                buffer_put_int(&msg, id);
                    356:                buffer_put_string(&msg, handle, handle_len);
1.23      djm       357:                send_msg(conn->fd_out, &msg);
1.1       djm       358:
                    359:                buffer_clear(&msg);
                    360:
1.23      djm       361:                get_msg(conn->fd_in, &msg);
1.1       djm       362:
                    363:                type = buffer_get_char(&msg);
                    364:                id = buffer_get_int(&msg);
                    365:
1.33      deraadt   366:                debug3("Received reply T:%u I:%u", type, id);
1.1       djm       367:
                    368:                if (id != expected_id)
1.33      deraadt   369:                        fatal("ID mismatch (%u != %u)", id, expected_id);
1.1       djm       370:
                    371:                if (type == SSH2_FXP_STATUS) {
                    372:                        int status = buffer_get_int(&msg);
                    373:
                    374:                        debug3("Received SSH2_FXP_STATUS %d", status);
                    375:
                    376:                        if (status == SSH2_FX_EOF) {
                    377:                                break;
                    378:                        } else {
                    379:                                error("Couldn't read directory: %s",
                    380:                                    fx2txt(status));
1.23      djm       381:                                do_close(conn, handle, handle_len);
1.42      markus    382:                                xfree(handle);
1.9       djm       383:                                return(status);
1.1       djm       384:                        }
                    385:                } else if (type != SSH2_FXP_NAME)
1.33      deraadt   386:                        fatal("Expected SSH2_FXP_NAME(%u) packet, got %u",
1.1       djm       387:                            SSH2_FXP_NAME, type);
                    388:
                    389:                count = buffer_get_int(&msg);
1.7       markus    390:                if (count == 0)
                    391:                        break;
1.8       stevesk   392:                debug3("Received %d SSH2_FXP_NAME responses", count);
1.19      deraadt   393:                for (i = 0; i < count; i++) {
1.1       djm       394:                        char *filename, *longname;
                    395:                        Attrib *a;
                    396:
                    397:                        filename = buffer_get_string(&msg, NULL);
                    398:                        longname = buffer_get_string(&msg, NULL);
                    399:                        a = decode_attrib(&msg);
                    400:
1.12      djm       401:                        if (printflag)
                    402:                                printf("%s\n", longname);
                    403:
                    404:                        if (dir) {
1.62      djm       405:                                *dir = xrealloc(*dir, ents + 2, sizeof(**dir));
1.12      djm       406:                                (*dir)[ents] = xmalloc(sizeof(***dir));
                    407:                                (*dir)[ents]->filename = xstrdup(filename);
                    408:                                (*dir)[ents]->longname = xstrdup(longname);
                    409:                                memcpy(&(*dir)[ents]->a, a, sizeof(*a));
                    410:                                (*dir)[++ents] = NULL;
                    411:                        }
1.1       djm       412:
                    413:                        xfree(filename);
                    414:                        xfree(longname);
                    415:                }
                    416:        }
                    417:
                    418:        buffer_free(&msg);
1.23      djm       419:        do_close(conn, handle, handle_len);
1.1       djm       420:        xfree(handle);
                    421:
1.49      djm       422:        /* Don't return partial matches on interrupt */
                    423:        if (interrupted && dir != NULL && *dir != NULL) {
                    424:                free_sftp_dirents(*dir);
                    425:                *dir = xmalloc(sizeof(**dir));
                    426:                **dir = NULL;
                    427:        }
                    428:
1.1       djm       429:        return(0);
1.12      djm       430: }
                    431:
                    432: int
1.23      djm       433: do_readdir(struct sftp_conn *conn, char *path, SFTP_DIRENT ***dir)
1.12      djm       434: {
1.23      djm       435:        return(do_lsreaddir(conn, path, 0, dir));
1.12      djm       436: }
                    437:
                    438: void free_sftp_dirents(SFTP_DIRENT **s)
                    439: {
                    440:        int i;
1.19      deraadt   441:
                    442:        for (i = 0; s[i]; i++) {
1.12      djm       443:                xfree(s[i]->filename);
                    444:                xfree(s[i]->longname);
                    445:                xfree(s[i]);
                    446:        }
                    447:        xfree(s);
                    448: }
                    449:
                    450: int
1.23      djm       451: do_rm(struct sftp_conn *conn, char *path)
1.1       djm       452: {
                    453:        u_int status, id;
                    454:
                    455:        debug2("Sending SSH2_FXP_REMOVE \"%s\"", path);
                    456:
1.23      djm       457:        id = conn->msg_id++;
1.28      markus    458:        send_string_request(conn->fd_out, id, SSH2_FXP_REMOVE, path,
1.23      djm       459:            strlen(path));
                    460:        status = get_status(conn->fd_in, id);
1.1       djm       461:        if (status != SSH2_FX_OK)
                    462:                error("Couldn't delete file: %s", fx2txt(status));
                    463:        return(status);
                    464: }
                    465:
                    466: int
1.23      djm       467: do_mkdir(struct sftp_conn *conn, char *path, Attrib *a)
1.1       djm       468: {
                    469:        u_int status, id;
                    470:
1.23      djm       471:        id = conn->msg_id++;
                    472:        send_string_attrs_request(conn->fd_out, id, SSH2_FXP_MKDIR, path,
1.1       djm       473:            strlen(path), a);
                    474:
1.23      djm       475:        status = get_status(conn->fd_in, id);
1.1       djm       476:        if (status != SSH2_FX_OK)
                    477:                error("Couldn't create directory: %s", fx2txt(status));
                    478:
                    479:        return(status);
                    480: }
                    481:
                    482: int
1.23      djm       483: do_rmdir(struct sftp_conn *conn, char *path)
1.1       djm       484: {
                    485:        u_int status, id;
                    486:
1.23      djm       487:        id = conn->msg_id++;
                    488:        send_string_request(conn->fd_out, id, SSH2_FXP_RMDIR, path,
                    489:            strlen(path));
1.1       djm       490:
1.23      djm       491:        status = get_status(conn->fd_in, id);
1.1       djm       492:        if (status != SSH2_FX_OK)
                    493:                error("Couldn't remove directory: %s", fx2txt(status));
                    494:
                    495:        return(status);
                    496: }
                    497:
                    498: Attrib *
1.23      djm       499: do_stat(struct sftp_conn *conn, char *path, int quiet)
1.1       djm       500: {
                    501:        u_int id;
                    502:
1.23      djm       503:        id = conn->msg_id++;
                    504:
1.28      markus    505:        send_string_request(conn->fd_out, id,
                    506:            conn->version == 0 ? SSH2_FXP_STAT_VERSION_0 : SSH2_FXP_STAT,
1.23      djm       507:            path, strlen(path));
                    508:
                    509:        return(get_decode_stat(conn->fd_in, id, quiet));
1.1       djm       510: }
                    511:
                    512: Attrib *
1.23      djm       513: do_lstat(struct sftp_conn *conn, char *path, int quiet)
1.1       djm       514: {
                    515:        u_int id;
                    516:
1.23      djm       517:        if (conn->version == 0) {
                    518:                if (quiet)
                    519:                        debug("Server version does not support lstat operation");
                    520:                else
1.43      itojun    521:                        logit("Server version does not support lstat operation");
1.30      markus    522:                return(do_stat(conn, path, quiet));
1.23      djm       523:        }
                    524:
                    525:        id = conn->msg_id++;
                    526:        send_string_request(conn->fd_out, id, SSH2_FXP_LSTAT, path,
                    527:            strlen(path));
                    528:
                    529:        return(get_decode_stat(conn->fd_in, id, quiet));
1.1       djm       530: }
                    531:
                    532: Attrib *
1.23      djm       533: do_fstat(struct sftp_conn *conn, char *handle, u_int handle_len, int quiet)
1.1       djm       534: {
                    535:        u_int id;
                    536:
1.23      djm       537:        id = conn->msg_id++;
                    538:        send_string_request(conn->fd_out, id, SSH2_FXP_FSTAT, handle,
                    539:            handle_len);
                    540:
                    541:        return(get_decode_stat(conn->fd_in, id, quiet));
1.1       djm       542: }
                    543:
                    544: int
1.23      djm       545: do_setstat(struct sftp_conn *conn, char *path, Attrib *a)
1.1       djm       546: {
                    547:        u_int status, id;
                    548:
1.23      djm       549:        id = conn->msg_id++;
                    550:        send_string_attrs_request(conn->fd_out, id, SSH2_FXP_SETSTAT, path,
1.1       djm       551:            strlen(path), a);
                    552:
1.23      djm       553:        status = get_status(conn->fd_in, id);
1.1       djm       554:        if (status != SSH2_FX_OK)
                    555:                error("Couldn't setstat on \"%s\": %s", path,
                    556:                    fx2txt(status));
                    557:
                    558:        return(status);
                    559: }
                    560:
                    561: int
1.23      djm       562: do_fsetstat(struct sftp_conn *conn, char *handle, u_int handle_len,
1.1       djm       563:     Attrib *a)
                    564: {
                    565:        u_int status, id;
                    566:
1.23      djm       567:        id = conn->msg_id++;
                    568:        send_string_attrs_request(conn->fd_out, id, SSH2_FXP_FSETSTAT, handle,
1.1       djm       569:            handle_len, a);
                    570:
1.23      djm       571:        status = get_status(conn->fd_in, id);
1.1       djm       572:        if (status != SSH2_FX_OK)
                    573:                error("Couldn't fsetstat: %s", fx2txt(status));
                    574:
                    575:        return(status);
                    576: }
                    577:
                    578: char *
1.23      djm       579: do_realpath(struct sftp_conn *conn, char *path)
1.1       djm       580: {
                    581:        Buffer msg;
                    582:        u_int type, expected_id, count, id;
                    583:        char *filename, *longname;
                    584:        Attrib *a;
                    585:
1.23      djm       586:        expected_id = id = conn->msg_id++;
                    587:        send_string_request(conn->fd_out, id, SSH2_FXP_REALPATH, path,
                    588:            strlen(path));
1.1       djm       589:
                    590:        buffer_init(&msg);
                    591:
1.23      djm       592:        get_msg(conn->fd_in, &msg);
1.1       djm       593:        type = buffer_get_char(&msg);
                    594:        id = buffer_get_int(&msg);
                    595:
                    596:        if (id != expected_id)
1.33      deraadt   597:                fatal("ID mismatch (%u != %u)", id, expected_id);
1.1       djm       598:
                    599:        if (type == SSH2_FXP_STATUS) {
                    600:                u_int status = buffer_get_int(&msg);
                    601:
                    602:                error("Couldn't canonicalise: %s", fx2txt(status));
                    603:                return(NULL);
                    604:        } else if (type != SSH2_FXP_NAME)
1.33      deraadt   605:                fatal("Expected SSH2_FXP_NAME(%u) packet, got %u",
1.1       djm       606:                    SSH2_FXP_NAME, type);
                    607:
                    608:        count = buffer_get_int(&msg);
                    609:        if (count != 1)
                    610:                fatal("Got multiple names (%d) from SSH_FXP_REALPATH", count);
                    611:
                    612:        filename = buffer_get_string(&msg, NULL);
                    613:        longname = buffer_get_string(&msg, NULL);
                    614:        a = decode_attrib(&msg);
                    615:
                    616:        debug3("SSH_FXP_REALPATH %s -> %s", path, filename);
                    617:
                    618:        xfree(longname);
                    619:
                    620:        buffer_free(&msg);
                    621:
                    622:        return(filename);
                    623: }
                    624:
                    625: int
1.23      djm       626: do_rename(struct sftp_conn *conn, char *oldpath, char *newpath)
1.1       djm       627: {
                    628:        Buffer msg;
                    629:        u_int status, id;
                    630:
                    631:        buffer_init(&msg);
                    632:
                    633:        /* Send rename request */
1.23      djm       634:        id = conn->msg_id++;
1.1       djm       635:        buffer_put_char(&msg, SSH2_FXP_RENAME);
                    636:        buffer_put_int(&msg, id);
                    637:        buffer_put_cstring(&msg, oldpath);
                    638:        buffer_put_cstring(&msg, newpath);
1.23      djm       639:        send_msg(conn->fd_out, &msg);
1.1       djm       640:        debug3("Sent message SSH2_FXP_RENAME \"%s\" -> \"%s\"", oldpath,
                    641:            newpath);
                    642:        buffer_free(&msg);
                    643:
1.23      djm       644:        status = get_status(conn->fd_in, id);
1.1       djm       645:        if (status != SSH2_FX_OK)
1.23      djm       646:                error("Couldn't rename file \"%s\" to \"%s\": %s", oldpath,
                    647:                    newpath, fx2txt(status));
1.1       djm       648:
                    649:        return(status);
1.11      djm       650: }
                    651:
                    652: int
1.23      djm       653: do_symlink(struct sftp_conn *conn, char *oldpath, char *newpath)
1.11      djm       654: {
                    655:        Buffer msg;
                    656:        u_int status, id;
                    657:
1.23      djm       658:        if (conn->version < 3) {
                    659:                error("This server does not support the symlink operation");
                    660:                return(SSH2_FX_OP_UNSUPPORTED);
                    661:        }
                    662:
1.11      djm       663:        buffer_init(&msg);
                    664:
1.48      djm       665:        /* Send symlink request */
1.23      djm       666:        id = conn->msg_id++;
1.11      djm       667:        buffer_put_char(&msg, SSH2_FXP_SYMLINK);
                    668:        buffer_put_int(&msg, id);
                    669:        buffer_put_cstring(&msg, oldpath);
                    670:        buffer_put_cstring(&msg, newpath);
1.23      djm       671:        send_msg(conn->fd_out, &msg);
1.11      djm       672:        debug3("Sent message SSH2_FXP_SYMLINK \"%s\" -> \"%s\"", oldpath,
                    673:            newpath);
                    674:        buffer_free(&msg);
                    675:
1.23      djm       676:        status = get_status(conn->fd_in, id);
1.11      djm       677:        if (status != SSH2_FX_OK)
1.36      markus    678:                error("Couldn't symlink file \"%s\" to \"%s\": %s", oldpath,
1.23      djm       679:                    newpath, fx2txt(status));
1.11      djm       680:
                    681:        return(status);
                    682: }
                    683:
                    684: char *
1.23      djm       685: do_readlink(struct sftp_conn *conn, char *path)
1.11      djm       686: {
                    687:        Buffer msg;
                    688:        u_int type, expected_id, count, id;
                    689:        char *filename, *longname;
                    690:        Attrib *a;
                    691:
1.23      djm       692:        expected_id = id = conn->msg_id++;
                    693:        send_string_request(conn->fd_out, id, SSH2_FXP_READLINK, path,
                    694:            strlen(path));
1.11      djm       695:
                    696:        buffer_init(&msg);
                    697:
1.23      djm       698:        get_msg(conn->fd_in, &msg);
1.11      djm       699:        type = buffer_get_char(&msg);
                    700:        id = buffer_get_int(&msg);
                    701:
                    702:        if (id != expected_id)
1.33      deraadt   703:                fatal("ID mismatch (%u != %u)", id, expected_id);
1.11      djm       704:
                    705:        if (type == SSH2_FXP_STATUS) {
                    706:                u_int status = buffer_get_int(&msg);
                    707:
                    708:                error("Couldn't readlink: %s", fx2txt(status));
                    709:                return(NULL);
                    710:        } else if (type != SSH2_FXP_NAME)
1.33      deraadt   711:                fatal("Expected SSH2_FXP_NAME(%u) packet, got %u",
1.11      djm       712:                    SSH2_FXP_NAME, type);
                    713:
                    714:        count = buffer_get_int(&msg);
                    715:        if (count != 1)
                    716:                fatal("Got multiple names (%d) from SSH_FXP_READLINK", count);
                    717:
                    718:        filename = buffer_get_string(&msg, NULL);
                    719:        longname = buffer_get_string(&msg, NULL);
                    720:        a = decode_attrib(&msg);
                    721:
                    722:        debug3("SSH_FXP_READLINK %s -> %s", path, filename);
                    723:
                    724:        xfree(longname);
                    725:
                    726:        buffer_free(&msg);
                    727:
                    728:        return(filename);
1.1       djm       729: }
                    730:
1.21      djm       731: static void
                    732: send_read_request(int fd_out, u_int id, u_int64_t offset, u_int len,
                    733:     char *handle, u_int handle_len)
                    734: {
                    735:        Buffer msg;
1.28      markus    736:
1.21      djm       737:        buffer_init(&msg);
                    738:        buffer_clear(&msg);
                    739:        buffer_put_char(&msg, SSH2_FXP_READ);
                    740:        buffer_put_int(&msg, id);
                    741:        buffer_put_string(&msg, handle, handle_len);
                    742:        buffer_put_int64(&msg, offset);
                    743:        buffer_put_int(&msg, len);
                    744:        send_msg(fd_out, &msg);
                    745:        buffer_free(&msg);
1.28      markus    746: }
1.21      djm       747:
1.1       djm       748: int
1.23      djm       749: do_download(struct sftp_conn *conn, char *remote_path, char *local_path,
                    750:     int pflag)
1.1       djm       751: {
1.21      djm       752:        Attrib junk, *a;
                    753:        Buffer msg;
1.1       djm       754:        char *handle;
1.57      dtucker   755:        int local_fd, status = 0, write_error;
1.21      djm       756:        int read_error, write_errno;
                    757:        u_int64_t offset, size;
1.55      djm       758:        u_int handle_len, mode, type, id, buflen, num_req, max_req;
1.39      fgsch     759:        off_t progress_counter;
1.21      djm       760:        struct request {
                    761:                u_int id;
                    762:                u_int len;
                    763:                u_int64_t offset;
1.28      markus    764:                TAILQ_ENTRY(request) tq;
1.21      djm       765:        };
                    766:        TAILQ_HEAD(reqhead, request) requests;
                    767:        struct request *req;
                    768:
                    769:        TAILQ_INIT(&requests);
1.1       djm       770:
1.23      djm       771:        a = do_stat(conn, remote_path, 0);
1.1       djm       772:        if (a == NULL)
                    773:                return(-1);
                    774:
                    775:        /* XXX: should we preserve set[ug]id? */
                    776:        if (a->flags & SSH2_FILEXFER_ATTR_PERMISSIONS)
1.38      djm       777:                mode = a->perm & 0777;
1.1       djm       778:        else
                    779:                mode = 0666;
                    780:
1.14      djm       781:        if ((a->flags & SSH2_FILEXFER_ATTR_PERMISSIONS) &&
1.41      djm       782:            (!S_ISREG(a->perm))) {
                    783:                error("Cannot download non-regular file: %s", remote_path);
1.14      djm       784:                return(-1);
                    785:        }
                    786:
1.21      djm       787:        if (a->flags & SSH2_FILEXFER_ATTR_SIZE)
                    788:                size = a->size;
                    789:        else
                    790:                size = 0;
                    791:
1.23      djm       792:        buflen = conn->transfer_buflen;
1.1       djm       793:        buffer_init(&msg);
                    794:
                    795:        /* Send open request */
1.23      djm       796:        id = conn->msg_id++;
1.1       djm       797:        buffer_put_char(&msg, SSH2_FXP_OPEN);
                    798:        buffer_put_int(&msg, id);
                    799:        buffer_put_cstring(&msg, remote_path);
                    800:        buffer_put_int(&msg, SSH2_FXF_READ);
                    801:        attrib_clear(&junk); /* Send empty attributes */
                    802:        encode_attrib(&msg, &junk);
1.23      djm       803:        send_msg(conn->fd_out, &msg);
1.33      deraadt   804:        debug3("Sent message SSH2_FXP_OPEN I:%u P:%s", id, remote_path);
1.1       djm       805:
1.23      djm       806:        handle = get_handle(conn->fd_in, id, &handle_len);
1.1       djm       807:        if (handle == NULL) {
                    808:                buffer_free(&msg);
                    809:                return(-1);
                    810:        }
                    811:
1.45      djm       812:        local_fd = open(local_path, O_WRONLY | O_CREAT | O_TRUNC,
1.38      djm       813:            mode | S_IWRITE);
1.23      djm       814:        if (local_fd == -1) {
                    815:                error("Couldn't open local file \"%s\" for writing: %s",
                    816:                    local_path, strerror(errno));
1.24      markus    817:                buffer_free(&msg);
                    818:                xfree(handle);
1.23      djm       819:                return(-1);
                    820:        }
                    821:
1.1       djm       822:        /* Read from remote and write to local */
1.21      djm       823:        write_error = read_error = write_errno = num_req = offset = 0;
                    824:        max_req = 1;
1.39      fgsch     825:        progress_counter = 0;
                    826:
1.47      djm       827:        if (showprogress && size != 0)
                    828:                start_progress_meter(remote_path, size, &progress_counter);
1.39      fgsch     829:
1.21      djm       830:        while (num_req > 0 || max_req > 0) {
                    831:                char *data;
1.1       djm       832:                u_int len;
                    833:
1.49      djm       834:                /*
1.51      deraadt   835:                 * Simulate EOF on interrupt: stop sending new requests and
1.49      djm       836:                 * allow outstanding requests to drain gracefully
                    837:                 */
                    838:                if (interrupted) {
                    839:                        if (num_req == 0) /* If we haven't started yet... */
                    840:                                break;
                    841:                        max_req = 0;
                    842:                }
                    843:
1.21      djm       844:                /* Send some more requests */
                    845:                while (num_req < max_req) {
1.28      markus    846:                        debug3("Request range %llu -> %llu (%d/%d)",
1.25      itojun    847:                            (unsigned long long)offset,
                    848:                            (unsigned long long)offset + buflen - 1,
                    849:                            num_req, max_req);
1.21      djm       850:                        req = xmalloc(sizeof(*req));
1.23      djm       851:                        req->id = conn->msg_id++;
1.21      djm       852:                        req->len = buflen;
                    853:                        req->offset = offset;
                    854:                        offset += buflen;
                    855:                        num_req++;
                    856:                        TAILQ_INSERT_TAIL(&requests, req, tq);
1.28      markus    857:                        send_read_request(conn->fd_out, req->id, req->offset,
1.21      djm       858:                            req->len, handle, handle_len);
                    859:                }
1.1       djm       860:
                    861:                buffer_clear(&msg);
1.23      djm       862:                get_msg(conn->fd_in, &msg);
1.1       djm       863:                type = buffer_get_char(&msg);
                    864:                id = buffer_get_int(&msg);
1.33      deraadt   865:                debug3("Received reply T:%u I:%u R:%d", type, id, max_req);
1.21      djm       866:
                    867:                /* Find the request in our queue */
1.53      deraadt   868:                for (req = TAILQ_FIRST(&requests);
1.21      djm       869:                    req != NULL && req->id != id;
                    870:                    req = TAILQ_NEXT(req, tq))
                    871:                        ;
                    872:                if (req == NULL)
                    873:                        fatal("Unexpected reply %u", id);
                    874:
                    875:                switch (type) {
                    876:                case SSH2_FXP_STATUS:
1.5       djm       877:                        status = buffer_get_int(&msg);
1.21      djm       878:                        if (status != SSH2_FX_EOF)
                    879:                                read_error = 1;
                    880:                        max_req = 0;
                    881:                        TAILQ_REMOVE(&requests, req, tq);
                    882:                        xfree(req);
                    883:                        num_req--;
                    884:                        break;
                    885:                case SSH2_FXP_DATA:
                    886:                        data = buffer_get_string(&msg, &len);
1.26      itojun    887:                        debug3("Received data %llu -> %llu",
1.28      markus    888:                            (unsigned long long)req->offset,
1.26      itojun    889:                            (unsigned long long)req->offset + len - 1);
1.21      djm       890:                        if (len > req->len)
                    891:                                fatal("Received more data than asked for "
1.37      deraadt   892:                                    "%u > %u", len, req->len);
1.21      djm       893:                        if ((lseek(local_fd, req->offset, SEEK_SET) == -1 ||
1.44      deraadt   894:                            atomicio(vwrite, local_fd, data, len) != len) &&
1.21      djm       895:                            !write_error) {
                    896:                                write_errno = errno;
                    897:                                write_error = 1;
                    898:                                max_req = 0;
                    899:                        }
1.39      fgsch     900:                        progress_counter += len;
1.21      djm       901:                        xfree(data);
1.1       djm       902:
1.21      djm       903:                        if (len == req->len) {
                    904:                                TAILQ_REMOVE(&requests, req, tq);
                    905:                                xfree(req);
                    906:                                num_req--;
                    907:                        } else {
                    908:                                /* Resend the request for the missing data */
                    909:                                debug3("Short data block, re-requesting "
1.26      itojun    910:                                    "%llu -> %llu (%2d)",
1.28      markus    911:                                    (unsigned long long)req->offset + len,
1.27      itojun    912:                                    (unsigned long long)req->offset +
                    913:                                    req->len - 1, num_req);
1.23      djm       914:                                req->id = conn->msg_id++;
1.21      djm       915:                                req->len -= len;
                    916:                                req->offset += len;
1.28      markus    917:                                send_read_request(conn->fd_out, req->id,
1.23      djm       918:                                    req->offset, req->len, handle, handle_len);
1.21      djm       919:                                /* Reduce the request size */
                    920:                                if (len < buflen)
                    921:                                        buflen = MAX(MIN_READ_SIZE, len);
                    922:                        }
                    923:                        if (max_req > 0) { /* max_req = 0 iff EOF received */
                    924:                                if (size > 0 && offset > size) {
                    925:                                        /* Only one request at a time
                    926:                                         * after the expected EOF */
                    927:                                        debug3("Finish at %llu (%2d)",
1.26      itojun    928:                                            (unsigned long long)offset,
                    929:                                            num_req);
1.21      djm       930:                                        max_req = 1;
1.49      djm       931:                                } else if (max_req <= conn->num_requests) {
1.21      djm       932:                                        ++max_req;
                    933:                                }
1.1       djm       934:                        }
1.21      djm       935:                        break;
                    936:                default:
1.33      deraadt   937:                        fatal("Expected SSH2_FXP_DATA(%u) packet, got %u",
1.1       djm       938:                            SSH2_FXP_DATA, type);
                    939:                }
1.21      djm       940:        }
1.1       djm       941:
1.39      fgsch     942:        if (showprogress && size)
                    943:                stop_progress_meter();
                    944:
1.21      djm       945:        /* Sanity check */
                    946:        if (TAILQ_FIRST(&requests) != NULL)
                    947:                fatal("Transfer complete, but requests still in queue");
                    948:
                    949:        if (read_error) {
1.28      markus    950:                error("Couldn't read from remote file \"%s\" : %s",
1.21      djm       951:                    remote_path, fx2txt(status));
1.23      djm       952:                do_close(conn, handle, handle_len);
1.21      djm       953:        } else if (write_error) {
                    954:                error("Couldn't write to \"%s\": %s", local_path,
                    955:                    strerror(write_errno));
                    956:                status = -1;
1.23      djm       957:                do_close(conn, handle, handle_len);
1.21      djm       958:        } else {
1.23      djm       959:                status = do_close(conn, handle, handle_len);
1.21      djm       960:
                    961:                /* Override umask and utimes if asked */
                    962:                if (pflag && fchmod(local_fd, mode) == -1)
                    963:                        error("Couldn't set mode on \"%s\": %s", local_path,
1.37      deraadt   964:                            strerror(errno));
1.21      djm       965:                if (pflag && (a->flags & SSH2_FILEXFER_ATTR_ACMODTIME)) {
                    966:                        struct timeval tv[2];
                    967:                        tv[0].tv_sec = a->atime;
                    968:                        tv[1].tv_sec = a->mtime;
                    969:                        tv[0].tv_usec = tv[1].tv_usec = 0;
                    970:                        if (utimes(local_path, tv) == -1)
                    971:                                error("Can't set times on \"%s\": %s",
1.37      deraadt   972:                                    local_path, strerror(errno));
1.1       djm       973:                }
1.10      djm       974:        }
1.5       djm       975:        close(local_fd);
                    976:        buffer_free(&msg);
1.1       djm       977:        xfree(handle);
1.23      djm       978:
                    979:        return(status);
1.1       djm       980: }
                    981:
                    982: int
1.23      djm       983: do_upload(struct sftp_conn *conn, char *local_path, char *remote_path,
                    984:     int pflag)
1.1       djm       985: {
1.20      djm       986:        int local_fd, status;
1.22      djm       987:        u_int handle_len, id, type;
1.1       djm       988:        u_int64_t offset;
1.20      djm       989:        char *handle, *data;
1.1       djm       990:        Buffer msg;
                    991:        struct stat sb;
                    992:        Attrib a;
1.21      djm       993:        u_int32_t startid;
                    994:        u_int32_t ackid;
1.22      djm       995:        struct outstanding_ack {
                    996:                u_int id;
                    997:                u_int len;
                    998:                u_int64_t offset;
1.28      markus    999:                TAILQ_ENTRY(outstanding_ack) tq;
1.22      djm      1000:        };
                   1001:        TAILQ_HEAD(ackhead, outstanding_ack) acks;
1.50      pedro    1002:        struct outstanding_ack *ack = NULL;
1.22      djm      1003:
                   1004:        TAILQ_INIT(&acks);
1.1       djm      1005:
                   1006:        if ((local_fd = open(local_path, O_RDONLY, 0)) == -1) {
                   1007:                error("Couldn't open local file \"%s\" for reading: %s",
                   1008:                    local_path, strerror(errno));
                   1009:                return(-1);
                   1010:        }
                   1011:        if (fstat(local_fd, &sb) == -1) {
                   1012:                error("Couldn't fstat local file \"%s\": %s",
                   1013:                    local_path, strerror(errno));
1.41      djm      1014:                close(local_fd);
                   1015:                return(-1);
                   1016:        }
                   1017:        if (!S_ISREG(sb.st_mode)) {
                   1018:                error("%s is not a regular file", local_path);
1.1       djm      1019:                close(local_fd);
                   1020:                return(-1);
                   1021:        }
                   1022:        stat_to_attrib(&sb, &a);
                   1023:
                   1024:        a.flags &= ~SSH2_FILEXFER_ATTR_SIZE;
                   1025:        a.flags &= ~SSH2_FILEXFER_ATTR_UIDGID;
                   1026:        a.perm &= 0777;
                   1027:        if (!pflag)
                   1028:                a.flags &= ~SSH2_FILEXFER_ATTR_ACMODTIME;
                   1029:
                   1030:        buffer_init(&msg);
                   1031:
                   1032:        /* Send open request */
1.23      djm      1033:        id = conn->msg_id++;
1.1       djm      1034:        buffer_put_char(&msg, SSH2_FXP_OPEN);
                   1035:        buffer_put_int(&msg, id);
                   1036:        buffer_put_cstring(&msg, remote_path);
                   1037:        buffer_put_int(&msg, SSH2_FXF_WRITE|SSH2_FXF_CREAT|SSH2_FXF_TRUNC);
                   1038:        encode_attrib(&msg, &a);
1.23      djm      1039:        send_msg(conn->fd_out, &msg);
1.33      deraadt  1040:        debug3("Sent message SSH2_FXP_OPEN I:%u P:%s", id, remote_path);
1.1       djm      1041:
                   1042:        buffer_clear(&msg);
                   1043:
1.23      djm      1044:        handle = get_handle(conn->fd_in, id, &handle_len);
1.1       djm      1045:        if (handle == NULL) {
                   1046:                close(local_fd);
                   1047:                buffer_free(&msg);
                   1048:                return(-1);
                   1049:        }
                   1050:
1.21      djm      1051:        startid = ackid = id + 1;
1.23      djm      1052:        data = xmalloc(conn->transfer_buflen);
1.20      djm      1053:
1.1       djm      1054:        /* Read from local and write to remote */
                   1055:        offset = 0;
1.39      fgsch    1056:        if (showprogress)
                   1057:                start_progress_meter(local_path, sb.st_size, &offset);
                   1058:
1.19      deraadt  1059:        for (;;) {
1.1       djm      1060:                int len;
                   1061:
                   1062:                /*
1.51      deraadt  1063:                 * Can't use atomicio here because it returns 0 on EOF,
1.49      djm      1064:                 * thus losing the last block of the file.
1.51      deraadt  1065:                 * Simulate an EOF on interrupt, allowing ACKs from the
1.49      djm      1066:                 * server to drain.
1.1       djm      1067:                 */
1.49      djm      1068:                if (interrupted)
                   1069:                        len = 0;
                   1070:                else do
1.23      djm      1071:                        len = read(local_fd, data, conn->transfer_buflen);
1.1       djm      1072:                while ((len == -1) && (errno == EINTR || errno == EAGAIN));
                   1073:
                   1074:                if (len == -1)
                   1075:                        fatal("Couldn't read from \"%s\": %s", local_path,
                   1076:                            strerror(errno));
1.21      djm      1077:
                   1078:                if (len != 0) {
1.22      djm      1079:                        ack = xmalloc(sizeof(*ack));
                   1080:                        ack->id = ++id;
                   1081:                        ack->offset = offset;
                   1082:                        ack->len = len;
                   1083:                        TAILQ_INSERT_TAIL(&acks, ack, tq);
                   1084:
1.21      djm      1085:                        buffer_clear(&msg);
                   1086:                        buffer_put_char(&msg, SSH2_FXP_WRITE);
1.22      djm      1087:                        buffer_put_int(&msg, ack->id);
1.21      djm      1088:                        buffer_put_string(&msg, handle, handle_len);
                   1089:                        buffer_put_int64(&msg, offset);
                   1090:                        buffer_put_string(&msg, data, len);
1.23      djm      1091:                        send_msg(conn->fd_out, &msg);
1.33      deraadt  1092:                        debug3("Sent message SSH2_FXP_WRITE I:%u O:%llu S:%u",
1.37      deraadt  1093:                            id, (unsigned long long)offset, len);
1.22      djm      1094:                } else if (TAILQ_FIRST(&acks) == NULL)
1.1       djm      1095:                        break;
                   1096:
1.22      djm      1097:                if (ack == NULL)
                   1098:                        fatal("Unexpected ACK %u", id);
                   1099:
1.28      markus   1100:                if (id == startid || len == 0 ||
1.23      djm      1101:                    id - ackid >= conn->num_requests) {
1.32      markus   1102:                        u_int r_id;
1.31      djm      1103:
1.22      djm      1104:                        buffer_clear(&msg);
1.23      djm      1105:                        get_msg(conn->fd_in, &msg);
1.22      djm      1106:                        type = buffer_get_char(&msg);
1.31      djm      1107:                        r_id = buffer_get_int(&msg);
1.22      djm      1108:
                   1109:                        if (type != SSH2_FXP_STATUS)
                   1110:                                fatal("Expected SSH2_FXP_STATUS(%d) packet, "
                   1111:                                    "got %d", SSH2_FXP_STATUS, type);
                   1112:
                   1113:                        status = buffer_get_int(&msg);
                   1114:                        debug3("SSH2_FXP_STATUS %d", status);
                   1115:
                   1116:                        /* Find the request in our queue */
1.53      deraadt  1117:                        for (ack = TAILQ_FIRST(&acks);
1.31      djm      1118:                            ack != NULL && ack->id != r_id;
1.22      djm      1119:                            ack = TAILQ_NEXT(ack, tq))
                   1120:                                ;
                   1121:                        if (ack == NULL)
1.33      deraadt  1122:                                fatal("Can't find request for ID %u", r_id);
1.22      djm      1123:                        TAILQ_REMOVE(&acks, ack, tq);
                   1124:
1.21      djm      1125:                        if (status != SSH2_FX_OK) {
                   1126:                                error("Couldn't write to remote file \"%s\": %s",
1.37      deraadt  1127:                                    remote_path, fx2txt(status));
1.23      djm      1128:                                do_close(conn, handle, handle_len);
1.21      djm      1129:                                close(local_fd);
1.42      markus   1130:                                xfree(data);
                   1131:                                xfree(ack);
1.21      djm      1132:                                goto done;
                   1133:                        }
1.33      deraadt  1134:                        debug3("In write loop, ack for %u %u bytes at %llu",
1.56      djm      1135:                            ack->id, ack->len, (unsigned long long)ack->offset);
1.21      djm      1136:                        ++ackid;
1.34      deraadt  1137:                        xfree(ack);
1.1       djm      1138:                }
                   1139:                offset += len;
                   1140:        }
1.39      fgsch    1141:        if (showprogress)
                   1142:                stop_progress_meter();
1.20      djm      1143:        xfree(data);
1.1       djm      1144:
                   1145:        if (close(local_fd) == -1) {
                   1146:                error("Couldn't close local file \"%s\": %s", local_path,
                   1147:                    strerror(errno));
1.23      djm      1148:                do_close(conn, handle, handle_len);
1.5       djm      1149:                status = -1;
                   1150:                goto done;
1.1       djm      1151:        }
                   1152:
1.10      djm      1153:        /* Override umask and utimes if asked */
                   1154:        if (pflag)
1.23      djm      1155:                do_fsetstat(conn, handle, handle_len, &a);
1.10      djm      1156:
1.23      djm      1157:        status = do_close(conn, handle, handle_len);
1.5       djm      1158:
                   1159: done:
                   1160:        xfree(handle);
                   1161:        buffer_free(&msg);
1.23      djm      1162:        return(status);
1.1       djm      1163: }