[BACK]Return to sftp-client.c CVS log [TXT][DIR] Up to [local] / src / usr.bin / ssh

Annotation of src/usr.bin/ssh/sftp-client.c, Revision 1.81

1.81    ! djm         1: /* $OpenBSD: sftp-client.c,v 1.80 2008/01/21 19:20:17 djm Exp $ */
1.1       djm         2: /*
1.46      djm         3:  * Copyright (c) 2001-2004 Damien Miller <djm@openbsd.org>
1.1       djm         4:  *
1.46      djm         5:  * Permission to use, copy, modify, and distribute this software for any
                      6:  * purpose with or without fee is hereby granted, provided that the above
                      7:  * copyright notice and this permission notice appear in all copies.
1.1       djm         8:  *
1.46      djm         9:  * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
                     10:  * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
                     11:  * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
                     12:  * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
                     13:  * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
                     14:  * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
                     15:  * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
1.1       djm        16:  */
                     17:
                     18: /* XXX: memleaks */
                     19: /* XXX: signed vs unsigned */
1.23      djm        20: /* XXX: remove all logging, only return status codes */
1.1       djm        21: /* XXX: copy between two remote sites */
                     22:
1.74      deraadt    23: #include <sys/types.h>
1.21      djm        24: #include <sys/queue.h>
1.60      stevesk    25: #include <sys/stat.h>
1.71      stevesk    26: #include <sys/time.h>
1.72      stevesk    27: #include <sys/param.h>
1.74      deraadt    28: #include <sys/uio.h>
1.66      stevesk    29:
1.67      stevesk    30: #include <errno.h>
1.66      stevesk    31: #include <fcntl.h>
1.70      stevesk    32: #include <signal.h>
1.73      stevesk    33: #include <stdio.h>
1.69      stevesk    34: #include <string.h>
1.68      stevesk    35: #include <unistd.h>
1.74      deraadt    36: #include <stdarg.h>
1.1       djm        37:
1.74      deraadt    38: #include "xmalloc.h"
1.1       djm        39: #include "buffer.h"
                     40: #include "log.h"
                     41: #include "atomicio.h"
1.39      fgsch      42: #include "progressmeter.h"
1.64      djm        43: #include "misc.h"
1.1       djm        44:
                     45: #include "sftp.h"
                     46: #include "sftp-common.h"
                     47: #include "sftp-client.h"
                     48:
1.49      djm        49: extern volatile sig_atomic_t interrupted;
1.39      fgsch      50: extern int showprogress;
                     51:
1.59      david      52: /* Minimum amount of data to read at a time */
1.21      djm        53: #define MIN_READ_SIZE  512
                     54:
1.23      djm        55: struct sftp_conn {
                     56:        int fd_in;
                     57:        int fd_out;
                     58:        u_int transfer_buflen;
                     59:        u_int num_requests;
                     60:        u_int version;
                     61:        u_int msg_id;
1.81    ! djm        62: #define SFTP_EXT_POSIX_RENAME  1
        !            63:        u_int exts;
1.23      djm        64: };
1.4       djm        65:
1.17      itojun     66: static void
1.1       djm        67: send_msg(int fd, Buffer *m)
                     68: {
1.40      djm        69:        u_char mlen[4];
1.65      djm        70:        struct iovec iov[2];
1.40      djm        71:
1.58      djm        72:        if (buffer_len(m) > SFTP_MAX_MSG_LENGTH)
1.40      djm        73:                fatal("Outbound message too long %u", buffer_len(m));
                     74:
                     75:        /* Send length first */
1.64      djm        76:        put_u32(mlen, buffer_len(m));
1.65      djm        77:        iov[0].iov_base = mlen;
                     78:        iov[0].iov_len = sizeof(mlen);
                     79:        iov[1].iov_base = buffer_ptr(m);
                     80:        iov[1].iov_len = buffer_len(m);
1.74      deraadt    81:
1.65      djm        82:        if (atomiciov(writev, fd, iov, 2) != buffer_len(m) + sizeof(mlen))
1.1       djm        83:                fatal("Couldn't send packet: %s", strerror(errno));
                     84:
1.40      djm        85:        buffer_clear(m);
1.1       djm        86: }
                     87:
1.17      itojun     88: static void
1.1       djm        89: get_msg(int fd, Buffer *m)
                     90: {
1.40      djm        91:        u_int msg_len;
1.1       djm        92:
1.40      djm        93:        buffer_append_space(m, 4);
1.54      avsm       94:        if (atomicio(read, fd, buffer_ptr(m), 4) != 4) {
                     95:                if (errno == EPIPE)
                     96:                        fatal("Connection closed");
                     97:                else
                     98:                        fatal("Couldn't read packet: %s", strerror(errno));
                     99:        }
1.1       djm       100:
1.40      djm       101:        msg_len = buffer_get_int(m);
1.58      djm       102:        if (msg_len > SFTP_MAX_MSG_LENGTH)
1.33      deraadt   103:                fatal("Received message too long %u", msg_len);
1.1       djm       104:
1.40      djm       105:        buffer_append_space(m, msg_len);
1.54      avsm      106:        if (atomicio(read, fd, buffer_ptr(m), msg_len) != msg_len) {
                    107:                if (errno == EPIPE)
                    108:                        fatal("Connection closed");
                    109:                else
                    110:                        fatal("Read packet: %s", strerror(errno));
                    111:        }
1.1       djm       112: }
                    113:
1.17      itojun    114: static void
1.1       djm       115: send_string_request(int fd, u_int id, u_int code, char *s,
                    116:     u_int len)
                    117: {
                    118:        Buffer msg;
                    119:
                    120:        buffer_init(&msg);
                    121:        buffer_put_char(&msg, code);
                    122:        buffer_put_int(&msg, id);
                    123:        buffer_put_string(&msg, s, len);
                    124:        send_msg(fd, &msg);
1.33      deraadt   125:        debug3("Sent message fd %d T:%u I:%u", fd, code, id);
1.1       djm       126:        buffer_free(&msg);
                    127: }
                    128:
1.17      itojun    129: static void
1.1       djm       130: send_string_attrs_request(int fd, u_int id, u_int code, char *s,
                    131:     u_int len, Attrib *a)
                    132: {
                    133:        Buffer msg;
                    134:
                    135:        buffer_init(&msg);
                    136:        buffer_put_char(&msg, code);
                    137:        buffer_put_int(&msg, id);
                    138:        buffer_put_string(&msg, s, len);
                    139:        encode_attrib(&msg, a);
                    140:        send_msg(fd, &msg);
1.33      deraadt   141:        debug3("Sent message fd %d T:%u I:%u", fd, code, id);
1.1       djm       142:        buffer_free(&msg);
                    143: }
                    144:
1.17      itojun    145: static u_int
1.33      deraadt   146: get_status(int fd, u_int expected_id)
1.1       djm       147: {
                    148:        Buffer msg;
                    149:        u_int type, id, status;
                    150:
                    151:        buffer_init(&msg);
                    152:        get_msg(fd, &msg);
                    153:        type = buffer_get_char(&msg);
                    154:        id = buffer_get_int(&msg);
                    155:
                    156:        if (id != expected_id)
1.33      deraadt   157:                fatal("ID mismatch (%u != %u)", id, expected_id);
1.1       djm       158:        if (type != SSH2_FXP_STATUS)
1.33      deraadt   159:                fatal("Expected SSH2_FXP_STATUS(%u) packet, got %u",
1.1       djm       160:                    SSH2_FXP_STATUS, type);
                    161:
                    162:        status = buffer_get_int(&msg);
                    163:        buffer_free(&msg);
                    164:
1.33      deraadt   165:        debug3("SSH2_FXP_STATUS %u", status);
1.1       djm       166:
                    167:        return(status);
                    168: }
                    169:
1.17      itojun    170: static char *
1.1       djm       171: get_handle(int fd, u_int expected_id, u_int *len)
                    172: {
                    173:        Buffer msg;
                    174:        u_int type, id;
                    175:        char *handle;
                    176:
                    177:        buffer_init(&msg);
                    178:        get_msg(fd, &msg);
                    179:        type = buffer_get_char(&msg);
                    180:        id = buffer_get_int(&msg);
                    181:
                    182:        if (id != expected_id)
1.33      deraadt   183:                fatal("ID mismatch (%u != %u)", id, expected_id);
1.1       djm       184:        if (type == SSH2_FXP_STATUS) {
                    185:                int status = buffer_get_int(&msg);
                    186:
                    187:                error("Couldn't get handle: %s", fx2txt(status));
1.52      markus    188:                buffer_free(&msg);
1.1       djm       189:                return(NULL);
                    190:        } else if (type != SSH2_FXP_HANDLE)
1.33      deraadt   191:                fatal("Expected SSH2_FXP_HANDLE(%u) packet, got %u",
1.1       djm       192:                    SSH2_FXP_HANDLE, type);
                    193:
                    194:        handle = buffer_get_string(&msg, len);
                    195:        buffer_free(&msg);
                    196:
                    197:        return(handle);
                    198: }
                    199:
1.17      itojun    200: static Attrib *
1.14      djm       201: get_decode_stat(int fd, u_int expected_id, int quiet)
1.1       djm       202: {
                    203:        Buffer msg;
                    204:        u_int type, id;
                    205:        Attrib *a;
                    206:
                    207:        buffer_init(&msg);
                    208:        get_msg(fd, &msg);
                    209:
                    210:        type = buffer_get_char(&msg);
                    211:        id = buffer_get_int(&msg);
                    212:
1.33      deraadt   213:        debug3("Received stat reply T:%u I:%u", type, id);
1.1       djm       214:        if (id != expected_id)
1.33      deraadt   215:                fatal("ID mismatch (%u != %u)", id, expected_id);
1.1       djm       216:        if (type == SSH2_FXP_STATUS) {
                    217:                int status = buffer_get_int(&msg);
                    218:
1.14      djm       219:                if (quiet)
                    220:                        debug("Couldn't stat remote file: %s", fx2txt(status));
                    221:                else
                    222:                        error("Couldn't stat remote file: %s", fx2txt(status));
1.52      markus    223:                buffer_free(&msg);
1.1       djm       224:                return(NULL);
                    225:        } else if (type != SSH2_FXP_ATTRS) {
1.33      deraadt   226:                fatal("Expected SSH2_FXP_ATTRS(%u) packet, got %u",
1.1       djm       227:                    SSH2_FXP_ATTRS, type);
                    228:        }
                    229:        a = decode_attrib(&msg);
                    230:        buffer_free(&msg);
                    231:
                    232:        return(a);
                    233: }
                    234:
1.23      djm       235: struct sftp_conn *
                    236: do_init(int fd_in, int fd_out, u_int transfer_buflen, u_int num_requests)
1.1       djm       237: {
1.81    ! djm       238:        u_int type, exts = 0;
1.33      deraadt   239:        int version;
1.1       djm       240:        Buffer msg;
1.23      djm       241:        struct sftp_conn *ret;
1.1       djm       242:
                    243:        buffer_init(&msg);
                    244:        buffer_put_char(&msg, SSH2_FXP_INIT);
                    245:        buffer_put_int(&msg, SSH2_FILEXFER_VERSION);
                    246:        send_msg(fd_out, &msg);
                    247:
                    248:        buffer_clear(&msg);
                    249:
                    250:        get_msg(fd_in, &msg);
                    251:
1.3       stevesk   252:        /* Expecting a VERSION reply */
1.1       djm       253:        if ((type = buffer_get_char(&msg)) != SSH2_FXP_VERSION) {
1.33      deraadt   254:                error("Invalid packet back from SSH2_FXP_INIT (type %u)",
1.1       djm       255:                    type);
                    256:                buffer_free(&msg);
1.23      djm       257:                return(NULL);
1.1       djm       258:        }
                    259:        version = buffer_get_int(&msg);
                    260:
                    261:        debug2("Remote version: %d", version);
                    262:
                    263:        /* Check for extensions */
                    264:        while (buffer_len(&msg) > 0) {
                    265:                char *name = buffer_get_string(&msg, NULL);
                    266:                char *value = buffer_get_string(&msg, NULL);
                    267:
                    268:                debug2("Init extension: \"%s\"", name);
1.81    ! djm       269:                if (strcmp(name, "posix-rename@openssh.com") == 0)
        !           270:                        exts |= SFTP_EXT_POSIX_RENAME;
1.1       djm       271:                xfree(name);
                    272:                xfree(value);
                    273:        }
                    274:
                    275:        buffer_free(&msg);
1.11      djm       276:
1.23      djm       277:        ret = xmalloc(sizeof(*ret));
                    278:        ret->fd_in = fd_in;
                    279:        ret->fd_out = fd_out;
                    280:        ret->transfer_buflen = transfer_buflen;
                    281:        ret->num_requests = num_requests;
                    282:        ret->version = version;
                    283:        ret->msg_id = 1;
1.81    ! djm       284:        ret->exts = exts;
1.23      djm       285:
                    286:        /* Some filexfer v.0 servers don't support large packets */
                    287:        if (version == 0)
1.29      markus    288:                ret->transfer_buflen = MIN(ret->transfer_buflen, 20480);
1.23      djm       289:
                    290:        return(ret);
                    291: }
                    292:
                    293: u_int
                    294: sftp_proto_version(struct sftp_conn *conn)
                    295: {
                    296:        return(conn->version);
1.1       djm       297: }
                    298:
                    299: int
1.23      djm       300: do_close(struct sftp_conn *conn, char *handle, u_int handle_len)
1.1       djm       301: {
                    302:        u_int id, status;
                    303:        Buffer msg;
                    304:
                    305:        buffer_init(&msg);
                    306:
1.23      djm       307:        id = conn->msg_id++;
1.1       djm       308:        buffer_put_char(&msg, SSH2_FXP_CLOSE);
                    309:        buffer_put_int(&msg, id);
                    310:        buffer_put_string(&msg, handle, handle_len);
1.23      djm       311:        send_msg(conn->fd_out, &msg);
1.33      deraadt   312:        debug3("Sent message SSH2_FXP_CLOSE I:%u", id);
1.1       djm       313:
1.23      djm       314:        status = get_status(conn->fd_in, id);
1.1       djm       315:        if (status != SSH2_FX_OK)
                    316:                error("Couldn't close file: %s", fx2txt(status));
                    317:
                    318:        buffer_free(&msg);
                    319:
                    320:        return(status);
                    321: }
                    322:
1.12      djm       323:
1.17      itojun    324: static int
1.23      djm       325: do_lsreaddir(struct sftp_conn *conn, char *path, int printflag,
1.12      djm       326:     SFTP_DIRENT ***dir)
1.1       djm       327: {
                    328:        Buffer msg;
1.55      djm       329:        u_int count, type, id, handle_len, i, expected_id, ents = 0;
1.1       djm       330:        char *handle;
                    331:
1.23      djm       332:        id = conn->msg_id++;
1.1       djm       333:
                    334:        buffer_init(&msg);
                    335:        buffer_put_char(&msg, SSH2_FXP_OPENDIR);
                    336:        buffer_put_int(&msg, id);
                    337:        buffer_put_cstring(&msg, path);
1.23      djm       338:        send_msg(conn->fd_out, &msg);
1.1       djm       339:
                    340:        buffer_clear(&msg);
                    341:
1.23      djm       342:        handle = get_handle(conn->fd_in, id, &handle_len);
1.1       djm       343:        if (handle == NULL)
                    344:                return(-1);
                    345:
1.12      djm       346:        if (dir) {
                    347:                ents = 0;
                    348:                *dir = xmalloc(sizeof(**dir));
                    349:                (*dir)[0] = NULL;
                    350:        }
                    351:
1.49      djm       352:        for (; !interrupted;) {
1.23      djm       353:                id = expected_id = conn->msg_id++;
1.1       djm       354:
1.33      deraadt   355:                debug3("Sending SSH2_FXP_READDIR I:%u", id);
1.1       djm       356:
                    357:                buffer_clear(&msg);
                    358:                buffer_put_char(&msg, SSH2_FXP_READDIR);
                    359:                buffer_put_int(&msg, id);
                    360:                buffer_put_string(&msg, handle, handle_len);
1.23      djm       361:                send_msg(conn->fd_out, &msg);
1.1       djm       362:
                    363:                buffer_clear(&msg);
                    364:
1.23      djm       365:                get_msg(conn->fd_in, &msg);
1.1       djm       366:
                    367:                type = buffer_get_char(&msg);
                    368:                id = buffer_get_int(&msg);
                    369:
1.33      deraadt   370:                debug3("Received reply T:%u I:%u", type, id);
1.1       djm       371:
                    372:                if (id != expected_id)
1.33      deraadt   373:                        fatal("ID mismatch (%u != %u)", id, expected_id);
1.1       djm       374:
                    375:                if (type == SSH2_FXP_STATUS) {
                    376:                        int status = buffer_get_int(&msg);
                    377:
                    378:                        debug3("Received SSH2_FXP_STATUS %d", status);
                    379:
                    380:                        if (status == SSH2_FX_EOF) {
                    381:                                break;
                    382:                        } else {
                    383:                                error("Couldn't read directory: %s",
                    384:                                    fx2txt(status));
1.23      djm       385:                                do_close(conn, handle, handle_len);
1.42      markus    386:                                xfree(handle);
1.9       djm       387:                                return(status);
1.1       djm       388:                        }
                    389:                } else if (type != SSH2_FXP_NAME)
1.33      deraadt   390:                        fatal("Expected SSH2_FXP_NAME(%u) packet, got %u",
1.1       djm       391:                            SSH2_FXP_NAME, type);
                    392:
                    393:                count = buffer_get_int(&msg);
1.7       markus    394:                if (count == 0)
                    395:                        break;
1.8       stevesk   396:                debug3("Received %d SSH2_FXP_NAME responses", count);
1.19      deraadt   397:                for (i = 0; i < count; i++) {
1.1       djm       398:                        char *filename, *longname;
                    399:                        Attrib *a;
                    400:
                    401:                        filename = buffer_get_string(&msg, NULL);
                    402:                        longname = buffer_get_string(&msg, NULL);
                    403:                        a = decode_attrib(&msg);
                    404:
1.12      djm       405:                        if (printflag)
                    406:                                printf("%s\n", longname);
                    407:
                    408:                        if (dir) {
1.62      djm       409:                                *dir = xrealloc(*dir, ents + 2, sizeof(**dir));
1.12      djm       410:                                (*dir)[ents] = xmalloc(sizeof(***dir));
                    411:                                (*dir)[ents]->filename = xstrdup(filename);
                    412:                                (*dir)[ents]->longname = xstrdup(longname);
                    413:                                memcpy(&(*dir)[ents]->a, a, sizeof(*a));
                    414:                                (*dir)[++ents] = NULL;
                    415:                        }
1.1       djm       416:
                    417:                        xfree(filename);
                    418:                        xfree(longname);
                    419:                }
                    420:        }
                    421:
                    422:        buffer_free(&msg);
1.23      djm       423:        do_close(conn, handle, handle_len);
1.1       djm       424:        xfree(handle);
                    425:
1.49      djm       426:        /* Don't return partial matches on interrupt */
                    427:        if (interrupted && dir != NULL && *dir != NULL) {
                    428:                free_sftp_dirents(*dir);
                    429:                *dir = xmalloc(sizeof(**dir));
                    430:                **dir = NULL;
                    431:        }
                    432:
1.1       djm       433:        return(0);
1.12      djm       434: }
                    435:
                    436: int
1.23      djm       437: do_readdir(struct sftp_conn *conn, char *path, SFTP_DIRENT ***dir)
1.12      djm       438: {
1.23      djm       439:        return(do_lsreaddir(conn, path, 0, dir));
1.12      djm       440: }
                    441:
                    442: void free_sftp_dirents(SFTP_DIRENT **s)
                    443: {
                    444:        int i;
1.19      deraadt   445:
                    446:        for (i = 0; s[i]; i++) {
1.12      djm       447:                xfree(s[i]->filename);
                    448:                xfree(s[i]->longname);
                    449:                xfree(s[i]);
                    450:        }
                    451:        xfree(s);
                    452: }
                    453:
                    454: int
1.23      djm       455: do_rm(struct sftp_conn *conn, char *path)
1.1       djm       456: {
                    457:        u_int status, id;
                    458:
                    459:        debug2("Sending SSH2_FXP_REMOVE \"%s\"", path);
                    460:
1.23      djm       461:        id = conn->msg_id++;
1.28      markus    462:        send_string_request(conn->fd_out, id, SSH2_FXP_REMOVE, path,
1.23      djm       463:            strlen(path));
                    464:        status = get_status(conn->fd_in, id);
1.1       djm       465:        if (status != SSH2_FX_OK)
                    466:                error("Couldn't delete file: %s", fx2txt(status));
                    467:        return(status);
                    468: }
                    469:
                    470: int
1.23      djm       471: do_mkdir(struct sftp_conn *conn, char *path, Attrib *a)
1.1       djm       472: {
                    473:        u_int status, id;
                    474:
1.23      djm       475:        id = conn->msg_id++;
                    476:        send_string_attrs_request(conn->fd_out, id, SSH2_FXP_MKDIR, path,
1.1       djm       477:            strlen(path), a);
                    478:
1.23      djm       479:        status = get_status(conn->fd_in, id);
1.1       djm       480:        if (status != SSH2_FX_OK)
                    481:                error("Couldn't create directory: %s", fx2txt(status));
                    482:
                    483:        return(status);
                    484: }
                    485:
                    486: int
1.23      djm       487: do_rmdir(struct sftp_conn *conn, char *path)
1.1       djm       488: {
                    489:        u_int status, id;
                    490:
1.23      djm       491:        id = conn->msg_id++;
                    492:        send_string_request(conn->fd_out, id, SSH2_FXP_RMDIR, path,
                    493:            strlen(path));
1.1       djm       494:
1.23      djm       495:        status = get_status(conn->fd_in, id);
1.1       djm       496:        if (status != SSH2_FX_OK)
                    497:                error("Couldn't remove directory: %s", fx2txt(status));
                    498:
                    499:        return(status);
                    500: }
                    501:
                    502: Attrib *
1.23      djm       503: do_stat(struct sftp_conn *conn, char *path, int quiet)
1.1       djm       504: {
                    505:        u_int id;
                    506:
1.23      djm       507:        id = conn->msg_id++;
                    508:
1.28      markus    509:        send_string_request(conn->fd_out, id,
                    510:            conn->version == 0 ? SSH2_FXP_STAT_VERSION_0 : SSH2_FXP_STAT,
1.23      djm       511:            path, strlen(path));
                    512:
                    513:        return(get_decode_stat(conn->fd_in, id, quiet));
1.1       djm       514: }
                    515:
                    516: Attrib *
1.23      djm       517: do_lstat(struct sftp_conn *conn, char *path, int quiet)
1.1       djm       518: {
                    519:        u_int id;
                    520:
1.23      djm       521:        if (conn->version == 0) {
                    522:                if (quiet)
                    523:                        debug("Server version does not support lstat operation");
                    524:                else
1.43      itojun    525:                        logit("Server version does not support lstat operation");
1.30      markus    526:                return(do_stat(conn, path, quiet));
1.23      djm       527:        }
                    528:
                    529:        id = conn->msg_id++;
                    530:        send_string_request(conn->fd_out, id, SSH2_FXP_LSTAT, path,
                    531:            strlen(path));
                    532:
                    533:        return(get_decode_stat(conn->fd_in, id, quiet));
1.1       djm       534: }
                    535:
1.78      chl       536: #ifdef notyet
1.1       djm       537: Attrib *
1.23      djm       538: do_fstat(struct sftp_conn *conn, char *handle, u_int handle_len, int quiet)
1.1       djm       539: {
                    540:        u_int id;
                    541:
1.23      djm       542:        id = conn->msg_id++;
                    543:        send_string_request(conn->fd_out, id, SSH2_FXP_FSTAT, handle,
                    544:            handle_len);
                    545:
                    546:        return(get_decode_stat(conn->fd_in, id, quiet));
1.1       djm       547: }
1.78      chl       548: #endif
1.1       djm       549:
                    550: int
1.23      djm       551: do_setstat(struct sftp_conn *conn, char *path, Attrib *a)
1.1       djm       552: {
                    553:        u_int status, id;
                    554:
1.23      djm       555:        id = conn->msg_id++;
                    556:        send_string_attrs_request(conn->fd_out, id, SSH2_FXP_SETSTAT, path,
1.1       djm       557:            strlen(path), a);
                    558:
1.23      djm       559:        status = get_status(conn->fd_in, id);
1.1       djm       560:        if (status != SSH2_FX_OK)
                    561:                error("Couldn't setstat on \"%s\": %s", path,
                    562:                    fx2txt(status));
                    563:
                    564:        return(status);
                    565: }
                    566:
                    567: int
1.23      djm       568: do_fsetstat(struct sftp_conn *conn, char *handle, u_int handle_len,
1.1       djm       569:     Attrib *a)
                    570: {
                    571:        u_int status, id;
                    572:
1.23      djm       573:        id = conn->msg_id++;
                    574:        send_string_attrs_request(conn->fd_out, id, SSH2_FXP_FSETSTAT, handle,
1.1       djm       575:            handle_len, a);
                    576:
1.23      djm       577:        status = get_status(conn->fd_in, id);
1.1       djm       578:        if (status != SSH2_FX_OK)
                    579:                error("Couldn't fsetstat: %s", fx2txt(status));
                    580:
                    581:        return(status);
                    582: }
                    583:
                    584: char *
1.23      djm       585: do_realpath(struct sftp_conn *conn, char *path)
1.1       djm       586: {
                    587:        Buffer msg;
                    588:        u_int type, expected_id, count, id;
                    589:        char *filename, *longname;
                    590:        Attrib *a;
                    591:
1.23      djm       592:        expected_id = id = conn->msg_id++;
                    593:        send_string_request(conn->fd_out, id, SSH2_FXP_REALPATH, path,
                    594:            strlen(path));
1.1       djm       595:
                    596:        buffer_init(&msg);
                    597:
1.23      djm       598:        get_msg(conn->fd_in, &msg);
1.1       djm       599:        type = buffer_get_char(&msg);
                    600:        id = buffer_get_int(&msg);
                    601:
                    602:        if (id != expected_id)
1.33      deraadt   603:                fatal("ID mismatch (%u != %u)", id, expected_id);
1.1       djm       604:
                    605:        if (type == SSH2_FXP_STATUS) {
                    606:                u_int status = buffer_get_int(&msg);
                    607:
                    608:                error("Couldn't canonicalise: %s", fx2txt(status));
                    609:                return(NULL);
                    610:        } else if (type != SSH2_FXP_NAME)
1.33      deraadt   611:                fatal("Expected SSH2_FXP_NAME(%u) packet, got %u",
1.1       djm       612:                    SSH2_FXP_NAME, type);
                    613:
                    614:        count = buffer_get_int(&msg);
                    615:        if (count != 1)
                    616:                fatal("Got multiple names (%d) from SSH_FXP_REALPATH", count);
                    617:
                    618:        filename = buffer_get_string(&msg, NULL);
                    619:        longname = buffer_get_string(&msg, NULL);
                    620:        a = decode_attrib(&msg);
                    621:
                    622:        debug3("SSH_FXP_REALPATH %s -> %s", path, filename);
                    623:
                    624:        xfree(longname);
                    625:
                    626:        buffer_free(&msg);
                    627:
                    628:        return(filename);
                    629: }
                    630:
                    631: int
1.23      djm       632: do_rename(struct sftp_conn *conn, char *oldpath, char *newpath)
1.1       djm       633: {
                    634:        Buffer msg;
                    635:        u_int status, id;
                    636:
                    637:        buffer_init(&msg);
                    638:
                    639:        /* Send rename request */
1.23      djm       640:        id = conn->msg_id++;
1.81    ! djm       641:        if ((conn->exts & SFTP_EXT_POSIX_RENAME)) {
        !           642:                buffer_put_char(&msg, SSH2_FXP_EXTENDED);
        !           643:                buffer_put_int(&msg, id);
        !           644:                buffer_put_cstring(&msg, "posix-rename@openssh.com");
        !           645:        } else {
        !           646:                buffer_put_char(&msg, SSH2_FXP_RENAME);
        !           647:                buffer_put_int(&msg, id);
        !           648:        }
1.1       djm       649:        buffer_put_cstring(&msg, oldpath);
                    650:        buffer_put_cstring(&msg, newpath);
1.23      djm       651:        send_msg(conn->fd_out, &msg);
1.81    ! djm       652:        debug3("Sent message %s \"%s\" -> \"%s\"",
        !           653:            (conn->exts & SFTP_EXT_POSIX_RENAME) ? "posix-rename@openssh.com" :
        !           654:            "SSH2_FXP_RENAME", oldpath, newpath);
1.1       djm       655:        buffer_free(&msg);
                    656:
1.23      djm       657:        status = get_status(conn->fd_in, id);
1.1       djm       658:        if (status != SSH2_FX_OK)
1.23      djm       659:                error("Couldn't rename file \"%s\" to \"%s\": %s", oldpath,
                    660:                    newpath, fx2txt(status));
1.1       djm       661:
                    662:        return(status);
1.11      djm       663: }
                    664:
                    665: int
1.23      djm       666: do_symlink(struct sftp_conn *conn, char *oldpath, char *newpath)
1.11      djm       667: {
                    668:        Buffer msg;
                    669:        u_int status, id;
                    670:
1.23      djm       671:        if (conn->version < 3) {
                    672:                error("This server does not support the symlink operation");
                    673:                return(SSH2_FX_OP_UNSUPPORTED);
                    674:        }
                    675:
1.11      djm       676:        buffer_init(&msg);
                    677:
1.48      djm       678:        /* Send symlink request */
1.23      djm       679:        id = conn->msg_id++;
1.11      djm       680:        buffer_put_char(&msg, SSH2_FXP_SYMLINK);
                    681:        buffer_put_int(&msg, id);
                    682:        buffer_put_cstring(&msg, oldpath);
                    683:        buffer_put_cstring(&msg, newpath);
1.23      djm       684:        send_msg(conn->fd_out, &msg);
1.11      djm       685:        debug3("Sent message SSH2_FXP_SYMLINK \"%s\" -> \"%s\"", oldpath,
                    686:            newpath);
                    687:        buffer_free(&msg);
                    688:
1.23      djm       689:        status = get_status(conn->fd_in, id);
1.11      djm       690:        if (status != SSH2_FX_OK)
1.36      markus    691:                error("Couldn't symlink file \"%s\" to \"%s\": %s", oldpath,
1.23      djm       692:                    newpath, fx2txt(status));
1.11      djm       693:
                    694:        return(status);
                    695: }
                    696:
1.78      chl       697: #ifdef notyet
1.11      djm       698: char *
1.23      djm       699: do_readlink(struct sftp_conn *conn, char *path)
1.11      djm       700: {
                    701:        Buffer msg;
                    702:        u_int type, expected_id, count, id;
                    703:        char *filename, *longname;
                    704:        Attrib *a;
                    705:
1.23      djm       706:        expected_id = id = conn->msg_id++;
                    707:        send_string_request(conn->fd_out, id, SSH2_FXP_READLINK, path,
                    708:            strlen(path));
1.11      djm       709:
                    710:        buffer_init(&msg);
                    711:
1.23      djm       712:        get_msg(conn->fd_in, &msg);
1.11      djm       713:        type = buffer_get_char(&msg);
                    714:        id = buffer_get_int(&msg);
                    715:
                    716:        if (id != expected_id)
1.33      deraadt   717:                fatal("ID mismatch (%u != %u)", id, expected_id);
1.11      djm       718:
                    719:        if (type == SSH2_FXP_STATUS) {
                    720:                u_int status = buffer_get_int(&msg);
                    721:
                    722:                error("Couldn't readlink: %s", fx2txt(status));
                    723:                return(NULL);
                    724:        } else if (type != SSH2_FXP_NAME)
1.33      deraadt   725:                fatal("Expected SSH2_FXP_NAME(%u) packet, got %u",
1.11      djm       726:                    SSH2_FXP_NAME, type);
                    727:
                    728:        count = buffer_get_int(&msg);
                    729:        if (count != 1)
                    730:                fatal("Got multiple names (%d) from SSH_FXP_READLINK", count);
                    731:
                    732:        filename = buffer_get_string(&msg, NULL);
                    733:        longname = buffer_get_string(&msg, NULL);
                    734:        a = decode_attrib(&msg);
                    735:
                    736:        debug3("SSH_FXP_READLINK %s -> %s", path, filename);
                    737:
                    738:        xfree(longname);
                    739:
                    740:        buffer_free(&msg);
                    741:
                    742:        return(filename);
1.1       djm       743: }
1.78      chl       744: #endif
1.1       djm       745:
1.21      djm       746: static void
                    747: send_read_request(int fd_out, u_int id, u_int64_t offset, u_int len,
                    748:     char *handle, u_int handle_len)
                    749: {
                    750:        Buffer msg;
1.28      markus    751:
1.21      djm       752:        buffer_init(&msg);
                    753:        buffer_clear(&msg);
                    754:        buffer_put_char(&msg, SSH2_FXP_READ);
                    755:        buffer_put_int(&msg, id);
                    756:        buffer_put_string(&msg, handle, handle_len);
                    757:        buffer_put_int64(&msg, offset);
                    758:        buffer_put_int(&msg, len);
                    759:        send_msg(fd_out, &msg);
                    760:        buffer_free(&msg);
1.28      markus    761: }
1.21      djm       762:
1.1       djm       763: int
1.23      djm       764: do_download(struct sftp_conn *conn, char *remote_path, char *local_path,
                    765:     int pflag)
1.1       djm       766: {
1.21      djm       767:        Attrib junk, *a;
                    768:        Buffer msg;
1.1       djm       769:        char *handle;
1.57      dtucker   770:        int local_fd, status = 0, write_error;
1.21      djm       771:        int read_error, write_errno;
                    772:        u_int64_t offset, size;
1.55      djm       773:        u_int handle_len, mode, type, id, buflen, num_req, max_req;
1.39      fgsch     774:        off_t progress_counter;
1.21      djm       775:        struct request {
                    776:                u_int id;
                    777:                u_int len;
                    778:                u_int64_t offset;
1.28      markus    779:                TAILQ_ENTRY(request) tq;
1.21      djm       780:        };
                    781:        TAILQ_HEAD(reqhead, request) requests;
                    782:        struct request *req;
                    783:
                    784:        TAILQ_INIT(&requests);
1.1       djm       785:
1.23      djm       786:        a = do_stat(conn, remote_path, 0);
1.1       djm       787:        if (a == NULL)
                    788:                return(-1);
                    789:
                    790:        /* XXX: should we preserve set[ug]id? */
                    791:        if (a->flags & SSH2_FILEXFER_ATTR_PERMISSIONS)
1.38      djm       792:                mode = a->perm & 0777;
1.1       djm       793:        else
                    794:                mode = 0666;
                    795:
1.14      djm       796:        if ((a->flags & SSH2_FILEXFER_ATTR_PERMISSIONS) &&
1.41      djm       797:            (!S_ISREG(a->perm))) {
                    798:                error("Cannot download non-regular file: %s", remote_path);
1.14      djm       799:                return(-1);
                    800:        }
                    801:
1.21      djm       802:        if (a->flags & SSH2_FILEXFER_ATTR_SIZE)
                    803:                size = a->size;
                    804:        else
                    805:                size = 0;
                    806:
1.23      djm       807:        buflen = conn->transfer_buflen;
1.1       djm       808:        buffer_init(&msg);
                    809:
                    810:        /* Send open request */
1.23      djm       811:        id = conn->msg_id++;
1.1       djm       812:        buffer_put_char(&msg, SSH2_FXP_OPEN);
                    813:        buffer_put_int(&msg, id);
                    814:        buffer_put_cstring(&msg, remote_path);
                    815:        buffer_put_int(&msg, SSH2_FXF_READ);
                    816:        attrib_clear(&junk); /* Send empty attributes */
                    817:        encode_attrib(&msg, &junk);
1.23      djm       818:        send_msg(conn->fd_out, &msg);
1.33      deraadt   819:        debug3("Sent message SSH2_FXP_OPEN I:%u P:%s", id, remote_path);
1.1       djm       820:
1.23      djm       821:        handle = get_handle(conn->fd_in, id, &handle_len);
1.1       djm       822:        if (handle == NULL) {
                    823:                buffer_free(&msg);
                    824:                return(-1);
                    825:        }
                    826:
1.45      djm       827:        local_fd = open(local_path, O_WRONLY | O_CREAT | O_TRUNC,
1.38      djm       828:            mode | S_IWRITE);
1.23      djm       829:        if (local_fd == -1) {
                    830:                error("Couldn't open local file \"%s\" for writing: %s",
                    831:                    local_path, strerror(errno));
1.79      djm       832:                do_close(conn, handle, handle_len);
1.24      markus    833:                buffer_free(&msg);
                    834:                xfree(handle);
1.23      djm       835:                return(-1);
                    836:        }
                    837:
1.1       djm       838:        /* Read from remote and write to local */
1.21      djm       839:        write_error = read_error = write_errno = num_req = offset = 0;
                    840:        max_req = 1;
1.39      fgsch     841:        progress_counter = 0;
                    842:
1.47      djm       843:        if (showprogress && size != 0)
                    844:                start_progress_meter(remote_path, size, &progress_counter);
1.39      fgsch     845:
1.21      djm       846:        while (num_req > 0 || max_req > 0) {
                    847:                char *data;
1.1       djm       848:                u_int len;
                    849:
1.49      djm       850:                /*
1.51      deraadt   851:                 * Simulate EOF on interrupt: stop sending new requests and
1.49      djm       852:                 * allow outstanding requests to drain gracefully
                    853:                 */
                    854:                if (interrupted) {
                    855:                        if (num_req == 0) /* If we haven't started yet... */
                    856:                                break;
                    857:                        max_req = 0;
                    858:                }
                    859:
1.21      djm       860:                /* Send some more requests */
                    861:                while (num_req < max_req) {
1.28      markus    862:                        debug3("Request range %llu -> %llu (%d/%d)",
1.25      itojun    863:                            (unsigned long long)offset,
                    864:                            (unsigned long long)offset + buflen - 1,
                    865:                            num_req, max_req);
1.21      djm       866:                        req = xmalloc(sizeof(*req));
1.23      djm       867:                        req->id = conn->msg_id++;
1.21      djm       868:                        req->len = buflen;
                    869:                        req->offset = offset;
                    870:                        offset += buflen;
                    871:                        num_req++;
                    872:                        TAILQ_INSERT_TAIL(&requests, req, tq);
1.28      markus    873:                        send_read_request(conn->fd_out, req->id, req->offset,
1.21      djm       874:                            req->len, handle, handle_len);
                    875:                }
1.1       djm       876:
                    877:                buffer_clear(&msg);
1.23      djm       878:                get_msg(conn->fd_in, &msg);
1.1       djm       879:                type = buffer_get_char(&msg);
                    880:                id = buffer_get_int(&msg);
1.33      deraadt   881:                debug3("Received reply T:%u I:%u R:%d", type, id, max_req);
1.21      djm       882:
                    883:                /* Find the request in our queue */
1.53      deraadt   884:                for (req = TAILQ_FIRST(&requests);
1.21      djm       885:                    req != NULL && req->id != id;
                    886:                    req = TAILQ_NEXT(req, tq))
                    887:                        ;
                    888:                if (req == NULL)
                    889:                        fatal("Unexpected reply %u", id);
                    890:
                    891:                switch (type) {
                    892:                case SSH2_FXP_STATUS:
1.5       djm       893:                        status = buffer_get_int(&msg);
1.21      djm       894:                        if (status != SSH2_FX_EOF)
                    895:                                read_error = 1;
                    896:                        max_req = 0;
                    897:                        TAILQ_REMOVE(&requests, req, tq);
                    898:                        xfree(req);
                    899:                        num_req--;
                    900:                        break;
                    901:                case SSH2_FXP_DATA:
                    902:                        data = buffer_get_string(&msg, &len);
1.26      itojun    903:                        debug3("Received data %llu -> %llu",
1.28      markus    904:                            (unsigned long long)req->offset,
1.26      itojun    905:                            (unsigned long long)req->offset + len - 1);
1.21      djm       906:                        if (len > req->len)
                    907:                                fatal("Received more data than asked for "
1.37      deraadt   908:                                    "%u > %u", len, req->len);
1.21      djm       909:                        if ((lseek(local_fd, req->offset, SEEK_SET) == -1 ||
1.44      deraadt   910:                            atomicio(vwrite, local_fd, data, len) != len) &&
1.21      djm       911:                            !write_error) {
                    912:                                write_errno = errno;
                    913:                                write_error = 1;
                    914:                                max_req = 0;
                    915:                        }
1.39      fgsch     916:                        progress_counter += len;
1.21      djm       917:                        xfree(data);
1.1       djm       918:
1.21      djm       919:                        if (len == req->len) {
                    920:                                TAILQ_REMOVE(&requests, req, tq);
                    921:                                xfree(req);
                    922:                                num_req--;
                    923:                        } else {
                    924:                                /* Resend the request for the missing data */
                    925:                                debug3("Short data block, re-requesting "
1.26      itojun    926:                                    "%llu -> %llu (%2d)",
1.28      markus    927:                                    (unsigned long long)req->offset + len,
1.27      itojun    928:                                    (unsigned long long)req->offset +
                    929:                                    req->len - 1, num_req);
1.23      djm       930:                                req->id = conn->msg_id++;
1.21      djm       931:                                req->len -= len;
                    932:                                req->offset += len;
1.28      markus    933:                                send_read_request(conn->fd_out, req->id,
1.23      djm       934:                                    req->offset, req->len, handle, handle_len);
1.21      djm       935:                                /* Reduce the request size */
                    936:                                if (len < buflen)
                    937:                                        buflen = MAX(MIN_READ_SIZE, len);
                    938:                        }
                    939:                        if (max_req > 0) { /* max_req = 0 iff EOF received */
                    940:                                if (size > 0 && offset > size) {
                    941:                                        /* Only one request at a time
                    942:                                         * after the expected EOF */
                    943:                                        debug3("Finish at %llu (%2d)",
1.26      itojun    944:                                            (unsigned long long)offset,
                    945:                                            num_req);
1.21      djm       946:                                        max_req = 1;
1.49      djm       947:                                } else if (max_req <= conn->num_requests) {
1.21      djm       948:                                        ++max_req;
                    949:                                }
1.1       djm       950:                        }
1.21      djm       951:                        break;
                    952:                default:
1.33      deraadt   953:                        fatal("Expected SSH2_FXP_DATA(%u) packet, got %u",
1.1       djm       954:                            SSH2_FXP_DATA, type);
                    955:                }
1.21      djm       956:        }
1.1       djm       957:
1.39      fgsch     958:        if (showprogress && size)
                    959:                stop_progress_meter();
                    960:
1.21      djm       961:        /* Sanity check */
                    962:        if (TAILQ_FIRST(&requests) != NULL)
                    963:                fatal("Transfer complete, but requests still in queue");
                    964:
                    965:        if (read_error) {
1.28      markus    966:                error("Couldn't read from remote file \"%s\" : %s",
1.21      djm       967:                    remote_path, fx2txt(status));
1.23      djm       968:                do_close(conn, handle, handle_len);
1.21      djm       969:        } else if (write_error) {
                    970:                error("Couldn't write to \"%s\": %s", local_path,
                    971:                    strerror(write_errno));
                    972:                status = -1;
1.23      djm       973:                do_close(conn, handle, handle_len);
1.21      djm       974:        } else {
1.23      djm       975:                status = do_close(conn, handle, handle_len);
1.21      djm       976:
                    977:                /* Override umask and utimes if asked */
                    978:                if (pflag && fchmod(local_fd, mode) == -1)
                    979:                        error("Couldn't set mode on \"%s\": %s", local_path,
1.37      deraadt   980:                            strerror(errno));
1.21      djm       981:                if (pflag && (a->flags & SSH2_FILEXFER_ATTR_ACMODTIME)) {
                    982:                        struct timeval tv[2];
                    983:                        tv[0].tv_sec = a->atime;
                    984:                        tv[1].tv_sec = a->mtime;
                    985:                        tv[0].tv_usec = tv[1].tv_usec = 0;
                    986:                        if (utimes(local_path, tv) == -1)
                    987:                                error("Can't set times on \"%s\": %s",
1.37      deraadt   988:                                    local_path, strerror(errno));
1.1       djm       989:                }
1.10      djm       990:        }
1.5       djm       991:        close(local_fd);
                    992:        buffer_free(&msg);
1.1       djm       993:        xfree(handle);
1.23      djm       994:
                    995:        return(status);
1.1       djm       996: }
                    997:
                    998: int
1.23      djm       999: do_upload(struct sftp_conn *conn, char *local_path, char *remote_path,
                   1000:     int pflag)
1.1       djm      1001: {
1.80      djm      1002:        int local_fd;
                   1003:        int status = SSH2_FX_OK;
1.22      djm      1004:        u_int handle_len, id, type;
1.77      djm      1005:        off_t offset;
1.20      djm      1006:        char *handle, *data;
1.1       djm      1007:        Buffer msg;
                   1008:        struct stat sb;
                   1009:        Attrib a;
1.21      djm      1010:        u_int32_t startid;
                   1011:        u_int32_t ackid;
1.22      djm      1012:        struct outstanding_ack {
                   1013:                u_int id;
                   1014:                u_int len;
1.77      djm      1015:                off_t offset;
1.28      markus   1016:                TAILQ_ENTRY(outstanding_ack) tq;
1.22      djm      1017:        };
                   1018:        TAILQ_HEAD(ackhead, outstanding_ack) acks;
1.50      pedro    1019:        struct outstanding_ack *ack = NULL;
1.22      djm      1020:
                   1021:        TAILQ_INIT(&acks);
1.1       djm      1022:
                   1023:        if ((local_fd = open(local_path, O_RDONLY, 0)) == -1) {
                   1024:                error("Couldn't open local file \"%s\" for reading: %s",
                   1025:                    local_path, strerror(errno));
                   1026:                return(-1);
                   1027:        }
                   1028:        if (fstat(local_fd, &sb) == -1) {
                   1029:                error("Couldn't fstat local file \"%s\": %s",
                   1030:                    local_path, strerror(errno));
1.41      djm      1031:                close(local_fd);
                   1032:                return(-1);
                   1033:        }
                   1034:        if (!S_ISREG(sb.st_mode)) {
                   1035:                error("%s is not a regular file", local_path);
1.1       djm      1036:                close(local_fd);
                   1037:                return(-1);
                   1038:        }
                   1039:        stat_to_attrib(&sb, &a);
                   1040:
                   1041:        a.flags &= ~SSH2_FILEXFER_ATTR_SIZE;
                   1042:        a.flags &= ~SSH2_FILEXFER_ATTR_UIDGID;
                   1043:        a.perm &= 0777;
                   1044:        if (!pflag)
                   1045:                a.flags &= ~SSH2_FILEXFER_ATTR_ACMODTIME;
                   1046:
                   1047:        buffer_init(&msg);
                   1048:
                   1049:        /* Send open request */
1.23      djm      1050:        id = conn->msg_id++;
1.1       djm      1051:        buffer_put_char(&msg, SSH2_FXP_OPEN);
                   1052:        buffer_put_int(&msg, id);
                   1053:        buffer_put_cstring(&msg, remote_path);
                   1054:        buffer_put_int(&msg, SSH2_FXF_WRITE|SSH2_FXF_CREAT|SSH2_FXF_TRUNC);
                   1055:        encode_attrib(&msg, &a);
1.23      djm      1056:        send_msg(conn->fd_out, &msg);
1.33      deraadt  1057:        debug3("Sent message SSH2_FXP_OPEN I:%u P:%s", id, remote_path);
1.1       djm      1058:
                   1059:        buffer_clear(&msg);
                   1060:
1.23      djm      1061:        handle = get_handle(conn->fd_in, id, &handle_len);
1.1       djm      1062:        if (handle == NULL) {
                   1063:                close(local_fd);
                   1064:                buffer_free(&msg);
1.80      djm      1065:                return -1;
1.1       djm      1066:        }
                   1067:
1.21      djm      1068:        startid = ackid = id + 1;
1.23      djm      1069:        data = xmalloc(conn->transfer_buflen);
1.20      djm      1070:
1.1       djm      1071:        /* Read from local and write to remote */
                   1072:        offset = 0;
1.39      fgsch    1073:        if (showprogress)
                   1074:                start_progress_meter(local_path, sb.st_size, &offset);
                   1075:
1.19      deraadt  1076:        for (;;) {
1.1       djm      1077:                int len;
                   1078:
                   1079:                /*
1.51      deraadt  1080:                 * Can't use atomicio here because it returns 0 on EOF,
1.49      djm      1081:                 * thus losing the last block of the file.
1.51      deraadt  1082:                 * Simulate an EOF on interrupt, allowing ACKs from the
1.49      djm      1083:                 * server to drain.
1.1       djm      1084:                 */
1.80      djm      1085:                if (interrupted || status != SSH2_FX_OK)
1.49      djm      1086:                        len = 0;
                   1087:                else do
1.23      djm      1088:                        len = read(local_fd, data, conn->transfer_buflen);
1.1       djm      1089:                while ((len == -1) && (errno == EINTR || errno == EAGAIN));
                   1090:
                   1091:                if (len == -1)
                   1092:                        fatal("Couldn't read from \"%s\": %s", local_path,
                   1093:                            strerror(errno));
1.21      djm      1094:
                   1095:                if (len != 0) {
1.22      djm      1096:                        ack = xmalloc(sizeof(*ack));
                   1097:                        ack->id = ++id;
                   1098:                        ack->offset = offset;
                   1099:                        ack->len = len;
                   1100:                        TAILQ_INSERT_TAIL(&acks, ack, tq);
                   1101:
1.21      djm      1102:                        buffer_clear(&msg);
                   1103:                        buffer_put_char(&msg, SSH2_FXP_WRITE);
1.22      djm      1104:                        buffer_put_int(&msg, ack->id);
1.21      djm      1105:                        buffer_put_string(&msg, handle, handle_len);
                   1106:                        buffer_put_int64(&msg, offset);
                   1107:                        buffer_put_string(&msg, data, len);
1.23      djm      1108:                        send_msg(conn->fd_out, &msg);
1.33      deraadt  1109:                        debug3("Sent message SSH2_FXP_WRITE I:%u O:%llu S:%u",
1.37      deraadt  1110:                            id, (unsigned long long)offset, len);
1.22      djm      1111:                } else if (TAILQ_FIRST(&acks) == NULL)
1.1       djm      1112:                        break;
                   1113:
1.22      djm      1114:                if (ack == NULL)
                   1115:                        fatal("Unexpected ACK %u", id);
                   1116:
1.28      markus   1117:                if (id == startid || len == 0 ||
1.23      djm      1118:                    id - ackid >= conn->num_requests) {
1.32      markus   1119:                        u_int r_id;
1.31      djm      1120:
1.22      djm      1121:                        buffer_clear(&msg);
1.23      djm      1122:                        get_msg(conn->fd_in, &msg);
1.22      djm      1123:                        type = buffer_get_char(&msg);
1.31      djm      1124:                        r_id = buffer_get_int(&msg);
1.22      djm      1125:
                   1126:                        if (type != SSH2_FXP_STATUS)
                   1127:                                fatal("Expected SSH2_FXP_STATUS(%d) packet, "
                   1128:                                    "got %d", SSH2_FXP_STATUS, type);
                   1129:
                   1130:                        status = buffer_get_int(&msg);
                   1131:                        debug3("SSH2_FXP_STATUS %d", status);
                   1132:
                   1133:                        /* Find the request in our queue */
1.53      deraadt  1134:                        for (ack = TAILQ_FIRST(&acks);
1.31      djm      1135:                            ack != NULL && ack->id != r_id;
1.22      djm      1136:                            ack = TAILQ_NEXT(ack, tq))
                   1137:                                ;
                   1138:                        if (ack == NULL)
1.33      deraadt  1139:                                fatal("Can't find request for ID %u", r_id);
1.22      djm      1140:                        TAILQ_REMOVE(&acks, ack, tq);
1.77      djm      1141:                        debug3("In write loop, ack for %u %u bytes at %lld",
                   1142:                            ack->id, ack->len, (long long)ack->offset);
1.21      djm      1143:                        ++ackid;
1.34      deraadt  1144:                        xfree(ack);
1.1       djm      1145:                }
                   1146:                offset += len;
1.77      djm      1147:                if (offset < 0)
                   1148:                        fatal("%s: offset < 0", __func__);
1.1       djm      1149:        }
1.80      djm      1150:        buffer_free(&msg);
                   1151:
1.39      fgsch    1152:        if (showprogress)
                   1153:                stop_progress_meter();
1.20      djm      1154:        xfree(data);
1.1       djm      1155:
1.80      djm      1156:        if (status != SSH2_FX_OK) {
                   1157:                error("Couldn't write to remote file \"%s\": %s",
                   1158:                    remote_path, fx2txt(status));
                   1159:                status = -1;
                   1160:        }
                   1161:
1.1       djm      1162:        if (close(local_fd) == -1) {
                   1163:                error("Couldn't close local file \"%s\": %s", local_path,
                   1164:                    strerror(errno));
1.5       djm      1165:                status = -1;
1.1       djm      1166:        }
                   1167:
1.10      djm      1168:        /* Override umask and utimes if asked */
                   1169:        if (pflag)
1.23      djm      1170:                do_fsetstat(conn, handle, handle_len, &a);
1.10      djm      1171:
1.80      djm      1172:        if (do_close(conn, handle, handle_len) != SSH2_FX_OK)
                   1173:                status = -1;
                   1174:        xfree(handle);
1.5       djm      1175:
1.80      djm      1176:        return status;
1.1       djm      1177: }