Annotation of src/usr.bin/ssh/sftp.c, Revision 1.38
1.1 djm 1: /*
1.23 djm 2: * Copyright (c) 2001,2002 Damien Miller. All rights reserved.
1.1 djm 3: *
4: * Redistribution and use in source and binary forms, with or without
5: * modification, are permitted provided that the following conditions
6: * are met:
7: * 1. Redistributions of source code must retain the above copyright
8: * notice, this list of conditions and the following disclaimer.
9: * 2. Redistributions in binary form must reproduce the above copyright
10: * notice, this list of conditions and the following disclaimer in the
11: * documentation and/or other materials provided with the distribution.
12: *
13: * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
14: * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
15: * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
16: * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
17: * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
18: * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
19: * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
20: * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
21: * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
22: * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
23: */
24:
25: #include "includes.h"
26:
1.38 ! jmc 27: RCSID("$OpenBSD: sftp.c,v 1.37 2003/07/10 20:05:55 markus Exp $");
1.1 djm 28:
29: #include "buffer.h"
30: #include "xmalloc.h"
31: #include "log.h"
32: #include "pathnames.h"
1.16 mouring 33: #include "misc.h"
1.1 djm 34:
35: #include "sftp.h"
36: #include "sftp-common.h"
37: #include "sftp-client.h"
38: #include "sftp-int.h"
1.15 mouring 39:
1.10 deraadt 40: FILE* infile;
1.24 djm 41: size_t copy_buffer_len = 32768;
1.26 djm 42: size_t num_requests = 16;
1.36 djm 43: static pid_t sshpid = -1;
1.7 markus 44:
1.34 fgsch 45: extern int showprogress;
46:
1.18 itojun 47: static void
1.36 djm 48: killchild(int signo)
49: {
50: if (sshpid > 1)
51: kill(sshpid, signo);
52:
53: _exit(1);
54: }
55:
56: static void
57: connect_to_server(char *path, char **args, int *in, int *out)
1.1 djm 58: {
59: int c_in, c_out;
1.30 deraadt 60:
1.1 djm 61: #ifdef USE_PIPES
62: int pin[2], pout[2];
1.30 deraadt 63:
1.1 djm 64: if ((pipe(pin) == -1) || (pipe(pout) == -1))
65: fatal("pipe: %s", strerror(errno));
66: *in = pin[0];
67: *out = pout[1];
68: c_in = pout[0];
69: c_out = pin[1];
70: #else /* USE_PIPES */
71: int inout[2];
1.30 deraadt 72:
1.1 djm 73: if (socketpair(AF_UNIX, SOCK_STREAM, 0, inout) == -1)
74: fatal("socketpair: %s", strerror(errno));
75: *in = *out = inout[0];
76: c_in = c_out = inout[1];
77: #endif /* USE_PIPES */
78:
1.36 djm 79: if ((sshpid = fork()) == -1)
1.1 djm 80: fatal("fork: %s", strerror(errno));
1.36 djm 81: else if (sshpid == 0) {
1.1 djm 82: if ((dup2(c_in, STDIN_FILENO) == -1) ||
83: (dup2(c_out, STDOUT_FILENO) == -1)) {
84: fprintf(stderr, "dup2: %s\n", strerror(errno));
85: exit(1);
86: }
87: close(*in);
88: close(*out);
89: close(c_in);
90: close(c_out);
1.23 djm 91: execv(path, args);
92: fprintf(stderr, "exec: %s: %s\n", path, strerror(errno));
1.1 djm 93: exit(1);
94: }
95:
1.36 djm 96: signal(SIGTERM, killchild);
97: signal(SIGINT, killchild);
98: signal(SIGHUP, killchild);
1.1 djm 99: close(c_in);
100: close(c_out);
101: }
102:
1.18 itojun 103: static void
1.1 djm 104: usage(void)
105: {
1.25 mpech 106: extern char *__progname;
1.27 markus 107:
1.19 stevesk 108: fprintf(stderr,
1.38 ! jmc 109: "usage: %s [-1Cv] [-B buffer_size] [-b batchfile] [-F ssh_config]\n"
! 110: " [-o ssh_option] [-P sftp_server_path] [-R num_requests]\n"
! 111: " [-S program] [-s subsystem | sftp_server] host\n"
! 112: " %s [[user@]host[:file [file]]]\n"
! 113: " %s [[user@]host[:dir[/]]]\n"
! 114: " %s -b batchfile [user@]host\n", __progname, __progname, __progname, __progname);
1.1 djm 115: exit(1);
116: }
117:
1.2 stevesk 118: int
1.1 djm 119: main(int argc, char **argv)
120: {
1.33 djm 121: int in, out, ch, err;
1.14 mouring 122: char *host, *userhost, *cp, *file2;
1.17 mouring 123: int debug_level = 0, sshver = 2;
124: char *file1 = NULL, *sftp_server = NULL;
1.23 djm 125: char *ssh_program = _PATH_SSH_PROGRAM, *sftp_direct = NULL;
1.17 mouring 126: LogLevel ll = SYSLOG_LEVEL_INFO;
127: arglist args;
1.3 djm 128: extern int optind;
129: extern char *optarg;
1.1 djm 130:
1.17 mouring 131: args.list = NULL;
1.22 deraadt 132: addargs(&args, "ssh"); /* overwritten with ssh_program */
1.17 mouring 133: addargs(&args, "-oForwardX11 no");
134: addargs(&args, "-oForwardAgent no");
1.21 stevesk 135: addargs(&args, "-oClearAllForwardings yes");
1.17 mouring 136: ll = SYSLOG_LEVEL_INFO;
1.10 deraadt 137: infile = stdin; /* Read from STDIN unless changed by -b */
1.3 djm 138:
1.26 djm 139: while ((ch = getopt(argc, argv, "1hvCo:s:S:b:B:F:P:R:")) != -1) {
1.3 djm 140: switch (ch) {
141: case 'C':
1.17 mouring 142: addargs(&args, "-C");
1.3 djm 143: break;
144: case 'v':
1.17 mouring 145: if (debug_level < 3) {
146: addargs(&args, "-v");
147: ll = SYSLOG_LEVEL_DEBUG1 + debug_level;
148: }
149: debug_level++;
1.3 djm 150: break;
1.19 stevesk 151: case 'F':
1.3 djm 152: case 'o':
1.19 stevesk 153: addargs(&args, "-%c%s", ch, optarg);
1.7 markus 154: break;
155: case '1':
1.17 mouring 156: sshver = 1;
1.7 markus 157: if (sftp_server == NULL)
158: sftp_server = _PATH_SFTP_SERVER;
159: break;
160: case 's':
161: sftp_server = optarg;
162: break;
163: case 'S':
164: ssh_program = optarg;
1.3 djm 165: break;
1.10 deraadt 166: case 'b':
167: if (infile == stdin) {
168: infile = fopen(optarg, "r");
1.12 markus 169: if (infile == NULL)
1.10 deraadt 170: fatal("%s (%s).", strerror(errno), optarg);
1.12 markus 171: } else
1.10 deraadt 172: fatal("Filename already specified.");
1.34 fgsch 173: showprogress = 0;
1.10 deraadt 174: break;
1.23 djm 175: case 'P':
176: sftp_direct = optarg;
1.24 djm 177: break;
178: case 'B':
179: copy_buffer_len = strtol(optarg, &cp, 10);
180: if (copy_buffer_len == 0 || *cp != '\0')
181: fatal("Invalid buffer size \"%s\"", optarg);
1.26 djm 182: break;
183: case 'R':
184: num_requests = strtol(optarg, &cp, 10);
185: if (num_requests == 0 || *cp != '\0')
1.27 markus 186: fatal("Invalid number of requests \"%s\"",
1.26 djm 187: optarg);
1.23 djm 188: break;
1.3 djm 189: case 'h':
190: default:
1.1 djm 191: usage();
192: }
193: }
194:
1.29 markus 195: log_init(argv[0], ll, SYSLOG_FACILITY_USER, 1);
196:
1.23 djm 197: if (sftp_direct == NULL) {
198: if (optind == argc || argc > (optind + 2))
199: usage();
200:
201: userhost = xstrdup(argv[optind]);
202: file2 = argv[optind+1];
1.1 djm 203:
1.23 djm 204: if ((cp = colon(userhost)) != NULL) {
205: *cp++ = '\0';
206: file1 = cp;
207: }
1.14 mouring 208:
1.32 markus 209: if ((host = strrchr(userhost, '@')) == NULL)
1.23 djm 210: host = userhost;
211: else {
212: *host++ = '\0';
213: if (!userhost[0]) {
214: fprintf(stderr, "Missing username\n");
215: usage();
216: }
217: addargs(&args, "-l%s",userhost);
218: }
1.3 djm 219:
1.23 djm 220: host = cleanhostname(host);
221: if (!*host) {
222: fprintf(stderr, "Missing hostname\n");
1.1 djm 223: usage();
224: }
225:
1.23 djm 226: addargs(&args, "-oProtocol %d", sshver);
227:
228: /* no subsystem if the server-spec contains a '/' */
229: if (sftp_server == NULL || strchr(sftp_server, '/') == NULL)
230: addargs(&args, "-s");
231:
232: addargs(&args, "%s", host);
1.27 markus 233: addargs(&args, "%s", (sftp_server != NULL ?
1.23 djm 234: sftp_server : "sftp"));
235: args.list[0] = ssh_program;
236:
237: fprintf(stderr, "Connecting to %s...\n", host);
1.36 djm 238: connect_to_server(ssh_program, args.list, &in, &out);
1.23 djm 239: } else {
240: args.list = NULL;
241: addargs(&args, "sftp-server");
242:
243: fprintf(stderr, "Attaching to %s...\n", sftp_direct);
1.36 djm 244: connect_to_server(sftp_direct, args.list, &in, &out);
1.1 djm 245: }
246:
1.33 djm 247: err = interactive_loop(in, out, file1, file2);
1.1 djm 248:
249: close(in);
250: close(out);
1.10 deraadt 251: if (infile != stdin)
252: fclose(infile);
1.1 djm 253:
1.28 markus 254: while (waitpid(sshpid, NULL, 0) == -1)
255: if (errno != EINTR)
256: fatal("Couldn't wait for ssh process: %s",
257: strerror(errno));
1.1 djm 258:
1.33 djm 259: exit(err == 0 ? 0 : 1);
1.1 djm 260: }