Annotation of src/usr.bin/ssh/sftp.c, Revision 1.6
1.1 djm 1: /*
2: * Copyright (c) 2001 Damien Miller. All rights reserved.
3: *
4: * Redistribution and use in source and binary forms, with or without
5: * modification, are permitted provided that the following conditions
6: * are met:
7: * 1. Redistributions of source code must retain the above copyright
8: * notice, this list of conditions and the following disclaimer.
9: * 2. Redistributions in binary form must reproduce the above copyright
10: * notice, this list of conditions and the following disclaimer in the
11: * documentation and/or other materials provided with the distribution.
12: *
13: * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
14: * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
15: * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
16: * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
17: * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
18: * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
19: * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
20: * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
21: * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
22: * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
23: */
24:
25: #include "includes.h"
26:
1.6 ! djm 27: RCSID("$OpenBSD: sftp.c,v 1.5 2001/02/06 23:53:54 djm Exp $");
1.1 djm 28:
29: /* XXX: commandline mode */
30: /* XXX: copy between two remote hosts (commandline) */
31: /* XXX: short-form remote directory listings (like 'ls -C') */
32:
33: #include "buffer.h"
34: #include "xmalloc.h"
35: #include "log.h"
36: #include "pathnames.h"
37:
38: #include "sftp.h"
39: #include "sftp-common.h"
40: #include "sftp-client.h"
41: #include "sftp-int.h"
42:
43: void
44: connect_to_server(char **args, int *in, int *out, pid_t *sshpid)
45: {
46: int c_in, c_out;
47: #ifdef USE_PIPES
48: int pin[2], pout[2];
49: if ((pipe(pin) == -1) || (pipe(pout) == -1))
50: fatal("pipe: %s", strerror(errno));
51: *in = pin[0];
52: *out = pout[1];
53: c_in = pout[0];
54: c_out = pin[1];
55: #else /* USE_PIPES */
56: int inout[2];
57: if (socketpair(AF_UNIX, SOCK_STREAM, 0, inout) == -1)
58: fatal("socketpair: %s", strerror(errno));
59: *in = *out = inout[0];
60: c_in = c_out = inout[1];
61: #endif /* USE_PIPES */
62:
63: if ((*sshpid = fork()) == -1)
64: fatal("fork: %s", strerror(errno));
65: else if (*sshpid == 0) {
66: if ((dup2(c_in, STDIN_FILENO) == -1) ||
67: (dup2(c_out, STDOUT_FILENO) == -1)) {
68: fprintf(stderr, "dup2: %s\n", strerror(errno));
69: exit(1);
70: }
71: close(*in);
72: close(*out);
73: close(c_in);
74: close(c_out);
75: execv(_PATH_SSH_PROGRAM, args);
76: fprintf(stderr, "exec: %s", strerror(errno));
77: exit(1);
78: }
79:
80: close(c_in);
81: close(c_out);
82: }
83:
84: char **
85: make_ssh_args(char *add_arg)
86: {
87: static char **args = NULL;
88: static int nargs = 0;
89: char debug_buf[4096];
90: int i;
91:
92: /* Init args array */
93: if (args == NULL) {
1.6 ! djm 94: nargs = 6;
1.1 djm 95: i = 0;
96: args = xmalloc(sizeof(*args) * nargs);
97: args[i++] = "ssh";
98: args[i++] = "-oProtocol=2";
1.6 ! djm 99: args[i++] = "-oForwardAgent=no";
! 100: args[i++] = "-oForwardX11=no";
1.1 djm 101: args[i++] = "-s";
102: args[i++] = NULL;
103: }
104:
105: /* If asked to add args, then do so and return */
106: if (add_arg) {
107: i = nargs++ - 1;
108: args = xrealloc(args, sizeof(*args) * nargs);
109: args[i++] = add_arg;
110: args[i++] = NULL;
111: return(NULL);
112: }
113:
114: /* Otherwise finish up and return the arg array */
115: make_ssh_args("sftp");
116:
117: /* XXX: overflow - doesn't grow debug_buf */
118: debug_buf[0] = '\0';
119: for(i = 0; args[i]; i++) {
120: if (i)
121: strlcat(debug_buf, " ", sizeof(debug_buf));
122:
123: strlcat(debug_buf, args[i], sizeof(debug_buf));
124: }
125: debug("SSH args \"%s\"", debug_buf);
126:
127: return(args);
128: }
129:
1.2 stevesk 130: void
1.1 djm 131: usage(void)
132: {
133: fprintf(stderr, "usage: sftp [-vC] [-osshopt=value] [user@]host\n");
134: exit(1);
135: }
136:
1.2 stevesk 137: int
1.1 djm 138: main(int argc, char **argv)
139: {
1.3 djm 140: int in, out, ch, debug_level, compress_flag;
1.1 djm 141: pid_t sshpid;
1.3 djm 142: char *host, *userhost;
1.1 djm 143: LogLevel ll;
1.3 djm 144: extern int optind;
145: extern char *optarg;
1.1 djm 146:
147: debug_level = compress_flag = 0;
1.3 djm 148:
149: while ((ch = getopt(argc, argv, "hCvo:")) != -1) {
150: switch (ch) {
151: case 'C':
152: compress_flag = 1;
153: break;
154: case 'v':
1.1 djm 155: debug_level = MIN(3, debug_level + 1);
1.3 djm 156: break;
157: case 'o':
1.5 djm 158: make_ssh_args("-o");
1.3 djm 159: make_ssh_args(optarg);
160: break;
161: case 'h':
162: default:
1.1 djm 163: usage();
164: }
165: }
166:
1.3 djm 167: if (optind == argc || argc > (optind + 1))
1.1 djm 168: usage();
169:
1.3 djm 170: userhost = argv[optind];
171:
172: if ((host = strchr(userhost, '@')) == NULL)
173: host = userhost;
1.1 djm 174: else {
1.3 djm 175: *host = '\0';
176: if (!userhost[0]) {
1.1 djm 177: fprintf(stderr, "Missing username\n");
178: usage();
179: }
180: make_ssh_args("-l");
1.3 djm 181: make_ssh_args(userhost);
182: host++;
1.1 djm 183: }
184:
1.3 djm 185: if (!*host) {
1.1 djm 186: fprintf(stderr, "Missing hostname\n");
187: usage();
188: }
189:
190: /* Set up logging and debug '-d' arguments to ssh */
191: ll = SYSLOG_LEVEL_INFO;
192: switch (debug_level) {
193: case 1:
194: ll = SYSLOG_LEVEL_DEBUG1;
195: make_ssh_args("-v");
196: break;
197: case 2:
198: ll = SYSLOG_LEVEL_DEBUG2;
199: make_ssh_args("-v");
200: make_ssh_args("-v");
201: break;
202: case 3:
203: ll = SYSLOG_LEVEL_DEBUG3;
204: make_ssh_args("-v");
205: make_ssh_args("-v");
206: make_ssh_args("-v");
207: break;
208: }
209:
210: if (compress_flag)
211: make_ssh_args("-C");
212:
213: log_init(argv[0], ll, SYSLOG_FACILITY_USER, 1);
214:
1.3 djm 215: make_ssh_args(host);
1.1 djm 216:
1.3 djm 217: fprintf(stderr, "Connecting to %s...\n", host);
1.1 djm 218:
219: connect_to_server(make_ssh_args(NULL), &in, &out, &sshpid);
220:
221: do_init(in, out);
222:
223: interactive_loop(in, out);
224:
225: close(in);
226: close(out);
227:
228: if (kill(sshpid, SIGHUP) == -1)
229: fatal("Couldn't terminate ssh process: %s", strerror(errno));
230:
1.4 djm 231: if (waitpid(sshpid, NULL, 0) == -1)
232: fatal("Couldn't wait for ssh process: %s", strerror(errno));
1.1 djm 233:
234: exit(0);
235: }