-/*
- * $Source$
- * $Header$
+/* $Id$
+ *
+ * Copyright (C) 1988-1998 by the Massachusetts Institute of Technology.
+ * For copying and distribution information, please see the file
+ * <mit-copyright.h>.
*/
-/* (c) Copyright 1988 by the Massachusetts Institute of Technology. */
-/* For copying and distribution information, please see the file */
-/* <mit-copyright.h>. */
-
-#ifndef lint
-static char *rcsid_send_file_c = "$Header$";
-#endif
#include <mit-copyright.h>
-#include <stdio.h>
-#include <com_err.h>
-#include <gdb.h>
-#include <dcm.h>
#include <moira.h>
-#include <sys/file.h>
+#include "update_server.h"
+
#include <sys/stat.h>
-#include <des.h>
-#include <krb.h>
-#include <update.h>
-#ifdef POSIX
+
+#include <errno.h>
#include <fcntl.h>
+#include <stdio.h>
+#include <string.h>
+#include <unistd.h>
+
+#ifdef HAVE_KRB4
+#include <des.h>
#endif
+#include <update.h>
-extern CONNECTION conn;
-extern int errno;
-char buf[BUFSIZ];
-extern C_Block session;
+RCSID("$Header$");
+
+#ifdef HAVE_KRB4
+extern des_cblock session;
+#endif
/*
* syntax:
* 1 on error (file not found, etc)
*/
-int
-send_file(pathname, target_path, encrypt)
-char *pathname;
-char *target_path;
-int encrypt;
+int mr_send_file(int conn, char *pathname, char *target_path, int encrypt)
{
- int n, fd, code, n_to_send, i;
- STRING data;
- unsigned char dst[UPDATE_BUFSIZ + 8], *src;
- struct stat statb;
- des_key_schedule sched;
- des_cblock ivec;
+ int n, fd, code, n_to_send, i;
+ char data[UPDATE_BUFSIZ], enc[UPDATE_BUFSIZ];
+ long response;
+ struct stat statb;
+#ifdef HAVE_KRB4
+ des_key_schedule sched;
+ des_cblock ivec;
+#endif
- /* send file over */
- fd = open(pathname, O_RDONLY, 0);
- if (fd < 0) {
- com_err(whoami, errno, "unable to open %s for read", pathname);
- return(MR_OCONFIG);
+ /* send file over */
+ fd = open(pathname, O_RDONLY, 0);
+ if (fd < 0)
+ {
+ com_err(whoami, errno, "unable to open %s for read", pathname);
+ return MR_OCONFIG;
}
- if (fstat(fd, &statb)) {
- com_err(whoami, errno, "unable to stat %s", pathname);
- close(fd);
- return(MR_OCONFIG);
+ if (fstat(fd, &statb))
+ {
+ com_err(whoami, errno, "unable to stat %s", pathname);
+ close(fd);
+ return MR_OCONFIG;
}
- n_to_send = statb.st_size;
-
- string_alloc(&data, UPDATE_BUFSIZ);
- sprintf(STRING_DATA(data), "XFER_00%c %d %d %s",
- (encrypt ? '3' : '2'), n_to_send,
- checksum_file(pathname), target_path);
- code = send_object(conn, (char *)&data, STRING_T);
- if (code) {
- com_err(whoami, code, " sending XFER request");
- close(fd);
- return(code);
+ n_to_send = statb.st_size;
+
+ sprintf(data, "XFER_00%c %d %d %s", (encrypt ? '3' : '2'), n_to_send,
+ checksum_file(pathname), target_path);
+ code = send_string(conn, data, strlen(data) + 1);
+ if (code)
+ {
+ com_err(whoami, code, "sending XFER request");
+ close(fd);
+ return code;
}
- code = receive_object(conn, (char *)&n, INTEGER_T);
- if (code) {
- com_err(whoami, code, " getting reply from XFER request");
- close(fd);
- return(code);
+ code = recv_int(conn, &response);
+ if (code)
+ {
+ com_err(whoami, code, "getting reply from XFER request");
+ close(fd);
+ return code;
}
- if (n) {
- com_err(whoami, n, " transfer request (XFER) rejected");
- close(fd);
- return(n);
+ if (response)
+ {
+ com_err(whoami, response, "transfer request (XFER) rejected");
+ close(fd);
+ return response;
}
-
- code = receive_object(conn, (char *)&n, INTEGER_T);
- if (code) {
- com_err(whoami, connection_errno(conn), ": lost connection");
- close(fd);
- return(code);
+
+ code = recv_int(conn, &response);
+ if (code)
+ {
+ com_err(whoami, code, ": lost connection");
+ close(fd);
+ return code;
}
- if (n) {
- com_err(whoami, n, " from remote server: can't update %s",
- pathname);
- close(fd);
- return(n);
+ if (response)
+ {
+ com_err(whoami, response, " from remote server: can't update %s",
+ pathname);
+ close(fd);
+ return response;
}
- if (encrypt) {
-#ifdef DEBUG
- printf("Session key %02x %02x %02x %02x %02x %02x %02x %02x\n",
- session[0], session[1], session[2], session[3],
- session[4], session[5], session[6], session[7]);
-#endif /* DEBUG */
- des_key_sched(session, sched);
-#ifdef POSIX
- memmove(ivec, session, sizeof(ivec));
+ if (encrypt)
+ {
+#ifdef HAVE_KRB4
+ des_key_sched(session, sched);
+ memmove(ivec, session, sizeof(ivec));
#else
- bcopy(session, ivec, sizeof(ivec));
+ /* The session key only gets stored if auth happens in krb4 to
+ begin with. If you don't have krb4, you can't possibly be
+ coming up with a valid session key. */
+ return MR_NO_KRB4;
#endif
}
- while (n_to_send > 0) {
-#ifdef DEBUG
- printf("n_to_send = %d\n", n_to_send);
-#endif /* DEBUG */
- n = read(fd, STRING_DATA(data), UPDATE_BUFSIZ);
- if (n < 0) {
- com_err(whoami, errno, " reading %s for transmission", pathname);
- close(fd);
- return(MR_ABORTED);
+ while (n_to_send > 0)
+ {
+ n = read(fd, data, sizeof(data));
+ if (n < 0)
+ {
+ com_err(whoami, errno, "reading %s for transmission", pathname);
+ close(fd);
+ return MR_ABORTED;
}
- MAX_STRING_SIZE(data) = n;
- if (encrypt) {
- src = (unsigned char *)STRING_DATA(data);
-#ifdef POSIX
- memmove(dst, src, n);
-#else
- bcopy(src, dst, n);
+ if (encrypt)
+ {
+#ifdef HAVE_KRB4
+ memset(data + n, 0, sizeof(data) -n);
+ des_pcbc_encrypt(data, enc, (n + 7) & ~7, sched, ivec, 0);
+ /* save vector to continue chaining */
+ for (i = 0; i < 8; i++)
+ ivec[i] = data[n - 8 + i] ^ enc[n - 8 + i];
+ /* round up to multiple of 8 */
+ n = (n + 7) & ~7;
+ code = send_string(conn, enc, n);
#endif
- memset(dst + n, 0, 7);
- /* encrypt! */
- des_pcbc_encrypt(dst, src, n, sched, ivec, 0);
- /* save vector to continue chaining */
- for (i = 0; i < 8; i++)
- ivec[i] = dst[n - 8 + i] ^ src[n - 8 + i];
- /* round up to multiple of 8 */
- data.length = (data.length + 7) & 0xfffffff8;
}
- code = send_object(conn, (char *)&data, STRING_T);
- if (code) {
- com_err(whoami, connection_errno(conn), " transmitting file %s",
- pathname);
- close(fd);
- return(code);
+ else
+ code = send_string(conn, data, n);
+ if (code)
+ {
+ com_err(whoami, code, "transmitting file %s", pathname);
+ close(fd);
+ return code;
}
- n_to_send -= n;
- code = receive_object(conn, (char *)&n, INTEGER_T);
- if (code) {
- com_err(whoami, connection_errno(conn),
- " awaiting ACK remote server during transmission of %s",
- pathname);
- close(fd);
- return(code);
+
+ n_to_send -= n;
+ code = recv_int(conn, &response);
+ if (code)
+ {
+ com_err(whoami, code, "awaiting ACK during transmission of %s",
+ pathname);
+ close(fd);
+ return code;
}
- if (n) {
- com_err(whoami, n, " from remote server during transmission of %s",
- pathname);
- close(fd);
- return(n);
+ if (response)
+ {
+ com_err(whoami, response,
+ "from remote server during transmission of %s",
+ pathname);
+ close(fd);
+ return response;
}
}
- if (statb.st_size == 0) {
- code = receive_object(conn, (char *)&n, INTEGER_T);
- if (code) {
- com_err(whoami, connection_errno(conn),
- " awaiting ACK remote server after transmission of %s",
- pathname);
- close(fd);
- return(code);
+
+ if (statb.st_size == 0)
+ {
+ code = recv_int(conn, &response);
+ if (code)
+ {
+ com_err(whoami, code, "awaiting ACK after transmission of %s",
+ pathname);
+ close(fd);
+ return code;
}
- if (n) {
- com_err(whoami, n, " from remote server after transmission of %s",
- pathname);
- close(fd);
- return(n);
+ if (response)
+ {
+ com_err(whoami, response,
+ "from remote server after transmission of %s",
+ pathname);
+ close(fd);
+ return response;
}
}
- close(fd);
- return(MR_SUCCESS);
+ close(fd);
+ return MR_SUCCESS;
}