]> andersk Git - openssh.git/blame_incremental - scp.c
- jmc@cvs.openbsd.org 2006/07/10 16:04:21
[openssh.git] / scp.c
... / ...
CommitLineData
1/* $OpenBSD: scp.c,v 1.145 2006/07/10 12:03:20 djm Exp $ */
2/*
3 * scp - secure remote copy. This is basically patched BSD rcp which
4 * uses ssh to do the data transfer (instead of using rcmd).
5 *
6 * NOTE: This version should NOT be suid root. (This uses ssh to
7 * do the transfer and ssh has the necessary privileges.)
8 *
9 * 1995 Timo Rinne <tri@iki.fi>, Tatu Ylonen <ylo@cs.hut.fi>
10 *
11 * As far as I am concerned, the code I have written for this software
12 * can be used freely for any purpose. Any derived versions of this
13 * software must be clearly marked as such, and if the derived work is
14 * incompatible with the protocol description in the RFC file, it must be
15 * called by a name other than "ssh" or "Secure Shell".
16 */
17/*
18 * Copyright (c) 1999 Theo de Raadt. All rights reserved.
19 * Copyright (c) 1999 Aaron Campbell. All rights reserved.
20 *
21 * Redistribution and use in source and binary forms, with or without
22 * modification, are permitted provided that the following conditions
23 * are met:
24 * 1. Redistributions of source code must retain the above copyright
25 * notice, this list of conditions and the following disclaimer.
26 * 2. Redistributions in binary form must reproduce the above copyright
27 * notice, this list of conditions and the following disclaimer in the
28 * documentation and/or other materials provided with the distribution.
29 *
30 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
31 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
32 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
33 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
34 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
35 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
36 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
37 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
38 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
39 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
40 */
41
42/*
43 * Parts from:
44 *
45 * Copyright (c) 1983, 1990, 1992, 1993, 1995
46 * The Regents of the University of California. All rights reserved.
47 *
48 * Redistribution and use in source and binary forms, with or without
49 * modification, are permitted provided that the following conditions
50 * are met:
51 * 1. Redistributions of source code must retain the above copyright
52 * notice, this list of conditions and the following disclaimer.
53 * 2. Redistributions in binary form must reproduce the above copyright
54 * notice, this list of conditions and the following disclaimer in the
55 * documentation and/or other materials provided with the distribution.
56 * 3. Neither the name of the University nor the names of its contributors
57 * may be used to endorse or promote products derived from this software
58 * without specific prior written permission.
59 *
60 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
61 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
62 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
63 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
64 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
65 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
66 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
67 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
68 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
69 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
70 * SUCH DAMAGE.
71 *
72 */
73
74#include "includes.h"
75
76#include <sys/types.h>
77#ifdef HAVE_SYS_STAT_H
78# include <sys/stat.h>
79#endif
80#include <sys/wait.h>
81
82#include <ctype.h>
83#include <dirent.h>
84#include <fcntl.h>
85#include <pwd.h>
86#include <signal.h>
87
88#include "xmalloc.h"
89#include "atomicio.h"
90#include "pathnames.h"
91#include "log.h"
92#include "misc.h"
93#include "progressmeter.h"
94
95extern char *__progname;
96
97int do_cmd(char *host, char *remuser, char *cmd, int *fdin, int *fdout);
98
99void bwlimit(int);
100
101/* Struct for addargs */
102arglist args;
103
104/* Bandwidth limit */
105off_t limit_rate = 0;
106
107/* Name of current file being transferred. */
108char *curfile;
109
110/* This is set to non-zero to enable verbose mode. */
111int verbose_mode = 0;
112
113/* This is set to zero if the progressmeter is not desired. */
114int showprogress = 1;
115
116/* This is the program to execute for the secured connection. ("ssh" or -S) */
117char *ssh_program = _PATH_SSH_PROGRAM;
118
119/* This is used to store the pid of ssh_program */
120pid_t do_cmd_pid = -1;
121
122static void
123killchild(int signo)
124{
125 if (do_cmd_pid > 1) {
126 kill(do_cmd_pid, signo ? signo : SIGTERM);
127 waitpid(do_cmd_pid, NULL, 0);
128 }
129
130 if (signo)
131 _exit(1);
132 exit(1);
133}
134
135static int
136do_local_cmd(arglist *a)
137{
138 u_int i;
139 int status;
140 pid_t pid;
141
142 if (a->num == 0)
143 fatal("do_local_cmd: no arguments");
144
145 if (verbose_mode) {
146 fprintf(stderr, "Executing:");
147 for (i = 0; i < a->num; i++)
148 fprintf(stderr, " %s", a->list[i]);
149 fprintf(stderr, "\n");
150 }
151 if ((pid = fork()) == -1)
152 fatal("do_local_cmd: fork: %s", strerror(errno));
153
154 if (pid == 0) {
155 execvp(a->list[0], a->list);
156 perror(a->list[0]);
157 exit(1);
158 }
159
160 do_cmd_pid = pid;
161 signal(SIGTERM, killchild);
162 signal(SIGINT, killchild);
163 signal(SIGHUP, killchild);
164
165 while (waitpid(pid, &status, 0) == -1)
166 if (errno != EINTR)
167 fatal("do_local_cmd: waitpid: %s", strerror(errno));
168
169 do_cmd_pid = -1;
170
171 if (!WIFEXITED(status) || WEXITSTATUS(status) != 0)
172 return (-1);
173
174 return (0);
175}
176
177/*
178 * This function executes the given command as the specified user on the
179 * given host. This returns < 0 if execution fails, and >= 0 otherwise. This
180 * assigns the input and output file descriptors on success.
181 */
182
183int
184do_cmd(char *host, char *remuser, char *cmd, int *fdin, int *fdout)
185{
186 int pin[2], pout[2], reserved[2];
187
188 if (verbose_mode)
189 fprintf(stderr,
190 "Executing: program %s host %s, user %s, command %s\n",
191 ssh_program, host,
192 remuser ? remuser : "(unspecified)", cmd);
193
194 /*
195 * Reserve two descriptors so that the real pipes won't get
196 * descriptors 0 and 1 because that will screw up dup2 below.
197 */
198 if (pipe(reserved) < 0)
199 fatal("pipe: %s", strerror(errno));
200
201 /* Create a socket pair for communicating with ssh. */
202 if (pipe(pin) < 0)
203 fatal("pipe: %s", strerror(errno));
204 if (pipe(pout) < 0)
205 fatal("pipe: %s", strerror(errno));
206
207 /* Free the reserved descriptors. */
208 close(reserved[0]);
209 close(reserved[1]);
210
211 /* Fork a child to execute the command on the remote host using ssh. */
212 do_cmd_pid = fork();
213 if (do_cmd_pid == 0) {
214 /* Child. */
215 close(pin[1]);
216 close(pout[0]);
217 dup2(pin[0], 0);
218 dup2(pout[1], 1);
219 close(pin[0]);
220 close(pout[1]);
221
222 replacearg(&args, 0, "%s", ssh_program);
223 if (remuser != NULL)
224 addargs(&args, "-l%s", remuser);
225 addargs(&args, "%s", host);
226 addargs(&args, "%s", cmd);
227
228 execvp(ssh_program, args.list);
229 perror(ssh_program);
230 exit(1);
231 } else if (do_cmd_pid == -1) {
232 fatal("fork: %s", strerror(errno));
233 }
234 /* Parent. Close the other side, and return the local side. */
235 close(pin[0]);
236 *fdout = pin[1];
237 close(pout[1]);
238 *fdin = pout[0];
239 signal(SIGTERM, killchild);
240 signal(SIGINT, killchild);
241 signal(SIGHUP, killchild);
242 return 0;
243}
244
245typedef struct {
246 size_t cnt;
247 char *buf;
248} BUF;
249
250BUF *allocbuf(BUF *, int, int);
251void lostconn(int);
252int okname(char *);
253void run_err(const char *,...);
254void verifydir(char *);
255
256struct passwd *pwd;
257uid_t userid;
258int errs, remin, remout;
259int pflag, iamremote, iamrecursive, targetshouldbedirectory;
260
261#define CMDNEEDS 64
262char cmd[CMDNEEDS]; /* must hold "rcp -r -p -d\0" */
263
264int response(void);
265void rsource(char *, struct stat *);
266void sink(int, char *[]);
267void source(int, char *[]);
268void tolocal(int, char *[]);
269void toremote(char *, int, char *[]);
270void usage(void);
271
272int
273main(int argc, char **argv)
274{
275 int ch, fflag, tflag, status, n;
276 double speed;
277 char *targ, *endp, **newargv;
278 extern char *optarg;
279 extern int optind;
280
281 /* Ensure that fds 0, 1 and 2 are open or directed to /dev/null */
282 sanitise_stdfd();
283
284 /* Copy argv, because we modify it */
285 newargv = xcalloc(MAX(argc + 1, 1), sizeof(*newargv));
286 for (n = 0; n < argc; n++)
287 newargv[n] = xstrdup(argv[n]);
288 argv = newargv;
289
290 __progname = ssh_get_progname(argv[0]);
291
292 memset(&args, '\0', sizeof(args));
293 args.list = NULL;
294 addargs(&args, "%s", ssh_program);
295 addargs(&args, "-x");
296 addargs(&args, "-oForwardAgent no");
297 addargs(&args, "-oPermitLocalCommand no");
298 addargs(&args, "-oClearAllForwardings yes");
299
300 fflag = tflag = 0;
301 while ((ch = getopt(argc, argv, "dfl:prtvBCc:i:P:q1246S:o:F:")) != -1)
302 switch (ch) {
303 /* User-visible flags. */
304 case '1':
305 case '2':
306 case '4':
307 case '6':
308 case 'C':
309 addargs(&args, "-%c", ch);
310 break;
311 case 'o':
312 case 'c':
313 case 'i':
314 case 'F':
315 addargs(&args, "-%c%s", ch, optarg);
316 break;
317 case 'P':
318 addargs(&args, "-p%s", optarg);
319 break;
320 case 'B':
321 addargs(&args, "-oBatchmode yes");
322 break;
323 case 'l':
324 speed = strtod(optarg, &endp);
325 if (speed <= 0 || *endp != '\0')
326 usage();
327 limit_rate = speed * 1024;
328 break;
329 case 'p':
330 pflag = 1;
331 break;
332 case 'r':
333 iamrecursive = 1;
334 break;
335 case 'S':
336 ssh_program = xstrdup(optarg);
337 break;
338 case 'v':
339 addargs(&args, "-v");
340 verbose_mode = 1;
341 break;
342 case 'q':
343 addargs(&args, "-q");
344 showprogress = 0;
345 break;
346
347 /* Server options. */
348 case 'd':
349 targetshouldbedirectory = 1;
350 break;
351 case 'f': /* "from" */
352 iamremote = 1;
353 fflag = 1;
354 break;
355 case 't': /* "to" */
356 iamremote = 1;
357 tflag = 1;
358#ifdef HAVE_CYGWIN
359 setmode(0, O_BINARY);
360#endif
361 break;
362 default:
363 usage();
364 }
365 argc -= optind;
366 argv += optind;
367
368 if ((pwd = getpwuid(userid = getuid())) == NULL)
369 fatal("unknown user %u", (u_int) userid);
370
371 if (!isatty(STDERR_FILENO))
372 showprogress = 0;
373
374 remin = STDIN_FILENO;
375 remout = STDOUT_FILENO;
376
377 if (fflag) {
378 /* Follow "protocol", send data. */
379 (void) response();
380 source(argc, argv);
381 exit(errs != 0);
382 }
383 if (tflag) {
384 /* Receive data. */
385 sink(argc, argv);
386 exit(errs != 0);
387 }
388 if (argc < 2)
389 usage();
390 if (argc > 2)
391 targetshouldbedirectory = 1;
392
393 remin = remout = -1;
394 do_cmd_pid = -1;
395 /* Command to be executed on remote system using "ssh". */
396 (void) snprintf(cmd, sizeof cmd, "scp%s%s%s%s",
397 verbose_mode ? " -v" : "",
398 iamrecursive ? " -r" : "", pflag ? " -p" : "",
399 targetshouldbedirectory ? " -d" : "");
400
401 (void) signal(SIGPIPE, lostconn);
402
403 if ((targ = colon(argv[argc - 1]))) /* Dest is remote host. */
404 toremote(targ, argc, argv);
405 else {
406 if (targetshouldbedirectory)
407 verifydir(argv[argc - 1]);
408 tolocal(argc, argv); /* Dest is local host. */
409 }
410 /*
411 * Finally check the exit status of the ssh process, if one was forked
412 * and no error has occured yet
413 */
414 if (do_cmd_pid != -1 && errs == 0) {
415 if (remin != -1)
416 (void) close(remin);
417 if (remout != -1)
418 (void) close(remout);
419 if (waitpid(do_cmd_pid, &status, 0) == -1)
420 errs = 1;
421 else {
422 if (!WIFEXITED(status) || WEXITSTATUS(status) != 0)
423 errs = 1;
424 }
425 }
426 exit(errs != 0);
427}
428
429void
430toremote(char *targ, int argc, char **argv)
431{
432 char *bp, *host, *src, *suser, *thost, *tuser, *arg;
433 arglist alist;
434 int i;
435
436 memset(&alist, '\0', sizeof(alist));
437 alist.list = NULL;
438
439 *targ++ = 0;
440 if (*targ == 0)
441 targ = ".";
442
443 arg = xstrdup(argv[argc - 1]);
444 if ((thost = strrchr(arg, '@'))) {
445 /* user@host */
446 *thost++ = 0;
447 tuser = arg;
448 if (*tuser == '\0')
449 tuser = NULL;
450 } else {
451 thost = arg;
452 tuser = NULL;
453 }
454
455 if (tuser != NULL && !okname(tuser)) {
456 xfree(arg);
457 return;
458 }
459
460 for (i = 0; i < argc - 1; i++) {
461 src = colon(argv[i]);
462 if (src) { /* remote to remote */
463 freeargs(&alist);
464 addargs(&alist, "%s", ssh_program);
465 if (verbose_mode)
466 addargs(&alist, "-v");
467 addargs(&alist, "-x");
468 addargs(&alist, "-oClearAllForwardings yes");
469 addargs(&alist, "-n");
470
471 *src++ = 0;
472 if (*src == 0)
473 src = ".";
474 host = strrchr(argv[i], '@');
475
476 if (host) {
477 *host++ = 0;
478 host = cleanhostname(host);
479 suser = argv[i];
480 if (*suser == '\0')
481 suser = pwd->pw_name;
482 else if (!okname(suser))
483 continue;
484 addargs(&alist, "-l");
485 addargs(&alist, "%s", suser);
486 } else {
487 host = cleanhostname(argv[i]);
488 }
489 addargs(&alist, "%s", host);
490 addargs(&alist, "%s", cmd);
491 addargs(&alist, "%s", src);
492 addargs(&alist, "%s%s%s:%s",
493 tuser ? tuser : "", tuser ? "@" : "",
494 thost, targ);
495 if (do_local_cmd(&alist) != 0)
496 errs = 1;
497 } else { /* local to remote */
498 if (remin == -1) {
499 xasprintf(&bp, "%s -t %s", cmd, targ);
500 host = cleanhostname(thost);
501 if (do_cmd(host, tuser, bp, &remin,
502 &remout) < 0)
503 exit(1);
504 if (response() < 0)
505 exit(1);
506 (void) xfree(bp);
507 }
508 source(1, argv + i);
509 }
510 }
511 xfree(arg);
512}
513
514void
515tolocal(int argc, char **argv)
516{
517 char *bp, *host, *src, *suser;
518 arglist alist;
519 int i;
520
521 memset(&alist, '\0', sizeof(alist));
522 alist.list = NULL;
523
524 for (i = 0; i < argc - 1; i++) {
525 if (!(src = colon(argv[i]))) { /* Local to local. */
526 freeargs(&alist);
527 addargs(&alist, "%s", _PATH_CP);
528 if (iamrecursive)
529 addargs(&alist, "-r");
530 if (pflag)
531 addargs(&alist, "-p");
532 addargs(&alist, "%s", argv[i]);
533 addargs(&alist, "%s", argv[argc-1]);
534 if (do_local_cmd(&alist))
535 ++errs;
536 continue;
537 }
538 *src++ = 0;
539 if (*src == 0)
540 src = ".";
541 if ((host = strrchr(argv[i], '@')) == NULL) {
542 host = argv[i];
543 suser = NULL;
544 } else {
545 *host++ = 0;
546 suser = argv[i];
547 if (*suser == '\0')
548 suser = pwd->pw_name;
549 }
550 host = cleanhostname(host);
551 xasprintf(&bp, "%s -f %s", cmd, src);
552 if (do_cmd(host, suser, bp, &remin, &remout) < 0) {
553 (void) xfree(bp);
554 ++errs;
555 continue;
556 }
557 xfree(bp);
558 sink(1, argv + argc - 1);
559 (void) close(remin);
560 remin = remout = -1;
561 }
562}
563
564void
565source(int argc, char **argv)
566{
567 struct stat stb;
568 static BUF buffer;
569 BUF *bp;
570 off_t i, amt, statbytes;
571 size_t result;
572 int fd = -1, haderr, indx;
573 char *last, *name, buf[2048];
574 int len;
575
576 for (indx = 0; indx < argc; ++indx) {
577 name = argv[indx];
578 statbytes = 0;
579 len = strlen(name);
580 while (len > 1 && name[len-1] == '/')
581 name[--len] = '\0';
582 if (strchr(name, '\n') != NULL) {
583 run_err("%s: skipping, filename contains a newline",
584 name);
585 goto next;
586 }
587 if ((fd = open(name, O_RDONLY, 0)) < 0)
588 goto syserr;
589 if (fstat(fd, &stb) < 0) {
590syserr: run_err("%s: %s", name, strerror(errno));
591 goto next;
592 }
593 switch (stb.st_mode & S_IFMT) {
594 case S_IFREG:
595 break;
596 case S_IFDIR:
597 if (iamrecursive) {
598 rsource(name, &stb);
599 goto next;
600 }
601 /* FALLTHROUGH */
602 default:
603 run_err("%s: not a regular file", name);
604 goto next;
605 }
606 if ((last = strrchr(name, '/')) == NULL)
607 last = name;
608 else
609 ++last;
610 curfile = last;
611 if (pflag) {
612 /*
613 * Make it compatible with possible future
614 * versions expecting microseconds.
615 */
616 (void) snprintf(buf, sizeof buf, "T%lu 0 %lu 0\n",
617 (u_long) stb.st_mtime,
618 (u_long) stb.st_atime);
619 (void) atomicio(vwrite, remout, buf, strlen(buf));
620 if (response() < 0)
621 goto next;
622 }
623#define FILEMODEMASK (S_ISUID|S_ISGID|S_IRWXU|S_IRWXG|S_IRWXO)
624 snprintf(buf, sizeof buf, "C%04o %lld %s\n",
625 (u_int) (stb.st_mode & FILEMODEMASK),
626 (long long)stb.st_size, last);
627 if (verbose_mode) {
628 fprintf(stderr, "Sending file modes: %s", buf);
629 }
630 (void) atomicio(vwrite, remout, buf, strlen(buf));
631 if (response() < 0)
632 goto next;
633 if ((bp = allocbuf(&buffer, fd, 2048)) == NULL) {
634next: if (fd != -1) {
635 (void) close(fd);
636 fd = -1;
637 }
638 continue;
639 }
640 if (showprogress)
641 start_progress_meter(curfile, stb.st_size, &statbytes);
642 /* Keep writing after an error so that we stay sync'd up. */
643 for (haderr = i = 0; i < stb.st_size; i += bp->cnt) {
644 amt = bp->cnt;
645 if (i + amt > stb.st_size)
646 amt = stb.st_size - i;
647 if (!haderr) {
648 result = atomicio(read, fd, bp->buf, amt);
649 if (result != amt)
650 haderr = errno;
651 }
652 if (haderr)
653 (void) atomicio(vwrite, remout, bp->buf, amt);
654 else {
655 result = atomicio(vwrite, remout, bp->buf, amt);
656 if (result != amt)
657 haderr = errno;
658 statbytes += result;
659 }
660 if (limit_rate)
661 bwlimit(amt);
662 }
663 if (showprogress)
664 stop_progress_meter();
665
666 if (fd != -1) {
667 if (close(fd) < 0 && !haderr)
668 haderr = errno;
669 fd = -1;
670 }
671 if (!haderr)
672 (void) atomicio(vwrite, remout, "", 1);
673 else
674 run_err("%s: %s", name, strerror(haderr));
675 (void) response();
676 }
677}
678
679void
680rsource(char *name, struct stat *statp)
681{
682 DIR *dirp;
683 struct dirent *dp;
684 char *last, *vect[1], path[1100];
685
686 if (!(dirp = opendir(name))) {
687 run_err("%s: %s", name, strerror(errno));
688 return;
689 }
690 last = strrchr(name, '/');
691 if (last == 0)
692 last = name;
693 else
694 last++;
695 if (pflag) {
696 (void) snprintf(path, sizeof(path), "T%lu 0 %lu 0\n",
697 (u_long) statp->st_mtime,
698 (u_long) statp->st_atime);
699 (void) atomicio(vwrite, remout, path, strlen(path));
700 if (response() < 0) {
701 closedir(dirp);
702 return;
703 }
704 }
705 (void) snprintf(path, sizeof path, "D%04o %d %.1024s\n",
706 (u_int) (statp->st_mode & FILEMODEMASK), 0, last);
707 if (verbose_mode)
708 fprintf(stderr, "Entering directory: %s", path);
709 (void) atomicio(vwrite, remout, path, strlen(path));
710 if (response() < 0) {
711 closedir(dirp);
712 return;
713 }
714 while ((dp = readdir(dirp)) != NULL) {
715 if (dp->d_ino == 0)
716 continue;
717 if (!strcmp(dp->d_name, ".") || !strcmp(dp->d_name, ".."))
718 continue;
719 if (strlen(name) + 1 + strlen(dp->d_name) >= sizeof(path) - 1) {
720 run_err("%s/%s: name too long", name, dp->d_name);
721 continue;
722 }
723 (void) snprintf(path, sizeof path, "%s/%s", name, dp->d_name);
724 vect[0] = path;
725 source(1, vect);
726 }
727 (void) closedir(dirp);
728 (void) atomicio(vwrite, remout, "E\n", 2);
729 (void) response();
730}
731
732void
733bwlimit(int amount)
734{
735 static struct timeval bwstart, bwend;
736 static int lamt, thresh = 16384;
737 u_int64_t waitlen;
738 struct timespec ts, rm;
739
740 if (!timerisset(&bwstart)) {
741 gettimeofday(&bwstart, NULL);
742 return;
743 }
744
745 lamt += amount;
746 if (lamt < thresh)
747 return;
748
749 gettimeofday(&bwend, NULL);
750 timersub(&bwend, &bwstart, &bwend);
751 if (!timerisset(&bwend))
752 return;
753
754 lamt *= 8;
755 waitlen = (double)1000000L * lamt / limit_rate;
756
757 bwstart.tv_sec = waitlen / 1000000L;
758 bwstart.tv_usec = waitlen % 1000000L;
759
760 if (timercmp(&bwstart, &bwend, >)) {
761 timersub(&bwstart, &bwend, &bwend);
762
763 /* Adjust the wait time */
764 if (bwend.tv_sec) {
765 thresh /= 2;
766 if (thresh < 2048)
767 thresh = 2048;
768 } else if (bwend.tv_usec < 100) {
769 thresh *= 2;
770 if (thresh > 32768)
771 thresh = 32768;
772 }
773
774 TIMEVAL_TO_TIMESPEC(&bwend, &ts);
775 while (nanosleep(&ts, &rm) == -1) {
776 if (errno != EINTR)
777 break;
778 ts = rm;
779 }
780 }
781
782 lamt = 0;
783 gettimeofday(&bwstart, NULL);
784}
785
786void
787sink(int argc, char **argv)
788{
789 static BUF buffer;
790 struct stat stb;
791 enum {
792 YES, NO, DISPLAYED
793 } wrerr;
794 BUF *bp;
795 off_t i;
796 size_t j, count;
797 int amt, exists, first, ofd;
798 mode_t mode, omode, mask;
799 off_t size, statbytes;
800 int setimes, targisdir, wrerrno = 0;
801 char ch, *cp, *np, *targ, *why, *vect[1], buf[2048];
802 struct timeval tv[2];
803
804#define atime tv[0]
805#define mtime tv[1]
806#define SCREWUP(str) { why = str; goto screwup; }
807
808 setimes = targisdir = 0;
809 mask = umask(0);
810 if (!pflag)
811 (void) umask(mask);
812 if (argc != 1) {
813 run_err("ambiguous target");
814 exit(1);
815 }
816 targ = *argv;
817 if (targetshouldbedirectory)
818 verifydir(targ);
819
820 (void) atomicio(vwrite, remout, "", 1);
821 if (stat(targ, &stb) == 0 && S_ISDIR(stb.st_mode))
822 targisdir = 1;
823 for (first = 1;; first = 0) {
824 cp = buf;
825 if (atomicio(read, remin, cp, 1) != 1)
826 return;
827 if (*cp++ == '\n')
828 SCREWUP("unexpected <newline>");
829 do {
830 if (atomicio(read, remin, &ch, sizeof(ch)) != sizeof(ch))
831 SCREWUP("lost connection");
832 *cp++ = ch;
833 } while (cp < &buf[sizeof(buf) - 1] && ch != '\n');
834 *cp = 0;
835 if (verbose_mode)
836 fprintf(stderr, "Sink: %s", buf);
837
838 if (buf[0] == '\01' || buf[0] == '\02') {
839 if (iamremote == 0)
840 (void) atomicio(vwrite, STDERR_FILENO,
841 buf + 1, strlen(buf + 1));
842 if (buf[0] == '\02')
843 exit(1);
844 ++errs;
845 continue;
846 }
847 if (buf[0] == 'E') {
848 (void) atomicio(vwrite, remout, "", 1);
849 return;
850 }
851 if (ch == '\n')
852 *--cp = 0;
853
854 cp = buf;
855 if (*cp == 'T') {
856 setimes++;
857 cp++;
858 mtime.tv_sec = strtol(cp, &cp, 10);
859 if (!cp || *cp++ != ' ')
860 SCREWUP("mtime.sec not delimited");
861 mtime.tv_usec = strtol(cp, &cp, 10);
862 if (!cp || *cp++ != ' ')
863 SCREWUP("mtime.usec not delimited");
864 atime.tv_sec = strtol(cp, &cp, 10);
865 if (!cp || *cp++ != ' ')
866 SCREWUP("atime.sec not delimited");
867 atime.tv_usec = strtol(cp, &cp, 10);
868 if (!cp || *cp++ != '\0')
869 SCREWUP("atime.usec not delimited");
870 (void) atomicio(vwrite, remout, "", 1);
871 continue;
872 }
873 if (*cp != 'C' && *cp != 'D') {
874 /*
875 * Check for the case "rcp remote:foo\* local:bar".
876 * In this case, the line "No match." can be returned
877 * by the shell before the rcp command on the remote is
878 * executed so the ^Aerror_message convention isn't
879 * followed.
880 */
881 if (first) {
882 run_err("%s", cp);
883 exit(1);
884 }
885 SCREWUP("expected control record");
886 }
887 mode = 0;
888 for (++cp; cp < buf + 5; cp++) {
889 if (*cp < '0' || *cp > '7')
890 SCREWUP("bad mode");
891 mode = (mode << 3) | (*cp - '0');
892 }
893 if (*cp++ != ' ')
894 SCREWUP("mode not delimited");
895
896 for (size = 0; isdigit(*cp);)
897 size = size * 10 + (*cp++ - '0');
898 if (*cp++ != ' ')
899 SCREWUP("size not delimited");
900 if ((strchr(cp, '/') != NULL) || (strcmp(cp, "..") == 0)) {
901 run_err("error: unexpected filename: %s", cp);
902 exit(1);
903 }
904 if (targisdir) {
905 static char *namebuf;
906 static size_t cursize;
907 size_t need;
908
909 need = strlen(targ) + strlen(cp) + 250;
910 if (need > cursize) {
911 if (namebuf)
912 xfree(namebuf);
913 namebuf = xmalloc(need);
914 cursize = need;
915 }
916 (void) snprintf(namebuf, need, "%s%s%s", targ,
917 strcmp(targ, "/") ? "/" : "", cp);
918 np = namebuf;
919 } else
920 np = targ;
921 curfile = cp;
922 exists = stat(np, &stb) == 0;
923 if (buf[0] == 'D') {
924 int mod_flag = pflag;
925 if (!iamrecursive)
926 SCREWUP("received directory without -r");
927 if (exists) {
928 if (!S_ISDIR(stb.st_mode)) {
929 errno = ENOTDIR;
930 goto bad;
931 }
932 if (pflag)
933 (void) chmod(np, mode);
934 } else {
935 /* Handle copying from a read-only
936 directory */
937 mod_flag = 1;
938 if (mkdir(np, mode | S_IRWXU) < 0)
939 goto bad;
940 }
941 vect[0] = xstrdup(np);
942 sink(1, vect);
943 if (setimes) {
944 setimes = 0;
945 if (utimes(vect[0], tv) < 0)
946 run_err("%s: set times: %s",
947 vect[0], strerror(errno));
948 }
949 if (mod_flag)
950 (void) chmod(vect[0], mode);
951 if (vect[0])
952 xfree(vect[0]);
953 continue;
954 }
955 omode = mode;
956 mode |= S_IWRITE;
957 if ((ofd = open(np, O_WRONLY|O_CREAT, mode)) < 0) {
958bad: run_err("%s: %s", np, strerror(errno));
959 continue;
960 }
961 (void) atomicio(vwrite, remout, "", 1);
962 if ((bp = allocbuf(&buffer, ofd, 4096)) == NULL) {
963 (void) close(ofd);
964 continue;
965 }
966 cp = bp->buf;
967 wrerr = NO;
968
969 statbytes = 0;
970 if (showprogress)
971 start_progress_meter(curfile, size, &statbytes);
972 for (count = i = 0; i < size; i += 4096) {
973 amt = 4096;
974 if (i + amt > size)
975 amt = size - i;
976 count += amt;
977 do {
978 j = atomicio(read, remin, cp, amt);
979 if (j == 0) {
980 run_err("%s", j ? strerror(errno) :
981 "dropped connection");
982 exit(1);
983 }
984 amt -= j;
985 cp += j;
986 statbytes += j;
987 } while (amt > 0);
988
989 if (limit_rate)
990 bwlimit(4096);
991
992 if (count == bp->cnt) {
993 /* Keep reading so we stay sync'd up. */
994 if (wrerr == NO) {
995 if (atomicio(vwrite, ofd, bp->buf,
996 count) != count) {
997 wrerr = YES;
998 wrerrno = errno;
999 }
1000 }
1001 count = 0;
1002 cp = bp->buf;
1003 }
1004 }
1005 if (showprogress)
1006 stop_progress_meter();
1007 if (count != 0 && wrerr == NO &&
1008 atomicio(vwrite, ofd, bp->buf, count) != count) {
1009 wrerr = YES;
1010 wrerrno = errno;
1011 }
1012 if (wrerr == NO && ftruncate(ofd, size) != 0) {
1013 run_err("%s: truncate: %s", np, strerror(errno));
1014 wrerr = DISPLAYED;
1015 }
1016 if (pflag) {
1017 if (exists || omode != mode)
1018#ifdef HAVE_FCHMOD
1019 if (fchmod(ofd, omode)) {
1020#else /* HAVE_FCHMOD */
1021 if (chmod(np, omode)) {
1022#endif /* HAVE_FCHMOD */
1023 run_err("%s: set mode: %s",
1024 np, strerror(errno));
1025 wrerr = DISPLAYED;
1026 }
1027 } else {
1028 if (!exists && omode != mode)
1029#ifdef HAVE_FCHMOD
1030 if (fchmod(ofd, omode & ~mask)) {
1031#else /* HAVE_FCHMOD */
1032 if (chmod(np, omode & ~mask)) {
1033#endif /* HAVE_FCHMOD */
1034 run_err("%s: set mode: %s",
1035 np, strerror(errno));
1036 wrerr = DISPLAYED;
1037 }
1038 }
1039 if (close(ofd) == -1) {
1040 wrerr = YES;
1041 wrerrno = errno;
1042 }
1043 (void) response();
1044 if (setimes && wrerr == NO) {
1045 setimes = 0;
1046 if (utimes(np, tv) < 0) {
1047 run_err("%s: set times: %s",
1048 np, strerror(errno));
1049 wrerr = DISPLAYED;
1050 }
1051 }
1052 switch (wrerr) {
1053 case YES:
1054 run_err("%s: %s", np, strerror(wrerrno));
1055 break;
1056 case NO:
1057 (void) atomicio(vwrite, remout, "", 1);
1058 break;
1059 case DISPLAYED:
1060 break;
1061 }
1062 }
1063screwup:
1064 run_err("protocol error: %s", why);
1065 exit(1);
1066}
1067
1068int
1069response(void)
1070{
1071 char ch, *cp, resp, rbuf[2048];
1072
1073 if (atomicio(read, remin, &resp, sizeof(resp)) != sizeof(resp))
1074 lostconn(0);
1075
1076 cp = rbuf;
1077 switch (resp) {
1078 case 0: /* ok */
1079 return (0);
1080 default:
1081 *cp++ = resp;
1082 /* FALLTHROUGH */
1083 case 1: /* error, followed by error msg */
1084 case 2: /* fatal error, "" */
1085 do {
1086 if (atomicio(read, remin, &ch, sizeof(ch)) != sizeof(ch))
1087 lostconn(0);
1088 *cp++ = ch;
1089 } while (cp < &rbuf[sizeof(rbuf) - 1] && ch != '\n');
1090
1091 if (!iamremote)
1092 (void) atomicio(vwrite, STDERR_FILENO, rbuf, cp - rbuf);
1093 ++errs;
1094 if (resp == 1)
1095 return (-1);
1096 exit(1);
1097 }
1098 /* NOTREACHED */
1099}
1100
1101void
1102usage(void)
1103{
1104 (void) fprintf(stderr,
1105 "usage: scp [-1246BCpqrv] [-c cipher] [-F ssh_config] [-i identity_file]\n"
1106 " [-l limit] [-o ssh_option] [-P port] [-S program]\n"
1107 " [[user@]host1:]file1 [...] [[user@]host2:]file2\n");
1108 exit(1);
1109}
1110
1111void
1112run_err(const char *fmt,...)
1113{
1114 static FILE *fp;
1115 va_list ap;
1116
1117 ++errs;
1118 if (fp != NULL || (remout != -1 && (fp = fdopen(remout, "w")))) {
1119 (void) fprintf(fp, "%c", 0x01);
1120 (void) fprintf(fp, "scp: ");
1121 va_start(ap, fmt);
1122 (void) vfprintf(fp, fmt, ap);
1123 va_end(ap);
1124 (void) fprintf(fp, "\n");
1125 (void) fflush(fp);
1126 }
1127
1128 if (!iamremote) {
1129 va_start(ap, fmt);
1130 vfprintf(stderr, fmt, ap);
1131 va_end(ap);
1132 fprintf(stderr, "\n");
1133 }
1134}
1135
1136void
1137verifydir(char *cp)
1138{
1139 struct stat stb;
1140
1141 if (!stat(cp, &stb)) {
1142 if (S_ISDIR(stb.st_mode))
1143 return;
1144 errno = ENOTDIR;
1145 }
1146 run_err("%s: %s", cp, strerror(errno));
1147 killchild(0);
1148}
1149
1150int
1151okname(char *cp0)
1152{
1153 int c;
1154 char *cp;
1155
1156 cp = cp0;
1157 do {
1158 c = (int)*cp;
1159 if (c & 0200)
1160 goto bad;
1161 if (!isalpha(c) && !isdigit(c)) {
1162 switch (c) {
1163 case '\'':
1164 case '"':
1165 case '`':
1166 case ' ':
1167 case '#':
1168 goto bad;
1169 default:
1170 break;
1171 }
1172 }
1173 } while (*++cp);
1174 return (1);
1175
1176bad: fprintf(stderr, "%s: invalid user name\n", cp0);
1177 return (0);
1178}
1179
1180BUF *
1181allocbuf(BUF *bp, int fd, int blksize)
1182{
1183 size_t size;
1184#ifdef HAVE_STRUCT_STAT_ST_BLKSIZE
1185 struct stat stb;
1186
1187 if (fstat(fd, &stb) < 0) {
1188 run_err("fstat: %s", strerror(errno));
1189 return (0);
1190 }
1191 size = roundup(stb.st_blksize, blksize);
1192 if (size == 0)
1193 size = blksize;
1194#else /* HAVE_STRUCT_STAT_ST_BLKSIZE */
1195 size = blksize;
1196#endif /* HAVE_STRUCT_STAT_ST_BLKSIZE */
1197 if (bp->cnt >= size)
1198 return (bp);
1199 if (bp->buf == NULL)
1200 bp->buf = xmalloc(size);
1201 else
1202 bp->buf = xrealloc(bp->buf, 1, size);
1203 memset(bp->buf, 0, size);
1204 bp->cnt = size;
1205 return (bp);
1206}
1207
1208void
1209lostconn(int signo)
1210{
1211 if (!iamremote)
1212 write(STDERR_FILENO, "lost connection\n", 16);
1213 if (signo)
1214 _exit(1);
1215 else
1216 exit(1);
1217}
This page took 0.075367 seconds and 5 git commands to generate.