mirror of
git://anongit.mindrot.org/openssh.git
synced 2024-11-30 18:03:32 +08:00
3380426358
- (djm) OpenBSD CVS sync: - markus@cvs.openbsd.org 2001/02/03 03:08:38 [auth-options.c auth-rh-rsa.c auth-rhosts.c auth.c canohost.c] [canohost.h servconf.c servconf.h session.c sshconnect1.c sshd.8] [sshd_config] make ReverseMappingCheck optional in sshd_config; ok djm@,dugsong@ - markus@cvs.openbsd.org 2001/02/03 03:19:51 [ssh.1 sshd.8 sshd_config] Skey is now called ChallengeResponse - markus@cvs.openbsd.org 2001/02/03 03:43:09 [sshd.8] use no-pty option in .ssh/authorized_keys* if you need a 8-bit clean channel. note from Erik.Anggard@cygate.se (pr/1659) - stevesk@cvs.openbsd.org 2001/02/03 10:03:06 [ssh.1] typos; ok markus@ - djm@cvs.openbsd.org 2001/02/04 04:11:56 [scp.1 sftp-server.c ssh.1 sshd.8 sftp-client.c sftp-client.h] [sftp-common.c sftp-common.h sftp-int.c sftp-int.h sftp.1 sftp.c] Basic interactive sftp client; ok theo@ - (djm) Update RPM specs for new sftp binary - (djm) Update several bits for new optional reverse lookup stuff. I think I got them all.
223 lines
5.1 KiB
C
223 lines
5.1 KiB
C
/*
|
|
* Copyright (c) 2001 Damien Miller. All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
|
|
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
|
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
|
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
*/
|
|
|
|
#include "includes.h"
|
|
|
|
RCSID("$OpenBSD: sftp.c,v 1.1 2001/02/04 11:11:54 djm Exp $");
|
|
|
|
/* XXX: commandline mode */
|
|
/* XXX: copy between two remote hosts (commandline) */
|
|
/* XXX: short-form remote directory listings (like 'ls -C') */
|
|
|
|
#include "buffer.h"
|
|
#include "xmalloc.h"
|
|
#include "log.h"
|
|
#include "pathnames.h"
|
|
|
|
#include "sftp.h"
|
|
#include "sftp-common.h"
|
|
#include "sftp-client.h"
|
|
#include "sftp-int.h"
|
|
|
|
void
|
|
connect_to_server(char **args, int *in, int *out, pid_t *sshpid)
|
|
{
|
|
int c_in, c_out;
|
|
#ifdef USE_PIPES
|
|
int pin[2], pout[2];
|
|
if ((pipe(pin) == -1) || (pipe(pout) == -1))
|
|
fatal("pipe: %s", strerror(errno));
|
|
*in = pin[0];
|
|
*out = pout[1];
|
|
c_in = pout[0];
|
|
c_out = pin[1];
|
|
#else /* USE_PIPES */
|
|
int inout[2];
|
|
if (socketpair(AF_UNIX, SOCK_STREAM, 0, inout) == -1)
|
|
fatal("socketpair: %s", strerror(errno));
|
|
*in = *out = inout[0];
|
|
c_in = c_out = inout[1];
|
|
#endif /* USE_PIPES */
|
|
|
|
if ((*sshpid = fork()) == -1)
|
|
fatal("fork: %s", strerror(errno));
|
|
else if (*sshpid == 0) {
|
|
if ((dup2(c_in, STDIN_FILENO) == -1) ||
|
|
(dup2(c_out, STDOUT_FILENO) == -1)) {
|
|
fprintf(stderr, "dup2: %s\n", strerror(errno));
|
|
exit(1);
|
|
}
|
|
close(*in);
|
|
close(*out);
|
|
close(c_in);
|
|
close(c_out);
|
|
execv(_PATH_SSH_PROGRAM, args);
|
|
fprintf(stderr, "exec: %s", strerror(errno));
|
|
exit(1);
|
|
}
|
|
|
|
close(c_in);
|
|
close(c_out);
|
|
}
|
|
|
|
char **
|
|
make_ssh_args(char *add_arg)
|
|
{
|
|
static char **args = NULL;
|
|
static int nargs = 0;
|
|
char debug_buf[4096];
|
|
int i;
|
|
|
|
/* Init args array */
|
|
if (args == NULL) {
|
|
nargs = 4;
|
|
i = 0;
|
|
args = xmalloc(sizeof(*args) * nargs);
|
|
args[i++] = "ssh";
|
|
args[i++] = "-oProtocol=2";
|
|
args[i++] = "-s";
|
|
args[i++] = NULL;
|
|
}
|
|
|
|
/* If asked to add args, then do so and return */
|
|
if (add_arg) {
|
|
i = nargs++ - 1;
|
|
args = xrealloc(args, sizeof(*args) * nargs);
|
|
args[i++] = add_arg;
|
|
args[i++] = NULL;
|
|
return(NULL);
|
|
}
|
|
|
|
/* Otherwise finish up and return the arg array */
|
|
make_ssh_args("sftp");
|
|
|
|
/* XXX: overflow - doesn't grow debug_buf */
|
|
debug_buf[0] = '\0';
|
|
for(i = 0; args[i]; i++) {
|
|
if (i)
|
|
strlcat(debug_buf, " ", sizeof(debug_buf));
|
|
|
|
strlcat(debug_buf, args[i], sizeof(debug_buf));
|
|
}
|
|
debug("SSH args \"%s\"", debug_buf);
|
|
|
|
return(args);
|
|
}
|
|
|
|
void
|
|
usage(void)
|
|
{
|
|
fprintf(stderr, "usage: sftp [-vC] [-osshopt=value] [user@]host\n");
|
|
exit(1);
|
|
}
|
|
|
|
int
|
|
main(int argc, char **argv)
|
|
{
|
|
int in, out, i, debug_level, compress_flag;
|
|
pid_t sshpid;
|
|
char *cp;
|
|
LogLevel ll;
|
|
|
|
debug_level = compress_flag = 0;
|
|
for(i = 1; i < argc && argv[i][0] == '-'; i++) {
|
|
if (!strcmp(argv[i], "-v"))
|
|
debug_level = MIN(3, debug_level + 1);
|
|
else if (!strcmp(argv[i], "-C"))
|
|
compress_flag = 1;
|
|
else if (!strncmp(argv[i], "-o", 2)) {
|
|
make_ssh_args(argv[i]);
|
|
} else {
|
|
fprintf(stderr, "Unknown option \"%s\"\n", argv[i]);
|
|
usage();
|
|
}
|
|
}
|
|
|
|
if (i == argc || argc > (i + 1))
|
|
usage();
|
|
|
|
if ((cp = strchr(argv[i], '@')) == NULL)
|
|
cp = argv[i];
|
|
else {
|
|
*cp = '\0';
|
|
if (!argv[i][0]) {
|
|
fprintf(stderr, "Missing username\n");
|
|
usage();
|
|
}
|
|
make_ssh_args("-l");
|
|
make_ssh_args(argv[i]);
|
|
cp++;
|
|
}
|
|
|
|
if (!*cp) {
|
|
fprintf(stderr, "Missing hostname\n");
|
|
usage();
|
|
}
|
|
|
|
/* Set up logging and debug '-d' arguments to ssh */
|
|
ll = SYSLOG_LEVEL_INFO;
|
|
switch (debug_level) {
|
|
case 1:
|
|
ll = SYSLOG_LEVEL_DEBUG1;
|
|
make_ssh_args("-v");
|
|
break;
|
|
case 2:
|
|
ll = SYSLOG_LEVEL_DEBUG2;
|
|
make_ssh_args("-v");
|
|
make_ssh_args("-v");
|
|
break;
|
|
case 3:
|
|
ll = SYSLOG_LEVEL_DEBUG3;
|
|
make_ssh_args("-v");
|
|
make_ssh_args("-v");
|
|
make_ssh_args("-v");
|
|
break;
|
|
}
|
|
|
|
if (compress_flag)
|
|
make_ssh_args("-C");
|
|
|
|
log_init(argv[0], ll, SYSLOG_FACILITY_USER, 1);
|
|
|
|
make_ssh_args(cp);
|
|
|
|
fprintf(stderr, "Connecting to %s...\n", cp);
|
|
|
|
connect_to_server(make_ssh_args(NULL), &in, &out, &sshpid);
|
|
|
|
do_init(in, out);
|
|
|
|
interactive_loop(in, out);
|
|
|
|
close(in);
|
|
close(out);
|
|
|
|
if (kill(sshpid, SIGHUP) == -1)
|
|
fatal("Couldn't terminate ssh process: %s", strerror(errno));
|
|
|
|
/* XXX: wait? */
|
|
|
|
exit(0);
|
|
}
|