mirror of
https://github.com/openssh/libopenssh
synced 2026-04-20 19:56:22 +00:00
convert sftp* to new buffer API
This commit is contained in:
committed by
Markus Friedl
parent
12d60b5fa2
commit
025f752c90
File diff suppressed because it is too large
Load Diff
@@ -37,7 +37,8 @@
|
||||
#include <util.h>
|
||||
|
||||
#include "xmalloc.h"
|
||||
#include "buffer.h"
|
||||
#include "err.h"
|
||||
#include "sshbuf.h"
|
||||
#include "log.h"
|
||||
|
||||
#include "sftp.h"
|
||||
@@ -95,59 +96,81 @@ attrib_to_stat(const Attrib *a, struct stat *st)
|
||||
}
|
||||
|
||||
/* Decode attributes in buffer */
|
||||
Attrib *
|
||||
decode_attrib(Buffer *b)
|
||||
int
|
||||
decode_attrib(struct sshbuf *b, Attrib *a)
|
||||
{
|
||||
static Attrib a;
|
||||
int r;
|
||||
|
||||
attrib_clear(&a);
|
||||
a.flags = buffer_get_int(b);
|
||||
if (a.flags & SSH2_FILEXFER_ATTR_SIZE)
|
||||
a.size = buffer_get_int64(b);
|
||||
if (a.flags & SSH2_FILEXFER_ATTR_UIDGID) {
|
||||
a.uid = buffer_get_int(b);
|
||||
a.gid = buffer_get_int(b);
|
||||
attrib_clear(a);
|
||||
if ((r = sshbuf_get_u32(b, &a->flags)) != 0)
|
||||
return r;
|
||||
if (a->flags & SSH2_FILEXFER_ATTR_SIZE) {
|
||||
if ((r = sshbuf_get_u64(b, &a->size)) != 0)
|
||||
return r;
|
||||
}
|
||||
if (a.flags & SSH2_FILEXFER_ATTR_PERMISSIONS)
|
||||
a.perm = buffer_get_int(b);
|
||||
if (a.flags & SSH2_FILEXFER_ATTR_ACMODTIME) {
|
||||
a.atime = buffer_get_int(b);
|
||||
a.mtime = buffer_get_int(b);
|
||||
if (a->flags & SSH2_FILEXFER_ATTR_UIDGID) {
|
||||
if ((r = sshbuf_get_u32(b, &a->uid)) != 0 ||
|
||||
(r = sshbuf_get_u32(b, &a->gid)) != 0)
|
||||
return r;
|
||||
}
|
||||
if (a->flags & SSH2_FILEXFER_ATTR_PERMISSIONS) {
|
||||
if ((r = sshbuf_get_u32(b, &a->perm)) != 0)
|
||||
return r;
|
||||
}
|
||||
if (a->flags & SSH2_FILEXFER_ATTR_ACMODTIME) {
|
||||
if ((r = sshbuf_get_u32(b, &a->atime)) != 0 ||
|
||||
(r = sshbuf_get_u32(b, &a->mtime)) != 0)
|
||||
return r;
|
||||
}
|
||||
/* vendor-specific extensions */
|
||||
if (a.flags & SSH2_FILEXFER_ATTR_EXTENDED) {
|
||||
char *type, *data;
|
||||
int i, count;
|
||||
if (a->flags & SSH2_FILEXFER_ATTR_EXTENDED) {
|
||||
char *type;
|
||||
u_char *data;
|
||||
size_t dlen;
|
||||
u_int i, count;
|
||||
|
||||
count = buffer_get_int(b);
|
||||
if ((r = sshbuf_get_u32(b, &count)) != 0)
|
||||
fatal("%s: buffer error: %s", __func__, ssh_err(r));
|
||||
for (i = 0; i < count; i++) {
|
||||
type = buffer_get_string(b, NULL);
|
||||
data = buffer_get_string(b, NULL);
|
||||
debug3("Got file attribute \"%s\"", type);
|
||||
xfree(type);
|
||||
xfree(data);
|
||||
if ((r = sshbuf_get_cstring(b, &type, NULL)) != 0 ||
|
||||
(r = sshbuf_get_string(b, &data, &dlen)) != 0)
|
||||
return r;
|
||||
debug3("Got file attribute \"%.100s\" len %zu",
|
||||
type, dlen);
|
||||
free(type);
|
||||
free(data);
|
||||
}
|
||||
}
|
||||
return &a;
|
||||
return 0;
|
||||
}
|
||||
|
||||
/* Encode attributes to buffer */
|
||||
void
|
||||
encode_attrib(Buffer *b, const Attrib *a)
|
||||
int
|
||||
encode_attrib(struct sshbuf *b, const Attrib *a)
|
||||
{
|
||||
buffer_put_int(b, a->flags);
|
||||
if (a->flags & SSH2_FILEXFER_ATTR_SIZE)
|
||||
buffer_put_int64(b, a->size);
|
||||
int r;
|
||||
|
||||
if ((r = sshbuf_put_u32(b, a->flags)) != 0)
|
||||
return r;
|
||||
if (a->flags & SSH2_FILEXFER_ATTR_SIZE) {
|
||||
if ((r = sshbuf_put_u64(b, a->size)) != 0)
|
||||
return r;
|
||||
}
|
||||
if (a->flags & SSH2_FILEXFER_ATTR_UIDGID) {
|
||||
buffer_put_int(b, a->uid);
|
||||
buffer_put_int(b, a->gid);
|
||||
if ((r = sshbuf_put_u32(b, a->uid)) != 0 ||
|
||||
(r = sshbuf_put_u32(b, a->gid)) != 0)
|
||||
return r;
|
||||
}
|
||||
if (a->flags & SSH2_FILEXFER_ATTR_PERMISSIONS) {
|
||||
if ((r = sshbuf_put_u32(b, a->perm)) != 0)
|
||||
return r;
|
||||
}
|
||||
if (a->flags & SSH2_FILEXFER_ATTR_PERMISSIONS)
|
||||
buffer_put_int(b, a->perm);
|
||||
if (a->flags & SSH2_FILEXFER_ATTR_ACMODTIME) {
|
||||
buffer_put_int(b, a->atime);
|
||||
buffer_put_int(b, a->mtime);
|
||||
if ((r = sshbuf_put_u32(b, a->atime)) != 0 ||
|
||||
(r = sshbuf_put_u32(b, a->mtime)) != 0)
|
||||
return r;
|
||||
}
|
||||
return 0;
|
||||
}
|
||||
|
||||
/* Convert from SSH2_FX_ status to text error message */
|
||||
|
||||
@@ -28,6 +28,7 @@
|
||||
/* Maximum packet that we are willing to send/accept */
|
||||
#define SFTP_MAX_MSG_LENGTH (256 * 1024)
|
||||
|
||||
struct sshbuf;
|
||||
typedef struct Attrib Attrib;
|
||||
|
||||
/* File attributes */
|
||||
@@ -44,8 +45,8 @@ struct Attrib {
|
||||
void attrib_clear(Attrib *);
|
||||
void stat_to_attrib(const struct stat *, Attrib *);
|
||||
void attrib_to_stat(const Attrib *, struct stat *);
|
||||
Attrib *decode_attrib(Buffer *);
|
||||
void encode_attrib(Buffer *, const Attrib *);
|
||||
int decode_attrib(struct sshbuf *, Attrib *);
|
||||
int encode_attrib(struct sshbuf *, const Attrib *);
|
||||
char *ls_file(const char *, const struct stat *, int, int);
|
||||
|
||||
const char *fx2txt(int);
|
||||
|
||||
@@ -24,7 +24,6 @@
|
||||
|
||||
#include "xmalloc.h"
|
||||
#include "sftp.h"
|
||||
#include "buffer.h"
|
||||
#include "sftp-common.h"
|
||||
#include "sftp-client.h"
|
||||
|
||||
|
||||
@@ -34,7 +34,8 @@
|
||||
#include <stdarg.h>
|
||||
|
||||
#include "xmalloc.h"
|
||||
#include "buffer.h"
|
||||
#include "sshbuf.h"
|
||||
#include "err.h"
|
||||
#include "log.h"
|
||||
#include "misc.h"
|
||||
#include "uidswap.h"
|
||||
@@ -42,11 +43,6 @@
|
||||
#include "sftp.h"
|
||||
#include "sftp-common.h"
|
||||
|
||||
/* helper */
|
||||
#define get_int64() buffer_get_int64(&iqueue);
|
||||
#define get_int() buffer_get_int(&iqueue);
|
||||
#define get_string(lenp) buffer_get_string(&iqueue, lenp);
|
||||
|
||||
/* Our verbosity */
|
||||
LogLevel log_level = SYSLOG_LEVEL_ERROR;
|
||||
|
||||
@@ -55,8 +51,8 @@ struct passwd *pw = NULL;
|
||||
char *client_addr = NULL;
|
||||
|
||||
/* input and output queue */
|
||||
Buffer iqueue;
|
||||
Buffer oqueue;
|
||||
struct sshbuf *iqueue;
|
||||
struct sshbuf *oqueue;
|
||||
|
||||
/* Version of client */
|
||||
u_int version;
|
||||
@@ -157,12 +153,6 @@ string_from_portable(int pflags)
|
||||
return ret;
|
||||
}
|
||||
|
||||
static Attrib *
|
||||
get_attrib(void)
|
||||
{
|
||||
return decode_attrib(&iqueue);
|
||||
}
|
||||
|
||||
/* handle handles */
|
||||
|
||||
typedef struct Handle Handle;
|
||||
@@ -349,29 +339,31 @@ handle_log_exit(void)
|
||||
}
|
||||
|
||||
static int
|
||||
get_handle(void)
|
||||
get_handle(struct sshbuf *queue, int *hp)
|
||||
{
|
||||
char *handle;
|
||||
int val = -1;
|
||||
u_int hlen;
|
||||
u_char *handle;
|
||||
int r;
|
||||
size_t hlen;
|
||||
|
||||
handle = get_string(&hlen);
|
||||
*hp = -1;
|
||||
if ((r = sshbuf_get_string(queue, &handle, &hlen)) != 0)
|
||||
return r;
|
||||
if (hlen < 256)
|
||||
val = handle_from_string(handle, hlen);
|
||||
*hp = handle_from_string(handle, hlen);
|
||||
xfree(handle);
|
||||
return val;
|
||||
return 0;
|
||||
}
|
||||
|
||||
/* send replies */
|
||||
|
||||
static void
|
||||
send_msg(Buffer *m)
|
||||
send_msg(struct sshbuf *m)
|
||||
{
|
||||
int mlen = buffer_len(m);
|
||||
int r;
|
||||
|
||||
buffer_put_int(&oqueue, mlen);
|
||||
buffer_append(&oqueue, buffer_ptr(m), mlen);
|
||||
buffer_consume(m, mlen);
|
||||
if ((r = sshbuf_put_stringb(oqueue, m)) != 0)
|
||||
fatal("%s: buffer error: %s", __func__, ssh_err(r));
|
||||
sshbuf_reset(m);
|
||||
}
|
||||
|
||||
static const char *
|
||||
@@ -395,34 +387,42 @@ status_to_message(u_int32_t status)
|
||||
static void
|
||||
send_status(u_int32_t id, u_int32_t status)
|
||||
{
|
||||
Buffer msg;
|
||||
struct sshbuf *msg;
|
||||
int r;
|
||||
|
||||
debug3("request %u: sent status %u", id, status);
|
||||
if (log_level > SYSLOG_LEVEL_VERBOSE ||
|
||||
(status != SSH2_FX_OK && status != SSH2_FX_EOF))
|
||||
logit("sent status %s", status_to_message(status));
|
||||
buffer_init(&msg);
|
||||
buffer_put_char(&msg, SSH2_FXP_STATUS);
|
||||
buffer_put_int(&msg, id);
|
||||
buffer_put_int(&msg, status);
|
||||
if ((msg = sshbuf_new()) == NULL)
|
||||
fatal("%s: sshbuf_new failed", __func__);
|
||||
if ((r = sshbuf_put_u8(msg, SSH2_FXP_STATUS)) != 0 ||
|
||||
(r = sshbuf_put_u32(msg, id)) != 0 ||
|
||||
(r = sshbuf_put_u32(msg, status)) != 0)
|
||||
fatal("%s: buffer error: %s", __func__, ssh_err(r));
|
||||
if (version >= 3) {
|
||||
buffer_put_cstring(&msg, status_to_message(status));
|
||||
buffer_put_cstring(&msg, "");
|
||||
if ((r = sshbuf_put_cstring(msg,
|
||||
status_to_message(status))) != 0 ||
|
||||
(r = sshbuf_put_cstring(msg, "")) != 0)
|
||||
fatal("%s: buffer error: %s", __func__, ssh_err(r));
|
||||
}
|
||||
send_msg(&msg);
|
||||
buffer_free(&msg);
|
||||
send_msg(msg);
|
||||
sshbuf_free(msg);
|
||||
}
|
||||
static void
|
||||
send_data_or_handle(char type, u_int32_t id, const char *data, int dlen)
|
||||
{
|
||||
Buffer msg;
|
||||
struct sshbuf *msg;
|
||||
int r;
|
||||
|
||||
buffer_init(&msg);
|
||||
buffer_put_char(&msg, type);
|
||||
buffer_put_int(&msg, id);
|
||||
buffer_put_string(&msg, data, dlen);
|
||||
send_msg(&msg);
|
||||
buffer_free(&msg);
|
||||
if ((msg = sshbuf_new()) == NULL)
|
||||
fatal("%s: sshbuf_new failed", __func__);
|
||||
if ((r = sshbuf_put_u8(msg, type)) != 0 ||
|
||||
(r = sshbuf_put_u32(msg, id)) != 0 ||
|
||||
(r = sshbuf_put_string(msg, data, dlen)) != 0)
|
||||
fatal("%s: buffer error: %s", __func__, ssh_err(r));
|
||||
send_msg(msg);
|
||||
sshbuf_free(msg);
|
||||
}
|
||||
|
||||
static void
|
||||
@@ -447,62 +447,71 @@ send_handle(u_int32_t id, int handle)
|
||||
static void
|
||||
send_names(u_int32_t id, int count, const Stat *stats)
|
||||
{
|
||||
Buffer msg;
|
||||
int i;
|
||||
struct sshbuf *msg;
|
||||
int i, r;
|
||||
|
||||
buffer_init(&msg);
|
||||
buffer_put_char(&msg, SSH2_FXP_NAME);
|
||||
buffer_put_int(&msg, id);
|
||||
buffer_put_int(&msg, count);
|
||||
if ((msg = sshbuf_new()) == NULL)
|
||||
fatal("%s: sshbuf_new failed", __func__);
|
||||
if ((r = sshbuf_put_u8(msg, SSH2_FXP_NAME)) != 0 ||
|
||||
(r = sshbuf_put_u32(msg, id)) != 0 ||
|
||||
(r = sshbuf_put_u32(msg, count)) != 0)
|
||||
fatal("%s: buffer error: %s", __func__, ssh_err(r));
|
||||
debug("request %u: sent names count %d", id, count);
|
||||
for (i = 0; i < count; i++) {
|
||||
buffer_put_cstring(&msg, stats[i].name);
|
||||
buffer_put_cstring(&msg, stats[i].long_name);
|
||||
encode_attrib(&msg, &stats[i].attrib);
|
||||
if ((r = sshbuf_put_cstring(msg, stats[i].name)) != 0 ||
|
||||
(r = sshbuf_put_cstring(msg, stats[i].long_name)) != 0 ||
|
||||
(r = encode_attrib(msg, &stats[i].attrib)) != 0)
|
||||
fatal("%s: buffer error: %s", __func__, ssh_err(r));
|
||||
}
|
||||
send_msg(&msg);
|
||||
buffer_free(&msg);
|
||||
send_msg(msg);
|
||||
sshbuf_free(msg);
|
||||
}
|
||||
|
||||
static void
|
||||
send_attrib(u_int32_t id, const Attrib *a)
|
||||
{
|
||||
Buffer msg;
|
||||
struct sshbuf *msg;
|
||||
int r;
|
||||
|
||||
debug("request %u: sent attrib have 0x%x", id, a->flags);
|
||||
buffer_init(&msg);
|
||||
buffer_put_char(&msg, SSH2_FXP_ATTRS);
|
||||
buffer_put_int(&msg, id);
|
||||
encode_attrib(&msg, a);
|
||||
send_msg(&msg);
|
||||
buffer_free(&msg);
|
||||
if ((msg = sshbuf_new()) == NULL)
|
||||
fatal("%s: sshbuf_new failed", __func__);
|
||||
if ((r = sshbuf_put_u8(msg, SSH2_FXP_ATTRS)) != 0 ||
|
||||
(r = sshbuf_put_u32(msg, id)) != 0 ||
|
||||
(r = encode_attrib(msg, a)) != 0)
|
||||
fatal("%s: buffer error: %s", __func__, ssh_err(r));
|
||||
send_msg(msg);
|
||||
sshbuf_free(msg);
|
||||
}
|
||||
|
||||
static void
|
||||
send_statvfs(u_int32_t id, struct statvfs *st)
|
||||
{
|
||||
Buffer msg;
|
||||
struct sshbuf *msg;
|
||||
u_int64_t flag;
|
||||
int r;
|
||||
|
||||
flag = (st->f_flag & ST_RDONLY) ? SSH2_FXE_STATVFS_ST_RDONLY : 0;
|
||||
flag |= (st->f_flag & ST_NOSUID) ? SSH2_FXE_STATVFS_ST_NOSUID : 0;
|
||||
|
||||
buffer_init(&msg);
|
||||
buffer_put_char(&msg, SSH2_FXP_EXTENDED_REPLY);
|
||||
buffer_put_int(&msg, id);
|
||||
buffer_put_int64(&msg, st->f_bsize);
|
||||
buffer_put_int64(&msg, st->f_frsize);
|
||||
buffer_put_int64(&msg, st->f_blocks);
|
||||
buffer_put_int64(&msg, st->f_bfree);
|
||||
buffer_put_int64(&msg, st->f_bavail);
|
||||
buffer_put_int64(&msg, st->f_files);
|
||||
buffer_put_int64(&msg, st->f_ffree);
|
||||
buffer_put_int64(&msg, st->f_favail);
|
||||
buffer_put_int64(&msg, st->f_fsid);
|
||||
buffer_put_int64(&msg, flag);
|
||||
buffer_put_int64(&msg, st->f_namemax);
|
||||
send_msg(&msg);
|
||||
buffer_free(&msg);
|
||||
if ((msg = sshbuf_new()) == NULL)
|
||||
fatal("%s: sshbuf_new failed", __func__);
|
||||
if ((r = sshbuf_put_u8(msg, SSH2_FXP_EXTENDED_REPLY)) != 0 ||
|
||||
(r = sshbuf_put_u32(msg, id)) != 0 ||
|
||||
(r = sshbuf_put_u64(msg, st->f_bsize)) != 0 ||
|
||||
(r = sshbuf_put_u64(msg, st->f_frsize)) != 0 ||
|
||||
(r = sshbuf_put_u64(msg, st->f_blocks)) != 0 ||
|
||||
(r = sshbuf_put_u64(msg, st->f_bfree)) != 0 ||
|
||||
(r = sshbuf_put_u64(msg, st->f_bavail)) != 0 ||
|
||||
(r = sshbuf_put_u64(msg, st->f_files)) != 0 ||
|
||||
(r = sshbuf_put_u64(msg, st->f_ffree)) != 0 ||
|
||||
(r = sshbuf_put_u64(msg, st->f_favail)) != 0 ||
|
||||
(r = sshbuf_put_u64(msg, st->f_fsid)) != 0 ||
|
||||
(r = sshbuf_put_u64(msg, flag)) != 0 ||
|
||||
(r = sshbuf_put_u64(msg, st->f_namemax)) != 0)
|
||||
fatal("%s: buffer error: %s", __func__, ssh_err(r));
|
||||
send_msg(msg);
|
||||
sshbuf_free(msg);
|
||||
}
|
||||
|
||||
/* parse incoming */
|
||||
@@ -510,44 +519,50 @@ send_statvfs(u_int32_t id, struct statvfs *st)
|
||||
static void
|
||||
process_init(void)
|
||||
{
|
||||
Buffer msg;
|
||||
struct sshbuf *msg;
|
||||
int r;
|
||||
|
||||
version = get_int();
|
||||
if ((r = sshbuf_get_u32(iqueue, &version)) != 0)
|
||||
fatal("%s: buffer error: %s", __func__, ssh_err(r));
|
||||
verbose("received client version %u", version);
|
||||
buffer_init(&msg);
|
||||
buffer_put_char(&msg, SSH2_FXP_VERSION);
|
||||
buffer_put_int(&msg, SSH2_FILEXFER_VERSION);
|
||||
/* POSIX rename extension */
|
||||
buffer_put_cstring(&msg, "posix-rename@openssh.com");
|
||||
buffer_put_cstring(&msg, "1"); /* version */
|
||||
/* statvfs extension */
|
||||
buffer_put_cstring(&msg, "statvfs@openssh.com");
|
||||
buffer_put_cstring(&msg, "2"); /* version */
|
||||
/* fstatvfs extension */
|
||||
buffer_put_cstring(&msg, "fstatvfs@openssh.com");
|
||||
buffer_put_cstring(&msg, "2"); /* version */
|
||||
/* hardlink extension */
|
||||
buffer_put_cstring(&msg, "hardlink@openssh.com");
|
||||
buffer_put_cstring(&msg, "1"); /* version */
|
||||
send_msg(&msg);
|
||||
buffer_free(&msg);
|
||||
if ((msg = sshbuf_new()) == NULL)
|
||||
fatal("%s: sshbuf_new failed", __func__);
|
||||
if ((r = sshbuf_put_u8(msg, SSH2_FXP_VERSION)) != 0 ||
|
||||
(r = sshbuf_put_u32(msg, SSH2_FILEXFER_VERSION)) != 0 ||
|
||||
/* POSIX rename extension */
|
||||
(r = sshbuf_put_cstring(msg, "posix-rename@openssh.com")) != 0 ||
|
||||
(r = sshbuf_put_cstring(msg, "1")) != 0 || /* version */
|
||||
/* statvfs extension */
|
||||
(r = sshbuf_put_cstring(msg, "statvfs@openssh.com")) != 0 ||
|
||||
(r = sshbuf_put_cstring(msg, "2")) != 0 || /* version */
|
||||
/* fstatvfs extension */
|
||||
(r = sshbuf_put_cstring(msg, "fstatvfs@openssh.com")) != 0 ||
|
||||
(r = sshbuf_put_cstring(msg, "2")) != 0 || /* version */
|
||||
/* hardlink extension */
|
||||
(r = sshbuf_put_cstring(msg, "hardlink@openssh.com")) != 0 ||
|
||||
(r = sshbuf_put_cstring(msg, "1")) != 0) /* version */
|
||||
fatal("%s: buffer error: %s", __func__, ssh_err(r));
|
||||
send_msg(msg);
|
||||
sshbuf_free(msg);
|
||||
}
|
||||
|
||||
static void
|
||||
process_open(void)
|
||||
{
|
||||
u_int32_t id, pflags;
|
||||
Attrib *a;
|
||||
Attrib a;
|
||||
char *name;
|
||||
int handle, fd, flags, mode, status = SSH2_FX_FAILURE;
|
||||
int r, handle, fd, flags, mode, status = SSH2_FX_FAILURE;
|
||||
|
||||
if ((r = sshbuf_get_u32(iqueue, &id)) != 0 ||
|
||||
(r = sshbuf_get_cstring(iqueue, &name, NULL)) != 0 ||
|
||||
(r = sshbuf_get_u32(iqueue, &pflags)) != 0 || /* portable flags */
|
||||
(r = decode_attrib(iqueue, &a)) != 0)
|
||||
fatal("%s: buffer error: %s", __func__, ssh_err(r));
|
||||
|
||||
id = get_int();
|
||||
name = get_string(NULL);
|
||||
pflags = get_int(); /* portable flags */
|
||||
debug3("request %u: open flags %d", id, pflags);
|
||||
a = get_attrib();
|
||||
flags = flags_from_portable(pflags);
|
||||
mode = (a->flags & SSH2_FILEXFER_ATTR_PERMISSIONS) ? a->perm : 0666;
|
||||
mode = (a.flags & SSH2_FILEXFER_ATTR_PERMISSIONS) ? a.perm : 0666;
|
||||
logit("open \"%s\" flags %s mode 0%o",
|
||||
name, string_from_portable(pflags), mode);
|
||||
if (readonly &&
|
||||
@@ -576,10 +591,12 @@ static void
|
||||
process_close(void)
|
||||
{
|
||||
u_int32_t id;
|
||||
int handle, ret, status = SSH2_FX_FAILURE;
|
||||
int r, handle, ret, status = SSH2_FX_FAILURE;
|
||||
|
||||
if ((r = sshbuf_get_u32(iqueue, &id)) != 0 ||
|
||||
(r = get_handle(iqueue, &handle)) != 0)
|
||||
fatal("%s: buffer error: %s", __func__, ssh_err(r));
|
||||
|
||||
id = get_int();
|
||||
handle = get_handle();
|
||||
debug3("request %u: close handle %u", id, handle);
|
||||
handle_log_close(handle, NULL);
|
||||
ret = handle_close(handle);
|
||||
@@ -592,13 +609,14 @@ process_read(void)
|
||||
{
|
||||
char buf[64*1024];
|
||||
u_int32_t id, len;
|
||||
int handle, fd, ret, status = SSH2_FX_FAILURE;
|
||||
int r, handle, fd, ret, status = SSH2_FX_FAILURE;
|
||||
u_int64_t off;
|
||||
|
||||
id = get_int();
|
||||
handle = get_handle();
|
||||
off = get_int64();
|
||||
len = get_int();
|
||||
if ((r = sshbuf_get_u32(iqueue, &id)) != 0 ||
|
||||
(r = get_handle(iqueue, &handle)) != 0 ||
|
||||
(r = sshbuf_get_u64(iqueue, &off)) != 0 ||
|
||||
(r = sshbuf_get_u32(iqueue, &len)) != 0)
|
||||
fatal("%s: buffer error: %s", __func__, ssh_err(r));
|
||||
|
||||
debug("request %u: read \"%s\" (handle %d) off %llu len %d",
|
||||
id, handle_to_name(handle), handle, (unsigned long long)off, len);
|
||||
@@ -633,16 +651,17 @@ process_write(void)
|
||||
{
|
||||
u_int32_t id;
|
||||
u_int64_t off;
|
||||
u_int len;
|
||||
int handle, fd, ret, status;
|
||||
char *data;
|
||||
size_t len;
|
||||
int r, handle, fd, ret, status;
|
||||
u_char *data;
|
||||
|
||||
id = get_int();
|
||||
handle = get_handle();
|
||||
off = get_int64();
|
||||
data = get_string(&len);
|
||||
if ((r = sshbuf_get_u32(iqueue, &id)) != 0 ||
|
||||
(r = get_handle(iqueue, &handle)) != 0 ||
|
||||
(r = sshbuf_get_u64(iqueue, &off)) != 0 ||
|
||||
(r = sshbuf_get_string(iqueue, &data, &len)) != 0)
|
||||
fatal("%s: buffer error: %s", __func__, ssh_err(r));
|
||||
|
||||
debug("request %u: write \"%s\" (handle %d) off %llu len %d",
|
||||
debug("request %u: write \"%s\" (handle %d) off %llu len %zu",
|
||||
id, handle_to_name(handle), handle, (unsigned long long)off, len);
|
||||
fd = handle_to_fd(handle);
|
||||
|
||||
@@ -680,14 +699,16 @@ process_do_stat(int do_lstat)
|
||||
struct stat st;
|
||||
u_int32_t id;
|
||||
char *name;
|
||||
int ret, status = SSH2_FX_FAILURE;
|
||||
int r, status = SSH2_FX_FAILURE;
|
||||
|
||||
if ((r = sshbuf_get_u32(iqueue, &id)) != 0 ||
|
||||
(r = sshbuf_get_cstring(iqueue, &name, NULL)) != 0)
|
||||
fatal("%s: buffer error: %s", __func__, ssh_err(r));
|
||||
|
||||
id = get_int();
|
||||
name = get_string(NULL);
|
||||
debug3("request %u: %sstat", id, do_lstat ? "l" : "");
|
||||
verbose("%sstat name \"%s\"", do_lstat ? "l" : "", name);
|
||||
ret = do_lstat ? lstat(name, &st) : stat(name, &st);
|
||||
if (ret < 0) {
|
||||
r = do_lstat ? lstat(name, &st) : stat(name, &st);
|
||||
if (r < 0) {
|
||||
status = errno_to_portable(errno);
|
||||
} else {
|
||||
stat_to_attrib(&st, &a);
|
||||
@@ -717,16 +738,18 @@ process_fstat(void)
|
||||
Attrib a;
|
||||
struct stat st;
|
||||
u_int32_t id;
|
||||
int fd, ret, handle, status = SSH2_FX_FAILURE;
|
||||
int fd, r, handle, status = SSH2_FX_FAILURE;
|
||||
|
||||
if ((r = sshbuf_get_u32(iqueue, &id)) != 0 ||
|
||||
(r = get_handle(iqueue, &handle)) != 0)
|
||||
fatal("%s: buffer error: %s", __func__, ssh_err(r));
|
||||
|
||||
id = get_int();
|
||||
handle = get_handle();
|
||||
debug("request %u: fstat \"%s\" (handle %u)",
|
||||
id, handle_to_name(handle), handle);
|
||||
fd = handle_to_fd(handle);
|
||||
if (fd >= 0) {
|
||||
ret = fstat(fd, &st);
|
||||
if (ret < 0) {
|
||||
r = fstat(fd, &st);
|
||||
if (r < 0) {
|
||||
status = errno_to_portable(errno);
|
||||
} else {
|
||||
stat_to_attrib(&st, &a);
|
||||
@@ -753,48 +776,50 @@ attrib_to_tv(const Attrib *a)
|
||||
static void
|
||||
process_setstat(void)
|
||||
{
|
||||
Attrib *a;
|
||||
Attrib a;
|
||||
u_int32_t id;
|
||||
char *name;
|
||||
int status = SSH2_FX_OK, ret;
|
||||
int r, status = SSH2_FX_OK;
|
||||
|
||||
if ((r = sshbuf_get_u32(iqueue, &id)) != 0 ||
|
||||
(r = sshbuf_get_cstring(iqueue, &name, NULL)) != 0 ||
|
||||
(r = decode_attrib(iqueue, &a)) != 0)
|
||||
fatal("%s: buffer error: %s", __func__, ssh_err(r));
|
||||
|
||||
id = get_int();
|
||||
name = get_string(NULL);
|
||||
a = get_attrib();
|
||||
debug("request %u: setstat name \"%s\"", id, name);
|
||||
if (readonly) {
|
||||
status = SSH2_FX_PERMISSION_DENIED;
|
||||
a->flags = 0;
|
||||
a.flags = 0;
|
||||
}
|
||||
if (a->flags & SSH2_FILEXFER_ATTR_SIZE) {
|
||||
if (a.flags & SSH2_FILEXFER_ATTR_SIZE) {
|
||||
logit("set \"%s\" size %llu",
|
||||
name, (unsigned long long)a->size);
|
||||
ret = truncate(name, a->size);
|
||||
if (ret == -1)
|
||||
name, (unsigned long long)a.size);
|
||||
r = truncate(name, a.size);
|
||||
if (r == -1)
|
||||
status = errno_to_portable(errno);
|
||||
}
|
||||
if (a->flags & SSH2_FILEXFER_ATTR_PERMISSIONS) {
|
||||
logit("set \"%s\" mode %04o", name, a->perm);
|
||||
ret = chmod(name, a->perm & 07777);
|
||||
if (ret == -1)
|
||||
if (a.flags & SSH2_FILEXFER_ATTR_PERMISSIONS) {
|
||||
logit("set \"%s\" mode %04o", name, a.perm);
|
||||
r = chmod(name, a.perm & 07777);
|
||||
if (r == -1)
|
||||
status = errno_to_portable(errno);
|
||||
}
|
||||
if (a->flags & SSH2_FILEXFER_ATTR_ACMODTIME) {
|
||||
if (a.flags & SSH2_FILEXFER_ATTR_ACMODTIME) {
|
||||
char buf[64];
|
||||
time_t t = a->mtime;
|
||||
time_t t = a.mtime;
|
||||
|
||||
strftime(buf, sizeof(buf), "%Y%m%d-%H:%M:%S",
|
||||
localtime(&t));
|
||||
logit("set \"%s\" modtime %s", name, buf);
|
||||
ret = utimes(name, attrib_to_tv(a));
|
||||
if (ret == -1)
|
||||
r = utimes(name, attrib_to_tv(&a));
|
||||
if (r == -1)
|
||||
status = errno_to_portable(errno);
|
||||
}
|
||||
if (a->flags & SSH2_FILEXFER_ATTR_UIDGID) {
|
||||
if (a.flags & SSH2_FILEXFER_ATTR_UIDGID) {
|
||||
logit("set \"%s\" owner %lu group %lu", name,
|
||||
(u_long)a->uid, (u_long)a->gid);
|
||||
ret = chown(name, a->uid, a->gid);
|
||||
if (ret == -1)
|
||||
(u_long)a.uid, (u_long)a.gid);
|
||||
r = chown(name, a.uid, a.gid);
|
||||
if (r == -1)
|
||||
status = errno_to_portable(errno);
|
||||
}
|
||||
send_status(id, status);
|
||||
@@ -804,14 +829,16 @@ process_setstat(void)
|
||||
static void
|
||||
process_fsetstat(void)
|
||||
{
|
||||
Attrib *a;
|
||||
Attrib a;
|
||||
u_int32_t id;
|
||||
int handle, fd, ret;
|
||||
int handle, fd, r;
|
||||
int status = SSH2_FX_OK;
|
||||
|
||||
id = get_int();
|
||||
handle = get_handle();
|
||||
a = get_attrib();
|
||||
if ((r = sshbuf_get_u32(iqueue, &id)) != 0 ||
|
||||
(r = get_handle(iqueue, &handle)) != 0 ||
|
||||
(r = decode_attrib(iqueue, &a)) != 0)
|
||||
fatal("%s: buffer error: %s", __func__, ssh_err(r));
|
||||
|
||||
debug("request %u: fsetstat handle %d", id, handle);
|
||||
fd = handle_to_fd(handle);
|
||||
if (fd < 0)
|
||||
@@ -821,35 +848,35 @@ process_fsetstat(void)
|
||||
else {
|
||||
char *name = handle_to_name(handle);
|
||||
|
||||
if (a->flags & SSH2_FILEXFER_ATTR_SIZE) {
|
||||
if (a.flags & SSH2_FILEXFER_ATTR_SIZE) {
|
||||
logit("set \"%s\" size %llu",
|
||||
name, (unsigned long long)a->size);
|
||||
ret = ftruncate(fd, a->size);
|
||||
if (ret == -1)
|
||||
name, (unsigned long long)a.size);
|
||||
r = ftruncate(fd, a.size);
|
||||
if (r == -1)
|
||||
status = errno_to_portable(errno);
|
||||
}
|
||||
if (a->flags & SSH2_FILEXFER_ATTR_PERMISSIONS) {
|
||||
logit("set \"%s\" mode %04o", name, a->perm);
|
||||
ret = fchmod(fd, a->perm & 07777);
|
||||
if (ret == -1)
|
||||
if (a.flags & SSH2_FILEXFER_ATTR_PERMISSIONS) {
|
||||
logit("set \"%s\" mode %04o", name, a.perm);
|
||||
r = fchmod(fd, a.perm & 07777);
|
||||
if (r == -1)
|
||||
status = errno_to_portable(errno);
|
||||
}
|
||||
if (a->flags & SSH2_FILEXFER_ATTR_ACMODTIME) {
|
||||
if (a.flags & SSH2_FILEXFER_ATTR_ACMODTIME) {
|
||||
char buf[64];
|
||||
time_t t = a->mtime;
|
||||
time_t t = a.mtime;
|
||||
|
||||
strftime(buf, sizeof(buf), "%Y%m%d-%H:%M:%S",
|
||||
localtime(&t));
|
||||
logit("set \"%s\" modtime %s", name, buf);
|
||||
ret = futimes(fd, attrib_to_tv(a));
|
||||
if (ret == -1)
|
||||
r = futimes(fd, attrib_to_tv(&a));
|
||||
if (r == -1)
|
||||
status = errno_to_portable(errno);
|
||||
}
|
||||
if (a->flags & SSH2_FILEXFER_ATTR_UIDGID) {
|
||||
if (a.flags & SSH2_FILEXFER_ATTR_UIDGID) {
|
||||
logit("set \"%s\" owner %lu group %lu", name,
|
||||
(u_long)a->uid, (u_long)a->gid);
|
||||
ret = fchown(fd, a->uid, a->gid);
|
||||
if (ret == -1)
|
||||
(u_long)a.uid, (u_long)a.gid);
|
||||
r = fchown(fd, a.uid, a.gid);
|
||||
if (r == -1)
|
||||
status = errno_to_portable(errno);
|
||||
}
|
||||
}
|
||||
@@ -861,11 +888,13 @@ process_opendir(void)
|
||||
{
|
||||
DIR *dirp = NULL;
|
||||
char *path;
|
||||
int handle, status = SSH2_FX_FAILURE;
|
||||
int r, handle, status = SSH2_FX_FAILURE;
|
||||
u_int32_t id;
|
||||
|
||||
id = get_int();
|
||||
path = get_string(NULL);
|
||||
if ((r = sshbuf_get_u32(iqueue, &id)) != 0 ||
|
||||
(r = sshbuf_get_cstring(iqueue, &path, NULL)) != 0)
|
||||
fatal("%s: buffer error: %s", __func__, ssh_err(r));
|
||||
|
||||
debug3("request %u: opendir", id);
|
||||
logit("opendir \"%s\"", path);
|
||||
dirp = opendir(path);
|
||||
@@ -892,11 +921,13 @@ process_readdir(void)
|
||||
DIR *dirp;
|
||||
struct dirent *dp;
|
||||
char *path;
|
||||
int handle;
|
||||
int r, handle;
|
||||
u_int32_t id;
|
||||
|
||||
id = get_int();
|
||||
handle = get_handle();
|
||||
if ((r = sshbuf_get_u32(iqueue, &id)) != 0 ||
|
||||
(r = get_handle(iqueue, &handle)) != 0)
|
||||
fatal("%s: buffer error: %s", __func__, ssh_err(r));
|
||||
|
||||
debug("request %u: readdir \"%s\" (handle %d)", id,
|
||||
handle_to_name(handle), handle);
|
||||
dirp = handle_to_dir(handle);
|
||||
@@ -947,18 +978,19 @@ process_remove(void)
|
||||
{
|
||||
char *name;
|
||||
u_int32_t id;
|
||||
int status = SSH2_FX_FAILURE;
|
||||
int ret;
|
||||
int r, status = SSH2_FX_FAILURE;
|
||||
|
||||
if ((r = sshbuf_get_u32(iqueue, &id)) != 0 ||
|
||||
(r = sshbuf_get_cstring(iqueue, &name, NULL)) != 0)
|
||||
fatal("%s: buffer error: %s", __func__, ssh_err(r));
|
||||
|
||||
id = get_int();
|
||||
name = get_string(NULL);
|
||||
debug3("request %u: remove", id);
|
||||
logit("remove name \"%s\"", name);
|
||||
if (readonly)
|
||||
status = SSH2_FX_PERMISSION_DENIED;
|
||||
else {
|
||||
ret = unlink(name);
|
||||
status = (ret == -1) ? errno_to_portable(errno) : SSH2_FX_OK;
|
||||
r = unlink(name);
|
||||
status = (r == -1) ? errno_to_portable(errno) : SSH2_FX_OK;
|
||||
}
|
||||
send_status(id, status);
|
||||
xfree(name);
|
||||
@@ -967,23 +999,25 @@ process_remove(void)
|
||||
static void
|
||||
process_mkdir(void)
|
||||
{
|
||||
Attrib *a;
|
||||
Attrib a;
|
||||
u_int32_t id;
|
||||
char *name;
|
||||
int ret, mode, status = SSH2_FX_FAILURE;
|
||||
int r, mode, status = SSH2_FX_FAILURE;
|
||||
|
||||
id = get_int();
|
||||
name = get_string(NULL);
|
||||
a = get_attrib();
|
||||
mode = (a->flags & SSH2_FILEXFER_ATTR_PERMISSIONS) ?
|
||||
a->perm & 07777 : 0777;
|
||||
if ((r = sshbuf_get_u32(iqueue, &id)) != 0 ||
|
||||
(r = sshbuf_get_cstring(iqueue, &name, NULL)) != 0 ||
|
||||
(r = decode_attrib(iqueue, &a)) != 0)
|
||||
fatal("%s: buffer error: %s", __func__, ssh_err(r));
|
||||
|
||||
mode = (a.flags & SSH2_FILEXFER_ATTR_PERMISSIONS) ?
|
||||
a.perm & 07777 : 0777;
|
||||
debug3("request %u: mkdir", id);
|
||||
logit("mkdir name \"%s\" mode 0%o", name, mode);
|
||||
if (readonly)
|
||||
status = SSH2_FX_PERMISSION_DENIED;
|
||||
else {
|
||||
ret = mkdir(name, mode);
|
||||
status = (ret == -1) ? errno_to_portable(errno) : SSH2_FX_OK;
|
||||
r = mkdir(name, mode);
|
||||
status = (r == -1) ? errno_to_portable(errno) : SSH2_FX_OK;
|
||||
}
|
||||
send_status(id, status);
|
||||
xfree(name);
|
||||
@@ -994,17 +1028,19 @@ process_rmdir(void)
|
||||
{
|
||||
u_int32_t id;
|
||||
char *name;
|
||||
int ret, status;
|
||||
int r, status;
|
||||
|
||||
if ((r = sshbuf_get_u32(iqueue, &id)) != 0 ||
|
||||
(r = sshbuf_get_cstring(iqueue, &name, NULL)) != 0)
|
||||
fatal("%s: buffer error: %s", __func__, ssh_err(r));
|
||||
|
||||
id = get_int();
|
||||
name = get_string(NULL);
|
||||
debug3("request %u: rmdir", id);
|
||||
logit("rmdir name \"%s\"", name);
|
||||
if (readonly)
|
||||
status = SSH2_FX_PERMISSION_DENIED;
|
||||
else {
|
||||
ret = rmdir(name);
|
||||
status = (ret == -1) ? errno_to_portable(errno) : SSH2_FX_OK;
|
||||
r = rmdir(name);
|
||||
status = (r == -1) ? errno_to_portable(errno) : SSH2_FX_OK;
|
||||
}
|
||||
send_status(id, status);
|
||||
xfree(name);
|
||||
@@ -1016,9 +1052,12 @@ process_realpath(void)
|
||||
char resolvedname[MAXPATHLEN];
|
||||
u_int32_t id;
|
||||
char *path;
|
||||
int r;
|
||||
|
||||
if ((r = sshbuf_get_u32(iqueue, &id)) != 0 ||
|
||||
(r = sshbuf_get_cstring(iqueue, &path, NULL)) != 0)
|
||||
fatal("%s: buffer error: %s", __func__, ssh_err(r));
|
||||
|
||||
id = get_int();
|
||||
path = get_string(NULL);
|
||||
if (path[0] == '\0') {
|
||||
xfree(path);
|
||||
path = xstrdup(".");
|
||||
@@ -1041,12 +1080,14 @@ process_rename(void)
|
||||
{
|
||||
u_int32_t id;
|
||||
char *oldpath, *newpath;
|
||||
int status;
|
||||
int r, status;
|
||||
struct stat sb;
|
||||
|
||||
id = get_int();
|
||||
oldpath = get_string(NULL);
|
||||
newpath = get_string(NULL);
|
||||
if ((r = sshbuf_get_u32(iqueue, &id)) != 0 ||
|
||||
(r = sshbuf_get_cstring(iqueue, &oldpath, NULL)) != 0 ||
|
||||
(r = sshbuf_get_cstring(iqueue, &newpath, NULL)) != 0)
|
||||
fatal("%s: buffer error: %s", __func__, ssh_err(r));
|
||||
|
||||
debug3("request %u: rename", id);
|
||||
logit("rename old \"%s\" new \"%s\"", oldpath, newpath);
|
||||
status = SSH2_FX_FAILURE;
|
||||
@@ -1095,12 +1136,14 @@ static void
|
||||
process_readlink(void)
|
||||
{
|
||||
u_int32_t id;
|
||||
int len;
|
||||
int r, len;
|
||||
char buf[MAXPATHLEN];
|
||||
char *path;
|
||||
|
||||
id = get_int();
|
||||
path = get_string(NULL);
|
||||
if ((r = sshbuf_get_u32(iqueue, &id)) != 0 ||
|
||||
(r = sshbuf_get_cstring(iqueue, &path, NULL)) != 0)
|
||||
fatal("%s: buffer error: %s", __func__, ssh_err(r));
|
||||
|
||||
debug3("request %u: readlink", id);
|
||||
verbose("readlink \"%s\"", path);
|
||||
if ((len = readlink(path, buf, sizeof(buf) - 1)) == -1)
|
||||
@@ -1121,19 +1164,21 @@ process_symlink(void)
|
||||
{
|
||||
u_int32_t id;
|
||||
char *oldpath, *newpath;
|
||||
int ret, status;
|
||||
int r, status;
|
||||
|
||||
if ((r = sshbuf_get_u32(iqueue, &id)) != 0 ||
|
||||
(r = sshbuf_get_cstring(iqueue, &oldpath, NULL)) != 0 ||
|
||||
(r = sshbuf_get_cstring(iqueue, &newpath, NULL)) != 0)
|
||||
fatal("%s: buffer error: %s", __func__, ssh_err(r));
|
||||
|
||||
id = get_int();
|
||||
oldpath = get_string(NULL);
|
||||
newpath = get_string(NULL);
|
||||
debug3("request %u: symlink", id);
|
||||
logit("symlink old \"%s\" new \"%s\"", oldpath, newpath);
|
||||
/* this will fail if 'newpath' exists */
|
||||
if (readonly)
|
||||
status = SSH2_FX_PERMISSION_DENIED;
|
||||
else {
|
||||
ret = symlink(oldpath, newpath);
|
||||
status = (ret == -1) ? errno_to_portable(errno) : SSH2_FX_OK;
|
||||
r = symlink(oldpath, newpath);
|
||||
status = (r == -1) ? errno_to_portable(errno) : SSH2_FX_OK;
|
||||
}
|
||||
send_status(id, status);
|
||||
xfree(oldpath);
|
||||
@@ -1144,17 +1189,19 @@ static void
|
||||
process_extended_posix_rename(u_int32_t id)
|
||||
{
|
||||
char *oldpath, *newpath;
|
||||
int ret, status;
|
||||
int r, status;
|
||||
|
||||
if ((r = sshbuf_get_cstring(iqueue, &oldpath, NULL)) != 0 ||
|
||||
(r = sshbuf_get_cstring(iqueue, &newpath, NULL)) != 0)
|
||||
fatal("%s: buffer error: %s", __func__, ssh_err(r));
|
||||
|
||||
oldpath = get_string(NULL);
|
||||
newpath = get_string(NULL);
|
||||
debug3("request %u: posix-rename", id);
|
||||
logit("posix-rename old \"%s\" new \"%s\"", oldpath, newpath);
|
||||
if (readonly)
|
||||
status = SSH2_FX_PERMISSION_DENIED;
|
||||
else {
|
||||
ret = rename(oldpath, newpath);
|
||||
status = (ret == -1) ? errno_to_portable(errno) : SSH2_FX_OK;
|
||||
r = rename(oldpath, newpath);
|
||||
status = (r == -1) ? errno_to_portable(errno) : SSH2_FX_OK;
|
||||
}
|
||||
send_status(id, status);
|
||||
xfree(oldpath);
|
||||
@@ -1166,8 +1213,10 @@ process_extended_statvfs(u_int32_t id)
|
||||
{
|
||||
char *path;
|
||||
struct statvfs st;
|
||||
int r;
|
||||
|
||||
path = get_string(NULL);
|
||||
if ((r = sshbuf_get_cstring(iqueue, &path, NULL)) != 0)
|
||||
fatal("%s: buffer error: %s", __func__, ssh_err(r));
|
||||
debug3("request %u: statfs", id);
|
||||
logit("statfs \"%s\"", path);
|
||||
|
||||
@@ -1181,10 +1230,11 @@ process_extended_statvfs(u_int32_t id)
|
||||
static void
|
||||
process_extended_fstatvfs(u_int32_t id)
|
||||
{
|
||||
int handle, fd;
|
||||
int r, handle, fd;
|
||||
struct statvfs st;
|
||||
|
||||
handle = get_handle();
|
||||
if ((r = get_handle(iqueue, &handle)) != 0)
|
||||
fatal("%s: buffer error: %s", __func__, ssh_err(r));
|
||||
debug("request %u: fstatvfs \"%s\" (handle %u)",
|
||||
id, handle_to_name(handle), handle);
|
||||
if ((fd = handle_to_fd(handle)) < 0) {
|
||||
@@ -1201,17 +1251,19 @@ static void
|
||||
process_extended_hardlink(u_int32_t id)
|
||||
{
|
||||
char *oldpath, *newpath;
|
||||
int ret, status;
|
||||
int r, status;
|
||||
|
||||
if ((r = sshbuf_get_cstring(iqueue, &oldpath, NULL)) != 0 ||
|
||||
(r = sshbuf_get_cstring(iqueue, &newpath, NULL)) != 0)
|
||||
fatal("%s: buffer error: %s", __func__, ssh_err(r));
|
||||
|
||||
oldpath = get_string(NULL);
|
||||
newpath = get_string(NULL);
|
||||
debug3("request %u: hardlink", id);
|
||||
logit("hardlink old \"%s\" new \"%s\"", oldpath, newpath);
|
||||
if (readonly)
|
||||
status = SSH2_FX_PERMISSION_DENIED;
|
||||
else {
|
||||
ret = link(oldpath, newpath);
|
||||
status = (ret == -1) ? errno_to_portable(errno) : SSH2_FX_OK;
|
||||
r = link(oldpath, newpath);
|
||||
status = (r == -1) ? errno_to_portable(errno) : SSH2_FX_OK;
|
||||
}
|
||||
send_status(id, status);
|
||||
xfree(oldpath);
|
||||
@@ -1223,9 +1275,12 @@ process_extended(void)
|
||||
{
|
||||
u_int32_t id;
|
||||
char *request;
|
||||
int r;
|
||||
|
||||
if ((r = sshbuf_get_u32(iqueue, &id)) != 0 ||
|
||||
(r = sshbuf_get_cstring(iqueue, &request, NULL)) != 0)
|
||||
fatal("%s: buffer error: %s", __func__, ssh_err(r));
|
||||
|
||||
id = get_int();
|
||||
request = get_string(NULL);
|
||||
if (strcmp(request, "posix-rename@openssh.com") == 0)
|
||||
process_extended_posix_rename(id);
|
||||
else if (strcmp(request, "statvfs@openssh.com") == 0)
|
||||
@@ -1247,13 +1302,13 @@ process(void)
|
||||
u_int msg_len;
|
||||
u_int buf_len;
|
||||
u_int consumed;
|
||||
u_int type;
|
||||
u_char *cp;
|
||||
u_char type, *cp;
|
||||
int r;
|
||||
|
||||
buf_len = buffer_len(&iqueue);
|
||||
buf_len = sshbuf_len(iqueue);
|
||||
if (buf_len < 5)
|
||||
return; /* Incomplete message. */
|
||||
cp = buffer_ptr(&iqueue);
|
||||
cp = sshbuf_ptr(iqueue);
|
||||
msg_len = get_u32(cp);
|
||||
if (msg_len > SFTP_MAX_MSG_LENGTH) {
|
||||
error("bad message from %s local user %s",
|
||||
@@ -1262,9 +1317,11 @@ process(void)
|
||||
}
|
||||
if (buf_len < msg_len + 4)
|
||||
return;
|
||||
buffer_consume(&iqueue, 4);
|
||||
if ((r = sshbuf_consume(iqueue, 4)) != 0)
|
||||
fatal("%s: buffer error: %s", __func__, ssh_err(r));
|
||||
buf_len -= 4;
|
||||
type = buffer_get_char(&iqueue);
|
||||
if ((r = sshbuf_get_u8(iqueue, &type)) != 0)
|
||||
fatal("%s: buffer error: %s", __func__, ssh_err(r));
|
||||
switch (type) {
|
||||
case SSH2_FXP_INIT:
|
||||
process_init();
|
||||
@@ -1331,17 +1388,18 @@ process(void)
|
||||
break;
|
||||
}
|
||||
/* discard the remaining bytes from the current packet */
|
||||
if (buf_len < buffer_len(&iqueue)) {
|
||||
if (buf_len < sshbuf_len(iqueue)) {
|
||||
error("iqueue grew unexpectedly");
|
||||
sftp_server_cleanup_exit(255);
|
||||
}
|
||||
consumed = buf_len - buffer_len(&iqueue);
|
||||
consumed = buf_len - sshbuf_len(iqueue);
|
||||
if (msg_len < consumed) {
|
||||
error("msg_len %d < consumed %d", msg_len, consumed);
|
||||
sftp_server_cleanup_exit(255);
|
||||
}
|
||||
if (msg_len > consumed)
|
||||
buffer_consume(&iqueue, msg_len - consumed);
|
||||
if (msg_len > consumed &&
|
||||
(r = sshbuf_consume(iqueue, msg_len - consumed)) != 0)
|
||||
fatal("%s: buffer error: %s", __func__, ssh_err(r));
|
||||
}
|
||||
|
||||
/* Cleanup handler that logs active handles upon normal exit */
|
||||
@@ -1371,7 +1429,7 @@ int
|
||||
sftp_server_main(int argc, char **argv, struct passwd *user_pw)
|
||||
{
|
||||
fd_set *rset, *wset;
|
||||
int in, out, max, ch, skipargs = 0, log_stderr = 0;
|
||||
int r, in, out, max, ch, skipargs = 0, log_stderr = 0;
|
||||
ssize_t len, olen, set_size;
|
||||
SyslogFacility log_facility = SYSLOG_FACILITY_AUTH;
|
||||
char *cp, buf[4*4096];
|
||||
@@ -1448,8 +1506,10 @@ sftp_server_main(int argc, char **argv, struct passwd *user_pw)
|
||||
if (out > max)
|
||||
max = out;
|
||||
|
||||
buffer_init(&iqueue);
|
||||
buffer_init(&oqueue);
|
||||
if ((iqueue = sshbuf_new()) == NULL)
|
||||
fatal("%s: sshbuf_new failed", __func__);
|
||||
if ((oqueue = sshbuf_new()) == NULL)
|
||||
fatal("%s: sshbuf_new failed", __func__);
|
||||
|
||||
set_size = howmany(max + 1, NFDBITS) * sizeof(fd_mask);
|
||||
rset = (fd_set *)xmalloc(set_size);
|
||||
@@ -1464,11 +1524,15 @@ sftp_server_main(int argc, char **argv, struct passwd *user_pw)
|
||||
* the worst-case length packet it can generate,
|
||||
* otherwise apply backpressure by stopping reads.
|
||||
*/
|
||||
if (buffer_check_alloc(&iqueue, sizeof(buf)) &&
|
||||
buffer_check_alloc(&oqueue, SFTP_MAX_MSG_LENGTH))
|
||||
if ((r = sshbuf_check_reserve(iqueue, sizeof(buf))) == 0 &&
|
||||
(r = sshbuf_check_reserve(oqueue,
|
||||
SFTP_MAX_MSG_LENGTH)) == 0)
|
||||
FD_SET(in, rset);
|
||||
else if (r != SSH_ERR_NO_BUFFER_SPACE)
|
||||
fatal("%s: sshbuf_check_reserve failed: %s",
|
||||
__func__, ssh_err(r));
|
||||
|
||||
olen = buffer_len(&oqueue);
|
||||
olen = sshbuf_len(oqueue);
|
||||
if (olen > 0)
|
||||
FD_SET(out, wset);
|
||||
|
||||
@@ -1488,18 +1552,20 @@ sftp_server_main(int argc, char **argv, struct passwd *user_pw)
|
||||
} else if (len < 0) {
|
||||
error("read: %s", strerror(errno));
|
||||
sftp_server_cleanup_exit(1);
|
||||
} else {
|
||||
buffer_append(&iqueue, buf, len);
|
||||
} else if ((r = sshbuf_put(iqueue, buf, len)) != 0) {
|
||||
fatal("%s: buffer error: %s",
|
||||
__func__, ssh_err(r));
|
||||
}
|
||||
}
|
||||
/* send oqueue to stdout */
|
||||
if (FD_ISSET(out, wset)) {
|
||||
len = write(out, buffer_ptr(&oqueue), olen);
|
||||
len = write(out, sshbuf_ptr(oqueue), olen);
|
||||
if (len < 0) {
|
||||
error("write: %s", strerror(errno));
|
||||
sftp_server_cleanup_exit(1);
|
||||
} else {
|
||||
buffer_consume(&oqueue, len);
|
||||
} else if ((r = sshbuf_consume(oqueue, len)) != 0) {
|
||||
fatal("%s: buffer error: %s",
|
||||
__func__, ssh_err(r));
|
||||
}
|
||||
}
|
||||
|
||||
@@ -1508,7 +1574,11 @@ sftp_server_main(int argc, char **argv, struct passwd *user_pw)
|
||||
* into the output buffer, otherwise stop processing input
|
||||
* and let the output queue drain.
|
||||
*/
|
||||
if (buffer_check_alloc(&oqueue, SFTP_MAX_MSG_LENGTH))
|
||||
r = sshbuf_check_reserve(oqueue, SFTP_MAX_MSG_LENGTH);
|
||||
if (r == 0)
|
||||
process();
|
||||
else if (r != SSH_ERR_NO_BUFFER_SPACE)
|
||||
fatal("%s: sshbuf_check_reserve: %s",
|
||||
__func__, ssh_err(r));
|
||||
}
|
||||
}
|
||||
|
||||
@@ -43,7 +43,8 @@
|
||||
#include "misc.h"
|
||||
|
||||
#include "sftp.h"
|
||||
#include "buffer.h"
|
||||
#include "err.h"
|
||||
#include "sshbuf.h"
|
||||
#include "sftp-common.h"
|
||||
#include "sftp-client.h"
|
||||
|
||||
|
||||
Reference in New Issue
Block a user