/* * Copyright (c) 1983 The Regents of the University of California. * All rights reserved. * * Redistribution and use in source and binary forms are permitted * provided that the above copyright notice and this paragraph are * duplicated in all such forms and that any documentation, * advertising materials, and other materials related to such * distribution and use acknowledge that the software was developed * by the University of California, Berkeley. The name of the * University may not be used to endorse or promote products derived * from this software without specific prior written permission. * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. */ #if !defined(lint) && defined(DOSCCS) char copyright[] = "@(#) Copyright (c) 1983 The Regents of the University of California.\n\ All rights reserved.\n"; static char sccsid[] = "@(#)rcp.c 5.20.1 (2.11BSD) 1996/3/21"; #endif /* not lint */ /* * rcp */ #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include "pathnames.h" #ifdef KERBEROS #include char krb_realm[REALM_SZ]; int use_kerberos = 1, encrypt = 0; CREDENTIALS cred; Key_schedule schedule; #endif extern int errno; struct passwd *pwd; int errs, pflag, port, rem, userid; int iamremote, iamrecursive, targetshouldbedirectory; #define CMDNEEDS 20 char cmd[CMDNEEDS]; /* must hold "rcp -r -p -d\0" */ typedef struct _buf { int cnt; char *buf; } BUF; main(argc, argv) int argc; char **argv; { extern int optind; struct servent *sp; int ch, fflag, tflag; char *targ, *colon(); struct passwd *getpwuid(); int lostconn(); #ifdef KERBEROS sp = getservbyname("kshell", "tcp"); if (sp == NULL) { use_kerberos = 0; old_warning("kshell service unknown"); sp = getservbyname("kshell", "tcp"); } #else sp = getservbyname("shell", "tcp"); #endif if (!sp) { (void)fprintf(stderr, "rcp: shell/tcp: unknown service\n"); exit(1); } port = sp->s_port; if (!(pwd = getpwuid(userid = getuid()))) { (void)fprintf(stderr, "rcp: unknown user %d.\n", userid); exit(1); } fflag = tflag = 0; while ((ch = getopt(argc, argv, "dfkprtx")) != EOF) switch(ch) { case 'd': targetshouldbedirectory = 1; break; case 'f': /* "from" */ fflag = 1; break; #ifdef KERBEROS case 'k': strncpy(krb_realm, ++argv, REALM_SZ); break; #endif case 'p': /* preserve access/mod times */ ++pflag; break; case 'r': ++iamrecursive; break; case 't': /* "to" */ tflag = 1; break; #ifdef KERBEROS case 'x': encrypt = 1; des_set_key(cred.session, schedule); break; #endif case '?': default: usage(); } argc -= optind; argv += optind; if (fflag) { iamremote = 1; (void)response(); (void)setuid(userid); source(argc, argv); exit(errs); } if (tflag) { iamremote = 1; (void)setuid(userid); sink(argc, argv); exit(errs); } if (argc < 2) usage(); if (argc > 2) targetshouldbedirectory = 1; rem = -1; (void)sprintf(cmd, "rcp%s%s%s", iamrecursive ? " -r" : "", pflag ? " -p" : "", targetshouldbedirectory ? " -d" : ""); (void)signal(SIGPIPE, lostconn); if (targ = colon(argv[argc - 1])) toremote(targ, argc, argv); else { tolocal(argc, argv); if (targetshouldbedirectory) verifydir(argv[argc - 1]); } exit(errs); } toremote(targ, argc, argv) char *targ; int argc; char **argv; { int i; char *bp, *host, *src, *suser, *thost, *tuser; char *colon(), *malloc(); *targ++ = 0; if (*targ == 0) targ = "."; if (thost = index(argv[argc - 1], '@')) { *thost++ = 0; tuser = argv[argc - 1]; if (*tuser == '\0') tuser = NULL; else if (!okname(tuser)) exit(1); } else { thost = argv[argc - 1]; tuser = NULL; } for (i = 0; i < argc - 1; i++) { src = colon(argv[i]); if (src) { /* remote to remote */ *src++ = 0; if (*src == 0) src = "."; host = index(argv[i], '@'); if (!(bp = malloc((u_int)(strlen(_PATH_RSH) + strlen(argv[i]) + strlen(src) + strlen(tuser) + strlen(thost) + strlen(targ)) + CMDNEEDS + 20))) nospace(); if (host) { *host++ = 0; suser = argv[i]; if (*suser == '\0') suser = pwd->pw_name; else if (!okname(suser)) continue; (void)sprintf(bp, "%s %s -l %s -n %s %s '%s%s%s:%s'", _PATH_RSH, host, suser, cmd, src, tuser ? tuser : "", tuser ? "@" : "", thost, targ); } else (void)sprintf(bp, "%s %s -n %s %s '%s%s%s:%s'", _PATH_RSH, argv[i], cmd, src, tuser ? tuser : "", tuser ? "@" : "", thost, targ); (void)susystem(bp); (void)free(bp); } else { /* local to remote */ if (rem == -1) { if (!(bp = malloc((u_int)strlen(targ) + CMDNEEDS + 20))) nospace(); (void)sprintf(bp, "%s -t %s", cmd, targ); host = thost; #ifdef KERBEROS if (use_kerberos) kerberos(bp, tuser ? tuser : pwd->pw_name); else #endif rem = rcmd(&host, port, pwd->pw_name, tuser ? tuser : pwd->pw_name, bp, 0); if (rem < 0) exit(1); if (response() < 0) exit(1); (void)free(bp); (void)setuid(userid); } source(1, argv+i); } } } tolocal(argc, argv) int argc; char **argv; { int i; char *bp, *host, *src, *suser; char *colon(), *malloc(); for (i = 0; i < argc - 1; i++) { if (!(src = colon(argv[i]))) { /* local to local */ if (!(bp = malloc((u_int)(strlen(_PATH_CP) + strlen(argv[i]) + strlen(argv[argc - 1])) + 20))) nospace(); (void)sprintf(bp, "%s%s%s %s %s", _PATH_CP, iamrecursive ? " -r" : "", pflag ? " -p" : "", argv[i], argv[argc - 1]); (void)susystem(bp); (void)free(bp); continue; } *src++ = 0; if (*src == 0) src = "."; host = index(argv[i], '@'); if (host) { *host++ = 0; suser = argv[i]; if (*suser == '\0') suser = pwd->pw_name; else if (!okname(suser)) continue; } else { host = argv[i]; suser = pwd->pw_name; } if (!(bp = malloc((u_int)(strlen(src)) + CMDNEEDS + 20))) nospace(); (void)sprintf(bp, "%s -f %s", cmd, src); #ifdef KERBEROS if (use_kerberos) kerberos(bp, suser); else #endif rem = rcmd(&host, port, pwd->pw_name, suser, bp, 0); (void)free(bp); if (rem < 0) continue; (void)setreuid(0, userid); sink(1, argv + argc - 1); (void)setreuid(userid, 0); (void)close(rem); rem = -1; } } #ifdef KERBEROS kerberos(bp, user) char *bp, *user; { struct servent *sp; char *host; again: rem = KSUCCESS; if (krb_realm[0] == '\0') rem = krb_get_lrealm(krb_realm, 1); if (rem == KSUCCESS) { if (encrypt) rem = krcmd_mutual(&host, port, user, bp, 0, krb_realm, &cred, schedule); else rem = krcmd(&host, port, user, bp, 0, krb_realm); } else { (void)fprintf(stderr, "rcp: error getting local realm %s\n", krb_err_txt[rem]); exit(1); } if (rem < 0 && errno == ECONNREFUSED) { use_kerberos = 0; old_warning("remote host doesn't support Kerberos"); sp = getservbyname("shell", "tcp"); if (sp == NULL) { (void)fprintf(stderr, "rcp: unknown service shell/tcp\n"); exit(1); } port = sp->s_port; goto again; } } #endif /* KERBEROS */ verifydir(cp) char *cp; { struct stat stb; if (stat(cp, &stb) >= 0) { if ((stb.st_mode & S_IFMT) == S_IFDIR) return; errno = ENOTDIR; } error("rcp: %s: %s.\n", cp, strerror(errno)); exit(1); } char * colon(cp) register char *cp; { for (; *cp; ++cp) { if (*cp == ':') return(cp); if (*cp == '/') return(0); } return(0); } okname(cp0) char *cp0; { register char *cp = cp0; register int c; do { c = *cp; if (c & 0200) goto bad; if (!isalpha(c) && !isdigit(c) && c != '_' && c != '-') goto bad; } while (*++cp); return(1); bad: (void)fprintf(stderr, "rcp: invalid user name %s\n", cp0); return(0); } susystem(s) char *s; { int status, pid, w; register int (*istat)(), (*qstat)(); if ((pid = vfork()) == 0) { (void)setuid(userid); execl(_PATH_BSHELL, "sh", "-c", s, (char *)0); _exit(127); } istat = signal(SIGINT, SIG_IGN); qstat = signal(SIGQUIT, SIG_IGN); while ((w = wait(&status)) != pid && w != -1) ; if (w == -1) status = -1; (void)signal(SIGINT, istat); (void)signal(SIGQUIT, qstat); return(status); } source(argc, argv) int argc; char **argv; { struct stat stb; static BUF buffer; BUF *bp; off_t i; int x, readerr, f, amt; char *last, *name, buf[BUFSIZ]; BUF *allocbuf(); for (x = 0; x < argc; x++) { name = argv[x]; if ((f = open(name, O_RDONLY, 0)) < 0) { error("rcp: %s: %s\n", name, strerror(errno)); continue; } if (fstat(f, &stb) < 0) goto notreg; switch (stb.st_mode&S_IFMT) { case S_IFREG: break; case S_IFDIR: if (iamrecursive) { (void)close(f); rsource(name, &stb); continue; } /* FALLTHROUGH */ default: notreg: (void)close(f); error("rcp: %s: not a plain file\n", name); continue; } last = rindex(name, '/'); if (last == 0) last = name; else last++; if (pflag) { /* * Make it compatible with possible future * versions expecting microseconds. */ (void)sprintf(buf, "T%ld 0 %ld 0\n", stb.st_mtime, stb.st_atime); (void)write(rem, buf, strlen(buf)); if (response() < 0) { (void)close(f); continue; } } (void)sprintf(buf, "C%04o %ld %s\n", stb.st_mode&07777, stb.st_size, last); (void)write(rem, buf, strlen(buf)); if (response() < 0) { (void)close(f); continue; } if ((bp = allocbuf(&buffer, f, BUFSIZ)) == 0) { (void)close(f); continue; } readerr = 0; for (i = 0; i < stb.st_size; i += bp->cnt) { amt = bp->cnt; if (i + amt > stb.st_size) amt = stb.st_size - i; if (readerr == 0 && read(f, bp->buf, amt) != amt) readerr = errno; (void)write(rem, bp->buf, amt); } (void)close(f); if (readerr == 0) (void)write(rem, "", 1); else error("rcp: %s: %s\n", name, strerror(readerr)); (void)response(); } } rsource(name, statp) char *name; struct stat *statp; { DIR *d; struct direct *dp; char *last, *vect[1], path[MAXPATHLEN]; if (!(d = opendir(name))) { error("rcp: %s: %s\n", name, strerror(errno)); return; } last = rindex(name, '/'); if (last == 0) last = name; else last++; if (pflag) { (void)sprintf(path, "T%ld 0 %ld 0\n", statp->st_mtime, statp->st_atime); (void)write(rem, path, strlen(path)); if (response() < 0) { closedir(d); return; } } (void)sprintf(path, "D%04o %d %s\n", statp->st_mode&07777, 0, last); (void)write(rem, path, strlen(path)); if (response() < 0) { closedir(d); return; } while (dp = readdir(d)) { if (dp->d_ino == 0) continue; if (!strcmp(dp->d_name, ".") || !strcmp(dp->d_name, "..")) continue; if (strlen(name) + 1 + strlen(dp->d_name) >= MAXPATHLEN - 1) { error("%s/%s: name too long.\n", name, dp->d_name); continue; } (void)sprintf(path, "%s/%s", name, dp->d_name); vect[0] = path; source(1, vect); } closedir(d); (void)write(rem, "E\n", 2); (void)response(); } response() { register char *cp; char ch, resp, rbuf[BUFSIZ]; if (read(rem, &resp, sizeof(resp)) != sizeof(resp)) lostconn(); cp = rbuf; switch(resp) { case 0: /* ok */ return(0); default: *cp++ = resp; /* FALLTHROUGH */ case 1: /* error, followed by err msg */ case 2: /* fatal error, "" */ do { if (read(rem, &ch, sizeof(ch)) != sizeof(ch)) lostconn(); *cp++ = ch; } while (cp < &rbuf[BUFSIZ] && ch != '\n'); if (!iamremote) (void)write(2, rbuf, cp - rbuf); ++errs; if (resp == 1) return(-1); exit(1); } /*NOTREACHED*/ } lostconn() { if (!iamremote) (void)fprintf(stderr, "rcp: lost connection\n"); exit(1); } sink(argc, argv) int argc; char **argv; { register char *cp; static BUF buffer; struct stat stb; struct timeval tv[2]; BUF *bp, *allocbuf(); off_t i, j; char ch, *targ, *why; int amt, count, exists, first, mask, mode; int ofd, setimes, targisdir, wrerr, cursize = 0; off_t size; char *np, *vect[1], buf[BUFSIZ], *malloc(), *namebuf = NULL; #define atime tv[0] #define mtime tv[1] #define SCREWUP(str) { why = str; goto screwup; } setimes = targisdir = 0; mask = umask(0); if (!pflag) (void)umask(mask); if (argc != 1) { error("rcp: ambiguous target\n"); exit(1); } targ = *argv; if (targetshouldbedirectory) verifydir(targ); (void)write(rem, "", 1); if (stat(targ, &stb) == 0 && (stb.st_mode & S_IFMT) == S_IFDIR) targisdir = 1; for (first = 1;; first = 0) { cp = buf; if (read(rem, cp, 1) <= 0) { if (namebuf) free(namebuf); return; } if (*cp++ == '\n') SCREWUP("unexpected "); do { if (read(rem, &ch, sizeof(ch)) != sizeof(ch)) SCREWUP("lost connection"); *cp++ = ch; } while (cp < &buf[BUFSIZ - 1] && ch != '\n'); *cp = 0; if (buf[0] == '\01' || buf[0] == '\02') { if (iamremote == 0) (void)write(2, buf + 1, strlen(buf + 1)); if (buf[0] == '\02') exit(1); errs++; continue; } if (buf[0] == 'E') { (void)write(rem, "", 1); if (namebuf) free(namebuf); return; } if (ch == '\n') *--cp = 0; #define getnum(t) (t) = 0; while (isdigit(*cp)) (t) = (t) * 10 + (*cp++ - '0'); cp = buf; if (*cp == 'T') { setimes++; cp++; getnum(mtime.tv_sec); if (*cp++ != ' ') SCREWUP("mtime.sec not delimited"); getnum(mtime.tv_usec); if (*cp++ != ' ') SCREWUP("mtime.usec not delimited"); getnum(atime.tv_sec); if (*cp++ != ' ') SCREWUP("atime.sec not delimited"); getnum(atime.tv_usec); if (*cp++ != '\0') SCREWUP("atime.usec not delimited"); (void)write(rem, "", 1); continue; } if (*cp != 'C' && *cp != 'D') { /* * Check for the case "rcp remote:foo\* local:bar". * In this case, the line "No match." can be returned * by the shell before the rcp command on the remote is * executed so the ^Aerror_message convention isn't * followed. */ if (first) { error("%s\n", cp); exit(1); } SCREWUP("expected control record"); } mode = 0; for (++cp; cp < buf + 5; cp++) { if (*cp < '0' || *cp > '7') SCREWUP("bad mode"); mode = (mode << 3) | (*cp - '0'); } if (*cp++ != ' ') SCREWUP("mode not delimited"); size = 0; while (isdigit(*cp)) size = size * 10 + (*cp++ - '0'); if (*cp++ != ' ') SCREWUP("size not delimited"); if (targisdir) { int need; need = strlen(targ) + strlen(cp) + 250; if (need > cursize) { if (namebuf) free(namebuf); if (!(namebuf = malloc((u_int)need))) error("out of memory\n"); cursize = need; } (void)sprintf(namebuf, "%s%s%s", targ, *targ ? "/" : "", cp); np = namebuf; } else np = targ; exists = stat(np, &stb) == 0; if (buf[0] == 'D') { if (exists) { if ((stb.st_mode&S_IFMT) != S_IFDIR) { errno = ENOTDIR; goto bad; } if (pflag) (void)chmod(np, mode); } else if (mkdir(np, mode) < 0) goto bad; vect[0] = np; sink(1, vect); if (setimes) { setimes = 0; if (utimes(np, tv) < 0) error("rcp: can't set times on %s: %s\n", np, strerror(errno)); } continue; } if ((ofd = open(np, O_WRONLY|O_CREAT, mode)) < 0) { bad: error("rcp: %s: %s\n", np, strerror(errno)); continue; } if (exists && pflag) (void)fchmod(ofd, mode); (void)write(rem, "", 1); if ((bp = allocbuf(&buffer, ofd, BUFSIZ)) == 0) { (void)close(ofd); continue; } cp = bp->buf; count = 0; wrerr = 0; for (i = 0; i < size; i += BUFSIZ) { amt = BUFSIZ; if (i + amt > size) amt = size - i; count += amt; do { j = read(rem, cp, amt); if (j <= 0) { error("rcp: %s\n", j ? strerror(errno) : "dropped connection"); exit(1); } amt -= j; cp += j; } while (amt > 0); if (count == bp->cnt) { if (wrerr == 0 && write(ofd, bp->buf, count) != count) wrerr++; count = 0; cp = bp->buf; } } if (count != 0 && wrerr == 0 && write(ofd, bp->buf, count) != count) wrerr++; if (ftruncate(ofd, size)) error("rcp: can't truncate %s: %s\n", np, strerror(errno)); (void)close(ofd); (void)response(); if (setimes) { setimes = 0; if (utimes(np, tv) < 0) error("rcp: can't set times on %s: %s\n", np, strerror(errno)); } if (wrerr) error("rcp: %s: %s\n", np, strerror(errno)); else (void)write(rem, "", 1); } screwup: error("rcp: protocol screwup: %s\n", why); exit(1); } BUF * allocbuf(bp, fd, blksize) BUF *bp; int fd, blksize; { struct stat stb; int size; char *malloc(); if (fstat(fd, &stb) < 0) { error("rcp: fstat: %s\n", strerror(errno)); return(0); } size = roundup(stb.st_blksize, blksize); if (size == 0) size = blksize; if (bp->cnt < size) { if (bp->buf != 0) free(bp->buf); bp->buf = (char *)malloc((u_int)size); if (!bp->buf) { error("rcp: malloc: out of memory\n"); return(0); } } bp->cnt = size; return(bp); } /* VARARGS1 */ error(fmt, a1, a2, a3) char *fmt; int a1, a2, a3; { static FILE *fp; ++errs; if (!fp && !(fp = fdopen(rem, "w"))) return; (void)fprintf(fp, "%c", 0x01); (void)fprintf(fp, fmt, a1, a2, a3); (void)fflush(fp); if (!iamremote) (void)fprintf(stderr, fmt, a1, a2, a3); } nospace() { (void)fprintf(stderr, "rcp: out of memory.\n"); exit(1); } #ifdef KERBEROS old_warning(str) char *str; { (void)fprintf(stderr, "rcp: warning: %s, using standard rcp\n", str); } #endif usage() { #ifdef KERBEROS (void)fprintf(stderr, "%s\n\t%s\n", "usage: rcp [-k realm] [-px] f1 f2", "or: rcp [-k realm] [-rpx] f1 ... fn directory"); #else (void)fprintf(stderr, "usage: rcp [-p] f1 f2; or: rcp [-rp] f1 ... fn directory\n"); #endif exit(1); }