X-Git-Url: https://git.subgeniuskitty.com/unix-history/.git/blobdiff_plain/a678b549cf4fec1e25e9d83c41b75236a46b8f3b..ef49bf4f6406c9043fea62a0f09bcb85f03a51b8:/usr/src/bin/rcp/rcp.c diff --git a/usr/src/bin/rcp/rcp.c b/usr/src/bin/rcp/rcp.c index 6defb752df..7d3661f0ba 100644 --- a/usr/src/bin/rcp/rcp.c +++ b/usr/src/bin/rcp/rcp.c @@ -12,7 +12,7 @@ * from this software without specific prior written permission. * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED - * WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE. + * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. */ #ifndef lint @@ -22,7 +22,7 @@ char copyright[] = #endif /* not lint */ #ifndef lint -static char sccsid[] = "@(#)rcp.c 5.11 (Berkeley) 9/22/88"; +static char sccsid[] = "@(#)rcp.c 5.21 (Berkeley) %G%"; #endif /* not lint */ /* @@ -33,61 +33,53 @@ static char sccsid[] = "@(#)rcp.c 5.11 (Berkeley) 9/22/88"; #include #include #include - +#include +#include #include - -#include -#include #include -#include #include #include +#include +#include +#include +#include "pathnames.h" -#ifdef KERBEROS +#ifdef KERBEROS #include -char krb_realm[REALM_SZ]; -int use_kerberos = 1, encrypt = 0; -CREDENTIALS cred; -Key_schedule schedule; + +char krb_realm[REALM_SZ]; +int use_kerberos = 1, encrypt = 0; +CREDENTIALS cred; +Key_schedule schedule; #endif -int rem; -char *colon(), *index(), *rindex(), *malloc(), *strcpy(); -int errs; -int lostconn(); -int errno; -char *sys_errlist[]; -int iamremote, targetshouldbedirectory; -int iamrecursive; -int pflag; -struct passwd *pwd; -struct passwd *getpwuid(); -int userid; -int port; - -struct buffer { - int cnt; - char *buf; -} *allocbuf(); +extern int errno; +struct passwd *pwd; +int errs, pflag, port, rem, userid; +int iamremote, iamrecursive, targetshouldbedirectory; -/*VARARGS*/ -int error(); +#define CMDNEEDS 20 +char cmd[CMDNEEDS]; /* must hold "rcp -r -p -d\0" */ -#define ga() (void) write(rem, "", 1) +typedef struct _buf { + int cnt; + char *buf; +} BUF; main(argc, argv) int argc; char **argv; { - char *targ, *host, *src; - char *suser, *tuser, *thost; - int i; - char buf[BUFSIZ], cmd[16]; + extern int optind; struct servent *sp; + int ch, fflag, tflag; + char *targ, *colon(); + struct passwd *getpwuid(); + int lostconn(); -#ifdef KERBEROS +#ifdef KERBEROS sp = getservbyname("kshell", "tcp"); - if(sp == NULL) { + if (sp == NULL) { use_kerberos = 0; old_warning("kshell service unknown"); sp = getservbyname("kshell", "tcp"); @@ -95,273 +87,264 @@ main(argc, argv) #else sp = getservbyname("shell", "tcp"); #endif - - if (sp == NULL) { - fprintf(stderr, "rcp: shell/tcp: unknown service\n"); + if (!sp) { + (void)fprintf(stderr, "rcp: shell/tcp: unknown service\n"); exit(1); } port = sp->s_port; - pwd = getpwuid(userid = getuid()); - if (pwd == 0) { - fprintf(stderr, "who are you?\n"); + + if (!(pwd = getpwuid(userid = getuid()))) { + (void)fprintf(stderr, "rcp: unknown user %d.\n", userid); exit(1); } - for (argc--, argv++; argc > 0 && **argv == '-'; argc--, argv++) { - (*argv)++; - while (**argv) switch (*(*argv)++) { - - case 'r': - iamrecursive++; + fflag = tflag = 0; + while ((ch = getopt(argc, argv, "dfkprtx")) != EOF) + switch(ch) { + case 'd': + targetshouldbedirectory = 1; break; - -#ifdef KERBEROS - case 'x': - encrypt = 1; - des_set_key(cred.session, schedule); + case 'f': /* "from" */ + fflag = 1; break; - - case 'k': +#ifdef KERBEROS + case 'k': strncpy(krb_realm, ++argv, REALM_SZ); break; #endif - - case 'p': /* preserve mtimes and atimes */ - pflag++; + case 'p': /* preserve access/mod times */ + ++pflag; break; - - /* The rest of these are not for users. */ - case 'd': - targetshouldbedirectory = 1; + case 'r': + ++iamrecursive; break; - - case 'f': /* "from" */ - iamremote = 1; - (void) response(); - (void) setuid(userid); - source(--argc, ++argv); - exit(errs); - - case 't': /* "to" */ - iamremote = 1; - (void) setuid(userid); - sink(--argc, ++argv); - exit(errs); - - default: + case 't': /* "to" */ + tflag = 1; + break; +#ifdef KERBEROS + case 'x': + encrypt = 1; + des_set_key(cred.session, schedule); + break; +#endif + case '?': + default: usage(); } + argc -= optind; + argv += optind; + + if (fflag) { + iamremote = 1; + (void)response(); + (void)setuid(userid); + source(argc, argv); + exit(errs); + } + + if (tflag) { + iamremote = 1; + (void)setuid(userid); + sink(argc, argv); + exit(errs); } + if (argc < 2) usage(); if (argc > 2) targetshouldbedirectory = 1; + rem = -1; - (void) sprintf(cmd, "rcp%s%s%s", - iamrecursive ? " -r" : "", pflag ? " -p" : "", - targetshouldbedirectory ? " -d" : ""); - (void) signal(SIGPIPE, lostconn); - targ = colon(argv[argc - 1]); - if (targ) { /* ... to remote */ - *targ++ = 0; - if (*targ == 0) - targ = "."; - thost = index(argv[argc - 1], '@'); - if (thost) { - *thost++ = 0; - tuser = argv[argc - 1]; - if (*tuser == '\0') - tuser = NULL; - else if (!okname(tuser)) - exit(1); - } else { - thost = argv[argc - 1]; - tuser = NULL; - } - for (i = 0; i < argc - 1; i++) { - src = colon(argv[i]); - if (src) { /* remote to remote */ - *src++ = 0; - if (*src == 0) - src = "."; - host = index(argv[i], '@'); - if (host) { - *host++ = 0; - suser = argv[i]; - if (*suser == '\0') - suser = pwd->pw_name; - else if (!okname(suser)) - continue; - (void) sprintf(buf, "/usr/ucb/rsh %s -l %s -n %s %s '%s%s%s:%s'", - host, suser, cmd, src, - tuser ? tuser : "", - tuser ? "@" : "", - thost, targ); - } else - (void) sprintf(buf, "/usr/ucb/rsh %s -n %s %s '%s%s%s:%s'", - argv[i], cmd, src, - tuser ? tuser : "", - tuser ? "@" : "", - thost, targ); - (void) susystem(buf); - } else { /* local to remote */ - if (rem == -1) { - (void) sprintf(buf, "%s -t %s", - cmd, targ); - host = thost; -#ifdef KERBEROS -try_again: - if(use_kerberos) { - rem = KSUCCESS; - if(krb_realm[0] == '\0') - rem = krb_get_lrealm(krb_realm,1); - if(rem == KSUCCESS) { - if(encrypt) { - rem = krcmd_mutual( - &host, port, - tuser ? tuser - : pwd->pw_name, - buf, 0, krb_realm, - &cred, schedule); - } else { - - rem = krcmd( - &host, - port, - tuser ? tuser - : pwd->pw_name, - buf, 0, - krb_realm - ); - } - } else { - fprintf(stderr, - "rcp: error getting local realm %s\n", - krb_err_txt[rem]); - exit(1); - } - if((rem < 0) && errno == ECONNREFUSED) { - use_kerberos = 0; - old_warning("remote host doesn't support Kerberos"); - sp = getservbyname("shell", "tcp"); - if(sp == NULL) { - fprintf(stderr, "unknown service shell/tcp\n"); - exit(1); - } - port = sp->s_port; - goto try_again; - } - } else { - rem = rcmd(&host, port, pwd->pw_name, - tuser ? tuser : pwd->pw_name, - buf, 0); - } -#else + (void)sprintf(cmd, "rcp%s%s%s", iamrecursive ? " -r" : "", + pflag ? " -p" : "", targetshouldbedirectory ? " -d" : ""); - rem = rcmd(&host, port, pwd->pw_name, - tuser ? tuser : pwd->pw_name, - buf, 0); -#endif - if (rem < 0) - exit(1); - if (response() < 0) - exit(1); - (void) setuid(userid); - } - source(1, argv+i); - } - } - } else { /* ... to local */ + (void)signal(SIGPIPE, lostconn); + + if (targ = colon(argv[argc - 1])) + toremote(targ, argc, argv); + else { + tolocal(argc, argv); if (targetshouldbedirectory) verifydir(argv[argc - 1]); - for (i = 0; i < argc - 1; i++) { - src = colon(argv[i]); - if (src == 0) { /* local to local */ - (void) sprintf(buf, "/bin/cp%s%s %s %s", - iamrecursive ? " -r" : "", - pflag ? " -p" : "", - argv[i], argv[argc - 1]); - (void) susystem(buf); - } else { /* remote to local */ - *src++ = 0; - if (*src == 0) - src = "."; - host = index(argv[i], '@'); - if (host) { - *host++ = 0; - suser = argv[i]; - if (*suser == '\0') - suser = pwd->pw_name; - else if (!okname(suser)) - continue; - } else { - host = argv[i]; + } + exit(errs); +} + +toremote(targ, argc, argv) + char *targ; + int argc; + char **argv; +{ + int i; + char *bp, *host, *src, *suser, *thost, *tuser; + char *colon(), *malloc(); + + *targ++ = 0; + if (*targ == 0) + targ = "."; + + if (thost = index(argv[argc - 1], '@')) { + *thost++ = 0; + tuser = argv[argc - 1]; + if (*tuser == '\0') + tuser = NULL; + else if (!okname(tuser)) + exit(1); + } else { + thost = argv[argc - 1]; + tuser = NULL; + } + + for (i = 0; i < argc - 1; i++) { + src = colon(argv[i]); + if (src) { /* remote to remote */ + *src++ = 0; + if (*src == 0) + src = "."; + host = index(argv[i], '@'); + if (!(bp = malloc((u_int)(strlen(_PATH_RSH) + + strlen(argv[i]) + strlen(src) + + tuser ? strlen(tuser) : 0 + strlen(thost) + + strlen(targ)) + CMDNEEDS + 20))) + nospace(); + if (host) { + *host++ = 0; + suser = argv[i]; + if (*suser == '\0') suser = pwd->pw_name; - } - (void) sprintf(buf, "%s -f %s", cmd, src); -#ifdef KERBEROS -one_more_time: - if(use_kerberos) { - rem = KSUCCESS; - if(krb_realm[0] == '\0') - rem = krb_get_lrealm(krb_realm,1); - if(rem == KSUCCESS) { - if(encrypt) { - rem = krcmd_mutual( - &host, - port, - suser, - buf, 0, - krb_realm, - &cred, schedule - ); - } else { - rem = krcmd( - &host, - port, - suser, - buf, 0, - krb_realm - ); - } - } else { - fprintf(stderr, - "rcp: error getting local realm %s\n", - krb_err_txt[rem]); - exit(1); - } - if((rem < 0) && errno == ECONNREFUSED) { - use_kerberos = 0; - old_warning("remote host doesn't suport Kerberos"); - sp = getservbyname("shell", "tcp"); - if(sp == NULL) { - fprintf(stderr, "unknown service shell/tcp\n"); - exit(1); - } - port = sp->s_port; - goto one_more_time; - } - } else { - rem = rcmd(&host, port, pwd->pw_name, suser, - buf, 0); - } -#else - rem = rcmd(&host, port, pwd->pw_name, suser, - buf, 0); + else if (!okname(suser)) + continue; + (void)sprintf(bp, + "%s %s -l %s -n %s %s '%s%s%s:%s'", + _PATH_RSH, host, suser, cmd, src, + tuser ? tuser : "", tuser ? "@" : "", + thost, targ); + } else + (void)sprintf(bp, "%s %s -n %s %s '%s%s%s:%s'", + _PATH_RSH, argv[i], cmd, src, + tuser ? tuser : "", tuser ? "@" : "", + thost, targ); + (void)susystem(bp); + (void)free(bp); + } else { /* local to remote */ + if (rem == -1) { + if (!(bp = malloc((u_int)strlen(targ) + + CMDNEEDS + 20))) + nospace(); + (void)sprintf(bp, "%s -t %s", cmd, targ); + host = thost; +#ifdef KERBEROS + if (use_kerberos) + kerberos(bp, + tuser ? tuser : pwd->pw_name); + else #endif + rem = rcmd(&host, port, pwd->pw_name, + tuser ? tuser : pwd->pw_name, + bp, 0); if (rem < 0) - continue; - (void) setreuid(0, userid); - sink(1, argv+argc-1); - (void) setreuid(userid, 0); - (void) close(rem); - rem = -1; + exit(1); + if (response() < 0) + exit(1); + (void)free(bp); + (void)setuid(userid); } + source(1, argv+i); } } - exit(errs); } +tolocal(argc, argv) + int argc; + char **argv; +{ + int i; + char *bp, *host, *src, *suser; + char *colon(), *malloc(); + + for (i = 0; i < argc - 1; i++) { + if (!(src = colon(argv[i]))) { /* local to local */ + if (!(bp = malloc((u_int)(strlen(_PATH_CP) + + strlen(argv[i]) + strlen(argv[argc - 1])) + 20))) + nospace(); + (void)sprintf(bp, "%s%s%s %s %s", _PATH_CP, + iamrecursive ? " -r" : "", pflag ? " -p" : "", + argv[i], argv[argc - 1]); + (void)susystem(bp); + (void)free(bp); + continue; + } + *src++ = 0; + if (*src == 0) + src = "."; + host = index(argv[i], '@'); + if (host) { + *host++ = 0; + suser = argv[i]; + if (*suser == '\0') + suser = pwd->pw_name; + else if (!okname(suser)) + continue; + } else { + host = argv[i]; + suser = pwd->pw_name; + } + if (!(bp = malloc((u_int)(strlen(src)) + CMDNEEDS + 20))) + nospace(); + (void)sprintf(bp, "%s -f %s", cmd, src); +#ifdef KERBEROS + if (use_kerberos) + kerberos(bp, suser); + else +#endif + rem = rcmd(&host, port, pwd->pw_name, suser, bp, 0); + (void)free(bp); + if (rem < 0) + continue; + (void)setreuid(0, userid); + sink(1, argv + argc - 1); + (void)setreuid(userid, 0); + (void)close(rem); + rem = -1; + } +} + +#ifdef KERBEROS +kerberos(bp, user) + char *bp, *user; +{ + struct servent *sp; + char *host; + +again: rem = KSUCCESS; + if (krb_realm[0] == '\0') + rem = krb_get_lrealm(krb_realm, 1); + if (rem == KSUCCESS) { + if (encrypt) + rem = krcmd_mutual(&host, port, user, bp, 0, + krb_realm, &cred, schedule); + else + rem = krcmd(&host, port, user, bp, 0, krb_realm); + } else { + (void)fprintf(stderr, + "rcp: error getting local realm %s\n", krb_err_txt[rem]); + exit(1); + } + if (rem < 0 && errno == ECONNREFUSED) { + use_kerberos = 0; + old_warning("remote host doesn't support Kerberos"); + sp = getservbyname("shell", "tcp"); + if (sp == NULL) { + (void)fprintf(stderr, + "rcp: unknown service shell/tcp\n"); + exit(1); + } + port = sp->s_port; + goto again; + } +} +#endif /* KERBEROS */ + verifydir(cp) char *cp; { @@ -372,23 +355,21 @@ verifydir(cp) return; errno = ENOTDIR; } - error("rcp: %s: %s.\n", cp, sys_errlist[errno]); + error("rcp: %s: %s.\n", cp, strerror(errno)); exit(1); } char * colon(cp) - char *cp; + register char *cp; { - - while (*cp) { + for (; *cp; ++cp) { if (*cp == ':') - return (cp); + return(cp); if (*cp == '/') - return (0); - cp++; + return(0); } - return (0); + return(0); } okname(cp0) @@ -403,12 +384,11 @@ okname(cp0) goto bad; if (!isalpha(c) && !isdigit(c) && c != '_' && c != '-') goto bad; - cp++; - } while (*cp); - return (1); + } while (*++cp); + return(1); bad: - fprintf(stderr, "rcp: invalid user name %s\n", cp0); - return (0); + (void)fprintf(stderr, "rcp: invalid user name %s\n", cp0); + return(0); } susystem(s) @@ -418,8 +398,8 @@ susystem(s) register int (*istat)(), (*qstat)(); if ((pid = vfork()) == 0) { - (void) setuid(userid); - execl("/bin/sh", "sh", "-c", s, (char *)0); + (void)setuid(userid); + execl(_PATH_BSHELL, "sh", "-c", s, (char *)0); _exit(127); } istat = signal(SIGINT, SIG_IGN); @@ -428,27 +408,27 @@ susystem(s) ; if (w == -1) status = -1; - (void) signal(SIGINT, istat); - (void) signal(SIGQUIT, qstat); - return (status); + (void)signal(SIGINT, istat); + (void)signal(SIGQUIT, qstat); + return(status); } source(argc, argv) int argc; char **argv; { - char *last, *name; struct stat stb; - static struct buffer buffer; - struct buffer *bp; - int x, readerr, f, amt; + static BUF buffer; + BUF *bp; off_t i; - char buf[BUFSIZ]; + int x, readerr, f, amt; + char *last, *name, buf[BUFSIZ]; + BUF *allocbuf(); for (x = 0; x < argc; x++) { name = argv[x]; - if ((f = open(name, 0)) < 0) { - error("rcp: %s: %s\n", name, sys_errlist[errno]); + if ((f = open(name, O_RDONLY, 0)) < 0) { + error("rcp: %s: %s\n", name, strerror(errno)); continue; } if (fstat(f, &stb) < 0) @@ -460,14 +440,13 @@ source(argc, argv) case S_IFDIR: if (iamrecursive) { - (void) close(f); + (void)close(f); rsource(name, &stb); continue; } - /* fall into ... */ + /* FALLTHROUGH */ default: -notreg: - (void) close(f); +notreg: (void)close(f); error("rcp: %s: not a plain file\n", name); continue; } @@ -481,23 +460,23 @@ notreg: * Make it compatible with possible future * versions expecting microseconds. */ - (void) sprintf(buf, "T%ld 0 %ld 0\n", - stb.st_mtime, stb.st_atime); - (void) write(rem, buf, strlen(buf)); + (void)sprintf(buf, "T%ld 0 %ld 0\n", stb.st_mtime, + stb.st_atime); + (void)write(rem, buf, strlen(buf)); if (response() < 0) { - (void) close(f); + (void)close(f); continue; } } - (void) sprintf(buf, "C%04o %ld %s\n", - stb.st_mode&07777, stb.st_size, last); - (void) write(rem, buf, strlen(buf)); + (void)sprintf(buf, "C%04o %ld %s\n", stb.st_mode&07777, + stb.st_size, last); + (void)write(rem, buf, strlen(buf)); if (response() < 0) { - (void) close(f); + (void)close(f); continue; } if ((bp = allocbuf(&buffer, f, BUFSIZ)) == 0) { - (void) close(f); + (void)close(f); continue; } readerr = 0; @@ -507,31 +486,27 @@ notreg: amt = stb.st_size - i; if (readerr == 0 && read(f, bp->buf, amt) != amt) readerr = errno; - (void) write(rem, bp->buf, amt); + (void)write(rem, bp->buf, amt); } - (void) close(f); + (void)close(f); if (readerr == 0) - ga(); + (void)write(rem, "", 1); else - error("rcp: %s: %s\n", name, sys_errlist[readerr]); - (void) response(); + error("rcp: %s: %s\n", name, strerror(readerr)); + (void)response(); } } -#include - rsource(name, statp) char *name; struct stat *statp; { - DIR *d = opendir(name); - char *last; + DIR *d; struct direct *dp; - char buf[BUFSIZ]; - char *bufv[1]; + char *last, *vect[1], path[MAXPATHLEN]; - if (d == 0) { - error("rcp: %s: %s\n", name, sys_errlist[errno]); + if (!(d = opendir(name))) { + error("rcp: %s: %s\n", name, strerror(errno)); return; } last = rindex(name, '/'); @@ -540,16 +515,16 @@ rsource(name, statp) else last++; if (pflag) { - (void) sprintf(buf, "T%ld 0 %ld 0\n", - statp->st_mtime, statp->st_atime); - (void) write(rem, buf, strlen(buf)); + (void)sprintf(path, "T%ld 0 %ld 0\n", statp->st_mtime, + statp->st_atime); + (void)write(rem, path, strlen(path)); if (response() < 0) { closedir(d); return; } } - (void) sprintf(buf, "D%04o %d %s\n", statp->st_mode&07777, 0, last); - (void) write(rem, buf, strlen(buf)); + (void)sprintf(path, "D%04o %d %s\n", statp->st_mode&07777, 0, last); + (void)write(rem, path, strlen(path)); if (response() < 0) { closedir(d); return; @@ -559,45 +534,47 @@ rsource(name, statp) continue; if (!strcmp(dp->d_name, ".") || !strcmp(dp->d_name, "..")) continue; - if (strlen(name) + 1 + strlen(dp->d_name) >= BUFSIZ - 1) { - error("%s/%s: Name too long.\n", name, dp->d_name); + if (strlen(name) + 1 + strlen(dp->d_name) >= MAXPATHLEN - 1) { + error("%s/%s: name too long.\n", name, dp->d_name); continue; } - (void) sprintf(buf, "%s/%s", name, dp->d_name); - bufv[0] = buf; - source(1, bufv); + (void)sprintf(path, "%s/%s", name, dp->d_name); + vect[0] = path; + source(1, vect); } closedir(d); - (void) write(rem, "E\n", 2); - (void) response(); + (void)write(rem, "E\n", 2); + (void)response(); } response() { - char resp, c, rbuf[BUFSIZ], *cp = rbuf; + register char *cp; + char ch, resp, rbuf[BUFSIZ]; - if (read(rem, &resp, 1) != 1) + if (read(rem, &resp, sizeof(resp)) != sizeof(resp)) lostconn(); - switch (resp) { + cp = rbuf; + switch(resp) { case 0: /* ok */ - return (0); - + return(0); default: *cp++ = resp; - /* fall into... */ + /* FALLTHROUGH */ case 1: /* error, followed by err msg */ case 2: /* fatal error, "" */ do { - if (read(rem, &c, 1) != 1) + if (read(rem, &ch, sizeof(ch)) != sizeof(ch)) lostconn(); - *cp++ = c; - } while (cp < &rbuf[BUFSIZ] && c != '\n'); - if (iamremote == 0) - (void) write(2, rbuf, cp - rbuf); - errs++; + *cp++ = ch; + } while (cp < &rbuf[BUFSIZ] && ch != '\n'); + + if (!iamremote) + (void)write(2, rbuf, cp - rbuf); + ++errs; if (resp == 1) - return (-1); + return(-1); exit(1); } /*NOTREACHED*/ @@ -605,9 +582,8 @@ response() lostconn() { - - if (iamremote == 0) - fprintf(stderr, "rcp: lost connection\n"); + if (!iamremote) + (void)fprintf(stderr, "rcp: lost connection\n"); exit(1); } @@ -615,24 +591,26 @@ sink(argc, argv) int argc; char **argv; { - off_t i, j; - char *targ, *whopp, *cp; - int of, mode, wrerr, exists, first, count, amt, size; - struct buffer *bp; - static struct buffer buffer; + register char *cp; + static BUF buffer; struct stat stb; - int targisdir = 0; - int mask = umask(0); - char *myargv[1]; - char cmdbuf[BUFSIZ], nambuf[BUFSIZ]; - int setimes = 0; struct timeval tv[2]; -#define atime tv[0] -#define mtime tv[1] -#define SCREWUP(str) { whopp = str; goto screwup; } + enum { YES, NO, DISPLAYED } wrerr; + BUF *bp, *allocbuf(); + off_t i, j; + char ch, *targ, *why; + int amt, count, exists, first, mask, mode; + int ofd, setimes, size, targisdir; + char *np, *vect[1], buf[BUFSIZ], *malloc(); + +#define atime tv[0] +#define mtime tv[1] +#define SCREWUP(str) { why = str; goto screwup; } + setimes = targisdir = 0; + mask = umask(0); if (!pflag) - (void) umask(mask); + (void)umask(mask); if (argc != 1) { error("rcp: ambiguous target\n"); exit(1); @@ -640,36 +618,40 @@ sink(argc, argv) targ = *argv; if (targetshouldbedirectory) verifydir(targ); - ga(); + (void)write(rem, "", 1); if (stat(targ, &stb) == 0 && (stb.st_mode & S_IFMT) == S_IFDIR) targisdir = 1; - for (first = 1; ; first = 0) { - cp = cmdbuf; + for (first = 1;; first = 0) { + cp = buf; if (read(rem, cp, 1) <= 0) return; if (*cp++ == '\n') - SCREWUP("unexpected '\\n'"); + SCREWUP("unexpected "); do { - if (read(rem, cp, 1) != 1) + if (read(rem, &ch, sizeof(ch)) != sizeof(ch)) SCREWUP("lost connection"); - } while (*cp++ != '\n'); + *cp++ = ch; + } while (cp < &buf[BUFSIZ - 1] && ch != '\n'); *cp = 0; - if (cmdbuf[0] == '\01' || cmdbuf[0] == '\02') { + + if (buf[0] == '\01' || buf[0] == '\02') { if (iamremote == 0) - (void) write(2, cmdbuf+1, strlen(cmdbuf+1)); - if (cmdbuf[0] == '\02') + (void)write(2, buf + 1, strlen(buf + 1)); + if (buf[0] == '\02') exit(1); errs++; continue; } - *--cp = 0; - cp = cmdbuf; - if (*cp == 'E') { - ga(); + if (buf[0] == 'E') { + (void)write(rem, "", 1); return; } + if (ch == '\n') + *--cp = 0; + #define getnum(t) (t) = 0; while (isdigit(*cp)) (t) = (t) * 10 + (*cp++ - '0'); + cp = buf; if (*cp == 'T') { setimes++; cp++; @@ -685,7 +667,7 @@ sink(argc, argv) getnum(atime.tv_usec); if (*cp++ != '\0') SCREWUP("atime.usec not delimited"); - ga(); + (void)write(rem, "", 1); continue; } if (*cp != 'C' && *cp != 'D') { @@ -702,9 +684,8 @@ sink(argc, argv) } SCREWUP("expected control record"); } - cp++; mode = 0; - for (; cp < cmdbuf+5; cp++) { + for (++cp; cp < buf + 5; cp++) { if (*cp < '0' || *cp > '7') SCREWUP("bad mode"); mode = (mode << 3) | (*cp - '0'); @@ -716,47 +697,57 @@ sink(argc, argv) size = size * 10 + (*cp++ - '0'); if (*cp++ != ' ') SCREWUP("size not delimited"); - if (targisdir) - (void) sprintf(nambuf, "%s%s%s", targ, + if (targisdir) { + static char *namebuf; + static int cursize; + int need; + + need = strlen(targ) + strlen(cp) + 250; + if (need > cursize) { + if (!(namebuf = malloc((u_int)need))) + error("out of memory\n"); + } + (void)sprintf(namebuf, "%s%s%s", targ, *targ ? "/" : "", cp); + np = namebuf; + } else - (void) strcpy(nambuf, targ); - exists = stat(nambuf, &stb) == 0; - if (cmdbuf[0] == 'D') { + np = targ; + exists = stat(np, &stb) == 0; + if (buf[0] == 'D') { if (exists) { if ((stb.st_mode&S_IFMT) != S_IFDIR) { errno = ENOTDIR; goto bad; } if (pflag) - (void) chmod(nambuf, mode); - } else if (mkdir(nambuf, mode) < 0) + (void)chmod(np, mode); + } else if (mkdir(np, mode) < 0) goto bad; - myargv[0] = nambuf; - sink(1, myargv); + vect[0] = np; + sink(1, vect); if (setimes) { setimes = 0; - if (utimes(nambuf, tv) < 0) - error("rcp: can't set times on %s: %s\n", - nambuf, sys_errlist[errno]); + if (utimes(np, tv) < 0) + error("rcp: can't set times on %s: %s\n", + np, strerror(errno)); } continue; } - if ((of = open(nambuf, O_WRONLY|O_CREAT, mode)) < 0) { - bad: - error("rcp: %s: %s\n", nambuf, sys_errlist[errno]); + if ((ofd = open(np, O_WRONLY|O_CREAT, mode)) < 0) { +bad: error("rcp: %s: %s\n", np, strerror(errno)); continue; } if (exists && pflag) - (void) fchmod(of, mode); - ga(); - if ((bp = allocbuf(&buffer, of, BUFSIZ)) == 0) { - (void) close(of); + (void)fchmod(ofd, mode); + (void)write(rem, "", 1); + if ((bp = allocbuf(&buffer, ofd, BUFSIZ)) == 0) { + (void)close(ofd); continue; } cp = bp->buf; count = 0; - wrerr = 0; + wrerr = NO; for (i = 0; i < size; i += BUFSIZ) { amt = BUFSIZ; if (i + amt > size) @@ -765,59 +756,68 @@ sink(argc, argv) do { j = read(rem, cp, amt); if (j <= 0) { - if (j == 0) - error("rcp: dropped connection"); - else - error("rcp: %s\n", - sys_errlist[errno]); + error("rcp: %s\n", + j ? strerror(errno) : + "dropped connection"); exit(1); } amt -= j; cp += j; } while (amt > 0); if (count == bp->cnt) { - if (wrerr == 0 && - write(of, bp->buf, count) != count) - wrerr++; + if (wrerr == NO && + write(ofd, bp->buf, count) != count) + wrerr = YES; count = 0; cp = bp->buf; } } - if (count != 0 && wrerr == 0 && - write(of, bp->buf, count) != count) - wrerr++; - if (ftruncate(of, size)) - error("rcp: can't truncate %s: %s\n", - nambuf, sys_errlist[errno]); - (void) close(of); - (void) response(); - if (setimes) { + if (count != 0 && wrerr == NO && + write(ofd, bp->buf, count) != count) + wrerr = YES; + if (ftruncate(ofd, size)) { + error("rcp: can't truncate %s: %s\n", np, + strerror(errno)); + wrerr = DISPLAYED; + } + (void)close(ofd); + (void)response(); + if (setimes && wrerr == NO) { setimes = 0; - if (utimes(nambuf, tv) < 0) + if (utimes(np, tv) < 0) { error("rcp: can't set times on %s: %s\n", - nambuf, sys_errlist[errno]); - } - if (wrerr) - error("rcp: %s: %s\n", nambuf, sys_errlist[errno]); - else - ga(); + np, strerror(errno)); + wrerr = DISPLAYED; + } + } + switch(wrerr) { + case YES: + error("rcp: %s: %s\n", np, strerror(errno)); + break; + case NO: + (void)write(rem, "", 1); + break; + case DISPLAYED: + break; + } } screwup: - error("rcp: protocol screwup: %s\n", whopp); + error("rcp: protocol screwup: %s\n", why); exit(1); } -struct buffer * +BUF * allocbuf(bp, fd, blksize) - struct buffer *bp; + BUF *bp; int fd, blksize; { struct stat stb; int size; + char *malloc(); if (fstat(fd, &stb) < 0) { - error("rcp: fstat: %s\n", sys_errlist[errno]); - return ((struct buffer *)0); + error("rcp: fstat: %s\n", strerror(errno)); + return(0); } size = roundup(stb.st_blksize, blksize); if (size == 0) @@ -825,46 +825,56 @@ allocbuf(bp, fd, blksize) if (bp->cnt < size) { if (bp->buf != 0) free(bp->buf); - bp->buf = (char *)malloc((unsigned) size); - if (bp->buf == 0) { + bp->buf = (char *)malloc((u_int)size); + if (!bp->buf) { error("rcp: malloc: out of memory\n"); - return ((struct buffer *)0); + return(0); } } bp->cnt = size; - return (bp); + return(bp); } -/*VARARGS1*/ -error(fmt, a1, a2, a3, a4, a5) +/* VARARGS1 */ +error(fmt, a1, a2, a3) char *fmt; - int a1, a2, a3, a4, a5; + int a1, a2, a3; { - char buf[BUFSIZ], *cp = buf; - - errs++; - *cp++ = 1; - (void) sprintf(cp, fmt, a1, a2, a3, a4, a5); - (void) write(rem, buf, strlen(buf)); - if (iamremote == 0) - (void) write(2, buf+1, strlen(buf+1)); + static FILE *fp; + + ++errs; + if (!fp && !(fp = fdopen(rem, "w"))) + return; + (void)fprintf(fp, "%c", 0x01); + (void)fprintf(fp, fmt, a1, a2, a3); + (void)fflush(fp); + if (!iamremote) + (void)fprintf(stderr, fmt, a1, a2, a3); } -usage() +nospace() { -#ifdef KERBEROS - fputs("usage: rcp [-k realm] [-x] [-p] f1 f2;\n", stderr); - fputs(" or: rcp [-k realm] [-x] [-rp] f1 ... fn d2\n", stderr); -#else - fputs("usage: rcp [-p] f1 f2; or: rcp [-rp] f1 ... fn d2\n", stderr); -#endif + (void)fprintf(stderr, "rcp: out of memory.\n"); exit(1); } -#ifdef KERBEROS +#ifdef KERBEROS old_warning(str) - char *str; + char *str; { - fprintf(stderr,"Warning: %s, using standard rcp\n", str); + (void)fprintf(stderr, "rcp: warning: %s, using standard rcp\n", str); } #endif + +usage() +{ +#ifdef KERBEROS + (void)fprintf(stderr, "%s\n\t%s\n", + "usage: rcp [-k realm] [-px] f1 f2", + "or: rcp [-k realm] [-rpx] f1 ... fn directory"); +#else + (void)fprintf(stderr, + "usage: rcp [-p] f1 f2; or: rcp [-rp] f1 ... fn directory\n"); +#endif + exit(1); +}