Skip to content
Snippets Groups Projects
ftp.c 112 KiB
Newer Older
  • Learn to ignore specific revisions
  •       *dest = 0;
          snprintf(dest, 20, ",%d,%d", port>>8, port&0xff);
    
          result = Curl_nbftpsendf(conn, "%s %s", mode[fcmd], tmp);
    
          if(result)
            return result;
          break;
        }
      }
    
      /* store which command was sent */
    
    
      /* we set the secondary socket variable to this for now, it is only so that
         the cleanup function will close it in case we fail before the true
         secondary stuff is made */
    
    Gisle Vanem's avatar
    Gisle Vanem committed
      if(CURL_SOCKET_BAD != conn->sock[SECONDARYSOCKET])
    
        sclose(conn->sock[SECONDARYSOCKET]);
      conn->sock[SECONDARYSOCKET] = portsock;
    
    #else
      /******************************************************************
       * IPv4-specific section
       */
      struct sockaddr_in sa;
      unsigned short porttouse;
      bool sa_filled_in = FALSE;
      Curl_addrinfo *addr = NULL;
      unsigned short ip[4];
    
      (void)fcmd; /* not used in the IPv4 code */
      if(data->set.ftpport) {
        in_addr_t in;
    
        /* First check if the given name is an IP address */
        in=inet_addr(data->set.ftpport);
    
        if(in != CURL_INADDR_NONE)
          /* this is an IPv4 address */
          addr = Curl_ip2addr(in, data->set.ftpport, 0);
        else {
          if(Curl_if2ip(data->set.ftpport, myhost, sizeof(myhost))) {
            /* The interface to IP conversion provided a dotted address */
            in=inet_addr(myhost);
            addr = Curl_ip2addr(in, myhost, 0);
          }
          else if(strlen(data->set.ftpport)> 1) {
            /* might be a host name! */
            struct Curl_dns_entry *h=NULL;
    
            int rc = Curl_resolv(conn, data->set.ftpport, 0, &h);
    
            if(rc == CURLRESOLV_PENDING)
              /* BLOCKING */
              rc = Curl_wait_for_resolv(conn, &h);
            if(h) {
              addr = h->addr;
              /* when we return from this function, we can forget about this entry
                 so we can unlock it now already */
              Curl_resolv_unlock(data, h);
    
    
              freeaddr = FALSE; /* make sure we don't free 'addr' in this function
                                   since it points to a DNS cache entry! */
    
            else {
              infof(data, "Failed to resolve host name %s\n", data->set.ftpport);
            }
    
          } /* strlen */
        } /* CURL_INADDR_NONE */
      } /* data->set.ftpport */
    
      if(!addr) {
        /* pick a suitable default here */
    
        if (getsockname(conn->sock[FIRSTSOCKET],
    
                        (struct sockaddr *)&sa, &sslen)) {
          failf(data, "getsockname() failed: %s",
              Curl_strerror(conn, Curl_sockerrno()) );
    
    Yang Tse's avatar
    Yang Tse committed
        if (sslen > (socklen_t)sizeof(sa))
    
    
        sa_filled_in = TRUE; /* the sa struct is filled in */
      }
    
      if (addr || sa_filled_in) {
        portsock = socket(AF_INET, SOCK_STREAM, 0);
        if(CURL_SOCKET_BAD != portsock) {
    
          /* we set the secondary socket variable to this for now, it
             is only so that the cleanup function will close it in case
             we fail before the true secondary stuff is made */
    
          if(CURL_SOCKET_BAD != conn->sock[SECONDARYSOCKET])
    
            sclose(conn->sock[SECONDARYSOCKET]);
          conn->sock[SECONDARYSOCKET] = portsock;
    
          if(!sa_filled_in) {
    
          if(bind(portsock, (struct sockaddr *)&sa, sslen) == 0) {
    
            /* we succeeded to bind */
            struct sockaddr_in add;
            socklen_t socksize = sizeof(add);
    
            if(getsockname(portsock, (struct sockaddr *) &add,
    
                           &socksize)) {
              failf(data, "getsockname() failed: %s",
                Curl_strerror(conn, Curl_sockerrno()) );
    
              return CURLE_FTP_PORT_FAILED;
            }
            porttouse = ntohs(add.sin_port);
    
            if ( listen(portsock, 1) < 0 ) {
              failf(data, "listen(2) failed on socket");
              return CURLE_FTP_PORT_FAILED;
            }
          }
          else {
            failf(data, "bind(2) failed on socket");
            return CURLE_FTP_PORT_FAILED;
          }
        }
        else {
          failf(data, "socket(2) failed (%s)");
          return CURLE_FTP_PORT_FAILED;
        }
      }
      else {
    
        failf(data, "couldn't find IP address to use");
    
        return CURLE_FTP_PORT_FAILED;
      }
    
      if(sa_filled_in)
        Curl_inet_ntop(AF_INET, &((struct sockaddr_in *)&sa)->sin_addr,
                       myhost, sizeof(myhost));
      else
        Curl_printable_address(addr, myhost, sizeof(myhost));
    
      if(4 == sscanf(myhost, "%hu.%hu.%hu.%hu",
                     &ip[0], &ip[1], &ip[2], &ip[3])) {
    
        infof(data, "Telling server to connect to %d.%d.%d.%d:%d\n",
              ip[0], ip[1], ip[2], ip[3], porttouse);
    
        result=Curl_nbftpsendf(conn, "PORT %d,%d,%d,%d,%d,%d",
                               ip[0], ip[1], ip[2], ip[3],
                               porttouse >> 8, porttouse & 255);
        if(result)
          return result;
      }
      else
        return CURLE_FTP_PORT_FAILED;
    
    
    Yang Tse's avatar
    Yang Tse committed
      ftpc->count1 = PORT;
    
      /* this tcpconnect assignment below is a hackish work-around to make the
         multi interface with active FTP work - as it will not wait for a
         (passive) connect in Curl_is_connected().
    
         The *proper* fix is to make sure that the active connection from the
         server is done in a non-blocking way. Currently, it is still BLOCKING.
      */
      conn->bits.tcpconnect = TRUE;
    
    
      state(conn, FTP_PORT);
      return result;
    }
    
    static CURLcode ftp_state_use_pasv(struct connectdata *conn)
    {
    
      struct ftp_conn *ftpc = &conn->proto.ftpc;
    
      CURLcode result = CURLE_OK;
      /*
        Here's the excecutive summary on what to do:
    
        PASV is RFC959, expect:
        227 Entering Passive Mode (a1,a2,a3,a4,p1,p2)
    
        LPSV is RFC1639, expect:
        228 Entering Long Passive Mode (4,4,a1,a2,a3,a4,2,p1,p2)
    
        EPSV is RFC2428, expect:
        229 Entering Extended Passive Mode (|||port|)
    
      */
    
      const char *mode[] = { "EPSV", "PASV", NULL };
      int modeoff;
    
    #ifdef PF_INET6
      if(!conn->bits.ftp_use_epsv && conn->bits.ipv6)
        /* EPSV is disabled but we are connected to a IPv6 host, so we ignore the
           request and enable EPSV again! */
        conn->bits.ftp_use_epsv = TRUE;
    #endif
    
      modeoff = conn->bits.ftp_use_epsv?0:1;
    
      result = Curl_nbftpsendf(conn, "%s", mode[modeoff]);
      if(result)
        return result;
    
    
      state(conn, FTP_PASV);
      infof(conn->data, "Connect data stream passively\n");
    
      return result;
    }
    
    /* REST is the last command in the chain of commands when a "head"-like
       request is made. Thus, if an actual transfer is to be made this is where
       we take off for real. */
    static CURLcode ftp_state_post_rest(struct connectdata *conn)
    {
      CURLcode result = CURLE_OK;
    
      struct FTP *ftp = conn->data->reqdata.proto.ftp;
    
      struct SessionHandle *data = conn->data;
    
      if(ftp->no_transfer || conn->bits.no_body) {
        /* doesn't transfer any data */
        ftp->no_transfer = TRUE;
    
    
        /* still possibly do PRE QUOTE jobs */
        state(conn, FTP_RETR_PREQUOTE);
        result = ftp_state_quote(conn, TRUE, FTP_RETR_PREQUOTE);
    
      }
      else if(data->set.ftp_use_port) {
        /* We have chosen to use the PORT (or similar) command */
        result = ftp_state_use_port(conn, EPRT);
      }
      else {
        /* We have chosen (this is default) to use the PASV (or similar) command */
        result = ftp_state_use_pasv(conn);
      }
      return result;
    }
    
    static CURLcode ftp_state_post_size(struct connectdata *conn)
    {
      CURLcode result = CURLE_OK;
    
      struct FTP *ftp = conn->data->reqdata.proto.ftp;
    
    
      if(ftp->no_transfer) {
        /* if a "head"-like request is being made */
    
        /* Determine if server can respond to REST command and therefore
           whether it supports range */
        NBFTPSENDF(conn, "REST %d", 0);
    
        state(conn, FTP_REST);
      }
      else
        result = ftp_state_post_rest(conn);
    
      return result;
    }
    
    static CURLcode ftp_state_post_type(struct connectdata *conn)
    {
      CURLcode result = CURLE_OK;
    
      struct FTP *ftp = conn->data->reqdata.proto.ftp;
    
    
      if(ftp->no_transfer) {
        /* if a "head"-like request is being made */
    
        /* we know ftp->file is a valid pointer to a file name */
        NBFTPSENDF(conn, "SIZE %s", ftp->file);
    
        state(conn, FTP_SIZE);
      }
      else
        result = ftp_state_post_size(conn);
    
      return result;
    }
    
    static CURLcode ftp_state_post_listtype(struct connectdata *conn)
    {
      CURLcode result = CURLE_OK;
      struct SessionHandle *data = conn->data;
    
      /* If this output is to be machine-parsed, the NLST command might be better
         to use, since the LIST command output is not specified or standard in any
         way. It has turned out that the NLST list output is not the same on all
         servers either... */
    
      NBFTPSENDF(conn, "%s",
                 data->set.customrequest?data->set.customrequest:
                 (data->set.ftp_list_only?"NLST":"LIST"));
    
      state(conn, FTP_LIST);
    
      return result;
    }
    
    static CURLcode ftp_state_post_retrtype(struct connectdata *conn)
    {
      CURLcode result = CURLE_OK;
    
      /* We've sent the TYPE, now we must send the list of prequote strings */
    
      result = ftp_state_quote(conn, TRUE, FTP_RETR_PREQUOTE);
    
      return result;
    }
    
    static CURLcode ftp_state_post_stortype(struct connectdata *conn)
    {
      CURLcode result = CURLE_OK;
    
      /* We've sent the TYPE, now we must send the list of prequote strings */
    
      result = ftp_state_quote(conn, TRUE, FTP_STOR_PREQUOTE);
    
      return result;
    }
    
    static CURLcode ftp_state_post_mdtm(struct connectdata *conn)
    {
      CURLcode result = CURLE_OK;
    
      struct FTP *ftp = conn->data->reqdata.proto.ftp;
    
      struct SessionHandle *data = conn->data;
    
      /* If we have selected NOBODY and HEADER, it means that we only want file
         information. Which in FTP can't be much more than the file size and
         date. */
    
      if(conn->bits.no_body && data->set.include_header && ftp->file &&
         ftp_need_type(conn, data->set.prefer_ascii)) {
    
        /* The SIZE command is _not_ RFC 959 specified, and therefor many servers
           may not support it! It is however the only way we have to get a file's
           size! */
    
        ftp->no_transfer = TRUE; /* this means no actual transfer will be made */
    
        /* Some servers return different sizes for different modes, and thus we
           must set the proper type before we check the size */
    
        result = ftp_nb_type(conn, data->set.prefer_ascii, FTP_TYPE);
        if (result)
          return result;
    
      }
      else
        result = ftp_state_post_type(conn);
    
      return result;
    }
    
    /* This is called after the CWD commands have been done in the beginning of
       the DO phase */
    static CURLcode ftp_state_post_cwd(struct connectdata *conn)
    {
      CURLcode result = CURLE_OK;
    
      struct FTP *ftp = conn->data->reqdata.proto.ftp;
    
      struct SessionHandle *data = conn->data;
    
      /* Requested time of file or time-depended transfer? */
      if((data->set.get_filetime || data->set.timecondition) && ftp->file) {
    
        /* we have requested to get the modified-time of the file, this is a white
           spot as the MDTM is not mentioned in RFC959 */
        NBFTPSENDF(conn, "MDTM %s", ftp->file);
    
        state(conn, FTP_MDTM);
      }
      else
        result = ftp_state_post_mdtm(conn);
    
      return result;
    }
    
    
    /* This is called after the TYPE and possible quote commands have been sent */
    
    static CURLcode ftp_state_ul_setup(struct connectdata *conn,
                                       bool sizechecked)
    
      struct FTP *ftp = conn->data->reqdata.proto.ftp;
    
      struct SessionHandle *data = conn->data;
      curl_off_t passed=0;
    
    
      if((data->reqdata.resume_from && !sizechecked) ||
         ((data->reqdata.resume_from > 0) && sizechecked)) {
    
        /* we're about to continue the uploading of a file */
        /* 1. get already existing file's size. We use the SIZE command for this
           which may not exist in the server!  The SIZE command is not in
           RFC959. */
    
        /* 2. This used to set REST. But since we can do append, we
           don't another ftp command. We just skip the source file
           offset and then we APPEND the rest on the file instead */
    
        /* 3. pass file-size number of bytes in the source file */
        /* 4. lower the infilesize counter */
        /* => transfer as usual */
    
    
          /* Got no given size to start from, figure it out */
          NBFTPSENDF(conn, "SIZE %s", ftp->file);
          state(conn, FTP_STOR_SIZE);
          return result;
        }
    
        /* enable append */
        data->set.ftp_append = TRUE;
    
        /* Let's read off the proper amount of bytes from the input. If we knew it
           was a proper file we could've just fseek()ed but we only have a stream
           here */
    
        /* TODO: allow the ioctlfunction to provide a fast forward function that
           can be used here and use this method only as a fallback! */
        do {
    
          curl_off_t readthisamountnow = (data->reqdata.resume_from - passed);
    
          curl_off_t actuallyread;
    
          if(readthisamountnow > BUFSIZE)
            readthisamountnow = BUFSIZE;
    
          actuallyread = (curl_off_t)
            conn->fread(data->state.buffer, 1, (size_t)readthisamountnow,
                        conn->fread_in);
    
          passed += actuallyread;
          if(actuallyread != readthisamountnow) {
            failf(data, "Could only read %" FORMAT_OFF_T
                  " bytes from the input", passed);
            return CURLE_FTP_COULDNT_USE_REST;
          }
    
        } while(passed != data->reqdata.resume_from);
    
    
        /* now, decrease the size of the read */
        if(data->set.infilesize>0) {
    
          data->set.infilesize -= data->reqdata.resume_from;
    
    
          if(data->set.infilesize <= 0) {
            infof(data, "File already completely uploaded\n");
    
            /* no data to transfer */
    
            result=Curl_setup_transfer(conn, -1, -1, FALSE, NULL, -1, NULL);
    
    
            /* Set no_transfer so that we won't get any error in
             * Curl_ftp_done() because we didn't transfer anything! */
            ftp->no_transfer = TRUE;
    
            state(conn, FTP_STOP);
            return CURLE_OK;
          }
    
        /* we've passed, proceed as normal */
      } /* resume_from */
    
      NBFTPSENDF(conn, data->set.ftp_append?"APPE %s":"STOR %s",
                 ftp->file);
    
      state(conn, FTP_STOR);
    
      return result;
    }
    
    static CURLcode ftp_state_quote(struct connectdata *conn,
                                    bool init,
                                    ftpstate instate)
    {
      CURLcode result = CURLE_OK;
      struct SessionHandle *data = conn->data;
    
      struct FTP *ftp = data->reqdata.proto.ftp;
      struct ftp_conn *ftpc = &conn->proto.ftpc;
    
      bool quote=FALSE;
      struct curl_slist *item;
    
      switch(instate) {
      case FTP_QUOTE:
      default:
        item = data->set.quote;
        break;
      case FTP_RETR_PREQUOTE:
      case FTP_STOR_PREQUOTE:
        item = data->set.prequote;
        break;
      case FTP_POSTQUOTE:
        item = data->set.postquote;
        break;
    
    
      if(item) {
        int i = 0;
    
        /* Skip count1 items in the linked list */
    
          item = item->next;
          i++;
        }
        if(item) {
          NBFTPSENDF(conn, "%s", item->data);
          state(conn, instate);
          quote = TRUE;
        }
      }
    
      if(!quote) {
        /* No more quote to send, continue to ... */
        switch(instate) {
        case FTP_QUOTE:
        default:
          result = ftp_state_cwd(conn);
          break;
        case FTP_RETR_PREQUOTE:
    
          if (ftp->no_transfer)
            state(conn, FTP_STOP);
          else {
            NBFTPSENDF(conn, "SIZE %s", ftp->file);
            state(conn, FTP_RETR_SIZE);
          }
    
          result = ftp_state_ul_setup(conn, FALSE);
    
          break;
        case FTP_POSTQUOTE:
          break;
        }
      }
    
      return result;
    }
    
    static CURLcode ftp_state_pasv_resp(struct connectdata *conn,
                                        int ftpcode)
    {
    
      struct ftp_conn *ftpc = &conn->proto.ftpc;
    
      CURLcode result;
      struct SessionHandle *data=conn->data;
      Curl_addrinfo *conninfo;
      struct Curl_dns_entry *addr=NULL;
      int rc;
      unsigned short connectport; /* the local port connect() should use! */
      unsigned short newport=0; /* remote port */
      bool connected;
    
      /* newhost must be able to hold a full IP-style address in ASCII, which
         in the IPv6 case means 5*8-1 = 39 letters */
    #define NEWHOST_BUFSIZE 48
      char newhost[NEWHOST_BUFSIZE];
      char *str=&data->state.buffer[4];  /* start on the first letter */
    
    
         (ftpcode == 229)) {
        /* positive EPSV response */
        char *ptr = strchr(str, '(');
        if(ptr) {
          unsigned int num;
          char separator[4];
          ptr++;
          if(5  == sscanf(ptr, "%c%c%c%u%c",
                          &separator[0],
                          &separator[1],
                          &separator[2],
                          &num,
                          &separator[3])) {
    
            int i;
    
            /* The four separators should be identical, or else this is an oddly
               formatted reply and we bail out immediately. */
            for(i=1; i<4; i++) {
              if(separator[i] != sep1) {
                ptr=NULL; /* set to NULL to signal error */
                break;
              }
            }
            if(ptr) {
    
    Yang Tse's avatar
    Yang Tse committed
              newport = (unsigned short)(num & 0xffff);
    
              if (conn->bits.tunnel_proxy)
                /* proxy tunnel -> use other host info because ip_addr_str is the
                   proxy address not the ftp host */
                snprintf(newhost, sizeof(newhost), "%s", conn->host.name);
              else
                /* use the same IP we are already connected to */
                snprintf(newhost, NEWHOST_BUFSIZE, "%s", conn->ip_addr_str);
    
            }
          }
          else
            ptr=NULL;
        }
        if(!ptr) {
          failf(data, "Weirdly formatted EPSV reply");
          return CURLE_FTP_WEIRD_PASV_REPLY;
        }
      }
    
              (ftpcode == 227)) {
        /* positive PASV response */
        int ip[4];
        int port[2];
    
        /*
         * Scan for a sequence of six comma-separated numbers and use them as
         * IP+port indicators.
         *
         * Found reply-strings include:
         * "227 Entering Passive Mode (127,0,0,1,4,51)"
         * "227 Data transfer will passively listen to 127,0,0,1,4,51"
         * "227 Entering passive mode. 127,0,0,1,4,51"
         */
        while(*str) {
          if (6 == sscanf(str, "%d,%d,%d,%d,%d,%d",
                          &ip[0], &ip[1], &ip[2], &ip[3],
                          &port[0], &port[1]))
            break;
          str++;
        }
    
        if(!*str) {
          failf(data, "Couldn't interpret the 227-response");
          return CURLE_FTP_WEIRD_227_FORMAT;
        }
    
    
        /* we got OK from server */
        if(data->set.ftp_skip_ip) {
          /* told to ignore the remotely given IP but instead use the one we used
             for the control connection */
          infof(data, "Skips %d.%d.%d.%d for data connection, uses %s instead\n",
                ip[0], ip[1], ip[2], ip[3],
                conn->ip_addr_str);
    
          if (conn->bits.tunnel_proxy)
            /* proxy tunnel -> use other host info because ip_addr_str is the
               proxy address not the ftp host */
            snprintf(newhost, sizeof(newhost), "%s", conn->host.name);
          else
            snprintf(newhost, sizeof(newhost), "%s", conn->ip_addr_str);
    
        }
        else
          snprintf(newhost, sizeof(newhost),
                   "%d.%d.%d.%d", ip[0], ip[1], ip[2], ip[3]);
    
    Yang Tse's avatar
    Yang Tse committed
        newport = (unsigned short)(((port[0]<<8) + port[1]) & 0xffff);
    
        /* EPSV failed, move on to PASV */
    
        /* disable it for next transfer */
        conn->bits.ftp_use_epsv = FALSE;
        infof(data, "disabling EPSV usage\n");
    
        NBFTPSENDF(conn, "PASV", NULL);
    
        /* remain in the FTP_PASV state */
        return result;
      }
      else {
        failf(data, "Bad PASV/EPSV response: %03d", ftpcode);
        return CURLE_FTP_WEIRD_PASV_REPLY;
      }
    
    
      if(data->set.proxy && *data->set.proxy) {
    
        /*
         * This is a tunnel through a http proxy and we need to connect to the
         * proxy again here.
         *
         * We don't want to rely on a former host lookup that might've expired
         * now, instead we remake the lookup here and now!
         */
        rc = Curl_resolv(conn, conn->proxy.name, (int)conn->port, &addr);
        if(rc == CURLRESOLV_PENDING)
          /* BLOCKING */
          rc = Curl_wait_for_resolv(conn, &addr);
    
        connectport =
          (unsigned short)conn->port; /* we connect to the proxy's port */
    
      }
      else {
        /* normal, direct, ftp connection */
        rc = Curl_resolv(conn, newhost, newport, &addr);
        if(rc == CURLRESOLV_PENDING)
          /* BLOCKING */
          rc = Curl_wait_for_resolv(conn, &addr);
    
        if(!addr) {
          failf(data, "Can't resolve new host %s:%d", newhost, newport);
          return CURLE_FTP_CANT_GET_HOST;
        }
        connectport = newport; /* we connect to the remote port */
      }
    
      result = Curl_connecthost(conn,
                                addr,
                                &conn->sock[SECONDARYSOCKET],
                                &conninfo,
                                &connected);
    
      Curl_resolv_unlock(data, addr); /* we're done using this address */
    
      if (result && ftpc->count1 == 0 && ftpcode == 229) {
    
        infof(data, "got positive EPSV response, but can't connect. "
              "Disabling EPSV\n");
        /* disable it for next transfer */
        conn->bits.ftp_use_epsv = FALSE;
        data->state.errorbuf = FALSE; /* allow error message to get rewritten */
        NBFTPSENDF(conn, "PASV", NULL);
    
      conn->bits.tcpconnect = connected; /* simply TRUE or FALSE */
    
      /*
       * When this is used from the multi interface, this might've returned with
       * the 'connected' set to FALSE and thus we are now awaiting a non-blocking
       * connect to connect and we should not be "hanging" here waiting.
       */
    
      if(data->set.verbose)
        /* this just dumps information about this second connection */
        ftp_pasv_verbose(conn, conninfo, newhost, connectport);
    
    #ifndef CURL_DISABLE_HTTP
    
      if(conn->bits.tunnel_proxy && conn->bits.httpproxy) {
    
        /* FIX: this MUST wait for a proper connect first if 'connected' is
         * FALSE */
    
        /* BLOCKING */
        /* We want "seamless" FTP operations through HTTP proxy tunnel */
    
    
        /* Curl_proxyCONNECT is based on a pointer to a struct HTTP at the member
         * conn->proto.http; we want FTP through HTTP and we have to change the
         * member temporarily for connecting to the HTTP proxy. After
         * Curl_proxyCONNECT we have to set back the member to the original struct
         * FTP pointer
         */
        struct HTTP http_proxy;
    
        struct FTP *ftp_save = data->reqdata.proto.ftp;
    
        memset(&http_proxy, 0, sizeof(http_proxy));
    
        data->reqdata.proto.http = &http_proxy;
    
        result = Curl_proxyCONNECT(conn, SECONDARYSOCKET, newhost, newport);
    
        if(CURLE_OK != result)
          return result;
      }
    #endif   /* CURL_DISABLE_HTTP */
    
      state(conn, FTP_STOP); /* this phase is completed */
    
      return result;
    }
    
    static CURLcode ftp_state_port_resp(struct connectdata *conn,
                                        int ftpcode)
    {
      struct SessionHandle *data = conn->data;
    
      struct ftp_conn *ftpc = &conn->proto.ftpc;
      ftpport fcmd = (ftpport)ftpc->count1;
    
      if(ftpcode != 200) {
        /* the command failed */
    
        if (EPRT == fcmd) {
          infof(data, "disabling EPRT usage\n");
          conn->bits.ftp_use_eprt = FALSE;
    
        if(fcmd == DONE) {
          failf(data, "Failed to do PORT");
          result = CURLE_FTP_PORT_FAILED;
        }
        else
          /* try next */
          result = ftp_state_use_port(conn, fcmd);
    
        infof(data, "Connect data stream actively\n");
        state(conn, FTP_STOP); /* end of DO phase */
    
    static CURLcode ftp_state_mdtm_resp(struct connectdata *conn,
                                        int ftpcode)
    
      CURLcode result = CURLE_OK;
      struct SessionHandle *data=conn->data;
    
      struct FTP *ftp = data->reqdata.proto.ftp;
    
      switch(ftpcode) {
      case 213:
        {
          /* we got a time. Format should be: "YYYYMMDDHHMMSS[.sss]" where the
             last .sss part is optional and means fractions of a second */
          int year, month, day, hour, minute, second;
          char *buf = data->state.buffer;
          if(6 == sscanf(buf+4, "%04d%02d%02d%02d%02d%02d",
                         &year, &month, &day, &hour, &minute, &second)) {
            /* we have a time, reformat it */
            time_t secs=time(NULL);
            /* using the good old yacc/bison yuck */
            snprintf(buf, sizeof(conn->data->state.buffer),
                     "%04d%02d%02d %02d:%02d:%02d GMT",
                     year, month, day, hour, minute, second);
            /* now, convert this into a time() value: */
    
            data->info.filetime = (long)curl_getdate(buf, &secs);
    
          /* If we asked for a time of the file and we actually got one as well,
             we "emulate" a HTTP-style header in our output. */
    
          if(conn->bits.no_body &&
             data->set.include_header &&
             ftp->file &&
             data->set.get_filetime &&
             (data->info.filetime>=0) ) {
    
            struct tm *tm;
            time_t clock = (time_t)data->info.filetime;
    #ifdef HAVE_GMTIME_R
            struct tm buffer;
            tm = (struct tm *)gmtime_r(&clock, &buffer);
    #else
            tm = gmtime(&clock);
    #endif
            /* format: "Tue, 15 Nov 1994 12:45:26" */
    
            snprintf(buf, BUFSIZE-1,
                     "Last-Modified: %s, %02d %s %4d %02d:%02d:%02d GMT\r\n",
                     Curl_wkday[tm->tm_wday?tm->tm_wday-1:6],
                     tm->tm_mday,
                     Curl_month[tm->tm_mon],
                     tm->tm_year + 1900,
                     tm->tm_hour,
                     tm->tm_min,
                     tm->tm_sec);
    
            result = Curl_client_write(conn, CLIENTWRITE_BOTH, buf, 0);
    
          } /* end of a ridiculous amount of conditionals */
    
        break;
      default:
        infof(data, "unsupported MDTM reply format\n");
        break;
      case 550: /* "No such file or directory" */
        failf(data, "Given file does not exist");
        result = CURLE_FTP_COULDNT_RETR_FILE;
        break;
    
    
      if(data->set.timecondition) {
        if((data->info.filetime > 0) && (data->set.timevalue > 0)) {
          switch(data->set.timecondition) {
          case CURL_TIMECOND_IFMODSINCE:
          default:
    
            if(data->info.filetime <= data->set.timevalue) {
    
              infof(data, "The requested document is not new enough\n");
              ftp->no_transfer = TRUE; /* mark this to not transfer data */
              state(conn, FTP_STOP);
              return CURLE_OK;
            }
            break;
          case CURL_TIMECOND_IFUNMODSINCE:
            if(data->info.filetime > data->set.timevalue) {
              infof(data, "The requested document is not old enough\n");
              ftp->no_transfer = TRUE; /* mark this to not transfer data */
              state(conn, FTP_STOP);
              return CURLE_OK;
            }
            break;
          } /* switch */
    
        else {
          infof(data, "Skipping time comparison\n");
    
      if(!result)
        result = ftp_state_post_mdtm(conn);
    
    static CURLcode ftp_state_type_resp(struct connectdata *conn,
                                        int ftpcode,
                                        ftpstate instate)
    {
      CURLcode result = CURLE_OK;
      struct SessionHandle *data=conn->data;
    
      if(ftpcode/100 != 2) {
        /* "sasserftpd" and "(u)r(x)bot ftpd" both responds with 226 after a
           successful 'TYPE I'. While that is not as RFC959 says, it is still a
           positive response code and we allow that. */
    
        failf(data, "Couldn't set desired mode");
        return CURLE_FTP_COULDNT_SET_BINARY; /* FIX */
      }
    
      if(ftpcode != 200)
        infof(data, "Got a %03d response code instead of the assumed 200\n",
              ftpcode);
    
    
      if(instate == FTP_TYPE)
        result = ftp_state_post_type(conn);
      else if(instate == FTP_LIST_TYPE)
        result = ftp_state_post_listtype(conn);
      else if(instate == FTP_RETR_TYPE)
        result = ftp_state_post_retrtype(conn);
      else if(instate == FTP_STOR_TYPE)
        result = ftp_state_post_stortype(conn);
    
    static CURLcode ftp_state_post_retr_size(struct connectdata *conn,
                                             curl_off_t filesize)
    {
      CURLcode result = CURLE_OK;
      struct SessionHandle *data=conn->data;
    
      struct FTP *ftp = data->reqdata.proto.ftp;
    
      if (data->set.max_filesize && (filesize > data->set.max_filesize)) {
        failf(data, "Maximum file size exceeded");
        return CURLE_FILESIZE_EXCEEDED;
      }
      ftp->downloadsize = filesize;
    
        /* We always (attempt to) get the size of downloads, so it is done before
           this even when not doing resumes. */
        if(filesize == -1) {
          infof(data, "ftp server doesn't support SIZE\n");
          /* We couldn't get the size and therefore we can't know if there really
             is a part of the file left to get, although the server will just
             close the connection when we start the connection so it won't cause
             us any harm, just not make us exit as nicely. */
        }
        else {
          /* We got a file size report, so we check that there actually is a
             part of the file left to get, or else we go home.  */
    
            /* We're supposed to download the last abs(from) bytes */
    
            if(filesize < -data->reqdata.resume_from) {
    
              failf(data, "Offset (%" FORMAT_OFF_T
                    ") was beyond file size (%" FORMAT_OFF_T ")",
    
                    data->reqdata.resume_from, filesize);
    
              return CURLE_BAD_DOWNLOAD_RESUME;
            }
            /* convert to size to download */
    
            ftp->downloadsize = -data->reqdata.resume_from;
    
            data->reqdata.resume_from = filesize - ftp->downloadsize;
    
            if(filesize < data->reqdata.resume_from) {
    
              failf(data, "Offset (%" FORMAT_OFF_T
                    ") was beyond file size (%" FORMAT_OFF_T ")",
    
                    data->reqdata.resume_from, filesize);
    
              return CURLE_BAD_DOWNLOAD_RESUME;
            }
            /* Now store the number of bytes we are expected to download */
    
            ftp->downloadsize = filesize-data->reqdata.resume_from;
    
        if(ftp->downloadsize == 0) {
          /* no data to transfer */
    
          result = Curl_setup_transfer(conn, -1, -1, FALSE, NULL, -1, NULL);
    
          infof(data, "File already completely downloaded\n");
    
          /* Set no_transfer so that we won't get any error in Curl_ftp_done()
           * because we didn't transfer the any file */
          ftp->no_transfer = TRUE;
          state(conn, FTP_STOP);
          return CURLE_OK;
    
        /* Set resume file transfer offset */
        infof(data, "Instructs server to resume from offset %" FORMAT_OFF_T