Skip to content
ftp.c 85.5 KiB
Newer Older
        /* we have a time, reformat it */
        time_t secs=time(NULL);
        /* using the good old yacc/bison yuck */
        snprintf(buf, sizeof(conn->data->state.buffer),
                 "%04d%02d%02d %02d:%02d:%02d GMT",
                 year, month, day, hour, minute, second);
        /* now, convert this into a time() value: */
        conn->data->info.filetime = curl_getdate(buf, &secs);
      }
    break;
  default:
    infof(conn->data, "unsupported MDTM reply format\n");
    break;
  case 550: /* "No such file or directory" */
    failf(conn->data, "Given file does not exist");
    result = CURLE_FTP_COULDNT_RETR_FILE;
    break;
/***********************************************************************
 *
 * ftp_transfertype()
 *
 * Set transfer type. We only deal with ASCII or BINARY so this function
 * sets one of them.
 */
static CURLcode ftp_transfertype(struct connectdata *conn,
  struct SessionHandle *data = conn->data;
  FTPSENDF(conn, "TYPE %s", ascii?"A":"I");
  result = Curl_GetFTPResponse(&nread, conn, &ftpcode);
  if(result)
    return result;
  if(ftpcode != 200) {
    failf(data, "Couldn't set %s mode",
          ascii?"ASCII":"binary");
    return ascii? CURLE_FTP_COULDNT_SET_ASCII:CURLE_FTP_COULDNT_SET_BINARY;
  }

  return CURLE_OK;
}

/***********************************************************************
 *
 * ftp_getsize()
 *
 * Returns the file size (in bytes) of the given remote file.
 */

CURLcode ftp_getsize(struct connectdata *conn, char *file,
                     curl_off_t *size)
  struct SessionHandle *data = conn->data;
  result = Curl_GetFTPResponse(&nread, conn, &ftpcode);
  if(result)
    return result;

  if(ftpcode == 213) {
    /* get the size from the ascii string: */
    *size = curlx_strtoofft(buf+4, NULL, 0);
/***************************************************************************
 *
 * ftp_pasv_verbose()
 *
 * This function only outputs some informationals about this second connection
 * when we've issued a PASV command before and thus we have connected to a
 * possibly new IP address.
 *
 */
static void
ftp_pasv_verbose(struct connectdata *conn,
                 char *newhost, /* ascii version */
                 int port)
  char buf[256];
  Curl_printable_address(ai, buf, sizeof(buf));
  infof(conn->data, "Connecting to %s (%s) port %d\n", newhost, buf, port);
/***********************************************************************
 *
 * ftp_use_port()
 *
 * Send the proper PORT command. PORT is the ftp client's way of telling the
 * server that *WE* open a port that we listen on an awaits the server to
 * connect to. This is the opposite of PASV.
CURLcode ftp_use_port(struct connectdata *conn)
  struct SessionHandle *data=conn->data;
  curl_socket_t portsock= CURL_SOCKET_BAD;
  ssize_t nread;
  int ftpcode; /* receive FTP response codes in this */
Daniel Stenberg's avatar
Daniel Stenberg committed

#ifdef ENABLE_IPV6
  /******************************************************************
   *
   * Here's a piece of IPv6-specific code coming up
   *
   */
  struct addrinfo hints, *res, *ai;
  struct sockaddr_storage ss;
  socklen_t sslen;
  struct sockaddr *sa=(struct sockaddr *)&ss;
  unsigned char *ap;
  unsigned char *pp;
  char portmsgbuf[1024], tmp[1024];
Daniel Stenberg's avatar
Daniel Stenberg committed
  enum ftpcommand { EPRT, LPRT, PORT, DONE } fcmd;
  const char *mode[] = { "EPRT", "LPRT", "PORT", NULL };
  char *host=NULL;
  struct Curl_dns_entry *h=NULL;

  if(data->set.ftpport && (strlen(data->set.ftpport) > 1)) {
    /* attempt to get the address of the given interface name */
    if(!Curl_if2ip(data->set.ftpport, hbuf, sizeof(hbuf)))
      /* not an interface, use the given string as host name instead */
      host = data->set.ftpport;
    else
      host = hbuf; /* use the hbuf for host name */
  } /* data->set.ftpport */

  if(!host) {
    /* not an interface and not a host name, get default by extracting
       the IP from the control connection */

    sslen = sizeof(ss);
    rc = getsockname(conn->sock[FIRSTSOCKET], (struct sockaddr *)&ss, &sslen);
    if(rc < 0) {
      failf(data, "getsockname() returned %d\n", rc);
      return CURLE_FTP_PORT_FAILED;
    }
    rc = getnameinfo((struct sockaddr *)&ss, sslen, hbuf, sizeof(hbuf), NULL,
                     0, NIFLAGS);
    if(rc) {
      failf(data, "getnameinfo() returned %d\n", rc);
      return CURLE_FTP_PORT_FAILED;
    }
    host = hbuf; /* use this host name */
  rc = Curl_resolv(conn, host, 0, &h);
  if(rc == CURLRESOLV_PENDING)
    rc = Curl_wait_for_resolv(conn, &h);
  if(h) {
    res = h->addr;
    /* when we return from this function, we can forget about this entry
       to we can unlock it now already */
    Curl_resolv_unlock(data, h);
  } /* (h) */
  else
    res = NULL; /* failure! */
    /*
     * Workaround for AIX5 getaddrinfo() problem (it doesn't set ai_socktype):
     */
    if (ai->ai_socktype == 0)
      ai->ai_socktype = hints.ai_socktype;

    portsock = socket(ai->ai_family, ai->ai_socktype, ai->ai_protocol);
    if (portsock == CURL_SOCKET_BAD) {
      error = Curl_ourerrno();
    if (bind(portsock, ai->ai_addr, ai->ai_addrlen) < 0) {
    failf(data, "%s", Curl_strerror(conn,error));
  sslen = sizeof(ss);
  if (getsockname(portsock, sa, &sslen) < 0) {
    failf(data, "%s", Curl_strerror(conn,Curl_ourerrno()));
  if(!conn->bits.ftp_use_eprt && conn->bits.ipv6)
    /* EPRT is disabled but we are connected to a IPv6 host, so we ignore the
       request and enable EPRT again! */
    conn->bits.ftp_use_eprt = TRUE;
#endif

Daniel Stenberg's avatar
Daniel Stenberg committed
  for (fcmd = EPRT; fcmd != DONE; fcmd++) {
    int alen=0, plen=0;
Daniel Stenberg's avatar
Daniel Stenberg committed
    if(!conn->bits.ftp_use_eprt && (EPRT == fcmd))
      /* if disabled, goto next */
      continue;

    if(!conn->bits.ftp_use_lprt && (LPRT == fcmd))
      /* if disabled, goto next */
      continue;

    switch (sa->sa_family) {
    case AF_INET:
      ap = (unsigned char *)&((struct sockaddr_in *)&ss)->sin_addr;
      alen = sizeof(((struct sockaddr_in *)&ss)->sin_addr);
      pp = (unsigned char *)&((struct sockaddr_in *)&ss)->sin_port;
      plen = sizeof(((struct sockaddr_in *)&ss)->sin_port);
      lprtaf = 4;
      eprtaf = 1;
      break;
    case AF_INET6:
      ap = (unsigned char *)&((struct sockaddr_in6 *)&ss)->sin6_addr;
      alen = sizeof(((struct sockaddr_in6 *)&ss)->sin6_addr);
      pp = (unsigned char *)&((struct sockaddr_in6 *)&ss)->sin6_port;
      plen = sizeof(((struct sockaddr_in6 *)&ss)->sin6_port);
      lprtaf = 6;
      eprtaf = 2;
      break;
    default:
      ap = pp = NULL;
      lprtaf = eprtaf = -1;
      break;
    }
Daniel Stenberg's avatar
Daniel Stenberg committed
    if (EPRT == fcmd) {
      if (eprtaf < 0)
        continue;
      if (getnameinfo((struct sockaddr *)&ss, sslen,
                      portmsgbuf, sizeof(portmsgbuf), tmp, sizeof(tmp),
                      NIFLAGS))
      /* do not transmit IPv6 scope identifier to the wire */
      if (sa->sa_family == AF_INET6) {
        char *q = strchr(portmsgbuf, '%');
Daniel Stenberg's avatar
Daniel Stenberg committed
      result = Curl_ftpsendf(conn, "%s |%d|%s|%s|", mode[fcmd], eprtaf,
                             portmsgbuf, tmp);
      if(result)
        return result;
Daniel Stenberg's avatar
Daniel Stenberg committed
    else if ((LPRT == fcmd) || (PORT == fcmd)) {
Daniel Stenberg's avatar
Daniel Stenberg committed
      if ((LPRT == fcmd) && lprtaf < 0)
Daniel Stenberg's avatar
Daniel Stenberg committed
      if ((PORT == fcmd) && sa->sa_family != AF_INET)
Daniel Stenberg's avatar
Daniel Stenberg committed
      if (LPRT == fcmd) {
        snprintf(tmp, sizeof(tmp), "%d,%d", lprtaf, alen);
        if (strlcat(portmsgbuf, tmp, sizeof(portmsgbuf)) >=
            sizeof(portmsgbuf)) {
      for (i = 0; i < alen; i++) {
        if (portmsgbuf[0])
          snprintf(tmp, sizeof(tmp), ",%u", ap[i]);
        else
          snprintf(tmp, sizeof(tmp), "%u", ap[i]);
        if (strlcat(portmsgbuf, tmp, sizeof(portmsgbuf)) >=
            sizeof(portmsgbuf)) {
          continue;
Daniel Stenberg's avatar
Daniel Stenberg committed
      if (LPRT == fcmd) {
        snprintf(tmp, sizeof(tmp), ",%d", plen);
        if (strlcat(portmsgbuf, tmp, sizeof(portmsgbuf)) >= sizeof(portmsgbuf))
          continue;
      }
      for (i = 0; i < plen; i++) {
        snprintf(tmp, sizeof(tmp), ",%u", pp[i]);
        if (strlcat(portmsgbuf, tmp, sizeof(portmsgbuf)) >=
            sizeof(portmsgbuf)) {
          continue;
Daniel Stenberg's avatar
Daniel Stenberg committed
      result = Curl_ftpsendf(conn, "%s %s", mode[fcmd], portmsgbuf);
      if(result)
        return result;
    result = Curl_GetFTPResponse(&nread, conn, &ftpcode);
    if(result)
      return result;
Daniel Stenberg's avatar
Daniel Stenberg committed
      if (EPRT == fcmd) {
        infof(data, "disabling EPRT usage\n");
        conn->bits.ftp_use_eprt = FALSE;
      }
      else if (LPRT == fcmd) {
        infof(data, "disabling LPRT usage\n");
        conn->bits.ftp_use_lprt = FALSE;
      }
Daniel Stenberg's avatar
Daniel Stenberg committed
  if (fcmd == DONE) {
    failf(data, "PORT command attempts failed");
    return CURLE_FTP_PORT_FAILED;
  }
  /* we set the secondary socket variable to this for now, it
     is only so that the cleanup function will close it in case
     we fail before the true secondary stuff is made */
  conn->sock[SECONDARYSOCKET] = portsock;
  /******************************************************************
   *
   * Here's a piece of IPv4-specific code coming up
   *
   */
  struct sockaddr_in sa;
  unsigned short porttouse;
  char myhost[256] = "";
  Curl_addrinfo *addr = NULL;
  unsigned short ip[4];
    in_addr_t in;

    /* First check if the given name is an IP address */
    in=inet_addr(data->set.ftpport);

    if(in != CURL_INADDR_NONE)
      /* this is an IPv4 address */
      addr = Curl_ip2addr(in, data->set.ftpport, 0);
      if(Curl_if2ip(data->set.ftpport, myhost, sizeof(myhost))) {
        /* The interface to IP conversion provided a dotted address */
        in=inet_addr(myhost);
        addr = Curl_ip2addr(in, myhost, 0);
      }
      else if(strlen(data->set.ftpport)> 1) {
        /* might be a host name! */
        struct Curl_dns_entry *h=NULL;
        int rc = Curl_resolv(conn, myhost, 0, &h);
        if(h) {
          addr = h->addr;
          /* when we return from this function, we can forget about this entry
             to we can unlock it now already */
          Curl_resolv_unlock(data, h);
        } /* (h) */
      } /* strlen */
    } /* CURL_INADDR_NONE */
  } /* data->set.ftpport */

  if(!addr) {
    /* pick a suitable default here */

    socklen_t sslen;
    if (getsockname(conn->sock[FIRSTSOCKET],
                    (struct sockaddr *)&sa, &sslen) < 0) {
      failf(data, "getsockname() failed");
      return CURLE_FTP_PORT_FAILED;
    }

    sa_filled_in = TRUE; /* the sa struct is filled in */
  if (addr || sa_filled_in) {
    portsock = socket(AF_INET, SOCK_STREAM, 0);
    if(CURL_SOCKET_BAD != portsock) {
      /* we set the secondary socket variable to this for now, it
         is only so that the cleanup function will close it in case
         we fail before the true secondary stuff is made */
      conn->sock[SECONDARYSOCKET] = portsock;
      if(bind(portsock, (struct sockaddr *)&sa, size) >= 0) {
        /* we succeeded to bind */
        struct sockaddr_in add;

        if(getsockname(portsock, (struct sockaddr *) &add,
          failf(data, "getsockname() failed");
          return CURLE_FTP_PORT_FAILED;
Daniel Stenberg's avatar
Daniel Stenberg committed
        }
        if ( listen(portsock, 1) < 0 ) {
          failf(data, "listen(2) failed on socket");
          return CURLE_FTP_PORT_FAILED;
Daniel Stenberg's avatar
Daniel Stenberg committed
        }
      }
      else {
        failf(data, "bind(2) failed on socket");
        return CURLE_FTP_PORT_FAILED;
Daniel Stenberg's avatar
Daniel Stenberg committed
      }
    }
    else {
      return CURLE_FTP_PORT_FAILED;
Daniel Stenberg's avatar
Daniel Stenberg committed
    }
    failf(data, "could't find IP address to use");

  if(sa_filled_in)
    Curl_inet_ntop(AF_INET, &((struct sockaddr_in *)&sa)->sin_addr,
                   myhost, sizeof(myhost));
  else
    Curl_printable_address(addr, myhost, sizeof(myhost));

  if(4 == sscanf(myhost, "%hu.%hu.%hu.%hu",
                 &ip[0], &ip[1], &ip[2], &ip[3])) {

    infof(data, "Telling server to connect to %d.%d.%d.%d:%d\n",
          ip[0], ip[1], ip[2], ip[3], porttouse);
    result=Curl_ftpsendf(conn, "PORT %d,%d,%d,%d,%d,%d",
                         ip[0], ip[1], ip[2], ip[3],
                         porttouse >> 8,
                         porttouse & 255);
    if(result)
      return result;
  else
    return CURLE_FTP_PORT_FAILED;

  Curl_freeaddrinfo(addr);
Daniel Stenberg's avatar
Daniel Stenberg committed

  result = Curl_GetFTPResponse(&nread, conn, &ftpcode);
  if(result)
    return result;
Daniel Stenberg's avatar
Daniel Stenberg committed

  if(ftpcode != 200) {
    failf(data, "Server does not grok PORT, try without it!");
    return CURLE_FTP_PORT_FAILED;
Daniel Stenberg's avatar
Daniel Stenberg committed
  }
/***********************************************************************
 *
 * ftp_use_pasv()
 *
 * Send the PASV command. PASV is the ftp client's way of asking the server to
 * open a second port that we can connect to (for the data transfer). This is
 * the opposite of PORT.
CURLcode ftp_use_pasv(struct connectdata *conn,
                      bool *connected)
{
  struct SessionHandle *data = conn->data;
  ssize_t nread;
  char *buf = data->state.buffer; /* this is our buffer */
  int ftpcode; /* receive FTP response codes in this */
  CURLcode result;

  /*
    Here's the excecutive summary on what to do:

    PASV is RFC959, expect:
    227 Entering Passive Mode (a1,a2,a3,a4,p1,p2)

    LPSV is RFC1639, expect:
    228 Entering Long Passive Mode (4,4,a1,a2,a3,a4,2,p1,p2)

    EPSV is RFC2428, expect:
    229 Entering Extended Passive Mode (|||port|)

  */
  const char *mode[] = { "EPSV", "PASV", NULL };
  int results[] = { 229, 227, 0 };
  unsigned short connectport; /* the local port connect() should use! */
  unsigned short newport=0; /* remote port, not necessary the local one */
  /* newhost must be able to hold a full IP-style address in ASCII, which
     in the IPv6 case means 5*8-1 = 39 letters */
#define NEWHOST_BUFSIZE 48
  char newhost[NEWHOST_BUFSIZE];
  if(!conn->bits.ftp_use_epsv && conn->bits.ipv6)
    /* EPSV is disabled but we are connected to a IPv6 host, so we ignore the
       request and enable EPSV again! */
    conn->bits.ftp_use_epsv = TRUE;
#endif

Daniel Stenberg's avatar
Daniel Stenberg committed
  for (modeoff = (conn->bits.ftp_use_epsv?0:1);
    result = Curl_ftpsendf(conn, "%s", mode[modeoff]);
    result = Curl_GetFTPResponse(&nread, conn, &ftpcode);
    if(result)
      return result;
Daniel Stenberg's avatar
Daniel Stenberg committed

    if(modeoff == 0) {
      /* EPSV is not supported, disable it for next transfer */
      conn->bits.ftp_use_epsv = FALSE;
      infof(data, "disabling EPSV usage\n");
    }
  if (!mode[modeoff]) {
    failf(data, "Odd return code after PASV");
    return CURLE_FTP_WEIRD_PASV_REPLY;
  }
  else if (227 == results[modeoff]) {
Daniel Stenberg's avatar
Daniel Stenberg committed

    /*
     * New 227-parser June 3rd 1999.
     * It now scans for a sequence of six comma-separated numbers and
     * will take them as IP+port indicators.
     *
     * Found reply-strings include:
     * "227 Entering Passive Mode (127,0,0,1,4,51)"
     * "227 Data transfer will passively listen to 127,0,0,1,4,51"
     * "227 Entering passive mode. 127,0,0,1,4,51"
     */
    while(*str) {
      if (6 == sscanf(str, "%d,%d,%d,%d,%d,%d",
                      &ip[0], &ip[1], &ip[2], &ip[3],
                      &port[0], &port[1]))
        break;
      str++;
    }
      failf(data, "Couldn't interpret the 227-reply");
Daniel Stenberg's avatar
Daniel Stenberg committed

    snprintf(newhost, sizeof(newhost),
             "%d.%d.%d.%d", ip[0], ip[1], ip[2], ip[3]);
  else if (229 == results[modeoff]) {
    char *ptr = strchr(buf, '(');
    if(ptr) {
      unsigned int num;
      char separator[4];
      ptr++;
      if(5  == sscanf(ptr, "%c%c%c%u%c",
                      &separator[0],
                      &separator[1],
                      &separator[2],
                      &num,
                      &separator[3])) {
        /* The four separators should be identical, or else this is an oddly
           formatted reply and we bail out immediately. */
        for(i=1; i<4; i++) {
          if(separator[i] != sep1) {
            ptr=NULL; /* set to NULL to signal error */
            break;
          }
        }
        if(ptr) {
          newport = num;

          /* We must use the same IP we are already connected to */
          snprintf(newhost, NEWHOST_BUFSIZE, "%s", conn->ip_addr_str);
    if(!ptr) {
      failf(data, "Weirdly formatted EPSV reply");
      return CURLE_FTP_WEIRD_PASV_REPLY;
  }
  else
    return CURLE_FTP_CANT_RECONNECT;

Daniel Stenberg's avatar
Daniel Stenberg committed
  if(data->change.proxy && *data->change.proxy) {
    /*
     * This is a tunnel through a http proxy and we need to connect to the
     * proxy again here.
     *
     * We don't want to rely on a former host lookup that might've expired
     * now, instead we remake the lookup here and now!
    rc = Curl_resolv(conn, conn->proxy.name, (int)conn->port, &addr);
      (unsigned short)conn->port; /* we connect to the proxy's port */
    /* normal, direct, ftp connection */
    rc = Curl_resolv(conn, newhost, newport, &addr);
      failf(data, "Can't resolve new host %s:%d", newhost, newport);
      return CURLE_FTP_CANT_GET_HOST;
    }
    connectport = newport; /* we connect to the remote port */
  }
  result = Curl_connecthost(conn,
                            addr,
  Curl_resolv_unlock(data, addr); /* we're done using this address */
  if(result)
    return result;

  /*
   * When this is used from the multi interface, this might've returned with
   * the 'connected' set to FALSE and thus we are now awaiting a non-blocking
   * connect to connect and we should not be "hanging" here waiting.
   */
  if(data->set.verbose)
    /* this just dumps information about this second connection */
    ftp_pasv_verbose(conn, conninfo, newhost, connectport);
    /* We want "seamless" FTP operations through HTTP proxy tunnel */
    result = Curl_ConnectHTTPProxyTunnel(conn, SECONDARYSOCKET,
    if(CURLE_OK != result)
      return result;
 * This function shall be called when the second FTP connection has been
 * established and is confirmed connected.
CURLcode Curl_ftp_nextconnect(struct connectdata *conn)
{
  struct SessionHandle *data=conn->data;
  char *buf = data->state.buffer; /* this is our buffer */
  CURLcode result;
  ssize_t nread;
  int ftpcode; /* for ftp status */
  /* the ftp struct is already inited in Curl_ftp_connect() */
  curl_off_t *bytecountp = ftp->bytecountp;
Daniel Stenberg's avatar
Daniel Stenberg committed

    /* Set type to binary (unless specified ASCII) */
    result = ftp_transfertype(conn, data->set.ftp_ascii);
Daniel Stenberg's avatar
Daniel Stenberg committed

    /* Send any PREQUOTE strings after transfer type is set? (Wesley Laxton)*/
    if(data->set.prequote) {
      if ((result = ftp_sendquote(conn, data->set.prequote)) != CURLE_OK)
        return result;
    }

Daniel Stenberg's avatar
Daniel Stenberg committed
      /* we're about to continue the uploading of a file */
      /* 1. get already existing file's size. We use the SIZE
         command for this which may not exist in the server!
         The SIZE command is not in RFC959. */

      /* 2. This used to set REST. But since we can do append, we
         don't another ftp command. We just skip the source file
         offset and then we APPEND the rest on the file instead */

      /* 3. pass file-size number of bytes in the source file */
      /* 4. lower the infilesize counter */
      /* => transfer as usual */

Daniel Stenberg's avatar
Daniel Stenberg committed
        /* we could've got a specified offset from the command line,
           but now we know we didn't */
        curl_off_t gottensize;
Daniel Stenberg's avatar
Daniel Stenberg committed

        if(CURLE_OK != ftp_getsize(conn, ftp->file, &gottensize)) {
          failf(data, "Couldn't get remote file size");
          return CURLE_FTP_COULDNT_GET_SIZE;
Daniel Stenberg's avatar
Daniel Stenberg committed
        }
Daniel Stenberg's avatar
Daniel Stenberg committed
        /* do we still game? */
        curl_off_t passed=0;
Daniel Stenberg's avatar
Daniel Stenberg committed
        /* enable append instead */
Daniel Stenberg's avatar
Daniel Stenberg committed
        /* Now, let's read off the proper amount of bytes from the
           input. If we knew it was a proper file we could've just
           fseek()ed but we only have a stream here */
        do {
          curl_off_t readthisamountnow = (conn->resume_from - passed);
          curl_off_t actuallyread;
Daniel Stenberg's avatar
Daniel Stenberg committed

          if(readthisamountnow > BUFSIZE)
            readthisamountnow = BUFSIZE;

          actuallyread = (curl_off_t)
            conn->fread(data->state.buffer, 1, (size_t)readthisamountnow,
Daniel Stenberg's avatar
Daniel Stenberg committed

          passed += actuallyread;
          if(actuallyread != readthisamountnow) {
            failf(data, "Could only read %" FORMAT_OFF_T
                  " bytes from the input", passed);
            return CURLE_FTP_COULDNT_USE_REST;
Daniel Stenberg's avatar
Daniel Stenberg committed

        /* now, decrease the size of the read */
        if(data->set.infilesize>0) {
          data->set.infilesize -= conn->resume_from;
Daniel Stenberg's avatar
Daniel Stenberg committed

            infof(data, "File already completely uploaded\n");

            /* no data to transfer */
            result=Curl_Transfer(conn, -1, -1, FALSE, NULL, -1, NULL);
            /* Set no_transfer so that we won't get any error in
             * Curl_ftp_done() because we didn't transfer anything! */
Daniel Stenberg's avatar
Daniel Stenberg committed
          }
        }
        /* we've passed, proceed as normal */
      }
    }

    /* Send everything on data->state.in to the socket */
Daniel Stenberg's avatar
Daniel Stenberg committed
      /* we append onto the file instead of rewriting it */
      FTPSENDF(conn, "APPE %s", ftp->file);
    }
    else {
      FTPSENDF(conn, "STOR %s", ftp->file);
    }
Daniel Stenberg's avatar
Daniel Stenberg committed

    result = Curl_GetFTPResponse(&nread, conn, &ftpcode);
    if(result)
      return result;
Daniel Stenberg's avatar
Daniel Stenberg committed

      failf(data, "Failed FTP upload: %03d", ftpcode);
Daniel Stenberg's avatar
Daniel Stenberg committed
      /* oops, we never close the sockets! */
      return CURLE_FTP_COULDNT_STOR_FILE;
      /* PORT means we are now awaiting the server to connect to us. */
Daniel Stenberg's avatar
Daniel Stenberg committed
      if( result )
        return result;
    }

    if(conn->ssl[SECONDARYSOCKET].use) {
      /* since we only have a plaintext TCP connection here, we must now
      infof(data, "Doing the SSL/TLS handshake on the data stream\n");
      result = Curl_SSLConnect(conn, SECONDARYSOCKET);
      if(result)
Daniel Stenberg's avatar
Daniel Stenberg committed
    *bytecountp=0;

    /* When we know we're uploading a specified file, we can get the file
       size prior to the actual upload. */

    Curl_pgrsSetUploadSize(data, data->set.infilesize);
    result = Curl_Transfer(conn, -1, -1, FALSE, NULL, /* no download */
Daniel Stenberg's avatar
Daniel Stenberg committed
    if(result)
      return result;
Daniel Stenberg's avatar
Daniel Stenberg committed
  }
Daniel Stenberg's avatar
Daniel Stenberg committed
    /* Retrieve file or directory */
    bool dirlist=FALSE;
    curl_off_t downloadsize=-1;
Daniel Stenberg's avatar
Daniel Stenberg committed

    if(conn->bits.use_range && conn->range) {
      curl_off_t from, to;
      curl_off_t totalsize=-1;
Daniel Stenberg's avatar
Daniel Stenberg committed
      char *ptr;
      char *ptr2;

      from=curlx_strtoofft(conn->range, &ptr, 0);
Daniel Stenberg's avatar
Daniel Stenberg committed
      while(ptr && *ptr && (isspace((int)*ptr) || (*ptr=='-')))
        ptr++;
Daniel Stenberg's avatar
Daniel Stenberg committed
      if(ptr == ptr2) {
        /* we didn't get any digit */
        to=-1;
      }
      if((-1 == to) && (from>=0)) {
Daniel Stenberg's avatar
Daniel Stenberg committed
        /* X - */
        infof(data, "FTP RANGE %" FORMAT_OFF_T " to end of file\n", from);
Daniel Stenberg's avatar
Daniel Stenberg committed
      }
      else if(from < 0) {
        /* -Y */
        totalsize = -from;
        infof(data, "FTP RANGE the last %" FORMAT_OFF_T " bytes\n", totalsize);
Daniel Stenberg's avatar
Daniel Stenberg committed
      }
      else {
Daniel Stenberg's avatar
Daniel Stenberg committed
        totalsize = to-from;
        conn->maxdownload = totalsize+1; /* include the last mentioned byte */
        infof(data, "FTP RANGE from %" FORMAT_OFF_T
              " getting %" FORMAT_OFF_T " bytes\n", from, conn->maxdownload);
Daniel Stenberg's avatar
Daniel Stenberg committed
      }
      infof(data, "range-download from %" FORMAT_OFF_T
            " to %" FORMAT_OFF_T ", totally %" FORMAT_OFF_T " bytes\n",
            from, to, conn->maxdownload);
      ftp->dont_check = TRUE; /* dont check for successful transfer */
Daniel Stenberg's avatar
Daniel Stenberg committed
    }
    if((data->set.ftp_list_only) || !ftp->file) {
Daniel Stenberg's avatar
Daniel Stenberg committed
      /* The specified path ends with a slash, and therefore we think this
         is a directory that is requested, use LIST. But before that we
         need to set ASCII transfer mode. */
      dirlist = TRUE;

      /* Set type to ASCII */
      result = ftp_transfertype(conn, TRUE /* ASCII enforced */);
Daniel Stenberg's avatar
Daniel Stenberg committed

      /* if this output is to be machine-parsed, the NLST command will be
         better used since the LIST command output is not specified or
         standard in any way */

            data->set.customrequest?data->set.customrequest:
            (data->set.ftp_list_only?"NLST":"LIST"));
Daniel Stenberg's avatar
Daniel Stenberg committed
    }
    else {
      curl_off_t foundsize;
Daniel Stenberg's avatar
Daniel Stenberg committed
      /* Set type to binary (unless specified ASCII) */
      result = ftp_transfertype(conn, data->set.ftp_ascii);
Daniel Stenberg's avatar
Daniel Stenberg committed

      /* Send any PREQUOTE strings after transfer type is set? */
      if(data->set.prequote) {
        if ((result = ftp_sendquote(conn, data->set.prequote)) != CURLE_OK)
          return result;
      }

      /* Attempt to get the size, it'll be useful in some cases: for resumed
         downloads and when talking to servers that don't give away the size
         in the RETR response line. */
      result = ftp_getsize(conn, ftp->file, &foundsize);
      if(CURLE_OK == result) {
        if (data->set.max_filesize && foundsize > data->set.max_filesize) {
          failf(data, "Maximum file size exceeded");
          return CURLE_FILESIZE_EXCEEDED;
        }
Daniel Stenberg's avatar
Daniel Stenberg committed

        /* Daniel: (August 4, 1999)
         *
         * We start with trying to use the SIZE command to figure out the size
         * of the file we're gonna get. If we can get the size, this is by far
         * the best way to know if we're trying to resume beyond the EOF.
         *
         * Daniel, November 28, 2001. We *always* get the size on downloads
         * now, so it is done before this even when not doing resumes. I saved
         * the comment above for nostalgical reasons! ;-)
         */
          infof(data, "ftp server doesn't support SIZE\n");
Daniel Stenberg's avatar
Daniel Stenberg committed
          /* We couldn't get the size and therefore we can't know if there
             really is a part of the file left to get, although the server
             will just close the connection when we start the connection so it
             won't cause us any harm, just not make us exit as nicely. */
        }
        else {
          /* We got a file size report, so we check that there actually is a
             part of the file left to get, or else we go home.  */
            /* We're supposed to download the last abs(from) bytes */