Skip to content
Snippets Groups Projects
ftp.c 60.3 KiB
Newer Older
  • Learn to ignore specific revisions
  • #ifdef NI_WITHSCOPEID
    
      const int niflags = NI_NUMERICHOST | NI_NUMERICSERV | NI_WITHSCOPEID;
    
      const int niflags = NI_NUMERICHOST | NI_NUMERICSERV;
    
      unsigned char *ap;
      unsigned char *pp;
      int alen, plen;
      char portmsgbuf[4096], tmp[4096];
    
      const char *mode[] = { "EPRT", "LPRT", "PORT", NULL };
      char **modep;
    
      /*
       * we should use Curl_if2ip?  given pickiness of recent ftpd,
       * I believe we should use the same address as the control connection.
       */
      sslen = sizeof(ss);
      if (getsockname(conn->firstsocket, (struct sockaddr *)&ss, &sslen) < 0)
        return CURLE_FTP_PORT_FAILED;
      
      if (getnameinfo((struct sockaddr *)&ss, sslen, hbuf, sizeof(hbuf), NULL, 0,
                      niflags))
        return CURLE_FTP_PORT_FAILED;
    
      memset(&hints, 0, sizeof(hints));
      hints.ai_family = sa->sa_family;
      /*hints.ai_family = ss.ss_family;
        this way can be used if sockaddr_storage is properly defined, as glibc 
        2.1.X doesn't do*/
      hints.ai_socktype = SOCK_STREAM;
      hints.ai_flags = AI_PASSIVE;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
      if (getaddrinfo(hbuf, (char *)"0", &hints, &res))
    
        return CURLE_FTP_PORT_FAILED;
      
      portsock = -1;
      for (ai = res; ai; ai = ai->ai_next) {
        portsock = socket(ai->ai_family, ai->ai_socktype, ai->ai_protocol);
        if (portsock < 0)
          continue;
    
        if (bind(portsock, ai->ai_addr, ai->ai_addrlen) < 0) {
          sclose(portsock);
          portsock = -1;
          continue;
    
          
        if (listen(portsock, 1) < 0) {
          sclose(portsock);
          portsock = -1;
          continue;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      freeaddrinfo(res);
    
      if (portsock < 0) {
        failf(data, strerror(errno));
        return CURLE_FTP_PORT_FAILED;
      }
    
      sslen = sizeof(ss);
      if (getsockname(portsock, sa, &sslen) < 0) {
        failf(data, strerror(errno));
        return CURLE_FTP_PORT_FAILED;
      }
    
      for (modep = (char **)mode; modep && *modep; modep++) {
        int lprtaf, eprtaf;
        
        switch (sa->sa_family) {
        case AF_INET:
          ap = (unsigned char *)&((struct sockaddr_in *)&ss)->sin_addr;
          alen = sizeof(((struct sockaddr_in *)&ss)->sin_addr);
          pp = (unsigned char *)&((struct sockaddr_in *)&ss)->sin_port;
          plen = sizeof(((struct sockaddr_in *)&ss)->sin_port);
          lprtaf = 4;
          eprtaf = 1;
          break;
        case AF_INET6:
          ap = (unsigned char *)&((struct sockaddr_in6 *)&ss)->sin6_addr;
          alen = sizeof(((struct sockaddr_in6 *)&ss)->sin6_addr);
          pp = (unsigned char *)&((struct sockaddr_in6 *)&ss)->sin6_port;
          plen = sizeof(((struct sockaddr_in6 *)&ss)->sin6_port);
          lprtaf = 6;
          eprtaf = 2;
          break;
        default:
          ap = pp = NULL;
          lprtaf = eprtaf = -1;
          break;
        }
    
        if (strcmp(*modep, "EPRT") == 0) {
          if (eprtaf < 0)
            continue;
          if (getnameinfo((struct sockaddr *)&ss, sslen,
                          portmsgbuf, sizeof(portmsgbuf), tmp, sizeof(tmp), niflags))
            continue;
    
          /* do not transmit IPv6 scope identifier to the wire */
          if (sa->sa_family == AF_INET6) {
            char *q = strchr(portmsgbuf, '%');
    
          result = Curl_ftpsendf(conn, "%s |%d|%s|%s|", *modep, eprtaf,
                                 portmsgbuf, tmp);
          if(result)
            return result;
    
        } else if (strcmp(*modep, "LPRT") == 0 ||
                   strcmp(*modep, "PORT") == 0) {
          int i;
          
          if (strcmp(*modep, "LPRT") == 0 && lprtaf < 0)
            continue;
          if (strcmp(*modep, "PORT") == 0 && sa->sa_family != AF_INET)
            continue;
    
          portmsgbuf[0] = '\0';
          if (strcmp(*modep, "LPRT") == 0) {
            snprintf(tmp, sizeof(tmp), "%d,%d", lprtaf, alen);
            if (strlcat(portmsgbuf, tmp, sizeof(portmsgbuf)) >=
                sizeof(portmsgbuf)) {
    
          for (i = 0; i < alen; i++) {
            if (portmsgbuf[0])
              snprintf(tmp, sizeof(tmp), ",%u", ap[i]);
            else
              snprintf(tmp, sizeof(tmp), "%u", ap[i]);
            
            if (strlcat(portmsgbuf, tmp, sizeof(portmsgbuf)) >=
                sizeof(portmsgbuf)) {
              continue;
    
          }
          
          if (strcmp(*modep, "LPRT") == 0) {
            snprintf(tmp, sizeof(tmp), ",%d", plen);
            
            if (strlcat(portmsgbuf, tmp, sizeof(portmsgbuf)) >= sizeof(portmsgbuf))
              continue;
          }
    
          for (i = 0; i < plen; i++) {
            snprintf(tmp, sizeof(tmp), ",%u", pp[i]);
            
            if (strlcat(portmsgbuf, tmp, sizeof(portmsgbuf)) >=
                sizeof(portmsgbuf)) {
              continue;
    
          result = Curl_ftpsendf(conn, "%s %s", *modep, portmsgbuf);
          if(result)
            return result;
    
        nread = Curl_GetFTPResponse(buf, conn, &ftpcode);
    
        if(nread < 0)
          return CURLE_OPERATION_TIMEOUTED;
        
        if (ftpcode != 200) {
          failf(data, "Server does not grok %s", *modep);
          continue;
    
        else
          break;
      }
      
      if (!*modep) {
        sclose(portsock);
        return CURLE_FTP_PORT_FAILED;
      }
      /* we set the secondary socket variable to this for now, it
         is only so that the cleanup function will close it in case
         we fail before the true secondary stuff is made */
      conn->secondarysocket = portsock;
      
    
      /******************************************************************
       *
       * Here's a piece of IPv4-specific code coming up
       *
       */
      struct sockaddr_in sa;
      struct hostent *h=NULL;
      char *hostdataptr=NULL;
      unsigned short porttouse;
      char myhost[256] = "";
    
      if(data->set.ftpport) {
        if(Curl_if2ip(data->set.ftpport, myhost, sizeof(myhost))) {
    
          h = Curl_resolv(data, myhost, 0, &hostdataptr);
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        }
    
          int len = strlen(data->set.ftpport);
          if(len>1)
            h = Curl_resolv(data, data->set.ftpport, 0, &hostdataptr);
    
          if(h)
            strcpy(myhost, data->set.ftpport); /* buffer overflow risk */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        }
    
        char *tmp_host = getmyhost(myhost, sizeof(myhost));
        h=Curl_resolv(data, tmp_host, 0, &hostdataptr);
    
      }
      infof(data, "We connect from %s\n", myhost);
      
      if ( h ) {
        if( (portsock = socket(AF_INET, SOCK_STREAM, 0)) >= 0 ) {
    
          
          /* we set the secondary socket variable to this for now, it
             is only so that the cleanup function will close it in case
             we fail before the true secondary stuff is made */
          conn->secondarysocket = portsock;
    
          memset((char *)&sa, 0, sizeof(sa));
          memcpy((char *)&sa.sin_addr,
                 h->h_addr,
                 h->h_length);
          sa.sin_family = AF_INET;
          sa.sin_addr.s_addr = INADDR_ANY;
          sa.sin_port = 0;
          size = sizeof(sa);
          
          if(bind(portsock, (struct sockaddr *)&sa, size) >= 0) {
            /* we succeeded to bind */
            struct sockaddr_in add;
    
    
            if(getsockname(portsock, (struct sockaddr *) &add,
    
              failf(data, "getsockname() failed");
              return CURLE_FTP_PORT_FAILED;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
            }
    
            porttouse = ntohs(add.sin_port);
            
            if ( listen(portsock, 1) < 0 ) {
              failf(data, "listen(2) failed on socket");
    
              free(hostdataptr);
    
              return CURLE_FTP_PORT_FAILED;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
            }
          }
          else {
    
            failf(data, "bind(2) failed on socket");
    
            free(hostdataptr);
    
            return CURLE_FTP_PORT_FAILED;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
          }
        }
        else {
    
          failf(data, "socket(2) failed (%s)");
          free(hostdataptr);
    
          return CURLE_FTP_PORT_FAILED;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        }
    
      }
      else {
        failf(data, "could't find my own IP address (%s)", myhost);
        return CURLE_FTP_PORT_FAILED;
      }
      {
    #ifdef HAVE_INET_NTOA_R
        char ntoa_buf[64];
    #endif
        struct in_addr in;
        unsigned short ip[5];
        (void) memcpy(&in.s_addr, *h->h_addr_list, sizeof (in.s_addr));
    #ifdef HAVE_INET_NTOA_R
        /* ignore the return code from inet_ntoa_r() as it is int or
           char * depending on system */
        inet_ntoa_r(in, ntoa_buf, sizeof(ntoa_buf));
        sscanf( ntoa_buf, "%hu.%hu.%hu.%hu",
                &ip[0], &ip[1], &ip[2], &ip[3]);
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    #else
    
        sscanf( inet_ntoa(in), "%hu.%hu.%hu.%hu",
                &ip[0], &ip[1], &ip[2], &ip[3]);
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    #endif
    
        result=Curl_ftpsendf(conn, "PORT %d,%d,%d,%d,%d,%d",
                             ip[0], ip[1], ip[2], ip[3],
                             porttouse >> 8,
                             porttouse & 255);
        if(result)
          return result;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
    
      nread = Curl_GetFTPResponse(buf, conn, &ftpcode);
    
      if(nread < 0)
        return CURLE_OPERATION_TIMEOUTED;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
    
      if(ftpcode != 200) {
        failf(data, "Server does not grok PORT, try without it!");
        return CURLE_FTP_PORT_FAILED;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      }
    
    /***********************************************************************
     *
     * ftp_use_pasv()
     *
     * Send the PASV command. PASV is the ftp client's way of asking the server to
     * open a second port that we can connect to (for the data transfer). This is
     * the opposite of PORT.
    
     */
    
    static
    CURLcode ftp_use_pasv(struct connectdata *conn)
    {
      struct SessionHandle *data = conn->data;
      ssize_t nread;
      char *buf = data->state.buffer; /* this is our buffer */
      int ftpcode; /* receive FTP response codes in this */
      CURLcode result;
    
      Curl_addrinfo *addr=NULL;
      Curl_ipconnect *conninfo;
    
      /*
        Here's the excecutive summary on what to do:
    
        PASV is RFC959, expect:
        227 Entering Passive Mode (a1,a2,a3,a4,p1,p2)
    
        LPSV is RFC1639, expect:
        228 Entering Long Passive Mode (4,4,a1,a2,a3,a4,2,p1,p2)
    
        EPSV is RFC2428, expect:
        229 Entering Extended Passive Mode (|||port|)
    
      */
    
    #if 1
      const char *mode[] = { "EPSV", "PASV", NULL };
      int results[] = { 229, 227, 0 };
    #else
    
      char *mode[] = { "EPSV", "LPSV", "PASV", NULL };
      int results[] = { 229, 228, 227, 0 };
    
      const char *mode[] = { "PASV", NULL };
      int results[] = { 227, 0 };
    
      unsigned short connectport; /* the local port connect() should use! */
      unsigned short newport; /* remote port, not necessary the local one */
      char *hostdataptr=NULL;
      
      /* newhost must be able to hold a full IP-style address in ASCII, which
         in the IPv6 case means 5*8-1 = 39 letters */
      char newhost[48];
    
      for (modeoff = (data->set.ftp_use_epsv?0:1);
           mode[modeoff]; modeoff++) {
    
        result = Curl_ftpsendf(conn, mode[modeoff]);
        if(result)
          return result;
    
        nread = Curl_GetFTPResponse(buf, conn, &ftpcode);
    
        if(nread < 0)
          return CURLE_OPERATION_TIMEOUTED;
    
      if (!mode[modeoff]) {
        failf(data, "Odd return code after PASV");
        return CURLE_FTP_WEIRD_PASV_REPLY;
      }
    
      else if (227 == results[modeoff]) {
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
    
        /*
         * New 227-parser June 3rd 1999.
         * It now scans for a sequence of six comma-separated numbers and
         * will take them as IP+port indicators.
         *
         * Found reply-strings include:
         * "227 Entering Passive Mode (127,0,0,1,4,51)"
         * "227 Data transfer will passively listen to 127,0,0,1,4,51"
         * "227 Entering passive mode. 127,0,0,1,4,51"
         */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
          
    
        while(*str) {
          if (6 == sscanf(str, "%d,%d,%d,%d,%d,%d",
                          &ip[0], &ip[1], &ip[2], &ip[3],
                          &port[0], &port[1]))
            break;
          str++;
        }
    
        if(!*str) {
          failf(data, "Couldn't interpret this 227-reply: %s", buf);
          return CURLE_FTP_WEIRD_227_FORMAT;
        }
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
    
        sprintf(newhost, "%d.%d.%d.%d", ip[0], ip[1], ip[2], ip[3]);
    
      else if (229 == results[modeoff]) {
    
        char *ptr = strchr(buf, '(');
        if(ptr) {
          unsigned int num;
          char separator[4];
          ptr++;
          if(5  == sscanf(ptr, "%c%c%c%u%c",
                          &separator[0],
                          &separator[1],
                          &separator[2],
                          &num,
                          &separator[3])) {
            /* the four separators should be identical */
            newport = num;
    
            /* we should use the same host we already are connected to */
    
        if(!ptr) {
          failf(data, "Weirdly formatted EPSV reply");
          return CURLE_FTP_WEIRD_PASV_REPLY;
    
      }
    #endif
      else
        return CURLE_FTP_CANT_RECONNECT;
    
      if(data->change.proxy) {
        /*
         * This is a tunnel through a http proxy and we need to connect to the
         * proxy again here. We already have the name info for it since the
         * previous lookup.
         */
        addr = conn->hostaddr;
        connectport =
          (unsigned short)conn->port; /* we connect to the proxy's port */
      }
    
        /* normal, direct, ftp connection */
    
        addr = Curl_resolv(data, newhostp, newport, &hostdataptr);
    
        if(!addr) {
          failf(data, "Can't resolve new host %s", newhost);
          return CURLE_FTP_CANT_GET_HOST;
        }
        connectport = newport; /* we connect to the remote port */
      }
    
      result = Curl_connecthost(conn,
                                addr,
                                connectport,
                                &conn->secondarysocket,
                                &conninfo);
      
      if((CURLE_OK == result) &&       
         data->set.verbose)
        /* this just dumps information about this second connection */
        ftp_pasv_verbose(conn, conninfo, newhost, connectport);
      
      if(CURLE_OK != result)
        return result;
    
      if (data->set.tunnel_thru_httpproxy) {
        /* We want "seamless" FTP operations through HTTP proxy tunnel */
        result = Curl_ConnectHTTPProxyTunnel(conn, conn->secondarysocket,
                                             newhost, newport);
    
        if(CURLE_OK != result)
          return result;
    
    /***********************************************************************
     *
     * ftp_perform()
     *
     * This is the actual DO function for FTP. Get a file/directory according to
     * the options previously setup.
     */
    
    
    static
    CURLcode ftp_perform(struct connectdata *conn)
    {
      /* this is FTP and no proxy */
      ssize_t nread;
      CURLcode result;
      struct SessionHandle *data=conn->data;
      char *buf = data->state.buffer; /* this is our buffer */
    
      /* the ftp struct is already inited in ftp_connect() */
      struct FTP *ftp = conn->proto.ftp;
    
      long *bytecountp = ftp->bytecountp;
      int ftpcode; /* for ftp status */
    
      /* Send any QUOTE strings? */
      if(data->set.quote) {
        if ((result = ftp_sendquote(conn, data->set.quote)) != CURLE_OK)
          return result;
      }
        
      /* This is a re-used connection. Since we change directory to where the
         transfer is taking place, we must now get back to the original dir
         where we ended up after login: */
      if (conn->bits.reuse) {
        if ((result = ftp_cwd(conn, ftp->entrypath)) != CURLE_OK)
          return result;
      }
    
      /* change directory first! */
      if(ftp->dir && ftp->dir[0]) {
        if ((result = ftp_cwd(conn, ftp->dir)) != CURLE_OK)
            return result;
      }
    
      /* Requested time of file? */
      if(data->set.get_filetime && ftp->file) {
        result = ftp_getfiletime(conn, ftp->file);
        if(result)
          return result;
      }
    
    
      /* If we have selected NOBODY and HEADER, it means that we only want file
         information. Which in FTP can't be much more than the file size and
         date. */
      if(data->set.no_body && data->set.include_header) {
    
        /* The SIZE command is _not_ RFC 959 specified, and therefor many servers
           may not support it! It is however the only way we have to get a file's
           size! */
        ssize_t filesize;
    
        /* Some servers return different sizes for different modes, and thus we
           must set the proper type before we check the size */
        result = ftp_transfertype(conn, data->set.ftp_ascii);
        if(result)
          return result;
    
        /* failing to get size is not a serious error */
        result = ftp_getsize(conn, ftp->file, &filesize);
    
        if(CURLE_OK == result) {
          sprintf(buf, "Content-Length: %d\r\n", filesize);
          result = Curl_client_write(data, CLIENTWRITE_BOTH, buf, 0);
          if(result)
            return result;
    
    
        /* If we asked for a time of the file and we actually got one as
           well, we "emulate" a HTTP-style header in our output. */
    
    #ifdef HAVE_STRFTIME
        if(data->set.get_filetime && data->info.filetime) {
          struct tm *tm;
    #ifdef HAVE_LOCALTIME_R
          struct tm buffer;
          tm = (struct tm *)localtime_r(&data->info.filetime, &buffer);
    #else
          tm = localtime(&data->info.filetime);
    #endif
          /* format: "Tue, 15 Nov 1994 12:45:26 GMT" */
          strftime(buf, BUFSIZE-1, "Last-Modified: %a, %d %b %Y %H:%M:%S %Z\r\n",
                   tm);
          result = Curl_client_write(data, CLIENTWRITE_BOTH, buf, 0);
          if(result)
            return result;
        }
    #endif
    
        return CURLE_OK;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      }
    
      if(data->set.no_body)
        /* don't transfer the data */
        ;
    
      /* Get us a second connection up and connected */
    
        /* We have chosen to use the PORT command */
        result = ftp_use_port(conn);
    
        if(CURLE_OK == result)
          /* we have the data connection ready */
          infof(data, "Connected the data stream with PORT!\n");
      }
      else {
    
        /* We have chosen (this is default) to use the PASV command */
        result = ftp_use_pasv(conn);
    
        if(CURLE_OK == result)
          infof(data, "Connected the data stream with PASV!\n");
      }
      
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
        /* Set type to binary (unless specified ASCII) */
    
        result = ftp_transfertype(conn, data->set.ftp_ascii);
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
          /* we're about to continue the uploading of a file */
          /* 1. get already existing file's size. We use the SIZE
             command for this which may not exist in the server!
             The SIZE command is not in RFC959. */
    
          /* 2. This used to set REST. But since we can do append, we
             don't another ftp command. We just skip the source file
             offset and then we APPEND the rest on the file instead */
    
          /* 3. pass file-size number of bytes in the source file */
          /* 4. lower the infilesize counter */
          /* => transfer as usual */
    
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
            /* we could've got a specified offset from the command line,
               but now we know we didn't */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
    
            if(CURLE_OK != ftp_getsize(conn, ftp->file, &gottensize)) {
    
              failf(data, "Couldn't get remote file size");
    
              return CURLE_FTP_COULDNT_GET_SIZE;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
            }
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
            /* do we still game? */
            int passed=0;
            /* enable append instead */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
            /* Now, let's read off the proper amount of bytes from the
               input. If we knew it was a proper file we could've just
               fseek()ed but we only have a stream here */
            do {
    
              int readthisamountnow = (conn->resume_from - passed);
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
              int actuallyread;
    
              if(readthisamountnow > BUFSIZE)
                readthisamountnow = BUFSIZE;
    
              actuallyread =
    
                data->set.fread(data->state.buffer, 1, readthisamountnow,
                                data->set.in);
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
              passed += actuallyread;
              if(actuallyread != readthisamountnow) {
    
                failf(data, "Could only read %d bytes from the input", passed);
    
                return CURLE_FTP_COULDNT_USE_REST;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
            /* now, decrease the size of the read */
    
            if(data->set.infilesize>0) {
              data->set.infilesize -= conn->resume_from;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
    
                infof(data, "File already completely uploaded\n");
    
                /* no data to transfer */
                result=Curl_Transfer(conn, -1, -1, FALSE, NULL, -1, NULL);
                
                /* Set resume done so that we won't get any error in
                 * Curl_ftp_done() because we didn't transfer the amount of bytes
                 * that the local file file obviously is */
                conn->bits.resume_done = TRUE; 
    
                return CURLE_OK;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
              }
            }
            /* we've passed, proceed as normal */
          }
        }
    
    
        /* Send everything on data->set.in to the socket */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
          /* we append onto the file instead of rewriting it */
    
          FTPSENDF(conn, "APPE %s", ftp->file);
        }
        else {
          FTPSENDF(conn, "STOR %s", ftp->file);
        }
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
    
        nread = Curl_GetFTPResponse(buf, conn, &ftpcode);
    
        if(nread < 0)
          return CURLE_OPERATION_TIMEOUTED;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
          failf(data, "Failed FTP upload:%s", buf+3);
          /* oops, we never close the sockets! */
    
          return CURLE_FTP_COULDNT_STOR_FILE;
    
          /* PORT means we are now awaiting the server to connect to us. */
    
          result = AllowServerConnect(data, conn, conn->secondarysocket);
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
          if( result )
            return result;
        }
    
        *bytecountp=0;
    
        /* When we know we're uploading a specified file, we can get the file
           size prior to the actual upload. */
    
    
        Curl_pgrsSetUploadSize(data, data->set.infilesize);
    
        result = Curl_Transfer(conn, -1, -1, FALSE, NULL, /* no download */
    
                          conn->secondarysocket, bytecountp);
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        if(result)
          return result;
          
      }
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        /* Retrieve file or directory */
        bool dirlist=FALSE;
        long downloadsize=-1;
    
    
        if(conn->bits.use_range && conn->range) {
    
          long from, to;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
          int totalsize=-1;
          char *ptr;
          char *ptr2;
    
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
          while(ptr && *ptr && (isspace((int)*ptr) || (*ptr=='-')))
            ptr++;
          to=strtol(ptr, &ptr2, 0);
          if(ptr == ptr2) {
            /* we didn't get any digit */
            to=-1;
          }
    
          if((-1 == to) && (from>=0)) {
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
            /* X - */
    
            infof(data, "FTP RANGE %d to end of file\n", from);
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
          }
          else if(from < 0) {
            /* -Y */
    
            totalsize = -from;
    
            infof(data, "FTP RANGE the last %d bytes\n", totalsize);
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
          }
          else {
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
            totalsize = to-from;
    
            conn->maxdownload = totalsize+1; /* include the last mentioned byte */
    
            conn->resume_from = from;
            infof(data, "FTP RANGE from %d getting %d bytes\n", from,
                  conn->maxdownload);
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
          }
          infof(data, "range-download from %d to %d, totally %d bytes\n",
                from, to, totalsize);
        }
    
        if((data->set.ftp_list_only) || !ftp->file) {
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
          /* The specified path ends with a slash, and therefore we think this
             is a directory that is requested, use LIST. But before that we
             need to set ASCII transfer mode. */
          dirlist = TRUE;
    
          /* Set type to ASCII */
    
          result = ftp_transfertype(conn, TRUE /* ASCII enforced */);
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
          /* if this output is to be machine-parsed, the NLST command will be
             better used since the LIST command output is not specified or
             standard in any way */
    
    
                data->set.customrequest?data->set.customrequest:
                (data->set.ftp_list_only?"NLST":"LIST"));
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        }
        else {
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
          /* Set type to binary (unless specified ASCII) */
    
          result = ftp_transfertype(conn, data->set.ftp_ascii);
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
    
          /* Attempt to get the size, it'll be useful in some cases: for resumed
             downloads and when talking to servers that don't give away the size
             in the RETR response line. */
          result = ftp_getsize(conn, ftp->file, &foundsize);
          if(CURLE_OK == result)
            downloadsize = foundsize;
    
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
            /* Daniel: (August 4, 1999)
             *
             * We start with trying to use the SIZE command to figure out the size
             * of the file we're gonna get. If we can get the size, this is by far
    
             * the best way to know if we're trying to resume beyond the EOF.
             *
             * Daniel, November 28, 2001. We *always* get the size on downloads
             * now, so it is done before this even when not doing resumes. I saved
             * the comment above for nostalgical reasons! ;-)
             */
    
              infof(data, "ftp server doesn't support SIZE\n");
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
              /* We couldn't get the size and therefore we can't know if there
                 really is a part of the file left to get, although the server
                 will just close the connection when we start the connection so it
                 won't cause us any harm, just not make us exit as nicely. */
            }
            else {
              /* We got a file size report, so we check that there actually is a
                 part of the file left to get, or else we go home.  */
    
                /* We're supposed to download the last abs(from) bytes */
    
                  failf(data, "Offset (%d) was beyond file size (%d)",
    
                  return CURLE_FTP_BAD_DOWNLOAD_RESUME;
                }
                /* convert to size to download */
    
                /* download from where? */
    
                conn->resume_from = foundsize - downloadsize;
    
                  failf(data, "Offset (%d) was beyond file size (%d)",
    
                  return CURLE_FTP_BAD_DOWNLOAD_RESUME;
                }
                /* Now store the number of bytes we are expected to download */
    
                downloadsize = foundsize-conn->resume_from;
    
              /* no data to transfer */
              result=Curl_Transfer(conn, -1, -1, FALSE, NULL, -1, NULL);
    
              infof(data, "File already completely downloaded\n");
    
    
              /* Set resume done so that we won't get any error in Curl_ftp_done()
               * because we didn't transfer the amount of bytes that the remote
               * file obviously is */
              conn->bits.resume_done = TRUE; 
    
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
            /* Set resume file transfer offset */
            infof(data, "Instructs server to resume from offset %d\n",
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
    
            FTPSENDF(conn, "REST %d", conn->resume_from);
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
    
            nread = Curl_GetFTPResponse(buf, conn, &ftpcode);
    
            if(nread < 0)
              return CURLE_OPERATION_TIMEOUTED;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
              failf(data, "Couldn't use REST: %s", buf+4);
    
              return CURLE_FTP_COULDNT_USE_REST;
    
        nread = Curl_GetFTPResponse(buf, conn, &ftpcode);
    
        if(nread < 0)
          return CURLE_OPERATION_TIMEOUTED;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
    
        if((ftpcode == 150) || (ftpcode == 125)) {
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
          /*
            A;
            150 Opening BINARY mode data connection for /etc/passwd (2241
            bytes).  (ok, the file is being transfered)
    	
            B:
            150 Opening ASCII mode data connection for /bin/ls 
    
            C:
            150 ASCII data connection for /bin/ls (137.167.104.91,37445) (0 bytes).
    
            D:
            150 Opening ASCII mode data connection for /linux/fisk/kpanelrc (0.0.0.0,0) (545 bytes).
              
            E:
            125 Data connection already open; Transfer starting. */
    
          int size=-1; /* default unknown size */
    
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
            /*
             * It seems directory listings either don't show the size or very
    
             * often uses size 0 anyway. ASCII transfers may very well turn out
             * that the transfered amount of data is not the same as this line
             * tells, why using this number in those cases only confuses us.
             *
             * Example D above makes this parsing a little tricky */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
            char *bytes;
            bytes=strstr(buf, " bytes");
            if(bytes--) {
              int index=bytes-buf;
              /* this is a hint there is size information in there! ;-) */
              while(--index) {
                /* scan for the parenthesis and break there */
                if('(' == *bytes)
                  break;
                /* if only skip digits, or else we're in deep trouble */
                if(!isdigit((int)*bytes)) {
                  bytes=NULL;
                  break;
                }
                /* one more estep backwards */
                bytes--;
              }
              /* only if we have nothing but digits: */
              if(bytes++) {
                /* get the number! */
                size = atoi(bytes);
              }
                
            }
          }
          else if(downloadsize > -1)
            size = downloadsize;
    
    
            result = AllowServerConnect(data, conn, conn->secondarysocket);
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
            if( result )
              return result;
          }
    
          infof(data, "Getting file with size: %d\n", size);
    
          /* FTP download: */
    
          result=Curl_Transfer(conn, conn->secondarysocket, size, FALSE,
    
                               bytecountp,
                               -1, NULL); /* no upload here */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
          if(result)
            return result;
        }
        else {
          failf(data, "%s", buf+4);
    
          return CURLE_FTP_COULDNT_RETR_FILE;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        }
    	
      }
      /* end of transfer */
    
      return CURLE_OK;
    
    /***********************************************************************
     *
     * Curl_ftp()
     *
     * This function is registered as 'curl_do' function. It decodes the path
     * parts etc as a wrapper to the actual DO function (ftp_perform).
     *
     * The input argument is already checked for validity.
     */
    
    CURLcode Curl_ftp(struct connectdata *conn)
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    {
    
      CURLcode retcode;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
    
      struct SessionHandle *data = conn->data;
    
      struct FTP *ftp;
      int dirlength=0; /* 0 forces strlen() */
    
      /* the ftp struct is already inited in ftp_connect() */
    
      ftp = conn->proto.ftp;
    
    
      /* We split the path into dir and file parts *before* we URLdecode
         it */
      ftp->file = strrchr(conn->ppath, '/');
      if(ftp->file) {
    
        if(ftp->file != conn->ppath)
          dirlength=ftp->file-conn->ppath; /* don't count the traling slash */
    
    
        ftp->file++; /* point to the first letter in the file name part or
                        remain NULL */
      }