Home | History | Annotate | Line # | Download | only in ftpd
ftpd.c revision 1.103
      1  1.103    martin /*	$NetBSD: ftpd.c,v 1.103 2000/07/29 08:20:02 martin Exp $	*/
      2   1.67    itojun 
      3   1.67    itojun /*
      4   1.82     lukem  * Copyright (c) 1997-2000 The NetBSD Foundation, Inc.
      5   1.67    itojun  * All rights reserved.
      6   1.73     lukem  *
      7   1.73     lukem  * This code is derived from software contributed to The NetBSD Foundation
      8   1.73     lukem  * by Luke Mewburn.
      9   1.73     lukem  *
     10   1.67    itojun  * Redistribution and use in source and binary forms, with or without
     11   1.67    itojun  * modification, are permitted provided that the following conditions
     12   1.67    itojun  * are met:
     13   1.67    itojun  * 1. Redistributions of source code must retain the above copyright
     14   1.67    itojun  *    notice, this list of conditions and the following disclaimer.
     15   1.67    itojun  * 2. Redistributions in binary form must reproduce the above copyright
     16   1.67    itojun  *    notice, this list of conditions and the following disclaimer in the
     17   1.67    itojun  *    documentation and/or other materials provided with the distribution.
     18   1.73     lukem  * 3. All advertising materials mentioning features or use of this software
     19   1.73     lukem  *    must display the following acknowledgement:
     20   1.73     lukem  *        This product includes software developed by the NetBSD
     21   1.73     lukem  *        Foundation, Inc. and its contributors.
     22   1.73     lukem  * 4. Neither the name of The NetBSD Foundation nor the names of its
     23   1.73     lukem  *    contributors may be used to endorse or promote products derived
     24   1.73     lukem  *    from this software without specific prior written permission.
     25   1.73     lukem  *
     26   1.73     lukem  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     27   1.73     lukem  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     28   1.73     lukem  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     29   1.73     lukem  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     30   1.73     lukem  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     31   1.73     lukem  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     32   1.73     lukem  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     33   1.73     lukem  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     34   1.73     lukem  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     35   1.73     lukem  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     36   1.73     lukem  * POSSIBILITY OF SUCH DAMAGE.
     37   1.67    itojun  */
     38   1.13       cgd 
     39    1.1       cgd /*
     40    1.8   deraadt  * Copyright (c) 1985, 1988, 1990, 1992, 1993, 1994
     41    1.8   deraadt  *	The Regents of the University of California.  All rights reserved.
     42    1.1       cgd  *
     43    1.1       cgd  * Redistribution and use in source and binary forms, with or without
     44    1.1       cgd  * modification, are permitted provided that the following conditions
     45    1.1       cgd  * are met:
     46    1.1       cgd  * 1. Redistributions of source code must retain the above copyright
     47    1.1       cgd  *    notice, this list of conditions and the following disclaimer.
     48    1.1       cgd  * 2. Redistributions in binary form must reproduce the above copyright
     49    1.1       cgd  *    notice, this list of conditions and the following disclaimer in the
     50    1.1       cgd  *    documentation and/or other materials provided with the distribution.
     51    1.1       cgd  * 3. All advertising materials mentioning features or use of this software
     52    1.1       cgd  *    must display the following acknowledgement:
     53    1.1       cgd  *	This product includes software developed by the University of
     54    1.1       cgd  *	California, Berkeley and its contributors.
     55    1.1       cgd  * 4. Neither the name of the University nor the names of its contributors
     56    1.1       cgd  *    may be used to endorse or promote products derived from this software
     57    1.1       cgd  *    without specific prior written permission.
     58    1.1       cgd  *
     59    1.1       cgd  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
     60    1.1       cgd  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     61    1.1       cgd  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     62    1.1       cgd  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
     63    1.1       cgd  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     64    1.1       cgd  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     65    1.1       cgd  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     66    1.1       cgd  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     67    1.1       cgd  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     68    1.1       cgd  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     69    1.1       cgd  * SUCH DAMAGE.
     70    1.1       cgd  */
     71    1.1       cgd 
     72   1.62     lukem /*
     73   1.73     lukem  * Copyright (C) 1997 and 1998 WIDE Project.
     74   1.62     lukem  * All rights reserved.
     75   1.73     lukem  *
     76   1.62     lukem  * Redistribution and use in source and binary forms, with or without
     77   1.62     lukem  * modification, are permitted provided that the following conditions
     78   1.62     lukem  * are met:
     79   1.62     lukem  * 1. Redistributions of source code must retain the above copyright
     80   1.62     lukem  *    notice, this list of conditions and the following disclaimer.
     81   1.62     lukem  * 2. Redistributions in binary form must reproduce the above copyright
     82   1.62     lukem  *    notice, this list of conditions and the following disclaimer in the
     83   1.62     lukem  *    documentation and/or other materials provided with the distribution.
     84   1.73     lukem  * 3. Neither the name of the project nor the names of its contributors
     85   1.73     lukem  *    may be used to endorse or promote products derived from this software
     86   1.73     lukem  *    without specific prior written permission.
     87   1.73     lukem  *
     88   1.73     lukem  * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
     89   1.73     lukem  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     90   1.73     lukem  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     91   1.73     lukem  * ARE DISCLAIMED.  IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
     92   1.73     lukem  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     93   1.73     lukem  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     94   1.73     lukem  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     95   1.73     lukem  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     96   1.73     lukem  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     97   1.73     lukem  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     98   1.73     lukem  * SUCH DAMAGE.
     99   1.62     lukem  */
    100   1.62     lukem 
    101   1.25  christos #include <sys/cdefs.h>
    102    1.1       cgd #ifndef lint
    103   1.25  christos __COPYRIGHT(
    104    1.8   deraadt "@(#) Copyright (c) 1985, 1988, 1990, 1992, 1993, 1994\n\
    105   1.25  christos 	The Regents of the University of California.  All rights reserved.\n");
    106    1.1       cgd #endif /* not lint */
    107    1.1       cgd 
    108    1.1       cgd #ifndef lint
    109   1.13       cgd #if 0
    110   1.17       cjs static char sccsid[] = "@(#)ftpd.c	8.5 (Berkeley) 4/28/95";
    111   1.13       cgd #else
    112  1.103    martin __RCSID("$NetBSD: ftpd.c,v 1.103 2000/07/29 08:20:02 martin Exp $");
    113   1.13       cgd #endif
    114    1.1       cgd #endif /* not lint */
    115    1.1       cgd 
    116    1.1       cgd /*
    117    1.1       cgd  * FTP server.
    118    1.1       cgd  */
    119    1.1       cgd #include <sys/param.h>
    120    1.1       cgd #include <sys/stat.h>
    121    1.1       cgd #include <sys/ioctl.h>
    122    1.1       cgd #include <sys/socket.h>
    123    1.1       cgd #include <sys/wait.h>
    124    1.1       cgd 
    125    1.1       cgd #include <netinet/in.h>
    126    1.1       cgd #include <netinet/in_systm.h>
    127    1.1       cgd #include <netinet/ip.h>
    128    1.1       cgd 
    129    1.1       cgd #define	FTP_NAMES
    130    1.1       cgd #include <arpa/ftp.h>
    131    1.1       cgd #include <arpa/inet.h>
    132    1.1       cgd #include <arpa/telnet.h>
    133    1.1       cgd 
    134    1.8   deraadt #include <ctype.h>
    135    1.1       cgd #include <dirent.h>
    136    1.8   deraadt #include <err.h>
    137    1.8   deraadt #include <errno.h>
    138    1.1       cgd #include <fcntl.h>
    139   1.21       cjs #include <fnmatch.h>
    140    1.8   deraadt #include <glob.h>
    141   1.81     lukem #include <grp.h>
    142    1.8   deraadt #include <limits.h>
    143    1.8   deraadt #include <netdb.h>
    144    1.1       cgd #include <pwd.h>
    145    1.1       cgd #include <setjmp.h>
    146    1.8   deraadt #include <signal.h>
    147   1.93     lukem #include <stdarg.h>
    148    1.1       cgd #include <stdio.h>
    149    1.1       cgd #include <stdlib.h>
    150    1.1       cgd #include <string.h>
    151    1.8   deraadt #include <syslog.h>
    152    1.8   deraadt #include <time.h>
    153    1.8   deraadt #include <unistd.h>
    154   1.73     lukem #include <util.h>
    155   1.78     lukem #include <utmp.h>
    156   1.25  christos #ifdef SKEY
    157   1.25  christos #include <skey.h>
    158   1.25  christos #endif
    159   1.38   mycroft #ifdef KERBEROS5
    160   1.86     aidan #include <com_err.h>
    161   1.69  christos #include <krb5/krb5.h>
    162   1.38   mycroft #endif
    163    1.8   deraadt 
    164   1.84     lukem #define	GLOBAL
    165   1.24     lukem #include "extern.h"
    166    1.1       cgd #include "pathnames.h"
    167   1.78     lukem #include "version.h"
    168    1.1       cgd 
    169    1.1       cgd int	data;
    170   1.87     lukem jmp_buf	urgcatch;
    171    1.1       cgd struct	passwd *pw;
    172   1.51   msaitoh int	sflag;
    173    1.1       cgd int	stru;			/* avoid C keyword */
    174    1.1       cgd int	mode;
    175  1.101     lukem int	doutmp;			/* update utmp file */
    176  1.102     lukem int	dowtmp;			/* update wtmp file */
    177  1.101     lukem int	dropprivs;		/* if privileges should or have been dropped */
    178  1.101     lukem int	mapped;			/* IPv4 connection on AF_INET6 socket */
    179    1.1       cgd off_t	file_size;
    180    1.1       cgd off_t	byte_count;
    181   1.13       cgd static char ttyline[20];
    182   1.78     lukem static struct utmp utmp;	/* for utmp */
    183   1.57     lukem 
    184   1.22       cjs static char *anondir = NULL;
    185   1.34     lukem static char confdir[MAXPATHLEN];
    186   1.24     lukem 
    187   1.38   mycroft #if defined(KERBEROS) || defined(KERBEROS5)
    188   1.91     fredb int	has_ccache = 0;
    189   1.13       cgd int	notickets = 1;
    190   1.13       cgd char	*krbtkfile_env = NULL;
    191   1.91     fredb char	*tty = ttyline;
    192   1.92  explorer int	login_krb5_forwardable_tgt = 0;
    193   1.73     lukem #endif
    194    1.4       cgd 
    195   1.67    itojun int epsvall = 0;
    196   1.67    itojun 
    197    1.1       cgd /*
    198    1.1       cgd  * Timeout intervals for retrying connections
    199    1.1       cgd  * to hosts that don't accept PORT cmds.  This
    200    1.1       cgd  * is a kludge, but given the problems with TCP...
    201    1.1       cgd  */
    202    1.1       cgd #define	SWAITMAX	90	/* wait at most 90 seconds */
    203    1.1       cgd #define	SWAITINT	5	/* interval between retries */
    204    1.1       cgd 
    205    1.1       cgd int	swaitmax = SWAITMAX;
    206    1.1       cgd int	swaitint = SWAITINT;
    207    1.1       cgd 
    208   1.88     lukem static int	 bind_pasv_addr(void);
    209   1.88     lukem static int	 checkuser(const char *, const char *, int, int, char **);
    210   1.88     lukem static int	 checkaccess(const char *);
    211   1.88     lukem static void	 dolog(struct sockaddr *);
    212   1.88     lukem static void	 end_login(void);
    213   1.88     lukem static FILE	*getdatasock(const char *);
    214   1.88     lukem static char	*gunique(const char *);
    215   1.88     lukem static void	 lostconn(int);
    216   1.88     lukem static void	 myoob(int);
    217   1.88     lukem static int	 receive_data(FILE *, FILE *);
    218   1.88     lukem static int	 send_data(FILE *, FILE *, off_t, int);
    219   1.88     lukem static struct passwd *sgetpwnam(const char *);
    220    1.8   deraadt 
    221   1.88     lukem int	main(int, char *[]);
    222   1.26    mellon 
    223   1.92  explorer #if defined(KERBEROS)
    224   1.88     lukem int	klogin(struct passwd *, char *, char *, char *);
    225   1.88     lukem void	kdestroy(void);
    226   1.26    mellon #endif
    227   1.92  explorer #if defined(KERBEROS5)
    228   1.92  explorer int	k5login(struct passwd *, char *, char *, char *);
    229   1.92  explorer void	k5destroy(void);
    230   1.92  explorer #endif
    231   1.63     lukem 
    232    1.8   deraadt int
    233   1.88     lukem main(int argc, char *argv[])
    234    1.1       cgd {
    235   1.76     lukem 	int		addrlen, ch, on = 1, tos, keepalive;
    236   1.73     lukem #ifdef KERBEROS5
    237   1.76     lukem 	krb5_error_code	kerror;
    238   1.38   mycroft #endif
    239    1.1       cgd 
    240   1.87     lukem 	connections = 1;
    241    1.1       cgd 	debug = 0;
    242   1.35     lukem 	logging = 0;
    243   1.87     lukem 	pdata = -1;
    244   1.51   msaitoh 	sflag = 0;
    245  1.102     lukem 	doutmp = 0;		/* default: don't log to utmp */
    246  1.102     lukem 	dowtmp = 1;		/* default: DO log to wtmp */
    247  1.101     lukem 	dropprivs = 0;
    248  1.101     lukem 	mapped = 0;
    249   1.87     lukem 	usedefault = 1;
    250   1.34     lukem 	(void)strcpy(confdir, _DEFAULT_CONFDIR);
    251   1.80     lukem 	hostname[0] = '\0';
    252  1.100     lukem 	homedir[0] = '\0';
    253   1.95     lukem 	gidcount = 0;
    254    1.1       cgd 
    255  1.101     lukem 	version = FTPD_VERSION;
    256  1.102     lukem 	while ((ch = getopt(argc, argv, "a:c:C:dh:Hlrst:T:u:UvV:W")) != -1) {
    257    1.8   deraadt 		switch (ch) {
    258   1.22       cjs 		case 'a':
    259   1.22       cjs 			anondir = optarg;
    260   1.22       cjs 			break;
    261   1.22       cjs 
    262   1.34     lukem 		case 'c':
    263   1.73     lukem 			(void)strlcpy(confdir, optarg, sizeof(confdir));
    264   1.34     lukem 			break;
    265   1.73     lukem 
    266   1.35     lukem 		case 'C':
    267   1.81     lukem 			pw = sgetpwnam(optarg);
    268   1.73     lukem 			exit(checkaccess(optarg) ? 0 : 1);
    269   1.35     lukem 			/* NOTREACHED */
    270   1.34     lukem 
    271    1.1       cgd 		case 'd':
    272   1.22       cjs 		case 'v':		/* deprecated */
    273    1.1       cgd 			debug = 1;
    274    1.1       cgd 			break;
    275    1.1       cgd 
    276   1.80     lukem 		case 'h':
    277   1.80     lukem 			strlcpy(hostname, optarg, sizeof(hostname));
    278   1.99     lukem 			break;
    279   1.99     lukem 
    280   1.99     lukem 		case 'H':
    281   1.99     lukem 			if (gethostname(hostname, sizeof(hostname)) == -1)
    282   1.99     lukem 				hostname[0] = '\0';
    283   1.99     lukem 			hostname[sizeof(hostname) - 1] = '\0';
    284   1.80     lukem 			break;
    285   1.80     lukem 
    286    1.1       cgd 		case 'l':
    287    1.8   deraadt 			logging++;	/* > 1 == extra logging */
    288    1.1       cgd 			break;
    289    1.1       cgd 
    290  1.101     lukem 		case 'r':
    291  1.101     lukem 			dropprivs = 1;
    292  1.101     lukem 			break;
    293  1.101     lukem 
    294   1.51   msaitoh 		case 's':
    295   1.51   msaitoh 			sflag = 1;
    296   1.51   msaitoh 			break;
    297   1.51   msaitoh 
    298    1.1       cgd 		case 't':
    299    1.1       cgd 		case 'T':
    300    1.1       cgd 		case 'u':
    301   1.32     lukem 			warnx("-%c has been deprecated in favour of ftpd.conf",
    302   1.24     lukem 			    ch);
    303    1.8   deraadt 			break;
    304    1.1       cgd 
    305   1.78     lukem 		case 'U':
    306   1.78     lukem 			doutmp = 1;
    307   1.78     lukem 			break;
    308   1.78     lukem 
    309  1.101     lukem 		case 'V':
    310  1.101     lukem 			if (EMPTYSTR(optarg) || strcmp(optarg, "-") == 0)
    311  1.101     lukem 				version = NULL;
    312  1.101     lukem 			else
    313  1.101     lukem 				version = xstrdup(optarg);
    314  1.101     lukem 			break;
    315  1.101     lukem 
    316  1.102     lukem 		case 'W':
    317  1.102     lukem 			dowtmp = 0;
    318  1.102     lukem 			break;
    319  1.102     lukem 
    320    1.1       cgd 		default:
    321   1.35     lukem 			if (optopt == 'a' || optopt == 'C')
    322   1.35     lukem 				exit(1);
    323    1.8   deraadt 			warnx("unknown flag -%c ignored", optopt);
    324    1.1       cgd 			break;
    325    1.1       cgd 		}
    326    1.1       cgd 	}
    327   1.35     lukem 
    328   1.35     lukem 	/*
    329   1.35     lukem 	 * LOG_NDELAY sets up the logging connection immediately,
    330   1.35     lukem 	 * necessary for anonymous ftp's that chroot and can't do it later.
    331   1.35     lukem 	 */
    332   1.79     lukem 	openlog("ftpd", LOG_PID | LOG_NDELAY, LOG_FTP);
    333   1.67    itojun 	addrlen = sizeof(his_addr); /* xxx */
    334   1.35     lukem 	if (getpeername(0, (struct sockaddr *)&his_addr, &addrlen) < 0) {
    335   1.35     lukem 		syslog(LOG_ERR, "getpeername (%s): %m",argv[0]);
    336   1.35     lukem 		exit(1);
    337   1.35     lukem 	}
    338   1.68    itojun 	addrlen = sizeof(ctrl_addr);
    339   1.68    itojun 	if (getsockname(0, (struct sockaddr *)&ctrl_addr, &addrlen) < 0) {
    340   1.68    itojun 		syslog(LOG_ERR, "getsockname (%s): %m",argv[0]);
    341   1.68    itojun 		exit(1);
    342   1.68    itojun 	}
    343   1.67    itojun 	if (his_addr.su_family == AF_INET6
    344   1.67    itojun 	 && IN6_IS_ADDR_V4MAPPED(&his_addr.su_sin6.sin6_addr)) {
    345   1.68    itojun #if 1
    346   1.68    itojun 		/*
    347   1.68    itojun 		 * IPv4 control connection arrived to AF_INET6 socket.
    348   1.68    itojun 		 * I hate to do this, but this is the easiest solution.
    349   1.90    itojun 		 *
    350   1.90    itojun 		 * The assumption is untrue on SIIT environment.
    351   1.68    itojun 		 */
    352   1.68    itojun 		union sockunion tmp_addr;
    353   1.74    itojun 		const int off = sizeof(struct in6_addr) - sizeof(struct in_addr);
    354   1.68    itojun 
    355   1.68    itojun 		tmp_addr = his_addr;
    356   1.68    itojun 		memset(&his_addr, 0, sizeof(his_addr));
    357   1.68    itojun 		his_addr.su_sin.sin_family = AF_INET;
    358   1.68    itojun 		his_addr.su_sin.sin_len = sizeof(his_addr.su_sin);
    359   1.68    itojun 		memcpy(&his_addr.su_sin.sin_addr,
    360   1.74    itojun 			&tmp_addr.su_sin6.sin6_addr.s6_addr[off],
    361   1.68    itojun 			sizeof(his_addr.su_sin.sin_addr));
    362   1.68    itojun 		his_addr.su_sin.sin_port = tmp_addr.su_sin6.sin6_port;
    363   1.68    itojun 
    364   1.68    itojun 		tmp_addr = ctrl_addr;
    365   1.68    itojun 		memset(&ctrl_addr, 0, sizeof(ctrl_addr));
    366   1.68    itojun 		ctrl_addr.su_sin.sin_family = AF_INET;
    367   1.68    itojun 		ctrl_addr.su_sin.sin_len = sizeof(ctrl_addr.su_sin);
    368   1.68    itojun 		memcpy(&ctrl_addr.su_sin.sin_addr,
    369   1.74    itojun 			&tmp_addr.su_sin6.sin6_addr.s6_addr[off],
    370   1.68    itojun 			sizeof(ctrl_addr.su_sin.sin_addr));
    371   1.68    itojun 		ctrl_addr.su_sin.sin_port = tmp_addr.su_sin6.sin6_port;
    372   1.68    itojun #else
    373   1.67    itojun 		while (fgets(line, sizeof(line), fd) != NULL) {
    374   1.67    itojun 			if ((cp = strchr(line, '\n')) != NULL)
    375   1.67    itojun 				*cp = '\0';
    376   1.95     lukem 			reply(-530, "%s", line);
    377   1.67    itojun 		}
    378   1.67    itojun 		(void) fflush(stdout);
    379   1.67    itojun 		(void) fclose(fd);
    380   1.67    itojun 		reply(530,
    381  1.101     lukem 		    "Connection from IPv4 mapped address is not supported.");
    382   1.67    itojun 		exit(0);
    383   1.68    itojun #endif
    384   1.75    itojun 
    385   1.75    itojun 		mapped = 1;
    386   1.75    itojun 	} else
    387   1.75    itojun 		mapped = 0;
    388   1.35     lukem #ifdef IP_TOS
    389   1.75    itojun 	if (!mapped && his_addr.su_family == AF_INET) {
    390   1.67    itojun 		tos = IPTOS_LOWDELAY;
    391   1.67    itojun 		if (setsockopt(0, IPPROTO_IP, IP_TOS, (char *)&tos,
    392   1.67    itojun 			       sizeof(int)) < 0)
    393   1.67    itojun 			syslog(LOG_WARNING, "setsockopt (IP_TOS): %m");
    394   1.67    itojun 	}
    395   1.35     lukem #endif
    396   1.80     lukem 	/* if the hostname hasn't been given, attempt to determine it */
    397   1.80     lukem 	if (hostname[0] == '\0') {
    398   1.80     lukem 		if (getnameinfo((struct sockaddr *)&ctrl_addr, ctrl_addr.su_len,
    399   1.80     lukem 		    hostname, sizeof(hostname), NULL, 0, 0) != 0)
    400   1.80     lukem 			(void)gethostname(hostname, sizeof(hostname));
    401   1.80     lukem 		hostname[sizeof(hostname) - 1] = '\0';
    402   1.80     lukem 	}
    403   1.79     lukem 
    404   1.35     lukem 	/* set this here so klogin can use it... */
    405   1.35     lukem 	(void)snprintf(ttyline, sizeof(ttyline), "ftp%d", getpid());
    406   1.35     lukem 
    407    1.1       cgd 	(void) freopen(_PATH_DEVNULL, "w", stderr);
    408    1.1       cgd 	(void) signal(SIGPIPE, lostconn);
    409    1.1       cgd 	(void) signal(SIGCHLD, SIG_IGN);
    410   1.78     lukem 	if (signal(SIGURG, myoob) == SIG_ERR)
    411    1.1       cgd 		syslog(LOG_ERR, "signal: %m");
    412    1.1       cgd 
    413    1.1       cgd 	/* Try to handle urgent data inline */
    414    1.1       cgd #ifdef SO_OOBINLINE
    415    1.1       cgd 	if (setsockopt(0, SOL_SOCKET, SO_OOBINLINE, (char *)&on, sizeof(on)) < 0)
    416    1.1       cgd 		syslog(LOG_ERR, "setsockopt: %m");
    417    1.1       cgd #endif
    418   1.66    briggs 	/* Set keepalives on the socket to detect dropped connections.  */
    419   1.66    briggs #ifdef SO_KEEPALIVE
    420   1.66    briggs 	keepalive = 1;
    421   1.66    briggs 	if (setsockopt(0, SOL_SOCKET, SO_KEEPALIVE, (char *)&keepalive,
    422   1.66    briggs 	    sizeof(int)) < 0)
    423   1.66    briggs 		syslog(LOG_WARNING, "setsockopt (SO_KEEPALIVE): %m");
    424   1.66    briggs #endif
    425    1.1       cgd 
    426    1.1       cgd #ifdef	F_SETOWN
    427    1.1       cgd 	if (fcntl(fileno(stdin), F_SETOWN, getpid()) == -1)
    428    1.1       cgd 		syslog(LOG_ERR, "fcntl F_SETOWN: %m");
    429    1.1       cgd #endif
    430   1.67    itojun 	dolog((struct sockaddr *)&his_addr);
    431    1.1       cgd 	/*
    432    1.1       cgd 	 * Set up default state
    433    1.1       cgd 	 */
    434    1.1       cgd 	data = -1;
    435    1.1       cgd 	type = TYPE_A;
    436    1.1       cgd 	form = FORM_N;
    437    1.1       cgd 	stru = STRU_F;
    438    1.1       cgd 	mode = MODE_S;
    439    1.1       cgd 	tmpline[0] = '\0';
    440   1.57     lukem 	hasyyerrored = 0;
    441    1.8   deraadt 
    442   1.38   mycroft #ifdef KERBEROS5
    443   1.38   mycroft 	kerror = krb5_init_context(&kcontext);
    444   1.38   mycroft 	if (kerror) {
    445   1.38   mycroft 		syslog(LOG_NOTICE, "%s when initializing Kerberos context",
    446   1.38   mycroft 		    error_message(kerror));
    447   1.38   mycroft 		exit(0);
    448   1.38   mycroft 	}
    449   1.45  christos #endif /* KERBEROS5 */
    450   1.38   mycroft 
    451   1.82     lukem 	init_curclass();
    452   1.82     lukem 	curclass.timeout = 300;		/* 5 minutes, as per login(1) */
    453   1.82     lukem 	curclass.type = CLASS_REAL;
    454   1.82     lukem 
    455    1.8   deraadt 	/* If logins are disabled, print out the message. */
    456  1.100     lukem 	if (display_file(_PATH_NOLOGIN, 530)) {
    457    1.8   deraadt 		reply(530, "System not available.");
    458    1.8   deraadt 		exit(0);
    459    1.8   deraadt 	}
    460  1.100     lukem 	(void)display_file(conffilename(_PATH_FTPWELCOME), 220);
    461    1.8   deraadt 		/* reply(220,) must follow */
    462  1.101     lukem 	if (EMPTYSTR(version))
    463  1.101     lukem 		reply(220, "%s FTP server ready.", hostname);
    464  1.101     lukem 	else
    465  1.101     lukem 		reply(220, "%s FTP server (%s) ready.", hostname, version);
    466   1.73     lukem 
    467    1.1       cgd 	(void) setjmp(errcatch);
    468    1.1       cgd 	for (;;)
    469    1.1       cgd 		(void) yyparse();
    470    1.1       cgd 	/* NOTREACHED */
    471    1.1       cgd }
    472    1.1       cgd 
    473    1.8   deraadt static void
    474   1.88     lukem lostconn(int signo)
    475    1.1       cgd {
    476    1.8   deraadt 
    477    1.1       cgd 	if (debug)
    478    1.1       cgd 		syslog(LOG_DEBUG, "lost connection");
    479   1.35     lukem 	dologout(1);
    480    1.1       cgd }
    481    1.1       cgd 
    482    1.1       cgd /*
    483    1.1       cgd  * Save the result of a getpwnam.  Used for USER command, since
    484    1.1       cgd  * the data returned must not be clobbered by any other command
    485    1.1       cgd  * (e.g., globbing).
    486    1.1       cgd  */
    487    1.8   deraadt static struct passwd *
    488   1.88     lukem sgetpwnam(const char *name)
    489    1.1       cgd {
    490    1.1       cgd 	static struct passwd save;
    491    1.8   deraadt 	struct passwd *p;
    492    1.1       cgd 
    493    1.1       cgd 	if ((p = getpwnam(name)) == NULL)
    494    1.1       cgd 		return (p);
    495    1.1       cgd 	if (save.pw_name) {
    496   1.54   mycroft 		free((char *)save.pw_name);
    497   1.78     lukem 		memset(save.pw_passwd, 0, strlen(save.pw_passwd));
    498   1.54   mycroft 		free((char *)save.pw_passwd);
    499   1.54   mycroft 		free((char *)save.pw_gecos);
    500   1.54   mycroft 		free((char *)save.pw_dir);
    501   1.54   mycroft 		free((char *)save.pw_shell);
    502    1.1       cgd 	}
    503    1.1       cgd 	save = *p;
    504   1.58     lukem 	save.pw_name = xstrdup(p->pw_name);
    505   1.58     lukem 	save.pw_passwd = xstrdup(p->pw_passwd);
    506   1.58     lukem 	save.pw_gecos = xstrdup(p->pw_gecos);
    507   1.58     lukem 	save.pw_dir = xstrdup(p->pw_dir);
    508   1.58     lukem 	save.pw_shell = xstrdup(p->pw_shell);
    509    1.1       cgd 	return (&save);
    510    1.1       cgd }
    511    1.1       cgd 
    512   1.93     lukem static int	login_attempts;	/* number of failed login attempts */
    513   1.93     lukem static int	askpasswd;	/* had user command, ask for passwd */
    514   1.93     lukem static char	curname[10];	/* current USER name */
    515    1.1       cgd 
    516    1.1       cgd /*
    517    1.1       cgd  * USER command.
    518    1.1       cgd  * Sets global passwd pointer pw if named account exists and is acceptable;
    519    1.1       cgd  * sets askpasswd if a PASS command is expected.  If logged in previously,
    520    1.1       cgd  * need to reset state.  If name is "ftp" or "anonymous", the name is not in
    521    1.1       cgd  * _PATH_FTPUSERS, and ftp account exists, set guest and pw, then just return.
    522    1.1       cgd  * If account doesn't exist, ask for passwd anyway.  Otherwise, check user
    523    1.1       cgd  * requesting login privileges.  Disallow anyone who does not have a standard
    524    1.1       cgd  * shell as returned by getusershell().  Disallow anyone mentioned in the file
    525    1.1       cgd  * _PATH_FTPUSERS to allow people such as root and uucp to be avoided.
    526    1.1       cgd  */
    527    1.8   deraadt void
    528   1.88     lukem user(const char *name)
    529    1.1       cgd {
    530    1.1       cgd 	if (logged_in) {
    531   1.73     lukem 		switch (curclass.type) {
    532   1.73     lukem 		case CLASS_GUEST:
    533    1.1       cgd 			reply(530, "Can't change user from guest login.");
    534    1.1       cgd 			return;
    535   1.73     lukem 		case CLASS_CHROOT:
    536    1.5       cgd 			reply(530, "Can't change user from chroot user.");
    537    1.5       cgd 			return;
    538   1.73     lukem 		case CLASS_REAL:
    539  1.101     lukem 			if (dropprivs) {
    540  1.101     lukem 				reply(530, "Can't change user.");
    541  1.101     lukem 				return;
    542  1.101     lukem 			}
    543   1.73     lukem 			end_login();
    544   1.73     lukem 			break;
    545   1.73     lukem 		default:
    546   1.73     lukem 			abort();
    547    1.1       cgd 		}
    548    1.1       cgd 	}
    549    1.1       cgd 
    550   1.92  explorer #if defined(KERBEROS)
    551   1.38   mycroft 	kdestroy();
    552   1.38   mycroft #endif
    553   1.92  explorer #if defined(KERBEROS5)
    554   1.92  explorer 	k5destroy();
    555   1.92  explorer #endif
    556   1.38   mycroft 
    557   1.73     lukem 	curclass.type = CLASS_REAL;
    558    1.1       cgd 	if (strcmp(name, "ftp") == 0 || strcmp(name, "anonymous") == 0) {
    559   1.81     lukem 			/* need `pw' setup for checkaccess() and checkuser () */
    560   1.81     lukem 		if ((pw = sgetpwnam("ftp")) == NULL)
    561   1.81     lukem 			reply(530, "User %s unknown.", name);
    562   1.82     lukem 		else if (! checkaccess("ftp") || ! checkaccess("anonymous"))
    563    1.1       cgd 			reply(530, "User %s access denied.", name);
    564   1.81     lukem 		else {
    565   1.73     lukem 			curclass.type = CLASS_GUEST;
    566    1.1       cgd 			askpasswd = 1;
    567    1.8   deraadt 			reply(331,
    568    1.8   deraadt 			    "Guest login ok, type your name as password.");
    569   1.81     lukem 		}
    570    1.8   deraadt 		if (!askpasswd && logging)
    571    1.8   deraadt 			syslog(LOG_NOTICE,
    572    1.8   deraadt 			    "ANONYMOUS FTP LOGIN REFUSED FROM %s", remotehost);
    573    1.1       cgd 		return;
    574    1.1       cgd 	}
    575   1.34     lukem 
    576   1.19       cjs 	pw = sgetpwnam(name);
    577    1.8   deraadt 	if (logging)
    578   1.73     lukem 		strlcpy(curname, name, sizeof(curname));
    579   1.36   mycroft 
    580    1.7   deraadt #ifdef SKEY
    581   1.36   mycroft 	if (skey_haskey(name) == 0) {
    582  1.103    martin 		const char *myskey;
    583    1.7   deraadt 
    584    1.8   deraadt 		myskey = skey_keyinfo(name);
    585   1.36   mycroft 		reply(331, "Password [%s] required for %s.",
    586    1.8   deraadt 		    myskey ? myskey : "error getting challenge", name);
    587    1.7   deraadt 	} else
    588    1.7   deraadt #endif
    589    1.7   deraadt 		reply(331, "Password required for %s.", name);
    590    1.7   deraadt 
    591    1.1       cgd 	askpasswd = 1;
    592    1.1       cgd 	/*
    593    1.1       cgd 	 * Delay before reading passwd after first failed
    594    1.1       cgd 	 * attempt to slow down passwd-guessing programs.
    595    1.1       cgd 	 */
    596    1.1       cgd 	if (login_attempts)
    597    1.1       cgd 		sleep((unsigned) login_attempts);
    598    1.1       cgd }
    599    1.1       cgd 
    600    1.1       cgd /*
    601   1.58     lukem  * Determine whether something is to happen (allow access, chroot)
    602   1.58     lukem  * for a user. Each line is a shell-style glob followed by
    603   1.58     lukem  * `yes' or `no'.
    604   1.58     lukem  *
    605   1.58     lukem  * For backward compatability, `allow' and `deny' are synonymns
    606   1.58     lukem  * for `yes' and `no', respectively.
    607   1.19       cjs  *
    608   1.21       cjs  * Each glob is matched against the username in turn, and the first
    609   1.58     lukem  * match found is used. If no match is found, the result is the
    610   1.58     lukem  * argument `def'. If a match is found but without and explicit
    611   1.58     lukem  * `yes'/`no', the result is the opposite of def.
    612   1.58     lukem  *
    613   1.58     lukem  * If the file doesn't exist at all, the result is the argument
    614   1.58     lukem  * `nofile'
    615   1.21       cjs  *
    616   1.21       cjs  * Any line starting with `#' is considered a comment and ignored.
    617   1.19       cjs  *
    618   1.73     lukem  * Returns 0 if the user is denied, or 1 if they are allowed.
    619   1.81     lukem  *
    620   1.81     lukem  * NOTE: needs struct passwd *pw setup before use.
    621   1.19       cjs  */
    622   1.58     lukem int
    623   1.88     lukem checkuser(const char *fname, const char *name, int def, int nofile,
    624   1.88     lukem 	    char **retclass)
    625   1.58     lukem {
    626   1.58     lukem 	FILE	*fd;
    627   1.58     lukem 	int	 retval;
    628   1.73     lukem 	char	*glob, *perm, *class, *buf, *p;
    629   1.76     lukem 	size_t	 len, line;
    630   1.58     lukem 
    631   1.58     lukem 	retval = def;
    632   1.73     lukem 	if (retclass != NULL)
    633   1.73     lukem 		*retclass = NULL;
    634   1.58     lukem 	if ((fd = fopen(conffilename(fname), "r")) == NULL)
    635   1.58     lukem 		return nofile;
    636   1.19       cjs 
    637   1.76     lukem 	line = 0;
    638   1.73     lukem 	for (;
    639   1.76     lukem 	    (buf = fparseln(fd, &len, &line, NULL, FPARSELN_UNESCCOMM |
    640   1.73     lukem 	    		FPARSELN_UNESCCONT | FPARSELN_UNESCESC)) != NULL;
    641   1.73     lukem 	    free(buf), buf = NULL) {
    642   1.73     lukem 		glob = perm = class = NULL;
    643   1.73     lukem 		p = buf;
    644   1.73     lukem 		if (len < 1)
    645   1.73     lukem 			continue;
    646   1.73     lukem 		if (p[len - 1] == '\n')
    647   1.73     lukem 			p[--len] = '\0';
    648   1.73     lukem 		if (EMPTYSTR(p))
    649   1.19       cjs 			continue;
    650   1.73     lukem 
    651   1.73     lukem 		NEXTWORD(p, glob);
    652   1.73     lukem 		NEXTWORD(p, perm);
    653   1.73     lukem 		NEXTWORD(p, class);
    654   1.73     lukem 		if (EMPTYSTR(glob))
    655   1.70      tron 			continue;
    656   1.76     lukem 		if (!EMPTYSTR(class)) {
    657   1.76     lukem 			if (strcasecmp(class, "all") == 0 ||
    658   1.76     lukem 			    strcasecmp(class, "none") == 0) {
    659   1.76     lukem 				syslog(LOG_WARNING,
    660   1.76     lukem 		"%s line %d: illegal user-defined class `%s' - skipping entry",
    661   1.76     lukem 					    fname, (int)line, class);
    662   1.76     lukem 				continue;
    663   1.76     lukem 			}
    664   1.76     lukem 		}
    665   1.73     lukem 
    666   1.73     lukem 					/* have a host specifier */
    667   1.73     lukem 		if ((p = strchr(glob, '@')) != NULL) {
    668   1.73     lukem 			u_int32_t	net, mask, addr;
    669   1.73     lukem 			int		bits;
    670   1.73     lukem 
    671   1.73     lukem 			*p++ = '\0';
    672   1.73     lukem 					/* check against network or CIDR */
    673   1.73     lukem 			if (isdigit(*p) &&
    674   1.73     lukem 			    (bits = inet_net_pton(AF_INET, p,
    675   1.73     lukem 			    &net, sizeof(net))) != -1) {
    676   1.73     lukem 				net = ntohl(net);
    677   1.73     lukem 				mask = 0xffffffffU << (32 - bits);
    678   1.73     lukem 				addr = ntohl(his_addr.su_sin.sin_addr.s_addr);
    679   1.73     lukem 				if ((addr & mask) != net)
    680   1.73     lukem 					continue;
    681   1.73     lukem 
    682   1.73     lukem 					/* check against hostname glob */
    683   1.73     lukem 			} else if (fnmatch(p, remotehost, 0) != 0)
    684   1.73     lukem 				continue;
    685   1.19       cjs 		}
    686   1.73     lukem 
    687   1.81     lukem 					/* have a group specifier */
    688   1.81     lukem 		if ((p = strchr(glob, ':')) != NULL) {
    689   1.81     lukem 			gid_t	*groups, *ng;
    690   1.81     lukem 			int	 gsize, i, found;
    691   1.81     lukem 
    692   1.81     lukem 			*p++ = '\0';
    693   1.81     lukem 			groups = NULL;
    694   1.81     lukem 			gsize = 16;
    695   1.81     lukem 			do {
    696   1.81     lukem 				ng = realloc(groups, gsize * sizeof(gid_t));
    697   1.81     lukem 				if (ng == NULL)
    698   1.81     lukem 					fatal(
    699   1.81     lukem 					    "Local resource failure: realloc");
    700   1.81     lukem 				groups = ng;
    701   1.81     lukem 			} while (getgrouplist(pw->pw_name, pw->pw_gid,
    702   1.81     lukem 						groups, &gsize) == -1);
    703   1.81     lukem 			found = 0;
    704   1.81     lukem 			for (i = 0; i < gsize; i++) {
    705   1.81     lukem 				struct group *g;
    706   1.81     lukem 
    707   1.81     lukem 				if ((g = getgrgid(groups[i])) == NULL)
    708   1.81     lukem 					continue;
    709   1.81     lukem 				if (fnmatch(p, g->gr_name, 0) == 0) {
    710   1.81     lukem 					found = 1;
    711   1.81     lukem 					break;
    712   1.81     lukem 				}
    713   1.81     lukem 			}
    714   1.81     lukem 			free(groups);
    715   1.81     lukem 			if (!found)
    716   1.81     lukem 				continue;
    717   1.81     lukem 		}
    718   1.81     lukem 
    719   1.73     lukem 					/* check against username glob */
    720   1.73     lukem 		if (fnmatch(glob, name, 0) != 0)
    721   1.73     lukem 			continue;
    722   1.73     lukem 
    723   1.73     lukem 		if (perm != NULL &&
    724   1.73     lukem 		    ((strcasecmp(perm, "allow") == 0) ||
    725   1.73     lukem 		     (strcasecmp(perm, "yes") == 0)))
    726   1.73     lukem 			retval = 1;
    727   1.73     lukem 		else if (perm != NULL &&
    728   1.73     lukem 		    ((strcasecmp(perm, "deny") == 0) ||
    729   1.73     lukem 		     (strcasecmp(perm, "no") == 0)))
    730   1.73     lukem 			retval = 0;
    731   1.73     lukem 		else
    732   1.73     lukem 			retval = !def;
    733   1.73     lukem 		if (!EMPTYSTR(class) && retclass != NULL)
    734   1.73     lukem 			*retclass = xstrdup(class);
    735   1.73     lukem 		free(buf);
    736   1.73     lukem 		break;
    737   1.19       cjs 	}
    738   1.19       cjs 	(void) fclose(fd);
    739   1.21       cjs 	return (retval);
    740   1.19       cjs }
    741   1.58     lukem 
    742   1.58     lukem /*
    743   1.58     lukem  * Check if user is allowed by /etc/ftpusers
    744   1.73     lukem  * returns 1 for yes, 0 for no
    745   1.81     lukem  *
    746   1.81     lukem  * NOTE: needs struct passwd *pw setup (for checkuser())
    747   1.58     lukem  */
    748   1.58     lukem int
    749   1.88     lukem checkaccess(const char *name)
    750   1.58     lukem {
    751   1.58     lukem 
    752   1.73     lukem 	return (checkuser(_PATH_FTPUSERS, name, 1, 0, NULL));
    753   1.58     lukem }
    754   1.19       cjs 
    755   1.19       cjs /*
    756    1.1       cgd  * Terminate login as previous user, if any, resetting state;
    757    1.1       cgd  * used when USER command is given or login fails.
    758    1.1       cgd  */
    759    1.8   deraadt static void
    760   1.88     lukem end_login(void)
    761    1.1       cgd {
    762    1.1       cgd 
    763   1.78     lukem 	if (logged_in) {
    764  1.102     lukem 		if (dowtmp)
    765  1.102     lukem 			logwtmp(ttyline, "", "");
    766   1.78     lukem 		if (doutmp)
    767   1.78     lukem 			logout(utmp.ut_line);
    768   1.78     lukem 	}
    769  1.101     lukem 			/* reset login state */
    770  1.101     lukem 	(void) seteuid((uid_t)0);
    771    1.1       cgd 	pw = NULL;
    772    1.1       cgd 	logged_in = 0;
    773   1.85     lukem 	quietmessages = 0;
    774   1.95     lukem 	gidcount = 0;
    775   1.73     lukem 	curclass.type = CLASS_REAL;
    776    1.1       cgd }
    777    1.1       cgd 
    778    1.8   deraadt void
    779   1.88     lukem pass(const char *passwd)
    780    1.1       cgd {
    781   1.78     lukem 	int		 rval;
    782  1.100     lukem 	const char	*cp, *shell;
    783  1.100     lukem 	char		*class, root[MAXPATHLEN];
    784    1.1       cgd 
    785   1.73     lukem 	class = NULL;
    786    1.1       cgd 	if (logged_in || askpasswd == 0) {
    787    1.1       cgd 		reply(503, "Login with USER first.");
    788    1.1       cgd 		return;
    789    1.1       cgd 	}
    790    1.1       cgd 	askpasswd = 0;
    791   1.73     lukem 	if (curclass.type != CLASS_GUEST) {
    792  1.101     lukem 			/* "ftp" is the only account allowed with no password */
    793    1.8   deraadt 		if (pw == NULL) {
    794    1.8   deraadt 			rval = 1;	/* failure below */
    795    1.8   deraadt 			goto skip;
    796    1.8   deraadt 		}
    797   1.92  explorer #if defined(KERBEROS)
    798   1.64   thorpej 		if (klogin(pw, "", hostname, (char *)passwd) == 0) {
    799   1.92  explorer 			rval = 0;
    800   1.92  explorer 			goto skip;
    801   1.92  explorer 		}
    802   1.92  explorer #endif
    803   1.92  explorer #if defined(KERBEROS5)
    804   1.92  explorer 		if (k5login(pw, "", hostname, (char *)passwd) == 0) {
    805   1.37   mycroft 			rval = 0;
    806   1.37   mycroft 			goto skip;
    807   1.37   mycroft 		}
    808   1.37   mycroft #endif
    809   1.36   mycroft #ifdef SKEY
    810   1.62     lukem 		if (skey_haskey(pw->pw_name) == 0) {
    811   1.62     lukem 			char *p;
    812   1.62     lukem 			int r;
    813   1.62     lukem 
    814   1.62     lukem 			p = xstrdup(passwd);
    815   1.62     lukem 			r = skey_passcheck(pw->pw_name, p);
    816   1.62     lukem 			free(p);
    817   1.62     lukem 			if (r != -1) {
    818   1.62     lukem 				rval = 0;
    819   1.62     lukem 				goto skip;
    820   1.62     lukem 			}
    821   1.36   mycroft 		}
    822    1.4       cgd #endif
    823   1.51   msaitoh 		if (!sflag && *pw->pw_passwd != '\0' &&
    824   1.37   mycroft 		    !strcmp(crypt(passwd, pw->pw_passwd), pw->pw_passwd)) {
    825    1.8   deraadt 			rval = 0;
    826    1.8   deraadt 			goto skip;
    827    1.8   deraadt 		}
    828   1.37   mycroft 		rval = 1;
    829    1.4       cgd 
    830   1.89     lukem  skip:
    831   1.46       cjs 		if (pw != NULL && pw->pw_expire && time(NULL) >= pw->pw_expire)
    832   1.45  christos 			rval = 2;
    833  1.101     lukem 
    834  1.101     lukem 			/*
    835  1.101     lukem 			 * If rval > 0, the user failed the authentication check
    836  1.101     lukem 			 * above.  If rval == 0, either Kerberos or local
    837  1.101     lukem 			 * authentication succeeded.
    838  1.101     lukem 			 */
    839    1.4       cgd 		if (rval) {
    840   1.98  sommerfe 			reply(530, "%s", rval == 2 ? "Password expired." :
    841   1.45  christos 			    "Login incorrect.");
    842   1.23     lukem 			if (logging) {
    843    1.8   deraadt 				syslog(LOG_NOTICE,
    844   1.23     lukem 				    "FTP LOGIN FAILED FROM %s", remotehost);
    845   1.23     lukem 				syslog(LOG_AUTHPRIV | LOG_NOTICE,
    846    1.8   deraadt 				    "FTP LOGIN FAILED FROM %s, %s",
    847    1.8   deraadt 				    remotehost, curname);
    848   1.23     lukem 			}
    849    1.1       cgd 			pw = NULL;
    850    1.1       cgd 			if (login_attempts++ >= 5) {
    851    1.1       cgd 				syslog(LOG_NOTICE,
    852    1.1       cgd 				    "repeated login failures from %s",
    853    1.1       cgd 				    remotehost);
    854    1.1       cgd 				exit(0);
    855    1.1       cgd 			}
    856    1.1       cgd 			return;
    857    1.1       cgd 		}
    858    1.1       cgd 	}
    859   1.19       cjs 
    860  1.101     lukem 			/* password ok; see if anything else prevents login */
    861   1.73     lukem 	if (! checkuser(_PATH_FTPUSERS, pw->pw_name, 1, 0, &class)) {
    862   1.19       cjs 		reply(530, "User %s may not use FTP.", pw->pw_name);
    863   1.19       cjs 		if (logging)
    864   1.19       cjs 			syslog(LOG_NOTICE, "FTP LOGIN REFUSED FROM %s, %s",
    865   1.19       cjs 			    remotehost, pw->pw_name);
    866   1.82     lukem 		goto bad;
    867   1.19       cjs 	}
    868  1.101     lukem 			/* if not guest user, check for valid shell */
    869   1.19       cjs 	if ((shell = pw->pw_shell) == NULL || *shell == 0)
    870   1.19       cjs 		shell = _PATH_BSHELL;
    871   1.19       cjs 	while ((cp = getusershell()) != NULL)
    872   1.19       cjs 		if (strcmp(cp, shell) == 0)
    873   1.19       cjs 			break;
    874   1.19       cjs 	endusershell();
    875   1.73     lukem 	if (cp == NULL && curclass.type != CLASS_GUEST) {
    876   1.19       cjs 		reply(530, "User %s may not use FTP.", pw->pw_name);
    877   1.19       cjs 		if (logging)
    878   1.62     lukem 			syslog(LOG_NOTICE, "FTP LOGIN REFUSED FROM %s, %s",
    879   1.19       cjs 			    remotehost, pw->pw_name);
    880   1.82     lukem 		goto bad;
    881   1.19       cjs 	}
    882   1.19       cjs 
    883    1.1       cgd 	login_attempts = 0;		/* this time successful */
    884    1.8   deraadt 	if (setegid((gid_t)pw->pw_gid) < 0) {
    885    1.8   deraadt 		reply(550, "Can't set gid.");
    886   1.82     lukem 		goto bad;
    887    1.8   deraadt 	}
    888    1.1       cgd 	(void) initgroups(pw->pw_name, pw->pw_gid);
    889  1.101     lukem 			/* cache groups for cmds.c::matchgroup() */
    890   1.95     lukem 	gidcount = getgroups(sizeof(gidlist), gidlist);
    891    1.1       cgd 
    892  1.101     lukem 			/* open wtmp before chroot */
    893  1.102     lukem 	if (dowtmp)
    894  1.102     lukem 		logwtmp(ttyline, pw->pw_name, remotehost);
    895   1.78     lukem 
    896  1.101     lukem 			/* open utmp before chroot */
    897   1.78     lukem 	if (doutmp) {
    898   1.78     lukem 		memset((void *)&utmp, 0, sizeof(utmp));
    899   1.78     lukem 		(void)time(&utmp.ut_time);
    900   1.78     lukem 		(void)strncpy(utmp.ut_name, pw->pw_name, sizeof(utmp.ut_name));
    901   1.78     lukem 		(void)strncpy(utmp.ut_host, remotehost, sizeof(utmp.ut_host));
    902   1.78     lukem 		(void)strncpy(utmp.ut_line, ttyline, sizeof(utmp.ut_line));
    903   1.78     lukem 		login(&utmp);
    904   1.78     lukem 	}
    905   1.78     lukem 
    906    1.1       cgd 	logged_in = 1;
    907    1.1       cgd 
    908   1.73     lukem 			/* check user in /etc/ftpchroot */
    909   1.73     lukem 	if (checkuser(_PATH_FTPCHROOT, pw->pw_name, 0, 0, NULL)) {
    910   1.73     lukem 		if (curclass.type == CLASS_GUEST) {
    911   1.73     lukem 			syslog(LOG_NOTICE,
    912   1.73     lukem 	    "Can't change guest user to chroot class; remove entry in %s",
    913   1.73     lukem 			    _PATH_FTPCHROOT);
    914   1.73     lukem 			exit(1);
    915   1.73     lukem 		}
    916   1.73     lukem 		curclass.type = CLASS_CHROOT;
    917   1.73     lukem 	}
    918   1.73     lukem 	if (class == NULL) {
    919   1.73     lukem 		switch (curclass.type) {
    920   1.73     lukem 		case CLASS_GUEST:
    921   1.73     lukem 			class = xstrdup("guest");
    922   1.73     lukem 			break;
    923   1.73     lukem 		case CLASS_CHROOT:
    924   1.73     lukem 			class = xstrdup("chroot");
    925   1.73     lukem 			break;
    926   1.73     lukem 		case CLASS_REAL:
    927   1.73     lukem 			class = xstrdup("real");
    928   1.73     lukem 			break;
    929   1.73     lukem 		default:
    930   1.73     lukem 			abort();
    931   1.73     lukem 		}
    932   1.73     lukem 	}
    933   1.24     lukem 
    934  1.101     lukem 			/* parse ftpd.conf, setting up various parameters */
    935   1.73     lukem 	parse_conf(class);
    936   1.82     lukem 	count_users();
    937   1.82     lukem 	if (curclass.limit != -1 && connections > curclass.limit) {
    938   1.82     lukem 		if (! EMPTYSTR(curclass.limitfile))
    939  1.100     lukem 			(void)display_file(conffilename(curclass.limitfile),
    940  1.100     lukem 			    530);
    941   1.82     lukem 		reply(530,
    942   1.83     lukem 		    "User %s access denied, connection limit of %d reached.",
    943   1.82     lukem 		    pw->pw_name, curclass.limit);
    944   1.82     lukem 		syslog(LOG_NOTICE,
    945  1.100     lukem     "Maximum connection limit of %d for class %s reached, login refused for %s",
    946  1.100     lukem 		    curclass.limit, curclass.classname, pw->pw_name);
    947   1.82     lukem 		goto bad;
    948   1.82     lukem 	}
    949   1.24     lukem 
    950  1.100     lukem 	homedir[0] = '/';
    951   1.73     lukem 	switch (curclass.type) {
    952   1.73     lukem 	case CLASS_GUEST:
    953  1.101     lukem 			/*
    954  1.101     lukem 			 * We MUST do a chdir() after the chroot. Otherwise
    955  1.101     lukem 			 * the old current directory will be accessible as "."
    956  1.101     lukem 			 * outside the new root!
    957  1.101     lukem 			 */
    958  1.100     lukem 		format_path(root,
    959  1.100     lukem 		    curclass.chroot ? curclass.chroot :
    960  1.100     lukem 		    anondir ? anondir :
    961  1.100     lukem 		    pw->pw_dir);
    962  1.100     lukem 		format_path(homedir,
    963  1.100     lukem 		    curclass.homedir ? curclass.homedir :
    964  1.100     lukem 		    "/");
    965  1.100     lukem 		if (EMPTYSTR(homedir))
    966  1.100     lukem 			homedir[0] = '/';
    967  1.100     lukem 		if (EMPTYSTR(root) || chroot(root) < 0) {
    968  1.100     lukem 			syslog(LOG_NOTICE,
    969  1.100     lukem 			    "GUEST user %s: can't chroot to %s: %m",
    970  1.100     lukem 			    pw->pw_name, root);
    971  1.100     lukem 			goto bad_guest;
    972  1.100     lukem 		}
    973  1.100     lukem 		if (chdir(homedir) < 0) {
    974  1.100     lukem 			syslog(LOG_NOTICE,
    975  1.100     lukem 			    "GUEST user %s: can't chdir to %s: %m",
    976  1.100     lukem 			    pw->pw_name, homedir);
    977  1.100     lukem  bad_guest:
    978    1.1       cgd 			reply(550, "Can't set guest privileges.");
    979    1.5       cgd 			goto bad;
    980    1.5       cgd 		}
    981   1.73     lukem 		break;
    982   1.73     lukem 	case CLASS_CHROOT:
    983  1.100     lukem 		format_path(root,
    984  1.100     lukem 		    curclass.chroot ? curclass.chroot :
    985  1.100     lukem 		    pw->pw_dir);
    986  1.100     lukem 		format_path(homedir,
    987  1.100     lukem 		    curclass.homedir ? curclass.homedir :
    988  1.100     lukem 		    "/");
    989  1.100     lukem 		if (EMPTYSTR(homedir))
    990  1.100     lukem 			homedir[0] = '/';
    991  1.100     lukem 		if (EMPTYSTR(root) || chroot(root) < 0) {
    992  1.100     lukem 			syslog(LOG_NOTICE,
    993  1.100     lukem 			    "CHROOT user %s: can't chroot to %s: %m",
    994  1.100     lukem 			    pw->pw_name, root);
    995  1.100     lukem 			goto bad_chroot;
    996  1.100     lukem 		}
    997  1.100     lukem 		if (chdir(homedir) < 0) {
    998  1.100     lukem 			syslog(LOG_NOTICE,
    999  1.100     lukem 			    "CHROOT user %s: can't chdir to %s: %m",
   1000  1.100     lukem 			    pw->pw_name, homedir);
   1001  1.100     lukem  bad_chroot:
   1002    1.5       cgd 			reply(550, "Can't change root.");
   1003    1.1       cgd 			goto bad;
   1004    1.1       cgd 		}
   1005   1.73     lukem 		break;
   1006   1.73     lukem 	case CLASS_REAL:
   1007  1.100     lukem 		format_path(homedir,
   1008  1.100     lukem 		    curclass.homedir ? curclass.homedir :
   1009  1.100     lukem 		    pw->pw_dir);
   1010  1.100     lukem 		if (EMPTYSTR(homedir) || chdir(homedir) < 0) {
   1011   1.73     lukem 			if (chdir("/") < 0) {
   1012  1.100     lukem 				syslog(LOG_NOTICE,
   1013  1.100     lukem 				    "REAL user %s: can't chdir to %s: %m",
   1014  1.100     lukem 				    pw->pw_name,
   1015  1.100     lukem 				    !EMPTYSTR(homedir) ?  homedir : "/");
   1016   1.73     lukem 				reply(530,
   1017   1.73     lukem 				    "User %s: can't change directory to %s.",
   1018  1.100     lukem 				    pw->pw_name,
   1019  1.100     lukem 				    !EMPTYSTR(homedir) ? homedir : "/");
   1020   1.73     lukem 				goto bad;
   1021  1.100     lukem 			} else {
   1022   1.95     lukem 				reply(-230,
   1023   1.73     lukem 				    "No directory! Logging in with home=/");
   1024  1.100     lukem 				homedir[0] = '/';
   1025  1.100     lukem 			}
   1026  1.100     lukem 		}
   1027   1.73     lukem 		break;
   1028   1.73     lukem 	}
   1029  1.101     lukem 	if (dropprivs ||
   1030  1.101     lukem 	    (curclass.type != CLASS_REAL &&
   1031  1.101     lukem 	    ntohs(ctrl_addr.su_port) > IPPORT_RESERVED + 1)) {
   1032  1.101     lukem 		dropprivs++;
   1033  1.101     lukem 		if (setgid((gid_t)pw->pw_gid) < 0) {
   1034  1.101     lukem 			reply(550, "Can't set gid.");
   1035  1.101     lukem 			goto bad;
   1036  1.101     lukem 		}
   1037  1.101     lukem 		if (setuid((uid_t)pw->pw_uid) < 0) {
   1038  1.101     lukem 			reply(550, "Can't set uid.");
   1039  1.101     lukem 			goto bad;
   1040  1.101     lukem 		}
   1041  1.101     lukem 	} else {
   1042  1.101     lukem 		if (seteuid((uid_t)pw->pw_uid) < 0) {
   1043  1.101     lukem 			reply(550, "Can't set uid.");
   1044  1.101     lukem 			goto bad;
   1045  1.101     lukem 		}
   1046    1.1       cgd 	}
   1047  1.100     lukem 	setenv("HOME", homedir, 1);
   1048   1.44     lukem 
   1049   1.85     lukem 	if (curclass.type == CLASS_GUEST && passwd[0] == '-')
   1050   1.85     lukem 		quietmessages = 1;
   1051   1.85     lukem 
   1052  1.101     lukem 			/*
   1053  1.101     lukem 			 * Display a login message, if it exists.
   1054  1.101     lukem 			 * N.B. reply(230,) must follow the message.
   1055  1.101     lukem 			 */
   1056  1.100     lukem 	(void)display_file(conffilename(curclass.motd), 230);
   1057   1.24     lukem 	show_chdir_messages(230);
   1058   1.73     lukem 	if (curclass.type == CLASS_GUEST) {
   1059    1.1       cgd 		reply(230, "Guest login ok, access restrictions apply.");
   1060    1.6       cgd #ifdef HASSETPROCTITLE
   1061    1.8   deraadt 		snprintf(proctitle, sizeof(proctitle),
   1062    1.8   deraadt 		    "%s: anonymous/%.*s", remotehost,
   1063   1.25  christos 		    (int) (sizeof(proctitle) - sizeof(remotehost) -
   1064   1.25  christos 		    sizeof(": anonymous/")), passwd);
   1065   1.97    itojun 		setproctitle("%s", proctitle);
   1066    1.6       cgd #endif /* HASSETPROCTITLE */
   1067    1.1       cgd 		if (logging)
   1068   1.81     lukem 			syslog(LOG_INFO,
   1069   1.81     lukem 			"ANONYMOUS FTP LOGIN FROM %s, %s (class: %s, type: %s)",
   1070   1.81     lukem 			    remotehost, passwd,
   1071   1.81     lukem 			    curclass.classname, CURCLASSTYPE);
   1072    1.1       cgd 	} else {
   1073    1.1       cgd 		reply(230, "User %s logged in.", pw->pw_name);
   1074    1.6       cgd #ifdef HASSETPROCTITLE
   1075    1.8   deraadt 		snprintf(proctitle, sizeof(proctitle),
   1076    1.8   deraadt 		    "%s: %s", remotehost, pw->pw_name);
   1077   1.97    itojun 		setproctitle("%s", proctitle);
   1078    1.6       cgd #endif /* HASSETPROCTITLE */
   1079    1.1       cgd 		if (logging)
   1080   1.81     lukem 			syslog(LOG_INFO,
   1081   1.81     lukem 			    "FTP LOGIN FROM %s as %s (class: %s, type: %s)",
   1082   1.81     lukem 			    remotehost, pw->pw_name,
   1083   1.81     lukem 			    curclass.classname, CURCLASSTYPE);
   1084    1.1       cgd 	}
   1085   1.24     lukem 	(void) umask(curclass.umask);
   1086   1.73     lukem 	goto cleanuppass;
   1087   1.73     lukem  bad:
   1088  1.101     lukem 			/* Forget all about it... */
   1089    1.1       cgd 	end_login();
   1090   1.73     lukem  cleanuppass:
   1091   1.73     lukem 	if (class)
   1092   1.73     lukem 		free(class);
   1093    1.1       cgd }
   1094    1.1       cgd 
   1095    1.8   deraadt void
   1096   1.88     lukem retrieve(char *argv[], const char *name)
   1097    1.1       cgd {
   1098   1.95     lukem 	FILE *fin, *dout;
   1099    1.1       cgd 	struct stat st;
   1100   1.88     lukem 	int (*closefunc)(FILE *) = NULL;
   1101   1.63     lukem 	int log, sendrv, closerv, stderrfd, isconversion, isdata, isls;
   1102   1.62     lukem 	struct timeval start, finish, td, *tdp;
   1103   1.62     lukem 	const char *dispname;
   1104    1.1       cgd 
   1105   1.49     lukem 	sendrv = closerv = stderrfd = -1;
   1106   1.63     lukem 	isconversion = isdata = isls = log = 0;
   1107   1.62     lukem 	tdp = NULL;
   1108   1.62     lukem 	dispname = name;
   1109   1.95     lukem 	fin = dout = NULL;
   1110   1.71     lukem 	if (argv == NULL) {
   1111   1.62     lukem 		log = 1;
   1112   1.62     lukem 		isdata = 1;
   1113   1.62     lukem 		fin = fopen(name, "r");
   1114   1.62     lukem 		closefunc = fclose;
   1115   1.24     lukem 		if (fin == NULL)
   1116   1.71     lukem 			argv = do_conversion(name);
   1117   1.71     lukem 		if (argv != NULL) {
   1118   1.49     lukem 			isconversion++;
   1119   1.71     lukem 			syslog(LOG_INFO, "get command: '%s' on '%s'",
   1120   1.71     lukem 			    argv[0], name);
   1121   1.49     lukem 		}
   1122   1.24     lukem 	}
   1123   1.71     lukem 	if (argv != NULL) {
   1124   1.82     lukem 		char temp[MAXPATHLEN];
   1125    1.1       cgd 
   1126   1.71     lukem 		if (strcmp(argv[0], INTERNAL_LS) == 0) {
   1127   1.63     lukem 			isls = 1;
   1128   1.63     lukem 			stderrfd = -1;
   1129   1.63     lukem 		} else {
   1130   1.63     lukem 			(void)snprintf(temp, sizeof(temp), "%s", TMPFILE);
   1131   1.63     lukem 			stderrfd = mkstemp(temp);
   1132   1.63     lukem 			if (stderrfd != -1)
   1133   1.63     lukem 				(void)unlink(temp);
   1134   1.63     lukem 		}
   1135   1.71     lukem 		dispname = argv[0];
   1136   1.71     lukem 		fin = ftpd_popen(argv, "r", stderrfd);
   1137   1.62     lukem 		closefunc = ftpd_pclose;
   1138    1.1       cgd 		st.st_size = -1;
   1139    1.1       cgd 		st.st_blksize = BUFSIZ;
   1140    1.1       cgd 	}
   1141    1.1       cgd 	if (fin == NULL) {
   1142    1.8   deraadt 		if (errno != 0) {
   1143   1.62     lukem 			perror_reply(550, dispname);
   1144   1.62     lukem 			if (log)
   1145   1.62     lukem 				logcmd("get", -1, name, NULL, NULL,
   1146   1.62     lukem 				    strerror(errno));
   1147    1.8   deraadt 		}
   1148   1.71     lukem 		goto cleanupretrieve;
   1149    1.1       cgd 	}
   1150    1.8   deraadt 	byte_count = -1;
   1151   1.71     lukem 	if (argv == NULL
   1152   1.49     lukem 	    && (fstat(fileno(fin), &st) < 0 || !S_ISREG(st.st_mode))) {
   1153   1.62     lukem 		reply(550, "%s: not a plain file.", dispname);
   1154    1.1       cgd 		goto done;
   1155    1.1       cgd 	}
   1156    1.1       cgd 	if (restart_point) {
   1157    1.1       cgd 		if (type == TYPE_A) {
   1158   1.49     lukem 			off_t i;
   1159    1.8   deraadt 			int c;
   1160    1.1       cgd 
   1161   1.49     lukem 			for (i = 0; i < restart_point; i++) {
   1162    1.1       cgd 				if ((c=getc(fin)) == EOF) {
   1163   1.62     lukem 					perror_reply(550, dispname);
   1164    1.1       cgd 					goto done;
   1165    1.1       cgd 				}
   1166    1.1       cgd 				if (c == '\n')
   1167    1.1       cgd 					i++;
   1168    1.8   deraadt 			}
   1169   1.31    kleink 		} else if (lseek(fileno(fin), restart_point, SEEK_SET) < 0) {
   1170   1.62     lukem 			perror_reply(550, dispname);
   1171    1.1       cgd 			goto done;
   1172    1.1       cgd 		}
   1173    1.1       cgd 	}
   1174   1.62     lukem 	dout = dataconn(dispname, st.st_size, "w");
   1175    1.1       cgd 	if (dout == NULL)
   1176    1.1       cgd 		goto done;
   1177   1.62     lukem 
   1178   1.62     lukem 	(void)gettimeofday(&start, NULL);
   1179   1.62     lukem 	sendrv = send_data(fin, dout, st.st_blksize, isdata);
   1180   1.62     lukem 	(void)gettimeofday(&finish, NULL);
   1181   1.95     lukem 	(void) fclose(dout);		/* close now to affect timing stats */
   1182   1.95     lukem 	dout = NULL;
   1183   1.62     lukem 	timersub(&finish, &start, &td);
   1184   1.62     lukem 	tdp = &td;
   1185   1.89     lukem  done:
   1186   1.24     lukem 	if (log)
   1187   1.62     lukem 		logcmd("get", byte_count, name, NULL, tdp, NULL);
   1188   1.49     lukem 	closerv = (*closefunc)(fin);
   1189   1.49     lukem 	if (sendrv == 0) {
   1190   1.49     lukem 		FILE *err;
   1191   1.49     lukem 		struct stat sb;
   1192   1.49     lukem 
   1193   1.71     lukem 		if (!isls && argv != NULL && closerv != 0) {
   1194   1.95     lukem 			reply(-226,
   1195   1.49     lukem 			    "Command returned an exit status of %d",
   1196   1.49     lukem 			    closerv);
   1197   1.49     lukem 			if (isconversion)
   1198   1.49     lukem 				syslog(LOG_INFO,
   1199   1.71     lukem 				    "retrieve command: '%s' returned %d",
   1200   1.71     lukem 				    argv[0], closerv);
   1201   1.49     lukem 		}
   1202   1.71     lukem 		if (!isls && argv != NULL && stderrfd != -1 &&
   1203   1.49     lukem 		    (fstat(stderrfd, &sb) == 0) && sb.st_size > 0 &&
   1204   1.49     lukem 		    ((err = fdopen(stderrfd, "r")) != NULL)) {
   1205   1.49     lukem 			char *cp, line[LINE_MAX];
   1206   1.49     lukem 
   1207   1.95     lukem 			reply(-226, "Command error messages:");
   1208   1.49     lukem 			rewind(err);
   1209   1.49     lukem 			while (fgets(line, sizeof(line), err) != NULL) {
   1210   1.49     lukem 				if ((cp = strchr(line, '\n')) != NULL)
   1211   1.49     lukem 					*cp = '\0';
   1212   1.95     lukem 				reply(0, "  %s", line);
   1213   1.49     lukem 			}
   1214   1.49     lukem 			(void) fflush(stdout);
   1215   1.49     lukem 			(void) fclose(err);
   1216   1.49     lukem 				/* a reply(226,) must follow */
   1217   1.49     lukem 		}
   1218   1.49     lukem 		reply(226, "Transfer complete.");
   1219   1.49     lukem 	}
   1220   1.71     lukem  cleanupretrieve:
   1221   1.95     lukem 	closedataconn(dout);
   1222   1.49     lukem 	if (stderrfd != -1)
   1223   1.49     lukem 		(void)close(stderrfd);
   1224   1.71     lukem 	if (isconversion)
   1225   1.71     lukem 		free(argv);
   1226    1.1       cgd }
   1227    1.1       cgd 
   1228    1.8   deraadt void
   1229   1.88     lukem store(const char *name, const char *mode, int unique)
   1230    1.1       cgd {
   1231    1.1       cgd 	FILE *fout, *din;
   1232    1.1       cgd 	struct stat st;
   1233   1.88     lukem 	int (*closefunc)(FILE *);
   1234   1.62     lukem 	struct timeval start, finish, td, *tdp;
   1235   1.62     lukem 	char *desc;
   1236    1.1       cgd 
   1237   1.95     lukem 	din = NULL;
   1238   1.62     lukem 	desc = (*mode == 'w') ? "put" : "append";
   1239    1.1       cgd 	if (unique && stat(name, &st) == 0 &&
   1240    1.8   deraadt 	    (name = gunique(name)) == NULL) {
   1241   1.62     lukem 		logcmd(desc, -1, name, NULL, NULL, "cannot create unique file");
   1242   1.89     lukem 		goto cleanupstore;
   1243    1.8   deraadt 	}
   1244    1.1       cgd 
   1245    1.1       cgd 	if (restart_point)
   1246    1.8   deraadt 		mode = "r+";
   1247    1.1       cgd 	fout = fopen(name, mode);
   1248    1.1       cgd 	closefunc = fclose;
   1249   1.62     lukem 	tdp = NULL;
   1250    1.1       cgd 	if (fout == NULL) {
   1251    1.1       cgd 		perror_reply(553, name);
   1252   1.62     lukem 		logcmd(desc, -1, name, NULL, NULL, strerror(errno));
   1253   1.89     lukem 		goto cleanupstore;
   1254    1.1       cgd 	}
   1255    1.8   deraadt 	byte_count = -1;
   1256    1.1       cgd 	if (restart_point) {
   1257    1.1       cgd 		if (type == TYPE_A) {
   1258   1.49     lukem 			off_t i;
   1259    1.8   deraadt 			int c;
   1260    1.1       cgd 
   1261   1.49     lukem 			for (i = 0; i < restart_point; i++) {
   1262    1.1       cgd 				if ((c=getc(fout)) == EOF) {
   1263    1.1       cgd 					perror_reply(550, name);
   1264    1.1       cgd 					goto done;
   1265    1.1       cgd 				}
   1266    1.1       cgd 				if (c == '\n')
   1267    1.1       cgd 					i++;
   1268    1.8   deraadt 			}
   1269    1.1       cgd 			/*
   1270    1.1       cgd 			 * We must do this seek to "current" position
   1271    1.1       cgd 			 * because we are changing from reading to
   1272    1.1       cgd 			 * writing.
   1273    1.1       cgd 			 */
   1274   1.20     lukem 			if (fseek(fout, 0L, SEEK_CUR) < 0) {
   1275    1.1       cgd 				perror_reply(550, name);
   1276    1.1       cgd 				goto done;
   1277    1.1       cgd 			}
   1278   1.31    kleink 		} else if (lseek(fileno(fout), restart_point, SEEK_SET) < 0) {
   1279    1.1       cgd 			perror_reply(550, name);
   1280    1.1       cgd 			goto done;
   1281    1.1       cgd 		}
   1282    1.1       cgd 	}
   1283    1.1       cgd 	din = dataconn(name, (off_t)-1, "r");
   1284    1.1       cgd 	if (din == NULL)
   1285    1.1       cgd 		goto done;
   1286   1.62     lukem 	(void)gettimeofday(&start, NULL);
   1287    1.1       cgd 	if (receive_data(din, fout) == 0) {
   1288    1.1       cgd 		if (unique)
   1289    1.1       cgd 			reply(226, "Transfer complete (unique file name:%s).",
   1290    1.1       cgd 			    name);
   1291    1.1       cgd 		else
   1292    1.1       cgd 			reply(226, "Transfer complete.");
   1293    1.1       cgd 	}
   1294   1.62     lukem 	(void)gettimeofday(&finish, NULL);
   1295   1.95     lukem 	(void) fclose(din);		/* close now to affect timing stats */
   1296   1.95     lukem 	din = NULL;
   1297   1.62     lukem 	timersub(&finish, &start, &td);
   1298   1.62     lukem 	tdp = &td;
   1299   1.89     lukem  done:
   1300   1.62     lukem 	logcmd(desc, byte_count, name, NULL, tdp, NULL);
   1301    1.1       cgd 	(*closefunc)(fout);
   1302   1.89     lukem  cleanupstore:
   1303   1.95     lukem 	closedataconn(din);
   1304    1.1       cgd }
   1305    1.1       cgd 
   1306    1.8   deraadt static FILE *
   1307   1.88     lukem getdatasock(const char *mode)
   1308    1.1       cgd {
   1309  1.101     lukem 	int		on, s, t, tries;
   1310  1.101     lukem 	in_port_t	port;
   1311    1.1       cgd 
   1312  1.101     lukem 	on = 1;
   1313    1.1       cgd 	if (data >= 0)
   1314    1.1       cgd 		return (fdopen(data, mode));
   1315  1.101     lukem 	if (! dropprivs)
   1316  1.101     lukem 		(void) seteuid((uid_t)0);
   1317   1.67    itojun 	s = socket(ctrl_addr.su_family, SOCK_STREAM, 0);
   1318    1.1       cgd 	if (s < 0)
   1319    1.1       cgd 		goto bad;
   1320    1.1       cgd 	if (setsockopt(s, SOL_SOCKET, SO_REUSEADDR,
   1321    1.8   deraadt 	    (char *) &on, sizeof(on)) < 0)
   1322    1.1       cgd 		goto bad;
   1323   1.66    briggs 	if (setsockopt(s, SOL_SOCKET, SO_KEEPALIVE,
   1324   1.66    briggs 	    (char *) &on, sizeof(on)) < 0)
   1325   1.66    briggs 		goto bad;
   1326  1.101     lukem 			/* anchor socket to avoid multi-homing problems */
   1327   1.67    itojun 	data_source = ctrl_addr;
   1328  1.101     lukem 			/*
   1329  1.101     lukem 			 * By default source port for PORT connctions is
   1330  1.101     lukem 			 * ctrlport-1 (see RFC959 section 5.2).
   1331  1.101     lukem 			 * However, if privs have been dropped and that
   1332  1.101     lukem 			 * would be < IPPORT_RESERVED, use a random port
   1333  1.101     lukem 			 * instead.
   1334  1.101     lukem 			 */
   1335  1.101     lukem 	port = ntohs(ctrl_addr.su_port) - 1;
   1336  1.101     lukem 	if (dropprivs && port < IPPORT_RESERVED)
   1337  1.101     lukem 		port = 0;		/* use random port */
   1338  1.101     lukem 	data_source.su_port = htons(port);
   1339  1.101     lukem 
   1340    1.1       cgd 	for (tries = 1; ; tries++) {
   1341    1.1       cgd 		if (bind(s, (struct sockaddr *)&data_source,
   1342   1.67    itojun 		    data_source.su_len) >= 0)
   1343    1.1       cgd 			break;
   1344    1.1       cgd 		if (errno != EADDRINUSE || tries > 10)
   1345    1.1       cgd 			goto bad;
   1346    1.1       cgd 		sleep(tries);
   1347    1.1       cgd 	}
   1348  1.101     lukem 	if (! dropprivs)
   1349  1.101     lukem 		(void) seteuid((uid_t)pw->pw_uid);
   1350    1.1       cgd #ifdef IP_TOS
   1351   1.75    itojun 	if (!mapped && ctrl_addr.su_family == AF_INET) {
   1352   1.67    itojun 		on = IPTOS_THROUGHPUT;
   1353   1.67    itojun 		if (setsockopt(s, IPPROTO_IP, IP_TOS, (char *)&on,
   1354   1.67    itojun 			       sizeof(int)) < 0)
   1355   1.67    itojun 			syslog(LOG_WARNING, "setsockopt (IP_TOS): %m");
   1356   1.67    itojun 	}
   1357    1.1       cgd #endif
   1358    1.1       cgd 	return (fdopen(s, mode));
   1359   1.89     lukem  bad:
   1360  1.101     lukem 		/* Return the real value of errno (close may change it) */
   1361    1.8   deraadt 	t = errno;
   1362  1.101     lukem 	if (! dropprivs)
   1363  1.101     lukem 		(void) seteuid((uid_t)pw->pw_uid);
   1364    1.1       cgd 	(void) close(s);
   1365    1.8   deraadt 	errno = t;
   1366    1.1       cgd 	return (NULL);
   1367    1.1       cgd }
   1368    1.1       cgd 
   1369   1.93     lukem FILE *
   1370   1.88     lukem dataconn(const char *name, off_t size, const char *mode)
   1371    1.1       cgd {
   1372    1.1       cgd 	char sizebuf[32];
   1373    1.1       cgd 	FILE *file;
   1374   1.66    briggs 	int retry = 0, tos, keepalive;
   1375    1.1       cgd 
   1376    1.1       cgd 	file_size = size;
   1377    1.1       cgd 	byte_count = 0;
   1378    1.1       cgd 	if (size != (off_t) -1)
   1379   1.62     lukem 		(void)snprintf(sizebuf, sizeof(sizebuf), " (%qd byte%s)",
   1380   1.65      ross 		    (qdfmt_t)size, PLURAL(size));
   1381    1.1       cgd 	else
   1382   1.29       mrg 		sizebuf[0] = '\0';
   1383    1.1       cgd 	if (pdata >= 0) {
   1384   1.67    itojun 		union sockunion from;
   1385   1.68    itojun 		int s, fromlen = sizeof(from);
   1386    1.1       cgd 
   1387   1.42     lukem 		(void) alarm(curclass.timeout);
   1388    1.1       cgd 		s = accept(pdata, (struct sockaddr *)&from, &fromlen);
   1389   1.42     lukem 		(void) alarm(0);
   1390    1.1       cgd 		if (s < 0) {
   1391    1.1       cgd 			reply(425, "Can't open data connection.");
   1392    1.1       cgd 			(void) close(pdata);
   1393    1.1       cgd 			pdata = -1;
   1394    1.8   deraadt 			return (NULL);
   1395    1.1       cgd 		}
   1396    1.1       cgd 		(void) close(pdata);
   1397    1.1       cgd 		pdata = s;
   1398   1.67    itojun 		switch (from.su_family) {
   1399   1.67    itojun 		case AF_INET:
   1400    1.1       cgd #ifdef IP_TOS
   1401   1.75    itojun 			if (!mapped) {
   1402   1.75    itojun 				tos = IPTOS_THROUGHPUT;
   1403   1.75    itojun 				(void) setsockopt(s, IPPROTO_IP, IP_TOS,
   1404   1.75    itojun 				    (char *)&tos, sizeof(int));
   1405   1.75    itojun 			}
   1406   1.67    itojun 			break;
   1407   1.66    briggs #endif
   1408   1.67    itojun 		}
   1409   1.66    briggs 		/* Set keepalives on the socket to detect dropped conns. */
   1410   1.66    briggs #ifdef SO_KEEPALIVE
   1411   1.66    briggs 		keepalive = 1;
   1412   1.66    briggs 		(void) setsockopt(s, SOL_SOCKET, SO_KEEPALIVE,
   1413   1.66    briggs 		    (char *)&keepalive, sizeof(int));
   1414    1.1       cgd #endif
   1415    1.8   deraadt 		reply(150, "Opening %s mode data connection for '%s'%s.",
   1416    1.1       cgd 		     type == TYPE_A ? "ASCII" : "BINARY", name, sizebuf);
   1417    1.8   deraadt 		return (fdopen(pdata, mode));
   1418    1.1       cgd 	}
   1419    1.1       cgd 	if (data >= 0) {
   1420    1.8   deraadt 		reply(125, "Using existing data connection for '%s'%s.",
   1421    1.1       cgd 		    name, sizebuf);
   1422    1.1       cgd 		usedefault = 1;
   1423    1.1       cgd 		return (fdopen(data, mode));
   1424    1.1       cgd 	}
   1425    1.1       cgd 	if (usedefault)
   1426    1.1       cgd 		data_dest = his_addr;
   1427    1.1       cgd 	usedefault = 1;
   1428    1.1       cgd 	file = getdatasock(mode);
   1429    1.1       cgd 	if (file == NULL) {
   1430   1.67    itojun 		char hbuf[INET6_ADDRSTRLEN];
   1431   1.67    itojun 		char pbuf[10];
   1432   1.67    itojun 		getnameinfo((struct sockaddr *)&data_source, data_source.su_len,
   1433   1.67    itojun 			hbuf, sizeof(hbuf), pbuf, sizeof(pbuf),
   1434   1.67    itojun 			NI_NUMERICHOST | NI_NUMERICSERV);
   1435   1.67    itojun 		reply(425, "Can't create data socket (%s,%s): %s.",
   1436   1.67    itojun 		      hbuf, pbuf, strerror(errno));
   1437    1.1       cgd 		return (NULL);
   1438    1.1       cgd 	}
   1439    1.1       cgd 	data = fileno(file);
   1440    1.1       cgd 	while (connect(data, (struct sockaddr *)&data_dest,
   1441   1.67    itojun 	    data_dest.su_len) < 0) {
   1442    1.1       cgd 		if (errno == EADDRINUSE && retry < swaitmax) {
   1443    1.1       cgd 			sleep((unsigned) swaitint);
   1444    1.1       cgd 			retry += swaitint;
   1445    1.1       cgd 			continue;
   1446    1.1       cgd 		}
   1447    1.1       cgd 		perror_reply(425, "Can't build data connection");
   1448    1.1       cgd 		(void) fclose(file);
   1449    1.1       cgd 		data = -1;
   1450    1.1       cgd 		return (NULL);
   1451    1.1       cgd 	}
   1452    1.8   deraadt 	reply(150, "Opening %s mode data connection for '%s'%s.",
   1453    1.1       cgd 	     type == TYPE_A ? "ASCII" : "BINARY", name, sizebuf);
   1454    1.1       cgd 	return (file);
   1455    1.1       cgd }
   1456    1.1       cgd 
   1457   1.95     lukem void
   1458   1.95     lukem closedataconn(FILE *fd)
   1459   1.95     lukem {
   1460   1.95     lukem 
   1461   1.95     lukem 	if (fd != NULL)
   1462   1.95     lukem 		(void)fclose(fd);
   1463   1.95     lukem 	data = -1;
   1464   1.95     lukem 	if (pdata >= 0)
   1465   1.95     lukem 		(void)close(pdata);
   1466   1.95     lukem 	pdata = -1;
   1467   1.95     lukem }
   1468   1.95     lukem 
   1469    1.1       cgd /*
   1470    1.8   deraadt  * Tranfer the contents of "instr" to "outstr" peer using the appropriate
   1471    1.8   deraadt  * encapsulation of the data subject * to Mode, Structure, and Type.
   1472    1.1       cgd  *
   1473    1.1       cgd  * NB: Form isn't handled.
   1474    1.1       cgd  */
   1475   1.49     lukem static int
   1476   1.88     lukem send_data(FILE *instr, FILE *outstr, off_t blksize, int isdata)
   1477    1.1       cgd {
   1478   1.73     lukem 	int	 c, filefd, netfd, rval;
   1479   1.24     lukem 	char	*buf;
   1480    1.1       cgd 
   1481   1.62     lukem 	transflag = 1;
   1482   1.62     lukem 	rval = -1;
   1483   1.62     lukem 	buf = NULL;
   1484   1.62     lukem 	if (setjmp(urgcatch))
   1485   1.62     lukem 		goto cleanup_send_data;
   1486   1.24     lukem 
   1487    1.1       cgd 	switch (type) {
   1488    1.1       cgd 
   1489    1.1       cgd 	case TYPE_A:
   1490   1.73     lukem  /* XXXX: rate limit ascii send (get) */
   1491   1.62     lukem 		(void) alarm(curclass.timeout);
   1492    1.1       cgd 		while ((c = getc(instr)) != EOF) {
   1493    1.1       cgd 			byte_count++;
   1494   1.63     lukem 			if (c == '\n') {
   1495   1.63     lukem 				if (ferror(outstr))
   1496   1.63     lukem 					goto data_err;
   1497   1.63     lukem 				(void) putc('\r', outstr);
   1498   1.63     lukem 				if (isdata) {
   1499   1.63     lukem 					total_data_out++;
   1500   1.63     lukem 					total_data++;
   1501   1.63     lukem 				}
   1502   1.63     lukem 				total_bytes_out++;
   1503   1.63     lukem 				total_bytes++;
   1504   1.63     lukem 			}
   1505   1.63     lukem 			(void) putc(c, outstr);
   1506   1.62     lukem 			if (isdata) {
   1507   1.62     lukem 				total_data_out++;
   1508   1.62     lukem 				total_data++;
   1509   1.62     lukem 			}
   1510   1.62     lukem 			total_bytes_out++;
   1511   1.62     lukem 			total_bytes++;
   1512   1.62     lukem 			if ((byte_count % 4096) == 0)
   1513   1.62     lukem 				(void) alarm(curclass.timeout);
   1514    1.1       cgd 		}
   1515   1.62     lukem 		(void) alarm(0);
   1516    1.1       cgd 		fflush(outstr);
   1517    1.1       cgd 		if (ferror(instr))
   1518    1.1       cgd 			goto file_err;
   1519    1.1       cgd 		if (ferror(outstr))
   1520    1.1       cgd 			goto data_err;
   1521   1.62     lukem 		rval = 0;
   1522   1.62     lukem 		goto cleanup_send_data;
   1523    1.1       cgd 
   1524    1.1       cgd 	case TYPE_I:
   1525    1.1       cgd 	case TYPE_L:
   1526   1.62     lukem 		if ((buf = malloc((size_t)blksize)) == NULL) {
   1527    1.1       cgd 			perror_reply(451, "Local resource failure: malloc");
   1528   1.62     lukem 			goto cleanup_send_data;
   1529    1.1       cgd 		}
   1530   1.63     lukem 		filefd = fileno(instr);
   1531    1.1       cgd 		netfd = fileno(outstr);
   1532   1.62     lukem 		(void) alarm(curclass.timeout);
   1533   1.73     lukem 		if (curclass.rateget) {
   1534   1.73     lukem 			while (1) {
   1535   1.73     lukem 				int d;
   1536   1.73     lukem 				struct timeval then, now, td;
   1537   1.73     lukem 				off_t bufrem;
   1538   1.73     lukem 				char *bufp;
   1539   1.73     lukem 
   1540   1.73     lukem 				(void)gettimeofday(&then, NULL);
   1541   1.73     lukem 				errno = c = d = 0;
   1542   1.73     lukem 				bufrem = curclass.rateget;
   1543   1.73     lukem 				while (bufrem > 0) {
   1544   1.73     lukem 					if ((c = read(filefd, buf,
   1545   1.73     lukem 					    MIN(blksize, bufrem))) <= 0)
   1546   1.73     lukem 						goto senddone;
   1547   1.73     lukem 					(void) alarm(curclass.timeout);
   1548   1.73     lukem 					bufrem -= c;
   1549   1.73     lukem 					byte_count += c;
   1550   1.73     lukem 					if (isdata) {
   1551   1.73     lukem 						total_data_out += c;
   1552   1.73     lukem 						total_data += c;
   1553   1.73     lukem 					}
   1554   1.73     lukem 					total_bytes_out += c;
   1555   1.73     lukem 					total_bytes += c;
   1556   1.73     lukem 					for (bufp = buf; c > 0;
   1557   1.73     lukem 					    c -= d, bufp += d)
   1558   1.73     lukem 						if ((d =
   1559   1.73     lukem 						    write(netfd, bufp, c)) <= 0)
   1560   1.73     lukem 							break;
   1561   1.73     lukem 					if (d < 0)
   1562   1.73     lukem 						goto data_err;
   1563   1.73     lukem 				}
   1564   1.73     lukem 				(void)gettimeofday(&now, NULL);
   1565   1.73     lukem 				timersub(&now, &then, &td);
   1566   1.96     lukem 				if (td.tv_sec == 0)
   1567   1.96     lukem 					usleep(1000000 - td.tv_usec);
   1568   1.73     lukem 			}
   1569   1.73     lukem 		} else {
   1570   1.73     lukem 			while ((c = read(filefd, buf, (size_t)blksize)) > 0) {
   1571   1.73     lukem 				if (write(netfd, buf, c) != c)
   1572   1.73     lukem 					goto data_err;
   1573   1.73     lukem 				(void) alarm(curclass.timeout);
   1574   1.73     lukem 				byte_count += c;
   1575   1.73     lukem 				if (isdata) {
   1576   1.73     lukem 					total_data_out += c;
   1577   1.73     lukem 					total_data += c;
   1578   1.73     lukem 				}
   1579   1.73     lukem 				total_bytes_out += c;
   1580   1.73     lukem 				total_bytes += c;
   1581   1.62     lukem 			}
   1582    1.1       cgd 		}
   1583   1.73     lukem  senddone:
   1584   1.73     lukem 		if (c < 0)
   1585   1.62     lukem 			goto file_err;
   1586   1.62     lukem 		rval = 0;
   1587   1.62     lukem 		goto cleanup_send_data;
   1588   1.62     lukem 
   1589    1.1       cgd 	default:
   1590    1.1       cgd 		reply(550, "Unimplemented TYPE %d in send_data", type);
   1591   1.62     lukem 		goto cleanup_send_data;
   1592    1.1       cgd 	}
   1593    1.1       cgd 
   1594   1.89     lukem  data_err:
   1595   1.62     lukem 	(void) alarm(0);
   1596    1.1       cgd 	perror_reply(426, "Data connection");
   1597   1.62     lukem 	goto cleanup_send_data;
   1598    1.1       cgd 
   1599   1.89     lukem  file_err:
   1600   1.62     lukem 	(void) alarm(0);
   1601   1.62     lukem 	perror_reply(551, "Error on input file");
   1602   1.62     lukem 		/* FALLTHROUGH */
   1603   1.73     lukem 
   1604   1.89     lukem  cleanup_send_data:
   1605   1.62     lukem 	(void) alarm(0);
   1606    1.1       cgd 	transflag = 0;
   1607   1.62     lukem 	if (buf)
   1608   1.62     lukem 		free(buf);
   1609   1.62     lukem 	if (isdata) {
   1610   1.62     lukem 		total_files_out++;
   1611   1.62     lukem 		total_files++;
   1612   1.62     lukem 	}
   1613   1.62     lukem 	total_xfers_out++;
   1614   1.62     lukem 	total_xfers++;
   1615   1.62     lukem 	return (rval);
   1616    1.1       cgd }
   1617    1.1       cgd 
   1618    1.1       cgd /*
   1619    1.8   deraadt  * Transfer data from peer to "outstr" using the appropriate encapulation of
   1620    1.8   deraadt  * the data subject to Mode, Structure, and Type.
   1621    1.1       cgd  *
   1622    1.1       cgd  * N.B.: Form isn't handled.
   1623    1.1       cgd  */
   1624    1.8   deraadt static int
   1625   1.88     lukem receive_data(FILE *instr, FILE *outstr)
   1626    1.1       cgd {
   1627   1.73     lukem 	int	c, bare_lfs, netfd, filefd, rval;
   1628   1.24     lukem 	char	buf[BUFSIZ];
   1629   1.25  christos #ifdef __GNUC__
   1630   1.25  christos 	(void) &bare_lfs;
   1631   1.25  christos #endif
   1632    1.1       cgd 
   1633   1.24     lukem 	bare_lfs = 0;
   1634   1.62     lukem 	transflag = 1;
   1635   1.62     lukem 	rval = -1;
   1636   1.62     lukem 	if (setjmp(urgcatch))
   1637   1.62     lukem 		goto cleanup_recv_data;
   1638   1.24     lukem 
   1639    1.1       cgd 	switch (type) {
   1640    1.1       cgd 
   1641    1.1       cgd 	case TYPE_I:
   1642    1.1       cgd 	case TYPE_L:
   1643   1.62     lukem 		netfd = fileno(instr);
   1644   1.62     lukem 		filefd = fileno(outstr);
   1645   1.62     lukem 		(void) alarm(curclass.timeout);
   1646   1.73     lukem 		if (curclass.rateput) {
   1647   1.73     lukem 			while (1) {
   1648   1.73     lukem 				int d;
   1649   1.73     lukem 				struct timeval then, now, td;
   1650   1.73     lukem 				off_t bufrem;
   1651   1.73     lukem 
   1652   1.73     lukem 				(void)gettimeofday(&then, NULL);
   1653   1.73     lukem 				errno = c = d = 0;
   1654   1.73     lukem 				for (bufrem = curclass.rateput; bufrem > 0; ) {
   1655   1.73     lukem 					if ((c = read(netfd, buf,
   1656   1.73     lukem 					    MIN(sizeof(buf), bufrem))) <= 0)
   1657   1.73     lukem 						goto recvdone;
   1658   1.73     lukem 					if ((d = write(filefd, buf, c)) != c)
   1659   1.73     lukem 						goto recvdone;
   1660   1.73     lukem 					(void) alarm(curclass.timeout);
   1661   1.73     lukem 					bufrem -= c;
   1662   1.73     lukem 					byte_count += c;
   1663   1.73     lukem 					total_data_in += c;
   1664   1.73     lukem 					total_data += c;
   1665   1.73     lukem 					total_bytes_in += c;
   1666   1.73     lukem 					total_bytes += c;
   1667   1.73     lukem 				}
   1668   1.73     lukem 				(void)gettimeofday(&now, NULL);
   1669   1.73     lukem 				timersub(&now, &then, &td);
   1670   1.96     lukem 				if (td.tv_sec == 0)
   1671   1.96     lukem 					usleep(1000000 - td.tv_usec);
   1672   1.73     lukem 			}
   1673   1.73     lukem 		} else {
   1674   1.73     lukem 			while ((c = read(netfd, buf, sizeof(buf))) > 0) {
   1675   1.73     lukem 				if (write(filefd, buf, c) != c)
   1676   1.73     lukem 					goto file_err;
   1677   1.73     lukem 				(void) alarm(curclass.timeout);
   1678   1.73     lukem 				byte_count += c;
   1679   1.73     lukem 				total_data_in += c;
   1680   1.73     lukem 				total_data += c;
   1681   1.73     lukem 				total_bytes_in += c;
   1682   1.73     lukem 				total_bytes += c;
   1683   1.73     lukem 			}
   1684    1.1       cgd 		}
   1685   1.73     lukem  recvdone:
   1686   1.73     lukem 		if (c < 0)
   1687    1.1       cgd 			goto data_err;
   1688   1.62     lukem 		rval = 0;
   1689   1.62     lukem 		goto cleanup_recv_data;
   1690    1.1       cgd 
   1691    1.1       cgd 	case TYPE_E:
   1692    1.1       cgd 		reply(553, "TYPE E not implemented.");
   1693   1.62     lukem 		goto cleanup_recv_data;
   1694    1.1       cgd 
   1695    1.1       cgd 	case TYPE_A:
   1696   1.62     lukem 		(void) alarm(curclass.timeout);
   1697   1.73     lukem  /* XXXX: rate limit ascii receive (put) */
   1698    1.1       cgd 		while ((c = getc(instr)) != EOF) {
   1699    1.1       cgd 			byte_count++;
   1700   1.62     lukem 			total_data_in++;
   1701   1.62     lukem 			total_data++;
   1702   1.62     lukem 			total_bytes_in++;
   1703   1.62     lukem 			total_bytes++;
   1704   1.62     lukem 			if ((byte_count % 4096) == 0)
   1705   1.62     lukem 				(void) alarm(curclass.timeout);
   1706    1.1       cgd 			if (c == '\n')
   1707    1.1       cgd 				bare_lfs++;
   1708    1.1       cgd 			while (c == '\r') {
   1709    1.1       cgd 				if (ferror(outstr))
   1710    1.1       cgd 					goto data_err;
   1711    1.1       cgd 				if ((c = getc(instr)) != '\n') {
   1712   1.62     lukem 					byte_count++;
   1713   1.62     lukem 					total_data_in++;
   1714   1.62     lukem 					total_data++;
   1715   1.62     lukem 					total_bytes_in++;
   1716   1.62     lukem 					total_bytes++;
   1717   1.62     lukem 					if ((byte_count % 4096) == 0)
   1718   1.62     lukem 						(void) alarm(curclass.timeout);
   1719    1.1       cgd 					(void) putc ('\r', outstr);
   1720    1.1       cgd 					if (c == '\0' || c == EOF)
   1721    1.1       cgd 						goto contin2;
   1722    1.1       cgd 				}
   1723    1.1       cgd 			}
   1724    1.1       cgd 			(void) putc(c, outstr);
   1725    1.1       cgd 	contin2:	;
   1726    1.1       cgd 		}
   1727   1.62     lukem 		(void) alarm(0);
   1728    1.1       cgd 		fflush(outstr);
   1729    1.1       cgd 		if (ferror(instr))
   1730    1.1       cgd 			goto data_err;
   1731    1.1       cgd 		if (ferror(outstr))
   1732    1.1       cgd 			goto file_err;
   1733    1.1       cgd 		if (bare_lfs) {
   1734   1.95     lukem 			reply(-226,
   1735   1.62     lukem 			    "WARNING! %d bare linefeeds received in ASCII mode",
   1736    1.8   deraadt 			    bare_lfs);
   1737   1.95     lukem 			reply(0, "File may not have transferred correctly.");
   1738    1.1       cgd 		}
   1739   1.62     lukem 		rval = 0;
   1740   1.62     lukem 		goto cleanup_recv_data;
   1741   1.62     lukem 
   1742    1.1       cgd 	default:
   1743    1.1       cgd 		reply(550, "Unimplemented TYPE %d in receive_data", type);
   1744   1.62     lukem 		goto cleanup_recv_data;
   1745    1.1       cgd 	}
   1746    1.1       cgd 
   1747   1.89     lukem  data_err:
   1748   1.62     lukem 	(void) alarm(0);
   1749    1.1       cgd 	perror_reply(426, "Data Connection");
   1750   1.62     lukem 	goto cleanup_recv_data;
   1751    1.1       cgd 
   1752   1.89     lukem  file_err:
   1753   1.62     lukem 	(void) alarm(0);
   1754   1.62     lukem 	perror_reply(452, "Error writing file");
   1755   1.62     lukem 	goto cleanup_recv_data;
   1756   1.62     lukem 
   1757   1.89     lukem  cleanup_recv_data:
   1758   1.62     lukem 	(void) alarm(0);
   1759    1.1       cgd 	transflag = 0;
   1760   1.62     lukem 	total_files_in++;
   1761   1.62     lukem 	total_files++;
   1762   1.62     lukem 	total_xfers_in++;
   1763   1.62     lukem 	total_xfers++;
   1764   1.62     lukem 	return (rval);
   1765    1.1       cgd }
   1766    1.1       cgd 
   1767    1.8   deraadt void
   1768   1.88     lukem statcmd(void)
   1769    1.1       cgd {
   1770   1.67    itojun 	union sockunion *su = NULL;
   1771   1.67    itojun 	static char ntop_buf[INET6_ADDRSTRLEN];
   1772   1.67    itojun   	u_char *a, *p;
   1773   1.89     lukem 	int ispassive, af;
   1774   1.93     lukem 	off_t otbi, otbo, otb;
   1775    1.1       cgd 
   1776   1.67    itojun 	a = p = (u_char *)NULL;
   1777   1.67    itojun 
   1778   1.95     lukem 	reply(-211, "%s FTP server status:", hostname);
   1779  1.101     lukem 	reply(0, "Version: %s", EMPTYSTR(version) ? "<suppressed>" : version);
   1780   1.67    itojun 	ntop_buf[0] = '\0';
   1781   1.67    itojun 	if (!getnameinfo((struct sockaddr *)&his_addr, his_addr.su_len,
   1782   1.67    itojun 			ntop_buf, sizeof(ntop_buf), NULL, 0, NI_NUMERICHOST)
   1783   1.73     lukem 	    && strcmp(remotehost, ntop_buf) != 0) {
   1784   1.95     lukem 		reply(0, "Connected to %s (%s)", remotehost, ntop_buf);
   1785   1.67    itojun 	} else
   1786   1.95     lukem 		reply(0, "Connected to %s", remotehost);
   1787    1.1       cgd 	if (logged_in) {
   1788   1.73     lukem 		if (curclass.type == CLASS_GUEST)
   1789   1.95     lukem 			reply(0, "Logged in anonymously");
   1790    1.1       cgd 		else
   1791   1.95     lukem 			reply(0, "Logged in as %s%s", pw->pw_name,
   1792   1.73     lukem 			    curclass.type == CLASS_CHROOT ? " (chroot)" : "");
   1793    1.1       cgd 	} else if (askpasswd)
   1794   1.95     lukem 		reply(0, "Waiting for password");
   1795    1.1       cgd 	else
   1796   1.95     lukem 		reply(0, "Waiting for user name");
   1797   1.95     lukem 	cprintf(stdout, "    TYPE: %s", typenames[type]);
   1798   1.93     lukem 	if (type == TYPE_A || type == TYPE_E)
   1799   1.95     lukem 		cprintf(stdout, ", FORM: %s", formnames[form]);
   1800   1.62     lukem 	if (type == TYPE_L) {
   1801    1.1       cgd #if NBBY == 8
   1802   1.95     lukem 		cprintf(stdout, " %d", NBBY);
   1803    1.1       cgd #else
   1804   1.62     lukem 			/* XXX: `bytesize' needs to be defined in this case */
   1805   1.95     lukem 		cprintf(stdout, " %d", bytesize);
   1806    1.1       cgd #endif
   1807   1.62     lukem 	}
   1808   1.95     lukem 	cprintf(stdout, "; STRUcture: %s; transfer MODE: %s\r\n",
   1809    1.1       cgd 	    strunames[stru], modenames[mode]);
   1810   1.67    itojun 	ispassive = 0;
   1811   1.67    itojun 	if (data != -1) {
   1812   1.95     lukem   		reply(0, "Data connection open");
   1813   1.67    itojun 		su = NULL;
   1814   1.67    itojun 	} else if (pdata != -1) {
   1815   1.95     lukem 		reply(0, "in Passive mode");
   1816   1.67    itojun 		su = (union sockunion *)&pasv_addr;
   1817   1.67    itojun 		ispassive = 1;
   1818    1.1       cgd 		goto printaddr;
   1819    1.1       cgd 	} else if (usedefault == 0) {
   1820   1.67    itojun 		if (epsvall) {
   1821   1.95     lukem 			reply(0, "EPSV only mode (EPSV ALL)");
   1822   1.67    itojun 			goto epsvonly;
   1823   1.67    itojun 		}
   1824   1.67    itojun 		su = (union sockunion *)&data_dest;
   1825   1.89     lukem  printaddr:
   1826   1.93     lukem 							/* PASV/PORT */
   1827   1.67    itojun 		if (su->su_family == AF_INET) {
   1828   1.67    itojun 			a = (u_char *) &su->su_sin.sin_addr;
   1829   1.67    itojun 			p = (u_char *) &su->su_sin.sin_port;
   1830    1.1       cgd #define UC(b) (((int) b) & 0xff)
   1831   1.95     lukem 			reply(0, "%s (%d,%d,%d,%d,%d,%d)",
   1832   1.93     lukem 				ispassive ? "PASV" : "PORT" ,
   1833   1.67    itojun 				UC(a[0]), UC(a[1]), UC(a[2]), UC(a[3]),
   1834   1.67    itojun 				UC(p[0]), UC(p[1]));
   1835   1.67    itojun 		}
   1836   1.67    itojun 
   1837   1.93     lukem 							/* LPSV/LPRT */
   1838   1.67    itojun 	    {
   1839   1.67    itojun 		int alen, af, i;
   1840   1.67    itojun 
   1841   1.67    itojun 		alen = 0;
   1842   1.67    itojun 		switch (su->su_family) {
   1843   1.67    itojun 		case AF_INET:
   1844   1.67    itojun 			a = (u_char *) &su->su_sin.sin_addr;
   1845   1.67    itojun 			p = (u_char *) &su->su_sin.sin_port;
   1846   1.67    itojun 			alen = sizeof(su->su_sin.sin_addr);
   1847   1.67    itojun 			af = 4;
   1848   1.67    itojun 			break;
   1849   1.67    itojun 		case AF_INET6:
   1850   1.67    itojun 			a = (u_char *) &su->su_sin6.sin6_addr;
   1851   1.67    itojun 			p = (u_char *) &su->su_sin6.sin6_port;
   1852   1.67    itojun 			alen = sizeof(su->su_sin6.sin6_addr);
   1853   1.67    itojun 			af = 6;
   1854   1.67    itojun 			break;
   1855   1.67    itojun 		default:
   1856   1.67    itojun 			af = 0;
   1857   1.67    itojun 			break;
   1858   1.67    itojun 		}
   1859   1.67    itojun 		if (af) {
   1860   1.95     lukem 			cprintf(stdout, "    %s (%d,%d",
   1861   1.93     lukem 			    ispassive ? "LPSV" : "LPRT", af, alen);
   1862   1.67    itojun 			for (i = 0; i < alen; i++)
   1863   1.95     lukem 				cprintf(stdout, ",%d", UC(a[i]));
   1864   1.95     lukem 			cprintf(stdout, ",%d,%d,%d)", 2, UC(p[0]), UC(p[1]));
   1865    1.1       cgd #undef UC
   1866   1.67    itojun 		}
   1867   1.67    itojun 	    }
   1868   1.67    itojun 
   1869   1.67    itojun 		/* EPRT/EPSV */
   1870   1.89     lukem  epsvonly:
   1871   1.67    itojun 		switch (su->su_family) {
   1872   1.67    itojun 		case AF_INET:
   1873   1.67    itojun 			af = 1;
   1874   1.67    itojun 			break;
   1875   1.67    itojun 		case AF_INET6:
   1876   1.67    itojun 			af = 2;
   1877   1.67    itojun 			break;
   1878   1.67    itojun 		default:
   1879   1.67    itojun 			af = 0;
   1880   1.67    itojun 			break;
   1881   1.67    itojun 		}
   1882   1.67    itojun 		if (af) {
   1883   1.67    itojun 			if (getnameinfo((struct sockaddr *)su, su->su_len,
   1884   1.93     lukem 				    ntop_buf, sizeof(ntop_buf), NULL, 0,
   1885   1.67    itojun 					NI_NUMERICHOST) == 0) {
   1886   1.95     lukem 				reply(0, "%s (|%d|%s|%d|)",
   1887   1.93     lukem 				    ispassive ? "EPSV" : "EPRT",
   1888   1.93     lukem 				    af, ntop_buf, ntohs(su->su_port));
   1889   1.67    itojun 			}
   1890   1.67    itojun 		}
   1891    1.1       cgd 	} else
   1892   1.95     lukem 		reply(0, "No data connection");
   1893   1.62     lukem 
   1894   1.62     lukem 	if (logged_in) {
   1895   1.95     lukem 		reply(0, "Data sent:        %qd byte%s in %qd file%s",
   1896   1.65      ross 		    (qdfmt_t)total_data_out, PLURAL(total_data_out),
   1897   1.65      ross 		    (qdfmt_t)total_files_out, PLURAL(total_files_out));
   1898   1.95     lukem 		reply(0, "Data received:    %qd byte%s in %qd file%s",
   1899   1.65      ross 		    (qdfmt_t)total_data_in, PLURAL(total_data_in),
   1900   1.65      ross 		    (qdfmt_t)total_files_in, PLURAL(total_files_in));
   1901   1.95     lukem 		reply(0, "Total data:       %qd byte%s in %qd file%s",
   1902   1.65      ross 		    (qdfmt_t)total_data, PLURAL(total_data),
   1903   1.65      ross 		    (qdfmt_t)total_files, PLURAL(total_files));
   1904   1.62     lukem 	}
   1905   1.62     lukem 	otbi = total_bytes_in;
   1906   1.62     lukem 	otbo = total_bytes_out;
   1907   1.62     lukem 	otb = total_bytes;
   1908   1.95     lukem 	reply(0, "Traffic sent:     %qd byte%s in %qd transfer%s",
   1909   1.65      ross 	    (qdfmt_t)otbo, PLURAL(otbo),
   1910   1.65      ross 	    (qdfmt_t)total_xfers_out, PLURAL(total_xfers_out));
   1911   1.95     lukem 	reply(0, "Traffic received: %qd byte%s in %qd transfer%s",
   1912   1.65      ross 	    (qdfmt_t)otbi, PLURAL(otbi),
   1913   1.65      ross 	    (qdfmt_t)total_xfers_in, PLURAL(total_xfers_in));
   1914   1.95     lukem 	reply(0, "Total traffic:    %qd byte%s in %qd transfer%s",
   1915   1.65      ross 	    (qdfmt_t)otb, PLURAL(otb),
   1916   1.65      ross 	    (qdfmt_t)total_xfers, PLURAL(total_xfers));
   1917   1.24     lukem 
   1918   1.24     lukem 	if (logged_in) {
   1919   1.24     lukem 		struct ftpconv *cp;
   1920   1.24     lukem 
   1921   1.98  sommerfe 		reply(0, "%s", "");
   1922   1.95     lukem 		reply(0, "Class: %s, type: %s",
   1923   1.81     lukem 		    curclass.classname, CURCLASSTYPE);
   1924   1.95     lukem 		reply(0, "Check PORT/LPRT commands: %sabled",
   1925   1.41     lukem 		    curclass.checkportcmd ? "en" : "dis");
   1926  1.100     lukem 		if (! EMPTYSTR(curclass.display))
   1927   1.95     lukem 			reply(0, "Display file: %s", curclass.display);
   1928  1.100     lukem 		if (! EMPTYSTR(curclass.notify))
   1929   1.95     lukem 			reply(0, "Notify fileglob: %s", curclass.notify);
   1930   1.95     lukem 		reply(0, "Idle timeout: %d, maximum timeout: %d",
   1931   1.24     lukem 		    curclass.timeout, curclass.maxtimeout);
   1932   1.95     lukem 		reply(0, "Current connections: %d", connections);
   1933   1.82     lukem 		if (curclass.limit == -1)
   1934   1.95     lukem 			reply(0, "Maximum connections: unlimited");
   1935   1.82     lukem 		else
   1936   1.95     lukem 			reply(0, "Maximum connections: %d", curclass.limit);
   1937   1.82     lukem 		if (curclass.limitfile)
   1938   1.95     lukem 			reply(0, "Connection limit exceeded file: %s",
   1939   1.82     lukem 			    curclass.limitfile);
   1940  1.100     lukem 		if (! EMPTYSTR(curclass.chroot))
   1941  1.100     lukem 			reply(0, "Chroot format: %s", curclass.chroot);
   1942  1.100     lukem 		if (! EMPTYSTR(curclass.homedir))
   1943  1.100     lukem 			reply(0, "Homedir format: %s", curclass.homedir);
   1944  1.100     lukem 		if (! EMPTYSTR(curclass.motd))
   1945   1.95     lukem 			reply(0, "MotD file: %s", curclass.motd);
   1946   1.95     lukem 		reply(0,
   1947   1.73     lukem 	    "Modify commands (CHMOD, DELE, MKD, RMD, RNFR, UMASK): %sabled",
   1948   1.24     lukem 		    curclass.modify ? "en" : "dis");
   1949   1.95     lukem 		reply(0, "Upload commands (APPE, STOR, STOU): %sabled",
   1950   1.73     lukem 		    curclass.upload ? "en" : "dis");
   1951   1.85     lukem 		if (curclass.portmin && curclass.portmax)
   1952   1.95     lukem 			reply(0, "PASV port range: %d - %d",
   1953   1.85     lukem 			    curclass.portmin, curclass.portmax);
   1954   1.73     lukem 		if (curclass.rateget)
   1955   1.95     lukem 			reply(0, "Rate get limit: %d bytes/sec",
   1956   1.73     lukem 			    curclass.rateget);
   1957   1.73     lukem 		else
   1958   1.95     lukem 			reply(0, "Rate get limit: disabled");
   1959   1.73     lukem 		if (curclass.rateput)
   1960   1.95     lukem 			reply(0, "Rate put limit: %d bytes/sec",
   1961   1.73     lukem 			    curclass.rateput);
   1962   1.73     lukem 		else
   1963   1.95     lukem 			reply(0, "Rate put limit: disabled");
   1964   1.95     lukem 		reply(0, "Umask: %.04o", curclass.umask);
   1965   1.24     lukem 		for (cp = curclass.conversions; cp != NULL; cp=cp->next) {
   1966   1.24     lukem 			if (cp->suffix == NULL || cp->types == NULL ||
   1967   1.24     lukem 			    cp->command == NULL)
   1968   1.24     lukem 				continue;
   1969   1.95     lukem 			reply(0, "Conversion: %s [%s] disable: %s, command: %s",
   1970   1.24     lukem 			    cp->suffix, cp->types, cp->disable, cp->command);
   1971   1.24     lukem 		}
   1972   1.24     lukem 	}
   1973   1.24     lukem 
   1974    1.1       cgd 	reply(211, "End of status");
   1975    1.1       cgd }
   1976    1.1       cgd 
   1977    1.8   deraadt void
   1978   1.88     lukem fatal(const char *s)
   1979    1.1       cgd {
   1980    1.8   deraadt 
   1981    1.1       cgd 	reply(451, "Error in server: %s\n", s);
   1982    1.1       cgd 	reply(221, "Closing connection due to server error.");
   1983    1.1       cgd 	dologout(0);
   1984    1.1       cgd 	/* NOTREACHED */
   1985    1.1       cgd }
   1986    1.1       cgd 
   1987   1.93     lukem /*
   1988   1.93     lukem  * reply() --
   1989   1.95     lukem  *	depending on the value of n, display fmt with a trailing CRLF and
   1990   1.95     lukem  *	prefix of:
   1991   1.95     lukem  *	n < -1		prefix the message with abs(n) + "-"	(initial line)
   1992   1.95     lukem  *	n == 0		prefix the message with 4 spaces	(middle lines)
   1993   1.95     lukem  *	n >  0		prefix the message with n + " "		(final line)
   1994   1.93     lukem  */
   1995    1.8   deraadt void
   1996    1.8   deraadt reply(int n, const char *fmt, ...)
   1997    1.1       cgd {
   1998   1.62     lukem 	off_t b;
   1999    1.8   deraadt 	va_list ap;
   2000   1.88     lukem 
   2001    1.8   deraadt 	va_start(ap, fmt);
   2002   1.62     lukem 	b = 0;
   2003   1.95     lukem 	if (n == 0)
   2004   1.95     lukem 		cprintf(stdout, "    ");
   2005   1.95     lukem 	else if (n < 0)
   2006   1.95     lukem 		cprintf(stdout, "%d-", -n);
   2007   1.95     lukem 	else
   2008   1.95     lukem 		cprintf(stdout, "%d ", n);
   2009   1.95     lukem 	b = vprintf(fmt, ap);
   2010   1.62     lukem 	total_bytes += b;
   2011   1.62     lukem 	total_bytes_out += b;
   2012   1.95     lukem 	cprintf(stdout, "\r\n");
   2013    1.1       cgd 	(void)fflush(stdout);
   2014    1.1       cgd 	if (debug) {
   2015   1.95     lukem 		syslog(LOG_DEBUG, "<--- %d%c", abs(n), (n < 0) ? '-' : ' ');
   2016    1.8   deraadt 		vsyslog(LOG_DEBUG, fmt, ap);
   2017    1.1       cgd 	}
   2018    1.1       cgd }
   2019    1.1       cgd 
   2020    1.8   deraadt static void
   2021   1.88     lukem dolog(struct sockaddr *who)
   2022    1.1       cgd {
   2023   1.79     lukem 	getnameinfo(who, who->sa_len, remotehost, sizeof(remotehost), NULL,0,0);
   2024    1.6       cgd #ifdef HASSETPROCTITLE
   2025    1.8   deraadt 	snprintf(proctitle, sizeof(proctitle), "%s: connected", remotehost);
   2026   1.97    itojun 	setproctitle("%s", proctitle);
   2027    1.6       cgd #endif /* HASSETPROCTITLE */
   2028    1.8   deraadt 	if (logging)
   2029   1.79     lukem 		syslog(LOG_INFO, "connection from %s to %s",
   2030   1.79     lukem 		    remotehost, hostname);
   2031    1.1       cgd }
   2032    1.1       cgd 
   2033    1.1       cgd /*
   2034    1.1       cgd  * Record logout in wtmp file
   2035    1.1       cgd  * and exit with supplied status.
   2036    1.1       cgd  */
   2037    1.8   deraadt void
   2038   1.88     lukem dologout(int status)
   2039    1.1       cgd {
   2040   1.16       mrg 	/*
   2041   1.16       mrg 	* Prevent reception of SIGURG from resulting in a resumption
   2042   1.16       mrg 	* back to the main program loop.
   2043   1.16       mrg 	*/
   2044   1.16       mrg 	transflag = 0;
   2045    1.8   deraadt 
   2046    1.1       cgd 	if (logged_in) {
   2047  1.102     lukem 		if (dowtmp)
   2048  1.102     lukem 			logwtmp(ttyline, "", "");
   2049   1.78     lukem 		if (doutmp)
   2050   1.78     lukem 			logout(utmp.ut_line);
   2051   1.36   mycroft #ifdef KERBEROS
   2052    1.4       cgd 		if (!notickets && krbtkfile_env)
   2053    1.4       cgd 			unlink(krbtkfile_env);
   2054    1.4       cgd #endif
   2055    1.1       cgd 	}
   2056    1.1       cgd 	/* beware of flushing buffers after a SIGPIPE */
   2057    1.1       cgd 	_exit(status);
   2058    1.1       cgd }
   2059    1.1       cgd 
   2060    1.8   deraadt static void
   2061   1.88     lukem myoob(int signo)
   2062    1.1       cgd {
   2063    1.1       cgd 	char *cp;
   2064    1.1       cgd 
   2065    1.1       cgd 	/* only process if transfer occurring */
   2066    1.1       cgd 	if (!transflag)
   2067    1.1       cgd 		return;
   2068    1.1       cgd 	cp = tmpline;
   2069    1.1       cgd 	if (getline(cp, 7, stdin) == NULL) {
   2070    1.1       cgd 		reply(221, "You could at least say goodbye.");
   2071    1.1       cgd 		dologout(0);
   2072    1.1       cgd 	}
   2073   1.58     lukem 	if (strcasecmp(cp, "ABOR\r\n") == 0) {
   2074    1.1       cgd 		tmpline[0] = '\0';
   2075    1.1       cgd 		reply(426, "Transfer aborted. Data connection closed.");
   2076    1.1       cgd 		reply(226, "Abort successful");
   2077    1.1       cgd 		longjmp(urgcatch, 1);
   2078    1.1       cgd 	}
   2079   1.58     lukem 	if (strcasecmp(cp, "STAT\r\n") == 0) {
   2080   1.78     lukem 		tmpline[0] = '\0';
   2081    1.1       cgd 		if (file_size != (off_t) -1)
   2082   1.62     lukem 			reply(213, "Status: %qd of %qd byte%s transferred",
   2083   1.65      ross 			    (qdfmt_t)byte_count, (qdfmt_t)file_size,
   2084   1.65      ross 			    PLURAL(byte_count));
   2085    1.1       cgd 		else
   2086   1.62     lukem 			reply(213, "Status: %qd byte%s transferred",
   2087   1.65      ross 			    (qdfmt_t)byte_count, PLURAL(byte_count));
   2088    1.1       cgd 	}
   2089    1.1       cgd }
   2090    1.1       cgd 
   2091   1.84     lukem static int
   2092   1.88     lukem bind_pasv_addr(void)
   2093   1.84     lukem {
   2094   1.84     lukem 	static int passiveport;
   2095   1.84     lukem 	int port, len;
   2096   1.84     lukem 
   2097   1.84     lukem 	len = pasv_addr.su_len;
   2098   1.84     lukem 	if (curclass.portmin == 0 && curclass.portmax == 0) {
   2099   1.84     lukem 		pasv_addr.su_port = 0;
   2100   1.84     lukem 		return (bind(pdata, (struct sockaddr *)&pasv_addr, len));
   2101   1.84     lukem 	}
   2102   1.84     lukem 
   2103   1.84     lukem 	if (passiveport == 0) {
   2104   1.84     lukem 		srand(getpid());
   2105   1.84     lukem 		passiveport = rand() % (curclass.portmax - curclass.portmin)
   2106   1.84     lukem 		    + curclass.portmin;
   2107   1.84     lukem 	}
   2108   1.84     lukem 
   2109   1.84     lukem 	port = passiveport;
   2110   1.84     lukem 	while (1) {
   2111   1.84     lukem 		port++;
   2112   1.84     lukem 		if (port > curclass.portmax)
   2113   1.84     lukem 			port = curclass.portmin;
   2114   1.84     lukem 		else if (port == passiveport) {
   2115   1.84     lukem 			errno = EAGAIN;
   2116   1.84     lukem 			return (-1);
   2117   1.84     lukem 		}
   2118   1.84     lukem 		pasv_addr.su_port = htons(port);
   2119   1.84     lukem 		if (bind(pdata, (struct sockaddr *)&pasv_addr, len) == 0)
   2120   1.84     lukem 			break;
   2121   1.84     lukem 		if (errno != EADDRINUSE)
   2122   1.84     lukem 			return (-1);
   2123   1.84     lukem 	}
   2124   1.84     lukem 	passiveport = port;
   2125   1.84     lukem 	return (0);
   2126   1.84     lukem }
   2127   1.84     lukem 
   2128    1.1       cgd /*
   2129    1.1       cgd  * Note: a response of 425 is not mentioned as a possible response to
   2130    1.8   deraadt  *	the PASV command in RFC959. However, it has been blessed as
   2131    1.8   deraadt  *	a legitimate response by Jon Postel in a telephone conversation
   2132    1.1       cgd  *	with Rick Adams on 25 Jan 89.
   2133    1.1       cgd  */
   2134    1.8   deraadt void
   2135   1.88     lukem passive(void)
   2136    1.1       cgd {
   2137    1.1       cgd 	int len;
   2138    1.8   deraadt 	char *p, *a;
   2139    1.1       cgd 
   2140   1.72    itojun 	if (pdata >= 0)
   2141   1.72    itojun 		close(pdata);
   2142    1.1       cgd 	pdata = socket(AF_INET, SOCK_STREAM, 0);
   2143   1.23     lukem 	if (pdata < 0 || !logged_in) {
   2144    1.1       cgd 		perror_reply(425, "Can't open passive connection");
   2145    1.1       cgd 		return;
   2146    1.1       cgd 	}
   2147    1.1       cgd 	pasv_addr = ctrl_addr;
   2148   1.84     lukem 
   2149   1.84     lukem 	if (bind_pasv_addr() < 0)
   2150   1.84     lukem 		goto pasv_error;
   2151   1.67    itojun 	len = pasv_addr.su_len;
   2152    1.1       cgd 	if (getsockname(pdata, (struct sockaddr *) &pasv_addr, &len) < 0)
   2153    1.1       cgd 		goto pasv_error;
   2154    1.1       cgd 	if (listen(pdata, 1) < 0)
   2155    1.1       cgd 		goto pasv_error;
   2156   1.67    itojun 	a = (char *) &pasv_addr.su_sin.sin_addr;
   2157   1.67    itojun 	p = (char *) &pasv_addr.su_port;
   2158    1.1       cgd 
   2159    1.1       cgd #define UC(b) (((int) b) & 0xff)
   2160    1.1       cgd 
   2161    1.1       cgd 	reply(227, "Entering Passive Mode (%d,%d,%d,%d,%d,%d)", UC(a[0]),
   2162    1.1       cgd 		UC(a[1]), UC(a[2]), UC(a[3]), UC(p[0]), UC(p[1]));
   2163    1.1       cgd 	return;
   2164    1.1       cgd 
   2165   1.89     lukem  pasv_error:
   2166   1.67    itojun 	(void) close(pdata);
   2167   1.67    itojun 	pdata = -1;
   2168   1.67    itojun 	perror_reply(425, "Can't open passive connection");
   2169   1.67    itojun 	return;
   2170   1.67    itojun }
   2171   1.67    itojun 
   2172   1.67    itojun /*
   2173   1.67    itojun  * 228 Entering Long Passive Mode (af, hal, h1, h2, h3,..., pal, p1, p2...)
   2174   1.67    itojun  * 229 Entering Extended Passive Mode (|||port|)
   2175   1.67    itojun  */
   2176   1.67    itojun void
   2177   1.67    itojun long_passive(char *cmd, int pf)
   2178   1.67    itojun {
   2179   1.67    itojun 	int len;
   2180   1.84     lukem 	char *p, *a;
   2181   1.67    itojun 
   2182   1.67    itojun 	if (!logged_in) {
   2183   1.67    itojun 		syslog(LOG_NOTICE, "long passive but not logged in");
   2184   1.67    itojun 		reply(503, "Login with USER first.");
   2185   1.67    itojun 		return;
   2186   1.67    itojun 	}
   2187   1.67    itojun 
   2188   1.67    itojun 	if (pf != PF_UNSPEC) {
   2189   1.67    itojun 		if (ctrl_addr.su_family != pf) {
   2190   1.67    itojun 			switch (ctrl_addr.su_family) {
   2191   1.67    itojun 			case AF_INET:
   2192   1.67    itojun 				pf = 1;
   2193   1.67    itojun 				break;
   2194   1.67    itojun 			case AF_INET6:
   2195   1.67    itojun 				pf = 2;
   2196   1.67    itojun 				break;
   2197   1.67    itojun 			default:
   2198   1.67    itojun 				pf = 0;
   2199   1.67    itojun 				break;
   2200   1.67    itojun 			}
   2201   1.67    itojun 			/*
   2202   1.67    itojun 			 * XXX
   2203   1.67    itojun 			 * only EPRT/EPSV ready clients will understand this
   2204   1.67    itojun 			 */
   2205   1.67    itojun 			if (strcmp(cmd, "EPSV") == 0 && pf) {
   2206   1.67    itojun 				reply(522, "Network protocol mismatch, "
   2207   1.67    itojun 					    "use (%d)", pf);
   2208   1.67    itojun 			} else
   2209   1.67    itojun 				reply(501, "Network protocol mismatch"); /*XXX*/
   2210   1.67    itojun 
   2211   1.67    itojun 			return;
   2212   1.67    itojun 		}
   2213   1.67    itojun 	}
   2214   1.73     lukem 
   2215   1.72    itojun 	if (pdata >= 0)
   2216   1.72    itojun 		close(pdata);
   2217   1.67    itojun 	pdata = socket(ctrl_addr.su_family, SOCK_STREAM, 0);
   2218   1.67    itojun 	if (pdata < 0) {
   2219   1.67    itojun 		perror_reply(425, "Can't open passive connection");
   2220   1.67    itojun 		return;
   2221   1.67    itojun 	}
   2222   1.67    itojun 	pasv_addr = ctrl_addr;
   2223   1.84     lukem 	if (bind_pasv_addr() < 0)
   2224   1.67    itojun 		goto pasv_error;
   2225   1.67    itojun 	len = pasv_addr.su_len;
   2226   1.67    itojun 	if (getsockname(pdata, (struct sockaddr *) &pasv_addr, &len) < 0)
   2227   1.67    itojun 		goto pasv_error;
   2228   1.67    itojun 	if (listen(pdata, 1) < 0)
   2229   1.67    itojun 		goto pasv_error;
   2230   1.67    itojun 	p = (char *) &pasv_addr.su_port;
   2231   1.67    itojun 
   2232   1.67    itojun #define UC(b) (((int) b) & 0xff)
   2233   1.67    itojun 
   2234   1.67    itojun 	if (strcmp(cmd, "LPSV") == 0) {
   2235   1.67    itojun 		switch (pasv_addr.su_family) {
   2236   1.67    itojun 		case AF_INET:
   2237   1.67    itojun 			a = (char *) &pasv_addr.su_sin.sin_addr;
   2238   1.67    itojun 			reply(228, "Entering Long Passive Mode (%d,%d,%d,%d,%d,%d,%d,%d,%d)",
   2239   1.67    itojun 				4, 4, UC(a[0]), UC(a[1]), UC(a[2]), UC(a[3]),
   2240   1.67    itojun 				2, UC(p[0]), UC(p[1]));
   2241   1.67    itojun 			return;
   2242   1.67    itojun 		case AF_INET6:
   2243   1.67    itojun 			a = (char *) &pasv_addr.su_sin6.sin6_addr;
   2244   1.67    itojun 			reply(228, "Entering Long Passive Mode (%d,%d,%d,%d,%d,%d,%d,%d,%d,%d,%d,%d,%d,%d,%d,%d,%d,%d,%d,%d,%d)",
   2245   1.67    itojun 				6, 16,
   2246   1.67    itojun 				UC(a[0]), UC(a[1]), UC(a[2]), UC(a[3]),
   2247   1.67    itojun 				UC(a[4]), UC(a[5]), UC(a[6]), UC(a[7]),
   2248   1.67    itojun 				UC(a[8]), UC(a[9]), UC(a[10]), UC(a[11]),
   2249   1.67    itojun 				UC(a[12]), UC(a[13]), UC(a[14]), UC(a[15]),
   2250   1.67    itojun 				2, UC(p[0]), UC(p[1]));
   2251   1.67    itojun 			return;
   2252   1.67    itojun 		}
   2253   1.67    itojun #undef UC
   2254   1.67    itojun 	} else if (strcmp(cmd, "EPSV") == 0) {
   2255   1.67    itojun 		switch (pasv_addr.su_family) {
   2256   1.67    itojun 		case AF_INET:
   2257   1.67    itojun 		case AF_INET6:
   2258   1.67    itojun 			reply(229, "Entering Extended Passive Mode (|||%d|)",
   2259   1.67    itojun 			ntohs(pasv_addr.su_port));
   2260   1.67    itojun 			return;
   2261   1.67    itojun 		}
   2262   1.67    itojun 	} else {
   2263   1.67    itojun 		/* more proper error code? */
   2264   1.67    itojun 	}
   2265   1.67    itojun 
   2266   1.89     lukem  pasv_error:
   2267    1.1       cgd 	(void) close(pdata);
   2268    1.1       cgd 	pdata = -1;
   2269    1.1       cgd 	perror_reply(425, "Can't open passive connection");
   2270    1.1       cgd 	return;
   2271    1.1       cgd }
   2272    1.1       cgd 
   2273    1.1       cgd /*
   2274    1.1       cgd  * Generate unique name for file with basename "local".
   2275    1.1       cgd  * The file named "local" is already known to exist.
   2276    1.1       cgd  * Generates failure reply on error.
   2277   1.29       mrg  *
   2278   1.29       mrg  * XXX this function should under go changes similar to
   2279   1.29       mrg  * the mktemp(3)/mkstemp(3) changes.
   2280    1.1       cgd  */
   2281    1.8   deraadt static char *
   2282   1.88     lukem gunique(const char *local)
   2283    1.1       cgd {
   2284   1.82     lukem 	static char new[MAXPATHLEN];
   2285    1.1       cgd 	struct stat st;
   2286    1.8   deraadt 	char *cp;
   2287   1.73     lukem 	int count;
   2288    1.1       cgd 
   2289    1.8   deraadt 	cp = strrchr(local, '/');
   2290    1.1       cgd 	if (cp)
   2291    1.1       cgd 		*cp = '\0';
   2292    1.1       cgd 	if (stat(cp ? local : ".", &st) < 0) {
   2293    1.1       cgd 		perror_reply(553, cp ? local : ".");
   2294   1.57     lukem 		return (NULL);
   2295    1.1       cgd 	}
   2296    1.1       cgd 	if (cp)
   2297    1.1       cgd 		*cp = '/';
   2298    1.1       cgd 	for (count = 1; count < 100; count++) {
   2299   1.73     lukem 		(void)snprintf(new, sizeof(new) - 1, "%s.%d", local, count);
   2300    1.1       cgd 		if (stat(new, &st) < 0)
   2301    1.8   deraadt 			return (new);
   2302    1.1       cgd 	}
   2303    1.1       cgd 	reply(452, "Unique file name cannot be created.");
   2304    1.8   deraadt 	return (NULL);
   2305    1.1       cgd }
   2306    1.1       cgd 
   2307    1.1       cgd /*
   2308    1.1       cgd  * Format and send reply containing system error number.
   2309    1.1       cgd  */
   2310    1.8   deraadt void
   2311   1.88     lukem perror_reply(int code, const char *string)
   2312    1.1       cgd {
   2313   1.62     lukem 	int save_errno;
   2314    1.8   deraadt 
   2315   1.62     lukem 	save_errno = errno;
   2316    1.1       cgd 	reply(code, "%s: %s.", string, strerror(errno));
   2317   1.62     lukem 	errno = save_errno;
   2318    1.1       cgd }
   2319    1.1       cgd 
   2320    1.1       cgd static char *onefile[] = {
   2321    1.1       cgd 	"",
   2322    1.1       cgd 	0
   2323    1.1       cgd };
   2324    1.1       cgd 
   2325    1.8   deraadt void
   2326   1.88     lukem send_file_list(const char *whichf)
   2327    1.1       cgd {
   2328    1.1       cgd 	struct stat st;
   2329    1.1       cgd 	DIR *dirp = NULL;
   2330    1.1       cgd 	struct dirent *dir;
   2331    1.1       cgd 	FILE *dout = NULL;
   2332   1.62     lukem 	char **dirlist, *dirname, *p;
   2333    1.1       cgd 	int simple = 0;
   2334    1.8   deraadt 	int freeglob = 0;
   2335    1.8   deraadt 	glob_t gl;
   2336   1.62     lukem 	off_t b;
   2337   1.62     lukem 
   2338   1.25  christos #ifdef __GNUC__
   2339   1.25  christos 	(void) &dout;
   2340   1.25  christos 	(void) &dirlist;
   2341   1.25  christos 	(void) &simple;
   2342   1.25  christos 	(void) &freeglob;
   2343   1.25  christos #endif
   2344    1.1       cgd 
   2345   1.62     lukem 	p = NULL;
   2346    1.8   deraadt 	if (strpbrk(whichf, "~{[*?") != NULL) {
   2347   1.50    kleink 		int flags = GLOB_BRACE|GLOB_NOCHECK|GLOB_TILDE;
   2348    1.1       cgd 
   2349    1.8   deraadt 		memset(&gl, 0, sizeof(gl));
   2350    1.8   deraadt 		freeglob = 1;
   2351    1.8   deraadt 		if (glob(whichf, flags, 0, &gl)) {
   2352    1.8   deraadt 			reply(550, "not found");
   2353    1.8   deraadt 			goto out;
   2354    1.8   deraadt 		} else if (gl.gl_pathc == 0) {
   2355    1.1       cgd 			errno = ENOENT;
   2356    1.8   deraadt 			perror_reply(550, whichf);
   2357    1.8   deraadt 			goto out;
   2358    1.1       cgd 		}
   2359    1.8   deraadt 		dirlist = gl.gl_pathv;
   2360    1.1       cgd 	} else {
   2361   1.62     lukem 		p = xstrdup(whichf);
   2362   1.62     lukem 		onefile[0] = p;
   2363    1.1       cgd 		dirlist = onefile;
   2364    1.1       cgd 		simple = 1;
   2365    1.1       cgd 	}
   2366   1.62     lukem 					/* XXX: } for vi sm */
   2367    1.1       cgd 
   2368    1.1       cgd 	if (setjmp(urgcatch)) {
   2369    1.1       cgd 		transflag = 0;
   2370    1.8   deraadt 		goto out;
   2371    1.1       cgd 	}
   2372   1.20     lukem 	while ((dirname = *dirlist++) != NULL) {
   2373   1.33     lukem 		int trailingslash = 0;
   2374   1.33     lukem 
   2375    1.1       cgd 		if (stat(dirname, &st) < 0) {
   2376    1.1       cgd 			/*
   2377    1.1       cgd 			 * If user typed "ls -l", etc, and the client
   2378    1.1       cgd 			 * used NLST, do what the user meant.
   2379    1.1       cgd 			 */
   2380   1.71     lukem 			/* XXX: nuke this support? */
   2381    1.1       cgd 			if (dirname[0] == '-' && *dirlist == NULL &&
   2382    1.1       cgd 			    transflag == 0) {
   2383   1.71     lukem 				char *argv[] = { INTERNAL_LS, "", NULL };
   2384   1.71     lukem 
   2385   1.71     lukem 				argv[1] = dirname;
   2386   1.71     lukem 				retrieve(argv, dirname);
   2387    1.8   deraadt 				goto out;
   2388    1.1       cgd 			}
   2389    1.8   deraadt 			perror_reply(550, whichf);
   2390   1.95     lukem 			goto cleanup_send_file_list;
   2391    1.1       cgd 		}
   2392    1.1       cgd 
   2393    1.8   deraadt 		if (S_ISREG(st.st_mode)) {
   2394    1.1       cgd 			if (dout == NULL) {
   2395    1.1       cgd 				dout = dataconn("file list", (off_t)-1, "w");
   2396    1.1       cgd 				if (dout == NULL)
   2397    1.8   deraadt 					goto out;
   2398    1.1       cgd 				transflag++;
   2399    1.1       cgd 			}
   2400   1.62     lukem 			b = fprintf(dout, "%s%s\n", dirname,
   2401   1.62     lukem 			    type == TYPE_A ? "\r" : "");
   2402   1.62     lukem 			total_bytes += b;
   2403   1.62     lukem 			total_bytes_out += b;
   2404    1.1       cgd 			byte_count += strlen(dirname) + 1;
   2405    1.1       cgd 			continue;
   2406    1.8   deraadt 		} else if (!S_ISDIR(st.st_mode))
   2407    1.1       cgd 			continue;
   2408    1.1       cgd 
   2409   1.33     lukem 		if (dirname[strlen(dirname) - 1] == '/')
   2410   1.33     lukem 			trailingslash++;
   2411   1.33     lukem 
   2412    1.1       cgd 		if ((dirp = opendir(dirname)) == NULL)
   2413    1.1       cgd 			continue;
   2414    1.1       cgd 
   2415    1.1       cgd 		while ((dir = readdir(dirp)) != NULL) {
   2416   1.82     lukem 			char nbuf[MAXPATHLEN];
   2417    1.1       cgd 
   2418   1.93     lukem 			if (ISDOTDIR(dir->d_name) || ISDOTDOTDIR(dir->d_name))
   2419    1.1       cgd 				continue;
   2420    1.1       cgd 
   2421   1.33     lukem 			(void)snprintf(nbuf, sizeof(nbuf), "%s%s%s", dirname,
   2422   1.33     lukem 			    trailingslash ? "" : "/", dir->d_name);
   2423    1.1       cgd 
   2424    1.1       cgd 			/*
   2425   1.30     lukem 			 * We have to do a stat to ensure it's
   2426    1.1       cgd 			 * not a directory or special file.
   2427    1.1       cgd 			 */
   2428   1.71     lukem 			/* XXX: follow RFC959 and filter out non files ? */
   2429    1.1       cgd 			if (simple || (stat(nbuf, &st) == 0 &&
   2430    1.8   deraadt 			    S_ISREG(st.st_mode))) {
   2431   1.62     lukem 				char *p;
   2432   1.62     lukem 
   2433    1.1       cgd 				if (dout == NULL) {
   2434    1.1       cgd 					dout = dataconn("file list", (off_t)-1,
   2435    1.1       cgd 						"w");
   2436    1.1       cgd 					if (dout == NULL)
   2437    1.8   deraadt 						goto out;
   2438    1.1       cgd 					transflag++;
   2439    1.1       cgd 				}
   2440   1.62     lukem 				p = nbuf;
   2441    1.1       cgd 				if (nbuf[0] == '.' && nbuf[1] == '/')
   2442   1.62     lukem 					p = &nbuf[2];
   2443   1.62     lukem 				b = fprintf(dout, "%s%s\n", p,
   2444   1.62     lukem 				    type == TYPE_A ? "\r" : "");
   2445   1.62     lukem 				total_bytes += b;
   2446   1.62     lukem 				total_bytes_out += b;
   2447    1.1       cgd 				byte_count += strlen(nbuf) + 1;
   2448    1.1       cgd 			}
   2449    1.1       cgd 		}
   2450    1.1       cgd 		(void) closedir(dirp);
   2451    1.1       cgd 	}
   2452    1.1       cgd 
   2453    1.1       cgd 	if (dout == NULL)
   2454    1.1       cgd 		reply(550, "No files found.");
   2455    1.1       cgd 	else if (ferror(dout) != 0)
   2456    1.1       cgd 		perror_reply(550, "Data connection");
   2457    1.1       cgd 	else
   2458    1.1       cgd 		reply(226, "Transfer complete.");
   2459    1.1       cgd 
   2460   1.95     lukem  cleanup_send_file_list:
   2461    1.1       cgd 	transflag = 0;
   2462   1.95     lukem 	closedataconn(dout);
   2463   1.89     lukem  out:
   2464   1.62     lukem 	total_xfers++;
   2465   1.62     lukem 	total_xfers_out++;
   2466   1.62     lukem 	if (p)
   2467   1.62     lukem 		free(p);
   2468   1.62     lukem 	if (freeglob)
   2469    1.8   deraadt 		globfree(&gl);
   2470   1.34     lukem }
   2471   1.34     lukem 
   2472   1.34     lukem char *
   2473   1.88     lukem conffilename(const char *s)
   2474   1.34     lukem {
   2475   1.82     lukem 	static char filename[MAXPATHLEN];
   2476   1.34     lukem 
   2477   1.73     lukem 	if (*s == '/')
   2478   1.73     lukem 		strlcpy(filename, s, sizeof(filename));
   2479   1.73     lukem 	else
   2480   1.73     lukem 		(void)snprintf(filename, sizeof(filename), "%s/%s", confdir ,s);
   2481   1.73     lukem 	return (filename);
   2482   1.62     lukem }
   2483   1.62     lukem 
   2484   1.62     lukem /*
   2485   1.62     lukem  * logcmd --
   2486   1.62     lukem  *	based on the arguments, syslog a message:
   2487   1.62     lukem  *	 if bytes != -1		"<command> <file1> = <bytes> bytes"
   2488   1.62     lukem  *	 else if file2 != NULL	"<command> <file1> <file2>"
   2489   1.62     lukem  *	 else			"<command> <file1>"
   2490   1.62     lukem  *	if elapsed != NULL, append "in xxx.yyy seconds"
   2491   1.62     lukem  *	if error != NULL, append ": " + error
   2492   1.62     lukem  */
   2493   1.62     lukem void
   2494   1.88     lukem logcmd(const char *command, off_t bytes, const char *file1, const char *file2,
   2495   1.88     lukem 	const struct timeval *elapsed, const char *error)
   2496   1.62     lukem {
   2497   1.82     lukem 	char	buf[MAXPATHLEN * 2 + 100], realfile[MAXPATHLEN];
   2498   1.62     lukem 	const char *p;
   2499   1.62     lukem 	size_t	len;
   2500   1.62     lukem 
   2501   1.62     lukem 	if (logging <=1)
   2502   1.62     lukem 		return;
   2503   1.62     lukem 
   2504   1.62     lukem 	if ((p = realpath(file1, realfile)) == NULL) {
   2505   1.63     lukem #if 0	/* XXX: too noisy */
   2506   1.62     lukem 		syslog(LOG_WARNING, "realpath `%s' failed: %s",
   2507   1.62     lukem 		    realfile, strerror(errno));
   2508   1.62     lukem #endif
   2509   1.62     lukem 		p = file1;
   2510   1.62     lukem 	}
   2511   1.62     lukem 	len = snprintf(buf, sizeof(buf), "%s %s", command, p);
   2512   1.62     lukem 
   2513   1.62     lukem 	if (bytes != (off_t)-1) {
   2514   1.62     lukem 		len += snprintf(buf + len, sizeof(buf) - len,
   2515   1.65      ross 		    " = %qd byte%s", (qdfmt_t) bytes, PLURAL(bytes));
   2516   1.62     lukem 	} else if (file2 != NULL) {
   2517   1.62     lukem 		if ((p = realpath(file2, realfile)) == NULL) {
   2518   1.63     lukem #if 0	/* XXX: too noisy */
   2519   1.62     lukem 			syslog(LOG_WARNING, "realpath `%s' failed: %s",
   2520   1.62     lukem 			    realfile, strerror(errno));
   2521   1.62     lukem #endif
   2522   1.62     lukem 			p = file2;
   2523   1.62     lukem 		}
   2524   1.62     lukem 		len += snprintf(buf + len, sizeof(buf) - len, " %s", p);
   2525   1.62     lukem 	}
   2526   1.62     lukem 
   2527   1.62     lukem 	if (elapsed != NULL) {
   2528   1.62     lukem 		len += snprintf(buf + len, sizeof(buf) - len,
   2529   1.62     lukem 		    " in %ld.%.03d seconds", elapsed->tv_sec,
   2530   1.62     lukem 		    (int)(elapsed->tv_usec / 1000));
   2531   1.62     lukem 	}
   2532   1.62     lukem 
   2533   1.62     lukem 	if (error != NULL)
   2534   1.62     lukem 		len += snprintf(buf + len, sizeof(buf) - len, ": %s", error);
   2535   1.62     lukem 
   2536   1.62     lukem 	syslog(LOG_INFO, "%s", buf);
   2537   1.62     lukem }
   2538   1.62     lukem 
   2539   1.62     lukem char *
   2540   1.88     lukem xstrdup(const char *s)
   2541   1.62     lukem {
   2542   1.62     lukem 	char *new = strdup(s);
   2543   1.62     lukem 
   2544   1.62     lukem 	if (new == NULL)
   2545   1.62     lukem 		fatal("Local resource failure: malloc");
   2546   1.62     lukem 		/* NOTREACHED */
   2547   1.62     lukem 	return (new);
   2548   1.95     lukem }
   2549   1.95     lukem 
   2550   1.95     lukem /*
   2551   1.95     lukem  * As per fprintf(), but increment total_bytes and total_bytes_out,
   2552   1.95     lukem  * by the appropriate amount.
   2553   1.95     lukem  */
   2554   1.95     lukem void
   2555   1.95     lukem cprintf(FILE *fd, const char *fmt, ...)
   2556   1.95     lukem {
   2557   1.95     lukem 	off_t b;
   2558   1.95     lukem 	va_list ap;
   2559   1.95     lukem 
   2560   1.95     lukem 	va_start(ap, fmt);
   2561   1.95     lukem 	b = vfprintf(fd, fmt, ap);
   2562   1.95     lukem 	total_bytes += b;
   2563   1.95     lukem 	total_bytes_out += b;
   2564    1.1       cgd }
   2565