tftp.c revision 1.32 1 /* $NetBSD: tftp.c,v 1.32 2011/09/17 15:15:46 christos Exp $ */
2
3 /*
4 * Copyright (c) 1983, 1993
5 * The Regents of the University of California. All rights reserved.
6 *
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
9 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
15 * 3. Neither the name of the University nor the names of its contributors
16 * may be used to endorse or promote products derived from this software
17 * without specific prior written permission.
18 *
19 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
20 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
23 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29 * SUCH DAMAGE.
30 */
31
32 #include <sys/cdefs.h>
33 #ifndef lint
34 #if 0
35 static char sccsid[] = "@(#)tftp.c 8.1 (Berkeley) 6/6/93";
36 #else
37 __RCSID("$NetBSD: tftp.c,v 1.32 2011/09/17 15:15:46 christos Exp $");
38 #endif
39 #endif /* not lint */
40
41 /* Many bug fixes are from Jim Guyton <guyton@rand-unix> */
42
43 /*
44 * TFTP User Program -- Protocol Machines
45 */
46 #include <sys/types.h>
47 #include <sys/param.h>
48 #include <sys/socket.h>
49 #include <sys/stat.h>
50 #include <sys/time.h>
51
52 #include <netinet/in.h>
53
54 #include <arpa/tftp.h>
55 #include <arpa/inet.h>
56
57 #include <err.h>
58 #include <errno.h>
59 #include <setjmp.h>
60 #include <signal.h>
61 #include <stdio.h>
62 #include <stdlib.h>
63 #include <string.h>
64 #include <unistd.h>
65 #include <netdb.h>
66
67 #include "extern.h"
68 #include "tftpsubs.h"
69
70 char ackbuf[PKTSIZE];
71 int timeout;
72 jmp_buf toplevel;
73 jmp_buf timeoutbuf;
74
75 static void nak __P((int, struct sockaddr *));
76 static int makerequest __P((int, const char *, struct tftphdr *, const char *, off_t));
77 static void printstats __P((const char *, unsigned long));
78 static void startclock __P((void));
79 static void stopclock __P((void));
80 __dead static void timer __P((int));
81 static void tpacket __P((const char *, struct tftphdr *, int));
82 static int cmpport __P((struct sockaddr *, struct sockaddr *));
83
84 static void get_options(struct tftphdr *, int);
85 static int tftp_igmp_join(void);
86 static void tftp_igmp_leave(int);
87
88 static void
89 get_options(struct tftphdr *ap, int size)
90 {
91 unsigned long val;
92 char *opt, *endp, *nextopt, *valp;
93 int l;
94
95 size -= 2; /* skip over opcode */
96 opt = ap->th_stuff;
97 endp = opt + size - 1;
98 *endp = '\0';
99
100 while (opt < endp) {
101 int ismulticast;
102 l = strlen(opt) + 1;
103 valp = opt + l;
104 ismulticast = !strcasecmp(opt, "multicast");
105 if (valp < endp) {
106 val = strtoul(valp, NULL, 10);
107 l = strlen(valp) + 1;
108 nextopt = valp + l;
109 if (!ismulticast) {
110 if (val == ULONG_MAX && errno == ERANGE) {
111 /* Report illegal value */
112 opt = nextopt;
113 continue;
114 }
115 }
116 } else {
117 /* Badly formed OACK */
118 break;
119 }
120 if (strcmp(opt, "tsize") == 0) {
121 /* cool, but we'll ignore it */
122 } else if (strcmp(opt, "timeout") == 0) {
123 if (val >= 1 && val <= 255) {
124 rexmtval = val;
125 } else {
126 /* Report error? */
127 }
128 } else if (strcmp(opt, "blksize") == 0) {
129 if (val >= 8 && val <= MAXSEGSIZE) {
130 blksize = val;
131 } else {
132 /* Report error? */
133 }
134 } else if (ismulticast) {
135 char multicast[24];
136 char *pmulticast;
137 char *addr;
138
139 strlcpy(multicast, valp, sizeof(multicast));
140 pmulticast = multicast;
141 addr = strsep(&pmulticast, ",");
142 if (pmulticast == NULL)
143 continue; /* Report error? */
144 mcport = atoi(strsep(&pmulticast, ","));
145 if (pmulticast == NULL)
146 continue; /* Report error? */
147 mcmasterslave = atoi(pmulticast);
148 mcaddr = inet_addr(addr);
149 if (mcaddr == INADDR_NONE)
150 continue; /* Report error? */
151 } else {
152 /* unknown option */
153 }
154 opt = nextopt;
155 }
156 }
157
158 static int
159 tftp_igmp_join(void)
160 {
161 struct ip_mreq req;
162 struct sockaddr_in s;
163 int fd, rv;
164
165 memset(&req, 0, sizeof(struct ip_mreq));
166 req.imr_multiaddr.s_addr = mcaddr;
167 req.imr_interface.s_addr = INADDR_ANY;
168
169 fd = socket(PF_INET, SOCK_DGRAM, IPPROTO_UDP);
170 if (fd < 0) {
171 perror("socket");
172 return fd;
173 }
174
175 memset(&s, 0, sizeof(struct sockaddr_in));
176 s.sin_family = AF_INET;
177 s.sin_port = htons(mcport);
178 s.sin_len = sizeof(struct sockaddr_in);
179 rv = bind(fd, (struct sockaddr *)&s, sizeof(struct sockaddr_in));
180 if (rv < 0) {
181 perror("bind");
182 close(fd);
183 return rv;
184 }
185
186 rv = setsockopt(fd, IPPROTO_IP, IP_ADD_MEMBERSHIP, &req,
187 sizeof(struct ip_mreq));
188 if (rv < 0) {
189 perror("setsockopt");
190 close(fd);
191 return rv;
192 }
193
194 return fd;
195 }
196
197 static void
198 tftp_igmp_leave(int fd)
199 {
200 struct ip_mreq req;
201 int rv;
202
203 memset(&req, 0, sizeof(struct ip_mreq));
204 req.imr_multiaddr.s_addr = mcaddr;
205 req.imr_interface.s_addr = INADDR_ANY;
206
207 rv = setsockopt(fd, IPPROTO_IP, IP_DROP_MEMBERSHIP, &req,
208 sizeof(struct ip_mreq));
209 if (rv < 0)
210 perror("setsockopt");
211
212 close(fd);
213
214 return;
215 }
216
217 /*
218 * Send the requested file.
219 */
220 void
221 sendfile(int fd, const char *name, const char *mode)
222 {
223 struct tftphdr *ap; /* data and ack packets */
224 struct tftphdr *dp;
225 int j, n;
226 volatile unsigned int block;
227 volatile int size, convert;
228 volatile unsigned long amount;
229 struct sockaddr_storage from;
230 struct stat sbuf;
231 volatile off_t filesize = 0;
232 socklen_t fromlen;
233 FILE *file;
234 struct sockaddr_storage peer;
235 struct sockaddr_storage serv; /* valid server port number */
236
237 startclock(); /* start stat's clock */
238 dp = r_init(); /* reset fillbuf/read-ahead code */
239 ap = (struct tftphdr *)(void *)ackbuf;
240 if (tsize) {
241 if (fstat(fd, &sbuf) == 0) {
242 filesize = sbuf.st_size;
243 } else {
244 filesize = -1ULL;
245 }
246 }
247 file = fdopen(fd, "r");
248 convert = !strcmp(mode, "netascii");
249 block = 0;
250 amount = 0;
251 (void)memcpy(&peer, &peeraddr, (size_t)peeraddr.ss_len);
252 (void)memset(&serv, 0, sizeof(serv));
253
254 (void)signal(SIGALRM, timer);
255 do {
256 if (block == 0)
257 size = makerequest(WRQ, name, dp, mode, filesize) - 4;
258 else {
259 /* size = read(fd, dp->th_data, SEGSIZE); */
260 size = readit(file, &dp, blksize, convert);
261 if (size < 0) {
262 nak(errno + 100, (struct sockaddr *)(void *)&peer);
263 break;
264 }
265 dp->th_opcode = htons((u_short)DATA);
266 dp->th_block = htons((u_short)block);
267 }
268 timeout = 0;
269 (void) setjmp(timeoutbuf);
270 send_data:
271 if (trace)
272 tpacket("sent", dp, size + 4);
273 n = sendto(f, dp, (socklen_t)(size + 4), 0,
274 (struct sockaddr *)(void *)&peer, (socklen_t)peer.ss_len);
275 if (n != size + 4) {
276 warn("sendto");
277 goto abort;
278 }
279 if (block)
280 read_ahead(file, blksize, convert);
281 for ( ; ; ) {
282 (void)alarm(rexmtval);
283 do {
284 int curf;
285 fromlen = sizeof(from);
286 if (mcaddr != INADDR_NONE)
287 curf = mf;
288 else
289 curf = f;
290 n = recvfrom(curf, ackbuf, sizeof(ackbuf), 0,
291 (struct sockaddr *)(void *)&from, &fromlen);
292 } while (n <= 0);
293 (void)alarm(0);
294 if (n < 0) {
295 warn("recvfrom");
296 goto abort;
297 }
298 if (!serv.ss_family)
299 serv = from;
300 else if (!cmpport((struct sockaddr *)(void *)&serv,
301 (struct sockaddr *)(void *)&from)) {
302 warn("server port mismatch");
303 goto abort;
304 }
305 peer = from;
306 if (trace)
307 tpacket("received", ap, n);
308 /* should verify packet came from server */
309 ap->th_opcode = ntohs(ap->th_opcode);
310 if (ap->th_opcode == ERROR) {
311 (void)printf("Error code %d: %s\n", ap->th_code,
312 ap->th_msg);
313 goto abort;
314 }
315 if (ap->th_opcode == ACK) {
316 ap->th_block = ntohs(ap->th_block);
317
318 if (ap->th_block == 0) {
319 /*
320 * If the extended options are enabled,
321 * the server just refused 'em all.
322 * The only one that _really_
323 * matters is blksize, but we'll
324 * clear timeout and mcaddr, too.
325 */
326 blksize = def_blksize;
327 rexmtval = def_rexmtval;
328 mcaddr = INADDR_NONE;
329 }
330 if (ap->th_block == block) {
331 break;
332 }
333 /* On an error, try to synchronize
334 * both sides.
335 */
336 j = synchnet(f, blksize+4);
337 if (j && trace) {
338 (void)printf("discarded %d packets\n",
339 j);
340 }
341 if (ap->th_block == (block-1)) {
342 goto send_data;
343 }
344 }
345 if (ap->th_opcode == OACK) {
346 if (block == 0) {
347 blksize = def_blksize;
348 rexmtval = def_rexmtval;
349 mcaddr = INADDR_NONE;
350 get_options(ap, n);
351 break;
352 }
353 }
354 }
355 if (block > 0)
356 amount += size;
357 block++;
358 } while ((size_t)size == blksize || block == 1);
359 abort:
360 (void)fclose(file);
361 stopclock();
362 if (amount > 0)
363 printstats("Sent", amount);
364 }
365
366 /*
367 * Receive a file.
368 */
369 void
370 recvfile(int fd, const char *name, const char *mode)
371 {
372 struct tftphdr *ap;
373 struct tftphdr *dp;
374 int j, n;
375 volatile int oack = 0;
376 volatile unsigned int block;
377 volatile int size, firsttrip;
378 volatile unsigned long amount;
379 struct sockaddr_storage from;
380 socklen_t fromlen;
381 volatile size_t readlen;
382 FILE *file;
383 volatile int convert; /* true if converting crlf -> lf */
384 struct sockaddr_storage peer;
385 struct sockaddr_storage serv; /* valid server port number */
386
387 startclock();
388 dp = w_init();
389 ap = (struct tftphdr *)(void *)ackbuf;
390 file = fdopen(fd, "w");
391 convert = !strcmp(mode, "netascii");
392 block = 1;
393 firsttrip = 1;
394 amount = 0;
395 (void)memcpy(&peer, &peeraddr, (size_t)peeraddr.ss_len);
396 (void)memset(&serv, 0, sizeof(serv));
397
398 (void)signal(SIGALRM, timer);
399 do {
400 if (firsttrip) {
401 size = makerequest(RRQ, name, ap, mode, (off_t)0);
402 readlen = PKTSIZE;
403 firsttrip = 0;
404 } else {
405 ap->th_opcode = htons((u_short)ACK);
406 ap->th_block = htons((u_short)(block));
407 readlen = blksize+4;
408 size = 4;
409 block++;
410 }
411 timeout = 0;
412 (void) setjmp(timeoutbuf);
413 send_ack:
414 if (trace)
415 tpacket("sent", ap, size);
416 if (sendto(f, ackbuf, (socklen_t)size, 0,
417 (struct sockaddr *)(void *)&peer,
418 (socklen_t)peer.ss_len) != size) {
419 (void)alarm(0);
420 warn("sendto");
421 goto abort;
422 }
423 skip_ack:
424 if (write_behind(file, convert) == -1)
425 goto abort;
426 for ( ; ; ) {
427 (void)alarm(rexmtval);
428 do {
429 int readfd;
430 if (mf > 0)
431 readfd = mf;
432 else
433 readfd = f;
434 fromlen = sizeof(from);
435 n = recvfrom(readfd, dp, readlen, 0,
436 (struct sockaddr *)(void *)&from, &fromlen);
437 } while (n <= 0);
438 (void)alarm(0);
439 if (n < 0) {
440 warn("recvfrom");
441 goto abort;
442 }
443 if (!serv.ss_family)
444 serv = from;
445 else if (!cmpport((struct sockaddr *)(void *)&serv,
446 (struct sockaddr *)(void *)&from)) {
447 warn("server port mismatch");
448 goto abort;
449 }
450 peer = from;
451 if (trace)
452 tpacket("received", dp, n);
453 /* should verify client address */
454 dp->th_opcode = ntohs(dp->th_opcode);
455 if (dp->th_opcode == ERROR) {
456 (void)printf("Error code %d: %s\n", dp->th_code,
457 dp->th_msg);
458 goto abort;
459 }
460 if (dp->th_opcode == DATA) {
461 dp->th_block = ntohs(dp->th_block);
462
463 if (dp->th_block == 1 && !oack) {
464 /* no OACK, revert to defaults */
465 blksize = def_blksize;
466 rexmtval = def_rexmtval;
467 }
468 if (dp->th_block == block) {
469 break; /* have next packet */
470 }
471 /* On an error, try to synchronize
472 * both sides.
473 */
474 j = synchnet(f, blksize);
475 if (j && trace) {
476 (void)printf("discarded %d packets\n", j);
477 }
478 if (dp->th_block == (block-1)) {
479 goto send_ack; /* resend ack */
480 }
481 }
482 if (dp->th_opcode == OACK) {
483 if (block == 1) {
484 oack = 1;
485 blksize = def_blksize;
486 rexmtval = def_rexmtval;
487 get_options(dp, n);
488 ap->th_opcode = htons(ACK);
489 ap->th_block = 0;
490 readlen = blksize+4;
491 size = 4;
492 if (mcaddr != INADDR_NONE) {
493 mf = tftp_igmp_join();
494 if (mf < 0)
495 goto abort;
496 if (mcmasterslave == 0)
497 goto skip_ack;
498 }
499 goto send_ack;
500 }
501 }
502 }
503 /* size = write(fd, dp->th_data, n - 4); */
504 size = writeit(file, &dp, n - 4, convert);
505 if (size < 0) {
506 nak(errno + 100, (struct sockaddr *)(void *)&peer);
507 break;
508 }
509 amount += size;
510 } while ((size_t)size == blksize);
511 abort: /* ok to ack, since user */
512 ap->th_opcode = htons((u_short)ACK); /* has seen err msg */
513 ap->th_block = htons((u_short)block);
514 if (mcaddr != INADDR_NONE && mf >= 0) {
515 tftp_igmp_leave(mf);
516 mf = -1;
517 }
518 (void) sendto(f, ackbuf, 4, 0, (struct sockaddr *)(void *)&peer,
519 (socklen_t)peer.ss_len);
520 /*
521 * flush last buffer
522 * We do not check for failure because last buffer
523 * can be empty, thus returning an error.
524 * XXX maybe we should fix 'write_behind' instead.
525 */
526 (void)write_behind(file, convert);
527 (void)fclose(file);
528 stopclock();
529 if (amount > 0)
530 printstats("Received", amount);
531 }
532
533 static int
534 makerequest(request, name, tp, mode, filesize)
535 int request;
536 const char *name;
537 struct tftphdr *tp;
538 const char *mode;
539 off_t filesize;
540 {
541 char *cp;
542
543 tp->th_opcode = htons((u_short)request);
544 #ifndef __SVR4
545 cp = tp->th_stuff;
546 #else
547 cp = (void *)&tp->th_stuff;
548 #endif
549 (void)strcpy(cp, name);
550 cp += strlen(name);
551 *cp++ = '\0';
552 (void)strcpy(cp, mode);
553 cp += strlen(mode);
554 *cp++ = '\0';
555 if (tsize) {
556 (void)strcpy(cp, "tsize");
557 cp += strlen(cp);
558 *cp++ = '\0';
559 (void)sprintf(cp, "%lu", (unsigned long) filesize);
560 cp += strlen(cp);
561 *cp++ = '\0';
562 }
563 if (tout) {
564 (void)strcpy(cp, "timeout");
565 cp += strlen(cp);
566 *cp++ = '\0';
567 (void)sprintf(cp, "%d", rexmtval);
568 cp += strlen(cp);
569 *cp++ = '\0';
570 }
571 if (blksize != SEGSIZE) {
572 (void)strcpy(cp, "blksize");
573 cp += strlen(cp);
574 *cp++ = '\0';
575 (void)sprintf(cp, "%zd", blksize);
576 cp += strlen(cp);
577 *cp++ = '\0';
578 }
579 return (cp - (char *)(void *)tp);
580 }
581
582 const struct errmsg {
583 int e_code;
584 const char *e_msg;
585 } errmsgs[] = {
586 { EUNDEF, "Undefined error code" },
587 { ENOTFOUND, "File not found" },
588 { EACCESS, "Access violation" },
589 { ENOSPACE, "Disk full or allocation exceeded" },
590 { EBADOP, "Illegal TFTP operation" },
591 { EBADID, "Unknown transfer ID" },
592 { EEXISTS, "File already exists" },
593 { ENOUSER, "No such user" },
594 { EOPTNEG, "Option negotiation failed" },
595 { -1, 0 }
596 };
597
598 /*
599 * Send a nak packet (error message).
600 * Error code passed in is one of the
601 * standard TFTP codes, or a UNIX errno
602 * offset by 100.
603 */
604 static void
605 nak(error, peer)
606 int error;
607 struct sockaddr *peer;
608 {
609 const struct errmsg *pe;
610 struct tftphdr *tp;
611 int length;
612 size_t msglen;
613
614 tp = (struct tftphdr *)(void *)ackbuf;
615 tp->th_opcode = htons((u_short)ERROR);
616 msglen = sizeof(ackbuf) - (&tp->th_msg[0] - ackbuf);
617 for (pe = errmsgs; pe->e_code >= 0; pe++)
618 if (pe->e_code == error)
619 break;
620 if (pe->e_code < 0) {
621 tp->th_code = EUNDEF;
622 (void)strlcpy(tp->th_msg, strerror(error - 100), msglen);
623 } else {
624 tp->th_code = htons((u_short)error);
625 (void)strlcpy(tp->th_msg, pe->e_msg, msglen);
626 }
627 length = strlen(tp->th_msg);
628 msglen = &tp->th_msg[length + 1] - ackbuf;
629 if (trace)
630 tpacket("sent", tp, (int)msglen);
631 if ((size_t)sendto(f, ackbuf, msglen, 0, peer, (socklen_t)peer->sa_len) != msglen)
632 warn("nak");
633 }
634
635 static void
636 tpacket(s, tp, n)
637 const char *s;
638 struct tftphdr *tp;
639 int n;
640 {
641 static const char *opcodes[] =
642 { "#0", "RRQ", "WRQ", "DATA", "ACK", "ERROR", "OACK" };
643 char *cp, *file, *endp, *opt = NULL;
644 const char *spc;
645 u_short op = ntohs(tp->th_opcode);
646 int i, o;
647
648 if (op < RRQ || op > OACK)
649 (void)printf("%s opcode=%x ", s, op);
650 else
651 (void)printf("%s %s ", s, opcodes[op]);
652 switch (op) {
653
654 case RRQ:
655 case WRQ:
656 n -= 2;
657 #ifndef __SVR4
658 cp = tp->th_stuff;
659 #else
660 cp = (void *) &tp->th_stuff;
661 #endif
662 endp = cp + n - 1;
663 if (*endp != '\0') { /* Shouldn't happen, but... */
664 *endp = '\0';
665 }
666 file = cp;
667 cp = strchr(cp, '\0') + 1;
668 (void)printf("<file=%s, mode=%s", file, cp);
669 cp = strchr(cp, '\0') + 1;
670 o = 0;
671 while (cp < endp) {
672 i = strlen(cp) + 1;
673 if (o) {
674 (void)printf(", %s=%s", opt, cp);
675 } else {
676 opt = cp;
677 }
678 o = (o+1) % 2;
679 cp += i;
680 }
681 (void)printf(">\n");
682 break;
683
684 case DATA:
685 (void)printf("<block=%d, %d bytes>\n", ntohs(tp->th_block), n - 4);
686 break;
687
688 case ACK:
689 (void)printf("<block=%d>\n", ntohs(tp->th_block));
690 break;
691
692 case ERROR:
693 (void)printf("<code=%d, msg=%s>\n", ntohs(tp->th_code), tp->th_msg);
694 break;
695
696 case OACK:
697 o = 0;
698 n -= 2;
699 cp = tp->th_stuff;
700 endp = cp + n - 1;
701 if (*endp != '\0') { /* Shouldn't happen, but... */
702 *endp = '\0';
703 }
704 (void)printf("<");
705 spc = "";
706 while (cp < endp) {
707 i = strlen(cp) + 1;
708 if (o) {
709 (void)printf("%s%s=%s", spc, opt, cp);
710 spc = ", ";
711 } else {
712 opt = cp;
713 }
714 o = (o+1) % 2;
715 cp += i;
716 }
717 (void)printf(">\n");
718 break;
719 }
720 }
721
722 struct timeval tstart;
723 struct timeval tstop;
724
725 static void
726 startclock()
727 {
728
729 (void)gettimeofday(&tstart, NULL);
730 }
731
732 static void
733 stopclock()
734 {
735
736 (void)gettimeofday(&tstop, NULL);
737 }
738
739 static void
740 printstats(direction, amount)
741 const char *direction;
742 unsigned long amount;
743 {
744 double delta;
745
746 /* compute delta in 1/10's second units */
747 delta = ((tstop.tv_sec*10.)+(tstop.tv_usec/100000)) -
748 ((tstart.tv_sec*10.)+(tstart.tv_usec/100000));
749 delta = delta/10.; /* back to seconds */
750 (void)printf("%s %ld bytes in %.1f seconds", direction, amount, delta);
751 if (verbose)
752 (void)printf(" [%.0f bits/sec]", (amount*8.)/delta);
753 (void)putchar('\n');
754 }
755
756 static void
757 /*ARGSUSED*/
758 timer(sig)
759 int sig;
760 {
761
762 timeout += rexmtval;
763 if (timeout >= maxtimeout) {
764 (void)printf("Transfer timed out.\n");
765 longjmp(toplevel, -1);
766 }
767 longjmp(timeoutbuf, 1);
768 }
769
770 static int
771 cmpport(sa, sb)
772 struct sockaddr *sa;
773 struct sockaddr *sb;
774 {
775 char a[NI_MAXSERV], b[NI_MAXSERV];
776
777 if (getnameinfo(sa, (socklen_t)sa->sa_len, NULL, 0, a, sizeof(a), NI_NUMERICSERV))
778 return 0;
779 if (getnameinfo(sb, (socklen_t)sb->sa_len, NULL, 0, b, sizeof(b), NI_NUMERICSERV))
780 return 0;
781 if (strcmp(a, b) != 0)
782 return 0;
783
784 return 1;
785 }
786