Coverage Report

Created: 2025-08-29 07:11

/src/PROJ/curl/lib/ftp.c
Line
Count
Source (jump to first uncovered line)
1
/***************************************************************************
2
 *                                  _   _ ____  _
3
 *  Project                     ___| | | |  _ \| |
4
 *                             / __| | | | |_) | |
5
 *                            | (__| |_| |  _ <| |___
6
 *                             \___|\___/|_| \_\_____|
7
 *
8
 * Copyright (C) Daniel Stenberg, <daniel@haxx.se>, et al.
9
 *
10
 * This software is licensed as described in the file COPYING, which
11
 * you should have received as part of this distribution. The terms
12
 * are also available at https://curl.se/docs/copyright.html.
13
 *
14
 * You may opt to use, copy, modify, merge, publish, distribute and/or sell
15
 * copies of the Software, and permit persons to whom the Software is
16
 * furnished to do so, under the terms of the COPYING file.
17
 *
18
 * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
19
 * KIND, either express or implied.
20
 *
21
 * SPDX-License-Identifier: curl
22
 *
23
 ***************************************************************************/
24
25
#include "curl_setup.h"
26
27
#ifndef CURL_DISABLE_FTP
28
29
#ifdef HAVE_NETINET_IN_H
30
#include <netinet/in.h>
31
#endif
32
#ifdef HAVE_ARPA_INET_H
33
#include <arpa/inet.h>
34
#endif
35
#ifdef HAVE_NETDB_H
36
#include <netdb.h>
37
#endif
38
#ifdef __VMS
39
#include <in.h>
40
#include <inet.h>
41
#endif
42
43
#include <curl/curl.h>
44
#include "urldata.h"
45
#include "sendf.h"
46
#include "if2ip.h"
47
#include "hostip.h"
48
#include "progress.h"
49
#include "transfer.h"
50
#include "escape.h"
51
#include "http.h" /* for HTTP proxy tunnel stuff */
52
#include "ftp.h"
53
#include "fileinfo.h"
54
#include "ftplistparser.h"
55
#include "curl_range.h"
56
#include "curl_krb5.h"
57
#include "strcase.h"
58
#include "vtls/vtls.h"
59
#include "cfilters.h"
60
#include "cf-socket.h"
61
#include "connect.h"
62
#include "strerror.h"
63
#include "curlx/inet_ntop.h"
64
#include "curlx/inet_pton.h"
65
#include "select.h"
66
#include "parsedate.h" /* for the week day and month names */
67
#include "sockaddr.h" /* required for Curl_sockaddr_storage */
68
#include "multiif.h"
69
#include "url.h"
70
#include "speedcheck.h"
71
#include "curlx/warnless.h"
72
#include "http_proxy.h"
73
#include "socks.h"
74
#include "strdup.h"
75
#include "curlx/strparse.h"
76
/* The last 3 #include files should be in this order */
77
#include "curl_printf.h"
78
#include "curl_memory.h"
79
#include "memdebug.h"
80
81
#ifndef NI_MAXHOST
82
#define NI_MAXHOST 1025
83
#endif
84
#ifndef INET_ADDRSTRLEN
85
#define INET_ADDRSTRLEN 16
86
#endif
87
88
/* macro to check for a three-digit ftp status code at the start of the
89
   given string */
90
0
#define STATUSCODE(line) (ISDIGIT(line[0]) && ISDIGIT(line[1]) &&       \
91
0
                          ISDIGIT(line[2]))
92
93
/* macro to check for the last line in an FTP server response */
94
0
#define LASTLINE(line) (STATUSCODE(line) && (' ' == line[3]))
95
96
#ifdef CURL_DISABLE_VERBOSE_STRINGS
97
#define ftp_pasv_verbose(a,b,c,d)  Curl_nop_stmt
98
#define FTP_CSTATE(c)   ((void)(c), "")
99
#else /* CURL_DISABLE_VERBOSE_STRINGS */
100
  /* for tracing purposes */
101
static const char * const ftp_state_names[]={
102
  "STOP",
103
  "WAIT220",
104
  "AUTH",
105
  "USER",
106
  "PASS",
107
  "ACCT",
108
  "PBSZ",
109
  "PROT",
110
  "CCC",
111
  "PWD",
112
  "SYST",
113
  "NAMEFMT",
114
  "QUOTE",
115
  "RETR_PREQUOTE",
116
  "STOR_PREQUOTE",
117
  "LIST_PREQUOTE",
118
  "POSTQUOTE",
119
  "CWD",
120
  "MKD",
121
  "MDTM",
122
  "TYPE",
123
  "LIST_TYPE",
124
  "RETR_LIST_TYPE",
125
  "RETR_TYPE",
126
  "STOR_TYPE",
127
  "SIZE",
128
  "RETR_SIZE",
129
  "STOR_SIZE",
130
  "REST",
131
  "RETR_REST",
132
  "PORT",
133
  "PRET",
134
  "PASV",
135
  "LIST",
136
  "RETR",
137
  "STOR",
138
  "QUIT"
139
};
140
#define FTP_CSTATE(ftpc)   ((ftpc)? ftp_state_names[(ftpc)->state] : "???")
141
142
#endif /* !CURL_DISABLE_VERBOSE_STRINGS */
143
144
/* This is the ONLY way to change FTP state! */
145
static void _ftp_state(struct Curl_easy *data,
146
                       struct ftp_conn *ftpc,
147
                       ftpstate newstate
148
#ifdef DEBUGBUILD
149
                       , int lineno
150
#endif
151
  )
152
0
{
153
#ifdef CURL_DISABLE_VERBOSE_STRINGS
154
  (void)data;
155
#ifdef DEBUGBUILD
156
  (void)lineno;
157
#endif
158
#else /* CURL_DISABLE_VERBOSE_STRINGS */
159
0
  if(ftpc->state != newstate)
160
#ifdef DEBUGBUILD
161
    CURL_TRC_FTP(data, "[%s] -> [%s] (line %d)", FTP_CSTATE(ftpc),
162
                 ftp_state_names[newstate], lineno);
163
#else
164
0
    CURL_TRC_FTP(data, "[%s] -> [%s]", FTP_CSTATE(ftpc),
165
0
                 ftp_state_names[newstate]);
166
0
#endif
167
0
#endif /* !CURL_DISABLE_VERBOSE_STRINGS */
168
169
0
  ftpc->state = newstate;
170
0
}
171
172
173
/* Local API functions */
174
#ifndef DEBUGBUILD
175
0
#define ftp_state(x,y,z) _ftp_state(x,y,z)
176
#else /* !DEBUGBUILD */
177
#define ftp_state(x,y,z) _ftp_state(x,y,z,__LINE__)
178
#endif /* DEBUGBUILD */
179
180
static CURLcode ftp_sendquote(struct Curl_easy *data,
181
                              struct ftp_conn *ftpc,
182
                              struct curl_slist *quote);
183
static CURLcode ftp_quit(struct Curl_easy *data, struct ftp_conn *ftpc);
184
static CURLcode ftp_parse_url_path(struct Curl_easy *data,
185
                                   struct ftp_conn *ftpc,
186
                                   struct FTP *ftp);
187
static CURLcode ftp_regular_transfer(struct Curl_easy *data,
188
                                     struct ftp_conn *ftpc,
189
                                     struct FTP *ftp,
190
                                     bool *done);
191
#ifndef CURL_DISABLE_VERBOSE_STRINGS
192
static void ftp_pasv_verbose(struct Curl_easy *data,
193
                             struct Curl_addrinfo *ai,
194
                             char *newhost, /* ASCII version */
195
                             int port);
196
#endif
197
static CURLcode ftp_state_mdtm(struct Curl_easy *data,
198
                               struct ftp_conn *ftpc,
199
                               struct FTP *ftp);
200
static CURLcode ftp_state_quote(struct Curl_easy *data,
201
                                struct ftp_conn *ftpc,
202
                                struct FTP *ftp,
203
                                bool init, ftpstate instate);
204
static CURLcode ftp_nb_type(struct Curl_easy *data,
205
                            struct ftp_conn *ftpc,
206
                            struct FTP *ftp,
207
                            bool ascii, ftpstate newstate);
208
static int ftp_need_type(struct ftp_conn *ftpc, bool ascii);
209
static CURLcode ftp_do(struct Curl_easy *data, bool *done);
210
static CURLcode ftp_done(struct Curl_easy *data,
211
                         CURLcode, bool premature);
212
static CURLcode ftp_connect(struct Curl_easy *data, bool *done);
213
static CURLcode ftp_disconnect(struct Curl_easy *data,
214
                               struct connectdata *conn, bool dead_connection);
215
static CURLcode ftp_do_more(struct Curl_easy *data, int *completed);
216
static CURLcode ftp_multi_statemach(struct Curl_easy *data, bool *done);
217
static CURLcode ftp_pollset(struct Curl_easy *data,
218
                            struct easy_pollset *ps);
219
static CURLcode ftp_domore_pollset(struct Curl_easy *data,
220
                                   struct easy_pollset *ps);
221
static CURLcode ftp_doing(struct Curl_easy *data,
222
                          bool *dophase_done);
223
static CURLcode ftp_setup_connection(struct Curl_easy *data,
224
                                     struct connectdata *conn);
225
static CURLcode init_wc_data(struct Curl_easy *data,
226
                             struct ftp_conn *ftpc,
227
                             struct FTP *ftp);
228
static CURLcode wc_statemach(struct Curl_easy *data,
229
                             struct ftp_conn *ftpc,
230
                             struct FTP *ftp);
231
static void wc_data_dtor(void *ptr);
232
static CURLcode ftp_state_retr(struct Curl_easy *data,
233
                               struct ftp_conn *ftpc,
234
                               struct FTP *ftp,
235
                               curl_off_t filesize);
236
static CURLcode ftp_readresp(struct Curl_easy *data,
237
                             struct ftp_conn *ftpc,
238
                             int sockindex,
239
                             struct pingpong *pp,
240
                             int *ftpcode,
241
                             size_t *size);
242
static CURLcode ftp_dophase_done(struct Curl_easy *data,
243
                                 struct ftp_conn *ftpc,
244
                                 struct FTP *ftp,
245
                                 bool connected);
246
247
/*
248
 * FTP protocol handler.
249
 */
250
251
const struct Curl_handler Curl_handler_ftp = {
252
  "ftp",                           /* scheme */
253
  ftp_setup_connection,            /* setup_connection */
254
  ftp_do,                          /* do_it */
255
  ftp_done,                        /* done */
256
  ftp_do_more,                     /* do_more */
257
  ftp_connect,                     /* connect_it */
258
  ftp_multi_statemach,             /* connecting */
259
  ftp_doing,                       /* doing */
260
  ftp_pollset,                     /* proto_pollset */
261
  ftp_pollset,                     /* doing_pollset */
262
  ftp_domore_pollset,              /* domore_pollset */
263
  ZERO_NULL,                       /* perform_pollset */
264
  ftp_disconnect,                  /* disconnect */
265
  ZERO_NULL,                       /* write_resp */
266
  ZERO_NULL,                       /* write_resp_hd */
267
  ZERO_NULL,                       /* connection_check */
268
  ZERO_NULL,                       /* attach connection */
269
  ZERO_NULL,                       /* follow */
270
  PORT_FTP,                        /* defport */
271
  CURLPROTO_FTP,                   /* protocol */
272
  CURLPROTO_FTP,                   /* family */
273
  PROTOPT_DUAL | PROTOPT_CLOSEACTION | PROTOPT_NEEDSPWD |
274
  PROTOPT_NOURLQUERY | PROTOPT_PROXY_AS_HTTP |
275
  PROTOPT_WILDCARD /* flags */
276
};
277
278
279
#ifdef USE_SSL
280
/*
281
 * FTPS protocol handler.
282
 */
283
284
const struct Curl_handler Curl_handler_ftps = {
285
  "ftps",                          /* scheme */
286
  ftp_setup_connection,            /* setup_connection */
287
  ftp_do,                          /* do_it */
288
  ftp_done,                        /* done */
289
  ftp_do_more,                     /* do_more */
290
  ftp_connect,                     /* connect_it */
291
  ftp_multi_statemach,             /* connecting */
292
  ftp_doing,                       /* doing */
293
  ftp_pollset,                     /* proto_pollset */
294
  ftp_pollset,                     /* doing_pollset */
295
  ftp_domore_pollset,              /* domore_pollset */
296
  ZERO_NULL,                       /* perform_pollset */
297
  ftp_disconnect,                  /* disconnect */
298
  ZERO_NULL,                       /* write_resp */
299
  ZERO_NULL,                       /* write_resp_hd */
300
  ZERO_NULL,                       /* connection_check */
301
  ZERO_NULL,                       /* attach connection */
302
  ZERO_NULL,                       /* follow */
303
  PORT_FTPS,                       /* defport */
304
  CURLPROTO_FTPS,                  /* protocol */
305
  CURLPROTO_FTP,                   /* family */
306
  PROTOPT_SSL | PROTOPT_DUAL | PROTOPT_CLOSEACTION |
307
  PROTOPT_NEEDSPWD | PROTOPT_NOURLQUERY | PROTOPT_WILDCARD /* flags */
308
};
309
#endif
310
311
static void close_secondarysocket(struct Curl_easy *data,
312
                                  struct ftp_conn *ftpc)
313
0
{
314
0
  (void)ftpc;
315
0
  CURL_TRC_FTP(data, "[%s] closing DATA connection", FTP_CSTATE(ftpc));
316
0
  Curl_conn_close(data, SECONDARYSOCKET);
317
0
  Curl_conn_cf_discard_all(data, data->conn, SECONDARYSOCKET);
318
0
}
319
320
/*
321
 * NOTE: back in the old days, we added code in the FTP code that made NOBODY
322
 * requests on files respond with headers passed to the client/stdout that
323
 * looked like HTTP ones.
324
 *
325
 * This approach is not elegant, it causes confusion and is error-prone. It is
326
 * subject for removal at the next (or at least a future) soname bump. Until
327
 * then you can test the effects of the removal by undefining the following
328
 * define named CURL_FTP_HTTPSTYLE_HEAD.
329
 */
330
#define CURL_FTP_HTTPSTYLE_HEAD 1
331
332
static void freedirs(struct ftp_conn *ftpc)
333
0
{
334
0
  Curl_safefree(ftpc->dirs);
335
0
  ftpc->dirdepth = 0;
336
0
  Curl_safefree(ftpc->rawpath);
337
0
  ftpc->file = NULL;
338
0
  Curl_safefree(ftpc->newhost);
339
0
}
340
341
#ifdef CURL_PREFER_LF_LINEENDS
342
/*
343
 * Lineend Conversions
344
 * On ASCII transfers, e.g. directory listings, we might get lines
345
 * ending in '\r\n' and we prefer just '\n'.
346
 * We might also get a lonely '\r' which we convert into a '\n'.
347
 */
348
struct ftp_cw_lc_ctx {
349
  struct Curl_cwriter super;
350
  bool newline_pending;
351
};
352
353
static CURLcode ftp_cw_lc_write(struct Curl_easy *data,
354
                                struct Curl_cwriter *writer, int type,
355
                                const char *buf, size_t blen)
356
0
{
357
0
  static const char nl = '\n';
358
0
  struct ftp_cw_lc_ctx *ctx = writer->ctx;
359
0
  struct ftp_conn *ftpc = Curl_conn_meta_get(data->conn, CURL_META_FTP_CONN);
360
361
0
  if(!ftpc)
362
0
    return CURLE_FAILED_INIT;
363
364
0
  if(!(type & CLIENTWRITE_BODY) || ftpc->transfertype != 'A')
365
0
    return Curl_cwriter_write(data, writer->next, type, buf, blen);
366
367
  /* ASCII mode BODY data, convert lineends */
368
0
  while(blen) {
369
    /* do not pass EOS when writing parts */
370
0
    int chunk_type = (type & ~CLIENTWRITE_EOS);
371
0
    const char *cp;
372
0
    size_t chunk_len;
373
0
    CURLcode result;
374
375
0
    if(ctx->newline_pending) {
376
0
      if(buf[0] != '\n') {
377
        /* previous chunk ended in '\r' and we do not see a '\n' in this one,
378
         * need to write a newline. */
379
0
        result = Curl_cwriter_write(data, writer->next, chunk_type, &nl, 1);
380
0
        if(result)
381
0
          return result;
382
0
      }
383
      /* either we just wrote the newline or it is part of the next
384
       * chunk of bytes we write. */
385
0
      ctx->newline_pending = FALSE;
386
0
    }
387
388
0
    cp = memchr(buf, '\r', blen);
389
0
    if(!cp)
390
0
      break;
391
392
    /* write the bytes before the '\r', excluding the '\r' */
393
0
    chunk_len = cp - buf;
394
0
    if(chunk_len) {
395
0
      result = Curl_cwriter_write(data, writer->next, chunk_type,
396
0
                                  buf, chunk_len);
397
0
      if(result)
398
0
        return result;
399
0
    }
400
    /* skip the '\r', we now have a newline pending */
401
0
    buf = cp + 1;
402
0
    blen = blen - chunk_len - 1;
403
0
    ctx->newline_pending = TRUE;
404
0
  }
405
406
  /* Any remaining data does not contain a '\r' */
407
0
  if(blen) {
408
0
    DEBUGASSERT(!ctx->newline_pending);
409
0
    return Curl_cwriter_write(data, writer->next, type, buf, blen);
410
0
  }
411
0
  else if(type & CLIENTWRITE_EOS) {
412
    /* EndOfStream, if we have a trailing cr, now is the time to write it */
413
0
    if(ctx->newline_pending) {
414
0
      ctx->newline_pending = FALSE;
415
0
      return Curl_cwriter_write(data, writer->next, type, &nl, 1);
416
0
    }
417
    /* Always pass on the EOS type indicator */
418
0
    return Curl_cwriter_write(data, writer->next, type, buf, 0);
419
0
  }
420
0
  return CURLE_OK;
421
0
}
422
423
static const struct Curl_cwtype ftp_cw_lc = {
424
  "ftp-lineconv",
425
  NULL,
426
  Curl_cwriter_def_init,
427
  ftp_cw_lc_write,
428
  Curl_cwriter_def_close,
429
  sizeof(struct ftp_cw_lc_ctx)
430
};
431
432
#endif /* CURL_PREFER_LF_LINEENDS */
433
/***********************************************************************
434
 *
435
 * ftp_check_ctrl_on_data_wait()
436
 *
437
 */
438
static CURLcode ftp_check_ctrl_on_data_wait(struct Curl_easy *data,
439
                                            struct ftp_conn *ftpc)
440
0
{
441
0
  struct connectdata *conn = data->conn;
442
0
  curl_socket_t ctrl_sock = conn->sock[FIRSTSOCKET];
443
0
  struct pingpong *pp = &ftpc->pp;
444
0
  ssize_t nread;
445
0
  int ftpcode;
446
0
  bool response = FALSE;
447
448
  /* First check whether there is a cached response from server */
449
0
  if(curlx_dyn_len(&pp->recvbuf) && (*curlx_dyn_ptr(&pp->recvbuf) > '3')) {
450
    /* Data connection could not be established, let's return */
451
0
    infof(data, "There is negative response in cache while serv connect");
452
0
    (void)Curl_GetFTPResponse(data, &nread, &ftpcode);
453
0
    return CURLE_FTP_ACCEPT_FAILED;
454
0
  }
455
456
0
  if(pp->overflow)
457
    /* there is pending control data still in the buffer to read */
458
0
    response = TRUE;
459
0
  else {
460
0
    int socketstate = Curl_socket_check(ctrl_sock, CURL_SOCKET_BAD,
461
0
                                        CURL_SOCKET_BAD, 0);
462
    /* see if the connection request is already here */
463
0
    switch(socketstate) {
464
0
    case -1: /* error */
465
      /* let's die here */
466
0
      failf(data, "Error while waiting for server connect");
467
0
      return CURLE_FTP_ACCEPT_FAILED;
468
0
    default:
469
0
      if(socketstate & CURL_CSELECT_IN)
470
0
        response = TRUE;
471
0
      break;
472
0
    }
473
0
  }
474
475
0
  if(response) {
476
0
    infof(data, "Ctrl conn has data while waiting for data conn");
477
0
    if(pp->overflow > 3) {
478
0
      const char *r = curlx_dyn_ptr(&pp->recvbuf);
479
480
0
      DEBUGASSERT((pp->overflow + pp->nfinal) <=
481
0
                  curlx_dyn_len(&pp->recvbuf));
482
      /* move over the most recently handled response line */
483
0
      r += pp->nfinal;
484
485
0
      if(LASTLINE(r)) {
486
0
        curl_off_t status;
487
0
        if(!curlx_str_number(&r, &status, 999) && (status == 226)) {
488
          /* funny timing situation where we get the final message on the
489
             control connection before traffic on the data connection has been
490
             noticed. Leave the 226 in there and use this as a trigger to read
491
             the data socket. */
492
0
          infof(data, "Got 226 before data activity");
493
0
          return CURLE_OK;
494
0
        }
495
0
      }
496
0
    }
497
498
0
    (void)Curl_GetFTPResponse(data, &nread, &ftpcode);
499
500
0
    infof(data, "FTP code: %03d", ftpcode);
501
502
0
    if(ftpcode/100 > 3)
503
0
      return CURLE_FTP_ACCEPT_FAILED;
504
505
0
    return CURLE_WEIRD_SERVER_REPLY;
506
0
  }
507
508
0
  return CURLE_OK;
509
0
}
510
511
/***********************************************************************
512
 *
513
 * ftp_initiate_transfer()
514
 *
515
 * After connection from server is accepted this function is called to
516
 * setup transfer parameters and initiate the data transfer.
517
 *
518
 */
519
static CURLcode ftp_initiate_transfer(struct Curl_easy *data,
520
                                      struct ftp_conn *ftpc)
521
0
{
522
0
  CURLcode result = CURLE_OK;
523
0
  bool connected;
524
525
0
  CURL_TRC_FTP(data, "ftp_initiate_transfer()");
526
0
  result = Curl_conn_connect(data, SECONDARYSOCKET, TRUE, &connected);
527
0
  if(result || !connected)
528
0
    return result;
529
530
0
  if(ftpc->state_saved == FTP_STOR) {
531
    /* When we know we are uploading a specified file, we can get the file
532
       size prior to the actual upload. */
533
0
    Curl_pgrsSetUploadSize(data, data->state.infilesize);
534
535
    /* set the SO_SNDBUF for the secondary socket for those who need it */
536
0
    Curl_sndbuf_init(data->conn->sock[SECONDARYSOCKET]);
537
538
    /* FTP upload, shutdown DATA, ignore shutdown errors, as we rely
539
     * on the server response on the CONTROL connection. */
540
0
    Curl_xfer_setup_send(data, SECONDARYSOCKET);
541
0
    Curl_xfer_set_shutdown(data, TRUE, TRUE);
542
0
  }
543
0
  else {
544
    /* FTP download, shutdown, do not ignore errors */
545
0
    Curl_xfer_setup_recv(data, SECONDARYSOCKET, ftpc->retr_size_saved);
546
0
    Curl_xfer_set_shutdown(data, TRUE, FALSE);
547
0
  }
548
549
0
  ftpc->pp.pending_resp = TRUE; /* expect server response */
550
0
  ftp_state(data, ftpc, FTP_STOP);
551
552
0
  return CURLE_OK;
553
0
}
554
555
static bool ftp_endofresp(struct Curl_easy *data, struct connectdata *conn,
556
                          const char *line, size_t len, int *code)
557
0
{
558
0
  curl_off_t status;
559
0
  (void)data;
560
0
  (void)conn;
561
562
0
  if((len > 3) && LASTLINE(line) && !curlx_str_number(&line, &status, 999)) {
563
0
    *code = (int)status;
564
0
    return TRUE;
565
0
  }
566
567
0
  return FALSE;
568
0
}
569
570
static CURLcode ftp_readresp(struct Curl_easy *data,
571
                             struct ftp_conn *ftpc,
572
                             int sockindex,
573
                             struct pingpong *pp,
574
                             int *ftpcodep, /* return the ftp-code if done */
575
                             size_t *size) /* size of the response */
576
0
{
577
0
  int code;
578
0
  CURLcode result = Curl_pp_readresp(data, sockindex, pp, &code, size);
579
0
  DEBUGASSERT(ftpcodep);
580
#ifdef HAVE_GSSAPI
581
  {
582
    struct connectdata *conn = data->conn;
583
    char * const buf = curlx_dyn_ptr(&ftpc->pp.recvbuf);
584
585
    /* handle the security-oriented responses 6xx ***/
586
    switch(code) {
587
    case 631:
588
      code = Curl_sec_read_msg(data, conn, buf, PROT_SAFE);
589
      break;
590
    case 632:
591
      code = Curl_sec_read_msg(data, conn, buf, PROT_PRIVATE);
592
      break;
593
    case 633:
594
      code = Curl_sec_read_msg(data, conn, buf, PROT_CONFIDENTIAL);
595
      break;
596
    default:
597
      /* normal ftp stuff we pass through! */
598
      break;
599
    }
600
  }
601
#endif
602
603
  /* store the latest code for later retrieval, except during shutdown */
604
0
  if(!ftpc->shutdown)
605
0
    data->info.httpcode = code;
606
607
0
  *ftpcodep = code;
608
609
0
  if(code == 421) {
610
    /* 421 means "Service not available, closing control connection." and FTP
611
     * servers use it to signal that idle session timeout has been exceeded.
612
     * If we ignored the response, it could end up hanging in some cases.
613
     *
614
     * This response code can come at any point so having it treated
615
     * generically is a good idea.
616
     */
617
0
    infof(data, "We got a 421 - timeout");
618
0
    ftp_state(data, ftpc, FTP_STOP);
619
0
    return CURLE_OPERATION_TIMEDOUT;
620
0
  }
621
622
0
  return result;
623
0
}
624
625
/* --- parse FTP server responses --- */
626
627
/*
628
 * Curl_GetFTPResponse() is a BLOCKING function to read the full response
629
 * from a server after a command.
630
 *
631
 */
632
633
CURLcode Curl_GetFTPResponse(struct Curl_easy *data,
634
                             ssize_t *nreadp, /* return number of bytes read */
635
                             int *ftpcodep) /* return the ftp-code */
636
0
{
637
  /*
638
   * We cannot read just one byte per read() and then go back to select() as
639
   * the OpenSSL read() does not grok that properly.
640
   *
641
   * Alas, read as much as possible, split up into lines, use the ending
642
   * line in a response or continue reading.  */
643
644
0
  struct connectdata *conn = data->conn;
645
0
  curl_socket_t sockfd = conn->sock[FIRSTSOCKET];
646
0
  CURLcode result = CURLE_OK;
647
0
  struct ftp_conn *ftpc = Curl_conn_meta_get(data->conn, CURL_META_FTP_CONN);
648
0
  struct pingpong *pp = &ftpc->pp;
649
0
  size_t nread;
650
0
  int cache_skip = 0;
651
0
  DEBUGASSERT(ftpcodep);
652
653
0
  CURL_TRC_FTP(data, "getFTPResponse start");
654
0
  *nreadp = 0;
655
0
  *ftpcodep = 0; /* 0 for errors */
656
657
0
  if(!ftpc)
658
0
    return CURLE_FAILED_INIT;
659
660
0
  while(!*ftpcodep && !result) {
661
    /* check and reset timeout value every lap */
662
0
    timediff_t timeout = Curl_pp_state_timeout(data, pp, FALSE);
663
0
    timediff_t interval_ms;
664
665
0
    if(timeout <= 0) {
666
0
      failf(data, "FTP response timeout");
667
0
      return CURLE_OPERATION_TIMEDOUT; /* already too little time */
668
0
    }
669
670
0
    interval_ms = 1000;  /* use 1 second timeout intervals */
671
0
    if(timeout < interval_ms)
672
0
      interval_ms = timeout;
673
674
    /*
675
     * Since this function is blocking, we need to wait here for input on the
676
     * connection and only then we call the response reading function. We do
677
     * timeout at least every second to make the timeout check run.
678
     *
679
     * A caution here is that the ftp_readresp() function has a cache that may
680
     * contain pieces of a response from the previous invoke and we need to
681
     * make sure we do not just wait for input while there is unhandled data in
682
     * that cache. But also, if the cache is there, we call ftp_readresp() and
683
     * the cache was not good enough to continue we must not just busy-loop
684
     * around this function.
685
     *
686
     */
687
688
0
    if(curlx_dyn_len(&pp->recvbuf) && (cache_skip < 2)) {
689
      /*
690
       * There is a cache left since before. We then skipping the wait for
691
       * socket action, unless this is the same cache like the previous round
692
       * as then the cache was deemed not enough to act on and we then need to
693
       * wait for more data anyway.
694
       */
695
0
    }
696
0
    else if(!Curl_conn_data_pending(data, FIRSTSOCKET)) {
697
0
      curl_socket_t wsock = Curl_pp_needs_flush(data, pp) ?
698
0
        sockfd : CURL_SOCKET_BAD;
699
0
      int ev = Curl_socket_check(sockfd, CURL_SOCKET_BAD, wsock, interval_ms);
700
0
      if(ev < 0) {
701
0
        failf(data, "FTP response aborted due to select/poll error: %d",
702
0
              SOCKERRNO);
703
0
        return CURLE_RECV_ERROR;
704
0
      }
705
0
      else if(ev == 0) {
706
0
        if(Curl_pgrsUpdate(data))
707
0
          return CURLE_ABORTED_BY_CALLBACK;
708
0
        continue; /* just continue in our loop for the timeout duration */
709
0
      }
710
0
    }
711
712
0
    if(Curl_pp_needs_flush(data, pp)) {
713
0
      result = Curl_pp_flushsend(data, pp);
714
0
      if(result)
715
0
        break;
716
0
    }
717
718
0
    result = ftp_readresp(data, ftpc, FIRSTSOCKET, pp, ftpcodep, &nread);
719
0
    if(result)
720
0
      break;
721
722
0
    if(!nread && curlx_dyn_len(&pp->recvbuf))
723
      /* bump cache skip counter as on repeated skips we must wait for more
724
         data */
725
0
      cache_skip++;
726
0
    else
727
      /* when we got data or there is no cache left, we reset the cache skip
728
         counter */
729
0
      cache_skip = 0;
730
731
0
    *nreadp += nread;
732
733
0
  } /* while there is buffer left and loop is requested */
734
735
0
  pp->pending_resp = FALSE;
736
0
  CURL_TRC_FTP(data, "getFTPResponse -> result=%d, nread=%zd, ftpcode=%d",
737
0
               result, *nreadp, *ftpcodep);
738
739
0
  return result;
740
0
}
741
742
static CURLcode ftp_state_user(struct Curl_easy *data,
743
                               struct ftp_conn *ftpc,
744
                               struct connectdata *conn)
745
0
{
746
0
  CURLcode result = Curl_pp_sendf(data, &ftpc->pp, "USER %s",
747
0
                                  conn->user ? conn->user : "");
748
0
  if(!result) {
749
0
    ftpc->ftp_trying_alternative = FALSE;
750
0
    ftp_state(data, ftpc, FTP_USER);
751
0
  }
752
0
  return result;
753
0
}
754
755
static CURLcode ftp_state_pwd(struct Curl_easy *data,
756
                              struct ftp_conn *ftpc)
757
0
{
758
0
  CURLcode result;
759
#ifdef DEBUGBUILD
760
  if(!data->id && getenv("CURL_FTP_PWD_STOP"))
761
    return CURLE_OK;
762
#endif
763
0
  result = Curl_pp_sendf(data, &ftpc->pp, "%s", "PWD");
764
0
  if(!result)
765
0
    ftp_state(data, ftpc, FTP_PWD);
766
767
0
  return result;
768
0
}
769
770
/* For the FTP "protocol connect" and "doing" phases only */
771
static CURLcode ftp_pollset(struct Curl_easy *data,
772
                            struct easy_pollset *ps)
773
0
{
774
0
  struct ftp_conn *ftpc = Curl_conn_meta_get(data->conn, CURL_META_FTP_CONN);
775
0
  return ftpc ? Curl_pp_pollset(data, &ftpc->pp, ps) : CURLE_OK;
776
0
}
777
778
/* For the FTP "DO_MORE" phase only */
779
static CURLcode ftp_domore_pollset(struct Curl_easy *data,
780
                                   struct easy_pollset *ps)
781
0
{
782
0
  struct ftp_conn *ftpc = Curl_conn_meta_get(data->conn, CURL_META_FTP_CONN);
783
784
0
  if(!ftpc)
785
0
    return CURLE_OK;
786
787
  /* When in DO_MORE state, we could be either waiting for us to connect to a
788
   * remote site, or we could wait for that site to connect to us. Or just
789
   * handle ordinary commands.
790
   */
791
0
  CURL_TRC_FTP(data, "[%s] ftp_domore_pollset()", FTP_CSTATE(ftpc));
792
793
0
  if(FTP_STOP == ftpc->state) {
794
    /* if stopped and still in this state, then we are also waiting for a
795
       connect on the secondary connection */
796
0
    DEBUGASSERT(data->conn->sock[SECONDARYSOCKET] != CURL_SOCKET_BAD ||
797
0
               (data->conn->cfilter[SECONDARYSOCKET] &&
798
0
                !Curl_conn_is_connected(data->conn, SECONDARYSOCKET)));
799
    /* An unconnected SECONDARY will add its socket by itself
800
     * via its adjust_pollset() */
801
0
    return Curl_pollset_add_in(data, ps, data->conn->sock[FIRSTSOCKET]);
802
0
  }
803
0
  return Curl_pp_pollset(data, &ftpc->pp, ps);
804
0
}
805
806
static int pathlen(struct ftp_conn *ftpc, int num)
807
0
{
808
0
  DEBUGASSERT(ftpc->dirs);
809
0
  DEBUGASSERT(ftpc->dirdepth > num);
810
0
  return ftpc->dirs[num].len;
811
0
}
812
813
static const char *pathpiece(struct ftp_conn *ftpc, int num)
814
0
{
815
0
  DEBUGASSERT(ftpc->dirs);
816
0
  DEBUGASSERT(ftpc->dirdepth > num);
817
0
  return &ftpc->rawpath[ ftpc->dirs[num].start ];
818
0
}
819
820
/* This is called after the FTP_QUOTE state is passed.
821
822
   ftp_state_cwd() sends the range of CWD commands to the server to change to
823
   the correct directory. It may also need to send MKD commands to create
824
   missing ones, if that option is enabled.
825
*/
826
static CURLcode ftp_state_cwd(struct Curl_easy *data,
827
                              struct ftp_conn *ftpc,
828
                              struct FTP *ftp)
829
0
{
830
0
  CURLcode result = CURLE_OK;
831
832
0
  if(ftpc->cwddone)
833
    /* already done and fine */
834
0
    result = ftp_state_mdtm(data, ftpc, ftp);
835
0
  else {
836
    /* FTPFILE_NOCWD with full path: expect ftpc->cwddone! */
837
0
    DEBUGASSERT((data->set.ftp_filemethod != FTPFILE_NOCWD) ||
838
0
                !(ftpc->dirdepth && ftpc->rawpath[0] == '/'));
839
840
0
    ftpc->count2 = 0; /* count2 counts failed CWDs */
841
842
0
    if(data->conn->bits.reuse && ftpc->entrypath &&
843
       /* no need to go to entrypath when we have an absolute path */
844
0
       !(ftpc->dirdepth && ftpc->rawpath[0] == '/')) {
845
      /* This is a reused connection. Since we change directory to where the
846
         transfer is taking place, we must first get back to the original dir
847
         where we ended up after login: */
848
0
      ftpc->cwdcount = 0; /* we count this as the first path, then we add one
849
                             for all upcoming ones in the ftp->dirs[] array */
850
0
      result = Curl_pp_sendf(data, &ftpc->pp, "CWD %s", ftpc->entrypath);
851
0
      if(!result)
852
0
        ftp_state(data, ftpc, FTP_CWD);
853
0
    }
854
0
    else {
855
0
      if(ftpc->dirdepth) {
856
0
        ftpc->cwdcount = 1;
857
        /* issue the first CWD, the rest is sent when the CWD responses are
858
           received... */
859
0
        result = Curl_pp_sendf(data, &ftpc->pp, "CWD %.*s",
860
0
                               pathlen(ftpc, 0), pathpiece(ftpc, 0));
861
0
        if(!result)
862
0
          ftp_state(data, ftpc, FTP_CWD);
863
0
      }
864
0
      else {
865
        /* No CWD necessary */
866
0
        result = ftp_state_mdtm(data, ftpc, ftp);
867
0
      }
868
0
    }
869
0
  }
870
0
  return result;
871
0
}
872
873
typedef enum {
874
  EPRT,
875
  PORT,
876
  DONE
877
} ftpport;
878
879
static CURLcode ftp_state_use_port(struct Curl_easy *data,
880
                                   struct ftp_conn *ftpc,
881
                                   ftpport fcmd) /* start with this */
882
0
{
883
0
  CURLcode result = CURLE_FTP_PORT_FAILED;
884
0
  struct connectdata *conn = data->conn;
885
0
  curl_socket_t portsock = CURL_SOCKET_BAD;
886
0
  char myhost[MAX_IPADR_LEN + 1] = "";
887
888
0
  struct Curl_sockaddr_storage ss;
889
0
  struct Curl_addrinfo *res, *ai;
890
0
  curl_socklen_t sslen;
891
0
  char hbuf[NI_MAXHOST];
892
0
  struct sockaddr *sa = (struct sockaddr *)&ss;
893
0
  struct sockaddr_in * const sa4 = (void *)sa;
894
0
#ifdef USE_IPV6
895
0
  struct sockaddr_in6 * const sa6 = (void *)sa;
896
0
#endif
897
0
  static const char mode[][5] = { "EPRT", "PORT" };
898
0
  int error;
899
0
  char *host = NULL;
900
0
  char *string_ftpport = data->set.str[STRING_FTPPORT];
901
0
  struct Curl_dns_entry *dns_entry = NULL;
902
0
  unsigned short port_min = 0;
903
0
  unsigned short port_max = 0;
904
0
  unsigned short port;
905
0
  bool possibly_non_local = TRUE;
906
0
  char buffer[STRERROR_LEN];
907
0
  char *addr = NULL;
908
0
  size_t addrlen = 0;
909
0
  char ipstr[50];
910
911
  /* Step 1, figure out what is requested,
912
   * accepted format :
913
   * (ipv4|ipv6|domain|interface)?(:port(-range)?)?
914
   */
915
916
0
  if(data->set.str[STRING_FTPPORT] &&
917
0
     (strlen(data->set.str[STRING_FTPPORT]) > 1)) {
918
0
    char *ip_end = NULL;
919
920
0
#ifdef USE_IPV6
921
0
    if(*string_ftpport == '[') {
922
      /* [ipv6]:port(-range) */
923
0
      char *ip_start = string_ftpport + 1;
924
0
      ip_end = strchr(ip_start, ']');
925
0
      if(ip_end) {
926
0
        addrlen = ip_end - ip_start;
927
0
        addr = ip_start;
928
0
      }
929
0
    }
930
0
    else
931
0
#endif
932
0
      if(*string_ftpport == ':') {
933
        /* :port */
934
0
        ip_end = string_ftpport;
935
0
      }
936
0
      else {
937
0
        ip_end = strchr(string_ftpport, ':');
938
0
        addr = string_ftpport;
939
0
        if(ip_end) {
940
          /* either ipv6 or (ipv4|domain|interface):port(-range) */
941
0
          addrlen = ip_end - string_ftpport;
942
0
#ifdef USE_IPV6
943
0
          if(curlx_inet_pton(AF_INET6, string_ftpport, &sa6->sin6_addr) == 1) {
944
            /* ipv6 */
945
0
            port_min = port_max = 0;
946
0
            ip_end = NULL; /* this got no port ! */
947
0
          }
948
0
#endif
949
0
        }
950
0
        else
951
          /* ipv4|interface */
952
0
          addrlen = strlen(string_ftpport);
953
0
      }
954
955
    /* parse the port */
956
0
    if(ip_end) {
957
0
      const char *portp = strchr(ip_end, ':');
958
0
      if(portp) {
959
0
        curl_off_t start;
960
0
        curl_off_t end;
961
0
        portp++;
962
0
        if(!curlx_str_number(&portp, &start, 0xffff)) {
963
          /* got the first number */
964
0
          port_min = (unsigned short)start;
965
0
          if(!curlx_str_single(&portp, '-')) {
966
            /* got the dash */
967
0
            if(!curlx_str_number(&portp, &end, 0xffff))
968
              /* got the second number */
969
0
              port_max = (unsigned short)end;
970
0
          }
971
0
        }
972
0
        else
973
0
          port_max = port_min;
974
0
      }
975
0
    }
976
977
    /* correct errors like:
978
     *  :1234-1230
979
     *  :-4711,  in this case port_min is (unsigned)-1,
980
     *           therefore port_min > port_max for all cases
981
     *           but port_max = (unsigned)-1
982
     */
983
0
    if(port_min > port_max)
984
0
      port_min = port_max = 0;
985
986
0
    if(addrlen) {
987
0
      const struct Curl_sockaddr_ex *remote_addr =
988
0
       Curl_conn_get_remote_addr(data, FIRSTSOCKET);
989
990
0
      DEBUGASSERT(remote_addr);
991
0
      if(!remote_addr)
992
0
        goto out;
993
0
      DEBUGASSERT(addr);
994
0
      if(addrlen >= sizeof(ipstr))
995
0
        goto out;
996
0
      memcpy(ipstr, addr, addrlen);
997
0
      ipstr[addrlen] = 0;
998
999
      /* attempt to get the address of the given interface name */
1000
0
      switch(Curl_if2ip(remote_addr->family,
1001
0
#ifdef USE_IPV6
1002
0
                        Curl_ipv6_scope(&remote_addr->curl_sa_addr),
1003
0
                        conn->scope_id,
1004
0
#endif
1005
0
                        ipstr, hbuf, sizeof(hbuf))) {
1006
0
        case IF2IP_NOT_FOUND:
1007
          /* not an interface, use the given string as hostname instead */
1008
0
          host = ipstr;
1009
0
          break;
1010
0
        case IF2IP_AF_NOT_SUPPORTED:
1011
0
          goto out;
1012
0
        case IF2IP_FOUND:
1013
0
          host = hbuf; /* use the hbuf for hostname */
1014
0
          break;
1015
0
      }
1016
0
    }
1017
0
    else
1018
      /* there was only a port(-range) given, default the host */
1019
0
      host = NULL;
1020
0
  } /* data->set.ftpport */
1021
1022
0
  if(!host) {
1023
0
    const char *r;
1024
    /* not an interface and not a hostname, get default by extracting
1025
       the IP from the control connection */
1026
0
    sslen = sizeof(ss);
1027
0
    if(getsockname(conn->sock[FIRSTSOCKET], sa, &sslen)) {
1028
0
      failf(data, "getsockname() failed: %s",
1029
0
            Curl_strerror(SOCKERRNO, buffer, sizeof(buffer)));
1030
0
      goto out;
1031
0
    }
1032
0
    switch(sa->sa_family) {
1033
0
#ifdef USE_IPV6
1034
0
    case AF_INET6:
1035
0
      r = curlx_inet_ntop(sa->sa_family, &sa6->sin6_addr, hbuf, sizeof(hbuf));
1036
0
      break;
1037
0
#endif
1038
0
    default:
1039
0
      r = curlx_inet_ntop(sa->sa_family, &sa4->sin_addr, hbuf, sizeof(hbuf));
1040
0
      break;
1041
0
    }
1042
0
    if(!r) {
1043
0
      goto out;
1044
0
    }
1045
0
    host = hbuf; /* use this hostname */
1046
0
    possibly_non_local = FALSE; /* we know it is local now */
1047
0
  }
1048
1049
  /* resolv ip/host to ip */
1050
0
  res = NULL;
1051
0
  result = Curl_resolv_blocking(data, host, 0, conn->ip_version, &dns_entry);
1052
0
  if(!result) {
1053
0
    DEBUGASSERT(dns_entry);
1054
0
    res = dns_entry->addr;
1055
0
  }
1056
1057
0
  if(!res) {
1058
0
    failf(data, "failed to resolve the address provided to PORT: %s", host);
1059
0
    goto out;
1060
0
  }
1061
1062
0
  host = NULL;
1063
1064
  /* step 2, create a socket for the requested address */
1065
0
  error = 0;
1066
0
  for(ai = res; ai; ai = ai->ai_next) {
1067
0
    if(Curl_socket_open(data, ai, NULL,
1068
0
                        Curl_conn_get_transport(data, conn), &portsock)) {
1069
0
      error = SOCKERRNO;
1070
0
      continue;
1071
0
    }
1072
0
    break;
1073
0
  }
1074
0
  if(!ai) {
1075
0
    failf(data, "socket failure: %s",
1076
0
          Curl_strerror(error, buffer, sizeof(buffer)));
1077
0
    goto out;
1078
0
  }
1079
0
  CURL_TRC_FTP(data, "[%s] ftp_state_use_port(), opened socket",
1080
0
               FTP_CSTATE(ftpc));
1081
1082
  /* step 3, bind to a suitable local address */
1083
1084
0
  memcpy(sa, ai->ai_addr, ai->ai_addrlen);
1085
0
  sslen = ai->ai_addrlen;
1086
1087
0
  for(port = port_min; port <= port_max;) {
1088
0
    if(sa->sa_family == AF_INET)
1089
0
      sa4->sin_port = htons(port);
1090
0
#ifdef USE_IPV6
1091
0
    else
1092
0
      sa6->sin6_port = htons(port);
1093
0
#endif
1094
    /* Try binding the given address. */
1095
0
    if(bind(portsock, sa, sslen) ) {
1096
      /* It failed. */
1097
0
      error = SOCKERRNO;
1098
0
      if(possibly_non_local && (error == SOCKEADDRNOTAVAIL)) {
1099
        /* The requested bind address is not local. Use the address used for
1100
         * the control connection instead and restart the port loop
1101
         */
1102
0
        infof(data, "bind(port=%hu) on non-local address failed: %s", port,
1103
0
              Curl_strerror(error, buffer, sizeof(buffer)));
1104
1105
0
        sslen = sizeof(ss);
1106
0
        if(getsockname(conn->sock[FIRSTSOCKET], sa, &sslen)) {
1107
0
          failf(data, "getsockname() failed: %s",
1108
0
                Curl_strerror(SOCKERRNO, buffer, sizeof(buffer)));
1109
0
          goto out;
1110
0
        }
1111
0
        port = port_min;
1112
0
        possibly_non_local = FALSE; /* do not try this again */
1113
0
        continue;
1114
0
      }
1115
0
      if(error != SOCKEADDRINUSE && error != SOCKEACCES) {
1116
0
        failf(data, "bind(port=%hu) failed: %s", port,
1117
0
              Curl_strerror(error, buffer, sizeof(buffer)));
1118
0
        goto out;
1119
0
      }
1120
0
    }
1121
0
    else
1122
0
      break;
1123
1124
0
    port++;
1125
0
  }
1126
1127
  /* maybe all ports were in use already */
1128
0
  if(port > port_max) {
1129
0
    failf(data, "bind() failed, we ran out of ports");
1130
0
    goto out;
1131
0
  }
1132
1133
  /* get the name again after the bind() so that we can extract the
1134
     port number it uses now */
1135
0
  sslen = sizeof(ss);
1136
0
  if(getsockname(portsock, sa, &sslen)) {
1137
0
    failf(data, "getsockname() failed: %s",
1138
0
          Curl_strerror(SOCKERRNO, buffer, sizeof(buffer)));
1139
0
    goto out;
1140
0
  }
1141
0
  CURL_TRC_FTP(data, "[%s] ftp_state_use_port(), socket bound to port %d",
1142
0
               FTP_CSTATE(ftpc), port);
1143
1144
  /* step 4, listen on the socket */
1145
1146
0
  if(listen(portsock, 1)) {
1147
0
    failf(data, "socket failure: %s",
1148
0
          Curl_strerror(SOCKERRNO, buffer, sizeof(buffer)));
1149
0
    goto out;
1150
0
  }
1151
0
  CURL_TRC_FTP(data, "[%s] ftp_state_use_port(), listening on %d",
1152
0
               FTP_CSTATE(ftpc), port);
1153
1154
  /* step 5, send the proper FTP command */
1155
1156
  /* get a plain printable version of the numerical address to work with
1157
     below */
1158
0
  Curl_printable_address(ai, myhost, sizeof(myhost));
1159
1160
0
#ifdef USE_IPV6
1161
0
  if(!conn->bits.ftp_use_eprt && conn->bits.ipv6)
1162
    /* EPRT is disabled but we are connected to an IPv6 host, so we ignore the
1163
       request and enable EPRT again! */
1164
0
    conn->bits.ftp_use_eprt = TRUE;
1165
0
#endif
1166
1167
0
  for(; fcmd != DONE; fcmd++) {
1168
1169
0
    if(!conn->bits.ftp_use_eprt && (EPRT == fcmd))
1170
      /* if disabled, goto next */
1171
0
      continue;
1172
1173
0
    if((PORT == fcmd) && sa->sa_family != AF_INET)
1174
      /* PORT is IPv4 only */
1175
0
      continue;
1176
1177
0
    switch(sa->sa_family) {
1178
0
    case AF_INET:
1179
0
      port = ntohs(sa4->sin_port);
1180
0
      break;
1181
0
#ifdef USE_IPV6
1182
0
    case AF_INET6:
1183
0
      port = ntohs(sa6->sin6_port);
1184
0
      break;
1185
0
#endif
1186
0
    default:
1187
0
      continue; /* might as well skip this */
1188
0
    }
1189
1190
0
    if(EPRT == fcmd) {
1191
      /*
1192
       * Two fine examples from RFC2428;
1193
       *
1194
       * EPRT |1|132.235.1.2|6275|
1195
       *
1196
       * EPRT |2|1080::8:800:200C:417A|5282|
1197
       */
1198
1199
0
      result = Curl_pp_sendf(data, &ftpc->pp, "%s |%d|%s|%hu|", mode[fcmd],
1200
0
                             sa->sa_family == AF_INET ? 1 : 2,
1201
0
                             myhost, port);
1202
0
      if(result) {
1203
0
        failf(data, "Failure sending EPRT command: %s",
1204
0
              curl_easy_strerror(result));
1205
0
        goto out;
1206
0
      }
1207
0
      break;
1208
0
    }
1209
0
    if(PORT == fcmd) {
1210
      /* large enough for [IP address],[num],[num] */
1211
0
      char target[sizeof(myhost) + 20];
1212
0
      char *source = myhost;
1213
0
      char *dest = target;
1214
1215
      /* translate x.x.x.x to x,x,x,x */
1216
0
      while(*source) {
1217
0
        if(*source == '.')
1218
0
          *dest = ',';
1219
0
        else
1220
0
          *dest = *source;
1221
0
        dest++;
1222
0
        source++;
1223
0
      }
1224
0
      *dest = 0;
1225
0
      msnprintf(dest, 20, ",%d,%d", (int)(port >> 8), (int)(port & 0xff));
1226
1227
0
      result = Curl_pp_sendf(data, &ftpc->pp, "%s %s", mode[fcmd], target);
1228
0
      if(result) {
1229
0
        failf(data, "Failure sending PORT command: %s",
1230
0
              curl_easy_strerror(result));
1231
0
        goto out;
1232
0
      }
1233
0
      break;
1234
0
    }
1235
0
  }
1236
1237
  /* store which command was sent */
1238
0
  ftpc->count1 = fcmd;
1239
0
  ftp_state(data, ftpc, FTP_PORT);
1240
1241
  /* Replace any filter on SECONDARY with one listening on this socket */
1242
0
  result = Curl_conn_tcp_listen_set(data, conn, SECONDARYSOCKET, &portsock);
1243
0
  if(!result)
1244
0
    portsock = CURL_SOCKET_BAD; /* now held in filter */
1245
1246
0
out:
1247
  /* If we looked up a dns_entry, now is the time to safely release it */
1248
0
  if(dns_entry)
1249
0
    Curl_resolv_unlink(data, &dns_entry);
1250
0
  if(result) {
1251
0
    ftp_state(data, ftpc, FTP_STOP);
1252
0
  }
1253
0
  else {
1254
    /* successfully setup the list socket filter. Do we need more? */
1255
0
    if(conn->bits.ftp_use_data_ssl && data->set.ftp_use_port &&
1256
0
       !Curl_conn_is_ssl(conn, SECONDARYSOCKET)) {
1257
0
      result = Curl_ssl_cfilter_add(data, conn, SECONDARYSOCKET);
1258
0
    }
1259
0
    conn->bits.do_more = FALSE;
1260
0
    Curl_pgrsTime(data, TIMER_STARTACCEPT);
1261
0
    Curl_expire(data, (data->set.accepttimeout > 0) ?
1262
0
                data->set.accepttimeout: DEFAULT_ACCEPT_TIMEOUT,
1263
0
                EXPIRE_FTP_ACCEPT);
1264
0
  }
1265
0
  if(portsock != CURL_SOCKET_BAD)
1266
0
    Curl_socket_close(data, conn, portsock);
1267
0
  return result;
1268
0
}
1269
1270
static CURLcode ftp_state_use_pasv(struct Curl_easy *data,
1271
                                   struct ftp_conn *ftpc,
1272
                                   struct connectdata *conn)
1273
0
{
1274
0
  CURLcode result = CURLE_OK;
1275
  /*
1276
    Here's the executive summary on what to do:
1277
1278
    PASV is RFC959, expect:
1279
    227 Entering Passive Mode (a1,a2,a3,a4,p1,p2)
1280
1281
    LPSV is RFC1639, expect:
1282
    228 Entering Long Passive Mode (4,4,a1,a2,a3,a4,2,p1,p2)
1283
1284
    EPSV is RFC2428, expect:
1285
    229 Entering Extended Passive Mode (|||port|)
1286
1287
  */
1288
1289
0
  static const char mode[][5] = { "EPSV", "PASV" };
1290
0
  int modeoff;
1291
1292
0
#ifdef PF_INET6
1293
0
  if(!conn->bits.ftp_use_epsv && conn->bits.ipv6)
1294
    /* EPSV is disabled but we are connected to an IPv6 host, so we ignore the
1295
       request and enable EPSV again! */
1296
0
    conn->bits.ftp_use_epsv = TRUE;
1297
0
#endif
1298
1299
0
  modeoff = conn->bits.ftp_use_epsv ? 0 : 1;
1300
1301
0
  result = Curl_pp_sendf(data, &ftpc->pp, "%s", mode[modeoff]);
1302
0
  if(!result) {
1303
0
    ftpc->count1 = modeoff;
1304
0
    ftp_state(data, ftpc, FTP_PASV);
1305
0
    infof(data, "Connect data stream passively");
1306
0
  }
1307
0
  return result;
1308
0
}
1309
1310
/*
1311
 * ftp_state_prepare_transfer() starts PORT, PASV or PRET etc.
1312
 *
1313
 * REST is the last command in the chain of commands when a "head"-like
1314
 * request is made. Thus, if an actual transfer is to be made this is where we
1315
 * take off for real.
1316
 */
1317
static CURLcode ftp_state_prepare_transfer(struct Curl_easy *data,
1318
                                           struct ftp_conn *ftpc,
1319
                                           struct FTP *ftp)
1320
0
{
1321
0
  CURLcode result = CURLE_OK;
1322
0
  struct connectdata *conn = data->conn;
1323
1324
0
  if(ftp->transfer != PPTRANSFER_BODY) {
1325
    /* does not transfer any data */
1326
1327
    /* still possibly do PRE QUOTE jobs */
1328
0
    ftp_state(data, ftpc, FTP_RETR_PREQUOTE);
1329
0
    result = ftp_state_quote(data, ftpc, ftp, TRUE, FTP_RETR_PREQUOTE);
1330
0
  }
1331
0
  else if(data->set.ftp_use_port) {
1332
    /* We have chosen to use the PORT (or similar) command */
1333
0
    result = ftp_state_use_port(data, ftpc, EPRT);
1334
0
  }
1335
0
  else {
1336
    /* We have chosen (this is default) to use the PASV (or similar) command */
1337
0
    if(data->set.ftp_use_pret) {
1338
      /* The user has requested that we send a PRET command
1339
         to prepare the server for the upcoming PASV */
1340
0
      if(!ftpc->file)
1341
0
        result = Curl_pp_sendf(data, &ftpc->pp, "PRET %s",
1342
0
                               data->set.str[STRING_CUSTOMREQUEST] ?
1343
0
                               data->set.str[STRING_CUSTOMREQUEST] :
1344
0
                               (data->state.list_only ? "NLST" : "LIST"));
1345
0
      else if(data->state.upload)
1346
0
        result = Curl_pp_sendf(data, &ftpc->pp, "PRET STOR %s", ftpc->file);
1347
0
      else
1348
0
        result = Curl_pp_sendf(data, &ftpc->pp, "PRET RETR %s", ftpc->file);
1349
0
      if(!result)
1350
0
        ftp_state(data, ftpc, FTP_PRET);
1351
0
    }
1352
0
    else
1353
0
      result = ftp_state_use_pasv(data, ftpc, conn);
1354
0
  }
1355
0
  return result;
1356
0
}
1357
1358
static CURLcode ftp_state_rest(struct Curl_easy *data,
1359
                               struct ftp_conn *ftpc,
1360
                               struct FTP *ftp)
1361
0
{
1362
0
  CURLcode result = CURLE_OK;
1363
1364
0
  if((ftp->transfer != PPTRANSFER_BODY) && ftpc->file) {
1365
    /* if a "head"-like request is being made (on a file) */
1366
1367
    /* Determine if server can respond to REST command and therefore
1368
       whether it supports range */
1369
0
    result = Curl_pp_sendf(data, &ftpc->pp, "REST %d", 0);
1370
0
    if(!result)
1371
0
      ftp_state(data, ftpc, FTP_REST);
1372
0
  }
1373
0
  else
1374
0
    result = ftp_state_prepare_transfer(data, ftpc, ftp);
1375
1376
0
  return result;
1377
0
}
1378
1379
static CURLcode ftp_state_size(struct Curl_easy *data,
1380
                               struct ftp_conn *ftpc,
1381
                               struct FTP *ftp)
1382
0
{
1383
0
  CURLcode result = CURLE_OK;
1384
1385
0
  if((ftp->transfer == PPTRANSFER_INFO) && ftpc->file) {
1386
    /* if a "head"-like request is being made (on a file) */
1387
1388
    /* we know ftpc->file is a valid pointer to a filename */
1389
0
    result = Curl_pp_sendf(data, &ftpc->pp, "SIZE %s", ftpc->file);
1390
0
    if(!result)
1391
0
      ftp_state(data, ftpc, FTP_SIZE);
1392
0
  }
1393
0
  else
1394
0
    result = ftp_state_rest(data, ftpc, ftp);
1395
1396
0
  return result;
1397
0
}
1398
1399
static CURLcode ftp_state_list(struct Curl_easy *data,
1400
                               struct ftp_conn *ftpc,
1401
                               struct FTP *ftp)
1402
0
{
1403
0
  CURLcode result = CURLE_OK;
1404
1405
  /* If this output is to be machine-parsed, the NLST command might be better
1406
     to use, since the LIST command output is not specified or standard in any
1407
     way. It has turned out that the NLST list output is not the same on all
1408
     servers either... */
1409
1410
  /*
1411
     if FTPFILE_NOCWD was specified, we should add the path
1412
     as argument for the LIST / NLST / or custom command.
1413
     Whether the server will support this, is uncertain.
1414
1415
     The other ftp_filemethods will CWD into dir/dir/ first and
1416
     then just do LIST (in that case: nothing to do here)
1417
  */
1418
0
  const char *lstArg = NULL;
1419
0
  int lstArglen = 0;
1420
0
  char *cmd;
1421
1422
0
  if((data->set.ftp_filemethod == FTPFILE_NOCWD) && ftp->path) {
1423
    /* url-decode before evaluation: e.g. paths starting/ending with %2f */
1424
0
    const char *rawPath = ftpc->rawpath;
1425
0
    const char *slashPos = strrchr(rawPath, '/');
1426
0
    if(slashPos) {
1427
      /* chop off the file part if format is dir/file otherwise remove
1428
         the trailing slash for dir/dir/ except for absolute path / */
1429
0
      size_t n = slashPos - rawPath;
1430
0
      if(n == 0)
1431
0
        ++n;
1432
1433
0
      lstArg = rawPath;
1434
0
      lstArglen = (int)n;
1435
0
    }
1436
0
  }
1437
1438
0
  cmd = aprintf("%s%s%.*s",
1439
0
                data->set.str[STRING_CUSTOMREQUEST] ?
1440
0
                data->set.str[STRING_CUSTOMREQUEST] :
1441
0
                (data->state.list_only ? "NLST" : "LIST"),
1442
0
                lstArg ? " " : "",
1443
0
                lstArglen, lstArg ? lstArg : "");
1444
1445
0
  if(!cmd)
1446
0
    return CURLE_OUT_OF_MEMORY;
1447
1448
0
  result = Curl_pp_sendf(data, &ftpc->pp, "%s", cmd);
1449
0
  free(cmd);
1450
1451
0
  if(!result)
1452
0
    ftp_state(data, ftpc, FTP_LIST);
1453
1454
0
  return result;
1455
0
}
1456
1457
static CURLcode ftp_state_list_prequote(struct Curl_easy *data,
1458
                                        struct ftp_conn *ftpc,
1459
                                        struct FTP *ftp)
1460
0
{
1461
  /* We have sent the TYPE, now we must send the list of prequote strings */
1462
0
  return ftp_state_quote(data, ftpc, ftp, TRUE, FTP_LIST_PREQUOTE);
1463
0
}
1464
1465
static CURLcode ftp_state_retr_prequote(struct Curl_easy *data,
1466
                                        struct ftp_conn *ftpc,
1467
                                        struct FTP *ftp)
1468
0
{
1469
  /* We have sent the TYPE, now we must send the list of prequote strings */
1470
0
  return ftp_state_quote(data, ftpc, ftp, TRUE, FTP_RETR_PREQUOTE);
1471
0
}
1472
1473
static CURLcode ftp_state_stor_prequote(struct Curl_easy *data,
1474
                                        struct ftp_conn *ftpc,
1475
                                        struct FTP *ftp)
1476
0
{
1477
  /* We have sent the TYPE, now we must send the list of prequote strings */
1478
0
  return ftp_state_quote(data, ftpc, ftp, TRUE, FTP_STOR_PREQUOTE);
1479
0
}
1480
1481
static CURLcode ftp_state_type(struct Curl_easy *data,
1482
                               struct ftp_conn *ftpc,
1483
                               struct FTP *ftp)
1484
0
{
1485
0
  CURLcode result = CURLE_OK;
1486
1487
  /* If we have selected NOBODY and HEADER, it means that we only want file
1488
     information. Which in FTP cannot be much more than the file size and
1489
     date. */
1490
0
  if(data->req.no_body && ftpc->file &&
1491
0
     ftp_need_type(ftpc, data->state.prefer_ascii)) {
1492
    /* The SIZE command is _not_ RFC 959 specified, and therefore many servers
1493
       may not support it! It is however the only way we have to get a file's
1494
       size! */
1495
1496
0
    ftp->transfer = PPTRANSFER_INFO;
1497
    /* this means no actual transfer will be made */
1498
1499
    /* Some servers return different sizes for different modes, and thus we
1500
       must set the proper type before we check the size */
1501
0
    result = ftp_nb_type(data, ftpc, ftp, data->state.prefer_ascii, FTP_TYPE);
1502
0
    if(result)
1503
0
      return result;
1504
0
  }
1505
0
  else
1506
0
    result = ftp_state_size(data, ftpc, ftp);
1507
1508
0
  return result;
1509
0
}
1510
1511
/* This is called after the CWD commands have been done in the beginning of
1512
   the DO phase */
1513
static CURLcode ftp_state_mdtm(struct Curl_easy *data,
1514
                               struct ftp_conn *ftpc,
1515
                               struct FTP *ftp)
1516
0
{
1517
0
  CURLcode result = CURLE_OK;
1518
1519
  /* Requested time of file or time-depended transfer? */
1520
0
  if((data->set.get_filetime || data->set.timecondition) && ftpc->file) {
1521
1522
    /* we have requested to get the modified-time of the file, this is a white
1523
       spot as the MDTM is not mentioned in RFC959 */
1524
0
    result = Curl_pp_sendf(data, &ftpc->pp, "MDTM %s", ftpc->file);
1525
1526
0
    if(!result)
1527
0
      ftp_state(data, ftpc, FTP_MDTM);
1528
0
  }
1529
0
  else
1530
0
    result = ftp_state_type(data, ftpc, ftp);
1531
1532
0
  return result;
1533
0
}
1534
1535
1536
/* This is called after the TYPE and possible quote commands have been sent */
1537
static CURLcode ftp_state_ul_setup(struct Curl_easy *data,
1538
                                   struct ftp_conn *ftpc,
1539
                                   struct FTP *ftp,
1540
                                   bool sizechecked)
1541
0
{
1542
0
  CURLcode result = CURLE_OK;
1543
0
  bool append = data->set.remote_append;
1544
1545
0
  if((data->state.resume_from && !sizechecked) ||
1546
0
     ((data->state.resume_from > 0) && sizechecked)) {
1547
    /* we are about to continue the uploading of a file */
1548
    /* 1. get already existing file's size. We use the SIZE command for this
1549
       which may not exist in the server!  The SIZE command is not in
1550
       RFC959. */
1551
1552
    /* 2. This used to set REST. But since we can do append, we
1553
       do not another ftp command. We just skip the source file
1554
       offset and then we APPEND the rest on the file instead */
1555
1556
    /* 3. pass file-size number of bytes in the source file */
1557
    /* 4. lower the infilesize counter */
1558
    /* => transfer as usual */
1559
0
    int seekerr = CURL_SEEKFUNC_OK;
1560
1561
0
    if(data->state.resume_from < 0) {
1562
      /* Got no given size to start from, figure it out */
1563
0
      result = Curl_pp_sendf(data, &ftpc->pp, "SIZE %s", ftpc->file);
1564
0
      if(!result)
1565
0
        ftp_state(data, ftpc, FTP_STOR_SIZE);
1566
0
      return result;
1567
0
    }
1568
1569
    /* enable append */
1570
0
    append = TRUE;
1571
1572
    /* Let's read off the proper amount of bytes from the input. */
1573
0
    if(data->set.seek_func) {
1574
0
      Curl_set_in_callback(data, TRUE);
1575
0
      seekerr = data->set.seek_func(data->set.seek_client,
1576
0
                                    data->state.resume_from, SEEK_SET);
1577
0
      Curl_set_in_callback(data, FALSE);
1578
0
    }
1579
1580
0
    if(seekerr != CURL_SEEKFUNC_OK) {
1581
0
      curl_off_t passed = 0;
1582
0
      if(seekerr != CURL_SEEKFUNC_CANTSEEK) {
1583
0
        failf(data, "Could not seek stream");
1584
0
        return CURLE_FTP_COULDNT_USE_REST;
1585
0
      }
1586
      /* seekerr == CURL_SEEKFUNC_CANTSEEK (cannot seek to offset) */
1587
0
      do {
1588
0
        char scratch[4*1024];
1589
0
        size_t readthisamountnow =
1590
0
          (data->state.resume_from - passed > (curl_off_t)sizeof(scratch)) ?
1591
0
          sizeof(scratch) :
1592
0
          curlx_sotouz(data->state.resume_from - passed);
1593
1594
0
        size_t actuallyread =
1595
0
          data->state.fread_func(scratch, 1, readthisamountnow,
1596
0
                                 data->state.in);
1597
1598
0
        passed += actuallyread;
1599
0
        if((actuallyread == 0) || (actuallyread > readthisamountnow)) {
1600
          /* this checks for greater-than only to make sure that the
1601
             CURL_READFUNC_ABORT return code still aborts */
1602
0
          failf(data, "Failed to read data");
1603
0
          return CURLE_FTP_COULDNT_USE_REST;
1604
0
        }
1605
0
      } while(passed < data->state.resume_from);
1606
0
    }
1607
    /* now, decrease the size of the read */
1608
0
    if(data->state.infilesize > 0) {
1609
0
      data->state.infilesize -= data->state.resume_from;
1610
1611
0
      if(data->state.infilesize <= 0) {
1612
0
        infof(data, "File already completely uploaded");
1613
1614
        /* no data to transfer */
1615
0
        Curl_xfer_setup_nop(data);
1616
1617
        /* Set ->transfer so that we will not get any error in
1618
         * ftp_done() because we did not transfer anything! */
1619
0
        ftp->transfer = PPTRANSFER_NONE;
1620
1621
0
        ftp_state(data, ftpc, FTP_STOP);
1622
0
        return CURLE_OK;
1623
0
      }
1624
0
    }
1625
    /* we have passed, proceed as normal */
1626
0
  } /* resume_from */
1627
1628
0
  result = Curl_pp_sendf(data, &ftpc->pp, append ? "APPE %s" : "STOR %s",
1629
0
                         ftpc->file);
1630
0
  if(!result)
1631
0
    ftp_state(data, ftpc, FTP_STOR);
1632
1633
0
  return result;
1634
0
}
1635
1636
static CURLcode ftp_state_quote(struct Curl_easy *data,
1637
                                struct ftp_conn *ftpc,
1638
                                struct FTP *ftp,
1639
                                bool init,
1640
                                ftpstate instate)
1641
0
{
1642
0
  CURLcode result = CURLE_OK;
1643
0
  bool quote = FALSE;
1644
0
  struct curl_slist *item;
1645
1646
0
  switch(instate) {
1647
0
  case FTP_QUOTE:
1648
0
  default:
1649
0
    item = data->set.quote;
1650
0
    break;
1651
0
  case FTP_RETR_PREQUOTE:
1652
0
  case FTP_STOR_PREQUOTE:
1653
0
  case FTP_LIST_PREQUOTE:
1654
0
    item = data->set.prequote;
1655
0
    break;
1656
0
  case FTP_POSTQUOTE:
1657
0
    item = data->set.postquote;
1658
0
    break;
1659
0
  }
1660
1661
  /*
1662
   * This state uses:
1663
   * 'count1' to iterate over the commands to send
1664
   * 'count2' to store whether to allow commands to fail
1665
   */
1666
1667
0
  if(init)
1668
0
    ftpc->count1 = 0;
1669
0
  else
1670
0
    ftpc->count1++;
1671
1672
0
  if(item) {
1673
0
    int i = 0;
1674
1675
    /* Skip count1 items in the linked list */
1676
0
    while((i < ftpc->count1) && item) {
1677
0
      item = item->next;
1678
0
      i++;
1679
0
    }
1680
0
    if(item) {
1681
0
      char *cmd = item->data;
1682
0
      if(cmd[0] == '*') {
1683
0
        cmd++;
1684
0
        ftpc->count2 = 1; /* the sent command is allowed to fail */
1685
0
      }
1686
0
      else
1687
0
        ftpc->count2 = 0; /* failure means cancel operation */
1688
1689
0
      result = Curl_pp_sendf(data, &ftpc->pp, "%s", cmd);
1690
0
      if(result)
1691
0
        return result;
1692
0
      ftp_state(data, ftpc, instate);
1693
0
      quote = TRUE;
1694
0
    }
1695
0
  }
1696
1697
0
  if(!quote) {
1698
    /* No more quote to send, continue to ... */
1699
0
    switch(instate) {
1700
0
    case FTP_QUOTE:
1701
0
    default:
1702
0
      result = ftp_state_cwd(data, ftpc, ftp);
1703
0
      break;
1704
0
    case FTP_RETR_PREQUOTE:
1705
0
      if(ftp->transfer != PPTRANSFER_BODY)
1706
0
        ftp_state(data, ftpc, FTP_STOP);
1707
0
      else {
1708
0
        if(ftpc->known_filesize != -1) {
1709
0
          Curl_pgrsSetDownloadSize(data, ftpc->known_filesize);
1710
0
          result = ftp_state_retr(data, ftpc, ftp, ftpc->known_filesize);
1711
0
        }
1712
0
        else {
1713
0
          if(data->set.ignorecl || data->state.prefer_ascii) {
1714
            /* 'ignorecl' is used to support download of growing files. It
1715
               prevents the state machine from requesting the file size from
1716
               the server. With an unknown file size the download continues
1717
               until the server terminates it, otherwise the client stops if
1718
               the received byte count exceeds the reported file size. Set
1719
               option CURLOPT_IGNORE_CONTENT_LENGTH to 1 to enable this
1720
               behavior.
1721
1722
               In addition: asking for the size for 'TYPE A' transfers is not
1723
               constructive since servers do not report the converted size. So
1724
               skip it.
1725
            */
1726
0
            result = Curl_pp_sendf(data, &ftpc->pp, "RETR %s", ftpc->file);
1727
0
            if(!result)
1728
0
              ftp_state(data, ftpc, FTP_RETR);
1729
0
          }
1730
0
          else {
1731
0
            result = Curl_pp_sendf(data, &ftpc->pp, "SIZE %s", ftpc->file);
1732
0
            if(!result)
1733
0
              ftp_state(data, ftpc, FTP_RETR_SIZE);
1734
0
          }
1735
0
        }
1736
0
      }
1737
0
      break;
1738
0
    case FTP_STOR_PREQUOTE:
1739
0
      result = ftp_state_ul_setup(data, ftpc, ftp, FALSE);
1740
0
      break;
1741
0
    case FTP_POSTQUOTE:
1742
0
      break;
1743
0
    case FTP_LIST_PREQUOTE:
1744
0
      ftp_state(data, ftpc, FTP_LIST_TYPE);
1745
0
      result = ftp_state_list(data, ftpc, ftp);
1746
0
      break;
1747
0
    }
1748
0
  }
1749
1750
0
  return result;
1751
0
}
1752
1753
/* called from ftp_state_pasv_resp to switch to PASV in case of EPSV
1754
   problems */
1755
static CURLcode ftp_epsv_disable(struct Curl_easy *data,
1756
                                 struct ftp_conn *ftpc,
1757
                                 struct connectdata *conn)
1758
0
{
1759
0
  CURLcode result = CURLE_OK;
1760
1761
0
  if(conn->bits.ipv6
1762
0
#ifndef CURL_DISABLE_PROXY
1763
0
     && !(conn->bits.tunnel_proxy || conn->bits.socksproxy)
1764
0
#endif
1765
0
    ) {
1766
    /* We cannot disable EPSV when doing IPv6, so this is instead a fail */
1767
0
    failf(data, "Failed EPSV attempt, exiting");
1768
0
    return CURLE_WEIRD_SERVER_REPLY;
1769
0
  }
1770
1771
0
  infof(data, "Failed EPSV attempt. Disabling EPSV");
1772
  /* disable it for next transfer */
1773
0
  conn->bits.ftp_use_epsv = FALSE;
1774
0
  close_secondarysocket(data, ftpc);
1775
0
  data->state.errorbuf = FALSE; /* allow error message to get
1776
                                         rewritten */
1777
0
  result = Curl_pp_sendf(data, &ftpc->pp, "%s", "PASV");
1778
0
  if(!result) {
1779
0
    ftpc->count1++;
1780
    /* remain in/go to the FTP_PASV state */
1781
0
    ftp_state(data, ftpc, FTP_PASV);
1782
0
  }
1783
0
  return result;
1784
0
}
1785
1786
1787
static char *control_address_dup(struct Curl_easy *data,
1788
                                 struct connectdata *conn)
1789
0
{
1790
0
    struct ip_quadruple ipquad;
1791
0
    bool is_ipv6;
1792
1793
  /* Returns the control connection IP address.
1794
     If a proxy tunnel is used, returns the original hostname instead, because
1795
     the effective control connection address is the proxy address,
1796
     not the ftp host. */
1797
0
#ifndef CURL_DISABLE_PROXY
1798
0
  if(conn->bits.tunnel_proxy || conn->bits.socksproxy)
1799
0
    return strdup(conn->host.name);
1800
0
#endif
1801
0
  if(!Curl_conn_get_ip_info(data, conn, FIRSTSOCKET, &is_ipv6, &ipquad))
1802
0
    return strdup(ipquad.remote_ip);
1803
0
  return NULL;
1804
0
}
1805
1806
static bool match_pasv_6nums(const char *p,
1807
                             unsigned int *array) /* 6 numbers */
1808
0
{
1809
0
  int i;
1810
0
  for(i = 0; i < 6; i++) {
1811
0
    curl_off_t num;
1812
0
    if(i) {
1813
0
      if(*p != ',')
1814
0
        return FALSE;
1815
0
      p++;
1816
0
    }
1817
0
    if(curlx_str_number(&p, &num, 0xff))
1818
0
      return FALSE;
1819
0
    array[i] = (unsigned int)num;
1820
0
  }
1821
0
  return TRUE;
1822
0
}
1823
1824
static CURLcode ftp_state_pasv_resp(struct Curl_easy *data,
1825
                                    struct ftp_conn *ftpc,
1826
                                    int ftpcode)
1827
0
{
1828
0
  struct connectdata *conn = data->conn;
1829
0
  CURLcode result;
1830
0
  struct Curl_dns_entry *dns = NULL;
1831
0
  unsigned short connectport; /* the local port connect() should use! */
1832
0
  struct pingpong *pp = &ftpc->pp;
1833
0
  char *str =
1834
0
    curlx_dyn_ptr(&pp->recvbuf) + 4; /* start on the first letter */
1835
1836
  /* if we come here again, make sure the former name is cleared */
1837
0
  Curl_safefree(ftpc->newhost);
1838
1839
0
  if((ftpc->count1 == 0) &&
1840
0
     (ftpcode == 229)) {
1841
    /* positive EPSV response */
1842
0
    char *ptr = strchr(str, '(');
1843
0
    if(ptr) {
1844
0
      char sep;
1845
0
      ptr++;
1846
      /* |||12345| */
1847
0
      sep = ptr[0];
1848
0
      if((ptr[1] == sep) && (ptr[2] == sep) && ISDIGIT(ptr[3])) {
1849
0
        const char *p = &ptr[3];
1850
0
        curl_off_t num;
1851
0
        if(curlx_str_number(&p, &num, 0xffff) || (*p != sep)) {
1852
0
          failf(data, "Illegal port number in EPSV reply");
1853
0
          return CURLE_FTP_WEIRD_PASV_REPLY;
1854
0
        }
1855
0
        ftpc->newport = (unsigned short)num;
1856
0
        ftpc->newhost = control_address_dup(data, conn);
1857
0
        if(!ftpc->newhost)
1858
0
          return CURLE_OUT_OF_MEMORY;
1859
0
      }
1860
0
      else
1861
0
        ptr = NULL;
1862
0
    }
1863
0
    if(!ptr) {
1864
0
      failf(data, "Weirdly formatted EPSV reply");
1865
0
      return CURLE_FTP_WEIRD_PASV_REPLY;
1866
0
    }
1867
0
  }
1868
0
  else if((ftpc->count1 == 1) &&
1869
0
          (ftpcode == 227)) {
1870
    /* positive PASV response */
1871
0
    unsigned int ip[6];
1872
1873
    /*
1874
     * Scan for a sequence of six comma-separated numbers and use them as
1875
     * IP+port indicators.
1876
     *
1877
     * Found reply-strings include:
1878
     * "227 Entering Passive Mode (127,0,0,1,4,51)"
1879
     * "227 Data transfer will passively listen to 127,0,0,1,4,51"
1880
     * "227 Entering passive mode. 127,0,0,1,4,51"
1881
     */
1882
0
    while(*str) {
1883
0
      if(match_pasv_6nums(str, ip))
1884
0
        break;
1885
0
      str++;
1886
0
    }
1887
1888
0
    if(!*str) {
1889
0
      failf(data, "Couldn't interpret the 227-response");
1890
0
      return CURLE_FTP_WEIRD_227_FORMAT;
1891
0
    }
1892
1893
    /* we got OK from server */
1894
0
    if(data->set.ftp_skip_ip) {
1895
      /* told to ignore the remotely given IP but instead use the host we used
1896
         for the control connection */
1897
0
      infof(data, "Skip %u.%u.%u.%u for data connection, reuse %s instead",
1898
0
            ip[0], ip[1], ip[2], ip[3],
1899
0
            conn->host.name);
1900
0
      ftpc->newhost = control_address_dup(data, conn);
1901
0
    }
1902
0
    else
1903
0
      ftpc->newhost = aprintf("%u.%u.%u.%u", ip[0], ip[1], ip[2], ip[3]);
1904
1905
0
    if(!ftpc->newhost)
1906
0
      return CURLE_OUT_OF_MEMORY;
1907
1908
0
    ftpc->newport = (unsigned short)(((ip[4] << 8) + ip[5]) & 0xffff);
1909
0
  }
1910
0
  else if(ftpc->count1 == 0) {
1911
    /* EPSV failed, move on to PASV */
1912
0
    return ftp_epsv_disable(data, ftpc, conn);
1913
0
  }
1914
0
  else {
1915
0
    failf(data, "Bad PASV/EPSV response: %03d", ftpcode);
1916
0
    return CURLE_FTP_WEIRD_PASV_REPLY;
1917
0
  }
1918
1919
0
#ifndef CURL_DISABLE_PROXY
1920
0
  if(conn->bits.proxy) {
1921
    /* This connection uses a proxy and we need to connect to the proxy again
1922
     * here. We do not want to rely on a former host lookup that might've
1923
     * expired now, instead we remake the lookup here and now! */
1924
0
    struct ip_quadruple ipquad;
1925
0
    bool is_ipv6;
1926
0
    const char * const host_name = conn->bits.socksproxy ?
1927
0
      conn->socks_proxy.host.name : conn->http_proxy.host.name;
1928
1929
0
    result = Curl_conn_get_ip_info(data, data->conn, FIRSTSOCKET,
1930
0
                                   &is_ipv6, &ipquad);
1931
0
    if(result)
1932
0
      return result;
1933
1934
0
    (void)Curl_resolv_blocking(data, host_name, ipquad.remote_port,
1935
0
                               is_ipv6 ? CURL_IPRESOLVE_V6 : CURL_IPRESOLVE_V4,
1936
0
                               &dns);
1937
    /* we connect to the proxy's port */
1938
0
    connectport = (unsigned short)ipquad.remote_port;
1939
1940
0
    if(!dns) {
1941
0
      failf(data, "cannot resolve proxy host %s:%hu", host_name, connectport);
1942
0
      return CURLE_COULDNT_RESOLVE_PROXY;
1943
0
    }
1944
0
  }
1945
0
  else
1946
0
#endif
1947
0
  {
1948
    /* normal, direct, ftp connection */
1949
0
    DEBUGASSERT(ftpc->newhost);
1950
1951
    /* postponed address resolution in case of tcp fastopen */
1952
0
    if(conn->bits.tcp_fastopen && !conn->bits.reuse && !ftpc->newhost[0]) {
1953
0
      free(ftpc->newhost);
1954
0
      ftpc->newhost = control_address_dup(data, conn);
1955
0
      if(!ftpc->newhost)
1956
0
        return CURLE_OUT_OF_MEMORY;
1957
0
    }
1958
1959
0
    (void)Curl_resolv_blocking(data, ftpc->newhost, ftpc->newport,
1960
0
                               conn->ip_version, &dns);
1961
0
    connectport = ftpc->newport; /* we connect to the remote port */
1962
1963
0
    if(!dns) {
1964
0
      failf(data, "cannot resolve new host %s:%hu",
1965
0
            ftpc->newhost, connectport);
1966
0
      return CURLE_FTP_CANT_GET_HOST;
1967
0
    }
1968
0
  }
1969
1970
0
  result = Curl_conn_setup(data, conn, SECONDARYSOCKET, dns,
1971
0
                           conn->bits.ftp_use_data_ssl ?
1972
0
                           CURL_CF_SSL_ENABLE : CURL_CF_SSL_DISABLE);
1973
1974
0
  if(result) {
1975
0
    if(ftpc->count1 == 0 && ftpcode == 229)
1976
0
      return ftp_epsv_disable(data, ftpc, conn);
1977
1978
0
    return result;
1979
0
  }
1980
1981
1982
  /*
1983
   * When this is used from the multi interface, this might've returned with
1984
   * the 'connected' set to FALSE and thus we are now awaiting a non-blocking
1985
   * connect to connect.
1986
   */
1987
1988
0
  if(data->set.verbose)
1989
    /* this just dumps information about this second connection */
1990
0
    ftp_pasv_verbose(data, dns->addr, ftpc->newhost, connectport);
1991
1992
0
  free(conn->secondaryhostname);
1993
0
  conn->secondary_port = ftpc->newport;
1994
0
  conn->secondaryhostname = strdup(ftpc->newhost);
1995
0
  if(!conn->secondaryhostname)
1996
0
    return CURLE_OUT_OF_MEMORY;
1997
1998
0
  conn->bits.do_more = TRUE;
1999
0
  ftp_state(data, ftpc, FTP_STOP); /* this phase is completed */
2000
2001
0
  return result;
2002
0
}
2003
2004
static CURLcode ftp_state_port_resp(struct Curl_easy *data,
2005
                                    struct ftp_conn *ftpc,
2006
                                    struct FTP *ftp,
2007
                                    int ftpcode)
2008
0
{
2009
0
  struct connectdata *conn = data->conn;
2010
0
  ftpport fcmd = (ftpport)ftpc->count1;
2011
0
  CURLcode result = CURLE_OK;
2012
2013
  /* The FTP spec tells a positive response should have code 200.
2014
     Be more permissive here to tolerate deviant servers. */
2015
0
  if(ftpcode / 100 != 2) {
2016
    /* the command failed */
2017
2018
0
    if(EPRT == fcmd) {
2019
0
      infof(data, "disabling EPRT usage");
2020
0
      conn->bits.ftp_use_eprt = FALSE;
2021
0
    }
2022
0
    fcmd++;
2023
2024
0
    if(fcmd == DONE) {
2025
0
      failf(data, "Failed to do PORT");
2026
0
      result = CURLE_FTP_PORT_FAILED;
2027
0
    }
2028
0
    else
2029
      /* try next */
2030
0
      result = ftp_state_use_port(data, ftpc, fcmd);
2031
0
  }
2032
0
  else {
2033
0
    infof(data, "Connect data stream actively");
2034
0
    ftp_state(data, ftpc, FTP_STOP); /* end of DO phase */
2035
0
    result = ftp_dophase_done(data, ftpc, ftp, FALSE);
2036
0
  }
2037
2038
0
  return result;
2039
0
}
2040
2041
static int twodigit(const char *p)
2042
0
{
2043
0
  return (p[0]-'0') * 10 + (p[1]-'0');
2044
0
}
2045
2046
static bool ftp_213_date(const char *p, int *year, int *month, int *day,
2047
                         int *hour, int *minute, int *second)
2048
0
{
2049
0
  size_t len = strlen(p);
2050
0
  if(len < 14)
2051
0
    return FALSE;
2052
0
  *year = twodigit(&p[0]) * 100 + twodigit(&p[2]);
2053
0
  *month = twodigit(&p[4]);
2054
0
  *day = twodigit(&p[6]);
2055
0
  *hour = twodigit(&p[8]);
2056
0
  *minute = twodigit(&p[10]);
2057
0
  *second = twodigit(&p[12]);
2058
2059
0
  if((*month > 12) || (*day > 31) || (*hour > 23) || (*minute > 59) ||
2060
0
     (*second > 60))
2061
0
    return FALSE;
2062
0
  return TRUE;
2063
0
}
2064
2065
static CURLcode client_write_header(struct Curl_easy *data,
2066
                                    char *buf, size_t blen)
2067
0
{
2068
  /* Some replies from an FTP server are written to the client
2069
   * as CLIENTWRITE_HEADER, formatted as if they came from a
2070
   * HTTP conversation.
2071
   * In all protocols, CLIENTWRITE_HEADER data is only passed to
2072
   * the body write callback when data->set.include_header is set
2073
   * via CURLOPT_HEADER.
2074
   * For historic reasons, FTP never played this game and expects
2075
   * all its headers to do that always. Set that flag during the
2076
   * call to Curl_client_write() so it does the right thing.
2077
   *
2078
   * Notice that we cannot enable this flag for FTP in general,
2079
   * as an FTP transfer might involve an HTTP proxy connection and
2080
   * headers from CONNECT should not automatically be part of the
2081
   * output. */
2082
0
  CURLcode result;
2083
0
  bool save = data->set.include_header;
2084
0
  data->set.include_header = TRUE;
2085
0
  result = Curl_client_write(data, CLIENTWRITE_HEADER, buf, blen);
2086
0
  data->set.include_header = save;
2087
0
  return result;
2088
0
}
2089
2090
static CURLcode ftp_state_mdtm_resp(struct Curl_easy *data,
2091
                                    struct ftp_conn *ftpc,
2092
                                    struct FTP *ftp,
2093
                                    int ftpcode)
2094
0
{
2095
0
  CURLcode result = CURLE_OK;
2096
2097
0
  switch(ftpcode) {
2098
0
  case 213:
2099
0
    {
2100
      /* we got a time. Format should be: "YYYYMMDDHHMMSS[.sss]" where the
2101
         last .sss part is optional and means fractions of a second */
2102
0
      int year, month, day, hour, minute, second;
2103
0
      struct pingpong *pp = &ftpc->pp;
2104
0
      char *resp = curlx_dyn_ptr(&pp->recvbuf) + 4;
2105
0
      if(ftp_213_date(resp, &year, &month, &day, &hour, &minute, &second)) {
2106
        /* we have a time, reformat it */
2107
0
        char timebuf[24];
2108
0
        msnprintf(timebuf, sizeof(timebuf),
2109
0
                  "%04d%02d%02d %02d:%02d:%02d GMT",
2110
0
                  year, month, day, hour, minute, second);
2111
        /* now, convert this into a time() value: */
2112
0
        data->info.filetime = Curl_getdate_capped(timebuf);
2113
0
      }
2114
2115
0
#ifdef CURL_FTP_HTTPSTYLE_HEAD
2116
      /* If we asked for a time of the file and we actually got one as well,
2117
         we "emulate" an HTTP-style header in our output. */
2118
2119
#if defined(__GNUC__) && (defined(__DJGPP__) || defined(__AMIGA__))
2120
#pragma GCC diagnostic push
2121
/* 'time_t' is unsigned in MSDOS and AmigaOS. Silence:
2122
   warning: comparison of unsigned expression in '>= 0' is always true */
2123
#pragma GCC diagnostic ignored "-Wtype-limits"
2124
#endif
2125
0
      if(data->req.no_body &&
2126
0
         ftpc->file &&
2127
0
         data->set.get_filetime &&
2128
0
         (data->info.filetime >= 0) ) {
2129
#if defined(__GNUC__) && (defined(__DJGPP__) || defined(__AMIGA__))
2130
#pragma GCC diagnostic pop
2131
#endif
2132
0
        char headerbuf[128];
2133
0
        int headerbuflen;
2134
0
        time_t filetime = data->info.filetime;
2135
0
        struct tm buffer;
2136
0
        const struct tm *tm = &buffer;
2137
2138
0
        result = Curl_gmtime(filetime, &buffer);
2139
0
        if(result)
2140
0
          return result;
2141
2142
        /* format: "Tue, 15 Nov 1994 12:45:26" */
2143
0
        headerbuflen =
2144
0
          msnprintf(headerbuf, sizeof(headerbuf),
2145
0
                    "Last-Modified: %s, %02d %s %4d %02d:%02d:%02d GMT\r\n",
2146
0
                    Curl_wkday[tm->tm_wday ? tm->tm_wday-1 : 6],
2147
0
                    tm->tm_mday,
2148
0
                    Curl_month[tm->tm_mon],
2149
0
                    tm->tm_year + 1900,
2150
0
                    tm->tm_hour,
2151
0
                    tm->tm_min,
2152
0
                    tm->tm_sec);
2153
0
        result = client_write_header(data, headerbuf, headerbuflen);
2154
0
        if(result)
2155
0
          return result;
2156
0
      } /* end of a ridiculous amount of conditionals */
2157
0
#endif
2158
0
    }
2159
0
    break;
2160
0
  default:
2161
0
    infof(data, "unsupported MDTM reply format");
2162
0
    break;
2163
0
  case 550: /* 550 is used for several different problems, e.g.
2164
               "No such file or directory" or "Permission denied".
2165
               It does not mean that the file does not exist at all. */
2166
0
    infof(data, "MDTM failed: file does not exist or permission problem,"
2167
0
          " continuing");
2168
0
    break;
2169
0
  }
2170
2171
0
  if(data->set.timecondition) {
2172
0
    if((data->info.filetime > 0) && (data->set.timevalue > 0)) {
2173
0
      switch(data->set.timecondition) {
2174
0
      case CURL_TIMECOND_IFMODSINCE:
2175
0
      default:
2176
0
        if(data->info.filetime <= data->set.timevalue) {
2177
0
          infof(data, "The requested document is not new enough");
2178
0
          ftp->transfer = PPTRANSFER_NONE; /* mark to not transfer data */
2179
0
          data->info.timecond = TRUE;
2180
0
          ftp_state(data, ftpc, FTP_STOP);
2181
0
          return CURLE_OK;
2182
0
        }
2183
0
        break;
2184
0
      case CURL_TIMECOND_IFUNMODSINCE:
2185
0
        if(data->info.filetime > data->set.timevalue) {
2186
0
          infof(data, "The requested document is not old enough");
2187
0
          ftp->transfer = PPTRANSFER_NONE; /* mark to not transfer data */
2188
0
          data->info.timecond = TRUE;
2189
0
          ftp_state(data, ftpc, FTP_STOP);
2190
0
          return CURLE_OK;
2191
0
        }
2192
0
        break;
2193
0
      } /* switch */
2194
0
    }
2195
0
    else {
2196
0
      infof(data, "Skipping time comparison");
2197
0
    }
2198
0
  }
2199
2200
0
  if(!result)
2201
0
    result = ftp_state_type(data, ftpc, ftp);
2202
2203
0
  return result;
2204
0
}
2205
2206
static CURLcode ftp_state_type_resp(struct Curl_easy *data,
2207
                                    struct ftp_conn *ftpc,
2208
                                    struct FTP *ftp,
2209
                                    int ftpcode,
2210
                                    ftpstate instate)
2211
0
{
2212
0
  CURLcode result = CURLE_OK;
2213
2214
0
  if(ftpcode/100 != 2) {
2215
    /* "sasserftpd" and "(u)r(x)bot ftpd" both responds with 226 after a
2216
       successful 'TYPE I'. While that is not as RFC959 says, it is still a
2217
       positive response code and we allow that. */
2218
0
    failf(data, "Couldn't set desired mode");
2219
0
    return CURLE_FTP_COULDNT_SET_TYPE;
2220
0
  }
2221
0
  if(ftpcode != 200)
2222
0
    infof(data, "Got a %03d response code instead of the assumed 200",
2223
0
          ftpcode);
2224
2225
0
  if(instate == FTP_TYPE)
2226
0
    result = ftp_state_size(data, ftpc, ftp);
2227
0
  else if(instate == FTP_LIST_TYPE)
2228
0
    result = ftp_state_list(data, ftpc, ftp);
2229
0
  else if(instate == FTP_RETR_TYPE)
2230
0
    result = ftp_state_retr_prequote(data, ftpc, ftp);
2231
0
  else if(instate == FTP_STOR_TYPE)
2232
0
    result = ftp_state_stor_prequote(data, ftpc, ftp);
2233
0
  else if(instate == FTP_RETR_LIST_TYPE)
2234
0
    result = ftp_state_list_prequote(data, ftpc, ftp);
2235
2236
0
  return result;
2237
0
}
2238
2239
static CURLcode ftp_state_retr(struct Curl_easy *data,
2240
                               struct ftp_conn *ftpc,
2241
                               struct FTP *ftp,
2242
                               curl_off_t filesize)
2243
0
{
2244
0
  CURLcode result = CURLE_OK;
2245
2246
0
  CURL_TRC_FTP(data, "[%s] ftp_state_retr()", FTP_CSTATE(ftpc));
2247
0
  if(data->set.max_filesize && (filesize > data->set.max_filesize)) {
2248
0
    failf(data, "Maximum file size exceeded");
2249
0
    return CURLE_FILESIZE_EXCEEDED;
2250
0
  }
2251
0
  ftp->downloadsize = filesize;
2252
2253
0
  if(data->state.resume_from) {
2254
    /* We always (attempt to) get the size of downloads, so it is done before
2255
       this even when not doing resumes. */
2256
0
    if(filesize == -1) {
2257
0
      infof(data, "ftp server does not support SIZE");
2258
      /* We could not get the size and therefore we cannot know if there really
2259
         is a part of the file left to get, although the server will just
2260
         close the connection when we start the connection so it will not cause
2261
         us any harm, just not make us exit as nicely. */
2262
0
    }
2263
0
    else {
2264
      /* We got a file size report, so we check that there actually is a
2265
         part of the file left to get, or else we go home.  */
2266
0
      if(data->state.resume_from < 0) {
2267
        /* We are supposed to download the last abs(from) bytes */
2268
0
        if(filesize < -data->state.resume_from) {
2269
0
          failf(data, "Offset (%" FMT_OFF_T
2270
0
                ") was beyond file size (%" FMT_OFF_T ")",
2271
0
                data->state.resume_from, filesize);
2272
0
          return CURLE_BAD_DOWNLOAD_RESUME;
2273
0
        }
2274
        /* convert to size to download */
2275
0
        ftp->downloadsize = -data->state.resume_from;
2276
        /* download from where? */
2277
0
        data->state.resume_from = filesize - ftp->downloadsize;
2278
0
      }
2279
0
      else {
2280
0
        if(filesize < data->state.resume_from) {
2281
0
          failf(data, "Offset (%" FMT_OFF_T
2282
0
                ") was beyond file size (%" FMT_OFF_T ")",
2283
0
                data->state.resume_from, filesize);
2284
0
          return CURLE_BAD_DOWNLOAD_RESUME;
2285
0
        }
2286
        /* Now store the number of bytes we are expected to download */
2287
0
        ftp->downloadsize = filesize-data->state.resume_from;
2288
0
      }
2289
0
    }
2290
2291
0
    if(ftp->downloadsize == 0) {
2292
      /* no data to transfer */
2293
0
      Curl_xfer_setup_nop(data);
2294
0
      infof(data, "File already completely downloaded");
2295
2296
      /* Set ->transfer so that we will not get any error in ftp_done()
2297
       * because we did not transfer the any file */
2298
0
      ftp->transfer = PPTRANSFER_NONE;
2299
0
      ftp_state(data, ftpc, FTP_STOP);
2300
0
      return CURLE_OK;
2301
0
    }
2302
2303
    /* Set resume file transfer offset */
2304
0
    infof(data, "Instructs server to resume from offset %" FMT_OFF_T,
2305
0
          data->state.resume_from);
2306
2307
0
    result = Curl_pp_sendf(data, &ftpc->pp, "REST %" FMT_OFF_T,
2308
0
                           data->state.resume_from);
2309
0
    if(!result)
2310
0
      ftp_state(data, ftpc, FTP_RETR_REST);
2311
0
  }
2312
0
  else {
2313
    /* no resume */
2314
0
    result = Curl_pp_sendf(data, &ftpc->pp, "RETR %s", ftpc->file);
2315
0
    if(!result)
2316
0
      ftp_state(data, ftpc, FTP_RETR);
2317
0
  }
2318
2319
0
  return result;
2320
0
}
2321
2322
static CURLcode ftp_state_size_resp(struct Curl_easy *data,
2323
                                    struct ftp_conn *ftpc,
2324
                                    struct FTP *ftp,
2325
                                    int ftpcode,
2326
                                    ftpstate instate)
2327
0
{
2328
0
  CURLcode result = CURLE_OK;
2329
0
  curl_off_t filesize = -1;
2330
0
  char *buf = curlx_dyn_ptr(&ftpc->pp.recvbuf);
2331
0
  size_t len = ftpc->pp.nfinal;
2332
2333
  /* get the size from the ascii string: */
2334
0
  if(ftpcode == 213) {
2335
    /* To allow servers to prepend "rubbish" in the response string, we scan
2336
       for all the digits at the end of the response and parse only those as a
2337
       number. */
2338
0
    char *start = &buf[4];
2339
0
    const char *fdigit = memchr(start, '\r', len);
2340
0
    if(fdigit) {
2341
0
      fdigit--;
2342
0
      if(*fdigit == '\n')
2343
0
        fdigit--;
2344
0
      while(ISDIGIT(fdigit[-1]) && (fdigit > start))
2345
0
        fdigit--;
2346
0
    }
2347
0
    else
2348
0
      fdigit = start;
2349
0
    if(curlx_str_number(&fdigit, &filesize, CURL_OFF_T_MAX))
2350
0
      filesize = -1; /* size remain unknown */
2351
0
  }
2352
0
  else if(ftpcode == 550) { /* "No such file or directory" */
2353
    /* allow a SIZE failure for (resumed) uploads, when probing what command
2354
       to use */
2355
0
    if(instate != FTP_STOR_SIZE) {
2356
0
      failf(data, "The file does not exist");
2357
0
      return CURLE_REMOTE_FILE_NOT_FOUND;
2358
0
    }
2359
0
  }
2360
2361
0
  if(instate == FTP_SIZE) {
2362
0
#ifdef CURL_FTP_HTTPSTYLE_HEAD
2363
0
    if(filesize != -1) {
2364
0
      char clbuf[128];
2365
0
      int clbuflen = msnprintf(clbuf, sizeof(clbuf),
2366
0
                "Content-Length: %" FMT_OFF_T "\r\n", filesize);
2367
0
      result = client_write_header(data, clbuf, clbuflen);
2368
0
      if(result)
2369
0
        return result;
2370
0
    }
2371
0
#endif
2372
0
    Curl_pgrsSetDownloadSize(data, filesize);
2373
0
    result = ftp_state_rest(data, ftpc, ftp);
2374
0
  }
2375
0
  else if(instate == FTP_RETR_SIZE) {
2376
0
    Curl_pgrsSetDownloadSize(data, filesize);
2377
0
    result = ftp_state_retr(data, ftpc, ftp, filesize);
2378
0
  }
2379
0
  else if(instate == FTP_STOR_SIZE) {
2380
0
    data->state.resume_from = filesize;
2381
0
    result = ftp_state_ul_setup(data, ftpc, ftp, TRUE);
2382
0
  }
2383
2384
0
  return result;
2385
0
}
2386
2387
static CURLcode ftp_state_rest_resp(struct Curl_easy *data,
2388
                                    struct ftp_conn *ftpc,
2389
                                    struct FTP *ftp,
2390
                                    int ftpcode,
2391
                                    ftpstate instate)
2392
0
{
2393
0
  CURLcode result = CURLE_OK;
2394
2395
0
  switch(instate) {
2396
0
  case FTP_REST:
2397
0
  default:
2398
0
#ifdef CURL_FTP_HTTPSTYLE_HEAD
2399
0
    if(ftpcode == 350) {
2400
0
      char buffer[24]= { "Accept-ranges: bytes\r\n" };
2401
0
      result = client_write_header(data, buffer, strlen(buffer));
2402
0
      if(result)
2403
0
        return result;
2404
0
    }
2405
0
#endif
2406
0
    result = ftp_state_prepare_transfer(data, ftpc, ftp);
2407
0
    break;
2408
2409
0
  case FTP_RETR_REST:
2410
0
    if(ftpcode != 350) {
2411
0
      failf(data, "Couldn't use REST");
2412
0
      result = CURLE_FTP_COULDNT_USE_REST;
2413
0
    }
2414
0
    else {
2415
0
      result = Curl_pp_sendf(data, &ftpc->pp, "RETR %s", ftpc->file);
2416
0
      if(!result)
2417
0
        ftp_state(data, ftpc, FTP_RETR);
2418
0
    }
2419
0
    break;
2420
0
  }
2421
2422
0
  return result;
2423
0
}
2424
2425
static CURLcode ftp_state_stor_resp(struct Curl_easy *data,
2426
                                    struct ftp_conn *ftpc,
2427
                                    int ftpcode, ftpstate instate)
2428
0
{
2429
0
  CURLcode result = CURLE_OK;
2430
2431
0
  if(ftpcode >= 400) {
2432
0
    failf(data, "Failed FTP upload: %0d", ftpcode);
2433
0
    ftp_state(data, ftpc, FTP_STOP);
2434
    /* oops, we never close the sockets! */
2435
0
    return CURLE_UPLOAD_FAILED;
2436
0
  }
2437
2438
0
  ftpc->state_saved = instate;
2439
2440
  /* PORT means we are now awaiting the server to connect to us. */
2441
0
  if(data->set.ftp_use_port) {
2442
0
    bool connected;
2443
2444
0
    ftp_state(data, ftpc, FTP_STOP); /* no longer in STOR state */
2445
2446
0
    result = Curl_conn_connect(data, SECONDARYSOCKET, FALSE, &connected);
2447
0
    if(result)
2448
0
      return result;
2449
2450
0
    if(!connected) {
2451
0
      infof(data, "Data conn was not available immediately");
2452
0
      ftpc->wait_data_conn = TRUE;
2453
0
      return ftp_check_ctrl_on_data_wait(data, ftpc);
2454
0
    }
2455
0
    ftpc->wait_data_conn = FALSE;
2456
0
  }
2457
0
  return ftp_initiate_transfer(data, ftpc);
2458
0
}
2459
2460
/* for LIST and RETR responses */
2461
static CURLcode ftp_state_get_resp(struct Curl_easy *data,
2462
                                   struct ftp_conn *ftpc,
2463
                                   struct FTP *ftp,
2464
                                   int ftpcode,
2465
                                   ftpstate instate)
2466
0
{
2467
0
  CURLcode result = CURLE_OK;
2468
2469
0
  if((ftpcode == 150) || (ftpcode == 125)) {
2470
2471
    /*
2472
      A;
2473
      150 Opening BINARY mode data connection for /etc/passwd (2241
2474
      bytes).  (ok, the file is being transferred)
2475
2476
      B:
2477
      150 Opening ASCII mode data connection for /bin/ls
2478
2479
      C:
2480
      150 ASCII data connection for /bin/ls (137.167.104.91,37445) (0 bytes).
2481
2482
      D:
2483
      150 Opening ASCII mode data connection for [file] (0.0.0.0,0) (545 bytes)
2484
2485
      E:
2486
      125 Data connection already open; Transfer starting. */
2487
2488
0
    curl_off_t size = -1; /* default unknown size */
2489
2490
2491
    /*
2492
     * It appears that there are FTP-servers that return size 0 for files when
2493
     * SIZE is used on the file while being in BINARY mode. To work around
2494
     * that (stupid) behavior, we attempt to parse the RETR response even if
2495
     * the SIZE returned size zero.
2496
     *
2497
     * Debugging help from Salvatore Sorrentino on February 26, 2003.
2498
     */
2499
2500
0
    if((instate != FTP_LIST) &&
2501
0
       !data->state.prefer_ascii &&
2502
0
       !data->set.ignorecl &&
2503
0
       (ftp->downloadsize < 1)) {
2504
      /*
2505
       * It seems directory listings either do not show the size or often uses
2506
       * size 0 anyway. ASCII transfers may cause that the transferred amount
2507
       * of data is not the same as this line tells, why using this number in
2508
       * those cases only confuses us.
2509
       *
2510
       * Example D above makes this parsing a little tricky */
2511
0
      const char *bytes;
2512
0
      char *buf = curlx_dyn_ptr(&ftpc->pp.recvbuf);
2513
0
      bytes = strstr(buf, " bytes");
2514
0
      if(bytes) {
2515
0
        long in = (long)(--bytes-buf);
2516
        /* this is a hint there is size information in there! ;-) */
2517
0
        while(--in) {
2518
          /* scan for the left parenthesis and break there */
2519
0
          if('(' == *bytes)
2520
0
            break;
2521
          /* skip only digits */
2522
0
          if(!ISDIGIT(*bytes)) {
2523
0
            bytes = NULL;
2524
0
            break;
2525
0
          }
2526
          /* one more estep backwards */
2527
0
          bytes--;
2528
0
        }
2529
        /* if we have nothing but digits: */
2530
0
        if(bytes) {
2531
0
          ++bytes;
2532
          /* get the number! */
2533
0
          if(curlx_str_number(&bytes, &size, CURL_OFF_T_MAX))
2534
0
            size = 1;
2535
0
        }
2536
0
      }
2537
0
    }
2538
0
    else if(ftp->downloadsize > -1)
2539
0
      size = ftp->downloadsize;
2540
2541
0
    if(size > data->req.maxdownload && data->req.maxdownload > 0)
2542
0
      size = data->req.size = data->req.maxdownload;
2543
0
    else if((instate != FTP_LIST) && (data->state.prefer_ascii))
2544
0
      size = -1; /* kludge for servers that understate ASCII mode file size */
2545
2546
0
    infof(data, "Maxdownload = %" FMT_OFF_T, data->req.maxdownload);
2547
2548
0
    if(instate != FTP_LIST)
2549
0
      infof(data, "Getting file with size: %" FMT_OFF_T, size);
2550
2551
    /* FTP download: */
2552
0
    ftpc->state_saved = instate;
2553
0
    ftpc->retr_size_saved = size;
2554
2555
0
    if(data->set.ftp_use_port) {
2556
0
      bool connected;
2557
2558
0
      result = Curl_conn_connect(data, SECONDARYSOCKET, FALSE, &connected);
2559
0
      if(result)
2560
0
        return result;
2561
2562
0
      if(!connected) {
2563
0
        infof(data, "Data conn was not available immediately");
2564
0
        ftp_state(data, ftpc, FTP_STOP);
2565
0
        ftpc->wait_data_conn = TRUE;
2566
0
        return ftp_check_ctrl_on_data_wait(data, ftpc);
2567
0
      }
2568
0
      ftpc->wait_data_conn = FALSE;
2569
0
    }
2570
0
    return ftp_initiate_transfer(data, ftpc);
2571
0
  }
2572
0
  else {
2573
0
    if((instate == FTP_LIST) && (ftpcode == 450)) {
2574
      /* simply no matching files in the dir listing */
2575
0
      ftp->transfer = PPTRANSFER_NONE; /* do not download anything */
2576
0
      ftp_state(data, ftpc, FTP_STOP); /* this phase is over */
2577
0
    }
2578
0
    else {
2579
0
      failf(data, "RETR response: %03d", ftpcode);
2580
0
      return instate == FTP_RETR && ftpcode == 550 ?
2581
0
        CURLE_REMOTE_FILE_NOT_FOUND :
2582
0
        CURLE_FTP_COULDNT_RETR_FILE;
2583
0
    }
2584
0
  }
2585
2586
0
  return result;
2587
0
}
2588
2589
/* after USER, PASS and ACCT */
2590
static CURLcode ftp_state_loggedin(struct Curl_easy *data,
2591
                                   struct ftp_conn *ftpc)
2592
0
{
2593
0
  CURLcode result = CURLE_OK;
2594
2595
0
  if(data->conn->bits.ftp_use_control_ssl) {
2596
    /* PBSZ = PROTECTION BUFFER SIZE.
2597
2598
    The 'draft-murray-auth-ftp-ssl' (draft 12, page 7) says:
2599
2600
    Specifically, the PROT command MUST be preceded by a PBSZ
2601
    command and a PBSZ command MUST be preceded by a successful
2602
    security data exchange (the TLS negotiation in this case)
2603
2604
    ... (and on page 8):
2605
2606
    Thus the PBSZ command must still be issued, but must have a
2607
    parameter of '0' to indicate that no buffering is taking place
2608
    and the data connection should not be encapsulated.
2609
    */
2610
0
    result = Curl_pp_sendf(data, &ftpc->pp, "PBSZ %d", 0);
2611
0
    if(!result)
2612
0
      ftp_state(data, ftpc, FTP_PBSZ);
2613
0
  }
2614
0
  else {
2615
0
    result = ftp_state_pwd(data, ftpc);
2616
0
  }
2617
0
  return result;
2618
0
}
2619
2620
/* for USER and PASS responses */
2621
static CURLcode ftp_state_user_resp(struct Curl_easy *data,
2622
                                    struct ftp_conn *ftpc,
2623
                                    int ftpcode)
2624
0
{
2625
0
  CURLcode result = CURLE_OK;
2626
2627
  /* some need password anyway, and others just return 2xx ignored */
2628
0
  if((ftpcode == 331) && (ftpc->state == FTP_USER)) {
2629
    /* 331 Password required for ...
2630
       (the server requires to send the user's password too) */
2631
0
    result = Curl_pp_sendf(data, &ftpc->pp, "PASS %s",
2632
0
                           data->conn->passwd ? data->conn->passwd : "");
2633
0
    if(!result)
2634
0
      ftp_state(data, ftpc, FTP_PASS);
2635
0
  }
2636
0
  else if(ftpcode/100 == 2) {
2637
    /* 230 User ... logged in.
2638
       (the user logged in with or without password) */
2639
0
    result = ftp_state_loggedin(data, ftpc);
2640
0
  }
2641
0
  else if(ftpcode == 332) {
2642
0
    if(data->set.str[STRING_FTP_ACCOUNT]) {
2643
0
      result = Curl_pp_sendf(data, &ftpc->pp, "ACCT %s",
2644
0
                             data->set.str[STRING_FTP_ACCOUNT]);
2645
0
      if(!result)
2646
0
        ftp_state(data, ftpc, FTP_ACCT);
2647
0
    }
2648
0
    else {
2649
0
      failf(data, "ACCT requested but none available");
2650
0
      result = CURLE_LOGIN_DENIED;
2651
0
    }
2652
0
  }
2653
0
  else {
2654
    /* All other response codes, like:
2655
2656
    530 User ... access denied
2657
    (the server denies to log the specified user) */
2658
2659
0
    if(data->set.str[STRING_FTP_ALTERNATIVE_TO_USER] &&
2660
0
       !ftpc->ftp_trying_alternative) {
2661
      /* Ok, USER failed. Let's try the supplied command. */
2662
0
      result =
2663
0
        Curl_pp_sendf(data, &ftpc->pp, "%s",
2664
0
                      data->set.str[STRING_FTP_ALTERNATIVE_TO_USER]);
2665
0
      if(!result) {
2666
0
        ftpc->ftp_trying_alternative = TRUE;
2667
0
        ftp_state(data, ftpc, FTP_USER);
2668
0
      }
2669
0
    }
2670
0
    else {
2671
0
      failf(data, "Access denied: %03d", ftpcode);
2672
0
      result = CURLE_LOGIN_DENIED;
2673
0
    }
2674
0
  }
2675
0
  return result;
2676
0
}
2677
2678
/* for ACCT response */
2679
static CURLcode ftp_state_acct_resp(struct Curl_easy *data,
2680
                                    struct ftp_conn *ftpc,
2681
                                    int ftpcode)
2682
0
{
2683
0
  CURLcode result = CURLE_OK;
2684
0
  if(ftpcode != 230) {
2685
0
    failf(data, "ACCT rejected by server: %03d", ftpcode);
2686
0
    result = CURLE_FTP_WEIRD_PASS_REPLY; /* FIX */
2687
0
  }
2688
0
  else
2689
0
    result = ftp_state_loggedin(data, ftpc);
2690
2691
0
  return result;
2692
0
}
2693
2694
static CURLcode ftp_pwd_resp(struct Curl_easy *data,
2695
                             struct ftp_conn *ftpc,
2696
                             int ftpcode)
2697
0
{
2698
0
  struct pingpong *pp = &ftpc->pp;
2699
0
  CURLcode result;
2700
2701
0
  if(ftpcode == 257) {
2702
0
    char *ptr = curlx_dyn_ptr(&pp->recvbuf) + 4; /* start on the first
2703
                                                    letter */
2704
0
    bool entry_extracted = FALSE;
2705
0
    struct dynbuf out;
2706
0
    curlx_dyn_init(&out, 1000);
2707
2708
    /* Reply format is like
2709
       257<space>[rubbish]"<directory-name>"<space><commentary> and the
2710
       RFC959 says
2711
2712
       The directory name can contain any character; embedded
2713
       double-quotes should be escaped by double-quotes (the
2714
       "quote-doubling" convention).
2715
    */
2716
2717
    /* scan for the first double-quote for non-standard responses */
2718
0
    while(*ptr != '\n' && *ptr != '\0' && *ptr != '"')
2719
0
      ptr++;
2720
2721
0
    if('\"' == *ptr) {
2722
      /* it started good */
2723
0
      for(ptr++; *ptr; ptr++) {
2724
0
        if('\"' == *ptr) {
2725
0
          if('\"' == ptr[1]) {
2726
            /* "quote-doubling" */
2727
0
            result = curlx_dyn_addn(&out, &ptr[1], 1);
2728
0
            ptr++;
2729
0
          }
2730
0
          else {
2731
            /* end of path */
2732
0
            if(curlx_dyn_len(&out))
2733
0
              entry_extracted = TRUE;
2734
0
            break; /* get out of this loop */
2735
0
          }
2736
0
        }
2737
0
        else
2738
0
          result = curlx_dyn_addn(&out, ptr, 1);
2739
0
        if(result)
2740
0
          return result;
2741
0
      }
2742
0
    }
2743
0
    if(entry_extracted) {
2744
      /* If the path name does not look like an absolute path (i.e.: it
2745
         does not start with a '/'), we probably need some server-dependent
2746
         adjustments. For example, this is the case when connecting to
2747
         an OS400 FTP server: this server supports two name syntaxes,
2748
         the default one being incompatible with standard paths. In
2749
         addition, this server switches automatically to the regular path
2750
         syntax when one is encountered in a command: this results in
2751
         having an entrypath in the wrong syntax when later used in CWD.
2752
         The method used here is to check the server OS: we do it only
2753
         if the path name looks strange to minimize overhead on other
2754
         systems. */
2755
0
      char *dir = curlx_dyn_ptr(&out);
2756
2757
0
      if(!ftpc->server_os && dir[0] != '/') {
2758
0
        result = Curl_pp_sendf(data, &ftpc->pp, "%s", "SYST");
2759
0
        if(result) {
2760
0
          free(dir);
2761
0
          return result;
2762
0
        }
2763
0
        free(ftpc->entrypath);
2764
0
        ftpc->entrypath = dir; /* remember this */
2765
0
        infof(data, "Entry path is '%s'", ftpc->entrypath);
2766
        /* also save it where getinfo can access it: */
2767
0
        free(data->state.most_recent_ftp_entrypath);
2768
0
        data->state.most_recent_ftp_entrypath = strdup(ftpc->entrypath);
2769
0
        if(!data->state.most_recent_ftp_entrypath)
2770
0
          return CURLE_OUT_OF_MEMORY;
2771
0
        ftp_state(data, ftpc, FTP_SYST);
2772
0
        return result;
2773
0
      }
2774
2775
0
      free(ftpc->entrypath);
2776
0
      ftpc->entrypath = dir; /* remember this */
2777
0
      infof(data, "Entry path is '%s'", ftpc->entrypath);
2778
      /* also save it where getinfo can access it: */
2779
0
      free(data->state.most_recent_ftp_entrypath);
2780
0
      data->state.most_recent_ftp_entrypath = strdup(ftpc->entrypath);
2781
0
      if(!data->state.most_recent_ftp_entrypath)
2782
0
        return CURLE_OUT_OF_MEMORY;
2783
0
    }
2784
0
    else {
2785
      /* could not get the path */
2786
0
      curlx_dyn_free(&out);
2787
0
      infof(data, "Failed to figure out path");
2788
0
    }
2789
0
  }
2790
0
  ftp_state(data, ftpc, FTP_STOP); /* we are done with CONNECT phase! */
2791
0
  CURL_TRC_FTP(data, "[%s] protocol connect phase DONE", FTP_CSTATE(ftpc));
2792
0
  return CURLE_OK;
2793
0
}
2794
2795
static const char * const ftpauth[] = { "SSL", "TLS" };
2796
2797
static CURLcode ftp_wait_resp(struct Curl_easy *data,
2798
                              struct connectdata *conn,
2799
                              struct ftp_conn *ftpc,
2800
                              int ftpcode)
2801
0
{
2802
0
  CURLcode result = CURLE_OK;
2803
0
  if(ftpcode == 230) {
2804
    /* 230 User logged in - already! Take as 220 if TLS required. */
2805
0
    if(data->set.use_ssl <= CURLUSESSL_TRY ||
2806
0
       conn->bits.ftp_use_control_ssl)
2807
0
      return ftp_state_user_resp(data, ftpc, ftpcode);
2808
0
  }
2809
0
  else if(ftpcode != 220) {
2810
0
    failf(data, "Got a %03d ftp-server response when 220 was expected",
2811
0
          ftpcode);
2812
0
    return CURLE_WEIRD_SERVER_REPLY;
2813
0
  }
2814
2815
  /* We have received a 220 response fine, now we proceed. */
2816
#ifdef HAVE_GSSAPI
2817
  if(data->set.krb) {
2818
    /* If not anonymous login, try a secure login. Note that this
2819
       procedure is still BLOCKING. */
2820
2821
    Curl_sec_request_prot(conn, "private");
2822
    /* We set private first as default, in case the line below fails to
2823
       set a valid level */
2824
    Curl_sec_request_prot(conn, data->set.str[STRING_KRB_LEVEL]);
2825
2826
    if(Curl_sec_login(data, conn)) {
2827
      failf(data, "secure login failed");
2828
      return CURLE_WEIRD_SERVER_REPLY;
2829
    }
2830
    infof(data, "Authentication successful");
2831
  }
2832
#endif
2833
2834
0
  if(data->set.use_ssl && !conn->bits.ftp_use_control_ssl) {
2835
    /* We do not have an SSL/TLS control connection yet, but FTPS is
2836
       requested. Try an FTPS connection now */
2837
2838
0
    ftpc->count3 = 0;
2839
0
    switch((long)data->set.ftpsslauth) {
2840
0
    case CURLFTPAUTH_DEFAULT:
2841
0
    case CURLFTPAUTH_SSL:
2842
0
      ftpc->count2 = 1; /* add one to get next */
2843
0
      ftpc->count1 = 0;
2844
0
      break;
2845
0
    case CURLFTPAUTH_TLS:
2846
0
      ftpc->count2 = -1; /* subtract one to get next */
2847
0
      ftpc->count1 = 1;
2848
0
      break;
2849
0
    default:
2850
0
      failf(data, "unsupported parameter to CURLOPT_FTPSSLAUTH: %d",
2851
0
            (int)data->set.ftpsslauth);
2852
0
      return CURLE_UNKNOWN_OPTION; /* we do not know what to do */
2853
0
    }
2854
0
    result = Curl_pp_sendf(data, &ftpc->pp, "AUTH %s",
2855
0
                           ftpauth[ftpc->count1]);
2856
0
    if(!result)
2857
0
      ftp_state(data, ftpc, FTP_AUTH);
2858
0
  }
2859
0
  else
2860
0
    result = ftp_state_user(data, ftpc, conn);
2861
0
  return result;
2862
0
}
2863
2864
static CURLcode ftp_pp_statemachine(struct Curl_easy *data,
2865
                                    struct connectdata *conn)
2866
0
{
2867
0
  CURLcode result;
2868
0
  int ftpcode;
2869
0
  struct ftp_conn *ftpc = Curl_conn_meta_get(conn, CURL_META_FTP_CONN);
2870
0
  struct FTP *ftp = Curl_meta_get(data, CURL_META_FTP_EASY);
2871
0
  struct pingpong *pp;
2872
0
  size_t nread = 0;
2873
2874
0
  if(!ftpc || !ftp)
2875
0
    return CURLE_FAILED_INIT;
2876
0
  pp = &ftpc->pp;
2877
0
  if(pp->sendleft)
2878
0
    return Curl_pp_flushsend(data, pp);
2879
2880
0
  result = ftp_readresp(data, ftpc, FIRSTSOCKET, pp, &ftpcode, &nread);
2881
0
  if(result || !ftpcode)
2882
0
    return result;
2883
2884
  /* we have now received a full FTP server response */
2885
0
  switch(ftpc->state) {
2886
0
  case FTP_WAIT220:
2887
0
    result = ftp_wait_resp(data, conn, ftpc, ftpcode);
2888
0
    break;
2889
2890
0
  case FTP_AUTH:
2891
    /* we have gotten the response to a previous AUTH command */
2892
2893
0
    if(pp->overflow)
2894
0
      return CURLE_WEIRD_SERVER_REPLY; /* Forbid pipelining in response. */
2895
2896
    /* RFC2228 (page 5) says:
2897
     *
2898
     * If the server is willing to accept the named security mechanism,
2899
     * and does not require any security data, it must respond with
2900
     * reply code 234/334.
2901
     */
2902
2903
0
    if((ftpcode == 234) || (ftpcode == 334)) {
2904
      /* this was BLOCKING, keep it so for now */
2905
0
      bool done;
2906
0
      if(!Curl_conn_is_ssl(conn, FIRSTSOCKET)) {
2907
0
        result = Curl_ssl_cfilter_add(data, conn, FIRSTSOCKET);
2908
0
        if(result) {
2909
          /* we failed and bail out */
2910
0
          return CURLE_USE_SSL_FAILED;
2911
0
        }
2912
0
      }
2913
0
      result = Curl_conn_connect(data, FIRSTSOCKET, TRUE, &done);
2914
0
      if(!result) {
2915
0
        conn->bits.ftp_use_data_ssl = FALSE; /* clear-text data */
2916
0
        conn->bits.ftp_use_control_ssl = TRUE; /* SSL on control */
2917
0
        result = ftp_state_user(data, ftpc, conn);
2918
0
      }
2919
0
    }
2920
0
    else if(ftpc->count3 < 1) {
2921
0
      ftpc->count3++;
2922
0
      ftpc->count1 += ftpc->count2; /* get next attempt */
2923
0
      result = Curl_pp_sendf(data, &ftpc->pp, "AUTH %s",
2924
0
                             ftpauth[ftpc->count1]);
2925
      /* remain in this same state */
2926
0
    }
2927
0
    else {
2928
0
      if(data->set.use_ssl > CURLUSESSL_TRY)
2929
        /* we failed and CURLUSESSL_CONTROL or CURLUSESSL_ALL is set */
2930
0
        result = CURLE_USE_SSL_FAILED;
2931
0
      else
2932
        /* ignore the failure and continue */
2933
0
        result = ftp_state_user(data, ftpc, conn);
2934
0
    }
2935
0
    break;
2936
2937
0
  case FTP_USER:
2938
0
  case FTP_PASS:
2939
0
    result = ftp_state_user_resp(data, ftpc, ftpcode);
2940
0
    break;
2941
2942
0
  case FTP_ACCT:
2943
0
    result = ftp_state_acct_resp(data, ftpc, ftpcode);
2944
0
    break;
2945
2946
0
  case FTP_PBSZ:
2947
0
    result =
2948
0
      Curl_pp_sendf(data, &ftpc->pp, "PROT %c",
2949
0
                    data->set.use_ssl == CURLUSESSL_CONTROL ? 'C' : 'P');
2950
0
    if(!result)
2951
0
      ftp_state(data, ftpc, FTP_PROT);
2952
0
    break;
2953
2954
0
  case FTP_PROT:
2955
0
    if(ftpcode/100 == 2)
2956
      /* We have enabled SSL for the data connection! */
2957
0
      conn->bits.ftp_use_data_ssl =
2958
0
        (data->set.use_ssl != CURLUSESSL_CONTROL);
2959
    /* FTP servers typically responds with 500 if they decide to reject
2960
       our 'P' request */
2961
0
    else if(data->set.use_ssl > CURLUSESSL_CONTROL)
2962
      /* we failed and bails out */
2963
0
      return CURLE_USE_SSL_FAILED;
2964
2965
0
    if(data->set.ftp_ccc) {
2966
      /* CCC - Clear Command Channel
2967
       */
2968
0
      result = Curl_pp_sendf(data, &ftpc->pp, "%s", "CCC");
2969
0
      if(!result)
2970
0
        ftp_state(data, ftpc, FTP_CCC);
2971
0
    }
2972
0
    else
2973
0
      result = ftp_state_pwd(data, ftpc);
2974
0
    break;
2975
2976
0
  case FTP_CCC:
2977
0
    if(ftpcode < 500) {
2978
      /* First shut down the SSL layer (note: this call will block) */
2979
      /* This has only been tested on the proftpd server, and the mod_tls
2980
       * code sends a close notify alert without waiting for a close notify
2981
       * alert in response. Thus we wait for a close notify alert from the
2982
       * server, but we do not send one. Let's hope other servers do
2983
       * the same... */
2984
0
      result = Curl_ssl_cfilter_remove(data, FIRSTSOCKET,
2985
0
                                       (data->set.ftp_ccc ==
2986
0
                                        (unsigned char)CURLFTPSSL_CCC_ACTIVE));
2987
0
      if(result)
2988
0
        failf(data, "Failed to clear the command channel (CCC)");
2989
0
    }
2990
0
    if(!result)
2991
      /* Then continue as normal */
2992
0
      result = ftp_state_pwd(data, ftpc);
2993
0
    break;
2994
2995
0
  case FTP_PWD:
2996
0
    result = ftp_pwd_resp(data, ftpc, ftpcode);
2997
0
    break;
2998
2999
0
  case FTP_SYST:
3000
0
    if(ftpcode == 215) {
3001
0
      char *ptr = curlx_dyn_ptr(&pp->recvbuf) + 4; /* start on the first
3002
                                                      letter */
3003
0
      char *os;
3004
0
      char *start;
3005
3006
      /* Reply format is like
3007
         215<space><OS-name><space><commentary>
3008
      */
3009
0
      while(*ptr == ' ')
3010
0
        ptr++;
3011
0
      for(start = ptr; *ptr && *ptr != ' '; ptr++)
3012
0
        ;
3013
0
      os = Curl_memdup0(start, ptr - start);
3014
0
      if(!os)
3015
0
        return CURLE_OUT_OF_MEMORY;
3016
3017
      /* Check for special servers here. */
3018
0
      if(curl_strequal(os, "OS/400")) {
3019
        /* Force OS400 name format 1. */
3020
0
        result = Curl_pp_sendf(data, &ftpc->pp, "%s", "SITE NAMEFMT 1");
3021
0
        if(result) {
3022
0
          free(os);
3023
0
          return result;
3024
0
        }
3025
        /* remember target server OS */
3026
0
        free(ftpc->server_os);
3027
0
        ftpc->server_os = os;
3028
0
        ftp_state(data, ftpc, FTP_NAMEFMT);
3029
0
        break;
3030
0
      }
3031
      /* Nothing special for the target server. */
3032
      /* remember target server OS */
3033
0
      free(ftpc->server_os);
3034
0
      ftpc->server_os = os;
3035
0
    }
3036
0
    else {
3037
      /* Cannot identify server OS. Continue anyway and cross fingers. */
3038
0
    }
3039
3040
0
    ftp_state(data, ftpc, FTP_STOP); /* we are done with CONNECT phase! */
3041
0
    CURL_TRC_FTP(data, "[%s] protocol connect phase DONE", FTP_CSTATE(ftpc));
3042
0
    break;
3043
3044
0
  case FTP_NAMEFMT:
3045
0
    if(ftpcode == 250) {
3046
      /* Name format change successful: reload initial path. */
3047
0
      ftp_state_pwd(data, ftpc);
3048
0
      break;
3049
0
    }
3050
3051
0
    ftp_state(data, ftpc, FTP_STOP); /* we are done with CONNECT phase! */
3052
0
    CURL_TRC_FTP(data, "[%s] protocol connect phase DONE", FTP_CSTATE(ftpc));
3053
0
    break;
3054
3055
0
  case FTP_QUOTE:
3056
0
  case FTP_POSTQUOTE:
3057
0
  case FTP_RETR_PREQUOTE:
3058
0
  case FTP_STOR_PREQUOTE:
3059
0
  case FTP_LIST_PREQUOTE:
3060
0
    if((ftpcode >= 400) && !ftpc->count2) {
3061
      /* failure response code, and not allowed to fail */
3062
0
      failf(data, "QUOT command failed with %03d", ftpcode);
3063
0
      result = CURLE_QUOTE_ERROR;
3064
0
    }
3065
0
    else
3066
0
      result = ftp_state_quote(data, ftpc, ftp, FALSE, ftpc->state);
3067
0
    break;
3068
3069
0
  case FTP_CWD:
3070
0
    if(ftpcode/100 != 2) {
3071
      /* failure to CWD there */
3072
0
      if(data->set.ftp_create_missing_dirs &&
3073
0
         ftpc->cwdcount && !ftpc->count2) {
3074
        /* try making it */
3075
0
        ftpc->count2++; /* counter to prevent CWD-MKD loops */
3076
3077
        /* count3 is set to allow MKD to fail once per dir. In the case when
3078
           CWD fails and then MKD fails (due to another session raced it to
3079
           create the dir) this then allows for a second try to CWD to it. */
3080
0
        ftpc->count3 = (data->set.ftp_create_missing_dirs == 2) ? 1 : 0;
3081
3082
0
        result = Curl_pp_sendf(data, &ftpc->pp, "MKD %.*s",
3083
0
                               pathlen(ftpc, ftpc->cwdcount - 1),
3084
0
                               pathpiece(ftpc, ftpc->cwdcount - 1));
3085
0
        if(!result)
3086
0
          ftp_state(data, ftpc, FTP_MKD);
3087
0
      }
3088
0
      else {
3089
        /* return failure */
3090
0
        failf(data, "Server denied you to change to the given directory");
3091
0
        ftpc->cwdfail = TRUE; /* do not remember this path as we failed
3092
                                 to enter it */
3093
0
        result = CURLE_REMOTE_ACCESS_DENIED;
3094
0
      }
3095
0
    }
3096
0
    else {
3097
      /* success */
3098
0
      ftpc->count2 = 0;
3099
0
      if(ftpc->cwdcount >= ftpc->dirdepth)
3100
0
        result = ftp_state_mdtm(data, ftpc, ftp);
3101
0
      else {
3102
0
        ftpc->cwdcount++;
3103
        /* send next CWD */
3104
0
        result = Curl_pp_sendf(data, &ftpc->pp, "CWD %.*s",
3105
0
                               pathlen(ftpc, ftpc->cwdcount - 1),
3106
0
                               pathpiece(ftpc, ftpc->cwdcount - 1));
3107
0
      }
3108
0
    }
3109
0
    break;
3110
3111
0
  case FTP_MKD:
3112
0
    if((ftpcode/100 != 2) && !ftpc->count3--) {
3113
      /* failure to MKD the dir */
3114
0
      failf(data, "Failed to MKD dir: %03d", ftpcode);
3115
0
      result = CURLE_REMOTE_ACCESS_DENIED;
3116
0
    }
3117
0
    else {
3118
0
      ftp_state(data, ftpc, FTP_CWD);
3119
      /* send CWD */
3120
0
      result = Curl_pp_sendf(data, &ftpc->pp, "CWD %.*s",
3121
0
                             pathlen(ftpc, ftpc->cwdcount - 1),
3122
0
                             pathpiece(ftpc, ftpc->cwdcount - 1));
3123
0
    }
3124
0
    break;
3125
3126
0
  case FTP_MDTM:
3127
0
    result = ftp_state_mdtm_resp(data, ftpc, ftp, ftpcode);
3128
0
    break;
3129
3130
0
  case FTP_TYPE:
3131
0
  case FTP_LIST_TYPE:
3132
0
  case FTP_RETR_TYPE:
3133
0
  case FTP_STOR_TYPE:
3134
0
  case FTP_RETR_LIST_TYPE:
3135
0
    result = ftp_state_type_resp(data, ftpc, ftp, ftpcode, ftpc->state);
3136
0
    break;
3137
3138
0
  case FTP_SIZE:
3139
0
  case FTP_RETR_SIZE:
3140
0
  case FTP_STOR_SIZE:
3141
0
    result = ftp_state_size_resp(data, ftpc, ftp, ftpcode, ftpc->state);
3142
0
    break;
3143
3144
0
  case FTP_REST:
3145
0
  case FTP_RETR_REST:
3146
0
    result = ftp_state_rest_resp(data, ftpc, ftp, ftpcode, ftpc->state);
3147
0
    break;
3148
3149
0
  case FTP_PRET:
3150
0
    if(ftpcode != 200) {
3151
      /* there only is this one standard OK return code. */
3152
0
      failf(data, "PRET command not accepted: %03d", ftpcode);
3153
0
      return CURLE_FTP_PRET_FAILED;
3154
0
    }
3155
0
    result = ftp_state_use_pasv(data, ftpc, conn);
3156
0
    break;
3157
3158
0
  case FTP_PASV:
3159
0
    result = ftp_state_pasv_resp(data, ftpc, ftpcode);
3160
0
    break;
3161
3162
0
  case FTP_PORT:
3163
0
    result = ftp_state_port_resp(data, ftpc, ftp, ftpcode);
3164
0
    break;
3165
3166
0
  case FTP_LIST:
3167
0
  case FTP_RETR:
3168
0
    result = ftp_state_get_resp(data, ftpc, ftp, ftpcode, ftpc->state);
3169
0
    break;
3170
3171
0
  case FTP_STOR:
3172
0
    result = ftp_state_stor_resp(data, ftpc, ftpcode, ftpc->state);
3173
0
    break;
3174
3175
0
  case FTP_QUIT:
3176
0
  default:
3177
    /* internal error */
3178
0
    ftp_state(data, ftpc, FTP_STOP);
3179
0
    break;
3180
0
  }
3181
3182
0
  return result;
3183
0
}
3184
3185
3186
/* called repeatedly until done from multi.c */
3187
static CURLcode ftp_statemach(struct Curl_easy *data,
3188
                              struct ftp_conn *ftpc,
3189
                              bool *done)
3190
0
{
3191
0
  CURLcode result = Curl_pp_statemach(data, &ftpc->pp, FALSE, FALSE);
3192
3193
  /* Check for the state outside of the Curl_socket_check() return code checks
3194
     since at times we are in fact already in this state when this function
3195
     gets called. */
3196
0
  *done = (ftpc->state == FTP_STOP);
3197
3198
0
  return result;
3199
0
}
3200
3201
/* called repeatedly until done from multi.c */
3202
static CURLcode ftp_multi_statemach(struct Curl_easy *data,
3203
                                    bool *done)
3204
0
{
3205
0
  struct ftp_conn *ftpc = Curl_conn_meta_get(data->conn, CURL_META_FTP_CONN);
3206
0
  return ftpc ? ftp_statemach(data, ftpc, done) : CURLE_FAILED_INIT;
3207
0
}
3208
3209
static CURLcode ftp_block_statemach(struct Curl_easy *data,
3210
                                    struct ftp_conn *ftpc)
3211
0
{
3212
0
  struct pingpong *pp = &ftpc->pp;
3213
0
  CURLcode result = CURLE_OK;
3214
3215
0
  while(ftpc->state != FTP_STOP) {
3216
0
    if(ftpc->shutdown)
3217
0
      CURL_TRC_FTP(data, "in shutdown, waiting for server response");
3218
0
    result = Curl_pp_statemach(data, pp, TRUE, TRUE /* disconnecting */);
3219
0
    if(result)
3220
0
      break;
3221
0
  }
3222
3223
0
  return result;
3224
0
}
3225
3226
/*
3227
 * ftp_connect() should do everything that is to be considered a part of
3228
 * the connection phase.
3229
 *
3230
 * The variable 'done' points to will be TRUE if the protocol-layer connect
3231
 * phase is done when this function returns, or FALSE if not.
3232
 *
3233
 */
3234
static CURLcode ftp_connect(struct Curl_easy *data,
3235
                            bool *done) /* see description above */
3236
0
{
3237
0
  CURLcode result;
3238
0
  struct connectdata *conn = data->conn;
3239
0
  struct ftp_conn *ftpc = Curl_conn_meta_get(data->conn, CURL_META_FTP_CONN);
3240
0
  struct pingpong *pp;
3241
3242
0
  *done = FALSE; /* default to not done yet */
3243
0
  if(!ftpc)
3244
0
    return CURLE_FAILED_INIT;
3245
0
  pp = &ftpc->pp;
3246
  /* We always support persistent connections on ftp */
3247
0
  connkeep(conn, "FTP default");
3248
3249
0
  PINGPONG_SETUP(pp, ftp_pp_statemachine, ftp_endofresp);
3250
3251
0
  if(Curl_conn_is_ssl(conn, FIRSTSOCKET)) {
3252
    /* BLOCKING */
3253
0
    result = Curl_conn_connect(data, FIRSTSOCKET, TRUE, done);
3254
0
    if(result)
3255
0
      return result;
3256
0
    conn->bits.ftp_use_control_ssl = TRUE;
3257
0
  }
3258
3259
0
  Curl_pp_init(pp); /* once per transfer */
3260
3261
  /* When we connect, we start in the state where we await the 220
3262
     response */
3263
0
  ftp_state(data, ftpc, FTP_WAIT220);
3264
3265
0
  result = ftp_statemach(data, ftpc, done);
3266
3267
0
  return result;
3268
0
}
3269
3270
/***********************************************************************
3271
 *
3272
 * ftp_done()
3273
 *
3274
 * The DONE function. This does what needs to be done after a single DO has
3275
 * performed.
3276
 *
3277
 * Input argument is already checked for validity.
3278
 */
3279
static CURLcode ftp_done(struct Curl_easy *data, CURLcode status,
3280
                         bool premature)
3281
0
{
3282
0
  struct connectdata *conn = data->conn;
3283
0
  struct FTP *ftp = Curl_meta_get(data, CURL_META_FTP_EASY);
3284
0
  struct ftp_conn *ftpc = Curl_conn_meta_get(data->conn, CURL_META_FTP_CONN);
3285
0
  struct pingpong *pp;
3286
0
  ssize_t nread;
3287
0
  int ftpcode;
3288
0
  CURLcode result = CURLE_OK;
3289
3290
0
  if(!ftp || !ftpc)
3291
0
    return CURLE_OK;
3292
3293
0
  pp = &ftpc->pp;
3294
0
  switch(status) {
3295
0
  case CURLE_BAD_DOWNLOAD_RESUME:
3296
0
  case CURLE_FTP_WEIRD_PASV_REPLY:
3297
0
  case CURLE_FTP_PORT_FAILED:
3298
0
  case CURLE_FTP_ACCEPT_FAILED:
3299
0
  case CURLE_FTP_ACCEPT_TIMEOUT:
3300
0
  case CURLE_FTP_COULDNT_SET_TYPE:
3301
0
  case CURLE_FTP_COULDNT_RETR_FILE:
3302
0
  case CURLE_PARTIAL_FILE:
3303
0
  case CURLE_UPLOAD_FAILED:
3304
0
  case CURLE_REMOTE_ACCESS_DENIED:
3305
0
  case CURLE_FILESIZE_EXCEEDED:
3306
0
  case CURLE_REMOTE_FILE_NOT_FOUND:
3307
0
  case CURLE_WRITE_ERROR:
3308
    /* the connection stays alive fine even though this happened */
3309
0
  case CURLE_OK: /* does not affect the control connection's status */
3310
0
    if(!premature)
3311
0
      break;
3312
3313
    /* until we cope better with prematurely ended requests, let them
3314
     * fallback as if in complete failure */
3315
0
    FALLTHROUGH();
3316
0
  default:       /* by default, an error means the control connection is
3317
                    wedged and should not be used anymore */
3318
0
    ftpc->ctl_valid = FALSE;
3319
0
    ftpc->cwdfail = TRUE; /* set this TRUE to prevent us to remember the
3320
                             current path, as this connection is going */
3321
0
    connclose(conn, "FTP ended with bad error code");
3322
0
    result = status;      /* use the already set error code */
3323
0
    break;
3324
0
  }
3325
3326
0
  if(data->state.wildcardmatch) {
3327
0
    if(data->set.chunk_end && ftpc->file) {
3328
0
      Curl_set_in_callback(data, TRUE);
3329
0
      data->set.chunk_end(data->set.wildcardptr);
3330
0
      Curl_set_in_callback(data, FALSE);
3331
0
      freedirs(ftpc);
3332
0
    }
3333
0
    ftpc->known_filesize = -1;
3334
0
  }
3335
3336
0
  if(result) {
3337
    /* We can limp along anyway (and should try to since we may already be in
3338
     * the error path) */
3339
0
    ftpc->ctl_valid = FALSE; /* mark control connection as bad */
3340
0
    connclose(conn, "FTP: out of memory!"); /* mark for connection closure */
3341
0
    free(ftpc->prevpath);
3342
0
    ftpc->prevpath = NULL; /* no path remembering */
3343
0
  }
3344
0
  else { /* remember working directory for connection reuse */
3345
0
    const char *rawPath = ftpc->rawpath;
3346
0
    if(rawPath) {
3347
0
      if((data->set.ftp_filemethod == FTPFILE_NOCWD) && (rawPath[0] == '/'))
3348
0
        ; /* full path => no CWDs happened => keep ftpc->prevpath */
3349
0
      else {
3350
0
        size_t pathLen = strlen(ftpc->rawpath);
3351
3352
0
        free(ftpc->prevpath);
3353
3354
0
        if(!ftpc->cwdfail) {
3355
0
          if(data->set.ftp_filemethod == FTPFILE_NOCWD)
3356
0
            pathLen = 0; /* relative path => working directory is FTP home */
3357
0
          else
3358
            /* file is url-decoded */
3359
0
            pathLen -= ftpc->file ? strlen(ftpc->file) : 0;
3360
0
          ftpc->prevpath = Curl_memdup0(rawPath, pathLen);
3361
0
        }
3362
0
        else
3363
0
          ftpc->prevpath = NULL; /* no path */
3364
0
      }
3365
0
    }
3366
0
    if(ftpc->prevpath)
3367
0
      infof(data, "Remembering we are in dir \"%s\"", ftpc->prevpath);
3368
0
  }
3369
3370
  /* shut down the socket to inform the server we are done */
3371
3372
#ifdef UNDER_CE
3373
  shutdown(conn->sock[SECONDARYSOCKET], 2);  /* SD_BOTH */
3374
#endif
3375
3376
0
  if(Curl_conn_is_setup(conn, SECONDARYSOCKET)) {
3377
0
    if(!result && ftpc->dont_check && data->req.maxdownload > 0) {
3378
      /* partial download completed */
3379
0
      result = Curl_pp_sendf(data, pp, "%s", "ABOR");
3380
0
      if(result) {
3381
0
        failf(data, "Failure sending ABOR command: %s",
3382
0
              curl_easy_strerror(result));
3383
0
        ftpc->ctl_valid = FALSE; /* mark control connection as bad */
3384
0
        connclose(conn, "ABOR command failed"); /* connection closure */
3385
0
      }
3386
0
    }
3387
3388
0
    close_secondarysocket(data, ftpc);
3389
0
  }
3390
3391
0
  if(!result && (ftp->transfer == PPTRANSFER_BODY) && ftpc->ctl_valid &&
3392
0
     pp->pending_resp && !premature) {
3393
    /*
3394
     * Let's see what the server says about the transfer we just performed,
3395
     * but lower the timeout as sometimes this connection has died while the
3396
     * data has been transferred. This happens when doing through NATs etc that
3397
     * abandon old silent connections.
3398
     */
3399
0
    timediff_t old_time = pp->response_time;
3400
3401
0
    pp->response_time = 60*1000; /* give it only a minute for now */
3402
0
    pp->response = curlx_now(); /* timeout relative now */
3403
3404
0
    result = Curl_GetFTPResponse(data, &nread, &ftpcode);
3405
3406
0
    pp->response_time = old_time; /* set this back to previous value */
3407
3408
0
    if(!nread && (CURLE_OPERATION_TIMEDOUT == result)) {
3409
0
      failf(data, "control connection looks dead");
3410
0
      ftpc->ctl_valid = FALSE; /* mark control connection as bad */
3411
0
      connclose(conn, "Timeout or similar in FTP DONE operation"); /* close */
3412
0
    }
3413
3414
0
    if(result)
3415
0
      return result;
3416
3417
0
    if(ftpc->dont_check && data->req.maxdownload > 0) {
3418
      /* we have just sent ABOR and there is no reliable way to check if it was
3419
       * successful or not; we have to close the connection now */
3420
0
      infof(data, "partial download completed, closing connection");
3421
0
      connclose(conn, "Partial download with no ability to check");
3422
0
      return result;
3423
0
    }
3424
3425
0
    if(!ftpc->dont_check) {
3426
      /* 226 Transfer complete, 250 Requested file action okay, completed. */
3427
0
      switch(ftpcode) {
3428
0
      case 226:
3429
0
      case 250:
3430
0
        break;
3431
0
      case 552:
3432
0
        failf(data, "Exceeded storage allocation");
3433
0
        result = CURLE_REMOTE_DISK_FULL;
3434
0
        break;
3435
0
      default:
3436
0
        failf(data, "server did not report OK, got %d", ftpcode);
3437
0
        result = CURLE_PARTIAL_FILE;
3438
0
        break;
3439
0
      }
3440
0
    }
3441
0
  }
3442
3443
0
  if(result || premature)
3444
    /* the response code from the transfer showed an error already so no
3445
       use checking further */
3446
0
    ;
3447
0
  else if(data->state.upload) {
3448
0
    if((ftp->transfer == PPTRANSFER_BODY) &&
3449
0
       (data->state.infilesize != -1) && /* upload with known size */
3450
0
       ((!data->set.crlf && !data->state.prefer_ascii && /* no conversion */
3451
0
         (data->state.infilesize != data->req.writebytecount)) ||
3452
0
        ((data->set.crlf || data->state.prefer_ascii) && /* maybe crlf conv */
3453
0
         (data->state.infilesize > data->req.writebytecount))
3454
0
       )) {
3455
0
      failf(data, "Uploaded unaligned file size (%" FMT_OFF_T
3456
0
            " out of %" FMT_OFF_T " bytes)",
3457
0
            data->req.writebytecount, data->state.infilesize);
3458
0
      result = CURLE_PARTIAL_FILE;
3459
0
    }
3460
0
  }
3461
0
  else {
3462
0
    if((data->req.size != -1) &&
3463
0
       (data->req.size != data->req.bytecount) &&
3464
0
       (data->req.maxdownload != data->req.bytecount)) {
3465
0
      failf(data, "Received only partial file: %" FMT_OFF_T " bytes",
3466
0
            data->req.bytecount);
3467
0
      result = CURLE_PARTIAL_FILE;
3468
0
    }
3469
0
    else if(!ftpc->dont_check &&
3470
0
            !data->req.bytecount &&
3471
0
            (data->req.size > 0)) {
3472
0
      failf(data, "No data was received");
3473
0
      result = CURLE_FTP_COULDNT_RETR_FILE;
3474
0
    }
3475
0
  }
3476
3477
  /* clear these for next connection */
3478
0
  ftp->transfer = PPTRANSFER_BODY;
3479
0
  ftpc->dont_check = FALSE;
3480
3481
  /* Send any post-transfer QUOTE strings? */
3482
0
  if(!status && !result && !premature && data->set.postquote)
3483
0
    result = ftp_sendquote(data, ftpc, data->set.postquote);
3484
0
  CURL_TRC_FTP(data, "[%s] done, result=%d", FTP_CSTATE(ftpc), result);
3485
0
  return result;
3486
0
}
3487
3488
/***********************************************************************
3489
 *
3490
 * ftp_sendquote()
3491
 *
3492
 * Where a 'quote' means a list of custom commands to send to the server.
3493
 * The quote list is passed as an argument.
3494
 *
3495
 * BLOCKING
3496
 */
3497
3498
static
3499
CURLcode ftp_sendquote(struct Curl_easy *data,
3500
                       struct ftp_conn *ftpc,
3501
                       struct curl_slist *quote)
3502
0
{
3503
0
  struct curl_slist *item;
3504
0
  struct pingpong *pp = &ftpc->pp;
3505
3506
0
  item = quote;
3507
0
  while(item) {
3508
0
    if(item->data) {
3509
0
      ssize_t nread;
3510
0
      char *cmd = item->data;
3511
0
      bool acceptfail = FALSE;
3512
0
      CURLcode result;
3513
0
      int ftpcode = 0;
3514
3515
      /* if a command starts with an asterisk, which a legal FTP command never
3516
         can, the command will be allowed to fail without it causing any
3517
         aborts or cancels etc. It will cause libcurl to act as if the command
3518
         is successful, whatever the server responds. */
3519
3520
0
      if(cmd[0] == '*') {
3521
0
        cmd++;
3522
0
        acceptfail = TRUE;
3523
0
      }
3524
3525
0
      result = Curl_pp_sendf(data, &ftpc->pp, "%s", cmd);
3526
0
      if(!result) {
3527
0
        pp->response = curlx_now(); /* timeout relative now */
3528
0
        result = Curl_GetFTPResponse(data, &nread, &ftpcode);
3529
0
      }
3530
0
      if(result)
3531
0
        return result;
3532
3533
0
      if(!acceptfail && (ftpcode >= 400)) {
3534
0
        failf(data, "QUOT string not accepted: %s", cmd);
3535
0
        return CURLE_QUOTE_ERROR;
3536
0
      }
3537
0
    }
3538
3539
0
    item = item->next;
3540
0
  }
3541
3542
0
  return CURLE_OK;
3543
0
}
3544
3545
/***********************************************************************
3546
 *
3547
 * ftp_need_type()
3548
 *
3549
 * Returns TRUE if we in the current situation should send TYPE
3550
 */
3551
static int ftp_need_type(struct ftp_conn *ftpc,
3552
                         bool ascii_wanted)
3553
0
{
3554
0
  return ftpc->transfertype != (ascii_wanted ? 'A' : 'I');
3555
0
}
3556
3557
/***********************************************************************
3558
 *
3559
 * ftp_nb_type()
3560
 *
3561
 * Set TYPE. We only deal with ASCII or BINARY so this function
3562
 * sets one of them.
3563
 * If the transfer type is not sent, simulate on OK response in newstate
3564
 */
3565
static CURLcode ftp_nb_type(struct Curl_easy *data,
3566
                            struct ftp_conn *ftpc,
3567
                            struct FTP *ftp,
3568
                            bool ascii, ftpstate newstate)
3569
0
{
3570
0
  CURLcode result;
3571
0
  char want = (char)(ascii ? 'A' : 'I');
3572
3573
0
  if(ftpc->transfertype == want) {
3574
0
    ftp_state(data, ftpc, newstate);
3575
0
    return ftp_state_type_resp(data, ftpc, ftp, 200, newstate);
3576
0
  }
3577
3578
0
  result = Curl_pp_sendf(data, &ftpc->pp, "TYPE %c", want);
3579
0
  if(!result) {
3580
0
    ftp_state(data, ftpc, newstate);
3581
3582
    /* keep track of our current transfer type */
3583
0
    ftpc->transfertype = want;
3584
0
  }
3585
0
  return result;
3586
0
}
3587
3588
/***************************************************************************
3589
 *
3590
 * ftp_pasv_verbose()
3591
 *
3592
 * This function only outputs some informationals about this second connection
3593
 * when we have issued a PASV command before and thus we have connected to a
3594
 * possibly new IP address.
3595
 *
3596
 */
3597
#ifndef CURL_DISABLE_VERBOSE_STRINGS
3598
static void
3599
ftp_pasv_verbose(struct Curl_easy *data,
3600
                 struct Curl_addrinfo *ai,
3601
                 char *newhost, /* ASCII version */
3602
                 int port)
3603
0
{
3604
0
  char buf[256];
3605
0
  Curl_printable_address(ai, buf, sizeof(buf));
3606
0
  infof(data, "Connecting to %s (%s) port %d", newhost, buf, port);
3607
0
}
3608
#endif
3609
3610
/*
3611
 * ftp_do_more()
3612
 *
3613
 * This function shall be called when the second FTP (data) connection is
3614
 * connected.
3615
 *
3616
 * 'complete' can return 0 for incomplete, 1 for done and -1 for go back
3617
 * (which basically is only for when PASV is being sent to retry a failed
3618
 * EPSV).
3619
 */
3620
3621
static CURLcode ftp_do_more(struct Curl_easy *data, int *completep)
3622
0
{
3623
0
  struct connectdata *conn = data->conn;
3624
0
  struct ftp_conn *ftpc = Curl_conn_meta_get(data->conn, CURL_META_FTP_CONN);
3625
0
  struct FTP *ftp = Curl_meta_get(data, CURL_META_FTP_EASY);
3626
0
  CURLcode result = CURLE_OK;
3627
0
  bool connected = FALSE;
3628
0
  bool complete = FALSE;
3629
  /* the ftp struct is inited in ftp_connect(). If we are connecting to an HTTP
3630
   * proxy then the state will not be valid until after that connection is
3631
   * complete */
3632
3633
0
  if(!ftpc || !ftp)
3634
0
    return CURLE_FAILED_INIT;
3635
  /* if the second connection has been set up, try to connect it fully
3636
   * to the remote host. This may not complete at this time, for several
3637
   * reasons:
3638
   * - we do EPTR and the server will not connect to our listen socket
3639
   *   until we send more FTP commands
3640
   * - an SSL filter is in place and the server will not start the TLS
3641
   *   handshake until we send more FTP commands
3642
   */
3643
0
  if(conn->cfilter[SECONDARYSOCKET]) {
3644
0
    bool is_eptr = Curl_conn_is_tcp_listen(data, SECONDARYSOCKET);
3645
0
    result = Curl_conn_connect(data, SECONDARYSOCKET, FALSE, &connected);
3646
0
    if(result || (!connected && !is_eptr &&
3647
0
                  !Curl_conn_is_ip_connected(data, SECONDARYSOCKET))) {
3648
0
      if(result && !is_eptr && (ftpc->count1 == 0)) {
3649
0
        *completep = -1; /* go back to DOING please */
3650
        /* this is a EPSV connect failing, try PASV instead */
3651
0
        return ftp_epsv_disable(data, ftpc, conn);
3652
0
      }
3653
0
      *completep = (int)complete;
3654
0
      return result;
3655
0
    }
3656
0
  }
3657
3658
0
  if(ftpc->state) {
3659
    /* already in a state so skip the initial commands.
3660
       They are only done to kickstart the do_more state */
3661
0
    result = ftp_statemach(data, ftpc, &complete);
3662
3663
0
    *completep = (int)complete;
3664
3665
    /* if we got an error or if we do not wait for a data connection return
3666
       immediately */
3667
0
    if(result || !ftpc->wait_data_conn)
3668
0
      return result;
3669
3670
    /* if we reach the end of the FTP state machine here, *complete will be
3671
       TRUE but so is ftpc->wait_data_conn, which says we need to wait for the
3672
       data connection and therefore we are not actually complete */
3673
0
    *completep = 0;
3674
0
  }
3675
3676
0
  if(ftp->transfer <= PPTRANSFER_INFO) {
3677
    /* a transfer is about to take place, or if not a filename was given so we
3678
       will do a SIZE on it later and then we need the right TYPE first */
3679
3680
0
    if(ftpc->wait_data_conn) {
3681
0
      bool serv_conned;
3682
3683
0
      result = Curl_conn_connect(data, SECONDARYSOCKET, FALSE, &serv_conned);
3684
0
      if(result)
3685
0
        return result; /* Failed to accept data connection */
3686
3687
0
      if(serv_conned) {
3688
        /* It looks data connection is established */
3689
0
        ftpc->wait_data_conn = FALSE;
3690
0
        result = ftp_initiate_transfer(data, ftpc);
3691
3692
0
        if(result)
3693
0
          return result;
3694
3695
0
        *completep = 1; /* this state is now complete when the server has
3696
                           connected back to us */
3697
0
      }
3698
0
      else {
3699
0
        result = ftp_check_ctrl_on_data_wait(data, ftpc);
3700
0
        if(result)
3701
0
          return result;
3702
0
      }
3703
0
    }
3704
0
    else if(data->state.upload) {
3705
0
      result = ftp_nb_type(data, ftpc, ftp, data->state.prefer_ascii,
3706
0
                           FTP_STOR_TYPE);
3707
0
      if(result)
3708
0
        return result;
3709
3710
0
      result = ftp_statemach(data, ftpc, &complete);
3711
      /* ftp_nb_type() might have skipped sending `TYPE A|I` when not
3712
       * deemed necessary and directly sent `STORE name`. If this was
3713
       * then complete, but we are still waiting on the data connection,
3714
       * the transfer has not been initiated yet. */
3715
0
      *completep = (int)(ftpc->wait_data_conn ? 0 : complete);
3716
0
    }
3717
0
    else {
3718
      /* download */
3719
0
      ftp->downloadsize = -1; /* unknown as of yet */
3720
3721
0
      result = Curl_range(data);
3722
3723
0
      if(result == CURLE_OK && data->req.maxdownload >= 0) {
3724
        /* Do not check for successful transfer */
3725
0
        ftpc->dont_check = TRUE;
3726
0
      }
3727
3728
0
      if(result)
3729
0
        ;
3730
0
      else if((data->state.list_only || !ftpc->file) &&
3731
0
              !(data->set.prequote)) {
3732
        /* The specified path ends with a slash, and therefore we think this
3733
           is a directory that is requested, use LIST. But before that we
3734
           need to set ASCII transfer mode. */
3735
3736
        /* But only if a body transfer was requested. */
3737
0
        if(ftp->transfer == PPTRANSFER_BODY) {
3738
0
          result = ftp_nb_type(data, ftpc, ftp, TRUE, FTP_LIST_TYPE);
3739
0
          if(result)
3740
0
            return result;
3741
0
        }
3742
        /* otherwise just fall through */
3743
0
      }
3744
0
      else {
3745
0
        if(data->set.prequote && !ftpc->file) {
3746
0
          result = ftp_nb_type(data, ftpc, ftp, TRUE,
3747
0
                               FTP_RETR_LIST_TYPE);
3748
0
        }
3749
0
        else {
3750
0
          result = ftp_nb_type(data, ftpc, ftp, data->state.prefer_ascii,
3751
0
                               FTP_RETR_TYPE);
3752
0
        }
3753
0
        if(result)
3754
0
          return result;
3755
0
      }
3756
3757
0
      result = ftp_statemach(data, ftpc, &complete);
3758
0
      *completep = (int)complete;
3759
0
    }
3760
0
    return result;
3761
0
  }
3762
3763
  /* no data to transfer */
3764
0
  Curl_xfer_setup_nop(data);
3765
3766
0
  if(!ftpc->wait_data_conn) {
3767
    /* no waiting for the data connection so this is now complete */
3768
0
    *completep = 1;
3769
0
    CURL_TRC_FTP(data, "[%s] DO-MORE phase ends with %d", FTP_CSTATE(ftpc),
3770
0
                 (int)result);
3771
0
  }
3772
3773
0
  return result;
3774
0
}
3775
3776
3777
3778
/***********************************************************************
3779
 *
3780
 * ftp_perform()
3781
 *
3782
 * This is the actual DO function for FTP. Get a file/directory according to
3783
 * the options previously setup.
3784
 */
3785
3786
static
3787
CURLcode ftp_perform(struct Curl_easy *data,
3788
                     struct ftp_conn *ftpc,
3789
                     struct FTP *ftp,
3790
                     bool *connected,  /* connect status after PASV / PORT */
3791
                     bool *dophase_done)
3792
0
{
3793
  /* this is FTP and no proxy */
3794
0
  CURLcode result = CURLE_OK;
3795
3796
0
  CURL_TRC_FTP(data, "[%s] DO phase starts", FTP_CSTATE(ftpc));
3797
3798
0
  if(data->req.no_body) {
3799
    /* requested no body means no transfer... */
3800
0
    ftp->transfer = PPTRANSFER_INFO;
3801
0
  }
3802
3803
0
  *dophase_done = FALSE; /* not done yet */
3804
3805
  /* start the first command in the DO phase */
3806
0
  result = ftp_state_quote(data, ftpc, ftp, TRUE, FTP_QUOTE);
3807
0
  if(result)
3808
0
    return result;
3809
3810
  /* run the state-machine */
3811
0
  result = ftp_statemach(data, ftpc, dophase_done);
3812
3813
0
  *connected = Curl_conn_is_connected(data->conn, SECONDARYSOCKET);
3814
3815
0
  if(*connected)
3816
0
    infof(data, "[FTP] [%s] perform, DATA connection established",
3817
0
          FTP_CSTATE(ftpc));
3818
0
  else
3819
0
    CURL_TRC_FTP(data, "[%s] perform, awaiting DATA connect",
3820
0
                 FTP_CSTATE(ftpc));
3821
3822
0
  if(*dophase_done)
3823
0
    CURL_TRC_FTP(data, "[%s] DO phase is complete1", FTP_CSTATE(ftpc));
3824
3825
0
  return result;
3826
0
}
3827
3828
static void wc_data_dtor(void *ptr)
3829
0
{
3830
0
  struct ftp_wc *ftpwc = ptr;
3831
0
  if(ftpwc && ftpwc->parser)
3832
0
    Curl_ftp_parselist_data_free(&ftpwc->parser);
3833
0
  free(ftpwc);
3834
0
}
3835
3836
static CURLcode init_wc_data(struct Curl_easy *data,
3837
                             struct ftp_conn *ftpc,
3838
                             struct FTP *ftp)
3839
0
{
3840
0
  char *last_slash;
3841
0
  char *path = ftp->path;
3842
0
  struct WildcardData *wildcard = data->wildcard;
3843
0
  CURLcode result = CURLE_OK;
3844
0
  struct ftp_wc *ftpwc = NULL;
3845
3846
0
  last_slash = strrchr(ftp->path, '/');
3847
0
  if(last_slash) {
3848
0
    last_slash++;
3849
0
    if(last_slash[0] == '\0') {
3850
0
      wildcard->state = CURLWC_CLEAN;
3851
0
      return ftp_parse_url_path(data, ftpc, ftp);
3852
0
    }
3853
0
    wildcard->pattern = strdup(last_slash);
3854
0
    if(!wildcard->pattern)
3855
0
      return CURLE_OUT_OF_MEMORY;
3856
0
    last_slash[0] = '\0'; /* cut file from path */
3857
0
  }
3858
0
  else { /* there is only 'wildcard pattern' or nothing */
3859
0
    if(path[0]) {
3860
0
      wildcard->pattern = strdup(path);
3861
0
      if(!wildcard->pattern)
3862
0
        return CURLE_OUT_OF_MEMORY;
3863
0
      path[0] = '\0';
3864
0
    }
3865
0
    else { /* only list */
3866
0
      wildcard->state = CURLWC_CLEAN;
3867
0
      return ftp_parse_url_path(data, ftpc, ftp);
3868
0
    }
3869
0
  }
3870
3871
  /* program continues only if URL is not ending with slash, allocate needed
3872
     resources for wildcard transfer */
3873
3874
  /* allocate ftp protocol specific wildcard data */
3875
0
  ftpwc = calloc(1, sizeof(struct ftp_wc));
3876
0
  if(!ftpwc) {
3877
0
    result = CURLE_OUT_OF_MEMORY;
3878
0
    goto fail;
3879
0
  }
3880
3881
  /* INITIALIZE parselist structure */
3882
0
  ftpwc->parser = Curl_ftp_parselist_data_alloc();
3883
0
  if(!ftpwc->parser) {
3884
0
    result = CURLE_OUT_OF_MEMORY;
3885
0
    goto fail;
3886
0
  }
3887
3888
0
  wildcard->ftpwc = ftpwc; /* put it to the WildcardData tmp pointer */
3889
0
  wildcard->dtor = wc_data_dtor;
3890
3891
  /* wildcard does not support NOCWD option (assert it?) */
3892
0
  if(data->set.ftp_filemethod == FTPFILE_NOCWD)
3893
0
    data->set.ftp_filemethod = FTPFILE_MULTICWD;
3894
3895
  /* try to parse ftp URL */
3896
0
  result = ftp_parse_url_path(data, ftpc, ftp);
3897
0
  if(result) {
3898
0
    goto fail;
3899
0
  }
3900
3901
0
  wildcard->path = strdup(ftp->path);
3902
0
  if(!wildcard->path) {
3903
0
    result = CURLE_OUT_OF_MEMORY;
3904
0
    goto fail;
3905
0
  }
3906
3907
  /* backup old write_function */
3908
0
  ftpwc->backup.write_function = data->set.fwrite_func;
3909
  /* parsing write function */
3910
0
  data->set.fwrite_func = Curl_ftp_parselist;
3911
  /* backup old file descriptor */
3912
0
  ftpwc->backup.file_descriptor = data->set.out;
3913
  /* let the writefunc callback know the transfer */
3914
0
  data->set.out = data;
3915
3916
0
  infof(data, "Wildcard - Parsing started");
3917
0
  return CURLE_OK;
3918
3919
0
fail:
3920
0
  if(ftpwc) {
3921
0
    Curl_ftp_parselist_data_free(&ftpwc->parser);
3922
0
    free(ftpwc);
3923
0
  }
3924
0
  Curl_safefree(wildcard->pattern);
3925
0
  wildcard->dtor = ZERO_NULL;
3926
0
  wildcard->ftpwc = NULL;
3927
0
  return result;
3928
0
}
3929
3930
static CURLcode wc_statemach(struct Curl_easy *data,
3931
                             struct ftp_conn *ftpc,
3932
                             struct FTP *ftp)
3933
0
{
3934
0
  struct WildcardData * const wildcard = data->wildcard;
3935
0
  CURLcode result = CURLE_OK;
3936
3937
0
  for(;;) {
3938
0
    switch(wildcard->state) {
3939
0
    case CURLWC_INIT:
3940
0
      result = init_wc_data(data, ftpc, ftp);
3941
0
      if(wildcard->state == CURLWC_CLEAN)
3942
        /* only listing! */
3943
0
        return result;
3944
0
      wildcard->state = result ? CURLWC_ERROR : CURLWC_MATCHING;
3945
0
      return result;
3946
3947
0
    case CURLWC_MATCHING: {
3948
      /* In this state is LIST response successfully parsed, so lets restore
3949
         previous WRITEFUNCTION callback and WRITEDATA pointer */
3950
0
      struct ftp_wc *ftpwc = wildcard->ftpwc;
3951
0
      data->set.fwrite_func = ftpwc->backup.write_function;
3952
0
      data->set.out = ftpwc->backup.file_descriptor;
3953
0
      ftpwc->backup.write_function = ZERO_NULL;
3954
0
      ftpwc->backup.file_descriptor = NULL;
3955
0
      wildcard->state = CURLWC_DOWNLOADING;
3956
3957
0
      if(Curl_ftp_parselist_geterror(ftpwc->parser)) {
3958
        /* error found in LIST parsing */
3959
0
        wildcard->state = CURLWC_CLEAN;
3960
0
        continue;
3961
0
      }
3962
0
      if(Curl_llist_count(&wildcard->filelist) == 0) {
3963
        /* no corresponding file */
3964
0
        wildcard->state = CURLWC_CLEAN;
3965
0
        return CURLE_REMOTE_FILE_NOT_FOUND;
3966
0
      }
3967
0
      continue;
3968
0
    }
3969
3970
0
    case CURLWC_DOWNLOADING: {
3971
      /* filelist has at least one file, lets get first one */
3972
0
      struct Curl_llist_node *head = Curl_llist_head(&wildcard->filelist);
3973
0
      struct curl_fileinfo *finfo = Curl_node_elem(head);
3974
3975
0
      char *tmp_path = aprintf("%s%s", wildcard->path, finfo->filename);
3976
0
      if(!tmp_path)
3977
0
        return CURLE_OUT_OF_MEMORY;
3978
3979
      /* switch default ftp->path and tmp_path */
3980
0
      free(ftp->pathalloc);
3981
0
      ftp->pathalloc = ftp->path = tmp_path;
3982
3983
0
      infof(data, "Wildcard - START of \"%s\"", finfo->filename);
3984
0
      if(data->set.chunk_bgn) {
3985
0
        long userresponse;
3986
0
        Curl_set_in_callback(data, TRUE);
3987
0
        userresponse = data->set.chunk_bgn(
3988
0
          finfo, data->set.wildcardptr,
3989
0
          (int)Curl_llist_count(&wildcard->filelist));
3990
0
        Curl_set_in_callback(data, FALSE);
3991
0
        switch(userresponse) {
3992
0
        case CURL_CHUNK_BGN_FUNC_SKIP:
3993
0
          infof(data, "Wildcard - \"%s\" skipped by user",
3994
0
                finfo->filename);
3995
0
          wildcard->state = CURLWC_SKIP;
3996
0
          continue;
3997
0
        case CURL_CHUNK_BGN_FUNC_FAIL:
3998
0
          return CURLE_CHUNK_FAILED;
3999
0
        }
4000
0
      }
4001
4002
0
      if(finfo->filetype != CURLFILETYPE_FILE) {
4003
0
        wildcard->state = CURLWC_SKIP;
4004
0
        continue;
4005
0
      }
4006
4007
0
      if(finfo->flags & CURLFINFOFLAG_KNOWN_SIZE)
4008
0
        ftpc->known_filesize = finfo->size;
4009
4010
0
      result = ftp_parse_url_path(data, ftpc, ftp);
4011
0
      if(result)
4012
0
        return result;
4013
4014
      /* we do not need the Curl_fileinfo of first file anymore */
4015
0
      Curl_node_remove(Curl_llist_head(&wildcard->filelist));
4016
4017
0
      if(Curl_llist_count(&wildcard->filelist) == 0) {
4018
        /* remains only one file to down. */
4019
0
        wildcard->state = CURLWC_CLEAN;
4020
        /* after that will be ftp_do called once again and no transfer
4021
           will be done because of CURLWC_CLEAN state */
4022
0
        return CURLE_OK;
4023
0
      }
4024
0
      return result;
4025
0
    }
4026
4027
0
    case CURLWC_SKIP: {
4028
0
      if(data->set.chunk_end) {
4029
0
        Curl_set_in_callback(data, TRUE);
4030
0
        data->set.chunk_end(data->set.wildcardptr);
4031
0
        Curl_set_in_callback(data, FALSE);
4032
0
      }
4033
0
      Curl_node_remove(Curl_llist_head(&wildcard->filelist));
4034
0
      wildcard->state = (Curl_llist_count(&wildcard->filelist) == 0) ?
4035
0
        CURLWC_CLEAN : CURLWC_DOWNLOADING;
4036
0
      continue;
4037
0
    }
4038
4039
0
    case CURLWC_CLEAN: {
4040
0
      struct ftp_wc *ftpwc = wildcard->ftpwc;
4041
0
      result = CURLE_OK;
4042
0
      if(ftpwc)
4043
0
        result = Curl_ftp_parselist_geterror(ftpwc->parser);
4044
4045
0
      wildcard->state = result ? CURLWC_ERROR : CURLWC_DONE;
4046
0
      return result;
4047
0
    }
4048
4049
0
    case CURLWC_DONE:
4050
0
    case CURLWC_ERROR:
4051
0
    case CURLWC_CLEAR:
4052
0
      if(wildcard->dtor) {
4053
0
        wildcard->dtor(wildcard->ftpwc);
4054
0
        wildcard->ftpwc = NULL;
4055
0
      }
4056
0
      return result;
4057
0
    }
4058
0
  }
4059
  /* UNREACHABLE */
4060
0
}
4061
4062
/***********************************************************************
4063
 *
4064
 * ftp_do()
4065
 *
4066
 * This function is registered as 'curl_do' function. It decodes the path
4067
 * parts etc as a wrapper to the actual DO function (ftp_perform).
4068
 *
4069
 * The input argument is already checked for validity.
4070
 */
4071
static CURLcode ftp_do(struct Curl_easy *data, bool *done)
4072
0
{
4073
0
  CURLcode result = CURLE_OK;
4074
0
  struct ftp_conn *ftpc = Curl_conn_meta_get(data->conn, CURL_META_FTP_CONN);
4075
0
  struct FTP *ftp = Curl_meta_get(data, CURL_META_FTP_EASY);
4076
4077
0
  *done = FALSE; /* default to false */
4078
0
  if(!ftpc || !ftp)
4079
0
    return CURLE_FAILED_INIT;
4080
0
  ftpc->wait_data_conn = FALSE; /* default to no such wait */
4081
4082
0
#ifdef CURL_PREFER_LF_LINEENDS
4083
0
  {
4084
    /* FTP data may need conversion. */
4085
0
    struct Curl_cwriter *ftp_lc_writer;
4086
4087
0
    result = Curl_cwriter_create(&ftp_lc_writer, data, &ftp_cw_lc,
4088
0
                                 CURL_CW_CONTENT_DECODE);
4089
0
    if(result)
4090
0
      return result;
4091
4092
0
    result = Curl_cwriter_add(data, ftp_lc_writer);
4093
0
    if(result) {
4094
0
      Curl_cwriter_free(data, ftp_lc_writer);
4095
0
      return result;
4096
0
    }
4097
0
  }
4098
0
#endif /* CURL_PREFER_LF_LINEENDS */
4099
4100
0
  if(data->state.wildcardmatch) {
4101
0
    result = wc_statemach(data, ftpc, ftp);
4102
0
    if(data->wildcard->state == CURLWC_SKIP ||
4103
0
       data->wildcard->state == CURLWC_DONE) {
4104
      /* do not call ftp_regular_transfer */
4105
0
      return CURLE_OK;
4106
0
    }
4107
0
    if(result) /* error, loop or skipping the file */
4108
0
      return result;
4109
0
  }
4110
0
  else { /* no wildcard FSM needed */
4111
0
    result = ftp_parse_url_path(data, ftpc, ftp);
4112
0
    if(result)
4113
0
      return result;
4114
0
  }
4115
4116
0
  result = ftp_regular_transfer(data, ftpc, ftp, done);
4117
4118
0
  return result;
4119
0
}
4120
4121
/***********************************************************************
4122
 *
4123
 * ftp_quit()
4124
 *
4125
 * This should be called before calling sclose() on an ftp control connection
4126
 * (not data connections). We should then wait for the response from the
4127
 * server before returning. The calling code should then try to close the
4128
 * connection.
4129
 *
4130
 */
4131
static CURLcode ftp_quit(struct Curl_easy *data,
4132
                         struct ftp_conn *ftpc)
4133
0
{
4134
0
  CURLcode result = CURLE_OK;
4135
4136
0
  if(ftpc->ctl_valid) {
4137
0
    CURL_TRC_FTP(data, "sending QUIT to close session");
4138
0
    result = Curl_pp_sendf(data, &ftpc->pp, "%s", "QUIT");
4139
0
    if(result) {
4140
0
      failf(data, "Failure sending QUIT command: %s",
4141
0
            curl_easy_strerror(result));
4142
0
      ftpc->ctl_valid = FALSE; /* mark control connection as bad */
4143
0
      connclose(data->conn, "QUIT command failed"); /* mark for closure */
4144
0
      ftp_state(data, ftpc, FTP_STOP);
4145
0
      return result;
4146
0
    }
4147
4148
0
    ftp_state(data, ftpc, FTP_QUIT);
4149
4150
0
    result = ftp_block_statemach(data, ftpc);
4151
0
  }
4152
4153
0
  return result;
4154
0
}
4155
4156
/***********************************************************************
4157
 *
4158
 * ftp_disconnect()
4159
 *
4160
 * Disconnect from an FTP server. Cleanup protocol-specific per-connection
4161
 * resources. BLOCKING.
4162
 */
4163
static CURLcode ftp_disconnect(struct Curl_easy *data,
4164
                               struct connectdata *conn,
4165
                               bool dead_connection)
4166
0
{
4167
0
  struct ftp_conn *ftpc = Curl_conn_meta_get(conn, CURL_META_FTP_CONN);
4168
4169
0
  if(!ftpc)
4170
0
    return CURLE_FAILED_INIT;
4171
  /* We cannot send quit unconditionally. If this connection is stale or
4172
     bad in any way, sending quit and waiting around here will make the
4173
     disconnect wait in vain and cause more problems than we need to.
4174
4175
     ftp_quit() will check the state of ftp->ctl_valid. If it is ok it
4176
     will try to send the QUIT command, otherwise it will just return.
4177
  */
4178
0
  ftpc->shutdown = TRUE;
4179
0
  if(dead_connection || Curl_pp_needs_flush(data, &ftpc->pp))
4180
0
    ftpc->ctl_valid = FALSE;
4181
4182
  /* The FTP session may or may not have been allocated/setup at this point! */
4183
0
  (void)ftp_quit(data, ftpc); /* ignore errors on the QUIT */
4184
0
  return CURLE_OK;
4185
0
}
4186
4187
static size_t numof_slashes(const char *str)
4188
0
{
4189
0
  const char *slashPos;
4190
0
  size_t num = 0;
4191
0
  do {
4192
0
    slashPos = strchr(str, '/');
4193
0
    if(slashPos) {
4194
0
      ++num;
4195
0
      str = slashPos + 1;
4196
0
    }
4197
0
  } while(slashPos);
4198
0
  return num;
4199
0
}
4200
4201
/***********************************************************************
4202
 *
4203
 * ftp_parse_url_path()
4204
 *
4205
 * Parse the URL path into separate path components.
4206
 *
4207
 */
4208
static
4209
CURLcode ftp_parse_url_path(struct Curl_easy *data,
4210
                            struct ftp_conn *ftpc,
4211
                            struct FTP *ftp)
4212
0
{
4213
0
  const char *slashPos = NULL;
4214
0
  const char *fileName = NULL;
4215
0
  CURLcode result = CURLE_OK;
4216
0
  const char *rawPath = NULL; /* url-decoded "raw" path */
4217
0
  size_t pathLen = 0;
4218
4219
0
  ftpc->ctl_valid = FALSE;
4220
0
  ftpc->cwdfail = FALSE;
4221
4222
0
  if(ftpc->rawpath)
4223
0
    freedirs(ftpc);
4224
  /* url-decode ftp path before further evaluation */
4225
0
  result = Curl_urldecode(ftp->path, 0, &ftpc->rawpath, &pathLen, REJECT_CTRL);
4226
0
  if(result) {
4227
0
    failf(data, "path contains control characters");
4228
0
    return result;
4229
0
  }
4230
0
  rawPath = ftpc->rawpath;
4231
4232
0
  switch(data->set.ftp_filemethod) {
4233
0
    case FTPFILE_NOCWD: /* fastest, but less standard-compliant */
4234
4235
0
      if((pathLen > 0) && (rawPath[pathLen - 1] != '/'))
4236
0
        fileName = rawPath;  /* this is a full file path */
4237
      /*
4238
        else: ftpc->file is not used anywhere other than for operations on
4239
              a file. In other words, never for directory operations.
4240
              So we can safely leave filename as NULL here and use it as a
4241
              argument in dir/file decisions.
4242
      */
4243
0
      break;
4244
4245
0
    case FTPFILE_SINGLECWD:
4246
0
      slashPos = strrchr(rawPath, '/');
4247
0
      if(slashPos) {
4248
        /* get path before last slash, except for / */
4249
0
        size_t dirlen = slashPos - rawPath;
4250
0
        if(dirlen == 0)
4251
0
          dirlen = 1;
4252
4253
0
        ftpc->dirs = calloc(1, sizeof(ftpc->dirs[0]));
4254
0
        if(!ftpc->dirs)
4255
0
          return CURLE_OUT_OF_MEMORY;
4256
4257
0
        ftpc->dirs[0].start = 0;
4258
0
        ftpc->dirs[0].len = (int)dirlen;
4259
0
        ftpc->dirdepth = 1; /* we consider it to be a single dir */
4260
0
        fileName = slashPos + 1; /* rest is filename */
4261
0
      }
4262
0
      else
4263
0
        fileName = rawPath; /* filename only (or empty) */
4264
0
      break;
4265
4266
0
    default: /* allow pretty much anything */
4267
0
    case FTPFILE_MULTICWD: {
4268
      /* current position: begin of next path component */
4269
0
      const char *curPos = rawPath;
4270
4271
      /* number of entries to allocate for the 'dirs' array */
4272
0
      size_t dirAlloc = numof_slashes(rawPath);
4273
4274
0
      if(dirAlloc >= 1000)
4275
        /* suspiciously deep dir hierarchy */
4276
0
        return CURLE_URL_MALFORMAT;
4277
4278
0
      if(dirAlloc) {
4279
0
        ftpc->dirs = calloc(dirAlloc, sizeof(ftpc->dirs[0]));
4280
0
        if(!ftpc->dirs)
4281
0
          return CURLE_OUT_OF_MEMORY;
4282
4283
        /* parse the URL path into separate path components */
4284
0
        while(dirAlloc--) {
4285
0
          const char *spos = strchr(curPos, '/');
4286
0
          size_t clen = spos - curPos;
4287
4288
          /* path starts with a slash: add that as a directory */
4289
0
          if(!clen && (ftpc->dirdepth == 0))
4290
0
            ++clen;
4291
4292
          /* we skip empty path components, like "x//y" since the FTP command
4293
             CWD requires a parameter and a non-existent parameter a) does not
4294
             work on many servers and b) has no effect on the others. */
4295
0
          if(clen) {
4296
0
            ftpc->dirs[ftpc->dirdepth].start = (int)(curPos - rawPath);
4297
0
            ftpc->dirs[ftpc->dirdepth].len = (int)clen;
4298
0
            ftpc->dirdepth++;
4299
0
          }
4300
0
          curPos = spos + 1;
4301
0
        }
4302
0
      }
4303
0
      fileName = curPos; /* the rest is the filename (or empty) */
4304
0
    }
4305
0
    break;
4306
0
  } /* switch */
4307
4308
0
  if(fileName && *fileName)
4309
0
    ftpc->file = fileName;
4310
0
  else
4311
0
    ftpc->file = NULL; /* instead of point to a zero byte,
4312
                            we make it a NULL pointer */
4313
4314
0
  if(data->state.upload && !ftpc->file && (ftp->transfer == PPTRANSFER_BODY)) {
4315
    /* We need a filename when uploading. Return error! */
4316
0
    failf(data, "Uploading to a URL without a filename");
4317
0
    return CURLE_URL_MALFORMAT;
4318
0
  }
4319
4320
0
  ftpc->cwddone = FALSE; /* default to not done */
4321
4322
0
  if((data->set.ftp_filemethod == FTPFILE_NOCWD) && (rawPath[0] == '/'))
4323
0
    ftpc->cwddone = TRUE; /* skip CWD for absolute paths */
4324
0
  else { /* newly created FTP connections are already in entry path */
4325
0
    const char *oldPath = data->conn->bits.reuse ? ftpc->prevpath : "";
4326
0
    if(oldPath) {
4327
0
      size_t n = pathLen;
4328
0
      if(data->set.ftp_filemethod == FTPFILE_NOCWD)
4329
0
        n = 0; /* CWD to entry for relative paths */
4330
0
      else
4331
0
        n -= ftpc->file ? strlen(ftpc->file) : 0;
4332
4333
0
      if((strlen(oldPath) == n) && rawPath && !strncmp(rawPath, oldPath, n)) {
4334
0
        infof(data, "Request has same path as previous transfer");
4335
0
        ftpc->cwddone = TRUE;
4336
0
      }
4337
0
    }
4338
0
  }
4339
4340
0
  return CURLE_OK;
4341
0
}
4342
4343
/* call this when the DO phase has completed */
4344
static CURLcode ftp_dophase_done(struct Curl_easy *data,
4345
                                 struct ftp_conn *ftpc,
4346
                                 struct FTP *ftp,
4347
                                 bool connected)
4348
0
{
4349
0
  if(connected) {
4350
0
    int completed;
4351
0
    CURLcode result = ftp_do_more(data, &completed);
4352
4353
0
    if(result) {
4354
0
      close_secondarysocket(data, ftpc);
4355
0
      return result;
4356
0
    }
4357
0
  }
4358
4359
0
  if(ftp->transfer != PPTRANSFER_BODY)
4360
    /* no data to transfer */
4361
0
    Curl_xfer_setup_nop(data);
4362
0
  else if(!connected)
4363
    /* since we did not connect now, we want do_more to get called */
4364
0
    data->conn->bits.do_more = TRUE;
4365
4366
0
  ftpc->ctl_valid = TRUE; /* seems good */
4367
4368
0
  return CURLE_OK;
4369
0
}
4370
4371
/* called from multi.c while DOing */
4372
static CURLcode ftp_doing(struct Curl_easy *data,
4373
                          bool *dophase_done)
4374
0
{
4375
0
  struct ftp_conn *ftpc = Curl_conn_meta_get(data->conn, CURL_META_FTP_CONN);
4376
0
  struct FTP *ftp = Curl_meta_get(data, CURL_META_FTP_EASY);
4377
0
  CURLcode result;
4378
4379
0
  if(!ftpc || !ftp)
4380
0
    return CURLE_FAILED_INIT;
4381
0
  result = ftp_statemach(data, ftpc, dophase_done);
4382
4383
0
  if(result)
4384
0
    CURL_TRC_FTP(data, "[%s] DO phase failed", FTP_CSTATE(ftpc));
4385
0
  else if(*dophase_done) {
4386
0
    result = ftp_dophase_done(data, ftpc, ftp, FALSE /* not connected */);
4387
4388
0
    CURL_TRC_FTP(data, "[%s] DO phase is complete2", FTP_CSTATE(ftpc));
4389
0
  }
4390
0
  return result;
4391
0
}
4392
4393
/***********************************************************************
4394
 *
4395
 * ftp_regular_transfer()
4396
 *
4397
 * The input argument is already checked for validity.
4398
 *
4399
 * Performs all commands done before a regular transfer between a local and a
4400
 * remote host.
4401
 *
4402
 * ftp->ctl_valid starts out as FALSE, and gets set to TRUE if we reach the
4403
 * ftp_done() function without finding any major problem.
4404
 */
4405
static
4406
CURLcode ftp_regular_transfer(struct Curl_easy *data,
4407
                              struct ftp_conn *ftpc,
4408
                              struct FTP *ftp,
4409
                              bool *dophase_done)
4410
0
{
4411
0
  CURLcode result = CURLE_OK;
4412
0
  bool connected = FALSE;
4413
0
  data->req.size = -1; /* make sure this is unknown at this point */
4414
4415
0
  Curl_pgrsSetUploadCounter(data, 0);
4416
0
  Curl_pgrsSetDownloadCounter(data, 0);
4417
0
  Curl_pgrsSetUploadSize(data, -1);
4418
0
  Curl_pgrsSetDownloadSize(data, -1);
4419
4420
0
  ftpc->ctl_valid = TRUE; /* starts good */
4421
4422
0
  result = ftp_perform(data, ftpc, ftp,
4423
0
                       &connected, /* have we connected after PASV/PORT */
4424
0
                       dophase_done); /* all commands in the DO-phase done? */
4425
4426
0
  if(!result) {
4427
4428
0
    if(!*dophase_done)
4429
      /* the DO phase has not completed yet */
4430
0
      return CURLE_OK;
4431
4432
0
    result = ftp_dophase_done(data, ftpc, ftp, connected);
4433
4434
0
    if(result)
4435
0
      return result;
4436
0
  }
4437
0
  else
4438
0
    freedirs(ftpc);
4439
4440
0
  return result;
4441
0
}
4442
4443
static void ftp_easy_dtor(void *key, size_t klen, void *entry)
4444
0
{
4445
0
  struct FTP *ftp = entry;
4446
0
  (void)key;
4447
0
  (void)klen;
4448
0
  Curl_safefree(ftp->pathalloc);
4449
0
  free(ftp);
4450
0
}
4451
4452
static void ftp_conn_dtor(void *key, size_t klen, void *entry)
4453
0
{
4454
0
  struct ftp_conn *ftpc = entry;
4455
0
  (void)key;
4456
0
  (void)klen;
4457
0
  freedirs(ftpc);
4458
0
  Curl_safefree(ftpc->account);
4459
0
  Curl_safefree(ftpc->alternative_to_user);
4460
0
  Curl_safefree(ftpc->entrypath);
4461
0
  Curl_safefree(ftpc->prevpath);
4462
0
  Curl_safefree(ftpc->server_os);
4463
0
  Curl_pp_disconnect(&ftpc->pp);
4464
0
  free(ftpc);
4465
0
}
4466
4467
static CURLcode ftp_setup_connection(struct Curl_easy *data,
4468
                                     struct connectdata *conn)
4469
0
{
4470
0
  char *type;
4471
0
  struct FTP *ftp;
4472
0
  CURLcode result = CURLE_OK;
4473
0
  struct ftp_conn *ftpc;
4474
4475
0
  ftp = calloc(1, sizeof(*ftp));
4476
0
  if(!ftp ||
4477
0
     Curl_meta_set(data, CURL_META_FTP_EASY, ftp, ftp_easy_dtor))
4478
0
    return CURLE_OUT_OF_MEMORY;
4479
4480
0
  ftpc = calloc(1, sizeof(*ftpc));
4481
0
  if(!ftpc ||
4482
0
     Curl_conn_meta_set(conn, CURL_META_FTP_CONN, ftpc, ftp_conn_dtor))
4483
0
    return CURLE_OUT_OF_MEMORY;
4484
4485
  /* clone connection related data that is FTP specific */
4486
0
  if(data->set.str[STRING_FTP_ACCOUNT]) {
4487
0
    ftpc->account = strdup(data->set.str[STRING_FTP_ACCOUNT]);
4488
0
    if(!ftpc->account) {
4489
0
      Curl_conn_meta_remove(conn, CURL_META_FTP_CONN);
4490
0
      return CURLE_OUT_OF_MEMORY;
4491
0
    }
4492
0
  }
4493
0
  if(data->set.str[STRING_FTP_ALTERNATIVE_TO_USER]) {
4494
0
    ftpc->alternative_to_user =
4495
0
      strdup(data->set.str[STRING_FTP_ALTERNATIVE_TO_USER]);
4496
0
    if(!ftpc->alternative_to_user) {
4497
0
      Curl_safefree(ftpc->account);
4498
0
      Curl_conn_meta_remove(conn, CURL_META_FTP_CONN);
4499
0
      return CURLE_OUT_OF_MEMORY;
4500
0
    }
4501
0
  }
4502
4503
0
  ftp->path = &data->state.up.path[1]; /* do not include the initial slash */
4504
4505
  /* FTP URLs support an extension like ";type=<typecode>" that
4506
   * we will try to get now! */
4507
0
  type = strstr(ftp->path, ";type=");
4508
4509
0
  if(!type)
4510
0
    type = strstr(conn->host.rawalloc, ";type=");
4511
4512
0
  if(type) {
4513
0
    char command;
4514
0
    *type = 0;                     /* it was in the middle of the hostname */
4515
0
    command = Curl_raw_toupper(type[6]);
4516
4517
0
    switch(command) {
4518
0
    case 'A': /* ASCII mode */
4519
0
      data->state.prefer_ascii = TRUE;
4520
0
      break;
4521
4522
0
    case 'D': /* directory mode */
4523
0
      data->state.list_only = TRUE;
4524
0
      break;
4525
4526
0
    case 'I': /* binary mode */
4527
0
    default:
4528
      /* switch off ASCII */
4529
0
      data->state.prefer_ascii = FALSE;
4530
0
      break;
4531
0
    }
4532
0
  }
4533
4534
  /* get some initial data into the ftp struct */
4535
0
  ftp->transfer = PPTRANSFER_BODY;
4536
0
  ftp->downloadsize = 0;
4537
0
  ftpc->known_filesize = -1; /* unknown size for now */
4538
0
  ftpc->use_ssl = data->set.use_ssl;
4539
0
  ftpc->ccc = data->set.ftp_ccc;
4540
4541
0
  CURL_TRC_FTP(data, "[%s] setup connection -> %d", FTP_CSTATE(ftpc), result);
4542
0
  return result;
4543
0
}
4544
4545
bool ftp_conns_match(struct connectdata *needle, struct connectdata *conn)
4546
0
{
4547
0
  struct ftp_conn *nftpc = Curl_conn_meta_get(needle, CURL_META_FTP_CONN);
4548
0
  struct ftp_conn *cftpc = Curl_conn_meta_get(conn, CURL_META_FTP_CONN);
4549
  /* Also match ACCOUNT, ALTERNATIVE-TO-USER, USE_SSL and CCC options */
4550
0
  if(!nftpc || !cftpc ||
4551
0
     Curl_timestrcmp(nftpc->account, cftpc->account) ||
4552
0
     Curl_timestrcmp(nftpc->alternative_to_user,
4553
0
                     cftpc->alternative_to_user) ||
4554
0
     (nftpc->use_ssl != cftpc->use_ssl) ||
4555
0
     (nftpc->ccc != cftpc->ccc))
4556
0
    return FALSE;
4557
0
  return TRUE;
4558
0
}
4559
4560
#endif /* CURL_DISABLE_FTP */