xref: /netbsd-src/usr.bin/ftp/ftp.c (revision 76dfffe33547c37f8bdd446e3e4ab0f3c16cea4b)
1 /*      $NetBSD: ftp.c,v 1.13 1995/09/16 22:32:59 pk Exp $      */
2 
3 /*
4  * Copyright (c) 1985, 1989, 1993, 1994
5  *	The Regents of the University of California.  All rights reserved.
6  *
7  * Redistribution and use in source and binary forms, with or without
8  * modification, are permitted provided that the following conditions
9  * are met:
10  * 1. Redistributions of source code must retain the above copyright
11  *    notice, this list of conditions and the following disclaimer.
12  * 2. Redistributions in binary form must reproduce the above copyright
13  *    notice, this list of conditions and the following disclaimer in the
14  *    documentation and/or other materials provided with the distribution.
15  * 3. All advertising materials mentioning features or use of this software
16  *    must display the following acknowledgement:
17  *	This product includes software developed by the University of
18  *	California, Berkeley and its contributors.
19  * 4. Neither the name of the University nor the names of its contributors
20  *    may be used to endorse or promote products derived from this software
21  *    without specific prior written permission.
22  *
23  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
24  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
27  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33  * SUCH DAMAGE.
34  */
35 
36 #ifndef lint
37 #if 0
38 static char sccsid[] = "@(#)ftp.c	8.6 (Berkeley) 10/27/94";
39 #else
40 static char rcsid[] = "$NetBSD: ftp.c,v 1.13 1995/09/16 22:32:59 pk Exp $";
41 #endif
42 #endif /* not lint */
43 
44 #include <sys/param.h>
45 #include <sys/stat.h>
46 #include <sys/ioctl.h>
47 #include <sys/socket.h>
48 #include <sys/time.h>
49 #include <sys/file.h>
50 
51 #include <netinet/in.h>
52 #include <netinet/in_systm.h>
53 #include <netinet/ip.h>
54 #include <arpa/inet.h>
55 #include <arpa/ftp.h>
56 #include <arpa/telnet.h>
57 
58 #include <ctype.h>
59 #include <err.h>
60 #include <errno.h>
61 #include <fcntl.h>
62 #include <netdb.h>
63 #include <pwd.h>
64 #include <signal.h>
65 #include <stdio.h>
66 #include <stdlib.h>
67 #include <string.h>
68 #include <unistd.h>
69 #include <varargs.h>
70 
71 #include "ftp_var.h"
72 
73 extern int h_errno;
74 
75 struct	sockaddr_in hisctladdr;
76 struct	sockaddr_in data_addr;
77 int	data = -1;
78 int	abrtflag = 0;
79 jmp_buf	ptabort;
80 int	ptabflg;
81 int	ptflag = 0;
82 struct	sockaddr_in myctladdr;
83 off_t	restart_point = 0;
84 
85 
86 FILE	*cin, *cout;
87 
88 char *
89 hookup(host, port)
90 	char *host;
91 	int port;
92 {
93 	struct hostent *hp = 0;
94 	int s, len, tos;
95 	static char hostnamebuf[80];
96 
97 	memset((char *)&hisctladdr, 0, sizeof (hisctladdr));
98 	if (inet_aton(host, &hisctladdr.sin_addr) != 0) {
99 		hisctladdr.sin_family = AF_INET;
100 		(void) strncpy(hostnamebuf, host, sizeof(hostnamebuf));
101 	} else {
102 		hp = gethostbyname(host);
103 		if (hp == NULL) {
104 			warnx("%s: %s", host, hstrerror(h_errno));
105 			code = -1;
106 			return ((char *) 0);
107 		}
108 		hisctladdr.sin_family = hp->h_addrtype;
109 		memmove((caddr_t)&hisctladdr.sin_addr,
110 				hp->h_addr_list[0], hp->h_length);
111 		memcpy(&hisctladdr.sin_addr, hp->h_addr, hp->h_length);
112 		(void) strncpy(hostnamebuf, hp->h_name, sizeof(hostnamebuf));
113 	}
114 	hostname = hostnamebuf;
115 	s = socket(hisctladdr.sin_family, SOCK_STREAM, 0);
116 	if (s < 0) {
117 		warn("socket");
118 		code = -1;
119 		return (0);
120 	}
121 	hisctladdr.sin_port = port;
122 	while (connect(s, (struct sockaddr *)&hisctladdr, sizeof (hisctladdr)) < 0) {
123 		if (hp && hp->h_addr_list[1]) {
124 			int oerrno = errno;
125 			char *ia;
126 
127 			ia = inet_ntoa(hisctladdr.sin_addr);
128 			errno = oerrno;
129 			warn("connect to address %s", ia);
130 			hp->h_addr_list++;
131 			memmove((caddr_t)&hisctladdr.sin_addr,
132 					hp->h_addr_list[0], hp->h_length);
133 			fprintf(stdout, "Trying %s...\n",
134 				inet_ntoa(hisctladdr.sin_addr));
135 			(void) close(s);
136 			s = socket(hisctladdr.sin_family, SOCK_STREAM, 0);
137 			if (s < 0) {
138 				warn("socket");
139 				code = -1;
140 				return (0);
141 			}
142 			continue;
143 		}
144 		warn("connect");
145 		code = -1;
146 		goto bad;
147 	}
148 	len = sizeof (myctladdr);
149 	if (getsockname(s, (struct sockaddr *)&myctladdr, &len) < 0) {
150 		warn("getsockname");
151 		code = -1;
152 		goto bad;
153 	}
154 #ifdef IP_TOS
155 	tos = IPTOS_LOWDELAY;
156 	if (setsockopt(s, IPPROTO_IP, IP_TOS, (char *)&tos, sizeof(int)) < 0)
157 		warn("setsockopt TOS (ignored)");
158 #endif
159 	cin = fdopen(s, "r");
160 	cout = fdopen(s, "w");
161 	if (cin == NULL || cout == NULL) {
162 		warnx("fdopen failed.");
163 		if (cin)
164 			(void) fclose(cin);
165 		if (cout)
166 			(void) fclose(cout);
167 		code = -1;
168 		goto bad;
169 	}
170 	if (verbose)
171 		printf("Connected to %s.\n", hostname);
172 	if (getreply(0) > 2) { 	/* read startup message from server */
173 		if (cin)
174 			(void) fclose(cin);
175 		if (cout)
176 			(void) fclose(cout);
177 		code = -1;
178 		goto bad;
179 	}
180 #ifdef SO_OOBINLINE
181 	{
182 	int on = 1;
183 
184 	if (setsockopt(s, SOL_SOCKET, SO_OOBINLINE, (char *)&on, sizeof(on))
185 		< 0 && debug) {
186 			warn("setsockopt");
187 		}
188 	}
189 #endif /* SO_OOBINLINE */
190 
191 	return (hostname);
192 bad:
193 	(void) close(s);
194 	return ((char *)0);
195 }
196 
197 int
198 login(host)
199 	char *host;
200 {
201 	char tmp[80];
202 	char *user, *pass, *acct;
203 	int n, aflag = 0;
204 
205 	user = pass = acct = 0;
206 	if (ruserpass(host, &user, &pass, &acct) < 0) {
207 		code = -1;
208 		return (0);
209 	}
210 	while (user == NULL) {
211 		char *myname = getlogin();
212 
213 		if (myname == NULL) {
214 			struct passwd *pp = getpwuid(getuid());
215 
216 			if (pp != NULL)
217 				myname = pp->pw_name;
218 		}
219 		if (myname)
220 			printf("Name (%s:%s): ", host, myname);
221 		else
222 			printf("Name (%s): ", host);
223 		(void) fgets(tmp, sizeof(tmp) - 1, stdin);
224 		tmp[strlen(tmp) - 1] = '\0';
225 		if (*tmp == '\0')
226 			user = myname;
227 		else
228 			user = tmp;
229 	}
230 	n = command("USER %s", user);
231 	if (n == CONTINUE) {
232 		if (pass == NULL)
233 			pass = getpass("Password:");
234 		n = command("PASS %s", pass);
235 	}
236 	if (n == CONTINUE) {
237 		aflag++;
238 		acct = getpass("Account:");
239 		n = command("ACCT %s", acct);
240 	}
241 	if (n != COMPLETE) {
242 		warnx("Login failed.");
243 		return (0);
244 	}
245 	if (!aflag && acct != NULL)
246 		(void) command("ACCT %s", acct);
247 	if (proxy)
248 		return (1);
249 	for (n = 0; n < macnum; ++n) {
250 		if (!strcmp("init", macros[n].mac_name)) {
251 			(void) strcpy(line, "$init");
252 			makeargv();
253 			domacro(margc, margv);
254 			break;
255 		}
256 	}
257 	return (1);
258 }
259 
260 void
261 cmdabort()
262 {
263 
264 	printf("\n");
265 	(void) fflush(stdout);
266 	abrtflag++;
267 	if (ptflag)
268 		longjmp(ptabort,1);
269 }
270 
271 /*VARARGS*/
272 int
273 command(va_alist)
274 va_dcl
275 {
276 	va_list ap;
277 	char *fmt;
278 	int r;
279 	sig_t oldintr;
280 
281 	abrtflag = 0;
282 	if (debug) {
283 		printf("---> ");
284 		va_start(ap);
285 		fmt = va_arg(ap, char *);
286 		if (strncmp("PASS ", fmt, 5) == 0)
287 			printf("PASS XXXX");
288 		else
289 			vfprintf(stdout, fmt, ap);
290 		va_end(ap);
291 		printf("\n");
292 		(void) fflush(stdout);
293 	}
294 	if (cout == NULL) {
295 		warn("No control connection for command");
296 		code = -1;
297 		return (0);
298 	}
299 	oldintr = signal(SIGINT, cmdabort);
300 	va_start(ap);
301 	fmt = va_arg(ap, char *);
302 	vfprintf(cout, fmt, ap);
303 	va_end(ap);
304 	fprintf(cout, "\r\n");
305 	(void) fflush(cout);
306 	cpend = 1;
307 	r = getreply(!strcmp(fmt, "QUIT"));
308 	if (abrtflag && oldintr != SIG_IGN)
309 		(*oldintr)(SIGINT);
310 	(void) signal(SIGINT, oldintr);
311 	return (r);
312 }
313 
314 char reply_string[BUFSIZ];		/* last line of previous reply */
315 
316 int
317 getreply(expecteof)
318 	int expecteof;
319 {
320 	int c, n;
321 	int dig;
322 	int originalcode = 0, continuation = 0;
323 	sig_t oldintr;
324 	int pflag = 0;
325 	char *cp, *pt = pasv;
326 
327 	oldintr = signal(SIGINT, cmdabort);
328 	for (;;) {
329 		dig = n = code = 0;
330 		cp = reply_string;
331 		while ((c = getc(cin)) != '\n') {
332 			if (c == IAC) {     /* handle telnet commands */
333 				switch (c = getc(cin)) {
334 				case WILL:
335 				case WONT:
336 					c = getc(cin);
337 					fprintf(cout, "%c%c%c", IAC, DONT, c);
338 					(void) fflush(cout);
339 					break;
340 				case DO:
341 				case DONT:
342 					c = getc(cin);
343 					fprintf(cout, "%c%c%c", IAC, WONT, c);
344 					(void) fflush(cout);
345 					break;
346 				default:
347 					break;
348 				}
349 				continue;
350 			}
351 			dig++;
352 			if (c == EOF) {
353 				if (expecteof) {
354 					(void) signal(SIGINT,oldintr);
355 					code = 221;
356 					return (0);
357 				}
358 				lostpeer();
359 				if (verbose) {
360 					printf("421 Service not available, remote server has closed connection\n");
361 					(void) fflush(stdout);
362 				}
363 				code = 421;
364 				return (4);
365 			}
366 			if (c != '\r' && (verbose > 0 ||
367 			    (verbose > -1 && n == '5' && dig > 4))) {
368 				if (proxflag &&
369 				   (dig == 1 || dig == 5 && verbose == 0))
370 					printf("%s:",hostname);
371 				(void) putchar(c);
372 			}
373 			if (dig < 4 && isdigit(c))
374 				code = code * 10 + (c - '0');
375 			if (!pflag && code == 227)
376 				pflag = 1;
377 			if (dig > 4 && pflag == 1 && isdigit(c))
378 				pflag = 2;
379 			if (pflag == 2) {
380 				if (c != '\r' && c != ')')
381 					*pt++ = c;
382 				else {
383 					*pt = '\0';
384 					pflag = 3;
385 				}
386 			}
387 			if (dig == 4 && c == '-') {
388 				if (continuation)
389 					code = 0;
390 				continuation++;
391 			}
392 			if (n == 0)
393 				n = c;
394 			if (cp < &reply_string[sizeof(reply_string) - 1])
395 				*cp++ = c;
396 		}
397 		if (verbose > 0 || verbose > -1 && n == '5') {
398 			(void) putchar(c);
399 			(void) fflush (stdout);
400 		}
401 		if (continuation && code != originalcode) {
402 			if (originalcode == 0)
403 				originalcode = code;
404 			continue;
405 		}
406 		*cp = '\0';
407 		if (n != '1')
408 			cpend = 0;
409 		(void) signal(SIGINT,oldintr);
410 		if (code == 421 || originalcode == 421)
411 			lostpeer();
412 		if (abrtflag && oldintr != cmdabort && oldintr != SIG_IGN)
413 			(*oldintr)(SIGINT);
414 		return (n - '0');
415 	}
416 }
417 
418 int
419 empty(mask, sec)
420 	struct fd_set *mask;
421 	int sec;
422 {
423 	struct timeval t;
424 
425 	t.tv_sec = (long) sec;
426 	t.tv_usec = 0;
427 	return (select(32, mask, (struct fd_set *) 0, (struct fd_set *) 0, &t));
428 }
429 
430 jmp_buf	sendabort;
431 
432 void
433 abortsend()
434 {
435 
436 	mflag = 0;
437 	abrtflag = 0;
438 	printf("\nsend aborted\nwaiting for remote to finish abort\n");
439 	(void) fflush(stdout);
440 	longjmp(sendabort, 1);
441 }
442 
443 #define HASHBYTES 1024
444 
445 void
446 sendrequest(cmd, local, remote, printnames)
447 	char *cmd, *local, *remote;
448 	int printnames;
449 {
450 	struct stat st;
451 	struct timeval start, stop;
452 	int c, d;
453 	FILE *fin, *dout = 0, *popen();
454 	int (*closefunc) __P((FILE *));
455 	sig_t oldintr, oldintp;
456 	long bytes = 0, hashbytes = HASHBYTES;
457 	char *lmode, buf[BUFSIZ], *bufp;
458 
459 	if (verbose && printnames) {
460 		if (local && *local != '-')
461 			printf("local: %s ", local);
462 		if (remote)
463 			printf("remote: %s\n", remote);
464 	}
465 	if (proxy) {
466 		proxtrans(cmd, local, remote);
467 		return;
468 	}
469 	if (curtype != type)
470 		changetype(type, 0);
471 	closefunc = NULL;
472 	oldintr = NULL;
473 	oldintp = NULL;
474 	lmode = "w";
475 	if (setjmp(sendabort)) {
476 		while (cpend) {
477 			(void) getreply(0);
478 		}
479 		if (data >= 0) {
480 			(void) close(data);
481 			data = -1;
482 		}
483 		if (oldintr)
484 			(void) signal(SIGINT,oldintr);
485 		if (oldintp)
486 			(void) signal(SIGPIPE,oldintp);
487 		code = -1;
488 		return;
489 	}
490 	oldintr = signal(SIGINT, abortsend);
491 	if (strcmp(local, "-") == 0)
492 		fin = stdin;
493 	else if (*local == '|') {
494 		oldintp = signal(SIGPIPE,SIG_IGN);
495 		fin = popen(local + 1, "r");
496 		if (fin == NULL) {
497 			warn("%s", local + 1);
498 			(void) signal(SIGINT, oldintr);
499 			(void) signal(SIGPIPE, oldintp);
500 			code = -1;
501 			return;
502 		}
503 		closefunc = pclose;
504 	} else {
505 		fin = fopen(local, "r");
506 		if (fin == NULL) {
507 			warn("local: %s", local);
508 			(void) signal(SIGINT, oldintr);
509 			code = -1;
510 			return;
511 		}
512 		closefunc = fclose;
513 		if (fstat(fileno(fin), &st) < 0 ||
514 		    (st.st_mode&S_IFMT) != S_IFREG) {
515 			fprintf(stdout, "%s: not a plain file.\n", local);
516 			(void) signal(SIGINT, oldintr);
517 			fclose(fin);
518 			code = -1;
519 			return;
520 		}
521 	}
522 	if (initconn()) {
523 		(void) signal(SIGINT, oldintr);
524 		if (oldintp)
525 			(void) signal(SIGPIPE, oldintp);
526 		code = -1;
527 		if (closefunc != NULL)
528 			(*closefunc)(fin);
529 		return;
530 	}
531 	if (setjmp(sendabort))
532 		goto abort;
533 
534 	if (restart_point &&
535 	    (strcmp(cmd, "STOR") == 0 || strcmp(cmd, "APPE") == 0)) {
536 		int rc;
537 
538 		switch (curtype) {
539 		case TYPE_A:
540 			rc = fseek(fin, (long) restart_point, SEEK_SET);
541 			break;
542 		case TYPE_I:
543 		case TYPE_L:
544 			rc = lseek(fileno(fin), restart_point, SEEK_SET);
545 			break;
546 		}
547 		if (rc < 0) {
548 			warn("local: %s", local);
549 			restart_point = 0;
550 			if (closefunc != NULL)
551 				(*closefunc)(fin);
552 			return;
553 		}
554 		if (command("REST %ld", (long) restart_point)
555 			!= CONTINUE) {
556 			restart_point = 0;
557 			if (closefunc != NULL)
558 				(*closefunc)(fin);
559 			return;
560 		}
561 		restart_point = 0;
562 		lmode = "r+w";
563 	}
564 	if (remote) {
565 		if (command("%s %s", cmd, remote) != PRELIM) {
566 			(void) signal(SIGINT, oldintr);
567 			if (oldintp)
568 				(void) signal(SIGPIPE, oldintp);
569 			if (closefunc != NULL)
570 				(*closefunc)(fin);
571 			return;
572 		}
573 	} else
574 		if (command("%s", cmd) != PRELIM) {
575 			(void) signal(SIGINT, oldintr);
576 			if (oldintp)
577 				(void) signal(SIGPIPE, oldintp);
578 			if (closefunc != NULL)
579 				(*closefunc)(fin);
580 			return;
581 		}
582 	dout = dataconn(lmode);
583 	if (dout == NULL)
584 		goto abort;
585 	(void) gettimeofday(&start, (struct timezone *)0);
586 	oldintp = signal(SIGPIPE, SIG_IGN);
587 	switch (curtype) {
588 
589 	case TYPE_I:
590 	case TYPE_L:
591 		errno = d = 0;
592 		while ((c = read(fileno(fin), buf, sizeof (buf))) > 0) {
593 			bytes += c;
594 			for (bufp = buf; c > 0; c -= d, bufp += d)
595 				if ((d = write(fileno(dout), bufp, c)) <= 0)
596 					break;
597 			if (hash) {
598 				while (bytes >= hashbytes) {
599 					(void) putchar('#');
600 					hashbytes += HASHBYTES;
601 				}
602 				(void) fflush(stdout);
603 			}
604 		}
605 		if (hash && bytes > 0) {
606 			if (bytes < HASHBYTES)
607 				(void) putchar('#');
608 			(void) putchar('\n');
609 			(void) fflush(stdout);
610 		}
611 		if (c < 0)
612 			warn("local: %s", local);
613 		if (d < 0) {
614 			if (errno != EPIPE)
615 				warn("netout");
616 			bytes = -1;
617 		}
618 		break;
619 
620 	case TYPE_A:
621 		while ((c = getc(fin)) != EOF) {
622 			if (c == '\n') {
623 				while (hash && (bytes >= hashbytes)) {
624 					(void) putchar('#');
625 					(void) fflush(stdout);
626 					hashbytes += HASHBYTES;
627 				}
628 				if (ferror(dout))
629 					break;
630 				(void) putc('\r', dout);
631 				bytes++;
632 			}
633 			(void) putc(c, dout);
634 			bytes++;
635 	/*		if (c == '\r') {			  	*/
636 	/*		(void)	putc('\0', dout);  // this violates rfc */
637 	/*			bytes++;				*/
638 	/*		}                          			*/
639 		}
640 		if (hash) {
641 			if (bytes < hashbytes)
642 				(void) putchar('#');
643 			(void) putchar('\n');
644 			(void) fflush(stdout);
645 		}
646 		if (ferror(fin))
647 			warn("local: %s", local);
648 		if (ferror(dout)) {
649 			if (errno != EPIPE)
650 				warn("netout");
651 			bytes = -1;
652 		}
653 		break;
654 	}
655 	if (closefunc != NULL)
656 		(*closefunc)(fin);
657 	(void) fclose(dout);
658 	(void) gettimeofday(&stop, (struct timezone *)0);
659 	(void) getreply(0);
660 	(void) signal(SIGINT, oldintr);
661 	if (oldintp)
662 		(void) signal(SIGPIPE, oldintp);
663 	if (bytes > 0)
664 		ptransfer("sent", bytes, &start, &stop);
665 	return;
666 abort:
667 	(void) signal(SIGINT, oldintr);
668 	if (oldintp)
669 		(void) signal(SIGPIPE, oldintp);
670 	if (!cpend) {
671 		code = -1;
672 		return;
673 	}
674 	if (data >= 0) {
675 		(void) close(data);
676 		data = -1;
677 	}
678 	if (dout)
679 		(void) fclose(dout);
680 	(void) getreply(0);
681 	code = -1;
682 	if (closefunc != NULL && fin != NULL)
683 		(*closefunc)(fin);
684 	(void) gettimeofday(&stop, (struct timezone *)0);
685 	if (bytes > 0)
686 		ptransfer("sent", bytes, &start, &stop);
687 }
688 
689 jmp_buf	recvabort;
690 
691 void
692 abortrecv()
693 {
694 
695 	mflag = 0;
696 	abrtflag = 0;
697 	printf("\nreceive aborted\nwaiting for remote to finish abort\n");
698 	(void) fflush(stdout);
699 	longjmp(recvabort, 1);
700 }
701 
702 void
703 recvrequest(cmd, local, remote, lmode, printnames)
704 	char *cmd, *local, *remote, *lmode;
705 	int printnames;
706 {
707 	FILE *fout, *din = 0;
708 	int (*closefunc) __P((FILE *));
709 	sig_t oldintr, oldintp;
710 	int c, d, is_retr, tcrflag, bare_lfs = 0;
711 	static int bufsize;
712 	static char *buf;
713 	long bytes = 0, hashbytes = HASHBYTES;
714 	struct timeval start, stop;
715 	struct stat st;
716 
717 	is_retr = strcmp(cmd, "RETR") == 0;
718 	if (is_retr && verbose && printnames) {
719 		if (local && *local != '-')
720 			printf("local: %s ", local);
721 		if (remote)
722 			printf("remote: %s\n", remote);
723 	}
724 	if (proxy && is_retr) {
725 		proxtrans(cmd, local, remote);
726 		return;
727 	}
728 	closefunc = NULL;
729 	oldintr = NULL;
730 	oldintp = NULL;
731 	tcrflag = !crflag && is_retr;
732 	if (setjmp(recvabort)) {
733 		while (cpend) {
734 			(void) getreply(0);
735 		}
736 		if (data >= 0) {
737 			(void) close(data);
738 			data = -1;
739 		}
740 		if (oldintr)
741 			(void) signal(SIGINT, oldintr);
742 		code = -1;
743 		return;
744 	}
745 	oldintr = signal(SIGINT, abortrecv);
746 	if (strcmp(local, "-") && *local != '|') {
747 		if (access(local, 2) < 0) {
748 			char *dir = strrchr(local, '/');
749 
750 			if (errno != ENOENT && errno != EACCES) {
751 				warn("local: %s", local);
752 				(void) signal(SIGINT, oldintr);
753 				code = -1;
754 				return;
755 			}
756 			if (dir != NULL)
757 				*dir = 0;
758 			d = access(dir ? local : ".", 2);
759 			if (dir != NULL)
760 				*dir = '/';
761 			if (d < 0) {
762 				warn("local: %s", local);
763 				(void) signal(SIGINT, oldintr);
764 				code = -1;
765 				return;
766 			}
767 			if (!runique && errno == EACCES &&
768 			    chmod(local, 0600) < 0) {
769 				warn("local: %s", local);
770 				(void) signal(SIGINT, oldintr);
771 				(void) signal(SIGINT, oldintr);
772 				code = -1;
773 				return;
774 			}
775 			if (runique && errno == EACCES &&
776 			   (local = gunique(local)) == NULL) {
777 				(void) signal(SIGINT, oldintr);
778 				code = -1;
779 				return;
780 			}
781 		}
782 		else if (runique && (local = gunique(local)) == NULL) {
783 			(void) signal(SIGINT, oldintr);
784 			code = -1;
785 			return;
786 		}
787 	}
788 	if (!is_retr) {
789 		if (curtype != TYPE_A)
790 			changetype(TYPE_A, 0);
791 	} else if (curtype != type)
792 		changetype(type, 0);
793 	if (initconn()) {
794 		(void) signal(SIGINT, oldintr);
795 		code = -1;
796 		return;
797 	}
798 	if (setjmp(recvabort))
799 		goto abort;
800 	if (is_retr && restart_point &&
801 	    command("REST %ld", (long) restart_point) != CONTINUE)
802 		return;
803 	if (remote) {
804 		if (command("%s %s", cmd, remote) != PRELIM) {
805 			(void) signal(SIGINT, oldintr);
806 			return;
807 		}
808 	} else {
809 		if (command("%s", cmd) != PRELIM) {
810 			(void) signal(SIGINT, oldintr);
811 			return;
812 		}
813 	}
814 	din = dataconn("r");
815 	if (din == NULL)
816 		goto abort;
817 	if (strcmp(local, "-") == 0)
818 		fout = stdout;
819 	else if (*local == '|') {
820 		oldintp = signal(SIGPIPE, SIG_IGN);
821 		fout = popen(local + 1, "w");
822 		if (fout == NULL) {
823 			warn("%s", local+1);
824 			goto abort;
825 		}
826 		closefunc = pclose;
827 	} else {
828 		fout = fopen(local, lmode);
829 		if (fout == NULL) {
830 			warn("local: %s", local);
831 			goto abort;
832 		}
833 		closefunc = fclose;
834 	}
835 	if (fstat(fileno(fout), &st) < 0 || st.st_blksize == 0)
836 		st.st_blksize = BUFSIZ;
837 	if (st.st_blksize > bufsize) {
838 		if (buf)
839 			(void) free(buf);
840 		buf = malloc((unsigned)st.st_blksize);
841 		if (buf == NULL) {
842 			warn("malloc");
843 			bufsize = 0;
844 			goto abort;
845 		}
846 		bufsize = st.st_blksize;
847 	}
848 	(void) gettimeofday(&start, (struct timezone *)0);
849 	switch (curtype) {
850 
851 	case TYPE_I:
852 	case TYPE_L:
853 		if (restart_point &&
854 		    lseek(fileno(fout), restart_point, SEEK_SET) < 0) {
855 			warn("local: %s", local);
856 			if (closefunc != NULL)
857 				(*closefunc)(fout);
858 			return;
859 		}
860 		errno = d = 0;
861 		while ((c = read(fileno(din), buf, bufsize)) > 0) {
862 			if ((d = write(fileno(fout), buf, c)) != c)
863 				break;
864 			bytes += c;
865 			if (hash) {
866 				while (bytes >= hashbytes) {
867 					(void) putchar('#');
868 					hashbytes += HASHBYTES;
869 				}
870 				(void) fflush(stdout);
871 			}
872 		}
873 		if (hash && bytes > 0) {
874 			if (bytes < HASHBYTES)
875 				(void) putchar('#');
876 			(void) putchar('\n');
877 			(void) fflush(stdout);
878 		}
879 		if (c < 0) {
880 			if (errno != EPIPE)
881 				warn("netin");
882 			bytes = -1;
883 		}
884 		if (d < c) {
885 			if (d < 0)
886 				warn("local: %s", local);
887 			else
888 				warnx("%s: short write", local);
889 		}
890 		break;
891 
892 	case TYPE_A:
893 		if (restart_point) {
894 			int i, n, ch;
895 
896 			if (fseek(fout, 0L, SEEK_SET) < 0)
897 				goto done;
898 			n = restart_point;
899 			for (i = 0; i++ < n;) {
900 				if ((ch = getc(fout)) == EOF)
901 					goto done;
902 				if (ch == '\n')
903 					i++;
904 			}
905 			if (fseek(fout, 0L, SEEK_CUR) < 0) {
906 done:
907 				warn("local: %s", local);
908 				if (closefunc != NULL)
909 					(*closefunc)(fout);
910 				return;
911 			}
912 		}
913 		while ((c = getc(din)) != EOF) {
914 			if (c == '\n')
915 				bare_lfs++;
916 			while (c == '\r') {
917 				while (hash && (bytes >= hashbytes)) {
918 					(void) putchar('#');
919 					(void) fflush(stdout);
920 					hashbytes += HASHBYTES;
921 				}
922 				bytes++;
923 				if ((c = getc(din)) != '\n' || tcrflag) {
924 					if (ferror(fout))
925 						goto break2;
926 					(void) putc('\r', fout);
927 					if (c == '\0') {
928 						bytes++;
929 						goto contin2;
930 					}
931 					if (c == EOF)
932 						goto contin2;
933 				}
934 			}
935 			(void) putc(c, fout);
936 			bytes++;
937 	contin2:	;
938 		}
939 break2:
940 		if (bare_lfs) {
941 			printf("WARNING! %d bare linefeeds received in ASCII mode\n", bare_lfs);
942 			printf("File may not have transferred correctly.\n");
943 		}
944 		if (hash) {
945 			if (bytes < hashbytes)
946 				(void) putchar('#');
947 			(void) putchar('\n');
948 			(void) fflush(stdout);
949 		}
950 		if (ferror(din)) {
951 			if (errno != EPIPE)
952 				warn("netin");
953 			bytes = -1;
954 		}
955 		if (ferror(fout))
956 			warn("local: %s", local);
957 		break;
958 	}
959 	if (closefunc != NULL)
960 		(*closefunc)(fout);
961 	(void) signal(SIGINT, oldintr);
962 	if (oldintp)
963 		(void) signal(SIGPIPE, oldintp);
964 	(void) fclose(din);
965 	(void) gettimeofday(&stop, (struct timezone *)0);
966 	(void) getreply(0);
967 	if (bytes > 0 && is_retr)
968 		ptransfer("received", bytes, &start, &stop);
969 	return;
970 abort:
971 
972 /* abort using RFC959 recommended IP,SYNC sequence  */
973 
974 	if (oldintp)
975 		(void) signal(SIGPIPE, oldintr);
976 	(void) signal(SIGINT, SIG_IGN);
977 	if (!cpend) {
978 		code = -1;
979 		(void) signal(SIGINT, oldintr);
980 		return;
981 	}
982 
983 	abort_remote(din);
984 	code = -1;
985 	if (data >= 0) {
986 		(void) close(data);
987 		data = -1;
988 	}
989 	if (closefunc != NULL && fout != NULL)
990 		(*closefunc)(fout);
991 	if (din)
992 		(void) fclose(din);
993 	(void) gettimeofday(&stop, (struct timezone *)0);
994 	if (bytes > 0)
995 		ptransfer("received", bytes, &start, &stop);
996 	(void) signal(SIGINT, oldintr);
997 }
998 
999 /*
1000  * Need to start a listen on the data channel before we send the command,
1001  * otherwise the server's connect may fail.
1002  */
1003 int
1004 initconn()
1005 {
1006 	char *p, *a;
1007 	int result, len, tmpno = 0;
1008 	int on = 1;
1009 	int a0, a1, a2, a3, p0, p1;
1010 
1011 	if (passivemode) {
1012 		data = socket(AF_INET, SOCK_STREAM, 0);
1013 		if (data < 0) {
1014 			perror("ftp: socket");
1015 			return(1);
1016 		}
1017 		if ((options & SO_DEBUG) &&
1018 		    setsockopt(data, SOL_SOCKET, SO_DEBUG, (char *)&on,
1019 			       sizeof (on)) < 0)
1020 			perror("ftp: setsockopt (ignored)");
1021 		if (command("PASV") != COMPLETE) {
1022 			printf("Passive mode refused.\n");
1023 			goto bad;
1024 		}
1025 
1026 		/*
1027 		 * What we've got at this point is a string of comma
1028 		 * separated one-byte unsigned integer values.
1029 		 * The first four are the an IP address. The fifth is
1030 		 * the MSB of the port number, the sixth is the LSB.
1031 		 * From that we'll prepare a sockaddr_in.
1032 		 */
1033 
1034 		if (sscanf(pasv,"%d,%d,%d,%d,%d,%d",
1035 			   &a0, &a1, &a2, &a3, &p0, &p1) != 6) {
1036 			printf("Passive mode address scan failure. "
1037 			       "Shouldn't happen!\n");
1038 			goto bad;
1039 		}
1040 
1041 		bzero(&data_addr, sizeof(data_addr));
1042 		data_addr.sin_family = AF_INET;
1043 		a = (char *)&data_addr.sin_addr.s_addr;
1044 		a[0] = a0 & 0xff;
1045 		a[1] = a1 & 0xff;
1046 		a[2] = a2 & 0xff;
1047 		a[3] = a3 & 0xff;
1048 		p = (char *)&data_addr.sin_port;
1049 		p[0] = p0 & 0xff;
1050 		p[1] = p1 & 0xff;
1051 
1052 		if (connect(data, (struct sockaddr *)&data_addr,
1053 			    sizeof(data_addr)) < 0) {
1054 			perror("ftp: connect");
1055 			goto bad;
1056 		}
1057 #ifdef IP_TOS
1058 		on = IPTOS_THROUGHPUT;
1059 		if (setsockopt(data, IPPROTO_IP, IP_TOS, (char *)&on,
1060 			       sizeof(int)) < 0)
1061 			perror("ftp: setsockopt TOS (ignored)");
1062 #endif
1063 		return(0);
1064 	}
1065 
1066 noport:
1067 	data_addr = myctladdr;
1068 	if (sendport)
1069 		data_addr.sin_port = 0;	/* let system pick one */
1070 	if (data != -1)
1071 		(void) close(data);
1072 	data = socket(AF_INET, SOCK_STREAM, 0);
1073 	if (data < 0) {
1074 		warn("socket");
1075 		if (tmpno)
1076 			sendport = 1;
1077 		return (1);
1078 	}
1079 	if (!sendport)
1080 		if (setsockopt(data, SOL_SOCKET, SO_REUSEADDR, (char *)&on, sizeof (on)) < 0) {
1081 			warn("setsockopt (reuse address)");
1082 			goto bad;
1083 		}
1084 	if (bind(data, (struct sockaddr *)&data_addr, sizeof (data_addr)) < 0) {
1085 		warn("bind");
1086 		goto bad;
1087 	}
1088 	if (options & SO_DEBUG &&
1089 	    setsockopt(data, SOL_SOCKET, SO_DEBUG, (char *)&on, sizeof (on)) < 0)
1090 		warn("setsockopt (ignored)");
1091 	len = sizeof (data_addr);
1092 	if (getsockname(data, (struct sockaddr *)&data_addr, &len) < 0) {
1093 		warn("getsockname");
1094 		goto bad;
1095 	}
1096 	if (listen(data, 1) < 0)
1097 		warn("listen");
1098 	if (sendport) {
1099 		a = (char *)&data_addr.sin_addr;
1100 		p = (char *)&data_addr.sin_port;
1101 #define	UC(b)	(((int)b)&0xff)
1102 		result =
1103 		    command("PORT %d,%d,%d,%d,%d,%d",
1104 		      UC(a[0]), UC(a[1]), UC(a[2]), UC(a[3]),
1105 		      UC(p[0]), UC(p[1]));
1106 		if (result == ERROR && sendport == -1) {
1107 			sendport = 0;
1108 			tmpno = 1;
1109 			goto noport;
1110 		}
1111 		return (result != COMPLETE);
1112 	}
1113 	if (tmpno)
1114 		sendport = 1;
1115 #ifdef IP_TOS
1116 	on = IPTOS_THROUGHPUT;
1117 	if (setsockopt(data, IPPROTO_IP, IP_TOS, (char *)&on, sizeof(int)) < 0)
1118 		warn("setsockopt TOS (ignored)");
1119 #endif
1120 	return (0);
1121 bad:
1122 	(void) close(data), data = -1;
1123 	if (tmpno)
1124 		sendport = 1;
1125 	return (1);
1126 }
1127 
1128 FILE *
1129 dataconn(lmode)
1130 	char *lmode;
1131 {
1132 	struct sockaddr_in from;
1133 	int s, fromlen = sizeof (from), tos;
1134 
1135 	if (passivemode)
1136 		return (fdopen(data, lmode));
1137 
1138 	s = accept(data, (struct sockaddr *) &from, &fromlen);
1139 	if (s < 0) {
1140 		warn("accept");
1141 		(void) close(data), data = -1;
1142 		return (NULL);
1143 	}
1144 	(void) close(data);
1145 	data = s;
1146 #ifdef IP_TOS
1147 	tos = IPTOS_THROUGHPUT;
1148 	if (setsockopt(s, IPPROTO_IP, IP_TOS, (char *)&tos, sizeof(int)) < 0)
1149 		warn("setsockopt TOS (ignored)");
1150 #endif
1151 	return (fdopen(data, lmode));
1152 }
1153 
1154 void
1155 ptransfer(direction, bytes, t0, t1)
1156 	char *direction;
1157 	long bytes;
1158 	struct timeval *t0, *t1;
1159 {
1160 	struct timeval td;
1161 	float s;
1162 	long bs;
1163 
1164 	if (verbose) {
1165 		timersub(t1, t0, &td);
1166 		s = td.tv_sec + (td.tv_usec / 1000000.);
1167 #define	nz(x)	((x) == 0 ? 1 : (x))
1168 		bs = bytes / nz(s);
1169 		printf("%ld bytes %s in %.3g seconds (%ld bytes/s)\n",
1170 		    bytes, direction, s, bs);
1171 	}
1172 }
1173 
1174 void
1175 psabort()
1176 {
1177 
1178 	abrtflag++;
1179 }
1180 
1181 void
1182 pswitch(flag)
1183 	int flag;
1184 {
1185 	sig_t oldintr;
1186 	static struct comvars {
1187 		int connect;
1188 		char name[MAXHOSTNAMELEN];
1189 		struct sockaddr_in mctl;
1190 		struct sockaddr_in hctl;
1191 		FILE *in;
1192 		FILE *out;
1193 		int tpe;
1194 		int curtpe;
1195 		int cpnd;
1196 		int sunqe;
1197 		int runqe;
1198 		int mcse;
1199 		int ntflg;
1200 		char nti[17];
1201 		char nto[17];
1202 		int mapflg;
1203 		char mi[MAXPATHLEN];
1204 		char mo[MAXPATHLEN];
1205 	} proxstruct, tmpstruct;
1206 	struct comvars *ip, *op;
1207 
1208 	abrtflag = 0;
1209 	oldintr = signal(SIGINT, psabort);
1210 	if (flag) {
1211 		if (proxy)
1212 			return;
1213 		ip = &tmpstruct;
1214 		op = &proxstruct;
1215 		proxy++;
1216 	} else {
1217 		if (!proxy)
1218 			return;
1219 		ip = &proxstruct;
1220 		op = &tmpstruct;
1221 		proxy = 0;
1222 	}
1223 	ip->connect = connected;
1224 	connected = op->connect;
1225 	if (hostname) {
1226 		(void) strncpy(ip->name, hostname, sizeof(ip->name) - 1);
1227 		ip->name[strlen(ip->name)] = '\0';
1228 	} else
1229 		ip->name[0] = 0;
1230 	hostname = op->name;
1231 	ip->hctl = hisctladdr;
1232 	hisctladdr = op->hctl;
1233 	ip->mctl = myctladdr;
1234 	myctladdr = op->mctl;
1235 	ip->in = cin;
1236 	cin = op->in;
1237 	ip->out = cout;
1238 	cout = op->out;
1239 	ip->tpe = type;
1240 	type = op->tpe;
1241 	ip->curtpe = curtype;
1242 	curtype = op->curtpe;
1243 	ip->cpnd = cpend;
1244 	cpend = op->cpnd;
1245 	ip->sunqe = sunique;
1246 	sunique = op->sunqe;
1247 	ip->runqe = runique;
1248 	runique = op->runqe;
1249 	ip->mcse = mcase;
1250 	mcase = op->mcse;
1251 	ip->ntflg = ntflag;
1252 	ntflag = op->ntflg;
1253 	(void) strncpy(ip->nti, ntin, 16);
1254 	(ip->nti)[strlen(ip->nti)] = '\0';
1255 	(void) strcpy(ntin, op->nti);
1256 	(void) strncpy(ip->nto, ntout, 16);
1257 	(ip->nto)[strlen(ip->nto)] = '\0';
1258 	(void) strcpy(ntout, op->nto);
1259 	ip->mapflg = mapflag;
1260 	mapflag = op->mapflg;
1261 	(void) strncpy(ip->mi, mapin, MAXPATHLEN - 1);
1262 	(ip->mi)[strlen(ip->mi)] = '\0';
1263 	(void) strcpy(mapin, op->mi);
1264 	(void) strncpy(ip->mo, mapout, MAXPATHLEN - 1);
1265 	(ip->mo)[strlen(ip->mo)] = '\0';
1266 	(void) strcpy(mapout, op->mo);
1267 	(void) signal(SIGINT, oldintr);
1268 	if (abrtflag) {
1269 		abrtflag = 0;
1270 		(*oldintr)(SIGINT);
1271 	}
1272 }
1273 
1274 void
1275 abortpt()
1276 {
1277 
1278 	printf("\n");
1279 	(void) fflush(stdout);
1280 	ptabflg++;
1281 	mflag = 0;
1282 	abrtflag = 0;
1283 	longjmp(ptabort, 1);
1284 }
1285 
1286 void
1287 proxtrans(cmd, local, remote)
1288 	char *cmd, *local, *remote;
1289 {
1290 	sig_t oldintr;
1291 	int secndflag = 0, prox_type, nfnd;
1292 	char *cmd2;
1293 	struct fd_set mask;
1294 
1295 	if (strcmp(cmd, "RETR"))
1296 		cmd2 = "RETR";
1297 	else
1298 		cmd2 = runique ? "STOU" : "STOR";
1299 	if ((prox_type = type) == 0) {
1300 		if (unix_server && unix_proxy)
1301 			prox_type = TYPE_I;
1302 		else
1303 			prox_type = TYPE_A;
1304 	}
1305 	if (curtype != prox_type)
1306 		changetype(prox_type, 1);
1307 	if (command("PASV") != COMPLETE) {
1308 		printf("proxy server does not support third party transfers.\n");
1309 		return;
1310 	}
1311 	pswitch(0);
1312 	if (!connected) {
1313 		printf("No primary connection\n");
1314 		pswitch(1);
1315 		code = -1;
1316 		return;
1317 	}
1318 	if (curtype != prox_type)
1319 		changetype(prox_type, 1);
1320 	if (command("PORT %s", pasv) != COMPLETE) {
1321 		pswitch(1);
1322 		return;
1323 	}
1324 	if (setjmp(ptabort))
1325 		goto abort;
1326 	oldintr = signal(SIGINT, abortpt);
1327 	if (command("%s %s", cmd, remote) != PRELIM) {
1328 		(void) signal(SIGINT, oldintr);
1329 		pswitch(1);
1330 		return;
1331 	}
1332 	sleep(2);
1333 	pswitch(1);
1334 	secndflag++;
1335 	if (command("%s %s", cmd2, local) != PRELIM)
1336 		goto abort;
1337 	ptflag++;
1338 	(void) getreply(0);
1339 	pswitch(0);
1340 	(void) getreply(0);
1341 	(void) signal(SIGINT, oldintr);
1342 	pswitch(1);
1343 	ptflag = 0;
1344 	printf("local: %s remote: %s\n", local, remote);
1345 	return;
1346 abort:
1347 	(void) signal(SIGINT, SIG_IGN);
1348 	ptflag = 0;
1349 	if (strcmp(cmd, "RETR") && !proxy)
1350 		pswitch(1);
1351 	else if (!strcmp(cmd, "RETR") && proxy)
1352 		pswitch(0);
1353 	if (!cpend && !secndflag) {  /* only here if cmd = "STOR" (proxy=1) */
1354 		if (command("%s %s", cmd2, local) != PRELIM) {
1355 			pswitch(0);
1356 			if (cpend)
1357 				abort_remote((FILE *) NULL);
1358 		}
1359 		pswitch(1);
1360 		if (ptabflg)
1361 			code = -1;
1362 		(void) signal(SIGINT, oldintr);
1363 		return;
1364 	}
1365 	if (cpend)
1366 		abort_remote((FILE *) NULL);
1367 	pswitch(!proxy);
1368 	if (!cpend && !secndflag) {  /* only if cmd = "RETR" (proxy=1) */
1369 		if (command("%s %s", cmd2, local) != PRELIM) {
1370 			pswitch(0);
1371 			if (cpend)
1372 				abort_remote((FILE *) NULL);
1373 			pswitch(1);
1374 			if (ptabflg)
1375 				code = -1;
1376 			(void) signal(SIGINT, oldintr);
1377 			return;
1378 		}
1379 	}
1380 	if (cpend)
1381 		abort_remote((FILE *) NULL);
1382 	pswitch(!proxy);
1383 	if (cpend) {
1384 		FD_ZERO(&mask);
1385 		FD_SET(fileno(cin), &mask);
1386 		if ((nfnd = empty(&mask, 10)) <= 0) {
1387 			if (nfnd < 0) {
1388 				warn("abort");
1389 			}
1390 			if (ptabflg)
1391 				code = -1;
1392 			lostpeer();
1393 		}
1394 		(void) getreply(0);
1395 		(void) getreply(0);
1396 	}
1397 	if (proxy)
1398 		pswitch(0);
1399 	pswitch(1);
1400 	if (ptabflg)
1401 		code = -1;
1402 	(void) signal(SIGINT, oldintr);
1403 }
1404 
1405 void
1406 reset(argc, argv)
1407 	int argc;
1408 	char *argv[];
1409 {
1410 	struct fd_set mask;
1411 	int nfnd = 1;
1412 
1413 	FD_ZERO(&mask);
1414 	while (nfnd > 0) {
1415 		FD_SET(fileno(cin), &mask);
1416 		if ((nfnd = empty(&mask,0)) < 0) {
1417 			warn("reset");
1418 			code = -1;
1419 			lostpeer();
1420 		}
1421 		else if (nfnd) {
1422 			(void) getreply(0);
1423 		}
1424 	}
1425 }
1426 
1427 char *
1428 gunique(local)
1429 	char *local;
1430 {
1431 	static char new[MAXPATHLEN];
1432 	char *cp = strrchr(local, '/');
1433 	int d, count=0;
1434 	char ext = '1';
1435 
1436 	if (cp)
1437 		*cp = '\0';
1438 	d = access(cp ? local : ".", 2);
1439 	if (cp)
1440 		*cp = '/';
1441 	if (d < 0) {
1442 		warn("local: %s", local);
1443 		return ((char *) 0);
1444 	}
1445 	(void) strcpy(new, local);
1446 	cp = new + strlen(new);
1447 	*cp++ = '.';
1448 	while (!d) {
1449 		if (++count == 100) {
1450 			printf("runique: can't find unique file name.\n");
1451 			return ((char *) 0);
1452 		}
1453 		*cp++ = ext;
1454 		*cp = '\0';
1455 		if (ext == '9')
1456 			ext = '0';
1457 		else
1458 			ext++;
1459 		if ((d = access(new, 0)) < 0)
1460 			break;
1461 		if (ext != '0')
1462 			cp--;
1463 		else if (*(cp - 2) == '.')
1464 			*(cp - 1) = '1';
1465 		else {
1466 			*(cp - 2) = *(cp - 2) + 1;
1467 			cp--;
1468 		}
1469 	}
1470 	return (new);
1471 }
1472 
1473 void
1474 abort_remote(din)
1475 	FILE *din;
1476 {
1477 	char buf[BUFSIZ];
1478 	int nfnd;
1479 	struct fd_set mask;
1480 
1481 	/*
1482 	 * send IAC in urgent mode instead of DM because 4.3BSD places oob mark
1483 	 * after urgent byte rather than before as is protocol now
1484 	 */
1485 	sprintf(buf, "%c%c%c", IAC, IP, IAC);
1486 	if (send(fileno(cout), buf, 3, MSG_OOB) != 3)
1487 		warn("abort");
1488 	fprintf(cout,"%cABOR\r\n", DM);
1489 	(void) fflush(cout);
1490 	FD_ZERO(&mask);
1491 	FD_SET(fileno(cin), &mask);
1492 	if (din) {
1493 		FD_SET(fileno(din), &mask);
1494 	}
1495 	if ((nfnd = empty(&mask, 10)) <= 0) {
1496 		if (nfnd < 0) {
1497 			warn("abort");
1498 		}
1499 		if (ptabflg)
1500 			code = -1;
1501 		lostpeer();
1502 	}
1503 	if (din && FD_ISSET(fileno(din), &mask)) {
1504 		while (read(fileno(din), buf, BUFSIZ) > 0)
1505 			/* LOOP */;
1506 	}
1507 	if (getreply(0) == ERROR && code == 552) {
1508 		/* 552 needed for nic style abort */
1509 		(void) getreply(0);
1510 	}
1511 	(void) getreply(0);
1512 }
1513