1 /* -*- c-file-style: "linux" -*-
3 * Copyright (C) 1996-2000 by Andrew Tridgell
4 * Copyright (C) Paul Mackerras 1996
5 * Copyright (C) 2001, 2002 by Martin Pool <mbp@samba.org>
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License as published by
9 * the Free Software Foundation; either version 2 of the License, or
10 * (at your option) any later version.
12 * This program is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 * GNU General Public License for more details.
17 * You should have received a copy of the GNU General Public License
18 * along with this program; if not, write to the Free Software
19 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
25 * Utilities used in rsync
33 extern int modify_window;
34 extern char *partial_dir;
35 extern struct filter_list_struct server_filter_list;
37 int sanitize_paths = 0;
42 * Set a fd into nonblocking mode
44 void set_nonblocking(int fd)
48 if ((val = fcntl(fd, F_GETFL, 0)) == -1)
50 if (!(val & NONBLOCK_FLAG)) {
52 fcntl(fd, F_SETFL, val);
57 * Set a fd into blocking mode
59 void set_blocking(int fd)
63 if ((val = fcntl(fd, F_GETFL, 0)) == -1)
65 if (val & NONBLOCK_FLAG) {
66 val &= ~NONBLOCK_FLAG;
67 fcntl(fd, F_SETFL, val);
73 * Create a file descriptor pair - like pipe() but use socketpair if
74 * possible (because of blocking issues on pipes).
76 * Always set non-blocking.
78 int fd_pair(int fd[2])
82 #ifdef HAVE_SOCKETPAIR
83 ret = socketpair(AF_UNIX, SOCK_STREAM, 0, fd);
89 set_nonblocking(fd[0]);
90 set_nonblocking(fd[1]);
97 void print_child_argv(char **cmd)
99 rprintf(FINFO, "opening connection using ");
100 for (; *cmd; cmd++) {
101 /* Look for characters that ought to be quoted. This
102 * is not a great quoting algorithm, but it's
103 * sufficient for a log message. */
104 if (strspn(*cmd, "abcdefghijklmnopqrstuvwxyz"
105 "ABCDEFGHIJKLMNOPQRSTUVWXYZ"
107 ",.-_=+@/") != strlen(*cmd)) {
108 rprintf(FINFO, "\"%s\" ", safe_fname(*cmd));
110 rprintf(FINFO, "%s ", safe_fname(*cmd));
113 rprintf(FINFO, "\n");
117 void out_of_memory(char *str)
119 rprintf(FERROR, "ERROR: out of memory in %s\n", str);
120 exit_cleanup(RERR_MALLOC);
123 void overflow(char *str)
125 rprintf(FERROR, "ERROR: buffer overflow in %s\n", str);
126 exit_cleanup(RERR_MALLOC);
131 int set_modtime(char *fname, time_t modtime)
134 rprintf(FINFO, "set modtime of %s to (%ld) %s",
135 safe_fname(fname), (long)modtime,
136 asctime(localtime(&modtime)));
145 tbuf.actime = time(NULL);
146 tbuf.modtime = modtime;
147 return utime(fname,&tbuf);
148 #elif defined HAVE_UTIME
152 return utime(fname,t);
155 t[0].tv_sec = time(NULL);
157 t[1].tv_sec = modtime;
159 return utimes(fname,t);
166 Create any necessary directories in fname. Unfortunately we don't know
167 what perms to give the directory when this is called so we need to rely
170 int create_directory_path(char *fname, int base_umask)
174 while (*fname == '/')
176 while (strncmp(fname, "./", 2) == 0)
180 while ((p = strchr(p,'/')) != NULL) {
182 do_mkdir(fname, 0777 & ~base_umask);
191 * Write @p len bytes at @p ptr to descriptor @p desc, retrying if
194 * @retval len upon success
196 * @retval <0 write's (negative) error code
198 * Derived from GNU C's cccp.c.
200 int full_write(int desc, char *ptr, size_t len)
206 int written = write(desc, ptr, len);
212 total_written += written;
216 return total_written;
221 * Read @p len bytes at @p ptr from descriptor @p desc, retrying if
224 * @retval >0 the actual number of bytes read
228 * @retval <0 for an error.
230 * Derived from GNU C's cccp.c. */
231 static int safe_read(int desc, char *ptr, size_t len)
239 n_chars = read(desc, ptr, len);
240 } while (n_chars < 0 && errno == EINTR);
248 * This is used in conjunction with the --temp-dir, --backup, and
249 * --copy-dest options. */
250 int copy_file(char *source, char *dest, mode_t mode)
255 int len; /* Number of bytes read into `buf'. */
257 ifd = do_open(source, O_RDONLY, 0);
259 rsyserr(FERROR, errno, "open %s", full_fname(source));
263 if (robust_unlink(dest) && errno != ENOENT) {
264 rsyserr(FERROR, errno, "unlink %s", full_fname(dest));
268 ofd = do_open(dest, O_WRONLY | O_CREAT | O_TRUNC | O_EXCL, mode);
270 rsyserr(FERROR, errno, "open %s", full_fname(dest));
275 while ((len = safe_read(ifd, buf, sizeof buf)) > 0) {
276 if (full_write(ofd, buf, len) < 0) {
277 rsyserr(FERROR, errno, "write %s", full_fname(dest));
285 rsyserr(FERROR, errno, "read %s", full_fname(source));
291 if (close(ifd) < 0) {
292 rsyserr(FINFO, errno, "close failed on %s",
296 if (close(ofd) < 0) {
297 rsyserr(FERROR, errno, "close failed on %s",
305 /* MAX_RENAMES should be 10**MAX_RENAMES_DIGITS */
306 #define MAX_RENAMES_DIGITS 3
307 #define MAX_RENAMES 1000
310 * Robust unlink: some OS'es (HPUX) refuse to unlink busy files, so
311 * rename to <path>/.rsyncNNN instead.
313 * Note that successive rsync runs will shuffle the filenames around a
314 * bit as long as the file is still busy; this is because this function
315 * does not know if the unlink call is due to a new file coming in, or
316 * --delete trying to remove old .rsyncNNN files, hence it renames it
319 int robust_unlink(char *fname)
322 return do_unlink(fname);
324 static int counter = 1;
326 char path[MAXPATHLEN];
328 rc = do_unlink(fname);
329 if (rc == 0 || errno != ETXTBSY)
332 if ((pos = strlcpy(path, fname, MAXPATHLEN)) >= MAXPATHLEN)
333 pos = MAXPATHLEN - 1;
335 while (pos > 0 && path[pos-1] != '/')
337 pos += strlcpy(path+pos, ".rsync", MAXPATHLEN-pos);
339 if (pos > (MAXPATHLEN-MAX_RENAMES_DIGITS-1)) {
344 /* start where the last one left off to reduce chance of clashes */
347 sprintf(&path[pos], "%03d", counter);
348 if (++counter >= MAX_RENAMES)
350 } while ((rc = access(path, 0)) == 0 && counter != start);
353 rprintf(FINFO,"renaming %s to %s because of text busy\n",
354 safe_fname(fname), safe_fname(path));
357 /* maybe we should return rename()'s exit status? Nah. */
358 if (do_rename(fname, path) != 0) {
366 /* Returns 0 on successful rename, 1 if we successfully copied the file
367 * across filesystems, -2 if copy_file() failed, and -1 on other errors. */
368 int robust_rename(char *from, char *to, int mode)
373 if (do_rename(from, to) == 0)
379 if (robust_unlink(to) != 0)
384 if (copy_file(from, to, mode) != 0)
396 static pid_t all_pids[10];
399 /** Fork and record the pid of the child. **/
402 pid_t newpid = fork();
404 if (newpid != 0 && newpid != -1) {
405 all_pids[num_pids++] = newpid;
413 * @todo It would be kind of nice to make sure that they are actually
414 * all our children before we kill them, because their pids may have
415 * been recycled by some other process. Perhaps when we wait for a
416 * child, we should remove it from this array. Alternatively we could
417 * perhaps use process groups, but I think that would not work on
418 * ancient Unix versions that don't support them.
420 void kill_all(int sig)
424 for (i = 0; i < num_pids; i++) {
425 /* Let's just be a little careful where we
426 * point that gun, hey? See kill(2) for the
427 * magic caused by negative values. */
428 pid_t p = all_pids[i];
440 /** Turn a user name into a uid */
441 int name_to_uid(char *name, uid_t *uid)
446 pass = getpwnam(name);
454 /** Turn a group name into a gid */
455 int name_to_gid(char *name, gid_t *gid)
460 grp = getgrnam(name);
469 /** Lock a byte range in a open file */
470 int lock_range(int fd, int offset, int len)
474 lock.l_type = F_WRLCK;
475 lock.l_whence = SEEK_SET;
476 lock.l_start = offset;
480 return fcntl(fd,F_SETLK,&lock) == 0;
483 static int filter_server_path(char *arg)
487 if (server_filter_list.head) {
488 for (s = arg; (s = strchr(s, '/')) != NULL; ) {
490 if (check_filter(&server_filter_list, arg, 1) < 0) {
491 /* We must leave arg truncated! */
500 static void glob_expand_one(char *s, char ***argv_ptr, int *argc_ptr,
503 char **argv = *argv_ptr;
504 int argc = *argc_ptr;
505 int maxargs = *maxargs_ptr;
506 #if !defined HAVE_GLOB || !defined HAVE_GLOB_H
507 if (argc == maxargs) {
509 if (!(argv = realloc_array(argv, char *, maxargs)))
510 out_of_memory("glob_expand_one");
512 *maxargs_ptr = maxargs;
516 s = argv[argc++] = strdup(s);
517 filter_server_path(s);
528 s = sanitize_path(NULL, s, "", 0);
532 memset(&globbuf, 0, sizeof globbuf);
533 if (!filter_server_path(s))
534 glob(s, 0, NULL, &globbuf);
535 if (MAX((int)globbuf.gl_pathc, 1) > maxargs - argc) {
536 maxargs += globbuf.gl_pathc + MAX_ARGS;
537 if (!(argv = realloc_array(argv, char *, maxargs)))
538 out_of_memory("glob_expand_one");
540 *maxargs_ptr = maxargs;
542 if (globbuf.gl_pathc == 0)
545 int j = globbuf.gl_pathc;
547 for (i = 0; i < j; i++) {
548 if (!(argv[argc++] = strdup(globbuf.gl_pathv[i])))
549 out_of_memory("glob_expand_one");
557 /* This routine is only used in daemon mode. */
558 void glob_expand(char *base1, char ***argv_ptr, int *argc_ptr, int *maxargs_ptr)
560 char *s = (*argv_ptr)[*argc_ptr];
563 int base_len = strlen(base);
568 if (strncmp(s, base, base_len) == 0)
571 if (!(s = strdup(s)))
572 out_of_memory("glob_expand");
574 if (asprintf(&base," %s/", base1) <= 0)
575 out_of_memory("glob_expand");
578 for (q = s; *q; q = p + base_len) {
579 if ((p = strstr(q, base)) != NULL)
580 *p = '\0'; /* split it at this point */
581 glob_expand_one(q, argv_ptr, argc_ptr, maxargs_ptr);
591 * Convert a string to lower case
593 void strlower(char *s)
596 if (isupper(*(unsigned char *)s))
597 *s = tolower(*(unsigned char *)s);
602 /* Join strings p1 & p2 into "dest" with a guaranteed '/' between them. (If
603 * p1 ends with a '/', no extra '/' is inserted.) Returns the length of both
604 * strings + 1 (if '/' was inserted), regardless of whether the null-terminated
605 * string fits into destsize. */
606 size_t pathjoin(char *dest, size_t destsize, const char *p1, const char *p2)
608 size_t len = strlcpy(dest, p1, destsize);
609 if (len < destsize - 1) {
610 if (!len || dest[len-1] != '/')
612 if (len < destsize - 1)
613 len += strlcpy(dest + len, p2, destsize - len);
620 len += strlen(p2) + 1; /* Assume we'd insert a '/'. */
624 /* Join any number of strings together, putting them in "dest". The return
625 * value is the length of all the strings, regardless of whether the null-
626 * terminated whole fits in destsize. Your list of string pointers must end
627 * with a NULL to indicate the end of the list. */
628 size_t stringjoin(char *dest, size_t destsize, ...)
634 va_start(ap, destsize);
636 if (!(src = va_arg(ap, const char *)))
643 memcpy(dest, src, len);
654 int count_dir_elements(const char *p)
656 int cnt = 0, new_component = 1;
660 else if (new_component) {
668 /* Turns multiple adjacent slashes into a single slash, gets rid of "./"
669 * elements (but not a trailing dot dir), removes a trailing slash, and
670 * optionally collapses ".." elements (except for those at the start of the
671 * string). If the resulting name would be empty, change it into a ".". */
672 unsigned int clean_fname(char *name, BOOL collapse_dot_dot)
674 char *limit = name - 1, *t = name, *f = name;
680 if ((anchored = *f == '/') != 0)
683 /* discard extra slashes */
689 /* discard "." dirs (but NOT a trailing '.'!) */
694 /* collapse ".." dirs */
696 && f[1] == '.' && (f[2] == '/' || !f[2])) {
698 if (s == name && anchored) {
702 while (s > limit && *--s != '/') {}
703 if (s != t - 1 && (s < name || *s == '/')) {
711 while (*f && (*t++ = *f++) != '/') {}
714 if (t > name+anchored && t[-1] == '/')
723 /* Make path appear as if a chroot had occurred. This handles a leading
724 * "/" (either removing it or expanding it) and any leading or embedded
725 * ".." components that attempt to escape past the module's top dir.
727 * If dest is NULL, a buffer is allocated to hold the result. It is legal
728 * to call with the dest and the path (p) pointing to the same buffer, but
729 * rootdir will be ignored to avoid expansion of the string.
731 * The rootdir string contains a value to use in place of a leading slash.
732 * Specify NULL to get the default of lp_path(module_id).
734 * If depth is >= 0, it is a count of how many '..'s to allow at the start
735 * of the path. Use -1 to allow unlimited depth.
737 * We also clean the path in a manner similar to clean_fname() but with a
740 * Turns multiple adjacent slashes into a single slash, gets rid of "." dir
741 * elements (INCLUDING a trailing dot dir), PRESERVES a trailing slash, and
742 * ALWAYS collapses ".." elements (except for those at the start of the
743 * string up to "depth" deep). If the resulting name would be empty,
744 * change it into a ".". */
745 char *sanitize_path(char *dest, const char *p, const char *rootdir, int depth)
751 int plen = strlen(p);
754 rootdir = lp_path(module_id);
755 rlen = strlen(rootdir);
760 if (rlen + plen + 1 >= MAXPATHLEN)
762 } else if (!(dest = new_array(char, rlen + plen + 1)))
763 out_of_memory("sanitize_path");
765 memcpy(dest, rootdir, rlen);
771 start = sanp = dest + rlen;
773 /* discard leading or extra slashes */
778 /* this loop iterates once per filename component in p.
779 * both p (and sanp if the original had a slash) should
780 * always be left pointing after a slash
782 if (*p == '.' && (p[1] == '/' || p[1] == '\0')) {
783 /* skip "." component */
787 if (*p == '.' && p[1] == '.' && (p[2] == '/' || p[2] == '\0')) {
788 /* ".." component followed by slash or end */
789 if (depth <= 0 || sanp != start) {
792 /* back up sanp one level */
793 --sanp; /* now pointing at slash */
794 while (sanp > start && sanp[-1] != '/') {
795 /* skip back up to slash */
801 /* allow depth levels of .. at the beginning */
803 /* move the virtual beginning to leave the .. alone */
806 /* copy one component through next slash */
807 while (*p && (*sanp++ = *p++) != '/') {}
810 /* ended up with nothing, so put in "." component */
818 char curr_dir[MAXPATHLEN];
819 unsigned int curr_dir_len;
822 * Like chdir(), but it keeps track of the current directory (in the
823 * global "curr_dir"), and ensures that the path size doesn't overflow.
824 * Also cleans the path using the clean_fname() function.
826 int push_dir(char *dir)
828 static int initialised;
833 getcwd(curr_dir, sizeof curr_dir - 1);
834 curr_dir_len = strlen(curr_dir);
837 if (!dir) /* this call was probably just to initialize */
841 if (len == 1 && *dir == '.')
844 if ((*dir == '/' ? len : curr_dir_len + 1 + len) >= sizeof curr_dir)
851 memcpy(curr_dir, dir, len + 1);
854 curr_dir[curr_dir_len++] = '/';
855 memcpy(curr_dir + curr_dir_len, dir, len + 1);
859 curr_dir_len = clean_fname(curr_dir, 1);
865 * Reverse a push_dir() call. You must pass in an absolute path
866 * that was copied from a prior value of "curr_dir".
868 int pop_dir(char *dir)
873 curr_dir_len = strlcpy(curr_dir, dir, sizeof curr_dir);
874 if (curr_dir_len >= sizeof curr_dir)
875 curr_dir_len = sizeof curr_dir - 1;
880 /* Return the filename, turning any non-printable characters into '?'s.
881 * This ensures that outputting it on a line of its own cannot generate an
882 * empty line. This function can return only MAX_SAFE_NAMES values at a
883 * time! The returned value can be longer than MAXPATHLEN (because we
884 * may be trying to output an error about a too-long filename)! */
885 const char *safe_fname(const char *fname)
887 #define MAX_SAFE_NAMES 4
888 static char fbuf[MAX_SAFE_NAMES][MAXPATHLEN*2];
890 int limit = sizeof fbuf / MAX_SAFE_NAMES - 1;
893 ndx = (ndx + 1) % MAX_SAFE_NAMES;
894 for (t = fbuf[ndx]; *fname; fname++) {
895 if (!isprint(*(uchar*)fname))
908 * Return a quoted string with the full pathname of the indicated filename.
909 * The string " (in MODNAME)" may also be appended. The returned pointer
910 * remains valid until the next time full_fname() is called.
912 char *full_fname(const char *fn)
914 static char *result = NULL;
926 for (p2 = p1; *p2 == '/'; p2++) {}
930 if (module_id >= 0) {
932 m2 = lp_name(module_id);
934 if (p1 == curr_dir) {
935 if (!lp_use_chroot(module_id)) {
936 char *p = lp_path(module_id);
937 if (*p != '/' || p[1])
944 asprintf(&result, "\"%s%s%s\"%s%s%s", p1, p2, fn, m1, m2, m3);
949 static char partial_fname[MAXPATHLEN];
951 char *partial_dir_fname(const char *fname)
953 char *t = partial_fname;
954 int sz = sizeof partial_fname;
957 if ((fn = strrchr(fname, '/')) != NULL) {
959 if (*partial_dir != '/') {
960 int len = fn - fname;
961 strncpy(t, fname, len); /* safe */
967 if ((int)pathjoin(t, sz, partial_dir, fn) >= sz)
969 if (server_filter_list.head) {
972 len = strlen(partial_dir);
974 if (check_filter(&server_filter_list, partial_fname, 1) < 0)
977 if (check_filter(&server_filter_list, partial_fname, 0) < 0)
981 return partial_fname;
984 /* If no --partial-dir option was specified, we don't need to do anything
985 * (the partial-dir is essentially '.'), so just return success. */
986 int handle_partial_dir(const char *fname, int create)
990 if (fname != partial_fname)
992 if (!create && *partial_dir == '/')
994 if (!(fn = strrchr(partial_fname, '/')))
1001 int statret = do_lstat(dir, &st);
1002 if (statret == 0 && !S_ISDIR(st.st_mode)) {
1003 if (do_unlink(dir) < 0)
1007 if (statret < 0 && do_mkdir(dir, 0700) < 0)
1016 /** We need to supply our own strcmp function for file list comparisons
1017 to ensure that signed/unsigned usage is consistent between machines. */
1018 int u_strcmp(const char *cs1, const char *cs2)
1020 const uchar *s1 = (const uchar *)cs1;
1021 const uchar *s2 = (const uchar *)cs2;
1023 while (*s1 && *s2 && (*s1 == *s2)) {
1027 return (int)*s1 - (int)*s2;
1033 * Determine if a symlink points outside the current directory tree.
1034 * This is considered "unsafe" because e.g. when mirroring somebody
1035 * else's machine it might allow them to establish a symlink to
1036 * /etc/passwd, and then read it through a web server.
1038 * Null symlinks and absolute symlinks are always unsafe.
1040 * Basically here we are concerned with symlinks whose target contains
1041 * "..", because this might cause us to walk back up out of the
1042 * transferred directory. We are not allowed to go back up and
1045 * @param dest Target of the symlink in question.
1047 * @param src Top source directory currently applicable. Basically this
1048 * is the first parameter to rsync in a simple invocation, but it's
1049 * modified by flist.c in slightly complex ways.
1051 * @retval True if unsafe
1052 * @retval False is unsafe
1056 int unsafe_symlink(const char *dest, const char *src)
1058 const char *name, *slash;
1061 /* all absolute and null symlinks are unsafe */
1062 if (!dest || !*dest || *dest == '/')
1065 /* find out what our safety margin is */
1066 for (name = src; (slash = strchr(name, '/')) != 0; name = slash+1) {
1067 if (strncmp(name, "../", 3) == 0) {
1069 } else if (strncmp(name, "./", 2) == 0) {
1075 if (strcmp(name, "..") == 0)
1078 for (name = dest; (slash = strchr(name, '/')) != 0; name = slash+1) {
1079 if (strncmp(name, "../", 3) == 0) {
1080 /* if at any point we go outside the current directory
1081 then stop - it is unsafe */
1084 } else if (strncmp(name, "./", 2) == 0) {
1090 if (strcmp(name, "..") == 0)
1098 * Return the date and time as a string
1100 char *timestring(time_t t)
1102 static char TimeBuf[200];
1103 struct tm *tm = localtime(&t);
1105 #ifdef HAVE_STRFTIME
1106 strftime(TimeBuf, sizeof TimeBuf - 1, "%Y/%m/%d %H:%M:%S", tm);
1108 strlcpy(TimeBuf, asctime(tm), sizeof TimeBuf);
1111 if (TimeBuf[strlen(TimeBuf)-1] == '\n') {
1112 TimeBuf[strlen(TimeBuf)-1] = 0;
1120 * Sleep for a specified number of milliseconds.
1122 * Always returns TRUE. (In the future it might return FALSE if
1128 struct timeval tval, t1, t2;
1130 gettimeofday(&t1, NULL);
1133 tval.tv_sec = (t-tdiff)/1000;
1134 tval.tv_usec = 1000*((t-tdiff)%1000);
1137 select(0,NULL,NULL, NULL, &tval);
1139 gettimeofday(&t2, NULL);
1140 tdiff = (t2.tv_sec - t1.tv_sec)*1000 +
1141 (t2.tv_usec - t1.tv_usec)/1000;
1149 * Determine if two file modification times are equivalent (either
1150 * exact or in the modification timestamp window established by
1153 * @retval 0 if the times should be treated as the same
1155 * @retval +1 if the first is later
1157 * @retval -1 if the 2nd is later
1159 int cmp_modtime(time_t file1, time_t file2)
1161 if (file2 > file1) {
1162 if (file2 - file1 <= modify_window)
1166 if (file1 - file2 <= modify_window)
1176 This routine is a trick to immediately catch errors when debugging
1177 with insure. A xterm with a gdb is popped up when insure catches
1178 a error. It is Linux specific.
1180 int _Insure_trap_error(int a1, int a2, int a3, int a4, int a5, int a6)
1186 asprintf(&cmd, "/usr/X11R6/bin/xterm -display :0 -T Panic -n Panic -e /bin/sh -c 'cat /tmp/ierrs.*.%d ; gdb /proc/%d/exe %d'",
1187 getpid(), getpid(), getpid());
1191 h = dlopen("/usr/local/parasoft/insure++lite/lib.linux2/libinsure.so", RTLD_LAZY);
1192 fn = dlsym(h, "_Insure_trap_error");
1195 ret = fn(a1, a2, a3, a4, a5, a6);
1206 #define MALLOC_MAX 0x40000000
1208 void *_new_array(unsigned int size, unsigned long num)
1210 if (num >= MALLOC_MAX/size)
1212 return malloc(size * num);
1215 void *_realloc_array(void *ptr, unsigned int size, unsigned long num)
1217 if (num >= MALLOC_MAX/size)
1219 /* No realloc should need this, but just in case... */
1221 return malloc(size * num);
1222 return realloc(ptr, size * num);
1225 /* Take a filename and filename length and return the most significant
1226 * filename suffix we can find. This ignores suffixes such as "~",
1227 * ".bak", ".orig", ".~1~", etc. */
1228 const char *find_filename_suffix(const char *fn, int fn_len, int *len_ptr)
1230 const char *suf, *s;
1234 /* One or more dots at the start aren't a suffix. */
1235 while (fn_len && *fn == '.') fn++, fn_len--;
1237 /* Ignore the ~ in a "foo~" filename. */
1238 if (fn_len > 1 && fn[fn_len-1] == '~')
1239 fn_len--, had_tilde = True;
1243 /* Assume we don't find an suffix. */
1247 /* Find the last significant suffix. */
1248 for (s = fn + fn_len; fn_len > 1; ) {
1249 while (*--s != '.' && s != fn) {}
1252 s_len = fn_len - (s - fn);
1255 if (strcmp(s+1, "bak") == 0
1256 || strcmp(s+1, "old") == 0)
1258 } else if (s_len == 4) {
1259 if (strcmp(s+1, "orig") == 0)
1261 } else if (s_len > 2 && had_tilde
1262 && s[1] == '~' && isdigit(*(uchar*)(s+2)))
1268 /* Determine if the suffix is all digits. */
1269 for (s++, s_len--; s_len > 0; s++, s_len--) {
1270 if (!isdigit(*(uchar*)s))
1273 /* An all-digit suffix may not be that signficant. */
1280 /* This is an implementation of the Levenshtein distance algorithm. It
1281 * was implemented to avoid needing a two-dimensional matrix (to save
1282 * memory). It was also tweaked to try to factor in the ASCII distance
1283 * between changed characters as a minor distance quantity. The normal
1284 * Levenshtein units of distance (each signifying a single change between
1285 * the two strings) are defined as a "UNIT". */
1287 #define UNIT (1 << 16)
1289 uint32 fuzzy_distance(const char *s1, int len1, const char *s2, int len2)
1291 uint32 a[MAXPATHLEN], diag, above, left, diag_inc, above_inc, left_inc;
1295 if (!len1 || !len2) {
1300 for (i1 = 0, cost = 0; i1 < len1; i1++)
1302 return (int32)len1 * UNIT + cost;
1305 for (i2 = 0; i2 < len2; i2++)
1306 a[i2] = (i2+1) * UNIT;
1308 for (i1 = 0; i1 < len1; i1++) {
1310 above = (i1+1) * UNIT;
1311 for (i2 = 0; i2 < len2; i2++) {
1313 if ((cost = *((uchar*)s1+i1) - *((uchar*)s2+i2)) != 0) {
1319 diag_inc = diag + cost;
1320 left_inc = left + UNIT + *((uchar*)s1+i1);
1321 above_inc = above + UNIT + *((uchar*)s2+i2);
1322 a[i2] = above = left < above
1323 ? (left_inc < diag_inc ? left_inc : diag_inc)
1324 : (above_inc < diag_inc ? above_inc : diag_inc);