Document --ignore-non-existing (not --existing) and what happens
[rsync/rsync.git] / util.c
CommitLineData
1960e228 1/* -*- c-file-style: "linux" -*-
5cb37436
WD
2 *
3 * Copyright (C) 1996-2000 by Andrew Tridgell
0ecfbf27
MP
4 * Copyright (C) Paul Mackerras 1996
5 * Copyright (C) 2001, 2002 by Martin Pool <mbp@samba.org>
5cb37436 6 *
0ecfbf27
MP
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License as published by
9 * the Free Software Foundation; either version 2 of the License, or
10 * (at your option) any later version.
5cb37436 11 *
0ecfbf27
MP
12 * This program is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 * GNU General Public License for more details.
5cb37436 16 *
0ecfbf27
MP
17 * You should have received a copy of the GNU General Public License
18 * along with this program; if not, write to the Free Software
19 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
20 */
c627d613 21
ac13ad10 22/**
0ecfbf27 23 * @file
ac13ad10 24 *
5cb37436 25 * Utilities used in rsync
ac13ad10 26 **/
c627d613 27
c627d613
AT
28#include "rsync.h"
29
c7c11a0d 30extern int verbose;
bc6ebcd2
WD
31extern int dry_run;
32extern int module_id;
33extern int modify_window;
a7260c40 34extern char *partial_dir;
7842418b 35extern struct filter_list_struct server_filter_list;
c7c11a0d 36
0ecfbf27
MP
37int sanitize_paths = 0;
38
39
f0359dd0 40
ac13ad10 41/**
0ecfbf27
MP
42 * Set a fd into nonblocking mode
43 **/
f0359dd0
AT
44void set_nonblocking(int fd)
45{
46 int val;
47
0ecfbf27 48 if ((val = fcntl(fd, F_GETFL, 0)) == -1)
f0359dd0
AT
49 return;
50 if (!(val & NONBLOCK_FLAG)) {
51 val |= NONBLOCK_FLAG;
52 fcntl(fd, F_SETFL, val);
53 }
54}
55
ac13ad10 56/**
0ecfbf27
MP
57 * Set a fd into blocking mode
58 **/
36349ea0
AT
59void set_blocking(int fd)
60{
61 int val;
62
0ecfbf27 63 if ((val = fcntl(fd, F_GETFL, 0)) == -1)
36349ea0
AT
64 return;
65 if (val & NONBLOCK_FLAG) {
66 val &= ~NONBLOCK_FLAG;
67 fcntl(fd, F_SETFL, val);
68 }
69}
70
f0359dd0 71
ac13ad10 72/**
0ecfbf27
MP
73 * Create a file descriptor pair - like pipe() but use socketpair if
74 * possible (because of blocking issues on pipes).
5cb37436 75 *
0ecfbf27 76 * Always set non-blocking.
f0359dd0 77 */
08f15335
AT
78int fd_pair(int fd[2])
79{
f0359dd0
AT
80 int ret;
81
4f5b0756 82#ifdef HAVE_SOCKETPAIR
f0359dd0 83 ret = socketpair(AF_UNIX, SOCK_STREAM, 0, fd);
08f15335 84#else
f0359dd0 85 ret = pipe(fd);
08f15335 86#endif
f0359dd0
AT
87
88 if (ret == 0) {
89 set_nonblocking(fd[0]);
90 set_nonblocking(fd[1]);
91 }
0ecfbf27 92
f0359dd0 93 return ret;
08f15335
AT
94}
95
96
0ecfbf27 97void print_child_argv(char **cmd)
5ad0e46f 98{
1bbd10fe 99 rprintf(FINFO, "opening connection using ");
5ad0e46f
MP
100 for (; *cmd; cmd++) {
101 /* Look for characters that ought to be quoted. This
102 * is not a great quoting algorithm, but it's
103 * sufficient for a log message. */
104 if (strspn(*cmd, "abcdefghijklmnopqrstuvwxyz"
105 "ABCDEFGHIJKLMNOPQRSTUVWXYZ"
106 "0123456789"
107 ",.-_=+@/") != strlen(*cmd)) {
f8cd88db 108 rprintf(FINFO, "\"%s\" ", safe_fname(*cmd));
5ad0e46f 109 } else {
f8cd88db 110 rprintf(FINFO, "%s ", safe_fname(*cmd));
5ad0e46f
MP
111 }
112 }
113 rprintf(FINFO, "\n");
114}
115
116
c627d613
AT
117void out_of_memory(char *str)
118{
c284f34a
WD
119 rprintf(FERROR, "ERROR: out of memory in %s\n", str);
120 exit_cleanup(RERR_MALLOC);
575f2fca
AT
121}
122
a1f99493 123void overflow_exit(char *str)
575f2fca 124{
c284f34a
WD
125 rprintf(FERROR, "ERROR: buffer overflow in %s\n", str);
126 exit_cleanup(RERR_MALLOC);
c627d613
AT
127}
128
129
c627d613 130
25007999 131int set_modtime(char *fname, time_t modtime, mode_t mode)
c627d613 132{
25007999
WD
133#if !defined HAVE_LUTIMES || !defined HAVE_UTIMES
134 if (S_ISLNK(mode))
135 return 1;
136#endif
137
404e813c
MP
138 if (verbose > 2) {
139 rprintf(FINFO, "set modtime of %s to (%ld) %s",
f8cd88db 140 safe_fname(fname), (long)modtime,
404e813c
MP
141 asctime(localtime(&modtime)));
142 }
5cb37436 143
15778afb
WD
144 if (dry_run)
145 return 0;
146
31e12522 147 {
25007999
WD
148#ifdef HAVE_UTIMES
149 struct timeval t[2];
150 t[0].tv_sec = time(NULL);
151 t[0].tv_usec = 0;
152 t[1].tv_sec = modtime;
153 t[1].tv_usec = 0;
154# ifdef HAVE_LUTIMES
155 if (S_ISLNK(mode))
156 return lutimes(fname, t);
157# endif
158 return utimes(fname, t);
159#elif defined HAVE_UTIMBUF
5cb37436 160 struct utimbuf tbuf;
31e12522
AT
161 tbuf.actime = time(NULL);
162 tbuf.modtime = modtime;
163 return utime(fname,&tbuf);
4f5b0756 164#elif defined HAVE_UTIME
31e12522
AT
165 time_t t[2];
166 t[0] = time(NULL);
167 t[1] = modtime;
168 return utime(fname,t);
c627d613 169#else
25007999 170#error No file-time-modification routine found!
c627d613 171#endif
31e12522 172 }
c627d613 173}
94481d91 174
720b47f2 175
ac13ad10
MP
176/**
177 Create any necessary directories in fname. Unfortunately we don't know
178 what perms to give the directory when this is called so we need to rely
179 on the umask
180**/
0ecfbf27 181int create_directory_path(char *fname, int base_umask)
6574b4f7 182{
6574b4f7
AT
183 char *p;
184
c284f34a
WD
185 while (*fname == '/')
186 fname++;
187 while (strncmp(fname, "./", 2) == 0)
188 fname += 2;
6574b4f7
AT
189
190 p = fname;
c284f34a 191 while ((p = strchr(p,'/')) != NULL) {
6574b4f7 192 *p = 0;
5cb37436 193 do_mkdir(fname, 0777 & ~base_umask);
6574b4f7
AT
194 *p = '/';
195 p++;
196 }
197 return 0;
198}
950ab32d
AT
199
200
ac13ad10
MP
201/**
202 * Write @p len bytes at @p ptr to descriptor @p desc, retrying if
203 * interrupted.
204 *
205 * @retval len upon success
206 *
207 * @retval <0 write's (negative) error code
208 *
209 * Derived from GNU C's cccp.c.
210 */
6566d205 211int full_write(int desc, char *ptr, size_t len)
950ab32d
AT
212{
213 int total_written;
5cb37436 214
950ab32d
AT
215 total_written = 0;
216 while (len > 0) {
5c1b7bfd 217 int written = write(desc, ptr, len);
950ab32d 218 if (written < 0) {
950ab32d
AT
219 if (errno == EINTR)
220 continue;
950ab32d
AT
221 return written;
222 }
223 total_written += written;
224 ptr += written;
225 len -= written;
226 }
227 return total_written;
228}
229
950ab32d 230
ac13ad10
MP
231/**
232 * Read @p len bytes at @p ptr from descriptor @p desc, retrying if
233 * interrupted.
234 *
235 * @retval >0 the actual number of bytes read
236 *
237 * @retval 0 for EOF
238 *
239 * @retval <0 for an error.
240 *
241 * Derived from GNU C's cccp.c. */
9dd891bb 242static int safe_read(int desc, char *ptr, size_t len)
950ab32d
AT
243{
244 int n_chars;
5cb37436 245
9dd891bb 246 if (len == 0)
950ab32d 247 return len;
5cb37436 248
950ab32d
AT
249 do {
250 n_chars = read(desc, ptr, len);
251 } while (n_chars < 0 && errno == EINTR);
5cb37436 252
950ab32d
AT
253 return n_chars;
254}
255
256
ac13ad10
MP
257/** Copy a file.
258 *
3e13004b
WD
259 * This is used in conjunction with the --temp-dir, --backup, and
260 * --copy-dest options. */
950ab32d
AT
261int copy_file(char *source, char *dest, mode_t mode)
262{
263 int ifd;
264 int ofd;
265 char buf[1024 * 8];
266 int len; /* Number of bytes read into `buf'. */
267
8c9fd200 268 ifd = do_open(source, O_RDONLY, 0);
950ab32d 269 if (ifd == -1) {
d62bcc17 270 rsyserr(FERROR, errno, "open %s", full_fname(source));
950ab32d
AT
271 return -1;
272 }
273
c7c11a0d 274 if (robust_unlink(dest) && errno != ENOENT) {
d62bcc17 275 rsyserr(FERROR, errno, "unlink %s", full_fname(dest));
950ab32d
AT
276 return -1;
277 }
278
31e12522 279 ofd = do_open(dest, O_WRONLY | O_CREAT | O_TRUNC | O_EXCL, mode);
c46ded46 280 if (ofd == -1) {
d62bcc17 281 rsyserr(FERROR, errno, "open %s", full_fname(dest));
950ab32d
AT
282 close(ifd);
283 return -1;
284 }
285
5cb37436 286 while ((len = safe_read(ifd, buf, sizeof buf)) > 0) {
950ab32d 287 if (full_write(ofd, buf, len) < 0) {
d62bcc17 288 rsyserr(FERROR, errno, "write %s", full_fname(dest));
950ab32d
AT
289 close(ifd);
290 close(ofd);
291 return -1;
292 }
293 }
294
8b602edd 295 if (len < 0) {
d62bcc17 296 rsyserr(FERROR, errno, "read %s", full_fname(source));
8b602edd
WD
297 close(ifd);
298 close(ofd);
299 return -1;
300 }
301
9f27cd8c 302 if (close(ifd) < 0) {
d62bcc17
WD
303 rsyserr(FINFO, errno, "close failed on %s",
304 full_fname(source));
9f27cd8c
WD
305 }
306
307 if (close(ofd) < 0) {
d62bcc17
WD
308 rsyserr(FERROR, errno, "close failed on %s",
309 full_fname(dest));
9f27cd8c
WD
310 return -1;
311 }
950ab32d 312
950ab32d
AT
313 return 0;
314}
feaa89c4 315
c7c11a0d
DD
316/* MAX_RENAMES should be 10**MAX_RENAMES_DIGITS */
317#define MAX_RENAMES_DIGITS 3
318#define MAX_RENAMES 1000
319
ac13ad10 320/**
b4235b31
MP
321 * Robust unlink: some OS'es (HPUX) refuse to unlink busy files, so
322 * rename to <path>/.rsyncNNN instead.
323 *
324 * Note that successive rsync runs will shuffle the filenames around a
325 * bit as long as the file is still busy; this is because this function
326 * does not know if the unlink call is due to a new file coming in, or
327 * --delete trying to remove old .rsyncNNN files, hence it renames it
328 * each time.
329 **/
c7c11a0d
DD
330int robust_unlink(char *fname)
331{
332#ifndef ETXTBSY
333 return do_unlink(fname);
334#else
335 static int counter = 1;
336 int rc, pos, start;
337 char path[MAXPATHLEN];
338
339 rc = do_unlink(fname);
c284f34a 340 if (rc == 0 || errno != ETXTBSY)
c7c11a0d
DD
341 return rc;
342
c284f34a
WD
343 if ((pos = strlcpy(path, fname, MAXPATHLEN)) >= MAXPATHLEN)
344 pos = MAXPATHLEN - 1;
c7c11a0d 345
c284f34a
WD
346 while (pos > 0 && path[pos-1] != '/')
347 pos--;
5cb37436 348 pos += strlcpy(path+pos, ".rsync", MAXPATHLEN-pos);
c7c11a0d
DD
349
350 if (pos > (MAXPATHLEN-MAX_RENAMES_DIGITS-1)) {
351 errno = ETXTBSY;
352 return -1;
353 }
354
355 /* start where the last one left off to reduce chance of clashes */
356 start = counter;
357 do {
358 sprintf(&path[pos], "%03d", counter);
359 if (++counter >= MAX_RENAMES)
360 counter = 1;
c284f34a 361 } while ((rc = access(path, 0)) == 0 && counter != start);
c7c11a0d 362
4791825d 363 if (verbose > 0) {
c7c11a0d 364 rprintf(FINFO,"renaming %s to %s because of text busy\n",
f8cd88db 365 safe_fname(fname), safe_fname(path));
4791825d 366 }
c7c11a0d
DD
367
368 /* maybe we should return rename()'s exit status? Nah. */
369 if (do_rename(fname, path) != 0) {
370 errno = ETXTBSY;
371 return -1;
372 }
373 return 0;
374#endif
375}
376
630f548f
WD
377/* Returns 0 on successful rename, 1 if we successfully copied the file
378 * across filesystems, -2 if copy_file() failed, and -1 on other errors. */
62c9e6b3 379int robust_rename(char *from, char *to, int mode)
c7c11a0d 380{
62c9e6b3
WD
381 int tries = 4;
382
383 while (tries--) {
384 if (do_rename(from, to) == 0)
385 return 0;
386
387 switch (errno) {
388#ifdef ETXTBSY
389 case ETXTBSY:
390 if (robust_unlink(to) != 0)
391 return -1;
392 break;
c7c11a0d 393#endif
62c9e6b3
WD
394 case EXDEV:
395 if (copy_file(from, to, mode) != 0)
396 return -2;
397 do_unlink(from);
630f548f 398 return 1;
62c9e6b3
WD
399 default:
400 return -1;
401 }
402 }
403 return -1;
feaa89c4 404}
3ba62a83
AT
405
406
407static pid_t all_pids[10];
408static int num_pids;
409
4cf64834 410/** Fork and record the pid of the child. **/
3ba62a83
AT
411pid_t do_fork(void)
412{
413 pid_t newpid = fork();
5cb37436 414
4cf64834 415 if (newpid != 0 && newpid != -1) {
3ba62a83
AT
416 all_pids[num_pids++] = newpid;
417 }
418 return newpid;
419}
420
4cf64834
MP
421/**
422 * Kill all children.
423 *
424 * @todo It would be kind of nice to make sure that they are actually
425 * all our children before we kill them, because their pids may have
426 * been recycled by some other process. Perhaps when we wait for a
427 * child, we should remove it from this array. Alternatively we could
428 * perhaps use process groups, but I think that would not work on
429 * ancient Unix versions that don't support them.
430 **/
3ba62a83
AT
431void kill_all(int sig)
432{
433 int i;
4cf64834
MP
434
435 for (i = 0; i < num_pids; i++) {
436 /* Let's just be a little careful where we
437 * point that gun, hey? See kill(2) for the
438 * magic caused by negative values. */
439 pid_t p = all_pids[i];
440
441 if (p == getpid())
442 continue;
443 if (p <= 0)
444 continue;
445
446 kill(p, sig);
3ba62a83
AT
447 }
448}
9486289c 449
4cf64834 450
ac13ad10 451/** Turn a user name into a uid */
8ef4ffd6
AT
452int name_to_uid(char *name, uid_t *uid)
453{
454 struct passwd *pass;
b5bd5542
WD
455 if (!name || !*name)
456 return 0;
8ef4ffd6
AT
457 pass = getpwnam(name);
458 if (pass) {
459 *uid = pass->pw_uid;
460 return 1;
461 }
462 return 0;
463}
464
ac13ad10 465/** Turn a group name into a gid */
8ef4ffd6
AT
466int name_to_gid(char *name, gid_t *gid)
467{
468 struct group *grp;
b5bd5542
WD
469 if (!name || !*name)
470 return 0;
8ef4ffd6
AT
471 grp = getgrnam(name);
472 if (grp) {
473 *gid = grp->gr_gid;
474 return 1;
475 }
476 return 0;
477}
478
ff8b29b8 479
ac13ad10 480/** Lock a byte range in a open file */
31593dd6 481int lock_range(int fd, int offset, int len)
0c515f17 482{
31593dd6 483 struct flock lock;
0c515f17 484
31593dd6
AT
485 lock.l_type = F_WRLCK;
486 lock.l_whence = SEEK_SET;
487 lock.l_start = offset;
488 lock.l_len = len;
489 lock.l_pid = 0;
5cb37436 490
31593dd6 491 return fcntl(fd,F_SETLK,&lock) == 0;
0c515f17 492}
874895d5 493
7842418b 494static int filter_server_path(char *arg)
4791825d
WD
495{
496 char *s;
4791825d 497
7842418b 498 if (server_filter_list.head) {
4791825d
WD
499 for (s = arg; (s = strchr(s, '/')) != NULL; ) {
500 *s = '\0';
7842418b 501 if (check_filter(&server_filter_list, arg, 1) < 0) {
4791825d
WD
502 /* We must leave arg truncated! */
503 return 1;
504 }
505 *s++ = '/';
506 }
507 }
508 return 0;
509}
874895d5 510
b7061c82
WD
511static void glob_expand_one(char *s, char ***argv_ptr, int *argc_ptr,
512 int *maxargs_ptr)
874895d5 513{
b7061c82 514 char **argv = *argv_ptr;
b5bd5542 515 int argc = *argc_ptr;
b7061c82 516 int maxargs = *maxargs_ptr;
4f5b0756 517#if !defined HAVE_GLOB || !defined HAVE_GLOB_H
b7061c82
WD
518 if (argc == maxargs) {
519 maxargs += MAX_ARGS;
520 if (!(argv = realloc_array(argv, char *, maxargs)))
521 out_of_memory("glob_expand_one");
522 *argv_ptr = argv;
523 *maxargs_ptr = maxargs;
524 }
4135d091
WD
525 if (!*s)
526 s = ".";
b5bd5542 527 s = argv[argc++] = strdup(s);
7842418b 528 filter_server_path(s);
874895d5
AT
529#else
530 glob_t globbuf;
874895d5 531
b5bd5542
WD
532 if (maxargs <= argc)
533 return;
4135d091
WD
534 if (!*s)
535 s = ".";
e42c9458 536
4135d091 537 if (sanitize_paths)
1d6b8f9a 538 s = sanitize_path(NULL, s, "", 0);
84a63795
WD
539 else
540 s = strdup(s);
087bf010 541
5cb37436 542 memset(&globbuf, 0, sizeof globbuf);
7842418b 543 if (!filter_server_path(s))
4791825d 544 glob(s, 0, NULL, &globbuf);
b7061c82
WD
545 if (MAX((int)globbuf.gl_pathc, 1) > maxargs - argc) {
546 maxargs += globbuf.gl_pathc + MAX_ARGS;
547 if (!(argv = realloc_array(argv, char *, maxargs)))
548 out_of_memory("glob_expand_one");
549 *argv_ptr = argv;
550 *maxargs_ptr = maxargs;
551 }
b5bd5542
WD
552 if (globbuf.gl_pathc == 0)
553 argv[argc++] = s;
554 else {
c8933031 555 int i;
b5bd5542 556 free(s);
c8933031 557 for (i = 0; i < (int)globbuf.gl_pathc; i++) {
b5bd5542
WD
558 if (!(argv[argc++] = strdup(globbuf.gl_pathv[i])))
559 out_of_memory("glob_expand_one");
560 }
874895d5
AT
561 }
562 globfree(&globbuf);
874895d5 563#endif
b5bd5542 564 *argc_ptr = argc;
874895d5 565}
5a96ee05 566
4791825d 567/* This routine is only used in daemon mode. */
b7061c82 568void glob_expand(char *base1, char ***argv_ptr, int *argc_ptr, int *maxargs_ptr)
087bf010 569{
b7061c82 570 char *s = (*argv_ptr)[*argc_ptr];
087bf010 571 char *p, *q;
ba5e128d 572 char *base = base1;
4791825d 573 int base_len = strlen(base);
087bf010 574
b5bd5542
WD
575 if (!s || !*s)
576 return;
087bf010 577
4791825d
WD
578 if (strncmp(s, base, base_len) == 0)
579 s += base_len;
e42c9458 580
b5bd5542
WD
581 if (!(s = strdup(s)))
582 out_of_memory("glob_expand");
087bf010 583
b5bd5542
WD
584 if (asprintf(&base," %s/", base1) <= 0)
585 out_of_memory("glob_expand");
4791825d 586 base_len++;
ba5e128d 587
b5bd5542
WD
588 for (q = s; *q; q = p + base_len) {
589 if ((p = strstr(q, base)) != NULL)
590 *p = '\0'; /* split it at this point */
b7061c82 591 glob_expand_one(q, argv_ptr, argc_ptr, maxargs_ptr);
b5bd5542
WD
592 if (!p)
593 break;
087bf010
AT
594 }
595
087bf010 596 free(s);
ba5e128d 597 free(base);
087bf010 598}
5a96ee05 599
ac13ad10
MP
600/**
601 * Convert a string to lower case
602 **/
5a96ee05
AT
603void strlower(char *s)
604{
605 while (*s) {
b5bd5542
WD
606 if (isupper(*(unsigned char *)s))
607 *s = tolower(*(unsigned char *)s);
5a96ee05
AT
608 s++;
609 }
610}
e42c9458 611
368ad70e
WD
612/* Join strings p1 & p2 into "dest" with a guaranteed '/' between them. (If
613 * p1 ends with a '/', no extra '/' is inserted.) Returns the length of both
a8f7e4b8
WD
614 * strings + 1 (if '/' was inserted), regardless of whether the null-terminated
615 * string fits into destsize. */
368ad70e
WD
616size_t pathjoin(char *dest, size_t destsize, const char *p1, const char *p2)
617{
618 size_t len = strlcpy(dest, p1, destsize);
619 if (len < destsize - 1) {
620 if (!len || dest[len-1] != '/')
621 dest[len++] = '/';
622 if (len < destsize - 1)
623 len += strlcpy(dest + len, p2, destsize - len);
624 else {
625 dest[len] = '\0';
626 len += strlen(p2);
627 }
628 }
629 else
630 len += strlen(p2) + 1; /* Assume we'd insert a '/'. */
631 return len;
632}
633
634/* Join any number of strings together, putting them in "dest". The return
a8f7e4b8
WD
635 * value is the length of all the strings, regardless of whether the null-
636 * terminated whole fits in destsize. Your list of string pointers must end
637 * with a NULL to indicate the end of the list. */
368ad70e
WD
638size_t stringjoin(char *dest, size_t destsize, ...)
639{
5cb37436 640 va_list ap;
368ad70e
WD
641 size_t len, ret = 0;
642 const char *src;
643
644 va_start(ap, destsize);
645 while (1) {
646 if (!(src = va_arg(ap, const char *)))
647 break;
648 len = strlen(src);
649 ret += len;
650 if (destsize > 1) {
651 if (len >= destsize)
652 len = destsize - 1;
653 memcpy(dest, src, len);
654 destsize -= len;
655 dest += len;
656 }
657 }
658 *dest = '\0';
659 va_end(ap);
660
661 return ret;
662}
663
1d6b8f9a
WD
664int count_dir_elements(const char *p)
665{
666 int cnt = 0, new_component = 1;
667 while (*p) {
668 if (*p++ == '/')
669 new_component = 1;
670 else if (new_component) {
671 new_component = 0;
672 cnt++;
673 }
674 }
675 return cnt;
676}
677
b92693da
WD
678/* Turns multiple adjacent slashes into a single slash, gets rid of "./"
679 * elements (but not a trailing dot dir), removes a trailing slash, and
680 * optionally collapses ".." elements (except for those at the start of the
681 * string). If the resulting name would be empty, change it into a ".". */
682unsigned int clean_fname(char *name, BOOL collapse_dot_dot)
5243c216 683{
e012b94f 684 char *limit = name - 1, *t = name, *f = name;
ebdd24d6 685 int anchored;
5243c216 686
b5bd5542 687 if (!name)
3104620c 688 return 0;
5243c216 689
ebdd24d6
WD
690 if ((anchored = *f == '/') != 0)
691 *t++ = *f++;
692 while (*f) {
693 /* discard extra slashes */
694 if (*f == '/') {
695 f++;
696 continue;
5243c216 697 }
ebdd24d6
WD
698 if (*f == '.') {
699 /* discard "." dirs (but NOT a trailing '.'!) */
700 if (f[1] == '/') {
e012b94f 701 f += 2;
ebdd24d6
WD
702 continue;
703 }
704 /* collapse ".." dirs */
b92693da
WD
705 if (collapse_dot_dot
706 && f[1] == '.' && (f[2] == '/' || !f[2])) {
ebdd24d6
WD
707 char *s = t - 1;
708 if (s == name && anchored) {
709 f += 2;
710 continue;
711 }
712 while (s > limit && *--s != '/') {}
e012b94f 713 if (s != t - 1 && (s < name || *s == '/')) {
ebdd24d6
WD
714 t = s + 1;
715 f += 2;
716 continue;
717 }
f55c2dfc 718 limit = t + 2;
5243c216
AT
719 }
720 }
ebdd24d6 721 while (*f && (*t++ = *f++) != '/') {}
5243c216 722 }
ebdd24d6
WD
723
724 if (t > name+anchored && t[-1] == '/')
725 t--;
726 if (t == name)
727 *t++ = '.';
728 *t = '\0';
3104620c
WD
729
730 return t - name;
5243c216
AT
731}
732
84a63795
WD
733/* Make path appear as if a chroot had occurred. This handles a leading
734 * "/" (either removing it or expanding it) and any leading or embedded
735 * ".." components that attempt to escape past the module's top dir.
b4235b31 736 *
1d6b8f9a
WD
737 * If dest is NULL, a buffer is allocated to hold the result. It is legal
738 * to call with the dest and the path (p) pointing to the same buffer, but
739 * rootdir will be ignored to avoid expansion of the string.
b4235b31 740 *
1d6b8f9a
WD
741 * The rootdir string contains a value to use in place of a leading slash.
742 * Specify NULL to get the default of lp_path(module_id).
ac13ad10 743 *
5886edfa
WD
744 * If depth is >= 0, it is a count of how many '..'s to allow at the start
745 * of the path. Use -1 to allow unlimited depth.
ac13ad10 746 *
b92693da
WD
747 * We also clean the path in a manner similar to clean_fname() but with a
748 * few differences:
749 *
750 * Turns multiple adjacent slashes into a single slash, gets rid of "." dir
751 * elements (INCLUDING a trailing dot dir), PRESERVES a trailing slash, and
752 * ALWAYS collapses ".." elements (except for those at the start of the
753 * string up to "depth" deep). If the resulting name would be empty,
754 * change it into a ".". */
1d6b8f9a 755char *sanitize_path(char *dest, const char *p, const char *rootdir, int depth)
1b8e662a 756{
44e2e578 757 char *start, *sanp;
84a63795
WD
758 int rlen = 0;
759
760 if (dest != p) {
761 int plen = strlen(p);
1d6b8f9a
WD
762 if (*p == '/') {
763 if (!rootdir)
764 rootdir = lp_path(module_id);
765 rlen = strlen(rootdir);
766 depth = 0;
84a63795
WD
767 p++;
768 }
769 if (dest) {
770 if (rlen + plen + 1 >= MAXPATHLEN)
771 return NULL;
772 } else if (!(dest = new_array(char, rlen + plen + 1)))
773 out_of_memory("sanitize_path");
774 if (rlen) {
1d6b8f9a 775 memcpy(dest, rootdir, rlen);
84a63795
WD
776 if (rlen > 1)
777 dest[rlen++] = '/';
778 }
779 }
cb13abfe 780
84a63795 781 start = sanp = dest + rlen;
1b8e662a 782 while (*p != '\0') {
2d41264e
WD
783 /* discard leading or extra slashes */
784 if (*p == '/') {
785 p++;
786 continue;
787 }
b5f9e67d 788 /* this loop iterates once per filename component in p.
44e2e578 789 * both p (and sanp if the original had a slash) should
b5f9e67d
DD
790 * always be left pointing after a slash
791 */
c284f34a 792 if (*p == '.' && (p[1] == '/' || p[1] == '\0')) {
b5f9e67d 793 /* skip "." component */
2d41264e 794 p++;
cb13abfe
DD
795 continue;
796 }
c284f34a 797 if (*p == '.' && p[1] == '.' && (p[2] == '/' || p[2] == '\0')) {
cb13abfe 798 /* ".." component followed by slash or end */
8e5f029e
WD
799 if (depth <= 0 || sanp != start) {
800 p += 2;
801 if (sanp != start) {
802 /* back up sanp one level */
803 --sanp; /* now pointing at slash */
804 while (sanp > start && sanp[-1] != '/') {
805 /* skip back up to slash */
806 sanp--;
807 }
b5f9e67d 808 }
8e5f029e 809 continue;
1b8e662a 810 }
8e5f029e
WD
811 /* allow depth levels of .. at the beginning */
812 depth--;
813 /* move the virtual beginning to leave the .. alone */
814 start = sanp + 3;
1b8e662a 815 }
2d41264e
WD
816 /* copy one component through next slash */
817 while (*p && (*sanp++ = *p++) != '/') {}
1b8e662a 818 }
84a63795 819 if (sanp == dest) {
b5f9e67d 820 /* ended up with nothing, so put in "." component */
44e2e578 821 *sanp++ = '.';
b5f9e67d 822 }
44e2e578 823 *sanp = '\0';
1b8e662a 824
84a63795 825 return dest;
14b61c63 826}
5243c216 827
4791825d 828char curr_dir[MAXPATHLEN];
4af8fe4e 829unsigned int curr_dir_len;
5243c216 830
4e5db0ad 831/**
a16d8f2b
WD
832 * Like chdir(), but it keeps track of the current directory (in the
833 * global "curr_dir"), and ensures that the path size doesn't overflow.
834 * Also cleans the path using the clean_fname() function.
4e5db0ad 835 **/
4af8fe4e 836int push_dir(char *dir)
5243c216 837{
5243c216 838 static int initialised;
4af8fe4e 839 unsigned int len;
5243c216
AT
840
841 if (!initialised) {
842 initialised = 1;
5cb37436 843 getcwd(curr_dir, sizeof curr_dir - 1);
4af8fe4e 844 curr_dir_len = strlen(curr_dir);
5243c216
AT
845 }
846
4af8fe4e
WD
847 if (!dir) /* this call was probably just to initialize */
848 return 0;
c226b7c2 849
4af8fe4e
WD
850 len = strlen(dir);
851 if (len == 1 && *dir == '.')
852 return 1;
5243c216 853
4af8fe4e
WD
854 if ((*dir == '/' ? len : curr_dir_len + 1 + len) >= sizeof curr_dir)
855 return 0;
856
857 if (chdir(dir))
858 return 0;
5243c216
AT
859
860 if (*dir == '/') {
4af8fe4e
WD
861 memcpy(curr_dir, dir, len + 1);
862 curr_dir_len = len;
863 } else {
864 curr_dir[curr_dir_len++] = '/';
865 memcpy(curr_dir + curr_dir_len, dir, len + 1);
866 curr_dir_len += len;
5243c216
AT
867 }
868
b92693da 869 curr_dir_len = clean_fname(curr_dir, 1);
5243c216 870
4af8fe4e 871 return 1;
5243c216
AT
872}
873
a16d8f2b
WD
874/**
875 * Reverse a push_dir() call. You must pass in an absolute path
876 * that was copied from a prior value of "curr_dir".
877 **/
5243c216
AT
878int pop_dir(char *dir)
879{
4af8fe4e
WD
880 if (chdir(dir))
881 return 0;
5243c216 882
4af8fe4e
WD
883 curr_dir_len = strlcpy(curr_dir, dir, sizeof curr_dir);
884 if (curr_dir_len >= sizeof curr_dir)
885 curr_dir_len = sizeof curr_dir - 1;
5243c216 886
4af8fe4e 887 return 1;
5243c216 888}
aa9b77a5 889
89d26123
WD
890/* Return the filename, turning any non-printable characters into escaped
891 * characters (e.g. \n -> \012, \ -> \\). This ensures that outputting it
892 * cannot generate an empty line nor corrupt the screen. This function can
893 * return only MAX_SAFE_NAMES values at a time! The returned value can be
894 * longer than MAXPATHLEN (because we may be trying to output an error about
895 * a too-long filename)! */
af9f56a0 896char *safe_fname(const char *fname)
820b6c9a 897{
f8cd88db
WD
898#define MAX_SAFE_NAMES 4
899 static char fbuf[MAX_SAFE_NAMES][MAXPATHLEN*2];
900 static int ndx = 0;
901 int limit = sizeof fbuf / MAX_SAFE_NAMES - 1;
902 char *t;
903
904 ndx = (ndx + 1) % MAX_SAFE_NAMES;
6f2245c8 905 for (t = fbuf[ndx]; *fname; fname++) {
89d26123
WD
906 if (*fname == '\\') {
907 if ((limit -= 2) < 0)
908 break;
909 *t++ = '\\';
910 *t++ = '\\';
911 } else if (!isprint(*(uchar*)fname)) {
912 if ((limit -= 4) < 0)
913 break;
914 sprintf(t, "\\%03o", *(uchar*)fname);
915 t += 4;
916 } else {
6f2245c8
WD
917 if (--limit < 0)
918 break;
f8cd88db 919 *t++ = *fname;
89d26123 920 }
f8cd88db
WD
921 }
922 *t = '\0';
820b6c9a 923
f8cd88db 924 return fbuf[ndx];
820b6c9a
WD
925}
926
eb61be19
WD
927/**
928 * Return a quoted string with the full pathname of the indicated filename.
929 * The string " (in MODNAME)" may also be appended. The returned pointer
930 * remains valid until the next time full_fname() is called.
931 **/
9a5ade18 932char *full_fname(const char *fn)
eb61be19 933{
eb61be19
WD
934 static char *result = NULL;
935 char *m1, *m2, *m3;
936 char *p1, *p2;
937
938 if (result)
939 free(result);
940
af1a3f9b 941 fn = safe_fname(fn);
eb61be19
WD
942 if (*fn == '/')
943 p1 = p2 = "";
944 else {
945 p1 = curr_dir;
bc83274a
WD
946 for (p2 = p1; *p2 == '/'; p2++) {}
947 if (*p2)
948 p2 = "/";
eb61be19
WD
949 }
950 if (module_id >= 0) {
951 m1 = " (in ";
952 m2 = lp_name(module_id);
953 m3 = ")";
bc83274a 954 if (p1 == curr_dir) {
eb61be19
WD
955 if (!lp_use_chroot(module_id)) {
956 char *p = lp_path(module_id);
957 if (*p != '/' || p[1])
958 p1 += strlen(p);
959 }
eb61be19 960 }
eb61be19
WD
961 } else
962 m1 = m2 = m3 = "";
963
964 asprintf(&result, "\"%s%s%s\"%s%s%s", p1, p2, fn, m1, m2, m3);
965
966 return result;
967}
968
a7260c40
WD
969static char partial_fname[MAXPATHLEN];
970
971char *partial_dir_fname(const char *fname)
972{
973 char *t = partial_fname;
974 int sz = sizeof partial_fname;
975 const char *fn;
976
977 if ((fn = strrchr(fname, '/')) != NULL) {
978 fn++;
979 if (*partial_dir != '/') {
980 int len = fn - fname;
981 strncpy(t, fname, len); /* safe */
982 t += len;
983 sz -= len;
984 }
985 } else
986 fn = fname;
987 if ((int)pathjoin(t, sz, partial_dir, fn) >= sz)
988 return NULL;
5aa7b20a
WD
989 if (server_filter_list.head) {
990 static int len;
991 if (!len)
992 len = strlen(partial_dir);
993 t[len] = '\0';
994 if (check_filter(&server_filter_list, partial_fname, 1) < 0)
995 return NULL;
996 t[len] = '/';
997 if (check_filter(&server_filter_list, partial_fname, 0) < 0)
998 return NULL;
999 }
a7260c40
WD
1000
1001 return partial_fname;
1002}
1003
1004/* If no --partial-dir option was specified, we don't need to do anything
1005 * (the partial-dir is essentially '.'), so just return success. */
1006int handle_partial_dir(const char *fname, int create)
1007{
1008 char *fn, *dir;
1009
1010 if (fname != partial_fname)
1011 return 1;
1012 if (!create && *partial_dir == '/')
1013 return 1;
1014 if (!(fn = strrchr(partial_fname, '/')))
1015 return 1;
1016
1017 *fn = '\0';
1018 dir = partial_fname;
1019 if (create) {
1020 STRUCT_STAT st;
a7260c40 1021 int statret = do_lstat(dir, &st);
a7260c40
WD
1022 if (statret == 0 && !S_ISDIR(st.st_mode)) {
1023 if (do_unlink(dir) < 0)
1024 return 0;
1025 statret = -1;
1026 }
1027 if (statret < 0 && do_mkdir(dir, 0700) < 0)
1028 return 0;
1029 } else
1030 do_rmdir(dir);
1031 *fn = '/';
1032
1033 return 1;
1034}
1035
ac13ad10 1036/** We need to supply our own strcmp function for file list comparisons
aa9b77a5
AT
1037 to ensure that signed/unsigned usage is consistent between machines. */
1038int u_strcmp(const char *cs1, const char *cs2)
1039{
5a788ade
AT
1040 const uchar *s1 = (const uchar *)cs1;
1041 const uchar *s2 = (const uchar *)cs2;
aa9b77a5
AT
1042
1043 while (*s1 && *s2 && (*s1 == *s2)) {
1044 s1++; s2++;
1045 }
5cb37436 1046
aa9b77a5
AT
1047 return (int)*s1 - (int)*s2;
1048}
eb86d661 1049
4b957c22 1050
ac13ad10
MP
1051
1052/**
1053 * Determine if a symlink points outside the current directory tree.
036e70b0
MP
1054 * This is considered "unsafe" because e.g. when mirroring somebody
1055 * else's machine it might allow them to establish a symlink to
1056 * /etc/passwd, and then read it through a web server.
1057 *
4e5db0ad
MP
1058 * Null symlinks and absolute symlinks are always unsafe.
1059 *
1060 * Basically here we are concerned with symlinks whose target contains
1061 * "..", because this might cause us to walk back up out of the
1062 * transferred directory. We are not allowed to go back up and
1063 * reenter.
1064 *
036e70b0
MP
1065 * @param dest Target of the symlink in question.
1066 *
25d34a5c 1067 * @param src Top source directory currently applicable. Basically this
036e70b0 1068 * is the first parameter to rsync in a simple invocation, but it's
25d34a5c 1069 * modified by flist.c in slightly complex ways.
036e70b0
MP
1070 *
1071 * @retval True if unsafe
1072 * @retval False is unsafe
4e5db0ad
MP
1073 *
1074 * @sa t_unsafe.c
ac13ad10 1075 **/
7afa3a4a 1076int unsafe_symlink(const char *dest, const char *src)
4b957c22 1077{
7afa3a4a 1078 const char *name, *slash;
4b957c22
AT
1079 int depth = 0;
1080
1081 /* all absolute and null symlinks are unsafe */
b5bd5542
WD
1082 if (!dest || !*dest || *dest == '/')
1083 return 1;
4b957c22
AT
1084
1085 /* find out what our safety margin is */
7afa3a4a
WD
1086 for (name = src; (slash = strchr(name, '/')) != 0; name = slash+1) {
1087 if (strncmp(name, "../", 3) == 0) {
c284f34a 1088 depth = 0;
7afa3a4a 1089 } else if (strncmp(name, "./", 2) == 0) {
4b957c22
AT
1090 /* nothing */
1091 } else {
1092 depth++;
1093 }
1094 }
7afa3a4a
WD
1095 if (strcmp(name, "..") == 0)
1096 depth = 0;
4b957c22 1097
7afa3a4a
WD
1098 for (name = dest; (slash = strchr(name, '/')) != 0; name = slash+1) {
1099 if (strncmp(name, "../", 3) == 0) {
1100 /* if at any point we go outside the current directory
1101 then stop - it is unsafe */
1102 if (--depth < 0)
1103 return 1;
1104 } else if (strncmp(name, "./", 2) == 0) {
4b957c22
AT
1105 /* nothing */
1106 } else {
1107 depth++;
1108 }
4b957c22 1109 }
7afa3a4a
WD
1110 if (strcmp(name, "..") == 0)
1111 depth--;
4b957c22 1112
4b957c22
AT
1113 return (depth < 0);
1114}
375a4556 1115
f7632fc6 1116
ac13ad10 1117/**
b4235b31
MP
1118 * Return the date and time as a string
1119 **/
f7632fc6
AT
1120char *timestring(time_t t)
1121{
1122 static char TimeBuf[200];
1123 struct tm *tm = localtime(&t);
1124
4f5b0756 1125#ifdef HAVE_STRFTIME
5cb37436 1126 strftime(TimeBuf, sizeof TimeBuf - 1, "%Y/%m/%d %H:%M:%S", tm);
f7632fc6 1127#else
5cb37436 1128 strlcpy(TimeBuf, asctime(tm), sizeof TimeBuf);
f7632fc6
AT
1129#endif
1130
1131 if (TimeBuf[strlen(TimeBuf)-1] == '\n') {
1132 TimeBuf[strlen(TimeBuf)-1] = 0;
1133 }
1134
1135 return(TimeBuf);
1136}
1137
9ec16c83 1138
e1bd49d6
MP
1139/**
1140 * Sleep for a specified number of milliseconds.
1141 *
1142 * Always returns TRUE. (In the future it might return FALSE if
1143 * interrupted.)
1144 **/
1145int msleep(int t)
9ec16c83 1146{
c284f34a
WD
1147 int tdiff = 0;
1148 struct timeval tval, t1, t2;
9ec16c83
AT
1149
1150 gettimeofday(&t1, NULL);
5cb37436 1151
9ec16c83
AT
1152 while (tdiff < t) {
1153 tval.tv_sec = (t-tdiff)/1000;
1154 tval.tv_usec = 1000*((t-tdiff)%1000);
5cb37436 1155
9ec16c83
AT
1156 errno = 0;
1157 select(0,NULL,NULL, NULL, &tval);
1158
1159 gettimeofday(&t2, NULL);
5cb37436 1160 tdiff = (t2.tv_sec - t1.tv_sec)*1000 +
9ec16c83
AT
1161 (t2.tv_usec - t1.tv_usec)/1000;
1162 }
e1bd49d6
MP
1163
1164 return True;
9ec16c83
AT
1165}
1166
1167
ac13ad10
MP
1168/**
1169 * Determine if two file modification times are equivalent (either
1170 * exact or in the modification timestamp window established by
1171 * --modify-window).
1172 *
1173 * @retval 0 if the times should be treated as the same
1174 *
1175 * @retval +1 if the first is later
1176 *
1177 * @retval -1 if the 2nd is later
1178 **/
5b56cc19
AT
1179int cmp_modtime(time_t file1, time_t file2)
1180{
5b56cc19 1181 if (file2 > file1) {
bc6ebcd2
WD
1182 if (file2 - file1 <= modify_window)
1183 return 0;
5b56cc19
AT
1184 return -1;
1185 }
bc6ebcd2
WD
1186 if (file1 - file2 <= modify_window)
1187 return 0;
5b56cc19
AT
1188 return 1;
1189}
1190
1191
1192#ifdef __INSURE__XX
0f8f98c8
AT
1193#include <dlfcn.h>
1194
ac13ad10
MP
1195/**
1196 This routine is a trick to immediately catch errors when debugging
1197 with insure. A xterm with a gdb is popped up when insure catches
1198 a error. It is Linux specific.
1199**/
0f8f98c8
AT
1200int _Insure_trap_error(int a1, int a2, int a3, int a4, int a5, int a6)
1201{
1202 static int (*fn)();
1203 int ret;
8950ac03 1204 char *cmd;
0f8f98c8 1205
5cb37436 1206 asprintf(&cmd, "/usr/X11R6/bin/xterm -display :0 -T Panic -n Panic -e /bin/sh -c 'cat /tmp/ierrs.*.%d ; gdb /proc/%d/exe %d'",
0f8f98c8
AT
1207 getpid(), getpid(), getpid());
1208
1209 if (!fn) {
1210 static void *h;
1211 h = dlopen("/usr/local/parasoft/insure++lite/lib.linux2/libinsure.so", RTLD_LAZY);
1212 fn = dlsym(h, "_Insure_trap_error");
1213 }
1214
1215 ret = fn(a1, a2, a3, a4, a5, a6);
1216
1217 system(cmd);
1218
8950ac03
AT
1219 free(cmd);
1220
0f8f98c8
AT
1221 return ret;
1222}
1223#endif
58cadc86
WD
1224
1225
1226#define MALLOC_MAX 0x40000000
1227
1228void *_new_array(unsigned int size, unsigned long num)
1229{
1230 if (num >= MALLOC_MAX/size)
1231 return NULL;
1232 return malloc(size * num);
1233}
1234
1235void *_realloc_array(void *ptr, unsigned int size, unsigned long num)
1236{
1237 if (num >= MALLOC_MAX/size)
1238 return NULL;
1239 /* No realloc should need this, but just in case... */
1240 if (!ptr)
1241 return malloc(size * num);
1242 return realloc(ptr, size * num);
1243}
e64ae6d7
WD
1244
1245/* Take a filename and filename length and return the most significant
1246 * filename suffix we can find. This ignores suffixes such as "~",
1247 * ".bak", ".orig", ".~1~", etc. */
1248const char *find_filename_suffix(const char *fn, int fn_len, int *len_ptr)
1249{
1250 const char *suf, *s;
1251 BOOL had_tilde;
1252 int s_len;
1253
1254 /* One or more dots at the start aren't a suffix. */
1255 while (fn_len && *fn == '.') fn++, fn_len--;
1256
1257 /* Ignore the ~ in a "foo~" filename. */
1258 if (fn_len > 1 && fn[fn_len-1] == '~')
1259 fn_len--, had_tilde = True;
1260 else
1261 had_tilde = False;
1262
1263 /* Assume we don't find an suffix. */
1264 suf = "";
1265 *len_ptr = 0;
1266
1267 /* Find the last significant suffix. */
1268 for (s = fn + fn_len; fn_len > 1; ) {
1269 while (*--s != '.' && s != fn) {}
1270 if (s == fn)
1271 break;
1272 s_len = fn_len - (s - fn);
1273 fn_len = s - fn;
6012eaa1 1274 if (s_len == 4) {
e64ae6d7
WD
1275 if (strcmp(s+1, "bak") == 0
1276 || strcmp(s+1, "old") == 0)
1277 continue;
6012eaa1 1278 } else if (s_len == 5) {
e64ae6d7
WD
1279 if (strcmp(s+1, "orig") == 0)
1280 continue;
1281 } else if (s_len > 2 && had_tilde
73253721 1282 && s[1] == '~' && isdigit(*(uchar*)(s+2)))
e64ae6d7
WD
1283 continue;
1284 *len_ptr = s_len;
1285 suf = s;
1286 if (s_len == 1)
1287 break;
1288 /* Determine if the suffix is all digits. */
1289 for (s++, s_len--; s_len > 0; s++, s_len--) {
73253721 1290 if (!isdigit(*(uchar*)s))
e64ae6d7
WD
1291 return suf;
1292 }
1293 /* An all-digit suffix may not be that signficant. */
1294 s = suf;
1295 }
1296
1297 return suf;
1298}
1299
1300/* This is an implementation of the Levenshtein distance algorithm. It
1301 * was implemented to avoid needing a two-dimensional matrix (to save
1302 * memory). It was also tweaked to try to factor in the ASCII distance
1303 * between changed characters as a minor distance quantity. The normal
1304 * Levenshtein units of distance (each signifying a single change between
1305 * the two strings) are defined as a "UNIT". */
1306
1307#define UNIT (1 << 16)
1308
1309uint32 fuzzy_distance(const char *s1, int len1, const char *s2, int len2)
1310{
1311 uint32 a[MAXPATHLEN], diag, above, left, diag_inc, above_inc, left_inc;
1312 int32 cost;
1313 int i1, i2;
1314
1315 if (!len1 || !len2) {
1316 if (!len1) {
1317 s1 = s2;
1318 len1 = len2;
1319 }
1320 for (i1 = 0, cost = 0; i1 < len1; i1++)
1321 cost += s1[i1];
1322 return (int32)len1 * UNIT + cost;
1323 }
1324
1325 for (i2 = 0; i2 < len2; i2++)
1326 a[i2] = (i2+1) * UNIT;
1327
1328 for (i1 = 0; i1 < len1; i1++) {
1329 diag = i1 * UNIT;
1330 above = (i1+1) * UNIT;
1331 for (i2 = 0; i2 < len2; i2++) {
1332 left = a[i2];
1333 if ((cost = *((uchar*)s1+i1) - *((uchar*)s2+i2)) != 0) {
1334 if (cost < 0)
1335 cost = UNIT - cost;
1336 else
1337 cost = UNIT + cost;
1338 }
1339 diag_inc = diag + cost;
1340 left_inc = left + UNIT + *((uchar*)s1+i1);
1341 above_inc = above + UNIT + *((uchar*)s2+i2);
1342 a[i2] = above = left < above
1343 ? (left_inc < diag_inc ? left_inc : diag_inc)
1344 : (above_inc < diag_inc ? above_inc : diag_inc);
1345 diag = left;
1346 }
1347 }
1348
1349 return a[len2-1];
1350}