Changed safe_fname() to output \### (octal) to escape non-printable
[rsync/rsync.git] / util.c
CommitLineData
1960e228 1/* -*- c-file-style: "linux" -*-
5cb37436
WD
2 *
3 * Copyright (C) 1996-2000 by Andrew Tridgell
0ecfbf27
MP
4 * Copyright (C) Paul Mackerras 1996
5 * Copyright (C) 2001, 2002 by Martin Pool <mbp@samba.org>
5cb37436 6 *
0ecfbf27
MP
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License as published by
9 * the Free Software Foundation; either version 2 of the License, or
10 * (at your option) any later version.
5cb37436 11 *
0ecfbf27
MP
12 * This program is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 * GNU General Public License for more details.
5cb37436 16 *
0ecfbf27
MP
17 * You should have received a copy of the GNU General Public License
18 * along with this program; if not, write to the Free Software
19 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
20 */
c627d613 21
ac13ad10 22/**
0ecfbf27 23 * @file
ac13ad10 24 *
5cb37436 25 * Utilities used in rsync
ac13ad10 26 **/
c627d613 27
c627d613
AT
28#include "rsync.h"
29
c7c11a0d 30extern int verbose;
bc6ebcd2
WD
31extern int dry_run;
32extern int module_id;
33extern int modify_window;
a7260c40 34extern char *partial_dir;
7842418b 35extern struct filter_list_struct server_filter_list;
c7c11a0d 36
0ecfbf27
MP
37int sanitize_paths = 0;
38
39
f0359dd0 40
ac13ad10 41/**
0ecfbf27
MP
42 * Set a fd into nonblocking mode
43 **/
f0359dd0
AT
44void set_nonblocking(int fd)
45{
46 int val;
47
0ecfbf27 48 if ((val = fcntl(fd, F_GETFL, 0)) == -1)
f0359dd0
AT
49 return;
50 if (!(val & NONBLOCK_FLAG)) {
51 val |= NONBLOCK_FLAG;
52 fcntl(fd, F_SETFL, val);
53 }
54}
55
ac13ad10 56/**
0ecfbf27
MP
57 * Set a fd into blocking mode
58 **/
36349ea0
AT
59void set_blocking(int fd)
60{
61 int val;
62
0ecfbf27 63 if ((val = fcntl(fd, F_GETFL, 0)) == -1)
36349ea0
AT
64 return;
65 if (val & NONBLOCK_FLAG) {
66 val &= ~NONBLOCK_FLAG;
67 fcntl(fd, F_SETFL, val);
68 }
69}
70
f0359dd0 71
ac13ad10 72/**
0ecfbf27
MP
73 * Create a file descriptor pair - like pipe() but use socketpair if
74 * possible (because of blocking issues on pipes).
5cb37436 75 *
0ecfbf27 76 * Always set non-blocking.
f0359dd0 77 */
08f15335
AT
78int fd_pair(int fd[2])
79{
f0359dd0
AT
80 int ret;
81
4f5b0756 82#ifdef HAVE_SOCKETPAIR
f0359dd0 83 ret = socketpair(AF_UNIX, SOCK_STREAM, 0, fd);
08f15335 84#else
f0359dd0 85 ret = pipe(fd);
08f15335 86#endif
f0359dd0
AT
87
88 if (ret == 0) {
89 set_nonblocking(fd[0]);
90 set_nonblocking(fd[1]);
91 }
0ecfbf27 92
f0359dd0 93 return ret;
08f15335
AT
94}
95
96
0ecfbf27 97void print_child_argv(char **cmd)
5ad0e46f 98{
1bbd10fe 99 rprintf(FINFO, "opening connection using ");
5ad0e46f
MP
100 for (; *cmd; cmd++) {
101 /* Look for characters that ought to be quoted. This
102 * is not a great quoting algorithm, but it's
103 * sufficient for a log message. */
104 if (strspn(*cmd, "abcdefghijklmnopqrstuvwxyz"
105 "ABCDEFGHIJKLMNOPQRSTUVWXYZ"
106 "0123456789"
107 ",.-_=+@/") != strlen(*cmd)) {
f8cd88db 108 rprintf(FINFO, "\"%s\" ", safe_fname(*cmd));
5ad0e46f 109 } else {
f8cd88db 110 rprintf(FINFO, "%s ", safe_fname(*cmd));
5ad0e46f
MP
111 }
112 }
113 rprintf(FINFO, "\n");
114}
115
116
c627d613
AT
117void out_of_memory(char *str)
118{
c284f34a
WD
119 rprintf(FERROR, "ERROR: out of memory in %s\n", str);
120 exit_cleanup(RERR_MALLOC);
575f2fca
AT
121}
122
123void overflow(char *str)
124{
c284f34a
WD
125 rprintf(FERROR, "ERROR: buffer overflow in %s\n", str);
126 exit_cleanup(RERR_MALLOC);
c627d613
AT
127}
128
129
c627d613 130
404e813c 131int set_modtime(char *fname, time_t modtime)
c627d613 132{
404e813c
MP
133 if (verbose > 2) {
134 rprintf(FINFO, "set modtime of %s to (%ld) %s",
f8cd88db 135 safe_fname(fname), (long)modtime,
404e813c
MP
136 asctime(localtime(&modtime)));
137 }
5cb37436 138
15778afb
WD
139 if (dry_run)
140 return 0;
141
31e12522 142 {
4f5b0756 143#ifdef HAVE_UTIMBUF
5cb37436 144 struct utimbuf tbuf;
31e12522
AT
145 tbuf.actime = time(NULL);
146 tbuf.modtime = modtime;
147 return utime(fname,&tbuf);
4f5b0756 148#elif defined HAVE_UTIME
31e12522
AT
149 time_t t[2];
150 t[0] = time(NULL);
151 t[1] = modtime;
152 return utime(fname,t);
c627d613 153#else
31e12522
AT
154 struct timeval t[2];
155 t[0].tv_sec = time(NULL);
156 t[0].tv_usec = 0;
157 t[1].tv_sec = modtime;
158 t[1].tv_usec = 0;
159 return utimes(fname,t);
c627d613 160#endif
31e12522 161 }
c627d613 162}
94481d91 163
720b47f2 164
ac13ad10
MP
165/**
166 Create any necessary directories in fname. Unfortunately we don't know
167 what perms to give the directory when this is called so we need to rely
168 on the umask
169**/
0ecfbf27 170int create_directory_path(char *fname, int base_umask)
6574b4f7 171{
6574b4f7
AT
172 char *p;
173
c284f34a
WD
174 while (*fname == '/')
175 fname++;
176 while (strncmp(fname, "./", 2) == 0)
177 fname += 2;
6574b4f7
AT
178
179 p = fname;
c284f34a 180 while ((p = strchr(p,'/')) != NULL) {
6574b4f7 181 *p = 0;
5cb37436 182 do_mkdir(fname, 0777 & ~base_umask);
6574b4f7
AT
183 *p = '/';
184 p++;
185 }
186 return 0;
187}
950ab32d
AT
188
189
ac13ad10
MP
190/**
191 * Write @p len bytes at @p ptr to descriptor @p desc, retrying if
192 * interrupted.
193 *
194 * @retval len upon success
195 *
196 * @retval <0 write's (negative) error code
197 *
198 * Derived from GNU C's cccp.c.
199 */
6566d205 200int full_write(int desc, char *ptr, size_t len)
950ab32d
AT
201{
202 int total_written;
5cb37436 203
950ab32d
AT
204 total_written = 0;
205 while (len > 0) {
5c1b7bfd 206 int written = write(desc, ptr, len);
950ab32d 207 if (written < 0) {
950ab32d
AT
208 if (errno == EINTR)
209 continue;
950ab32d
AT
210 return written;
211 }
212 total_written += written;
213 ptr += written;
214 len -= written;
215 }
216 return total_written;
217}
218
950ab32d 219
ac13ad10
MP
220/**
221 * Read @p len bytes at @p ptr from descriptor @p desc, retrying if
222 * interrupted.
223 *
224 * @retval >0 the actual number of bytes read
225 *
226 * @retval 0 for EOF
227 *
228 * @retval <0 for an error.
229 *
230 * Derived from GNU C's cccp.c. */
9dd891bb 231static int safe_read(int desc, char *ptr, size_t len)
950ab32d
AT
232{
233 int n_chars;
5cb37436 234
9dd891bb 235 if (len == 0)
950ab32d 236 return len;
5cb37436 237
950ab32d
AT
238 do {
239 n_chars = read(desc, ptr, len);
240 } while (n_chars < 0 && errno == EINTR);
5cb37436 241
950ab32d
AT
242 return n_chars;
243}
244
245
ac13ad10
MP
246/** Copy a file.
247 *
3e13004b
WD
248 * This is used in conjunction with the --temp-dir, --backup, and
249 * --copy-dest options. */
950ab32d
AT
250int copy_file(char *source, char *dest, mode_t mode)
251{
252 int ifd;
253 int ofd;
254 char buf[1024 * 8];
255 int len; /* Number of bytes read into `buf'. */
256
8c9fd200 257 ifd = do_open(source, O_RDONLY, 0);
950ab32d 258 if (ifd == -1) {
d62bcc17 259 rsyserr(FERROR, errno, "open %s", full_fname(source));
950ab32d
AT
260 return -1;
261 }
262
c7c11a0d 263 if (robust_unlink(dest) && errno != ENOENT) {
d62bcc17 264 rsyserr(FERROR, errno, "unlink %s", full_fname(dest));
950ab32d
AT
265 return -1;
266 }
267
31e12522 268 ofd = do_open(dest, O_WRONLY | O_CREAT | O_TRUNC | O_EXCL, mode);
c46ded46 269 if (ofd == -1) {
d62bcc17 270 rsyserr(FERROR, errno, "open %s", full_fname(dest));
950ab32d
AT
271 close(ifd);
272 return -1;
273 }
274
5cb37436 275 while ((len = safe_read(ifd, buf, sizeof buf)) > 0) {
950ab32d 276 if (full_write(ofd, buf, len) < 0) {
d62bcc17 277 rsyserr(FERROR, errno, "write %s", full_fname(dest));
950ab32d
AT
278 close(ifd);
279 close(ofd);
280 return -1;
281 }
282 }
283
8b602edd 284 if (len < 0) {
d62bcc17 285 rsyserr(FERROR, errno, "read %s", full_fname(source));
8b602edd
WD
286 close(ifd);
287 close(ofd);
288 return -1;
289 }
290
9f27cd8c 291 if (close(ifd) < 0) {
d62bcc17
WD
292 rsyserr(FINFO, errno, "close failed on %s",
293 full_fname(source));
9f27cd8c
WD
294 }
295
296 if (close(ofd) < 0) {
d62bcc17
WD
297 rsyserr(FERROR, errno, "close failed on %s",
298 full_fname(dest));
9f27cd8c
WD
299 return -1;
300 }
950ab32d 301
950ab32d
AT
302 return 0;
303}
feaa89c4 304
c7c11a0d
DD
305/* MAX_RENAMES should be 10**MAX_RENAMES_DIGITS */
306#define MAX_RENAMES_DIGITS 3
307#define MAX_RENAMES 1000
308
ac13ad10 309/**
b4235b31
MP
310 * Robust unlink: some OS'es (HPUX) refuse to unlink busy files, so
311 * rename to <path>/.rsyncNNN instead.
312 *
313 * Note that successive rsync runs will shuffle the filenames around a
314 * bit as long as the file is still busy; this is because this function
315 * does not know if the unlink call is due to a new file coming in, or
316 * --delete trying to remove old .rsyncNNN files, hence it renames it
317 * each time.
318 **/
c7c11a0d
DD
319int robust_unlink(char *fname)
320{
321#ifndef ETXTBSY
322 return do_unlink(fname);
323#else
324 static int counter = 1;
325 int rc, pos, start;
326 char path[MAXPATHLEN];
327
328 rc = do_unlink(fname);
c284f34a 329 if (rc == 0 || errno != ETXTBSY)
c7c11a0d
DD
330 return rc;
331
c284f34a
WD
332 if ((pos = strlcpy(path, fname, MAXPATHLEN)) >= MAXPATHLEN)
333 pos = MAXPATHLEN - 1;
c7c11a0d 334
c284f34a
WD
335 while (pos > 0 && path[pos-1] != '/')
336 pos--;
5cb37436 337 pos += strlcpy(path+pos, ".rsync", MAXPATHLEN-pos);
c7c11a0d
DD
338
339 if (pos > (MAXPATHLEN-MAX_RENAMES_DIGITS-1)) {
340 errno = ETXTBSY;
341 return -1;
342 }
343
344 /* start where the last one left off to reduce chance of clashes */
345 start = counter;
346 do {
347 sprintf(&path[pos], "%03d", counter);
348 if (++counter >= MAX_RENAMES)
349 counter = 1;
c284f34a 350 } while ((rc = access(path, 0)) == 0 && counter != start);
c7c11a0d 351
4791825d 352 if (verbose > 0) {
c7c11a0d 353 rprintf(FINFO,"renaming %s to %s because of text busy\n",
f8cd88db 354 safe_fname(fname), safe_fname(path));
4791825d 355 }
c7c11a0d
DD
356
357 /* maybe we should return rename()'s exit status? Nah. */
358 if (do_rename(fname, path) != 0) {
359 errno = ETXTBSY;
360 return -1;
361 }
362 return 0;
363#endif
364}
365
630f548f
WD
366/* Returns 0 on successful rename, 1 if we successfully copied the file
367 * across filesystems, -2 if copy_file() failed, and -1 on other errors. */
62c9e6b3 368int robust_rename(char *from, char *to, int mode)
c7c11a0d 369{
62c9e6b3
WD
370 int tries = 4;
371
372 while (tries--) {
373 if (do_rename(from, to) == 0)
374 return 0;
375
376 switch (errno) {
377#ifdef ETXTBSY
378 case ETXTBSY:
379 if (robust_unlink(to) != 0)
380 return -1;
381 break;
c7c11a0d 382#endif
62c9e6b3
WD
383 case EXDEV:
384 if (copy_file(from, to, mode) != 0)
385 return -2;
386 do_unlink(from);
630f548f 387 return 1;
62c9e6b3
WD
388 default:
389 return -1;
390 }
391 }
392 return -1;
feaa89c4 393}
3ba62a83
AT
394
395
396static pid_t all_pids[10];
397static int num_pids;
398
4cf64834 399/** Fork and record the pid of the child. **/
3ba62a83
AT
400pid_t do_fork(void)
401{
402 pid_t newpid = fork();
5cb37436 403
4cf64834 404 if (newpid != 0 && newpid != -1) {
3ba62a83
AT
405 all_pids[num_pids++] = newpid;
406 }
407 return newpid;
408}
409
4cf64834
MP
410/**
411 * Kill all children.
412 *
413 * @todo It would be kind of nice to make sure that they are actually
414 * all our children before we kill them, because their pids may have
415 * been recycled by some other process. Perhaps when we wait for a
416 * child, we should remove it from this array. Alternatively we could
417 * perhaps use process groups, but I think that would not work on
418 * ancient Unix versions that don't support them.
419 **/
3ba62a83
AT
420void kill_all(int sig)
421{
422 int i;
4cf64834
MP
423
424 for (i = 0; i < num_pids; i++) {
425 /* Let's just be a little careful where we
426 * point that gun, hey? See kill(2) for the
427 * magic caused by negative values. */
428 pid_t p = all_pids[i];
429
430 if (p == getpid())
431 continue;
432 if (p <= 0)
433 continue;
434
435 kill(p, sig);
3ba62a83
AT
436 }
437}
9486289c 438
4cf64834 439
ac13ad10 440/** Turn a user name into a uid */
8ef4ffd6
AT
441int name_to_uid(char *name, uid_t *uid)
442{
443 struct passwd *pass;
b5bd5542
WD
444 if (!name || !*name)
445 return 0;
8ef4ffd6
AT
446 pass = getpwnam(name);
447 if (pass) {
448 *uid = pass->pw_uid;
449 return 1;
450 }
451 return 0;
452}
453
ac13ad10 454/** Turn a group name into a gid */
8ef4ffd6
AT
455int name_to_gid(char *name, gid_t *gid)
456{
457 struct group *grp;
b5bd5542
WD
458 if (!name || !*name)
459 return 0;
8ef4ffd6
AT
460 grp = getgrnam(name);
461 if (grp) {
462 *gid = grp->gr_gid;
463 return 1;
464 }
465 return 0;
466}
467
ff8b29b8 468
ac13ad10 469/** Lock a byte range in a open file */
31593dd6 470int lock_range(int fd, int offset, int len)
0c515f17 471{
31593dd6 472 struct flock lock;
0c515f17 473
31593dd6
AT
474 lock.l_type = F_WRLCK;
475 lock.l_whence = SEEK_SET;
476 lock.l_start = offset;
477 lock.l_len = len;
478 lock.l_pid = 0;
5cb37436 479
31593dd6 480 return fcntl(fd,F_SETLK,&lock) == 0;
0c515f17 481}
874895d5 482
7842418b 483static int filter_server_path(char *arg)
4791825d
WD
484{
485 char *s;
4791825d 486
7842418b 487 if (server_filter_list.head) {
4791825d
WD
488 for (s = arg; (s = strchr(s, '/')) != NULL; ) {
489 *s = '\0';
7842418b 490 if (check_filter(&server_filter_list, arg, 1) < 0) {
4791825d
WD
491 /* We must leave arg truncated! */
492 return 1;
493 }
494 *s++ = '/';
495 }
496 }
497 return 0;
498}
874895d5 499
b7061c82
WD
500static void glob_expand_one(char *s, char ***argv_ptr, int *argc_ptr,
501 int *maxargs_ptr)
874895d5 502{
b7061c82 503 char **argv = *argv_ptr;
b5bd5542 504 int argc = *argc_ptr;
b7061c82 505 int maxargs = *maxargs_ptr;
4f5b0756 506#if !defined HAVE_GLOB || !defined HAVE_GLOB_H
b7061c82
WD
507 if (argc == maxargs) {
508 maxargs += MAX_ARGS;
509 if (!(argv = realloc_array(argv, char *, maxargs)))
510 out_of_memory("glob_expand_one");
511 *argv_ptr = argv;
512 *maxargs_ptr = maxargs;
513 }
4135d091
WD
514 if (!*s)
515 s = ".";
b5bd5542 516 s = argv[argc++] = strdup(s);
7842418b 517 filter_server_path(s);
874895d5
AT
518#else
519 glob_t globbuf;
520 int i;
521
b5bd5542
WD
522 if (maxargs <= argc)
523 return;
4135d091
WD
524 if (!*s)
525 s = ".";
e42c9458 526
4135d091 527 if (sanitize_paths)
1d6b8f9a 528 s = sanitize_path(NULL, s, "", 0);
84a63795
WD
529 else
530 s = strdup(s);
087bf010 531
5cb37436 532 memset(&globbuf, 0, sizeof globbuf);
7842418b 533 if (!filter_server_path(s))
4791825d 534 glob(s, 0, NULL, &globbuf);
b7061c82
WD
535 if (MAX((int)globbuf.gl_pathc, 1) > maxargs - argc) {
536 maxargs += globbuf.gl_pathc + MAX_ARGS;
537 if (!(argv = realloc_array(argv, char *, maxargs)))
538 out_of_memory("glob_expand_one");
539 *argv_ptr = argv;
540 *maxargs_ptr = maxargs;
541 }
b5bd5542
WD
542 if (globbuf.gl_pathc == 0)
543 argv[argc++] = s;
544 else {
545 int j = globbuf.gl_pathc;
b5bd5542
WD
546 free(s);
547 for (i = 0; i < j; i++) {
548 if (!(argv[argc++] = strdup(globbuf.gl_pathv[i])))
549 out_of_memory("glob_expand_one");
550 }
874895d5
AT
551 }
552 globfree(&globbuf);
874895d5 553#endif
b5bd5542 554 *argc_ptr = argc;
874895d5 555}
5a96ee05 556
4791825d 557/* This routine is only used in daemon mode. */
b7061c82 558void glob_expand(char *base1, char ***argv_ptr, int *argc_ptr, int *maxargs_ptr)
087bf010 559{
b7061c82 560 char *s = (*argv_ptr)[*argc_ptr];
087bf010 561 char *p, *q;
ba5e128d 562 char *base = base1;
4791825d 563 int base_len = strlen(base);
087bf010 564
b5bd5542
WD
565 if (!s || !*s)
566 return;
087bf010 567
4791825d
WD
568 if (strncmp(s, base, base_len) == 0)
569 s += base_len;
e42c9458 570
b5bd5542
WD
571 if (!(s = strdup(s)))
572 out_of_memory("glob_expand");
087bf010 573
b5bd5542
WD
574 if (asprintf(&base," %s/", base1) <= 0)
575 out_of_memory("glob_expand");
4791825d 576 base_len++;
ba5e128d 577
b5bd5542
WD
578 for (q = s; *q; q = p + base_len) {
579 if ((p = strstr(q, base)) != NULL)
580 *p = '\0'; /* split it at this point */
b7061c82 581 glob_expand_one(q, argv_ptr, argc_ptr, maxargs_ptr);
b5bd5542
WD
582 if (!p)
583 break;
087bf010
AT
584 }
585
087bf010 586 free(s);
ba5e128d 587 free(base);
087bf010 588}
5a96ee05 589
ac13ad10
MP
590/**
591 * Convert a string to lower case
592 **/
5a96ee05
AT
593void strlower(char *s)
594{
595 while (*s) {
b5bd5542
WD
596 if (isupper(*(unsigned char *)s))
597 *s = tolower(*(unsigned char *)s);
5a96ee05
AT
598 s++;
599 }
600}
e42c9458 601
368ad70e
WD
602/* Join strings p1 & p2 into "dest" with a guaranteed '/' between them. (If
603 * p1 ends with a '/', no extra '/' is inserted.) Returns the length of both
a8f7e4b8
WD
604 * strings + 1 (if '/' was inserted), regardless of whether the null-terminated
605 * string fits into destsize. */
368ad70e
WD
606size_t pathjoin(char *dest, size_t destsize, const char *p1, const char *p2)
607{
608 size_t len = strlcpy(dest, p1, destsize);
609 if (len < destsize - 1) {
610 if (!len || dest[len-1] != '/')
611 dest[len++] = '/';
612 if (len < destsize - 1)
613 len += strlcpy(dest + len, p2, destsize - len);
614 else {
615 dest[len] = '\0';
616 len += strlen(p2);
617 }
618 }
619 else
620 len += strlen(p2) + 1; /* Assume we'd insert a '/'. */
621 return len;
622}
623
624/* Join any number of strings together, putting them in "dest". The return
a8f7e4b8
WD
625 * value is the length of all the strings, regardless of whether the null-
626 * terminated whole fits in destsize. Your list of string pointers must end
627 * with a NULL to indicate the end of the list. */
368ad70e
WD
628size_t stringjoin(char *dest, size_t destsize, ...)
629{
5cb37436 630 va_list ap;
368ad70e
WD
631 size_t len, ret = 0;
632 const char *src;
633
634 va_start(ap, destsize);
635 while (1) {
636 if (!(src = va_arg(ap, const char *)))
637 break;
638 len = strlen(src);
639 ret += len;
640 if (destsize > 1) {
641 if (len >= destsize)
642 len = destsize - 1;
643 memcpy(dest, src, len);
644 destsize -= len;
645 dest += len;
646 }
647 }
648 *dest = '\0';
649 va_end(ap);
650
651 return ret;
652}
653
1d6b8f9a
WD
654int count_dir_elements(const char *p)
655{
656 int cnt = 0, new_component = 1;
657 while (*p) {
658 if (*p++ == '/')
659 new_component = 1;
660 else if (new_component) {
661 new_component = 0;
662 cnt++;
663 }
664 }
665 return cnt;
666}
667
b92693da
WD
668/* Turns multiple adjacent slashes into a single slash, gets rid of "./"
669 * elements (but not a trailing dot dir), removes a trailing slash, and
670 * optionally collapses ".." elements (except for those at the start of the
671 * string). If the resulting name would be empty, change it into a ".". */
672unsigned int clean_fname(char *name, BOOL collapse_dot_dot)
5243c216 673{
e012b94f 674 char *limit = name - 1, *t = name, *f = name;
ebdd24d6 675 int anchored;
5243c216 676
b5bd5542 677 if (!name)
3104620c 678 return 0;
5243c216 679
ebdd24d6
WD
680 if ((anchored = *f == '/') != 0)
681 *t++ = *f++;
682 while (*f) {
683 /* discard extra slashes */
684 if (*f == '/') {
685 f++;
686 continue;
5243c216 687 }
ebdd24d6
WD
688 if (*f == '.') {
689 /* discard "." dirs (but NOT a trailing '.'!) */
690 if (f[1] == '/') {
e012b94f 691 f += 2;
ebdd24d6
WD
692 continue;
693 }
694 /* collapse ".." dirs */
b92693da
WD
695 if (collapse_dot_dot
696 && f[1] == '.' && (f[2] == '/' || !f[2])) {
ebdd24d6
WD
697 char *s = t - 1;
698 if (s == name && anchored) {
699 f += 2;
700 continue;
701 }
702 while (s > limit && *--s != '/') {}
e012b94f 703 if (s != t - 1 && (s < name || *s == '/')) {
ebdd24d6
WD
704 t = s + 1;
705 f += 2;
706 continue;
707 }
f55c2dfc 708 limit = t + 2;
5243c216
AT
709 }
710 }
ebdd24d6 711 while (*f && (*t++ = *f++) != '/') {}
5243c216 712 }
ebdd24d6
WD
713
714 if (t > name+anchored && t[-1] == '/')
715 t--;
716 if (t == name)
717 *t++ = '.';
718 *t = '\0';
3104620c
WD
719
720 return t - name;
5243c216
AT
721}
722
84a63795
WD
723/* Make path appear as if a chroot had occurred. This handles a leading
724 * "/" (either removing it or expanding it) and any leading or embedded
725 * ".." components that attempt to escape past the module's top dir.
b4235b31 726 *
1d6b8f9a
WD
727 * If dest is NULL, a buffer is allocated to hold the result. It is legal
728 * to call with the dest and the path (p) pointing to the same buffer, but
729 * rootdir will be ignored to avoid expansion of the string.
b4235b31 730 *
1d6b8f9a
WD
731 * The rootdir string contains a value to use in place of a leading slash.
732 * Specify NULL to get the default of lp_path(module_id).
ac13ad10 733 *
5886edfa
WD
734 * If depth is >= 0, it is a count of how many '..'s to allow at the start
735 * of the path. Use -1 to allow unlimited depth.
ac13ad10 736 *
b92693da
WD
737 * We also clean the path in a manner similar to clean_fname() but with a
738 * few differences:
739 *
740 * Turns multiple adjacent slashes into a single slash, gets rid of "." dir
741 * elements (INCLUDING a trailing dot dir), PRESERVES a trailing slash, and
742 * ALWAYS collapses ".." elements (except for those at the start of the
743 * string up to "depth" deep). If the resulting name would be empty,
744 * change it into a ".". */
1d6b8f9a 745char *sanitize_path(char *dest, const char *p, const char *rootdir, int depth)
1b8e662a 746{
44e2e578 747 char *start, *sanp;
84a63795
WD
748 int rlen = 0;
749
750 if (dest != p) {
751 int plen = strlen(p);
1d6b8f9a
WD
752 if (*p == '/') {
753 if (!rootdir)
754 rootdir = lp_path(module_id);
755 rlen = strlen(rootdir);
756 depth = 0;
84a63795
WD
757 p++;
758 }
759 if (dest) {
760 if (rlen + plen + 1 >= MAXPATHLEN)
761 return NULL;
762 } else if (!(dest = new_array(char, rlen + plen + 1)))
763 out_of_memory("sanitize_path");
764 if (rlen) {
1d6b8f9a 765 memcpy(dest, rootdir, rlen);
84a63795
WD
766 if (rlen > 1)
767 dest[rlen++] = '/';
768 }
769 }
cb13abfe 770
84a63795 771 start = sanp = dest + rlen;
1b8e662a 772 while (*p != '\0') {
2d41264e
WD
773 /* discard leading or extra slashes */
774 if (*p == '/') {
775 p++;
776 continue;
777 }
b5f9e67d 778 /* this loop iterates once per filename component in p.
44e2e578 779 * both p (and sanp if the original had a slash) should
b5f9e67d
DD
780 * always be left pointing after a slash
781 */
c284f34a 782 if (*p == '.' && (p[1] == '/' || p[1] == '\0')) {
b5f9e67d 783 /* skip "." component */
2d41264e 784 p++;
cb13abfe
DD
785 continue;
786 }
c284f34a 787 if (*p == '.' && p[1] == '.' && (p[2] == '/' || p[2] == '\0')) {
cb13abfe 788 /* ".." component followed by slash or end */
8e5f029e
WD
789 if (depth <= 0 || sanp != start) {
790 p += 2;
791 if (sanp != start) {
792 /* back up sanp one level */
793 --sanp; /* now pointing at slash */
794 while (sanp > start && sanp[-1] != '/') {
795 /* skip back up to slash */
796 sanp--;
797 }
b5f9e67d 798 }
8e5f029e 799 continue;
1b8e662a 800 }
8e5f029e
WD
801 /* allow depth levels of .. at the beginning */
802 depth--;
803 /* move the virtual beginning to leave the .. alone */
804 start = sanp + 3;
1b8e662a 805 }
2d41264e
WD
806 /* copy one component through next slash */
807 while (*p && (*sanp++ = *p++) != '/') {}
1b8e662a 808 }
84a63795 809 if (sanp == dest) {
b5f9e67d 810 /* ended up with nothing, so put in "." component */
44e2e578 811 *sanp++ = '.';
b5f9e67d 812 }
44e2e578 813 *sanp = '\0';
1b8e662a 814
84a63795 815 return dest;
14b61c63 816}
5243c216 817
4791825d 818char curr_dir[MAXPATHLEN];
4af8fe4e 819unsigned int curr_dir_len;
5243c216 820
4e5db0ad 821/**
a16d8f2b
WD
822 * Like chdir(), but it keeps track of the current directory (in the
823 * global "curr_dir"), and ensures that the path size doesn't overflow.
824 * Also cleans the path using the clean_fname() function.
4e5db0ad 825 **/
4af8fe4e 826int push_dir(char *dir)
5243c216 827{
5243c216 828 static int initialised;
4af8fe4e 829 unsigned int len;
5243c216
AT
830
831 if (!initialised) {
832 initialised = 1;
5cb37436 833 getcwd(curr_dir, sizeof curr_dir - 1);
4af8fe4e 834 curr_dir_len = strlen(curr_dir);
5243c216
AT
835 }
836
4af8fe4e
WD
837 if (!dir) /* this call was probably just to initialize */
838 return 0;
c226b7c2 839
4af8fe4e
WD
840 len = strlen(dir);
841 if (len == 1 && *dir == '.')
842 return 1;
5243c216 843
4af8fe4e
WD
844 if ((*dir == '/' ? len : curr_dir_len + 1 + len) >= sizeof curr_dir)
845 return 0;
846
847 if (chdir(dir))
848 return 0;
5243c216
AT
849
850 if (*dir == '/') {
4af8fe4e
WD
851 memcpy(curr_dir, dir, len + 1);
852 curr_dir_len = len;
853 } else {
854 curr_dir[curr_dir_len++] = '/';
855 memcpy(curr_dir + curr_dir_len, dir, len + 1);
856 curr_dir_len += len;
5243c216
AT
857 }
858
b92693da 859 curr_dir_len = clean_fname(curr_dir, 1);
5243c216 860
4af8fe4e 861 return 1;
5243c216
AT
862}
863
a16d8f2b
WD
864/**
865 * Reverse a push_dir() call. You must pass in an absolute path
866 * that was copied from a prior value of "curr_dir".
867 **/
5243c216
AT
868int pop_dir(char *dir)
869{
4af8fe4e
WD
870 if (chdir(dir))
871 return 0;
5243c216 872
4af8fe4e
WD
873 curr_dir_len = strlcpy(curr_dir, dir, sizeof curr_dir);
874 if (curr_dir_len >= sizeof curr_dir)
875 curr_dir_len = sizeof curr_dir - 1;
5243c216 876
4af8fe4e 877 return 1;
5243c216 878}
aa9b77a5 879
89d26123
WD
880/* Return the filename, turning any non-printable characters into escaped
881 * characters (e.g. \n -> \012, \ -> \\). This ensures that outputting it
882 * cannot generate an empty line nor corrupt the screen. This function can
883 * return only MAX_SAFE_NAMES values at a time! The returned value can be
884 * longer than MAXPATHLEN (because we may be trying to output an error about
885 * a too-long filename)! */
af9f56a0 886char *safe_fname(const char *fname)
820b6c9a 887{
f8cd88db
WD
888#define MAX_SAFE_NAMES 4
889 static char fbuf[MAX_SAFE_NAMES][MAXPATHLEN*2];
890 static int ndx = 0;
891 int limit = sizeof fbuf / MAX_SAFE_NAMES - 1;
892 char *t;
893
894 ndx = (ndx + 1) % MAX_SAFE_NAMES;
89d26123
WD
895 for (t = fbuf[ndx]; *fname && limit; fname++) {
896 if (*fname == '\\') {
897 if ((limit -= 2) < 0)
898 break;
899 *t++ = '\\';
900 *t++ = '\\';
901 } else if (!isprint(*(uchar*)fname)) {
902 if ((limit -= 4) < 0)
903 break;
904 sprintf(t, "\\%03o", *(uchar*)fname);
905 t += 4;
906 } else {
907 limit--;
f8cd88db 908 *t++ = *fname;
89d26123 909 }
f8cd88db
WD
910 }
911 *t = '\0';
820b6c9a 912
f8cd88db 913 return fbuf[ndx];
820b6c9a
WD
914}
915
eb61be19
WD
916/**
917 * Return a quoted string with the full pathname of the indicated filename.
918 * The string " (in MODNAME)" may also be appended. The returned pointer
919 * remains valid until the next time full_fname() is called.
920 **/
9a5ade18 921char *full_fname(const char *fn)
eb61be19 922{
eb61be19
WD
923 static char *result = NULL;
924 char *m1, *m2, *m3;
925 char *p1, *p2;
926
927 if (result)
928 free(result);
929
af1a3f9b 930 fn = safe_fname(fn);
eb61be19
WD
931 if (*fn == '/')
932 p1 = p2 = "";
933 else {
934 p1 = curr_dir;
bc83274a
WD
935 for (p2 = p1; *p2 == '/'; p2++) {}
936 if (*p2)
937 p2 = "/";
eb61be19
WD
938 }
939 if (module_id >= 0) {
940 m1 = " (in ";
941 m2 = lp_name(module_id);
942 m3 = ")";
bc83274a 943 if (p1 == curr_dir) {
eb61be19
WD
944 if (!lp_use_chroot(module_id)) {
945 char *p = lp_path(module_id);
946 if (*p != '/' || p[1])
947 p1 += strlen(p);
948 }
eb61be19 949 }
eb61be19
WD
950 } else
951 m1 = m2 = m3 = "";
952
953 asprintf(&result, "\"%s%s%s\"%s%s%s", p1, p2, fn, m1, m2, m3);
954
955 return result;
956}
957
a7260c40
WD
958static char partial_fname[MAXPATHLEN];
959
960char *partial_dir_fname(const char *fname)
961{
962 char *t = partial_fname;
963 int sz = sizeof partial_fname;
964 const char *fn;
965
966 if ((fn = strrchr(fname, '/')) != NULL) {
967 fn++;
968 if (*partial_dir != '/') {
969 int len = fn - fname;
970 strncpy(t, fname, len); /* safe */
971 t += len;
972 sz -= len;
973 }
974 } else
975 fn = fname;
976 if ((int)pathjoin(t, sz, partial_dir, fn) >= sz)
977 return NULL;
5aa7b20a
WD
978 if (server_filter_list.head) {
979 static int len;
980 if (!len)
981 len = strlen(partial_dir);
982 t[len] = '\0';
983 if (check_filter(&server_filter_list, partial_fname, 1) < 0)
984 return NULL;
985 t[len] = '/';
986 if (check_filter(&server_filter_list, partial_fname, 0) < 0)
987 return NULL;
988 }
a7260c40
WD
989
990 return partial_fname;
991}
992
993/* If no --partial-dir option was specified, we don't need to do anything
994 * (the partial-dir is essentially '.'), so just return success. */
995int handle_partial_dir(const char *fname, int create)
996{
997 char *fn, *dir;
998
999 if (fname != partial_fname)
1000 return 1;
1001 if (!create && *partial_dir == '/')
1002 return 1;
1003 if (!(fn = strrchr(partial_fname, '/')))
1004 return 1;
1005
1006 *fn = '\0';
1007 dir = partial_fname;
1008 if (create) {
1009 STRUCT_STAT st;
a7260c40 1010 int statret = do_lstat(dir, &st);
a7260c40
WD
1011 if (statret == 0 && !S_ISDIR(st.st_mode)) {
1012 if (do_unlink(dir) < 0)
1013 return 0;
1014 statret = -1;
1015 }
1016 if (statret < 0 && do_mkdir(dir, 0700) < 0)
1017 return 0;
1018 } else
1019 do_rmdir(dir);
1020 *fn = '/';
1021
1022 return 1;
1023}
1024
ac13ad10 1025/** We need to supply our own strcmp function for file list comparisons
aa9b77a5
AT
1026 to ensure that signed/unsigned usage is consistent between machines. */
1027int u_strcmp(const char *cs1, const char *cs2)
1028{
5a788ade
AT
1029 const uchar *s1 = (const uchar *)cs1;
1030 const uchar *s2 = (const uchar *)cs2;
aa9b77a5
AT
1031
1032 while (*s1 && *s2 && (*s1 == *s2)) {
1033 s1++; s2++;
1034 }
5cb37436 1035
aa9b77a5
AT
1036 return (int)*s1 - (int)*s2;
1037}
eb86d661 1038
4b957c22 1039
ac13ad10
MP
1040
1041/**
1042 * Determine if a symlink points outside the current directory tree.
036e70b0
MP
1043 * This is considered "unsafe" because e.g. when mirroring somebody
1044 * else's machine it might allow them to establish a symlink to
1045 * /etc/passwd, and then read it through a web server.
1046 *
4e5db0ad
MP
1047 * Null symlinks and absolute symlinks are always unsafe.
1048 *
1049 * Basically here we are concerned with symlinks whose target contains
1050 * "..", because this might cause us to walk back up out of the
1051 * transferred directory. We are not allowed to go back up and
1052 * reenter.
1053 *
036e70b0
MP
1054 * @param dest Target of the symlink in question.
1055 *
25d34a5c 1056 * @param src Top source directory currently applicable. Basically this
036e70b0 1057 * is the first parameter to rsync in a simple invocation, but it's
25d34a5c 1058 * modified by flist.c in slightly complex ways.
036e70b0
MP
1059 *
1060 * @retval True if unsafe
1061 * @retval False is unsafe
4e5db0ad
MP
1062 *
1063 * @sa t_unsafe.c
ac13ad10 1064 **/
7afa3a4a 1065int unsafe_symlink(const char *dest, const char *src)
4b957c22 1066{
7afa3a4a 1067 const char *name, *slash;
4b957c22
AT
1068 int depth = 0;
1069
1070 /* all absolute and null symlinks are unsafe */
b5bd5542
WD
1071 if (!dest || !*dest || *dest == '/')
1072 return 1;
4b957c22
AT
1073
1074 /* find out what our safety margin is */
7afa3a4a
WD
1075 for (name = src; (slash = strchr(name, '/')) != 0; name = slash+1) {
1076 if (strncmp(name, "../", 3) == 0) {
c284f34a 1077 depth = 0;
7afa3a4a 1078 } else if (strncmp(name, "./", 2) == 0) {
4b957c22
AT
1079 /* nothing */
1080 } else {
1081 depth++;
1082 }
1083 }
7afa3a4a
WD
1084 if (strcmp(name, "..") == 0)
1085 depth = 0;
4b957c22 1086
7afa3a4a
WD
1087 for (name = dest; (slash = strchr(name, '/')) != 0; name = slash+1) {
1088 if (strncmp(name, "../", 3) == 0) {
1089 /* if at any point we go outside the current directory
1090 then stop - it is unsafe */
1091 if (--depth < 0)
1092 return 1;
1093 } else if (strncmp(name, "./", 2) == 0) {
4b957c22
AT
1094 /* nothing */
1095 } else {
1096 depth++;
1097 }
4b957c22 1098 }
7afa3a4a
WD
1099 if (strcmp(name, "..") == 0)
1100 depth--;
4b957c22 1101
4b957c22
AT
1102 return (depth < 0);
1103}
375a4556 1104
f7632fc6 1105
ac13ad10 1106/**
b4235b31
MP
1107 * Return the date and time as a string
1108 **/
f7632fc6
AT
1109char *timestring(time_t t)
1110{
1111 static char TimeBuf[200];
1112 struct tm *tm = localtime(&t);
1113
4f5b0756 1114#ifdef HAVE_STRFTIME
5cb37436 1115 strftime(TimeBuf, sizeof TimeBuf - 1, "%Y/%m/%d %H:%M:%S", tm);
f7632fc6 1116#else
5cb37436 1117 strlcpy(TimeBuf, asctime(tm), sizeof TimeBuf);
f7632fc6
AT
1118#endif
1119
1120 if (TimeBuf[strlen(TimeBuf)-1] == '\n') {
1121 TimeBuf[strlen(TimeBuf)-1] = 0;
1122 }
1123
1124 return(TimeBuf);
1125}
1126
9ec16c83 1127
e1bd49d6
MP
1128/**
1129 * Sleep for a specified number of milliseconds.
1130 *
1131 * Always returns TRUE. (In the future it might return FALSE if
1132 * interrupted.)
1133 **/
1134int msleep(int t)
9ec16c83 1135{
c284f34a
WD
1136 int tdiff = 0;
1137 struct timeval tval, t1, t2;
9ec16c83
AT
1138
1139 gettimeofday(&t1, NULL);
5cb37436 1140
9ec16c83
AT
1141 while (tdiff < t) {
1142 tval.tv_sec = (t-tdiff)/1000;
1143 tval.tv_usec = 1000*((t-tdiff)%1000);
5cb37436 1144
9ec16c83
AT
1145 errno = 0;
1146 select(0,NULL,NULL, NULL, &tval);
1147
1148 gettimeofday(&t2, NULL);
5cb37436 1149 tdiff = (t2.tv_sec - t1.tv_sec)*1000 +
9ec16c83
AT
1150 (t2.tv_usec - t1.tv_usec)/1000;
1151 }
e1bd49d6
MP
1152
1153 return True;
9ec16c83
AT
1154}
1155
1156
ac13ad10
MP
1157/**
1158 * Determine if two file modification times are equivalent (either
1159 * exact or in the modification timestamp window established by
1160 * --modify-window).
1161 *
1162 * @retval 0 if the times should be treated as the same
1163 *
1164 * @retval +1 if the first is later
1165 *
1166 * @retval -1 if the 2nd is later
1167 **/
5b56cc19
AT
1168int cmp_modtime(time_t file1, time_t file2)
1169{
5b56cc19 1170 if (file2 > file1) {
bc6ebcd2
WD
1171 if (file2 - file1 <= modify_window)
1172 return 0;
5b56cc19
AT
1173 return -1;
1174 }
bc6ebcd2
WD
1175 if (file1 - file2 <= modify_window)
1176 return 0;
5b56cc19
AT
1177 return 1;
1178}
1179
1180
1181#ifdef __INSURE__XX
0f8f98c8
AT
1182#include <dlfcn.h>
1183
ac13ad10
MP
1184/**
1185 This routine is a trick to immediately catch errors when debugging
1186 with insure. A xterm with a gdb is popped up when insure catches
1187 a error. It is Linux specific.
1188**/
0f8f98c8
AT
1189int _Insure_trap_error(int a1, int a2, int a3, int a4, int a5, int a6)
1190{
1191 static int (*fn)();
1192 int ret;
8950ac03 1193 char *cmd;
0f8f98c8 1194
5cb37436 1195 asprintf(&cmd, "/usr/X11R6/bin/xterm -display :0 -T Panic -n Panic -e /bin/sh -c 'cat /tmp/ierrs.*.%d ; gdb /proc/%d/exe %d'",
0f8f98c8
AT
1196 getpid(), getpid(), getpid());
1197
1198 if (!fn) {
1199 static void *h;
1200 h = dlopen("/usr/local/parasoft/insure++lite/lib.linux2/libinsure.so", RTLD_LAZY);
1201 fn = dlsym(h, "_Insure_trap_error");
1202 }
1203
1204 ret = fn(a1, a2, a3, a4, a5, a6);
1205
1206 system(cmd);
1207
8950ac03
AT
1208 free(cmd);
1209
0f8f98c8
AT
1210 return ret;
1211}
1212#endif
58cadc86
WD
1213
1214
1215#define MALLOC_MAX 0x40000000
1216
1217void *_new_array(unsigned int size, unsigned long num)
1218{
1219 if (num >= MALLOC_MAX/size)
1220 return NULL;
1221 return malloc(size * num);
1222}
1223
1224void *_realloc_array(void *ptr, unsigned int size, unsigned long num)
1225{
1226 if (num >= MALLOC_MAX/size)
1227 return NULL;
1228 /* No realloc should need this, but just in case... */
1229 if (!ptr)
1230 return malloc(size * num);
1231 return realloc(ptr, size * num);
1232}
e64ae6d7
WD
1233
1234/* Take a filename and filename length and return the most significant
1235 * filename suffix we can find. This ignores suffixes such as "~",
1236 * ".bak", ".orig", ".~1~", etc. */
1237const char *find_filename_suffix(const char *fn, int fn_len, int *len_ptr)
1238{
1239 const char *suf, *s;
1240 BOOL had_tilde;
1241 int s_len;
1242
1243 /* One or more dots at the start aren't a suffix. */
1244 while (fn_len && *fn == '.') fn++, fn_len--;
1245
1246 /* Ignore the ~ in a "foo~" filename. */
1247 if (fn_len > 1 && fn[fn_len-1] == '~')
1248 fn_len--, had_tilde = True;
1249 else
1250 had_tilde = False;
1251
1252 /* Assume we don't find an suffix. */
1253 suf = "";
1254 *len_ptr = 0;
1255
1256 /* Find the last significant suffix. */
1257 for (s = fn + fn_len; fn_len > 1; ) {
1258 while (*--s != '.' && s != fn) {}
1259 if (s == fn)
1260 break;
1261 s_len = fn_len - (s - fn);
1262 fn_len = s - fn;
6012eaa1 1263 if (s_len == 4) {
e64ae6d7
WD
1264 if (strcmp(s+1, "bak") == 0
1265 || strcmp(s+1, "old") == 0)
1266 continue;
6012eaa1 1267 } else if (s_len == 5) {
e64ae6d7
WD
1268 if (strcmp(s+1, "orig") == 0)
1269 continue;
1270 } else if (s_len > 2 && had_tilde
73253721 1271 && s[1] == '~' && isdigit(*(uchar*)(s+2)))
e64ae6d7
WD
1272 continue;
1273 *len_ptr = s_len;
1274 suf = s;
1275 if (s_len == 1)
1276 break;
1277 /* Determine if the suffix is all digits. */
1278 for (s++, s_len--; s_len > 0; s++, s_len--) {
73253721 1279 if (!isdigit(*(uchar*)s))
e64ae6d7
WD
1280 return suf;
1281 }
1282 /* An all-digit suffix may not be that signficant. */
1283 s = suf;
1284 }
1285
1286 return suf;
1287}
1288
1289/* This is an implementation of the Levenshtein distance algorithm. It
1290 * was implemented to avoid needing a two-dimensional matrix (to save
1291 * memory). It was also tweaked to try to factor in the ASCII distance
1292 * between changed characters as a minor distance quantity. The normal
1293 * Levenshtein units of distance (each signifying a single change between
1294 * the two strings) are defined as a "UNIT". */
1295
1296#define UNIT (1 << 16)
1297
1298uint32 fuzzy_distance(const char *s1, int len1, const char *s2, int len2)
1299{
1300 uint32 a[MAXPATHLEN], diag, above, left, diag_inc, above_inc, left_inc;
1301 int32 cost;
1302 int i1, i2;
1303
1304 if (!len1 || !len2) {
1305 if (!len1) {
1306 s1 = s2;
1307 len1 = len2;
1308 }
1309 for (i1 = 0, cost = 0; i1 < len1; i1++)
1310 cost += s1[i1];
1311 return (int32)len1 * UNIT + cost;
1312 }
1313
1314 for (i2 = 0; i2 < len2; i2++)
1315 a[i2] = (i2+1) * UNIT;
1316
1317 for (i1 = 0; i1 < len1; i1++) {
1318 diag = i1 * UNIT;
1319 above = (i1+1) * UNIT;
1320 for (i2 = 0; i2 < len2; i2++) {
1321 left = a[i2];
1322 if ((cost = *((uchar*)s1+i1) - *((uchar*)s2+i2)) != 0) {
1323 if (cost < 0)
1324 cost = UNIT - cost;
1325 else
1326 cost = UNIT + cost;
1327 }
1328 diag_inc = diag + cost;
1329 left_inc = left + UNIT + *((uchar*)s1+i1);
1330 above_inc = above + UNIT + *((uchar*)s2+i2);
1331 a[i2] = above = left < above
1332 ? (left_inc < diag_inc ? left_inc : diag_inc)
1333 : (above_inc < diag_inc ? above_inc : diag_inc);
1334 diag = left;
1335 }
1336 }
1337
1338 return a[len2-1];
1339}