stop testing for stuff we have.
Index: ftpd.c =================================================================== RCS file: /cvs/src/libexec/ftpd/ftpd.c,v retrieving revision 1.219 diff -u -p -r1.219 ftpd.c --- ftpd.c 26 Aug 2016 06:32:10 -0000 1.219 +++ ftpd.c 30 Aug 2016 12:50:04 -0000 @@ -151,9 +151,6 @@ char remotehost[HOST_NAME_MAX+1]; char dhostname[HOST_NAME_MAX+1]; char *guestpw; char ttyline[20]; -#if 0 -char *tty = ttyline; /* for klogin */ -#endif static struct utmp utmp; /* for utmp */ static login_cap_t *lc; static auth_session_t *as; @@ -529,7 +526,6 @@ main(int argc, char *argv[]) } if (his_addr.su_family == AF_INET6 && IN6_IS_ADDR_V4MAPPED(&his_addr.su_sin6.sin6_addr)) { -#if 1 /* * IPv4 control connection arrived to AF_INET6 socket. * I hate to do this, but this is the easiest solution. @@ -554,33 +550,18 @@ main(int argc, char *argv[]) &tmp_addr.su_sin6.sin6_addr.s6_addr[off], sizeof(ctrl_addr.su_sin.sin_addr)); ctrl_addr.su_sin.sin_port = tmp_addr.su_sin6.sin6_port; -#else - while (fgets(line, sizeof(line), fd) != NULL) { - line[strcspn(line, "\n")] = '\0'; - lreply(530, "%s", line); - } - (void) fflush(stdout); - (void) close(fd); - reply(530, - "Connection from IPv4 mapped address is not supported."); - exit(0); -#endif } -#ifdef IP_TOS if (his_addr.su_family == AF_INET) { tos = IPTOS_LOWDELAY; if (setsockopt(0, IPPROTO_IP, IP_TOS, &tos, sizeof(int)) < 0) syslog(LOG_WARNING, "setsockopt (IP_TOS): %m"); } -#endif data_source.su_port = htons(ntohs(ctrl_addr.su_port) - 1); /* Try to handle urgent data inline */ -#ifdef SO_OOBINLINE if (setsockopt(0, SOL_SOCKET, SO_OOBINLINE, &on, sizeof(on)) < 0) syslog(LOG_ERR, "setsockopt: %m"); -#endif dolog((struct sockaddr *)&his_addr); @@ -1332,15 +1313,12 @@ getdatasock(char *mode) } sigprocmask (SIG_UNBLOCK, &allsigs, NULL); -#ifdef IP_TOS if (ctrl_addr.su_family == AF_INET) { on = IPTOS_THROUGHPUT; if (setsockopt(s, IPPROTO_IP, IP_TOS, &on, sizeof(int)) < 0) syslog(LOG_WARNING, "setsockopt (IP_TOS): %m"); } -#endif -#ifdef TCP_NOPUSH /* * Turn off push flag to keep sender TCP from sending short packets * at the boundaries of each write(). Should probably do a SO_SNDBUF @@ -1350,12 +1328,9 @@ getdatasock(char *mode) on = 1; if (setsockopt(s, IPPROTO_TCP, TCP_NOPUSH, &on, sizeof(on)) < 0) syslog(LOG_WARNING, "setsockopt (TCP_NOPUSH): %m"); -#endif -#ifdef SO_SNDBUF on = 65536; if (setsockopt(s, SOL_SOCKET, SO_SNDBUF, &on, sizeof(on)) < 0) syslog(LOG_WARNING, "setsockopt (SO_SNDBUF): %m"); -#endif return (fdopen(s, mode)); bad: @@ -2845,10 +2820,8 @@ set_slave_signals(void) sa.sa_handler = toolong; (void) sigaction(SIGALRM, &sa, NULL); -#ifdef F_SETOWN if (fcntl(fileno(stdin), F_SETOWN, getpid()) == -1) syslog(LOG_ERR, "fcntl F_SETOWN: %m"); -#endif } /*