NetBSD/libexec/ftpd/ftpcmd.y

1816 lines
35 KiB
Plaintext
Raw Normal View History

/* $NetBSD: ftpcmd.y,v 1.34 1999/07/11 20:03:41 itojun Exp $ */
1993-03-21 12:45:37 +03:00
/*
1994-06-29 05:49:37 +04:00
* Copyright (c) 1985, 1988, 1993, 1994
* The Regents of the University of California. All rights reserved.
1993-03-21 12:45:37 +03:00
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. All advertising materials mentioning features or use of this software
* must display the following acknowledgement:
* This product includes software developed by the University of
* California, Berkeley and its contributors.
* 4. Neither the name of the University nor the names of its contributors
* may be used to endorse or promote products derived from this software
* without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*
1994-06-29 05:49:37 +04:00
* @(#)ftpcmd.y 8.3 (Berkeley) 4/6/94
1993-03-21 12:45:37 +03:00
*/
/*
* Grammar for FTP commands.
* See RFC 959.
*/
%{
#include <sys/cdefs.h>
1993-03-21 12:45:37 +03:00
#ifndef lint
#if 0
1994-06-29 05:49:37 +04:00
static char sccsid[] = "@(#)ftpcmd.y 8.3 (Berkeley) 4/6/94";
#else
__RCSID("$NetBSD: ftpcmd.y,v 1.34 1999/07/11 20:03:41 itojun Exp $");
#endif
1993-03-21 12:45:37 +03:00
#endif /* not lint */
#include <sys/param.h>
#include <sys/socket.h>
#include <sys/stat.h>
1994-06-29 05:49:37 +04:00
1993-03-21 12:45:37 +03:00
#include <netinet/in.h>
#include <arpa/ftp.h>
#include <arpa/inet.h>
1994-06-29 05:49:37 +04:00
#include <ctype.h>
#include <errno.h>
#include <glob.h>
1993-03-21 12:45:37 +03:00
#include <pwd.h>
1994-06-29 05:49:37 +04:00
#include <setjmp.h>
#include <signal.h>
1993-03-21 12:45:37 +03:00
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
1994-06-29 05:49:37 +04:00
#include <syslog.h>
#include <time.h>
#include <tzfile.h>
1994-06-29 05:49:37 +04:00
#include <unistd.h>
#include <netdb.h>
1994-06-29 05:49:37 +04:00
#ifdef KERBEROS5
#include <krb5.h>
#endif
1994-06-29 05:49:37 +04:00
#include "extern.h"
1993-03-21 12:45:37 +03:00
off_t restart_point;
static int cmd_type;
static int cmd_form;
static int cmd_bytesz;
char cbuf[512];
char *fromname;
int hasyyerrored;
1993-03-21 12:45:37 +03:00
extern jmp_buf errcatch;
1993-03-21 12:45:37 +03:00
%}
1994-06-29 05:49:37 +04:00
%union {
int i;
char *s;
}
1993-03-21 12:45:37 +03:00
%token
A B C E F I
L N P R S T
ALL
1993-03-21 12:45:37 +03:00
1994-06-29 05:49:37 +04:00
SP CRLF COMMA
1993-03-21 12:45:37 +03:00
USER PASS ACCT CWD CDUP SMNT
QUIT REIN PORT PASV TYPE STRU
MODE RETR STOR STOU APPE ALLO
REST RNFR RNTO ABOR DELE RMD
MKD PWD LIST NLST SITE SYST
STAT HELP NOOP
AUTH ADAT PROT PBSZ CCC MIC
CONF ENC
FEAT OPTS
SIZE MDTM
1993-03-21 12:45:37 +03:00
LPRT LPSV EPRT EPSV
MAIL MLFL MRCP MRSQ MSAM MSND
MSOM
1993-03-21 12:45:37 +03:00
UMASK IDLE CHMOD
LEXERR
1994-06-29 05:49:37 +04:00
%token <s> STRING
%token <s> ALL
1994-06-29 05:49:37 +04:00
%token <i> NUMBER
%type <i> check_login check_modify octal_number byte_size
%type <i> struct_code mode_code type_code form_code decimal_integer
1994-06-29 05:49:37 +04:00
%type <s> pathstring pathname password username
%type <s> mechanism_name base64data prot_code
1994-06-29 05:49:37 +04:00
1993-03-21 12:45:37 +03:00
%start cmd_list
%%
1994-06-29 05:49:37 +04:00
cmd_list
: /* empty */
1994-06-29 05:49:37 +04:00
| cmd_list cmd
{
fromname = NULL;
1993-03-21 12:45:37 +03:00
restart_point = (off_t) 0;
}
1994-06-29 05:49:37 +04:00
| cmd_list rcmd
1993-03-21 12:45:37 +03:00
;
1994-06-29 05:49:37 +04:00
cmd
/* RFC 959 */
1994-06-29 05:49:37 +04:00
: USER SP username CRLF
{
user($3);
free($3);
1993-03-21 12:45:37 +03:00
}
1994-06-29 05:49:37 +04:00
| PASS SP password CRLF
{
pass($3);
free($3);
1993-03-21 12:45:37 +03:00
}
| CWD check_login CRLF
{
if ($2)
cwd(pw->pw_dir);
}
| CWD check_login SP pathname CRLF
{
if ($2 && $4 != NULL)
cwd($4);
if ($4 != NULL)
free($4);
}
| CDUP check_login CRLF
{
if ($2)
cwd("..");
}
| QUIT CRLF
{
if (logged_in) {
lreply(221, "");
lreply(0,
"Data traffic for this session was %qd byte%s in %qd file%s.",
(qdfmt_t)total_data, PLURAL(total_data),
(qdfmt_t)total_files, PLURAL(total_files));
lreply(0,
"Total traffic for this session was %qd byte%s in %qd transfer%s.",
(qdfmt_t)total_bytes, PLURAL(total_bytes),
(qdfmt_t)total_xfers, PLURAL(total_xfers));
}
reply(221,
"Thank you for using the FTP service on %s.",
hostname);
if (logged_in) {
syslog(LOG_INFO,
"Data traffic: %qd byte%s in %qd file%s",
(qdfmt_t)total_data, PLURAL(total_data),
(qdfmt_t)total_files, PLURAL(total_files));
syslog(LOG_INFO,
"Total traffic: %qd byte%s in %qd transfer%s",
(qdfmt_t)total_bytes, PLURAL(total_bytes),
(qdfmt_t)total_xfers, PLURAL(total_xfers));
}
dologout(0);
}
| PORT check_login SP host_port CRLF
1994-06-29 05:49:37 +04:00
{
if ($2) {
/* be paranoid, if told so */
if (curclass.checkportcmd &&
((ntohs(data_dest.su_port) < IPPORT_RESERVED) ||
memcmp(&data_dest.su_sin.sin_addr,
&his_addr.su_sin.sin_addr,
sizeof(data_dest.su_sin.sin_addr)) != 0)) {
reply(500,
"Illegal PORT command rejected");
} else if (epsvall) {
reply(501, "PORT disallowed after EPSV ALL");
} else {
usedefault = 0;
if (pdata >= 0) {
(void) close(pdata);
pdata = -1;
}
reply(200, "PORT command successful.");
}
}
}
| LPRT check_login SP host_long_port4 CRLF
{
/* be paranoid, if told so */
if (curclass.checkportcmd &&
((ntohs(data_dest.su_port) < IPPORT_RESERVED) ||
memcmp(&data_dest.su_sin.sin_addr,
&his_addr.su_sin.sin_addr,
sizeof(data_dest.su_sin.sin_addr)) != 0)) {
reply(500, "Illegal LPRT command rejected");
return (NULL);
}
if (epsvall)
reply(501, "LPRT disallowed after EPSV ALL");
else {
usedefault = 0;
if (pdata >= 0) {
(void) close(pdata);
pdata = -1;
}
reply(200, "LPRT command successful.");
}
}
| LPRT check_login SP host_long_port6 CRLF
{
/* be paranoid, if told so */
if (curclass.checkportcmd &&
((ntohs(data_dest.su_port) < IPPORT_RESERVED) ||
memcmp(&data_dest.su_sin6.sin6_addr,
&his_addr.su_sin6.sin6_addr,
sizeof(data_dest.su_sin6.sin6_addr)) != 0)) {
reply(500, "Illegal LPRT command rejected");
return (NULL);
}
if (epsvall)
reply(501, "LPRT disallowed after EPSV ALL");
else {
usedefault = 0;
if (pdata >= 0) {
(void) close(pdata);
pdata = -1;
}
reply(200, "LPRT command successful.");
}
}
| EPRT check_login SP STRING CRLF
{
char *tmp = NULL;
char *result[3];
char *p, *q;
char delim;
struct addrinfo hints;
struct addrinfo *res;
int i;
if (epsvall) {
reply(501, "EPRT disallowed after EPSV ALL");
goto eprt_done;
}
usedefault = 0;
if (pdata >= 0) {
(void) close(pdata);
pdata = -1;
}
/*XXX checks for login */
tmp = strdup($4);
if (!tmp) {
fatal("not enough core.");
/*NOTREACHED*/
}
p = tmp;
delim = p[0];
p++;
memset(result, 0, sizeof(result));
for (i = 0; i < 3; i++) {
q = strchr(p, delim);
if (!q || *q != delim) {
parsefail:
reply(500, "Invalid argument, rejected.");
if (tmp)
free(tmp);
usedefault = 1;
goto eprt_done;
}
*q++ = '\0';
result[i] = p;
p = q;
}
/* some more sanity check */
p = result[0];
while (*p) {
if (!isdigit(*p))
goto parsefail;
p++;
}
p = result[2];
while (*p) {
if (!isdigit(*p))
goto parsefail;
p++;
}
memset(&hints, 0, sizeof(hints));
if (atoi(result[0]) == 1)
hints.ai_family = PF_INET;
if (atoi(result[0]) == 2)
hints.ai_family = PF_INET6;
else
hints.ai_family = PF_UNSPEC; /*XXX*/
hints.ai_socktype = SOCK_STREAM;
if (getaddrinfo(result[1], result[2], &hints, &res))
goto parsefail;
memcpy(&data_dest, res->ai_addr, res->ai_addrlen);
/* be paranoid, if told so */
if (curclass.checkportcmd) {
int fail;
fail = 0;
if (ntohs(data_dest.su_port) < IPPORT_RESERVED)
fail++;
if (data_dest.su_family != his_addr.su_family)
fail++;
if (data_dest.su_len != his_addr.su_len)
fail++;
switch (data_dest.su_family) {
case AF_INET:
fail += memcmp(&data_dest.su_sin.sin_addr,
&his_addr.su_sin.sin_addr,
sizeof(data_dest.su_sin.sin_addr));
break;
case AF_INET6:
fail += memcmp(&data_dest.su_sin6.sin6_addr,
&his_addr.su_sin6.sin6_addr,
sizeof(data_dest.su_sin6.sin6_addr));
break;
default:
fail++;
}
if (fail) {
reply(500,
"Illegal EPRT command rejected");
return (NULL);
}
1993-03-21 12:45:37 +03:00
}
free(tmp);
tmp = NULL;
if (pdata >= 0) {
(void) close(pdata);
pdata = -1;
}
reply(200, "EPRT command successful.");
eprt_done:;
1993-03-21 12:45:37 +03:00
}
| PASV check_login CRLF
1994-06-29 05:49:37 +04:00
{
if (curclass.passive) {
passive();
} else {
reply(500, "PASV mode not available.");
}
1993-03-21 12:45:37 +03:00
}
| LPSV CRLF
{
if (epsvall)
reply(501, "LPSV disallowed after EPSV ALL");
else
long_passive("LPSV", PF_UNSPEC);
}
| EPSV SP NUMBER CRLF
{
int pf;
switch ($3) {
case 1:
pf = PF_INET;
break;
case 2:
pf = PF_INET6;
break;
default:
pf = -1; /*junk*/
break;
}
long_passive("EPSV", pf);
}
| EPSV SP ALL CRLF
{
if (!logged_in) {
syslog(LOG_NOTICE, "long passive but not logged in");
reply(503, "Login with USER first.");
} else {
reply(200, "EPSV ALL command successful.");
epsvall++;
}
}
| EPSV CRLF
{
long_passive("EPSV", PF_UNSPEC);
}
1994-06-29 05:49:37 +04:00
| TYPE SP type_code CRLF
{
1993-03-21 12:45:37 +03:00
switch (cmd_type) {
case TYPE_A:
if (cmd_form == FORM_N) {
reply(200, "Type set to A.");
type = cmd_type;
form = cmd_form;
} else
reply(504, "Form must be N.");
break;
case TYPE_E:
reply(504, "Type E not implemented.");
break;
case TYPE_I:
reply(200, "Type set to I.");
type = cmd_type;
break;
case TYPE_L:
#if NBBY == 8
if (cmd_bytesz == 8) {
reply(200,
"Type set to L (byte size 8).");
type = cmd_type;
} else
reply(504, "Byte size must be 8.");
#else /* NBBY == 8 */
UNIMPLEMENTED for NBBY != 8
#endif /* NBBY == 8 */
}
}
1994-06-29 05:49:37 +04:00
| STRU SP struct_code CRLF
{
1993-03-21 12:45:37 +03:00
switch ($3) {
case STRU_F:
reply(200, "STRU F ok.");
break;
default:
reply(504, "Unimplemented STRU type.");
}
}
1994-06-29 05:49:37 +04:00
| MODE SP mode_code CRLF
{
1993-03-21 12:45:37 +03:00
switch ($3) {
case MODE_S:
reply(200, "MODE S ok.");
break;
default:
reply(502, "Unimplemented MODE type.");
}
}
1994-06-29 05:49:37 +04:00
| RETR check_login SP pathname CRLF
{
1993-03-21 12:45:37 +03:00
if ($2 && $4 != NULL)
retrieve(NULL, $4);
1993-03-21 12:45:37 +03:00
if ($4 != NULL)
1994-06-29 05:49:37 +04:00
free($4);
1993-03-21 12:45:37 +03:00
}
1994-06-29 05:49:37 +04:00
| STOR check_login SP pathname CRLF
{
1993-03-21 12:45:37 +03:00
if ($2 && $4 != NULL)
1994-06-29 05:49:37 +04:00
store($4, "w", 0);
1993-03-21 12:45:37 +03:00
if ($4 != NULL)
1994-06-29 05:49:37 +04:00
free($4);
1993-03-21 12:45:37 +03:00
}
| STOU check_login SP pathname CRLF
1994-06-29 05:49:37 +04:00
{
1993-03-21 12:45:37 +03:00
if ($2 && $4 != NULL)
store($4, "w", 1);
1993-03-21 12:45:37 +03:00
if ($4 != NULL)
1994-06-29 05:49:37 +04:00
free($4);
1993-03-21 12:45:37 +03:00
}
| APPE check_login SP pathname CRLF
1994-06-29 05:49:37 +04:00
{
1993-03-21 12:45:37 +03:00
if ($2 && $4 != NULL)
store($4, "a", 0);
1993-03-21 12:45:37 +03:00
if ($4 != NULL)
1994-06-29 05:49:37 +04:00
free($4);
1993-03-21 12:45:37 +03:00
}
| ALLO SP NUMBER CRLF
1994-06-29 05:49:37 +04:00
{
reply(202, "ALLO command ignored.");
1993-03-21 12:45:37 +03:00
}
| ALLO SP NUMBER SP R SP NUMBER CRLF
1994-06-29 05:49:37 +04:00
{
reply(202, "ALLO command ignored.");
1993-03-21 12:45:37 +03:00
}
1994-06-29 05:49:37 +04:00
| RNTO SP pathname CRLF
{
1993-03-21 12:45:37 +03:00
if (fromname) {
1994-06-29 05:49:37 +04:00
renamecmd(fromname, $3);
1993-03-21 12:45:37 +03:00
free(fromname);
fromname = NULL;
1993-03-21 12:45:37 +03:00
} else {
reply(503, "Bad sequence of commands.");
}
1994-06-29 05:49:37 +04:00
free($3);
1993-03-21 12:45:37 +03:00
}
1994-06-29 05:49:37 +04:00
| ABOR CRLF
{
1993-03-21 12:45:37 +03:00
reply(225, "ABOR command successful.");
}
| DELE check_modify SP pathname CRLF
1994-06-29 05:49:37 +04:00
{
1993-03-21 12:45:37 +03:00
if ($2 && $4 != NULL)
delete($4);
1993-03-21 12:45:37 +03:00
if ($4 != NULL)
1994-06-29 05:49:37 +04:00
free($4);
1993-03-21 12:45:37 +03:00
}
| RMD check_modify SP pathname CRLF
1994-06-29 05:49:37 +04:00
{
if ($2 && $4 != NULL)
removedir($4);
if ($4 != NULL)
free($4);
1993-03-21 12:45:37 +03:00
}
| MKD check_modify SP pathname CRLF
1994-06-29 05:49:37 +04:00
{
1993-03-21 12:45:37 +03:00
if ($2 && $4 != NULL)
1994-06-29 05:49:37 +04:00
makedir($4);
1993-03-21 12:45:37 +03:00
if ($4 != NULL)
1994-06-29 05:49:37 +04:00
free($4);
1993-03-21 12:45:37 +03:00
}
| PWD check_login CRLF
{
if ($2)
pwd();
}
| LIST check_login CRLF
{
if ($2)
retrieve("/bin/ls -lgA", "");
}
| LIST check_login SP pathname CRLF
1994-06-29 05:49:37 +04:00
{
1993-03-21 12:45:37 +03:00
if ($2 && $4 != NULL)
retrieve("/bin/ls -lgA %s", $4);
1993-03-21 12:45:37 +03:00
if ($4 != NULL)
1994-06-29 05:49:37 +04:00
free($4);
1993-03-21 12:45:37 +03:00
}
| NLST check_login CRLF
1994-06-29 05:49:37 +04:00
{
1993-03-21 12:45:37 +03:00
if ($2)
send_file_list(".");
1993-03-21 12:45:37 +03:00
}
| NLST check_login SP STRING CRLF
1994-06-29 05:49:37 +04:00
{
if ($2 && $4 != NULL)
send_file_list($4);
if ($4 != NULL)
free($4);
1993-03-21 12:45:37 +03:00
}
1994-06-29 05:49:37 +04:00
| SITE SP HELP CRLF
{
help(sitetab, NULL);
1993-03-21 12:45:37 +03:00
}
1994-06-29 05:49:37 +04:00
| SITE SP HELP SP STRING CRLF
{
help(sitetab, $5);
1993-03-21 12:45:37 +03:00
}
1994-06-29 05:49:37 +04:00
| SITE SP UMASK check_login CRLF
{
1993-03-21 12:45:37 +03:00
int oldmask;
if ($4) {
oldmask = umask(0);
(void) umask(oldmask);
reply(200, "Current UMASK is %03o", oldmask);
}
}
| SITE SP UMASK check_modify SP octal_number CRLF
1994-06-29 05:49:37 +04:00
{
1993-03-21 12:45:37 +03:00
int oldmask;
if ($4) {
if (($6 == -1) || ($6 > 0777)) {
reply(501, "Bad UMASK value");
} else {
oldmask = umask($6);
reply(200,
"UMASK set to %03o (was %03o)",
$6, oldmask);
}
}
}
| SITE SP CHMOD check_modify SP octal_number SP pathname CRLF
1994-06-29 05:49:37 +04:00
{
1993-03-21 12:45:37 +03:00
if ($4 && ($8 != NULL)) {
if ($6 > 0777)
reply(501,
"CHMOD: Mode value must be between 0 and 0777");
1994-06-29 05:49:37 +04:00
else if (chmod($8, $6) < 0)
perror_reply(550, $8);
1993-03-21 12:45:37 +03:00
else
reply(200, "CHMOD command successful.");
}
if ($8 != NULL)
1994-06-29 05:49:37 +04:00
free($8);
1993-03-21 12:45:37 +03:00
}
1994-06-29 05:49:37 +04:00
| SITE SP IDLE CRLF
{
1993-03-21 12:45:37 +03:00
reply(200,
"Current IDLE time limit is %d seconds; max %d",
curclass.timeout, curclass.maxtimeout);
1993-03-21 12:45:37 +03:00
}
1994-06-29 05:49:37 +04:00
| SITE SP IDLE SP NUMBER CRLF
{
if ($5 < 30 || $5 > curclass.maxtimeout) {
1993-03-21 12:45:37 +03:00
reply(501,
"IDLE time limit must be between 30 and %d seconds",
curclass.maxtimeout);
1993-03-21 12:45:37 +03:00
} else {
curclass.timeout = $5;
(void) alarm(curclass.timeout);
1993-03-21 12:45:37 +03:00
reply(200,
"IDLE time limit set to %d seconds",
curclass.timeout);
1993-03-21 12:45:37 +03:00
}
}
| SYST CRLF
{
reply(215, "UNIX Type: L%d %s", NBBY, version);
}
| STAT check_login SP pathname CRLF
1994-06-29 05:49:37 +04:00
{
1993-03-21 12:45:37 +03:00
if ($2 && $4 != NULL)
statfilecmd($4);
1993-03-21 12:45:37 +03:00
if ($4 != NULL)
1994-06-29 05:49:37 +04:00
free($4);
1993-03-21 12:45:37 +03:00
}
| STAT CRLF
1994-06-29 05:49:37 +04:00
{
statcmd();
}
| HELP CRLF
{
help(cmdtab, NULL);
1993-03-21 12:45:37 +03:00
}
| HELP SP STRING CRLF
{
char *cp = $3;
if (strncasecmp(cp, "SITE", 4) == 0) {
cp = $3 + 4;
if (*cp == ' ')
cp++;
if (*cp)
help(sitetab, cp);
else
help(sitetab, NULL);
} else
help(cmdtab, $3);
}
| NOOP CRLF
{
reply(200, "NOOP command successful.");
}
/* RFC 2228 */
| AUTH SP mechanism_name CRLF
{
reply(502, "RFC 2228 authentication not implemented.");
}
| ADAT SP base64data CRLF
{
reply(503,
"Please set authentication state with AUTH.");
}
| PROT SP prot_code CRLF
{
reply(503,
"Please set protection buffer size with PBSZ.");
}
| PBSZ SP decimal_integer CRLF
{
reply(503,
"Please set authentication state with AUTH.");
}
| CCC CRLF
{
reply(533, "No protection enabled.");
}
| MIC SP base64data CRLF
{
reply(502, "RFC 2228 authentication not implemented.");
}
| CONF SP base64data CRLF
{
reply(502, "RFC 2228 authentication not implemented.");
}
| ENC SP base64data CRLF
{
reply(502, "RFC 2228 authentication not implemented.");
}
/* RFC 2389 */
| FEAT CRLF
{
lreply(211, "Features supported");
lreply(-1, " MDTM");
lreply(-1, " REST STREAM");
lreply(-1, " SIZE");
reply(211, "End");
}
| OPTS SP STRING CRLF
{
opts($3);
}
/* BSD extensions */
1993-03-21 12:45:37 +03:00
/*
* SIZE is not in RFC 959, but Postel has blessed it and
1993-03-21 12:45:37 +03:00
* it will be in the updated RFC.
*
* Return size of file in a format suitable for
* using with RESTART (we just count bytes).
*/
1994-06-29 05:49:37 +04:00
| SIZE check_login SP pathname CRLF
{
1993-03-21 12:45:37 +03:00
if ($2 && $4 != NULL)
1994-06-29 05:49:37 +04:00
sizecmd($4);
1993-03-21 12:45:37 +03:00
if ($4 != NULL)
1994-06-29 05:49:37 +04:00
free($4);
1993-03-21 12:45:37 +03:00
}
/*
* MDTM is not in RFC 959, but Postel has blessed it and
1993-03-21 12:45:37 +03:00
* it will be in the updated RFC.
*
* Return modification time of file as an ISO 3307
* style time. E.g. YYYYMMDDHHMMSS or YYYYMMDDHHMMSS.xxx
* where xxx is the fractional second (of any precision,
* not necessarily 3 digits)
*/
1994-06-29 05:49:37 +04:00
| MDTM check_login SP pathname CRLF
{
1993-03-21 12:45:37 +03:00
if ($2 && $4 != NULL) {
struct stat stbuf;
1994-06-29 05:49:37 +04:00
if (stat($4, &stbuf) < 0)
perror_reply(550, $4);
1994-06-29 05:49:37 +04:00
else if (!S_ISREG(stbuf.st_mode)) {
reply(550, "%s: not a plain file.", $4);
1993-03-21 12:45:37 +03:00
} else {
1994-06-29 05:49:37 +04:00
struct tm *t;
1993-03-21 12:45:37 +03:00
t = gmtime(&stbuf.st_mtime);
reply(213,
"%04d%02d%02d%02d%02d%02d",
TM_YEAR_BASE + t->tm_year,
t->tm_mon+1, t->tm_mday,
1993-03-21 12:45:37 +03:00
t->tm_hour, t->tm_min, t->tm_sec);
}
}
if ($4 != NULL)
1994-06-29 05:49:37 +04:00
free($4);
1993-03-21 12:45:37 +03:00
}
1994-06-29 05:49:37 +04:00
| error CRLF
{
1993-03-21 12:45:37 +03:00
yyerrok;
}
;
1994-06-29 05:49:37 +04:00
rcmd
: REST SP byte_size CRLF
{
fromname = NULL;
restart_point = $3; /* XXX $3 is only "int" */
reply(350, "Restarting at %qd. %s",
(qdfmt_t)restart_point,
"Send STORE or RETRIEVE to initiate transfer.");
}
| RNFR check_modify SP pathname CRLF
1994-06-29 05:49:37 +04:00
{
1993-03-21 12:45:37 +03:00
restart_point = (off_t) 0;
if ($2 && $4) {
1994-06-29 05:49:37 +04:00
fromname = renamefrom($4);
if (fromname == NULL && $4) {
1994-06-29 05:49:37 +04:00
free($4);
1993-03-21 12:45:37 +03:00
}
}
}
;
1994-06-29 05:49:37 +04:00
username
: STRING
1993-03-21 12:45:37 +03:00
;
1994-06-29 05:49:37 +04:00
password
: /* empty */
{
$$ = (char *)calloc(1, sizeof(char));
1993-03-21 12:45:37 +03:00
}
1994-06-29 05:49:37 +04:00
| STRING
1993-03-21 12:45:37 +03:00
;
1994-06-29 05:49:37 +04:00
byte_size
: NUMBER
1993-03-21 12:45:37 +03:00
;
1994-06-29 05:49:37 +04:00
host_port
: NUMBER COMMA NUMBER COMMA NUMBER COMMA NUMBER COMMA
1993-03-21 12:45:37 +03:00
NUMBER COMMA NUMBER
1994-06-29 05:49:37 +04:00
{
char *a, *p;
1993-03-21 12:45:37 +03:00
data_dest.su_len = sizeof(struct sockaddr_in);
data_dest.su_family = AF_INET;
p = (char *)&data_dest.su_sin.sin_port;
1993-03-21 12:45:37 +03:00
p[0] = $9; p[1] = $11;
a = (char *)&data_dest.su_sin.sin_addr;
1995-06-04 02:37:19 +04:00
a[0] = $1; a[1] = $3; a[2] = $5; a[3] = $7;
1993-03-21 12:45:37 +03:00
}
;
host_long_port4
: NUMBER COMMA NUMBER COMMA NUMBER COMMA NUMBER COMMA
NUMBER COMMA NUMBER COMMA NUMBER COMMA NUMBER COMMA
NUMBER
{
char *a, *p;
data_dest.su_sin.sin_len =
sizeof(struct sockaddr_in);
data_dest.su_family = AF_INET;
p = (char *)&data_dest.su_port;
p[0] = $15; p[1] = $17;
a = (char *)&data_dest.su_sin.sin_addr;
a[0] = $5; a[1] = $7; a[2] = $9; a[3] = $11;
}
;
host_long_port6
: NUMBER COMMA NUMBER COMMA NUMBER COMMA NUMBER COMMA
NUMBER COMMA NUMBER COMMA NUMBER COMMA NUMBER COMMA
NUMBER COMMA NUMBER COMMA NUMBER COMMA NUMBER COMMA
NUMBER COMMA NUMBER COMMA NUMBER COMMA NUMBER COMMA
NUMBER COMMA NUMBER COMMA NUMBER COMMA NUMBER COMMA
NUMBER
{
char *a, *p;
data_dest.su_sin6.sin6_len =
sizeof(struct sockaddr_in6);
data_dest.su_family = AF_INET6;
p = (char *)&data_dest.su_port;
p[0] = $39; p[1] = $41;
a = (char *)&data_dest.su_sin6.sin6_addr;
a[0] = $5; a[1] = $7; a[2] = $9; a[3] = $11;
a[4] = $13; a[5] = $15; a[6] = $17; a[7] = $19;
a[8] = $21; a[9] = $23; a[10] = $25; a[11] = $27;
a[12] = $29; a[13] = $31; a[14] = $33; a[15] = $35;
}
;
1994-06-29 05:49:37 +04:00
form_code
: N
{
$$ = FORM_N;
}
1994-06-29 05:49:37 +04:00
| T
{
$$ = FORM_T;
}
1994-06-29 05:49:37 +04:00
| C
{
$$ = FORM_C;
}
1993-03-21 12:45:37 +03:00
;
1994-06-29 05:49:37 +04:00
type_code
: A
{
cmd_type = TYPE_A;
cmd_form = FORM_N;
}
1994-06-29 05:49:37 +04:00
| A SP form_code
{
cmd_type = TYPE_A;
cmd_form = $3;
}
1994-06-29 05:49:37 +04:00
| E
{
cmd_type = TYPE_E;
cmd_form = FORM_N;
}
1994-06-29 05:49:37 +04:00
| E SP form_code
{
cmd_type = TYPE_E;
cmd_form = $3;
}
1994-06-29 05:49:37 +04:00
| I
{
cmd_type = TYPE_I;
}
1994-06-29 05:49:37 +04:00
| L
{
cmd_type = TYPE_L;
cmd_bytesz = NBBY;
}
1994-06-29 05:49:37 +04:00
| L SP byte_size
{
cmd_type = TYPE_L;
cmd_bytesz = $3;
}
1994-06-29 05:49:37 +04:00
/* this is for a bug in the BBN ftp */
| L byte_size
{
cmd_type = TYPE_L;
cmd_bytesz = $2;
}
1993-03-21 12:45:37 +03:00
;
1994-06-29 05:49:37 +04:00
struct_code
: F
{
$$ = STRU_F;
}
1994-06-29 05:49:37 +04:00
| R
{
$$ = STRU_R;
}
1994-06-29 05:49:37 +04:00
| P
{
$$ = STRU_P;
}
1993-03-21 12:45:37 +03:00
;
1994-06-29 05:49:37 +04:00
mode_code
: S
{
$$ = MODE_S;
}
1994-06-29 05:49:37 +04:00
| B
{
$$ = MODE_B;
}
1994-06-29 05:49:37 +04:00
| C
{
$$ = MODE_C;
}
1993-03-21 12:45:37 +03:00
;
1994-06-29 05:49:37 +04:00
pathname
: pathstring
{
/*
* Problem: this production is used for all pathname
* processing, but only gives a 550 error reply.
* This is a valid reply in some cases but not in
* others.
1994-06-29 05:49:37 +04:00
*/
if (logged_in && $1 && *$1 == '~') {
glob_t gl;
int flags =
GLOB_BRACE|GLOB_NOCHECK|GLOB_TILDE;
1994-06-29 05:49:37 +04:00
if ($1[1] == '\0')
$$ = xstrdup(pw->pw_dir);
else {
memset(&gl, 0, sizeof(gl));
if (glob($1, flags, NULL, &gl) ||
gl.gl_pathc == 0) {
reply(550, "not found");
$$ = NULL;
} else
$$ = xstrdup(gl.gl_pathv[0]);
globfree(&gl);
1994-06-29 05:49:37 +04:00
}
free($1);
} else
$$ = $1;
}
1993-03-21 12:45:37 +03:00
;
1994-06-29 05:49:37 +04:00
pathstring
: STRING
1993-03-21 12:45:37 +03:00
;
1994-06-29 05:49:37 +04:00
octal_number
: NUMBER
{
int ret, dec, multby, digit;
1993-03-21 12:45:37 +03:00
1994-06-29 05:49:37 +04:00
/*
* Convert a number that was read as decimal number
* to what it would be if it had been read as octal.
*/
dec = $1;
multby = 1;
ret = 0;
while (dec) {
digit = dec%10;
if (digit > 7) {
ret = -1;
break;
}
ret += digit * multby;
multby *= 8;
dec /= 10;
1993-03-21 12:45:37 +03:00
}
1994-06-29 05:49:37 +04:00
$$ = ret;
1993-03-21 12:45:37 +03:00
}
;
mechanism_name
: STRING
;
base64data
: STRING
;
prot_code
: STRING
;
decimal_integer
: NUMBER
;
1994-06-29 05:49:37 +04:00
check_login
: /* empty */
{
if (logged_in)
$$ = 1;
else {
reply(530, "Please login with USER and PASS.");
$$ = 0;
hasyyerrored = 1;
1994-06-29 05:49:37 +04:00
}
1993-03-21 12:45:37 +03:00
}
;
check_modify
: /* empty */
{
if (logged_in) {
if (curclass.modify)
$$ = 1;
else {
reply(502,
"No permission to use this command.");
$$ = 0;
hasyyerrored = 1;
}
} else {
reply(530, "Please login with USER and PASS.");
$$ = 0;
hasyyerrored = 1;
}
}
1993-03-21 12:45:37 +03:00
%%
#define CMD 0 /* beginning of command */
#define ARGS 1 /* expect miscellaneous arguments */
#define STR1 2 /* expect SP followed by STRING */
#define STR2 3 /* expect STRING */
#define OSTR 4 /* optional SP then STRING */
#define ZSTR1 5 /* SP then optional STRING */
#define ZSTR2 6 /* optional STRING after SP */
#define SITECMD 7 /* SITE command */
#define NSTR 8 /* Number followed by a string */
#define NOARGS 9 /* No arguments allowed */
1993-03-21 12:45:37 +03:00
struct tab {
char *name;
short token;
short state;
short implemented; /* 1 if command is implemented */
short hasopts; /* 1 if command takes options */
1993-03-21 12:45:37 +03:00
char *help;
char *options;
1993-03-21 12:45:37 +03:00
};
struct tab cmdtab[] = {
/* From RFC 959, in order defined (5.3.1) */
{ "USER", USER, STR1, 1, 0, "<sp> username" },
{ "PASS", PASS, ZSTR1, 1, 0, "<sp> password" },
{ "ACCT", ACCT, STR1, 0, 0, "(specify account)" },
{ "CWD", CWD, OSTR, 1, 0, "[ <sp> directory-name ]" },
{ "CDUP", CDUP, NOARGS, 1, 0, "(change to parent directory)" },
{ "SMNT", SMNT, ARGS, 0, 0, "(structure mount)" },
{ "QUIT", QUIT, NOARGS, 1, 0, "(terminate service)", },
{ "REIN", REIN, NOARGS, 0, 0, "(reinitialize server state)" },
{ "PORT", PORT, ARGS, 1, 0, "<sp> b0, b1, b2, b3, b4" },
{ "LPRT", LPRT, ARGS, 1, 0, "<sp> af, hal, h1, h2, h3,..., pal, p1, p2..." },
{ "EPRT", EPRT, STR1, 1, 0, "<sp> |af|addr|port|" },
{ "PASV", PASV, NOARGS, 1, 0, "(set server in passive mode)" },
{ "LPSV", LPSV, ARGS, 1, 0, "(set server in passive mode)" },
{ "EPSV", EPSV, ARGS, 1, 0, "[<sp> af|ALL]" },
{ "TYPE", TYPE, ARGS, 1, 0, "<sp> [ A | E | I | L ]" },
{ "STRU", STRU, ARGS, 1, 0, "(specify file structure)" },
{ "MODE", MODE, ARGS, 1, 0, "(specify transfer mode)" },
{ "RETR", RETR, STR1, 1, 0, "<sp> file-name" },
{ "STOR", STOR, STR1, 1, 0, "<sp> file-name" },
{ "STOU", STOU, STR1, 1, 0, "<sp> file-name" },
{ "APPE", APPE, STR1, 1, 0, "<sp> file-name" },
{ "ALLO", ALLO, ARGS, 1, 0, "allocate storage (vacuously)" },
{ "REST", REST, ARGS, 1, 0, "<sp> offset (restart command)" },
{ "RNFR", RNFR, STR1, 1, 0, "<sp> file-name" },
{ "RNTO", RNTO, STR1, 1, 0, "<sp> file-name" },
{ "ABOR", ABOR, NOARGS, 1, 0, "(abort operation)" },
{ "DELE", DELE, STR1, 1, 0, "<sp> file-name" },
{ "RMD", RMD, STR1, 1, 0, "<sp> path-name" },
{ "MKD", MKD, STR1, 1, 0, "<sp> path-name" },
{ "PWD", PWD, NOARGS, 1, 0, "(return current directory)" },
{ "LIST", LIST, OSTR, 1, 0, "[ <sp> path-name ]" },
{ "NLST", NLST, OSTR, 1, 0, "[ <sp> path-name ]" },
{ "SITE", SITE, SITECMD, 1, 0, "site-cmd [ <sp> arguments ]" },
{ "SYST", SYST, NOARGS, 1, 0, "(get type of operating system)" },
{ "STAT", STAT, OSTR, 1, 0, "[ <sp> path-name ]" },
{ "HELP", HELP, OSTR, 1, 0, "[ <sp> <string> ]" },
{ "NOOP", NOOP, NOARGS, 1, 1, "" },
/* From RFC 2228, in order defined */
{ "AUTH", AUTH, STR1, 1, 0, "<sp> mechanism-name" },
{ "ADAT", ADAT, STR1, 1, 0, "<sp> base-64-data" },
{ "PROT", PROT, STR1, 1, 0, "<sp> prot-code" },
{ "PBSZ", PBSZ, ARGS, 1, 0, "<sp> decimal-integer" },
{ "CCC", CCC, NOARGS, 1, 0, "(Disable data protection)" },
{ "MIC", MIC, STR1, 1, 0, "<sp> base64data" },
{ "CONF", CONF, STR1, 1, 0, "<sp> base64data" },
{ "ENC", ENC, STR1, 1, 0, "<sp> base64data" },
/* From RFC 2389, in order defined */
{ "FEAT", FEAT, NOARGS, 1, 0, "(display extended features)" },
{ "OPTS", OPTS, STR1, 1, 0, "<sp> command [ <sp> options ]" },
/* Non standardized extensions */
{ "SIZE", SIZE, OSTR, 1, 0, "<sp> path-name" },
{ "MDTM", MDTM, OSTR, 1, 0, "<sp> path-name" },
/* obsolete commands */
{ "MAIL", MAIL, OSTR, 0, 0, "(mail to user)" },
{ "MLFL", MLFL, OSTR, 0, 0, "(mail file)" },
{ "MRCP", MRCP, STR1, 0, 0, "(mail recipient)" },
{ "MRSQ", MRSQ, OSTR, 0, 0, "(mail recipient scheme question)" },
{ "MSAM", MSAM, OSTR, 0, 0, "(mail send to terminal and mailbox)" },
{ "MSND", MSND, OSTR, 0, 0, "(mail send to terminal)" },
{ "MSOM", MSOM, OSTR, 0, 0, "(mail send to terminal or mailbox)" },
{ "XCUP", CDUP, NOARGS, 1, 0, "(change to parent directory)" },
{ "XCWD", CWD, OSTR, 1, 0, "[ <sp> directory-name ]" },
{ "XMKD", MKD, STR1, 1, 0, "<sp> path-name" },
{ "XPWD", PWD, NOARGS, 1, 0, "(return current directory)" },
{ "XRMD", RMD, STR1, 1, 0, "<sp> path-name" },
{ NULL, 0, 0, 0, 0, 0 }
1993-03-21 12:45:37 +03:00
};
struct tab sitetab[] = {
{ "UMASK", UMASK, ARGS, 1, 0, "[ <sp> umask ]" },
{ "IDLE", IDLE, ARGS, 1, 0, "[ <sp> maximum-idle-time ]" },
{ "CHMOD", CHMOD, NSTR, 1, 0, "<sp> mode <sp> file-name" },
{ "HELP", HELP, OSTR, 1, 0, "[ <sp> <string> ]" },
{ NULL, 0, 0, 0, 0, 0 }
1993-03-21 12:45:37 +03:00
};
static void help __P((struct tab *, char *));
static struct tab *lookup __P((struct tab *, const char *));
static void opts __P((const char *));
static void sizecmd __P((char *));
static void toolong __P((int));
static int yylex __P((void));
1994-06-29 05:49:37 +04:00
extern int epsvall;
1994-06-29 05:49:37 +04:00
static struct tab *
1993-03-21 12:45:37 +03:00
lookup(p, cmd)
1994-06-29 05:49:37 +04:00
struct tab *p;
const char *cmd;
1993-03-21 12:45:37 +03:00
{
for (; p->name != NULL; p++)
if (strcasecmp(cmd, p->name) == 0)
1993-03-21 12:45:37 +03:00
return (p);
return (0);
}
#include <arpa/telnet.h>
/*
* getline - a hacked up version of fgets to ignore TELNET escape codes.
*/
char *
getline(s, n, iop)
char *s;
1994-06-29 05:49:37 +04:00
int n;
FILE *iop;
1993-03-21 12:45:37 +03:00
{
off_t b;
1994-06-29 05:49:37 +04:00
int c;
char *cs;
1993-03-21 12:45:37 +03:00
cs = s;
/* tmpline may contain saved command from urgent mode interruption */
for (c = 0; tmpline[c] != '\0' && --n > 0; ++c) {
*cs++ = tmpline[c];
if (tmpline[c] == '\n') {
*cs++ = '\0';
if (debug)
syslog(LOG_DEBUG, "command: %s", s);
tmpline[0] = '\0';
return(s);
}
if (c == 0)
tmpline[0] = '\0';
}
while ((c = getc(iop)) != EOF) {
total_bytes++;
total_bytes_in++;
1993-03-21 12:45:37 +03:00
c &= 0377;
if (c == IAC) {
if ((c = getc(iop)) != EOF) {
total_bytes++;
total_bytes_in++;
1993-03-21 12:45:37 +03:00
c &= 0377;
switch (c) {
case WILL:
case WONT:
c = getc(iop);
total_bytes++;
total_bytes_in++;
b = printf("%c%c%c", IAC, DONT, 0377&c);
total_bytes += b;
total_bytes_out += b;
1993-03-21 12:45:37 +03:00
(void) fflush(stdout);
continue;
case DO:
case DONT:
c = getc(iop);
total_bytes++;
total_bytes_in++;
b = printf("%c%c%c", IAC, WONT, 0377&c);
total_bytes += b;
total_bytes_out += b;
1993-03-21 12:45:37 +03:00
(void) fflush(stdout);
continue;
case IAC:
break;
default:
continue; /* ignore command */
}
}
}
*cs++ = c;
if (--n <= 0 || c == '\n')
break;
}
if (c == EOF && cs == s)
return (NULL);
*cs++ = '\0';
1994-06-29 05:49:37 +04:00
if (debug) {
if (!guest && strncasecmp("pass ", s, 5) == 0) {
/* Don't syslog passwords */
syslog(LOG_DEBUG, "command: %.5s ???", s);
} else {
char *cp;
int len;
1994-06-29 05:49:37 +04:00
/* Don't syslog trailing CR-LF */
len = strlen(s);
cp = s + len - 1;
while (cp >= s && (*cp == '\n' || *cp == '\r')) {
--cp;
--len;
}
syslog(LOG_DEBUG, "command: %.*s", len, s);
}
}
1993-03-21 12:45:37 +03:00
return (s);
}
static void
1994-06-29 05:49:37 +04:00
toolong(signo)
int signo;
1993-03-21 12:45:37 +03:00
{
reply(421,
"Timeout (%d seconds): closing control connection.",
curclass.timeout);
1994-06-29 05:49:37 +04:00
if (logging)
syslog(LOG_INFO, "User %s timed out after %d seconds",
(pw ? pw -> pw_name : "unknown"), curclass.timeout);
1993-03-21 12:45:37 +03:00
dologout(1);
}
1994-06-29 05:49:37 +04:00
static int
1993-03-21 12:45:37 +03:00
yylex()
{
static int cpos, state;
1994-06-29 05:49:37 +04:00
char *cp, *cp2;
struct tab *p;
int n;
1994-06-29 05:49:37 +04:00
char c;
1993-03-21 12:45:37 +03:00
switch (state) {
1993-03-21 12:45:37 +03:00
case CMD:
hasyyerrored = 0;
(void) signal(SIGALRM, toolong);
(void) alarm(curclass.timeout);
if (getline(cbuf, sizeof(cbuf)-1, stdin) == NULL) {
reply(221, "You could at least say goodbye.");
dologout(0);
}
(void) alarm(0);
1994-04-14 07:15:37 +04:00
#ifdef HASSETPROCTITLE
if (strncasecmp(cbuf, "PASS", 4) != 0)
setproctitle("%s: %s", proctitle, cbuf);
1994-04-14 07:15:37 +04:00
#endif /* HASSETPROCTITLE */
if ((cp = strchr(cbuf, '\r'))) {
*cp++ = '\n';
*cp = '\0';
}
if ((cp = strpbrk(cbuf, " \n")))
cpos = cp - cbuf;
if (cpos == 0)
cpos = 4;
c = cbuf[cpos];
cbuf[cpos] = '\0';
p = lookup(cmdtab, cbuf);
cbuf[cpos] = c;
if (p != NULL) {
if (p->implemented == 0) {
reply(502, "%s command not implemented.",
p->name);
hasyyerrored = 1;
break;
1993-03-21 12:45:37 +03:00
}
state = p->state;
yylval.s = p->name;
return (p->token);
}
break;
case SITECMD:
if (cbuf[cpos] == ' ') {
cpos++;
return (SP);
}
cp = &cbuf[cpos];
if ((cp2 = strpbrk(cp, " \n")))
cpos = cp2 - cbuf;
c = cbuf[cpos];
cbuf[cpos] = '\0';
p = lookup(sitetab, cp);
cbuf[cpos] = c;
if (p != NULL) {
if (p->implemented == 0) {
reply(502, "SITE %s command not implemented.",
p->name);
hasyyerrored = 1;
break;
1993-03-21 12:45:37 +03:00
}
state = p->state;
yylval.s = p->name;
return (p->token);
}
break;
1993-03-21 12:45:37 +03:00
case OSTR:
if (cbuf[cpos] == '\n') {
1993-03-21 12:45:37 +03:00
state = CMD;
return (CRLF);
}
/* FALLTHROUGH */
1993-03-21 12:45:37 +03:00
case STR1:
case ZSTR1:
dostr1:
if (cbuf[cpos] == ' ') {
cpos++;
state = state == OSTR ? STR2 : ++state;
return (SP);
}
break;
1993-03-21 12:45:37 +03:00
case ZSTR2:
if (cbuf[cpos] == '\n') {
state = CMD;
return (CRLF);
}
/* FALLTHROUGH */
1993-03-21 12:45:37 +03:00
case STR2:
cp = &cbuf[cpos];
n = strlen(cp);
cpos += n - 1;
/*
* Make sure the string is nonempty and \n terminated.
*/
if (n > 1 && cbuf[cpos] == '\n') {
cbuf[cpos] = '\0';
yylval.s = xstrdup(cp);
cbuf[cpos] = '\n';
state = ARGS;
return (STRING);
}
break;
1993-03-21 12:45:37 +03:00
case NSTR:
if (cbuf[cpos] == ' ') {
cpos++;
return (SP);
}
if (isdigit(cbuf[cpos])) {
cp = &cbuf[cpos];
while (isdigit(cbuf[++cpos]))
;
c = cbuf[cpos];
cbuf[cpos] = '\0';
yylval.i = atoi(cp);
cbuf[cpos] = c;
1993-03-21 12:45:37 +03:00
state = STR1;
return (NUMBER);
}
state = STR1;
goto dostr1;
1993-03-21 12:45:37 +03:00
case ARGS:
if (isdigit(cbuf[cpos])) {
cp = &cbuf[cpos];
while (isdigit(cbuf[++cpos]))
;
c = cbuf[cpos];
cbuf[cpos] = '\0';
yylval.i = atoi(cp);
cbuf[cpos] = c;
return (NUMBER);
}
if (strncasecmp(&cbuf[cpos], "ALL", 3) == 0
&& !isalnum(cbuf[cpos + 3])) {
yylval.s = xstrdup("ALL");
cpos += 3;
return ALL;
}
switch (cbuf[cpos++]) {
1993-03-21 12:45:37 +03:00
case '\n':
state = CMD;
return (CRLF);
1993-03-21 12:45:37 +03:00
case ' ':
return (SP);
1993-03-21 12:45:37 +03:00
case ',':
return (COMMA);
1993-03-21 12:45:37 +03:00
case 'A':
case 'a':
return (A);
1993-03-21 12:45:37 +03:00
case 'B':
case 'b':
return (B);
1993-03-21 12:45:37 +03:00
case 'C':
case 'c':
return (C);
1993-03-21 12:45:37 +03:00
case 'E':
case 'e':
return (E);
1993-03-21 12:45:37 +03:00
case 'F':
case 'f':
return (F);
1993-03-21 12:45:37 +03:00
case 'I':
case 'i':
return (I);
1993-03-21 12:45:37 +03:00
case 'L':
case 'l':
return (L);
1993-03-21 12:45:37 +03:00
case 'N':
case 'n':
return (N);
1993-03-21 12:45:37 +03:00
case 'P':
case 'p':
return (P);
1993-03-21 12:45:37 +03:00
case 'R':
case 'r':
return (R);
1993-03-21 12:45:37 +03:00
case 'S':
case 's':
return (S);
1993-03-21 12:45:37 +03:00
case 'T':
case 't':
return (T);
1993-03-21 12:45:37 +03:00
}
break;
case NOARGS:
if (cbuf[cpos] == '\n') {
state = CMD;
return (CRLF);
1993-03-21 12:45:37 +03:00
}
c = cbuf[cpos];
cbuf[cpos] = '\0';
reply(501, "'%s' command does not take any arguments.", cbuf);
hasyyerrored = 1;
cbuf[cpos] = c;
break;
default:
fatal("Unknown state in scanner.");
1993-03-21 12:45:37 +03:00
}
yyerror(NULL);
state = CMD;
longjmp(errcatch, 0);
/* NOTREACHED */
1993-03-21 12:45:37 +03:00
}
/* ARGSUSED */
void
yyerror(s)
char *s;
{
char *cp;
if (hasyyerrored)
return;
if ((cp = strchr(cbuf,'\n')) != NULL)
*cp = '\0';
reply(500, "'%s': command not understood.", cbuf);
hasyyerrored = 1;
}
1994-06-29 05:49:37 +04:00
static void
1993-03-21 12:45:37 +03:00
help(ctab, s)
struct tab *ctab;
char *s;
{
1994-06-29 05:49:37 +04:00
struct tab *c;
int width, NCMDS;
off_t b;
1993-03-21 12:45:37 +03:00
char *type;
if (ctab == sitetab)
type = "SITE ";
else
type = "";
width = 0, NCMDS = 0;
for (c = ctab; c->name != NULL; c++) {
int len = strlen(c->name);
if (len > width)
width = len;
NCMDS++;
}
width = (width + 8) &~ 7;
if (s == 0) {
1994-06-29 05:49:37 +04:00
int i, j, w;
1993-03-21 12:45:37 +03:00
int columns, lines;
lreply(214, "");
lreply(0, "The following %scommands are recognized.", type);
lreply(0, "(`-' = not implemented, `+' = supports options)");
1993-03-21 12:45:37 +03:00
columns = 76 / width;
if (columns == 0)
columns = 1;
lines = (NCMDS + columns - 1) / columns;
for (i = 0; i < lines; i++) {
b = printf(" ");
total_bytes += b;
total_bytes_out += b;
1993-03-21 12:45:37 +03:00
for (j = 0; j < columns; j++) {
c = ctab + j * lines + i;
b = printf("%s", c->name);
total_bytes += b;
total_bytes_out += b;
w = strlen(c->name);
if (! c->implemented) {
putchar('-');
total_bytes++;
total_bytes_out++;
w++;
}
if (c->hasopts) {
putchar('+');
total_bytes++;
total_bytes_out++;
w++;
}
1993-03-21 12:45:37 +03:00
if (c + lines >= &ctab[NCMDS])
break;
while (w < width) {
putchar(' ');
total_bytes++;
total_bytes_out++;
1993-03-21 12:45:37 +03:00
w++;
}
}
b = printf("\r\n");
total_bytes += b;
total_bytes_out += b;
1993-03-21 12:45:37 +03:00
}
(void) fflush(stdout);
reply(214, "Direct comments to ftp-bugs@%s.", hostname);
return;
}
c = lookup(ctab, s);
if (c == (struct tab *)0) {
reply(502, "Unknown command %s.", s);
return;
}
if (c->implemented)
reply(214, "Syntax: %s%s %s", type, c->name, c->help);
else
reply(214, "%s%-*s\t%s; not implemented.", type, width,
1993-03-21 12:45:37 +03:00
c->name, c->help);
}
1994-06-29 05:49:37 +04:00
static void
1993-03-21 12:45:37 +03:00
sizecmd(filename)
1994-06-29 05:49:37 +04:00
char *filename;
1993-03-21 12:45:37 +03:00
{
switch (type) {
case TYPE_L:
case TYPE_I: {
struct stat stbuf;
1994-06-29 05:49:37 +04:00
if (stat(filename, &stbuf) < 0 || !S_ISREG(stbuf.st_mode))
1993-03-21 12:45:37 +03:00
reply(550, "%s: not a plain file.", filename);
else
reply(213, "%qu", (qufmt_t)stbuf.st_size);
1994-06-29 05:49:37 +04:00
break; }
1993-03-21 12:45:37 +03:00
case TYPE_A: {
FILE *fin;
1994-06-29 05:49:37 +04:00
int c;
off_t count;
1993-03-21 12:45:37 +03:00
struct stat stbuf;
fin = fopen(filename, "r");
if (fin == NULL) {
perror_reply(550, filename);
return;
}
1994-06-29 05:49:37 +04:00
if (fstat(fileno(fin), &stbuf) < 0 || !S_ISREG(stbuf.st_mode)) {
1993-03-21 12:45:37 +03:00
reply(550, "%s: not a plain file.", filename);
(void) fclose(fin);
return;
}
count = 0;
while((c=getc(fin)) != EOF) {
if (c == '\n') /* will get expanded to \r\n */
count++;
count++;
}
(void) fclose(fin);
reply(213, "%qd", (qdfmt_t)count);
1994-06-29 05:49:37 +04:00
break; }
1993-03-21 12:45:37 +03:00
default:
reply(504, "SIZE not implemented for Type %c.", "?AEIL"[type]);
}
}
static void
opts(command)
const char *command;
{
struct tab *c;
char *ep;
if ((ep = strchr(command, ' ')) != NULL)
*ep++ = '\0';
c = lookup(cmdtab, command);
if (c == NULL) {
reply(502, "Unknown command %s.", command);
return;
}
if (c->implemented == 0) {
reply(502, "%s command not implemented.", c->name);
return;
}
if (c->hasopts == 0) {
reply(501, "%s command does not support persistent options.",
c->name);
return;
}
if (ep != NULL && *ep != '\0') {
if (c->options != NULL)
free(c->options);
c->options = xstrdup(ep);
}
if (c->options != NULL)
reply(200, "Options for %s are '%s'.", c->name, c->options);
else
reply(200, "No options defined for %s.", c->name);
}