27*/ 28/* 29 * Copyright (c) 1985, 1988 Regents of the University of California. 30 * All rights reserved. 31 * 32 * Redistribution and use in source and binary forms, with or without 33 * modification, are permitted provided that the following conditions 34 * are met: 35 * 1. Redistributions of source code must retain the above copyright 36 * notice, this list of conditions and the following disclaimer. 37 * 2. Redistributions in binary form must reproduce the above copyright 38 * notice, this list of conditions and the following disclaimer in the 39 * documentation and/or other materials provided with the distribution. 40 * 3. All advertising materials mentioning features or use of this software 41 * must display the following acknowledgement: 42 * This product includes software developed by the University of 43 * California, Berkeley and its contributors. 44 * 4. Neither the name of the University nor the names of its contributors 45 * may be used to endorse or promote products derived from this software 46 * without specific prior written permission. 47 * 48 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 49 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 50 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 51 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 52 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 53 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 54 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 55 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 56 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 57 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 58 * SUCH DAMAGE. 59 * 60 * @(#)ftpcmd.y 5.24 (Berkeley) 2/25/91 61 */ 62 63/* 64 * Grammar for FTP commands. 65 * See RFC 959. 66 */ 67 68%{ 69#include "opie_cfg.h" 70 71#include <sys/param.h> 72#include <sys/types.h> 73#include <sys/socket.h> 74#include <sys/stat.h> 75#include <netinet/in.h> 76#include <arpa/ftp.h> 77#include <signal.h> 78#include <setjmp.h> 79#include <syslog.h> 80#if TM_IN_SYS_TIME 81#include <sys/time.h> 82#else /* TM_IN_SYS_TIME */ 83#include <time.h> 84#endif /* TM_IN_SYS_TIME */ 85#include <pwd.h> 86#include <unistd.h> 87#include <stdio.h> 88#include <ctype.h> 89#include <stdlib.h> 90#include <string.h> 91 92#include "opie.h" 93 94#if HAVE_LS_G_FLAG 95#define LS_COMMAND "/bin/ls -lgA" 96#else /* HAVE_LS_G_FLAG */ 97#define LS_COMMAND "/bin/ls -lA" 98#endif /* HAVE_LS_G_FLAG */ 99 100extern struct sockaddr_in data_dest; 101extern struct sockaddr_in his_addr; 102extern int logged_in; 103extern struct passwd *pw; 104extern int guest; 105extern int type; 106extern int form; 107extern int debug; 108extern int timeout; 109extern int maxtimeout; 110extern int pdata; 111extern char *remotehost; 112extern char *proctitle; 113extern char *globerr; 114extern int usedefault; 115extern int transflag; 116extern char tmpline[]; 117char **ftpglob(); 118 119VOIDRET dologout __P((int)); 120VOIDRET upper __P((char *)); 121VOIDRET nack __P((char *)); 122VOIDRET opiefatal __P((char *)); 123 124VOIDRET pass __P((char *)); 125int user __P((char *)); 126VOIDRET passive __P((void)); 127VOIDRET retrieve __P((char *, char *)); 128VOIDRET store __P((char *, char *, int)); 129VOIDRET send_file_list __P((char *)); 130VOIDRET statfilecmd __P((char *)); 131VOIDRET statcmd __P((void)); 132VOIDRET delete __P((char *)); 133VOIDRET renamecmd __P((char *, char *)); 134VOIDRET cwd __P((char *)); 135VOIDRET makedir __P((char *)); 136VOIDRET removedir __P((char *)); 137VOIDRET pwd __P((void)); 138 139VOIDRET sizecmd __P((char *)); 140 141off_t restart_point; 142 143static int cmd_type; 144static int cmd_form; 145static int cmd_bytesz; 146static unsigned short cliport = 0; 147char cbuf[512]; 148char *fromname; 149 150struct tab { 151 char *name; 152 short token; 153 short state; 154 short implemented; /* 1 if command is implemented */ 155 char *help; 156}; 157 158VOIDRET help __P((struct tab *, char *)); 159 160struct tab cmdtab[], sitetab[]; 161 162%} 163 164%token 165 A B C E F I 166 L N P R S T 167 168 SP CRLF COMMA STRING NUMBER 169 170 USER PASS ACCT REIN QUIT PORT 171 PASV TYPE STRU MODE RETR STOR 172 APPE MLFL MAIL MSND MSOM MSAM 173 MRSQ MRCP ALLO REST RNFR RNTO 174 ABOR DELE CWD LIST NLST SITE 175 STAT HELP NOOP MKD RMD PWD 176 CDUP STOU SMNT SYST SIZE MDTM 177 178 UMASK IDLE CHMOD 179 180 LEXERR 181 182%start cmd_list 183 184%% 185 186cmd_list: /* empty */ 187 | cmd_list cmd 188 = { 189 fromname = (char *) 0; 190 restart_point = (off_t) 0; 191 } 192 | cmd_list rcmd 193 ; 194 195cmd: USER SP username CRLF 196 = { 197 user((char *) $3); 198 free((char *) $3); 199 } 200 | PASS SP password CRLF 201 = { 202 pass((char *) $3); 203 free((char *) $3); 204 } 205 | PORT check_login SP host_port CRLF 206 = { 207 usedefault = 0; 208 if (pdata >= 0) { 209 (void) close(pdata); 210 pdata = -1; 211 } 212/* H* port fix, part B: admonish the twit. 213 Also require login before PORT works */ 214 if ($2) { 215 if ((cliport > 1023) && (data_dest.sin_addr.s_addr > 0)) { 216 reply(200, "PORT command successful."); 217 } else { 218 syslog (LOG_WARNING, "refused %s from %s", 219 cbuf, remotehost); 220 reply(500, "You've GOT to be joking."); 221 } 222 } 223 } 224/* | PASV CRLF 225 = { 226 passive(); 227 } */ 228 | PASV check_login CRLF 229 = { 230/* Require login for PASV, too. This actually fixes a bug -- telnet to an 231 unfixed wu-ftpd and type PASV first off, and it crashes! */ 232 if ($2) { 233 passive(); 234 } 235 } 236 | TYPE SP type_code CRLF 237 = { 238 switch (cmd_type) { 239 240 case TYPE_A: 241 if (cmd_form == FORM_N) { 242 reply(200, "Type set to A."); 243 type = cmd_type; 244 form = cmd_form; 245 } else 246 reply(504, "Form must be N."); 247 break; 248 249 case TYPE_E: 250 reply(504, "Type E not implemented."); 251 break; 252 253 case TYPE_I: 254 reply(200, "Type set to I."); 255 type = cmd_type; 256 break; 257 258 case TYPE_L: 259#if NBBY == 8 260 if (cmd_bytesz == 8) { 261 reply(200, 262 "Type set to L (byte size 8)."); 263 type = cmd_type; 264 } else 265 reply(504, "Byte size must be 8."); 266#else /* NBBY == 8 */ 267 UNIMPLEMENTED for NBBY != 8 268#endif /* NBBY == 8 */ 269 } 270 } 271 | STRU SP struct_code CRLF 272 = { 273 switch ($3) { 274 275 case STRU_F: 276 reply(200, "STRU F ok."); 277 break; 278 279 default: 280 reply(504, "Unimplemented STRU type."); 281 } 282 } 283 | MODE SP mode_code CRLF 284 = { 285 switch ($3) { 286 287 case MODE_S: 288 reply(200, "MODE S ok."); 289 break; 290 291 default: 292 reply(502, "Unimplemented MODE type."); 293 } 294 } 295 | ALLO SP NUMBER CRLF 296 = { 297 reply(202, "ALLO command ignored."); 298 } 299 | ALLO SP NUMBER SP R SP NUMBER CRLF 300 = { 301 reply(202, "ALLO command ignored."); 302 } 303 | RETR check_login SP pathname CRLF 304 = { 305 if ($2 && $4) 306 retrieve((char *) 0, (char *) $4); 307 if ($4) 308 free((char *) $4); 309 } 310 | STOR check_login SP pathname CRLF 311 = { 312 if ($2 && $4) 313 store((char *) $4, "w", 0); 314 if ($4) 315 free((char *) $4); 316 } 317 | APPE check_login SP pathname CRLF 318 = { 319 if ($2 && $4) 320 store((char *) $4, "a", 0); 321 if ($4) 322 free((char *) $4); 323 } 324 | NLST check_login CRLF 325 = { 326 if ($2) 327 send_file_list("."); 328 } 329 | NLST check_login SP STRING CRLF 330 = { 331 if ($2 && $4) 332 send_file_list((char *) $4); 333 if ($4) 334 free((char *) $4); 335 } 336 | LIST check_login CRLF 337 = { 338 if ($2) 339 retrieve(LS_COMMAND, ""); 340 } 341 | LIST check_login SP pathname CRLF 342 = { 343 if ($2 && $4) 344 { 345 char buffer[sizeof(LS_COMMAND)+3]; 346 strcpy(buffer, LS_COMMAND); 347 strcat(buffer, " %s"); 348 retrieve(buffer, (char *) $4); 349 } 350 if ($4) 351 free((char *) $4); 352 } 353 | STAT check_login SP pathname CRLF 354 = { 355 if ($2 && $4) 356 statfilecmd((char *) $4); 357 if ($4) 358 free((char *) $4); 359 } 360 | STAT CRLF 361 = { 362 statcmd(); 363 } 364 | DELE check_login SP pathname CRLF 365 = { 366 if ($2 && $4) 367 delete((char *) $4); 368 if ($4) 369 free((char *) $4); 370 } 371 | RNTO SP pathname CRLF 372 = { 373 if (fromname) { 374 renamecmd(fromname, (char *) $3); 375 free(fromname); 376 fromname = (char *) 0; 377 } else { 378 reply(503, "Bad sequence of commands."); 379 } 380 free((char *) $3); 381 } 382 | ABOR CRLF 383 = { 384 reply(225, "ABOR command successful."); 385 } 386 | CWD check_login CRLF 387 = { 388 if ($2) 389 cwd(pw->pw_dir); 390 } 391 | CWD check_login SP pathname CRLF 392 = { 393 if ($2 && $4) 394 cwd((char *) $4); 395 if ($4) 396 free((char *) $4); 397 } 398 | HELP CRLF 399 = { 400 help(cmdtab, (char *) 0); 401 } 402 | HELP SP STRING CRLF 403 = { 404 register char *cp = (char *)$3; 405 406 if (strncasecmp(cp, "SITE", 4) == 0) { 407 cp = (char *)$3 + 4; 408 if (*cp == ' ') 409 cp++; 410 if (*cp) 411 help(sitetab, cp); 412 else 413 help(sitetab, (char *) 0); 414 } else 415 help(cmdtab, (char *) $3); 416 } 417 | NOOP CRLF 418 = { 419 reply(200, "NOOP command successful."); 420 } 421 | MKD check_login SP pathname CRLF 422 = { 423 if ($2 && $4) 424 makedir((char *) $4); 425 if ($4) 426 free((char *) $4); 427 } 428 | RMD check_login SP pathname CRLF 429 = { 430 if ($2 && $4) 431 removedir((char *) $4); 432 if ($4) 433 free((char *) $4); 434 } 435 | PWD check_login CRLF 436 = { 437 if ($2) 438 pwd(); 439 } 440 | CDUP check_login CRLF 441 = { 442 if ($2) 443 cwd(".."); 444 } 445 | SITE SP HELP CRLF 446 = { 447 help(sitetab, (char *) 0); 448 } 449 | SITE SP HELP SP STRING CRLF 450 = { 451 help(sitetab, (char *) $5); 452 } 453 | SITE SP UMASK check_login CRLF 454 = { 455 int oldmask; 456 457 if ($4) { 458 oldmask = umask(0); 459 (void) umask(oldmask); 460 reply(200, "Current UMASK is %03o", oldmask); 461 } 462 } 463 | SITE SP UMASK check_login SP octal_number CRLF 464 = { 465 int oldmask; 466 467 if ($4) { 468 if (($6 == -1) || ($6 > 0777)) { 469 reply(501, "Bad UMASK value"); 470 } else { 471 oldmask = umask($6); 472 reply(200, 473 "UMASK set to %03o (was %03o)", 474 $6, oldmask); 475 } 476 } 477 } 478 | SITE SP CHMOD check_login SP octal_number SP pathname CRLF 479 = { 480 if ($4 && $8) { 481 if ($6 > 0777) 482 reply(501, 483 "CHMOD: Mode value must be between 0 and 0777"); 484 else if (chmod((char *) $8, $6) < 0) 485 perror_reply(550, (char *) $8); 486 else 487 reply(200, "CHMOD command successful."); 488 } 489 if ($8) 490 free((char *) $8); 491 } 492 | SITE SP IDLE CRLF 493 = { 494 reply(200, 495 "Current IDLE time limit is %d seconds; max %d", 496 timeout, maxtimeout); 497 } 498 | SITE SP IDLE SP NUMBER CRLF 499 = { 500 if ($5 < 30 || $5 > maxtimeout) { 501 reply(501, 502 "Maximum IDLE time must be between 30 and %d seconds", 503 maxtimeout); 504 } else { 505 timeout = $5; 506 (void) alarm((unsigned) timeout); 507 reply(200, 508 "Maximum IDLE time set to %d seconds", 509 timeout); 510 } 511 } 512 | STOU check_login SP pathname CRLF 513 = { 514 if ($2 && $4) 515 store((char *) $4, "w", 1); 516 if ($4) 517 free((char *) $4); 518 } 519 | SYST CRLF 520 = { 521#ifdef unix 522#ifdef BSD 523 reply(215, "UNIX Type: L%d Version: BSD-%d", 524 NBBY, BSD); 525#else /* BSD */ 526 reply(215, "UNIX Type: L%d", NBBY); 527#endif /* BSD */ 528#else /* unix */ 529 reply(215, "UNKNOWN Type: L%d", NBBY); 530#endif /* unix */ 531 } 532 533 /* 534 * SIZE is not in RFC959, but Postel has blessed it and 535 * it will be in the updated RFC. 536 * 537 * Return size of file in a format suitable for 538 * using with RESTART (we just count bytes). 539 */ 540 | SIZE check_login SP pathname CRLF 541 = { 542 if ($2 && $4) 543 sizecmd((char *) $4); 544 if ($4) 545 free((char *) $4); 546 } 547 548 /* 549 * MDTM is not in RFC959, but Postel has blessed it and 550 * it will be in the updated RFC. 551 * 552 * Return modification time of file as an ISO 3307 553 * style time. E.g. YYYYMMDDHHMMSS or YYYYMMDDHHMMSS.xxx 554 * where xxx is the fractional second (of any precision, 555 * not necessarily 3 digits) 556 */ 557 | MDTM check_login SP pathname CRLF 558 = { 559 if ($2 && $4) { 560 struct stat stbuf; 561 if (stat((char *) $4, &stbuf) < 0) 562 perror_reply(550, (char *) $4); 563 else if ((stbuf.st_mode&S_IFMT) != S_IFREG) { 564 reply(550, "%s: not a plain file.", 565 (char *) $4); 566 } else { 567 register struct tm *t; 568 struct tm *gmtime(); 569 t = gmtime(&stbuf.st_mtime); 570 reply(213, 571 "%d%02d%02d%02d%02d%02d", 572 t->tm_year+1900, t->tm_mon+1, t->tm_mday, 573 t->tm_hour, t->tm_min, t->tm_sec); 574 } 575 } 576 if ($4) 577 free((char *) $4); 578 } 579 | QUIT CRLF 580 = { 581 reply(221, "Goodbye."); 582 dologout(0); 583 } 584 | error CRLF 585 = { 586 yyerrok; 587 } 588 ; 589rcmd: RNFR check_login SP pathname CRLF 590 = { 591 char *renamefrom(); 592 593 restart_point = (off_t) 0; 594 if ($2 && $4) { 595 fromname = renamefrom((char *) $4); 596 if (fromname == (char *) 0 && $4) { 597 free((char *) $4); 598 } 599 } 600 } 601 | REST SP byte_size CRLF 602 = { 603 long atol(); 604 605 fromname = (char *) 0; 606 restart_point = $3; 607 reply(350, "Restarting at %ld. %s", restart_point, 608 "Send STORE or RETRIEVE to initiate transfer."); 609 } 610 ; 611 612username: STRING 613 ; 614 615password: /* empty */ 616 = { 617 *(char **)&($$) = (char *)calloc(1, sizeof(char)); 618 } 619 | STRING 620 ; 621 622byte_size: NUMBER 623 ; 624 625host_port: NUMBER COMMA NUMBER COMMA NUMBER COMMA NUMBER COMMA 626 NUMBER COMMA NUMBER 627 = { 628 register char *a, *p; 629 630 a = (char *)&data_dest.sin_addr; 631 a[0] = $1; a[1] = $3; a[2] = $5; a[3] = $7; 632 633/* H* port fix, part A-1: Check the args against the client addr */ 634 p = (char *)&his_addr.sin_addr; 635 if (memcmp (a, p, sizeof (data_dest.sin_addr))) 636 memset (a, 0, sizeof (data_dest.sin_addr)); /* XXX */ 637 638 p = (char *)&data_dest.sin_port; 639 640/* H* port fix, part A-2: only allow client ports in "user space" */ 641 p[0] = 0; p[1] = 0; 642 cliport = ($9 << 8) + $11; 643 if (cliport > 1023) { 644 p[0] = $9; p[1] = $11; 645 } 646 647 p[0] = $9; p[1] = $11; 648 data_dest.sin_family = AF_INET; 649 } 650 ; 651 652form_code: N 653 = { 654 $$ = FORM_N; 655 } 656 | T 657 = { 658 $$ = FORM_T; 659 } 660 | C 661 = { 662 $$ = FORM_C; 663 } 664 ; 665 666type_code: A 667 = { 668 cmd_type = TYPE_A; 669 cmd_form = FORM_N; 670 } 671 | A SP form_code 672 = { 673 cmd_type = TYPE_A; 674 cmd_form = $3; 675 } 676 | E 677 = { 678 cmd_type = TYPE_E; 679 cmd_form = FORM_N; 680 } 681 | E SP form_code 682 = { 683 cmd_type = TYPE_E; 684 cmd_form = $3; 685 } 686 | I 687 = { 688 cmd_type = TYPE_I; 689 } 690 | L 691 = { 692 cmd_type = TYPE_L; 693 cmd_bytesz = NBBY; 694 } 695 | L SP byte_size 696 = { 697 cmd_type = TYPE_L; 698 cmd_bytesz = $3; 699 } 700 /* this is for a bug in the BBN ftp */ 701 | L byte_size 702 = { 703 cmd_type = TYPE_L; 704 cmd_bytesz = $2; 705 } 706 ; 707 708struct_code: F 709 = { 710 $$ = STRU_F; 711 } 712 | R 713 = { 714 $$ = STRU_R; 715 } 716 | P 717 = { 718 $$ = STRU_P; 719 } 720 ; 721 722mode_code: S 723 = { 724 $$ = MODE_S; 725 } 726 | B 727 = { 728 $$ = MODE_B; 729 } 730 | C 731 = { 732 $$ = MODE_C; 733 } 734 ; 735 736pathname: pathstring 737 = { 738 /* 739 * Problem: this production is used for all pathname 740 * processing, but only gives a 550 error reply. 741 * This is a valid reply in some cases but not in others. 742 */ 743 if (logged_in && $1 && strncmp((char *) $1, "~", 1) == 0) { 744 *(char **)&($$) = *ftpglob((char *) $1); 745 if (globerr != NULL) { 746 reply(550, globerr); 747/* $$ = NULL; */ 748 $$ = 0; 749 } 750 free((char *) $1); 751 } else 752 $$ = $1; 753 } 754 ; 755 756pathstring: STRING 757 ; 758 759octal_number: NUMBER 760 = { 761 register int ret, dec, multby, digit; 762 763 /* 764 * Convert a number that was read as decimal number 765 * to what it would be if it had been read as octal. 766 */ 767 dec = $1; 768 multby = 1; 769 ret = 0; 770 while (dec) { 771 digit = dec%10; 772 if (digit > 7) { 773 ret = -1; 774 break; 775 } 776 ret += digit * multby; 777 multby *= 8; 778 dec /= 10; 779 } 780 $$ = ret; 781 } 782 ; 783 784check_login: /* empty */ 785 = { 786 if (logged_in) 787 $$ = 1; 788 else { 789 reply(530, "Please login with USER and PASS."); 790 $$ = 0; 791 } 792 } 793 ; 794 795%% 796 797extern jmp_buf errcatch; 798 799#define CMD 0 /* beginning of command */ 800#define ARGS 1 /* expect miscellaneous arguments */ 801#define STR1 2 /* expect SP followed by STRING */ 802#define STR2 3 /* expect STRING */ 803#define OSTR 4 /* optional SP then STRING */ 804#define ZSTR1 5 /* SP then optional STRING */ 805#define ZSTR2 6 /* optional STRING after SP */ 806#define SITECMD 7 /* SITE command */ 807#define NSTR 8 /* Number followed by a string */ 808 809struct tab cmdtab[] = { /* In order defined in RFC 765 */ 810 { "USER", USER, STR1, 1, "<sp> username" }, 811 { "PASS", PASS, ZSTR1, 1, "<sp> password" }, 812 { "ACCT", ACCT, STR1, 0, "(specify account)" }, 813 { "SMNT", SMNT, ARGS, 0, "(structure mount)" }, 814 { "REIN", REIN, ARGS, 0, "(reinitialize server state)" }, 815 { "QUIT", QUIT, ARGS, 1, "(terminate service)", }, 816 { "PORT", PORT, ARGS, 1, "<sp> b0, b1, b2, b3, b4" }, 817 { "PASV", PASV, ARGS, 1, "(set server in passive mode)" }, 818 { "TYPE", TYPE, ARGS, 1, "<sp> [ A | E | I | L ]" }, 819 { "STRU", STRU, ARGS, 1, "(specify file structure)" }, 820 { "MODE", MODE, ARGS, 1, "(specify transfer mode)" }, 821 { "RETR", RETR, STR1, 1, "<sp> file-name" }, 822 { "STOR", STOR, STR1, 1, "<sp> file-name" }, 823 { "APPE", APPE, STR1, 1, "<sp> file-name" }, 824 { "MLFL", MLFL, OSTR, 0, "(mail file)" }, 825 { "MAIL", MAIL, OSTR, 0, "(mail to user)" }, 826 { "MSND", MSND, OSTR, 0, "(mail send to terminal)" }, 827 { "MSOM", MSOM, OSTR, 0, "(mail send to terminal or mailbox)" }, 828 { "MSAM", MSAM, OSTR, 0, "(mail send to terminal and mailbox)" }, 829 { "MRSQ", MRSQ, OSTR, 0, "(mail recipient scheme question)" }, 830 { "MRCP", MRCP, STR1, 0, "(mail recipient)" }, 831 { "ALLO", ALLO, ARGS, 1, "allocate storage (vacuously)" }, 832 { "REST", REST, ARGS, 1, "(restart command)" }, 833 { "RNFR", RNFR, STR1, 1, "<sp> file-name" }, 834 { "RNTO", RNTO, STR1, 1, "<sp> file-name" }, 835 { "ABOR", ABOR, ARGS, 1, "(abort operation)" }, 836 { "DELE", DELE, STR1, 1, "<sp> file-name" }, 837 { "CWD", CWD, OSTR, 1, "[ <sp> directory-name ]" }, 838 { "XCWD", CWD, OSTR, 1, "[ <sp> directory-name ]" }, 839 { "LIST", LIST, OSTR, 1, "[ <sp> path-name ]" }, 840 { "NLST", NLST, OSTR, 1, "[ <sp> path-name ]" }, 841 { "SITE", SITE, SITECMD, 1, "site-cmd [ <sp> arguments ]" }, 842 { "SYST", SYST, ARGS, 1, "(get type of operating system)" }, 843 { "STAT", STAT, OSTR, 1, "[ <sp> path-name ]" }, 844 { "HELP", HELP, OSTR, 1, "[ <sp> <string> ]" }, 845 { "NOOP", NOOP, ARGS, 1, "" }, 846 { "MKD", MKD, STR1, 1, "<sp> path-name" }, 847 { "XMKD", MKD, STR1, 1, "<sp> path-name" }, 848 { "RMD", RMD, STR1, 1, "<sp> path-name" }, 849 { "XRMD", RMD, STR1, 1, "<sp> path-name" }, 850 { "PWD", PWD, ARGS, 1, "(return current directory)" }, 851 { "XPWD", PWD, ARGS, 1, "(return current directory)" }, 852 { "CDUP", CDUP, ARGS, 1, "(change to parent directory)" }, 853 { "XCUP", CDUP, ARGS, 1, "(change to parent directory)" }, 854 { "STOU", STOU, STR1, 1, "<sp> file-name" }, 855 { "SIZE", SIZE, OSTR, 1, "<sp> path-name" }, 856 { "MDTM", MDTM, OSTR, 1, "<sp> path-name" }, 857 { NULL, 0, 0, 0, 0 } 858}; 859 860struct tab sitetab[] = { 861 { "UMASK", UMASK, ARGS, 1, "[ <sp> umask ]" }, 862 { "IDLE", IDLE, ARGS, 1, "[ <sp> maximum-idle-time ]" }, 863 { "CHMOD", CHMOD, NSTR, 1, "<sp> mode <sp> file-name" }, 864 { "HELP", HELP, OSTR, 1, "[ <sp> <string> ]" }, 865 { NULL, 0, 0, 0, 0 } 866}; 867 868struct tab *lookup FUNCTION((p, cmd), register struct tab *p AND char *cmd) 869{ 870 871 for (; p->name != NULL; p++) 872 if (strcmp(cmd, p->name) == 0) 873 return (p); 874 return (0); 875} 876 877#include <arpa/telnet.h> 878 879/* 880 * getline - a hacked up version of fgets to ignore TELNET escape codes. 881 */ 882char *getline FUNCTION((s, n, iop), char *s AND int n AND FILE *iop) 883{ 884 register c; 885 register char *cs; 886 887 cs = s; 888/* tmpline may contain saved command from urgent mode interruption */ 889 for (c = 0; *(tmpline + c) && --n > 0; ++c) { 890 *cs++ = *(tmpline + c); 891 if (*(tmpline + c) == '\n') { 892 *cs++ = '\0'; 893 if (debug) 894 syslog(LOG_DEBUG, "command: %s", s); 895 *tmpline = '\0'; 896 return(s); 897 } 898 if (c == 0) 899 *tmpline = '\0'; 900 } 901 while ((c = getc(iop)) != EOF) { 902 c &= 0377; 903 if (c == IAC) { 904 if ((c = getc(iop)) != EOF) { 905 c &= 0377; 906 switch (c) { 907 case WILL: 908 case WONT: 909 c = getc(iop); 910 printf("%c%c%c", IAC, DONT, 0377&c); 911 (void) fflush(stdout); 912 continue; 913 case DO: 914 case DONT: 915 c = getc(iop); 916 printf("%c%c%c", IAC, WONT, 0377&c); 917 (void) fflush(stdout); 918 continue; 919 case IAC: 920 break; 921 default: 922 continue; /* ignore command */ 923 } 924 } 925 } 926 *cs++ = c; 927 if (--n <= 0 || c == '\n') 928 break; 929 } 930 if (c == EOF && cs == s) 931 return (NULL); 932 *cs++ = '\0'; 933 if (debug) 934 syslog(LOG_DEBUG, "command: %s", s); 935 return (s); 936} 937 938static VOIDRET toolong FUNCTION((input), int input) 939{ 940 time_t now; 941 942 reply(421, "Timeout (%d seconds): closing control connection.", timeout); 943 (void) time(&now); 944 syslog(LOG_INFO, "User %s timed out after %d seconds at %s", 945 (pw ? pw -> pw_name : "unknown"), timeout, ctime(&now)); 946 dologout(1); 947} 948 949int yylex FUNCTION_NOARGS 950{ 951 static int cpos, state; 952 register char *cp, *cp2; 953 register struct tab *p; 954 int n; 955 char c, *copy(); 956 957 for (;;) { 958 switch (state) { 959 960 case CMD: 961 (void) signal(SIGALRM, toolong); 962 (void) alarm((unsigned) timeout); 963 if (getline(cbuf, sizeof(cbuf)-1, stdin) == NULL) { 964 reply(221, "You could at least say goodbye."); 965 dologout(0); 966 } 967 (void) alarm(0);
|