ftpd.c 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789
  1. #include <string.h>
  2. #include <stdlib.h>
  3. #include <rtthread.h>
  4. #include <dfs_posix.h>
  5. #include <lwip/sockets.h>
  6. #define FTP_PORT 21
  7. #define FTP_SRV_ROOT "/"
  8. #define FTP_MAX_CONNECTION 2
  9. #define FTP_USER "rtt"
  10. #define FTP_PASSWORD "demo"
  11. #define FTP_WELCOME_MSG "220-= welcome on RT-Thread FTP server =-\r\n220 \r\n"
  12. #define FTP_BUFFER_SIZE 1024
  13. struct ftp_session
  14. {
  15. rt_bool_t is_anonymous;
  16. int sockfd;
  17. struct sockaddr_in remote;
  18. /* pasv data */
  19. char pasv_active;
  20. int pasv_sockfd;
  21. unsigned short pasv_port;
  22. size_t offset;
  23. /* current directory */
  24. char currentdir[256];
  25. struct ftp_session* next;
  26. };
  27. static struct ftp_session* session_list = NULL;
  28. int ftp_process_request(struct ftp_session* session, char * buf);
  29. int ftp_get_filesize(char *filename);
  30. struct ftp_session* ftp_new_session()
  31. {
  32. struct ftp_session* session;
  33. session = (struct ftp_session*)rt_malloc(sizeof(struct ftp_session));
  34. session->next = session_list;
  35. session_list = session;
  36. return session;
  37. }
  38. void ftp_close_session(struct ftp_session* session)
  39. {
  40. struct ftp_session* list;
  41. if (session_list == session)
  42. {
  43. session_list = session_list->next;
  44. session->next = NULL;
  45. }
  46. else
  47. {
  48. list = session_list;
  49. while (list->next != session) list = list->next;
  50. list->next = session->next;
  51. session->next = NULL;
  52. }
  53. rt_free(session);
  54. }
  55. int ftp_get_filesize(char * filename)
  56. {
  57. int pos;
  58. int end;
  59. int fd;
  60. fd = open(filename, O_RDONLY, 0);
  61. if (fd < 0) return -1;
  62. pos = lseek(fd, 0, SEEK_CUR);
  63. end = lseek(fd, 0, SEEK_END);
  64. lseek (fd, pos, SEEK_SET);
  65. close(fd);
  66. return end;
  67. }
  68. rt_bool_t is_absolute_path(char* path)
  69. {
  70. #ifdef _WIN32
  71. if (path[0] == '\\' ||
  72. (path[1] == ':' && path[2] == '\\'))
  73. return RT_TRUE;
  74. #else
  75. if (path[0] == '/') return RT_TRUE;
  76. #endif
  77. return RT_FALSE;
  78. }
  79. int build_full_path(struct ftp_session* session, char* path, char* new_path, size_t size)
  80. {
  81. if (is_absolute_path(path) == RT_TRUE)
  82. strcpy(new_path, path);
  83. else
  84. {
  85. rt_sprintf(new_path, "%s/%s", session->currentdir, path);
  86. }
  87. return 0;
  88. }
  89. void ftpd_thread_entry(void* parameter)
  90. {
  91. int numbytes;
  92. int sockfd, maxfdp1;
  93. struct sockaddr_in local;
  94. fd_set readfds, tmpfds;
  95. struct ftp_session* session;
  96. rt_uint32_t addr_len = sizeof(struct sockaddr);
  97. char * buffer = (char *) rt_malloc(FTP_BUFFER_SIZE);
  98. local.sin_port=htons(FTP_PORT);
  99. local.sin_family=PF_INET;
  100. local.sin_addr.s_addr=INADDR_ANY;
  101. FD_ZERO(&readfds);
  102. FD_ZERO(&tmpfds);
  103. sockfd=socket(AF_INET, SOCK_STREAM, 0);
  104. if(sockfd < 0)
  105. {
  106. rt_kprintf("create socket failed\n");
  107. return ;
  108. }
  109. bind(sockfd, (struct sockaddr *)&local, addr_len);
  110. listen(sockfd, FTP_MAX_CONNECTION);
  111. FD_SET(sockfd, &readfds);
  112. for(;;)
  113. {
  114. /* get maximum fd */
  115. maxfdp1 = sockfd + 1;
  116. session = session_list;
  117. while (session != RT_NULL)
  118. {
  119. if (maxfdp1 < session->sockfd + 1)
  120. maxfdp1 = session->sockfd + 1;
  121. FD_SET(session->sockfd, &readfds);
  122. session = session->next;
  123. }
  124. tmpfds=readfds;
  125. if (select(maxfdp1, &tmpfds, 0, 0, 0) == 0) continue;
  126. if(FD_ISSET(sockfd, &tmpfds))
  127. {
  128. int com_socket;
  129. struct sockaddr_in remote;
  130. com_socket = accept(sockfd, (struct sockaddr*)&remote, &addr_len);
  131. if(com_socket == -1)
  132. {
  133. rt_kprintf("Error on accept()\nContinuing...\n");
  134. continue;
  135. }
  136. else
  137. {
  138. rt_kprintf("Got connection from %s\n", inet_ntoa(remote.sin_addr));
  139. send(com_socket, FTP_WELCOME_MSG, strlen(FTP_WELCOME_MSG), 0);
  140. FD_SET(com_socket, &readfds);
  141. /* new session */
  142. session = ftp_new_session();
  143. if (session != NULL)
  144. {
  145. strcpy(session->currentdir, FTP_SRV_ROOT);
  146. session->sockfd = com_socket;
  147. session->remote = remote;
  148. }
  149. }
  150. }
  151. {
  152. struct ftp_session* next;
  153. session = session_list;
  154. while (session != NULL)
  155. {
  156. next = session->next;
  157. if (FD_ISSET(session->sockfd, &tmpfds))
  158. {
  159. numbytes=recv(session->sockfd, buffer, FTP_BUFFER_SIZE, 0);
  160. if(numbytes==0 || numbytes==-1)
  161. {
  162. rt_kprintf("Client %s disconnected\n", inet_ntoa(session->remote.sin_addr));
  163. FD_CLR(session->sockfd, &readfds);
  164. closesocket(session->sockfd);
  165. ftp_close_session(session);
  166. }
  167. else
  168. {
  169. buffer[numbytes]=0;
  170. if(ftp_process_request(session, buffer)==-1)
  171. {
  172. rt_kprintf("Client %s disconnected\r\n", inet_ntoa(session->remote.sin_addr));
  173. closesocket(session->sockfd);
  174. ftp_close_session(session);
  175. }
  176. }
  177. }
  178. session = next;
  179. }
  180. }
  181. }
  182. // rt_free(buffer);
  183. }
  184. int do_list(char* directory, int sockfd)
  185. {
  186. DIR* dirp;
  187. struct dirent* entry;
  188. char line_buffer[256], line_length;
  189. #ifdef _WIN32
  190. struct _stat s;
  191. #else
  192. struct stat s;
  193. #endif
  194. dirp = opendir(directory);
  195. if (dirp == NULL)
  196. {
  197. line_length = rt_sprintf(line_buffer, "500 Internal Error\r\n");
  198. send(sockfd, line_buffer, line_length, 0);
  199. return -1;
  200. }
  201. while (1)
  202. {
  203. entry = readdir(dirp);
  204. if (entry == NULL) break;
  205. rt_sprintf(line_buffer, "%s/%s", directory, entry->d_name);
  206. #ifdef _WIN32
  207. if (_stat(line_buffer, &s) ==0)
  208. #else
  209. if (stat(line_buffer, &s) == 0)
  210. #endif
  211. {
  212. if (s.st_mode & S_IFDIR)
  213. line_length = rt_sprintf(line_buffer, "drw-r--r-- 1 admin admin %d Jan 1 2000 %s\r\n", 0, entry->d_name);
  214. else
  215. line_length = rt_sprintf(line_buffer, "-rw-r--r-- 1 admin admin %d Jan 1 2000 %s\r\n", s.st_size, entry->d_name);
  216. send(sockfd, line_buffer, line_length, 0);
  217. }
  218. else
  219. {
  220. rt_kprintf("Get directory entry error\n");
  221. break;
  222. }
  223. }
  224. closedir(dirp);
  225. return 0;
  226. }
  227. int do_simple_list(char* directory, int sockfd)
  228. {
  229. DIR* dirp;
  230. struct dirent* entry;
  231. char line_buffer[256], line_length;
  232. dirp = opendir(directory);
  233. if (dirp == NULL)
  234. {
  235. line_length = rt_sprintf(line_buffer, "500 Internal Error\r\n");
  236. send(sockfd, line_buffer, line_length, 0);
  237. return -1;
  238. }
  239. while (1)
  240. {
  241. entry = readdir(dirp);
  242. if (entry == NULL) break;
  243. line_length = rt_sprintf(line_buffer, "%s\r\n", entry->d_name);
  244. send(sockfd, line_buffer, line_length, 0);
  245. }
  246. closedir(dirp);
  247. return 0;
  248. }
  249. int str_begin_with(char* src, char* match)
  250. {
  251. while (*match)
  252. {
  253. /* check source */
  254. if (*src == 0) return -1;
  255. if (*match != *src) return -1;
  256. match ++; src ++;
  257. }
  258. return 0;
  259. }
  260. int ftp_process_request(struct ftp_session* session, char *buf)
  261. {
  262. int fd;
  263. struct timeval tv;
  264. fd_set readfds;
  265. char filename[256];
  266. int numbytes;
  267. char *sbuf;
  268. char *parameter_ptr, *ptr;
  269. rt_uint32_t addr_len = sizeof(struct sockaddr_in);
  270. struct sockaddr_in local, pasvremote;
  271. sbuf =(char *)rt_malloc(FTP_BUFFER_SIZE);
  272. tv.tv_sec=3, tv.tv_usec=0;
  273. local.sin_family=PF_INET;
  274. local.sin_addr.s_addr=INADDR_ANY;
  275. /* remove \r\n */
  276. ptr = buf;
  277. while (*ptr)
  278. {
  279. if (*ptr == '\r' || *ptr == '\n') *ptr = 0;
  280. ptr ++;
  281. }
  282. /* get request parameter */
  283. parameter_ptr = strchr(buf, ' '); if (parameter_ptr != NULL) parameter_ptr ++;
  284. // debug:
  285. rt_kprintf("%s requested: \"%s\"\n", inet_ntoa(session->remote.sin_addr), buf);
  286. //
  287. //-----------------------
  288. if(str_begin_with(buf, "USER")==0)
  289. {
  290. rt_kprintf("%s sent login \"%s\"\n", inet_ntoa(session->remote.sin_addr), parameter_ptr);
  291. // login correct
  292. if(strcmp(parameter_ptr, "anonymous") == 0)
  293. {
  294. session->is_anonymous = RT_TRUE;
  295. rt_sprintf(sbuf, "331 Anonymous login OK send e-mail address for password.\r\n", parameter_ptr);
  296. send(session->sockfd, sbuf, strlen(sbuf), 0);
  297. }
  298. else if (strcmp(parameter_ptr, FTP_USER) == 0)
  299. {
  300. session->is_anonymous = RT_FALSE;
  301. rt_sprintf(sbuf, "331 Password required for %s\r\n", parameter_ptr);
  302. send(session->sockfd, sbuf, strlen(sbuf), 0);
  303. }
  304. else
  305. {
  306. // incorrect login
  307. rt_sprintf(sbuf, "530 Login incorrect. Bye.\r\n");
  308. send(session->sockfd, sbuf, strlen(sbuf), 0);
  309. rt_free(sbuf);
  310. return -1;
  311. }
  312. return 0;
  313. }
  314. else if(str_begin_with(buf, "PASS")==0)
  315. {
  316. rt_kprintf("%s sent password \"%s\"\n", inet_ntoa(session->remote.sin_addr), parameter_ptr);
  317. if (strcmp(parameter_ptr, FTP_PASSWORD)==0 ||
  318. session->is_anonymous == RT_TRUE)
  319. {
  320. // password correct
  321. rt_sprintf(sbuf, "230 User logged in\r\n");
  322. send(session->sockfd, sbuf, strlen(sbuf), 0);
  323. rt_free(sbuf);
  324. return 0;
  325. }
  326. // incorrect password
  327. rt_sprintf(sbuf, "530 Login or Password incorrect. Bye!\r\n");
  328. send(session->sockfd, sbuf, strlen(sbuf), 0);
  329. rt_free(sbuf);
  330. return -1;
  331. }
  332. else if(str_begin_with(buf, "LIST")==0 )
  333. {
  334. memset(sbuf,0,FTP_BUFFER_SIZE);
  335. rt_sprintf(sbuf, "150 Opening Binary mode connection for file list.\r\n");
  336. send(session->sockfd, sbuf, strlen(sbuf), 0);
  337. do_list(session->currentdir, session->pasv_sockfd);
  338. closesocket(session->pasv_sockfd);
  339. session->pasv_active = 0;
  340. rt_sprintf(sbuf, "226 Transfert Complete.\r\n");
  341. send(session->sockfd, sbuf, strlen(sbuf), 0);
  342. }
  343. else if(str_begin_with(buf, "NLST")==0 )
  344. {
  345. memset(sbuf, 0, FTP_BUFFER_SIZE);
  346. rt_sprintf(sbuf, "150 Opening Binary mode connection for file list.\r\n");
  347. send(session->sockfd, sbuf, strlen(sbuf), 0);
  348. do_simple_list(session->currentdir, session->pasv_sockfd);
  349. closesocket(session->pasv_sockfd);
  350. session->pasv_active = 0;
  351. rt_sprintf(sbuf, "226 Transfert Complete.\r\n");
  352. send(session->sockfd, sbuf, strlen(sbuf), 0);
  353. }
  354. else if(str_begin_with(buf, "PWD")==0 || str_begin_with(buf, "XPWD")==0)
  355. {
  356. rt_sprintf(sbuf, "257 \"%s\" is current directory.\r\n", session->currentdir);
  357. send(session->sockfd, sbuf, strlen(sbuf), 0);
  358. }
  359. else if(str_begin_with(buf, "TYPE")==0)
  360. {
  361. // Ignore it
  362. if(strcmp(parameter_ptr, "I")==0)
  363. {
  364. rt_sprintf(sbuf, "200 Type set to binary.\r\n");
  365. send(session->sockfd, sbuf, strlen(sbuf), 0);
  366. }
  367. else
  368. {
  369. rt_sprintf(sbuf, "200 Type set to ascii.\r\n");
  370. send(session->sockfd, sbuf, strlen(sbuf), 0);
  371. }
  372. }
  373. else if(str_begin_with(buf, "PASV")==0)
  374. {
  375. int dig1, dig2;
  376. int sockfd;
  377. char optval='1';
  378. session->pasv_port = 10000;
  379. session->pasv_active = 1;
  380. local.sin_port=htons(session->pasv_port);
  381. local.sin_addr.s_addr=INADDR_ANY;
  382. dig1 = (int)(session->pasv_port/256);
  383. dig2 = session->pasv_port % 256;
  384. FD_ZERO(&readfds);
  385. if((sockfd=socket(PF_INET, SOCK_STREAM, 0))==-1)
  386. {
  387. rt_sprintf(sbuf, "425 Can't open data connection.\r\n");
  388. send(session->sockfd, sbuf, strlen(sbuf), 0);
  389. goto err1;
  390. }
  391. if(setsockopt(sockfd, SOL_SOCKET, SO_REUSEADDR, &optval, sizeof(optval))==-1)
  392. {
  393. rt_sprintf(sbuf, "425 Can't open data connection.\r\n");
  394. send(session->sockfd, sbuf, strlen(sbuf), 0);
  395. goto err1;
  396. }
  397. if(bind(sockfd, (struct sockaddr *)&local, addr_len)==-1)
  398. {
  399. rt_sprintf(sbuf, "425 Can't open data connection.\r\n");
  400. send(session->sockfd, sbuf, strlen(sbuf), 0);
  401. goto err1;
  402. }
  403. if(listen(sockfd, 1)==-1)
  404. {
  405. rt_sprintf(sbuf, "425 Can't open data connection.\r\n");
  406. send(session->sockfd, sbuf, strlen(sbuf), 0);
  407. goto err1;
  408. }
  409. rt_kprintf("Listening %d seconds @ port %d\n", tv.tv_sec, session->pasv_port);
  410. rt_sprintf(sbuf, "227 Entering passive mode (%d,%d,%d,%d,%d,%d)\r\n", 127, 0, 0, 1, dig1, dig2);
  411. send(session->sockfd, sbuf, strlen(sbuf), 0);
  412. FD_SET(sockfd, &readfds);
  413. select(0, &readfds, 0, 0, &tv);
  414. if(FD_ISSET(sockfd, &readfds))
  415. {
  416. if((session->pasv_sockfd = accept(sockfd, (struct sockaddr*)&pasvremote, &addr_len))==-1)
  417. {
  418. rt_sprintf(sbuf, "425 Can't open data connection.\r\n");
  419. send(session->sockfd, sbuf, strlen(sbuf), 0);
  420. goto err1;
  421. }
  422. else
  423. {
  424. rt_kprintf("Got Data(PASV) connection from %s\n", inet_ntoa(pasvremote.sin_addr));
  425. session->pasv_active = 1;
  426. closesocket(sockfd);
  427. }
  428. }
  429. else
  430. {
  431. err1:
  432. closesocket(session->pasv_sockfd);
  433. session->pasv_active = 0;
  434. rt_free(sbuf);
  435. return 0;
  436. }
  437. }
  438. else if (str_begin_with(buf, "RETR")==0)
  439. {
  440. int file_size;
  441. strcpy(filename, buf + 5);
  442. build_full_path(session, parameter_ptr, filename, 256);
  443. file_size = ftp_get_filesize(filename);
  444. if (file_size == -1)
  445. {
  446. rt_sprintf(sbuf, "550 \"%s\" : not a regular file\r\n", filename);
  447. send(session->sockfd, sbuf, strlen(sbuf), 0);
  448. session->offset=0;
  449. rt_free(sbuf);
  450. return 0;
  451. }
  452. fd = open(filename, O_RDONLY, 0);
  453. if (fd < 0)
  454. {
  455. rt_free(sbuf);
  456. return 0;
  457. }
  458. if(session->offset>0 && session->offset < file_size)
  459. {
  460. lseek(fd, session->offset, SEEK_SET);
  461. rt_sprintf(sbuf, "150 Opening binary mode data connection for partial \"%s\" (%d/%d bytes).\r\n",
  462. filename, file_size - session->offset, file_size);
  463. }
  464. else
  465. {
  466. rt_sprintf(sbuf, "150 Opening binary mode data connection for \"%s\" (%d bytes).\r\n", filename, file_size);
  467. }
  468. send(session->sockfd, sbuf, strlen(sbuf), 0);
  469. while((numbytes = read(fd, sbuf, FTP_BUFFER_SIZE))>0)
  470. {
  471. send(session->pasv_sockfd, sbuf, numbytes, 0);
  472. }
  473. rt_sprintf(sbuf, "226 Finished.\r\n");
  474. send(session->sockfd, sbuf, strlen(sbuf), 0);
  475. closesocket(session->pasv_sockfd);
  476. }
  477. else if (str_begin_with(buf, "STOR")==0)
  478. {
  479. if(session->is_anonymous == RT_TRUE)
  480. {
  481. rt_sprintf(sbuf, "550 Permission denied.\r\n");
  482. send(session->sockfd, sbuf, strlen(sbuf), 0);
  483. rt_free(sbuf);
  484. return 0;
  485. }
  486. build_full_path(session, parameter_ptr, filename, 256);
  487. fd = open(filename, O_WRONLY | O_CREAT | O_TRUNC, 0);
  488. if(fd < 0)
  489. {
  490. rt_sprintf(sbuf, "550 Cannot open \"%s\" for writing.\r\n", filename);
  491. send(session->sockfd, sbuf, strlen(sbuf), 0);
  492. rt_free(sbuf);
  493. return 0;
  494. }
  495. rt_sprintf(sbuf, "150 Opening binary mode data connection for \"%s\".\r\n", filename);
  496. send(session->sockfd, sbuf, strlen(sbuf), 0);
  497. FD_ZERO(&readfds);
  498. FD_SET(session->pasv_sockfd, &readfds);
  499. rt_kprintf("Waiting %d seconds for data...\n", tv.tv_sec);
  500. while(select(session->pasv_sockfd+1, &readfds, 0, 0, &tv)>0 )
  501. {
  502. if((numbytes=recv(session->pasv_sockfd, sbuf, FTP_BUFFER_SIZE, 0))>0)
  503. {
  504. write(fd, sbuf, numbytes);
  505. }
  506. else if(numbytes==0)
  507. {
  508. close(fd);
  509. closesocket(session->pasv_sockfd);
  510. rt_sprintf(sbuf, "226 Finished.\r\n");
  511. send(session->sockfd, sbuf, strlen(sbuf), 0);
  512. break;
  513. }
  514. else if(numbytes==-1)
  515. {
  516. close(fd);
  517. closesocket(session->pasv_sockfd);
  518. rt_free(sbuf);
  519. return -1;
  520. }
  521. }
  522. closesocket(session->pasv_sockfd);
  523. }
  524. else if(str_begin_with(buf, "SIZE")==0)
  525. {
  526. int file_size;
  527. build_full_path(session, parameter_ptr, filename, 256);
  528. file_size = ftp_get_filesize(filename);
  529. if( file_size == -1)
  530. {
  531. rt_sprintf(sbuf, "550 \"%s\" : not a regular file\r\n", filename);
  532. send(session->sockfd, sbuf, strlen(sbuf), 0);
  533. }
  534. else
  535. {
  536. rt_sprintf(sbuf, "213 %d\r\n", file_size);
  537. send(session->sockfd, sbuf, strlen(sbuf), 0);
  538. }
  539. }
  540. else if(str_begin_with(buf, "MDTM")==0)
  541. {
  542. rt_sprintf(sbuf, "550 \"/\" : not a regular file\r\n");
  543. send(session->sockfd, sbuf, strlen(sbuf), 0);
  544. }
  545. else if(str_begin_with(buf, "SYST")==0)
  546. {
  547. rt_sprintf(sbuf, "215 %s\r\n", "RT-Thread RTOS");
  548. send(session->sockfd, sbuf, strlen(sbuf), 0);
  549. }
  550. else if(str_begin_with(buf, "CWD")==0)
  551. {
  552. build_full_path(session, parameter_ptr, filename, 256);
  553. rt_sprintf(sbuf, "250 Changed to directory \"%s\"\r\n", filename);
  554. send(session->sockfd, sbuf, strlen(sbuf), 0);
  555. strcpy(session->currentdir, filename);
  556. rt_kprintf("Changed to directory %s", filename);
  557. }
  558. else if(str_begin_with(buf, "CDUP")==0)
  559. {
  560. rt_sprintf(filename, "%s/%s", session->currentdir, "..");
  561. rt_sprintf(sbuf, "250 Changed to directory \"%s\"\r\n", filename);
  562. send(session->sockfd, sbuf, strlen(sbuf), 0);
  563. strcpy(session->currentdir, filename);
  564. rt_kprintf("Changed to directory %s", filename);
  565. }
  566. else if(str_begin_with(buf, "PORT")==0)
  567. {
  568. int i;
  569. int portcom[6];
  570. char tmpip[100];
  571. i=0;
  572. portcom[i++]=atoi(strtok(parameter_ptr, ".,;()"));
  573. for(;i<6;i++)
  574. portcom[i]=atoi(strtok(0, ".,;()"));
  575. rt_sprintf(tmpip, "%d.%d.%d.%d", portcom[0], portcom[1], portcom[2], portcom[3]);
  576. FD_ZERO(&readfds);
  577. if((session->pasv_sockfd=socket(AF_INET, SOCK_STREAM, 0))==-1)
  578. {
  579. rt_sprintf(sbuf, "425 Can't open data connection.\r\n");
  580. send(session->sockfd, sbuf, strlen(sbuf), 0);
  581. closesocket(session->pasv_sockfd);
  582. session->pasv_active = 0;
  583. rt_free(sbuf);
  584. return 0;
  585. }
  586. pasvremote.sin_addr.s_addr=inet_addr(tmpip);
  587. pasvremote.sin_port=htons(portcom[4] * 256 + portcom[5]);
  588. pasvremote.sin_family=PF_INET;
  589. if(connect(session->pasv_sockfd, (struct sockaddr *)&pasvremote, addr_len)==-1)
  590. {
  591. // is it only local address?try using gloal ip addr
  592. pasvremote.sin_addr=session->remote.sin_addr;
  593. if(connect(session->pasv_sockfd, (struct sockaddr *)&pasvremote, addr_len)==-1)
  594. {
  595. rt_sprintf(sbuf, "425 Can't open data connection.\r\n");
  596. send(session->sockfd, sbuf, strlen(sbuf), 0);
  597. closesocket(session->pasv_sockfd);
  598. rt_free(sbuf);
  599. return 0;
  600. }
  601. }
  602. session->pasv_active=1;
  603. session->pasv_port = portcom[4] * 256 + portcom[5];
  604. rt_kprintf("Connected to Data(PORT) %s @ %d\n", tmpip, portcom[4] * 256 + portcom[5]);
  605. rt_sprintf(sbuf, "200 Port Command Successful.\r\n");
  606. send(session->sockfd, sbuf, strlen(sbuf), 0);
  607. }
  608. else if(str_begin_with(buf, "REST")==0)
  609. {
  610. if(atoi(parameter_ptr)>=0)
  611. {
  612. session->offset=atoi(parameter_ptr);
  613. rt_sprintf(sbuf, "350 Send RETR or STOR to start transfert.\r\n");
  614. send(session->sockfd, sbuf, strlen(sbuf), 0);
  615. }
  616. }
  617. else if(str_begin_with(buf, "MKD")==0)
  618. {
  619. if (session->is_anonymous == RT_TRUE)
  620. {
  621. rt_sprintf(sbuf, "550 Permission denied.\r\n");
  622. send(session->sockfd, sbuf, strlen(sbuf), 0);
  623. rt_free(sbuf);
  624. return 0;
  625. }
  626. build_full_path(session, parameter_ptr, filename, 256);
  627. if(mkdir(filename, 0) == -1)
  628. {
  629. rt_sprintf(sbuf, "550 File \"%s\" exists.\r\n", filename);
  630. send(session->sockfd, sbuf, strlen(sbuf), 0);
  631. }
  632. else
  633. {
  634. rt_sprintf(sbuf, "257 directory \"%s\" successfully created.\r\n", filename);
  635. send(session->sockfd, sbuf, strlen(sbuf), 0);
  636. }
  637. }
  638. else if(str_begin_with(buf, "DELE")==0)
  639. {
  640. if (session->is_anonymous == RT_TRUE)
  641. {
  642. rt_sprintf(sbuf, "550 Permission denied.\r\n");
  643. send(session->sockfd, sbuf, strlen(sbuf), 0);
  644. rt_free(sbuf);
  645. return 0;
  646. }
  647. build_full_path(session, parameter_ptr, filename, 256);
  648. if(unlink(filename)==0)
  649. rt_sprintf(sbuf, "250 Successfully deleted file \"%s\".\r\n", filename);
  650. else
  651. {
  652. rt_sprintf(sbuf, "550 Not such file or directory: %s.\r\n", filename);
  653. }
  654. send(session->sockfd, sbuf, strlen(sbuf), 0);
  655. }
  656. else if(str_begin_with(buf, "RMD")==0)
  657. {
  658. if (session->is_anonymous == RT_TRUE)
  659. {
  660. rt_sprintf(sbuf, "550 Permission denied.\r\n");
  661. send(session->sockfd, sbuf, strlen(sbuf), 0);
  662. rt_free(sbuf);
  663. return 0;
  664. }
  665. build_full_path(session, parameter_ptr, filename, 256);
  666. if(unlink(filename) == -1)
  667. {
  668. rt_sprintf(sbuf, "550 Directory \"%s\" doesn't exist.\r\n", filename);
  669. send(session->sockfd, sbuf, strlen(sbuf), 0);
  670. }
  671. else
  672. {
  673. rt_sprintf(sbuf, "257 directory \"%s\" successfully deleted.\r\n", filename);
  674. send(session->sockfd, sbuf, strlen(sbuf), 0);
  675. }
  676. }
  677. else if(str_begin_with(buf, "QUIT")==0)
  678. {
  679. rt_sprintf(sbuf, "221 Bye!\r\n");
  680. send(session->sockfd, sbuf, strlen(sbuf), 0);
  681. rt_free(sbuf);
  682. return -1;
  683. }
  684. else
  685. {
  686. rt_sprintf(sbuf, "502 Not Implemented.\r\n");
  687. send(session->sockfd, sbuf, strlen(sbuf), 0);
  688. }
  689. rt_free(sbuf);
  690. return 0;
  691. }
  692. void ftpd_start()
  693. {
  694. rt_thread_t tid;
  695. tid = rt_thread_create("ftpd",
  696. ftpd_thread_entry, RT_NULL,
  697. 4096, 30, 5);
  698. if (tid != RT_NULL) rt_thread_startup(tid);
  699. }
  700. #ifdef RT_USING_FINSH
  701. #include <finsh.h>
  702. FINSH_FUNCTION_EXPORT(ftpd_start, start ftp server)
  703. #endif