1
0

ftpd.c 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791
  1. #include <string.h>
  2. #include <stdlib.h>
  3. #include <rtthread.h>
  4. #include <dfs_posix.h>
  5. #include <lwip/sockets.h>
  6. #include <time.h>
  7. #define FTP_PORT 21
  8. #define FTP_SRV_ROOT "/"
  9. #define FTP_MAX_CONNECTION 2
  10. #define FTP_USER "rtt"
  11. #define FTP_PASSWORD "demo"
  12. #define FTP_WELCOME_MSG "220-= welcome on RT-Thread FTP server =-\r\n220 \r\n"
  13. #define FTP_BUFFER_SIZE 1024
  14. struct ftp_session
  15. {
  16. rt_bool_t is_anonymous;
  17. int sockfd;
  18. struct sockaddr_in remote;
  19. /* pasv data */
  20. char pasv_active;
  21. int pasv_sockfd;
  22. unsigned short pasv_port;
  23. size_t offset;
  24. /* current directory */
  25. char currentdir[256];
  26. struct ftp_session* next;
  27. };
  28. static struct ftp_session* session_list = NULL;
  29. static int ftp_process_request(struct ftp_session* session, char * buf);
  30. static int ftp_get_filesize(char *filename);
  31. static struct ftp_session* ftp_new_session()
  32. {
  33. struct ftp_session* session;
  34. session = (struct ftp_session*)rt_malloc(sizeof(struct ftp_session));
  35. session->next = session_list;
  36. session_list = session;
  37. return session;
  38. }
  39. static void ftp_close_session(struct ftp_session* session)
  40. {
  41. struct ftp_session* list;
  42. if (session_list == session)
  43. {
  44. session_list = session_list->next;
  45. session->next = NULL;
  46. }
  47. else
  48. {
  49. list = session_list;
  50. while (list->next != session) list = list->next;
  51. list->next = session->next;
  52. session->next = NULL;
  53. }
  54. rt_free(session);
  55. }
  56. static int ftp_get_filesize(char * filename)
  57. {
  58. int pos;
  59. int end;
  60. int fd;
  61. fd = open(filename, O_RDONLY, 0);
  62. if (fd < 0) return -1;
  63. pos = lseek(fd, 0, SEEK_CUR);
  64. end = lseek(fd, 0, SEEK_END);
  65. lseek (fd, pos, SEEK_SET);
  66. close(fd);
  67. return end;
  68. }
  69. static rt_bool_t is_absolute_path(char* path)
  70. {
  71. #ifdef _WIN32
  72. if (path[0] == '\\' ||
  73. (path[1] == ':' && path[2] == '\\'))
  74. return RT_TRUE;
  75. #else
  76. if (path[0] == '/') return RT_TRUE;
  77. #endif
  78. return RT_FALSE;
  79. }
  80. static int build_full_path(struct ftp_session* session, char* path, char* new_path, size_t size)
  81. {
  82. if (is_absolute_path(path) == RT_TRUE)
  83. strcpy(new_path, path);
  84. else
  85. {
  86. rt_sprintf(new_path, "%s/%s", session->currentdir, path);
  87. }
  88. return 0;
  89. }
  90. static void ftpd_thread_entry(void* parameter)
  91. {
  92. int numbytes;
  93. int sockfd, maxfdp1;
  94. struct sockaddr_in local;
  95. fd_set readfds, tmpfds;
  96. struct ftp_session* session;
  97. rt_uint32_t addr_len = sizeof(struct sockaddr);
  98. char * buffer = (char *) rt_malloc(FTP_BUFFER_SIZE);
  99. local.sin_port=htons(FTP_PORT);
  100. local.sin_family=PF_INET;
  101. local.sin_addr.s_addr=INADDR_ANY;
  102. FD_ZERO(&readfds);
  103. FD_ZERO(&tmpfds);
  104. sockfd=socket(AF_INET, SOCK_STREAM, 0);
  105. if(sockfd < 0)
  106. {
  107. rt_kprintf("create socket failed\n");
  108. return ;
  109. }
  110. bind(sockfd, (struct sockaddr *)&local, addr_len);
  111. listen(sockfd, FTP_MAX_CONNECTION);
  112. FD_SET(sockfd, &readfds);
  113. for(;;)
  114. {
  115. /* get maximum fd */
  116. maxfdp1 = sockfd + 1;
  117. session = session_list;
  118. while (session != RT_NULL)
  119. {
  120. if (maxfdp1 < session->sockfd + 1)
  121. maxfdp1 = session->sockfd + 1;
  122. FD_SET(session->sockfd, &readfds);
  123. session = session->next;
  124. }
  125. tmpfds=readfds;
  126. if (select(maxfdp1, &tmpfds, 0, 0, 0) == 0) continue;
  127. if(FD_ISSET(sockfd, &tmpfds))
  128. {
  129. int com_socket;
  130. struct sockaddr_in remote;
  131. com_socket = accept(sockfd, (struct sockaddr*)&remote, &addr_len);
  132. if(com_socket == -1)
  133. {
  134. rt_kprintf("Error on accept()\nContinuing...\n");
  135. continue;
  136. }
  137. else
  138. {
  139. rt_kprintf("Got connection from %s\n", inet_ntoa(remote.sin_addr));
  140. send(com_socket, FTP_WELCOME_MSG, strlen(FTP_WELCOME_MSG), 0);
  141. FD_SET(com_socket, &readfds);
  142. /* new session */
  143. session = ftp_new_session();
  144. if (session != NULL)
  145. {
  146. strcpy(session->currentdir, FTP_SRV_ROOT);
  147. session->sockfd = com_socket;
  148. session->remote = remote;
  149. }
  150. }
  151. }
  152. {
  153. struct ftp_session* next;
  154. session = session_list;
  155. while (session != NULL)
  156. {
  157. next = session->next;
  158. if (FD_ISSET(session->sockfd, &tmpfds))
  159. {
  160. numbytes=recv(session->sockfd, buffer, FTP_BUFFER_SIZE, 0);
  161. if(numbytes==0 || numbytes==-1)
  162. {
  163. rt_kprintf("Client %s disconnected\n", inet_ntoa(session->remote.sin_addr));
  164. FD_CLR(session->sockfd, &readfds);
  165. closesocket(session->sockfd);
  166. ftp_close_session(session);
  167. }
  168. else
  169. {
  170. buffer[numbytes]=0;
  171. if(ftp_process_request(session, buffer)==-1)
  172. {
  173. rt_kprintf("Client %s disconnected\r\n", inet_ntoa(session->remote.sin_addr));
  174. closesocket(session->sockfd);
  175. ftp_close_session(session);
  176. }
  177. }
  178. }
  179. session = next;
  180. }
  181. }
  182. }
  183. // rt_free(buffer);
  184. }
  185. static int do_list(char* directory, int sockfd)
  186. {
  187. DIR* dirp;
  188. struct dirent* entry;
  189. char line_buffer[256], line_length;
  190. #ifdef _WIN32
  191. struct _stat s;
  192. #else
  193. struct stat s;
  194. #endif
  195. dirp = opendir(directory);
  196. if (dirp == NULL)
  197. {
  198. line_length = rt_sprintf(line_buffer, "500 Internal Error\r\n");
  199. send(sockfd, line_buffer, line_length, 0);
  200. return -1;
  201. }
  202. while (1)
  203. {
  204. entry = readdir(dirp);
  205. if (entry == NULL) break;
  206. rt_sprintf(line_buffer, "%s/%s", directory, entry->d_name);
  207. #ifdef _WIN32
  208. if (_stat(line_buffer, &s) ==0)
  209. #else
  210. if (stat(line_buffer, &s) == 0)
  211. #endif
  212. {
  213. if (s.st_mode & S_IFDIR)
  214. line_length = rt_sprintf(line_buffer, "drw-r--r-- 1 admin admin %d Jan 1 2000 %s\r\n", 0, entry->d_name);
  215. else
  216. line_length = rt_sprintf(line_buffer, "-rw-r--r-- 1 admin admin %d Jan 1 2000 %s\r\n", s.st_size, entry->d_name);
  217. send(sockfd, line_buffer, line_length, 0);
  218. }
  219. else
  220. {
  221. rt_kprintf("Get directory entry error\n");
  222. break;
  223. }
  224. }
  225. closedir(dirp);
  226. return 0;
  227. }
  228. static int do_simple_list(char* directory, int sockfd)
  229. {
  230. DIR* dirp;
  231. struct dirent* entry;
  232. char line_buffer[256], line_length;
  233. dirp = opendir(directory);
  234. if (dirp == NULL)
  235. {
  236. line_length = rt_sprintf(line_buffer, "500 Internal Error\r\n");
  237. send(sockfd, line_buffer, line_length, 0);
  238. return -1;
  239. }
  240. while (1)
  241. {
  242. entry = readdir(dirp);
  243. if (entry == NULL) break;
  244. line_length = rt_sprintf(line_buffer, "%s\r\n", entry->d_name);
  245. send(sockfd, line_buffer, line_length, 0);
  246. }
  247. closedir(dirp);
  248. return 0;
  249. }
  250. static int str_begin_with(char* src, char* match)
  251. {
  252. while (*match)
  253. {
  254. /* check source */
  255. if (*src == 0) return -1;
  256. if (*match != *src) return -1;
  257. match ++; src ++;
  258. }
  259. return 0;
  260. }
  261. static int ftp_process_request(struct ftp_session* session, char *buf)
  262. {
  263. int fd;
  264. struct timeval tv;
  265. fd_set readfds;
  266. char filename[256];
  267. int numbytes;
  268. char *sbuf;
  269. char *parameter_ptr, *ptr;
  270. rt_uint32_t addr_len = sizeof(struct sockaddr_in);
  271. struct sockaddr_in local, pasvremote;
  272. sbuf =(char *)rt_malloc(FTP_BUFFER_SIZE);
  273. tv.tv_sec=3, tv.tv_usec=0;
  274. local.sin_family=PF_INET;
  275. local.sin_addr.s_addr=INADDR_ANY;
  276. /* remove \r\n */
  277. ptr = buf;
  278. while (*ptr)
  279. {
  280. if (*ptr == '\r' || *ptr == '\n') *ptr = 0;
  281. ptr ++;
  282. }
  283. /* get request parameter */
  284. parameter_ptr = strchr(buf, ' '); if (parameter_ptr != NULL) parameter_ptr ++;
  285. // debug:
  286. rt_kprintf("%s requested: \"%s\"\n", inet_ntoa(session->remote.sin_addr), buf);
  287. //
  288. //-----------------------
  289. if(str_begin_with(buf, "USER")==0)
  290. {
  291. rt_kprintf("%s sent login \"%s\"\n", inet_ntoa(session->remote.sin_addr), parameter_ptr);
  292. // login correct
  293. if(strcmp(parameter_ptr, "anonymous") == 0)
  294. {
  295. session->is_anonymous = RT_TRUE;
  296. rt_sprintf(sbuf, "331 Anonymous login OK send e-mail address for password.\r\n", parameter_ptr);
  297. send(session->sockfd, sbuf, strlen(sbuf), 0);
  298. }
  299. else if (strcmp(parameter_ptr, FTP_USER) == 0)
  300. {
  301. session->is_anonymous = RT_FALSE;
  302. rt_sprintf(sbuf, "331 Password required for %s\r\n", parameter_ptr);
  303. send(session->sockfd, sbuf, strlen(sbuf), 0);
  304. }
  305. else
  306. {
  307. // incorrect login
  308. rt_sprintf(sbuf, "530 Login incorrect. Bye.\r\n");
  309. send(session->sockfd, sbuf, strlen(sbuf), 0);
  310. rt_free(sbuf);
  311. return -1;
  312. }
  313. return 0;
  314. }
  315. else if(str_begin_with(buf, "PASS")==0)
  316. {
  317. rt_kprintf("%s sent password \"%s\"\n", inet_ntoa(session->remote.sin_addr), parameter_ptr);
  318. if (strcmp(parameter_ptr, FTP_PASSWORD)==0 ||
  319. session->is_anonymous == RT_TRUE)
  320. {
  321. // password correct
  322. rt_sprintf(sbuf, "230 User logged in\r\n");
  323. send(session->sockfd, sbuf, strlen(sbuf), 0);
  324. rt_free(sbuf);
  325. return 0;
  326. }
  327. // incorrect password
  328. rt_sprintf(sbuf, "530 Login or Password incorrect. Bye!\r\n");
  329. send(session->sockfd, sbuf, strlen(sbuf), 0);
  330. rt_free(sbuf);
  331. return -1;
  332. }
  333. else if(str_begin_with(buf, "LIST")==0 )
  334. {
  335. memset(sbuf,0,FTP_BUFFER_SIZE);
  336. rt_sprintf(sbuf, "150 Opening Binary mode connection for file list.\r\n");
  337. send(session->sockfd, sbuf, strlen(sbuf), 0);
  338. do_list(session->currentdir, session->pasv_sockfd);
  339. closesocket(session->pasv_sockfd);
  340. session->pasv_active = 0;
  341. rt_sprintf(sbuf, "226 Transfert Complete.\r\n");
  342. send(session->sockfd, sbuf, strlen(sbuf), 0);
  343. }
  344. else if(str_begin_with(buf, "NLST")==0 )
  345. {
  346. memset(sbuf, 0, FTP_BUFFER_SIZE);
  347. rt_sprintf(sbuf, "150 Opening Binary mode connection for file list.\r\n");
  348. send(session->sockfd, sbuf, strlen(sbuf), 0);
  349. do_simple_list(session->currentdir, session->pasv_sockfd);
  350. closesocket(session->pasv_sockfd);
  351. session->pasv_active = 0;
  352. rt_sprintf(sbuf, "226 Transfert Complete.\r\n");
  353. send(session->sockfd, sbuf, strlen(sbuf), 0);
  354. }
  355. else if(str_begin_with(buf, "PWD")==0 || str_begin_with(buf, "XPWD")==0)
  356. {
  357. rt_sprintf(sbuf, "257 \"%s\" is current directory.\r\n", session->currentdir);
  358. send(session->sockfd, sbuf, strlen(sbuf), 0);
  359. }
  360. else if(str_begin_with(buf, "TYPE")==0)
  361. {
  362. // Ignore it
  363. if(strcmp(parameter_ptr, "I")==0)
  364. {
  365. rt_sprintf(sbuf, "200 Type set to binary.\r\n");
  366. send(session->sockfd, sbuf, strlen(sbuf), 0);
  367. }
  368. else
  369. {
  370. rt_sprintf(sbuf, "200 Type set to ascii.\r\n");
  371. send(session->sockfd, sbuf, strlen(sbuf), 0);
  372. }
  373. }
  374. else if(str_begin_with(buf, "PASV")==0)
  375. {
  376. int dig1, dig2;
  377. int sockfd;
  378. char optval='1';
  379. session->pasv_port = 10000;
  380. session->pasv_active = 1;
  381. local.sin_port=htons(session->pasv_port);
  382. local.sin_addr.s_addr=INADDR_ANY;
  383. dig1 = (int)(session->pasv_port/256);
  384. dig2 = session->pasv_port % 256;
  385. FD_ZERO(&readfds);
  386. if((sockfd=socket(PF_INET, SOCK_STREAM, 0))==-1)
  387. {
  388. rt_sprintf(sbuf, "425 Can't open data connection.\r\n");
  389. send(session->sockfd, sbuf, strlen(sbuf), 0);
  390. goto err1;
  391. }
  392. if(setsockopt(sockfd, SOL_SOCKET, SO_REUSEADDR, &optval, sizeof(optval))==-1)
  393. {
  394. rt_sprintf(sbuf, "425 Can't open data connection.\r\n");
  395. send(session->sockfd, sbuf, strlen(sbuf), 0);
  396. goto err1;
  397. }
  398. if(bind(sockfd, (struct sockaddr *)&local, addr_len)==-1)
  399. {
  400. rt_sprintf(sbuf, "425 Can't open data connection.\r\n");
  401. send(session->sockfd, sbuf, strlen(sbuf), 0);
  402. goto err1;
  403. }
  404. if(listen(sockfd, 1)==-1)
  405. {
  406. rt_sprintf(sbuf, "425 Can't open data connection.\r\n");
  407. send(session->sockfd, sbuf, strlen(sbuf), 0);
  408. goto err1;
  409. }
  410. rt_kprintf("Listening %d seconds @ port %d\n", tv.tv_sec, session->pasv_port);
  411. rt_sprintf(sbuf, "227 Entering passive mode (%d,%d,%d,%d,%d,%d)\r\n", 127, 0, 0, 1, dig1, dig2);
  412. send(session->sockfd, sbuf, strlen(sbuf), 0);
  413. FD_SET(sockfd, &readfds);
  414. select(0, &readfds, 0, 0, &tv);
  415. if(FD_ISSET(sockfd, &readfds))
  416. {
  417. if((session->pasv_sockfd = accept(sockfd, (struct sockaddr*)&pasvremote, &addr_len))==-1)
  418. {
  419. rt_sprintf(sbuf, "425 Can't open data connection.\r\n");
  420. send(session->sockfd, sbuf, strlen(sbuf), 0);
  421. goto err1;
  422. }
  423. else
  424. {
  425. rt_kprintf("Got Data(PASV) connection from %s\n", inet_ntoa(pasvremote.sin_addr));
  426. session->pasv_active = 1;
  427. closesocket(sockfd);
  428. }
  429. }
  430. else
  431. {
  432. err1:
  433. closesocket(session->pasv_sockfd);
  434. session->pasv_active = 0;
  435. rt_free(sbuf);
  436. return 0;
  437. }
  438. }
  439. else if (str_begin_with(buf, "RETR")==0)
  440. {
  441. int file_size;
  442. strcpy(filename, buf + 5);
  443. build_full_path(session, parameter_ptr, filename, 256);
  444. file_size = ftp_get_filesize(filename);
  445. if (file_size == -1)
  446. {
  447. rt_sprintf(sbuf, "550 \"%s\" : not a regular file\r\n", filename);
  448. send(session->sockfd, sbuf, strlen(sbuf), 0);
  449. session->offset=0;
  450. rt_free(sbuf);
  451. return 0;
  452. }
  453. fd = open(filename, O_RDONLY, 0);
  454. if (fd < 0)
  455. {
  456. rt_free(sbuf);
  457. return 0;
  458. }
  459. if(session->offset>0 && session->offset < file_size)
  460. {
  461. lseek(fd, session->offset, SEEK_SET);
  462. rt_sprintf(sbuf, "150 Opening binary mode data connection for partial \"%s\" (%d/%d bytes).\r\n",
  463. filename, file_size - session->offset, file_size);
  464. }
  465. else
  466. {
  467. rt_sprintf(sbuf, "150 Opening binary mode data connection for \"%s\" (%d bytes).\r\n", filename, file_size);
  468. }
  469. send(session->sockfd, sbuf, strlen(sbuf), 0);
  470. while((numbytes = read(fd, sbuf, FTP_BUFFER_SIZE))>0)
  471. {
  472. send(session->pasv_sockfd, sbuf, numbytes, 0);
  473. }
  474. rt_sprintf(sbuf, "226 Finished.\r\n");
  475. send(session->sockfd, sbuf, strlen(sbuf), 0);
  476. close(fd);
  477. closesocket(session->pasv_sockfd);
  478. }
  479. else if (str_begin_with(buf, "STOR")==0)
  480. {
  481. if(session->is_anonymous == RT_TRUE)
  482. {
  483. rt_sprintf(sbuf, "550 Permission denied.\r\n");
  484. send(session->sockfd, sbuf, strlen(sbuf), 0);
  485. rt_free(sbuf);
  486. return 0;
  487. }
  488. build_full_path(session, parameter_ptr, filename, 256);
  489. fd = open(filename, O_WRONLY | O_CREAT | O_TRUNC, 0);
  490. if(fd < 0)
  491. {
  492. rt_sprintf(sbuf, "550 Cannot open \"%s\" for writing.\r\n", filename);
  493. send(session->sockfd, sbuf, strlen(sbuf), 0);
  494. rt_free(sbuf);
  495. return 0;
  496. }
  497. rt_sprintf(sbuf, "150 Opening binary mode data connection for \"%s\".\r\n", filename);
  498. send(session->sockfd, sbuf, strlen(sbuf), 0);
  499. FD_ZERO(&readfds);
  500. FD_SET(session->pasv_sockfd, &readfds);
  501. rt_kprintf("Waiting %d seconds for data...\n", tv.tv_sec);
  502. while(select(session->pasv_sockfd+1, &readfds, 0, 0, &tv)>0 )
  503. {
  504. if((numbytes=recv(session->pasv_sockfd, sbuf, FTP_BUFFER_SIZE, 0))>0)
  505. {
  506. write(fd, sbuf, numbytes);
  507. }
  508. else if(numbytes==0)
  509. {
  510. close(fd);
  511. closesocket(session->pasv_sockfd);
  512. rt_sprintf(sbuf, "226 Finished.\r\n");
  513. send(session->sockfd, sbuf, strlen(sbuf), 0);
  514. break;
  515. }
  516. else if(numbytes==-1)
  517. {
  518. close(fd);
  519. closesocket(session->pasv_sockfd);
  520. rt_free(sbuf);
  521. return -1;
  522. }
  523. }
  524. closesocket(session->pasv_sockfd);
  525. }
  526. else if(str_begin_with(buf, "SIZE")==0)
  527. {
  528. int file_size;
  529. build_full_path(session, parameter_ptr, filename, 256);
  530. file_size = ftp_get_filesize(filename);
  531. if( file_size == -1)
  532. {
  533. rt_sprintf(sbuf, "550 \"%s\" : not a regular file\r\n", filename);
  534. send(session->sockfd, sbuf, strlen(sbuf), 0);
  535. }
  536. else
  537. {
  538. rt_sprintf(sbuf, "213 %d\r\n", file_size);
  539. send(session->sockfd, sbuf, strlen(sbuf), 0);
  540. }
  541. }
  542. else if(str_begin_with(buf, "MDTM")==0)
  543. {
  544. rt_sprintf(sbuf, "550 \"/\" : not a regular file\r\n");
  545. send(session->sockfd, sbuf, strlen(sbuf), 0);
  546. }
  547. else if(str_begin_with(buf, "SYST")==0)
  548. {
  549. rt_sprintf(sbuf, "215 %s\r\n", "RT-Thread RTOS");
  550. send(session->sockfd, sbuf, strlen(sbuf), 0);
  551. }
  552. else if(str_begin_with(buf, "CWD")==0)
  553. {
  554. build_full_path(session, parameter_ptr, filename, 256);
  555. rt_sprintf(sbuf, "250 Changed to directory \"%s\"\r\n", filename);
  556. send(session->sockfd, sbuf, strlen(sbuf), 0);
  557. strcpy(session->currentdir, filename);
  558. rt_kprintf("Changed to directory %s", filename);
  559. }
  560. else if(str_begin_with(buf, "CDUP")==0)
  561. {
  562. rt_sprintf(filename, "%s/%s", session->currentdir, "..");
  563. rt_sprintf(sbuf, "250 Changed to directory \"%s\"\r\n", filename);
  564. send(session->sockfd, sbuf, strlen(sbuf), 0);
  565. strcpy(session->currentdir, filename);
  566. rt_kprintf("Changed to directory %s", filename);
  567. }
  568. else if(str_begin_with(buf, "PORT")==0)
  569. {
  570. int i;
  571. int portcom[6];
  572. char tmpip[100];
  573. i=0;
  574. portcom[i++]=atoi(strtok(parameter_ptr, ".,;()"));
  575. for(;i<6;i++)
  576. portcom[i]=atoi(strtok(0, ".,;()"));
  577. rt_sprintf(tmpip, "%d.%d.%d.%d", portcom[0], portcom[1], portcom[2], portcom[3]);
  578. FD_ZERO(&readfds);
  579. if((session->pasv_sockfd=socket(AF_INET, SOCK_STREAM, 0))==-1)
  580. {
  581. rt_sprintf(sbuf, "425 Can't open data connection.\r\n");
  582. send(session->sockfd, sbuf, strlen(sbuf), 0);
  583. closesocket(session->pasv_sockfd);
  584. session->pasv_active = 0;
  585. rt_free(sbuf);
  586. return 0;
  587. }
  588. pasvremote.sin_addr.s_addr=inet_addr(tmpip);
  589. pasvremote.sin_port=htons(portcom[4] * 256 + portcom[5]);
  590. pasvremote.sin_family=PF_INET;
  591. if(connect(session->pasv_sockfd, (struct sockaddr *)&pasvremote, addr_len)==-1)
  592. {
  593. // is it only local address?try using gloal ip addr
  594. pasvremote.sin_addr=session->remote.sin_addr;
  595. if(connect(session->pasv_sockfd, (struct sockaddr *)&pasvremote, addr_len)==-1)
  596. {
  597. rt_sprintf(sbuf, "425 Can't open data connection.\r\n");
  598. send(session->sockfd, sbuf, strlen(sbuf), 0);
  599. closesocket(session->pasv_sockfd);
  600. rt_free(sbuf);
  601. return 0;
  602. }
  603. }
  604. session->pasv_active=1;
  605. session->pasv_port = portcom[4] * 256 + portcom[5];
  606. rt_kprintf("Connected to Data(PORT) %s @ %d\n", tmpip, portcom[4] * 256 + portcom[5]);
  607. rt_sprintf(sbuf, "200 Port Command Successful.\r\n");
  608. send(session->sockfd, sbuf, strlen(sbuf), 0);
  609. }
  610. else if(str_begin_with(buf, "REST")==0)
  611. {
  612. if(atoi(parameter_ptr)>=0)
  613. {
  614. session->offset=atoi(parameter_ptr);
  615. rt_sprintf(sbuf, "350 Send RETR or STOR to start transfert.\r\n");
  616. send(session->sockfd, sbuf, strlen(sbuf), 0);
  617. }
  618. }
  619. else if(str_begin_with(buf, "MKD")==0)
  620. {
  621. if (session->is_anonymous == RT_TRUE)
  622. {
  623. rt_sprintf(sbuf, "550 Permission denied.\r\n");
  624. send(session->sockfd, sbuf, strlen(sbuf), 0);
  625. rt_free(sbuf);
  626. return 0;
  627. }
  628. build_full_path(session, parameter_ptr, filename, 256);
  629. if(mkdir(filename, 0) == -1)
  630. {
  631. rt_sprintf(sbuf, "550 File \"%s\" exists.\r\n", filename);
  632. send(session->sockfd, sbuf, strlen(sbuf), 0);
  633. }
  634. else
  635. {
  636. rt_sprintf(sbuf, "257 directory \"%s\" successfully created.\r\n", filename);
  637. send(session->sockfd, sbuf, strlen(sbuf), 0);
  638. }
  639. }
  640. else if(str_begin_with(buf, "DELE")==0)
  641. {
  642. if (session->is_anonymous == RT_TRUE)
  643. {
  644. rt_sprintf(sbuf, "550 Permission denied.\r\n");
  645. send(session->sockfd, sbuf, strlen(sbuf), 0);
  646. rt_free(sbuf);
  647. return 0;
  648. }
  649. build_full_path(session, parameter_ptr, filename, 256);
  650. if(unlink(filename)==0)
  651. rt_sprintf(sbuf, "250 Successfully deleted file \"%s\".\r\n", filename);
  652. else
  653. {
  654. rt_sprintf(sbuf, "550 Not such file or directory: %s.\r\n", filename);
  655. }
  656. send(session->sockfd, sbuf, strlen(sbuf), 0);
  657. }
  658. else if(str_begin_with(buf, "RMD")==0)
  659. {
  660. if (session->is_anonymous == RT_TRUE)
  661. {
  662. rt_sprintf(sbuf, "550 Permission denied.\r\n");
  663. send(session->sockfd, sbuf, strlen(sbuf), 0);
  664. rt_free(sbuf);
  665. return 0;
  666. }
  667. build_full_path(session, parameter_ptr, filename, 256);
  668. if(unlink(filename) == -1)
  669. {
  670. rt_sprintf(sbuf, "550 Directory \"%s\" doesn't exist.\r\n", filename);
  671. send(session->sockfd, sbuf, strlen(sbuf), 0);
  672. }
  673. else
  674. {
  675. rt_sprintf(sbuf, "257 directory \"%s\" successfully deleted.\r\n", filename);
  676. send(session->sockfd, sbuf, strlen(sbuf), 0);
  677. }
  678. }
  679. else if(str_begin_with(buf, "QUIT")==0)
  680. {
  681. rt_sprintf(sbuf, "221 Bye!\r\n");
  682. send(session->sockfd, sbuf, strlen(sbuf), 0);
  683. rt_free(sbuf);
  684. return -1;
  685. }
  686. else
  687. {
  688. rt_sprintf(sbuf, "502 Not Implemented.\r\n");
  689. send(session->sockfd, sbuf, strlen(sbuf), 0);
  690. }
  691. rt_free(sbuf);
  692. return 0;
  693. }
  694. void ftpd_start()
  695. {
  696. rt_thread_t tid;
  697. tid = rt_thread_create("ftpd",
  698. ftpd_thread_entry, RT_NULL,
  699. 4096, 30, 5);
  700. if (tid != RT_NULL) rt_thread_startup(tid);
  701. }
  702. #ifdef RT_USING_FINSH
  703. #include <finsh.h>
  704. FINSH_FUNCTION_EXPORT(ftpd_start, start ftp server)
  705. #endif