4 * rcfile_l.l -- lexer for the run control file, to be used with GNU flex.
6 * For license terms, see the file COPYING in this directory.
10 #include "fetchmail.h"
19 #define SETSTATE(n) do {BEGIN(n); if (yydebug) fprintf(stderr, "Entering lexer state %d\n", n);} while (0)
21 #define SETSTATE(n) BEGIN(n)
28 %option nounput noyywrap
29 %option warn nodefault
38 char *in = xstrndup(yytext+1, yyleng-2);
45 <NAME>[^=;:, \t\r\n]+ {
46 char *in = xstrdup(yytext);
54 logfile { return LOGFILE; }
55 idfile { return IDFILE; }
56 pidfile { return PIDFILE; }
57 daemon { return DAEMON; }
58 syslog { return SYSLOG; }
59 invisible { return INVISIBLE; }
60 showdots { return SHOWDOTS; }
61 postmaster { return POSTMASTER; }
62 bouncemail { return BOUNCEMAIL; }
63 spambounce { return SPAMBOUNCE; }
64 softbounce { return SOFTBOUNCE; }
65 warnings { return WARNINGS; }
66 tracepolls { return TRACEPOLLS; }
68 defaults { return DEFAULTS; }
69 server { return POLL; }
74 local(domains)? { return LOCALDOMAINS; }
75 proto(col)? { return PROTOCOL; }
76 service { return SERVICE; }
78 interval { return INTERVAL; }
79 preauth(enticate)? { SETSTATE(AUTH); return AUTHENTICATE; }
80 auth(enticate)? { SETSTATE(AUTH); return AUTHENTICATE; }
81 any { SETSTATE(0); yylval.proto = A_ANY; return AUTHTYPE;}
82 gssapi { SETSTATE(0); yylval.proto = A_GSSAPI; return AUTHTYPE;}
83 kerberos(_v)?5 { SETSTATE(0); yylval.proto = A_KERBEROS_V5; return AUTHTYPE;}
84 kerberos { SETSTATE(0); yylval.proto = A_KERBEROS_V5; return AUTHTYPE;}
85 ssh { SETSTATE(0); yylval.proto = A_SSH; return AUTHTYPE;}
86 external { SETSTATE(0); yylval.proto = A_EXTERNAL; return AUTHTYPE;}
87 (otp|opie) { SETSTATE(0); yylval.proto = A_OTP; return AUTHTYPE;}
88 cram(-md5)? { SETSTATE(0); yylval.proto = A_CRAM_MD5; return AUTHTYPE;}
89 msn { SETSTATE(0); yylval.proto = A_MSN; return AUTHTYPE;}
90 ntlm { SETSTATE(0); yylval.proto = A_NTLM; return AUTHTYPE;}
91 <AUTH>password { SETSTATE(0); yylval.proto = A_PASSWORD; return AUTHTYPE;}
92 timeout { return TIMEOUT;}
93 envelope { return ENVELOPE; }
94 qvirtual { return QVIRTUAL; }
95 principal { return PRINCIPAL; }
96 esmtpname { return ESMTPNAME; }
97 esmtppassword { return ESMTPPASSWORD; }
98 bad-header { return BADHEADER; }
99 accept { return ACCEPT; }
100 reject { return REJECT_; }
102 user(name)? {SETSTATE(NAME); return USERNAME; }
103 pwmd_socket { return PWMD_SOCKET; }
104 pwmd_file { return PWMD_FILE; }
105 pinentry_timeout { return PINENTRY_TIMEOUT; }
106 <INITIAL,NAME>pass(word)? {SETSTATE(NAME); return PASSWORD; }
107 folder(s)? { return FOLDER; }
108 smtp(host)? { return SMTPHOST; }
109 fetchdomains { return FETCHDOMAINS; }
110 smtpaddress { return SMTPADDRESS; }
111 smtpname { return SMTPNAME; }
112 antispam { return SPAMRESPONSE; }
114 bsmtp { return BSMTP; }
115 lmtp { return LMTP; }
116 pre(connect)? { return PRECONNECT; }
117 post(connect)? { return POSTCONNECT; }
118 interface { return INTERFACE; }
119 monitor { return MONITOR; }
120 plugin { return PLUGIN; }
121 plugout { return PLUGOUT; }
122 batchlimit { return BATCHLIMIT; }
123 fetchlimit { return FETCHLIMIT; }
124 fetchsizelimit { return FETCHSIZELIMIT; }
125 fastuidl { return FASTUIDL; }
126 expunge { return EXPUNGE; }
127 properties { return PROPERTIES; }
129 is { SETSTATE(NAME); return IS; }
130 here { return HERE; }
131 there { return THERE; }
132 to { SETSTATE(NAME); return TO; }
133 = { SETSTATE(NAME); return MAP; }
159 keep { return KEEP; }
160 flush { return FLUSH; }
161 limitflush { return LIMITFLUSH; }
162 fetchall { return FETCHALL; }
163 rewrite { return REWRITE; }
164 forcecr { return FORCECR; }
165 stripcr { return STRIPCR; }
166 pass8(bits)? { return PASS8BITS; }
167 dropstatus { return DROPSTATUS; }
168 dropdelivered { return DROPDELIVERED; }
169 mimedec(ode)? { return MIMEDECODE; }
170 idle { return IDLE; }
172 uidl { return UIDL; }
174 sslkey { return SSLKEY; }
175 sslcert { return SSLCERT; }
176 sslproto { return SSLPROTO; }
177 sslcertck { return SSLCERTCK; }
178 sslcertfile { return SSLCERTFILE; }
179 sslcertpath { return SSLCERTPATH; }
180 sslcommonname { return SSLCOMMONNAME; }
181 sslfingerprint { return SSLFINGERPRINT; }
182 checkalias { return CHECKALIAS; }
184 limit { return LIMIT; }
190 options {/* EMPTY */}
193 (auto)|(AUTO) { yylval.proto = P_AUTO; return PROTO; }
194 (sdps)|(SDPS) { return SDPS; }
195 (pop3)|(POP3) { yylval.proto = P_POP3; return PROTO; }
196 (imap)|(IMAP) { yylval.proto = P_IMAP; return PROTO; }
197 (apop)|(APOP) { yylval.proto = P_APOP; return PROTO; }
198 (etrn)|(ETRN) { yylval.proto = P_ETRN; return PROTO; }
199 (odmr)|(ODMR) { yylval.proto = P_ODMR; return PROTO; }
200 (kpop)|(KPOP) { return KPOP; }
202 (#.*)?\\?\n { prc_lineno++; } /* newline is ignored */
204 -?[0-9]+ { yylval.number = atoi(yytext); return NUMBER; }
207 char *in = xstrdup(yytext);
213 [ \t\r]+ ; /* whitespace */
217 /** process standard C-style escape sequences in a string,
218 * this can never lengthen the output, so cp and tp may overlap as long
220 void escapes(const char *cp /** source string with escapes */,
221 char *tp /** target buffer for digested string */)
227 /* we MUST check for NUL explicitly, as strchr(string, 0) will
229 if (*cp == '\\' && cp[1] && strchr("0123456789xX", cp[1]))
232 const char *hex = "00112233445566778899aAbBcCdDeEfF";
235 if (*++cp == 'x' || *cp == 'X')
236 for (++cp; *cp && (dp = strchr(hex, *cp)) && (dcount++ < 2); cp++)
237 cval = (cval * 16) + (dp - hex) / 2;
239 while (*cp && strchr("01234567",*cp) != (char*)NULL && (dcount++ < 3))
240 cval = (cval * 8) + (*cp++ - '0');
242 while (*cp && (strchr("0123456789",*cp)!=(char*)NULL)&&(dcount++ < 3))
243 cval = (cval * 10) + (*cp++ - '0');
245 else if (*cp == '\\') /* C-style character escapes */
249 case '\n': cp++; continue; /* backslash before LF to join lines */
250 case '\0': goto done; /* ignore backslash at file end */
251 case '\\': cval = '\\'; break;
252 case 'n': cval = '\n'; break;
253 case 't': cval = '\t'; break;
254 case 'b': cval = '\b'; break;
255 case 'r': cval = '\r'; break;