4 * rcfile_l.l -- lexer for the run control file, to be used with GNU flex.
6 * For license terms, see the file COPYING in this directory.
11 #include "fetchmail.h"
18 #define SETSTATE(n) do {BEGIN(n); if (yydebug) fprintf(stderr, "Entering lexer state %d\n", n);} while (0)
20 #define SETSTATE(n) BEGIN(n)
27 %option nounput noyywrap
28 %option warn nodefault
37 char *in = xstrndup(yytext+1, yyleng-2);
44 <NAME>[^=;:, \t\r\n]+ {
45 char *in = xstrdup(yytext);
53 logfile { return LOGFILE; }
54 idfile { return IDFILE; }
55 pidfile { return PIDFILE; }
56 daemon { return DAEMON; }
57 syslog { return SYSLOG; }
58 invisible { return INVISIBLE; }
59 showdots { return SHOWDOTS; }
60 postmaster { return POSTMASTER; }
61 bouncemail { return BOUNCEMAIL; }
62 spambounce { return SPAMBOUNCE; }
63 softbounce { return SOFTBOUNCE; }
64 warnings { return WARNINGS; }
65 tracepolls { return TRACEPOLLS; }
67 defaults { return DEFAULTS; }
68 server { return POLL; }
73 local(domains)? { return LOCALDOMAINS; }
74 proto(col)? { return PROTOCOL; }
75 service { return SERVICE; }
77 interval { return INTERVAL; }
78 preauth(enticate)? { SETSTATE(AUTH); return AUTHENTICATE; }
79 auth(enticate)? { SETSTATE(AUTH); return AUTHENTICATE; }
80 any { SETSTATE(0); yylval.proto = A_ANY; return AUTHTYPE;}
81 gssapi { SETSTATE(0); yylval.proto = A_GSSAPI; return AUTHTYPE;}
82 kerberos(_v)?4 { SETSTATE(0); yylval.proto = A_KERBEROS_V4; return AUTHTYPE;}
83 kerberos(_v)?5 { SETSTATE(0); yylval.proto = A_KERBEROS_V5; return AUTHTYPE;}
84 kerberos { SETSTATE(0); yylval.proto = A_KERBEROS_V4; return AUTHTYPE;}
85 ssh { SETSTATE(0); yylval.proto = A_SSH; return AUTHTYPE;}
86 external { SETSTATE(0); yylval.proto = A_EXTERNAL; return AUTHTYPE;}
87 (otp|opie) { SETSTATE(0); yylval.proto = A_OTP; return AUTHTYPE;}
88 cram(-md5)? { SETSTATE(0); yylval.proto = A_CRAM_MD5; return AUTHTYPE;}
89 msn { SETSTATE(0); yylval.proto = A_MSN; return AUTHTYPE;}
90 ntlm { SETSTATE(0); yylval.proto = A_NTLM; return AUTHTYPE;}
91 <AUTH>password { SETSTATE(0); yylval.proto = A_PASSWORD; return AUTHTYPE;}
92 timeout { return TIMEOUT;}
93 envelope { return ENVELOPE; }
94 qvirtual { return QVIRTUAL; }
95 principal { return PRINCIPAL; }
96 esmtpname { return ESMTPNAME; }
97 esmtppassword { return ESMTPPASSWORD; }
98 bad-header { return BADHEADER; }
99 accept { return ACCEPT; }
100 reject { return REJECT_; }
102 user(name)? {SETSTATE(NAME); return USERNAME; }
103 <INITIAL,NAME>pass(word)? {SETSTATE(NAME); return PASSWORD; }
104 folder(s)? { return FOLDER; }
105 smtp(host)? { return SMTPHOST; }
106 fetchdomains { return FETCHDOMAINS; }
107 smtpaddress { return SMTPADDRESS; }
108 smtpname { return SMTPNAME; }
109 antispam { return SPAMRESPONSE; }
111 bsmtp { return BSMTP; }
112 lmtp { return LMTP; }
113 pre(connect)? { return PRECONNECT; }
114 post(connect)? { return POSTCONNECT; }
115 interface { return INTERFACE; }
116 monitor { return MONITOR; }
117 plugin { return PLUGIN; }
118 plugout { return PLUGOUT; }
119 batchlimit { return BATCHLIMIT; }
120 fetchlimit { return FETCHLIMIT; }
121 fetchsizelimit { return FETCHSIZELIMIT; }
122 fastuidl { return FASTUIDL; }
123 expunge { return EXPUNGE; }
124 properties { return PROPERTIES; }
126 is { SETSTATE(NAME); return IS; }
127 here { return HERE; }
128 there { return THERE; }
129 to { SETSTATE(NAME); return TO; }
130 = { SETSTATE(NAME); return MAP; }
156 keep { return KEEP; }
157 flush { return FLUSH; }
158 limitflush { return LIMITFLUSH; }
159 fetchall { return FETCHALL; }
160 rewrite { return REWRITE; }
161 forcecr { return FORCECR; }
162 stripcr { return STRIPCR; }
163 pass8(bits)? { return PASS8BITS; }
164 dropstatus { return DROPSTATUS; }
165 dropdelivered { return DROPDELIVERED; }
166 mimedec(ode)? { return MIMEDECODE; }
167 idle { return IDLE; }
169 uidl { return UIDL; }
171 sslkey { return SSLKEY; }
172 sslcert { return SSLCERT; }
173 sslproto { return SSLPROTO; }
174 sslcertck { return SSLCERTCK; }
175 sslcertfile { return SSLCERTFILE; }
176 sslcertpath { return SSLCERTPATH; }
177 sslcommonname { return SSLCOMMONNAME; }
178 sslfingerprint { return SSLFINGERPRINT; }
179 checkalias { return CHECKALIAS; }
181 limit { return LIMIT; }
187 options {/* EMPTY */}
190 (auto)|(AUTO) { yylval.proto = P_AUTO; return PROTO; }
191 (pop2)|(POP2) { yylval.proto = P_POP2; return PROTO; }
192 (sdps)|(SDPS) { return SDPS; }
193 (pop3)|(POP3) { yylval.proto = P_POP3; return PROTO; }
194 (imap)|(IMAP) { yylval.proto = P_IMAP; return PROTO; }
195 (apop)|(APOP) { yylval.proto = P_APOP; return PROTO; }
196 (rpop)|(RPOP) { yylval.proto = P_RPOP; return PROTO; }
197 (etrn)|(ETRN) { yylval.proto = P_ETRN; return PROTO; }
198 (odmr)|(ODMR) { yylval.proto = P_ODMR; return PROTO; }
199 (kpop)|(KPOP) { return KPOP; }
201 (#.*)?\\?\n { prc_lineno++; } /* newline is ignored */
203 -?[0-9]+ { yylval.number = atoi(yytext); return NUMBER; }
206 char *in = xstrdup(yytext);
212 [ \t\r]+ ; /* whitespace */
216 /** process standard C-style escape sequences in a string,
217 * this can never lengthen the output, so cp and tp may overlap as long
219 void escapes(const char *cp /** source string with escapes */,
220 char *tp /** target buffer for digested string */)
226 /* we MUST check for NUL explicitly, as strchr(string, 0) will
228 if (*cp == '\\' && cp[1] && strchr("0123456789xX", cp[1]))
231 const char *hex = "00112233445566778899aAbBcCdDeEfF";
234 if (*++cp == 'x' || *cp == 'X')
235 for (++cp; *cp && (dp = strchr(hex, *cp)) && (dcount++ < 2); cp++)
236 cval = (cval * 16) + (dp - hex) / 2;
238 while (*cp && strchr("01234567",*cp) != (char*)NULL && (dcount++ < 3))
239 cval = (cval * 8) + (*cp++ - '0');
241 while (*cp && (strchr("0123456789",*cp)!=(char*)NULL)&&(dcount++ < 3))
242 cval = (cval * 10) + (*cp++ - '0');
244 else if (*cp == '\\') /* C-style character escapes */
248 case '\n': cp++; continue; /* backslash before LF to join lines */
249 case '\0': goto done; /* ignore backslash at file end */
250 case '\\': cval = '\\'; break;
251 case 'n': cval = '\n'; break;
252 case 't': cval = '\t'; break;
253 case 'b': cval = '\b'; break;
254 case 'r': cval = '\r'; break;