Action()
{
char *BufVal;
char portinfo[8];
char cLowVal[8];
lrs_send("socket0", "pasvbuf0", LrsLastArg);
lrs_receive("socket0", "pasvbuf1", LrsLastArg);
lrs_get_last_received_buffer("socket0",&BufVal,&iLength);
lr_output_message("The buffer is:%s", BufVal);
// lr_output_message("PortNum Conetnt %s", PortNum);
for(i=0,j=40;i<3;i++,j++)
{
cHighVal[i]=PortNum[j];
}
lr_output_message("cHignVal conent %s",cHighVal);
token=strtok(lr_._string(&PortNum[j]),")");
if(token != NULL)
strcpy(cLowVal,token);
lr_output_message("cLowVal is:%s",cLowVal);
iVal=atoi(cHighVal)*256+atoi(cLowVal);
lr_output_message("cHighVal*256 id %d",atoi(cHighVal)*256);
lr_output_message("iVal %d",iVal);
// lr_output_message("cVal %s",itoa(iVal,cVal,10));
itoa(iVal,cVal,10);
lr_output_message("cVal %s",cVal);
//set the propority's value
lr_save_string(cVal,"portinfo");
//strcpy(&portinfo,&cVal);
//lr_output_message("portinfo is :%s",portinfo);
lrs_create_socket("socket1", "TCP", "LocalHost=0", "RemoteHost=192.168.0.100:21", LrsLastArg);
lrs_send("socket1", "vpnbuf1", LrsLastArg);
}
send vpnbuf0 81
"CONNECT 35622ebb TAURUS/1.0\r\n"
"COOKIE: TaurusSessionID=w1mO0LX84O7EHLnQwBmw6g==\r\n\r\n"
"CONNECT OK TAURUS/1.0\r\n"
"220 (vsFTPd 1.1.3)\r\n"
"USER libh\r\n"
"331 Please specify the password.\r\n"
"PASS 1111\r\n"
"230 Login successful. Have fun.\r\n"
"PASV\r\n"
"227 Entering Passive Mode (192,168,0,16,113,74)\r\n"
"CONNECT 35622ebb:<portinfo> TAURUS/1.0\r\n"
"COOKIE: TaurusSessionID=w1mO0LX84O7EHLnQwBmw6g==\r\n\r\n"
"CONNECT OK TAURUS/1.0\r\n"
"STOR 100k.doc\r\n"
"150 Ok to send data.\r\n"
"226 File receive OK.\r\n"
"QUIT\r\n"
"221 Goodbye.\r\n"
-1
















