I removed the swapactive.. as it's too easy to exploit (if you manage to create exploitable script [= do not use proper parameter checking])
iputs "Opening userfile"
if { [userfile open "darkone"] == 0 } {
iputs "Open!"
iputs [userfile bin2ascii]
}
ascii2bin converts file from bin2ascii form to binary userfile structure. (updates userfile in ioftpd) In another words:
userfile open "darkone"
userfile lock
set foo [userfile bin2ascii]
# do something with $foo
ascii2bin "$foo"
userfile unlock
updates userfile for darkone
it can't get much easier than that
[17:36:16] [L] 200-Opening userfile
[17:36:16] [L] 200-Open!
[17:36:16] [L] 200-wkup 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
[17:36:16] [L] wkdn 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
[17:36:16] [L] tagline baz00ka
[17:36:16] [L] ratio 0 3 3 3 3 3 3 3 3 0
[17:36:16] [L] password 89bd21f83054d45f030018f148021306cdcbdb68
[17:36:16] [L] monthup 0 0 0 10 19437 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
[17:36:16] [L] monthdn 13 600128 10 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
[17:36:16] [L] limits 1 1 4 2 4
[17:36:16] [L] ips darkone@127.0.0.1 darkone@192.168.1.10 *@debian darkone@spawn
[17:36:16] [L] home /home/darkone
[17:36:16] [L] groups 100
[17:36:16] [L] flags 3HG
[17:36:16] [L] dayup 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
[17:36:16] [L] daydn 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
[17:36:16] [L] credits 14000 0 0 0 0 0 0 0 0 0
[17:36:16] [L] allup 0 0 0 10 19437 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
[17:36:16] [L] alldn 13 600128 10 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
[17:36:16] [L] admingroups 100
[17:36:16] [L] 200 Command successful.