busybox/networking/sendmail.c

675 lines
16 KiB
C
Raw Normal View History

2008-01-29 06:29:15 +05:30
/* vi: set sw=4 ts=4: */
/*
2008-02-08 23:54:54 +05:30
* bare bones sendmail/fetchmail
2008-01-29 06:29:15 +05:30
*
* Copyright (C) 2008 by Vladimir Dronnikov <dronnikov@gmail.com>
*
* Licensed under GPLv2, see file LICENSE in this tarball for details.
*/
#include "libbb.h"
2008-02-08 23:54:54 +05:30
#define INITIAL_STDIN_FILENO 3
2008-01-29 06:29:15 +05:30
static void uuencode(char *fname, const char *text)
2008-01-29 06:29:15 +05:30
{
2008-02-08 23:54:54 +05:30
enum {
SRC_BUF_SIZE = 45, /* This *MUST* be a multiple of 3 */
DST_BUF_SIZE = 4 * ((SRC_BUF_SIZE + 2) / 3),
};
#define src_buf text
2008-01-29 06:29:15 +05:30
int fd;
#define len fd
char dst_buf[DST_BUF_SIZE + 1];
2008-01-29 06:29:15 +05:30
if (fname) {
2008-02-08 23:54:54 +05:30
fd = INITIAL_STDIN_FILENO;
if (NOT_LONE_DASH(fname))
fd = xopen(fname, O_RDONLY);
src_buf = bb_common_bufsiz1;
2008-02-27 02:43:17 +05:30
// N.B. strlen(NULL) segfaults!
} else if (text) {
// though we do not call uuencode(NULL, NULL) explicitly
// still we do not want to break things suddenly
len = strlen(text);
2008-02-27 02:43:17 +05:30
} else
return;
fflush(stdout); // sync stdio and unistd output
2008-01-29 06:29:15 +05:30
while (1) {
size_t size;
if (fname) {
size = full_read(fd, (char *)src_buf, SRC_BUF_SIZE);
if ((ssize_t)size < 0)
bb_perror_msg_and_die(bb_msg_read_error);
} else {
size = len;
if (len > SRC_BUF_SIZE)
size = SRC_BUF_SIZE;
}
2008-01-29 06:29:15 +05:30
if (!size)
break;
2008-02-08 23:54:54 +05:30
// encode the buffer we just read in
bb_uuencode(dst_buf, src_buf, size, bb_uuenc_tbl_base64);
if (fname) {
2008-02-08 23:54:54 +05:30
xwrite(STDOUT_FILENO, "\r\n", 2);
} else {
src_buf += size;
len -= size;
}
xwrite(STDOUT_FILENO, dst_buf, 4 * ((size + 2) / 3));
2008-01-29 06:29:15 +05:30
}
2008-02-08 23:54:54 +05:30
if (fname)
close(fd);
2008-06-28 02:54:08 +05:30
#undef src_buf
#undef len
2008-01-29 06:29:15 +05:30
}
2008-02-27 02:43:17 +05:30
struct globals {
pid_t helper_pid;
unsigned timeout;
// arguments for SSL connection helper
const char *xargs[9];
// arguments for postprocess helper
const char *fargs[3];
};
#define G (*ptr_to_globals)
#define helper_pid (G.helper_pid)
#define timeout (G.timeout )
#define xargs (G.xargs )
#define fargs (G.fargs )
#define INIT_G() do { \
SET_PTR_TO_GLOBALS(xzalloc(sizeof(G))); \
xargs[0] = "openssl"; \
xargs[1] = "s_client"; \
xargs[2] = "-quiet"; \
xargs[3] = "-connect"; \
2008-06-28 02:54:08 +05:30
/*xargs[4] = "localhost";*/ \
xargs[5] = "-tls1"; \
xargs[6] = "-starttls"; \
xargs[7] = "smtp"; \
2008-02-27 02:43:17 +05:30
fargs[0] = "utf-8"; \
} while (0)
#define opt_connect (xargs[4])
#define opt_after_connect (xargs[5])
#define opt_charset (fargs[0])
#define opt_subject (fargs[1])
2008-02-08 23:54:54 +05:30
static void kill_helper(void)
{
// TODO!!!: is there more elegant way to terminate child on program failure?
if (helper_pid > 0)
kill(helper_pid, SIGTERM);
}
2008-01-29 06:29:15 +05:30
// generic signal handler
static void signal_handler(int signo)
{
2008-02-27 02:43:17 +05:30
#define err signo
2008-01-29 06:29:15 +05:30
2008-02-08 23:54:54 +05:30
if (SIGALRM == signo) {
kill_helper();
2008-01-29 06:29:15 +05:30
bb_error_msg_and_die("timed out");
2008-02-08 23:54:54 +05:30
}
2008-01-29 06:29:15 +05:30
// SIGCHLD. reap zombies
if (wait_any_nohang(&err) > 0)
if (WIFEXITED(err) && WEXITSTATUS(err))
bb_error_msg_and_die("child exited (%d)", WEXITSTATUS(err));
2008-06-28 02:54:08 +05:30
#undef err
}
2008-02-08 23:54:54 +05:30
static void launch_helper(const char **argv)
2008-01-29 06:29:15 +05:30
{
2008-02-08 23:54:54 +05:30
// setup vanilla unidirectional pipes interchange
int idx;
int pipes[4];
2008-06-28 02:54:08 +05:30
2008-02-08 23:54:54 +05:30
xpipe(pipes);
xpipe(pipes+2);
helper_pid = vfork();
if (helper_pid < 0)
bb_perror_msg_and_die("vfork");
2008-06-28 02:54:08 +05:30
idx = (!helper_pid) * 2;
2008-02-08 23:54:54 +05:30
xdup2(pipes[idx], STDIN_FILENO);
xdup2(pipes[3-idx], STDOUT_FILENO);
if (ENABLE_FEATURE_CLEAN_UP)
for (int i = 4; --i >= 0; )
if (pipes[i] > STDOUT_FILENO)
close(pipes[i]);
if (!helper_pid) {
// child: try to execute connection helper
2008-02-27 02:43:17 +05:30
BB_EXECVP(*argv, (char **)argv);
2008-02-08 23:54:54 +05:30
_exit(127);
}
// parent: check whether child is alive
2008-02-27 02:43:17 +05:30
bb_signals(0
+ (1 << SIGCHLD)
+ (1 << SIGALRM)
, signal_handler);
2008-02-08 23:54:54 +05:30
signal_handler(SIGCHLD);
// child seems OK -> parent goes on
}
static const char *command(const char *fmt, const char *param)
2008-02-08 23:54:54 +05:30
{
const char *msg = fmt;
2008-02-08 23:54:54 +05:30
alarm(timeout);
if (msg) {
msg = xasprintf(fmt, param);
2008-02-08 23:54:54 +05:30
printf("%s\r\n", msg);
}
2008-01-29 06:29:15 +05:30
fflush(stdout);
2008-02-08 23:54:54 +05:30
return msg;
}
static int smtp_checkp(const char *fmt, const char *param, int code)
{
char *answer;
const char *msg = command(fmt, param);
2008-02-08 23:54:54 +05:30
// read stdin
// if the string has a form \d\d\d- -- read next string. E.g. EHLO response
// parse first bytes to a number
// if code = -1 then just return this number
// if code != -1 then checks whether the number equals the code
// if not equal -> die saying msg
while ((answer = xmalloc_fgetline(stdin)) != NULL)
2008-02-27 02:43:17 +05:30
if (strlen(answer) <= 3 || '-' != answer[3])
break;
2008-01-29 06:29:15 +05:30
if (answer) {
int n = atoi(answer);
2008-02-08 23:54:54 +05:30
alarm(0);
if (ENABLE_FEATURE_CLEAN_UP) {
2008-01-29 06:29:15 +05:30
free(answer);
2008-02-08 23:54:54 +05:30
}
if (-1 == code || n == code) {
2008-01-29 06:29:15 +05:30
return n;
}
}
2008-02-08 23:54:54 +05:30
kill_helper();
bb_error_msg_and_die("%s failed", msg);
2008-01-29 06:29:15 +05:30
}
static inline int smtp_check(const char *fmt, int code)
2008-01-29 06:29:15 +05:30
{
2008-02-08 23:54:54 +05:30
return smtp_checkp(fmt, NULL, code);
}
2008-02-27 02:43:17 +05:30
// strip argument of bad chars
static char *sane(char *str)
{
char *s = str;
char *p = s;
while (*s) {
if (isalnum(*s) || '_' == *s || '-' == *s || '.' == *s || '@' == *s) {
*p++ = *s;
}
s++;
}
*p = '\0';
return str;
}
#if ENABLE_FETCHMAIL
2008-02-08 23:54:54 +05:30
static void pop3_checkr(const char *fmt, const char *param, char **ret)
{
const char *msg = command(fmt, param);
char *answer = xmalloc_fgetline(stdin);
2008-02-27 02:43:17 +05:30
if (answer && '+' == *answer) {
2008-02-08 23:54:54 +05:30
alarm(0);
if (ret)
2008-02-27 02:43:17 +05:30
*ret = answer+4; // skip "+OK "
else if (ENABLE_FEATURE_CLEAN_UP)
2008-02-08 23:54:54 +05:30
free(answer);
return;
}
kill_helper();
bb_error_msg_and_die("%s failed", msg);
}
static inline void pop3_check(const char *fmt, const char *param)
2008-02-08 23:54:54 +05:30
{
pop3_checkr(fmt, param, NULL);
2008-01-29 06:29:15 +05:30
}
2008-02-27 02:43:17 +05:30
static void pop3_message(const char *filename)
2008-02-08 23:54:54 +05:30
{
2008-02-27 02:43:17 +05:30
int fd;
2008-02-08 23:54:54 +05:30
char *answer;
2008-02-27 02:43:17 +05:30
// create and open file filename
// read stdin, copy to created file
fd = xopen(filename, O_CREAT | O_WRONLY | O_TRUNC | O_EXCL);
while ((answer = xmalloc_fgets_str(stdin, "\r\n")) != NULL) {
2008-02-08 23:54:54 +05:30
char *s = answer;
2008-02-27 02:43:17 +05:30
if ('.' == *answer) {
2008-02-08 23:54:54 +05:30
if ('.' == answer[1])
s++;
else if ('\r' == answer[1] && '\n' == answer[2] && '\0' == answer[3])
break;
}
xwrite(fd, s, strlen(s));
free(answer);
}
close(fd);
}
2008-02-27 02:43:17 +05:30
#endif
2008-02-08 23:54:54 +05:30
static char *parse_url(char *url, char **user, char **pass)
{
// parse [user[:pass]@]host
// return host
char *s = strchr(url, '@');
*user = *pass = NULL;
if (s) {
*s++ = '\0';
*user = url;
url = s;
s = strchr(*user, ':');
if (s) {
*s++ = '\0';
*pass = s;
}
}
return url;
}
2008-07-18 01:07:09 +05:30
static void rcptto(const char *s)
{
smtp_checkp("RCPT TO:<%s>", s, 250);
}
2008-02-08 23:54:54 +05:30
int sendgetmail_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
2008-07-05 14:48:54 +05:30
int sendgetmail_main(int argc UNUSED_PARAM, char **argv)
2008-01-29 06:29:15 +05:30
{
2008-06-28 02:54:08 +05:30
llist_t *opt_attachments = NULL;
char *opt_from;
char *opt_user;
char *opt_pass;
2008-01-29 06:29:15 +05:30
enum {
2008-02-27 02:43:17 +05:30
OPT_w = 1 << 0, // network timeout
OPT_H = 1 << 1, // [user:password@]server[:port]
OPT_S = 1 << 2, // connect using openssl s_client helper
2008-02-08 23:54:54 +05:30
OPTS_t = 1 << 3, // sendmail: read addresses from body
OPTF_t = 1 << 3, // fetchmail: use "TOP" not "RETR"
2008-02-08 23:54:54 +05:30
OPTS_s = 1 << 4, // sendmail: subject
OPTF_z = 1 << 4, // fetchmail: delete from server
2008-02-08 23:54:54 +05:30
OPTS_c = 1 << 5, // sendmail: assumed charset
OPTS_a = 1 << 6, // sendmail: attachment(s)
OPTS_i = 1 << 7, // sendmail: ignore lone dots in message body (implied)
2008-01-29 06:29:15 +05:30
OPTS_N = 1 << 8, // sendmail: request notification
OPTS_f = 1 << 9, // sendmail: sender address
2008-06-28 02:54:08 +05:30
};
2008-02-08 23:54:54 +05:30
const char *options;
2008-06-28 02:54:08 +05:30
int opts;
2008-02-08 23:54:54 +05:30
// init global variables
2008-02-27 02:43:17 +05:30
INIT_G();
// parse options, different option sets for sendmail and fetchmail
// N.B. opt_after_connect hereafter is NULL if we are called as fetchmail
// and is NOT NULL if we are called as sendmail
2008-02-27 02:43:17 +05:30
if (!ENABLE_FETCHMAIL || 's' == applet_name[0]) {
// SENDMAIL
// save initial stdin since body is piped!
2008-02-08 23:54:54 +05:30
xdup2(STDIN_FILENO, INITIAL_STDIN_FILENO);
2008-06-28 02:54:08 +05:30
opt_complementary = "w+:a::";
options = "w:H:St" "s:c:a:iN:f:";
2008-06-28 02:54:08 +05:30
// body is pseudo attachment read from stdin
llist_add_to_end(&opt_attachments, (char *)"-");
2008-02-08 23:54:54 +05:30
} else {
2008-02-27 02:43:17 +05:30
// FETCHMAIL
2008-02-08 23:54:54 +05:30
opt_after_connect = NULL;
opt_complementary = "-1:w+";
options = "w:H:St" "z";
2008-02-08 23:54:54 +05:30
}
opts = getopt32(argv, options,
&timeout /* -w */, &opt_connect /* -H */,
&opt_subject, &opt_charset, &opt_attachments, NULL, &opt_from
2008-01-29 06:29:15 +05:30
);
//argc -= optind;
argv += optind;
2008-02-08 23:54:54 +05:30
// connect to server
// host[:port] not specified ? -> use $HOSTNAME. no $HOSTNAME ? -> use localhost
2008-06-28 02:54:08 +05:30
if (!(opts & OPT_H)) {
opt_connect = getenv("HOSTNAME");
2008-06-28 02:54:08 +05:30
if (!opt_connect)
opt_connect = "127.0.0.1";
}
// fetch username and password, if any
// NB: parse_url modifies opt_connect[] ONLY if '@' is there.
// Thus "127.0.0.1" won't be modified, an is ok that it is RO.
opt_connect = parse_url((char*)opt_connect, &opt_user, &opt_pass);
// bb_error_msg("H[%s] U[%s] P[%s]", opt_connect, opt_user, opt_pass);
// username must be defined!
if (!opt_user) {
// N.B. IMHO getenv("USER") can be way easily spoofed!
opt_user = bb_getpwuid(NULL, -1, getuid());
}
// SSL ordered? ->
if (opts & OPT_S) {
// ... use openssl helper
2008-02-27 02:43:17 +05:30
launch_helper(xargs);
// no SSL ordered? ->
2008-02-08 23:54:54 +05:30
} else {
// ... make plain connect
int fd = create_and_connect_stream_or_die(opt_connect, 25);
// make ourselves a simple IO filter
// from now we know nothing about network :)
2008-02-08 23:54:54 +05:30
xmove_fd(fd, STDIN_FILENO);
xdup2(STDIN_FILENO, STDOUT_FILENO);
}
2008-06-28 02:54:08 +05:30
// are we sendmail?
if (!ENABLE_FETCHMAIL || opt_after_connect)
/***************************************************
* SENDMAIL
***************************************************/
2008-06-28 02:54:08 +05:30
{
2008-02-08 23:54:54 +05:30
int code;
char *boundary;
2008-02-27 02:43:17 +05:30
const char *fmt;
const char *p;
char *q;
2008-06-28 02:54:08 +05:30
llist_t *l;
2008-07-17 03:25:03 +05:30
llist_t *headers = NULL;
2008-06-28 02:54:08 +05:30
// got no sender address? -> use username as a resort
if (!(opts & OPTS_f)) {
char *domain = safe_getdomainname();
opt_from = xasprintf("%s@%s", opt_user, domain);
2008-07-18 01:07:09 +05:30
if (ENABLE_FEATURE_CLEAN_UP)
free(domain);
}
2008-02-08 23:54:54 +05:30
// introduce to server
// we didn't use SSL helper? ->
if (!(opts & OPT_S)) {
// ... wait for initial server OK
smtp_check(NULL, 220);
}
// we should start with modern EHLO
2008-06-28 02:54:08 +05:30
if (250 != smtp_checkp("EHLO %s", sane(opt_from), -1)) {
2008-02-27 02:43:17 +05:30
smtp_checkp("HELO %s", opt_from, 250);
2008-01-29 06:29:15 +05:30
}
2008-02-08 23:54:54 +05:30
// set sender
// NOTE: if password has not been specified
// then no authentication is possible
code = (opt_pass) ? -1 : 250;
2008-02-08 23:54:54 +05:30
// first try softly without authentication
2008-02-27 02:43:17 +05:30
while (250 != smtp_checkp("MAIL FROM:<%s>", opt_from, code)) {
2008-02-08 23:54:54 +05:30
// MAIL FROM failed -> authentication needed
if (334 == smtp_check("AUTH LOGIN", -1)) {
uuencode(NULL, opt_user); // opt_user != NULL
2008-02-08 23:54:54 +05:30
smtp_check("", 334);
uuencode(NULL, opt_pass);
smtp_check("", 235);
}
// authenticated OK? -> retry to set sender
// but this time die on failure!
2008-02-08 23:54:54 +05:30
code = 250;
2008-01-29 06:29:15 +05:30
}
2008-02-27 02:43:17 +05:30
2008-07-18 01:07:09 +05:30
// recipients specified as arguments
while (*argv) {
// loose test on email address validity
if (strchr(sane(*argv), '@')) {
rcptto(sane(*argv));
llist_add_to_end(&headers, xasprintf("To: %s", *argv));
}
argv++;
}
// if -t specified or no recipients specified -> enter all-included mode
// i.e. scan stdin for To:, Cc:, Bcc:, and Subject: lines ...
// ... and then use the rest of stdin as message body
// N.B. subject read from body has priority
// over that specified on command line.
// recipients are merged
// N.B. other headers are collected and will be dumped verbatim
if (opts & OPTS_t || !headers) {
// fetch recipients and (optionally) subject
char *s;
while ((s = xmalloc_reads(INITIAL_STDIN_FILENO, NULL, NULL)) != NULL) {
if (0 == strncasecmp("To: ", s, 4) || 0 == strncasecmp("Cc: ", s, 4)) {
rcptto(sane(s+4));
llist_add_to_end(&headers, s);
} else if (0 == strncasecmp("Bcc: ", s, 5)) {
rcptto(sane(s+5));
if (ENABLE_FEATURE_CLEAN_UP)
free(s);
// N.B. Bcc vanishes from headers!
/* } else if (0 == strncmp("From: ", s, 6)) {
opt_from = s+6;
opts |= OPTS_f;
*/ } else if (0 == strncmp("Subject: ", s, 9)) {
opt_subject = s+9;
opts |= OPTS_s;
} else if (s[0]) {
// misc header
llist_add_to_end(&headers, s);
} else {
free(s);
break; // empty line
}
}
2008-01-29 06:29:15 +05:30
}
// enter "put message" mode
2008-02-08 23:54:54 +05:30
smtp_check("DATA", 354);
2008-07-18 01:07:09 +05:30
// put headers we could have preread with -t
for (l = headers; l; l = l->link) {
printf("%s\r\n", l->data);
if (ENABLE_FEATURE_CLEAN_UP)
free(l->data);
2008-01-29 06:29:15 +05:30
}
2008-07-18 01:07:09 +05:30
// put address header
printf("From: %s\r\n", opt_from);
2008-02-08 23:54:54 +05:30
// put encoded subject
if (opts & OPTS_c)
2008-02-27 02:43:17 +05:30
sane((char *)opt_charset);
2008-02-08 23:54:54 +05:30
if (opts & OPTS_s) {
2008-02-27 02:43:17 +05:30
printf("Subject: =?%s?B?", opt_charset);
uuencode(NULL, opt_subject);
2008-02-08 23:54:54 +05:30
printf("?=\r\n");
}
2008-02-08 23:54:54 +05:30
// put notification
if (opts & OPTS_N)
2008-02-27 02:43:17 +05:30
printf("Disposition-Notification-To: %s\r\n", opt_from);
// make a random string -- it will delimit message parts
srand(monotonic_us());
2008-03-24 07:48:03 +05:30
boundary = xasprintf("%d-%d-%d", rand(), rand(), rand());
2008-02-08 23:54:54 +05:30
// put common headers and body start
2008-01-29 06:29:15 +05:30
printf(
2008-02-08 23:54:54 +05:30
"Message-ID: <%s>\r\n"
"Mime-Version: 1.0\r\n"
"%smultipart/mixed; boundary=\"%s\"\r\n"
2008-01-29 06:29:15 +05:30
, boundary
, "Content-Type: "
2008-02-08 23:54:54 +05:30
, boundary
2008-01-29 06:29:15 +05:30
);
2008-02-27 02:43:17 +05:30
// put body + attachment(s)
// N.B. all these weird things just to be tiny
// by reusing string patterns!
2008-02-27 02:43:17 +05:30
fmt =
2008-02-08 23:54:54 +05:30
"\r\n--%s\r\n"
"%stext/plain; charset=%s\r\n"
"%s%s\r\n"
"%s"
;
2008-02-27 02:43:17 +05:30
p = opt_charset;
q = (char *)"";
2008-06-28 02:54:08 +05:30
l = opt_attachments;
while (l) {
2008-02-08 23:54:54 +05:30
printf(
fmt
, boundary
, "Content-Type: "
, p
, "Content-Disposition: inline"
, q
, "Content-Transfer-Encoding: base64\r\n"
);
p = "";
fmt =
"\r\n--%s\r\n"
"%sapplication/octet-stream%s\r\n"
"%s; filename=\"%s\"\r\n"
"%s"
;
2008-06-28 02:54:08 +05:30
uuencode(l->data, NULL);
l = l->link;
if (l)
q = bb_get_last_path_component_strip(l->data);
2008-02-08 23:54:54 +05:30
}
2008-02-27 02:43:17 +05:30
// put message terminator
2008-02-08 23:54:54 +05:30
printf("\r\n--%s--\r\n" "\r\n", boundary);
// leave "put message" mode
2008-03-24 07:48:03 +05:30
smtp_check(".", 250);
// ... and say goodbye
2008-02-08 23:54:54 +05:30
smtp_check("QUIT", 221);
2008-06-28 02:54:08 +05:30
}
2008-02-27 02:43:17 +05:30
#if ENABLE_FETCHMAIL
/***************************************************
* FETCHMAIL
***************************************************/
2008-06-28 02:54:08 +05:30
else {
2008-02-08 23:54:54 +05:30
char *buf;
unsigned nmsg;
2008-02-27 02:43:17 +05:30
char *hostname;
pid_t pid;
// cache fetch command:
// TOP will return only the headers
// RETR will dump the whole message
2008-02-27 02:43:17 +05:30
const char *retr = (opts & OPTF_t) ? "TOP %u 0" : "RETR %u";
// goto maildir
xchdir(*argv++);
// cache postprocess program
*fargs = *argv;
2008-03-24 07:48:03 +05:30
2008-02-27 02:43:17 +05:30
// authenticate
// password is mandatory
if (!opt_pass) {
bb_error_msg_and_die("no password");
}
// get server greeting
2008-02-08 23:54:54 +05:30
pop3_checkr(NULL, NULL, &buf);
2008-02-08 23:54:54 +05:30
// server supports APOP?
2008-02-27 02:43:17 +05:30
if ('<' == *buf) {
2008-02-08 23:54:54 +05:30
md5_ctx_t md5;
// yes! compose <stamp><password>
2008-02-08 23:54:54 +05:30
char *s = strchr(buf, '>');
if (s)
strcpy(s+1, opt_pass);
2008-02-27 02:43:17 +05:30
s = buf;
2008-02-08 23:54:54 +05:30
// get md5 sum of <stamp><password>
md5_begin(&md5);
md5_hash(s, strlen(s), &md5);
md5_end(s, &md5);
2008-02-27 02:43:17 +05:30
// NOTE: md5 struct contains enough space
// so we reuse md5 space instead of xzalloc(16*2+1)
#define md5_hex ((uint8_t *)&md5)
// uint8_t *md5_hex = (uint8_t *)&md5;
2008-05-09 23:37:15 +05:30
*bin2hex((char *)md5_hex, s, 16) = '\0';
2008-02-08 23:54:54 +05:30
// APOP
2008-02-27 02:43:17 +05:30
s = xasprintf("%s %s", opt_user, md5_hex);
#undef md5_hex
2008-02-08 23:54:54 +05:30
pop3_check("APOP %s", s);
if (ENABLE_FEATURE_CLEAN_UP) {
free(s);
2008-02-27 02:43:17 +05:30
free(buf-4); // buf is "+OK " away from malloc'ed string
2008-02-08 23:54:54 +05:30
}
// server ignores APOP -> use simple text authentication
2008-02-08 23:54:54 +05:30
} else {
// USER
pop3_check("USER %s", opt_user);
// PASS
pop3_check("PASS %s", opt_pass);
}
// get mailbox statistics
2008-02-08 23:54:54 +05:30
pop3_checkr("STAT", NULL, &buf);
2008-02-27 02:43:17 +05:30
// prepare message filename suffix
hostname = safe_gethostname();
2008-02-27 02:43:17 +05:30
pid = getpid();
// get messages counter
2008-02-27 02:43:17 +05:30
// NOTE: we don't use xatou(buf) since buf is "nmsg nbytes"
// we only need nmsg and atoi is just exactly what we need
// if atoi fails to convert buf into number it returns 0
// in this case the following loop simply will not be executed
2008-02-27 02:43:17 +05:30
nmsg = atoi(buf);
2008-02-08 23:54:54 +05:30
if (ENABLE_FEATURE_CLEAN_UP)
2008-02-27 02:43:17 +05:30
free(buf-4); // buf is "+OK " away from malloc'ed string
2008-02-08 23:54:54 +05:30
2008-02-11 17:14:38 +05:30
// loop through messages
2008-02-08 23:54:54 +05:30
for (; nmsg; nmsg--) {
// generate unique filename
2008-06-28 02:54:08 +05:30
char *filename = xasprintf("tmp/%llu.%u.%s",
monotonic_us(), (unsigned)pid, hostname);
2008-02-27 02:43:17 +05:30
char *target;
int rc;
// retrieve message in ./tmp/
pop3_check(retr, (const char *)(ptrdiff_t)nmsg);
2008-02-27 02:43:17 +05:30
pop3_message(filename);
2008-02-08 23:54:54 +05:30
// delete message from server
if (opts & OPTF_z)
pop3_check("DELE %u", (const char*)(ptrdiff_t)nmsg);
2008-02-27 02:43:17 +05:30
// run postprocessing program
if (*fargs) {
fargs[1] = filename;
rc = wait4pid(spawn((char **)fargs));
if (99 == rc)
break;
if (1 == rc)
goto skip;
}
// atomically move message to ./new/
2008-02-27 02:43:17 +05:30
target = xstrdup(filename);
strncpy(target, "new", 3);
// ... or just stop receiving on error
if (rename_or_warn(filename, target))
break;
free(target);
skip:
free(filename);
2008-02-08 23:54:54 +05:30
}
2008-02-27 02:43:17 +05:30
2008-02-08 23:54:54 +05:30
// Bye
pop3_check("QUIT", NULL);
}
2008-06-28 02:54:08 +05:30
#endif // ENABLE_FETCHMAIL
2008-01-29 06:29:15 +05:30
return 0;
}