]>
diplodocus.org Git - nmh/blob - uip/popsbr.c
2 * popsbr.c -- POP client subroutines
4 * This code is Copyright (c) 2002, by the authors of nmh. See the
5 * COPYRIGHT file in the root directory of the nmh distribution for
6 * complete copyright information.
15 #include <h/signals.h>
18 #define TRMLEN (sizeof TRM - 1)
20 static int poprint
= 0;
21 static int pophack
= 0;
23 char response
[BUFSIZ
];
24 static netsec_context
*nsc
= NULL
;
30 static int command(const char *, ...);
31 static int multiline(void);
33 static int traverse (int (*)(char *), const char *, ...);
34 static int vcommand(const char *, va_list);
35 static int pop_getline (char *, int, netsec_context
*);
36 static int pop_sasl_callback(enum sasl_message_type
, unsigned const char *,
37 unsigned int, unsigned char **, unsigned int *,
41 check_mech(char *server_mechs
, size_t server_mechs_size
)
43 int status
, sasl_capability
= 0;
46 * First off, we're going to send the CAPA command to see if we can
47 * even support the AUTH command, and if we do, then we'll get a
48 * list of mechanisms the server supports. If we don't support
49 * the CAPA command, then it's unlikely that we will support
53 if (command("CAPA") == NOTOK
) {
54 snprintf(response
, sizeof(response
),
55 "The POP CAPA command failed; POP server does not "
60 while ((status
= multiline()) != DONE
)
65 case DONE
: /* Shouldn't be possible, but just in case */
68 if (strncasecmp(response
, "SASL ", 5) == 0) {
70 * We've seen the SASL capability. Grab the mech list
73 strncpy(server_mechs
, response
+ 5, server_mechs_size
);
78 if (!sasl_capability
) {
79 snprintf(response
, sizeof(response
), "POP server does not support "
88 * Split string containing proxy command into an array of arguments
89 * suitable for passing to exec. Returned array must be freed. Shouldn't
90 * be possible to call this with host set to NULL.
93 parse_proxy(char *proxy
, char *host
)
97 int hlen
= strlen(host
);
99 unsigned char *cur
, *pro
;
102 /* skip any initial space */
103 for (pro
= (unsigned char *) proxy
; isspace(*pro
); pro
++)
106 /* calculate required size for argument array */
107 for (cur
= pro
; *cur
; cur
++) {
108 if (isspace(*cur
) && cur
[1] && !isspace(cur
[1]))
110 else if (*cur
== '%' && cur
[1] == 'h') {
113 } else if (!isspace(*cur
))
117 /* put together list of arguments */
118 p
= pargv
= mh_xmalloc(pargc
* sizeof(char *));
119 c
= *pargv
= mh_xmalloc(plen
* sizeof(char));
120 for (cur
= pro
; *cur
; cur
++) {
121 if (isspace(*cur
) && cur
[1] && !isspace(cur
[1])) {
124 } else if (*cur
== '%' && cur
[1] == 'h') {
128 } else if (!isspace(*cur
))
137 pop_init (char *host
, char *port
, char *user
, char *pass
, char *proxy
,
138 int snoop
, int sasl
, char *mech
, int tls
, const char *oauth_svc
)
147 netsec_set_userid(nsc
, user
);
149 if (oauth_svc
!= NULL
) {
150 if (netsec_set_oauth_service(nsc
, oauth_svc
) != OK
) {
151 snprintf(response
, sizeof(response
), "OAuth2 not supported");
156 if (proxy
&& *proxy
) {
158 int inpipe
[2]; /* for reading from the server */
159 int outpipe
[2]; /* for sending to the server */
161 if (pipe(inpipe
) < 0) {
162 adios ("inpipe", "pipe");
164 if (pipe(outpipe
) < 0) {
165 adios ("outpipe", "pipe");
175 dup2(outpipe
[0],0); /* connect read end of connection */
176 dup2(inpipe
[1], 1); /* connect write end of connection */
177 if(inpipe
[0]>1) close(inpipe
[0]);
178 if(inpipe
[1]>1) close(inpipe
[1]);
179 if(outpipe
[0]>1) close(outpipe
[0]);
180 if(outpipe
[1]>1) close(outpipe
[1]);
182 /* run the proxy command */
183 argv
=parse_proxy(proxy
, host
);
184 execvp(argv
[0],argv
);
194 /* okay in the parent we do some stuff */
195 close(inpipe
[1]); /* child uses this */
196 close(outpipe
[0]); /* child uses this */
200 /* and write on fd2 */
204 if ((fd1
= client (host
, port
? port
: "pop3", response
,
205 sizeof(response
), snoop
)) == NOTOK
) {
211 SIGNAL (SIGPIPE
, SIG_IGN
);
213 netsec_set_fd(nsc
, fd1
, fd2
);
214 netsec_set_snoop(nsc
, snoop
);
217 if (netsec_set_tls(nsc
, 1, &errstr
) != OK
) {
218 snprintf(response
, sizeof(response
), "%s", errstr
);
223 if (netsec_negotiate_tls(nsc
, &errstr
) != OK
) {
224 snprintf(response
, sizeof(response
), "%s", errstr
);
231 if (netsec_set_sasl_params(nsc
, host
, "pop", mech
,
232 pop_sasl_callback
, &errstr
) != OK
) {
233 snprintf(response
, sizeof(response
), "%s", errstr
);
239 switch (pop_getline (response
, sizeof response
, nsc
)) {
242 fprintf (stderr
, "<--- %s\n", response
);
243 if (*response
== '+') {
245 char server_mechs
[256];
246 if (check_mech(server_mechs
, sizeof(server_mechs
)) != OK
)
248 if (netsec_negotiate_sasl(nsc
, server_mechs
,
250 strncpy(response
, errstr
, sizeof(response
));
251 response
[sizeof(response
) - 1] = '\0';
257 if (command ("USER %s", user
) != NOTOK
258 && command ("%s %s", (pophack
++, "PASS"),
262 strncpy (buffer
, response
, sizeof(buffer
));
264 strncpy (response
, buffer
, sizeof(response
));
270 fprintf (stderr
, "%s\n", response
);
271 netsec_shutdown(nsc
, 1);
276 return NOTOK
; /* NOTREACHED */
281 * Our SASL callback; we are given SASL tokens and then have to format
282 * them according to the protocol requirements, and then process incoming
283 * messages and feed them back into the SASL library.
287 pop_sasl_callback(enum sasl_message_type mtype
, unsigned const char *indata
,
288 unsigned int indatalen
, unsigned char **outdata
,
289 unsigned int *outdatalen
, char **errstr
)
296 case NETSEC_SASL_START
:
298 * Generate our AUTH message, but there is a wrinkle.
300 * Technically, according to RFC 5034, if your command INCLUDING
301 * an initial response exceeds 255 octets (including CRLF), you
302 * can't issue this all in one go, but have to just issue the
303 * AUTH command, wait for a blank initial response, and then
307 mech
= netsec_get_sasl_mechanism(nsc
);
311 b64data
= mh_xmalloc(BASE64SIZE(indatalen
));
312 writeBase64raw(indata
, indatalen
, (unsigned char *) b64data
);
313 b64len
= strlen(b64data
);
315 /* Formula here is AUTH + SP + mech + SP + out + CR + LF */
316 len
= b64len
+ 8 + strlen(mech
);
318 rc
= netsec_printf(nsc
, errstr
, "AUTH %s\r\n", mech
);
321 if (netsec_flush(nsc
, errstr
) != OK
)
323 line
= netsec_readline(nsc
, &len
, errstr
);
327 * If the protocol is being followed correctly, should just
328 * be a "+ ", nothing else.
330 if (len
!= 2 || strcmp(line
, "+ ") != 0) {
331 netsec_err(errstr
, "Did not get expected blank response "
332 "for initial challenge response");
335 netsec_set_snoop_callback(nsc
, netsec_b64_snoop_decoder
, NULL
);
336 rc
= netsec_printf(nsc
, errstr
, "%s\r\n", b64data
);
337 netsec_set_snoop_callback(nsc
, NULL
, NULL
);
341 if (netsec_flush(nsc
, errstr
) != OK
)
344 netsec_set_snoop_callback(nsc
, netsec_b64_snoop_decoder
,
346 snoopoffset
= 6 + strlen(mech
);
347 rc
= netsec_printf(nsc
, errstr
, "AUTH %s %s\r\n", mech
,
350 netsec_set_snoop_callback(nsc
, NULL
, NULL
);
353 if (netsec_flush(nsc
, errstr
) != OK
)
357 if (netsec_printf(nsc
, errstr
, "AUTH %s\r\n", mech
) != OK
)
359 if (netsec_flush(nsc
, errstr
) != OK
)
366 * We should get one line back, with our base64 data. Decode that
367 * and feed it back into the SASL library.
369 case NETSEC_SASL_READ
:
370 netsec_set_snoop_callback(nsc
, netsec_b64_snoop_decoder
, &snoopoffset
);
372 line
= netsec_readline(nsc
, &len
, errstr
);
373 netsec_set_snoop_callback(nsc
, NULL
, NULL
);
377 if (len
< 2 || (len
== 2 && strcmp(line
, "+ ") != 0)) {
378 netsec_err(errstr
, "Invalid format for SASL response");
386 rc
= decodeBase64(line
+ 2, outdata
, &len
, 0, NULL
);
389 netsec_err(errstr
, "Unable to decode base64 response");
396 * Our encoding is pretty simple, so this is easy.
399 case NETSEC_SASL_WRITE
:
400 if (indatalen
== 0) {
401 rc
= netsec_printf(nsc
, errstr
, "\r\n");
403 unsigned char *b64data
;
404 b64data
= mh_xmalloc(BASE64SIZE(indatalen
));
405 writeBase64raw(indata
, indatalen
, b64data
);
406 netsec_set_snoop_callback(nsc
, netsec_b64_snoop_decoder
, NULL
);
407 rc
= netsec_printf(nsc
, errstr
, "%s\r\n", b64data
);
408 netsec_set_snoop_callback(nsc
, NULL
, NULL
);
415 if (netsec_flush(nsc
, errstr
) != OK
)
420 * Finish the protocol; we're looking for an +OK
423 case NETSEC_SASL_FINISH
:
424 line
= netsec_readline(nsc
, &len
, errstr
);
428 if (strncmp(line
, "+OK", 3) != 0) {
429 netsec_err(errstr
, "Authentication failed: %s", line
);
435 * Cancel the SASL exchange in the middle of the commands; for
436 * POP, that's a single "*".
438 * It's unclear to me if I should be returning errors up; I finally
439 * decided the answer should be "yes", and if the upper layer wants to
440 * ignore them that's their choice.
443 case NETSEC_SASL_CANCEL
:
444 rc
= netsec_printf(nsc
, errstr
, "*\r\n");
446 rc
= netsec_flush(nsc
, errstr
);
456 * Find out number of messages available
457 * and their total size.
461 pop_stat (int *nmsgs
, int *nbytes
)
464 if (command ("STAT") == NOTOK
)
467 *nmsgs
= *nbytes
= 0;
468 sscanf (response
, "+OK %d %d", nmsgs
, nbytes
);
475 pop_list (int msgno
, int *nmsgs
, int *msgs
, int *bytes
)
481 if (command ("LIST %d", msgno
) == NOTOK
)
486 sscanf (response
, "+OK %d %d %d", msgs
, bytes
, ids
);
489 sscanf (response
, "+OK %d %d", msgs
, bytes
);
493 if (command ("LIST") == NOTOK
)
496 for (i
= 0; i
< *nmsgs
; i
++)
497 switch (multiline ()) {
507 sscanf (response
, "%d %d %d",
508 msgs
++, bytes
++, ids
++);
511 sscanf (response
, "%d %d", msgs
++, bytes
++);
515 switch (multiline ()) {
527 pop_retr (int msgno
, int (*action
)(char *))
529 return traverse (action
, "RETR %d", msgno
);
534 traverse (int (*action
)(char *), const char *fmt
, ...)
536 int result
, snoopstate
;
538 char buffer
[sizeof(response
)];
541 result
= vcommand (fmt
, ap
);
546 strncpy (buffer
, response
, sizeof(buffer
));
548 if ((snoopstate
= netsec_get_snoop(nsc
)))
549 netsec_set_snoop(nsc
, 0);
552 switch (multiline ()) {
554 netsec_set_snoop(nsc
, snoopstate
);
558 strncpy (response
, buffer
, sizeof(response
));
559 netsec_set_snoop(nsc
, snoopstate
);
563 (*action
) (response
);
572 return command ("DELE %d", msgno
);
579 return command ("NOOP");
586 return command ("RSET");
591 pop_top (int msgno
, int lines
, int (*action
)(char *))
593 return traverse (action
, "TOP %d %d", msgno
, lines
);
602 i
= command ("QUIT");
613 netsec_shutdown(nsc
, 1);
620 command(const char *fmt
, ...)
626 result
= vcommand(fmt
, ap
);
634 vcommand (const char *fmt
, va_list ap
)
639 if (netsec_vprintf(nsc
, &errstr
, fmt
, ap
) != OK
) {
640 strncpy(response
, errstr
, sizeof(response
));
641 response
[sizeof(response
) - 1] = '\0';
646 if (netsec_printf(nsc
, &errstr
, "\r\n") != OK
) {
647 strncpy(response
, errstr
, sizeof(response
));
648 response
[sizeof(response
) - 1] = '\0';
653 if (netsec_flush(nsc
, &errstr
) != OK
) {
654 strncpy(response
, errstr
, sizeof(response
));
655 response
[sizeof(response
) - 1] = '\0';
660 switch (pop_getline (response
, sizeof response
, nsc
)) {
663 fprintf (stderr
, "<--- %s\n", response
);
664 return (*response
== '+' ? OK
: NOTOK
);
669 fprintf (stderr
, "%s\n", response
);
673 return NOTOK
; /* NOTREACHED */
680 char buffer
[BUFSIZ
+ TRMLEN
];
682 if (pop_getline (buffer
, sizeof buffer
, nsc
) != OK
)
684 if (strncmp (buffer
, TRM
, TRMLEN
) == 0) {
685 if (buffer
[TRMLEN
] == 0)
688 strncpy (response
, buffer
+ TRMLEN
, sizeof(response
));
691 strncpy (response
, buffer
, sizeof(response
));
697 * This is now just a thin wrapper around netsec_readline().
701 pop_getline (char *s
, int n
, netsec_context
*ns
)
709 p
= netsec_readline(ns
, &len
, &errstr
);
712 strncpy(response
, errstr
, sizeof(response
));
713 response
[sizeof(response
) - 1] = '\0';
719 * If we had an error, it should have been returned already. Since
720 * netsec_readline() strips off the CR-LF ending, just copy the existing
721 * buffer into response now.
723 * We get a length back from netsec_readline, but the rest of the POP
724 * code doesn't handle it; the assumptions are that everything from
725 * the network can be respresented as C strings. That should get fixed
729 destlen
= len
< ((size_t) (n
- 1)) ? len
: (size_t) (n
- 1);
731 memcpy(s
, p
, destlen
);