X-Git-Url: https://diplodocus.org/git/nmh/blobdiff_plain/edcc7ae1dc9a6e30e9454da7cf0c093f4852b7ea..dd6bfc058da415e30995eeea116c65861671e2aa:/uip/imaptest.c diff --git a/uip/imaptest.c b/uip/imaptest.c index 0ae9c2db..6c5d0046 100644 --- a/uip/imaptest.c +++ b/uip/imaptest.c @@ -5,10 +5,16 @@ * complete copyright information. */ -#include -#include -#include +#include "h/mh.h" +#include "sbr/brkstring.h" +#include "sbr/ambigsw.h" +#include "sbr/print_version.h" +#include "sbr/print_help.h" +#include "sbr/error.h" +#include "h/utils.h" +#include "h/netsec.h" #include +#include #include "h/done.h" #include "sbr/base64.h" @@ -25,9 +31,14 @@ X("tls", 0, TLSSW) \ X("notls", 0, NOTLSSW) \ X("initialtls", 0, INITIALTLSSW) \ + X("queue", 0, QUEUESW) \ + X("noqueue", 0, NOQUEUESW) \ X("append filename", 0, APPENDSW) \ + X("afolder foldername", 0, AFOLDERSW) \ + X("batch filename", 0, BATCHSW) \ X("timestamp", 0, TIMESTAMPSW) \ X("notimestamp", 0, NOTIMESTAMPSW) \ + X("timeout", 0, TIMEOUTSW) \ X("version", 0, VERSIONSW) \ X("help", 0, HELPSW) \ @@ -39,14 +50,31 @@ DEFINE_SWITCH_ENUM(IMAPTEST); DEFINE_SWITCH_ARRAY(IMAPTEST, switches); #undef X +struct imap_msg; + +struct imap_msg { + char *command; /* Command to send */ + char *folder; /* Folder (for append) */ + bool queue; /* If true, queue for later delivery */ + bool append; /* If true, append "command" to mbox */ + size_t msgsize; /* RFC822 size of message */ + struct imap_msg *next; /* Next pointer */ +}; + +struct imap_msg *msgqueue_head = NULL; +struct imap_msg *msgqueue_tail = NULL; + struct imap_cmd; struct imap_cmd { char tag[16]; /* Command tag */ + struct timeval start; /* Time command was sent */ + char prefix[64]; /* Command prefix */ struct imap_cmd *next; /* Next pointer */ }; static struct imap_cmd *cmdqueue = NULL; + static char *saslmechs = NULL; svector_t imap_capabilities = NULL; @@ -56,22 +84,44 @@ static int imap_sasl_callback(enum sasl_message_type, unsigned const char *, static void parse_capability(const char *, unsigned int len); static int capability_set(const char *); -static int send_imap_command(netsec_context *, char **errstr, - const char *, ...); -static int get_imap_response(netsec_context *, const char *, char **, char **); +static void clear_capability(void); +static int have_capability(void); +static int send_imap_command(netsec_context *, bool noflush, char **errstr, + const char *fmt, ...) CHECK_PRINTF(4, 5); +static int send_append(netsec_context *, struct imap_msg *, char **errstr); +static int get_imap_response(netsec_context *, const char *token, + char **tokenresp, char **status, bool contok, + bool failerr, char **errstr); + +static void ts_report(struct timeval *tv, const char *fmt, ...) + CHECK_PRINTF(2, 3); +static void imap_negotiate_tls(netsec_context *); + +static void add_msg(bool queue, struct imap_msg **, const char *fmt, ...) + CHECK_PRINTF(3, 4); +static void add_append(const char *filename, const char *folder, bool queue); + +static void batchfile(const char *filename, char *afolder, bool queue); + +static size_t rfc822size(const char *filename); + +static bool timestamp = false; int main (int argc, char **argv) { - bool timestamp = false, sasl = false, tls = false, initialtls = false; - bool snoop = false; - int fd; + bool sasl = false, tls = false, initialtls = false; + bool snoop = false, queue = false; + int fd, timeout = 0; char *saslmech = NULL, *host = NULL, *port = "143", *user = NULL; char *cp, **argp, buf[BUFSIZ], *oauth_svc = NULL, *errstr, **arguments, *p; + char *afolder = NULL; netsec_context *nsc = NULL; + struct imap_msg *imsg; size_t len; + struct timeval tv_start, tv_connect, tv_auth; - if (nmh_init(argv[0], 1)) { return 1; } + if (nmh_init(argv[0], true, true)) { return 1; } arguments = getarguments (invo_name, argc, argv, 1); argp = arguments; @@ -83,7 +133,7 @@ main (int argc, char **argv) ambigsw (cp, switches); done (1); case UNKWNSW: - adios (NULL, "-%s unknown", cp); + die("-%s unknown", cp); case HELPSW: snprintf (buf, sizeof(buf), "%s [switches] +folder command " @@ -96,15 +146,40 @@ main (int argc, char **argv) case HOSTSW: if (!(host = *argp++) || *host == '-') - adios(NULL, "missing argument to %s", argp[-2]); + die("missing argument to %s", argp[-2]); continue; case PORTSW: if (!(port = *argp++) || *port == '-') - adios(NULL, "missing argument to %s", argp[-2]); + die("missing argument to %s", argp[-2]); continue; case USERSW: if (!(user = *argp++) || *user == '-') - adios(NULL, "missing argument to %s", argp[-2]); + die("missing argument to %s", argp[-2]); + continue; + + case AFOLDERSW: + if (!(afolder = *argp++) || *afolder == '-') + die("missing argument to %s", argp[-2]); + continue; + case APPENDSW: + if (!*argp || (**argp == '-')) + die("missing argument to %s", argp[-1]); + if (! afolder) + die("Append folder must be set with -afolder first"); + add_append(*argp++, afolder, queue); + continue; + + case BATCHSW: + if (! *argp || (**argp == '-')) + die("missing argument to %s", argp[-1]); + batchfile(*argp++, afolder, queue); + continue; + + case TIMEOUTSW: + if (! *argp || (**argp == '-')) + die("missing argument to %s", argp[-1]); + if (! (timeout = atoi(*argp++))) + die("Invalid timeout: %s", argp[-1]); continue; case SNOOPSW: @@ -121,11 +196,11 @@ main (int argc, char **argv) continue; case SASLMECHSW: if (!(saslmech = *argp++) || *saslmech == '-') - adios(NULL, "missing argument to %s", argp[-2]); + die("missing argument to %s", argp[-2]); continue; case AUTHSERVICESW: if (!(oauth_svc = *argp++) || *oauth_svc == '-') - adios(NULL, "missing argument to %s", argp[-2]); + die("missing argument to %s", argp[-2]); continue; case TLSSW: tls = true; @@ -139,6 +214,12 @@ main (int argc, char **argv) tls = false; initialtls = false; continue; + case QUEUESW: + queue = true; + continue; + case NOQUEUESW: + queue = false; + continue; case TIMESTAMPSW: timestamp = true; continue; @@ -146,11 +227,17 @@ main (int argc, char **argv) timestamp = false; continue; } + } else if (*cp == '+') { + if (*(cp + 1) == '\0') + die("Invalid null folder name"); + add_msg(false, NULL, "SELECT \"%s\"", cp + 1); + } else { + add_msg(queue, NULL, "%s", cp); } } if (! host) - adios(NULL, "A hostname must be given with -host"); + die("A hostname must be given with -host"); nsc = netsec_init(); @@ -159,37 +246,48 @@ main (int argc, char **argv) netsec_set_hostname(nsc, host); + if (timeout) + netsec_set_timeout(nsc, timeout); + if (snoop) netsec_set_snoop(nsc, 1); if (oauth_svc) { if (netsec_set_oauth_service(nsc, oauth_svc) != OK) { - adios(NULL, "OAuth2 not supported"); + die("OAuth2 not supported"); } } + if (timestamp) + gettimeofday(&tv_start, NULL); + if ((fd = client(host, port, buf, sizeof(buf), snoop)) == NOTOK) - adios(NULL, "Connect failed: %s", buf); + die("Connect failed: %s", buf); + + if (timestamp) { + ts_report(&tv_start, "Connect time"); + gettimeofday(&tv_connect, NULL); + } netsec_set_fd(nsc, fd, fd); netsec_set_snoop(nsc, snoop); if (initialtls || tls) { if (netsec_set_tls(nsc, 1, 0, &errstr) != OK) - adios(NULL, errstr); + die("%s", errstr); - if (initialtls && netsec_negotiate_tls(nsc, &errstr) != OK) - adios(NULL, errstr); + if (initialtls) + imap_negotiate_tls(nsc); } if (sasl) { if (netsec_set_sasl_params(nsc, "imap", saslmech, imap_sasl_callback, nsc, &errstr) != OK) - adios(NULL, errstr); + die("%s", errstr); } if ((cp = netsec_readline(nsc, &len, &errstr)) == NULL) { - adios(NULL, errstr); + die("%s", errstr); } if (has_prefix(cp, "* BYE")) { @@ -219,12 +317,13 @@ main (int argc, char **argv) } else { char *capstring; - if (send_imap_command(nsc, &errstr, "CAPABILITY") != OK) { + if (send_imap_command(nsc, false, &errstr, "CAPABILITY") != OK) { fprintf(stderr, "Unable to send CAPABILITY command: %s\n", errstr); goto finish; } - if (get_imap_response(nsc, "CAPABILITY", &capstring, &errstr) != OK) { + if (get_imap_response(nsc, "CAPABILITY ", &capstring, NULL, false, true, + &errstr) != OK) { fprintf(stderr, "Cannot get CAPABILITY response: %s\n", errstr); goto finish; } @@ -234,16 +333,145 @@ main (int argc, char **argv) goto finish; } - parse_capability(capstring, strlen(capstring)); + p = capstring + 11; /* "CAPABILITY " */ + + parse_capability(p, strlen(p)); free(capstring); } - send_imap_command(nsc, NULL, "LOGOUT"); - get_imap_response(nsc, NULL, NULL, NULL); + if (tls) { + if (!capability_set("STARTTLS")) { + fprintf(stderr, "Requested STARTTLS with -tls, but IMAP server " + "has no support for STARTTLS\n"); + goto finish; + } + if (send_imap_command(nsc, false, &errstr, "STARTTLS") != OK) { + fprintf(stderr, "Unable to issue STARTTLS: %s\n", errstr); + goto finish; + } + + if (get_imap_response(nsc, NULL, NULL, NULL, false, true, + &errstr) != OK) { + fprintf(stderr, "STARTTLS failed: %s\n", errstr); + goto finish; + } + + imap_negotiate_tls(nsc); + } + + if (sasl) { + if (netsec_negotiate_sasl(nsc, saslmechs, &errstr) != OK) { + fprintf(stderr, "SASL negotiation failed: %s\n", errstr); + goto finish; + } + /* + * Sigh. If we negotiated a SSF AND we got a capability response + * as part of the AUTHENTICATE OK message, we can't actually trust + * it because it's not protected at that point. So discard the + * capability list and we will generate a fresh CAPABILITY command + * later. + */ + if (netsec_get_sasl_ssf(nsc) > 0) { + clear_capability(); + } + } else { + if (capability_set("LOGINDISABLED")) { + fprintf(stderr, "User did not request SASL, but LOGIN " + "is disabled\n"); + goto finish; + } + } + + if (!have_capability()) { + char *capstring; + + if (send_imap_command(nsc, false, &errstr, "CAPABILITY") != OK) { + fprintf(stderr, "Unable to send CAPABILITY command: %s\n", errstr); + goto finish; + } + + if (get_imap_response(nsc, "CAPABILITY ", &capstring, NULL, false, + true, &errstr) != OK) { + fprintf(stderr, "Cannot get CAPABILITY response: %s\n", errstr); + goto finish; + } + + if (! capstring) { + fprintf(stderr, "No CAPABILITY response seen\n"); + goto finish; + } + + p = capstring + 11; /* "CAPABILITY " */ + + parse_capability(p, strlen(p)); + free(capstring); + } + + if (timestamp) { + ts_report(&tv_connect, "Authentication time"); + gettimeofday(&tv_auth, NULL); + } + + while (msgqueue_head != NULL) { + imsg = msgqueue_head; + + if (imsg->append) { + if (send_append(nsc, imsg, &errstr) != OK) { + fprintf(stderr, "Cannot send APPEND for %s to mbox %s: %s\n", + imsg->command, imsg->folder, errstr); + free(errstr); + goto finish; + } + } else if (send_imap_command(nsc, imsg->queue, &errstr, "%s", + imsg->command) != OK) { + fprintf(stderr, "Cannot send command \"%s\": %s\n", + imsg->command, errstr); + free(errstr); + goto finish; + } + + if (! imsg->queue) { + if (get_imap_response(nsc, NULL, NULL, NULL, false, false, + &errstr) != OK) { + fprintf(stderr, "Unable to get response for command " + "\"%s\": %s\n", imsg->command, errstr); + goto finish; + } + } + + msgqueue_head = imsg->next; + + free(imsg->command); + free(imsg->folder); + free(imsg); + } + + /* + * Flush out any pending network data and get any responses + */ + + if (netsec_flush(nsc, &errstr) != OK) { + fprintf(stderr, "Error performing final network flush: %s\n", errstr); + free(errstr); + } + + if (get_imap_response(nsc, NULL, NULL, NULL, false, false, &errstr) != OK) { + fprintf(stderr, "Error fetching final command responses: %s\n", errstr); + free(errstr); + } + + if (timestamp) + ts_report(&tv_auth, "Total command execution time"); + + send_imap_command(nsc, false, NULL, "LOGOUT"); + get_imap_response(nsc, NULL, NULL, NULL, false, false, NULL); finish: netsec_shutdown(nsc); + if (timestamp) + ts_report(&tv_start, "Total elapsed time"); + exit(0); } @@ -276,7 +504,7 @@ parse_capability(const char *cap, unsigned int len) } for (i = 0; caplist[i] != NULL; i++) { - if (has_prefix(caplist[i], "AUTH=") && caplist[i] + 5 != '\0') { + if (has_prefix(caplist[i], "AUTH=") && *(caplist[i] + 5) != '\0') { if (saslmechs) { saslmechs = add(" ", saslmechs); } @@ -286,7 +514,6 @@ parse_capability(const char *cap, unsigned int len) } } - free(caplist); free(str); } @@ -303,6 +530,23 @@ capability_set(const char *capability) return svector_find(imap_capabilities, capability) != NULL; } +/* + * Clear the CAPABILITY list (used after we call STARTTLS, for example) + */ + +static void +clear_capability(void) +{ + svector_free(imap_capabilities); + imap_capabilities = NULL; +} + +static int +have_capability(void) +{ + return imap_capabilities != NULL; +} + /* * Our SASL callback, which handles the SASL authentication dialog */ @@ -313,8 +557,8 @@ imap_sasl_callback(enum sasl_message_type mtype, unsigned const char *indata, unsigned int *outdatalen, void *context, char **errstr) { int rc, snoopoffset; - char *mech, *line; - size_t len, b64len; + char *mech, *line, *capstring, *p; + size_t len; netsec_context *nsc = (netsec_context *) context; switch (mtype) { @@ -334,17 +578,150 @@ imap_sasl_callback(enum sasl_message_type mtype, unsigned const char *indata, b64data = mh_xmalloc(BASE64SIZE(indatalen)); writeBase64raw(indata, indatalen, (unsigned char *) b64data); if (capability_set("SASL-IR")) { - rc = send_imap_command(nsc, errstr, "AUTHENTICATE %s %s", + netsec_set_snoop_callback(nsc, netsec_b64_snoop_decoder, + &snoopoffset); + /* + * Sigh. We're assuming a short tag length here. Really, + * I guess we should figure out a way to get the length + * of the next tag. + */ + snoopoffset = 17 + strlen(mech); + rc = send_imap_command(nsc, 0, errstr, "AUTHENTICATE %s %s", mech, b64data); free(b64data); + netsec_set_snoop_callback(nsc, NULL, NULL); if (rc) return NOTOK; } else { - rc = send_imap_command(nsc, errstr, "AUTHENTICATE %s", mech); + rc = send_imap_command(nsc, 0, errstr, "AUTHENTICATE %s", mech); + line = netsec_readline(nsc, &len, errstr); + if (! line) + return NOTOK; + /* + * We should get a "+ ", nothing else. + */ + if (len != 2 || strcmp(line, "+ ") != 0) { + netsec_err(errstr, "Did not get expected blank response " + "for initial challenge response"); + return NOTOK; + } + rc = netsec_printf(nsc, errstr, "%s\r\n", b64data); + free(b64data); + if (rc != OK) + return NOTOK; + netsec_set_snoop_callback(nsc, netsec_b64_snoop_decoder, NULL); + rc = netsec_flush(nsc, errstr); + netsec_set_snoop_callback(nsc, NULL, NULL); + if (rc != OK) + return NOTOK; } + } else { + if (send_imap_command(nsc, 0, errstr, "AUTHENTICATE %s", + mech) != OK) + return NOTOK; } break; + + /* + * Get a response, decode it and process it. + */ + + case NETSEC_SASL_READ: + netsec_set_snoop_callback(nsc, netsec_b64_snoop_decoder, &snoopoffset); + snoopoffset = 2; + line = netsec_readline(nsc, &len, errstr); + netsec_set_snoop_callback(nsc, NULL, NULL); + + if (line == NULL) + return NOTOK; + + if (len < 2 || (len == 2 && strcmp(line, "+ ") != 0)) { + netsec_err(errstr, "Invalid format for SASL response"); + return NOTOK; + } + + if (len == 2) { + *outdata = NULL; + *outdatalen = 0; + } else { + rc = decodeBase64(line + 2, outdata, &len, 0, NULL); + *outdatalen = len; + if (rc != OK) { + netsec_err(errstr, "Unable to decode base64 response"); + return NOTOK; + } + } + break; + + /* + * Simple request encoding + */ + + case NETSEC_SASL_WRITE: + if (indatalen > 0) { + unsigned char *b64data; + b64data = mh_xmalloc(BASE64SIZE(indatalen)); + writeBase64raw(indata, indatalen, b64data); + rc = netsec_printf(nsc, errstr, "%s", b64data); + free(b64data); + if (rc != OK) + return NOTOK; + } + + if (netsec_printf(nsc, errstr, "\r\n") != OK) + return NOTOK; + + netsec_set_snoop_callback(nsc, netsec_b64_snoop_decoder, NULL); + rc = netsec_flush(nsc, errstr); + netsec_set_snoop_callback(nsc, NULL, NULL); + if (rc != OK) + return NOTOK; + break; + + /* + * Finish protocol + */ + + case NETSEC_SASL_FINISH: + line = NULL; + if (get_imap_response(nsc, "CAPABILITY ", &capstring, &line, + false, true, errstr) != OK) + return NOTOK; + /* + * We MIGHT get a capability response here. If so, be sure we + * parse it. We ALSO might get a untagged CAPABILITY response. + * Which one should we prefer? I guess we'll go with the untagged + * one. + */ + + if (capstring) { + p = capstring + 11; /* "CAPABILITY " */ + parse_capability(p, strlen(p)); + free(capstring); + } else if (line && has_prefix(line, "OK [CAPABILITY ")) { + char *q; + + p = line + 15; + q = strchr(p, ']'); + + if (q) + parse_capability(p, q - p); + } + + break; + + /* + * Cancel an authentication dialog + */ + + case NETSEC_SASL_CANCEL: + rc = netsec_printf(nsc, errstr, "*\r\n"); + if (rc == OK) + rc = netsec_flush(nsc, errstr); + if (rc != OK) + return NOTOK; + break; } return OK; } @@ -354,7 +731,8 @@ imap_sasl_callback(enum sasl_message_type mtype, unsigned const char *indata, */ static int -send_imap_command(netsec_context *nsc, char **errstr, const char *fmt, ...) +send_imap_command(netsec_context *nsc, bool noflush, char **errstr, + const char *fmt, ...) { static unsigned int seq = 0; /* Tag sequence number */ va_list ap; @@ -365,6 +743,20 @@ send_imap_command(netsec_context *nsc, char **errstr, const char *fmt, ...) snprintf(cmd->tag, sizeof(cmd->tag), "A%u ", seq++); + if (timestamp) { + char *p; + va_start(ap, fmt); + vsnprintf(cmd->prefix, sizeof(cmd->prefix), fmt, ap); + va_end(ap); + + p = strchr(cmd->prefix, ' '); + + if (p) + *p = '\0'; + + gettimeofday(&cmd->start, NULL); + } + if (netsec_write(nsc, cmd->tag, strlen(cmd->tag), errstr) != OK) { free(cmd); return NOTOK; @@ -382,7 +774,7 @@ send_imap_command(netsec_context *nsc, char **errstr, const char *fmt, ...) return NOTOK; } - if (netsec_flush(nsc, errstr) != OK) { + if (!noflush && netsec_flush(nsc, errstr) != OK) { free(cmd); return NOTOK; } @@ -393,6 +785,116 @@ send_imap_command(netsec_context *nsc, char **errstr, const char *fmt, ...) return OK; } +/* + * Send an APPEND to the server, which requires some extra semantics + */ + +static int +send_append(netsec_context *nsc, struct imap_msg *imsg, char **errstr) +{ + FILE *f; + bool nonsynlit = false; + char *status = NULL, *line = NULL; + size_t linesize = 0; + ssize_t rc; + + /* + * If we have the LITERAL+ extension, or we have LITERAL- and our + * message is 4096 bytes or less, we can do it all in one message. + * Otherwise we have to wait for a contination marker (+). + */ + + if (capability_set("LITERAL+") || + (capability_set("LITERAL-") && imsg->msgsize <= 4096)) { + nonsynlit = true; + } + + /* + * Send our APPEND command + */ + + if (send_imap_command(nsc, nonsynlit, errstr, "APPEND \"%s\" {%u%s}", + imsg->folder, (unsigned int) imsg->msgsize, + nonsynlit ? "+" : "") != OK) + return NOTOK; + + /* + * If we need to wait for a syncing literal, do that now + */ + + if (! nonsynlit) { + if (get_imap_response(nsc, NULL, NULL, &status, true, + true, errstr) != OK) { + imsg->queue = true; /* XXX Sigh */ + fprintf(stderr, "APPEND command failed: %s\n", *errstr); + free(*errstr); + return OK; + } + if (!(status && has_prefix(status, "+"))) { + netsec_err(errstr, "Expected contination (+), but got: %s", status); + free(status); + return NOTOK; + } + free(status); + } + + /* + * Now write the message out, but make sure we end each line with \r\n + */ + + if ((f = fopen(imsg->command, "r")) == NULL) { + netsec_err(errstr, "Unable to open %s: %s", imsg->command, + strerror(errno)); + return NOTOK; + } + + while ((rc = getline(&line, &linesize, f)) > 0) { + if (rc > 1 && line[rc - 1] == '\n' && line[rc - 2] == '\r') { + if (netsec_write(nsc, line, rc, errstr) != OK) { + free(line); + fclose(f); + return NOTOK; + } + } else { + if (line[rc - 1] == '\n') + rc--; + if (netsec_write(nsc, line, rc, errstr) != OK) { + free(line); + fclose(f); + return NOTOK; + } + if (netsec_write(nsc, "\r\n", 2, errstr) != OK) { + free(line); + fclose(f); + return NOTOK; + } + } + } + + free(line); + + if (! feof(f)) { + netsec_err(errstr, "Error reading %s: %s", imsg->command, + strerror(errno)); + fclose(f); + return NOTOK; + } + + fclose(f); + + /* + * Send a final \r\n for the end of the command + */ + + if (netsec_write(nsc, "\r\n", 2, errstr) != OK) + return NOTOK; + + if (! imsg->queue) + return netsec_flush(nsc, errstr); + + return OK; +} + /* * Get all outstanding responses. If we were passed in a token string * to look for, return it. @@ -400,10 +902,11 @@ send_imap_command(netsec_context *nsc, char **errstr, const char *fmt, ...) static int get_imap_response(netsec_context *nsc, const char *token, char **tokenresponse, - char **errstr) + char **status, bool condok, bool failerr, char **errstr) { char *line; struct imap_cmd *cmd; + bool numerrs = false; if (tokenresponse) *tokenresponse = NULL; @@ -418,10 +921,22 @@ getline: free(*tokenresponse); *tokenresponse = getcpy(line + 2); } + } if (condok && has_prefix(line, "+")) { + if (status) { + *status = getcpy(line); + } + /* + * Special case; return now but don't dequeue the tag, + * since we will want to get final result later. + */ + return OK; } else { if (has_prefix(line, cmdqueue->tag)) { cmd = cmdqueue; + if (timestamp) + ts_report(&cmd->start, "Command (%s) execution time", + cmd->prefix); cmdqueue = cmd->next; free(cmd); } else { @@ -429,16 +944,238 @@ getline: if (has_prefix(line, cmd->next->tag)) { struct imap_cmd *cmd2 = cmd->next; cmd->next = cmd->next->next; + if (failerr && strncmp(line + strlen(cmd2->tag), + "OK ", 3) != 0) { + numerrs = true; + netsec_err(errstr, "%s", line + strlen(cmd2->tag)); + } + if (timestamp) + ts_report(&cmd2->start, "Command (%s) execution " + "time", cmd2->prefix); free(cmd2); + if (status) + *status = getcpy(line); goto getline; } - netsec_err(errstr, "Non-matching response line: %s\n", - line); - return NOTOK; } } } } - return OK; + return numerrs ? NOTOK : OK; +} + +/* + * Add an IMAP command to the msg queue + */ + +static void +add_msg(bool queue, struct imap_msg **ret_imsg, const char *fmt, ...) +{ + struct imap_msg *imsg; + va_list ap; + size_t msgbufsize; + char *msg = NULL; + int rc = 63; + + do { + msgbufsize = rc + 1; + msg = mh_xrealloc(msg, msgbufsize); + va_start(ap, fmt); + rc = vsnprintf(msg, msgbufsize, fmt, ap); + va_end(ap); + } while (rc >= (int) msgbufsize); + + imsg = mh_xmalloc(sizeof(*imsg)); + + imsg->command = msg; + imsg->folder = NULL; + imsg->append = false; + imsg->queue = queue; + imsg->next = NULL; + + if (msgqueue_head == NULL) { + msgqueue_head = imsg; + msgqueue_tail = imsg; + } else { + msgqueue_tail->next = imsg; + msgqueue_tail = imsg; + } + + if (ret_imsg) + *ret_imsg = imsg; +} + +/* + * Add an APPEND command to the queue + */ + +static void +add_append(const char *filename, const char *folder, bool queue) +{ + size_t filesize = rfc822size(filename); + struct imap_msg *imsg; + + add_msg(queue, &imsg, "%s", filename); + + imsg->folder = getcpy(folder); + imsg->append = true; + imsg->msgsize = filesize; +} + +/* + * Process a batch file, which can contain commands (and some arguments) + */ + +static void +batchfile(const char *filename, char *afolder, bool queue) +{ + FILE *f; + char *line = NULL; + size_t linesize = 0; + ssize_t rc; + bool afolder_alloc = false; + + if (!(f = fopen(filename, "r"))) { + die("Unable to open batch file %s: %s", filename, strerror(errno)); + } + + while ((rc = getline(&line, &linesize, f)) > 0) { + line[rc - 1] = '\0'; + if (*line == '-') { + switch (smatch (line + 1, switches)) { + case QUEUESW: + queue = true; + continue; + case NOQUEUESW: + queue = false; + continue; + case AFOLDERSW: + if (afolder_alloc) + free(afolder); + rc = getline(&line, &linesize, f); + if (rc <= 0) + die("Unable to read next line for -afolder"); + if (rc == 1) + die("Folder name cannot be blank"); + line[rc - 1] = '\0'; + afolder = getcpy(line); + afolder_alloc = true; + continue; + + case APPENDSW: + rc = getline(&line, &linesize, f); + if (rc <= 0) + die("Unable to read filename for -append"); + if (rc == 1) + die("Filename for -append cannot be blank"); + line[rc - 1] = '\0'; + add_append(line, afolder, queue); + continue; + + case AMBIGSW: + ambigsw (line, switches); + done (1); + case UNKWNSW: + die("%s unknown", line); + default: + die("Switch %s not supported in batch mode", line); + } + } else if (*line == '+') { + if (*(line + 1) == '\0') + die("Invalid null folder name"); + add_msg(false, NULL, "SELECT \"%s\"", line + 1); + } else { + if (*line == '\0') + continue; /* Ignore blank line */ + add_msg(queue, NULL, "%s", line); + } + } + + if (!feof(f)) { + die("Read of \"%s\" failed: %s", filename, strerror(errno)); + } + + fclose(f); + + if (afolder_alloc) + free(afolder); + + free(line); +} + +/* + * Negotiate TLS connection, with optional timestamp + */ + +static void +imap_negotiate_tls(netsec_context *nsc) +{ + char *errstr; + struct timeval tv; + + if (timestamp) + gettimeofday(&tv, NULL); + + if (netsec_negotiate_tls(nsc, &errstr) != OK) + die("%s", errstr); + + if (timestamp) + ts_report(&tv, "TLS negotation time"); +} + +/* + * Give a timestamp report. + */ + +static void +ts_report(struct timeval *tv, const char *fmt, ...) +{ + struct timeval now; + double delta; + va_list ap; + + gettimeofday(&now, NULL); + + delta = ((double) now.tv_sec) - ((double) tv->tv_sec) + + (now.tv_usec / 1E6 - tv->tv_usec / 1E6); + + va_start(ap, fmt); + vfprintf(stdout, fmt, ap); + va_end(ap); + + printf(": %f sec\n", delta); +} + +/* + * Calculate the RFC 822 size of file. + */ + +static size_t +rfc822size(const char *filename) +{ + FILE *f; + size_t total = 0, linecap = 0; + ssize_t rc; + char *line = NULL; + + if (! (f = fopen(filename, "r"))) + die("Unable to open %s: %s", filename, strerror(errno)); + + while ((rc = getline(&line, &linecap, f)) > 0) { + total += rc; + if (line[rc - 1] == '\n' && (rc == 1 || line[rc - 2] != '\r')) + total++; + if (line[rc - 1] != '\n') + total += 2; + } + + free(line); + + if (! feof(f)) + die("Error while reading %s: %s", filename, strerror(errno)); + + fclose(f); + + return total; }