busybox/mailutils/mail.c
<<
>>
Prefs
   1/* vi: set sw=4 ts=4: */
   2/*
   3 * helper routines
   4 *
   5 * Copyright (C) 2008 by Vladimir Dronnikov <dronnikov@gmail.com>
   6 *
   7 * Licensed under GPLv2, see file LICENSE in this source tree.
   8 */
   9#include "libbb.h"
  10#include "mail.h"
  11
  12static void kill_helper(void)
  13{
  14        if (G.helper_pid > 0) {
  15                kill(G.helper_pid, SIGTERM);
  16                G.helper_pid = 0;
  17        }
  18}
  19
  20// generic signal handler
  21static void signal_handler(int signo)
  22{
  23#define err signo
  24        if (SIGALRM == signo) {
  25                kill_helper();
  26                bb_error_msg_and_die("timed out");
  27        }
  28
  29        // SIGCHLD. reap zombies
  30        if (safe_waitpid(G.helper_pid, &err, WNOHANG) > 0) {
  31                if (WIFSIGNALED(err))
  32                        bb_error_msg_and_die("helper killed by signal %u", WTERMSIG(err));
  33                if (WIFEXITED(err)) {
  34                        G.helper_pid = 0;
  35                        if (WEXITSTATUS(err))
  36                                bb_error_msg_and_die("helper exited (%u)", WEXITSTATUS(err));
  37                }
  38        }
  39#undef err
  40}
  41
  42void FAST_FUNC launch_helper(const char **argv)
  43{
  44        // setup vanilla unidirectional pipes interchange
  45        int i;
  46        int pipes[4];
  47
  48        xpipe(pipes);
  49        xpipe(pipes + 2);
  50
  51        // NB: handler must be installed before vfork
  52        bb_signals(0
  53                + (1 << SIGCHLD)
  54                + (1 << SIGALRM)
  55                , signal_handler);
  56
  57        G.helper_pid = xvfork();
  58
  59        i = (!G.helper_pid) * 2; // for parent:0, for child:2
  60        close(pipes[i + 1]); // 1 or 3 - closing one write end
  61        close(pipes[2 - i]); // 2 or 0 - closing one read end
  62        xmove_fd(pipes[i], STDIN_FILENO); // 0 or 2 - using other read end
  63        xmove_fd(pipes[3 - i], STDOUT_FILENO); // 3 or 1 - other write end
  64
  65        if (!G.helper_pid) {
  66                // child: try to execute connection helper
  67                // NB: SIGCHLD & SIGALRM revert to SIG_DFL on exec
  68                BB_EXECVP_or_die((char**)argv);
  69        }
  70
  71        // parent
  72        // check whether child is alive
  73        //redundant:signal_handler(SIGCHLD);
  74        // child seems OK -> parent goes on
  75        atexit(kill_helper);
  76}
  77
  78char* FAST_FUNC send_mail_command(const char *fmt, const char *param)
  79{
  80        char *msg;
  81        if (timeout)
  82                alarm(timeout);
  83        msg = (char*)fmt;
  84        if (fmt) {
  85                msg = xasprintf(fmt, param);
  86                if (verbose)
  87                        bb_error_msg("send:'%s'", msg);
  88                printf("%s\r\n", msg);
  89        }
  90        fflush_all();
  91        return msg;
  92}
  93
  94// NB: parse_url can modify url[] (despite const), but only if '@' is there
  95/*
  96static char* FAST_FUNC parse_url(char *url, char **user, char **pass)
  97{
  98        // parse [user[:pass]@]host
  99        // return host
 100        char *s = strchr(url, '@');
 101        *user = *pass = NULL;
 102        if (s) {
 103                *s++ = '\0';
 104                *user = url;
 105                url = s;
 106                s = strchr(*user, ':');
 107                if (s) {
 108                        *s++ = '\0';
 109                        *pass = s;
 110                }
 111        }
 112        return url;
 113}
 114*/
 115
 116void FAST_FUNC encode_base64(char *fname, const char *text, const char *eol)
 117{
 118        enum {
 119                SRC_BUF_SIZE = 45,  /* This *MUST* be a multiple of 3 */
 120                DST_BUF_SIZE = 4 * ((SRC_BUF_SIZE + 2) / 3),
 121        };
 122#define src_buf text
 123        char src[SRC_BUF_SIZE];
 124        FILE *fp = fp;
 125        ssize_t len = len;
 126        char dst_buf[DST_BUF_SIZE + 1];
 127
 128        if (fname) {
 129                fp = (NOT_LONE_DASH(fname)) ? xfopen_for_read(fname) : (FILE *)text;
 130                src_buf = src;
 131        } else if (text) {
 132                // though we do not call uuencode(NULL, NULL) explicitly
 133                // still we do not want to break things suddenly
 134                len = strlen(text);
 135        } else
 136                return;
 137
 138        while (1) {
 139                size_t size;
 140                if (fname) {
 141                        size = fread((char *)src_buf, 1, SRC_BUF_SIZE, fp);
 142                        if ((ssize_t)size < 0)
 143                                bb_perror_msg_and_die(bb_msg_read_error);
 144                } else {
 145                        size = len;
 146                        if (len > SRC_BUF_SIZE)
 147                                size = SRC_BUF_SIZE;
 148                }
 149                if (!size)
 150                        break;
 151                // encode the buffer we just read in
 152                bb_uuencode(dst_buf, src_buf, size, bb_uuenc_tbl_base64);
 153                if (fname) {
 154                        printf("%s\n", eol);
 155                } else {
 156                        src_buf += size;
 157                        len -= size;
 158                }
 159                fwrite(dst_buf, 1, 4 * ((size + 2) / 3), stdout);
 160        }
 161        if (fname && NOT_LONE_DASH(fname))
 162                fclose(fp);
 163#undef src_buf
 164}
 165
 166/*
 167 * get username and password from a file descriptor
 168 */
 169void FAST_FUNC get_cred_or_die(int fd)
 170{
 171        if (isatty(fd)) {
 172                G.user = xstrdup(bb_ask(fd, /* timeout: */ 0, "User: "));
 173                G.pass = xstrdup(bb_ask(fd, /* timeout: */ 0, "Password: "));
 174        } else {
 175                G.user = xmalloc_reads(fd, /* maxsize: */ NULL);
 176                G.pass = xmalloc_reads(fd, /* maxsize: */ NULL);
 177        }
 178        if (!G.user || !*G.user || !G.pass)
 179                bb_error_msg_and_die("no username or password");
 180}
 181