2012-11-24 23:02:08 +01:00
|
|
|
/*
|
|
|
|
* pop3.c, SJ
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <strings.h>
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/stat.h>
|
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <netinet/in.h>
|
|
|
|
#include <arpa/inet.h>
|
|
|
|
#include <netdb.h>
|
|
|
|
#include <sys/time.h>
|
|
|
|
#include <openssl/ssl.h>
|
|
|
|
#include <openssl/err.h>
|
|
|
|
#include <fcntl.h>
|
|
|
|
#include <ctype.h>
|
|
|
|
#include <syslog.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
#include <limits.h>
|
|
|
|
#include <piler.h>
|
|
|
|
|
|
|
|
|
2013-08-23 13:46:27 +02:00
|
|
|
void update_import_job_stat(struct session_data *sdata, struct __data *data);
|
2013-08-23 13:02:51 +02:00
|
|
|
|
|
|
|
|
2012-11-24 23:02:08 +01:00
|
|
|
int is_last_complete_pop3_packet(char *s, int len){
|
|
|
|
|
|
|
|
if(*(s+len-5) == '\r' && *(s+len-4) == '\n' && *(s+len-3) == '.' && *(s+len-2) == '\r' && *(s+len-1) == '\n'){
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-04-05 21:10:09 +02:00
|
|
|
int connect_to_pop3_server(int sd, char *username, char *password, struct __data *data, int use_ssl){
|
2012-11-24 23:02:08 +01:00
|
|
|
int n;
|
|
|
|
char buf[MAXBUFSIZE];
|
|
|
|
X509* server_cert;
|
|
|
|
char *str;
|
|
|
|
|
|
|
|
|
|
|
|
if(use_ssl == 1){
|
|
|
|
|
|
|
|
SSL_library_init();
|
|
|
|
SSL_load_error_strings();
|
|
|
|
|
2014-10-15 23:22:36 +02:00
|
|
|
data->ctx = SSL_CTX_new(TLSv1_client_method());
|
2012-11-24 23:02:08 +01:00
|
|
|
CHK_NULL(data->ctx, "internal SSL error");
|
|
|
|
|
|
|
|
data->ssl = SSL_new(data->ctx);
|
|
|
|
CHK_NULL(data->ssl, "internal ssl error");
|
|
|
|
|
|
|
|
SSL_set_fd(data->ssl, sd);
|
|
|
|
n = SSL_connect(data->ssl);
|
|
|
|
CHK_SSL(n, "internal ssl error");
|
|
|
|
|
2014-10-15 23:22:36 +02:00
|
|
|
printf("Cipher: %s\n", SSL_get_cipher(data->ssl));
|
|
|
|
|
2012-11-24 23:02:08 +01:00
|
|
|
server_cert = SSL_get_peer_certificate(data->ssl);
|
|
|
|
CHK_NULL(server_cert, "server cert error");
|
|
|
|
|
|
|
|
str = X509_NAME_oneline(X509_get_subject_name(server_cert), 0, 0);
|
|
|
|
CHK_NULL(str, "error in server cert");
|
|
|
|
OPENSSL_free(str);
|
|
|
|
|
|
|
|
str = X509_NAME_oneline(X509_get_issuer_name(server_cert), 0, 0);
|
|
|
|
CHK_NULL(str, "error in server cert");
|
|
|
|
OPENSSL_free(str);
|
|
|
|
|
|
|
|
X509_free(server_cert);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-12-28 14:50:37 +01:00
|
|
|
recvtimeoutssl(sd, buf, sizeof(buf), data->import->timeout, use_ssl, data->ssl);
|
2012-11-24 23:02:08 +01:00
|
|
|
|
|
|
|
|
|
|
|
snprintf(buf, sizeof(buf)-1, "USER %s\r\n", username);
|
|
|
|
|
2013-04-09 14:50:27 +02:00
|
|
|
write1(sd, buf, strlen(buf), use_ssl, data->ssl);
|
2015-12-28 14:50:37 +01:00
|
|
|
recvtimeoutssl(sd, buf, sizeof(buf), data->import->timeout, use_ssl, data->ssl);
|
2012-11-24 23:02:08 +01:00
|
|
|
|
|
|
|
|
|
|
|
snprintf(buf, sizeof(buf)-1, "PASS %s\r\n", password);
|
|
|
|
|
2013-04-09 14:50:27 +02:00
|
|
|
write1(sd, buf, strlen(buf), use_ssl, data->ssl);
|
2015-12-28 14:50:37 +01:00
|
|
|
recvtimeoutssl(sd, buf, sizeof(buf), data->import->timeout, use_ssl, data->ssl);
|
2012-11-24 23:02:08 +01:00
|
|
|
|
|
|
|
if(strncmp(buf, "+OK", 3) == 0) return OK;
|
|
|
|
|
2014-09-10 16:12:35 +02:00
|
|
|
printf("error: %s", buf);
|
|
|
|
|
2013-08-23 13:46:27 +02:00
|
|
|
return ERR;
|
2012-11-24 23:02:08 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-08-23 13:02:51 +02:00
|
|
|
int process_pop3_emails(int sd, struct session_data *sdata, struct __data *data, int use_ssl, int dryrun, struct __config *cfg){
|
|
|
|
int i=0, rc=ERR, n, pos, readlen, fd, lastpos, nreads;
|
2012-11-24 23:02:08 +01:00
|
|
|
char *p, buf[MAXBUFSIZE], filename[SMALLBUFSIZE];
|
|
|
|
char aggrbuf[3*MAXBUFSIZE];
|
|
|
|
|
2013-08-23 13:02:51 +02:00
|
|
|
data->import->processed_messages = 0;
|
|
|
|
data->import->total_messages = 0;
|
|
|
|
|
2012-11-24 23:02:08 +01:00
|
|
|
snprintf(buf, sizeof(buf)-1, "STAT\r\n");
|
2015-12-28 14:50:37 +01:00
|
|
|
write1(sd, buf, strlen(buf), use_ssl, data->ssl);
|
2012-11-24 23:02:08 +01:00
|
|
|
|
2015-12-28 14:50:37 +01:00
|
|
|
recvtimeoutssl(sd, buf, sizeof(buf), data->import->timeout, use_ssl, data->ssl);
|
2012-11-24 23:02:08 +01:00
|
|
|
|
|
|
|
if(strncmp(buf, "+OK ", 4) == 0){
|
|
|
|
p = strchr(&buf[4], ' ');
|
|
|
|
if(p){
|
|
|
|
*p = '\0';
|
2013-08-23 13:02:51 +02:00
|
|
|
data->import->total_messages = atoi(&buf[4]);
|
2012-11-24 23:02:08 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
else return ERR;
|
|
|
|
|
|
|
|
|
2014-09-04 14:57:23 +02:00
|
|
|
if(data->quiet == 0) printf("found %d messages\n", data->import->total_messages);
|
2012-11-24 23:02:08 +01:00
|
|
|
|
2013-09-04 16:47:27 +02:00
|
|
|
if(data->import->total_messages <= 0) return OK;
|
2012-11-24 23:02:08 +01:00
|
|
|
|
2014-09-03 11:39:52 +02:00
|
|
|
for(i=data->import->start_position; i<=data->import->total_messages; i++){
|
2013-08-23 13:02:51 +02:00
|
|
|
data->import->processed_messages++;
|
2014-10-15 22:51:50 +02:00
|
|
|
if(data->quiet == 0){ printf("processed: %7d [%3d%%]\r", data->import->processed_messages, 100*i/data->import->total_messages); fflush(stdout); }
|
2012-11-24 23:02:08 +01:00
|
|
|
|
|
|
|
|
|
|
|
snprintf(buf, sizeof(buf)-1, "RETR %d\r\n", i);
|
|
|
|
|
2014-10-15 23:22:36 +02:00
|
|
|
snprintf(filename, sizeof(filename)-1, "pop3-tmp-%d-%d.txt", getpid(), i);
|
2012-11-24 23:02:08 +01:00
|
|
|
unlink(filename);
|
|
|
|
|
|
|
|
fd = open(filename, O_CREAT|O_EXCL|O_RDWR|O_TRUNC, S_IRUSR|S_IWUSR);
|
|
|
|
if(fd == -1){
|
|
|
|
printf("cannot open: %s\n", filename);
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2015-12-28 14:50:37 +01:00
|
|
|
write1(sd, buf, strlen(buf), use_ssl, data->ssl);
|
2012-11-24 23:02:08 +01:00
|
|
|
|
|
|
|
readlen = 0;
|
|
|
|
pos = 0;
|
|
|
|
nreads = 0;
|
|
|
|
|
|
|
|
memset(aggrbuf, 0, sizeof(aggrbuf));
|
|
|
|
lastpos = 0;
|
|
|
|
|
|
|
|
|
2015-07-31 12:06:19 +02:00
|
|
|
while((n = recvtimeoutssl(sd, buf, sizeof(buf), data->import->timeout, use_ssl, data->ssl)) > 0){
|
2012-11-24 23:02:08 +01:00
|
|
|
nreads++;
|
|
|
|
readlen += n;
|
|
|
|
|
|
|
|
if(nreads == 1){
|
|
|
|
|
2013-02-19 19:50:41 +01:00
|
|
|
if(strncmp(buf, "+OK", 3) == 0){
|
|
|
|
p = strchr(&buf[3], '\n');
|
2012-11-24 23:02:08 +01:00
|
|
|
if(p){
|
|
|
|
*p = '\0';
|
|
|
|
pos = strlen(buf)+1;
|
|
|
|
*p = '\n';
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else { printf("error: %s", buf); return ERR; }
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
if(lastpos + 1 + n < sizeof(aggrbuf)){
|
|
|
|
|
|
|
|
if(nreads == 1){
|
|
|
|
memcpy(aggrbuf+lastpos, buf+pos, n-pos);
|
|
|
|
lastpos += n-pos;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
memcpy(aggrbuf+lastpos, buf, n);
|
|
|
|
lastpos += n;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
write(fd, aggrbuf, sizeof(buf));
|
|
|
|
|
|
|
|
memmove(aggrbuf, aggrbuf+sizeof(buf), lastpos-sizeof(buf));
|
|
|
|
lastpos -= sizeof(buf);
|
|
|
|
|
|
|
|
memcpy(aggrbuf+lastpos, buf, n);
|
|
|
|
lastpos += n;
|
|
|
|
}
|
|
|
|
|
|
|
|
if(is_last_complete_pop3_packet(aggrbuf, lastpos) == 1){
|
|
|
|
write(fd, aggrbuf, lastpos-3);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
close(fd);
|
|
|
|
|
2013-08-23 13:02:51 +02:00
|
|
|
if(dryrun == 0) rc = import_message(filename, sdata, data, cfg);
|
|
|
|
else rc = OK;
|
|
|
|
|
2014-04-17 15:39:40 +02:00
|
|
|
if(dryrun == 0 && rc == OK && data->import->remove_after_import == 1){
|
|
|
|
snprintf(buf, sizeof(buf)-1, "DELE %d\r\n", i);
|
2015-12-28 14:50:37 +01:00
|
|
|
write1(sd, buf, strlen(buf), use_ssl, data->ssl);
|
|
|
|
recvtimeoutssl(sd, buf, sizeof(buf), data->import->timeout, use_ssl, data->ssl);
|
2014-04-17 15:39:40 +02:00
|
|
|
}
|
|
|
|
|
2013-08-23 13:02:51 +02:00
|
|
|
if(i % 100 == 0){
|
|
|
|
time(&(data->import->updated));
|
2013-08-23 13:46:27 +02:00
|
|
|
update_import_job_stat(sdata, data);
|
2013-08-23 13:02:51 +02:00
|
|
|
}
|
2012-11-24 23:02:08 +01:00
|
|
|
|
2014-10-15 23:22:36 +02:00
|
|
|
if(data->import->download_only == 0) unlink(filename);
|
2014-09-02 12:54:11 +02:00
|
|
|
|
|
|
|
|
|
|
|
/* whether to quit after processing a batch of messages */
|
|
|
|
|
|
|
|
if(data->import->batch_processing_limit > 0 && data->import->processed_messages >= data->import->batch_processing_limit){
|
|
|
|
break;
|
|
|
|
}
|
2012-11-24 23:02:08 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
snprintf(buf, sizeof(buf)-1, "QUIT\r\n");
|
2015-12-28 14:50:37 +01:00
|
|
|
write1(sd, buf, strlen(buf), use_ssl, data->ssl);
|
2012-11-24 23:02:08 +01:00
|
|
|
|
2014-09-04 14:57:23 +02:00
|
|
|
if(data->quiet == 0) printf("\n");
|
2012-11-24 23:02:08 +01:00
|
|
|
|
2013-08-23 13:02:51 +02:00
|
|
|
time(&(data->import->finished));
|
|
|
|
data->import->status = 2;
|
2013-08-23 13:46:27 +02:00
|
|
|
update_import_job_stat(sdata, data);
|
2013-08-23 13:02:51 +02:00
|
|
|
|
|
|
|
|
2012-11-24 23:02:08 +01:00
|
|
|
return OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
|