piler/src/misc.c

563 lines
9.9 KiB
C
Raw Normal View History

2011-11-14 15:57:52 +01:00
/*
* misc.c, SJ
*/
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <sys/un.h>
#include <sys/stat.h>
#include <netinet/in.h>
#include <arpa/inet.h>
#include <netdb.h>
#include <sys/time.h>
#include <time.h>
#include <fcntl.h>
#include <syslog.h>
#include <unistd.h>
#include <ctype.h>
2012-10-27 14:40:25 +02:00
#include <openssl/ssl.h>
2011-11-14 15:57:52 +01:00
#include "misc.h"
#include "smtpcodes.h"
#include "errmsg.h"
#include "config.h"
#include "tai.h"
2012-07-06 21:44:57 +02:00
int get_build(){
return BUILD;
}
2011-11-14 15:57:52 +01:00
void __fatal(char *s){
fprintf(stderr, "%s\n", s);
exit(1);
}
/*
* calculate the difference betwwen two timevals in [usec]
*/
long tvdiff(struct timeval a, struct timeval b){
double res;
res = (a.tv_sec * 1000000 + a.tv_usec) - (b.tv_sec * 1000000 + b.tv_usec);
return (long) res;
}
/*
* search something in a buffer
*/
int searchStringInBuffer(char *s, int len1, char *what, int len2){
int i, k, r;
for(i=0; i<len1; i++){
r = 0;
for(k=0; k<len2; k++){
if(*(s+i+k) == *(what+k))
r++;
}
if(r == len2)
return i;
}
return 0;
}
/*
* count a character in buffer
*/
int countCharacterInBuffer(char *p, char c){
int i=0;
for(; *p; p++){
if(*p == c)
i++;
}
return i;
}
void replaceCharacterInBuffer(char *p, char from, char to){
int i, k=0;
for(i=0; i<strlen(p); i++){
if(p[i] == from){
if(to > 0){
p[k] = to;
k++;
}
}
else {
p[k] = p[i];
k++;
}
}
p[k] = '\0';
}
/*
* split a string by a character as delimiter
*/
char *split(char *row, int ch, char *s, int size){
char *r;
if(row == NULL || s == NULL)
2011-11-14 15:57:52 +01:00
return NULL;
r = strchr(row, ch);
if(r) *r = '\0';
2011-11-14 15:57:52 +01:00
snprintf(s, size, "%s", row);
2011-11-14 15:57:52 +01:00
if(r){
*r = ch;
r++;
2011-11-14 15:57:52 +01:00
}
return r;
}
/*
* split a string by a string as delimiter
*/
char *split_str(char *row, char *what, char *s, int size){
char *r;
int len;
memset(s, 0, size);
if(row == NULL)
return NULL;
r = strstr(row, what);
if(r == NULL){
len = strlen(row);
if(len > size)
len = size;
}
else {
len = strlen(row) - strlen(r);
if(len > size)
len = size;
r += strlen(what);
}
if(s != NULL){
strncpy(s, row, len);
s[len] = '\0';
}
return r;
}
/*
* trim trailing CR-LF
*/
2012-10-01 21:09:11 +02:00
int trimBuffer(char *s){
int n=0;
2011-11-14 15:57:52 +01:00
char *p;
p = strrchr(s, '\n');
2012-10-01 21:09:11 +02:00
if(p){
*p = '\0';
n++;
}
2011-11-14 15:57:52 +01:00
p = strrchr(s, '\r');
2012-10-01 21:09:11 +02:00
if(p){
*p = '\0';
n++;
}
2011-11-14 15:57:52 +01:00
2012-10-01 21:09:11 +02:00
return n;
2011-11-14 15:57:52 +01:00
}
int extractEmail(char *rawmail, char *email){
2014-06-30 16:10:36 +02:00
char *p, *q1, *q2;
2011-11-14 15:57:52 +01:00
memset(email, 0, SMALLBUFSIZE);
2014-06-30 16:10:36 +02:00
// extract both regular and VERP addresses, eg.
// aaa@aaa.fu and archive+user=domain.com@myarchive.local
2011-11-14 15:57:52 +01:00
p = strchr(rawmail, '<');
if(p){
2014-06-30 16:10:36 +02:00
q1 = strchr(p+1, '+');
if(q1){
q2 = strchr(q1+1, '=');
if(q2){
p = strchr(q2, '@');
if(p){
*p = '\0';
*q2 = '@';
snprintf(email, SMALLBUFSIZE-1, "%s", q1+1);
2014-07-01 11:43:36 +02:00
*p = '@';
2014-06-30 16:10:36 +02:00
return 1;
}
}
}
2011-11-14 15:57:52 +01:00
snprintf(email, SMALLBUFSIZE-1, "%s", p+1);
p = strchr(email, '>');
if(p){
*p = '\0';
return 1;
}
}
return 0;
}
2013-09-11 09:19:29 +02:00
void make_random_string(char *buf, int buflen){
int i, len;
static char alphanum[] = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789";
len = strlen(alphanum);
for(i=0; i<buflen; i++){
*(buf+i) = alphanum[rand() % len];
}
}
2013-01-06 21:04:58 +01:00
void create_id(char *id, unsigned char server_id){
2011-11-14 15:57:52 +01:00
int i;
unsigned char buf[RND_STR_LEN/2];
memset(id, 0, SMALLBUFSIZE);
2013-01-06 21:04:58 +01:00
get_random_bytes(buf, RND_STR_LEN/2, server_id);
2011-11-14 15:57:52 +01:00
for(i=0; i < RND_STR_LEN/2; i++){
sprintf(id, "%02x", buf[i]);
id += 2;
}
}
/*
* reading from pool
*/
2013-01-06 21:04:58 +01:00
int get_random_bytes(unsigned char *buf, int len, unsigned char server_id){
2011-11-14 15:57:52 +01:00
int fd, ret=0;
struct taia now;
char nowpack[TAIA_PACK];
/* the first 12 bytes are the taia timestamp */
taia_now(&now);
taia_pack(nowpack, &now);
memcpy(buf, nowpack, 12);
fd = open(RANDOM_POOL, O_RDONLY);
if(fd == -1) return ret;
2013-01-06 21:04:58 +01:00
*(buf + 12) = server_id;
if(readFromEntropyPool(fd, buf+12+1, len-12-1) != len-12-1){
2011-11-14 15:57:52 +01:00
syslog(LOG_PRIORITY, "%s: %s", ERR_CANNOT_READ_FROM_POOL, RANDOM_POOL);
}
close(fd);
return ret;
}
/*
* read random data from entropy pool
*/
int readFromEntropyPool(int fd, void *_s, size_t n){
char *s = _s;
ssize_t res, pos = 0;
while(n > pos){
res = read(fd, s + pos, n - pos);
switch(res){
case -1: continue;
case 0: return res;
default : pos += res;
}
}
return pos;
}
/*
* recv() with timeout
*/
int recvtimeout(int s, char *buf, int len, int timeout){
fd_set fds;
int n;
struct timeval tv;
2012-10-27 14:40:25 +02:00
memset(buf, 0, len);
2011-11-14 15:57:52 +01:00
FD_ZERO(&fds);
FD_SET(s, &fds);
tv.tv_sec = timeout;
tv.tv_usec = TIMEOUT_USEC;
n = select(s+1, &fds, NULL, NULL, &tv);
if (n == 0) return -2; // timeout!
if (n == -1) return -1; // error
return recv(s, buf, len, 0);
}
2013-04-09 14:50:27 +02:00
int write1(int sd, void *buf, int buflen, int use_ssl, SSL *ssl){
2012-10-27 14:40:25 +02:00
int n;
if(use_ssl == 1)
2013-04-09 14:50:27 +02:00
n = SSL_write(ssl, buf, buflen);
2012-10-27 14:40:25 +02:00
else
2013-04-09 14:50:27 +02:00
n = send(sd, buf, buflen, 0);
2012-10-27 14:40:25 +02:00
return n;
}
2012-10-28 20:36:46 +01:00
int ssl_want_retry(SSL *ssl, int ret, int timeout){
int i;
fd_set fds;
struct timeval tv;
int sock;
// something went wrong. I'll retry, die quietly, or complain
i = SSL_get_error(ssl, ret);
if(i == SSL_ERROR_NONE)
return 1;
tv.tv_sec = timeout/1000;
tv.tv_usec = 0;
FD_ZERO(&fds);
switch(i){
case SSL_ERROR_WANT_READ: // pause until the socket is readable
sock = SSL_get_rfd(ssl);
FD_SET(sock, &fds);
i = select(sock+1, &fds, 0, 0, &tv);
break;
case SSL_ERROR_WANT_WRITE: // pause until the socket is writeable
sock = SSL_get_wfd(ssl);
FD_SET(sock, &fds);
i = select(sock+1, 0, &fds, 0, &tv);
break;
case SSL_ERROR_ZERO_RETURN: // the sock closed, just return quietly
i = 0;
break;
default: // ERROR - unexpected error code
i = -1;
break;
};
return i;
}
int ssl_read_timeout(SSL *ssl, void *buf, int len, int timeout){
int i;
while(1){
i = SSL_read(ssl, (char*)buf, len);
if(i > 0) break;
i = ssl_want_retry(ssl, i, timeout);
if(i <= 0) break;
}
return i;
}
2012-10-27 14:40:25 +02:00
int recvtimeoutssl(int s, char *buf, int len, int timeout, int use_ssl, SSL *ssl){
memset(buf, 0, len);
if(use_ssl == 1){
2012-10-28 20:36:46 +01:00
return ssl_read_timeout(ssl, buf, len-1, timeout);
2012-10-27 14:40:25 +02:00
}
else {
return recvtimeout(s, buf, len-1, timeout);
}
}
2011-11-14 15:57:52 +01:00
void write_pid_file(char *pidfile){
FILE *f;
f = fopen(pidfile, "w");
if(f){
fprintf(f, "%d", (int)getpid());
fclose(f);
}
else syslog(LOG_PRIORITY, "cannot write pidfile: %s", pidfile);
}
int drop_privileges(struct passwd *pwd){
if(pwd->pw_uid > 0 && pwd->pw_gid > 0){
if(getgid() != pwd->pw_gid){
if(setgid(pwd->pw_gid)) return -1;
}
if(getuid() != pwd->pw_uid){
if(setuid(pwd->pw_uid)) return -1;
}
}
return 0;
}
void init_session_data(struct session_data *sdata, struct __config *cfg){
int i;
sdata->fd = -1;
create_id(&(sdata->ttmpfile[0]), cfg->server_id);
unlink(sdata->ttmpfile);
snprintf(sdata->filename, SMALLBUFSIZE-1, "%s", sdata->ttmpfile);
snprintf(sdata->tmpframe, SMALLBUFSIZE-1, "%s.m", sdata->ttmpfile);
unlink(sdata->tmpframe);
memset(sdata->mailfrom, 0, SMALLBUFSIZE);
snprintf(sdata->client_addr, SMALLBUFSIZE-1, "null");
memset(sdata->attachments, 0, SMALLBUFSIZE);
memset(sdata->fromemail, 0, SMALLBUFSIZE);
sdata->duplicate_id = 0;
sdata->restored_copy = 0;
sdata->internal_sender = sdata->internal_recipient = sdata->external_recipient = 0;
sdata->direction = 0;
sdata->hdr_len = 0;
sdata->tot_len = 0;
2014-05-05 16:00:33 +02:00
sdata->stored_len = 0;
sdata->num_of_rcpt_to = 0;
2012-09-28 21:48:20 +02:00
sdata->ms_journal = 0;
sdata->journal_envelope_length = 0;
sdata->journal_bottom_length = 0;
sdata->tre = '-';
sdata->rav = AVIR_OK;
2012-01-26 14:35:51 +01:00
sdata->spam_message = 0;
sdata->customer_id = 0;
sdata->__acquire = sdata->__parsed = sdata->__av = sdata->__store = sdata->__compress = sdata->__encrypt = 0;
2014-01-13 13:06:10 +01:00
sdata->import = 0;
for(i=0; i<MAX_RCPT_TO; i++) memset(sdata->rcptto[i], 0, SMALLBUFSIZE);
time(&(sdata->now));
sdata->sent = sdata->delivered = sdata->retained = sdata->now;
#ifdef HAVE_TWEAK_SENT_TIME
sdata->sent += cfg->tweak_sent_time_offset;
#endif
}
int read_from_stdin(struct session_data *sdata){
int fd, rc=ERR, n;
char buf[MAXBUFSIZE];
fd = open(sdata->ttmpfile, O_CREAT|O_EXCL|O_RDWR|O_TRUNC, S_IRUSR|S_IWUSR);
if(fd == -1){
syslog(LOG_PRIORITY, "%s: cannot open ttmpfile", sdata->ttmpfile);
return rc;
}
while((n = read(0, buf, sizeof(buf))) > 0){
sdata->tot_len += write(fd, buf, n);
}
if(fsync(fd)){
syslog(LOG_PRIORITY, "%s: fsync() error", sdata->ttmpfile);
}
else rc = OK;
close(fd);
return rc;
}
void strtolower(char *s){
for(; *s; s++) *s = tolower(*s);
}
2013-04-09 14:50:27 +02:00
void *get_in_addr(struct sockaddr *sa){
if(sa->sa_family == AF_INET) return &(((struct sockaddr_in*)sa)->sin_addr);
return &(((struct sockaddr_in6*)sa)->sin6_addr);
}
2011-11-14 15:57:52 +01:00
#ifndef _GNU_SOURCE
char *strcasestr(const char *s, const char *find){
char c, sc;
size_t len;
if((c = *find++) != 0){
c = tolower((unsigned char)c);
len = strlen(find);
do {
do {
if((sc = *s++) == 0)
return (NULL);
} while((char)tolower((unsigned char)sc) != c);
} while (strncasecmp(s, find, len) != 0);
s--;
}
return((char*)s);
}
#endif