piler/src/imap.c

343 lines
8.2 KiB
C
Raw Normal View History

/*
* imap.c, SJ
*/
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <strings.h>
#include <sys/types.h>
#include <sys/stat.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <arpa/inet.h>
#include <netdb.h>
#include <sys/time.h>
#include <openssl/ssl.h>
2012-10-27 14:40:25 +02:00
#include <openssl/err.h>
#include <fcntl.h>
#include <ctype.h>
#include <syslog.h>
#include <unistd.h>
#include <limits.h>
#include <piler.h>
int get_message_length_from_imap_answer(char *s, int *_1st_line_bytes){
char *p, *q;
int len=0;
p = strstr(s, "\r\n");
if(!p){
printf("invalid reply: %s", s);
return len;
}
*p = '\0';
2012-10-27 14:40:25 +02:00
//*_1st_line_bytes = strlen(s)+2;
*_1st_line_bytes = p-s+2;
if(*(p-1) == '}') *(p-1) = '\0';
q = strchr(s, '{');
if(q){
q++;
len = atoi(q);
}
*(p-1) = '}';
*p = '\r';
return len;
}
2012-08-09 00:08:49 +02:00
int is_last_complete_packet(char *s, int len, char *tagok, char *tagbad, int *pos){
char *p;
*pos = 0;
if(*(s+len-2) == '\r' && *(s+len-1) == '\n'){
2012-08-09 00:08:49 +02:00
if((p = strstr(s, tagok))){
*pos = p - s;
if(*pos > 3) *pos -= 2;
return 1;
}
if(strstr(s, tagbad)) return 1;
}
return 0;
}
2012-10-27 14:40:25 +02:00
int process_imap_folder(int sd, int *seq, char *folder, struct session_data *sdata, struct __data *data, int use_ssl, struct __config *cfg){
int rc=ERR, i, n, pos, endpos, messages=0, len, readlen, fd, lastpos, nreads, processed_messages=0;
char *p, tag[SMALLBUFSIZE], tagok[SMALLBUFSIZE], tagbad[SMALLBUFSIZE], buf[MAXBUFSIZE], filename[SMALLBUFSIZE];
char aggrbuf[3*MAXBUFSIZE];
snprintf(tag, sizeof(tag)-1, "A%d", *seq); snprintf(tagok, sizeof(tagok)-1, "\r\nA%d OK", (*seq)++);
snprintf(buf, sizeof(buf)-1, "%s SELECT \"%s\"\r\n", tag, folder);
2012-10-27 14:40:25 +02:00
n = write1(sd, buf, use_ssl, data->ssl);
n = recvtimeoutssl(sd, buf, sizeof(buf), 10, use_ssl, data->ssl);
if(!strstr(buf, tagok)){
trimBuffer(buf);
printf("error: %s\n", buf);
return rc;
}
p = strstr(buf, " EXISTS");
if(p){
*p = '\0';
2013-01-10 22:30:30 +01:00
p = strrchr(buf, ' ');
if(p){
while(!isdigit(*p)){ p++; }
messages = atoi(p);
}
}
printf("found %d messages\n", messages);
if(messages <= 0) return rc;
for(i=1; i<=messages; i++){
processed_messages++;
2012-08-09 00:08:49 +02:00
printf("processed: %7d\r", processed_messages); fflush(stdout);
snprintf(tag, sizeof(tag)-1, "A%d", *seq);
snprintf(tagok, sizeof(tagok)-1, "\r\nA%d OK", (*seq)++);
snprintf(tagbad, sizeof(tagbad)-1, "\r\n%s BAD", tag);
snprintf(buf, sizeof(buf)-1, "%s FETCH %d (BODY.PEEK[])\r\n", tag, i);
snprintf(filename, sizeof(filename)-1, "%s-%d.txt", folder, i);
unlink(filename);
fd = open(filename, O_CREAT|O_EXCL|O_RDWR|O_TRUNC, S_IRUSR|S_IWUSR);
if(fd == -1){
printf("cannot open: %s\n", filename);
return rc;
}
2012-10-27 14:40:25 +02:00
n = write1(sd, buf, use_ssl, data->ssl);
readlen = 0;
pos = 0;
len = 0;
nreads = 0;
2012-08-09 00:08:49 +02:00
endpos = 0;
memset(aggrbuf, 0, sizeof(aggrbuf));
lastpos = 0;
2012-10-27 14:40:25 +02:00
while((n = recvtimeoutssl(sd, buf, sizeof(buf), 15, use_ssl, data->ssl)) > 0){
nreads++;
readlen += n;
if(nreads == 1){
len = get_message_length_from_imap_answer(buf, &pos);
if(len < 10){
printf("%d: too short message! %s\n", i, buf);
break;
}
}
2012-10-27 14:40:25 +02:00
if(lastpos + 1 + n < sizeof(aggrbuf)){
2012-08-09 00:08:49 +02:00
2012-10-27 14:40:25 +02:00
if(nreads == 1){
memcpy(aggrbuf+lastpos, buf+pos, n-pos);
lastpos += n-pos;
}
else {
memcpy(aggrbuf+lastpos, buf, n);
lastpos += n;
}
}
2012-10-27 14:40:25 +02:00
else {
write(fd, aggrbuf, sizeof(buf));
2012-10-27 14:40:25 +02:00
memmove(aggrbuf, aggrbuf+sizeof(buf), lastpos-sizeof(buf));
lastpos -= sizeof(buf);
2012-10-27 14:40:25 +02:00
memcpy(aggrbuf+lastpos, buf, n);
lastpos += n;
}
2012-08-09 00:08:49 +02:00
2012-10-27 14:40:25 +02:00
if(is_last_complete_packet(aggrbuf, lastpos, tagok, tagbad, &endpos) == 1){
write(fd, aggrbuf, lastpos-(lastpos-endpos));
break;
}
2012-08-09 00:08:49 +02:00
}
close(fd);
rc = import_message(filename, sdata, data, cfg);
unlink(filename);
}
printf("\n");
return OK;
}
2012-11-24 23:02:08 +01:00
int connect_to_imap_server(int sd, int *seq, char *server, char *username, char *password, int port, struct __data *data, int use_ssl){
int n;
char tag[SMALLBUFSIZE], tagok[SMALLBUFSIZE], buf[MAXBUFSIZE];
unsigned long host=0;
struct sockaddr_in remote_addr;
2012-10-27 14:40:25 +02:00
X509* server_cert;
char *str;
2012-11-24 23:02:08 +01:00
host = resolve_host(server);
remote_addr.sin_family = AF_INET;
2012-10-27 14:40:25 +02:00
remote_addr.sin_port = htons(port);
remote_addr.sin_addr.s_addr = host;
bzero(&(remote_addr.sin_zero),8);
if(connect(sd, (struct sockaddr *)&remote_addr, sizeof(struct sockaddr)) == -1){
printf("connect()\n");
return ERR;
}
2012-10-27 14:40:25 +02:00
if(use_ssl == 1){
2012-10-28 20:36:46 +01:00
SSL_library_init();
2012-10-27 14:40:25 +02:00
SSL_load_error_strings();
2012-10-28 20:36:46 +01:00
data->ctx = SSL_CTX_new(SSLv3_client_method());
2012-10-27 14:40:25 +02:00
CHK_NULL(data->ctx, "internal SSL error");
data->ssl = SSL_new(data->ctx);
CHK_NULL(data->ssl, "internal ssl error");
SSL_set_fd(data->ssl, sd);
n = SSL_connect(data->ssl);
CHK_SSL(n, "internal ssl error");
//printf("Cipher: %s\n", SSL_get_cipher(data->ssl));
server_cert = SSL_get_peer_certificate(data->ssl);
CHK_NULL(server_cert, "server cert error");
//if(verbose){
str = X509_NAME_oneline(X509_get_subject_name(server_cert), 0, 0);
CHK_NULL(str, "error in server cert");
printf("server cert:\n\t subject: %s\n", str);
OPENSSL_free(str);
str = X509_NAME_oneline(X509_get_issuer_name(server_cert), 0, 0);
CHK_NULL(str, "error in server cert");
printf("\t issuer: %s\n\n", str);
OPENSSL_free(str);
//}
X509_free(server_cert);
}
n = recvtimeoutssl(sd, buf, sizeof(buf), 10, use_ssl, data->ssl);
snprintf(tag, sizeof(tag)-1, "A%d", *seq); snprintf(tagok, sizeof(tagok)-1, "A%d OK", (*seq)++);
snprintf(buf, sizeof(buf)-1, "%s CAPABILITY\r\n", tag);
write1(sd, buf, use_ssl, data->ssl);
n = recvtimeoutssl(sd, buf, sizeof(buf), 10, use_ssl, data->ssl);
snprintf(tag, sizeof(tag)-1, "A%d", *seq); snprintf(tagok, sizeof(tagok)-1, "A%d OK", (*seq)++);
snprintf(buf, sizeof(buf)-1, "%s LOGIN %s \"%s\"\r\n", tag, username, password);
2012-10-27 14:40:25 +02:00
write1(sd, buf, use_ssl, data->ssl);
n = recvtimeoutssl(sd, buf, sizeof(buf), 10, use_ssl, data->ssl);
if(strncmp(buf, tagok, strlen(tagok))){
printf("login failed, server reponse: %s\n", buf);
return ERR;
}
return OK;
}
2012-10-27 14:40:25 +02:00
void close_connection(int sd, struct __data *data, int use_ssl){
close(sd);
if(use_ssl == 1){
SSL_shutdown(data->ssl);
SSL_free(data->ssl);
SSL_CTX_free(data->ctx);
2012-10-28 20:36:46 +01:00
ERR_free_strings();
2012-10-27 14:40:25 +02:00
}
}
int list_folders(int sd, int *seq, char *folders, int foldersize, int use_ssl, struct __data *data){
2013-01-10 22:30:30 +01:00
char *p, *q, tag[SMALLBUFSIZE], tagok[SMALLBUFSIZE], buf[3*MAXBUFSIZE+3], puf[MAXBUFSIZE];
int len=0, n;
memset(buf, 0, sizeof(buf));
snprintf(tag, sizeof(tag)-1, "A%d", *seq); snprintf(tagok, sizeof(tagok)-1, "A%d OK", (*seq)++);
2013-01-10 22:30:30 +01:00
//snprintf(puf, sizeof(puf)-1, "%s LIST \"\" %%\r\n", tag);
snprintf(puf, sizeof(puf)-1, "%s LIST \"\" \"*\"\r\n", tag);
2013-01-10 22:30:30 +01:00
write1(sd, puf, use_ssl, data->ssl);
2013-01-10 22:30:30 +01:00
while(1){
n = recvtimeoutssl(sd, puf, sizeof(puf), 10, use_ssl, data->ssl);
if(len + n < sizeof(buf)){
memcpy(&buf[len], puf, n);
len += n;
}
else break;
2013-01-10 22:30:30 +01:00
if(strstr(buf, tagok)) break;
}
p = &buf[0];
do {
memset(puf, 0, sizeof(puf));
p = split(p, '\n', puf, sizeof(puf)-1);
trimBuffer(puf);
if(strncmp(puf, "* LIST ", 7) == 0){
2013-01-10 22:30:30 +01:00
q = strstr(puf, ") \"");
if(q){
2013-01-10 22:30:30 +01:00
q += 5;
if(*q == ' ') q++;
if(*q == '"') q++;
if(q[strlen(q)-1] == '"') q[strlen(q)-1] = '\0';
strncat(folders, "\n", foldersize-1);
strncat(folders, q, foldersize-1);
}
}
else {
if(strncmp(puf, tagok, strlen(tagok)) == 0) {}
}
} while(p);
return 0;
}