/* * driver.c -- generic driver for mail fetch method protocols * * Copyright 1996 by Eric S. Raymond * All rights reserved. * For license terms, see the file COPYING in this directory. */ #include #include #include #include #include #include #if defined(STDC_HEADERS) #include #endif #if defined(HAVE_UNISTD_H) #include #endif #if defined(HAVE_STDARG_H) #include #else #include #endif #if defined(HAVE_ALLOCA_H) #include #endif #if defined(HAVE_SYS_ITIMER_H) #include #endif #include #include #ifdef HAVE_GETHOSTBYNAME #include #include "mx.h" #endif /* HAVE_GETHOSTBYNAME */ #ifdef SUNOS #include #endif #ifdef KERBEROS_V4 #include #include #include #include #endif /* KERBEROS_V4 */ #include "socket.h" #include "fetchmail.h" #include "socket.h" #include "smtp.h" /* BSD portability hack...I know, this is an ugly place to put it */ #if !defined(SIGCHLD) && defined(SIGCLD) #define SIGCHLD SIGCLD #endif #define SMTP_PORT 25 /* standard SMTP service port */ extern char *strstr(); /* needed on sysV68 R3V7.1. */ int fetchlimit; /* how often to tear down the server connection */ int batchcount; /* count of messages sent in current batch */ int peek_capable; /* can we peek for better error recovery? */ static const struct method *protocol; static jmp_buf restart; char tag[TAGLEN]; static int tagnum; #define GENSYM (sprintf(tag, "a%04d", ++tagnum), tag) static char *shroud; /* string to shroud in debug output, if non-NULL */ static int mytimeout; /* value of nonreponse timeout */ static void set_timeout(int timeleft) /* reset the nonresponse-timeout */ { struct itimerval ntimeout; ntimeout.it_interval.tv_sec = ntimeout.it_interval.tv_usec = 0; ntimeout.it_value.tv_sec = timeleft; ntimeout.it_value.tv_usec = 0; setitimer(ITIMER_REAL, &ntimeout, (struct itimerval *)NULL); } static void timeout_handler (int signal) /* handle server-timeout SIGALRM signal */ { longjmp(restart, 1); } #define XMIT_ACCEPT 1 #define XMIT_REJECT 2 #define XMIT_ANTISPAM 3 static int accept_count, reject_count; #ifdef HAVE_RES_SEARCH #define MX_RETRIES 3 static int is_host_alias(const char *name, struct query *ctl) /* determine whether name is a DNS alias of the hostname */ { struct hostent *he; struct mxentry *mxp, *mxrecords; /* * The first two checks are optimizations that will catch a good * many cases. (1) check against the hostname the user * specified. Odds are good this will either be the mailserver's * FQDN or a suffix of it with the mailserver's domain's default * host name omitted. Then check the rest of the `also known as' * cache accumulated by previous DNS checks. This cache is primed * by the aka list option. * * (2) check against the mailserver's FQDN, in case * it's not the same as the declared hostname. * * Either of these on a mail address is definitive. Only if the * name doesn't match either is it time to call the bind library. * If this happens odds are good we're looking at an MX name. */ if (str_in_list(&ctl->server.lead_server->names, name)) return(TRUE); else if (strcmp(name, ctl->server.canonical_name) == 0) return(TRUE); else if (!ctl->server.dns) return(FALSE); /* * We know DNS service was up at the beginning of this poll cycle. * If it's down, our nameserver has crashed. We don't want to try * delivering the current message or anything else from this * mailbox until it's back up. */ else if ((he = gethostbyname(name)) != (struct hostent *)NULL) { if (strcmp(ctl->server.canonical_name, he->h_name) == 0) goto match; else return(FALSE); } else switch (h_errno) { case HOST_NOT_FOUND: /* specified host is unknown */ case NO_ADDRESS: /* valid, but does not have an IP address */ break; case NO_RECOVERY: /* non-recoverable name server error */ case TRY_AGAIN: /* temporary error on authoritative server */ default: if (outlevel != O_SILENT) putchar('\n'); /* terminate the progress message */ error(0, 0, "nameserver failure while looking for `%s' during poll of %s.", name, ctl->server.names->id); ctl->errcount++; break; } /* * We're only here if DNS was OK but the gethostbyname() failed * with a HOST_NOT_FOUND or NO_ADDRESS error. * Search for a name match on MX records pointing to the server. */ h_errno = 0; if ((mxrecords = getmxrecords(name)) == (struct mxentry *)NULL) { switch (h_errno) { case HOST_NOT_FOUND: /* specified host is unknown */ case NO_ADDRESS: /* valid, but does not have an IP address */ return(FALSE); break; case NO_RECOVERY: /* non-recoverable name server error */ case TRY_AGAIN: /* temporary error on authoritative server */ default: error(0, 0, "nameserve
#!/usr/bin/perl -w
# Copyright 2001 John Summerfield, summer@summer.ami.com.au
# GPL 2 applies.
#
($flags, $links, $owner, $gowner, $size, $month, $day, $timeOrDate, $name, $junk, $junk2, $junk1) ='';
$RemoteHost="ftp.ccil.org";
$LocalDir="/home/u03/incoming/";
$FilePattern="/pub/esr/fetchmail/fetchmail\*src.rpm";
$GrepArgs="fetchmail-[5-9]";
$no=0;
$TempFile=`mktemp /var/tmp/getfetchmail.XXXXXX`;
@files=`echo dir $FilePattern | ftp $RemoteHost  | egrep $GrepArgs`;
chomp @files;
open(FTP, "| ftp -d -v $RemoteHost | egrep '^213|MDTM'  >$TempFile");
foreach $L (@files)
{
	++$no;
	$L =~ s/  */,/g;
	($flags, $links, $owner, $gowner, $size, $month, $day, $timeOrDate, $name, $junk) = split /,/,$L;
	next unless substr($timeOrDate,2,1) eq ':';
	print FTP "modtime $name\n";
#	last if $no > 4;
}
close FTP;

$SavedTime=0;
$time=1;
$SavedName='';
open (FILES,$TempFile);
while ($rec = <FILES>)
{
	chomp $rec;
	($junk1, $junk2, $filename) = split / /,$rec if substr($rec,0,4) eq '--->';
	$time = substr($rec,4) if substr($rec,0,3) eq '213';
	if (($time > $SavedTime) && (substr($rec,0,3) eq '213'))
	{
		$SavedTime=$time;
		$SavedName=$filename;
	}
}
close FILES;
$LocalName = $SavedName; $LocalName =~ s=.*/==;
$LocalName = $LocalDir . $LocalName;
$Y=substr($SavedTime,0,4);
$M=substr($SavedTime,4,2);
$D=substr($SavedTime,6,2);
$h=substr($SavedTime,8,2);
$m=substr($SavedTime,10,2);
$s=substr($SavedTime,12,2);
print "I should get $SavedName and store it in $LocalName\n";
open(SH,"|/bin/bash");
print SH <<zz
set -x
echo get $SavedName $LocalName \| ftp $RemoteHost 
rpm -K $LocalName \|\| exit $?
touch -t $Y$M$D$h$m.$s  $LocalName
rpm --rebuild $LocalName
zz
;
close SH;
MTAs further upstream * didn't pass canonicalized From/Return-Path lines, *and* the * local SMTP listener insists on them. */ ap = (char *)NULL; if (return_path[0]) ap = return_path; else if (from_offs == -1 || !(ap = nxtaddr(headers + from_offs))) ap = user; if (SMTP_from(ctl->smtp_socket, ap, options) != SM_OK) { int smtperr = atoi(smtp_response); if (smtperr >= 400) error(0, -1, "SMTP error: %s", smtp_response); /* * There's one problem with this flow of control; * there's no way to avoid reading the whole message * off the server, even if the MAIL FROM response * tells us that it's just to be discarded. We could * fix this under IMAP by reading headers first, then * trying to issue the MAIL FROM, and *then* reading * the body...but POP3 can't do this. */ switch (smtperr) { case 571: /* unsolicited email refused */ /* * SMTP listener explicitly refuses to deliver * mail coming from this address, probably due * to an anti-spam domain exclusion. Respect * this. Don't try to ship the message, and * don't prevent it from being deleted. */ forward_ok = FALSE; goto skiptext; case 452: /* insufficient system storage */ /* * Temporary out-of-queue-space condition on the * ESMTP server. Don't try to ship the message, * and suppress deletion so it can be retried on * a future retrieval cycle. */ forward_ok = FALSE; delete_ok = FALSE; SMTP_rset(ctl->smtp_socket); /* required by RFC1870 */ goto skiptext; case 552: /* message exceeds fixed maximum message size */ /* * Permanent no-go condition on the * ESMTP server. Don't try to ship the message, * and allow it to be deleted. */ forward_ok = FALSE; SMTP_rset(ctl->smtp_socket); /* required by RFC1870 */ goto skiptext; default: /* retry with invoking user's address */ if (SMTP_from(ctl->smtp_socket, user, options) != SM_OK) { error(0, -1, "SMTP error: %s", smtp_response); free(headers); return(PS_SMTP); /* should never happen */ } } } /* * Now list the recipient addressees * * RFC 1123 requires that the domain name part of the * RCPT TO address be "canonicalized", that is a FQDN * or MX but not a CNAME. RFC1123 doesn't say whether * the FQDN part can be null (as it frequently will be * here), but it's hard to see how this could cause a * problem. */ for (idp = xmit_names; idp; idp = idp->next) if (idp->val.num == XMIT_ACCEPT) if (SMTP_rcpt(ctl->smtp_socket, idp->id) == SM_OK) good_addresses++; else { bad_addresses++; idp->val.num = XMIT_ANTISPAM; error(0, 0, "SMTP listener doesn't like recipient address `%s'", idp->id); } if (!good_addresses && SMTP_rcpt(ctl->smtp_socket, user) != SM_OK) { error(0, 0, "can't even send to calling user!"); free(headers); return(PS_SMTP); } /* tell it we're ready to send data */ SMTP_data(ctl->smtp_socket); } /* we may need to strip carriage returns */ if (ctl->stripcr) { char *sp, *tp; for (sp = tp = headers; *sp; sp++) if (*sp != '\r') *tp++ = *sp; *tp = '\0'; } /* write all the headers */ n = 0; if (ctl->mda && sinkfp) n = fwrite(headers, 1, strlen(headers), sinkfp); else if (ctl->smtp_socket != -1) n = SockWrite(ctl->smtp_socket, headers, strlen(headers)); free(headers); if (n < 0) { error(0, errno, "writing RFC822 headers"); if (ctl->mda) { pclose(sinkfp); signal(SIGCHLD, sigchld); } return(PS_IOERR); } else if (outlevel == O_VERBOSE) fputs("#", stderr); /* write error notifications */ #ifdef HAVE_RES_SEARCH if (no_local_matches || has_nuls || bad_addresses) #else if (has_nuls || bad_addresses) #endif /* HAVE_RES_SEARCH */ { int errlen = 0; char errhd[USERNAMELEN + POPBUFSIZE], *errmsg; errmsg = errhd; (void) strcpy(errhd, "X-Fetchmail-Warning: "); #ifdef HAVE_RES_SEARCH if (no_local_matches) { if (reject_count != 1) strcat(errhd, "no recipient addresses matched declared local names"); else { for (idp = xmit_names; idp; idp = idp->next) if (idp->val.num == XMIT_REJECT) break; sprintf(errhd+strlen(errhd), "recipient address %s didn't match any local name", idp->id); } } #endif /* HAVE_RES_SEARCH */ if (has_nuls) { if (errhd[sizeof("X-Fetchmail-Warning: ")]) strcat(errhd, "; "); strcat(errhd, "message has embedded NULs"); } if (bad_addresses) { if (errhd[sizeof("X-Fetchmail-Warning: ")]) strcat(errhd, "; "); strcat(errhd, "SMTP listener rejected local recipient addresses: "); errlen = strlen(errhd); for (idp = xmit_names; idp; idp = idp->next) if (idp->val.num == XMIT_ANTISPAM) errlen += strlen(idp->id) + 2; errmsg = alloca(errlen+3); (void) strcpy(errmsg, errhd); for (idp = xmit_names; idp; idp = idp->next) if (idp->val.num == XMIT_ANTISPAM) { strcat(errmsg, idp->id); if (idp->next) strcat(errmsg, ", "); } } if (ctl->mda && !ctl->forcecr) strcat(errmsg, "\n"); else strcat(errmsg, "\r\n"); /* we may need to strip carriage returns */ if (ctl->stripcr) { char *sp, *tp; for (sp = tp = errmsg; *sp; sp++) if (*sp != '\r') *tp++ = *sp; *tp = '\0'; } /* ship out the error line */ if (sinkfp) { if (ctl->mda) fwrite(errmsg, sizeof(char), strlen(errmsg), sinkfp); else SockWrite(ctl->smtp_socket, errmsg, strlen(errmsg)); } } free_str_list(&xmit_names); /* issue the delimiter line */ if (sinkfp && ctl->mda) fputc('\n', sinkfp); else if (ctl->smtp_socket != -1) { if (ctl->stripcr) SockWrite(ctl->smtp_socket, "\n", 1); else SockWrite(ctl->smtp_socket, "\r\n", 2); } /* * Body processing starts here */ skiptext: /* pass through the text lines */ while (delimited || remaining > 0) { if ((linelen = SockRead(sock, buf, sizeof(buf)-1)) == -1) return(PS_SOCKET); set_timeout(ctl->server.timeout); /* write the message size dots */ if (linelen > 0) { sizeticker += linelen; while (sizeticker >= SIZETICKER) { if (outlevel > O_SILENT) error_build("."); sizeticker -= SIZETICKER; } } remaining -= linelen; /* fix messages that have only \n line-termination (for qmail) */ if (ctl->forcecr) { cp = buf + strlen(buf) - 1; if (*cp == '\n' && (cp == buf || cp[-1] != '\r')) { *cp++ = '\r'; *cp++ = '\n'; *cp++ = '\0'; } } /* check for end of message */ if (delimited && *buf == '.') if (buf[1] == '\r' && buf[2] == '\n') break; /* ship out the text line */ if (forward_ok) { /* SMTP byte-stuffing */ if (*buf == '.') if (sinkfp && ctl->mda) fputs(".", sinkfp); else if (forward_ok && ctl->smtp_socket != -1) SockWrite(ctl->smtp_socket, buf, 1); /* we may need to strip carriage returns */ if (ctl->stripcr) { char *sp, *tp; for (sp = tp = buf; *sp; sp++) if (*sp != '\r') *tp++ = *sp; *tp = '\0'; } n = 0; if (ctl->mda) n = fwrite(buf, 1, strlen(buf), sinkfp); else if (ctl->smtp_socket != -1) n = SockWrite(ctl->smtp_socket, buf, strlen(buf)); if (n < 0) { error(0, errno, "writing message text"); if (ctl->mda) { pclose(sinkfp); signal(SIGCHLD, sigchld); } return(PS_IOERR); } else if (outlevel == O_VERBOSE) fputc('*', stderr); } } /* * End-of-message processing starts here */ if (outlevel == O_VERBOSE) fputc('\n', stderr); if (ctl->mda) { int rc; /* close the delivery pipe, we'll reopen before next message */ rc = pclose(sinkfp); signal(SIGCHLD, sigchld); if (rc) { error(0, -1, "MDA exited abnormally or returned nonzero status"); return(PS_IOERR); } } else if (ctl->smtp_socket != -1) { /* write message terminator */ if (SMTP_eom(ctl->smtp_socket) != SM_OK) { error(0, -1, "SMTP listener refused delivery"); ctl->errcount++; return(PS_TRANSIENT); } } return(delete_ok ? PS_SUCCESS : PS_TRANSIENT); } #ifdef KERBEROS_V4 int kerberos_auth (socket, canonical) /* authenticate to the server host using Kerberos V4 */ int socket; /* socket to server host */ const char *canonical; /* server name */ { char * host_primary; KTEXT ticket; MSG_DAT msg_data; CREDENTIALS cred; Key_schedule schedule; int rem; ticket = ((KTEXT) (malloc (sizeof (KTEXT_ST)))); rem = (krb_sendauth (0L, socket, ticket, "pop", canonical, ((char *) (krb_realmofhost (canonical))), ((unsigned long) 0), (&msg_data), (&cred), (schedule), ((struct sockaddr_in *) 0), ((struct sockaddr_in *) 0), "KPOPV0.1")); free (ticket); if (rem != KSUCCESS) { error(0, -1, "kerberos error %s", (krb_get_err_text (rem))); return (PS_ERROR); } return (0); } #endif /* KERBEROS_V4 */ int do_protocol(ctl, proto) /* retrieve messages from server using given protocol method table */ struct query *ctl; /* parsed options with merged-in defaults */ const struct method *proto; /* protocol method table */ { int ok, js, pst; char *msg, *sp, *cp, realname[HOSTLEN]; void (*sigsave)(); #ifndef KERBEROS_V4 if (ctl->server.authenticate == A_KERBEROS_V4) { error(0, -1, "Kerberos V4 support not linked."); return(PS_ERROR); } #endif /* KERBEROS_V4 */ /* lacking methods, there are some options that may fail */ if (!proto->is_old) { /* check for unsupported options */ if (ctl->flush) { error(0, 0, "Option --flush is not supported with %s", proto->name); return(PS_SYNTAX); } else if (ctl->fetchall) { error(0, 0, "Option --all is not supported with %s", proto->name); return(PS_SYNTAX); } } if (!proto->getsizes && ctl->limit) { error(0, 0, "Option --limit is not supported with %s", proto->name); return(PS_SYNTAX); } protocol = proto; tagnum = 0; tag[0] = '\0'; /* nuke any tag hanging out from previous query */ ok = 0; error_init(poll_interval == 0 && !logfile); /* set up the server-nonresponse timeout */ sigsave = signal(SIGALRM, timeout_handler); set_timeout(mytimeout = ctl->server.timeout); if ((js = setjmp(restart)) == 1) { error(0, 0, "timeout after %d seconds waiting for %s.", ctl->server.timeout, ctl->server.names->id); ok = PS_ERROR; } else { char buf [POPBUFSIZE+1]; int *msgsizes, len, num, count, new, deletions = 0; int sock, port, fetches; struct idlist *idp; /* execute pre-initialization command, if any */ if (ctl->preconnect && (ok = system(ctl->preconnect))) { sprintf(buf, "pre-connection command failed with status %d", ok); error(0, 0, buf); ok = PS_SYNTAX; goto closeUp; } /* open a socket to the mail server */ port = ctl->server.port ? ctl->server.port : protocol->port; if ((sock = SockOpen(ctl->server.names->id, port)) == -1) { #ifndef EHOSTUNREACH #define EHOSTUNREACH (-1) #endif if (outlevel == O_VERBOSE || errno != EHOSTUNREACH) error(0, errno, "connecting to host"); ok = PS_SOCKET; goto closeUp; } #ifdef KERBEROS_V4 if (ctl->server.authenticate == A_KERBEROS_V4) { ok = kerberos_auth(sock, ctl->server.canonical_name); if (ok != 0) goto cleanUp; set_timeout(ctl->server.timeout); } #endif /* KERBEROS_V4 */ /* accept greeting message from mail server */ ok = (protocol->parse_response)(sock, buf); if (ok != 0) goto cleanUp; set_timeout(ctl->server.timeout); /* * Try to parse the host's actual name out of the greeting * message. We do this so that the progress messages will * make sense even if the connection is indirected through * ssh. *Do* use this for hacking reply headers, but *don't* * use it for error logging, as the names in the log should * correlate directly back to rc file entries. * * This assumes that the first space-delimited token found * that contains at least two dots (with the characters on * each side of the dot alphanumeric to exclude version * numbers) is the hostname. The hostname candidate may not * contain @ -- if it does it's probably a mailserver * maintainer's name. If no such token is found, fall back on * the .fetchmailrc id. */ pst = 0; for (cp = buf; *cp; cp++) { switch (pst) { case 0: /* skip to end of current token */ if (*cp == ' ') pst = 1; break; case 1: /* look for blank-delimited token */ if (*cp != ' ') { sp = cp; pst = 2; } break; case 2: /* look for first dot */ if (*cp == '@') pst = 0; else if (*cp == ' ') pst = 1; else if (*cp == '.' && isalpha(cp[1]) && isalpha(cp[-1])) pst = 3; break; case 3: /* look for second dot */ if (*cp == '@') pst = 0; else if (*cp == ' ') pst = 1; else if (*cp == '.' && isalpha(cp[1]) && isalpha(cp[-1])) pst = 4; break; case 4: /* look for trailing space */ if (*cp == '@') pst = 0; else if (*cp == ' ') { pst = 5; goto done; } break; } } done: if (pst == 5) { char *tp = realname; while (sp < cp) *tp++ = *sp++; *tp = '\0'; } else strcpy(realname, ctl->server.names->id); /* try to get authorized to fetch mail */ if (protocol->getauth) { shroud = ctl->password; ok = (protocol->getauth)(sock, ctl, buf); shroud = (char *)NULL; if (ok == PS_ERROR) ok = PS_AUTHFAIL; if (ok != 0) { error(0, -1, "Authorization failure on %s@%s", ctl->remotename, realname); goto cleanUp; } set_timeout(ctl->server.timeout); } ctl->errcount = fetches = 0; /* now iterate over each folder selected */ for (idp = ctl->mailboxes; idp; idp = idp->next) { if (outlevel >= O_VERBOSE) if (idp->next) error(0, 0, "selecting folder %s"); else error(0, 0, "selecting default folder"); /* compute number of messages and number of new messages waiting */ ok = (protocol->getrange)(sock, ctl, idp->id, &count, &new); if (ok != 0) goto cleanUp; set_timeout(ctl->server.timeout); /* show user how many messages we downloaded */ if (idp->id) (void) sprintf(buf, "%s@%s:%s", ctl->remotename, realname, idp->id); else (void) sprintf(buf, "%s@%s", ctl->remotename, realname); if (outlevel > O_SILENT) if (count == -1) /* only used for ETRN */ error(0, 0, "Polling %s", buf); else if (count == 0) error(0, 0, "No mail at %s", buf); else { if (new != -1 && (count - new) > 0) error(0, 0, "%d message%s (%d seen) at %s.", count, count > 1 ? "s" : "", count-new, buf); else error(0, 0, "%d message%s at %s.", count, count > 1 ? "s" : "", buf); } /* we may need to get sizes in order to check message limits */ msgsizes = (int *)NULL; if (!ctl->fetchall && proto->getsizes && ctl->limit) { msgsizes = (int *)alloca(sizeof(int) * count); ok = (proto->getsizes)(sock, count, msgsizes); if (ok != 0) goto cleanUp; set_timeout(ctl->server.timeout); } if (check_only) { if (new == -1 || ctl->fetchall) new = count; ok = ((new > 0) ? PS_SUCCESS : PS_NOMAIL); goto cleanUp; } else if (count > 0) { int force_retrieval; /* * What forces this code is that in POP3 and IMAP2BIS you can't * fetch a message without having it marked `seen'. In IMAP4, * on the other hand, you can (peek_capable is set to convey * this). * * The result of being unable to peek is that if there's * any kind of transient error (DNS lookup failure, or * sendmail refusing delivery due to process-table limits) * the message will be marked "seen" on the server without * having been delivered. This is not a big problem if * fetchmail is running in foreground, because the user * will see a "skipped" message when it next runs and get * clued in. * * But in daemon mode this leads to the message being silently * ignored forever. This is not acceptable. * * We compensate for this by checking the error count from the * previous pass and forcing all messages to be considered new * if it's nonzero. */ force_retrieval = !peek_capable && (ctl->errcount > 0); /* read, forward, and delete messages */ for (num = 1; num <= count; num++) { int toolarge = msgsizes && (msgsizes[num-1] > ctl->limit); int fetch_it = ctl->fetchall || (!toolarge && (force_retrieval || !(protocol->is_old && (protocol->is_old)(sock,ctl,num)))); int suppress_delete = FALSE; /* we may want to reject this message if it's old */ if (!fetch_it) { if (outlevel > O_SILENT) { error_build("skipping message %d", num); if (toolarge) error_build(" (oversized, %d bytes)", msgsizes[num-1]); } } else { /* request a message */ ok = (protocol->fetch)(sock, ctl, num, &len); if (ok != 0) goto cleanUp; set_timeout(ctl->server.timeout); if (outlevel > O_SILENT) { error_build("reading message %d", num); if (len > 0) error_build(" (%d bytes)", len); if (outlevel == O_VERBOSE) error_complete(0, 0, ""); else error_build(" "); } /* read the message and ship it to the output sink */ ok = gen_readmsg(sock, len, protocol->delimited, ctl, realname); if (ok == PS_TRANSIENT) suppress_delete = TRUE; else if (ok) goto cleanUp; set_timeout(ctl->server.timeout); /* tell the server we got it OK and resynchronize */ if (protocol->trail) { ok = (protocol->trail)(sock, ctl, num); if (ok != 0) goto cleanUp; set_timeout(ctl->server.timeout); } fetches++; } /* * At this point in flow of control, either we've bombed * on a protocol error or had delivery refused by the SMTP * server (unlikely -- I've never seen it) or we've seen * `accepted for delivery' and the message is shipped. * It's safe to mark the message seen and delete it on the * server now. */ /* maybe we delete this message now? */ if (protocol->delete && !suppress_delete && (fetch_it ? !ctl->keep : ctl->flush)) { deletions++; if (outlevel > O_SILENT) error_complete(0, 0, " flushed"); ok = (protocol->delete)(sock, ctl, num); if (ok != 0) goto cleanUp; set_timeout(ctl->server.timeout); delete_str(&ctl->newsaved, num); } else if (outlevel > O_SILENT) error_complete(0, 0, " not flushed"); /* perhaps this as many as we're ready to handle */ if (ctl->fetchlimit && ctl->fetchlimit <= fetches) goto no_error; } } } no_error: set_timeout(ctl->server.timeout); ok = gen_transact(sock, protocol->exit_cmd); if (ok == 0) ok = (fetches > 0) ? PS_SUCCESS : PS_NOMAIL; set_timeout(0); close(sock); goto closeUp; cleanUp: set_timeout(ctl->server.timeout); if (ok != 0 && ok != PS_SOCKET) gen_transact(sock, protocol->exit_cmd); set_timeout(0); close(sock); } switch (ok) { case PS_SOCKET: msg = "socket"; break; case PS_AUTHFAIL: msg = "authorization"; break; case PS_SYNTAX: msg = "missing or bad RFC822 header"; break; case PS_IOERR: msg = "MDA"; break; case PS_ERROR: msg = "client/server synchronization"; break; case PS_PROTOCOL: msg = "client/server protocol"; break; case PS_SMTP: msg = "SMTP transaction"; break; case PS_UNDEFINED: error(0, 0, "undefined"); break; } if (ok==PS_SOCKET || ok==PS_AUTHFAIL || ok==PS_SYNTAX || ok==PS_IOERR || ok==PS_ERROR || ok==PS_PROTOCOL || ok==PS_SMTP) error(0, -1, "%s error while fetching from %s", msg, ctl->server.names->id); closeUp: signal(SIGALRM, sigsave); return(ok); } #if defined(HAVE_STDARG_H) void gen_send(int sock, char *fmt, ... ) /* assemble command in printf(3) style and send to the server */ #else void gen_send(sock, fmt, va_alist) /* assemble command in printf(3) style and send to the server */ int sock; /* socket to which server is connected */ const char *fmt; /* printf-style format */ va_dcl #endif { char buf [POPBUFSIZE+1]; va_list ap; if (protocol->tagged) (void) sprintf(buf, "%s ", GENSYM); else buf[0] = '\0'; #if defined(HAVE_STDARG_H) va_start(ap, fmt) ; #else va_start(ap); #endif vsprintf(buf + strlen(buf), fmt, ap); va_end(ap); strcat(buf, "\r\n"); SockWrite(sock, buf, strlen(buf)); if (outlevel == O_VERBOSE) { char *cp; if (shroud && shroud[0] && (cp = strstr(buf, shroud))) { char *sp; sp = cp + strlen(shroud); *cp++ = '*'; while (*sp) *cp++ = *sp++; *cp = '\0'; } buf[strlen(buf)-2] = '\0'; error(0, 0, "%s> %s", protocol->name, buf); } } int gen_recv(sock, buf, size) /* get one line of input from the server */ int sock; /* socket to which server is connected */ char *buf; /* buffer to receive input */ int size; /* length of buffer */ { if (SockRead(sock, buf, size) == -1) return(PS_SOCKET); else { if (buf[strlen(buf)-1] == '\n') buf[strlen(buf)-1] = '\0'; if (buf[strlen(buf)-1] == '\r') buf[strlen(buf)-1] = '\r'; if (outlevel == O_VERBOSE) error(0, 0, "%s< %s", protocol->name, buf); return(PS_SUCCESS); } } #if defined(HAVE_STDARG_H) int gen_transact(int sock, char *fmt, ... ) /* assemble command in printf(3) style, send to server, accept a response */ #else int gen_transact(int sock, fmt, va_alist) /* assemble command in printf(3) style, send to server, accept a response */ int sock; /* socket to which server is connected */ const char *fmt; /* printf-style format */ va_dcl #endif { int ok; char buf [POPBUFSIZE+1]; va_list ap; if (protocol->tagged) (void) sprintf(buf, "%s ", GENSYM); else buf[0] = '\0'; #if defined(HAVE_STDARG_H) va_start(ap, fmt) ; #else va_start(ap); #endif vsprintf(buf + strlen(buf), fmt, ap); va_end(ap); strcat(buf, "\r\n"); SockWrite(sock, buf, strlen(buf)); if (outlevel == O_VERBOSE) { char *cp; if (shroud && shroud[0] && (cp = strstr(buf, shroud))) { char *sp; sp = cp + strlen(shroud); *cp++ = '*'; while (*sp) *cp++ = *sp++; *cp = '\0'; } buf[strlen(buf)-1] = '\0'; error(0, 0, "%s> %s", protocol->name, buf); } /* we presume this does its own response echoing */ ok = (protocol->parse_response)(sock, buf); set_timeout(mytimeout); return(ok); } /* driver.c ends here */