2004-03-27 16:07:20 +00:00
|
|
|
/*
|
|
|
|
* mbsync - mailbox synchronizer
|
|
|
|
* Copyright (C) 2000-2002 Michael R. Elkins <me@mutt.org>
|
2013-04-20 14:57:16 +00:00
|
|
|
* Copyright (C) 2002-2006,2008,2010-2013 Oswald Buddenhagen <ossi@users.sf.net>
|
2004-03-27 16:07:20 +00:00
|
|
|
* Copyright (C) 2004 Theodore Y. Ts'o <tytso@mit.edu>
|
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
2011-04-10 17:34:36 +00:00
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
2004-03-27 16:07:20 +00:00
|
|
|
*
|
|
|
|
* As a special exception, mbsync may be linked with the OpenSSL library,
|
|
|
|
* despite that library's more restrictive license.
|
|
|
|
*/
|
|
|
|
|
2013-12-08 19:46:40 +00:00
|
|
|
#include "driver.h"
|
|
|
|
|
|
|
|
#include "socket.h"
|
2004-03-27 16:07:20 +00:00
|
|
|
|
|
|
|
#include <assert.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <stdio.h>
|
2004-09-08 16:14:12 +00:00
|
|
|
#include <stddef.h>
|
2006-01-25 06:35:19 +00:00
|
|
|
#include <limits.h>
|
2004-03-27 16:07:20 +00:00
|
|
|
#include <string.h>
|
|
|
|
#include <ctype.h>
|
2013-07-28 13:55:13 +00:00
|
|
|
#include <time.h>
|
2013-07-27 08:37:15 +00:00
|
|
|
#include <sys/wait.h>
|
2004-03-27 16:07:20 +00:00
|
|
|
|
|
|
|
typedef struct imap_server_conf {
|
|
|
|
struct imap_server_conf *next;
|
|
|
|
char *name;
|
2011-01-23 12:43:00 +00:00
|
|
|
server_conf_t sconf;
|
2004-03-27 16:07:20 +00:00
|
|
|
char *user;
|
|
|
|
char *pass;
|
2013-07-27 08:37:15 +00:00
|
|
|
char *pass_cmd;
|
2011-03-27 14:58:23 +00:00
|
|
|
int max_in_progress;
|
2011-03-27 10:06:41 +00:00
|
|
|
#ifdef HAVE_LIBSSL
|
2014-07-05 21:10:09 +00:00
|
|
|
char use_ssl;
|
2013-11-24 18:55:41 +00:00
|
|
|
char require_ssl;
|
|
|
|
char require_cram;
|
2004-03-27 16:07:20 +00:00
|
|
|
#endif
|
|
|
|
} imap_server_conf_t;
|
|
|
|
|
|
|
|
typedef struct imap_store_conf {
|
|
|
|
store_conf_t gen;
|
|
|
|
imap_server_conf_t *server;
|
2013-08-03 13:10:57 +00:00
|
|
|
char *delimiter;
|
2013-11-24 18:55:41 +00:00
|
|
|
char use_namespace;
|
2004-03-27 16:07:20 +00:00
|
|
|
} imap_store_conf_t;
|
|
|
|
|
|
|
|
typedef struct imap_message {
|
|
|
|
message_t gen;
|
|
|
|
/* int seq; will be needed when expunges are tracked */
|
|
|
|
} imap_message_t;
|
|
|
|
|
|
|
|
#define NIL (void*)0x1
|
|
|
|
#define LIST (void*)0x2
|
|
|
|
|
|
|
|
typedef struct _list {
|
|
|
|
struct _list *next, *child;
|
|
|
|
char *val;
|
|
|
|
int len;
|
|
|
|
} list_t;
|
|
|
|
|
2011-04-03 16:47:37 +00:00
|
|
|
#define MAX_LIST_DEPTH 5
|
|
|
|
|
2013-07-27 12:31:13 +00:00
|
|
|
struct imap_store;
|
|
|
|
|
2011-04-03 16:47:37 +00:00
|
|
|
typedef struct parse_list_state {
|
|
|
|
list_t *head, **stack[MAX_LIST_DEPTH];
|
2013-07-27 12:31:13 +00:00
|
|
|
int (*callback)( struct imap_store *ctx, list_t *list, char *cmd );
|
2011-04-03 16:47:37 +00:00
|
|
|
int level, need_bytes;
|
|
|
|
} parse_list_state_t;
|
|
|
|
|
2004-03-27 16:07:20 +00:00
|
|
|
struct imap_cmd;
|
|
|
|
|
2006-03-20 15:01:48 +00:00
|
|
|
typedef struct imap_store {
|
|
|
|
store_t gen;
|
2013-12-08 15:37:20 +00:00
|
|
|
const char *label; /* foreign */
|
2006-03-20 15:01:48 +00:00
|
|
|
const char *prefix;
|
2011-04-03 16:15:36 +00:00
|
|
|
int ref_count;
|
2012-08-25 16:26:23 +00:00
|
|
|
/* trash folder's existence is not confirmed yet */
|
|
|
|
enum { TrashUnknown, TrashChecking, TrashKnown } trashnc;
|
2006-03-20 20:39:06 +00:00
|
|
|
unsigned got_namespace:1;
|
2013-08-03 13:10:57 +00:00
|
|
|
char *delimiter; /* hierarchy delimiter */
|
2004-03-27 16:07:20 +00:00
|
|
|
list_t *ns_personal, *ns_other, *ns_shared; /* NAMESPACE info */
|
|
|
|
message_t **msgapp; /* FETCH results */
|
2010-11-15 09:38:50 +00:00
|
|
|
unsigned caps; /* CAPABILITY results */
|
2011-04-03 16:47:37 +00:00
|
|
|
parse_list_state_t parse_list_sts;
|
2004-03-27 16:07:20 +00:00
|
|
|
/* command queue */
|
2011-03-12 15:16:42 +00:00
|
|
|
int nexttag, num_in_progress;
|
2012-08-25 16:26:23 +00:00
|
|
|
struct imap_cmd *pending, **pending_append;
|
2004-03-27 16:07:20 +00:00
|
|
|
struct imap_cmd *in_progress, **in_progress_append;
|
2011-04-03 16:15:36 +00:00
|
|
|
|
|
|
|
/* Used during sequential operations like connect */
|
2011-03-13 11:06:49 +00:00
|
|
|
enum { GreetingPending = 0, GreetingBad, GreetingOk, GreetingPreauth } greeting;
|
2012-08-25 16:26:23 +00:00
|
|
|
int canceling; /* imap_cancel() is in progress */
|
2011-04-03 16:15:36 +00:00
|
|
|
union {
|
|
|
|
void (*imap_open)( store_t *srv, void *aux );
|
2012-08-25 16:26:23 +00:00
|
|
|
void (*imap_cancel)( void *aux );
|
2011-04-03 16:15:36 +00:00
|
|
|
} callbacks;
|
|
|
|
void *callback_aux;
|
|
|
|
|
2011-01-23 13:06:03 +00:00
|
|
|
conn_t conn; /* this is BIG, so put it last */
|
2004-03-27 16:07:20 +00:00
|
|
|
} imap_store_t;
|
|
|
|
|
|
|
|
struct imap_cmd {
|
|
|
|
struct imap_cmd *next;
|
|
|
|
char *cmd;
|
|
|
|
int tag;
|
2008-08-31 20:14:59 +00:00
|
|
|
|
|
|
|
struct {
|
2011-04-03 16:21:46 +00:00
|
|
|
/* Will be called on each continuation request until it resets this pointer.
|
|
|
|
* Needs to invoke bad_callback and return -1 on error, otherwise return 0. */
|
2008-08-31 20:14:59 +00:00
|
|
|
int (*cont)( imap_store_t *ctx, struct imap_cmd *cmd, const char *prompt );
|
|
|
|
void (*done)( imap_store_t *ctx, struct imap_cmd *cmd, int response );
|
|
|
|
char *data;
|
|
|
|
int data_len;
|
|
|
|
int uid; /* to identify fetch responses */
|
2013-11-24 18:55:41 +00:00
|
|
|
char high_prio; /* if command is queued, put it at the front of the queue. */
|
|
|
|
char to_trash; /* we are storing to trash, not current. */
|
|
|
|
char create; /* create the mailbox if we get an error ... */
|
|
|
|
char trycreate; /* ... but only if this is true or the server says so. */
|
2008-08-31 20:14:59 +00:00
|
|
|
} param;
|
2004-03-27 16:07:20 +00:00
|
|
|
};
|
|
|
|
|
2011-04-03 16:15:36 +00:00
|
|
|
struct imap_cmd_simple {
|
|
|
|
struct imap_cmd gen;
|
|
|
|
void (*callback)( int sts, void *aux );
|
|
|
|
void *callback_aux;
|
|
|
|
};
|
|
|
|
|
|
|
|
struct imap_cmd_fetch_msg {
|
|
|
|
struct imap_cmd_simple gen;
|
|
|
|
msg_data_t *msg_data;
|
|
|
|
};
|
|
|
|
|
|
|
|
struct imap_cmd_out_uid {
|
|
|
|
struct imap_cmd gen;
|
|
|
|
void (*callback)( int sts, int uid, void *aux );
|
|
|
|
void *callback_aux;
|
|
|
|
int out_uid;
|
|
|
|
};
|
|
|
|
|
|
|
|
struct imap_cmd_refcounted_state {
|
|
|
|
void (*callback)( int sts, void *aux );
|
|
|
|
void *callback_aux;
|
|
|
|
int ref_count;
|
|
|
|
int ret_val;
|
|
|
|
};
|
|
|
|
|
|
|
|
struct imap_cmd_refcounted {
|
|
|
|
struct imap_cmd gen;
|
|
|
|
struct imap_cmd_refcounted_state *state;
|
|
|
|
};
|
|
|
|
|
2006-03-20 15:01:48 +00:00
|
|
|
#define CAP(cap) (ctx->caps & (1 << (cap)))
|
2004-03-27 16:07:20 +00:00
|
|
|
|
|
|
|
enum CAPABILITY {
|
|
|
|
NOLOGIN = 0,
|
2011-03-27 10:06:41 +00:00
|
|
|
#ifdef HAVE_LIBSSL
|
2004-03-27 16:07:20 +00:00
|
|
|
CRAM,
|
|
|
|
STARTTLS,
|
|
|
|
#endif
|
2011-03-13 14:03:59 +00:00
|
|
|
UIDPLUS,
|
|
|
|
LITERALPLUS,
|
2013-12-08 14:11:00 +00:00
|
|
|
MOVE,
|
2011-03-13 14:03:59 +00:00
|
|
|
NAMESPACE
|
2004-03-27 16:07:20 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
static const char *cap_list[] = {
|
|
|
|
"LOGINDISABLED",
|
2011-03-27 10:06:41 +00:00
|
|
|
#ifdef HAVE_LIBSSL
|
2004-03-27 16:07:20 +00:00
|
|
|
"AUTH=CRAM-MD5",
|
|
|
|
"STARTTLS",
|
|
|
|
#endif
|
2011-03-13 14:03:59 +00:00
|
|
|
"UIDPLUS",
|
|
|
|
"LITERAL+",
|
2013-12-08 14:11:00 +00:00
|
|
|
"MOVE",
|
2011-03-13 14:03:59 +00:00
|
|
|
"NAMESPACE"
|
2004-03-27 16:07:20 +00:00
|
|
|
};
|
|
|
|
|
2012-07-15 10:55:04 +00:00
|
|
|
#define RESP_OK 0
|
|
|
|
#define RESP_NO 1
|
|
|
|
#define RESP_CANCEL 2
|
2004-03-27 16:07:20 +00:00
|
|
|
|
2011-04-03 16:15:36 +00:00
|
|
|
static INLINE void imap_ref( imap_store_t *ctx ) { ++ctx->ref_count; }
|
|
|
|
static int imap_deref( imap_store_t *ctx );
|
|
|
|
|
2012-07-15 10:55:04 +00:00
|
|
|
static void imap_invoke_bad_callback( imap_store_t *ctx );
|
2004-03-27 16:07:20 +00:00
|
|
|
|
|
|
|
static const char *Flags[] = {
|
2004-10-17 15:34:53 +00:00
|
|
|
"Draft",
|
|
|
|
"Flagged",
|
|
|
|
"Answered",
|
|
|
|
"Seen",
|
|
|
|
"Deleted",
|
2004-03-27 16:07:20 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
static struct imap_cmd *
|
2011-04-03 16:15:36 +00:00
|
|
|
new_imap_cmd( int size )
|
2008-08-31 20:14:59 +00:00
|
|
|
{
|
2011-04-03 16:15:36 +00:00
|
|
|
struct imap_cmd *cmd = nfmalloc( size );
|
2008-08-31 20:14:59 +00:00
|
|
|
memset( &cmd->param, 0, sizeof(cmd->param) );
|
|
|
|
return cmd;
|
|
|
|
}
|
|
|
|
|
2011-04-03 16:15:36 +00:00
|
|
|
#define INIT_IMAP_CMD(type, cmdp, cb, aux) \
|
|
|
|
cmdp = (struct type *)new_imap_cmd( sizeof(*cmdp) ); \
|
|
|
|
cmdp->callback = cb; \
|
|
|
|
cmdp->callback_aux = aux;
|
|
|
|
|
|
|
|
#define INIT_IMAP_CMD_X(type, cmdp, cb, aux) \
|
|
|
|
cmdp = (struct type *)new_imap_cmd( sizeof(*cmdp) ); \
|
|
|
|
cmdp->gen.callback = cb; \
|
|
|
|
cmdp->gen.callback_aux = aux;
|
|
|
|
|
2011-03-27 10:34:25 +00:00
|
|
|
static void
|
|
|
|
done_imap_cmd( imap_store_t *ctx, struct imap_cmd *cmd, int response )
|
|
|
|
{
|
|
|
|
cmd->param.done( ctx, cmd, response );
|
|
|
|
free( cmd->param.data );
|
|
|
|
free( cmd->cmd );
|
|
|
|
free( cmd );
|
|
|
|
}
|
|
|
|
|
2012-08-25 16:26:23 +00:00
|
|
|
static int
|
|
|
|
send_imap_cmd( imap_store_t *ctx, struct imap_cmd *cmd )
|
2004-03-27 16:07:20 +00:00
|
|
|
{
|
2010-11-15 09:38:50 +00:00
|
|
|
int bufl, litplus;
|
|
|
|
const char *buffmt;
|
2004-03-27 16:07:20 +00:00
|
|
|
char buf[1024];
|
|
|
|
|
2008-08-31 20:14:59 +00:00
|
|
|
cmd->tag = ++ctx->nexttag;
|
2010-11-15 09:38:50 +00:00
|
|
|
if (!cmd->param.data) {
|
|
|
|
buffmt = "%d %s\r\n";
|
|
|
|
litplus = 0;
|
2012-08-25 16:26:23 +00:00
|
|
|
} else if ((cmd->param.to_trash && ctx->trashnc == TrashUnknown) || !CAP(LITERALPLUS)) {
|
2010-11-15 09:38:50 +00:00
|
|
|
buffmt = "%d %s{%d}\r\n";
|
|
|
|
litplus = 0;
|
|
|
|
} else {
|
|
|
|
buffmt = "%d %s{%d+}\r\n";
|
|
|
|
litplus = 1;
|
|
|
|
}
|
|
|
|
bufl = nfsnprintf( buf, sizeof(buf), buffmt,
|
2008-08-31 20:14:59 +00:00
|
|
|
cmd->tag, cmd->cmd, cmd->param.data_len );
|
2006-01-29 14:46:16 +00:00
|
|
|
if (DFlags & VERBOSE) {
|
2006-03-20 15:01:48 +00:00
|
|
|
if (ctx->num_in_progress)
|
|
|
|
printf( "(%d in progress) ", ctx->num_in_progress );
|
2004-03-27 16:07:20 +00:00
|
|
|
if (memcmp( cmd->cmd, "LOGIN", 5 ))
|
2013-12-08 15:37:20 +00:00
|
|
|
printf( "%s>>> %s", ctx->label, buf );
|
2004-03-27 16:07:20 +00:00
|
|
|
else
|
2013-12-08 15:37:20 +00:00
|
|
|
printf( "%s>>> %d LOGIN <user> <pass>\n", ctx->label, cmd->tag );
|
2012-09-22 15:48:09 +00:00
|
|
|
fflush( stdout );
|
2004-03-27 16:07:20 +00:00
|
|
|
}
|
2011-03-13 13:12:54 +00:00
|
|
|
if (socket_write( &ctx->conn, buf, bufl, KeepOwn ) < 0)
|
2010-11-15 09:38:50 +00:00
|
|
|
goto bail;
|
|
|
|
if (litplus) {
|
2011-03-13 13:12:54 +00:00
|
|
|
char *p = cmd->param.data;
|
2010-11-15 09:38:50 +00:00
|
|
|
cmd->param.data = 0;
|
2011-03-13 13:12:54 +00:00
|
|
|
if (socket_write( &ctx->conn, p, cmd->param.data_len, GiveOwn ) < 0 ||
|
|
|
|
socket_write( &ctx->conn, "\r\n", 2, KeepOwn ) < 0)
|
|
|
|
goto bail;
|
2010-11-15 09:38:50 +00:00
|
|
|
}
|
2012-08-25 16:26:23 +00:00
|
|
|
if (cmd->param.to_trash && ctx->trashnc == TrashUnknown)
|
|
|
|
ctx->trashnc = TrashChecking;
|
2004-03-27 16:07:20 +00:00
|
|
|
cmd->next = 0;
|
2006-03-20 15:01:48 +00:00
|
|
|
*ctx->in_progress_append = cmd;
|
|
|
|
ctx->in_progress_append = &cmd->next;
|
|
|
|
ctx->num_in_progress++;
|
2012-08-25 16:26:23 +00:00
|
|
|
return 0;
|
2010-11-15 09:38:50 +00:00
|
|
|
|
|
|
|
bail:
|
2011-03-27 10:34:25 +00:00
|
|
|
done_imap_cmd( ctx, cmd, RESP_CANCEL );
|
2012-08-25 16:26:23 +00:00
|
|
|
return -1;
|
2004-03-27 16:07:20 +00:00
|
|
|
}
|
|
|
|
|
2012-08-25 16:26:23 +00:00
|
|
|
static int
|
|
|
|
cmd_submittable( imap_store_t *ctx, struct imap_cmd *cmd )
|
2004-03-27 16:07:20 +00:00
|
|
|
{
|
2011-03-12 15:16:42 +00:00
|
|
|
struct imap_cmd *cmdp;
|
|
|
|
|
2012-08-25 16:26:23 +00:00
|
|
|
return !ctx->conn.write_buf &&
|
2011-03-12 15:16:42 +00:00
|
|
|
!(ctx->in_progress &&
|
|
|
|
(cmdp = (struct imap_cmd *)((char *)ctx->in_progress_append -
|
|
|
|
offsetof(struct imap_cmd, next)), 1) &&
|
|
|
|
(cmdp->param.cont || cmdp->param.data)) &&
|
2012-08-25 16:26:23 +00:00
|
|
|
!(cmd->param.to_trash && ctx->trashnc == TrashChecking) &&
|
|
|
|
ctx->num_in_progress < ((imap_store_conf_t *)ctx->gen.conf)->server->max_in_progress;
|
|
|
|
}
|
2004-03-27 16:07:20 +00:00
|
|
|
|
2012-08-25 16:26:23 +00:00
|
|
|
static int
|
|
|
|
flush_imap_cmds( imap_store_t *ctx )
|
|
|
|
{
|
|
|
|
struct imap_cmd *cmd;
|
|
|
|
|
|
|
|
while ((cmd = ctx->pending) && cmd_submittable( ctx, cmd )) {
|
|
|
|
if (!(ctx->pending = cmd->next))
|
|
|
|
ctx->pending_append = &ctx->pending;
|
|
|
|
if (send_imap_cmd( ctx, cmd ) < 0)
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
cancel_pending_imap_cmds( imap_store_t *ctx )
|
|
|
|
{
|
|
|
|
struct imap_cmd *cmd;
|
|
|
|
|
|
|
|
while ((cmd = ctx->pending)) {
|
|
|
|
if (!(ctx->pending = cmd->next))
|
|
|
|
ctx->pending_append = &ctx->pending;
|
|
|
|
done_imap_cmd( ctx, cmd, RESP_CANCEL );
|
|
|
|
}
|
2004-03-27 16:07:20 +00:00
|
|
|
}
|
|
|
|
|
2011-03-19 21:12:55 +00:00
|
|
|
static void
|
|
|
|
cancel_submitted_imap_cmds( imap_store_t *ctx )
|
|
|
|
{
|
|
|
|
struct imap_cmd *cmd;
|
|
|
|
|
|
|
|
while ((cmd = ctx->in_progress)) {
|
|
|
|
ctx->in_progress = cmd->next;
|
|
|
|
/* don't update num_in_progress and in_progress_append - store is dead */
|
2011-03-27 10:34:25 +00:00
|
|
|
done_imap_cmd( ctx, cmd, RESP_CANCEL );
|
2011-03-19 21:12:55 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-08-25 16:26:23 +00:00
|
|
|
static int
|
|
|
|
submit_imap_cmd( imap_store_t *ctx, struct imap_cmd *cmd )
|
|
|
|
{
|
|
|
|
assert( ctx );
|
|
|
|
assert( ctx->gen.bad_callback );
|
|
|
|
assert( cmd );
|
|
|
|
assert( cmd->param.done );
|
|
|
|
|
|
|
|
if ((ctx->pending && !cmd->param.high_prio) || !cmd_submittable( ctx, cmd )) {
|
|
|
|
if (ctx->pending && cmd->param.high_prio) {
|
|
|
|
cmd->next = ctx->pending;
|
|
|
|
ctx->pending = cmd;
|
|
|
|
} else {
|
|
|
|
cmd->next = 0;
|
|
|
|
*ctx->pending_append = cmd;
|
|
|
|
ctx->pending_append = &cmd->next;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
return send_imap_cmd( ctx, cmd );
|
|
|
|
}
|
|
|
|
|
2013-09-25 18:55:32 +00:00
|
|
|
/* Minimal printf() replacement that supports an %\s format sequence to print backslash-escaped
|
|
|
|
* string literals. Note that this does not automatically add quotes around the printed string,
|
|
|
|
* so it is possible to concatenate multiple segments. */
|
|
|
|
static char *
|
|
|
|
imap_vprintf( const char *fmt, va_list ap )
|
|
|
|
{
|
|
|
|
const char *s, *es;
|
|
|
|
char *d, *ed;
|
|
|
|
int maxlen;
|
|
|
|
char c;
|
|
|
|
char buf[1024]; /* Minimal supported command buffer size per IMAP spec. */
|
|
|
|
|
|
|
|
d = buf;
|
|
|
|
ed = d + sizeof(buf);
|
|
|
|
s = fmt;
|
|
|
|
for (;;) {
|
|
|
|
c = *fmt;
|
|
|
|
if (!c || c == '%') {
|
|
|
|
int l = fmt - s;
|
|
|
|
if (d + l > ed)
|
|
|
|
oob();
|
|
|
|
memcpy( d, s, l );
|
|
|
|
d += l;
|
|
|
|
if (!c) {
|
|
|
|
l = d - buf;
|
|
|
|
ed = nfmalloc( l + 1 );
|
|
|
|
memcpy( ed, buf, l );
|
|
|
|
ed[l] = 0;
|
|
|
|
return ed;
|
|
|
|
}
|
|
|
|
maxlen = INT_MAX;
|
|
|
|
c = *++fmt;
|
|
|
|
if (c == '\\') {
|
|
|
|
c = *++fmt;
|
|
|
|
if (c != 's') {
|
|
|
|
fputs( "Fatal: unsupported escaped format specifier. Please report a bug.\n", stderr );
|
|
|
|
abort();
|
|
|
|
}
|
|
|
|
s = va_arg( ap, const char * );
|
|
|
|
while ((c = *s++)) {
|
|
|
|
if (d + 2 > ed)
|
|
|
|
oob();
|
|
|
|
if (c == '\\' || c == '"')
|
|
|
|
*d++ = '\\';
|
|
|
|
*d++ = c;
|
|
|
|
}
|
|
|
|
} else { /* \\ cannot be combined with anything else. */
|
|
|
|
if (c == '.') {
|
|
|
|
c = *++fmt;
|
|
|
|
if (c != '*') {
|
|
|
|
fputs( "Fatal: unsupported string length specification. Please report a bug.\n", stderr );
|
|
|
|
abort();
|
|
|
|
}
|
|
|
|
maxlen = va_arg( ap , int );
|
|
|
|
c = *++fmt;
|
|
|
|
}
|
|
|
|
if (c == 'c') {
|
|
|
|
if (d + 1 > ed)
|
|
|
|
oob();
|
|
|
|
*d++ = (char)va_arg( ap , int );
|
|
|
|
} else if (c == 's') {
|
|
|
|
s = va_arg( ap, const char * );
|
|
|
|
es = memchr( s, 0, maxlen );
|
|
|
|
l = es ? es - s : maxlen;
|
|
|
|
if (d + l > ed)
|
|
|
|
oob();
|
|
|
|
memcpy( d, s, l );
|
|
|
|
d += l;
|
|
|
|
} else if (c == 'd') {
|
|
|
|
d += nfsnprintf( d, ed - d, "%d", va_arg( ap , int ) );
|
|
|
|
} else {
|
|
|
|
fputs( "Fatal: unsupported format specifier. Please report a bug.\n", stderr );
|
|
|
|
abort();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
s = ++fmt;
|
|
|
|
} else {
|
|
|
|
fmt++;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2004-03-27 16:07:20 +00:00
|
|
|
static int
|
2011-04-03 16:15:36 +00:00
|
|
|
imap_exec( imap_store_t *ctx, struct imap_cmd *cmdp,
|
|
|
|
void (*done)( imap_store_t *ctx, struct imap_cmd *cmd, int response ),
|
|
|
|
const char *fmt, ... )
|
2004-03-27 16:07:20 +00:00
|
|
|
{
|
|
|
|
va_list ap;
|
|
|
|
|
2011-04-03 16:15:36 +00:00
|
|
|
if (!cmdp)
|
|
|
|
cmdp = new_imap_cmd( sizeof(*cmdp) );
|
|
|
|
cmdp->param.done = done;
|
2004-03-27 16:07:20 +00:00
|
|
|
va_start( ap, fmt );
|
2013-09-25 18:55:32 +00:00
|
|
|
cmdp->cmd = imap_vprintf( fmt, ap );
|
2004-03-27 16:07:20 +00:00
|
|
|
va_end( ap );
|
2012-08-25 16:26:23 +00:00
|
|
|
return submit_imap_cmd( ctx, cmdp );
|
2004-03-27 16:07:20 +00:00
|
|
|
}
|
|
|
|
|
2011-04-03 16:15:36 +00:00
|
|
|
static void
|
|
|
|
transform_box_response( int *response )
|
2004-03-27 16:07:20 +00:00
|
|
|
{
|
2011-04-03 16:15:36 +00:00
|
|
|
switch (*response) {
|
|
|
|
case RESP_CANCEL: *response = DRV_CANCELED; break;
|
|
|
|
case RESP_NO: *response = DRV_BOX_BAD; break;
|
|
|
|
default: *response = DRV_OK; break;
|
|
|
|
}
|
|
|
|
}
|
2004-03-27 16:07:20 +00:00
|
|
|
|
2011-04-03 16:15:36 +00:00
|
|
|
static void
|
|
|
|
imap_done_simple_box( imap_store_t *ctx ATTR_UNUSED,
|
|
|
|
struct imap_cmd *cmd, int response )
|
|
|
|
{
|
|
|
|
struct imap_cmd_simple *cmdp = (struct imap_cmd_simple *)cmd;
|
|
|
|
|
|
|
|
transform_box_response( &response );
|
|
|
|
cmdp->callback( response, cmdp->callback_aux );
|
|
|
|
}
|
2004-03-27 16:07:20 +00:00
|
|
|
|
2011-04-03 16:15:36 +00:00
|
|
|
static void
|
|
|
|
transform_msg_response( int *response )
|
|
|
|
{
|
|
|
|
switch (*response) {
|
|
|
|
case RESP_CANCEL: *response = DRV_CANCELED; break;
|
|
|
|
case RESP_NO: *response = DRV_MSG_BAD; break;
|
|
|
|
default: *response = DRV_OK; break;
|
2004-03-27 16:07:20 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-04-03 16:15:36 +00:00
|
|
|
static void
|
|
|
|
imap_done_simple_msg( imap_store_t *ctx ATTR_UNUSED,
|
|
|
|
struct imap_cmd *cmd, int response )
|
2004-03-27 16:07:20 +00:00
|
|
|
{
|
2011-04-03 16:15:36 +00:00
|
|
|
struct imap_cmd_simple *cmdp = (struct imap_cmd_simple *)cmd;
|
2004-03-27 16:07:20 +00:00
|
|
|
|
2011-04-03 16:15:36 +00:00
|
|
|
transform_msg_response( &response );
|
|
|
|
cmdp->callback( response, cmdp->callback_aux );
|
|
|
|
}
|
2004-03-27 16:07:20 +00:00
|
|
|
|
2011-04-03 16:15:36 +00:00
|
|
|
static struct imap_cmd_refcounted_state *
|
|
|
|
imap_refcounted_new_state( void (*cb)( int, void * ), void *aux )
|
|
|
|
{
|
|
|
|
struct imap_cmd_refcounted_state *sts = nfmalloc( sizeof(*sts) );
|
|
|
|
sts->callback = cb;
|
|
|
|
sts->callback_aux = aux;
|
|
|
|
sts->ref_count = 1; /* so forced sync does not cause an early exit */
|
|
|
|
sts->ret_val = DRV_OK;
|
|
|
|
return sts;
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct imap_cmd *
|
|
|
|
imap_refcounted_new_cmd( struct imap_cmd_refcounted_state *sts )
|
|
|
|
{
|
|
|
|
struct imap_cmd_refcounted *cmd = (struct imap_cmd_refcounted *)new_imap_cmd( sizeof(*cmd) );
|
|
|
|
cmd->state = sts;
|
|
|
|
sts->ref_count++;
|
|
|
|
return &cmd->gen;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
imap_refcounted_done( struct imap_cmd_refcounted_state *sts )
|
|
|
|
{
|
2011-03-20 17:23:09 +00:00
|
|
|
if (!--sts->ref_count) {
|
|
|
|
sts->callback( sts->ret_val, sts->callback_aux );
|
|
|
|
free( sts );
|
|
|
|
}
|
2004-03-27 16:07:20 +00:00
|
|
|
}
|
|
|
|
|
2011-06-13 10:13:31 +00:00
|
|
|
static void
|
|
|
|
imap_refcounted_done_box( imap_store_t *ctx ATTR_UNUSED, struct imap_cmd *cmd, int response )
|
|
|
|
{
|
|
|
|
struct imap_cmd_refcounted_state *sts = ((struct imap_cmd_refcounted *)cmd)->state;
|
|
|
|
|
|
|
|
switch (response) {
|
|
|
|
case RESP_CANCEL:
|
|
|
|
sts->ret_val = DRV_CANCELED;
|
|
|
|
break;
|
|
|
|
case RESP_NO:
|
|
|
|
if (sts->ret_val == DRV_OK) /* Don't override cancelation. */
|
|
|
|
sts->ret_val = DRV_BOX_BAD;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
imap_refcounted_done( sts );
|
|
|
|
}
|
|
|
|
|
2013-09-25 18:55:32 +00:00
|
|
|
static const char *
|
|
|
|
imap_strchr( const char *s, char tc )
|
|
|
|
{
|
|
|
|
for (;; s++) {
|
|
|
|
char c = *s;
|
|
|
|
if (c == '\\')
|
|
|
|
c = *++s;
|
|
|
|
if (!c)
|
|
|
|
return 0;
|
|
|
|
if (c == tc)
|
|
|
|
return s;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-09-15 09:24:57 +00:00
|
|
|
static char *
|
2013-09-25 16:53:18 +00:00
|
|
|
next_arg( char **ps )
|
2012-09-15 09:24:57 +00:00
|
|
|
{
|
2013-09-25 18:55:32 +00:00
|
|
|
char *ret, *s, *d;
|
|
|
|
char c;
|
2012-09-15 09:24:57 +00:00
|
|
|
|
2013-09-25 16:53:18 +00:00
|
|
|
assert( ps );
|
|
|
|
s = *ps;
|
|
|
|
if (!s)
|
2012-09-15 09:24:57 +00:00
|
|
|
return 0;
|
2013-09-25 16:53:18 +00:00
|
|
|
while (isspace( (unsigned char)*s ))
|
|
|
|
s++;
|
|
|
|
if (!*s) {
|
|
|
|
*ps = 0;
|
2012-09-15 09:24:57 +00:00
|
|
|
return 0;
|
|
|
|
}
|
2013-09-25 16:53:18 +00:00
|
|
|
if (*s == '"') {
|
2013-09-25 18:55:32 +00:00
|
|
|
s++;
|
|
|
|
ret = d = s;
|
|
|
|
while ((c = *s++) != '"') {
|
|
|
|
if (c == '\\')
|
|
|
|
c = *s++;
|
|
|
|
if (!c) {
|
|
|
|
*ps = 0;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
*d++ = c;
|
|
|
|
}
|
|
|
|
*d = 0;
|
2012-09-15 09:24:57 +00:00
|
|
|
} else {
|
2013-09-25 16:53:18 +00:00
|
|
|
ret = s;
|
2013-09-25 18:55:32 +00:00
|
|
|
while ((c = *s)) {
|
|
|
|
if (isspace( (unsigned char)c )) {
|
|
|
|
*s++ = 0;
|
|
|
|
break;
|
|
|
|
}
|
2013-09-25 16:53:18 +00:00
|
|
|
s++;
|
2013-09-25 18:55:32 +00:00
|
|
|
}
|
2012-09-15 09:24:57 +00:00
|
|
|
}
|
2013-09-25 18:55:32 +00:00
|
|
|
if (!*s)
|
|
|
|
s = 0;
|
2013-09-25 16:53:18 +00:00
|
|
|
|
|
|
|
*ps = s;
|
2012-09-15 09:24:57 +00:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2004-03-27 16:07:20 +00:00
|
|
|
static int
|
|
|
|
is_atom( list_t *list )
|
|
|
|
{
|
|
|
|
return list && list->val && list->val != NIL && list->val != LIST;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
is_list( list_t *list )
|
|
|
|
{
|
|
|
|
return list && list->val == LIST;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
free_list( list_t *list )
|
|
|
|
{
|
|
|
|
list_t *tmp;
|
|
|
|
|
|
|
|
for (; list; list = tmp) {
|
|
|
|
tmp = list->next;
|
|
|
|
if (is_list( list ))
|
|
|
|
free_list( list->child );
|
|
|
|
else if (is_atom( list ))
|
|
|
|
free( list->val );
|
|
|
|
free( list );
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-04-03 16:47:37 +00:00
|
|
|
enum {
|
|
|
|
LIST_OK,
|
|
|
|
LIST_PARTIAL,
|
|
|
|
LIST_BAD
|
|
|
|
};
|
|
|
|
|
2004-03-27 16:07:20 +00:00
|
|
|
static int
|
2011-04-03 16:47:37 +00:00
|
|
|
parse_imap_list( imap_store_t *ctx, char **sp, parse_list_state_t *sts )
|
2004-03-27 16:07:20 +00:00
|
|
|
{
|
2011-04-03 16:47:37 +00:00
|
|
|
list_t *cur, **curp;
|
2013-09-25 18:55:32 +00:00
|
|
|
char *s = *sp, *d, *p;
|
2011-04-03 16:47:37 +00:00
|
|
|
int bytes;
|
2013-09-25 18:55:32 +00:00
|
|
|
char c;
|
2011-04-03 16:47:37 +00:00
|
|
|
|
|
|
|
assert( sts );
|
|
|
|
assert( sts->level > 0 );
|
|
|
|
curp = sts->stack[--sts->level];
|
|
|
|
bytes = sts->need_bytes;
|
|
|
|
if (bytes >= 0) {
|
|
|
|
sts->need_bytes = -1;
|
|
|
|
if (!bytes)
|
|
|
|
goto getline;
|
|
|
|
cur = (list_t *)((char *)curp - offsetof(list_t, next));
|
|
|
|
s = cur->val + cur->len - bytes;
|
|
|
|
goto getbytes;
|
|
|
|
}
|
2004-03-27 16:07:20 +00:00
|
|
|
|
2012-10-16 07:27:58 +00:00
|
|
|
if (!s)
|
|
|
|
return LIST_BAD;
|
2004-03-27 16:07:20 +00:00
|
|
|
for (;;) {
|
|
|
|
while (isspace( (unsigned char)*s ))
|
|
|
|
s++;
|
2011-04-03 16:47:37 +00:00
|
|
|
if (sts->level && *s == ')') {
|
2004-03-27 16:07:20 +00:00
|
|
|
s++;
|
2011-04-03 16:47:37 +00:00
|
|
|
curp = sts->stack[--sts->level];
|
|
|
|
goto next;
|
2004-03-27 16:07:20 +00:00
|
|
|
}
|
|
|
|
*curp = cur = nfmalloc( sizeof(*cur) );
|
|
|
|
cur->val = 0; /* for clean bail */
|
2011-04-03 16:47:37 +00:00
|
|
|
curp = &cur->next;
|
|
|
|
*curp = 0; /* ditto */
|
2004-03-27 16:07:20 +00:00
|
|
|
if (*s == '(') {
|
|
|
|
/* sublist */
|
2011-04-03 16:47:37 +00:00
|
|
|
if (sts->level == MAX_LIST_DEPTH)
|
|
|
|
goto bail;
|
2004-03-27 16:07:20 +00:00
|
|
|
s++;
|
|
|
|
cur->val = LIST;
|
2011-04-03 16:47:37 +00:00
|
|
|
sts->stack[sts->level++] = curp;
|
|
|
|
curp = &cur->child;
|
|
|
|
*curp = 0; /* for clean bail */
|
|
|
|
goto next2;
|
2006-03-20 15:01:48 +00:00
|
|
|
} else if (ctx && *s == '{') {
|
2004-03-27 16:07:20 +00:00
|
|
|
/* literal */
|
|
|
|
bytes = cur->len = strtol( s + 1, &s, 10 );
|
2011-04-03 16:47:37 +00:00
|
|
|
if (*s != '}' || *++s)
|
2004-03-27 16:07:20 +00:00
|
|
|
goto bail;
|
|
|
|
|
2014-06-28 09:04:41 +00:00
|
|
|
s = cur->val = nfmalloc( cur->len + 1 );
|
|
|
|
s[cur->len] = 0;
|
2004-03-27 16:07:20 +00:00
|
|
|
|
2011-04-03 16:47:37 +00:00
|
|
|
getbytes:
|
|
|
|
bytes -= socket_read( &ctx->conn, s, bytes );
|
|
|
|
if (bytes > 0)
|
|
|
|
goto postpone;
|
2004-03-27 16:07:20 +00:00
|
|
|
|
2010-02-06 09:40:36 +00:00
|
|
|
if (DFlags & XVERBOSE) {
|
2013-12-08 15:37:20 +00:00
|
|
|
printf( "%s=========\n", ctx->label );
|
2010-02-06 09:40:36 +00:00
|
|
|
fwrite( cur->val, cur->len, 1, stdout );
|
2013-12-08 15:37:20 +00:00
|
|
|
printf( "%s=========\n", ctx->label );
|
2012-09-22 15:48:09 +00:00
|
|
|
fflush( stdout );
|
2010-02-06 09:40:36 +00:00
|
|
|
}
|
2004-03-27 16:07:20 +00:00
|
|
|
|
2011-04-03 16:47:37 +00:00
|
|
|
getline:
|
|
|
|
if (!(s = socket_read_line( &ctx->conn )))
|
|
|
|
goto postpone;
|
2013-12-08 15:32:30 +00:00
|
|
|
if (DFlags & VERBOSE) {
|
2013-12-08 15:37:20 +00:00
|
|
|
printf( "%s%s\n", ctx->label, s );
|
2013-12-08 15:32:30 +00:00
|
|
|
fflush( stdout );
|
|
|
|
}
|
2004-03-27 16:07:20 +00:00
|
|
|
} else if (*s == '"') {
|
|
|
|
/* quoted string */
|
|
|
|
s++;
|
2013-09-25 18:55:32 +00:00
|
|
|
p = d = s;
|
|
|
|
while ((c = *s++) != '"') {
|
|
|
|
if (c == '\\')
|
|
|
|
c = *s++;
|
|
|
|
if (!c)
|
2004-03-27 16:07:20 +00:00
|
|
|
goto bail;
|
2013-09-25 18:55:32 +00:00
|
|
|
*d++ = c;
|
|
|
|
}
|
|
|
|
cur->len = d - p;
|
2004-03-27 16:07:20 +00:00
|
|
|
cur->val = nfmalloc( cur->len + 1 );
|
|
|
|
memcpy( cur->val, p, cur->len );
|
|
|
|
cur->val[cur->len] = 0;
|
|
|
|
} else {
|
|
|
|
/* atom */
|
|
|
|
p = s;
|
|
|
|
for (; *s && !isspace( (unsigned char)*s ); s++)
|
2011-04-03 16:47:37 +00:00
|
|
|
if (sts->level && *s == ')')
|
2004-03-27 16:07:20 +00:00
|
|
|
break;
|
|
|
|
cur->len = s - p;
|
|
|
|
if (cur->len == 3 && !memcmp ("NIL", p, 3))
|
|
|
|
cur->val = NIL;
|
|
|
|
else {
|
|
|
|
cur->val = nfmalloc( cur->len + 1 );
|
|
|
|
memcpy( cur->val, p, cur->len );
|
|
|
|
cur->val[cur->len] = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-04-03 16:47:37 +00:00
|
|
|
next:
|
|
|
|
if (!sts->level)
|
2004-03-27 16:07:20 +00:00
|
|
|
break;
|
2011-04-03 16:47:37 +00:00
|
|
|
next2:
|
2004-03-27 16:07:20 +00:00
|
|
|
if (!*s)
|
|
|
|
goto bail;
|
|
|
|
}
|
|
|
|
*sp = s;
|
2011-04-03 16:47:37 +00:00
|
|
|
return LIST_OK;
|
2004-03-27 16:07:20 +00:00
|
|
|
|
2011-04-03 16:47:37 +00:00
|
|
|
postpone:
|
|
|
|
if (sts->level < MAX_LIST_DEPTH) {
|
|
|
|
sts->stack[sts->level++] = curp;
|
|
|
|
sts->need_bytes = bytes;
|
|
|
|
return LIST_PARTIAL;
|
|
|
|
}
|
2004-03-27 16:07:20 +00:00
|
|
|
bail:
|
2011-04-03 16:47:37 +00:00
|
|
|
free_list( sts->head );
|
|
|
|
return LIST_BAD;
|
2004-03-27 16:07:20 +00:00
|
|
|
}
|
|
|
|
|
2011-04-03 16:47:37 +00:00
|
|
|
static void
|
|
|
|
parse_list_init( parse_list_state_t *sts )
|
2004-03-27 16:07:20 +00:00
|
|
|
{
|
2011-04-03 16:47:37 +00:00
|
|
|
sts->need_bytes = -1;
|
|
|
|
sts->level = 1;
|
|
|
|
sts->head = 0;
|
|
|
|
sts->stack[0] = &sts->head;
|
2004-03-27 16:07:20 +00:00
|
|
|
}
|
|
|
|
|
2013-07-27 12:31:13 +00:00
|
|
|
static int
|
|
|
|
parse_list_continue( imap_store_t *ctx, char *s )
|
|
|
|
{
|
|
|
|
list_t *list;
|
|
|
|
int resp;
|
|
|
|
if ((resp = parse_imap_list( ctx, &s, &ctx->parse_list_sts )) != LIST_PARTIAL) {
|
|
|
|
list = (resp == LIST_BAD) ? 0 : ctx->parse_list_sts.head;
|
|
|
|
ctx->parse_list_sts.head = 0;
|
|
|
|
resp = ctx->parse_list_sts.callback( ctx, list, s );
|
|
|
|
}
|
|
|
|
return resp;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
parse_list( imap_store_t *ctx, char *s, int (*cb)( imap_store_t *ctx, list_t *list, char *s ) )
|
|
|
|
{
|
|
|
|
parse_list_init( &ctx->parse_list_sts );
|
|
|
|
ctx->parse_list_sts.callback = cb;
|
|
|
|
return parse_list_continue( ctx, s );
|
|
|
|
}
|
|
|
|
|
|
|
|
static int parse_namespace_rsp_p2( imap_store_t *, list_t *, char * );
|
|
|
|
static int parse_namespace_rsp_p3( imap_store_t *, list_t *, char * );
|
|
|
|
|
|
|
|
static int
|
|
|
|
parse_namespace_rsp_fail( void )
|
|
|
|
{
|
|
|
|
error( "IMAP error: malformed NAMESPACE response\n" );
|
|
|
|
return LIST_BAD;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
parse_namespace_rsp( imap_store_t *ctx, list_t *list, char *s )
|
|
|
|
{
|
|
|
|
if (!(ctx->ns_personal = list))
|
|
|
|
return parse_namespace_rsp_fail();
|
|
|
|
return parse_list( ctx, s, parse_namespace_rsp_p2 );
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
parse_namespace_rsp_p2( imap_store_t *ctx, list_t *list, char *s )
|
2004-03-27 16:07:20 +00:00
|
|
|
{
|
2013-07-27 12:31:13 +00:00
|
|
|
if (!(ctx->ns_other = list))
|
|
|
|
return parse_namespace_rsp_fail();
|
|
|
|
return parse_list( ctx, s, parse_namespace_rsp_p3 );
|
2004-03-27 16:07:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2013-07-27 12:31:13 +00:00
|
|
|
parse_namespace_rsp_p3( imap_store_t *ctx, list_t *list, char *s ATTR_UNUSED )
|
|
|
|
{
|
|
|
|
if (!(ctx->ns_shared = list))
|
|
|
|
return parse_namespace_rsp_fail();
|
|
|
|
return LIST_OK;
|
|
|
|
}
|
|
|
|
|
2013-11-09 13:35:07 +00:00
|
|
|
static time_t
|
|
|
|
parse_date( const char *str )
|
|
|
|
{
|
|
|
|
char *end;
|
|
|
|
time_t date;
|
|
|
|
int hours, mins;
|
|
|
|
struct tm datetime;
|
|
|
|
|
2013-11-30 14:07:05 +00:00
|
|
|
memset( &datetime, 0, sizeof(datetime) );
|
2013-11-09 13:35:07 +00:00
|
|
|
if (!(end = strptime( str, "%d-%b-%Y %H:%M:%S ", &datetime )))
|
|
|
|
return -1;
|
2014-01-02 19:50:42 +00:00
|
|
|
if ((date = timegm( &datetime )) == -1)
|
2013-11-09 13:35:07 +00:00
|
|
|
return -1;
|
|
|
|
if (sscanf( end, "%3d%2d", &hours, &mins ) != 2)
|
|
|
|
return -1;
|
2014-01-02 19:50:42 +00:00
|
|
|
return date - (hours * 60 + mins) * 60;
|
2013-11-09 13:35:07 +00:00
|
|
|
}
|
|
|
|
|
2013-07-27 12:31:13 +00:00
|
|
|
static int
|
|
|
|
parse_fetch_rsp( imap_store_t *ctx, list_t *list, char *s ATTR_UNUSED )
|
2004-03-27 16:07:20 +00:00
|
|
|
{
|
2011-04-03 16:47:37 +00:00
|
|
|
list_t *tmp, *flags;
|
2011-04-10 11:06:07 +00:00
|
|
|
char *body = 0, *tuid = 0;
|
2004-03-27 16:07:20 +00:00
|
|
|
imap_message_t *cur;
|
|
|
|
msg_data_t *msgdata;
|
|
|
|
struct imap_cmd *cmdp;
|
|
|
|
int uid = 0, mask = 0, status = 0, size = 0;
|
|
|
|
unsigned i;
|
2013-07-28 13:55:13 +00:00
|
|
|
time_t date = 0;
|
2004-03-27 16:07:20 +00:00
|
|
|
|
|
|
|
if (!is_list( list )) {
|
2006-03-19 11:29:12 +00:00
|
|
|
error( "IMAP error: bogus FETCH response\n" );
|
2004-03-27 16:07:20 +00:00
|
|
|
free_list( list );
|
2013-07-27 12:31:13 +00:00
|
|
|
return LIST_BAD;
|
2004-03-27 16:07:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
for (tmp = list->child; tmp; tmp = tmp->next) {
|
|
|
|
if (is_atom( tmp )) {
|
|
|
|
if (!strcmp( "UID", tmp->val )) {
|
|
|
|
tmp = tmp->next;
|
|
|
|
if (is_atom( tmp ))
|
|
|
|
uid = atoi( tmp->val );
|
|
|
|
else
|
2006-03-19 11:29:12 +00:00
|
|
|
error( "IMAP error: unable to parse UID\n" );
|
2004-03-27 16:07:20 +00:00
|
|
|
} else if (!strcmp( "FLAGS", tmp->val )) {
|
|
|
|
tmp = tmp->next;
|
|
|
|
if (is_list( tmp )) {
|
|
|
|
for (flags = tmp->child; flags; flags = flags->next) {
|
|
|
|
if (is_atom( flags )) {
|
2004-10-17 15:34:53 +00:00
|
|
|
if (flags->val[0] == '\\') { /* ignore user-defined flags for now */
|
|
|
|
if (!strcmp( "Recent", flags->val + 1)) {
|
|
|
|
status |= M_RECENT;
|
2004-03-27 16:07:20 +00:00
|
|
|
goto flagok;
|
|
|
|
}
|
2004-10-17 15:34:53 +00:00
|
|
|
for (i = 0; i < as(Flags); i++)
|
|
|
|
if (!strcmp( Flags[i], flags->val + 1 )) {
|
|
|
|
mask |= 1 << i;
|
|
|
|
goto flagok;
|
|
|
|
}
|
2008-04-12 08:13:44 +00:00
|
|
|
if (flags->val[1] == 'X' && flags->val[2] == '-')
|
|
|
|
goto flagok; /* ignore system flag extensions */
|
2006-03-19 11:29:12 +00:00
|
|
|
error( "IMAP warning: unknown system flag %s\n", flags->val );
|
2004-10-17 15:34:53 +00:00
|
|
|
}
|
2004-03-27 16:07:20 +00:00
|
|
|
flagok: ;
|
|
|
|
} else
|
2006-03-19 11:29:12 +00:00
|
|
|
error( "IMAP error: unable to parse FLAGS list\n" );
|
2004-03-27 16:07:20 +00:00
|
|
|
}
|
|
|
|
status |= M_FLAGS;
|
|
|
|
} else
|
2006-03-19 11:29:12 +00:00
|
|
|
error( "IMAP error: unable to parse FLAGS\n" );
|
2013-07-28 13:55:13 +00:00
|
|
|
} else if (!strcmp( "INTERNALDATE", tmp->val )) {
|
|
|
|
tmp = tmp->next;
|
|
|
|
if (is_atom( tmp )) {
|
2013-11-09 13:35:07 +00:00
|
|
|
if ((date = parse_date( tmp->val )) == -1)
|
2013-07-28 13:55:13 +00:00
|
|
|
error( "IMAP error: unable to parse INTERNALDATE format\n" );
|
|
|
|
} else
|
|
|
|
error( "IMAP error: unable to parse INTERNALDATE\n" );
|
2004-03-27 16:07:20 +00:00
|
|
|
} else if (!strcmp( "RFC822.SIZE", tmp->val )) {
|
|
|
|
tmp = tmp->next;
|
|
|
|
if (is_atom( tmp ))
|
|
|
|
size = atoi( tmp->val );
|
|
|
|
else
|
2006-03-19 11:29:12 +00:00
|
|
|
error( "IMAP error: unable to parse RFC822.SIZE\n" );
|
2004-03-27 16:07:20 +00:00
|
|
|
} else if (!strcmp( "BODY[]", tmp->val )) {
|
|
|
|
tmp = tmp->next;
|
|
|
|
if (is_atom( tmp )) {
|
|
|
|
body = tmp->val;
|
|
|
|
tmp->val = 0; /* don't free together with list */
|
|
|
|
size = tmp->len;
|
|
|
|
} else
|
2006-03-19 11:29:12 +00:00
|
|
|
error( "IMAP error: unable to parse BODY[]\n" );
|
2011-04-10 11:06:07 +00:00
|
|
|
} else if (!strcmp( "BODY[HEADER.FIELDS", tmp->val )) {
|
|
|
|
tmp = tmp->next;
|
|
|
|
if (is_list( tmp )) {
|
|
|
|
tmp = tmp->next;
|
|
|
|
if (!is_atom( tmp ) || strcmp( tmp->val, "]" ))
|
|
|
|
goto bfail;
|
|
|
|
tmp = tmp->next;
|
2014-01-25 10:34:03 +00:00
|
|
|
if (!is_atom( tmp ))
|
2011-04-10 11:06:07 +00:00
|
|
|
goto bfail;
|
2014-01-25 10:34:03 +00:00
|
|
|
if (!memcmp( tmp->val, "X-TUID: ", 8 ))
|
|
|
|
tuid = tmp->val + 8;
|
2011-04-10 11:06:07 +00:00
|
|
|
} else {
|
|
|
|
bfail:
|
|
|
|
error( "IMAP error: unable to parse BODY[HEADER.FIELDS ...]\n" );
|
|
|
|
}
|
2004-03-27 16:07:20 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (body) {
|
2006-03-20 15:01:48 +00:00
|
|
|
for (cmdp = ctx->in_progress; cmdp; cmdp = cmdp->next)
|
2008-08-31 20:14:59 +00:00
|
|
|
if (cmdp->param.uid == uid)
|
2004-03-27 16:07:20 +00:00
|
|
|
goto gotuid;
|
2006-03-19 11:29:12 +00:00
|
|
|
error( "IMAP error: unexpected FETCH response (UID %d)\n", uid );
|
2004-03-27 16:07:20 +00:00
|
|
|
free_list( list );
|
2013-07-27 12:31:13 +00:00
|
|
|
return LIST_BAD;
|
2004-03-27 16:07:20 +00:00
|
|
|
gotuid:
|
2011-04-03 16:15:36 +00:00
|
|
|
msgdata = ((struct imap_cmd_fetch_msg *)cmdp)->msg_data;
|
2004-03-27 16:07:20 +00:00
|
|
|
msgdata->data = body;
|
|
|
|
msgdata->len = size;
|
2013-07-28 13:55:13 +00:00
|
|
|
msgdata->date = date;
|
2004-03-27 16:07:20 +00:00
|
|
|
if (status & M_FLAGS)
|
|
|
|
msgdata->flags = mask;
|
|
|
|
} else if (uid) { /* ignore async flag updates for now */
|
|
|
|
/* XXX this will need sorting for out-of-order (multiple queries) */
|
|
|
|
cur = nfcalloc( sizeof(*cur) );
|
2006-03-20 15:01:48 +00:00
|
|
|
*ctx->msgapp = &cur->gen;
|
|
|
|
ctx->msgapp = &cur->gen.next;
|
2004-03-27 16:07:20 +00:00
|
|
|
cur->gen.next = 0;
|
|
|
|
cur->gen.uid = uid;
|
|
|
|
cur->gen.flags = mask;
|
|
|
|
cur->gen.status = status;
|
|
|
|
cur->gen.size = size;
|
2011-04-10 11:06:07 +00:00
|
|
|
cur->gen.srec = 0;
|
|
|
|
if (tuid)
|
|
|
|
strncpy( cur->gen.tuid, tuid, TUIDL );
|
|
|
|
else
|
|
|
|
cur->gen.tuid[0] = 0;
|
|
|
|
if (ctx->gen.uidnext <= uid) /* in case the server sends no UIDNEXT */
|
|
|
|
ctx->gen.uidnext = uid + 1;
|
2004-03-27 16:07:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
free_list( list );
|
2013-07-27 12:31:13 +00:00
|
|
|
return LIST_OK;
|
2004-03-27 16:07:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2006-03-20 15:01:48 +00:00
|
|
|
parse_capability( imap_store_t *ctx, char *cmd )
|
2004-03-27 16:07:20 +00:00
|
|
|
{
|
|
|
|
char *arg;
|
|
|
|
unsigned i;
|
|
|
|
|
2006-03-20 15:01:48 +00:00
|
|
|
ctx->caps = 0x80000000;
|
2004-03-27 16:07:20 +00:00
|
|
|
while ((arg = next_arg( &cmd )))
|
|
|
|
for (i = 0; i < as(cap_list); i++)
|
|
|
|
if (!strcmp( cap_list[i], arg ))
|
2006-03-20 15:01:48 +00:00
|
|
|
ctx->caps |= 1 << i;
|
2004-03-27 16:07:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2008-08-31 20:14:59 +00:00
|
|
|
parse_response_code( imap_store_t *ctx, struct imap_cmd *cmd, char *s )
|
2004-03-27 16:07:20 +00:00
|
|
|
{
|
2008-08-23 07:54:00 +00:00
|
|
|
char *arg, *earg, *p;
|
2004-03-27 16:07:20 +00:00
|
|
|
|
2012-10-16 07:27:58 +00:00
|
|
|
if (!s || *s != '[')
|
2004-03-27 16:07:20 +00:00
|
|
|
return RESP_OK; /* no response code */
|
|
|
|
s++;
|
|
|
|
if (!(p = strchr( s, ']' ))) {
|
2014-04-12 13:02:40 +00:00
|
|
|
bad_resp:
|
2006-03-19 11:29:12 +00:00
|
|
|
error( "IMAP error: malformed response code\n" );
|
2012-07-15 10:55:04 +00:00
|
|
|
return RESP_CANCEL;
|
2004-03-27 16:07:20 +00:00
|
|
|
}
|
|
|
|
*p++ = 0;
|
2014-04-12 13:02:40 +00:00
|
|
|
if (!(arg = next_arg( &s )))
|
|
|
|
goto bad_resp;
|
2004-03-27 16:07:20 +00:00
|
|
|
if (!strcmp( "UIDVALIDITY", arg )) {
|
2008-08-23 07:54:00 +00:00
|
|
|
if (!(arg = next_arg( &s )) ||
|
|
|
|
(ctx->gen.uidvalidity = strtoll( arg, &earg, 10 ), *earg))
|
|
|
|
{
|
2006-03-19 11:29:12 +00:00
|
|
|
error( "IMAP error: malformed UIDVALIDITY status\n" );
|
2012-07-15 10:55:04 +00:00
|
|
|
return RESP_CANCEL;
|
2004-03-27 16:07:20 +00:00
|
|
|
}
|
|
|
|
} else if (!strcmp( "UIDNEXT", arg )) {
|
2011-06-02 10:43:05 +00:00
|
|
|
if (!(arg = next_arg( &s )) || !(ctx->gen.uidnext = atoi( arg ))) {
|
2006-03-19 11:29:12 +00:00
|
|
|
error( "IMAP error: malformed NEXTUID status\n" );
|
2012-07-15 10:55:04 +00:00
|
|
|
return RESP_CANCEL;
|
2004-03-27 16:07:20 +00:00
|
|
|
}
|
|
|
|
} else if (!strcmp( "CAPABILITY", arg )) {
|
2006-03-20 15:01:48 +00:00
|
|
|
parse_capability( ctx, s );
|
2004-03-27 16:07:20 +00:00
|
|
|
} else if (!strcmp( "ALERT", arg )) {
|
|
|
|
/* RFC2060 says that these messages MUST be displayed
|
|
|
|
* to the user
|
|
|
|
*/
|
|
|
|
for (; isspace( (unsigned char)*p ); p++);
|
2006-03-19 11:29:12 +00:00
|
|
|
error( "*** IMAP ALERT *** %s\n", p );
|
2011-04-03 16:15:36 +00:00
|
|
|
} else if (cmd && !strcmp( "APPENDUID", arg )) {
|
2008-08-23 07:54:00 +00:00
|
|
|
if (!(arg = next_arg( &s )) ||
|
|
|
|
(ctx->gen.uidvalidity = strtoll( arg, &earg, 10 ), *earg) ||
|
2011-04-03 16:15:36 +00:00
|
|
|
!(arg = next_arg( &s )) ||
|
|
|
|
!(((struct imap_cmd_out_uid *)cmd)->out_uid = atoi( arg )))
|
2004-03-27 16:07:20 +00:00
|
|
|
{
|
2006-03-19 11:29:12 +00:00
|
|
|
error( "IMAP error: malformed APPENDUID status\n" );
|
2012-07-15 10:55:04 +00:00
|
|
|
return RESP_CANCEL;
|
2004-03-27 16:07:20 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return RESP_OK;
|
|
|
|
}
|
|
|
|
|
2013-07-27 13:32:49 +00:00
|
|
|
static int parse_list_rsp_p2( imap_store_t *, list_t *, char * );
|
|
|
|
|
2012-10-16 07:27:58 +00:00
|
|
|
static int
|
2013-07-27 12:31:13 +00:00
|
|
|
parse_list_rsp( imap_store_t *ctx, list_t *list, char *cmd )
|
2004-03-27 16:07:20 +00:00
|
|
|
{
|
|
|
|
char *arg;
|
2013-07-27 12:31:13 +00:00
|
|
|
list_t *lp;
|
2004-03-27 16:07:20 +00:00
|
|
|
|
2013-07-27 13:35:42 +00:00
|
|
|
if (!is_list( list )) {
|
|
|
|
free_list( list );
|
2014-04-12 12:58:18 +00:00
|
|
|
bad_list:
|
|
|
|
error( "IMAP error: malformed LIST response\n" );
|
2013-07-27 12:31:13 +00:00
|
|
|
return LIST_BAD;
|
|
|
|
}
|
2013-07-27 13:35:42 +00:00
|
|
|
for (lp = list->child; lp; lp = lp->next)
|
|
|
|
if (is_atom( lp ) && !strcasecmp( lp->val, "\\NoSelect" )) {
|
|
|
|
free_list( list );
|
|
|
|
return LIST_OK;
|
|
|
|
}
|
2004-03-27 16:07:20 +00:00
|
|
|
free_list( list );
|
2014-04-12 12:58:18 +00:00
|
|
|
if (!(arg = next_arg( &cmd )))
|
|
|
|
goto bad_list;
|
2012-08-11 16:34:46 +00:00
|
|
|
if (!ctx->delimiter)
|
2013-08-03 13:10:57 +00:00
|
|
|
ctx->delimiter = nfstrdup( arg );
|
2013-07-27 13:32:49 +00:00
|
|
|
return parse_list( ctx, cmd, parse_list_rsp_p2 );
|
|
|
|
}
|
|
|
|
|
2013-08-03 13:10:57 +00:00
|
|
|
static int
|
|
|
|
is_inbox( imap_store_t *ctx, const char *arg )
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
char c;
|
|
|
|
|
|
|
|
if (memcmp( arg, "INBOX", 5 ))
|
|
|
|
return 0;
|
|
|
|
if (arg[5])
|
|
|
|
for (i = 0; (c = ctx->delimiter[i]); i++)
|
|
|
|
if (arg[i + 5] != c)
|
|
|
|
return 0;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2013-07-27 13:32:49 +00:00
|
|
|
static int
|
|
|
|
parse_list_rsp_p2( imap_store_t *ctx, list_t *list, char *cmd ATTR_UNUSED )
|
|
|
|
{
|
2013-08-03 13:10:57 +00:00
|
|
|
string_list_t *narg;
|
2013-07-27 13:32:49 +00:00
|
|
|
char *arg;
|
|
|
|
int l;
|
|
|
|
|
|
|
|
if (!is_atom( list )) {
|
|
|
|
error( "IMAP error: malformed LIST response\n" );
|
|
|
|
free_list( list );
|
|
|
|
return LIST_BAD;
|
|
|
|
}
|
|
|
|
arg = list->val;
|
2013-08-03 13:10:57 +00:00
|
|
|
if (!is_inbox( ctx, arg )) {
|
2014-10-04 13:37:01 +00:00
|
|
|
l = strlen( ctx->prefix );
|
|
|
|
if (memcmp( arg, ctx->prefix, l ))
|
2013-07-27 13:32:49 +00:00
|
|
|
goto skip;
|
2012-08-11 16:34:46 +00:00
|
|
|
arg += l;
|
2013-08-03 13:10:57 +00:00
|
|
|
if (is_inbox( ctx, arg )) {
|
2012-08-11 16:34:46 +00:00
|
|
|
if (!arg[5])
|
2014-10-04 13:37:01 +00:00
|
|
|
warn( "IMAP warning: ignoring INBOX in %s\n", ctx->prefix );
|
2013-07-27 13:32:49 +00:00
|
|
|
goto skip;
|
2012-08-11 16:34:46 +00:00
|
|
|
}
|
2011-06-02 17:21:19 +00:00
|
|
|
}
|
2013-12-15 11:46:03 +00:00
|
|
|
if ((l = strlen( arg )) >= 5 && !memcmp( arg + l - 5, ".lock", 5 )) /* workaround broken servers */
|
2013-07-27 13:32:49 +00:00
|
|
|
goto skip;
|
2013-08-03 13:10:57 +00:00
|
|
|
if (map_name( arg, (char **)&narg, offsetof(string_list_t, string), ctx->delimiter, "/") < 0) {
|
2012-08-11 16:34:46 +00:00
|
|
|
warn( "IMAP warning: ignoring mailbox %s (reserved character '/' in name)\n", arg );
|
2013-07-27 13:32:49 +00:00
|
|
|
goto skip;
|
2012-08-11 16:34:46 +00:00
|
|
|
}
|
2013-08-03 13:10:57 +00:00
|
|
|
narg->next = ctx->gen.boxes;
|
|
|
|
ctx->gen.boxes = narg;
|
2013-07-27 13:32:49 +00:00
|
|
|
skip:
|
|
|
|
free_list( list );
|
2013-07-27 12:31:13 +00:00
|
|
|
return LIST_OK;
|
2004-03-27 16:07:20 +00:00
|
|
|
}
|
|
|
|
|
2012-08-11 16:34:46 +00:00
|
|
|
static int
|
2013-08-03 13:10:57 +00:00
|
|
|
prepare_name( char **buf, const imap_store_t *ctx, const char *prefix, const char *name )
|
2012-08-11 16:34:46 +00:00
|
|
|
{
|
2013-08-03 13:10:57 +00:00
|
|
|
int pl = strlen( prefix );
|
2012-08-11 16:34:46 +00:00
|
|
|
|
2013-08-03 13:10:57 +00:00
|
|
|
switch (map_name( name, buf, pl, "/", ctx->delimiter )) {
|
2012-08-11 16:34:46 +00:00
|
|
|
case -1:
|
2013-08-03 13:10:57 +00:00
|
|
|
error( "IMAP error: mailbox name %s contains server's hierarchy delimiter\n", name );
|
2012-08-11 16:34:46 +00:00
|
|
|
return -1;
|
|
|
|
case -2:
|
|
|
|
error( "IMAP error: server's hierarchy delimiter not known\n" );
|
|
|
|
return -1;
|
|
|
|
default:
|
2013-08-03 13:10:57 +00:00
|
|
|
memcpy( *buf, prefix, pl );
|
2012-08-11 16:34:46 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2013-08-03 13:10:57 +00:00
|
|
|
prepare_box( char **buf, const imap_store_t *ctx )
|
2012-08-11 16:34:46 +00:00
|
|
|
{
|
|
|
|
const char *name = ctx->gen.name;
|
|
|
|
|
|
|
|
return prepare_name( buf, ctx,
|
|
|
|
(!memcmp( name, "INBOX", 5 ) && (!name[5] || name[5] == '/')) ? "" : ctx->prefix, name );
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2013-08-03 13:10:57 +00:00
|
|
|
prepare_trash( char **buf, const imap_store_t *ctx )
|
2012-08-11 16:34:46 +00:00
|
|
|
{
|
|
|
|
return prepare_name( buf, ctx, ctx->prefix, ctx->gen.conf->trash );
|
|
|
|
}
|
|
|
|
|
2011-04-03 16:15:36 +00:00
|
|
|
struct imap_cmd_trycreate {
|
|
|
|
struct imap_cmd gen;
|
|
|
|
struct imap_cmd *orig_cmd;
|
|
|
|
};
|
|
|
|
|
2011-03-13 11:06:49 +00:00
|
|
|
static void imap_open_store_greeted( imap_store_t * );
|
2011-04-03 16:15:36 +00:00
|
|
|
static void get_cmd_result_p2( imap_store_t *, struct imap_cmd *, int );
|
|
|
|
|
2012-08-25 16:26:23 +00:00
|
|
|
static void
|
|
|
|
imap_socket_read( void *aux )
|
2004-03-27 16:07:20 +00:00
|
|
|
{
|
2012-08-25 16:26:23 +00:00
|
|
|
imap_store_t *ctx = (imap_store_t *)aux;
|
2010-11-20 09:17:41 +00:00
|
|
|
struct imap_cmd *cmdp, **pcmdp;
|
2004-03-27 16:07:20 +00:00
|
|
|
char *cmd, *arg, *arg1, *p;
|
2011-03-13 13:12:54 +00:00
|
|
|
int resp, resp2, tag, greeted;
|
2004-03-27 16:07:20 +00:00
|
|
|
|
2011-03-13 11:06:49 +00:00
|
|
|
greeted = ctx->greeting;
|
2004-03-27 16:07:20 +00:00
|
|
|
for (;;) {
|
2013-07-27 12:31:13 +00:00
|
|
|
if (ctx->parse_list_sts.level) {
|
|
|
|
resp = parse_list_continue( ctx, 0 );
|
|
|
|
listret:
|
|
|
|
if (resp == LIST_PARTIAL)
|
|
|
|
return;
|
|
|
|
if (resp == LIST_BAD)
|
|
|
|
break;
|
|
|
|
continue;
|
|
|
|
}
|
2012-08-25 16:26:23 +00:00
|
|
|
if (!(cmd = socket_read_line( &ctx->conn )))
|
|
|
|
return;
|
2013-12-08 15:32:30 +00:00
|
|
|
if (DFlags & VERBOSE) {
|
2013-12-08 15:37:20 +00:00
|
|
|
printf( "%s%s\n", ctx->label, cmd );
|
2013-12-08 15:32:30 +00:00
|
|
|
fflush( stdout );
|
|
|
|
}
|
2004-03-27 16:07:20 +00:00
|
|
|
|
|
|
|
arg = next_arg( &cmd );
|
2012-10-16 07:27:58 +00:00
|
|
|
if (!arg) {
|
|
|
|
error( "IMAP error: empty response\n" );
|
|
|
|
break;
|
|
|
|
}
|
2004-03-27 16:07:20 +00:00
|
|
|
if (*arg == '*') {
|
|
|
|
arg = next_arg( &cmd );
|
|
|
|
if (!arg) {
|
2011-04-10 13:32:25 +00:00
|
|
|
error( "IMAP error: malformed untagged response\n" );
|
2012-07-15 10:55:04 +00:00
|
|
|
break;
|
2004-03-27 16:07:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if (!strcmp( "NAMESPACE", arg )) {
|
2013-07-27 12:31:13 +00:00
|
|
|
resp = parse_list( ctx, cmd, parse_namespace_rsp );
|
|
|
|
goto listret;
|
2011-03-13 11:06:49 +00:00
|
|
|
} else if (ctx->greeting == GreetingPending && !strcmp( "PREAUTH", arg )) {
|
|
|
|
ctx->greeting = GreetingPreauth;
|
|
|
|
parse_response_code( ctx, 0, cmd );
|
|
|
|
} else if (!strcmp( "OK", arg )) {
|
|
|
|
ctx->greeting = GreetingOk;
|
|
|
|
parse_response_code( ctx, 0, cmd );
|
|
|
|
} else if (!strcmp( "BAD", arg ) || !strcmp( "NO", arg ) || !strcmp( "BYE", arg )) {
|
|
|
|
ctx->greeting = GreetingBad;
|
2010-12-05 15:49:11 +00:00
|
|
|
parse_response_code( ctx, 0, cmd );
|
2012-10-16 07:27:58 +00:00
|
|
|
} else if (!strcmp( "CAPABILITY", arg )) {
|
2006-03-20 15:01:48 +00:00
|
|
|
parse_capability( ctx, cmd );
|
2012-10-16 07:27:58 +00:00
|
|
|
} else if (!strcmp( "LIST", arg )) {
|
2013-07-27 12:31:13 +00:00
|
|
|
resp = parse_list( ctx, cmd, parse_list_rsp );
|
|
|
|
goto listret;
|
2012-10-16 07:27:58 +00:00
|
|
|
} else if ((arg1 = next_arg( &cmd ))) {
|
2004-03-27 16:07:20 +00:00
|
|
|
if (!strcmp( "EXISTS", arg1 ))
|
|
|
|
ctx->gen.count = atoi( arg );
|
|
|
|
else if (!strcmp( "RECENT", arg1 ))
|
|
|
|
ctx->gen.recent = atoi( arg );
|
|
|
|
else if(!strcmp ( "FETCH", arg1 )) {
|
2013-07-27 12:31:13 +00:00
|
|
|
resp = parse_list( ctx, cmd, parse_fetch_rsp );
|
|
|
|
goto listret;
|
2004-03-27 16:07:20 +00:00
|
|
|
}
|
|
|
|
} else {
|
2012-07-15 10:55:04 +00:00
|
|
|
error( "IMAP error: unrecognized untagged response '%s'\n", arg );
|
|
|
|
break; /* this may mean anything, so prefer not to spam the log */
|
2004-03-27 16:07:20 +00:00
|
|
|
}
|
2011-03-13 11:06:49 +00:00
|
|
|
if (greeted == GreetingPending) {
|
|
|
|
imap_ref( ctx );
|
|
|
|
imap_open_store_greeted( ctx );
|
2012-08-25 16:26:23 +00:00
|
|
|
if (imap_deref( ctx ))
|
|
|
|
return;
|
2011-03-13 11:06:49 +00:00
|
|
|
}
|
2012-08-25 16:26:23 +00:00
|
|
|
continue;
|
2006-03-20 15:01:48 +00:00
|
|
|
} else if (!ctx->in_progress) {
|
2006-03-19 11:29:12 +00:00
|
|
|
error( "IMAP error: unexpected reply: %s %s\n", arg, cmd ? cmd : "" );
|
2012-07-15 10:55:04 +00:00
|
|
|
break; /* this may mean anything, so prefer not to spam the log */
|
2004-03-27 16:07:20 +00:00
|
|
|
} else if (*arg == '+') {
|
|
|
|
/* This can happen only with the last command underway, as
|
|
|
|
it enforces a round-trip. */
|
2011-03-12 15:20:48 +00:00
|
|
|
cmdp = ctx->in_progress;
|
2008-08-31 20:14:59 +00:00
|
|
|
if (cmdp->param.data) {
|
2010-11-15 09:38:50 +00:00
|
|
|
if (cmdp->param.to_trash)
|
2012-08-25 16:26:23 +00:00
|
|
|
ctx->trashnc = TrashKnown; /* Can't get NO [TRYCREATE] any more. */
|
2011-03-13 13:12:54 +00:00
|
|
|
p = cmdp->param.data;
|
2008-08-31 20:14:59 +00:00
|
|
|
cmdp->param.data = 0;
|
2011-03-13 13:12:54 +00:00
|
|
|
if (socket_write( &ctx->conn, p, cmdp->param.data_len, GiveOwn ) < 0)
|
2012-08-25 16:26:23 +00:00
|
|
|
return;
|
2008-08-31 20:14:59 +00:00
|
|
|
} else if (cmdp->param.cont) {
|
|
|
|
if (cmdp->param.cont( ctx, cmdp, cmd ))
|
2012-08-25 16:26:23 +00:00
|
|
|
return;
|
2004-03-27 16:07:20 +00:00
|
|
|
} else {
|
2006-03-19 11:29:12 +00:00
|
|
|
error( "IMAP error: unexpected command continuation request\n" );
|
2012-07-15 10:55:04 +00:00
|
|
|
break;
|
2004-03-27 16:07:20 +00:00
|
|
|
}
|
2011-03-13 13:12:54 +00:00
|
|
|
if (socket_write( &ctx->conn, "\r\n", 2, KeepOwn ) < 0)
|
2012-08-25 16:26:23 +00:00
|
|
|
return;
|
2004-03-27 16:07:20 +00:00
|
|
|
} else {
|
|
|
|
tag = atoi( arg );
|
2006-03-20 15:01:48 +00:00
|
|
|
for (pcmdp = &ctx->in_progress; (cmdp = *pcmdp); pcmdp = &cmdp->next)
|
2004-03-27 16:07:20 +00:00
|
|
|
if (cmdp->tag == tag)
|
|
|
|
goto gottag;
|
2006-03-19 11:29:12 +00:00
|
|
|
error( "IMAP error: unexpected tag %s\n", arg );
|
2012-07-15 10:55:04 +00:00
|
|
|
break;
|
2004-03-27 16:07:20 +00:00
|
|
|
gottag:
|
|
|
|
if (!(*pcmdp = cmdp->next))
|
2006-03-20 15:01:48 +00:00
|
|
|
ctx->in_progress_append = pcmdp;
|
|
|
|
ctx->num_in_progress--;
|
2004-03-27 16:07:20 +00:00
|
|
|
arg = next_arg( &cmd );
|
2012-10-16 07:27:58 +00:00
|
|
|
if (!arg) {
|
|
|
|
error( "IMAP error: malformed tagged response\n" );
|
|
|
|
break;
|
|
|
|
}
|
2010-11-15 09:38:50 +00:00
|
|
|
if (!strcmp( "OK", arg )) {
|
|
|
|
if (cmdp->param.to_trash)
|
2012-08-25 16:26:23 +00:00
|
|
|
ctx->trashnc = TrashKnown; /* Can't get NO [TRYCREATE] any more. */
|
2011-03-20 15:27:51 +00:00
|
|
|
resp = RESP_OK;
|
2010-11-15 09:38:50 +00:00
|
|
|
} else {
|
2004-03-27 16:07:20 +00:00
|
|
|
if (!strcmp( "NO", arg )) {
|
2011-04-03 16:15:36 +00:00
|
|
|
if (cmdp->param.create &&
|
|
|
|
(cmdp->param.trycreate ||
|
|
|
|
(cmd && !memcmp( cmd, "[TRYCREATE]", 11 ))))
|
|
|
|
{ /* SELECT, APPEND or UID COPY */
|
|
|
|
struct imap_cmd_trycreate *cmd2 =
|
|
|
|
(struct imap_cmd_trycreate *)new_imap_cmd( sizeof(*cmd2) );
|
|
|
|
cmd2->orig_cmd = cmdp;
|
2012-08-25 16:26:23 +00:00
|
|
|
cmd2->gen.param.high_prio = 1;
|
2004-03-27 16:07:20 +00:00
|
|
|
p = strchr( cmdp->cmd, '"' );
|
2012-08-25 16:26:23 +00:00
|
|
|
if (imap_exec( ctx, &cmd2->gen, get_cmd_result_p2,
|
2013-09-25 18:55:32 +00:00
|
|
|
"CREATE %.*s", imap_strchr( p + 1, '"' ) - p + 1, p ) < 0)
|
2012-08-25 16:26:23 +00:00
|
|
|
return;
|
2004-03-27 16:07:20 +00:00
|
|
|
continue;
|
|
|
|
}
|
|
|
|
resp = RESP_NO;
|
|
|
|
} else /*if (!strcmp( "BAD", arg ))*/
|
2012-07-15 10:55:04 +00:00
|
|
|
resp = RESP_CANCEL;
|
2006-03-19 11:29:12 +00:00
|
|
|
error( "IMAP command '%s' returned an error: %s %s\n",
|
|
|
|
memcmp( cmdp->cmd, "LOGIN", 5 ) ? cmdp->cmd : "LOGIN <user> <pass>",
|
|
|
|
arg, cmd ? cmd : "" );
|
2004-03-27 16:07:20 +00:00
|
|
|
}
|
2008-08-31 20:14:59 +00:00
|
|
|
if ((resp2 = parse_response_code( ctx, cmdp, cmd )) > resp)
|
2004-03-27 16:07:20 +00:00
|
|
|
resp = resp2;
|
2011-04-03 16:15:36 +00:00
|
|
|
imap_ref( ctx );
|
2012-07-15 10:55:04 +00:00
|
|
|
if (resp == RESP_CANCEL)
|
|
|
|
imap_invoke_bad_callback( ctx );
|
2011-03-27 10:34:25 +00:00
|
|
|
done_imap_cmd( ctx, cmdp, resp );
|
2011-04-03 16:15:36 +00:00
|
|
|
if (imap_deref( ctx ))
|
2012-08-25 16:26:23 +00:00
|
|
|
return;
|
|
|
|
if (ctx->canceling && !ctx->in_progress) {
|
|
|
|
ctx->canceling = 0;
|
|
|
|
ctx->callbacks.imap_cancel( ctx->callback_aux );
|
|
|
|
return;
|
|
|
|
}
|
2004-03-27 16:07:20 +00:00
|
|
|
}
|
2012-08-25 16:26:23 +00:00
|
|
|
if (flush_imap_cmds( ctx ) < 0)
|
|
|
|
return;
|
2004-03-27 16:07:20 +00:00
|
|
|
}
|
2012-07-15 10:55:04 +00:00
|
|
|
imap_invoke_bad_callback( ctx );
|
2004-03-27 16:07:20 +00:00
|
|
|
}
|
|
|
|
|
2011-04-03 16:15:36 +00:00
|
|
|
static void
|
|
|
|
get_cmd_result_p2( imap_store_t *ctx, struct imap_cmd *cmd, int response )
|
|
|
|
{
|
|
|
|
struct imap_cmd_trycreate *cmdp = (struct imap_cmd_trycreate *)cmd;
|
|
|
|
struct imap_cmd *ocmd = cmdp->orig_cmd;
|
|
|
|
|
|
|
|
if (response != RESP_OK) {
|
2011-03-27 10:34:25 +00:00
|
|
|
done_imap_cmd( ctx, ocmd, response );
|
2011-04-03 16:15:36 +00:00
|
|
|
} else {
|
2011-06-02 10:43:05 +00:00
|
|
|
ctx->gen.uidnext = 1;
|
2012-08-25 16:26:23 +00:00
|
|
|
if (ocmd->param.to_trash)
|
|
|
|
ctx->trashnc = TrashKnown;
|
2011-04-03 16:15:36 +00:00
|
|
|
ocmd->param.create = 0;
|
2012-08-25 16:26:23 +00:00
|
|
|
ocmd->param.high_prio = 1;
|
|
|
|
submit_imap_cmd( ctx, ocmd );
|
2011-04-03 16:15:36 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-04-03 16:21:46 +00:00
|
|
|
/******************* imap_cancel_store *******************/
|
|
|
|
|
2004-03-27 16:07:20 +00:00
|
|
|
static void
|
2006-03-20 19:38:20 +00:00
|
|
|
imap_cancel_store( store_t *gctx )
|
2004-03-27 16:07:20 +00:00
|
|
|
{
|
2006-03-20 15:01:48 +00:00
|
|
|
imap_store_t *ctx = (imap_store_t *)gctx;
|
2004-03-27 16:07:20 +00:00
|
|
|
|
2011-01-23 13:06:03 +00:00
|
|
|
socket_close( &ctx->conn );
|
2011-03-19 21:12:55 +00:00
|
|
|
cancel_submitted_imap_cmds( ctx );
|
2012-08-25 16:26:23 +00:00
|
|
|
cancel_pending_imap_cmds( ctx );
|
2012-07-29 23:07:31 +00:00
|
|
|
free_generic_messages( ctx->gen.msgs );
|
2006-03-20 19:27:38 +00:00
|
|
|
free_string_list( ctx->gen.boxes );
|
2006-03-20 15:01:48 +00:00
|
|
|
free_list( ctx->ns_personal );
|
|
|
|
free_list( ctx->ns_other );
|
|
|
|
free_list( ctx->ns_shared );
|
2013-08-03 13:10:57 +00:00
|
|
|
free( ctx->delimiter );
|
2011-04-03 16:15:36 +00:00
|
|
|
imap_deref( ctx );
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
imap_deref( imap_store_t *ctx )
|
|
|
|
{
|
|
|
|
if (!--ctx->ref_count) {
|
|
|
|
free( ctx );
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return 0;
|
2004-03-27 16:07:20 +00:00
|
|
|
}
|
|
|
|
|
2012-07-15 10:55:04 +00:00
|
|
|
static void
|
|
|
|
imap_invoke_bad_callback( imap_store_t *ctx )
|
|
|
|
{
|
2011-04-03 16:15:36 +00:00
|
|
|
ctx->gen.bad_callback( ctx->gen.bad_callback_aux );
|
2012-07-15 10:55:04 +00:00
|
|
|
}
|
|
|
|
|
2013-12-08 14:49:03 +00:00
|
|
|
/******************* imap_disown_store *******************/
|
2011-04-03 16:21:46 +00:00
|
|
|
|
2006-03-20 19:38:20 +00:00
|
|
|
static store_t *unowned;
|
|
|
|
|
2012-07-15 10:55:04 +00:00
|
|
|
static void
|
|
|
|
imap_cancel_unowned( void *gctx )
|
|
|
|
{
|
|
|
|
store_t *store, **storep;
|
|
|
|
|
|
|
|
for (storep = &unowned; (store = *storep); storep = &store->next)
|
|
|
|
if (store == gctx) {
|
|
|
|
*storep = store->next;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
imap_cancel_store( gctx );
|
|
|
|
}
|
|
|
|
|
2006-03-20 19:38:20 +00:00
|
|
|
static void
|
|
|
|
imap_disown_store( store_t *gctx )
|
|
|
|
{
|
|
|
|
free_generic_messages( gctx->msgs );
|
|
|
|
gctx->msgs = 0;
|
2012-07-15 10:55:04 +00:00
|
|
|
set_bad_callback( gctx, imap_cancel_unowned, gctx );
|
2006-03-20 19:38:20 +00:00
|
|
|
gctx->next = unowned;
|
|
|
|
unowned = gctx;
|
|
|
|
}
|
|
|
|
|
2011-04-03 16:21:46 +00:00
|
|
|
/******************* imap_cleanup *******************/
|
|
|
|
|
2011-04-03 16:15:36 +00:00
|
|
|
static void imap_cleanup_p2( imap_store_t *, struct imap_cmd *, int );
|
|
|
|
|
2006-03-20 19:38:20 +00:00
|
|
|
static void
|
|
|
|
imap_cleanup( void )
|
|
|
|
{
|
|
|
|
store_t *ctx, *nctx;
|
|
|
|
|
|
|
|
for (ctx = unowned; ctx; ctx = nctx) {
|
|
|
|
nctx = ctx->next;
|
2012-07-15 10:55:04 +00:00
|
|
|
set_bad_callback( ctx, (void (*)(void *))imap_cancel_store, ctx );
|
2011-04-03 16:15:36 +00:00
|
|
|
imap_exec( (imap_store_t *)ctx, 0, imap_cleanup_p2, "LOGOUT" );
|
2006-03-20 19:38:20 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-04-03 16:15:36 +00:00
|
|
|
static void
|
|
|
|
imap_cleanup_p2( imap_store_t *ctx,
|
|
|
|
struct imap_cmd *cmd ATTR_UNUSED, int response )
|
|
|
|
{
|
|
|
|
if (response != RESP_CANCEL)
|
|
|
|
imap_cancel_store( &ctx->gen );
|
|
|
|
}
|
|
|
|
|
2011-04-03 16:21:46 +00:00
|
|
|
/******************* imap_open_store *******************/
|
|
|
|
|
2004-03-27 16:07:20 +00:00
|
|
|
#ifdef HAVE_LIBSSL
|
|
|
|
static int
|
2006-03-20 17:21:07 +00:00
|
|
|
do_cram_auth( imap_store_t *ctx, struct imap_cmd *cmdp, const char *prompt )
|
2004-03-27 16:07:20 +00:00
|
|
|
{
|
|
|
|
imap_server_conf_t *srvc = ((imap_store_conf_t *)ctx->gen.conf)->server;
|
|
|
|
char *resp;
|
2011-03-13 13:12:54 +00:00
|
|
|
int l;
|
|
|
|
|
|
|
|
cmdp->param.cont = 0;
|
2004-03-27 16:07:20 +00:00
|
|
|
|
2011-01-23 12:35:56 +00:00
|
|
|
cram( prompt, srvc->user, srvc->pass, &resp, &l );
|
2004-03-27 16:07:20 +00:00
|
|
|
|
2012-09-22 15:48:09 +00:00
|
|
|
if (DFlags & VERBOSE) {
|
2013-12-08 15:37:20 +00:00
|
|
|
printf( "%s>+> %s\n", ctx->label, resp );
|
2012-09-22 15:48:09 +00:00
|
|
|
fflush( stdout );
|
|
|
|
}
|
2013-03-23 08:59:58 +00:00
|
|
|
if (socket_write( &ctx->conn, resp, l, GiveOwn ) < 0)
|
|
|
|
return -1;
|
|
|
|
return socket_write( &ctx->conn, "\r\n", 2, KeepOwn );
|
2004-03-27 16:07:20 +00:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2012-08-25 16:26:23 +00:00
|
|
|
static void imap_open_store_connected( int, void * );
|
|
|
|
#ifdef HAVE_LIBSSL
|
|
|
|
static void imap_open_store_tlsstarted1( int, void * );
|
|
|
|
#endif
|
2011-04-03 16:15:36 +00:00
|
|
|
static void imap_open_store_p2( imap_store_t *, struct imap_cmd *, int );
|
|
|
|
static void imap_open_store_authenticate( imap_store_t * );
|
|
|
|
#ifdef HAVE_LIBSSL
|
|
|
|
static void imap_open_store_authenticate_p2( imap_store_t *, struct imap_cmd *, int );
|
2012-08-25 16:26:23 +00:00
|
|
|
static void imap_open_store_tlsstarted2( int, void * );
|
2011-04-03 16:15:36 +00:00
|
|
|
static void imap_open_store_authenticate_p3( imap_store_t *, struct imap_cmd *, int );
|
|
|
|
#endif
|
|
|
|
static void imap_open_store_authenticate2( imap_store_t * );
|
|
|
|
static void imap_open_store_authenticate2_p2( imap_store_t *, struct imap_cmd *, int );
|
|
|
|
static void imap_open_store_namespace( imap_store_t * );
|
|
|
|
static void imap_open_store_namespace_p2( imap_store_t *, struct imap_cmd *, int );
|
|
|
|
static void imap_open_store_namespace2( imap_store_t * );
|
|
|
|
static void imap_open_store_finalize( imap_store_t * );
|
|
|
|
#ifdef HAVE_LIBSSL
|
|
|
|
static void imap_open_store_ssl_bail( imap_store_t * );
|
|
|
|
#endif
|
|
|
|
static void imap_open_store_bail( imap_store_t * );
|
|
|
|
|
2006-03-21 20:03:21 +00:00
|
|
|
static void
|
2013-12-08 15:37:20 +00:00
|
|
|
imap_open_store( store_conf_t *conf, const char *label,
|
2006-03-21 20:03:21 +00:00
|
|
|
void (*cb)( store_t *srv, void *aux ), void *aux )
|
2004-03-27 16:07:20 +00:00
|
|
|
{
|
|
|
|
imap_store_conf_t *cfg = (imap_store_conf_t *)conf;
|
|
|
|
imap_server_conf_t *srvc = cfg->server;
|
2006-03-20 19:38:20 +00:00
|
|
|
imap_store_t *ctx;
|
|
|
|
store_t **ctxp;
|
2004-03-27 16:07:20 +00:00
|
|
|
|
2013-12-08 14:49:03 +00:00
|
|
|
for (ctxp = &unowned; (ctx = (imap_store_t *)*ctxp); ctxp = &ctx->gen.next)
|
|
|
|
if (ctx->gen.conf == conf) {
|
|
|
|
*ctxp = ctx->gen.next;
|
2013-12-08 15:37:20 +00:00
|
|
|
ctx->label = label;
|
2013-12-08 14:49:03 +00:00
|
|
|
cb( &ctx->gen, aux );
|
|
|
|
return;
|
|
|
|
}
|
2006-03-20 19:38:20 +00:00
|
|
|
for (ctxp = &unowned; (ctx = (imap_store_t *)*ctxp); ctxp = &ctx->gen.next)
|
|
|
|
if (((imap_store_conf_t *)ctx->gen.conf)->server == srvc) {
|
|
|
|
*ctxp = ctx->gen.next;
|
2013-12-08 15:37:20 +00:00
|
|
|
ctx->label = label;
|
2006-03-20 19:38:20 +00:00
|
|
|
/* One could ping the server here, but given that the idle timeout
|
|
|
|
* is at least 30 minutes, this sounds pretty pointless. */
|
2006-03-20 19:27:38 +00:00
|
|
|
free_string_list( ctx->gen.boxes );
|
|
|
|
ctx->gen.boxes = 0;
|
|
|
|
ctx->gen.listed = 0;
|
2006-03-20 15:01:48 +00:00
|
|
|
ctx->gen.conf = conf;
|
2013-08-03 13:10:57 +00:00
|
|
|
free( ctx->delimiter );
|
2012-08-11 16:34:46 +00:00
|
|
|
ctx->delimiter = 0;
|
2011-04-03 16:15:36 +00:00
|
|
|
ctx->callbacks.imap_open = cb;
|
|
|
|
ctx->callback_aux = aux;
|
|
|
|
set_bad_callback( &ctx->gen, (void (*)(void *))imap_open_store_bail, ctx );
|
|
|
|
imap_open_store_namespace( ctx );
|
|
|
|
return;
|
2004-03-27 16:07:20 +00:00
|
|
|
}
|
|
|
|
|
2006-03-20 15:01:48 +00:00
|
|
|
ctx = nfcalloc( sizeof(*ctx) );
|
2004-03-27 16:07:20 +00:00
|
|
|
ctx->gen.conf = conf;
|
2013-12-08 15:37:20 +00:00
|
|
|
ctx->label = label;
|
2011-04-03 16:15:36 +00:00
|
|
|
ctx->ref_count = 1;
|
|
|
|
ctx->callbacks.imap_open = cb;
|
|
|
|
ctx->callback_aux = aux;
|
|
|
|
set_bad_callback( &ctx->gen, (void (*)(void *))imap_open_store_bail, ctx );
|
2006-03-20 15:01:48 +00:00
|
|
|
ctx->in_progress_append = &ctx->in_progress;
|
2012-08-25 16:26:23 +00:00
|
|
|
ctx->pending_append = &ctx->pending;
|
2004-03-27 16:07:20 +00:00
|
|
|
|
2012-08-25 16:26:23 +00:00
|
|
|
socket_init( &ctx->conn, &srvc->sconf,
|
|
|
|
(void (*)( void * ))imap_invoke_bad_callback,
|
|
|
|
imap_socket_read, (int (*)(void *))flush_imap_cmds, ctx );
|
|
|
|
socket_connect( &ctx->conn, imap_open_store_connected );
|
|
|
|
}
|
2011-03-27 14:50:32 +00:00
|
|
|
|
2012-08-25 16:26:23 +00:00
|
|
|
static void
|
|
|
|
imap_open_store_connected( int ok, void *aux )
|
|
|
|
{
|
|
|
|
imap_store_t *ctx = (imap_store_t *)aux;
|
|
|
|
#ifdef HAVE_LIBSSL
|
|
|
|
imap_store_conf_t *cfg = (imap_store_conf_t *)ctx->gen.conf;
|
|
|
|
imap_server_conf_t *srvc = cfg->server;
|
|
|
|
#endif
|
2004-03-27 16:07:20 +00:00
|
|
|
|
2012-08-25 16:26:23 +00:00
|
|
|
if (!ok)
|
|
|
|
imap_open_store_bail( ctx );
|
2011-03-27 10:06:41 +00:00
|
|
|
#ifdef HAVE_LIBSSL
|
2012-08-25 16:26:23 +00:00
|
|
|
else if (srvc->sconf.use_imaps)
|
|
|
|
socket_start_tls( &ctx->conn, imap_open_store_tlsstarted1 );
|
2006-05-28 15:43:58 +00:00
|
|
|
#endif
|
2012-08-25 16:26:23 +00:00
|
|
|
}
|
2004-03-27 16:07:20 +00:00
|
|
|
|
2012-08-25 16:26:23 +00:00
|
|
|
#ifdef HAVE_LIBSSL
|
|
|
|
static void
|
|
|
|
imap_open_store_tlsstarted1( int ok, void *aux )
|
|
|
|
{
|
|
|
|
imap_store_t *ctx = (imap_store_t *)aux;
|
|
|
|
|
|
|
|
if (!ok)
|
|
|
|
imap_open_store_ssl_bail( ctx );
|
2011-03-13 11:06:49 +00:00
|
|
|
}
|
2012-08-25 16:26:23 +00:00
|
|
|
#endif
|
2011-03-13 11:06:49 +00:00
|
|
|
|
|
|
|
static void
|
|
|
|
imap_open_store_greeted( imap_store_t *ctx )
|
|
|
|
{
|
|
|
|
if (ctx->greeting == GreetingBad) {
|
2006-03-19 11:29:12 +00:00
|
|
|
error( "IMAP error: unknown greeting response\n" );
|
2011-03-13 11:06:49 +00:00
|
|
|
imap_open_store_bail( ctx );
|
|
|
|
return;
|
2004-03-27 16:07:20 +00:00
|
|
|
}
|
2011-03-13 11:06:49 +00:00
|
|
|
|
2011-04-03 16:15:36 +00:00
|
|
|
if (!ctx->caps)
|
|
|
|
imap_exec( ctx, 0, imap_open_store_p2, "CAPABILITY" );
|
|
|
|
else
|
|
|
|
imap_open_store_authenticate( ctx );
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
imap_open_store_p2( imap_store_t *ctx, struct imap_cmd *cmd ATTR_UNUSED, int response )
|
|
|
|
{
|
2013-03-23 09:34:51 +00:00
|
|
|
if (response == RESP_NO)
|
2011-04-03 16:15:36 +00:00
|
|
|
imap_open_store_bail( ctx );
|
2013-03-23 09:34:51 +00:00
|
|
|
else if (response == RESP_OK)
|
2011-04-03 16:15:36 +00:00
|
|
|
imap_open_store_authenticate( ctx );
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
imap_open_store_authenticate( imap_store_t *ctx )
|
|
|
|
{
|
2011-03-27 10:06:41 +00:00
|
|
|
#ifdef HAVE_LIBSSL
|
don't ignore RequireSSL for PREAUTHenticated connections
such connections don't support STARTTLS. that is reasonable, as whatever
makes the connection preauthenticated (typically a Tunnel used to launch
imapd via a shell login) must already rely on the connection's security.
consequently, we would not try to use STARTTLS with such connections.
unfortunately, we'd also skip the RequireSSL check as a side effect.
this means that a rogue server (via a MITM attack) could simply offer a
preauthenticated connection to make us not use SSL, and thus bypass
server authentication. as a result, we could send potentially sensitive
data to the attacker:
- with Patterns used, we would send a LIST command which reveals the
remote Path setting. this isn't very useful to an attacker. also, IMAP
Accounts usually rely on the server-provided NAMESPACE to start with.
- with Create enabled for the remote Store, we would upload messages
from newly appeared local folders. this isn't a very likely situation,
unless the attacker manages to convince the victim to move/copy
interesting mails to a new folder right before the attack.
- with Expunge enabled for the local Store, previously synchronized
folders would be wiped. however, this would require the attacker to
know the correct UIDVALIDITY of each remote folder, which would
require incredible luck or convincing the victim to disclose them.
the first mismatch would likely tip off the victim.
in practice, someone with the level of technical and social engineering
skills required for this attack would very likely find more attractive
attack vectors. therefore, i don't consider this a particularly serious
issue.
configurations with UseIMAPS enabled or using a secure Tunnel were not
affected to start with.
a side effect of this fix is that most users of Tunnel will now need to
explicitly set RequireSSL to false.
an alternative approach would be defaulting all SSL-related settings to
off when Tunnel is used. this would be too invasive for a patch release,
but i'll consider it for 1.2.
see also CVE-2014-2567 for the Trojita MUA.
2014-07-05 20:52:40 +00:00
|
|
|
imap_store_conf_t *cfg = (imap_store_conf_t *)ctx->gen.conf;
|
|
|
|
imap_server_conf_t *srvc = cfg->server;
|
|
|
|
#endif
|
2011-04-03 16:15:36 +00:00
|
|
|
|
don't ignore RequireSSL for PREAUTHenticated connections
such connections don't support STARTTLS. that is reasonable, as whatever
makes the connection preauthenticated (typically a Tunnel used to launch
imapd via a shell login) must already rely on the connection's security.
consequently, we would not try to use STARTTLS with such connections.
unfortunately, we'd also skip the RequireSSL check as a side effect.
this means that a rogue server (via a MITM attack) could simply offer a
preauthenticated connection to make us not use SSL, and thus bypass
server authentication. as a result, we could send potentially sensitive
data to the attacker:
- with Patterns used, we would send a LIST command which reveals the
remote Path setting. this isn't very useful to an attacker. also, IMAP
Accounts usually rely on the server-provided NAMESPACE to start with.
- with Create enabled for the remote Store, we would upload messages
from newly appeared local folders. this isn't a very likely situation,
unless the attacker manages to convince the victim to move/copy
interesting mails to a new folder right before the attack.
- with Expunge enabled for the local Store, previously synchronized
folders would be wiped. however, this would require the attacker to
know the correct UIDVALIDITY of each remote folder, which would
require incredible luck or convincing the victim to disclose them.
the first mismatch would likely tip off the victim.
in practice, someone with the level of technical and social engineering
skills required for this attack would very likely find more attractive
attack vectors. therefore, i don't consider this a particularly serious
issue.
configurations with UseIMAPS enabled or using a secure Tunnel were not
affected to start with.
a side effect of this fix is that most users of Tunnel will now need to
explicitly set RequireSSL to false.
an alternative approach would be defaulting all SSL-related settings to
off when Tunnel is used. this would be too invasive for a patch release,
but i'll consider it for 1.2.
see also CVE-2014-2567 for the Trojita MUA.
2014-07-05 20:52:40 +00:00
|
|
|
if (ctx->greeting != GreetingPreauth) {
|
|
|
|
#ifdef HAVE_LIBSSL
|
2014-07-05 21:10:09 +00:00
|
|
|
if (!srvc->sconf.use_imaps && srvc->use_ssl) {
|
2004-03-27 16:07:20 +00:00
|
|
|
/* always try to select SSL support if available */
|
|
|
|
if (CAP(STARTTLS)) {
|
2011-04-03 16:15:36 +00:00
|
|
|
imap_exec( ctx, 0, imap_open_store_authenticate_p2, "STARTTLS" );
|
|
|
|
return;
|
2004-03-27 16:07:20 +00:00
|
|
|
} else {
|
|
|
|
if (srvc->require_ssl) {
|
2006-03-19 11:29:12 +00:00
|
|
|
error( "IMAP error: SSL support not available\n" );
|
2011-04-03 16:15:36 +00:00
|
|
|
imap_open_store_bail( ctx );
|
|
|
|
return;
|
|
|
|
} else {
|
2004-03-27 16:07:20 +00:00
|
|
|
warn( "IMAP warning: SSL support not available\n" );
|
2011-04-03 16:15:36 +00:00
|
|
|
}
|
2004-03-27 16:07:20 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
2011-04-03 16:15:36 +00:00
|
|
|
imap_open_store_authenticate2( ctx );
|
|
|
|
} else {
|
don't ignore RequireSSL for PREAUTHenticated connections
such connections don't support STARTTLS. that is reasonable, as whatever
makes the connection preauthenticated (typically a Tunnel used to launch
imapd via a shell login) must already rely on the connection's security.
consequently, we would not try to use STARTTLS with such connections.
unfortunately, we'd also skip the RequireSSL check as a side effect.
this means that a rogue server (via a MITM attack) could simply offer a
preauthenticated connection to make us not use SSL, and thus bypass
server authentication. as a result, we could send potentially sensitive
data to the attacker:
- with Patterns used, we would send a LIST command which reveals the
remote Path setting. this isn't very useful to an attacker. also, IMAP
Accounts usually rely on the server-provided NAMESPACE to start with.
- with Create enabled for the remote Store, we would upload messages
from newly appeared local folders. this isn't a very likely situation,
unless the attacker manages to convince the victim to move/copy
interesting mails to a new folder right before the attack.
- with Expunge enabled for the local Store, previously synchronized
folders would be wiped. however, this would require the attacker to
know the correct UIDVALIDITY of each remote folder, which would
require incredible luck or convincing the victim to disclose them.
the first mismatch would likely tip off the victim.
in practice, someone with the level of technical and social engineering
skills required for this attack would very likely find more attractive
attack vectors. therefore, i don't consider this a particularly serious
issue.
configurations with UseIMAPS enabled or using a secure Tunnel were not
affected to start with.
a side effect of this fix is that most users of Tunnel will now need to
explicitly set RequireSSL to false.
an alternative approach would be defaulting all SSL-related settings to
off when Tunnel is used. this would be too invasive for a patch release,
but i'll consider it for 1.2.
see also CVE-2014-2567 for the Trojita MUA.
2014-07-05 20:52:40 +00:00
|
|
|
#ifdef HAVE_LIBSSL
|
|
|
|
if (!srvc->sconf.use_imaps && srvc->require_ssl) {
|
|
|
|
error( "IMAP error: SSL support not available\n" );
|
|
|
|
imap_open_store_bail( ctx );
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
#endif
|
2011-04-03 16:15:36 +00:00
|
|
|
imap_open_store_namespace( ctx );
|
|
|
|
}
|
|
|
|
}
|
2004-03-27 16:07:20 +00:00
|
|
|
|
2011-04-03 16:15:36 +00:00
|
|
|
#ifdef HAVE_LIBSSL
|
|
|
|
static void
|
|
|
|
imap_open_store_authenticate_p2( imap_store_t *ctx, struct imap_cmd *cmd ATTR_UNUSED, int response )
|
|
|
|
{
|
2013-03-23 09:34:51 +00:00
|
|
|
if (response == RESP_NO)
|
2011-04-03 16:15:36 +00:00
|
|
|
imap_open_store_bail( ctx );
|
2013-03-23 09:34:51 +00:00
|
|
|
else if (response == RESP_OK)
|
2012-08-25 16:26:23 +00:00
|
|
|
socket_start_tls( &ctx->conn, imap_open_store_tlsstarted2 );
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
imap_open_store_tlsstarted2( int ok, void *aux )
|
|
|
|
{
|
|
|
|
imap_store_t *ctx = (imap_store_t *)aux;
|
|
|
|
|
|
|
|
if (!ok)
|
2011-04-03 16:15:36 +00:00
|
|
|
imap_open_store_ssl_bail( ctx );
|
|
|
|
else
|
|
|
|
imap_exec( ctx, 0, imap_open_store_authenticate_p3, "CAPABILITY" );
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
imap_open_store_authenticate_p3( imap_store_t *ctx, struct imap_cmd *cmd ATTR_UNUSED, int response )
|
|
|
|
{
|
2013-03-23 09:34:51 +00:00
|
|
|
if (response == RESP_NO)
|
2011-04-03 16:15:36 +00:00
|
|
|
imap_open_store_bail( ctx );
|
2013-03-23 09:34:51 +00:00
|
|
|
else if (response == RESP_OK)
|
2011-04-03 16:15:36 +00:00
|
|
|
imap_open_store_authenticate2( ctx );
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
static void
|
|
|
|
imap_open_store_authenticate2( imap_store_t *ctx )
|
|
|
|
{
|
|
|
|
imap_store_conf_t *cfg = (imap_store_conf_t *)ctx->gen.conf;
|
|
|
|
imap_server_conf_t *srvc = cfg->server;
|
|
|
|
char *arg;
|
|
|
|
|
|
|
|
info ("Logging in...\n");
|
|
|
|
if (!srvc->user) {
|
|
|
|
error( "Skipping account %s, no user\n", srvc->name );
|
|
|
|
goto bail;
|
|
|
|
}
|
2013-07-27 08:37:15 +00:00
|
|
|
if (srvc->pass_cmd) {
|
|
|
|
FILE *fp;
|
|
|
|
int ret;
|
|
|
|
char buffer[80];
|
|
|
|
|
|
|
|
if (!(fp = popen( srvc->pass_cmd, "r" ))) {
|
|
|
|
pipeerr:
|
|
|
|
sys_error( "Skipping account %s, password command failed", srvc->name );
|
|
|
|
goto bail;
|
|
|
|
}
|
|
|
|
if (!fgets( buffer, sizeof(buffer), fp ))
|
|
|
|
buffer[0] = 0;
|
|
|
|
if ((ret = pclose( fp )) < 0)
|
|
|
|
goto pipeerr;
|
|
|
|
if (ret) {
|
|
|
|
if (WIFSIGNALED( ret ))
|
|
|
|
error( "Skipping account %s, password command crashed\n", srvc->name );
|
|
|
|
else
|
|
|
|
error( "Skipping account %s, password command exited with status %d\n", srvc->name, WEXITSTATUS( ret ) );
|
|
|
|
goto bail;
|
|
|
|
}
|
|
|
|
if (!buffer[0]) {
|
|
|
|
error( "Skipping account %s, password command produced no output\n", srvc->name );
|
|
|
|
goto bail;
|
|
|
|
}
|
|
|
|
buffer[strcspn( buffer, "\n" )] = 0; /* Strip trailing newline */
|
|
|
|
free( srvc->pass ); /* From previous runs */
|
|
|
|
srvc->pass = nfstrdup( buffer );
|
|
|
|
} else if (!srvc->pass) {
|
2011-04-03 16:15:36 +00:00
|
|
|
char prompt[80];
|
|
|
|
sprintf( prompt, "Password (%s): ", srvc->name );
|
|
|
|
arg = getpass( prompt );
|
|
|
|
if (!arg) {
|
|
|
|
perror( "getpass" );
|
|
|
|
exit( 1 );
|
2004-03-27 16:07:20 +00:00
|
|
|
}
|
2011-04-03 16:15:36 +00:00
|
|
|
if (!*arg) {
|
|
|
|
error( "Skipping account %s, no password\n", srvc->name );
|
|
|
|
goto bail;
|
2004-03-27 16:07:20 +00:00
|
|
|
}
|
2011-04-03 16:15:36 +00:00
|
|
|
/*
|
|
|
|
* getpass() returns a pointer to a static buffer. make a copy
|
|
|
|
* for long term storage.
|
|
|
|
*/
|
|
|
|
srvc->pass = nfstrdup( arg );
|
|
|
|
}
|
2011-03-27 10:06:41 +00:00
|
|
|
#ifdef HAVE_LIBSSL
|
2011-04-03 16:15:36 +00:00
|
|
|
if (CAP(CRAM)) {
|
|
|
|
struct imap_cmd *cmd = new_imap_cmd( sizeof(*cmd) );
|
2004-03-27 16:07:20 +00:00
|
|
|
|
2011-04-03 16:15:36 +00:00
|
|
|
info( "Authenticating with CRAM-MD5\n" );
|
|
|
|
cmd->param.cont = do_cram_auth;
|
|
|
|
imap_exec( ctx, cmd, imap_open_store_authenticate2_p2, "AUTHENTICATE CRAM-MD5" );
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (srvc->require_cram) {
|
|
|
|
error( "IMAP error: CRAM-MD5 authentication is not supported by server\n" );
|
|
|
|
goto bail;
|
|
|
|
}
|
2004-03-27 16:07:20 +00:00
|
|
|
#endif
|
2011-04-03 16:15:36 +00:00
|
|
|
if (CAP(NOLOGIN)) {
|
|
|
|
error( "Skipping account %s, server forbids LOGIN\n", srvc->name );
|
|
|
|
goto bail;
|
|
|
|
}
|
2011-03-27 10:06:41 +00:00
|
|
|
#ifdef HAVE_LIBSSL
|
2011-01-23 13:06:03 +00:00
|
|
|
if (!ctx->conn.ssl)
|
2004-03-27 16:07:20 +00:00
|
|
|
#endif
|
2011-04-03 16:15:36 +00:00
|
|
|
warn( "*** IMAP Warning *** Password is being sent in the clear\n" );
|
|
|
|
imap_exec( ctx, 0, imap_open_store_authenticate2_p2,
|
2013-09-25 18:55:32 +00:00
|
|
|
"LOGIN \"%\\s\" \"%\\s\"", srvc->user, srvc->pass );
|
2011-04-03 16:15:36 +00:00
|
|
|
return;
|
|
|
|
|
|
|
|
bail:
|
|
|
|
imap_open_store_bail( ctx );
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
imap_open_store_authenticate2_p2( imap_store_t *ctx, struct imap_cmd *cmd ATTR_UNUSED, int response )
|
|
|
|
{
|
2013-03-23 09:34:51 +00:00
|
|
|
if (response == RESP_NO)
|
2011-04-03 16:15:36 +00:00
|
|
|
imap_open_store_bail( ctx );
|
2013-03-23 09:34:51 +00:00
|
|
|
else if (response == RESP_OK)
|
2011-04-03 16:15:36 +00:00
|
|
|
imap_open_store_namespace( ctx );
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
imap_open_store_namespace( imap_store_t *ctx )
|
|
|
|
{
|
|
|
|
imap_store_conf_t *cfg = (imap_store_conf_t *)ctx->gen.conf;
|
2004-03-27 16:07:20 +00:00
|
|
|
|
2012-08-11 16:34:46 +00:00
|
|
|
ctx->prefix = cfg->gen.path;
|
2013-08-03 13:10:57 +00:00
|
|
|
ctx->delimiter = cfg->delimiter ? nfstrdup( cfg->delimiter ) : 0;
|
2012-08-11 16:34:46 +00:00
|
|
|
if (((!*ctx->prefix && cfg->use_namespace) || !cfg->delimiter) && CAP(NAMESPACE)) {
|
2004-03-27 16:07:20 +00:00
|
|
|
/* get NAMESPACE info */
|
2011-04-03 16:15:36 +00:00
|
|
|
if (!ctx->got_namespace)
|
|
|
|
imap_exec( ctx, 0, imap_open_store_namespace_p2, "NAMESPACE" );
|
|
|
|
else
|
|
|
|
imap_open_store_namespace2( ctx );
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
imap_open_store_finalize( ctx );
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
imap_open_store_namespace_p2( imap_store_t *ctx, struct imap_cmd *cmd ATTR_UNUSED, int response )
|
|
|
|
{
|
2013-03-23 09:34:51 +00:00
|
|
|
if (response == RESP_NO) {
|
2011-04-03 16:15:36 +00:00
|
|
|
imap_open_store_bail( ctx );
|
2013-03-23 09:34:51 +00:00
|
|
|
} else if (response == RESP_OK) {
|
2011-04-03 16:15:36 +00:00
|
|
|
ctx->got_namespace = 1;
|
|
|
|
imap_open_store_namespace2( ctx );
|
2004-03-27 16:07:20 +00:00
|
|
|
}
|
2011-04-03 16:15:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
imap_open_store_namespace2( imap_store_t *ctx )
|
|
|
|
{
|
2012-08-11 16:34:46 +00:00
|
|
|
imap_store_conf_t *cfg = (imap_store_conf_t *)ctx->gen.conf;
|
|
|
|
list_t *nsp, *nsp_1st, *nsp_1st_ns, *nsp_1st_dl;
|
|
|
|
|
|
|
|
/* XXX for now assume 1st personal namespace */
|
|
|
|
if (is_list( (nsp = ctx->ns_personal) ) &&
|
|
|
|
is_list( (nsp_1st = nsp->child) ) &&
|
|
|
|
is_atom( (nsp_1st_ns = nsp_1st->child) ) &&
|
|
|
|
is_atom( (nsp_1st_dl = nsp_1st_ns->next) ))
|
|
|
|
{
|
|
|
|
if (!*ctx->prefix && cfg->use_namespace)
|
|
|
|
ctx->prefix = nsp_1st_ns->val;
|
|
|
|
if (!ctx->delimiter)
|
2013-08-03 13:10:57 +00:00
|
|
|
ctx->delimiter = nfstrdup( nsp_1st_dl->val );
|
2014-10-04 15:30:15 +00:00
|
|
|
imap_open_store_finalize( ctx );
|
|
|
|
} else {
|
|
|
|
imap_open_store_bail( ctx );
|
2012-08-11 16:34:46 +00:00
|
|
|
}
|
2011-04-03 16:15:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
imap_open_store_finalize( imap_store_t *ctx )
|
|
|
|
{
|
|
|
|
set_bad_callback( &ctx->gen, 0, 0 );
|
2012-08-25 16:26:23 +00:00
|
|
|
ctx->trashnc = TrashUnknown;
|
2011-04-03 16:15:36 +00:00
|
|
|
ctx->callbacks.imap_open( &ctx->gen, ctx->callback_aux );
|
|
|
|
}
|
2004-03-27 16:07:20 +00:00
|
|
|
|
2011-03-27 10:06:41 +00:00
|
|
|
#ifdef HAVE_LIBSSL
|
2011-04-03 16:15:36 +00:00
|
|
|
static void
|
|
|
|
imap_open_store_ssl_bail( imap_store_t *ctx )
|
|
|
|
{
|
2010-10-03 09:53:18 +00:00
|
|
|
/* This avoids that we try to send LOGOUT to an unusable socket. */
|
2011-01-23 13:06:03 +00:00
|
|
|
socket_close( &ctx->conn );
|
2011-04-03 16:15:36 +00:00
|
|
|
imap_open_store_bail( ctx );
|
|
|
|
}
|
2010-10-03 09:53:18 +00:00
|
|
|
#endif
|
2011-04-03 16:15:36 +00:00
|
|
|
|
|
|
|
static void
|
|
|
|
imap_open_store_bail( imap_store_t *ctx )
|
|
|
|
{
|
|
|
|
void (*cb)( store_t *srv, void *aux ) = ctx->callbacks.imap_open;
|
|
|
|
void *aux = ctx->callback_aux;
|
2006-03-20 19:38:20 +00:00
|
|
|
imap_cancel_store( &ctx->gen );
|
2006-03-21 20:03:21 +00:00
|
|
|
cb( 0, aux );
|
2004-03-27 16:07:20 +00:00
|
|
|
}
|
|
|
|
|
2011-04-03 16:21:46 +00:00
|
|
|
/******************* imap_prepare_opts *******************/
|
|
|
|
|
2006-01-29 11:22:45 +00:00
|
|
|
static void
|
|
|
|
imap_prepare_opts( store_t *gctx, int opts )
|
|
|
|
{
|
2004-03-27 16:07:20 +00:00
|
|
|
gctx->opts = opts;
|
|
|
|
}
|
|
|
|
|
2011-04-03 16:21:46 +00:00
|
|
|
/******************* imap_select *******************/
|
|
|
|
|
2012-07-29 21:14:48 +00:00
|
|
|
static void
|
2011-07-23 14:06:32 +00:00
|
|
|
imap_select( store_t *gctx, int create,
|
2012-07-29 21:14:48 +00:00
|
|
|
void (*cb)( int sts, void *aux ), void *aux )
|
2004-03-27 16:07:20 +00:00
|
|
|
{
|
|
|
|
imap_store_t *ctx = (imap_store_t *)gctx;
|
2011-04-03 16:15:36 +00:00
|
|
|
struct imap_cmd_simple *cmd;
|
2013-08-03 13:10:57 +00:00
|
|
|
char *buf;
|
2004-03-27 16:07:20 +00:00
|
|
|
|
2011-07-23 14:06:32 +00:00
|
|
|
free_generic_messages( gctx->msgs );
|
|
|
|
gctx->msgs = 0;
|
2014-02-08 12:21:28 +00:00
|
|
|
ctx->msgapp = &gctx->msgs;
|
2004-03-27 16:07:20 +00:00
|
|
|
|
2013-08-03 13:10:57 +00:00
|
|
|
if (prepare_box( &buf, ctx ) < 0) {
|
2012-08-11 16:34:46 +00:00
|
|
|
cb( DRV_BOX_BAD, aux );
|
|
|
|
return;
|
2004-03-27 16:07:20 +00:00
|
|
|
}
|
|
|
|
|
2011-06-02 10:43:05 +00:00
|
|
|
ctx->gen.uidnext = 0;
|
2010-10-03 12:31:30 +00:00
|
|
|
|
2011-04-03 16:15:36 +00:00
|
|
|
INIT_IMAP_CMD(imap_cmd_simple, cmd, cb, aux)
|
|
|
|
cmd->gen.param.create = create;
|
|
|
|
cmd->gen.param.trycreate = 1;
|
|
|
|
imap_exec( ctx, &cmd->gen, imap_done_simple_box,
|
2013-09-25 18:55:32 +00:00
|
|
|
"SELECT \"%\\s\"", buf );
|
2013-08-03 13:10:57 +00:00
|
|
|
free( buf );
|
2011-07-23 14:06:32 +00:00
|
|
|
}
|
|
|
|
|
2011-04-03 16:21:46 +00:00
|
|
|
/******************* imap_load *******************/
|
|
|
|
|
2011-04-10 11:06:07 +00:00
|
|
|
static int imap_submit_load( imap_store_t *, const char *, int, struct imap_cmd_refcounted_state * );
|
2011-04-03 16:15:36 +00:00
|
|
|
|
2011-07-23 14:06:32 +00:00
|
|
|
static void
|
2011-04-10 11:06:07 +00:00
|
|
|
imap_load( store_t *gctx, int minuid, int maxuid, int newuid, int *excs, int nexcs,
|
2011-07-23 14:06:32 +00:00
|
|
|
void (*cb)( int sts, void *aux ), void *aux )
|
|
|
|
{
|
|
|
|
imap_store_t *ctx = (imap_store_t *)gctx;
|
2011-04-03 16:15:36 +00:00
|
|
|
int i, j, bl;
|
2011-07-23 14:06:32 +00:00
|
|
|
char buf[1000];
|
2004-03-27 16:07:20 +00:00
|
|
|
|
2011-04-03 16:15:36 +00:00
|
|
|
if (!ctx->gen.count) {
|
|
|
|
free( excs );
|
|
|
|
cb( DRV_OK, aux );
|
|
|
|
} else {
|
|
|
|
struct imap_cmd_refcounted_state *sts = imap_refcounted_new_state( cb, aux );
|
|
|
|
|
2004-03-27 16:07:20 +00:00
|
|
|
sort_ints( excs, nexcs );
|
|
|
|
for (i = 0; i < nexcs; ) {
|
|
|
|
for (bl = 0; i < nexcs && bl < 960; i++) {
|
|
|
|
if (bl)
|
|
|
|
buf[bl++] = ',';
|
|
|
|
bl += sprintf( buf + bl, "%d", excs[i] );
|
|
|
|
j = i;
|
2011-04-03 16:15:36 +00:00
|
|
|
for (; i + 1 < nexcs && excs[i + 1] == excs[i] + 1; i++) {}
|
2004-03-27 16:07:20 +00:00
|
|
|
if (i != j)
|
|
|
|
bl += sprintf( buf + bl, ":%d", excs[i] );
|
|
|
|
}
|
2011-04-10 11:06:07 +00:00
|
|
|
if (imap_submit_load( ctx, buf, 0, sts ) < 0)
|
2011-04-03 16:15:36 +00:00
|
|
|
goto done;
|
2004-03-27 16:07:20 +00:00
|
|
|
}
|
|
|
|
if (maxuid == INT_MAX)
|
2011-06-02 10:43:05 +00:00
|
|
|
maxuid = ctx->gen.uidnext ? ctx->gen.uidnext - 1 : 1000000000;
|
2011-04-03 16:15:36 +00:00
|
|
|
if (maxuid >= minuid) {
|
2011-04-10 11:06:07 +00:00
|
|
|
if ((ctx->gen.opts & OPEN_FIND) && minuid < newuid) {
|
|
|
|
sprintf( buf, "%d:%d", minuid, newuid - 1 );
|
|
|
|
if (imap_submit_load( ctx, buf, 0, sts ) < 0)
|
|
|
|
goto done;
|
2013-03-30 09:10:09 +00:00
|
|
|
if (newuid > maxuid)
|
|
|
|
goto done;
|
2011-04-10 11:06:07 +00:00
|
|
|
sprintf( buf, "%d:%d", newuid, maxuid );
|
|
|
|
} else {
|
|
|
|
sprintf( buf, "%d:%d", minuid, maxuid );
|
|
|
|
}
|
|
|
|
imap_submit_load( ctx, buf, (ctx->gen.opts & OPEN_FIND), sts );
|
2011-04-03 16:15:36 +00:00
|
|
|
}
|
|
|
|
done:
|
|
|
|
free( excs );
|
2011-03-20 17:23:09 +00:00
|
|
|
imap_refcounted_done( sts );
|
2004-03-27 16:07:20 +00:00
|
|
|
}
|
2011-04-03 16:15:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2011-04-10 11:06:07 +00:00
|
|
|
imap_submit_load( imap_store_t *ctx, const char *buf, int tuids, struct imap_cmd_refcounted_state *sts )
|
2011-04-03 16:15:36 +00:00
|
|
|
{
|
2011-06-13 10:13:31 +00:00
|
|
|
return imap_exec( ctx, imap_refcounted_new_cmd( sts ), imap_refcounted_done_box,
|
2011-04-10 11:06:07 +00:00
|
|
|
"UID FETCH %s (UID%s%s%s)", buf,
|
2012-08-25 16:26:23 +00:00
|
|
|
(ctx->gen.opts & OPEN_FLAGS) ? " FLAGS" : "",
|
2011-04-10 11:06:07 +00:00
|
|
|
(ctx->gen.opts & OPEN_SIZE) ? " RFC822.SIZE" : "",
|
|
|
|
tuids ? " BODY.PEEK[HEADER.FIELDS (X-TUID)]" : "");
|
2011-04-03 16:15:36 +00:00
|
|
|
}
|
2004-03-27 16:07:20 +00:00
|
|
|
|
2011-04-03 16:21:46 +00:00
|
|
|
/******************* imap_fetch_msg *******************/
|
|
|
|
|
2013-09-25 15:13:00 +00:00
|
|
|
static void imap_fetch_msg_p2( imap_store_t *ctx, struct imap_cmd *gcmd, int response );
|
|
|
|
|
2012-07-29 21:14:48 +00:00
|
|
|
static void
|
2006-03-21 20:03:21 +00:00
|
|
|
imap_fetch_msg( store_t *ctx, message_t *msg, msg_data_t *data,
|
2012-07-29 21:14:48 +00:00
|
|
|
void (*cb)( int sts, void *aux ), void *aux )
|
2004-03-27 16:07:20 +00:00
|
|
|
{
|
2011-04-03 16:15:36 +00:00
|
|
|
struct imap_cmd_fetch_msg *cmd;
|
|
|
|
|
|
|
|
INIT_IMAP_CMD_X(imap_cmd_fetch_msg, cmd, cb, aux)
|
|
|
|
cmd->gen.gen.param.uid = msg->uid;
|
|
|
|
cmd->msg_data = data;
|
2013-09-25 15:13:00 +00:00
|
|
|
data->data = 0;
|
|
|
|
imap_exec( (imap_store_t *)ctx, &cmd->gen.gen, imap_fetch_msg_p2,
|
2013-07-28 13:55:13 +00:00
|
|
|
"UID FETCH %d (%s%sBODY.PEEK[])", msg->uid,
|
|
|
|
!(msg->status & M_FLAGS) ? "FLAGS " : "",
|
|
|
|
(data->date== -1) ? "INTERNALDATE " : "" );
|
2004-03-27 16:07:20 +00:00
|
|
|
}
|
|
|
|
|
2013-09-25 15:13:00 +00:00
|
|
|
static void
|
|
|
|
imap_fetch_msg_p2( imap_store_t *ctx, struct imap_cmd *gcmd, int response )
|
|
|
|
{
|
|
|
|
struct imap_cmd_fetch_msg *cmd = (struct imap_cmd_fetch_msg *)gcmd;
|
|
|
|
|
|
|
|
if (response == RESP_OK && !cmd->msg_data->data) {
|
|
|
|
/* The FETCH succeeded, but there is no message with this UID. */
|
|
|
|
response = RESP_NO;
|
|
|
|
}
|
|
|
|
imap_done_simple_msg( ctx, gcmd, response );
|
|
|
|
}
|
|
|
|
|
2011-04-03 16:21:46 +00:00
|
|
|
/******************* imap_set_flags *******************/
|
|
|
|
|
2011-04-03 16:15:36 +00:00
|
|
|
static void imap_set_flags_p2( imap_store_t *, struct imap_cmd *, int );
|
|
|
|
|
2004-03-27 16:07:20 +00:00
|
|
|
static int
|
|
|
|
imap_make_flags( int flags, char *buf )
|
|
|
|
{
|
|
|
|
const char *s;
|
|
|
|
unsigned i, d;
|
|
|
|
|
|
|
|
for (i = d = 0; i < as(Flags); i++)
|
|
|
|
if (flags & (1 << i)) {
|
|
|
|
buf[d++] = ' ';
|
2004-10-17 15:34:53 +00:00
|
|
|
buf[d++] = '\\';
|
2004-03-27 16:07:20 +00:00
|
|
|
for (s = Flags[i]; *s; s++)
|
|
|
|
buf[d++] = *s;
|
|
|
|
}
|
|
|
|
buf[0] = '(';
|
|
|
|
buf[d++] = ')';
|
|
|
|
return d;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2011-04-03 16:15:36 +00:00
|
|
|
imap_flags_helper( imap_store_t *ctx, int uid, char what, int flags,
|
|
|
|
struct imap_cmd_refcounted_state *sts )
|
2004-03-27 16:07:20 +00:00
|
|
|
{
|
|
|
|
char buf[256];
|
|
|
|
|
|
|
|
buf[imap_make_flags( flags, buf )] = 0;
|
2012-08-25 16:26:23 +00:00
|
|
|
return imap_exec( ctx, imap_refcounted_new_cmd( sts ), imap_set_flags_p2,
|
|
|
|
"UID STORE %d %cFLAGS.SILENT %s", uid, what, buf );
|
2004-03-27 16:07:20 +00:00
|
|
|
}
|
|
|
|
|
2012-07-29 21:14:48 +00:00
|
|
|
static void
|
2006-03-21 20:03:21 +00:00
|
|
|
imap_set_flags( store_t *gctx, message_t *msg, int uid, int add, int del,
|
2012-07-29 21:14:48 +00:00
|
|
|
void (*cb)( int sts, void *aux ), void *aux )
|
2004-03-27 16:07:20 +00:00
|
|
|
{
|
|
|
|
imap_store_t *ctx = (imap_store_t *)gctx;
|
|
|
|
|
|
|
|
if (msg) {
|
|
|
|
uid = msg->uid;
|
|
|
|
add &= ~msg->flags;
|
|
|
|
del &= msg->flags;
|
|
|
|
msg->flags |= add;
|
|
|
|
msg->flags &= ~del;
|
|
|
|
}
|
2011-04-03 16:15:36 +00:00
|
|
|
if (add || del) {
|
|
|
|
struct imap_cmd_refcounted_state *sts = imap_refcounted_new_state( cb, aux );
|
|
|
|
if ((add && imap_flags_helper( ctx, uid, '+', add, sts ) < 0) ||
|
|
|
|
(del && imap_flags_helper( ctx, uid, '-', del, sts ) < 0)) {}
|
2011-03-20 17:23:09 +00:00
|
|
|
imap_refcounted_done( sts );
|
2011-04-03 16:15:36 +00:00
|
|
|
} else {
|
|
|
|
cb( DRV_OK, aux );
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
imap_set_flags_p2( imap_store_t *ctx ATTR_UNUSED, struct imap_cmd *cmd, int response )
|
|
|
|
{
|
|
|
|
struct imap_cmd_refcounted_state *sts = ((struct imap_cmd_refcounted *)cmd)->state;
|
|
|
|
switch (response) {
|
|
|
|
case RESP_CANCEL:
|
|
|
|
sts->ret_val = DRV_CANCELED;
|
|
|
|
break;
|
|
|
|
case RESP_NO:
|
|
|
|
if (sts->ret_val == DRV_OK) /* Don't override cancelation. */
|
|
|
|
sts->ret_val = DRV_MSG_BAD;
|
|
|
|
break;
|
|
|
|
}
|
2011-03-20 17:23:09 +00:00
|
|
|
imap_refcounted_done( sts );
|
2004-03-27 16:07:20 +00:00
|
|
|
}
|
|
|
|
|
2011-04-03 16:21:46 +00:00
|
|
|
/******************* imap_close *******************/
|
|
|
|
|
2012-07-29 21:14:48 +00:00
|
|
|
static void
|
2012-08-25 18:30:04 +00:00
|
|
|
imap_close( store_t *gctx,
|
2012-07-29 21:14:48 +00:00
|
|
|
void (*cb)( int sts, void *aux ), void *aux )
|
2004-03-27 16:07:20 +00:00
|
|
|
{
|
2012-08-25 18:30:04 +00:00
|
|
|
imap_store_t *ctx = (imap_store_t *)gctx;
|
2011-04-03 16:15:36 +00:00
|
|
|
|
2013-12-11 13:30:38 +00:00
|
|
|
if (ctx->gen.conf->trash && CAP(UIDPLUS)) {
|
2012-08-25 18:30:04 +00:00
|
|
|
struct imap_cmd_refcounted_state *sts = imap_refcounted_new_state( cb, aux );
|
|
|
|
message_t *msg, *fmsg, *nmsg;
|
|
|
|
int bl;
|
|
|
|
char buf[1000];
|
|
|
|
|
|
|
|
for (msg = ctx->gen.msgs; ; ) {
|
|
|
|
for (bl = 0; msg && bl < 960; msg = msg->next) {
|
|
|
|
if (!(msg->flags & F_DELETED))
|
|
|
|
continue;
|
|
|
|
if (bl)
|
|
|
|
buf[bl++] = ',';
|
|
|
|
bl += sprintf( buf + bl, "%d", msg->uid );
|
|
|
|
fmsg = msg;
|
|
|
|
for (; (nmsg = msg->next) && (nmsg->flags & F_DELETED); msg = nmsg) {}
|
|
|
|
if (msg != fmsg)
|
|
|
|
bl += sprintf( buf + bl, ":%d", msg->uid );
|
|
|
|
}
|
|
|
|
if (!bl)
|
|
|
|
break;
|
|
|
|
if (imap_exec( ctx, imap_refcounted_new_cmd( sts ), imap_refcounted_done_box,
|
|
|
|
"UID EXPUNGE %s", buf ) < 0)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
imap_refcounted_done( sts );
|
|
|
|
} else {
|
|
|
|
/* This is inherently racy: it may cause messages which other clients
|
|
|
|
* marked as deleted to be expunged without being trashed. */
|
|
|
|
struct imap_cmd_simple *cmd;
|
|
|
|
INIT_IMAP_CMD(imap_cmd_simple, cmd, cb, aux)
|
|
|
|
imap_exec( ctx, &cmd->gen, imap_done_simple_box, "CLOSE" );
|
|
|
|
}
|
2004-03-27 16:07:20 +00:00
|
|
|
}
|
|
|
|
|
2011-04-03 16:21:46 +00:00
|
|
|
/******************* imap_trash_msg *******************/
|
|
|
|
|
2012-07-29 21:14:48 +00:00
|
|
|
static void
|
2006-03-21 20:03:21 +00:00
|
|
|
imap_trash_msg( store_t *gctx, message_t *msg,
|
2012-07-29 21:14:48 +00:00
|
|
|
void (*cb)( int sts, void *aux ), void *aux )
|
2004-03-27 16:07:20 +00:00
|
|
|
{
|
|
|
|
imap_store_t *ctx = (imap_store_t *)gctx;
|
2011-04-03 16:15:36 +00:00
|
|
|
struct imap_cmd_simple *cmd;
|
2013-08-03 13:10:57 +00:00
|
|
|
char *buf;
|
2011-04-03 16:15:36 +00:00
|
|
|
|
|
|
|
INIT_IMAP_CMD(imap_cmd_simple, cmd, cb, aux)
|
|
|
|
cmd->gen.param.create = 1;
|
|
|
|
cmd->gen.param.to_trash = 1;
|
2013-08-03 13:10:57 +00:00
|
|
|
if (prepare_trash( &buf, ctx ) < 0) {
|
2012-08-11 16:34:46 +00:00
|
|
|
cb( DRV_BOX_BAD, aux );
|
|
|
|
return;
|
|
|
|
}
|
2011-04-03 16:15:36 +00:00
|
|
|
imap_exec( ctx, &cmd->gen, imap_done_simple_msg,
|
2013-12-08 14:11:00 +00:00
|
|
|
CAP(MOVE) ? "UID MOVE %d \"%\\s\"" : "UID COPY %d \"%\\s\"", msg->uid, buf );
|
2013-08-03 13:10:57 +00:00
|
|
|
free( buf );
|
2004-03-27 16:07:20 +00:00
|
|
|
}
|
|
|
|
|
2011-04-03 16:21:46 +00:00
|
|
|
/******************* imap_store_msg *******************/
|
|
|
|
|
2011-04-03 16:15:36 +00:00
|
|
|
static void imap_store_msg_p2( imap_store_t *, struct imap_cmd *, int );
|
|
|
|
|
2013-11-09 12:53:13 +00:00
|
|
|
static size_t
|
|
|
|
my_strftime( char *s, size_t max, const char *fmt, const struct tm *tm )
|
|
|
|
{
|
|
|
|
return strftime( s, max, fmt, tm );
|
|
|
|
}
|
|
|
|
|
2012-07-29 21:14:48 +00:00
|
|
|
static void
|
2006-03-21 20:03:21 +00:00
|
|
|
imap_store_msg( store_t *gctx, msg_data_t *data, int to_trash,
|
2012-07-29 21:14:48 +00:00
|
|
|
void (*cb)( int sts, int uid, void *aux ), void *aux )
|
2004-03-27 16:07:20 +00:00
|
|
|
{
|
|
|
|
imap_store_t *ctx = (imap_store_t *)gctx;
|
2011-04-03 16:15:36 +00:00
|
|
|
struct imap_cmd_out_uid *cmd;
|
2013-08-03 13:10:57 +00:00
|
|
|
char *buf;
|
2011-04-03 16:15:36 +00:00
|
|
|
int d;
|
2013-08-03 13:10:57 +00:00
|
|
|
char flagstr[128], datestr[64];
|
2004-03-27 16:07:20 +00:00
|
|
|
|
|
|
|
d = 0;
|
|
|
|
if (data->flags) {
|
|
|
|
d = imap_make_flags( data->flags, flagstr );
|
|
|
|
flagstr[d++] = ' ';
|
|
|
|
}
|
|
|
|
flagstr[d] = 0;
|
|
|
|
|
2011-04-03 16:15:36 +00:00
|
|
|
INIT_IMAP_CMD(imap_cmd_out_uid, cmd, cb, aux)
|
|
|
|
cmd->gen.param.data_len = data->len;
|
|
|
|
cmd->gen.param.data = data->data;
|
|
|
|
cmd->out_uid = -2;
|
2006-03-21 20:03:21 +00:00
|
|
|
|
|
|
|
if (to_trash) {
|
2011-04-03 16:15:36 +00:00
|
|
|
cmd->gen.param.create = 1;
|
|
|
|
cmd->gen.param.to_trash = 1;
|
2013-08-03 13:10:57 +00:00
|
|
|
if (prepare_trash( &buf, ctx ) < 0) {
|
2012-08-11 16:34:46 +00:00
|
|
|
cb( DRV_BOX_BAD, -1, aux );
|
|
|
|
return;
|
|
|
|
}
|
2004-03-27 16:07:20 +00:00
|
|
|
} else {
|
2013-08-03 13:10:57 +00:00
|
|
|
if (prepare_box( &buf, ctx ) < 0) {
|
2012-08-11 16:34:46 +00:00
|
|
|
cb( DRV_BOX_BAD, -1, aux );
|
|
|
|
return;
|
|
|
|
}
|
2004-03-27 16:07:20 +00:00
|
|
|
}
|
2013-07-28 13:55:13 +00:00
|
|
|
if (data->date) {
|
|
|
|
/* configure ensures that %z actually works. */
|
2013-11-09 12:53:13 +00:00
|
|
|
my_strftime( datestr, sizeof(datestr), "%d-%b-%Y %H:%M:%S %z", localtime( &data->date ) );
|
2013-07-28 13:55:13 +00:00
|
|
|
imap_exec( ctx, &cmd->gen, imap_store_msg_p2,
|
2013-09-25 18:55:32 +00:00
|
|
|
"APPEND \"%\\s\" %s\"%\\s\" ", buf, flagstr, datestr );
|
2013-07-28 13:55:13 +00:00
|
|
|
} else {
|
|
|
|
imap_exec( ctx, &cmd->gen, imap_store_msg_p2,
|
2013-09-25 18:55:32 +00:00
|
|
|
"APPEND \"%\\s\" %s", buf, flagstr );
|
2013-07-28 13:55:13 +00:00
|
|
|
}
|
2013-08-03 13:10:57 +00:00
|
|
|
free( buf );
|
2011-04-03 16:15:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
imap_store_msg_p2( imap_store_t *ctx ATTR_UNUSED, struct imap_cmd *cmd, int response )
|
|
|
|
{
|
|
|
|
struct imap_cmd_out_uid *cmdp = (struct imap_cmd_out_uid *)cmd;
|
|
|
|
|
|
|
|
transform_msg_response( &response );
|
|
|
|
cmdp->callback( response, cmdp->out_uid, cmdp->callback_aux );
|
2006-02-03 21:33:43 +00:00
|
|
|
}
|
|
|
|
|
2011-04-10 11:06:07 +00:00
|
|
|
/******************* imap_find_new_msgs *******************/
|
2011-04-03 16:15:36 +00:00
|
|
|
|
2013-07-27 16:46:57 +00:00
|
|
|
static void imap_find_new_msgs_p2( imap_store_t *, struct imap_cmd *, int );
|
|
|
|
|
2012-07-29 21:14:48 +00:00
|
|
|
static void
|
2011-04-10 11:06:07 +00:00
|
|
|
imap_find_new_msgs( store_t *gctx,
|
|
|
|
void (*cb)( int sts, void *aux ), void *aux )
|
2006-02-03 21:33:43 +00:00
|
|
|
{
|
|
|
|
imap_store_t *ctx = (imap_store_t *)gctx;
|
2011-04-10 11:06:07 +00:00
|
|
|
struct imap_cmd_simple *cmd;
|
2011-04-03 16:15:36 +00:00
|
|
|
|
2011-04-10 11:06:07 +00:00
|
|
|
INIT_IMAP_CMD(imap_cmd_simple, cmd, cb, aux)
|
2013-07-27 16:46:57 +00:00
|
|
|
imap_exec( (imap_store_t *)ctx, &cmd->gen, imap_find_new_msgs_p2, "CHECK" );
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
imap_find_new_msgs_p2( imap_store_t *ctx, struct imap_cmd *gcmd, int response )
|
|
|
|
{
|
|
|
|
struct imap_cmd_simple *cmdp = (struct imap_cmd_simple *)gcmd, *cmd;
|
|
|
|
|
|
|
|
if (response != RESP_OK) {
|
|
|
|
imap_done_simple_box( ctx, gcmd, response );
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
INIT_IMAP_CMD(imap_cmd_simple, cmd, cmdp->callback, cmdp->callback_aux)
|
2011-04-10 11:06:07 +00:00
|
|
|
imap_exec( (imap_store_t *)ctx, &cmd->gen, imap_done_simple_box,
|
|
|
|
"UID FETCH %d:1000000000 (UID BODY.PEEK[HEADER.FIELDS (X-TUID)])", ctx->gen.uidnext );
|
2004-03-27 16:07:20 +00:00
|
|
|
}
|
|
|
|
|
2011-04-03 16:21:46 +00:00
|
|
|
/******************* imap_list *******************/
|
|
|
|
|
2006-03-21 20:03:21 +00:00
|
|
|
static void
|
2012-08-11 16:34:46 +00:00
|
|
|
imap_list( store_t *gctx, int flags,
|
2006-03-21 20:03:21 +00:00
|
|
|
void (*cb)( int sts, void *aux ), void *aux )
|
2004-03-27 16:07:20 +00:00
|
|
|
{
|
|
|
|
imap_store_t *ctx = (imap_store_t *)gctx;
|
2012-08-11 16:34:46 +00:00
|
|
|
struct imap_cmd_refcounted_state *sts = imap_refcounted_new_state( cb, aux );
|
|
|
|
|
|
|
|
if (((flags & LIST_PATH) &&
|
|
|
|
imap_exec( ctx, imap_refcounted_new_cmd( sts ), imap_refcounted_done_box,
|
2013-09-25 18:55:32 +00:00
|
|
|
"LIST \"\" \"%\\s*\"", ctx->prefix ) < 0) ||
|
2012-08-11 16:34:46 +00:00
|
|
|
((flags & LIST_INBOX) && (!(flags & LIST_PATH) || *ctx->prefix) &&
|
|
|
|
imap_exec( ctx, imap_refcounted_new_cmd( sts ), imap_refcounted_done_box,
|
|
|
|
"LIST \"\" INBOX*" ) < 0))
|
|
|
|
{}
|
|
|
|
imap_refcounted_done( sts );
|
2004-03-27 16:07:20 +00:00
|
|
|
}
|
|
|
|
|
2011-04-03 16:21:46 +00:00
|
|
|
/******************* imap_cancel *******************/
|
|
|
|
|
2006-03-21 20:03:21 +00:00
|
|
|
static void
|
|
|
|
imap_cancel( store_t *gctx,
|
2012-07-22 15:32:32 +00:00
|
|
|
void (*cb)( void *aux ), void *aux )
|
2006-03-21 20:03:21 +00:00
|
|
|
{
|
2012-08-25 16:26:23 +00:00
|
|
|
imap_store_t *ctx = (imap_store_t *)gctx;
|
|
|
|
|
|
|
|
cancel_pending_imap_cmds( ctx );
|
|
|
|
if (ctx->in_progress) {
|
|
|
|
ctx->canceling = 1;
|
|
|
|
ctx->callbacks.imap_cancel = cb;
|
|
|
|
ctx->callback_aux = aux;
|
|
|
|
} else {
|
|
|
|
cb( aux );
|
|
|
|
}
|
2006-03-21 20:03:21 +00:00
|
|
|
}
|
|
|
|
|
2011-04-03 16:21:46 +00:00
|
|
|
/******************* imap_commit *******************/
|
|
|
|
|
2006-03-21 20:03:21 +00:00
|
|
|
static void
|
|
|
|
imap_commit( store_t *gctx )
|
2004-03-27 16:07:20 +00:00
|
|
|
{
|
2006-03-21 20:03:21 +00:00
|
|
|
(void)gctx;
|
2004-03-27 16:07:20 +00:00
|
|
|
}
|
|
|
|
|
2011-04-03 16:21:46 +00:00
|
|
|
/******************* imap_parse_store *******************/
|
|
|
|
|
2004-03-27 16:07:20 +00:00
|
|
|
imap_server_conf_t *servers, **serverapp = &servers;
|
|
|
|
|
|
|
|
static int
|
2012-09-15 09:46:42 +00:00
|
|
|
imap_parse_store( conffile_t *cfg, store_conf_t **storep )
|
2004-03-27 16:07:20 +00:00
|
|
|
{
|
|
|
|
imap_store_conf_t *store;
|
|
|
|
imap_server_conf_t *server, *srv, sserver;
|
2014-07-05 21:02:30 +00:00
|
|
|
const char *type, *name;
|
2006-03-19 10:44:53 +00:00
|
|
|
int acc_opt = 0;
|
2004-03-27 16:07:20 +00:00
|
|
|
|
|
|
|
if (!strcasecmp( "IMAPAccount", cfg->cmd )) {
|
|
|
|
server = nfcalloc( sizeof(*server) );
|
|
|
|
server->name = nfstrdup( cfg->val );
|
|
|
|
*serverapp = server;
|
|
|
|
serverapp = &server->next;
|
|
|
|
store = 0;
|
2007-02-10 15:37:46 +00:00
|
|
|
*storep = 0;
|
2004-03-27 16:07:20 +00:00
|
|
|
} else if (!strcasecmp( "IMAPStore", cfg->cmd )) {
|
|
|
|
store = nfcalloc( sizeof(*store) );
|
|
|
|
store->gen.driver = &imap_driver;
|
|
|
|
store->gen.name = nfstrdup( cfg->val );
|
|
|
|
store->use_namespace = 1;
|
2006-03-19 10:44:53 +00:00
|
|
|
*storep = &store->gen;
|
2004-03-27 16:07:20 +00:00
|
|
|
memset( &sserver, 0, sizeof(sserver) );
|
|
|
|
server = &sserver;
|
|
|
|
} else
|
|
|
|
return 0;
|
|
|
|
|
2011-03-27 10:06:41 +00:00
|
|
|
#ifdef HAVE_LIBSSL
|
2004-03-27 16:07:20 +00:00
|
|
|
/* this will probably annoy people, but its the best default just in
|
|
|
|
* case people forget to turn it on
|
|
|
|
*/
|
|
|
|
server->require_ssl = 1;
|
2011-01-23 12:43:00 +00:00
|
|
|
server->sconf.use_tlsv1 = 1;
|
2004-03-27 16:07:20 +00:00
|
|
|
#endif
|
2012-08-25 16:26:23 +00:00
|
|
|
server->max_in_progress = INT_MAX;
|
2004-03-27 16:07:20 +00:00
|
|
|
|
|
|
|
while (getcline( cfg ) && cfg->cmd) {
|
2006-03-19 10:44:53 +00:00
|
|
|
if (!strcasecmp( "Host", cfg->cmd )) {
|
2006-05-28 15:43:58 +00:00
|
|
|
/* The imap[s]: syntax is just a backwards compat hack. */
|
2011-03-27 10:06:41 +00:00
|
|
|
#ifdef HAVE_LIBSSL
|
2004-03-27 16:07:20 +00:00
|
|
|
if (!memcmp( "imaps:", cfg->val, 6 )) {
|
|
|
|
cfg->val += 6;
|
2011-01-23 12:43:00 +00:00
|
|
|
server->sconf.use_imaps = 1;
|
|
|
|
server->sconf.use_sslv2 = 1;
|
|
|
|
server->sconf.use_sslv3 = 1;
|
2004-03-27 16:07:20 +00:00
|
|
|
} else
|
|
|
|
#endif
|
|
|
|
{
|
|
|
|
if (!memcmp( "imap:", cfg->val, 5 ))
|
|
|
|
cfg->val += 5;
|
|
|
|
}
|
|
|
|
if (!memcmp( "//", cfg->val, 2 ))
|
|
|
|
cfg->val += 2;
|
2011-01-23 12:43:00 +00:00
|
|
|
server->sconf.host = nfstrdup( cfg->val );
|
2004-03-27 16:07:20 +00:00
|
|
|
}
|
|
|
|
else if (!strcasecmp( "User", cfg->cmd ))
|
|
|
|
server->user = nfstrdup( cfg->val );
|
|
|
|
else if (!strcasecmp( "Pass", cfg->cmd ))
|
|
|
|
server->pass = nfstrdup( cfg->val );
|
2013-07-27 08:37:15 +00:00
|
|
|
else if (!strcasecmp( "PassCmd", cfg->cmd ))
|
|
|
|
server->pass_cmd = nfstrdup( cfg->val );
|
2004-03-27 16:07:20 +00:00
|
|
|
else if (!strcasecmp( "Port", cfg->cmd ))
|
2011-01-23 12:43:00 +00:00
|
|
|
server->sconf.port = parse_int( cfg );
|
2011-03-27 14:58:23 +00:00
|
|
|
else if (!strcasecmp( "PipelineDepth", cfg->cmd )) {
|
|
|
|
if ((server->max_in_progress = parse_int( cfg )) < 1) {
|
|
|
|
error( "%s:%d: PipelineDepth must be at least 1\n", cfg->file, cfg->line );
|
2012-09-15 09:46:42 +00:00
|
|
|
cfg->err = 1;
|
2011-03-27 14:58:23 +00:00
|
|
|
}
|
|
|
|
}
|
2011-03-27 10:06:41 +00:00
|
|
|
#ifdef HAVE_LIBSSL
|
2006-03-19 10:44:53 +00:00
|
|
|
else if (!strcasecmp( "CertificateFile", cfg->cmd )) {
|
2011-01-23 12:43:00 +00:00
|
|
|
server->sconf.cert_file = expand_strdup( cfg->val );
|
|
|
|
if (access( server->sconf.cert_file, R_OK )) {
|
2011-04-10 13:32:25 +00:00
|
|
|
sys_error( "%s:%d: CertificateFile '%s'",
|
|
|
|
cfg->file, cfg->line, server->sconf.cert_file );
|
2012-09-15 09:46:42 +00:00
|
|
|
cfg->err = 1;
|
2006-03-19 10:44:53 +00:00
|
|
|
}
|
|
|
|
} else if (!strcasecmp( "RequireSSL", cfg->cmd ))
|
2004-03-27 16:07:20 +00:00
|
|
|
server->require_ssl = parse_bool( cfg );
|
2006-05-28 15:43:58 +00:00
|
|
|
else if (!strcasecmp( "UseIMAPS", cfg->cmd ))
|
2011-01-23 12:43:00 +00:00
|
|
|
server->sconf.use_imaps = parse_bool( cfg );
|
2004-03-27 16:07:20 +00:00
|
|
|
else if (!strcasecmp( "UseSSLv2", cfg->cmd ))
|
2011-01-23 12:43:00 +00:00
|
|
|
server->sconf.use_sslv2 = parse_bool( cfg );
|
2004-03-27 16:07:20 +00:00
|
|
|
else if (!strcasecmp( "UseSSLv3", cfg->cmd ))
|
2011-01-23 12:43:00 +00:00
|
|
|
server->sconf.use_sslv3 = parse_bool( cfg );
|
2004-03-27 16:07:20 +00:00
|
|
|
else if (!strcasecmp( "UseTLSv1", cfg->cmd ))
|
2011-01-23 12:43:00 +00:00
|
|
|
server->sconf.use_tlsv1 = parse_bool( cfg );
|
2013-02-03 16:47:05 +00:00
|
|
|
else if (!strcasecmp( "UseTLSv1.1", cfg->cmd ))
|
|
|
|
server->sconf.use_tlsv11 = parse_bool( cfg );
|
|
|
|
else if (!strcasecmp( "UseTLSv1.2", cfg->cmd ))
|
|
|
|
server->sconf.use_tlsv12 = parse_bool( cfg );
|
2004-03-27 16:07:20 +00:00
|
|
|
else if (!strcasecmp( "RequireCRAM", cfg->cmd ))
|
|
|
|
server->require_cram = parse_bool( cfg );
|
|
|
|
#endif
|
|
|
|
else if (!strcasecmp( "Tunnel", cfg->cmd ))
|
2011-01-23 12:43:00 +00:00
|
|
|
server->sconf.tunnel = nfstrdup( cfg->val );
|
2004-03-27 16:07:20 +00:00
|
|
|
else if (store) {
|
2006-03-19 10:44:53 +00:00
|
|
|
if (!strcasecmp( "Account", cfg->cmd )) {
|
|
|
|
for (srv = servers; srv; srv = srv->next)
|
|
|
|
if (srv->name && !strcmp( srv->name, cfg->val ))
|
|
|
|
goto gotsrv;
|
2006-03-19 11:29:12 +00:00
|
|
|
error( "%s:%d: unknown IMAP account '%s'\n", cfg->file, cfg->line, cfg->val );
|
2012-09-15 09:46:42 +00:00
|
|
|
cfg->err = 1;
|
2006-03-19 10:44:53 +00:00
|
|
|
continue;
|
|
|
|
gotsrv:
|
|
|
|
store->server = srv;
|
|
|
|
} else if (!strcasecmp( "UseNamespace", cfg->cmd ))
|
2004-03-27 16:07:20 +00:00
|
|
|
store->use_namespace = parse_bool( cfg );
|
|
|
|
else if (!strcasecmp( "Path", cfg->cmd ))
|
|
|
|
store->gen.path = nfstrdup( cfg->val );
|
2012-08-11 16:34:46 +00:00
|
|
|
else if (!strcasecmp( "PathDelimiter", cfg->cmd ))
|
2013-08-03 13:10:57 +00:00
|
|
|
store->delimiter = nfstrdup( cfg->val );
|
2004-03-27 16:07:20 +00:00
|
|
|
else
|
2012-09-15 09:46:42 +00:00
|
|
|
parse_generic_store( &store->gen, cfg );
|
2006-03-19 10:44:53 +00:00
|
|
|
continue;
|
2004-03-27 16:07:20 +00:00
|
|
|
} else {
|
2006-03-19 11:29:12 +00:00
|
|
|
error( "%s:%d: unknown/misplaced keyword '%s'\n", cfg->file, cfg->line, cfg->cmd );
|
2012-09-15 09:46:42 +00:00
|
|
|
cfg->err = 1;
|
2006-03-19 10:44:53 +00:00
|
|
|
continue;
|
2004-03-27 16:07:20 +00:00
|
|
|
}
|
2006-03-19 10:44:53 +00:00
|
|
|
acc_opt = 1;
|
2004-03-27 16:07:20 +00:00
|
|
|
}
|
2014-07-05 21:02:30 +00:00
|
|
|
if (store)
|
|
|
|
type = "IMAP store", name = store->gen.name;
|
|
|
|
else
|
|
|
|
type = "IMAP account", name = server->name;
|
2004-03-27 16:07:20 +00:00
|
|
|
if (!store || !store->server) {
|
2011-01-23 12:43:00 +00:00
|
|
|
if (!server->sconf.tunnel && !server->sconf.host) {
|
2014-07-05 21:03:42 +00:00
|
|
|
error( "%s '%s' has neither Tunnel nor Host\n", type, name );
|
2012-09-15 09:46:42 +00:00
|
|
|
cfg->err = 1;
|
2004-03-27 16:07:20 +00:00
|
|
|
return 1;
|
|
|
|
}
|
2013-07-27 08:37:15 +00:00
|
|
|
if (server->pass && server->pass_cmd) {
|
2014-07-05 21:02:30 +00:00
|
|
|
error( "%s '%s' has both Pass and PassCmd\n", type, name );
|
2013-07-27 08:37:15 +00:00
|
|
|
cfg->err = 1;
|
|
|
|
return 1;
|
|
|
|
}
|
2014-07-05 21:10:09 +00:00
|
|
|
#ifdef HAVE_LIBSSL
|
|
|
|
server->use_ssl =
|
|
|
|
server->sconf.use_sslv2 | server->sconf.use_sslv3 |
|
|
|
|
server->sconf.use_tlsv1 | server->sconf.use_tlsv11 | server->sconf.use_tlsv12;
|
2014-07-05 21:11:45 +00:00
|
|
|
if (server->require_ssl && !server->use_ssl) {
|
|
|
|
error( "%s '%s' requires SSL but no SSL versions enabled\n", type, name );
|
|
|
|
cfg->err = 1;
|
|
|
|
return 1;
|
|
|
|
}
|
2014-07-05 21:10:09 +00:00
|
|
|
#endif
|
2004-03-27 16:07:20 +00:00
|
|
|
}
|
2006-03-19 10:44:53 +00:00
|
|
|
if (store) {
|
|
|
|
if (!store->server) {
|
|
|
|
store->server = nfmalloc( sizeof(sserver) );
|
|
|
|
memcpy( store->server, &sserver, sizeof(sserver) );
|
2008-04-13 09:56:44 +00:00
|
|
|
store->server->name = store->gen.name;
|
2006-03-19 10:44:53 +00:00
|
|
|
} else if (acc_opt) {
|
2014-07-05 21:02:30 +00:00
|
|
|
error( "%s '%s' has both Account and account-specific options\n", type, name );
|
2012-09-15 09:46:42 +00:00
|
|
|
cfg->err = 1;
|
2006-03-19 10:44:53 +00:00
|
|
|
}
|
2004-03-27 16:07:20 +00:00
|
|
|
}
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
struct driver imap_driver = {
|
2013-12-08 15:37:20 +00:00
|
|
|
DRV_CRLF | DRV_VERBOSE,
|
2004-03-27 16:07:20 +00:00
|
|
|
imap_parse_store,
|
2006-03-20 19:38:20 +00:00
|
|
|
imap_cleanup,
|
2004-03-27 16:07:20 +00:00
|
|
|
imap_open_store,
|
2006-03-20 19:38:20 +00:00
|
|
|
imap_disown_store,
|
|
|
|
imap_cancel_store,
|
2004-03-27 16:07:20 +00:00
|
|
|
imap_list,
|
2006-01-29 11:22:45 +00:00
|
|
|
imap_prepare_opts,
|
2004-03-27 16:07:20 +00:00
|
|
|
imap_select,
|
2011-07-23 14:06:32 +00:00
|
|
|
imap_load,
|
2004-03-27 16:07:20 +00:00
|
|
|
imap_fetch_msg,
|
|
|
|
imap_store_msg,
|
2011-04-10 11:06:07 +00:00
|
|
|
imap_find_new_msgs,
|
2004-03-27 16:07:20 +00:00
|
|
|
imap_set_flags,
|
|
|
|
imap_trash_msg,
|
2006-03-21 20:03:21 +00:00
|
|
|
imap_close,
|
|
|
|
imap_cancel,
|
|
|
|
imap_commit,
|
2004-03-27 16:07:20 +00:00
|
|
|
};
|