fully asynchronous IMAP operation
- asynchronous sockets using an event loop - connect & starttls have completion callback parameters - callbacks for notification about filled input buffer and emptied output buffer - unsent imap command queue - used when - socket output buffer is non-empty - number of commands in flight exceeds limit - last sent command requires round-trip - command has a dependency on completion of previous command - trashnc is tri-state so only a single "scout" trash APPEND/COPY is sent at first. a possibly resulting CREATE is injected in front of the remaining trash commands, so they can succeed (or be cancel()d if it fails). - queue's presence necessitates imap_cancel implementation
This commit is contained in:
parent
7867eb9009
commit
bd93d689db
|
@ -9,7 +9,7 @@ if test "$GCC" = yes; then
|
|||
CFLAGS="$CFLAGS -pipe -W -Wall -Wshadow -Wstrict-prototypes"
|
||||
fi
|
||||
|
||||
AC_CHECK_HEADERS(sys/filio.h sys/poll.h sys/select.h)
|
||||
AC_CHECK_HEADERS(sys/poll.h sys/select.h)
|
||||
AC_CHECK_FUNCS(vasprintf)
|
||||
|
||||
AC_CHECK_LIB(socket, socket, [SOCK_LIBS="-lsocket"])
|
||||
|
|
285
src/drv_imap.c
285
src/drv_imap.c
|
@ -81,7 +81,8 @@ typedef struct imap_store {
|
|||
const char *prefix;
|
||||
int ref_count;
|
||||
int uidnext; /* from SELECT responses */
|
||||
unsigned trashnc:1; /* trash folder's existence is not confirmed yet */
|
||||
/* trash folder's existence is not confirmed yet */
|
||||
enum { TrashUnknown, TrashChecking, TrashKnown } trashnc;
|
||||
unsigned got_namespace:1;
|
||||
list_t *ns_personal, *ns_other, *ns_shared; /* NAMESPACE info */
|
||||
message_t **msgapp; /* FETCH results */
|
||||
|
@ -89,12 +90,15 @@ typedef struct imap_store {
|
|||
parse_list_state_t parse_list_sts;
|
||||
/* command queue */
|
||||
int nexttag, num_in_progress, literal_pending;
|
||||
struct imap_cmd *pending, **pending_append;
|
||||
struct imap_cmd *in_progress, **in_progress_append;
|
||||
|
||||
/* Used during sequential operations like connect */
|
||||
enum { GreetingPending = 0, GreetingBad, GreetingOk, GreetingPreauth } greeting;
|
||||
int canceling; /* imap_cancel() is in progress */
|
||||
union {
|
||||
void (*imap_open)( store_t *srv, void *aux );
|
||||
void (*imap_cancel)( void *aux );
|
||||
} callbacks;
|
||||
void *callback_aux;
|
||||
|
||||
|
@ -115,6 +119,7 @@ struct imap_cmd {
|
|||
int data_len;
|
||||
int uid; /* to identify fetch responses */
|
||||
unsigned
|
||||
high_prio:1, /* if command is queued, put it at the front of the queue. */
|
||||
to_trash:1, /* we are storing to trash, not current. */
|
||||
create:1, /* create the mailbox if we get an error ... */
|
||||
trycreate:1; /* ... but only if this is true or the server says so. */
|
||||
|
@ -179,8 +184,6 @@ static const char *cap_list[] = {
|
|||
#define RESP_NO 1
|
||||
#define RESP_CANCEL 2
|
||||
|
||||
static int get_cmd_result( imap_store_t *ctx, struct imap_cmd *tcmd );
|
||||
|
||||
static INLINE void imap_ref( imap_store_t *ctx ) { ++ctx->ref_count; }
|
||||
static int imap_deref( imap_store_t *ctx );
|
||||
|
||||
|
@ -221,30 +224,18 @@ done_imap_cmd( imap_store_t *ctx, struct imap_cmd *cmd, int response )
|
|||
free( cmd );
|
||||
}
|
||||
|
||||
static struct imap_cmd *
|
||||
v_submit_imap_cmd( imap_store_t *ctx, struct imap_cmd *cmd,
|
||||
const char *fmt, va_list ap )
|
||||
static int
|
||||
send_imap_cmd( imap_store_t *ctx, struct imap_cmd *cmd )
|
||||
{
|
||||
int bufl, litplus;
|
||||
const char *buffmt;
|
||||
char buf[1024];
|
||||
|
||||
assert( ctx );
|
||||
assert( ctx->gen.bad_callback );
|
||||
assert( cmd );
|
||||
assert( cmd->param.done );
|
||||
|
||||
while (ctx->literal_pending)
|
||||
if (get_cmd_result( ctx, 0 ) == RESP_CANCEL)
|
||||
goto bail;
|
||||
|
||||
cmd->tag = ++ctx->nexttag;
|
||||
if (fmt)
|
||||
nfvasprintf( &cmd->cmd, fmt, ap );
|
||||
if (!cmd->param.data) {
|
||||
buffmt = "%d %s\r\n";
|
||||
litplus = 0;
|
||||
} else if ((cmd->param.to_trash && ctx->trashnc) || !CAP(LITERALPLUS)) {
|
||||
} else if ((cmd->param.to_trash && ctx->trashnc == TrashUnknown) || !CAP(LITERALPLUS)) {
|
||||
buffmt = "%d %s{%d}\r\n";
|
||||
litplus = 0;
|
||||
} else {
|
||||
|
@ -272,27 +263,52 @@ v_submit_imap_cmd( imap_store_t *ctx, struct imap_cmd *cmd,
|
|||
} else if (cmd->param.cont || cmd->param.data) {
|
||||
ctx->literal_pending = 1;
|
||||
}
|
||||
if (cmd->param.to_trash && ctx->trashnc == TrashUnknown)
|
||||
ctx->trashnc = TrashChecking;
|
||||
cmd->next = 0;
|
||||
*ctx->in_progress_append = cmd;
|
||||
ctx->in_progress_append = &cmd->next;
|
||||
ctx->num_in_progress++;
|
||||
return cmd;
|
||||
return 0;
|
||||
|
||||
bail:
|
||||
done_imap_cmd( ctx, cmd, RESP_CANCEL );
|
||||
return NULL;
|
||||
return -1;
|
||||
}
|
||||
|
||||
static struct imap_cmd *
|
||||
submit_imap_cmd( imap_store_t *ctx, struct imap_cmd *cmd, const char *fmt, ... )
|
||||
static int
|
||||
cmd_submittable( imap_store_t *ctx, struct imap_cmd *cmd )
|
||||
{
|
||||
struct imap_cmd *ret;
|
||||
va_list ap;
|
||||
return !ctx->conn.write_buf &&
|
||||
!ctx->literal_pending &&
|
||||
!(cmd->param.to_trash && ctx->trashnc == TrashChecking) &&
|
||||
ctx->num_in_progress < ((imap_store_conf_t *)ctx->gen.conf)->server->max_in_progress;
|
||||
}
|
||||
|
||||
va_start( ap, fmt );
|
||||
ret = v_submit_imap_cmd( ctx, cmd, fmt, ap );
|
||||
va_end( ap );
|
||||
return ret;
|
||||
static int
|
||||
flush_imap_cmds( imap_store_t *ctx )
|
||||
{
|
||||
struct imap_cmd *cmd;
|
||||
|
||||
while ((cmd = ctx->pending) && cmd_submittable( ctx, cmd )) {
|
||||
if (!(ctx->pending = cmd->next))
|
||||
ctx->pending_append = &ctx->pending;
|
||||
if (send_imap_cmd( ctx, cmd ) < 0)
|
||||
return -1;
|
||||
}
|
||||
return 0;
|
||||
}
|
||||
|
||||
static void
|
||||
cancel_pending_imap_cmds( imap_store_t *ctx )
|
||||
{
|
||||
struct imap_cmd *cmd;
|
||||
|
||||
while ((cmd = ctx->pending)) {
|
||||
if (!(ctx->pending = cmd->next))
|
||||
ctx->pending_append = &ctx->pending;
|
||||
done_imap_cmd( ctx, cmd, RESP_CANCEL );
|
||||
}
|
||||
}
|
||||
|
||||
static void
|
||||
|
@ -307,6 +323,29 @@ cancel_submitted_imap_cmds( imap_store_t *ctx )
|
|||
}
|
||||
}
|
||||
|
||||
static int
|
||||
submit_imap_cmd( imap_store_t *ctx, struct imap_cmd *cmd )
|
||||
{
|
||||
assert( ctx );
|
||||
assert( ctx->gen.bad_callback );
|
||||
assert( cmd );
|
||||
assert( cmd->param.done );
|
||||
|
||||
if ((ctx->pending && !cmd->param.high_prio) || !cmd_submittable( ctx, cmd )) {
|
||||
if (ctx->pending && cmd->param.high_prio) {
|
||||
cmd->next = ctx->pending;
|
||||
ctx->pending = cmd;
|
||||
} else {
|
||||
cmd->next = 0;
|
||||
*ctx->pending_append = cmd;
|
||||
ctx->pending_append = &cmd->next;
|
||||
}
|
||||
return 0;
|
||||
}
|
||||
|
||||
return send_imap_cmd( ctx, cmd );
|
||||
}
|
||||
|
||||
static int
|
||||
imap_exec( imap_store_t *ctx, struct imap_cmd *cmdp,
|
||||
void (*done)( imap_store_t *ctx, struct imap_cmd *cmd, int response ),
|
||||
|
@ -318,12 +357,9 @@ imap_exec( imap_store_t *ctx, struct imap_cmd *cmdp,
|
|||
cmdp = new_imap_cmd( sizeof(*cmdp) );
|
||||
cmdp->param.done = done;
|
||||
va_start( ap, fmt );
|
||||
cmdp = v_submit_imap_cmd( ctx, cmdp, fmt, ap );
|
||||
nfvasprintf( &cmdp->cmd, fmt, ap );
|
||||
va_end( ap );
|
||||
if (!cmdp)
|
||||
return RESP_CANCEL;
|
||||
|
||||
return get_cmd_result( ctx, cmdp );
|
||||
return submit_imap_cmd( ctx, cmdp );
|
||||
}
|
||||
|
||||
static void
|
||||
|
@ -393,25 +429,6 @@ imap_refcounted_done( struct imap_cmd_refcounted_state *sts )
|
|||
free( sts );
|
||||
}
|
||||
|
||||
/*
|
||||
static void
|
||||
drain_imap_replies( imap_store_t *ctx )
|
||||
{
|
||||
while (ctx->num_in_progress)
|
||||
get_cmd_result( ctx, 0 );
|
||||
}
|
||||
*/
|
||||
|
||||
static int
|
||||
process_imap_replies( imap_store_t *ctx )
|
||||
{
|
||||
while (ctx->num_in_progress > ((imap_store_conf_t *)ctx->gen.conf)->server->max_in_progress ||
|
||||
socket_pending( &ctx->conn ))
|
||||
if (get_cmd_result( ctx, 0 ) == RESP_CANCEL)
|
||||
return RESP_CANCEL;
|
||||
return RESP_OK;
|
||||
}
|
||||
|
||||
static int
|
||||
is_atom( list_t *list )
|
||||
{
|
||||
|
@ -798,20 +815,22 @@ struct imap_cmd_trycreate {
|
|||
static void imap_open_store_greeted( imap_store_t * );
|
||||
static void get_cmd_result_p2( imap_store_t *, struct imap_cmd *, int );
|
||||
|
||||
static int
|
||||
get_cmd_result( imap_store_t *ctx, struct imap_cmd *tcmd )
|
||||
static void
|
||||
imap_socket_read( void *aux )
|
||||
{
|
||||
imap_store_t *ctx = (imap_store_t *)aux;
|
||||
struct imap_cmd *cmdp, **pcmdp;
|
||||
char *cmd, *arg, *arg1, *p;
|
||||
int resp, resp2, tag, greeted;
|
||||
|
||||
greeted = ctx->greeting;
|
||||
for (;;) {
|
||||
if (!(cmd = socket_read_line( &ctx->conn ))) {
|
||||
if (socket_fill( &ctx->conn ) < 0)
|
||||
return RESP_CANCEL;
|
||||
continue;
|
||||
if (ctx->parse_list_sts.level) {
|
||||
cmd = 0;
|
||||
goto do_fetch;
|
||||
}
|
||||
for (;;) {
|
||||
if (!(cmd = socket_read_line( &ctx->conn )))
|
||||
return;
|
||||
|
||||
arg = next_arg( &cmd );
|
||||
if (*arg == '*') {
|
||||
|
@ -850,11 +869,8 @@ get_cmd_result( imap_store_t *ctx, struct imap_cmd *tcmd )
|
|||
do_fetch:
|
||||
if ((resp = parse_imap_list( ctx, &cmd, &ctx->parse_list_sts )) == LIST_BAD)
|
||||
break; /* stream is likely to be useless now */
|
||||
if (resp == LIST_PARTIAL) {
|
||||
if (socket_fill( &ctx->conn ) < 0)
|
||||
return RESP_CANCEL;
|
||||
goto do_fetch;
|
||||
}
|
||||
if (resp == LIST_PARTIAL)
|
||||
return;
|
||||
if (parse_fetch( ctx, ctx->parse_list_sts.head ) < 0)
|
||||
break; /* this may mean anything, so prefer not to spam the log */
|
||||
}
|
||||
|
@ -865,8 +881,10 @@ get_cmd_result( imap_store_t *ctx, struct imap_cmd *tcmd )
|
|||
if (greeted == GreetingPending) {
|
||||
imap_ref( ctx );
|
||||
imap_open_store_greeted( ctx );
|
||||
return imap_deref( ctx ) ? RESP_CANCEL : RESP_OK;
|
||||
if (imap_deref( ctx ))
|
||||
return;
|
||||
}
|
||||
continue;
|
||||
} else if (!ctx->in_progress) {
|
||||
error( "IMAP error: unexpected reply: %s %s\n", arg, cmd ? cmd : "" );
|
||||
break; /* this may mean anything, so prefer not to spam the log */
|
||||
|
@ -876,24 +894,22 @@ get_cmd_result( imap_store_t *ctx, struct imap_cmd *tcmd )
|
|||
cmdp = ctx->in_progress;
|
||||
if (cmdp->param.data) {
|
||||
if (cmdp->param.to_trash)
|
||||
ctx->trashnc = 0; /* Can't get NO [TRYCREATE] any more. */
|
||||
ctx->trashnc = TrashKnown; /* Can't get NO [TRYCREATE] any more. */
|
||||
p = cmdp->param.data;
|
||||
cmdp->param.data = 0;
|
||||
if (socket_write( &ctx->conn, p, cmdp->param.data_len, GiveOwn ) < 0)
|
||||
return RESP_CANCEL;
|
||||
return;
|
||||
} else if (cmdp->param.cont) {
|
||||
if (cmdp->param.cont( ctx, cmdp, cmd ))
|
||||
return RESP_CANCEL;
|
||||
return;
|
||||
} else {
|
||||
error( "IMAP error: unexpected command continuation request\n" );
|
||||
break;
|
||||
}
|
||||
if (socket_write( &ctx->conn, "\r\n", 2, KeepOwn ) < 0)
|
||||
return RESP_CANCEL;
|
||||
return;
|
||||
if (!cmdp->param.cont)
|
||||
ctx->literal_pending = 0;
|
||||
if (!tcmd)
|
||||
return RESP_OK;
|
||||
} else {
|
||||
tag = atoi( arg );
|
||||
for (pcmdp = &ctx->in_progress; (cmdp = *pcmdp); pcmdp = &cmdp->next)
|
||||
|
@ -910,7 +926,7 @@ get_cmd_result( imap_store_t *ctx, struct imap_cmd *tcmd )
|
|||
arg = next_arg( &cmd );
|
||||
if (!strcmp( "OK", arg )) {
|
||||
if (cmdp->param.to_trash)
|
||||
ctx->trashnc = 0; /* Can't get NO [TRYCREATE] any more. */
|
||||
ctx->trashnc = TrashKnown; /* Can't get NO [TRYCREATE] any more. */
|
||||
resp = RESP_OK;
|
||||
} else {
|
||||
if (!strcmp( "NO", arg )) {
|
||||
|
@ -921,10 +937,11 @@ get_cmd_result( imap_store_t *ctx, struct imap_cmd *tcmd )
|
|||
struct imap_cmd_trycreate *cmd2 =
|
||||
(struct imap_cmd_trycreate *)new_imap_cmd( sizeof(*cmd2) );
|
||||
cmd2->orig_cmd = cmdp;
|
||||
cmd2->gen.param.done = get_cmd_result_p2;
|
||||
cmd2->gen.param.high_prio = 1;
|
||||
p = strchr( cmdp->cmd, '"' );
|
||||
if (!submit_imap_cmd( ctx, &cmd2->gen, "CREATE %.*s", strchr( p + 1, '"' ) - p + 1, p ))
|
||||
return RESP_CANCEL;
|
||||
if (imap_exec( ctx, &cmd2->gen, get_cmd_result_p2,
|
||||
"CREATE %.*s", strchr( p + 1, '"' ) - p + 1, p ) < 0)
|
||||
return;
|
||||
continue;
|
||||
}
|
||||
resp = RESP_NO;
|
||||
|
@ -941,13 +958,17 @@ get_cmd_result( imap_store_t *ctx, struct imap_cmd *tcmd )
|
|||
imap_invoke_bad_callback( ctx );
|
||||
done_imap_cmd( ctx, cmdp, resp );
|
||||
if (imap_deref( ctx ))
|
||||
resp = RESP_CANCEL;
|
||||
if (resp == RESP_CANCEL || !tcmd || tcmd == cmdp)
|
||||
return resp;
|
||||
return;
|
||||
if (ctx->canceling && !ctx->in_progress) {
|
||||
ctx->canceling = 0;
|
||||
ctx->callbacks.imap_cancel( ctx->callback_aux );
|
||||
return;
|
||||
}
|
||||
}
|
||||
if (flush_imap_cmds( ctx ) < 0)
|
||||
return;
|
||||
}
|
||||
imap_invoke_bad_callback( ctx );
|
||||
return RESP_CANCEL;
|
||||
}
|
||||
|
||||
static void
|
||||
|
@ -960,8 +981,11 @@ get_cmd_result_p2( imap_store_t *ctx, struct imap_cmd *cmd, int response )
|
|||
done_imap_cmd( ctx, ocmd, response );
|
||||
} else {
|
||||
ctx->uidnext = 0;
|
||||
if (ocmd->param.to_trash)
|
||||
ctx->trashnc = TrashKnown;
|
||||
ocmd->param.create = 0;
|
||||
submit_imap_cmd( ctx, ocmd, 0 );
|
||||
ocmd->param.high_prio = 1;
|
||||
submit_imap_cmd( ctx, ocmd );
|
||||
}
|
||||
}
|
||||
|
||||
|
@ -974,6 +998,7 @@ imap_cancel_store( store_t *gctx )
|
|||
|
||||
socket_close( &ctx->conn );
|
||||
cancel_submitted_imap_cmds( ctx );
|
||||
cancel_pending_imap_cmds( ctx );
|
||||
free_generic_messages( ctx->gen.msgs );
|
||||
free_string_list( ctx->gen.boxes );
|
||||
free_list( ctx->ns_personal );
|
||||
|
@ -1082,10 +1107,15 @@ do_cram_auth( imap_store_t *ctx, struct imap_cmd *cmdp, const char *prompt )
|
|||
}
|
||||
#endif
|
||||
|
||||
static void imap_open_store_connected( int, void * );
|
||||
#ifdef HAVE_LIBSSL
|
||||
static void imap_open_store_tlsstarted1( int, void * );
|
||||
#endif
|
||||
static void imap_open_store_p2( imap_store_t *, struct imap_cmd *, int );
|
||||
static void imap_open_store_authenticate( imap_store_t * );
|
||||
#ifdef HAVE_LIBSSL
|
||||
static void imap_open_store_authenticate_p2( imap_store_t *, struct imap_cmd *, int );
|
||||
static void imap_open_store_tlsstarted2( int, void * );
|
||||
static void imap_open_store_authenticate_p3( imap_store_t *, struct imap_cmd *, int );
|
||||
#endif
|
||||
static void imap_open_store_authenticate2( imap_store_t * );
|
||||
|
@ -1131,26 +1161,41 @@ imap_open_store( store_conf_t *conf,
|
|||
ctx->callback_aux = aux;
|
||||
set_bad_callback( &ctx->gen, (void (*)(void *))imap_open_store_bail, ctx );
|
||||
ctx->in_progress_append = &ctx->in_progress;
|
||||
ctx->pending_append = &ctx->pending;
|
||||
|
||||
socket_init( &ctx->conn, (void (*)( void * ))imap_invoke_bad_callback, ctx );
|
||||
socket_init( &ctx->conn, &srvc->sconf,
|
||||
(void (*)( void * ))imap_invoke_bad_callback,
|
||||
imap_socket_read, (int (*)(void *))flush_imap_cmds, ctx );
|
||||
socket_connect( &ctx->conn, imap_open_store_connected );
|
||||
}
|
||||
|
||||
if (!socket_connect( &srvc->sconf, &ctx->conn ))
|
||||
goto bail;
|
||||
static void
|
||||
imap_open_store_connected( int ok, void *aux )
|
||||
{
|
||||
imap_store_t *ctx = (imap_store_t *)aux;
|
||||
#ifdef HAVE_LIBSSL
|
||||
imap_store_conf_t *cfg = (imap_store_conf_t *)ctx->gen.conf;
|
||||
imap_server_conf_t *srvc = cfg->server;
|
||||
#endif
|
||||
|
||||
if (!ok)
|
||||
imap_open_store_bail( ctx );
|
||||
#ifdef HAVE_LIBSSL
|
||||
else if (srvc->sconf.use_imaps)
|
||||
socket_start_tls( &ctx->conn, imap_open_store_tlsstarted1 );
|
||||
#endif
|
||||
}
|
||||
|
||||
#ifdef HAVE_LIBSSL
|
||||
if (srvc->sconf.use_imaps) {
|
||||
if (socket_start_tls( &srvc->sconf, &ctx->conn )) {
|
||||
imap_open_store_ssl_bail( ctx );
|
||||
return;
|
||||
}
|
||||
}
|
||||
#endif
|
||||
get_cmd_result( ctx, 0 );
|
||||
return;
|
||||
static void
|
||||
imap_open_store_tlsstarted1( int ok, void *aux )
|
||||
{
|
||||
imap_store_t *ctx = (imap_store_t *)aux;
|
||||
|
||||
bail:
|
||||
imap_open_store_bail( ctx );
|
||||
if (!ok)
|
||||
imap_open_store_ssl_bail( ctx );
|
||||
}
|
||||
#endif
|
||||
|
||||
static void
|
||||
imap_open_store_greeted( imap_store_t *ctx )
|
||||
|
@ -1213,7 +1258,16 @@ imap_open_store_authenticate_p2( imap_store_t *ctx, struct imap_cmd *cmd ATTR_UN
|
|||
{
|
||||
if (response != RESP_OK)
|
||||
imap_open_store_bail( ctx );
|
||||
else if (socket_start_tls( &((imap_server_conf_t *)ctx->gen.conf)->sconf, &ctx->conn ))
|
||||
else
|
||||
socket_start_tls( &ctx->conn, imap_open_store_tlsstarted2 );
|
||||
}
|
||||
|
||||
static void
|
||||
imap_open_store_tlsstarted2( int ok, void *aux )
|
||||
{
|
||||
imap_store_t *ctx = (imap_store_t *)aux;
|
||||
|
||||
if (!ok)
|
||||
imap_open_store_ssl_bail( ctx );
|
||||
else
|
||||
imap_exec( ctx, 0, imap_open_store_authenticate_p3, "CAPABILITY" );
|
||||
|
@ -1343,7 +1397,7 @@ static void
|
|||
imap_open_store_finalize( imap_store_t *ctx )
|
||||
{
|
||||
set_bad_callback( &ctx->gen, 0, 0 );
|
||||
ctx->trashnc = 1;
|
||||
ctx->trashnc = TrashUnknown;
|
||||
ctx->callbacks.imap_open( &ctx->gen, ctx->callback_aux );
|
||||
}
|
||||
|
||||
|
@ -1404,8 +1458,7 @@ imap_select( store_t *gctx, int create,
|
|||
|
||||
/******************* imap_load *******************/
|
||||
|
||||
static int imap_submit_load( imap_store_t *, const char *, struct imap_cmd_refcounted_state *,
|
||||
struct imap_cmd ** );
|
||||
static int imap_submit_load( imap_store_t *, const char *, struct imap_cmd_refcounted_state * );
|
||||
static void imap_load_p2( imap_store_t *, struct imap_cmd *, int );
|
||||
|
||||
static void
|
||||
|
@ -1420,7 +1473,6 @@ imap_load( store_t *gctx, int minuid, int maxuid, int *excs, int nexcs,
|
|||
free( excs );
|
||||
cb( DRV_OK, aux );
|
||||
} else {
|
||||
struct imap_cmd *cmd2 = 0;
|
||||
struct imap_cmd_refcounted_state *sts = imap_refcounted_new_state( cb, aux );
|
||||
|
||||
ctx->msgapp = &ctx->gen.msgs;
|
||||
|
@ -1435,35 +1487,29 @@ imap_load( store_t *gctx, int minuid, int maxuid, int *excs, int nexcs,
|
|||
if (i != j)
|
||||
bl += sprintf( buf + bl, ":%d", excs[i] );
|
||||
}
|
||||
if (imap_submit_load( ctx, buf, sts, &cmd2 ) < 0)
|
||||
if (imap_submit_load( ctx, buf, sts ) < 0)
|
||||
goto done;
|
||||
}
|
||||
if (maxuid == INT_MAX)
|
||||
maxuid = ctx->uidnext >= 0 ? ctx->uidnext - 1 : 1000000000;
|
||||
if (maxuid >= minuid) {
|
||||
sprintf( buf, "%d:%d", minuid, maxuid );
|
||||
imap_submit_load( ctx, buf, sts, &cmd2 );
|
||||
imap_submit_load( ctx, buf, sts );
|
||||
}
|
||||
done:
|
||||
free( excs );
|
||||
if (!--sts->ref_count)
|
||||
imap_refcounted_done( sts );
|
||||
else
|
||||
get_cmd_result( ctx, cmd2 );
|
||||
}
|
||||
}
|
||||
|
||||
static int
|
||||
imap_submit_load( imap_store_t *ctx, const char *buf, struct imap_cmd_refcounted_state *sts,
|
||||
struct imap_cmd **cmdp )
|
||||
imap_submit_load( imap_store_t *ctx, const char *buf, struct imap_cmd_refcounted_state *sts )
|
||||
{
|
||||
struct imap_cmd *cmd = imap_refcounted_new_cmd( sts );
|
||||
cmd->param.done = imap_load_p2;
|
||||
*cmdp = cmd;
|
||||
return submit_imap_cmd( ctx, cmd,
|
||||
return imap_exec( ctx, imap_refcounted_new_cmd( sts ), imap_load_p2,
|
||||
"UID FETCH %s (UID%s%s)", buf,
|
||||
(ctx->gen.opts & OPEN_FLAGS) ? " FLAGS" : "",
|
||||
(ctx->gen.opts & OPEN_SIZE) ? " RFC822.SIZE" : "" ) ? 0 : -1;
|
||||
(ctx->gen.opts & OPEN_SIZE) ? " RFC822.SIZE" : "" );
|
||||
}
|
||||
|
||||
static void
|
||||
|
@ -1528,12 +1574,9 @@ imap_flags_helper( imap_store_t *ctx, int uid, char what, int flags,
|
|||
{
|
||||
char buf[256];
|
||||
|
||||
struct imap_cmd *cmd = imap_refcounted_new_cmd( sts );
|
||||
cmd->param.done = imap_set_flags_p2;
|
||||
buf[imap_make_flags( flags, buf )] = 0;
|
||||
if (!submit_imap_cmd( ctx, cmd, "UID STORE %d %cFLAGS.SILENT %s", uid, what, buf ))
|
||||
return -1;
|
||||
return process_imap_replies( ctx ) == RESP_CANCEL ? -1 : 0;
|
||||
return imap_exec( ctx, imap_refcounted_new_cmd( sts ), imap_set_flags_p2,
|
||||
"UID STORE %d %cFLAGS.SILENT %s", uid, what, buf );
|
||||
}
|
||||
|
||||
static void
|
||||
|
@ -1705,8 +1748,16 @@ static void
|
|||
imap_cancel( store_t *gctx,
|
||||
void (*cb)( void *aux ), void *aux )
|
||||
{
|
||||
(void)gctx;
|
||||
imap_store_t *ctx = (imap_store_t *)gctx;
|
||||
|
||||
cancel_pending_imap_cmds( ctx );
|
||||
if (ctx->in_progress) {
|
||||
ctx->canceling = 1;
|
||||
ctx->callbacks.imap_cancel = cb;
|
||||
ctx->callback_aux = aux;
|
||||
} else {
|
||||
cb( aux );
|
||||
}
|
||||
}
|
||||
|
||||
/******************* imap_commit *******************/
|
||||
|
@ -1753,7 +1804,7 @@ imap_parse_store( conffile_t *cfg, store_conf_t **storep, int *err )
|
|||
server->require_ssl = 1;
|
||||
server->sconf.use_tlsv1 = 1;
|
||||
#endif
|
||||
server->max_in_progress = 50;
|
||||
server->max_in_progress = INT_MAX;
|
||||
|
||||
while (getcline( cfg ) && cfg->cmd) {
|
||||
if (!strcasecmp( "Host", cfg->cmd )) {
|
||||
|
|
34
src/isync.h
34
src/isync.h
|
@ -73,15 +73,36 @@ typedef struct server_conf {
|
|||
#endif
|
||||
} server_conf_t;
|
||||
|
||||
typedef struct buff_chunk {
|
||||
struct buff_chunk *next;
|
||||
char *data;
|
||||
int len;
|
||||
char buf[1];
|
||||
} buff_chunk_t;
|
||||
|
||||
typedef struct {
|
||||
/* connection */
|
||||
int fd;
|
||||
int state;
|
||||
const server_conf_t *conf; /* needed during connect */
|
||||
#ifdef HAVE_LIBSSL
|
||||
SSL *ssl;
|
||||
#endif
|
||||
|
||||
void (*bad_callback)( void *aux ); /* async fail while sending or listening */
|
||||
void (*read_callback)( void *aux ); /* data available for reading */
|
||||
int (*write_callback)( void *aux ); /* all *queued* data was sent */
|
||||
union {
|
||||
void (*connect)( int ok, void *aux );
|
||||
void (*starttls)( int ok, void *aux );
|
||||
} callbacks;
|
||||
void *callback_aux;
|
||||
|
||||
/* writing */
|
||||
buff_chunk_t *write_buf, **write_buf_append; /* buffer head & tail */
|
||||
int write_offset; /* offset into buffer head */
|
||||
|
||||
/* reading */
|
||||
int offset; /* start of filled bytes in buffer */
|
||||
int bytes; /* number of filled bytes in buffer */
|
||||
int scanoff; /* offset to continue scanning for newline at, relative to 'offset' */
|
||||
|
@ -335,22 +356,27 @@ extern const char *Home;
|
|||
|
||||
/* call this before doing anything with the socket */
|
||||
static INLINE void socket_init( conn_t *conn,
|
||||
const server_conf_t *conf,
|
||||
void (*bad_callback)( void *aux ),
|
||||
void (*read_callback)( void *aux ),
|
||||
int (*write_callback)( void *aux ),
|
||||
void *aux )
|
||||
{
|
||||
conn->conf = conf;
|
||||
conn->bad_callback = bad_callback;
|
||||
conn->read_callback = read_callback;
|
||||
conn->write_callback = write_callback;
|
||||
conn->callback_aux = aux;
|
||||
conn->fd = -1;
|
||||
conn->write_buf_append = &conn->write_buf;
|
||||
}
|
||||
int socket_connect( const server_conf_t *conf, conn_t *sock );
|
||||
int socket_start_tls( const server_conf_t *conf, conn_t *sock );
|
||||
void socket_connect( conn_t *conn, void (*cb)( int ok, void *aux ) );
|
||||
void socket_start_tls(conn_t *conn, void (*cb)( int ok, void *aux ) );
|
||||
void socket_close( conn_t *sock );
|
||||
int socket_fill( conn_t *sock );
|
||||
int socket_read( conn_t *sock, char *buf, int len ); /* never waits */
|
||||
char *socket_read_line( conn_t *sock ); /* don't free return value; never waits */
|
||||
typedef enum { KeepOwn = 0, GiveOwn } ownership_t;
|
||||
int socket_write( conn_t *sock, char *buf, int len, ownership_t takeOwn );
|
||||
int socket_pending( conn_t *sock );
|
||||
|
||||
void cram( const char *challenge, const char *user, const char *pass,
|
||||
char **_final, int *_finallen );
|
||||
|
|
|
@ -281,10 +281,8 @@ Use TLSv1 for communication with the IMAP server over SSL?
|
|||
\fBPipelineDepth\fR \fIdepth\fR
|
||||
Maximum number of IMAP commands which can be simultaneously in flight.
|
||||
Setting this to \fI1\fR disables pipelining.
|
||||
Setting it to a too big value may deadlock isync.
|
||||
Currently, this affects only a few commands.
|
||||
This is mostly a debugging only option.
|
||||
(Default: \fI50\fR)
|
||||
(Default: \fIunlimited\fR)
|
||||
..
|
||||
.SS IMAP Stores
|
||||
The reference point for relative \fBPath\fRs is whatever the server likes it
|
||||
|
|
368
src/socket.c
368
src/socket.c
|
@ -36,56 +36,67 @@
|
|||
#include <assert.h>
|
||||
#include <unistd.h>
|
||||
#include <stdlib.h>
|
||||
#include <stddef.h>
|
||||
#include <errno.h>
|
||||
#include <string.h>
|
||||
#include <fcntl.h>
|
||||
#include <sys/socket.h>
|
||||
#include <sys/ioctl.h>
|
||||
#ifdef HAVE_SYS_FILIO_H
|
||||
# include <sys/filio.h>
|
||||
#endif
|
||||
#include <netinet/in.h>
|
||||
#include <netinet/tcp.h>
|
||||
#include <arpa/inet.h>
|
||||
#include <netdb.h>
|
||||
|
||||
enum {
|
||||
SCK_CONNECTING,
|
||||
#ifdef HAVE_LIBSSL
|
||||
SCK_STARTTLS,
|
||||
#endif
|
||||
SCK_READY
|
||||
};
|
||||
|
||||
static void
|
||||
socket_fail( conn_t *conn )
|
||||
{
|
||||
conn->bad_callback( conn->callback_aux );
|
||||
}
|
||||
|
||||
static void
|
||||
socket_perror( const char *func, conn_t *sock, int ret )
|
||||
{
|
||||
#ifdef HAVE_LIBSSL
|
||||
static int
|
||||
ssl_return( const char *func, conn_t *conn, int ret )
|
||||
{
|
||||
int err;
|
||||
|
||||
if (sock->ssl) {
|
||||
switch ((err = SSL_get_error( sock->ssl, ret ))) {
|
||||
switch ((err = SSL_get_error( conn->ssl, ret ))) {
|
||||
case SSL_ERROR_NONE:
|
||||
return ret;
|
||||
case SSL_ERROR_WANT_WRITE:
|
||||
conf_fd( conn->fd, POLLIN, POLLOUT );
|
||||
/* fallthrough */
|
||||
case SSL_ERROR_WANT_READ:
|
||||
return 0;
|
||||
case SSL_ERROR_SYSCALL:
|
||||
case SSL_ERROR_SSL:
|
||||
if ((err = ERR_get_error()) == 0) {
|
||||
if (!(err = ERR_get_error())) {
|
||||
if (ret == 0)
|
||||
error( "SSL_%s: got EOF\n", func );
|
||||
error( "SSL_%s: unexpected EOF\n", func );
|
||||
else
|
||||
error( "SSL_%s: %s\n", func, strerror(errno) );
|
||||
} else
|
||||
error( "SSL_%s: %s\n", func, strerror( errno ) );
|
||||
} else {
|
||||
error( "SSL_%s: %s\n", func, ERR_error_string( err, 0 ) );
|
||||
}
|
||||
break;
|
||||
default:
|
||||
error( "SSL_%s: unhandled SSL error %d\n", func, err );
|
||||
break;
|
||||
}
|
||||
} else
|
||||
#endif
|
||||
if (ret < 0)
|
||||
perror( func );
|
||||
if (conn->state == SCK_STARTTLS)
|
||||
conn->callbacks.starttls( 0, conn->callback_aux );
|
||||
else
|
||||
error( "%s: unexpected EOF\n", func );
|
||||
socket_fail( sock );
|
||||
socket_fail( conn );
|
||||
return -1;
|
||||
}
|
||||
|
||||
#ifdef HAVE_LIBSSL
|
||||
/* Some of this code is inspired by / lifted from mutt. */
|
||||
|
||||
static int
|
||||
|
@ -245,45 +256,85 @@ init_ssl_ctx( const server_conf_t *conf )
|
|||
return 0;
|
||||
}
|
||||
|
||||
int
|
||||
socket_start_tls( const server_conf_t *conf, conn_t *sock )
|
||||
static void start_tls_p2( conn_t * );
|
||||
static void start_tls_p3( conn_t *, int );
|
||||
|
||||
void
|
||||
socket_start_tls( conn_t *conn, void (*cb)( int ok, void *aux ) )
|
||||
{
|
||||
int ret;
|
||||
static int ssl_inited;
|
||||
|
||||
conn->callbacks.starttls = cb;
|
||||
|
||||
if (!ssl_inited) {
|
||||
SSL_library_init();
|
||||
SSL_load_error_strings();
|
||||
ssl_inited = 1;
|
||||
}
|
||||
|
||||
if (!conf->SSLContext && init_ssl_ctx( conf ))
|
||||
return 1;
|
||||
|
||||
sock->ssl = SSL_new( ((server_conf_t *)conf)->SSLContext );
|
||||
SSL_set_fd( sock->ssl, sock->fd );
|
||||
if ((ret = SSL_connect( sock->ssl )) <= 0) {
|
||||
socket_perror( "connect", sock, ret );
|
||||
return 1;
|
||||
if (!conn->conf->SSLContext && init_ssl_ctx( conn->conf )) {
|
||||
start_tls_p3( conn, 0 );
|
||||
return;
|
||||
}
|
||||
|
||||
/* verify the server certificate */
|
||||
if (verify_cert( conf, sock ))
|
||||
return 1;
|
||||
conn->ssl = SSL_new( ((server_conf_t *)conn->conf)->SSLContext );
|
||||
SSL_set_fd( conn->ssl, conn->fd );
|
||||
SSL_set_mode( conn->ssl, SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER );
|
||||
start_tls_p2( conn );
|
||||
}
|
||||
|
||||
static void
|
||||
start_tls_p2( conn_t *conn )
|
||||
{
|
||||
switch (ssl_return( "connect", conn, SSL_connect( conn->ssl ) )) {
|
||||
case -1:
|
||||
start_tls_p3( conn, 0 );
|
||||
break;
|
||||
case 0:
|
||||
break;
|
||||
default:
|
||||
/* verify the server certificate */
|
||||
if (verify_cert( conn->conf, conn )) {
|
||||
start_tls_p3( conn, 0 );
|
||||
} else {
|
||||
info( "Connection is now encrypted\n" );
|
||||
return 0;
|
||||
start_tls_p3( conn, 1 );
|
||||
}
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
static void start_tls_p3( conn_t *conn, int ok )
|
||||
{
|
||||
conn->state = SCK_READY;
|
||||
conn->callbacks.starttls( ok, conn->callback_aux );
|
||||
}
|
||||
|
||||
#endif /* HAVE_LIBSSL */
|
||||
|
||||
int
|
||||
socket_connect( const server_conf_t *conf, conn_t *sock )
|
||||
static void socket_fd_cb( int, void * );
|
||||
|
||||
static void socket_connected2( conn_t * );
|
||||
static void socket_connect_bail( conn_t * );
|
||||
|
||||
static void
|
||||
socket_close_internal( conn_t *sock )
|
||||
{
|
||||
del_fd( sock->fd );
|
||||
close( sock->fd );
|
||||
sock->fd = -1;
|
||||
}
|
||||
|
||||
void
|
||||
socket_connect( conn_t *sock, void (*cb)( int ok, void *aux ) )
|
||||
{
|
||||
const server_conf_t *conf = sock->conf;
|
||||
struct hostent *he;
|
||||
struct sockaddr_in addr;
|
||||
int s, a[2];
|
||||
|
||||
sock->callbacks.connect = cb;
|
||||
|
||||
/* open connection to IMAP server */
|
||||
if (conf->tunnel) {
|
||||
infon( "Starting tunnel '%s'... ", conf->tunnel );
|
||||
|
@ -304,6 +355,10 @@ socket_connect( const server_conf_t *conf, conn_t *sock )
|
|||
|
||||
close( a[0] );
|
||||
sock->fd = a[1];
|
||||
|
||||
fcntl( a[1], F_SETFL, O_NONBLOCK );
|
||||
add_fd( a[1], socket_fd_cb, sock );
|
||||
|
||||
} else {
|
||||
memset( &addr, 0, sizeof(addr) );
|
||||
addr.sin_port = conf->port ? htons( conf->port ) :
|
||||
|
@ -317,7 +372,7 @@ socket_connect( const server_conf_t *conf, conn_t *sock )
|
|||
he = gethostbyname( conf->host );
|
||||
if (!he) {
|
||||
error( "IMAP error: Cannot resolve server '%s'\n", conf->host );
|
||||
return -1;
|
||||
goto bail;
|
||||
}
|
||||
info( "ok\n" );
|
||||
|
||||
|
@ -328,36 +383,87 @@ socket_connect( const server_conf_t *conf, conn_t *sock )
|
|||
perror( "socket" );
|
||||
exit( 1 );
|
||||
}
|
||||
sock->fd = s;
|
||||
fcntl( s, F_SETFL, O_NONBLOCK );
|
||||
add_fd( s, socket_fd_cb, sock );
|
||||
|
||||
infon( "Connecting to %s:%hu... ", inet_ntoa( addr.sin_addr ), ntohs( addr.sin_port ) );
|
||||
infon( "Connecting to %s (%s:%hu) ... ",
|
||||
conf->host, inet_ntoa( addr.sin_addr ), ntohs( addr.sin_port ) );
|
||||
if (connect( s, (struct sockaddr *)&addr, sizeof(addr) )) {
|
||||
close( s );
|
||||
if (errno != EINPROGRESS) {
|
||||
perror( "connect" );
|
||||
return -1;
|
||||
socket_close_internal( sock );
|
||||
goto bail;
|
||||
}
|
||||
conf_fd( s, 0, POLLOUT );
|
||||
sock->state = SCK_CONNECTING;
|
||||
info( "\n" );
|
||||
return;
|
||||
}
|
||||
|
||||
sock->fd = s;
|
||||
}
|
||||
info( "ok\n" );
|
||||
return 0;
|
||||
socket_connected2( sock );
|
||||
return;
|
||||
|
||||
bail:
|
||||
socket_connect_bail( sock );
|
||||
}
|
||||
|
||||
static void
|
||||
socket_connected( conn_t *conn )
|
||||
{
|
||||
int soerr;
|
||||
socklen_t selen = sizeof(soerr);
|
||||
|
||||
infon( "Connecting to %s: ", conn->conf->host );
|
||||
if (getsockopt( conn->fd, SOL_SOCKET, SO_ERROR, &soerr, &selen )) {
|
||||
perror( "getsockopt" );
|
||||
exit( 1 );
|
||||
}
|
||||
if (soerr) {
|
||||
errno = soerr;
|
||||
perror( "connect" );
|
||||
socket_close_internal( conn );
|
||||
socket_connect_bail( conn );
|
||||
return;
|
||||
}
|
||||
info( "ok\n" );
|
||||
socket_connected2( conn );
|
||||
}
|
||||
|
||||
static void
|
||||
socket_connected2( conn_t *conn )
|
||||
{
|
||||
conf_fd( conn->fd, 0, POLLIN );
|
||||
conn->state = SCK_READY;
|
||||
conn->callbacks.connect( 1, conn->callback_aux );
|
||||
}
|
||||
|
||||
static void
|
||||
socket_connect_bail( conn_t *conn )
|
||||
{
|
||||
conn->callbacks.connect( 0, conn->callback_aux );
|
||||
}
|
||||
|
||||
static void dispose_chunk( conn_t *conn );
|
||||
|
||||
void
|
||||
socket_close( conn_t *sock )
|
||||
{
|
||||
if (sock->fd >= 0) {
|
||||
close( sock->fd );
|
||||
sock->fd = -1;
|
||||
}
|
||||
if (sock->fd >= 0)
|
||||
socket_close_internal( sock );
|
||||
#ifdef HAVE_LIBSSL
|
||||
if (sock->ssl) {
|
||||
SSL_free( sock->ssl );
|
||||
sock->ssl = 0;
|
||||
}
|
||||
#endif
|
||||
while (sock->write_buf)
|
||||
dispose_chunk( sock );
|
||||
}
|
||||
|
||||
int
|
||||
static void
|
||||
socket_fill( conn_t *sock )
|
||||
{
|
||||
char *buf;
|
||||
|
@ -366,22 +472,31 @@ socket_fill( conn_t *sock )
|
|||
if (!len) {
|
||||
error( "Socket error: receive buffer full. Probably protocol error.\n" );
|
||||
socket_fail( sock );
|
||||
return -1;
|
||||
return;
|
||||
}
|
||||
assert( sock->fd >= 0 );
|
||||
buf = sock->buf + n;
|
||||
n =
|
||||
#ifdef HAVE_LIBSSL
|
||||
sock->ssl ? SSL_read( sock->ssl, buf, len ) :
|
||||
if (sock->ssl) {
|
||||
if ((n = ssl_return( "read", sock, SSL_read( sock->ssl, buf, len ) )) <= 0)
|
||||
return;
|
||||
if (n == len && SSL_pending( sock->ssl ))
|
||||
fake_fd( sock->fd, POLLIN );
|
||||
} else
|
||||
#endif
|
||||
read( sock->fd, buf, len );
|
||||
if (n <= 0) {
|
||||
socket_perror( "read", sock, n );
|
||||
return -1;
|
||||
} else {
|
||||
sock->bytes += n;
|
||||
return 0;
|
||||
{
|
||||
if ((n = read( sock->fd, buf, len )) < 0) {
|
||||
perror( "read" );
|
||||
socket_fail( sock );
|
||||
return;
|
||||
} else if (!n) {
|
||||
error( "read: unexpected EOF\n" );
|
||||
socket_fail( sock );
|
||||
return;
|
||||
}
|
||||
}
|
||||
sock->bytes += n;
|
||||
sock->read_callback( sock->callback_aux );
|
||||
}
|
||||
|
||||
int
|
||||
|
@ -426,40 +541,141 @@ socket_read_line( conn_t *b )
|
|||
return s;
|
||||
}
|
||||
|
||||
int
|
||||
socket_write( conn_t *sock, char *buf, int len, ownership_t takeOwn )
|
||||
static int
|
||||
do_write( conn_t *sock, char *buf, int len )
|
||||
{
|
||||
int n;
|
||||
|
||||
assert( sock->fd >= 0 );
|
||||
n =
|
||||
#ifdef HAVE_LIBSSL
|
||||
sock->ssl ? SSL_write( sock->ssl, buf, len ) :
|
||||
if (sock->ssl)
|
||||
return ssl_return( "write", sock, SSL_write( sock->ssl, buf, len ) );
|
||||
#endif
|
||||
write( sock->fd, buf, len );
|
||||
if (takeOwn == GiveOwn)
|
||||
free( buf );
|
||||
if (n != len) {
|
||||
socket_perror( "write", sock, n );
|
||||
return -1;
|
||||
n = write( sock->fd, buf, len );
|
||||
if (n < 0) {
|
||||
if (errno != EAGAIN && errno != EWOULDBLOCK) {
|
||||
perror( "write" );
|
||||
socket_fail( sock );
|
||||
} else {
|
||||
n = 0;
|
||||
conf_fd( sock->fd, POLLIN, POLLOUT );
|
||||
}
|
||||
} else if (n != len) {
|
||||
conf_fd( sock->fd, POLLIN, POLLOUT );
|
||||
}
|
||||
return n;
|
||||
}
|
||||
|
||||
static void
|
||||
dispose_chunk( conn_t *conn )
|
||||
{
|
||||
buff_chunk_t *bc = conn->write_buf;
|
||||
if (!(conn->write_buf = bc->next))
|
||||
conn->write_buf_append = &conn->write_buf;
|
||||
if (bc->data != bc->buf)
|
||||
free( bc->data );
|
||||
free( bc );
|
||||
}
|
||||
|
||||
static int
|
||||
do_queued_write( conn_t *conn )
|
||||
{
|
||||
buff_chunk_t *bc;
|
||||
|
||||
if (!conn->write_buf)
|
||||
return 0;
|
||||
|
||||
while ((bc = conn->write_buf)) {
|
||||
int n, len = bc->len - conn->write_offset;
|
||||
if ((n = do_write( conn, bc->data + conn->write_offset, len )) < 0)
|
||||
return -1;
|
||||
if (n != len) {
|
||||
conn->write_offset += n;
|
||||
return 0;
|
||||
}
|
||||
conn->write_offset = 0;
|
||||
dispose_chunk( conn );
|
||||
}
|
||||
#ifdef HAVE_LIBSSL
|
||||
if (conn->ssl && SSL_pending( conn->ssl ))
|
||||
fake_fd( conn->fd, POLLIN );
|
||||
#endif
|
||||
return conn->write_callback( conn->callback_aux );
|
||||
}
|
||||
|
||||
static void
|
||||
do_append( conn_t *conn, char *buf, int len, ownership_t takeOwn )
|
||||
{
|
||||
buff_chunk_t *bc;
|
||||
|
||||
if (takeOwn == GiveOwn) {
|
||||
bc = nfmalloc( offsetof(buff_chunk_t, buf) );
|
||||
bc->data = buf;
|
||||
} else {
|
||||
bc = nfmalloc( offsetof(buff_chunk_t, buf) + len );
|
||||
bc->data = bc->buf;
|
||||
memcpy( bc->data, buf, len );
|
||||
}
|
||||
bc->len = len;
|
||||
bc->next = 0;
|
||||
*conn->write_buf_append = bc;
|
||||
conn->write_buf_append = &bc->next;
|
||||
}
|
||||
|
||||
int
|
||||
socket_pending( conn_t *sock )
|
||||
socket_write( conn_t *conn, char *buf, int len, ownership_t takeOwn )
|
||||
{
|
||||
int num = -1;
|
||||
if (conn->write_buf) {
|
||||
do_append( conn, buf, len, takeOwn );
|
||||
return len;
|
||||
} else {
|
||||
int n = do_write( conn, buf, len );
|
||||
if (n != len && n >= 0) {
|
||||
conn->write_offset = n;
|
||||
do_append( conn, buf, len, takeOwn );
|
||||
} else if (takeOwn) {
|
||||
free( buf );
|
||||
}
|
||||
return n;
|
||||
}
|
||||
}
|
||||
|
||||
static void
|
||||
socket_fd_cb( int events, void *aux )
|
||||
{
|
||||
conn_t *conn = (conn_t *)aux;
|
||||
|
||||
if (events & POLLERR) {
|
||||
error( "Unidentified socket error.\n" );
|
||||
socket_fail( conn );
|
||||
return;
|
||||
}
|
||||
|
||||
if (conn->state == SCK_CONNECTING) {
|
||||
socket_connected( conn );
|
||||
return;
|
||||
}
|
||||
|
||||
if (events & POLLOUT)
|
||||
conf_fd( conn->fd, POLLIN, 0 );
|
||||
|
||||
if (ioctl( sock->fd, FIONREAD, &num ) < 0)
|
||||
return -1;
|
||||
if (num > 0)
|
||||
return num;
|
||||
#ifdef HAVE_LIBSSL
|
||||
if (sock->ssl)
|
||||
return SSL_pending( sock->ssl );
|
||||
if (conn->state == SCK_STARTTLS) {
|
||||
start_tls_p2( conn );
|
||||
return;
|
||||
}
|
||||
if (conn->ssl) {
|
||||
if (do_queued_write( conn ) < 0)
|
||||
return;
|
||||
socket_fill( conn );
|
||||
return;
|
||||
}
|
||||
#endif
|
||||
return 0;
|
||||
|
||||
if ((events & POLLOUT) && do_queued_write( conn ) < 0)
|
||||
return;
|
||||
if (events & POLLIN)
|
||||
socket_fill( conn );
|
||||
}
|
||||
|
||||
#ifdef HAVE_LIBSSL
|
||||
|
|
Loading…
Reference in New Issue
Block a user