#include "config.h"
#ifdef POP3_ENABLE
#include <stdio.h>
#include <string.h>
#include <ctype.h>
#if defined(HAVE_UNISTD_H)
#include <unistd.h>
#endif
#if defined(STDC_HEADERS)
#include <stdlib.h>
#endif
#include <errno.h>
#include "fetchmail.h"
#include "socket.h"
#include "i18n.h"
#ifdef OPIE_ENABLE
#ifdef __cplusplus
extern "C" {
#endif
#include <opie.h>
#ifdef __cplusplus
}
#endif
#endif
#ifdef OPIE_ENABLE
static char lastok[POPBUFSIZE+1];
#endif
flag done_capa = FALSE;
#if defined(GSSAPI)
flag has_gssapi = FALSE;
#endif
#if defined(KERBEROS_V4) || defined(KERBEROS_V5)
flag has_kerberos = FALSE;
#endif
static flag has_cram = FALSE;
#ifdef OPIE_ENABLE
flag has_otp = FALSE;
#endif
#ifdef NTLM_ENABLE
flag has_ntlm = FALSE;
#endif
#ifdef SSL_ENABLE
static flag has_stls = FALSE;
#endif
static int last;
#ifdef SDPS_ENABLE
char *sdps_envfrom;
char *sdps_envto;
#endif
#ifdef NTLM_ENABLE
#include "ntlm.h"
static int do_pop3_ntlm(int sock, struct query *ctl,
int msn_instead )
{
char msgbuf[POPBUFSIZE+1];
int result;
gen_send(sock, msn_instead ? "AUTH MSN" : "AUTH NTLM");
if ((result = ntlm_helper(sock, ctl, "POP3")))
return result;
if ((result = gen_recv (sock, msgbuf, sizeof msgbuf)))
return result;
if (strstr (msgbuf, "OK"))
return PS_SUCCESS;
else
return PS_AUTHFAIL;
}
#endif
#define DOTLINE(s) (s[0] == '.' && (s[1]=='\r'||s[1]=='\n'||s[1]=='\0'))
static int pop3_ok (int sock, char *argbuf)
{
int ok;
char buf [POPBUFSIZE+1];
char *bufp;
if ((ok = gen_recv(sock, buf, sizeof(buf))) == 0)
{ bufp = buf;
if (*bufp == '+' || *bufp == '-')
bufp++;
else
return(PS_PROTOCOL);
while (isalpha((unsigned char)*bufp))
bufp++;
if (*bufp)
*(bufp++) = '\0';
if (strcmp(buf,"+OK") == 0)
{
#ifdef OPIE_ENABLE
strcpy(lastok, bufp);
#endif
ok = 0;
}
else if (strncmp(buf,"-ERR", 4) == 0)
{
if (stage == STAGE_FETCH)
ok = PS_TRANSIENT;
else if (stage > STAGE_GETAUTH)
ok = PS_PROTOCOL;
else if (strstr(bufp,"lock")
|| strstr(bufp,"Lock")
|| strstr(bufp,"LOCK")
|| strstr(bufp,"wait")
|| strstr(bufp,"[IN-USE]")||strstr(bufp,"[LOGIN-DELAY]"))
ok = PS_LOCKBUSY;
else if ((strstr(bufp,"Service")
|| strstr(bufp,"service"))
&& (strstr(bufp,"unavailable")))
ok = PS_SERVBUSY;
else
ok = PS_AUTHFAIL;
if (*bufp && (ok == PS_LOCKBUSY || outlevel >= O_MONITOR))
report(stderr, "%s\n", bufp);
}
else
ok = PS_PROTOCOL;
#if POPBUFSIZE > MSGBUFSIZE
#error "POPBUFSIZE must not be larger than MSGBUFSIZE"
#endif
if (argbuf != NULL)
strcpy(argbuf,bufp);
}
return(ok);
}
static int capa_probe(int sock)
{
int ok;
if (done_capa) {
return PS_SUCCESS;
}
#if defined(GSSAPI)
has_gssapi = FALSE;
#endif
#if defined(KERBEROS_V4) || defined(KERBEROS_V5)
has_kerberos = FALSE;
#endif
has_cram = FALSE;
#ifdef OPIE_ENABLE
has_otp = FALSE;
#endif
#ifdef NTLM_ENABLE
has_ntlm = FALSE;
#endif
ok = gen_transact(sock, "CAPA");
if (ok == PS_SUCCESS)
{
char buffer[64];
while ((ok = gen_recv(sock, buffer, sizeof(buffer))) == 0)
{
if (DOTLINE(buffer))
break;
#ifdef SSL_ENABLE
if (strstr(buffer, "STLS"))
has_stls = TRUE;
#endif
#if defined(GSSAPI)
if (strstr(buffer, "GSSAPI"))
has_gssapi = TRUE;
#endif
#if defined(KERBEROS_V4)
if (strstr(buffer, "KERBEROS_V4"))
has_kerberos = TRUE;
#endif
#ifdef OPIE_ENABLE
if (strstr(buffer, "X-OTP"))
has_otp = TRUE;
#endif
#ifdef NTLM_ENABLE
if (strstr(buffer, "NTLM"))
has_ntlm = TRUE;
#endif
if (strstr(buffer, "CRAM-MD5"))
has_cram = TRUE;
}
}
done_capa = TRUE;
return(ok);
}
static void set_peek_capable(struct query *ctl)
{
peek_capable = !ctl->fetchall && (!ctl->keep || ctl->server.uidl);
}
static int pop3_getauth(int sock, struct query *ctl, char *greeting)
{
int ok;
char *start,*end;
char *msg;
#ifdef OPIE_ENABLE
char *challenge;
#endif
#ifdef SSL_ENABLE
flag connection_may_have_tls_errors = FALSE;
flag got_tls = FALSE;
#endif
done_capa = FALSE;
#if defined(GSSAPI)
has_gssapi = FALSE;
#endif
#if defined(KERBEROS_V4) || defined(KERBEROS_V5)
has_kerberos = FALSE;
#endif
has_cram = FALSE;
#ifdef OPIE_ENABLE
has_otp = FALSE;
#endif
#ifdef SSL_ENABLE
has_stls = FALSE;
#endif
set_peek_capable(ctl);
if (peek_capable && getenv("FETCHMAIL_POP3_FORCE_RETR")) {
peek_capable = 0;
}
if (peek_capable && strstr(greeting, "Maillennium POP3/PROXY server")) {
if ((ctl->server.workarounds & WKA_TOP) == 0) {
report(stdout, GT_("Warning: \"Maillennium POP3/PROXY server\" found, using RETR command instead of TOP.\n"));
ctl->server.workarounds |= WKA_TOP;
}
peek_capable = 0;
}
if (ctl->server.authenticate == A_SSH) {
return PS_SUCCESS;
}
#ifdef SDPS_ENABLE
if (!(ctl->server.sdps) && MULTIDROP(ctl) && strstr(greeting, "demon."))
ctl->server.sdps = TRUE;
#endif
switch (ctl->server.protocol) {
case P_POP3:
#ifdef RPA_ENABLE
if (strstr(ctl->remotename, "@compuserve.com"))
{
if (gen_transact(sock, "AUTH") == 0)
{
char buffer[10];
flag has_rpa = FALSE;
while ((ok = gen_recv(sock, buffer, sizeof(buffer))) == 0)
{
if (DOTLINE(buffer))
break;
if (strncasecmp(buffer, "rpa", 3) == 0)
has_rpa = TRUE;
}
if (has_rpa && !POP3_auth_rpa(ctl->remotename,
ctl->password, sock))
return(PS_SUCCESS);
}
return(PS_AUTHFAIL);
}
#endif
if ((ctl->server.authenticate == A_ANY) ||
(ctl->server.authenticate == A_GSSAPI) ||
(ctl->server.authenticate == A_KERBEROS_V4) ||
(ctl->server.authenticate == A_KERBEROS_V5) ||
(ctl->server.authenticate == A_OTP) ||
(ctl->server.authenticate == A_CRAM_MD5) ||
maybe_tls(ctl))
{
if ((ok = capa_probe(sock)) != PS_SUCCESS)
if (ok == PS_AUTHFAIL ||
(ok == PS_SOCKET && !ctl->wehaveauthed))
{
#ifdef SSL_ENABLE
if (must_tls(ctl)) {
report(stderr, GT_("TLS is mandatory for this session, but server refused CAPA command.\n"));
report(stderr, GT_("The CAPA command is however necessary for TLS.\n"));
return ok;
} else if (maybe_tls(ctl)) {
xfree(ctl->sslproto);
ctl->sslproto = xstrdup("");
}
#endif
switch (ctl->server.authenticate) {
case A_ANY:
ctl->server.authenticate = A_PASSWORD;
case A_PASSWORD:
return PS_REPOLL;
default:
return PS_AUTHFAIL;
}
}
}
#ifdef SSL_ENABLE
if (maybe_tls(ctl)) {
char *commonname;
commonname = ctl->server.pollname;
if (ctl->server.via)
commonname = ctl->server.via;
if (ctl->sslcommonname)
commonname = ctl->sslcommonname;
if (has_stls)
{
if (gen_transact(sock, "STLS") == PS_SUCCESS
&& SSLOpen(sock, ctl->sslcert, ctl->sslkey, "tls1", ctl->sslcertck,
ctl->sslcertfile, ctl->sslcertpath, ctl->sslfingerprint, commonname,
ctl->server.pollname, &ctl->remotename) != -1)
{
got_tls = TRUE;
done_capa = FALSE;
ok = capa_probe(sock);
if (ok != PS_SUCCESS) {
return ok;
}
if (outlevel >= O_VERBOSE)
{
report(stdout, GT_("%s: upgrade to TLS succeeded.\n"), commonname);
}
}
}
if (!got_tls) {
if (must_tls(ctl)) {
report(stderr, GT_("%s: upgrade to TLS failed.\n"), commonname);
return PS_SOCKET;
} else {
connection_may_have_tls_errors = TRUE;
if (outlevel >= O_VERBOSE)
{
report(stdout, GT_("%s: opportunistic upgrade to TLS failed, trying to continue.\n"), commonname);
}
}
}
}
#endif
#if defined(KERBEROS_V4)
if (has_kerberos &&
ctl->server.service && (strcmp(ctl->server.service, KPOP_PORT)!=0)
&& (ctl->server.authenticate == A_KERBEROS_V4
|| ctl->server.authenticate == A_KERBEROS_V5
|| ctl->server.authenticate == A_ANY))
{
ok = do_rfc1731(sock, "AUTH", ctl->server.truename);
if (ok == PS_SUCCESS || ctl->server.authenticate != A_ANY)
break;
}
#endif
#if defined(GSSAPI)
if (has_gssapi &&
(ctl->server.authenticate == A_GSSAPI ||
(ctl->server.authenticate == A_ANY
&& check_gss_creds("pop", ctl->server.truename) == PS_SUCCESS)))
{
ok = do_gssauth(sock,"AUTH","pop",ctl->server.truename,ctl->remotename);
if (ok == PS_SUCCESS || ctl->server.authenticate != A_ANY)
break;
}
#endif
#ifdef OPIE_ENABLE
if (has_otp &&
(ctl->server.authenticate == A_OTP ||
ctl->server.authenticate == A_ANY))
{
ok = do_otp(sock, "AUTH", ctl);
if (ok == PS_SUCCESS || ctl->server.authenticate != A_ANY)
break;
}
#endif
#ifdef NTLM_ENABLE
if (!strcasecmp(ctl->server.pollname, "pop3.email.msn.com") ||
ctl->server.authenticate == A_MSN)
return (do_pop3_ntlm(sock, ctl, 1) == 0) ? PS_SUCCESS : PS_AUTHFAIL;
if (ctl->server.authenticate == A_NTLM || (has_ntlm && ctl->server.authenticate == A_ANY)) {
ok = do_pop3_ntlm(sock, ctl, 0);
if (ok == 0 || ctl->server.authenticate != A_ANY)
break;
}
#else
if (ctl->server.authenticate == A_NTLM || ctl->server.authenticate == A_MSN)
{
report(stderr,
GT_("Required NTLM capability not compiled into fetchmail\n"));
}
#endif
if (ctl->server.authenticate == A_CRAM_MD5 ||
(has_cram && ctl->server.authenticate == A_ANY))
{
ok = do_cram_md5(sock, "AUTH", ctl, NULL);
if (ok == PS_SUCCESS || ctl->server.authenticate != A_ANY)
break;
}
if ((ok = gen_transact(sock, "USER %s", ctl->remotename)))
break;
#ifdef OPIE_ENABLE
if ((challenge = strstr(lastok, "otp-"))) {
char response[OPIE_RESPONSE_MAX+1];
int i;
char *n = xstrdup("");
i = opiegenerator(challenge, !strcmp(ctl->password, "opie") ? n : ctl->password, response);
free(n);
if ((i == -2) && !run.poll_interval) {
char secret[OPIE_SECRET_MAX+1];
fprintf(stderr, GT_("Secret pass phrase: "));
if (opiereadpass(secret, sizeof(secret), 0))
i = opiegenerator(challenge, secret, response);
memset(secret, 0, sizeof(secret));
};
if (i) {
ok = PS_ERROR;
break;
};
ok = gen_transact(sock, "PASS %s", response);
break;
}
#endif
if ((ctl->server.authenticate == A_ANY
|| ctl->server.authenticate == A_KERBEROS_V4
|| ctl->server.authenticate == A_KERBEROS_V5)
&& (ctl->server.service != NULL
&& strcmp(ctl->server.service, KPOP_PORT) == 0))
{
ok = gen_transact(sock, "PASS krb_ticket");
break;
}
if (ctl->server.authenticate == A_ANY
|| ctl->server.authenticate == A_PASSWORD) {
strlcpy(shroud, ctl->password, sizeof(shroud));
ok = gen_transact(sock, "PASS %s", ctl->password);
} else {
report(stderr, GT_("We've run out of allowed authenticators and cannot continue.\n"));
ok = PS_AUTHFAIL;
}
memset(shroud, 0x55, sizeof(shroud));
shroud[0] = '\0';
break;
case P_APOP:
for (start = greeting; *start != 0 && *start != '<'; start++)
continue;
if (*start == 0) {
report(stderr,
GT_("Required APOP timestamp not found in greeting\n"));
return(PS_AUTHFAIL);
}
for (end = start; *end != 0 && *end != '>'; end++)
continue;
if (*end == 0 || end == start + 1) {
report(stderr,
GT_("Timestamp syntax error in greeting\n"));
return(PS_AUTHFAIL);
}
else
*++end = '\0';
if (!rfc822_valid_msgid((unsigned char *)start)) {
report(stderr,
GT_("Invalid APOP timestamp.\n"));
return PS_AUTHFAIL;
}
msg = (char *)xmalloc((end-start+1) + strlen(ctl->password) + 1);
strcpy(msg,start);
strcat(msg,ctl->password);
strcpy((char *)ctl->digest, MD5Digest((unsigned char *)msg));
free(msg);
ok = gen_transact(sock, "APOP %s %s", ctl->remotename, (char *)ctl->digest);
break;
case P_RPOP:
if ((ok = gen_transact(sock,"USER %s", ctl->remotename)) == 0) {
strlcpy(shroud, ctl->password, sizeof(shroud));
ok = gen_transact(sock, "RPOP %s", ctl->password);
memset(shroud, 0x55, sizeof(shroud));
shroud[0] = '\0';
}
break;
default:
report(stderr, GT_("Undefined protocol request in POP3_auth\n"));
ok = PS_ERROR;
}
#ifdef SSL_ENABLE
if (connection_may_have_tls_errors
&& (ok == PS_SOCKET || ok == PS_PROTOCOL))
{
xfree(ctl->sslproto);
ctl->sslproto = xstrdup("");
ok = PS_REPOLL;
}
#endif
if (ok != 0)
{
if (ok == PS_LOCKBUSY)
report(stderr, GT_("lock busy! Is another session active?\n"));
return(ok);
}
#ifdef WANT_BOGUS
sleep(3);
#endif
return(PS_SUCCESS);
}
static void trim(char *s) {
s += strcspn(s, POSIX_space);
s[0] = '\0';
}
static int pop3_gettopid(int sock, int num , char *id, size_t idsize)
{
int ok;
int got_it;
char buf [POPBUFSIZE+1];
snprintf(buf, sizeof(buf), "TOP %d 1", num);
if ((ok = gen_transact(sock, "%s", buf)) != 0)
return ok;
got_it = 0;
while (gen_recv(sock, buf, sizeof(buf)) == 0)
{
if (DOTLINE(buf))
break;
if (!got_it && 0 == strncasecmp("Message-Id:", buf, 11)) {
char *p = buf + 11;
got_it = 1;
p += strspn(p, POSIX_space);
strlcpy(id, p, idsize);
trim(id);
}
}
return 0;
}
static int parseuid(const char *buf, unsigned long *gotnum, char *id, size_t idsize)
{
const char *i;
char *j;
i = buf;
i += strspn(i, POSIX_space);
errno = 0;
*gotnum = strtoul(i, &j, 10);
if (j == i || !*j || errno || NULL == strchr(POSIX_space, *j)) {
report(stderr, GT_("Cannot handle UIDL response from upstream server.\n"));
return PS_PROTOCOL;
}
j += strspn(j, POSIX_space);
strlcpy(id, j, idsize);
trim(id);
return PS_SUCCESS;
}
static int pop3_getuidl(int sock, int num, char *id , size_t idsize)
{
int ok;
char buf [POPBUFSIZE+1];
unsigned long gotnum;
gen_send(sock, "UIDL %d", num);
if ((ok = pop3_ok(sock, buf)) != 0)
return(ok);
if ((ok = parseuid(buf, &gotnum, id, idsize)))
return ok;
if (gotnum != (unsigned long)num) {
report(stderr, GT_("Server responded with UID for wrong message.\n"));
return PS_PROTOCOL;
}
return(PS_SUCCESS);
}
static int pop3_fastuidl( int sock, struct query *ctl, unsigned int count, int *newp)
{
int ok;
unsigned int first_nr, last_nr, try_nr;
char id [IDLEN+1];
first_nr = 0;
last_nr = count + 1;
while (first_nr < last_nr - 1)
{
struct idlist *newl;
try_nr = (first_nr + last_nr) / 2;
if ((ok = pop3_getuidl(sock, try_nr, id, sizeof(id))) != 0)
return ok;
if ((newl = str_in_list(&ctl->oldsaved, id, FALSE)))
{
flag mark = newl->val.status.mark;
if (mark == UID_DELETED || mark == UID_EXPUNGED)
{
if (outlevel >= O_VERBOSE)
report(stderr, GT_("id=%s (num=%u) was deleted, but is still present!\n"), id, try_nr);
newl->val.status.mark = mark = UID_SEEN;
}
if (mark == UID_UNSEEN)
{
if (outlevel >= O_DEBUG)
report(stdout, GT_("%u is unseen\n"), try_nr);
last_nr = try_nr;
}
else
first_nr = try_nr;
newl->val.status.num = try_nr;
}
else
{
if (outlevel >= O_DEBUG)
report(stdout, GT_("%u is unseen\n"), try_nr);
last_nr = try_nr;
newl = save_str(&ctl->oldsaved, id, UID_UNSEEN);
newl->val.status.num = try_nr;
}
}
if (outlevel >= O_DEBUG && last_nr <= count)
report(stdout, GT_("%u is first unseen\n"), last_nr);
*newp = count - first_nr;
last = first_nr;
return 0;
}
static int pop3_slowuidl( int sock, struct query *ctl, int *countp, int *newp)
{
int ok, nolinear = 0;
int first_nr, list_len, try_id, try_nr, add_id;
int num;
char id [IDLEN+1];
if ((ok = pop3_gettopid(sock, 1, id, sizeof(id))) != 0)
return ok;
if( ( first_nr = str_nr_in_list(&ctl->oldsaved, id) ) == -1 ) {
*newp = *countp;
return 0;
}
list_len = count_list( &ctl->oldsaved );
try_id = list_len - first_nr;
if( try_id > 1 ) {
if( try_id <= *countp ) {
if ((ok = pop3_gettopid(sock, try_id, id, sizeof(id))) != 0)
return ok;
try_nr = str_nr_last_in_list(&ctl->oldsaved, id);
} else {
try_id = *countp+1;
try_nr = -1;
}
if( try_nr != list_len -1 ) {
if( try_nr == -1 ) {
nolinear = 1;
for( add_id = 1<<30; add_id > try_id-1; add_id >>= 1 )
;
for( ; add_id; add_id >>= 1 ) {
if( try_nr == -1 ) {
if( try_id - add_id <= 1 ) {
continue;
}
try_id -= add_id;
} else
try_id += add_id;
if ((ok = pop3_gettopid(sock, try_id, id, sizeof(id))) != 0)
return ok;
try_nr = str_nr_in_list(&ctl->oldsaved, id);
}
if( try_nr == -1 ) {
try_id--;
}
} else {
report(stderr,
GT_("Messages inserted into list on server. Cannot handle this.\n"));
return -1;
}
}
}
for( num = first_nr; num < list_len; num++ )
{
struct idlist *newl = save_str(&ctl->newsaved,
str_from_nr_list(&ctl->oldsaved, num),
UID_UNSEEN);
newl->val.status.num = num - first_nr + 1;
}
if( nolinear ) {
free_str_list(&ctl->oldsaved);
ctl->oldsaved = 0;
last = try_id;
}
*newp = *countp - try_id;
return 0;
}
static int pop3_getrange(int sock,
struct query *ctl,
const char *folder,
int *countp, int *newp, int *bytes)
{
int ok;
char buf [POPBUFSIZE+1];
(void)folder;
ctl->newsaved = (struct idlist *)NULL;
#ifdef MBOX
if (folder)
if ((ok = gen_transact(sock, "MBOX %s", folder)))
return ok;
#endif
gen_send(sock, "STAT");
ok = pop3_ok(sock, buf);
if (ok == 0) {
int asgn;
asgn = sscanf(buf,"%d %d", countp, bytes);
if (asgn != 2)
return PS_PROTOCOL;
} else
return(ok);
last = 0;
*newp = -1;
if (*countp > 0 && (!ctl->fetchall || ctl->server.uidl))
{
int fastuidl;
char id [IDLEN+1];
fastuidl = ctl->fastuidl;
if (*countp > 7 &&
!ctl->fetchall &&
!ctl->flush &&
NUM_NONZERO (fastuidl))
{
if (fastuidl == 1)
dofastuidl = 1;
else
dofastuidl = ctl->fastuidlcount != 0;
}
else
dofastuidl = 0;
if (!ctl->server.uidl) {
gen_send(sock, "LAST");
ok = pop3_ok(sock, buf);
} else
ok = 1;
if (ok == 0)
{
if (sscanf(buf, "%d", &last) == 0)
{
report(stderr, GT_("protocol error\n"));
return(PS_ERROR);
}
*newp = (*countp - last);
}
else
{
if (dofastuidl)
return(pop3_fastuidl( sock, ctl, *countp, newp));
if (gen_transact(sock, "UIDL") != 0)
{
if (pop3_slowuidl(sock, ctl, countp, newp))
{
report(stderr, GT_("protocol error while fetching UIDLs\n"));
return(PS_ERROR);
}
}
else
{
unsigned long unum;
*newp = 0;
while (gen_recv(sock, buf, sizeof(buf)) == PS_SUCCESS)
{
if (DOTLINE(buf))
break;
if (parseuid(buf, &unum, id, sizeof(id)) == PS_SUCCESS)
{
struct idlist *old, *newl;
newl = save_str(&ctl->newsaved, id, UID_UNSEEN);
newl->val.status.num = unum;
if ((old = str_in_list(&ctl->oldsaved, id, FALSE)))
{
flag mark = old->val.status.mark;
if (mark == UID_DELETED || mark == UID_EXPUNGED)
{
if (outlevel >= O_VERBOSE)
report(stderr, GT_("id=%s (num=%d) was deleted, but is still present!\n"), id, (int)unum);
old->val.status.mark = mark = UID_SEEN;
}
newl->val.status.mark = mark;
if (mark == UID_UNSEEN)
{
(*newp)++;
if (outlevel >= O_DEBUG)
report(stdout, GT_("%u is unseen\n"), (unsigned int)unum);
}
}
else
{
(*newp)++;
if (outlevel >= O_DEBUG)
report(stdout, GT_("%u is unseen\n"), (unsigned int)unum);
old = save_str(&ctl->oldsaved, id, UID_UNSEEN);
}
old->val.status.num = unum;
} else
return PS_ERROR;
}
}
}
}
return(PS_SUCCESS);
}
static int pop3_getpartialsizes(int sock, int first, int last, int *sizes)
{
int ok = 0, i, num;
char buf [POPBUFSIZE+1];
unsigned int size;
for (i = first; i <= last; i++) {
gen_send(sock, "LIST %d", i);
if ((ok = pop3_ok(sock, buf)) != 0)
return(ok);
if (sscanf(buf, "%d %u", &num, &size) == 2) {
if (num == i)
sizes[i - first] = size;
else
report(stderr, "Warning: ignoring bogus data for message sizes returned by server.\n");
}
}
return(ok);
}
static int pop3_getsizes(int sock, int count, int *sizes)
{
int ok;
if ((ok = gen_transact(sock, "LIST")) != 0)
return(ok);
else
{
char buf [POPBUFSIZE+1];
while ((ok = gen_recv(sock, buf, sizeof(buf))) == 0)
{
unsigned int num, size;
if (DOTLINE(buf))
break;
else if (sscanf(buf, "%u %u", &num, &size) == 2) {
if (num > 0 && num <= (unsigned)count)
sizes[num - 1] = size;
else
report(stderr, "Warning: ignoring bogus data for message sizes returned by server.\n");
}
}
return(ok);
}
}
static int pop3_is_old(int sock, struct query *ctl, int num)
{
struct idlist *newl;
if (!ctl->oldsaved)
return (num <= last);
else if (dofastuidl)
{
char id [IDLEN+1];
if (num <= last)
return(TRUE);
if ((newl = id_find(&ctl->oldsaved, num)))
{
return(newl->val.status.mark != UID_UNSEEN);
}
if (pop3_getuidl(sock, num, id, sizeof(id)) != PS_SUCCESS)
return(TRUE);
if ((newl = str_in_list(&ctl->oldsaved, id, FALSE))) {
newl->val.status.num = num;
return(newl->val.status.mark != UID_UNSEEN);
}
newl = save_str(&ctl->oldsaved, id, UID_UNSEEN);
newl->val.status.num = num;
return(FALSE);
}
else
return ((newl = id_find(&ctl->newsaved, num)) != NULL &&
newl->val.status.mark != UID_UNSEEN);
}
#ifdef UNUSED
static int pop_fetch_headers(int sock, struct query *ctl,int number,int *lenp)
{
int ok;
char buf[POPBUFSIZE+1];
gen_send(sock, "TOP %d 0", number);
if ((ok = pop3_ok(sock, buf)) != 0)
return(ok);
*lenp = -1;
return(PS_SUCCESS);
}
#endif
static int pop3_fetch(int sock, struct query *ctl, int number, int *lenp)
{
int ok;
char buf[POPBUFSIZE+1];
#ifdef SDPS_ENABLE
if (ctl->server.sdps)
{
int linecount = 0;
sdps_envfrom = (char *)NULL;
sdps_envto = (char *)NULL;
gen_send(sock, "*ENV %d", number);
do {
if (gen_recv(sock, buf, sizeof(buf)))
{
break;
}
linecount++;
switch (linecount) {
case 4:
if (strspn(buf, " \t") == strlen(buf))
strcpy(buf, "<>");
sdps_envfrom = (char *)xmalloc(strlen(buf)+1);
strcpy(sdps_envfrom,buf);
break;
case 5:
sdps_envto = (char *)xmalloc(strlen(buf)+7);
sprintf(sdps_envto,"To: <%s>",buf);
break;
}
} while
(!(buf[0] == '.' && (buf[1] == '\r' || buf[1] == '\n' || buf[1] == '\0')));
}
#else
(void)ctl;
#endif
if (!peek_capable)
gen_send(sock, "RETR %d", number);
else
gen_send(sock, "TOP %d 99999999", number);
if ((ok = pop3_ok(sock, buf)) != 0)
return(ok);
*lenp = -1;
return(PS_SUCCESS);
}
static void mark_uid_seen(struct query *ctl, int number)
{
struct idlist *sdp;
if ((sdp = id_find(&ctl->newsaved, number)))
sdp->val.status.mark = UID_SEEN;
if ((sdp = id_find(&ctl->oldsaved, number)))
sdp->val.status.mark = UID_SEEN;
}
static int pop3_delete(int sock, struct query *ctl, int number)
{
int ok;
mark_uid_seen(ctl, number);
ok = gen_transact(sock, "DELE %d", number);
if (ok != PS_SUCCESS)
return(ok);
delete_str(dofastuidl ? &ctl->oldsaved : &ctl->newsaved, number);
return(PS_SUCCESS);
}
static int pop3_mark_seen(int sock, struct query *ctl, int number)
{
(void)sock;
mark_uid_seen(ctl, number);
return(PS_SUCCESS);
}
static int pop3_logout(int sock, struct query *ctl)
{
int ok;
#ifdef __UNUSED__
if (ctl->keep)
gen_transact(sock, "RSET");
#endif
ok = gen_transact(sock, "QUIT");
if (!ok)
expunge_uids(ctl);
return(ok);
}
static const struct method pop3 =
{
"POP3",
"pop3",
"pop3s",
FALSE,
TRUE,
pop3_ok,
pop3_getauth,
pop3_getrange,
pop3_getsizes,
pop3_getpartialsizes,
pop3_is_old,
pop3_fetch,
NULL,
NULL,
pop3_delete,
pop3_mark_seen,
NULL,
pop3_logout,
FALSE,
};
int doPOP3 (struct query *ctl)
{
#ifndef MBOX
if (ctl->mailboxes->id) {
fprintf(stderr,GT_("Option --folder is not supported with POP3\n"));
return(PS_SYNTAX);
}
#endif
return(do_protocol(ctl, &pop3));
}
#endif