Changes for kernel and Busybox
[tomato.git] / release / src / router / busybox / mailutils / mail.c
blob199f644077c9f86c08f687ec9e10f01bf28b554d
1 /* vi: set sw=4 ts=4: */
2 /*
3 * helper routines
5 * Copyright (C) 2008 by Vladimir Dronnikov <dronnikov@gmail.com>
7 * Licensed under GPLv2, see file LICENSE in this source tree.
8 */
9 #include "libbb.h"
10 #include "mail.h"
12 static void kill_helper(void)
14 if (G.helper_pid > 0) {
15 kill(G.helper_pid, SIGTERM);
16 G.helper_pid = 0;
20 // generic signal handler
21 static void signal_handler(int signo)
23 #define err signo
24 if (SIGALRM == signo) {
25 kill_helper();
26 bb_error_msg_and_die("timed out");
29 // SIGCHLD. reap zombies
30 if (safe_waitpid(G.helper_pid, &err, WNOHANG) > 0) {
31 if (WIFSIGNALED(err))
32 bb_error_msg_and_die("helper killed by signal %u", WTERMSIG(err));
33 if (WIFEXITED(err)) {
34 G.helper_pid = 0;
35 if (WEXITSTATUS(err))
36 bb_error_msg_and_die("helper exited (%u)", WEXITSTATUS(err));
39 #undef err
42 void FAST_FUNC launch_helper(const char **argv)
44 // setup vanilla unidirectional pipes interchange
45 int i;
46 int pipes[4];
48 xpipe(pipes);
49 xpipe(pipes + 2);
51 // NB: handler must be installed before vfork
52 bb_signals(0
53 + (1 << SIGCHLD)
54 + (1 << SIGALRM)
55 , signal_handler);
57 G.helper_pid = xvfork();
59 i = (!G.helper_pid) * 2; // for parent:0, for child:2
60 close(pipes[i + 1]); // 1 or 3 - closing one write end
61 close(pipes[2 - i]); // 2 or 0 - closing one read end
62 xmove_fd(pipes[i], STDIN_FILENO); // 0 or 2 - using other read end
63 xmove_fd(pipes[3 - i], STDOUT_FILENO); // 3 or 1 - using other write end
64 // End result:
65 // parent stdout [3] -> child stdin [2]
66 // child stdout [1] -> parent stdin [0]
68 if (!G.helper_pid) {
69 // child: try to execute connection helper
70 // NB: SIGCHLD & SIGALRM revert to SIG_DFL on exec
71 BB_EXECVP_or_die((char**)argv);
74 // parent
75 // check whether child is alive
76 //redundant:signal_handler(SIGCHLD);
77 // child seems OK -> parent goes on
78 atexit(kill_helper);
81 char* FAST_FUNC send_mail_command(const char *fmt, const char *param)
83 char *msg;
84 if (timeout)
85 alarm(timeout);
86 msg = (char*)fmt;
87 if (fmt) {
88 msg = xasprintf(fmt, param);
89 if (verbose)
90 bb_error_msg("send:'%s'", msg);
91 printf("%s\r\n", msg);
93 fflush_all();
94 return msg;
97 // NB: parse_url can modify url[] (despite const), but only if '@' is there
99 static char* FAST_FUNC parse_url(char *url, char **user, char **pass)
101 // parse [user[:pass]@]host
102 // return host
103 char *s = strchr(url, '@');
104 *user = *pass = NULL;
105 if (s) {
106 *s++ = '\0';
107 *user = url;
108 url = s;
109 s = strchr(*user, ':');
110 if (s) {
111 *s++ = '\0';
112 *pass = s;
115 return url;
119 void FAST_FUNC encode_base64(char *fname, const char *text, const char *eol)
121 enum {
122 SRC_BUF_SIZE = 57, /* This *MUST* be a multiple of 3 */
123 DST_BUF_SIZE = 4 * ((SRC_BUF_SIZE + 2) / 3),
125 #define src_buf text
126 char src[SRC_BUF_SIZE];
127 FILE *fp = fp;
128 ssize_t len = len;
129 char dst_buf[DST_BUF_SIZE + 1];
131 if (fname) {
132 fp = (NOT_LONE_DASH(fname)) ? xfopen_for_read(fname) : (FILE *)text;
133 src_buf = src;
134 } else if (text) {
135 // though we do not call uuencode(NULL, NULL) explicitly
136 // still we do not want to break things suddenly
137 len = strlen(text);
138 } else
139 return;
141 while (1) {
142 size_t size;
143 if (fname) {
144 size = fread((char *)src_buf, 1, SRC_BUF_SIZE, fp);
145 if ((ssize_t)size < 0)
146 bb_perror_msg_and_die(bb_msg_read_error);
147 } else {
148 size = len;
149 if (len > SRC_BUF_SIZE)
150 size = SRC_BUF_SIZE;
152 if (!size)
153 break;
154 // encode the buffer we just read in
155 bb_uuencode(dst_buf, src_buf, size, bb_uuenc_tbl_base64);
156 if (fname) {
157 printf("%s\n", eol);
158 } else {
159 src_buf += size;
160 len -= size;
162 fwrite(dst_buf, 1, 4 * ((size + 2) / 3), stdout);
164 if (fname && NOT_LONE_DASH(fname))
165 fclose(fp);
166 #undef src_buf
170 * get username and password from a file descriptor
172 void FAST_FUNC get_cred_or_die(int fd)
174 if (isatty(fd)) {
175 G.user = xstrdup(bb_ask(fd, /* timeout: */ 0, "User: "));
176 G.pass = xstrdup(bb_ask(fd, /* timeout: */ 0, "Password: "));
177 } else {
178 G.user = xmalloc_reads(fd, /* maxsize: */ NULL);
179 G.pass = xmalloc_reads(fd, /* maxsize: */ NULL);
181 if (!G.user || !*G.user || !G.pass)
182 bb_error_msg_and_die("no username or password");