1 /* vi: set sw=4 ts=4: */
5 * Copyright (C) 2008 by Vladimir Dronnikov <dronnikov@gmail.com>
7 * Licensed under GPLv2, see file LICENSE in this source tree.
12 static void kill_helper(void)
14 if (G
.helper_pid
> 0) {
15 kill(G
.helper_pid
, SIGTERM
);
20 // generic signal handler
21 static void signal_handler(int signo
)
24 if (SIGALRM
== signo
) {
26 bb_error_msg_and_die("timed out");
29 // SIGCHLD. reap zombies
30 if (safe_waitpid(G
.helper_pid
, &err
, WNOHANG
) > 0) {
32 bb_error_msg_and_die("helper killed by signal %u", WTERMSIG(err
));
36 bb_error_msg_and_die("helper exited (%u)", WEXITSTATUS(err
));
42 void FAST_FUNC
launch_helper(const char **argv
)
44 // setup vanilla unidirectional pipes interchange
51 // NB: handler must be installed before vfork
57 G
.helper_pid
= xvfork();
59 i
= (!G
.helper_pid
) * 2; // for parent:0, for child:2
60 close(pipes
[i
+ 1]); // 1 or 3 - closing one write end
61 close(pipes
[2 - i
]); // 2 or 0 - closing one read end
62 xmove_fd(pipes
[i
], STDIN_FILENO
); // 0 or 2 - using other read end
63 xmove_fd(pipes
[3 - i
], STDOUT_FILENO
); // 3 or 1 - using other write end
65 // parent stdout [3] -> child stdin [2]
66 // child stdout [1] -> parent stdin [0]
69 // child: try to execute connection helper
70 // NB: SIGCHLD & SIGALRM revert to SIG_DFL on exec
71 BB_EXECVP_or_die((char**)argv
);
75 // check whether child is alive
76 //redundant:signal_handler(SIGCHLD);
77 // child seems OK -> parent goes on
81 char* FAST_FUNC
send_mail_command(const char *fmt
, const char *param
)
88 msg
= xasprintf(fmt
, param
);
90 bb_error_msg("send:'%s'", msg
);
91 printf("%s\r\n", msg
);
97 // NB: parse_url can modify url[] (despite const), but only if '@' is there
99 static char* FAST_FUNC parse_url(char *url, char **user, char **pass)
101 // parse [user[:pass]@]host
103 char *s = strchr(url, '@');
104 *user = *pass = NULL;
109 s = strchr(*user, ':');
119 void FAST_FUNC
encode_base64(char *fname
, const char *text
, const char *eol
)
122 SRC_BUF_SIZE
= 57, /* This *MUST* be a multiple of 3 */
123 DST_BUF_SIZE
= 4 * ((SRC_BUF_SIZE
+ 2) / 3),
126 char src
[SRC_BUF_SIZE
];
129 char dst_buf
[DST_BUF_SIZE
+ 1];
132 fp
= (NOT_LONE_DASH(fname
)) ? xfopen_for_read(fname
) : (FILE *)text
;
135 // though we do not call uuencode(NULL, NULL) explicitly
136 // still we do not want to break things suddenly
144 size
= fread((char *)src_buf
, 1, SRC_BUF_SIZE
, fp
);
145 if ((ssize_t
)size
< 0)
146 bb_perror_msg_and_die(bb_msg_read_error
);
149 if (len
> SRC_BUF_SIZE
)
154 // encode the buffer we just read in
155 bb_uuencode(dst_buf
, src_buf
, size
, bb_uuenc_tbl_base64
);
162 fwrite(dst_buf
, 1, 4 * ((size
+ 2) / 3), stdout
);
164 if (fname
&& NOT_LONE_DASH(fname
))
170 * get username and password from a file descriptor
172 void FAST_FUNC
get_cred_or_die(int fd
)
175 G
.user
= xstrdup(bb_ask(fd
, /* timeout: */ 0, "User: "));
176 G
.pass
= xstrdup(bb_ask(fd
, /* timeout: */ 0, "Password: "));
178 G
.user
= xmalloc_reads(fd
, /* maxsize: */ NULL
);
179 G
.pass
= xmalloc_reads(fd
, /* maxsize: */ NULL
);
181 if (!G
.user
|| !*G
.user
|| !G
.pass
)
182 bb_error_msg_and_die("no username or password");