184 lines
		
	
	
		
			4.0 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			184 lines
		
	
	
		
			4.0 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
/* vi: set sw=4 ts=4: */
 | 
						|
/*
 | 
						|
 * helper routines
 | 
						|
 *
 | 
						|
 * Copyright (C) 2008 by Vladimir Dronnikov <dronnikov@gmail.com>
 | 
						|
 *
 | 
						|
 * Licensed under GPLv2, see file LICENSE in this source tree.
 | 
						|
 */
 | 
						|
#include <sys/prctl.h>
 | 
						|
#include "libbb.h"
 | 
						|
#include "mail.h"
 | 
						|
 | 
						|
// generic signal handler
 | 
						|
static void signal_handler(int signo)
 | 
						|
{
 | 
						|
#define err signo
 | 
						|
	if (SIGALRM == signo) {
 | 
						|
		bb_error_msg_and_die("timed out");
 | 
						|
	}
 | 
						|
 | 
						|
	// SIGCHLD. reap zombies
 | 
						|
	if (safe_waitpid(G.helper_pid, &err, WNOHANG) > 0) {
 | 
						|
		if (WIFSIGNALED(err))
 | 
						|
			bb_error_msg_and_die("helper killed by signal %u", WTERMSIG(err));
 | 
						|
		if (WIFEXITED(err)) {
 | 
						|
			G.helper_pid = 0;
 | 
						|
			if (WEXITSTATUS(err))
 | 
						|
				bb_error_msg_and_die("helper exited (%u)", WEXITSTATUS(err));
 | 
						|
		}
 | 
						|
	}
 | 
						|
#undef err
 | 
						|
}
 | 
						|
 | 
						|
void FAST_FUNC launch_helper(const char **argv)
 | 
						|
{
 | 
						|
	// setup vanilla unidirectional pipes interchange
 | 
						|
	int i;
 | 
						|
	int pipes[4];
 | 
						|
 | 
						|
	xpipe(pipes);
 | 
						|
	xpipe(pipes + 2);
 | 
						|
 | 
						|
	// NB: handler must be installed before vfork
 | 
						|
	bb_signals(0
 | 
						|
		+ (1 << SIGCHLD)
 | 
						|
		+ (1 << SIGALRM)
 | 
						|
		, signal_handler);
 | 
						|
 | 
						|
	G.helper_pid = xvfork();
 | 
						|
 | 
						|
	i = (!G.helper_pid) * 2; // for parent:0, for child:2
 | 
						|
	close(pipes[i + 1]);     // 1 or 3 - closing one write end
 | 
						|
	close(pipes[2 - i]);     // 2 or 0 - closing one read end
 | 
						|
	xmove_fd(pipes[i], STDIN_FILENO);      // 0 or 2 - using other read end
 | 
						|
	xmove_fd(pipes[3 - i], STDOUT_FILENO); // 3 or 1 - using other write end
 | 
						|
	// End result:
 | 
						|
	// parent stdout [3] -> child stdin [2]
 | 
						|
	// child stdout [1] -> parent stdin [0]
 | 
						|
 | 
						|
	if (!G.helper_pid) {
 | 
						|
		// child
 | 
						|
		// if parent dies, get SIGTERM
 | 
						|
		prctl(PR_SET_PDEATHSIG, SIGTERM, 0, 0, 0);
 | 
						|
		// try to execute connection helper
 | 
						|
		// NB: SIGCHLD & SIGALRM revert to SIG_DFL on exec
 | 
						|
		BB_EXECVP_or_die((char**)argv);
 | 
						|
	}
 | 
						|
 | 
						|
	// parent goes on
 | 
						|
}
 | 
						|
 | 
						|
char* FAST_FUNC send_mail_command(const char *fmt, const char *param)
 | 
						|
{
 | 
						|
	char *msg;
 | 
						|
	if (timeout)
 | 
						|
		alarm(timeout);
 | 
						|
	msg = (char*)fmt;
 | 
						|
	if (fmt) {
 | 
						|
		msg = xasprintf(fmt, param);
 | 
						|
		if (verbose)
 | 
						|
			bb_error_msg("send:'%s'", msg);
 | 
						|
		printf("%s\r\n", msg);
 | 
						|
	}
 | 
						|
	fflush_all();
 | 
						|
	return msg;
 | 
						|
}
 | 
						|
 | 
						|
// NB: parse_url can modify url[] (despite const), but only if '@' is there
 | 
						|
/*
 | 
						|
static char* FAST_FUNC parse_url(char *url, char **user, char **pass)
 | 
						|
{
 | 
						|
	// parse [user[:pass]@]host
 | 
						|
	// return host
 | 
						|
	char *s = strchr(url, '@');
 | 
						|
	*user = *pass = NULL;
 | 
						|
	if (s) {
 | 
						|
		*s++ = '\0';
 | 
						|
		*user = url;
 | 
						|
		url = s;
 | 
						|
		s = strchr(*user, ':');
 | 
						|
		if (s) {
 | 
						|
			*s++ = '\0';
 | 
						|
			*pass = s;
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return url;
 | 
						|
}
 | 
						|
*/
 | 
						|
 | 
						|
static void encode_n_base64(const char *fname, const char *text, size_t len)
 | 
						|
{
 | 
						|
	enum {
 | 
						|
		SRC_BUF_SIZE = 57,  /* This *MUST* be a multiple of 3 */
 | 
						|
		DST_BUF_SIZE = 4 * ((SRC_BUF_SIZE + 2) / 3),
 | 
						|
	};
 | 
						|
#define src_buf text
 | 
						|
	char src[SRC_BUF_SIZE];
 | 
						|
	FILE *fp = fp;
 | 
						|
	char dst_buf[DST_BUF_SIZE + 1];
 | 
						|
 | 
						|
	if (fname) {
 | 
						|
		fp = (NOT_LONE_DASH(fname)) ? xfopen_for_read(fname) : stdin;
 | 
						|
		src_buf = src;
 | 
						|
	}
 | 
						|
 | 
						|
	while (1) {
 | 
						|
		size_t size;
 | 
						|
		if (fname) {
 | 
						|
			size = fread((char *)src_buf, 1, SRC_BUF_SIZE, fp);
 | 
						|
			if ((ssize_t)size < 0)
 | 
						|
				bb_perror_msg_and_die(bb_msg_read_error);
 | 
						|
		} else {
 | 
						|
			size = len;
 | 
						|
			if (len > SRC_BUF_SIZE)
 | 
						|
				size = SRC_BUF_SIZE;
 | 
						|
		}
 | 
						|
		if (!size)
 | 
						|
			break;
 | 
						|
		// encode the buffer we just read in
 | 
						|
		bb_uuencode(dst_buf, src_buf, size, bb_uuenc_tbl_base64);
 | 
						|
		if (fname) {
 | 
						|
			puts("");
 | 
						|
		} else {
 | 
						|
			src_buf += size;
 | 
						|
			len -= size;
 | 
						|
		}
 | 
						|
		fwrite(dst_buf, 1, 4 * ((size + 2) / 3), stdout);
 | 
						|
	}
 | 
						|
	if (fname && NOT_LONE_DASH(fname))
 | 
						|
		fclose(fp);
 | 
						|
#undef src_buf
 | 
						|
}
 | 
						|
 | 
						|
void FAST_FUNC printstr_base64(const char *text)
 | 
						|
{
 | 
						|
	encode_n_base64(NULL, text, strlen(text));
 | 
						|
}
 | 
						|
 | 
						|
void FAST_FUNC printbuf_base64(const char *text, unsigned len)
 | 
						|
{
 | 
						|
	encode_n_base64(NULL, text, len);
 | 
						|
}
 | 
						|
 | 
						|
void FAST_FUNC printfile_base64(const char *fname)
 | 
						|
{
 | 
						|
	encode_n_base64(fname, NULL, 0);
 | 
						|
}
 | 
						|
 | 
						|
/*
 | 
						|
 * get username and password from a file descriptor
 | 
						|
 */
 | 
						|
void FAST_FUNC get_cred_or_die(int fd)
 | 
						|
{
 | 
						|
	if (isatty(fd)) {
 | 
						|
		G.user = bb_ask_noecho(fd, /* timeout: */ 0, "User: ");
 | 
						|
		G.pass = bb_ask_noecho(fd, /* timeout: */ 0, "Password: ");
 | 
						|
	} else {
 | 
						|
		G.user = xmalloc_reads(fd, /* maxsize: */ NULL);
 | 
						|
		G.pass = xmalloc_reads(fd, /* maxsize: */ NULL);
 | 
						|
	}
 | 
						|
	if (!G.user || !*G.user || !G.pass)
 | 
						|
		bb_error_msg_and_die("no username or password");
 | 
						|
}
 |