T Capa_new(Mempool_T pool) { Field_T val; char maxcapa[MAX_CAPASIZE]; T A; A = mempool_pop(pool, sizeof(*A)); A->pool = pool; char **v, **h; memset(&maxcapa,0,sizeof(maxcapa)); GETCONFIGVALUE("capability", "IMAP", val); if (strlen(val) > 0) strncpy((char *)maxcapa, val, MAX_CAPASIZE-1); else strncpy((char *)maxcapa, IMAP_CAPABILITY_STRING, MAX_CAPASIZE-1); A->max_set = p_list_new(A->pool); A->current_set = p_list_new(A->pool); h = v = g_strsplit(maxcapa, " ", -1); while (*v) { String_T S = p_string_new(A->pool, *v++); A->max_set = p_list_append(A->max_set, S); A->current_set = p_list_append(A->current_set, S); assert(A->current_set); } g_strfreev(h); A->dirty = TRUE; return A; }
void imap_cb_time(void *arg) { Field_T interval; int idle_interval = 10; ImapSession *session = (ImapSession *) arg; TRACE(TRACE_DEBUG,"[%p]", session); if ( session->command_type == IMAP_COMM_IDLE && session->command_state == IDLE ) { // session is in a IDLE loop GETCONFIGVALUE("idle_interval", "IMAP", interval); if (strlen(interval) > 0) { int i = atoi(interval); if (i > 0 && i < 1000) idle_interval = i; } ci_cork(session->ci); if (! (++session->loop % idle_interval)) { imap_session_printf(session, "* OK\r\n"); } dbmail_imap_session_mailbox_status(session,TRUE); dbmail_imap_session_buff_flush(session); ci_uncork(session->ci); } else { dbmail_imap_session_set_state(session,CLIENTSTATE_ERROR); imap_session_printf(session, "%s", IMAP_TIMEOUT_MSG); imap_session_bailout(session); } }
static void send_greeting(ImapSession *session) { /* greet user */ Field_T banner; GETCONFIGVALUE("banner", "IMAP", banner); if (strlen(banner) > 0) imap_session_printf(session, "* OK [CAPABILITY %s] %s\r\n", Capa_as_string(session->preauth_capa), banner); else imap_session_printf(session, "* OK [CAPABILITY %s] dbmail %s ready.\r\n", Capa_as_string(session->preauth_capa), DM_VERSION); dbmail_imap_session_set_state(session, CLIENTSTATE_NON_AUTHENTICATED); }
void send_greeting(ClientSession_T *session) { Field_T banner; GETCONFIGVALUE("banner", "LMTP", banner); if (! dm_db_ping()) { ci_write(session->ci, "500 database has gone fishing BYE\r\n"); session->state = QUIT; return; } if (strlen(banner) > 0) ci_write(session->ci, "220 %s %s\r\n", session->hostname, banner); else ci_write(session->ci, "220 %s LMTP\r\n", session->hostname); }
static void send_greeting(ClientSession_T *session) { Field_T banner; GETCONFIGVALUE("banner", "POP", banner); if (! dm_db_ping()) { ci_write(session->ci, "+ERR database has gone fishing\r\n"); session->state = CLIENTSTATE_QUIT; return; } if (strlen(banner) > 0) { ci_write(session->ci, "+OK %s %s\r\n", banner, session->apop_stamp); } else { ci_write(session->ci, "+OK DBMAIL pop3 server ready to rock %s\r\n", session->apop_stamp); } }
static void send_greeting(ClientSession_t *session) { field_t banner; GETCONFIGVALUE("banner", "SIEVE", banner); if (! dm_db_ping()) { ci_write(session->ci, "BYE \"database has gone fishing\"\r\n"); session->state = QUIT; return; } if (strlen(banner) > 0) ci_write(session->ci, "\"IMPLEMENTATION\" \"%s\"\r\n", banner); else ci_write(session->ci, "\"IMPLEMENTATION\" \"DBMail timsieved %s\"\r\n", VERSION); ci_write(session->ci, "\"SASL\" \"PLAIN\"\r\n"); ci_write(session->ci, "\"SIEVE\" \"%s\"\r\n", sieve_extensions); ci_write(session->ci, "OK\r\n"); }
static void __auth_get_config(void) { GETCONFIGVALUE("BIND_DN", "LDAP", _ldap_cfg.bind_dn); GETCONFIGVALUE("BIND_PW", "LDAP", _ldap_cfg.bind_pw); GETCONFIGVALUE("BASE_DN", "LDAP", _ldap_cfg.base_dn); GETCONFIGVALUE("PORT", "LDAP", _ldap_cfg.port); GETCONFIGVALUE("URI", "LDAP", _ldap_cfg.uri); GETCONFIGVALUE("VERSION", "LDAP", _ldap_cfg.version); GETCONFIGVALUE("HOSTNAME", "LDAP", _ldap_cfg.hostname); GETCONFIGVALUE("USER_OBJECTCLASS", "LDAP", _ldap_cfg.user_objectclass); GETCONFIGVALUE("FORW_OBJECTCLASS", "LDAP", _ldap_cfg.forw_objectclass); GETCONFIGVALUE("CN_STRING", "LDAP", _ldap_cfg.cn_string); GETCONFIGVALUE("FIELD_UID", "LDAP", _ldap_cfg.field_uid); GETCONFIGVALUE("FIELD_CID", "LDAP", _ldap_cfg.field_cid); GETCONFIGVALUE("MIN_CID", "LDAP", _ldap_cfg.min_cid); GETCONFIGVALUE("MAX_CID", "LDAP", _ldap_cfg.max_cid); GETCONFIGVALUE("FIELD_NID", "LDAP", _ldap_cfg.field_nid); GETCONFIGVALUE("MIN_NID", "LDAP", _ldap_cfg.min_nid); GETCONFIGVALUE("MAX_NID", "LDAP", _ldap_cfg.max_nid); GETCONFIGVALUE("FIELD_MAIL", "LDAP", _ldap_cfg.field_mail); GETCONFIGVALUE("FIELD_QUOTA", "LDAP", _ldap_cfg.field_maxmail); GETCONFIGVALUE("FIELD_PASSWD", "LDAP", _ldap_cfg.field_passwd); GETCONFIGVALUE("FIELD_FWDTARGET", "LDAP", _ldap_cfg.field_fwdtarget); GETCONFIGVALUE("QUERY_STRING", "LDAP", _ldap_cfg.query_string); GETCONFIGVALUE("SCOPE", "LDAP", _ldap_cfg.scope); GETCONFIGVALUE("REFERRALS", "LDAP", _ldap_cfg.referrals); /* Store the port as an integer for later use. */ _ldap_cfg.port_int = atoi(_ldap_cfg.port); /* Store the version as an integer for later use. */ _ldap_cfg.version_int = atoi(_ldap_cfg.version); /* defaults to version 3 */ if (!_ldap_cfg.version_int) _ldap_cfg.version_int=3; /* Compare the input string with the possible options, * making sure not to exceeed the length of the given string */ { int len = (strlen(_ldap_cfg.scope) < 3 ? strlen(_ldap_cfg.scope) : 3); if (strncasecmp(_ldap_cfg.scope, "one", len) == 0) _ldap_cfg.scope_int = LDAP_SCOPE_ONELEVEL; else if (strncasecmp(_ldap_cfg.scope, "bas", len) == 0) _ldap_cfg.scope_int = LDAP_SCOPE_BASE; else if (strncasecmp(_ldap_cfg.scope, "sub", len) == 0) _ldap_cfg.scope_int = LDAP_SCOPE_SUBTREE; else _ldap_cfg.scope_int = LDAP_SCOPE_SUBTREE; } TRACE(TRACE_DEBUG, "integer ldap scope is [%d]", _ldap_cfg.scope_int); }
int pop3(ClientSession_T *session, const char *buffer) { /* returns a 0 on a quit * -1 on a failure * 1 on a success */ char *command, *value, *searchptr, *enctype, *s; Pop3Cmd cmdtype; int found = 0; //int indx = 0; int validate_result; bool login_disabled = FALSE; uint64_t result, top_lines, top_messageid, user_idnr; unsigned char *md5_apop_he; struct message *msg; ClientBase_T *ci = session->ci; s = (char *)buffer; strip_crlf(s); g_strstrip(s); TRACE(TRACE_DEBUG, "incoming buffer: [%s]", s); if (! strlen(s)) return 1; int state = session->state; /* check for command issued */ /* while (strchr(ValidNetworkChars, s[indx++])) ; */ command = s; value = strstr(command, " "); /* look for the separator */ if (value != NULL) { *value = '\0'; /* set a \0 on the command end */ value++; /* skip space */ if (strlen(value) == 0) value = NULL; /* no value specified */ else { TRACE(TRACE_DEBUG, "state[%d], command issued :cmd [%s], value [%s]\n", state, command, value); } } /* find command that was issued */ for (cmdtype = POP3_QUIT; cmdtype < POP3_FAIL; cmdtype++) if (strcasecmp(command, commands[cmdtype]) == 0) { session->was_apop = 1; break; } TRACE(TRACE_DEBUG, "command looked up as commandtype %d", cmdtype); /* commands that are allowed to have no arguments */ if (value == NULL) { switch (cmdtype) { case POP3_QUIT: case POP3_LIST: case POP3_STAT: case POP3_RSET: case POP3_NOOP: case POP3_LAST: case POP3_UIDL: case POP3_AUTH: case POP3_CAPA: case POP3_STLS: break; default: return pop3_error(session, "-ERR your command does not compute\r\n"); break; } } if (state == CLIENTSTATE_INITIAL_CONNECT) { if (server_conf->ssl) { Field_T val; GETCONFIGVALUE("login_disabled", "POP", val); if (SMATCH(val, "yes")) login_disabled = TRUE; } } switch (cmdtype) { case POP3_QUIT: /* We return 0 here, and then pop3_handle_connection cleans up * the connection, commits all changes, and sends the final * "OK" message indicating that QUIT has completed. */ session->state = CLIENTSTATE_LOGOUT; session->SessionResult = 0; pop3_close(session); return 0; case POP3_STLS: if (state != CLIENTSTATE_INITIAL_CONNECT) return pop3_error(session, "-ERR wrong command mode\r\n"); if (! server_conf->ssl) return pop3_error(session, "-ERR server error\r\n"); if (session->ci->sock->ssl_state) return pop3_error(session, "-ERR TLS already active\r\n"); ci_write(session->ci, "+OK Begin TLS now\r\n"); if (ci_starttls(session->ci) < 0) return -1; return 1; case POP3_USER: if (state != CLIENTSTATE_INITIAL_CONNECT) return pop3_error(session, "-ERR wrong command mode\r\n"); if (login_disabled && ! session->ci->sock->ssl_state) return pop3_error(session, "-ERR try STLS\r\n"); if (session->username != NULL) { /* reset username */ g_free(session->username); session->username = NULL; } if (session->username == NULL) { /* create memspace for username */ session->username = g_new0(char,strlen(value) + 1); strncpy(session->username, value, strlen(value) + 1); } ci_write(ci, "+OK Password required for %s\r\n", session->username); return 1; case POP3_PASS: if (state != CLIENTSTATE_INITIAL_CONNECT) return pop3_error(session, "-ERR wrong command mode\r\n"); if (login_disabled && ! session->ci->sock->ssl_state) return pop3_error(session, "-ERR try STLS\r\n"); if (session->password != NULL) { g_free(session->password); session->password = NULL; } if (session->password == NULL) { /* create memspace for password */ session->password = g_new0(char,strlen(value) + 1); strncpy(session->password, value, strlen(value) + 1); }