aboutsummaryrefslogtreecommitdiff
path: root/libsylph/nntp.c
diff options
context:
space:
mode:
Diffstat (limited to 'libsylph/nntp.c')
-rw-r--r--libsylph/nntp.c431
1 files changed, 431 insertions, 0 deletions
diff --git a/libsylph/nntp.c b/libsylph/nntp.c
new file mode 100644
index 00000000..7e36baaa
--- /dev/null
+++ b/libsylph/nntp.c
@@ -0,0 +1,431 @@
+/*
+ * Sylpheed -- a GTK+ based, lightweight, and fast e-mail client
+ * Copyright (C) 1999-2004 Hiroyuki Yamamoto
+ *
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation; either version 2 of the License, or
+ * (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program; if not, write to the Free Software
+ * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
+ */
+
+#ifdef HAVE_CONFIG_H
+# include "config.h"
+#endif
+
+#include <glib.h>
+#include <glib/gi18n.h>
+#include <stdio.h>
+#include <string.h>
+
+#include "nntp.h"
+#include "socket.h"
+#include "utils.h"
+#if USE_SSL
+# include "ssl.h"
+#endif
+
+static gint verbose = 1;
+
+static void nntp_session_destroy(Session *session);
+
+static gint nntp_ok (SockInfo *sock,
+ gchar *argbuf);
+
+static gint nntp_gen_send (SockInfo *sock,
+ const gchar *format,
+ ...);
+static gint nntp_gen_recv (SockInfo *sock,
+ gchar *buf,
+ gint size);
+static gint nntp_gen_command (NNTPSession *session,
+ gchar *argbuf,
+ const gchar *format,
+ ...);
+
+
+#if USE_SSL
+Session *nntp_session_new(const gchar *server, gushort port, gchar *buf,
+ const gchar *userid, const gchar *passwd,
+ SSLType ssl_type)
+#else
+Session *nntp_session_new(const gchar *server, gushort port, gchar *buf,
+ const gchar *userid, const gchar *passwd)
+#endif
+{
+ NNTPSession *session;
+ SockInfo *sock;
+
+ if ((sock = sock_connect(server, port)) == NULL) {
+ log_warning(_("Can't connect to NNTP server: %s:%d\n"),
+ server, port);
+ return NULL;
+ }
+
+#if USE_SSL
+ if (ssl_type == SSL_TUNNEL && !ssl_init_socket(sock)) {
+ sock_close(sock);
+ return NULL;
+ }
+#endif
+
+ if (nntp_ok(sock, buf) != NN_SUCCESS) {
+ sock_close(sock);
+ return NULL;
+ }
+
+ session = g_new0(NNTPSession, 1);
+
+ session_init(SESSION(session));
+
+ SESSION(session)->type = SESSION_NEWS;
+ SESSION(session)->server = g_strdup(server);
+ SESSION(session)->sock = sock;
+ SESSION(session)->last_access_time = time(NULL);
+ SESSION(session)->data = NULL;
+
+ SESSION(session)->destroy = nntp_session_destroy;
+
+ session->group = NULL;
+
+ if (userid && passwd) {
+ gint ok;
+
+ session->userid = g_strdup(userid);
+ session->passwd = g_strdup(passwd);
+
+ ok = nntp_gen_send(sock, "AUTHINFO USER %s", session->userid);
+ if (ok != NN_SUCCESS) {
+ session_destroy(SESSION(session));
+ return NULL;
+ }
+ ok = nntp_ok(sock, NULL);
+ if (ok == NN_AUTHCONT) {
+ ok = nntp_gen_send(sock, "AUTHINFO PASS %s",
+ session->passwd);
+ if (ok != NN_SUCCESS) {
+ session_destroy(SESSION(session));
+ return NULL;
+ }
+ ok = nntp_ok(sock, NULL);
+ if (ok != NN_SUCCESS)
+ session->auth_failed = TRUE;
+ }
+ if (ok == NN_SOCKET) {
+ session_destroy(SESSION(session));
+ return NULL;
+ }
+ }
+
+ session_set_access_time(SESSION(session));
+
+ return SESSION(session);
+}
+
+static void nntp_session_destroy(Session *session)
+{
+ NNTPSession *nntp_session = NNTP_SESSION(session);
+
+ g_return_if_fail(session != NULL);
+
+ g_free(nntp_session->group);
+ g_free(nntp_session->userid);
+ g_free(nntp_session->passwd);
+}
+
+gint nntp_group(NNTPSession *session, const gchar *group,
+ gint *num, gint *first, gint *last)
+{
+ gint ok;
+ gint resp;
+ gchar buf[NNTPBUFSIZE];
+
+ ok = nntp_gen_command(session, buf, "GROUP %s", group);
+
+ if (ok != NN_SUCCESS && ok != NN_SOCKET && ok != NN_AUTHREQ) {
+ ok = nntp_mode(session, FALSE);
+ if (ok == NN_SUCCESS)
+ ok = nntp_gen_command(session, buf, "GROUP %s", group);
+ }
+
+ if (ok != NN_SUCCESS)
+ return ok;
+
+ if (sscanf(buf, "%d %d %d %d", &resp, num, first, last)
+ != 4) {
+ log_warning(_("protocol error: %s\n"), buf);
+ return NN_PROTOCOL;
+ }
+
+ return NN_SUCCESS;
+}
+
+gint nntp_get_article(NNTPSession *session, const gchar *cmd, gint num,
+ gchar **msgid)
+{
+ gint ok;
+ gchar buf[NNTPBUFSIZE];
+
+ if (num > 0)
+ ok = nntp_gen_command(session, buf, "%s %d", cmd, num);
+ else
+ ok = nntp_gen_command(session, buf, cmd);
+
+ if (ok != NN_SUCCESS)
+ return ok;
+
+ extract_parenthesis(buf, '<', '>');
+ if (buf[0] == '\0') {
+ log_warning(_("protocol error\n"));
+ *msgid = g_strdup("0");
+ } else
+ *msgid = g_strdup(buf);
+
+ return NN_SUCCESS;
+}
+
+gint nntp_article(NNTPSession *session, gint num, gchar **msgid)
+{
+ return nntp_get_article(session, "ARTICLE", num, msgid);
+}
+
+gint nntp_body(NNTPSession *session, gint num, gchar **msgid)
+{
+ return nntp_get_article(session, "BODY", num, msgid);
+}
+
+gint nntp_head(NNTPSession *session, gint num, gchar **msgid)
+{
+ return nntp_get_article(session, "HEAD", num, msgid);
+}
+
+gint nntp_stat(NNTPSession *session, gint num, gchar **msgid)
+{
+ return nntp_get_article(session, "STAT", num, msgid);
+}
+
+gint nntp_next(NNTPSession *session, gint *num, gchar **msgid)
+{
+ gint ok;
+ gint resp;
+ gchar buf[NNTPBUFSIZE];
+
+ ok = nntp_gen_command(session, buf, "NEXT");
+
+ if (ok != NN_SUCCESS)
+ return ok;
+
+ if (sscanf(buf, "%d %d", &resp, num) != 2) {
+ log_warning(_("protocol error: %s\n"), buf);
+ return NN_PROTOCOL;
+ }
+
+ extract_parenthesis(buf, '<', '>');
+ if (buf[0] == '\0') {
+ log_warning(_("protocol error\n"));
+ return NN_PROTOCOL;
+ }
+ *msgid = g_strdup(buf);
+
+ return NN_SUCCESS;
+}
+
+gint nntp_xover(NNTPSession *session, gint first, gint last)
+{
+ gint ok;
+ gchar buf[NNTPBUFSIZE];
+
+ ok = nntp_gen_command(session, buf, "XOVER %d-%d", first, last);
+ if (ok != NN_SUCCESS)
+ return ok;
+
+ return NN_SUCCESS;
+}
+
+gint nntp_xhdr(NNTPSession *session, const gchar *header, gint first, gint last)
+{
+ gint ok;
+ gchar buf[NNTPBUFSIZE];
+
+ ok = nntp_gen_command(session, buf, "XHDR %s %d-%d",
+ header, first, last);
+ if (ok != NN_SUCCESS)
+ return ok;
+
+ return NN_SUCCESS;
+}
+
+gint nntp_list(NNTPSession *session)
+{
+ return nntp_gen_command(session, NULL, "LIST");
+}
+
+gint nntp_post(NNTPSession *session, FILE *fp)
+{
+ gint ok;
+ gchar buf[NNTPBUFSIZE];
+ gchar *msg;
+
+ ok = nntp_gen_command(session, buf, "POST");
+ if (ok != NN_SUCCESS)
+ return ok;
+
+ msg = get_outgoing_rfc2822_str(fp);
+ if (sock_write_all(SESSION(session)->sock, msg, strlen(msg)) < 0) {
+ log_warning(_("Error occurred while posting\n"));
+ g_free(msg);
+ return NN_SOCKET;
+ }
+ g_free(msg);
+
+ sock_write_all(SESSION(session)->sock, ".\r\n", 3);
+ if ((ok = nntp_ok(SESSION(session)->sock, buf)) != NN_SUCCESS)
+ return ok;
+
+ session_set_access_time(SESSION(session));
+
+ return NN_SUCCESS;
+}
+
+gint nntp_newgroups(NNTPSession *session)
+{
+ return NN_SUCCESS;
+}
+
+gint nntp_newnews(NNTPSession *session)
+{
+ return NN_SUCCESS;
+}
+
+gint nntp_mode(NNTPSession *session, gboolean stream)
+{
+ gint ok;
+
+ ok = nntp_gen_command(session, NULL, "MODE %s",
+ stream ? "STREAM" : "READER");
+
+ return ok;
+}
+
+static gint nntp_ok(SockInfo *sock, gchar *argbuf)
+{
+ gint ok;
+ gchar buf[NNTPBUFSIZE];
+
+ if ((ok = nntp_gen_recv(sock, buf, sizeof(buf))) == NN_SUCCESS) {
+ if (strlen(buf) < 3)
+ return NN_ERROR;
+
+ if ((buf[0] == '1' || buf[0] == '2' || buf[0] == '3') &&
+ (buf[3] == ' ' || buf[3] == '\0')) {
+ if (argbuf)
+ strcpy(argbuf, buf);
+
+ if (!strncmp(buf, "381", 3))
+ return NN_AUTHCONT;
+
+ return NN_SUCCESS;
+ } else if (!strncmp(buf, "480", 3))
+ return NN_AUTHREQ;
+ else
+ return NN_ERROR;
+ }
+
+ return ok;
+}
+
+static gint nntp_gen_send(SockInfo *sock, const gchar *format, ...)
+{
+ gchar buf[NNTPBUFSIZE];
+ va_list args;
+
+ va_start(args, format);
+ g_vsnprintf(buf, sizeof(buf), format, args);
+ va_end(args);
+
+ if (verbose) {
+ if (!g_ascii_strncasecmp(buf, "AUTHINFO PASS", 13))
+ log_print("NNTP> AUTHINFO PASS ********\n");
+ else
+ log_print("NNTP> %s\n", buf);
+ }
+
+ strcat(buf, "\r\n");
+ if (sock_write_all(sock, buf, strlen(buf)) < 0) {
+ log_warning(_("Error occurred while sending command\n"));
+ return NN_SOCKET;
+ }
+
+ return NN_SUCCESS;
+}
+
+static gint nntp_gen_recv(SockInfo *sock, gchar *buf, gint size)
+{
+ if (sock_gets(sock, buf, size) == -1)
+ return NN_SOCKET;
+
+ strretchomp(buf);
+
+ if (verbose)
+ log_print("NNTP< %s\n", buf);
+
+ return NN_SUCCESS;
+}
+
+static gint nntp_gen_command(NNTPSession *session, gchar *argbuf,
+ const gchar *format, ...)
+{
+ gchar buf[NNTPBUFSIZE];
+ va_list args;
+ gint ok;
+ SockInfo *sock;
+
+ va_start(args, format);
+ g_vsnprintf(buf, sizeof(buf), format, args);
+ va_end(args);
+
+ sock = SESSION(session)->sock;
+ ok = nntp_gen_send(sock, "%s", buf);
+ if (ok != NN_SUCCESS)
+ return ok;
+ ok = nntp_ok(sock, argbuf);
+ if (ok == NN_AUTHREQ) {
+ if (!session->userid || !session->passwd) {
+ session->auth_failed = TRUE;
+ return ok;
+ }
+
+ ok = nntp_gen_send(sock, "AUTHINFO USER %s", session->userid);
+ if (ok != NN_SUCCESS)
+ return ok;
+ ok = nntp_ok(sock, NULL);
+ if (ok == NN_AUTHCONT) {
+ ok = nntp_gen_send(sock, "AUTHINFO PASS %s",
+ session->passwd);
+ if (ok != NN_SUCCESS)
+ return ok;
+ ok = nntp_ok(sock, NULL);
+ }
+ if (ok != NN_SUCCESS) {
+ session->auth_failed = TRUE;
+ return ok;
+ }
+
+ ok = nntp_gen_send(sock, "%s", buf);
+ if (ok != NN_SUCCESS)
+ return ok;
+ ok = nntp_ok(sock, argbuf);
+ }
+
+ session_set_access_time(SESSION(session));
+
+ return ok;
+}