#include "config.h"
#ifdef POP3_ENABLE
#include <stdio.h>
#include <string.h>
#include <ctype.h>
#if defined(HAVE_UNISTD_H)
#include <unistd.h>
#endif
#if defined(STDC_HEADERS)
#include <stdlib.h>
#endif
#include "fetchmail.h"
#include "socket.h"
#include "i18n.h"
#if OPIE_ENABLE
#include <opie.h>
#endif
#ifndef strstr
extern char *strstr();
#endif
static int last;
#ifdef SDPS_ENABLE
char *sdps_envfrom;
char *sdps_envto;
#endif
#if OPIE_ENABLE
static char lastok[POPBUFSIZE+1];
#endif
#if defined(GSSAPI)
flag has_gssapi = FALSE;
#endif
#if defined(KERBEROS_V4) || defined(KERBEROS_V5)
flag has_kerberos = FALSE;
#endif
flag has_cram = FALSE;
#ifdef OPIE_ENABLE
flag has_otp = FALSE;
#endif
#ifdef SSL_ENABLE
flag has_ssl = FALSE;
#endif
#if NTLM_ENABLE
#include "ntlm.h"
static tSmbNtlmAuthRequest request;
static tSmbNtlmAuthChallenge challenge;
static tSmbNtlmAuthResponse response;
static int do_pop3_ntlm(int sock, struct query *ctl)
{
char msgbuf[2048];
int result,len;
gen_send(sock, "AUTH MSN");
if ((result = gen_recv(sock, msgbuf, sizeof msgbuf)))
return result;
if (msgbuf[0] != '+')
return PS_AUTHFAIL;
buildSmbNtlmAuthRequest(&request,ctl->remotename,NULL);
if (outlevel >= O_DEBUG)
dumpSmbNtlmAuthRequest(stdout, &request);
memset(msgbuf,0,sizeof msgbuf);
to64frombits (msgbuf, (unsigned char*)&request, SmbLength(&request));
if (outlevel >= O_MONITOR)
report(stdout, "POP3> %s\n", msgbuf);
strcat(msgbuf,"\r\n");
SockWrite (sock, msgbuf, strlen (msgbuf));
if ((gen_recv(sock, msgbuf, sizeof msgbuf)))
return result;
len = from64tobits ((unsigned char*)&challenge, msgbuf, sizeof(msgbuf));
if (outlevel >= O_DEBUG)
dumpSmbNtlmAuthChallenge(stdout, &challenge);
buildSmbNtlmAuthResponse(&challenge, &response,ctl->remotename,ctl->password);
if (outlevel >= O_DEBUG)
dumpSmbNtlmAuthResponse(stdout, &response);
memset(msgbuf,0,sizeof msgbuf);
to64frombits (msgbuf, (unsigned char*)&response, SmbLength(&response));
if (outlevel >= O_MONITOR)
report(stdout, "POP3> %s\n", msgbuf);
strcat(msgbuf,"\r\n");
SockWrite (sock, msgbuf, strlen (msgbuf));
if ((result = gen_recv (sock, msgbuf, sizeof msgbuf)))
return result;
if (strstr (msgbuf, "OK"))
return PS_SUCCESS;
else
return PS_AUTHFAIL;
}
#endif
#define DOTLINE(s) (s[0] == '.' && (s[1]=='\r'||s[1]=='\n'||s[1]=='\0'))
static int pop3_ok (int sock, char *argbuf)
{
int ok;
char buf [POPBUFSIZE+1];
char *bufp;
if ((ok = gen_recv(sock, buf, sizeof(buf))) == 0)
{ bufp = buf;
if (*bufp == '+' || *bufp == '-')
bufp++;
else
return(PS_PROTOCOL);
while (isalpha(*bufp))
bufp++;
if (*bufp)
*(bufp++) = '\0';
if (strcmp(buf,"+OK") == 0)
{
#if OPIE_ENABLE
strcpy(lastok, bufp);
#endif
ok = 0;
}
else if (strncmp(buf,"-ERR", 4) == 0)
{
if (stage == STAGE_FETCH)
ok = PS_TRANSIENT;
else if (stage > STAGE_GETAUTH)
ok = PS_PROTOCOL;
else if (strstr(bufp,"lock")
|| strstr(bufp,"Lock")
|| strstr(bufp,"LOCK")
|| strstr(bufp,"wait")
|| strstr(bufp,"[IN-USE]")||strstr(bufp,"[LOGIN-DELAY]"))
ok = PS_LOCKBUSY;
else if ((strstr(bufp,"Service")
|| strstr(bufp,"service"))
&& (strstr(bufp,"unavailable")))
ok = PS_SERVBUSY;
else
ok = PS_AUTHFAIL;
if (*bufp && (ok == PS_LOCKBUSY || outlevel >= O_MONITOR))
report(stderr, "%s\n", bufp);
}
else
ok = PS_PROTOCOL;
if (argbuf != NULL)
strcpy(argbuf,bufp);
}
return(ok);
}
static int capa_probe(sock)
{
int ok;
#if defined(GSSAPI)
has_gssapi = FALSE;
#endif
#if defined(KERBEROS_V4) || defined(KERBEROS_V5)
has_kerberos = FALSE;
#endif
has_cram = FALSE;
#ifdef OPIE_ENABLE
has_otp = FALSE;
#endif
ok = gen_transact(sock, "CAPA");
if (ok == PS_SUCCESS)
{
char buffer[64];
while ((ok = gen_recv(sock, buffer, sizeof(buffer))) == 0)
{
if (DOTLINE(buffer))
break;
#ifdef SSL_ENABLE
if (strstr(buffer, "STLS"))
has_ssl = TRUE;
#endif
#if defined(GSSAPI)
if (strstr(buffer, "GSSAPI"))
has_gssapi = TRUE;
#endif
#if defined(KERBEROS_V4)
if (strstr(buffer, "KERBEROS_V4"))
has_kerberos = TRUE;
#endif
#ifdef OPIE_ENABLE
if (strstr(buffer, "X-OTP"))
has_otp = TRUE;
#endif
if (strstr(buffer, "CRAM-MD5"))
has_cram = TRUE;
}
}
return(ok);
}
static int pop3_getauth(int sock, struct query *ctl, char *greeting)
{
int ok;
char *start,*end;
char *msg;
#if OPIE_ENABLE
char *challenge;
#endif
#ifdef SSL_ENABLE
flag did_stls = FALSE;
#endif
#if defined(GSSAPI)
has_gssapi = FALSE;
#endif
#if defined(KERBEROS_V4) || defined(KERBEROS_V5)
has_kerberos = FALSE;
#endif
has_cram = FALSE;
#ifdef OPIE_ENABLE
has_otp = FALSE;
#endif
#ifdef SSL_ENABLE
has_ssl = FALSE;
#endif
if (ctl->server.authenticate == A_SSH) {
return PS_SUCCESS;
}
#ifdef SDPS_ENABLE
if (!(ctl->server.sdps) && MULTIDROP(ctl) && strstr(greeting, "demon."))
ctl->server.sdps = TRUE;
#endif
#ifdef NTLM_ENABLE
if (!strcasecmp(ctl->server.pollname, "pop3.email.msn.com") ||
ctl->server.authenticate == A_NTLM)
{
if (!do_pop3_ntlm(sock, ctl))
{
return(PS_SUCCESS);
}
else
{
return(PS_AUTHFAIL);
}
}
#endif
switch (ctl->server.protocol) {
case P_POP3:
#ifdef RPA_ENABLE
if (strstr(ctl->remotename, "@compuserve.com"))
{
if (gen_transact(sock, "AUTH") == 0)
{
char buffer[10];
flag has_rpa = FALSE;
while ((ok = gen_recv(sock, buffer, sizeof(buffer))) == 0)
{
if (DOTLINE(buffer))
break;
if (strncasecmp(buffer, "rpa", 3) == 0)
has_rpa = TRUE;
}
if (has_rpa && !POP3_auth_rpa(ctl->remotename,
ctl->password, sock))
return(PS_SUCCESS);
}
return(PS_AUTHFAIL);
}
#endif
if (ctl->server.authenticate == A_ANY)
{
if ((ok = capa_probe(sock)) != PS_SUCCESS)
if (ok == PS_AUTHFAIL ||
(ok == PS_SOCKET && !ctl->wehaveauthed))
{
ctl->server.authenticate = A_PASSWORD;
ok = PS_REPOLL;
break;
}
}
#ifdef SSL_ENABLE
if (has_ssl
&& !ctl->use_ssl
&& (!ctl->sslproto || !strcmp(ctl->sslproto,"tls1")))
{
char *realhost;
realhost = ctl->server.via ? ctl->server.via : ctl->server.pollname;
ok = gen_transact(sock, "STLS");
if (ok == PS_SUCCESS &&
SSLOpen(sock,ctl->sslcert,ctl->sslkey,"tls1",ctl->sslcertck, ctl->sslcertpath,ctl->sslfingerprint,realhost,ctl->server.pollname) == -1)
{
if (!ctl->sslproto && !ctl->wehaveauthed)
{
ctl->sslproto = xstrdup("");
return(PS_REPOLL);
}
report(stderr,
GT_("SSL connection failed.\n"));
return(PS_AUTHFAIL);
}
did_stls = TRUE;
capa_probe(sock);
}
#endif
#if defined(KERBEROS_V4)
if (has_kerberos &&
#if INET6_ENABLE
ctl->server.service && (strcmp(ctl->server.service, KPOP_PORT)!=0)
#else
ctl->server.port != KPOP_PORT
#endif
&& (ctl->server.authenticate == A_KERBEROS_V4
|| ctl->server.authenticate == A_KERBEROS_V5
|| ctl->server.authenticate == A_ANY))
{
ok = do_rfc1731(sock, "AUTH", ctl->server.truename);
if (ok == PS_SUCCESS || ctl->server.authenticate != A_ANY)
break;
}
#endif
#if defined(GSSAPI)
if (has_gssapi &&
(ctl->server.authenticate == A_GSSAPI ||
ctl->server.authenticate == A_ANY))
{
ok = do_gssauth(sock,"AUTH",ctl->server.truename,ctl->remotename);
if (ok == PS_SUCCESS || ctl->server.authenticate != A_ANY)
break;
}
#endif
#ifdef OPIE_ENABLE
if (has_otp &&
(ctl->server.authenticate == A_OTP ||
ctl->server.authenticate == A_ANY))
{
ok = do_otp(sock, "AUTH", ctl);
if (ok == PS_SUCCESS || ctl->server.authenticate != A_ANY)
break;
}
#endif
if (ctl->server.authenticate == A_CRAM_MD5 ||
(has_cram && ctl->server.authenticate == A_ANY))
{
ok = do_cram_md5(sock, "AUTH", ctl, NULL);
if (ok == PS_SUCCESS || ctl->server.authenticate != A_ANY)
break;
}
gen_transact(sock, "USER %s", ctl->remotename);
#if OPIE_ENABLE
if (challenge = strstr(lastok, "otp-")) {
char response[OPIE_RESPONSE_MAX+1];
int i;
i = opiegenerator(challenge, !strcmp(ctl->password, "opie") ? "" : ctl->password, response);
if ((i == -2) && !run.poll_interval) {
char secret[OPIE_SECRET_MAX+1];
fprintf(stderr, GT_("Secret pass phrase: "));
if (opiereadpass(secret, sizeof(secret), 0))
i = opiegenerator(challenge, secret, response);
memset(secret, 0, sizeof(secret));
};
if (i) {
ok = PS_ERROR;
break;
};
ok = gen_transact(sock, "PASS %s", response);
break;
}
#endif
strcpy(shroud, ctl->password);
ok = gen_transact(sock, "PASS %s", ctl->password);
shroud[0] = '\0';
#ifdef SSL_ENABLE
if (did_stls && ok == PS_SOCKET && !ctl->sslproto && !ctl->wehaveauthed)
{
ctl->sslproto = xstrdup("");
ok = PS_REPOLL;
}
#endif
break;
case P_APOP:
for (start = greeting; *start != 0 && *start != '<'; start++)
continue;
if (*start == 0) {
report(stderr,
GT_("Required APOP timestamp not found in greeting\n"));
return(PS_AUTHFAIL);
}
for (end = start; *end != 0 && *end != '>'; end++)
continue;
if (*end == 0 || end == start + 1) {
report(stderr,
GT_("Timestamp syntax error in greeting\n"));
return(PS_AUTHFAIL);
}
else
*++end = '\0';
xalloca(msg, char *, (end-start+1) + strlen(ctl->password) + 1);
strcpy(msg,start);
strcat(msg,ctl->password);
strcpy(ctl->digest, MD5Digest((unsigned char *)msg));
ok = gen_transact(sock, "APOP %s %s", ctl->remotename, ctl->digest);
break;
case P_RPOP:
if ((ok = gen_transact(sock,"USER %s", ctl->remotename)) == 0)
ok = gen_transact(sock, "RPOP %s", ctl->password);
break;
default:
report(stderr, GT_("Undefined protocol request in POP3_auth\n"));
ok = PS_ERROR;
}
if (ok != 0)
{
if (ok == PS_LOCKBUSY)
report(stderr, GT_("lock busy! Is another session active?\n"));
return(ok);
}
sleep(3);
peek_capable = !(ctl->fetchall || ctl->keep);
return(PS_SUCCESS);
}
static int pop3_gettopid( int sock, int num , char *id)
{
int ok;
int got_it;
char buf [POPBUFSIZE+1];
sprintf( buf, "TOP %d 1", num );
if ((ok = gen_transact(sock, buf )) != 0)
return ok;
got_it = 0;
while ((ok = gen_recv(sock, buf, sizeof(buf))) == 0)
{
if (DOTLINE(buf))
break;
if ( ! got_it && ! strncasecmp("Message-Id:", buf, 11 )) {
got_it = 1;
buf[IDLEN+12] = 0;
sscanf( buf+12, "%s", id);
}
}
return 0;
}
static int pop3_getuidl( int sock, int num , char *id)
{
int ok;
char buf [POPBUFSIZE+1];
gen_send(sock, "UIDL %d", num);
if ((ok = pop3_ok(sock, buf)) != 0)
return(ok);
if (sscanf(buf, "%d %s", &num, id) != 2)
return(PS_PROTOCOL);
return(PS_SUCCESS);
}
static int pop3_fastuidl( int sock, struct query *ctl, unsigned int count, int *newp)
{
int ok;
unsigned int first_nr, last_nr, try_nr;
char id [IDLEN+1];
first_nr = 0;
last_nr = count + 1;
while (first_nr < last_nr - 1)
{
struct idlist *new;
try_nr = (first_nr + last_nr) / 2;
if( (ok = pop3_getuidl( sock, try_nr, id )) != 0 )
return ok;
if ((new = str_in_list(&ctl->oldsaved, id, FALSE)))
{
flag mark = new->val.status.mark;
if (mark == UID_DELETED || mark == UID_EXPUNGED)
{
if (outlevel >= O_VERBOSE)
report(stderr, GT_("id=%s (num=%d) was deleted, but is still present!\n"), id, try_nr);
new->val.status.mark = mark = UID_SEEN;
}
if (mark == UID_UNSEEN)
{
if (outlevel >= O_DEBUG)
report(stdout, GT_("%u is unseen\n"), try_nr);
last_nr = try_nr;
}
else
first_nr = try_nr;
new->val.status.num = try_nr;
}
else
{
if (outlevel >= O_DEBUG)
report(stdout, GT_("%u is unseen\n"), try_nr);
last_nr = try_nr;
new = save_str(&ctl->oldsaved, id, UID_UNSEEN);
new->val.status.num = try_nr;
}
}
if (outlevel >= O_DEBUG && last_nr <= count)
report(stdout, GT_("%u is first unseen\n"), last_nr);
*newp = count - first_nr;
last = first_nr;
return 0;
}
static int pop3_slowuidl( int sock, struct query *ctl, int *countp, int *newp)
{
int ok, nolinear = 0;
int first_nr, list_len, try_id, try_nr, add_id;
int num;
char id [IDLEN+1];
if( (ok = pop3_gettopid( sock, 1, id )) != 0 )
return ok;
if( ( first_nr = str_nr_in_list(&ctl->oldsaved, id) ) == -1 ) {
*newp = *countp;
return 0;
}
list_len = count_list( &ctl->oldsaved );
try_id = list_len - first_nr;
if( try_id > 1 ) {
if( try_id <= *countp ) {
if( (ok = pop3_gettopid( sock, try_id, id )) != 0 )
return ok;
try_nr = str_nr_last_in_list(&ctl->oldsaved, id);
} else {
try_id = *countp+1;
try_nr = -1;
}
if( try_nr != list_len -1 ) {
if( try_nr == -1 ) {
nolinear = 1;
for( add_id = 1<<30; add_id > try_id-1; add_id >>= 1 )
;
for( ; add_id; add_id >>= 1 ) {
if( try_nr == -1 ) {
if( try_id - add_id <= 1 ) {
continue;
}
try_id -= add_id;
} else
try_id += add_id;
if( (ok = pop3_gettopid( sock, try_id, id )) != 0 )
return ok;
try_nr = str_nr_in_list(&ctl->oldsaved, id);
}
if( try_nr == -1 ) {
try_id--;
}
} else {
report(stderr,
GT_("Messages inserted into list on server. Cannot handle this.\n"));
return -1;
}
}
}
for( num = first_nr; num < list_len; num++ )
{
struct idlist *new = save_str(&ctl->newsaved,
str_from_nr_list(&ctl->oldsaved, num),
UID_UNSEEN);
new->val.status.num = num - first_nr + 1;
}
if( nolinear ) {
free_str_list(&ctl->oldsaved);
ctl->oldsaved = 0;
last = try_id;
}
*newp = *countp - try_id;
return 0;
}
static int pop3_getrange(int sock,
struct query *ctl,
const char *folder,
int *countp, int *newp, int *bytes)
{
int ok;
char buf [POPBUFSIZE+1];
ctl->newsaved = (struct idlist *)NULL;
#ifdef MBOX
if (folder)
if ((ok = gen_transact(sock, "MBOX %s", folder)))
return ok;
#endif
gen_send(sock, "STAT");
ok = pop3_ok(sock, buf);
if (ok == 0)
sscanf(buf,"%d %d", countp, bytes);
else
return(ok);
last = 0;
*newp = -1;
if (*countp > 0 && !ctl->fetchall)
{
int fastuidl;
char id [IDLEN+1];
fastuidl = ctl->fastuidl;
if (*countp > 7 &&
!ctl->flush &&
NUM_NONZERO (fastuidl))
{
if (fastuidl == 1)
dofastuidl = 1;
else
dofastuidl = ctl->fastuidlcount != 0;
}
else
dofastuidl = 0;
if (!ctl->server.uidl) {
gen_send(sock, "LAST");
ok = pop3_ok(sock, buf);
} else
ok = 1;
if (ok == 0)
{
if (sscanf(buf, "%d", &last) == 0)
{
report(stderr, GT_("protocol error\n"));
return(PS_ERROR);
}
*newp = (*countp - last);
}
else
{
if (dofastuidl)
return(pop3_fastuidl( sock, ctl, *countp, newp));
if ((ok = gen_transact(sock, "UIDL")) != 0)
{
if((ok = pop3_slowuidl( sock, ctl, countp, newp))!=0)
{
report(stderr, GT_("protocol error while fetching UIDLs\n"));
return(PS_ERROR);
}
}
else
{
int num;
*newp = 0;
while ((ok = gen_recv(sock, buf, sizeof(buf))) == 0)
{
if (DOTLINE(buf))
break;
else if (sscanf(buf, "%d %s", &num, id) == 2)
{
struct idlist *old, *new;
new = save_str(&ctl->newsaved, id, UID_UNSEEN);
new->val.status.num = num;
if ((old = str_in_list(&ctl->oldsaved, id, FALSE)))
{
flag mark = old->val.status.mark;
if (mark == UID_DELETED || mark == UID_EXPUNGED)
{
if (outlevel >= O_VERBOSE)
report(stderr, GT_("id=%s (num=%d) was deleted, but is still present!\n"), id, num);
old->val.status.mark = mark = UID_SEEN;
}
new->val.status.mark = mark;
if (mark == UID_UNSEEN)
{
(*newp)++;
if (outlevel >= O_DEBUG)
report(stdout, GT_("%u is unseen\n"), num);
}
}
else
{
(*newp)++;
if (outlevel >= O_DEBUG)
report(stdout, GT_("%u is unseen\n"), num);
old = save_str(&ctl->oldsaved, id, UID_UNSEEN);
old->val.status.num = num;
}
}
}
}
}
}
return(PS_SUCCESS);
}
static int pop3_getpartialsizes(int sock, int first, int last, int *sizes)
{
int ok;
char buf [POPBUFSIZE+1];
unsigned int num, size;
if (first != last)
{
report(stderr, "cannot get a range of message sizes (%d-%d).\n", first, last);
return(PS_PROTOCOL);
}
gen_send(sock, "LIST %d", first);
if ((ok = pop3_ok(sock, buf)) != 0)
return(ok);
if (sscanf(buf, "%u %u", &num, &size) == 2) {
if (num == first)
sizes[0] = size;
else
report(stderr, "Warning: ignoring bogus data for message sizes returned by server.\n");
}
return(ok);
}
static int pop3_getsizes(int sock, int count, int *sizes)
{
int ok;
if ((ok = gen_transact(sock, "LIST")) != 0)
return(ok);
else
{
char buf [POPBUFSIZE+1];
while ((ok = gen_recv(sock, buf, sizeof(buf))) == 0)
{
unsigned int num, size;
if (DOTLINE(buf))
break;
else if (sscanf(buf, "%u %u", &num, &size) == 2) {
if (num > 0 && num <= count)
sizes[num - 1] = size;
else
report(stderr, "Warning: ignoring bogus data for message sizes returned by server.\n");
}
}
return(ok);
}
}
static int pop3_is_old(int sock, struct query *ctl, int num)
{
struct idlist *new;
if (!ctl->oldsaved)
return (num <= last);
else if (dofastuidl)
{
char id [IDLEN+1];
if (num <= last)
return(TRUE);
if ((new = id_find(&ctl->oldsaved, num)))
{
return(new->val.status.mark != UID_UNSEEN);
}
if (pop3_getuidl(sock, num, id) != PS_SUCCESS)
return(TRUE);
if ((new = str_in_list(&ctl->oldsaved, id, FALSE))) {
new->val.status.num = num;
return(new->val.status.mark != UID_UNSEEN);
}
new = save_str(&ctl->oldsaved, id, UID_UNSEEN);
new->val.status.num = num;
return(FALSE);
}
else
return ((new = id_find(&ctl->newsaved, num)) != NULL &&
new->val.status.mark != UID_UNSEEN);
}
#ifdef UNUSED
static int pop_fetch_headers(int sock, struct query *ctl,int number,int *lenp)
{
int ok;
char buf[POPBUFSIZE+1];
gen_send(sock, "TOP %d 0", number);
if ((ok = pop3_ok(sock, buf)) != 0)
return(ok);
*lenp = -1;
return(PS_SUCCESS);
}
#endif
static int pop3_fetch(int sock, struct query *ctl, int number, int *lenp)
{
int ok;
char buf[POPBUFSIZE+1];
#ifdef SDPS_ENABLE
if (ctl->server.sdps)
{
int linecount = 0;
sdps_envfrom = (char *)NULL;
sdps_envto = (char *)NULL;
gen_send(sock, "*ENV %d", number);
do {
if (gen_recv(sock, buf, sizeof(buf)))
{
break;
}
linecount++;
switch (linecount) {
case 4:
sdps_envfrom = xmalloc(strlen(buf)+1);
strcpy(sdps_envfrom,buf);
break;
case 5:
sdps_envto = xmalloc(strlen(buf)+7);
sprintf(sdps_envto,"To: <%s>",buf);
break;
}
} while
(!(buf[0] == '.' && (buf[1] == '\r' || buf[1] == '\n' || buf[1] == '\0')));
}
#endif
if (ctl->keep || ctl->fetchall)
gen_send(sock, "RETR %d", number);
else
gen_send(sock, "TOP %d 99999999", number);
if ((ok = pop3_ok(sock, buf)) != 0)
return(ok);
*lenp = -1;
return(PS_SUCCESS);
}
static void mark_uid_seen(struct query *ctl, int number)
{
struct idlist *sdp;
if ((sdp = id_find(&ctl->newsaved, number)))
sdp->val.status.mark = UID_SEEN;
if ((sdp = id_find(&ctl->oldsaved, number)))
sdp->val.status.mark = UID_SEEN;
}
static int pop3_delete(int sock, struct query *ctl, int number)
{
int ok;
mark_uid_seen(ctl, number);
ok = gen_transact(sock, "DELE %d", number);
if (ok != PS_SUCCESS)
return(ok);
delete_str(dofastuidl ? &ctl->oldsaved : &ctl->newsaved, number);
return(PS_SUCCESS);
}
static int pop3_mark_seen(int sock, struct query *ctl, int number)
{
mark_uid_seen(ctl, number);
return(PS_SUCCESS);
}
static int pop3_logout(int sock, struct query *ctl)
{
int ok;
#ifdef __UNUSED__
if (ctl->keep)
gen_transact(sock, "RSET");
#endif
ok = gen_transact(sock, "QUIT");
if (!ok)
expunge_uids(ctl);
return(ok);
}
const static struct method pop3 =
{
"POP3",
#if INET6_ENABLE
"pop3",
"pop3s",
#else
110,
995,
#endif
FALSE,
TRUE,
pop3_ok,
pop3_getauth,
pop3_getrange,
pop3_getsizes,
pop3_getpartialsizes,
pop3_is_old,
pop3_fetch,
NULL,
NULL,
pop3_delete,
pop3_mark_seen,
pop3_logout,
FALSE,
};
int doPOP3 (struct query *ctl)
{
#ifndef MBOX
if (ctl->mailboxes->id) {
fprintf(stderr,GT_("Option --remote is not supported with POP3\n"));
return(PS_SYNTAX);
}
#endif
peek_capable = !ctl->fetchall;
return(do_protocol(ctl, &pop3));
}
#endif