1 /* vi: set sw=4 ts=4: */
5 * Copyright (C) 2008 by Vladimir Dronnikov <dronnikov@gmail.com>
7 * Licensed under GPLv2, see file LICENSE in this tarball for details.
12 static void kill_helper(void)
14 if (G.helper_pid > 0) {
15 kill(G.helper_pid, SIGTERM);
20 // generic signal handler
21 static void signal_handler(int signo)
24 if (SIGALRM == signo) {
26 bb_error_msg_and_die("timed out");
29 // SIGCHLD. reap zombies
30 if (safe_waitpid(G.helper_pid, &err, WNOHANG) > 0) {
32 bb_error_msg_and_die("helper killed by signal %u", WTERMSIG(err));
36 bb_error_msg_and_die("helper exited (%u)", WEXITSTATUS(err));
42 void FAST_FUNC launch_helper(const char **argv)
44 // setup vanilla unidirectional pipes interchange
51 // NB: handler must be installed before vfork
57 G.helper_pid = xvfork();
59 i = (!G.helper_pid) * 2; // for parent:0, for child:2
60 close(pipes[i + 1]); // 1 or 3 - closing one write end
61 close(pipes[2 - i]); // 2 or 0 - closing one read end
62 xmove_fd(pipes[i], STDIN_FILENO); // 0 or 2 - using other read end
63 xmove_fd(pipes[3 - i], STDOUT_FILENO); // 3 or 1 - other write end
66 // child: try to execute connection helper
67 // NB: SIGCHLD & SIGALRM revert to SIG_DFL on exec
68 BB_EXECVP_or_die((char**)argv);
72 // check whether child is alive
73 //redundant:signal_handler(SIGCHLD);
74 // child seems OK -> parent goes on
78 const FAST_FUNC char *command(const char *fmt, const char *param)
80 const char *msg = fmt;
84 msg = xasprintf(fmt, param);
85 printf("%s\r\n", msg);
91 // NB: parse_url can modify url[] (despite const), but only if '@' is there
93 static char FAST_FUNC *parse_url(char *url, char **user, char **pass)
95 // parse [user[:pass]@]host
97 char *s = strchr(url, '@');
103 s = strchr(*user, ':');
113 void FAST_FUNC encode_base64(char *fname, const char *text, const char *eol)
116 SRC_BUF_SIZE = 45, /* This *MUST* be a multiple of 3 */
117 DST_BUF_SIZE = 4 * ((SRC_BUF_SIZE + 2) / 3),
123 char dst_buf[DST_BUF_SIZE + 1];
126 fp = (NOT_LONE_DASH(fname)) ? xfopen_for_read(fname) : (FILE *)text;
127 src_buf = bb_common_bufsiz1;
128 // N.B. strlen(NULL) segfaults!
130 // though we do not call uuencode(NULL, NULL) explicitly
131 // still we do not want to break things suddenly
139 size = fread((char *)src_buf, 1, SRC_BUF_SIZE, fp);
140 if ((ssize_t)size < 0)
141 bb_perror_msg_and_die(bb_msg_read_error);
144 if (len > SRC_BUF_SIZE)
149 // encode the buffer we just read in
150 bb_uuencode(dst_buf, src_buf, size, bb_uuenc_tbl_base64);
157 fwrite(dst_buf, 1, 4 * ((size + 2) / 3), stdout);
159 if (fname && NOT_LONE_DASH(fname))
164 void FAST_FUNC decode_base64(FILE *src_stream, FILE *dst_stream)
176 /* Get next _valid_ character.
177 * global vector bb_uuenc_tbl_base64[] contains this string:
178 * "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/=\n"
181 ch = fgetc(src_stream);
183 bb_error_msg_and_die(bb_msg_read_error);
185 // - means end of MIME section
188 ungetc(ch, src_stream);
191 table_ptr = strchr(bb_uuenc_tbl_base64, ch);
192 } while (table_ptr == NULL);
194 /* Convert encoded character to decimal */
195 ch = table_ptr - bb_uuenc_tbl_base64;
197 if (*table_ptr == '=') {
198 if (term_count == 0) {
199 translated[count] = '\0';
203 } else if (*table_ptr == '\n') {
204 /* Check for terminating line */
205 if (term_count == 5) {
211 translated[count] = ch;
217 /* Merge 6 bit chars to 8 bit */
219 fputc(translated[0] << 2 | translated[1] >> 4, dst_stream);
222 fputc(translated[1] << 4 | translated[2] >> 2, dst_stream);
225 fputc(translated[2] << 6 | translated[3], dst_stream);
232 * get username and password from a file descriptor
234 void FAST_FUNC get_cred_or_die(int fd)
237 G.user = xstrdup(bb_ask(fd, /* timeout: */ 0, "User: "));
238 G.pass = xstrdup(bb_ask(fd, /* timeout: */ 0, "Password: "));
240 G.user = xmalloc_reads(fd, /* pfx: */ NULL, /* maxsize: */ NULL);
241 G.pass = xmalloc_reads(fd, /* pfx: */ NULL, /* maxsize: */ NULL);
243 if (!G.user || !*G.user || !G.pass)
244 bb_error_msg_and_die("no username or password");