Use custom variables for ACL args, up to nine. Add an arg-count variable.
[exim.git] / src / src / expand.c
CommitLineData
059ec3d9
PH
1/*************************************************
2* Exim - an Internet mail transport agent *
3*************************************************/
4
c4ceed07 5/* Copyright (c) University of Cambridge 1995 - 2012 */
059ec3d9
PH
6/* See the file NOTICE for conditions of use and distribution. */
7
8
9/* Functions for handling string expansion. */
10
11
12#include "exim.h"
13
96c065cb
PH
14/* Recursively called function */
15
da6dbe26 16static uschar *expand_string_internal(uschar *, BOOL, uschar **, BOOL, BOOL);
96c065cb 17
059ec3d9
PH
18#ifdef STAND_ALONE
19#ifndef SUPPORT_CRYPTEQ
20#define SUPPORT_CRYPTEQ
21#endif
22#endif
23
96c065cb
PH
24#ifdef LOOKUP_LDAP
25#include "lookups/ldap.h"
26#endif
27
059ec3d9
PH
28#ifdef SUPPORT_CRYPTEQ
29#ifdef CRYPT_H
30#include <crypt.h>
31#endif
32#ifndef HAVE_CRYPT16
33extern char* crypt16(char*, char*);
34#endif
35#endif
36
96c065cb
PH
37/* The handling of crypt16() is a mess. I will record below the analysis of the
38mess that was sent to me. We decided, however, to make changing this very low
39priority, because in practice people are moving away from the crypt()
40algorithms nowadays, so it doesn't seem worth it.
41
42<quote>
43There is an algorithm named "crypt16" in Ultrix and Tru64. It crypts
44the first 8 characters of the password using a 20-round version of crypt
45(standard crypt does 25 rounds). It then crypts the next 8 characters,
46or an empty block if the password is less than 9 characters, using a
4720-round version of crypt and the same salt as was used for the first
48block. Charaters after the first 16 are ignored. It always generates
49a 16-byte hash, which is expressed together with the salt as a string
50of 24 base 64 digits. Here are some links to peruse:
51
52 http://cvs.pld.org.pl/pam/pamcrypt/crypt16.c?rev=1.2
53 http://seclists.org/bugtraq/1999/Mar/0076.html
54
55There's a different algorithm named "bigcrypt" in HP-UX, Digital Unix,
56and OSF/1. This is the same as the standard crypt if given a password
57of 8 characters or less. If given more, it first does the same as crypt
58using the first 8 characters, then crypts the next 8 (the 9th to 16th)
59using as salt the first two base 64 digits from the first hash block.
60If the password is more than 16 characters then it crypts the 17th to 24th
61characters using as salt the first two base 64 digits from the second hash
62block. And so on: I've seen references to it cutting off the password at
6340 characters (5 blocks), 80 (10 blocks), or 128 (16 blocks). Some links:
64
65 http://cvs.pld.org.pl/pam/pamcrypt/bigcrypt.c?rev=1.2
66 http://seclists.org/bugtraq/1999/Mar/0109.html
67 http://h30097.www3.hp.com/docs/base_doc/DOCUMENTATION/HTML/AA-Q0R2D-
68 TET1_html/sec.c222.html#no_id_208
69
70Exim has something it calls "crypt16". It will either use a native
71crypt16 or its own implementation. A native crypt16 will presumably
72be the one that I called "crypt16" above. The internal "crypt16"
73function, however, is a two-block-maximum implementation of what I called
74"bigcrypt". The documentation matches the internal code.
75
76I suspect that whoever did the "crypt16" stuff for Exim didn't realise
77that crypt16 and bigcrypt were different things.
78
79Exim uses the LDAP-style scheme identifier "{crypt16}" to refer
80to whatever it is using under that name. This unfortunately sets a
81precedent for using "{crypt16}" to identify two incompatible algorithms
82whose output can't be distinguished. With "{crypt16}" thus rendered
83ambiguous, I suggest you deprecate it and invent two new identifiers
84for the two algorithms.
85
86Both crypt16 and bigcrypt are very poor algorithms, btw. Hashing parts
87of the password separately means they can be cracked separately, so
88the double-length hash only doubles the cracking effort instead of
89squaring it. I recommend salted SHA-1 ({SSHA}), or the Blowfish-based
90bcrypt ({CRYPT}$2a$).
91</quote>
92*/
059ec3d9
PH
93
94
059ec3d9
PH
95
96
97/*************************************************
98* Local statics and tables *
99*************************************************/
100
101/* Table of item names, and corresponding switch numbers. The names must be in
102alphabetical order. */
103
104static uschar *item_table[] = {
723c72e6 105 US"acl",
1a46a8c5 106 US"dlfunc",
059ec3d9 107 US"extract",
29f89cad 108 US"filter",
059ec3d9
PH
109 US"hash",
110 US"hmac",
111 US"if",
112 US"length",
113 US"lookup",
29f89cad 114 US"map",
059ec3d9 115 US"nhash",
1a46a8c5 116 US"perl",
fffda43a
TK
117 US"prvs",
118 US"prvscheck",
059ec3d9
PH
119 US"readfile",
120 US"readsocket",
29f89cad 121 US"reduce",
059ec3d9
PH
122 US"run",
123 US"sg",
124 US"substr",
125 US"tr" };
126
127enum {
723c72e6 128 EITEM_ACL,
1a46a8c5 129 EITEM_DLFUNC,
059ec3d9 130 EITEM_EXTRACT,
29f89cad 131 EITEM_FILTER,
059ec3d9
PH
132 EITEM_HASH,
133 EITEM_HMAC,
134 EITEM_IF,
135 EITEM_LENGTH,
136 EITEM_LOOKUP,
29f89cad 137 EITEM_MAP,
059ec3d9 138 EITEM_NHASH,
1a46a8c5 139 EITEM_PERL,
fffda43a
TK
140 EITEM_PRVS,
141 EITEM_PRVSCHECK,
059ec3d9
PH
142 EITEM_READFILE,
143 EITEM_READSOCK,
29f89cad 144 EITEM_REDUCE,
059ec3d9
PH
145 EITEM_RUN,
146 EITEM_SG,
147 EITEM_SUBSTR,
148 EITEM_TR };
149
150/* Tables of operator names, and corresponding switch numbers. The names must be
151in alphabetical order. There are two tables, because underscore is used in some
152cases to introduce arguments, whereas for other it is part of the name. This is
153an historical mis-design. */
154
155static uschar *op_table_underscore[] = {
156 US"from_utf8",
157 US"local_part",
158 US"quote_local_part",
83e029d5 159 US"reverse_ip",
f90d018c 160 US"time_eval",
059ec3d9
PH
161 US"time_interval"};
162
163enum {
164 EOP_FROM_UTF8,
165 EOP_LOCAL_PART,
166 EOP_QUOTE_LOCAL_PART,
83e029d5 167 EOP_REVERSE_IP,
f90d018c 168 EOP_TIME_EVAL,
059ec3d9
PH
169 EOP_TIME_INTERVAL };
170
171static uschar *op_table_main[] = {
172 US"address",
29f89cad 173 US"addresses",
059ec3d9
PH
174 US"base62",
175 US"base62d",
176 US"domain",
177 US"escape",
178 US"eval",
179 US"eval10",
180 US"expand",
181 US"h",
182 US"hash",
183 US"hex2b64",
184 US"l",
185 US"lc",
186 US"length",
a64a3dfa
JH
187 US"listcount",
188 US"listnamed",
059ec3d9
PH
189 US"mask",
190 US"md5",
191 US"nh",
192 US"nhash",
193 US"quote",
9e3331ea 194 US"randint",
059ec3d9 195 US"rfc2047",
9c57cbc0 196 US"rfc2047d",
059ec3d9
PH
197 US"rxquote",
198 US"s",
199 US"sha1",
200 US"stat",
201 US"str2b64",
202 US"strlen",
203 US"substr",
204 US"uc" };
205
206enum {
207 EOP_ADDRESS = sizeof(op_table_underscore)/sizeof(uschar *),
29f89cad 208 EOP_ADDRESSES,
059ec3d9
PH
209 EOP_BASE62,
210 EOP_BASE62D,
211 EOP_DOMAIN,
212 EOP_ESCAPE,
213 EOP_EVAL,
214 EOP_EVAL10,
215 EOP_EXPAND,
216 EOP_H,
217 EOP_HASH,
218 EOP_HEX2B64,
219 EOP_L,
220 EOP_LC,
221 EOP_LENGTH,
a64a3dfa
JH
222 EOP_LISTCOUNT,
223 EOP_LISTNAMED,
059ec3d9
PH
224 EOP_MASK,
225 EOP_MD5,
226 EOP_NH,
227 EOP_NHASH,
228 EOP_QUOTE,
9e3331ea 229 EOP_RANDINT,
059ec3d9 230 EOP_RFC2047,
9c57cbc0 231 EOP_RFC2047D,
059ec3d9
PH
232 EOP_RXQUOTE,
233 EOP_S,
234 EOP_SHA1,
235 EOP_STAT,
236 EOP_STR2B64,
237 EOP_STRLEN,
238 EOP_SUBSTR,
239 EOP_UC };
240
241
242/* Table of condition names, and corresponding switch numbers. The names must
243be in alphabetical order. */
244
245static uschar *cond_table[] = {
246 US"<",
247 US"<=",
248 US"=",
249 US"==", /* Backward compatibility */
250 US">",
251 US">=",
252 US"and",
f3766eb5 253 US"bool",
6a8de854 254 US"bool_lax",
059ec3d9
PH
255 US"crypteq",
256 US"def",
257 US"eq",
258 US"eqi",
259 US"exists",
260 US"first_delivery",
0ce9abe6
PH
261 US"forall",
262 US"forany",
059ec3d9
PH
263 US"ge",
264 US"gei",
265 US"gt",
266 US"gti",
76dca828
PP
267 US"inlist",
268 US"inlisti",
059ec3d9
PH
269 US"isip",
270 US"isip4",
271 US"isip6",
272 US"ldapauth",
273 US"le",
274 US"lei",
275 US"lt",
276 US"lti",
277 US"match",
278 US"match_address",
279 US"match_domain",
32d668a5 280 US"match_ip",
059ec3d9
PH
281 US"match_local_part",
282 US"or",
283 US"pam",
284 US"pwcheck",
285 US"queue_running",
286 US"radius",
287 US"saslauthd"
288};
289
290enum {
291 ECOND_NUM_L,
292 ECOND_NUM_LE,
293 ECOND_NUM_E,
294 ECOND_NUM_EE,
295 ECOND_NUM_G,
296 ECOND_NUM_GE,
297 ECOND_AND,
f3766eb5 298 ECOND_BOOL,
6a8de854 299 ECOND_BOOL_LAX,
059ec3d9
PH
300 ECOND_CRYPTEQ,
301 ECOND_DEF,
302 ECOND_STR_EQ,
303 ECOND_STR_EQI,
304 ECOND_EXISTS,
305 ECOND_FIRST_DELIVERY,
0ce9abe6
PH
306 ECOND_FORALL,
307 ECOND_FORANY,
059ec3d9
PH
308 ECOND_STR_GE,
309 ECOND_STR_GEI,
310 ECOND_STR_GT,
311 ECOND_STR_GTI,
76dca828
PP
312 ECOND_INLIST,
313 ECOND_INLISTI,
059ec3d9
PH
314 ECOND_ISIP,
315 ECOND_ISIP4,
316 ECOND_ISIP6,
317 ECOND_LDAPAUTH,
318 ECOND_STR_LE,
319 ECOND_STR_LEI,
320 ECOND_STR_LT,
321 ECOND_STR_LTI,
322 ECOND_MATCH,
323 ECOND_MATCH_ADDRESS,
324 ECOND_MATCH_DOMAIN,
32d668a5 325 ECOND_MATCH_IP,
059ec3d9
PH
326 ECOND_MATCH_LOCAL_PART,
327 ECOND_OR,
328 ECOND_PAM,
329 ECOND_PWCHECK,
330 ECOND_QUEUE_RUNNING,
331 ECOND_RADIUS,
332 ECOND_SASLAUTHD
333};
334
335
336/* Type for main variable table */
337
338typedef struct {
1ba28e2b
PP
339 const char *name;
340 int type;
341 void *value;
059ec3d9
PH
342} var_entry;
343
344/* Type for entries pointing to address/length pairs. Not currently
345in use. */
346
347typedef struct {
348 uschar **address;
349 int *length;
350} alblock;
351
352/* Types of table entry */
353
354enum {
355 vtype_int, /* value is address of int */
356 vtype_filter_int, /* ditto, but recognized only when filtering */
357 vtype_ino, /* value is address of ino_t (not always an int) */
358 vtype_uid, /* value is address of uid_t (not always an int) */
359 vtype_gid, /* value is address of gid_t (not always an int) */
11d7e4fa 360 vtype_bool, /* value is address of bool */
059ec3d9
PH
361 vtype_stringptr, /* value is address of pointer to string */
362 vtype_msgbody, /* as stringptr, but read when first required */
363 vtype_msgbody_end, /* ditto, the end of the message */
ff75a1f7
PH
364 vtype_msgheaders, /* the message's headers, processed */
365 vtype_msgheaders_raw, /* the message's headers, unprocessed */
059ec3d9
PH
366 vtype_localpart, /* extract local part from string */
367 vtype_domain, /* extract domain from string */
368 vtype_recipients, /* extract recipients from recipients list */
0e20aff9
MH
369 /* (available only in system filters, ACLs, and */
370 /* local_scan()) */
059ec3d9
PH
371 vtype_todbsdin, /* value not used; generate BSD inbox tod */
372 vtype_tode, /* value not used; generate tod in epoch format */
f5787926 373 vtype_todel, /* value not used; generate tod in epoch/usec format */
059ec3d9
PH
374 vtype_todf, /* value not used; generate full tod */
375 vtype_todl, /* value not used; generate log tod */
376 vtype_todlf, /* value not used; generate log file datestamp tod */
377 vtype_todzone, /* value not used; generate time zone only */
378 vtype_todzulu, /* value not used; generate zulu tod */
379 vtype_reply, /* value not used; get reply from headers */
380 vtype_pid, /* value not used; result is pid */
381 vtype_host_lookup, /* value not used; get host name */
5cb8cbc6
PH
382 vtype_load_avg, /* value not used; result is int from os_getloadavg */
383 vtype_pspace, /* partition space; value is T/F for spool/log */
8e669ac1 384 vtype_pinodes /* partition inodes; value is T/F for spool/log */
80a47a2c
TK
385 #ifndef DISABLE_DKIM
386 ,vtype_dkim /* Lookup of value in DKIM signature */
387 #endif
059ec3d9
PH
388 };
389
390/* This table must be kept in alphabetical order. */
391
392static var_entry var_table[] = {
38a0a95f
PH
393 /* WARNING: Do not invent variables whose names start acl_c or acl_m because
394 they will be confused with user-creatable ACL variables. */
525239c1
JH
395 { "acl_arg1", vtype_stringptr, &acl_arg[0] },
396 { "acl_arg2", vtype_stringptr, &acl_arg[1] },
397 { "acl_arg3", vtype_stringptr, &acl_arg[2] },
398 { "acl_arg4", vtype_stringptr, &acl_arg[3] },
399 { "acl_arg5", vtype_stringptr, &acl_arg[4] },
400 { "acl_arg6", vtype_stringptr, &acl_arg[5] },
401 { "acl_arg7", vtype_stringptr, &acl_arg[6] },
402 { "acl_arg8", vtype_stringptr, &acl_arg[7] },
403 { "acl_arg9", vtype_stringptr, &acl_arg[8] },
404 { "acl_narg", vtype_int, &acl_narg },
059ec3d9
PH
405 { "acl_verify_message", vtype_stringptr, &acl_verify_message },
406 { "address_data", vtype_stringptr, &deliver_address_data },
407 { "address_file", vtype_stringptr, &address_file },
408 { "address_pipe", vtype_stringptr, &address_pipe },
409 { "authenticated_id", vtype_stringptr, &authenticated_id },
410 { "authenticated_sender",vtype_stringptr, &authenticated_sender },
411 { "authentication_failed",vtype_int, &authentication_failed },
9e949f00
PP
412#ifdef WITH_CONTENT_SCAN
413 { "av_failed", vtype_int, &av_failed },
414#endif
8523533c
TK
415#ifdef EXPERIMENTAL_BRIGHTMAIL
416 { "bmi_alt_location", vtype_stringptr, &bmi_alt_location },
417 { "bmi_base64_tracker_verdict", vtype_stringptr, &bmi_base64_tracker_verdict },
418 { "bmi_base64_verdict", vtype_stringptr, &bmi_base64_verdict },
419 { "bmi_deliver", vtype_int, &bmi_deliver },
420#endif
059ec3d9
PH
421 { "body_linecount", vtype_int, &body_linecount },
422 { "body_zerocount", vtype_int, &body_zerocount },
423 { "bounce_recipient", vtype_stringptr, &bounce_recipient },
424 { "bounce_return_size_limit", vtype_int, &bounce_return_size_limit },
425 { "caller_gid", vtype_gid, &real_gid },
426 { "caller_uid", vtype_uid, &real_uid },
427 { "compile_date", vtype_stringptr, &version_date },
428 { "compile_number", vtype_stringptr, &version_cnumber },
e5a9dba6 429 { "csa_status", vtype_stringptr, &csa_status },
6a8f9482
TK
430#ifdef EXPERIMENTAL_DCC
431 { "dcc_header", vtype_stringptr, &dcc_header },
432 { "dcc_result", vtype_stringptr, &dcc_result },
433#endif
8523533c
TK
434#ifdef WITH_OLD_DEMIME
435 { "demime_errorlevel", vtype_int, &demime_errorlevel },
436 { "demime_reason", vtype_stringptr, &demime_reason },
fb2274d4 437#endif
80a47a2c
TK
438#ifndef DISABLE_DKIM
439 { "dkim_algo", vtype_dkim, (void *)DKIM_ALGO },
440 { "dkim_bodylength", vtype_dkim, (void *)DKIM_BODYLENGTH },
441 { "dkim_canon_body", vtype_dkim, (void *)DKIM_CANON_BODY },
442 { "dkim_canon_headers", vtype_dkim, (void *)DKIM_CANON_HEADERS },
443 { "dkim_copiedheaders", vtype_dkim, (void *)DKIM_COPIEDHEADERS },
444 { "dkim_created", vtype_dkim, (void *)DKIM_CREATED },
2df588c9 445 { "dkim_cur_signer", vtype_stringptr, &dkim_cur_signer },
e08d09e5 446 { "dkim_domain", vtype_stringptr, &dkim_signing_domain },
80a47a2c
TK
447 { "dkim_expires", vtype_dkim, (void *)DKIM_EXPIRES },
448 { "dkim_headernames", vtype_dkim, (void *)DKIM_HEADERNAMES },
449 { "dkim_identity", vtype_dkim, (void *)DKIM_IDENTITY },
450 { "dkim_key_granularity",vtype_dkim, (void *)DKIM_KEY_GRANULARITY },
451 { "dkim_key_nosubdomains",vtype_dkim, (void *)DKIM_NOSUBDOMAINS },
452 { "dkim_key_notes", vtype_dkim, (void *)DKIM_KEY_NOTES },
453 { "dkim_key_srvtype", vtype_dkim, (void *)DKIM_KEY_SRVTYPE },
454 { "dkim_key_testing", vtype_dkim, (void *)DKIM_KEY_TESTING },
e08d09e5 455 { "dkim_selector", vtype_stringptr, &dkim_signing_selector },
9e5d6b55 456 { "dkim_signers", vtype_stringptr, &dkim_signers },
80a47a2c
TK
457 { "dkim_verify_reason", vtype_dkim, (void *)DKIM_VERIFY_REASON },
458 { "dkim_verify_status", vtype_dkim, (void *)DKIM_VERIFY_STATUS},
8523533c 459#endif
059ec3d9 460 { "dnslist_domain", vtype_stringptr, &dnslist_domain },
93655c46 461 { "dnslist_matched", vtype_stringptr, &dnslist_matched },
059ec3d9
PH
462 { "dnslist_text", vtype_stringptr, &dnslist_text },
463 { "dnslist_value", vtype_stringptr, &dnslist_value },
464 { "domain", vtype_stringptr, &deliver_domain },
465 { "domain_data", vtype_stringptr, &deliver_domain_data },
466 { "exim_gid", vtype_gid, &exim_gid },
467 { "exim_path", vtype_stringptr, &exim_path },
468 { "exim_uid", vtype_uid, &exim_uid },
8523533c
TK
469#ifdef WITH_OLD_DEMIME
470 { "found_extension", vtype_stringptr, &found_extension },
8e669ac1 471#endif
059ec3d9
PH
472 { "home", vtype_stringptr, &deliver_home },
473 { "host", vtype_stringptr, &deliver_host },
474 { "host_address", vtype_stringptr, &deliver_host_address },
475 { "host_data", vtype_stringptr, &host_data },
b08b24c8 476 { "host_lookup_deferred",vtype_int, &host_lookup_deferred },
059ec3d9
PH
477 { "host_lookup_failed", vtype_int, &host_lookup_failed },
478 { "inode", vtype_ino, &deliver_inode },
479 { "interface_address", vtype_stringptr, &interface_address },
480 { "interface_port", vtype_int, &interface_port },
0ce9abe6 481 { "item", vtype_stringptr, &iterate_item },
059ec3d9
PH
482 #ifdef LOOKUP_LDAP
483 { "ldap_dn", vtype_stringptr, &eldap_dn },
484 #endif
485 { "load_average", vtype_load_avg, NULL },
486 { "local_part", vtype_stringptr, &deliver_localpart },
487 { "local_part_data", vtype_stringptr, &deliver_localpart_data },
488 { "local_part_prefix", vtype_stringptr, &deliver_localpart_prefix },
489 { "local_part_suffix", vtype_stringptr, &deliver_localpart_suffix },
490 { "local_scan_data", vtype_stringptr, &local_scan_data },
491 { "local_user_gid", vtype_gid, &local_user_gid },
492 { "local_user_uid", vtype_uid, &local_user_uid },
493 { "localhost_number", vtype_int, &host_number },
5cb8cbc6 494 { "log_inodes", vtype_pinodes, (void *)FALSE },
8e669ac1 495 { "log_space", vtype_pspace, (void *)FALSE },
059ec3d9 496 { "mailstore_basename", vtype_stringptr, &mailstore_basename },
8523533c
TK
497#ifdef WITH_CONTENT_SCAN
498 { "malware_name", vtype_stringptr, &malware_name },
499#endif
d677b2f2 500 { "max_received_linelength", vtype_int, &max_received_linelength },
059ec3d9
PH
501 { "message_age", vtype_int, &message_age },
502 { "message_body", vtype_msgbody, &message_body },
503 { "message_body_end", vtype_msgbody_end, &message_body_end },
504 { "message_body_size", vtype_int, &message_body_size },
1ab52c69 505 { "message_exim_id", vtype_stringptr, &message_id },
059ec3d9 506 { "message_headers", vtype_msgheaders, NULL },
ff75a1f7 507 { "message_headers_raw", vtype_msgheaders_raw, NULL },
059ec3d9 508 { "message_id", vtype_stringptr, &message_id },
2e0c1448 509 { "message_linecount", vtype_int, &message_linecount },
059ec3d9 510 { "message_size", vtype_int, &message_size },
8523533c
TK
511#ifdef WITH_CONTENT_SCAN
512 { "mime_anomaly_level", vtype_int, &mime_anomaly_level },
513 { "mime_anomaly_text", vtype_stringptr, &mime_anomaly_text },
514 { "mime_boundary", vtype_stringptr, &mime_boundary },
515 { "mime_charset", vtype_stringptr, &mime_charset },
516 { "mime_content_description", vtype_stringptr, &mime_content_description },
517 { "mime_content_disposition", vtype_stringptr, &mime_content_disposition },
518 { "mime_content_id", vtype_stringptr, &mime_content_id },
519 { "mime_content_size", vtype_int, &mime_content_size },
520 { "mime_content_transfer_encoding",vtype_stringptr, &mime_content_transfer_encoding },
521 { "mime_content_type", vtype_stringptr, &mime_content_type },
522 { "mime_decoded_filename", vtype_stringptr, &mime_decoded_filename },
523 { "mime_filename", vtype_stringptr, &mime_filename },
524 { "mime_is_coverletter", vtype_int, &mime_is_coverletter },
525 { "mime_is_multipart", vtype_int, &mime_is_multipart },
526 { "mime_is_rfc822", vtype_int, &mime_is_rfc822 },
527 { "mime_part_count", vtype_int, &mime_part_count },
528#endif
059ec3d9
PH
529 { "n0", vtype_filter_int, &filter_n[0] },
530 { "n1", vtype_filter_int, &filter_n[1] },
531 { "n2", vtype_filter_int, &filter_n[2] },
532 { "n3", vtype_filter_int, &filter_n[3] },
533 { "n4", vtype_filter_int, &filter_n[4] },
534 { "n5", vtype_filter_int, &filter_n[5] },
535 { "n6", vtype_filter_int, &filter_n[6] },
536 { "n7", vtype_filter_int, &filter_n[7] },
537 { "n8", vtype_filter_int, &filter_n[8] },
538 { "n9", vtype_filter_int, &filter_n[9] },
539 { "original_domain", vtype_stringptr, &deliver_domain_orig },
540 { "original_local_part", vtype_stringptr, &deliver_localpart_orig },
541 { "originator_gid", vtype_gid, &originator_gid },
542 { "originator_uid", vtype_uid, &originator_uid },
543 { "parent_domain", vtype_stringptr, &deliver_domain_parent },
544 { "parent_local_part", vtype_stringptr, &deliver_localpart_parent },
545 { "pid", vtype_pid, NULL },
546 { "primary_hostname", vtype_stringptr, &primary_hostname },
fffda43a
TK
547 { "prvscheck_address", vtype_stringptr, &prvscheck_address },
548 { "prvscheck_keynum", vtype_stringptr, &prvscheck_keynum },
549 { "prvscheck_result", vtype_stringptr, &prvscheck_result },
059ec3d9
PH
550 { "qualify_domain", vtype_stringptr, &qualify_domain_sender },
551 { "qualify_recipient", vtype_stringptr, &qualify_domain_recipient },
552 { "rcpt_count", vtype_int, &rcpt_count },
553 { "rcpt_defer_count", vtype_int, &rcpt_defer_count },
554 { "rcpt_fail_count", vtype_int, &rcpt_fail_count },
555 { "received_count", vtype_int, &received_count },
556 { "received_for", vtype_stringptr, &received_for },
194cc0e4
PH
557 { "received_ip_address", vtype_stringptr, &interface_address },
558 { "received_port", vtype_int, &interface_port },
059ec3d9 559 { "received_protocol", vtype_stringptr, &received_protocol },
7dbf77c9 560 { "received_time", vtype_int, &received_time },
059ec3d9 561 { "recipient_data", vtype_stringptr, &recipient_data },
8e669ac1 562 { "recipient_verify_failure",vtype_stringptr,&recipient_verify_failure },
059ec3d9
PH
563 { "recipients", vtype_recipients, NULL },
564 { "recipients_count", vtype_int, &recipients_count },
8523533c
TK
565#ifdef WITH_CONTENT_SCAN
566 { "regex_match_string", vtype_stringptr, &regex_match_string },
567#endif
059ec3d9
PH
568 { "reply_address", vtype_reply, NULL },
569 { "return_path", vtype_stringptr, &return_path },
570 { "return_size_limit", vtype_int, &bounce_return_size_limit },
571 { "runrc", vtype_int, &runrc },
572 { "self_hostname", vtype_stringptr, &self_hostname },
573 { "sender_address", vtype_stringptr, &sender_address },
2a3eea10 574 { "sender_address_data", vtype_stringptr, &sender_address_data },
059ec3d9
PH
575 { "sender_address_domain", vtype_domain, &sender_address },
576 { "sender_address_local_part", vtype_localpart, &sender_address },
577 { "sender_data", vtype_stringptr, &sender_data },
578 { "sender_fullhost", vtype_stringptr, &sender_fullhost },
579 { "sender_helo_name", vtype_stringptr, &sender_helo_name },
580 { "sender_host_address", vtype_stringptr, &sender_host_address },
581 { "sender_host_authenticated",vtype_stringptr, &sender_host_authenticated },
11d7e4fa 582 { "sender_host_dnssec", vtype_bool, &sender_host_dnssec },
059ec3d9
PH
583 { "sender_host_name", vtype_host_lookup, NULL },
584 { "sender_host_port", vtype_int, &sender_host_port },
585 { "sender_ident", vtype_stringptr, &sender_ident },
870f6ba8
TF
586 { "sender_rate", vtype_stringptr, &sender_rate },
587 { "sender_rate_limit", vtype_stringptr, &sender_rate_limit },
588 { "sender_rate_period", vtype_stringptr, &sender_rate_period },
059ec3d9 589 { "sender_rcvhost", vtype_stringptr, &sender_rcvhost },
8e669ac1 590 { "sender_verify_failure",vtype_stringptr, &sender_verify_failure },
41c7c167
PH
591 { "sending_ip_address", vtype_stringptr, &sending_ip_address },
592 { "sending_port", vtype_int, &sending_port },
8e669ac1 593 { "smtp_active_hostname", vtype_stringptr, &smtp_active_hostname },
3ee512ff
PH
594 { "smtp_command", vtype_stringptr, &smtp_cmd_buffer },
595 { "smtp_command_argument", vtype_stringptr, &smtp_cmd_argument },
b01dd148 596 { "smtp_count_at_connection_start", vtype_int, &smtp_accept_count },
8f128379 597 { "smtp_notquit_reason", vtype_stringptr, &smtp_notquit_reason },
059ec3d9
PH
598 { "sn0", vtype_filter_int, &filter_sn[0] },
599 { "sn1", vtype_filter_int, &filter_sn[1] },
600 { "sn2", vtype_filter_int, &filter_sn[2] },
601 { "sn3", vtype_filter_int, &filter_sn[3] },
602 { "sn4", vtype_filter_int, &filter_sn[4] },
603 { "sn5", vtype_filter_int, &filter_sn[5] },
604 { "sn6", vtype_filter_int, &filter_sn[6] },
605 { "sn7", vtype_filter_int, &filter_sn[7] },
606 { "sn8", vtype_filter_int, &filter_sn[8] },
607 { "sn9", vtype_filter_int, &filter_sn[9] },
8523533c
TK
608#ifdef WITH_CONTENT_SCAN
609 { "spam_bar", vtype_stringptr, &spam_bar },
610 { "spam_report", vtype_stringptr, &spam_report },
611 { "spam_score", vtype_stringptr, &spam_score },
612 { "spam_score_int", vtype_stringptr, &spam_score_int },
613#endif
614#ifdef EXPERIMENTAL_SPF
65a7d8c3 615 { "spf_guess", vtype_stringptr, &spf_guess },
8523533c
TK
616 { "spf_header_comment", vtype_stringptr, &spf_header_comment },
617 { "spf_received", vtype_stringptr, &spf_received },
618 { "spf_result", vtype_stringptr, &spf_result },
619 { "spf_smtp_comment", vtype_stringptr, &spf_smtp_comment },
620#endif
059ec3d9 621 { "spool_directory", vtype_stringptr, &spool_directory },
5cb8cbc6 622 { "spool_inodes", vtype_pinodes, (void *)TRUE },
8e669ac1 623 { "spool_space", vtype_pspace, (void *)TRUE },
8523533c
TK
624#ifdef EXPERIMENTAL_SRS
625 { "srs_db_address", vtype_stringptr, &srs_db_address },
626 { "srs_db_key", vtype_stringptr, &srs_db_key },
627 { "srs_orig_recipient", vtype_stringptr, &srs_orig_recipient },
628 { "srs_orig_sender", vtype_stringptr, &srs_orig_sender },
629 { "srs_recipient", vtype_stringptr, &srs_recipient },
630 { "srs_status", vtype_stringptr, &srs_status },
631#endif
059ec3d9 632 { "thisaddress", vtype_stringptr, &filter_thisaddress },
817d9f57 633
d9b2312b 634 /* The non-(in,out) variables are now deprecated */
817d9f57
JH
635 { "tls_bits", vtype_int, &tls_in.bits },
636 { "tls_certificate_verified", vtype_int, &tls_in.certificate_verified },
637 { "tls_cipher", vtype_stringptr, &tls_in.cipher },
d9b2312b
JH
638
639 { "tls_in_bits", vtype_int, &tls_in.bits },
640 { "tls_in_certificate_verified", vtype_int, &tls_in.certificate_verified },
641 { "tls_in_cipher", vtype_stringptr, &tls_in.cipher },
642 { "tls_in_peerdn", vtype_stringptr, &tls_in.peerdn },
643#if defined(SUPPORT_TLS) && !defined(USE_GNUTLS)
644 { "tls_in_sni", vtype_stringptr, &tls_in.sni },
645#endif
817d9f57 646 { "tls_out_bits", vtype_int, &tls_out.bits },
cb9d95ae 647 { "tls_out_certificate_verified", vtype_int,&tls_out.certificate_verified },
817d9f57
JH
648 { "tls_out_cipher", vtype_stringptr, &tls_out.cipher },
649 { "tls_out_peerdn", vtype_stringptr, &tls_out.peerdn },
650#if defined(SUPPORT_TLS) && !defined(USE_GNUTLS)
651 { "tls_out_sni", vtype_stringptr, &tls_out.sni },
7be682ca 652#endif
d9b2312b 653
613dd4ae
JH
654 { "tls_peerdn", vtype_stringptr, &tls_in.peerdn }, /* mind the alphabetical order! */
655#if defined(SUPPORT_TLS) && !defined(USE_GNUTLS)
656 { "tls_sni", vtype_stringptr, &tls_in.sni }, /* mind the alphabetical order! */
657#endif
817d9f57 658
059ec3d9
PH
659 { "tod_bsdinbox", vtype_todbsdin, NULL },
660 { "tod_epoch", vtype_tode, NULL },
f5787926 661 { "tod_epoch_l", vtype_todel, NULL },
059ec3d9
PH
662 { "tod_full", vtype_todf, NULL },
663 { "tod_log", vtype_todl, NULL },
664 { "tod_logfile", vtype_todlf, NULL },
665 { "tod_zone", vtype_todzone, NULL },
666 { "tod_zulu", vtype_todzulu, NULL },
667 { "value", vtype_stringptr, &lookup_value },
668 { "version_number", vtype_stringptr, &version_string },
669 { "warn_message_delay", vtype_stringptr, &warnmsg_delay },
670 { "warn_message_recipient",vtype_stringptr, &warnmsg_recipients },
671 { "warn_message_recipients",vtype_stringptr,&warnmsg_recipients },
672 { "warnmsg_delay", vtype_stringptr, &warnmsg_delay },
673 { "warnmsg_recipient", vtype_stringptr, &warnmsg_recipients },
674 { "warnmsg_recipients", vtype_stringptr, &warnmsg_recipients }
675};
676
677static int var_table_size = sizeof(var_table)/sizeof(var_entry);
678static uschar var_buffer[256];
679static BOOL malformed_header;
680
681/* For textual hashes */
682
1ba28e2b
PP
683static const char *hashcodes = "abcdefghijklmnopqrtsuvwxyz"
684 "ABCDEFGHIJKLMNOPQRSTUVWXYZ"
685 "0123456789";
059ec3d9
PH
686
687enum { HMAC_MD5, HMAC_SHA1 };
688
689/* For numeric hashes */
690
691static unsigned int prime[] = {
692 2, 3, 5, 7, 11, 13, 17, 19, 23, 29,
693 31, 37, 41, 43, 47, 53, 59, 61, 67, 71,
694 73, 79, 83, 89, 97, 101, 103, 107, 109, 113};
695
696/* For printing modes in symbolic form */
697
698static uschar *mtable_normal[] =
699 { US"---", US"--x", US"-w-", US"-wx", US"r--", US"r-x", US"rw-", US"rwx" };
700
701static uschar *mtable_setid[] =
702 { US"--S", US"--s", US"-wS", US"-ws", US"r-S", US"r-s", US"rwS", US"rws" };
703
704static uschar *mtable_sticky[] =
705 { US"--T", US"--t", US"-wT", US"-wt", US"r-T", US"r-t", US"rwT", US"rwt" };
706
707
708
709/*************************************************
710* Tables for UTF-8 support *
711*************************************************/
712
713/* Table of the number of extra characters, indexed by the first character
714masked with 0x3f. The highest number for a valid UTF-8 character is in fact
7150x3d. */
716
717static uschar utf8_table1[] = {
718 1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,
719 1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,
720 2,2,2,2,2,2,2,2,2,2,2,2,2,2,2,2,
721 3,3,3,3,3,3,3,3,4,4,4,4,5,5,5,5 };
722
723/* These are the masks for the data bits in the first byte of a character,
724indexed by the number of additional bytes. */
725
726static int utf8_table2[] = { 0xff, 0x1f, 0x0f, 0x07, 0x03, 0x01};
727
728/* Get the next UTF-8 character, advancing the pointer. */
729
730#define GETUTF8INC(c, ptr) \
731 c = *ptr++; \
732 if ((c & 0xc0) == 0xc0) \
733 { \
734 int a = utf8_table1[c & 0x3f]; /* Number of additional bytes */ \
735 int s = 6*a; \
736 c = (c & utf8_table2[a]) << s; \
737 while (a-- > 0) \
738 { \
739 s -= 6; \
740 c |= (*ptr++ & 0x3f) << s; \
741 } \
742 }
743
744
745/*************************************************
746* Binary chop search on a table *
747*************************************************/
748
749/* This is used for matching expansion items and operators.
750
751Arguments:
752 name the name that is being sought
753 table the table to search
754 table_size the number of items in the table
755
756Returns: the offset in the table, or -1
757*/
758
759static int
760chop_match(uschar *name, uschar **table, int table_size)
761{
762uschar **bot = table;
763uschar **top = table + table_size;
764
765while (top > bot)
766 {
767 uschar **mid = bot + (top - bot)/2;
768 int c = Ustrcmp(name, *mid);
769 if (c == 0) return mid - table;
770 if (c > 0) bot = mid + 1; else top = mid;
771 }
772
773return -1;
774}
775
776
777
778/*************************************************
779* Check a condition string *
780*************************************************/
781
782/* This function is called to expand a string, and test the result for a "true"
783or "false" value. Failure of the expansion yields FALSE; logged unless it was a
784forced fail or lookup defer. All store used by the function can be released on
785exit.
786
6a8de854
PP
787The actual false-value tests should be replicated for ECOND_BOOL_LAX.
788
059ec3d9
PH
789Arguments:
790 condition the condition string
791 m1 text to be incorporated in panic error
792 m2 ditto
793
794Returns: TRUE if condition is met, FALSE if not
795*/
796
797BOOL
798expand_check_condition(uschar *condition, uschar *m1, uschar *m2)
799{
800int rc;
801void *reset_point = store_get(0);
802uschar *ss = expand_string(condition);
803if (ss == NULL)
804 {
805 if (!expand_string_forcedfail && !search_find_defer)
806 log_write(0, LOG_MAIN|LOG_PANIC, "failed to expand condition \"%s\" "
807 "for %s %s: %s", condition, m1, m2, expand_string_message);
808 return FALSE;
809 }
810rc = ss[0] != 0 && Ustrcmp(ss, "0") != 0 && strcmpic(ss, US"no") != 0 &&
811 strcmpic(ss, US"false") != 0;
812store_reset(reset_point);
813return rc;
814}
815
816
817
17c76198 818
9e3331ea
TK
819/*************************************************
820* Pseudo-random number generation *
821*************************************************/
822
823/* Pseudo-random number generation. The result is not "expected" to be
824cryptographically strong but not so weak that someone will shoot themselves
825in the foot using it as a nonce in some email header scheme or whatever
826weirdness they'll twist this into. The result should ideally handle fork().
827
828However, if we're stuck unable to provide this, then we'll fall back to
829appallingly bad randomness.
830
17c76198
PP
831If SUPPORT_TLS is defined then this will not be used except as an emergency
832fallback.
9e3331ea
TK
833
834Arguments:
835 max range maximum
836Returns a random number in range [0, max-1]
837*/
838
17c76198
PP
839#ifdef SUPPORT_TLS
840# define vaguely_random_number vaguely_random_number_fallback
841#endif
9e3331ea 842int
17c76198 843vaguely_random_number(int max)
9e3331ea 844{
17c76198
PP
845#ifdef SUPPORT_TLS
846# undef vaguely_random_number
847#endif
9e3331ea
TK
848 static pid_t pid = 0;
849 pid_t p2;
850#if defined(HAVE_SRANDOM) && !defined(HAVE_SRANDOMDEV)
851 struct timeval tv;
852#endif
853
854 p2 = getpid();
855 if (p2 != pid)
856 {
857 if (pid != 0)
858 {
859
860#ifdef HAVE_ARC4RANDOM
861 /* cryptographically strong randomness, common on *BSD platforms, not
862 so much elsewhere. Alas. */
863 arc4random_stir();
864#elif defined(HAVE_SRANDOM) || defined(HAVE_SRANDOMDEV)
865#ifdef HAVE_SRANDOMDEV
866 /* uses random(4) for seeding */
867 srandomdev();
868#else
869 gettimeofday(&tv, NULL);
870 srandom(tv.tv_sec | tv.tv_usec | getpid());
871#endif
872#else
873 /* Poor randomness and no seeding here */
874#endif
875
876 }
877 pid = p2;
878 }
879
880#ifdef HAVE_ARC4RANDOM
881 return arc4random() % max;
882#elif defined(HAVE_SRANDOM) || defined(HAVE_SRANDOMDEV)
883 return random() % max;
884#else
885 /* This one returns a 16-bit number, definitely not crypto-strong */
886 return random_number(max);
887#endif
888}
889
17c76198
PP
890
891
9e3331ea 892
059ec3d9
PH
893/*************************************************
894* Pick out a name from a string *
895*************************************************/
896
897/* If the name is too long, it is silently truncated.
898
899Arguments:
900 name points to a buffer into which to put the name
901 max is the length of the buffer
902 s points to the first alphabetic character of the name
903 extras chars other than alphanumerics to permit
904
905Returns: pointer to the first character after the name
906
907Note: The test for *s != 0 in the while loop is necessary because
908Ustrchr() yields non-NULL if the character is zero (which is not something
909I expected). */
910
911static uschar *
912read_name(uschar *name, int max, uschar *s, uschar *extras)
913{
914int ptr = 0;
915while (*s != 0 && (isalnum(*s) || Ustrchr(extras, *s) != NULL))
916 {
917 if (ptr < max-1) name[ptr++] = *s;
918 s++;
919 }
920name[ptr] = 0;
921return s;
922}
923
924
925
926/*************************************************
927* Pick out the rest of a header name *
928*************************************************/
929
930/* A variable name starting $header_ (or just $h_ for those who like
931abbreviations) might not be the complete header name because headers can
932contain any printing characters in their names, except ':'. This function is
933called to read the rest of the name, chop h[eader]_ off the front, and put ':'
934on the end, if the name was terminated by white space.
935
936Arguments:
937 name points to a buffer in which the name read so far exists
938 max is the length of the buffer
939 s points to the first character after the name so far, i.e. the
940 first non-alphameric character after $header_xxxxx
941
942Returns: a pointer to the first character after the header name
943*/
944
945static uschar *
946read_header_name(uschar *name, int max, uschar *s)
947{
948int prelen = Ustrchr(name, '_') - name + 1;
949int ptr = Ustrlen(name) - prelen;
950if (ptr > 0) memmove(name, name+prelen, ptr);
951while (mac_isgraph(*s) && *s != ':')
952 {
953 if (ptr < max-1) name[ptr++] = *s;
954 s++;
955 }
956if (*s == ':') s++;
957name[ptr++] = ':';
958name[ptr] = 0;
959return s;
960}
961
962
963
964/*************************************************
965* Pick out a number from a string *
966*************************************************/
967
968/* Arguments:
969 n points to an integer into which to put the number
970 s points to the first digit of the number
971
972Returns: a pointer to the character after the last digit
973*/
974
975static uschar *
976read_number(int *n, uschar *s)
977{
978*n = 0;
979while (isdigit(*s)) *n = *n * 10 + (*s++ - '0');
980return s;
981}
982
983
984
985/*************************************************
986* Extract keyed subfield from a string *
987*************************************************/
988
989/* The yield is in dynamic store; NULL means that the key was not found.
990
991Arguments:
992 key points to the name of the key
993 s points to the string from which to extract the subfield
994
995Returns: NULL if the subfield was not found, or
996 a pointer to the subfield's data
997*/
998
999static uschar *
1000expand_getkeyed(uschar *key, uschar *s)
1001{
1002int length = Ustrlen(key);
1003while (isspace(*s)) s++;
1004
1005/* Loop to search for the key */
1006
1007while (*s != 0)
1008 {
1009 int dkeylength;
1010 uschar *data;
1011 uschar *dkey = s;
1012
1013 while (*s != 0 && *s != '=' && !isspace(*s)) s++;
1014 dkeylength = s - dkey;
1015 while (isspace(*s)) s++;
1016 if (*s == '=') while (isspace((*(++s))));
1017
1018 data = string_dequote(&s);
1019 if (length == dkeylength && strncmpic(key, dkey, length) == 0)
1020 return data;
1021
1022 while (isspace(*s)) s++;
1023 }
1024
1025return NULL;
1026}
1027
1028
1029
1030
1031/*************************************************
1032* Extract numbered subfield from string *
1033*************************************************/
1034
1035/* Extracts a numbered field from a string that is divided by tokens - for
1036example a line from /etc/passwd is divided by colon characters. First field is
1037numbered one. Negative arguments count from the right. Zero returns the whole
1038string. Returns NULL if there are insufficient tokens in the string
1039
1040***WARNING***
1041Modifies final argument - this is a dynamically generated string, so that's OK.
1042
1043Arguments:
1044 field number of field to be extracted,
1045 first field = 1, whole string = 0, last field = -1
1046 separators characters that are used to break string into tokens
1047 s points to the string from which to extract the subfield
1048
1049Returns: NULL if the field was not found,
1050 a pointer to the field's data inside s (modified to add 0)
1051*/
1052
1053static uschar *
1054expand_gettokened (int field, uschar *separators, uschar *s)
1055{
1056int sep = 1;
1057int count;
1058uschar *ss = s;
1059uschar *fieldtext = NULL;
1060
1061if (field == 0) return s;
1062
1063/* Break the line up into fields in place; for field > 0 we stop when we have
1064done the number of fields we want. For field < 0 we continue till the end of
1065the string, counting the number of fields. */
1066
1067count = (field > 0)? field : INT_MAX;
1068
1069while (count-- > 0)
1070 {
1071 size_t len;
1072
1073 /* Previous field was the last one in the string. For a positive field
1074 number, this means there are not enough fields. For a negative field number,
1075 check that there are enough, and scan back to find the one that is wanted. */
1076
1077 if (sep == 0)
1078 {
1079 if (field > 0 || (-field) > (INT_MAX - count - 1)) return NULL;
1080 if ((-field) == (INT_MAX - count - 1)) return s;
1081 while (field++ < 0)
1082 {
1083 ss--;
1084 while (ss[-1] != 0) ss--;
1085 }
1086 fieldtext = ss;
1087 break;
1088 }
1089
1090 /* Previous field was not last in the string; save its start and put a
1091 zero at its end. */
1092
1093 fieldtext = ss;
1094 len = Ustrcspn(ss, separators);
1095 sep = ss[len];
1096 ss[len] = 0;
1097 ss += len + 1;
1098 }
1099
1100return fieldtext;
1101}
1102
1103
1104
1105/*************************************************
1106* Extract a substring from a string *
1107*************************************************/
1108
1109/* Perform the ${substr or ${length expansion operations.
1110
1111Arguments:
1112 subject the input string
1113 value1 the offset from the start of the input string to the start of
1114 the output string; if negative, count from the right.
1115 value2 the length of the output string, or negative (-1) for unset
1116 if value1 is positive, unset means "all after"
1117 if value1 is negative, unset means "all before"
1118 len set to the length of the returned string
1119
1120Returns: pointer to the output string, or NULL if there is an error
1121*/
1122
1123static uschar *
1124extract_substr(uschar *subject, int value1, int value2, int *len)
1125{
1126int sublen = Ustrlen(subject);
1127
1128if (value1 < 0) /* count from right */
1129 {
1130 value1 += sublen;
1131
1132 /* If the position is before the start, skip to the start, and adjust the
1133 length. If the length ends up negative, the substring is null because nothing
1134 can precede. This falls out naturally when the length is unset, meaning "all
1135 to the left". */
1136
1137 if (value1 < 0)
1138 {
1139 value2 += value1;
1140 if (value2 < 0) value2 = 0;
1141 value1 = 0;
1142 }
1143
1144 /* Otherwise an unset length => characters before value1 */
1145
1146 else if (value2 < 0)
1147 {
1148 value2 = value1;
1149 value1 = 0;
1150 }
1151 }
1152
1153/* For a non-negative offset, if the starting position is past the end of the
1154string, the result will be the null string. Otherwise, an unset length means
1155"rest"; just set it to the maximum - it will be cut down below if necessary. */
1156
1157else
1158 {
1159 if (value1 > sublen)
1160 {
1161 value1 = sublen;
1162 value2 = 0;
1163 }
1164 else if (value2 < 0) value2 = sublen;
1165 }
1166
1167/* Cut the length down to the maximum possible for the offset value, and get
1168the required characters. */
1169
1170if (value1 + value2 > sublen) value2 = sublen - value1;
1171*len = value2;
1172return subject + value1;
1173}
1174
1175
1176
1177
1178/*************************************************
1179* Old-style hash of a string *
1180*************************************************/
1181
1182/* Perform the ${hash expansion operation.
1183
1184Arguments:
1185 subject the input string (an expanded substring)
1186 value1 the length of the output string; if greater or equal to the
1187 length of the input string, the input string is returned
1188 value2 the number of hash characters to use, or 26 if negative
1189 len set to the length of the returned string
1190
1191Returns: pointer to the output string, or NULL if there is an error
1192*/
1193
1194static uschar *
1195compute_hash(uschar *subject, int value1, int value2, int *len)
1196{
1197int sublen = Ustrlen(subject);
1198
1199if (value2 < 0) value2 = 26;
1200else if (value2 > Ustrlen(hashcodes))
1201 {
1202 expand_string_message =
1203 string_sprintf("hash count \"%d\" too big", value2);
1204 return NULL;
1205 }
1206
1207/* Calculate the hash text. We know it is shorter than the original string, so
1208can safely place it in subject[] (we know that subject is always itself an
1209expanded substring). */
1210
1211if (value1 < sublen)
1212 {
1213 int c;
1214 int i = 0;
1215 int j = value1;
1216 while ((c = (subject[j])) != 0)
1217 {
1218 int shift = (c + j++) & 7;
1219 subject[i] ^= (c << shift) | (c >> (8-shift));
1220 if (++i >= value1) i = 0;
1221 }
1222 for (i = 0; i < value1; i++)
1223 subject[i] = hashcodes[(subject[i]) % value2];
1224 }
1225else value1 = sublen;
1226
1227*len = value1;
1228return subject;
1229}
1230
1231
1232
1233
1234/*************************************************
1235* Numeric hash of a string *
1236*************************************************/
1237
1238/* Perform the ${nhash expansion operation. The first characters of the
1239string are treated as most important, and get the highest prime numbers.
1240
1241Arguments:
1242 subject the input string
1243 value1 the maximum value of the first part of the result
1244 value2 the maximum value of the second part of the result,
1245 or negative to produce only a one-part result
1246 len set to the length of the returned string
1247
1248Returns: pointer to the output string, or NULL if there is an error.
1249*/
1250
1251static uschar *
1252compute_nhash (uschar *subject, int value1, int value2, int *len)
1253{
1254uschar *s = subject;
1255int i = 0;
1256unsigned long int total = 0; /* no overflow */
1257
1258while (*s != 0)
1259 {
1260 if (i == 0) i = sizeof(prime)/sizeof(int) - 1;
1261 total += prime[i--] * (unsigned int)(*s++);
1262 }
1263
1264/* If value2 is unset, just compute one number */
1265
1266if (value2 < 0)
1267 {
1268 s = string_sprintf("%d", total % value1);
1269 }
1270
1271/* Otherwise do a div/mod hash */
1272
1273else
1274 {
1275 total = total % (value1 * value2);
1276 s = string_sprintf("%d/%d", total/value2, total % value2);
1277 }
1278
1279*len = Ustrlen(s);
1280return s;
1281}
1282
1283
1284
1285
1286
1287/*************************************************
1288* Find the value of a header or headers *
1289*************************************************/
1290
1291/* Multiple instances of the same header get concatenated, and this function
1292can also return a concatenation of all the header lines. When concatenating
1293specific headers that contain lists of addresses, a comma is inserted between
1294them. Otherwise we use a straight concatenation. Because some messages can have
1295pathologically large number of lines, there is a limit on the length that is
1296returned. Also, to avoid massive store use which would result from using
1297string_cat() as it copies and extends strings, we do a preliminary pass to find
1298out exactly how much store will be needed. On "normal" messages this will be
1299pretty trivial.
1300
1301Arguments:
1302 name the name of the header, without the leading $header_ or $h_,
1303 or NULL if a concatenation of all headers is required
1304 exists_only TRUE if called from a def: test; don't need to build a string;
1305 just return a string that is not "" and not "0" if the header
1306 exists
1307 newsize return the size of memory block that was obtained; may be NULL
1308 if exists_only is TRUE
1309 want_raw TRUE if called for $rh_ or $rheader_ variables; no processing,
ff75a1f7
PH
1310 other than concatenating, will be done on the header. Also used
1311 for $message_headers_raw.
059ec3d9
PH
1312 charset name of charset to translate MIME words to; used only if
1313 want_raw is false; if NULL, no translation is done (this is
1314 used for $bh_ and $bheader_)
1315
1316Returns: NULL if the header does not exist, else a pointer to a new
1317 store block
1318*/
1319
1320static uschar *
1321find_header(uschar *name, BOOL exists_only, int *newsize, BOOL want_raw,
1322 uschar *charset)
1323{
1324BOOL found = name == NULL;
1325int comma = 0;
1326int len = found? 0 : Ustrlen(name);
1327int i;
1328uschar *yield = NULL;
1329uschar *ptr = NULL;
1330
1331/* Loop for two passes - saves code repetition */
1332
1333for (i = 0; i < 2; i++)
1334 {
1335 int size = 0;
1336 header_line *h;
1337
1338 for (h = header_list; size < header_insert_maxlen && h != NULL; h = h->next)
1339 {
1340 if (h->type != htype_old && h->text != NULL) /* NULL => Received: placeholder */
1341 {
1342 if (name == NULL || (len <= h->slen && strncmpic(name, h->text, len) == 0))
1343 {
1344 int ilen;
1345 uschar *t;
1346
1347 if (exists_only) return US"1"; /* don't need actual string */
1348 found = TRUE;
1349 t = h->text + len; /* text to insert */
1350 if (!want_raw) /* unless wanted raw, */
1351 while (isspace(*t)) t++; /* remove leading white space */
1352 ilen = h->slen - (t - h->text); /* length to insert */
1353
fd700877
PH
1354 /* Unless wanted raw, remove trailing whitespace, including the
1355 newline. */
1356
1357 if (!want_raw)
1358 while (ilen > 0 && isspace(t[ilen-1])) ilen--;
1359
059ec3d9
PH
1360 /* Set comma = 1 if handling a single header and it's one of those
1361 that contains an address list, except when asked for raw headers. Only
1362 need to do this once. */
1363
1364 if (!want_raw && name != NULL && comma == 0 &&
1365 Ustrchr("BCFRST", h->type) != NULL)
1366 comma = 1;
1367
1368 /* First pass - compute total store needed; second pass - compute
1369 total store used, including this header. */
1370
fd700877 1371 size += ilen + comma + 1; /* +1 for the newline */
059ec3d9
PH
1372
1373 /* Second pass - concatentate the data, up to a maximum. Note that
1374 the loop stops when size hits the limit. */
1375
1376 if (i != 0)
1377 {
1378 if (size > header_insert_maxlen)
1379 {
fd700877 1380 ilen -= size - header_insert_maxlen - 1;
059ec3d9
PH
1381 comma = 0;
1382 }
1383 Ustrncpy(ptr, t, ilen);
1384 ptr += ilen;
fd700877
PH
1385
1386 /* For a non-raw header, put in the comma if needed, then add
3168332a
PH
1387 back the newline we removed above, provided there was some text in
1388 the header. */
fd700877 1389
3168332a 1390 if (!want_raw && ilen > 0)
059ec3d9 1391 {
3168332a 1392 if (comma != 0) *ptr++ = ',';
059ec3d9
PH
1393 *ptr++ = '\n';
1394 }
1395 }
1396 }
1397 }
1398 }
1399
fd700877
PH
1400 /* At end of first pass, return NULL if no header found. Then truncate size
1401 if necessary, and get the buffer to hold the data, returning the buffer size.
1402 */
059ec3d9
PH
1403
1404 if (i == 0)
1405 {
1406 if (!found) return NULL;
1407 if (size > header_insert_maxlen) size = header_insert_maxlen;
1408 *newsize = size + 1;
1409 ptr = yield = store_get(*newsize);
1410 }
1411 }
1412
059ec3d9
PH
1413/* That's all we do for raw header expansion. */
1414
1415if (want_raw)
1416 {
1417 *ptr = 0;
1418 }
1419
fd700877
PH
1420/* Otherwise, remove a final newline and a redundant added comma. Then we do
1421RFC 2047 decoding, translating the charset if requested. The rfc2047_decode2()
059ec3d9
PH
1422function can return an error with decoded data if the charset translation
1423fails. If decoding fails, it returns NULL. */
1424
1425else
1426 {
1427 uschar *decoded, *error;
3168332a 1428 if (ptr > yield && ptr[-1] == '\n') ptr--;
fd700877 1429 if (ptr > yield && comma != 0 && ptr[-1] == ',') ptr--;
059ec3d9 1430 *ptr = 0;
a0d6ba8a
PH
1431 decoded = rfc2047_decode2(yield, check_rfc2047_length, charset, '?', NULL,
1432 newsize, &error);
059ec3d9
PH
1433 if (error != NULL)
1434 {
1435 DEBUG(D_any) debug_printf("*** error in RFC 2047 decoding: %s\n"
1436 " input was: %s\n", error, yield);
1437 }
1438 if (decoded != NULL) yield = decoded;
1439 }
1440
1441return yield;
1442}
1443
1444
1445
1446
1447/*************************************************
1448* Find value of a variable *
1449*************************************************/
1450
1451/* The table of variables is kept in alphabetic order, so we can search it
1452using a binary chop. The "choplen" variable is nothing to do with the binary
1453chop.
1454
1455Arguments:
1456 name the name of the variable being sought
1457 exists_only TRUE if this is a def: test; passed on to find_header()
1458 skipping TRUE => skip any processing evaluation; this is not the same as
1459 exists_only because def: may test for values that are first
1460 evaluated here
1461 newsize pointer to an int which is initially zero; if the answer is in
1462 a new memory buffer, *newsize is set to its size
1463
1464Returns: NULL if the variable does not exist, or
1465 a pointer to the variable's contents, or
1466 something non-NULL if exists_only is TRUE
1467*/
1468
1469static uschar *
1470find_variable(uschar *name, BOOL exists_only, BOOL skipping, int *newsize)
1471{
1472int first = 0;
1473int last = var_table_size;
1474
38a0a95f
PH
1475/* Handle ACL variables, whose names are of the form acl_cxxx or acl_mxxx.
1476Originally, xxx had to be a number in the range 0-9 (later 0-19), but from
1477release 4.64 onwards arbitrary names are permitted, as long as the first 5
641cb756
PH
1478characters are acl_c or acl_m and the sixth is either a digit or an underscore
1479(this gave backwards compatibility at the changeover). There may be built-in
1480variables whose names start acl_ but they should never start in this way. This
1481slightly messy specification is a consequence of the history, needless to say.
47ca6d6c 1482
38a0a95f
PH
1483If an ACL variable does not exist, treat it as empty, unless strict_acl_vars is
1484set, in which case give an error. */
47ca6d6c 1485
641cb756
PH
1486if ((Ustrncmp(name, "acl_c", 5) == 0 || Ustrncmp(name, "acl_m", 5) == 0) &&
1487 !isalpha(name[5]))
38a0a95f
PH
1488 {
1489 tree_node *node =
1490 tree_search((name[4] == 'c')? acl_var_c : acl_var_m, name + 4);
1491 return (node == NULL)? (strict_acl_vars? NULL : US"") : node->data.ptr;
47ca6d6c
PH
1492 }
1493
38a0a95f 1494/* Handle $auth<n> variables. */
f78eb7c6
PH
1495
1496if (Ustrncmp(name, "auth", 4) == 0)
1497 {
1498 uschar *endptr;
1499 int n = Ustrtoul(name + 4, &endptr, 10);
1500 if (*endptr == 0 && n != 0 && n <= AUTH_VARS)
1501 return (auth_vars[n-1] == NULL)? US"" : auth_vars[n-1];
1502 }
1503
47ca6d6c
PH
1504/* For all other variables, search the table */
1505
059ec3d9
PH
1506while (last > first)
1507 {
1508 uschar *s, *domain;
1509 uschar **ss;
1510 int middle = (first + last)/2;
1511 int c = Ustrcmp(name, var_table[middle].name);
1512
1513 if (c > 0) { first = middle + 1; continue; }
1514 if (c < 0) { last = middle; continue; }
1515
1516 /* Found an existing variable. If in skipping state, the value isn't needed,
47ca6d6c 1517 and we want to avoid processing (such as looking up the host name). */
059ec3d9
PH
1518
1519 if (skipping) return US"";
1520
1521 switch (var_table[middle].type)
1522 {
9a26b6b2
PH
1523 case vtype_filter_int:
1524 if (!filter_running) return NULL;
1525 /* Fall through */
1526 /* VVVVVVVVVVVV */
059ec3d9
PH
1527 case vtype_int:
1528 sprintf(CS var_buffer, "%d", *(int *)(var_table[middle].value)); /* Integer */
1529 return var_buffer;
1530
1531 case vtype_ino:
1532 sprintf(CS var_buffer, "%ld", (long int)(*(ino_t *)(var_table[middle].value))); /* Inode */
1533 return var_buffer;
1534
1535 case vtype_gid:
1536 sprintf(CS var_buffer, "%ld", (long int)(*(gid_t *)(var_table[middle].value))); /* gid */
1537 return var_buffer;
1538
1539 case vtype_uid:
1540 sprintf(CS var_buffer, "%ld", (long int)(*(uid_t *)(var_table[middle].value))); /* uid */
1541 return var_buffer;
1542
11d7e4fa
PP
1543 case vtype_bool:
1544 sprintf(CS var_buffer, "%s", *(BOOL *)(var_table[middle].value) ? "yes" : "no"); /* bool */
1545 return var_buffer;
1546
059ec3d9
PH
1547 case vtype_stringptr: /* Pointer to string */
1548 s = *((uschar **)(var_table[middle].value));
1549 return (s == NULL)? US"" : s;
1550
1551 case vtype_pid:
1552 sprintf(CS var_buffer, "%d", (int)getpid()); /* pid */
1553 return var_buffer;
1554
1555 case vtype_load_avg:
8669f003 1556 sprintf(CS var_buffer, "%d", OS_GETLOADAVG()); /* load_average */
059ec3d9
PH
1557 return var_buffer;
1558
1559 case vtype_host_lookup: /* Lookup if not done so */
1560 if (sender_host_name == NULL && sender_host_address != NULL &&
1561 !host_lookup_failed && host_name_lookup() == OK)
1562 host_build_sender_fullhost();
1563 return (sender_host_name == NULL)? US"" : sender_host_name;
1564
1565 case vtype_localpart: /* Get local part from address */
1566 s = *((uschar **)(var_table[middle].value));
1567 if (s == NULL) return US"";
1568 domain = Ustrrchr(s, '@');
1569 if (domain == NULL) return s;
1570 if (domain - s > sizeof(var_buffer) - 1)
81f91683
PP
1571 log_write(0, LOG_MAIN|LOG_PANIC_DIE, "local part longer than " SIZE_T_FMT
1572 " in string expansion", sizeof(var_buffer));
059ec3d9
PH
1573 Ustrncpy(var_buffer, s, domain - s);
1574 var_buffer[domain - s] = 0;
1575 return var_buffer;
1576
1577 case vtype_domain: /* Get domain from address */
1578 s = *((uschar **)(var_table[middle].value));
1579 if (s == NULL) return US"";
1580 domain = Ustrrchr(s, '@');
1581 return (domain == NULL)? US"" : domain + 1;
1582
1583 case vtype_msgheaders:
1584 return find_header(NULL, exists_only, newsize, FALSE, NULL);
1585
ff75a1f7
PH
1586 case vtype_msgheaders_raw:
1587 return find_header(NULL, exists_only, newsize, TRUE, NULL);
1588
059ec3d9
PH
1589 case vtype_msgbody: /* Pointer to msgbody string */
1590 case vtype_msgbody_end: /* Ditto, the end of the msg */
1591 ss = (uschar **)(var_table[middle].value);
1592 if (*ss == NULL && deliver_datafile >= 0) /* Read body when needed */
1593 {
1594 uschar *body;
0d7eb84a 1595 off_t start_offset = SPOOL_DATA_START_OFFSET;
059ec3d9
PH
1596 int len = message_body_visible;
1597 if (len > message_size) len = message_size;
1598 *ss = body = store_malloc(len+1);
1599 body[0] = 0;
1600 if (var_table[middle].type == vtype_msgbody_end)
1601 {
1602 struct stat statbuf;
1603 if (fstat(deliver_datafile, &statbuf) == 0)
1604 {
1605 start_offset = statbuf.st_size - len;
1606 if (start_offset < SPOOL_DATA_START_OFFSET)
1607 start_offset = SPOOL_DATA_START_OFFSET;
1608 }
1609 }
1610 lseek(deliver_datafile, start_offset, SEEK_SET);
1611 len = read(deliver_datafile, body, len);
1612 if (len > 0)
1613 {
1614 body[len] = 0;
ddea74fa 1615 if (message_body_newlines) /* Separate loops for efficiency */
059ec3d9 1616 {
ddea74fa
PH
1617 while (len > 0)
1618 { if (body[--len] == 0) body[len] = ' '; }
1619 }
1620 else
1621 {
1622 while (len > 0)
1623 { if (body[--len] == '\n' || body[len] == 0) body[len] = ' '; }
059ec3d9
PH
1624 }
1625 }
1626 }
1627 return (*ss == NULL)? US"" : *ss;
1628
1629 case vtype_todbsdin: /* BSD inbox time of day */
1630 return tod_stamp(tod_bsdin);
1631
1632 case vtype_tode: /* Unix epoch time of day */
1633 return tod_stamp(tod_epoch);
1634
f5787926
JH
1635 case vtype_todel: /* Unix epoch/usec time of day */
1636 return tod_stamp(tod_epoch_l);
1637
059ec3d9
PH
1638 case vtype_todf: /* Full time of day */
1639 return tod_stamp(tod_full);
1640
1641 case vtype_todl: /* Log format time of day */
1642 return tod_stamp(tod_log_bare); /* (without timezone) */
1643
1644 case vtype_todzone: /* Time zone offset only */
1645 return tod_stamp(tod_zone);
1646
1647 case vtype_todzulu: /* Zulu time */
1648 return tod_stamp(tod_zulu);
1649
1650 case vtype_todlf: /* Log file datestamp tod */
f1e5fef5 1651 return tod_stamp(tod_log_datestamp_daily);
059ec3d9
PH
1652
1653 case vtype_reply: /* Get reply address */
c8ea1597 1654 s = find_header(US"reply-to:", exists_only, newsize, TRUE,
059ec3d9 1655 headers_charset);
6979240a 1656 if (s != NULL) while (isspace(*s)) s++;
059ec3d9 1657 if (s == NULL || *s == 0)
41a13e0a
PH
1658 {
1659 *newsize = 0; /* For the *s==0 case */
c8ea1597
PH
1660 s = find_header(US"from:", exists_only, newsize, TRUE, headers_charset);
1661 }
1662 if (s != NULL)
1663 {
1664 uschar *t;
1665 while (isspace(*s)) s++;
1666 for (t = s; *t != 0; t++) if (*t == '\n') *t = ' ';
6979240a
PH
1667 while (t > s && isspace(t[-1])) t--;
1668 *t = 0;
41a13e0a 1669 }
059ec3d9
PH
1670 return (s == NULL)? US"" : s;
1671
1672 /* A recipients list is available only during system message filtering,
1673 during ACL processing after DATA, and while expanding pipe commands
1674 generated from a system filter, but not elsewhere. */
1675
1676 case vtype_recipients:
1677 if (!enable_dollar_recipients) return NULL; else
1678 {
1679 int size = 128;
1680 int ptr = 0;
1681 int i;
1682 s = store_get(size);
1683 for (i = 0; i < recipients_count; i++)
1684 {
1685 if (i != 0) s = string_cat(s, &size, &ptr, US", ", 2);
1686 s = string_cat(s, &size, &ptr, recipients_list[i].address,
1687 Ustrlen(recipients_list[i].address));
1688 }
1689 s[ptr] = 0; /* string_cat() leaves room */
1690 }
1691 return s;
8e669ac1 1692
5cb8cbc6
PH
1693 case vtype_pspace:
1694 {
1695 int inodes;
8e669ac1
PH
1696 sprintf(CS var_buffer, "%d",
1697 receive_statvfs(var_table[middle].value == (void *)TRUE, &inodes));
5cb8cbc6
PH
1698 }
1699 return var_buffer;
8e669ac1 1700
5cb8cbc6
PH
1701 case vtype_pinodes:
1702 {
1703 int inodes;
8e669ac1 1704 (void) receive_statvfs(var_table[middle].value == (void *)TRUE, &inodes);
5cb8cbc6
PH
1705 sprintf(CS var_buffer, "%d", inodes);
1706 }
1707 return var_buffer;
80a47a2c 1708
c8307c12 1709 #ifndef DISABLE_DKIM
80a47a2c 1710 case vtype_dkim:
da5dfc3a 1711 return dkim_exim_expand_query((int)(long)var_table[middle].value);
80a47a2c
TK
1712 #endif
1713
059ec3d9
PH
1714 }
1715 }
1716
1717return NULL; /* Unknown variable name */
1718}
1719
1720
1721
1722
d9b2312b
JH
1723void
1724modify_variable(uschar *name, void * value)
1725{
1726int first = 0;
1727int last = var_table_size;
1728
1729while (last > first)
1730 {
1731 int middle = (first + last)/2;
1732 int c = Ustrcmp(name, var_table[middle].name);
1733
1734 if (c > 0) { first = middle + 1; continue; }
1735 if (c < 0) { last = middle; continue; }
1736
1737 /* Found an existing variable; change the item it refers to */
1738 var_table[middle].value = value;
1739 return;
1740 }
1741return; /* Unknown variable name, fail silently */
1742}
1743
1744
1745
1746
1747
059ec3d9
PH
1748/*************************************************
1749* Read and expand substrings *
1750*************************************************/
1751
1752/* This function is called to read and expand argument substrings for various
1753expansion items. Some have a minimum requirement that is less than the maximum;
1754in these cases, the first non-present one is set to NULL.
1755
1756Arguments:
1757 sub points to vector of pointers to set
1758 n maximum number of substrings
1759 m minimum required
1760 sptr points to current string pointer
1761 skipping the skipping flag
1762 check_end if TRUE, check for final '}'
1763 name name of item, for error message
1764
1765Returns: 0 OK; string pointer updated
1766 1 curly bracketing error (too few arguments)
1767 2 too many arguments (only if check_end is set); message set
1768 3 other error (expansion failure)
1769*/
1770
1771static int
1772read_subs(uschar **sub, int n, int m, uschar **sptr, BOOL skipping,
1773 BOOL check_end, uschar *name)
1774{
1775int i;
1776uschar *s = *sptr;
1777
1778while (isspace(*s)) s++;
1779for (i = 0; i < n; i++)
1780 {
1781 if (*s != '{')
1782 {
1783 if (i < m) return 1;
1784 sub[i] = NULL;
1785 break;
1786 }
da6dbe26 1787 sub[i] = expand_string_internal(s+1, TRUE, &s, skipping, TRUE);
059ec3d9
PH
1788 if (sub[i] == NULL) return 3;
1789 if (*s++ != '}') return 1;
1790 while (isspace(*s)) s++;
1791 }
1792if (check_end && *s++ != '}')
1793 {
1794 if (s[-1] == '{')
1795 {
1796 expand_string_message = string_sprintf("Too many arguments for \"%s\" "
1797 "(max is %d)", name, n);
1798 return 2;
1799 }
1800 return 1;
1801 }
1802
1803*sptr = s;
1804return 0;
1805}
1806
1807
1808
1809
641cb756
PH
1810/*************************************************
1811* Elaborate message for bad variable *
1812*************************************************/
1813
1814/* For the "unknown variable" message, take a look at the variable's name, and
1815give additional information about possible ACL variables. The extra information
1816is added on to expand_string_message.
1817
1818Argument: the name of the variable
1819Returns: nothing
1820*/
1821
1822static void
1823check_variable_error_message(uschar *name)
1824{
1825if (Ustrncmp(name, "acl_", 4) == 0)
1826 expand_string_message = string_sprintf("%s (%s)", expand_string_message,
1827 (name[4] == 'c' || name[4] == 'm')?
1828 (isalpha(name[5])?
1829 US"6th character of a user-defined ACL variable must be a digit or underscore" :
1830 US"strict_acl_vars is set" /* Syntax is OK, it has to be this */
1831 ) :
1832 US"user-defined ACL variables must start acl_c or acl_m");
1833}
1834
1835
1836
059ec3d9
PH
1837/*************************************************
1838* Read and evaluate a condition *
1839*************************************************/
1840
1841/*
1842Arguments:
1843 s points to the start of the condition text
1844 yield points to a BOOL to hold the result of the condition test;
1845 if NULL, we are just reading through a condition that is
1846 part of an "or" combination to check syntax, or in a state
1847 where the answer isn't required
1848
1849Returns: a pointer to the first character after the condition, or
1850 NULL after an error
1851*/
1852
1853static uschar *
1854eval_condition(uschar *s, BOOL *yield)
1855{
1856BOOL testfor = TRUE;
1857BOOL tempcond, combined_cond;
1858BOOL *subcondptr;
5cfd2e57 1859BOOL sub2_honour_dollar = TRUE;
059ec3d9 1860int i, rc, cond_type, roffset;
97d17305 1861int_eximarith_t num[2];
059ec3d9
PH
1862struct stat statbuf;
1863uschar name[256];
1864uschar *sub[4];
1865
1866const pcre *re;
1867const uschar *rerror;
1868
1869for (;;)
1870 {
1871 while (isspace(*s)) s++;
1872 if (*s == '!') { testfor = !testfor; s++; } else break;
1873 }
1874
1875/* Numeric comparisons are symbolic */
1876
1877if (*s == '=' || *s == '>' || *s == '<')
1878 {
1879 int p = 0;
1880 name[p++] = *s++;
1881 if (*s == '=')
1882 {
1883 name[p++] = '=';
1884 s++;
1885 }
1886 name[p] = 0;
1887 }
1888
1889/* All other conditions are named */
1890
1891else s = read_name(name, 256, s, US"_");
1892
1893/* If we haven't read a name, it means some non-alpha character is first. */
1894
1895if (name[0] == 0)
1896 {
1897 expand_string_message = string_sprintf("condition name expected, "
1898 "but found \"%.16s\"", s);
1899 return NULL;
1900 }
1901
1902/* Find which condition we are dealing with, and switch on it */
1903
1904cond_type = chop_match(name, cond_table, sizeof(cond_table)/sizeof(uschar *));
1905switch(cond_type)
1906 {
9b4768fa
PH
1907 /* def: tests for a non-empty variable, or for the existence of a header. If
1908 yield == NULL we are in a skipping state, and don't care about the answer. */
059ec3d9
PH
1909
1910 case ECOND_DEF:
1911 if (*s != ':')
1912 {
1913 expand_string_message = US"\":\" expected after \"def\"";
1914 return NULL;
1915 }
1916
1917 s = read_name(name, 256, s+1, US"_");
1918
0d85fa3f
PH
1919 /* Test for a header's existence. If the name contains a closing brace
1920 character, this may be a user error where the terminating colon has been
1921 omitted. Set a flag to adjust a subsequent error message in this case. */
059ec3d9
PH
1922
1923 if (Ustrncmp(name, "h_", 2) == 0 ||
1924 Ustrncmp(name, "rh_", 3) == 0 ||
1925 Ustrncmp(name, "bh_", 3) == 0 ||
1926 Ustrncmp(name, "header_", 7) == 0 ||
1927 Ustrncmp(name, "rheader_", 8) == 0 ||
1928 Ustrncmp(name, "bheader_", 8) == 0)
1929 {
1930 s = read_header_name(name, 256, s);
0d85fa3f 1931 if (Ustrchr(name, '}') != NULL) malformed_header = TRUE;
059ec3d9
PH
1932 if (yield != NULL) *yield =
1933 (find_header(name, TRUE, NULL, FALSE, NULL) != NULL) == testfor;
1934 }
1935
9b4768fa
PH
1936 /* Test for a variable's having a non-empty value. A non-existent variable
1937 causes an expansion failure. */
059ec3d9
PH
1938
1939 else
1940 {
1941 uschar *value = find_variable(name, TRUE, yield == NULL, NULL);
1942 if (value == NULL)
1943 {
1944 expand_string_message = (name[0] == 0)?
1945 string_sprintf("variable name omitted after \"def:\"") :
1946 string_sprintf("unknown variable \"%s\" after \"def:\"", name);
641cb756 1947 check_variable_error_message(name);
059ec3d9
PH
1948 return NULL;
1949 }
9b4768fa 1950 if (yield != NULL) *yield = (value[0] != 0) == testfor;
059ec3d9
PH
1951 }
1952
1953 return s;
1954
1955
1956 /* first_delivery tests for first delivery attempt */
1957
1958 case ECOND_FIRST_DELIVERY:
1959 if (yield != NULL) *yield = deliver_firsttime == testfor;
1960 return s;
1961
1962
1963 /* queue_running tests for any process started by a queue runner */
1964
1965 case ECOND_QUEUE_RUNNING:
1966 if (yield != NULL) *yield = (queue_run_pid != (pid_t)0) == testfor;
1967 return s;
1968
1969
1970 /* exists: tests for file existence
1971 isip: tests for any IP address
1972 isip4: tests for an IPv4 address
1973 isip6: tests for an IPv6 address
1974 pam: does PAM authentication
1975 radius: does RADIUS authentication
1976 ldapauth: does LDAP authentication
1977 pwcheck: does Cyrus SASL pwcheck authentication
1978 */
1979
1980 case ECOND_EXISTS:
1981 case ECOND_ISIP:
1982 case ECOND_ISIP4:
1983 case ECOND_ISIP6:
1984 case ECOND_PAM:
1985 case ECOND_RADIUS:
1986 case ECOND_LDAPAUTH:
1987 case ECOND_PWCHECK:
1988
1989 while (isspace(*s)) s++;
1990 if (*s != '{') goto COND_FAILED_CURLY_START;
1991
da6dbe26 1992 sub[0] = expand_string_internal(s+1, TRUE, &s, yield == NULL, TRUE);
059ec3d9
PH
1993 if (sub[0] == NULL) return NULL;
1994 if (*s++ != '}') goto COND_FAILED_CURLY_END;
1995
1996 if (yield == NULL) return s; /* No need to run the test if skipping */
1997
1998 switch(cond_type)
1999 {
2000 case ECOND_EXISTS:
2001 if ((expand_forbid & RDO_EXISTS) != 0)
2002 {
2003 expand_string_message = US"File existence tests are not permitted";
2004 return NULL;
2005 }
2006 *yield = (Ustat(sub[0], &statbuf) == 0) == testfor;
2007 break;
2008
2009 case ECOND_ISIP:
2010 case ECOND_ISIP4:
2011 case ECOND_ISIP6:
2012 rc = string_is_ip_address(sub[0], NULL);
7e66e54d 2013 *yield = ((cond_type == ECOND_ISIP)? (rc != 0) :
059ec3d9
PH
2014 (cond_type == ECOND_ISIP4)? (rc == 4) : (rc == 6)) == testfor;
2015 break;
2016
2017 /* Various authentication tests - all optionally compiled */
2018
2019 case ECOND_PAM:
2020 #ifdef SUPPORT_PAM
2021 rc = auth_call_pam(sub[0], &expand_string_message);
2022 goto END_AUTH;
2023 #else
2024 goto COND_FAILED_NOT_COMPILED;
2025 #endif /* SUPPORT_PAM */
2026
2027 case ECOND_RADIUS:
2028 #ifdef RADIUS_CONFIG_FILE
2029 rc = auth_call_radius(sub[0], &expand_string_message);
2030 goto END_AUTH;
2031 #else
2032 goto COND_FAILED_NOT_COMPILED;
2033 #endif /* RADIUS_CONFIG_FILE */
2034
2035 case ECOND_LDAPAUTH:
2036 #ifdef LOOKUP_LDAP
2037 {
2038 /* Just to keep the interface the same */
2039 BOOL do_cache;
2040 int old_pool = store_pool;
2041 store_pool = POOL_SEARCH;
2042 rc = eldapauth_find((void *)(-1), NULL, sub[0], Ustrlen(sub[0]), NULL,
2043 &expand_string_message, &do_cache);
2044 store_pool = old_pool;
2045 }
2046 goto END_AUTH;
2047 #else
2048 goto COND_FAILED_NOT_COMPILED;
2049 #endif /* LOOKUP_LDAP */
2050
2051 case ECOND_PWCHECK:
2052 #ifdef CYRUS_PWCHECK_SOCKET
2053 rc = auth_call_pwcheck(sub[0], &expand_string_message);
2054 goto END_AUTH;
2055 #else
2056 goto COND_FAILED_NOT_COMPILED;
2057 #endif /* CYRUS_PWCHECK_SOCKET */
2058
2059 #if defined(SUPPORT_PAM) || defined(RADIUS_CONFIG_FILE) || \
2060 defined(LOOKUP_LDAP) || defined(CYRUS_PWCHECK_SOCKET)
2061 END_AUTH:
2062 if (rc == ERROR || rc == DEFER) return NULL;
2063 *yield = (rc == OK) == testfor;
2064 #endif
2065 }
2066 return s;
2067
2068
2069 /* saslauthd: does Cyrus saslauthd authentication. Four parameters are used:
2070
2071 ${if saslauthd {{username}{password}{service}{realm}} {yes}[no}}
2072
2073 However, the last two are optional. That is why the whole set is enclosed
2074 in their own set or braces. */
2075
2076 case ECOND_SASLAUTHD:
2077 #ifndef CYRUS_SASLAUTHD_SOCKET
2078 goto COND_FAILED_NOT_COMPILED;
2079 #else
2080 while (isspace(*s)) s++;
2081 if (*s++ != '{') goto COND_FAILED_CURLY_START;
2082 switch(read_subs(sub, 4, 2, &s, yield == NULL, TRUE, US"saslauthd"))
2083 {
2084 case 1: expand_string_message = US"too few arguments or bracketing "
2085 "error for saslauthd";
2086 case 2:
2087 case 3: return NULL;
2088 }
2089 if (sub[2] == NULL) sub[3] = NULL; /* realm if no service */
2090 if (yield != NULL)
2091 {
2092 int rc;
2093 rc = auth_call_saslauthd(sub[0], sub[1], sub[2], sub[3],
2094 &expand_string_message);
2095 if (rc == ERROR || rc == DEFER) return NULL;
2096 *yield = (rc == OK) == testfor;
2097 }
2098 return s;
2099 #endif /* CYRUS_SASLAUTHD_SOCKET */
2100
2101
2102 /* symbolic operators for numeric and string comparison, and a number of
2103 other operators, all requiring two arguments.
2104
76dca828
PP
2105 crypteq: encrypts plaintext and compares against an encrypted text,
2106 using crypt(), crypt16(), MD5 or SHA-1
2107 inlist/inlisti: checks if first argument is in the list of the second
059ec3d9
PH
2108 match: does a regular expression match and sets up the numerical
2109 variables if it succeeds
2110 match_address: matches in an address list
2111 match_domain: matches in a domain list
32d668a5 2112 match_ip: matches a host list that is restricted to IP addresses
059ec3d9 2113 match_local_part: matches in a local part list
059ec3d9
PH
2114 */
2115
059ec3d9
PH
2116 case ECOND_MATCH_ADDRESS:
2117 case ECOND_MATCH_DOMAIN:
32d668a5 2118 case ECOND_MATCH_IP:
059ec3d9 2119 case ECOND_MATCH_LOCAL_PART:
da6dbe26
PP
2120#ifndef EXPAND_LISTMATCH_RHS
2121 sub2_honour_dollar = FALSE;
2122#endif
2123 /* FALLTHROUGH */
2124
2125 case ECOND_CRYPTEQ:
2126 case ECOND_INLIST:
2127 case ECOND_INLISTI:
2128 case ECOND_MATCH:
059ec3d9
PH
2129
2130 case ECOND_NUM_L: /* Numerical comparisons */
2131 case ECOND_NUM_LE:
2132 case ECOND_NUM_E:
2133 case ECOND_NUM_EE:
2134 case ECOND_NUM_G:
2135 case ECOND_NUM_GE:
2136
2137 case ECOND_STR_LT: /* String comparisons */
2138 case ECOND_STR_LTI:
2139 case ECOND_STR_LE:
2140 case ECOND_STR_LEI:
2141 case ECOND_STR_EQ:
2142 case ECOND_STR_EQI:
2143 case ECOND_STR_GT:
2144 case ECOND_STR_GTI:
2145 case ECOND_STR_GE:
2146 case ECOND_STR_GEI:
2147
2148 for (i = 0; i < 2; i++)
2149 {
da6dbe26
PP
2150 /* Sometimes, we don't expand substrings; too many insecure configurations
2151 created using match_address{}{} and friends, where the second param
2152 includes information from untrustworthy sources. */
2153 BOOL honour_dollar = TRUE;
2154 if ((i > 0) && !sub2_honour_dollar)
2155 honour_dollar = FALSE;
2156
059ec3d9
PH
2157 while (isspace(*s)) s++;
2158 if (*s != '{')
2159 {
2160 if (i == 0) goto COND_FAILED_CURLY_START;
2161 expand_string_message = string_sprintf("missing 2nd string in {} "
2162 "after \"%s\"", name);
2163 return NULL;
2164 }
da6dbe26
PP
2165 sub[i] = expand_string_internal(s+1, TRUE, &s, yield == NULL,
2166 honour_dollar);
059ec3d9
PH
2167 if (sub[i] == NULL) return NULL;
2168 if (*s++ != '}') goto COND_FAILED_CURLY_END;
2169
2170 /* Convert to numerical if required; we know that the names of all the
2171 conditions that compare numbers do not start with a letter. This just saves
2172 checking for them individually. */
2173
d6066548 2174 if (!isalpha(name[0]) && yield != NULL)
059ec3d9 2175 {
5dd1517f
PH
2176 if (sub[i][0] == 0)
2177 {
2178 num[i] = 0;
2179 DEBUG(D_expand)
2180 debug_printf("empty string cast to zero for numerical comparison\n");
2181 }
2182 else
2183 {
2184 num[i] = expand_string_integer(sub[i], FALSE);
2185 if (expand_string_message != NULL) return NULL;
2186 }
059ec3d9
PH
2187 }
2188 }
2189
2190 /* Result not required */
2191
2192 if (yield == NULL) return s;
2193
2194 /* Do an appropriate comparison */
2195
2196 switch(cond_type)
2197 {
2198 case ECOND_NUM_E:
2199 case ECOND_NUM_EE:
2200 *yield = (num[0] == num[1]) == testfor;
2201 break;
2202
2203 case ECOND_NUM_G:
2204 *yield = (num[0] > num[1]) == testfor;
2205 break;
2206
2207 case ECOND_NUM_GE:
2208 *yield = (num[0] >= num[1]) == testfor;
2209 break;
2210
2211 case ECOND_NUM_L:
2212 *yield = (num[0] < num[1]) == testfor;
2213 break;
2214
2215 case ECOND_NUM_LE:
2216 *yield = (num[0] <= num[1]) == testfor;
2217 break;
2218
2219 case ECOND_STR_LT:
2220 *yield = (Ustrcmp(sub[0], sub[1]) < 0) == testfor;
2221 break;
2222
2223 case ECOND_STR_LTI:
2224 *yield = (strcmpic(sub[0], sub[1]) < 0) == testfor;
2225 break;
2226
2227 case ECOND_STR_LE:
2228 *yield = (Ustrcmp(sub[0], sub[1]) <= 0) == testfor;
2229 break;
2230
2231 case ECOND_STR_LEI:
2232 *yield = (strcmpic(sub[0], sub[1]) <= 0) == testfor;
2233 break;
2234
2235 case ECOND_STR_EQ:
2236 *yield = (Ustrcmp(sub[0], sub[1]) == 0) == testfor;
2237 break;
2238
2239 case ECOND_STR_EQI:
2240 *yield = (strcmpic(sub[0], sub[1]) == 0) == testfor;
2241 break;
2242
2243 case ECOND_STR_GT:
2244 *yield = (Ustrcmp(sub[0], sub[1]) > 0) == testfor;
2245 break;
2246
2247 case ECOND_STR_GTI:
2248 *yield = (strcmpic(sub[0], sub[1]) > 0) == testfor;
2249 break;
2250
2251 case ECOND_STR_GE:
2252 *yield = (Ustrcmp(sub[0], sub[1]) >= 0) == testfor;
2253 break;
2254
2255 case ECOND_STR_GEI:
2256 *yield = (strcmpic(sub[0], sub[1]) >= 0) == testfor;
2257 break;
2258
2259 case ECOND_MATCH: /* Regular expression match */
2260 re = pcre_compile(CS sub[1], PCRE_COPT, (const char **)&rerror, &roffset,
2261 NULL);
2262 if (re == NULL)
2263 {
2264 expand_string_message = string_sprintf("regular expression error in "
2265 "\"%s\": %s at offset %d", sub[1], rerror, roffset);
2266 return NULL;
2267 }
2268 *yield = regex_match_and_setup(re, sub[0], 0, -1) == testfor;
2269 break;
2270
2271 case ECOND_MATCH_ADDRESS: /* Match in an address list */
2272 rc = match_address_list(sub[0], TRUE, FALSE, &(sub[1]), NULL, -1, 0, NULL);
2273 goto MATCHED_SOMETHING;
2274
2275 case ECOND_MATCH_DOMAIN: /* Match in a domain list */
2276 rc = match_isinlist(sub[0], &(sub[1]), 0, &domainlist_anchor, NULL,
2277 MCL_DOMAIN + MCL_NOEXPAND, TRUE, NULL);
2278 goto MATCHED_SOMETHING;
2279
32d668a5 2280 case ECOND_MATCH_IP: /* Match IP address in a host list */
7e66e54d 2281 if (sub[0][0] != 0 && string_is_ip_address(sub[0], NULL) == 0)
32d668a5
PH
2282 {
2283 expand_string_message = string_sprintf("\"%s\" is not an IP address",
2284 sub[0]);
2285 return NULL;
2286 }
2287 else
2288 {
2289 unsigned int *nullcache = NULL;
2290 check_host_block cb;
2291
2292 cb.host_name = US"";
2293 cb.host_address = sub[0];
2294
2295 /* If the host address starts off ::ffff: it is an IPv6 address in
2296 IPv4-compatible mode. Find the IPv4 part for checking against IPv4
2297 addresses. */
2298
2299 cb.host_ipv4 = (Ustrncmp(cb.host_address, "::ffff:", 7) == 0)?
2300 cb.host_address + 7 : cb.host_address;
2301
2302 rc = match_check_list(
2303 &sub[1], /* the list */
2304 0, /* separator character */
2305 &hostlist_anchor, /* anchor pointer */
2306 &nullcache, /* cache pointer */
2307 check_host, /* function for testing */
2308 &cb, /* argument for function */
2309 MCL_HOST, /* type of check */
2310 sub[0], /* text for debugging */
2311 NULL); /* where to pass back data */
2312 }
2313 goto MATCHED_SOMETHING;
2314
059ec3d9
PH
2315 case ECOND_MATCH_LOCAL_PART:
2316 rc = match_isinlist(sub[0], &(sub[1]), 0, &localpartlist_anchor, NULL,
2317 MCL_LOCALPART + MCL_NOEXPAND, TRUE, NULL);
2318 /* Fall through */
9a26b6b2 2319 /* VVVVVVVVVVVV */
059ec3d9
PH
2320 MATCHED_SOMETHING:
2321 switch(rc)
2322 {
2323 case OK:
2324 *yield = testfor;
2325 break;
2326
2327 case FAIL:
2328 *yield = !testfor;
2329 break;
2330
2331 case DEFER:
2332 expand_string_message = string_sprintf("unable to complete match "
2333 "against \"%s\": %s", sub[1], search_error_message);
2334 return NULL;
2335 }
2336
2337 break;
2338
2339 /* Various "encrypted" comparisons. If the second string starts with
2340 "{" then an encryption type is given. Default to crypt() or crypt16()
2341 (build-time choice). */
2342
2343 case ECOND_CRYPTEQ:
2344 #ifndef SUPPORT_CRYPTEQ
2345 goto COND_FAILED_NOT_COMPILED;
2346 #else
2347 if (strncmpic(sub[1], US"{md5}", 5) == 0)
2348 {
2349 int sublen = Ustrlen(sub[1]+5);
2350 md5 base;
2351 uschar digest[16];
2352
2353 md5_start(&base);
2354 md5_end(&base, (uschar *)sub[0], Ustrlen(sub[0]), digest);
2355
2356 /* If the length that we are comparing against is 24, the MD5 digest
2357 is expressed as a base64 string. This is the way LDAP does it. However,
2358 some other software uses a straightforward hex representation. We assume
2359 this if the length is 32. Other lengths fail. */
2360
2361 if (sublen == 24)
2362 {
2363 uschar *coded = auth_b64encode((uschar *)digest, 16);
2364 DEBUG(D_auth) debug_printf("crypteq: using MD5+B64 hashing\n"
2365 " subject=%s\n crypted=%s\n", coded, sub[1]+5);
2366 *yield = (Ustrcmp(coded, sub[1]+5) == 0) == testfor;
2367 }
2368 else if (sublen == 32)
2369 {
2370 int i;
2371 uschar coded[36];
2372 for (i = 0; i < 16; i++) sprintf(CS (coded+2*i), "%02X", digest[i]);
2373 coded[32] = 0;
2374 DEBUG(D_auth) debug_printf("crypteq: using MD5+hex hashing\n"
2375 " subject=%s\n crypted=%s\n", coded, sub[1]+5);
2376 *yield = (strcmpic(coded, sub[1]+5) == 0) == testfor;
2377 }
2378 else
2379 {
2380 DEBUG(D_auth) debug_printf("crypteq: length for MD5 not 24 or 32: "
2381 "fail\n crypted=%s\n", sub[1]+5);
2382 *yield = !testfor;
2383 }
2384 }
2385
2386 else if (strncmpic(sub[1], US"{sha1}", 6) == 0)
2387 {
2388 int sublen = Ustrlen(sub[1]+6);
2389 sha1 base;
2390 uschar digest[20];
2391
2392 sha1_start(&base);
2393 sha1_end(&base, (uschar *)sub[0], Ustrlen(sub[0]), digest);
2394
2395 /* If the length that we are comparing against is 28, assume the SHA1
2396 digest is expressed as a base64 string. If the length is 40, assume a
2397 straightforward hex representation. Other lengths fail. */
2398
2399 if (sublen == 28)
2400 {
2401 uschar *coded = auth_b64encode((uschar *)digest, 20);
2402 DEBUG(D_auth) debug_printf("crypteq: using SHA1+B64 hashing\n"
2403 " subject=%s\n crypted=%s\n", coded, sub[1]+6);
2404 *yield = (Ustrcmp(coded, sub[1]+6) == 0) == testfor;
2405 }
2406 else if (sublen == 40)
2407 {
2408 int i;
2409 uschar coded[44];
2410 for (i = 0; i < 20; i++) sprintf(CS (coded+2*i), "%02X", digest[i]);
2411 coded[40] = 0;
2412 DEBUG(D_auth) debug_printf("crypteq: using SHA1+hex hashing\n"
2413 " subject=%s\n crypted=%s\n", coded, sub[1]+6);
2414 *yield = (strcmpic(coded, sub[1]+6) == 0) == testfor;
2415 }
2416 else
2417 {
2418 DEBUG(D_auth) debug_printf("crypteq: length for SHA-1 not 28 or 40: "
2419 "fail\n crypted=%s\n", sub[1]+6);
2420 *yield = !testfor;
2421 }
2422 }
2423
2424 else /* {crypt} or {crypt16} and non-{ at start */
76dca828 2425 /* }-for-text-editors */
059ec3d9
PH
2426 {
2427 int which = 0;
2428 uschar *coded;
2429
2430 if (strncmpic(sub[1], US"{crypt}", 7) == 0)
2431 {
2432 sub[1] += 7;
2433 which = 1;
2434 }
2435 else if (strncmpic(sub[1], US"{crypt16}", 9) == 0)
2436 {
2437 sub[1] += 9;
2438 which = 2;
2439 }
2440 else if (sub[1][0] == '{')
2441 {
2442 expand_string_message = string_sprintf("unknown encryption mechanism "
2443 "in \"%s\"", sub[1]);
2444 return NULL;
2445 }
2446
2447 switch(which)
2448 {
2449 case 0: coded = US DEFAULT_CRYPT(CS sub[0], CS sub[1]); break;
2450 case 1: coded = US crypt(CS sub[0], CS sub[1]); break;
2451 default: coded = US crypt16(CS sub[0], CS sub[1]); break;
2452 }
2453
2454 #define STR(s) # s
2455 #define XSTR(s) STR(s)
2456 DEBUG(D_auth) debug_printf("crypteq: using %s()\n"
2457 " subject=%s\n crypted=%s\n",
2458 (which == 0)? XSTR(DEFAULT_CRYPT) : (which == 1)? "crypt" : "crypt16",
2459 coded, sub[1]);
2460 #undef STR
2461 #undef XSTR
2462
2463 /* If the encrypted string contains fewer than two characters (for the
2464 salt), force failure. Otherwise we get false positives: with an empty
2465 string the yield of crypt() is an empty string! */
2466
2467 *yield = (Ustrlen(sub[1]) < 2)? !testfor :
2468 (Ustrcmp(coded, sub[1]) == 0) == testfor;
2469 }
2470 break;
2471 #endif /* SUPPORT_CRYPTEQ */
76dca828
PP
2472
2473 case ECOND_INLIST:
2474 case ECOND_INLISTI:
2475 {
2476 int sep = 0;
2477 BOOL found = FALSE;
2478 uschar *save_iterate_item = iterate_item;
2479 int (*compare)(const uschar *, const uschar *);
2480
2481 if (cond_type == ECOND_INLISTI)
2482 compare = strcmpic;
2483 else
2484 compare = (int (*)(const uschar *, const uschar *)) strcmp;
2485
2486 while ((iterate_item = string_nextinlist(&sub[1], &sep, NULL, 0)) != NULL)
2487 if (compare(sub[0], iterate_item) == 0)
2488 {
2489 found = TRUE;
2490 break;
2491 }
2492 iterate_item = save_iterate_item;
2493 *yield = found;
2494 }
2495
059ec3d9
PH
2496 } /* Switch for comparison conditions */
2497
2498 return s; /* End of comparison conditions */
2499
2500
2501 /* and/or: computes logical and/or of several conditions */
2502
2503 case ECOND_AND:
2504 case ECOND_OR:
2505 subcondptr = (yield == NULL)? NULL : &tempcond;
2506 combined_cond = (cond_type == ECOND_AND);
2507
2508 while (isspace(*s)) s++;
2509 if (*s++ != '{') goto COND_FAILED_CURLY_START;
2510
2511 for (;;)
2512 {
2513 while (isspace(*s)) s++;
2514 if (*s == '}') break;
2515 if (*s != '{')
2516 {
2517 expand_string_message = string_sprintf("each subcondition "
2518 "inside an \"%s{...}\" condition must be in its own {}", name);
2519 return NULL;
2520 }
2521
2522 s = eval_condition(s+1, subcondptr);
2523 if (s == NULL)
2524 {
2525 expand_string_message = string_sprintf("%s inside \"%s{...}\" condition",
2526 expand_string_message, name);
2527 return NULL;
2528 }
2529 while (isspace(*s)) s++;
2530
2531 if (*s++ != '}')
2532 {
2533 expand_string_message = string_sprintf("missing } at end of condition "
2534 "inside \"%s\" group", name);
2535 return NULL;
2536 }
2537
2538 if (yield != NULL)
2539 {
2540 if (cond_type == ECOND_AND)
2541 {
2542 combined_cond &= tempcond;
2543 if (!combined_cond) subcondptr = NULL; /* once false, don't */
2544 } /* evaluate any more */
2545 else
2546 {
2547 combined_cond |= tempcond;
2548 if (combined_cond) subcondptr = NULL; /* once true, don't */
2549 } /* evaluate any more */
2550 }
2551 }
2552
2553 if (yield != NULL) *yield = (combined_cond == testfor);
2554 return ++s;
2555
2556
0ce9abe6
PH
2557 /* forall/forany: iterates a condition with different values */
2558
2559 case ECOND_FORALL:
2560 case ECOND_FORANY:
2561 {
2562 int sep = 0;
282b357d 2563 uschar *save_iterate_item = iterate_item;
0ce9abe6
PH
2564
2565 while (isspace(*s)) s++;
2566 if (*s++ != '{') goto COND_FAILED_CURLY_START;
da6dbe26 2567 sub[0] = expand_string_internal(s, TRUE, &s, (yield == NULL), TRUE);
0ce9abe6
PH
2568 if (sub[0] == NULL) return NULL;
2569 if (*s++ != '}') goto COND_FAILED_CURLY_END;
2570
2571 while (isspace(*s)) s++;
2572 if (*s++ != '{') goto COND_FAILED_CURLY_START;
2573
2574 sub[1] = s;
2575
2576 /* Call eval_condition once, with result discarded (as if scanning a
2577 "false" part). This allows us to find the end of the condition, because if
2578 the list it empty, we won't actually evaluate the condition for real. */
2579
2580 s = eval_condition(sub[1], NULL);
2581 if (s == NULL)
2582 {
2583 expand_string_message = string_sprintf("%s inside \"%s\" condition",
2584 expand_string_message, name);
2585 return NULL;
2586 }
2587 while (isspace(*s)) s++;
2588
2589 if (*s++ != '}')
2590 {
2591 expand_string_message = string_sprintf("missing } at end of condition "
2592 "inside \"%s\"", name);
2593 return NULL;
2594 }
2595
2596 if (yield != NULL) *yield = !testfor;
2597 while ((iterate_item = string_nextinlist(&sub[0], &sep, NULL, 0)) != NULL)
2598 {
2599 DEBUG(D_expand) debug_printf("%s: $item = \"%s\"\n", name, iterate_item);
2600 if (eval_condition(sub[1], &tempcond) == NULL)
2601 {
2602 expand_string_message = string_sprintf("%s inside \"%s\" condition",
2603 expand_string_message, name);
e58c13cc 2604 iterate_item = save_iterate_item;
0ce9abe6
PH
2605 return NULL;
2606 }
2607 DEBUG(D_expand) debug_printf("%s: condition evaluated to %s\n", name,
2608 tempcond? "true":"false");
2609
2610 if (yield != NULL) *yield = (tempcond == testfor);
2611 if (tempcond == (cond_type == ECOND_FORANY)) break;
2612 }
2613
282b357d 2614 iterate_item = save_iterate_item;
0ce9abe6
PH
2615 return s;
2616 }
2617
2618
f3766eb5
NM
2619 /* The bool{} expansion condition maps a string to boolean.
2620 The values supported should match those supported by the ACL condition
2621 (acl.c, ACLC_CONDITION) so that we keep to a minimum the different ideas
2622 of true/false. Note that Router "condition" rules have a different
2623 interpretation, where general data can be used and only a few values
2624 map to FALSE.
2625 Note that readconf.c boolean matching, for boolean configuration options,
6a8de854
PP
2626 only matches true/yes/false/no.
2627 The bool_lax{} condition matches the Router logic, which is much more
2628 liberal. */
f3766eb5 2629 case ECOND_BOOL:
6a8de854 2630 case ECOND_BOOL_LAX:
f3766eb5
NM
2631 {
2632 uschar *sub_arg[1];
71265ae9 2633 uschar *t, *t2;
6a8de854 2634 uschar *ourname;
f3766eb5
NM
2635 size_t len;
2636 BOOL boolvalue = FALSE;
2637 while (isspace(*s)) s++;
2638 if (*s != '{') goto COND_FAILED_CURLY_START;
6a8de854
PP
2639 ourname = cond_type == ECOND_BOOL_LAX ? US"bool_lax" : US"bool";
2640 switch(read_subs(sub_arg, 1, 1, &s, yield == NULL, FALSE, ourname))
f3766eb5 2641 {
6a8de854
PP
2642 case 1: expand_string_message = string_sprintf(
2643 "too few arguments or bracketing error for %s",
2644 ourname);
f3766eb5
NM
2645 /*FALLTHROUGH*/
2646 case 2:
2647 case 3: return NULL;
2648 }
2649 t = sub_arg[0];
2650 while (isspace(*t)) t++;
2651 len = Ustrlen(t);
71265ae9
PP
2652 if (len)
2653 {
2654 /* trailing whitespace: seems like a good idea to ignore it too */
2655 t2 = t + len - 1;
2656 while (isspace(*t2)) t2--;
2657 if (t2 != (t + len))
2658 {
2659 *++t2 = '\0';
2660 len = t2 - t;
2661 }
2662 }
f3766eb5 2663 DEBUG(D_expand)
6a8de854
PP
2664 debug_printf("considering %s: %s\n", ourname, len ? t : US"<empty>");
2665 /* logic for the lax case from expand_check_condition(), which also does
2666 expands, and the logic is both short and stable enough that there should
2667 be no maintenance burden from replicating it. */
f3766eb5
NM
2668 if (len == 0)
2669 boolvalue = FALSE;
2670 else if (Ustrspn(t, "0123456789") == len)
6a8de854 2671 {
f3766eb5 2672 boolvalue = (Uatoi(t) == 0) ? FALSE : TRUE;
6a8de854
PP
2673 /* expand_check_condition only does a literal string "0" check */
2674 if ((cond_type == ECOND_BOOL_LAX) && (len > 1))
2675 boolvalue = TRUE;
2676 }
f3766eb5
NM
2677 else if (strcmpic(t, US"true") == 0 || strcmpic(t, US"yes") == 0)
2678 boolvalue = TRUE;
2679 else if (strcmpic(t, US"false") == 0 || strcmpic(t, US"no") == 0)
2680 boolvalue = FALSE;
6a8de854
PP
2681 else if (cond_type == ECOND_BOOL_LAX)
2682 boolvalue = TRUE;
f3766eb5
NM
2683 else
2684 {
2685 expand_string_message = string_sprintf("unrecognised boolean "
2686 "value \"%s\"", t);
2687 return NULL;
2688 }
5ee6f336 2689 if (yield != NULL) *yield = (boolvalue == testfor);
f3766eb5
NM
2690 return s;
2691 }
2692
059ec3d9
PH
2693 /* Unknown condition */
2694
2695 default:
2696 expand_string_message = string_sprintf("unknown condition \"%s\"", name);
2697 return NULL;
2698 } /* End switch on condition type */
2699
2700/* Missing braces at start and end of data */
2701
2702COND_FAILED_CURLY_START:
2703expand_string_message = string_sprintf("missing { after \"%s\"", name);
2704return NULL;
2705
2706COND_FAILED_CURLY_END:
2707expand_string_message = string_sprintf("missing } at end of \"%s\" condition",
2708 name);
2709return NULL;
2710
2711/* A condition requires code that is not compiled */
2712
2713#if !defined(SUPPORT_PAM) || !defined(RADIUS_CONFIG_FILE) || \
2714 !defined(LOOKUP_LDAP) || !defined(CYRUS_PWCHECK_SOCKET) || \
2715 !defined(SUPPORT_CRYPTEQ) || !defined(CYRUS_SASLAUTHD_SOCKET)
2716COND_FAILED_NOT_COMPILED:
2717expand_string_message = string_sprintf("support for \"%s\" not compiled",
2718 name);
2719return NULL;
2720#endif
2721}
2722
2723
2724
2725
2726/*************************************************
2727* Save numerical variables *
2728*************************************************/
2729
2730/* This function is called from items such as "if" that want to preserve and
2731restore the numbered variables.
2732
2733Arguments:
2734 save_expand_string points to an array of pointers to set
2735 save_expand_nlength points to an array of ints for the lengths
2736
2737Returns: the value of expand max to save
2738*/
2739
2740static int
2741save_expand_strings(uschar **save_expand_nstring, int *save_expand_nlength)
2742{
2743int i;
2744for (i = 0; i <= expand_nmax; i++)
2745 {
2746 save_expand_nstring[i] = expand_nstring[i];
2747 save_expand_nlength[i] = expand_nlength[i];
2748 }
2749return expand_nmax;
2750}
2751
2752
2753
2754/*************************************************
2755* Restore numerical variables *
2756*************************************************/
2757
2758/* This function restored saved values of numerical strings.
2759
2760Arguments:
2761 save_expand_nmax the number of strings to restore
2762 save_expand_string points to an array of pointers
2763 save_expand_nlength points to an array of ints
2764
2765Returns: nothing
2766*/
2767
2768static void
2769restore_expand_strings(int save_expand_nmax, uschar **save_expand_nstring,
2770 int *save_expand_nlength)
2771{
2772int i;
2773expand_nmax = save_expand_nmax;
2774for (i = 0; i <= expand_nmax; i++)
2775 {
2776 expand_nstring[i] = save_expand_nstring[i];
2777 expand_nlength[i] = save_expand_nlength[i];
2778 }
2779}
2780
2781
2782
2783
2784
2785/*************************************************
2786* Handle yes/no substrings *
2787*************************************************/
2788
2789/* This function is used by ${if}, ${lookup} and ${extract} to handle the
2790alternative substrings that depend on whether or not the condition was true,
2791or the lookup or extraction succeeded. The substrings always have to be
2792expanded, to check their syntax, but "skipping" is set when the result is not
2793needed - this avoids unnecessary nested lookups.
2794
2795Arguments:
2796 skipping TRUE if we were skipping when this item was reached
2797 yes TRUE if the first string is to be used, else use the second
2798 save_lookup a value to put back into lookup_value before the 2nd expansion
2799 sptr points to the input string pointer
2800 yieldptr points to the output string pointer
2801 sizeptr points to the output string size
2802 ptrptr points to the output string pointer
2803 type "lookup" or "if" or "extract" or "run", for error message
2804
2805Returns: 0 OK; lookup_value has been reset to save_lookup
2806 1 expansion failed
2807 2 expansion failed because of bracketing error
2808*/
2809
2810static int
2811process_yesno(BOOL skipping, BOOL yes, uschar *save_lookup, uschar **sptr,
2812 uschar **yieldptr, int *sizeptr, int *ptrptr, uschar *type)
2813{
2814int rc = 0;
2815uschar *s = *sptr; /* Local value */
2816uschar *sub1, *sub2;
2817
2818/* If there are no following strings, we substitute the contents of $value for
063b1e99 2819lookups and for extractions in the success case. For the ${if item, the string
8e669ac1 2820"true" is substituted. In the fail case, nothing is substituted for all three
063b1e99 2821items. */
059ec3d9
PH
2822
2823while (isspace(*s)) s++;
2824if (*s == '}')
2825 {
063b1e99
PH
2826 if (type[0] == 'i')
2827 {
8e669ac1 2828 if (yes) *yieldptr = string_cat(*yieldptr, sizeptr, ptrptr, US"true", 4);
063b1e99
PH
2829 }
2830 else
8e669ac1 2831 {
063b1e99
PH
2832 if (yes && lookup_value != NULL)
2833 *yieldptr = string_cat(*yieldptr, sizeptr, ptrptr, lookup_value,
2834 Ustrlen(lookup_value));
2835 lookup_value = save_lookup;
2836 }
059ec3d9
PH
2837 s++;
2838 goto RETURN;
2839 }
2840
9b4768fa
PH
2841/* The first following string must be braced. */
2842
2843if (*s++ != '{') goto FAILED_CURLY;
2844
059ec3d9
PH
2845/* Expand the first substring. Forced failures are noticed only if we actually
2846want this string. Set skipping in the call in the fail case (this will always
2847be the case if we were already skipping). */
2848
da6dbe26 2849sub1 = expand_string_internal(s, TRUE, &s, !yes, TRUE);
059ec3d9
PH
2850if (sub1 == NULL && (yes || !expand_string_forcedfail)) goto FAILED;
2851expand_string_forcedfail = FALSE;
2852if (*s++ != '}') goto FAILED_CURLY;
2853
2854/* If we want the first string, add it to the output */
2855
2856if (yes)
2857 *yieldptr = string_cat(*yieldptr, sizeptr, ptrptr, sub1, Ustrlen(sub1));
2858
2859/* If this is called from a lookup or an extract, we want to restore $value to
2860what it was at the start of the item, so that it has this value during the
d20976dc
PH
2861second string expansion. For the call from "if" or "run" to this function,
2862save_lookup is set to lookup_value, so that this statement does nothing. */
059ec3d9
PH
2863
2864lookup_value = save_lookup;
2865
2866/* There now follows either another substring, or "fail", or nothing. This
2867time, forced failures are noticed only if we want the second string. We must
2868set skipping in the nested call if we don't want this string, or if we were
2869already skipping. */
2870
2871while (isspace(*s)) s++;
2872if (*s == '{')
2873 {
da6dbe26 2874 sub2 = expand_string_internal(s+1, TRUE, &s, yes || skipping, TRUE);
059ec3d9
PH
2875 if (sub2 == NULL && (!yes || !expand_string_forcedfail)) goto FAILED;
2876 expand_string_forcedfail = FALSE;
2877 if (*s++ != '}') goto FAILED_CURLY;
2878
2879 /* If we want the second string, add it to the output */
2880
2881 if (!yes)
2882 *yieldptr = string_cat(*yieldptr, sizeptr, ptrptr, sub2, Ustrlen(sub2));
2883 }
2884
2885/* If there is no second string, but the word "fail" is present when the use of
2886the second string is wanted, set a flag indicating it was a forced failure
2887rather than a syntactic error. Swallow the terminating } in case this is nested
2888inside another lookup or if or extract. */
2889
2890else if (*s != '}')
2891 {
2892 uschar name[256];
2893 s = read_name(name, sizeof(name), s, US"_");
2894 if (Ustrcmp(name, "fail") == 0)
2895 {
2896 if (!yes && !skipping)
2897 {
2898 while (isspace(*s)) s++;
2899 if (*s++ != '}') goto FAILED_CURLY;
2900 expand_string_message =
2901 string_sprintf("\"%s\" failed and \"fail\" requested", type);
2902 expand_string_forcedfail = TRUE;
2903 goto FAILED;
2904 }
2905 }
2906 else
2907 {
2908 expand_string_message =
2909 string_sprintf("syntax error in \"%s\" item - \"fail\" expected", type);
2910 goto FAILED;
2911 }
2912 }
2913
2914/* All we have to do now is to check on the final closing brace. */
2915
2916while (isspace(*s)) s++;
2917if (*s++ == '}') goto RETURN;
2918
2919/* Get here if there is a bracketing failure */
2920
2921FAILED_CURLY:
2922rc++;
2923
2924/* Get here for other failures */
2925
2926FAILED:
2927rc++;
2928
2929/* Update the input pointer value before returning */
2930
2931RETURN:
2932*sptr = s;
2933return rc;
2934}
2935
2936
2937
2938
059ec3d9
PH
2939/*************************************************
2940* Handle MD5 or SHA-1 computation for HMAC *
2941*************************************************/
2942
2943/* These are some wrapping functions that enable the HMAC code to be a bit
2944cleaner. A good compiler will spot the tail recursion.
2945
2946Arguments:
2947 type HMAC_MD5 or HMAC_SHA1
2948 remaining are as for the cryptographic hash functions
2949
2950Returns: nothing
2951*/
2952
2953static void
2954chash_start(int type, void *base)
2955{
2956if (type == HMAC_MD5)
2957 md5_start((md5 *)base);
2958else
2959 sha1_start((sha1 *)base);
2960}
2961
2962static void
2963chash_mid(int type, void *base, uschar *string)
2964{
2965if (type == HMAC_MD5)
2966 md5_mid((md5 *)base, string);
2967else
2968 sha1_mid((sha1 *)base, string);
2969}
2970
2971static void
2972chash_end(int type, void *base, uschar *string, int length, uschar *digest)
2973{
2974if (type == HMAC_MD5)
2975 md5_end((md5 *)base, string, length, digest);
2976else
2977 sha1_end((sha1 *)base, string, length, digest);
2978}
2979
2980
2981
2982
2983
1549ea3b
PH
2984/********************************************************
2985* prvs: Get last three digits of days since Jan 1, 1970 *
2986********************************************************/
2987
2988/* This is needed to implement the "prvs" BATV reverse
2989 path signing scheme
2990
2991Argument: integer "days" offset to add or substract to
2992 or from the current number of days.
2993
2994Returns: pointer to string containing the last three
2995 digits of the number of days since Jan 1, 1970,
2996 modified by the offset argument, NULL if there
2997 was an error in the conversion.
2998
2999*/
3000
3001static uschar *
3002prvs_daystamp(int day_offset)
3003{
a86229cf
PH
3004uschar *days = store_get(32); /* Need at least 24 for cases */
3005(void)string_format(days, 32, TIME_T_FMT, /* where TIME_T_FMT is %lld */
1549ea3b 3006 (time(NULL) + day_offset*86400)/86400);
e169f567 3007return (Ustrlen(days) >= 3) ? &days[Ustrlen(days)-3] : US"100";
1549ea3b
PH
3008}
3009
3010
3011
3012/********************************************************
3013* prvs: perform HMAC-SHA1 computation of prvs bits *
3014********************************************************/
3015
3016/* This is needed to implement the "prvs" BATV reverse
3017 path signing scheme
3018
3019Arguments:
3020 address RFC2821 Address to use
3021 key The key to use (must be less than 64 characters
3022 in size)
3023 key_num Single-digit key number to use. Defaults to
3024 '0' when NULL.
3025
3026Returns: pointer to string containing the first three
3027 bytes of the final hash in hex format, NULL if
3028 there was an error in the process.
3029*/
3030
3031static uschar *
3032prvs_hmac_sha1(uschar *address, uschar *key, uschar *key_num, uschar *daystamp)
3033{
3034uschar *hash_source, *p;
3035int size = 0,offset = 0,i;
3036sha1 sha1_base;
3037void *use_base = &sha1_base;
3038uschar innerhash[20];
3039uschar finalhash[20];
3040uschar innerkey[64];
3041uschar outerkey[64];
3042uschar *finalhash_hex = store_get(40);
3043
3044if (key_num == NULL)
3045 key_num = US"0";
3046
3047if (Ustrlen(key) > 64)
3048 return NULL;
3049
3050hash_source = string_cat(NULL,&size,&offset,key_num,1);
3051string_cat(hash_source,&size,&offset,daystamp,3);
3052string_cat(hash_source,&size,&offset,address,Ustrlen(address));
3053hash_source[offset] = '\0';
3054
3055DEBUG(D_expand) debug_printf("prvs: hash source is '%s'\n", hash_source);
3056
3057memset(innerkey, 0x36, 64);
3058memset(outerkey, 0x5c, 64);
3059
3060for (i = 0; i < Ustrlen(key); i++)
3061 {
3062 innerkey[i] ^= key[i];
3063 outerkey[i] ^= key[i];
3064 }
3065
3066chash_start(HMAC_SHA1, use_base);
3067chash_mid(HMAC_SHA1, use_base, innerkey);
3068chash_end(HMAC_SHA1, use_base, hash_source, offset, innerhash);
3069
3070chash_start(HMAC_SHA1, use_base);
3071chash_mid(HMAC_SHA1, use_base, outerkey);
3072chash_end(HMAC_SHA1, use_base, innerhash, 20, finalhash);
3073
3074p = finalhash_hex;
3075for (i = 0; i < 3; i++)
3076 {
3077 *p++ = hex_digits[(finalhash[i] & 0xf0) >> 4];
3078 *p++ = hex_digits[finalhash[i] & 0x0f];
3079 }
3080*p = '\0';
3081
3082return finalhash_hex;
3083}
3084
3085
3086
3087
059ec3d9
PH
3088/*************************************************
3089* Join a file onto the output string *
3090*************************************************/
3091
3092/* This is used for readfile and after a run expansion. It joins the contents
3093of a file onto the output string, globally replacing newlines with a given
3094string (optionally). The file is closed at the end.
3095
3096Arguments:
3097 f the FILE
3098 yield pointer to the expandable string
3099 sizep pointer to the current size
3100 ptrp pointer to the current position
3101 eol newline replacement string, or NULL
3102
3103Returns: new value of string pointer
3104*/
3105
3106static uschar *
3107cat_file(FILE *f, uschar *yield, int *sizep, int *ptrp, uschar *eol)
3108{
3109int eollen;
3110uschar buffer[1024];
3111
3112eollen = (eol == NULL)? 0 : Ustrlen(eol);
3113
3114while (Ufgets(buffer, sizeof(buffer), f) != NULL)
3115 {
3116 int len = Ustrlen(buffer);
3117 if (eol != NULL && buffer[len-1] == '\n') len--;
3118 yield = string_cat(yield, sizep, ptrp, buffer, len);
3119 if (buffer[len] != 0)
3120 yield = string_cat(yield, sizep, ptrp, eol, eollen);
3121 }
3122
3123if (yield != NULL) yield[*ptrp] = 0;
3124
3125return yield;
3126}
3127
3128
3129
3130
3131/*************************************************
3132* Evaluate numeric expression *
3133*************************************************/
3134
af561417
PH
3135/* This is a set of mutually recursive functions that evaluate an arithmetic
3136expression involving + - * / % & | ^ ~ << >> and parentheses. The only one of
3137these functions that is called from elsewhere is eval_expr, whose interface is:
059ec3d9
PH
3138
3139Arguments:
af561417
PH
3140 sptr pointer to the pointer to the string - gets updated
3141 decimal TRUE if numbers are to be assumed decimal
3142 error pointer to where to put an error message - must be NULL on input
3143 endket TRUE if ')' must terminate - FALSE for external call
059ec3d9 3144
af561417
PH
3145Returns: on success: the value of the expression, with *error still NULL
3146 on failure: an undefined value, with *error = a message
059ec3d9
PH
3147*/
3148
97d17305 3149static int_eximarith_t eval_op_or(uschar **, BOOL, uschar **);
af561417 3150
059ec3d9 3151
97d17305 3152static int_eximarith_t
059ec3d9
PH
3153eval_expr(uschar **sptr, BOOL decimal, uschar **error, BOOL endket)
3154{
3155uschar *s = *sptr;
97d17305 3156int_eximarith_t x = eval_op_or(&s, decimal, error);
059ec3d9
PH
3157if (*error == NULL)
3158 {
af561417 3159 if (endket)
059ec3d9 3160 {
af561417
PH
3161 if (*s != ')')
3162 *error = US"expecting closing parenthesis";
3163 else
3164 while (isspace(*(++s)));
059ec3d9 3165 }
af561417 3166 else if (*s != 0) *error = US"expecting operator";
059ec3d9 3167 }
059ec3d9
PH
3168*sptr = s;
3169return x;
3170}
3171
af561417 3172
97d17305 3173static int_eximarith_t
af561417 3174eval_number(uschar **sptr, BOOL decimal, uschar **error)
059ec3d9
PH
3175{
3176register int c;
97d17305 3177int_eximarith_t n;
059ec3d9
PH
3178uschar *s = *sptr;
3179while (isspace(*s)) s++;
3180c = *s;
af561417 3181if (isdigit(c))
059ec3d9
PH
3182 {
3183 int count;
97d17305 3184 (void)sscanf(CS s, (decimal? SC_EXIM_DEC "%n" : SC_EXIM_ARITH "%n"), &n, &count);
059ec3d9 3185 s += count;
97d17305
JH
3186 switch (tolower(*s))
3187 {
3188 default: break;
3189 case 'k': n *= 1024; s++; break;
3190 case 'm': n *= 1024*1024; s++; break;
3191 case 'g': n *= 1024*1024*1024; s++; break;
3192 }
059ec3d9
PH
3193 while (isspace (*s)) s++;
3194 }
3195else if (c == '(')
3196 {
3197 s++;
3198 n = eval_expr(&s, decimal, error, 1);
3199 }
3200else
3201 {
3202 *error = US"expecting number or opening parenthesis";
3203 n = 0;
3204 }
3205*sptr = s;
3206return n;
3207}
3208
af561417 3209
97d17305 3210static int_eximarith_t
aa7c82b2 3211eval_op_unary(uschar **sptr, BOOL decimal, uschar **error)
af561417
PH
3212{
3213uschar *s = *sptr;
97d17305 3214int_eximarith_t x;
af561417
PH
3215while (isspace(*s)) s++;
3216if (*s == '+' || *s == '-' || *s == '~')
3217 {
3218 int op = *s++;
3219 x = eval_op_unary(&s, decimal, error);
3220 if (op == '-') x = -x;
3221 else if (op == '~') x = ~x;
3222 }
3223else
3224 {
3225 x = eval_number(&s, decimal, error);
3226 }
3227*sptr = s;
3228return x;
3229}
3230
3231
97d17305 3232static int_eximarith_t
aa7c82b2 3233eval_op_mult(uschar **sptr, BOOL decimal, uschar **error)
059ec3d9
PH
3234{
3235uschar *s = *sptr;
97d17305 3236int_eximarith_t x = eval_op_unary(&s, decimal, error);
059ec3d9
PH
3237if (*error == NULL)
3238 {
5591031b 3239 while (*s == '*' || *s == '/' || *s == '%')
059ec3d9
PH
3240 {
3241 int op = *s++;
97d17305 3242 int_eximarith_t y = eval_op_unary(&s, decimal, error);
059ec3d9 3243 if (*error != NULL) break;
053a9aa3
PP
3244 /* SIGFPE both on div/mod by zero and on INT_MIN / -1, which would give
3245 * a value of INT_MAX+1. Note that INT_MIN * -1 gives INT_MIN for me, which
3246 * is a bug somewhere in [gcc 4.2.1, FreeBSD, amd64]. In fact, -N*-M where
3247 * -N*M is INT_MIN will yielf INT_MIN.
3248 * Since we don't support floating point, this is somewhat simpler.
3249 * Ideally, we'd return an error, but since we overflow for all other
3250 * arithmetic, consistency suggests otherwise, but what's the correct value
3251 * to use? There is none.
3252 * The C standard guarantees overflow for unsigned arithmetic but signed
3253 * overflow invokes undefined behaviour; in practice, this is overflow
3254 * except for converting INT_MIN to INT_MAX+1. We also can't guarantee
3255 * that long/longlong larger than int are available, or we could just work
3256 * with larger types. We should consider whether to guarantee 32bit eval
3257 * and 64-bit working variables, with errors returned. For now ...
3258 * So, the only SIGFPEs occur with a non-shrinking div/mod, thus -1; we
3259 * can just let the other invalid results occur otherwise, as they have
3260 * until now. For this one case, we can coerce.
3261 */
aa7c82b2 3262 if (y == -1 && x == LLONG_MIN && op != '*')
053a9aa3
PP
3263 {
3264 DEBUG(D_expand)
97d17305 3265 debug_printf("Integer exception dodging: " PR_EXIM_ARITH "%c-1 coerced to " PR_EXIM_ARITH "\n",
aa7c82b2
JH
3266 LLONG_MIN, op, LLONG_MAX);
3267 x = LLONG_MAX;
053a9aa3
PP
3268 continue;
3269 }
a5b52695
PP
3270 if (op == '*')
3271 x *= y;
3272 else
3273 {
3274 if (y == 0)
54e7ce4a 3275 {
a5b52695
PP
3276 *error = (op == '/') ? US"divide by zero" : US"modulo by zero";
3277 x = 0;
3278 break;
54e7ce4a 3279 }
a5b52695
PP
3280 if (op == '/')
3281 x /= y;
3282 else
3283 x %= y;
3284 }
059ec3d9
PH
3285 }
3286 }
3287*sptr = s;
3288return x;
3289}
3290
3291
97d17305 3292static int_eximarith_t
aa7c82b2 3293eval_op_sum(uschar **sptr, BOOL decimal, uschar **error)
af561417
PH
3294{
3295uschar *s = *sptr;
97d17305 3296int_eximarith_t x = eval_op_mult(&s, decimal, error);
af561417
PH
3297if (*error == NULL)
3298 {
3299 while (*s == '+' || *s == '-')
3300 {
3301 int op = *s++;
97d17305 3302 int_eximarith_t y = eval_op_mult(&s, decimal, error);
af561417
PH
3303 if (*error != NULL) break;
3304 if (op == '+') x += y; else x -= y;
3305 }
3306 }
3307*sptr = s;
3308return x;
3309}
3310
3311
97d17305 3312static int_eximarith_t
aa7c82b2 3313eval_op_shift(uschar **sptr, BOOL decimal, uschar **error)
af561417
PH
3314{
3315uschar *s = *sptr;
97d17305 3316int_eximarith_t x = eval_op_sum(&s, decimal, error);
af561417
PH
3317if (*error == NULL)
3318 {
3319 while ((*s == '<' || *s == '>') && s[1] == s[0])
3320 {
97d17305 3321 int_eximarith_t y;
af561417
PH
3322 int op = *s++;
3323 s++;
3324 y = eval_op_sum(&s, decimal, error);
3325 if (*error != NULL) break;
3326 if (op == '<') x <<= y; else x >>= y;
3327 }
3328 }
3329*sptr = s;
3330return x;
3331}
3332
3333
97d17305 3334static int_eximarith_t
aa7c82b2 3335eval_op_and(uschar **sptr, BOOL decimal, uschar **error)
af561417
PH
3336{
3337uschar *s = *sptr;
97d17305 3338int_eximarith_t x = eval_op_shift(&s, decimal, error);
af561417
PH
3339if (*error == NULL)
3340 {
3341 while (*s == '&')
3342 {
97d17305 3343 int_eximarith_t y;
af561417
PH
3344 s++;
3345 y = eval_op_shift(&s, decimal, error);
3346 if (*error != NULL) break;
3347 x &= y;
3348 }
3349 }
3350*sptr = s;
3351return x;
3352}
3353
3354
97d17305 3355static int_eximarith_t
aa7c82b2 3356eval_op_xor(uschar **sptr, BOOL decimal, uschar **error)
af561417
PH
3357{
3358uschar *s = *sptr;
97d17305 3359int_eximarith_t x = eval_op_and(&s, decimal, error);
af561417
PH
3360if (*error == NULL)
3361 {
3362 while (*s == '^')
3363 {
97d17305 3364 int_eximarith_t y;
af561417
PH
3365 s++;
3366 y = eval_op_and(&s, decimal, error);
3367 if (*error != NULL) break;
3368 x ^= y;
3369 }
3370 }
3371*sptr = s;
3372return x;
3373}
3374
3375
97d17305 3376static int_eximarith_t
aa7c82b2 3377eval_op_or(uschar **sptr, BOOL decimal, uschar **error)
af561417
PH
3378{
3379uschar *s = *sptr;
97d17305 3380int_eximarith_t x = eval_op_xor(&s, decimal, error);
af561417
PH
3381if (*error == NULL)
3382 {
3383 while (*s == '|')
3384 {
97d17305 3385 int_eximarith_t y;
af561417
PH
3386 s++;
3387 y = eval_op_xor(&s, decimal, error);
3388 if (*error != NULL) break;
3389 x |= y;
3390 }
3391 }
3392*sptr = s;
3393return x;
3394}
3395
059ec3d9
PH
3396
3397
3398/*************************************************
3399* Expand string *
3400*************************************************/
3401
3402/* Returns either an unchanged string, or the expanded string in stacking pool
3403store. Interpreted sequences are:
3404
3405 \... normal escaping rules
3406 $name substitutes the variable
3407 ${name} ditto
3408 ${op:string} operates on the expanded string value
3409 ${item{arg1}{arg2}...} expands the args and then does the business
3410 some literal args are not enclosed in {}
3411
3412There are now far too many operators and item types to make it worth listing
3413them here in detail any more.
3414
3415We use an internal routine recursively to handle embedded substrings. The
3416external function follows. The yield is NULL if the expansion failed, and there
3417are two cases: if something collapsed syntactically, or if "fail" was given
3418as the action on a lookup failure. These can be distinguised by looking at the
3419variable expand_string_forcedfail, which is TRUE in the latter case.
3420
3421The skipping flag is set true when expanding a substring that isn't actually
3422going to be used (after "if" or "lookup") and it prevents lookups from
3423happening lower down.
3424
3425Store usage: At start, a store block of the length of the input plus 64
3426is obtained. This is expanded as necessary by string_cat(), which might have to
3427get a new block, or might be able to expand the original. At the end of the
3428function we can release any store above that portion of the yield block that
3429was actually used. In many cases this will be optimal.
3430
3431However: if the first item in the expansion is a variable name or header name,
3432we reset the store before processing it; if the result is in fresh store, we
3433use that without copying. This is helpful for expanding strings like
3434$message_headers which can get very long.
3435
d6b4d938
TF
3436There's a problem if a ${dlfunc item has side-effects that cause allocation,
3437since resetting the store at the end of the expansion will free store that was
3438allocated by the plugin code as well as the slop after the expanded string. So
3439we skip any resets if ${dlfunc has been used. This is an unfortunate
3440consequence of string expansion becoming too powerful.
3441
059ec3d9
PH
3442Arguments:
3443 string the string to be expanded
3444 ket_ends true if expansion is to stop at }
3445 left if not NULL, a pointer to the first character after the
3446 expansion is placed here (typically used with ket_ends)
3447 skipping TRUE for recursive calls when the value isn't actually going
3448 to be used (to allow for optimisation)
da6dbe26
PP
3449 honour_dollar TRUE if $ is to be expanded,
3450 FALSE if it's just another character
059ec3d9
PH
3451
3452Returns: NULL if expansion fails:
3453 expand_string_forcedfail is set TRUE if failure was forced
3454 expand_string_message contains a textual error message
3455 a pointer to the expanded string on success
3456*/
3457
3458static uschar *
3459expand_string_internal(uschar *string, BOOL ket_ends, uschar **left,
da6dbe26 3460 BOOL skipping, BOOL honour_dollar)
059ec3d9
PH
3461{
3462int ptr = 0;
3463int size = Ustrlen(string)+ 64;
3464int item_type;
3465uschar *yield = store_get(size);
3466uschar *s = string;
3467uschar *save_expand_nstring[EXPAND_MAXN+1];
3468int save_expand_nlength[EXPAND_MAXN+1];
d6b4d938 3469BOOL resetok = TRUE;
059ec3d9
PH
3470
3471expand_string_forcedfail = FALSE;
3472expand_string_message = US"";
3473
3474while (*s != 0)
3475 {
3476 uschar *value;
3477 uschar name[256];
3478
3479 /* \ escapes the next character, which must exist, or else
3480 the expansion fails. There's a special escape, \N, which causes
3481 copying of the subject verbatim up to the next \N. Otherwise,
3482 the escapes are the standard set. */
3483
3484 if (*s == '\\')
3485 {
3486 if (s[1] == 0)
3487 {
3488 expand_string_message = US"\\ at end of string";
3489 goto EXPAND_FAILED;
3490 }
3491
3492 if (s[1] == 'N')
3493 {
3494 uschar *t = s + 2;
3495 for (s = t; *s != 0; s++) if (*s == '\\' && s[1] == 'N') break;
3496 yield = string_cat(yield, &size, &ptr, t, s - t);
3497 if (*s != 0) s += 2;
3498 }
3499
3500 else
3501 {
3502 uschar ch[1];
3503 ch[0] = string_interpret_escape(&s);
3504 s++;
3505 yield = string_cat(yield, &size, &ptr, ch, 1);
3506 }
3507
3508 continue;
3509 }
3510
3511 /* Anything other than $ is just copied verbatim, unless we are
3512 looking for a terminating } character. */
3513
3514 if (ket_ends && *s == '}') break;
3515
da6dbe26 3516 if (*s != '$' || !honour_dollar)
059ec3d9
PH
3517 {
3518 yield = string_cat(yield, &size, &ptr, s++, 1);
3519 continue;
3520 }
3521
3522 /* No { after the $ - must be a plain name or a number for string
3523 match variable. There has to be a fudge for variables that are the
3524 names of header fields preceded by "$header_" because header field
3525 names can contain any printing characters except space and colon.
3526 For those that don't like typing this much, "$h_" is a synonym for
3527 "$header_". A non-existent header yields a NULL value; nothing is
3528 inserted. */
3529
3530 if (isalpha((*(++s))))
3531 {
3532 int len;
3533 int newsize = 0;
3534
3535 s = read_name(name, sizeof(name), s, US"_");
3536
3537 /* If this is the first thing to be expanded, release the pre-allocated
3538 buffer. */
3539
3540 if (ptr == 0 && yield != NULL)
3541 {
d6b4d938 3542 if (resetok) store_reset(yield);
059ec3d9
PH
3543 yield = NULL;
3544 size = 0;
3545 }
3546
3547 /* Header */
3548
3549 if (Ustrncmp(name, "h_", 2) == 0 ||
3550 Ustrncmp(name, "rh_", 3) == 0 ||
3551 Ustrncmp(name, "bh_", 3) == 0 ||
3552 Ustrncmp(name, "header_", 7) == 0 ||
3553 Ustrncmp(name, "rheader_", 8) == 0 ||
3554 Ustrncmp(name, "bheader_", 8) == 0)
3555 {
3556 BOOL want_raw = (name[0] == 'r')? TRUE : FALSE;
3557 uschar *charset = (name[0] == 'b')? NULL : headers_charset;
3558 s = read_header_name(name, sizeof(name), s);
3559 value = find_header(name, FALSE, &newsize, want_raw, charset);
3560
3561 /* If we didn't find the header, and the header contains a closing brace
0d85fa3f 3562 character, this may be a user error where the terminating colon
059ec3d9
PH
3563 has been omitted. Set a flag to adjust the error message in this case.
3564 But there is no error here - nothing gets inserted. */
3565
3566 if (value == NULL)
3567 {
3568 if (Ustrchr(name, '}') != NULL) malformed_header = TRUE;
3569 continue;
3570 }
3571 }
3572
3573 /* Variable */
3574
3575 else
3576 {
3577 value = find_variable(name, FALSE, skipping, &newsize);
3578 if (value == NULL)
3579 {
3580 expand_string_message =
3581 string_sprintf("unknown variable name \"%s\"", name);
641cb756 3582 check_variable_error_message(name);
059ec3d9
PH
3583 goto EXPAND_FAILED;
3584 }
3585 }
3586
3587 /* If the data is known to be in a new buffer, newsize will be set to the
3588 size of that buffer. If this is the first thing in an expansion string,
3589 yield will be NULL; just point it at the new store instead of copying. Many
3590 expansion strings contain just one reference, so this is a useful
3591 optimization, especially for humungous headers. */
3592
3593 len = Ustrlen(value);
3594 if (yield == NULL && newsize != 0)
3595 {
3596 yield = value;
3597 size = newsize;
3598 ptr = len;
3599 }
3600 else yield = string_cat(yield, &size, &ptr, value, len);
3601
3602 continue;
3603 }
3604
3605 if (isdigit(*s))
3606 {
3607 int n;
3608 s = read_number(&n, s);
3609 if (n >= 0 && n <= expand_nmax)
3610 yield = string_cat(yield, &size, &ptr, expand_nstring[n],
3611 expand_nlength[n]);
3612 continue;
3613 }
3614
3615 /* Otherwise, if there's no '{' after $ it's an error. */
3616
3617 if (*s != '{')
3618 {
3619 expand_string_message = US"$ not followed by letter, digit, or {";
3620 goto EXPAND_FAILED;
3621 }
3622
3623 /* After { there can be various things, but they all start with
3624 an initial word, except for a number for a string match variable. */
3625
3626 if (isdigit((*(++s))))
3627 {
3628 int n;
3629 s = read_number(&n, s);
3630 if (*s++ != '}')
3631 {
3632 expand_string_message = US"} expected after number";
3633 goto EXPAND_FAILED;
3634 }
3635 if (n >= 0 && n <= expand_nmax)
3636 yield = string_cat(yield, &size, &ptr, expand_nstring[n],
3637 expand_nlength[n]);
3638 continue;
3639 }
3640
3641 if (!isalpha(*s))
3642 {
3643 expand_string_message = US"letter or digit expected after ${";
3644 goto EXPAND_FAILED;
3645 }
3646
3647 /* Allow "-" in names to cater for substrings with negative
3648 arguments. Since we are checking for known names after { this is
3649 OK. */
3650
3651 s = read_name(name, sizeof(name), s, US"_-");
3652 item_type = chop_match(name, item_table, sizeof(item_table)/sizeof(uschar *));
3653
3654 switch(item_type)
3655 {
525239c1 3656 /* Call an ACL from an expansion. We feed data in via $acl_arg1 - $acl_arg9.
723c72e6
JH
3657 If the ACL returns acceptance we return content set by "message ="
3658 There is currently no limit on recursion; this would have us call
3659 acl_check_internal() directly and get a current level from somewhere.
3660 */
3661
3662 case EITEM_ACL:
3663 {
3664 int rc;
525239c1 3665 uschar *sub[10]; /* name + arg1-arg9, must match number of acl_arg[] */
723c72e6
JH
3666 uschar *new_yield;
3667 uschar *user_msg;
3668 uschar *log_msg;
525239c1 3669 switch(read_subs(sub, 10, 1, &s, skipping, TRUE, US"acl"))
723c72e6
JH
3670 {
3671 case 1: goto EXPAND_FAILED_CURLY;
3672 case 2:
3673 case 3: goto EXPAND_FAILED;
3674 }
3675 if (skipping) continue;
3676
525239c1
JH
3677 for (rc = 1; rc < sizeof(sub)/sizeof(*sub) && sub[rc]; rc++)
3678 acl_arg[rc-1] = sub[rc];
3679 acl_narg = rc-1;
3680 while (rc < sizeof(sub)/sizeof(*sub))
3681 acl_arg[rc++ - 1] = NULL;
3682
723c72e6 3683 DEBUG(D_expand)
525239c1
JH
3684 debug_printf("expanding: acl: %s arg: %s%s\n",
3685 sub[0],
3686 acl_narg>0 ? sub[1] : US"<none>",
3687 acl_narg>1 ? " +more" : "");
723c72e6 3688
723c72e6
JH
3689 switch(rc = acl_check(ACL_WHERE_EXPANSION, NULL, sub[0], &user_msg, &log_msg))
3690 {
3691 case OK:
3692 if (user_msg)
3693 yield = string_cat(yield, &size, &ptr, user_msg, Ustrlen(user_msg));
3694 continue;
3695 case DEFER:
3696 continue;
3697 default:
3698 expand_string_message = string_sprintf("acl \"%s\" did not accept", sub[0]);
3699 goto EXPAND_FAILED;
3700 }
3701 }
3702
059ec3d9
PH
3703 /* Handle conditionals - preserve the values of the numerical expansion
3704 variables in case they get changed by a regular expression match in the
3705 condition. If not, they retain their external settings. At the end
3706 of this "if" section, they get restored to their previous values. */
3707
3708 case EITEM_IF:
3709 {
3710 BOOL cond = FALSE;
3711 uschar *next_s;
3712 int save_expand_nmax =
3713 save_expand_strings(save_expand_nstring, save_expand_nlength);
3714
3715 while (isspace(*s)) s++;
3716 next_s = eval_condition(s, skipping? NULL : &cond);
3717 if (next_s == NULL) goto EXPAND_FAILED; /* message already set */
3718
3719 DEBUG(D_expand)
3720 debug_printf("condition: %.*s\n result: %s\n", (int)(next_s - s), s,
3721 cond? "true" : "false");
3722
3723 s = next_s;
3724
3725 /* The handling of "yes" and "no" result strings is now in a separate
3726 function that is also used by ${lookup} and ${extract} and ${run}. */
3727
3728 switch(process_yesno(
3729 skipping, /* were previously skipping */
3730 cond, /* success/failure indicator */
3731 lookup_value, /* value to reset for string2 */
3732 &s, /* input pointer */
3733 &yield, /* output pointer */
3734 &size, /* output size */
3735 &ptr, /* output current point */
3736 US"if")) /* condition type */
3737 {
3738 case 1: goto EXPAND_FAILED; /* when all is well, the */
3739 case 2: goto EXPAND_FAILED_CURLY; /* returned value is 0 */
3740 }
3741
3742 /* Restore external setting of expansion variables for continuation
3743 at this level. */
3744
3745 restore_expand_strings(save_expand_nmax, save_expand_nstring,
3746 save_expand_nlength);
3747 continue;
3748 }
3749
3750 /* Handle database lookups unless locked out. If "skipping" is TRUE, we are
3751 expanding an internal string that isn't actually going to be used. All we
3752 need to do is check the syntax, so don't do a lookup at all. Preserve the
3753 values of the numerical expansion variables in case they get changed by a
3754 partial lookup. If not, they retain their external settings. At the end
3755 of this "lookup" section, they get restored to their previous values. */
3756
3757 case EITEM_LOOKUP:
3758 {
3759 int stype, partial, affixlen, starflags;
3760 int expand_setup = 0;
3761 int nameptr = 0;
3762 uschar *key, *filename, *affix;
3763 uschar *save_lookup_value = lookup_value;
3764 int save_expand_nmax =
3765 save_expand_strings(save_expand_nstring, save_expand_nlength);
3766
3767 if ((expand_forbid & RDO_LOOKUP) != 0)
3768 {
3769 expand_string_message = US"lookup expansions are not permitted";
3770 goto EXPAND_FAILED;
3771 }
3772
3773 /* Get the key we are to look up for single-key+file style lookups.
3774 Otherwise set the key NULL pro-tem. */
3775
3776 while (isspace(*s)) s++;
3777 if (*s == '{')
3778 {
da6dbe26 3779 key = expand_string_internal(s+1, TRUE, &s, skipping, TRUE);
059ec3d9
PH
3780 if (key == NULL) goto EXPAND_FAILED;
3781 if (*s++ != '}') goto EXPAND_FAILED_CURLY;
3782 while (isspace(*s)) s++;
3783 }
3784 else key = NULL;
3785
3786 /* Find out the type of database */
3787
3788 if (!isalpha(*s))
3789 {
3790 expand_string_message = US"missing lookup type";
3791 goto EXPAND_FAILED;
3792 }
3793
3794 /* The type is a string that may contain special characters of various
3795 kinds. Allow everything except space or { to appear; the actual content
3796 is checked by search_findtype_partial. */
3797
3798 while (*s != 0 && *s != '{' && !isspace(*s))
3799 {
3800 if (nameptr < sizeof(name) - 1) name[nameptr++] = *s;
3801 s++;
3802 }
3803 name[nameptr] = 0;
3804 while (isspace(*s)) s++;
3805
3806 /* Now check for the individual search type and any partial or default
3807 options. Only those types that are actually in the binary are valid. */
3808
3809 stype = search_findtype_partial(name, &partial, &affix, &affixlen,
3810 &starflags);
3811 if (stype < 0)
3812 {
3813 expand_string_message = search_error_message;
3814 goto EXPAND_FAILED;
3815 }
3816
3817 /* Check that a key was provided for those lookup types that need it,
3818 and was not supplied for those that use the query style. */
3819
13b685f9 3820 if (!mac_islookup(stype, lookup_querystyle|lookup_absfilequery))
059ec3d9
PH
3821 {
3822 if (key == NULL)
3823 {
3824 expand_string_message = string_sprintf("missing {key} for single-"
3825 "key \"%s\" lookup", name);
3826 goto EXPAND_FAILED;
3827 }
3828 }
3829 else
3830 {
3831 if (key != NULL)
3832 {
3833 expand_string_message = string_sprintf("a single key was given for "
3834 "lookup type \"%s\", which is not a single-key lookup type", name);
3835 goto EXPAND_FAILED;
3836 }
3837 }
3838
3839 /* Get the next string in brackets and expand it. It is the file name for
13b685f9
PH
3840 single-key+file lookups, and the whole query otherwise. In the case of
3841 queries that also require a file name (e.g. sqlite), the file name comes
3842 first. */
059ec3d9
PH
3843
3844 if (*s != '{') goto EXPAND_FAILED_CURLY;
da6dbe26 3845 filename = expand_string_internal(s+1, TRUE, &s, skipping, TRUE);
059ec3d9
PH
3846 if (filename == NULL) goto EXPAND_FAILED;
3847 if (*s++ != '}') goto EXPAND_FAILED_CURLY;
3848 while (isspace(*s)) s++;
3849
3850 /* If this isn't a single-key+file lookup, re-arrange the variables
13b685f9
PH
3851 to be appropriate for the search_ functions. For query-style lookups,
3852 there is just a "key", and no file name. For the special query-style +
3853 file types, the query (i.e. "key") starts with a file name. */
059ec3d9
PH
3854
3855 if (key == NULL)
3856 {
13b685f9 3857 while (isspace(*filename)) filename++;
059ec3d9 3858 key = filename;
13b685f9
PH
3859
3860 if (mac_islookup(stype, lookup_querystyle))
3861 {
3862 filename = NULL;
3863 }
3864 else
3865 {
3866 if (*filename != '/')
3867 {
3868 expand_string_message = string_sprintf(
3869 "absolute file name expected for \"%s\" lookup", name);
3870 goto EXPAND_FAILED;
3871 }
3872 while (*key != 0 && !isspace(*key)) key++;
3873 if (*key != 0) *key++ = 0;
3874 }
059ec3d9
PH
3875 }
3876
3877 /* If skipping, don't do the next bit - just lookup_value == NULL, as if
3878 the entry was not found. Note that there is no search_close() function.
3879 Files are left open in case of re-use. At suitable places in higher logic,
3880 search_tidyup() is called to tidy all open files. This can save opening
3881 the same file several times. However, files may also get closed when
3882 others are opened, if too many are open at once. The rule is that a
3883 handle should not be used after a second search_open().
3884
3885 Request that a partial search sets up $1 and maybe $2 by passing
3886 expand_setup containing zero. If its value changes, reset expand_nmax,
3887 since new variables will have been set. Note that at the end of this
3888 "lookup" section, the old numeric variables are restored. */
3889
3890 if (skipping)
3891 lookup_value = NULL;
3892 else
3893 {
3894 void *handle = search_open(filename, stype, 0, NULL, NULL);
3895 if (handle == NULL)
3896 {
3897 expand_string_message = search_error_message;
3898 goto EXPAND_FAILED;
3899 }
3900 lookup_value = search_find(handle, filename, key, partial, affix,
3901 affixlen, starflags, &expand_setup);
3902 if (search_find_defer)
3903 {
3904 expand_string_message =
b72aab72
PP
3905 string_sprintf("lookup of \"%s\" gave DEFER: %s",
3906 string_printing2(key, FALSE), search_error_message);
059ec3d9
PH
3907 goto EXPAND_FAILED;
3908 }
3909 if (expand_setup > 0) expand_nmax = expand_setup;
3910 }
3911
3912 /* The handling of "yes" and "no" result strings is now in a separate
3913 function that is also used by ${if} and ${extract}. */
3914
3915 switch(process_yesno(
3916 skipping, /* were previously skipping */
3917 lookup_value != NULL, /* success/failure indicator */
3918 save_lookup_value, /* value to reset for string2 */
3919 &s, /* input pointer */
3920 &yield, /* output pointer */
3921 &size, /* output size */
3922 &ptr, /* output current point */
3923 US"lookup")) /* condition type */
3924 {
3925 case 1: goto EXPAND_FAILED; /* when all is well, the */
3926 case 2: goto EXPAND_FAILED_CURLY; /* returned value is 0 */
3927 }
3928
3929 /* Restore external setting of expansion variables for carrying on
3930 at this level, and continue. */
3931
3932 restore_expand_strings(save_expand_nmax, save_expand_nstring,
3933 save_expand_nlength);
3934 continue;
3935 }
3936
3937 /* If Perl support is configured, handle calling embedded perl subroutines,
3938 unless locked out at this time. Syntax is ${perl{sub}} or ${perl{sub}{arg}}
3939 or ${perl{sub}{arg1}{arg2}} or up to a maximum of EXIM_PERL_MAX_ARGS
3940 arguments (defined below). */
3941
059ec3d9
PH
3942 #define EXIM_PERL_MAX_ARGS 8
3943
3944 case EITEM_PERL:
1a46a8c5
PH
3945 #ifndef EXIM_PERL
3946 expand_string_message = US"\"${perl\" encountered, but this facility "
3947 "is not included in this binary";
3948 goto EXPAND_FAILED;
3949
3950 #else /* EXIM_PERL */
059ec3d9
PH
3951 {
3952 uschar *sub_arg[EXIM_PERL_MAX_ARGS + 2];
3953 uschar *new_yield;
3954
3955 if ((expand_forbid & RDO_PERL) != 0)
3956 {
3957 expand_string_message = US"Perl calls are not permitted";
3958 goto EXPAND_FAILED;
3959 }
3960
3961 switch(read_subs(sub_arg, EXIM_PERL_MAX_ARGS + 1, 1, &s, skipping, TRUE,
3962 US"perl"))
3963 {
3964 case 1: goto EXPAND_FAILED_CURLY;
3965 case 2:
3966 case 3: goto EXPAND_FAILED;
3967 }
3968
3969 /* If skipping, we don't actually do anything */
3970
3971 if (skipping) continue;
3972
3973 /* Start the interpreter if necessary */
3974
3975 if (!opt_perl_started)
3976 {
3977 uschar *initerror;
3978 if (opt_perl_startup == NULL)
3979 {
3980 expand_string_message = US"A setting of perl_startup is needed when "
3981 "using the Perl interpreter";
3982 goto EXPAND_FAILED;
3983 }
3984 DEBUG(D_any) debug_printf("Starting Perl interpreter\n");
3985 initerror = init_perl(opt_perl_startup);
3986 if (initerror != NULL)
3987 {
3988 expand_string_message =
3989 string_sprintf("error in perl_startup code: %s\n", initerror);
3990 goto EXPAND_FAILED;
3991 }
3992 opt_perl_started = TRUE;
3993 }
3994
3995 /* Call the function */
3996
3997 sub_arg[EXIM_PERL_MAX_ARGS + 1] = NULL;
3998 new_yield = call_perl_cat(yield, &size, &ptr, &expand_string_message,
3999 sub_arg[0], sub_arg + 1);
4000
4001 /* NULL yield indicates failure; if the message pointer has been set to
4002 NULL, the yield was undef, indicating a forced failure. Otherwise the
4003 message will indicate some kind of Perl error. */
4004
4005 if (new_yield == NULL)
4006 {
4007 if (expand_string_message == NULL)
4008 {
4009 expand_string_message =
4010 string_sprintf("Perl subroutine \"%s\" returned undef to force "
4011 "failure", sub_arg[0]);
4012 expand_string_forcedfail = TRUE;
4013 }
4014 goto EXPAND_FAILED;
4015 }
4016
4017 /* Yield succeeded. Ensure forcedfail is unset, just in case it got
4018 set during a callback from Perl. */
4019
4020 expand_string_forcedfail = FALSE;
4021 yield = new_yield;
4022 continue;
4023 }
4024 #endif /* EXIM_PERL */
4025
fffda43a
TK
4026 /* Transform email address to "prvs" scheme to use
4027 as BATV-signed return path */
4028
4029 case EITEM_PRVS:
4030 {
4031 uschar *sub_arg[3];
4032 uschar *p,*domain;
4033
4034 switch(read_subs(sub_arg, 3, 2, &s, skipping, TRUE, US"prvs"))
4035 {
4036 case 1: goto EXPAND_FAILED_CURLY;
4037 case 2:
4038 case 3: goto EXPAND_FAILED;
4039 }
4040
4041 /* If skipping, we don't actually do anything */
4042 if (skipping) continue;
4043
4044 /* sub_arg[0] is the address */
4045 domain = Ustrrchr(sub_arg[0],'@');
4046 if ( (domain == NULL) || (domain == sub_arg[0]) || (Ustrlen(domain) == 1) )
4047 {
cb9328de
PH
4048 expand_string_message = US"prvs first argument must be a qualified email address";
4049 goto EXPAND_FAILED;
4050 }
4051
4052 /* Calculate the hash. The second argument must be a single-digit
4053 key number, or unset. */
4054
4055 if (sub_arg[2] != NULL &&
4056 (!isdigit(sub_arg[2][0]) || sub_arg[2][1] != 0))
4057 {
4058 expand_string_message = US"prvs second argument must be a single digit";
fffda43a
TK
4059 goto EXPAND_FAILED;
4060 }
4061
fffda43a
TK
4062 p = prvs_hmac_sha1(sub_arg[0],sub_arg[1],sub_arg[2],prvs_daystamp(7));
4063 if (p == NULL)
4064 {
cb9328de 4065 expand_string_message = US"prvs hmac-sha1 conversion failed";
fffda43a
TK
4066 goto EXPAND_FAILED;
4067 }
4068
4069 /* Now separate the domain from the local part */
4070 *domain++ = '\0';
4071
4072 yield = string_cat(yield,&size,&ptr,US"prvs=",5);
fffda43a
TK
4073 string_cat(yield,&size,&ptr,(sub_arg[2] != NULL) ? sub_arg[2] : US"0", 1);
4074 string_cat(yield,&size,&ptr,prvs_daystamp(7),3);
4075 string_cat(yield,&size,&ptr,p,6);
a48ced90
TK
4076 string_cat(yield,&size,&ptr,US"=",1);
4077 string_cat(yield,&size,&ptr,sub_arg[0],Ustrlen(sub_arg[0]));
fffda43a
TK
4078 string_cat(yield,&size,&ptr,US"@",1);
4079 string_cat(yield,&size,&ptr,domain,Ustrlen(domain));
4080
4081 continue;
4082 }
4083
4084 /* Check a prvs-encoded address for validity */
4085
4086 case EITEM_PRVSCHECK:
4087 {
4088 uschar *sub_arg[3];
4089 int mysize = 0, myptr = 0;
4090 const pcre *re;
4091 uschar *p;
72fdd6ae
PH
4092
4093 /* TF: Ugliness: We want to expand parameter 1 first, then set
fffda43a
TK
4094 up expansion variables that are used in the expansion of
4095 parameter 2. So we clone the string for the first
72fdd6ae
PH
4096 expansion, where we only expand parameter 1.
4097
4098 PH: Actually, that isn't necessary. The read_subs() function is
4099 designed to work this way for the ${if and ${lookup expansions. I've
4100 tidied the code.
4101 */
fffda43a
TK
4102
4103 /* Reset expansion variables */
4104 prvscheck_result = NULL;
4105 prvscheck_address = NULL;
4106 prvscheck_keynum = NULL;
4107
72fdd6ae 4108 switch(read_subs(sub_arg, 1, 1, &s, skipping, FALSE, US"prvs"))
fffda43a
TK
4109 {
4110 case 1: goto EXPAND_FAILED_CURLY;
4111 case 2:
4112 case 3: goto EXPAND_FAILED;
4113 }
4114
a48ced90 4115 re = regex_must_compile(US"^prvs\\=([0-9])([0-9]{3})([A-F0-9]{6})\\=(.+)\\@(.+)$",
fffda43a
TK
4116 TRUE,FALSE);
4117
72fdd6ae
PH
4118 if (regex_match_and_setup(re,sub_arg[0],0,-1))
4119 {
a48ced90
TK
4120 uschar *local_part = string_copyn(expand_nstring[4],expand_nlength[4]);
4121 uschar *key_num = string_copyn(expand_nstring[1],expand_nlength[1]);
4122 uschar *daystamp = string_copyn(expand_nstring[2],expand_nlength[2]);
4123 uschar *hash = string_copyn(expand_nstring[3],expand_nlength[3]);
fffda43a
TK
4124 uschar *domain = string_copyn(expand_nstring[5],expand_nlength[5]);
4125
4126 DEBUG(D_expand) debug_printf("prvscheck localpart: %s\n", local_part);
4127 DEBUG(D_expand) debug_printf("prvscheck key number: %s\n", key_num);
4128 DEBUG(D_expand) debug_printf("prvscheck daystamp: %s\n", daystamp);
4129 DEBUG(D_expand) debug_printf("prvscheck hash: %s\n", hash);
4130 DEBUG(D_expand) debug_printf("prvscheck domain: %s\n", domain);
4131
4132 /* Set up expansion variables */
4133 prvscheck_address = string_cat(NULL, &mysize, &myptr, local_part, Ustrlen(local_part));
2740a2ca 4134 string_cat(prvscheck_address,&mysize,&myptr,US"@",1);
fffda43a
TK
4135 string_cat(prvscheck_address,&mysize,&myptr,domain,Ustrlen(domain));
4136 prvscheck_address[myptr] = '\0';
4137 prvscheck_keynum = string_copy(key_num);
4138
72fdd6ae
PH
4139 /* Now expand the second argument */
4140 switch(read_subs(sub_arg, 1, 1, &s, skipping, FALSE, US"prvs"))
fffda43a
TK
4141 {
4142 case 1: goto EXPAND_FAILED_CURLY;
4143 case 2:
4144 case 3: goto EXPAND_FAILED;
4145 }
4146
fffda43a 4147 /* Now we have the key and can check the address. */
72fdd6ae
PH
4148
4149 p = prvs_hmac_sha1(prvscheck_address, sub_arg[0], prvscheck_keynum,
4150 daystamp);
4151
fffda43a
TK
4152 if (p == NULL)
4153 {
4154 expand_string_message = US"hmac-sha1 conversion failed";
4155 goto EXPAND_FAILED;
4156 }
4157
4158 DEBUG(D_expand) debug_printf("prvscheck: received hash is %s\n", hash);
4159 DEBUG(D_expand) debug_printf("prvscheck: own hash is %s\n", p);
72fdd6ae 4160
fffda43a
TK
4161 if (Ustrcmp(p,hash) == 0)
4162 {
4163 /* Success, valid BATV address. Now check the expiry date. */
4164 uschar *now = prvs_daystamp(0);
4165 unsigned int inow = 0,iexpire = 1;
4166
ff790e47
PH
4167 (void)sscanf(CS now,"%u",&inow);
4168 (void)sscanf(CS daystamp,"%u",&iexpire);
fffda43a
TK
4169
4170 /* When "iexpire" is < 7, a "flip" has occured.
4171 Adjust "inow" accordingly. */
4172 if ( (iexpire < 7) && (inow >= 993) ) inow = 0;
4173
686c36b7 4174 if (iexpire >= inow)
fffda43a
TK
4175 {
4176 prvscheck_result = US"1";
4177 DEBUG(D_expand) debug_printf("prvscheck: success, $pvrs_result set to 1\n");
4178 }
4179 else
4180 {
4181 prvscheck_result = NULL;
4182 DEBUG(D_expand) debug_printf("prvscheck: signature expired, $pvrs_result unset\n");
4183 }
4184 }
4185 else
4186 {
4187 prvscheck_result = NULL;
4188 DEBUG(D_expand) debug_printf("prvscheck: hash failure, $pvrs_result unset\n");
4189 }
72fdd6ae
PH
4190
4191 /* Now expand the final argument. We leave this till now so that
4192 it can include $prvscheck_result. */
4193
4194 switch(read_subs(sub_arg, 1, 0, &s, skipping, TRUE, US"prvs"))
4195 {
4196 case 1: goto EXPAND_FAILED_CURLY;
4197 case 2:
4198 case 3: goto EXPAND_FAILED;
4199 }
4200
4201 if (sub_arg[0] == NULL || *sub_arg[0] == '\0')
4202 yield = string_cat(yield,&size,&ptr,prvscheck_address,Ustrlen(prvscheck_address));
4203 else
4204 yield = string_cat(yield,&size,&ptr,sub_arg[0],Ustrlen(sub_arg[0]));
4205
4206 /* Reset the "internal" variables afterwards, because they are in
4207 dynamic store that will be reclaimed if the expansion succeeded. */
4208
4209 prvscheck_address = NULL;
4210 prvscheck_keynum = NULL;
4211 }
fffda43a
TK
4212 else
4213 {
4214 /* Does not look like a prvs encoded address, return the empty string.
72fdd6ae
PH
4215 We need to make sure all subs are expanded first, so as to skip over
4216 the entire item. */
4217
5a03bd24 4218 switch(read_subs(sub_arg, 2, 1, &s, skipping, TRUE, US"prvs"))
fffda43a
TK
4219 {
4220 case 1: goto EXPAND_FAILED_CURLY;
4221 case 2:
4222 case 3: goto EXPAND_FAILED;
4223 }
4224 }
4225
4226 continue;
4227 }
4228
059ec3d9
PH
4229 /* Handle "readfile" to insert an entire file */
4230
4231 case EITEM_READFILE:
4232 {
4233 FILE *f;
4234 uschar *sub_arg[2];
4235
4236 if ((expand_forbid & RDO_READFILE) != 0)
4237 {
4238 expand_string_message = US"file insertions are not permitted";
4239 goto EXPAND_FAILED;
4240 }
4241
4242 switch(read_subs(sub_arg, 2, 1, &s, skipping, TRUE, US"readfile"))
4243 {
4244 case 1: goto EXPAND_FAILED_CURLY;
4245 case 2:
4246 case 3: goto EXPAND_FAILED;
4247 }
4248
4249 /* If skipping, we don't actually do anything */
4250
4251 if (skipping) continue;
4252
4253 /* Open the file and read it */
4254
4255 f = Ufopen(sub_arg[0], "rb");
4256 if (f == NULL)
4257 {
4258 expand_string_message = string_open_failed(errno, "%s", sub_arg[0]);
4259 goto EXPAND_FAILED;
4260 }
4261
4262 yield = cat_file(f, yield, &size, &ptr, sub_arg[1]);
f1e894f3 4263 (void)fclose(f);
059ec3d9
PH
4264 continue;
4265 }
4266
4267 /* Handle "readsocket" to insert data from a Unix domain socket */
4268
4269 case EITEM_READSOCK:
4270 {
4271 int fd;
4272 int timeout = 5;
4273 int save_ptr = ptr;
4274 FILE *f;
4275 struct sockaddr_un sockun; /* don't call this "sun" ! */
4276 uschar *arg;
4277 uschar *sub_arg[4];
4278
4279 if ((expand_forbid & RDO_READSOCK) != 0)
4280 {
4281 expand_string_message = US"socket insertions are not permitted";
4282 goto EXPAND_FAILED;
4283 }
4284
4285 /* Read up to 4 arguments, but don't do the end of item check afterwards,
4286 because there may be a string for expansion on failure. */
4287
4288 switch(read_subs(sub_arg, 4, 2, &s, skipping, FALSE, US"readsocket"))
4289 {
4290 case 1: goto EXPAND_FAILED_CURLY;
4291 case 2: /* Won't occur: no end check */
4292 case 3: goto EXPAND_FAILED;
4293 }
4294
4295 /* Sort out timeout, if given */
4296
4297 if (sub_arg[2] != NULL)
4298 {
4299 timeout = readconf_readtime(sub_arg[2], 0, FALSE);
4300 if (timeout < 0)
4301 {
4302 expand_string_message = string_sprintf("bad time value %s",
4303 sub_arg[2]);
4304 goto EXPAND_FAILED;
4305 }
4306 }
4307 else sub_arg[3] = NULL; /* No eol if no timeout */
4308
1cce3af8
PH
4309 /* If skipping, we don't actually do anything. Otherwise, arrange to
4310 connect to either an IP or a Unix socket. */
059ec3d9
PH
4311
4312 if (!skipping)
4313 {
1cce3af8 4314 /* Handle an IP (internet) domain */
059ec3d9 4315
91ecef39 4316 if (Ustrncmp(sub_arg[0], "inet:", 5) == 0)
059ec3d9 4317 {
1cce3af8
PH
4318 BOOL connected = FALSE;
4319 int namelen, port;
4320 host_item shost;
4321 host_item *h;
4322 uschar *server_name = sub_arg[0] + 5;
4323 uschar *port_name = Ustrrchr(server_name, ':');
4324
4325 /* Sort out the port */
4326
4327 if (port_name == NULL)
4328 {
4329 expand_string_message =
4330 string_sprintf("missing port for readsocket %s", sub_arg[0]);
4331 goto EXPAND_FAILED;
4332 }
4333 *port_name++ = 0; /* Terminate server name */
4334
4335 if (isdigit(*port_name))
4336 {
4337 uschar *end;
4338 port = Ustrtol(port_name, &end, 0);
4339 if (end != port_name + Ustrlen(port_name))
4340 {
4341 expand_string_message =
4342 string_sprintf("invalid port number %s", port_name);
4343 goto EXPAND_FAILED;
4344 }
4345 }
4346 else
4347 {
4348 struct servent *service_info = getservbyname(CS port_name, "tcp");
4349 if (service_info == NULL)
4350 {
4351 expand_string_message = string_sprintf("unknown port \"%s\"",
4352 port_name);
4353 goto EXPAND_FAILED;
4354 }
4355 port = ntohs(service_info->s_port);
4356 }
4357
4358 /* Sort out the server. */
4359
4360 shost.next = NULL;
4361 shost.address = NULL;
4362 shost.port = port;
4363 shost.mx = -1;
4364
4365 namelen = Ustrlen(server_name);
4366
4367 /* Anything enclosed in [] must be an IP address. */
4368
4369 if (server_name[0] == '[' &&
4370 server_name[namelen - 1] == ']')
4371 {
4372 server_name[namelen - 1] = 0;
4373 server_name++;
4374 if (string_is_ip_address(server_name, NULL) == 0)
4375 {
4376 expand_string_message =
4377 string_sprintf("malformed IP address \"%s\"", server_name);
4378 goto EXPAND_FAILED;
4379 }
4380 shost.name = shost.address = server_name;
4381 }
4382
4383 /* Otherwise check for an unadorned IP address */
4384
4385 else if (string_is_ip_address(server_name, NULL) != 0)
4386 shost.name = shost.address = server_name;
4387
4388 /* Otherwise lookup IP address(es) from the name */
4389
4390 else
4391 {
4392 shost.name = server_name;
322050c2
PH
4393 if (host_find_byname(&shost, NULL, HOST_FIND_QUALIFY_SINGLE, NULL,
4394 FALSE) != HOST_FOUND)
1cce3af8
PH
4395 {
4396 expand_string_message =
4397 string_sprintf("no IP address found for host %s", shost.name);
4398 goto EXPAND_FAILED;
4399 }
4400 }
4401
4402 /* Try to connect to the server - test each IP till one works */
4403
4404 for (h = &shost; h != NULL; h = h->next)
4405 {
4406 int af = (Ustrchr(h->address, ':') != 0)? AF_INET6 : AF_INET;
4407 if ((fd = ip_socket(SOCK_STREAM, af)) == -1)
4408 {
4409 expand_string_message = string_sprintf("failed to create socket: "
4410 "%s", strerror(errno));
4411 goto SOCK_FAIL;
4412 }
4413
4414 if (ip_connect(fd, af, h->address, port, timeout) == 0)
4415 {
4416 connected = TRUE;
4417 break;
4418 }
4419 }
4420
4421 if (!connected)
4422 {
4423 expand_string_message = string_sprintf("failed to connect to "
4424 "socket %s: couldn't connect to any host", sub_arg[0],
4425 strerror(errno));
4426 goto SOCK_FAIL;
4427 }
059ec3d9
PH
4428 }
4429
1cce3af8
PH
4430 /* Handle a Unix domain socket */
4431
4432 else
059ec3d9 4433 {
a401ddaa 4434 int rc;
1cce3af8
PH
4435 if ((fd = socket(PF_UNIX, SOCK_STREAM, 0)) == -1)
4436 {
4437 expand_string_message = string_sprintf("failed to create socket: %s",
4438 strerror(errno));
4439 goto SOCK_FAIL;
4440 }
4441
4442 sockun.sun_family = AF_UNIX;
4443 sprintf(sockun.sun_path, "%.*s", (int)(sizeof(sockun.sun_path)-1),
4444 sub_arg[0]);
a401ddaa
PH
4445
4446 sigalrm_seen = FALSE;
4447 alarm(timeout);
4448 rc = connect(fd, (struct sockaddr *)(&sockun), sizeof(sockun));
4449 alarm(0);
734e1499 4450 if (sigalrm_seen)
1cce3af8 4451 {
734e1499 4452 expand_string_message = US "socket connect timed out";
1cce3af8
PH
4453 goto SOCK_FAIL;
4454 }
734e1499 4455 if (rc < 0)
a401ddaa 4456 {
734e1499
PH
4457 expand_string_message = string_sprintf("failed to connect to socket "
4458 "%s: %s", sub_arg[0], strerror(errno));
a401ddaa
PH
4459 goto SOCK_FAIL;
4460 }
059ec3d9 4461 }
1cce3af8 4462
059ec3d9
PH
4463 DEBUG(D_expand) debug_printf("connected to socket %s\n", sub_arg[0]);
4464
4465 /* Write the request string, if not empty */
4466
4467 if (sub_arg[1][0] != 0)
4468 {
4469 int len = Ustrlen(sub_arg[1]);
4470 DEBUG(D_expand) debug_printf("writing \"%s\" to socket\n",
4471 sub_arg[1]);
4472 if (write(fd, sub_arg[1], len) != len)
4473 {
4474 expand_string_message = string_sprintf("request write to socket "
4475 "failed: %s", strerror(errno));
4476 goto SOCK_FAIL;
4477 }
4478 }
4479
c1114884
PH
4480 /* Shut down the sending side of the socket. This helps some servers to
4481 recognise that it is their turn to do some work. Just in case some
4482 system doesn't have this function, make it conditional. */
4483
4484 #ifdef SHUT_WR
4485 shutdown(fd, SHUT_WR);
4486 #endif
4487
059ec3d9
PH
4488 /* Now we need to read from the socket, under a timeout. The function
4489 that reads a file can be used. */
4490
4491 f = fdopen(fd, "rb");
4492 sigalrm_seen = FALSE;
4493 alarm(timeout);
4494 yield = cat_file(f, yield, &size, &ptr, sub_arg[3]);
4495 alarm(0);
f1e894f3 4496 (void)fclose(f);
059ec3d9
PH
4497
4498 /* After a timeout, we restore the pointer in the result, that is,
4499 make sure we add nothing from the socket. */
4500
4501 if (sigalrm_seen)
4502 {
4503 ptr = save_ptr;
1cce3af8 4504 expand_string_message = US "socket read timed out";
059ec3d9
PH
4505 goto SOCK_FAIL;
4506 }
4507 }
4508
4509 /* The whole thing has worked (or we were skipping). If there is a
4510 failure string following, we need to skip it. */
4511
4512 if (*s == '{')
4513 {
da6dbe26 4514 if (expand_string_internal(s+1, TRUE, &s, TRUE, TRUE) == NULL)
059ec3d9
PH
4515 goto EXPAND_FAILED;
4516 if (*s++ != '}') goto EXPAND_FAILED_CURLY;
4517 while (isspace(*s)) s++;
4518 }
4519 if (*s++ != '}') goto EXPAND_FAILED_CURLY;
4520 continue;
4521
4522 /* Come here on failure to create socket, connect socket, write to the
4523 socket, or timeout on reading. If another substring follows, expand and
4524 use it. Otherwise, those conditions give expand errors. */
4525
4526 SOCK_FAIL:
4527 if (*s != '{') goto EXPAND_FAILED;
4528 DEBUG(D_any) debug_printf("%s\n", expand_string_message);
da6dbe26 4529 arg = expand_string_internal(s+1, TRUE, &s, FALSE, TRUE);
059ec3d9
PH
4530 if (arg == NULL) goto EXPAND_FAILED;
4531 yield = string_cat(yield, &size, &ptr, arg, Ustrlen(arg));
4532 if (*s++ != '}') goto EXPAND_FAILED_CURLY;
4533 while (isspace(*s)) s++;
4534 if (*s++ != '}') goto EXPAND_FAILED_CURLY;
4535 continue;
4536 }
4537
4538 /* Handle "run" to execute a program. */
4539
4540 case EITEM_RUN:
4541 {
4542 FILE *f;
059ec3d9
PH
4543 uschar *arg;
4544 uschar **argv;
4545 pid_t pid;
4546 int fd_in, fd_out;
4547 int lsize = 0;
4548 int lptr = 0;
4549
4550 if ((expand_forbid & RDO_RUN) != 0)
4551 {
4552 expand_string_message = US"running a command is not permitted";
4553 goto EXPAND_FAILED;
4554 }
4555
4556 while (isspace(*s)) s++;
4557 if (*s != '{') goto EXPAND_FAILED_CURLY;
da6dbe26 4558 arg = expand_string_internal(s+1, TRUE, &s, skipping, TRUE);
059ec3d9
PH
4559 if (arg == NULL) goto EXPAND_FAILED;
4560 while (isspace(*s)) s++;
4561 if (*s++ != '}') goto EXPAND_FAILED_CURLY;
4562
4563 if (skipping) /* Just pretend it worked when we're skipping */
4564 {
4565 runrc = 0;
4566 }
4567 else
4568 {
4569 if (!transport_set_up_command(&argv, /* anchor for arg list */
4570 arg, /* raw command */
4571 FALSE, /* don't expand the arguments */
4572 0, /* not relevant when... */
4573 NULL, /* no transporting address */
4574 US"${run} expansion", /* for error messages */
4575 &expand_string_message)) /* where to put error message */
4576 {
4577 goto EXPAND_FAILED;
4578 }
4579
4580 /* Create the child process, making it a group leader. */
4581
4582 pid = child_open(argv, NULL, 0077, &fd_in, &fd_out, TRUE);
4583
4584 if (pid < 0)
4585 {
4586 expand_string_message =
4587 string_sprintf("couldn't create child process: %s", strerror(errno));
4588 goto EXPAND_FAILED;
4589 }
4590
4591 /* Nothing is written to the standard input. */
4592
f1e894f3 4593 (void)close(fd_in);
059ec3d9 4594
ac53fcda
PP
4595 /* Read the pipe to get the command's output into $value (which is kept
4596 in lookup_value). Read during execution, so that if the output exceeds
4597 the OS pipe buffer limit, we don't block forever. */
4598
4599 f = fdopen(fd_out, "rb");
4600 sigalrm_seen = FALSE;
4601 alarm(60);
4602 lookup_value = cat_file(f, lookup_value, &lsize, &lptr, NULL);
4603 alarm(0);
4604 (void)fclose(f);
4605
059ec3d9
PH
4606 /* Wait for the process to finish, applying the timeout, and inspect its
4607 return code for serious disasters. Simple non-zero returns are passed on.
4608 */
4609
ac53fcda 4610 if (sigalrm_seen == TRUE || (runrc = child_close(pid, 30)) < 0)
059ec3d9 4611 {
ac53fcda 4612 if (sigalrm_seen == TRUE || runrc == -256)
059ec3d9
PH
4613 {
4614 expand_string_message = string_sprintf("command timed out");
4615 killpg(pid, SIGKILL); /* Kill the whole process group */
4616 }
4617
4618 else if (runrc == -257)
4619 expand_string_message = string_sprintf("wait() failed: %s",
4620 strerror(errno));
4621
4622 else
4623 expand_string_message = string_sprintf("command killed by signal %d",
4624 -runrc);
4625
4626 goto EXPAND_FAILED;
4627 }
059ec3d9
PH
4628 }
4629
d20976dc 4630 /* Process the yes/no strings; $value may be useful in both cases */
059ec3d9
PH
4631
4632 switch(process_yesno(
4633 skipping, /* were previously skipping */
4634 runrc == 0, /* success/failure indicator */
d20976dc 4635 lookup_value, /* value to reset for string2 */
059ec3d9
PH
4636 &s, /* input pointer */
4637 &yield, /* output pointer */
4638 &size, /* output size */
4639 &ptr, /* output current point */
4640 US"run")) /* condition type */
4641 {
4642 case 1: goto EXPAND_FAILED; /* when all is well, the */
4643 case 2: goto EXPAND_FAILED_CURLY; /* returned value is 0 */
4644 }
4645
4646 continue;
4647 }
4648
4649 /* Handle character translation for "tr" */
4650
4651 case EITEM_TR:
4652 {
4653 int oldptr = ptr;
4654 int o2m;
4655 uschar *sub[3];
4656
4657 switch(read_subs(sub, 3, 3, &s, skipping, TRUE, US"tr"))
4658 {
4659 case 1: goto EXPAND_FAILED_CURLY;
4660 case 2:
4661 case 3: goto EXPAND_FAILED;
4662 }
4663
4664 yield = string_cat(yield, &size, &ptr, sub[0], Ustrlen(sub[0]));
4665 o2m = Ustrlen(sub[2]) - 1;
4666
4667 if (o2m >= 0) for (; oldptr < ptr; oldptr++)
4668 {
4669 uschar *m = Ustrrchr(sub[1], yield[oldptr]);
4670 if (m != NULL)
4671 {
4672 int o = m - sub[1];
4673 yield[oldptr] = sub[2][(o < o2m)? o : o2m];
4674 }
4675 }
4676
4677 continue;
4678 }
4679
4680 /* Handle "hash", "length", "nhash", and "substr" when they are given with
4681 expanded arguments. */
4682
4683 case EITEM_HASH:
4684 case EITEM_LENGTH:
4685 case EITEM_NHASH:
4686 case EITEM_SUBSTR:
4687 {
4688 int i;
4689 int len;
4690 uschar *ret;
4691 int val[2] = { 0, -1 };
4692 uschar *sub[3];
4693
4694 /* "length" takes only 2 arguments whereas the others take 2 or 3.
4695 Ensure that sub[2] is set in the ${length case. */
4696
4697 sub[2] = NULL;
4698 switch(read_subs(sub, (item_type == EITEM_LENGTH)? 2:3, 2, &s, skipping,
4699 TRUE, name))
4700 {
4701 case 1: goto EXPAND_FAILED_CURLY;
4702 case 2:
4703 case 3: goto EXPAND_FAILED;
4704 }
4705
4706 /* Juggle the arguments if there are only two of them: always move the
4707 string to the last position and make ${length{n}{str}} equivalent to
4708 ${substr{0}{n}{str}}. See the defaults for val[] above. */
4709
4710 if (sub[2] == NULL)
4711 {
4712 sub[2] = sub[1];
4713 sub[1] = NULL;
4714 if (item_type == EITEM_LENGTH)
4715 {
4716 sub[1] = sub[0];
4717 sub[0] = NULL;
4718 }
4719 }
4720
4721 for (i = 0; i < 2; i++)
4722 {
4723 if (sub[i] == NULL) continue;
4724 val[i] = (int)Ustrtol(sub[i], &ret, 10);
4725 if (*ret != 0 || (i != 0 && val[i] < 0))
4726 {
4727 expand_string_message = string_sprintf("\"%s\" is not a%s number "
4728 "(in \"%s\" expansion)", sub[i], (i != 0)? " positive" : "", name);
4729 goto EXPAND_FAILED;
4730 }
4731 }
4732
4733 ret =
4734 (item_type == EITEM_HASH)?
4735 compute_hash(sub[2], val[0], val[1], &len) :
4736 (item_type == EITEM_NHASH)?
4737 compute_nhash(sub[2], val[0], val[1], &len) :
4738 extract_substr(sub[2], val[0], val[1], &len);
4739
4740 if (ret == NULL) goto EXPAND_FAILED;
4741 yield = string_cat(yield, &size, &ptr, ret, len);
4742 continue;
4743 }
4744
4745 /* Handle HMAC computation: ${hmac{<algorithm>}{<secret>}{<text>}}
4746 This code originally contributed by Steve Haslam. It currently supports
4747 the use of MD5 and SHA-1 hashes.
4748
4749 We need some workspace that is large enough to handle all the supported
4750 hash types. Use macros to set the sizes rather than be too elaborate. */
4751
4752 #define MAX_HASHLEN 20
4753 #define MAX_HASHBLOCKLEN 64
4754
4755 case EITEM_HMAC:
4756 {
4757 uschar *sub[3];
4758 md5 md5_base;
4759 sha1 sha1_base;
4760 void *use_base;
4761 int type, i;
4762 int hashlen; /* Number of octets for the hash algorithm's output */
4763 int hashblocklen; /* Number of octets the hash algorithm processes */
4764 uschar *keyptr, *p;
4765 unsigned int keylen;
4766
4767 uschar keyhash[MAX_HASHLEN];
4768 uschar innerhash[MAX_HASHLEN];
4769 uschar finalhash[MAX_HASHLEN];
4770 uschar finalhash_hex[2*MAX_HASHLEN];
4771 uschar innerkey[MAX_HASHBLOCKLEN];
4772 uschar outerkey[MAX_HASHBLOCKLEN];
4773
4774 switch (read_subs(sub, 3, 3, &s, skipping, TRUE, name))
4775 {
4776 case 1: goto EXPAND_FAILED_CURLY;
4777 case 2:
4778 case 3: goto EXPAND_FAILED;
4779 }
4780
4781 if (Ustrcmp(sub[0], "md5") == 0)
4782 {
4783 type = HMAC_MD5;
4784 use_base = &md5_base;
4785 hashlen = 16;
4786 hashblocklen = 64;
4787 }
4788 else if (Ustrcmp(sub[0], "sha1") == 0)
4789 {
4790 type = HMAC_SHA1;
4791 use_base = &sha1_base;
4792 hashlen = 20;
4793 hashblocklen = 64;
4794 }
4795 else
4796 {
4797 expand_string_message =
4798 string_sprintf("hmac algorithm \"%s\" is not recognised", sub[0]);
4799 goto EXPAND_FAILED;
4800 }
4801
4802 keyptr = sub[1];
4803 keylen = Ustrlen(keyptr);
4804
4805 /* If the key is longer than the hash block length, then hash the key
4806 first */
4807
4808 if (keylen > hashblocklen)
4809 {
4810 chash_start(type, use_base);
4811 chash_end(type, use_base, keyptr, keylen, keyhash);
4812 keyptr = keyhash;
4813 keylen = hashlen;
4814 }
4815
4816 /* Now make the inner and outer key values */
4817
4818 memset(innerkey, 0x36, hashblocklen);
4819 memset(outerkey, 0x5c, hashblocklen);
4820
4821 for (i = 0; i < keylen; i++)
4822 {
4823 innerkey[i] ^= keyptr[i];
4824 outerkey[i] ^= keyptr[i];
4825 }
4826
4827 /* Now do the hashes */
4828
4829 chash_start(type, use_base);
4830 chash_mid(type, use_base, innerkey);
4831 chash_end(type, use_base, sub[2], Ustrlen(sub[2]), innerhash);
4832
4833 chash_start(type, use_base);
4834 chash_mid(type, use_base, outerkey);
4835 chash_end(type, use_base, innerhash, hashlen, finalhash);
4836
4837 /* Encode the final hash as a hex string */
4838
4839 p = finalhash_hex;
4840 for (i = 0; i < hashlen; i++)
4841 {
4842 *p++ = hex_digits[(finalhash[i] & 0xf0) >> 4];
4843 *p++ = hex_digits[finalhash[i] & 0x0f];
4844 }
4845
4846 DEBUG(D_any) debug_printf("HMAC[%s](%.*s,%.*s)=%.*s\n", sub[0],
4847 (int)keylen, keyptr, Ustrlen(sub[2]), sub[2], hashlen*2, finalhash_hex);
4848
4849 yield = string_cat(yield, &size, &ptr, finalhash_hex, hashlen*2);
4850 }
4851
4852 continue;
4853
4854 /* Handle global substitution for "sg" - like Perl's s/xxx/yyy/g operator.
4855 We have to save the numerical variables and restore them afterwards. */
4856
4857 case EITEM_SG:
4858 {
4859 const pcre *re;
4860 int moffset, moffsetextra, slen;
4861 int roffset;
4862 int emptyopt;
4863 const uschar *rerror;
4864 uschar *subject;
4865 uschar *sub[3];
4866 int save_expand_nmax =
4867 save_expand_strings(save_expand_nstring, save_expand_nlength);
4868
4869 switch(read_subs(sub, 3, 3, &s, skipping, TRUE, US"sg"))
4870 {
4871 case 1: goto EXPAND_FAILED_CURLY;
4872 case 2:
4873 case 3: goto EXPAND_FAILED;
4874 }
4875
4876 /* Compile the regular expression */
4877
4878 re = pcre_compile(CS sub[1], PCRE_COPT, (const char **)&rerror, &roffset,
4879 NULL);
4880
4881 if (re == NULL)
4882 {
4883 expand_string_message = string_sprintf("regular expression error in "
4884 "\"%s\": %s at offset %d", sub[1], rerror, roffset);
4885 goto EXPAND_FAILED;
4886 }
4887
4888 /* Now run a loop to do the substitutions as often as necessary. It ends
4889 when there are no more matches. Take care over matches of the null string;
4890 do the same thing as Perl does. */
4891
4892 subject = sub[0];
4893 slen = Ustrlen(sub[0]);
4894 moffset = moffsetextra = 0;
4895 emptyopt = 0;
4896
4897 for (;;)
4898 {
4899 int ovector[3*(EXPAND_MAXN+1)];
4900 int n = pcre_exec(re, NULL, CS subject, slen, moffset + moffsetextra,
4901 PCRE_EOPT | emptyopt, ovector, sizeof(ovector)/sizeof(int));
4902 int nn;
4903 uschar *insert;
4904
4905 /* No match - if we previously set PCRE_NOTEMPTY after a null match, this
4906 is not necessarily the end. We want to repeat the match from one
4907 character further along, but leaving the basic offset the same (for
4908 copying below). We can't be at the end of the string - that was checked
4909 before setting PCRE_NOTEMPTY. If PCRE_NOTEMPTY is not set, we are
4910 finished; copy the remaining string and end the loop. */
4911
4912 if (n < 0)
4913 {
4914 if (emptyopt != 0)
4915 {
4916 moffsetextra = 1;
4917 emptyopt = 0;
4918 continue;
4919 }
4920 yield = string_cat(yield, &size, &ptr, subject+moffset, slen-moffset);
4921 break;
4922 }
4923
4924 /* Match - set up for expanding the replacement. */
4925
4926 if (n == 0) n = EXPAND_MAXN + 1;
4927 expand_nmax = 0;
4928 for (nn = 0; nn < n*2; nn += 2)
4929 {
4930 expand_nstring[expand_nmax] = subject + ovector[nn];
4931 expand_nlength[expand_nmax++] = ovector[nn+1] - ovector[nn];
4932 }
4933 expand_nmax--;
4934
4935 /* Copy the characters before the match, plus the expanded insertion. */
4936
4937 yield = string_cat(yield, &size, &ptr, subject + moffset,
4938 ovector[0] - moffset);
4939 insert = expand_string(sub[2]);
4940 if (insert == NULL) goto EXPAND_FAILED;
4941 yield = string_cat(yield, &size, &ptr, insert, Ustrlen(insert));
4942
4943 moffset = ovector[1];
4944 moffsetextra = 0;
4945 emptyopt = 0;
4946
4947 /* If we have matched an empty string, first check to see if we are at
4948 the end of the subject. If so, the loop is over. Otherwise, mimic
4949 what Perl's /g options does. This turns out to be rather cunning. First
4950 we set PCRE_NOTEMPTY and PCRE_ANCHORED and try the match a non-empty
4951 string at the same point. If this fails (picked up above) we advance to
4952 the next character. */
4953
4954 if (ovector[0] == ovector[1])
4955 {
4956 if (ovector[0] == slen) break;
4957 emptyopt = PCRE_NOTEMPTY | PCRE_ANCHORED;
4958 }
4959 }
4960
4961 /* All done - restore numerical variables. */
4962
4963 restore_expand_strings(save_expand_nmax, save_expand_nstring,
4964 save_expand_nlength);
4965 continue;
4966 }
4967
4968 /* Handle keyed and numbered substring extraction. If the first argument
4969 consists entirely of digits, then a numerical extraction is assumed. */
4970
4971 case EITEM_EXTRACT:
4972 {
4973 int i;
4974 int j = 2;
4975 int field_number = 1;
4976 BOOL field_number_set = FALSE;
4977 uschar *save_lookup_value = lookup_value;
4978 uschar *sub[3];
4979 int save_expand_nmax =
4980 save_expand_strings(save_expand_nstring, save_expand_nlength);
4981
4982 /* Read the arguments */
4983
4984 for (i = 0; i < j; i++)
4985 {
4986 while (isspace(*s)) s++;
4987 if (*s == '{')
4988 {
da6dbe26 4989 sub[i] = expand_string_internal(s+1, TRUE, &s, skipping, TRUE);
059ec3d9
PH
4990 if (sub[i] == NULL) goto EXPAND_FAILED;
4991 if (*s++ != '}') goto EXPAND_FAILED_CURLY;
4992
4993 /* After removal of leading and trailing white space, the first
4994 argument must not be empty; if it consists entirely of digits
4995 (optionally preceded by a minus sign), this is a numerical
4996 extraction, and we expect 3 arguments. */
4997
4998 if (i == 0)
4999 {
5000 int len;
5001 int x = 0;
5002 uschar *p = sub[0];
5003
5004 while (isspace(*p)) p++;
5005 sub[0] = p;
5006
5007 len = Ustrlen(p);
5008 while (len > 0 && isspace(p[len-1])) len--;
5009 p[len] = 0;
5010
e2803e40 5011 if (*p == 0 && !skipping)
059ec3d9 5012 {
554d2369
TF
5013 expand_string_message = US"first argument of \"extract\" must "
5014 "not be empty";
059ec3d9
PH
5015 goto EXPAND_FAILED;
5016 }
5017
5018 if (*p == '-')
5019 {
5020 field_number = -1;
5021 p++;
5022 }
5023 while (*p != 0 && isdigit(*p)) x = x * 10 + *p++ - '0';
5024 if (*p == 0)
5025 {
5026 field_number *= x;
5027 j = 3; /* Need 3 args */
5028 field_number_set = TRUE;
5029 }
5030 }
5031 }
5032 else goto EXPAND_FAILED_CURLY;
5033 }
5034
5035 /* Extract either the numbered or the keyed substring into $value. If
5036 skipping, just pretend the extraction failed. */
5037
5038 lookup_value = skipping? NULL : field_number_set?
5039 expand_gettokened(field_number, sub[1], sub[2]) :
5040 expand_getkeyed(sub[0], sub[1]);
5041
5042 /* If no string follows, $value gets substituted; otherwise there can
5043 be yes/no strings, as for lookup or if. */
5044
5045 switch(process_yesno(
5046 skipping, /* were previously skipping */
5047 lookup_value != NULL, /* success/failure indicator */
5048 save_lookup_value, /* value to reset for string2 */
5049 &s, /* input pointer */
5050 &yield, /* output pointer */
5051 &size, /* output size */
5052 &ptr, /* output current point */
5053 US"extract")) /* condition type */
5054 {
5055 case 1: goto EXPAND_FAILED; /* when all is well, the */
5056 case 2: goto EXPAND_FAILED_CURLY; /* returned value is 0 */
5057 }
5058
5059 /* All done - restore numerical variables. */
5060
5061 restore_expand_strings(save_expand_nmax, save_expand_nstring,
5062 save_expand_nlength);
5063
5064 continue;
5065 }
1a46a8c5
PH
5066
5067
29f89cad
PH
5068 /* Handle list operations */
5069
5070 case EITEM_FILTER:
5071 case EITEM_MAP:
5072 case EITEM_REDUCE:
5073 {
5074 int sep = 0;
5075 int save_ptr = ptr;
5076 uschar outsep[2] = { '\0', '\0' };
5077 uschar *list, *expr, *temp;
5078 uschar *save_iterate_item = iterate_item;
5079 uschar *save_lookup_value = lookup_value;
5080
5081 while (isspace(*s)) s++;
5082 if (*s++ != '{') goto EXPAND_FAILED_CURLY;
5083
da6dbe26 5084 list = expand_string_internal(s, TRUE, &s, skipping, TRUE);
29f89cad
PH
5085 if (list == NULL) goto EXPAND_FAILED;
5086 if (*s++ != '}') goto EXPAND_FAILED_CURLY;
5087
5088 if (item_type == EITEM_REDUCE)
5089 {
5090 while (isspace(*s)) s++;
5091 if (*s++ != '{') goto EXPAND_FAILED_CURLY;
da6dbe26 5092 temp = expand_string_internal(s, TRUE, &s, skipping, TRUE);
29f89cad
PH
5093 if (temp == NULL) goto EXPAND_FAILED;
5094 lookup_value = temp;
5095 if (*s++ != '}') goto EXPAND_FAILED_CURLY;
5096 }
5097
5098 while (isspace(*s)) s++;
5099 if (*s++ != '{') goto EXPAND_FAILED_CURLY;
5100
5101 expr = s;
5102
5103 /* For EITEM_FILTER, call eval_condition once, with result discarded (as
5104 if scanning a "false" part). This allows us to find the end of the
5105 condition, because if the list is empty, we won't actually evaluate the
5106 condition for real. For EITEM_MAP and EITEM_REDUCE, do the same, using
5107 the normal internal expansion function. */
5108
5109 if (item_type == EITEM_FILTER)
5110 {
5111 temp = eval_condition(expr, NULL);
5112 if (temp != NULL) s = temp;
5113 }
5114 else
5115 {
da6dbe26 5116 temp = expand_string_internal(s, TRUE, &s, TRUE, TRUE);
29f89cad
PH
5117 }
5118
5119 if (temp == NULL)
5120 {
5121 expand_string_message = string_sprintf("%s inside \"%s\" item",
5122 expand_string_message, name);
5123 goto EXPAND_FAILED;
5124 }
5125
5126 while (isspace(*s)) s++;
5127 if (*s++ != '}')
5128 {
5129 expand_string_message = string_sprintf("missing } at end of condition "
5130 "or expression inside \"%s\"", name);
5131 goto EXPAND_FAILED;
5132 }
5133
5134 while (isspace(*s)) s++;
5135 if (*s++ != '}')
5136 {
5137 expand_string_message = string_sprintf("missing } at end of \"%s\"",
5138 name);
5139 goto EXPAND_FAILED;
5140 }
5141
5142 /* If we are skipping, we can now just move on to the next item. When
5143 processing for real, we perform the iteration. */
5144
5145 if (skipping) continue;
5146 while ((iterate_item = string_nextinlist(&list, &sep, NULL, 0)) != NULL)
5147 {
5148 *outsep = (uschar)sep; /* Separator as a string */
5149
5150 DEBUG(D_expand) debug_printf("%s: $item = \"%s\"\n", name, iterate_item);
5151
5152 if (item_type == EITEM_FILTER)
5153 {
5154 BOOL condresult;
5155 if (eval_condition(expr, &condresult) == NULL)
5156 {
e58c13cc
PH
5157 iterate_item = save_iterate_item;
5158 lookup_value = save_lookup_value;
29f89cad
PH
5159 expand_string_message = string_sprintf("%s inside \"%s\" condition",
5160 expand_string_message, name);
5161 goto EXPAND_FAILED;
5162 }
5163 DEBUG(D_expand) debug_printf("%s: condition is %s\n", name,
5164 condresult? "true":"false");
5165 if (condresult)
5166 temp = iterate_item; /* TRUE => include this item */
5167 else
5168 continue; /* FALSE => skip this item */
5169 }
5170
5171 /* EITEM_MAP and EITEM_REDUCE */
5172
5173 else
5174 {
da6dbe26 5175 temp = expand_string_internal(expr, TRUE, NULL, skipping, TRUE);
29f89cad
PH
5176 if (temp == NULL)
5177 {
e58c13cc 5178 iterate_item = save_iterate_item;
29f89cad
PH
5179 expand_string_message = string_sprintf("%s inside \"%s\" item",
5180 expand_string_message, name);
5181 goto EXPAND_FAILED;
5182 }
5183 if (item_type == EITEM_REDUCE)
5184 {
5185 lookup_value = temp; /* Update the value of $value */
5186 continue; /* and continue the iteration */
5187 }
5188 }
5189
5190 /* We reach here for FILTER if the condition is true, always for MAP,
5191 and never for REDUCE. The value in "temp" is to be added to the output
5192 list that is being created, ensuring that any occurrences of the
5193 separator character are doubled. Unless we are dealing with the first
5194 item of the output list, add in a space if the new item begins with the
5195 separator character, or is an empty string. */
5196
5197 if (ptr != save_ptr && (temp[0] == *outsep || temp[0] == 0))
5198 yield = string_cat(yield, &size, &ptr, US" ", 1);
5199
5200 /* Add the string in "temp" to the output list that we are building,
5201 This is done in chunks by searching for the separator character. */
5202
5203 for (;;)
5204 {
5205 size_t seglen = Ustrcspn(temp, outsep);
5206 yield = string_cat(yield, &size, &ptr, temp, seglen + 1);
5207
5208 /* If we got to the end of the string we output one character
5209 too many; backup and end the loop. Otherwise arrange to double the
5210 separator. */
5211
5212 if (temp[seglen] == '\0') { ptr--; break; }
5213 yield = string_cat(yield, &size, &ptr, outsep, 1);
5214 temp += seglen + 1;
5215 }
5216
5217 /* Output a separator after the string: we will remove the redundant
5218 final one at the end. */
5219
5220 yield = string_cat(yield, &size, &ptr, outsep, 1);
5221 } /* End of iteration over the list loop */
5222
5223 /* REDUCE has generated no output above: output the final value of
5224 $value. */
5225
5226 if (item_type == EITEM_REDUCE)
5227 {
5228 yield = string_cat(yield, &size, &ptr, lookup_value,
5229 Ustrlen(lookup_value));
5230 lookup_value = save_lookup_value; /* Restore $value */
5231 }
5232
5233 /* FILTER and MAP generate lists: if they have generated anything, remove
5234 the redundant final separator. Even though an empty item at the end of a
5235 list does not count, this is tidier. */
5236
5237 else if (ptr != save_ptr) ptr--;
5238
5239 /* Restore preserved $item */
5240
5241 iterate_item = save_iterate_item;
5242 continue;
5243 }
5244
5245
1a46a8c5
PH
5246 /* If ${dlfunc support is configured, handle calling dynamically-loaded
5247 functions, unless locked out at this time. Syntax is ${dlfunc{file}{func}}
5248 or ${dlfunc{file}{func}{arg}} or ${dlfunc{file}{func}{arg1}{arg2}} or up to
5249 a maximum of EXPAND_DLFUNC_MAX_ARGS arguments (defined below). */
5250
5251 #define EXPAND_DLFUNC_MAX_ARGS 8
5252
5253 case EITEM_DLFUNC:
5254 #ifndef EXPAND_DLFUNC
5255 expand_string_message = US"\"${dlfunc\" encountered, but this facility "
5256 "is not included in this binary";
5257 goto EXPAND_FAILED;
5258
5259 #else /* EXPAND_DLFUNC */
5260 {
5261 tree_node *t;
5262 exim_dlfunc_t *func;
5263 uschar *result;
5264 int status, argc;
5265 uschar *argv[EXPAND_DLFUNC_MAX_ARGS + 3];
5266
5267 if ((expand_forbid & RDO_DLFUNC) != 0)
5268 {
5269 expand_string_message =
5270 US"dynamically-loaded functions are not permitted";
5271 goto EXPAND_FAILED;
5272 }
5273
5274 switch(read_subs(argv, EXPAND_DLFUNC_MAX_ARGS + 2, 2, &s, skipping,
5275 TRUE, US"dlfunc"))
5276 {
5277 case 1: goto EXPAND_FAILED_CURLY;
5278 case 2:
5279 case 3: goto EXPAND_FAILED;
5280 }
5281
5282 /* If skipping, we don't actually do anything */
5283
5284 if (skipping) continue;
5285
5286 /* Look up the dynamically loaded object handle in the tree. If it isn't
5287 found, dlopen() the file and put the handle in the tree for next time. */
5288
5289 t = tree_search(dlobj_anchor, argv[0]);
5290 if (t == NULL)
5291 {
5292 void *handle = dlopen(CS argv[0], RTLD_LAZY);
5293 if (handle == NULL)
5294 {
5295 expand_string_message = string_sprintf("dlopen \"%s\" failed: %s",
5296 argv[0], dlerror());
5297 log_write(0, LOG_MAIN|LOG_PANIC, "%s", expand_string_message);
5298 goto EXPAND_FAILED;
5299 }
5300 t = store_get_perm(sizeof(tree_node) + Ustrlen(argv[0]));
5301 Ustrcpy(t->name, argv[0]);
5302 t->data.ptr = handle;
5303 (void)tree_insertnode(&dlobj_anchor, t);
5304 }
5305
5306 /* Having obtained the dynamically loaded object handle, look up the
5307 function pointer. */
5308
5309 func = (exim_dlfunc_t *)dlsym(t->data.ptr, CS argv[1]);
5310 if (func == NULL)
5311 {
5312 expand_string_message = string_sprintf("dlsym \"%s\" in \"%s\" failed: "
5313 "%s", argv[1], argv[0], dlerror());
7dbf77c9 5314 log_write(0, LOG_MAIN|LOG_PANIC, "%s", expand_string_message);
1a46a8c5
PH
5315 goto EXPAND_FAILED;
5316 }
5317
5318 /* Call the function and work out what to do with the result. If it
5319 returns OK, we have a replacement string; if it returns DEFER then
5320 expansion has failed in a non-forced manner; if it returns FAIL then
5321 failure was forced; if it returns ERROR or any other value there's a
d6b4d938
TF
5322 problem, so panic slightly. In any case, assume that the function has
5323 side-effects on the store that must be preserved. */
1a46a8c5 5324
d6b4d938 5325 resetok = FALSE;
1a46a8c5
PH
5326 result = NULL;
5327 for (argc = 0; argv[argc] != NULL; argc++);
5328 status = func(&result, argc - 2, &argv[2]);
5329 if(status == OK)
5330 {
5331 if (result == NULL) result = US"";
5332 yield = string_cat(yield, &size, &ptr, result, Ustrlen(result));
5333 continue;
5334 }
5335 else
5336 {
5337 expand_string_message = result == NULL ? US"(no message)" : result;
5338 if(status == FAIL_FORCED) expand_string_forcedfail = TRUE;
5339 else if(status != FAIL)
5340 log_write(0, LOG_MAIN|LOG_PANIC, "dlfunc{%s}{%s} failed (%d): %s",
5341 argv[0], argv[1], status, expand_string_message);
5342 goto EXPAND_FAILED;
5343 }
5344 }
5345 #endif /* EXPAND_DLFUNC */
059ec3d9
PH
5346 }
5347
5348 /* Control reaches here if the name is not recognized as one of the more
5349 complicated expansion items. Check for the "operator" syntax (name terminated
5350 by a colon). Some of the operators have arguments, separated by _ from the
5351 name. */
5352
5353 if (*s == ':')
5354 {
5355 int c;
5356 uschar *arg = NULL;
da6dbe26 5357 uschar *sub = expand_string_internal(s+1, TRUE, &s, skipping, TRUE);
059ec3d9
PH
5358 if (sub == NULL) goto EXPAND_FAILED;
5359 s++;
5360
5361 /* Owing to an historical mis-design, an underscore may be part of the
5362 operator name, or it may introduce arguments. We therefore first scan the
5363 table of names that contain underscores. If there is no match, we cut off
5364 the arguments and then scan the main table. */
5365
5366 c = chop_match(name, op_table_underscore,
5367 sizeof(op_table_underscore)/sizeof(uschar *));
5368
5369 if (c < 0)
5370 {
5371 arg = Ustrchr(name, '_');
5372 if (arg != NULL) *arg = 0;
5373 c = chop_match(name, op_table_main,
5374 sizeof(op_table_main)/sizeof(uschar *));
5375 if (c >= 0) c += sizeof(op_table_underscore)/sizeof(uschar *);
5376 if (arg != NULL) *arg++ = '_'; /* Put back for error messages */
5377 }
5378
5379 /* If we are skipping, we don't need to perform the operation at all.
5380 This matters for operations like "mask", because the data may not be
5381 in the correct format when skipping. For example, the expression may test
5382 for the existence of $sender_host_address before trying to mask it. For
5383 other operations, doing them may not fail, but it is a waste of time. */
5384
5385 if (skipping && c >= 0) continue;
5386
5387 /* Otherwise, switch on the operator type */
5388
5389 switch(c)
5390 {
5391 case EOP_BASE62:
5392 {
5393 uschar *t;
5394 unsigned long int n = Ustrtoul(sub, &t, 10);
5395 if (*t != 0)
5396 {
5397 expand_string_message = string_sprintf("argument for base62 "
5398 "operator is \"%s\", which is not a decimal number", sub);
5399 goto EXPAND_FAILED;
5400 }
5401 t = string_base62(n);
5402 yield = string_cat(yield, &size, &ptr, t, Ustrlen(t));
5403 continue;
5404 }
5405
9a799bc0
PH
5406 /* Note that for Darwin and Cygwin, BASE_62 actually has the value 36 */
5407
059ec3d9
PH
5408 case EOP_BASE62D:
5409 {
5410 uschar buf[16];
5411 uschar *tt = sub;
5412 unsigned long int n = 0;
5413 while (*tt != 0)
5414 {
5415 uschar *t = Ustrchr(base62_chars, *tt++);
5416 if (t == NULL)
5417 {
5418 expand_string_message = string_sprintf("argument for base62d "
9a799bc0
PH
5419 "operator is \"%s\", which is not a base %d number", sub,
5420 BASE_62);
059ec3d9
PH
5421 goto EXPAND_FAILED;
5422 }
9a799bc0 5423 n = n * BASE_62 + (t - base62_chars);
059ec3d9
PH
5424 }
5425 (void)sprintf(CS buf, "%ld", n);
5426 yield = string_cat(yield, &size, &ptr, buf, Ustrlen(buf));
5427 continue;
5428 }
5429
5430 case EOP_EXPAND:
5431 {
da6dbe26 5432 uschar *expanded = expand_string_internal(sub, FALSE, NULL, skipping, TRUE);
059ec3d9
PH
5433 if (expanded == NULL)
5434 {
5435 expand_string_message =
5436 string_sprintf("internal expansion of \"%s\" failed: %s", sub,
5437 expand_string_message);
5438 goto EXPAND_FAILED;
5439 }
5440 yield = string_cat(yield, &size, &ptr, expanded, Ustrlen(expanded));
5441 continue;
5442 }
5443
5444 case EOP_LC:
5445 {
5446 int count = 0;
5447 uschar *t = sub - 1;
5448 while (*(++t) != 0) { *t = tolower(*t); count++; }
5449 yield = string_cat(yield, &size, &ptr, sub, count);
5450 continue;
5451 }
5452
5453 case EOP_UC:
5454 {
5455 int count = 0;
5456 uschar *t = sub - 1;
5457 while (*(++t) != 0) { *t = toupper(*t); count++; }
5458 yield = string_cat(yield, &size, &ptr, sub, count);
5459 continue;
5460 }
5461
5462 case EOP_MD5:
5463 {
5464 md5 base;
5465 uschar digest[16];
5466 int j;
5467 char st[33];
5468 md5_start(&base);
5469 md5_end(&base, sub, Ustrlen(sub), digest);
5470 for(j = 0; j < 16; j++) sprintf(st+2*j, "%02x", digest[j]);
5471 yield = string_cat(yield, &size, &ptr, US st, (int)strlen(st));
5472 continue;
5473 }
5474
5475 case EOP_SHA1:
5476 {
5477 sha1 base;
5478 uschar digest[20];
5479 int j;
5480 char st[41];
5481 sha1_start(&base);
5482 sha1_end(&base, sub, Ustrlen(sub), digest);
5483 for(j = 0; j < 20; j++) sprintf(st+2*j, "%02X", digest[j]);
5484 yield = string_cat(yield, &size, &ptr, US st, (int)strlen(st));
5485 continue;
5486 }
5487
5488 /* Convert hex encoding to base64 encoding */
5489
5490 case EOP_HEX2B64:
5491 {
5492 int c = 0;
5493 int b = -1;
5494 uschar *in = sub;
5495 uschar *out = sub;
5496 uschar *enc;
5497
5498 for (enc = sub; *enc != 0; enc++)
5499 {
5500 if (!isxdigit(*enc))
5501 {
5502 expand_string_message = string_sprintf("\"%s\" is not a hex "
5503 "string", sub);
5504 goto EXPAND_FAILED;
5505 }
5506 c++;
5507 }
5508
5509 if ((c & 1) != 0)
5510 {
5511 expand_string_message = string_sprintf("\"%s\" contains an odd "
5512 "number of characters", sub);
5513 goto EXPAND_FAILED;
5514 }
5515
5516 while ((c = *in++) != 0)
5517 {
5518 if (isdigit(c)) c -= '0';
5519 else c = toupper(c) - 'A' + 10;
5520 if (b == -1)
5521 {
5522 b = c << 4;
5523 }
5524 else
5525 {
5526 *out++ = b | c;
5527 b = -1;
5528 }
5529 }
5530
5531 enc = auth_b64encode(sub, out - sub);
5532 yield = string_cat(yield, &size, &ptr, enc, Ustrlen(enc));
5533 continue;
5534 }
5535
a64a3dfa
JH
5536 /* count the number of list elements */
5537
5538 case EOP_LISTCOUNT:
5539 {
5540 int cnt = 0;
5541 int sep = 0;
5542 uschar * cp;
5543 uschar buffer[256];
5544
5545 while (string_nextinlist(&sub, &sep, buffer, sizeof(buffer)) != NULL) cnt++;
5546 cp = string_sprintf("%d", cnt);
5547 yield = string_cat(yield, &size, &ptr, cp, Ustrlen(cp));
5548 continue;
5549 }
5550
042eb971 5551 /* expand a named list given the name */
a64a3dfa 5552 /* handles nested named lists; requotes as colon-sep list */
042eb971 5553
a64a3dfa 5554 case EOP_LISTNAMED:
042eb971
JH
5555 {
5556 tree_node *t = NULL;
5557 uschar * list;
5558 int sep = 0;
5559 uschar * item;
5560 uschar * suffix = "";
5561 BOOL needsep = FALSE;
5562 uschar buffer[256];
5563
5564 if (*sub == '+') sub++;
5565 if (arg == NULL) /* no-argument version */
5566 {
5567 if (!(t = tree_search(addresslist_anchor, sub)) &&
5568 !(t = tree_search(domainlist_anchor, sub)) &&
5569 !(t = tree_search(hostlist_anchor, sub)))
5570 t = tree_search(localpartlist_anchor, sub);
5571 }
5572 else switch(*arg) /* specific list-type version */
5573 {
5574 case 'a': t = tree_search(addresslist_anchor, sub); suffix = "_a"; break;
5575 case 'd': t = tree_search(domainlist_anchor, sub); suffix = "_d"; break;
5576 case 'h': t = tree_search(hostlist_anchor, sub); suffix = "_h"; break;
5577 case 'l': t = tree_search(localpartlist_anchor, sub); suffix = "_l"; break;
5578 default:
5579 expand_string_message = string_sprintf("bad suffix on \"list\" operator");
5580 goto EXPAND_FAILED;
5581 }
5582
5583 if(!t)
5584 {
5585 expand_string_message = string_sprintf("\"%s\" is not a %snamed list",
5586 sub, !arg?""
5587 : *arg=='a'?"address "
5588 : *arg=='d'?"domain "
5589 : *arg=='h'?"host "
5590 : *arg=='l'?"localpart "
5591 : 0);
5592 goto EXPAND_FAILED;
5593 }
5594
042eb971
JH
5595 list = ((namedlist_block *)(t->data.ptr))->string;
5596
5597 while ((item = string_nextinlist(&list, &sep, buffer, sizeof(buffer))) != NULL)
5598 {
5599 uschar * buf = US" : ";
5600 if (needsep)
5601 yield = string_cat(yield, &size, &ptr, buf, 3);
5602 else
5603 needsep = TRUE;
5604
5605 if (*item == '+') /* list item is itself a named list */
5606 {
a64a3dfa 5607 uschar * sub = string_sprintf("${listnamed%s:%s}", suffix, item);
042eb971
JH
5608 item = expand_string_internal(sub, FALSE, NULL, FALSE, TRUE);
5609 }
5610 else if (sep != ':') /* item from non-colon-sep list, re-quote for colon list-separator */
5611 {
5612 char * cp;
5613 char tok[3];
5614 tok[0] = sep; tok[1] = ':'; tok[2] = 0;
5615 while ((cp= strpbrk((const char *)item, tok)))
5616 {
5617 yield = string_cat(yield, &size, &ptr, item, cp-(char *)item);
5618 if (*cp++ == ':') /* colon in a non-colon-sep list item, needs doubling */
5619 {
5620 yield = string_cat(yield, &size, &ptr, US"::", 2);
5621 item = cp;
5622 }
5623 else /* sep in item; should already be doubled; emit once */
5624 {
5625 yield = string_cat(yield, &size, &ptr, (uschar *)tok, 1);
5626 if (*cp == sep) cp++;
5627 item = cp;
5628 }
5629 }
5630 }
5631 yield = string_cat(yield, &size, &ptr, item, Ustrlen(item));
5632 }
5633 continue;
5634 }
5635
059ec3d9
PH
5636 /* mask applies a mask to an IP address; for example the result of
5637 ${mask:131.111.10.206/28} is 131.111.10.192/28. */
5638
5639 case EOP_MASK:
5640 {
5641 int count;
5642 uschar *endptr;
5643 int binary[4];
5644 int mask, maskoffset;
5645 int type = string_is_ip_address(sub, &maskoffset);
5646 uschar buffer[64];
5647
5648 if (type == 0)
5649 {
5650 expand_string_message = string_sprintf("\"%s\" is not an IP address",
5651 sub);
5652 goto EXPAND_FAILED;
5653 }
5654
5655 if (maskoffset == 0)
5656 {
5657 expand_string_message = string_sprintf("missing mask value in \"%s\"",
5658 sub);
5659 goto EXPAND_FAILED;
5660 }
5661
5662 mask = Ustrtol(sub + maskoffset + 1, &endptr, 10);
5663
5664 if (*endptr != 0 || mask < 0 || mask > ((type == 4)? 32 : 128))
5665 {
5666 expand_string_message = string_sprintf("mask value too big in \"%s\"",
5667 sub);
5668 goto EXPAND_FAILED;
5669 }
5670
5671 /* Convert the address to binary integer(s) and apply the mask */
5672
5673 sub[maskoffset] = 0;
5674 count = host_aton(sub, binary);
5675 host_mask(count, binary, mask);
5676
5677 /* Convert to masked textual format and add to output. */
5678
5679 yield = string_cat(yield, &size, &ptr, buffer,
6f0c9a4f 5680 host_nmtoa(count, binary, mask, buffer, '.'));
059ec3d9
PH
5681 continue;
5682 }
5683
5684 case EOP_ADDRESS:
5685 case EOP_LOCAL_PART:
5686 case EOP_DOMAIN:
5687 {
5688 uschar *error;
5689 int start, end, domain;
5690 uschar *t = parse_extract_address(sub, &error, &start, &end, &domain,
5691 FALSE);
5692 if (t != NULL)
5693 {
5694 if (c != EOP_DOMAIN)
5695 {
5696 if (c == EOP_LOCAL_PART && domain != 0) end = start + domain - 1;
5697 yield = string_cat(yield, &size, &ptr, sub+start, end-start);
5698 }
5699 else if (domain != 0)
5700 {
5701 domain += start;
5702 yield = string_cat(yield, &size, &ptr, sub+domain, end-domain);
5703 }
5704 }
5705 continue;
5706 }
5707
29f89cad
PH
5708 case EOP_ADDRESSES:
5709 {
5710 uschar outsep[2] = { ':', '\0' };
5711 uschar *address, *error;
5712 int save_ptr = ptr;
5713 int start, end, domain; /* Not really used */
5714
5715 while (isspace(*sub)) sub++;
5716 if (*sub == '>') { *outsep = *++sub; ++sub; }
5717 parse_allow_group = TRUE;
5718
5719 for (;;)
5720 {
5721 uschar *p = parse_find_address_end(sub, FALSE);
5722 uschar saveend = *p;
5723 *p = '\0';
5724 address = parse_extract_address(sub, &error, &start, &end, &domain,
5725 FALSE);
5726 *p = saveend;
5727
5728 /* Add the address to the output list that we are building. This is
5729 done in chunks by searching for the separator character. At the
5730 start, unless we are dealing with the first address of the output
5731 list, add in a space if the new address begins with the separator
5732 character, or is an empty string. */
5733
5734 if (address != NULL)
5735 {
5736 if (ptr != save_ptr && address[0] == *outsep)
5737 yield = string_cat(yield, &size, &ptr, US" ", 1);
5738
5739 for (;;)
5740 {
5741 size_t seglen = Ustrcspn(address, outsep);
5742 yield = string_cat(yield, &size, &ptr, address, seglen + 1);
5743
5744 /* If we got to the end of the string we output one character
5745 too many. */
5746
5747 if (address[seglen] == '\0') { ptr--; break; }
5748 yield = string_cat(yield, &size, &ptr, outsep, 1);
5749 address += seglen + 1;
5750 }
5751
5752 /* Output a separator after the string: we will remove the
5753 redundant final one at the end. */
5754
5755 yield = string_cat(yield, &size, &ptr, outsep, 1);
5756 }
5757
5758 if (saveend == '\0') break;
5759 sub = p + 1;
5760 }
5761
5762 /* If we have generated anything, remove the redundant final
5763 separator. */
5764
5765 if (ptr != save_ptr) ptr--;
5766 parse_allow_group = FALSE;
5767 continue;
5768 }
5769
5770
059ec3d9
PH
5771 /* quote puts a string in quotes if it is empty or contains anything
5772 other than alphamerics, underscore, dot, or hyphen.
5773
5774 quote_local_part puts a string in quotes if RFC 2821/2822 requires it to
5775 be quoted in order to be a valid local part.
5776
5777 In both cases, newlines and carriage returns are converted into \n and \r
5778 respectively */
5779
5780 case EOP_QUOTE:
5781 case EOP_QUOTE_LOCAL_PART:
5782 if (arg == NULL)
5783 {
5784 BOOL needs_quote = (*sub == 0); /* TRUE for empty string */
5785 uschar *t = sub - 1;
5786
5787 if (c == EOP_QUOTE)
5788 {
5789 while (!needs_quote && *(++t) != 0)
5790 needs_quote = !isalnum(*t) && !strchr("_-.", *t);
5791 }
5792 else /* EOP_QUOTE_LOCAL_PART */
5793 {
5794 while (!needs_quote && *(++t) != 0)
5795 needs_quote = !isalnum(*t) &&
5796 strchr("!#$%&'*+-/=?^_`{|}~", *t) == NULL &&
5797 (*t != '.' || t == sub || t[1] == 0);
5798 }
5799
5800 if (needs_quote)
5801 {
5802 yield = string_cat(yield, &size, &ptr, US"\"", 1);
5803 t = sub - 1;
5804 while (*(++t) != 0)
5805 {
5806 if (*t == '\n')
5807 yield = string_cat(yield, &size, &ptr, US"\\n", 2);
5808 else if (*t == '\r')
5809 yield = string_cat(yield, &size, &ptr, US"\\r", 2);
5810 else
5811 {
5812 if (*t == '\\' || *t == '"')
5813 yield = string_cat(yield, &size, &ptr, US"\\", 1);
5814 yield = string_cat(yield, &size, &ptr, t, 1);
5815 }
5816 }
5817 yield = string_cat(yield, &size, &ptr, US"\"", 1);
5818 }
5819 else yield = string_cat(yield, &size, &ptr, sub, Ustrlen(sub));
5820 continue;
5821 }
5822
5823 /* quote_lookuptype does lookup-specific quoting */
5824
5825 else
5826 {
5827 int n;
5828 uschar *opt = Ustrchr(arg, '_');
5829
5830 if (opt != NULL) *opt++ = 0;
5831
5832 n = search_findtype(arg, Ustrlen(arg));
5833 if (n < 0)
5834 {
5835 expand_string_message = search_error_message;
5836 goto EXPAND_FAILED;
5837 }
5838
e6d225ae
DW
5839 if (lookup_list[n]->quote != NULL)
5840 sub = (lookup_list[n]->quote)(sub, opt);
059ec3d9
PH
5841 else if (opt != NULL) sub = NULL;
5842
5843 if (sub == NULL)
5844 {
5845 expand_string_message = string_sprintf(
5846 "\"%s\" unrecognized after \"${quote_%s\"",
5847 opt, arg);
5848 goto EXPAND_FAILED;
5849 }
5850
5851 yield = string_cat(yield, &size, &ptr, sub, Ustrlen(sub));
5852 continue;
5853 }
5854
5855 /* rx quote sticks in \ before any non-alphameric character so that
5856 the insertion works in a regular expression. */
5857
5858 case EOP_RXQUOTE:
5859 {
5860 uschar *t = sub - 1;
5861 while (*(++t) != 0)
5862 {
5863 if (!isalnum(*t))
5864 yield = string_cat(yield, &size, &ptr, US"\\", 1);
5865 yield = string_cat(yield, &size, &ptr, t, 1);
5866 }
5867 continue;
5868 }
5869
5870 /* RFC 2047 encodes, assuming headers_charset (default ISO 8859-1) as
5871 prescribed by the RFC, if there are characters that need to be encoded */
5872
5873 case EOP_RFC2047:
5874 {
14702f5b 5875 uschar buffer[2048];
059ec3d9 5876 uschar *string = parse_quote_2047(sub, Ustrlen(sub), headers_charset,
46218253 5877 buffer, sizeof(buffer), FALSE);
059ec3d9
PH
5878 yield = string_cat(yield, &size, &ptr, string, Ustrlen(string));
5879 continue;
5880 }
5881
9c57cbc0
PH
5882 /* RFC 2047 decode */
5883
5884 case EOP_RFC2047D:
5885 {
5886 int len;
5887 uschar *error;
5888 uschar *decoded = rfc2047_decode(sub, check_rfc2047_length,
5889 headers_charset, '?', &len, &error);
5890 if (error != NULL)
5891 {
5892 expand_string_message = error;
5893 goto EXPAND_FAILED;
5894 }
5895 yield = string_cat(yield, &size, &ptr, decoded, len);
5896 continue;
5897 }
5898
059ec3d9
PH
5899 /* from_utf8 converts UTF-8 to 8859-1, turning non-existent chars into
5900 underscores */
5901
5902 case EOP_FROM_UTF8:
5903 {
5904 while (*sub != 0)
5905 {
5906 int c;
5907 uschar buff[4];
5908 GETUTF8INC(c, sub);
5909 if (c > 255) c = '_';
5910 buff[0] = c;
5911 yield = string_cat(yield, &size, &ptr, buff, 1);
5912 }
5913 continue;
5914 }
5915
5916 /* escape turns all non-printing characters into escape sequences. */
5917
5918 case EOP_ESCAPE:
5919 {
5920 uschar *t = string_printing(sub);
5921 yield = string_cat(yield, &size, &ptr, t, Ustrlen(t));
5922 continue;
5923 }
5924
5925 /* Handle numeric expression evaluation */
5926
5927 case EOP_EVAL:
5928 case EOP_EVAL10:
5929 {
5930 uschar *save_sub = sub;
5931 uschar *error = NULL;
97d17305 5932 int_eximarith_t n = eval_expr(&sub, (c == EOP_EVAL10), &error, FALSE);
059ec3d9
PH
5933 if (error != NULL)
5934 {
5935 expand_string_message = string_sprintf("error in expression "
5936 "evaluation: %s (after processing \"%.*s\")", error, sub-save_sub,
5937 save_sub);
5938 goto EXPAND_FAILED;
5939 }
97d17305 5940 sprintf(CS var_buffer, PR_EXIM_ARITH, n);
059ec3d9
PH
5941 yield = string_cat(yield, &size, &ptr, var_buffer, Ustrlen(var_buffer));
5942 continue;
5943 }
5944
5945 /* Handle time period formating */
5946
f90d018c
PH
5947 case EOP_TIME_EVAL:
5948 {
5949 int n = readconf_readtime(sub, 0, FALSE);
5950 if (n < 0)
5951 {
5952 expand_string_message = string_sprintf("string \"%s\" is not an "
5953 "Exim time interval in \"%s\" operator", sub, name);
5954 goto EXPAND_FAILED;
5955 }
5956 sprintf(CS var_buffer, "%d", n);
5957 yield = string_cat(yield, &size, &ptr, var_buffer, Ustrlen(var_buffer));
5958 continue;
5959 }
5960
059ec3d9
PH
5961 case EOP_TIME_INTERVAL:
5962 {
5963 int n;
5964 uschar *t = read_number(&n, sub);
5965 if (*t != 0) /* Not A Number*/
5966 {
5967 expand_string_message = string_sprintf("string \"%s\" is not a "
5968 "positive number in \"%s\" operator", sub, name);
5969 goto EXPAND_FAILED;
5970 }
5971 t = readconf_printtime(n);
5972 yield = string_cat(yield, &size, &ptr, t, Ustrlen(t));
5973 continue;
5974 }
5975
5976 /* Convert string to base64 encoding */
5977
5978 case EOP_STR2B64:
5979 {
5980 uschar *encstr = auth_b64encode(sub, Ustrlen(sub));
5981 yield = string_cat(yield, &size, &ptr, encstr, Ustrlen(encstr));
5982 continue;
5983 }
5984
5985 /* strlen returns the length of the string */
5986
5987 case EOP_STRLEN:
5988 {
5989 uschar buff[24];
5990 (void)sprintf(CS buff, "%d", Ustrlen(sub));
5991 yield = string_cat(yield, &size, &ptr, buff, Ustrlen(buff));
5992 continue;
5993 }
5994
5995 /* length_n or l_n takes just the first n characters or the whole string,
5996 whichever is the shorter;
5997
5998 substr_m_n, and s_m_n take n characters from offset m; negative m take
5999 from the end; l_n is synonymous with s_0_n. If n is omitted in substr it
6000 takes the rest, either to the right or to the left.
6001
6002 hash_n or h_n makes a hash of length n from the string, yielding n
6003 characters from the set a-z; hash_n_m makes a hash of length n, but
6004 uses m characters from the set a-zA-Z0-9.
6005
6006 nhash_n returns a single number between 0 and n-1 (in text form), while
6007 nhash_n_m returns a div/mod hash as two numbers "a/b". The first lies
6008 between 0 and n-1 and the second between 0 and m-1. */
6009
6010 case EOP_LENGTH:
6011 case EOP_L:
6012 case EOP_SUBSTR:
6013 case EOP_S:
6014 case EOP_HASH:
6015 case EOP_H:
6016 case EOP_NHASH:
6017 case EOP_NH:
6018 {
6019 int sign = 1;
6020 int value1 = 0;
6021 int value2 = -1;
6022 int *pn;
6023 int len;
6024 uschar *ret;
6025
6026 if (arg == NULL)
6027 {
6028 expand_string_message = string_sprintf("missing values after %s",
6029 name);
6030 goto EXPAND_FAILED;
6031 }
6032
6033 /* "length" has only one argument, effectively being synonymous with
6034 substr_0_n. */
6035
6036 if (c == EOP_LENGTH || c == EOP_L)
6037 {
6038 pn = &value2;
6039 value2 = 0;
6040 }
6041
6042 /* The others have one or two arguments; for "substr" the first may be
6043 negative. The second being negative means "not supplied". */
6044
6045 else
6046 {
6047 pn = &value1;
6048 if (name[0] == 's' && *arg == '-') { sign = -1; arg++; }
6049 }
6050
6051 /* Read up to two numbers, separated by underscores */
6052
6053 ret = arg;
6054 while (*arg != 0)
6055 {
6056 if (arg != ret && *arg == '_' && pn == &value1)
6057 {
6058 pn = &value2;
6059 value2 = 0;
6060 if (arg[1] != 0) arg++;
6061 }
6062 else if (!isdigit(*arg))
6063 {
6064 expand_string_message =
6065 string_sprintf("non-digit after underscore in \"%s\"", name);
6066 goto EXPAND_FAILED;
6067 }
6068 else *pn = (*pn)*10 + *arg++ - '0';
6069 }
6070 value1 *= sign;
6071
6072 /* Perform the required operation */
6073
6074 ret =
6075 (c == EOP_HASH || c == EOP_H)?
6076 compute_hash(sub, value1, value2, &len) :
6077 (c == EOP_NHASH || c == EOP_NH)?
6078 compute_nhash(sub, value1, value2, &len) :
6079 extract_substr(sub, value1, value2, &len);
6080
6081 if (ret == NULL) goto EXPAND_FAILED;
6082 yield = string_cat(yield, &size, &ptr, ret, len);
6083 continue;
6084 }
6085
6086 /* Stat a path */
6087
6088 case EOP_STAT:
6089 {
6090 uschar *s;
6091 uschar smode[12];
6092 uschar **modetable[3];
6093 int i;
6094 mode_t mode;
6095 struct stat st;
6096
254e032f
PH
6097 if ((expand_forbid & RDO_EXISTS) != 0)
6098 {
6099 expand_string_message = US"Use of the stat() expansion is not permitted";
6100 goto EXPAND_FAILED;
6101 }
6102
059ec3d9
PH
6103 if (stat(CS sub, &st) < 0)
6104 {
6105 expand_string_message = string_sprintf("stat(%s) failed: %s",
6106 sub, strerror(errno));
6107 goto EXPAND_FAILED;
6108 }
6109 mode = st.st_mode;
6110 switch (mode & S_IFMT)
6111 {
6112 case S_IFIFO: smode[0] = 'p'; break;
6113 case S_IFCHR: smode[0] = 'c'; break;
6114 case S_IFDIR: smode[0] = 'd'; break;
6115 case S_IFBLK: smode[0] = 'b'; break;
6116 case S_IFREG: smode[0] = '-'; break;
6117 default: smode[0] = '?'; break;
6118 }
6119
6120 modetable[0] = ((mode & 01000) == 0)? mtable_normal : mtable_sticky;
6121 modetable[1] = ((mode & 02000) == 0)? mtable_normal : mtable_setid;
6122 modetable[2] = ((mode & 04000) == 0)? mtable_normal : mtable_setid;
6123
6124 for (i = 0; i < 3; i++)
6125 {
6126 memcpy(CS(smode + 7 - i*3), CS(modetable[i][mode & 7]), 3);
6127 mode >>= 3;
6128 }
6129
6130 smode[10] = 0;
6131 s = string_sprintf("mode=%04lo smode=%s inode=%ld device=%ld links=%ld "
b1c749bb 6132 "uid=%ld gid=%ld size=" OFF_T_FMT " atime=%ld mtime=%ld ctime=%ld",
059ec3d9
PH
6133 (long)(st.st_mode & 077777), smode, (long)st.st_ino,
6134 (long)st.st_dev, (long)st.st_nlink, (long)st.st_uid,
b1c749bb 6135 (long)st.st_gid, st.st_size, (long)st.st_atime,
059ec3d9
PH
6136 (long)st.st_mtime, (long)st.st_ctime);
6137 yield = string_cat(yield, &size, &ptr, s, Ustrlen(s));
6138 continue;
6139 }
6140
17c76198 6141 /* vaguely random number less than N */
9e3331ea
TK
6142
6143 case EOP_RANDINT:
6144 {
97d17305 6145 int_eximarith_t max;
9e3331ea
TK
6146 uschar *s;
6147
6148 max = expand_string_integer(sub, TRUE);
6149 if (expand_string_message != NULL)
6150 goto EXPAND_FAILED;
17c76198 6151 s = string_sprintf("%d", vaguely_random_number((int)max));
9e3331ea
TK
6152 yield = string_cat(yield, &size, &ptr, s, Ustrlen(s));
6153 continue;
6154 }
6155
83e029d5
PP
6156 /* Reverse IP, including IPv6 to dotted-nibble */
6157
6158 case EOP_REVERSE_IP:
6159 {
6160 int family, maskptr;
6161 uschar reversed[128];
6162
6163 family = string_is_ip_address(sub, &maskptr);
6164 if (family == 0)
6165 {
6166 expand_string_message = string_sprintf(
6167 "reverse_ip() not given an IP address [%s]", sub);
6168 goto EXPAND_FAILED;
6169 }
6170 invert_address(reversed, sub);
6171 yield = string_cat(yield, &size, &ptr, reversed, Ustrlen(reversed));
6172 continue;
6173 }
6174
059ec3d9
PH
6175 /* Unknown operator */
6176
6177 default:
6178 expand_string_message =
6179 string_sprintf("unknown expansion operator \"%s\"", name);
6180 goto EXPAND_FAILED;
6181 }
6182 }
6183
6184 /* Handle a plain name. If this is the first thing in the expansion, release
6185 the pre-allocated buffer. If the result data is known to be in a new buffer,
6186 newsize will be set to the size of that buffer, and we can just point at that
6187 store instead of copying. Many expansion strings contain just one reference,
6188 so this is a useful optimization, especially for humungous headers
6189 ($message_headers). */
6190
6191 if (*s++ == '}')
6192 {
6193 int len;
6194 int newsize = 0;
6195 if (ptr == 0)
6196 {
d6b4d938 6197 if (resetok) store_reset(yield);
059ec3d9
PH
6198 yield = NULL;
6199 size = 0;
6200 }
6201 value = find_variable(name, FALSE, skipping, &newsize);
6202 if (value == NULL)
6203 {
6204 expand_string_message =
6205 string_sprintf("unknown variable in \"${%s}\"", name);
641cb756 6206 check_variable_error_message(name);
059ec3d9
PH
6207 goto EXPAND_FAILED;
6208 }
6209 len = Ustrlen(value);
6210 if (yield == NULL && newsize != 0)
6211 {
6212 yield = value;
6213 size = newsize;
6214 ptr = len;
6215 }
6216 else yield = string_cat(yield, &size, &ptr, value, len);
6217 continue;
6218 }
6219
6220 /* Else there's something wrong */
6221
6222 expand_string_message =
6223 string_sprintf("\"${%s\" is not a known operator (or a } is missing "
6224 "in a variable reference)", name);
6225 goto EXPAND_FAILED;
6226 }
6227
6228/* If we hit the end of the string when ket_ends is set, there is a missing
6229terminating brace. */
6230
6231if (ket_ends && *s == 0)
6232 {
6233 expand_string_message = malformed_header?
6234 US"missing } at end of string - could be header name not terminated by colon"
6235 :
6236 US"missing } at end of string";
6237 goto EXPAND_FAILED;
6238 }
6239
6240/* Expansion succeeded; yield may still be NULL here if nothing was actually
6241added to the string. If so, set up an empty string. Add a terminating zero. If
6242left != NULL, return a pointer to the terminator. */
6243
6244if (yield == NULL) yield = store_get(1);
6245yield[ptr] = 0;
6246if (left != NULL) *left = s;
6247
6248/* Any stacking store that was used above the final string is no longer needed.
6249In many cases the final string will be the first one that was got and so there
6250will be optimal store usage. */
6251
d6b4d938 6252if (resetok) store_reset(yield + ptr + 1);
059ec3d9
PH
6253DEBUG(D_expand)
6254 {
6255 debug_printf("expanding: %.*s\n result: %s\n", (int)(s - string), string,
6256 yield);
6257 if (skipping) debug_printf("skipping: result is not used\n");
6258 }
6259return yield;
6260
6261/* This is the failure exit: easiest to program with a goto. We still need
6262to update the pointer to the terminator, for cases of nested calls with "fail".
6263*/
6264
6265EXPAND_FAILED_CURLY:
6266expand_string_message = malformed_header?
6267 US"missing or misplaced { or } - could be header name not terminated by colon"
6268 :
6269 US"missing or misplaced { or }";
6270
6271/* At one point, Exim reset the store to yield (if yield was not NULL), but
6272that is a bad idea, because expand_string_message is in dynamic store. */
6273
6274EXPAND_FAILED:
6275if (left != NULL) *left = s;
6276DEBUG(D_expand)
6277 {
6278 debug_printf("failed to expand: %s\n", string);
6279 debug_printf(" error message: %s\n", expand_string_message);
6280 if (expand_string_forcedfail) debug_printf("failure was forced\n");
6281 }
6282return NULL;
6283}
6284
6285
6286/* This is the external function call. Do a quick check for any expansion
6287metacharacters, and if there are none, just return the input string.
6288
6289Argument: the string to be expanded
6290Returns: the expanded string, or NULL if expansion failed; if failure was
6291 due to a lookup deferring, search_find_defer will be TRUE
6292*/
6293
6294uschar *
6295expand_string(uschar *string)
6296{
6297search_find_defer = FALSE;
6298malformed_header = FALSE;
6299return (Ustrpbrk(string, "$\\") == NULL)? string :
da6dbe26 6300 expand_string_internal(string, FALSE, NULL, FALSE, TRUE);
059ec3d9
PH
6301}
6302
6303
6304
6305/*************************************************
6306* Expand and copy *
6307*************************************************/
6308
6309/* Now and again we want to expand a string and be sure that the result is in a
6310new bit of store. This function does that.
6311
6312Argument: the string to be expanded
6313Returns: the expanded string, always in a new bit of store, or NULL
6314*/
6315
6316uschar *
6317expand_string_copy(uschar *string)
6318{
6319uschar *yield = expand_string(string);
6320if (yield == string) yield = string_copy(string);
6321return yield;
6322}
6323
6324
6325
6326/*************************************************
6327* Expand and interpret as an integer *
6328*************************************************/
6329
6330/* Expand a string, and convert the result into an integer.
6331
d45b1de8
PH
6332Arguments:
6333 string the string to be expanded
6334 isplus TRUE if a non-negative number is expected
059ec3d9
PH
6335
6336Returns: the integer value, or
6337 -1 for an expansion error ) in both cases, message in
6338 -2 for an integer interpretation error ) expand_string_message
d45b1de8 6339 expand_string_message is set NULL for an OK integer
059ec3d9
PH
6340*/
6341
97d17305 6342int_eximarith_t
d45b1de8 6343expand_string_integer(uschar *string, BOOL isplus)
059ec3d9 6344{
97d17305 6345int_eximarith_t value;
059ec3d9
PH
6346uschar *s = expand_string(string);
6347uschar *msg = US"invalid integer \"%s\"";
6348uschar *endptr;
6349
d45b1de8
PH
6350/* If expansion failed, expand_string_message will be set. */
6351
059ec3d9
PH
6352if (s == NULL) return -1;
6353
6354/* On an overflow, strtol() returns LONG_MAX or LONG_MIN, and sets errno
6355to ERANGE. When there isn't an overflow, errno is not changed, at least on some
6356systems, so we set it zero ourselves. */
6357
6358errno = 0;
d45b1de8 6359expand_string_message = NULL; /* Indicates no error */
b52bc06e
NM
6360
6361/* Before Exim 4.64, strings consisting entirely of whitespace compared
6362equal to 0. Unfortunately, people actually relied upon that, so preserve
6363the behaviour explicitly. Stripping leading whitespace is a harmless
6364noop change since strtol skips it anyway (provided that there is a number
6365to find at all). */
6366if (isspace(*s))
6367 {
6368 while (isspace(*s)) ++s;
6369 if (*s == '\0')
6370 {
6371 DEBUG(D_expand)
6372 debug_printf("treating blank string as number 0\n");
6373 return 0;
6374 }
6375 }
6376
aa7c82b2 6377value = strtoll(CS s, CSS &endptr, 10);
059ec3d9
PH
6378
6379if (endptr == s)
6380 {
6381 msg = US"integer expected but \"%s\" found";
6382 }
d45b1de8
PH
6383else if (value < 0 && isplus)
6384 {
6385 msg = US"non-negative integer expected but \"%s\" found";
6386 }
059ec3d9
PH
6387else
6388 {
4eb9d6ef 6389 switch (tolower(*endptr))
059ec3d9 6390 {
4eb9d6ef
JH
6391 default:
6392 break;
6393 case 'k':
6394 if (value > LLONG_MAX/1024 || value < LLONG_MIN/1024) errno = ERANGE;
aa7c82b2 6395 else value *= 1024;
4eb9d6ef
JH
6396 endptr++;
6397 break;
6398 case 'm':
6399 if (value > LLONG_MAX/(1024*1024) || value < LLONG_MIN/(1024*1024)) errno = ERANGE;
6400 else value *= 1024*1024;
6401 endptr++;
6402 break;
6403 case 'g':
6404 if (value > LLONG_MAX/(1024*1024*1024) || value < LLONG_MIN/(1024*1024*1024)) errno = ERANGE;
6405 else value *= 1024*1024*1024;
6406 endptr++;
6407 break;
059ec3d9
PH
6408 }
6409 if (errno == ERANGE)
6410 msg = US"absolute value of integer \"%s\" is too large (overflow)";
6411 else
6412 {
6413 while (isspace(*endptr)) endptr++;
6414 if (*endptr == 0) return (int)value;
6415 }
6416 }
6417
6418expand_string_message = string_sprintf(CS msg, s);
6419return -2;
6420}
6421
059ec3d9
PH
6422
6423/*************************************************
6424**************************************************
6425* Stand-alone test program *
6426**************************************************
6427*************************************************/
6428
6429#ifdef STAND_ALONE
6430
6431
6432BOOL
6433regex_match_and_setup(const pcre *re, uschar *subject, int options, int setup)
6434{
6435int ovector[3*(EXPAND_MAXN+1)];
6436int n = pcre_exec(re, NULL, subject, Ustrlen(subject), 0, PCRE_EOPT|options,
6437 ovector, sizeof(ovector)/sizeof(int));
6438BOOL yield = n >= 0;
6439if (n == 0) n = EXPAND_MAXN + 1;
6440if (yield)
6441 {
6442 int nn;
6443 expand_nmax = (setup < 0)? 0 : setup + 1;
6444 for (nn = (setup < 0)? 0 : 2; nn < n*2; nn += 2)
6445 {
6446 expand_nstring[expand_nmax] = subject + ovector[nn];
6447 expand_nlength[expand_nmax++] = ovector[nn+1] - ovector[nn];
6448 }
6449 expand_nmax--;
6450 }
6451return yield;
6452}
6453
6454
6455int main(int argc, uschar **argv)
6456{
6457int i;
6458uschar buffer[1024];
6459
6460debug_selector = D_v;
6461debug_file = stderr;
6462debug_fd = fileno(debug_file);
6463big_buffer = malloc(big_buffer_size);
6464
6465for (i = 1; i < argc; i++)
6466 {
6467 if (argv[i][0] == '+')
6468 {
6469 debug_trace_memory = 2;
6470 argv[i]++;
6471 }
6472 if (isdigit(argv[i][0]))
6473 debug_selector = Ustrtol(argv[i], NULL, 0);
6474 else
6475 if (Ustrspn(argv[i], "abcdefghijklmnopqrtsuvwxyz0123456789-.:/") ==
6476 Ustrlen(argv[i]))
6477 {
6478 #ifdef LOOKUP_LDAP
6479 eldap_default_servers = argv[i];
6480 #endif
6481 #ifdef LOOKUP_MYSQL
6482 mysql_servers = argv[i];
6483 #endif
6484 #ifdef LOOKUP_PGSQL
6485 pgsql_servers = argv[i];
6486 #endif
6487 }
6488 #ifdef EXIM_PERL
6489 else opt_perl_startup = argv[i];
6490 #endif
6491 }
6492
6493printf("Testing string expansion: debug_level = %d\n\n", debug_level);
6494
6495expand_nstring[1] = US"string 1....";
6496expand_nlength[1] = 8;
6497expand_nmax = 1;
6498
6499#ifdef EXIM_PERL
6500if (opt_perl_startup != NULL)
6501 {
6502 uschar *errstr;
6503 printf("Starting Perl interpreter\n");
6504 errstr = init_perl(opt_perl_startup);
6505 if (errstr != NULL)
6506 {
6507 printf("** error in perl_startup code: %s\n", errstr);
6508 return EXIT_FAILURE;
6509 }
6510 }
6511#endif /* EXIM_PERL */
6512
6513while (fgets(buffer, sizeof(buffer), stdin) != NULL)
6514 {
6515 void *reset_point = store_get(0);
6516 uschar *yield = expand_string(buffer);
6517 if (yield != NULL)
6518 {
6519 printf("%s\n", yield);
6520 store_reset(reset_point);
6521 }
6522 else
6523 {
6524 if (search_find_defer) printf("search_find deferred\n");
6525 printf("Failed: %s\n", expand_string_message);
6526 if (expand_string_forcedfail) printf("Forced failure\n");
6527 printf("\n");
6528 }
6529 }
6530
6531search_tidyup();
6532
6533return 0;
6534}
6535
6536#endif
6537
6538/* End of expand.c */