source: UsbWattMeter/trunk/curl-7.47.1/lib/smtp.c@ 164

Last change on this file since 164 was 164, checked in by coas-nagasima, 8 years ago

TOPPERS/ECNLサンプルアプリ「USB充電器電力計」を追加

  • Property svn:eol-style set to native
  • Property svn:keywords set to Id
  • Property svn:mime-type set to text/x-csrc
File size: 47.2 KB
Line 
1/***************************************************************************
2 * _ _ ____ _
3 * Project ___| | | | _ \| |
4 * / __| | | | |_) | |
5 * | (__| |_| | _ <| |___
6 * \___|\___/|_| \_\_____|
7 *
8 * Copyright (C) 1998 - 2015, Daniel Stenberg, <daniel@haxx.se>, et al.
9 *
10 * This software is licensed as described in the file COPYING, which
11 * you should have received as part of this distribution. The terms
12 * are also available at https://curl.haxx.se/docs/copyright.html.
13 *
14 * You may opt to use, copy, modify, merge, publish, distribute and/or sell
15 * copies of the Software, and permit persons to whom the Software is
16 * furnished to do so, under the terms of the COPYING file.
17 *
18 * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
19 * KIND, either express or implied.
20 *
21 * RFC1870 SMTP Service Extension for Message Size
22 * RFC2195 CRAM-MD5 authentication
23 * RFC2831 DIGEST-MD5 authentication
24 * RFC3207 SMTP over TLS
25 * RFC4422 Simple Authentication and Security Layer (SASL)
26 * RFC4616 PLAIN authentication
27 * RFC4752 The Kerberos V5 ("GSSAPI") SASL Mechanism
28 * RFC4954 SMTP Authentication
29 * RFC5321 SMTP protocol
30 * RFC6749 OAuth 2.0 Authorization Framework
31 * Draft SMTP URL Interface <draft-earhart-url-smtp-00.txt>
32 * Draft LOGIN SASL Mechanism <draft-murchison-sasl-login-00.txt>
33 *
34 ***************************************************************************/
35
36#include "curl_setup.h"
37
38#ifndef CURL_DISABLE_SMTP
39
40#ifdef HAVE_NETINET_IN_H
41#include <netinet/in.h>
42#endif
43#ifdef HAVE_ARPA_INET_H
44#include <arpa/inet.h>
45#endif
46#ifdef HAVE_UTSNAME_H
47#include <sys/utsname.h>
48#endif
49#ifdef HAVE_NETDB_H
50#include <netdb.h>
51#endif
52#ifdef __VMS
53#include <in.h>
54#include <inet.h>
55#endif
56
57#if (defined(NETWARE) && defined(__NOVELL_LIBC__))
58#undef in_addr_t
59#define in_addr_t unsigned long
60#endif
61
62#include <curl/curl.h>
63#include "urldata.h"
64#include "sendf.h"
65#include "hostip.h"
66#include "progress.h"
67#include "transfer.h"
68#include "escape.h"
69#include "http.h" /* for HTTP proxy tunnel stuff */
70#include "socks.h"
71#include "smtp.h"
72
73#include "strtoofft.h"
74#include "strequal.h"
75#include "vtls/vtls.h"
76#include "connect.h"
77#include "strerror.h"
78#include "select.h"
79#include "multiif.h"
80#include "url.h"
81#include "rawstr.h"
82#include "curl_gethostname.h"
83#include "curl_sasl.h"
84#include "warnless.h"
85#include "curl_printf.h"
86#include "curl_memory.h"
87/* The last #include file should be: */
88#include "memdebug.h"
89
90/* Local API functions */
91static CURLcode smtp_regular_transfer(struct connectdata *conn, bool *done);
92static CURLcode smtp_do(struct connectdata *conn, bool *done);
93static CURLcode smtp_done(struct connectdata *conn, CURLcode status,
94 bool premature);
95static CURLcode smtp_connect(struct connectdata *conn, bool *done);
96static CURLcode smtp_disconnect(struct connectdata *conn, bool dead);
97static CURLcode smtp_multi_statemach(struct connectdata *conn, bool *done);
98static int smtp_getsock(struct connectdata *conn, curl_socket_t *socks,
99 int numsocks);
100static CURLcode smtp_doing(struct connectdata *conn, bool *dophase_done);
101static CURLcode smtp_setup_connection(struct connectdata *conn);
102static CURLcode smtp_parse_url_options(struct connectdata *conn);
103static CURLcode smtp_parse_url_path(struct connectdata *conn);
104static CURLcode smtp_parse_custom_request(struct connectdata *conn);
105static CURLcode smtp_perform_auth(struct connectdata *conn, const char *mech,
106 const char *initresp);
107static CURLcode smtp_continue_auth(struct connectdata *conn, const char *resp);
108static void smtp_get_message(char *buffer, char** outptr);
109
110/*
111 * SMTP protocol handler.
112 */
113
114const struct Curl_handler Curl_handler_smtp = {
115 "SMTP", /* scheme */
116 smtp_setup_connection, /* setup_connection */
117 smtp_do, /* do_it */
118 smtp_done, /* done */
119 ZERO_NULL, /* do_more */
120 smtp_connect, /* connect_it */
121 smtp_multi_statemach, /* connecting */
122 smtp_doing, /* doing */
123 smtp_getsock, /* proto_getsock */
124 smtp_getsock, /* doing_getsock */
125 ZERO_NULL, /* domore_getsock */
126 ZERO_NULL, /* perform_getsock */
127 smtp_disconnect, /* disconnect */
128 ZERO_NULL, /* readwrite */
129 PORT_SMTP, /* defport */
130 CURLPROTO_SMTP, /* protocol */
131 PROTOPT_CLOSEACTION | PROTOPT_NOURLQUERY /* flags */
132};
133
134#ifdef USE_SSL
135/*
136 * SMTPS protocol handler.
137 */
138
139const struct Curl_handler Curl_handler_smtps = {
140 "SMTPS", /* scheme */
141 smtp_setup_connection, /* setup_connection */
142 smtp_do, /* do_it */
143 smtp_done, /* done */
144 ZERO_NULL, /* do_more */
145 smtp_connect, /* connect_it */
146 smtp_multi_statemach, /* connecting */
147 smtp_doing, /* doing */
148 smtp_getsock, /* proto_getsock */
149 smtp_getsock, /* doing_getsock */
150 ZERO_NULL, /* domore_getsock */
151 ZERO_NULL, /* perform_getsock */
152 smtp_disconnect, /* disconnect */
153 ZERO_NULL, /* readwrite */
154 PORT_SMTPS, /* defport */
155 CURLPROTO_SMTPS, /* protocol */
156 PROTOPT_CLOSEACTION | PROTOPT_SSL
157 | PROTOPT_NOURLQUERY /* flags */
158};
159#endif
160
161#ifndef CURL_DISABLE_HTTP
162/*
163 * HTTP-proxyed SMTP protocol handler.
164 */
165
166static const struct Curl_handler Curl_handler_smtp_proxy = {
167 "SMTP", /* scheme */
168 Curl_http_setup_conn, /* setup_connection */
169 Curl_http, /* do_it */
170 Curl_http_done, /* done */
171 ZERO_NULL, /* do_more */
172 ZERO_NULL, /* connect_it */
173 ZERO_NULL, /* connecting */
174 ZERO_NULL, /* doing */
175 ZERO_NULL, /* proto_getsock */
176 ZERO_NULL, /* doing_getsock */
177 ZERO_NULL, /* domore_getsock */
178 ZERO_NULL, /* perform_getsock */
179 ZERO_NULL, /* disconnect */
180 ZERO_NULL, /* readwrite */
181 PORT_SMTP, /* defport */
182 CURLPROTO_HTTP, /* protocol */
183 PROTOPT_NONE /* flags */
184};
185
186#ifdef USE_SSL
187/*
188 * HTTP-proxyed SMTPS protocol handler.
189 */
190
191static const struct Curl_handler Curl_handler_smtps_proxy = {
192 "SMTPS", /* scheme */
193 Curl_http_setup_conn, /* setup_connection */
194 Curl_http, /* do_it */
195 Curl_http_done, /* done */
196 ZERO_NULL, /* do_more */
197 ZERO_NULL, /* connect_it */
198 ZERO_NULL, /* connecting */
199 ZERO_NULL, /* doing */
200 ZERO_NULL, /* proto_getsock */
201 ZERO_NULL, /* doing_getsock */
202 ZERO_NULL, /* domore_getsock */
203 ZERO_NULL, /* perform_getsock */
204 ZERO_NULL, /* disconnect */
205 ZERO_NULL, /* readwrite */
206 PORT_SMTPS, /* defport */
207 CURLPROTO_HTTP, /* protocol */
208 PROTOPT_NONE /* flags */
209};
210#endif
211#endif
212
213/* SASL parameters for the smtp protocol */
214static const struct SASLproto saslsmtp = {
215 "smtp", /* The service name */
216 334, /* Code received when continuation is expected */
217 235, /* Code to receive upon authentication success */
218 512 - 8, /* Maximum initial response length (no max) */
219 smtp_perform_auth, /* Send authentication command */
220 smtp_continue_auth, /* Send authentication continuation */
221 smtp_get_message /* Get SASL response message */
222};
223
224#ifdef USE_SSL
225static void smtp_to_smtps(struct connectdata *conn)
226{
227 conn->handler = &Curl_handler_smtps;
228}
229#else
230#define smtp_to_smtps(x) Curl_nop_stmt
231#endif
232
233/***********************************************************************
234 *
235 * smtp_endofresp()
236 *
237 * Checks for an ending SMTP status code at the start of the given string, but
238 * also detects various capabilities from the EHLO response including the
239 * supported authentication mechanisms.
240 */
241static bool smtp_endofresp(struct connectdata *conn, char *line, size_t len,
242 int *resp)
243{
244 struct smtp_conn *smtpc = &conn->proto.smtpc;
245 bool result = FALSE;
246
247 /* Nothing for us */
248 if(len < 4 || !ISDIGIT(line[0]) || !ISDIGIT(line[1]) || !ISDIGIT(line[2]))
249 return FALSE;
250
251 /* Do we have a command response? This should be the response code followed
252 by a space and optionally some text as per RFC-5321 and as outlined in
253 Section 4. Examples of RFC-4954 but some e-mail servers ignore this and
254 only send the response code instead as per Section 4.2. */
255 if(line[3] == ' ' || len == 5) {
256 result = TRUE;
257 *resp = curlx_sltosi(strtol(line, NULL, 10));
258
259 /* Make sure real server never sends internal value */
260 if(*resp == 1)
261 *resp = 0;
262 }
263 /* Do we have a multiline (continuation) response? */
264 else if(line[3] == '-' &&
265 (smtpc->state == SMTP_EHLO || smtpc->state == SMTP_COMMAND)) {
266 result = TRUE;
267 *resp = 1; /* Internal response code */
268 }
269
270 return result;
271}
272
273/***********************************************************************
274 *
275 * smtp_get_message()
276 *
277 * Gets the authentication message from the response buffer.
278 */
279static void smtp_get_message(char *buffer, char** outptr)
280{
281 size_t len = 0;
282 char* message = NULL;
283
284 /* Find the start of the message */
285 for(message = buffer + 4; *message == ' ' || *message == '\t'; message++)
286 ;
287
288 /* Find the end of the message */
289 for(len = strlen(message); len--;)
290 if(message[len] != '\r' && message[len] != '\n' && message[len] != ' ' &&
291 message[len] != '\t')
292 break;
293
294 /* Terminate the message */
295 if(++len) {
296 message[len] = '\0';
297 }
298
299 *outptr = message;
300}
301
302/***********************************************************************
303 *
304 * state()
305 *
306 * This is the ONLY way to change SMTP state!
307 */
308static void state(struct connectdata *conn, smtpstate newstate)
309{
310 struct smtp_conn *smtpc = &conn->proto.smtpc;
311#if defined(DEBUGBUILD) && !defined(CURL_DISABLE_VERBOSE_STRINGS)
312 /* for debug purposes */
313 static const char * const names[] = {
314 "STOP",
315 "SERVERGREET",
316 "EHLO",
317 "HELO",
318 "STARTTLS",
319 "UPGRADETLS",
320 "AUTH",
321 "COMMAND",
322 "MAIL",
323 "RCPT",
324 "DATA",
325 "POSTDATA",
326 "QUIT",
327 /* LAST */
328 };
329
330 if(smtpc->state != newstate)
331 infof(conn->data, "SMTP %p state change from %s to %s\n",
332 (void *)smtpc, names[smtpc->state], names[newstate]);
333#endif
334
335 smtpc->state = newstate;
336}
337
338/***********************************************************************
339 *
340 * smtp_perform_ehlo()
341 *
342 * Sends the EHLO command to not only initialise communication with the ESMTP
343 * server but to also obtain a list of server side supported capabilities.
344 */
345static CURLcode smtp_perform_ehlo(struct connectdata *conn)
346{
347 CURLcode result = CURLE_OK;
348 struct smtp_conn *smtpc = &conn->proto.smtpc;
349
350 smtpc->sasl.authmechs = SASL_AUTH_NONE; /* No known auth. mechanism yet */
351 smtpc->sasl.authused = SASL_AUTH_NONE; /* Clear the authentication mechanism
352 used for esmtp connections */
353 smtpc->tls_supported = FALSE; /* Clear the TLS capability */
354 smtpc->auth_supported = FALSE; /* Clear the AUTH capability */
355
356 /* Send the EHLO command */
357 result = Curl_pp_sendf(&smtpc->pp, "EHLO %s", smtpc->domain);
358
359 if(!result)
360 state(conn, SMTP_EHLO);
361
362 return result;
363}
364
365/***********************************************************************
366 *
367 * smtp_perform_helo()
368 *
369 * Sends the HELO command to initialise communication with the SMTP server.
370 */
371static CURLcode smtp_perform_helo(struct connectdata *conn)
372{
373 CURLcode result = CURLE_OK;
374 struct smtp_conn *smtpc = &conn->proto.smtpc;
375
376 smtpc->sasl.authused = SASL_AUTH_NONE; /* No authentication mechanism used
377 in smtp connections */
378
379 /* Send the HELO command */
380 result = Curl_pp_sendf(&smtpc->pp, "HELO %s", smtpc->domain);
381
382 if(!result)
383 state(conn, SMTP_HELO);
384
385 return result;
386}
387
388/***********************************************************************
389 *
390 * smtp_perform_starttls()
391 *
392 * Sends the STLS command to start the upgrade to TLS.
393 */
394static CURLcode smtp_perform_starttls(struct connectdata *conn)
395{
396 CURLcode result = CURLE_OK;
397
398 /* Send the STARTTLS command */
399 result = Curl_pp_sendf(&conn->proto.smtpc.pp, "%s", "STARTTLS");
400
401 if(!result)
402 state(conn, SMTP_STARTTLS);
403
404 return result;
405}
406
407/***********************************************************************
408 *
409 * smtp_perform_upgrade_tls()
410 *
411 * Performs the upgrade to TLS.
412 */
413static CURLcode smtp_perform_upgrade_tls(struct connectdata *conn)
414{
415 CURLcode result = CURLE_OK;
416 struct smtp_conn *smtpc = &conn->proto.smtpc;
417
418 /* Start the SSL connection */
419 result = Curl_ssl_connect_nonblocking(conn, FIRSTSOCKET, &smtpc->ssldone);
420
421 if(!result) {
422 if(smtpc->state != SMTP_UPGRADETLS)
423 state(conn, SMTP_UPGRADETLS);
424
425 if(smtpc->ssldone) {
426 smtp_to_smtps(conn);
427 result = smtp_perform_ehlo(conn);
428 }
429 }
430
431 return result;
432}
433
434/***********************************************************************
435 *
436 * smtp_perform_auth()
437 *
438 * Sends an AUTH command allowing the client to login with the given SASL
439 * authentication mechanism.
440 */
441static CURLcode smtp_perform_auth(struct connectdata *conn,
442 const char *mech,
443 const char *initresp)
444{
445 CURLcode result = CURLE_OK;
446 struct smtp_conn *smtpc = &conn->proto.smtpc;
447
448 if(initresp) { /* AUTH <mech> ...<crlf> */
449 /* Send the AUTH command with the initial response */
450 result = Curl_pp_sendf(&smtpc->pp, "AUTH %s %s", mech, initresp);
451 }
452 else {
453 /* Send the AUTH command */
454 result = Curl_pp_sendf(&smtpc->pp, "AUTH %s", mech);
455 }
456
457 return result;
458}
459
460/***********************************************************************
461 *
462 * smtp_continue_auth()
463 *
464 * Sends SASL continuation data or cancellation.
465 */
466static CURLcode smtp_continue_auth(struct connectdata *conn, const char *resp)
467{
468 struct smtp_conn *smtpc = &conn->proto.smtpc;
469
470 return Curl_pp_sendf(&smtpc->pp, "%s", resp);
471}
472
473/***********************************************************************
474 *
475 * smtp_perform_authentication()
476 *
477 * Initiates the authentication sequence, with the appropriate SASL
478 * authentication mechanism.
479 */
480static CURLcode smtp_perform_authentication(struct connectdata *conn)
481{
482 CURLcode result = CURLE_OK;
483 struct smtp_conn *smtpc = &conn->proto.smtpc;
484 saslprogress progress;
485
486 /* Check we have enough data to authenticate with, and the
487 server supports authentiation, and end the connect phase if not */
488 if(!smtpc->auth_supported ||
489 !Curl_sasl_can_authenticate(&smtpc->sasl, conn)) {
490 state(conn, SMTP_STOP);
491 return result;
492 }
493
494 /* Calculate the SASL login details */
495 result = Curl_sasl_start(&smtpc->sasl, conn, FALSE, &progress);
496
497 if(!result) {
498 if(progress == SASL_INPROGRESS)
499 state(conn, SMTP_AUTH);
500 else {
501 /* Other mechanisms not supported */
502 infof(conn->data, "No known authentication mechanisms supported!\n");
503 result = CURLE_LOGIN_DENIED;
504 }
505 }
506
507 return result;
508}
509
510/***********************************************************************
511 *
512 * smtp_perform_command()
513 *
514 * Sends a SMTP based command.
515 */
516static CURLcode smtp_perform_command(struct connectdata *conn)
517{
518 CURLcode result = CURLE_OK;
519 struct SessionHandle *data = conn->data;
520 struct SMTP *smtp = data->req.protop;
521
522 /* Send the command */
523 if(smtp->rcpt)
524 result = Curl_pp_sendf(&conn->proto.smtpc.pp, "%s %s",
525 smtp->custom && smtp->custom[0] != '\0' ?
526 smtp->custom : "VRFY",
527 smtp->rcpt->data);
528 else
529 result = Curl_pp_sendf(&conn->proto.smtpc.pp, "%s",
530 smtp->custom && smtp->custom[0] != '\0' ?
531 smtp->custom : "HELP");
532
533 if(!result)
534 state(conn, SMTP_COMMAND);
535
536 return result;
537}
538
539/***********************************************************************
540 *
541 * smtp_perform_mail()
542 *
543 * Sends an MAIL command to initiate the upload of a message.
544 */
545static CURLcode smtp_perform_mail(struct connectdata *conn)
546{
547 char *from = NULL;
548 char *auth = NULL;
549 char *size = NULL;
550 CURLcode result = CURLE_OK;
551 struct SessionHandle *data = conn->data;
552
553 /* Calculate the FROM parameter */
554 if(!data->set.str[STRING_MAIL_FROM])
555 /* Null reverse-path, RFC-5321, sect. 3.6.3 */
556 from = strdup("<>");
557 else if(data->set.str[STRING_MAIL_FROM][0] == '<')
558 from = aprintf("%s", data->set.str[STRING_MAIL_FROM]);
559 else
560 from = aprintf("<%s>", data->set.str[STRING_MAIL_FROM]);
561
562 if(!from)
563 return CURLE_OUT_OF_MEMORY;
564
565 /* Calculate the optional AUTH parameter */
566 if(data->set.str[STRING_MAIL_AUTH] && conn->proto.smtpc.sasl.authused) {
567 if(data->set.str[STRING_MAIL_AUTH][0] != '\0')
568 auth = aprintf("%s", data->set.str[STRING_MAIL_AUTH]);
569 else
570 /* Empty AUTH, RFC-2554, sect. 5 */
571 auth = strdup("<>");
572
573 if(!auth) {
574 free(from);
575
576 return CURLE_OUT_OF_MEMORY;
577 }
578 }
579
580 /* Calculate the optional SIZE parameter */
581 if(conn->proto.smtpc.size_supported && conn->data->state.infilesize > 0) {
582 size = aprintf("%" CURL_FORMAT_CURL_OFF_T, data->state.infilesize);
583
584 if(!size) {
585 free(from);
586 free(auth);
587
588 return CURLE_OUT_OF_MEMORY;
589 }
590 }
591
592 /* Send the MAIL command */
593 if(!auth && !size)
594 result = Curl_pp_sendf(&conn->proto.smtpc.pp,
595 "MAIL FROM:%s", from);
596 else if(auth && !size)
597 result = Curl_pp_sendf(&conn->proto.smtpc.pp,
598 "MAIL FROM:%s AUTH=%s", from, auth);
599 else if(auth && size)
600 result = Curl_pp_sendf(&conn->proto.smtpc.pp,
601 "MAIL FROM:%s AUTH=%s SIZE=%s", from, auth, size);
602 else
603 result = Curl_pp_sendf(&conn->proto.smtpc.pp,
604 "MAIL FROM:%s SIZE=%s", from, size);
605
606 free(from);
607 free(auth);
608 free(size);
609
610 if(!result)
611 state(conn, SMTP_MAIL);
612
613 return result;
614}
615
616/***********************************************************************
617 *
618 * smtp_perform_rcpt_to()
619 *
620 * Sends a RCPT TO command for a given recipient as part of the message upload
621 * process.
622 */
623static CURLcode smtp_perform_rcpt_to(struct connectdata *conn)
624{
625 CURLcode result = CURLE_OK;
626 struct SessionHandle *data = conn->data;
627 struct SMTP *smtp = data->req.protop;
628
629 /* Send the RCPT TO command */
630 if(smtp->rcpt->data[0] == '<')
631 result = Curl_pp_sendf(&conn->proto.smtpc.pp, "RCPT TO:%s",
632 smtp->rcpt->data);
633 else
634 result = Curl_pp_sendf(&conn->proto.smtpc.pp, "RCPT TO:<%s>",
635 smtp->rcpt->data);
636 if(!result)
637 state(conn, SMTP_RCPT);
638
639 return result;
640}
641
642/***********************************************************************
643 *
644 * smtp_perform_quit()
645 *
646 * Performs the quit action prior to sclose() being called.
647 */
648static CURLcode smtp_perform_quit(struct connectdata *conn)
649{
650 CURLcode result = CURLE_OK;
651
652 /* Send the QUIT command */
653 result = Curl_pp_sendf(&conn->proto.smtpc.pp, "%s", "QUIT");
654
655 if(!result)
656 state(conn, SMTP_QUIT);
657
658 return result;
659}
660
661/* For the initial server greeting */
662static CURLcode smtp_state_servergreet_resp(struct connectdata *conn,
663 int smtpcode,
664 smtpstate instate)
665{
666 CURLcode result = CURLE_OK;
667 struct SessionHandle *data = conn->data;
668
669 (void)instate; /* no use for this yet */
670
671 if(smtpcode/100 != 2) {
672 failf(data, "Got unexpected smtp-server response: %d", smtpcode);
673 result = CURLE_FTP_WEIRD_SERVER_REPLY;
674 }
675 else
676 result = smtp_perform_ehlo(conn);
677
678 return result;
679}
680
681/* For STARTTLS responses */
682static CURLcode smtp_state_starttls_resp(struct connectdata *conn,
683 int smtpcode,
684 smtpstate instate)
685{
686 CURLcode result = CURLE_OK;
687 struct SessionHandle *data = conn->data;
688
689 (void)instate; /* no use for this yet */
690
691 if(smtpcode != 220) {
692 if(data->set.use_ssl != CURLUSESSL_TRY) {
693 failf(data, "STARTTLS denied. %c", smtpcode);
694 result = CURLE_USE_SSL_FAILED;
695 }
696 else
697 result = smtp_perform_authentication(conn);
698 }
699 else
700 result = smtp_perform_upgrade_tls(conn);
701
702 return result;
703}
704
705/* For EHLO responses */
706static CURLcode smtp_state_ehlo_resp(struct connectdata *conn, int smtpcode,
707 smtpstate instate)
708{
709 CURLcode result = CURLE_OK;
710 struct SessionHandle *data = conn->data;
711 struct smtp_conn *smtpc = &conn->proto.smtpc;
712 const char *line = data->state.buffer;
713 size_t len = strlen(line);
714 size_t wordlen;
715
716 (void)instate; /* no use for this yet */
717
718 if(smtpcode/100 != 2 && smtpcode != 1) {
719 if(data->set.use_ssl <= CURLUSESSL_TRY || conn->ssl[FIRSTSOCKET].use)
720 result = smtp_perform_helo(conn);
721 else {
722 failf(data, "Remote access denied: %d", smtpcode);
723 result = CURLE_REMOTE_ACCESS_DENIED;
724 }
725 }
726 else {
727 line += 4;
728 len -= 4;
729
730 /* Does the server support the STARTTLS capability? */
731 if(len >= 8 && !memcmp(line, "STARTTLS", 8))
732 smtpc->tls_supported = TRUE;
733
734 /* Does the server support the SIZE capability? */
735 else if(len >= 4 && !memcmp(line, "SIZE", 4))
736 smtpc->size_supported = TRUE;
737
738 /* Does the server support authentication? */
739 else if(len >= 5 && !memcmp(line, "AUTH ", 5)) {
740 smtpc->auth_supported = TRUE;
741
742 /* Advance past the AUTH keyword */
743 line += 5;
744 len -= 5;
745
746 /* Loop through the data line */
747 for(;;) {
748 size_t llen;
749 unsigned int mechbit;
750
751 while(len &&
752 (*line == ' ' || *line == '\t' ||
753 *line == '\r' || *line == '\n')) {
754
755 line++;
756 len--;
757 }
758
759 if(!len)
760 break;
761
762 /* Extract the word */
763 for(wordlen = 0; wordlen < len && line[wordlen] != ' ' &&
764 line[wordlen] != '\t' && line[wordlen] != '\r' &&
765 line[wordlen] != '\n';)
766 wordlen++;
767
768 /* Test the word for a matching authentication mechanism */
769 if((mechbit = Curl_sasl_decode_mech(line, wordlen, &llen)) &&
770 llen == wordlen)
771 smtpc->sasl.authmechs |= mechbit;
772
773 line += wordlen;
774 len -= wordlen;
775 }
776 }
777
778 if(smtpcode != 1) {
779 if(data->set.use_ssl && !conn->ssl[FIRSTSOCKET].use) {
780 /* We don't have a SSL/TLS connection yet, but SSL is requested */
781 if(smtpc->tls_supported)
782 /* Switch to TLS connection now */
783 result = smtp_perform_starttls(conn);
784 else if(data->set.use_ssl == CURLUSESSL_TRY)
785 /* Fallback and carry on with authentication */
786 result = smtp_perform_authentication(conn);
787 else {
788 failf(data, "STARTTLS not supported.");
789 result = CURLE_USE_SSL_FAILED;
790 }
791 }
792 else
793 result = smtp_perform_authentication(conn);
794 }
795 }
796
797 return result;
798}
799
800/* For HELO responses */
801static CURLcode smtp_state_helo_resp(struct connectdata *conn, int smtpcode,
802 smtpstate instate)
803{
804 CURLcode result = CURLE_OK;
805 struct SessionHandle *data = conn->data;
806
807 (void)instate; /* no use for this yet */
808
809 if(smtpcode/100 != 2) {
810 failf(data, "Remote access denied: %d", smtpcode);
811 result = CURLE_REMOTE_ACCESS_DENIED;
812 }
813 else
814 /* End of connect phase */
815 state(conn, SMTP_STOP);
816
817 return result;
818}
819
820/* For SASL authentication responses */
821static CURLcode smtp_state_auth_resp(struct connectdata *conn,
822 int smtpcode,
823 smtpstate instate)
824{
825 CURLcode result = CURLE_OK;
826 struct SessionHandle *data = conn->data;
827 struct smtp_conn *smtpc = &conn->proto.smtpc;
828 saslprogress progress;
829
830 (void)instate; /* no use for this yet */
831
832 result = Curl_sasl_continue(&smtpc->sasl, conn, smtpcode, &progress);
833 if(!result)
834 switch(progress) {
835 case SASL_DONE:
836 state(conn, SMTP_STOP); /* Authenticated */
837 break;
838 case SASL_IDLE: /* No mechanism left after cancellation */
839 failf(data, "Authentication cancelled");
840 result = CURLE_LOGIN_DENIED;
841 break;
842 default:
843 break;
844 }
845
846 return result;
847}
848
849/* For command responses */
850static CURLcode smtp_state_command_resp(struct connectdata *conn, int smtpcode,
851 smtpstate instate)
852{
853 CURLcode result = CURLE_OK;
854 struct SessionHandle *data = conn->data;
855 struct SMTP *smtp = data->req.protop;
856 char *line = data->state.buffer;
857 size_t len = strlen(line);
858
859 (void)instate; /* no use for this yet */
860
861 if((smtp->rcpt && smtpcode/100 != 2 && smtpcode != 553 && smtpcode != 1) ||
862 (!smtp->rcpt && smtpcode/100 != 2 && smtpcode != 1)) {
863 failf(data, "Command failed: %d", smtpcode);
864 result = CURLE_RECV_ERROR;
865 }
866 else {
867 /* Temporarily add the LF character back and send as body to the client */
868 if(!data->set.opt_no_body) {
869 line[len] = '\n';
870 result = Curl_client_write(conn, CLIENTWRITE_BODY, line, len + 1);
871 line[len] = '\0';
872 }
873
874 if(smtpcode != 1) {
875 if(smtp->rcpt) {
876 smtp->rcpt = smtp->rcpt->next;
877
878 if(smtp->rcpt) {
879 /* Send the next command */
880 result = smtp_perform_command(conn);
881 }
882 else
883 /* End of DO phase */
884 state(conn, SMTP_STOP);
885 }
886 else
887 /* End of DO phase */
888 state(conn, SMTP_STOP);
889 }
890 }
891
892 return result;
893}
894
895/* For MAIL responses */
896static CURLcode smtp_state_mail_resp(struct connectdata *conn, int smtpcode,
897 smtpstate instate)
898{
899 CURLcode result = CURLE_OK;
900 struct SessionHandle *data = conn->data;
901
902 (void)instate; /* no use for this yet */
903
904 if(smtpcode/100 != 2) {
905 failf(data, "MAIL failed: %d", smtpcode);
906 result = CURLE_SEND_ERROR;
907 }
908 else
909 /* Start the RCPT TO command */
910 result = smtp_perform_rcpt_to(conn);
911
912 return result;
913}
914
915/* For RCPT responses */
916static CURLcode smtp_state_rcpt_resp(struct connectdata *conn, int smtpcode,
917 smtpstate instate)
918{
919 CURLcode result = CURLE_OK;
920 struct SessionHandle *data = conn->data;
921 struct SMTP *smtp = data->req.protop;
922
923 (void)instate; /* no use for this yet */
924
925 if(smtpcode/100 != 2) {
926 failf(data, "RCPT failed: %d", smtpcode);
927 result = CURLE_SEND_ERROR;
928 }
929 else {
930 smtp->rcpt = smtp->rcpt->next;
931
932 if(smtp->rcpt)
933 /* Send the next RCPT TO command */
934 result = smtp_perform_rcpt_to(conn);
935 else {
936 /* Send the DATA command */
937 result = Curl_pp_sendf(&conn->proto.smtpc.pp, "%s", "DATA");
938
939 if(!result)
940 state(conn, SMTP_DATA);
941 }
942 }
943
944 return result;
945}
946
947/* For DATA response */
948static CURLcode smtp_state_data_resp(struct connectdata *conn, int smtpcode,
949 smtpstate instate)
950{
951 CURLcode result = CURLE_OK;
952 struct SessionHandle *data = conn->data;
953
954 (void)instate; /* no use for this yet */
955
956 if(smtpcode != 354) {
957 failf(data, "DATA failed: %d", smtpcode);
958 result = CURLE_SEND_ERROR;
959 }
960 else {
961 /* Set the progress upload size */
962 Curl_pgrsSetUploadSize(data, data->state.infilesize);
963
964 /* SMTP upload */
965 Curl_setup_transfer(conn, -1, -1, FALSE, NULL, FIRSTSOCKET, NULL);
966
967 /* End of DO phase */
968 state(conn, SMTP_STOP);
969 }
970
971 return result;
972}
973
974/* For POSTDATA responses, which are received after the entire DATA
975 part has been sent to the server */
976static CURLcode smtp_state_postdata_resp(struct connectdata *conn,
977 int smtpcode,
978 smtpstate instate)
979{
980 CURLcode result = CURLE_OK;
981
982 (void)instate; /* no use for this yet */
983
984 if(smtpcode != 250)
985 result = CURLE_RECV_ERROR;
986
987 /* End of DONE phase */
988 state(conn, SMTP_STOP);
989
990 return result;
991}
992
993static CURLcode smtp_statemach_act(struct connectdata *conn)
994{
995 CURLcode result = CURLE_OK;
996 curl_socket_t sock = conn->sock[FIRSTSOCKET];
997 struct SessionHandle *data = conn->data;
998 int smtpcode;
999 struct smtp_conn *smtpc = &conn->proto.smtpc;
1000 struct pingpong *pp = &smtpc->pp;
1001 size_t nread = 0;
1002
1003 /* Busy upgrading the connection; right now all I/O is SSL/TLS, not SMTP */
1004 if(smtpc->state == SMTP_UPGRADETLS)
1005 return smtp_perform_upgrade_tls(conn);
1006
1007 /* Flush any data that needs to be sent */
1008 if(pp->sendleft)
1009 return Curl_pp_flushsend(pp);
1010
1011 do {
1012 /* Read the response from the server */
1013 result = Curl_pp_readresp(sock, pp, &smtpcode, &nread);
1014 if(result)
1015 return result;
1016
1017 /* Store the latest response for later retrieval if necessary */
1018 if(smtpc->state != SMTP_QUIT && smtpcode != 1)
1019 data->info.httpcode = smtpcode;
1020
1021 if(!smtpcode)
1022 break;
1023
1024 /* We have now received a full SMTP server response */
1025 switch(smtpc->state) {
1026 case SMTP_SERVERGREET:
1027 result = smtp_state_servergreet_resp(conn, smtpcode, smtpc->state);
1028 break;
1029
1030 case SMTP_EHLO:
1031 result = smtp_state_ehlo_resp(conn, smtpcode, smtpc->state);
1032 break;
1033
1034 case SMTP_HELO:
1035 result = smtp_state_helo_resp(conn, smtpcode, smtpc->state);
1036 break;
1037
1038 case SMTP_STARTTLS:
1039 result = smtp_state_starttls_resp(conn, smtpcode, smtpc->state);
1040 break;
1041
1042 case SMTP_AUTH:
1043 result = smtp_state_auth_resp(conn, smtpcode, smtpc->state);
1044 break;
1045
1046 case SMTP_COMMAND:
1047 result = smtp_state_command_resp(conn, smtpcode, smtpc->state);
1048 break;
1049
1050 case SMTP_MAIL:
1051 result = smtp_state_mail_resp(conn, smtpcode, smtpc->state);
1052 break;
1053
1054 case SMTP_RCPT:
1055 result = smtp_state_rcpt_resp(conn, smtpcode, smtpc->state);
1056 break;
1057
1058 case SMTP_DATA:
1059 result = smtp_state_data_resp(conn, smtpcode, smtpc->state);
1060 break;
1061
1062 case SMTP_POSTDATA:
1063 result = smtp_state_postdata_resp(conn, smtpcode, smtpc->state);
1064 break;
1065
1066 case SMTP_QUIT:
1067 /* fallthrough, just stop! */
1068 default:
1069 /* internal error */
1070 state(conn, SMTP_STOP);
1071 break;
1072 }
1073 } while(!result && smtpc->state != SMTP_STOP && Curl_pp_moredata(pp));
1074
1075 return result;
1076}
1077
1078/* Called repeatedly until done from multi.c */
1079static CURLcode smtp_multi_statemach(struct connectdata *conn, bool *done)
1080{
1081 CURLcode result = CURLE_OK;
1082 struct smtp_conn *smtpc = &conn->proto.smtpc;
1083
1084 if((conn->handler->flags & PROTOPT_SSL) && !smtpc->ssldone) {
1085 result = Curl_ssl_connect_nonblocking(conn, FIRSTSOCKET, &smtpc->ssldone);
1086 if(result || !smtpc->ssldone)
1087 return result;
1088 }
1089
1090 result = Curl_pp_statemach(&smtpc->pp, FALSE);
1091 *done = (smtpc->state == SMTP_STOP) ? TRUE : FALSE;
1092
1093 return result;
1094}
1095
1096static CURLcode smtp_block_statemach(struct connectdata *conn)
1097{
1098 CURLcode result = CURLE_OK;
1099 struct smtp_conn *smtpc = &conn->proto.smtpc;
1100
1101 while(smtpc->state != SMTP_STOP && !result)
1102 result = Curl_pp_statemach(&smtpc->pp, TRUE);
1103
1104 return result;
1105}
1106
1107/* Allocate and initialize the SMTP struct for the current SessionHandle if
1108 required */
1109static CURLcode smtp_init(struct connectdata *conn)
1110{
1111 CURLcode result = CURLE_OK;
1112 struct SessionHandle *data = conn->data;
1113 struct SMTP *smtp;
1114
1115 smtp = data->req.protop = calloc(sizeof(struct SMTP), 1);
1116 if(!smtp)
1117 result = CURLE_OUT_OF_MEMORY;
1118
1119 return result;
1120}
1121
1122/* For the SMTP "protocol connect" and "doing" phases only */
1123static int smtp_getsock(struct connectdata *conn, curl_socket_t *socks,
1124 int numsocks)
1125{
1126 return Curl_pp_getsock(&conn->proto.smtpc.pp, socks, numsocks);
1127}
1128
1129/***********************************************************************
1130 *
1131 * smtp_connect()
1132 *
1133 * This function should do everything that is to be considered a part of
1134 * the connection phase.
1135 *
1136 * The variable pointed to by 'done' will be TRUE if the protocol-layer
1137 * connect phase is done when this function returns, or FALSE if not.
1138 */
1139static CURLcode smtp_connect(struct connectdata *conn, bool *done)
1140{
1141 CURLcode result = CURLE_OK;
1142 struct smtp_conn *smtpc = &conn->proto.smtpc;
1143 struct pingpong *pp = &smtpc->pp;
1144
1145 *done = FALSE; /* default to not done yet */
1146
1147 /* We always support persistent connections in SMTP */
1148 connkeep(conn, "SMTP default");
1149
1150 /* Set the default response time-out */
1151 pp->response_time = RESP_TIMEOUT;
1152 pp->statemach_act = smtp_statemach_act;
1153 pp->endofresp = smtp_endofresp;
1154 pp->conn = conn;
1155
1156 /* Initialize the SASL storage */
1157 Curl_sasl_init(&smtpc->sasl, &saslsmtp);
1158
1159 /* Initialise the pingpong layer */
1160 Curl_pp_init(pp);
1161
1162 /* Parse the URL options */
1163 result = smtp_parse_url_options(conn);
1164 if(result)
1165 return result;
1166
1167 /* Parse the URL path */
1168 result = smtp_parse_url_path(conn);
1169 if(result)
1170 return result;
1171
1172 /* Start off waiting for the server greeting response */
1173 state(conn, SMTP_SERVERGREET);
1174
1175 result = smtp_multi_statemach(conn, done);
1176
1177 return result;
1178}
1179
1180/***********************************************************************
1181 *
1182 * smtp_done()
1183 *
1184 * The DONE function. This does what needs to be done after a single DO has
1185 * performed.
1186 *
1187 * Input argument is already checked for validity.
1188 */
1189static CURLcode smtp_done(struct connectdata *conn, CURLcode status,
1190 bool premature)
1191{
1192 CURLcode result = CURLE_OK;
1193 struct SessionHandle *data = conn->data;
1194 struct SMTP *smtp = data->req.protop;
1195 struct pingpong *pp = &conn->proto.smtpc.pp;
1196 char *eob;
1197 ssize_t len;
1198 ssize_t bytes_written;
1199
1200 (void)premature;
1201
1202 if(!smtp || !pp->conn)
1203 /* When the easy handle is removed from the multi interface while libcurl
1204 is still trying to resolve the host name, the SMTP struct is not yet
1205 initialized. However, the removal action calls Curl_done() which in
1206 turn calls this function, so we simply return success. */
1207 return CURLE_OK;
1208
1209 if(status) {
1210 connclose(conn, "SMTP done with bad status"); /* marked for closure */
1211 result = status; /* use the already set error code */
1212 }
1213 else if(!data->set.connect_only && data->set.upload && data->set.mail_rcpt) {
1214 /* Calculate the EOB taking into account any terminating CRLF from the
1215 previous line of the email or the CRLF of the DATA command when there
1216 is "no mail data". RFC-5321, sect. 4.1.1.4.
1217
1218 Note: As some SSL backends, such as OpenSSL, will cause Curl_write() to
1219 fail when using a different pointer following a previous write, that
1220 returned CURLE_AGAIN, we duplicate the EOB now rather than when the
1221 bytes written doesn't equal len. */
1222 if(smtp->trailing_crlf || !conn->data->state.infilesize) {
1223 eob = strdup(SMTP_EOB + 2);
1224 len = SMTP_EOB_LEN - 2;
1225 }
1226 else {
1227 eob = strdup(SMTP_EOB);
1228 len = SMTP_EOB_LEN;
1229 }
1230
1231 if(!eob)
1232 return CURLE_OUT_OF_MEMORY;
1233
1234 /* Send the end of block data */
1235 result = Curl_write(conn, conn->writesockfd, eob, len, &bytes_written);
1236 if(result) {
1237 free(eob);
1238 return result;
1239 }
1240
1241 if(bytes_written != len) {
1242 /* The whole chunk was not sent so keep it around and adjust the
1243 pingpong structure accordingly */
1244 pp->sendthis = eob;
1245 pp->sendsize = len;
1246 pp->sendleft = len - bytes_written;
1247 }
1248 else {
1249 /* Successfully sent so adjust the response timeout relative to now */
1250 pp->response = Curl_tvnow();
1251
1252 free(eob);
1253 }
1254
1255 state(conn, SMTP_POSTDATA);
1256
1257 /* Run the state-machine
1258
1259 TODO: when the multi interface is used, this _really_ should be using
1260 the smtp_multi_statemach function but we have no general support for
1261 non-blocking DONE operations, not in the multi state machine and with
1262 Curl_done() invokes on several places in the code!
1263 */
1264 result = smtp_block_statemach(conn);
1265 }
1266
1267 /* Cleanup our per-request based variables */
1268 Curl_safefree(smtp->custom);
1269
1270 /* Clear the transfer mode for the next request */
1271 smtp->transfer = FTPTRANSFER_BODY;
1272
1273 return result;
1274}
1275
1276/***********************************************************************
1277 *
1278 * smtp_perform()
1279 *
1280 * This is the actual DO function for SMTP. Transfer a mail, send a command
1281 * or get some data according to the options previously setup.
1282 */
1283static CURLcode smtp_perform(struct connectdata *conn, bool *connected,
1284 bool *dophase_done)
1285{
1286 /* This is SMTP and no proxy */
1287 CURLcode result = CURLE_OK;
1288 struct SessionHandle *data = conn->data;
1289 struct SMTP *smtp = data->req.protop;
1290
1291 DEBUGF(infof(conn->data, "DO phase starts\n"));
1292
1293 if(data->set.opt_no_body) {
1294 /* Requested no body means no transfer */
1295 smtp->transfer = FTPTRANSFER_INFO;
1296 }
1297
1298 *dophase_done = FALSE; /* not done yet */
1299
1300 /* Store the first recipient (or NULL if not specified) */
1301 smtp->rcpt = data->set.mail_rcpt;
1302
1303 /* Start the first command in the DO phase */
1304 if(data->set.upload && data->set.mail_rcpt)
1305 /* MAIL transfer */
1306 result = smtp_perform_mail(conn);
1307 else
1308 /* SMTP based command (VRFY, EXPN, NOOP, RSET or HELP) */
1309 result = smtp_perform_command(conn);
1310
1311 if(result)
1312 return result;
1313
1314 /* Run the state-machine */
1315 result = smtp_multi_statemach(conn, dophase_done);
1316
1317 *connected = conn->bits.tcpconnect[FIRSTSOCKET];
1318
1319 if(*dophase_done)
1320 DEBUGF(infof(conn->data, "DO phase is complete\n"));
1321
1322 return result;
1323}
1324
1325/***********************************************************************
1326 *
1327 * smtp_do()
1328 *
1329 * This function is registered as 'curl_do' function. It decodes the path
1330 * parts etc as a wrapper to the actual DO function (smtp_perform).
1331 *
1332 * The input argument is already checked for validity.
1333 */
1334static CURLcode smtp_do(struct connectdata *conn, bool *done)
1335{
1336 CURLcode result = CURLE_OK;
1337
1338 *done = FALSE; /* default to false */
1339
1340 /* Parse the custom request */
1341 result = smtp_parse_custom_request(conn);
1342 if(result)
1343 return result;
1344
1345 result = smtp_regular_transfer(conn, done);
1346
1347 return result;
1348}
1349
1350/***********************************************************************
1351 *
1352 * smtp_disconnect()
1353 *
1354 * Disconnect from an SMTP server. Cleanup protocol-specific per-connection
1355 * resources. BLOCKING.
1356 */
1357static CURLcode smtp_disconnect(struct connectdata *conn, bool dead_connection)
1358{
1359 struct smtp_conn *smtpc = &conn->proto.smtpc;
1360
1361 /* We cannot send quit unconditionally. If this connection is stale or
1362 bad in any way, sending quit and waiting around here will make the
1363 disconnect wait in vain and cause more problems than we need to. */
1364
1365 /* The SMTP session may or may not have been allocated/setup at this
1366 point! */
1367 if(!dead_connection && smtpc->pp.conn && smtpc->pp.conn->bits.protoconnstart)
1368 if(!smtp_perform_quit(conn))
1369 (void)smtp_block_statemach(conn); /* ignore errors on QUIT */
1370
1371 /* Disconnect from the server */
1372 Curl_pp_disconnect(&smtpc->pp);
1373
1374 /* Cleanup the SASL module */
1375 Curl_sasl_cleanup(conn, smtpc->sasl.authused);
1376
1377 /* Cleanup our connection based variables */
1378 Curl_safefree(smtpc->domain);
1379
1380 return CURLE_OK;
1381}
1382
1383/* Call this when the DO phase has completed */
1384static CURLcode smtp_dophase_done(struct connectdata *conn, bool connected)
1385{
1386 struct SMTP *smtp = conn->data->req.protop;
1387
1388 (void)connected;
1389
1390 if(smtp->transfer != FTPTRANSFER_BODY)
1391 /* no data to transfer */
1392 Curl_setup_transfer(conn, -1, -1, FALSE, NULL, -1, NULL);
1393
1394 return CURLE_OK;
1395}
1396
1397/* Called from multi.c while DOing */
1398static CURLcode smtp_doing(struct connectdata *conn, bool *dophase_done)
1399{
1400 CURLcode result = smtp_multi_statemach(conn, dophase_done);
1401
1402 if(result)
1403 DEBUGF(infof(conn->data, "DO phase failed\n"));
1404 else if(*dophase_done) {
1405 result = smtp_dophase_done(conn, FALSE /* not connected */);
1406
1407 DEBUGF(infof(conn->data, "DO phase is complete\n"));
1408 }
1409
1410 return result;
1411}
1412
1413/***********************************************************************
1414 *
1415 * smtp_regular_transfer()
1416 *
1417 * The input argument is already checked for validity.
1418 *
1419 * Performs all commands done before a regular transfer between a local and a
1420 * remote host.
1421 */
1422static CURLcode smtp_regular_transfer(struct connectdata *conn,
1423 bool *dophase_done)
1424{
1425 CURLcode result = CURLE_OK;
1426 bool connected = FALSE;
1427 struct SessionHandle *data = conn->data;
1428
1429 /* Make sure size is unknown at this point */
1430 data->req.size = -1;
1431
1432 /* Set the progress data */
1433 Curl_pgrsSetUploadCounter(data, 0);
1434 Curl_pgrsSetDownloadCounter(data, 0);
1435 Curl_pgrsSetUploadSize(data, -1);
1436 Curl_pgrsSetDownloadSize(data, -1);
1437
1438 /* Carry out the perform */
1439 result = smtp_perform(conn, &connected, dophase_done);
1440
1441 /* Perform post DO phase operations if necessary */
1442 if(!result && *dophase_done)
1443 result = smtp_dophase_done(conn, connected);
1444
1445 return result;
1446}
1447
1448static CURLcode smtp_setup_connection(struct connectdata *conn)
1449{
1450 struct SessionHandle *data = conn->data;
1451 CURLcode result;
1452
1453 if(conn->bits.httpproxy && !data->set.tunnel_thru_httpproxy) {
1454 /* Unless we have asked to tunnel SMTP operations through the proxy, we
1455 switch and use HTTP operations only */
1456#ifndef CURL_DISABLE_HTTP
1457 if(conn->handler == &Curl_handler_smtp)
1458 conn->handler = &Curl_handler_smtp_proxy;
1459 else {
1460#ifdef USE_SSL
1461 conn->handler = &Curl_handler_smtps_proxy;
1462#else
1463 failf(data, "SMTPS not supported!");
1464 return CURLE_UNSUPPORTED_PROTOCOL;
1465#endif
1466 }
1467 /* set it up as a HTTP connection instead */
1468 return conn->handler->setup_connection(conn);
1469
1470#else
1471 failf(data, "SMTP over http proxy requires HTTP support built-in!");
1472 return CURLE_UNSUPPORTED_PROTOCOL;
1473#endif
1474 }
1475
1476 /* Initialise the SMTP layer */
1477 result = smtp_init(conn);
1478 if(result)
1479 return result;
1480
1481 data->state.path++; /* don't include the initial slash */
1482
1483 return CURLE_OK;
1484}
1485
1486/***********************************************************************
1487 *
1488 * smtp_parse_url_options()
1489 *
1490 * Parse the URL login options.
1491 */
1492static CURLcode smtp_parse_url_options(struct connectdata *conn)
1493{
1494 CURLcode result = CURLE_OK;
1495 struct smtp_conn *smtpc = &conn->proto.smtpc;
1496 const char *ptr = conn->options;
1497
1498 smtpc->sasl.resetprefs = TRUE;
1499
1500 while(!result && ptr && *ptr) {
1501 const char *key = ptr;
1502 const char *value;
1503
1504 while(*ptr && *ptr != '=')
1505 ptr++;
1506
1507 value = ptr + 1;
1508
1509 while(*ptr && *ptr != ';')
1510 ptr++;
1511
1512 if(strnequal(key, "AUTH=", 5))
1513 result = Curl_sasl_parse_url_auth_option(&smtpc->sasl,
1514 value, ptr - value);
1515 else
1516 result = CURLE_URL_MALFORMAT;
1517
1518 if(*ptr == ';')
1519 ptr++;
1520 }
1521
1522 return result;
1523}
1524
1525/***********************************************************************
1526 *
1527 * smtp_parse_url_path()
1528 *
1529 * Parse the URL path into separate path components.
1530 */
1531static CURLcode smtp_parse_url_path(struct connectdata *conn)
1532{
1533 /* The SMTP struct is already initialised in smtp_connect() */
1534 struct SessionHandle *data = conn->data;
1535 struct smtp_conn *smtpc = &conn->proto.smtpc;
1536 const char *path = data->state.path;
1537 char localhost[HOSTNAME_MAX + 1];
1538
1539 /* Calculate the path if necessary */
1540 if(!*path) {
1541 if(!Curl_gethostname(localhost, sizeof(localhost)))
1542 path = localhost;
1543 else
1544 path = "localhost";
1545 }
1546
1547 /* URL decode the path and use it as the domain in our EHLO */
1548 return Curl_urldecode(conn->data, path, 0, &smtpc->domain, NULL, TRUE);
1549}
1550
1551/***********************************************************************
1552 *
1553 * smtp_parse_custom_request()
1554 *
1555 * Parse the custom request.
1556 */
1557static CURLcode smtp_parse_custom_request(struct connectdata *conn)
1558{
1559 CURLcode result = CURLE_OK;
1560 struct SessionHandle *data = conn->data;
1561 struct SMTP *smtp = data->req.protop;
1562 const char *custom = data->set.str[STRING_CUSTOMREQUEST];
1563
1564 /* URL decode the custom request */
1565 if(custom)
1566 result = Curl_urldecode(data, custom, 0, &smtp->custom, NULL, TRUE);
1567
1568 return result;
1569}
1570
1571CURLcode Curl_smtp_escape_eob(struct connectdata *conn, const ssize_t nread)
1572{
1573 /* When sending a SMTP payload we must detect CRLF. sequences making sure
1574 they are sent as CRLF.. instead, as a . on the beginning of a line will
1575 be deleted by the server when not part of an EOB terminator and a
1576 genuine CRLF.CRLF which isn't escaped will wrongly be detected as end of
1577 data by the server
1578 */
1579 ssize_t i;
1580 ssize_t si;
1581 struct SessionHandle *data = conn->data;
1582 struct SMTP *smtp = data->req.protop;
1583 char *scratch = data->state.scratch;
1584 char *newscratch = NULL;
1585 char *oldscratch = NULL;
1586 size_t eob_sent;
1587
1588 /* Do we need to allocate a scratch buffer? */
1589 if(!scratch || data->set.crlf) {
1590 oldscratch = scratch;
1591
1592 scratch = newscratch = malloc(2 * BUFSIZE);
1593 if(!newscratch) {
1594 failf(data, "Failed to alloc scratch buffer!");
1595
1596 return CURLE_OUT_OF_MEMORY;
1597 }
1598 }
1599
1600 /* Have we already sent part of the EOB? */
1601 eob_sent = smtp->eob;
1602
1603 /* This loop can be improved by some kind of Boyer-Moore style of
1604 approach but that is saved for later... */
1605 for(i = 0, si = 0; i < nread; i++) {
1606 if(SMTP_EOB[smtp->eob] == data->req.upload_fromhere[i]) {
1607 smtp->eob++;
1608
1609 /* Is the EOB potentially the terminating CRLF? */
1610 if(2 == smtp->eob || SMTP_EOB_LEN == smtp->eob)
1611 smtp->trailing_crlf = TRUE;
1612 else
1613 smtp->trailing_crlf = FALSE;
1614 }
1615 else if(smtp->eob) {
1616 /* A previous substring matched so output that first */
1617 memcpy(&scratch[si], &SMTP_EOB[eob_sent], smtp->eob - eob_sent);
1618 si += smtp->eob - eob_sent;
1619
1620 /* Then compare the first byte */
1621 if(SMTP_EOB[0] == data->req.upload_fromhere[i])
1622 smtp->eob = 1;
1623 else
1624 smtp->eob = 0;
1625
1626 eob_sent = 0;
1627
1628 /* Reset the trailing CRLF flag as there was more data */
1629 smtp->trailing_crlf = FALSE;
1630 }
1631
1632 /* Do we have a match for CRLF. as per RFC-5321, sect. 4.5.2 */
1633 if(SMTP_EOB_FIND_LEN == smtp->eob) {
1634 /* Copy the replacement data to the target buffer */
1635 memcpy(&scratch[si], &SMTP_EOB_REPL[eob_sent],
1636 SMTP_EOB_REPL_LEN - eob_sent);
1637 si += SMTP_EOB_REPL_LEN - eob_sent;
1638 smtp->eob = 0;
1639 eob_sent = 0;
1640 }
1641 else if(!smtp->eob)
1642 scratch[si++] = data->req.upload_fromhere[i];
1643 }
1644
1645 if(smtp->eob - eob_sent) {
1646 /* A substring matched before processing ended so output that now */
1647 memcpy(&scratch[si], &SMTP_EOB[eob_sent], smtp->eob - eob_sent);
1648 si += smtp->eob - eob_sent;
1649 }
1650
1651 /* Only use the new buffer if we replaced something */
1652 if(si != nread) {
1653 /* Upload from the new (replaced) buffer instead */
1654 data->req.upload_fromhere = scratch;
1655
1656 /* Save the buffer so it can be freed later */
1657 data->state.scratch = scratch;
1658
1659 /* Free the old scratch buffer */
1660 free(oldscratch);
1661
1662 /* Set the new amount too */
1663 data->req.upload_present = si;
1664 }
1665 else
1666 free(newscratch);
1667
1668 return CURLE_OK;
1669}
1670
1671#endif /* CURL_DISABLE_SMTP */
Note: See TracBrowser for help on using the repository browser.