1 /***************************************************************************
3 * Project ___| | | | _ \| |
5 * | (__| |_| | _ <| |___
6 * \___|\___/|_| \_\_____|
8 * Copyright (C) 1998 - 2015, Daniel Stenberg, <daniel@haxx.se>, et al.
10 * This software is licensed as described in the file COPYING, which
11 * you should have received as part of this distribution. The terms
12 * are also available at http://curl.haxx.se/docs/copyright.html.
14 * You may opt to use, copy, modify, merge, publish, distribute and/or sell
15 * copies of the Software, and permit persons to whom the Software is
16 * furnished to do so, under the terms of the COPYING file.
18 * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
19 * KIND, either express or implied.
21 * RFC1870 SMTP Service Extension for Message Size
22 * RFC2195 CRAM-MD5 authentication
23 * RFC2831 DIGEST-MD5 authentication
24 * RFC3207 SMTP over TLS
25 * RFC4422 Simple Authentication and Security Layer (SASL)
26 * RFC4616 PLAIN authentication
27 * RFC4752 The Kerberos V5 ("GSSAPI") SASL Mechanism
28 * RFC4954 SMTP Authentication
29 * RFC5321 SMTP protocol
30 * RFC6749 OAuth 2.0 Authorization Framework
31 * Draft SMTP URL Interface <draft-earhart-url-smtp-00.txt>
32 * Draft LOGIN SASL Mechanism <draft-murchison-sasl-login-00.txt>
34 ***************************************************************************/
36 #include "curl_setup.h"
38 #ifndef CURL_DISABLE_SMTP
40 #ifdef HAVE_NETINET_IN_H
41 #include <netinet/in.h>
43 #ifdef HAVE_ARPA_INET_H
44 #include <arpa/inet.h>
47 #include <sys/utsname.h>
57 #if (defined(NETWARE) && defined(__NOVELL_LIBC__))
59 #define in_addr_t unsigned long
62 #include <curl/curl.h>
69 #include "http.h" /* for HTTP proxy tunnel stuff */
73 #include "strtoofft.h"
75 #include "vtls/vtls.h"
82 #include "curl_gethostname.h"
83 #include "curl_sasl.h"
85 #include "curl_printf.h"
86 #include "curl_memory.h"
87 /* The last #include file should be: */
90 /* Local API functions */
91 static CURLcode smtp_regular_transfer(struct connectdata *conn, bool *done);
92 static CURLcode smtp_do(struct connectdata *conn, bool *done);
93 static CURLcode smtp_done(struct connectdata *conn, CURLcode status,
95 static CURLcode smtp_connect(struct connectdata *conn, bool *done);
96 static CURLcode smtp_disconnect(struct connectdata *conn, bool dead);
97 static CURLcode smtp_multi_statemach(struct connectdata *conn, bool *done);
98 static int smtp_getsock(struct connectdata *conn, curl_socket_t *socks,
100 static CURLcode smtp_doing(struct connectdata *conn, bool *dophase_done);
101 static CURLcode smtp_setup_connection(struct connectdata *conn);
102 static CURLcode smtp_parse_url_options(struct connectdata *conn);
103 static CURLcode smtp_parse_url_path(struct connectdata *conn);
104 static CURLcode smtp_parse_custom_request(struct connectdata *conn);
105 static CURLcode smtp_perform_auth(struct connectdata *conn, const char *mech,
106 const char *initresp);
107 static CURLcode smtp_continue_auth(struct connectdata *conn, const char *resp);
108 static void smtp_get_message(char *buffer, char** outptr);
111 * SMTP protocol handler.
114 const struct Curl_handler Curl_handler_smtp = {
116 smtp_setup_connection, /* setup_connection */
118 smtp_done, /* done */
119 ZERO_NULL, /* do_more */
120 smtp_connect, /* connect_it */
121 smtp_multi_statemach, /* connecting */
122 smtp_doing, /* doing */
123 smtp_getsock, /* proto_getsock */
124 smtp_getsock, /* doing_getsock */
125 ZERO_NULL, /* domore_getsock */
126 ZERO_NULL, /* perform_getsock */
127 smtp_disconnect, /* disconnect */
128 ZERO_NULL, /* readwrite */
129 PORT_SMTP, /* defport */
130 CURLPROTO_SMTP, /* protocol */
131 PROTOPT_CLOSEACTION | PROTOPT_NOURLQUERY /* flags */
136 * SMTPS protocol handler.
139 const struct Curl_handler Curl_handler_smtps = {
140 "SMTPS", /* scheme */
141 smtp_setup_connection, /* setup_connection */
143 smtp_done, /* done */
144 ZERO_NULL, /* do_more */
145 smtp_connect, /* connect_it */
146 smtp_multi_statemach, /* connecting */
147 smtp_doing, /* doing */
148 smtp_getsock, /* proto_getsock */
149 smtp_getsock, /* doing_getsock */
150 ZERO_NULL, /* domore_getsock */
151 ZERO_NULL, /* perform_getsock */
152 smtp_disconnect, /* disconnect */
153 ZERO_NULL, /* readwrite */
154 PORT_SMTPS, /* defport */
155 CURLPROTO_SMTPS, /* protocol */
156 PROTOPT_CLOSEACTION | PROTOPT_SSL
157 | PROTOPT_NOURLQUERY /* flags */
161 #ifndef CURL_DISABLE_HTTP
163 * HTTP-proxyed SMTP protocol handler.
166 static const struct Curl_handler Curl_handler_smtp_proxy = {
168 Curl_http_setup_conn, /* setup_connection */
169 Curl_http, /* do_it */
170 Curl_http_done, /* done */
171 ZERO_NULL, /* do_more */
172 ZERO_NULL, /* connect_it */
173 ZERO_NULL, /* connecting */
174 ZERO_NULL, /* doing */
175 ZERO_NULL, /* proto_getsock */
176 ZERO_NULL, /* doing_getsock */
177 ZERO_NULL, /* domore_getsock */
178 ZERO_NULL, /* perform_getsock */
179 ZERO_NULL, /* disconnect */
180 ZERO_NULL, /* readwrite */
181 PORT_SMTP, /* defport */
182 CURLPROTO_HTTP, /* protocol */
183 PROTOPT_NONE /* flags */
188 * HTTP-proxyed SMTPS protocol handler.
191 static const struct Curl_handler Curl_handler_smtps_proxy = {
192 "SMTPS", /* scheme */
193 Curl_http_setup_conn, /* setup_connection */
194 Curl_http, /* do_it */
195 Curl_http_done, /* done */
196 ZERO_NULL, /* do_more */
197 ZERO_NULL, /* connect_it */
198 ZERO_NULL, /* connecting */
199 ZERO_NULL, /* doing */
200 ZERO_NULL, /* proto_getsock */
201 ZERO_NULL, /* doing_getsock */
202 ZERO_NULL, /* domore_getsock */
203 ZERO_NULL, /* perform_getsock */
204 ZERO_NULL, /* disconnect */
205 ZERO_NULL, /* readwrite */
206 PORT_SMTPS, /* defport */
207 CURLPROTO_HTTP, /* protocol */
208 PROTOPT_NONE /* flags */
213 /* SASL parameters for the smtp protocol */
214 static const struct SASLproto saslsmtp = {
215 "smtp", /* The service name */
216 334, /* Code received when continuation is expected */
217 235, /* Code to receive upon authentication success */
218 512 - 8, /* Maximum initial response length (no max) */
219 smtp_perform_auth, /* Send authentication command */
220 smtp_continue_auth, /* Send authentication continuation */
221 smtp_get_message /* Get SASL response message */
225 static void smtp_to_smtps(struct connectdata *conn)
227 conn->handler = &Curl_handler_smtps;
230 #define smtp_to_smtps(x) Curl_nop_stmt
233 /***********************************************************************
237 * Checks for an ending SMTP status code at the start of the given string, but
238 * also detects various capabilities from the EHLO response including the
239 * supported authentication mechanisms.
241 static bool smtp_endofresp(struct connectdata *conn, char *line, size_t len,
244 struct smtp_conn *smtpc = &conn->proto.smtpc;
248 if(len < 4 || !ISDIGIT(line[0]) || !ISDIGIT(line[1]) || !ISDIGIT(line[2]))
251 /* Do we have a command response? This should be the response code followed
252 by a space and optionally some text as per RFC-5321 and as outlined in
253 Section 4. Examples of RFC-4954 but some e-mail servers ignore this and
254 only send the response code instead as per Section 4.2. */
255 if(line[3] == ' ' || len == 5) {
257 *resp = curlx_sltosi(strtol(line, NULL, 10));
259 /* Make sure real server never sends internal value */
263 /* Do we have a multiline (continuation) response? */
264 else if(line[3] == '-' &&
265 (smtpc->state == SMTP_EHLO || smtpc->state == SMTP_COMMAND)) {
267 *resp = 1; /* Internal response code */
273 /***********************************************************************
277 * Gets the authentication message from the response buffer.
279 static void smtp_get_message(char *buffer, char** outptr)
282 char* message = NULL;
284 /* Find the start of the message */
285 for(message = buffer + 4; *message == ' ' || *message == '\t'; message++)
288 /* Find the end of the message */
289 for(len = strlen(message); len--;)
290 if(message[len] != '\r' && message[len] != '\n' && message[len] != ' ' &&
291 message[len] != '\t')
294 /* Terminate the message */
302 /***********************************************************************
306 * This is the ONLY way to change SMTP state!
308 static void state(struct connectdata *conn, smtpstate newstate)
310 struct smtp_conn *smtpc = &conn->proto.smtpc;
311 #if defined(DEBUGBUILD) && !defined(CURL_DISABLE_VERBOSE_STRINGS)
312 /* for debug purposes */
313 static const char * const names[] = {
330 if(smtpc->state != newstate)
331 infof(conn->data, "SMTP %p state change from %s to %s\n",
332 (void *)smtpc, names[smtpc->state], names[newstate]);
335 smtpc->state = newstate;
338 /***********************************************************************
340 * smtp_perform_ehlo()
342 * Sends the EHLO command to not only initialise communication with the ESMTP
343 * server but to also obtain a list of server side supported capabilities.
345 static CURLcode smtp_perform_ehlo(struct connectdata *conn)
347 CURLcode result = CURLE_OK;
348 struct smtp_conn *smtpc = &conn->proto.smtpc;
350 smtpc->sasl.authmechs = SASL_AUTH_NONE; /* No known auth. mechanism yet */
351 smtpc->sasl.authused = SASL_AUTH_NONE; /* Clear the authentication mechanism
352 used for esmtp connections */
353 smtpc->tls_supported = FALSE; /* Clear the TLS capability */
354 smtpc->auth_supported = FALSE; /* Clear the AUTH capability */
356 /* Send the EHLO command */
357 result = Curl_pp_sendf(&smtpc->pp, "EHLO %s", smtpc->domain);
360 state(conn, SMTP_EHLO);
365 /***********************************************************************
367 * smtp_perform_helo()
369 * Sends the HELO command to initialise communication with the SMTP server.
371 static CURLcode smtp_perform_helo(struct connectdata *conn)
373 CURLcode result = CURLE_OK;
374 struct smtp_conn *smtpc = &conn->proto.smtpc;
376 smtpc->sasl.authused = SASL_AUTH_NONE; /* No authentication mechanism used
377 in smtp connections */
379 /* Send the HELO command */
380 result = Curl_pp_sendf(&smtpc->pp, "HELO %s", smtpc->domain);
383 state(conn, SMTP_HELO);
388 /***********************************************************************
390 * smtp_perform_starttls()
392 * Sends the STLS command to start the upgrade to TLS.
394 static CURLcode smtp_perform_starttls(struct connectdata *conn)
396 CURLcode result = CURLE_OK;
398 /* Send the STARTTLS command */
399 result = Curl_pp_sendf(&conn->proto.smtpc.pp, "%s", "STARTTLS");
402 state(conn, SMTP_STARTTLS);
407 /***********************************************************************
409 * smtp_perform_upgrade_tls()
411 * Performs the upgrade to TLS.
413 static CURLcode smtp_perform_upgrade_tls(struct connectdata *conn)
415 CURLcode result = CURLE_OK;
416 struct smtp_conn *smtpc = &conn->proto.smtpc;
418 /* Start the SSL connection */
419 result = Curl_ssl_connect_nonblocking(conn, FIRSTSOCKET, &smtpc->ssldone);
422 if(smtpc->state != SMTP_UPGRADETLS)
423 state(conn, SMTP_UPGRADETLS);
427 result = smtp_perform_ehlo(conn);
434 /***********************************************************************
436 * smtp_perform_auth()
438 * Sends an AUTH command allowing the client to login with the given SASL
439 * authentication mechanism.
441 static CURLcode smtp_perform_auth(struct connectdata *conn,
443 const char *initresp)
445 CURLcode result = CURLE_OK;
446 struct smtp_conn *smtpc = &conn->proto.smtpc;
448 if(initresp) { /* AUTH <mech> ...<crlf> */
449 /* Send the AUTH command with the initial response */
450 result = Curl_pp_sendf(&smtpc->pp, "AUTH %s %s", mech, initresp);
453 /* Send the AUTH command */
454 result = Curl_pp_sendf(&smtpc->pp, "AUTH %s", mech);
460 /***********************************************************************
462 * smtp_continue_auth()
464 * Sends SASL continuation data or cancellation.
466 static CURLcode smtp_continue_auth(struct connectdata *conn, const char *resp)
468 struct smtp_conn *smtpc = &conn->proto.smtpc;
470 return Curl_pp_sendf(&smtpc->pp, "%s", resp);
473 /***********************************************************************
475 * smtp_perform_authentication()
477 * Initiates the authentication sequence, with the appropriate SASL
478 * authentication mechanism.
480 static CURLcode smtp_perform_authentication(struct connectdata *conn)
482 CURLcode result = CURLE_OK;
483 struct smtp_conn *smtpc = &conn->proto.smtpc;
484 saslprogress progress;
486 /* Check we have enough data to authenticate with, and the
487 server supports authentiation, and end the connect phase if not */
488 if(!smtpc->auth_supported ||
489 !Curl_sasl_can_authenticate(&smtpc->sasl, conn)) {
490 state(conn, SMTP_STOP);
494 /* Calculate the SASL login details */
495 result = Curl_sasl_start(&smtpc->sasl, conn, FALSE, &progress);
498 if(progress == SASL_INPROGRESS)
499 state(conn, SMTP_AUTH);
501 /* Other mechanisms not supported */
502 infof(conn->data, "No known authentication mechanisms supported!\n");
503 result = CURLE_LOGIN_DENIED;
510 /***********************************************************************
512 * smtp_perform_command()
514 * Sends a SMTP based command.
516 static CURLcode smtp_perform_command(struct connectdata *conn)
518 CURLcode result = CURLE_OK;
519 struct SessionHandle *data = conn->data;
520 struct SMTP *smtp = data->req.protop;
522 /* Send the command */
524 result = Curl_pp_sendf(&conn->proto.smtpc.pp, "%s %s",
525 smtp->custom && smtp->custom[0] != '\0' ?
526 smtp->custom : "VRFY",
529 result = Curl_pp_sendf(&conn->proto.smtpc.pp, "%s",
530 smtp->custom && smtp->custom[0] != '\0' ?
531 smtp->custom : "HELP");
534 state(conn, SMTP_COMMAND);
539 /***********************************************************************
541 * smtp_perform_mail()
543 * Sends an MAIL command to initiate the upload of a message.
545 static CURLcode smtp_perform_mail(struct connectdata *conn)
550 CURLcode result = CURLE_OK;
551 struct SessionHandle *data = conn->data;
553 /* Calculate the FROM parameter */
554 if(!data->set.str[STRING_MAIL_FROM])
555 /* Null reverse-path, RFC-5321, sect. 3.6.3 */
557 else if(data->set.str[STRING_MAIL_FROM][0] == '<')
558 from = aprintf("%s", data->set.str[STRING_MAIL_FROM]);
560 from = aprintf("<%s>", data->set.str[STRING_MAIL_FROM]);
563 return CURLE_OUT_OF_MEMORY;
565 /* Calculate the optional AUTH parameter */
566 if(data->set.str[STRING_MAIL_AUTH] && conn->proto.smtpc.sasl.authused) {
567 if(data->set.str[STRING_MAIL_AUTH][0] != '\0')
568 auth = aprintf("%s", data->set.str[STRING_MAIL_AUTH]);
570 /* Empty AUTH, RFC-2554, sect. 5 */
576 return CURLE_OUT_OF_MEMORY;
580 /* Calculate the optional SIZE parameter */
581 if(conn->proto.smtpc.size_supported && conn->data->state.infilesize > 0) {
582 size = aprintf("%" CURL_FORMAT_CURL_OFF_T, data->state.infilesize);
588 return CURLE_OUT_OF_MEMORY;
592 /* Send the MAIL command */
594 result = Curl_pp_sendf(&conn->proto.smtpc.pp,
595 "MAIL FROM:%s", from);
596 else if(auth && !size)
597 result = Curl_pp_sendf(&conn->proto.smtpc.pp,
598 "MAIL FROM:%s AUTH=%s", from, auth);
599 else if(auth && size)
600 result = Curl_pp_sendf(&conn->proto.smtpc.pp,
601 "MAIL FROM:%s AUTH=%s SIZE=%s", from, auth, size);
603 result = Curl_pp_sendf(&conn->proto.smtpc.pp,
604 "MAIL FROM:%s SIZE=%s", from, size);
611 state(conn, SMTP_MAIL);
616 /***********************************************************************
618 * smtp_perform_rcpt_to()
620 * Sends a RCPT TO command for a given recipient as part of the message upload
623 static CURLcode smtp_perform_rcpt_to(struct connectdata *conn)
625 CURLcode result = CURLE_OK;
626 struct SessionHandle *data = conn->data;
627 struct SMTP *smtp = data->req.protop;
629 /* Send the RCPT TO command */
630 if(smtp->rcpt->data[0] == '<')
631 result = Curl_pp_sendf(&conn->proto.smtpc.pp, "RCPT TO:%s",
634 result = Curl_pp_sendf(&conn->proto.smtpc.pp, "RCPT TO:<%s>",
637 state(conn, SMTP_RCPT);
642 /***********************************************************************
644 * smtp_perform_quit()
646 * Performs the quit action prior to sclose() being called.
648 static CURLcode smtp_perform_quit(struct connectdata *conn)
650 CURLcode result = CURLE_OK;
652 /* Send the QUIT command */
653 result = Curl_pp_sendf(&conn->proto.smtpc.pp, "%s", "QUIT");
656 state(conn, SMTP_QUIT);
661 /* For the initial server greeting */
662 static CURLcode smtp_state_servergreet_resp(struct connectdata *conn,
666 CURLcode result = CURLE_OK;
667 struct SessionHandle *data = conn->data;
669 (void)instate; /* no use for this yet */
671 if(smtpcode/100 != 2) {
672 failf(data, "Got unexpected smtp-server response: %d", smtpcode);
673 result = CURLE_FTP_WEIRD_SERVER_REPLY;
676 result = smtp_perform_ehlo(conn);
681 /* For STARTTLS responses */
682 static CURLcode smtp_state_starttls_resp(struct connectdata *conn,
686 CURLcode result = CURLE_OK;
687 struct SessionHandle *data = conn->data;
689 (void)instate; /* no use for this yet */
691 if(smtpcode != 220) {
692 if(data->set.use_ssl != CURLUSESSL_TRY) {
693 failf(data, "STARTTLS denied. %c", smtpcode);
694 result = CURLE_USE_SSL_FAILED;
697 result = smtp_perform_authentication(conn);
700 result = smtp_perform_upgrade_tls(conn);
705 /* For EHLO responses */
706 static CURLcode smtp_state_ehlo_resp(struct connectdata *conn, int smtpcode,
709 CURLcode result = CURLE_OK;
710 struct SessionHandle *data = conn->data;
711 struct smtp_conn *smtpc = &conn->proto.smtpc;
712 const char *line = data->state.buffer;
713 size_t len = strlen(line);
716 (void)instate; /* no use for this yet */
718 if(smtpcode/100 != 2 && smtpcode != 1) {
719 if(data->set.use_ssl <= CURLUSESSL_TRY || conn->ssl[FIRSTSOCKET].use)
720 result = smtp_perform_helo(conn);
722 failf(data, "Remote access denied: %d", smtpcode);
723 result = CURLE_REMOTE_ACCESS_DENIED;
730 /* Does the server support the STARTTLS capability? */
731 if(len >= 8 && !memcmp(line, "STARTTLS", 8))
732 smtpc->tls_supported = TRUE;
734 /* Does the server support the SIZE capability? */
735 else if(len >= 4 && !memcmp(line, "SIZE", 4))
736 smtpc->size_supported = TRUE;
738 /* Does the server support authentication? */
739 else if(len >= 5 && !memcmp(line, "AUTH ", 5)) {
740 smtpc->auth_supported = TRUE;
742 /* Advance past the AUTH keyword */
746 /* Loop through the data line */
749 unsigned int mechbit;
752 (*line == ' ' || *line == '\t' ||
753 *line == '\r' || *line == '\n')) {
762 /* Extract the word */
763 for(wordlen = 0; wordlen < len && line[wordlen] != ' ' &&
764 line[wordlen] != '\t' && line[wordlen] != '\r' &&
765 line[wordlen] != '\n';)
768 /* Test the word for a matching authentication mechanism */
769 if((mechbit = Curl_sasl_decode_mech(line, wordlen, &llen)) &&
771 smtpc->sasl.authmechs |= mechbit;
779 if(data->set.use_ssl && !conn->ssl[FIRSTSOCKET].use) {
780 /* We don't have a SSL/TLS connection yet, but SSL is requested */
781 if(smtpc->tls_supported)
782 /* Switch to TLS connection now */
783 result = smtp_perform_starttls(conn);
784 else if(data->set.use_ssl == CURLUSESSL_TRY)
785 /* Fallback and carry on with authentication */
786 result = smtp_perform_authentication(conn);
788 failf(data, "STARTTLS not supported.");
789 result = CURLE_USE_SSL_FAILED;
793 result = smtp_perform_authentication(conn);
800 /* For HELO responses */
801 static CURLcode smtp_state_helo_resp(struct connectdata *conn, int smtpcode,
804 CURLcode result = CURLE_OK;
805 struct SessionHandle *data = conn->data;
807 (void)instate; /* no use for this yet */
809 if(smtpcode/100 != 2) {
810 failf(data, "Remote access denied: %d", smtpcode);
811 result = CURLE_REMOTE_ACCESS_DENIED;
814 /* End of connect phase */
815 state(conn, SMTP_STOP);
820 /* For SASL authentication responses */
821 static CURLcode smtp_state_auth_resp(struct connectdata *conn,
825 CURLcode result = CURLE_OK;
826 struct SessionHandle *data = conn->data;
827 struct smtp_conn *smtpc = &conn->proto.smtpc;
828 saslprogress progress;
830 (void)instate; /* no use for this yet */
832 result = Curl_sasl_continue(&smtpc->sasl, conn, smtpcode, &progress);
836 state(conn, SMTP_STOP); /* Authenticated */
838 case SASL_IDLE: /* No mechanism left after cancellation */
839 failf(data, "Authentication cancelled");
840 result = CURLE_LOGIN_DENIED;
849 /* For command responses */
850 static CURLcode smtp_state_command_resp(struct connectdata *conn, int smtpcode,
853 CURLcode result = CURLE_OK;
854 struct SessionHandle *data = conn->data;
855 struct SMTP *smtp = data->req.protop;
856 char *line = data->state.buffer;
857 size_t len = strlen(line);
859 (void)instate; /* no use for this yet */
861 if((smtp->rcpt && smtpcode/100 != 2 && smtpcode != 553 && smtpcode != 1) ||
862 (!smtp->rcpt && smtpcode/100 != 2 && smtpcode != 1)) {
863 failf(data, "Command failed: %d", smtpcode);
864 result = CURLE_RECV_ERROR;
867 /* Temporarily add the LF character back and send as body to the client */
868 if(!data->set.opt_no_body) {
870 result = Curl_client_write(conn, CLIENTWRITE_BODY, line, len + 1);
876 smtp->rcpt = smtp->rcpt->next;
879 /* Send the next command */
880 result = smtp_perform_command(conn);
883 /* End of DO phase */
884 state(conn, SMTP_STOP);
887 /* End of DO phase */
888 state(conn, SMTP_STOP);
895 /* For MAIL responses */
896 static CURLcode smtp_state_mail_resp(struct connectdata *conn, int smtpcode,
899 CURLcode result = CURLE_OK;
900 struct SessionHandle *data = conn->data;
902 (void)instate; /* no use for this yet */
904 if(smtpcode/100 != 2) {
905 failf(data, "MAIL failed: %d", smtpcode);
906 result = CURLE_SEND_ERROR;
909 /* Start the RCPT TO command */
910 result = smtp_perform_rcpt_to(conn);
915 /* For RCPT responses */
916 static CURLcode smtp_state_rcpt_resp(struct connectdata *conn, int smtpcode,
919 CURLcode result = CURLE_OK;
920 struct SessionHandle *data = conn->data;
921 struct SMTP *smtp = data->req.protop;
923 (void)instate; /* no use for this yet */
925 if(smtpcode/100 != 2) {
926 failf(data, "RCPT failed: %d", smtpcode);
927 result = CURLE_SEND_ERROR;
930 smtp->rcpt = smtp->rcpt->next;
933 /* Send the next RCPT TO command */
934 result = smtp_perform_rcpt_to(conn);
936 /* Send the DATA command */
937 result = Curl_pp_sendf(&conn->proto.smtpc.pp, "%s", "DATA");
940 state(conn, SMTP_DATA);
947 /* For DATA response */
948 static CURLcode smtp_state_data_resp(struct connectdata *conn, int smtpcode,
951 CURLcode result = CURLE_OK;
952 struct SessionHandle *data = conn->data;
954 (void)instate; /* no use for this yet */
956 if(smtpcode != 354) {
957 failf(data, "DATA failed: %d", smtpcode);
958 result = CURLE_SEND_ERROR;
961 /* Set the progress upload size */
962 Curl_pgrsSetUploadSize(data, data->state.infilesize);
965 Curl_setup_transfer(conn, -1, -1, FALSE, NULL, FIRSTSOCKET, NULL);
967 /* End of DO phase */
968 state(conn, SMTP_STOP);
974 /* For POSTDATA responses, which are received after the entire DATA
975 part has been sent to the server */
976 static CURLcode smtp_state_postdata_resp(struct connectdata *conn,
980 CURLcode result = CURLE_OK;
982 (void)instate; /* no use for this yet */
985 result = CURLE_RECV_ERROR;
987 /* End of DONE phase */
988 state(conn, SMTP_STOP);
993 static CURLcode smtp_statemach_act(struct connectdata *conn)
995 CURLcode result = CURLE_OK;
996 curl_socket_t sock = conn->sock[FIRSTSOCKET];
997 struct SessionHandle *data = conn->data;
999 struct smtp_conn *smtpc = &conn->proto.smtpc;
1000 struct pingpong *pp = &smtpc->pp;
1003 /* Busy upgrading the connection; right now all I/O is SSL/TLS, not SMTP */
1004 if(smtpc->state == SMTP_UPGRADETLS)
1005 return smtp_perform_upgrade_tls(conn);
1007 /* Flush any data that needs to be sent */
1009 return Curl_pp_flushsend(pp);
1012 /* Read the response from the server */
1013 result = Curl_pp_readresp(sock, pp, &smtpcode, &nread);
1017 /* Store the latest response for later retrieval if necessary */
1018 if(smtpc->state != SMTP_QUIT && smtpcode != 1)
1019 data->info.httpcode = smtpcode;
1024 /* We have now received a full SMTP server response */
1025 switch(smtpc->state) {
1026 case SMTP_SERVERGREET:
1027 result = smtp_state_servergreet_resp(conn, smtpcode, smtpc->state);
1031 result = smtp_state_ehlo_resp(conn, smtpcode, smtpc->state);
1035 result = smtp_state_helo_resp(conn, smtpcode, smtpc->state);
1039 result = smtp_state_starttls_resp(conn, smtpcode, smtpc->state);
1043 result = smtp_state_auth_resp(conn, smtpcode, smtpc->state);
1047 result = smtp_state_command_resp(conn, smtpcode, smtpc->state);
1051 result = smtp_state_mail_resp(conn, smtpcode, smtpc->state);
1055 result = smtp_state_rcpt_resp(conn, smtpcode, smtpc->state);
1059 result = smtp_state_data_resp(conn, smtpcode, smtpc->state);
1063 result = smtp_state_postdata_resp(conn, smtpcode, smtpc->state);
1067 /* fallthrough, just stop! */
1069 /* internal error */
1070 state(conn, SMTP_STOP);
1073 } while(!result && smtpc->state != SMTP_STOP && Curl_pp_moredata(pp));
1078 /* Called repeatedly until done from multi.c */
1079 static CURLcode smtp_multi_statemach(struct connectdata *conn, bool *done)
1081 CURLcode result = CURLE_OK;
1082 struct smtp_conn *smtpc = &conn->proto.smtpc;
1084 if((conn->handler->flags & PROTOPT_SSL) && !smtpc->ssldone) {
1085 result = Curl_ssl_connect_nonblocking(conn, FIRSTSOCKET, &smtpc->ssldone);
1086 if(result || !smtpc->ssldone)
1090 result = Curl_pp_statemach(&smtpc->pp, FALSE);
1091 *done = (smtpc->state == SMTP_STOP) ? TRUE : FALSE;
1096 static CURLcode smtp_block_statemach(struct connectdata *conn)
1098 CURLcode result = CURLE_OK;
1099 struct smtp_conn *smtpc = &conn->proto.smtpc;
1101 while(smtpc->state != SMTP_STOP && !result)
1102 result = Curl_pp_statemach(&smtpc->pp, TRUE);
1107 /* Allocate and initialize the SMTP struct for the current SessionHandle if
1109 static CURLcode smtp_init(struct connectdata *conn)
1111 CURLcode result = CURLE_OK;
1112 struct SessionHandle *data = conn->data;
1115 smtp = data->req.protop = calloc(sizeof(struct SMTP), 1);
1117 result = CURLE_OUT_OF_MEMORY;
1122 /* For the SMTP "protocol connect" and "doing" phases only */
1123 static int smtp_getsock(struct connectdata *conn, curl_socket_t *socks,
1126 return Curl_pp_getsock(&conn->proto.smtpc.pp, socks, numsocks);
1129 /***********************************************************************
1133 * This function should do everything that is to be considered a part of
1134 * the connection phase.
1136 * The variable pointed to by 'done' will be TRUE if the protocol-layer
1137 * connect phase is done when this function returns, or FALSE if not.
1139 static CURLcode smtp_connect(struct connectdata *conn, bool *done)
1141 CURLcode result = CURLE_OK;
1142 struct smtp_conn *smtpc = &conn->proto.smtpc;
1143 struct pingpong *pp = &smtpc->pp;
1145 *done = FALSE; /* default to not done yet */
1147 /* We always support persistent connections in SMTP */
1148 connkeep(conn, "SMTP default");
1150 /* Set the default response time-out */
1151 pp->response_time = RESP_TIMEOUT;
1152 pp->statemach_act = smtp_statemach_act;
1153 pp->endofresp = smtp_endofresp;
1156 /* Initialize the SASL storage */
1157 Curl_sasl_init(&smtpc->sasl, &saslsmtp);
1159 /* Initialise the pingpong layer */
1162 /* Parse the URL options */
1163 result = smtp_parse_url_options(conn);
1167 /* Parse the URL path */
1168 result = smtp_parse_url_path(conn);
1172 /* Start off waiting for the server greeting response */
1173 state(conn, SMTP_SERVERGREET);
1175 result = smtp_multi_statemach(conn, done);
1180 /***********************************************************************
1184 * The DONE function. This does what needs to be done after a single DO has
1187 * Input argument is already checked for validity.
1189 static CURLcode smtp_done(struct connectdata *conn, CURLcode status,
1192 CURLcode result = CURLE_OK;
1193 struct SessionHandle *data = conn->data;
1194 struct SMTP *smtp = data->req.protop;
1195 struct pingpong *pp = &conn->proto.smtpc.pp;
1198 ssize_t bytes_written;
1202 if(!smtp || !pp->conn)
1203 /* When the easy handle is removed from the multi interface while libcurl
1204 is still trying to resolve the host name, the SMTP struct is not yet
1205 initialized. However, the removal action calls Curl_done() which in
1206 turn calls this function, so we simply return success. */
1210 connclose(conn, "SMTP done with bad status"); /* marked for closure */
1211 result = status; /* use the already set error code */
1213 else if(!data->set.connect_only && data->set.upload && data->set.mail_rcpt) {
1214 /* Calculate the EOB taking into account any terminating CRLF from the
1215 previous line of the email or the CRLF of the DATA command when there
1216 is "no mail data". RFC-5321, sect. 4.1.1.4.
1218 Note: As some SSL backends, such as OpenSSL, will cause Curl_write() to
1219 fail when using a different pointer following a previous write, that
1220 returned CURLE_AGAIN, we duplicate the EOB now rather than when the
1221 bytes written doesn't equal len. */
1222 if(smtp->trailing_crlf || !conn->data->state.infilesize) {
1223 eob = strdup(SMTP_EOB + 2);
1224 len = SMTP_EOB_LEN - 2;
1227 eob = strdup(SMTP_EOB);
1232 return CURLE_OUT_OF_MEMORY;
1234 /* Send the end of block data */
1235 result = Curl_write(conn, conn->writesockfd, eob, len, &bytes_written);
1241 if(bytes_written != len) {
1242 /* The whole chunk was not sent so keep it around and adjust the
1243 pingpong structure accordingly */
1246 pp->sendleft = len - bytes_written;
1249 /* Successfully sent so adjust the response timeout relative to now */
1250 pp->response = Curl_tvnow();
1255 state(conn, SMTP_POSTDATA);
1257 /* Run the state-machine
1259 TODO: when the multi interface is used, this _really_ should be using
1260 the smtp_multi_statemach function but we have no general support for
1261 non-blocking DONE operations, not in the multi state machine and with
1262 Curl_done() invokes on several places in the code!
1264 result = smtp_block_statemach(conn);
1267 /* Cleanup our per-request based variables */
1268 Curl_safefree(smtp->custom);
1270 /* Clear the transfer mode for the next request */
1271 smtp->transfer = FTPTRANSFER_BODY;
1276 /***********************************************************************
1280 * This is the actual DO function for SMTP. Transfer a mail, send a command
1281 * or get some data according to the options previously setup.
1283 static CURLcode smtp_perform(struct connectdata *conn, bool *connected,
1286 /* This is SMTP and no proxy */
1287 CURLcode result = CURLE_OK;
1288 struct SessionHandle *data = conn->data;
1289 struct SMTP *smtp = data->req.protop;
1291 DEBUGF(infof(conn->data, "DO phase starts\n"));
1293 if(data->set.opt_no_body) {
1294 /* Requested no body means no transfer */
1295 smtp->transfer = FTPTRANSFER_INFO;
1298 *dophase_done = FALSE; /* not done yet */
1300 /* Store the first recipient (or NULL if not specified) */
1301 smtp->rcpt = data->set.mail_rcpt;
1303 /* Start the first command in the DO phase */
1304 if(data->set.upload && data->set.mail_rcpt)
1306 result = smtp_perform_mail(conn);
1308 /* SMTP based command (VRFY, EXPN, NOOP, RSET or HELP) */
1309 result = smtp_perform_command(conn);
1314 /* Run the state-machine */
1315 result = smtp_multi_statemach(conn, dophase_done);
1317 *connected = conn->bits.tcpconnect[FIRSTSOCKET];
1320 DEBUGF(infof(conn->data, "DO phase is complete\n"));
1325 /***********************************************************************
1329 * This function is registered as 'curl_do' function. It decodes the path
1330 * parts etc as a wrapper to the actual DO function (smtp_perform).
1332 * The input argument is already checked for validity.
1334 static CURLcode smtp_do(struct connectdata *conn, bool *done)
1336 CURLcode result = CURLE_OK;
1338 *done = FALSE; /* default to false */
1340 /* Parse the custom request */
1341 result = smtp_parse_custom_request(conn);
1345 result = smtp_regular_transfer(conn, done);
1350 /***********************************************************************
1354 * Disconnect from an SMTP server. Cleanup protocol-specific per-connection
1355 * resources. BLOCKING.
1357 static CURLcode smtp_disconnect(struct connectdata *conn, bool dead_connection)
1359 struct smtp_conn *smtpc = &conn->proto.smtpc;
1361 /* We cannot send quit unconditionally. If this connection is stale or
1362 bad in any way, sending quit and waiting around here will make the
1363 disconnect wait in vain and cause more problems than we need to. */
1365 /* The SMTP session may or may not have been allocated/setup at this
1367 if(!dead_connection && smtpc->pp.conn && smtpc->pp.conn->bits.protoconnstart)
1368 if(!smtp_perform_quit(conn))
1369 (void)smtp_block_statemach(conn); /* ignore errors on QUIT */
1371 /* Disconnect from the server */
1372 Curl_pp_disconnect(&smtpc->pp);
1374 /* Cleanup the SASL module */
1375 Curl_sasl_cleanup(conn, smtpc->sasl.authused);
1377 /* Cleanup our connection based variables */
1378 Curl_safefree(smtpc->domain);
1383 /* Call this when the DO phase has completed */
1384 static CURLcode smtp_dophase_done(struct connectdata *conn, bool connected)
1386 struct SMTP *smtp = conn->data->req.protop;
1390 if(smtp->transfer != FTPTRANSFER_BODY)
1391 /* no data to transfer */
1392 Curl_setup_transfer(conn, -1, -1, FALSE, NULL, -1, NULL);
1397 /* Called from multi.c while DOing */
1398 static CURLcode smtp_doing(struct connectdata *conn, bool *dophase_done)
1400 CURLcode result = smtp_multi_statemach(conn, dophase_done);
1403 DEBUGF(infof(conn->data, "DO phase failed\n"));
1404 else if(*dophase_done) {
1405 result = smtp_dophase_done(conn, FALSE /* not connected */);
1407 DEBUGF(infof(conn->data, "DO phase is complete\n"));
1413 /***********************************************************************
1415 * smtp_regular_transfer()
1417 * The input argument is already checked for validity.
1419 * Performs all commands done before a regular transfer between a local and a
1422 static CURLcode smtp_regular_transfer(struct connectdata *conn,
1425 CURLcode result = CURLE_OK;
1426 bool connected = FALSE;
1427 struct SessionHandle *data = conn->data;
1429 /* Make sure size is unknown at this point */
1430 data->req.size = -1;
1432 /* Set the progress data */
1433 Curl_pgrsSetUploadCounter(data, 0);
1434 Curl_pgrsSetDownloadCounter(data, 0);
1435 Curl_pgrsSetUploadSize(data, -1);
1436 Curl_pgrsSetDownloadSize(data, -1);
1438 /* Carry out the perform */
1439 result = smtp_perform(conn, &connected, dophase_done);
1441 /* Perform post DO phase operations if necessary */
1442 if(!result && *dophase_done)
1443 result = smtp_dophase_done(conn, connected);
1448 static CURLcode smtp_setup_connection(struct connectdata *conn)
1450 struct SessionHandle *data = conn->data;
1453 if(conn->bits.httpproxy && !data->set.tunnel_thru_httpproxy) {
1454 /* Unless we have asked to tunnel SMTP operations through the proxy, we
1455 switch and use HTTP operations only */
1456 #ifndef CURL_DISABLE_HTTP
1457 if(conn->handler == &Curl_handler_smtp)
1458 conn->handler = &Curl_handler_smtp_proxy;
1461 conn->handler = &Curl_handler_smtps_proxy;
1463 failf(data, "SMTPS not supported!");
1464 return CURLE_UNSUPPORTED_PROTOCOL;
1467 /* set it up as a HTTP connection instead */
1468 return conn->handler->setup_connection(conn);
1471 failf(data, "SMTP over http proxy requires HTTP support built-in!");
1472 return CURLE_UNSUPPORTED_PROTOCOL;
1476 /* Initialise the SMTP layer */
1477 result = smtp_init(conn);
1481 data->state.path++; /* don't include the initial slash */
1486 /***********************************************************************
1488 * smtp_parse_url_options()
1490 * Parse the URL login options.
1492 static CURLcode smtp_parse_url_options(struct connectdata *conn)
1494 CURLcode result = CURLE_OK;
1495 struct smtp_conn *smtpc = &conn->proto.smtpc;
1496 const char *ptr = conn->options;
1498 smtpc->sasl.resetprefs = TRUE;
1500 while(!result && ptr && *ptr) {
1501 const char *key = ptr;
1504 while(*ptr && *ptr != '=')
1509 while(*ptr && *ptr != ';')
1512 if(strnequal(key, "AUTH=", 5))
1513 result = Curl_sasl_parse_url_auth_option(&smtpc->sasl,
1514 value, ptr - value);
1516 result = CURLE_URL_MALFORMAT;
1525 /***********************************************************************
1527 * smtp_parse_url_path()
1529 * Parse the URL path into separate path components.
1531 static CURLcode smtp_parse_url_path(struct connectdata *conn)
1533 /* The SMTP struct is already initialised in smtp_connect() */
1534 struct SessionHandle *data = conn->data;
1535 struct smtp_conn *smtpc = &conn->proto.smtpc;
1536 const char *path = data->state.path;
1537 char localhost[HOSTNAME_MAX + 1];
1539 /* Calculate the path if necessary */
1541 if(!Curl_gethostname(localhost, sizeof(localhost)))
1547 /* URL decode the path and use it as the domain in our EHLO */
1548 return Curl_urldecode(conn->data, path, 0, &smtpc->domain, NULL, TRUE);
1551 /***********************************************************************
1553 * smtp_parse_custom_request()
1555 * Parse the custom request.
1557 static CURLcode smtp_parse_custom_request(struct connectdata *conn)
1559 CURLcode result = CURLE_OK;
1560 struct SessionHandle *data = conn->data;
1561 struct SMTP *smtp = data->req.protop;
1562 const char *custom = data->set.str[STRING_CUSTOMREQUEST];
1564 /* URL decode the custom request */
1566 result = Curl_urldecode(data, custom, 0, &smtp->custom, NULL, TRUE);
1571 CURLcode Curl_smtp_escape_eob(struct connectdata *conn, const ssize_t nread)
1573 /* When sending a SMTP payload we must detect CRLF. sequences making sure
1574 they are sent as CRLF.. instead, as a . on the beginning of a line will
1575 be deleted by the server when not part of an EOB terminator and a
1576 genuine CRLF.CRLF which isn't escaped will wrongly be detected as end of
1581 struct SessionHandle *data = conn->data;
1582 struct SMTP *smtp = data->req.protop;
1583 char *scratch = data->state.scratch;
1584 char *newscratch = NULL;
1585 char *oldscratch = NULL;
1588 /* Do we need to allocate a scratch buffer? */
1589 if(!scratch || data->set.crlf) {
1590 oldscratch = scratch;
1592 scratch = newscratch = malloc(2 * BUFSIZE);
1594 failf(data, "Failed to alloc scratch buffer!");
1596 return CURLE_OUT_OF_MEMORY;
1600 /* Have we already sent part of the EOB? */
1601 eob_sent = smtp->eob;
1603 /* This loop can be improved by some kind of Boyer-Moore style of
1604 approach but that is saved for later... */
1605 for(i = 0, si = 0; i < nread; i++) {
1606 if(SMTP_EOB[smtp->eob] == data->req.upload_fromhere[i]) {
1609 /* Is the EOB potentially the terminating CRLF? */
1610 if(2 == smtp->eob || SMTP_EOB_LEN == smtp->eob)
1611 smtp->trailing_crlf = TRUE;
1613 smtp->trailing_crlf = FALSE;
1615 else if(smtp->eob) {
1616 /* A previous substring matched so output that first */
1617 memcpy(&scratch[si], &SMTP_EOB[eob_sent], smtp->eob - eob_sent);
1618 si += smtp->eob - eob_sent;
1620 /* Then compare the first byte */
1621 if(SMTP_EOB[0] == data->req.upload_fromhere[i])
1628 /* Reset the trailing CRLF flag as there was more data */
1629 smtp->trailing_crlf = FALSE;
1632 /* Do we have a match for CRLF. as per RFC-5321, sect. 4.5.2 */
1633 if(SMTP_EOB_FIND_LEN == smtp->eob) {
1634 /* Copy the replacement data to the target buffer */
1635 memcpy(&scratch[si], &SMTP_EOB_REPL[eob_sent],
1636 SMTP_EOB_REPL_LEN - eob_sent);
1637 si += SMTP_EOB_REPL_LEN - eob_sent;
1642 scratch[si++] = data->req.upload_fromhere[i];
1645 if(smtp->eob - eob_sent) {
1646 /* A substring matched before processing ended so output that now */
1647 memcpy(&scratch[si], &SMTP_EOB[eob_sent], smtp->eob - eob_sent);
1648 si += smtp->eob - eob_sent;
1651 /* Only use the new buffer if we replaced something */
1653 /* Upload from the new (replaced) buffer instead */
1654 data->req.upload_fromhere = scratch;
1656 /* Save the buffer so it can be freed later */
1657 data->state.scratch = scratch;
1659 /* Free the old scratch buffer */
1662 /* Set the new amount too */
1663 data->req.upload_present = si;
1671 #endif /* CURL_DISABLE_SMTP */