// Copyright (c) 2006-2013, Andrey N. Sabelnikov, www.sabelnikov.net // All rights reserved. // // Redistribution and use in source and binary forms, with or without // modification, are permitted provided that the following conditions are met: // * Redistributions of source code must retain the above copyright // notice, this list of conditions and the following disclaimer. // * Redistributions in binary form must reproduce the above copyright // notice, this list of conditions and the following disclaimer in the // documentation and/or other materials provided with the distribution. // * Neither the name of the Andrey N. Sabelnikov nor the // names of its contributors may be used to endorse or promote products // derived from this software without specific prior written permission. // // THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND // ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED // WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE // DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER BE LIABLE FOR ANY // DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES // (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; // LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND // ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT // (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS // SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. // #include "md5.h" namespace epee { namespace net_utils { namespace smtp { ////////////////////////////////////////////////////////////////////////// inline char * convert_hex( unsigned char *in, int len ) { static char hex[] = "0123456789abcdef"; char * out; int i; out = (char *) malloc(len * 2 + 1); if (out == NULL) return NULL; for (i = 0; i < len; i++) { out[i * 2] = hex[in[i] >> 4]; out[i * 2 + 1] = hex[in[i] & 15]; } out[i*2] = 0; return out; } ////////////////////////////////////////////////////////////////////////// inline char * hash_md5(const char * sec_key, const char * data, int len) { char key[65], digest[24]; char * hash_hex; int sec_len, i; sec_len = strlen(sec_key); if (sec_len < 64) { memcpy(key, sec_key, sec_len); for (i = sec_len; i < 64; i++) { key[i] = 0; } } else { memcpy(key, sec_key, 64); } md5::hmac_md5( (const unsigned char*)data, len, (const unsigned char*)key, 64, (unsigned char*)digest ); hash_hex = convert_hex( (unsigned char*)digest, 16 ); return hash_hex; } ////////////////////////////////////////////////////////////////////////// ////////////////////////////////////////////////////////////////////////// ////////////////////////////////////////////////////////////////////////// ////////////////////////////////////////////////////////////////////////// inline CSMTPClient::CSMTPClient(void) { m_dwSupportedAuthModesCount = 0; m_bConnected = FALSE; m_hSocket = INVALID_SOCKET; m_pErrorText = NULL; // Initialize WinSock WORD wVer = MAKEWORD( 2, 2 ); if ( WSAStartup( wVer, &m_wsaData ) != NO_ERROR ) { SetErrorText( "WSAStartup.", WSAGetLastError() ); throw; } if ( LOBYTE( m_wsaData.wVersion ) != 2 || HIBYTE( m_wsaData.wVersion ) != 2 ) { SetErrorText( "Can't find a useable WinSock DLL." ); WSACleanup(); throw; } } ////////////////////////////////////////////////////////////////////////// inline CSMTPClient::~CSMTPClient(void) { if ( m_pErrorText ) { free( m_pErrorText ); m_pErrorText = NULL; } if ( m_bConnected ) ServerDisconnect(); // Cleanup WSACleanup(); } ////////////////////////////////////////////////////////////////////////// inline void CSMTPClient::SetErrorText( LPCSTR szErrorText, DWORD dwErrorCode ) { if ( m_pErrorText ) { free( m_pErrorText ); m_pErrorText = NULL; } LPVOID lpMsgBuf = NULL; if ( dwErrorCode ) { FormatMessageA( FORMAT_MESSAGE_ALLOCATE_BUFFER | FORMAT_MESSAGE_FROM_SYSTEM, NULL, dwErrorCode, MAKELANGID(LANG_NEUTRAL, SUBLANG_DEFAULT), (LPSTR) &lpMsgBuf, 0, NULL ); } if ( szErrorText && strlen( szErrorText ) ) { m_pErrorText = (LPBYTE)malloc( strlen( szErrorText ) + 1 ); strcpy( (char*)m_pErrorText, szErrorText ); if ( lpMsgBuf ) { strcat( (char*)m_pErrorText, " " ); strcpy( (char*)m_pErrorText, (char*)lpMsgBuf ); LocalFree( lpMsgBuf ); } } } inline void CSMTPClient::SetErrorText( PBYTE szErrorText, DWORD dwErrorCode ) { SetErrorText( (LPCSTR)szErrorText, dwErrorCode ); } ////////////////////////////////////////////////////////////////////////// inline char* CSMTPClient::GetLastErrorText() { return (char*)m_pErrorText; } ////////////////////////////////////////////////////////////////////////// inline DWORD CSMTPClient::ReceiveData( SOCKET hSocket, PBYTE pReceiveBuffer, DWORD dwReceiveBufferSize ) { DWORD dwReceivedDataSize = 0; if ( hSocket != INVALID_SOCKET && pReceiveBuffer && dwReceiveBufferSize ) { int iReceived = 0; int iLength = 0; iLength = recv( hSocket, (LPSTR)pReceiveBuffer + iReceived, dwReceiveBufferSize - iReceived, NO_FLAGS ); if ( iLength != 0 && iLength != SOCKET_ERROR ) iReceived += iLength; dwReceivedDataSize = iReceived; pReceiveBuffer[ iReceived ] = 0; } return dwReceivedDataSize; } inline ////////////////////////////////////////////////////////////////////////// DWORD CSMTPClient::SendData( SOCKET hSocket, PBYTE pSendBuffer, DWORD dwSendBufferSize ) { DWORD dwSended = 0; if ( hSocket != INVALID_SOCKET && pSendBuffer && dwSendBufferSize ) { int iSended = 0; int iLength = 0; while ( iLength != SOCKET_ERROR && dwSendBufferSize - iSended > 0 ) { iLength = send( hSocket, (LPSTR)pSendBuffer + iSended, dwSendBufferSize - iSended, NO_FLAGS ); if ( iLength != 0 && iLength != SOCKET_ERROR ) iSended += iLength; } dwSended = iSended; } //if ( dwSended ) // printf( "C: %s", pSendBuffer ); return dwSended; } ////////////////////////////////////////////////////////////////////////// inline unsigned short CSMTPClient::GetResponseCode( LPBYTE pBuffer, DWORD dwBufferSize ) { unsigned short iCode = 0; if ( dwBufferSize >= 3 ) { CHAR szResponseCode[ 4 ] = { 0 }; memcpy( szResponseCode, pBuffer, 3 ); szResponseCode[ 3 ] = 0; iCode = atoi( szResponseCode ); } return iCode; } ////////////////////////////////////////////////////////////////////////// inline void CSMTPClient::ParseESMTPExtensions( LPBYTE pBuffer, DWORD dwBufferSize ) { const char *szSubstring = strstr( (const char*)pBuffer, "250-AUTH " ); if ( !szSubstring ) { szSubstring = strstr( (const char*)pBuffer, "250 AUTH " ); } if ( szSubstring ) { const char *szSubstringEnd = strstr( (const char*)szSubstring, "\r\n" ); if ( szSubstringEnd ) { szSubstring += 9; char szAuthMode[ 256 ] = { 0 }; for ( ; szSubstring < szSubstringEnd + 1 ; szSubstring++ ) { if ( *szSubstring == ' ' || *szSubstring == '\r' ) { if ( _strcmpi( szAuthMode, SMTP_COMMAND_AUTH_PLAIN ) == 0 ) { m_aSupportedAuthModes[ m_dwSupportedAuthModesCount ] = AUTH_MODE_PLAIN; m_dwSupportedAuthModesCount++; } else if ( _strcmpi( szAuthMode, SMTP_COMMAND_AUTH_LOGIN ) == 0 ) { m_aSupportedAuthModes[ m_dwSupportedAuthModesCount ] = AUTH_MODE_LOGIN; m_dwSupportedAuthModesCount++; } else if ( _strcmpi( szAuthMode, SMTP_COMMAND_AUTH_CRAM_MD5 ) == 0 ) { m_aSupportedAuthModes[ m_dwSupportedAuthModesCount ] = AUTH_MODE_CRAM_MD5; m_dwSupportedAuthModesCount++; } szAuthMode[ 0 ] = 0; if ( m_dwSupportedAuthModesCount == MAX_AUTH_MODES_COUND ) break; } else { szAuthMode[ strlen( szAuthMode ) + 1 ] = 0; szAuthMode[ strlen( szAuthMode ) ] = *szSubstring; } } } } } ////////////////////////////////////////////////////////////////////////// inline BOOL CSMTPClient::ServerConnect( LPCSTR szServerAddress, const unsigned short iPortNumber ) { if ( m_bConnected ) ServerDisconnect(); m_bConnected = FALSE; m_hSocket = INVALID_SOCKET; m_hSocket = _connectServerSocket( szServerAddress, iPortNumber ); if ( m_hSocket != INVALID_SOCKET ) { DWORD dwReceiveBufferSize = 1024*16; PBYTE pReceiveBuffer = (PBYTE)malloc( dwReceiveBufferSize ); if ( pReceiveBuffer ) { // Connected. Wait server hello string. DWORD iReceived = ReceiveData( m_hSocket, pReceiveBuffer, dwReceiveBufferSize ); if ( iReceived ) { // Check 220 int iResponseCode = GetResponseCode( pReceiveBuffer, iReceived ); if ( iResponseCode != 220 ) { SetErrorText( pReceiveBuffer ); free( pReceiveBuffer ); ServerDisconnect(); return FALSE; } } else { SetErrorText( "ReceiveData error. ", WSAGetLastError() ); free( pReceiveBuffer ); ServerDisconnect(); return FALSE; } // EHLO / HELO BYTE szHelloBuffer[ 256 ]; sprintf( (char*)szHelloBuffer, "%s %s\r\n", (char*)SMTP_COMMAND_EHLO, (char*)szServerAddress ); if ( SendData( m_hSocket, (PBYTE)szHelloBuffer, strlen( (const char*)szHelloBuffer ) ) == 0 ) { SetErrorText( "SendData error.", WSAGetLastError() ); free( pReceiveBuffer ); ServerDisconnect(); return FALSE; } iReceived = ReceiveData( m_hSocket, pReceiveBuffer, dwReceiveBufferSize ); if ( iReceived ) { // Check 250 int iResponseCode = GetResponseCode( pReceiveBuffer, iReceived ); if ( iResponseCode == 500 ) { SetErrorText( pReceiveBuffer ); sprintf( (char*)szHelloBuffer, "%s %s\r\n", (char*)SMTP_COMMAND_HELO, (char*)szServerAddress ); if ( SendData( m_hSocket, (PBYTE)szHelloBuffer, strlen( (const char*)szHelloBuffer ) ) == 0 ) { SetErrorText( "SendData error.", WSAGetLastError() ); free( pReceiveBuffer ); ServerDisconnect(); return FALSE; } iResponseCode = GetResponseCode( pReceiveBuffer, iReceived ); if ( iResponseCode != 250 ) { SetErrorText( pReceiveBuffer ); free( pReceiveBuffer ); ServerDisconnect(); return FALSE; } } else if ( iResponseCode != 250 ) { SetErrorText( pReceiveBuffer ); free( pReceiveBuffer ); ServerDisconnect(); return FALSE; } // Parse AUTH supported modes ParseESMTPExtensions( pReceiveBuffer, iReceived ); } else { SetErrorText( "ReceiveData error.", WSAGetLastError() ); free( pReceiveBuffer ); ServerDisconnect(); return FALSE; } free( pReceiveBuffer ); } } else { return FALSE; } m_bConnected = TRUE; return TRUE; } ////////////////////////////////////////////////////////////////////////// inline BOOL CSMTPClient::ServerConnect( LPCSTR szServerAddress, const unsigned short iPortNumber, LPCSTR szUsername, LPCSTR szPassword ) { BOOL bSuccess = FALSE; bSuccess = ServerConnect( szServerAddress, iPortNumber ); if ( bSuccess ) { if ( GetAuthModeIsSupported( AUTH_MODE_CRAM_MD5 ) ) { ServerLogin( szUsername, szPassword, AUTH_MODE_CRAM_MD5 ); } else if ( GetAuthModeIsSupported( AUTH_MODE_PLAIN ) ) { ServerLogin( szUsername, szPassword, AUTH_MODE_PLAIN ); } else if ( GetAuthModeIsSupported( AUTH_MODE_LOGIN ) ) { ServerLogin( szUsername, szPassword, AUTH_MODE_LOGIN ); } } return bSuccess; } ////////////////////////////////////////////////////////////////////////// inline SOCKET CSMTPClient::_connectServerSocket( LPCSTR szServerAddress, const unsigned short iPortNumber ) { int nConnect; short nProtocolPort = iPortNumber; LPHOSTENT lpHostEnt; SOCKADDR_IN sockAddr; SOCKET hServerSocket = INVALID_SOCKET; lpHostEnt = gethostbyname( szServerAddress ); if (lpHostEnt) { hServerSocket = socket( AF_INET, SOCK_STREAM, IPPROTO_TCP ); if (hServerSocket != INVALID_SOCKET) { sockAddr.sin_family = AF_INET; sockAddr.sin_port = htons( nProtocolPort ); sockAddr.sin_addr = *((LPIN_ADDR)*lpHostEnt->h_addr_list); nConnect = connect( hServerSocket, (PSOCKADDR)&sockAddr, sizeof(sockAddr) ); if ( nConnect != 0 ) { SetErrorText( "connect error.", WSAGetLastError() ); hServerSocket = INVALID_SOCKET; } } else { SetErrorText( "Invalid socket." ); throw; } } else { SetErrorText( "Error retrieving host by name.", WSAGetLastError() ); } return hServerSocket ; } ////////////////////////////////////////////////////////////////////////// inline void CSMTPClient::ServerDisconnect() { if ( m_hSocket != INVALID_SOCKET ) { if ( SendData( m_hSocket, (PBYTE)SMTP_COMMAND_QUIT, strlen( SMTP_COMMAND_QUIT ) ) == 0 ) { SetErrorText( "SendData error.", WSAGetLastError() ); return; } DWORD dwReceiveBufferSize = 1024*16; PBYTE pReceiveBuffer = (PBYTE)malloc( dwReceiveBufferSize ); if ( pReceiveBuffer ) { DWORD iReceived = ReceiveData( m_hSocket, pReceiveBuffer, dwReceiveBufferSize ); if ( iReceived ) SetErrorText( pReceiveBuffer ); free( pReceiveBuffer ); } m_hSocket = INVALID_SOCKET; } m_bConnected = FALSE; } ////////////////////////////////////////////////////////////////////////// inline BOOL CSMTPClient::GetAuthModeIsSupported( int iMode ) { BOOL bSupported = FALSE; for ( int i = 0 ; i < m_dwSupportedAuthModesCount ; i++ ) { if ( m_aSupportedAuthModes[ i ] == iMode ) { bSupported = TRUE; break; } } return bSupported; } ////////////////////////////////////////////////////////////////////////// inline BOOL CSMTPClient::ServerLogin( LPCSTR szUsername, LPCSTR szPassword, int iAuthMode ) { BOOL bSuccess = FALSE; if ( iAuthMode == AUTH_MODE_PLAIN ) { bSuccess = ServerLoginMethodPlain( szUsername, szPassword ); } else if ( iAuthMode == AUTH_MODE_LOGIN ) { bSuccess = ServerLoginMethodLogin( szUsername, szPassword ); } else if ( iAuthMode == AUTH_MODE_CRAM_MD5 ) { bSuccess = ServerLoginMethodCramMD5( szUsername, szPassword ); } return bSuccess; } ////////////////////////////////////////////////////////////////////////// inline BOOL CSMTPClient::ServerLogin( LPCSTR szUsername, LPCSTR szPassword ) { BOOL bSuccess = FALSE; if ( GetAuthModeIsSupported( AUTH_MODE_CRAM_MD5 ) ) { bSuccess = ServerLogin( szUsername, szPassword, AUTH_MODE_CRAM_MD5 ); } else if ( GetAuthModeIsSupported( AUTH_MODE_PLAIN ) ) { bSuccess = ServerLogin( szUsername, szPassword, AUTH_MODE_PLAIN ); } else if ( GetAuthModeIsSupported( AUTH_MODE_LOGIN ) ) { bSuccess = ServerLogin( szUsername, szPassword, AUTH_MODE_LOGIN ); } return bSuccess; } ////////////////////////////////////////////////////////////////////////// inline BOOL CSMTPClient::ServerLoginMethodPlain( LPCSTR szUsername, LPCSTR szPassword ) { BOOL bSuccess = FALSE; BYTE szCommandBuffer[ 256 ]; sprintf( (char*)szCommandBuffer, "%s %s\r\n", (char*)SMTP_COMMAND_AUTH, (char*)SMTP_COMMAND_AUTH_PLAIN ); if ( SendData( m_hSocket, (PBYTE)szCommandBuffer, strlen( (const char*)szCommandBuffer ) ) == 0 ) { SetErrorText( "SendData error.", WSAGetLastError() ); return FALSE; } DWORD dwReceiveBufferSize = 1024*16; PBYTE pReceiveBuffer = (PBYTE)malloc( dwReceiveBufferSize ); if ( pReceiveBuffer ) { // Connected. Wait server hello string. DWORD iReceived = ReceiveData( m_hSocket, pReceiveBuffer, dwReceiveBufferSize ); if ( iReceived ) { SetErrorText( pReceiveBuffer ); // Check 334 int iResponseCode = GetResponseCode( pReceiveBuffer, iReceived ); if ( iResponseCode != 334 ) { free( pReceiveBuffer ); return FALSE; } } else { SetErrorText( "ReceiveData error.", WSAGetLastError() ); free( pReceiveBuffer ); return FALSE; } // Encode. DWORD dwLoginBuffer = strlen( szUsername ) + strlen( szPassword ) + 3; char *pLoginBuffer = (char*)malloc( dwLoginBuffer ); if ( pLoginBuffer ) { ZeroMemory( pLoginBuffer, dwLoginBuffer ); strcpy( pLoginBuffer + 1, szUsername ); strcpy( pLoginBuffer + 1 + strlen( szUsername ) + 1, szPassword ); Base64Coder coder; coder.Encode( (const PBYTE)pLoginBuffer, dwLoginBuffer - 1 ); LPCSTR szLoginBufferEncoded = coder.EncodedMessage(); if ( szLoginBufferEncoded && strlen( szLoginBufferEncoded ) > 0 ) { DWORD dwSendBufferSize = strlen( szLoginBufferEncoded ) + 4; char* pSendBuffer = (char*)malloc( dwSendBufferSize ); if ( pSendBuffer ) { strcpy( pSendBuffer, szLoginBufferEncoded ); strcat( pSendBuffer, "\r\n" ); if ( SendData( m_hSocket, (PBYTE)pSendBuffer, strlen( (const char*)pSendBuffer ) ) == 0 ) { SetErrorText( "SendData error.", WSAGetLastError() ); free( pSendBuffer ); free( pLoginBuffer ); free( pReceiveBuffer ); return FALSE; } free( pSendBuffer ); } } free( pLoginBuffer ); // check result iReceived = ReceiveData( m_hSocket, pReceiveBuffer, dwReceiveBufferSize ); if ( iReceived ) { SetErrorText( pReceiveBuffer ); // Check 235 int iResponseCode = GetResponseCode( pReceiveBuffer, iReceived ); if ( iResponseCode != 235 ) { free( pReceiveBuffer ); return FALSE; } bSuccess = TRUE; } else { SetErrorText( "ReceiveData error.", WSAGetLastError() ); free( pReceiveBuffer ); return FALSE; } } free( pReceiveBuffer ); } return bSuccess; } ////////////////////////////////////////////////////////////////////////// inline BOOL CSMTPClient::ServerLoginMethodLogin( LPCSTR szUsername, LPCSTR szPassword ) { BOOL bSuccess = FALSE; BYTE szCommandBuffer[ 256 ]; sprintf( (char*)szCommandBuffer, "%s %s\r\n", (char*)SMTP_COMMAND_AUTH, (char*)SMTP_COMMAND_AUTH_LOGIN ); if ( SendData( m_hSocket, (PBYTE)szCommandBuffer, strlen( (const char*)szCommandBuffer ) ) == 0 ) { SetErrorText( "SendData error.", WSAGetLastError() ); return FALSE; } DWORD dwReceiveBufferSize = 1024*16; PBYTE pReceiveBuffer = (PBYTE)malloc( dwReceiveBufferSize ); if ( pReceiveBuffer ) { DWORD iReceived = ReceiveData( m_hSocket, pReceiveBuffer, dwReceiveBufferSize ); if ( iReceived ) { SetErrorText( pReceiveBuffer ); // Check 334 int iResponseCode = GetResponseCode( pReceiveBuffer, iReceived ); if ( iResponseCode != 334 ) { free( pReceiveBuffer ); return FALSE; } // Check request if ( iReceived > 6 ) { Base64Coder coder; coder.Decode( pReceiveBuffer + 4, iReceived - 6 ); LPCSTR szRequest = coder.DecodedMessage(); if ( szRequest && strlen( szRequest ) > 0 ) { if ( strcmpi( szRequest, "Username:" ) == 0 ) { coder.Encode( (const PBYTE)szUsername, strlen( szUsername ) ); LPCSTR szUsernameEncoded = coder.EncodedMessage(); char* szLoginUsernameBuffer = (char*)malloc( strlen( szUsernameEncoded ) + 4 ); if ( szLoginUsernameBuffer ) { strcpy( szLoginUsernameBuffer, szUsernameEncoded ); strcat( szLoginUsernameBuffer, "\r\n" ); if ( SendData( m_hSocket, (PBYTE)szLoginUsernameBuffer, strlen( (const char*)szLoginUsernameBuffer ) ) == 0 ) { SetErrorText( "SendData error.", WSAGetLastError() ); free( pReceiveBuffer ); return FALSE; } free( szLoginUsernameBuffer ); } else { free( pReceiveBuffer ); return FALSE; } iReceived = ReceiveData( m_hSocket, pReceiveBuffer, dwReceiveBufferSize ); if ( iReceived ) { SetErrorText( pReceiveBuffer ); // Check 334 int iResponseCode = GetResponseCode( pReceiveBuffer, iReceived ); if ( iResponseCode != 334 ) { free( pReceiveBuffer ); return FALSE; } // Check request if ( iReceived > 6 ) { coder.Decode( pReceiveBuffer + 4, iReceived - 6 ); LPCSTR szRequest2 = coder.DecodedMessage(); if ( szRequest2 && strlen( szRequest2 ) > 0 ) { if ( strcmpi( szRequest2, "Password:" ) == 0 ) { coder.Encode( (const PBYTE)szPassword, strlen( szPassword ) ); LPCSTR szPasswordEncoded = coder.EncodedMessage(); char* szLoginPasswordBuffer = (char*)malloc( strlen( szPasswordEncoded ) + 4 ); if ( szLoginPasswordBuffer ) { strcpy( szLoginPasswordBuffer, szPasswordEncoded ); strcat( szLoginPasswordBuffer, "\r\n" ); if ( SendData( m_hSocket, (PBYTE)szLoginPasswordBuffer, strlen( (const char*)szLoginPasswordBuffer ) ) == 0 ) { SetErrorText( "SendData error.", WSAGetLastError() ); free( pReceiveBuffer ); return FALSE; } free( szLoginPasswordBuffer ); } else { free( pReceiveBuffer ); return FALSE; } iReceived = ReceiveData( m_hSocket, pReceiveBuffer, dwReceiveBufferSize ); if ( iReceived ) { SetErrorText( pReceiveBuffer ); // Check 235 int iResponseCode = GetResponseCode( pReceiveBuffer, iReceived ); if ( iResponseCode != 235 ) { free( pReceiveBuffer ); return FALSE; } bSuccess = TRUE; } else { SetErrorText( "ReceiveData error.", WSAGetLastError() ); free( pReceiveBuffer ); return FALSE; } } } } } else { free( pReceiveBuffer ); return FALSE; } } } else { free( pReceiveBuffer ); return FALSE; } } else { free( pReceiveBuffer ); return FALSE; } } else { SetErrorText( "ReceiveData error.", WSAGetLastError() ); free( pReceiveBuffer ); return FALSE; } free( pReceiveBuffer ); } return bSuccess; } ////////////////////////////////////////////////////////////////////////// inline BOOL CSMTPClient::ServerLoginMethodCramMD5( LPCSTR szUsername, LPCSTR szPassword ) { BOOL bSuccess = FALSE; BYTE szCommandBuffer[ 256 ]; sprintf( (char*)szCommandBuffer, "%s %s\r\n", (char*)SMTP_COMMAND_AUTH, (char*)SMTP_COMMAND_AUTH_CRAM_MD5 ); if ( SendData( m_hSocket, (PBYTE)szCommandBuffer, strlen( (const char*)szCommandBuffer ) ) == 0 ) { SetErrorText( "SendData error.", WSAGetLastError() ); return FALSE; } DWORD dwReceiveBufferSize = 1024*16; PBYTE pReceiveBuffer = (PBYTE)malloc( dwReceiveBufferSize ); if ( pReceiveBuffer ) { // Connected. Wait server hello string. DWORD iReceived = ReceiveData( m_hSocket, pReceiveBuffer, dwReceiveBufferSize ); if ( iReceived ) { SetErrorText( pReceiveBuffer ); // Check 334 int iResponseCode = GetResponseCode( pReceiveBuffer, iReceived ); if ( iResponseCode != 334 ) { free( pReceiveBuffer ); return FALSE; } // Check request if ( iReceived > 6 ) { Base64Coder coder; coder.Decode( pReceiveBuffer + 4, iReceived - 6 ); LPCSTR szResponse = coder.DecodedMessage(); if ( szResponse && strlen( szResponse ) > 0 ) { char *auth_hex = hash_md5( szPassword, szResponse, strlen(szResponse) ); if ( !auth_hex ) { free( pReceiveBuffer ); return FALSE; } char *szCommand = (char*)malloc( strlen( szUsername ) + strlen( auth_hex ) + 5 ); if ( szCommand ) { sprintf( szCommand, "%s %s", szUsername, auth_hex ); free( auth_hex ); coder.Encode( (const PBYTE)szCommand, strlen( szCommand ) ); free( szCommand ); LPCSTR szAuthEncoded = coder.EncodedMessage(); if ( szAuthEncoded == NULL ) { free( pReceiveBuffer ); return FALSE; } char *szAuthCommand = (char*)malloc( strlen( szAuthEncoded ) + 4 ); if ( szAuthCommand ) { strcpy( szAuthCommand, szAuthEncoded ); strcat( szAuthCommand, "\r\n" ); // Send auth data if ( SendData( m_hSocket, (PBYTE)szAuthCommand, strlen( (const char*)szAuthCommand ) ) == 0 ) { SetErrorText( "SendData error.", WSAGetLastError() ); free( szAuthCommand ); free( pReceiveBuffer ); return FALSE; } // Check response iReceived = ReceiveData( m_hSocket, pReceiveBuffer, dwReceiveBufferSize ); if ( iReceived ) { SetErrorText( pReceiveBuffer ); // Check 235 int iResponseCode = GetResponseCode( pReceiveBuffer, iReceived ); if ( iResponseCode != 235 ) { free( pReceiveBuffer ); return FALSE; } bSuccess = TRUE; } else { SetErrorText( "ReceiveData error.", WSAGetLastError() ); free( pReceiveBuffer ); return FALSE; } free( szAuthCommand ); } else { free( pReceiveBuffer ); return FALSE; } } else { free( auth_hex ); free( pReceiveBuffer ); return FALSE; } } else { free( pReceiveBuffer ); return FALSE; } } } else { SetErrorText( "ReceiveData error.", WSAGetLastError() ); free( pReceiveBuffer ); return FALSE; } free( pReceiveBuffer ); } else { SetErrorText( "malloc() failed.", GetLastError() ); } return bSuccess; } ////////////////////////////////////////////////////////////////////////// inline BOOL CSMTPClient::SendMessage( LPCSTR szFromAddress, LPCSTR szFromName, LPCSTR szToAddresses, LPCSTR szSubject, LPCSTR szXMailer, LPBYTE pBodyBuffer, DWORD dwBodySize ) { BOOL bSuccess = FALSE; // Format Header if ( !szFromAddress ) { SetErrorText( "SendMessage. Invalid Parameters!" ); return NULL; } char *szHeaderBuffer = (char*)malloc( 1024 * 16 ); if ( szHeaderBuffer ) { // get the current date and time char szDate[ 500 ]; char sztTime[ 500 ]; SYSTEMTIME st = { 0 }; ::GetSystemTime(&st); ::GetDateFormatA( MAKELCID( MAKELANGID( LANG_ENGLISH, SUBLANG_ENGLISH_US), SORT_DEFAULT), 0, &st, "ddd',' dd MMM yyyy", szDate , sizeof( szDate ) ); ::GetTimeFormatA( MAKELCID( MAKELANGID( LANG_ENGLISH, SUBLANG_ENGLISH_US), SORT_DEFAULT), TIME_FORCE24HOURFORMAT, &st, "HH':'mm':'ss", sztTime, sizeof( sztTime ) ); sprintf( szHeaderBuffer, "DATE: %s %s\r\n", szDate, sztTime ); // X-Mailer Field if ( szXMailer && strlen( szXMailer ) ) { strcat( szHeaderBuffer, "X-Mailer: " ); strcat( szHeaderBuffer, szXMailer ); strcat( szHeaderBuffer, "\r\n" ); } // From: strcat( szHeaderBuffer, "From: " ); if ( szFromName ) { strcat( szHeaderBuffer, "\"" ); strcat( szHeaderBuffer, szFromName ); strcat( szHeaderBuffer, "\" <" ); strcat( szHeaderBuffer, szFromAddress ); strcat( szHeaderBuffer, ">\r\n" ); } else { strcat( szHeaderBuffer, "<" ); strcat( szHeaderBuffer, szFromAddress ); strcat( szHeaderBuffer, ">\r\n" ); } // Subject: if ( szSubject && strlen( szSubject ) ) { strcat( szHeaderBuffer, "Subject: " ); strcat( szHeaderBuffer, szSubject ); strcat( szHeaderBuffer, "\r\n" ); } // To Fields strcat( szHeaderBuffer, "To: " ); strcat( szHeaderBuffer, szToAddresses ); strcat( szHeaderBuffer, "\r\n" ); // MIME strcat( szHeaderBuffer, "MIME-Version: 1.0\r\nContent-type: text/plain; charset=US-ASCII\r\n" ); // End Header strcat( szHeaderBuffer, "\r\n" ); } else { SetErrorText( "malloc error.", GetLastError() ); return FALSE; } BYTE szCommandBuffer[ 256 ]; sprintf( (char*)szCommandBuffer, "MAIL FROM:<%s> SIZE=%u\r\n", (char*)szFromAddress, strlen( szHeaderBuffer ) + dwBodySize + 2 ); if ( SendData( m_hSocket, (PBYTE)szCommandBuffer, strlen( (const char*)szCommandBuffer ) ) == 0 ) { SetErrorText( "SendData error.", WSAGetLastError() ); free( szHeaderBuffer ); return FALSE; } DWORD dwReceiveBufferSize = 1024*16; PBYTE pReceiveBuffer = (PBYTE)malloc( dwReceiveBufferSize ); if ( pReceiveBuffer ) { DWORD iReceived = ReceiveData( m_hSocket, pReceiveBuffer, dwReceiveBufferSize ); if ( iReceived ) { SetErrorText( pReceiveBuffer ); // Check 250 int iResponseCode = GetResponseCode( pReceiveBuffer, iReceived ); if ( iResponseCode != 250 ) { free( szHeaderBuffer ); free( pReceiveBuffer ); return FALSE; } } else { SetErrorText( "ReceiveData error.", WSAGetLastError() ); free( szHeaderBuffer ); free( pReceiveBuffer ); return FALSE; } // Post "RCTP TO:" char *szCurrentAddr = (char*)malloc( strlen( szToAddresses ) + 1 ); if ( !szCurrentAddr ) { SetErrorText( "malloc error.", GetLastError() ); free( szHeaderBuffer ); free( pReceiveBuffer ); return FALSE; } const char* szToOffset = szToAddresses; char* szZap = NULL; BOOL bRCPTAccepted = FALSE; do { strcpy( szCurrentAddr, szToOffset ); char *szExtractedAdress = szCurrentAddr; szZap = strchr( szCurrentAddr, ',' ); if ( szZap ) { *szZap = 0; szToOffset = szZap + 1; } char *pSkobka1 = strchr( szCurrentAddr, '<' ); char *pSkobka2 = strchr( szCurrentAddr, '>' ); if ( pSkobka1 && pSkobka2 && pSkobka2 > pSkobka1 ) { szExtractedAdress = pSkobka1 + 1; *pSkobka2 = NULL; } if ( szExtractedAdress && strlen( szExtractedAdress ) > 0 ) { sprintf( (char*)szCommandBuffer, "RCPT TO:<%s>\r\n", (char*)szExtractedAdress ); if ( SendData( m_hSocket, (PBYTE)szCommandBuffer, strlen( (const char*)szCommandBuffer ) ) == 0 ) { SetErrorText( "SendData error.", WSAGetLastError() ); free( szCurrentAddr ); free( pReceiveBuffer ); free( szHeaderBuffer ); return FALSE; } iReceived = ReceiveData( m_hSocket, pReceiveBuffer, dwReceiveBufferSize ); if ( iReceived ) { SetErrorText( pReceiveBuffer ); // Check 250 int iResponseCode = GetResponseCode( pReceiveBuffer, iReceived ); if ( iResponseCode == 250 ) { bRCPTAccepted = TRUE; } } else { SetErrorText( "ReceiveData error.", WSAGetLastError() ); free( szCurrentAddr ); free( pReceiveBuffer ); free( szHeaderBuffer ); return FALSE; } } } while( szZap ); free( szCurrentAddr ); if ( bRCPTAccepted ) { sprintf( (char*)szCommandBuffer, "DATA\r\n" ); if ( SendData( m_hSocket, (PBYTE)szCommandBuffer, strlen( (const char*)szCommandBuffer ) ) == 0 ) { SetErrorText( "SendData error.", WSAGetLastError() ); free( pReceiveBuffer ); free( szHeaderBuffer ); return FALSE; } iReceived = ReceiveData( m_hSocket, pReceiveBuffer, dwReceiveBufferSize ); if ( iReceived ) { SetErrorText( pReceiveBuffer ); // Check 354 int iResponseCode = GetResponseCode( pReceiveBuffer, iReceived ); if ( iResponseCode != 354 ) { free( pReceiveBuffer ); free( szHeaderBuffer ); return FALSE; } } else { SetErrorText( "ReceiveData error.", WSAGetLastError() ); free( pReceiveBuffer ); free( szHeaderBuffer ); return FALSE; } // Send message data (header + body + .) if ( SendData( m_hSocket, (PBYTE)szHeaderBuffer, strlen( (const char*)szHeaderBuffer ) ) == 0 ) { SetErrorText( "SendData error.", WSAGetLastError() ); free( pReceiveBuffer ); free( szHeaderBuffer ); return FALSE; } if ( SendData( m_hSocket, (PBYTE)pBodyBuffer, dwBodySize ) == 0 ) { SetErrorText( "SendData error.", WSAGetLastError() ); free( pReceiveBuffer ); free( szHeaderBuffer ); return FALSE; } if ( SendData( m_hSocket, (PBYTE)"\r\n.\r\n", 5 ) == 0 ) { SetErrorText( "SendData error.", WSAGetLastError() ); free( pReceiveBuffer ); free( szHeaderBuffer ); return FALSE; } iReceived = ReceiveData( m_hSocket, pReceiveBuffer, dwReceiveBufferSize ); if ( iReceived ) { SetErrorText( pReceiveBuffer ); // Check 250 int iResponseCode = GetResponseCode( pReceiveBuffer, iReceived ); if ( iResponseCode == 250 ) { bSuccess = TRUE; } } else { SetErrorText( "ReceiveData error.", WSAGetLastError() ); } } free( pReceiveBuffer ); } else { SetErrorText( "malloc error.", GetLastError() ); } if ( szHeaderBuffer ) free( szHeaderBuffer ); return bSuccess; } ////////////////////////////////////////////////////////////////////////// ////////////////////////////////////////////////////////////////////////// ////////////////////////////////////////////////////////////////////////// ////////////////////////////////////////////////////////////////////////// #ifndef PAGESIZE #define PAGESIZE 4096 #endif #ifndef ROUNDTOPAGE #define ROUNDTOPAGE(a) (((a/4096)+1)*4096) #endif ////////////////////////////////////////////////////////////////////// // Construction/Destruction ////////////////////////////////////////////////////////////////////// inline Base64Coder::Base64Coder() : m_pDBuffer(NULL), m_pEBuffer(NULL), m_nDBufLen(0), m_nEBufLen(0) { } inline Base64Coder::~Base64Coder() { if(m_pDBuffer != NULL) delete [] m_pDBuffer; if(m_pEBuffer != NULL) delete [] m_pEBuffer; } inline LPCSTR Base64Coder::DecodedMessage() const { return (LPCSTR) m_pDBuffer; } inline LPCSTR Base64Coder::EncodedMessage() const { return (LPCSTR) m_pEBuffer; } inline void Base64Coder::AllocEncode(DWORD nSize) { if(m_nEBufLen < nSize) { if(m_pEBuffer != NULL) delete [] m_pEBuffer; m_nEBufLen = ROUNDTOPAGE(nSize); m_pEBuffer = new BYTE[m_nEBufLen]; } ::ZeroMemory(m_pEBuffer, m_nEBufLen); m_nEDataLen = 0; } inline void Base64Coder::AllocDecode(DWORD nSize) { if(m_nDBufLen < nSize) { if(m_pDBuffer != NULL) delete [] m_pDBuffer; m_nDBufLen = ROUNDTOPAGE(nSize); m_pDBuffer = new BYTE[m_nDBufLen]; } ::ZeroMemory(m_pDBuffer, m_nDBufLen); m_nDDataLen = 0; } inline void Base64Coder::SetEncodeBuffer(const PBYTE pBuffer, DWORD nBufLen) { DWORD i = 0; AllocEncode(nBufLen); while(i < nBufLen) { if(!_IsBadMimeChar(pBuffer[i])) { m_pEBuffer[m_nEDataLen] = pBuffer[i]; m_nEDataLen++; } i++; } } inline void Base64Coder::SetDecodeBuffer(const PBYTE pBuffer, DWORD nBufLen) { AllocDecode(nBufLen); ::CopyMemory(m_pDBuffer, pBuffer, nBufLen); m_nDDataLen = nBufLen; } inline void Base64Coder::Encode(const PBYTE pBuffer, DWORD nBufLen) { SetDecodeBuffer(pBuffer, nBufLen); AllocEncode(nBufLen * 2); TempBucket Raw; DWORD nIndex = 0; while((nIndex + 3) <= nBufLen) { Raw.Clear(); ::CopyMemory(&Raw, m_pDBuffer + nIndex, 3); Raw.nSize = 3; _EncodeToBuffer(Raw, m_pEBuffer + m_nEDataLen); nIndex += 3; m_nEDataLen += 4; } if(nBufLen > nIndex) { Raw.Clear(); Raw.nSize = (BYTE) (nBufLen - nIndex); ::CopyMemory(&Raw, m_pDBuffer + nIndex, nBufLen - nIndex); _EncodeToBuffer(Raw, m_pEBuffer + m_nEDataLen); m_nEDataLen += 4; } } inline void Base64Coder::Encode(LPCSTR szMessage) { if(szMessage != NULL) Base64Coder::Encode((const PBYTE)szMessage, strlen( (const char*)szMessage)); } inline void Base64Coder::Decode(const PBYTE pBuffer, DWORD dwBufLen) { if(is_init()) _Init(); SetEncodeBuffer(pBuffer, dwBufLen); AllocDecode(dwBufLen); TempBucket Raw; DWORD nIndex = 0; while((nIndex + 4) <= m_nEDataLen) { Raw.Clear(); Raw.nData[0] = DecodeTable()[m_pEBuffer[nIndex]]; Raw.nData[1] = DecodeTable()[m_pEBuffer[nIndex + 1]]; Raw.nData[2] = DecodeTable()[m_pEBuffer[nIndex + 2]]; Raw.nData[3] = DecodeTable()[m_pEBuffer[nIndex + 3]]; if(Raw.nData[2] == 255) Raw.nData[2] = 0; if(Raw.nData[3] == 255) Raw.nData[3] = 0; Raw.nSize = 4; _DecodeToBuffer(Raw, m_pDBuffer + m_nDDataLen); nIndex += 4; m_nDDataLen += 3; } // If nIndex < m_nEDataLen, then we got a decode message without padding. // We may want to throw some kind of warning here, but we are still required // to handle the decoding as if it was properly padded. if(nIndex < m_nEDataLen) { Raw.Clear(); for(DWORD i = nIndex; i < m_nEDataLen; i++) { Raw.nData[i - nIndex] = DecodeTable()[m_pEBuffer[i]]; Raw.nSize++; if(Raw.nData[i - nIndex] == 255) Raw.nData[i - nIndex] = 0; } _DecodeToBuffer(Raw, m_pDBuffer + m_nDDataLen); m_nDDataLen += (m_nEDataLen - nIndex); } } inline void Base64Coder::Decode(LPCSTR szMessage) { if(szMessage != NULL) Base64Coder::Decode((const PBYTE)szMessage, strlen((const char*)szMessage)); } inline DWORD Base64Coder::_DecodeToBuffer(const TempBucket &Decode, PBYTE pBuffer) { TempBucket Data; DWORD nCount = 0; _DecodeRaw(Data, Decode); for(int i = 0; i < 3; i++) { pBuffer[i] = Data.nData[i]; if(pBuffer[i] != 255) nCount++; } return nCount; } inline void Base64Coder::_EncodeToBuffer(const TempBucket &Decode, PBYTE pBuffer) { TempBucket Data; _EncodeRaw(Data, Decode); for(int i = 0; i < 4; i++) pBuffer[i] = Base64Digits()[Data.nData[i]]; switch(Decode.nSize) { case 1: pBuffer[2] = '='; case 2: pBuffer[3] = '='; } } inline void Base64Coder::_DecodeRaw(TempBucket &Data, const TempBucket &Decode) { BYTE nTemp; Data.nData[0] = Decode.nData[0]; Data.nData[0] <<= 2; nTemp = Decode.nData[1]; nTemp >>= 4; nTemp &= 0x03; Data.nData[0] |= nTemp; Data.nData[1] = Decode.nData[1]; Data.nData[1] <<= 4; nTemp = Decode.nData[2]; nTemp >>= 2; nTemp &= 0x0F; Data.nData[1] |= nTemp; Data.nData[2] = Decode.nData[2]; Data.nData[2] <<= 6; nTemp = Decode.nData[3]; nTemp &= 0x3F; Data.nData[2] |= nTemp; } inline void Base64Coder::_EncodeRaw(TempBucket &Data, const TempBucket &Decode) { BYTE nTemp; Data.nData[0] = Decode.nData[0]; Data.nData[0] >>= 2; Data.nData[1] = Decode.nData[0]; Data.nData[1] <<= 4; nTemp = Decode.nData[1]; nTemp >>= 4; Data.nData[1] |= nTemp; Data.nData[1] &= 0x3F; Data.nData[2] = Decode.nData[1]; Data.nData[2] <<= 2; nTemp = Decode.nData[2]; nTemp >>= 6; Data.nData[2] |= nTemp; Data.nData[2] &= 0x3F; Data.nData[3] = Decode.nData[2]; Data.nData[3] &= 0x3F; } inline BOOL Base64Coder::_IsBadMimeChar(BYTE nData) { switch(nData) { case '\r': case '\n': case '\t': case ' ' : case '\b': case '\a': case '\f': case '\v': return TRUE; default: return FALSE; } } inline void Base64Coder::_Init() { // Initialize Decoding table. int i; for(i = 0; i < 256; i++) DecodeTable()[i] = -2; for(i = 0; i < 64; i++) { DecodeTable()[Base64Digits()[i]] = i; DecodeTable()[Base64Digits()[i]|0x80] = i; } DecodeTable()['='] = -1; DecodeTable()['='|0x80] = -1; is_init() = TRUE; } } } }