mk-conf.sh: avoid "reserved identifier" warning
[s-mailx.git] / smtp.c
blob48a7224e02f53fa51ec6d424f38514cb7f94a42d
1 /*@ S-nail - a mail user agent derived from Berkeley Mail.
2 *@ SMTP client.
3 *@ TODO - use initial responses to save a round-trip (RFC 4954)
4 *@ TODO - more (verbose) understanding+rection upon STATUS CODES
6 * Copyright (c) 2000-2004 Gunnar Ritter, Freiburg i. Br., Germany.
7 * Copyright (c) 2012 - 2015 Steffen (Daode) Nurpmeso <sdaoden@users.sf.net>.
8 */
9 /*
10 * Copyright (c) 2000
11 * Gunnar Ritter. All rights reserved.
13 * Redistribution and use in source and binary forms, with or without
14 * modification, are permitted provided that the following conditions
15 * are met:
16 * 1. Redistributions of source code must retain the above copyright
17 * notice, this list of conditions and the following disclaimer.
18 * 2. Redistributions in binary form must reproduce the above copyright
19 * notice, this list of conditions and the following disclaimer in the
20 * documentation and/or other materials provided with the distribution.
21 * 3. All advertising materials mentioning features or use of this software
22 * must display the following acknowledgement:
23 * This product includes software developed by Gunnar Ritter
24 * and his contributors.
25 * 4. Neither the name of Gunnar Ritter nor the names of his contributors
26 * may be used to endorse or promote products derived from this software
27 * without specific prior written permission.
29 * THIS SOFTWARE IS PROVIDED BY GUNNAR RITTER AND CONTRIBUTORS ``AS IS'' AND
30 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
31 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
32 * ARE DISCLAIMED. IN NO EVENT SHALL GUNNAR RITTER OR CONTRIBUTORS BE LIABLE
33 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
34 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
35 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
36 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
37 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
38 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
39 * SUCH DAMAGE.
41 #undef n_FILE
42 #define n_FILE smtp
44 #ifndef HAVE_AMALGAMATION
45 # include "nail.h"
46 #endif
48 EMPTY_FILE()
49 #ifdef HAVE_SMTP
50 #include <sys/socket.h>
52 struct smtp_line {
53 char *dat; /* Actual data */
54 size_t datlen;
55 char *buf; /* Memory buffer */
56 size_t bufsize;
59 static sigjmp_buf _smtp_jmp;
61 static void _smtp_onterm(int signo);
63 /* Get the SMTP server's answer, expecting val */
64 static int _smtp_read(struct sock *sp, struct smtp_line *slp, int val,
65 bool_t ign_eof, bool_t want_dat);
67 /* Talk to a SMTP server */
68 static bool_t _smtp_talk(struct sock *sp, struct sendbundle *sbp);
70 #ifdef HAVE_GSSAPI
71 static bool_t _smtp_gssapi(struct sock *sp, struct sendbundle *sbp,
72 struct smtp_line *slp);
73 #endif
75 static void
76 _smtp_onterm(int signo)
78 NYD_X; /* Signal handler */
79 UNUSED(signo);
80 siglongjmp(_smtp_jmp, 1);
83 static int
84 _smtp_read(struct sock *sp, struct smtp_line *slp, int val,
85 bool_t ign_eof, bool_t want_dat)
87 int rv, len;
88 char *cp;
89 NYD_ENTER;
91 do {
92 if ((len = sgetline(&slp->buf, &slp->bufsize, NULL, sp)) < 6) {
93 if (len >= 0 && !ign_eof)
94 n_err(_("Unexpected EOF on SMTP connection\n"));
95 rv = -1;
96 goto jleave;
98 if (options & OPT_VERBVERB)
99 n_err(slp->buf);
100 switch (slp->buf[0]) {
101 case '1': rv = 1; break;
102 case '2': rv = 2; break;
103 case '3': rv = 3; break;
104 case '4': rv = 4; break;
105 default: rv = 5; break;
107 if (val != rv)
108 n_err(_("smtp-server: %s"), slp->buf);
109 } while (slp->buf[3] == '-');
111 if (want_dat) {
112 for (cp = slp->buf; digitchar(*cp); --len, ++cp)
114 for (; blankchar(*cp); --len, ++cp)
116 slp->dat = cp;
117 assert(len >= 2);
118 len -= 2;
119 cp[slp->datlen = (size_t)len] = '\0';
121 jleave:
122 NYD_LEAVE;
123 return rv;
126 /* Indirect SMTP I/O */
127 #define _ANSWER(X, IGNEOF, WANTDAT) \
128 do if (!(options & OPT_DEBUG)) {\
129 int y;\
130 if ((y = _smtp_read(sp, slp, X, IGNEOF, WANTDAT)) != (X) &&\
131 (!(IGNEOF) || y != -1))\
132 goto jleave;\
133 } while (0)
134 #define _OUT(X) \
135 do {\
136 if (options & OPT_VERBVERB)\
137 n_err(">>> %s", X);\
138 if (!(options & OPT_DEBUG))\
139 swrite(sp, X);\
140 } while (0)
142 static bool_t
143 _smtp_talk(struct sock *sp, struct sendbundle *sbp)
145 char o[LINESIZE], *hostname;
146 struct smtp_line _sl, *slp = &_sl;
147 struct str b64;
148 struct name *n;
149 size_t blen, cnt;
150 bool_t inhdr = TRU1, inbcc = FAL0, rv = FAL0;
151 NYD_ENTER;
153 hostname = nodename(TRU1);
154 slp->buf = NULL;
155 slp->bufsize = 0;
157 /* Read greeting */
158 _ANSWER(2, FAL0, FAL0);
160 #ifdef HAVE_SSL
161 if (!sp->s_use_ssl && xok_blook(smtp_use_starttls, &sbp->sb_url, OXM_ALL)) {
162 snprintf(o, sizeof o, NETLINE("EHLO %s"), hostname);
163 _OUT(o);
164 _ANSWER(2, FAL0, FAL0);
166 _OUT(NETLINE("STARTTLS"));
167 _ANSWER(2, FAL0, FAL0);
169 if (!(options & OPT_DEBUG) && ssl_open(&sbp->sb_url, sp) != OKAY)
170 goto jleave;
172 #else
173 if (xok_blook(smtp_use_starttls, &sbp->sb_url, OXM_ALL)) {
174 n_err(_("No SSL support compiled in\n"));
175 goto jleave;
177 #endif
179 /* Shorthand: no authentication, plain HELO? */
180 if (sbp->sb_ccred.cc_authtype == AUTHTYPE_NONE) {
181 snprintf(o, sizeof o, NETLINE("HELO %s"), hostname);
182 _OUT(o);
183 _ANSWER(2, FAL0, FAL0);
184 goto jsend;
187 /* We'll have to deal with authentication */
188 snprintf(o, sizeof o, NETLINE("EHLO %s"), hostname);
189 _OUT(o);
190 _ANSWER(2, FAL0, FAL0);
192 switch (sbp->sb_ccred.cc_authtype) {
193 default:
194 /* FALLTHRU (doesn't happen) */
195 case AUTHTYPE_PLAIN:
196 _OUT(NETLINE("AUTH PLAIN"));
197 _ANSWER(3, FAL0, FAL0);
199 snprintf(o, sizeof o, "%c%s%c%s",
200 '\0', sbp->sb_ccred.cc_user.s, '\0', sbp->sb_ccred.cc_pass.s);
201 b64_encode_buf(&b64, o,
202 sbp->sb_ccred.cc_user.l + sbp->sb_ccred.cc_pass.l + 2,
203 B64_SALLOC | B64_CRLF);
204 _OUT(b64.s);
205 _ANSWER(2, FAL0, FAL0);
206 break;
207 case AUTHTYPE_LOGIN:
208 _OUT(NETLINE("AUTH LOGIN"));
209 _ANSWER(3, FAL0, FAL0);
211 b64_encode_cp(&b64, sbp->sb_ccred.cc_user.s, B64_SALLOC | B64_CRLF);
212 _OUT(b64.s);
213 _ANSWER(3, FAL0, FAL0);
215 b64_encode_cp(&b64, sbp->sb_ccred.cc_pass.s, B64_SALLOC | B64_CRLF);
216 _OUT(b64.s);
217 _ANSWER(2, FAL0, FAL0);
218 break;
219 #ifdef HAVE_MD5
220 case AUTHTYPE_CRAM_MD5:
221 _OUT(NETLINE("AUTH CRAM-MD5"));
222 _ANSWER(3, FAL0, TRU1);
223 { char *cp = cram_md5_string(&sbp->sb_ccred.cc_user,
224 &sbp->sb_ccred.cc_pass, slp->dat);
225 _OUT(cp);
227 _ANSWER(2, FAL0, FAL0);
228 break;
229 #endif
230 #ifdef HAVE_GSSAPI
231 case AUTHTYPE_GSSAPI:
232 if (options & OPT_DEBUG)
233 n_err(_(">>> We would perform GSS-API authentication now\n"));
234 else if (!_smtp_gssapi(sp, sbp, slp))
235 goto jleave;
236 break;
237 #endif
240 jsend:
241 snprintf(o, sizeof o, NETLINE("MAIL FROM:<%s>"), sbp->sb_url.url_u_h.s);
242 _OUT(o);
243 _ANSWER(2, FAL0, FAL0);
245 for (n = sbp->sb_to; n != NULL; n = n->n_flink) {
246 if (!(n->n_type & GDEL)) {
247 snprintf(o, sizeof o, NETLINE("RCPT TO:<%s>"), skinned_name(n));
248 _OUT(o);
249 _ANSWER(2, FAL0, FAL0);
253 _OUT(NETLINE("DATA"));
254 _ANSWER(3, FAL0, FAL0);
256 fflush_rewind(sbp->sb_input);
257 cnt = fsize(sbp->sb_input);
258 while (fgetline(&slp->buf, &slp->bufsize, &cnt, &blen, sbp->sb_input, 1)
259 != NULL) {
260 if (inhdr) {
261 if (*slp->buf == '\n')
262 inhdr = inbcc = FAL0;
263 else if (inbcc && blankchar(*slp->buf))
264 continue;
265 /* We know what we have generated first, so do not look for whitespace
266 * before the ':' */
267 else if (!ascncasecmp(slp->buf, "bcc: ", 5)) {
268 inbcc = TRU1;
269 continue;
270 } else
271 inbcc = FAL0;
274 if (options & OPT_DEBUG) {
275 slp->buf[blen - 1] = '\0';
276 n_err(">>> %s%s\n", (*slp->buf == '.' ? "." : ""), slp->buf);
277 continue;
279 if (*slp->buf == '.')
280 swrite1(sp, ".", 1, 1); /* TODO I/O rewrite.. */
281 slp->buf[blen - 1] = NETNL[0];
282 slp->buf[blen] = NETNL[1];
283 swrite1(sp, slp->buf, blen + 1, 1);
285 _OUT(NETLINE("."));
286 _ANSWER(2, FAL0, FAL0);
288 _OUT(NETLINE("QUIT"));
289 _ANSWER(2, TRU1, FAL0);
290 rv = TRU1;
291 jleave:
292 if (slp->buf != NULL)
293 free(slp->buf);
294 NYD_LEAVE;
295 return rv;
298 #ifdef HAVE_GSSAPI
299 # include "smtp_gssapi.h"
300 #endif
302 #undef _OUT
303 #undef _ANSWER
305 FL bool_t
306 smtp_mta(struct sendbundle *sbp)
308 struct sock so;
309 sighandler_type volatile saveterm;
310 bool_t volatile rv = FAL0;
311 NYD_ENTER;
313 saveterm = safe_signal(SIGTERM, SIG_IGN);
314 if (sigsetjmp(_smtp_jmp, 1))
315 goto jleave;
316 if (saveterm != SIG_IGN)
317 safe_signal(SIGTERM, &_smtp_onterm);
319 memset(&so, 0, sizeof so);
320 if (!(options & OPT_DEBUG) && !sopen(&so, &sbp->sb_url))
321 goto jleave;
323 so.s_desc = "SMTP";
324 rv = _smtp_talk(&so, sbp);
326 if (!(options & OPT_DEBUG))
327 sclose(&so);
328 jleave:
329 safe_signal(SIGTERM, saveterm);
330 NYD_LEAVE;
331 return rv;
333 #endif /* HAVE_SMTP */
335 /* s-it-mode */