summaryrefslogtreecommitdiffstats
path: root/kioslave/smtp/command.cc
diff options
context:
space:
mode:
authortoma <toma@283d02a7-25f6-0310-bc7c-ecb5cbfe19da>2009-11-25 17:56:58 +0000
committertoma <toma@283d02a7-25f6-0310-bc7c-ecb5cbfe19da>2009-11-25 17:56:58 +0000
commit4aed2c8219774f5d797760606b8489a92ddc5163 (patch)
tree3f8c130f7d269626bf6a9447407ef6c35954426a /kioslave/smtp/command.cc
downloadtdebase-4aed2c8219774f5d797760606b8489a92ddc5163.tar.gz
tdebase-4aed2c8219774f5d797760606b8489a92ddc5163.zip
Copy the KDE 3.5 branch to branches/trinity for new KDE 3.5 features.
BUG:215923 git-svn-id: svn://anonsvn.kde.org/home/kde/branches/trinity/kdebase@1054174 283d02a7-25f6-0310-bc7c-ecb5cbfe19da
Diffstat (limited to 'kioslave/smtp/command.cc')
-rw-r--r--kioslave/smtp/command.cc606
1 files changed, 606 insertions, 0 deletions
diff --git a/kioslave/smtp/command.cc b/kioslave/smtp/command.cc
new file mode 100644
index 000000000..9fb7281c9
--- /dev/null
+++ b/kioslave/smtp/command.cc
@@ -0,0 +1,606 @@
+/* -*- c++ -*-
+ command.cc
+
+ This file is part of kio_smtp, the KDE SMTP kioslave.
+ Copyright (c) 2003 Marc Mutz <[email protected]>
+
+ This program is free software; you can redistribute it and/or modify it
+ under the terms of the GNU General Public License, version 2, as
+ published by the Free Software Foundation.
+
+ This program is distributed in the hope that it will be useful, but
+ WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+ General Public License for more details.
+
+ You should have received a copy of the GNU General Public License
+ along with this program; if not, write to the Free Software
+ Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
+
+ In addition, as a special exception, the copyright holders give
+ permission to link the code of this program with any edition of
+ the Qt library by Trolltech AS, Norway (or with modified versions
+ of Qt that use the same license as Qt), and distribute linked
+ combinations including the two. You must obey the GNU General
+ Public License in all respects for all of the code used other than
+ Qt. If you modify this file, you may extend this exception to
+ your version of the file, but you are not obligated to do so. If
+ you do not wish to do so, delete this exception statement from
+ your version.
+*/
+
+#include <config.h>
+
+#include "command.h"
+
+#include "smtp.h"
+#include "response.h"
+#include "transactionstate.h"
+
+#include <kidna.h>
+#include <klocale.h>
+#include <kdebug.h>
+#include <kmdcodec.h>
+#include <kio/slavebase.h> // for test_commands, where SMTPProtocol is not derived from TCPSlaveBase
+
+#include <assert.h>
+
+namespace KioSMTP {
+
+#ifdef HAVE_LIBSASL2
+static sasl_callback_t callbacks[] = {
+ { SASL_CB_ECHOPROMPT, NULL, NULL },
+ { SASL_CB_NOECHOPROMPT, NULL, NULL },
+ { SASL_CB_GETREALM, NULL, NULL },
+ { SASL_CB_USER, NULL, NULL },
+ { SASL_CB_AUTHNAME, NULL, NULL },
+ { SASL_CB_PASS, NULL, NULL },
+ { SASL_CB_CANON_USER, NULL, NULL },
+ { SASL_CB_LIST_END, NULL, NULL }
+};
+#endif
+
+ //
+ // Command (base class)
+ //
+
+ Command::Command( SMTPProtocol * smtp, int flags )
+ : mSMTP( smtp ),
+ mComplete( false ), mNeedResponse( false ), mFlags( flags )
+ {
+ assert( smtp );
+ }
+
+ Command::~Command() {}
+
+ bool Command::processResponse( const Response & r, TransactionState * ) {
+ mComplete = true;
+ mNeedResponse = false;
+ return r.isOk();
+ }
+
+ void Command::ungetCommandLine( const QCString &, TransactionState * ) {
+ mComplete = false;
+ }
+
+ Command * Command::createSimpleCommand( int which, SMTPProtocol * smtp ) {
+ switch ( which ) {
+ case STARTTLS: return new StartTLSCommand( smtp );
+ case DATA: return new DataCommand( smtp );
+ case NOOP: return new NoopCommand( smtp );
+ case RSET: return new RsetCommand( smtp );
+ case QUIT: return new QuitCommand( smtp );
+ default: return 0;
+ }
+ }
+
+ //
+ // relay methods:
+ //
+
+ void Command::parseFeatures( const Response & r ) {
+ mSMTP->parseFeatures( r );
+ }
+
+ int Command::startTLS() {
+ return mSMTP->startTLS();
+ }
+
+ bool Command::usingSSL() const {
+ return mSMTP->usingSSL();
+ }
+
+ bool Command::usingTLS() const {
+ return mSMTP->usingTLS();
+ }
+
+ bool Command::haveCapability( const char * cap ) const {
+ return mSMTP->haveCapability( cap );
+ }
+
+ //
+ // EHLO / HELO
+ //
+
+ QCString EHLOCommand::nextCommandLine( TransactionState * ) {
+ mNeedResponse = true;
+ mComplete = mEHLONotSupported;
+ const char * cmd = mEHLONotSupported ? "HELO " : "EHLO " ;
+ return cmd + KIDNA::toAsciiCString( mHostname ) + "\r\n";
+ }
+
+ bool EHLOCommand::processResponse( const Response & r, TransactionState * ) {
+ mNeedResponse = false;
+ // "command not {recognized,implemented}" response:
+ if ( r.code() == 500 || r.code() == 502 ) {
+ if ( mEHLONotSupported ) { // HELO failed...
+ mSMTP->error( KIO::ERR_INTERNAL_SERVER,
+ i18n("The server rejected both EHLO and HELO commands "
+ "as unknown or unimplemented.\n"
+ "Please contact the server's system administrator.") );
+ return false;
+ }
+ mEHLONotSupported = true; // EHLO failed, but that's ok.
+ return true;
+ }
+ mComplete = true;
+ if ( r.code() / 10 == 25 ) { // 25x: success
+ parseFeatures( r );
+ return true;
+ }
+ mSMTP->error( KIO::ERR_UNKNOWN,
+ i18n("Unexpected server response to %1 command.\n%2")
+ .arg( mEHLONotSupported ? "HELO" : "EHLO" )
+ .arg( r.errorMessage() ) );
+ return false;
+ }
+
+ //
+ // STARTTLS - rfc 3207
+ //
+
+ QCString StartTLSCommand::nextCommandLine( TransactionState * ) {
+ mComplete = true;
+ mNeedResponse = true;
+ return "STARTTLS\r\n";
+ }
+
+ bool StartTLSCommand::processResponse( const Response & r, TransactionState * ) {
+ mNeedResponse = false;
+ if ( r.code() != 220 ) {
+ mSMTP->error( r.errorCode(),
+ i18n("Your SMTP server does not support TLS. "
+ "Disable TLS, if you want to connect "
+ "without encryption.") );
+ return false;
+ }
+
+ int tlsrc = startTLS();
+
+ if ( tlsrc == 1 )
+ return true;
+
+ if ( tlsrc != -3 )
+ //kdDebug(7112) << "TLS negotiation failed!" << endl;
+ mSMTP->messageBox(KIO::SlaveBase::Information,
+ i18n("Your SMTP server claims to "
+ "support TLS, but negotiation "
+ "was unsuccessful.\nYou can "
+ "disable TLS in KDE using the "
+ "crypto settings module."),
+ i18n("Connection Failed"));
+ return false;
+ }
+
+
+#define SASLERROR mSMTP->error(KIO::ERR_COULD_NOT_AUTHENTICATE, \
+ i18n("An error occured during authentication: %1").arg \
+ ( QString::fromUtf8( sasl_errdetail( conn ) )));
+
+ //
+ // AUTH - rfc 2554
+ //
+ AuthCommand::AuthCommand( SMTPProtocol * smtp,
+ const char *mechanisms,
+ const QString &aFQDN,
+ KIO::AuthInfo &ai )
+ : Command( smtp, CloseConnectionOnError|OnlyLastInPipeline ),
+ mAi( &ai ),
+ mFirstTime( true )
+ {
+#ifdef HAVE_LIBSASL2
+ int result;
+ mMechusing = 0;
+ conn = 0;
+ client_interact = 0;
+ mOut = 0; mOutlen = 0;
+ mOneStep = false;
+
+ result = sasl_client_new( "smtp", aFQDN.latin1(),
+ 0, 0, callbacks, 0, &conn );
+ if ( result != SASL_OK ) {
+ SASLERROR
+ return;
+ }
+ do {
+ result = sasl_client_start(conn, mechanisms,
+ &client_interact, &mOut, &mOutlen, &mMechusing);
+
+ if (result == SASL_INTERACT)
+ if ( !saslInteract( client_interact ) ) {
+ return;
+ };
+ } while ( result == SASL_INTERACT );
+ if ( result != SASL_CONTINUE && result != SASL_OK ) {
+ SASLERROR
+ return;
+ }
+ if ( result == SASL_OK ) mOneStep = true;
+ kdDebug(7112) << "Mechanism: " << mMechusing << " one step: " << mOneStep << endl;
+#else
+ mSMTP->error(KIO::ERR_COULD_NOT_AUTHENTICATE,
+ i18n("Authentication support is not compiled into kio_smtp."));
+#endif
+ }
+
+ AuthCommand::~AuthCommand()
+ {
+#ifdef HAVE_LIBSASL2
+ if ( conn ) {
+ kdDebug(7112) << "dispose sasl connection" << endl;
+ sasl_dispose( &conn );
+ conn = 0;
+ }
+#endif
+ }
+
+ bool AuthCommand::saslInteract( void *in )
+ {
+#ifdef HAVE_LIBSASL2
+ kdDebug(7112) << "saslInteract: " << endl;
+ sasl_interact_t *interact = ( sasl_interact_t * ) in;
+
+ //some mechanisms do not require username && pass, so don't need a popup
+ //window for getting this info
+ for ( ; interact->id != SASL_CB_LIST_END; interact++ ) {
+ if ( interact->id == SASL_CB_AUTHNAME ||
+ interact->id == SASL_CB_PASS ) {
+
+ if ( mAi->username.isEmpty() || mAi->password.isEmpty()) {
+ if (!mSMTP->openPassDlg(*mAi)) {
+ mSMTP->error(KIO::ERR_ABORTED, i18n("No authentication details supplied."));
+ return false;
+ }
+ }
+ break;
+ }
+ }
+
+ interact = ( sasl_interact_t * ) in;
+ while( interact->id != SASL_CB_LIST_END ) {
+ switch( interact->id ) {
+ case SASL_CB_USER:
+ case SASL_CB_AUTHNAME:
+ kdDebug(7112) << "SASL_CB_[USER|AUTHNAME]: " << mAi->username << endl;
+ interact->result = strdup( mAi->username.utf8() );
+ interact->len = strlen( (const char *) interact->result );
+ break;
+ case SASL_CB_PASS:
+ kdDebug(7112) << "SASL_CB_PASS: [HIDDEN]" << endl;
+ interact->result = strdup( mAi->password.utf8() );
+ interact->len = strlen( (const char *) interact->result );
+ break;
+ default:
+ interact->result = NULL; interact->len = 0;
+ break;
+ }
+ interact++;
+ }
+ return true;
+#else
+ return false;
+#endif
+ }
+
+ bool AuthCommand::doNotExecute( const TransactionState * ) const {
+ return !mMechusing;
+ }
+
+ void AuthCommand::ungetCommandLine( const QCString & s, TransactionState * ) {
+ mUngetSASLResponse = s;
+ mComplete = false;
+ }
+
+ QCString AuthCommand::nextCommandLine( TransactionState * ) {
+ mNeedResponse = true;
+ QCString cmd;
+#ifdef HAVE_LIBSASL2
+ QByteArray tmp, challenge;
+ if ( !mUngetSASLResponse.isNull() ) {
+ // implement un-ungetCommandLine
+ cmd = mUngetSASLResponse;
+ mUngetSASLResponse = 0;
+ } else if ( mFirstTime ) {
+ QString firstCommand = "AUTH " + QString::fromLatin1( mMechusing );
+
+ tmp.setRawData( mOut, mOutlen );
+ KCodecs::base64Encode( tmp, challenge );
+ tmp.resetRawData( mOut, mOutlen );
+ if ( !challenge.isEmpty() ) {
+ firstCommand += " ";
+ firstCommand += QString::fromLatin1( challenge.data(), challenge.size() );
+ }
+ cmd = firstCommand.latin1();
+
+ if ( mOneStep ) mComplete = true;
+ } else {
+// kdDebug(7112) << "SS: '" << mLastChallenge << "'" << endl;
+ tmp.setRawData( mLastChallenge.data(), mLastChallenge.length() );
+ KCodecs::base64Decode( tmp, challenge );
+ tmp.resetRawData( mLastChallenge.data(), mLastChallenge.length() );
+ int result;
+ do {
+ result = sasl_client_step(conn, challenge.isEmpty() ? 0 : challenge.data(),
+ challenge.size(),
+ &client_interact,
+ &mOut, &mOutlen);
+ if (result == SASL_INTERACT)
+ if ( !saslInteract( client_interact ) ) {
+ return "";
+ };
+ } while ( result == SASL_INTERACT );
+ if ( result != SASL_CONTINUE && result != SASL_OK ) {
+ kdDebug(7112) << "sasl_client_step failed with: " << result << endl;
+ SASLERROR
+ return "";
+ }
+ tmp.setRawData( mOut, mOutlen );
+ cmd = KCodecs::base64Encode( tmp );
+ tmp.resetRawData( mOut, mOutlen );
+
+// kdDebug(7112) << "CC: '" << cmd << "'" << endl;
+ mComplete = ( result == SASL_OK );
+ }
+#endif //HAVE_LIBSASL2
+ cmd += "\r\n";
+ return cmd;
+ }
+
+ bool AuthCommand::processResponse( const Response & r, TransactionState * ) {
+ if ( !r.isOk() ) {
+ if ( mFirstTime )
+ if ( haveCapability( "AUTH" ) )
+ mSMTP->error( KIO::ERR_COULD_NOT_LOGIN,
+ i18n("Your SMTP server does not support %1.\nChoose a different authentication method.\n%2")
+ .arg( mMechusing ).arg( r.errorMessage() ) );
+ else
+ mSMTP->error( KIO::ERR_COULD_NOT_LOGIN,
+ i18n("Your SMTP server does not support authentication.\n"
+ " %2").arg( r.errorMessage() ) );
+ else
+ mSMTP->error( KIO::ERR_COULD_NOT_LOGIN,
+ i18n("Authentication failed.\n"
+ "Most likely the password is wrong.\n"
+ "%1").arg( r.errorMessage() ) );
+ return false;
+ }
+ mFirstTime = false;
+ mLastChallenge = r.lines().front(); // ### better join all lines with \n?
+ mNeedResponse = false;
+ return true;
+ }
+
+ //
+ // MAIL FROM:
+ //
+
+ QCString MailFromCommand::nextCommandLine( TransactionState * ) {
+ mComplete = true;
+ mNeedResponse = true;
+ QCString cmdLine = "MAIL FROM:<" + mAddr + '>';
+ if ( m8Bit && haveCapability("8BITMIME") )
+ cmdLine += " BODY=8BITMIME";
+ if ( mSize && haveCapability("SIZE") )
+ cmdLine += " SIZE=" + QCString().setNum( mSize );
+ return cmdLine + "\r\n";
+ }
+
+ bool MailFromCommand::processResponse( const Response & r, TransactionState * ts ) {
+ assert( ts );
+ mNeedResponse = false;
+
+ if ( r.code() == 250 )
+ return true;
+
+ ts->setMailFromFailed( mAddr, r );
+ return false;
+ }
+
+ //
+ // RCPT TO:
+ //
+
+ QCString RcptToCommand::nextCommandLine( TransactionState * ) {
+ mComplete = true;
+ mNeedResponse = true;
+ return "RCPT TO:<" + mAddr + ">\r\n";
+ }
+
+ bool RcptToCommand::processResponse( const Response & r, TransactionState * ts ) {
+ assert( ts );
+ mNeedResponse = false;
+
+ if ( r.code() == 250 ) {
+ ts->setRecipientAccepted();
+ return true;
+ }
+
+ ts->addRejectedRecipient( mAddr, r.errorMessage() );
+ return false;
+ }
+
+ //
+ // DATA (only initial processing!)
+ //
+
+ QCString DataCommand::nextCommandLine( TransactionState * ts ) {
+ assert( ts );
+ mComplete = true;
+ mNeedResponse = true;
+ ts->setDataCommandIssued( true );
+ return "DATA\r\n";
+ }
+
+ void DataCommand::ungetCommandLine( const QCString &, TransactionState * ts ) {
+ assert( ts );
+ mComplete = false;
+ ts->setDataCommandIssued( false );
+ }
+
+ bool DataCommand::processResponse( const Response & r, TransactionState * ts ) {
+ assert( ts );
+ mNeedResponse = false;
+
+ if ( r.code() == 354 ) {
+ ts->setDataCommandSucceeded( true, r );
+ return true;
+ }
+
+ ts->setDataCommandSucceeded( false, r );
+ return false;
+ }
+
+ //
+ // DATA (data transfer)
+ //
+ void TransferCommand::ungetCommandLine( const QCString & cmd, TransactionState * ) {
+ if ( cmd.isEmpty() )
+ return; // don't change state when we can't detect the unget in
+ // the next nextCommandLine !!
+ mWasComplete = mComplete;
+ mComplete = false;
+ mNeedResponse = false;
+ mUngetBuffer = cmd;
+ }
+
+ bool TransferCommand::doNotExecute( const TransactionState * ts ) const {
+ assert( ts );
+ return ts->failed();
+ }
+
+ QCString TransferCommand::nextCommandLine( TransactionState * ts ) {
+ assert( ts ); // let's rely on it ( at least for the moment )
+ assert( !isComplete() );
+ assert( !ts->failed() );
+
+ static const QCString dotCRLF = ".\r\n";
+ static const QCString CRLFdotCRLF = "\r\n.\r\n";
+
+ if ( !mUngetBuffer.isEmpty() ) {
+ const QCString ret = mUngetBuffer;
+ mUngetBuffer = 0;
+ if ( mWasComplete ) {
+ mComplete = true;
+ mNeedResponse = true;
+ }
+ return ret; // don't prepare(), it's slave-generated or already prepare()d
+ }
+
+ // normal processing:
+
+ kdDebug(7112) << "requesting data" << endl;
+ mSMTP->dataReq();
+ QByteArray ba;
+ int result = mSMTP->readData( ba );
+ kdDebug(7112) << "got " << result << " bytes" << endl;
+ if ( result > 0 )
+ return prepare( ba );
+ else if ( result < 0 ) {
+ ts->setFailedFatally( KIO::ERR_INTERNAL,
+ i18n("Could not read data from application.") );
+ mComplete = true;
+ mNeedResponse = true;
+ return 0;
+ }
+ mComplete = true;
+ mNeedResponse = true;
+ return mLastChar == '\n' ? dotCRLF : CRLFdotCRLF ;
+ }
+
+ bool TransferCommand::processResponse( const Response & r, TransactionState * ts ) {
+ mNeedResponse = false;
+ assert( ts );
+ ts->setComplete();
+ if ( !r.isOk() ) {
+ ts->setFailed();
+ mSMTP->error( r.errorCode(),
+ i18n("The message content was not accepted.\n"
+ "%1").arg( r.errorMessage() ) );
+ return false;
+ }
+ return true;
+ }
+
+ static QCString dotstuff_lf2crlf( const QByteArray & ba, char & last ) {
+ QCString result( ba.size() * 2 + 1 ); // worst case: repeated "[.]\n"
+ const char * s = ba.data();
+ const char * const send = ba.data() + ba.size();
+ char * d = result.data();
+
+ while ( s < send ) {
+ const char ch = *s++;
+ if ( ch == '\n' && last != '\r' )
+ *d++ = '\r'; // lf2crlf
+ else if ( ch == '.' && last == '\n' )
+ *d++ = '.'; // dotstuff
+ last = *d++ = ch;
+ }
+
+ result.truncate( d - result.data() );
+ return result;
+ }
+
+ QCString TransferCommand::prepare( const QByteArray & ba ) {
+ if ( ba.isEmpty() )
+ return 0;
+ if ( mSMTP->metaData("lf2crlf+dotstuff") == "slave" ) {
+ kdDebug(7112) << "performing dotstuffing and LF->CRLF transformation" << endl;
+ return dotstuff_lf2crlf( ba, mLastChar );
+ } else {
+ mLastChar = ba[ ba.size() - 1 ];
+ return QCString( ba.data(), ba.size() + 1 );
+ }
+ }
+
+ //
+ // NOOP
+ //
+
+ QCString NoopCommand::nextCommandLine( TransactionState * ) {
+ mComplete = true;
+ mNeedResponse = true;
+ return "NOOP\r\n";
+ }
+
+ //
+ // RSET
+ //
+
+ QCString RsetCommand::nextCommandLine( TransactionState * ) {
+ mComplete = true;
+ mNeedResponse = true;
+ return "RSET\r\n";
+ }
+
+ //
+ // QUIT
+ //
+
+ QCString QuitCommand::nextCommandLine( TransactionState * ) {
+ mComplete = true;
+ mNeedResponse = true;
+ return "QUIT\r\n";
+ }
+
+} // namespace KioSMTP
+