mirror of
https://git.wownero.com/wownero/wownero.git
synced 2024-08-15 01:03:23 +00:00
1571 lines
No EOL
40 KiB
C++
1571 lines
No EOL
40 KiB
C++
// Copyright (c) 2014, The Monero Project
|
|
//
|
|
// All rights reserved.
|
|
//
|
|
// Redistribution and use in source and binary forms, with or without modification, are
|
|
// permitted provided that the following conditions are met:
|
|
//
|
|
// 1. Redistributions of source code must retain the above copyright notice, this list of
|
|
// conditions and the following disclaimer.
|
|
//
|
|
// 2. Redistributions in binary form must reproduce the above copyright notice, this list
|
|
// of conditions and the following disclaimer in the documentation and/or other
|
|
// materials provided with the distribution.
|
|
//
|
|
// 3. Neither the name of the copyright holder nor the names of its contributors may be
|
|
// used to endorse or promote products derived from this software without specific
|
|
// prior written permission.
|
|
//
|
|
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY
|
|
// EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
|
// MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL
|
|
// THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
|
|
// PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
// INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
|
// STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
|
|
// THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
//
|
|
// Parts of this file are originally copyright (c) 2006-2013, Andrey N. Sabelnikov
|
|
|
|
#include "md5.h"
|
|
|
|
namespace epee
|
|
{
|
|
namespace net_utils
|
|
{
|
|
namespace smtp
|
|
{
|
|
|
|
|
|
//////////////////////////////////////////////////////////////////////////
|
|
inline char * convert_hex( unsigned char *in, int len )
|
|
{
|
|
static char hex[] = "0123456789abcdef";
|
|
char * out;
|
|
int i;
|
|
|
|
out = (char *) malloc(len * 2 + 1);
|
|
if (out == NULL)
|
|
return NULL;
|
|
|
|
for (i = 0; i < len; i++) {
|
|
out[i * 2] = hex[in[i] >> 4];
|
|
out[i * 2 + 1] = hex[in[i] & 15];
|
|
}
|
|
|
|
out[i*2] = 0;
|
|
|
|
return out;
|
|
}
|
|
|
|
//////////////////////////////////////////////////////////////////////////
|
|
inline char * hash_md5(const char * sec_key, const char * data, int len)
|
|
{
|
|
char key[65], digest[24];
|
|
char * hash_hex;
|
|
|
|
int sec_len, i;
|
|
|
|
sec_len = strlen(sec_key);
|
|
|
|
if (sec_len < 64) {
|
|
memcpy(key, sec_key, sec_len);
|
|
for (i = sec_len; i < 64; i++) {
|
|
key[i] = 0;
|
|
}
|
|
} else {
|
|
memcpy(key, sec_key, 64);
|
|
}
|
|
|
|
md5::hmac_md5( (const unsigned char*)data, len, (const unsigned char*)key, 64, (unsigned char*)digest );
|
|
hash_hex = convert_hex( (unsigned char*)digest, 16 );
|
|
|
|
return hash_hex;
|
|
}
|
|
//////////////////////////////////////////////////////////////////////////
|
|
//////////////////////////////////////////////////////////////////////////
|
|
//////////////////////////////////////////////////////////////////////////
|
|
//////////////////////////////////////////////////////////////////////////
|
|
inline CSMTPClient::CSMTPClient(void)
|
|
{
|
|
m_dwSupportedAuthModesCount = 0;
|
|
m_bConnected = FALSE;
|
|
m_hSocket = INVALID_SOCKET;
|
|
m_pErrorText = NULL;
|
|
|
|
// Initialize WinSock
|
|
WORD wVer = MAKEWORD( 2, 2 );
|
|
if ( WSAStartup( wVer, &m_wsaData ) != NO_ERROR )
|
|
{
|
|
SetErrorText( "WSAStartup.", WSAGetLastError() );
|
|
throw;
|
|
}
|
|
if ( LOBYTE( m_wsaData.wVersion ) != 2 || HIBYTE( m_wsaData.wVersion ) != 2 )
|
|
{
|
|
SetErrorText( "Can't find a useable WinSock DLL." );
|
|
WSACleanup();
|
|
throw;
|
|
}
|
|
}
|
|
|
|
//////////////////////////////////////////////////////////////////////////
|
|
inline CSMTPClient::~CSMTPClient(void)
|
|
{
|
|
if ( m_pErrorText )
|
|
{
|
|
free( m_pErrorText );
|
|
m_pErrorText = NULL;
|
|
}
|
|
|
|
if ( m_bConnected )
|
|
ServerDisconnect();
|
|
|
|
// Cleanup
|
|
WSACleanup();
|
|
}
|
|
|
|
//////////////////////////////////////////////////////////////////////////
|
|
inline void CSMTPClient::SetErrorText( LPCSTR szErrorText, DWORD dwErrorCode )
|
|
{
|
|
if ( m_pErrorText )
|
|
{
|
|
free( m_pErrorText );
|
|
m_pErrorText = NULL;
|
|
}
|
|
|
|
LPVOID lpMsgBuf = NULL;
|
|
if ( dwErrorCode )
|
|
{
|
|
FormatMessageA(
|
|
FORMAT_MESSAGE_ALLOCATE_BUFFER |
|
|
FORMAT_MESSAGE_FROM_SYSTEM,
|
|
NULL,
|
|
dwErrorCode,
|
|
MAKELANGID(LANG_NEUTRAL, SUBLANG_DEFAULT),
|
|
(LPSTR) &lpMsgBuf,
|
|
0, NULL );
|
|
}
|
|
|
|
if ( szErrorText && strlen( szErrorText ) )
|
|
{
|
|
m_pErrorText = (LPBYTE)malloc( strlen( szErrorText ) + 1 );
|
|
strcpy( (char*)m_pErrorText, szErrorText );
|
|
|
|
if ( lpMsgBuf )
|
|
{
|
|
strcat( (char*)m_pErrorText, " " );
|
|
strcpy( (char*)m_pErrorText, (char*)lpMsgBuf );
|
|
|
|
LocalFree( lpMsgBuf );
|
|
}
|
|
}
|
|
}
|
|
|
|
inline void CSMTPClient::SetErrorText( PBYTE szErrorText, DWORD dwErrorCode )
|
|
{
|
|
SetErrorText( (LPCSTR)szErrorText, dwErrorCode );
|
|
}
|
|
|
|
//////////////////////////////////////////////////////////////////////////
|
|
inline char* CSMTPClient::GetLastErrorText()
|
|
{
|
|
return (char*)m_pErrorText;
|
|
}
|
|
|
|
//////////////////////////////////////////////////////////////////////////
|
|
inline DWORD CSMTPClient::ReceiveData( SOCKET hSocket, PBYTE pReceiveBuffer, DWORD dwReceiveBufferSize )
|
|
{
|
|
DWORD dwReceivedDataSize = 0;
|
|
|
|
if ( hSocket != INVALID_SOCKET && pReceiveBuffer && dwReceiveBufferSize )
|
|
{
|
|
int iReceived = 0;
|
|
int iLength = 0;
|
|
|
|
iLength = recv( hSocket, (LPSTR)pReceiveBuffer + iReceived, dwReceiveBufferSize - iReceived,
|
|
NO_FLAGS );
|
|
|
|
if ( iLength != 0 && iLength != SOCKET_ERROR )
|
|
iReceived += iLength;
|
|
|
|
dwReceivedDataSize = iReceived;
|
|
|
|
pReceiveBuffer[ iReceived ] = 0;
|
|
}
|
|
|
|
return dwReceivedDataSize;
|
|
}
|
|
|
|
inline //////////////////////////////////////////////////////////////////////////
|
|
DWORD CSMTPClient::SendData( SOCKET hSocket, PBYTE pSendBuffer, DWORD dwSendBufferSize )
|
|
{
|
|
DWORD dwSended = 0;
|
|
|
|
if ( hSocket != INVALID_SOCKET && pSendBuffer && dwSendBufferSize )
|
|
{
|
|
int iSended = 0;
|
|
int iLength = 0;
|
|
|
|
while ( iLength != SOCKET_ERROR && dwSendBufferSize - iSended > 0 )
|
|
{
|
|
iLength = send( hSocket, (LPSTR)pSendBuffer + iSended, dwSendBufferSize - iSended,
|
|
NO_FLAGS );
|
|
|
|
if ( iLength != 0 && iLength != SOCKET_ERROR )
|
|
iSended += iLength;
|
|
}
|
|
|
|
dwSended = iSended;
|
|
}
|
|
|
|
//if ( dwSended )
|
|
// printf( "C: %s", pSendBuffer );
|
|
|
|
return dwSended;
|
|
}
|
|
|
|
//////////////////////////////////////////////////////////////////////////
|
|
inline unsigned short CSMTPClient::GetResponseCode( LPBYTE pBuffer, DWORD dwBufferSize )
|
|
{
|
|
unsigned short iCode = 0;
|
|
|
|
if ( dwBufferSize >= 3 )
|
|
{
|
|
CHAR szResponseCode[ 4 ] = { 0 };
|
|
memcpy( szResponseCode, pBuffer, 3 );
|
|
szResponseCode[ 3 ] = 0;
|
|
iCode = atoi( szResponseCode );
|
|
}
|
|
|
|
return iCode;
|
|
}
|
|
|
|
//////////////////////////////////////////////////////////////////////////
|
|
inline void CSMTPClient::ParseESMTPExtensions( LPBYTE pBuffer, DWORD dwBufferSize )
|
|
{
|
|
const char *szSubstring = strstr( (const char*)pBuffer, "250-AUTH " );
|
|
if ( !szSubstring )
|
|
{
|
|
szSubstring = strstr( (const char*)pBuffer, "250 AUTH " );
|
|
}
|
|
|
|
if ( szSubstring )
|
|
{
|
|
const char *szSubstringEnd = strstr( (const char*)szSubstring, "\r\n" );
|
|
if ( szSubstringEnd )
|
|
{
|
|
szSubstring += 9;
|
|
char szAuthMode[ 256 ] = { 0 };
|
|
for ( ; szSubstring < szSubstringEnd + 1 ; szSubstring++ )
|
|
{
|
|
if ( *szSubstring == ' ' || *szSubstring == '\r' )
|
|
{
|
|
if ( _strcmpi( szAuthMode, SMTP_COMMAND_AUTH_PLAIN ) == 0 )
|
|
{
|
|
m_aSupportedAuthModes[ m_dwSupportedAuthModesCount ] = AUTH_MODE_PLAIN;
|
|
m_dwSupportedAuthModesCount++;
|
|
}
|
|
else if ( _strcmpi( szAuthMode, SMTP_COMMAND_AUTH_LOGIN ) == 0 )
|
|
{
|
|
m_aSupportedAuthModes[ m_dwSupportedAuthModesCount ] = AUTH_MODE_LOGIN;
|
|
m_dwSupportedAuthModesCount++;
|
|
}
|
|
else if ( _strcmpi( szAuthMode, SMTP_COMMAND_AUTH_CRAM_MD5 ) == 0 )
|
|
{
|
|
m_aSupportedAuthModes[ m_dwSupportedAuthModesCount ] = AUTH_MODE_CRAM_MD5;
|
|
m_dwSupportedAuthModesCount++;
|
|
}
|
|
|
|
szAuthMode[ 0 ] = 0;
|
|
|
|
if ( m_dwSupportedAuthModesCount == MAX_AUTH_MODES_COUND )
|
|
break;
|
|
}
|
|
else
|
|
{
|
|
szAuthMode[ strlen( szAuthMode ) + 1 ] = 0;
|
|
szAuthMode[ strlen( szAuthMode ) ] = *szSubstring;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
//////////////////////////////////////////////////////////////////////////
|
|
inline BOOL CSMTPClient::ServerConnect( LPCSTR szServerAddress, const unsigned short iPortNumber )
|
|
{
|
|
if ( m_bConnected )
|
|
ServerDisconnect();
|
|
|
|
m_bConnected = FALSE;
|
|
m_hSocket = INVALID_SOCKET;
|
|
|
|
m_hSocket = _connectServerSocket( szServerAddress, iPortNumber );
|
|
|
|
if ( m_hSocket != INVALID_SOCKET )
|
|
{
|
|
DWORD dwReceiveBufferSize = 1024*16;
|
|
PBYTE pReceiveBuffer = (PBYTE)malloc( dwReceiveBufferSize );
|
|
if ( pReceiveBuffer )
|
|
{
|
|
// Connected. Wait server hello string.
|
|
DWORD iReceived = ReceiveData( m_hSocket, pReceiveBuffer, dwReceiveBufferSize );
|
|
if ( iReceived )
|
|
{
|
|
// Check 220
|
|
int iResponseCode = GetResponseCode( pReceiveBuffer, iReceived );
|
|
if ( iResponseCode != 220 )
|
|
{
|
|
SetErrorText( pReceiveBuffer );
|
|
free( pReceiveBuffer );
|
|
ServerDisconnect();
|
|
return FALSE;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
SetErrorText( "ReceiveData error. ", WSAGetLastError() );
|
|
free( pReceiveBuffer );
|
|
ServerDisconnect();
|
|
return FALSE;
|
|
}
|
|
|
|
// EHLO / HELO
|
|
BYTE szHelloBuffer[ 256 ];
|
|
sprintf( (char*)szHelloBuffer, "%s %s\r\n", (char*)SMTP_COMMAND_EHLO, (char*)szServerAddress );
|
|
if ( SendData( m_hSocket, (PBYTE)szHelloBuffer, strlen( (const char*)szHelloBuffer ) ) == 0 )
|
|
{
|
|
SetErrorText( "SendData error.", WSAGetLastError() );
|
|
free( pReceiveBuffer );
|
|
ServerDisconnect();
|
|
return FALSE;
|
|
}
|
|
|
|
iReceived = ReceiveData( m_hSocket, pReceiveBuffer, dwReceiveBufferSize );
|
|
if ( iReceived )
|
|
{
|
|
// Check 250
|
|
int iResponseCode = GetResponseCode( pReceiveBuffer, iReceived );
|
|
if ( iResponseCode == 500 )
|
|
{
|
|
SetErrorText( pReceiveBuffer );
|
|
|
|
sprintf( (char*)szHelloBuffer, "%s %s\r\n", (char*)SMTP_COMMAND_HELO, (char*)szServerAddress );
|
|
if ( SendData( m_hSocket, (PBYTE)szHelloBuffer, strlen( (const char*)szHelloBuffer ) ) == 0 )
|
|
{
|
|
SetErrorText( "SendData error.", WSAGetLastError() );
|
|
free( pReceiveBuffer );
|
|
ServerDisconnect();
|
|
return FALSE;
|
|
}
|
|
|
|
iResponseCode = GetResponseCode( pReceiveBuffer, iReceived );
|
|
if ( iResponseCode != 250 )
|
|
{
|
|
SetErrorText( pReceiveBuffer );
|
|
free( pReceiveBuffer );
|
|
ServerDisconnect();
|
|
return FALSE;
|
|
}
|
|
}
|
|
else if ( iResponseCode != 250 )
|
|
{
|
|
SetErrorText( pReceiveBuffer );
|
|
free( pReceiveBuffer );
|
|
ServerDisconnect();
|
|
return FALSE;
|
|
}
|
|
|
|
// Parse AUTH supported modes
|
|
ParseESMTPExtensions( pReceiveBuffer, iReceived );
|
|
}
|
|
else
|
|
{
|
|
SetErrorText( "ReceiveData error.", WSAGetLastError() );
|
|
free( pReceiveBuffer );
|
|
ServerDisconnect();
|
|
return FALSE;
|
|
}
|
|
|
|
free( pReceiveBuffer );
|
|
}
|
|
}
|
|
else
|
|
{
|
|
return FALSE;
|
|
}
|
|
|
|
m_bConnected = TRUE;
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
//////////////////////////////////////////////////////////////////////////
|
|
inline BOOL CSMTPClient::ServerConnect( LPCSTR szServerAddress, const unsigned short iPortNumber, LPCSTR szUsername, LPCSTR szPassword )
|
|
{
|
|
BOOL bSuccess = FALSE;
|
|
|
|
bSuccess = ServerConnect( szServerAddress, iPortNumber );
|
|
if ( bSuccess )
|
|
{
|
|
if ( GetAuthModeIsSupported( AUTH_MODE_CRAM_MD5 ) )
|
|
{
|
|
ServerLogin( szUsername, szPassword, AUTH_MODE_CRAM_MD5 );
|
|
}
|
|
else
|
|
if ( GetAuthModeIsSupported( AUTH_MODE_PLAIN ) )
|
|
{
|
|
ServerLogin( szUsername, szPassword, AUTH_MODE_PLAIN );
|
|
}
|
|
else
|
|
if ( GetAuthModeIsSupported( AUTH_MODE_LOGIN ) )
|
|
{
|
|
ServerLogin( szUsername, szPassword, AUTH_MODE_LOGIN );
|
|
}
|
|
}
|
|
|
|
return bSuccess;
|
|
}
|
|
|
|
//////////////////////////////////////////////////////////////////////////
|
|
inline SOCKET CSMTPClient::_connectServerSocket( LPCSTR szServerAddress, const unsigned short iPortNumber )
|
|
{
|
|
int nConnect;
|
|
short nProtocolPort = iPortNumber;
|
|
LPHOSTENT lpHostEnt;
|
|
SOCKADDR_IN sockAddr;
|
|
|
|
SOCKET hServerSocket = INVALID_SOCKET;
|
|
|
|
lpHostEnt = gethostbyname( szServerAddress );
|
|
if (lpHostEnt)
|
|
{
|
|
hServerSocket = socket( AF_INET, SOCK_STREAM, IPPROTO_TCP );
|
|
if (hServerSocket != INVALID_SOCKET)
|
|
{
|
|
sockAddr.sin_family = AF_INET;
|
|
sockAddr.sin_port = htons( nProtocolPort );
|
|
sockAddr.sin_addr = *((LPIN_ADDR)*lpHostEnt->h_addr_list);
|
|
|
|
nConnect = connect( hServerSocket, (PSOCKADDR)&sockAddr,
|
|
sizeof(sockAddr) );
|
|
|
|
if ( nConnect != 0 )
|
|
{
|
|
SetErrorText( "connect error.", WSAGetLastError() );
|
|
hServerSocket = INVALID_SOCKET;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
SetErrorText( "Invalid socket." );
|
|
throw;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
SetErrorText( "Error retrieving host by name.", WSAGetLastError() );
|
|
}
|
|
|
|
return hServerSocket ;
|
|
}
|
|
|
|
//////////////////////////////////////////////////////////////////////////
|
|
inline void CSMTPClient::ServerDisconnect()
|
|
{
|
|
if ( m_hSocket != INVALID_SOCKET )
|
|
{
|
|
if ( SendData( m_hSocket, (PBYTE)SMTP_COMMAND_QUIT, strlen( SMTP_COMMAND_QUIT ) ) == 0 )
|
|
{
|
|
SetErrorText( "SendData error.", WSAGetLastError() );
|
|
return;
|
|
}
|
|
|
|
DWORD dwReceiveBufferSize = 1024*16;
|
|
PBYTE pReceiveBuffer = (PBYTE)malloc( dwReceiveBufferSize );
|
|
if ( pReceiveBuffer )
|
|
{
|
|
DWORD iReceived = ReceiveData( m_hSocket, pReceiveBuffer, dwReceiveBufferSize );
|
|
|
|
if ( iReceived )
|
|
SetErrorText( pReceiveBuffer );
|
|
|
|
free( pReceiveBuffer );
|
|
}
|
|
|
|
m_hSocket = INVALID_SOCKET;
|
|
}
|
|
|
|
m_bConnected = FALSE;
|
|
}
|
|
|
|
//////////////////////////////////////////////////////////////////////////
|
|
inline BOOL CSMTPClient::GetAuthModeIsSupported( int iMode )
|
|
{
|
|
BOOL bSupported = FALSE;
|
|
|
|
for ( int i = 0 ; i < m_dwSupportedAuthModesCount ; i++ )
|
|
{
|
|
if ( m_aSupportedAuthModes[ i ] == iMode )
|
|
{
|
|
bSupported = TRUE;
|
|
break;
|
|
}
|
|
}
|
|
|
|
return bSupported;
|
|
}
|
|
|
|
//////////////////////////////////////////////////////////////////////////
|
|
inline BOOL CSMTPClient::ServerLogin( LPCSTR szUsername, LPCSTR szPassword, int iAuthMode )
|
|
{
|
|
BOOL bSuccess = FALSE;
|
|
|
|
if ( iAuthMode == AUTH_MODE_PLAIN )
|
|
{
|
|
bSuccess = ServerLoginMethodPlain( szUsername, szPassword );
|
|
}
|
|
else if ( iAuthMode == AUTH_MODE_LOGIN )
|
|
{
|
|
bSuccess = ServerLoginMethodLogin( szUsername, szPassword );
|
|
}
|
|
else if ( iAuthMode == AUTH_MODE_CRAM_MD5 )
|
|
{
|
|
bSuccess = ServerLoginMethodCramMD5( szUsername, szPassword );
|
|
}
|
|
|
|
return bSuccess;
|
|
}
|
|
|
|
//////////////////////////////////////////////////////////////////////////
|
|
inline BOOL CSMTPClient::ServerLogin( LPCSTR szUsername, LPCSTR szPassword )
|
|
{
|
|
BOOL bSuccess = FALSE;
|
|
|
|
if ( GetAuthModeIsSupported( AUTH_MODE_CRAM_MD5 ) )
|
|
{
|
|
bSuccess = ServerLogin( szUsername, szPassword, AUTH_MODE_CRAM_MD5 );
|
|
}
|
|
else
|
|
if ( GetAuthModeIsSupported( AUTH_MODE_PLAIN ) )
|
|
{
|
|
bSuccess = ServerLogin( szUsername, szPassword, AUTH_MODE_PLAIN );
|
|
}
|
|
else
|
|
if ( GetAuthModeIsSupported( AUTH_MODE_LOGIN ) )
|
|
{
|
|
bSuccess = ServerLogin( szUsername, szPassword, AUTH_MODE_LOGIN );
|
|
}
|
|
|
|
return bSuccess;
|
|
}
|
|
|
|
//////////////////////////////////////////////////////////////////////////
|
|
inline BOOL CSMTPClient::ServerLoginMethodPlain( LPCSTR szUsername, LPCSTR szPassword )
|
|
{
|
|
BOOL bSuccess = FALSE;
|
|
|
|
BYTE szCommandBuffer[ 256 ];
|
|
sprintf( (char*)szCommandBuffer, "%s %s\r\n", (char*)SMTP_COMMAND_AUTH, (char*)SMTP_COMMAND_AUTH_PLAIN );
|
|
if ( SendData( m_hSocket, (PBYTE)szCommandBuffer, strlen( (const char*)szCommandBuffer ) ) == 0 )
|
|
{
|
|
SetErrorText( "SendData error.", WSAGetLastError() );
|
|
return FALSE;
|
|
}
|
|
|
|
DWORD dwReceiveBufferSize = 1024*16;
|
|
PBYTE pReceiveBuffer = (PBYTE)malloc( dwReceiveBufferSize );
|
|
if ( pReceiveBuffer )
|
|
{
|
|
// Connected. Wait server hello string.
|
|
DWORD iReceived = ReceiveData( m_hSocket, pReceiveBuffer, dwReceiveBufferSize );
|
|
if ( iReceived )
|
|
{
|
|
SetErrorText( pReceiveBuffer );
|
|
|
|
// Check 334
|
|
int iResponseCode = GetResponseCode( pReceiveBuffer, iReceived );
|
|
if ( iResponseCode != 334 )
|
|
{
|
|
free( pReceiveBuffer );
|
|
return FALSE;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
SetErrorText( "ReceiveData error.", WSAGetLastError() );
|
|
free( pReceiveBuffer );
|
|
return FALSE;
|
|
}
|
|
|
|
// Encode.
|
|
DWORD dwLoginBuffer = strlen( szUsername ) + strlen( szPassword ) + 3;
|
|
char *pLoginBuffer = (char*)malloc( dwLoginBuffer );
|
|
if ( pLoginBuffer )
|
|
{
|
|
ZeroMemory( pLoginBuffer, dwLoginBuffer );
|
|
strcpy( pLoginBuffer + 1, szUsername );
|
|
strcpy( pLoginBuffer + 1 + strlen( szUsername ) + 1, szPassword );
|
|
|
|
Base64Coder coder;
|
|
coder.Encode( (const PBYTE)pLoginBuffer, dwLoginBuffer - 1 );
|
|
LPCSTR szLoginBufferEncoded = coder.EncodedMessage();
|
|
|
|
if ( szLoginBufferEncoded && strlen( szLoginBufferEncoded ) > 0 )
|
|
{
|
|
DWORD dwSendBufferSize = strlen( szLoginBufferEncoded ) + 4;
|
|
char* pSendBuffer = (char*)malloc( dwSendBufferSize );
|
|
if ( pSendBuffer )
|
|
{
|
|
strcpy( pSendBuffer, szLoginBufferEncoded );
|
|
strcat( pSendBuffer, "\r\n" );
|
|
|
|
if ( SendData( m_hSocket, (PBYTE)pSendBuffer, strlen( (const char*)pSendBuffer ) ) == 0 )
|
|
{
|
|
SetErrorText( "SendData error.", WSAGetLastError() );
|
|
free( pSendBuffer );
|
|
free( pLoginBuffer );
|
|
free( pReceiveBuffer );
|
|
return FALSE;
|
|
}
|
|
|
|
free( pSendBuffer );
|
|
}
|
|
}
|
|
|
|
free( pLoginBuffer );
|
|
|
|
// check result
|
|
iReceived = ReceiveData( m_hSocket, pReceiveBuffer, dwReceiveBufferSize );
|
|
if ( iReceived )
|
|
{
|
|
SetErrorText( pReceiveBuffer );
|
|
|
|
// Check 235
|
|
int iResponseCode = GetResponseCode( pReceiveBuffer, iReceived );
|
|
if ( iResponseCode != 235 )
|
|
{
|
|
free( pReceiveBuffer );
|
|
return FALSE;
|
|
}
|
|
|
|
bSuccess = TRUE;
|
|
}
|
|
else
|
|
{
|
|
SetErrorText( "ReceiveData error.", WSAGetLastError() );
|
|
free( pReceiveBuffer );
|
|
return FALSE;
|
|
}
|
|
}
|
|
|
|
free( pReceiveBuffer );
|
|
}
|
|
|
|
return bSuccess;
|
|
}
|
|
|
|
//////////////////////////////////////////////////////////////////////////
|
|
inline BOOL CSMTPClient::ServerLoginMethodLogin( LPCSTR szUsername, LPCSTR szPassword )
|
|
{
|
|
BOOL bSuccess = FALSE;
|
|
|
|
BYTE szCommandBuffer[ 256 ];
|
|
sprintf( (char*)szCommandBuffer, "%s %s\r\n", (char*)SMTP_COMMAND_AUTH, (char*)SMTP_COMMAND_AUTH_LOGIN );
|
|
if ( SendData( m_hSocket, (PBYTE)szCommandBuffer, strlen( (const char*)szCommandBuffer ) ) == 0 )
|
|
{
|
|
SetErrorText( "SendData error.", WSAGetLastError() );
|
|
return FALSE;
|
|
}
|
|
|
|
DWORD dwReceiveBufferSize = 1024*16;
|
|
PBYTE pReceiveBuffer = (PBYTE)malloc( dwReceiveBufferSize );
|
|
if ( pReceiveBuffer )
|
|
{
|
|
DWORD iReceived = ReceiveData( m_hSocket, pReceiveBuffer, dwReceiveBufferSize );
|
|
if ( iReceived )
|
|
{
|
|
SetErrorText( pReceiveBuffer );
|
|
|
|
// Check 334
|
|
int iResponseCode = GetResponseCode( pReceiveBuffer, iReceived );
|
|
if ( iResponseCode != 334 )
|
|
{
|
|
free( pReceiveBuffer );
|
|
return FALSE;
|
|
}
|
|
|
|
// Check request
|
|
if ( iReceived > 6 )
|
|
{
|
|
Base64Coder coder;
|
|
coder.Decode( pReceiveBuffer + 4, iReceived - 6 );
|
|
LPCSTR szRequest = coder.DecodedMessage();
|
|
if ( szRequest && strlen( szRequest ) > 0 )
|
|
{
|
|
if ( strcmpi( szRequest, "Username:" ) == 0 )
|
|
{
|
|
coder.Encode( (const PBYTE)szUsername, strlen( szUsername ) );
|
|
LPCSTR szUsernameEncoded = coder.EncodedMessage();
|
|
|
|
char* szLoginUsernameBuffer = (char*)malloc( strlen( szUsernameEncoded ) + 4 );
|
|
if ( szLoginUsernameBuffer )
|
|
{
|
|
strcpy( szLoginUsernameBuffer, szUsernameEncoded );
|
|
strcat( szLoginUsernameBuffer, "\r\n" );
|
|
|
|
if ( SendData( m_hSocket, (PBYTE)szLoginUsernameBuffer, strlen( (const char*)szLoginUsernameBuffer ) ) == 0 )
|
|
{
|
|
SetErrorText( "SendData error.", WSAGetLastError() );
|
|
free( pReceiveBuffer );
|
|
return FALSE;
|
|
}
|
|
|
|
free( szLoginUsernameBuffer );
|
|
}
|
|
else
|
|
{
|
|
free( pReceiveBuffer );
|
|
return FALSE;
|
|
}
|
|
|
|
iReceived = ReceiveData( m_hSocket, pReceiveBuffer, dwReceiveBufferSize );
|
|
if ( iReceived )
|
|
{
|
|
SetErrorText( pReceiveBuffer );
|
|
|
|
// Check 334
|
|
int iResponseCode = GetResponseCode( pReceiveBuffer, iReceived );
|
|
if ( iResponseCode != 334 )
|
|
{
|
|
free( pReceiveBuffer );
|
|
return FALSE;
|
|
}
|
|
|
|
// Check request
|
|
if ( iReceived > 6 )
|
|
{
|
|
coder.Decode( pReceiveBuffer + 4, iReceived - 6 );
|
|
LPCSTR szRequest2 = coder.DecodedMessage();
|
|
if ( szRequest2 && strlen( szRequest2 ) > 0 )
|
|
{
|
|
if ( strcmpi( szRequest2, "Password:" ) == 0 )
|
|
{
|
|
coder.Encode( (const PBYTE)szPassword, strlen( szPassword ) );
|
|
LPCSTR szPasswordEncoded = coder.EncodedMessage();
|
|
|
|
char* szLoginPasswordBuffer = (char*)malloc( strlen( szPasswordEncoded ) + 4 );
|
|
if ( szLoginPasswordBuffer )
|
|
{
|
|
strcpy( szLoginPasswordBuffer, szPasswordEncoded );
|
|
strcat( szLoginPasswordBuffer, "\r\n" );
|
|
|
|
if ( SendData( m_hSocket, (PBYTE)szLoginPasswordBuffer, strlen( (const char*)szLoginPasswordBuffer ) ) == 0 )
|
|
{
|
|
SetErrorText( "SendData error.", WSAGetLastError() );
|
|
free( pReceiveBuffer );
|
|
return FALSE;
|
|
}
|
|
|
|
free( szLoginPasswordBuffer );
|
|
}
|
|
else
|
|
{
|
|
free( pReceiveBuffer );
|
|
return FALSE;
|
|
}
|
|
|
|
iReceived = ReceiveData( m_hSocket, pReceiveBuffer, dwReceiveBufferSize );
|
|
if ( iReceived )
|
|
{
|
|
SetErrorText( pReceiveBuffer );
|
|
|
|
// Check 235
|
|
int iResponseCode = GetResponseCode( pReceiveBuffer, iReceived );
|
|
if ( iResponseCode != 235 )
|
|
{
|
|
free( pReceiveBuffer );
|
|
return FALSE;
|
|
}
|
|
|
|
bSuccess = TRUE;
|
|
}
|
|
else
|
|
{
|
|
SetErrorText( "ReceiveData error.", WSAGetLastError() );
|
|
free( pReceiveBuffer );
|
|
return FALSE;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
else
|
|
{
|
|
free( pReceiveBuffer );
|
|
return FALSE;
|
|
}
|
|
}
|
|
}
|
|
else
|
|
{
|
|
free( pReceiveBuffer );
|
|
return FALSE;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
free( pReceiveBuffer );
|
|
return FALSE;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
SetErrorText( "ReceiveData error.", WSAGetLastError() );
|
|
free( pReceiveBuffer );
|
|
return FALSE;
|
|
}
|
|
|
|
free( pReceiveBuffer );
|
|
}
|
|
|
|
return bSuccess;
|
|
}
|
|
|
|
//////////////////////////////////////////////////////////////////////////
|
|
inline BOOL CSMTPClient::ServerLoginMethodCramMD5( LPCSTR szUsername, LPCSTR szPassword )
|
|
{
|
|
BOOL bSuccess = FALSE;
|
|
|
|
BYTE szCommandBuffer[ 256 ];
|
|
sprintf( (char*)szCommandBuffer, "%s %s\r\n", (char*)SMTP_COMMAND_AUTH, (char*)SMTP_COMMAND_AUTH_CRAM_MD5 );
|
|
if ( SendData( m_hSocket, (PBYTE)szCommandBuffer, strlen( (const char*)szCommandBuffer ) ) == 0 )
|
|
{
|
|
SetErrorText( "SendData error.", WSAGetLastError() );
|
|
return FALSE;
|
|
}
|
|
|
|
DWORD dwReceiveBufferSize = 1024*16;
|
|
PBYTE pReceiveBuffer = (PBYTE)malloc( dwReceiveBufferSize );
|
|
if ( pReceiveBuffer )
|
|
{
|
|
// Connected. Wait server hello string.
|
|
DWORD iReceived = ReceiveData( m_hSocket, pReceiveBuffer, dwReceiveBufferSize );
|
|
if ( iReceived )
|
|
{
|
|
SetErrorText( pReceiveBuffer );
|
|
|
|
// Check 334
|
|
int iResponseCode = GetResponseCode( pReceiveBuffer, iReceived );
|
|
if ( iResponseCode != 334 )
|
|
{
|
|
free( pReceiveBuffer );
|
|
return FALSE;
|
|
}
|
|
|
|
// Check request
|
|
if ( iReceived > 6 )
|
|
{
|
|
Base64Coder coder;
|
|
coder.Decode( pReceiveBuffer + 4, iReceived - 6 );
|
|
LPCSTR szResponse = coder.DecodedMessage();
|
|
if ( szResponse && strlen( szResponse ) > 0 )
|
|
{
|
|
char *auth_hex = hash_md5( szPassword, szResponse, strlen(szResponse) );
|
|
if ( !auth_hex )
|
|
{
|
|
free( pReceiveBuffer );
|
|
return FALSE;
|
|
}
|
|
|
|
char *szCommand = (char*)malloc( strlen( szUsername ) + strlen( auth_hex ) + 5 );
|
|
if ( szCommand )
|
|
{
|
|
sprintf( szCommand, "%s %s", szUsername, auth_hex );
|
|
|
|
free( auth_hex );
|
|
|
|
coder.Encode( (const PBYTE)szCommand, strlen( szCommand ) );
|
|
|
|
free( szCommand );
|
|
|
|
LPCSTR szAuthEncoded = coder.EncodedMessage();
|
|
if ( szAuthEncoded == NULL )
|
|
{
|
|
free( pReceiveBuffer );
|
|
return FALSE;
|
|
}
|
|
|
|
char *szAuthCommand = (char*)malloc( strlen( szAuthEncoded ) + 4 );
|
|
if ( szAuthCommand )
|
|
{
|
|
strcpy( szAuthCommand, szAuthEncoded );
|
|
strcat( szAuthCommand, "\r\n" );
|
|
|
|
// Send auth data
|
|
if ( SendData( m_hSocket, (PBYTE)szAuthCommand, strlen( (const char*)szAuthCommand ) ) == 0 )
|
|
{
|
|
SetErrorText( "SendData error.", WSAGetLastError() );
|
|
free( szAuthCommand );
|
|
free( pReceiveBuffer );
|
|
return FALSE;
|
|
}
|
|
|
|
// Check response
|
|
iReceived = ReceiveData( m_hSocket, pReceiveBuffer, dwReceiveBufferSize );
|
|
if ( iReceived )
|
|
{
|
|
SetErrorText( pReceiveBuffer );
|
|
|
|
// Check 235
|
|
int iResponseCode = GetResponseCode( pReceiveBuffer, iReceived );
|
|
if ( iResponseCode != 235 )
|
|
{
|
|
free( pReceiveBuffer );
|
|
return FALSE;
|
|
}
|
|
|
|
bSuccess = TRUE;
|
|
}
|
|
else
|
|
{
|
|
SetErrorText( "ReceiveData error.", WSAGetLastError() );
|
|
free( pReceiveBuffer );
|
|
return FALSE;
|
|
}
|
|
|
|
free( szAuthCommand );
|
|
}
|
|
else
|
|
{
|
|
free( pReceiveBuffer );
|
|
return FALSE;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
free( auth_hex );
|
|
free( pReceiveBuffer );
|
|
return FALSE;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
free( pReceiveBuffer );
|
|
return FALSE;
|
|
}
|
|
}
|
|
|
|
}
|
|
else
|
|
{
|
|
SetErrorText( "ReceiveData error.", WSAGetLastError() );
|
|
free( pReceiveBuffer );
|
|
return FALSE;
|
|
}
|
|
|
|
free( pReceiveBuffer );
|
|
}
|
|
else
|
|
{
|
|
SetErrorText( "malloc() failed.", GetLastError() );
|
|
}
|
|
|
|
return bSuccess;
|
|
}
|
|
|
|
//////////////////////////////////////////////////////////////////////////
|
|
inline BOOL CSMTPClient::SendMessage( LPCSTR szFromAddress, LPCSTR szFromName, LPCSTR szToAddresses, LPCSTR szSubject, LPCSTR szXMailer, LPBYTE pBodyBuffer, DWORD dwBodySize )
|
|
{
|
|
BOOL bSuccess = FALSE;
|
|
|
|
// Format Header
|
|
if ( !szFromAddress )
|
|
{
|
|
SetErrorText( "SendMessage. Invalid Parameters!" );
|
|
return NULL;
|
|
}
|
|
|
|
char *szHeaderBuffer = (char*)malloc( 1024 * 16 );
|
|
if ( szHeaderBuffer )
|
|
{
|
|
// get the current date and time
|
|
char szDate[ 500 ];
|
|
char sztTime[ 500 ];
|
|
|
|
SYSTEMTIME st = { 0 };
|
|
::GetSystemTime(&st);
|
|
|
|
::GetDateFormatA( MAKELCID( MAKELANGID( LANG_ENGLISH, SUBLANG_ENGLISH_US), SORT_DEFAULT), 0, &st, "ddd',' dd MMM yyyy", szDate , sizeof( szDate ) );
|
|
::GetTimeFormatA( MAKELCID( MAKELANGID( LANG_ENGLISH, SUBLANG_ENGLISH_US), SORT_DEFAULT), TIME_FORCE24HOURFORMAT, &st, "HH':'mm':'ss", sztTime, sizeof( sztTime ) );
|
|
|
|
sprintf( szHeaderBuffer, "DATE: %s %s\r\n", szDate, sztTime );
|
|
|
|
// X-Mailer Field
|
|
if ( szXMailer && strlen( szXMailer ) )
|
|
{
|
|
strcat( szHeaderBuffer, "X-Mailer: " );
|
|
strcat( szHeaderBuffer, szXMailer );
|
|
strcat( szHeaderBuffer, "\r\n" );
|
|
}
|
|
|
|
// From:
|
|
strcat( szHeaderBuffer, "From: " );
|
|
if ( szFromName )
|
|
{
|
|
strcat( szHeaderBuffer, "\"" );
|
|
strcat( szHeaderBuffer, szFromName );
|
|
strcat( szHeaderBuffer, "\" <" );
|
|
strcat( szHeaderBuffer, szFromAddress );
|
|
strcat( szHeaderBuffer, ">\r\n" );
|
|
}
|
|
else
|
|
{
|
|
strcat( szHeaderBuffer, "<" );
|
|
strcat( szHeaderBuffer, szFromAddress );
|
|
strcat( szHeaderBuffer, ">\r\n" );
|
|
}
|
|
|
|
// Subject:
|
|
if ( szSubject && strlen( szSubject ) )
|
|
{
|
|
strcat( szHeaderBuffer, "Subject: " );
|
|
strcat( szHeaderBuffer, szSubject );
|
|
strcat( szHeaderBuffer, "\r\n" );
|
|
}
|
|
|
|
// To Fields
|
|
strcat( szHeaderBuffer, "To: " );
|
|
strcat( szHeaderBuffer, szToAddresses );
|
|
strcat( szHeaderBuffer, "\r\n" );
|
|
|
|
// MIME
|
|
strcat( szHeaderBuffer, "MIME-Version: 1.0\r\nContent-type: text/plain; charset=US-ASCII\r\n" );
|
|
|
|
// End Header
|
|
strcat( szHeaderBuffer, "\r\n" );
|
|
}
|
|
else
|
|
{
|
|
SetErrorText( "malloc error.", GetLastError() );
|
|
return FALSE;
|
|
}
|
|
|
|
|
|
BYTE szCommandBuffer[ 256 ];
|
|
sprintf( (char*)szCommandBuffer, "MAIL FROM:<%s> SIZE=%u\r\n", (char*)szFromAddress, strlen( szHeaderBuffer ) + dwBodySize + 2 );
|
|
if ( SendData( m_hSocket, (PBYTE)szCommandBuffer, strlen( (const char*)szCommandBuffer ) ) == 0 )
|
|
{
|
|
SetErrorText( "SendData error.", WSAGetLastError() );
|
|
free( szHeaderBuffer );
|
|
return FALSE;
|
|
}
|
|
|
|
DWORD dwReceiveBufferSize = 1024*16;
|
|
PBYTE pReceiveBuffer = (PBYTE)malloc( dwReceiveBufferSize );
|
|
if ( pReceiveBuffer )
|
|
{
|
|
DWORD iReceived = ReceiveData( m_hSocket, pReceiveBuffer, dwReceiveBufferSize );
|
|
if ( iReceived )
|
|
{
|
|
SetErrorText( pReceiveBuffer );
|
|
|
|
// Check 250
|
|
int iResponseCode = GetResponseCode( pReceiveBuffer, iReceived );
|
|
if ( iResponseCode != 250 )
|
|
{
|
|
free( szHeaderBuffer );
|
|
free( pReceiveBuffer );
|
|
return FALSE;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
SetErrorText( "ReceiveData error.", WSAGetLastError() );
|
|
free( szHeaderBuffer );
|
|
free( pReceiveBuffer );
|
|
return FALSE;
|
|
}
|
|
|
|
// Post "RCTP TO:"
|
|
char *szCurrentAddr = (char*)malloc( strlen( szToAddresses ) + 1 );
|
|
if ( !szCurrentAddr )
|
|
{
|
|
SetErrorText( "malloc error.", GetLastError() );
|
|
free( szHeaderBuffer );
|
|
free( pReceiveBuffer );
|
|
return FALSE;
|
|
}
|
|
|
|
const char* szToOffset = szToAddresses;
|
|
char* szZap = NULL;
|
|
|
|
BOOL bRCPTAccepted = FALSE;
|
|
do
|
|
{
|
|
strcpy( szCurrentAddr, szToOffset );
|
|
char *szExtractedAdress = szCurrentAddr;
|
|
szZap = strchr( szCurrentAddr, ',' );
|
|
|
|
if ( szZap )
|
|
{
|
|
*szZap = 0;
|
|
szToOffset = szZap + 1;
|
|
}
|
|
|
|
char *pSkobka1 = strchr( szCurrentAddr, '<' );
|
|
char *pSkobka2 = strchr( szCurrentAddr, '>' );
|
|
|
|
if ( pSkobka1 && pSkobka2 && pSkobka2 > pSkobka1 )
|
|
{
|
|
szExtractedAdress = pSkobka1 + 1;
|
|
*pSkobka2 = NULL;
|
|
}
|
|
|
|
if ( szExtractedAdress && strlen( szExtractedAdress ) > 0 )
|
|
{
|
|
sprintf( (char*)szCommandBuffer, "RCPT TO:<%s>\r\n", (char*)szExtractedAdress );
|
|
if ( SendData( m_hSocket, (PBYTE)szCommandBuffer, strlen( (const char*)szCommandBuffer ) ) == 0 )
|
|
{
|
|
SetErrorText( "SendData error.", WSAGetLastError() );
|
|
free( szCurrentAddr );
|
|
free( pReceiveBuffer );
|
|
free( szHeaderBuffer );
|
|
return FALSE;
|
|
}
|
|
|
|
iReceived = ReceiveData( m_hSocket, pReceiveBuffer, dwReceiveBufferSize );
|
|
if ( iReceived )
|
|
{
|
|
SetErrorText( pReceiveBuffer );
|
|
|
|
// Check 250
|
|
int iResponseCode = GetResponseCode( pReceiveBuffer, iReceived );
|
|
if ( iResponseCode == 250 )
|
|
{
|
|
bRCPTAccepted = TRUE;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
SetErrorText( "ReceiveData error.", WSAGetLastError() );
|
|
free( szCurrentAddr );
|
|
free( pReceiveBuffer );
|
|
free( szHeaderBuffer );
|
|
return FALSE;
|
|
}
|
|
}
|
|
|
|
} while( szZap );
|
|
|
|
free( szCurrentAddr );
|
|
|
|
if ( bRCPTAccepted )
|
|
{
|
|
sprintf( (char*)szCommandBuffer, "DATA\r\n" );
|
|
if ( SendData( m_hSocket, (PBYTE)szCommandBuffer, strlen( (const char*)szCommandBuffer ) ) == 0 )
|
|
{
|
|
SetErrorText( "SendData error.", WSAGetLastError() );
|
|
free( pReceiveBuffer );
|
|
free( szHeaderBuffer );
|
|
return FALSE;
|
|
}
|
|
|
|
iReceived = ReceiveData( m_hSocket, pReceiveBuffer, dwReceiveBufferSize );
|
|
if ( iReceived )
|
|
{
|
|
SetErrorText( pReceiveBuffer );
|
|
|
|
// Check 354
|
|
int iResponseCode = GetResponseCode( pReceiveBuffer, iReceived );
|
|
if ( iResponseCode != 354 )
|
|
{
|
|
free( pReceiveBuffer );
|
|
free( szHeaderBuffer );
|
|
return FALSE;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
SetErrorText( "ReceiveData error.", WSAGetLastError() );
|
|
free( pReceiveBuffer );
|
|
free( szHeaderBuffer );
|
|
return FALSE;
|
|
}
|
|
|
|
// Send message data (header + body + .)
|
|
if ( SendData( m_hSocket, (PBYTE)szHeaderBuffer, strlen( (const char*)szHeaderBuffer ) ) == 0 )
|
|
{
|
|
SetErrorText( "SendData error.", WSAGetLastError() );
|
|
free( pReceiveBuffer );
|
|
free( szHeaderBuffer );
|
|
return FALSE;
|
|
}
|
|
|
|
if ( SendData( m_hSocket, (PBYTE)pBodyBuffer, dwBodySize ) == 0 )
|
|
{
|
|
SetErrorText( "SendData error.", WSAGetLastError() );
|
|
free( pReceiveBuffer );
|
|
free( szHeaderBuffer );
|
|
return FALSE;
|
|
}
|
|
|
|
if ( SendData( m_hSocket, (PBYTE)"\r\n.\r\n", 5 ) == 0 )
|
|
{
|
|
SetErrorText( "SendData error.", WSAGetLastError() );
|
|
free( pReceiveBuffer );
|
|
free( szHeaderBuffer );
|
|
return FALSE;
|
|
}
|
|
|
|
iReceived = ReceiveData( m_hSocket, pReceiveBuffer, dwReceiveBufferSize );
|
|
if ( iReceived )
|
|
{
|
|
SetErrorText( pReceiveBuffer );
|
|
|
|
// Check 250
|
|
int iResponseCode = GetResponseCode( pReceiveBuffer, iReceived );
|
|
if ( iResponseCode == 250 )
|
|
{
|
|
bSuccess = TRUE;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
SetErrorText( "ReceiveData error.", WSAGetLastError() );
|
|
}
|
|
}
|
|
|
|
free( pReceiveBuffer );
|
|
}
|
|
else
|
|
{
|
|
SetErrorText( "malloc error.", GetLastError() );
|
|
}
|
|
|
|
if ( szHeaderBuffer )
|
|
free( szHeaderBuffer );
|
|
|
|
return bSuccess;
|
|
}
|
|
|
|
|
|
|
|
//////////////////////////////////////////////////////////////////////////
|
|
//////////////////////////////////////////////////////////////////////////
|
|
//////////////////////////////////////////////////////////////////////////
|
|
//////////////////////////////////////////////////////////////////////////
|
|
|
|
|
|
#ifndef PAGESIZE
|
|
#define PAGESIZE 4096
|
|
#endif
|
|
|
|
#ifndef ROUNDTOPAGE
|
|
#define ROUNDTOPAGE(a) (((a/4096)+1)*4096)
|
|
#endif
|
|
|
|
//////////////////////////////////////////////////////////////////////
|
|
// Construction/Destruction
|
|
//////////////////////////////////////////////////////////////////////
|
|
|
|
inline Base64Coder::Base64Coder()
|
|
: m_pDBuffer(NULL),
|
|
m_pEBuffer(NULL),
|
|
m_nDBufLen(0),
|
|
m_nEBufLen(0)
|
|
{
|
|
|
|
}
|
|
|
|
inline Base64Coder::~Base64Coder()
|
|
{
|
|
if(m_pDBuffer != NULL)
|
|
delete [] m_pDBuffer;
|
|
|
|
if(m_pEBuffer != NULL)
|
|
delete [] m_pEBuffer;
|
|
}
|
|
|
|
inline LPCSTR Base64Coder::DecodedMessage() const
|
|
{
|
|
return (LPCSTR) m_pDBuffer;
|
|
}
|
|
|
|
inline LPCSTR Base64Coder::EncodedMessage() const
|
|
{
|
|
return (LPCSTR) m_pEBuffer;
|
|
}
|
|
|
|
inline void Base64Coder::AllocEncode(DWORD nSize)
|
|
{
|
|
if(m_nEBufLen < nSize)
|
|
{
|
|
if(m_pEBuffer != NULL)
|
|
delete [] m_pEBuffer;
|
|
|
|
m_nEBufLen = ROUNDTOPAGE(nSize);
|
|
m_pEBuffer = new BYTE[m_nEBufLen];
|
|
}
|
|
|
|
::ZeroMemory(m_pEBuffer, m_nEBufLen);
|
|
m_nEDataLen = 0;
|
|
}
|
|
|
|
inline void Base64Coder::AllocDecode(DWORD nSize)
|
|
{
|
|
if(m_nDBufLen < nSize)
|
|
{
|
|
if(m_pDBuffer != NULL)
|
|
delete [] m_pDBuffer;
|
|
|
|
m_nDBufLen = ROUNDTOPAGE(nSize);
|
|
m_pDBuffer = new BYTE[m_nDBufLen];
|
|
}
|
|
|
|
::ZeroMemory(m_pDBuffer, m_nDBufLen);
|
|
m_nDDataLen = 0;
|
|
}
|
|
|
|
inline void Base64Coder::SetEncodeBuffer(const PBYTE pBuffer, DWORD nBufLen)
|
|
{
|
|
DWORD i = 0;
|
|
|
|
AllocEncode(nBufLen);
|
|
while(i < nBufLen)
|
|
{
|
|
if(!_IsBadMimeChar(pBuffer[i]))
|
|
{
|
|
m_pEBuffer[m_nEDataLen] = pBuffer[i];
|
|
m_nEDataLen++;
|
|
}
|
|
|
|
i++;
|
|
}
|
|
}
|
|
|
|
inline void Base64Coder::SetDecodeBuffer(const PBYTE pBuffer, DWORD nBufLen)
|
|
{
|
|
AllocDecode(nBufLen);
|
|
::CopyMemory(m_pDBuffer, pBuffer, nBufLen);
|
|
m_nDDataLen = nBufLen;
|
|
}
|
|
|
|
inline void Base64Coder::Encode(const PBYTE pBuffer, DWORD nBufLen)
|
|
{
|
|
SetDecodeBuffer(pBuffer, nBufLen);
|
|
AllocEncode(nBufLen * 2);
|
|
|
|
TempBucket Raw;
|
|
DWORD nIndex = 0;
|
|
|
|
while((nIndex + 3) <= nBufLen)
|
|
{
|
|
Raw.Clear();
|
|
::CopyMemory(&Raw, m_pDBuffer + nIndex, 3);
|
|
Raw.nSize = 3;
|
|
_EncodeToBuffer(Raw, m_pEBuffer + m_nEDataLen);
|
|
nIndex += 3;
|
|
m_nEDataLen += 4;
|
|
}
|
|
|
|
if(nBufLen > nIndex)
|
|
{
|
|
Raw.Clear();
|
|
Raw.nSize = (BYTE) (nBufLen - nIndex);
|
|
::CopyMemory(&Raw, m_pDBuffer + nIndex, nBufLen - nIndex);
|
|
_EncodeToBuffer(Raw, m_pEBuffer + m_nEDataLen);
|
|
m_nEDataLen += 4;
|
|
}
|
|
}
|
|
|
|
inline void Base64Coder::Encode(LPCSTR szMessage)
|
|
{
|
|
if(szMessage != NULL)
|
|
Base64Coder::Encode((const PBYTE)szMessage, strlen( (const char*)szMessage));
|
|
}
|
|
|
|
inline void Base64Coder::Decode(const PBYTE pBuffer, DWORD dwBufLen)
|
|
{
|
|
if(is_init())
|
|
_Init();
|
|
|
|
SetEncodeBuffer(pBuffer, dwBufLen);
|
|
|
|
AllocDecode(dwBufLen);
|
|
|
|
TempBucket Raw;
|
|
|
|
DWORD nIndex = 0;
|
|
|
|
while((nIndex + 4) <= m_nEDataLen)
|
|
{
|
|
Raw.Clear();
|
|
Raw.nData[0] = DecodeTable()[m_pEBuffer[nIndex]];
|
|
Raw.nData[1] = DecodeTable()[m_pEBuffer[nIndex + 1]];
|
|
Raw.nData[2] = DecodeTable()[m_pEBuffer[nIndex + 2]];
|
|
Raw.nData[3] = DecodeTable()[m_pEBuffer[nIndex + 3]];
|
|
|
|
if(Raw.nData[2] == 255)
|
|
Raw.nData[2] = 0;
|
|
if(Raw.nData[3] == 255)
|
|
Raw.nData[3] = 0;
|
|
|
|
Raw.nSize = 4;
|
|
_DecodeToBuffer(Raw, m_pDBuffer + m_nDDataLen);
|
|
nIndex += 4;
|
|
m_nDDataLen += 3;
|
|
}
|
|
|
|
// If nIndex < m_nEDataLen, then we got a decode message without padding.
|
|
// We may want to throw some kind of warning here, but we are still required
|
|
// to handle the decoding as if it was properly padded.
|
|
if(nIndex < m_nEDataLen)
|
|
{
|
|
Raw.Clear();
|
|
for(DWORD i = nIndex; i < m_nEDataLen; i++)
|
|
{
|
|
Raw.nData[i - nIndex] = DecodeTable()[m_pEBuffer[i]];
|
|
Raw.nSize++;
|
|
if(Raw.nData[i - nIndex] == 255)
|
|
Raw.nData[i - nIndex] = 0;
|
|
}
|
|
|
|
_DecodeToBuffer(Raw, m_pDBuffer + m_nDDataLen);
|
|
m_nDDataLen += (m_nEDataLen - nIndex);
|
|
}
|
|
}
|
|
|
|
inline void Base64Coder::Decode(LPCSTR szMessage)
|
|
{
|
|
if(szMessage != NULL)
|
|
Base64Coder::Decode((const PBYTE)szMessage, strlen((const char*)szMessage));
|
|
}
|
|
|
|
inline DWORD Base64Coder::_DecodeToBuffer(const TempBucket &Decode, PBYTE pBuffer)
|
|
{
|
|
TempBucket Data;
|
|
DWORD nCount = 0;
|
|
|
|
_DecodeRaw(Data, Decode);
|
|
|
|
for(int i = 0; i < 3; i++)
|
|
{
|
|
pBuffer[i] = Data.nData[i];
|
|
if(pBuffer[i] != 255)
|
|
nCount++;
|
|
}
|
|
|
|
return nCount;
|
|
}
|
|
|
|
|
|
inline void Base64Coder::_EncodeToBuffer(const TempBucket &Decode, PBYTE pBuffer)
|
|
{
|
|
TempBucket Data;
|
|
|
|
_EncodeRaw(Data, Decode);
|
|
|
|
for(int i = 0; i < 4; i++)
|
|
pBuffer[i] = Base64Digits()[Data.nData[i]];
|
|
|
|
switch(Decode.nSize)
|
|
{
|
|
case 1:
|
|
pBuffer[2] = '=';
|
|
case 2:
|
|
pBuffer[3] = '=';
|
|
}
|
|
}
|
|
|
|
inline void Base64Coder::_DecodeRaw(TempBucket &Data, const TempBucket &Decode)
|
|
{
|
|
BYTE nTemp;
|
|
|
|
Data.nData[0] = Decode.nData[0];
|
|
Data.nData[0] <<= 2;
|
|
|
|
nTemp = Decode.nData[1];
|
|
nTemp >>= 4;
|
|
nTemp &= 0x03;
|
|
Data.nData[0] |= nTemp;
|
|
|
|
Data.nData[1] = Decode.nData[1];
|
|
Data.nData[1] <<= 4;
|
|
|
|
nTemp = Decode.nData[2];
|
|
nTemp >>= 2;
|
|
nTemp &= 0x0F;
|
|
Data.nData[1] |= nTemp;
|
|
|
|
Data.nData[2] = Decode.nData[2];
|
|
Data.nData[2] <<= 6;
|
|
nTemp = Decode.nData[3];
|
|
nTemp &= 0x3F;
|
|
Data.nData[2] |= nTemp;
|
|
}
|
|
|
|
inline void Base64Coder::_EncodeRaw(TempBucket &Data, const TempBucket &Decode)
|
|
{
|
|
BYTE nTemp;
|
|
|
|
Data.nData[0] = Decode.nData[0];
|
|
Data.nData[0] >>= 2;
|
|
|
|
Data.nData[1] = Decode.nData[0];
|
|
Data.nData[1] <<= 4;
|
|
nTemp = Decode.nData[1];
|
|
nTemp >>= 4;
|
|
Data.nData[1] |= nTemp;
|
|
Data.nData[1] &= 0x3F;
|
|
|
|
Data.nData[2] = Decode.nData[1];
|
|
Data.nData[2] <<= 2;
|
|
|
|
nTemp = Decode.nData[2];
|
|
nTemp >>= 6;
|
|
|
|
Data.nData[2] |= nTemp;
|
|
Data.nData[2] &= 0x3F;
|
|
|
|
Data.nData[3] = Decode.nData[2];
|
|
Data.nData[3] &= 0x3F;
|
|
}
|
|
|
|
inline BOOL Base64Coder::_IsBadMimeChar(BYTE nData)
|
|
{
|
|
switch(nData)
|
|
{
|
|
case '\r': case '\n': case '\t': case ' ' :
|
|
case '\b': case '\a': case '\f': case '\v':
|
|
return TRUE;
|
|
default:
|
|
return FALSE;
|
|
}
|
|
}
|
|
|
|
inline void Base64Coder::_Init()
|
|
{ // Initialize Decoding table.
|
|
|
|
int i;
|
|
|
|
for(i = 0; i < 256; i++)
|
|
DecodeTable()[i] = -2;
|
|
|
|
for(i = 0; i < 64; i++)
|
|
{
|
|
DecodeTable()[Base64Digits()[i]] = i;
|
|
DecodeTable()[Base64Digits()[i]|0x80] = i;
|
|
}
|
|
|
|
DecodeTable()['='] = -1;
|
|
DecodeTable()['='|0x80] = -1;
|
|
|
|
is_init() = TRUE;
|
|
}
|
|
|
|
|
|
}
|
|
}
|
|
} |