2012-05-27 [paul] 3.8.0cvs48
[claws.git] / src / common / smtp.c
1 /*
2  * Sylpheed -- a GTK+ based, lightweight, and fast e-mail client
3  * Copyright (C) 1999-2012 Hiroyuki Yamamoto and the Claws Mail team
4  *
5  * This program is free software; you can redistribute it and/or modify
6  * it under the terms of the GNU General Public License as published by
7  * the Free Software Foundation; either version 3 of the License, or
8  * (at your option) any later version.
9  *
10  * This program is distributed in the hope that it will be useful,
11  * but WITHOUT ANY WARRANTY; without even the implied warranty of
12  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
13  * GNU General Public License for more details.
14  *
15  * You should have received a copy of the GNU General Public License
16  * along with this program. If not, see <http://www.gnu.org/licenses/>.
17  * 
18  */
19
20 #ifdef HAVE_CONFIG_H
21 #  include "config.h"
22 #endif
23
24 #include <glib.h>
25 #ifdef ENABLE_NLS
26 #include <glib/gi18n.h>
27 #else
28 #define _(a) (a)
29 #define N_(a) (a)
30 #endif
31 #include <stdio.h>
32 #include <string.h>
33
34 #include "smtp.h"
35 #include "md5.h"
36 #include "base64.h"
37 #include "utils.h"
38 #include "log.h"
39
40 static void smtp_session_destroy(Session *session);
41
42 static gint smtp_auth(SMTPSession *session);
43 #ifdef USE_GNUTLS
44 static gint smtp_starttls(SMTPSession *session);
45 #endif
46 static gint smtp_auth_cram_md5(SMTPSession *session);
47 static gint smtp_auth_login(SMTPSession *session);
48 static gint smtp_auth_plain(SMTPSession *session);
49
50 static gint smtp_ehlo(SMTPSession *session);
51 static gint smtp_ehlo_recv(SMTPSession *session, const gchar *msg);
52
53 static gint smtp_helo(SMTPSession *session);
54 static gint smtp_rcpt(SMTPSession *session);
55 static gint smtp_data(SMTPSession *session);
56 static gint smtp_send_data(SMTPSession *session);
57 static gint smtp_make_ready(SMTPSession *session);
58 static gint smtp_eom(SMTPSession *session);
59
60 static gint smtp_session_recv_msg(Session *session, const gchar *msg);
61 static gint smtp_session_send_data_finished(Session *session, guint len);
62
63
64 Session *smtp_session_new(void *prefs_account)
65 {
66         SMTPSession *session;
67
68         session = g_new0(SMTPSession, 1);
69
70         session_init(SESSION(session), prefs_account, TRUE);
71
72         SESSION(session)->type             = SESSION_SMTP;
73
74         SESSION(session)->recv_msg         = smtp_session_recv_msg;
75
76         SESSION(session)->recv_data_finished = NULL;
77         SESSION(session)->send_data_finished = smtp_session_send_data_finished;
78
79         SESSION(session)->destroy          = smtp_session_destroy;
80
81         session->state                     = SMTP_READY;
82
83 #ifdef USE_GNUTLS
84         session->tls_init_done             = FALSE;
85 #endif
86
87         session->hostname                  = NULL;
88         session->user                      = NULL;
89         session->pass                      = NULL;
90
91         session->from                      = NULL;
92         session->to_list                   = NULL;
93         session->cur_to                    = NULL;
94
95         session->send_data                 = NULL;
96         session->send_data_len             = 0;
97
98         session->max_message_size          = -1;
99
100         session->avail_auth_type           = 0;
101         session->forced_auth_type          = 0;
102         session->auth_type                 = 0;
103         session->esmtp_flags               = 0;
104
105         session->error_val                 = SM_OK;
106         session->error_msg                 = NULL;
107
108         return SESSION(session);
109 }
110
111 static void smtp_session_destroy(Session *session)
112 {
113         SMTPSession *smtp_session = SMTP_SESSION(session);
114
115         g_free(smtp_session->hostname);
116         g_free(smtp_session->user);
117         g_free(smtp_session->pass);
118         g_free(smtp_session->from);
119
120         g_free(smtp_session->send_data);
121
122         g_free(smtp_session->error_msg);
123 }
124
125 gint smtp_from(SMTPSession *session)
126 {
127         gchar buf[MSGBUFSIZE];
128         gchar *mail_size = NULL;
129
130         cm_return_val_if_fail(session->from != NULL, SM_ERROR);
131
132         session->state = SMTP_FROM;
133         
134         if (session->is_esmtp && (session->esmtp_flags & ESMTP_SIZE)!=0)
135                 mail_size = g_strdup_printf(" SIZE=%d", session->send_data_len);
136         else
137                 mail_size = g_strdup("");
138                 
139
140         if (strchr(session->from, '<'))
141                 g_snprintf(buf, sizeof(buf), "MAIL FROM:%s%s", session->from,
142                            mail_size);
143         else
144                 g_snprintf(buf, sizeof(buf), "MAIL FROM:<%s>%s", session->from,
145                            mail_size);
146
147         g_free(mail_size);
148
149         if (session_send_msg(SESSION(session), SESSION_MSG_NORMAL, buf) < 0)
150                 return SM_ERROR;
151         log_print(LOG_PROTOCOL, "%sSMTP> %s\n", (session->is_esmtp?"E":""), buf);
152
153         return SM_OK;
154 }
155
156 static gint smtp_auth(SMTPSession *session)
157 {
158
159         cm_return_val_if_fail(session->user != NULL, SM_ERROR);
160
161         session->state = SMTP_AUTH;
162
163         if ((session->forced_auth_type == SMTPAUTH_CRAM_MD5
164              || session->forced_auth_type == 0)
165             &&
166              (session->avail_auth_type & SMTPAUTH_CRAM_MD5) != 0)
167                 smtp_auth_cram_md5(session);
168         else if ((session->forced_auth_type == SMTPAUTH_LOGIN
169                   || session->forced_auth_type == 0)
170                  &&
171                   (session->avail_auth_type & SMTPAUTH_LOGIN) != 0)
172                 smtp_auth_login(session);
173         else if ((session->forced_auth_type == SMTPAUTH_PLAIN
174                   || session->forced_auth_type == 0)
175                  &&
176                   (session->avail_auth_type & SMTPAUTH_PLAIN) != 0)
177                 smtp_auth_plain(session);
178         else if (session->forced_auth_type == 0) {
179                 log_warning(LOG_PROTOCOL, _("No SMTP AUTH method available\n"));
180                 return SM_AUTHFAIL;
181         } else {
182                 log_warning(LOG_PROTOCOL, _("Selected SMTP AUTH method not available\n"));
183                 return SM_AUTHFAIL;
184         }
185
186         return SM_OK;
187 }
188
189 static gint smtp_auth_recv(SMTPSession *session, const gchar *msg)
190 {
191         gchar buf[MSGBUFSIZE];
192
193         switch (session->auth_type) {
194         case SMTPAUTH_LOGIN:
195                 session->state = SMTP_AUTH_LOGIN_USER;
196
197                 if (!strncmp(msg, "334 ", 4)) {
198                         base64_encode(buf, session->user, strlen(session->user));
199
200                         if (session_send_msg(SESSION(session), SESSION_MSG_NORMAL,
201                                          buf) < 0)
202                                 return SM_ERROR;
203                         log_print(LOG_PROTOCOL, "ESMTP> [USERID]\n");
204                 } else {
205                         /* Server rejects AUTH */
206                         if (session_send_msg(SESSION(session), SESSION_MSG_NORMAL,
207                                          "*") < 0)
208                                 return SM_ERROR;
209                         log_print(LOG_PROTOCOL, "ESMTP> *\n");
210                 }
211                 break;
212         case SMTPAUTH_CRAM_MD5:
213                 session->state = SMTP_AUTH_CRAM_MD5;
214
215                 if (!strncmp(msg, "334 ", 4)) {
216                         gchar *response;
217                         gchar *response64;
218                         gchar *challenge;
219                         gint challengelen;
220                         guchar hexdigest[33];
221
222                         challenge = g_malloc(strlen(msg + 4) + 1);
223                         challengelen = base64_decode(challenge, msg + 4, -1);
224                         challenge[challengelen] = '\0';
225                         log_print(LOG_PROTOCOL, "ESMTP< [Decoded: %s]\n", challenge);
226
227                         g_snprintf(buf, sizeof(buf), "%s", session->pass);
228                         md5_hex_hmac(hexdigest, challenge, challengelen,
229                                      buf, strlen(session->pass));
230                         g_free(challenge);
231
232                         response = g_strdup_printf
233                                 ("%s %s", session->user, hexdigest);
234                         log_print(LOG_PROTOCOL, "ESMTP> [Encoded: %s]\n", response);
235
236                         response64 = g_malloc((strlen(response) + 3) * 2 + 1);
237                         base64_encode(response64, response, strlen(response));
238                         g_free(response);
239
240                         if (session_send_msg(SESSION(session), SESSION_MSG_NORMAL,
241                                          response64) < 0)
242                                 return SM_ERROR;
243                         log_print(LOG_PROTOCOL, "ESMTP> %s\n", response64);
244                         g_free(response64);
245                 } else {
246                         /* Server rejects AUTH */
247                         if (session_send_msg(SESSION(session), SESSION_MSG_NORMAL,
248                                          "*") < 0)
249                                 return SM_ERROR;
250                         log_print(LOG_PROTOCOL, "ESMTP> *\n");
251                 }
252                 break;
253         case SMTPAUTH_DIGEST_MD5:
254         default:
255                 /* stop smtp_auth when no correct authtype */
256                 if (session_send_msg(SESSION(session), SESSION_MSG_NORMAL, "*") < 0)
257                         return SM_ERROR;
258                 log_print(LOG_PROTOCOL, "ESMTP> *\n");
259                 break;
260         }
261
262         return SM_OK;
263 }
264
265 static gint smtp_auth_login_user_recv(SMTPSession *session, const gchar *msg)
266 {
267         gchar buf[MSGBUFSIZE];
268
269         session->state = SMTP_AUTH_LOGIN_PASS;
270
271         if (!strncmp(msg, "334 ", 4))
272                 base64_encode(buf, session->pass, strlen(session->pass));
273         else
274                 /* Server rejects AUTH */
275                 g_snprintf(buf, sizeof(buf), "*");
276
277         if (session_send_msg(SESSION(session), SESSION_MSG_NORMAL, buf) < 0)
278                 return SM_ERROR;
279
280         log_print(LOG_PROTOCOL, "ESMTP> [PASSWORD]\n");
281
282         return SM_OK;
283 }
284
285 static gint smtp_ehlo(SMTPSession *session)
286 {
287         gchar buf[MSGBUFSIZE];
288
289         session->state = SMTP_EHLO;
290
291         session->avail_auth_type = 0;
292
293         g_snprintf(buf, sizeof(buf), "EHLO %s",
294                    session->hostname ? session->hostname : get_domain_name());
295         if (session_send_msg(SESSION(session), SESSION_MSG_NORMAL, buf) < 0)
296                 return SM_ERROR;
297         log_print(LOG_PROTOCOL, "ESMTP> %s\n", buf);
298
299         return SM_OK;
300 }
301
302 static gint smtp_ehlo_recv(SMTPSession *session, const gchar *msg)
303 {
304         if (strncmp(msg, "250", 3) == 0) {
305                 const gchar *p = msg;
306                 p += 3;
307                 if (*p == '-' || *p == ' ') p++;
308                 if (g_ascii_strncasecmp(p, "AUTH", 4) == 0) {
309                         p += 5;
310                         if (strcasestr(p, "PLAIN"))
311                                 session->avail_auth_type |= SMTPAUTH_PLAIN;
312                         if (strcasestr(p, "LOGIN"))
313                                 session->avail_auth_type |= SMTPAUTH_LOGIN;
314                         if (strcasestr(p, "CRAM-MD5"))
315                                 session->avail_auth_type |= SMTPAUTH_CRAM_MD5;
316                         if (strcasestr(p, "DIGEST-MD5"))
317                                 session->avail_auth_type |= SMTPAUTH_DIGEST_MD5;
318                 }
319                 if (g_ascii_strncasecmp(p, "SIZE", 4) == 0) {
320                         p += 5;
321                         session->max_message_size = atoi(p);
322                         session->esmtp_flags |= ESMTP_SIZE;
323                 }
324                 if (g_ascii_strncasecmp(p, "STARTTLS", 8) == 0) {
325                         p += 9;
326                         session->avail_auth_type |= SMTPAUTH_TLS_AVAILABLE;
327                 }
328                 return SM_OK;
329         } else if ((msg[0] == '1' || msg[0] == '2' || msg[0] == '3') &&
330             (msg[3] == ' ' || msg[3] == '\0'))
331                 return SM_OK;
332         else if (msg[0] == '5' && msg[1] == '0' &&
333                  (msg[2] == '4' || msg[2] == '3' || msg[2] == '1'))
334                 return SM_ERROR;
335
336         return SM_ERROR;
337 }
338
339 #ifdef USE_GNUTLS
340 static gint smtp_starttls(SMTPSession *session)
341 {
342         session->state = SMTP_STARTTLS;
343
344         if (session_send_msg(SESSION(session), SESSION_MSG_NORMAL, "STARTTLS") < 0)
345                 return SM_ERROR;
346         log_print(LOG_PROTOCOL, "ESMTP> STARTTLS\n");
347
348         return SM_OK;
349 }
350 #endif
351
352 static gint smtp_auth_cram_md5(SMTPSession *session)
353 {
354         session->state = SMTP_AUTH;
355         session->auth_type = SMTPAUTH_CRAM_MD5;
356
357         if (session_send_msg(SESSION(session), SESSION_MSG_NORMAL, "AUTH CRAM-MD5") < 0)
358                 return SM_ERROR;
359         log_print(LOG_PROTOCOL, "ESMTP> AUTH CRAM-MD5\n");
360
361         return SM_OK;
362 }
363
364 static gint smtp_auth_plain(SMTPSession *session)
365 {
366         gchar buf[MSGBUFSIZE];
367
368         /* 
369          * +1      +1      +1
370          * \0<user>\0<pass>\0 
371          */
372         int b64len = (1 + strlen(session->user) + 1 + strlen(session->pass) + 1);
373         gchar *b64buf = g_malloc(b64len);
374
375         /* use the char *ptr to walk the base64 string with embedded \0 */
376         char  *a = b64buf;
377         int  b64cnt = 0;
378
379         session->state = SMTP_AUTH_PLAIN;
380         session->auth_type = SMTPAUTH_PLAIN;
381
382         memset(buf, 0, sizeof buf);
383
384         /*
385          * have to construct the string bit by bit. sprintf can't do it in one.
386          * first field is null, so string is \0<user>\0<password>
387          */
388         *a = 0;
389         a++;
390
391         g_snprintf (a, b64len - 1, "%s", session->user);
392
393         b64cnt = strlen(session->user)+1;
394         a += b64cnt;
395
396         g_snprintf (a, b64len - b64cnt - 1, "%s", session->pass);
397         b64cnt += strlen(session->pass) + 1;    
398
399         /*
400          * reuse the char *ptr to offset into the textbuf to meld
401          * the plaintext ESMTP message and the base64 string value
402          */
403         strcpy(buf, "AUTH PLAIN ");
404         a = buf + strlen(buf);
405         base64_encode(a, b64buf, b64cnt);
406
407         if (session_send_msg(SESSION(session), SESSION_MSG_NORMAL, buf) < 0)
408                 return SM_ERROR;
409
410         log_print(LOG_PROTOCOL, "ESMTP> [AUTH PLAIN]\n");
411
412         g_free(b64buf);
413
414         return SM_OK;
415 }
416
417 static gint smtp_auth_login(SMTPSession *session)
418 {
419         session->state = SMTP_AUTH;
420         session->auth_type = SMTPAUTH_LOGIN;
421
422         if (session_send_msg(SESSION(session), SESSION_MSG_NORMAL, "AUTH LOGIN") < 0)
423                 return SM_ERROR;
424         log_print(LOG_PROTOCOL, "ESMTP> AUTH LOGIN\n");
425
426         return SM_OK;
427 }
428
429 static gint smtp_helo(SMTPSession *session)
430 {
431         gchar buf[MSGBUFSIZE];
432
433         session->state = SMTP_HELO;
434
435         g_snprintf(buf, sizeof(buf), "HELO %s",
436                    session->hostname ? session->hostname : get_domain_name());
437         if (session_send_msg(SESSION(session), SESSION_MSG_NORMAL, buf) < 0)
438                 return SM_ERROR;
439         log_print(LOG_PROTOCOL, "SMTP> %s\n", buf);
440
441         return SM_OK;
442 }
443
444 static gint smtp_rcpt(SMTPSession *session)
445 {
446         gchar buf[MSGBUFSIZE];
447         gchar *to;
448
449         cm_return_val_if_fail(session->cur_to != NULL, SM_ERROR);
450
451         session->state = SMTP_RCPT;
452
453         to = (gchar *)session->cur_to->data;
454
455         if (strchr(to, '<'))
456                 g_snprintf(buf, sizeof(buf), "RCPT TO:%s", to);
457         else
458                 g_snprintf(buf, sizeof(buf), "RCPT TO:<%s>", to);
459         if (session_send_msg(SESSION(session), SESSION_MSG_NORMAL, buf) < 0)
460                 return SM_ERROR;
461         log_print(LOG_PROTOCOL, "SMTP> %s\n", buf);
462
463         session->cur_to = session->cur_to->next;
464
465         return SM_OK;
466 }
467
468 static gint smtp_data(SMTPSession *session)
469 {
470         session->state = SMTP_DATA;
471
472         if (session_send_msg(SESSION(session), SESSION_MSG_NORMAL, "DATA") < 0)
473                 return SM_ERROR;
474         log_print(LOG_PROTOCOL, "SMTP> DATA\n");
475
476         return SM_OK;
477 }
478
479 static gint smtp_send_data(SMTPSession *session)
480 {
481         session->state = SMTP_SEND_DATA;
482
483         session_send_data(SESSION(session), session->send_data,
484                           session->send_data_len);
485
486         return SM_OK;
487 }
488
489 static gint smtp_make_ready(SMTPSession *session)
490 {
491         session->state = SMTP_MAIL_SENT_OK;
492
493         return SM_OK;
494 }
495
496 gint smtp_quit(SMTPSession *session)
497 {
498         session->state = SMTP_QUIT;
499
500         session_send_msg(SESSION(session), SESSION_MSG_NORMAL, "QUIT");
501         log_print(LOG_PROTOCOL, "SMTP> QUIT\n");
502
503         return SM_OK;
504 }
505
506 static gint smtp_eom(SMTPSession *session)
507 {
508         session->state = SMTP_EOM;
509
510         if (session_send_msg(SESSION(session), SESSION_MSG_NORMAL, ".") < 0)
511                 return SM_ERROR;
512         log_print(LOG_PROTOCOL, "SMTP> . (EOM)\n");
513
514         return SM_OK;
515 }
516
517 static gint smtp_session_recv_msg(Session *session, const gchar *msg)
518 {
519         SMTPSession *smtp_session = SMTP_SESSION(session);
520         gboolean cont = FALSE;
521         gint ret = 0;
522         
523         if (strlen(msg) < 4) {
524                 log_warning(LOG_PROTOCOL, _("bad SMTP response\n"));
525                 return -1;
526         }
527
528         switch (smtp_session->state) {
529         case SMTP_EHLO:
530         case SMTP_STARTTLS:
531         case SMTP_AUTH:
532         case SMTP_AUTH_PLAIN:
533         case SMTP_AUTH_LOGIN_USER:
534         case SMTP_AUTH_LOGIN_PASS:
535         case SMTP_AUTH_CRAM_MD5:
536                 log_print(LOG_PROTOCOL, "ESMTP< %s\n", msg);
537                 break;
538         default:
539                 log_print(LOG_PROTOCOL, "SMTP< %s\n", msg);
540                 break;
541         }
542
543         if (msg[0] == '5' && msg[1] == '0' &&
544             (msg[2] == '4' || msg[2] == '3' || msg[2] == '1')) {
545                 log_warning(LOG_PROTOCOL, _("error occurred on SMTP session\n"));
546                 smtp_session->state = SMTP_ERROR;
547                 smtp_session->error_val = SM_ERROR;
548                 g_free(smtp_session->error_msg);
549                 smtp_session->error_msg = g_strdup(msg);
550                 return -1;
551         }
552
553         if (!strncmp(msg, "535", 3)) {
554                 log_warning(LOG_PROTOCOL, _("error occurred on authentication\n"));
555                 smtp_session->state = SMTP_ERROR;
556                 smtp_session->error_val = SM_AUTHFAIL;
557                 g_free(smtp_session->error_msg);
558                 smtp_session->error_msg = g_strdup(msg);
559                 return -1;
560         }
561
562         if (msg[0] != '1' && msg[0] != '2' && msg[0] != '3') {
563                 log_warning(LOG_PROTOCOL, _("error occurred on SMTP session\n"));
564                 smtp_session->state = SMTP_ERROR;
565                 smtp_session->error_val = SM_ERROR;
566                 g_free(smtp_session->error_msg);
567                 smtp_session->error_msg = g_strdup(msg);
568                 return -1;
569         }
570
571         if (msg[3] == '-')
572                 cont = TRUE;
573         else if (msg[3] != ' ' && msg[3] != '\0') {
574                 log_warning(LOG_PROTOCOL, _("bad SMTP response\n"));
575                 smtp_session->state = SMTP_ERROR;
576                 smtp_session->error_val = SM_UNRECOVERABLE;
577                 return -1;
578         }
579
580         /* ignore all multiline responses except for EHLO */
581         if (cont && smtp_session->state != SMTP_EHLO)
582                 return session_recv_msg(session);
583
584         switch (smtp_session->state) {
585         case SMTP_READY:
586                 if (strstr(msg, "ESMTP"))
587                         smtp_session->is_esmtp = TRUE;
588         case SMTP_CONNECTED:
589 #ifdef USE_GNUTLS
590                 if (smtp_session->user || session->ssl_type != SSL_NONE ||
591                     smtp_session->is_esmtp)
592 #else
593                 if (smtp_session->user || smtp_session->is_esmtp)
594 #endif
595                         ret = smtp_ehlo(smtp_session);
596                 else
597                         ret = smtp_helo(smtp_session);
598                 break;
599         case SMTP_HELO:
600                 ret = smtp_from(smtp_session);
601                 break;
602         case SMTP_EHLO:
603                 ret = smtp_ehlo_recv(smtp_session, msg);
604                 if (cont == TRUE)
605                         break;
606                 if (smtp_session->max_message_size > 0
607                 && smtp_session->max_message_size < 
608                    smtp_session->send_data_len) {
609                         log_warning(LOG_PROTOCOL, _("Message is too big "
610                               "(Maximum size is %s)\n"),
611                               to_human_readable(
612                                (goffset)(smtp_session->max_message_size)));
613                         smtp_session->state = SMTP_ERROR;
614                         smtp_session->error_val = SM_ERROR;
615                         return -1;
616                 }
617 #ifdef USE_GNUTLS
618                 if (session->ssl_type == SSL_STARTTLS &&
619                     smtp_session->tls_init_done == FALSE) {
620                         ret = smtp_starttls(smtp_session);
621                         break;
622                 }
623 #endif
624                 if (smtp_session->user) {
625                         if (smtp_auth(smtp_session) != SM_OK) {
626 #ifdef USE_GNUTLS
627                                 if (session->ssl_type == SSL_NONE
628                                 &&  smtp_session->tls_init_done == FALSE
629                                 &&  (smtp_session->avail_auth_type & SMTPAUTH_TLS_AVAILABLE))
630                                         ret = smtp_starttls(smtp_session);
631                                 else
632 #endif
633                                         ret = smtp_from(smtp_session);
634                         }
635                 } else
636                         ret = smtp_from(smtp_session);
637                 break;
638         case SMTP_STARTTLS:
639 #ifdef USE_GNUTLS
640                 if (session_start_tls(session) < 0) {
641                         log_warning(LOG_PROTOCOL, _("couldn't start TLS session\n"));
642                         smtp_session->state = SMTP_ERROR;
643                         smtp_session->error_val = SM_ERROR;
644                         return -1;
645                 }
646                 smtp_session->tls_init_done = TRUE;
647                 ret = smtp_ehlo(smtp_session);
648 #endif
649                 break;
650         case SMTP_AUTH:
651                 ret = smtp_auth_recv(smtp_session, msg);
652                 break;
653         case SMTP_AUTH_LOGIN_USER:
654                 ret = smtp_auth_login_user_recv(smtp_session, msg);
655                 break;
656         case SMTP_AUTH_PLAIN:
657         case SMTP_AUTH_LOGIN_PASS:
658         case SMTP_AUTH_CRAM_MD5:
659                 ret = smtp_from(smtp_session);
660                 break;
661         case SMTP_FROM:
662                 if (smtp_session->cur_to)
663                         ret = smtp_rcpt(smtp_session);
664                 break;
665         case SMTP_RCPT:
666                 if (smtp_session->cur_to)
667                         ret = smtp_rcpt(smtp_session);
668                 else
669                         ret = smtp_data(smtp_session);
670                 break;
671         case SMTP_DATA:
672                 ret = smtp_send_data(smtp_session);
673                 break;
674         case SMTP_EOM:
675                 smtp_make_ready(smtp_session);
676                 break;
677         case SMTP_QUIT:
678                 session_disconnect(session);
679                 break;
680         case SMTP_ERROR:
681         default:
682                 log_warning(LOG_PROTOCOL, _("error occurred on SMTP session\n"));
683                 smtp_session->error_val = SM_ERROR;
684                 return -1;
685         }
686
687         if (cont && ret == SM_OK)
688                 return session_recv_msg(session);
689
690         if (ret != SM_OK)
691                 smtp_session->error_val = SM_ERROR;
692
693         return ret == SM_OK ? 0 : -1;
694 }
695
696 static gint smtp_session_send_data_finished(Session *session, guint len)
697 {
698         return smtp_eom(SMTP_SESSION(session));
699 }