Use GLib's implementation of Base64 instead of our own.
[claws.git] / src / common / smtp.c
index 4dfe262512bf4b2edd0d1f271a85b82bc942f58b..3b94b4708b9e898efe73bfea00c44c1143a06761 100644 (file)
@@ -1,10 +1,10 @@
 /*
  * Sylpheed -- a GTK+ based, lightweight, and fast e-mail client
- * Copyright (C) 1999-2004 Hiroyuki Yamamoto
+ * Copyright (C) 1999-2012 Hiroyuki Yamamoto and the Claws Mail team
  *
  * This program is free software; you can redistribute it and/or modify
  * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation; either version 2 of the License, or
+ * the Free Software Foundation; either version 3 of the License, or
  * (at your option) any later version.
  *
  * This program is distributed in the hope that it will be useful,
  * GNU General Public License for more details.
  *
  * You should have received a copy of the GNU General Public License
- * along with this program; if not, write to the Free Software
- * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
+ * along with this program. If not, see <http://www.gnu.org/licenses/>.
+ * 
  */
 
 #ifdef HAVE_CONFIG_H
 #  include "config.h"
+#include "claws-features.h"
 #endif
 
 #include <glib.h>
 
 #include "smtp.h"
 #include "md5.h"
-#include "base64.h"
 #include "utils.h"
 #include "log.h"
 
 static void smtp_session_destroy(Session *session);
 
 static gint smtp_auth(SMTPSession *session);
+#ifdef USE_GNUTLS
 static gint smtp_starttls(SMTPSession *session);
+#endif
 static gint smtp_auth_cram_md5(SMTPSession *session);
 static gint smtp_auth_login(SMTPSession *session);
 static gint smtp_auth_plain(SMTPSession *session);
@@ -59,13 +61,13 @@ static gint smtp_session_recv_msg(Session *session, const gchar *msg);
 static gint smtp_session_send_data_finished(Session *session, guint len);
 
 
-Session *smtp_session_new(void)
+Session *smtp_session_new(void *prefs_account)
 {
        SMTPSession *session;
 
        session = g_new0(SMTPSession, 1);
 
-       session_init(SESSION(session));
+       session_init(SESSION(session), prefs_account, TRUE);
 
        SESSION(session)->type             = SESSION_SMTP;
 
@@ -78,7 +80,7 @@ Session *smtp_session_new(void)
 
        session->state                     = SMTP_READY;
 
-#if USE_OPENSSL
+#ifdef USE_GNUTLS
        session->tls_init_done             = FALSE;
 #endif
 
@@ -122,10 +124,10 @@ static void smtp_session_destroy(Session *session)
 
 gint smtp_from(SMTPSession *session)
 {
-       gchar buf[MSGBUFSIZE];
+       gchar buf[MESSAGEBUFSIZE];
        gchar *mail_size = NULL;
 
-       g_return_val_if_fail(session->from != NULL, SM_ERROR);
+       cm_return_val_if_fail(session->from != NULL, SM_ERROR);
 
        session->state = SMTP_FROM;
        
@@ -146,7 +148,7 @@ gint smtp_from(SMTPSession *session)
 
        if (session_send_msg(SESSION(session), SESSION_MSG_NORMAL, buf) < 0)
                return SM_ERROR;
-       log_print("%sSMTP> %s\n", (session->is_esmtp?"E":""), buf);
+       log_print(LOG_PROTOCOL, "%sSMTP> %s\n", (session->is_esmtp?"E":""), buf);
 
        return SM_OK;
 }
@@ -154,24 +156,30 @@ gint smtp_from(SMTPSession *session)
 static gint smtp_auth(SMTPSession *session)
 {
 
-       g_return_val_if_fail(session->user != NULL, SM_ERROR);
+       cm_return_val_if_fail(session->user != NULL, SM_ERROR);
 
        session->state = SMTP_AUTH;
 
-       if (session->forced_auth_type == SMTPAUTH_CRAM_MD5 ||
-           (session->forced_auth_type == 0 &&
-            (session->avail_auth_type & SMTPAUTH_CRAM_MD5) != 0))
+       if ((session->forced_auth_type == SMTPAUTH_CRAM_MD5
+            || session->forced_auth_type == 0)
+            &&
+            (session->avail_auth_type & SMTPAUTH_CRAM_MD5) != 0)
                smtp_auth_cram_md5(session);
-       else if (session->forced_auth_type == SMTPAUTH_LOGIN ||
-                (session->forced_auth_type == 0 &&
-                 (session->avail_auth_type & SMTPAUTH_LOGIN) != 0))
+       else if ((session->forced_auth_type == SMTPAUTH_LOGIN
+                 || session->forced_auth_type == 0)
+                 &&
+                 (session->avail_auth_type & SMTPAUTH_LOGIN) != 0)
                smtp_auth_login(session);
-       else if (session->forced_auth_type == SMTPAUTH_PLAIN ||
-                (session->forced_auth_type == 0 &&
-                 (session->avail_auth_type & SMTPAUTH_PLAIN) != 0))
+       else if ((session->forced_auth_type == SMTPAUTH_PLAIN
+                 || session->forced_auth_type == 0)
+                 &&
+                 (session->avail_auth_type & SMTPAUTH_PLAIN) != 0)
                smtp_auth_plain(session);
-       else {
-               log_warning(_("SMTP AUTH not available\n"));
+       else if (session->forced_auth_type == 0) {
+               log_warning(LOG_PROTOCOL, _("No SMTP AUTH method available\n"));
+               return SM_AUTHFAIL;
+       } else {
+               log_warning(LOG_PROTOCOL, _("Selected SMTP AUTH method not available\n"));
                return SM_AUTHFAIL;
        }
 
@@ -180,25 +188,28 @@ static gint smtp_auth(SMTPSession *session)
 
 static gint smtp_auth_recv(SMTPSession *session, const gchar *msg)
 {
-       gchar buf[MSGBUFSIZE];
+       gchar buf[MESSAGEBUFSIZE], *tmp;
 
        switch (session->auth_type) {
        case SMTPAUTH_LOGIN:
                session->state = SMTP_AUTH_LOGIN_USER;
 
                if (!strncmp(msg, "334 ", 4)) {
-                       base64_encode(buf, session->user, strlen(session->user));
+                       tmp = g_base64_encode(session->user, strlen(session->user));
 
                        if (session_send_msg(SESSION(session), SESSION_MSG_NORMAL,
-                                        buf) < 0)
+                                        tmp) < 0) {
+                               g_free(tmp);
                                return SM_ERROR;
-                       log_print("ESMTP> [USERID]\n");
+                       }
+                       g_free(tmp);
+                       log_print(LOG_PROTOCOL, "ESMTP> [USERID]\n");
                } else {
                        /* Server rejects AUTH */
                        if (session_send_msg(SESSION(session), SESSION_MSG_NORMAL,
                                         "*") < 0)
                                return SM_ERROR;
-                       log_print("ESMTP> *\n");
+                       log_print(LOG_PROTOCOL, "ESMTP> *\n");
                }
                break;
        case SMTPAUTH_CRAM_MD5:
@@ -207,14 +218,14 @@ static gint smtp_auth_recv(SMTPSession *session, const gchar *msg)
                if (!strncmp(msg, "334 ", 4)) {
                        gchar *response;
                        gchar *response64;
-                       gchar *challenge;
-                       gint challengelen;
+                       gchar *challenge, *tmp;
+                       gsize challengelen;
                        guchar hexdigest[33];
 
-                       challenge = g_malloc(strlen(msg + 4) + 1);
-                       challengelen = base64_decode(challenge, msg + 4, -1);
-                       challenge[challengelen] = '\0';
-                       log_print("ESMTP< [Decoded: %s]\n", challenge);
+                       tmp = g_base64_decode(msg + 4, &challengelen);
+                       challenge = g_strndup(tmp, challengelen);
+                       g_free(tmp);
+                       log_print(LOG_PROTOCOL, "ESMTP< [Decoded: %s]\n", challenge);
 
                        g_snprintf(buf, sizeof(buf), "%s", session->pass);
                        md5_hex_hmac(hexdigest, challenge, challengelen,
@@ -223,23 +234,24 @@ static gint smtp_auth_recv(SMTPSession *session, const gchar *msg)
 
                        response = g_strdup_printf
                                ("%s %s", session->user, hexdigest);
-                       log_print("ESMTP> [Encoded: %s]\n", response);
+                       log_print(LOG_PROTOCOL, "ESMTP> [Encoded: %s]\n", response);
 
-                       response64 = g_malloc((strlen(response) + 3) * 2 + 1);
-                       base64_encode(response64, response, strlen(response));
+                       response64 = g_base64_encode(response, strlen(response));
                        g_free(response);
 
                        if (session_send_msg(SESSION(session), SESSION_MSG_NORMAL,
-                                        response64) < 0)
+                                        response64) < 0) {
+                               g_free(response64);
                                return SM_ERROR;
-                       log_print("ESMTP> %s\n", response64);
+                       }
+                       log_print(LOG_PROTOCOL, "ESMTP> %s\n", response64);
                        g_free(response64);
                } else {
                        /* Server rejects AUTH */
                        if (session_send_msg(SESSION(session), SESSION_MSG_NORMAL,
                                         "*") < 0)
                                return SM_ERROR;
-                       log_print("ESMTP> *\n");
+                       log_print(LOG_PROTOCOL, "ESMTP> *\n");
                }
                break;
        case SMTPAUTH_DIGEST_MD5:
@@ -247,7 +259,7 @@ static gint smtp_auth_recv(SMTPSession *session, const gchar *msg)
                /* stop smtp_auth when no correct authtype */
                if (session_send_msg(SESSION(session), SESSION_MSG_NORMAL, "*") < 0)
                        return SM_ERROR;
-               log_print("ESMTP> *\n");
+               log_print(LOG_PROTOCOL, "ESMTP> *\n");
                break;
        }
 
@@ -256,27 +268,38 @@ static gint smtp_auth_recv(SMTPSession *session, const gchar *msg)
 
 static gint smtp_auth_login_user_recv(SMTPSession *session, const gchar *msg)
 {
-       gchar buf[MSGBUFSIZE];
+       gchar buf[MESSAGEBUFSIZE], *tmp;
+       gsize len;
 
        session->state = SMTP_AUTH_LOGIN_PASS;
 
-       if (!strncmp(msg, "334 ", 4))
-               base64_encode(buf, session->pass, strlen(session->pass));
-       else
+       if (!strncmp(msg, "334 ", 4)) {
+               tmp = g_base64_encode(session->pass, strlen(session->pass));
+               len = g_strlcat(buf, tmp, MESSAGEBUFSIZE);
+               if (len >= MESSAGEBUFSIZE) {
+                       /* This should never happen, and even if it does, all it will do
+                        * is send an incorrect password so auth will fail. That's why
+                        * we're printing this debug message, so investigating user or dev
+                        * will know what's wrong. */
+                       debug_print("Truncation of password occured in g_strlcat().\n");
+               }
+               g_free(tmp);
+       } else {
                /* Server rejects AUTH */
                g_snprintf(buf, sizeof(buf), "*");
+       }
 
        if (session_send_msg(SESSION(session), SESSION_MSG_NORMAL, buf) < 0)
                return SM_ERROR;
 
-       log_print("ESMTP> [PASSWORD]\n");
+       log_print(LOG_PROTOCOL, "ESMTP> [PASSWORD]\n");
 
        return SM_OK;
 }
 
 static gint smtp_ehlo(SMTPSession *session)
 {
-       gchar buf[MSGBUFSIZE];
+       gchar buf[MESSAGEBUFSIZE];
 
        session->state = SMTP_EHLO;
 
@@ -286,7 +309,7 @@ static gint smtp_ehlo(SMTPSession *session)
                   session->hostname ? session->hostname : get_domain_name());
        if (session_send_msg(SESSION(session), SESSION_MSG_NORMAL, buf) < 0)
                return SM_ERROR;
-       log_print("ESMTP> %s\n", buf);
+       log_print(LOG_PROTOCOL, "ESMTP> %s\n", buf);
 
        return SM_OK;
 }
@@ -328,16 +351,18 @@ static gint smtp_ehlo_recv(SMTPSession *session, const gchar *msg)
        return SM_ERROR;
 }
 
+#ifdef USE_GNUTLS
 static gint smtp_starttls(SMTPSession *session)
 {
        session->state = SMTP_STARTTLS;
 
        if (session_send_msg(SESSION(session), SESSION_MSG_NORMAL, "STARTTLS") < 0)
                return SM_ERROR;
-       log_print("ESMTP> STARTTLS\n");
+       log_print(LOG_PROTOCOL, "ESMTP> STARTTLS\n");
 
        return SM_OK;
 }
+#endif
 
 static gint smtp_auth_cram_md5(SMTPSession *session)
 {
@@ -346,58 +371,35 @@ static gint smtp_auth_cram_md5(SMTPSession *session)
 
        if (session_send_msg(SESSION(session), SESSION_MSG_NORMAL, "AUTH CRAM-MD5") < 0)
                return SM_ERROR;
-       log_print("ESMTP> AUTH CRAM-MD5\n");
+       log_print(LOG_PROTOCOL, "ESMTP> AUTH CRAM-MD5\n");
 
        return SM_OK;
 }
 
 static gint smtp_auth_plain(SMTPSession *session)
 {
-       gchar buf[MSGBUFSIZE];
-
-       /* 
-        * +1      +1      +1
-        * \0<user>\0<pass>\0 
-        */
-       int b64len = (1 + strlen(session->user) + 1 + strlen(session->pass) + 1);
-       gchar *b64buf = g_malloc(b64len);
-
-       /* use the char *ptr to walk the base64 string with embedded \0 */
-       char  *a = b64buf;
-       int  b64cnt = 0;
+       gchar buf[MESSAGEBUFSIZE], *b64buf, *out;
+       gint len;
 
        session->state = SMTP_AUTH_PLAIN;
        session->auth_type = SMTPAUTH_PLAIN;
 
        memset(buf, 0, sizeof buf);
 
-       /*
-        * have to construct the string bit by bit. sprintf can't do it in one.
-        * first field is null, so string is \0<user>\0<password>
-        */
-       *a = 0;
-       a++;
-
-       g_snprintf (a, b64len - 1, "%s", session->user);
-
-       b64cnt = strlen(session->user)+1;
-       a += b64cnt;
-
-       g_snprintf (a, b64len - b64cnt - 1, "%s", session->pass);
-       b64cnt += strlen(session->pass) + 1;    
-
-       /*
-        * reuse the char *ptr to offset into the textbuf to meld
-        * the plaintext ESMTP message and the base64 string value
-        */
-       strcpy(buf, "AUTH PLAIN ");
-       a = buf + strlen(buf);
-       base64_encode(a, b64buf, b64cnt);
+       /* "\0user\0password" */
+       len = sprintf(buf, "%c%s%c%s", '\0', session->user, '\0', session->pass);
+       b64buf = g_base64_encode(buf, len);
+       out = g_strconcat("AUTH PLAIN ", b64buf, NULL);
+       g_free(b64buf);
 
-       if (session_send_msg(SESSION(session), SESSION_MSG_NORMAL, buf) < 0)
+       if (session_send_msg(SESSION(session), SESSION_MSG_NORMAL, out) < 0) {
+               g_free(out);
                return SM_ERROR;
+       }
+
+       g_free(out);
 
-       log_print("ESMTP> [AUTH PLAIN]\n");
+       log_print(LOG_PROTOCOL, "ESMTP> [AUTH PLAIN]\n");
 
        g_free(b64buf);
 
@@ -411,14 +413,14 @@ static gint smtp_auth_login(SMTPSession *session)
 
        if (session_send_msg(SESSION(session), SESSION_MSG_NORMAL, "AUTH LOGIN") < 0)
                return SM_ERROR;
-       log_print("ESMTP> AUTH LOGIN\n");
+       log_print(LOG_PROTOCOL, "ESMTP> AUTH LOGIN\n");
 
        return SM_OK;
 }
 
 static gint smtp_helo(SMTPSession *session)
 {
-       gchar buf[MSGBUFSIZE];
+       gchar buf[MESSAGEBUFSIZE];
 
        session->state = SMTP_HELO;
 
@@ -426,17 +428,17 @@ static gint smtp_helo(SMTPSession *session)
                   session->hostname ? session->hostname : get_domain_name());
        if (session_send_msg(SESSION(session), SESSION_MSG_NORMAL, buf) < 0)
                return SM_ERROR;
-       log_print("SMTP> %s\n", buf);
+       log_print(LOG_PROTOCOL, "SMTP> %s\n", buf);
 
        return SM_OK;
 }
 
 static gint smtp_rcpt(SMTPSession *session)
 {
-       gchar buf[MSGBUFSIZE];
+       gchar buf[MESSAGEBUFSIZE];
        gchar *to;
 
-       g_return_val_if_fail(session->cur_to != NULL, SM_ERROR);
+       cm_return_val_if_fail(session->cur_to != NULL, SM_ERROR);
 
        session->state = SMTP_RCPT;
 
@@ -448,7 +450,7 @@ static gint smtp_rcpt(SMTPSession *session)
                g_snprintf(buf, sizeof(buf), "RCPT TO:<%s>", to);
        if (session_send_msg(SESSION(session), SESSION_MSG_NORMAL, buf) < 0)
                return SM_ERROR;
-       log_print("SMTP> %s\n", buf);
+       log_print(LOG_PROTOCOL, "SMTP> %s\n", buf);
 
        session->cur_to = session->cur_to->next;
 
@@ -461,7 +463,7 @@ static gint smtp_data(SMTPSession *session)
 
        if (session_send_msg(SESSION(session), SESSION_MSG_NORMAL, "DATA") < 0)
                return SM_ERROR;
-       log_print("SMTP> DATA\n");
+       log_print(LOG_PROTOCOL, "SMTP> DATA\n");
 
        return SM_OK;
 }
@@ -488,7 +490,7 @@ gint smtp_quit(SMTPSession *session)
        session->state = SMTP_QUIT;
 
        session_send_msg(SESSION(session), SESSION_MSG_NORMAL, "QUIT");
-       log_print("SMTP> QUIT\n");
+       log_print(LOG_PROTOCOL, "SMTP> QUIT\n");
 
        return SM_OK;
 }
@@ -499,7 +501,7 @@ static gint smtp_eom(SMTPSession *session)
 
        if (session_send_msg(SESSION(session), SESSION_MSG_NORMAL, ".") < 0)
                return SM_ERROR;
-       log_print("SMTP> . (EOM)\n");
+       log_print(LOG_PROTOCOL, "SMTP> . (EOM)\n");
 
        return SM_OK;
 }
@@ -511,7 +513,7 @@ static gint smtp_session_recv_msg(Session *session, const gchar *msg)
        gint ret = 0;
        
        if (strlen(msg) < 4) {
-               log_warning(_("bad SMTP response\n"));
+               log_warning(LOG_PROTOCOL, _("bad SMTP response\n"));
                return -1;
        }
 
@@ -523,16 +525,20 @@ static gint smtp_session_recv_msg(Session *session, const gchar *msg)
        case SMTP_AUTH_LOGIN_USER:
        case SMTP_AUTH_LOGIN_PASS:
        case SMTP_AUTH_CRAM_MD5:
-               log_print("ESMTP< %s\n", msg);
+               log_print(LOG_PROTOCOL, "ESMTP< %s\n", msg);
                break;
        default:
-               log_print("SMTP< %s\n", msg);
+               log_print(LOG_PROTOCOL, "SMTP< %s\n", msg);
                break;
        }
 
+       /* ignore all multiline responses except for EHLO */
+       if (msg[3] == '-' && smtp_session->state != SMTP_EHLO)
+               return session_recv_msg(session);
+
        if (msg[0] == '5' && msg[1] == '0' &&
            (msg[2] == '4' || msg[2] == '3' || msg[2] == '1')) {
-               log_warning(_("error occurred on SMTP session\n"));
+               log_warning(LOG_PROTOCOL, _("error occurred on SMTP session\n"));
                smtp_session->state = SMTP_ERROR;
                smtp_session->error_val = SM_ERROR;
                g_free(smtp_session->error_msg);
@@ -541,7 +547,7 @@ static gint smtp_session_recv_msg(Session *session, const gchar *msg)
        }
 
        if (!strncmp(msg, "535", 3)) {
-               log_warning(_("error occurred on authentication\n"));
+               log_warning(LOG_PROTOCOL, _("error occurred on authentication\n"));
                smtp_session->state = SMTP_ERROR;
                smtp_session->error_val = SM_AUTHFAIL;
                g_free(smtp_session->error_msg);
@@ -550,7 +556,7 @@ static gint smtp_session_recv_msg(Session *session, const gchar *msg)
        }
 
        if (msg[0] != '1' && msg[0] != '2' && msg[0] != '3') {
-               log_warning(_("error occurred on SMTP session\n"));
+               log_warning(LOG_PROTOCOL, _("error occurred on SMTP session\n"));
                smtp_session->state = SMTP_ERROR;
                smtp_session->error_val = SM_ERROR;
                g_free(smtp_session->error_msg);
@@ -561,22 +567,17 @@ static gint smtp_session_recv_msg(Session *session, const gchar *msg)
        if (msg[3] == '-')
                cont = TRUE;
        else if (msg[3] != ' ' && msg[3] != '\0') {
-               log_warning(_("bad SMTP response\n"));
+               log_warning(LOG_PROTOCOL, _("bad SMTP response\n"));
                smtp_session->state = SMTP_ERROR;
                smtp_session->error_val = SM_UNRECOVERABLE;
                return -1;
        }
 
-       /* ignore all multiline responses except for EHLO */
-       if (cont && smtp_session->state != SMTP_EHLO)
-               return session_recv_msg(session);
-
        switch (smtp_session->state) {
        case SMTP_READY:
                if (strstr(msg, "ESMTP"))
                        smtp_session->is_esmtp = TRUE;
-       case SMTP_CONNECTED:
-#if USE_OPENSSL
+#ifdef USE_GNUTLS
                if (smtp_session->user || session->ssl_type != SSL_NONE ||
                    smtp_session->is_esmtp)
 #else
@@ -596,15 +597,15 @@ static gint smtp_session_recv_msg(Session *session, const gchar *msg)
                if (smtp_session->max_message_size > 0
                && smtp_session->max_message_size < 
                   smtp_session->send_data_len) {
-                       log_warning(_("Message is too big "
+                       log_warning(LOG_PROTOCOL, _("Message is too big "
                              "(Maximum size is %s)\n"),
                              to_human_readable(
-                              (off_t)(smtp_session->max_message_size)));
+                              (goffset)(smtp_session->max_message_size)));
                        smtp_session->state = SMTP_ERROR;
                        smtp_session->error_val = SM_ERROR;
                        return -1;
                }
-#if USE_OPENSSL
+#ifdef USE_GNUTLS
                if (session->ssl_type == SSL_STARTTLS &&
                    smtp_session->tls_init_done == FALSE) {
                        ret = smtp_starttls(smtp_session);
@@ -613,7 +614,7 @@ static gint smtp_session_recv_msg(Session *session, const gchar *msg)
 #endif
                if (smtp_session->user) {
                        if (smtp_auth(smtp_session) != SM_OK) {
-#if USE_OPENSSL
+#ifdef USE_GNUTLS
                                if (session->ssl_type == SSL_NONE
                                &&  smtp_session->tls_init_done == FALSE
                                &&  (smtp_session->avail_auth_type & SMTPAUTH_TLS_AVAILABLE))
@@ -626,9 +627,9 @@ static gint smtp_session_recv_msg(Session *session, const gchar *msg)
                        ret = smtp_from(smtp_session);
                break;
        case SMTP_STARTTLS:
-#if USE_OPENSSL
+#ifdef USE_GNUTLS
                if (session_start_tls(session) < 0) {
-                       log_warning(_("can't start TLS session\n"));
+                       log_warning(LOG_PROTOCOL, _("couldn't start TLS session\n"));
                        smtp_session->state = SMTP_ERROR;
                        smtp_session->error_val = SM_ERROR;
                        return -1;
@@ -669,7 +670,7 @@ static gint smtp_session_recv_msg(Session *session, const gchar *msg)
                break;
        case SMTP_ERROR:
        default:
-               log_warning(_("error occurred on SMTP session\n"));
+               log_warning(LOG_PROTOCOL, _("error occurred on SMTP session\n"));
                smtp_session->error_val = SM_ERROR;
                return -1;
        }