aboutsummaryrefslogtreecommitdiff
path: root/contrib/epee/include/net/smtp.inl
diff options
context:
space:
mode:
Diffstat (limited to 'contrib/epee/include/net/smtp.inl')
-rw-r--r--contrib/epee/include/net/smtp.inl1569
1 files changed, 1569 insertions, 0 deletions
diff --git a/contrib/epee/include/net/smtp.inl b/contrib/epee/include/net/smtp.inl
new file mode 100644
index 000000000..d42c8b950
--- /dev/null
+++ b/contrib/epee/include/net/smtp.inl
@@ -0,0 +1,1569 @@
+// Copyright (c) 2006-2013, Andrey N. Sabelnikov, www.sabelnikov.net
+// All rights reserved.
+//
+// Redistribution and use in source and binary forms, with or without
+// modification, are permitted provided that the following conditions are met:
+// * Redistributions of source code must retain the above copyright
+// notice, this list of conditions and the following disclaimer.
+// * Redistributions in binary form must reproduce the above copyright
+// notice, this list of conditions and the following disclaimer in the
+// documentation and/or other materials provided with the distribution.
+// * Neither the name of the Andrey N. Sabelnikov nor the
+// names of its contributors may be used to endorse or promote products
+// derived from this software without specific prior written permission.
+//
+// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
+// ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
+// WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
+// DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER BE LIABLE FOR ANY
+// DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
+// (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
+// LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
+// ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
+// (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
+// SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+//
+
+
+
+#include "md5.h"
+
+namespace epee
+{
+namespace net_utils
+{
+ namespace smtp
+ {
+
+
+ //////////////////////////////////////////////////////////////////////////
+ inline char * convert_hex( unsigned char *in, int len )
+ {
+ static char hex[] = "0123456789abcdef";
+ char * out;
+ int i;
+
+ out = (char *) malloc(len * 2 + 1);
+ if (out == NULL)
+ return NULL;
+
+ for (i = 0; i < len; i++) {
+ out[i * 2] = hex[in[i] >> 4];
+ out[i * 2 + 1] = hex[in[i] & 15];
+ }
+
+ out[i*2] = 0;
+
+ return out;
+ }
+
+ //////////////////////////////////////////////////////////////////////////
+ inline char * hash_md5(const char * sec_key, const char * data, int len)
+ {
+ char key[65], digest[24];
+ char * hash_hex;
+
+ int sec_len, i;
+
+ sec_len = strlen(sec_key);
+
+ if (sec_len < 64) {
+ memcpy(key, sec_key, sec_len);
+ for (i = sec_len; i < 64; i++) {
+ key[i] = 0;
+ }
+ } else {
+ memcpy(key, sec_key, 64);
+ }
+
+ md5::hmac_md5( (const unsigned char*)data, len, (const unsigned char*)key, 64, (unsigned char*)digest );
+ hash_hex = convert_hex( (unsigned char*)digest, 16 );
+
+ return hash_hex;
+ }
+ //////////////////////////////////////////////////////////////////////////
+ //////////////////////////////////////////////////////////////////////////
+ //////////////////////////////////////////////////////////////////////////
+ //////////////////////////////////////////////////////////////////////////
+ inline CSMTPClient::CSMTPClient(void)
+ {
+ m_dwSupportedAuthModesCount = 0;
+ m_bConnected = FALSE;
+ m_hSocket = INVALID_SOCKET;
+ m_pErrorText = NULL;
+
+ // Initialize WinSock
+ WORD wVer = MAKEWORD( 2, 2 );
+ if ( WSAStartup( wVer, &m_wsaData ) != NO_ERROR )
+ {
+ SetErrorText( "WSAStartup.", WSAGetLastError() );
+ throw;
+ }
+ if ( LOBYTE( m_wsaData.wVersion ) != 2 || HIBYTE( m_wsaData.wVersion ) != 2 )
+ {
+ SetErrorText( "Can't find a useable WinSock DLL." );
+ WSACleanup();
+ throw;
+ }
+ }
+
+ //////////////////////////////////////////////////////////////////////////
+ inline CSMTPClient::~CSMTPClient(void)
+ {
+ if ( m_pErrorText )
+ {
+ free( m_pErrorText );
+ m_pErrorText = NULL;
+ }
+
+ if ( m_bConnected )
+ ServerDisconnect();
+
+ // Cleanup
+ WSACleanup();
+ }
+
+ //////////////////////////////////////////////////////////////////////////
+ inline void CSMTPClient::SetErrorText( LPCSTR szErrorText, DWORD dwErrorCode )
+ {
+ if ( m_pErrorText )
+ {
+ free( m_pErrorText );
+ m_pErrorText = NULL;
+ }
+
+ LPVOID lpMsgBuf = NULL;
+ if ( dwErrorCode )
+ {
+ FormatMessageA(
+ FORMAT_MESSAGE_ALLOCATE_BUFFER |
+ FORMAT_MESSAGE_FROM_SYSTEM,
+ NULL,
+ dwErrorCode,
+ MAKELANGID(LANG_NEUTRAL, SUBLANG_DEFAULT),
+ (LPSTR) &lpMsgBuf,
+ 0, NULL );
+ }
+
+ if ( szErrorText && strlen( szErrorText ) )
+ {
+ m_pErrorText = (LPBYTE)malloc( strlen( szErrorText ) + 1 );
+ strcpy( (char*)m_pErrorText, szErrorText );
+
+ if ( lpMsgBuf )
+ {
+ strcat( (char*)m_pErrorText, " " );
+ strcpy( (char*)m_pErrorText, (char*)lpMsgBuf );
+
+ LocalFree( lpMsgBuf );
+ }
+ }
+ }
+
+ inline void CSMTPClient::SetErrorText( PBYTE szErrorText, DWORD dwErrorCode )
+ {
+ SetErrorText( (LPCSTR)szErrorText, dwErrorCode );
+ }
+
+ //////////////////////////////////////////////////////////////////////////
+ inline char* CSMTPClient::GetLastErrorText()
+ {
+ return (char*)m_pErrorText;
+ }
+
+ //////////////////////////////////////////////////////////////////////////
+ inline DWORD CSMTPClient::ReceiveData( SOCKET hSocket, PBYTE pReceiveBuffer, DWORD dwReceiveBufferSize )
+ {
+ DWORD dwReceivedDataSize = 0;
+
+ if ( hSocket != INVALID_SOCKET && pReceiveBuffer && dwReceiveBufferSize )
+ {
+ int iReceived = 0;
+ int iLength = 0;
+
+ iLength = recv( hSocket, (LPSTR)pReceiveBuffer + iReceived, dwReceiveBufferSize - iReceived,
+ NO_FLAGS );
+
+ if ( iLength != 0 && iLength != SOCKET_ERROR )
+ iReceived += iLength;
+
+ dwReceivedDataSize = iReceived;
+
+ pReceiveBuffer[ iReceived ] = 0;
+ }
+
+ return dwReceivedDataSize;
+ }
+
+ inline //////////////////////////////////////////////////////////////////////////
+ DWORD CSMTPClient::SendData( SOCKET hSocket, PBYTE pSendBuffer, DWORD dwSendBufferSize )
+ {
+ DWORD dwSended = 0;
+
+ if ( hSocket != INVALID_SOCKET && pSendBuffer && dwSendBufferSize )
+ {
+ int iSended = 0;
+ int iLength = 0;
+
+ while ( iLength != SOCKET_ERROR && dwSendBufferSize - iSended > 0 )
+ {
+ iLength = send( hSocket, (LPSTR)pSendBuffer + iSended, dwSendBufferSize - iSended,
+ NO_FLAGS );
+
+ if ( iLength != 0 && iLength != SOCKET_ERROR )
+ iSended += iLength;
+ }
+
+ dwSended = iSended;
+ }
+
+ //if ( dwSended )
+ // printf( "C: %s", pSendBuffer );
+
+ return dwSended;
+ }
+
+ //////////////////////////////////////////////////////////////////////////
+ inline unsigned short CSMTPClient::GetResponseCode( LPBYTE pBuffer, DWORD dwBufferSize )
+ {
+ unsigned short iCode = 0;
+
+ if ( dwBufferSize >= 3 )
+ {
+ CHAR szResponseCode[ 4 ] = { 0 };
+ memcpy( szResponseCode, pBuffer, 3 );
+ szResponseCode[ 3 ] = 0;
+ iCode = atoi( szResponseCode );
+ }
+
+ return iCode;
+ }
+
+ //////////////////////////////////////////////////////////////////////////
+ inline void CSMTPClient::ParseESMTPExtensions( LPBYTE pBuffer, DWORD dwBufferSize )
+ {
+ const char *szSubstring = strstr( (const char*)pBuffer, "250-AUTH " );
+ if ( !szSubstring )
+ {
+ szSubstring = strstr( (const char*)pBuffer, "250 AUTH " );
+ }
+
+ if ( szSubstring )
+ {
+ const char *szSubstringEnd = strstr( (const char*)szSubstring, "\r\n" );
+ if ( szSubstringEnd )
+ {
+ szSubstring += 9;
+ char szAuthMode[ 256 ] = { 0 };
+ for ( ; szSubstring < szSubstringEnd + 1 ; szSubstring++ )
+ {
+ if ( *szSubstring == ' ' || *szSubstring == '\r' )
+ {
+ if ( _strcmpi( szAuthMode, SMTP_COMMAND_AUTH_PLAIN ) == 0 )
+ {
+ m_aSupportedAuthModes[ m_dwSupportedAuthModesCount ] = AUTH_MODE_PLAIN;
+ m_dwSupportedAuthModesCount++;
+ }
+ else if ( _strcmpi( szAuthMode, SMTP_COMMAND_AUTH_LOGIN ) == 0 )
+ {
+ m_aSupportedAuthModes[ m_dwSupportedAuthModesCount ] = AUTH_MODE_LOGIN;
+ m_dwSupportedAuthModesCount++;
+ }
+ else if ( _strcmpi( szAuthMode, SMTP_COMMAND_AUTH_CRAM_MD5 ) == 0 )
+ {
+ m_aSupportedAuthModes[ m_dwSupportedAuthModesCount ] = AUTH_MODE_CRAM_MD5;
+ m_dwSupportedAuthModesCount++;
+ }
+
+ szAuthMode[ 0 ] = 0;
+
+ if ( m_dwSupportedAuthModesCount == MAX_AUTH_MODES_COUND )
+ break;
+ }
+ else
+ {
+ szAuthMode[ strlen( szAuthMode ) + 1 ] = 0;
+ szAuthMode[ strlen( szAuthMode ) ] = *szSubstring;
+ }
+ }
+ }
+ }
+ }
+
+ //////////////////////////////////////////////////////////////////////////
+ inline BOOL CSMTPClient::ServerConnect( LPCSTR szServerAddress, const unsigned short iPortNumber )
+ {
+ if ( m_bConnected )
+ ServerDisconnect();
+
+ m_bConnected = FALSE;
+ m_hSocket = INVALID_SOCKET;
+
+ m_hSocket = _connectServerSocket( szServerAddress, iPortNumber );
+
+ if ( m_hSocket != INVALID_SOCKET )
+ {
+ DWORD dwReceiveBufferSize = 1024*16;
+ PBYTE pReceiveBuffer = (PBYTE)malloc( dwReceiveBufferSize );
+ if ( pReceiveBuffer )
+ {
+ // Connected. Wait server hello string.
+ DWORD iReceived = ReceiveData( m_hSocket, pReceiveBuffer, dwReceiveBufferSize );
+ if ( iReceived )
+ {
+ // Check 220
+ int iResponseCode = GetResponseCode( pReceiveBuffer, iReceived );
+ if ( iResponseCode != 220 )
+ {
+ SetErrorText( pReceiveBuffer );
+ free( pReceiveBuffer );
+ ServerDisconnect();
+ return FALSE;
+ }
+ }
+ else
+ {
+ SetErrorText( "ReceiveData error. ", WSAGetLastError() );
+ free( pReceiveBuffer );
+ ServerDisconnect();
+ return FALSE;
+ }
+
+ // EHLO / HELO
+ BYTE szHelloBuffer[ 256 ];
+ sprintf( (char*)szHelloBuffer, "%s %s\r\n", (char*)SMTP_COMMAND_EHLO, (char*)szServerAddress );
+ if ( SendData( m_hSocket, (PBYTE)szHelloBuffer, strlen( (const char*)szHelloBuffer ) ) == 0 )
+ {
+ SetErrorText( "SendData error.", WSAGetLastError() );
+ free( pReceiveBuffer );
+ ServerDisconnect();
+ return FALSE;
+ }
+
+ iReceived = ReceiveData( m_hSocket, pReceiveBuffer, dwReceiveBufferSize );
+ if ( iReceived )
+ {
+ // Check 250
+ int iResponseCode = GetResponseCode( pReceiveBuffer, iReceived );
+ if ( iResponseCode == 500 )
+ {
+ SetErrorText( pReceiveBuffer );
+
+ sprintf( (char*)szHelloBuffer, "%s %s\r\n", (char*)SMTP_COMMAND_HELO, (char*)szServerAddress );
+ if ( SendData( m_hSocket, (PBYTE)szHelloBuffer, strlen( (const char*)szHelloBuffer ) ) == 0 )
+ {
+ SetErrorText( "SendData error.", WSAGetLastError() );
+ free( pReceiveBuffer );
+ ServerDisconnect();
+ return FALSE;
+ }
+
+ iResponseCode = GetResponseCode( pReceiveBuffer, iReceived );
+ if ( iResponseCode != 250 )
+ {
+ SetErrorText( pReceiveBuffer );
+ free( pReceiveBuffer );
+ ServerDisconnect();
+ return FALSE;
+ }
+ }
+ else if ( iResponseCode != 250 )
+ {
+ SetErrorText( pReceiveBuffer );
+ free( pReceiveBuffer );
+ ServerDisconnect();
+ return FALSE;
+ }
+
+ // Parse AUTH supported modes
+ ParseESMTPExtensions( pReceiveBuffer, iReceived );
+ }
+ else
+ {
+ SetErrorText( "ReceiveData error.", WSAGetLastError() );
+ free( pReceiveBuffer );
+ ServerDisconnect();
+ return FALSE;
+ }
+
+ free( pReceiveBuffer );
+ }
+ }
+ else
+ {
+ return FALSE;
+ }
+
+ m_bConnected = TRUE;
+
+ return TRUE;
+ }
+
+ //////////////////////////////////////////////////////////////////////////
+ inline BOOL CSMTPClient::ServerConnect( LPCSTR szServerAddress, const unsigned short iPortNumber, LPCSTR szUsername, LPCSTR szPassword )
+ {
+ BOOL bSuccess = FALSE;
+
+ bSuccess = ServerConnect( szServerAddress, iPortNumber );
+ if ( bSuccess )
+ {
+ if ( GetAuthModeIsSupported( AUTH_MODE_CRAM_MD5 ) )
+ {
+ ServerLogin( szUsername, szPassword, AUTH_MODE_CRAM_MD5 );
+ }
+ else
+ if ( GetAuthModeIsSupported( AUTH_MODE_PLAIN ) )
+ {
+ ServerLogin( szUsername, szPassword, AUTH_MODE_PLAIN );
+ }
+ else
+ if ( GetAuthModeIsSupported( AUTH_MODE_LOGIN ) )
+ {
+ ServerLogin( szUsername, szPassword, AUTH_MODE_LOGIN );
+ }
+ }
+
+ return bSuccess;
+ }
+
+ //////////////////////////////////////////////////////////////////////////
+ inline SOCKET CSMTPClient::_connectServerSocket( LPCSTR szServerAddress, const unsigned short iPortNumber )
+ {
+ int nConnect;
+ short nProtocolPort = iPortNumber;
+ LPHOSTENT lpHostEnt;
+ SOCKADDR_IN sockAddr;
+
+ SOCKET hServerSocket = INVALID_SOCKET;
+
+ lpHostEnt = gethostbyname( szServerAddress );
+ if (lpHostEnt)
+ {
+ hServerSocket = socket( AF_INET, SOCK_STREAM, IPPROTO_TCP );
+ if (hServerSocket != INVALID_SOCKET)
+ {
+ sockAddr.sin_family = AF_INET;
+ sockAddr.sin_port = htons( nProtocolPort );
+ sockAddr.sin_addr = *((LPIN_ADDR)*lpHostEnt->h_addr_list);
+
+ nConnect = connect( hServerSocket, (PSOCKADDR)&sockAddr,
+ sizeof(sockAddr) );
+
+ if ( nConnect != 0 )
+ {
+ SetErrorText( "connect error.", WSAGetLastError() );
+ hServerSocket = INVALID_SOCKET;
+ }
+ }
+ else
+ {
+ SetErrorText( "Invalid socket." );
+ throw;
+ }
+ }
+ else
+ {
+ SetErrorText( "Error retrieving host by name.", WSAGetLastError() );
+ }
+
+ return hServerSocket ;
+ }
+
+ //////////////////////////////////////////////////////////////////////////
+ inline void CSMTPClient::ServerDisconnect()
+ {
+ if ( m_hSocket != INVALID_SOCKET )
+ {
+ if ( SendData( m_hSocket, (PBYTE)SMTP_COMMAND_QUIT, strlen( SMTP_COMMAND_QUIT ) ) == 0 )
+ {
+ SetErrorText( "SendData error.", WSAGetLastError() );
+ return;
+ }
+
+ DWORD dwReceiveBufferSize = 1024*16;
+ PBYTE pReceiveBuffer = (PBYTE)malloc( dwReceiveBufferSize );
+ if ( pReceiveBuffer )
+ {
+ DWORD iReceived = ReceiveData( m_hSocket, pReceiveBuffer, dwReceiveBufferSize );
+
+ if ( iReceived )
+ SetErrorText( pReceiveBuffer );
+
+ free( pReceiveBuffer );
+ }
+
+ m_hSocket = INVALID_SOCKET;
+ }
+
+ m_bConnected = FALSE;
+ }
+
+ //////////////////////////////////////////////////////////////////////////
+ inline BOOL CSMTPClient::GetAuthModeIsSupported( int iMode )
+ {
+ BOOL bSupported = FALSE;
+
+ for ( int i = 0 ; i < m_dwSupportedAuthModesCount ; i++ )
+ {
+ if ( m_aSupportedAuthModes[ i ] == iMode )
+ {
+ bSupported = TRUE;
+ break;
+ }
+ }
+
+ return bSupported;
+ }
+
+ //////////////////////////////////////////////////////////////////////////
+ inline BOOL CSMTPClient::ServerLogin( LPCSTR szUsername, LPCSTR szPassword, int iAuthMode )
+ {
+ BOOL bSuccess = FALSE;
+
+ if ( iAuthMode == AUTH_MODE_PLAIN )
+ {
+ bSuccess = ServerLoginMethodPlain( szUsername, szPassword );
+ }
+ else if ( iAuthMode == AUTH_MODE_LOGIN )
+ {
+ bSuccess = ServerLoginMethodLogin( szUsername, szPassword );
+ }
+ else if ( iAuthMode == AUTH_MODE_CRAM_MD5 )
+ {
+ bSuccess = ServerLoginMethodCramMD5( szUsername, szPassword );
+ }
+
+ return bSuccess;
+ }
+
+ //////////////////////////////////////////////////////////////////////////
+ inline BOOL CSMTPClient::ServerLogin( LPCSTR szUsername, LPCSTR szPassword )
+ {
+ BOOL bSuccess = FALSE;
+
+ if ( GetAuthModeIsSupported( AUTH_MODE_CRAM_MD5 ) )
+ {
+ bSuccess = ServerLogin( szUsername, szPassword, AUTH_MODE_CRAM_MD5 );
+ }
+ else
+ if ( GetAuthModeIsSupported( AUTH_MODE_PLAIN ) )
+ {
+ bSuccess = ServerLogin( szUsername, szPassword, AUTH_MODE_PLAIN );
+ }
+ else
+ if ( GetAuthModeIsSupported( AUTH_MODE_LOGIN ) )
+ {
+ bSuccess = ServerLogin( szUsername, szPassword, AUTH_MODE_LOGIN );
+ }
+
+ return bSuccess;
+ }
+
+ //////////////////////////////////////////////////////////////////////////
+ inline BOOL CSMTPClient::ServerLoginMethodPlain( LPCSTR szUsername, LPCSTR szPassword )
+ {
+ BOOL bSuccess = FALSE;
+
+ BYTE szCommandBuffer[ 256 ];
+ sprintf( (char*)szCommandBuffer, "%s %s\r\n", (char*)SMTP_COMMAND_AUTH, (char*)SMTP_COMMAND_AUTH_PLAIN );
+ if ( SendData( m_hSocket, (PBYTE)szCommandBuffer, strlen( (const char*)szCommandBuffer ) ) == 0 )
+ {
+ SetErrorText( "SendData error.", WSAGetLastError() );
+ return FALSE;
+ }
+
+ DWORD dwReceiveBufferSize = 1024*16;
+ PBYTE pReceiveBuffer = (PBYTE)malloc( dwReceiveBufferSize );
+ if ( pReceiveBuffer )
+ {
+ // Connected. Wait server hello string.
+ DWORD iReceived = ReceiveData( m_hSocket, pReceiveBuffer, dwReceiveBufferSize );
+ if ( iReceived )
+ {
+ SetErrorText( pReceiveBuffer );
+
+ // Check 334
+ int iResponseCode = GetResponseCode( pReceiveBuffer, iReceived );
+ if ( iResponseCode != 334 )
+ {
+ free( pReceiveBuffer );
+ return FALSE;
+ }
+ }
+ else
+ {
+ SetErrorText( "ReceiveData error.", WSAGetLastError() );
+ free( pReceiveBuffer );
+ return FALSE;
+ }
+
+ // Encode.
+ DWORD dwLoginBuffer = strlen( szUsername ) + strlen( szPassword ) + 3;
+ char *pLoginBuffer = (char*)malloc( dwLoginBuffer );
+ if ( pLoginBuffer )
+ {
+ ZeroMemory( pLoginBuffer, dwLoginBuffer );
+ strcpy( pLoginBuffer + 1, szUsername );
+ strcpy( pLoginBuffer + 1 + strlen( szUsername ) + 1, szPassword );
+
+ Base64Coder coder;
+ coder.Encode( (const PBYTE)pLoginBuffer, dwLoginBuffer - 1 );
+ LPCSTR szLoginBufferEncoded = coder.EncodedMessage();
+
+ if ( szLoginBufferEncoded && strlen( szLoginBufferEncoded ) > 0 )
+ {
+ DWORD dwSendBufferSize = strlen( szLoginBufferEncoded ) + 4;
+ char* pSendBuffer = (char*)malloc( dwSendBufferSize );
+ if ( pSendBuffer )
+ {
+ strcpy( pSendBuffer, szLoginBufferEncoded );
+ strcat( pSendBuffer, "\r\n" );
+
+ if ( SendData( m_hSocket, (PBYTE)pSendBuffer, strlen( (const char*)pSendBuffer ) ) == 0 )
+ {
+ SetErrorText( "SendData error.", WSAGetLastError() );
+ free( pSendBuffer );
+ free( pLoginBuffer );
+ free( pReceiveBuffer );
+ return FALSE;
+ }
+
+ free( pSendBuffer );
+ }
+ }
+
+ free( pLoginBuffer );
+
+ // check result
+ iReceived = ReceiveData( m_hSocket, pReceiveBuffer, dwReceiveBufferSize );
+ if ( iReceived )
+ {
+ SetErrorText( pReceiveBuffer );
+
+ // Check 235
+ int iResponseCode = GetResponseCode( pReceiveBuffer, iReceived );
+ if ( iResponseCode != 235 )
+ {
+ free( pReceiveBuffer );
+ return FALSE;
+ }
+
+ bSuccess = TRUE;
+ }
+ else
+ {
+ SetErrorText( "ReceiveData error.", WSAGetLastError() );
+ free( pReceiveBuffer );
+ return FALSE;
+ }
+ }
+
+ free( pReceiveBuffer );
+ }
+
+ return bSuccess;
+ }
+
+ //////////////////////////////////////////////////////////////////////////
+ inline BOOL CSMTPClient::ServerLoginMethodLogin( LPCSTR szUsername, LPCSTR szPassword )
+ {
+ BOOL bSuccess = FALSE;
+
+ BYTE szCommandBuffer[ 256 ];
+ sprintf( (char*)szCommandBuffer, "%s %s\r\n", (char*)SMTP_COMMAND_AUTH, (char*)SMTP_COMMAND_AUTH_LOGIN );
+ if ( SendData( m_hSocket, (PBYTE)szCommandBuffer, strlen( (const char*)szCommandBuffer ) ) == 0 )
+ {
+ SetErrorText( "SendData error.", WSAGetLastError() );
+ return FALSE;
+ }
+
+ DWORD dwReceiveBufferSize = 1024*16;
+ PBYTE pReceiveBuffer = (PBYTE)malloc( dwReceiveBufferSize );
+ if ( pReceiveBuffer )
+ {
+ DWORD iReceived = ReceiveData( m_hSocket, pReceiveBuffer, dwReceiveBufferSize );
+ if ( iReceived )
+ {
+ SetErrorText( pReceiveBuffer );
+
+ // Check 334
+ int iResponseCode = GetResponseCode( pReceiveBuffer, iReceived );
+ if ( iResponseCode != 334 )
+ {
+ free( pReceiveBuffer );
+ return FALSE;
+ }
+
+ // Check request
+ if ( iReceived > 6 )
+ {
+ Base64Coder coder;
+ coder.Decode( pReceiveBuffer + 4, iReceived - 6 );
+ LPCSTR szRequest = coder.DecodedMessage();
+ if ( szRequest && strlen( szRequest ) > 0 )
+ {
+ if ( strcmpi( szRequest, "Username:" ) == 0 )
+ {
+ coder.Encode( (const PBYTE)szUsername, strlen( szUsername ) );
+ LPCSTR szUsernameEncoded = coder.EncodedMessage();
+
+ char* szLoginUsernameBuffer = (char*)malloc( strlen( szUsernameEncoded ) + 4 );
+ if ( szLoginUsernameBuffer )
+ {
+ strcpy( szLoginUsernameBuffer, szUsernameEncoded );
+ strcat( szLoginUsernameBuffer, "\r\n" );
+
+ if ( SendData( m_hSocket, (PBYTE)szLoginUsernameBuffer, strlen( (const char*)szLoginUsernameBuffer ) ) == 0 )
+ {
+ SetErrorText( "SendData error.", WSAGetLastError() );
+ free( pReceiveBuffer );
+ return FALSE;
+ }
+
+ free( szLoginUsernameBuffer );
+ }
+ else
+ {
+ free( pReceiveBuffer );
+ return FALSE;
+ }
+
+ iReceived = ReceiveData( m_hSocket, pReceiveBuffer, dwReceiveBufferSize );
+ if ( iReceived )
+ {
+ SetErrorText( pReceiveBuffer );
+
+ // Check 334
+ int iResponseCode = GetResponseCode( pReceiveBuffer, iReceived );
+ if ( iResponseCode != 334 )
+ {
+ free( pReceiveBuffer );
+ return FALSE;
+ }
+
+ // Check request
+ if ( iReceived > 6 )
+ {
+ coder.Decode( pReceiveBuffer + 4, iReceived - 6 );
+ LPCSTR szRequest2 = coder.DecodedMessage();
+ if ( szRequest2 && strlen( szRequest2 ) > 0 )
+ {
+ if ( strcmpi( szRequest2, "Password:" ) == 0 )
+ {
+ coder.Encode( (const PBYTE)szPassword, strlen( szPassword ) );
+ LPCSTR szPasswordEncoded = coder.EncodedMessage();
+
+ char* szLoginPasswordBuffer = (char*)malloc( strlen( szPasswordEncoded ) + 4 );
+ if ( szLoginPasswordBuffer )
+ {
+ strcpy( szLoginPasswordBuffer, szPasswordEncoded );
+ strcat( szLoginPasswordBuffer, "\r\n" );
+
+ if ( SendData( m_hSocket, (PBYTE)szLoginPasswordBuffer, strlen( (const char*)szLoginPasswordBuffer ) ) == 0 )
+ {
+ SetErrorText( "SendData error.", WSAGetLastError() );
+ free( pReceiveBuffer );
+ return FALSE;
+ }
+
+ free( szLoginPasswordBuffer );
+ }
+ else
+ {
+ free( pReceiveBuffer );
+ return FALSE;
+ }
+
+ iReceived = ReceiveData( m_hSocket, pReceiveBuffer, dwReceiveBufferSize );
+ if ( iReceived )
+ {
+ SetErrorText( pReceiveBuffer );
+
+ // Check 235
+ int iResponseCode = GetResponseCode( pReceiveBuffer, iReceived );
+ if ( iResponseCode != 235 )
+ {
+ free( pReceiveBuffer );
+ return FALSE;
+ }
+
+ bSuccess = TRUE;
+ }
+ else
+ {
+ SetErrorText( "ReceiveData error.", WSAGetLastError() );
+ free( pReceiveBuffer );
+ return FALSE;
+ }
+ }
+ }
+ }
+ }
+ else
+ {
+ free( pReceiveBuffer );
+ return FALSE;
+ }
+ }
+ }
+ else
+ {
+ free( pReceiveBuffer );
+ return FALSE;
+ }
+ }
+ else
+ {
+ free( pReceiveBuffer );
+ return FALSE;
+ }
+ }
+ else
+ {
+ SetErrorText( "ReceiveData error.", WSAGetLastError() );
+ free( pReceiveBuffer );
+ return FALSE;
+ }
+
+ free( pReceiveBuffer );
+ }
+
+ return bSuccess;
+ }
+
+ //////////////////////////////////////////////////////////////////////////
+ inline BOOL CSMTPClient::ServerLoginMethodCramMD5( LPCSTR szUsername, LPCSTR szPassword )
+ {
+ BOOL bSuccess = FALSE;
+
+ BYTE szCommandBuffer[ 256 ];
+ sprintf( (char*)szCommandBuffer, "%s %s\r\n", (char*)SMTP_COMMAND_AUTH, (char*)SMTP_COMMAND_AUTH_CRAM_MD5 );
+ if ( SendData( m_hSocket, (PBYTE)szCommandBuffer, strlen( (const char*)szCommandBuffer ) ) == 0 )
+ {
+ SetErrorText( "SendData error.", WSAGetLastError() );
+ return FALSE;
+ }
+
+ DWORD dwReceiveBufferSize = 1024*16;
+ PBYTE pReceiveBuffer = (PBYTE)malloc( dwReceiveBufferSize );
+ if ( pReceiveBuffer )
+ {
+ // Connected. Wait server hello string.
+ DWORD iReceived = ReceiveData( m_hSocket, pReceiveBuffer, dwReceiveBufferSize );
+ if ( iReceived )
+ {
+ SetErrorText( pReceiveBuffer );
+
+ // Check 334
+ int iResponseCode = GetResponseCode( pReceiveBuffer, iReceived );
+ if ( iResponseCode != 334 )
+ {
+ free( pReceiveBuffer );
+ return FALSE;
+ }
+
+ // Check request
+ if ( iReceived > 6 )
+ {
+ Base64Coder coder;
+ coder.Decode( pReceiveBuffer + 4, iReceived - 6 );
+ LPCSTR szResponse = coder.DecodedMessage();
+ if ( szResponse && strlen( szResponse ) > 0 )
+ {
+ char *auth_hex = hash_md5( szPassword, szResponse, strlen(szResponse) );
+ if ( !auth_hex )
+ {
+ free( pReceiveBuffer );
+ return FALSE;
+ }
+
+ char *szCommand = (char*)malloc( strlen( szUsername ) + strlen( auth_hex ) + 5 );
+ if ( szCommand )
+ {
+ sprintf( szCommand, "%s %s", szUsername, auth_hex );
+
+ free( auth_hex );
+
+ coder.Encode( (const PBYTE)szCommand, strlen( szCommand ) );
+
+ free( szCommand );
+
+ LPCSTR szAuthEncoded = coder.EncodedMessage();
+ if ( szAuthEncoded == NULL )
+ {
+ free( pReceiveBuffer );
+ return FALSE;
+ }
+
+ char *szAuthCommand = (char*)malloc( strlen( szAuthEncoded ) + 4 );
+ if ( szAuthCommand )
+ {
+ strcpy( szAuthCommand, szAuthEncoded );
+ strcat( szAuthCommand, "\r\n" );
+
+ // Send auth data
+ if ( SendData( m_hSocket, (PBYTE)szAuthCommand, strlen( (const char*)szAuthCommand ) ) == 0 )
+ {
+ SetErrorText( "SendData error.", WSAGetLastError() );
+ free( szAuthCommand );
+ free( pReceiveBuffer );
+ return FALSE;
+ }
+
+ // Check response
+ iReceived = ReceiveData( m_hSocket, pReceiveBuffer, dwReceiveBufferSize );
+ if ( iReceived )
+ {
+ SetErrorText( pReceiveBuffer );
+
+ // Check 235
+ int iResponseCode = GetResponseCode( pReceiveBuffer, iReceived );
+ if ( iResponseCode != 235 )
+ {
+ free( pReceiveBuffer );
+ return FALSE;
+ }
+
+ bSuccess = TRUE;
+ }
+ else
+ {
+ SetErrorText( "ReceiveData error.", WSAGetLastError() );
+ free( pReceiveBuffer );
+ return FALSE;
+ }
+
+ free( szAuthCommand );
+ }
+ else
+ {
+ free( pReceiveBuffer );
+ return FALSE;
+ }
+ }
+ else
+ {
+ free( auth_hex );
+ free( pReceiveBuffer );
+ return FALSE;
+ }
+ }
+ else
+ {
+ free( pReceiveBuffer );
+ return FALSE;
+ }
+ }
+
+ }
+ else
+ {
+ SetErrorText( "ReceiveData error.", WSAGetLastError() );
+ free( pReceiveBuffer );
+ return FALSE;
+ }
+
+ free( pReceiveBuffer );
+ }
+ else
+ {
+ SetErrorText( "malloc() failed.", GetLastError() );
+ }
+
+ return bSuccess;
+ }
+
+ //////////////////////////////////////////////////////////////////////////
+ inline BOOL CSMTPClient::SendMessage( LPCSTR szFromAddress, LPCSTR szFromName, LPCSTR szToAddresses, LPCSTR szSubject, LPCSTR szXMailer, LPBYTE pBodyBuffer, DWORD dwBodySize )
+ {
+ BOOL bSuccess = FALSE;
+
+ // Format Header
+ if ( !szFromAddress )
+ {
+ SetErrorText( "SendMessage. Invalid Parameters!" );
+ return NULL;
+ }
+
+ char *szHeaderBuffer = (char*)malloc( 1024 * 16 );
+ if ( szHeaderBuffer )
+ {
+ // get the current date and time
+ char szDate[ 500 ];
+ char sztTime[ 500 ];
+
+ SYSTEMTIME st = { 0 };
+ ::GetSystemTime(&st);
+
+ ::GetDateFormatA( MAKELCID( MAKELANGID( LANG_ENGLISH, SUBLANG_ENGLISH_US), SORT_DEFAULT), 0, &st, "ddd',' dd MMM yyyy", szDate , sizeof( szDate ) );
+ ::GetTimeFormatA( MAKELCID( MAKELANGID( LANG_ENGLISH, SUBLANG_ENGLISH_US), SORT_DEFAULT), TIME_FORCE24HOURFORMAT, &st, "HH':'mm':'ss", sztTime, sizeof( sztTime ) );
+
+ sprintf( szHeaderBuffer, "DATE: %s %s\r\n", szDate, sztTime );
+
+ // X-Mailer Field
+ if ( szXMailer && strlen( szXMailer ) )
+ {
+ strcat( szHeaderBuffer, "X-Mailer: " );
+ strcat( szHeaderBuffer, szXMailer );
+ strcat( szHeaderBuffer, "\r\n" );
+ }
+
+ // From:
+ strcat( szHeaderBuffer, "From: " );
+ if ( szFromName )
+ {
+ strcat( szHeaderBuffer, "\"" );
+ strcat( szHeaderBuffer, szFromName );
+ strcat( szHeaderBuffer, "\" <" );
+ strcat( szHeaderBuffer, szFromAddress );
+ strcat( szHeaderBuffer, ">\r\n" );
+ }
+ else
+ {
+ strcat( szHeaderBuffer, "<" );
+ strcat( szHeaderBuffer, szFromAddress );
+ strcat( szHeaderBuffer, ">\r\n" );
+ }
+
+ // Subject:
+ if ( szSubject && strlen( szSubject ) )
+ {
+ strcat( szHeaderBuffer, "Subject: " );
+ strcat( szHeaderBuffer, szSubject );
+ strcat( szHeaderBuffer, "\r\n" );
+ }
+
+ // To Fields
+ strcat( szHeaderBuffer, "To: " );
+ strcat( szHeaderBuffer, szToAddresses );
+ strcat( szHeaderBuffer, "\r\n" );
+
+ // MIME
+ strcat( szHeaderBuffer, "MIME-Version: 1.0\r\nContent-type: text/plain; charset=US-ASCII\r\n" );
+
+ // End Header
+ strcat( szHeaderBuffer, "\r\n" );
+ }
+ else
+ {
+ SetErrorText( "malloc error.", GetLastError() );
+ return FALSE;
+ }
+
+
+ BYTE szCommandBuffer[ 256 ];
+ sprintf( (char*)szCommandBuffer, "MAIL FROM:<%s> SIZE=%u\r\n", (char*)szFromAddress, strlen( szHeaderBuffer ) + dwBodySize + 2 );
+ if ( SendData( m_hSocket, (PBYTE)szCommandBuffer, strlen( (const char*)szCommandBuffer ) ) == 0 )
+ {
+ SetErrorText( "SendData error.", WSAGetLastError() );
+ free( szHeaderBuffer );
+ return FALSE;
+ }
+
+ DWORD dwReceiveBufferSize = 1024*16;
+ PBYTE pReceiveBuffer = (PBYTE)malloc( dwReceiveBufferSize );
+ if ( pReceiveBuffer )
+ {
+ DWORD iReceived = ReceiveData( m_hSocket, pReceiveBuffer, dwReceiveBufferSize );
+ if ( iReceived )
+ {
+ SetErrorText( pReceiveBuffer );
+
+ // Check 250
+ int iResponseCode = GetResponseCode( pReceiveBuffer, iReceived );
+ if ( iResponseCode != 250 )
+ {
+ free( szHeaderBuffer );
+ free( pReceiveBuffer );
+ return FALSE;
+ }
+ }
+ else
+ {
+ SetErrorText( "ReceiveData error.", WSAGetLastError() );
+ free( szHeaderBuffer );
+ free( pReceiveBuffer );
+ return FALSE;
+ }
+
+ // Post "RCTP TO:"
+ char *szCurrentAddr = (char*)malloc( strlen( szToAddresses ) + 1 );
+ if ( !szCurrentAddr )
+ {
+ SetErrorText( "malloc error.", GetLastError() );
+ free( szHeaderBuffer );
+ free( pReceiveBuffer );
+ return FALSE;
+ }
+
+ const char* szToOffset = szToAddresses;
+ char* szZap = NULL;
+
+ BOOL bRCPTAccepted = FALSE;
+ do
+ {
+ strcpy( szCurrentAddr, szToOffset );
+ char *szExtractedAdress = szCurrentAddr;
+ szZap = strchr( szCurrentAddr, ',' );
+
+ if ( szZap )
+ {
+ *szZap = 0;
+ szToOffset = szZap + 1;
+ }
+
+ char *pSkobka1 = strchr( szCurrentAddr, '<' );
+ char *pSkobka2 = strchr( szCurrentAddr, '>' );
+
+ if ( pSkobka1 && pSkobka2 && pSkobka2 > pSkobka1 )
+ {
+ szExtractedAdress = pSkobka1 + 1;
+ *pSkobka2 = NULL;
+ }
+
+ if ( szExtractedAdress && strlen( szExtractedAdress ) > 0 )
+ {
+ sprintf( (char*)szCommandBuffer, "RCPT TO:<%s>\r\n", (char*)szExtractedAdress );
+ if ( SendData( m_hSocket, (PBYTE)szCommandBuffer, strlen( (const char*)szCommandBuffer ) ) == 0 )
+ {
+ SetErrorText( "SendData error.", WSAGetLastError() );
+ free( szCurrentAddr );
+ free( pReceiveBuffer );
+ free( szHeaderBuffer );
+ return FALSE;
+ }
+
+ iReceived = ReceiveData( m_hSocket, pReceiveBuffer, dwReceiveBufferSize );
+ if ( iReceived )
+ {
+ SetErrorText( pReceiveBuffer );
+
+ // Check 250
+ int iResponseCode = GetResponseCode( pReceiveBuffer, iReceived );
+ if ( iResponseCode == 250 )
+ {
+ bRCPTAccepted = TRUE;
+ }
+ }
+ else
+ {
+ SetErrorText( "ReceiveData error.", WSAGetLastError() );
+ free( szCurrentAddr );
+ free( pReceiveBuffer );
+ free( szHeaderBuffer );
+ return FALSE;
+ }
+ }
+
+ } while( szZap );
+
+ free( szCurrentAddr );
+
+ if ( bRCPTAccepted )
+ {
+ sprintf( (char*)szCommandBuffer, "DATA\r\n" );
+ if ( SendData( m_hSocket, (PBYTE)szCommandBuffer, strlen( (const char*)szCommandBuffer ) ) == 0 )
+ {
+ SetErrorText( "SendData error.", WSAGetLastError() );
+ free( pReceiveBuffer );
+ free( szHeaderBuffer );
+ return FALSE;
+ }
+
+ iReceived = ReceiveData( m_hSocket, pReceiveBuffer, dwReceiveBufferSize );
+ if ( iReceived )
+ {
+ SetErrorText( pReceiveBuffer );
+
+ // Check 354
+ int iResponseCode = GetResponseCode( pReceiveBuffer, iReceived );
+ if ( iResponseCode != 354 )
+ {
+ free( pReceiveBuffer );
+ free( szHeaderBuffer );
+ return FALSE;
+ }
+ }
+ else
+ {
+ SetErrorText( "ReceiveData error.", WSAGetLastError() );
+ free( pReceiveBuffer );
+ free( szHeaderBuffer );
+ return FALSE;
+ }
+
+ // Send message data (header + body + .)
+ if ( SendData( m_hSocket, (PBYTE)szHeaderBuffer, strlen( (const char*)szHeaderBuffer ) ) == 0 )
+ {
+ SetErrorText( "SendData error.", WSAGetLastError() );
+ free( pReceiveBuffer );
+ free( szHeaderBuffer );
+ return FALSE;
+ }
+
+ if ( SendData( m_hSocket, (PBYTE)pBodyBuffer, dwBodySize ) == 0 )
+ {
+ SetErrorText( "SendData error.", WSAGetLastError() );
+ free( pReceiveBuffer );
+ free( szHeaderBuffer );
+ return FALSE;
+ }
+
+ if ( SendData( m_hSocket, (PBYTE)"\r\n.\r\n", 5 ) == 0 )
+ {
+ SetErrorText( "SendData error.", WSAGetLastError() );
+ free( pReceiveBuffer );
+ free( szHeaderBuffer );
+ return FALSE;
+ }
+
+ iReceived = ReceiveData( m_hSocket, pReceiveBuffer, dwReceiveBufferSize );
+ if ( iReceived )
+ {
+ SetErrorText( pReceiveBuffer );
+
+ // Check 250
+ int iResponseCode = GetResponseCode( pReceiveBuffer, iReceived );
+ if ( iResponseCode == 250 )
+ {
+ bSuccess = TRUE;
+ }
+ }
+ else
+ {
+ SetErrorText( "ReceiveData error.", WSAGetLastError() );
+ }
+ }
+
+ free( pReceiveBuffer );
+ }
+ else
+ {
+ SetErrorText( "malloc error.", GetLastError() );
+ }
+
+ if ( szHeaderBuffer )
+ free( szHeaderBuffer );
+
+ return bSuccess;
+ }
+
+
+
+ //////////////////////////////////////////////////////////////////////////
+ //////////////////////////////////////////////////////////////////////////
+ //////////////////////////////////////////////////////////////////////////
+ //////////////////////////////////////////////////////////////////////////
+
+
+#ifndef PAGESIZE
+#define PAGESIZE 4096
+#endif
+
+#ifndef ROUNDTOPAGE
+#define ROUNDTOPAGE(a) (((a/4096)+1)*4096)
+#endif
+
+ //////////////////////////////////////////////////////////////////////
+ // Construction/Destruction
+ //////////////////////////////////////////////////////////////////////
+
+ inline Base64Coder::Base64Coder()
+ : m_pDBuffer(NULL),
+ m_pEBuffer(NULL),
+ m_nDBufLen(0),
+ m_nEBufLen(0)
+ {
+
+ }
+
+ inline Base64Coder::~Base64Coder()
+ {
+ if(m_pDBuffer != NULL)
+ delete [] m_pDBuffer;
+
+ if(m_pEBuffer != NULL)
+ delete [] m_pEBuffer;
+ }
+
+ inline LPCSTR Base64Coder::DecodedMessage() const
+ {
+ return (LPCSTR) m_pDBuffer;
+ }
+
+ inline LPCSTR Base64Coder::EncodedMessage() const
+ {
+ return (LPCSTR) m_pEBuffer;
+ }
+
+ inline void Base64Coder::AllocEncode(DWORD nSize)
+ {
+ if(m_nEBufLen < nSize)
+ {
+ if(m_pEBuffer != NULL)
+ delete [] m_pEBuffer;
+
+ m_nEBufLen = ROUNDTOPAGE(nSize);
+ m_pEBuffer = new BYTE[m_nEBufLen];
+ }
+
+ ::ZeroMemory(m_pEBuffer, m_nEBufLen);
+ m_nEDataLen = 0;
+ }
+
+ inline void Base64Coder::AllocDecode(DWORD nSize)
+ {
+ if(m_nDBufLen < nSize)
+ {
+ if(m_pDBuffer != NULL)
+ delete [] m_pDBuffer;
+
+ m_nDBufLen = ROUNDTOPAGE(nSize);
+ m_pDBuffer = new BYTE[m_nDBufLen];
+ }
+
+ ::ZeroMemory(m_pDBuffer, m_nDBufLen);
+ m_nDDataLen = 0;
+ }
+
+ inline void Base64Coder::SetEncodeBuffer(const PBYTE pBuffer, DWORD nBufLen)
+ {
+ DWORD i = 0;
+
+ AllocEncode(nBufLen);
+ while(i < nBufLen)
+ {
+ if(!_IsBadMimeChar(pBuffer[i]))
+ {
+ m_pEBuffer[m_nEDataLen] = pBuffer[i];
+ m_nEDataLen++;
+ }
+
+ i++;
+ }
+ }
+
+ inline void Base64Coder::SetDecodeBuffer(const PBYTE pBuffer, DWORD nBufLen)
+ {
+ AllocDecode(nBufLen);
+ ::CopyMemory(m_pDBuffer, pBuffer, nBufLen);
+ m_nDDataLen = nBufLen;
+ }
+
+ inline void Base64Coder::Encode(const PBYTE pBuffer, DWORD nBufLen)
+ {
+ SetDecodeBuffer(pBuffer, nBufLen);
+ AllocEncode(nBufLen * 2);
+
+ TempBucket Raw;
+ DWORD nIndex = 0;
+
+ while((nIndex + 3) <= nBufLen)
+ {
+ Raw.Clear();
+ ::CopyMemory(&Raw, m_pDBuffer + nIndex, 3);
+ Raw.nSize = 3;
+ _EncodeToBuffer(Raw, m_pEBuffer + m_nEDataLen);
+ nIndex += 3;
+ m_nEDataLen += 4;
+ }
+
+ if(nBufLen > nIndex)
+ {
+ Raw.Clear();
+ Raw.nSize = (BYTE) (nBufLen - nIndex);
+ ::CopyMemory(&Raw, m_pDBuffer + nIndex, nBufLen - nIndex);
+ _EncodeToBuffer(Raw, m_pEBuffer + m_nEDataLen);
+ m_nEDataLen += 4;
+ }
+ }
+
+ inline void Base64Coder::Encode(LPCSTR szMessage)
+ {
+ if(szMessage != NULL)
+ Base64Coder::Encode((const PBYTE)szMessage, strlen( (const char*)szMessage));
+ }
+
+ inline void Base64Coder::Decode(const PBYTE pBuffer, DWORD dwBufLen)
+ {
+ if(is_init())
+ _Init();
+
+ SetEncodeBuffer(pBuffer, dwBufLen);
+
+ AllocDecode(dwBufLen);
+
+ TempBucket Raw;
+
+ DWORD nIndex = 0;
+
+ while((nIndex + 4) <= m_nEDataLen)
+ {
+ Raw.Clear();
+ Raw.nData[0] = DecodeTable()[m_pEBuffer[nIndex]];
+ Raw.nData[1] = DecodeTable()[m_pEBuffer[nIndex + 1]];
+ Raw.nData[2] = DecodeTable()[m_pEBuffer[nIndex + 2]];
+ Raw.nData[3] = DecodeTable()[m_pEBuffer[nIndex + 3]];
+
+ if(Raw.nData[2] == 255)
+ Raw.nData[2] = 0;
+ if(Raw.nData[3] == 255)
+ Raw.nData[3] = 0;
+
+ Raw.nSize = 4;
+ _DecodeToBuffer(Raw, m_pDBuffer + m_nDDataLen);
+ nIndex += 4;
+ m_nDDataLen += 3;
+ }
+
+ // If nIndex < m_nEDataLen, then we got a decode message without padding.
+ // We may want to throw some kind of warning here, but we are still required
+ // to handle the decoding as if it was properly padded.
+ if(nIndex < m_nEDataLen)
+ {
+ Raw.Clear();
+ for(DWORD i = nIndex; i < m_nEDataLen; i++)
+ {
+ Raw.nData[i - nIndex] = DecodeTable()[m_pEBuffer[i]];
+ Raw.nSize++;
+ if(Raw.nData[i - nIndex] == 255)
+ Raw.nData[i - nIndex] = 0;
+ }
+
+ _DecodeToBuffer(Raw, m_pDBuffer + m_nDDataLen);
+ m_nDDataLen += (m_nEDataLen - nIndex);
+ }
+ }
+
+ inline void Base64Coder::Decode(LPCSTR szMessage)
+ {
+ if(szMessage != NULL)
+ Base64Coder::Decode((const PBYTE)szMessage, strlen((const char*)szMessage));
+ }
+
+ inline DWORD Base64Coder::_DecodeToBuffer(const TempBucket &Decode, PBYTE pBuffer)
+ {
+ TempBucket Data;
+ DWORD nCount = 0;
+
+ _DecodeRaw(Data, Decode);
+
+ for(int i = 0; i < 3; i++)
+ {
+ pBuffer[i] = Data.nData[i];
+ if(pBuffer[i] != 255)
+ nCount++;
+ }
+
+ return nCount;
+ }
+
+
+ inline void Base64Coder::_EncodeToBuffer(const TempBucket &Decode, PBYTE pBuffer)
+ {
+ TempBucket Data;
+
+ _EncodeRaw(Data, Decode);
+
+ for(int i = 0; i < 4; i++)
+ pBuffer[i] = Base64Digits()[Data.nData[i]];
+
+ switch(Decode.nSize)
+ {
+ case 1:
+ pBuffer[2] = '=';
+ case 2:
+ pBuffer[3] = '=';
+ }
+ }
+
+ inline void Base64Coder::_DecodeRaw(TempBucket &Data, const TempBucket &Decode)
+ {
+ BYTE nTemp;
+
+ Data.nData[0] = Decode.nData[0];
+ Data.nData[0] <<= 2;
+
+ nTemp = Decode.nData[1];
+ nTemp >>= 4;
+ nTemp &= 0x03;
+ Data.nData[0] |= nTemp;
+
+ Data.nData[1] = Decode.nData[1];
+ Data.nData[1] <<= 4;
+
+ nTemp = Decode.nData[2];
+ nTemp >>= 2;
+ nTemp &= 0x0F;
+ Data.nData[1] |= nTemp;
+
+ Data.nData[2] = Decode.nData[2];
+ Data.nData[2] <<= 6;
+ nTemp = Decode.nData[3];
+ nTemp &= 0x3F;
+ Data.nData[2] |= nTemp;
+ }
+
+ inline void Base64Coder::_EncodeRaw(TempBucket &Data, const TempBucket &Decode)
+ {
+ BYTE nTemp;
+
+ Data.nData[0] = Decode.nData[0];
+ Data.nData[0] >>= 2;
+
+ Data.nData[1] = Decode.nData[0];
+ Data.nData[1] <<= 4;
+ nTemp = Decode.nData[1];
+ nTemp >>= 4;
+ Data.nData[1] |= nTemp;
+ Data.nData[1] &= 0x3F;
+
+ Data.nData[2] = Decode.nData[1];
+ Data.nData[2] <<= 2;
+
+ nTemp = Decode.nData[2];
+ nTemp >>= 6;
+
+ Data.nData[2] |= nTemp;
+ Data.nData[2] &= 0x3F;
+
+ Data.nData[3] = Decode.nData[2];
+ Data.nData[3] &= 0x3F;
+ }
+
+ inline BOOL Base64Coder::_IsBadMimeChar(BYTE nData)
+ {
+ switch(nData)
+ {
+ case '\r': case '\n': case '\t': case ' ' :
+ case '\b': case '\a': case '\f': case '\v':
+ return TRUE;
+ default:
+ return FALSE;
+ }
+ }
+
+ inline void Base64Coder::_Init()
+ { // Initialize Decoding table.
+
+ int i;
+
+ for(i = 0; i < 256; i++)
+ DecodeTable()[i] = -2;
+
+ for(i = 0; i < 64; i++)
+ {
+ DecodeTable()[Base64Digits()[i]] = i;
+ DecodeTable()[Base64Digits()[i]|0x80] = i;
+ }
+
+ DecodeTable()['='] = -1;
+ DecodeTable()['='|0x80] = -1;
+
+ is_init() = TRUE;
+ }
+
+
+ }
+}
+} \ No newline at end of file