Files correlati : omento : Aggiornata cUrl alla ultima versione su Github: 7.56.1 git-svn-id: svn://10.65.10.50/branches/R_10_00@24202 c028cbd2-c16b-5b4b-a496-9718f37d4682
		
			
				
	
	
		
			2099 lines
		
	
	
		
			58 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			2099 lines
		
	
	
		
			58 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
/***************************************************************************
 | 
						|
 *                                  _   _ ____  _
 | 
						|
 *  Project                     ___| | | |  _ \| |
 | 
						|
 *                             / __| | | | |_) | |
 | 
						|
 *                            | (__| |_| |  _ <| |___
 | 
						|
 *                             \___|\___/|_| \_\_____|
 | 
						|
 *
 | 
						|
 * Copyright (C) 1998 - 2017, Daniel Stenberg, <daniel@haxx.se>, et al.
 | 
						|
 *
 | 
						|
 * This software is licensed as described in the file COPYING, which
 | 
						|
 * you should have received as part of this distribution. The terms
 | 
						|
 * are also available at https://curl.haxx.se/docs/copyright.html.
 | 
						|
 *
 | 
						|
 * You may opt to use, copy, modify, merge, publish, distribute and/or sell
 | 
						|
 * copies of the Software, and permit persons to whom the Software is
 | 
						|
 * furnished to do so, under the terms of the COPYING file.
 | 
						|
 *
 | 
						|
 * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
 | 
						|
 * KIND, either express or implied.
 | 
						|
 *
 | 
						|
 * RFC2195 CRAM-MD5 authentication
 | 
						|
 * RFC2595 Using TLS with IMAP, POP3 and ACAP
 | 
						|
 * RFC2831 DIGEST-MD5 authentication
 | 
						|
 * RFC3501 IMAPv4 protocol
 | 
						|
 * RFC4422 Simple Authentication and Security Layer (SASL)
 | 
						|
 * RFC4616 PLAIN authentication
 | 
						|
 * RFC4752 The Kerberos V5 ("GSSAPI") SASL Mechanism
 | 
						|
 * RFC4959 IMAP Extension for SASL Initial Client Response
 | 
						|
 * RFC5092 IMAP URL Scheme
 | 
						|
 * RFC6749 OAuth 2.0 Authorization Framework
 | 
						|
 * Draft   LOGIN SASL Mechanism <draft-murchison-sasl-login-00.txt>
 | 
						|
 *
 | 
						|
 ***************************************************************************/
 | 
						|
 | 
						|
#include "curl_setup.h"
 | 
						|
 | 
						|
#ifndef CURL_DISABLE_IMAP
 | 
						|
 | 
						|
#ifdef HAVE_NETINET_IN_H
 | 
						|
#include <netinet/in.h>
 | 
						|
#endif
 | 
						|
#ifdef HAVE_ARPA_INET_H
 | 
						|
#include <arpa/inet.h>
 | 
						|
#endif
 | 
						|
#ifdef HAVE_UTSNAME_H
 | 
						|
#include <sys/utsname.h>
 | 
						|
#endif
 | 
						|
#ifdef HAVE_NETDB_H
 | 
						|
#include <netdb.h>
 | 
						|
#endif
 | 
						|
#ifdef __VMS
 | 
						|
#include <in.h>
 | 
						|
#include <inet.h>
 | 
						|
#endif
 | 
						|
 | 
						|
#if (defined(NETWARE) && defined(__NOVELL_LIBC__))
 | 
						|
#undef in_addr_t
 | 
						|
#define in_addr_t unsigned long
 | 
						|
#endif
 | 
						|
 | 
						|
#include <curl/curl.h>
 | 
						|
#include "urldata.h"
 | 
						|
#include "sendf.h"
 | 
						|
#include "hostip.h"
 | 
						|
#include "progress.h"
 | 
						|
#include "transfer.h"
 | 
						|
#include "escape.h"
 | 
						|
#include "http.h" /* for HTTP proxy tunnel stuff */
 | 
						|
#include "socks.h"
 | 
						|
#include "imap.h"
 | 
						|
#include "mime.h"
 | 
						|
#include "strtoofft.h"
 | 
						|
#include "strcase.h"
 | 
						|
#include "vtls/vtls.h"
 | 
						|
#include "connect.h"
 | 
						|
#include "strerror.h"
 | 
						|
#include "select.h"
 | 
						|
#include "multiif.h"
 | 
						|
#include "url.h"
 | 
						|
#include "strcase.h"
 | 
						|
#include "curl_sasl.h"
 | 
						|
#include "warnless.h"
 | 
						|
 | 
						|
/* The last 3 #include files should be in this order */
 | 
						|
#include "curl_printf.h"
 | 
						|
#include "curl_memory.h"
 | 
						|
#include "memdebug.h"
 | 
						|
 | 
						|
/* Local API functions */
 | 
						|
static CURLcode imap_regular_transfer(struct connectdata *conn, bool *done);
 | 
						|
static CURLcode imap_do(struct connectdata *conn, bool *done);
 | 
						|
static CURLcode imap_done(struct connectdata *conn, CURLcode status,
 | 
						|
                          bool premature);
 | 
						|
static CURLcode imap_connect(struct connectdata *conn, bool *done);
 | 
						|
static CURLcode imap_disconnect(struct connectdata *conn, bool dead);
 | 
						|
static CURLcode imap_multi_statemach(struct connectdata *conn, bool *done);
 | 
						|
static int imap_getsock(struct connectdata *conn, curl_socket_t *socks,
 | 
						|
                        int numsocks);
 | 
						|
static CURLcode imap_doing(struct connectdata *conn, bool *dophase_done);
 | 
						|
static CURLcode imap_setup_connection(struct connectdata *conn);
 | 
						|
static char *imap_atom(const char *str, bool escape_only);
 | 
						|
static CURLcode imap_sendf(struct connectdata *conn, const char *fmt, ...);
 | 
						|
static CURLcode imap_parse_url_options(struct connectdata *conn);
 | 
						|
static CURLcode imap_parse_url_path(struct connectdata *conn);
 | 
						|
static CURLcode imap_parse_custom_request(struct connectdata *conn);
 | 
						|
static CURLcode imap_perform_authenticate(struct connectdata *conn,
 | 
						|
                                          const char *mech,
 | 
						|
                                          const char *initresp);
 | 
						|
static CURLcode imap_continue_authenticate(struct connectdata *conn,
 | 
						|
                                           const char *resp);
 | 
						|
static void imap_get_message(char *buffer, char **outptr);
 | 
						|
 | 
						|
/*
 | 
						|
 * IMAP protocol handler.
 | 
						|
 */
 | 
						|
 | 
						|
const struct Curl_handler Curl_handler_imap = {
 | 
						|
  "IMAP",                           /* scheme */
 | 
						|
  imap_setup_connection,            /* setup_connection */
 | 
						|
  imap_do,                          /* do_it */
 | 
						|
  imap_done,                        /* done */
 | 
						|
  ZERO_NULL,                        /* do_more */
 | 
						|
  imap_connect,                     /* connect_it */
 | 
						|
  imap_multi_statemach,             /* connecting */
 | 
						|
  imap_doing,                       /* doing */
 | 
						|
  imap_getsock,                     /* proto_getsock */
 | 
						|
  imap_getsock,                     /* doing_getsock */
 | 
						|
  ZERO_NULL,                        /* domore_getsock */
 | 
						|
  ZERO_NULL,                        /* perform_getsock */
 | 
						|
  imap_disconnect,                  /* disconnect */
 | 
						|
  ZERO_NULL,                        /* readwrite */
 | 
						|
  ZERO_NULL,                        /* connection_check */
 | 
						|
  PORT_IMAP,                        /* defport */
 | 
						|
  CURLPROTO_IMAP,                   /* protocol */
 | 
						|
  PROTOPT_CLOSEACTION|              /* flags */
 | 
						|
  PROTOPT_URLOPTIONS
 | 
						|
};
 | 
						|
 | 
						|
#ifdef USE_SSL
 | 
						|
/*
 | 
						|
 * IMAPS protocol handler.
 | 
						|
 */
 | 
						|
 | 
						|
const struct Curl_handler Curl_handler_imaps = {
 | 
						|
  "IMAPS",                          /* scheme */
 | 
						|
  imap_setup_connection,            /* setup_connection */
 | 
						|
  imap_do,                          /* do_it */
 | 
						|
  imap_done,                        /* done */
 | 
						|
  ZERO_NULL,                        /* do_more */
 | 
						|
  imap_connect,                     /* connect_it */
 | 
						|
  imap_multi_statemach,             /* connecting */
 | 
						|
  imap_doing,                       /* doing */
 | 
						|
  imap_getsock,                     /* proto_getsock */
 | 
						|
  imap_getsock,                     /* doing_getsock */
 | 
						|
  ZERO_NULL,                        /* domore_getsock */
 | 
						|
  ZERO_NULL,                        /* perform_getsock */
 | 
						|
  imap_disconnect,                  /* disconnect */
 | 
						|
  ZERO_NULL,                        /* readwrite */
 | 
						|
  ZERO_NULL,                        /* connection_check */
 | 
						|
  PORT_IMAPS,                       /* defport */
 | 
						|
  CURLPROTO_IMAPS,                  /* protocol */
 | 
						|
  PROTOPT_CLOSEACTION | PROTOPT_SSL /* flags */
 | 
						|
};
 | 
						|
#endif
 | 
						|
 | 
						|
#define IMAP_RESP_OK       1
 | 
						|
#define IMAP_RESP_NOT_OK   2
 | 
						|
#define IMAP_RESP_PREAUTH  3
 | 
						|
 | 
						|
/* SASL parameters for the imap protocol */
 | 
						|
static const struct SASLproto saslimap = {
 | 
						|
  "imap",                     /* The service name */
 | 
						|
  '+',                        /* Code received when continuation is expected */
 | 
						|
  IMAP_RESP_OK,               /* Code to receive upon authentication success */
 | 
						|
  0,                          /* Maximum initial response length (no max) */
 | 
						|
  imap_perform_authenticate,  /* Send authentication command */
 | 
						|
  imap_continue_authenticate, /* Send authentication continuation */
 | 
						|
  imap_get_message            /* Get SASL response message */
 | 
						|
};
 | 
						|
 | 
						|
 | 
						|
#ifdef USE_SSL
 | 
						|
static void imap_to_imaps(struct connectdata *conn)
 | 
						|
{
 | 
						|
  /* Change the connection handler */
 | 
						|
  conn->handler = &Curl_handler_imaps;
 | 
						|
 | 
						|
  /* Set the connection's upgraded to TLS flag */
 | 
						|
  conn->tls_upgraded = TRUE;
 | 
						|
}
 | 
						|
#else
 | 
						|
#define imap_to_imaps(x) Curl_nop_stmt
 | 
						|
#endif
 | 
						|
 | 
						|
/***********************************************************************
 | 
						|
 *
 | 
						|
 * imap_matchresp()
 | 
						|
 *
 | 
						|
 * Determines whether the untagged response is related to the specified
 | 
						|
 * command by checking if it is in format "* <command-name> ..." or
 | 
						|
 * "* <number> <command-name> ...".
 | 
						|
 *
 | 
						|
 * The "* " marker is assumed to have already been checked by the caller.
 | 
						|
 */
 | 
						|
static bool imap_matchresp(const char *line, size_t len, const char *cmd)
 | 
						|
{
 | 
						|
  const char *end = line + len;
 | 
						|
  size_t cmd_len = strlen(cmd);
 | 
						|
 | 
						|
  /* Skip the untagged response marker */
 | 
						|
  line += 2;
 | 
						|
 | 
						|
  /* Do we have a number after the marker? */
 | 
						|
  if(line < end && ISDIGIT(*line)) {
 | 
						|
    /* Skip the number */
 | 
						|
    do
 | 
						|
      line++;
 | 
						|
    while(line < end && ISDIGIT(*line));
 | 
						|
 | 
						|
    /* Do we have the space character? */
 | 
						|
    if(line == end || *line != ' ')
 | 
						|
      return FALSE;
 | 
						|
 | 
						|
    line++;
 | 
						|
  }
 | 
						|
 | 
						|
  /* Does the command name match and is it followed by a space character or at
 | 
						|
     the end of line? */
 | 
						|
  if(line + cmd_len <= end && strncasecompare(line, cmd, cmd_len) &&
 | 
						|
     (line[cmd_len] == ' ' || line + cmd_len + 2 == end))
 | 
						|
    return TRUE;
 | 
						|
 | 
						|
  return FALSE;
 | 
						|
}
 | 
						|
 | 
						|
/***********************************************************************
 | 
						|
 *
 | 
						|
 * imap_endofresp()
 | 
						|
 *
 | 
						|
 * Checks whether the given string is a valid tagged, untagged or continuation
 | 
						|
 * response which can be processed by the response handler.
 | 
						|
 */
 | 
						|
static bool imap_endofresp(struct connectdata *conn, char *line, size_t len,
 | 
						|
                           int *resp)
 | 
						|
{
 | 
						|
  struct IMAP *imap = conn->data->req.protop;
 | 
						|
  struct imap_conn *imapc = &conn->proto.imapc;
 | 
						|
  const char *id = imapc->resptag;
 | 
						|
  size_t id_len = strlen(id);
 | 
						|
 | 
						|
  /* Do we have a tagged command response? */
 | 
						|
  if(len >= id_len + 1 && !memcmp(id, line, id_len) && line[id_len] == ' ') {
 | 
						|
    line += id_len + 1;
 | 
						|
    len -= id_len + 1;
 | 
						|
 | 
						|
    if(len >= 2 && !memcmp(line, "OK", 2))
 | 
						|
      *resp = IMAP_RESP_OK;
 | 
						|
    else if(len >= 7 && !memcmp(line, "PREAUTH", 7))
 | 
						|
      *resp = IMAP_RESP_PREAUTH;
 | 
						|
    else
 | 
						|
      *resp = IMAP_RESP_NOT_OK;
 | 
						|
 | 
						|
    return TRUE;
 | 
						|
  }
 | 
						|
 | 
						|
  /* Do we have an untagged command response? */
 | 
						|
  if(len >= 2 && !memcmp("* ", line, 2)) {
 | 
						|
    switch(imapc->state) {
 | 
						|
      /* States which are interested in untagged responses */
 | 
						|
      case IMAP_CAPABILITY:
 | 
						|
        if(!imap_matchresp(line, len, "CAPABILITY"))
 | 
						|
          return FALSE;
 | 
						|
        break;
 | 
						|
 | 
						|
      case IMAP_LIST:
 | 
						|
        if((!imap->custom && !imap_matchresp(line, len, "LIST")) ||
 | 
						|
          (imap->custom && !imap_matchresp(line, len, imap->custom) &&
 | 
						|
           (!strcasecompare(imap->custom, "STORE") ||
 | 
						|
            !imap_matchresp(line, len, "FETCH")) &&
 | 
						|
           !strcasecompare(imap->custom, "SELECT") &&
 | 
						|
           !strcasecompare(imap->custom, "EXAMINE") &&
 | 
						|
           !strcasecompare(imap->custom, "SEARCH") &&
 | 
						|
           !strcasecompare(imap->custom, "EXPUNGE") &&
 | 
						|
           !strcasecompare(imap->custom, "LSUB") &&
 | 
						|
           !strcasecompare(imap->custom, "UID") &&
 | 
						|
           !strcasecompare(imap->custom, "NOOP")))
 | 
						|
          return FALSE;
 | 
						|
        break;
 | 
						|
 | 
						|
      case IMAP_SELECT:
 | 
						|
        /* SELECT is special in that its untagged responses do not have a
 | 
						|
           common prefix so accept anything! */
 | 
						|
        break;
 | 
						|
 | 
						|
      case IMAP_FETCH:
 | 
						|
        if(!imap_matchresp(line, len, "FETCH"))
 | 
						|
          return FALSE;
 | 
						|
        break;
 | 
						|
 | 
						|
      case IMAP_SEARCH:
 | 
						|
        if(!imap_matchresp(line, len, "SEARCH"))
 | 
						|
          return FALSE;
 | 
						|
        break;
 | 
						|
 | 
						|
      /* Ignore other untagged responses */
 | 
						|
      default:
 | 
						|
        return FALSE;
 | 
						|
    }
 | 
						|
 | 
						|
    *resp = '*';
 | 
						|
    return TRUE;
 | 
						|
  }
 | 
						|
 | 
						|
  /* Do we have a continuation response? This should be a + symbol followed by
 | 
						|
     a space and optionally some text as per RFC-3501 for the AUTHENTICATE and
 | 
						|
     APPEND commands and as outlined in Section 4. Examples of RFC-4959 but
 | 
						|
     some e-mail servers ignore this and only send a single + instead. */
 | 
						|
  if(imap && !imap->custom && ((len == 3 && !memcmp("+", line, 1)) ||
 | 
						|
     (len >= 2 && !memcmp("+ ", line, 2)))) {
 | 
						|
    switch(imapc->state) {
 | 
						|
      /* States which are interested in continuation responses */
 | 
						|
      case IMAP_AUTHENTICATE:
 | 
						|
      case IMAP_APPEND:
 | 
						|
        *resp = '+';
 | 
						|
        break;
 | 
						|
 | 
						|
      default:
 | 
						|
        failf(conn->data, "Unexpected continuation response");
 | 
						|
        *resp = -1;
 | 
						|
        break;
 | 
						|
    }
 | 
						|
 | 
						|
    return TRUE;
 | 
						|
  }
 | 
						|
 | 
						|
  return FALSE; /* Nothing for us */
 | 
						|
}
 | 
						|
 | 
						|
/***********************************************************************
 | 
						|
 *
 | 
						|
 * imap_get_message()
 | 
						|
 *
 | 
						|
 * Gets the authentication message from the response buffer.
 | 
						|
 */
 | 
						|
static void imap_get_message(char *buffer, char **outptr)
 | 
						|
{
 | 
						|
  size_t len = 0;
 | 
						|
  char *message = NULL;
 | 
						|
 | 
						|
  /* Find the start of the message */
 | 
						|
  for(message = buffer + 2; *message == ' ' || *message == '\t'; message++)
 | 
						|
    ;
 | 
						|
 | 
						|
  /* Find the end of the message */
 | 
						|
  for(len = strlen(message); len--;)
 | 
						|
    if(message[len] != '\r' && message[len] != '\n' && message[len] != ' ' &&
 | 
						|
        message[len] != '\t')
 | 
						|
      break;
 | 
						|
 | 
						|
  /* Terminate the message */
 | 
						|
  if(++len) {
 | 
						|
    message[len] = '\0';
 | 
						|
  }
 | 
						|
 | 
						|
  *outptr = message;
 | 
						|
}
 | 
						|
 | 
						|
/***********************************************************************
 | 
						|
 *
 | 
						|
 * state()
 | 
						|
 *
 | 
						|
 * This is the ONLY way to change IMAP state!
 | 
						|
 */
 | 
						|
static void state(struct connectdata *conn, imapstate newstate)
 | 
						|
{
 | 
						|
  struct imap_conn *imapc = &conn->proto.imapc;
 | 
						|
#if defined(DEBUGBUILD) && !defined(CURL_DISABLE_VERBOSE_STRINGS)
 | 
						|
  /* for debug purposes */
 | 
						|
  static const char * const names[]={
 | 
						|
    "STOP",
 | 
						|
    "SERVERGREET",
 | 
						|
    "CAPABILITY",
 | 
						|
    "STARTTLS",
 | 
						|
    "UPGRADETLS",
 | 
						|
    "AUTHENTICATE",
 | 
						|
    "LOGIN",
 | 
						|
    "LIST",
 | 
						|
    "SELECT",
 | 
						|
    "FETCH",
 | 
						|
    "FETCH_FINAL",
 | 
						|
    "APPEND",
 | 
						|
    "APPEND_FINAL",
 | 
						|
    "SEARCH",
 | 
						|
    "LOGOUT",
 | 
						|
    /* LAST */
 | 
						|
  };
 | 
						|
 | 
						|
  if(imapc->state != newstate)
 | 
						|
    infof(conn->data, "IMAP %p state change from %s to %s\n",
 | 
						|
          (void *)imapc, names[imapc->state], names[newstate]);
 | 
						|
#endif
 | 
						|
 | 
						|
  imapc->state = newstate;
 | 
						|
}
 | 
						|
 | 
						|
/***********************************************************************
 | 
						|
 *
 | 
						|
 * imap_perform_capability()
 | 
						|
 *
 | 
						|
 * Sends the CAPABILITY command in order to obtain a list of server side
 | 
						|
 * supported capabilities.
 | 
						|
 */
 | 
						|
static CURLcode imap_perform_capability(struct connectdata *conn)
 | 
						|
{
 | 
						|
  CURLcode result = CURLE_OK;
 | 
						|
  struct imap_conn *imapc = &conn->proto.imapc;
 | 
						|
 | 
						|
  imapc->sasl.authmechs = SASL_AUTH_NONE; /* No known auth. mechanisms yet */
 | 
						|
  imapc->sasl.authused = SASL_AUTH_NONE;  /* Clear the auth. mechanism used */
 | 
						|
  imapc->tls_supported = FALSE;           /* Clear the TLS capability */
 | 
						|
 | 
						|
  /* Send the CAPABILITY command */
 | 
						|
  result = imap_sendf(conn, "CAPABILITY");
 | 
						|
 | 
						|
  if(!result)
 | 
						|
    state(conn, IMAP_CAPABILITY);
 | 
						|
 | 
						|
  return result;
 | 
						|
}
 | 
						|
 | 
						|
/***********************************************************************
 | 
						|
 *
 | 
						|
 * imap_perform_starttls()
 | 
						|
 *
 | 
						|
 * Sends the STARTTLS command to start the upgrade to TLS.
 | 
						|
 */
 | 
						|
static CURLcode imap_perform_starttls(struct connectdata *conn)
 | 
						|
{
 | 
						|
  CURLcode result = CURLE_OK;
 | 
						|
 | 
						|
  /* Send the STARTTLS command */
 | 
						|
  result = imap_sendf(conn, "STARTTLS");
 | 
						|
 | 
						|
  if(!result)
 | 
						|
    state(conn, IMAP_STARTTLS);
 | 
						|
 | 
						|
  return result;
 | 
						|
}
 | 
						|
 | 
						|
/***********************************************************************
 | 
						|
 *
 | 
						|
 * imap_perform_upgrade_tls()
 | 
						|
 *
 | 
						|
 * Performs the upgrade to TLS.
 | 
						|
 */
 | 
						|
static CURLcode imap_perform_upgrade_tls(struct connectdata *conn)
 | 
						|
{
 | 
						|
  CURLcode result = CURLE_OK;
 | 
						|
  struct imap_conn *imapc = &conn->proto.imapc;
 | 
						|
 | 
						|
  /* Start the SSL connection */
 | 
						|
  result = Curl_ssl_connect_nonblocking(conn, FIRSTSOCKET, &imapc->ssldone);
 | 
						|
 | 
						|
  if(!result) {
 | 
						|
    if(imapc->state != IMAP_UPGRADETLS)
 | 
						|
      state(conn, IMAP_UPGRADETLS);
 | 
						|
 | 
						|
    if(imapc->ssldone) {
 | 
						|
      imap_to_imaps(conn);
 | 
						|
      result = imap_perform_capability(conn);
 | 
						|
    }
 | 
						|
  }
 | 
						|
 | 
						|
  return result;
 | 
						|
}
 | 
						|
 | 
						|
/***********************************************************************
 | 
						|
 *
 | 
						|
 * imap_perform_login()
 | 
						|
 *
 | 
						|
 * Sends a clear text LOGIN command to authenticate with.
 | 
						|
 */
 | 
						|
static CURLcode imap_perform_login(struct connectdata *conn)
 | 
						|
{
 | 
						|
  CURLcode result = CURLE_OK;
 | 
						|
  char *user;
 | 
						|
  char *passwd;
 | 
						|
 | 
						|
  /* Check we have a username and password to authenticate with and end the
 | 
						|
     connect phase if we don't */
 | 
						|
  if(!conn->bits.user_passwd) {
 | 
						|
    state(conn, IMAP_STOP);
 | 
						|
 | 
						|
    return result;
 | 
						|
  }
 | 
						|
 | 
						|
  /* Make sure the username and password are in the correct atom format */
 | 
						|
  user = imap_atom(conn->user, false);
 | 
						|
  passwd = imap_atom(conn->passwd, false);
 | 
						|
 | 
						|
  /* Send the LOGIN command */
 | 
						|
  result = imap_sendf(conn, "LOGIN %s %s", user ? user : "",
 | 
						|
                      passwd ? passwd : "");
 | 
						|
 | 
						|
  free(user);
 | 
						|
  free(passwd);
 | 
						|
 | 
						|
  if(!result)
 | 
						|
    state(conn, IMAP_LOGIN);
 | 
						|
 | 
						|
  return result;
 | 
						|
}
 | 
						|
 | 
						|
/***********************************************************************
 | 
						|
 *
 | 
						|
 * imap_perform_authenticate()
 | 
						|
 *
 | 
						|
 * Sends an AUTHENTICATE command allowing the client to login with the given
 | 
						|
 * SASL authentication mechanism.
 | 
						|
 */
 | 
						|
static CURLcode imap_perform_authenticate(struct connectdata *conn,
 | 
						|
                                          const char *mech,
 | 
						|
                                          const char *initresp)
 | 
						|
{
 | 
						|
  CURLcode result = CURLE_OK;
 | 
						|
 | 
						|
  if(initresp) {
 | 
						|
    /* Send the AUTHENTICATE command with the initial response */
 | 
						|
    result = imap_sendf(conn, "AUTHENTICATE %s %s", mech, initresp);
 | 
						|
  }
 | 
						|
  else {
 | 
						|
    /* Send the AUTHENTICATE command */
 | 
						|
    result = imap_sendf(conn, "AUTHENTICATE %s", mech);
 | 
						|
  }
 | 
						|
 | 
						|
  return result;
 | 
						|
}
 | 
						|
 | 
						|
/***********************************************************************
 | 
						|
 *
 | 
						|
 * imap_continue_authenticate()
 | 
						|
 *
 | 
						|
 * Sends SASL continuation data or cancellation.
 | 
						|
 */
 | 
						|
static CURLcode imap_continue_authenticate(struct connectdata *conn,
 | 
						|
                                           const char *resp)
 | 
						|
{
 | 
						|
  struct imap_conn *imapc = &conn->proto.imapc;
 | 
						|
 | 
						|
  return Curl_pp_sendf(&imapc->pp, "%s", resp);
 | 
						|
}
 | 
						|
 | 
						|
/***********************************************************************
 | 
						|
 *
 | 
						|
 * imap_perform_authentication()
 | 
						|
 *
 | 
						|
 * Initiates the authentication sequence, with the appropriate SASL
 | 
						|
 * authentication mechanism, falling back to clear text should a common
 | 
						|
 * mechanism not be available between the client and server.
 | 
						|
 */
 | 
						|
static CURLcode imap_perform_authentication(struct connectdata *conn)
 | 
						|
{
 | 
						|
  CURLcode result = CURLE_OK;
 | 
						|
  struct imap_conn *imapc = &conn->proto.imapc;
 | 
						|
  saslprogress progress;
 | 
						|
 | 
						|
  /* Check if already authenticated OR if there is enough data to authenticate
 | 
						|
     with and end the connect phase if we don't */
 | 
						|
  if(imapc->preauth ||
 | 
						|
     !Curl_sasl_can_authenticate(&imapc->sasl, conn)) {
 | 
						|
    state(conn, IMAP_STOP);
 | 
						|
    return result;
 | 
						|
  }
 | 
						|
 | 
						|
  /* Calculate the SASL login details */
 | 
						|
  result = Curl_sasl_start(&imapc->sasl, conn, imapc->ir_supported, &progress);
 | 
						|
 | 
						|
  if(!result) {
 | 
						|
    if(progress == SASL_INPROGRESS)
 | 
						|
      state(conn, IMAP_AUTHENTICATE);
 | 
						|
    else if(!imapc->login_disabled && (imapc->preftype & IMAP_TYPE_CLEARTEXT))
 | 
						|
      /* Perform clear text authentication */
 | 
						|
      result = imap_perform_login(conn);
 | 
						|
    else {
 | 
						|
      /* Other mechanisms not supported */
 | 
						|
      infof(conn->data, "No known authentication mechanisms supported!\n");
 | 
						|
      result = CURLE_LOGIN_DENIED;
 | 
						|
    }
 | 
						|
  }
 | 
						|
 | 
						|
  return result;
 | 
						|
}
 | 
						|
 | 
						|
/***********************************************************************
 | 
						|
 *
 | 
						|
 * imap_perform_list()
 | 
						|
 *
 | 
						|
 * Sends a LIST command or an alternative custom request.
 | 
						|
 */
 | 
						|
static CURLcode imap_perform_list(struct connectdata *conn)
 | 
						|
{
 | 
						|
  CURLcode result = CURLE_OK;
 | 
						|
  struct Curl_easy *data = conn->data;
 | 
						|
  struct IMAP *imap = data->req.protop;
 | 
						|
  char *mailbox;
 | 
						|
 | 
						|
  if(imap->custom)
 | 
						|
    /* Send the custom request */
 | 
						|
    result = imap_sendf(conn, "%s%s", imap->custom,
 | 
						|
                        imap->custom_params ? imap->custom_params : "");
 | 
						|
  else {
 | 
						|
    /* Make sure the mailbox is in the correct atom format if necessary */
 | 
						|
    mailbox = imap->mailbox ? imap_atom(imap->mailbox, true) : strdup("");
 | 
						|
    if(!mailbox)
 | 
						|
      return CURLE_OUT_OF_MEMORY;
 | 
						|
 | 
						|
    /* Send the LIST command */
 | 
						|
    result = imap_sendf(conn, "LIST \"%s\" *", mailbox);
 | 
						|
 | 
						|
    free(mailbox);
 | 
						|
  }
 | 
						|
 | 
						|
  if(!result)
 | 
						|
    state(conn, IMAP_LIST);
 | 
						|
 | 
						|
  return result;
 | 
						|
}
 | 
						|
 | 
						|
/***********************************************************************
 | 
						|
 *
 | 
						|
 * imap_perform_select()
 | 
						|
 *
 | 
						|
 * Sends a SELECT command to ask the server to change the selected mailbox.
 | 
						|
 */
 | 
						|
static CURLcode imap_perform_select(struct connectdata *conn)
 | 
						|
{
 | 
						|
  CURLcode result = CURLE_OK;
 | 
						|
  struct Curl_easy *data = conn->data;
 | 
						|
  struct IMAP *imap = data->req.protop;
 | 
						|
  struct imap_conn *imapc = &conn->proto.imapc;
 | 
						|
  char *mailbox;
 | 
						|
 | 
						|
  /* Invalidate old information as we are switching mailboxes */
 | 
						|
  Curl_safefree(imapc->mailbox);
 | 
						|
  Curl_safefree(imapc->mailbox_uidvalidity);
 | 
						|
 | 
						|
  /* Check we have a mailbox */
 | 
						|
  if(!imap->mailbox) {
 | 
						|
    failf(conn->data, "Cannot SELECT without a mailbox.");
 | 
						|
    return CURLE_URL_MALFORMAT;
 | 
						|
  }
 | 
						|
 | 
						|
  /* Make sure the mailbox is in the correct atom format */
 | 
						|
  mailbox = imap_atom(imap->mailbox, false);
 | 
						|
  if(!mailbox)
 | 
						|
    return CURLE_OUT_OF_MEMORY;
 | 
						|
 | 
						|
  /* Send the SELECT command */
 | 
						|
  result = imap_sendf(conn, "SELECT %s", mailbox);
 | 
						|
 | 
						|
  free(mailbox);
 | 
						|
 | 
						|
  if(!result)
 | 
						|
    state(conn, IMAP_SELECT);
 | 
						|
 | 
						|
  return result;
 | 
						|
}
 | 
						|
 | 
						|
/***********************************************************************
 | 
						|
 *
 | 
						|
 * imap_perform_fetch()
 | 
						|
 *
 | 
						|
 * Sends a FETCH command to initiate the download of a message.
 | 
						|
 */
 | 
						|
static CURLcode imap_perform_fetch(struct connectdata *conn)
 | 
						|
{
 | 
						|
  CURLcode result = CURLE_OK;
 | 
						|
  struct IMAP *imap = conn->data->req.protop;
 | 
						|
 | 
						|
  /* Check we have a UID */
 | 
						|
  if(!imap->uid) {
 | 
						|
    failf(conn->data, "Cannot FETCH without a UID.");
 | 
						|
    return CURLE_URL_MALFORMAT;
 | 
						|
  }
 | 
						|
 | 
						|
  /* Send the FETCH command */
 | 
						|
  if(imap->partial)
 | 
						|
    result = imap_sendf(conn, "FETCH %s BODY[%s]<%s>",
 | 
						|
                        imap->uid,
 | 
						|
                        imap->section ? imap->section : "",
 | 
						|
                        imap->partial);
 | 
						|
  else
 | 
						|
    result = imap_sendf(conn, "FETCH %s BODY[%s]",
 | 
						|
                        imap->uid,
 | 
						|
                        imap->section ? imap->section : "");
 | 
						|
 | 
						|
  if(!result)
 | 
						|
    state(conn, IMAP_FETCH);
 | 
						|
 | 
						|
  return result;
 | 
						|
}
 | 
						|
 | 
						|
/***********************************************************************
 | 
						|
 *
 | 
						|
 * imap_perform_append()
 | 
						|
 *
 | 
						|
 * Sends an APPEND command to initiate the upload of a message.
 | 
						|
 */
 | 
						|
static CURLcode imap_perform_append(struct connectdata *conn)
 | 
						|
{
 | 
						|
  CURLcode result = CURLE_OK;
 | 
						|
  struct Curl_easy *data = conn->data;
 | 
						|
  struct IMAP *imap = data->req.protop;
 | 
						|
  char *mailbox;
 | 
						|
 | 
						|
  /* Check we have a mailbox */
 | 
						|
  if(!imap->mailbox) {
 | 
						|
    failf(data, "Cannot APPEND without a mailbox.");
 | 
						|
    return CURLE_URL_MALFORMAT;
 | 
						|
  }
 | 
						|
 | 
						|
  /* Prepare the mime data if some. */
 | 
						|
  if(data->set.mimepost.kind != MIMEKIND_NONE) {
 | 
						|
    /* Use the whole structure as data. */
 | 
						|
    data->set.mimepost.flags &= ~MIME_BODY_ONLY;
 | 
						|
 | 
						|
    /* Add external headers and mime version. */
 | 
						|
    curl_mime_headers(&data->set.mimepost, data->set.headers, 0);
 | 
						|
    result = Curl_mime_prepare_headers(&data->set.mimepost, NULL,
 | 
						|
                                       NULL, MIMESTRATEGY_MAIL);
 | 
						|
 | 
						|
    if(!result)
 | 
						|
      if(!Curl_checkheaders(conn, "Mime-Version"))
 | 
						|
        result = Curl_mime_add_header(&data->set.mimepost.curlheaders,
 | 
						|
                                      "Mime-Version: 1.0");
 | 
						|
 | 
						|
    /* Make sure we will read the entire mime structure. */
 | 
						|
    if(!result)
 | 
						|
      result = Curl_mime_rewind(&data->set.mimepost);
 | 
						|
 | 
						|
    if(result)
 | 
						|
      return result;
 | 
						|
 | 
						|
    data->state.infilesize = Curl_mime_size(&data->set.mimepost);
 | 
						|
 | 
						|
    /* Read from mime structure. */
 | 
						|
    data->state.fread_func = (curl_read_callback) Curl_mime_read;
 | 
						|
    data->state.in = (void *) &data->set.mimepost;
 | 
						|
  }
 | 
						|
 | 
						|
  /* Check we know the size of the upload */
 | 
						|
  if(data->state.infilesize < 0) {
 | 
						|
    failf(data, "Cannot APPEND with unknown input file size\n");
 | 
						|
    return CURLE_UPLOAD_FAILED;
 | 
						|
  }
 | 
						|
 | 
						|
  /* Make sure the mailbox is in the correct atom format */
 | 
						|
  mailbox = imap_atom(imap->mailbox, false);
 | 
						|
  if(!mailbox)
 | 
						|
    return CURLE_OUT_OF_MEMORY;
 | 
						|
 | 
						|
  /* Send the APPEND command */
 | 
						|
  result = imap_sendf(conn, "APPEND %s (\\Seen) {%" CURL_FORMAT_CURL_OFF_T "}",
 | 
						|
                      mailbox, data->state.infilesize);
 | 
						|
 | 
						|
  free(mailbox);
 | 
						|
 | 
						|
  if(!result)
 | 
						|
    state(conn, IMAP_APPEND);
 | 
						|
 | 
						|
  return result;
 | 
						|
}
 | 
						|
 | 
						|
/***********************************************************************
 | 
						|
 *
 | 
						|
 * imap_perform_search()
 | 
						|
 *
 | 
						|
 * Sends a SEARCH command.
 | 
						|
 */
 | 
						|
static CURLcode imap_perform_search(struct connectdata *conn)
 | 
						|
{
 | 
						|
  CURLcode result = CURLE_OK;
 | 
						|
  struct IMAP *imap = conn->data->req.protop;
 | 
						|
 | 
						|
  /* Check we have a query string */
 | 
						|
  if(!imap->query) {
 | 
						|
    failf(conn->data, "Cannot SEARCH without a query string.");
 | 
						|
    return CURLE_URL_MALFORMAT;
 | 
						|
  }
 | 
						|
 | 
						|
  /* Send the SEARCH command */
 | 
						|
  result = imap_sendf(conn, "SEARCH %s", imap->query);
 | 
						|
 | 
						|
  if(!result)
 | 
						|
    state(conn, IMAP_SEARCH);
 | 
						|
 | 
						|
  return result;
 | 
						|
}
 | 
						|
 | 
						|
/***********************************************************************
 | 
						|
 *
 | 
						|
 * imap_perform_logout()
 | 
						|
 *
 | 
						|
 * Performs the logout action prior to sclose() being called.
 | 
						|
 */
 | 
						|
static CURLcode imap_perform_logout(struct connectdata *conn)
 | 
						|
{
 | 
						|
  CURLcode result = CURLE_OK;
 | 
						|
 | 
						|
  /* Send the LOGOUT command */
 | 
						|
  result = imap_sendf(conn, "LOGOUT");
 | 
						|
 | 
						|
  if(!result)
 | 
						|
    state(conn, IMAP_LOGOUT);
 | 
						|
 | 
						|
  return result;
 | 
						|
}
 | 
						|
 | 
						|
/* For the initial server greeting */
 | 
						|
static CURLcode imap_state_servergreet_resp(struct connectdata *conn,
 | 
						|
                                            int imapcode,
 | 
						|
                                            imapstate instate)
 | 
						|
{
 | 
						|
  struct Curl_easy *data = conn->data;
 | 
						|
  (void)instate; /* no use for this yet */
 | 
						|
 | 
						|
  if(imapcode == IMAP_RESP_PREAUTH) {
 | 
						|
    /* PREAUTH */
 | 
						|
    struct imap_conn *imapc = &conn->proto.imapc;
 | 
						|
    imapc->preauth = TRUE;
 | 
						|
    infof(data, "PREAUTH connection, already authenticated!\n");
 | 
						|
  }
 | 
						|
  else if(imapcode != IMAP_RESP_OK) {
 | 
						|
    failf(data, "Got unexpected imap-server response");
 | 
						|
    return CURLE_WEIRD_SERVER_REPLY;
 | 
						|
  }
 | 
						|
 | 
						|
  return imap_perform_capability(conn);
 | 
						|
}
 | 
						|
 | 
						|
/* For CAPABILITY responses */
 | 
						|
static CURLcode imap_state_capability_resp(struct connectdata *conn,
 | 
						|
                                           int imapcode,
 | 
						|
                                           imapstate instate)
 | 
						|
{
 | 
						|
  CURLcode result = CURLE_OK;
 | 
						|
  struct Curl_easy *data = conn->data;
 | 
						|
  struct imap_conn *imapc = &conn->proto.imapc;
 | 
						|
  const char *line = data->state.buffer;
 | 
						|
  size_t wordlen;
 | 
						|
 | 
						|
  (void)instate; /* no use for this yet */
 | 
						|
 | 
						|
  /* Do we have a untagged response? */
 | 
						|
  if(imapcode == '*') {
 | 
						|
    line += 2;
 | 
						|
 | 
						|
    /* Loop through the data line */
 | 
						|
    for(;;) {
 | 
						|
      while(*line &&
 | 
						|
            (*line == ' ' || *line == '\t' ||
 | 
						|
              *line == '\r' || *line == '\n')) {
 | 
						|
 | 
						|
        line++;
 | 
						|
      }
 | 
						|
 | 
						|
      if(!*line)
 | 
						|
        break;
 | 
						|
 | 
						|
      /* Extract the word */
 | 
						|
      for(wordlen = 0; line[wordlen] && line[wordlen] != ' ' &&
 | 
						|
            line[wordlen] != '\t' && line[wordlen] != '\r' &&
 | 
						|
            line[wordlen] != '\n';)
 | 
						|
        wordlen++;
 | 
						|
 | 
						|
      /* Does the server support the STARTTLS capability? */
 | 
						|
      if(wordlen == 8 && !memcmp(line, "STARTTLS", 8))
 | 
						|
        imapc->tls_supported = TRUE;
 | 
						|
 | 
						|
      /* Has the server explicitly disabled clear text authentication? */
 | 
						|
      else if(wordlen == 13 && !memcmp(line, "LOGINDISABLED", 13))
 | 
						|
        imapc->login_disabled = TRUE;
 | 
						|
 | 
						|
      /* Does the server support the SASL-IR capability? */
 | 
						|
      else if(wordlen == 7 && !memcmp(line, "SASL-IR", 7))
 | 
						|
        imapc->ir_supported = TRUE;
 | 
						|
 | 
						|
      /* Do we have a SASL based authentication mechanism? */
 | 
						|
      else if(wordlen > 5 && !memcmp(line, "AUTH=", 5)) {
 | 
						|
        size_t llen;
 | 
						|
        unsigned int mechbit;
 | 
						|
 | 
						|
        line += 5;
 | 
						|
        wordlen -= 5;
 | 
						|
 | 
						|
        /* Test the word for a matching authentication mechanism */
 | 
						|
        mechbit = Curl_sasl_decode_mech(line, wordlen, &llen);
 | 
						|
        if(mechbit && llen == wordlen)
 | 
						|
          imapc->sasl.authmechs |= mechbit;
 | 
						|
      }
 | 
						|
 | 
						|
      line += wordlen;
 | 
						|
    }
 | 
						|
  }
 | 
						|
  else if(imapcode == IMAP_RESP_OK) {
 | 
						|
    if(data->set.use_ssl && !conn->ssl[FIRSTSOCKET].use) {
 | 
						|
      /* We don't have a SSL/TLS connection yet, but SSL is requested */
 | 
						|
      if(imapc->tls_supported)
 | 
						|
        /* Switch to TLS connection now */
 | 
						|
        result = imap_perform_starttls(conn);
 | 
						|
      else if(data->set.use_ssl == CURLUSESSL_TRY)
 | 
						|
        /* Fallback and carry on with authentication */
 | 
						|
        result = imap_perform_authentication(conn);
 | 
						|
      else {
 | 
						|
        failf(data, "STARTTLS not supported.");
 | 
						|
        result = CURLE_USE_SSL_FAILED;
 | 
						|
      }
 | 
						|
    }
 | 
						|
    else
 | 
						|
      result = imap_perform_authentication(conn);
 | 
						|
  }
 | 
						|
  else
 | 
						|
    result = imap_perform_authentication(conn);
 | 
						|
 | 
						|
  return result;
 | 
						|
}
 | 
						|
 | 
						|
/* For STARTTLS responses */
 | 
						|
static CURLcode imap_state_starttls_resp(struct connectdata *conn,
 | 
						|
                                         int imapcode,
 | 
						|
                                         imapstate instate)
 | 
						|
{
 | 
						|
  CURLcode result = CURLE_OK;
 | 
						|
  struct Curl_easy *data = conn->data;
 | 
						|
 | 
						|
  (void)instate; /* no use for this yet */
 | 
						|
 | 
						|
  if(imapcode != IMAP_RESP_OK) {
 | 
						|
    if(data->set.use_ssl != CURLUSESSL_TRY) {
 | 
						|
      failf(data, "STARTTLS denied");
 | 
						|
      result = CURLE_USE_SSL_FAILED;
 | 
						|
    }
 | 
						|
    else
 | 
						|
      result = imap_perform_authentication(conn);
 | 
						|
  }
 | 
						|
  else
 | 
						|
    result = imap_perform_upgrade_tls(conn);
 | 
						|
 | 
						|
  return result;
 | 
						|
}
 | 
						|
 | 
						|
/* For SASL authentication responses */
 | 
						|
static CURLcode imap_state_auth_resp(struct connectdata *conn,
 | 
						|
                                     int imapcode,
 | 
						|
                                     imapstate instate)
 | 
						|
{
 | 
						|
  CURLcode result = CURLE_OK;
 | 
						|
  struct Curl_easy *data = conn->data;
 | 
						|
  struct imap_conn *imapc = &conn->proto.imapc;
 | 
						|
  saslprogress progress;
 | 
						|
 | 
						|
  (void)instate; /* no use for this yet */
 | 
						|
 | 
						|
  result = Curl_sasl_continue(&imapc->sasl, conn, imapcode, &progress);
 | 
						|
  if(!result)
 | 
						|
    switch(progress) {
 | 
						|
    case SASL_DONE:
 | 
						|
      state(conn, IMAP_STOP);  /* Authenticated */
 | 
						|
      break;
 | 
						|
    case SASL_IDLE:            /* No mechanism left after cancellation */
 | 
						|
      if((!imapc->login_disabled) && (imapc->preftype & IMAP_TYPE_CLEARTEXT))
 | 
						|
        /* Perform clear text authentication */
 | 
						|
        result = imap_perform_login(conn);
 | 
						|
      else {
 | 
						|
        failf(data, "Authentication cancelled");
 | 
						|
        result = CURLE_LOGIN_DENIED;
 | 
						|
      }
 | 
						|
      break;
 | 
						|
    default:
 | 
						|
      break;
 | 
						|
    }
 | 
						|
 | 
						|
  return result;
 | 
						|
}
 | 
						|
 | 
						|
/* For LOGIN responses */
 | 
						|
static CURLcode imap_state_login_resp(struct connectdata *conn,
 | 
						|
                                      int imapcode,
 | 
						|
                                      imapstate instate)
 | 
						|
{
 | 
						|
  CURLcode result = CURLE_OK;
 | 
						|
  struct Curl_easy *data = conn->data;
 | 
						|
 | 
						|
  (void)instate; /* no use for this yet */
 | 
						|
 | 
						|
  if(imapcode != IMAP_RESP_OK) {
 | 
						|
    failf(data, "Access denied. %c", imapcode);
 | 
						|
    result = CURLE_LOGIN_DENIED;
 | 
						|
  }
 | 
						|
  else
 | 
						|
    /* End of connect phase */
 | 
						|
    state(conn, IMAP_STOP);
 | 
						|
 | 
						|
  return result;
 | 
						|
}
 | 
						|
 | 
						|
/* For LIST and SEARCH responses */
 | 
						|
static CURLcode imap_state_listsearch_resp(struct connectdata *conn,
 | 
						|
                                           int imapcode,
 | 
						|
                                           imapstate instate)
 | 
						|
{
 | 
						|
  CURLcode result = CURLE_OK;
 | 
						|
  char *line = conn->data->state.buffer;
 | 
						|
  size_t len = strlen(line);
 | 
						|
 | 
						|
  (void)instate; /* No use for this yet */
 | 
						|
 | 
						|
  if(imapcode == '*') {
 | 
						|
    /* Temporarily add the LF character back and send as body to the client */
 | 
						|
    line[len] = '\n';
 | 
						|
    result = Curl_client_write(conn, CLIENTWRITE_BODY, line, len + 1);
 | 
						|
    line[len] = '\0';
 | 
						|
  }
 | 
						|
  else if(imapcode != IMAP_RESP_OK)
 | 
						|
    result = CURLE_QUOTE_ERROR; /* TODO: Fix error code */
 | 
						|
  else
 | 
						|
    /* End of DO phase */
 | 
						|
    state(conn, IMAP_STOP);
 | 
						|
 | 
						|
  return result;
 | 
						|
}
 | 
						|
 | 
						|
/* For SELECT responses */
 | 
						|
static CURLcode imap_state_select_resp(struct connectdata *conn, int imapcode,
 | 
						|
                                       imapstate instate)
 | 
						|
{
 | 
						|
  CURLcode result = CURLE_OK;
 | 
						|
  struct Curl_easy *data = conn->data;
 | 
						|
  struct IMAP *imap = conn->data->req.protop;
 | 
						|
  struct imap_conn *imapc = &conn->proto.imapc;
 | 
						|
  const char *line = data->state.buffer;
 | 
						|
  char tmp[20];
 | 
						|
 | 
						|
  (void)instate; /* no use for this yet */
 | 
						|
 | 
						|
  if(imapcode == '*') {
 | 
						|
    /* See if this is an UIDVALIDITY response */
 | 
						|
    if(sscanf(line + 2, "OK [UIDVALIDITY %19[0123456789]]", tmp) == 1) {
 | 
						|
      Curl_safefree(imapc->mailbox_uidvalidity);
 | 
						|
      imapc->mailbox_uidvalidity = strdup(tmp);
 | 
						|
    }
 | 
						|
  }
 | 
						|
  else if(imapcode == IMAP_RESP_OK) {
 | 
						|
    /* Check if the UIDVALIDITY has been specified and matches */
 | 
						|
    if(imap->uidvalidity && imapc->mailbox_uidvalidity &&
 | 
						|
       !strcasecompare(imap->uidvalidity, imapc->mailbox_uidvalidity)) {
 | 
						|
      failf(conn->data, "Mailbox UIDVALIDITY has changed");
 | 
						|
      result = CURLE_REMOTE_FILE_NOT_FOUND;
 | 
						|
    }
 | 
						|
    else {
 | 
						|
      /* Note the currently opened mailbox on this connection */
 | 
						|
      imapc->mailbox = strdup(imap->mailbox);
 | 
						|
 | 
						|
      if(imap->custom)
 | 
						|
        result = imap_perform_list(conn);
 | 
						|
      else if(imap->query)
 | 
						|
        result = imap_perform_search(conn);
 | 
						|
      else
 | 
						|
        result = imap_perform_fetch(conn);
 | 
						|
    }
 | 
						|
  }
 | 
						|
  else {
 | 
						|
    failf(data, "Select failed");
 | 
						|
    result = CURLE_LOGIN_DENIED;
 | 
						|
  }
 | 
						|
 | 
						|
  return result;
 | 
						|
}
 | 
						|
 | 
						|
/* For the (first line of the) FETCH responses */
 | 
						|
static CURLcode imap_state_fetch_resp(struct connectdata *conn, int imapcode,
 | 
						|
                                      imapstate instate)
 | 
						|
{
 | 
						|
  CURLcode result = CURLE_OK;
 | 
						|
  struct Curl_easy *data = conn->data;
 | 
						|
  struct imap_conn *imapc = &conn->proto.imapc;
 | 
						|
  struct pingpong *pp = &imapc->pp;
 | 
						|
  const char *ptr = data->state.buffer;
 | 
						|
  bool parsed = FALSE;
 | 
						|
  curl_off_t size = 0;
 | 
						|
 | 
						|
  (void)instate; /* no use for this yet */
 | 
						|
 | 
						|
  if(imapcode != '*') {
 | 
						|
    Curl_pgrsSetDownloadSize(data, -1);
 | 
						|
    state(conn, IMAP_STOP);
 | 
						|
    return CURLE_REMOTE_FILE_NOT_FOUND; /* TODO: Fix error code */
 | 
						|
  }
 | 
						|
 | 
						|
  /* Something like this is received "* 1 FETCH (BODY[TEXT] {2021}\r" so parse
 | 
						|
     the continuation data contained within the curly brackets */
 | 
						|
  while(*ptr && (*ptr != '{'))
 | 
						|
    ptr++;
 | 
						|
 | 
						|
  if(*ptr == '{') {
 | 
						|
    char *endptr;
 | 
						|
    if(!curlx_strtoofft(ptr + 1, &endptr, 10, &size)) {
 | 
						|
      if(endptr - ptr > 1 && endptr[0] == '}' &&
 | 
						|
         endptr[1] == '\r' && endptr[2] == '\0')
 | 
						|
        parsed = TRUE;
 | 
						|
    }
 | 
						|
  }
 | 
						|
 | 
						|
  if(parsed) {
 | 
						|
    infof(data, "Found %" CURL_FORMAT_CURL_OFF_TU " bytes to download\n",
 | 
						|
          size);
 | 
						|
    Curl_pgrsSetDownloadSize(data, size);
 | 
						|
 | 
						|
    if(pp->cache) {
 | 
						|
      /* At this point there is a bunch of data in the header "cache" that is
 | 
						|
         actually body content, send it as body and then skip it. Do note
 | 
						|
         that there may even be additional "headers" after the body. */
 | 
						|
      size_t chunk = pp->cache_size;
 | 
						|
 | 
						|
      if(chunk > (size_t)size)
 | 
						|
        /* The conversion from curl_off_t to size_t is always fine here */
 | 
						|
        chunk = (size_t)size;
 | 
						|
 | 
						|
      if(!chunk) {
 | 
						|
        /* no size, we're done with the data */
 | 
						|
        state(conn, IMAP_STOP);
 | 
						|
        return CURLE_OK;
 | 
						|
      }
 | 
						|
      result = Curl_client_write(conn, CLIENTWRITE_BODY, pp->cache, chunk);
 | 
						|
      if(result)
 | 
						|
        return result;
 | 
						|
 | 
						|
      data->req.bytecount += chunk;
 | 
						|
 | 
						|
      infof(data, "Written %" CURL_FORMAT_CURL_OFF_TU
 | 
						|
            " bytes, %" CURL_FORMAT_CURL_OFF_TU
 | 
						|
            " bytes are left for transfer\n", (curl_off_t)chunk,
 | 
						|
            size - chunk);
 | 
						|
 | 
						|
      /* Have we used the entire cache or just part of it?*/
 | 
						|
      if(pp->cache_size > chunk) {
 | 
						|
        /* Only part of it so shrink the cache to fit the trailing data */
 | 
						|
        memmove(pp->cache, pp->cache + chunk, pp->cache_size - chunk);
 | 
						|
        pp->cache_size -= chunk;
 | 
						|
      }
 | 
						|
      else {
 | 
						|
        /* Free the cache */
 | 
						|
        Curl_safefree(pp->cache);
 | 
						|
 | 
						|
        /* Reset the cache size */
 | 
						|
        pp->cache_size = 0;
 | 
						|
      }
 | 
						|
    }
 | 
						|
 | 
						|
    if(data->req.bytecount == size)
 | 
						|
      /* The entire data is already transferred! */
 | 
						|
      Curl_setup_transfer(conn, -1, -1, FALSE, NULL, -1, NULL);
 | 
						|
    else {
 | 
						|
      /* IMAP download */
 | 
						|
      data->req.maxdownload = size;
 | 
						|
      Curl_setup_transfer(conn, FIRSTSOCKET, size, FALSE, NULL, -1, NULL);
 | 
						|
    }
 | 
						|
  }
 | 
						|
  else {
 | 
						|
    /* We don't know how to parse this line */
 | 
						|
    failf(pp->conn->data, "Failed to parse FETCH response.");
 | 
						|
    result = CURLE_WEIRD_SERVER_REPLY;
 | 
						|
  }
 | 
						|
 | 
						|
  /* End of DO phase */
 | 
						|
  state(conn, IMAP_STOP);
 | 
						|
 | 
						|
  return result;
 | 
						|
}
 | 
						|
 | 
						|
/* For final FETCH responses performed after the download */
 | 
						|
static CURLcode imap_state_fetch_final_resp(struct connectdata *conn,
 | 
						|
                                            int imapcode,
 | 
						|
                                            imapstate instate)
 | 
						|
{
 | 
						|
  CURLcode result = CURLE_OK;
 | 
						|
 | 
						|
  (void)instate; /* No use for this yet */
 | 
						|
 | 
						|
  if(imapcode != IMAP_RESP_OK)
 | 
						|
    result = CURLE_WEIRD_SERVER_REPLY;
 | 
						|
  else
 | 
						|
    /* End of DONE phase */
 | 
						|
    state(conn, IMAP_STOP);
 | 
						|
 | 
						|
  return result;
 | 
						|
}
 | 
						|
 | 
						|
/* For APPEND responses */
 | 
						|
static CURLcode imap_state_append_resp(struct connectdata *conn, int imapcode,
 | 
						|
                                       imapstate instate)
 | 
						|
{
 | 
						|
  CURLcode result = CURLE_OK;
 | 
						|
  struct Curl_easy *data = conn->data;
 | 
						|
 | 
						|
  (void)instate; /* No use for this yet */
 | 
						|
 | 
						|
  if(imapcode != '+') {
 | 
						|
    result = CURLE_UPLOAD_FAILED;
 | 
						|
  }
 | 
						|
  else {
 | 
						|
    /* Set the progress upload size */
 | 
						|
    Curl_pgrsSetUploadSize(data, data->state.infilesize);
 | 
						|
 | 
						|
    /* IMAP upload */
 | 
						|
    Curl_setup_transfer(conn, -1, -1, FALSE, NULL, FIRSTSOCKET, NULL);
 | 
						|
 | 
						|
    /* End of DO phase */
 | 
						|
    state(conn, IMAP_STOP);
 | 
						|
  }
 | 
						|
 | 
						|
  return result;
 | 
						|
}
 | 
						|
 | 
						|
/* For final APPEND responses performed after the upload */
 | 
						|
static CURLcode imap_state_append_final_resp(struct connectdata *conn,
 | 
						|
                                             int imapcode,
 | 
						|
                                             imapstate instate)
 | 
						|
{
 | 
						|
  CURLcode result = CURLE_OK;
 | 
						|
 | 
						|
  (void)instate; /* No use for this yet */
 | 
						|
 | 
						|
  if(imapcode != IMAP_RESP_OK)
 | 
						|
    result = CURLE_UPLOAD_FAILED;
 | 
						|
  else
 | 
						|
    /* End of DONE phase */
 | 
						|
    state(conn, IMAP_STOP);
 | 
						|
 | 
						|
  return result;
 | 
						|
}
 | 
						|
 | 
						|
static CURLcode imap_statemach_act(struct connectdata *conn)
 | 
						|
{
 | 
						|
  CURLcode result = CURLE_OK;
 | 
						|
  curl_socket_t sock = conn->sock[FIRSTSOCKET];
 | 
						|
  int imapcode;
 | 
						|
  struct imap_conn *imapc = &conn->proto.imapc;
 | 
						|
  struct pingpong *pp = &imapc->pp;
 | 
						|
  size_t nread = 0;
 | 
						|
 | 
						|
  /* Busy upgrading the connection; right now all I/O is SSL/TLS, not IMAP */
 | 
						|
  if(imapc->state == IMAP_UPGRADETLS)
 | 
						|
    return imap_perform_upgrade_tls(conn);
 | 
						|
 | 
						|
  /* Flush any data that needs to be sent */
 | 
						|
  if(pp->sendleft)
 | 
						|
    return Curl_pp_flushsend(pp);
 | 
						|
 | 
						|
  do {
 | 
						|
    /* Read the response from the server */
 | 
						|
    result = Curl_pp_readresp(sock, pp, &imapcode, &nread);
 | 
						|
    if(result)
 | 
						|
      return result;
 | 
						|
 | 
						|
    /* Was there an error parsing the response line? */
 | 
						|
    if(imapcode == -1)
 | 
						|
      return CURLE_WEIRD_SERVER_REPLY;
 | 
						|
 | 
						|
    if(!imapcode)
 | 
						|
      break;
 | 
						|
 | 
						|
    /* We have now received a full IMAP server response */
 | 
						|
    switch(imapc->state) {
 | 
						|
    case IMAP_SERVERGREET:
 | 
						|
      result = imap_state_servergreet_resp(conn, imapcode, imapc->state);
 | 
						|
      break;
 | 
						|
 | 
						|
    case IMAP_CAPABILITY:
 | 
						|
      result = imap_state_capability_resp(conn, imapcode, imapc->state);
 | 
						|
      break;
 | 
						|
 | 
						|
    case IMAP_STARTTLS:
 | 
						|
      result = imap_state_starttls_resp(conn, imapcode, imapc->state);
 | 
						|
      break;
 | 
						|
 | 
						|
    case IMAP_AUTHENTICATE:
 | 
						|
      result = imap_state_auth_resp(conn, imapcode, imapc->state);
 | 
						|
      break;
 | 
						|
 | 
						|
    case IMAP_LOGIN:
 | 
						|
      result = imap_state_login_resp(conn, imapcode, imapc->state);
 | 
						|
      break;
 | 
						|
 | 
						|
    case IMAP_LIST:
 | 
						|
      result = imap_state_listsearch_resp(conn, imapcode, imapc->state);
 | 
						|
      break;
 | 
						|
 | 
						|
    case IMAP_SELECT:
 | 
						|
      result = imap_state_select_resp(conn, imapcode, imapc->state);
 | 
						|
      break;
 | 
						|
 | 
						|
    case IMAP_FETCH:
 | 
						|
      result = imap_state_fetch_resp(conn, imapcode, imapc->state);
 | 
						|
      break;
 | 
						|
 | 
						|
    case IMAP_FETCH_FINAL:
 | 
						|
      result = imap_state_fetch_final_resp(conn, imapcode, imapc->state);
 | 
						|
      break;
 | 
						|
 | 
						|
    case IMAP_APPEND:
 | 
						|
      result = imap_state_append_resp(conn, imapcode, imapc->state);
 | 
						|
      break;
 | 
						|
 | 
						|
    case IMAP_APPEND_FINAL:
 | 
						|
      result = imap_state_append_final_resp(conn, imapcode, imapc->state);
 | 
						|
      break;
 | 
						|
 | 
						|
    case IMAP_SEARCH:
 | 
						|
      result = imap_state_listsearch_resp(conn, imapcode, imapc->state);
 | 
						|
      break;
 | 
						|
 | 
						|
    case IMAP_LOGOUT:
 | 
						|
      /* fallthrough, just stop! */
 | 
						|
    default:
 | 
						|
      /* internal error */
 | 
						|
      state(conn, IMAP_STOP);
 | 
						|
      break;
 | 
						|
    }
 | 
						|
  } while(!result && imapc->state != IMAP_STOP && Curl_pp_moredata(pp));
 | 
						|
 | 
						|
  return result;
 | 
						|
}
 | 
						|
 | 
						|
/* Called repeatedly until done from multi.c */
 | 
						|
static CURLcode imap_multi_statemach(struct connectdata *conn, bool *done)
 | 
						|
{
 | 
						|
  CURLcode result = CURLE_OK;
 | 
						|
  struct imap_conn *imapc = &conn->proto.imapc;
 | 
						|
 | 
						|
  if((conn->handler->flags & PROTOPT_SSL) && !imapc->ssldone) {
 | 
						|
    result = Curl_ssl_connect_nonblocking(conn, FIRSTSOCKET, &imapc->ssldone);
 | 
						|
    if(result || !imapc->ssldone)
 | 
						|
      return result;
 | 
						|
  }
 | 
						|
 | 
						|
  result = Curl_pp_statemach(&imapc->pp, FALSE);
 | 
						|
  *done = (imapc->state == IMAP_STOP) ? TRUE : FALSE;
 | 
						|
 | 
						|
  return result;
 | 
						|
}
 | 
						|
 | 
						|
static CURLcode imap_block_statemach(struct connectdata *conn)
 | 
						|
{
 | 
						|
  CURLcode result = CURLE_OK;
 | 
						|
  struct imap_conn *imapc = &conn->proto.imapc;
 | 
						|
 | 
						|
  while(imapc->state != IMAP_STOP && !result)
 | 
						|
    result = Curl_pp_statemach(&imapc->pp, TRUE);
 | 
						|
 | 
						|
  return result;
 | 
						|
}
 | 
						|
 | 
						|
/* Allocate and initialize the struct IMAP for the current Curl_easy if
 | 
						|
   required */
 | 
						|
static CURLcode imap_init(struct connectdata *conn)
 | 
						|
{
 | 
						|
  CURLcode result = CURLE_OK;
 | 
						|
  struct Curl_easy *data = conn->data;
 | 
						|
  struct IMAP *imap;
 | 
						|
 | 
						|
  imap = data->req.protop = calloc(sizeof(struct IMAP), 1);
 | 
						|
  if(!imap)
 | 
						|
    result = CURLE_OUT_OF_MEMORY;
 | 
						|
 | 
						|
  return result;
 | 
						|
}
 | 
						|
 | 
						|
/* For the IMAP "protocol connect" and "doing" phases only */
 | 
						|
static int imap_getsock(struct connectdata *conn, curl_socket_t *socks,
 | 
						|
                        int numsocks)
 | 
						|
{
 | 
						|
  return Curl_pp_getsock(&conn->proto.imapc.pp, socks, numsocks);
 | 
						|
}
 | 
						|
 | 
						|
/***********************************************************************
 | 
						|
 *
 | 
						|
 * imap_connect()
 | 
						|
 *
 | 
						|
 * This function should do everything that is to be considered a part of the
 | 
						|
 * connection phase.
 | 
						|
 *
 | 
						|
 * The variable 'done' points to will be TRUE if the protocol-layer connect
 | 
						|
 * phase is done when this function returns, or FALSE if not.
 | 
						|
 */
 | 
						|
static CURLcode imap_connect(struct connectdata *conn, bool *done)
 | 
						|
{
 | 
						|
  CURLcode result = CURLE_OK;
 | 
						|
  struct imap_conn *imapc = &conn->proto.imapc;
 | 
						|
  struct pingpong *pp = &imapc->pp;
 | 
						|
 | 
						|
  *done = FALSE; /* default to not done yet */
 | 
						|
 | 
						|
  /* We always support persistent connections in IMAP */
 | 
						|
  connkeep(conn, "IMAP default");
 | 
						|
 | 
						|
  /* Set the default response time-out */
 | 
						|
  pp->response_time = RESP_TIMEOUT;
 | 
						|
  pp->statemach_act = imap_statemach_act;
 | 
						|
  pp->endofresp = imap_endofresp;
 | 
						|
  pp->conn = conn;
 | 
						|
 | 
						|
  /* Set the default preferred authentication type and mechanism */
 | 
						|
  imapc->preftype = IMAP_TYPE_ANY;
 | 
						|
  Curl_sasl_init(&imapc->sasl, &saslimap);
 | 
						|
 | 
						|
  /* Initialise the pingpong layer */
 | 
						|
  Curl_pp_init(pp);
 | 
						|
 | 
						|
  /* Parse the URL options */
 | 
						|
  result = imap_parse_url_options(conn);
 | 
						|
  if(result)
 | 
						|
    return result;
 | 
						|
 | 
						|
  /* Start off waiting for the server greeting response */
 | 
						|
  state(conn, IMAP_SERVERGREET);
 | 
						|
 | 
						|
  /* Start off with an response id of '*' */
 | 
						|
  strcpy(imapc->resptag, "*");
 | 
						|
 | 
						|
  result = imap_multi_statemach(conn, done);
 | 
						|
 | 
						|
  return result;
 | 
						|
}
 | 
						|
 | 
						|
/***********************************************************************
 | 
						|
 *
 | 
						|
 * imap_done()
 | 
						|
 *
 | 
						|
 * The DONE function. This does what needs to be done after a single DO has
 | 
						|
 * performed.
 | 
						|
 *
 | 
						|
 * Input argument is already checked for validity.
 | 
						|
 */
 | 
						|
static CURLcode imap_done(struct connectdata *conn, CURLcode status,
 | 
						|
                          bool premature)
 | 
						|
{
 | 
						|
  CURLcode result = CURLE_OK;
 | 
						|
  struct Curl_easy *data = conn->data;
 | 
						|
  struct IMAP *imap = data->req.protop;
 | 
						|
 | 
						|
  (void)premature;
 | 
						|
 | 
						|
  if(!imap)
 | 
						|
    return CURLE_OK;
 | 
						|
 | 
						|
  if(status) {
 | 
						|
    connclose(conn, "IMAP done with bad status"); /* marked for closure */
 | 
						|
    result = status;         /* use the already set error code */
 | 
						|
  }
 | 
						|
  else if(!data->set.connect_only && !imap->custom &&
 | 
						|
          (imap->uid || data->set.upload ||
 | 
						|
          data->set.mimepost.kind != MIMEKIND_NONE)) {
 | 
						|
    /* Handle responses after FETCH or APPEND transfer has finished */
 | 
						|
    if(!data->set.upload && data->set.mimepost.kind == MIMEKIND_NONE)
 | 
						|
      state(conn, IMAP_FETCH_FINAL);
 | 
						|
    else {
 | 
						|
      /* End the APPEND command first by sending an empty line */
 | 
						|
      result = Curl_pp_sendf(&conn->proto.imapc.pp, "%s", "");
 | 
						|
      if(!result)
 | 
						|
        state(conn, IMAP_APPEND_FINAL);
 | 
						|
    }
 | 
						|
 | 
						|
    /* Run the state-machine
 | 
						|
 | 
						|
       TODO: when the multi interface is used, this _really_ should be using
 | 
						|
       the imap_multi_statemach function but we have no general support for
 | 
						|
       non-blocking DONE operations!
 | 
						|
    */
 | 
						|
    if(!result)
 | 
						|
      result = imap_block_statemach(conn);
 | 
						|
  }
 | 
						|
 | 
						|
  /* Cleanup our per-request based variables */
 | 
						|
  Curl_safefree(imap->mailbox);
 | 
						|
  Curl_safefree(imap->uidvalidity);
 | 
						|
  Curl_safefree(imap->uid);
 | 
						|
  Curl_safefree(imap->section);
 | 
						|
  Curl_safefree(imap->partial);
 | 
						|
  Curl_safefree(imap->query);
 | 
						|
  Curl_safefree(imap->custom);
 | 
						|
  Curl_safefree(imap->custom_params);
 | 
						|
 | 
						|
  /* Clear the transfer mode for the next request */
 | 
						|
  imap->transfer = FTPTRANSFER_BODY;
 | 
						|
 | 
						|
  return result;
 | 
						|
}
 | 
						|
 | 
						|
/***********************************************************************
 | 
						|
 *
 | 
						|
 * imap_perform()
 | 
						|
 *
 | 
						|
 * This is the actual DO function for IMAP. Fetch or append a message, or do
 | 
						|
 * other things according to the options previously setup.
 | 
						|
 */
 | 
						|
static CURLcode imap_perform(struct connectdata *conn, bool *connected,
 | 
						|
                             bool *dophase_done)
 | 
						|
{
 | 
						|
  /* This is IMAP and no proxy */
 | 
						|
  CURLcode result = CURLE_OK;
 | 
						|
  struct Curl_easy *data = conn->data;
 | 
						|
  struct IMAP *imap = data->req.protop;
 | 
						|
  struct imap_conn *imapc = &conn->proto.imapc;
 | 
						|
  bool selected = FALSE;
 | 
						|
 | 
						|
  DEBUGF(infof(conn->data, "DO phase starts\n"));
 | 
						|
 | 
						|
  if(conn->data->set.opt_no_body) {
 | 
						|
    /* Requested no body means no transfer */
 | 
						|
    imap->transfer = FTPTRANSFER_INFO;
 | 
						|
  }
 | 
						|
 | 
						|
  *dophase_done = FALSE; /* not done yet */
 | 
						|
 | 
						|
  /* Determine if the requested mailbox (with the same UIDVALIDITY if set)
 | 
						|
     has already been selected on this connection */
 | 
						|
  if(imap->mailbox && imapc->mailbox &&
 | 
						|
     strcasecompare(imap->mailbox, imapc->mailbox) &&
 | 
						|
     (!imap->uidvalidity || !imapc->mailbox_uidvalidity ||
 | 
						|
      strcasecompare(imap->uidvalidity, imapc->mailbox_uidvalidity)))
 | 
						|
    selected = TRUE;
 | 
						|
 | 
						|
  /* Start the first command in the DO phase */
 | 
						|
  if(conn->data->set.upload || data->set.mimepost.kind != MIMEKIND_NONE)
 | 
						|
    /* APPEND can be executed directly */
 | 
						|
    result = imap_perform_append(conn);
 | 
						|
  else if(imap->custom && (selected || !imap->mailbox))
 | 
						|
    /* Custom command using the same mailbox or no mailbox */
 | 
						|
    result = imap_perform_list(conn);
 | 
						|
  else if(!imap->custom && selected && imap->uid)
 | 
						|
    /* FETCH from the same mailbox */
 | 
						|
    result = imap_perform_fetch(conn);
 | 
						|
  else if(!imap->custom && selected && imap->query)
 | 
						|
    /* SEARCH the current mailbox */
 | 
						|
    result = imap_perform_search(conn);
 | 
						|
  else if(imap->mailbox && !selected &&
 | 
						|
         (imap->custom || imap->uid || imap->query))
 | 
						|
    /* SELECT the mailbox */
 | 
						|
    result = imap_perform_select(conn);
 | 
						|
  else
 | 
						|
    /* LIST */
 | 
						|
    result = imap_perform_list(conn);
 | 
						|
 | 
						|
  if(result)
 | 
						|
    return result;
 | 
						|
 | 
						|
  /* Run the state-machine */
 | 
						|
  result = imap_multi_statemach(conn, dophase_done);
 | 
						|
 | 
						|
  *connected = conn->bits.tcpconnect[FIRSTSOCKET];
 | 
						|
 | 
						|
  if(*dophase_done)
 | 
						|
    DEBUGF(infof(conn->data, "DO phase is complete\n"));
 | 
						|
 | 
						|
  return result;
 | 
						|
}
 | 
						|
 | 
						|
/***********************************************************************
 | 
						|
 *
 | 
						|
 * imap_do()
 | 
						|
 *
 | 
						|
 * This function is registered as 'curl_do' function. It decodes the path
 | 
						|
 * parts etc as a wrapper to the actual DO function (imap_perform).
 | 
						|
 *
 | 
						|
 * The input argument is already checked for validity.
 | 
						|
 */
 | 
						|
static CURLcode imap_do(struct connectdata *conn, bool *done)
 | 
						|
{
 | 
						|
  CURLcode result = CURLE_OK;
 | 
						|
 | 
						|
  *done = FALSE; /* default to false */
 | 
						|
 | 
						|
  /* Parse the URL path */
 | 
						|
  result = imap_parse_url_path(conn);
 | 
						|
  if(result)
 | 
						|
    return result;
 | 
						|
 | 
						|
  /* Parse the custom request */
 | 
						|
  result = imap_parse_custom_request(conn);
 | 
						|
  if(result)
 | 
						|
    return result;
 | 
						|
 | 
						|
  result = imap_regular_transfer(conn, done);
 | 
						|
 | 
						|
  return result;
 | 
						|
}
 | 
						|
 | 
						|
/***********************************************************************
 | 
						|
 *
 | 
						|
 * imap_disconnect()
 | 
						|
 *
 | 
						|
 * Disconnect from an IMAP server. Cleanup protocol-specific per-connection
 | 
						|
 * resources. BLOCKING.
 | 
						|
 */
 | 
						|
static CURLcode imap_disconnect(struct connectdata *conn, bool dead_connection)
 | 
						|
{
 | 
						|
  struct imap_conn *imapc = &conn->proto.imapc;
 | 
						|
 | 
						|
  /* We cannot send quit unconditionally. If this connection is stale or
 | 
						|
     bad in any way, sending quit and waiting around here will make the
 | 
						|
     disconnect wait in vain and cause more problems than we need to. */
 | 
						|
 | 
						|
  /* The IMAP session may or may not have been allocated/setup at this
 | 
						|
     point! */
 | 
						|
  if(!dead_connection && imapc->pp.conn && imapc->pp.conn->bits.protoconnstart)
 | 
						|
    if(!imap_perform_logout(conn))
 | 
						|
      (void)imap_block_statemach(conn); /* ignore errors on LOGOUT */
 | 
						|
 | 
						|
  /* Disconnect from the server */
 | 
						|
  Curl_pp_disconnect(&imapc->pp);
 | 
						|
 | 
						|
  /* Cleanup the SASL module */
 | 
						|
  Curl_sasl_cleanup(conn, imapc->sasl.authused);
 | 
						|
 | 
						|
  /* Cleanup our connection based variables */
 | 
						|
  Curl_safefree(imapc->mailbox);
 | 
						|
  Curl_safefree(imapc->mailbox_uidvalidity);
 | 
						|
 | 
						|
  return CURLE_OK;
 | 
						|
}
 | 
						|
 | 
						|
/* Call this when the DO phase has completed */
 | 
						|
static CURLcode imap_dophase_done(struct connectdata *conn, bool connected)
 | 
						|
{
 | 
						|
  struct IMAP *imap = conn->data->req.protop;
 | 
						|
 | 
						|
  (void)connected;
 | 
						|
 | 
						|
  if(imap->transfer != FTPTRANSFER_BODY)
 | 
						|
    /* no data to transfer */
 | 
						|
    Curl_setup_transfer(conn, -1, -1, FALSE, NULL, -1, NULL);
 | 
						|
 | 
						|
  return CURLE_OK;
 | 
						|
}
 | 
						|
 | 
						|
/* Called from multi.c while DOing */
 | 
						|
static CURLcode imap_doing(struct connectdata *conn, bool *dophase_done)
 | 
						|
{
 | 
						|
  CURLcode result = imap_multi_statemach(conn, dophase_done);
 | 
						|
 | 
						|
  if(result)
 | 
						|
    DEBUGF(infof(conn->data, "DO phase failed\n"));
 | 
						|
  else if(*dophase_done) {
 | 
						|
    result = imap_dophase_done(conn, FALSE /* not connected */);
 | 
						|
 | 
						|
    DEBUGF(infof(conn->data, "DO phase is complete\n"));
 | 
						|
  }
 | 
						|
 | 
						|
  return result;
 | 
						|
}
 | 
						|
 | 
						|
/***********************************************************************
 | 
						|
 *
 | 
						|
 * imap_regular_transfer()
 | 
						|
 *
 | 
						|
 * The input argument is already checked for validity.
 | 
						|
 *
 | 
						|
 * Performs all commands done before a regular transfer between a local and a
 | 
						|
 * remote host.
 | 
						|
 */
 | 
						|
static CURLcode imap_regular_transfer(struct connectdata *conn,
 | 
						|
                                      bool *dophase_done)
 | 
						|
{
 | 
						|
  CURLcode result = CURLE_OK;
 | 
						|
  bool connected = FALSE;
 | 
						|
  struct Curl_easy *data = conn->data;
 | 
						|
 | 
						|
  /* Make sure size is unknown at this point */
 | 
						|
  data->req.size = -1;
 | 
						|
 | 
						|
  /* Set the progress data */
 | 
						|
  Curl_pgrsSetUploadCounter(data, 0);
 | 
						|
  Curl_pgrsSetDownloadCounter(data, 0);
 | 
						|
  Curl_pgrsSetUploadSize(data, -1);
 | 
						|
  Curl_pgrsSetDownloadSize(data, -1);
 | 
						|
 | 
						|
  /* Carry out the perform */
 | 
						|
  result = imap_perform(conn, &connected, dophase_done);
 | 
						|
 | 
						|
  /* Perform post DO phase operations if necessary */
 | 
						|
  if(!result && *dophase_done)
 | 
						|
    result = imap_dophase_done(conn, connected);
 | 
						|
 | 
						|
  return result;
 | 
						|
}
 | 
						|
 | 
						|
static CURLcode imap_setup_connection(struct connectdata *conn)
 | 
						|
{
 | 
						|
  struct Curl_easy *data = conn->data;
 | 
						|
 | 
						|
  /* Initialise the IMAP layer */
 | 
						|
  CURLcode result = imap_init(conn);
 | 
						|
  if(result)
 | 
						|
    return result;
 | 
						|
 | 
						|
  /* Clear the TLS upgraded flag */
 | 
						|
  conn->tls_upgraded = FALSE;
 | 
						|
  data->state.path++;   /* don't include the initial slash */
 | 
						|
 | 
						|
  return CURLE_OK;
 | 
						|
}
 | 
						|
 | 
						|
/***********************************************************************
 | 
						|
 *
 | 
						|
 * imap_sendf()
 | 
						|
 *
 | 
						|
 * Sends the formatted string as an IMAP command to the server.
 | 
						|
 *
 | 
						|
 * Designed to never block.
 | 
						|
 */
 | 
						|
static CURLcode imap_sendf(struct connectdata *conn, const char *fmt, ...)
 | 
						|
{
 | 
						|
  CURLcode result = CURLE_OK;
 | 
						|
  struct imap_conn *imapc = &conn->proto.imapc;
 | 
						|
  char *taggedfmt;
 | 
						|
  va_list ap;
 | 
						|
 | 
						|
  DEBUGASSERT(fmt);
 | 
						|
 | 
						|
  /* Calculate the next command ID wrapping at 3 digits */
 | 
						|
  imapc->cmdid = (imapc->cmdid + 1) % 1000;
 | 
						|
 | 
						|
  /* Calculate the tag based on the connection ID and command ID */
 | 
						|
  snprintf(imapc->resptag, sizeof(imapc->resptag), "%c%03d",
 | 
						|
           'A' + curlx_sltosi(conn->connection_id % 26), imapc->cmdid);
 | 
						|
 | 
						|
  /* Prefix the format with the tag */
 | 
						|
  taggedfmt = aprintf("%s %s", imapc->resptag, fmt);
 | 
						|
  if(!taggedfmt)
 | 
						|
    return CURLE_OUT_OF_MEMORY;
 | 
						|
 | 
						|
  /* Send the data with the tag */
 | 
						|
  va_start(ap, fmt);
 | 
						|
  result = Curl_pp_vsendf(&imapc->pp, taggedfmt, ap);
 | 
						|
  va_end(ap);
 | 
						|
 | 
						|
  free(taggedfmt);
 | 
						|
 | 
						|
  return result;
 | 
						|
}
 | 
						|
 | 
						|
/***********************************************************************
 | 
						|
 *
 | 
						|
 * imap_atom()
 | 
						|
 *
 | 
						|
 * Checks the input string for characters that need escaping and returns an
 | 
						|
 * atom ready for sending to the server.
 | 
						|
 *
 | 
						|
 * The returned string needs to be freed.
 | 
						|
 *
 | 
						|
 */
 | 
						|
static char *imap_atom(const char *str, bool escape_only)
 | 
						|
{
 | 
						|
  /* !checksrc! disable PARENBRACE 1 */
 | 
						|
  const char atom_specials[] = "(){ %*]";
 | 
						|
  const char *p1;
 | 
						|
  char *p2;
 | 
						|
  size_t backsp_count = 0;
 | 
						|
  size_t quote_count = 0;
 | 
						|
  bool others_exists = FALSE;
 | 
						|
  size_t newlen = 0;
 | 
						|
  char *newstr = NULL;
 | 
						|
 | 
						|
  if(!str)
 | 
						|
    return NULL;
 | 
						|
 | 
						|
  /* Look for "atom-specials", counting the backslash and quote characters as
 | 
						|
     these will need escapping */
 | 
						|
  p1 = str;
 | 
						|
  while(*p1) {
 | 
						|
    if(*p1 == '\\')
 | 
						|
      backsp_count++;
 | 
						|
    else if(*p1 == '"')
 | 
						|
      quote_count++;
 | 
						|
    else if(!escape_only) {
 | 
						|
      const char *p3 = atom_specials;
 | 
						|
 | 
						|
      while(*p3 && !others_exists) {
 | 
						|
        if(*p1 == *p3)
 | 
						|
          others_exists = TRUE;
 | 
						|
 | 
						|
        p3++;
 | 
						|
      }
 | 
						|
    }
 | 
						|
 | 
						|
    p1++;
 | 
						|
  }
 | 
						|
 | 
						|
  /* Does the input contain any "atom-special" characters? */
 | 
						|
  if(!backsp_count && !quote_count && !others_exists)
 | 
						|
    return strdup(str);
 | 
						|
 | 
						|
  /* Calculate the new string length */
 | 
						|
  newlen = strlen(str) + backsp_count + quote_count + (escape_only ? 0 : 2);
 | 
						|
 | 
						|
  /* Allocate the new string */
 | 
						|
  newstr = (char *) malloc((newlen + 1) * sizeof(char));
 | 
						|
  if(!newstr)
 | 
						|
    return NULL;
 | 
						|
 | 
						|
  /* Surround the string in quotes if necessary */
 | 
						|
  p2 = newstr;
 | 
						|
  if(!escape_only) {
 | 
						|
    newstr[0] = '"';
 | 
						|
    newstr[newlen - 1] = '"';
 | 
						|
    p2++;
 | 
						|
  }
 | 
						|
 | 
						|
  /* Copy the string, escaping backslash and quote characters along the way */
 | 
						|
  p1 = str;
 | 
						|
  while(*p1) {
 | 
						|
    if(*p1 == '\\' || *p1 == '"') {
 | 
						|
      *p2 = '\\';
 | 
						|
      p2++;
 | 
						|
    }
 | 
						|
 | 
						|
   *p2 = *p1;
 | 
						|
 | 
						|
    p1++;
 | 
						|
    p2++;
 | 
						|
  }
 | 
						|
 | 
						|
  /* Terminate the string */
 | 
						|
  newstr[newlen] = '\0';
 | 
						|
 | 
						|
  return newstr;
 | 
						|
}
 | 
						|
 | 
						|
/***********************************************************************
 | 
						|
 *
 | 
						|
 * imap_is_bchar()
 | 
						|
 *
 | 
						|
 * Portable test of whether the specified char is a "bchar" as defined in the
 | 
						|
 * grammar of RFC-5092.
 | 
						|
 */
 | 
						|
static bool imap_is_bchar(char ch)
 | 
						|
{
 | 
						|
  switch(ch) {
 | 
						|
    /* bchar */
 | 
						|
    case ':': case '@': case '/':
 | 
						|
    /* bchar -> achar */
 | 
						|
    case '&': case '=':
 | 
						|
    /* bchar -> achar -> uchar -> unreserved */
 | 
						|
    case '0': case '1': case '2': case '3': case '4': case '5': case '6':
 | 
						|
    case '7': case '8': case '9':
 | 
						|
    case 'A': case 'B': case 'C': case 'D': case 'E': case 'F': case 'G':
 | 
						|
    case 'H': case 'I': case 'J': case 'K': case 'L': case 'M': case 'N':
 | 
						|
    case 'O': case 'P': case 'Q': case 'R': case 'S': case 'T': case 'U':
 | 
						|
    case 'V': case 'W': case 'X': case 'Y': case 'Z':
 | 
						|
    case 'a': case 'b': case 'c': case 'd': case 'e': case 'f': case 'g':
 | 
						|
    case 'h': case 'i': case 'j': case 'k': case 'l': case 'm': case 'n':
 | 
						|
    case 'o': case 'p': case 'q': case 'r': case 's': case 't': case 'u':
 | 
						|
    case 'v': case 'w': case 'x': case 'y': case 'z':
 | 
						|
    case '-': case '.': case '_': case '~':
 | 
						|
    /* bchar -> achar -> uchar -> sub-delims-sh */
 | 
						|
    case '!': case '$': case '\'': case '(': case ')': case '*':
 | 
						|
    case '+': case ',':
 | 
						|
    /* bchar -> achar -> uchar -> pct-encoded */
 | 
						|
    case '%': /* HEXDIG chars are already included above */
 | 
						|
      return true;
 | 
						|
 | 
						|
    default:
 | 
						|
      return false;
 | 
						|
  }
 | 
						|
}
 | 
						|
 | 
						|
/***********************************************************************
 | 
						|
 *
 | 
						|
 * imap_parse_url_options()
 | 
						|
 *
 | 
						|
 * Parse the URL login options.
 | 
						|
 */
 | 
						|
static CURLcode imap_parse_url_options(struct connectdata *conn)
 | 
						|
{
 | 
						|
  CURLcode result = CURLE_OK;
 | 
						|
  struct imap_conn *imapc = &conn->proto.imapc;
 | 
						|
  const char *ptr = conn->options;
 | 
						|
 | 
						|
  imapc->sasl.resetprefs = TRUE;
 | 
						|
 | 
						|
  while(!result && ptr && *ptr) {
 | 
						|
    const char *key = ptr;
 | 
						|
    const char *value;
 | 
						|
 | 
						|
    while(*ptr && *ptr != '=')
 | 
						|
        ptr++;
 | 
						|
 | 
						|
    value = ptr + 1;
 | 
						|
 | 
						|
    while(*ptr && *ptr != ';')
 | 
						|
      ptr++;
 | 
						|
 | 
						|
    if(strncasecompare(key, "AUTH=", 5))
 | 
						|
      result = Curl_sasl_parse_url_auth_option(&imapc->sasl,
 | 
						|
                                               value, ptr - value);
 | 
						|
    else
 | 
						|
      result = CURLE_URL_MALFORMAT;
 | 
						|
 | 
						|
    if(*ptr == ';')
 | 
						|
      ptr++;
 | 
						|
  }
 | 
						|
 | 
						|
  switch(imapc->sasl.prefmech) {
 | 
						|
  case SASL_AUTH_NONE:
 | 
						|
    imapc->preftype = IMAP_TYPE_NONE;
 | 
						|
    break;
 | 
						|
  case SASL_AUTH_DEFAULT:
 | 
						|
    imapc->preftype = IMAP_TYPE_ANY;
 | 
						|
    break;
 | 
						|
  default:
 | 
						|
    imapc->preftype = IMAP_TYPE_SASL;
 | 
						|
    break;
 | 
						|
  }
 | 
						|
 | 
						|
  return result;
 | 
						|
}
 | 
						|
 | 
						|
/***********************************************************************
 | 
						|
 *
 | 
						|
 * imap_parse_url_path()
 | 
						|
 *
 | 
						|
 * Parse the URL path into separate path components.
 | 
						|
 *
 | 
						|
 */
 | 
						|
static CURLcode imap_parse_url_path(struct connectdata *conn)
 | 
						|
{
 | 
						|
  /* The imap struct is already initialised in imap_connect() */
 | 
						|
  CURLcode result = CURLE_OK;
 | 
						|
  struct Curl_easy *data = conn->data;
 | 
						|
  struct IMAP *imap = data->req.protop;
 | 
						|
  const char *begin = data->state.path;
 | 
						|
  const char *ptr = begin;
 | 
						|
 | 
						|
  /* See how much of the URL is a valid path and decode it */
 | 
						|
  while(imap_is_bchar(*ptr))
 | 
						|
    ptr++;
 | 
						|
 | 
						|
  if(ptr != begin) {
 | 
						|
    /* Remove the trailing slash if present */
 | 
						|
    const char *end = ptr;
 | 
						|
    if(end > begin && end[-1] == '/')
 | 
						|
      end--;
 | 
						|
 | 
						|
    result = Curl_urldecode(data, begin, end - begin, &imap->mailbox, NULL,
 | 
						|
                            TRUE);
 | 
						|
    if(result)
 | 
						|
      return result;
 | 
						|
  }
 | 
						|
  else
 | 
						|
    imap->mailbox = NULL;
 | 
						|
 | 
						|
  /* There can be any number of parameters in the form ";NAME=VALUE" */
 | 
						|
  while(*ptr == ';') {
 | 
						|
    char *name;
 | 
						|
    char *value;
 | 
						|
    size_t valuelen;
 | 
						|
 | 
						|
    /* Find the length of the name parameter */
 | 
						|
    begin = ++ptr;
 | 
						|
    while(*ptr && *ptr != '=')
 | 
						|
      ptr++;
 | 
						|
 | 
						|
    if(!*ptr)
 | 
						|
      return CURLE_URL_MALFORMAT;
 | 
						|
 | 
						|
    /* Decode the name parameter */
 | 
						|
    result = Curl_urldecode(data, begin, ptr - begin, &name, NULL, TRUE);
 | 
						|
    if(result)
 | 
						|
      return result;
 | 
						|
 | 
						|
    /* Find the length of the value parameter */
 | 
						|
    begin = ++ptr;
 | 
						|
    while(imap_is_bchar(*ptr))
 | 
						|
      ptr++;
 | 
						|
 | 
						|
    /* Decode the value parameter */
 | 
						|
    result = Curl_urldecode(data, begin, ptr - begin, &value, &valuelen, TRUE);
 | 
						|
    if(result) {
 | 
						|
      free(name);
 | 
						|
      return result;
 | 
						|
    }
 | 
						|
 | 
						|
    DEBUGF(infof(conn->data, "IMAP URL parameter '%s' = '%s'\n", name, value));
 | 
						|
 | 
						|
    /* Process the known hierarchical parameters (UIDVALIDITY, UID, SECTION and
 | 
						|
       PARTIAL) stripping of the trailing slash character if it is present.
 | 
						|
 | 
						|
       Note: Unknown parameters trigger a URL_MALFORMAT error. */
 | 
						|
    if(strcasecompare(name, "UIDVALIDITY") && !imap->uidvalidity) {
 | 
						|
      if(valuelen > 0 && value[valuelen - 1] == '/')
 | 
						|
        value[valuelen - 1] = '\0';
 | 
						|
 | 
						|
      imap->uidvalidity = value;
 | 
						|
      value = NULL;
 | 
						|
    }
 | 
						|
    else if(strcasecompare(name, "UID") && !imap->uid) {
 | 
						|
      if(valuelen > 0 && value[valuelen - 1] == '/')
 | 
						|
        value[valuelen - 1] = '\0';
 | 
						|
 | 
						|
      imap->uid = value;
 | 
						|
      value = NULL;
 | 
						|
    }
 | 
						|
    else if(strcasecompare(name, "SECTION") && !imap->section) {
 | 
						|
      if(valuelen > 0 && value[valuelen - 1] == '/')
 | 
						|
        value[valuelen - 1] = '\0';
 | 
						|
 | 
						|
      imap->section = value;
 | 
						|
      value = NULL;
 | 
						|
    }
 | 
						|
    else if(strcasecompare(name, "PARTIAL") && !imap->partial) {
 | 
						|
      if(valuelen > 0 && value[valuelen - 1] == '/')
 | 
						|
        value[valuelen - 1] = '\0';
 | 
						|
 | 
						|
      imap->partial = value;
 | 
						|
      value = NULL;
 | 
						|
    }
 | 
						|
    else {
 | 
						|
      free(name);
 | 
						|
      free(value);
 | 
						|
 | 
						|
      return CURLE_URL_MALFORMAT;
 | 
						|
    }
 | 
						|
 | 
						|
    free(name);
 | 
						|
    free(value);
 | 
						|
  }
 | 
						|
 | 
						|
  /* Does the URL contain a query parameter? Only valid when we have a mailbox
 | 
						|
     and no UID as per RFC-5092 */
 | 
						|
  if(imap->mailbox && !imap->uid && *ptr == '?') {
 | 
						|
    /* Find the length of the query parameter */
 | 
						|
    begin = ++ptr;
 | 
						|
    while(imap_is_bchar(*ptr))
 | 
						|
      ptr++;
 | 
						|
 | 
						|
    /* Decode the query parameter */
 | 
						|
    result = Curl_urldecode(data, begin, ptr - begin, &imap->query, NULL,
 | 
						|
                            TRUE);
 | 
						|
    if(result)
 | 
						|
      return result;
 | 
						|
  }
 | 
						|
 | 
						|
  /* Any extra stuff at the end of the URL is an error */
 | 
						|
  if(*ptr)
 | 
						|
    return CURLE_URL_MALFORMAT;
 | 
						|
 | 
						|
  return CURLE_OK;
 | 
						|
}
 | 
						|
 | 
						|
/***********************************************************************
 | 
						|
 *
 | 
						|
 * imap_parse_custom_request()
 | 
						|
 *
 | 
						|
 * Parse the custom request.
 | 
						|
 */
 | 
						|
static CURLcode imap_parse_custom_request(struct connectdata *conn)
 | 
						|
{
 | 
						|
  CURLcode result = CURLE_OK;
 | 
						|
  struct Curl_easy *data = conn->data;
 | 
						|
  struct IMAP *imap = data->req.protop;
 | 
						|
  const char *custom = data->set.str[STRING_CUSTOMREQUEST];
 | 
						|
 | 
						|
  if(custom) {
 | 
						|
    /* URL decode the custom request */
 | 
						|
    result = Curl_urldecode(data, custom, 0, &imap->custom, NULL, TRUE);
 | 
						|
 | 
						|
    /* Extract the parameters if specified */
 | 
						|
    if(!result) {
 | 
						|
      const char *params = imap->custom;
 | 
						|
 | 
						|
      while(*params && *params != ' ')
 | 
						|
        params++;
 | 
						|
 | 
						|
      if(*params) {
 | 
						|
        imap->custom_params = strdup(params);
 | 
						|
        imap->custom[params - imap->custom] = '\0';
 | 
						|
 | 
						|
        if(!imap->custom_params)
 | 
						|
          result = CURLE_OUT_OF_MEMORY;
 | 
						|
      }
 | 
						|
    }
 | 
						|
  }
 | 
						|
 | 
						|
  return result;
 | 
						|
}
 | 
						|
 | 
						|
#endif /* CURL_DISABLE_IMAP */
 |