windows-nt/Source/XPSP1/NT/inetsrv/iis/svcs/smtp/server/smtpcli.hxx
2020-09-26 16:20:57 +08:00

668 lines
27 KiB
C++

/*++
Copyright (c) 1994 Microsoft Corporation
Module Name :
smtpcli.hxx
Abstract:
This module defines the SMTP_CONNECTION class.
This object maintains information about a new client connection
Author:
Rohan Phillips ( Rohanp ) 11-Dec-1995
Project:
SMTP Server DLL
Revision History:
--*/
#ifndef _SMTP_CLIENT_HXX_
#define _SMTP_CLIENT_HXX_
/************************************************************
* Include Headers
************************************************************/
#include "conn.hxx"
#include "simssl2.h"
#include "addr821.hxx"
/************************************************************
* Symbolic Constants
************************************************************/
static const char * SmtpCommands [] = {
#undef SmtpDef
#define SmtpDef(a) #a,
#include "smtpdef.h"
NULL
};
enum SMTPSTATE
{
#undef SmtpDef
#define SmtpDef(a) a,
#include "smtpdef.h"
LAST_SMTP_STATE
};
enum LASTIOSTATE
{
READIO, WRITEIO, TRANSFILEIO, MAIL_QUEUEIO, REMOTE_MAIL_QUEUEIO, WRITEFILEIO
};
const DWORD MIN_SMTP_COMMAND_SIZE = 4; //4 chars
const DWORD SMTP_RESP_STATUS = 211;
const DWORD SMTP_RESP_HELP = 214;
const DWORD SMTP_RESP_READY = 220;
const DWORD SMTP_RESP_CLOSE = 221;
const DWORD SMTP_RESP_AUTHENTICATED = 235;
const DWORD SMTP_RESP_OK = 250;
const DWORD SMTP_RESP_WILL_FWRD = 251;
const DWORD SMTP_RESP_ETRN_ZERO_MSGS = 251;
const DWORD SMTP_RESP_VRFY_CODE = 252;
const DWORD SMTP_RESP_ETRN_N_MSGS = 253;
const DWORD SMTP_RESP_AUTH1_PASSED = 334;
const DWORD SMTP_RESP_START = 354;
const DWORD SMTP_RESP_SRV_UNAVAIL = 421;
const DWORD SMTP_RESP_MBX_UNAVAIL = 450;
const DWORD SMTP_RESP_REJECT_MAILFROM = 450;
const DWORD SMTP_RESP_ERROR = 451;
const DWORD SMTP_RESP_NORESOURCES = 452;
const DWORD SMTP_RESP_NODE_INVALID = 459;
const DWORD SMTP_RESP_BAD_CMD = 500;
const DWORD SMTP_RESP_BAD_ARGS = 501;
const DWORD SMTP_RESP_NOT_IMPL = 502;
const DWORD SMTP_RESP_BAD_SEQ = 503;
const DWORD SMTP_RESP_PARM_NOT_IMP = 504;
const DWORD SMTP_RESP_MUST_SECURE = 530;
const DWORD SMTP_RESP_AUTH_REJECT = 535;
const DWORD SMTP_RESP_NOT_FOUND = 550;
const DWORD SMTP_RESP_PLS_FWRD = 551;
const DWORD SMTP_RESP_NOSTORAGE = 552;
const DWORD SMTP_RESP_MBX_SYNTAX = 553;
const DWORD SMTP_RESP_TRANS_FAILED = 554;
//State of FSA in IsLineCompleteRFC822
const DWORD SEEN_NOTHING = 1;
const DWORD SEEN_CR = 2;
const DWORD SEEN_CRLF = 3;
/* strings to be appended to numeric reply codes */
static const char * SMTP_READY_STR = "SMTP server ready";
static const char * SMTP_BAD_CMD_STR = "Unrecognized command";
static const char * SMTP_BAD_BODY_TYPE_STR = "Unsupported BODY type";
static const char * SMTP_MAIL_OK_STR = "Sender OK";
static const char * SMTP_QUIT_OK_STR = "Service closing transmission channel";
static const char * SMTP_BAD_SEQ_STR = "Bad sequence of commands";
static const char * SMTP_NOT_IMPL_STR = "Command not implemented";
static const char * SMTP_HELO_OK_STR = "Hi there, pleased to meet you";
static const char * SMTP_RECIP_OK_STR = "Recipient OK";
static const char * SMTP_BAD_RECIP_STR = "Addressee unknown";
static const char * SMTP_START_MAIL_STR = "Start mail input; end with <CRLF>.<CRLF>";
static const char * SMTP_RSET_OK_STR = "Resetting";
static const char * SMTP_LOCAL_DEL_STR = "Error in local delivery";
static const char * SMTP_SRV_UNAVAIL_STR = "Service not available or retries exceeded, closing channel";
static const char * SMTP_NO_STORAGE = "Insufficient system storage";
static const char * SMTP_NO_VALID_RECIPS = "No valid recipients";
static const char * SMTP_QUEUE_MAIL = "Queued mail for delivery";
static const char * SMTP_NO_MEMORY = "Out of memory";
static const char * SMTP_EMPTY_MAIL = "Empty mail message";
static const char * SMTP_TIMEOUT_MSG = "Timeout waiting for client input";
static const char * SMTP_TOO_MANY_ERR_MSG = "Too many errors on this connection---closing";
static const char * SMTP_NO_DOMAIN_NAME_MSG = "Domain Name required";
static const char * SMTP_NEED_MAIL_FROM_MSG = "Need Mail From: first";
static const char * SMTP_MAX_MSG_SIZE_EXCEEDED_MSG = "Message size exceeds fixed maximum message size";
static const char * SMTP_MAX_SESSION_SIZE_EXCEEDED_MSG = "Session size exceeds fixed maximum session size";
static const char * SMTP_INVALID_ADDR_MSG = "Invalid Address";
static const char * SMTP_SRV_UNAVAIL_MSG = "Service not available, closing transmission channel";
static const char * SMTP_NO_ETRN_IN_MSG = "ETRN may not be issued while mail transaction is occurring";
static const char * SMTP_ONLY_ONE_TLS_MSG = "Only one STARTTLS command can be issued per session";
static const char * SMTP_TLS_NOT_SUPPORTED = "Not supported at this server";
static const char * SMTP_NO_CERT_MSG = "Unable to initialize security subsystem";
static const char * SMTP_MSG_MUST_SECURE = "Must issue a STARTTLS command first";
static const char * SMTP_MSG_NOT_SECURE_ENOUGH = "Command refused due to lack of security";
static const char * SMTP_BDAT_EXPECTED = "BDAT command expected";
static const char * SMTP_BDAT_CHUNK_OK_STR = "CHUNK received OK";
static const char * SMTP_RDNS_REJECTION = "Rejected : Domain does not match IP address";
static const char * SMTP_RDNS_FAILURE = "Unable to verify the connecting host domain";
static const char * SMTP_REMOTE_HOST_REJECTED_FOR_SIZE = "Msg Size greater than allowed by Remote Host";
static const char * SMTP_REMOTE_HOST_REJECTED_FOR_TYPE = "Body type not supported by Remote Host";
static const char * SMTP_REMOTE_HOST_DROPPED_CONNECTION = "Connection dropped by Remote Host";
static const char * SMTP_REMOTE_HOST_REJECTED_AUTH = "Failed to authenticate with Remote Host";
static const char * SMTP_REMOTE_HOST_REJECTED_SSL = "Failed to negotiate secure channel with Remote Host";
//Enhanced status codes
static const char * EPROT_SUCCESS = "2.0.0";
static const char * E_GOODBYE = "2.0.0";
static const char * ESENDER_ADDRESS_VALID = "2.1.0";
static const char * EVALID_DEST_ADDRESS = "2.1.5";
static const char * EMESSAGE_GOOD = "2.6.0";
static const char * ESEC_SUCCESS = "2.7.0";
static const char * EINTERNAL_ERROR = "4.0.0";
static const char * ENO_RESOURCES = "4.3.1";
static const char * ENO_SECURITY_TMP = "4.7.3";
static const char * EMAILBOX_FULL = "4.2.2";
static const char * EBAD_SENDER = "5.1.7";
static const char * ENOT_IMPLEMENTED = "5.3.3";
static const char * EMESSAGE_TOO_BIG = "5.3.4";
static const char * EINVALID_COMMAND = "5.5.1";
static const char * ESYNTAX_ERROR = "5.5.2";
static const char * ETOO_MANY_RCPTS = "5.5.3";
static const char * EINVALID_ARGS = "5.5.4";
static const char * ENO_FORWARDING = "5.7.1";
static const char * ENO_SECURITY = "5.7.3";
static const char * E_TLSNEEDED = "5.7.0";
static const char * ENO_SEC_PACKAGE = "5.7.4";
;
const DWORD MIN_BUFFLENGTH = 10;
const DWORD SMTP_MAX_ERRORS = 10;
const DWORD SMTP_MAX_USER_NAME_LEN = 64;
const DWORD SMTP_MAX_DOMAIN_NAME_LEN = 256;
const DWORD SMTP_MAX_PATH_LEN = 64;
const DWORD SMTP_MAX_COMMANDLINE_LEN = 512;
const DWORD SMTP_MAX_REPLY_LEN = 1024;
const DWORD SMTP_MAX_MSG_SIZE = 42 * 1024;
const char SMTP_COMMAND_NOERROR = (char) 0;
const char SMTP_COMMAND_TOO_SHORT = (char) 1;
const char SMTP_COMMAND_TOO_LONG = (char) 2;
const char SMTP_COMMAND_NOT_FOUND = (char) 3;
enum MailBodyDiagnosticCode {
ERR_NONE = 0,
ERR_OUT_OF_MEMORY,
ERR_MAX_MSG_SIZE,
ERR_AUTH_NEEDED,
ERR_TLS_NEEDED,
ERR_HELO_NEEDED,
ERR_MAIL_NEEDED,
ERR_RCPT_NEEDED,
ERR_NO_VALID_RCPTS,
ERR_RETRY
};
//
// Protocl Events
//
#include "cpropbag.h"
#include "pe_out.hxx"
#include <smtpevent.h>
#include "pe_supp.hxx"
#include "pe_disp.h"
//
// Forwards for inbound extension related objects
//
interface IEventRouter;
interface ISmtpOutboundCommandDispatcher;
class CInboundContext;
#define MAX_SSL_FRAGMENT_SIZE (32 * 1024)
//We would like this to be LTE 32K but large enough to accomodate the
//complete average mail file
#define SMTP_WRITE_BLOCK_SIZE (4000)
//See NT:415893
//Previously this value was 512 bytes, which would allow a buffer overrun to
//happen against us after the DATA command. This value should be calculated
//from the max accepted values used.
#define REWRITTEN_GEN_MSGID_BUFFER 20
#define MAX_REWRITTEN_MSGID \
(REWRITTEN_GEN_MSGID_BUFFER+1) + \
sizeof("Message-ID: <123456789@>\r\n") + \
(MAX_INTERNET_NAME+1)
//Worst case this will rewrite the following
// - "FROM: " + mail from
// - "RETURN-PATH: " + return path
// - "BCC: "
// - "MESSAGE-ID: " generated id + FQDN
// - "X-OriginalArrivalTime: " + 64 byte buffer
// - "Date: " + cMaxArpaData buffer
// - CRLF CRLF
#define MAX_REWRITTEN_HEADERS \
((MAX_INTERNET_NAME+1) * 3 ) + \
sizeof("From: \r\n") + \
sizeof("Return-Path: \r\n") + \
sizeof("Bcc: \r\n") + \
sizeof("Message-ID: \r\n") + MAX_REWRITTEN_MSGID + \
sizeof("X-OriginalArrivalTime: \r\n") + 64 + \
sizeof("Date: \r\n") + cMaxArpaDate +\
sizeof("\r\n\r\n")
#define MAX_NATIVE_RESPONSE_SIZE 1024
//This is the largest allowed size for an AUTH NTLM uuencoded
//response string. Largest response size = 0x770 ~ 1600. uuencode
//inflates size by 1.5 so about 2500 is the largest allowable size.
#define MAX_REPLY_SIZE 4000
//
// Redefine the type to indicate that this is a call-back function
//
typedef ATQ_COMPLETION PFN_ATQ_COMPLETION;
enum ReverseDnsLookupCodes{
SUCCESS,
LOOKUP_FAILED,
NO_MATCH
};
/************************************************************
* Type Definitions
************************************************************/
typedef struct _SMTPCLI_FILE_OVERLAPPED
{
SERVEREVENT_OVERLAPPED SeoOverlapped;
LASTIOSTATE m_LastIoState;
DWORD m_cbIoSize;
LPBYTE m_pIoBuffer;
} SMTPCLI_FILE_OVERLAPPED;
typedef struct _TURN_DOMAIN_LIST
{
MULTISZ* pmsz;
const char * szCurrentDomain;
}TURN_DOMAIN_LIST, *PTURN_DOMAIN_LIST;
/*++
class SMTP_CONNECTION
This class is used for keeping track of individual client
connections established with the server.
It maintains the state of the connection being processed.
--*/
class SMTP_CONNECTION : public CLIENT_CONNECTION
{
public:
~SMTP_CONNECTION (void);
static CPool Pool;
// override the mem functions to use CPool functions
void *operator new (size_t cSize)
{ return Pool.Alloc(); }
void operator delete (void *pInstance)
{ Pool.Free(pInstance); }
int SmtpGetCommand(const char * Request, DWORD RequestLen, LPDWORD CmdSize);
BOOL SendSmtpResponse(BOOL SyncSend = TRUE);
virtual BOOL ProcessClient( IN DWORD cbWritten,
IN DWORD dwCompletionStatus,
IN OUT OVERLAPPED * lpo);
virtual BOOL StartSession( VOID);
BOOL DoEHLOCommand(const char * InputLine, DWORD parameterSize);
BOOL DoHELOCommand(const char * InputLine, DWORD parameterSize);
BOOL DoRSETCommand(const char * InputLine, DWORD parameterSize);
BOOL DoNOOPCommand(const char * InputLine, DWORD parameterSize);
BOOL DoQUITCommand(const char * InputLine, DWORD parameterSize);
BOOL DoHELPCommand(const char * InputLine, DWORD parameterSize);
BOOL DoMAILCommand(const char * InputLine, DWORD parameterSize);
BOOL DoRCPTCommand(const char * InputLine, DWORD parameterSize);
BOOL DoDATACommand(const char * InputLine, DWORD parameterSize);
BOOL DoVRFYCommand(const char * InputLine, DWORD parameterSize);
BOOL DoAUTHCommand(const char * InputLine, DWORD parameterSize);
BOOL DoLASTCommand(const char * InputLine, DWORD parameterSize);
BOOL DoETRNCommand(const char * InputLine, DWORD parameterSize);
BOOL DoTURNCommand(const char * InputLine, DWORD parameterSize);
BOOL DoSTARTTLSCommand(const char * InputLine, DWORD parameterSize);
BOOL DoTLSCommand(const char * InputLine, DWORD parameterSize);
BOOL DoBDATCommand(const char * InputLine, DWORD parameterSize);
BOOL ProcessReadIO( IN DWORD InputBufferLen,
IN DWORD dwCompletionStatus,
IN OUT OVERLAPPED * lpo);
BOOL ProcessFileWrite(IN DWORD BytesWritten,
IN DWORD dwCompletionStatus,
IN OUT OVERLAPPED *lpo);
BOOL ProcessDATAMailBody(const char *InputLine, DWORD UndecryptedTailSize, BOOL *pfAsyncOp);
BOOL ProcessBDATMailBody(const char *InputLine, DWORD UndecryptedTailSize, BOOL *pfAsyncOp);
BOOL DoDATACommandEx(const char * InputLine, DWORD parameterSize, DWORD UndecryptedTailSize,BOOL *lpfWritePended, BOOL *pfAsyncOp);
BOOL DoBDATCommandEx(const char * InputLine, DWORD parameterSize, DWORD UndecryptedTailSize, BOOL *lpfWritePended, BOOL *pfAsyncOp);
BOOL Do_EODCommand(const char * InputLine, DWORD parameterSize);
BOOL FormatSmtpMessage(DWORD dwCode, const char * szEnhancedCodes, IN const char * Format, ...);
BOOL FormatSmtpMessage(unsigned char *Buffer, DWORD dwBytes);
void FormatEhloResponse(void);
// inbound protocol extension related member functions
HRESULT OnEvent(
IUnknown * pIserver,
IUnknown * pISession,
IMailMsgProperties *pIMessage,
LPPE_COMMAND_NODE pCommandNode,
LPPE_BINDING_NODE pBindingNode,
char * szArgs
);
HRESULT OnNotifyAsyncCompletion(
HRESULT hrResult
);
BOOL ProcessAndSendResponse();
BOOL GlueDispatch(char * InputLine, DWORD IntermediateSize, DWORD CmdSize, BOOL * pfAsyncOp);
BOOL ProcessPeBlob(const char * pbInputLine, DWORD cbSize);
BOOL PE_CdFormatSmtpMessage(DWORD dwCode, const char * szEnhancedCodes,IN const char * Format, ...);
BOOL PE_FormatSmtpMessage(IN const char * Format, ...);
BOOL PE_FastFormatSmtpMessage(LPSTR pszBuffer, DWORD dwBytes);
BOOL PE_DisconnectClient();
BOOL PE_SendSmtpResponse();
IUnknown *GetSessionPropertyBag() { return((IUnknown *)(IMailMsgPropertyBag *)(&m_SessionPropertyBag)); }
char * CheckArgument(IN OUT char * Argument, BOOL WriteError = TRUE);
static SMTP_CONNECTION * CreateSmtpConnection (IN PCLIENT_CONN_PARAMS ClientParam,
PSMTP_SERVER_INSTANCE pInst);
SOCKET QueryClientSocket(void)
{
return QuerySocket();
}
LPCSTR QueryClientUserName()
{
if(m_szHeloAddr[0] != '\0')
return m_szHeloAddr;
else
return "";
}
void StartSessionTimer()
{
m_msSession = GetTickCount();
}
DWORD QuerySessionTime()
{
return GetTickCount() - m_msSession;
}
ADDRESS_CHECK* QueryAccessCheck() { return &m_acAccessCheck; }
BOOL BindInstanceAccessCheck();
VOID UnbindInstanceAccessCheck();
PSMTP_SERVER_INSTANCE QuerySmtpInstance( VOID ) const
{ _ASSERT(m_pInstance != NULL); return m_pInstance; }
BOOL IsSmtpInstance( VOID ) const
{ return m_pInstance != NULL; }
VOID SetSmtpInstance( IN PSMTP_SERVER_INSTANCE pInstance )
{ _ASSERT(m_pInstance == NULL); m_pInstance = pInstance; }
SMTP_SERVER_STATISTICS * QuerySmtpStatsObj( VOID ) const
{ return m_pSmtpStats; }
VOID SetSmtpStatsObj( IN LPSMTP_SERVER_STATISTICS pSmtpStats )
{ m_pSmtpStats = pSmtpStats; }
//
// These are overridden from the base CLIENT_CONNECTION class to support
// switching of receive buffers. We need to be able to switch buffers to
// support SSL, which needs upto 32K chunks. Note that even though SSL
// V3.0 restricts fragment sizes to 16K, our schannel is capable of
// generating 32K fragments (due to a bug). So, we read up to 32K.
//
virtual LPCSTR QueryRcvBuffer( VOID) const
{ return ((LPCSTR) m_precvBuffer); }
virtual LPSTR QueryMRcvBuffer(VOID) // modifiable string
{ return (LPSTR) m_precvBuffer; }
//
// This method causes this object to allocate 32K buffers and use them as
// the receive and output buffer.
//
BOOL SwitchToBigSSLBuffers();
DWORD QueryMaxReadSize() const
{ return m_cbMaxRecvBuffer; }
private :
//In case of chunking we write to the disk async
DWORD m_AtqLocator;
SMTPCLI_FILE_OVERLAPPED m_FileOverLapped;
SMTPSTATE m_State;
LASTIOSTATE m_LastClientIo;
BOOL m_HelloSent;
BOOL m_RecvdMailCmd;
BOOL m_RecvdRcptCmd;
BOOL m_RecvdAuthCmd;
BOOL m_EmptyMail;
BOOL m_Nooped;
BOOL m_InHeader;
BOOL m_LongBodyLine;
BOOL m_fFoundEmbeddedCrlfDotCrlf;
BOOL m_fScannedForCrlfDotCrlf;
BOOL m_fSeenRFC822FromAddress;
BOOL m_fSeenRFC822ToAddress;
BOOL m_fSeenRFC822CcAddress;
BOOL m_fSeenRFC822BccAddress;
BOOL m_fSeenRFC822Subject;
BOOL m_fSeenRFC822MsgId;
BOOL m_fSeenRFC822SenderAddress;
BOOL m_fSeenXPriority;
BOOL m_fSeenXOriginalArrivalTime;
BOOL m_fSeenContentType;
BOOL m_fSetContentType;
BOOL m_NeedToQuit;
BOOL m_TimeToRewriteHeader;
BOOL m_WritingData;
BOOL m_SecurePort;
BOOL m_fNegotiatingSSL;
DWORD m_DNSLookupRetCode;
BOOL m_fUseMbsCta;
BOOL m_fAuthenticated;
BOOL m_fClearText;
BOOL m_fDidUserCmd;
BOOL m_fAuthAnon;
char *m_precvBuffer;
DWORD m_cbMaxRecvBuffer;
char m_OutputBuffer[SMTP_MAX_REPLY_LEN];
char *m_pOutputBuffer;
DWORD m_cbMaxOutputBuffer;
CBuffer * m_pFileWriteBuffer;
DWORD m_cbCurrentWriteBuffer;
DWORD m_cbRecvBufferOffset;
DWORD m_cbTempBDATLen;
DWORD m_OutputBufferSize;
DWORD m_cbParsable;
DWORD m_ProtocolErrors;
DWORD m_dwUnsuccessfulLogons;
DWORD m_TotalMsgSize;
DWORD m_SessionSize;
DWORD m_cbDotStrippedTotalMsgSize;
DWORD m_HeaderSize;
DWORD m_HeaderFlags;
DWORD m_MailBodyError;
MailBodyDiagnosticCode m_MailBodyDiagnostic;
DWORD m_dwCurrentCommand;
DWORD m_HopCount;
DWORD m_LocalHopCount;
LONG m_cPendingIoCount;
LONG m_cActiveThreads;
char CommandErrorType;
char *m_pszArgs;
IMailMsgProperties *m_pIMsg;
IMailMsgRecipients *m_pIMsgRecipsTemp;
IMailMsgRecipientsAdd *m_pIMsgRecips;
IMailMsgBind *m_pBindInterface;
PFIO_CONTEXT m_IMsgHandle;
char m_szHeloAddr[MAX_INTERNET_NAME + 1];
char m_szFromAddress[MAX_INTERNET_NAME + 1];
LIST_ENTRY m_HeaderList;
DWORD m_msSession;
DWORD m_CurrentOffset;
CEncryptCtx m_encryptCtx;
CSecurityCtx m_securityCtx;
AC_RESULT m_acCheck;
ADDRESS_CHECK m_acAccessCheck;
METADATA_REF_HANDLER m_rfAccessCheck;
// used authentication mechanism
CHAR m_szUsedAuthMechanism[MAX_PATH + 1];
CHAR m_szUsedAuthKeyword[MAX_PATH + 1];
char m_szUserName[MAX_INTERNET_NAME + 1];
CHAR m_szAuthenticatedUserNameFromSink[MAX_INTERNET_NAME + 1];
//Chunking related flags
BOOL m_fIsLastChunk;
BOOL m_fIsBinaryMime;
BOOL m_fIsChunkComplete;
DWORD m_dwTrailerStatus;
int m_nChunkSize;
int m_nBytesRemainingInChunk;
BOOL m_fBufferFullInBDAT;
// inbound protocol extension related data members
public:
CInboundContext m_CInboundContext;
BOOL m_fAsyncEventCompletion;
BOOL m_fAsyncEOD;
private:
BOOL m_fIsPeUnderway;
IEventRouter *m_pIEventRouter;
ISmtpInboundCommandDispatcher *m_pCInboundDispatcher;
CMailMsgPropertyBag m_SessionPropertyBag;
PSMTP_SERVER_INSTANCE m_pInstance;
LPSMTP_SERVER_STATISTICS m_pSmtpStats;
PATQ_CONTEXT m_AtqSeoContext;
BOOL m_fPeBlobReady;
ISmtpInCallbackSink * m_pPeBlobCallback;
DWORD m_LineCompletionState; //stores state of IsLineCompleteRFC822 automaton
BOOL m_Truncate; //TRUE when in truncation mode; gpulla
BOOL m_BufrWasFull; //TRUE when the last call to IsLineCompleteRFC822 yielded a full buffer.
SMTP_CONNECTION(
IN PSMTP_SERVER_INSTANCE pInstance,
IN SOCKET sClient,
IN const SOCKADDR_IN * psockAddrRemote,
IN const SOCKADDR_IN * psockAddrLocal = NULL,
IN PATQ_CONTEXT pAtqContext = NULL,
IN PVOID pvInitialRequest = NULL,
IN DWORD cbInitialData = 0);
BOOL InitializeObject (BOOL IsSecureConnection);
DWORD VerifiyClient (IN const char * ClientHostName, IN const char * KnownIpAddress);
BOOL ExtractAndValidateRcpt(char * ToName, char ** ppArgument, char * szRcptAddress, char ** ppDomain );
BOOL ShouldAcceptRcpt(char * szDomainName );
BOOL IsClientSecureEnough();
BOOL HandleCompletedMessage(DWORD dwCommand, BOOL *pfAsyncOp);
BOOL CreateMailBody (char * InputLine, DWORD ParameterSize, DWORD UndecryptedTailSize, BOOL *lpfWritePended);
BOOL CreateMailBodyFromChunk (char * InputLine, DWORD ParameterSize, DWORD UndecryptedTailSize,BOOL *lpfWritePended);
BOOL WriteRcvHeader(void);
BOOL BindToStoreDrive(void);
void HandleAddressError(char * InputLine);
BOOL RewriteHeader(void);
void ReInitClassVariables(void);
LONG IncPendingIoCount(void) { return InterlockedIncrement( &m_cPendingIoCount );}
LONG DecPendingIoCount(void) { return InterlockedDecrement( &m_cPendingIoCount ); }
LONG IncThreadCount(void) { return InterlockedIncrement( &m_cActiveThreads ); }
LONG DecThreadCount(void) { return InterlockedDecrement( &m_cActiveThreads ); }
//skips over WordSkip in Buffer
char * SkipWord (char * Buffer, char * WordToSkip, DWORD WordLen);
BOOL AddToField(void);
BOOL WriteLine(char * Text, DWORD TexSize);
VOID ProtocolLog(
DWORD dwCommand = USE_CURRENT,
LPCSTR pszParameters = "",
DWORD dwWin32Error = NO_ERROR,
DWORD dwSmtpError = NO_ERROR,
DWORD BytesSent = 0,
DWORD BytesRecv = 0,
LPSTR pszTarget = "");
void TransactionLog(
const char *pszOperation,
const char *pszParameters,
const char *pszTarget,
DWORD dwWin32Error,
DWORD dwServiceSpecificStatus
);
BOOL DecryptInputBuffer();
BOOL ProcessInputBuffer(void);
BOOL DoSmtpArgs (char *InputLine);
BOOL DoRcptArgs (char *InputLine, char * szORCPTval, DWORD * pdwNotifyVal);
BOOL DoSizeCommand(char * Value, char * InputLine);
BOOL DoBodyCommand (char * Value, char * InputLine);
BOOL DoRetCommand (char * Value, char * InputLine);
BOOL DoEnvidCommand (char * Value, char * InputLine);
BOOL DoNotifyCommand (char * Value, DWORD * pdwNotifyValue);
BOOL DoOrcptCommand (char * Value);
BOOL IsXtext(char * Xtext);
BOOL ProcessAuthInfo(AUTH_COMMAND, LPSTR Blob, unsigned char * OutptBuffer, DWORD * dwBytes);
BOOL DoAuthNegotiation(const char *InputLine, DWORD dwLineSize);
BOOL PendReadIO(DWORD UndecryptedTailSize);
BOOL DoUSERCommand(const CHAR *InputLine, DWORD dwLineSize, unsigned char *OutputBuff, DWORD * dwBytes,DWORD * dwResponse, char * szECode);
BOOL DoPASSCommand(const CHAR *InputLine, DWORD dwLineSize, unsigned char *OutputBuff, DWORD * dwBytes,DWORD * dwResponse, char * szECode);
BOOL UseMbsCta() { return m_fUseMbsCta; }
BOOL DoesClientHaveIpAccess();
//Partially async WriteFile
BOOL WriteMailFile (char * Buffer, DWORD BuffSize, BOOL *lpfWritePended);
//Fully async WriteFile
BOOL WriteMailFileAtq(char * Buffer, DWORD dwBytesToWrite,DWORD dwIoMode);
// void FreeAtqFileContext( void );
void ReleasImsg(BOOL DeleteIMsg);
void ReleasRcptList(void);
void GetAndPersistRFC822Headers( char* InputLine, char* pszValueBuf );
HRESULT SetAvailableMailMsgProperties();
char *IsLineCompleteRFC822(
IN char *InputLine,
IN DWORD nBytes,
IN DWORD UndecryptedTailSize,
OUT BOOL *p_FullBuffer
); //gpulla
BOOL HandleInternalError(DWORD err);
HRESULT HrGetISessionProperties();
BOOL AcceptAndDiscardBDAT(const char *InputLine, DWORD UndecryptedTailSize, BOOL *pfAsyncOp);
BOOL AcceptAndDiscardDATA(const char *InputLine, DWORD UndecryptedTailSize, BOOL *pfAsyncOp);
BOOL MailBodyErrorProcessing();
};
typedef BOOL (SMTP_CONNECTION::*PMFI)(const char * InputLine, DWORD InputLinseSize);
static PMFI SmtpDispatchTable[] = {
#undef SmtpDef
#define SmtpDef(Smtp) &SMTP_CONNECTION::Do##Smtp##Command,
#include "smtpdef.h"
// modified by andreik
// &SMTP_CONNECTION::DoLASTCommand,
NULL
};
//SMTPSTATE operator++(SMTPSTATE &state)
//{return state = SMTPSTATE (state + 1);}
# endif
/************************ End of File ***********************/