OSDN Git Service

Fix the commit.
[ffftp/ffftp.git] / socketwrapper.c
1 // socketwrapper.c\r
2 // Copyright (C) 2011 Suguru Kawamoto\r
3 // ソケットラッパー\r
4 // socket関連関数をOpenSSL用に置換\r
5 // socket関連関数のIPv6対応\r
6 // コンパイルにはOpenSSLのヘッダーファイルが必要\r
7 // 実行にはOpenSSLのDLLが必要\r
8 \r
9 #include <ws2tcpip.h>\r
10 #include <windows.h>\r
11 #include <mmsystem.h>\r
12 #include <openssl/ssl.h>\r
13 \r
14 #include "socketwrapper.h"\r
15 #include "protectprocess.h"\r
16 #include "mbswrapper.h"\r
17 #include "punycode.h"\r
18 \r
19 // FTPS対応\r
20 \r
21 typedef void (__cdecl* _SSL_load_error_strings)();\r
22 typedef int (__cdecl* _SSL_library_init)();\r
23 typedef SSL_METHOD* (__cdecl* _SSLv23_method)();\r
24 typedef SSL_CTX* (__cdecl* _SSL_CTX_new)(SSL_METHOD*);\r
25 typedef void (__cdecl* _SSL_CTX_free)(SSL_CTX*);\r
26 typedef SSL* (__cdecl* _SSL_new)(SSL_CTX*);\r
27 typedef void (__cdecl* _SSL_free)(SSL*);\r
28 typedef int (__cdecl* _SSL_shutdown)(SSL*);\r
29 typedef int (__cdecl* _SSL_get_fd)(SSL*);\r
30 typedef int (__cdecl* _SSL_set_fd)(SSL*, int);\r
31 typedef int (__cdecl* _SSL_accept)(SSL*);\r
32 typedef int (__cdecl* _SSL_connect)(SSL*);\r
33 typedef int (__cdecl* _SSL_write)(SSL*, const void*, int);\r
34 typedef int (__cdecl* _SSL_peek)(SSL*, void*, int);\r
35 typedef int (__cdecl* _SSL_read)(SSL*, void*, int);\r
36 typedef int (__cdecl* _SSL_get_error)(SSL*, int);\r
37 typedef X509* (__cdecl* _SSL_get_peer_certificate)(const SSL*);\r
38 typedef long (__cdecl* _SSL_get_verify_result)(const SSL*);\r
39 typedef SSL_SESSION* (__cdecl* _SSL_get_session)(SSL*);\r
40 typedef int (__cdecl* _SSL_set_session)(SSL*, SSL_SESSION*);\r
41 typedef X509_STORE* (__cdecl* _SSL_CTX_get_cert_store)(const SSL_CTX*);\r
42 typedef long (__cdecl* _SSL_CTX_ctrl)(SSL_CTX*, int, long, void*);\r
43 typedef BIO_METHOD* (__cdecl* _BIO_s_mem)();\r
44 typedef BIO* (__cdecl* _BIO_new)(BIO_METHOD*);\r
45 typedef int (__cdecl* _BIO_free)(BIO*);\r
46 typedef BIO* (__cdecl* _BIO_new_mem_buf)(void*, int);\r
47 typedef long (__cdecl* _BIO_ctrl)(BIO*, int, long, void*);\r
48 typedef void (__cdecl* _X509_free)(X509*);\r
49 typedef int (__cdecl* _X509_print_ex)(BIO*, X509*, unsigned long, unsigned long);\r
50 typedef X509_NAME* (__cdecl* _X509_get_subject_name)(X509*);\r
51 typedef int (__cdecl* _X509_NAME_print_ex)(BIO*, X509_NAME*, int, unsigned long);\r
52 typedef void (__cdecl* _X509_CRL_free)(X509_CRL*);\r
53 typedef EVP_PKEY* (__cdecl* _PEM_read_bio_PUBKEY)(BIO*, EVP_PKEY**, pem_password_cb*, void*);\r
54 typedef X509* (__cdecl* _PEM_read_bio_X509)(BIO*, X509**, pem_password_cb*, void*);\r
55 typedef X509_CRL* (__cdecl* _PEM_read_bio_X509_CRL)(BIO*, X509_CRL**, pem_password_cb*, void*);\r
56 typedef int (__cdecl* _X509_STORE_add_cert)(X509_STORE*, X509*);\r
57 typedef int (__cdecl* _X509_STORE_add_crl)(X509_STORE*, X509_CRL*);\r
58 typedef void (__cdecl* _EVP_PKEY_free)(EVP_PKEY*);\r
59 typedef RSA* (__cdecl* _EVP_PKEY_get1_RSA)(EVP_PKEY*);\r
60 typedef void (__cdecl* _RSA_free)(RSA*);\r
61 typedef int (__cdecl* _RSA_size)(const RSA*);\r
62 typedef int (__cdecl* _RSA_public_decrypt)(int, const unsigned char*, unsigned char*, RSA*,int);\r
63 \r
64 _SSL_load_error_strings p_SSL_load_error_strings;\r
65 _SSL_library_init p_SSL_library_init;\r
66 _SSLv23_method p_SSLv23_method;\r
67 _SSL_CTX_new p_SSL_CTX_new;\r
68 _SSL_CTX_free p_SSL_CTX_free;\r
69 _SSL_new p_SSL_new;\r
70 _SSL_free p_SSL_free;\r
71 _SSL_shutdown p_SSL_shutdown;\r
72 _SSL_get_fd p_SSL_get_fd;\r
73 _SSL_set_fd p_SSL_set_fd;\r
74 _SSL_accept p_SSL_accept;\r
75 _SSL_connect p_SSL_connect;\r
76 _SSL_write p_SSL_write;\r
77 _SSL_peek p_SSL_peek;\r
78 _SSL_read p_SSL_read;\r
79 _SSL_get_error p_SSL_get_error;\r
80 _SSL_get_peer_certificate p_SSL_get_peer_certificate;\r
81 _SSL_get_verify_result p_SSL_get_verify_result;\r
82 _SSL_get_session p_SSL_get_session;\r
83 _SSL_set_session p_SSL_set_session;\r
84 _SSL_CTX_get_cert_store p_SSL_CTX_get_cert_store;\r
85 _SSL_CTX_ctrl p_SSL_CTX_ctrl;\r
86 _BIO_s_mem p_BIO_s_mem;\r
87 _BIO_new p_BIO_new;\r
88 _BIO_free p_BIO_free;\r
89 _BIO_new_mem_buf p_BIO_new_mem_buf;\r
90 _BIO_ctrl p_BIO_ctrl;\r
91 _X509_free p_X509_free;\r
92 _X509_print_ex p_X509_print_ex;\r
93 _X509_get_subject_name p_X509_get_subject_name;\r
94 _X509_NAME_print_ex p_X509_NAME_print_ex;\r
95 _X509_CRL_free p_X509_CRL_free;\r
96 _PEM_read_bio_PUBKEY p_PEM_read_bio_PUBKEY;\r
97 _PEM_read_bio_X509 p_PEM_read_bio_X509;\r
98 _PEM_read_bio_X509_CRL p_PEM_read_bio_X509_CRL;\r
99 _X509_STORE_add_cert p_X509_STORE_add_cert;\r
100 _X509_STORE_add_crl p_X509_STORE_add_crl;\r
101 _EVP_PKEY_free p_EVP_PKEY_free;\r
102 _EVP_PKEY_get1_RSA p_EVP_PKEY_get1_RSA;\r
103 _RSA_free p_RSA_free;\r
104 _RSA_size p_RSA_size;\r
105 _RSA_public_decrypt p_RSA_public_decrypt;\r
106 \r
107 #define MAX_SSL_SOCKET 16\r
108 \r
109 BOOL g_bOpenSSLLoaded;\r
110 HMODULE g_hOpenSSL;\r
111 HMODULE g_hOpenSSLCommon;\r
112 CRITICAL_SECTION g_OpenSSLLock;\r
113 DWORD g_OpenSSLTimeout;\r
114 LPSSLTIMEOUTCALLBACK g_pOpenSSLTimeoutCallback;\r
115 LPSSLCONFIRMCALLBACK g_pOpenSSLConfirmCallback;\r
116 SSL_CTX* g_pOpenSSLCTX;\r
117 SSL* g_pOpenSSLHandle[MAX_SSL_SOCKET];\r
118 \r
119 BOOL __stdcall DefaultSSLTimeoutCallback(BOOL* pbAborted)\r
120 {\r
121         Sleep(100);\r
122         return *pbAborted;\r
123 }\r
124 \r
125 BOOL __stdcall DefaultSSLConfirmCallback(BOOL* pbAborted, BOOL bVerified, LPCSTR Certificate, LPCSTR CommonName)\r
126 {\r
127         return bVerified;\r
128 }\r
129 \r
130 // OpenSSLを初期化\r
131 BOOL LoadOpenSSL()\r
132 {\r
133         if(g_bOpenSSLLoaded)\r
134                 return FALSE;\r
135 #ifdef ENABLE_PROCESS_PROTECTION\r
136         // 同梱するOpenSSLのバージョンに合わせてSHA1ハッシュ値を変更すること\r
137         // ssleay32.dll 1.0.1g\r
138         RegisterTrustedModuleSHA1Hash("\xCB\xBA\x62\x61\x3C\x44\x1E\x94\xD2\xF4\xAD\xD5\x03\x43\x6F\x26\xD2\xAF\x2F\x21");\r
139         // libeay32.dll 1.0.1g\r
140         RegisterTrustedModuleSHA1Hash("\x4E\x53\x29\xC4\x32\x1B\x17\xA5\x4D\x40\xDF\x6F\xF6\xD2\x53\x7E\xBC\x54\x69\x1B");\r
141 #endif\r
142         g_hOpenSSL = LoadLibrary("ssleay32.dll");\r
143         // バージョン固定のためlibssl32.dllの読み込みは脆弱性の原因になり得るので廃止\r
144 //      if(!g_hOpenSSL)\r
145 //              g_hOpenSSL = LoadLibrary("libssl32.dll");\r
146         if(!g_hOpenSSL\r
147                 || !(p_SSL_load_error_strings = (_SSL_load_error_strings)GetProcAddress(g_hOpenSSL, "SSL_load_error_strings"))\r
148                 || !(p_SSL_library_init = (_SSL_library_init)GetProcAddress(g_hOpenSSL, "SSL_library_init"))\r
149                 || !(p_SSLv23_method = (_SSLv23_method)GetProcAddress(g_hOpenSSL, "SSLv23_method"))\r
150                 || !(p_SSL_CTX_new = (_SSL_CTX_new)GetProcAddress(g_hOpenSSL, "SSL_CTX_new"))\r
151                 || !(p_SSL_CTX_free = (_SSL_CTX_free)GetProcAddress(g_hOpenSSL, "SSL_CTX_free"))\r
152                 || !(p_SSL_new = (_SSL_new)GetProcAddress(g_hOpenSSL, "SSL_new"))\r
153                 || !(p_SSL_free = (_SSL_free)GetProcAddress(g_hOpenSSL, "SSL_free"))\r
154                 || !(p_SSL_shutdown = (_SSL_shutdown)GetProcAddress(g_hOpenSSL, "SSL_shutdown"))\r
155                 || !(p_SSL_get_fd = (_SSL_get_fd)GetProcAddress(g_hOpenSSL, "SSL_get_fd"))\r
156                 || !(p_SSL_set_fd = (_SSL_set_fd)GetProcAddress(g_hOpenSSL, "SSL_set_fd"))\r
157                 || !(p_SSL_accept = (_SSL_accept)GetProcAddress(g_hOpenSSL, "SSL_accept"))\r
158                 || !(p_SSL_connect = (_SSL_connect)GetProcAddress(g_hOpenSSL, "SSL_connect"))\r
159                 || !(p_SSL_write = (_SSL_write)GetProcAddress(g_hOpenSSL, "SSL_write"))\r
160                 || !(p_SSL_peek = (_SSL_peek)GetProcAddress(g_hOpenSSL, "SSL_peek"))\r
161                 || !(p_SSL_read = (_SSL_read)GetProcAddress(g_hOpenSSL, "SSL_read"))\r
162                 || !(p_SSL_get_error = (_SSL_get_error)GetProcAddress(g_hOpenSSL, "SSL_get_error"))\r
163                 || !(p_SSL_get_peer_certificate = (_SSL_get_peer_certificate)GetProcAddress(g_hOpenSSL, "SSL_get_peer_certificate"))\r
164                 || !(p_SSL_get_verify_result = (_SSL_get_verify_result)GetProcAddress(g_hOpenSSL, "SSL_get_verify_result"))\r
165                 || !(p_SSL_get_session = (_SSL_get_session)GetProcAddress(g_hOpenSSL, "SSL_get_session"))\r
166                 || !(p_SSL_set_session = (_SSL_set_session)GetProcAddress(g_hOpenSSL, "SSL_set_session"))\r
167                 || !(p_SSL_CTX_get_cert_store = (_SSL_CTX_get_cert_store)GetProcAddress(g_hOpenSSL, "SSL_CTX_get_cert_store"))\r
168                 || !(p_SSL_CTX_ctrl = (_SSL_CTX_ctrl)GetProcAddress(g_hOpenSSL, "SSL_CTX_ctrl")))\r
169         {\r
170                 if(g_hOpenSSL)\r
171                         FreeLibrary(g_hOpenSSL);\r
172                 g_hOpenSSL = NULL;\r
173                 return FALSE;\r
174         }\r
175         g_hOpenSSLCommon = LoadLibrary("libeay32.dll");\r
176         if(!g_hOpenSSLCommon\r
177                 || !(p_BIO_s_mem = (_BIO_s_mem)GetProcAddress(g_hOpenSSLCommon, "BIO_s_mem"))\r
178                 || !(p_BIO_new = (_BIO_new)GetProcAddress(g_hOpenSSLCommon, "BIO_new"))\r
179                 || !(p_BIO_free = (_BIO_free)GetProcAddress(g_hOpenSSLCommon, "BIO_free"))\r
180                 || !(p_BIO_new_mem_buf = (_BIO_new_mem_buf)GetProcAddress(g_hOpenSSLCommon, "BIO_new_mem_buf"))\r
181                 || !(p_BIO_ctrl = (_BIO_ctrl)GetProcAddress(g_hOpenSSLCommon, "BIO_ctrl"))\r
182                 || !(p_X509_free = (_X509_free)GetProcAddress(g_hOpenSSLCommon, "X509_free"))\r
183                 || !(p_X509_print_ex = (_X509_print_ex)GetProcAddress(g_hOpenSSLCommon, "X509_print_ex"))\r
184                 || !(p_X509_get_subject_name = (_X509_get_subject_name)GetProcAddress(g_hOpenSSLCommon, "X509_get_subject_name"))\r
185                 || !(p_X509_NAME_print_ex = (_X509_NAME_print_ex)GetProcAddress(g_hOpenSSLCommon, "X509_NAME_print_ex"))\r
186                 || !(p_X509_CRL_free = (_X509_CRL_free)GetProcAddress(g_hOpenSSLCommon, "X509_CRL_free"))\r
187                 || !(p_PEM_read_bio_PUBKEY = (_PEM_read_bio_PUBKEY)GetProcAddress(g_hOpenSSLCommon, "PEM_read_bio_PUBKEY"))\r
188                 || !(p_PEM_read_bio_X509 = (_PEM_read_bio_X509)GetProcAddress(g_hOpenSSLCommon, "PEM_read_bio_X509"))\r
189                 || !(p_PEM_read_bio_X509_CRL = (_PEM_read_bio_X509_CRL)GetProcAddress(g_hOpenSSLCommon, "PEM_read_bio_X509_CRL"))\r
190                 || !(p_X509_STORE_add_cert = (_X509_STORE_add_cert)GetProcAddress(g_hOpenSSLCommon, "X509_STORE_add_cert"))\r
191                 || !(p_X509_STORE_add_crl = (_X509_STORE_add_crl)GetProcAddress(g_hOpenSSLCommon, "X509_STORE_add_crl"))\r
192                 || !(p_EVP_PKEY_free = (_EVP_PKEY_free)GetProcAddress(g_hOpenSSLCommon, "EVP_PKEY_free"))\r
193                 || !(p_EVP_PKEY_get1_RSA = (_EVP_PKEY_get1_RSA)GetProcAddress(g_hOpenSSLCommon, "EVP_PKEY_get1_RSA"))\r
194                 || !(p_RSA_free = (_RSA_free)GetProcAddress(g_hOpenSSLCommon, "RSA_free"))\r
195                 || !(p_RSA_size = (_RSA_size)GetProcAddress(g_hOpenSSLCommon, "RSA_size"))\r
196                 || !(p_RSA_public_decrypt = (_RSA_public_decrypt)GetProcAddress(g_hOpenSSLCommon, "RSA_public_decrypt")))\r
197         {\r
198                 if(g_hOpenSSL)\r
199                         FreeLibrary(g_hOpenSSL);\r
200                 g_hOpenSSL = NULL;\r
201                 if(g_hOpenSSLCommon)\r
202                         FreeLibrary(g_hOpenSSLCommon);\r
203                 g_hOpenSSLCommon = NULL;\r
204                 return FALSE;\r
205         }\r
206         InitializeCriticalSection(&g_OpenSSLLock);\r
207         p_SSL_load_error_strings();\r
208         p_SSL_library_init();\r
209         SetSSLTimeoutCallback(60000, DefaultSSLTimeoutCallback);\r
210         SetSSLConfirmCallback(DefaultSSLConfirmCallback);\r
211         g_bOpenSSLLoaded = TRUE;\r
212         return TRUE;\r
213 }\r
214 \r
215 // OpenSSLを解放\r
216 void FreeOpenSSL()\r
217 {\r
218         int i;\r
219         if(!g_bOpenSSLLoaded)\r
220                 return;\r
221         EnterCriticalSection(&g_OpenSSLLock);\r
222         for(i = 0; i < MAX_SSL_SOCKET; i++)\r
223         {\r
224                 if(g_pOpenSSLHandle[i])\r
225                 {\r
226                         p_SSL_shutdown(g_pOpenSSLHandle[i]);\r
227                         p_SSL_free(g_pOpenSSLHandle[i]);\r
228                         g_pOpenSSLHandle[i] = NULL;\r
229                 }\r
230         }\r
231         if(g_pOpenSSLCTX)\r
232                 p_SSL_CTX_free(g_pOpenSSLCTX);\r
233         g_pOpenSSLCTX = NULL;\r
234         FreeLibrary(g_hOpenSSL);\r
235         g_hOpenSSL = NULL;\r
236         FreeLibrary(g_hOpenSSLCommon);\r
237         g_hOpenSSLCommon = NULL;\r
238         LeaveCriticalSection(&g_OpenSSLLock);\r
239         DeleteCriticalSection(&g_OpenSSLLock);\r
240         g_bOpenSSLLoaded = FALSE;\r
241 }\r
242 \r
243 // OpenSSLが使用可能かどうか確認\r
244 BOOL IsOpenSSLLoaded()\r
245 {\r
246         return g_bOpenSSLLoaded;\r
247 }\r
248 \r
249 SSL** GetUnusedSSLPointer()\r
250 {\r
251         int i;\r
252         for(i = 0; i < MAX_SSL_SOCKET; i++)\r
253         {\r
254                 if(!g_pOpenSSLHandle[i])\r
255                         return &g_pOpenSSLHandle[i];\r
256         }\r
257         return NULL;\r
258 }\r
259 \r
260 SSL** FindSSLPointerFromSocket(SOCKET s)\r
261 {\r
262         int i;\r
263         for(i = 0; i < MAX_SSL_SOCKET; i++)\r
264         {\r
265                 if(g_pOpenSSLHandle[i])\r
266                 {\r
267                         if(p_SSL_get_fd(g_pOpenSSLHandle[i]) == s)\r
268                                 return &g_pOpenSSLHandle[i];\r
269                 }\r
270         }\r
271         return NULL;\r
272 }\r
273 \r
274 BOOL ConfirmSSLCertificate(SSL* pSSL, BOOL* pbAborted)\r
275 {\r
276         BOOL bResult;\r
277         BOOL bVerified;\r
278         char* pData;\r
279         char* pSubject;\r
280         X509* pX509;\r
281         BIO* pBIO;\r
282         long Length;\r
283         char* pBuffer;\r
284         char* pCN;\r
285         char* p;\r
286         bResult = FALSE;\r
287         bVerified = FALSE;\r
288         pData = NULL;\r
289         pSubject = NULL;\r
290         if(pX509 = p_SSL_get_peer_certificate(pSSL))\r
291         {\r
292                 if(pBIO = p_BIO_new(p_BIO_s_mem()))\r
293                 {\r
294                         p_X509_print_ex(pBIO, pX509, 0, XN_FLAG_RFC2253);\r
295                         if((Length = p_BIO_ctrl(pBIO, BIO_CTRL_INFO, 0, &pBuffer)) > 0)\r
296                         {\r
297                                 if(pData = (char*)malloc(Length + sizeof(char)))\r
298                                 {\r
299                                         memcpy(pData, pBuffer, Length);\r
300                                         *(char*)((size_t)pData + Length) = '\0';\r
301                                 }\r
302                         }\r
303                         p_BIO_free(pBIO);\r
304                 }\r
305                 if(pBIO = p_BIO_new(p_BIO_s_mem()))\r
306                 {\r
307                         p_X509_NAME_print_ex(pBIO, p_X509_get_subject_name(pX509), 0, XN_FLAG_RFC2253);\r
308                         if((Length = p_BIO_ctrl(pBIO, BIO_CTRL_INFO, 0, &pBuffer)) > 0)\r
309                         {\r
310                                 if(pSubject = (char*)malloc(Length + sizeof(char)))\r
311                                 {\r
312                                         memcpy(pSubject, pBuffer, Length);\r
313                                         *(char*)((size_t)pSubject + Length) = '\0';\r
314                                 }\r
315                         }\r
316                         p_BIO_free(pBIO);\r
317                 }\r
318                 p_X509_free(pX509);\r
319         }\r
320         if(pX509 && p_SSL_get_verify_result(pSSL) == X509_V_OK)\r
321                 bVerified = TRUE;\r
322         pCN = pSubject;\r
323         while(pCN)\r
324         {\r
325                 if(strncmp(pCN, "CN=", strlen("CN=")) == 0)\r
326                 {\r
327                         pCN += strlen("CN=");\r
328                         if(p = strchr(pCN, ','))\r
329                                 *p = '\0';\r
330                         break;\r
331                 }\r
332                 if(pCN = strchr(pCN, ','))\r
333                         pCN++;\r
334         }\r
335         bResult = g_pOpenSSLConfirmCallback(pbAborted, bVerified, pData, pCN);\r
336         if(pData)\r
337                 free(pData);\r
338         if(pSubject)\r
339                 free(pSubject);\r
340         return bResult;\r
341 }\r
342 \r
343 void SetSSLTimeoutCallback(DWORD Timeout, LPSSLTIMEOUTCALLBACK pCallback)\r
344 {\r
345         if(!g_bOpenSSLLoaded)\r
346                 return;\r
347         EnterCriticalSection(&g_OpenSSLLock);\r
348         g_OpenSSLTimeout = Timeout;\r
349         g_pOpenSSLTimeoutCallback = pCallback;\r
350         LeaveCriticalSection(&g_OpenSSLLock);\r
351 }\r
352 \r
353 void SetSSLConfirmCallback(LPSSLCONFIRMCALLBACK pCallback)\r
354 {\r
355         if(!g_bOpenSSLLoaded)\r
356                 return;\r
357         EnterCriticalSection(&g_OpenSSLLock);\r
358         g_pOpenSSLConfirmCallback = pCallback;\r
359         LeaveCriticalSection(&g_OpenSSLLock);\r
360 }\r
361 \r
362 // SSLルート証明書を設定\r
363 // PEM形式のみ指定可能\r
364 BOOL SetSSLRootCertificate(const void* pData, DWORD Length)\r
365 {\r
366         BOOL r;\r
367         X509_STORE* pStore;\r
368         BYTE* p;\r
369         BYTE* pBegin;\r
370         BYTE* pEnd;\r
371         DWORD Left;\r
372         BIO* pBIO;\r
373         X509* pX509;\r
374         X509_CRL* pX509_CRL;\r
375         if(!g_bOpenSSLLoaded)\r
376                 return FALSE;\r
377         r = FALSE;\r
378         EnterCriticalSection(&g_OpenSSLLock);\r
379         if(!g_pOpenSSLCTX)\r
380         {\r
381                 g_pOpenSSLCTX = p_SSL_CTX_new(p_SSLv23_method());\r
382                 p_SSL_CTX_ctrl(g_pOpenSSLCTX, SSL_CTRL_MODE, SSL_MODE_ENABLE_PARTIAL_WRITE | SSL_MODE_AUTO_RETRY, NULL);\r
383         }\r
384         if(g_pOpenSSLCTX)\r
385         {\r
386                 if(pStore = p_SSL_CTX_get_cert_store(g_pOpenSSLCTX))\r
387                 {\r
388                         p = (BYTE*)pData;\r
389                         pBegin = NULL;\r
390                         pEnd = NULL;\r
391                         Left = Length;\r
392                         while(Left > 0)\r
393                         {\r
394                                 if(!pBegin)\r
395                                 {\r
396                                         if(Left < 27)\r
397                                                 break;\r
398                                         if(memcmp(p, "-----BEGIN CERTIFICATE-----", 27) == 0)\r
399                                                 pBegin = p;\r
400                                 }\r
401                                 else if(!pEnd)\r
402                                 {\r
403                                         if(Left < 25)\r
404                                                 break;\r
405                                         if(memcmp(p, "-----END CERTIFICATE-----", 25) == 0)\r
406                                                 pEnd = p + 25;\r
407                                 }\r
408                                 if(pBegin && pEnd)\r
409                                 {\r
410                                         if(pBIO = p_BIO_new_mem_buf(pBegin, (int)((size_t)pEnd - (size_t)pBegin)))\r
411                                         {\r
412                                                 if(pX509 = p_PEM_read_bio_X509(pBIO, NULL, NULL, NULL))\r
413                                                 {\r
414                                                         if(p_X509_STORE_add_cert(pStore, pX509) == 1)\r
415                                                                 r = TRUE;\r
416                                                         p_X509_free(pX509);\r
417                                                 }\r
418                                                 p_BIO_free(pBIO);\r
419                                         }\r
420                                         pBegin = NULL;\r
421                                         pEnd = NULL;\r
422                                 }\r
423                                 p++;\r
424                                 Left--;\r
425                         }\r
426                         p = (BYTE*)pData;\r
427                         pBegin = NULL;\r
428                         pEnd = NULL;\r
429                         Left = Length;\r
430                         while(Left > 0)\r
431                         {\r
432                                 if(!pBegin)\r
433                                 {\r
434                                         if(Left < 24)\r
435                                                 break;\r
436                                         if(memcmp(p, "-----BEGIN X509 CRL-----", 24) == 0)\r
437                                                 pBegin = p;\r
438                                 }\r
439                                 else if(!pEnd)\r
440                                 {\r
441                                         if(Left < 22)\r
442                                                 break;\r
443                                         if(memcmp(p, "-----END X509 CRL-----", 22) == 0)\r
444                                                 pEnd = p + 22;\r
445                                 }\r
446                                 if(pBegin && pEnd)\r
447                                 {\r
448                                         if(pBIO = p_BIO_new_mem_buf(pBegin, (int)((size_t)pEnd - (size_t)pBegin)))\r
449                                         {\r
450                                                 if(pX509_CRL = p_PEM_read_bio_X509_CRL(pBIO, NULL, NULL, NULL))\r
451                                                 {\r
452                                                         if(p_X509_STORE_add_crl(pStore, pX509_CRL) == 1)\r
453                                                                 r = TRUE;\r
454                                                         p_X509_CRL_free(pX509_CRL);\r
455                                                 }\r
456                                                 p_BIO_free(pBIO);\r
457                                         }\r
458                                         pBegin = NULL;\r
459                                         pEnd = NULL;\r
460                                 }\r
461                                 p++;\r
462                                 Left--;\r
463                         }\r
464                 }\r
465         }\r
466         LeaveCriticalSection(&g_OpenSSLLock);\r
467         return r;\r
468 }\r
469 \r
470 // ワイルドカードの比較\r
471 // 主にSSL証明書のCN確認用\r
472 BOOL IsHostNameMatched(LPCSTR HostName, LPCSTR CommonName)\r
473 {\r
474         BOOL bResult;\r
475         const char* pAsterisk;\r
476         size_t BeforeAsterisk;\r
477         const char* pBeginAsterisk;\r
478         const char* pEndAsterisk;\r
479         const char* pDot;\r
480         bResult = FALSE;\r
481         if(HostName && CommonName)\r
482         {\r
483                 if(pAsterisk = strchr(CommonName, '*'))\r
484                 {\r
485                         BeforeAsterisk = ((size_t)pAsterisk - (size_t)CommonName) / sizeof(char);\r
486                         pBeginAsterisk = HostName + BeforeAsterisk;\r
487                         while(*pAsterisk == '*')\r
488                         {\r
489                                 pAsterisk++;\r
490                         }\r
491                         pEndAsterisk = HostName + strlen(HostName) - strlen(pAsterisk);\r
492                         // "*"より前は大文字小文字を無視して完全一致\r
493                         if(_strnicmp(HostName, CommonName, BeforeAsterisk) == 0)\r
494                         {\r
495                                 // "*"より後は大文字小文字を無視して完全一致\r
496                                 if(_stricmp(pEndAsterisk, pAsterisk) == 0)\r
497                                 {\r
498                                         // "*"と一致する範囲に"."が含まれてはならない\r
499                                         pDot = strchr(pBeginAsterisk, '.');\r
500                                         if(!pDot || pDot >= pEndAsterisk)\r
501                                                 bResult = TRUE;\r
502                                 }\r
503                         }\r
504                 }\r
505                 else if(_stricmp(HostName, CommonName) == 0)\r
506                         bResult = TRUE;\r
507         }\r
508         return bResult;\r
509 }\r
510 \r
511 // RSA復号化\r
512 // 主に自動更新ファイルのハッシュの改竄確認\r
513 BOOL DecryptSignature(const char* PublicKey, const void* pIn, DWORD InLength, void* pOut, DWORD OutLength, DWORD* pOutLength)\r
514 {\r
515         BOOL bResult;\r
516         BIO* pBIO;\r
517         EVP_PKEY* pPKEY;\r
518         RSA* pRSA;\r
519         int i;\r
520         bResult = FALSE;\r
521         if(pBIO = p_BIO_new_mem_buf((void*)PublicKey, sizeof(char) * strlen(PublicKey)))\r
522         {\r
523                 if(pPKEY = p_PEM_read_bio_PUBKEY(pBIO, NULL, NULL, NULL))\r
524                 {\r
525                         if(pRSA = p_EVP_PKEY_get1_RSA(pPKEY))\r
526                         {\r
527                                 if(p_RSA_size(pRSA) <= (int)OutLength)\r
528                                 {\r
529                                         i = p_RSA_public_decrypt((int)InLength, (const unsigned char*)pIn, (unsigned char*)pOut, pRSA, RSA_PKCS1_PADDING);\r
530                                         if(i >= 0)\r
531                                         {\r
532                                                 *pOutLength = (DWORD)i;\r
533                                                 bResult = TRUE;\r
534                                         }\r
535                                 }\r
536                                 p_RSA_free(pRSA);\r
537                         }\r
538                         p_EVP_PKEY_free(pPKEY);\r
539                 }\r
540                 p_BIO_free(pBIO);\r
541         }\r
542         return bResult;\r
543 }\r
544 \r
545 // SSLセッションを開始\r
546 BOOL AttachSSL(SOCKET s, SOCKET parent, BOOL* pbAborted)\r
547 {\r
548         BOOL r;\r
549         DWORD Time;\r
550         SSL** ppSSL;\r
551         SSL** ppSSLParent;\r
552         SSL_SESSION* pSession;\r
553         int Return;\r
554         int Error;\r
555         if(!g_bOpenSSLLoaded)\r
556                 return FALSE;\r
557         r = FALSE;\r
558         Time = timeGetTime();\r
559         EnterCriticalSection(&g_OpenSSLLock);\r
560         if(!g_pOpenSSLCTX)\r
561         {\r
562                 g_pOpenSSLCTX = p_SSL_CTX_new(p_SSLv23_method());\r
563                 p_SSL_CTX_ctrl(g_pOpenSSLCTX, SSL_CTRL_MODE, SSL_MODE_ENABLE_PARTIAL_WRITE | SSL_MODE_AUTO_RETRY, NULL);\r
564         }\r
565         if(g_pOpenSSLCTX)\r
566         {\r
567                 if(ppSSL = GetUnusedSSLPointer())\r
568                 {\r
569                         if(*ppSSL = p_SSL_new(g_pOpenSSLCTX))\r
570                         {\r
571                                 if(p_SSL_set_fd(*ppSSL, s) != 0)\r
572                                 {\r
573                                         if(parent != INVALID_SOCKET)\r
574                                         {\r
575                                                 if(ppSSLParent = FindSSLPointerFromSocket(parent))\r
576                                                 {\r
577                                                         if(pSession = p_SSL_get_session(*ppSSLParent))\r
578                                                         {\r
579                                                                 if(p_SSL_set_session(*ppSSL, pSession) == 1)\r
580                                                                 {\r
581                                                                 }\r
582                                                         }\r
583                                                 }\r
584                                         }\r
585                                         // SSLのネゴシエーションには時間がかかる場合がある\r
586                                         r = TRUE;\r
587                                         while(r)\r
588                                         {\r
589                                                 Return = p_SSL_connect(*ppSSL);\r
590                                                 if(Return == 1)\r
591                                                         break;\r
592                                                 Error = p_SSL_get_error(*ppSSL, Return);\r
593                                                 if(Error == SSL_ERROR_WANT_READ || Error == SSL_ERROR_WANT_WRITE)\r
594                                                 {\r
595                                                         LeaveCriticalSection(&g_OpenSSLLock);\r
596                                                         if(g_pOpenSSLTimeoutCallback(pbAborted) || (g_OpenSSLTimeout > 0 && timeGetTime() - Time >= g_OpenSSLTimeout))\r
597                                                                 r = FALSE;\r
598                                                         EnterCriticalSection(&g_OpenSSLLock);\r
599                                                 }\r
600                                                 else\r
601                                                         r = FALSE;\r
602                                         }\r
603                                         if(r)\r
604                                         {\r
605                                                 if(ConfirmSSLCertificate(*ppSSL, pbAborted))\r
606                                                 {\r
607                                                 }\r
608                                                 else\r
609                                                 {\r
610                                                         LeaveCriticalSection(&g_OpenSSLLock);\r
611                                                         DetachSSL(s);\r
612                                                         r = FALSE;\r
613                                                         EnterCriticalSection(&g_OpenSSLLock);\r
614                                                 }\r
615                                         }\r
616                                         else\r
617                                         {\r
618                                                 LeaveCriticalSection(&g_OpenSSLLock);\r
619                                                 DetachSSL(s);\r
620                                                 EnterCriticalSection(&g_OpenSSLLock);\r
621                                         }\r
622                                 }\r
623                                 else\r
624                                 {\r
625                                         LeaveCriticalSection(&g_OpenSSLLock);\r
626                                         DetachSSL(s);\r
627                                         EnterCriticalSection(&g_OpenSSLLock);\r
628                                 }\r
629                         }\r
630                 }\r
631         }\r
632         LeaveCriticalSection(&g_OpenSSLLock);\r
633         return r;\r
634 }\r
635 \r
636 // SSLセッションを終了\r
637 BOOL DetachSSL(SOCKET s)\r
638 {\r
639         BOOL r;\r
640         SSL** ppSSL;\r
641         if(!g_bOpenSSLLoaded)\r
642                 return FALSE;\r
643         r = FALSE;\r
644         EnterCriticalSection(&g_OpenSSLLock);\r
645         if(ppSSL = FindSSLPointerFromSocket(s))\r
646         {\r
647                 p_SSL_shutdown(*ppSSL);\r
648                 p_SSL_free(*ppSSL);\r
649                 *ppSSL = NULL;\r
650                 r = TRUE;\r
651         }\r
652         LeaveCriticalSection(&g_OpenSSLLock);\r
653         return r;\r
654 }\r
655 \r
656 // SSLとしてマークされているか確認\r
657 // マークされていればTRUEを返す\r
658 BOOL IsSSLAttached(SOCKET s)\r
659 {\r
660         SSL** ppSSL;\r
661         if(!g_bOpenSSLLoaded)\r
662                 return FALSE;\r
663         EnterCriticalSection(&g_OpenSSLLock);\r
664         ppSSL = FindSSLPointerFromSocket(s);\r
665         LeaveCriticalSection(&g_OpenSSLLock);\r
666         if(!ppSSL)\r
667                 return FALSE;\r
668         return TRUE;\r
669 }\r
670 \r
671 SOCKET FTPS_socket(int af, int type, int protocol)\r
672 {\r
673         return socket(af, type, protocol);\r
674 }\r
675 \r
676 int FTPS_bind(SOCKET s, const struct sockaddr *addr, int namelen)\r
677 {\r
678         return bind(s, addr, namelen);\r
679 }\r
680 \r
681 int FTPS_listen(SOCKET s, int backlog)\r
682 {\r
683         return listen(s, backlog);\r
684 }\r
685 \r
686 // accept相当の関数\r
687 // ただし初めからSSLのネゴシエーションを行う\r
688 SOCKET FTPS_accept(SOCKET s, struct sockaddr *addr, int *addrlen)\r
689 {\r
690         SOCKET r;\r
691         BOOL bAborted;\r
692         r = accept(s, addr, addrlen);\r
693         bAborted = FALSE;\r
694         if(!AttachSSL(r, INVALID_SOCKET, &bAborted))\r
695         {\r
696                 closesocket(r);\r
697                 return INVALID_SOCKET;\r
698         }\r
699         return r;\r
700 }\r
701 \r
702 // connect相当の関数\r
703 // ただし初めからSSLのネゴシエーションを行う\r
704 int FTPS_connect(SOCKET s, const struct sockaddr *name, int namelen)\r
705 {\r
706         int r;\r
707         BOOL bAborted;\r
708         r = connect(s, name, namelen);\r
709         bAborted = FALSE;\r
710         if(!AttachSSL(r, INVALID_SOCKET, &bAborted))\r
711                 return SOCKET_ERROR;\r
712         return r;\r
713 }\r
714 \r
715 // closesocket相当の関数\r
716 int FTPS_closesocket(SOCKET s)\r
717 {\r
718         DetachSSL(s);\r
719         return closesocket(s);\r
720 }\r
721 \r
722 // send相当の関数\r
723 int FTPS_send(SOCKET s, const char * buf, int len, int flags)\r
724 {\r
725         int r;\r
726         SSL** ppSSL;\r
727         if(!g_bOpenSSLLoaded)\r
728                 return send(s, buf, len, flags);\r
729         EnterCriticalSection(&g_OpenSSLLock);\r
730         ppSSL = FindSSLPointerFromSocket(s);\r
731         LeaveCriticalSection(&g_OpenSSLLock);\r
732         if(!ppSSL)\r
733                 return send(s, buf, len, flags);\r
734         r = p_SSL_write(*ppSSL, buf, len);\r
735         if(r < 0)\r
736                 return SOCKET_ERROR;\r
737         return r;\r
738 }\r
739 \r
740 // recv相当の関数\r
741 int FTPS_recv(SOCKET s, char * buf, int len, int flags)\r
742 {\r
743         int r;\r
744         SSL** ppSSL;\r
745         if(!g_bOpenSSLLoaded)\r
746                 return recv(s, buf, len, flags);\r
747         EnterCriticalSection(&g_OpenSSLLock);\r
748         ppSSL = FindSSLPointerFromSocket(s);\r
749         LeaveCriticalSection(&g_OpenSSLLock);\r
750         if(!ppSSL)\r
751                 return recv(s, buf, len, flags);\r
752         if(flags & MSG_PEEK)\r
753                 r = p_SSL_peek(*ppSSL, buf, len);\r
754         else\r
755                 r = p_SSL_read(*ppSSL, buf, len);\r
756         if(r < 0)\r
757                 return SOCKET_ERROR;\r
758         return r;\r
759 }\r
760 \r
761 // IPv6対応\r
762 \r
763 const struct in6_addr IN6ADDR_NONE = {{0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}};\r
764 \r
765 typedef struct\r
766 {\r
767         HANDLE h;\r
768         HWND hWnd;\r
769         u_int wMsg;\r
770         char * name;\r
771         char * buf;\r
772         int buflen;\r
773         short Family;\r
774 } GETHOSTBYNAMEDATA;\r
775 \r
776 DWORD WINAPI WSAAsyncGetHostByNameIPv6ThreadProc(LPVOID lpParameter)\r
777 {\r
778         GETHOSTBYNAMEDATA* pData;\r
779         struct hostent* pHost;\r
780         struct addrinfo* pAddr;\r
781         struct addrinfo* p;\r
782         pHost = NULL;\r
783         pData = (GETHOSTBYNAMEDATA*)lpParameter;\r
784         if(getaddrinfo(pData->name, NULL, NULL, &pAddr) == 0)\r
785         {\r
786                 p = pAddr;\r
787                 while(p)\r
788                 {\r
789                         if(p->ai_family == pData->Family)\r
790                         {\r
791                                 switch(p->ai_family)\r
792                                 {\r
793                                 case AF_INET:\r
794                                         pHost = (struct hostent*)pData->buf;\r
795                                         if((size_t)pData->buflen >= sizeof(struct hostent) + sizeof(char*) * 2 + sizeof(struct in_addr)\r
796                                                 && p->ai_addrlen >= sizeof(struct sockaddr_in))\r
797                                         {\r
798                                                 pHost->h_name = NULL;\r
799                                                 pHost->h_aliases = NULL;\r
800                                                 pHost->h_addrtype = p->ai_family;\r
801                                                 pHost->h_length = sizeof(struct in_addr);\r
802                                                 pHost->h_addr_list = (char**)(&pHost[1]);\r
803                                                 pHost->h_addr_list[0] = (char*)(&pHost->h_addr_list[2]);\r
804                                                 pHost->h_addr_list[1] = NULL;\r
805                                                 memcpy(pHost->h_addr_list[0], &((struct sockaddr_in*)p->ai_addr)->sin_addr, sizeof(struct in_addr));\r
806                                                 PostMessage(pData->hWnd, pData->wMsg, (WPARAM)pData->h, (LPARAM)(sizeof(struct hostent) + sizeof(char*) * 2 + sizeof(struct in_addr)));\r
807                                         }\r
808                                         else\r
809                                                 PostMessage(pData->hWnd, pData->wMsg, (WPARAM)pData->h, (LPARAM)(WSAENOBUFS << 16));\r
810                                         break;\r
811                                 case AF_INET6:\r
812                                         pHost = (struct hostent*)pData->buf;\r
813                                         if((size_t)pData->buflen >= sizeof(struct hostent) + sizeof(char*) * 2 + sizeof(struct in6_addr)\r
814                                                 && p->ai_addrlen >= sizeof(struct sockaddr_in6))\r
815                                         {\r
816                                                 pHost->h_name = NULL;\r
817                                                 pHost->h_aliases = NULL;\r
818                                                 pHost->h_addrtype = p->ai_family;\r
819                                                 pHost->h_length = sizeof(struct in6_addr);\r
820                                                 pHost->h_addr_list = (char**)(&pHost[1]);\r
821                                                 pHost->h_addr_list[0] = (char*)(&pHost->h_addr_list[2]);\r
822                                                 pHost->h_addr_list[1] = NULL;\r
823                                                 memcpy(pHost->h_addr_list[0], &((struct sockaddr_in6*)p->ai_addr)->sin6_addr, sizeof(struct in6_addr));\r
824                                                 PostMessage(pData->hWnd, pData->wMsg, (WPARAM)pData->h, (LPARAM)(sizeof(struct hostent) + sizeof(char*) * 2 + sizeof(struct in6_addr)));\r
825                                         }\r
826                                         else\r
827                                                 PostMessage(pData->hWnd, pData->wMsg, (WPARAM)pData->h, (LPARAM)(WSAENOBUFS << 16));\r
828                                         break;\r
829                                 }\r
830                         }\r
831                         if(pHost)\r
832                                 break;\r
833                         p = p->ai_next;\r
834                 }\r
835                 if(!p)\r
836                         PostMessage(pData->hWnd, pData->wMsg, (WPARAM)pData->h, (LPARAM)(ERROR_INVALID_FUNCTION << 16));\r
837                 freeaddrinfo(pAddr);\r
838         }\r
839         else\r
840                 PostMessage(pData->hWnd, pData->wMsg, (WPARAM)pData->h, (LPARAM)(ERROR_INVALID_FUNCTION << 16));\r
841         // CreateThreadが返すハンドルが重複するのを回避\r
842         Sleep(10000);\r
843         CloseHandle(pData->h);\r
844         free(pData->name);\r
845         free(pData);\r
846         return 0;\r
847 }\r
848 \r
849 // IPv6対応のWSAAsyncGetHostByName相当の関数\r
850 // FamilyにはAF_INETまたはAF_INET6を指定可能\r
851 // ただしANSI用\r
852 HANDLE WSAAsyncGetHostByNameIPv6(HWND hWnd, u_int wMsg, const char * name, char * buf, int buflen, short Family)\r
853 {\r
854         HANDLE hResult;\r
855         GETHOSTBYNAMEDATA* pData;\r
856         hResult = NULL;\r
857         if(pData = malloc(sizeof(GETHOSTBYNAMEDATA)))\r
858         {\r
859                 pData->hWnd = hWnd;\r
860                 pData->wMsg = wMsg;\r
861                 if(pData->name = malloc(sizeof(char) * (strlen(name) + 1)))\r
862                 {\r
863                         strcpy(pData->name, name);\r
864                         pData->buf = buf;\r
865                         pData->buflen = buflen;\r
866                         pData->Family = Family;\r
867                         if(pData->h = CreateThread(NULL, 0, WSAAsyncGetHostByNameIPv6ThreadProc, pData, CREATE_SUSPENDED, NULL))\r
868                         {\r
869                                 ResumeThread(pData->h);\r
870                                 hResult = pData->h;\r
871                         }\r
872                 }\r
873         }\r
874         if(!hResult)\r
875         {\r
876                 if(pData)\r
877                 {\r
878                         if(pData->name)\r
879                                 free(pData->name);\r
880                         free(pData);\r
881                 }\r
882         }\r
883         return hResult;\r
884 }\r
885 \r
886 // WSAAsyncGetHostByNameIPv6用のWSACancelAsyncRequest相当の関数\r
887 int WSACancelAsyncRequestIPv6(HANDLE hAsyncTaskHandle)\r
888 {\r
889         int Result;\r
890         Result = SOCKET_ERROR;\r
891         if(TerminateThread(hAsyncTaskHandle, 0))\r
892         {\r
893                 CloseHandle(hAsyncTaskHandle);\r
894                 Result = 0;\r
895         }\r
896         return Result;\r
897 }\r
898 \r
899 char* AddressToStringIPv4(char* str, void* in)\r
900 {\r
901         char* pResult;\r
902         unsigned char* p;\r
903         pResult = str;\r
904         p = (unsigned char*)in;\r
905         sprintf(str, "%u.%u.%u.%u", p[0], p[1], p[2], p[3]);\r
906         return pResult;\r
907 }\r
908 \r
909 char* AddressToStringIPv6(char* str, void* in6)\r
910 {\r
911         char* pResult;\r
912         unsigned char* p;\r
913         int MaxZero;\r
914         int MaxZeroLen;\r
915         int i;\r
916         int j;\r
917         char Tmp[5];\r
918         pResult = str;\r
919         p = (unsigned char*)in6;\r
920         MaxZero = 8;\r
921         MaxZeroLen = 1;\r
922         for(i = 0; i < 8; i++)\r
923         {\r
924                 for(j = i; j < 8; j++)\r
925                 {\r
926                         if(p[j * 2] != 0 || p[j * 2 + 1] != 0)\r
927                                 break;\r
928                 }\r
929                 if(j - i > MaxZeroLen)\r
930                 {\r
931                         MaxZero = i;\r
932                         MaxZeroLen = j - i;\r
933                 }\r
934         }\r
935         strcpy(str, "");\r
936         for(i = 0; i < 8; i++)\r
937         {\r
938                 if(i == MaxZero)\r
939                 {\r
940                         if(i == 0)\r
941                                 strcat(str, ":");\r
942                         strcat(str, ":");\r
943                 }\r
944                 else if(i < MaxZero || i >= MaxZero + MaxZeroLen)\r
945                 {\r
946                         sprintf(Tmp, "%x", (((int)p[i * 2] & 0xff) << 8) | ((int)p[i * 2 + 1] & 0xff));\r
947                         strcat(str, Tmp);\r
948                         if(i < 7)\r
949                                 strcat(str, ":");\r
950                 }\r
951         }\r
952         return pResult;\r
953 }\r
954 \r
955 // IPv6対応のinet_ntoa相当の関数\r
956 // ただしANSI用\r
957 char* inet6_ntoa(struct in6_addr in6)\r
958 {\r
959         char* pResult;\r
960         static char Adrs[40];\r
961         pResult = NULL;\r
962         memset(Adrs, 0, sizeof(Adrs));\r
963         pResult = AddressToStringIPv6(Adrs, &in6);\r
964         return pResult;\r
965 }\r
966 \r
967 // IPv6対応のinet_addr相当の関数\r
968 // ただしANSI用\r
969 struct in6_addr inet6_addr(const char* cp)\r
970 {\r
971         struct in6_addr Result;\r
972         int AfterZero;\r
973         int i;\r
974         char* p;\r
975         memset(&Result, 0, sizeof(Result));\r
976         AfterZero = 0;\r
977         for(i = 0; i < 8; i++)\r
978         {\r
979                 if(!cp)\r
980                 {\r
981                         memcpy(&Result, &IN6ADDR_NONE, sizeof(struct in6_addr));\r
982                         break;\r
983                 }\r
984                 if(i >= AfterZero)\r
985                 {\r
986                         if(strncmp(cp, ":", 1) == 0)\r
987                         {\r
988                                 cp = cp + 1;\r
989                                 if(i == 0 && strncmp(cp, ":", 1) == 0)\r
990                                         cp = cp + 1;\r
991                                 p = (char*)cp;\r
992                                 AfterZero = 7;\r
993                                 while(p = strstr(p, ":"))\r
994                                 {\r
995                                         p = p + 1;\r
996                                         AfterZero--;\r
997                                 }\r
998                         }\r
999                         else\r
1000                         {\r
1001                                 Result.u.Word[i] = (USHORT)strtol(cp, &p, 16);\r
1002                                 Result.u.Word[i] = ((Result.u.Word[i] & 0xff00) >> 8) | ((Result.u.Word[i] & 0x00ff) << 8);\r
1003                                 if(strncmp(p, ":", 1) != 0 && strlen(p) > 0)\r
1004                                 {\r
1005                                         memcpy(&Result, &IN6ADDR_NONE, sizeof(struct in6_addr));\r
1006                                         break;\r
1007                                 }\r
1008                                 if(cp = strstr(cp, ":"))\r
1009                                         cp = cp + 1;\r
1010                         }\r
1011                 }\r
1012         }\r
1013         return Result;\r
1014 }\r
1015 \r
1016 BOOL ConvertDomainNameToPunycode(LPSTR Output, DWORD Count, LPCSTR Input)\r
1017 {\r
1018         BOOL bResult;\r
1019         punycode_uint* pUnicode;\r
1020         punycode_uint* p;\r
1021         BOOL bNeeded;\r
1022         LPCSTR InputString;\r
1023         punycode_uint Length;\r
1024         punycode_uint OutputLength;\r
1025         bResult = FALSE;\r
1026         if(pUnicode = malloc(sizeof(punycode_uint) * strlen(Input)))\r
1027         {\r
1028                 p = pUnicode;\r
1029                 bNeeded = FALSE;\r
1030                 InputString = Input;\r
1031                 Length = 0;\r
1032                 while(*InputString != '\0')\r
1033                 {\r
1034                         *p = (punycode_uint)GetNextCharM(InputString, NULL, &InputString);\r
1035                         if(*p >= 0x80)\r
1036                                 bNeeded = TRUE;\r
1037                         p++;\r
1038                         Length++;\r
1039                 }\r
1040                 if(bNeeded)\r
1041                 {\r
1042                         if(Count >= strlen("xn--") + 1)\r
1043                         {\r
1044                                 strcpy(Output, "xn--");\r
1045                                 OutputLength = Count - strlen("xn--");\r
1046                                 if(punycode_encode(Length, pUnicode, NULL, (punycode_uint*)&OutputLength, Output + strlen("xn--")) == punycode_success)\r
1047                                 {\r
1048                                         Output[strlen("xn--") + OutputLength] = '\0';\r
1049                                         bResult = TRUE;\r
1050                                 }\r
1051                         }\r
1052                 }\r
1053                 free(pUnicode);\r
1054         }\r
1055         if(!bResult)\r
1056         {\r
1057                 if(Count >= strlen(Input) + 1)\r
1058                 {\r
1059                         strcpy(Output, Input);\r
1060                         bResult = TRUE;\r
1061                 }\r
1062         }\r
1063         return bResult;\r
1064 }\r
1065 \r
1066 BOOL ConvertNameToPunycode(LPSTR Output, LPCSTR Input)\r
1067 {\r
1068         BOOL bResult;\r
1069         DWORD Length;\r
1070         char* pm0;\r
1071         char* pm1;\r
1072         char* p;\r
1073         char* pNext;\r
1074         bResult = FALSE;\r
1075         Length = strlen(Input);\r
1076         if(pm0 = AllocateStringM(Length + 1))\r
1077         {\r
1078                 if(pm1 = AllocateStringM(Length * 4 + 1))\r
1079                 {\r
1080                         strcpy(pm0, Input);\r
1081                         p = pm0;\r
1082                         while(p)\r
1083                         {\r
1084                                 if(pNext = strchr(p, '.'))\r
1085                                 {\r
1086                                         *pNext = '\0';\r
1087                                         pNext++;\r
1088                                 }\r
1089                                 if(ConvertDomainNameToPunycode(pm1, Length * 4, p))\r
1090                                         strcat(Output, pm1);\r
1091                                 if(pNext)\r
1092                                         strcat(Output, ".");\r
1093                                 p = pNext;\r
1094                         }\r
1095                         bResult = TRUE;\r
1096                         FreeDuplicatedString(pm1);\r
1097                 }\r
1098                 FreeDuplicatedString(pm0);\r
1099         }\r
1100         return bResult;\r
1101 }\r
1102 \r
1103 HANDLE WSAAsyncGetHostByNameM(HWND hWnd, u_int wMsg, const char * name, char * buf, int buflen)\r
1104 {\r
1105         HANDLE r = NULL;\r
1106         char* pa0 = NULL;\r
1107         if(pa0 = AllocateStringA(strlen(name) * 4))\r
1108         {\r
1109                 if(ConvertNameToPunycode(pa0, name))\r
1110                         r = WSAAsyncGetHostByName(hWnd, wMsg, pa0, buf, buflen);\r
1111         }\r
1112         FreeDuplicatedString(pa0);\r
1113         return r;\r
1114 }\r
1115 \r
1116 HANDLE WSAAsyncGetHostByNameIPv6M(HWND hWnd, u_int wMsg, const char * name, char * buf, int buflen, short Family)\r
1117 {\r
1118         HANDLE r = NULL;\r
1119         char* pa0 = NULL;\r
1120         if(pa0 = AllocateStringA(strlen(name) * 4))\r
1121         {\r
1122                 if(ConvertNameToPunycode(pa0, name))\r
1123                         r = WSAAsyncGetHostByNameIPv6(hWnd, wMsg, pa0, buf, buflen, Family);\r
1124         }\r
1125         FreeDuplicatedString(pa0);\r
1126         return r;\r
1127 }\r
1128 \r
1129 // SFTP対応\r
1130 \r
1131 typedef void* (__cdecl* _SFTP_Create)();\r
1132 typedef void (__cdecl* _SFTP_Destroy)(void*);\r
1133 typedef BOOL (__cdecl* _SFTP_IsExited)(void*);\r
1134 typedef BOOL (__cdecl* _SFTP_SetTimeoutCallback)(void*, void*);\r
1135 typedef size_t (__cdecl* _SFTP_PeekStdOut)(void*, void*, size_t);\r
1136 typedef size_t (__cdecl* _SFTP_ReadStdOut)(void*, void*, size_t);\r
1137 typedef size_t (__cdecl* _SFTP_WriteStdIn)(void*, const void*, size_t);\r
1138 typedef size_t (__cdecl* _SFTP_PeekDataOut)(void*, void*, size_t);\r
1139 typedef size_t (__cdecl* _SFTP_ReadDataOut)(void*, void*, size_t);\r
1140 typedef size_t (__cdecl* _SFTP_WriteDataIn)(void*, const void*, size_t);\r
1141 typedef BOOL (__cdecl* _SFTP_SetFilePosition)(void*, LONGLONG);\r
1142 \r
1143 _SFTP_Create p_SFTP_Create;\r
1144 _SFTP_Destroy p_SFTP_Destroy;\r
1145 _SFTP_IsExited p_SFTP_IsExited;\r
1146 _SFTP_SetTimeoutCallback p_SFTP_SetTimeoutCallback;\r
1147 _SFTP_PeekStdOut p_SFTP_PeekStdOut;\r
1148 _SFTP_ReadStdOut p_SFTP_ReadStdOut;\r
1149 _SFTP_WriteStdIn p_SFTP_WriteStdIn;\r
1150 _SFTP_PeekDataOut p_SFTP_PeekDataOut;\r
1151 _SFTP_ReadDataOut p_SFTP_ReadDataOut;\r
1152 _SFTP_WriteDataIn p_SFTP_WriteDataIn;\r
1153 _SFTP_SetFilePosition p_SFTP_SetFilePosition;\r
1154 \r
1155 typedef struct\r
1156 {\r
1157         SOCKET Control;\r
1158         SOCKET Data;\r
1159         void* Handle;\r
1160         char Host[1024];\r
1161         int Port;\r
1162         char User[1024];\r
1163         char Password[1024];\r
1164 } SFTPDATA;\r
1165 \r
1166 #define MAX_SFTP_SOCKET 16\r
1167 \r
1168 BOOL g_bPuTTYLoaded;\r
1169 HMODULE g_hPuTTY;\r
1170 CRITICAL_SECTION g_PuTTYLock;\r
1171 SFTPDATA g_SFTPData[MAX_SFTP_SOCKET];\r
1172 \r
1173 // PuTTYを初期化\r
1174 BOOL LoadPuTTY()\r
1175 {\r
1176         int i;\r
1177         if(g_bPuTTYLoaded)\r
1178                 return FALSE;\r
1179 #ifdef ENABLE_PROCESS_PROTECTION\r
1180         // ビルドしたputty.dllに合わせてSHA1ハッシュ値を変更すること\r
1181         RegisterTrustedModuleSHA1Hash("\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00");\r
1182 #endif\r
1183         // デバッグ用\r
1184 #ifdef _DEBUG\r
1185         {\r
1186                 char Path[MAX_PATH];\r
1187                 GetModuleFileName(NULL, Path, MAX_PATH);\r
1188                 strcpy(strrchr(Path, '\\'), "\\..\\putty\\Debug\\PuTTY.dll");\r
1189                 g_hPuTTY = LoadLibrary(Path);\r
1190         }\r
1191 #else\r
1192         g_hPuTTY = LoadLibrary("putty.dll");\r
1193 #endif\r
1194         if(!g_hPuTTY\r
1195                 || !(p_SFTP_Create = (_SFTP_Create)GetProcAddress(g_hPuTTY, "SFTP_Create"))\r
1196                 || !(p_SFTP_Destroy = (_SFTP_Destroy)GetProcAddress(g_hPuTTY, "SFTP_Destroy"))\r
1197                 || !(p_SFTP_IsExited = (_SFTP_IsExited)GetProcAddress(g_hPuTTY, "SFTP_IsExited"))\r
1198                 || !(p_SFTP_SetTimeoutCallback = (_SFTP_SetTimeoutCallback)GetProcAddress(g_hPuTTY, "SFTP_SetTimeoutCallback"))\r
1199                 || !(p_SFTP_PeekStdOut = (_SFTP_PeekStdOut)GetProcAddress(g_hPuTTY, "SFTP_PeekStdOut"))\r
1200                 || !(p_SFTP_ReadStdOut = (_SFTP_ReadStdOut)GetProcAddress(g_hPuTTY, "SFTP_ReadStdOut"))\r
1201                 || !(p_SFTP_WriteStdIn = (_SFTP_WriteStdIn)GetProcAddress(g_hPuTTY, "SFTP_WriteStdIn"))\r
1202                 || !(p_SFTP_PeekDataOut = (_SFTP_PeekDataOut)GetProcAddress(g_hPuTTY, "SFTP_PeekDataOut"))\r
1203                 || !(p_SFTP_ReadDataOut = (_SFTP_ReadDataOut)GetProcAddress(g_hPuTTY, "SFTP_ReadDataOut"))\r
1204                 || !(p_SFTP_WriteDataIn = (_SFTP_WriteDataIn)GetProcAddress(g_hPuTTY, "SFTP_WriteDataIn"))\r
1205                 || !(p_SFTP_SetFilePosition = (_SFTP_SetFilePosition)GetProcAddress(g_hPuTTY, "SFTP_SetFilePosition")))\r
1206         {\r
1207                 if(g_hPuTTY)\r
1208                         FreeLibrary(g_hPuTTY);\r
1209                 g_hPuTTY = NULL;\r
1210                 return FALSE;\r
1211         }\r
1212         for(i = 0; i < MAX_SFTP_SOCKET; i++)\r
1213         {\r
1214                 g_SFTPData[i].Control = INVALID_SOCKET;\r
1215                 g_SFTPData[i].Data = INVALID_SOCKET;\r
1216         }\r
1217         InitializeCriticalSection(&g_PuTTYLock);\r
1218         g_bPuTTYLoaded = TRUE;\r
1219         return TRUE;\r
1220 }\r
1221 \r
1222 // PuTTYを解放\r
1223 void FreePuTTY()\r
1224 {\r
1225         int i;\r
1226         if(!g_bPuTTYLoaded)\r
1227                 return;\r
1228         EnterCriticalSection(&g_PuTTYLock);\r
1229         for(i = 0; i < MAX_SFTP_SOCKET; i++)\r
1230         {\r
1231                 if(g_SFTPData[i].Control != INVALID_SOCKET)\r
1232                 {\r
1233                         closesocket(g_SFTPData[i].Control);\r
1234                         g_SFTPData[i].Control = INVALID_SOCKET;\r
1235                         p_SFTP_Destroy(g_SFTPData[i].Handle);\r
1236                 }\r
1237                 if(g_SFTPData[i].Data != INVALID_SOCKET)\r
1238                 {\r
1239                         closesocket(g_SFTPData[i].Data);\r
1240                         g_SFTPData[i].Data = INVALID_SOCKET;\r
1241                 }\r
1242         }\r
1243         FreeLibrary(g_hPuTTY);\r
1244         g_hPuTTY = NULL;\r
1245         LeaveCriticalSection(&g_PuTTYLock);\r
1246         DeleteCriticalSection(&g_PuTTYLock);\r
1247         g_bPuTTYLoaded = FALSE;\r
1248 }\r
1249 \r
1250 // PuTTYが使用可能かどうか確認\r
1251 BOOL IsPuTTYLoaded()\r
1252 {\r
1253         return g_bPuTTYLoaded;\r
1254 }\r
1255 \r
1256 SFTPDATA* GetUnusedSFTPData()\r
1257 {\r
1258         int i;\r
1259         for(i = 0; i < MAX_SFTP_SOCKET; i++)\r
1260         {\r
1261                 if(g_SFTPData[i].Control == INVALID_SOCKET)\r
1262                 {\r
1263                         memset(&g_SFTPData[i], 0, sizeof(SFTPDATA));\r
1264                         return &g_SFTPData[i];\r
1265                 }\r
1266         }\r
1267         return NULL;\r
1268 }\r
1269 \r
1270 SFTPDATA* FindSFTPDataFromSocket(SOCKET s)\r
1271 {\r
1272         int i;\r
1273         for(i = 0; i < MAX_SFTP_SOCKET; i++)\r
1274         {\r
1275                 if(g_SFTPData[i].Control == s || g_SFTPData[i].Data == s)\r
1276                         return &g_SFTPData[i];\r
1277         }\r
1278         return NULL;\r
1279 }\r
1280 \r
1281 // SFTPとしてマークされているか確認\r
1282 // マークされていればTRUEを返す\r
1283 BOOL IsSFTPAttached(SOCKET s)\r
1284 {\r
1285         SFTPDATA* pSFTPData;\r
1286         if(!g_bPuTTYLoaded)\r
1287                 return FALSE;\r
1288         EnterCriticalSection(&g_PuTTYLock);\r
1289         pSFTPData = FindSFTPDataFromSocket(s);\r
1290         LeaveCriticalSection(&g_PuTTYLock);\r
1291         if(!pSFTPData)\r
1292                 return FALSE;\r
1293         return TRUE;\r
1294 }\r
1295 \r
1296 // コントロール用の仮想的なソケットを取得\r
1297 // 識別子としてダミーのソケットを返す\r
1298 SOCKET SFTP_socket(int af, int type, int protocol)\r
1299 {\r
1300         SOCKET r;\r
1301         SFTPDATA* pSFTPData;\r
1302         if(!g_bPuTTYLoaded)\r
1303                 return INVALID_SOCKET;\r
1304         r = INVALID_SOCKET;\r
1305         EnterCriticalSection(&g_PuTTYLock);\r
1306         if(pSFTPData = GetUnusedSFTPData())\r
1307         {\r
1308                 r = socket(af, type, protocol);\r
1309                 pSFTPData->Control = r;\r
1310                 pSFTPData->Data = INVALID_SOCKET;\r
1311                 pSFTPData->Handle = p_SFTP_Create();\r
1312         }\r
1313         LeaveCriticalSection(&g_PuTTYLock);\r
1314         return r;\r
1315 }\r
1316 \r
1317 int SFTP_bind(SOCKET s, const struct sockaddr *addr, int namelen)\r
1318 {\r
1319         return SOCKET_ERROR;\r
1320 }\r
1321 \r
1322 int SFTP_listen(SOCKET s, int backlog)\r
1323 {\r
1324         return SOCKET_ERROR;\r
1325 }\r
1326 \r
1327 // accept相当の関数\r
1328 SOCKET SFTP_accept(SOCKET s, struct sockaddr *addr, int *addrlen)\r
1329 {\r
1330         return INVALID_SOCKET;\r
1331 }\r
1332 \r
1333 // connect相当の関数\r
1334 int SFTP_connect(SOCKET s, const struct sockaddr *name, int namelen)\r
1335 {\r
1336         SFTPDATA* pSFTPData;\r
1337         if(!g_bPuTTYLoaded)\r
1338                 return SOCKET_ERROR;\r
1339         EnterCriticalSection(&g_PuTTYLock);\r
1340         pSFTPData = FindSFTPDataFromSocket(s);\r
1341         LeaveCriticalSection(&g_PuTTYLock);\r
1342         if(!pSFTPData)\r
1343                 return SOCKET_ERROR;\r
1344         if(namelen == sizeof(struct sockaddr_in))\r
1345         {\r
1346         }\r
1347         else if(namelen == sizeof(struct sockaddr_in6))\r
1348         {\r
1349         }\r
1350         else\r
1351                 return SOCKET_ERROR;\r
1352         return 0;\r
1353 }\r
1354 \r
1355 // closesocket相当の関数\r
1356 int SFTP_closesocket(SOCKET s)\r
1357 {\r
1358         SFTPDATA* pSFTPData;\r
1359         if(!g_bPuTTYLoaded)\r
1360                 return SOCKET_ERROR;\r
1361         EnterCriticalSection(&g_PuTTYLock);\r
1362         if(pSFTPData = FindSFTPDataFromSocket(s))\r
1363         {\r
1364                 if(pSFTPData->Control == s)\r
1365                 {\r
1366                         pSFTPData->Control = INVALID_SOCKET;\r
1367                         p_SFTP_Destroy(pSFTPData->Handle);\r
1368                 }\r
1369                 if(pSFTPData->Data == s)\r
1370                         pSFTPData->Data = INVALID_SOCKET;\r
1371         }\r
1372         LeaveCriticalSection(&g_PuTTYLock);\r
1373         return closesocket(s);\r
1374 }\r
1375 \r
1376 // send相当の関数\r
1377 int SFTP_send(SOCKET s, const char * buf, int len, int flags)\r
1378 {\r
1379         int r;\r
1380         SFTPDATA* pSFTPData;\r
1381         if(!g_bPuTTYLoaded)\r
1382                 return SOCKET_ERROR;\r
1383         EnterCriticalSection(&g_PuTTYLock);\r
1384         pSFTPData = FindSFTPDataFromSocket(s);\r
1385         LeaveCriticalSection(&g_PuTTYLock);\r
1386         if(!pSFTPData)\r
1387                 return SOCKET_ERROR;\r
1388         if(p_SFTP_IsExited(pSFTPData->Handle))\r
1389                 return SOCKET_ERROR;\r
1390         r = SOCKET_ERROR;\r
1391         if(pSFTPData->Control == s)\r
1392                 r = (int)p_SFTP_WriteStdIn(pSFTPData->Handle, buf, len);\r
1393         else if(pSFTPData->Data == s)\r
1394                 r = (int)p_SFTP_WriteDataIn(pSFTPData->Handle, buf, len);\r
1395         return r;\r
1396 }\r
1397 \r
1398 // recv相当の関数\r
1399 int SFTP_recv(SOCKET s, char * buf, int len, int flags)\r
1400 {\r
1401         int r;\r
1402         SFTPDATA* pSFTPData;\r
1403         if(!g_bPuTTYLoaded)\r
1404                 return SOCKET_ERROR;\r
1405         EnterCriticalSection(&g_PuTTYLock);\r
1406         pSFTPData = FindSFTPDataFromSocket(s);\r
1407         LeaveCriticalSection(&g_PuTTYLock);\r
1408         if(!pSFTPData)\r
1409                 return SOCKET_ERROR;\r
1410         if(p_SFTP_IsExited(pSFTPData->Handle))\r
1411                 return SOCKET_ERROR;\r
1412         r = SOCKET_ERROR;\r
1413         if(pSFTPData->Control == s)\r
1414         {\r
1415                 if(flags & MSG_PEEK)\r
1416                         r = (int)p_SFTP_PeekStdOut(pSFTPData->Handle, buf, len);\r
1417                 else\r
1418                         r = (int)p_SFTP_ReadStdOut(pSFTPData->Handle, buf, len);\r
1419         }\r
1420         else if(pSFTPData->Data == s)\r
1421         {\r
1422                 if(flags & MSG_PEEK)\r
1423                         r = (int)p_SFTP_PeekDataOut(pSFTPData->Handle, buf, len);\r
1424                 else\r
1425                         r = (int)p_SFTP_ReadDataOut(pSFTPData->Handle, buf, len);\r
1426         }\r
1427         return r;\r
1428 }\r
1429 \r
1430 BOOL SFTP_SetTimeoutCallback(SOCKET s, void* pCallback)\r
1431 {\r
1432         SFTPDATA* pSFTPData;\r
1433         if(!g_bPuTTYLoaded)\r
1434                 return FALSE;\r
1435         EnterCriticalSection(&g_PuTTYLock);\r
1436         pSFTPData = FindSFTPDataFromSocket(s);\r
1437         LeaveCriticalSection(&g_PuTTYLock);\r
1438         if(!pSFTPData)\r
1439                 return FALSE;\r
1440         return p_SFTP_SetTimeoutCallback(pSFTPData->Handle, pCallback);\r
1441 }\r
1442 \r
1443 // データ用の仮想的なソケットを取得\r
1444 // 識別子としてダミーのソケットを返す\r
1445 SOCKET SFTP_GetDataHandle(SOCKET s, int af, int type, int protocol)\r
1446 {\r
1447         SOCKET r;\r
1448         SFTPDATA* pSFTPData;\r
1449         if(!g_bPuTTYLoaded)\r
1450                 return INVALID_SOCKET;\r
1451         r = INVALID_SOCKET;\r
1452         EnterCriticalSection(&g_PuTTYLock);\r
1453         if(pSFTPData = FindSFTPDataFromSocket(s))\r
1454         {\r
1455                 r = socket(af, type, protocol);\r
1456                 pSFTPData->Data = r;\r
1457         }\r
1458         LeaveCriticalSection(&g_PuTTYLock);\r
1459         return r;\r
1460 }\r
1461 \r
1462 BOOL SFTP_SetFilePosition(SOCKET s, LONGLONG Position)\r
1463 {\r
1464         SFTPDATA* pSFTPData;\r
1465         if(!g_bPuTTYLoaded)\r
1466                 return FALSE;\r
1467         EnterCriticalSection(&g_PuTTYLock);\r
1468         pSFTPData = FindSFTPDataFromSocket(s);\r
1469         LeaveCriticalSection(&g_PuTTYLock);\r
1470         if(!pSFTPData)\r
1471                 return FALSE;\r
1472         return p_SFTP_SetFilePosition(pSFTPData->Handle, Position);\r
1473 }\r
1474 \r