OSDN Git Service

Update OpenSSL to 1.0.1g.
[ffftp/ffftp.git] / socketwrapper.c
1 // socketwrapper.c\r
2 // Copyright (C) 2011 Suguru Kawamoto\r
3 // ソケットラッパー\r
4 // socket関連関数をOpenSSL用に置換\r
5 // socket関連関数のIPv6対応\r
6 // コンパイルにはOpenSSLのヘッダーファイルが必要\r
7 // 実行にはOpenSSLのDLLが必要\r
8 \r
9 #include <ws2tcpip.h>\r
10 #include <windows.h>\r
11 #include <mmsystem.h>\r
12 #include <openssl/ssl.h>\r
13 \r
14 #include "socketwrapper.h"\r
15 #include "protectprocess.h"\r
16 #include "mbswrapper.h"\r
17 #include "punycode.h"\r
18 \r
19 // FTPS対応\r
20 \r
21 typedef void (__cdecl* _SSL_load_error_strings)();\r
22 typedef int (__cdecl* _SSL_library_init)();\r
23 typedef SSL_METHOD* (__cdecl* _SSLv23_method)();\r
24 typedef SSL_CTX* (__cdecl* _SSL_CTX_new)(SSL_METHOD*);\r
25 typedef void (__cdecl* _SSL_CTX_free)(SSL_CTX*);\r
26 typedef SSL* (__cdecl* _SSL_new)(SSL_CTX*);\r
27 typedef void (__cdecl* _SSL_free)(SSL*);\r
28 typedef int (__cdecl* _SSL_shutdown)(SSL*);\r
29 typedef int (__cdecl* _SSL_get_fd)(SSL*);\r
30 typedef int (__cdecl* _SSL_set_fd)(SSL*, int);\r
31 typedef int (__cdecl* _SSL_accept)(SSL*);\r
32 typedef int (__cdecl* _SSL_connect)(SSL*);\r
33 typedef int (__cdecl* _SSL_write)(SSL*, const void*, int);\r
34 typedef int (__cdecl* _SSL_peek)(SSL*, void*, int);\r
35 typedef int (__cdecl* _SSL_read)(SSL*, void*, int);\r
36 typedef int (__cdecl* _SSL_get_error)(SSL*, int);\r
37 typedef X509* (__cdecl* _SSL_get_peer_certificate)(const SSL*);\r
38 typedef long (__cdecl* _SSL_get_verify_result)(const SSL*);\r
39 typedef SSL_SESSION* (__cdecl* _SSL_get_session)(SSL*);\r
40 typedef int (__cdecl* _SSL_set_session)(SSL*, SSL_SESSION*);\r
41 typedef X509_STORE* (__cdecl* _SSL_CTX_get_cert_store)(const SSL_CTX*);\r
42 typedef long (__cdecl* _SSL_CTX_ctrl)(SSL_CTX*, int, long, void*);\r
43 typedef BIO_METHOD* (__cdecl* _BIO_s_mem)();\r
44 typedef BIO* (__cdecl* _BIO_new)(BIO_METHOD*);\r
45 typedef int (__cdecl* _BIO_free)(BIO*);\r
46 typedef BIO* (__cdecl* _BIO_new_mem_buf)(void*, int);\r
47 typedef long (__cdecl* _BIO_ctrl)(BIO*, int, long, void*);\r
48 typedef void (__cdecl* _X509_free)(X509*);\r
49 typedef int (__cdecl* _X509_print_ex)(BIO*, X509*, unsigned long, unsigned long);\r
50 typedef X509_NAME* (__cdecl* _X509_get_subject_name)(X509*);\r
51 typedef int (__cdecl* _X509_NAME_print_ex)(BIO*, X509_NAME*, int, unsigned long);\r
52 typedef X509* (__cdecl* _PEM_read_bio_X509)(BIO*, X509**, pem_password_cb*, void*);\r
53 typedef int (__cdecl* _X509_STORE_add_cert)(X509_STORE*, X509*);\r
54 \r
55 _SSL_load_error_strings p_SSL_load_error_strings;\r
56 _SSL_library_init p_SSL_library_init;\r
57 _SSLv23_method p_SSLv23_method;\r
58 _SSL_CTX_new p_SSL_CTX_new;\r
59 _SSL_CTX_free p_SSL_CTX_free;\r
60 _SSL_new p_SSL_new;\r
61 _SSL_free p_SSL_free;\r
62 _SSL_shutdown p_SSL_shutdown;\r
63 _SSL_get_fd p_SSL_get_fd;\r
64 _SSL_set_fd p_SSL_set_fd;\r
65 _SSL_accept p_SSL_accept;\r
66 _SSL_connect p_SSL_connect;\r
67 _SSL_write p_SSL_write;\r
68 _SSL_peek p_SSL_peek;\r
69 _SSL_read p_SSL_read;\r
70 _SSL_get_error p_SSL_get_error;\r
71 _SSL_get_peer_certificate p_SSL_get_peer_certificate;\r
72 _SSL_get_verify_result p_SSL_get_verify_result;\r
73 _SSL_get_session p_SSL_get_session;\r
74 _SSL_set_session p_SSL_set_session;\r
75 _SSL_CTX_get_cert_store p_SSL_CTX_get_cert_store;\r
76 _SSL_CTX_ctrl p_SSL_CTX_ctrl;\r
77 _BIO_s_mem p_BIO_s_mem;\r
78 _BIO_new p_BIO_new;\r
79 _BIO_free p_BIO_free;\r
80 _BIO_new_mem_buf p_BIO_new_mem_buf;\r
81 _BIO_ctrl p_BIO_ctrl;\r
82 _X509_free p_X509_free;\r
83 _X509_print_ex p_X509_print_ex;\r
84 _X509_get_subject_name p_X509_get_subject_name;\r
85 _X509_NAME_print_ex p_X509_NAME_print_ex;\r
86 _PEM_read_bio_X509 p_PEM_read_bio_X509;\r
87 _X509_STORE_add_cert p_X509_STORE_add_cert;\r
88 \r
89 #define MAX_SSL_SOCKET 16\r
90 \r
91 BOOL g_bOpenSSLLoaded;\r
92 HMODULE g_hOpenSSL;\r
93 HMODULE g_hOpenSSLCommon;\r
94 CRITICAL_SECTION g_OpenSSLLock;\r
95 DWORD g_OpenSSLTimeout;\r
96 LPSSLTIMEOUTCALLBACK g_pOpenSSLTimeoutCallback;\r
97 LPSSLCONFIRMCALLBACK g_pOpenSSLConfirmCallback;\r
98 SSL_CTX* g_pOpenSSLCTX;\r
99 SSL* g_pOpenSSLHandle[MAX_SSL_SOCKET];\r
100 \r
101 BOOL __stdcall DefaultSSLTimeoutCallback(BOOL* pbAborted)\r
102 {\r
103         Sleep(100);\r
104         return *pbAborted;\r
105 }\r
106 \r
107 BOOL __stdcall DefaultSSLConfirmCallback(BOOL* pbAborted, BOOL bVerified, LPCSTR Certificate, LPCSTR CommonName)\r
108 {\r
109         return bVerified;\r
110 }\r
111 \r
112 // OpenSSLを初期化\r
113 BOOL LoadOpenSSL()\r
114 {\r
115         if(g_bOpenSSLLoaded)\r
116                 return FALSE;\r
117 #ifdef ENABLE_PROCESS_PROTECTION\r
118         // 同梱するOpenSSLのバージョンに合わせてSHA1ハッシュ値を変更すること\r
119         // ssleay32.dll 1.0.1g\r
120         RegisterTrustedModuleSHA1Hash("\xCB\xBA\x62\x61\x3C\x44\x1E\x94\xD2\xF4\xAD\xD5\x03\x43\x6F\x26\xD2\xAF\x2F\x21");\r
121         // libeay32.dll 1.0.1g\r
122         RegisterTrustedModuleSHA1Hash("\x4E\x53\x29\xC4\x32\x1B\x17\xA5\x4D\x40\xDF\x6F\xF6\xD2\x53\x7E\xBC\x54\x69\x1B");\r
123 #endif\r
124         g_hOpenSSL = LoadLibrary("ssleay32.dll");\r
125         // バージョン固定のためlibssl32.dllの読み込みは脆弱性の原因になり得るので廃止\r
126 //      if(!g_hOpenSSL)\r
127 //              g_hOpenSSL = LoadLibrary("libssl32.dll");\r
128         if(!g_hOpenSSL\r
129                 || !(p_SSL_load_error_strings = (_SSL_load_error_strings)GetProcAddress(g_hOpenSSL, "SSL_load_error_strings"))\r
130                 || !(p_SSL_library_init = (_SSL_library_init)GetProcAddress(g_hOpenSSL, "SSL_library_init"))\r
131                 || !(p_SSLv23_method = (_SSLv23_method)GetProcAddress(g_hOpenSSL, "SSLv23_method"))\r
132                 || !(p_SSL_CTX_new = (_SSL_CTX_new)GetProcAddress(g_hOpenSSL, "SSL_CTX_new"))\r
133                 || !(p_SSL_CTX_free = (_SSL_CTX_free)GetProcAddress(g_hOpenSSL, "SSL_CTX_free"))\r
134                 || !(p_SSL_new = (_SSL_new)GetProcAddress(g_hOpenSSL, "SSL_new"))\r
135                 || !(p_SSL_free = (_SSL_free)GetProcAddress(g_hOpenSSL, "SSL_free"))\r
136                 || !(p_SSL_shutdown = (_SSL_shutdown)GetProcAddress(g_hOpenSSL, "SSL_shutdown"))\r
137                 || !(p_SSL_get_fd = (_SSL_get_fd)GetProcAddress(g_hOpenSSL, "SSL_get_fd"))\r
138                 || !(p_SSL_set_fd = (_SSL_set_fd)GetProcAddress(g_hOpenSSL, "SSL_set_fd"))\r
139                 || !(p_SSL_accept = (_SSL_accept)GetProcAddress(g_hOpenSSL, "SSL_accept"))\r
140                 || !(p_SSL_connect = (_SSL_connect)GetProcAddress(g_hOpenSSL, "SSL_connect"))\r
141                 || !(p_SSL_write = (_SSL_write)GetProcAddress(g_hOpenSSL, "SSL_write"))\r
142                 || !(p_SSL_peek = (_SSL_peek)GetProcAddress(g_hOpenSSL, "SSL_peek"))\r
143                 || !(p_SSL_read = (_SSL_read)GetProcAddress(g_hOpenSSL, "SSL_read"))\r
144                 || !(p_SSL_get_error = (_SSL_get_error)GetProcAddress(g_hOpenSSL, "SSL_get_error"))\r
145                 || !(p_SSL_get_peer_certificate = (_SSL_get_peer_certificate)GetProcAddress(g_hOpenSSL, "SSL_get_peer_certificate"))\r
146                 || !(p_SSL_get_verify_result = (_SSL_get_verify_result)GetProcAddress(g_hOpenSSL, "SSL_get_verify_result"))\r
147                 || !(p_SSL_get_session = (_SSL_get_session)GetProcAddress(g_hOpenSSL, "SSL_get_session"))\r
148                 || !(p_SSL_set_session = (_SSL_set_session)GetProcAddress(g_hOpenSSL, "SSL_set_session"))\r
149                 || !(p_SSL_CTX_get_cert_store = (_SSL_CTX_get_cert_store)GetProcAddress(g_hOpenSSL, "SSL_CTX_get_cert_store"))\r
150                 || !(p_SSL_CTX_ctrl = (_SSL_CTX_ctrl)GetProcAddress(g_hOpenSSL, "SSL_CTX_ctrl")))\r
151         {\r
152                 if(g_hOpenSSL)\r
153                         FreeLibrary(g_hOpenSSL);\r
154                 g_hOpenSSL = NULL;\r
155                 return FALSE;\r
156         }\r
157         g_hOpenSSLCommon = LoadLibrary("libeay32.dll");\r
158         if(!g_hOpenSSLCommon\r
159                 || !(p_BIO_s_mem = (_BIO_s_mem)GetProcAddress(g_hOpenSSLCommon, "BIO_s_mem"))\r
160                 || !(p_BIO_new = (_BIO_new)GetProcAddress(g_hOpenSSLCommon, "BIO_new"))\r
161                 || !(p_BIO_free = (_BIO_free)GetProcAddress(g_hOpenSSLCommon, "BIO_free"))\r
162                 || !(p_BIO_new_mem_buf = (_BIO_new_mem_buf)GetProcAddress(g_hOpenSSLCommon, "BIO_new_mem_buf"))\r
163                 || !(p_BIO_ctrl = (_BIO_ctrl)GetProcAddress(g_hOpenSSLCommon, "BIO_ctrl"))\r
164                 || !(p_X509_free = (_X509_free)GetProcAddress(g_hOpenSSLCommon, "X509_free"))\r
165                 || !(p_X509_print_ex = (_X509_print_ex)GetProcAddress(g_hOpenSSLCommon, "X509_print_ex"))\r
166                 || !(p_X509_get_subject_name = (_X509_get_subject_name)GetProcAddress(g_hOpenSSLCommon, "X509_get_subject_name"))\r
167                 || !(p_X509_NAME_print_ex = (_X509_NAME_print_ex)GetProcAddress(g_hOpenSSLCommon, "X509_NAME_print_ex"))\r
168                 || !(p_PEM_read_bio_X509 = (_PEM_read_bio_X509)GetProcAddress(g_hOpenSSLCommon, "PEM_read_bio_X509"))\r
169                 || !(p_X509_STORE_add_cert = (_X509_STORE_add_cert)GetProcAddress(g_hOpenSSLCommon, "X509_STORE_add_cert")))\r
170         {\r
171                 if(g_hOpenSSL)\r
172                         FreeLibrary(g_hOpenSSL);\r
173                 g_hOpenSSL = NULL;\r
174                 if(g_hOpenSSLCommon)\r
175                         FreeLibrary(g_hOpenSSLCommon);\r
176                 g_hOpenSSLCommon = NULL;\r
177                 return FALSE;\r
178         }\r
179         InitializeCriticalSection(&g_OpenSSLLock);\r
180         p_SSL_load_error_strings();\r
181         p_SSL_library_init();\r
182         SetSSLTimeoutCallback(60000, DefaultSSLTimeoutCallback);\r
183         SetSSLConfirmCallback(DefaultSSLConfirmCallback);\r
184         g_bOpenSSLLoaded = TRUE;\r
185         return TRUE;\r
186 }\r
187 \r
188 // OpenSSLを解放\r
189 void FreeOpenSSL()\r
190 {\r
191         int i;\r
192         if(!g_bOpenSSLLoaded)\r
193                 return;\r
194         EnterCriticalSection(&g_OpenSSLLock);\r
195         for(i = 0; i < MAX_SSL_SOCKET; i++)\r
196         {\r
197                 if(g_pOpenSSLHandle[i])\r
198                 {\r
199                         p_SSL_shutdown(g_pOpenSSLHandle[i]);\r
200                         p_SSL_free(g_pOpenSSLHandle[i]);\r
201                         g_pOpenSSLHandle[i] = NULL;\r
202                 }\r
203         }\r
204         if(g_pOpenSSLCTX)\r
205                 p_SSL_CTX_free(g_pOpenSSLCTX);\r
206         g_pOpenSSLCTX = NULL;\r
207         FreeLibrary(g_hOpenSSL);\r
208         g_hOpenSSL = NULL;\r
209         FreeLibrary(g_hOpenSSLCommon);\r
210         g_hOpenSSLCommon = NULL;\r
211         LeaveCriticalSection(&g_OpenSSLLock);\r
212         DeleteCriticalSection(&g_OpenSSLLock);\r
213         g_bOpenSSLLoaded = FALSE;\r
214 }\r
215 \r
216 // OpenSSLが使用可能かどうか確認\r
217 BOOL IsOpenSSLLoaded()\r
218 {\r
219         return g_bOpenSSLLoaded;\r
220 }\r
221 \r
222 SSL** GetUnusedSSLPointer()\r
223 {\r
224         int i;\r
225         for(i = 0; i < MAX_SSL_SOCKET; i++)\r
226         {\r
227                 if(!g_pOpenSSLHandle[i])\r
228                         return &g_pOpenSSLHandle[i];\r
229         }\r
230         return NULL;\r
231 }\r
232 \r
233 SSL** FindSSLPointerFromSocket(SOCKET s)\r
234 {\r
235         int i;\r
236         for(i = 0; i < MAX_SSL_SOCKET; i++)\r
237         {\r
238                 if(g_pOpenSSLHandle[i])\r
239                 {\r
240                         if(p_SSL_get_fd(g_pOpenSSLHandle[i]) == s)\r
241                                 return &g_pOpenSSLHandle[i];\r
242                 }\r
243         }\r
244         return NULL;\r
245 }\r
246 \r
247 BOOL ConfirmSSLCertificate(SSL* pSSL, BOOL* pbAborted)\r
248 {\r
249         BOOL bResult;\r
250         BOOL bVerified;\r
251         char* pData;\r
252         char* pSubject;\r
253         X509* pX509;\r
254         BIO* pBIO;\r
255         long Length;\r
256         char* pBuffer;\r
257         char* pCN;\r
258         char* p;\r
259         bResult = FALSE;\r
260         bVerified = FALSE;\r
261         pData = NULL;\r
262         pSubject = NULL;\r
263         if(pX509 = p_SSL_get_peer_certificate(pSSL))\r
264         {\r
265                 if(pBIO = p_BIO_new(p_BIO_s_mem()))\r
266                 {\r
267                         p_X509_print_ex(pBIO, pX509, 0, XN_FLAG_RFC2253);\r
268                         if((Length = p_BIO_ctrl(pBIO, BIO_CTRL_INFO, 0, &pBuffer)) > 0)\r
269                         {\r
270                                 if(pData = (char*)malloc(Length + sizeof(char)))\r
271                                 {\r
272                                         memcpy(pData, pBuffer, Length);\r
273                                         *(char*)((size_t)pData + Length) = '\0';\r
274                                 }\r
275                         }\r
276                         p_BIO_free(pBIO);\r
277                 }\r
278                 if(pBIO = p_BIO_new(p_BIO_s_mem()))\r
279                 {\r
280                         p_X509_NAME_print_ex(pBIO, p_X509_get_subject_name(pX509), 0, XN_FLAG_RFC2253);\r
281                         if((Length = p_BIO_ctrl(pBIO, BIO_CTRL_INFO, 0, &pBuffer)) > 0)\r
282                         {\r
283                                 if(pSubject = (char*)malloc(Length + sizeof(char)))\r
284                                 {\r
285                                         memcpy(pSubject, pBuffer, Length);\r
286                                         *(char*)((size_t)pSubject + Length) = '\0';\r
287                                 }\r
288                         }\r
289                         p_BIO_free(pBIO);\r
290                 }\r
291                 p_X509_free(pX509);\r
292         }\r
293         if(pX509 && p_SSL_get_verify_result(pSSL) == X509_V_OK)\r
294                 bVerified = TRUE;\r
295         pCN = pSubject;\r
296         while(pCN)\r
297         {\r
298                 if(strncmp(pCN, "CN=", strlen("CN=")) == 0)\r
299                 {\r
300                         pCN += strlen("CN=");\r
301                         if(p = strchr(pCN, ','))\r
302                                 *p = '\0';\r
303                         break;\r
304                 }\r
305                 if(pCN = strchr(pCN, ','))\r
306                         pCN++;\r
307         }\r
308         bResult = g_pOpenSSLConfirmCallback(pbAborted, bVerified, pData, pCN);\r
309         if(pData)\r
310                 free(pData);\r
311         if(pSubject)\r
312                 free(pSubject);\r
313         return bResult;\r
314 }\r
315 \r
316 void SetSSLTimeoutCallback(DWORD Timeout, LPSSLTIMEOUTCALLBACK pCallback)\r
317 {\r
318         if(!g_bOpenSSLLoaded)\r
319                 return;\r
320         EnterCriticalSection(&g_OpenSSLLock);\r
321         g_OpenSSLTimeout = Timeout;\r
322         g_pOpenSSLTimeoutCallback = pCallback;\r
323         LeaveCriticalSection(&g_OpenSSLLock);\r
324 }\r
325 \r
326 void SetSSLConfirmCallback(LPSSLCONFIRMCALLBACK pCallback)\r
327 {\r
328         if(!g_bOpenSSLLoaded)\r
329                 return;\r
330         EnterCriticalSection(&g_OpenSSLLock);\r
331         g_pOpenSSLConfirmCallback = pCallback;\r
332         LeaveCriticalSection(&g_OpenSSLLock);\r
333 }\r
334 \r
335 // SSLルート証明書を設定\r
336 // PEM形式のみ指定可能\r
337 BOOL SetSSLRootCertificate(const void* pData, DWORD Length)\r
338 {\r
339         BOOL r;\r
340         X509_STORE* pStore;\r
341         BYTE* p;\r
342         BYTE* pBegin;\r
343         BYTE* pEnd;\r
344         BIO* pBIO;\r
345         X509* pX509;\r
346         if(!g_bOpenSSLLoaded)\r
347                 return FALSE;\r
348         r = FALSE;\r
349         EnterCriticalSection(&g_OpenSSLLock);\r
350         if(!g_pOpenSSLCTX)\r
351         {\r
352                 g_pOpenSSLCTX = p_SSL_CTX_new(p_SSLv23_method());\r
353                 p_SSL_CTX_ctrl(g_pOpenSSLCTX, SSL_CTRL_MODE, SSL_MODE_ENABLE_PARTIAL_WRITE | SSL_MODE_AUTO_RETRY, NULL);\r
354         }\r
355         if(g_pOpenSSLCTX)\r
356         {\r
357                 if(pStore = p_SSL_CTX_get_cert_store(g_pOpenSSLCTX))\r
358                 {\r
359                         p = (BYTE*)pData;\r
360                         pBegin = NULL;\r
361                         pEnd = NULL;\r
362                         while(Length > 0)\r
363                         {\r
364                                 if(!pBegin)\r
365                                 {\r
366                                         if(Length < 27)\r
367                                                 break;\r
368                                         if(memcmp(p, "-----BEGIN CERTIFICATE-----", 27) == 0)\r
369                                                 pBegin = p;\r
370                                 }\r
371                                 else if(!pEnd)\r
372                                 {\r
373                                         if(Length < 25)\r
374                                                 break;\r
375                                         if(memcmp(p, "-----END CERTIFICATE-----", 25) == 0)\r
376                                                 pEnd = p + 25;\r
377                                 }\r
378                                 if(pBegin && pEnd)\r
379                                 {\r
380                                         if(pBIO = p_BIO_new_mem_buf(pBegin, (int)((size_t)pEnd - (size_t)pBegin)))\r
381                                         {\r
382                                                 if(pX509 = p_PEM_read_bio_X509(pBIO, NULL, NULL, NULL))\r
383                                                 {\r
384                                                         if(p_X509_STORE_add_cert(pStore, pX509) == 1)\r
385                                                                 r = TRUE;\r
386                                                         p_X509_free(pX509);\r
387                                                 }\r
388                                                 p_BIO_free(pBIO);\r
389                                         }\r
390                                         pBegin = NULL;\r
391                                         pEnd = NULL;\r
392                                 }\r
393                                 p++;\r
394                                 Length--;\r
395                         }\r
396                 }\r
397         }\r
398         LeaveCriticalSection(&g_OpenSSLLock);\r
399         return r;\r
400 }\r
401 \r
402 // ワイルドカードの比較\r
403 // 主にSSL証明書のCN確認用\r
404 BOOL IsHostNameMatched(LPCSTR HostName, LPCSTR CommonName)\r
405 {\r
406         BOOL bResult;\r
407         const char* pAsterisk;\r
408         size_t BeforeAsterisk;\r
409         const char* pBeginAsterisk;\r
410         const char* pEndAsterisk;\r
411         const char* pDot;\r
412         bResult = FALSE;\r
413         if(HostName && CommonName)\r
414         {\r
415                 if(pAsterisk = strchr(CommonName, '*'))\r
416                 {\r
417                         BeforeAsterisk = ((size_t)pAsterisk - (size_t)CommonName) / sizeof(char);\r
418                         pBeginAsterisk = HostName + BeforeAsterisk;\r
419                         while(*pAsterisk == '*')\r
420                         {\r
421                                 pAsterisk++;\r
422                         }\r
423                         pEndAsterisk = HostName + strlen(HostName) - strlen(pAsterisk);\r
424                         // "*"より前は大文字小文字を無視して完全一致\r
425                         if(_strnicmp(HostName, CommonName, BeforeAsterisk) == 0)\r
426                         {\r
427                                 // "*"より後は大文字小文字を無視して完全一致\r
428                                 if(_stricmp(pEndAsterisk, pAsterisk) == 0)\r
429                                 {\r
430                                         // "*"と一致する範囲に"."が含まれてはならない\r
431                                         pDot = strchr(pBeginAsterisk, '.');\r
432                                         if(!pDot || pDot >= pEndAsterisk)\r
433                                                 bResult = TRUE;\r
434                                 }\r
435                         }\r
436                 }\r
437                 else if(_stricmp(HostName, CommonName) == 0)\r
438                         bResult = TRUE;\r
439         }\r
440         return bResult;\r
441 }\r
442 \r
443 // SSLセッションを開始\r
444 BOOL AttachSSL(SOCKET s, SOCKET parent, BOOL* pbAborted)\r
445 {\r
446         BOOL r;\r
447         DWORD Time;\r
448         SSL** ppSSL;\r
449         SSL** ppSSLParent;\r
450         SSL_SESSION* pSession;\r
451         int Return;\r
452         int Error;\r
453         if(!g_bOpenSSLLoaded)\r
454                 return FALSE;\r
455         r = FALSE;\r
456         Time = timeGetTime();\r
457         EnterCriticalSection(&g_OpenSSLLock);\r
458         if(!g_pOpenSSLCTX)\r
459         {\r
460                 g_pOpenSSLCTX = p_SSL_CTX_new(p_SSLv23_method());\r
461                 p_SSL_CTX_ctrl(g_pOpenSSLCTX, SSL_CTRL_MODE, SSL_MODE_ENABLE_PARTIAL_WRITE | SSL_MODE_AUTO_RETRY, NULL);\r
462         }\r
463         if(g_pOpenSSLCTX)\r
464         {\r
465                 if(ppSSL = GetUnusedSSLPointer())\r
466                 {\r
467                         if(*ppSSL = p_SSL_new(g_pOpenSSLCTX))\r
468                         {\r
469                                 if(p_SSL_set_fd(*ppSSL, s) != 0)\r
470                                 {\r
471                                         if(parent != INVALID_SOCKET)\r
472                                         {\r
473                                                 if(ppSSLParent = FindSSLPointerFromSocket(parent))\r
474                                                 {\r
475                                                         if(pSession = p_SSL_get_session(*ppSSLParent))\r
476                                                         {\r
477                                                                 if(p_SSL_set_session(*ppSSL, pSession) == 1)\r
478                                                                 {\r
479                                                                 }\r
480                                                         }\r
481                                                 }\r
482                                         }\r
483                                         // SSLのネゴシエーションには時間がかかる場合がある\r
484                                         r = TRUE;\r
485                                         while(r)\r
486                                         {\r
487                                                 Return = p_SSL_connect(*ppSSL);\r
488                                                 if(Return == 1)\r
489                                                         break;\r
490                                                 Error = p_SSL_get_error(*ppSSL, Return);\r
491                                                 if(Error == SSL_ERROR_WANT_READ || Error == SSL_ERROR_WANT_WRITE)\r
492                                                 {\r
493                                                         LeaveCriticalSection(&g_OpenSSLLock);\r
494                                                         if(g_pOpenSSLTimeoutCallback(pbAborted) || (g_OpenSSLTimeout > 0 && timeGetTime() - Time >= g_OpenSSLTimeout))\r
495                                                                 r = FALSE;\r
496                                                         EnterCriticalSection(&g_OpenSSLLock);\r
497                                                 }\r
498                                                 else\r
499                                                         r = FALSE;\r
500                                         }\r
501                                         if(r)\r
502                                         {\r
503                                                 if(ConfirmSSLCertificate(*ppSSL, pbAborted))\r
504                                                 {\r
505                                                 }\r
506                                                 else\r
507                                                 {\r
508                                                         LeaveCriticalSection(&g_OpenSSLLock);\r
509                                                         DetachSSL(s);\r
510                                                         r = FALSE;\r
511                                                         EnterCriticalSection(&g_OpenSSLLock);\r
512                                                 }\r
513                                         }\r
514                                         else\r
515                                         {\r
516                                                 LeaveCriticalSection(&g_OpenSSLLock);\r
517                                                 DetachSSL(s);\r
518                                                 EnterCriticalSection(&g_OpenSSLLock);\r
519                                         }\r
520                                 }\r
521                                 else\r
522                                 {\r
523                                         LeaveCriticalSection(&g_OpenSSLLock);\r
524                                         DetachSSL(s);\r
525                                         EnterCriticalSection(&g_OpenSSLLock);\r
526                                 }\r
527                         }\r
528                 }\r
529         }\r
530         LeaveCriticalSection(&g_OpenSSLLock);\r
531         return r;\r
532 }\r
533 \r
534 // SSLセッションを終了\r
535 BOOL DetachSSL(SOCKET s)\r
536 {\r
537         BOOL r;\r
538         SSL** ppSSL;\r
539         if(!g_bOpenSSLLoaded)\r
540                 return FALSE;\r
541         r = FALSE;\r
542         EnterCriticalSection(&g_OpenSSLLock);\r
543         if(ppSSL = FindSSLPointerFromSocket(s))\r
544         {\r
545                 p_SSL_shutdown(*ppSSL);\r
546                 p_SSL_free(*ppSSL);\r
547                 *ppSSL = NULL;\r
548                 r = TRUE;\r
549         }\r
550         LeaveCriticalSection(&g_OpenSSLLock);\r
551         return r;\r
552 }\r
553 \r
554 // SSLとしてマークされているか確認\r
555 // マークされていればTRUEを返す\r
556 BOOL IsSSLAttached(SOCKET s)\r
557 {\r
558         SSL** ppSSL;\r
559         if(!g_bOpenSSLLoaded)\r
560                 return FALSE;\r
561         EnterCriticalSection(&g_OpenSSLLock);\r
562         ppSSL = FindSSLPointerFromSocket(s);\r
563         LeaveCriticalSection(&g_OpenSSLLock);\r
564         if(!ppSSL)\r
565                 return FALSE;\r
566         return TRUE;\r
567 }\r
568 \r
569 SOCKET FTPS_socket(int af, int type, int protocol)\r
570 {\r
571         return socket(af, type, protocol);\r
572 }\r
573 \r
574 int FTPS_bind(SOCKET s, const struct sockaddr *addr, int namelen)\r
575 {\r
576         return bind(s, addr, namelen);\r
577 }\r
578 \r
579 int FTPS_listen(SOCKET s, int backlog)\r
580 {\r
581         return listen(s, backlog);\r
582 }\r
583 \r
584 // accept相当の関数\r
585 // ただし初めからSSLのネゴシエーションを行う\r
586 SOCKET FTPS_accept(SOCKET s, struct sockaddr *addr, int *addrlen)\r
587 {\r
588         SOCKET r;\r
589         BOOL bAborted;\r
590         r = accept(s, addr, addrlen);\r
591         bAborted = FALSE;\r
592         if(!AttachSSL(r, INVALID_SOCKET, &bAborted))\r
593         {\r
594                 closesocket(r);\r
595                 return INVALID_SOCKET;\r
596         }\r
597         return r;\r
598 }\r
599 \r
600 // connect相当の関数\r
601 // ただし初めからSSLのネゴシエーションを行う\r
602 int FTPS_connect(SOCKET s, const struct sockaddr *name, int namelen)\r
603 {\r
604         int r;\r
605         BOOL bAborted;\r
606         r = connect(s, name, namelen);\r
607         bAborted = FALSE;\r
608         if(!AttachSSL(r, INVALID_SOCKET, &bAborted))\r
609                 return SOCKET_ERROR;\r
610         return r;\r
611 }\r
612 \r
613 // closesocket相当の関数\r
614 int FTPS_closesocket(SOCKET s)\r
615 {\r
616         DetachSSL(s);\r
617         return closesocket(s);\r
618 }\r
619 \r
620 // send相当の関数\r
621 int FTPS_send(SOCKET s, const char * buf, int len, int flags)\r
622 {\r
623         int r;\r
624         SSL** ppSSL;\r
625         if(!g_bOpenSSLLoaded)\r
626                 return send(s, buf, len, flags);\r
627         EnterCriticalSection(&g_OpenSSLLock);\r
628         ppSSL = FindSSLPointerFromSocket(s);\r
629         LeaveCriticalSection(&g_OpenSSLLock);\r
630         if(!ppSSL)\r
631                 return send(s, buf, len, flags);\r
632         r = p_SSL_write(*ppSSL, buf, len);\r
633         if(r < 0)\r
634                 return SOCKET_ERROR;\r
635         return r;\r
636 }\r
637 \r
638 // recv相当の関数\r
639 int FTPS_recv(SOCKET s, char * buf, int len, int flags)\r
640 {\r
641         int r;\r
642         SSL** ppSSL;\r
643         if(!g_bOpenSSLLoaded)\r
644                 return recv(s, buf, len, flags);\r
645         EnterCriticalSection(&g_OpenSSLLock);\r
646         ppSSL = FindSSLPointerFromSocket(s);\r
647         LeaveCriticalSection(&g_OpenSSLLock);\r
648         if(!ppSSL)\r
649                 return recv(s, buf, len, flags);\r
650         if(flags & MSG_PEEK)\r
651                 r = p_SSL_peek(*ppSSL, buf, len);\r
652         else\r
653                 r = p_SSL_read(*ppSSL, buf, len);\r
654         if(r < 0)\r
655                 return SOCKET_ERROR;\r
656         return r;\r
657 }\r
658 \r
659 // IPv6対応\r
660 \r
661 const struct in6_addr IN6ADDR_NONE = {{0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}};\r
662 \r
663 typedef struct\r
664 {\r
665         HANDLE h;\r
666         HWND hWnd;\r
667         u_int wMsg;\r
668         char * name;\r
669         char * buf;\r
670         int buflen;\r
671         short Family;\r
672 } GETHOSTBYNAMEDATA;\r
673 \r
674 DWORD WINAPI WSAAsyncGetHostByNameIPv6ThreadProc(LPVOID lpParameter)\r
675 {\r
676         GETHOSTBYNAMEDATA* pData;\r
677         struct hostent* pHost;\r
678         struct addrinfo* pAddr;\r
679         struct addrinfo* p;\r
680         pHost = NULL;\r
681         pData = (GETHOSTBYNAMEDATA*)lpParameter;\r
682         if(getaddrinfo(pData->name, NULL, NULL, &pAddr) == 0)\r
683         {\r
684                 p = pAddr;\r
685                 while(p)\r
686                 {\r
687                         if(p->ai_family == pData->Family)\r
688                         {\r
689                                 switch(p->ai_family)\r
690                                 {\r
691                                 case AF_INET:\r
692                                         pHost = (struct hostent*)pData->buf;\r
693                                         if((size_t)pData->buflen >= sizeof(struct hostent) + sizeof(char*) * 2 + sizeof(struct in_addr)\r
694                                                 && p->ai_addrlen >= sizeof(struct sockaddr_in))\r
695                                         {\r
696                                                 pHost->h_name = NULL;\r
697                                                 pHost->h_aliases = NULL;\r
698                                                 pHost->h_addrtype = p->ai_family;\r
699                                                 pHost->h_length = sizeof(struct in_addr);\r
700                                                 pHost->h_addr_list = (char**)(&pHost[1]);\r
701                                                 pHost->h_addr_list[0] = (char*)(&pHost->h_addr_list[2]);\r
702                                                 pHost->h_addr_list[1] = NULL;\r
703                                                 memcpy(pHost->h_addr_list[0], &((struct sockaddr_in*)p->ai_addr)->sin_addr, sizeof(struct in_addr));\r
704                                                 PostMessage(pData->hWnd, pData->wMsg, (WPARAM)pData->h, (LPARAM)(sizeof(struct hostent) + sizeof(char*) * 2 + sizeof(struct in_addr)));\r
705                                         }\r
706                                         else\r
707                                                 PostMessage(pData->hWnd, pData->wMsg, (WPARAM)pData->h, (LPARAM)(WSAENOBUFS << 16));\r
708                                         break;\r
709                                 case AF_INET6:\r
710                                         pHost = (struct hostent*)pData->buf;\r
711                                         if((size_t)pData->buflen >= sizeof(struct hostent) + sizeof(char*) * 2 + sizeof(struct in6_addr)\r
712                                                 && p->ai_addrlen >= sizeof(struct sockaddr_in6))\r
713                                         {\r
714                                                 pHost->h_name = NULL;\r
715                                                 pHost->h_aliases = NULL;\r
716                                                 pHost->h_addrtype = p->ai_family;\r
717                                                 pHost->h_length = sizeof(struct in6_addr);\r
718                                                 pHost->h_addr_list = (char**)(&pHost[1]);\r
719                                                 pHost->h_addr_list[0] = (char*)(&pHost->h_addr_list[2]);\r
720                                                 pHost->h_addr_list[1] = NULL;\r
721                                                 memcpy(pHost->h_addr_list[0], &((struct sockaddr_in6*)p->ai_addr)->sin6_addr, sizeof(struct in6_addr));\r
722                                                 PostMessage(pData->hWnd, pData->wMsg, (WPARAM)pData->h, (LPARAM)(sizeof(struct hostent) + sizeof(char*) * 2 + sizeof(struct in6_addr)));\r
723                                         }\r
724                                         else\r
725                                                 PostMessage(pData->hWnd, pData->wMsg, (WPARAM)pData->h, (LPARAM)(WSAENOBUFS << 16));\r
726                                         break;\r
727                                 }\r
728                         }\r
729                         if(pHost)\r
730                                 break;\r
731                         p = p->ai_next;\r
732                 }\r
733                 if(!p)\r
734                         PostMessage(pData->hWnd, pData->wMsg, (WPARAM)pData->h, (LPARAM)(ERROR_INVALID_FUNCTION << 16));\r
735                 freeaddrinfo(pAddr);\r
736         }\r
737         else\r
738                 PostMessage(pData->hWnd, pData->wMsg, (WPARAM)pData->h, (LPARAM)(ERROR_INVALID_FUNCTION << 16));\r
739         // CreateThreadが返すハンドルが重複するのを回避\r
740         Sleep(10000);\r
741         CloseHandle(pData->h);\r
742         free(pData->name);\r
743         free(pData);\r
744         return 0;\r
745 }\r
746 \r
747 // IPv6対応のWSAAsyncGetHostByName相当の関数\r
748 // FamilyにはAF_INETまたはAF_INET6を指定可能\r
749 // ただしANSI用\r
750 HANDLE WSAAsyncGetHostByNameIPv6(HWND hWnd, u_int wMsg, const char * name, char * buf, int buflen, short Family)\r
751 {\r
752         HANDLE hResult;\r
753         GETHOSTBYNAMEDATA* pData;\r
754         hResult = NULL;\r
755         if(pData = malloc(sizeof(GETHOSTBYNAMEDATA)))\r
756         {\r
757                 pData->hWnd = hWnd;\r
758                 pData->wMsg = wMsg;\r
759                 if(pData->name = malloc(sizeof(char) * (strlen(name) + 1)))\r
760                 {\r
761                         strcpy(pData->name, name);\r
762                         pData->buf = buf;\r
763                         pData->buflen = buflen;\r
764                         pData->Family = Family;\r
765                         if(pData->h = CreateThread(NULL, 0, WSAAsyncGetHostByNameIPv6ThreadProc, pData, CREATE_SUSPENDED, NULL))\r
766                         {\r
767                                 ResumeThread(pData->h);\r
768                                 hResult = pData->h;\r
769                         }\r
770                 }\r
771         }\r
772         if(!hResult)\r
773         {\r
774                 if(pData)\r
775                 {\r
776                         if(pData->name)\r
777                                 free(pData->name);\r
778                         free(pData);\r
779                 }\r
780         }\r
781         return hResult;\r
782 }\r
783 \r
784 // WSAAsyncGetHostByNameIPv6用のWSACancelAsyncRequest相当の関数\r
785 int WSACancelAsyncRequestIPv6(HANDLE hAsyncTaskHandle)\r
786 {\r
787         int Result;\r
788         Result = SOCKET_ERROR;\r
789         if(TerminateThread(hAsyncTaskHandle, 0))\r
790         {\r
791                 CloseHandle(hAsyncTaskHandle);\r
792                 Result = 0;\r
793         }\r
794         return Result;\r
795 }\r
796 \r
797 char* AddressToStringIPv4(char* str, void* in)\r
798 {\r
799         char* pResult;\r
800         unsigned char* p;\r
801         pResult = str;\r
802         p = (unsigned char*)in;\r
803         sprintf(str, "%u.%u.%u.%u", p[0], p[1], p[2], p[3]);\r
804         return pResult;\r
805 }\r
806 \r
807 char* AddressToStringIPv6(char* str, void* in6)\r
808 {\r
809         char* pResult;\r
810         unsigned char* p;\r
811         int MaxZero;\r
812         int MaxZeroLen;\r
813         int i;\r
814         int j;\r
815         char Tmp[5];\r
816         pResult = str;\r
817         p = (unsigned char*)in6;\r
818         MaxZero = 8;\r
819         MaxZeroLen = 1;\r
820         for(i = 0; i < 8; i++)\r
821         {\r
822                 for(j = i; j < 8; j++)\r
823                 {\r
824                         if(p[j * 2] != 0 || p[j * 2 + 1] != 0)\r
825                                 break;\r
826                 }\r
827                 if(j - i > MaxZeroLen)\r
828                 {\r
829                         MaxZero = i;\r
830                         MaxZeroLen = j - i;\r
831                 }\r
832         }\r
833         strcpy(str, "");\r
834         for(i = 0; i < 8; i++)\r
835         {\r
836                 if(i == MaxZero)\r
837                 {\r
838                         if(i == 0)\r
839                                 strcat(str, ":");\r
840                         strcat(str, ":");\r
841                 }\r
842                 else if(i < MaxZero || i >= MaxZero + MaxZeroLen)\r
843                 {\r
844                         sprintf(Tmp, "%x", (((int)p[i * 2] & 0xff) << 8) | ((int)p[i * 2 + 1] & 0xff));\r
845                         strcat(str, Tmp);\r
846                         if(i < 7)\r
847                                 strcat(str, ":");\r
848                 }\r
849         }\r
850         return pResult;\r
851 }\r
852 \r
853 // IPv6対応のinet_ntoa相当の関数\r
854 // ただしANSI用\r
855 char* inet6_ntoa(struct in6_addr in6)\r
856 {\r
857         char* pResult;\r
858         static char Adrs[40];\r
859         pResult = NULL;\r
860         memset(Adrs, 0, sizeof(Adrs));\r
861         pResult = AddressToStringIPv6(Adrs, &in6);\r
862         return pResult;\r
863 }\r
864 \r
865 // IPv6対応のinet_addr相当の関数\r
866 // ただしANSI用\r
867 struct in6_addr inet6_addr(const char* cp)\r
868 {\r
869         struct in6_addr Result;\r
870         int AfterZero;\r
871         int i;\r
872         char* p;\r
873         memset(&Result, 0, sizeof(Result));\r
874         AfterZero = 0;\r
875         for(i = 0; i < 8; i++)\r
876         {\r
877                 if(!cp)\r
878                 {\r
879                         memcpy(&Result, &IN6ADDR_NONE, sizeof(struct in6_addr));\r
880                         break;\r
881                 }\r
882                 if(i >= AfterZero)\r
883                 {\r
884                         if(strncmp(cp, ":", 1) == 0)\r
885                         {\r
886                                 cp = cp + 1;\r
887                                 if(i == 0 && strncmp(cp, ":", 1) == 0)\r
888                                         cp = cp + 1;\r
889                                 p = (char*)cp;\r
890                                 AfterZero = 7;\r
891                                 while(p = strstr(p, ":"))\r
892                                 {\r
893                                         p = p + 1;\r
894                                         AfterZero--;\r
895                                 }\r
896                         }\r
897                         else\r
898                         {\r
899                                 Result.u.Word[i] = (USHORT)strtol(cp, &p, 16);\r
900                                 Result.u.Word[i] = ((Result.u.Word[i] & 0xff00) >> 8) | ((Result.u.Word[i] & 0x00ff) << 8);\r
901                                 if(strncmp(p, ":", 1) != 0 && strlen(p) > 0)\r
902                                 {\r
903                                         memcpy(&Result, &IN6ADDR_NONE, sizeof(struct in6_addr));\r
904                                         break;\r
905                                 }\r
906                                 if(cp = strstr(cp, ":"))\r
907                                         cp = cp + 1;\r
908                         }\r
909                 }\r
910         }\r
911         return Result;\r
912 }\r
913 \r
914 BOOL ConvertDomainNameToPunycode(LPSTR Output, DWORD Count, LPCSTR Input)\r
915 {\r
916         BOOL bResult;\r
917         punycode_uint* pUnicode;\r
918         punycode_uint* p;\r
919         BOOL bNeeded;\r
920         LPCSTR InputString;\r
921         punycode_uint Length;\r
922         punycode_uint OutputLength;\r
923         bResult = FALSE;\r
924         if(pUnicode = malloc(sizeof(punycode_uint) * strlen(Input)))\r
925         {\r
926                 p = pUnicode;\r
927                 bNeeded = FALSE;\r
928                 InputString = Input;\r
929                 Length = 0;\r
930                 while(*InputString != '\0')\r
931                 {\r
932                         *p = (punycode_uint)GetNextCharM(InputString, NULL, &InputString);\r
933                         if(*p >= 0x80)\r
934                                 bNeeded = TRUE;\r
935                         p++;\r
936                         Length++;\r
937                 }\r
938                 if(bNeeded)\r
939                 {\r
940                         if(Count >= strlen("xn--") + 1)\r
941                         {\r
942                                 strcpy(Output, "xn--");\r
943                                 OutputLength = Count - strlen("xn--");\r
944                                 if(punycode_encode(Length, pUnicode, NULL, (punycode_uint*)&OutputLength, Output + strlen("xn--")) == punycode_success)\r
945                                 {\r
946                                         Output[strlen("xn--") + OutputLength] = '\0';\r
947                                         bResult = TRUE;\r
948                                 }\r
949                         }\r
950                 }\r
951                 free(pUnicode);\r
952         }\r
953         if(!bResult)\r
954         {\r
955                 if(Count >= strlen(Input) + 1)\r
956                 {\r
957                         strcpy(Output, Input);\r
958                         bResult = TRUE;\r
959                 }\r
960         }\r
961         return bResult;\r
962 }\r
963 \r
964 BOOL ConvertNameToPunycode(LPSTR Output, LPCSTR Input)\r
965 {\r
966         BOOL bResult;\r
967         DWORD Length;\r
968         char* pm0;\r
969         char* pm1;\r
970         char* p;\r
971         char* pNext;\r
972         bResult = FALSE;\r
973         Length = strlen(Input);\r
974         if(pm0 = AllocateStringM(Length + 1))\r
975         {\r
976                 if(pm1 = AllocateStringM(Length * 4 + 1))\r
977                 {\r
978                         strcpy(pm0, Input);\r
979                         p = pm0;\r
980                         while(p)\r
981                         {\r
982                                 if(pNext = strchr(p, '.'))\r
983                                 {\r
984                                         *pNext = '\0';\r
985                                         pNext++;\r
986                                 }\r
987                                 if(ConvertDomainNameToPunycode(pm1, Length * 4, p))\r
988                                         strcat(Output, pm1);\r
989                                 if(pNext)\r
990                                         strcat(Output, ".");\r
991                                 p = pNext;\r
992                         }\r
993                         bResult = TRUE;\r
994                         FreeDuplicatedString(pm1);\r
995                 }\r
996                 FreeDuplicatedString(pm0);\r
997         }\r
998         return bResult;\r
999 }\r
1000 \r
1001 HANDLE WSAAsyncGetHostByNameM(HWND hWnd, u_int wMsg, const char * name, char * buf, int buflen)\r
1002 {\r
1003         HANDLE r = NULL;\r
1004         char* pa0 = NULL;\r
1005         if(pa0 = AllocateStringA(strlen(name) * 4))\r
1006         {\r
1007                 if(ConvertNameToPunycode(pa0, name))\r
1008                         r = WSAAsyncGetHostByName(hWnd, wMsg, pa0, buf, buflen);\r
1009         }\r
1010         FreeDuplicatedString(pa0);\r
1011         return r;\r
1012 }\r
1013 \r
1014 HANDLE WSAAsyncGetHostByNameIPv6M(HWND hWnd, u_int wMsg, const char * name, char * buf, int buflen, short Family)\r
1015 {\r
1016         HANDLE r = NULL;\r
1017         char* pa0 = NULL;\r
1018         if(pa0 = AllocateStringA(strlen(name) * 4))\r
1019         {\r
1020                 if(ConvertNameToPunycode(pa0, name))\r
1021                         r = WSAAsyncGetHostByNameIPv6(hWnd, wMsg, pa0, buf, buflen, Family);\r
1022         }\r
1023         FreeDuplicatedString(pa0);\r
1024         return r;\r
1025 }\r
1026 \r
1027 // SFTP対応\r
1028 \r
1029 typedef void* (__cdecl* _SFTP_Create)();\r
1030 typedef void (__cdecl* _SFTP_Destroy)(void*);\r
1031 typedef BOOL (__cdecl* _SFTP_IsExited)(void*);\r
1032 typedef BOOL (__cdecl* _SFTP_SetTimeoutCallback)(void*, void*);\r
1033 typedef size_t (__cdecl* _SFTP_PeekStdOut)(void*, void*, size_t);\r
1034 typedef size_t (__cdecl* _SFTP_ReadStdOut)(void*, void*, size_t);\r
1035 typedef size_t (__cdecl* _SFTP_WriteStdIn)(void*, const void*, size_t);\r
1036 typedef size_t (__cdecl* _SFTP_PeekDataOut)(void*, void*, size_t);\r
1037 typedef size_t (__cdecl* _SFTP_ReadDataOut)(void*, void*, size_t);\r
1038 typedef size_t (__cdecl* _SFTP_WriteDataIn)(void*, const void*, size_t);\r
1039 typedef BOOL (__cdecl* _SFTP_SetFilePosition)(void*, LONGLONG);\r
1040 \r
1041 _SFTP_Create p_SFTP_Create;\r
1042 _SFTP_Destroy p_SFTP_Destroy;\r
1043 _SFTP_IsExited p_SFTP_IsExited;\r
1044 _SFTP_SetTimeoutCallback p_SFTP_SetTimeoutCallback;\r
1045 _SFTP_PeekStdOut p_SFTP_PeekStdOut;\r
1046 _SFTP_ReadStdOut p_SFTP_ReadStdOut;\r
1047 _SFTP_WriteStdIn p_SFTP_WriteStdIn;\r
1048 _SFTP_PeekDataOut p_SFTP_PeekDataOut;\r
1049 _SFTP_ReadDataOut p_SFTP_ReadDataOut;\r
1050 _SFTP_WriteDataIn p_SFTP_WriteDataIn;\r
1051 _SFTP_SetFilePosition p_SFTP_SetFilePosition;\r
1052 \r
1053 typedef struct\r
1054 {\r
1055         SOCKET Control;\r
1056         SOCKET Data;\r
1057         void* Handle;\r
1058         char Host[1024];\r
1059         int Port;\r
1060         char User[1024];\r
1061         char Password[1024];\r
1062 } SFTPDATA;\r
1063 \r
1064 #define MAX_SFTP_SOCKET 16\r
1065 \r
1066 BOOL g_bPuTTYLoaded;\r
1067 HMODULE g_hPuTTY;\r
1068 CRITICAL_SECTION g_PuTTYLock;\r
1069 SFTPDATA g_SFTPData[MAX_SFTP_SOCKET];\r
1070 \r
1071 // PuTTYを初期化\r
1072 BOOL LoadPuTTY()\r
1073 {\r
1074         int i;\r
1075         if(g_bPuTTYLoaded)\r
1076                 return FALSE;\r
1077 #ifdef ENABLE_PROCESS_PROTECTION\r
1078         // ビルドしたputty.dllに合わせてSHA1ハッシュ値を変更すること\r
1079         RegisterTrustedModuleSHA1Hash("\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00");\r
1080 #endif\r
1081         // デバッグ用\r
1082 #ifdef _DEBUG\r
1083         {\r
1084                 char Path[MAX_PATH];\r
1085                 GetModuleFileName(NULL, Path, MAX_PATH);\r
1086                 strcpy(strrchr(Path, '\\'), "\\..\\putty\\Debug\\PuTTY.dll");\r
1087                 g_hPuTTY = LoadLibrary(Path);\r
1088         }\r
1089 #else\r
1090         g_hPuTTY = LoadLibrary("putty.dll");\r
1091 #endif\r
1092         if(!g_hPuTTY\r
1093                 || !(p_SFTP_Create = (_SFTP_Create)GetProcAddress(g_hPuTTY, "SFTP_Create"))\r
1094                 || !(p_SFTP_Destroy = (_SFTP_Destroy)GetProcAddress(g_hPuTTY, "SFTP_Destroy"))\r
1095                 || !(p_SFTP_IsExited = (_SFTP_IsExited)GetProcAddress(g_hPuTTY, "SFTP_IsExited"))\r
1096                 || !(p_SFTP_SetTimeoutCallback = (_SFTP_SetTimeoutCallback)GetProcAddress(g_hPuTTY, "SFTP_SetTimeoutCallback"))\r
1097                 || !(p_SFTP_PeekStdOut = (_SFTP_PeekStdOut)GetProcAddress(g_hPuTTY, "SFTP_PeekStdOut"))\r
1098                 || !(p_SFTP_ReadStdOut = (_SFTP_ReadStdOut)GetProcAddress(g_hPuTTY, "SFTP_ReadStdOut"))\r
1099                 || !(p_SFTP_WriteStdIn = (_SFTP_WriteStdIn)GetProcAddress(g_hPuTTY, "SFTP_WriteStdIn"))\r
1100                 || !(p_SFTP_PeekDataOut = (_SFTP_PeekDataOut)GetProcAddress(g_hPuTTY, "SFTP_PeekDataOut"))\r
1101                 || !(p_SFTP_ReadDataOut = (_SFTP_ReadDataOut)GetProcAddress(g_hPuTTY, "SFTP_ReadDataOut"))\r
1102                 || !(p_SFTP_WriteDataIn = (_SFTP_WriteDataIn)GetProcAddress(g_hPuTTY, "SFTP_WriteDataIn"))\r
1103                 || !(p_SFTP_SetFilePosition = (_SFTP_SetFilePosition)GetProcAddress(g_hPuTTY, "SFTP_SetFilePosition")))\r
1104         {\r
1105                 if(g_hPuTTY)\r
1106                         FreeLibrary(g_hPuTTY);\r
1107                 g_hPuTTY = NULL;\r
1108                 return FALSE;\r
1109         }\r
1110         for(i = 0; i < MAX_SFTP_SOCKET; i++)\r
1111         {\r
1112                 g_SFTPData[i].Control = INVALID_SOCKET;\r
1113                 g_SFTPData[i].Data = INVALID_SOCKET;\r
1114         }\r
1115         InitializeCriticalSection(&g_PuTTYLock);\r
1116         g_bPuTTYLoaded = TRUE;\r
1117         return TRUE;\r
1118 }\r
1119 \r
1120 // PuTTYを解放\r
1121 void FreePuTTY()\r
1122 {\r
1123         int i;\r
1124         if(!g_bPuTTYLoaded)\r
1125                 return;\r
1126         EnterCriticalSection(&g_PuTTYLock);\r
1127         for(i = 0; i < MAX_SFTP_SOCKET; i++)\r
1128         {\r
1129                 if(g_SFTPData[i].Control != INVALID_SOCKET)\r
1130                 {\r
1131                         closesocket(g_SFTPData[i].Control);\r
1132                         g_SFTPData[i].Control = INVALID_SOCKET;\r
1133                         p_SFTP_Destroy(g_SFTPData[i].Handle);\r
1134                 }\r
1135                 if(g_SFTPData[i].Data != INVALID_SOCKET)\r
1136                 {\r
1137                         closesocket(g_SFTPData[i].Data);\r
1138                         g_SFTPData[i].Data = INVALID_SOCKET;\r
1139                 }\r
1140         }\r
1141         FreeLibrary(g_hPuTTY);\r
1142         g_hPuTTY = NULL;\r
1143         LeaveCriticalSection(&g_PuTTYLock);\r
1144         DeleteCriticalSection(&g_PuTTYLock);\r
1145         g_bPuTTYLoaded = FALSE;\r
1146 }\r
1147 \r
1148 // PuTTYが使用可能かどうか確認\r
1149 BOOL IsPuTTYLoaded()\r
1150 {\r
1151         return g_bPuTTYLoaded;\r
1152 }\r
1153 \r
1154 SFTPDATA* GetUnusedSFTPData()\r
1155 {\r
1156         int i;\r
1157         for(i = 0; i < MAX_SFTP_SOCKET; i++)\r
1158         {\r
1159                 if(g_SFTPData[i].Control == INVALID_SOCKET)\r
1160                 {\r
1161                         memset(&g_SFTPData[i], 0, sizeof(SFTPDATA));\r
1162                         return &g_SFTPData[i];\r
1163                 }\r
1164         }\r
1165         return NULL;\r
1166 }\r
1167 \r
1168 SFTPDATA* FindSFTPDataFromSocket(SOCKET s)\r
1169 {\r
1170         int i;\r
1171         for(i = 0; i < MAX_SFTP_SOCKET; i++)\r
1172         {\r
1173                 if(g_SFTPData[i].Control == s || g_SFTPData[i].Data == s)\r
1174                         return &g_SFTPData[i];\r
1175         }\r
1176         return NULL;\r
1177 }\r
1178 \r
1179 // SFTPとしてマークされているか確認\r
1180 // マークされていればTRUEを返す\r
1181 BOOL IsSFTPAttached(SOCKET s)\r
1182 {\r
1183         SFTPDATA* pSFTPData;\r
1184         if(!g_bPuTTYLoaded)\r
1185                 return FALSE;\r
1186         EnterCriticalSection(&g_PuTTYLock);\r
1187         pSFTPData = FindSFTPDataFromSocket(s);\r
1188         LeaveCriticalSection(&g_PuTTYLock);\r
1189         if(!pSFTPData)\r
1190                 return FALSE;\r
1191         return TRUE;\r
1192 }\r
1193 \r
1194 // コントロール用の仮想的なソケットを取得\r
1195 // 識別子としてダミーのソケットを返す\r
1196 SOCKET SFTP_socket(int af, int type, int protocol)\r
1197 {\r
1198         SOCKET r;\r
1199         SFTPDATA* pSFTPData;\r
1200         if(!g_bPuTTYLoaded)\r
1201                 return INVALID_SOCKET;\r
1202         r = INVALID_SOCKET;\r
1203         EnterCriticalSection(&g_PuTTYLock);\r
1204         if(pSFTPData = GetUnusedSFTPData())\r
1205         {\r
1206                 r = socket(af, type, protocol);\r
1207                 pSFTPData->Control = r;\r
1208                 pSFTPData->Data = INVALID_SOCKET;\r
1209                 pSFTPData->Handle = p_SFTP_Create();\r
1210         }\r
1211         LeaveCriticalSection(&g_PuTTYLock);\r
1212         return r;\r
1213 }\r
1214 \r
1215 int SFTP_bind(SOCKET s, const struct sockaddr *addr, int namelen)\r
1216 {\r
1217         return SOCKET_ERROR;\r
1218 }\r
1219 \r
1220 int SFTP_listen(SOCKET s, int backlog)\r
1221 {\r
1222         return SOCKET_ERROR;\r
1223 }\r
1224 \r
1225 // accept相当の関数\r
1226 SOCKET SFTP_accept(SOCKET s, struct sockaddr *addr, int *addrlen)\r
1227 {\r
1228         return INVALID_SOCKET;\r
1229 }\r
1230 \r
1231 // connect相当の関数\r
1232 int SFTP_connect(SOCKET s, const struct sockaddr *name, int namelen)\r
1233 {\r
1234         SFTPDATA* pSFTPData;\r
1235         if(!g_bPuTTYLoaded)\r
1236                 return SOCKET_ERROR;\r
1237         EnterCriticalSection(&g_PuTTYLock);\r
1238         pSFTPData = FindSFTPDataFromSocket(s);\r
1239         LeaveCriticalSection(&g_PuTTYLock);\r
1240         if(!pSFTPData)\r
1241                 return SOCKET_ERROR;\r
1242         if(namelen == sizeof(struct sockaddr_in))\r
1243         {\r
1244         }\r
1245         else if(namelen == sizeof(struct sockaddr_in6))\r
1246         {\r
1247         }\r
1248         else\r
1249                 return SOCKET_ERROR;\r
1250         return 0;\r
1251 }\r
1252 \r
1253 // closesocket相当の関数\r
1254 int SFTP_closesocket(SOCKET s)\r
1255 {\r
1256         SFTPDATA* pSFTPData;\r
1257         if(!g_bPuTTYLoaded)\r
1258                 return SOCKET_ERROR;\r
1259         EnterCriticalSection(&g_PuTTYLock);\r
1260         if(pSFTPData = FindSFTPDataFromSocket(s))\r
1261         {\r
1262                 if(pSFTPData->Control == s)\r
1263                 {\r
1264                         pSFTPData->Control = INVALID_SOCKET;\r
1265                         p_SFTP_Destroy(pSFTPData->Handle);\r
1266                 }\r
1267                 if(pSFTPData->Data == s)\r
1268                         pSFTPData->Data = INVALID_SOCKET;\r
1269         }\r
1270         LeaveCriticalSection(&g_PuTTYLock);\r
1271         return closesocket(s);\r
1272 }\r
1273 \r
1274 // send相当の関数\r
1275 int SFTP_send(SOCKET s, const char * buf, int len, int flags)\r
1276 {\r
1277         int r;\r
1278         SFTPDATA* pSFTPData;\r
1279         if(!g_bPuTTYLoaded)\r
1280                 return SOCKET_ERROR;\r
1281         EnterCriticalSection(&g_PuTTYLock);\r
1282         pSFTPData = FindSFTPDataFromSocket(s);\r
1283         LeaveCriticalSection(&g_PuTTYLock);\r
1284         if(!pSFTPData)\r
1285                 return SOCKET_ERROR;\r
1286         if(p_SFTP_IsExited(pSFTPData->Handle))\r
1287                 return SOCKET_ERROR;\r
1288         r = SOCKET_ERROR;\r
1289         if(pSFTPData->Control == s)\r
1290                 r = (int)p_SFTP_WriteStdIn(pSFTPData->Handle, buf, len);\r
1291         else if(pSFTPData->Data == s)\r
1292                 r = (int)p_SFTP_WriteDataIn(pSFTPData->Handle, buf, len);\r
1293         return r;\r
1294 }\r
1295 \r
1296 // recv相当の関数\r
1297 int SFTP_recv(SOCKET s, char * buf, int len, int flags)\r
1298 {\r
1299         int r;\r
1300         SFTPDATA* pSFTPData;\r
1301         if(!g_bPuTTYLoaded)\r
1302                 return SOCKET_ERROR;\r
1303         EnterCriticalSection(&g_PuTTYLock);\r
1304         pSFTPData = FindSFTPDataFromSocket(s);\r
1305         LeaveCriticalSection(&g_PuTTYLock);\r
1306         if(!pSFTPData)\r
1307                 return SOCKET_ERROR;\r
1308         if(p_SFTP_IsExited(pSFTPData->Handle))\r
1309                 return SOCKET_ERROR;\r
1310         r = SOCKET_ERROR;\r
1311         if(pSFTPData->Control == s)\r
1312         {\r
1313                 if(flags & MSG_PEEK)\r
1314                         r = (int)p_SFTP_PeekStdOut(pSFTPData->Handle, buf, len);\r
1315                 else\r
1316                         r = (int)p_SFTP_ReadStdOut(pSFTPData->Handle, buf, len);\r
1317         }\r
1318         else if(pSFTPData->Data == s)\r
1319         {\r
1320                 if(flags & MSG_PEEK)\r
1321                         r = (int)p_SFTP_PeekDataOut(pSFTPData->Handle, buf, len);\r
1322                 else\r
1323                         r = (int)p_SFTP_ReadDataOut(pSFTPData->Handle, buf, len);\r
1324         }\r
1325         return r;\r
1326 }\r
1327 \r
1328 BOOL SFTP_SetTimeoutCallback(SOCKET s, void* pCallback)\r
1329 {\r
1330         SFTPDATA* pSFTPData;\r
1331         if(!g_bPuTTYLoaded)\r
1332                 return FALSE;\r
1333         EnterCriticalSection(&g_PuTTYLock);\r
1334         pSFTPData = FindSFTPDataFromSocket(s);\r
1335         LeaveCriticalSection(&g_PuTTYLock);\r
1336         if(!pSFTPData)\r
1337                 return FALSE;\r
1338         return p_SFTP_SetTimeoutCallback(pSFTPData->Handle, pCallback);\r
1339 }\r
1340 \r
1341 // データ用の仮想的なソケットを取得\r
1342 // 識別子としてダミーのソケットを返す\r
1343 SOCKET SFTP_GetDataHandle(SOCKET s, int af, int type, int protocol)\r
1344 {\r
1345         SOCKET r;\r
1346         SFTPDATA* pSFTPData;\r
1347         if(!g_bPuTTYLoaded)\r
1348                 return INVALID_SOCKET;\r
1349         r = INVALID_SOCKET;\r
1350         EnterCriticalSection(&g_PuTTYLock);\r
1351         if(pSFTPData = FindSFTPDataFromSocket(s))\r
1352         {\r
1353                 r = socket(af, type, protocol);\r
1354                 pSFTPData->Data = r;\r
1355         }\r
1356         LeaveCriticalSection(&g_PuTTYLock);\r
1357         return r;\r
1358 }\r
1359 \r
1360 BOOL SFTP_SetFilePosition(SOCKET s, LONGLONG Position)\r
1361 {\r
1362         SFTPDATA* pSFTPData;\r
1363         if(!g_bPuTTYLoaded)\r
1364                 return FALSE;\r
1365         EnterCriticalSection(&g_PuTTYLock);\r
1366         pSFTPData = FindSFTPDataFromSocket(s);\r
1367         LeaveCriticalSection(&g_PuTTYLock);\r
1368         if(!pSFTPData)\r
1369                 return FALSE;\r
1370         return p_SFTP_SetFilePosition(pSFTPData->Handle, Position);\r
1371 }\r
1372 \r