OSDN Git Service

Change to build OpenSSL by ourselves to support Windows XP and earlier.
[ffftp/ffftp.git] / socketwrapper.c
1 // socketwrapper.c\r
2 // Copyright (C) 2011 Suguru Kawamoto\r
3 // ソケットラッパー\r
4 // socket関連関数をOpenSSL用に置換\r
5 // socket関連関数のIPv6対応\r
6 // コンパイルにはOpenSSLのヘッダーファイルが必要\r
7 // 実行にはOpenSSLのDLLが必要\r
8 \r
9 #include <ws2tcpip.h>\r
10 #include <windows.h>\r
11 #include <mmsystem.h>\r
12 #include <openssl/ssl.h>\r
13 \r
14 #include "socketwrapper.h"\r
15 #include "protectprocess.h"\r
16 #include "mbswrapper.h"\r
17 #include "punycode.h"\r
18 \r
19 // FTPS対応\r
20 \r
21 typedef void (__cdecl* _SSL_load_error_strings)();\r
22 typedef int (__cdecl* _SSL_library_init)();\r
23 typedef SSL_METHOD* (__cdecl* _SSLv23_method)();\r
24 typedef SSL* (__cdecl* _SSL_new)(SSL_CTX*);\r
25 typedef void (__cdecl* _SSL_free)(SSL*);\r
26 typedef long (__cdecl* _SSL_ctrl)(SSL*, int, long, void*);\r
27 typedef int (__cdecl* _SSL_shutdown)(SSL*);\r
28 typedef int (__cdecl* _SSL_get_fd)(SSL*);\r
29 typedef int (__cdecl* _SSL_set_fd)(SSL*, int);\r
30 typedef int (__cdecl* _SSL_accept)(SSL*);\r
31 typedef int (__cdecl* _SSL_connect)(SSL*);\r
32 typedef int (__cdecl* _SSL_write)(SSL*, const void*, int);\r
33 typedef int (__cdecl* _SSL_peek)(SSL*, void*, int);\r
34 typedef int (__cdecl* _SSL_read)(SSL*, void*, int);\r
35 typedef int (__cdecl* _SSL_get_error)(SSL*, int);\r
36 typedef X509* (__cdecl* _SSL_get_peer_certificate)(const SSL*);\r
37 typedef long (__cdecl* _SSL_get_verify_result)(const SSL*);\r
38 typedef SSL_SESSION* (__cdecl* _SSL_get_session)(SSL*);\r
39 typedef int (__cdecl* _SSL_set_session)(SSL*, SSL_SESSION*);\r
40 typedef int (__cdecl* _SSL_set_cipher_list)(SSL*, const char*);\r
41 typedef SSL_CTX* (__cdecl* _SSL_CTX_new)(SSL_METHOD*);\r
42 typedef void (__cdecl* _SSL_CTX_free)(SSL_CTX*);\r
43 typedef X509_STORE* (__cdecl* _SSL_CTX_get_cert_store)(const SSL_CTX*);\r
44 typedef long (__cdecl* _SSL_CTX_ctrl)(SSL_CTX*, int, long, void*);\r
45 typedef BIO_METHOD* (__cdecl* _BIO_s_mem)();\r
46 typedef BIO* (__cdecl* _BIO_new)(BIO_METHOD*);\r
47 typedef int (__cdecl* _BIO_free)(BIO*);\r
48 typedef BIO* (__cdecl* _BIO_new_mem_buf)(void*, int);\r
49 typedef long (__cdecl* _BIO_ctrl)(BIO*, int, long, void*);\r
50 typedef void (__cdecl* _X509_free)(X509*);\r
51 typedef int (__cdecl* _X509_print_ex)(BIO*, X509*, unsigned long, unsigned long);\r
52 typedef X509_NAME* (__cdecl* _X509_get_subject_name)(X509*);\r
53 typedef int (__cdecl* _X509_NAME_print_ex)(BIO*, X509_NAME*, int, unsigned long);\r
54 typedef void (__cdecl* _X509_CRL_free)(X509_CRL*);\r
55 typedef EVP_PKEY* (__cdecl* _PEM_read_bio_PrivateKey)(BIO*, EVP_PKEY**, pem_password_cb*, void*);\r
56 typedef EVP_PKEY* (__cdecl* _PEM_read_bio_PUBKEY)(BIO*, EVP_PKEY**, pem_password_cb*, void*);\r
57 typedef X509* (__cdecl* _PEM_read_bio_X509)(BIO*, X509**, pem_password_cb*, void*);\r
58 typedef X509_CRL* (__cdecl* _PEM_read_bio_X509_CRL)(BIO*, X509_CRL**, pem_password_cb*, void*);\r
59 typedef int (__cdecl* _X509_STORE_add_cert)(X509_STORE*, X509*);\r
60 typedef int (__cdecl* _X509_STORE_add_crl)(X509_STORE*, X509_CRL*);\r
61 typedef void (__cdecl* _EVP_PKEY_free)(EVP_PKEY*);\r
62 typedef RSA* (__cdecl* _EVP_PKEY_get1_RSA)(EVP_PKEY*);\r
63 typedef void (__cdecl* _RSA_free)(RSA*);\r
64 typedef int (__cdecl* _RSA_size)(const RSA*);\r
65 typedef int (__cdecl* _RSA_private_encrypt)(int, const unsigned char*, unsigned char*, RSA*, int);\r
66 typedef int (__cdecl* _RSA_public_decrypt)(int, const unsigned char*, unsigned char*, RSA*, int);\r
67 typedef unsigned char* (__cdecl* _SHA1)(const unsigned char*, size_t, unsigned char*);\r
68 typedef unsigned char* (__cdecl* _SHA224)(const unsigned char*, size_t, unsigned char*);\r
69 typedef unsigned char* (__cdecl* _SHA256)(const unsigned char*, size_t, unsigned char*);\r
70 typedef unsigned char* (__cdecl* _SHA384)(const unsigned char*, size_t, unsigned char*);\r
71 typedef unsigned char* (__cdecl* _SHA512)(const unsigned char*, size_t, unsigned char*);\r
72 \r
73 _SSL_load_error_strings p_SSL_load_error_strings;\r
74 _SSL_library_init p_SSL_library_init;\r
75 _SSLv23_method p_SSLv23_method;\r
76 _SSL_new p_SSL_new;\r
77 _SSL_free p_SSL_free;\r
78 _SSL_ctrl p_SSL_ctrl;\r
79 _SSL_shutdown p_SSL_shutdown;\r
80 _SSL_get_fd p_SSL_get_fd;\r
81 _SSL_set_fd p_SSL_set_fd;\r
82 _SSL_accept p_SSL_accept;\r
83 _SSL_connect p_SSL_connect;\r
84 _SSL_write p_SSL_write;\r
85 _SSL_peek p_SSL_peek;\r
86 _SSL_read p_SSL_read;\r
87 _SSL_get_error p_SSL_get_error;\r
88 _SSL_get_peer_certificate p_SSL_get_peer_certificate;\r
89 _SSL_get_verify_result p_SSL_get_verify_result;\r
90 _SSL_get_session p_SSL_get_session;\r
91 _SSL_set_session p_SSL_set_session;\r
92 _SSL_set_cipher_list p_SSL_set_cipher_list;\r
93 _SSL_CTX_new p_SSL_CTX_new;\r
94 _SSL_CTX_free p_SSL_CTX_free;\r
95 _SSL_CTX_get_cert_store p_SSL_CTX_get_cert_store;\r
96 _SSL_CTX_ctrl p_SSL_CTX_ctrl;\r
97 _BIO_s_mem p_BIO_s_mem;\r
98 _BIO_new p_BIO_new;\r
99 _BIO_free p_BIO_free;\r
100 _BIO_new_mem_buf p_BIO_new_mem_buf;\r
101 _BIO_ctrl p_BIO_ctrl;\r
102 _X509_free p_X509_free;\r
103 _X509_print_ex p_X509_print_ex;\r
104 _X509_get_subject_name p_X509_get_subject_name;\r
105 _X509_NAME_print_ex p_X509_NAME_print_ex;\r
106 _X509_CRL_free p_X509_CRL_free;\r
107 _PEM_read_bio_PrivateKey p_PEM_read_bio_PrivateKey;\r
108 _PEM_read_bio_PUBKEY p_PEM_read_bio_PUBKEY;\r
109 _PEM_read_bio_X509 p_PEM_read_bio_X509;\r
110 _PEM_read_bio_X509_CRL p_PEM_read_bio_X509_CRL;\r
111 _X509_STORE_add_cert p_X509_STORE_add_cert;\r
112 _X509_STORE_add_crl p_X509_STORE_add_crl;\r
113 _EVP_PKEY_free p_EVP_PKEY_free;\r
114 _EVP_PKEY_get1_RSA p_EVP_PKEY_get1_RSA;\r
115 _RSA_free p_RSA_free;\r
116 _RSA_size p_RSA_size;\r
117 _RSA_private_encrypt p_RSA_private_encrypt;\r
118 _RSA_public_decrypt p_RSA_public_decrypt;\r
119 _SHA1 p_SHA1;\r
120 _SHA224 p_SHA224;\r
121 _SHA256 p_SHA256;\r
122 _SHA384 p_SHA384;\r
123 _SHA512 p_SHA512;\r
124 \r
125 #define MAX_SSL_SOCKET 16\r
126 \r
127 BOOL g_bOpenSSLLoaded;\r
128 HMODULE g_hOpenSSL;\r
129 HMODULE g_hOpenSSLCommon;\r
130 CRITICAL_SECTION g_OpenSSLLock;\r
131 DWORD g_OpenSSLTimeout;\r
132 LPSSLTIMEOUTCALLBACK g_pOpenSSLTimeoutCallback;\r
133 LPSSLCONFIRMCALLBACK g_pOpenSSLConfirmCallback;\r
134 SSL_CTX* g_pOpenSSLCTX;\r
135 SSL* g_pOpenSSLHandle[MAX_SSL_SOCKET];\r
136 \r
137 BOOL __stdcall DefaultSSLTimeoutCallback(BOOL* pbAborted)\r
138 {\r
139         Sleep(100);\r
140         return *pbAborted;\r
141 }\r
142 \r
143 BOOL __stdcall DefaultSSLConfirmCallback(BOOL* pbAborted, BOOL bVerified, LPCSTR Certificate, LPCSTR CommonName)\r
144 {\r
145         return bVerified;\r
146 }\r
147 \r
148 // OpenSSLを初期化\r
149 BOOL LoadOpenSSL()\r
150 {\r
151         if(g_bOpenSSLLoaded)\r
152                 return FALSE;\r
153 #ifdef ENABLE_PROCESS_PROTECTION\r
154         // 同梱するOpenSSLのバージョンに合わせてSHA1ハッシュ値を変更すること\r
155 #if defined(_M_IX86)\r
156         // ssleay32.dll 1.0.2d\r
157         RegisterTrustedModuleSHA1Hash("\x62\x0F\x18\x08\xDC\x7D\x84\xB5\xBF\xFE\x65\xF7\xEB\x02\x87\xF9\xE0\x0B\x9D\x0B");\r
158         // libeay32.dll 1.0.2d\r
159         RegisterTrustedModuleSHA1Hash("\x2E\x10\xA6\xD2\x3D\x94\x00\xB8\x87\x17\x6D\x12\xB5\x9A\x68\xE7\xFC\x11\xAC\x14");\r
160 #elif defined(_M_AMD64)\r
161         // ssleay32.dll 1.0.2d\r
162         RegisterTrustedModuleSHA1Hash("\xD1\xE2\xC3\xA0\xEB\x28\xD0\x15\x2E\x0E\x9E\x3E\xF5\xF7\x42\x45\x58\xA2\x5E\xD1");\r
163         // libeay32.dll 1.0.2d\r
164         RegisterTrustedModuleSHA1Hash("\xE4\x26\xA0\xC7\x95\xA3\x2B\x9A\x9A\x43\x6A\xA6\xEA\x00\x34\xAD\xBC\x63\x68\x46");\r
165 #endif\r
166 #endif\r
167         g_hOpenSSL = LoadLibrary("ssleay32.dll");\r
168         // バージョン固定のためlibssl32.dllの読み込みは脆弱性の原因になり得るので廃止\r
169 //      if(!g_hOpenSSL)\r
170 //              g_hOpenSSL = LoadLibrary("libssl32.dll");\r
171         if(!g_hOpenSSL\r
172                 || !(p_SSL_load_error_strings = (_SSL_load_error_strings)GetProcAddress(g_hOpenSSL, "SSL_load_error_strings"))\r
173                 || !(p_SSL_library_init = (_SSL_library_init)GetProcAddress(g_hOpenSSL, "SSL_library_init"))\r
174                 || !(p_SSLv23_method = (_SSLv23_method)GetProcAddress(g_hOpenSSL, "SSLv23_method"))\r
175                 || !(p_SSL_new = (_SSL_new)GetProcAddress(g_hOpenSSL, "SSL_new"))\r
176                 || !(p_SSL_free = (_SSL_free)GetProcAddress(g_hOpenSSL, "SSL_free"))\r
177                 || !(p_SSL_ctrl = (_SSL_ctrl)GetProcAddress(g_hOpenSSL, "SSL_ctrl"))\r
178                 || !(p_SSL_shutdown = (_SSL_shutdown)GetProcAddress(g_hOpenSSL, "SSL_shutdown"))\r
179                 || !(p_SSL_get_fd = (_SSL_get_fd)GetProcAddress(g_hOpenSSL, "SSL_get_fd"))\r
180                 || !(p_SSL_set_fd = (_SSL_set_fd)GetProcAddress(g_hOpenSSL, "SSL_set_fd"))\r
181                 || !(p_SSL_accept = (_SSL_accept)GetProcAddress(g_hOpenSSL, "SSL_accept"))\r
182                 || !(p_SSL_connect = (_SSL_connect)GetProcAddress(g_hOpenSSL, "SSL_connect"))\r
183                 || !(p_SSL_write = (_SSL_write)GetProcAddress(g_hOpenSSL, "SSL_write"))\r
184                 || !(p_SSL_peek = (_SSL_peek)GetProcAddress(g_hOpenSSL, "SSL_peek"))\r
185                 || !(p_SSL_read = (_SSL_read)GetProcAddress(g_hOpenSSL, "SSL_read"))\r
186                 || !(p_SSL_get_error = (_SSL_get_error)GetProcAddress(g_hOpenSSL, "SSL_get_error"))\r
187                 || !(p_SSL_get_peer_certificate = (_SSL_get_peer_certificate)GetProcAddress(g_hOpenSSL, "SSL_get_peer_certificate"))\r
188                 || !(p_SSL_get_verify_result = (_SSL_get_verify_result)GetProcAddress(g_hOpenSSL, "SSL_get_verify_result"))\r
189                 || !(p_SSL_get_session = (_SSL_get_session)GetProcAddress(g_hOpenSSL, "SSL_get_session"))\r
190                 || !(p_SSL_set_session = (_SSL_set_session)GetProcAddress(g_hOpenSSL, "SSL_set_session"))\r
191                 || !(p_SSL_set_cipher_list = (_SSL_set_cipher_list)GetProcAddress(g_hOpenSSL, "SSL_set_cipher_list"))\r
192                 || !(p_SSL_CTX_new = (_SSL_CTX_new)GetProcAddress(g_hOpenSSL, "SSL_CTX_new"))\r
193                 || !(p_SSL_CTX_free = (_SSL_CTX_free)GetProcAddress(g_hOpenSSL, "SSL_CTX_free"))\r
194                 || !(p_SSL_CTX_get_cert_store = (_SSL_CTX_get_cert_store)GetProcAddress(g_hOpenSSL, "SSL_CTX_get_cert_store"))\r
195                 || !(p_SSL_CTX_ctrl = (_SSL_CTX_ctrl)GetProcAddress(g_hOpenSSL, "SSL_CTX_ctrl")))\r
196         {\r
197                 if(g_hOpenSSL)\r
198                         FreeLibrary(g_hOpenSSL);\r
199                 g_hOpenSSL = NULL;\r
200                 return FALSE;\r
201         }\r
202         g_hOpenSSLCommon = LoadLibrary("libeay32.dll");\r
203         if(!g_hOpenSSLCommon\r
204                 || !(p_BIO_s_mem = (_BIO_s_mem)GetProcAddress(g_hOpenSSLCommon, "BIO_s_mem"))\r
205                 || !(p_BIO_new = (_BIO_new)GetProcAddress(g_hOpenSSLCommon, "BIO_new"))\r
206                 || !(p_BIO_free = (_BIO_free)GetProcAddress(g_hOpenSSLCommon, "BIO_free"))\r
207                 || !(p_BIO_new_mem_buf = (_BIO_new_mem_buf)GetProcAddress(g_hOpenSSLCommon, "BIO_new_mem_buf"))\r
208                 || !(p_BIO_ctrl = (_BIO_ctrl)GetProcAddress(g_hOpenSSLCommon, "BIO_ctrl"))\r
209                 || !(p_X509_free = (_X509_free)GetProcAddress(g_hOpenSSLCommon, "X509_free"))\r
210                 || !(p_X509_print_ex = (_X509_print_ex)GetProcAddress(g_hOpenSSLCommon, "X509_print_ex"))\r
211                 || !(p_X509_get_subject_name = (_X509_get_subject_name)GetProcAddress(g_hOpenSSLCommon, "X509_get_subject_name"))\r
212                 || !(p_X509_NAME_print_ex = (_X509_NAME_print_ex)GetProcAddress(g_hOpenSSLCommon, "X509_NAME_print_ex"))\r
213                 || !(p_X509_CRL_free = (_X509_CRL_free)GetProcAddress(g_hOpenSSLCommon, "X509_CRL_free"))\r
214                 || !(p_PEM_read_bio_PrivateKey = (_PEM_read_bio_PrivateKey)GetProcAddress(g_hOpenSSLCommon, "PEM_read_bio_PrivateKey"))\r
215                 || !(p_PEM_read_bio_PUBKEY = (_PEM_read_bio_PUBKEY)GetProcAddress(g_hOpenSSLCommon, "PEM_read_bio_PUBKEY"))\r
216                 || !(p_PEM_read_bio_X509 = (_PEM_read_bio_X509)GetProcAddress(g_hOpenSSLCommon, "PEM_read_bio_X509"))\r
217                 || !(p_PEM_read_bio_X509_CRL = (_PEM_read_bio_X509_CRL)GetProcAddress(g_hOpenSSLCommon, "PEM_read_bio_X509_CRL"))\r
218                 || !(p_X509_STORE_add_cert = (_X509_STORE_add_cert)GetProcAddress(g_hOpenSSLCommon, "X509_STORE_add_cert"))\r
219                 || !(p_X509_STORE_add_crl = (_X509_STORE_add_crl)GetProcAddress(g_hOpenSSLCommon, "X509_STORE_add_crl"))\r
220                 || !(p_EVP_PKEY_free = (_EVP_PKEY_free)GetProcAddress(g_hOpenSSLCommon, "EVP_PKEY_free"))\r
221                 || !(p_EVP_PKEY_get1_RSA = (_EVP_PKEY_get1_RSA)GetProcAddress(g_hOpenSSLCommon, "EVP_PKEY_get1_RSA"))\r
222                 || !(p_RSA_free = (_RSA_free)GetProcAddress(g_hOpenSSLCommon, "RSA_free"))\r
223                 || !(p_RSA_size = (_RSA_size)GetProcAddress(g_hOpenSSLCommon, "RSA_size"))\r
224                 || !(p_RSA_private_encrypt = (_RSA_private_encrypt)GetProcAddress(g_hOpenSSLCommon, "RSA_private_encrypt"))\r
225                 || !(p_RSA_public_decrypt = (_RSA_public_decrypt)GetProcAddress(g_hOpenSSLCommon, "RSA_public_decrypt"))\r
226                 || !(p_SHA1 = (_SHA1)GetProcAddress(g_hOpenSSLCommon, "SHA1"))\r
227                 || !(p_SHA224 = (_SHA224)GetProcAddress(g_hOpenSSLCommon, "SHA224"))\r
228                 || !(p_SHA256 = (_SHA256)GetProcAddress(g_hOpenSSLCommon, "SHA256"))\r
229                 || !(p_SHA384 = (_SHA384)GetProcAddress(g_hOpenSSLCommon, "SHA384"))\r
230                 || !(p_SHA512 = (_SHA512)GetProcAddress(g_hOpenSSLCommon, "SHA512")))\r
231         {\r
232                 if(g_hOpenSSL)\r
233                         FreeLibrary(g_hOpenSSL);\r
234                 g_hOpenSSL = NULL;\r
235                 if(g_hOpenSSLCommon)\r
236                         FreeLibrary(g_hOpenSSLCommon);\r
237                 g_hOpenSSLCommon = NULL;\r
238                 return FALSE;\r
239         }\r
240         InitializeCriticalSection(&g_OpenSSLLock);\r
241         p_SSL_load_error_strings();\r
242         p_SSL_library_init();\r
243         SetSSLTimeoutCallback(60000, DefaultSSLTimeoutCallback);\r
244         SetSSLConfirmCallback(DefaultSSLConfirmCallback);\r
245         g_bOpenSSLLoaded = TRUE;\r
246         return TRUE;\r
247 }\r
248 \r
249 // OpenSSLを解放\r
250 void FreeOpenSSL()\r
251 {\r
252         int i;\r
253         if(!g_bOpenSSLLoaded)\r
254                 return;\r
255         EnterCriticalSection(&g_OpenSSLLock);\r
256         for(i = 0; i < MAX_SSL_SOCKET; i++)\r
257         {\r
258                 if(g_pOpenSSLHandle[i])\r
259                 {\r
260                         p_SSL_shutdown(g_pOpenSSLHandle[i]);\r
261                         p_SSL_free(g_pOpenSSLHandle[i]);\r
262                         g_pOpenSSLHandle[i] = NULL;\r
263                 }\r
264         }\r
265         if(g_pOpenSSLCTX)\r
266                 p_SSL_CTX_free(g_pOpenSSLCTX);\r
267         g_pOpenSSLCTX = NULL;\r
268         FreeLibrary(g_hOpenSSL);\r
269         g_hOpenSSL = NULL;\r
270         FreeLibrary(g_hOpenSSLCommon);\r
271         g_hOpenSSLCommon = NULL;\r
272         LeaveCriticalSection(&g_OpenSSLLock);\r
273         DeleteCriticalSection(&g_OpenSSLLock);\r
274         g_bOpenSSLLoaded = FALSE;\r
275 }\r
276 \r
277 // OpenSSLが使用可能かどうか確認\r
278 BOOL IsOpenSSLLoaded()\r
279 {\r
280         return g_bOpenSSLLoaded;\r
281 }\r
282 \r
283 SSL** GetUnusedSSLPointer()\r
284 {\r
285         int i;\r
286         for(i = 0; i < MAX_SSL_SOCKET; i++)\r
287         {\r
288                 if(!g_pOpenSSLHandle[i])\r
289                         return &g_pOpenSSLHandle[i];\r
290         }\r
291         return NULL;\r
292 }\r
293 \r
294 SSL** FindSSLPointerFromSocket(SOCKET s)\r
295 {\r
296         int i;\r
297         for(i = 0; i < MAX_SSL_SOCKET; i++)\r
298         {\r
299                 if(g_pOpenSSLHandle[i])\r
300                 {\r
301                         if(p_SSL_get_fd(g_pOpenSSLHandle[i]) == s)\r
302                                 return &g_pOpenSSLHandle[i];\r
303                 }\r
304         }\r
305         return NULL;\r
306 }\r
307 \r
308 BOOL ConfirmSSLCertificate(SSL* pSSL, BOOL* pbAborted)\r
309 {\r
310         BOOL bResult;\r
311         BOOL bVerified;\r
312         char* pData;\r
313         char* pSubject;\r
314         X509* pX509;\r
315         BIO* pBIO;\r
316         long Length;\r
317         char* pBuffer;\r
318         char* pCN;\r
319         char* p;\r
320         bResult = FALSE;\r
321         bVerified = FALSE;\r
322         pData = NULL;\r
323         pSubject = NULL;\r
324         if(pX509 = p_SSL_get_peer_certificate(pSSL))\r
325         {\r
326                 if(pBIO = p_BIO_new(p_BIO_s_mem()))\r
327                 {\r
328                         p_X509_print_ex(pBIO, pX509, 0, XN_FLAG_RFC2253);\r
329                         if((Length = p_BIO_ctrl(pBIO, BIO_CTRL_INFO, 0, &pBuffer)) > 0)\r
330                         {\r
331                                 if(pData = (char*)malloc(Length + sizeof(char)))\r
332                                 {\r
333                                         memcpy(pData, pBuffer, Length);\r
334                                         *(char*)((size_t)pData + Length) = '\0';\r
335                                 }\r
336                         }\r
337                         p_BIO_free(pBIO);\r
338                 }\r
339                 if(pBIO = p_BIO_new(p_BIO_s_mem()))\r
340                 {\r
341                         p_X509_NAME_print_ex(pBIO, p_X509_get_subject_name(pX509), 0, XN_FLAG_RFC2253);\r
342                         if((Length = p_BIO_ctrl(pBIO, BIO_CTRL_INFO, 0, &pBuffer)) > 0)\r
343                         {\r
344                                 if(pSubject = (char*)malloc(Length + sizeof(char)))\r
345                                 {\r
346                                         memcpy(pSubject, pBuffer, Length);\r
347                                         *(char*)((size_t)pSubject + Length) = '\0';\r
348                                 }\r
349                         }\r
350                         p_BIO_free(pBIO);\r
351                 }\r
352                 p_X509_free(pX509);\r
353         }\r
354         if(pX509 && p_SSL_get_verify_result(pSSL) == X509_V_OK)\r
355                 bVerified = TRUE;\r
356         pCN = pSubject;\r
357         while(pCN)\r
358         {\r
359                 if(strncmp(pCN, "CN=", strlen("CN=")) == 0)\r
360                 {\r
361                         pCN += strlen("CN=");\r
362                         if(p = strchr(pCN, ','))\r
363                                 *p = '\0';\r
364                         break;\r
365                 }\r
366                 if(pCN = strchr(pCN, ','))\r
367                         pCN++;\r
368         }\r
369         bResult = g_pOpenSSLConfirmCallback(pbAborted, bVerified, pData, pCN);\r
370         if(pData)\r
371                 free(pData);\r
372         if(pSubject)\r
373                 free(pSubject);\r
374         return bResult;\r
375 }\r
376 \r
377 void SetSSLTimeoutCallback(DWORD Timeout, LPSSLTIMEOUTCALLBACK pCallback)\r
378 {\r
379         if(!g_bOpenSSLLoaded)\r
380                 return;\r
381         EnterCriticalSection(&g_OpenSSLLock);\r
382         g_OpenSSLTimeout = Timeout;\r
383         g_pOpenSSLTimeoutCallback = pCallback;\r
384         LeaveCriticalSection(&g_OpenSSLLock);\r
385 }\r
386 \r
387 void SetSSLConfirmCallback(LPSSLCONFIRMCALLBACK pCallback)\r
388 {\r
389         if(!g_bOpenSSLLoaded)\r
390                 return;\r
391         EnterCriticalSection(&g_OpenSSLLock);\r
392         g_pOpenSSLConfirmCallback = pCallback;\r
393         LeaveCriticalSection(&g_OpenSSLLock);\r
394 }\r
395 \r
396 // SSLルート証明書を設定\r
397 // PEM形式のみ指定可能\r
398 BOOL SetSSLRootCertificate(const void* pData, DWORD Length)\r
399 {\r
400         BOOL r;\r
401         X509_STORE* pStore;\r
402         BYTE* p;\r
403         BYTE* pBegin;\r
404         BYTE* pEnd;\r
405         DWORD Left;\r
406         BIO* pBIO;\r
407         X509* pX509;\r
408         X509_CRL* pX509_CRL;\r
409         if(!g_bOpenSSLLoaded)\r
410                 return FALSE;\r
411         r = FALSE;\r
412         EnterCriticalSection(&g_OpenSSLLock);\r
413         if(!g_pOpenSSLCTX)\r
414         {\r
415                 g_pOpenSSLCTX = p_SSL_CTX_new(p_SSLv23_method());\r
416                 p_SSL_CTX_ctrl(g_pOpenSSLCTX, SSL_CTRL_MODE, SSL_MODE_ENABLE_PARTIAL_WRITE | SSL_MODE_AUTO_RETRY, NULL);\r
417         }\r
418         if(g_pOpenSSLCTX)\r
419         {\r
420                 if(pStore = p_SSL_CTX_get_cert_store(g_pOpenSSLCTX))\r
421                 {\r
422                         p = (BYTE*)pData;\r
423                         pBegin = NULL;\r
424                         pEnd = NULL;\r
425                         Left = Length;\r
426                         while(Left > 0)\r
427                         {\r
428                                 if(!pBegin)\r
429                                 {\r
430                                         if(Left < 27)\r
431                                                 break;\r
432                                         if(memcmp(p, "-----BEGIN CERTIFICATE-----", 27) == 0)\r
433                                                 pBegin = p;\r
434                                 }\r
435                                 else if(!pEnd)\r
436                                 {\r
437                                         if(Left < 25)\r
438                                                 break;\r
439                                         if(memcmp(p, "-----END CERTIFICATE-----", 25) == 0)\r
440                                                 pEnd = p + 25;\r
441                                 }\r
442                                 if(pBegin && pEnd)\r
443                                 {\r
444                                         if(pBIO = p_BIO_new_mem_buf(pBegin, (int)((size_t)pEnd - (size_t)pBegin)))\r
445                                         {\r
446                                                 if(pX509 = p_PEM_read_bio_X509(pBIO, NULL, NULL, NULL))\r
447                                                 {\r
448                                                         if(p_X509_STORE_add_cert(pStore, pX509) == 1)\r
449                                                                 r = TRUE;\r
450                                                         p_X509_free(pX509);\r
451                                                 }\r
452                                                 p_BIO_free(pBIO);\r
453                                         }\r
454                                         pBegin = NULL;\r
455                                         pEnd = NULL;\r
456                                 }\r
457                                 p++;\r
458                                 Left--;\r
459                         }\r
460                         p = (BYTE*)pData;\r
461                         pBegin = NULL;\r
462                         pEnd = NULL;\r
463                         Left = Length;\r
464                         while(Left > 0)\r
465                         {\r
466                                 if(!pBegin)\r
467                                 {\r
468                                         if(Left < 24)\r
469                                                 break;\r
470                                         if(memcmp(p, "-----BEGIN X509 CRL-----", 24) == 0)\r
471                                                 pBegin = p;\r
472                                 }\r
473                                 else if(!pEnd)\r
474                                 {\r
475                                         if(Left < 22)\r
476                                                 break;\r
477                                         if(memcmp(p, "-----END X509 CRL-----", 22) == 0)\r
478                                                 pEnd = p + 22;\r
479                                 }\r
480                                 if(pBegin && pEnd)\r
481                                 {\r
482                                         if(pBIO = p_BIO_new_mem_buf(pBegin, (int)((size_t)pEnd - (size_t)pBegin)))\r
483                                         {\r
484                                                 if(pX509_CRL = p_PEM_read_bio_X509_CRL(pBIO, NULL, NULL, NULL))\r
485                                                 {\r
486                                                         if(p_X509_STORE_add_crl(pStore, pX509_CRL) == 1)\r
487                                                                 r = TRUE;\r
488                                                         p_X509_CRL_free(pX509_CRL);\r
489                                                 }\r
490                                                 p_BIO_free(pBIO);\r
491                                         }\r
492                                         pBegin = NULL;\r
493                                         pEnd = NULL;\r
494                                 }\r
495                                 p++;\r
496                                 Left--;\r
497                         }\r
498                 }\r
499         }\r
500         LeaveCriticalSection(&g_OpenSSLLock);\r
501         return r;\r
502 }\r
503 \r
504 // ワイルドカードの比較\r
505 // 主にSSL証明書のCN確認用\r
506 BOOL IsHostNameMatched(LPCSTR HostName, LPCSTR CommonName)\r
507 {\r
508         BOOL bResult;\r
509         const char* pAsterisk;\r
510         size_t BeforeAsterisk;\r
511         const char* pBeginAsterisk;\r
512         const char* pEndAsterisk;\r
513         const char* pDot;\r
514         bResult = FALSE;\r
515         if(HostName && CommonName)\r
516         {\r
517                 if(pAsterisk = strchr(CommonName, '*'))\r
518                 {\r
519                         BeforeAsterisk = ((size_t)pAsterisk - (size_t)CommonName) / sizeof(char);\r
520                         pBeginAsterisk = HostName + BeforeAsterisk;\r
521                         while(*pAsterisk == '*')\r
522                         {\r
523                                 pAsterisk++;\r
524                         }\r
525                         pEndAsterisk = HostName + strlen(HostName) - strlen(pAsterisk);\r
526                         // "*"より前は大文字小文字を無視して完全一致\r
527                         if(_strnicmp(HostName, CommonName, BeforeAsterisk) == 0)\r
528                         {\r
529                                 // "*"より後は大文字小文字を無視して完全一致\r
530                                 if(_stricmp(pEndAsterisk, pAsterisk) == 0)\r
531                                 {\r
532                                         // "*"と一致する範囲に"."が含まれてはならない\r
533                                         pDot = strchr(pBeginAsterisk, '.');\r
534                                         if(!pDot || pDot >= pEndAsterisk)\r
535                                                 bResult = TRUE;\r
536                                 }\r
537                         }\r
538                 }\r
539                 else if(_stricmp(HostName, CommonName) == 0)\r
540                         bResult = TRUE;\r
541         }\r
542         return bResult;\r
543 }\r
544 \r
545 #pragma warning(push)\r
546 #pragma warning(disable:4090)\r
547 \r
548 // RSA暗号化\r
549 BOOL EncryptSignature(const char* PrivateKey, const char* Password, const void* pIn, DWORD InLength, void* pOut, DWORD OutLength, DWORD* pOutLength)\r
550 {\r
551         BOOL bResult;\r
552         BIO* pBIO;\r
553         EVP_PKEY* pPKEY;\r
554         RSA* pRSA;\r
555         int i;\r
556         if(!g_bOpenSSLLoaded)\r
557                 return FALSE;\r
558         bResult = FALSE;\r
559         if(pBIO = p_BIO_new_mem_buf((void*)PrivateKey, sizeof(char) * strlen(PrivateKey)))\r
560         {\r
561                 if(pPKEY = p_PEM_read_bio_PrivateKey(pBIO, NULL, NULL, (void*)Password))\r
562                 {\r
563                         if(pRSA = p_EVP_PKEY_get1_RSA(pPKEY))\r
564                         {\r
565                                 if(p_RSA_size(pRSA) <= (int)OutLength)\r
566                                 {\r
567                                         i = p_RSA_private_encrypt((int)InLength, (const unsigned char*)pIn, (unsigned char*)pOut, pRSA, RSA_PKCS1_PADDING);\r
568                                         if(i >= 0)\r
569                                         {\r
570                                                 *pOutLength = (DWORD)i;\r
571                                                 bResult = TRUE;\r
572                                         }\r
573                                 }\r
574                                 p_RSA_free(pRSA);\r
575                         }\r
576                         p_EVP_PKEY_free(pPKEY);\r
577                 }\r
578                 p_BIO_free(pBIO);\r
579         }\r
580         return bResult;\r
581 }\r
582 \r
583 // RSA復号化\r
584 // 主に自動更新ファイルのハッシュの改竄確認\r
585 BOOL DecryptSignature(const char* PublicKey, const char* Password, const void* pIn, DWORD InLength, void* pOut, DWORD OutLength, DWORD* pOutLength)\r
586 {\r
587         BOOL bResult;\r
588         BIO* pBIO;\r
589         EVP_PKEY* pPKEY;\r
590         RSA* pRSA;\r
591         int i;\r
592         if(!g_bOpenSSLLoaded)\r
593                 return FALSE;\r
594         bResult = FALSE;\r
595         if(pBIO = p_BIO_new_mem_buf((void*)PublicKey, sizeof(char) * strlen(PublicKey)))\r
596         {\r
597                 if(pPKEY = p_PEM_read_bio_PUBKEY(pBIO, NULL, NULL, Password))\r
598                 {\r
599                         if(pRSA = p_EVP_PKEY_get1_RSA(pPKEY))\r
600                         {\r
601                                 if(p_RSA_size(pRSA) <= (int)OutLength)\r
602                                 {\r
603                                         i = p_RSA_public_decrypt((int)InLength, (const unsigned char*)pIn, (unsigned char*)pOut, pRSA, RSA_PKCS1_PADDING);\r
604                                         if(i >= 0)\r
605                                         {\r
606                                                 *pOutLength = (DWORD)i;\r
607                                                 bResult = TRUE;\r
608                                         }\r
609                                 }\r
610                                 p_RSA_free(pRSA);\r
611                         }\r
612                         p_EVP_PKEY_free(pPKEY);\r
613                 }\r
614                 p_BIO_free(pBIO);\r
615         }\r
616         return bResult;\r
617 }\r
618 \r
619 #pragma warning(pop)\r
620 \r
621 // ハッシュ計算\r
622 // 他にも同等の関数はあるが主にマルウェア対策のための冗長化\r
623 BOOL GetHashSHA1(const void* pData, DWORD Size, void* pHash)\r
624 {\r
625         if(!g_bOpenSSLLoaded)\r
626                 return FALSE;\r
627         p_SHA1((const unsigned char*)pData, (size_t)Size, (unsigned char*)pHash);\r
628         return TRUE;\r
629 }\r
630 \r
631 BOOL GetHashSHA224(const void* pData, DWORD Size, void* pHash)\r
632 {\r
633         if(!g_bOpenSSLLoaded)\r
634                 return FALSE;\r
635         p_SHA224((const unsigned char*)pData, (size_t)Size, (unsigned char*)pHash);\r
636         return TRUE;\r
637 }\r
638 \r
639 BOOL GetHashSHA256(const void* pData, DWORD Size, void* pHash)\r
640 {\r
641         if(!g_bOpenSSLLoaded)\r
642                 return FALSE;\r
643         p_SHA256((const unsigned char*)pData, (size_t)Size, (unsigned char*)pHash);\r
644         return TRUE;\r
645 }\r
646 \r
647 BOOL GetHashSHA384(const void* pData, DWORD Size, void* pHash)\r
648 {\r
649         if(!g_bOpenSSLLoaded)\r
650                 return FALSE;\r
651         p_SHA384((const unsigned char*)pData, (size_t)Size, (unsigned char*)pHash);\r
652         return TRUE;\r
653 }\r
654 \r
655 BOOL GetHashSHA512(const void* pData, DWORD Size, void* pHash)\r
656 {\r
657         if(!g_bOpenSSLLoaded)\r
658                 return FALSE;\r
659         p_SHA512((const unsigned char*)pData, (size_t)Size, (unsigned char*)pHash);\r
660         return TRUE;\r
661 }\r
662 \r
663 // SSLセッションを開始\r
664 BOOL AttachSSL(SOCKET s, SOCKET parent, BOOL* pbAborted, BOOL bStrengthen)\r
665 {\r
666         BOOL r;\r
667         DWORD Time;\r
668         SSL** ppSSL;\r
669         BOOL bInherited;\r
670         SSL** ppSSLParent;\r
671         SSL_SESSION* pSession;\r
672         int Return;\r
673         int Error;\r
674         if(!g_bOpenSSLLoaded)\r
675                 return FALSE;\r
676         r = FALSE;\r
677         Time = timeGetTime();\r
678         EnterCriticalSection(&g_OpenSSLLock);\r
679         if(!g_pOpenSSLCTX)\r
680         {\r
681                 g_pOpenSSLCTX = p_SSL_CTX_new(p_SSLv23_method());\r
682                 p_SSL_CTX_ctrl(g_pOpenSSLCTX, SSL_CTRL_MODE, SSL_MODE_ENABLE_PARTIAL_WRITE | SSL_MODE_AUTO_RETRY, NULL);\r
683         }\r
684         if(g_pOpenSSLCTX)\r
685         {\r
686                 if(ppSSL = GetUnusedSSLPointer())\r
687                 {\r
688                         if(*ppSSL = p_SSL_new(g_pOpenSSLCTX))\r
689                         {\r
690                                 if(p_SSL_set_fd(*ppSSL, s) != 0)\r
691                                 {\r
692                                         bInherited = FALSE;\r
693                                         if(parent != INVALID_SOCKET)\r
694                                         {\r
695                                                 if(ppSSLParent = FindSSLPointerFromSocket(parent))\r
696                                                 {\r
697                                                         if(pSession = p_SSL_get_session(*ppSSLParent))\r
698                                                         {\r
699                                                                 if(p_SSL_set_session(*ppSSL, pSession) == 1)\r
700                                                                         bInherited = TRUE;\r
701                                                         }\r
702                                                 }\r
703                                         }\r
704                                         if(!bInherited)\r
705                                         {\r
706                                                 if(bStrengthen)\r
707                                                 {\r
708                                                         p_SSL_ctrl(*ppSSL, SSL_CTRL_OPTIONS, SSL_OP_NO_SSLv2 | SSL_OP_NO_SSLv3, NULL);\r
709                                                         p_SSL_set_cipher_list(*ppSSL, "HIGH");\r
710                                                 }\r
711                                         }\r
712                                         // SSLのネゴシエーションには時間がかかる場合がある\r
713                                         r = TRUE;\r
714                                         while(r)\r
715                                         {\r
716                                                 Return = p_SSL_connect(*ppSSL);\r
717                                                 if(Return == 1)\r
718                                                         break;\r
719                                                 Error = p_SSL_get_error(*ppSSL, Return);\r
720                                                 if(Error == SSL_ERROR_WANT_READ || Error == SSL_ERROR_WANT_WRITE)\r
721                                                 {\r
722                                                         LeaveCriticalSection(&g_OpenSSLLock);\r
723                                                         if(g_pOpenSSLTimeoutCallback(pbAborted) || (g_OpenSSLTimeout > 0 && timeGetTime() - Time >= g_OpenSSLTimeout))\r
724                                                                 r = FALSE;\r
725                                                         EnterCriticalSection(&g_OpenSSLLock);\r
726                                                 }\r
727                                                 else\r
728                                                         r = FALSE;\r
729                                         }\r
730                                         if(r)\r
731                                         {\r
732                                                 if(ConfirmSSLCertificate(*ppSSL, pbAborted))\r
733                                                 {\r
734                                                 }\r
735                                                 else\r
736                                                 {\r
737                                                         LeaveCriticalSection(&g_OpenSSLLock);\r
738                                                         DetachSSL(s);\r
739                                                         r = FALSE;\r
740                                                         EnterCriticalSection(&g_OpenSSLLock);\r
741                                                 }\r
742                                         }\r
743                                         else\r
744                                         {\r
745                                                 LeaveCriticalSection(&g_OpenSSLLock);\r
746                                                 DetachSSL(s);\r
747                                                 EnterCriticalSection(&g_OpenSSLLock);\r
748                                         }\r
749                                 }\r
750                                 else\r
751                                 {\r
752                                         LeaveCriticalSection(&g_OpenSSLLock);\r
753                                         DetachSSL(s);\r
754                                         EnterCriticalSection(&g_OpenSSLLock);\r
755                                 }\r
756                         }\r
757                 }\r
758         }\r
759         LeaveCriticalSection(&g_OpenSSLLock);\r
760         return r;\r
761 }\r
762 \r
763 // SSLセッションを終了\r
764 BOOL DetachSSL(SOCKET s)\r
765 {\r
766         BOOL r;\r
767         SSL** ppSSL;\r
768         if(!g_bOpenSSLLoaded)\r
769                 return FALSE;\r
770         r = FALSE;\r
771         EnterCriticalSection(&g_OpenSSLLock);\r
772         if(ppSSL = FindSSLPointerFromSocket(s))\r
773         {\r
774                 p_SSL_shutdown(*ppSSL);\r
775                 p_SSL_free(*ppSSL);\r
776                 *ppSSL = NULL;\r
777                 r = TRUE;\r
778         }\r
779         LeaveCriticalSection(&g_OpenSSLLock);\r
780         return r;\r
781 }\r
782 \r
783 // SSLとしてマークされているか確認\r
784 // マークされていればTRUEを返す\r
785 BOOL IsSSLAttached(SOCKET s)\r
786 {\r
787         SSL** ppSSL;\r
788         if(!g_bOpenSSLLoaded)\r
789                 return FALSE;\r
790         EnterCriticalSection(&g_OpenSSLLock);\r
791         ppSSL = FindSSLPointerFromSocket(s);\r
792         LeaveCriticalSection(&g_OpenSSLLock);\r
793         if(!ppSSL)\r
794                 return FALSE;\r
795         return TRUE;\r
796 }\r
797 \r
798 SOCKET FTPS_socket(int af, int type, int protocol)\r
799 {\r
800         return socket(af, type, protocol);\r
801 }\r
802 \r
803 int FTPS_bind(SOCKET s, const struct sockaddr *addr, int namelen)\r
804 {\r
805         return bind(s, addr, namelen);\r
806 }\r
807 \r
808 int FTPS_listen(SOCKET s, int backlog)\r
809 {\r
810         return listen(s, backlog);\r
811 }\r
812 \r
813 // accept相当の関数\r
814 // ただし初めからSSLのネゴシエーションを行う\r
815 SOCKET FTPS_accept(SOCKET s, struct sockaddr *addr, int *addrlen)\r
816 {\r
817         SOCKET r;\r
818         BOOL bAborted;\r
819         r = accept(s, addr, addrlen);\r
820         bAborted = FALSE;\r
821         if(!AttachSSL(r, INVALID_SOCKET, &bAborted, TRUE))\r
822         {\r
823                 closesocket(r);\r
824                 return INVALID_SOCKET;\r
825         }\r
826         return r;\r
827 }\r
828 \r
829 // connect相当の関数\r
830 // ただし初めからSSLのネゴシエーションを行う\r
831 int FTPS_connect(SOCKET s, const struct sockaddr *name, int namelen)\r
832 {\r
833         int r;\r
834         BOOL bAborted;\r
835         r = connect(s, name, namelen);\r
836         bAborted = FALSE;\r
837         if(!AttachSSL(r, INVALID_SOCKET, &bAborted, TRUE))\r
838                 return SOCKET_ERROR;\r
839         return r;\r
840 }\r
841 \r
842 // closesocket相当の関数\r
843 int FTPS_closesocket(SOCKET s)\r
844 {\r
845         DetachSSL(s);\r
846         return closesocket(s);\r
847 }\r
848 \r
849 // send相当の関数\r
850 int FTPS_send(SOCKET s, const char * buf, int len, int flags)\r
851 {\r
852         int r;\r
853         SSL** ppSSL;\r
854         if(!g_bOpenSSLLoaded)\r
855                 return send(s, buf, len, flags);\r
856         EnterCriticalSection(&g_OpenSSLLock);\r
857         ppSSL = FindSSLPointerFromSocket(s);\r
858         LeaveCriticalSection(&g_OpenSSLLock);\r
859         if(!ppSSL)\r
860                 return send(s, buf, len, flags);\r
861         r = p_SSL_write(*ppSSL, buf, len);\r
862         if(r < 0)\r
863                 return SOCKET_ERROR;\r
864         return r;\r
865 }\r
866 \r
867 // recv相当の関数\r
868 int FTPS_recv(SOCKET s, char * buf, int len, int flags)\r
869 {\r
870         int r;\r
871         SSL** ppSSL;\r
872         if(!g_bOpenSSLLoaded)\r
873                 return recv(s, buf, len, flags);\r
874         EnterCriticalSection(&g_OpenSSLLock);\r
875         ppSSL = FindSSLPointerFromSocket(s);\r
876         LeaveCriticalSection(&g_OpenSSLLock);\r
877         if(!ppSSL)\r
878                 return recv(s, buf, len, flags);\r
879         if(flags & MSG_PEEK)\r
880                 r = p_SSL_peek(*ppSSL, buf, len);\r
881         else\r
882                 r = p_SSL_read(*ppSSL, buf, len);\r
883         if(r < 0)\r
884                 return SOCKET_ERROR;\r
885         return r;\r
886 }\r
887 \r
888 // IPv6対応\r
889 \r
890 const struct in6_addr IN6ADDR_NONE = {{0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}};\r
891 \r
892 typedef struct\r
893 {\r
894         HANDLE h;\r
895         HWND hWnd;\r
896         u_int wMsg;\r
897         char * name;\r
898         char * buf;\r
899         int buflen;\r
900         short Family;\r
901 } GETHOSTBYNAMEDATA;\r
902 \r
903 DWORD WINAPI WSAAsyncGetHostByNameIPv6ThreadProc(LPVOID lpParameter)\r
904 {\r
905         GETHOSTBYNAMEDATA* pData;\r
906         struct hostent* pHost;\r
907         struct addrinfo* pAddr;\r
908         struct addrinfo* p;\r
909         pHost = NULL;\r
910         pData = (GETHOSTBYNAMEDATA*)lpParameter;\r
911         if(getaddrinfo(pData->name, NULL, NULL, &pAddr) == 0)\r
912         {\r
913                 p = pAddr;\r
914                 while(p)\r
915                 {\r
916                         if(p->ai_family == pData->Family)\r
917                         {\r
918                                 switch(p->ai_family)\r
919                                 {\r
920                                 case AF_INET:\r
921                                         pHost = (struct hostent*)pData->buf;\r
922                                         if((size_t)pData->buflen >= sizeof(struct hostent) + sizeof(char*) * 2 + sizeof(struct in_addr)\r
923                                                 && p->ai_addrlen >= sizeof(struct sockaddr_in))\r
924                                         {\r
925                                                 pHost->h_name = NULL;\r
926                                                 pHost->h_aliases = NULL;\r
927                                                 pHost->h_addrtype = p->ai_family;\r
928                                                 pHost->h_length = sizeof(struct in_addr);\r
929                                                 pHost->h_addr_list = (char**)(&pHost[1]);\r
930                                                 pHost->h_addr_list[0] = (char*)(&pHost->h_addr_list[2]);\r
931                                                 pHost->h_addr_list[1] = NULL;\r
932                                                 memcpy(pHost->h_addr_list[0], &((struct sockaddr_in*)p->ai_addr)->sin_addr, sizeof(struct in_addr));\r
933                                                 PostMessage(pData->hWnd, pData->wMsg, (WPARAM)pData->h, (LPARAM)(sizeof(struct hostent) + sizeof(char*) * 2 + sizeof(struct in_addr)));\r
934                                         }\r
935                                         else\r
936                                                 PostMessage(pData->hWnd, pData->wMsg, (WPARAM)pData->h, (LPARAM)(WSAENOBUFS << 16));\r
937                                         break;\r
938                                 case AF_INET6:\r
939                                         pHost = (struct hostent*)pData->buf;\r
940                                         if((size_t)pData->buflen >= sizeof(struct hostent) + sizeof(char*) * 2 + sizeof(struct in6_addr)\r
941                                                 && p->ai_addrlen >= sizeof(struct sockaddr_in6))\r
942                                         {\r
943                                                 pHost->h_name = NULL;\r
944                                                 pHost->h_aliases = NULL;\r
945                                                 pHost->h_addrtype = p->ai_family;\r
946                                                 pHost->h_length = sizeof(struct in6_addr);\r
947                                                 pHost->h_addr_list = (char**)(&pHost[1]);\r
948                                                 pHost->h_addr_list[0] = (char*)(&pHost->h_addr_list[2]);\r
949                                                 pHost->h_addr_list[1] = NULL;\r
950                                                 memcpy(pHost->h_addr_list[0], &((struct sockaddr_in6*)p->ai_addr)->sin6_addr, sizeof(struct in6_addr));\r
951                                                 PostMessage(pData->hWnd, pData->wMsg, (WPARAM)pData->h, (LPARAM)(sizeof(struct hostent) + sizeof(char*) * 2 + sizeof(struct in6_addr)));\r
952                                         }\r
953                                         else\r
954                                                 PostMessage(pData->hWnd, pData->wMsg, (WPARAM)pData->h, (LPARAM)(WSAENOBUFS << 16));\r
955                                         break;\r
956                                 }\r
957                         }\r
958                         if(pHost)\r
959                                 break;\r
960                         p = p->ai_next;\r
961                 }\r
962                 if(!p)\r
963                         PostMessage(pData->hWnd, pData->wMsg, (WPARAM)pData->h, (LPARAM)(ERROR_INVALID_FUNCTION << 16));\r
964                 freeaddrinfo(pAddr);\r
965         }\r
966         else\r
967                 PostMessage(pData->hWnd, pData->wMsg, (WPARAM)pData->h, (LPARAM)(ERROR_INVALID_FUNCTION << 16));\r
968         // CreateThreadが返すハンドルが重複するのを回避\r
969         Sleep(10000);\r
970         CloseHandle(pData->h);\r
971         free(pData->name);\r
972         free(pData);\r
973         return 0;\r
974 }\r
975 \r
976 // IPv6対応のWSAAsyncGetHostByName相当の関数\r
977 // FamilyにはAF_INETまたはAF_INET6を指定可能\r
978 // ただしANSI用\r
979 HANDLE WSAAsyncGetHostByNameIPv6(HWND hWnd, u_int wMsg, const char * name, char * buf, int buflen, short Family)\r
980 {\r
981         HANDLE hResult;\r
982         GETHOSTBYNAMEDATA* pData;\r
983         hResult = NULL;\r
984         if(pData = malloc(sizeof(GETHOSTBYNAMEDATA)))\r
985         {\r
986                 pData->hWnd = hWnd;\r
987                 pData->wMsg = wMsg;\r
988                 if(pData->name = malloc(sizeof(char) * (strlen(name) + 1)))\r
989                 {\r
990                         strcpy(pData->name, name);\r
991                         pData->buf = buf;\r
992                         pData->buflen = buflen;\r
993                         pData->Family = Family;\r
994                         if(pData->h = CreateThread(NULL, 0, WSAAsyncGetHostByNameIPv6ThreadProc, pData, CREATE_SUSPENDED, NULL))\r
995                         {\r
996                                 ResumeThread(pData->h);\r
997                                 hResult = pData->h;\r
998                         }\r
999                 }\r
1000         }\r
1001         if(!hResult)\r
1002         {\r
1003                 if(pData)\r
1004                 {\r
1005                         if(pData->name)\r
1006                                 free(pData->name);\r
1007                         free(pData);\r
1008                 }\r
1009         }\r
1010         return hResult;\r
1011 }\r
1012 \r
1013 // WSAAsyncGetHostByNameIPv6用のWSACancelAsyncRequest相当の関数\r
1014 int WSACancelAsyncRequestIPv6(HANDLE hAsyncTaskHandle)\r
1015 {\r
1016         int Result;\r
1017         Result = SOCKET_ERROR;\r
1018         if(TerminateThread(hAsyncTaskHandle, 0))\r
1019         {\r
1020                 CloseHandle(hAsyncTaskHandle);\r
1021                 Result = 0;\r
1022         }\r
1023         return Result;\r
1024 }\r
1025 \r
1026 char* AddressToStringIPv4(char* str, void* in)\r
1027 {\r
1028         char* pResult;\r
1029         unsigned char* p;\r
1030         pResult = str;\r
1031         p = (unsigned char*)in;\r
1032         sprintf(str, "%u.%u.%u.%u", p[0], p[1], p[2], p[3]);\r
1033         return pResult;\r
1034 }\r
1035 \r
1036 char* AddressToStringIPv6(char* str, void* in6)\r
1037 {\r
1038         char* pResult;\r
1039         unsigned char* p;\r
1040         int MaxZero;\r
1041         int MaxZeroLen;\r
1042         int i;\r
1043         int j;\r
1044         char Tmp[5];\r
1045         pResult = str;\r
1046         p = (unsigned char*)in6;\r
1047         MaxZero = 8;\r
1048         MaxZeroLen = 1;\r
1049         for(i = 0; i < 8; i++)\r
1050         {\r
1051                 for(j = i; j < 8; j++)\r
1052                 {\r
1053                         if(p[j * 2] != 0 || p[j * 2 + 1] != 0)\r
1054                                 break;\r
1055                 }\r
1056                 if(j - i > MaxZeroLen)\r
1057                 {\r
1058                         MaxZero = i;\r
1059                         MaxZeroLen = j - i;\r
1060                 }\r
1061         }\r
1062         strcpy(str, "");\r
1063         for(i = 0; i < 8; i++)\r
1064         {\r
1065                 if(i == MaxZero)\r
1066                 {\r
1067                         if(i == 0)\r
1068                                 strcat(str, ":");\r
1069                         strcat(str, ":");\r
1070                 }\r
1071                 else if(i < MaxZero || i >= MaxZero + MaxZeroLen)\r
1072                 {\r
1073                         sprintf(Tmp, "%x", (((int)p[i * 2] & 0xff) << 8) | ((int)p[i * 2 + 1] & 0xff));\r
1074                         strcat(str, Tmp);\r
1075                         if(i < 7)\r
1076                                 strcat(str, ":");\r
1077                 }\r
1078         }\r
1079         return pResult;\r
1080 }\r
1081 \r
1082 // IPv6対応のinet_ntoa相当の関数\r
1083 // ただしANSI用\r
1084 char* inet6_ntoa(struct in6_addr in6)\r
1085 {\r
1086         char* pResult;\r
1087         static char Adrs[40];\r
1088         pResult = NULL;\r
1089         memset(Adrs, 0, sizeof(Adrs));\r
1090         pResult = AddressToStringIPv6(Adrs, &in6);\r
1091         return pResult;\r
1092 }\r
1093 \r
1094 // IPv6対応のinet_addr相当の関数\r
1095 // ただしANSI用\r
1096 struct in6_addr inet6_addr(const char* cp)\r
1097 {\r
1098         struct in6_addr Result;\r
1099         int AfterZero;\r
1100         int i;\r
1101         char* p;\r
1102         memset(&Result, 0, sizeof(Result));\r
1103         AfterZero = 0;\r
1104         for(i = 0; i < 8; i++)\r
1105         {\r
1106                 if(!cp)\r
1107                 {\r
1108                         memcpy(&Result, &IN6ADDR_NONE, sizeof(struct in6_addr));\r
1109                         break;\r
1110                 }\r
1111                 if(i >= AfterZero)\r
1112                 {\r
1113                         if(strncmp(cp, ":", 1) == 0)\r
1114                         {\r
1115                                 cp = cp + 1;\r
1116                                 if(i == 0 && strncmp(cp, ":", 1) == 0)\r
1117                                         cp = cp + 1;\r
1118                                 p = (char*)cp;\r
1119                                 AfterZero = 7;\r
1120                                 while(p = strstr(p, ":"))\r
1121                                 {\r
1122                                         p = p + 1;\r
1123                                         AfterZero--;\r
1124                                 }\r
1125                         }\r
1126                         else\r
1127                         {\r
1128                                 Result.u.Word[i] = (USHORT)strtol(cp, &p, 16);\r
1129                                 Result.u.Word[i] = ((Result.u.Word[i] & 0xff00) >> 8) | ((Result.u.Word[i] & 0x00ff) << 8);\r
1130                                 if(strncmp(p, ":", 1) != 0 && strlen(p) > 0)\r
1131                                 {\r
1132                                         memcpy(&Result, &IN6ADDR_NONE, sizeof(struct in6_addr));\r
1133                                         break;\r
1134                                 }\r
1135                                 if(cp = strstr(cp, ":"))\r
1136                                         cp = cp + 1;\r
1137                         }\r
1138                 }\r
1139         }\r
1140         return Result;\r
1141 }\r
1142 \r
1143 BOOL ConvertDomainNameToPunycode(LPSTR Output, DWORD Count, LPCSTR Input)\r
1144 {\r
1145         BOOL bResult;\r
1146         punycode_uint* pUnicode;\r
1147         punycode_uint* p;\r
1148         BOOL bNeeded;\r
1149         LPCSTR InputString;\r
1150         punycode_uint Length;\r
1151         punycode_uint OutputLength;\r
1152         bResult = FALSE;\r
1153         if(pUnicode = malloc(sizeof(punycode_uint) * strlen(Input)))\r
1154         {\r
1155                 p = pUnicode;\r
1156                 bNeeded = FALSE;\r
1157                 InputString = Input;\r
1158                 Length = 0;\r
1159                 while(*InputString != '\0')\r
1160                 {\r
1161                         *p = (punycode_uint)GetNextCharM(InputString, NULL, &InputString);\r
1162                         if(*p >= 0x80)\r
1163                                 bNeeded = TRUE;\r
1164                         p++;\r
1165                         Length++;\r
1166                 }\r
1167                 if(bNeeded)\r
1168                 {\r
1169                         if(Count >= strlen("xn--") + 1)\r
1170                         {\r
1171                                 strcpy(Output, "xn--");\r
1172                                 OutputLength = Count - strlen("xn--");\r
1173                                 if(punycode_encode(Length, pUnicode, NULL, (punycode_uint*)&OutputLength, Output + strlen("xn--")) == punycode_success)\r
1174                                 {\r
1175                                         Output[strlen("xn--") + OutputLength] = '\0';\r
1176                                         bResult = TRUE;\r
1177                                 }\r
1178                         }\r
1179                 }\r
1180                 free(pUnicode);\r
1181         }\r
1182         if(!bResult)\r
1183         {\r
1184                 if(Count >= strlen(Input) + 1)\r
1185                 {\r
1186                         strcpy(Output, Input);\r
1187                         bResult = TRUE;\r
1188                 }\r
1189         }\r
1190         return bResult;\r
1191 }\r
1192 \r
1193 BOOL ConvertNameToPunycode(LPSTR Output, LPCSTR Input)\r
1194 {\r
1195         BOOL bResult;\r
1196         DWORD Length;\r
1197         char* pm0;\r
1198         char* pm1;\r
1199         char* p;\r
1200         char* pNext;\r
1201         bResult = FALSE;\r
1202         Length = strlen(Input);\r
1203         if(pm0 = AllocateStringM(Length + 1))\r
1204         {\r
1205                 if(pm1 = AllocateStringM(Length * 4 + 1))\r
1206                 {\r
1207                         strcpy(pm0, Input);\r
1208                         p = pm0;\r
1209                         while(p)\r
1210                         {\r
1211                                 if(pNext = strchr(p, '.'))\r
1212                                 {\r
1213                                         *pNext = '\0';\r
1214                                         pNext++;\r
1215                                 }\r
1216                                 if(ConvertDomainNameToPunycode(pm1, Length * 4, p))\r
1217                                         strcat(Output, pm1);\r
1218                                 if(pNext)\r
1219                                         strcat(Output, ".");\r
1220                                 p = pNext;\r
1221                         }\r
1222                         bResult = TRUE;\r
1223                         FreeDuplicatedString(pm1);\r
1224                 }\r
1225                 FreeDuplicatedString(pm0);\r
1226         }\r
1227         return bResult;\r
1228 }\r
1229 \r
1230 HANDLE WSAAsyncGetHostByNameM(HWND hWnd, u_int wMsg, const char * name, char * buf, int buflen)\r
1231 {\r
1232         HANDLE r = NULL;\r
1233         char* pa0 = NULL;\r
1234         if(pa0 = AllocateStringA(strlen(name) * 4))\r
1235         {\r
1236                 if(ConvertNameToPunycode(pa0, name))\r
1237                         r = WSAAsyncGetHostByName(hWnd, wMsg, pa0, buf, buflen);\r
1238         }\r
1239         FreeDuplicatedString(pa0);\r
1240         return r;\r
1241 }\r
1242 \r
1243 HANDLE WSAAsyncGetHostByNameIPv6M(HWND hWnd, u_int wMsg, const char * name, char * buf, int buflen, short Family)\r
1244 {\r
1245         HANDLE r = NULL;\r
1246         char* pa0 = NULL;\r
1247         if(pa0 = AllocateStringA(strlen(name) * 4))\r
1248         {\r
1249                 if(ConvertNameToPunycode(pa0, name))\r
1250                         r = WSAAsyncGetHostByNameIPv6(hWnd, wMsg, pa0, buf, buflen, Family);\r
1251         }\r
1252         FreeDuplicatedString(pa0);\r
1253         return r;\r
1254 }\r
1255 \r