2 // Copyright (C) 2011 Suguru Kawamoto
\r
4 // socket関連関数をOpenSSL用に置換
\r
6 // コンパイルにはOpenSSLのヘッダーファイルが必要
\r
7 // 実行にはOpenSSLのDLLが必要
\r
9 #include <ws2tcpip.h>
\r
10 #include <windows.h>
\r
11 #include <mmsystem.h>
\r
12 #include <openssl/ssl.h>
\r
14 #include "socketwrapper.h"
\r
15 #include "protectprocess.h"
\r
16 #include "mbswrapper.h"
\r
17 #include "punycode.h"
\r
21 typedef void (__cdecl* _SSL_load_error_strings)();
\r
22 typedef int (__cdecl* _SSL_library_init)();
\r
23 typedef SSL_METHOD* (__cdecl* _SSLv23_method)();
\r
24 typedef SSL* (__cdecl* _SSL_new)(SSL_CTX*);
\r
25 typedef void (__cdecl* _SSL_free)(SSL*);
\r
26 typedef long (__cdecl* _SSL_ctrl)(SSL*, int, long, void*);
\r
27 typedef int (__cdecl* _SSL_shutdown)(SSL*);
\r
28 typedef int (__cdecl* _SSL_get_fd)(SSL*);
\r
29 typedef int (__cdecl* _SSL_set_fd)(SSL*, int);
\r
30 typedef int (__cdecl* _SSL_accept)(SSL*);
\r
31 typedef int (__cdecl* _SSL_connect)(SSL*);
\r
32 typedef int (__cdecl* _SSL_write)(SSL*, const void*, int);
\r
33 typedef int (__cdecl* _SSL_peek)(SSL*, void*, int);
\r
34 typedef int (__cdecl* _SSL_read)(SSL*, void*, int);
\r
35 typedef int (__cdecl* _SSL_get_error)(SSL*, int);
\r
36 typedef X509* (__cdecl* _SSL_get_peer_certificate)(const SSL*);
\r
37 typedef long (__cdecl* _SSL_get_verify_result)(const SSL*);
\r
38 typedef SSL_SESSION* (__cdecl* _SSL_get_session)(SSL*);
\r
39 typedef int (__cdecl* _SSL_set_session)(SSL*, SSL_SESSION*);
\r
40 typedef int (__cdecl* _SSL_set_cipher_list)(SSL*, const char*);
\r
41 typedef SSL_CTX* (__cdecl* _SSL_CTX_new)(SSL_METHOD*);
\r
42 typedef void (__cdecl* _SSL_CTX_free)(SSL_CTX*);
\r
43 typedef X509_STORE* (__cdecl* _SSL_CTX_get_cert_store)(const SSL_CTX*);
\r
44 typedef long (__cdecl* _SSL_CTX_ctrl)(SSL_CTX*, int, long, void*);
\r
45 typedef BIO_METHOD* (__cdecl* _BIO_s_mem)();
\r
46 typedef BIO* (__cdecl* _BIO_new)(BIO_METHOD*);
\r
47 typedef int (__cdecl* _BIO_free)(BIO*);
\r
48 typedef BIO* (__cdecl* _BIO_new_mem_buf)(void*, int);
\r
49 typedef long (__cdecl* _BIO_ctrl)(BIO*, int, long, void*);
\r
50 typedef void (__cdecl* _X509_free)(X509*);
\r
51 typedef int (__cdecl* _X509_print_ex)(BIO*, X509*, unsigned long, unsigned long);
\r
52 typedef X509_NAME* (__cdecl* _X509_get_subject_name)(X509*);
\r
53 typedef int (__cdecl* _X509_NAME_print_ex)(BIO*, X509_NAME*, int, unsigned long);
\r
54 typedef void (__cdecl* _X509_CRL_free)(X509_CRL*);
\r
55 typedef EVP_PKEY* (__cdecl* _PEM_read_bio_PUBKEY)(BIO*, EVP_PKEY**, pem_password_cb*, void*);
\r
56 typedef X509* (__cdecl* _PEM_read_bio_X509)(BIO*, X509**, pem_password_cb*, void*);
\r
57 typedef X509_CRL* (__cdecl* _PEM_read_bio_X509_CRL)(BIO*, X509_CRL**, pem_password_cb*, void*);
\r
58 typedef int (__cdecl* _X509_STORE_add_cert)(X509_STORE*, X509*);
\r
59 typedef int (__cdecl* _X509_STORE_add_crl)(X509_STORE*, X509_CRL*);
\r
60 typedef void (__cdecl* _EVP_PKEY_free)(EVP_PKEY*);
\r
61 typedef RSA* (__cdecl* _EVP_PKEY_get1_RSA)(EVP_PKEY*);
\r
62 typedef void (__cdecl* _RSA_free)(RSA*);
\r
63 typedef int (__cdecl* _RSA_size)(const RSA*);
\r
64 typedef int (__cdecl* _RSA_public_decrypt)(int, const unsigned char*, unsigned char*, RSA*, int);
\r
65 typedef unsigned char* (__cdecl* _SHA1)(const unsigned char*, size_t, unsigned char*);
\r
66 typedef unsigned char* (__cdecl* _SHA224)(const unsigned char*, size_t, unsigned char*);
\r
67 typedef unsigned char* (__cdecl* _SHA256)(const unsigned char*, size_t, unsigned char*);
\r
68 typedef unsigned char* (__cdecl* _SHA384)(const unsigned char*, size_t, unsigned char*);
\r
69 typedef unsigned char* (__cdecl* _SHA512)(const unsigned char*, size_t, unsigned char*);
\r
71 _SSL_load_error_strings p_SSL_load_error_strings;
\r
72 _SSL_library_init p_SSL_library_init;
\r
73 _SSLv23_method p_SSLv23_method;
\r
75 _SSL_free p_SSL_free;
\r
76 _SSL_ctrl p_SSL_ctrl;
\r
77 _SSL_shutdown p_SSL_shutdown;
\r
78 _SSL_get_fd p_SSL_get_fd;
\r
79 _SSL_set_fd p_SSL_set_fd;
\r
80 _SSL_accept p_SSL_accept;
\r
81 _SSL_connect p_SSL_connect;
\r
82 _SSL_write p_SSL_write;
\r
83 _SSL_peek p_SSL_peek;
\r
84 _SSL_read p_SSL_read;
\r
85 _SSL_get_error p_SSL_get_error;
\r
86 _SSL_get_peer_certificate p_SSL_get_peer_certificate;
\r
87 _SSL_get_verify_result p_SSL_get_verify_result;
\r
88 _SSL_get_session p_SSL_get_session;
\r
89 _SSL_set_session p_SSL_set_session;
\r
90 _SSL_set_cipher_list p_SSL_set_cipher_list;
\r
91 _SSL_CTX_new p_SSL_CTX_new;
\r
92 _SSL_CTX_free p_SSL_CTX_free;
\r
93 _SSL_CTX_get_cert_store p_SSL_CTX_get_cert_store;
\r
94 _SSL_CTX_ctrl p_SSL_CTX_ctrl;
\r
95 _BIO_s_mem p_BIO_s_mem;
\r
97 _BIO_free p_BIO_free;
\r
98 _BIO_new_mem_buf p_BIO_new_mem_buf;
\r
99 _BIO_ctrl p_BIO_ctrl;
\r
100 _X509_free p_X509_free;
\r
101 _X509_print_ex p_X509_print_ex;
\r
102 _X509_get_subject_name p_X509_get_subject_name;
\r
103 _X509_NAME_print_ex p_X509_NAME_print_ex;
\r
104 _X509_CRL_free p_X509_CRL_free;
\r
105 _PEM_read_bio_PUBKEY p_PEM_read_bio_PUBKEY;
\r
106 _PEM_read_bio_X509 p_PEM_read_bio_X509;
\r
107 _PEM_read_bio_X509_CRL p_PEM_read_bio_X509_CRL;
\r
108 _X509_STORE_add_cert p_X509_STORE_add_cert;
\r
109 _X509_STORE_add_crl p_X509_STORE_add_crl;
\r
110 _EVP_PKEY_free p_EVP_PKEY_free;
\r
111 _EVP_PKEY_get1_RSA p_EVP_PKEY_get1_RSA;
\r
112 _RSA_free p_RSA_free;
\r
113 _RSA_size p_RSA_size;
\r
114 _RSA_public_decrypt p_RSA_public_decrypt;
\r
121 #define MAX_SSL_SOCKET 16
\r
123 BOOL g_bOpenSSLLoaded;
\r
124 HMODULE g_hOpenSSL;
\r
125 HMODULE g_hOpenSSLCommon;
\r
126 CRITICAL_SECTION g_OpenSSLLock;
\r
127 DWORD g_OpenSSLTimeout;
\r
128 LPSSLTIMEOUTCALLBACK g_pOpenSSLTimeoutCallback;
\r
129 LPSSLCONFIRMCALLBACK g_pOpenSSLConfirmCallback;
\r
130 SSL_CTX* g_pOpenSSLCTX;
\r
131 SSL* g_pOpenSSLHandle[MAX_SSL_SOCKET];
\r
133 BOOL __stdcall DefaultSSLTimeoutCallback(BOOL* pbAborted)
\r
139 BOOL __stdcall DefaultSSLConfirmCallback(BOOL* pbAborted, BOOL bVerified, LPCSTR Certificate, LPCSTR CommonName)
\r
147 if(g_bOpenSSLLoaded)
\r
149 #ifdef ENABLE_PROCESS_PROTECTION
\r
150 // 同梱するOpenSSLのバージョンに合わせてSHA1ハッシュ値を変更すること
\r
151 #if defined(_M_IX86)
\r
152 // ssleay32.dll 1.0.1h
\r
153 RegisterTrustedModuleSHA1Hash("\x1B\x27\x4E\x29\x14\x78\x72\x0D\x33\x73\xD5\x98\xCF\xEA\x32\x07\x2B\x35\x69\x66");
\r
154 // libeay32.dll 1.0.1h
\r
155 RegisterTrustedModuleSHA1Hash("\x1D\x2E\x70\x49\x84\x2C\xE9\x1F\x64\xE8\x84\xD4\x62\x5B\xF4\x34\x9A\x0F\x82\xFC");
\r
156 #elif defined(_M_AMD64)
\r
157 // ssleay32.dll 1.0.1h
\r
158 RegisterTrustedModuleSHA1Hash("\xB7\x5C\x31\xF3\x28\x73\xA0\x3C\x33\xDD\xBC\xB5\x8F\xD1\x38\xB6\xCE\x67\x4C\x40");
\r
159 // libeay32.dll 1.0.1h
\r
160 RegisterTrustedModuleSHA1Hash("\x5E\xBF\x56\x8C\xED\x06\xE8\x90\xE3\xC0\x3B\x6C\x51\x66\x4F\xC9\x9F\x1F\xF5\x89");
\r
163 g_hOpenSSL = LoadLibrary("ssleay32.dll");
\r
164 // バージョン固定のためlibssl32.dllの読み込みは脆弱性の原因になり得るので廃止
\r
166 // g_hOpenSSL = LoadLibrary("libssl32.dll");
\r
168 || !(p_SSL_load_error_strings = (_SSL_load_error_strings)GetProcAddress(g_hOpenSSL, "SSL_load_error_strings"))
\r
169 || !(p_SSL_library_init = (_SSL_library_init)GetProcAddress(g_hOpenSSL, "SSL_library_init"))
\r
170 || !(p_SSLv23_method = (_SSLv23_method)GetProcAddress(g_hOpenSSL, "SSLv23_method"))
\r
171 || !(p_SSL_new = (_SSL_new)GetProcAddress(g_hOpenSSL, "SSL_new"))
\r
172 || !(p_SSL_free = (_SSL_free)GetProcAddress(g_hOpenSSL, "SSL_free"))
\r
173 || !(p_SSL_ctrl = (_SSL_ctrl)GetProcAddress(g_hOpenSSL, "SSL_ctrl"))
\r
174 || !(p_SSL_shutdown = (_SSL_shutdown)GetProcAddress(g_hOpenSSL, "SSL_shutdown"))
\r
175 || !(p_SSL_get_fd = (_SSL_get_fd)GetProcAddress(g_hOpenSSL, "SSL_get_fd"))
\r
176 || !(p_SSL_set_fd = (_SSL_set_fd)GetProcAddress(g_hOpenSSL, "SSL_set_fd"))
\r
177 || !(p_SSL_accept = (_SSL_accept)GetProcAddress(g_hOpenSSL, "SSL_accept"))
\r
178 || !(p_SSL_connect = (_SSL_connect)GetProcAddress(g_hOpenSSL, "SSL_connect"))
\r
179 || !(p_SSL_write = (_SSL_write)GetProcAddress(g_hOpenSSL, "SSL_write"))
\r
180 || !(p_SSL_peek = (_SSL_peek)GetProcAddress(g_hOpenSSL, "SSL_peek"))
\r
181 || !(p_SSL_read = (_SSL_read)GetProcAddress(g_hOpenSSL, "SSL_read"))
\r
182 || !(p_SSL_get_error = (_SSL_get_error)GetProcAddress(g_hOpenSSL, "SSL_get_error"))
\r
183 || !(p_SSL_get_peer_certificate = (_SSL_get_peer_certificate)GetProcAddress(g_hOpenSSL, "SSL_get_peer_certificate"))
\r
184 || !(p_SSL_get_verify_result = (_SSL_get_verify_result)GetProcAddress(g_hOpenSSL, "SSL_get_verify_result"))
\r
185 || !(p_SSL_get_session = (_SSL_get_session)GetProcAddress(g_hOpenSSL, "SSL_get_session"))
\r
186 || !(p_SSL_set_session = (_SSL_set_session)GetProcAddress(g_hOpenSSL, "SSL_set_session"))
\r
187 || !(p_SSL_set_cipher_list = (_SSL_set_cipher_list)GetProcAddress(g_hOpenSSL, "SSL_set_cipher_list"))
\r
188 || !(p_SSL_CTX_new = (_SSL_CTX_new)GetProcAddress(g_hOpenSSL, "SSL_CTX_new"))
\r
189 || !(p_SSL_CTX_free = (_SSL_CTX_free)GetProcAddress(g_hOpenSSL, "SSL_CTX_free"))
\r
190 || !(p_SSL_CTX_get_cert_store = (_SSL_CTX_get_cert_store)GetProcAddress(g_hOpenSSL, "SSL_CTX_get_cert_store"))
\r
191 || !(p_SSL_CTX_ctrl = (_SSL_CTX_ctrl)GetProcAddress(g_hOpenSSL, "SSL_CTX_ctrl")))
\r
194 FreeLibrary(g_hOpenSSL);
\r
198 g_hOpenSSLCommon = LoadLibrary("libeay32.dll");
\r
199 if(!g_hOpenSSLCommon
\r
200 || !(p_BIO_s_mem = (_BIO_s_mem)GetProcAddress(g_hOpenSSLCommon, "BIO_s_mem"))
\r
201 || !(p_BIO_new = (_BIO_new)GetProcAddress(g_hOpenSSLCommon, "BIO_new"))
\r
202 || !(p_BIO_free = (_BIO_free)GetProcAddress(g_hOpenSSLCommon, "BIO_free"))
\r
203 || !(p_BIO_new_mem_buf = (_BIO_new_mem_buf)GetProcAddress(g_hOpenSSLCommon, "BIO_new_mem_buf"))
\r
204 || !(p_BIO_ctrl = (_BIO_ctrl)GetProcAddress(g_hOpenSSLCommon, "BIO_ctrl"))
\r
205 || !(p_X509_free = (_X509_free)GetProcAddress(g_hOpenSSLCommon, "X509_free"))
\r
206 || !(p_X509_print_ex = (_X509_print_ex)GetProcAddress(g_hOpenSSLCommon, "X509_print_ex"))
\r
207 || !(p_X509_get_subject_name = (_X509_get_subject_name)GetProcAddress(g_hOpenSSLCommon, "X509_get_subject_name"))
\r
208 || !(p_X509_NAME_print_ex = (_X509_NAME_print_ex)GetProcAddress(g_hOpenSSLCommon, "X509_NAME_print_ex"))
\r
209 || !(p_X509_CRL_free = (_X509_CRL_free)GetProcAddress(g_hOpenSSLCommon, "X509_CRL_free"))
\r
210 || !(p_PEM_read_bio_PUBKEY = (_PEM_read_bio_PUBKEY)GetProcAddress(g_hOpenSSLCommon, "PEM_read_bio_PUBKEY"))
\r
211 || !(p_PEM_read_bio_X509 = (_PEM_read_bio_X509)GetProcAddress(g_hOpenSSLCommon, "PEM_read_bio_X509"))
\r
212 || !(p_PEM_read_bio_X509_CRL = (_PEM_read_bio_X509_CRL)GetProcAddress(g_hOpenSSLCommon, "PEM_read_bio_X509_CRL"))
\r
213 || !(p_X509_STORE_add_cert = (_X509_STORE_add_cert)GetProcAddress(g_hOpenSSLCommon, "X509_STORE_add_cert"))
\r
214 || !(p_X509_STORE_add_crl = (_X509_STORE_add_crl)GetProcAddress(g_hOpenSSLCommon, "X509_STORE_add_crl"))
\r
215 || !(p_EVP_PKEY_free = (_EVP_PKEY_free)GetProcAddress(g_hOpenSSLCommon, "EVP_PKEY_free"))
\r
216 || !(p_EVP_PKEY_get1_RSA = (_EVP_PKEY_get1_RSA)GetProcAddress(g_hOpenSSLCommon, "EVP_PKEY_get1_RSA"))
\r
217 || !(p_RSA_free = (_RSA_free)GetProcAddress(g_hOpenSSLCommon, "RSA_free"))
\r
218 || !(p_RSA_size = (_RSA_size)GetProcAddress(g_hOpenSSLCommon, "RSA_size"))
\r
219 || !(p_RSA_public_decrypt = (_RSA_public_decrypt)GetProcAddress(g_hOpenSSLCommon, "RSA_public_decrypt"))
\r
220 || !(p_SHA1 = (_SHA1)GetProcAddress(g_hOpenSSLCommon, "SHA1"))
\r
221 || !(p_SHA224 = (_SHA224)GetProcAddress(g_hOpenSSLCommon, "SHA224"))
\r
222 || !(p_SHA256 = (_SHA256)GetProcAddress(g_hOpenSSLCommon, "SHA256"))
\r
223 || !(p_SHA384 = (_SHA384)GetProcAddress(g_hOpenSSLCommon, "SHA384"))
\r
224 || !(p_SHA512 = (_SHA512)GetProcAddress(g_hOpenSSLCommon, "SHA512")))
\r
227 FreeLibrary(g_hOpenSSL);
\r
229 if(g_hOpenSSLCommon)
\r
230 FreeLibrary(g_hOpenSSLCommon);
\r
231 g_hOpenSSLCommon = NULL;
\r
234 InitializeCriticalSection(&g_OpenSSLLock);
\r
235 p_SSL_load_error_strings();
\r
236 p_SSL_library_init();
\r
237 SetSSLTimeoutCallback(60000, DefaultSSLTimeoutCallback);
\r
238 SetSSLConfirmCallback(DefaultSSLConfirmCallback);
\r
239 g_bOpenSSLLoaded = TRUE;
\r
247 if(!g_bOpenSSLLoaded)
\r
249 EnterCriticalSection(&g_OpenSSLLock);
\r
250 for(i = 0; i < MAX_SSL_SOCKET; i++)
\r
252 if(g_pOpenSSLHandle[i])
\r
254 p_SSL_shutdown(g_pOpenSSLHandle[i]);
\r
255 p_SSL_free(g_pOpenSSLHandle[i]);
\r
256 g_pOpenSSLHandle[i] = NULL;
\r
260 p_SSL_CTX_free(g_pOpenSSLCTX);
\r
261 g_pOpenSSLCTX = NULL;
\r
262 FreeLibrary(g_hOpenSSL);
\r
264 FreeLibrary(g_hOpenSSLCommon);
\r
265 g_hOpenSSLCommon = NULL;
\r
266 LeaveCriticalSection(&g_OpenSSLLock);
\r
267 DeleteCriticalSection(&g_OpenSSLLock);
\r
268 g_bOpenSSLLoaded = FALSE;
\r
271 // OpenSSLが使用可能かどうか確認
\r
272 BOOL IsOpenSSLLoaded()
\r
274 return g_bOpenSSLLoaded;
\r
277 SSL** GetUnusedSSLPointer()
\r
280 for(i = 0; i < MAX_SSL_SOCKET; i++)
\r
282 if(!g_pOpenSSLHandle[i])
\r
283 return &g_pOpenSSLHandle[i];
\r
288 SSL** FindSSLPointerFromSocket(SOCKET s)
\r
291 for(i = 0; i < MAX_SSL_SOCKET; i++)
\r
293 if(g_pOpenSSLHandle[i])
\r
295 if(p_SSL_get_fd(g_pOpenSSLHandle[i]) == s)
\r
296 return &g_pOpenSSLHandle[i];
\r
302 BOOL ConfirmSSLCertificate(SSL* pSSL, BOOL* pbAborted)
\r
318 if(pX509 = p_SSL_get_peer_certificate(pSSL))
\r
320 if(pBIO = p_BIO_new(p_BIO_s_mem()))
\r
322 p_X509_print_ex(pBIO, pX509, 0, XN_FLAG_RFC2253);
\r
323 if((Length = p_BIO_ctrl(pBIO, BIO_CTRL_INFO, 0, &pBuffer)) > 0)
\r
325 if(pData = (char*)malloc(Length + sizeof(char)))
\r
327 memcpy(pData, pBuffer, Length);
\r
328 *(char*)((size_t)pData + Length) = '\0';
\r
333 if(pBIO = p_BIO_new(p_BIO_s_mem()))
\r
335 p_X509_NAME_print_ex(pBIO, p_X509_get_subject_name(pX509), 0, XN_FLAG_RFC2253);
\r
336 if((Length = p_BIO_ctrl(pBIO, BIO_CTRL_INFO, 0, &pBuffer)) > 0)
\r
338 if(pSubject = (char*)malloc(Length + sizeof(char)))
\r
340 memcpy(pSubject, pBuffer, Length);
\r
341 *(char*)((size_t)pSubject + Length) = '\0';
\r
346 p_X509_free(pX509);
\r
348 if(pX509 && p_SSL_get_verify_result(pSSL) == X509_V_OK)
\r
353 if(strncmp(pCN, "CN=", strlen("CN=")) == 0)
\r
355 pCN += strlen("CN=");
\r
356 if(p = strchr(pCN, ','))
\r
360 if(pCN = strchr(pCN, ','))
\r
363 bResult = g_pOpenSSLConfirmCallback(pbAborted, bVerified, pData, pCN);
\r
371 void SetSSLTimeoutCallback(DWORD Timeout, LPSSLTIMEOUTCALLBACK pCallback)
\r
373 if(!g_bOpenSSLLoaded)
\r
375 EnterCriticalSection(&g_OpenSSLLock);
\r
376 g_OpenSSLTimeout = Timeout;
\r
377 g_pOpenSSLTimeoutCallback = pCallback;
\r
378 LeaveCriticalSection(&g_OpenSSLLock);
\r
381 void SetSSLConfirmCallback(LPSSLCONFIRMCALLBACK pCallback)
\r
383 if(!g_bOpenSSLLoaded)
\r
385 EnterCriticalSection(&g_OpenSSLLock);
\r
386 g_pOpenSSLConfirmCallback = pCallback;
\r
387 LeaveCriticalSection(&g_OpenSSLLock);
\r
392 BOOL SetSSLRootCertificate(const void* pData, DWORD Length)
\r
395 X509_STORE* pStore;
\r
402 X509_CRL* pX509_CRL;
\r
403 if(!g_bOpenSSLLoaded)
\r
406 EnterCriticalSection(&g_OpenSSLLock);
\r
409 g_pOpenSSLCTX = p_SSL_CTX_new(p_SSLv23_method());
\r
410 p_SSL_CTX_ctrl(g_pOpenSSLCTX, SSL_CTRL_MODE, SSL_MODE_ENABLE_PARTIAL_WRITE | SSL_MODE_AUTO_RETRY, NULL);
\r
414 if(pStore = p_SSL_CTX_get_cert_store(g_pOpenSSLCTX))
\r
426 if(memcmp(p, "-----BEGIN CERTIFICATE-----", 27) == 0)
\r
433 if(memcmp(p, "-----END CERTIFICATE-----", 25) == 0)
\r
438 if(pBIO = p_BIO_new_mem_buf(pBegin, (int)((size_t)pEnd - (size_t)pBegin)))
\r
440 if(pX509 = p_PEM_read_bio_X509(pBIO, NULL, NULL, NULL))
\r
442 if(p_X509_STORE_add_cert(pStore, pX509) == 1)
\r
444 p_X509_free(pX509);
\r
464 if(memcmp(p, "-----BEGIN X509 CRL-----", 24) == 0)
\r
471 if(memcmp(p, "-----END X509 CRL-----", 22) == 0)
\r
476 if(pBIO = p_BIO_new_mem_buf(pBegin, (int)((size_t)pEnd - (size_t)pBegin)))
\r
478 if(pX509_CRL = p_PEM_read_bio_X509_CRL(pBIO, NULL, NULL, NULL))
\r
480 if(p_X509_STORE_add_crl(pStore, pX509_CRL) == 1)
\r
482 p_X509_CRL_free(pX509_CRL);
\r
494 LeaveCriticalSection(&g_OpenSSLLock);
\r
500 BOOL IsHostNameMatched(LPCSTR HostName, LPCSTR CommonName)
\r
503 const char* pAsterisk;
\r
504 size_t BeforeAsterisk;
\r
505 const char* pBeginAsterisk;
\r
506 const char* pEndAsterisk;
\r
509 if(HostName && CommonName)
\r
511 if(pAsterisk = strchr(CommonName, '*'))
\r
513 BeforeAsterisk = ((size_t)pAsterisk - (size_t)CommonName) / sizeof(char);
\r
514 pBeginAsterisk = HostName + BeforeAsterisk;
\r
515 while(*pAsterisk == '*')
\r
519 pEndAsterisk = HostName + strlen(HostName) - strlen(pAsterisk);
\r
520 // "*"より前は大文字小文字を無視して完全一致
\r
521 if(_strnicmp(HostName, CommonName, BeforeAsterisk) == 0)
\r
523 // "*"より後は大文字小文字を無視して完全一致
\r
524 if(_stricmp(pEndAsterisk, pAsterisk) == 0)
\r
526 // "*"と一致する範囲に"."が含まれてはならない
\r
527 pDot = strchr(pBeginAsterisk, '.');
\r
528 if(!pDot || pDot >= pEndAsterisk)
\r
533 else if(_stricmp(HostName, CommonName) == 0)
\r
540 // 主に自動更新ファイルのハッシュの改竄確認
\r
541 BOOL DecryptSignature(const char* PublicKey, const void* pIn, DWORD InLength, void* pOut, DWORD OutLength, DWORD* pOutLength)
\r
548 if(!g_bOpenSSLLoaded)
\r
551 if(pBIO = p_BIO_new_mem_buf((void*)PublicKey, sizeof(char) * strlen(PublicKey)))
\r
553 if(pPKEY = p_PEM_read_bio_PUBKEY(pBIO, NULL, NULL, NULL))
\r
555 if(pRSA = p_EVP_PKEY_get1_RSA(pPKEY))
\r
557 if(p_RSA_size(pRSA) <= (int)OutLength)
\r
559 i = p_RSA_public_decrypt((int)InLength, (const unsigned char*)pIn, (unsigned char*)pOut, pRSA, RSA_PKCS1_PADDING);
\r
562 *pOutLength = (DWORD)i;
\r
568 p_EVP_PKEY_free(pPKEY);
\r
576 // 他にも同等の関数はあるが主にマルウェア対策のための冗長化
\r
577 BOOL GetHashSHA1(const void* pData, DWORD Size, void* pHash)
\r
579 if(!g_bOpenSSLLoaded)
\r
581 p_SHA1((const unsigned char*)pData, (size_t)Size, (unsigned char*)pHash);
\r
585 BOOL GetHashSHA224(const void* pData, DWORD Size, void* pHash)
\r
587 if(!g_bOpenSSLLoaded)
\r
589 p_SHA224((const unsigned char*)pData, (size_t)Size, (unsigned char*)pHash);
\r
593 BOOL GetHashSHA256(const void* pData, DWORD Size, void* pHash)
\r
595 if(!g_bOpenSSLLoaded)
\r
597 p_SHA256((const unsigned char*)pData, (size_t)Size, (unsigned char*)pHash);
\r
601 BOOL GetHashSHA384(const void* pData, DWORD Size, void* pHash)
\r
603 if(!g_bOpenSSLLoaded)
\r
605 p_SHA384((const unsigned char*)pData, (size_t)Size, (unsigned char*)pHash);
\r
609 BOOL GetHashSHA512(const void* pData, DWORD Size, void* pHash)
\r
611 if(!g_bOpenSSLLoaded)
\r
613 p_SHA512((const unsigned char*)pData, (size_t)Size, (unsigned char*)pHash);
\r
618 BOOL AttachSSL(SOCKET s, SOCKET parent, BOOL* pbAborted, BOOL bStrengthen)
\r
625 SSL_SESSION* pSession;
\r
628 if(!g_bOpenSSLLoaded)
\r
631 Time = timeGetTime();
\r
632 EnterCriticalSection(&g_OpenSSLLock);
\r
635 g_pOpenSSLCTX = p_SSL_CTX_new(p_SSLv23_method());
\r
636 p_SSL_CTX_ctrl(g_pOpenSSLCTX, SSL_CTRL_MODE, SSL_MODE_ENABLE_PARTIAL_WRITE | SSL_MODE_AUTO_RETRY, NULL);
\r
640 if(ppSSL = GetUnusedSSLPointer())
\r
642 if(*ppSSL = p_SSL_new(g_pOpenSSLCTX))
\r
644 if(p_SSL_set_fd(*ppSSL, s) != 0)
\r
646 bInherited = FALSE;
\r
647 if(parent != INVALID_SOCKET)
\r
649 if(ppSSLParent = FindSSLPointerFromSocket(parent))
\r
651 if(pSession = p_SSL_get_session(*ppSSLParent))
\r
653 if(p_SSL_set_session(*ppSSL, pSession) == 1)
\r
662 p_SSL_ctrl(*ppSSL, SSL_CTRL_OPTIONS, SSL_OP_NO_SSLv2, NULL);
\r
663 p_SSL_set_cipher_list(*ppSSL, "HIGH");
\r
666 // SSLのネゴシエーションには時間がかかる場合がある
\r
670 Return = p_SSL_connect(*ppSSL);
\r
673 Error = p_SSL_get_error(*ppSSL, Return);
\r
674 if(Error == SSL_ERROR_WANT_READ || Error == SSL_ERROR_WANT_WRITE)
\r
676 LeaveCriticalSection(&g_OpenSSLLock);
\r
677 if(g_pOpenSSLTimeoutCallback(pbAborted) || (g_OpenSSLTimeout > 0 && timeGetTime() - Time >= g_OpenSSLTimeout))
\r
679 EnterCriticalSection(&g_OpenSSLLock);
\r
686 if(ConfirmSSLCertificate(*ppSSL, pbAborted))
\r
691 LeaveCriticalSection(&g_OpenSSLLock);
\r
694 EnterCriticalSection(&g_OpenSSLLock);
\r
699 LeaveCriticalSection(&g_OpenSSLLock);
\r
701 EnterCriticalSection(&g_OpenSSLLock);
\r
706 LeaveCriticalSection(&g_OpenSSLLock);
\r
708 EnterCriticalSection(&g_OpenSSLLock);
\r
713 LeaveCriticalSection(&g_OpenSSLLock);
\r
718 BOOL DetachSSL(SOCKET s)
\r
722 if(!g_bOpenSSLLoaded)
\r
725 EnterCriticalSection(&g_OpenSSLLock);
\r
726 if(ppSSL = FindSSLPointerFromSocket(s))
\r
728 p_SSL_shutdown(*ppSSL);
\r
729 p_SSL_free(*ppSSL);
\r
733 LeaveCriticalSection(&g_OpenSSLLock);
\r
737 // SSLとしてマークされているか確認
\r
738 // マークされていればTRUEを返す
\r
739 BOOL IsSSLAttached(SOCKET s)
\r
742 if(!g_bOpenSSLLoaded)
\r
744 EnterCriticalSection(&g_OpenSSLLock);
\r
745 ppSSL = FindSSLPointerFromSocket(s);
\r
746 LeaveCriticalSection(&g_OpenSSLLock);
\r
752 SOCKET FTPS_socket(int af, int type, int protocol)
\r
754 return socket(af, type, protocol);
\r
757 int FTPS_bind(SOCKET s, const struct sockaddr *addr, int namelen)
\r
759 return bind(s, addr, namelen);
\r
762 int FTPS_listen(SOCKET s, int backlog)
\r
764 return listen(s, backlog);
\r
768 // ただし初めからSSLのネゴシエーションを行う
\r
769 SOCKET FTPS_accept(SOCKET s, struct sockaddr *addr, int *addrlen)
\r
773 r = accept(s, addr, addrlen);
\r
775 if(!AttachSSL(r, INVALID_SOCKET, &bAborted, TRUE))
\r
778 return INVALID_SOCKET;
\r
784 // ただし初めからSSLのネゴシエーションを行う
\r
785 int FTPS_connect(SOCKET s, const struct sockaddr *name, int namelen)
\r
789 r = connect(s, name, namelen);
\r
791 if(!AttachSSL(r, INVALID_SOCKET, &bAborted, TRUE))
\r
792 return SOCKET_ERROR;
\r
796 // closesocket相当の関数
\r
797 int FTPS_closesocket(SOCKET s)
\r
800 return closesocket(s);
\r
804 int FTPS_send(SOCKET s, const char * buf, int len, int flags)
\r
808 if(!g_bOpenSSLLoaded)
\r
809 return send(s, buf, len, flags);
\r
810 EnterCriticalSection(&g_OpenSSLLock);
\r
811 ppSSL = FindSSLPointerFromSocket(s);
\r
812 LeaveCriticalSection(&g_OpenSSLLock);
\r
814 return send(s, buf, len, flags);
\r
815 r = p_SSL_write(*ppSSL, buf, len);
\r
817 return SOCKET_ERROR;
\r
822 int FTPS_recv(SOCKET s, char * buf, int len, int flags)
\r
826 if(!g_bOpenSSLLoaded)
\r
827 return recv(s, buf, len, flags);
\r
828 EnterCriticalSection(&g_OpenSSLLock);
\r
829 ppSSL = FindSSLPointerFromSocket(s);
\r
830 LeaveCriticalSection(&g_OpenSSLLock);
\r
832 return recv(s, buf, len, flags);
\r
833 if(flags & MSG_PEEK)
\r
834 r = p_SSL_peek(*ppSSL, buf, len);
\r
836 r = p_SSL_read(*ppSSL, buf, len);
\r
838 return SOCKET_ERROR;
\r
844 const struct in6_addr IN6ADDR_NONE = {{0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}};
\r
855 } GETHOSTBYNAMEDATA;
\r
857 DWORD WINAPI WSAAsyncGetHostByNameIPv6ThreadProc(LPVOID lpParameter)
\r
859 GETHOSTBYNAMEDATA* pData;
\r
860 struct hostent* pHost;
\r
861 struct addrinfo* pAddr;
\r
862 struct addrinfo* p;
\r
864 pData = (GETHOSTBYNAMEDATA*)lpParameter;
\r
865 if(getaddrinfo(pData->name, NULL, NULL, &pAddr) == 0)
\r
870 if(p->ai_family == pData->Family)
\r
872 switch(p->ai_family)
\r
875 pHost = (struct hostent*)pData->buf;
\r
876 if((size_t)pData->buflen >= sizeof(struct hostent) + sizeof(char*) * 2 + sizeof(struct in_addr)
\r
877 && p->ai_addrlen >= sizeof(struct sockaddr_in))
\r
879 pHost->h_name = NULL;
\r
880 pHost->h_aliases = NULL;
\r
881 pHost->h_addrtype = p->ai_family;
\r
882 pHost->h_length = sizeof(struct in_addr);
\r
883 pHost->h_addr_list = (char**)(&pHost[1]);
\r
884 pHost->h_addr_list[0] = (char*)(&pHost->h_addr_list[2]);
\r
885 pHost->h_addr_list[1] = NULL;
\r
886 memcpy(pHost->h_addr_list[0], &((struct sockaddr_in*)p->ai_addr)->sin_addr, sizeof(struct in_addr));
\r
887 PostMessage(pData->hWnd, pData->wMsg, (WPARAM)pData->h, (LPARAM)(sizeof(struct hostent) + sizeof(char*) * 2 + sizeof(struct in_addr)));
\r
890 PostMessage(pData->hWnd, pData->wMsg, (WPARAM)pData->h, (LPARAM)(WSAENOBUFS << 16));
\r
893 pHost = (struct hostent*)pData->buf;
\r
894 if((size_t)pData->buflen >= sizeof(struct hostent) + sizeof(char*) * 2 + sizeof(struct in6_addr)
\r
895 && p->ai_addrlen >= sizeof(struct sockaddr_in6))
\r
897 pHost->h_name = NULL;
\r
898 pHost->h_aliases = NULL;
\r
899 pHost->h_addrtype = p->ai_family;
\r
900 pHost->h_length = sizeof(struct in6_addr);
\r
901 pHost->h_addr_list = (char**)(&pHost[1]);
\r
902 pHost->h_addr_list[0] = (char*)(&pHost->h_addr_list[2]);
\r
903 pHost->h_addr_list[1] = NULL;
\r
904 memcpy(pHost->h_addr_list[0], &((struct sockaddr_in6*)p->ai_addr)->sin6_addr, sizeof(struct in6_addr));
\r
905 PostMessage(pData->hWnd, pData->wMsg, (WPARAM)pData->h, (LPARAM)(sizeof(struct hostent) + sizeof(char*) * 2 + sizeof(struct in6_addr)));
\r
908 PostMessage(pData->hWnd, pData->wMsg, (WPARAM)pData->h, (LPARAM)(WSAENOBUFS << 16));
\r
917 PostMessage(pData->hWnd, pData->wMsg, (WPARAM)pData->h, (LPARAM)(ERROR_INVALID_FUNCTION << 16));
\r
918 freeaddrinfo(pAddr);
\r
921 PostMessage(pData->hWnd, pData->wMsg, (WPARAM)pData->h, (LPARAM)(ERROR_INVALID_FUNCTION << 16));
\r
922 // CreateThreadが返すハンドルが重複するのを回避
\r
924 CloseHandle(pData->h);
\r
930 // IPv6対応のWSAAsyncGetHostByName相当の関数
\r
931 // FamilyにはAF_INETまたはAF_INET6を指定可能
\r
933 HANDLE WSAAsyncGetHostByNameIPv6(HWND hWnd, u_int wMsg, const char * name, char * buf, int buflen, short Family)
\r
936 GETHOSTBYNAMEDATA* pData;
\r
938 if(pData = malloc(sizeof(GETHOSTBYNAMEDATA)))
\r
940 pData->hWnd = hWnd;
\r
941 pData->wMsg = wMsg;
\r
942 if(pData->name = malloc(sizeof(char) * (strlen(name) + 1)))
\r
944 strcpy(pData->name, name);
\r
946 pData->buflen = buflen;
\r
947 pData->Family = Family;
\r
948 if(pData->h = CreateThread(NULL, 0, WSAAsyncGetHostByNameIPv6ThreadProc, pData, CREATE_SUSPENDED, NULL))
\r
950 ResumeThread(pData->h);
\r
951 hResult = pData->h;
\r
967 // WSAAsyncGetHostByNameIPv6用のWSACancelAsyncRequest相当の関数
\r
968 int WSACancelAsyncRequestIPv6(HANDLE hAsyncTaskHandle)
\r
971 Result = SOCKET_ERROR;
\r
972 if(TerminateThread(hAsyncTaskHandle, 0))
\r
974 CloseHandle(hAsyncTaskHandle);
\r
980 char* AddressToStringIPv4(char* str, void* in)
\r
985 p = (unsigned char*)in;
\r
986 sprintf(str, "%u.%u.%u.%u", p[0], p[1], p[2], p[3]);
\r
990 char* AddressToStringIPv6(char* str, void* in6)
\r
1000 p = (unsigned char*)in6;
\r
1003 for(i = 0; i < 8; i++)
\r
1005 for(j = i; j < 8; j++)
\r
1007 if(p[j * 2] != 0 || p[j * 2 + 1] != 0)
\r
1010 if(j - i > MaxZeroLen)
\r
1013 MaxZeroLen = j - i;
\r
1017 for(i = 0; i < 8; i++)
\r
1025 else if(i < MaxZero || i >= MaxZero + MaxZeroLen)
\r
1027 sprintf(Tmp, "%x", (((int)p[i * 2] & 0xff) << 8) | ((int)p[i * 2 + 1] & 0xff));
\r
1036 // IPv6対応のinet_ntoa相当の関数
\r
1038 char* inet6_ntoa(struct in6_addr in6)
\r
1041 static char Adrs[40];
\r
1043 memset(Adrs, 0, sizeof(Adrs));
\r
1044 pResult = AddressToStringIPv6(Adrs, &in6);
\r
1048 // IPv6対応のinet_addr相当の関数
\r
1050 struct in6_addr inet6_addr(const char* cp)
\r
1052 struct in6_addr Result;
\r
1056 memset(&Result, 0, sizeof(Result));
\r
1058 for(i = 0; i < 8; i++)
\r
1062 memcpy(&Result, &IN6ADDR_NONE, sizeof(struct in6_addr));
\r
1065 if(i >= AfterZero)
\r
1067 if(strncmp(cp, ":", 1) == 0)
\r
1070 if(i == 0 && strncmp(cp, ":", 1) == 0)
\r
1074 while(p = strstr(p, ":"))
\r
1082 Result.u.Word[i] = (USHORT)strtol(cp, &p, 16);
\r
1083 Result.u.Word[i] = ((Result.u.Word[i] & 0xff00) >> 8) | ((Result.u.Word[i] & 0x00ff) << 8);
\r
1084 if(strncmp(p, ":", 1) != 0 && strlen(p) > 0)
\r
1086 memcpy(&Result, &IN6ADDR_NONE, sizeof(struct in6_addr));
\r
1089 if(cp = strstr(cp, ":"))
\r
1097 BOOL ConvertDomainNameToPunycode(LPSTR Output, DWORD Count, LPCSTR Input)
\r
1100 punycode_uint* pUnicode;
\r
1103 LPCSTR InputString;
\r
1104 punycode_uint Length;
\r
1105 punycode_uint OutputLength;
\r
1107 if(pUnicode = malloc(sizeof(punycode_uint) * strlen(Input)))
\r
1111 InputString = Input;
\r
1113 while(*InputString != '\0')
\r
1115 *p = (punycode_uint)GetNextCharM(InputString, NULL, &InputString);
\r
1123 if(Count >= strlen("xn--") + 1)
\r
1125 strcpy(Output, "xn--");
\r
1126 OutputLength = Count - strlen("xn--");
\r
1127 if(punycode_encode(Length, pUnicode, NULL, (punycode_uint*)&OutputLength, Output + strlen("xn--")) == punycode_success)
\r
1129 Output[strlen("xn--") + OutputLength] = '\0';
\r
1138 if(Count >= strlen(Input) + 1)
\r
1140 strcpy(Output, Input);
\r
1147 BOOL ConvertNameToPunycode(LPSTR Output, LPCSTR Input)
\r
1156 Length = strlen(Input);
\r
1157 if(pm0 = AllocateStringM(Length + 1))
\r
1159 if(pm1 = AllocateStringM(Length * 4 + 1))
\r
1161 strcpy(pm0, Input);
\r
1165 if(pNext = strchr(p, '.'))
\r
1170 if(ConvertDomainNameToPunycode(pm1, Length * 4, p))
\r
1171 strcat(Output, pm1);
\r
1173 strcat(Output, ".");
\r
1177 FreeDuplicatedString(pm1);
\r
1179 FreeDuplicatedString(pm0);
\r
1184 HANDLE WSAAsyncGetHostByNameM(HWND hWnd, u_int wMsg, const char * name, char * buf, int buflen)
\r
1188 if(pa0 = AllocateStringA(strlen(name) * 4))
\r
1190 if(ConvertNameToPunycode(pa0, name))
\r
1191 r = WSAAsyncGetHostByName(hWnd, wMsg, pa0, buf, buflen);
\r
1193 FreeDuplicatedString(pa0);
\r
1197 HANDLE WSAAsyncGetHostByNameIPv6M(HWND hWnd, u_int wMsg, const char * name, char * buf, int buflen, short Family)
\r
1201 if(pa0 = AllocateStringA(strlen(name) * 4))
\r
1203 if(ConvertNameToPunycode(pa0, name))
\r
1204 r = WSAAsyncGetHostByNameIPv6(hWnd, wMsg, pa0, buf, buflen, Family);
\r
1206 FreeDuplicatedString(pa0);
\r
1212 typedef void* (__cdecl* _SFTP_Create)();
\r
1213 typedef void (__cdecl* _SFTP_Destroy)(void*);
\r
1214 typedef BOOL (__cdecl* _SFTP_IsExited)(void*);
\r
1215 typedef BOOL (__cdecl* _SFTP_SetTimeoutCallback)(void*, void*);
\r
1216 typedef size_t (__cdecl* _SFTP_PeekStdOut)(void*, void*, size_t);
\r
1217 typedef size_t (__cdecl* _SFTP_ReadStdOut)(void*, void*, size_t);
\r
1218 typedef size_t (__cdecl* _SFTP_WriteStdIn)(void*, const void*, size_t);
\r
1219 typedef size_t (__cdecl* _SFTP_PeekDataOut)(void*, void*, size_t);
\r
1220 typedef size_t (__cdecl* _SFTP_ReadDataOut)(void*, void*, size_t);
\r
1221 typedef size_t (__cdecl* _SFTP_WriteDataIn)(void*, const void*, size_t);
\r
1222 typedef BOOL (__cdecl* _SFTP_SetFilePosition)(void*, LONGLONG);
\r
1224 _SFTP_Create p_SFTP_Create;
\r
1225 _SFTP_Destroy p_SFTP_Destroy;
\r
1226 _SFTP_IsExited p_SFTP_IsExited;
\r
1227 _SFTP_SetTimeoutCallback p_SFTP_SetTimeoutCallback;
\r
1228 _SFTP_PeekStdOut p_SFTP_PeekStdOut;
\r
1229 _SFTP_ReadStdOut p_SFTP_ReadStdOut;
\r
1230 _SFTP_WriteStdIn p_SFTP_WriteStdIn;
\r
1231 _SFTP_PeekDataOut p_SFTP_PeekDataOut;
\r
1232 _SFTP_ReadDataOut p_SFTP_ReadDataOut;
\r
1233 _SFTP_WriteDataIn p_SFTP_WriteDataIn;
\r
1234 _SFTP_SetFilePosition p_SFTP_SetFilePosition;
\r
1244 char Password[1024];
\r
1247 #define MAX_SFTP_SOCKET 16
\r
1249 BOOL g_bPuTTYLoaded;
\r
1251 CRITICAL_SECTION g_PuTTYLock;
\r
1252 SFTPDATA g_SFTPData[MAX_SFTP_SOCKET];
\r
1258 if(g_bPuTTYLoaded)
\r
1260 #ifdef ENABLE_PROCESS_PROTECTION
\r
1261 // ビルドしたputty.dllに合わせてSHA1ハッシュ値を変更すること
\r
1262 #if defined(_M_IX86)
\r
1263 RegisterTrustedModuleSHA1Hash("\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00");
\r
1264 #elif defined(_M_AMD64)
\r
1265 RegisterTrustedModuleSHA1Hash("\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00");
\r
1271 char Path[MAX_PATH];
\r
1272 GetModuleFileName(NULL, Path, MAX_PATH);
\r
1273 strcpy(strrchr(Path, '\\'), "\\..\\putty\\Debug\\PuTTY.dll");
\r
1274 g_hPuTTY = LoadLibrary(Path);
\r
1277 g_hPuTTY = LoadLibrary("putty.dll");
\r
1280 || !(p_SFTP_Create = (_SFTP_Create)GetProcAddress(g_hPuTTY, "SFTP_Create"))
\r
1281 || !(p_SFTP_Destroy = (_SFTP_Destroy)GetProcAddress(g_hPuTTY, "SFTP_Destroy"))
\r
1282 || !(p_SFTP_IsExited = (_SFTP_IsExited)GetProcAddress(g_hPuTTY, "SFTP_IsExited"))
\r
1283 || !(p_SFTP_SetTimeoutCallback = (_SFTP_SetTimeoutCallback)GetProcAddress(g_hPuTTY, "SFTP_SetTimeoutCallback"))
\r
1284 || !(p_SFTP_PeekStdOut = (_SFTP_PeekStdOut)GetProcAddress(g_hPuTTY, "SFTP_PeekStdOut"))
\r
1285 || !(p_SFTP_ReadStdOut = (_SFTP_ReadStdOut)GetProcAddress(g_hPuTTY, "SFTP_ReadStdOut"))
\r
1286 || !(p_SFTP_WriteStdIn = (_SFTP_WriteStdIn)GetProcAddress(g_hPuTTY, "SFTP_WriteStdIn"))
\r
1287 || !(p_SFTP_PeekDataOut = (_SFTP_PeekDataOut)GetProcAddress(g_hPuTTY, "SFTP_PeekDataOut"))
\r
1288 || !(p_SFTP_ReadDataOut = (_SFTP_ReadDataOut)GetProcAddress(g_hPuTTY, "SFTP_ReadDataOut"))
\r
1289 || !(p_SFTP_WriteDataIn = (_SFTP_WriteDataIn)GetProcAddress(g_hPuTTY, "SFTP_WriteDataIn"))
\r
1290 || !(p_SFTP_SetFilePosition = (_SFTP_SetFilePosition)GetProcAddress(g_hPuTTY, "SFTP_SetFilePosition")))
\r
1293 FreeLibrary(g_hPuTTY);
\r
1297 for(i = 0; i < MAX_SFTP_SOCKET; i++)
\r
1299 g_SFTPData[i].Control = INVALID_SOCKET;
\r
1300 g_SFTPData[i].Data = INVALID_SOCKET;
\r
1302 InitializeCriticalSection(&g_PuTTYLock);
\r
1303 g_bPuTTYLoaded = TRUE;
\r
1311 if(!g_bPuTTYLoaded)
\r
1313 EnterCriticalSection(&g_PuTTYLock);
\r
1314 for(i = 0; i < MAX_SFTP_SOCKET; i++)
\r
1316 if(g_SFTPData[i].Control != INVALID_SOCKET)
\r
1318 closesocket(g_SFTPData[i].Control);
\r
1319 g_SFTPData[i].Control = INVALID_SOCKET;
\r
1320 p_SFTP_Destroy(g_SFTPData[i].Handle);
\r
1322 if(g_SFTPData[i].Data != INVALID_SOCKET)
\r
1324 closesocket(g_SFTPData[i].Data);
\r
1325 g_SFTPData[i].Data = INVALID_SOCKET;
\r
1328 FreeLibrary(g_hPuTTY);
\r
1330 LeaveCriticalSection(&g_PuTTYLock);
\r
1331 DeleteCriticalSection(&g_PuTTYLock);
\r
1332 g_bPuTTYLoaded = FALSE;
\r
1335 // PuTTYが使用可能かどうか確認
\r
1336 BOOL IsPuTTYLoaded()
\r
1338 return g_bPuTTYLoaded;
\r
1341 SFTPDATA* GetUnusedSFTPData()
\r
1344 for(i = 0; i < MAX_SFTP_SOCKET; i++)
\r
1346 if(g_SFTPData[i].Control == INVALID_SOCKET)
\r
1348 memset(&g_SFTPData[i], 0, sizeof(SFTPDATA));
\r
1349 return &g_SFTPData[i];
\r
1355 SFTPDATA* FindSFTPDataFromSocket(SOCKET s)
\r
1358 for(i = 0; i < MAX_SFTP_SOCKET; i++)
\r
1360 if(g_SFTPData[i].Control == s || g_SFTPData[i].Data == s)
\r
1361 return &g_SFTPData[i];
\r
1366 // SFTPとしてマークされているか確認
\r
1367 // マークされていればTRUEを返す
\r
1368 BOOL IsSFTPAttached(SOCKET s)
\r
1370 SFTPDATA* pSFTPData;
\r
1371 if(!g_bPuTTYLoaded)
\r
1373 EnterCriticalSection(&g_PuTTYLock);
\r
1374 pSFTPData = FindSFTPDataFromSocket(s);
\r
1375 LeaveCriticalSection(&g_PuTTYLock);
\r
1381 // コントロール用の仮想的なソケットを取得
\r
1382 // 識別子としてダミーのソケットを返す
\r
1383 SOCKET SFTP_socket(int af, int type, int protocol)
\r
1386 SFTPDATA* pSFTPData;
\r
1387 if(!g_bPuTTYLoaded)
\r
1388 return INVALID_SOCKET;
\r
1389 r = INVALID_SOCKET;
\r
1390 EnterCriticalSection(&g_PuTTYLock);
\r
1391 if(pSFTPData = GetUnusedSFTPData())
\r
1393 r = socket(af, type, protocol);
\r
1394 pSFTPData->Control = r;
\r
1395 pSFTPData->Data = INVALID_SOCKET;
\r
1396 pSFTPData->Handle = p_SFTP_Create();
\r
1398 LeaveCriticalSection(&g_PuTTYLock);
\r
1402 int SFTP_bind(SOCKET s, const struct sockaddr *addr, int namelen)
\r
1404 return SOCKET_ERROR;
\r
1407 int SFTP_listen(SOCKET s, int backlog)
\r
1409 return SOCKET_ERROR;
\r
1413 SOCKET SFTP_accept(SOCKET s, struct sockaddr *addr, int *addrlen)
\r
1415 return INVALID_SOCKET;
\r
1419 int SFTP_connect(SOCKET s, const struct sockaddr *name, int namelen)
\r
1421 SFTPDATA* pSFTPData;
\r
1422 if(!g_bPuTTYLoaded)
\r
1423 return SOCKET_ERROR;
\r
1424 EnterCriticalSection(&g_PuTTYLock);
\r
1425 pSFTPData = FindSFTPDataFromSocket(s);
\r
1426 LeaveCriticalSection(&g_PuTTYLock);
\r
1428 return SOCKET_ERROR;
\r
1429 if(namelen == sizeof(struct sockaddr_in))
\r
1432 else if(namelen == sizeof(struct sockaddr_in6))
\r
1436 return SOCKET_ERROR;
\r
1440 // closesocket相当の関数
\r
1441 int SFTP_closesocket(SOCKET s)
\r
1443 SFTPDATA* pSFTPData;
\r
1444 if(!g_bPuTTYLoaded)
\r
1445 return SOCKET_ERROR;
\r
1446 EnterCriticalSection(&g_PuTTYLock);
\r
1447 if(pSFTPData = FindSFTPDataFromSocket(s))
\r
1449 if(pSFTPData->Control == s)
\r
1451 pSFTPData->Control = INVALID_SOCKET;
\r
1452 p_SFTP_Destroy(pSFTPData->Handle);
\r
1454 if(pSFTPData->Data == s)
\r
1455 pSFTPData->Data = INVALID_SOCKET;
\r
1457 LeaveCriticalSection(&g_PuTTYLock);
\r
1458 return closesocket(s);
\r
1462 int SFTP_send(SOCKET s, const char * buf, int len, int flags)
\r
1465 SFTPDATA* pSFTPData;
\r
1466 if(!g_bPuTTYLoaded)
\r
1467 return SOCKET_ERROR;
\r
1468 EnterCriticalSection(&g_PuTTYLock);
\r
1469 pSFTPData = FindSFTPDataFromSocket(s);
\r
1470 LeaveCriticalSection(&g_PuTTYLock);
\r
1472 return SOCKET_ERROR;
\r
1473 if(p_SFTP_IsExited(pSFTPData->Handle))
\r
1474 return SOCKET_ERROR;
\r
1476 if(pSFTPData->Control == s)
\r
1477 r = (int)p_SFTP_WriteStdIn(pSFTPData->Handle, buf, len);
\r
1478 else if(pSFTPData->Data == s)
\r
1479 r = (int)p_SFTP_WriteDataIn(pSFTPData->Handle, buf, len);
\r
1484 int SFTP_recv(SOCKET s, char * buf, int len, int flags)
\r
1487 SFTPDATA* pSFTPData;
\r
1488 if(!g_bPuTTYLoaded)
\r
1489 return SOCKET_ERROR;
\r
1490 EnterCriticalSection(&g_PuTTYLock);
\r
1491 pSFTPData = FindSFTPDataFromSocket(s);
\r
1492 LeaveCriticalSection(&g_PuTTYLock);
\r
1494 return SOCKET_ERROR;
\r
1495 if(p_SFTP_IsExited(pSFTPData->Handle))
\r
1496 return SOCKET_ERROR;
\r
1498 if(pSFTPData->Control == s)
\r
1500 if(flags & MSG_PEEK)
\r
1501 r = (int)p_SFTP_PeekStdOut(pSFTPData->Handle, buf, len);
\r
1503 r = (int)p_SFTP_ReadStdOut(pSFTPData->Handle, buf, len);
\r
1505 else if(pSFTPData->Data == s)
\r
1507 if(flags & MSG_PEEK)
\r
1508 r = (int)p_SFTP_PeekDataOut(pSFTPData->Handle, buf, len);
\r
1510 r = (int)p_SFTP_ReadDataOut(pSFTPData->Handle, buf, len);
\r
1515 BOOL SFTP_SetTimeoutCallback(SOCKET s, void* pCallback)
\r
1517 SFTPDATA* pSFTPData;
\r
1518 if(!g_bPuTTYLoaded)
\r
1520 EnterCriticalSection(&g_PuTTYLock);
\r
1521 pSFTPData = FindSFTPDataFromSocket(s);
\r
1522 LeaveCriticalSection(&g_PuTTYLock);
\r
1525 return p_SFTP_SetTimeoutCallback(pSFTPData->Handle, pCallback);
\r
1528 // データ用の仮想的なソケットを取得
\r
1529 // 識別子としてダミーのソケットを返す
\r
1530 SOCKET SFTP_GetDataHandle(SOCKET s, int af, int type, int protocol)
\r
1533 SFTPDATA* pSFTPData;
\r
1534 if(!g_bPuTTYLoaded)
\r
1535 return INVALID_SOCKET;
\r
1536 r = INVALID_SOCKET;
\r
1537 EnterCriticalSection(&g_PuTTYLock);
\r
1538 if(pSFTPData = FindSFTPDataFromSocket(s))
\r
1540 r = socket(af, type, protocol);
\r
1541 pSFTPData->Data = r;
\r
1543 LeaveCriticalSection(&g_PuTTYLock);
\r
1547 BOOL SFTP_SetFilePosition(SOCKET s, LONGLONG Position)
\r
1549 SFTPDATA* pSFTPData;
\r
1550 if(!g_bPuTTYLoaded)
\r
1552 EnterCriticalSection(&g_PuTTYLock);
\r
1553 pSFTPData = FindSFTPDataFromSocket(s);
\r
1554 LeaveCriticalSection(&g_PuTTYLock);
\r
1557 return p_SFTP_SetFilePosition(pSFTPData->Handle, Position);
\r