OSDN Git Service

Recompile executable files.
[ffftp/ffftp.git] / socketwrapper.c
1 // socketwrapper.c\r
2 // Copyright (C) 2011 Suguru Kawamoto\r
3 // ソケットラッパー\r
4 // socket関連関数をOpenSSL用に置換\r
5 // socket関連関数のIPv6対応\r
6 // コンパイルにはOpenSSLのヘッダーファイルが必要\r
7 // 実行にはOpenSSLのDLLが必要\r
8 \r
9 #include <ws2tcpip.h>\r
10 #include <windows.h>\r
11 #include <mmsystem.h>\r
12 #include <openssl/ssl.h>\r
13 \r
14 #include "socketwrapper.h"\r
15 #include "protectprocess.h"\r
16 #include "mbswrapper.h"\r
17 #include "punycode.h"\r
18 \r
19 // FTPS対応\r
20 \r
21 typedef void (__cdecl* _SSL_load_error_strings)();\r
22 typedef int (__cdecl* _SSL_library_init)();\r
23 typedef SSL_METHOD* (__cdecl* _SSLv23_method)();\r
24 typedef SSL_CTX* (__cdecl* _SSL_CTX_new)(SSL_METHOD*);\r
25 typedef void (__cdecl* _SSL_CTX_free)(SSL_CTX*);\r
26 typedef SSL* (__cdecl* _SSL_new)(SSL_CTX*);\r
27 typedef void (__cdecl* _SSL_free)(SSL*);\r
28 typedef int (__cdecl* _SSL_shutdown)(SSL*);\r
29 typedef int (__cdecl* _SSL_get_fd)(SSL*);\r
30 typedef int (__cdecl* _SSL_set_fd)(SSL*, int);\r
31 typedef int (__cdecl* _SSL_accept)(SSL*);\r
32 typedef int (__cdecl* _SSL_connect)(SSL*);\r
33 typedef int (__cdecl* _SSL_write)(SSL*, const void*, int);\r
34 typedef int (__cdecl* _SSL_peek)(SSL*, void*, int);\r
35 typedef int (__cdecl* _SSL_read)(SSL*, void*, int);\r
36 typedef int (__cdecl* _SSL_get_error)(SSL*, int);\r
37 typedef X509* (__cdecl* _SSL_get_peer_certificate)(const SSL*);\r
38 typedef long (__cdecl* _SSL_get_verify_result)(const SSL*);\r
39 typedef SSL_SESSION* (__cdecl* _SSL_get_session)(SSL*);\r
40 typedef int (__cdecl* _SSL_set_session)(SSL*, SSL_SESSION*);\r
41 typedef X509_STORE* (__cdecl* _SSL_CTX_get_cert_store)(const SSL_CTX*);\r
42 typedef long (__cdecl* _SSL_CTX_ctrl)(SSL_CTX*, int, long, void*);\r
43 typedef BIO_METHOD* (__cdecl* _BIO_s_mem)();\r
44 typedef BIO* (__cdecl* _BIO_new)(BIO_METHOD*);\r
45 typedef int (__cdecl* _BIO_free)(BIO*);\r
46 typedef BIO* (__cdecl* _BIO_new_mem_buf)(void*, int);\r
47 typedef long (__cdecl* _BIO_ctrl)(BIO*, int, long, void*);\r
48 typedef void (__cdecl* _X509_free)(X509*);\r
49 typedef int (__cdecl* _X509_print_ex)(BIO*, X509*, unsigned long, unsigned long);\r
50 typedef X509_NAME* (__cdecl* _X509_get_subject_name)(X509*);\r
51 typedef int (__cdecl* _X509_NAME_print_ex)(BIO*, X509_NAME*, int, unsigned long);\r
52 typedef X509* (__cdecl* _PEM_read_bio_X509)(BIO*, X509**, pem_password_cb*, void*);\r
53 typedef int (__cdecl* _X509_STORE_add_cert)(X509_STORE*, X509*);\r
54 \r
55 _SSL_load_error_strings p_SSL_load_error_strings;\r
56 _SSL_library_init p_SSL_library_init;\r
57 _SSLv23_method p_SSLv23_method;\r
58 _SSL_CTX_new p_SSL_CTX_new;\r
59 _SSL_CTX_free p_SSL_CTX_free;\r
60 _SSL_new p_SSL_new;\r
61 _SSL_free p_SSL_free;\r
62 _SSL_shutdown p_SSL_shutdown;\r
63 _SSL_get_fd p_SSL_get_fd;\r
64 _SSL_set_fd p_SSL_set_fd;\r
65 _SSL_accept p_SSL_accept;\r
66 _SSL_connect p_SSL_connect;\r
67 _SSL_write p_SSL_write;\r
68 _SSL_peek p_SSL_peek;\r
69 _SSL_read p_SSL_read;\r
70 _SSL_get_error p_SSL_get_error;\r
71 _SSL_get_peer_certificate p_SSL_get_peer_certificate;\r
72 _SSL_get_verify_result p_SSL_get_verify_result;\r
73 _SSL_get_session p_SSL_get_session;\r
74 _SSL_set_session p_SSL_set_session;\r
75 _SSL_CTX_get_cert_store p_SSL_CTX_get_cert_store;\r
76 _SSL_CTX_ctrl p_SSL_CTX_ctrl;\r
77 _BIO_s_mem p_BIO_s_mem;\r
78 _BIO_new p_BIO_new;\r
79 _BIO_free p_BIO_free;\r
80 _BIO_new_mem_buf p_BIO_new_mem_buf;\r
81 _BIO_ctrl p_BIO_ctrl;\r
82 _X509_free p_X509_free;\r
83 _X509_print_ex p_X509_print_ex;\r
84 _X509_get_subject_name p_X509_get_subject_name;\r
85 _X509_NAME_print_ex p_X509_NAME_print_ex;\r
86 _PEM_read_bio_X509 p_PEM_read_bio_X509;\r
87 _X509_STORE_add_cert p_X509_STORE_add_cert;\r
88 \r
89 #define MAX_SSL_SOCKET 16\r
90 \r
91 BOOL g_bOpenSSLLoaded;\r
92 HMODULE g_hOpenSSL;\r
93 HMODULE g_hOpenSSLCommon;\r
94 CRITICAL_SECTION g_OpenSSLLock;\r
95 DWORD g_OpenSSLTimeout;\r
96 LPSSLTIMEOUTCALLBACK g_pOpenSSLTimeoutCallback;\r
97 LPSSLCONFIRMCALLBACK g_pOpenSSLConfirmCallback;\r
98 SSL_CTX* g_pOpenSSLCTX;\r
99 SSL* g_pOpenSSLHandle[MAX_SSL_SOCKET];\r
100 \r
101 BOOL __stdcall DefaultSSLTimeoutCallback(BOOL* pbAborted)\r
102 {\r
103         Sleep(100);\r
104         return *pbAborted;\r
105 }\r
106 \r
107 BOOL __stdcall DefaultSSLConfirmCallback(BOOL* pbAborted, BOOL bVerified, LPCSTR Certificate, LPCSTR CommonName)\r
108 {\r
109         return bVerified;\r
110 }\r
111 \r
112 // OpenSSLを初期化\r
113 BOOL LoadOpenSSL()\r
114 {\r
115         if(g_bOpenSSLLoaded)\r
116                 return FALSE;\r
117 #ifdef ENABLE_PROCESS_PROTECTION\r
118         // 同梱するOpenSSLのバージョンに合わせてSHA1ハッシュ値を変更すること\r
119         // ssleay32.dll 1.0.1e\r
120         RegisterTrustedModuleSHA1Hash("\xE8\x9A\x16\xDF\xCE\xA2\x7E\x55\x28\xC4\x78\x1A\x21\x40\xCB\x57\xDC\x40\xCD\x61");\r
121         // libeay32.dll 1.0.1e\r
122         RegisterTrustedModuleSHA1Hash("\x38\xC8\x30\xCB\xE0\x5D\x4E\xF7\xA1\x93\xBB\xF7\x54\xA5\x21\xC8\xF7\xA1\x85\xC5");\r
123 #endif\r
124         g_hOpenSSL = LoadLibrary("ssleay32.dll");\r
125         // バージョン固定のためlibssl32.dllの読み込みは脆弱性の原因になり得るので廃止\r
126 //      if(!g_hOpenSSL)\r
127 //              g_hOpenSSL = LoadLibrary("libssl32.dll");\r
128         if(!g_hOpenSSL\r
129                 || !(p_SSL_load_error_strings = (_SSL_load_error_strings)GetProcAddress(g_hOpenSSL, "SSL_load_error_strings"))\r
130                 || !(p_SSL_library_init = (_SSL_library_init)GetProcAddress(g_hOpenSSL, "SSL_library_init"))\r
131                 || !(p_SSLv23_method = (_SSLv23_method)GetProcAddress(g_hOpenSSL, "SSLv23_method"))\r
132                 || !(p_SSL_CTX_new = (_SSL_CTX_new)GetProcAddress(g_hOpenSSL, "SSL_CTX_new"))\r
133                 || !(p_SSL_CTX_free = (_SSL_CTX_free)GetProcAddress(g_hOpenSSL, "SSL_CTX_free"))\r
134                 || !(p_SSL_new = (_SSL_new)GetProcAddress(g_hOpenSSL, "SSL_new"))\r
135                 || !(p_SSL_free = (_SSL_free)GetProcAddress(g_hOpenSSL, "SSL_free"))\r
136                 || !(p_SSL_shutdown = (_SSL_shutdown)GetProcAddress(g_hOpenSSL, "SSL_shutdown"))\r
137                 || !(p_SSL_get_fd = (_SSL_get_fd)GetProcAddress(g_hOpenSSL, "SSL_get_fd"))\r
138                 || !(p_SSL_set_fd = (_SSL_set_fd)GetProcAddress(g_hOpenSSL, "SSL_set_fd"))\r
139                 || !(p_SSL_accept = (_SSL_accept)GetProcAddress(g_hOpenSSL, "SSL_accept"))\r
140                 || !(p_SSL_connect = (_SSL_connect)GetProcAddress(g_hOpenSSL, "SSL_connect"))\r
141                 || !(p_SSL_write = (_SSL_write)GetProcAddress(g_hOpenSSL, "SSL_write"))\r
142                 || !(p_SSL_peek = (_SSL_peek)GetProcAddress(g_hOpenSSL, "SSL_peek"))\r
143                 || !(p_SSL_read = (_SSL_read)GetProcAddress(g_hOpenSSL, "SSL_read"))\r
144                 || !(p_SSL_get_error = (_SSL_get_error)GetProcAddress(g_hOpenSSL, "SSL_get_error"))\r
145                 || !(p_SSL_get_peer_certificate = (_SSL_get_peer_certificate)GetProcAddress(g_hOpenSSL, "SSL_get_peer_certificate"))\r
146                 || !(p_SSL_get_verify_result = (_SSL_get_verify_result)GetProcAddress(g_hOpenSSL, "SSL_get_verify_result"))\r
147                 || !(p_SSL_get_session = (_SSL_get_session)GetProcAddress(g_hOpenSSL, "SSL_get_session"))\r
148                 || !(p_SSL_set_session = (_SSL_set_session)GetProcAddress(g_hOpenSSL, "SSL_set_session"))\r
149                 || !(p_SSL_CTX_get_cert_store = (_SSL_CTX_get_cert_store)GetProcAddress(g_hOpenSSL, "SSL_CTX_get_cert_store"))\r
150                 || !(p_SSL_CTX_ctrl = (_SSL_CTX_ctrl)GetProcAddress(g_hOpenSSL, "SSL_CTX_ctrl")))\r
151         {\r
152                 if(g_hOpenSSL)\r
153                         FreeLibrary(g_hOpenSSL);\r
154                 g_hOpenSSL = NULL;\r
155                 return FALSE;\r
156         }\r
157         g_hOpenSSLCommon = LoadLibrary("libeay32.dll");\r
158         if(!g_hOpenSSLCommon\r
159                 || !(p_BIO_s_mem = (_BIO_s_mem)GetProcAddress(g_hOpenSSLCommon, "BIO_s_mem"))\r
160                 || !(p_BIO_new = (_BIO_new)GetProcAddress(g_hOpenSSLCommon, "BIO_new"))\r
161                 || !(p_BIO_free = (_BIO_free)GetProcAddress(g_hOpenSSLCommon, "BIO_free"))\r
162                 || !(p_BIO_new_mem_buf = (_BIO_new_mem_buf)GetProcAddress(g_hOpenSSLCommon, "BIO_new_mem_buf"))\r
163                 || !(p_BIO_ctrl = (_BIO_ctrl)GetProcAddress(g_hOpenSSLCommon, "BIO_ctrl"))\r
164                 || !(p_X509_free = (_X509_free)GetProcAddress(g_hOpenSSLCommon, "X509_free"))\r
165                 || !(p_X509_print_ex = (_X509_print_ex)GetProcAddress(g_hOpenSSLCommon, "X509_print_ex"))\r
166                 || !(p_X509_get_subject_name = (_X509_get_subject_name)GetProcAddress(g_hOpenSSLCommon, "X509_get_subject_name"))\r
167                 || !(p_X509_NAME_print_ex = (_X509_NAME_print_ex)GetProcAddress(g_hOpenSSLCommon, "X509_NAME_print_ex"))\r
168                 || !(p_PEM_read_bio_X509 = (_PEM_read_bio_X509)GetProcAddress(g_hOpenSSLCommon, "PEM_read_bio_X509"))\r
169                 || !(p_X509_STORE_add_cert = (_X509_STORE_add_cert)GetProcAddress(g_hOpenSSLCommon, "X509_STORE_add_cert")))\r
170         {\r
171                 if(g_hOpenSSL)\r
172                         FreeLibrary(g_hOpenSSL);\r
173                 g_hOpenSSL = NULL;\r
174                 if(g_hOpenSSLCommon)\r
175                         FreeLibrary(g_hOpenSSLCommon);\r
176                 g_hOpenSSLCommon = NULL;\r
177                 return FALSE;\r
178         }\r
179         InitializeCriticalSection(&g_OpenSSLLock);\r
180         p_SSL_load_error_strings();\r
181         p_SSL_library_init();\r
182         SetSSLTimeoutCallback(60000, DefaultSSLTimeoutCallback);\r
183         SetSSLConfirmCallback(DefaultSSLConfirmCallback);\r
184         g_bOpenSSLLoaded = TRUE;\r
185         return TRUE;\r
186 }\r
187 \r
188 // OpenSSLを解放\r
189 void FreeOpenSSL()\r
190 {\r
191         int i;\r
192         if(!g_bOpenSSLLoaded)\r
193                 return;\r
194         EnterCriticalSection(&g_OpenSSLLock);\r
195         for(i = 0; i < MAX_SSL_SOCKET; i++)\r
196         {\r
197                 if(g_pOpenSSLHandle[i])\r
198                 {\r
199                         p_SSL_shutdown(g_pOpenSSLHandle[i]);\r
200                         p_SSL_free(g_pOpenSSLHandle[i]);\r
201                         g_pOpenSSLHandle[i] = NULL;\r
202                 }\r
203         }\r
204         if(g_pOpenSSLCTX)\r
205                 p_SSL_CTX_free(g_pOpenSSLCTX);\r
206         g_pOpenSSLCTX = NULL;\r
207         FreeLibrary(g_hOpenSSL);\r
208         g_hOpenSSL = NULL;\r
209         FreeLibrary(g_hOpenSSLCommon);\r
210         g_hOpenSSLCommon = NULL;\r
211         LeaveCriticalSection(&g_OpenSSLLock);\r
212         DeleteCriticalSection(&g_OpenSSLLock);\r
213         g_bOpenSSLLoaded = FALSE;\r
214 }\r
215 \r
216 // OpenSSLが使用可能かどうか確認\r
217 BOOL IsOpenSSLLoaded()\r
218 {\r
219         return g_bOpenSSLLoaded;\r
220 }\r
221 \r
222 SSL** GetUnusedSSLPointer()\r
223 {\r
224         int i;\r
225         for(i = 0; i < MAX_SSL_SOCKET; i++)\r
226         {\r
227                 if(!g_pOpenSSLHandle[i])\r
228                         return &g_pOpenSSLHandle[i];\r
229         }\r
230         return NULL;\r
231 }\r
232 \r
233 SSL** FindSSLPointerFromSocket(SOCKET s)\r
234 {\r
235         int i;\r
236         for(i = 0; i < MAX_SSL_SOCKET; i++)\r
237         {\r
238                 if(g_pOpenSSLHandle[i])\r
239                 {\r
240                         if(p_SSL_get_fd(g_pOpenSSLHandle[i]) == s)\r
241                                 return &g_pOpenSSLHandle[i];\r
242                 }\r
243         }\r
244         return NULL;\r
245 }\r
246 \r
247 BOOL ConfirmSSLCertificate(SSL* pSSL, BOOL* pbAborted)\r
248 {\r
249         BOOL bResult;\r
250         BOOL bVerified;\r
251         char* pData;\r
252         char* pSubject;\r
253         X509* pX509;\r
254         BIO* pBIO;\r
255         long Length;\r
256         char* pBuffer;\r
257         char* pCN;\r
258         char* p;\r
259         bResult = FALSE;\r
260         bVerified = FALSE;\r
261         pData = NULL;\r
262         pSubject = NULL;\r
263         if(pX509 = p_SSL_get_peer_certificate(pSSL))\r
264         {\r
265                 if(pBIO = p_BIO_new(p_BIO_s_mem()))\r
266                 {\r
267                         p_X509_print_ex(pBIO, pX509, 0, XN_FLAG_RFC2253);\r
268                         if((Length = p_BIO_ctrl(pBIO, BIO_CTRL_INFO, 0, &pBuffer)) > 0)\r
269                         {\r
270                                 if(pData = (char*)malloc(Length + sizeof(char)))\r
271                                 {\r
272                                         memcpy(pData, pBuffer, Length);\r
273                                         *(char*)((size_t)pData + Length) = '\0';\r
274                                 }\r
275                         }\r
276                         p_BIO_free(pBIO);\r
277                 }\r
278                 if(pBIO = p_BIO_new(p_BIO_s_mem()))\r
279                 {\r
280                         p_X509_NAME_print_ex(pBIO, p_X509_get_subject_name(pX509), 0, XN_FLAG_RFC2253);\r
281                         if((Length = p_BIO_ctrl(pBIO, BIO_CTRL_INFO, 0, &pBuffer)) > 0)\r
282                         {\r
283                                 if(pSubject = (char*)malloc(Length + sizeof(char)))\r
284                                 {\r
285                                         memcpy(pSubject, pBuffer, Length);\r
286                                         *(char*)((size_t)pSubject + Length) = '\0';\r
287                                 }\r
288                         }\r
289                         p_BIO_free(pBIO);\r
290                 }\r
291                 p_X509_free(pX509);\r
292         }\r
293         if(pX509 && p_SSL_get_verify_result(pSSL) == X509_V_OK)\r
294                 bVerified = TRUE;\r
295         pCN = pSubject;\r
296         while(pCN)\r
297         {\r
298                 if(strncmp(pCN, "CN=", strlen("CN=")) == 0)\r
299                 {\r
300                         pCN += strlen("CN=");\r
301                         if(p = strchr(pCN, ','))\r
302                                 *p = '\0';\r
303                         break;\r
304                 }\r
305                 if(pCN = strchr(pCN, ','))\r
306                         pCN++;\r
307         }\r
308         bResult = g_pOpenSSLConfirmCallback(pbAborted, bVerified, pData, pCN);\r
309         if(pData)\r
310                 free(pData);\r
311         if(pSubject)\r
312                 free(pSubject);\r
313         return bResult;\r
314 }\r
315 \r
316 void SetSSLTimeoutCallback(DWORD Timeout, LPSSLTIMEOUTCALLBACK pCallback)\r
317 {\r
318         if(!g_bOpenSSLLoaded)\r
319                 return;\r
320         EnterCriticalSection(&g_OpenSSLLock);\r
321         g_OpenSSLTimeout = Timeout;\r
322         g_pOpenSSLTimeoutCallback = pCallback;\r
323         LeaveCriticalSection(&g_OpenSSLLock);\r
324 }\r
325 \r
326 void SetSSLConfirmCallback(LPSSLCONFIRMCALLBACK pCallback)\r
327 {\r
328         if(!g_bOpenSSLLoaded)\r
329                 return;\r
330         EnterCriticalSection(&g_OpenSSLLock);\r
331         g_pOpenSSLConfirmCallback = pCallback;\r
332         LeaveCriticalSection(&g_OpenSSLLock);\r
333 }\r
334 \r
335 // SSLルート証明書を設定\r
336 // PEM形式のみ指定可能\r
337 BOOL SetSSLRootCertificate(const void* pData, DWORD Length)\r
338 {\r
339         BOOL r;\r
340         X509_STORE* pStore;\r
341         BYTE* p;\r
342         BYTE* pBegin;\r
343         BYTE* pEnd;\r
344         BIO* pBIO;\r
345         X509* pX509;\r
346         if(!g_bOpenSSLLoaded)\r
347                 return FALSE;\r
348         r = FALSE;\r
349         EnterCriticalSection(&g_OpenSSLLock);\r
350         if(!g_pOpenSSLCTX)\r
351         {\r
352                 g_pOpenSSLCTX = p_SSL_CTX_new(p_SSLv23_method());\r
353                 p_SSL_CTX_ctrl(g_pOpenSSLCTX, SSL_CTRL_MODE, SSL_MODE_ENABLE_PARTIAL_WRITE | SSL_MODE_AUTO_RETRY, NULL);\r
354         }\r
355         if(g_pOpenSSLCTX)\r
356         {\r
357                 if(pStore = p_SSL_CTX_get_cert_store(g_pOpenSSLCTX))\r
358                 {\r
359                         p = (BYTE*)pData;\r
360                         pBegin = NULL;\r
361                         pEnd = NULL;\r
362                         while(Length > 0)\r
363                         {\r
364                                 if(!pBegin)\r
365                                 {\r
366                                         if(Length < 27)\r
367                                                 break;\r
368                                         if(memcmp(p, "-----BEGIN CERTIFICATE-----", 27) == 0)\r
369                                                 pBegin = p;\r
370                                 }\r
371                                 else if(!pEnd)\r
372                                 {\r
373                                         if(Length < 25)\r
374                                                 break;\r
375                                         if(memcmp(p, "-----END CERTIFICATE-----", 25) == 0)\r
376                                                 pEnd = p + 25;\r
377                                 }\r
378                                 if(pBegin && pEnd)\r
379                                 {\r
380                                         if(pBIO = p_BIO_new_mem_buf(pBegin, (int)((size_t)pEnd - (size_t)pBegin)))\r
381                                         {\r
382                                                 if(pX509 = p_PEM_read_bio_X509(pBIO, NULL, NULL, NULL))\r
383                                                 {\r
384                                                         if(p_X509_STORE_add_cert(pStore, pX509) == 1)\r
385                                                                 r = TRUE;\r
386                                                         p_X509_free(pX509);\r
387                                                 }\r
388                                                 p_BIO_free(pBIO);\r
389                                         }\r
390                                         pBegin = NULL;\r
391                                         pEnd = NULL;\r
392                                 }\r
393                                 p++;\r
394                                 Length--;\r
395                         }\r
396                 }\r
397         }\r
398         LeaveCriticalSection(&g_OpenSSLLock);\r
399         return r;\r
400 }\r
401 \r
402 // ワイルドカードの比較\r
403 // 主にSSL証明書のCN確認用\r
404 BOOL IsHostNameMatched(LPCSTR HostName, LPCSTR CommonName)\r
405 {\r
406         BOOL bResult;\r
407         const char* pAsterisk;\r
408         size_t BeforeAsterisk;\r
409         const char* pBeginAsterisk;\r
410         const char* pEndAsterisk;\r
411         const char* pDot;\r
412         bResult = FALSE;\r
413         if(HostName && CommonName)\r
414         {\r
415                 if(pAsterisk = strchr(CommonName, '*'))\r
416                 {\r
417                         BeforeAsterisk = ((size_t)pAsterisk - (size_t)CommonName) / sizeof(char);\r
418                         pBeginAsterisk = HostName + BeforeAsterisk;\r
419                         while(*pAsterisk == '*')\r
420                         {\r
421                                 pAsterisk++;\r
422                         }\r
423                         pEndAsterisk = HostName + strlen(HostName) - strlen(pAsterisk);\r
424                         // "*"より前は大文字小文字を無視して完全一致\r
425                         if(_strnicmp(HostName, CommonName, BeforeAsterisk) == 0)\r
426                         {\r
427                                 // "*"より後は大文字小文字を無視して完全一致\r
428                                 if(_stricmp(pEndAsterisk, pAsterisk) == 0)\r
429                                 {\r
430                                         // "*"と一致する範囲に"."が含まれてはならない\r
431                                         pDot = strchr(pBeginAsterisk, '.');\r
432                                         if(!pDot || pDot >= pEndAsterisk)\r
433                                                 bResult = TRUE;\r
434                                 }\r
435                         }\r
436                 }\r
437                 else if(_stricmp(HostName, CommonName) == 0)\r
438                         bResult = TRUE;\r
439         }\r
440         return bResult;\r
441 }\r
442 \r
443 // SSLセッションを開始\r
444 BOOL AttachSSL(SOCKET s, SOCKET parent, BOOL* pbAborted)\r
445 {\r
446         BOOL r;\r
447         DWORD Time;\r
448         SSL** ppSSL;\r
449         SSL** ppSSLParent;\r
450         SSL_SESSION* pSession;\r
451         int Return;\r
452         int Error;\r
453         if(!g_bOpenSSLLoaded)\r
454                 return FALSE;\r
455         r = FALSE;\r
456         Time = timeGetTime();\r
457         EnterCriticalSection(&g_OpenSSLLock);\r
458         if(!g_pOpenSSLCTX)\r
459         {\r
460                 g_pOpenSSLCTX = p_SSL_CTX_new(p_SSLv23_method());\r
461                 p_SSL_CTX_ctrl(g_pOpenSSLCTX, SSL_CTRL_MODE, SSL_MODE_ENABLE_PARTIAL_WRITE | SSL_MODE_AUTO_RETRY, NULL);\r
462         }\r
463         if(g_pOpenSSLCTX)\r
464         {\r
465                 if(ppSSL = GetUnusedSSLPointer())\r
466                 {\r
467                         if(*ppSSL = p_SSL_new(g_pOpenSSLCTX))\r
468                         {\r
469                                 if(p_SSL_set_fd(*ppSSL, s) != 0)\r
470                                 {\r
471                                         if(parent != INVALID_SOCKET)\r
472                                         {\r
473                                                 if(ppSSLParent = FindSSLPointerFromSocket(parent))\r
474                                                 {\r
475                                                         if(pSession = p_SSL_get_session(*ppSSLParent))\r
476                                                         {\r
477                                                                 if(p_SSL_set_session(*ppSSL, pSession) == 1)\r
478                                                                 {\r
479                                                                 }\r
480                                                         }\r
481                                                 }\r
482                                         }\r
483                                         // SSLのネゴシエーションには時間がかかる場合がある\r
484                                         r = TRUE;\r
485                                         while(r)\r
486                                         {\r
487                                                 Return = p_SSL_connect(*ppSSL);\r
488                                                 if(Return == 1)\r
489                                                         break;\r
490                                                 Error = p_SSL_get_error(*ppSSL, Return);\r
491                                                 if(Error == SSL_ERROR_WANT_READ || Error == SSL_ERROR_WANT_WRITE)\r
492                                                 {\r
493                                                         LeaveCriticalSection(&g_OpenSSLLock);\r
494                                                         if(g_pOpenSSLTimeoutCallback(pbAborted) || (g_OpenSSLTimeout > 0 && timeGetTime() - Time >= g_OpenSSLTimeout))\r
495                                                                 r = FALSE;\r
496                                                         EnterCriticalSection(&g_OpenSSLLock);\r
497                                                 }\r
498                                                 else\r
499                                                         r = FALSE;\r
500                                         }\r
501                                         if(r)\r
502                                         {\r
503                                                 if(ConfirmSSLCertificate(*ppSSL, pbAborted))\r
504                                                 {\r
505                                                 }\r
506                                                 else\r
507                                                 {\r
508                                                         LeaveCriticalSection(&g_OpenSSLLock);\r
509                                                         DetachSSL(s);\r
510                                                         r = FALSE;\r
511                                                         EnterCriticalSection(&g_OpenSSLLock);\r
512                                                 }\r
513                                         }\r
514                                         else\r
515                                         {\r
516                                                 LeaveCriticalSection(&g_OpenSSLLock);\r
517                                                 DetachSSL(s);\r
518                                                 EnterCriticalSection(&g_OpenSSLLock);\r
519                                         }\r
520                                 }\r
521                                 else\r
522                                 {\r
523                                         LeaveCriticalSection(&g_OpenSSLLock);\r
524                                         DetachSSL(s);\r
525                                         EnterCriticalSection(&g_OpenSSLLock);\r
526                                 }\r
527                         }\r
528                 }\r
529         }\r
530         LeaveCriticalSection(&g_OpenSSLLock);\r
531         return r;\r
532 }\r
533 \r
534 // SSLセッションを終了\r
535 BOOL DetachSSL(SOCKET s)\r
536 {\r
537         BOOL r;\r
538         SSL** ppSSL;\r
539         if(!g_bOpenSSLLoaded)\r
540                 return FALSE;\r
541         r = FALSE;\r
542         EnterCriticalSection(&g_OpenSSLLock);\r
543         if(ppSSL = FindSSLPointerFromSocket(s))\r
544         {\r
545                 p_SSL_shutdown(*ppSSL);\r
546                 p_SSL_free(*ppSSL);\r
547                 *ppSSL = NULL;\r
548                 r = TRUE;\r
549         }\r
550         LeaveCriticalSection(&g_OpenSSLLock);\r
551         return r;\r
552 }\r
553 \r
554 // SSLとしてマークされているか確認\r
555 // マークされていればTRUEを返す\r
556 BOOL IsSSLAttached(SOCKET s)\r
557 {\r
558         SSL** ppSSL;\r
559         if(!g_bOpenSSLLoaded)\r
560                 return FALSE;\r
561         EnterCriticalSection(&g_OpenSSLLock);\r
562         ppSSL = FindSSLPointerFromSocket(s);\r
563         LeaveCriticalSection(&g_OpenSSLLock);\r
564         if(!ppSSL)\r
565                 return FALSE;\r
566         return TRUE;\r
567 }\r
568 \r
569 SOCKET FTPS_socket(int af, int type, int protocol)\r
570 {\r
571         return socket(af, type, protocol);\r
572 }\r
573 \r
574 int FTPS_bind(SOCKET s, const struct sockaddr *addr, int namelen)\r
575 {\r
576         return bind(s, addr, namelen);\r
577 }\r
578 \r
579 int FTPS_listen(SOCKET s, int backlog)\r
580 {\r
581         return listen(s, backlog);\r
582 }\r
583 \r
584 // accept相当の関数\r
585 // ただし初めからSSLのネゴシエーションを行う\r
586 SOCKET FTPS_accept(SOCKET s, struct sockaddr *addr, int *addrlen)\r
587 {\r
588         SOCKET r;\r
589         BOOL bAborted;\r
590         r = accept(s, addr, addrlen);\r
591         bAborted = FALSE;\r
592         if(!AttachSSL(r, INVALID_SOCKET, &bAborted))\r
593         {\r
594                 closesocket(r);\r
595                 return INVALID_SOCKET;\r
596         }\r
597         return r;\r
598 }\r
599 \r
600 // connect相当の関数\r
601 // ただし初めからSSLのネゴシエーションを行う\r
602 int FTPS_connect(SOCKET s, const struct sockaddr *name, int namelen)\r
603 {\r
604         int r;\r
605         BOOL bAborted;\r
606         r = connect(s, name, namelen);\r
607         bAborted = FALSE;\r
608         if(!AttachSSL(r, INVALID_SOCKET, &bAborted))\r
609                 return SOCKET_ERROR;\r
610         return r;\r
611 }\r
612 \r
613 // closesocket相当の関数\r
614 int FTPS_closesocket(SOCKET s)\r
615 {\r
616         DetachSSL(s);\r
617         return closesocket(s);\r
618 }\r
619 \r
620 // send相当の関数\r
621 int FTPS_send(SOCKET s, const char * buf, int len, int flags)\r
622 {\r
623         int r;\r
624         SSL** ppSSL;\r
625         if(!g_bOpenSSLLoaded)\r
626                 return send(s, buf, len, flags);\r
627         EnterCriticalSection(&g_OpenSSLLock);\r
628         ppSSL = FindSSLPointerFromSocket(s);\r
629         LeaveCriticalSection(&g_OpenSSLLock);\r
630         if(!ppSSL)\r
631                 return send(s, buf, len, flags);\r
632         r = p_SSL_write(*ppSSL, buf, len);\r
633         if(r < 0)\r
634                 return SOCKET_ERROR;\r
635         return r;\r
636 }\r
637 \r
638 // recv相当の関数\r
639 int FTPS_recv(SOCKET s, char * buf, int len, int flags)\r
640 {\r
641         int r;\r
642         SSL** ppSSL;\r
643         if(!g_bOpenSSLLoaded)\r
644                 return recv(s, buf, len, flags);\r
645         EnterCriticalSection(&g_OpenSSLLock);\r
646         ppSSL = FindSSLPointerFromSocket(s);\r
647         LeaveCriticalSection(&g_OpenSSLLock);\r
648         if(!ppSSL)\r
649                 return recv(s, buf, len, flags);\r
650         if(flags & MSG_PEEK)\r
651                 r = p_SSL_peek(*ppSSL, buf, len);\r
652         else\r
653                 r = p_SSL_read(*ppSSL, buf, len);\r
654         if(r < 0)\r
655                 return SOCKET_ERROR;\r
656         return r;\r
657 }\r
658 \r
659 // IPv6対応\r
660 \r
661 const struct in6_addr IN6ADDR_NONE = {{0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}};\r
662 \r
663 typedef struct\r
664 {\r
665         HANDLE h;\r
666         HWND hWnd;\r
667         u_int wMsg;\r
668         char * name;\r
669         char * buf;\r
670         int buflen;\r
671         short Family;\r
672 } GETHOSTBYNAMEDATA;\r
673 \r
674 DWORD WINAPI WSAAsyncGetHostByNameIPv6ThreadProc(LPVOID lpParameter)\r
675 {\r
676         GETHOSTBYNAMEDATA* pData;\r
677         struct hostent* pHost;\r
678         struct addrinfo* pAddr;\r
679         struct addrinfo* p;\r
680         pHost = NULL;\r
681         pData = (GETHOSTBYNAMEDATA*)lpParameter;\r
682         if(getaddrinfo(pData->name, NULL, NULL, &pAddr) == 0)\r
683         {\r
684                 p = pAddr;\r
685                 while(p)\r
686                 {\r
687                         if(p->ai_family == pData->Family)\r
688                         {\r
689                                 switch(p->ai_family)\r
690                                 {\r
691                                 case AF_INET:\r
692                                         pHost = (struct hostent*)pData->buf;\r
693                                         if((size_t)pData->buflen >= sizeof(struct hostent) + sizeof(char*) * 2 + sizeof(struct in_addr)\r
694                                                 && p->ai_addrlen >= sizeof(struct sockaddr_in))\r
695                                         {\r
696                                                 pHost->h_name = NULL;\r
697                                                 pHost->h_aliases = NULL;\r
698                                                 pHost->h_addrtype = p->ai_family;\r
699                                                 pHost->h_length = sizeof(struct in_addr);\r
700                                                 pHost->h_addr_list = (char**)(&pHost[1]);\r
701                                                 pHost->h_addr_list[0] = (char*)(&pHost->h_addr_list[2]);\r
702                                                 pHost->h_addr_list[1] = NULL;\r
703                                                 memcpy(pHost->h_addr_list[0], &((struct sockaddr_in*)p->ai_addr)->sin_addr, sizeof(struct in_addr));\r
704                                                 PostMessage(pData->hWnd, pData->wMsg, (WPARAM)pData->h, (LPARAM)(sizeof(struct hostent) + sizeof(char*) * 2 + sizeof(struct in_addr)));\r
705                                         }\r
706                                         else\r
707                                                 PostMessage(pData->hWnd, pData->wMsg, (WPARAM)pData->h, (LPARAM)(WSAENOBUFS << 16));\r
708                                         break;\r
709                                 case AF_INET6:\r
710                                         pHost = (struct hostent*)pData->buf;\r
711                                         if((size_t)pData->buflen >= sizeof(struct hostent) + sizeof(char*) * 2 + sizeof(struct in6_addr)\r
712                                                 && p->ai_addrlen >= sizeof(struct sockaddr_in6))\r
713                                         {\r
714                                                 pHost->h_name = NULL;\r
715                                                 pHost->h_aliases = NULL;\r
716                                                 pHost->h_addrtype = p->ai_family;\r
717                                                 pHost->h_length = sizeof(struct in6_addr);\r
718                                                 pHost->h_addr_list = (char**)(&pHost[1]);\r
719                                                 pHost->h_addr_list[0] = (char*)(&pHost->h_addr_list[2]);\r
720                                                 pHost->h_addr_list[1] = NULL;\r
721                                                 memcpy(pHost->h_addr_list[0], &((struct sockaddr_in6*)p->ai_addr)->sin6_addr, sizeof(struct in6_addr));\r
722                                                 PostMessage(pData->hWnd, pData->wMsg, (WPARAM)pData->h, (LPARAM)(sizeof(struct hostent) + sizeof(char*) * 2 + sizeof(struct in6_addr)));\r
723                                         }\r
724                                         else\r
725                                                 PostMessage(pData->hWnd, pData->wMsg, (WPARAM)pData->h, (LPARAM)(WSAENOBUFS << 16));\r
726                                         break;\r
727                                 }\r
728                         }\r
729                         if(pHost)\r
730                                 break;\r
731                         p = p->ai_next;\r
732                 }\r
733                 if(!p)\r
734                         PostMessage(pData->hWnd, pData->wMsg, (WPARAM)pData->h, (LPARAM)(ERROR_INVALID_FUNCTION << 16));\r
735                 freeaddrinfo(pAddr);\r
736         }\r
737         else\r
738                 PostMessage(pData->hWnd, pData->wMsg, (WPARAM)pData->h, (LPARAM)(ERROR_INVALID_FUNCTION << 16));\r
739         // CreateThreadが返すハンドルが重複するのを回避\r
740         Sleep(10000);\r
741         CloseHandle(pData->h);\r
742         free(pData->name);\r
743         free(pData);\r
744         return 0;\r
745 }\r
746 \r
747 // IPv6対応のWSAAsyncGetHostByName相当の関数\r
748 // FamilyにはAF_INETまたはAF_INET6を指定可能\r
749 // ただしANSI用\r
750 HANDLE WSAAsyncGetHostByNameIPv6(HWND hWnd, u_int wMsg, const char * name, char * buf, int buflen, short Family)\r
751 {\r
752         HANDLE hResult;\r
753         GETHOSTBYNAMEDATA* pData;\r
754         hResult = NULL;\r
755         if(pData = malloc(sizeof(GETHOSTBYNAMEDATA)))\r
756         {\r
757                 pData->hWnd = hWnd;\r
758                 pData->wMsg = wMsg;\r
759                 if(pData->name = malloc(sizeof(char) * (strlen(name) + 1)))\r
760                 {\r
761                         strcpy(pData->name, name);\r
762                         pData->buf = buf;\r
763                         pData->buflen = buflen;\r
764                         pData->Family = Family;\r
765                         if(pData->h = CreateThread(NULL, 0, WSAAsyncGetHostByNameIPv6ThreadProc, pData, CREATE_SUSPENDED, NULL))\r
766                         {\r
767                                 ResumeThread(pData->h);\r
768                                 hResult = pData->h;\r
769                         }\r
770                 }\r
771         }\r
772         if(!hResult)\r
773         {\r
774                 if(pData)\r
775                 {\r
776                         if(pData->name)\r
777                                 free(pData->name);\r
778                         free(pData);\r
779                 }\r
780         }\r
781         return hResult;\r
782 }\r
783 \r
784 // WSAAsyncGetHostByNameIPv6用のWSACancelAsyncRequest相当の関数\r
785 int WSACancelAsyncRequestIPv6(HANDLE hAsyncTaskHandle)\r
786 {\r
787         int Result;\r
788         Result = SOCKET_ERROR;\r
789         if(TerminateThread(hAsyncTaskHandle, 0))\r
790         {\r
791                 CloseHandle(hAsyncTaskHandle);\r
792                 Result = 0;\r
793         }\r
794         return Result;\r
795 }\r
796 \r
797 char* AddressToStringIPv4(char* str, void* in)\r
798 {\r
799         char* pResult;\r
800         unsigned char* p;\r
801         pResult = str;\r
802         p = (unsigned char*)in;\r
803         sprintf(str, "%u.%u.%u.%u", p[0], p[1], p[2], p[3]);\r
804         return pResult;\r
805 }\r
806 \r
807 char* AddressToStringIPv6(char* str, void* in6)\r
808 {\r
809         char* pResult;\r
810         unsigned char* p;\r
811         int MaxZero;\r
812         int MaxZeroLen;\r
813         int i;\r
814         int j;\r
815         char Tmp[5];\r
816         pResult = str;\r
817         p = (unsigned char*)in6;\r
818         MaxZero = 8;\r
819         MaxZeroLen = 1;\r
820         for(i = 0; i < 8; i++)\r
821         {\r
822                 for(j = i; j < 8; j++)\r
823                 {\r
824                         if(p[j * 2] != 0 || p[j * 2 + 1] != 0)\r
825                                 break;\r
826                 }\r
827                 if(j - i > MaxZeroLen)\r
828                 {\r
829                         MaxZero = i;\r
830                         MaxZeroLen = j - i;\r
831                 }\r
832         }\r
833         strcpy(str, "");\r
834         for(i = 0; i < 8; i++)\r
835         {\r
836                 if(i == MaxZero)\r
837                 {\r
838                         if(i == 0)\r
839                                 strcat(str, ":");\r
840                         strcat(str, ":");\r
841                 }\r
842                 else if(i < MaxZero || i >= MaxZero + MaxZeroLen)\r
843                 {\r
844                         sprintf(Tmp, "%x", (((int)p[i * 2] & 0xff) << 8) | ((int)p[i * 2 + 1] & 0xff));\r
845                         strcat(str, Tmp);\r
846                         if(i < 7)\r
847                                 strcat(str, ":");\r
848                 }\r
849         }\r
850         return pResult;\r
851 }\r
852 \r
853 // IPv6対応のinet_ntoa相当の関数\r
854 // ただしANSI用\r
855 char* inet6_ntoa(struct in6_addr in6)\r
856 {\r
857         char* pResult;\r
858         static char Adrs[40];\r
859         pResult = NULL;\r
860         memset(Adrs, 0, sizeof(Adrs));\r
861         pResult = AddressToStringIPv6(Adrs, &in6);\r
862         return pResult;\r
863 }\r
864 \r
865 // IPv6対応のinet_addr相当の関数\r
866 // ただしANSI用\r
867 struct in6_addr inet6_addr(const char* cp)\r
868 {\r
869         struct in6_addr Result;\r
870         int AfterZero;\r
871         int i;\r
872         char* p;\r
873         memset(&Result, 0, sizeof(Result));\r
874         AfterZero = 0;\r
875         for(i = 0; i < 8; i++)\r
876         {\r
877                 if(!cp)\r
878                 {\r
879                         memcpy(&Result, &IN6ADDR_NONE, sizeof(struct in6_addr));\r
880                         break;\r
881                 }\r
882                 if(i >= AfterZero)\r
883                 {\r
884                         if(strncmp(cp, ":", 1) == 0)\r
885                         {\r
886                                 cp = cp + 1;\r
887                                 if(i == 0 && strncmp(cp, ":", 1) == 0)\r
888                                         cp = cp + 1;\r
889                                 p = (char*)cp;\r
890                                 AfterZero = 7;\r
891                                 while(p = strstr(p, ":"))\r
892                                 {\r
893                                         p = p + 1;\r
894                                         AfterZero--;\r
895                                 }\r
896                         }\r
897                         else\r
898                         {\r
899                                 Result.u.Word[i] = (USHORT)strtol(cp, &p, 16);\r
900                                 Result.u.Word[i] = ((Result.u.Word[i] & 0xff00) >> 8) | ((Result.u.Word[i] & 0x00ff) << 8);\r
901                                 if(strncmp(p, ":", 1) != 0 && strlen(p) > 0)\r
902                                 {\r
903                                         memcpy(&Result, &IN6ADDR_NONE, sizeof(struct in6_addr));\r
904                                         break;\r
905                                 }\r
906                                 if(cp = strstr(cp, ":"))\r
907                                         cp = cp + 1;\r
908                         }\r
909                 }\r
910         }\r
911         return Result;\r
912 }\r
913 \r
914 BOOL ConvertDomainNameToPunycode(LPSTR Output, DWORD Count, LPCSTR Input)\r
915 {\r
916         BOOL bResult;\r
917         punycode_uint* pUnicode;\r
918         punycode_uint* p;\r
919         BOOL bNeeded;\r
920         LPCSTR InputString;\r
921         punycode_uint Length;\r
922         punycode_uint OutputLength;\r
923         bResult = FALSE;\r
924         if(pUnicode = malloc(sizeof(punycode_uint) * strlen(Input)))\r
925         {\r
926                 p = pUnicode;\r
927                 bNeeded = FALSE;\r
928                 InputString = Input;\r
929                 Length = 0;\r
930                 while(*InputString != '\0')\r
931                 {\r
932                         *p = (punycode_uint)GetNextCharM(InputString, NULL, &InputString);\r
933                         if(*p >= 0x80)\r
934                                 bNeeded = TRUE;\r
935                         p++;\r
936                         Length++;\r
937                 }\r
938                 if(bNeeded)\r
939                 {\r
940                         if(Count >= strlen("xn--") + 1)\r
941                         {\r
942                                 strcpy(Output, "xn--");\r
943                                 OutputLength = Count - strlen("xn--");\r
944                                 if(punycode_encode(Length, pUnicode, NULL, (punycode_uint*)&OutputLength, Output + strlen("xn--")) == punycode_success)\r
945                                 {\r
946                                         Output[strlen("xn--") + OutputLength] = '\0';\r
947                                         bResult = TRUE;\r
948                                 }\r
949                         }\r
950                 }\r
951                 free(pUnicode);\r
952         }\r
953         if(!bResult)\r
954         {\r
955                 if(Count >= strlen(Input) + 1)\r
956                 {\r
957                         strcpy(Output, Input);\r
958                         bResult = TRUE;\r
959                 }\r
960         }\r
961         return bResult;\r
962 }\r
963 \r
964 BOOL ConvertNameToPunycode(LPSTR Output, LPCSTR Input)\r
965 {\r
966         BOOL bResult;\r
967         DWORD Length;\r
968         char* pm0;\r
969         char* pm1;\r
970         char* p;\r
971         char* pNext;\r
972         bResult = FALSE;\r
973         Length = strlen(Input);\r
974         if(pm0 = AllocateStringM(Length + 1))\r
975         {\r
976                 if(pm1 = AllocateStringM(Length * 4 + 1))\r
977                 {\r
978                         strcpy(pm0, Input);\r
979                         p = pm0;\r
980                         while(p)\r
981                         {\r
982                                 if(pNext = strchr(p, '.'))\r
983                                 {\r
984                                         *pNext = '\0';\r
985                                         pNext++;\r
986                                 }\r
987                                 if(ConvertDomainNameToPunycode(pm1, Length * 4, p))\r
988                                         strcat(Output, pm1);\r
989                                 if(pNext)\r
990                                         strcat(Output, ".");\r
991                                 p = pNext;\r
992                         }\r
993                         bResult = TRUE;\r
994                         FreeDuplicatedString(pm1);\r
995                 }\r
996                 FreeDuplicatedString(pm0);\r
997         }\r
998         return bResult;\r
999 }\r
1000 \r
1001 HANDLE WSAAsyncGetHostByNameM(HWND hWnd, u_int wMsg, const char * name, char * buf, int buflen)\r
1002 {\r
1003         HANDLE r = NULL;\r
1004         char* pa0 = NULL;\r
1005         if(pa0 = AllocateStringA(strlen(name) * 4))\r
1006         {\r
1007                 if(ConvertNameToPunycode(pa0, name))\r
1008                         r = WSAAsyncGetHostByName(hWnd, wMsg, pa0, buf, buflen);\r
1009         }\r
1010         FreeDuplicatedString(pa0);\r
1011         return r;\r
1012 }\r
1013 \r
1014 HANDLE WSAAsyncGetHostByNameIPv6M(HWND hWnd, u_int wMsg, const char * name, char * buf, int buflen, short Family)\r
1015 {\r
1016         HANDLE r = NULL;\r
1017         char* pa0 = NULL;\r
1018         if(pa0 = AllocateStringA(strlen(name) * 4))\r
1019         {\r
1020                 if(ConvertNameToPunycode(pa0, name))\r
1021                         r = WSAAsyncGetHostByNameIPv6(hWnd, wMsg, pa0, buf, buflen, Family);\r
1022         }\r
1023         FreeDuplicatedString(pa0);\r
1024         return r;\r
1025 }\r
1026 \r