1 /*=============================================================================
\r
3 *
\83z
\83X
\83g
\82Ö
\82Ì
\90Ú
\91±
\81^
\90Ø
\92f
\r
5 ===============================================================================
\r
6 / Copyright (C) 1997-2007 Sota. All rights reserved.
\r
8 / Redistribution and use in source and binary forms, with or without
\r
9 / modification, are permitted provided that the following conditions
\r
12 / 1. Redistributions of source code must retain the above copyright
\r
13 / notice, this list of conditions and the following disclaimer.
\r
14 / 2. Redistributions in binary form must reproduce the above copyright
\r
15 / notice, this list of conditions and the following disclaimer in the
\r
16 / documentation and/or other materials provided with the distribution.
\r
18 / THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
\r
19 / IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
\r
20 / OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
\r
21 / IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
\r
22 / INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
\r
23 / BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
\r
24 / USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
\r
25 / ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
\r
26 / (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
\r
27 / THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
\r
28 /============================================================================*/
\r
36 #include <mbstring.h>
\r
38 #include <winsock.h>
\r
39 #include <windowsx.h>
\r
40 #include <commctrl.h>
\r
43 #include "resource.h"
\r
45 #include <htmlhelp.h>
\r
49 #undef __MBSWRAPPER_H__
\r
50 #include "mbswrapper.h"
\r
53 /*=====
\83v
\83\8d\83g
\83^
\83C
\83v =====*/
\r
55 static BOOL CALLBACK QuickConDialogCallBack(HWND hDlg, UINT iMessage, WPARAM wParam, LPARAM lParam);
\r
56 static int SendInitCommand(char *Cmd);
\r
57 static void AskUseFireWall(char *Host, int *Fire, int *Pasv, int *List);
\r
58 static void SaveCurrentSetToHistory(void);
\r
59 static int ReConnectSkt(SOCKET *Skt);
\r
60 static SOCKET DoConnect(char *Host, char *User, char *Pass, char *Acct, int Port, int Fwall, int SavePass, int Security);
\r
61 static int CheckOneTimePassword(char *Pass, char *Reply, int Type);
\r
62 static BOOL CALLBACK BlkHookFnc(void);
\r
63 static int Socks5MakeCmdPacket(SOCKS5REQUEST *Packet, char Cmd, int ValidIP, ulong IP, char *Host, ushort Port);
\r
64 static int SocksSendCmd(SOCKET Socket, void *Data, int Size, int *CancelCheckWork);
\r
65 static int Socks5GetCmdReply(SOCKET Socket, SOCKS5REPLY *Packet);
\r
66 static int Socks4GetCmdReply(SOCKET Socket, SOCKS4REPLY *Packet);
\r
67 static int Socks5SelMethod(SOCKET Socket, int *CancelCheckWork);
\r
69 /*=====
\8aO
\95\94\8eQ
\8fÆ =====*/
\r
71 extern char FilterStr[FILTER_EXT_LEN+1];
\r
72 extern char TitleHostName[HOST_ADRS_LEN+1];
\r
73 extern int CancelFlg;
\r
76 extern char UserMailAdrs[USER_MAIL_LEN+1];
\r
77 extern char FwallHost[HOST_ADRS_LEN+1];
\r
78 extern char FwallUser[USER_NAME_LEN+1];
\r
79 extern char FwallPass[PASSWORD_LEN+1];
\r
80 extern int FwallPort;
\r
81 extern int FwallType;
\r
82 extern int FwallDefault;
\r
83 extern int FwallSecurity;
\r
84 extern int FwallResolv;
\r
85 extern int FwallLower;
\r
86 extern int FwallDelimiter;
\r
87 extern int PasvDefault;
\r
88 extern int QuickAnonymous;
\r
90 /*=====
\83\8d\81[
\83J
\83\8b\82È
\83\8f\81[
\83N =====*/
\r
92 static int Anonymous;
\r
93 static int TryConnect = NO;
\r
94 static SOCKET CmdCtrlSocket = INVALID_SOCKET;
\r
95 static SOCKET TrnCtrlSocket = INVALID_SOCKET;
\r
96 static HOSTDATA CurHost;
\r
98 /*
\90Ú
\91±
\92\86\82Ì
\90Ú
\91±
\90æ
\81ASOCKS
\83T
\81[
\83o
\82Ì
\83A
\83h
\83\8c\83X
\8fî
\95ñ
\82ð
\95Û
\91¶
\82µ
\82Ä
\82¨
\82 */
\r
99 /*
\82±
\82Ì
\8fî
\95ñ
\82Ílisten
\83\
\83P
\83b
\83g
\82ð
\8eæ
\93¾
\82·
\82é
\8dÛ
\82É
\97p
\82¢
\82é */
\r
100 static struct sockaddr_in SocksSockAddr; /* SOCKS
\83T
\81[
\83o
\82Ì
\83A
\83h
\83\8c\83X
\8fî
\95ñ */
\r
101 static struct sockaddr_in CurSockAddr; /*
\90Ú
\91±
\90æ
\83z
\83X
\83g
\82Ì
\83A
\83h
\83\8c\83X
\8fî
\95ñ */
\r
103 static int UseIPadrs;
\r
104 static char DomainName[HOST_ADRS_LEN+1];
\r
109 /*-----
\83z
\83X
\83g
\88ê
\97\97\82ð
\8eg
\82Á
\82Ä
\83z
\83X
\83g
\82Ö
\90Ú
\91± ----------------------------------------
\r
112 * int Type :
\83_
\83C
\83A
\83\8d\83O
\82Ì
\83^
\83C
\83v (DLG_TYPE_xxx)
\r
113 * int Num :
\90Ú
\91±
\82·
\82é
\83z
\83X
\83g
\94Ô
\8d\86(0
\81`, -1=
\83_
\83C
\83A
\83\8d\83O
\82ð
\8fo
\82·)
\r
117 *----------------------------------------------------------------------------*/
\r
119 void ConnectProc(int Type, int Num)
\r
128 SaveCurrentSetToHost();
\r
130 if((Num >= 0) || (SelectHost(Type) == YES))
\r
133 SetCurrentHost(Num);
\r
135 /*
\90Ú
\91±
\92\86\82È
\82ç
\90Ø
\92f
\82·
\82é */
\r
136 if(CmdCtrlSocket != INVALID_SOCKET)
\r
139 SetTaskMsg("----------------------------");
\r
142 CopyHostFromList(AskCurrentHost(), &CurHost);
\r
144 if(ConnectRas(CurHost.Dialup, CurHost.DialupAlways, CurHost.DialupNotify, CurHost.DialEntry) == SUCCESS)
\r
146 SetHostKanaCnvImm(CurHost.KanaCnv);
\r
147 SetHostKanjiCodeImm(CurHost.KanjiCode);
\r
148 SetSyncMoveMode(CurHost.SyncMove);
\r
150 if((AskSaveSortToHost() == YES) && (CurHost.Sort != SORT_NOTSAVED))
\r
152 DecomposeSortType(CurHost.Sort, &LFSort, &LDSort, &RFSort, &RDSort);
\r
153 SetSortTypeImm(LFSort, LDSort, RFSort, RDSort);
\r
154 ReSortDispList(WIN_LOCAL, &CancelFlg);
\r
158 if(strlen(CurHost.PassWord) > 0)
\r
162 CmdCtrlSocket = DoConnect(CurHost.HostAdrs, CurHost.UserName, CurHost.PassWord, CurHost.Account, CurHost.Port, CurHost.FireWall, Save, CurHost.Security);
\r
163 TrnCtrlSocket = CmdCtrlSocket;
\r
165 if(CmdCtrlSocket != INVALID_SOCKET)
\r
167 strcpy(TitleHostName, CurHost.HostName);
\r
169 SoundPlay(SND_CONNECT);
\r
171 SendInitCommand(CurHost.InitCmd);
\r
173 if(strlen(CurHost.LocalInitDir) > 0)
\r
175 DoLocalCWD(CurHost.LocalInitDir);
\r
176 GetLocalDirForWnd();
\r
179 DoCWD(CurHost.RemoteInitDir, YES, YES, YES);
\r
182 GetRemoteDirForWnd(CACHE_NORMAL, &CancelFlg);
\r
185 SoundPlay(SND_ERROR);
\r
190 SetTaskMsg(MSGJPN001);
\r
196 /*-----
\83z
\83X
\83g
\96¼
\82ð
\93ü
\97Í
\82µ
\82Ä
\83z
\83X
\83g
\82Ö
\90Ú
\91± ----------------------------------------
\r
203 *----------------------------------------------------------------------------*/
\r
205 void QuickConnectProc(void)
\r
207 char Tmp[FMAX_PATH+1 + USER_NAME_LEN+1 + PASSWORD_LEN+1 + 2];
\r
208 char File[FMAX_PATH+1];
\r
211 SaveCurrentSetToHost();
\r
213 if(DialogBoxParam(GetFtpInst(), MAKEINTRESOURCE(hostname_dlg), GetMainHwnd(), QuickConDialogCallBack, (LPARAM)Tmp) == YES)
\r
215 /*
\90Ú
\91±
\92\86\82È
\82ç
\90Ø
\92f
\82·
\82é */
\r
216 if(CmdCtrlSocket != INVALID_SOCKET)
\r
219 SetTaskMsg("----------------------------");
\r
222 CopyDefaultHost(&CurHost);
\r
223 if(SplitUNCpath(Tmp, CurHost.HostAdrs, CurHost.RemoteInitDir, File, CurHost.UserName, CurHost.PassWord, &CurHost.Port) == SUCCESS)
\r
225 if(strlen(CurHost.UserName) == 0)
\r
227 strcpy(CurHost.UserName, Tmp + FMAX_PATH+1);
\r
228 strcpy(CurHost.PassWord, Tmp + FMAX_PATH+1 + USER_NAME_LEN+1);
\r
231 SetCurrentHost(HOSTNUM_NOENTRY);
\r
232 AskUseFireWall(CurHost.HostAdrs, &CurHost.FireWall, &CurHost.Pasv, &CurHost.ListCmdOnly);
\r
233 CurHost.FireWall = (int)Tmp[FMAX_PATH+1 + USER_NAME_LEN+1 + PASSWORD_LEN+1];
\r
234 CurHost.Pasv = (int)Tmp[FMAX_PATH+1 + USER_NAME_LEN+1 + PASSWORD_LEN+1 + 1];
\r
236 SetHostKanaCnvImm(CurHost.KanaCnv);
\r
237 SetHostKanjiCodeImm(CurHost.KanjiCode);
\r
238 SetSyncMoveMode(CurHost.SyncMove);
\r
241 CmdCtrlSocket = DoConnect(CurHost.HostAdrs, CurHost.UserName, CurHost.PassWord, CurHost.Account, CurHost.Port, CurHost.FireWall, NO, CurHost.Security);
\r
242 TrnCtrlSocket = CmdCtrlSocket;
\r
244 if(CmdCtrlSocket != INVALID_SOCKET)
\r
246 strcpy(TitleHostName, CurHost.HostAdrs);
\r
248 SoundPlay(SND_CONNECT);
\r
251 DoCWD(CurHost.RemoteInitDir, YES, YES, YES);
\r
253 GetRemoteDirForWnd(CACHE_NORMAL, &CancelFlg);
\r
256 if(strlen(File) > 0)
\r
257 DirectDownLoadProc(File);
\r
261 SoundPlay(SND_ERROR);
\r
270 /*-----
\83N
\83C
\83b
\83N
\90Ú
\91±
\83_
\83C
\83A
\83\8d\83O
\82Ì
\83R
\81[
\83\8b\83o
\83b
\83N ----------------------------------
\r
273 * HWND hDlg :
\83E
\83C
\83\93\83h
\83E
\83n
\83\93\83h
\83\8b\r
274 * UINT message :
\83\81\83b
\83Z
\81[
\83W
\94Ô
\8d\86\r
275 * WPARAM wParam :
\83\81\83b
\83Z
\81[
\83W
\82Ì WPARAM
\88ø
\90\94\r
276 * LPARAM lParam :
\83\81\83b
\83Z
\81[
\83W
\82Ì LPARAM
\88ø
\90\94\r
280 *----------------------------------------------------------------------------*/
\r
282 static BOOL CALLBACK QuickConDialogCallBack(HWND hDlg, UINT iMessage, WPARAM wParam, LPARAM lParam)
\r
288 //char Str[HOST_ADRS_LEN+USER_NAME_LEN+INIT_DIR_LEN+5+1];
\r
292 case WM_INITDIALOG :
\r
293 SendDlgItemMessage(hDlg, QHOST_HOST, CB_LIMITTEXT, FMAX_PATH, 0);
\r
294 SendDlgItemMessage(hDlg, QHOST_HOST, WM_SETTEXT, 0, (LPARAM)"");
\r
295 SendDlgItemMessage(hDlg, QHOST_USER, EM_LIMITTEXT, USER_NAME_LEN, 0);
\r
296 if(QuickAnonymous == YES)
\r
298 SendDlgItemMessage(hDlg, QHOST_USER, WM_SETTEXT, 0, (LPARAM)"anonymous");
\r
299 SendDlgItemMessage(hDlg, QHOST_PASS, WM_SETTEXT, 0, (LPARAM)UserMailAdrs);
\r
303 SendDlgItemMessage(hDlg, QHOST_USER, WM_SETTEXT, 0, (LPARAM)"");
\r
304 SendDlgItemMessage(hDlg, QHOST_PASS, WM_SETTEXT, 0, (LPARAM)"");
\r
306 SendDlgItemMessage(hDlg, QHOST_PASS, EM_LIMITTEXT, PASSWORD_LEN, 0);
\r
307 SendDlgItemMessage(hDlg, QHOST_FWALL, BM_SETCHECK, FwallDefault, 0);
\r
308 SendDlgItemMessage(hDlg, QHOST_PASV, BM_SETCHECK, PasvDefault, 0);
\r
309 for(i = 0; i < HISTORY_MAX; i++)
\r
311 if(GetHistoryByNum(i, &Tmp) == SUCCESS)
\r
313 //sprintf(Str, "%s (%s) %s", Tmp.HostAdrs, Tmp.UserName, Tmp.RemoteInitDir);
\r
314 //SendDlgItemMessage(hDlg, QHOST_HOST, CB_ADDSTRING, 0, (LPARAM)Str);
\r
315 SendDlgItemMessage(hDlg, QHOST_HOST, CB_ADDSTRING, 0, (LPARAM)Tmp.HostAdrs);
\r
318 Buf = (char *)lParam;
\r
322 switch(GET_WM_COMMAND_ID(wParam, lParam))
\r
325 SendDlgItemMessage(hDlg, QHOST_HOST, WM_GETTEXT, FMAX_PATH+1, (LPARAM)Buf);
\r
326 SendDlgItemMessage(hDlg, QHOST_USER, WM_GETTEXT, USER_NAME_LEN+1, (LPARAM)Buf + FMAX_PATH+1);
\r
327 SendDlgItemMessage(hDlg, QHOST_PASS, WM_GETTEXT, PASSWORD_LEN+1, (LPARAM)Buf + FMAX_PATH+1 + USER_NAME_LEN+1);
\r
328 *(Buf + FMAX_PATH+1 + USER_NAME_LEN+1 + PASSWORD_LEN+1) = (char)SendDlgItemMessage(hDlg, QHOST_FWALL, BM_GETCHECK, 0, 0);
\r
329 *(Buf + FMAX_PATH+1 + USER_NAME_LEN+1 + PASSWORD_LEN+1+1) = (char)SendDlgItemMessage(hDlg, QHOST_PASV, BM_GETCHECK, 0, 0);
\r
330 EndDialog(hDlg, YES);
\r
334 EndDialog(hDlg, NO);
\r
337 // case QHOST_HOST :
\r
338 // if(HIWORD(wParam) == CBN_EDITCHANGE)
\r
339 // DoPrintf("EDIT");
\r
348 /*-----
\8ew
\92è
\82µ
\82½
\83z
\83X
\83g
\96¼
\82Å
\83z
\83X
\83g
\82Ö
\90Ú
\91± ----------------------------------------
\r
351 * char *unc : UNC
\95¶
\8e\9a\97ñ
\r
352 * int Kanji :
\83z
\83X
\83g
\82Ì
\8a¿
\8e\9a\83R
\81[
\83h (KANJI_xxx)
\r
353 * int Kana :
\94¼
\8ap
\82©
\82È
\81¨
\91S
\8ap
\95Ï
\8a·
\83\82\81[
\83h (YES/NO)
\r
354 * int Fkanji :
\83t
\83@
\83C
\83\8b\96¼
\82Ì
\8a¿
\8e\9a\83R
\81[
\83h (KANJI_xxx)
\r
355 * int TrMode :
\93]
\91\97\83\82\81[
\83h (TYPE_xx)
\r
359 *----------------------------------------------------------------------------*/
\r
361 void DirectConnectProc(char *unc, int Kanji, int Kana, int Fkanji, int TrMode)
\r
363 char Host[HOST_ADRS_LEN+1];
\r
364 char Path[FMAX_PATH+1];
\r
365 char File[FMAX_PATH+1];
\r
366 char User[USER_NAME_LEN+1];
\r
367 char Pass[PASSWORD_LEN+1];
\r
371 SaveCurrentSetToHost();
\r
373 /*
\90Ú
\91±
\92\86\82È
\82ç
\90Ø
\92f
\82·
\82é */
\r
374 if(CmdCtrlSocket != INVALID_SOCKET)
\r
377 SetTaskMsg("----------------------------");
\r
380 if(SplitUNCpath(unc, Host, Path, File, User, Pass, &Port) == SUCCESS)
\r
382 if(strlen(User) == 0)
\r
384 strcpy(User, "anonymous");
\r
385 strcpy(Pass, UserMailAdrs);
\r
388 CopyDefaultHost(&CurHost);
\r
390 SetCurrentHost(HOSTNUM_NOENTRY);
\r
391 strcpy(CurHost.HostAdrs, Host);
\r
392 strcpy(CurHost.UserName, User);
\r
393 strcpy(CurHost.PassWord, Pass);
\r
394 strcpy(CurHost.RemoteInitDir, Path);
\r
395 AskUseFireWall(CurHost.HostAdrs, &CurHost.FireWall, &CurHost.Pasv, &CurHost.ListCmdOnly);
\r
396 CurHost.Port = Port;
\r
397 CurHost.KanjiCode = Kanji;
\r
398 CurHost.KanaCnv = Kana;
\r
399 CurHost.NameKanjiCode = Fkanji;
\r
400 CurHost.KanaCnv = YES; /*
\82Æ
\82è
\82 \82¦
\82¸ */
\r
402 SetHostKanaCnvImm(CurHost.KanaCnv);
\r
403 SetHostKanjiCodeImm(CurHost.KanjiCode);
\r
404 SetSyncMoveMode(CurHost.SyncMove);
\r
406 if(TrMode != TYPE_DEFAULT)
\r
408 SetTransferTypeImm(TrMode);
\r
409 DispTransferType();
\r
413 CmdCtrlSocket = DoConnect(CurHost.HostAdrs, CurHost.UserName, CurHost.PassWord, CurHost.Account, CurHost.Port, CurHost.FireWall, NO, CurHost.Security);
\r
414 TrnCtrlSocket = CmdCtrlSocket;
\r
416 if(CmdCtrlSocket != INVALID_SOCKET)
\r
418 strcpy(TitleHostName, CurHost.HostAdrs);
\r
420 SoundPlay(SND_CONNECT);
\r
423 DoCWD(CurHost.RemoteInitDir, YES, YES, YES);
\r
425 GetRemoteDirForWnd(CACHE_NORMAL, &CancelFlg);
\r
428 if(strlen(File) > 0)
\r
429 DirectDownLoadProc(File);
\r
431 ResetAutoExitFlg();
\r
435 SoundPlay(SND_ERROR);
\r
443 /*-----
\83z
\83X
\83g
\82Ì
\83q
\83X
\83g
\83\8a\82Å
\8ew
\92è
\82³
\82ê
\82½
\83z
\83X
\83g
\82Ö
\90Ú
\91± ------------------------------
\r
446 * int MenuCmd :
\8eæ
\82è
\8fo
\82·
\83q
\83X
\83g
\83\8a\82É
\8a\84\82è
\93\96\82Ä
\82ç
\82ê
\82½
\83\81\83j
\83\85\81[
\83R
\83}
\83\93\83h
\r
450 *----------------------------------------------------------------------------*/
\r
452 void HistoryConnectProc(int MenuCmd)
\r
460 if(GetHistoryByCmd(MenuCmd, &Hist) == SUCCESS)
\r
463 SaveCurrentSetToHost();
\r
465 /*
\90Ú
\91±
\92\86\82È
\82ç
\90Ø
\92f
\82·
\82é */
\r
466 if(CmdCtrlSocket != INVALID_SOCKET)
\r
469 SetTaskMsg("----------------------------");
\r
472 CopyHistoryToHost(&Hist, &CurHost);
\r
474 if(ConnectRas(CurHost.Dialup, CurHost.DialupAlways, CurHost.DialupNotify, CurHost.DialEntry) == SUCCESS)
\r
476 SetCurrentHost(HOSTNUM_NOENTRY);
\r
477 SetHostKanaCnvImm(CurHost.KanaCnv);
\r
478 SetHostKanjiCodeImm(CurHost.KanjiCode);
\r
479 SetSyncMoveMode(CurHost.SyncMove);
\r
481 DecomposeSortType(CurHost.Sort, &LFSort, &LDSort, &RFSort, &RDSort);
\r
482 SetSortTypeImm(LFSort, LDSort, RFSort, RDSort);
\r
483 ReSortDispList(WIN_LOCAL, &CancelFlg);
\r
485 SetTransferTypeImm(Hist.Type);
\r
486 DispTransferType();
\r
489 CmdCtrlSocket = DoConnect(CurHost.HostAdrs, CurHost.UserName, CurHost.PassWord, CurHost.Account, CurHost.Port, CurHost.FireWall, NO, CurHost.Security);
\r
490 TrnCtrlSocket = CmdCtrlSocket;
\r
492 if(CmdCtrlSocket != INVALID_SOCKET)
\r
494 strcpy(TitleHostName, CurHost.HostAdrs);
\r
496 SoundPlay(SND_CONNECT);
\r
498 SendInitCommand(CurHost.InitCmd);
\r
500 DoLocalCWD(CurHost.LocalInitDir);
\r
501 GetLocalDirForWnd();
\r
504 DoCWD(CurHost.RemoteInitDir, YES, YES, YES);
\r
506 GetRemoteDirForWnd(CACHE_NORMAL, &CancelFlg);
\r
509 SoundPlay(SND_ERROR);
\r
514 SetTaskMsg(MSGJPN002);
\r
517 SoundPlay(SND_ERROR);
\r
523 /*-----
\83z
\83X
\83g
\82Ì
\8f\89\8aú
\89»
\83R
\83}
\83\93\83h
\82ð
\91\97\82é ------------------------------------------
\r
526 * int Cmd :
\8f\89\8aú
\89»
\83R
\83}
\83\93\83h
\83X
\r
532 *
\8f\89\8aú
\89»
\83R
\83}
\83\93\83h
\82Í
\88È
\89º
\82Ì
\82æ
\82¤
\82È
\83t
\83H
\81[
\83}
\83b
\83g
\82Å
\82 \82é
\82±
\82Æ
\r
534 * cmd1\r\ncmd2\r\n\0
\r
535 *----------------------------------------------------------------------------*/
\r
537 static int SendInitCommand(char *Cmd)
\r
539 char Tmp[INITCMD_LEN+1];
\r
542 while(strlen(Cmd) > 0)
\r
545 if((Pos = strchr(Tmp, '\r')) != NULL)
\r
547 if(strlen(Tmp) > 0)
\r
550 if((Cmd = strchr(Cmd, '\n')) != NULL)
\r
559 /*-----
\8ew
\92è
\82Ì
\83z
\83X
\83g
\82ÍFireWall
\82ð
\8eg
\82¤
\90Ý
\92è
\82©
\82Ç
\82¤
\82©
\82ð
\95Ô
\82· ------------------------
\r
562 * char *Hots :
\83z
\83X
\83g
\96¼
\r
563 * int *Fire : FireWall
\82ð
\8eg
\82¤
\82©
\82Ç
\82¤
\82©
\82ð
\95Ô
\82·
\83\8f\81[
\83N
\r
564 * int *Pasv : PASV
\83\82\81[
\83h
\82ð
\95Ô
\82·
\83\8f\81[
\83N
\r
565 * int *List : LIST
\83R
\83}
\83\93\83h
\82Ì
\82Ý
\8eg
\97p
\83t
\83\89\83O
\r
569 *----------------------------------------------------------------------------*/
\r
571 static void AskUseFireWall(char *Host, int *Fire, int *Pasv, int *List)
\r
576 *Fire = FwallDefault;
\r
577 *Pasv = PasvDefault;
\r
581 while(CopyHostFromList(i, &Tmp) == SUCCESS)
\r
583 if(strcmp(Host, Tmp.HostAdrs) == 0)
\r
585 *Fire = Tmp.FireWall;
\r
587 *List = Tmp.ListCmdOnly;
\r
596 /*-----
\90Ú
\91±
\82µ
\82Ä
\82¢
\82é
\83z
\83X
\83g
\82Ì
\83A
\83h
\83\8c\83X
\82ð
\95Ô
\82· ------------------------------------
\r
602 * char *
\83z
\83X
\83g
\82Ì
\83A
\83h
\83\8c\83X
\r
603 *----------------------------------------------------------------------------*/
\r
605 char *AskHostAdrs(void)
\r
607 return(CurHost.HostAdrs);
\r
611 /*-----
\90Ú
\91±
\82µ
\82Ä
\82¢
\82é
\83z
\83X
\83g
\82Ì
\83|
\81[
\83g
\82ð
\95Ô
\82· --------------------------------------
\r
617 * int
\83z
\83X
\83g
\82Ì
\83|
\81[
\83g
\r
618 *----------------------------------------------------------------------------*/
\r
620 int AskHostPort(void)
\r
622 return(CurHost.Port);
\r
625 /*-----
\90Ú
\91±
\82µ
\82Ä
\82¢
\82é
\83z
\83X
\83g
\82Ì
\83t
\83@
\83C
\83\8b\96¼
\82Ì
\8a¿
\8e\9a\83R
\81[
\83h
\82ð
\95Ô
\82· ----------------------
\r
631 * int
\8a¿
\8e\9a\83R
\81[
\83h (KANJI_xxx)
\r
632 *----------------------------------------------------------------------------*/
\r
634 int AskHostNameKanji(void)
\r
636 if(AskCurrentHost() != HOSTNUM_NOENTRY)
\r
637 CopyHostFromListInConnect(AskCurrentHost(), &CurHost);
\r
639 return(CurHost.NameKanjiCode);
\r
643 /*-----
\90Ú
\91±
\82µ
\82Ä
\82¢
\82é
\83z
\83X
\83g
\82Ì
\83t
\83@
\83C
\83\8b\96¼
\82Ì
\94¼
\8ap
\83J
\83i
\95Ï
\8a·
\83t
\83\89\83O
\82ð
\95Ô
\82· --------------
\r
649 * int
\94¼
\8ap
\83J
\83i
\82ð
\91S
\8ap
\82É
\95Ï
\8a·
\82·
\82é
\82©
\82Ç
\82¤
\82© (YES/NO)
\r
650 *----------------------------------------------------------------------------*/
\r
652 int AskHostNameKana(void)
\r
654 if(AskCurrentHost() != HOSTNUM_NOENTRY)
\r
655 CopyHostFromListInConnect(AskCurrentHost(), &CurHost);
\r
657 return(CurHost.NameKanaCnv);
\r
661 /*-----
\90Ú
\91±
\82µ
\82Ä
\82¢
\82é
\83z
\83X
\83g
\82ÌLIST
\83R
\83}
\83\93\83h
\83\82\81[
\83h
\82ð
\95Ô
\82· --------------------------
\r
667 * int LIST
\83R
\83}
\83\93\83h
\83\82\81[
\83h (YES/NO)
\r
668 *----------------------------------------------------------------------------*/
\r
670 int AskListCmdMode(void)
\r
672 if(CurHost.HostType == HTYPE_VMS)
\r
676 if(AskCurrentHost() != HOSTNUM_NOENTRY)
\r
677 CopyHostFromListInConnect(AskCurrentHost(), &CurHost);
\r
678 return(CurHost.ListCmdOnly);
\r
683 /*-----
\90Ú
\91±
\82µ
\82Ä
\82¢
\82é
\83z
\83X
\83g
\82ÅNLST -R
\82ð
\8eg
\82¤
\82©
\82Ç
\82¤
\82©
\82ð
\95Ô
\82· ------------------------
\r
689 * int NLST -R
\82ð
\8eg
\82¤
\82©
\82Ç
\82¤
\82© (YES/NO)
\r
690 *----------------------------------------------------------------------------*/
\r
692 int AskUseNLST_R(void)
\r
694 if(AskCurrentHost() != HOSTNUM_NOENTRY)
\r
695 CopyHostFromListInConnect(AskCurrentHost(), &CurHost);
\r
697 return(CurHost.UseNLST_R);
\r
701 /*-----
\90Ú
\91±
\82µ
\82Ä
\82¢
\82é
\83z
\83X
\83g
\82ÌChmod
\83R
\83}
\83\93\83h
\82ð
\95Ô
\82· -------------------------------
\r
707 * char *Chmod
\83R
\83}
\83\93\83h
\r
708 *----------------------------------------------------------------------------*/
\r
710 char *AskHostChmodCmd(void)
\r
712 if(AskCurrentHost() != HOSTNUM_NOENTRY)
\r
713 CopyHostFromListInConnect(AskCurrentHost(), &CurHost);
\r
715 return(CurHost.ChmodCmd);
\r
719 /*-----
\90Ú
\91±
\82µ
\82Ä
\82¢
\82é
\83z
\83X
\83g
\82Ì
\83^
\83C
\83\80\83]
\81[
\83\93\82ð
\95Ô
\82· --------------------------------
\r
725 * int
\83^
\83C
\83\80\83]
\81[
\83\93\r
726 *----------------------------------------------------------------------------*/
\r
728 int AskHostTimeZone(void)
\r
730 if(AskCurrentHost() != HOSTNUM_NOENTRY)
\r
731 CopyHostFromListInConnect(AskCurrentHost(), &CurHost);
\r
733 return(CurHost.TimeZone);
\r
737 /*-----
\90Ú
\91±
\82µ
\82Ä
\82¢
\82é
\83z
\83X
\83g
\82ÌPASV
\83\82\81[
\83h
\82ð
\95Ô
\82· ----------------------------------
\r
743 * int PASV
\83\82\81[
\83h
\82©
\82Ç
\82¤
\82© (YES/NO)
\r
744 *----------------------------------------------------------------------------*/
\r
746 int AskPasvMode(void)
\r
748 return(CurHost.Pasv);
\r
752 /*-----
\90Ú
\91±
\82µ
\82Ä
\82¢
\82é
\83z
\83X
\83g
\82ÌLNST
\83t
\83@
\83C
\83\8b\96¼
\82ð
\95Ô
\82· ------------------------------
\r
758 * char *
\83t
\83@
\83C
\83\8b\96¼
\81^
\83I
\83v
\83V
\83\87\83\93\r
759 *----------------------------------------------------------------------------*/
\r
761 char *AskHostLsName(void)
\r
763 if(AskCurrentHost() != HOSTNUM_NOENTRY)
\r
764 CopyHostFromListInConnect(AskCurrentHost(), &CurHost);
\r
766 return(CurHost.LsName);
\r
770 /*-----
\90Ú
\91±
\82µ
\82Ä
\82¢
\82é
\83z
\83X
\83g
\82Ì
\83z
\83X
\83g
\83^
\83C
\83v
\82ð
\95Ô
\82· --------------------------------
\r
776 * char *
\83t
\83@
\83C
\83\8b\96¼
\81^
\83I
\83v
\83V
\83\87\83\93\r
777 *----------------------------------------------------------------------------*/
\r
779 int AskHostType(void)
\r
781 if(AskCurrentHost() != HOSTNUM_NOENTRY)
\r
782 CopyHostFromListInConnect(AskCurrentHost(), &CurHost);
\r
784 return(CurHost.HostType);
\r
788 /*-----
\90Ú
\91±
\82µ
\82Ä
\82¢
\82é
\83z
\83X
\83g
\82ÍFireWall
\82ð
\8eg
\82¤
\83z
\83X
\83g
\82©
\82Ç
\82¤
\82©
\82ð
\95Ô
\82· ----------------
\r
794 * int FireWall
\82ð
\8eg
\82¤
\82©
\82Ç
\82¤
\82© (YES/NO)
\r
795 *----------------------------------------------------------------------------*/
\r
797 int AskHostFireWall(void)
\r
799 return(CurHost.FireWall);
\r
803 /*-----
\90Ú
\91±
\82µ
\82Ä
\82¢
\82é
\83z
\83X
\83g
\82Å
\83t
\83\8b\83p
\83X
\82Å
\83t
\83@
\83C
\83\8b\83A
\83N
\83Z
\83X
\82µ
\82È
\82¢
\82©
\82Ç
\82¤
\82©
\82ð
\95Ô
\82· ----
\r
809 * int
\83t
\83\8b\83p
\83X
\82Å
\83A
\83N
\83Z
\83X
\82µ
\82È
\82¢ (YES=
\83t
\83\8b\83p
\83X
\8bÖ
\8e~/NO)
\r
810 *----------------------------------------------------------------------------*/
\r
812 int AskNoFullPathMode(void)
\r
814 if(CurHost.HostType == HTYPE_VMS)
\r
817 return(CurHost.NoFullPath);
\r
821 /*-----
\90Ú
\91±
\82µ
\82Ä
\82¢
\82é
\83\86\81[
\83U
\96¼
\82ð
\95Ô
\82· --------------------------------------------
\r
827 * char *
\83\86\81[
\83U
\96¼
\r
828 *----------------------------------------------------------------------------*/
\r
830 char *AskHostUserName(void)
\r
832 return(CurHost.UserName);
\r
836 /*-----
\8c»
\8dÝ
\82Ì
\90Ý
\92è
\82ð
\83z
\83X
\83g
\82Ì
\90Ý
\92è
\82É
\83Z
\83b
\83g
\82·
\82é ----------------------------------
\r
845 *
\83J
\83\8c\83\93\83g
\83f
\83B
\83\8c\83N
\83g
\83\8a\81A
\83\
\81[
\83g
\95û
\96@
\82ð
\83z
\83X
\83g
\82Ì
\90Ý
\92è
\82É
\83Z
\83b
\83g
\82·
\82é
\r
846 *----------------------------------------------------------------------------*/
\r
848 void SaveCurrentSetToHost(void)
\r
851 char LocDir[FMAX_PATH+1];
\r
852 char HostDir[FMAX_PATH+1];
\r
854 if(TrnCtrlSocket != INVALID_SOCKET)
\r
856 if((Host = AskCurrentHost()) != HOSTNUM_NOENTRY)
\r
858 CopyHostFromListInConnect(Host, &CurHost);
\r
859 if(CurHost.LastDir == YES)
\r
861 AskLocalCurDir(LocDir, FMAX_PATH);
\r
862 AskRemoteCurDir(HostDir, FMAX_PATH);
\r
863 SetHostDir(AskCurrentHost(), LocDir, HostDir);
\r
865 SetHostSort(AskCurrentHost(), AskSortType(ITEM_LFILE), AskSortType(ITEM_LDIR), AskSortType(ITEM_RFILE), AskSortType(ITEM_RDIR));
\r
872 /*-----
\8c»
\8dÝ
\82Ì
\90Ý
\92è
\82ð
\83q
\83X
\83g
\83\8a\82É
\83Z
\83b
\83g
\82·
\82é --------------------------------------
\r
879 *----------------------------------------------------------------------------*/
\r
881 static void SaveCurrentSetToHistory(void)
\r
883 char LocDir[FMAX_PATH+1];
\r
884 char HostDir[FMAX_PATH+1];
\r
886 AskLocalCurDir(LocDir, FMAX_PATH);
\r
887 AskRemoteCurDir(HostDir, FMAX_PATH);
\r
888 strcpy(CurHost.LocalInitDir, LocDir);
\r
889 strcpy(CurHost.RemoteInitDir, HostDir);
\r
891 CurHost.Sort = AskSortType(ITEM_LFILE) * 0x1000000 | AskSortType(ITEM_LDIR) * 0x10000 | AskSortType(ITEM_RFILE) * 0x100 | AskSortType(ITEM_RDIR);
\r
893 CurHost.KanjiCode = AskHostKanjiCode();
\r
894 CurHost.KanaCnv = AskHostKanaCnv();
\r
896 CurHost.SyncMove = AskSyncMoveMode();
\r
898 AddHostToHistory(&CurHost, AskTransferType());
\r
899 SetAllHistoryToMenu();
\r
905 /*-----
\83R
\83}
\83\93\83h
\83R
\83\93\83g
\83\8d\81[
\83\8b\83\
\83P
\83b
\83g
\82Ì
\8dÄ
\90Ú
\91± ----------------------------------
\r
911 * int
\83X
\83e
\81[
\83^
\83X
\r
913 *----------------------------------------------------------------------------*/
\r
915 int ReConnectCmdSkt(void)
\r
919 if(CmdCtrlSocket != TrnCtrlSocket)
\r
920 do_closesocket(TrnCtrlSocket);
\r
921 TrnCtrlSocket = INVALID_SOCKET;
\r
923 Sts = ReConnectSkt(&CmdCtrlSocket);
\r
925 TrnCtrlSocket = CmdCtrlSocket;
\r
931 /*-----
\93]
\91\97\83R
\83\93\83g
\83\8d\81[
\83\8b\83\
\83P
\83b
\83g
\82Ì
\8dÄ
\90Ú
\91± --------------------------------------
\r
937 * int
\83X
\83e
\81[
\83^
\83X
\r
939 *----------------------------------------------------------------------------*/
\r
941 //int ReConnectTrnSkt(void)
\r
943 // return(ReConnectSkt(&TrnCtrlSocket));
\r
947 /*-----
\89ñ
\90ü
\82Ì
\8dÄ
\90Ú
\91± ----------------------------------------------------------
\r
950 * SOCKET *Skt :
\90Ú
\91±
\82µ
\82½
\83\
\83P
\83b
\83g
\82ð
\95Ô
\82·
\83\8f\81[
\83N
\r
953 * int
\83X
\83e
\81[
\83^
\83X
\r
955 *----------------------------------------------------------------------------*/
\r
957 static int ReConnectSkt(SOCKET *Skt)
\r
959 char Path[FMAX_PATH+1];
\r
964 SetTaskMsg(MSGJPN003);
\r
967 /*
\8c»
\8dÝ
\82Ì
\83\
\83P
\83b
\83g
\82Í
\90Ø
\92f */
\r
968 if(*Skt != INVALID_SOCKET)
\r
969 do_closesocket(*Skt);
\r
971 if((*Skt = DoConnect(CurHost.HostAdrs, CurHost.UserName, CurHost.PassWord, CurHost.Account, CurHost.Port, CurHost.FireWall, NO, CurHost.Security)) != INVALID_SOCKET)
\r
973 AskRemoteCurDir(Path, FMAX_PATH);
\r
974 DoCWD(Path, YES, YES, YES);
\r
978 SoundPlay(SND_ERROR);
\r
985 /*-----
\83R
\83}
\83\93\83h
\83R
\83\93\83g
\83\8d\81[
\83\8b\83\
\83P
\83b
\83g
\82ð
\95Ô
\82· ------------------------------------
\r
991 * SOCKET
\83R
\83}
\83\93\83h
\83R
\83\93\83g
\83\8d\81[
\83\8b\83\
\83P
\83b
\83g
\r
992 *----------------------------------------------------------------------------*/
\r
994 SOCKET AskCmdCtrlSkt(void)
\r
996 return(CmdCtrlSocket);
\r
1000 /*-----
\93]
\91\97\83R
\83\93\83g
\83\8d\81[
\83\8b\83\
\83P
\83b
\83g
\82ð
\95Ô
\82· ----------------------------------------
\r
1006 * SOCKET
\93]
\91\97\83R
\83\93\83g
\83\8d\81[
\83\8b\83\
\83P
\83b
\83g
\r
1007 *----------------------------------------------------------------------------*/
\r
1009 SOCKET AskTrnCtrlSkt(void)
\r
1011 return(TrnCtrlSocket);
\r
1015 /*-----
\83R
\83}
\83\93\83h
\81^
\93]
\91\97\83R
\83\93\83g
\83\8d\81[
\83\8b\83\
\83P
\83b
\83g
\82Ì
\8b¤
\97L
\82ð
\89ð
\8f\9c ------------------------
\r
1022 *----------------------------------------------------------------------------*/
\r
1024 void SktShareProh(void)
\r
1026 if(CmdCtrlSocket == TrnCtrlSocket)
\r
1029 //SetTaskMsg("############### SktShareProh");
\r
1031 CmdCtrlSocket = INVALID_SOCKET;
\r
1032 ReConnectSkt(&CmdCtrlSocket);
\r
1038 /*-----
\83R
\83}
\83\93\83h
\81^
\93]
\91\97\83R
\83\93\83g
\83\8d\81[
\83\8b\83\
\83P
\83b
\83g
\82Ì
\8b¤
\97L
\82ª
\89ð
\8f\9c\82³
\82ê
\82Ä
\82¢
\82é
\82©
\83`
\83F
\83b
\83N ----
\r
1044 * int
\83X
\83e
\81[
\83^
\83X
\r
1045 * YES=
\8b¤
\97L
\89ð
\8f\9c/NO=
\8b¤
\97L
\r
1046 *----------------------------------------------------------------------------*/
\r
1048 int AskShareProh(void)
\r
1053 if(CmdCtrlSocket == TrnCtrlSocket)
\r
1060 /*-----
\83z
\83X
\83g
\82©
\82ç
\90Ø
\92f --------------------------------------------------------
\r
1067 *----------------------------------------------------------------------------*/
\r
1069 void DisconnectProc(void)
\r
1072 //SetTaskMsg("############### Disconnect Cmd=%x, Trn=%x", CmdCtrlSocket,TrnCtrlSocket);
\r
1074 if((CmdCtrlSocket != INVALID_SOCKET) && (CmdCtrlSocket != TrnCtrlSocket))
\r
1076 DoQUIT(CmdCtrlSocket);
\r
1077 DoClose(CmdCtrlSocket);
\r
1080 if(TrnCtrlSocket != INVALID_SOCKET)
\r
1082 DoQUIT(TrnCtrlSocket);
\r
1083 DoClose(TrnCtrlSocket);
\r
1085 SaveCurrentSetToHistory();
\r
1087 EraseRemoteDirForWnd();
\r
1088 SetTaskMsg(MSGJPN004);
\r
1091 TrnCtrlSocket = INVALID_SOCKET;
\r
1092 CmdCtrlSocket = INVALID_SOCKET;
\r
1094 DispWindowTitle();
\r
1095 MakeButtonsFocus();
\r
1102 /*-----
\83\
\83P
\83b
\83g
\82ª
\8b
\90§
\90Ø
\92f
\82³
\82ê
\82½
\82Æ
\82«
\82Ì
\8f\88\97\9d ------------------------------------
\r
1109 *----------------------------------------------------------------------------*/
\r
1111 void DisconnectSet(void)
\r
1113 CmdCtrlSocket = INVALID_SOCKET;
\r
1114 TrnCtrlSocket = INVALID_SOCKET;
\r
1116 EraseRemoteDirForWnd();
\r
1117 DispWindowTitle();
\r
1118 MakeButtonsFocus();
\r
1119 SetTaskMsg(MSGJPN005);
\r
1124 /*-----
\83z
\83X
\83g
\82É
\90Ú
\91±
\92\86\82©
\82Ç
\82¤
\82©
\82ð
\95Ô
\82· ------------------------------------------
\r
1130 * int
\83X
\83e
\81[
\83^
\83X (YES/NO)
\r
1131 *----------------------------------------------------------------------------*/
\r
1133 int AskConnecting(void)
\r
1138 if(TrnCtrlSocket != INVALID_SOCKET)
\r
1145 /*-----
\83z
\83X
\83g
\82Ö
\90Ú
\91±
\82·
\82é ------------------------------------------------------
\r
1148 * char *Host :
\83z
\83X
\83g
\96¼
\r
1149 * char *User :
\83\86\81[
\83U
\96¼
\r
1150 * char *Pass :
\83p
\83X
\83\8f\81[
\83h
\r
1151 * char *Acct :
\83A
\83J
\83E
\83\93\83g
\r
1152 * int Port :
\83|
\81[
\83g
\r
1153 * int Fwall : FireWall
\82ð
\8eg
\82¤
\82©
\82Ç
\82¤
\82© (YES/NO)
\r
1154 * int SavePass :
\83p
\83X
\83\8f\81[
\83h
\82ð
\8dÄ
\93ü
\97Í
\82µ
\82½
\8e\9e\82É
\95Û
\91¶
\82·
\82é
\82©
\82Ç
\82¤
\82© (YES/NO)
\r
1155 * int Security :
\83Z
\83L
\83\85\83\8a\83e
\83B (SECURITY_xxx, MDx)
\r
1158 * SOCKET
\83\
\83P
\83b
\83g
\r
1161 *
\83z
\83X
\83g
\96¼
\81A
\83\86\81[
\83U
\96¼
\81A
\83p
\83X
\83\8f\81[
\83h
\82ª
\8ew
\92è
\82³
\82ê
\82Ä
\82¢
\82È
\82©
\82Á
\82½
\82Æ
\82«
\82Í
\81A
\90Ú
\91±
\82É
\8eg
\97p
\r
1162 *
\82µ
\82½
\82à
\82Ì
\82ð
\83R
\83s
\81[
\82µ
\82Ä
\82©
\82¦
\82·
\r
1163 * char *Host :
\83z
\83X
\83g
\96¼
\r
1164 * char *User :
\83\86\81[
\83U
\96¼
\r
1165 * char *Pass :
\83p
\83X
\83\8f\81[
\83h
\r
1166 * char *Acct :
\83A
\83J
\83E
\83\93\83g
\r
1168 * FireWall
\82Í
\8e\9f\82Ì
\82æ
\82¤
\82É
\93®
\8dì
\82·
\82é
\r
1169 * TYPE1 Connect fire
\81¨ USER user(f)
\81¨ PASS pass(f)
\81¨ SITE host
\81¨ USER user(h)
\81¨ PASS pass(h)
\81¨ ACCT acct
\r
1170 * TYPE2 Connect fire
\81¨ USER user(f)
\81¨ PASS pass(f)
\81¨ USER user(h)@host
\81¨ PASS pass(h)
\81¨ ACCT acct
\r
1171 * TYPE3 Connect fire
\81¨ USER user(h)@host
\81¨ PASS pass(h)
\81¨ ACCT acct
\r
1172 * TYPE4 Connect fire
\81¨ OPEN host
\81¨ USER user(h)
\81¨ PASS pass(h)
\81¨ ACCT acct
\r
1174 * none Connect host
\81¨ USER user(h)
\81¨ PASS pass(h)
\81¨ ACCT acct
\r
1175 *----------------------------------------------------------------------------*/
\r
1177 static SOCKET DoConnect(char *Host, char *User, char *Pass, char *Acct, int Port, int Fwall, int SavePass, int Security)
\r
1189 static const char *SiteTbl[4] = { "SITE", "site", "OPEN", "open" };
\r
1190 char TmpBuf[ONELINE_BUF_SIZE];
\r
1191 struct linger LingerOpt;
\r
1194 Fwall = FwallType;
\r
1196 Fwall = FWALL_NONE;
\r
1201 // WSASetBlockingHook(BlkHookFnc);
\r
1204 ContSock = INVALID_SOCKET;
\r
1208 if(((Fwall >= FWALL_FU_FP_SITE) && (Fwall <= FWALL_OPEN)) ||
\r
1209 (Fwall == FWALL_SIDEWINDER) ||
\r
1210 (Fwall == FWALL_FU_FP))
\r
1216 if(strlen(Tmp) != 0)
\r
1218 if((ContSock = connectsock(Tmp, Port, "", &CancelFlg)) != INVALID_SOCKET)
\r
1220 //
\83o
\83b
\83t
\83@
\82ð
\96³
\8cø
\r
1221 #ifdef DISABLE_CONTROL_NETWORK_BUFFERS
\r
1222 int BufferSize = 0;
\r
1223 setsockopt(ContSock, SOL_SOCKET, SO_SNDBUF, (char*)&BufferSize, sizeof(int));
\r
1224 setsockopt(ContSock, SOL_SOCKET, SO_RCVBUF, (char*)&BufferSize, sizeof(int));
\r
1226 while((Sts = ReadReplyMessage(ContSock, Buf, 1024, &CancelFlg, TmpBuf) / 100) == FTP_PRELIM)
\r
1229 if(Sts == FTP_COMPLETE)
\r
1232 if(setsockopt(ContSock, SOL_SOCKET, SO_OOBINLINE, (LPSTR)&Flg, sizeof(Flg)) == SOCKET_ERROR)
\r
1233 ReportWSError("setsockopt", WSAGetLastError());
\r
1234 //
\83f
\81[
\83^
\93]
\91\97\97p
\83\
\83P
\83b
\83g
\82ÌTCP
\92x
\89\84\93]
\91\97\82ª
\96³
\8cø
\82³
\82ê
\82Ä
\82¢
\82é
\82Ì
\82Å
\94O
\82Ì
\82½
\82ß
\r
1235 if(setsockopt(ContSock, IPPROTO_TCP, TCP_NODELAY, (LPSTR)&Flg, sizeof(Flg)) == SOCKET_ERROR)
\r
1236 ReportWSError("setsockopt", WSAGetLastError());
\r
1239 if(setsockopt(ContSock, SOL_SOCKET, SO_KEEPALIVE, (LPSTR)&Flg, sizeof(Flg)) == SOCKET_ERROR)
\r
1240 ReportWSError("setsockopt", WSAGetLastError());
\r
1241 LingerOpt.l_onoff = 1;
\r
1242 LingerOpt.l_linger = 90;
\r
1243 if(setsockopt(ContSock, SOL_SOCKET, SO_LINGER, (LPSTR)&LingerOpt, sizeof(LingerOpt)) == SOCKET_ERROR)
\r
1244 ReportWSError("setsockopt", WSAGetLastError());
\r
1248 /*=====
\94F
\8fØ
\82ð
\8ds
\82È
\82¤ =====*/
\r
1250 Sts = FTP_COMPLETE;
\r
1251 if((Fwall == FWALL_FU_FP_SITE) ||
\r
1252 (Fwall == FWALL_FU_FP_USER) ||
\r
1253 (Fwall == FWALL_FU_FP))
\r
1255 if((Sts = command(ContSock, Reply, &CancelFlg, "USER %s", FwallUser) / 100) == FTP_CONTINUE)
\r
1257 CheckOneTimePassword(FwallPass, Reply, FwallSecurity);
\r
1258 Sts = command(ContSock, NULL, &CancelFlg, "PASS %s", Reply) / 100;
\r
1261 else if(Fwall == FWALL_SIDEWINDER)
\r
1263 Sts = command(ContSock, Reply, &CancelFlg, "USER %s:%s%c%s", FwallUser, FwallPass, FwallDelimiter, Host) / 100;
\r
1265 if((Sts != FTP_COMPLETE) && (Sts != FTP_CONTINUE))
\r
1267 SetTaskMsg(MSGJPN006);
\r
1268 DoClose(ContSock);
\r
1269 ContSock = INVALID_SOCKET;
\r
1273 if((Fwall == FWALL_FU_FP_SITE) || (Fwall == FWALL_OPEN))
\r
1276 if(Fwall == FWALL_OPEN)
\r
1278 if(FwallLower == YES)
\r
1281 if(HostPort == PORT_NOR)
\r
1282 Sts = command(ContSock, NULL, &CancelFlg, "%s %s", SiteTbl[Flg], Host) / 100;
\r
1284 Sts = command(ContSock, NULL, &CancelFlg, "%s %s %d", SiteTbl[Flg], Host, HostPort) / 100;
\r
1287 if((Sts != FTP_COMPLETE) && (Sts != FTP_CONTINUE))
\r
1289 SetTaskMsg(MSGJPN007, Host);
\r
1290 DoClose(ContSock);
\r
1291 ContSock = INVALID_SOCKET;
\r
1296 if((strlen(User) != 0) ||
\r
1297 (InputDialogBox(username_dlg, GetMainHwnd(), NULL, User, USER_NAME_LEN+1, &Anony, IDH_HELP_TOPIC_0000001) == YES))
\r
1301 strcpy(User, "anonymous");
\r
1302 strcpy(Pass, UserMailAdrs);
\r
1305 if((Fwall == FWALL_FU_FP_USER) || (Fwall == FWALL_USER))
\r
1307 if(HostPort == PORT_NOR)
\r
1308 sprintf(Buf, "%s%c%s", User, FwallDelimiter, Host);
\r
1310 sprintf(Buf, "%s%c%s %d", User, FwallDelimiter, Host, HostPort);
\r
1313 strcpy(Buf, User);
\r
1315 // FTPES
\91Î
\89\9e\r
1316 // 2
\89ñ
\88È
\8fã
\8cÄ
\82Î
\82ê
\82é
\8e\96\82ª
\82 \82é
\82½
\82ß
\8aù
\82ÉFTPES
\82Å
\90Ú
\91±
\82µ
\82Ä
\82¢
\82Ä
\82à
\8dÄ
\8am
\94F
\r
1317 if(CurHost.CryptMode == CRYPT_NONE || CurHost.CryptMode == CRYPT_FTPES)
\r
1319 if(IsOpenSSLLoaded() && CurHost.UseFTPES == YES && (Sts = command(ContSock, Reply, &CancelFlg, "AUTH TLS")) == 234)
\r
1321 // SSL
\82É
\90Ø
\82è
\91Ö
\82¦
\r
1322 SetTaskMsg(MSGJPN315);
\r
1323 CurHost.CryptMode = CRYPT_FTPES;
\r
1324 if(AttachSSL(ContSock))
\r
1326 if((Sts = command(ContSock, Reply, &CancelFlg, "PBSZ 0")) == 200)
\r
1328 if((Sts = command(ContSock, Reply, &CancelFlg, "PROT P")) == 200)
\r
1342 //
\88Ã
\8d\86\89»
\82È
\82µ
\r
1343 CurHost.CryptMode = CRYPT_NONE;
\r
1344 SetTaskMsg(MSGJPN314);
\r
1352 if((Sts = command(ContSock, Reply, &CancelFlg, "USER %s", Buf) / 100) == FTP_CONTINUE)
\r
1354 if((strlen(Pass) != 0) ||
\r
1355 (InputDialogBox(passwd_dlg, GetMainHwnd(), NULL, Pass, PASSWORD_LEN+1, &Anony, IDH_HELP_TOPIC_0000001) == YES))
\r
1357 CheckOneTimePassword(Pass, Reply, Security);
\r
1359 /*
\83p
\83X
\83\8f\81[
\83h
\82ª
\83X
\83y
\81[
\83X1
\8cÂ
\82Ì
\8e\9e\82Í
\83p
\83X
\83\8f\81[
\83h
\82Ì
\8eÀ
\91Ì
\82È
\82µ
\82Æ
\82·
\82é */
\r
1360 if(strcmp(Reply, " ") == 0)
\r
1361 strcpy(Reply, "");
\r
1363 Sts = command(ContSock, NULL, &CancelFlg, "PASS %s", Reply) / 100;
\r
1364 if(Sts == FTP_ERROR)
\r
1367 if(InputDialogBox(re_passwd_dlg, GetMainHwnd(), NULL, Pass, PASSWORD_LEN+1, &Anony, IDH_HELP_TOPIC_0000001) == YES)
\r
1370 DoPrintf("No password specified.");
\r
1373 else if(Sts == FTP_CONTINUE)
\r
1375 if((strlen(Acct) != 0) ||
\r
1376 (InputDialogBox(account_dlg, GetMainHwnd(), NULL, Acct, ACCOUNT_LEN+1, &Anony, IDH_HELP_TOPIC_0000001) == YES))
\r
1378 Sts = command(ContSock, NULL, &CancelFlg, "ACCT %s", Acct) / 100;
\r
1381 DoPrintf("No account specified");
\r
1387 DoPrintf("No password specified.");
\r
1391 while(Continue == YES);
\r
1396 DoPrintf("No user name specified");
\r
1399 if(Sts != FTP_COMPLETE)
\r
1401 SetTaskMsg(MSGJPN008, Host);
\r
1402 DoClose(ContSock);
\r
1403 ContSock = INVALID_SOCKET;
\r
1405 else if((SavePass == YES) && (ReInPass == YES))
\r
1407 if(DialogBox(GetFtpInst(), MAKEINTRESOURCE(savepass_dlg), GetMainHwnd(), ExeEscDialogProc) == YES)
\r
1408 SetHostPassword(AskCurrentHost(), Pass);
\r
1416 SetTaskMsg(MSGJPN009/*"
\90Ú
\91±
\82Å
\82«
\82Ü
\82¹
\82ñ(1) %x", ContSock*/);
\r
1417 DoClose(ContSock);
\r
1418 ContSock = INVALID_SOCKET;
\r
1425 if(((Fwall >= FWALL_FU_FP_SITE) && (Fwall <= FWALL_OPEN)) ||
\r
1426 (Fwall == FWALL_FU_FP))
\r
1427 SetTaskMsg(MSGJPN010);
\r
1429 SetTaskMsg(MSGJPN011);
\r
1433 // WSAUnhookBlockingHook();
\r
1441 /*-----
\83\8f\83\93\83^
\83C
\83\80\83p
\83X
\83\8f\81[
\83h
\82Ì
\83`
\83F
\83b
\83N ----------------------------------------
\r
1444 * chat *Pass :
\83p
\83X
\83\8f\81[
\83h
\81^
\83p
\83X
\83t
\83\8c\81[
\83Y
\r
1445 * char *Reply : USER
\83R
\83}
\83\93\83h
\82ð
\91\97\82Á
\82½
\82 \82Æ
\82Ì
\83\8a\83v
\83\89\83C
\95¶
\8e\9a\97ñ
\r
1446 *
\81^PASS
\83R
\83}
\83\93\83h
\82Å
\91\97\82é
\83p
\83X
\83\8f\81[
\83h
\82ð
\95Ô
\82·
\83o
\83b
\83t
\83@
\r
1447 * int Type :
\83^
\83C
\83v (SECURITY_xxx, MDx)
\r
1450 * int
\83X
\83e
\81[
\83^
\83X
\r
1454 *
\83\8f\83\93\83^
\83C
\83\80\83p
\83X
\83\8f\81[
\83h
\82Å
\82È
\82¢
\8e\9e\82ÍPass
\82ð
\82»
\82Ì
\82Ü
\82ÜReply
\82É
\83R
\83s
\81[
\r
1455 *----------------------------------------------------------------------------*/
\r
1457 static int CheckOneTimePassword(char *Pass, char *Reply, int Type)
\r
1462 char Seed[MAX_SEED_LEN+1];
\r
1468 if(Type == SECURITY_AUTO)
\r
1470 if((Pos = stristr(Reply, "otp-md5")) != NULL)
\r
1473 SetTaskMsg(MSGJPN012);
\r
1475 else if((Pos = stristr(Reply, "otp-sha1")) != NULL)
\r
1478 SetTaskMsg(MSGJPN013);
\r
1480 else if(((Pos = stristr(Reply, "otp-md4")) != NULL) || ((Pos = stristr(Reply, "s/key")) != NULL))
\r
1483 SetTaskMsg(MSGJPN014);
\r
1487 Pos = GetNextField(Reply);
\r
1489 if((Type == MD4) || (Type == MD5) || (Type == SHA1))
\r
1491 /*
\83V
\81[
\83P
\83\93\83X
\94Ô
\8d\86\82ð
\8c©
\82Â
\82¯
\82é
\83\8b\81[
\83v */
\r
1492 DoPrintf("Analize OTP");
\r
1493 DoPrintf("%s", Pos);
\r
1495 while((Pos = GetNextField(Pos)) != NULL)
\r
1500 DoPrintf("Sequence=%d", Seq);
\r
1503 if((Pos = GetNextField(Pos)) != NULL)
\r
1505 if(GetOneField(Pos, Seed, MAX_SEED_LEN) == SUCCESS)
\r
1507 /* Seed
\82Í
\89p
\90\94\8e\9a\82Ì
\82Ý
\97L
\8cø
\82Æ
\82·
\82é */
\r
1508 for(i = strlen(Seed)-1; i >= 0; i--)
\r
1510 if((IsAlpha(Seed[i]) == 0) && (IsDigit(Seed[i]) == 0))
\r
1513 if(strlen(Seed) > 0)
\r
1515 DoPrintf("Seed=%s", Seed);
\r
1516 Make6WordPass(Seq, Seed, Pass, Type, Reply);
\r
1517 DoPrintf("Response=%s", Reply);
\r
1519 /*
\83V
\81[
\83P
\83\93\83X
\94Ô
\8d\86\82Ì
\83`
\83F
\83b
\83N
\82Æ
\8cx
\8d\90 */
\r
1521 DialogBox(GetFtpInst(), MAKEINTRESOURCE(otp_notify_dlg), GetMainHwnd(), ExeEscDialogProc);
\r
1532 SetTaskMsg(MSGJPN015);
\r
1536 strcpy(Reply, Pass);
\r
1537 DoPrintf("No OTP used.");
\r
1555 /*-----
\83\
\83P
\83b
\83g
\82ð
\90Ú
\91±
\82·
\82é ----------------------------------------------------
\r
1558 * char *host :
\83z
\83X
\83g
\96¼
\r
1559 * int port :
\83|
\81[
\83g
\94Ô
\8d\86\r
1560 * char *PreMsg :
\83\81\83b
\83Z
\81[
\83W
\82Ì
\91O
\94¼
\95\94\95ª
\r
1563 * SOCKET
\83\
\83P
\83b
\83g
\r
1564 *----------------------------------------------------------------------------*/
\r
1566 SOCKET connectsock(char *host, int port, char *PreMsg, int *CancelCheckWork)
\r
1568 struct sockaddr_in saSockAddr;
\r
1569 char HostEntry[MAXGETHOSTSTRUCT];
\r
1570 struct hostent *pHostEntry;
\r
1574 SOCKS4CMD Socks4Cmd;
\r
1575 SOCKS4REPLY Socks4Reply;
\r
1576 SOCKS5REQUEST Socks5Cmd;
\r
1577 SOCKS5REPLY Socks5Reply;
\r
1579 //////////////////////////////
\r
1580 //
\83z
\83X
\83g
\96¼
\89ð
\8c\88\82Æ
\90Ú
\91±
\82Ì
\8f\80\94õ
\r
1581 //////////////////////////////
\r
1583 Fwall = FWALL_NONE;
\r
1584 if(AskHostFireWall() == YES)
\r
1585 Fwall = FwallType;
\r
1587 sSocket = INVALID_SOCKET;
\r
1590 strcpy(DomainName, host);
\r
1591 memset(&CurSockAddr, 0, sizeof(CurSockAddr));
\r
1592 CurSockAddr.sin_port = htons((u_short)port);
\r
1593 CurSockAddr.sin_family = AF_INET;
\r
1594 if((CurSockAddr.sin_addr.s_addr = inet_addr(host)) == INADDR_NONE)
\r
1596 //
\83z
\83X
\83g
\96¼
\82ª
\8ew
\92è
\82³
\82ê
\82½
\r
1597 //
\83z
\83X
\83g
\96¼
\82©
\82ç
\83A
\83h
\83\8c\83X
\82ð
\8b\81\82ß
\82é
\r
1598 if(((Fwall == FWALL_SOCKS5_NOAUTH) || (Fwall == FWALL_SOCKS5_USER)) &&
\r
1599 (FwallResolv == YES))
\r
1601 //
\83z
\83X
\83g
\96¼
\89ð
\8c\88\82ÍSOCKS
\83T
\81[
\83o
\82É
\94C
\82¹
\82é
\r
1602 pHostEntry = NULL;
\r
1606 //
\83A
\83h
\83\8c\83X
\82ð
\8eæ
\93¾
\r
1607 SetTaskMsg(MSGJPN016, DomainName);
\r
1608 pHostEntry = do_gethostbyname(host, HostEntry, MAXGETHOSTSTRUCT, CancelCheckWork);
\r
1611 if(pHostEntry != NULL)
\r
1613 memcpy((char *)&CurSockAddr.sin_addr, pHostEntry->h_addr, pHostEntry->h_length);
\r
1614 SetTaskMsg(MSGJPN017, PreMsg, DomainName, inet_ntoa(CurSockAddr.sin_addr), ntohs(CurSockAddr.sin_port));
\r
1618 if((Fwall == FWALL_SOCKS5_NOAUTH) || (Fwall == FWALL_SOCKS5_USER))
\r
1621 SetTaskMsg(MSGJPN018, PreMsg, DomainName, ntohs(CurSockAddr.sin_port));
\r
1625 SetTaskMsg(MSGJPN019, host);
\r
1626 return(INVALID_SOCKET);
\r
1631 SetTaskMsg(MSGJPN020, PreMsg, inet_ntoa(CurSockAddr.sin_addr), ntohs(CurSockAddr.sin_port));
\r
1633 if((Fwall == FWALL_SOCKS4) || (Fwall == FWALL_SOCKS5_NOAUTH) || (Fwall == FWALL_SOCKS5_USER))
\r
1635 // SOCKS
\82ð
\8eg
\82¤
\r
1636 // SOCKS
\82É
\90Ú
\91±
\82·
\82é
\8f\80\94õ
\r
1637 if(Fwall == FWALL_SOCKS4)
\r
1639 Socks4Cmd.Ver = SOCKS4_VER;
\r
1640 Socks4Cmd.Cmd = SOCKS4_CMD_CONNECT;
\r
1641 Socks4Cmd.Port = CurSockAddr.sin_port;
\r
1642 Socks4Cmd.AdrsInt = CurSockAddr.sin_addr.s_addr;
\r
1643 strcpy(Socks4Cmd.UserID, FwallUser);
\r
1644 Len = offsetof(SOCKS4CMD, UserID) + strlen(FwallUser) + 1;
\r
1648 Len = Socks5MakeCmdPacket(&Socks5Cmd, SOCKS5_CMD_CONNECT, UseIPadrs, CurSockAddr.sin_addr.s_addr, DomainName, CurSockAddr.sin_port);
\r
1651 memset(&SocksSockAddr, 0, sizeof(SocksSockAddr));
\r
1652 if((SocksSockAddr.sin_addr.s_addr = inet_addr(FwallHost)) == INADDR_NONE)
\r
1654 if((pHostEntry = do_gethostbyname(FwallHost, HostEntry, MAXGETHOSTSTRUCT, CancelCheckWork)) != NULL)
\r
1655 memcpy((char *)&SocksSockAddr.sin_addr, pHostEntry->h_addr, pHostEntry->h_length);
\r
1658 SetTaskMsg(MSGJPN021, FwallHost);
\r
1659 return INVALID_SOCKET;
\r
1662 SocksSockAddr.sin_port = htons((u_short)FwallPort);
\r
1663 SocksSockAddr.sin_family = AF_INET;
\r
1664 SetTaskMsg(MSGJPN022, inet_ntoa(SocksSockAddr.sin_addr), ntohs(SocksSockAddr.sin_port));
\r
1665 // connect
\82Å
\90Ú
\91±
\82·
\82é
\90æ
\82ÍSOCKS
\83T
\81[
\83o
\r
1666 memcpy(&saSockAddr, &SocksSockAddr, sizeof(SocksSockAddr));
\r
1670 // connect
\82Å
\90Ú
\91±
\82·
\82é
\82Ì
\82Í
\90Ú
\91±
\90æ
\82Ì
\83z
\83X
\83g
\r
1671 memcpy(&saSockAddr, &CurSockAddr, sizeof(CurSockAddr));
\r
1675 //
\90Ú
\91±
\8eÀ
\8ds
\r
1678 if((sSocket = do_socket(AF_INET, SOCK_STREAM, TCP_PORT)) != INVALID_SOCKET)
\r
1680 if(do_connect(sSocket, (struct sockaddr *)&saSockAddr, sizeof(saSockAddr), CancelCheckWork) != SOCKET_ERROR)
\r
1682 if(Fwall == FWALL_SOCKS4)
\r
1684 Socks4Reply.Result = -1;
\r
1685 if((SocksSendCmd(sSocket, &Socks4Cmd, Len, CancelCheckWork) != SUCCESS) ||
\r
1686 (Socks4GetCmdReply(sSocket, &Socks4Reply) != SUCCESS) ||
\r
1687 (Socks4Reply.Result != SOCKS4_RES_OK))
\r
1689 SetTaskMsg(MSGJPN023, Socks4Reply.Result);
\r
1691 sSocket = INVALID_SOCKET;
\r
1694 else if((Fwall == FWALL_SOCKS5_NOAUTH) || (Fwall == FWALL_SOCKS5_USER))
\r
1696 if(Socks5SelMethod(sSocket, CancelCheckWork) == FAIL)
\r
1699 sSocket = INVALID_SOCKET;
\r
1702 Socks5Reply.Result = -1;
\r
1703 if((SocksSendCmd(sSocket, &Socks5Cmd, Len, CancelCheckWork) != SUCCESS) ||
\r
1704 (Socks5GetCmdReply(sSocket, &Socks5Reply) != SUCCESS) ||
\r
1705 (Socks5Reply.Result != SOCKS5_RES_OK))
\r
1707 SetTaskMsg(MSGJPN024, Socks5Reply.Result);
\r
1709 sSocket = INVALID_SOCKET;
\r
1714 if(sSocket != INVALID_SOCKET)
\r
1715 SetTaskMsg(MSGJPN025);
\r
1720 SetTaskMsg(MSGJPN026/*"
\90Ú
\91±
\82Å
\82«
\82Ü
\82¹
\82ñ(2) %x", sSocket*/);
\r
1722 sSocket = INVALID_SOCKET;
\r
1726 SetTaskMsg(MSGJPN027);
\r
1732 /*-----
\83\8a\83b
\83X
\83\93\83\
\83P
\83b
\83g
\82ð
\8eæ
\93¾ ------------------------------------------------
\r
1735 * SOCKET ctrl_skt :
\83R
\83\93\83g
\83\8d\81[
\83\8b\83\
\83P
\83b
\83g
\r
1738 * SOCKET
\83\8a\83b
\83X
\83\93\83\
\83P
\83b
\83g
\r
1739 *----------------------------------------------------------------------------*/
\r
1741 SOCKET GetFTPListenSocket(SOCKET ctrl_skt, int *CancelCheckWork)
\r
1743 SOCKET listen_skt;
\r
1746 struct sockaddr_in saCtrlAddr;
\r
1747 struct sockaddr_in saTmpAddr;
\r
1748 SOCKS4CMD Socks4Cmd;
\r
1749 SOCKS4REPLY Socks4Reply;
\r
1750 SOCKS5REQUEST Socks5Cmd;
\r
1751 SOCKS5REPLY Socks5Reply;
\r
1756 Fwall = FWALL_NONE;
\r
1757 if(AskHostFireWall() == YES)
\r
1758 Fwall = FwallType;
\r
1760 if((listen_skt = do_socket(AF_INET, SOCK_STREAM, IPPROTO_TCP)) != INVALID_SOCKET)
\r
1762 if(Fwall == FWALL_SOCKS4)
\r
1764 /*===== SOCKS4
\82ð
\8eg
\82¤ =====*/
\r
1765 DoPrintf("Use SOCKS4 BIND");
\r
1766 if(do_connect(listen_skt, (struct sockaddr *)&SocksSockAddr, sizeof(SocksSockAddr), CancelCheckWork) != SOCKET_ERROR)
\r
1768 Socks4Cmd.Ver = SOCKS4_VER;
\r
1769 Socks4Cmd.Cmd = SOCKS4_CMD_BIND;
\r
1770 Socks4Cmd.Port = CurSockAddr.sin_port;
\r
1771 Socks4Cmd.AdrsInt = CurSockAddr.sin_addr.s_addr;
\r
1772 strcpy(Socks4Cmd.UserID, FwallUser);
\r
1773 Len = offsetof(SOCKS4CMD, UserID) + strlen(FwallUser) + 1;
\r
1775 Socks4Reply.Result = -1;
\r
1776 if((SocksSendCmd(listen_skt, &Socks4Cmd, Len, CancelCheckWork) != SUCCESS) ||
\r
1777 (Socks4GetCmdReply(listen_skt, &Socks4Reply) != SUCCESS) ||
\r
1778 (Socks4Reply.Result != SOCKS4_RES_OK))
\r
1780 SetTaskMsg(MSGJPN028, Socks4Reply.Result);
\r
1781 DoClose(listen_skt);
\r
1782 listen_skt = INVALID_SOCKET;
\r
1785 if(Socks4Reply.AdrsInt == 0)
\r
1786 Socks4Reply.AdrsInt = SocksSockAddr.sin_addr.s_addr;
\r
1788 a = (char *)&Socks4Reply.AdrsInt;
\r
1789 p = (char *)&Socks4Reply.Port;
\r
1792 else if((Fwall == FWALL_SOCKS5_NOAUTH) || (Fwall == FWALL_SOCKS5_USER))
\r
1794 /*===== SOCKS5
\82ð
\8eg
\82¤ =====*/
\r
1795 DoPrintf("Use SOCKS5 BIND");
\r
1796 if(do_connect(listen_skt, (struct sockaddr *)&SocksSockAddr, sizeof(SocksSockAddr), CancelCheckWork) != SOCKET_ERROR)
\r
1798 if(Socks5SelMethod(listen_skt, CancelCheckWork) == FAIL)
\r
1800 DoClose(listen_skt);
\r
1801 listen_skt = INVALID_SOCKET;
\r
1802 return(listen_skt);
\r
1805 Len = Socks5MakeCmdPacket(&Socks5Cmd, SOCKS5_CMD_BIND, UseIPadrs, CurSockAddr.sin_addr.s_addr, DomainName, CurSockAddr.sin_port);
\r
1807 Socks5Reply.Result = -1;
\r
1808 if((SocksSendCmd(listen_skt, &Socks5Cmd, Len, CancelCheckWork) != SUCCESS) ||
\r
1809 (Socks5GetCmdReply(listen_skt, &Socks5Reply) != SUCCESS) ||
\r
1810 (Socks5Reply.Result != SOCKS5_RES_OK))
\r
1812 SetTaskMsg(MSGJPN029, Socks5Reply.Result);
\r
1813 DoClose(listen_skt);
\r
1814 listen_skt = INVALID_SOCKET;
\r
1817 if(Socks5Reply.AdrsInt == 0)
\r
1818 Socks5Reply.AdrsInt = SocksSockAddr.sin_addr.s_addr;
\r
1820 a = (char *)&Socks5Reply.AdrsInt;
\r
1821 p = (char *)&Socks5Reply.Port;
\r
1826 /*===== SOCKS
\82ð
\8eg
\82í
\82È
\82¢ =====*/
\r
1827 DoPrintf("Use normal BIND");
\r
1828 saCtrlAddr.sin_port = htons(0);
\r
1829 saCtrlAddr.sin_family = AF_INET;
\r
1830 saCtrlAddr.sin_addr.s_addr = 0;
\r
1832 if(bind(listen_skt, (struct sockaddr *)&saCtrlAddr, sizeof(struct sockaddr)) != SOCKET_ERROR)
\r
1834 iLength = sizeof(saCtrlAddr);
\r
1835 if(getsockname(listen_skt, (struct sockaddr *)&saCtrlAddr, &iLength) != SOCKET_ERROR)
\r
1837 if(do_listen(listen_skt, 1) == 0)
\r
1839 iLength = sizeof(saTmpAddr);
\r
1840 if(getsockname(ctrl_skt, (struct sockaddr *)&saTmpAddr, &iLength) == SOCKET_ERROR)
\r
1841 ReportWSError("getsockname", WSAGetLastError());
\r
1843 a = (char *)&saTmpAddr.sin_addr;
\r
1844 p = (char *)&saCtrlAddr.sin_port;
\r
1848 ReportWSError("listen", WSAGetLastError());
\r
1849 do_closesocket(listen_skt);
\r
1850 listen_skt = INVALID_SOCKET;
\r
1855 ReportWSError("getsockname", WSAGetLastError());
\r
1856 do_closesocket(listen_skt);
\r
1857 listen_skt = INVALID_SOCKET;
\r
1862 ReportWSError("bind", WSAGetLastError());
\r
1863 do_closesocket(listen_skt);
\r
1864 listen_skt = INVALID_SOCKET;
\r
1867 if(listen_skt == INVALID_SOCKET)
\r
1868 SetTaskMsg(MSGJPN030);
\r
1872 ReportWSError("socket create", WSAGetLastError());
\r
1874 if(listen_skt != INVALID_SOCKET)
\r
1876 #define UC(b) (((int)b)&0xff)
\r
1877 if((command(ctrl_skt,NULL, &CancelFlg, "PORT %d,%d,%d,%d,%d,%d",
\r
1878 UC(a[0]), UC(a[1]), UC(a[2]), UC(a[3]),
\r
1879 UC(p[0]), UC(p[1])) / 100) != FTP_COMPLETE)
\r
1881 SetTaskMsg(MSGJPN031);
\r
1882 do_closesocket(listen_skt);
\r
1883 listen_skt = INVALID_SOCKET;
\r
1886 // DoPrintf("Skt=%u : listener %s port %u",listen_skt,inet_ntoa(saCtrlAddr.sin_addr),ntohs(saCtrlAddr.sin_port));
\r
1889 return(listen_skt);
\r
1893 /*-----
\83z
\83X
\83g
\82Ö
\90Ú
\91±
\8f\88\97\9d\92\86\82©
\82Ç
\82¤
\82©
\82ð
\95Ô
\82·---------------------------------------
\r
1899 * int
\83X
\83e
\81[
\83^
\83X
\r
1901 *----------------------------------------------------------------------------*/
\r
1903 int AskTryingConnect(void)
\r
1905 return(TryConnect);
\r
1910 ///*-----
\83u
\83\8d\83b
\83L
\83\93\83O
\83R
\81[
\83\8b\82Ì
\83t
\83b
\83N
\83R
\81[
\83\8b\83o
\83b
\83N --------------------------------
\r
1917 //*----------------------------------------------------------------------------*/
\r
1919 //static BOOL CALLBACK BlkHookFnc(void)
\r
1921 // BackgrndMessageProc();
\r
1923 // if(CancelFlg == YES)
\r
1925 // SetTaskMsg(MSGJPN032);
\r
1926 // WSACancelBlockingCall();
\r
1927 // CancelFlg = NO;
\r
1935 /*----- SOCKS5
\82Ì
\83R
\83}
\83\93\83h
\83p
\83P
\83b
\83g
\82ð
\8dì
\90¬
\82·
\82é ------------------------------------
\r
1938 * SOCKS5REQUEST *Packet :
\83p
\83P
\83b
\83g
\82ð
\8dì
\90¬
\82·
\82é
\83\8f\81[
\83N
\r
1939 * char Cmd :
\83R
\83}
\83\93\83h
\r
1940 * int ValidIP : IP
\83A
\83h
\83\8c\83X
\82ð
\8eg
\82¤
\82©
\82Ç
\82¤
\82©(YES/NO)
\r
1941 * ulong IP : IP
\83A
\83h
\83\8c\83X
\r
1942 * char *Host :
\83z
\83X
\83g
\96¼
\r
1943 * ushort Port :
\83|
\81[
\83g
\r
1946 * int
\83R
\83}
\83\93\83h
\83p
\83P
\83b
\83g
\82Ì
\92·
\82³
\r
1947 *----------------------------------------------------------------------------*/
\r
1949 static int Socks5MakeCmdPacket(SOCKS5REQUEST *Packet, char Cmd, int ValidIP, ulong IP, char *Host, ushort Port)
\r
1955 Pos = (uchar *)Packet;
\r
1956 Pos += SOCKS5REQUEST_SIZE;
\r
1957 TotalLen = SOCKS5REQUEST_SIZE + 2; /* +2
\82Í
\83|
\81[
\83g
\82Ì
\95ª */
\r
1959 Packet->Ver = SOCKS5_VER;
\r
1960 Packet->Cmd = Cmd;
\r
1962 if(ValidIP == YES)
\r
1964 /* IP
\83A
\83h
\83\8c\83X
\82ð
\8ew
\92è */
\r
1965 Packet->Type = SOCKS5_ADRS_IPV4;
\r
1966 *((ulong *)Pos) = IP;
\r
1972 /*
\83z
\83X
\83g
\96¼
\82ð
\8ew
\92è */
\r
1973 Packet->Type = SOCKS5_ADRS_NAME;
\r
1974 Len = strlen(Host);
\r
1976 strcpy(Pos, Host);
\r
1978 TotalLen += Len + 1;
\r
1980 *((ushort *)Pos) = Port;
\r
1986 /*----- SOCKS
\82Ì
\83R
\83}
\83\93\83h
\82ð
\91\97\82é -------------------------------------------------
\r
1989 * SOCKET Socket :
\83\
\83P
\83b
\83g
\r
1990 * void *Data :
\91\97\82é
\83f
\81[
\83^
\r
1991 * int Size :
\83T
\83C
\83Y
\r
1994 * int
\83X
\83e
\81[
\83^
\83X (SUCCESS/FAIL)
\r
1995 *----------------------------------------------------------------------------*/
\r
1997 static int SocksSendCmd(SOCKET Socket, void *Data, int Size, int *CancelCheckWork)
\r
2001 Ret = SendData(Socket, (char *)Data, Size, 0, CancelCheckWork);
\r
2003 if(Ret != SUCCESS)
\r
2004 SetTaskMsg(MSGJPN033, *((short *)Data));
\r
2010 /*----- SOCKS5
\82Ì
\83R
\83}
\83\93\83h
\82É
\91Î
\82·
\82é
\83\8a\83v
\83\89\83C
\83p
\83P
\83b
\83g
\82ð
\8eó
\90M
\82·
\82é --------------------
\r
2013 * SOCKET Socket :
\83\
\83P
\83b
\83g
\r
2014 * SOCKS5REPLY *Packet :
\83p
\83P
\83b
\83g
\r
2017 * int
\83X
\83e
\81[
\83^
\83X (SUCCESS/FAIL)
\r
2018 *----------------------------------------------------------------------------*/
\r
2020 static int Socks5GetCmdReply(SOCKET Socket, SOCKS5REPLY *Packet)
\r
2026 Pos = (uchar *)Packet;
\r
2027 Pos += SOCKS5REPLY_SIZE;
\r
2029 if((Ret = ReadNchar(Socket, (char *)Packet, SOCKS5REPLY_SIZE, &CancelFlg)) == SUCCESS)
\r
2031 if(Packet->Type == SOCKS5_ADRS_IPV4)
\r
2033 else if(Packet->Type == SOCKS5_ADRS_IPV6)
\r
2037 if((Ret = ReadNchar(Socket, (char *)Pos, 1, &CancelFlg)) == SUCCESS)
\r
2044 if(Ret == SUCCESS)
\r
2045 Ret = ReadNchar(Socket, (char *)Pos, Len, &CancelFlg);
\r
2048 if(Ret != SUCCESS)
\r
2049 SetTaskMsg(MSGJPN034);
\r
2055 /*----- SOCKS4
\82Ì
\83R
\83}
\83\93\83h
\82É
\91Î
\82·
\82é
\83\8a\83v
\83\89\83C
\83p
\83P
\83b
\83g
\82ð
\8eó
\90M
\82·
\82é --------------------
\r
2058 * SOCKET Socket :
\83\
\83P
\83b
\83g
\r
2059 * SOCKS5REPLY *Packet :
\83p
\83P
\83b
\83g
\r
2062 * int
\83X
\83e
\81[
\83^
\83X (SUCCESS/FAIL)
\r
2063 *----------------------------------------------------------------------------*/
\r
2065 static int Socks4GetCmdReply(SOCKET Socket, SOCKS4REPLY *Packet)
\r
2069 Ret = ReadNchar(Socket, (char *)Packet, SOCKS4REPLY_SIZE, &CancelFlg);
\r
2071 if(Ret != SUCCESS)
\r
2072 DoPrintf(MSGJPN035);
\r
2078 /*----- SOCKS5
\82Ì
\94F
\8fØ
\82ð
\8ds
\82¤ ----------------------------------------------------
\r
2081 * SOCKET Socket :
\83\
\83P
\83b
\83g
\r
2084 * int
\83X
\83e
\81[
\83^
\83X (SUCCESS/FAIL)
\r
2085 *----------------------------------------------------------------------------*/
\r
2087 static int Socks5SelMethod(SOCKET Socket, int *CancelCheckWork)
\r
2090 SOCKS5METHODREQUEST Socks5Method;
\r
2091 SOCKS5METHODREPLY Socks5MethodReply;
\r
2092 SOCKS5USERPASSSTATUS Socks5Status;
\r
2093 char Buf[USER_NAME_LEN + PASSWORD_LEN + 4];
\r
2098 Socks5Method.Ver = SOCKS5_VER;
\r
2099 Socks5Method.Num = 1;
\r
2100 if(FwallType == FWALL_SOCKS5_NOAUTH)
\r
2101 Socks5Method.Methods[0] = SOCKS5_AUTH_NONE;
\r
2103 Socks5Method.Methods[0] = SOCKS5_AUTH_USER;
\r
2105 if((SocksSendCmd(Socket, &Socks5Method, SOCKS5METHODREQUEST_SIZE, CancelCheckWork) != SUCCESS) ||
\r
2106 (ReadNchar(Socket, (char *)&Socks5MethodReply, SOCKS5METHODREPLY_SIZE, &CancelFlg) != SUCCESS) ||
\r
2107 (Socks5MethodReply.Method == (uchar)0xFF))
\r
2109 SetTaskMsg(MSGJPN036);
\r
2112 else if(Socks5MethodReply.Method == SOCKS5_AUTH_USER)
\r
2114 DoPrintf("SOCKS5 User/Pass Authentication");
\r
2115 Buf[0] = SOCKS5_USERAUTH_VER;
\r
2116 Len = strlen(FwallUser);
\r
2117 Len2 = strlen(FwallPass);
\r
2119 strcpy(Buf+2, FwallUser);
\r
2120 Buf[2 + Len] = Len2;
\r
2121 strcpy(Buf+3+Len, FwallPass);
\r
2123 if((SocksSendCmd(Socket, &Buf, Len+Len2+3, CancelCheckWork) != SUCCESS) ||
\r
2124 (ReadNchar(Socket, (char *)&Socks5Status, SOCKS5USERPASSSTATUS_SIZE, &CancelFlg) != SUCCESS) ||
\r
2125 (Socks5Status.Status != 0))
\r
2127 SetTaskMsg(MSGJPN037);
\r
2132 DoPrintf("SOCKS5 No Authentication");
\r
2138 /*----- SOCKS
\82ÌBIND
\82Ì
\91æ
\82Q
\83\8a\83v
\83\89\83C
\83\81\83b
\83Z
\81[
\83W
\82ð
\8eó
\82¯
\8eæ
\82é -------------------------
\r
2141 * SOCKET Socket :
\83\
\83P
\83b
\83g
\r
2142 * SOCKET *Data :
\83f
\81[
\83^
\83\
\83P
\83b
\83g
\82ð
\95Ô
\82·
\83\8f\81[
\83N
\r
2145 * int
\83X
\83e
\81[
\83^
\83X (SUCCESS/FAIL)
\r
2146 *----------------------------------------------------------------------------*/
\r
2148 int SocksGet2ndBindReply(SOCKET Socket, SOCKET *Data)
\r
2154 if((AskHostFireWall() == YES) && (FwallType == FWALL_SOCKS4))
\r
2156 Socks4GetCmdReply(Socket, (SOCKS4REPLY *)Buf);
\r
2160 else if((AskHostFireWall() == YES) &&
\r
2161 ((FwallType == FWALL_SOCKS5_NOAUTH) || (FwallType == FWALL_SOCKS5_USER)))
\r
2163 Socks5GetCmdReply(Socket, (SOCKS5REPLY *)Buf);
\r
2172 //
\88Ã
\8d\86\89»
\92Ê
\90M
\91Î
\89\9e\r
2173 int AskCryptMode(void)
\r
2175 return(CurHost.CryptMode);
\r
2178 int AskUseFTPES(void)
\r
2180 return(CurHost.UseFTPES);
\r
2183 int AskUseFTPIS(void)
\r
2185 return(CurHost.UseFTPIS);
\r
2188 int AskUseSFTP(void)
\r
2190 return(CurHost.UseSFTP);
\r