1 /*=============================================================================
\r
5 ===============================================================================
\r
6 / Copyright (C) 1997-2007 Sota. All rights reserved.
\r
8 / Redistribution and use in source and binary forms, with or without
\r
9 / modification, are permitted provided that the following conditions
\r
12 / 1. Redistributions of source code must retain the above copyright
\r
13 / notice, this list of conditions and the following disclaimer.
\r
14 / 2. Redistributions in binary form must reproduce the above copyright
\r
15 / notice, this list of conditions and the following disclaimer in the
\r
16 / documentation and/or other materials provided with the distribution.
\r
18 / THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
\r
19 / IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
\r
20 / OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
\r
21 / IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
\r
22 / INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
\r
23 / BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
\r
24 / USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
\r
25 / ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
\r
26 / (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
\r
27 / THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
\r
28 /============================================================================*/
\r
36 #include <mbstring.h>
\r
39 //#include <winsock.h>
\r
40 #include <winsock2.h>
\r
41 #include <windowsx.h>
\r
42 #include <commctrl.h>
\r
45 #include "resource.h"
\r
47 #include <htmlhelp.h>
\r
51 #undef __MBSWRAPPER_H__
\r
52 #include "mbswrapper.h"
\r
55 /*===== プロトタイプ =====*/
\r
58 //static BOOL CALLBACK QuickConDialogCallBack(HWND hDlg, UINT iMessage, WPARAM wParam, LPARAM lParam);
\r
59 static INT_PTR CALLBACK QuickConDialogCallBack(HWND hDlg, UINT iMessage, WPARAM wParam, LPARAM lParam);
\r
61 //static int SendInitCommand(char *Cmd);
\r
62 static int SendInitCommand(SOCKET Socket, char *Cmd, int *CancelCheckWork);
\r
63 static void AskUseFireWall(char *Host, int *Fire, int *Pasv, int *List);
\r
64 static void SaveCurrentSetToHistory(void);
\r
65 static int ReConnectSkt(SOCKET *Skt);
\r
68 //static SOCKET DoConnect(char *Host, char *User, char *Pass, char *Acct, int Port, int Fwall, int SavePass, int Security);
\r
69 static SOCKET DoConnectCrypt(int CryptMode, HOSTDATA* HostData, char *Host, char *User, char *Pass, char *Acct, int Port, int Fwall, int SavePass, int Security, int *CancelCheckWork);
\r
70 static SOCKET DoConnect(HOSTDATA* HostData, char *Host, char *User, char *Pass, char *Acct, int Port, int Fwall, int SavePass, int Security, int *CancelCheckWork);
\r
71 static int CheckOneTimePassword(char *Pass, char *Reply, int Type);
\r
72 static BOOL CALLBACK BlkHookFnc(void);
\r
73 static int Socks5MakeCmdPacket(SOCKS5REQUEST *Packet, char Cmd, int ValidIP, ulong IP, char *Host, ushort Port);
\r
75 static int Socks5MakeCmdPacketIPv6(SOCKS5REQUEST *Packet, char Cmd, int ValidIP, char *IP, char *Host, ushort Port);
\r
76 static int SocksSendCmd(SOCKET Socket, void *Data, int Size, int *CancelCheckWork);
\r
78 //static int Socks5GetCmdReply(SOCKET Socket, SOCKS5REPLY *Packet);
\r
79 static int Socks5GetCmdReply(SOCKET Socket, SOCKS5REPLY *Packet, int *CancelCheckWork);
\r
81 //static int Socks4GetCmdReply(SOCKET Socket, SOCKS4REPLY *Packet);
\r
82 static int Socks4GetCmdReply(SOCKET Socket, SOCKS4REPLY *Packet, int *CancelCheckWork);
\r
83 static int Socks5SelMethod(SOCKET Socket, int *CancelCheckWork);
\r
85 /*===== 外部参照 =====*/
\r
87 extern char FilterStr[FILTER_EXT_LEN+1];
\r
88 extern char TitleHostName[HOST_ADRS_LEN+1];
\r
89 extern int CancelFlg;
\r
92 extern char UserMailAdrs[USER_MAIL_LEN+1];
\r
93 extern char FwallHost[HOST_ADRS_LEN+1];
\r
94 extern char FwallUser[USER_NAME_LEN+1];
\r
95 extern char FwallPass[PASSWORD_LEN+1];
\r
96 extern int FwallPort;
\r
97 extern int FwallType;
\r
98 extern int FwallDefault;
\r
99 extern int FwallSecurity;
\r
100 extern int FwallResolv;
\r
101 extern int FwallLower;
\r
102 extern int FwallDelimiter;
\r
103 extern int PasvDefault;
\r
104 extern int QuickAnonymous;
\r
106 /*===== ローカルなワーク =====*/
\r
108 static int Anonymous;
\r
109 static int TryConnect = NO;
\r
110 static SOCKET CmdCtrlSocket = INVALID_SOCKET;
\r
111 static SOCKET TrnCtrlSocket = INVALID_SOCKET;
\r
112 static HOSTDATA CurHost;
\r
114 /* 接続中の接続先、SOCKSサーバのアドレス情報を保存しておく */
\r
115 /* この情報はlistenソケットを取得する際に用いる */
\r
117 //static struct sockaddr_in SocksSockAddr; /* SOCKSサーバのアドレス情報 */
\r
118 //static struct sockaddr_in CurSockAddr; /* 接続先ホストのアドレス情報 */
\r
119 static struct sockaddr_in SocksSockAddrIPv4; /* SOCKSサーバのアドレス情報 */
\r
120 static struct sockaddr_in CurSockAddrIPv4; /* 接続先ホストのアドレス情報 */
\r
121 static struct sockaddr_in6 SocksSockAddrIPv6; /* SOCKSサーバのアドレス情報 */
\r
122 static struct sockaddr_in6 CurSockAddrIPv6; /* 接続先ホストのアドレス情報 */
\r
123 static const struct in6_addr IN6ADDR_NONE = {{0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff}};
\r
125 static int UseIPadrs;
\r
126 static char DomainName[HOST_ADRS_LEN+1];
\r
128 #if defined(HAVE_TANDEM)
\r
129 static int Oss = NO; /* OSS ファイルシステムへアクセスしている場合は YES */
\r
134 /*----- ホスト一覧を使ってホストへ接続 ----------------------------------------
\r
137 * int Type : ダイアログのタイプ (DLG_TYPE_xxx)
\r
138 * int Num : 接続するホスト番号(0~, -1=ダイアログを出す)
\r
142 *----------------------------------------------------------------------------*/
\r
144 void ConnectProc(int Type, int Num)
\r
153 SaveCurrentSetToHost();
\r
155 if((Num >= 0) || (SelectHost(Type) == YES))
\r
158 SetCurrentHost(Num);
\r
161 if(CmdCtrlSocket != INVALID_SOCKET)
\r
164 SetTaskMsg("----------------------------");
\r
167 CopyHostFromList(AskCurrentHost(), &CurHost);
\r
169 CurHost.CurNameKanjiCode = CurHost.NameKanjiCode;
\r
171 CurHost.CurNetType = CurHost.NetType;
\r
173 if(ConnectRas(CurHost.Dialup, CurHost.DialupAlways, CurHost.DialupNotify, CurHost.DialEntry) == FFFTP_SUCCESS)
\r
175 SetHostKanaCnvImm(CurHost.KanaCnv);
\r
176 SetHostKanjiCodeImm(CurHost.KanjiCode);
\r
177 SetSyncMoveMode(CurHost.SyncMove);
\r
179 if((AskSaveSortToHost() == YES) && (CurHost.Sort != SORT_NOTSAVED))
\r
181 DecomposeSortType(CurHost.Sort, &LFSort, &LDSort, &RFSort, &RDSort);
\r
182 SetSortTypeImm(LFSort, LDSort, RFSort, RDSort);
\r
183 ReSortDispList(WIN_LOCAL, &CancelFlg);
\r
187 if(strlen(CurHost.PassWord) > 0)
\r
193 // CmdCtrlSocket = DoConnect(CurHost.HostAdrs, CurHost.UserName, CurHost.PassWord, CurHost.Account, CurHost.Port, CurHost.FireWall, Save, CurHost.Security);
\r
194 CmdCtrlSocket = DoConnect(&CurHost, CurHost.HostAdrs, CurHost.UserName, CurHost.PassWord, CurHost.Account, CurHost.Port, CurHost.FireWall, Save, CurHost.Security, &CancelFlg);
\r
195 TrnCtrlSocket = CmdCtrlSocket;
\r
197 if(CmdCtrlSocket != INVALID_SOCKET)
\r
200 switch(CurHost.CryptMode)
\r
203 if(CurHost.UseFTPIS != NO || CurHost.UseSFTP != NO)
\r
205 if(DialogBox(GetFtpInst(), MAKEINTRESOURCE(savecrypt_dlg), GetMainHwnd(), ExeEscDialogProc) == YES)
\r
206 SetHostExcryption(AskCurrentHost(), CurHost.UseNoEncryption, CurHost.UseFTPES, NO, NO);
\r
210 if(CurHost.UseNoEncryption != NO || CurHost.UseFTPIS != NO || CurHost.UseSFTP != NO)
\r
212 if(DialogBox(GetFtpInst(), MAKEINTRESOURCE(savecrypt_dlg), GetMainHwnd(), ExeEscDialogProc) == YES)
\r
213 SetHostExcryption(AskCurrentHost(), NO, CurHost.UseFTPES, NO, NO);
\r
217 if(CurHost.UseNoEncryption != NO || CurHost.UseFTPES != NO || CurHost.UseSFTP != NO)
\r
219 if(DialogBox(GetFtpInst(), MAKEINTRESOURCE(savecrypt_dlg), GetMainHwnd(), ExeEscDialogProc) == YES)
\r
220 SetHostExcryption(AskCurrentHost(), NO, NO, CurHost.UseFTPIS, NO);
\r
224 if(CurHost.UseNoEncryption != NO || CurHost.UseFTPES != NO || CurHost.UseFTPIS != NO)
\r
226 if(DialogBox(GetFtpInst(), MAKEINTRESOURCE(savecrypt_dlg), GetMainHwnd(), ExeEscDialogProc) == YES)
\r
227 SetHostExcryption(AskCurrentHost(), NO, NO, NO, CurHost.UseSFTP);
\r
233 if(CurHost.CurNameKanjiCode == KANJI_AUTO)
\r
235 if(DoDirListCmdSkt("", "", 999, &CancelFlg) == FTP_COMPLETE)
\r
236 CurHost.CurNameKanjiCode = AnalyzeNameKanjiCode(999);
\r
239 strcpy(TitleHostName, CurHost.HostName);
\r
241 SoundPlay(SND_CONNECT);
\r
243 SendInitCommand(CmdCtrlSocket, CurHost.InitCmd, &CancelFlg);
\r
245 if(strlen(CurHost.LocalInitDir) > 0)
\r
247 DoLocalCWD(CurHost.LocalInitDir);
\r
248 GetLocalDirForWnd();
\r
251 DoCWD(CurHost.RemoteInitDir, YES, YES, YES);
\r
254 GetRemoteDirForWnd(CACHE_NORMAL, &CancelFlg);
\r
257 SoundPlay(SND_ERROR);
\r
262 SetTaskMsg(MSGJPN001);
\r
268 /*----- ホスト名を入力してホストへ接続 ----------------------------------------
\r
275 *----------------------------------------------------------------------------*/
\r
277 void QuickConnectProc(void)
\r
279 char Tmp[FMAX_PATH+1 + USER_NAME_LEN+1 + PASSWORD_LEN+1 + 2];
\r
280 char File[FMAX_PATH+1];
\r
283 SaveCurrentSetToHost();
\r
285 if(DialogBoxParam(GetFtpInst(), MAKEINTRESOURCE(hostname_dlg), GetMainHwnd(), QuickConDialogCallBack, (LPARAM)Tmp) == YES)
\r
288 if(CmdCtrlSocket != INVALID_SOCKET)
\r
291 SetTaskMsg("----------------------------");
\r
294 CopyDefaultHost(&CurHost);
\r
296 CurHost.CurNameKanjiCode = CurHost.NameKanjiCode;
\r
298 CurHost.CurNetType = CurHost.NetType;
\r
299 if(SplitUNCpath(Tmp, CurHost.HostAdrs, CurHost.RemoteInitDir, File, CurHost.UserName, CurHost.PassWord, &CurHost.Port) == FFFTP_SUCCESS)
\r
301 if(strlen(CurHost.UserName) == 0)
\r
303 strcpy(CurHost.UserName, Tmp + FMAX_PATH+1);
\r
304 strcpy(CurHost.PassWord, Tmp + FMAX_PATH+1 + USER_NAME_LEN+1);
\r
307 SetCurrentHost(HOSTNUM_NOENTRY);
\r
308 AskUseFireWall(CurHost.HostAdrs, &CurHost.FireWall, &CurHost.Pasv, &CurHost.ListCmdOnly);
\r
309 CurHost.FireWall = (int)Tmp[FMAX_PATH+1 + USER_NAME_LEN+1 + PASSWORD_LEN+1];
\r
310 CurHost.Pasv = (int)Tmp[FMAX_PATH+1 + USER_NAME_LEN+1 + PASSWORD_LEN+1 + 1];
\r
312 SetHostKanaCnvImm(CurHost.KanaCnv);
\r
313 SetHostKanjiCodeImm(CurHost.KanjiCode);
\r
314 SetSyncMoveMode(CurHost.SyncMove);
\r
319 // CmdCtrlSocket = DoConnect(CurHost.HostAdrs, CurHost.UserName, CurHost.PassWord, CurHost.Account, CurHost.Port, CurHost.FireWall, NO, CurHost.Security);
\r
320 CmdCtrlSocket = DoConnect(&CurHost, CurHost.HostAdrs, CurHost.UserName, CurHost.PassWord, CurHost.Account, CurHost.Port, CurHost.FireWall, NO, CurHost.Security, &CancelFlg);
\r
321 TrnCtrlSocket = CmdCtrlSocket;
\r
323 if(CmdCtrlSocket != INVALID_SOCKET)
\r
326 if(CurHost.CurNameKanjiCode == KANJI_AUTO)
\r
328 if(DoDirListCmdSkt("", "", 999, &CancelFlg) == FTP_COMPLETE)
\r
329 CurHost.CurNameKanjiCode = AnalyzeNameKanjiCode(999);
\r
332 strcpy(TitleHostName, CurHost.HostAdrs);
\r
334 SoundPlay(SND_CONNECT);
\r
337 DoCWD(CurHost.RemoteInitDir, YES, YES, YES);
\r
339 GetRemoteDirForWnd(CACHE_NORMAL, &CancelFlg);
\r
342 if(strlen(File) > 0)
\r
343 DirectDownloadProc(File);
\r
347 SoundPlay(SND_ERROR);
\r
356 /*----- クイック接続ダイアログのコールバック ----------------------------------
\r
359 * HWND hDlg : ウインドウハンドル
\r
360 * UINT message : メッセージ番号
\r
361 * WPARAM wParam : メッセージの WPARAM 引数
\r
362 * LPARAM lParam : メッセージの LPARAM 引数
\r
366 *----------------------------------------------------------------------------*/
\r
369 //static BOOL CALLBACK QuickConDialogCallBack(HWND hDlg, UINT iMessage, WPARAM wParam, LPARAM lParam)
\r
370 static INT_PTR CALLBACK QuickConDialogCallBack(HWND hDlg, UINT iMessage, WPARAM wParam, LPARAM lParam)
\r
376 //char Str[HOST_ADRS_LEN+USER_NAME_LEN+INIT_DIR_LEN+5+1];
\r
380 case WM_INITDIALOG :
\r
381 SendDlgItemMessage(hDlg, QHOST_HOST, CB_LIMITTEXT, FMAX_PATH, 0);
\r
382 SendDlgItemMessage(hDlg, QHOST_HOST, WM_SETTEXT, 0, (LPARAM)"");
\r
383 SendDlgItemMessage(hDlg, QHOST_USER, EM_LIMITTEXT, USER_NAME_LEN, 0);
\r
384 if(QuickAnonymous == YES)
\r
386 SendDlgItemMessage(hDlg, QHOST_USER, WM_SETTEXT, 0, (LPARAM)"anonymous");
\r
387 SendDlgItemMessage(hDlg, QHOST_PASS, WM_SETTEXT, 0, (LPARAM)UserMailAdrs);
\r
391 SendDlgItemMessage(hDlg, QHOST_USER, WM_SETTEXT, 0, (LPARAM)"");
\r
392 SendDlgItemMessage(hDlg, QHOST_PASS, WM_SETTEXT, 0, (LPARAM)"");
\r
394 SendDlgItemMessage(hDlg, QHOST_PASS, EM_LIMITTEXT, PASSWORD_LEN, 0);
\r
395 SendDlgItemMessage(hDlg, QHOST_FWALL, BM_SETCHECK, FwallDefault, 0);
\r
396 SendDlgItemMessage(hDlg, QHOST_PASV, BM_SETCHECK, PasvDefault, 0);
\r
397 for(i = 0; i < HISTORY_MAX; i++)
\r
399 if(GetHistoryByNum(i, &Tmp) == FFFTP_SUCCESS)
\r
401 //sprintf(Str, "%s (%s) %s", Tmp.HostAdrs, Tmp.UserName, Tmp.RemoteInitDir);
\r
402 //SendDlgItemMessage(hDlg, QHOST_HOST, CB_ADDSTRING, 0, (LPARAM)Str);
\r
403 SendDlgItemMessage(hDlg, QHOST_HOST, CB_ADDSTRING, 0, (LPARAM)Tmp.HostAdrs);
\r
406 Buf = (char *)lParam;
\r
410 switch(GET_WM_COMMAND_ID(wParam, lParam))
\r
413 SendDlgItemMessage(hDlg, QHOST_HOST, WM_GETTEXT, FMAX_PATH+1, (LPARAM)Buf);
\r
414 SendDlgItemMessage(hDlg, QHOST_USER, WM_GETTEXT, USER_NAME_LEN+1, (LPARAM)Buf + FMAX_PATH+1);
\r
415 SendDlgItemMessage(hDlg, QHOST_PASS, WM_GETTEXT, PASSWORD_LEN+1, (LPARAM)Buf + FMAX_PATH+1 + USER_NAME_LEN+1);
\r
416 *(Buf + FMAX_PATH+1 + USER_NAME_LEN+1 + PASSWORD_LEN+1) = (char)SendDlgItemMessage(hDlg, QHOST_FWALL, BM_GETCHECK, 0, 0);
\r
417 *(Buf + FMAX_PATH+1 + USER_NAME_LEN+1 + PASSWORD_LEN+1+1) = (char)SendDlgItemMessage(hDlg, QHOST_PASV, BM_GETCHECK, 0, 0);
\r
418 EndDialog(hDlg, YES);
\r
422 EndDialog(hDlg, NO);
\r
425 // case QHOST_HOST :
\r
426 // if(HIWORD(wParam) == CBN_EDITCHANGE)
\r
427 // DoPrintf("EDIT");
\r
436 /*----- 指定したホスト名でホストへ接続 ----------------------------------------
\r
439 * char *unc : UNC文字列
\r
440 * int Kanji : ホストの漢字コード (KANJI_xxx)
\r
441 * int Kana : 半角かな→全角変換モード (YES/NO)
\r
442 * int Fkanji : ファイル名の漢字コード (KANJI_xxx)
\r
443 * int TrMode : 転送モード (TYPE_xx)
\r
447 *----------------------------------------------------------------------------*/
\r
449 void DirectConnectProc(char *unc, int Kanji, int Kana, int Fkanji, int TrMode)
\r
451 char Host[HOST_ADRS_LEN+1];
\r
452 char Path[FMAX_PATH+1];
\r
453 char File[FMAX_PATH+1];
\r
454 char User[USER_NAME_LEN+1];
\r
455 char Pass[PASSWORD_LEN+1];
\r
459 SaveCurrentSetToHost();
\r
462 if(CmdCtrlSocket != INVALID_SOCKET)
\r
465 SetTaskMsg("----------------------------");
\r
468 if(SplitUNCpath(unc, Host, Path, File, User, Pass, &Port) == FFFTP_SUCCESS)
\r
470 if(strlen(User) == 0)
\r
472 strcpy(User, "anonymous");
\r
473 strcpy(Pass, UserMailAdrs);
\r
476 CopyDefaultHost(&CurHost);
\r
478 SetCurrentHost(HOSTNUM_NOENTRY);
\r
479 strcpy(CurHost.HostAdrs, Host);
\r
480 strcpy(CurHost.UserName, User);
\r
481 strcpy(CurHost.PassWord, Pass);
\r
482 strcpy(CurHost.RemoteInitDir, Path);
\r
483 AskUseFireWall(CurHost.HostAdrs, &CurHost.FireWall, &CurHost.Pasv, &CurHost.ListCmdOnly);
\r
484 CurHost.Port = Port;
\r
485 CurHost.KanjiCode = Kanji;
\r
486 CurHost.KanaCnv = Kana;
\r
487 CurHost.NameKanjiCode = Fkanji;
\r
488 CurHost.KanaCnv = YES; /* とりあえず */
\r
490 CurHost.CurNameKanjiCode = CurHost.NameKanjiCode;
\r
492 CurHost.CurNetType = CurHost.NetType;
\r
494 SetHostKanaCnvImm(CurHost.KanaCnv);
\r
495 SetHostKanjiCodeImm(CurHost.KanjiCode);
\r
496 SetSyncMoveMode(CurHost.SyncMove);
\r
498 if(TrMode != TYPE_DEFAULT)
\r
500 SetTransferTypeImm(TrMode);
\r
501 DispTransferType();
\r
507 // CmdCtrlSocket = DoConnect(CurHost.HostAdrs, CurHost.UserName, CurHost.PassWord, CurHost.Account, CurHost.Port, CurHost.FireWall, NO, CurHost.Security);
\r
508 CmdCtrlSocket = DoConnect(&CurHost, CurHost.HostAdrs, CurHost.UserName, CurHost.PassWord, CurHost.Account, CurHost.Port, CurHost.FireWall, NO, CurHost.Security, &CancelFlg);
\r
509 TrnCtrlSocket = CmdCtrlSocket;
\r
511 if(CmdCtrlSocket != INVALID_SOCKET)
\r
514 if(CurHost.CurNameKanjiCode == KANJI_AUTO)
\r
516 if(DoDirListCmdSkt("", "", 999, &CancelFlg) == FTP_COMPLETE)
\r
517 CurHost.CurNameKanjiCode = AnalyzeNameKanjiCode(999);
\r
520 strcpy(TitleHostName, CurHost.HostAdrs);
\r
522 SoundPlay(SND_CONNECT);
\r
525 DoCWD(CurHost.RemoteInitDir, YES, YES, YES);
\r
527 GetRemoteDirForWnd(CACHE_NORMAL, &CancelFlg);
\r
530 if(strlen(File) > 0)
\r
531 DirectDownloadProc(File);
\r
533 ResetAutoExitFlg();
\r
537 SoundPlay(SND_ERROR);
\r
545 /*----- ホストのヒストリで指定されたホストへ接続 ------------------------------
\r
548 * int MenuCmd : 取り出すヒストリに割り当てられたメニューコマンド
\r
552 *----------------------------------------------------------------------------*/
\r
554 void HistoryConnectProc(int MenuCmd)
\r
562 if(GetHistoryByCmd(MenuCmd, &Hist) == FFFTP_SUCCESS)
\r
565 SaveCurrentSetToHost();
\r
568 if(CmdCtrlSocket != INVALID_SOCKET)
\r
571 SetTaskMsg("----------------------------");
\r
574 CopyHistoryToHost(&Hist, &CurHost);
\r
576 CurHost.CurNameKanjiCode = CurHost.NameKanjiCode;
\r
578 CurHost.CurNetType = CurHost.NetType;
\r
580 if(ConnectRas(CurHost.Dialup, CurHost.DialupAlways, CurHost.DialupNotify, CurHost.DialEntry) == FFFTP_SUCCESS)
\r
582 SetCurrentHost(HOSTNUM_NOENTRY);
\r
583 SetHostKanaCnvImm(CurHost.KanaCnv);
\r
584 SetHostKanjiCodeImm(CurHost.KanjiCode);
\r
585 SetSyncMoveMode(CurHost.SyncMove);
\r
587 DecomposeSortType(CurHost.Sort, &LFSort, &LDSort, &RFSort, &RDSort);
\r
588 SetSortTypeImm(LFSort, LDSort, RFSort, RDSort);
\r
589 ReSortDispList(WIN_LOCAL, &CancelFlg);
\r
591 SetTransferTypeImm(Hist.Type);
\r
592 DispTransferType();
\r
597 // CmdCtrlSocket = DoConnect(CurHost.HostAdrs, CurHost.UserName, CurHost.PassWord, CurHost.Account, CurHost.Port, CurHost.FireWall, NO, CurHost.Security);
\r
598 CmdCtrlSocket = DoConnect(&CurHost, CurHost.HostAdrs, CurHost.UserName, CurHost.PassWord, CurHost.Account, CurHost.Port, CurHost.FireWall, NO, CurHost.Security, &CancelFlg);
\r
599 TrnCtrlSocket = CmdCtrlSocket;
\r
601 if(CmdCtrlSocket != INVALID_SOCKET)
\r
604 if(CurHost.CurNameKanjiCode == KANJI_AUTO)
\r
606 if(DoDirListCmdSkt("", "", 999, &CancelFlg) == FTP_COMPLETE)
\r
607 CurHost.CurNameKanjiCode = AnalyzeNameKanjiCode(999);
\r
610 strcpy(TitleHostName, CurHost.HostAdrs);
\r
612 SoundPlay(SND_CONNECT);
\r
614 SendInitCommand(CmdCtrlSocket, CurHost.InitCmd, &CancelFlg);
\r
616 DoLocalCWD(CurHost.LocalInitDir);
\r
617 GetLocalDirForWnd();
\r
620 DoCWD(CurHost.RemoteInitDir, YES, YES, YES);
\r
622 GetRemoteDirForWnd(CACHE_NORMAL, &CancelFlg);
\r
625 SoundPlay(SND_ERROR);
\r
630 SetTaskMsg(MSGJPN002);
\r
633 SoundPlay(SND_ERROR);
\r
639 /*----- ホストの初期化コマンドを送る ------------------------------------------
\r
642 * int Cmd : 初期化コマンドス
\r
648 * 初期化コマンドは以下のようなフォーマットであること
\r
650 * cmd1\r\ncmd2\r\n\0
\r
651 *----------------------------------------------------------------------------*/
\r
654 //static int SendInitCommand(char *Cmd)
\r
655 static int SendInitCommand(SOCKET Socket, char *Cmd, int *CancelCheckWork)
\r
657 char Tmp[INITCMD_LEN+1];
\r
660 while(strlen(Cmd) > 0)
\r
663 if((Pos = strchr(Tmp, '\r')) != NULL)
\r
665 if(strlen(Tmp) > 0)
\r
667 DoQUOTE(Socket, Tmp, CancelCheckWork);
\r
669 if((Cmd = strchr(Cmd, '\n')) != NULL)
\r
678 /*----- 指定のホストはFireWallを使う設定かどうかを返す ------------------------
\r
681 * char *Hots : ホスト名
\r
682 * int *Fire : FireWallを使うかどうかを返すワーク
\r
683 * int *Pasv : PASVモードを返すワーク
\r
684 * int *List : LISTコマンドのみ使用フラグ
\r
688 *----------------------------------------------------------------------------*/
\r
690 static void AskUseFireWall(char *Host, int *Fire, int *Pasv, int *List)
\r
695 *Fire = FwallDefault;
\r
696 *Pasv = PasvDefault;
\r
697 // NLSTを送ってしまうバグ修正(ただしNLSTを使うべきホストへクイック接続できなくなる)
\r
701 while(CopyHostFromList(i, &Tmp) == FFFTP_SUCCESS)
\r
703 if(strcmp(Host, Tmp.HostAdrs) == 0)
\r
705 *Fire = Tmp.FireWall;
\r
707 *List = Tmp.ListCmdOnly;
\r
716 /*----- 接続しているホストのアドレスを返す ------------------------------------
\r
723 *----------------------------------------------------------------------------*/
\r
725 char *AskHostAdrs(void)
\r
727 return(CurHost.HostAdrs);
\r
731 /*----- 接続しているホストのポートを返す --------------------------------------
\r
738 *----------------------------------------------------------------------------*/
\r
740 int AskHostPort(void)
\r
742 return(CurHost.Port);
\r
745 /*----- 接続しているホストのファイル名の漢字コードを返す ----------------------
\r
751 * int 漢字コード (KANJI_xxx)
\r
752 *----------------------------------------------------------------------------*/
\r
754 int AskHostNameKanji(void)
\r
757 // if(AskCurrentHost() != HOSTNUM_NOENTRY)
\r
758 // CopyHostFromListInConnect(AskCurrentHost(), &CurHost);
\r
760 // return(CurHost.NameKanjiCode);
\r
761 return(CurHost.CurNameKanjiCode);
\r
765 /*----- 接続しているホストのファイル名の半角カナ変換フラグを返す --------------
\r
771 * int 半角カナを全角に変換するかどうか (YES/NO)
\r
772 *----------------------------------------------------------------------------*/
\r
774 int AskHostNameKana(void)
\r
776 if(AskCurrentHost() != HOSTNUM_NOENTRY)
\r
777 CopyHostFromListInConnect(AskCurrentHost(), &CurHost);
\r
779 return(CurHost.NameKanaCnv);
\r
783 /*----- 接続しているホストのLISTコマンドモードを返す --------------------------
\r
789 * int LISTコマンドモード (YES/NO)
\r
790 *----------------------------------------------------------------------------*/
\r
792 int AskListCmdMode(void)
\r
794 if(CurHost.HostType == HTYPE_VMS)
\r
798 if(AskCurrentHost() != HOSTNUM_NOENTRY)
\r
799 CopyHostFromListInConnect(AskCurrentHost(), &CurHost);
\r
800 return(CurHost.ListCmdOnly);
\r
805 /*----- 接続しているホストでNLST -Rを使うかどうかを返す ------------------------
\r
811 * int NLST -Rを使うかどうか (YES/NO)
\r
812 *----------------------------------------------------------------------------*/
\r
814 int AskUseNLST_R(void)
\r
816 if(AskCurrentHost() != HOSTNUM_NOENTRY)
\r
817 CopyHostFromListInConnect(AskCurrentHost(), &CurHost);
\r
819 return(CurHost.UseNLST_R);
\r
823 /*----- 接続しているホストのChmodコマンドを返す -------------------------------
\r
830 *----------------------------------------------------------------------------*/
\r
832 char *AskHostChmodCmd(void)
\r
834 if(AskCurrentHost() != HOSTNUM_NOENTRY)
\r
835 CopyHostFromListInConnect(AskCurrentHost(), &CurHost);
\r
837 return(CurHost.ChmodCmd);
\r
841 /*----- 接続しているホストのタイムゾーンを返す --------------------------------
\r
848 *----------------------------------------------------------------------------*/
\r
850 int AskHostTimeZone(void)
\r
852 if(AskCurrentHost() != HOSTNUM_NOENTRY)
\r
853 CopyHostFromListInConnect(AskCurrentHost(), &CurHost);
\r
855 return(CurHost.TimeZone);
\r
859 /*----- 接続しているホストのPASVモードを返す ----------------------------------
\r
865 * int PASVモードかどうか (YES/NO)
\r
866 *----------------------------------------------------------------------------*/
\r
868 int AskPasvMode(void)
\r
870 return(CurHost.Pasv);
\r
874 /*----- 接続しているホストのLNSTファイル名を返す ------------------------------
\r
880 * char *ファイル名/オプション
\r
881 *----------------------------------------------------------------------------*/
\r
883 char *AskHostLsName(void)
\r
885 if(AskCurrentHost() != HOSTNUM_NOENTRY)
\r
886 CopyHostFromListInConnect(AskCurrentHost(), &CurHost);
\r
888 return(CurHost.LsName);
\r
892 /*----- 接続しているホストのホストタイプを返す --------------------------------
\r
898 * char *ファイル名/オプション
\r
899 *----------------------------------------------------------------------------*/
\r
901 int AskHostType(void)
\r
903 if(AskCurrentHost() != HOSTNUM_NOENTRY)
\r
904 CopyHostFromListInConnect(AskCurrentHost(), &CurHost);
\r
906 #if defined(HAVE_TANDEM)
\r
907 /* OSS ファイルシステムは UNIX ファイルシステムと同じでいいので AUTO を返す
\r
908 ただし、Guardian ファイルシステムに戻ったときにおかしくならないように
\r
909 CurHost.HostType 変数は更新しない */
\r
910 if(CurHost.HostType == HTYPE_TANDEM && Oss == YES)
\r
911 return(HTYPE_AUTO);
\r
914 return(CurHost.HostType);
\r
918 /*----- 接続しているホストはFireWallを使うホストかどうかを返す ----------------
\r
924 * int FireWallを使うかどうか (YES/NO)
\r
925 *----------------------------------------------------------------------------*/
\r
927 int AskHostFireWall(void)
\r
929 return(CurHost.FireWall);
\r
933 /*----- 接続しているホストでフルパスでファイルアクセスしないかどうかを返す ----
\r
939 * int フルパスでアクセスしない (YES=フルパス禁止/NO)
\r
940 *----------------------------------------------------------------------------*/
\r
942 int AskNoFullPathMode(void)
\r
944 if(CurHost.HostType == HTYPE_VMS)
\r
947 return(CurHost.NoFullPath);
\r
951 /*----- 接続しているユーザ名を返す --------------------------------------------
\r
958 *----------------------------------------------------------------------------*/
\r
960 char *AskHostUserName(void)
\r
962 return(CurHost.UserName);
\r
966 /*----- 現在の設定をホストの設定にセットする ----------------------------------
\r
975 * カレントディレクトリ、ソート方法をホストの設定にセットする
\r
976 *----------------------------------------------------------------------------*/
\r
978 void SaveCurrentSetToHost(void)
\r
981 char LocDir[FMAX_PATH+1];
\r
982 char HostDir[FMAX_PATH+1];
\r
984 if(TrnCtrlSocket != INVALID_SOCKET)
\r
986 if((Host = AskCurrentHost()) != HOSTNUM_NOENTRY)
\r
988 CopyHostFromListInConnect(Host, &CurHost);
\r
989 if(CurHost.LastDir == YES)
\r
991 AskLocalCurDir(LocDir, FMAX_PATH);
\r
992 AskRemoteCurDir(HostDir, FMAX_PATH);
\r
993 SetHostDir(AskCurrentHost(), LocDir, HostDir);
\r
995 SetHostSort(AskCurrentHost(), AskSortType(ITEM_LFILE), AskSortType(ITEM_LDIR), AskSortType(ITEM_RFILE), AskSortType(ITEM_RDIR));
\r
1002 /*----- 現在の設定をヒストリにセットする --------------------------------------
\r
1009 *----------------------------------------------------------------------------*/
\r
1011 static void SaveCurrentSetToHistory(void)
\r
1013 char LocDir[FMAX_PATH+1];
\r
1014 char HostDir[FMAX_PATH+1];
\r
1016 AskLocalCurDir(LocDir, FMAX_PATH);
\r
1017 AskRemoteCurDir(HostDir, FMAX_PATH);
\r
1018 strcpy(CurHost.LocalInitDir, LocDir);
\r
1019 strcpy(CurHost.RemoteInitDir, HostDir);
\r
1021 CurHost.Sort = AskSortType(ITEM_LFILE) * 0x1000000 | AskSortType(ITEM_LDIR) * 0x10000 | AskSortType(ITEM_RFILE) * 0x100 | AskSortType(ITEM_RDIR);
\r
1023 CurHost.KanjiCode = AskHostKanjiCode();
\r
1024 CurHost.KanaCnv = AskHostKanaCnv();
\r
1026 CurHost.SyncMove = AskSyncMoveMode();
\r
1028 AddHostToHistory(&CurHost, AskTransferType());
\r
1029 SetAllHistoryToMenu();
\r
1035 /*----- コマンドコントロールソケットの再接続 ----------------------------------
\r
1042 * FFFTP_SUCCESS/FFFTP_FAIL
\r
1043 *----------------------------------------------------------------------------*/
\r
1045 int ReConnectCmdSkt(void)
\r
1050 if(CmdCtrlSocket != TrnCtrlSocket)
\r
1051 do_closesocket(TrnCtrlSocket);
\r
1052 TrnCtrlSocket = INVALID_SOCKET;
\r
1054 Sts = ReConnectSkt(&CmdCtrlSocket);
\r
1056 TrnCtrlSocket = CmdCtrlSocket;
\r
1062 /*----- 転送コントロールソケットの再接続 --------------------------------------
\r
1069 * FFFTP_SUCCESS/FFFTP_FAIL
\r
1070 *----------------------------------------------------------------------------*/
\r
1072 //int ReConnectTrnSkt(void)
\r
1074 // return(ReConnectSkt(&TrnCtrlSocket));
\r
1077 int ReConnectTrnSkt(SOCKET *Skt, int *CancelCheckWork)
\r
1079 // char Path[FMAX_PATH+1];
\r
1082 HOSTDATA HostData;
\r
1086 SetTaskMsg(MSGJPN003);
\r
1088 // DisableUserOpe();
\r
1090 if(*Skt != INVALID_SOCKET)
\r
1091 do_closesocket(*Skt);
\r
1094 HostData = CurHost;
\r
1095 if(HostData.CryptMode != CRYPT_NONE)
\r
1096 HostData.UseNoEncryption = NO;
\r
1097 if(HostData.CryptMode != CRYPT_FTPES)
\r
1098 HostData.UseFTPES = NO;
\r
1099 if(HostData.CryptMode != CRYPT_FTPIS)
\r
1100 HostData.UseFTPIS = NO;
\r
1101 if(HostData.CryptMode != CRYPT_SFTP)
\r
1102 HostData.UseSFTP = NO;
\r
1104 HostData.CurNameKanjiCode = HostData.NameKanjiCode;
\r
1106 HostData.CurNetType = HostData.NetType;
\r
1108 HostData.NoDisplayUI = YES;
\r
1111 // if((*Skt = DoConnect(CurHost.HostAdrs, CurHost.UserName, CurHost.PassWord, CurHost.Account, CurHost.Port, CurHost.FireWall, NO, CurHost.Security)) != INVALID_SOCKET)
\r
1112 if((*Skt = DoConnect(&HostData, CurHost.HostAdrs, CurHost.UserName, CurHost.PassWord, CurHost.Account, CurHost.Port, CurHost.FireWall, NO, CurHost.Security, CancelCheckWork)) != INVALID_SOCKET)
\r
1114 SendInitCommand(*Skt, CurHost.InitCmd, CancelCheckWork);
\r
1115 // AskRemoteCurDir(Path, FMAX_PATH);
\r
1116 // DoCWD(Path, YES, YES, YES);
\r
1117 Sts = FFFTP_SUCCESS;
\r
1120 SoundPlay(SND_ERROR);
\r
1122 // EnableUserOpe();
\r
1127 /*----- 回線の再接続 ----------------------------------------------------------
\r
1130 * SOCKET *Skt : 接続したソケットを返すワーク
\r
1134 * FFFTP_SUCCESS/FFFTP_FAIL
\r
1135 *----------------------------------------------------------------------------*/
\r
1137 static int ReConnectSkt(SOCKET *Skt)
\r
1139 char Path[FMAX_PATH+1];
\r
1144 SetTaskMsg(MSGJPN003);
\r
1148 if(*Skt != INVALID_SOCKET)
\r
1149 do_closesocket(*Skt);
\r
1153 // if((*Skt = DoConnect(CurHost.HostAdrs, CurHost.UserName, CurHost.PassWord, CurHost.Account, CurHost.Port, CurHost.FireWall, NO, CurHost.Security)) != INVALID_SOCKET)
\r
1154 if((*Skt = DoConnect(&CurHost, CurHost.HostAdrs, CurHost.UserName, CurHost.PassWord, CurHost.Account, CurHost.Port, CurHost.FireWall, NO, CurHost.Security, &CancelFlg)) != INVALID_SOCKET)
\r
1156 SendInitCommand(*Skt, CurHost.InitCmd, &CancelFlg);
\r
1157 AskRemoteCurDir(Path, FMAX_PATH);
\r
1158 DoCWD(Path, YES, YES, YES);
\r
1159 Sts = FFFTP_SUCCESS;
\r
1162 SoundPlay(SND_ERROR);
\r
1169 /*----- コマンドコントロールソケットを返す ------------------------------------
\r
1175 * SOCKET コマンドコントロールソケット
\r
1176 *----------------------------------------------------------------------------*/
\r
1178 SOCKET AskCmdCtrlSkt(void)
\r
1180 return(CmdCtrlSocket);
\r
1184 /*----- 転送コントロールソケットを返す ----------------------------------------
\r
1190 * SOCKET 転送コントロールソケット
\r
1191 *----------------------------------------------------------------------------*/
\r
1193 SOCKET AskTrnCtrlSkt(void)
\r
1195 return(TrnCtrlSocket);
\r
1199 /*----- コマンド/転送コントロールソケットの共有を解除 ------------------------
\r
1206 *----------------------------------------------------------------------------*/
\r
1208 void SktShareProh(void)
\r
1210 if(CmdCtrlSocket == TrnCtrlSocket)
\r
1213 //SetTaskMsg("############### SktShareProh");
\r
1216 // CmdCtrlSocket = INVALID_SOCKET;
\r
1217 // ReConnectSkt(&CmdCtrlSocket);
\r
1218 if(CurHost.ReuseCmdSkt == YES)
\r
1220 CmdCtrlSocket = INVALID_SOCKET;
\r
1221 ReConnectSkt(&CmdCtrlSocket);
\r
1228 /*----- コマンド/転送コントロールソケットの共有が解除されているかチェック ----
\r
1236 *----------------------------------------------------------------------------*/
\r
1238 int AskShareProh(void)
\r
1244 // if(CmdCtrlSocket == TrnCtrlSocket)
\r
1245 if(CmdCtrlSocket == TrnCtrlSocket || TrnCtrlSocket == INVALID_SOCKET)
\r
1252 /*----- ホストから切断 --------------------------------------------------------
\r
1259 *----------------------------------------------------------------------------*/
\r
1261 void DisconnectProc(void)
\r
1264 //SetTaskMsg("############### Disconnect Cmd=%x, Trn=%x", CmdCtrlSocket,TrnCtrlSocket);
\r
1266 if((CmdCtrlSocket != INVALID_SOCKET) && (CmdCtrlSocket != TrnCtrlSocket))
\r
1269 // DoQUIT(CmdCtrlSocket);
\r
1270 DoQUIT(CmdCtrlSocket, &CancelFlg);
\r
1271 DoClose(CmdCtrlSocket);
\r
1274 if(TrnCtrlSocket != INVALID_SOCKET)
\r
1277 // DoQUIT(TrnCtrlSocket);
\r
1278 DoQUIT(TrnCtrlSocket, &CancelFlg);
\r
1279 DoClose(TrnCtrlSocket);
\r
1281 SaveCurrentSetToHistory();
\r
1283 EraseRemoteDirForWnd();
\r
1284 SetTaskMsg(MSGJPN004);
\r
1287 TrnCtrlSocket = INVALID_SOCKET;
\r
1288 CmdCtrlSocket = INVALID_SOCKET;
\r
1290 DispWindowTitle();
\r
1291 MakeButtonsFocus();
\r
1298 /*----- ソケットが強制切断されたときの処理 ------------------------------------
\r
1305 *----------------------------------------------------------------------------*/
\r
1307 void DisconnectSet(void)
\r
1309 CmdCtrlSocket = INVALID_SOCKET;
\r
1310 TrnCtrlSocket = INVALID_SOCKET;
\r
1312 EraseRemoteDirForWnd();
\r
1313 DispWindowTitle();
\r
1314 MakeButtonsFocus();
\r
1315 SetTaskMsg(MSGJPN005);
\r
1320 /*----- ホストに接続中かどうかを返す ------------------------------------------
\r
1326 * int ステータス (YES/NO)
\r
1327 *----------------------------------------------------------------------------*/
\r
1329 int AskConnecting(void)
\r
1334 if(TrnCtrlSocket != INVALID_SOCKET)
\r
1341 #if defined(HAVE_TANDEM)
\r
1342 /*----- 接続している本当のホストのホストタイプを返す --------------------------
\r
1348 * char *ファイル名/オプション
\r
1349 *----------------------------------------------------------------------------*/
\r
1351 int AskRealHostType(void)
\r
1353 if(AskCurrentHost() != HOSTNUM_NOENTRY)
\r
1354 CopyHostFromListInConnect(AskCurrentHost(), &CurHost);
\r
1356 return(CurHost.HostType);
\r
1359 /*----- OSS ファイルシステムにアクセスしているかどうかのフラグを変更する ------
\r
1362 * int ステータス (YES/NO)
\r
1365 * int ステータス (YES/NO)
\r
1366 *----------------------------------------------------------------------------*/
\r
1368 int SetOSS(int wkOss)
\r
1370 if(Oss != wkOss) {
\r
1371 if (wkOss == YES) {
\r
1372 strcpy(CurHost.InitCmd, "OSS");
\r
1374 strcpy(CurHost.InitCmd, "GUARDIAN");
\r
1381 /*----- OSS ファイルシステムにアクセスしているかどうかを返す ------------------
\r
1387 * int ステータス (YES/NO)
\r
1388 *----------------------------------------------------------------------------*/
\r
1394 #endif /* HAVE_TANDEM */
\r
1397 /*----- ホストへ接続する ------------------------------------------------------
\r
1400 * char *Host : ホスト名
\r
1401 * char *User : ユーザ名
\r
1402 * char *Pass : パスワード
\r
1403 * char *Acct : アカウント
\r
1405 * int Fwall : FireWallを使うかどうか (YES/NO)
\r
1406 * int SavePass : パスワードを再入力した時に保存するかどうか (YES/NO)
\r
1407 * int Security : セキュリティ (SECURITY_xxx, MDx)
\r
1413 * ホスト名、ユーザ名、パスワードが指定されていなかったときは、接続に使用
\r
1415 * char *Host : ホスト名
\r
1416 * char *User : ユーザ名
\r
1417 * char *Pass : パスワード
\r
1418 * char *Acct : アカウント
\r
1420 * FireWallは次のように動作する
\r
1421 * TYPE1 Connect fire → USER user(f) → PASS pass(f) → SITE host → USER user(h) → PASS pass(h) → ACCT acct
\r
1422 * TYPE2 Connect fire → USER user(f) → PASS pass(f) → USER user(h)@host → PASS pass(h) → ACCT acct
\r
1423 * TYPE3 Connect fire → USER user(h)@host → PASS pass(h) → ACCT acct
\r
1424 * TYPE4 Connect fire → OPEN host → USER user(h) → PASS pass(h) → ACCT acct
\r
1426 * none Connect host → USER user(h) → PASS pass(h) → ACCT acct
\r
1427 *----------------------------------------------------------------------------*/
\r
1430 static SOCKET DoConnectCrypt(int CryptMode, HOSTDATA* HostData, char *Host, char *User, char *Pass, char *Acct, int Port, int Fwall, int SavePass, int Security, int *CancelCheckWork)
\r
1442 static const char *SiteTbl[4] = { "SITE", "site", "OPEN", "open" };
\r
1443 char TmpBuf[ONELINE_BUF_SIZE];
\r
1444 struct linger LingerOpt;
\r
1447 ContSock = INVALID_SOCKET;
\r
1449 if(CryptMode == CRYPT_NONE || CryptMode == CRYPT_FTPES || CryptMode == CRYPT_FTPIS)
\r
1452 Fwall = FwallType;
\r
1454 Fwall = FWALL_NONE;
\r
1458 // CancelFlg = NO;
\r
1460 // WSASetBlockingHook(BlkHookFnc);
\r
1463 ContSock = INVALID_SOCKET;
\r
1467 if(((Fwall >= FWALL_FU_FP_SITE) && (Fwall <= FWALL_OPEN)) ||
\r
1468 (Fwall == FWALL_SIDEWINDER) ||
\r
1469 (Fwall == FWALL_FU_FP))
\r
1475 if(strlen(Tmp) != 0)
\r
1478 // if((ContSock = connectsock(Tmp, Port, "", &CancelFlg)) != INVALID_SOCKET)
\r
1479 if((ContSock = connectsock(Tmp, Port, "", CancelCheckWork)) != INVALID_SOCKET)
\r
1482 #ifdef DISABLE_CONTROL_NETWORK_BUFFERS
\r
1483 int BufferSize = 0;
\r
1484 setsockopt(ContSock, SOL_SOCKET, SO_SNDBUF, (char*)&BufferSize, sizeof(int));
\r
1485 setsockopt(ContSock, SOL_SOCKET, SO_RCVBUF, (char*)&BufferSize, sizeof(int));
\r
1488 // while((Sts = ReadReplyMessage(ContSock, Buf, 1024, &CancelFlg, TmpBuf) / 100) == FTP_PRELIM)
\r
1490 if(CryptMode == CRYPT_FTPIS)
\r
1492 if(AttachSSL(ContSock, INVALID_SOCKET, CancelCheckWork))
\r
1494 while((Sts = ReadReplyMessage(ContSock, Buf, 1024, CancelCheckWork, TmpBuf) / 100) == FTP_PRELIM)
\r
1502 while((Sts = ReadReplyMessage(ContSock, Buf, 1024, CancelCheckWork, TmpBuf) / 100) == FTP_PRELIM)
\r
1506 if(Sts == FTP_COMPLETE)
\r
1509 if(setsockopt(ContSock, SOL_SOCKET, SO_OOBINLINE, (LPSTR)&Flg, sizeof(Flg)) == SOCKET_ERROR)
\r
1510 ReportWSError("setsockopt", WSAGetLastError());
\r
1511 // データ転送用ソケットのTCP遅延転送が無効されているので念のため
\r
1512 if(setsockopt(ContSock, IPPROTO_TCP, TCP_NODELAY, (LPSTR)&Flg, sizeof(Flg)) == SOCKET_ERROR)
\r
1513 ReportWSError("setsockopt", WSAGetLastError());
\r
1516 if(setsockopt(ContSock, SOL_SOCKET, SO_KEEPALIVE, (LPSTR)&Flg, sizeof(Flg)) == SOCKET_ERROR)
\r
1517 ReportWSError("setsockopt", WSAGetLastError());
\r
1518 LingerOpt.l_onoff = 1;
\r
1519 LingerOpt.l_linger = 90;
\r
1520 if(setsockopt(ContSock, SOL_SOCKET, SO_LINGER, (LPSTR)&LingerOpt, sizeof(LingerOpt)) == SOCKET_ERROR)
\r
1521 ReportWSError("setsockopt", WSAGetLastError());
\r
1525 /*===== 認証を行なう =====*/
\r
1527 Sts = FTP_COMPLETE;
\r
1528 if((Fwall == FWALL_FU_FP_SITE) ||
\r
1529 (Fwall == FWALL_FU_FP_USER) ||
\r
1530 (Fwall == FWALL_FU_FP))
\r
1533 // if((Sts = command(ContSock, Reply, &CancelFlg, "USER %s", FwallUser) / 100) == FTP_CONTINUE)
\r
1534 if((Sts = command(ContSock, Reply, CancelCheckWork, "USER %s", FwallUser) / 100) == FTP_CONTINUE)
\r
1536 CheckOneTimePassword(FwallPass, Reply, FwallSecurity);
\r
1538 // Sts = command(ContSock, NULL, &CancelFlg, "PASS %s", Reply) / 100;
\r
1539 Sts = command(ContSock, NULL, CancelCheckWork, "PASS %s", Reply) / 100;
\r
1542 else if(Fwall == FWALL_SIDEWINDER)
\r
1545 // Sts = command(ContSock, Reply, &CancelFlg, "USER %s:%s%c%s", FwallUser, FwallPass, FwallDelimiter, Host) / 100;
\r
1546 Sts = command(ContSock, Reply, CancelCheckWork, "USER %s:%s%c%s", FwallUser, FwallPass, FwallDelimiter, Host) / 100;
\r
1548 if((Sts != FTP_COMPLETE) && (Sts != FTP_CONTINUE))
\r
1550 SetTaskMsg(MSGJPN006);
\r
1551 DoClose(ContSock);
\r
1552 ContSock = INVALID_SOCKET;
\r
1556 if((Fwall == FWALL_FU_FP_SITE) || (Fwall == FWALL_OPEN))
\r
1559 if(Fwall == FWALL_OPEN)
\r
1561 if(FwallLower == YES)
\r
1564 if(HostPort == PORT_NOR)
\r
1566 // Sts = command(ContSock, NULL, &CancelFlg, "%s %s", SiteTbl[Flg], Host) / 100;
\r
1567 Sts = command(ContSock, NULL, CancelCheckWork, "%s %s", SiteTbl[Flg], Host) / 100;
\r
1570 // Sts = command(ContSock, NULL, &CancelFlg, "%s %s %d", SiteTbl[Flg], Host, HostPort) / 100;
\r
1571 Sts = command(ContSock, NULL, CancelCheckWork, "%s %s %d", SiteTbl[Flg], Host, HostPort) / 100;
\r
1574 if((Sts != FTP_COMPLETE) && (Sts != FTP_CONTINUE))
\r
1576 SetTaskMsg(MSGJPN007, Host);
\r
1577 DoClose(ContSock);
\r
1578 ContSock = INVALID_SOCKET;
\r
1584 // if((strlen(User) != 0) ||
\r
1585 // (InputDialogBox(username_dlg, GetMainHwnd(), NULL, User, USER_NAME_LEN+1, &Anony, IDH_HELP_TOPIC_0000001) == YES))
\r
1586 if((strlen(User) != 0) ||
\r
1587 ((HostData->NoDisplayUI == NO) && (InputDialogBox(username_dlg, GetMainHwnd(), NULL, User, USER_NAME_LEN+1, &Anony, IDH_HELP_TOPIC_0000001) == YES)))
\r
1591 strcpy(User, "anonymous");
\r
1592 strcpy(Pass, UserMailAdrs);
\r
1595 if((Fwall == FWALL_FU_FP_USER) || (Fwall == FWALL_USER))
\r
1597 if(HostPort == PORT_NOR)
\r
1598 sprintf(Buf, "%s%c%s", User, FwallDelimiter, Host);
\r
1600 sprintf(Buf, "%s%c%s %d", User, FwallDelimiter, Host, HostPort);
\r
1603 strcpy(Buf, User);
\r
1606 if(CryptMode == CRYPT_FTPES)
\r
1608 if(IsOpenSSLLoaded() && (Sts = command(ContSock, Reply, CancelCheckWork, "AUTH TLS")) == 234)
\r
1610 if(AttachSSL(ContSock, INVALID_SOCKET, CancelCheckWork))
\r
1612 if((Sts = command(ContSock, Reply, CancelCheckWork, "PBSZ 0")) == 200)
\r
1614 if((Sts = command(ContSock, Reply, CancelCheckWork, "PROT P")) == 200)
\r
1631 // "PBSZ 0"と"PROT P"は黙示的に設定されているはずだが念のため
\r
1632 if(CryptMode == CRYPT_FTPIS)
\r
1634 if((Sts = command(ContSock, Reply, CancelCheckWork, "PBSZ 0")) == 200)
\r
1636 if((Sts = command(ContSock, Reply, CancelCheckWork, "PROT P")) == 200)
\r
1646 if(Sts == FTP_ERROR)
\r
1650 // if((Sts = command(ContSock, Reply, &CancelFlg, "USER %s", Buf) / 100) == FTP_CONTINUE)
\r
1651 if((Sts = command(ContSock, Reply, CancelCheckWork, "USER %s", Buf) / 100) == FTP_CONTINUE)
\r
1654 // if((strlen(Pass) != 0) ||
\r
1655 // (InputDialogBox(passwd_dlg, GetMainHwnd(), NULL, Pass, PASSWORD_LEN+1, &Anony, IDH_HELP_TOPIC_0000001) == YES))
\r
1656 if((strlen(Pass) != 0) ||
\r
1657 ((HostData->NoDisplayUI == NO) && (InputDialogBox(passwd_dlg, GetMainHwnd(), NULL, Pass, PASSWORD_LEN+1, &Anony, IDH_HELP_TOPIC_0000001) == YES)))
\r
1659 CheckOneTimePassword(Pass, Reply, Security);
\r
1661 /* パスワードがスペース1個の時はパスワードの実体なしとする */
\r
1662 if(strcmp(Reply, " ") == 0)
\r
1663 strcpy(Reply, "");
\r
1666 // Sts = command(ContSock, NULL, &CancelFlg, "PASS %s", Reply) / 100;
\r
1667 Sts = command(ContSock, NULL, CancelCheckWork, "PASS %s", Reply) / 100;
\r
1668 if(Sts == FTP_ERROR)
\r
1672 // if(InputDialogBox(re_passwd_dlg, GetMainHwnd(), NULL, Pass, PASSWORD_LEN+1, &Anony, IDH_HELP_TOPIC_0000001) == YES)
\r
1673 if(HostData->NoDisplayUI == NO && InputDialogBox(re_passwd_dlg, GetMainHwnd(), NULL, Pass, PASSWORD_LEN+1, &Anony, IDH_HELP_TOPIC_0000001) == YES)
\r
1676 DoPrintf("No password specified.");
\r
1679 else if(Sts == FTP_CONTINUE)
\r
1682 // if((strlen(Acct) != 0) ||
\r
1683 // (InputDialogBox(account_dlg, GetMainHwnd(), NULL, Acct, ACCOUNT_LEN+1, &Anony, IDH_HELP_TOPIC_0000001) == YES))
\r
1684 if((strlen(Acct) != 0) ||
\r
1685 ((HostData->NoDisplayUI == NO) && (InputDialogBox(account_dlg, GetMainHwnd(), NULL, Acct, ACCOUNT_LEN+1, &Anony, IDH_HELP_TOPIC_0000001) == YES)))
\r
1688 // Sts = command(ContSock, NULL, &CancelFlg, "ACCT %s", Acct) / 100;
\r
1689 Sts = command(ContSock, NULL, CancelCheckWork, "ACCT %s", Acct) / 100;
\r
1692 DoPrintf("No account specified");
\r
1698 DoPrintf("No password specified.");
\r
1702 if(Continue == YES)
\r
1703 Sts = FTP_COMPLETE;
\r
1705 while(Continue == YES);
\r
1710 DoPrintf("No user name specified");
\r
1713 if(Sts != FTP_COMPLETE)
\r
1715 SetTaskMsg(MSGJPN008, Host);
\r
1716 DoClose(ContSock);
\r
1717 ContSock = INVALID_SOCKET;
\r
1719 else if((SavePass == YES) && (ReInPass == YES))
\r
1722 // if(DialogBox(GetFtpInst(), MAKEINTRESOURCE(savepass_dlg), GetMainHwnd(), ExeEscDialogProc) == YES)
\r
1723 if(HostData->NoDisplayUI == NO && DialogBox(GetFtpInst(), MAKEINTRESOURCE(savepass_dlg), GetMainHwnd(), ExeEscDialogProc) == YES)
\r
1724 SetHostPassword(AskCurrentHost(), Pass);
\r
1732 SetTaskMsg(MSGJPN009/*"接続できません(1) %x", ContSock*/);
\r
1733 DoClose(ContSock);
\r
1734 ContSock = INVALID_SOCKET;
\r
1741 if(((Fwall >= FWALL_FU_FP_SITE) && (Fwall <= FWALL_OPEN)) ||
\r
1742 (Fwall == FWALL_FU_FP))
\r
1743 SetTaskMsg(MSGJPN010);
\r
1745 SetTaskMsg(MSGJPN011);
\r
1749 // WSAUnhookBlockingHook();
\r
1755 if(ContSock != INVALID_SOCKET)
\r
1757 if((Sts = command(ContSock, Reply, CancelCheckWork, "FEAT")) == 211)
\r
1759 // 改行文字はReadReplyMessageで消去されるため区切り文字に空白を使用
\r
1761 if(strstr(Reply, " UTF8 "))
\r
1762 HostData->Feature |= FEATURE_UTF8;
\r
1764 if(strstr(Reply, " MLST ") || strstr(Reply, " MLSD "))
\r
1765 HostData->Feature |= FEATURE_MLSD;
\r
1767 if(strstr(Reply, " EPRT ") || strstr(Reply, " EPSV "))
\r
1768 HostData->Feature |= FEATURE_EPRT | FEATURE_EPSV;
\r
1771 if(HostData->CurNameKanjiCode == KANJI_AUTO && (HostData->Feature & FEATURE_UTF8))
\r
1773 if((Sts = command(ContSock, Reply, CancelCheckWork, "OPTS UTF8 ON")) == 200)
\r
1774 HostData->CurNameKanjiCode = KANJI_UTF8N;
\r
1778 else if(CryptMode == CRYPT_SFTP)
\r
1783 #define strrcmp(_Str1, _Str2) (strcmp(strstr(_Str1, _Str2) ? strstr(_Str1, _Str2) : "", _Str2))
\r
1785 ContSock = SFTP_socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
\r
1786 SFTP_SetTimeoutCallback(ContSock, SSLTimeoutCallback);
\r
1789 r = SFTP_recv(ContSock, Reply, 1024, 0);
\r
1790 if(r == SOCKET_ERROR)
\r
1795 SetTaskMsg("%s", Reply);
\r
1796 if(strrcmp(Reply, "psftp> ") == 0)
\r
1799 r = SFTP_send(ContSock, "open \"", strlen("open \""), 0);
\r
1800 r = SFTP_send(ContSock, Host, strlen(Host), 0);
\r
1801 r = SFTP_send(ContSock, "\"\r\n", strlen("\"\r\n"), 0);
\r
1804 r = SFTP_recv(ContSock, Reply, 1024, 0);
\r
1805 if(r == SOCKET_ERROR)
\r
1810 SetTaskMsg("%s", Reply);
\r
1811 if(strrcmp(Reply, "Store key in cache? (y/n) ") == 0)
\r
1813 r = SFTP_send(ContSock, "n\r\n", strlen("n\r\n"), 0);
\r
1815 if(strrcmp(Reply, "Update cached key? (y/n, Return cancels connection) ") == 0)
\r
1817 r = SFTP_send(ContSock, "\r\n", strlen("\r\n"), 0);
\r
1819 if(strrcmp(Reply, "login as: ") == 0)
\r
1821 r = SFTP_send(ContSock, User, strlen(User), 0);
\r
1822 r = SFTP_send(ContSock, "\r\n", strlen("\r\n"), 0);
\r
1824 if(strrcmp(Reply, "password: ") == 0)
\r
1826 r = SFTP_send(ContSock, Pass, strlen(Pass), 0);
\r
1827 r = SFTP_send(ContSock, "\r\n", strlen("\r\n"), 0);
\r
1829 if(strrcmp(Reply, "psftp> ") == 0)
\r
1833 SFTP_closesocket(ContSock);
\r
1834 ContSock = INVALID_SOCKET;
\r
1841 //static SOCKET DoConnect(HOSTDATA* HostData, char *Host, char *User, char *Pass, char *Acct, int Port, int Fwall, int SavePass, int Security)
\r
1842 static SOCKET DoConnect(HOSTDATA* HostData, char *Host, char *User, char *Pass, char *Acct, int Port, int Fwall, int SavePass, int Security, int *CancelCheckWork)
\r
1845 ContSock = INVALID_SOCKET;
\r
1846 *CancelCheckWork = NO;
\r
1847 if(*CancelCheckWork == NO && ContSock == INVALID_SOCKET && HostData->UseSFTP == YES)
\r
1849 SetTaskMsg(MSGJPN317);
\r
1850 if((ContSock = DoConnectCrypt(CRYPT_SFTP, HostData, Host, User, Pass, Acct, Port, Fwall, SavePass, Security, CancelCheckWork)) != INVALID_SOCKET)
\r
1851 HostData->CryptMode = CRYPT_SFTP;
\r
1853 if(*CancelCheckWork == NO && ContSock == INVALID_SOCKET && HostData->UseFTPIS == YES)
\r
1855 SetTaskMsg(MSGJPN316);
\r
1856 if((ContSock = DoConnectCrypt(CRYPT_FTPIS, HostData, Host, User, Pass, Acct, Port, Fwall, SavePass, Security, CancelCheckWork)) != INVALID_SOCKET)
\r
1857 HostData->CryptMode = CRYPT_FTPIS;
\r
1859 if(*CancelCheckWork == NO && ContSock == INVALID_SOCKET && HostData->UseFTPES == YES)
\r
1861 SetTaskMsg(MSGJPN315);
\r
1862 if((ContSock = DoConnectCrypt(CRYPT_FTPES, HostData, Host, User, Pass, Acct, Port, Fwall, SavePass, Security, CancelCheckWork)) != INVALID_SOCKET)
\r
1863 HostData->CryptMode = CRYPT_FTPES;
\r
1865 if(*CancelCheckWork == NO && ContSock == INVALID_SOCKET && HostData->UseNoEncryption == YES)
\r
1867 SetTaskMsg(MSGJPN314);
\r
1868 if((ContSock = DoConnectCrypt(CRYPT_NONE, HostData, Host, User, Pass, Acct, Port, Fwall, SavePass, Security, CancelCheckWork)) != INVALID_SOCKET)
\r
1869 HostData->CryptMode = CRYPT_NONE;
\r
1875 /*----- ワンタイムパスワードのチェック ----------------------------------------
\r
1878 * chat *Pass : パスワード/パスフレーズ
\r
1879 * char *Reply : USERコマンドを送ったあとのリプライ文字列
\r
1880 * /PASSコマンドで送るパスワードを返すバッファ
\r
1881 * int Type : タイプ (SECURITY_xxx, MDx)
\r
1885 * FFFTP_SUCCESS/FFFTP_FAIL
\r
1888 * ワンタイムパスワードでない時はPassをそのままReplyにコピー
\r
1889 *----------------------------------------------------------------------------*/
\r
1891 static int CheckOneTimePassword(char *Pass, char *Reply, int Type)
\r
1896 char Seed[MAX_SEED_LEN+1];
\r
1899 Sts = FFFTP_SUCCESS;
\r
1902 if(Type == SECURITY_AUTO)
\r
1904 if((Pos = stristr(Reply, "otp-md5")) != NULL)
\r
1907 SetTaskMsg(MSGJPN012);
\r
1909 else if((Pos = stristr(Reply, "otp-sha1")) != NULL)
\r
1912 SetTaskMsg(MSGJPN013);
\r
1914 else if(((Pos = stristr(Reply, "otp-md4")) != NULL) || ((Pos = stristr(Reply, "s/key")) != NULL))
\r
1917 SetTaskMsg(MSGJPN014);
\r
1921 Pos = GetNextField(Reply);
\r
1923 if((Type == MD4) || (Type == MD5) || (Type == SHA1))
\r
1925 /* シーケンス番号を見つけるループ */
\r
1926 DoPrintf("Analize OTP");
\r
1927 DoPrintf("%s", Pos);
\r
1929 while((Pos = GetNextField(Pos)) != NULL)
\r
1934 DoPrintf("Sequence=%d", Seq);
\r
1937 if((Pos = GetNextField(Pos)) != NULL)
\r
1939 if(GetOneField(Pos, Seed, MAX_SEED_LEN) == FFFTP_SUCCESS)
\r
1941 /* Seedは英数字のみ有効とする */
\r
1942 for(i = strlen(Seed)-1; i >= 0; i--)
\r
1944 if((IsAlpha(Seed[i]) == 0) && (IsDigit(Seed[i]) == 0))
\r
1947 if(strlen(Seed) > 0)
\r
1949 DoPrintf("Seed=%s", Seed);
\r
1950 Make6WordPass(Seq, Seed, Pass, Type, Reply);
\r
1951 DoPrintf("Response=%s", Reply);
\r
1953 /* シーケンス番号のチェックと警告 */
\r
1955 DialogBox(GetFtpInst(), MAKEINTRESOURCE(otp_notify_dlg), GetMainHwnd(), ExeEscDialogProc);
\r
1957 Sts = FFFTP_SUCCESS;
\r
1965 if(Sts == FFFTP_FAIL)
\r
1966 SetTaskMsg(MSGJPN015);
\r
1970 strcpy(Reply, Pass);
\r
1971 DoPrintf("No OTP used.");
\r
1989 /*----- ソケットを接続する ----------------------------------------------------
\r
1992 * char *host : ホスト名
\r
1993 * int port : ポート番号
\r
1994 * char *PreMsg : メッセージの前半部分
\r
1998 *----------------------------------------------------------------------------*/
\r
2001 typedef SOCKET (__cdecl* LPCONNECTSOCK)(char*, int, char*, int*);
\r
2010 int CancelCheckWork;
\r
2013 } CONNECTSOCKDATA;
\r
2015 DWORD WINAPI connectsockThreadProc(LPVOID lpParameter)
\r
2017 CONNECTSOCKDATA* pData;
\r
2018 pData = (CONNECTSOCKDATA*)lpParameter;
\r
2019 pData->s = pData->f(pData->host, pData->port, pData->PreMsg, &pData->CancelCheckWork);
\r
2024 SOCKET connectsock(char *host, int port, char *PreMsg, int *CancelCheckWork)
\r
2027 CONNECTSOCKDATA DataIPv4;
\r
2028 CONNECTSOCKDATA DataIPv6;
\r
2029 Result = INVALID_SOCKET;
\r
2030 switch(CurHost.CurNetType)
\r
2033 // if((Result = connectsockIPv4(host, port, PreMsg, CancelCheckWork)) != INVALID_SOCKET)
\r
2034 // CurHost.CurNetType = NTYPE_IPV4;
\r
2035 // else if((Result = connectsockIPv6(host, port, PreMsg, CancelCheckWork)) != INVALID_SOCKET)
\r
2036 // CurHost.CurNetType = NTYPE_IPV6;
\r
2037 DataIPv4.host = host;
\r
2038 DataIPv4.port = port;
\r
2039 DataIPv4.PreMsg = PreMsg;
\r
2040 DataIPv4.CancelCheckWork = *CancelCheckWork;
\r
2041 DataIPv4.f = connectsockIPv4;
\r
2042 DataIPv4.h = CreateThread(NULL, 0, connectsockThreadProc, &DataIPv4, 0, NULL);
\r
2043 DataIPv6.host = host;
\r
2044 DataIPv6.port = port;
\r
2045 DataIPv6.PreMsg = PreMsg;
\r
2046 DataIPv6.CancelCheckWork = *CancelCheckWork;
\r
2047 DataIPv6.f = connectsockIPv6;
\r
2048 DataIPv6.h = CreateThread(NULL, 0, connectsockThreadProc, &DataIPv6, 0, NULL);
\r
2051 if(GetExitCodeThread(DataIPv4.h, &DataIPv4.ExitCode))
\r
2053 if(DataIPv4.ExitCode != STILL_ACTIVE)
\r
2055 if(DataIPv4.s != INVALID_SOCKET)
\r
2057 Result = DataIPv4.s;
\r
2058 CurHost.CurNetType = NTYPE_IPV4;
\r
2063 if(GetExitCodeThread(DataIPv6.h, &DataIPv6.ExitCode))
\r
2065 if(DataIPv6.ExitCode != STILL_ACTIVE)
\r
2067 if(DataIPv6.s != INVALID_SOCKET)
\r
2069 Result = DataIPv6.s;
\r
2070 CurHost.CurNetType = NTYPE_IPV6;
\r
2075 if(GetExitCodeThread(DataIPv4.h, &DataIPv4.ExitCode) && GetExitCodeThread(DataIPv6.h, &DataIPv6.ExitCode))
\r
2077 if(DataIPv4.ExitCode != STILL_ACTIVE && DataIPv6.ExitCode != STILL_ACTIVE)
\r
2079 if(DataIPv4.s == INVALID_SOCKET && DataIPv6.s == INVALID_SOCKET)
\r
2083 DataIPv4.CancelCheckWork = *CancelCheckWork;
\r
2084 DataIPv6.CancelCheckWork = *CancelCheckWork;
\r
2085 BackgrndMessageProc();
\r
2090 if(GetExitCodeThread(DataIPv4.h, &DataIPv4.ExitCode) && GetExitCodeThread(DataIPv6.h, &DataIPv6.ExitCode))
\r
2092 if(DataIPv4.ExitCode != STILL_ACTIVE && DataIPv6.ExitCode != STILL_ACTIVE)
\r
2094 CloseHandle(DataIPv4.h);
\r
2095 CloseHandle(DataIPv6.h);
\r
2099 DataIPv4.CancelCheckWork = YES;
\r
2100 DataIPv6.CancelCheckWork = YES;
\r
2101 BackgrndMessageProc();
\r
2106 Result = connectsockIPv4(host, port, PreMsg, CancelCheckWork);
\r
2107 CurHost.CurNetType = NTYPE_IPV4;
\r
2110 Result = connectsockIPv6(host, port, PreMsg, CancelCheckWork);
\r
2111 CurHost.CurNetType = NTYPE_IPV6;
\r
2119 //SOCKET connectsock(char *host, int port, char *PreMsg, int *CancelCheckWork)
\r
2120 SOCKET connectsockIPv4(char *host, int port, char *PreMsg, int *CancelCheckWork)
\r
2122 struct sockaddr_in saSockAddr;
\r
2123 char HostEntry[MAXGETHOSTSTRUCT];
\r
2124 struct hostent *pHostEntry;
\r
2128 SOCKS4CMD Socks4Cmd;
\r
2129 SOCKS4REPLY Socks4Reply;
\r
2130 SOCKS5REQUEST Socks5Cmd;
\r
2131 SOCKS5REPLY Socks5Reply;
\r
2133 //////////////////////////////
\r
2135 //////////////////////////////
\r
2137 Fwall = FWALL_NONE;
\r
2138 if(AskHostFireWall() == YES)
\r
2139 Fwall = FwallType;
\r
2141 sSocket = INVALID_SOCKET;
\r
2144 strcpy(DomainName, host);
\r
2146 // memset(&CurSockAddr, 0, sizeof(CurSockAddr));
\r
2147 // CurSockAddr.sin_port = htons((u_short)port);
\r
2148 // CurSockAddr.sin_family = AF_INET;
\r
2149 // if((CurSockAddr.sin_addr.s_addr = inet_addr(host)) == INADDR_NONE)
\r
2150 memset(&CurSockAddrIPv4, 0, sizeof(CurSockAddrIPv4));
\r
2151 CurSockAddrIPv4.sin_port = htons((u_short)port);
\r
2152 CurSockAddrIPv4.sin_family = AF_INET;
\r
2153 if((CurSockAddrIPv4.sin_addr.s_addr = inet_addr(host)) == INADDR_NONE)
\r
2157 if(((Fwall == FWALL_SOCKS5_NOAUTH) || (Fwall == FWALL_SOCKS5_USER)) &&
\r
2158 (FwallResolv == YES))
\r
2160 // ホスト名解決はSOCKSサーバに任せる
\r
2161 pHostEntry = NULL;
\r
2167 // SetTaskMsg(MSGJPN016, DomainName);
\r
2168 SetTaskMsg(MSGJPN016, DomainName, MSGJPN333);
\r
2170 // pHostEntry = do_gethostbyname(host, HostEntry, MAXGETHOSTSTRUCT, CancelCheckWork);
\r
2171 pHostEntry = do_gethostbynameIPv4(host, HostEntry, MAXGETHOSTSTRUCT, CancelCheckWork);
\r
2174 if(pHostEntry != NULL)
\r
2177 // memcpy((char *)&CurSockAddr.sin_addr, pHostEntry->h_addr, pHostEntry->h_length);
\r
2178 // SetTaskMsg(MSGJPN017, PreMsg, DomainName, inet_ntoa(CurSockAddr.sin_addr), ntohs(CurSockAddr.sin_port));
\r
2179 memcpy((char *)&CurSockAddrIPv4.sin_addr, pHostEntry->h_addr, pHostEntry->h_length);
\r
2181 // SetTaskMsg(MSGJPN017, PreMsg, DomainName, inet_ntoa(CurSockAddrIPv4.sin_addr), ntohs(CurSockAddrIPv4.sin_port));
\r
2182 SetTaskMsg(MSGJPN017, PreMsg, DomainName, inet_ntoa(CurSockAddrIPv4.sin_addr), ntohs(CurSockAddrIPv4.sin_port), MSGJPN333);
\r
2186 if((Fwall == FWALL_SOCKS5_NOAUTH) || (Fwall == FWALL_SOCKS5_USER))
\r
2190 // SetTaskMsg(MSGJPN018, PreMsg, DomainName, ntohs(CurSockAddr.sin_port));
\r
2191 SetTaskMsg(MSGJPN018, PreMsg, DomainName, ntohs(CurSockAddrIPv4.sin_port), MSGJPN333);
\r
2196 // SetTaskMsg(MSGJPN019, host);
\r
2197 SetTaskMsg(MSGJPN019, host, MSGJPN333);
\r
2198 return(INVALID_SOCKET);
\r
2204 // SetTaskMsg(MSGJPN020, PreMsg, inet_ntoa(CurSockAddr.sin_addr), ntohs(CurSockAddr.sin_port));
\r
2205 SetTaskMsg(MSGJPN020, PreMsg, inet_ntoa(CurSockAddrIPv4.sin_addr), ntohs(CurSockAddrIPv4.sin_port), MSGJPN333);
\r
2207 if((Fwall == FWALL_SOCKS4) || (Fwall == FWALL_SOCKS5_NOAUTH) || (Fwall == FWALL_SOCKS5_USER))
\r
2211 if(Fwall == FWALL_SOCKS4)
\r
2213 Socks4Cmd.Ver = SOCKS4_VER;
\r
2214 Socks4Cmd.Cmd = SOCKS4_CMD_CONNECT;
\r
2216 // Socks4Cmd.Port = CurSockAddr.sin_port;
\r
2217 // Socks4Cmd.AdrsInt = CurSockAddr.sin_addr.s_addr;
\r
2218 Socks4Cmd.Port = CurSockAddrIPv4.sin_port;
\r
2219 Socks4Cmd.AdrsInt = CurSockAddrIPv4.sin_addr.s_addr;
\r
2220 strcpy(Socks4Cmd.UserID, FwallUser);
\r
2221 Len = offsetof(SOCKS4CMD, UserID) + strlen(FwallUser) + 1;
\r
2226 // Len = Socks5MakeCmdPacket(&Socks5Cmd, SOCKS5_CMD_CONNECT, UseIPadrs, CurSockAddr.sin_addr.s_addr, DomainName, CurSockAddr.sin_port);
\r
2227 Len = Socks5MakeCmdPacket(&Socks5Cmd, SOCKS5_CMD_CONNECT, UseIPadrs, CurSockAddrIPv4.sin_addr.s_addr, DomainName, CurSockAddrIPv4.sin_port);
\r
2231 // memset(&SocksSockAddr, 0, sizeof(SocksSockAddr));
\r
2232 // if((SocksSockAddr.sin_addr.s_addr = inet_addr(FwallHost)) == INADDR_NONE)
\r
2233 memset(&SocksSockAddrIPv4, 0, sizeof(SocksSockAddrIPv4));
\r
2234 if((SocksSockAddrIPv4.sin_addr.s_addr = inet_addr(FwallHost)) == INADDR_NONE)
\r
2237 // if((pHostEntry = do_gethostbyname(FwallHost, HostEntry, MAXGETHOSTSTRUCT, CancelCheckWork)) != NULL)
\r
2238 // memcpy((char *)&SocksSockAddr.sin_addr, pHostEntry->h_addr, pHostEntry->h_length);
\r
2239 if((pHostEntry = do_gethostbynameIPv4(FwallHost, HostEntry, MAXGETHOSTSTRUCT, CancelCheckWork)) != NULL)
\r
2240 memcpy((char *)&SocksSockAddrIPv4.sin_addr, pHostEntry->h_addr, pHostEntry->h_length);
\r
2244 // SetTaskMsg(MSGJPN021, FwallHost);
\r
2245 SetTaskMsg(MSGJPN021, FwallHost, MSGJPN333);
\r
2246 return INVALID_SOCKET;
\r
2250 // SocksSockAddr.sin_port = htons((u_short)FwallPort);
\r
2251 // SocksSockAddr.sin_family = AF_INET;
\r
2252 // SetTaskMsg(MSGJPN022, inet_ntoa(SocksSockAddr.sin_addr), ntohs(SocksSockAddr.sin_port));
\r
2253 SocksSockAddrIPv4.sin_port = htons((u_short)FwallPort);
\r
2254 SocksSockAddrIPv4.sin_family = AF_INET;
\r
2256 // SetTaskMsg(MSGJPN022, inet_ntoa(SocksSockAddrIPv4.sin_addr), ntohs(SocksSockAddrIPv4.sin_port));
\r
2257 SetTaskMsg(MSGJPN022, inet_ntoa(SocksSockAddrIPv4.sin_addr), ntohs(SocksSockAddrIPv4.sin_port), MSGJPN333);
\r
2258 // connectで接続する先はSOCKSサーバ
\r
2260 // memcpy(&saSockAddr, &SocksSockAddr, sizeof(SocksSockAddr));
\r
2261 memcpy(&saSockAddr, &SocksSockAddrIPv4, sizeof(SocksSockAddrIPv4));
\r
2265 // connectで接続するのは接続先のホスト
\r
2267 // memcpy(&saSockAddr, &CurSockAddr, sizeof(CurSockAddr));
\r
2268 memcpy(&saSockAddr, &CurSockAddrIPv4, sizeof(CurSockAddrIPv4));
\r
2275 if((sSocket = do_socket(AF_INET, SOCK_STREAM, TCP_PORT)) != INVALID_SOCKET)
\r
2277 if(do_connect(sSocket, (struct sockaddr *)&saSockAddr, sizeof(saSockAddr), CancelCheckWork) != SOCKET_ERROR)
\r
2279 if(Fwall == FWALL_SOCKS4)
\r
2281 Socks4Reply.Result = -1;
\r
2283 // if((SocksSendCmd(sSocket, &Socks4Cmd, Len, CancelCheckWork) != FFFTP_SUCCESS) ||
\r
2284 // (Socks4GetCmdReply(sSocket, &Socks4Reply) != FFFTP_SUCCESS) ||
\r
2285 // (Socks4Reply.Result != SOCKS4_RES_OK))
\r
2286 if((SocksSendCmd(sSocket, &Socks4Cmd, Len, CancelCheckWork) != FFFTP_SUCCESS) ||
\r
2287 (Socks4GetCmdReply(sSocket, &Socks4Reply, CancelCheckWork) != FFFTP_SUCCESS) ||
\r
2288 (Socks4Reply.Result != SOCKS4_RES_OK))
\r
2291 // SetTaskMsg(MSGJPN023, Socks4Reply.Result);
\r
2292 SetTaskMsg(MSGJPN023, Socks4Reply.Result, MSGJPN333);
\r
2294 sSocket = INVALID_SOCKET;
\r
2297 else if((Fwall == FWALL_SOCKS5_NOAUTH) || (Fwall == FWALL_SOCKS5_USER))
\r
2299 if(Socks5SelMethod(sSocket, CancelCheckWork) == FFFTP_FAIL)
\r
2302 sSocket = INVALID_SOCKET;
\r
2305 Socks5Reply.Result = -1;
\r
2307 // if((SocksSendCmd(sSocket, &Socks5Cmd, Len, CancelCheckWork) != FFFTP_SUCCESS) ||
\r
2308 // (Socks5GetCmdReply(sSocket, &Socks5Reply) != FFFTP_SUCCESS) ||
\r
2309 // (Socks5Reply.Result != SOCKS5_RES_OK))
\r
2310 if((SocksSendCmd(sSocket, &Socks5Cmd, Len, CancelCheckWork) != FFFTP_SUCCESS) ||
\r
2311 (Socks5GetCmdReply(sSocket, &Socks5Reply, CancelCheckWork) != FFFTP_SUCCESS) ||
\r
2312 (Socks5Reply.Result != SOCKS5_RES_OK))
\r
2315 // SetTaskMsg(MSGJPN024, Socks5Reply.Result);
\r
2316 SetTaskMsg(MSGJPN024, Socks5Reply.Result, MSGJPN333);
\r
2318 sSocket = INVALID_SOCKET;
\r
2323 if(sSocket != INVALID_SOCKET)
\r
2325 // SetTaskMsg(MSGJPN025);
\r
2326 SetTaskMsg(MSGJPN025, MSGJPN333);
\r
2332 // SetTaskMsg(MSGJPN026/*"接続できません(2) %x", sSocket*/);
\r
2333 SetTaskMsg(MSGJPN026/*"接続できません(2) %x", sSocket*/, MSGJPN333);
\r
2335 sSocket = INVALID_SOCKET;
\r
2340 // SetTaskMsg(MSGJPN027);
\r
2341 SetTaskMsg(MSGJPN027, MSGJPN333);
\r
2347 SOCKET connectsockIPv6(char *host, int port, char *PreMsg, int *CancelCheckWork)
\r
2349 struct sockaddr_in6 saSockAddr;
\r
2350 char HostEntry[MAXGETHOSTSTRUCT];
\r
2351 struct hostent *pHostEntry;
\r
2355 SOCKS5REQUEST Socks5Cmd;
\r
2356 SOCKS5REPLY Socks5Reply;
\r
2358 //////////////////////////////
\r
2360 //////////////////////////////
\r
2362 Fwall = FWALL_NONE;
\r
2363 if(AskHostFireWall() == YES)
\r
2364 Fwall = FwallType;
\r
2366 sSocket = INVALID_SOCKET;
\r
2369 strcpy(DomainName, host);
\r
2370 memset(&CurSockAddrIPv6, 0, sizeof(CurSockAddrIPv6));
\r
2371 CurSockAddrIPv6.sin6_port = htons((u_short)port);
\r
2372 CurSockAddrIPv6.sin6_family = AF_INET6;
\r
2373 CurSockAddrIPv6.sin6_addr = inet6_addr(host);
\r
2374 if(memcmp(&CurSockAddrIPv6.sin6_addr, &IN6ADDR_NONE, sizeof(struct in6_addr)) == 0)
\r
2378 if(((Fwall == FWALL_SOCKS5_NOAUTH) || (Fwall == FWALL_SOCKS5_USER)) &&
\r
2379 (FwallResolv == YES))
\r
2381 // ホスト名解決はSOCKSサーバに任せる
\r
2382 pHostEntry = NULL;
\r
2387 SetTaskMsg(MSGJPN016, DomainName, MSGJPN334);
\r
2388 pHostEntry = do_gethostbynameIPv6(host, HostEntry, MAXGETHOSTSTRUCT, CancelCheckWork);
\r
2391 if(pHostEntry != NULL)
\r
2393 memcpy((char *)&CurSockAddrIPv6.sin6_addr, pHostEntry->h_addr, pHostEntry->h_length);
\r
2394 SetTaskMsg(MSGJPN017, PreMsg, DomainName, inet6_ntoa(CurSockAddrIPv6.sin6_addr), ntohs(CurSockAddrIPv6.sin6_port), MSGJPN334);
\r
2398 if((Fwall == FWALL_SOCKS5_NOAUTH) || (Fwall == FWALL_SOCKS5_USER))
\r
2401 SetTaskMsg(MSGJPN018, PreMsg, DomainName, ntohs(CurSockAddrIPv6.sin6_port), MSGJPN334);
\r
2405 SetTaskMsg(MSGJPN019, host, MSGJPN334);
\r
2406 return(INVALID_SOCKET);
\r
2411 SetTaskMsg(MSGJPN020, PreMsg, inet6_ntoa(CurSockAddrIPv6.sin6_addr), ntohs(CurSockAddrIPv6.sin6_port), MSGJPN334);
\r
2413 if((Fwall == FWALL_SOCKS5_NOAUTH) || (Fwall == FWALL_SOCKS5_USER))
\r
2418 Len = Socks5MakeCmdPacketIPv6(&Socks5Cmd, SOCKS5_CMD_CONNECT, UseIPadrs, (char*)&CurSockAddrIPv6.sin6_addr, DomainName, CurSockAddrIPv6.sin6_port);
\r
2421 memset(&SocksSockAddrIPv6, 0, sizeof(SocksSockAddrIPv6));
\r
2422 SocksSockAddrIPv6.sin6_addr = inet6_addr(FwallHost);
\r
2423 if(memcmp(&SocksSockAddrIPv6.sin6_addr, &IN6ADDR_NONE, sizeof(struct in6_addr)) == 0)
\r
2425 if((pHostEntry = do_gethostbynameIPv6(FwallHost, HostEntry, MAXGETHOSTSTRUCT, CancelCheckWork)) != NULL)
\r
2426 memcpy((char *)&SocksSockAddrIPv6.sin6_addr, pHostEntry->h_addr, pHostEntry->h_length);
\r
2429 SetTaskMsg(MSGJPN021, FwallHost, MSGJPN334);
\r
2430 return INVALID_SOCKET;
\r
2433 SocksSockAddrIPv6.sin6_port = htons((u_short)FwallPort);
\r
2434 SocksSockAddrIPv6.sin6_family = AF_INET6;
\r
2435 SetTaskMsg(MSGJPN022, inet6_ntoa(SocksSockAddrIPv6.sin6_addr), ntohs(SocksSockAddrIPv6.sin6_port), MSGJPN334);
\r
2436 // connectで接続する先はSOCKSサーバ
\r
2437 memcpy(&saSockAddr, &SocksSockAddrIPv6, sizeof(SocksSockAddrIPv6));
\r
2441 // connectで接続するのは接続先のホスト
\r
2442 memcpy(&saSockAddr, &CurSockAddrIPv6, sizeof(CurSockAddrIPv6));
\r
2449 inet6_ntoa(saSockAddr.sin6_addr);
\r
2450 if((sSocket = do_socket(AF_INET6, SOCK_STREAM, TCP_PORT)) != INVALID_SOCKET)
\r
2452 if(do_connect(sSocket, (struct sockaddr *)&saSockAddr, sizeof(saSockAddr), CancelCheckWork) != SOCKET_ERROR)
\r
2454 if((Fwall == FWALL_SOCKS5_NOAUTH) || (Fwall == FWALL_SOCKS5_USER))
\r
2456 if(Socks5SelMethod(sSocket, CancelCheckWork) == FFFTP_FAIL)
\r
2459 sSocket = INVALID_SOCKET;
\r
2462 Socks5Reply.Result = -1;
\r
2464 // if((SocksSendCmd(sSocket, &Socks5Cmd, Len, CancelCheckWork) != FFFTP_SUCCESS) ||
\r
2465 // (Socks5GetCmdReply(sSocket, &Socks5Reply) != FFFTP_SUCCESS) ||
\r
2466 // (Socks5Reply.Result != SOCKS5_RES_OK))
\r
2467 if((SocksSendCmd(sSocket, &Socks5Cmd, Len, CancelCheckWork) != FFFTP_SUCCESS) ||
\r
2468 (Socks5GetCmdReply(sSocket, &Socks5Reply, CancelCheckWork) != FFFTP_SUCCESS) ||
\r
2469 (Socks5Reply.Result != SOCKS5_RES_OK))
\r
2471 SetTaskMsg(MSGJPN024, Socks5Reply.Result, MSGJPN334);
\r
2473 sSocket = INVALID_SOCKET;
\r
2478 if(sSocket != INVALID_SOCKET)
\r
2479 SetTaskMsg(MSGJPN025, MSGJPN334);
\r
2484 SetTaskMsg(MSGJPN026/*"接続できません(2) %x", sSocket*/, MSGJPN334);
\r
2486 sSocket = INVALID_SOCKET;
\r
2490 SetTaskMsg(MSGJPN027, MSGJPN334);
\r
2496 /*----- リッスンソケットを取得 ------------------------------------------------
\r
2499 * SOCKET ctrl_skt : コントロールソケット
\r
2503 *----------------------------------------------------------------------------*/
\r
2506 SOCKET GetFTPListenSocket(SOCKET ctrl_skt, int *CancelCheckWork)
\r
2509 Result = INVALID_SOCKET;
\r
2510 switch(CurHost.CurNetType)
\r
2513 Result = GetFTPListenSocketIPv4(ctrl_skt, CancelCheckWork);
\r
2516 Result = GetFTPListenSocketIPv6(ctrl_skt, CancelCheckWork);
\r
2524 //SOCKET GetFTPListenSocket(SOCKET ctrl_skt, int *CancelCheckWork)
\r
2525 SOCKET GetFTPListenSocketIPv4(SOCKET ctrl_skt, int *CancelCheckWork)
\r
2527 SOCKET listen_skt;
\r
2530 struct sockaddr_in saCtrlAddr;
\r
2531 struct sockaddr_in saTmpAddr;
\r
2532 SOCKS4CMD Socks4Cmd;
\r
2533 SOCKS4REPLY Socks4Reply;
\r
2534 SOCKS5REQUEST Socks5Cmd;
\r
2535 SOCKS5REPLY Socks5Reply;
\r
2540 Fwall = FWALL_NONE;
\r
2541 if(AskHostFireWall() == YES)
\r
2542 Fwall = FwallType;
\r
2544 if((listen_skt = do_socket(AF_INET, SOCK_STREAM, IPPROTO_TCP)) != INVALID_SOCKET)
\r
2546 if(Fwall == FWALL_SOCKS4)
\r
2548 /*===== SOCKS4を使う =====*/
\r
2549 DoPrintf("Use SOCKS4 BIND");
\r
2551 // if(do_connect(listen_skt, (struct sockaddr *)&SocksSockAddr, sizeof(SocksSockAddr), CancelCheckWork) != SOCKET_ERROR)
\r
2552 if(do_connect(listen_skt, (struct sockaddr *)&SocksSockAddrIPv4, sizeof(SocksSockAddrIPv4), CancelCheckWork) != SOCKET_ERROR)
\r
2554 Socks4Cmd.Ver = SOCKS4_VER;
\r
2555 Socks4Cmd.Cmd = SOCKS4_CMD_BIND;
\r
2557 // Socks4Cmd.Port = CurSockAddr.sin_port;
\r
2558 // Socks4Cmd.AdrsInt = CurSockAddr.sin_addr.s_addr;
\r
2559 Socks4Cmd.Port = CurSockAddrIPv4.sin_port;
\r
2560 Socks4Cmd.AdrsInt = CurSockAddrIPv4.sin_addr.s_addr;
\r
2561 strcpy(Socks4Cmd.UserID, FwallUser);
\r
2562 Len = offsetof(SOCKS4CMD, UserID) + strlen(FwallUser) + 1;
\r
2564 Socks4Reply.Result = -1;
\r
2566 // if((SocksSendCmd(listen_skt, &Socks4Cmd, Len, CancelCheckWork) != FFFTP_SUCCESS) ||
\r
2567 // (Socks4GetCmdReply(listen_skt, &Socks4Reply) != FFFTP_SUCCESS) ||
\r
2568 // (Socks4Reply.Result != SOCKS4_RES_OK))
\r
2569 if((SocksSendCmd(listen_skt, &Socks4Cmd, Len, CancelCheckWork) != FFFTP_SUCCESS) ||
\r
2570 (Socks4GetCmdReply(listen_skt, &Socks4Reply, CancelCheckWork) != FFFTP_SUCCESS) ||
\r
2571 (Socks4Reply.Result != SOCKS4_RES_OK))
\r
2574 // SetTaskMsg(MSGJPN028, Socks4Reply.Result);
\r
2575 SetTaskMsg(MSGJPN028, Socks4Reply.Result, MSGJPN333);
\r
2576 DoClose(listen_skt);
\r
2577 listen_skt = INVALID_SOCKET;
\r
2580 if(Socks4Reply.AdrsInt == 0)
\r
2582 // Socks4Reply.AdrsInt = SocksSockAddr.sin_addr.s_addr;
\r
2583 Socks4Reply.AdrsInt = SocksSockAddrIPv4.sin_addr.s_addr;
\r
2585 a = (char *)&Socks4Reply.AdrsInt;
\r
2586 p = (char *)&Socks4Reply.Port;
\r
2589 else if((Fwall == FWALL_SOCKS5_NOAUTH) || (Fwall == FWALL_SOCKS5_USER))
\r
2591 /*===== SOCKS5を使う =====*/
\r
2592 DoPrintf("Use SOCKS5 BIND");
\r
2594 // if(do_connect(listen_skt, (struct sockaddr *)&SocksSockAddr, sizeof(SocksSockAddr), CancelCheckWork) != SOCKET_ERROR)
\r
2595 if(do_connect(listen_skt, (struct sockaddr *)&SocksSockAddrIPv4, sizeof(SocksSockAddrIPv4), CancelCheckWork) != SOCKET_ERROR)
\r
2597 if(Socks5SelMethod(listen_skt, CancelCheckWork) == FFFTP_FAIL)
\r
2599 DoClose(listen_skt);
\r
2600 listen_skt = INVALID_SOCKET;
\r
2601 return(listen_skt);
\r
2605 // Len = Socks5MakeCmdPacket(&Socks5Cmd, SOCKS5_CMD_BIND, UseIPadrs, CurSockAddr.sin_addr.s_addr, DomainName, CurSockAddr.sin_port);
\r
2606 Len = Socks5MakeCmdPacket(&Socks5Cmd, SOCKS5_CMD_BIND, UseIPadrs, CurSockAddrIPv4.sin_addr.s_addr, DomainName, CurSockAddrIPv4.sin_port);
\r
2608 Socks5Reply.Result = -1;
\r
2610 // if((SocksSendCmd(listen_skt, &Socks5Cmd, Len, CancelCheckWork) != FFFTP_SUCCESS) ||
\r
2611 // (Socks5GetCmdReply(listen_skt, &Socks5Reply) != FFFTP_SUCCESS) ||
\r
2612 // (Socks5Reply.Result != SOCKS5_RES_OK))
\r
2613 if((SocksSendCmd(listen_skt, &Socks5Cmd, Len, CancelCheckWork) != FFFTP_SUCCESS) ||
\r
2614 (Socks5GetCmdReply(listen_skt, &Socks5Reply, CancelCheckWork) != FFFTP_SUCCESS) ||
\r
2615 (Socks5Reply.Result != SOCKS5_RES_OK))
\r
2618 // SetTaskMsg(MSGJPN029, Socks5Reply.Result);
\r
2619 SetTaskMsg(MSGJPN029, Socks5Reply.Result, MSGJPN333);
\r
2620 DoClose(listen_skt);
\r
2621 listen_skt = INVALID_SOCKET;
\r
2625 // if(Socks5Reply.AdrsInt == 0)
\r
2626 // Socks5Reply.AdrsInt = SocksSockAddr.sin_addr.s_addr;
\r
2629 // a = (char *)&Socks5Reply.AdrsInt;
\r
2630 // p = (char *)&Socks5Reply.Port;
\r
2631 a = (char *)&Socks5Reply._dummy[0];
\r
2632 p = (char *)&Socks5Reply._dummy[4];
\r
2637 /*===== SOCKSを使わない =====*/
\r
2638 DoPrintf("Use normal BIND");
\r
2639 saCtrlAddr.sin_port = htons(0);
\r
2640 saCtrlAddr.sin_family = AF_INET;
\r
2641 saCtrlAddr.sin_addr.s_addr = 0;
\r
2643 if(bind(listen_skt, (struct sockaddr *)&saCtrlAddr, sizeof(struct sockaddr)) != SOCKET_ERROR)
\r
2645 iLength = sizeof(saCtrlAddr);
\r
2646 if(getsockname(listen_skt, (struct sockaddr *)&saCtrlAddr, &iLength) != SOCKET_ERROR)
\r
2648 if(do_listen(listen_skt, 1) == 0)
\r
2650 iLength = sizeof(saTmpAddr);
\r
2651 if(getsockname(ctrl_skt, (struct sockaddr *)&saTmpAddr, &iLength) == SOCKET_ERROR)
\r
2652 ReportWSError("getsockname", WSAGetLastError());
\r
2654 a = (char *)&saTmpAddr.sin_addr;
\r
2655 p = (char *)&saCtrlAddr.sin_port;
\r
2659 ReportWSError("listen", WSAGetLastError());
\r
2660 do_closesocket(listen_skt);
\r
2661 listen_skt = INVALID_SOCKET;
\r
2666 ReportWSError("getsockname", WSAGetLastError());
\r
2667 do_closesocket(listen_skt);
\r
2668 listen_skt = INVALID_SOCKET;
\r
2673 ReportWSError("bind", WSAGetLastError());
\r
2674 do_closesocket(listen_skt);
\r
2675 listen_skt = INVALID_SOCKET;
\r
2678 if(listen_skt == INVALID_SOCKET)
\r
2680 // SetTaskMsg(MSGJPN030);
\r
2681 SetTaskMsg(MSGJPN030, MSGJPN333);
\r
2685 ReportWSError("socket create", WSAGetLastError());
\r
2687 if(listen_skt != INVALID_SOCKET)
\r
2689 #define UC(b) (((int)b)&0xff)
\r
2691 // if((command(ctrl_skt,NULL, &CancelFlg, "PORT %d,%d,%d,%d,%d,%d",
\r
2692 // UC(a[0]), UC(a[1]), UC(a[2]), UC(a[3]),
\r
2693 // UC(p[0]), UC(p[1])) / 100) != FTP_COMPLETE)
\r
2694 if((command(ctrl_skt,NULL, CancelCheckWork, "PORT %d,%d,%d,%d,%d,%d",
\r
2695 UC(a[0]), UC(a[1]), UC(a[2]), UC(a[3]),
\r
2696 UC(p[0]), UC(p[1])) / 100) != FTP_COMPLETE)
\r
2699 // SetTaskMsg(MSGJPN031);
\r
2700 SetTaskMsg(MSGJPN031, MSGJPN333);
\r
2701 do_closesocket(listen_skt);
\r
2702 listen_skt = INVALID_SOCKET;
\r
2705 // DoPrintf("Skt=%u : listener %s port %u",listen_skt,inet_ntoa(saCtrlAddr.sin_addr),ntohs(saCtrlAddr.sin_port));
\r
2708 return(listen_skt);
\r
2712 SOCKET GetFTPListenSocketIPv6(SOCKET ctrl_skt, int *CancelCheckWork)
\r
2714 SOCKET listen_skt;
\r
2717 struct sockaddr_in6 saCtrlAddr;
\r
2718 struct sockaddr_in6 saTmpAddr;
\r
2719 SOCKS5REQUEST Socks5Cmd;
\r
2720 SOCKS5REPLY Socks5Reply;
\r
2727 Fwall = FWALL_NONE;
\r
2728 if(AskHostFireWall() == YES)
\r
2729 Fwall = FwallType;
\r
2731 if((listen_skt = do_socket(AF_INET6, SOCK_STREAM, IPPROTO_TCP)) != INVALID_SOCKET)
\r
2733 if((Fwall == FWALL_SOCKS5_NOAUTH) || (Fwall == FWALL_SOCKS5_USER))
\r
2735 /*===== SOCKS5を使う =====*/
\r
2736 DoPrintf("Use SOCKS5 BIND");
\r
2737 if(do_connect(listen_skt, (struct sockaddr *)&SocksSockAddrIPv6, sizeof(SocksSockAddrIPv6), CancelCheckWork) != SOCKET_ERROR)
\r
2739 if(Socks5SelMethod(listen_skt, CancelCheckWork) == FFFTP_FAIL)
\r
2741 DoClose(listen_skt);
\r
2742 listen_skt = INVALID_SOCKET;
\r
2743 return(listen_skt);
\r
2746 Len = Socks5MakeCmdPacketIPv6(&Socks5Cmd, SOCKS5_CMD_BIND, UseIPadrs, (char*)&CurSockAddrIPv6.sin6_addr, DomainName, CurSockAddrIPv6.sin6_port);
\r
2748 Socks5Reply.Result = -1;
\r
2750 // if((SocksSendCmd(listen_skt, &Socks5Cmd, Len, CancelCheckWork) != FFFTP_SUCCESS) ||
\r
2751 // (Socks5GetCmdReply(listen_skt, &Socks5Reply) != FFFTP_SUCCESS) ||
\r
2752 // (Socks5Reply.Result != SOCKS5_RES_OK))
\r
2753 if((SocksSendCmd(listen_skt, &Socks5Cmd, Len, CancelCheckWork) != FFFTP_SUCCESS) ||
\r
2754 (Socks5GetCmdReply(listen_skt, &Socks5Reply, CancelCheckWork) != FFFTP_SUCCESS) ||
\r
2755 (Socks5Reply.Result != SOCKS5_RES_OK))
\r
2757 SetTaskMsg(MSGJPN029, Socks5Reply.Result, MSGJPN334);
\r
2758 DoClose(listen_skt);
\r
2759 listen_skt = INVALID_SOCKET;
\r
2763 // if(Socks5Reply.AdrsInt == 0)
\r
2764 // Socks5Reply.AdrsInt = SocksSockAddr.sin_addr.s_addr;
\r
2767 // a = (char *)&Socks5Reply.AdrsInt;
\r
2768 // p = (char *)&Socks5Reply.Port;
\r
2769 a = (char *)&Socks5Reply._dummy[0];
\r
2770 p = (char *)&Socks5Reply._dummy[16];
\r
2775 /*===== SOCKSを使わない =====*/
\r
2776 DoPrintf("Use normal BIND");
\r
2777 saCtrlAddr.sin6_port = htons(0);
\r
2778 saCtrlAddr.sin6_family = AF_INET6;
\r
2779 memset(&saCtrlAddr.sin6_addr, 0, 16);
\r
2781 if(bind(listen_skt, (struct sockaddr *)&saCtrlAddr, sizeof(struct sockaddr_in6)) != SOCKET_ERROR)
\r
2783 iLength = sizeof(saCtrlAddr);
\r
2784 if(getsockname(listen_skt, (struct sockaddr *)&saCtrlAddr, &iLength) != SOCKET_ERROR)
\r
2786 if(do_listen(listen_skt, 1) == 0)
\r
2788 iLength = sizeof(saTmpAddr);
\r
2789 if(getsockname(ctrl_skt, (struct sockaddr *)&saTmpAddr, &iLength) == SOCKET_ERROR)
\r
2790 ReportWSError("getsockname", WSAGetLastError());
\r
2792 a = (char *)&saTmpAddr.sin6_addr;
\r
2793 p = (char *)&saCtrlAddr.sin6_port;
\r
2797 ReportWSError("listen", WSAGetLastError());
\r
2798 do_closesocket(listen_skt);
\r
2799 listen_skt = INVALID_SOCKET;
\r
2804 ReportWSError("getsockname", WSAGetLastError());
\r
2805 do_closesocket(listen_skt);
\r
2806 listen_skt = INVALID_SOCKET;
\r
2811 ReportWSError("bind", WSAGetLastError());
\r
2812 do_closesocket(listen_skt);
\r
2813 listen_skt = INVALID_SOCKET;
\r
2816 if(listen_skt == INVALID_SOCKET)
\r
2817 SetTaskMsg(MSGJPN030, MSGJPN334);
\r
2821 ReportWSError("socket create", WSAGetLastError());
\r
2823 if(listen_skt != INVALID_SOCKET)
\r
2825 #define UC(b) (((int)b)&0xff)
\r
2827 // if((command(ctrl_skt,NULL, &CancelFlg, "PORT %d,%d,%d,%d,%d,%d",
\r
2828 // UC(a[0]), UC(a[1]), UC(a[2]), UC(a[3]),
\r
2829 // UC(p[0]), UC(p[1])) / 100) != FTP_COMPLETE)
\r
2830 if((command(ctrl_skt,NULL, CancelCheckWork, "EPRT |2|%s|%d|",
\r
2831 AddressToStringIPv6(Adrs, a),
\r
2832 (UC(p[0]) << 8) | UC(p[1])) / 100) != FTP_COMPLETE)
\r
2834 SetTaskMsg(MSGJPN031, MSGJPN334);
\r
2835 do_closesocket(listen_skt);
\r
2836 listen_skt = INVALID_SOCKET;
\r
2839 // DoPrintf("Skt=%u : listener %s port %u",listen_skt,inet_ntoa(saCtrlAddr.sin_addr),ntohs(saCtrlAddr.sin_port));
\r
2842 return(listen_skt);
\r
2846 /*----- ホストへ接続処理中かどうかを返す---------------------------------------
\r
2854 *----------------------------------------------------------------------------*/
\r
2856 int AskTryingConnect(void)
\r
2858 return(TryConnect);
\r
2863 ///*----- ブロッキングコールのフックコールバック --------------------------------
\r
2870 //*----------------------------------------------------------------------------*/
\r
2872 //static BOOL CALLBACK BlkHookFnc(void)
\r
2874 // BackgrndMessageProc();
\r
2876 // if(CancelFlg == YES)
\r
2878 // SetTaskMsg(MSGJPN032);
\r
2879 // WSACancelBlockingCall();
\r
2880 // CancelFlg = NO;
\r
2888 /*----- SOCKS5のコマンドパケットを作成する ------------------------------------
\r
2891 * SOCKS5REQUEST *Packet : パケットを作成するワーク
\r
2893 * int ValidIP : IPアドレスを使うかどうか(YES/NO)
\r
2894 * ulong IP : IPアドレス
\r
2895 * char *Host : ホスト名
\r
2896 * ushort Port : ポート
\r
2900 *----------------------------------------------------------------------------*/
\r
2902 static int Socks5MakeCmdPacket(SOCKS5REQUEST *Packet, char Cmd, int ValidIP, ulong IP, char *Host, ushort Port)
\r
2908 Pos = (uchar *)Packet;
\r
2909 Pos += SOCKS5REQUEST_SIZE;
\r
2910 TotalLen = SOCKS5REQUEST_SIZE + 2; /* +2はポートの分 */
\r
2912 Packet->Ver = SOCKS5_VER;
\r
2913 Packet->Cmd = Cmd;
\r
2915 if(ValidIP == YES)
\r
2918 Packet->Type = SOCKS5_ADRS_IPV4;
\r
2919 *((ulong *)Pos) = IP;
\r
2926 Packet->Type = SOCKS5_ADRS_NAME;
\r
2927 Len = strlen(Host);
\r
2929 strcpy(Pos, Host);
\r
2931 TotalLen += Len + 1;
\r
2933 *((ushort *)Pos) = Port;
\r
2940 static int Socks5MakeCmdPacketIPv6(SOCKS5REQUEST *Packet, char Cmd, int ValidIP, char *IP, char *Host, ushort Port)
\r
2946 Pos = (uchar *)Packet;
\r
2947 Pos += SOCKS5REQUEST_SIZE;
\r
2948 TotalLen = SOCKS5REQUEST_SIZE + 2; /* +2はポートの分 */
\r
2950 Packet->Ver = SOCKS5_VER;
\r
2951 Packet->Cmd = Cmd;
\r
2953 if(ValidIP == YES)
\r
2956 Packet->Type = SOCKS5_ADRS_IPV6;
\r
2957 memcpy(Pos, IP, 16);
\r
2964 Packet->Type = SOCKS5_ADRS_NAME;
\r
2965 Len = strlen(Host);
\r
2967 strcpy(Pos, Host);
\r
2969 TotalLen += Len + 1;
\r
2971 *((ushort *)Pos) = Port;
\r
2977 /*----- SOCKSのコマンドを送る -------------------------------------------------
\r
2980 * SOCKET Socket : ソケット
\r
2981 * void *Data : 送るデータ
\r
2985 * int ステータス (FFFTP_SUCCESS/FFFTP_FAIL)
\r
2986 *----------------------------------------------------------------------------*/
\r
2988 static int SocksSendCmd(SOCKET Socket, void *Data, int Size, int *CancelCheckWork)
\r
2992 Ret = SendData(Socket, (char *)Data, Size, 0, CancelCheckWork);
\r
2994 if(Ret != FFFTP_SUCCESS)
\r
2995 SetTaskMsg(MSGJPN033, *((short *)Data));
\r
3001 /*----- SOCKS5のコマンドに対するリプライパケットを受信する --------------------
\r
3004 * SOCKET Socket : ソケット
\r
3005 * SOCKS5REPLY *Packet : パケット
\r
3008 * int ステータス (FFFTP_SUCCESS/FFFTP_FAIL)
\r
3009 *----------------------------------------------------------------------------*/
\r
3012 //static int Socks5GetCmdReply(SOCKET Socket, SOCKS5REPLY *Packet)
\r
3013 static int Socks5GetCmdReply(SOCKET Socket, SOCKS5REPLY *Packet, int *CancelCheckWork)
\r
3019 Pos = (uchar *)Packet;
\r
3020 Pos += SOCKS5REPLY_SIZE;
\r
3023 // if((Ret = ReadNchar(Socket, (char *)Packet, SOCKS5REPLY_SIZE, &CancelFlg)) == FFFTP_SUCCESS)
\r
3024 if((Ret = ReadNchar(Socket, (char *)Packet, SOCKS5REPLY_SIZE, CancelCheckWork)) == FFFTP_SUCCESS)
\r
3026 if(Packet->Type == SOCKS5_ADRS_IPV4)
\r
3028 else if(Packet->Type == SOCKS5_ADRS_IPV6)
\r
3033 // if((Ret = ReadNchar(Socket, (char *)Pos, 1, &CancelFlg)) == FFFTP_SUCCESS)
\r
3034 if((Ret = ReadNchar(Socket, (char *)Pos, 1, CancelCheckWork)) == FFFTP_SUCCESS)
\r
3041 if(Ret == FFFTP_SUCCESS)
\r
3043 // Ret = ReadNchar(Socket, (char *)Pos, Len, &CancelFlg);
\r
3044 Ret = ReadNchar(Socket, (char *)Pos, Len, CancelCheckWork);
\r
3047 if(Ret != FFFTP_SUCCESS)
\r
3048 SetTaskMsg(MSGJPN034);
\r
3054 /*----- SOCKS4のコマンドに対するリプライパケットを受信する --------------------
\r
3057 * SOCKET Socket : ソケット
\r
3058 * SOCKS5REPLY *Packet : パケット
\r
3061 * int ステータス (FFFTP_SUCCESS/FFFTP_FAIL)
\r
3062 *----------------------------------------------------------------------------*/
\r
3065 //static int Socks4GetCmdReply(SOCKET Socket, SOCKS4REPLY *Packet)
\r
3066 static int Socks4GetCmdReply(SOCKET Socket, SOCKS4REPLY *Packet, int *CancelCheckWork)
\r
3071 // Ret = ReadNchar(Socket, (char *)Packet, SOCKS4REPLY_SIZE, &CancelFlg);
\r
3072 Ret = ReadNchar(Socket, (char *)Packet, SOCKS4REPLY_SIZE, CancelCheckWork);
\r
3074 if(Ret != FFFTP_SUCCESS)
\r
3075 DoPrintf(MSGJPN035);
\r
3081 /*----- SOCKS5の認証を行う ----------------------------------------------------
\r
3084 * SOCKET Socket : ソケット
\r
3087 * int ステータス (FFFTP_SUCCESS/FFFTP_FAIL)
\r
3088 *----------------------------------------------------------------------------*/
\r
3090 static int Socks5SelMethod(SOCKET Socket, int *CancelCheckWork)
\r
3093 SOCKS5METHODREQUEST Socks5Method;
\r
3094 SOCKS5METHODREPLY Socks5MethodReply;
\r
3095 SOCKS5USERPASSSTATUS Socks5Status;
\r
3096 char Buf[USER_NAME_LEN + PASSWORD_LEN + 4];
\r
3100 Ret = FFFTP_SUCCESS;
\r
3101 Socks5Method.Ver = SOCKS5_VER;
\r
3102 Socks5Method.Num = 1;
\r
3103 if(FwallType == FWALL_SOCKS5_NOAUTH)
\r
3104 Socks5Method.Methods[0] = SOCKS5_AUTH_NONE;
\r
3106 Socks5Method.Methods[0] = SOCKS5_AUTH_USER;
\r
3109 // if((SocksSendCmd(Socket, &Socks5Method, SOCKS5METHODREQUEST_SIZE, CancelCheckWork) != FFFTP_SUCCESS) ||
\r
3110 // (ReadNchar(Socket, (char *)&Socks5MethodReply, SOCKS5METHODREPLY_SIZE, &CancelFlg) != FFFTP_SUCCESS) ||
\r
3111 // (Socks5MethodReply.Method == (uchar)0xFF))
\r
3112 if((SocksSendCmd(Socket, &Socks5Method, SOCKS5METHODREQUEST_SIZE, CancelCheckWork) != FFFTP_SUCCESS) ||
\r
3113 (ReadNchar(Socket, (char *)&Socks5MethodReply, SOCKS5METHODREPLY_SIZE, CancelCheckWork) != FFFTP_SUCCESS) ||
\r
3114 (Socks5MethodReply.Method == (uchar)0xFF))
\r
3116 SetTaskMsg(MSGJPN036);
\r
3119 else if(Socks5MethodReply.Method == SOCKS5_AUTH_USER)
\r
3121 DoPrintf("SOCKS5 User/Pass Authentication");
\r
3122 Buf[0] = SOCKS5_USERAUTH_VER;
\r
3123 Len = strlen(FwallUser);
\r
3124 Len2 = strlen(FwallPass);
\r
3126 strcpy(Buf+2, FwallUser);
\r
3127 Buf[2 + Len] = Len2;
\r
3128 strcpy(Buf+3+Len, FwallPass);
\r
3131 // if((SocksSendCmd(Socket, &Buf, Len+Len2+3, CancelCheckWork) != FFFTP_SUCCESS) ||
\r
3132 // (ReadNchar(Socket, (char *)&Socks5Status, SOCKS5USERPASSSTATUS_SIZE, &CancelFlg) != FFFTP_SUCCESS) ||
\r
3133 // (Socks5Status.Status != 0))
\r
3134 if((SocksSendCmd(Socket, &Buf, Len+Len2+3, CancelCheckWork) != FFFTP_SUCCESS) ||
\r
3135 (ReadNchar(Socket, (char *)&Socks5Status, SOCKS5USERPASSSTATUS_SIZE, CancelCheckWork) != FFFTP_SUCCESS) ||
\r
3136 (Socks5Status.Status != 0))
\r
3138 SetTaskMsg(MSGJPN037);
\r
3143 DoPrintf("SOCKS5 No Authentication");
\r
3149 /*----- SOCKSのBINDの第2リプライメッセージを受け取る -------------------------
\r
3152 * SOCKET Socket : ソケット
\r
3153 * SOCKET *Data : データソケットを返すワーク
\r
3156 * int ステータス (FFFTP_SUCCESS/FFFTP_FAIL)
\r
3157 *----------------------------------------------------------------------------*/
\r
3160 //int SocksGet2ndBindReply(SOCKET Socket, SOCKET *Data)
\r
3161 int SocksGet2ndBindReply(SOCKET Socket, SOCKET *Data, int *CancelCheckWork)
\r
3167 if((AskHostFireWall() == YES) && (FwallType == FWALL_SOCKS4))
\r
3170 // Socks4GetCmdReply(Socket, (SOCKS4REPLY *)Buf);
\r
3171 Socks4GetCmdReply(Socket, (SOCKS4REPLY *)Buf, CancelCheckWork);
\r
3173 Ret = FFFTP_SUCCESS;
\r
3175 else if((AskHostFireWall() == YES) &&
\r
3176 ((FwallType == FWALL_SOCKS5_NOAUTH) || (FwallType == FWALL_SOCKS5_USER)))
\r
3179 // Socks5GetCmdReply(Socket, (SOCKS5REPLY *)Buf);
\r
3180 Socks5GetCmdReply(Socket, (SOCKS5REPLY *)Buf, CancelCheckWork);
\r
3182 Ret = FFFTP_SUCCESS;
\r
3190 int AskCryptMode(void)
\r
3192 return(CurHost.CryptMode);
\r
3195 int AskUseNoEncryption(void)
\r
3197 return(CurHost.UseNoEncryption);
\r
3200 int AskUseFTPES(void)
\r
3202 return(CurHost.UseFTPES);
\r
3205 int AskUseFTPIS(void)
\r
3207 return(CurHost.UseFTPIS);
\r
3210 int AskUseSFTP(void)
\r
3212 return(CurHost.UseSFTP);
\r
3215 char *AskPrivateKey(void)
\r
3217 return(CurHost.PrivateKey);
\r
3221 int AskMaxThreadCount(void)
\r
3223 return(CurHost.MaxThreadCount);
\r
3226 int AskReuseCmdSkt(void)
\r
3228 return(CurHost.ReuseCmdSkt);
\r
3232 int AskHostFeature(void)
\r
3234 return(CurHost.Feature);
\r
3238 int AskUseMLSD(void)
\r
3240 return(CurHost.UseMLSD);
\r
3244 int AskCurNetType(void)
\r
3246 return(CurHost.CurNetType);
\r
3250 int AskNoopInterval(void)
\r
3252 return(CurHost.NoopInterval);
\r
3256 int AskTransferErrorMode(void)
\r
3258 return(CurHost.TransferErrorMode);
\r
3261 int AskTransferErrorNotify(void)
\r
3263 return(CurHost.TransferErrorNotify);
\r