OSDN Git Service

Add routines for automatic update of the local view.
[ffftp/ffftp.git] / socketwrapper.c
1 // socketwrapper.c\r
2 // Copyright (C) 2011 Suguru Kawamoto\r
3 // ソケットラッパー\r
4 // socket関連関数をOpenSSL用に置換\r
5 // socket関連関数のIPv6対応\r
6 // コンパイルにはOpenSSLのヘッダーファイルが必要\r
7 // 実行にはOpenSSLのDLLが必要\r
8 \r
9 #include <ws2tcpip.h>\r
10 #include <windows.h>\r
11 #include <mmsystem.h>\r
12 #include <openssl/ssl.h>\r
13 \r
14 #include "socketwrapper.h"\r
15 #include "protectprocess.h"\r
16 #include "mbswrapper.h"\r
17 #include "punycode.h"\r
18 \r
19 // FTPS対応\r
20 \r
21 typedef void (__cdecl* _SSL_load_error_strings)();\r
22 typedef int (__cdecl* _SSL_library_init)();\r
23 typedef SSL_METHOD* (__cdecl* _SSLv23_method)();\r
24 typedef SSL_CTX* (__cdecl* _SSL_CTX_new)(SSL_METHOD*);\r
25 typedef void (__cdecl* _SSL_CTX_free)(SSL_CTX*);\r
26 typedef SSL* (__cdecl* _SSL_new)(SSL_CTX*);\r
27 typedef void (__cdecl* _SSL_free)(SSL*);\r
28 typedef int (__cdecl* _SSL_shutdown)(SSL*);\r
29 typedef int (__cdecl* _SSL_get_fd)(SSL*);\r
30 typedef int (__cdecl* _SSL_set_fd)(SSL*, int);\r
31 typedef int (__cdecl* _SSL_accept)(SSL*);\r
32 typedef int (__cdecl* _SSL_connect)(SSL*);\r
33 typedef int (__cdecl* _SSL_write)(SSL*, const void*, int);\r
34 typedef int (__cdecl* _SSL_peek)(SSL*, void*, int);\r
35 typedef int (__cdecl* _SSL_read)(SSL*, void*, int);\r
36 typedef int (__cdecl* _SSL_get_error)(SSL*, int);\r
37 typedef X509* (__cdecl* _SSL_get_peer_certificate)(const SSL*);\r
38 typedef long (__cdecl* _SSL_get_verify_result)(const SSL*);\r
39 typedef SSL_SESSION* (__cdecl* _SSL_get_session)(SSL*);\r
40 typedef int (__cdecl* _SSL_set_session)(SSL*, SSL_SESSION*);\r
41 typedef X509_STORE* (__cdecl* _SSL_CTX_get_cert_store)(const SSL_CTX*);\r
42 typedef long (__cdecl* _SSL_CTX_ctrl)(SSL_CTX*, int, long, void*);\r
43 typedef BIO_METHOD* (__cdecl* _BIO_s_mem)();\r
44 typedef BIO* (__cdecl* _BIO_new)(BIO_METHOD*);\r
45 typedef int (__cdecl* _BIO_free)(BIO*);\r
46 typedef BIO* (__cdecl* _BIO_new_mem_buf)(void*, int);\r
47 typedef long (__cdecl* _BIO_ctrl)(BIO*, int, long, void*);\r
48 typedef void (__cdecl* _X509_free)(X509*);\r
49 typedef int (__cdecl* _X509_print_ex)(BIO*, X509*, unsigned long, unsigned long);\r
50 typedef X509_NAME* (__cdecl* _X509_get_subject_name)(X509*);\r
51 typedef int (__cdecl* _X509_NAME_print_ex)(BIO*, X509_NAME*, int, unsigned long);\r
52 typedef X509* (__cdecl* _PEM_read_bio_X509)(BIO*, X509**, pem_password_cb*, void*);\r
53 typedef int (__cdecl* _X509_STORE_add_cert)(X509_STORE*, X509*);\r
54 \r
55 _SSL_load_error_strings p_SSL_load_error_strings;\r
56 _SSL_library_init p_SSL_library_init;\r
57 _SSLv23_method p_SSLv23_method;\r
58 _SSL_CTX_new p_SSL_CTX_new;\r
59 _SSL_CTX_free p_SSL_CTX_free;\r
60 _SSL_new p_SSL_new;\r
61 _SSL_free p_SSL_free;\r
62 _SSL_shutdown p_SSL_shutdown;\r
63 _SSL_get_fd p_SSL_get_fd;\r
64 _SSL_set_fd p_SSL_set_fd;\r
65 _SSL_accept p_SSL_accept;\r
66 _SSL_connect p_SSL_connect;\r
67 _SSL_write p_SSL_write;\r
68 _SSL_peek p_SSL_peek;\r
69 _SSL_read p_SSL_read;\r
70 _SSL_get_error p_SSL_get_error;\r
71 _SSL_get_peer_certificate p_SSL_get_peer_certificate;\r
72 _SSL_get_verify_result p_SSL_get_verify_result;\r
73 _SSL_get_session p_SSL_get_session;\r
74 _SSL_set_session p_SSL_set_session;\r
75 _SSL_CTX_get_cert_store p_SSL_CTX_get_cert_store;\r
76 _SSL_CTX_ctrl p_SSL_CTX_ctrl;\r
77 _BIO_s_mem p_BIO_s_mem;\r
78 _BIO_new p_BIO_new;\r
79 _BIO_free p_BIO_free;\r
80 _BIO_new_mem_buf p_BIO_new_mem_buf;\r
81 _BIO_ctrl p_BIO_ctrl;\r
82 _X509_free p_X509_free;\r
83 _X509_print_ex p_X509_print_ex;\r
84 _X509_get_subject_name p_X509_get_subject_name;\r
85 _X509_NAME_print_ex p_X509_NAME_print_ex;\r
86 _PEM_read_bio_X509 p_PEM_read_bio_X509;\r
87 _X509_STORE_add_cert p_X509_STORE_add_cert;\r
88 \r
89 #define MAX_SSL_SOCKET 16\r
90 \r
91 BOOL g_bOpenSSLLoaded;\r
92 HMODULE g_hOpenSSL;\r
93 HMODULE g_hOpenSSLCommon;\r
94 CRITICAL_SECTION g_OpenSSLLock;\r
95 DWORD g_OpenSSLTimeout;\r
96 LPSSLTIMEOUTCALLBACK g_pOpenSSLTimeoutCallback;\r
97 LPSSLCONFIRMCALLBACK g_pOpenSSLConfirmCallback;\r
98 SSL_CTX* g_pOpenSSLCTX;\r
99 SSL* g_pOpenSSLHandle[MAX_SSL_SOCKET];\r
100 \r
101 BOOL __stdcall DefaultSSLTimeoutCallback(BOOL* pbAborted)\r
102 {\r
103         Sleep(100);\r
104         return *pbAborted;\r
105 }\r
106 \r
107 BOOL __stdcall DefaultSSLConfirmCallback(BOOL* pbAborted, BOOL bVerified, LPCSTR Certificate, LPCSTR CommonName)\r
108 {\r
109         return bVerified;\r
110 }\r
111 \r
112 // OpenSSLを初期化\r
113 BOOL LoadOpenSSL()\r
114 {\r
115         if(g_bOpenSSLLoaded)\r
116                 return FALSE;\r
117 #ifdef ENABLE_PROCESS_PROTECTION\r
118         // 同梱するOpenSSLのバージョンに合わせてSHA1ハッシュ値を変更すること\r
119         // ssleay32.dll 1.0.1c\r
120         RegisterTrustedModuleSHA1Hash("\x8A\xB5\x6D\x5E\x0B\x31\x80\x5E\x21\x55\x2D\x6E\x4F\xAF\xB1\x47\x7B\xD3\xB5\x23");\r
121         // libeay32.dll 1.0.1c\r
122         RegisterTrustedModuleSHA1Hash("\xB4\x88\x17\x2E\x5C\x26\x9D\x62\x83\x65\x3A\xC1\x1B\xC9\x6E\x70\x1A\x8D\x6E\x76");\r
123 #endif\r
124         g_hOpenSSL = LoadLibrary("ssleay32.dll");\r
125         // バージョン固定のためlibssl32.dllの読み込みは脆弱性の原因になり得るので廃止\r
126 //      if(!g_hOpenSSL)\r
127 //              g_hOpenSSL = LoadLibrary("libssl32.dll");\r
128         if(!g_hOpenSSL\r
129                 || !(p_SSL_load_error_strings = (_SSL_load_error_strings)GetProcAddress(g_hOpenSSL, "SSL_load_error_strings"))\r
130                 || !(p_SSL_library_init = (_SSL_library_init)GetProcAddress(g_hOpenSSL, "SSL_library_init"))\r
131                 || !(p_SSLv23_method = (_SSLv23_method)GetProcAddress(g_hOpenSSL, "SSLv23_method"))\r
132                 || !(p_SSL_CTX_new = (_SSL_CTX_new)GetProcAddress(g_hOpenSSL, "SSL_CTX_new"))\r
133                 || !(p_SSL_CTX_free = (_SSL_CTX_free)GetProcAddress(g_hOpenSSL, "SSL_CTX_free"))\r
134                 || !(p_SSL_new = (_SSL_new)GetProcAddress(g_hOpenSSL, "SSL_new"))\r
135                 || !(p_SSL_free = (_SSL_free)GetProcAddress(g_hOpenSSL, "SSL_free"))\r
136                 || !(p_SSL_shutdown = (_SSL_shutdown)GetProcAddress(g_hOpenSSL, "SSL_shutdown"))\r
137                 || !(p_SSL_get_fd = (_SSL_get_fd)GetProcAddress(g_hOpenSSL, "SSL_get_fd"))\r
138                 || !(p_SSL_set_fd = (_SSL_set_fd)GetProcAddress(g_hOpenSSL, "SSL_set_fd"))\r
139                 || !(p_SSL_accept = (_SSL_accept)GetProcAddress(g_hOpenSSL, "SSL_accept"))\r
140                 || !(p_SSL_connect = (_SSL_connect)GetProcAddress(g_hOpenSSL, "SSL_connect"))\r
141                 || !(p_SSL_write = (_SSL_write)GetProcAddress(g_hOpenSSL, "SSL_write"))\r
142                 || !(p_SSL_peek = (_SSL_peek)GetProcAddress(g_hOpenSSL, "SSL_peek"))\r
143                 || !(p_SSL_read = (_SSL_read)GetProcAddress(g_hOpenSSL, "SSL_read"))\r
144                 || !(p_SSL_get_error = (_SSL_get_error)GetProcAddress(g_hOpenSSL, "SSL_get_error"))\r
145                 || !(p_SSL_get_peer_certificate = (_SSL_get_peer_certificate)GetProcAddress(g_hOpenSSL, "SSL_get_peer_certificate"))\r
146                 || !(p_SSL_get_verify_result = (_SSL_get_verify_result)GetProcAddress(g_hOpenSSL, "SSL_get_verify_result"))\r
147                 || !(p_SSL_get_session = (_SSL_get_session)GetProcAddress(g_hOpenSSL, "SSL_get_session"))\r
148                 || !(p_SSL_set_session = (_SSL_set_session)GetProcAddress(g_hOpenSSL, "SSL_set_session"))\r
149                 || !(p_SSL_CTX_get_cert_store = (_SSL_CTX_get_cert_store)GetProcAddress(g_hOpenSSL, "SSL_CTX_get_cert_store"))\r
150                 || !(p_SSL_CTX_ctrl = (_SSL_CTX_ctrl)GetProcAddress(g_hOpenSSL, "SSL_CTX_ctrl")))\r
151         {\r
152                 if(g_hOpenSSL)\r
153                         FreeLibrary(g_hOpenSSL);\r
154                 g_hOpenSSL = NULL;\r
155                 return FALSE;\r
156         }\r
157         g_hOpenSSLCommon = LoadLibrary("libeay32.dll");\r
158         if(!g_hOpenSSLCommon\r
159                 || !(p_BIO_s_mem = (_BIO_s_mem)GetProcAddress(g_hOpenSSLCommon, "BIO_s_mem"))\r
160                 || !(p_BIO_new = (_BIO_new)GetProcAddress(g_hOpenSSLCommon, "BIO_new"))\r
161                 || !(p_BIO_free = (_BIO_free)GetProcAddress(g_hOpenSSLCommon, "BIO_free"))\r
162                 || !(p_BIO_new_mem_buf = (_BIO_new_mem_buf)GetProcAddress(g_hOpenSSLCommon, "BIO_new_mem_buf"))\r
163                 || !(p_BIO_ctrl = (_BIO_ctrl)GetProcAddress(g_hOpenSSLCommon, "BIO_ctrl"))\r
164                 || !(p_X509_free = (_X509_free)GetProcAddress(g_hOpenSSLCommon, "X509_free"))\r
165                 || !(p_X509_print_ex = (_X509_print_ex)GetProcAddress(g_hOpenSSLCommon, "X509_print_ex"))\r
166                 || !(p_X509_get_subject_name = (_X509_get_subject_name)GetProcAddress(g_hOpenSSLCommon, "X509_get_subject_name"))\r
167                 || !(p_X509_NAME_print_ex = (_X509_NAME_print_ex)GetProcAddress(g_hOpenSSLCommon, "X509_NAME_print_ex"))\r
168                 || !(p_PEM_read_bio_X509 = (_PEM_read_bio_X509)GetProcAddress(g_hOpenSSLCommon, "PEM_read_bio_X509"))\r
169                 || !(p_X509_STORE_add_cert = (_X509_STORE_add_cert)GetProcAddress(g_hOpenSSLCommon, "X509_STORE_add_cert")))\r
170         {\r
171                 if(g_hOpenSSL)\r
172                         FreeLibrary(g_hOpenSSL);\r
173                 g_hOpenSSL = NULL;\r
174                 if(g_hOpenSSLCommon)\r
175                         FreeLibrary(g_hOpenSSLCommon);\r
176                 g_hOpenSSLCommon = NULL;\r
177                 return FALSE;\r
178         }\r
179         InitializeCriticalSection(&g_OpenSSLLock);\r
180         p_SSL_load_error_strings();\r
181         p_SSL_library_init();\r
182         SetSSLTimeoutCallback(60000, DefaultSSLTimeoutCallback);\r
183         SetSSLConfirmCallback(DefaultSSLConfirmCallback);\r
184         g_bOpenSSLLoaded = TRUE;\r
185         return TRUE;\r
186 }\r
187 \r
188 // OpenSSLを解放\r
189 void FreeOpenSSL()\r
190 {\r
191         int i;\r
192         if(!g_bOpenSSLLoaded)\r
193                 return;\r
194         EnterCriticalSection(&g_OpenSSLLock);\r
195         for(i = 0; i < MAX_SSL_SOCKET; i++)\r
196         {\r
197                 if(g_pOpenSSLHandle[i])\r
198                 {\r
199                         p_SSL_shutdown(g_pOpenSSLHandle[i]);\r
200                         p_SSL_free(g_pOpenSSLHandle[i]);\r
201                         g_pOpenSSLHandle[i] = NULL;\r
202                 }\r
203         }\r
204         if(g_pOpenSSLCTX)\r
205                 p_SSL_CTX_free(g_pOpenSSLCTX);\r
206         g_pOpenSSLCTX = NULL;\r
207         FreeLibrary(g_hOpenSSL);\r
208         g_hOpenSSL = NULL;\r
209         FreeLibrary(g_hOpenSSLCommon);\r
210         g_hOpenSSLCommon = NULL;\r
211         LeaveCriticalSection(&g_OpenSSLLock);\r
212         DeleteCriticalSection(&g_OpenSSLLock);\r
213         g_bOpenSSLLoaded = FALSE;\r
214 }\r
215 \r
216 // OpenSSLが使用可能かどうか確認\r
217 BOOL IsOpenSSLLoaded()\r
218 {\r
219         return g_bOpenSSLLoaded;\r
220 }\r
221 \r
222 SSL** GetUnusedSSLPointer()\r
223 {\r
224         int i;\r
225         for(i = 0; i < MAX_SSL_SOCKET; i++)\r
226         {\r
227                 if(!g_pOpenSSLHandle[i])\r
228                         return &g_pOpenSSLHandle[i];\r
229         }\r
230         return NULL;\r
231 }\r
232 \r
233 SSL** FindSSLPointerFromSocket(SOCKET s)\r
234 {\r
235         int i;\r
236         for(i = 0; i < MAX_SSL_SOCKET; i++)\r
237         {\r
238                 if(g_pOpenSSLHandle[i])\r
239                 {\r
240                         if(p_SSL_get_fd(g_pOpenSSLHandle[i]) == s)\r
241                                 return &g_pOpenSSLHandle[i];\r
242                 }\r
243         }\r
244         return NULL;\r
245 }\r
246 \r
247 BOOL ConfirmSSLCertificate(SSL* pSSL, BOOL* pbAborted)\r
248 {\r
249         BOOL bResult;\r
250         BOOL bVerified;\r
251         char* pData;\r
252         char* pSubject;\r
253         X509* pX509;\r
254         BIO* pBIO;\r
255         long Length;\r
256         char* pBuffer;\r
257         char* pCN;\r
258         char* p;\r
259         bResult = FALSE;\r
260         bVerified = FALSE;\r
261         pData = NULL;\r
262         pSubject = NULL;\r
263         if(pX509 = p_SSL_get_peer_certificate(pSSL))\r
264         {\r
265                 if(pBIO = p_BIO_new(p_BIO_s_mem()))\r
266                 {\r
267                         p_X509_print_ex(pBIO, pX509, 0, XN_FLAG_RFC2253);\r
268                         if((Length = p_BIO_ctrl(pBIO, BIO_CTRL_INFO, 0, &pBuffer)) > 0)\r
269                         {\r
270                                 if(pData = (char*)malloc(Length + sizeof(char)))\r
271                                 {\r
272                                         memcpy(pData, pBuffer, Length);\r
273                                         *(char*)((size_t)pData + Length) = '\0';\r
274                                 }\r
275                         }\r
276                         p_BIO_free(pBIO);\r
277                 }\r
278                 if(pBIO = p_BIO_new(p_BIO_s_mem()))\r
279                 {\r
280                         p_X509_NAME_print_ex(pBIO, p_X509_get_subject_name(pX509), 0, XN_FLAG_RFC2253);\r
281                         if((Length = p_BIO_ctrl(pBIO, BIO_CTRL_INFO, 0, &pBuffer)) > 0)\r
282                         {\r
283                                 if(pSubject = (char*)malloc(Length + sizeof(char)))\r
284                                 {\r
285                                         memcpy(pSubject, pBuffer, Length);\r
286                                         *(char*)((size_t)pSubject + Length) = '\0';\r
287                                 }\r
288                         }\r
289                         p_BIO_free(pBIO);\r
290                 }\r
291                 p_X509_free(pX509);\r
292         }\r
293         if(pX509 && p_SSL_get_verify_result(pSSL) == X509_V_OK)\r
294                 bVerified = TRUE;\r
295         pCN = pSubject;\r
296         while(pCN)\r
297         {\r
298                 if(strncmp(pCN, "CN=", strlen("CN=")) == 0)\r
299                 {\r
300                         pCN += strlen("CN=");\r
301                         if(p = strchr(pCN, ','))\r
302                                 *p = '\0';\r
303                         break;\r
304                 }\r
305                 if(pCN = strchr(pCN, ','))\r
306                         pCN++;\r
307         }\r
308         bResult = g_pOpenSSLConfirmCallback(pbAborted, bVerified, pData, pCN);\r
309         if(pData)\r
310                 free(pData);\r
311         if(pSubject)\r
312                 free(pSubject);\r
313         return bResult;\r
314 }\r
315 \r
316 void SetSSLTimeoutCallback(DWORD Timeout, LPSSLTIMEOUTCALLBACK pCallback)\r
317 {\r
318         if(!g_bOpenSSLLoaded)\r
319                 return;\r
320         EnterCriticalSection(&g_OpenSSLLock);\r
321         g_OpenSSLTimeout = Timeout;\r
322         g_pOpenSSLTimeoutCallback = pCallback;\r
323         LeaveCriticalSection(&g_OpenSSLLock);\r
324 }\r
325 \r
326 void SetSSLConfirmCallback(LPSSLCONFIRMCALLBACK pCallback)\r
327 {\r
328         if(!g_bOpenSSLLoaded)\r
329                 return;\r
330         EnterCriticalSection(&g_OpenSSLLock);\r
331         g_pOpenSSLConfirmCallback = pCallback;\r
332         LeaveCriticalSection(&g_OpenSSLLock);\r
333 }\r
334 \r
335 // SSLルート証明書を設定\r
336 // PEM形式のみ指定可能\r
337 BOOL SetSSLRootCertificate(const void* pData, DWORD Length)\r
338 {\r
339         BOOL r;\r
340         X509_STORE* pStore;\r
341         BYTE* p;\r
342         BYTE* pBegin;\r
343         BYTE* pEnd;\r
344         BIO* pBIO;\r
345         X509* pX509;\r
346         if(!g_bOpenSSLLoaded)\r
347                 return FALSE;\r
348         r = FALSE;\r
349         EnterCriticalSection(&g_OpenSSLLock);\r
350         if(!g_pOpenSSLCTX)\r
351         {\r
352                 g_pOpenSSLCTX = p_SSL_CTX_new(p_SSLv23_method());\r
353                 p_SSL_CTX_ctrl(g_pOpenSSLCTX, SSL_CTRL_MODE, SSL_MODE_ENABLE_PARTIAL_WRITE | SSL_MODE_AUTO_RETRY, NULL);\r
354         }\r
355         if(g_pOpenSSLCTX)\r
356         {\r
357                 if(pStore = p_SSL_CTX_get_cert_store(g_pOpenSSLCTX))\r
358                 {\r
359                         p = (BYTE*)pData;\r
360                         pBegin = NULL;\r
361                         pEnd = NULL;\r
362                         while(Length > 0)\r
363                         {\r
364                                 if(!pBegin)\r
365                                 {\r
366                                         if(Length < 27)\r
367                                                 break;\r
368                                         if(memcmp(p, "-----BEGIN CERTIFICATE-----", 27) == 0)\r
369                                                 pBegin = p;\r
370                                 }\r
371                                 else if(!pEnd)\r
372                                 {\r
373                                         if(Length < 25)\r
374                                                 break;\r
375                                         if(memcmp(p, "-----END CERTIFICATE-----", 25) == 0)\r
376                                                 pEnd = p + 25;\r
377                                 }\r
378                                 if(pBegin && pEnd)\r
379                                 {\r
380                                         if(pBIO = p_BIO_new_mem_buf(pBegin, (int)((size_t)pEnd - (size_t)pBegin)))\r
381                                         {\r
382                                                 if(pX509 = p_PEM_read_bio_X509(pBIO, NULL, NULL, NULL))\r
383                                                 {\r
384                                                         if(p_X509_STORE_add_cert(pStore, pX509) == 1)\r
385                                                                 r = TRUE;\r
386                                                         p_X509_free(pX509);\r
387                                                 }\r
388                                                 p_BIO_free(pBIO);\r
389                                         }\r
390                                         pBegin = NULL;\r
391                                         pEnd = NULL;\r
392                                 }\r
393                                 p++;\r
394                                 Length--;\r
395                         }\r
396                 }\r
397         }\r
398         LeaveCriticalSection(&g_OpenSSLLock);\r
399         return r;\r
400 }\r
401 \r
402 // ワイルドカードの比較\r
403 // 主にSSL証明書のCN確認用\r
404 BOOL IsHostNameMatched(LPCSTR HostName, LPCSTR CommonName)\r
405 {\r
406         BOOL bResult;\r
407         const char* pAsterisk;\r
408         size_t BeforeAsterisk;\r
409         const char* pBeginAsterisk;\r
410         const char* pEndAsterisk;\r
411         const char* pDot;\r
412         bResult = FALSE;\r
413         if(HostName && CommonName)\r
414         {\r
415                 if(pAsterisk = strchr(CommonName, '*'))\r
416                 {\r
417                         BeforeAsterisk = ((size_t)pAsterisk - (size_t)CommonName) / sizeof(char);\r
418                         pBeginAsterisk = HostName + BeforeAsterisk;\r
419                         while(*pAsterisk == '*')\r
420                         {\r
421                                 pAsterisk++;\r
422                         }\r
423                         pEndAsterisk = HostName + strlen(HostName) - strlen(pAsterisk);\r
424                         // "*"より前は大文字小文字を無視して完全一致\r
425                         if(_strnicmp(HostName, CommonName, BeforeAsterisk) == 0)\r
426                         {\r
427                                 // "*"より後は大文字小文字を無視して完全一致\r
428                                 if(_stricmp(pEndAsterisk, pAsterisk) == 0)\r
429                                 {\r
430                                         // "*"と一致する範囲に"."が含まれてはならない\r
431                                         pDot = strchr(pBeginAsterisk, '.');\r
432                                         if(!pDot || pDot >= pEndAsterisk)\r
433                                                 bResult = TRUE;\r
434                                 }\r
435                         }\r
436                 }\r
437                 else if(_stricmp(HostName, CommonName) == 0)\r
438                         bResult = TRUE;\r
439         }\r
440         return bResult;\r
441 }\r
442 \r
443 // SSLセッションを開始\r
444 BOOL AttachSSL(SOCKET s, SOCKET parent, BOOL* pbAborted)\r
445 {\r
446         BOOL r;\r
447         DWORD Time;\r
448         SSL** ppSSL;\r
449         SSL** ppSSLParent;\r
450         SSL_SESSION* pSession;\r
451         int Return;\r
452         int Error;\r
453         if(!g_bOpenSSLLoaded)\r
454                 return FALSE;\r
455         r = FALSE;\r
456         Time = timeGetTime();\r
457         EnterCriticalSection(&g_OpenSSLLock);\r
458         if(!g_pOpenSSLCTX)\r
459         {\r
460                 g_pOpenSSLCTX = p_SSL_CTX_new(p_SSLv23_method());\r
461                 p_SSL_CTX_ctrl(g_pOpenSSLCTX, SSL_CTRL_MODE, SSL_MODE_ENABLE_PARTIAL_WRITE | SSL_MODE_AUTO_RETRY, NULL);\r
462         }\r
463         if(g_pOpenSSLCTX)\r
464         {\r
465                 if(ppSSL = GetUnusedSSLPointer())\r
466                 {\r
467                         if(*ppSSL = p_SSL_new(g_pOpenSSLCTX))\r
468                         {\r
469                                 if(p_SSL_set_fd(*ppSSL, s) != 0)\r
470                                 {\r
471                                         if(parent != INVALID_SOCKET)\r
472                                         {\r
473                                                 if(ppSSLParent = FindSSLPointerFromSocket(parent))\r
474                                                 {\r
475                                                         if(pSession = p_SSL_get_session(*ppSSLParent))\r
476                                                         {\r
477                                                                 if(p_SSL_set_session(*ppSSL, pSession) == 1)\r
478                                                                 {\r
479                                                                 }\r
480                                                         }\r
481                                                 }\r
482                                         }\r
483                                         // SSLのネゴシエーションには時間がかかる場合がある\r
484                                         r = TRUE;\r
485                                         while(r)\r
486                                         {\r
487                                                 Return = p_SSL_connect(*ppSSL);\r
488                                                 if(Return == 1)\r
489                                                         break;\r
490                                                 Error = p_SSL_get_error(*ppSSL, Return);\r
491                                                 if(Error == SSL_ERROR_WANT_READ || Error == SSL_ERROR_WANT_WRITE)\r
492                                                 {\r
493                                                         LeaveCriticalSection(&g_OpenSSLLock);\r
494                                                         if(g_pOpenSSLTimeoutCallback(pbAborted) || (g_OpenSSLTimeout > 0 && timeGetTime() - Time >= g_OpenSSLTimeout))\r
495                                                                 r = FALSE;\r
496                                                         EnterCriticalSection(&g_OpenSSLLock);\r
497                                                 }\r
498                                                 else\r
499                                                         r = FALSE;\r
500                                         }\r
501                                         if(r)\r
502                                         {\r
503                                                 if(ConfirmSSLCertificate(*ppSSL, pbAborted))\r
504                                                 {\r
505                                                 }\r
506                                                 else\r
507                                                 {\r
508                                                         LeaveCriticalSection(&g_OpenSSLLock);\r
509                                                         DetachSSL(s);\r
510                                                         r = FALSE;\r
511                                                         EnterCriticalSection(&g_OpenSSLLock);\r
512                                                 }\r
513                                         }\r
514                                         else\r
515                                         {\r
516                                                 LeaveCriticalSection(&g_OpenSSLLock);\r
517                                                 DetachSSL(s);\r
518                                                 EnterCriticalSection(&g_OpenSSLLock);\r
519                                         }\r
520                                 }\r
521                                 else\r
522                                 {\r
523                                         LeaveCriticalSection(&g_OpenSSLLock);\r
524                                         DetachSSL(s);\r
525                                         EnterCriticalSection(&g_OpenSSLLock);\r
526                                 }\r
527                         }\r
528                 }\r
529         }\r
530         LeaveCriticalSection(&g_OpenSSLLock);\r
531         return r;\r
532 }\r
533 \r
534 // SSLセッションを終了\r
535 BOOL DetachSSL(SOCKET s)\r
536 {\r
537         BOOL r;\r
538         SSL** ppSSL;\r
539         if(!g_bOpenSSLLoaded)\r
540                 return FALSE;\r
541         r = FALSE;\r
542         EnterCriticalSection(&g_OpenSSLLock);\r
543         if(ppSSL = FindSSLPointerFromSocket(s))\r
544         {\r
545                 p_SSL_shutdown(*ppSSL);\r
546                 p_SSL_free(*ppSSL);\r
547                 *ppSSL = NULL;\r
548                 r = TRUE;\r
549         }\r
550         LeaveCriticalSection(&g_OpenSSLLock);\r
551         return r;\r
552 }\r
553 \r
554 // SSLとしてマークされているか確認\r
555 // マークされていればTRUEを返す\r
556 BOOL IsSSLAttached(SOCKET s)\r
557 {\r
558         SSL** ppSSL;\r
559         if(!g_bOpenSSLLoaded)\r
560                 return FALSE;\r
561         EnterCriticalSection(&g_OpenSSLLock);\r
562         ppSSL = FindSSLPointerFromSocket(s);\r
563         LeaveCriticalSection(&g_OpenSSLLock);\r
564         if(!ppSSL)\r
565                 return FALSE;\r
566         return TRUE;\r
567 }\r
568 \r
569 SOCKET FTPS_socket(int af, int type, int protocol)\r
570 {\r
571         return socket(af, type, protocol);\r
572 }\r
573 \r
574 int FTPS_bind(SOCKET s, const struct sockaddr *addr, int namelen)\r
575 {\r
576         return bind(s, addr, namelen);\r
577 }\r
578 \r
579 int FTPS_listen(SOCKET s, int backlog)\r
580 {\r
581         return listen(s, backlog);\r
582 }\r
583 \r
584 // accept相当の関数\r
585 // ただし初めからSSLのネゴシエーションを行う\r
586 SOCKET FTPS_accept(SOCKET s, struct sockaddr *addr, int *addrlen)\r
587 {\r
588         SOCKET r;\r
589         BOOL bAborted;\r
590         r = accept(s, addr, addrlen);\r
591         bAborted = FALSE;\r
592         if(!AttachSSL(r, INVALID_SOCKET, &bAborted))\r
593         {\r
594                 closesocket(r);\r
595                 return INVALID_SOCKET;\r
596         }\r
597         return r;\r
598 }\r
599 \r
600 // connect相当の関数\r
601 // ただし初めからSSLのネゴシエーションを行う\r
602 int FTPS_connect(SOCKET s, const struct sockaddr *name, int namelen)\r
603 {\r
604         int r;\r
605         BOOL bAborted;\r
606         r = connect(s, name, namelen);\r
607         bAborted = FALSE;\r
608         if(!AttachSSL(r, INVALID_SOCKET, &bAborted))\r
609                 return SOCKET_ERROR;\r
610         return r;\r
611 }\r
612 \r
613 // closesocket相当の関数\r
614 int FTPS_closesocket(SOCKET s)\r
615 {\r
616         DetachSSL(s);\r
617         return closesocket(s);\r
618 }\r
619 \r
620 // send相当の関数\r
621 int FTPS_send(SOCKET s, const char * buf, int len, int flags)\r
622 {\r
623         int r;\r
624         SSL** ppSSL;\r
625         if(!g_bOpenSSLLoaded)\r
626                 return send(s, buf, len, flags);\r
627         EnterCriticalSection(&g_OpenSSLLock);\r
628         ppSSL = FindSSLPointerFromSocket(s);\r
629         LeaveCriticalSection(&g_OpenSSLLock);\r
630         if(!ppSSL)\r
631                 return send(s, buf, len, flags);\r
632         r = p_SSL_write(*ppSSL, buf, len);\r
633         if(r < 0)\r
634                 return SOCKET_ERROR;\r
635         return r;\r
636 }\r
637 \r
638 // recv相当の関数\r
639 int FTPS_recv(SOCKET s, char * buf, int len, int flags)\r
640 {\r
641         int r;\r
642         SSL** ppSSL;\r
643         if(!g_bOpenSSLLoaded)\r
644                 return recv(s, buf, len, flags);\r
645         EnterCriticalSection(&g_OpenSSLLock);\r
646         ppSSL = FindSSLPointerFromSocket(s);\r
647         LeaveCriticalSection(&g_OpenSSLLock);\r
648         if(!ppSSL)\r
649                 return recv(s, buf, len, flags);\r
650         if(flags & MSG_PEEK)\r
651                 r = p_SSL_peek(*ppSSL, buf, len);\r
652         else\r
653                 r = p_SSL_read(*ppSSL, buf, len);\r
654         if(r < 0)\r
655                 return SOCKET_ERROR;\r
656         return r;\r
657 }\r
658 \r
659 // IPv6対応\r
660 \r
661 const struct in6_addr IN6ADDR_NONE = {{0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}};\r
662 \r
663 typedef struct\r
664 {\r
665         HANDLE h;\r
666         HWND hWnd;\r
667         u_int wMsg;\r
668         char * name;\r
669         char * buf;\r
670         int buflen;\r
671         short Family;\r
672 } GETHOSTBYNAMEDATA;\r
673 \r
674 DWORD WINAPI WSAAsyncGetHostByNameIPv6ThreadProc(LPVOID lpParameter)\r
675 {\r
676         GETHOSTBYNAMEDATA* pData;\r
677         struct hostent* pHost;\r
678         struct addrinfo* pAddr;\r
679         struct addrinfo* p;\r
680         pHost = NULL;\r
681         pData = (GETHOSTBYNAMEDATA*)lpParameter;\r
682         if(getaddrinfo(pData->name, NULL, NULL, &pAddr) == 0)\r
683         {\r
684                 p = pAddr;\r
685                 while(p)\r
686                 {\r
687                         if(p->ai_family == pData->Family)\r
688                         {\r
689                                 switch(p->ai_family)\r
690                                 {\r
691                                 case AF_INET:\r
692                                         pHost = (struct hostent*)pData->buf;\r
693                                         if((size_t)pData->buflen >= sizeof(struct hostent) + sizeof(char*) * 2 + sizeof(struct in_addr)\r
694                                                 && p->ai_addrlen >= sizeof(struct sockaddr_in))\r
695                                         {\r
696                                                 pHost->h_name = NULL;\r
697                                                 pHost->h_aliases = NULL;\r
698                                                 pHost->h_addrtype = p->ai_family;\r
699                                                 pHost->h_length = sizeof(struct in_addr);\r
700                                                 pHost->h_addr_list = (char**)(&pHost[1]);\r
701                                                 pHost->h_addr_list[0] = (char*)(&pHost->h_addr_list[2]);\r
702                                                 pHost->h_addr_list[1] = NULL;\r
703                                                 memcpy(pHost->h_addr_list[0], &((struct sockaddr_in*)p->ai_addr)->sin_addr, sizeof(struct in_addr));\r
704                                                 PostMessage(pData->hWnd, pData->wMsg, (WPARAM)pData->h, (LPARAM)(sizeof(struct hostent) + sizeof(char*) * 2 + sizeof(struct in_addr)));\r
705                                         }\r
706                                         else\r
707                                                 PostMessage(pData->hWnd, pData->wMsg, (WPARAM)pData->h, (LPARAM)(WSAENOBUFS << 16));\r
708                                         break;\r
709                                 case AF_INET6:\r
710                                         pHost = (struct hostent*)pData->buf;\r
711                                         if((size_t)pData->buflen >= sizeof(struct hostent) + sizeof(char*) * 2 + sizeof(struct in6_addr)\r
712                                                 && p->ai_addrlen >= sizeof(struct sockaddr_in6))\r
713                                         {\r
714                                                 pHost->h_name = NULL;\r
715                                                 pHost->h_aliases = NULL;\r
716                                                 pHost->h_addrtype = p->ai_family;\r
717                                                 pHost->h_length = sizeof(struct in6_addr);\r
718                                                 pHost->h_addr_list = (char**)(&pHost[1]);\r
719                                                 pHost->h_addr_list[0] = (char*)(&pHost->h_addr_list[2]);\r
720                                                 pHost->h_addr_list[1] = NULL;\r
721                                                 memcpy(pHost->h_addr_list[0], &((struct sockaddr_in6*)p->ai_addr)->sin6_addr, sizeof(struct in6_addr));\r
722                                                 PostMessage(pData->hWnd, pData->wMsg, (WPARAM)pData->h, (LPARAM)(sizeof(struct hostent) + sizeof(char*) * 2 + sizeof(struct in6_addr)));\r
723                                         }\r
724                                         else\r
725                                                 PostMessage(pData->hWnd, pData->wMsg, (WPARAM)pData->h, (LPARAM)(WSAENOBUFS << 16));\r
726                                         break;\r
727                                 }\r
728                         }\r
729                         if(pHost)\r
730                                 break;\r
731                         p = p->ai_next;\r
732                 }\r
733                 if(!p)\r
734                         PostMessage(pData->hWnd, pData->wMsg, (WPARAM)pData->h, (LPARAM)(ERROR_INVALID_FUNCTION << 16));\r
735                 freeaddrinfo(pAddr);\r
736         }\r
737         else\r
738                 PostMessage(pData->hWnd, pData->wMsg, (WPARAM)pData->h, (LPARAM)(ERROR_INVALID_FUNCTION << 16));\r
739         // CreateThreadが返すハンドルが重複するのを回避\r
740         Sleep(10000);\r
741         CloseHandle(pData->h);\r
742         free(pData->name);\r
743         free(pData);\r
744         return 0;\r
745 }\r
746 \r
747 // IPv6対応のWSAAsyncGetHostByName相当の関数\r
748 // FamilyにはAF_INETまたはAF_INET6を指定可能\r
749 // ただしANSI用\r
750 HANDLE WSAAsyncGetHostByNameIPv6(HWND hWnd, u_int wMsg, const char * name, char * buf, int buflen, short Family)\r
751 {\r
752         HANDLE hResult;\r
753         GETHOSTBYNAMEDATA* pData;\r
754         hResult = NULL;\r
755         if(pData = malloc(sizeof(GETHOSTBYNAMEDATA)))\r
756         {\r
757                 pData->hWnd = hWnd;\r
758                 pData->wMsg = wMsg;\r
759                 if(pData->name = malloc(sizeof(char) * (strlen(name) + 1)))\r
760                 {\r
761                         strcpy(pData->name, name);\r
762                         pData->buf = buf;\r
763                         pData->buflen = buflen;\r
764                         pData->Family = Family;\r
765                         if(pData->h = CreateThread(NULL, 0, WSAAsyncGetHostByNameIPv6ThreadProc, pData, CREATE_SUSPENDED, NULL))\r
766                         {\r
767                                 ResumeThread(pData->h);\r
768                                 hResult = pData->h;\r
769                         }\r
770                 }\r
771         }\r
772         if(!hResult)\r
773         {\r
774                 if(pData)\r
775                 {\r
776                         if(pData->name)\r
777                                 free(pData->name);\r
778                         free(pData);\r
779                 }\r
780         }\r
781         return hResult;\r
782 }\r
783 \r
784 // WSAAsyncGetHostByNameIPv6用のWSACancelAsyncRequest相当の関数\r
785 int WSACancelAsyncRequestIPv6(HANDLE hAsyncTaskHandle)\r
786 {\r
787         int Result;\r
788         Result = SOCKET_ERROR;\r
789         if(TerminateThread(hAsyncTaskHandle, 0))\r
790         {\r
791                 CloseHandle(hAsyncTaskHandle);\r
792                 Result = 0;\r
793         }\r
794         return Result;\r
795 }\r
796 \r
797 char* AddressToStringIPv6(char* str, void* in6)\r
798 {\r
799         char* pResult;\r
800         unsigned char* p;\r
801         int MaxZero;\r
802         int MaxZeroLen;\r
803         int i;\r
804         int j;\r
805         char Tmp[5];\r
806         pResult = str;\r
807         p = (unsigned char*)in6;\r
808         MaxZero = 8;\r
809         MaxZeroLen = 1;\r
810         for(i = 0; i < 8; i++)\r
811         {\r
812                 for(j = i; j < 8; j++)\r
813                 {\r
814                         if(p[j * 2] != 0 || p[j * 2 + 1] != 0)\r
815                                 break;\r
816                 }\r
817                 if(j - i > MaxZeroLen)\r
818                 {\r
819                         MaxZero = i;\r
820                         MaxZeroLen = j - i;\r
821                 }\r
822         }\r
823         strcpy(str, "");\r
824         for(i = 0; i < 8; i++)\r
825         {\r
826                 if(i == MaxZero)\r
827                 {\r
828                         if(i == 0)\r
829                                 strcat(str, ":");\r
830                         strcat(str, ":");\r
831                 }\r
832                 else if(i < MaxZero || i >= MaxZero + MaxZeroLen)\r
833                 {\r
834                         sprintf(Tmp, "%x", (((int)p[i * 2] & 0xff) << 8) | ((int)p[i * 2 + 1] & 0xff));\r
835                         strcat(str, Tmp);\r
836                         if(i < 7)\r
837                                 strcat(str, ":");\r
838                 }\r
839         }\r
840         return pResult;\r
841 }\r
842 \r
843 // IPv6対応のinet_ntoa相当の関数\r
844 // ただしANSI用\r
845 char* inet6_ntoa(struct in6_addr in6)\r
846 {\r
847         char* pResult;\r
848         static char Adrs[40];\r
849         pResult = NULL;\r
850         memset(Adrs, 0, sizeof(Adrs));\r
851         pResult = AddressToStringIPv6(Adrs, &in6);\r
852         return pResult;\r
853 }\r
854 \r
855 // IPv6対応のinet_addr相当の関数\r
856 // ただしANSI用\r
857 struct in6_addr inet6_addr(const char* cp)\r
858 {\r
859         struct in6_addr Result;\r
860         int AfterZero;\r
861         int i;\r
862         char* p;\r
863         memset(&Result, 0, sizeof(Result));\r
864         AfterZero = 0;\r
865         for(i = 0; i < 8; i++)\r
866         {\r
867                 if(!cp)\r
868                 {\r
869                         memcpy(&Result, &IN6ADDR_NONE, sizeof(struct in6_addr));\r
870                         break;\r
871                 }\r
872                 if(i >= AfterZero)\r
873                 {\r
874                         if(strncmp(cp, ":", 1) == 0)\r
875                         {\r
876                                 cp = cp + 1;\r
877                                 if(i == 0 && strncmp(cp, ":", 1) == 0)\r
878                                         cp = cp + 1;\r
879                                 p = (char*)cp;\r
880                                 AfterZero = 7;\r
881                                 while(p = strstr(p, ":"))\r
882                                 {\r
883                                         p = p + 1;\r
884                                         AfterZero--;\r
885                                 }\r
886                         }\r
887                         else\r
888                         {\r
889                                 Result.u.Word[i] = (USHORT)strtol(cp, &p, 16);\r
890                                 Result.u.Word[i] = ((Result.u.Word[i] & 0xff00) >> 8) | ((Result.u.Word[i] & 0x00ff) << 8);\r
891                                 if(strncmp(p, ":", 1) != 0 && strlen(p) > 0)\r
892                                 {\r
893                                         memcpy(&Result, &IN6ADDR_NONE, sizeof(struct in6_addr));\r
894                                         break;\r
895                                 }\r
896                                 if(cp = strstr(cp, ":"))\r
897                                         cp = cp + 1;\r
898                         }\r
899                 }\r
900         }\r
901         return Result;\r
902 }\r
903 \r
904 BOOL ConvertDomainNameToPunycode(LPSTR Output, DWORD Count, LPCSTR Input)\r
905 {\r
906         BOOL bResult;\r
907         punycode_uint* pUnicode;\r
908         punycode_uint* p;\r
909         BOOL bNeeded;\r
910         LPCSTR InputString;\r
911         punycode_uint Length;\r
912         punycode_uint OutputLength;\r
913         bResult = FALSE;\r
914         if(pUnicode = malloc(sizeof(punycode_uint) * strlen(Input)))\r
915         {\r
916                 p = pUnicode;\r
917                 bNeeded = FALSE;\r
918                 InputString = Input;\r
919                 Length = 0;\r
920                 while(*InputString != '\0')\r
921                 {\r
922                         *p = (punycode_uint)GetNextCharM(InputString, NULL, &InputString);\r
923                         if(*p >= 0x80)\r
924                                 bNeeded = TRUE;\r
925                         p++;\r
926                         Length++;\r
927                 }\r
928                 if(bNeeded)\r
929                 {\r
930                         if(Count >= strlen("xn--") + 1)\r
931                         {\r
932                                 strcpy(Output, "xn--");\r
933                                 OutputLength = Count - strlen("xn--");\r
934                                 if(punycode_encode(Length, pUnicode, NULL, (punycode_uint*)&OutputLength, Output + strlen("xn--")) == punycode_success)\r
935                                 {\r
936                                         Output[strlen("xn--") + OutputLength] = '\0';\r
937                                         bResult = TRUE;\r
938                                 }\r
939                         }\r
940                 }\r
941                 free(pUnicode);\r
942         }\r
943         if(!bResult)\r
944         {\r
945                 if(Count >= strlen(Input) + 1)\r
946                 {\r
947                         strcpy(Output, Input);\r
948                         bResult = TRUE;\r
949                 }\r
950         }\r
951         return bResult;\r
952 }\r
953 \r
954 BOOL ConvertNameToPunycode(LPSTR Output, LPCSTR Input)\r
955 {\r
956         BOOL bResult;\r
957         DWORD Length;\r
958         char* pm0;\r
959         char* pm1;\r
960         char* p;\r
961         char* pNext;\r
962         bResult = FALSE;\r
963         Length = strlen(Input);\r
964         if(pm0 = AllocateStringM(Length + 1))\r
965         {\r
966                 if(pm1 = AllocateStringM(Length * 4 + 1))\r
967                 {\r
968                         strcpy(pm0, Input);\r
969                         p = pm0;\r
970                         while(p)\r
971                         {\r
972                                 if(pNext = strchr(p, '.'))\r
973                                 {\r
974                                         *pNext = '\0';\r
975                                         pNext++;\r
976                                 }\r
977                                 if(ConvertDomainNameToPunycode(pm1, Length * 4, p))\r
978                                         strcat(Output, pm1);\r
979                                 if(pNext)\r
980                                         strcat(Output, ".");\r
981                                 p = pNext;\r
982                         }\r
983                         bResult = TRUE;\r
984                         FreeDuplicatedString(pm1);\r
985                 }\r
986                 FreeDuplicatedString(pm0);\r
987         }\r
988         return bResult;\r
989 }\r
990 \r
991 HANDLE WSAAsyncGetHostByNameM(HWND hWnd, u_int wMsg, const char * name, char * buf, int buflen)\r
992 {\r
993         HANDLE r = NULL;\r
994         char* pa0 = NULL;\r
995         if(pa0 = AllocateStringA(strlen(name) * 4))\r
996         {\r
997                 if(ConvertNameToPunycode(pa0, name))\r
998                         r = WSAAsyncGetHostByName(hWnd, wMsg, pa0, buf, buflen);\r
999         }\r
1000         FreeDuplicatedString(pa0);\r
1001         return r;\r
1002 }\r
1003 \r
1004 HANDLE WSAAsyncGetHostByNameIPv6M(HWND hWnd, u_int wMsg, const char * name, char * buf, int buflen, short Family)\r
1005 {\r
1006         HANDLE r = NULL;\r
1007         char* pa0 = NULL;\r
1008         if(pa0 = AllocateStringA(strlen(name) * 4))\r
1009         {\r
1010                 if(ConvertNameToPunycode(pa0, name))\r
1011                         r = WSAAsyncGetHostByNameIPv6(hWnd, wMsg, pa0, buf, buflen, Family);\r
1012         }\r
1013         FreeDuplicatedString(pa0);\r
1014         return r;\r
1015 }\r
1016 \r