X-Git-Url: http://git.sourceforge.jp/view?p=ffftp%2Fffftp.git;a=blobdiff_plain;f=socketwrapper.c;h=6ebe36dc2be0a5ec211c58678cdf495261ab52bf;hp=e4f03b09def730da64aaeb3573c83fda54076c61;hb=8ef4e07fd1e721b0181b517444b4dffc859e9c09;hpb=ad3b10e51a7979c545702209fa574c62e41253f7;ds=sidebyside diff --git a/socketwrapper.c b/socketwrapper.c index e4f03b0..6ebe36d 100644 --- a/socketwrapper.c +++ b/socketwrapper.c @@ -1,312 +1,1331 @@ -// socketwrapper.cpp -// Copyright (C) 2011 Suguru Kawamoto -// ƒ\ƒPƒbƒgƒ‰ƒbƒp[ -// socketŠÖ˜AŠÖ”‚ðOpenSSL—p‚É’uŠ· -// ƒRƒ“ƒpƒCƒ‹‚É‚ÍOpenSSL‚̃wƒbƒ_[ƒtƒ@ƒCƒ‹‚ª•K—v -// ŽÀs‚É‚ÍOpenSSL‚ÌDLL‚ª•K—v - -#include -#include -#include - -#include "socketwrapper.h" - -typedef void (__cdecl* _SSL_load_error_strings)(); -typedef int (__cdecl* _SSL_library_init)(); -typedef SSL_METHOD* (__cdecl* _SSLv23_method)(); -typedef SSL_CTX* (__cdecl* _SSL_CTX_new)(SSL_METHOD*); -typedef void (__cdecl* _SSL_CTX_free)(SSL_CTX*); -typedef SSL* (__cdecl* _SSL_new)(SSL_CTX*); -typedef void (__cdecl* _SSL_free)(SSL*); -typedef int (__cdecl* _SSL_shutdown)(SSL*); -typedef int (__cdecl* _SSL_get_fd)(SSL*); -typedef int (__cdecl* _SSL_set_fd)(SSL*, int); -typedef int (__cdecl* _SSL_accept)(SSL*); -typedef int (__cdecl* _SSL_connect)(SSL*); -typedef int (__cdecl* _SSL_write)(SSL*, const void*, int); -typedef int (__cdecl* _SSL_peek)(SSL*, void*, int); -typedef int (__cdecl* _SSL_read)(SSL*, void*, int); -typedef int (__cdecl* _SSL_get_error)(SSL*, int); - -_SSL_load_error_strings pSSL_load_error_strings; -_SSL_library_init pSSL_library_init; -_SSLv23_method pSSLv23_method; -_SSL_CTX_new pSSL_CTX_new; -_SSL_CTX_free pSSL_CTX_free; -_SSL_new pSSL_new; -_SSL_free pSSL_free; -_SSL_shutdown pSSL_shutdown; -_SSL_get_fd pSSL_get_fd; -_SSL_set_fd pSSL_set_fd; -_SSL_accept pSSL_accept; -_SSL_connect pSSL_connect; -_SSL_write pSSL_write; -_SSL_peek pSSL_peek; -_SSL_read pSSL_read; -_SSL_get_error pSSL_get_error; - -#define MAX_SSL_SOCKET 16 - -BOOL g_bOpenSSLLoaded; -HMODULE g_hOpenSSL; -CRITICAL_SECTION g_OpenSSLLock; -DWORD g_OpenSSLTimeout; -LPSSLTIMEOUTCALLBACK g_pOpenSSLTimeoutCallback; -SSL_CTX* g_pOpenSSLCTX; -SSL* g_pOpenSSLHandle[MAX_SSL_SOCKET]; - -BOOL __stdcall DefaultSSLTimeoutCallback() -{ - Sleep(100); - return FALSE; -} - -BOOL LoadOpenSSL() -{ - if(g_bOpenSSLLoaded) - return FALSE; - g_hOpenSSL = LoadLibrary("ssleay32.dll"); - if(!g_hOpenSSL) - g_hOpenSSL = LoadLibrary("libssl32.dll"); - if(!g_hOpenSSL - || !(pSSL_load_error_strings = (_SSL_load_error_strings)GetProcAddress(g_hOpenSSL, "SSL_load_error_strings")) - || !(pSSL_library_init = (_SSL_library_init)GetProcAddress(g_hOpenSSL, "SSL_library_init")) - || !(pSSLv23_method = (_SSLv23_method)GetProcAddress(g_hOpenSSL, "SSLv23_method")) - || !(pSSL_CTX_new = (_SSL_CTX_new)GetProcAddress(g_hOpenSSL, "SSL_CTX_new")) - || !(pSSL_CTX_free = (_SSL_CTX_free)GetProcAddress(g_hOpenSSL, "SSL_CTX_free")) - || !(pSSL_new = (_SSL_new)GetProcAddress(g_hOpenSSL, "SSL_new")) - || !(pSSL_free = (_SSL_free)GetProcAddress(g_hOpenSSL, "SSL_free")) - || !(pSSL_shutdown = (_SSL_shutdown)GetProcAddress(g_hOpenSSL, "SSL_shutdown")) - || !(pSSL_get_fd = (_SSL_get_fd)GetProcAddress(g_hOpenSSL, "SSL_get_fd")) - || !(pSSL_set_fd = (_SSL_set_fd)GetProcAddress(g_hOpenSSL, "SSL_set_fd")) - || !(pSSL_accept = (_SSL_accept)GetProcAddress(g_hOpenSSL, "SSL_accept")) - || !(pSSL_connect = (_SSL_connect)GetProcAddress(g_hOpenSSL, "SSL_connect")) - || !(pSSL_write = (_SSL_write)GetProcAddress(g_hOpenSSL, "SSL_write")) - || !(pSSL_peek = (_SSL_peek)GetProcAddress(g_hOpenSSL, "SSL_peek")) - || !(pSSL_read = (_SSL_read)GetProcAddress(g_hOpenSSL, "SSL_read")) - || !(pSSL_get_error = (_SSL_get_error)GetProcAddress(g_hOpenSSL, "SSL_get_error"))) - { - if(g_hOpenSSL) - FreeLibrary(g_hOpenSSL); - g_hOpenSSL = NULL; - return FALSE; - } - InitializeCriticalSection(&g_OpenSSLLock); - pSSL_load_error_strings(); - pSSL_library_init(); - SetSSLTimeoutCallback(60000, DefaultSSLTimeoutCallback); - g_bOpenSSLLoaded = TRUE; - return TRUE; -} - -void FreeOpenSSL() -{ - int i; - if(!g_bOpenSSLLoaded) - return; - EnterCriticalSection(&g_OpenSSLLock); - for(i = 0; i < MAX_SSL_SOCKET; i++) - { - if(g_pOpenSSLHandle[i]) - { - pSSL_shutdown(g_pOpenSSLHandle[i]); - pSSL_free(g_pOpenSSLHandle[i]); - g_pOpenSSLHandle[i] = NULL; - } - } - if(g_pOpenSSLCTX) - pSSL_CTX_free(g_pOpenSSLCTX); - g_pOpenSSLCTX = NULL; - FreeLibrary(g_hOpenSSL); - g_hOpenSSL = NULL; - LeaveCriticalSection(&g_OpenSSLLock); - DeleteCriticalSection(&g_OpenSSLLock); - g_bOpenSSLLoaded = FALSE; -} - -BOOL IsOpenSSLLoaded() -{ - return g_bOpenSSLLoaded; -} - -SSL** GetUnusedSSLPointer() -{ - int i; - for(i = 0; i < MAX_SSL_SOCKET; i++) - { - if(!g_pOpenSSLHandle[i]) - return &g_pOpenSSLHandle[i]; - } - return NULL; -} - -SSL** FindSSLPointerFromSocket(SOCKET s) -{ - int i; - for(i = 0; i < MAX_SSL_SOCKET; i++) - { - if(g_pOpenSSLHandle[i]) - { - if(pSSL_get_fd(g_pOpenSSLHandle[i]) == s) - return &g_pOpenSSLHandle[i]; - } - } - return NULL; -} - -void SetSSLTimeoutCallback(DWORD Timeout, LPSSLTIMEOUTCALLBACK pCallback) -{ - if(!g_bOpenSSLLoaded) - return; - EnterCriticalSection(&g_OpenSSLLock); - g_OpenSSLTimeout = Timeout; - g_pOpenSSLTimeoutCallback = pCallback; - LeaveCriticalSection(&g_OpenSSLLock); -} - -BOOL AttachSSL(SOCKET s) -{ - BOOL r; - DWORD Time; - SSL** ppSSL; - if(!g_bOpenSSLLoaded) - return FALSE; - r = FALSE; - Time = timeGetTime(); - EnterCriticalSection(&g_OpenSSLLock); - if(!g_pOpenSSLCTX) - g_pOpenSSLCTX = pSSL_CTX_new(pSSLv23_method()); - if(g_pOpenSSLCTX) - { - if(ppSSL = GetUnusedSSLPointer()) - { - if(*ppSSL = pSSL_new(g_pOpenSSLCTX)) - { - if(pSSL_set_fd(*ppSSL, s) != 0) - { - r = TRUE; - // SSL‚̃lƒSƒVƒG[ƒVƒ‡ƒ“‚É‚ÍŽžŠÔ‚ª‚©‚©‚éê‡‚ª‚ ‚é - while(pSSL_connect(*ppSSL) != 1) - { - LeaveCriticalSection(&g_OpenSSLLock); - if(g_pOpenSSLTimeoutCallback() || timeGetTime() - Time >= g_OpenSSLTimeout) - { - DetachSSL(s); - r = FALSE; - EnterCriticalSection(&g_OpenSSLLock); - break; - } - EnterCriticalSection(&g_OpenSSLLock); - } - } - else - DetachSSL(s); - } - } - } - LeaveCriticalSection(&g_OpenSSLLock); - return r; -} - -BOOL DetachSSL(SOCKET s) -{ - BOOL r; - SSL** ppSSL; - if(!g_bOpenSSLLoaded) - return FALSE; - r = FALSE; - EnterCriticalSection(&g_OpenSSLLock); - if(ppSSL = FindSSLPointerFromSocket(s)) - { - pSSL_shutdown(*ppSSL); - pSSL_free(*ppSSL); - *ppSSL = NULL; - r = TRUE; - } - LeaveCriticalSection(&g_OpenSSLLock); - return r; -} - -BOOL IsSSLAttached(SOCKET s) -{ - SSL** ppSSL; - if(!g_bOpenSSLLoaded) - return FALSE; - EnterCriticalSection(&g_OpenSSLLock); - ppSSL = FindSSLPointerFromSocket(s); - LeaveCriticalSection(&g_OpenSSLLock); - if(!ppSSL) - return TRUE; - return TRUE; -} - -SOCKET socketS(int af, int type, int protocol) -{ - return socket(af, type, protocol); -} - -int bindS(SOCKET s, const struct sockaddr *addr, int namelen) -{ - return bind(s, addr, namelen); -} - -int listenS(SOCKET s, int backlog) -{ - return listen(s, backlog); -} - -SOCKET acceptS(SOCKET s, struct sockaddr *addr, int *addrlen) -{ - SOCKET r; - r = accept(s, addr, addrlen); - if(!AttachSSL(r)) - { - closesocket(r); - return INVALID_SOCKET; - } - return r; -} - -int connectS(SOCKET s, const struct sockaddr *name, int namelen) -{ - int r; - r = connect(s, name, namelen); - if(!AttachSSL(r)) - return SOCKET_ERROR; - return r; -} - -int closesocketS(SOCKET s) -{ - DetachSSL(s); - return closesocket(s); -} - -int sendS(SOCKET s, const char * buf, int len, int flags) -{ - SSL** ppSSL; - if(!g_bOpenSSLLoaded) - return send(s, buf, len, flags); - EnterCriticalSection(&g_OpenSSLLock); - ppSSL = FindSSLPointerFromSocket(s); - LeaveCriticalSection(&g_OpenSSLLock); - if(!ppSSL) - return send(s, buf, len, flags); - return pSSL_write(*ppSSL, buf, len); -} - -int recvS(SOCKET s, char * buf, int len, int flags) -{ - SSL** ppSSL; - if(!g_bOpenSSLLoaded) - return recv(s, buf, len, flags); - EnterCriticalSection(&g_OpenSSLLock); - ppSSL = FindSSLPointerFromSocket(s); - LeaveCriticalSection(&g_OpenSSLLock); - if(!ppSSL) - return recv(s, buf, len, flags); - if(flags & MSG_PEEK) - return pSSL_peek(*ppSSL, buf, len); - return pSSL_read(*ppSSL, buf, len); -} - +// socketwrapper.c +// Copyright (C) 2011 Suguru Kawamoto +// ソケットラッパー +// socket関連関数をOpenSSL用に置換 +// socket関連関数のIPv6対応 +// コンパイルにはOpenSSLのヘッダーファイルが必要 +// 実行にはOpenSSLのDLLが必要 + +#include +#include +#include +#include + +#include "socketwrapper.h" +#include "protectprocess.h" +#include "mbswrapper.h" +#include "punycode.h" + +// FTPS対応 + +typedef void (__cdecl* _SSL_load_error_strings)(); +typedef int (__cdecl* _SSL_library_init)(); +typedef SSL_METHOD* (__cdecl* _SSLv23_method)(); +typedef SSL_CTX* (__cdecl* _SSL_CTX_new)(SSL_METHOD*); +typedef void (__cdecl* _SSL_CTX_free)(SSL_CTX*); +typedef SSL* (__cdecl* _SSL_new)(SSL_CTX*); +typedef void (__cdecl* _SSL_free)(SSL*); +typedef int (__cdecl* _SSL_shutdown)(SSL*); +typedef int (__cdecl* _SSL_get_fd)(SSL*); +typedef int (__cdecl* _SSL_set_fd)(SSL*, int); +typedef int (__cdecl* _SSL_accept)(SSL*); +typedef int (__cdecl* _SSL_connect)(SSL*); +typedef int (__cdecl* _SSL_write)(SSL*, const void*, int); +typedef int (__cdecl* _SSL_peek)(SSL*, void*, int); +typedef int (__cdecl* _SSL_read)(SSL*, void*, int); +typedef int (__cdecl* _SSL_get_error)(SSL*, int); +typedef X509* (__cdecl* _SSL_get_peer_certificate)(const SSL*); +typedef long (__cdecl* _SSL_get_verify_result)(const SSL*); +typedef SSL_SESSION* (__cdecl* _SSL_get_session)(SSL*); +typedef int (__cdecl* _SSL_set_session)(SSL*, SSL_SESSION*); +typedef X509_STORE* (__cdecl* _SSL_CTX_get_cert_store)(const SSL_CTX*); +typedef BIO_METHOD* (__cdecl* _BIO_s_mem)(); +typedef BIO* (__cdecl* _BIO_new)(BIO_METHOD*); +typedef int (__cdecl* _BIO_free)(BIO*); +typedef BIO* (__cdecl* _BIO_new_mem_buf)(void*, int); +typedef long (__cdecl* _BIO_ctrl)(BIO*, int, long, void*); +typedef void (__cdecl* _X509_free)(X509*); +typedef int (__cdecl* _X509_print_ex)(BIO*, X509*, unsigned long, unsigned long); +typedef X509_NAME* (__cdecl* _X509_get_subject_name)(X509*); +typedef int (__cdecl* _X509_NAME_print_ex)(BIO*, X509_NAME*, int, unsigned long); +typedef X509* (__cdecl* _PEM_read_bio_X509)(BIO*, X509**, pem_password_cb*, void*); +typedef int (__cdecl* _X509_STORE_add_cert)(X509_STORE*, X509*); + +_SSL_load_error_strings p_SSL_load_error_strings; +_SSL_library_init p_SSL_library_init; +_SSLv23_method p_SSLv23_method; +_SSL_CTX_new p_SSL_CTX_new; +_SSL_CTX_free p_SSL_CTX_free; +_SSL_new p_SSL_new; +_SSL_free p_SSL_free; +_SSL_shutdown p_SSL_shutdown; +_SSL_get_fd p_SSL_get_fd; +_SSL_set_fd p_SSL_set_fd; +_SSL_accept p_SSL_accept; +_SSL_connect p_SSL_connect; +_SSL_write p_SSL_write; +_SSL_peek p_SSL_peek; +_SSL_read p_SSL_read; +_SSL_get_error p_SSL_get_error; +_SSL_get_peer_certificate p_SSL_get_peer_certificate; +_SSL_get_verify_result p_SSL_get_verify_result; +_SSL_get_session p_SSL_get_session; +_SSL_set_session p_SSL_set_session; +_SSL_CTX_get_cert_store p_SSL_CTX_get_cert_store; +_BIO_s_mem p_BIO_s_mem; +_BIO_new p_BIO_new; +_BIO_free p_BIO_free; +_BIO_new_mem_buf p_BIO_new_mem_buf; +_BIO_ctrl p_BIO_ctrl; +_X509_free p_X509_free; +_X509_print_ex p_X509_print_ex; +_X509_get_subject_name p_X509_get_subject_name; +_X509_NAME_print_ex p_X509_NAME_print_ex; +_PEM_read_bio_X509 p_PEM_read_bio_X509; +_X509_STORE_add_cert p_X509_STORE_add_cert; + +#define MAX_SSL_SOCKET 16 + +BOOL g_bOpenSSLLoaded; +HMODULE g_hOpenSSL; +HMODULE g_hOpenSSLCommon; +CRITICAL_SECTION g_OpenSSLLock; +DWORD g_OpenSSLTimeout; +LPSSLTIMEOUTCALLBACK g_pOpenSSLTimeoutCallback; +LPSSLCONFIRMCALLBACK g_pOpenSSLConfirmCallback; +SSL_CTX* g_pOpenSSLCTX; +SSL* g_pOpenSSLHandle[MAX_SSL_SOCKET]; + +BOOL __stdcall DefaultSSLTimeoutCallback(BOOL* pbAborted) +{ + Sleep(100); + return *pbAborted; +} + +BOOL __stdcall DefaultSSLConfirmCallback(BOOL* pbAborted, BOOL bVerified, LPCSTR Certificate, LPCSTR CommonName) +{ + return bVerified; +} + +// OpenSSLを初期化 +BOOL LoadOpenSSL() +{ + if(g_bOpenSSLLoaded) + return FALSE; +#ifdef ENABLE_PROCESS_PROTECTION + // 同梱するOpenSSLのバージョンに合わせてSHA1ハッシュ値を変更すること + // ssleay32.dll 1.0.0g + // libssl32.dll 1.0.0g + RegisterTrustedModuleSHA1Hash("\x42\x32\x3E\x44\x35\xBC\x98\x6C\x45\xC9\xA2\xB8\x41\xE7\xDA\x7B\x6A\x98\xB2\x28"); + // libeay32.dll 1.0.0g + RegisterTrustedModuleSHA1Hash("\x3F\xC8\x07\x84\xB3\xF0\x71\x4A\x18\x59\x52\x1F\x99\x09\x65\xB9\x49\xA7\x15\x36"); +#endif + g_hOpenSSL = LoadLibrary("ssleay32.dll"); + // バージョン固定のためlibssl32.dllの読み込みは脆弱性の原因になり得るので廃止 +// if(!g_hOpenSSL) +// g_hOpenSSL = LoadLibrary("libssl32.dll"); + if(!g_hOpenSSL + || !(p_SSL_load_error_strings = (_SSL_load_error_strings)GetProcAddress(g_hOpenSSL, "SSL_load_error_strings")) + || !(p_SSL_library_init = (_SSL_library_init)GetProcAddress(g_hOpenSSL, "SSL_library_init")) + || !(p_SSLv23_method = (_SSLv23_method)GetProcAddress(g_hOpenSSL, "SSLv23_method")) + || !(p_SSL_CTX_new = (_SSL_CTX_new)GetProcAddress(g_hOpenSSL, "SSL_CTX_new")) + || !(p_SSL_CTX_free = (_SSL_CTX_free)GetProcAddress(g_hOpenSSL, "SSL_CTX_free")) + || !(p_SSL_new = (_SSL_new)GetProcAddress(g_hOpenSSL, "SSL_new")) + || !(p_SSL_free = (_SSL_free)GetProcAddress(g_hOpenSSL, "SSL_free")) + || !(p_SSL_shutdown = (_SSL_shutdown)GetProcAddress(g_hOpenSSL, "SSL_shutdown")) + || !(p_SSL_get_fd = (_SSL_get_fd)GetProcAddress(g_hOpenSSL, "SSL_get_fd")) + || !(p_SSL_set_fd = (_SSL_set_fd)GetProcAddress(g_hOpenSSL, "SSL_set_fd")) + || !(p_SSL_accept = (_SSL_accept)GetProcAddress(g_hOpenSSL, "SSL_accept")) + || !(p_SSL_connect = (_SSL_connect)GetProcAddress(g_hOpenSSL, "SSL_connect")) + || !(p_SSL_write = (_SSL_write)GetProcAddress(g_hOpenSSL, "SSL_write")) + || !(p_SSL_peek = (_SSL_peek)GetProcAddress(g_hOpenSSL, "SSL_peek")) + || !(p_SSL_read = (_SSL_read)GetProcAddress(g_hOpenSSL, "SSL_read")) + || !(p_SSL_get_error = (_SSL_get_error)GetProcAddress(g_hOpenSSL, "SSL_get_error")) + || !(p_SSL_get_peer_certificate = (_SSL_get_peer_certificate)GetProcAddress(g_hOpenSSL, "SSL_get_peer_certificate")) + || !(p_SSL_get_verify_result = (_SSL_get_verify_result)GetProcAddress(g_hOpenSSL, "SSL_get_verify_result")) + || !(p_SSL_get_session = (_SSL_get_session)GetProcAddress(g_hOpenSSL, "SSL_get_session")) + || !(p_SSL_set_session = (_SSL_set_session)GetProcAddress(g_hOpenSSL, "SSL_set_session")) + || !(p_SSL_CTX_get_cert_store = (_SSL_CTX_get_cert_store)GetProcAddress(g_hOpenSSL, "SSL_CTX_get_cert_store"))) + { + if(g_hOpenSSL) + FreeLibrary(g_hOpenSSL); + g_hOpenSSL = NULL; + return FALSE; + } + g_hOpenSSLCommon = LoadLibrary("libeay32.dll"); + if(!g_hOpenSSLCommon + || !(p_BIO_s_mem = (_BIO_s_mem)GetProcAddress(g_hOpenSSLCommon, "BIO_s_mem")) + || !(p_BIO_new = (_BIO_new)GetProcAddress(g_hOpenSSLCommon, "BIO_new")) + || !(p_BIO_free = (_BIO_free)GetProcAddress(g_hOpenSSLCommon, "BIO_free")) + || !(p_BIO_new_mem_buf = (_BIO_new_mem_buf)GetProcAddress(g_hOpenSSLCommon, "BIO_new_mem_buf")) + || !(p_BIO_ctrl = (_BIO_ctrl)GetProcAddress(g_hOpenSSLCommon, "BIO_ctrl")) + || !(p_X509_free = (_X509_free)GetProcAddress(g_hOpenSSLCommon, "X509_free")) + || !(p_X509_print_ex = (_X509_print_ex)GetProcAddress(g_hOpenSSLCommon, "X509_print_ex")) + || !(p_X509_get_subject_name = (_X509_get_subject_name)GetProcAddress(g_hOpenSSLCommon, "X509_get_subject_name")) + || !(p_X509_NAME_print_ex = (_X509_NAME_print_ex)GetProcAddress(g_hOpenSSLCommon, "X509_NAME_print_ex")) + || !(p_PEM_read_bio_X509 = (_PEM_read_bio_X509)GetProcAddress(g_hOpenSSLCommon, "PEM_read_bio_X509")) + || !(p_X509_STORE_add_cert = (_X509_STORE_add_cert)GetProcAddress(g_hOpenSSLCommon, "X509_STORE_add_cert"))) + { + if(g_hOpenSSL) + FreeLibrary(g_hOpenSSL); + g_hOpenSSL = NULL; + if(g_hOpenSSLCommon) + FreeLibrary(g_hOpenSSLCommon); + g_hOpenSSLCommon = NULL; + return FALSE; + } + InitializeCriticalSection(&g_OpenSSLLock); + p_SSL_load_error_strings(); + p_SSL_library_init(); + SetSSLTimeoutCallback(60000, DefaultSSLTimeoutCallback); + SetSSLConfirmCallback(DefaultSSLConfirmCallback); + g_bOpenSSLLoaded = TRUE; + return TRUE; +} + +// OpenSSLを解放 +void FreeOpenSSL() +{ + int i; + if(!g_bOpenSSLLoaded) + return; + EnterCriticalSection(&g_OpenSSLLock); + for(i = 0; i < MAX_SSL_SOCKET; i++) + { + if(g_pOpenSSLHandle[i]) + { + p_SSL_shutdown(g_pOpenSSLHandle[i]); + p_SSL_free(g_pOpenSSLHandle[i]); + g_pOpenSSLHandle[i] = NULL; + } + } + if(g_pOpenSSLCTX) + p_SSL_CTX_free(g_pOpenSSLCTX); + g_pOpenSSLCTX = NULL; + FreeLibrary(g_hOpenSSL); + g_hOpenSSL = NULL; + FreeLibrary(g_hOpenSSLCommon); + g_hOpenSSLCommon = NULL; + LeaveCriticalSection(&g_OpenSSLLock); + DeleteCriticalSection(&g_OpenSSLLock); + g_bOpenSSLLoaded = FALSE; +} + +// OpenSSLが使用可能かどうか確認 +BOOL IsOpenSSLLoaded() +{ + return g_bOpenSSLLoaded; +} + +SSL** GetUnusedSSLPointer() +{ + int i; + for(i = 0; i < MAX_SSL_SOCKET; i++) + { + if(!g_pOpenSSLHandle[i]) + return &g_pOpenSSLHandle[i]; + } + return NULL; +} + +SSL** FindSSLPointerFromSocket(SOCKET s) +{ + int i; + for(i = 0; i < MAX_SSL_SOCKET; i++) + { + if(g_pOpenSSLHandle[i]) + { + if(p_SSL_get_fd(g_pOpenSSLHandle[i]) == s) + return &g_pOpenSSLHandle[i]; + } + } + return NULL; +} + +BOOL ConfirmSSLCertificate(SSL* pSSL, BOOL* pbAborted) +{ + BOOL bResult; + BOOL bVerified; + char* pData; + char* pSubject; + X509* pX509; + BIO* pBIO; + long Length; + char* pBuffer; + char* pCN; + char* p; + bResult = FALSE; + bVerified = FALSE; + pData = NULL; + pSubject = NULL; + if(pX509 = p_SSL_get_peer_certificate(pSSL)) + { + if(pBIO = p_BIO_new(p_BIO_s_mem())) + { + p_X509_print_ex(pBIO, pX509, 0, XN_FLAG_RFC2253); + if((Length = p_BIO_ctrl(pBIO, BIO_CTRL_INFO, 0, &pBuffer)) > 0) + { + if(pData = (char*)malloc(Length + sizeof(char))) + { + memcpy(pData, pBuffer, Length); + *(char*)((size_t)pData + Length) = '\0'; + } + } + p_BIO_free(pBIO); + } + if(pBIO = p_BIO_new(p_BIO_s_mem())) + { + p_X509_NAME_print_ex(pBIO, p_X509_get_subject_name(pX509), 0, XN_FLAG_RFC2253); + if((Length = p_BIO_ctrl(pBIO, BIO_CTRL_INFO, 0, &pBuffer)) > 0) + { + if(pSubject = (char*)malloc(Length + sizeof(char))) + { + memcpy(pSubject, pBuffer, Length); + *(char*)((size_t)pSubject + Length) = '\0'; + } + } + p_BIO_free(pBIO); + } + p_X509_free(pX509); + } + if(pX509 && p_SSL_get_verify_result(pSSL) == X509_V_OK) + bVerified = TRUE; + pCN = pSubject; + while(pCN) + { + if(strncmp(pCN, "CN=", strlen("CN=")) == 0) + { + pCN += strlen("CN="); + if(p = strchr(pCN, ',')) + *p = '\0'; + break; + } + if(pCN = strchr(pCN, ',')) + pCN++; + } + bResult = g_pOpenSSLConfirmCallback(pbAborted, bVerified, pData, pCN); + if(pData) + free(pData); + if(pSubject) + free(pSubject); + return bResult; +} + +void SetSSLTimeoutCallback(DWORD Timeout, LPSSLTIMEOUTCALLBACK pCallback) +{ + if(!g_bOpenSSLLoaded) + return; + EnterCriticalSection(&g_OpenSSLLock); + g_OpenSSLTimeout = Timeout; + g_pOpenSSLTimeoutCallback = pCallback; + LeaveCriticalSection(&g_OpenSSLLock); +} + +void SetSSLConfirmCallback(LPSSLCONFIRMCALLBACK pCallback) +{ + if(!g_bOpenSSLLoaded) + return; + EnterCriticalSection(&g_OpenSSLLock); + g_pOpenSSLConfirmCallback = pCallback; + LeaveCriticalSection(&g_OpenSSLLock); +} + +// SSLルート証明書を設定 +// PEM形式のみ指定可能 +BOOL SetSSLRootCertificate(const void* pData, DWORD Length) +{ + BOOL r; + X509_STORE* pStore; + BYTE* p; + BYTE* pBegin; + BYTE* pEnd; + BIO* pBIO; + X509* pX509; + if(!g_bOpenSSLLoaded) + return FALSE; + r = FALSE; + EnterCriticalSection(&g_OpenSSLLock); + if(!g_pOpenSSLCTX) + g_pOpenSSLCTX = p_SSL_CTX_new(p_SSLv23_method()); + if(g_pOpenSSLCTX) + { + if(pStore = p_SSL_CTX_get_cert_store(g_pOpenSSLCTX)) + { + p = (BYTE*)pData; + pBegin = NULL; + pEnd = NULL; + while(Length > 0) + { + if(!pBegin) + { + if(Length < 27) + break; + if(memcmp(p, "-----BEGIN CERTIFICATE-----", 27) == 0) + pBegin = p; + } + else if(!pEnd) + { + if(Length < 25) + break; + if(memcmp(p, "-----END CERTIFICATE-----", 25) == 0) + pEnd = p + 25; + } + if(pBegin && pEnd) + { + if(pBIO = p_BIO_new_mem_buf(pBegin, (int)((size_t)pEnd - (size_t)pBegin))) + { + if(pX509 = p_PEM_read_bio_X509(pBIO, NULL, NULL, NULL)) + { + if(p_X509_STORE_add_cert(pStore, pX509) == 1) + r = TRUE; + p_X509_free(pX509); + } + p_BIO_free(pBIO); + } + pBegin = NULL; + pEnd = NULL; + } + p++; + Length--; + } + } + } + LeaveCriticalSection(&g_OpenSSLLock); + return r; +} + +// ワイルドカードの比較 +// 主にSSL証明書のCN確認用 +BOOL IsHostNameMatched(LPCSTR HostName, LPCSTR CommonName) +{ + BOOL bResult; + const char* pAsterisk; + size_t BeforeAsterisk; + const char* pBeginAsterisk; + const char* pEndAsterisk; + const char* pDot; + bResult = FALSE; + if(HostName && CommonName) + { + if(pAsterisk = strchr(CommonName, '*')) + { + BeforeAsterisk = ((size_t)pAsterisk - (size_t)CommonName) / sizeof(char); + pBeginAsterisk = HostName + BeforeAsterisk; + while(*pAsterisk == '*') + { + pAsterisk++; + } + pEndAsterisk = HostName + strlen(HostName) - strlen(pAsterisk); + // "*"より前は大文字小文字を無視して完全一致 + if(_strnicmp(HostName, CommonName, BeforeAsterisk) == 0) + { + // "*"より後は大文字小文字を無視して完全一致 + if(_stricmp(pEndAsterisk, pAsterisk) == 0) + { + // "*"と一致する範囲に"."が含まれてはならない + pDot = strchr(pBeginAsterisk, '.'); + if(!pDot || pDot >= pEndAsterisk) + bResult = TRUE; + } + } + } + else if(_stricmp(HostName, CommonName) == 0) + bResult = TRUE; + } + return bResult; +} + +// SSLセッションを開始 +BOOL AttachSSL(SOCKET s, SOCKET parent, BOOL* pbAborted) +{ + BOOL r; + DWORD Time; + SSL** ppSSL; + SSL** ppSSLParent; + SSL_SESSION* pSession; + int Return; + int Error; + if(!g_bOpenSSLLoaded) + return FALSE; + r = FALSE; + Time = timeGetTime(); + EnterCriticalSection(&g_OpenSSLLock); + if(!g_pOpenSSLCTX) + g_pOpenSSLCTX = p_SSL_CTX_new(p_SSLv23_method()); + if(g_pOpenSSLCTX) + { + if(ppSSL = GetUnusedSSLPointer()) + { + if(*ppSSL = p_SSL_new(g_pOpenSSLCTX)) + { + if(p_SSL_set_fd(*ppSSL, s) != 0) + { + if(parent != INVALID_SOCKET) + { + if(ppSSLParent = FindSSLPointerFromSocket(parent)) + { + if(pSession = p_SSL_get_session(*ppSSLParent)) + { + if(p_SSL_set_session(*ppSSL, pSession) == 1) + { + } + } + } + } + // SSLのネゴシエーションには時間がかかる場合がある + r = TRUE; + while(r) + { + Return = p_SSL_connect(*ppSSL); + if(Return == 1) + break; + Error = p_SSL_get_error(*ppSSL, Return); + if(Error == SSL_ERROR_WANT_READ || Error == SSL_ERROR_WANT_WRITE) + { + LeaveCriticalSection(&g_OpenSSLLock); + if(g_pOpenSSLTimeoutCallback(pbAborted) || (g_OpenSSLTimeout > 0 && timeGetTime() - Time >= g_OpenSSLTimeout)) + r = FALSE; + EnterCriticalSection(&g_OpenSSLLock); + } + else + r = FALSE; + } + if(r) + { + if(ConfirmSSLCertificate(*ppSSL, pbAborted)) + { + } + else + { + LeaveCriticalSection(&g_OpenSSLLock); + DetachSSL(s); + r = FALSE; + EnterCriticalSection(&g_OpenSSLLock); + } + } + else + { + LeaveCriticalSection(&g_OpenSSLLock); + DetachSSL(s); + EnterCriticalSection(&g_OpenSSLLock); + } + } + else + { + LeaveCriticalSection(&g_OpenSSLLock); + DetachSSL(s); + EnterCriticalSection(&g_OpenSSLLock); + } + } + } + } + LeaveCriticalSection(&g_OpenSSLLock); + return r; +} + +// SSLセッションを終了 +BOOL DetachSSL(SOCKET s) +{ + BOOL r; + SSL** ppSSL; + if(!g_bOpenSSLLoaded) + return FALSE; + r = FALSE; + EnterCriticalSection(&g_OpenSSLLock); + if(ppSSL = FindSSLPointerFromSocket(s)) + { + p_SSL_shutdown(*ppSSL); + p_SSL_free(*ppSSL); + *ppSSL = NULL; + r = TRUE; + } + LeaveCriticalSection(&g_OpenSSLLock); + return r; +} + +// SSLとしてマークされているか確認 +// マークされていればTRUEを返す +BOOL IsSSLAttached(SOCKET s) +{ + SSL** ppSSL; + if(!g_bOpenSSLLoaded) + return FALSE; + EnterCriticalSection(&g_OpenSSLLock); + ppSSL = FindSSLPointerFromSocket(s); + LeaveCriticalSection(&g_OpenSSLLock); + if(!ppSSL) + return FALSE; + return TRUE; +} + +SOCKET FTPS_socket(int af, int type, int protocol) +{ + return socket(af, type, protocol); +} + +int FTPS_bind(SOCKET s, const struct sockaddr *addr, int namelen) +{ + return bind(s, addr, namelen); +} + +int FTPS_listen(SOCKET s, int backlog) +{ + return listen(s, backlog); +} + +// accept相当の関数 +// ただし初めからSSLのネゴシエーションを行う +SOCKET FTPS_accept(SOCKET s, struct sockaddr *addr, int *addrlen) +{ + SOCKET r; + BOOL bAborted; + r = accept(s, addr, addrlen); + bAborted = FALSE; + if(!AttachSSL(r, INVALID_SOCKET, &bAborted)) + { + closesocket(r); + return INVALID_SOCKET; + } + return r; +} + +// connect相当の関数 +// ただし初めからSSLのネゴシエーションを行う +int FTPS_connect(SOCKET s, const struct sockaddr *name, int namelen) +{ + int r; + BOOL bAborted; + r = connect(s, name, namelen); + bAborted = FALSE; + if(!AttachSSL(r, INVALID_SOCKET, &bAborted)) + return SOCKET_ERROR; + return r; +} + +// closesocket相当の関数 +int FTPS_closesocket(SOCKET s) +{ + DetachSSL(s); + return closesocket(s); +} + +// send相当の関数 +int FTPS_send(SOCKET s, const char * buf, int len, int flags) +{ + SSL** ppSSL; + if(!g_bOpenSSLLoaded) + return send(s, buf, len, flags); + EnterCriticalSection(&g_OpenSSLLock); + ppSSL = FindSSLPointerFromSocket(s); + LeaveCriticalSection(&g_OpenSSLLock); + if(!ppSSL) + return send(s, buf, len, flags); + return p_SSL_write(*ppSSL, buf, len); +} + +// recv相当の関数 +int FTPS_recv(SOCKET s, char * buf, int len, int flags) +{ + SSL** ppSSL; + if(!g_bOpenSSLLoaded) + return recv(s, buf, len, flags); + EnterCriticalSection(&g_OpenSSLLock); + ppSSL = FindSSLPointerFromSocket(s); + LeaveCriticalSection(&g_OpenSSLLock); + if(!ppSSL) + return recv(s, buf, len, flags); + if(flags & MSG_PEEK) + return p_SSL_peek(*ppSSL, buf, len); + return p_SSL_read(*ppSSL, buf, len); +} + +// IPv6対応 + +typedef struct +{ + HANDLE h; + HWND hWnd; + u_int wMsg; + char * name; + char * buf; + int buflen; + short Family; +} GETHOSTBYNAMEDATA; + +DWORD WINAPI WSAAsyncGetHostByNameIPv6ThreadProc(LPVOID lpParameter) +{ + GETHOSTBYNAMEDATA* pData; + struct hostent* pHost; + struct addrinfo* pAddr; + struct addrinfo* p; + pHost = NULL; + pData = (GETHOSTBYNAMEDATA*)lpParameter; + if(getaddrinfo(pData->name, NULL, NULL, &pAddr) == 0) + { + p = pAddr; + while(p) + { + if(p->ai_family == pData->Family) + { + switch(p->ai_family) + { + case AF_INET: + pHost = (struct hostent*)pData->buf; + if((size_t)pData->buflen >= sizeof(struct hostent) + sizeof(char*) * 2 + sizeof(struct in_addr) + && p->ai_addrlen >= sizeof(struct sockaddr_in)) + { + pHost->h_name = NULL; + pHost->h_aliases = NULL; + pHost->h_addrtype = p->ai_family; + pHost->h_length = sizeof(struct in_addr); + pHost->h_addr_list = (char**)(&pHost[1]); + pHost->h_addr_list[0] = (char*)(&pHost->h_addr_list[2]); + pHost->h_addr_list[1] = NULL; + memcpy(pHost->h_addr_list[0], &((struct sockaddr_in*)p->ai_addr)->sin_addr, sizeof(struct in_addr)); + PostMessage(pData->hWnd, pData->wMsg, (WPARAM)pData->h, (LPARAM)(sizeof(struct hostent) + sizeof(char*) * 2 + p->ai_addrlen)); + } + else + PostMessage(pData->hWnd, pData->wMsg, (WPARAM)pData->h, (LPARAM)(WSAENOBUFS << 16)); + break; + case AF_INET6: + pHost = (struct hostent*)pData->buf; + if((size_t)pData->buflen >= sizeof(struct hostent) + sizeof(char*) * 2 + sizeof(struct in6_addr) + && p->ai_addrlen >= sizeof(struct sockaddr_in6)) + { + pHost->h_name = NULL; + pHost->h_aliases = NULL; + pHost->h_addrtype = p->ai_family; + pHost->h_length = sizeof(struct in6_addr); + pHost->h_addr_list = (char**)(&pHost[1]); + pHost->h_addr_list[0] = (char*)(&pHost->h_addr_list[2]); + pHost->h_addr_list[1] = NULL; + memcpy(pHost->h_addr_list[0], &((struct sockaddr_in6*)p->ai_addr)->sin6_addr, sizeof(struct in6_addr)); + PostMessage(pData->hWnd, pData->wMsg, (WPARAM)pData->h, (LPARAM)(sizeof(struct hostent) + sizeof(char*) * 2 + p->ai_addrlen)); + } + else + PostMessage(pData->hWnd, pData->wMsg, (WPARAM)pData->h, (LPARAM)(WSAENOBUFS << 16)); + break; + } + } + if(pHost) + break; + p = p->ai_next; + } + if(!p) + PostMessage(pData->hWnd, pData->wMsg, (WPARAM)pData->h, (LPARAM)(ERROR_INVALID_FUNCTION << 16)); + freeaddrinfo(pAddr); + } + else + PostMessage(pData->hWnd, pData->wMsg, (WPARAM)pData->h, (LPARAM)(ERROR_INVALID_FUNCTION << 16)); + free(pData->name); + free(pData); + // CreateThreadが返すハンドルが重複するのを回避 + Sleep(10000); + return 0; +} + +// IPv6対応のWSAAsyncGetHostByName相当の関数 +// FamilyにはAF_INETまたはAF_INET6を指定可能 +// ただしANSI用 +HANDLE WSAAsyncGetHostByNameIPv6(HWND hWnd, u_int wMsg, const char * name, char * buf, int buflen, short Family) +{ + HANDLE hResult; + GETHOSTBYNAMEDATA* pData; + hResult = NULL; + if(pData = malloc(sizeof(GETHOSTBYNAMEDATA))) + { + pData->hWnd = hWnd; + pData->wMsg = wMsg; + if(pData->name = malloc(sizeof(char) * (strlen(name) + 1))) + { + strcpy(pData->name, name); + pData->buf = buf; + pData->buflen = buflen; + pData->Family = Family; + if(pData->h = CreateThread(NULL, 0, WSAAsyncGetHostByNameIPv6ThreadProc, pData, CREATE_SUSPENDED, NULL)) + { + ResumeThread(pData->h); + hResult = pData->h; + } + } + } + if(!hResult) + { + if(pData) + { + if(pData->name) + free(pData->name); + free(pData); + } + } + return hResult; +} + +// WSAAsyncGetHostByNameIPv6用のWSACancelAsyncRequest相当の関数 +int WSACancelAsyncRequestIPv6(HANDLE hAsyncTaskHandle) +{ + int Result; + Result = SOCKET_ERROR; + if(TerminateThread(hAsyncTaskHandle, 0)) + Result = 0; + return Result; +} + +char* AddressToStringIPv6(char* str, void* in6) +{ + char* pResult; + unsigned char* p; + int MaxZero; + int MaxZeroLen; + int i; + int j; + char Tmp[5]; + pResult = str; + p = (unsigned char*)in6; + MaxZero = 8; + MaxZeroLen = 1; + for(i = 0; i < 8; i++) + { + for(j = i; j < 8; j++) + { + if(p[j * 2] != 0 || p[j * 2 + 1] != 0) + break; + } + if(j - i > MaxZeroLen) + { + MaxZero = i; + MaxZeroLen = j - i; + } + } + strcpy(str, ""); + for(i = 0; i < 8; i++) + { + if(i == MaxZero) + { + if(i == 0) + strcat(str, ":"); + strcat(str, ":"); + } + else if(i < MaxZero || i >= MaxZero + MaxZeroLen) + { + sprintf(Tmp, "%x", (((int)p[i * 2] & 0xff) << 8) | ((int)p[i * 2 + 1] & 0xff)); + strcat(str, Tmp); + if(i < 7) + strcat(str, ":"); + } + } + return pResult; +} + +// IPv6対応のinet_ntoa相当の関数 +// ただしANSI用 +char* inet6_ntoa(struct in6_addr in6) +{ + char* pResult; + static char Adrs[40]; + pResult = NULL; + memset(Adrs, 0, sizeof(Adrs)); + pResult = AddressToStringIPv6(Adrs, &in6); + return pResult; +} + +// IPv6対応のinet_addr相当の関数 +// ただしANSI用 +struct in6_addr inet6_addr(const char* cp) +{ + struct in6_addr Result; + int AfterZero; + int i; + char* p; + memset(&Result, 0, sizeof(Result)); + AfterZero = 0; + for(i = 0; i < 8; i++) + { + if(!cp) + { + memset(&Result, 0xff, sizeof(Result)); + break; + } + if(i >= AfterZero) + { + if(strncmp(cp, ":", 1) == 0) + { + cp = cp + 1; + if(i == 0 && strncmp(cp, ":", 1) == 0) + cp = cp + 1; + p = (char*)cp; + AfterZero = 7; + while(p = strstr(p, ":")) + { + p = p + 1; + AfterZero--; + } + } + else + { + Result.u.Word[i] = (USHORT)strtol(cp, &p, 16); + Result.u.Word[i] = ((Result.u.Word[i] & 0xff00) >> 8) | ((Result.u.Word[i] & 0x00ff) << 8); + if(strncmp(p, ":", 1) != 0 && strlen(p) > 0) + { + memset(&Result, 0xff, sizeof(Result)); + break; + } + if(cp = strstr(cp, ":")) + cp = cp + 1; + } + } + } + return Result; +} + +BOOL ConvertDomainNameToPunycode(LPSTR Output, DWORD Count, LPCSTR Input) +{ + BOOL bResult; + punycode_uint* pUnicode; + punycode_uint* p; + BOOL bNeeded; + LPCSTR InputString; + punycode_uint Length; + punycode_uint OutputLength; + bResult = FALSE; + if(pUnicode = malloc(sizeof(punycode_uint) * strlen(Input))) + { + p = pUnicode; + bNeeded = FALSE; + InputString = Input; + Length = 0; + while(*InputString != '\0') + { + *p = (punycode_uint)GetNextCharM(InputString, &InputString); + if(*p >= 0x80) + bNeeded = TRUE; + p++; + Length++; + } + if(bNeeded) + { + if(Count >= strlen("xn--") + 1) + { + strcpy(Output, "xn--"); + OutputLength = Count - strlen("xn--"); + if(punycode_encode(Length, pUnicode, NULL, (punycode_uint*)&OutputLength, Output + strlen("xn--")) == punycode_success) + { + Output[strlen("xn--") + OutputLength] = '\0'; + bResult = TRUE; + } + } + } + free(pUnicode); + } + if(!bResult) + { + if(Count >= strlen(Input) + 1) + { + strcpy(Output, Input); + bResult = TRUE; + } + } + return bResult; +} + +BOOL ConvertNameToPunycode(LPSTR Output, LPCSTR Input) +{ + BOOL bResult; + DWORD Length; + char* pm0; + char* pm1; + char* p; + char* pNext; + bResult = FALSE; + Length = strlen(Input); + if(pm0 = AllocateStringM(Length + 1)) + { + if(pm1 = AllocateStringM(Length * 4 + 1)) + { + strcpy(pm0, Input); + p = pm0; + while(p) + { + if(pNext = strchr(p, '.')) + { + *pNext = '\0'; + pNext++; + } + if(ConvertDomainNameToPunycode(pm1, Length * 4, p)) + strcat(Output, pm1); + if(pNext) + strcat(Output, "."); + p = pNext; + } + bResult = TRUE; + FreeDuplicatedString(pm1); + } + FreeDuplicatedString(pm0); + } + return bResult; +} + +HANDLE WSAAsyncGetHostByNameM(HWND hWnd, u_int wMsg, const char * name, char * buf, int buflen) +{ + HANDLE r = NULL; + char* pa0 = NULL; + if(pa0 = AllocateStringA(strlen(name) * 4)) + { + if(ConvertNameToPunycode(pa0, name)) + r = WSAAsyncGetHostByName(hWnd, wMsg, pa0, buf, buflen); + } + FreeDuplicatedString(pa0); + return r; +} + +HANDLE WSAAsyncGetHostByNameIPv6M(HWND hWnd, u_int wMsg, const char * name, char * buf, int buflen, short Family) +{ + HANDLE r = NULL; + char* pa0 = NULL; + if(pa0 = AllocateStringA(strlen(name) * 4)) + { + if(ConvertNameToPunycode(pa0, name)) + r = WSAAsyncGetHostByNameIPv6(hWnd, wMsg, pa0, buf, buflen, Family); + } + FreeDuplicatedString(pa0); + return r; +} + +// SFTP対応 + +typedef void* (__cdecl* _SFTP_Create)(); +typedef void (__cdecl* _SFTP_Destroy)(void*); +typedef BOOL (__cdecl* _SFTP_IsExited)(void*); +typedef BOOL (__cdecl* _SFTP_SetTimeoutCallback)(void*, void*); +typedef size_t (__cdecl* _SFTP_PeekStdOut)(void*, void*, size_t); +typedef size_t (__cdecl* _SFTP_ReadStdOut)(void*, void*, size_t); +typedef size_t (__cdecl* _SFTP_WriteStdIn)(void*, const void*, size_t); +typedef size_t (__cdecl* _SFTP_PeekDataOut)(void*, void*, size_t); +typedef size_t (__cdecl* _SFTP_ReadDataOut)(void*, void*, size_t); +typedef size_t (__cdecl* _SFTP_WriteDataIn)(void*, const void*, size_t); +typedef BOOL (__cdecl* _SFTP_SetFilePosition)(void*, LONGLONG); + +_SFTP_Create p_SFTP_Create; +_SFTP_Destroy p_SFTP_Destroy; +_SFTP_IsExited p_SFTP_IsExited; +_SFTP_SetTimeoutCallback p_SFTP_SetTimeoutCallback; +_SFTP_PeekStdOut p_SFTP_PeekStdOut; +_SFTP_ReadStdOut p_SFTP_ReadStdOut; +_SFTP_WriteStdIn p_SFTP_WriteStdIn; +_SFTP_PeekDataOut p_SFTP_PeekDataOut; +_SFTP_ReadDataOut p_SFTP_ReadDataOut; +_SFTP_WriteDataIn p_SFTP_WriteDataIn; +_SFTP_SetFilePosition p_SFTP_SetFilePosition; + +typedef struct +{ + SOCKET Control; + SOCKET Data; + void* Handle; + char Host[1024]; + int Port; + char User[1024]; + char Password[1024]; +} SFTPDATA; + +#define MAX_SFTP_SOCKET 16 + +BOOL g_bPuTTYLoaded; +HMODULE g_hPuTTY; +CRITICAL_SECTION g_PuTTYLock; +SFTPDATA g_SFTPData[MAX_SFTP_SOCKET]; + +// PuTTYを初期化 +BOOL LoadPuTTY() +{ + int i; + if(g_bPuTTYLoaded) + return FALSE; +#ifdef ENABLE_PROCESS_PROTECTION + // ビルドしたputty.dllに合わせてSHA1ハッシュ値を変更すること + RegisterTrustedModuleSHA1Hash("\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"); +#endif + // デバッグ用 +// g_hPuTTY = LoadLibrary("putty.dll"); + g_hPuTTY = LoadLibrary("C:\\SourceForge\\ffftp\\putty\\Debug\\PuTTY.dll"); + if(!g_hPuTTY + || !(p_SFTP_Create = (_SFTP_Create)GetProcAddress(g_hPuTTY, "SFTP_Create")) + || !(p_SFTP_Destroy = (_SFTP_Destroy)GetProcAddress(g_hPuTTY, "SFTP_Destroy")) + || !(p_SFTP_IsExited = (_SFTP_IsExited)GetProcAddress(g_hPuTTY, "SFTP_IsExited")) + || !(p_SFTP_SetTimeoutCallback = (_SFTP_SetTimeoutCallback)GetProcAddress(g_hPuTTY, "SFTP_SetTimeoutCallback")) + || !(p_SFTP_PeekStdOut = (_SFTP_PeekStdOut)GetProcAddress(g_hPuTTY, "SFTP_PeekStdOut")) + || !(p_SFTP_ReadStdOut = (_SFTP_ReadStdOut)GetProcAddress(g_hPuTTY, "SFTP_ReadStdOut")) + || !(p_SFTP_WriteStdIn = (_SFTP_WriteStdIn)GetProcAddress(g_hPuTTY, "SFTP_WriteStdIn")) + || !(p_SFTP_PeekDataOut = (_SFTP_PeekDataOut)GetProcAddress(g_hPuTTY, "SFTP_PeekDataOut")) + || !(p_SFTP_ReadDataOut = (_SFTP_ReadDataOut)GetProcAddress(g_hPuTTY, "SFTP_ReadDataOut")) + || !(p_SFTP_WriteDataIn = (_SFTP_WriteDataIn)GetProcAddress(g_hPuTTY, "SFTP_WriteDataIn")) + || !(p_SFTP_SetFilePosition = (_SFTP_SetFilePosition)GetProcAddress(g_hPuTTY, "SFTP_SetFilePosition"))) + { + if(g_hPuTTY) + FreeLibrary(g_hPuTTY); + g_hPuTTY = NULL; + return FALSE; + } + for(i = 0; i < MAX_SFTP_SOCKET; i++) + { + g_SFTPData[i].Control = INVALID_SOCKET; + g_SFTPData[i].Data = INVALID_SOCKET; + } + InitializeCriticalSection(&g_PuTTYLock); + g_bPuTTYLoaded = TRUE; + return TRUE; +} + +// PuTTYを解放 +void FreePuTTY() +{ + int i; + if(!g_bPuTTYLoaded) + return; + EnterCriticalSection(&g_PuTTYLock); + for(i = 0; i < MAX_SFTP_SOCKET; i++) + { + if(g_SFTPData[i].Control != INVALID_SOCKET) + { + closesocket(g_SFTPData[i].Control); + g_SFTPData[i].Control = INVALID_SOCKET; + p_SFTP_Destroy(g_SFTPData[i].Handle); + } + if(g_SFTPData[i].Data != INVALID_SOCKET) + { + closesocket(g_SFTPData[i].Data); + g_SFTPData[i].Data = INVALID_SOCKET; + } + } + FreeLibrary(g_hPuTTY); + g_hPuTTY = NULL; + LeaveCriticalSection(&g_PuTTYLock); + DeleteCriticalSection(&g_PuTTYLock); + g_bPuTTYLoaded = FALSE; +} + +// PuTTYが使用可能かどうか確認 +BOOL IsPuTTYLoaded() +{ + return g_bPuTTYLoaded; +} + +SFTPDATA* GetUnusedSFTPData() +{ + int i; + for(i = 0; i < MAX_SFTP_SOCKET; i++) + { + if(g_SFTPData[i].Control == INVALID_SOCKET) + { + memset(&g_SFTPData[i], 0, sizeof(SFTPDATA)); + return &g_SFTPData[i]; + } + } + return NULL; +} + +SFTPDATA* FindSFTPDataFromSocket(SOCKET s) +{ + int i; + for(i = 0; i < MAX_SFTP_SOCKET; i++) + { + if(g_SFTPData[i].Control == s || g_SFTPData[i].Data == s) + return &g_SFTPData[i]; + } + return NULL; +} + +// SFTPとしてマークされているか確認 +// マークされていればTRUEを返す +BOOL IsSFTPAttached(SOCKET s) +{ + SFTPDATA* pSFTPData; + if(!g_bPuTTYLoaded) + return FALSE; + EnterCriticalSection(&g_PuTTYLock); + pSFTPData = FindSFTPDataFromSocket(s); + LeaveCriticalSection(&g_PuTTYLock); + if(!pSFTPData) + return FALSE; + return TRUE; +} + +// コントロール用の仮想的なソケットを取得 +// 識別子としてダミーのソケットを返す +SOCKET SFTP_socket(int af, int type, int protocol) +{ + SOCKET r; + SFTPDATA* pSFTPData; + if(!g_bPuTTYLoaded) + return INVALID_SOCKET; + r = INVALID_SOCKET; + EnterCriticalSection(&g_PuTTYLock); + if(pSFTPData = GetUnusedSFTPData()) + { + r = socket(af, type, protocol); + pSFTPData->Control = r; + pSFTPData->Data = INVALID_SOCKET; + pSFTPData->Handle = p_SFTP_Create(); + } + LeaveCriticalSection(&g_PuTTYLock); + return r; +} + +int SFTP_bind(SOCKET s, const struct sockaddr *addr, int namelen) +{ + return SOCKET_ERROR; +} + +int SFTP_listen(SOCKET s, int backlog) +{ + return SOCKET_ERROR; +} + +// accept相当の関数 +SOCKET SFTP_accept(SOCKET s, struct sockaddr *addr, int *addrlen) +{ + return INVALID_SOCKET; +} + +// connect相当の関数 +int SFTP_connect(SOCKET s, const struct sockaddr *name, int namelen) +{ + SFTPDATA* pSFTPData; + if(!g_bPuTTYLoaded) + return SOCKET_ERROR; + EnterCriticalSection(&g_PuTTYLock); + pSFTPData = FindSFTPDataFromSocket(s); + LeaveCriticalSection(&g_PuTTYLock); + if(!pSFTPData) + return SOCKET_ERROR; + if(namelen == sizeof(struct sockaddr_in)) + { + } + else if(namelen == sizeof(struct sockaddr_in6)) + { + } + else + return SOCKET_ERROR; + return 0; +} + +// closesocket相当の関数 +int SFTP_closesocket(SOCKET s) +{ + SFTPDATA* pSFTPData; + if(!g_bPuTTYLoaded) + return SOCKET_ERROR; + EnterCriticalSection(&g_PuTTYLock); + if(pSFTPData = FindSFTPDataFromSocket(s)) + { + if(pSFTPData->Control == s) + { + pSFTPData->Control = INVALID_SOCKET; + p_SFTP_Destroy(pSFTPData->Handle); + } + if(pSFTPData->Data == s) + pSFTPData->Data = INVALID_SOCKET; + } + LeaveCriticalSection(&g_PuTTYLock); + return closesocket(s); +} + +// send相当の関数 +int SFTP_send(SOCKET s, const char * buf, int len, int flags) +{ + int r; + SFTPDATA* pSFTPData; + if(!g_bPuTTYLoaded) + return SOCKET_ERROR; + EnterCriticalSection(&g_PuTTYLock); + pSFTPData = FindSFTPDataFromSocket(s); + LeaveCriticalSection(&g_PuTTYLock); + if(!pSFTPData) + return SOCKET_ERROR; + if(p_SFTP_IsExited(pSFTPData->Handle)) + return SOCKET_ERROR; + r = SOCKET_ERROR; + if(pSFTPData->Control == s) + r = (int)p_SFTP_WriteStdIn(pSFTPData->Handle, buf, len); + else if(pSFTPData->Data == s) + r = (int)p_SFTP_WriteDataIn(pSFTPData->Handle, buf, len); + return r; +} + +// recv相当の関数 +int SFTP_recv(SOCKET s, char * buf, int len, int flags) +{ + int r; + SFTPDATA* pSFTPData; + if(!g_bPuTTYLoaded) + return SOCKET_ERROR; + EnterCriticalSection(&g_PuTTYLock); + pSFTPData = FindSFTPDataFromSocket(s); + LeaveCriticalSection(&g_PuTTYLock); + if(!pSFTPData) + return SOCKET_ERROR; + if(p_SFTP_IsExited(pSFTPData->Handle)) + return SOCKET_ERROR; + r = SOCKET_ERROR; + if(pSFTPData->Control == s) + { + if(flags & MSG_PEEK) + r = (int)p_SFTP_PeekStdOut(pSFTPData->Handle, buf, len); + else + r = (int)p_SFTP_ReadStdOut(pSFTPData->Handle, buf, len); + } + else if(pSFTPData->Data == s) + { + if(flags & MSG_PEEK) + r = (int)p_SFTP_PeekDataOut(pSFTPData->Handle, buf, len); + else + r = (int)p_SFTP_ReadDataOut(pSFTPData->Handle, buf, len); + } + return r; +} + +BOOL SFTP_SetTimeoutCallback(SOCKET s, void* pCallback) +{ + SFTPDATA* pSFTPData; + if(!g_bPuTTYLoaded) + return FALSE; + EnterCriticalSection(&g_PuTTYLock); + pSFTPData = FindSFTPDataFromSocket(s); + LeaveCriticalSection(&g_PuTTYLock); + if(!pSFTPData) + return FALSE; + return p_SFTP_SetTimeoutCallback(pSFTPData->Handle, pCallback); +} + +// データ用の仮想的なソケットを取得 +// 識別子としてダミーのソケットを返す +SOCKET SFTP_GetDataHandle(SOCKET s, int af, int type, int protocol) +{ + SOCKET r; + SFTPDATA* pSFTPData; + if(!g_bPuTTYLoaded) + return INVALID_SOCKET; + r = INVALID_SOCKET; + EnterCriticalSection(&g_PuTTYLock); + if(pSFTPData = FindSFTPDataFromSocket(s)) + { + r = socket(af, type, protocol); + pSFTPData->Data = r; + } + LeaveCriticalSection(&g_PuTTYLock); + return r; +} + +BOOL SFTP_SetFilePosition(SOCKET s, LONGLONG Position) +{ + SFTPDATA* pSFTPData; + if(!g_bPuTTYLoaded) + return FALSE; + EnterCriticalSection(&g_PuTTYLock); + pSFTPData = FindSFTPDataFromSocket(s); + LeaveCriticalSection(&g_PuTTYLock); + if(!pSFTPData) + return FALSE; + return p_SFTP_SetFilePosition(pSFTPData->Handle, Position); +} +