X-Git-Url: http://git.sourceforge.jp/view?p=ffftp%2Fffftp.git;a=blobdiff_plain;f=socketwrapper.c;h=caae5893cf3eccf0fecd8da33d0077d537398c1a;hp=54209e0065af1295fa6f43edacf8d226f3805c06;hb=0d9559ea57ae201a5b1fe0161f88545141674c09;hpb=13b044809d800141bd342eed396325f460c20d8b;ds=sidebyside diff --git a/socketwrapper.c b/socketwrapper.c index 54209e0..caae589 100644 --- a/socketwrapper.c +++ b/socketwrapper.c @@ -2,15 +2,21 @@ // Copyright (C) 2011 Suguru Kawamoto // ソケットラッパー // socket関連関数をOpenSSL用に置換 +// socket関連関数のIPv6対応 // コンパイルにはOpenSSLのヘッダーファイルが必要 // 実行にはOpenSSLのDLLが必要 +#include #include #include #include #include "socketwrapper.h" #include "protectprocess.h" +#include "mbswrapper.h" +#include "punycode.h" + +// FTPS対応 typedef void (__cdecl* _SSL_load_error_strings)(); typedef int (__cdecl* _SSL_library_init)(); @@ -28,86 +34,156 @@ typedef int (__cdecl* _SSL_write)(SSL*, const void*, int); typedef int (__cdecl* _SSL_peek)(SSL*, void*, int); typedef int (__cdecl* _SSL_read)(SSL*, void*, int); typedef int (__cdecl* _SSL_get_error)(SSL*, int); +typedef X509* (__cdecl* _SSL_get_peer_certificate)(const SSL*); +typedef long (__cdecl* _SSL_get_verify_result)(const SSL*); +typedef SSL_SESSION* (__cdecl* _SSL_get_session)(SSL*); +typedef int (__cdecl* _SSL_set_session)(SSL*, SSL_SESSION*); +typedef X509_STORE* (__cdecl* _SSL_CTX_get_cert_store)(const SSL_CTX*); +typedef BIO_METHOD* (__cdecl* _BIO_s_mem)(); +typedef BIO* (__cdecl* _BIO_new)(BIO_METHOD*); +typedef int (__cdecl* _BIO_free)(BIO*); +typedef BIO* (__cdecl* _BIO_new_mem_buf)(void*, int); +typedef long (__cdecl* _BIO_ctrl)(BIO*, int, long, void*); +typedef void (__cdecl* _X509_free)(X509*); +typedef int (__cdecl* _X509_print_ex)(BIO*, X509*, unsigned long, unsigned long); +typedef X509_NAME* (__cdecl* _X509_get_subject_name)(X509*); +typedef int (__cdecl* _X509_NAME_print_ex)(BIO*, X509_NAME*, int, unsigned long); +typedef X509* (__cdecl* _PEM_read_bio_X509)(BIO*, X509**, pem_password_cb*, void*); +typedef int (__cdecl* _X509_STORE_add_cert)(X509_STORE*, X509*); + +_SSL_load_error_strings p_SSL_load_error_strings; +_SSL_library_init p_SSL_library_init; +_SSLv23_method p_SSLv23_method; +_SSL_CTX_new p_SSL_CTX_new; +_SSL_CTX_free p_SSL_CTX_free; +_SSL_new p_SSL_new; +_SSL_free p_SSL_free; +_SSL_shutdown p_SSL_shutdown; +_SSL_get_fd p_SSL_get_fd; +_SSL_set_fd p_SSL_set_fd; +_SSL_accept p_SSL_accept; +_SSL_connect p_SSL_connect; +_SSL_write p_SSL_write; +_SSL_peek p_SSL_peek; +_SSL_read p_SSL_read; +_SSL_get_error p_SSL_get_error; +_SSL_get_peer_certificate p_SSL_get_peer_certificate; +_SSL_get_verify_result p_SSL_get_verify_result; +_SSL_get_session p_SSL_get_session; +_SSL_set_session p_SSL_set_session; +_SSL_CTX_get_cert_store p_SSL_CTX_get_cert_store; +_BIO_s_mem p_BIO_s_mem; +_BIO_new p_BIO_new; +_BIO_free p_BIO_free; +_BIO_new_mem_buf p_BIO_new_mem_buf; +_BIO_ctrl p_BIO_ctrl; +_X509_free p_X509_free; +_X509_print_ex p_X509_print_ex; +_X509_get_subject_name p_X509_get_subject_name; +_X509_NAME_print_ex p_X509_NAME_print_ex; +_PEM_read_bio_X509 p_PEM_read_bio_X509; +_X509_STORE_add_cert p_X509_STORE_add_cert; -_SSL_load_error_strings pSSL_load_error_strings; -_SSL_library_init pSSL_library_init; -_SSLv23_method pSSLv23_method; -_SSL_CTX_new pSSL_CTX_new; -_SSL_CTX_free pSSL_CTX_free; -_SSL_new pSSL_new; -_SSL_free pSSL_free; -_SSL_shutdown pSSL_shutdown; -_SSL_get_fd pSSL_get_fd; -_SSL_set_fd pSSL_set_fd; -_SSL_accept pSSL_accept; -_SSL_connect pSSL_connect; -_SSL_write pSSL_write; -_SSL_peek pSSL_peek; -_SSL_read pSSL_read; -_SSL_get_error pSSL_get_error; - -#define MAX_SSL_SOCKET 64 +#define MAX_SSL_SOCKET 16 BOOL g_bOpenSSLLoaded; HMODULE g_hOpenSSL; +HMODULE g_hOpenSSLCommon; CRITICAL_SECTION g_OpenSSLLock; DWORD g_OpenSSLTimeout; LPSSLTIMEOUTCALLBACK g_pOpenSSLTimeoutCallback; +LPSSLCONFIRMCALLBACK g_pOpenSSLConfirmCallback; SSL_CTX* g_pOpenSSLCTX; SSL* g_pOpenSSLHandle[MAX_SSL_SOCKET]; -BOOL __stdcall DefaultSSLTimeoutCallback() +BOOL __stdcall DefaultSSLTimeoutCallback(BOOL* pbAborted) { Sleep(100); - return FALSE; + return *pbAborted; +} + +BOOL __stdcall DefaultSSLConfirmCallback(BOOL* pbAborted, BOOL bVerified, LPCSTR Certificate, LPCSTR CommonName) +{ + return bVerified; } +// OpenSSLを初期化 BOOL LoadOpenSSL() { if(g_bOpenSSLLoaded) return FALSE; #ifdef ENABLE_PROCESS_PROTECTION // 同梱するOpenSSLのバージョンに合わせてSHA1ハッシュ値を変更すること - // ssleay32.dll 1.0.0e - // libssl32.dll 1.0.0e - RegisterTrustedModuleSHA1Hash("\x4E\xB7\xA0\x22\x14\x4B\x58\x6D\xBC\xF5\x21\x0D\x96\x78\x0D\x79\x7D\x66\xB2\xB0"); - // libeay32.dll 1.0.0e - RegisterTrustedModuleSHA1Hash("\x01\x32\x7A\xAE\x69\x26\xE6\x58\xC7\x63\x22\x1E\x53\x5A\x78\xBC\x61\xC7\xB5\xC1"); + // ssleay32.dll 1.0.0g + // libssl32.dll 1.0.0g + RegisterTrustedModuleSHA1Hash("\x42\x32\x3E\x44\x35\xBC\x98\x6C\x45\xC9\xA2\xB8\x41\xE7\xDA\x7B\x6A\x98\xB2\x28"); + // libeay32.dll 1.0.0g + RegisterTrustedModuleSHA1Hash("\x3F\xC8\x07\x84\xB3\xF0\x71\x4A\x18\x59\x52\x1F\x99\x09\x65\xB9\x49\xA7\x15\x36"); #endif g_hOpenSSL = LoadLibrary("ssleay32.dll"); - if(!g_hOpenSSL) - g_hOpenSSL = LoadLibrary("libssl32.dll"); + // バージョン固定のためlibssl32.dllの読み込みは脆弱性の原因になり得るので廃止 +// if(!g_hOpenSSL) +// g_hOpenSSL = LoadLibrary("libssl32.dll"); if(!g_hOpenSSL - || !(pSSL_load_error_strings = (_SSL_load_error_strings)GetProcAddress(g_hOpenSSL, "SSL_load_error_strings")) - || !(pSSL_library_init = (_SSL_library_init)GetProcAddress(g_hOpenSSL, "SSL_library_init")) - || !(pSSLv23_method = (_SSLv23_method)GetProcAddress(g_hOpenSSL, "SSLv23_method")) - || !(pSSL_CTX_new = (_SSL_CTX_new)GetProcAddress(g_hOpenSSL, "SSL_CTX_new")) - || !(pSSL_CTX_free = (_SSL_CTX_free)GetProcAddress(g_hOpenSSL, "SSL_CTX_free")) - || !(pSSL_new = (_SSL_new)GetProcAddress(g_hOpenSSL, "SSL_new")) - || !(pSSL_free = (_SSL_free)GetProcAddress(g_hOpenSSL, "SSL_free")) - || !(pSSL_shutdown = (_SSL_shutdown)GetProcAddress(g_hOpenSSL, "SSL_shutdown")) - || !(pSSL_get_fd = (_SSL_get_fd)GetProcAddress(g_hOpenSSL, "SSL_get_fd")) - || !(pSSL_set_fd = (_SSL_set_fd)GetProcAddress(g_hOpenSSL, "SSL_set_fd")) - || !(pSSL_accept = (_SSL_accept)GetProcAddress(g_hOpenSSL, "SSL_accept")) - || !(pSSL_connect = (_SSL_connect)GetProcAddress(g_hOpenSSL, "SSL_connect")) - || !(pSSL_write = (_SSL_write)GetProcAddress(g_hOpenSSL, "SSL_write")) - || !(pSSL_peek = (_SSL_peek)GetProcAddress(g_hOpenSSL, "SSL_peek")) - || !(pSSL_read = (_SSL_read)GetProcAddress(g_hOpenSSL, "SSL_read")) - || !(pSSL_get_error = (_SSL_get_error)GetProcAddress(g_hOpenSSL, "SSL_get_error"))) + || !(p_SSL_load_error_strings = (_SSL_load_error_strings)GetProcAddress(g_hOpenSSL, "SSL_load_error_strings")) + || !(p_SSL_library_init = (_SSL_library_init)GetProcAddress(g_hOpenSSL, "SSL_library_init")) + || !(p_SSLv23_method = (_SSLv23_method)GetProcAddress(g_hOpenSSL, "SSLv23_method")) + || !(p_SSL_CTX_new = (_SSL_CTX_new)GetProcAddress(g_hOpenSSL, "SSL_CTX_new")) + || !(p_SSL_CTX_free = (_SSL_CTX_free)GetProcAddress(g_hOpenSSL, "SSL_CTX_free")) + || !(p_SSL_new = (_SSL_new)GetProcAddress(g_hOpenSSL, "SSL_new")) + || !(p_SSL_free = (_SSL_free)GetProcAddress(g_hOpenSSL, "SSL_free")) + || !(p_SSL_shutdown = (_SSL_shutdown)GetProcAddress(g_hOpenSSL, "SSL_shutdown")) + || !(p_SSL_get_fd = (_SSL_get_fd)GetProcAddress(g_hOpenSSL, "SSL_get_fd")) + || !(p_SSL_set_fd = (_SSL_set_fd)GetProcAddress(g_hOpenSSL, "SSL_set_fd")) + || !(p_SSL_accept = (_SSL_accept)GetProcAddress(g_hOpenSSL, "SSL_accept")) + || !(p_SSL_connect = (_SSL_connect)GetProcAddress(g_hOpenSSL, "SSL_connect")) + || !(p_SSL_write = (_SSL_write)GetProcAddress(g_hOpenSSL, "SSL_write")) + || !(p_SSL_peek = (_SSL_peek)GetProcAddress(g_hOpenSSL, "SSL_peek")) + || !(p_SSL_read = (_SSL_read)GetProcAddress(g_hOpenSSL, "SSL_read")) + || !(p_SSL_get_error = (_SSL_get_error)GetProcAddress(g_hOpenSSL, "SSL_get_error")) + || !(p_SSL_get_peer_certificate = (_SSL_get_peer_certificate)GetProcAddress(g_hOpenSSL, "SSL_get_peer_certificate")) + || !(p_SSL_get_verify_result = (_SSL_get_verify_result)GetProcAddress(g_hOpenSSL, "SSL_get_verify_result")) + || !(p_SSL_get_session = (_SSL_get_session)GetProcAddress(g_hOpenSSL, "SSL_get_session")) + || !(p_SSL_set_session = (_SSL_set_session)GetProcAddress(g_hOpenSSL, "SSL_set_session")) + || !(p_SSL_CTX_get_cert_store = (_SSL_CTX_get_cert_store)GetProcAddress(g_hOpenSSL, "SSL_CTX_get_cert_store"))) + { + if(g_hOpenSSL) + FreeLibrary(g_hOpenSSL); + g_hOpenSSL = NULL; + return FALSE; + } + g_hOpenSSLCommon = LoadLibrary("libeay32.dll"); + if(!g_hOpenSSLCommon + || !(p_BIO_s_mem = (_BIO_s_mem)GetProcAddress(g_hOpenSSLCommon, "BIO_s_mem")) + || !(p_BIO_new = (_BIO_new)GetProcAddress(g_hOpenSSLCommon, "BIO_new")) + || !(p_BIO_free = (_BIO_free)GetProcAddress(g_hOpenSSLCommon, "BIO_free")) + || !(p_BIO_new_mem_buf = (_BIO_new_mem_buf)GetProcAddress(g_hOpenSSLCommon, "BIO_new_mem_buf")) + || !(p_BIO_ctrl = (_BIO_ctrl)GetProcAddress(g_hOpenSSLCommon, "BIO_ctrl")) + || !(p_X509_free = (_X509_free)GetProcAddress(g_hOpenSSLCommon, "X509_free")) + || !(p_X509_print_ex = (_X509_print_ex)GetProcAddress(g_hOpenSSLCommon, "X509_print_ex")) + || !(p_X509_get_subject_name = (_X509_get_subject_name)GetProcAddress(g_hOpenSSLCommon, "X509_get_subject_name")) + || !(p_X509_NAME_print_ex = (_X509_NAME_print_ex)GetProcAddress(g_hOpenSSLCommon, "X509_NAME_print_ex")) + || !(p_PEM_read_bio_X509 = (_PEM_read_bio_X509)GetProcAddress(g_hOpenSSLCommon, "PEM_read_bio_X509")) + || !(p_X509_STORE_add_cert = (_X509_STORE_add_cert)GetProcAddress(g_hOpenSSLCommon, "X509_STORE_add_cert"))) { if(g_hOpenSSL) FreeLibrary(g_hOpenSSL); g_hOpenSSL = NULL; + if(g_hOpenSSLCommon) + FreeLibrary(g_hOpenSSLCommon); + g_hOpenSSLCommon = NULL; return FALSE; } InitializeCriticalSection(&g_OpenSSLLock); - pSSL_load_error_strings(); - pSSL_library_init(); + p_SSL_load_error_strings(); + p_SSL_library_init(); SetSSLTimeoutCallback(60000, DefaultSSLTimeoutCallback); + SetSSLConfirmCallback(DefaultSSLConfirmCallback); g_bOpenSSLLoaded = TRUE; return TRUE; } +// OpenSSLを解放 void FreeOpenSSL() { int i; @@ -118,21 +194,24 @@ void FreeOpenSSL() { if(g_pOpenSSLHandle[i]) { - pSSL_shutdown(g_pOpenSSLHandle[i]); - pSSL_free(g_pOpenSSLHandle[i]); + p_SSL_shutdown(g_pOpenSSLHandle[i]); + p_SSL_free(g_pOpenSSLHandle[i]); g_pOpenSSLHandle[i] = NULL; } } if(g_pOpenSSLCTX) - pSSL_CTX_free(g_pOpenSSLCTX); + p_SSL_CTX_free(g_pOpenSSLCTX); g_pOpenSSLCTX = NULL; FreeLibrary(g_hOpenSSL); g_hOpenSSL = NULL; + FreeLibrary(g_hOpenSSLCommon); + g_hOpenSSLCommon = NULL; LeaveCriticalSection(&g_OpenSSLLock); DeleteCriticalSection(&g_OpenSSLLock); g_bOpenSSLLoaded = FALSE; } +// OpenSSLが使用可能かどうか確認 BOOL IsOpenSSLLoaded() { return g_bOpenSSLLoaded; @@ -156,13 +235,82 @@ SSL** FindSSLPointerFromSocket(SOCKET s) { if(g_pOpenSSLHandle[i]) { - if(pSSL_get_fd(g_pOpenSSLHandle[i]) == s) + if(p_SSL_get_fd(g_pOpenSSLHandle[i]) == s) return &g_pOpenSSLHandle[i]; } } return NULL; } +BOOL ConfirmSSLCertificate(SSL* pSSL, BOOL* pbAborted) +{ + BOOL bResult; + BOOL bVerified; + char* pData; + char* pSubject; + X509* pX509; + BIO* pBIO; + long Length; + char* pBuffer; + char* pCN; + char* p; + bResult = FALSE; + bVerified = FALSE; + pData = NULL; + pSubject = NULL; + if(pX509 = p_SSL_get_peer_certificate(pSSL)) + { + if(pBIO = p_BIO_new(p_BIO_s_mem())) + { + p_X509_print_ex(pBIO, pX509, 0, XN_FLAG_RFC2253); + if((Length = p_BIO_ctrl(pBIO, BIO_CTRL_INFO, 0, &pBuffer)) > 0) + { + if(pData = (char*)malloc(Length + sizeof(char))) + { + memcpy(pData, pBuffer, Length); + *(char*)((size_t)pData + Length) = '\0'; + } + } + p_BIO_free(pBIO); + } + if(pBIO = p_BIO_new(p_BIO_s_mem())) + { + p_X509_NAME_print_ex(pBIO, p_X509_get_subject_name(pX509), 0, XN_FLAG_RFC2253); + if((Length = p_BIO_ctrl(pBIO, BIO_CTRL_INFO, 0, &pBuffer)) > 0) + { + if(pSubject = (char*)malloc(Length + sizeof(char))) + { + memcpy(pSubject, pBuffer, Length); + *(char*)((size_t)pSubject + Length) = '\0'; + } + } + p_BIO_free(pBIO); + } + p_X509_free(pX509); + } + if(pX509 && p_SSL_get_verify_result(pSSL) == X509_V_OK) + bVerified = TRUE; + pCN = pSubject; + while(pCN) + { + if(strncmp(pCN, "CN=", strlen("CN=")) == 0) + { + pCN += strlen("CN="); + if(p = strchr(pCN, ',')) + *p = '\0'; + break; + } + if(pCN = strchr(pCN, ',')) + pCN++; + } + bResult = g_pOpenSSLConfirmCallback(pbAborted, bVerified, pData, pCN); + if(pData) + free(pData); + if(pSubject) + free(pSubject); + return bResult; +} + void SetSSLTimeoutCallback(DWORD Timeout, LPSSLTIMEOUTCALLBACK pCallback) { if(!g_bOpenSSLLoaded) @@ -173,38 +321,192 @@ void SetSSLTimeoutCallback(DWORD Timeout, LPSSLTIMEOUTCALLBACK pCallback) LeaveCriticalSection(&g_OpenSSLLock); } -BOOL AttachSSL(SOCKET s) +void SetSSLConfirmCallback(LPSSLCONFIRMCALLBACK pCallback) +{ + if(!g_bOpenSSLLoaded) + return; + EnterCriticalSection(&g_OpenSSLLock); + g_pOpenSSLConfirmCallback = pCallback; + LeaveCriticalSection(&g_OpenSSLLock); +} + +// SSLルート証明書を設定 +// PEM形式のみ指定可能 +BOOL SetSSLRootCertificate(const void* pData, DWORD Length) +{ + BOOL r; + X509_STORE* pStore; + BYTE* p; + BYTE* pBegin; + BYTE* pEnd; + BIO* pBIO; + X509* pX509; + if(!g_bOpenSSLLoaded) + return FALSE; + r = FALSE; + EnterCriticalSection(&g_OpenSSLLock); + if(!g_pOpenSSLCTX) + g_pOpenSSLCTX = p_SSL_CTX_new(p_SSLv23_method()); + if(g_pOpenSSLCTX) + { + if(pStore = p_SSL_CTX_get_cert_store(g_pOpenSSLCTX)) + { + p = (BYTE*)pData; + pBegin = NULL; + pEnd = NULL; + while(Length > 0) + { + if(!pBegin) + { + if(Length < 27) + break; + if(memcmp(p, "-----BEGIN CERTIFICATE-----", 27) == 0) + pBegin = p; + } + else if(!pEnd) + { + if(Length < 25) + break; + if(memcmp(p, "-----END CERTIFICATE-----", 25) == 0) + pEnd = p + 25; + } + if(pBegin && pEnd) + { + if(pBIO = p_BIO_new_mem_buf(pBegin, (int)((size_t)pEnd - (size_t)pBegin))) + { + if(pX509 = p_PEM_read_bio_X509(pBIO, NULL, NULL, NULL)) + { + if(p_X509_STORE_add_cert(pStore, pX509) == 1) + r = TRUE; + p_X509_free(pX509); + } + p_BIO_free(pBIO); + } + pBegin = NULL; + pEnd = NULL; + } + p++; + Length--; + } + } + } + LeaveCriticalSection(&g_OpenSSLLock); + return r; +} + +// ワイルドカードの比較 +// 主にSSL証明書のCN確認用 +BOOL IsHostNameMatched(LPCSTR HostName, LPCSTR CommonName) +{ + BOOL bResult; + const char* pAsterisk; + size_t BeforeAsterisk; + const char* pBeginAsterisk; + const char* pEndAsterisk; + const char* pDot; + bResult = FALSE; + if(HostName && CommonName) + { + if(pAsterisk = strchr(CommonName, '*')) + { + BeforeAsterisk = ((size_t)pAsterisk - (size_t)CommonName) / sizeof(char); + pBeginAsterisk = HostName + BeforeAsterisk; + while(*pAsterisk == '*') + { + pAsterisk++; + } + pEndAsterisk = HostName + strlen(HostName) - strlen(pAsterisk); + // "*"より前は大文字小文字を無視して完全一致 + if(_strnicmp(HostName, CommonName, BeforeAsterisk) == 0) + { + // "*"より後は大文字小文字を無視して完全一致 + if(_stricmp(pEndAsterisk, pAsterisk) == 0) + { + // "*"と一致する範囲に"."が含まれてはならない + pDot = strchr(pBeginAsterisk, '.'); + if(!pDot || pDot >= pEndAsterisk) + bResult = TRUE; + } + } + } + else if(_stricmp(HostName, CommonName) == 0) + bResult = TRUE; + } + return bResult; +} + +// SSLセッションを開始 +BOOL AttachSSL(SOCKET s, SOCKET parent, BOOL* pbAborted) { BOOL r; DWORD Time; SSL** ppSSL; + SSL** ppSSLParent; + SSL_SESSION* pSession; + int Return; + int Error; if(!g_bOpenSSLLoaded) return FALSE; r = FALSE; Time = timeGetTime(); EnterCriticalSection(&g_OpenSSLLock); if(!g_pOpenSSLCTX) - g_pOpenSSLCTX = pSSL_CTX_new(pSSLv23_method()); + g_pOpenSSLCTX = p_SSL_CTX_new(p_SSLv23_method()); if(g_pOpenSSLCTX) { if(ppSSL = GetUnusedSSLPointer()) { - if(*ppSSL = pSSL_new(g_pOpenSSLCTX)) + if(*ppSSL = p_SSL_new(g_pOpenSSLCTX)) { - if(pSSL_set_fd(*ppSSL, s) != 0) + if(p_SSL_set_fd(*ppSSL, s) != 0) { - r = TRUE; + if(parent != INVALID_SOCKET) + { + if(ppSSLParent = FindSSLPointerFromSocket(parent)) + { + if(pSession = p_SSL_get_session(*ppSSLParent)) + { + if(p_SSL_set_session(*ppSSL, pSession) == 1) + { + } + } + } + } // SSLのネゴシエーションには時間がかかる場合がある - while(pSSL_connect(*ppSSL) != 1) + r = TRUE; + while(r) { - LeaveCriticalSection(&g_OpenSSLLock); - if(g_pOpenSSLTimeoutCallback() || (g_OpenSSLTimeout > 0 && timeGetTime() - Time >= g_OpenSSLTimeout)) + Return = p_SSL_connect(*ppSSL); + if(Return == 1) + break; + Error = p_SSL_get_error(*ppSSL, Return); + if(Error == SSL_ERROR_WANT_READ || Error == SSL_ERROR_WANT_WRITE) { + LeaveCriticalSection(&g_OpenSSLLock); + if(g_pOpenSSLTimeoutCallback(pbAborted) || (g_OpenSSLTimeout > 0 && timeGetTime() - Time >= g_OpenSSLTimeout)) + r = FALSE; + EnterCriticalSection(&g_OpenSSLLock); + } + else + r = FALSE; + } + if(r) + { + if(ConfirmSSLCertificate(*ppSSL, pbAborted)) + { + } + else + { + LeaveCriticalSection(&g_OpenSSLLock); DetachSSL(s); r = FALSE; EnterCriticalSection(&g_OpenSSLLock); - break; } + } + else + { + LeaveCriticalSection(&g_OpenSSLLock); + DetachSSL(s); EnterCriticalSection(&g_OpenSSLLock); } } @@ -221,6 +523,7 @@ BOOL AttachSSL(SOCKET s) return r; } +// SSLセッションを終了 BOOL DetachSSL(SOCKET s) { BOOL r; @@ -231,8 +534,8 @@ BOOL DetachSSL(SOCKET s) EnterCriticalSection(&g_OpenSSLLock); if(ppSSL = FindSSLPointerFromSocket(s)) { - pSSL_shutdown(*ppSSL); - pSSL_free(*ppSSL); + p_SSL_shutdown(*ppSSL); + p_SSL_free(*ppSSL); *ppSSL = NULL; r = TRUE; } @@ -240,6 +543,8 @@ BOOL DetachSSL(SOCKET s) return r; } +// SSLとしてマークされているか確認 +// マークされていればTRUEを返す BOOL IsSSLAttached(SOCKET s) { SSL** ppSSL; @@ -249,30 +554,34 @@ BOOL IsSSLAttached(SOCKET s) ppSSL = FindSSLPointerFromSocket(s); LeaveCriticalSection(&g_OpenSSLLock); if(!ppSSL) - return TRUE; + return FALSE; return TRUE; } -SOCKET socketS(int af, int type, int protocol) +SOCKET FTPS_socket(int af, int type, int protocol) { return socket(af, type, protocol); } -int bindS(SOCKET s, const struct sockaddr *addr, int namelen) +int FTPS_bind(SOCKET s, const struct sockaddr *addr, int namelen) { return bind(s, addr, namelen); } -int listenS(SOCKET s, int backlog) +int FTPS_listen(SOCKET s, int backlog) { return listen(s, backlog); } -SOCKET acceptS(SOCKET s, struct sockaddr *addr, int *addrlen) +// accept相当の関数 +// ただし初めからSSLのネゴシエーションを行う +SOCKET FTPS_accept(SOCKET s, struct sockaddr *addr, int *addrlen) { SOCKET r; + BOOL bAborted; r = accept(s, addr, addrlen); - if(!AttachSSL(r)) + bAborted = FALSE; + if(!AttachSSL(r, INVALID_SOCKET, &bAborted)) { closesocket(r); return INVALID_SOCKET; @@ -280,22 +589,28 @@ SOCKET acceptS(SOCKET s, struct sockaddr *addr, int *addrlen) return r; } -int connectS(SOCKET s, const struct sockaddr *name, int namelen) +// connect相当の関数 +// ただし初めからSSLのネゴシエーションを行う +int FTPS_connect(SOCKET s, const struct sockaddr *name, int namelen) { int r; + BOOL bAborted; r = connect(s, name, namelen); - if(!AttachSSL(r)) + bAborted = FALSE; + if(!AttachSSL(r, INVALID_SOCKET, &bAborted)) return SOCKET_ERROR; return r; } -int closesocketS(SOCKET s) +// closesocket相当の関数 +int FTPS_closesocket(SOCKET s) { DetachSSL(s); return closesocket(s); } -int sendS(SOCKET s, const char * buf, int len, int flags) +// send相当の関数 +int FTPS_send(SOCKET s, const char * buf, int len, int flags) { SSL** ppSSL; if(!g_bOpenSSLLoaded) @@ -305,10 +620,11 @@ int sendS(SOCKET s, const char * buf, int len, int flags) LeaveCriticalSection(&g_OpenSSLLock); if(!ppSSL) return send(s, buf, len, flags); - return pSSL_write(*ppSSL, buf, len); + return p_SSL_write(*ppSSL, buf, len); } -int recvS(SOCKET s, char * buf, int len, int flags) +// recv相当の関数 +int FTPS_recv(SOCKET s, char * buf, int len, int flags) { SSL** ppSSL; if(!g_bOpenSSLLoaded) @@ -319,7 +635,711 @@ int recvS(SOCKET s, char * buf, int len, int flags) if(!ppSSL) return recv(s, buf, len, flags); if(flags & MSG_PEEK) - return pSSL_peek(*ppSSL, buf, len); - return pSSL_read(*ppSSL, buf, len); + return p_SSL_peek(*ppSSL, buf, len); + return p_SSL_read(*ppSSL, buf, len); +} + +// IPv6対応 + +const struct in6_addr IN6ADDR_NONE = {{0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}}; + +typedef struct +{ + HANDLE h; + HWND hWnd; + u_int wMsg; + char * name; + char * buf; + int buflen; + short Family; +} GETHOSTBYNAMEDATA; + +DWORD WINAPI WSAAsyncGetHostByNameIPv6ThreadProc(LPVOID lpParameter) +{ + GETHOSTBYNAMEDATA* pData; + struct hostent* pHost; + struct addrinfo* pAddr; + struct addrinfo* p; + pHost = NULL; + pData = (GETHOSTBYNAMEDATA*)lpParameter; + if(getaddrinfo(pData->name, NULL, NULL, &pAddr) == 0) + { + p = pAddr; + while(p) + { + if(p->ai_family == pData->Family) + { + switch(p->ai_family) + { + case AF_INET: + pHost = (struct hostent*)pData->buf; + if((size_t)pData->buflen >= sizeof(struct hostent) + sizeof(char*) * 2 + sizeof(struct in_addr) + && p->ai_addrlen >= sizeof(struct sockaddr_in)) + { + pHost->h_name = NULL; + pHost->h_aliases = NULL; + pHost->h_addrtype = p->ai_family; + pHost->h_length = sizeof(struct in_addr); + pHost->h_addr_list = (char**)(&pHost[1]); + pHost->h_addr_list[0] = (char*)(&pHost->h_addr_list[2]); + pHost->h_addr_list[1] = NULL; + memcpy(pHost->h_addr_list[0], &((struct sockaddr_in*)p->ai_addr)->sin_addr, sizeof(struct in_addr)); + PostMessage(pData->hWnd, pData->wMsg, (WPARAM)pData->h, (LPARAM)(sizeof(struct hostent) + sizeof(char*) * 2 + sizeof(struct in_addr))); + } + else + PostMessage(pData->hWnd, pData->wMsg, (WPARAM)pData->h, (LPARAM)(WSAENOBUFS << 16)); + break; + case AF_INET6: + pHost = (struct hostent*)pData->buf; + if((size_t)pData->buflen >= sizeof(struct hostent) + sizeof(char*) * 2 + sizeof(struct in6_addr) + && p->ai_addrlen >= sizeof(struct sockaddr_in6)) + { + pHost->h_name = NULL; + pHost->h_aliases = NULL; + pHost->h_addrtype = p->ai_family; + pHost->h_length = sizeof(struct in6_addr); + pHost->h_addr_list = (char**)(&pHost[1]); + pHost->h_addr_list[0] = (char*)(&pHost->h_addr_list[2]); + pHost->h_addr_list[1] = NULL; + memcpy(pHost->h_addr_list[0], &((struct sockaddr_in6*)p->ai_addr)->sin6_addr, sizeof(struct in6_addr)); + PostMessage(pData->hWnd, pData->wMsg, (WPARAM)pData->h, (LPARAM)(sizeof(struct hostent) + sizeof(char*) * 2 + sizeof(struct in6_addr))); + } + else + PostMessage(pData->hWnd, pData->wMsg, (WPARAM)pData->h, (LPARAM)(WSAENOBUFS << 16)); + break; + } + } + if(pHost) + break; + p = p->ai_next; + } + if(!p) + PostMessage(pData->hWnd, pData->wMsg, (WPARAM)pData->h, (LPARAM)(ERROR_INVALID_FUNCTION << 16)); + freeaddrinfo(pAddr); + } + else + PostMessage(pData->hWnd, pData->wMsg, (WPARAM)pData->h, (LPARAM)(ERROR_INVALID_FUNCTION << 16)); + // CreateThreadが返すハンドルが重複するのを回避 + Sleep(10000); + CloseHandle(pData->h); + free(pData->name); + free(pData); + return 0; +} + +// IPv6対応のWSAAsyncGetHostByName相当の関数 +// FamilyにはAF_INETまたはAF_INET6を指定可能 +// ただしANSI用 +HANDLE WSAAsyncGetHostByNameIPv6(HWND hWnd, u_int wMsg, const char * name, char * buf, int buflen, short Family) +{ + HANDLE hResult; + GETHOSTBYNAMEDATA* pData; + hResult = NULL; + if(pData = malloc(sizeof(GETHOSTBYNAMEDATA))) + { + pData->hWnd = hWnd; + pData->wMsg = wMsg; + if(pData->name = malloc(sizeof(char) * (strlen(name) + 1))) + { + strcpy(pData->name, name); + pData->buf = buf; + pData->buflen = buflen; + pData->Family = Family; + if(pData->h = CreateThread(NULL, 0, WSAAsyncGetHostByNameIPv6ThreadProc, pData, CREATE_SUSPENDED, NULL)) + { + ResumeThread(pData->h); + hResult = pData->h; + } + } + } + if(!hResult) + { + if(pData) + { + if(pData->name) + free(pData->name); + free(pData); + } + } + return hResult; +} + +// WSAAsyncGetHostByNameIPv6用のWSACancelAsyncRequest相当の関数 +int WSACancelAsyncRequestIPv6(HANDLE hAsyncTaskHandle) +{ + int Result; + Result = SOCKET_ERROR; + if(TerminateThread(hAsyncTaskHandle, 0)) + { + CloseHandle(hAsyncTaskHandle); + Result = 0; + } + return Result; +} + +char* AddressToStringIPv6(char* str, void* in6) +{ + char* pResult; + unsigned char* p; + int MaxZero; + int MaxZeroLen; + int i; + int j; + char Tmp[5]; + pResult = str; + p = (unsigned char*)in6; + MaxZero = 8; + MaxZeroLen = 1; + for(i = 0; i < 8; i++) + { + for(j = i; j < 8; j++) + { + if(p[j * 2] != 0 || p[j * 2 + 1] != 0) + break; + } + if(j - i > MaxZeroLen) + { + MaxZero = i; + MaxZeroLen = j - i; + } + } + strcpy(str, ""); + for(i = 0; i < 8; i++) + { + if(i == MaxZero) + { + if(i == 0) + strcat(str, ":"); + strcat(str, ":"); + } + else if(i < MaxZero || i >= MaxZero + MaxZeroLen) + { + sprintf(Tmp, "%x", (((int)p[i * 2] & 0xff) << 8) | ((int)p[i * 2 + 1] & 0xff)); + strcat(str, Tmp); + if(i < 7) + strcat(str, ":"); + } + } + return pResult; +} + +// IPv6対応のinet_ntoa相当の関数 +// ただしANSI用 +char* inet6_ntoa(struct in6_addr in6) +{ + char* pResult; + static char Adrs[40]; + pResult = NULL; + memset(Adrs, 0, sizeof(Adrs)); + pResult = AddressToStringIPv6(Adrs, &in6); + return pResult; +} + +// IPv6対応のinet_addr相当の関数 +// ただしANSI用 +struct in6_addr inet6_addr(const char* cp) +{ + struct in6_addr Result; + int AfterZero; + int i; + char* p; + memset(&Result, 0, sizeof(Result)); + AfterZero = 0; + for(i = 0; i < 8; i++) + { + if(!cp) + { + memcpy(&Result, &IN6ADDR_NONE, sizeof(struct in6_addr)); + break; + } + if(i >= AfterZero) + { + if(strncmp(cp, ":", 1) == 0) + { + cp = cp + 1; + if(i == 0 && strncmp(cp, ":", 1) == 0) + cp = cp + 1; + p = (char*)cp; + AfterZero = 7; + while(p = strstr(p, ":")) + { + p = p + 1; + AfterZero--; + } + } + else + { + Result.u.Word[i] = (USHORT)strtol(cp, &p, 16); + Result.u.Word[i] = ((Result.u.Word[i] & 0xff00) >> 8) | ((Result.u.Word[i] & 0x00ff) << 8); + if(strncmp(p, ":", 1) != 0 && strlen(p) > 0) + { + memcpy(&Result, &IN6ADDR_NONE, sizeof(struct in6_addr)); + break; + } + if(cp = strstr(cp, ":")) + cp = cp + 1; + } + } + } + return Result; +} + +BOOL ConvertDomainNameToPunycode(LPSTR Output, DWORD Count, LPCSTR Input) +{ + BOOL bResult; + punycode_uint* pUnicode; + punycode_uint* p; + BOOL bNeeded; + LPCSTR InputString; + punycode_uint Length; + punycode_uint OutputLength; + bResult = FALSE; + if(pUnicode = malloc(sizeof(punycode_uint) * strlen(Input))) + { + p = pUnicode; + bNeeded = FALSE; + InputString = Input; + Length = 0; + while(*InputString != '\0') + { + *p = (punycode_uint)GetNextCharM(InputString, &InputString); + if(*p >= 0x80) + bNeeded = TRUE; + p++; + Length++; + } + if(bNeeded) + { + if(Count >= strlen("xn--") + 1) + { + strcpy(Output, "xn--"); + OutputLength = Count - strlen("xn--"); + if(punycode_encode(Length, pUnicode, NULL, (punycode_uint*)&OutputLength, Output + strlen("xn--")) == punycode_success) + { + Output[strlen("xn--") + OutputLength] = '\0'; + bResult = TRUE; + } + } + } + free(pUnicode); + } + if(!bResult) + { + if(Count >= strlen(Input) + 1) + { + strcpy(Output, Input); + bResult = TRUE; + } + } + return bResult; +} + +BOOL ConvertNameToPunycode(LPSTR Output, LPCSTR Input) +{ + BOOL bResult; + DWORD Length; + char* pm0; + char* pm1; + char* p; + char* pNext; + bResult = FALSE; + Length = strlen(Input); + if(pm0 = AllocateStringM(Length + 1)) + { + if(pm1 = AllocateStringM(Length * 4 + 1)) + { + strcpy(pm0, Input); + p = pm0; + while(p) + { + if(pNext = strchr(p, '.')) + { + *pNext = '\0'; + pNext++; + } + if(ConvertDomainNameToPunycode(pm1, Length * 4, p)) + strcat(Output, pm1); + if(pNext) + strcat(Output, "."); + p = pNext; + } + bResult = TRUE; + FreeDuplicatedString(pm1); + } + FreeDuplicatedString(pm0); + } + return bResult; +} + +HANDLE WSAAsyncGetHostByNameM(HWND hWnd, u_int wMsg, const char * name, char * buf, int buflen) +{ + HANDLE r = NULL; + char* pa0 = NULL; + if(pa0 = AllocateStringA(strlen(name) * 4)) + { + if(ConvertNameToPunycode(pa0, name)) + r = WSAAsyncGetHostByName(hWnd, wMsg, pa0, buf, buflen); + } + FreeDuplicatedString(pa0); + return r; +} + +HANDLE WSAAsyncGetHostByNameIPv6M(HWND hWnd, u_int wMsg, const char * name, char * buf, int buflen, short Family) +{ + HANDLE r = NULL; + char* pa0 = NULL; + if(pa0 = AllocateStringA(strlen(name) * 4)) + { + if(ConvertNameToPunycode(pa0, name)) + r = WSAAsyncGetHostByNameIPv6(hWnd, wMsg, pa0, buf, buflen, Family); + } + FreeDuplicatedString(pa0); + return r; +} + +// SFTP対応 + +typedef void* (__cdecl* _SFTP_Create)(); +typedef void (__cdecl* _SFTP_Destroy)(void*); +typedef BOOL (__cdecl* _SFTP_IsExited)(void*); +typedef BOOL (__cdecl* _SFTP_SetTimeoutCallback)(void*, void*); +typedef size_t (__cdecl* _SFTP_PeekStdOut)(void*, void*, size_t); +typedef size_t (__cdecl* _SFTP_ReadStdOut)(void*, void*, size_t); +typedef size_t (__cdecl* _SFTP_WriteStdIn)(void*, const void*, size_t); +typedef size_t (__cdecl* _SFTP_PeekDataOut)(void*, void*, size_t); +typedef size_t (__cdecl* _SFTP_ReadDataOut)(void*, void*, size_t); +typedef size_t (__cdecl* _SFTP_WriteDataIn)(void*, const void*, size_t); +typedef BOOL (__cdecl* _SFTP_SetFilePosition)(void*, LONGLONG); + +_SFTP_Create p_SFTP_Create; +_SFTP_Destroy p_SFTP_Destroy; +_SFTP_IsExited p_SFTP_IsExited; +_SFTP_SetTimeoutCallback p_SFTP_SetTimeoutCallback; +_SFTP_PeekStdOut p_SFTP_PeekStdOut; +_SFTP_ReadStdOut p_SFTP_ReadStdOut; +_SFTP_WriteStdIn p_SFTP_WriteStdIn; +_SFTP_PeekDataOut p_SFTP_PeekDataOut; +_SFTP_ReadDataOut p_SFTP_ReadDataOut; +_SFTP_WriteDataIn p_SFTP_WriteDataIn; +_SFTP_SetFilePosition p_SFTP_SetFilePosition; + +typedef struct +{ + SOCKET Control; + SOCKET Data; + void* Handle; + char Host[1024]; + int Port; + char User[1024]; + char Password[1024]; +} SFTPDATA; + +#define MAX_SFTP_SOCKET 16 + +BOOL g_bPuTTYLoaded; +HMODULE g_hPuTTY; +CRITICAL_SECTION g_PuTTYLock; +SFTPDATA g_SFTPData[MAX_SFTP_SOCKET]; + +// PuTTYを初期化 +BOOL LoadPuTTY() +{ + int i; + if(g_bPuTTYLoaded) + return FALSE; +#ifdef ENABLE_PROCESS_PROTECTION + // ビルドしたputty.dllに合わせてSHA1ハッシュ値を変更すること + RegisterTrustedModuleSHA1Hash("\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"); +#endif + // デバッグ用 +#ifdef _DEBUG + { + char Path[MAX_PATH]; + GetModuleFileName(NULL, Path, MAX_PATH); + strcpy(strrchr(Path, '\\'), "\\..\\putty\\Debug\\PuTTY.dll"); + g_hPuTTY = LoadLibrary(Path); + } +#else + g_hPuTTY = LoadLibrary("putty.dll"); +#endif + if(!g_hPuTTY + || !(p_SFTP_Create = (_SFTP_Create)GetProcAddress(g_hPuTTY, "SFTP_Create")) + || !(p_SFTP_Destroy = (_SFTP_Destroy)GetProcAddress(g_hPuTTY, "SFTP_Destroy")) + || !(p_SFTP_IsExited = (_SFTP_IsExited)GetProcAddress(g_hPuTTY, "SFTP_IsExited")) + || !(p_SFTP_SetTimeoutCallback = (_SFTP_SetTimeoutCallback)GetProcAddress(g_hPuTTY, "SFTP_SetTimeoutCallback")) + || !(p_SFTP_PeekStdOut = (_SFTP_PeekStdOut)GetProcAddress(g_hPuTTY, "SFTP_PeekStdOut")) + || !(p_SFTP_ReadStdOut = (_SFTP_ReadStdOut)GetProcAddress(g_hPuTTY, "SFTP_ReadStdOut")) + || !(p_SFTP_WriteStdIn = (_SFTP_WriteStdIn)GetProcAddress(g_hPuTTY, "SFTP_WriteStdIn")) + || !(p_SFTP_PeekDataOut = (_SFTP_PeekDataOut)GetProcAddress(g_hPuTTY, "SFTP_PeekDataOut")) + || !(p_SFTP_ReadDataOut = (_SFTP_ReadDataOut)GetProcAddress(g_hPuTTY, "SFTP_ReadDataOut")) + || !(p_SFTP_WriteDataIn = (_SFTP_WriteDataIn)GetProcAddress(g_hPuTTY, "SFTP_WriteDataIn")) + || !(p_SFTP_SetFilePosition = (_SFTP_SetFilePosition)GetProcAddress(g_hPuTTY, "SFTP_SetFilePosition"))) + { + if(g_hPuTTY) + FreeLibrary(g_hPuTTY); + g_hPuTTY = NULL; + return FALSE; + } + for(i = 0; i < MAX_SFTP_SOCKET; i++) + { + g_SFTPData[i].Control = INVALID_SOCKET; + g_SFTPData[i].Data = INVALID_SOCKET; + } + InitializeCriticalSection(&g_PuTTYLock); + g_bPuTTYLoaded = TRUE; + return TRUE; +} + +// PuTTYを解放 +void FreePuTTY() +{ + int i; + if(!g_bPuTTYLoaded) + return; + EnterCriticalSection(&g_PuTTYLock); + for(i = 0; i < MAX_SFTP_SOCKET; i++) + { + if(g_SFTPData[i].Control != INVALID_SOCKET) + { + closesocket(g_SFTPData[i].Control); + g_SFTPData[i].Control = INVALID_SOCKET; + p_SFTP_Destroy(g_SFTPData[i].Handle); + } + if(g_SFTPData[i].Data != INVALID_SOCKET) + { + closesocket(g_SFTPData[i].Data); + g_SFTPData[i].Data = INVALID_SOCKET; + } + } + FreeLibrary(g_hPuTTY); + g_hPuTTY = NULL; + LeaveCriticalSection(&g_PuTTYLock); + DeleteCriticalSection(&g_PuTTYLock); + g_bPuTTYLoaded = FALSE; +} + +// PuTTYが使用可能かどうか確認 +BOOL IsPuTTYLoaded() +{ + return g_bPuTTYLoaded; +} + +SFTPDATA* GetUnusedSFTPData() +{ + int i; + for(i = 0; i < MAX_SFTP_SOCKET; i++) + { + if(g_SFTPData[i].Control == INVALID_SOCKET) + { + memset(&g_SFTPData[i], 0, sizeof(SFTPDATA)); + return &g_SFTPData[i]; + } + } + return NULL; +} + +SFTPDATA* FindSFTPDataFromSocket(SOCKET s) +{ + int i; + for(i = 0; i < MAX_SFTP_SOCKET; i++) + { + if(g_SFTPData[i].Control == s || g_SFTPData[i].Data == s) + return &g_SFTPData[i]; + } + return NULL; +} + +// SFTPとしてマークされているか確認 +// マークされていればTRUEを返す +BOOL IsSFTPAttached(SOCKET s) +{ + SFTPDATA* pSFTPData; + if(!g_bPuTTYLoaded) + return FALSE; + EnterCriticalSection(&g_PuTTYLock); + pSFTPData = FindSFTPDataFromSocket(s); + LeaveCriticalSection(&g_PuTTYLock); + if(!pSFTPData) + return FALSE; + return TRUE; +} + +// コントロール用の仮想的なソケットを取得 +// 識別子としてダミーのソケットを返す +SOCKET SFTP_socket(int af, int type, int protocol) +{ + SOCKET r; + SFTPDATA* pSFTPData; + if(!g_bPuTTYLoaded) + return INVALID_SOCKET; + r = INVALID_SOCKET; + EnterCriticalSection(&g_PuTTYLock); + if(pSFTPData = GetUnusedSFTPData()) + { + r = socket(af, type, protocol); + pSFTPData->Control = r; + pSFTPData->Data = INVALID_SOCKET; + pSFTPData->Handle = p_SFTP_Create(); + } + LeaveCriticalSection(&g_PuTTYLock); + return r; +} + +int SFTP_bind(SOCKET s, const struct sockaddr *addr, int namelen) +{ + return SOCKET_ERROR; +} + +int SFTP_listen(SOCKET s, int backlog) +{ + return SOCKET_ERROR; +} + +// accept相当の関数 +SOCKET SFTP_accept(SOCKET s, struct sockaddr *addr, int *addrlen) +{ + return INVALID_SOCKET; +} + +// connect相当の関数 +int SFTP_connect(SOCKET s, const struct sockaddr *name, int namelen) +{ + SFTPDATA* pSFTPData; + if(!g_bPuTTYLoaded) + return SOCKET_ERROR; + EnterCriticalSection(&g_PuTTYLock); + pSFTPData = FindSFTPDataFromSocket(s); + LeaveCriticalSection(&g_PuTTYLock); + if(!pSFTPData) + return SOCKET_ERROR; + if(namelen == sizeof(struct sockaddr_in)) + { + } + else if(namelen == sizeof(struct sockaddr_in6)) + { + } + else + return SOCKET_ERROR; + return 0; +} + +// closesocket相当の関数 +int SFTP_closesocket(SOCKET s) +{ + SFTPDATA* pSFTPData; + if(!g_bPuTTYLoaded) + return SOCKET_ERROR; + EnterCriticalSection(&g_PuTTYLock); + if(pSFTPData = FindSFTPDataFromSocket(s)) + { + if(pSFTPData->Control == s) + { + pSFTPData->Control = INVALID_SOCKET; + p_SFTP_Destroy(pSFTPData->Handle); + } + if(pSFTPData->Data == s) + pSFTPData->Data = INVALID_SOCKET; + } + LeaveCriticalSection(&g_PuTTYLock); + return closesocket(s); +} + +// send相当の関数 +int SFTP_send(SOCKET s, const char * buf, int len, int flags) +{ + int r; + SFTPDATA* pSFTPData; + if(!g_bPuTTYLoaded) + return SOCKET_ERROR; + EnterCriticalSection(&g_PuTTYLock); + pSFTPData = FindSFTPDataFromSocket(s); + LeaveCriticalSection(&g_PuTTYLock); + if(!pSFTPData) + return SOCKET_ERROR; + if(p_SFTP_IsExited(pSFTPData->Handle)) + return SOCKET_ERROR; + r = SOCKET_ERROR; + if(pSFTPData->Control == s) + r = (int)p_SFTP_WriteStdIn(pSFTPData->Handle, buf, len); + else if(pSFTPData->Data == s) + r = (int)p_SFTP_WriteDataIn(pSFTPData->Handle, buf, len); + return r; +} + +// recv相当の関数 +int SFTP_recv(SOCKET s, char * buf, int len, int flags) +{ + int r; + SFTPDATA* pSFTPData; + if(!g_bPuTTYLoaded) + return SOCKET_ERROR; + EnterCriticalSection(&g_PuTTYLock); + pSFTPData = FindSFTPDataFromSocket(s); + LeaveCriticalSection(&g_PuTTYLock); + if(!pSFTPData) + return SOCKET_ERROR; + if(p_SFTP_IsExited(pSFTPData->Handle)) + return SOCKET_ERROR; + r = SOCKET_ERROR; + if(pSFTPData->Control == s) + { + if(flags & MSG_PEEK) + r = (int)p_SFTP_PeekStdOut(pSFTPData->Handle, buf, len); + else + r = (int)p_SFTP_ReadStdOut(pSFTPData->Handle, buf, len); + } + else if(pSFTPData->Data == s) + { + if(flags & MSG_PEEK) + r = (int)p_SFTP_PeekDataOut(pSFTPData->Handle, buf, len); + else + r = (int)p_SFTP_ReadDataOut(pSFTPData->Handle, buf, len); + } + return r; +} + +BOOL SFTP_SetTimeoutCallback(SOCKET s, void* pCallback) +{ + SFTPDATA* pSFTPData; + if(!g_bPuTTYLoaded) + return FALSE; + EnterCriticalSection(&g_PuTTYLock); + pSFTPData = FindSFTPDataFromSocket(s); + LeaveCriticalSection(&g_PuTTYLock); + if(!pSFTPData) + return FALSE; + return p_SFTP_SetTimeoutCallback(pSFTPData->Handle, pCallback); +} + +// データ用の仮想的なソケットを取得 +// 識別子としてダミーのソケットを返す +SOCKET SFTP_GetDataHandle(SOCKET s, int af, int type, int protocol) +{ + SOCKET r; + SFTPDATA* pSFTPData; + if(!g_bPuTTYLoaded) + return INVALID_SOCKET; + r = INVALID_SOCKET; + EnterCriticalSection(&g_PuTTYLock); + if(pSFTPData = FindSFTPDataFromSocket(s)) + { + r = socket(af, type, protocol); + pSFTPData->Data = r; + } + LeaveCriticalSection(&g_PuTTYLock); + return r; +} + +BOOL SFTP_SetFilePosition(SOCKET s, LONGLONG Position) +{ + SFTPDATA* pSFTPData; + if(!g_bPuTTYLoaded) + return FALSE; + EnterCriticalSection(&g_PuTTYLock); + pSFTPData = FindSFTPDataFromSocket(s); + LeaveCriticalSection(&g_PuTTYLock); + if(!pSFTPData) + return FALSE; + return p_SFTP_SetFilePosition(pSFTPData->Handle, Position); }