| 12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907 | 
							- // CAsyncSslSocketLayer by Tim Kosse ([email protected])
 
- //            Version 2.0 (2005-02-27)
 
- //---------------------------------------------------------------------------
 
- // Feel free to use this class, as long as you don't claim that you wrote it
 
- // and this copyright notice stays intact in the source files.
 
- // If you use this class in commercial applications, please send a short message
 
- // to [email protected]
 
- //---------------------------------------------------------------------------
 
- #include "stdafx.h"
 
- #include "AsyncSslSocketLayer.h"
 
- #include "FilezillaTools.h"
 
- #include <openssl/x509v3.h>
 
- #include <openssl/err.h>
 
- #include <openssl/tls1.h>
 
- /////////////////////////////////////////////////////////////////////////////
 
- // CAsyncSslSocketLayer
 
- CCriticalSectionWrapper CAsyncSslSocketLayer::m_sCriticalSection;
 
- CAsyncSslSocketLayer::t_SslLayerList* CAsyncSslSocketLayer::m_pSslLayerList = 0;
 
- int CAsyncSslSocketLayer::m_nSslRefCount = 0;
 
- std::map<SSL_CTX *, int> CAsyncSslSocketLayer::m_contextRefCount;
 
- CAsyncSslSocketLayer::CAsyncSslSocketLayer()
 
- {
 
-   m_ssl = 0;
 
-   m_sslbio = 0;
 
-   m_ibio = 0;
 
-   m_nbio = 0;
 
-   m_ssl_ctx = 0;
 
-   m_bUseSSL = false;
 
-   m_bSslInitialized = FALSE;
 
-   m_bSslEstablished = FALSE;
 
-   m_nNetworkSendBufferLen = 0;
 
-   m_nNetworkSendBufferMaxLen = 0;
 
-   m_pNetworkSendBuffer = NULL;
 
-   m_pRetrySendBuffer = 0;
 
-   m_nRetrySendBufferLen = 0;
 
-   m_nNetworkError = 0;
 
-   m_nShutDown = 0;
 
-   m_bBlocking = FALSE;
 
-   m_nSslAsyncNotifyId = 0;
 
-   m_bFailureSent = FALSE;
 
-   m_nVerificationResult = 0;
 
-   m_nVerificationDepth = 0;
 
-   m_mayTriggerRead = true;
 
-   m_mayTriggerWrite = true;
 
-   m_mayTriggerReadUp = true;
 
-   m_mayTriggerWriteUp = true;
 
-   m_onCloseCalled = false;
 
-   m_Main = NULL;
 
-   m_sessionid = NULL;
 
-   m_sessionreuse = true;
 
-   m_sessionreuse_failed = false;
 
-   FCertificate = NULL;
 
-   FPrivateKey = NULL;
 
- }
 
- CAsyncSslSocketLayer::~CAsyncSslSocketLayer()
 
- {
 
-   UnloadSSL();
 
-   delete [] m_pNetworkSendBuffer;
 
-   delete [] m_pRetrySendBuffer;
 
- }
 
- int CAsyncSslSocketLayer::InitSSL()
 
- {
 
-   if (m_bSslInitialized)
 
-     return 0;
 
-   m_sCriticalSection.Lock();
 
-   if (!m_nSslRefCount)
 
-   {
 
-     if (!OPENSSL_init_ssl(OPENSSL_INIT_LOAD_SSL_STRINGS | OPENSSL_INIT_LOAD_CRYPTO_STRINGS, NULL))
 
-     {
 
-       return SSL_FAILURE_INITSSL;
 
-     }
 
-   }
 
-   m_nSslRefCount++;
 
-   m_sCriticalSection.Unlock();
 
-   m_bSslInitialized = true;
 
-   return 0;
 
- }
 
- void CAsyncSslSocketLayer::OnReceive(int nErrorCode)
 
- {
 
-   if (m_bUseSSL)
 
-   {
 
-     if (m_bBlocking)
 
-     {
 
-       m_mayTriggerRead = true;
 
-       return;
 
-     }
 
-     if (m_nNetworkError)
 
-     {
 
-       return;
 
-     }
 
-     char buffer[16384];
 
-     m_mayTriggerRead = false;
 
-     //Get number of bytes we can receive and store in the network input bio
 
-     int len = BIO_ctrl_get_write_guarantee(m_nbio);
 
-     if (len > 16384)
 
-       len = 16384;
 
-     else if (!len)
 
-     {
 
-       m_mayTriggerRead = true;
 
-       TriggerEvents();
 
-       return;
 
-     }
 
-     int numread = 0;
 
-     // Receive data
 
-     numread = ReceiveNext(buffer, len);
 
-     if (numread > 0)
 
-     {
 
-       //Store it in the network input bio and process data
 
-       int numwritten = BIO_write(m_nbio, buffer, numread);
 
-       BIO_ctrl(m_nbio, BIO_CTRL_FLUSH, 0, NULL);
 
-       // I have no idea why this call is needed, but without it, connections
 
-       // will stall. Perhaps it triggers some internal processing.
 
-       // Also, ignore return value, don't do any error checking. This function
 
-       // can report errors, even though a later call can succeed.
 
-       char buffer;
 
-       BIO_read(m_sslbio, &buffer, 0);
 
-     }
 
-     if (!numread)
 
-     {
 
-       if (GetLayerState() == connected)
 
-         TriggerEvent(FD_CLOSE, nErrorCode, TRUE);
 
-     }
 
-     else if (numread == SOCKET_ERROR)
 
-     {
 
-       int nError = GetLastError();
 
-       if (nError != WSAEWOULDBLOCK && nError != WSAENOTCONN)
 
-       {
 
-         m_nNetworkError = GetLastError();
 
-         TriggerEvent(FD_CLOSE, 0, TRUE);
 
-         return;
 
-       }
 
-     }
 
-     if (m_pRetrySendBuffer)
 
-     {
 
-       int numwrite = BIO_write(m_sslbio, m_pRetrySendBuffer, m_nRetrySendBufferLen);
 
-       if (numwrite >= 0)
 
-       {
 
-         BIO_ctrl(m_sslbio, BIO_CTRL_FLUSH, 0, NULL);
 
-         delete [] m_pRetrySendBuffer;
 
-         m_pRetrySendBuffer = 0;
 
-       }
 
-       else if (numwrite == -1)
 
-       {
 
-         if (!BIO_should_retry(m_sslbio))
 
-         {
 
-           delete [] m_pRetrySendBuffer;
 
-           m_pRetrySendBuffer = 0;
 
-           ::SetLastError(WSAECONNABORTED);
 
-           TriggerEvent(FD_CLOSE, 0, TRUE);
 
-           return;
 
-         }
 
-       }
 
-     }
 
-     if (!m_nShutDown && SSL_get_shutdown(m_ssl))
 
-     {
 
-       size_t pending = BIO_ctrl_pending(m_sslbio);
 
-       if (pending <= 0)
 
-       {
 
-         if (ShutDown() || GetLastError() == WSAEWOULDBLOCK)
 
-         {
 
-           if (ShutDownComplete())
 
-             TriggerEvent(FD_CLOSE, 0, TRUE);
 
-         }
 
-         else
 
-         {
 
-           m_nNetworkError = WSAECONNABORTED;
 
-           WSASetLastError(WSAECONNABORTED);
 
-           TriggerEvent(FD_CLOSE, WSAECONNABORTED, TRUE);
 
-         }
 
-         return;
 
-       }
 
-     }
 
-     if (ShutDownComplete() && m_nShutDown == 1)
 
-     {
 
-       //Send shutdown notification if all pending data has been sent
 
-       DoLayerCallback(LAYERCALLBACK_LAYERSPECIFIC, SSL_INFO, SSL_INFO_SHUTDOWNCOMPLETE);
 
-       m_nShutDown++;
 
-     }
 
-     TriggerEvents();
 
-   }
 
-   else
 
-   {
 
-     TriggerEvent(FD_READ, nErrorCode, TRUE);
 
-   }
 
- }
 
- void CAsyncSslSocketLayer::OnSend(int nErrorCode)
 
- {
 
-   if (m_bUseSSL)
 
-   {
 
-     if (m_nNetworkError)
 
-     {
 
-       return;
 
-     }
 
-     m_mayTriggerWrite = false;
 
-     //Send data in the send buffer
 
-     while (m_nNetworkSendBufferLen)
 
-     {
 
-       int numsent = SendNext(m_pNetworkSendBuffer, m_nNetworkSendBufferLen);
 
-       if (numsent == SOCKET_ERROR)
 
-       {
 
-         int nError = GetLastError();
 
-         if (nError != WSAEWOULDBLOCK && nError != WSAENOTCONN)
 
-         {
 
-           m_nNetworkError = nError;
 
-           TriggerEvent(FD_CLOSE, 0, TRUE);
 
-         }
 
-         return;
 
-       }
 
-       else if (!numsent)
 
-       {
 
-         if (GetLayerState() == connected)
 
-           TriggerEvent(FD_CLOSE, nErrorCode, TRUE);
 
-       }
 
-       if (numsent == m_nNetworkSendBufferLen)
 
-       {
 
-         m_nNetworkSendBufferLen = 0;
 
-       }
 
-       else
 
-       {
 
-         memmove(m_pNetworkSendBuffer, m_pNetworkSendBuffer + numsent, m_nNetworkSendBufferLen - numsent);
 
-         m_nNetworkSendBufferLen -= numsent;
 
-       }
 
-     }
 
-     //Send the data waiting in the network bio
 
-     char buffer[32 * 1024];
 
-     size_t len = BIO_ctrl_pending(m_nbio);
 
-     int numread = BIO_read(m_nbio, buffer, std::min(len, sizeof(buffer)));
 
-     if (numread <= 0)
 
-       m_mayTriggerWrite = true;
 
-     while (numread > 0)
 
-     {
 
-       int numsent = SendNext(buffer, numread);
 
-       if (!numsent)
 
-       {
 
-         if (GetLayerState() == connected)
 
-           TriggerEvent(FD_CLOSE, nErrorCode, TRUE);
 
-       }
 
-       if (numsent == SOCKET_ERROR || numsent < numread)
 
-       {
 
-         if (numsent == SOCKET_ERROR)
 
-           if (GetLastError() != WSAEWOULDBLOCK && GetLastError() != WSAENOTCONN)
 
-           {
 
-             m_nNetworkError = GetLastError();
 
-             TriggerEvent(FD_CLOSE, 0, TRUE);
 
-             return;
 
-           }
 
-           else
 
-             numsent = 0;
 
-         // Add all data that was retrieved from the network bio but could not be sent to the send buffer.
 
-         if (m_nNetworkSendBufferMaxLen < (m_nNetworkSendBufferLen + numread - numsent))
 
-         {
 
-           char * tmp = m_pNetworkSendBuffer;
 
-           m_nNetworkSendBufferMaxLen = static_cast<int>((m_nNetworkSendBufferLen + numread - numsent) * 1.5);
 
-           m_pNetworkSendBuffer = new char[m_nNetworkSendBufferMaxLen];
 
-           if (tmp)
 
-           {
 
-             memcpy(m_pNetworkSendBuffer, tmp, m_nNetworkSendBufferLen);
 
-             delete [] tmp;
 
-           }
 
-         }
 
-         DebugAssert(m_pNetworkSendBuffer);
 
-         memcpy(m_pNetworkSendBuffer + m_nNetworkSendBufferLen, buffer, numread-numsent);
 
-         m_nNetworkSendBufferLen += numread - numsent;
 
-       }
 
-       if (!numsent)
 
-       {
 
-         break;
 
-       }
 
-       len = BIO_ctrl_pending(m_nbio);
 
-       if (!len)
 
-       {
 
-         m_mayTriggerWrite = true;
 
-         break;
 
-       }
 
-       numread = BIO_read(m_nbio, buffer, len);
 
-       if (numread <= 0)
 
-       {
 
-         m_mayTriggerWrite = true;
 
-       }
 
-     }
 
-     if (m_pRetrySendBuffer)
 
-     {
 
-       int numwrite = BIO_write(m_sslbio, m_pRetrySendBuffer, m_nRetrySendBufferLen);
 
-       if (numwrite >= 0)
 
-       {
 
-         BIO_ctrl(m_sslbio, BIO_CTRL_FLUSH, 0, NULL);
 
-         delete [] m_pRetrySendBuffer;
 
-         m_pRetrySendBuffer = 0;
 
-       }
 
-       else if (numwrite == -1)
 
-       {
 
-         if (!BIO_should_retry(m_sslbio))
 
-         {
 
-           delete [] m_pRetrySendBuffer;
 
-           m_pRetrySendBuffer = 0;
 
-           ::SetLastError(WSAECONNABORTED);
 
-           TriggerEvent(FD_CLOSE, 0, TRUE);
 
-           return;
 
-         }
 
-       }
 
-     }
 
-     // No more data available, ask for more.
 
-     TriggerEvents();
 
-     if (m_nShutDown == 1 && ShutDownComplete())
 
-     {
 
-       //Send shutdown notification if all pending data has been sent
 
-             // FileZilla3 calls ShutDownNext() here
 
-       DoLayerCallback(LAYERCALLBACK_LAYERSPECIFIC, SSL_INFO, SSL_INFO_SHUTDOWNCOMPLETE);
 
-       m_nShutDown++;
 
-     }
 
-   }
 
-   else
 
-   {
 
-     TriggerEvent(FD_WRITE, nErrorCode, TRUE);
 
-   }
 
- }
 
- int CAsyncSslSocketLayer::Send(const void* lpBuf, int nBufLen, int nFlags)
 
- {
 
-   if (m_bUseSSL)
 
-   {
 
-     if (!lpBuf)
 
-     {
 
-       return 0;
 
-     }
 
-     if (m_bBlocking || m_pRetrySendBuffer)
 
-     {
 
-       m_mayTriggerWriteUp = true;
 
-       ::SetLastError(WSAEWOULDBLOCK);
 
-       return SOCKET_ERROR;
 
-     }
 
-     if (m_nNetworkError)
 
-     {
 
-       SetLastError(m_nNetworkError);
 
-       return SOCKET_ERROR;
 
-     }
 
-     if (m_nShutDown)
 
-     {
 
-       ::SetLastError(WSAESHUTDOWN);
 
-       return SOCKET_ERROR;
 
-     }
 
-     if (!m_bSslEstablished)
 
-     {
 
-       m_mayTriggerWriteUp = true;
 
-       ::SetLastError(WSAEWOULDBLOCK);
 
-       return SOCKET_ERROR;
 
-     }
 
-     if (!nBufLen)
 
-     {
 
-       return 0;
 
-     }
 
-     if (m_onCloseCalled)
 
-     {
 
-       TriggerEvent(FD_CLOSE, 0, TRUE);
 
-       return 0;
 
-     }
 
-     int len = BIO_ctrl_get_write_guarantee(m_sslbio);
 
-     if (nBufLen > len)
 
-       nBufLen = len;
 
-     if (!len)
 
-     {
 
-       m_mayTriggerWriteUp = true;
 
-       TriggerEvents();
 
-       ::SetLastError(WSAEWOULDBLOCK);
 
-     }
 
-     m_pRetrySendBuffer = new char[nBufLen];
 
-     m_nRetrySendBufferLen = nBufLen;
 
-     memcpy(m_pRetrySendBuffer, lpBuf, nBufLen);
 
-     int numwrite = BIO_write(m_sslbio, m_pRetrySendBuffer, m_nRetrySendBufferLen);
 
-     if (numwrite >= 0)
 
-     {
 
-       BIO_ctrl(m_sslbio, BIO_CTRL_FLUSH, 0, NULL);
 
-       delete [] m_pRetrySendBuffer;
 
-       m_pRetrySendBuffer = 0;
 
-     }
 
-     else if (numwrite == -1)
 
-     {
 
-       if (BIO_should_retry(m_sslbio))
 
-       {
 
-         if (GetLayerState() == closed)
 
-         {
 
-           return 0;
 
-         }
 
-         else if (GetLayerState() != connected)
 
-         {
 
-           SetLastError(m_nNetworkError);
 
-           return SOCKET_ERROR;
 
-         }
 
-         TriggerEvents();
 
-         return nBufLen;
 
-       }
 
-       else
 
-       {
 
-         delete [] m_pRetrySendBuffer;
 
-         m_pRetrySendBuffer = 0;
 
-         ::SetLastError(WSAECONNABORTED);
 
-       }
 
-       return SOCKET_ERROR;
 
-     }
 
-     m_mayTriggerWriteUp = true;
 
-     TriggerEvents();
 
-     return numwrite;
 
-   }
 
-   else
 
-   {
 
-     return SendNext(lpBuf, nBufLen, nFlags);
 
-   }
 
- }
 
- int CAsyncSslSocketLayer::Receive(void* lpBuf, int nBufLen, int nFlags)
 
- {
 
-   if (m_bUseSSL)
 
-   {
 
-     if (m_bBlocking)
 
-     {
 
-       m_mayTriggerReadUp = true;
 
-       ::SetLastError(WSAEWOULDBLOCK);
 
-       return SOCKET_ERROR;
 
-     }
 
-     if (m_nNetworkError)
 
-     {
 
-       size_t pending = BIO_ctrl_pending(m_sslbio);
 
-       if (pending && !m_nShutDown)
 
-       {
 
-         m_mayTriggerReadUp = true;
 
-         TriggerEvents();
 
-         return BIO_read(m_sslbio, lpBuf,nBufLen);
 
-       }
 
-       WSASetLastError(m_nNetworkError);
 
-       return SOCKET_ERROR;
 
-     }
 
-     if (m_nShutDown)
 
-     {
 
-       ::SetLastError(WSAESHUTDOWN);
 
-       return SOCKET_ERROR;
 
-     }
 
-     if (!nBufLen)
 
-     {
 
-       return 0;
 
-     }
 
-     size_t pending = BIO_ctrl_pending(m_sslbio);
 
-     if (!pending)
 
-     {
 
-       if (GetLayerState() == closed)
 
-       {
 
-         return 0;
 
-       }
 
-       if (m_onCloseCalled)
 
-       {
 
-         TriggerEvent(FD_CLOSE, 0, TRUE);
 
-         return 0;
 
-       }
 
-       else if (GetLayerState() != connected)
 
-       {
 
-         SetLastError(m_nNetworkError);
 
-         return SOCKET_ERROR;
 
-       }
 
-       else
 
-       {
 
-         if (SSL_get_shutdown(m_ssl))
 
-         {
 
-           if (ShutDown() || GetLastError() == WSAEWOULDBLOCK)
 
-           {
 
-             if (ShutDownComplete())
 
-             {
 
-               TriggerEvent(FD_CLOSE, 0, TRUE);
 
-               return 0;
 
-             }
 
-             else
 
-               WSASetLastError(WSAEWOULDBLOCK);
 
-           }
 
-           else
 
-           {
 
-             m_nNetworkError = WSAECONNABORTED;
 
-             WSASetLastError(WSAECONNABORTED);
 
-             TriggerEvent(FD_CLOSE, WSAECONNABORTED, TRUE);
 
-           }
 
-           return SOCKET_ERROR;
 
-         }
 
-       }
 
-       m_mayTriggerReadUp = true;
 
-       TriggerEvents();
 
-       ::SetLastError(WSAEWOULDBLOCK);
 
-       return SOCKET_ERROR;
 
-     }
 
-     int numread = BIO_read(m_sslbio, lpBuf, nBufLen);
 
-     if (!numread)
 
-     {
 
-       if (SSL_get_shutdown(m_ssl))
 
-       {
 
-         if (ShutDown() || GetLastError() == WSAEWOULDBLOCK)
 
-         {
 
-           if (ShutDownComplete())
 
-           {
 
-             TriggerEvent(FD_CLOSE, 0, TRUE);
 
-             return 0;
 
-           }
 
-           else
 
-             WSASetLastError(WSAEWOULDBLOCK);
 
-         }
 
-         else
 
-         {
 
-           m_nNetworkError = WSAECONNABORTED;
 
-           WSASetLastError(WSAECONNABORTED);
 
-           TriggerEvent(FD_CLOSE, WSAECONNABORTED, TRUE);
 
-         }
 
-         return SOCKET_ERROR;
 
-       }
 
-       m_mayTriggerReadUp = true;
 
-       TriggerEvents();
 
-       ::SetLastError(WSAEWOULDBLOCK);
 
-       return SOCKET_ERROR;
 
-     }
 
-     if (numread < 0)
 
-     {
 
-       if (!BIO_should_retry(m_sslbio))
 
-       {
 
-         PrintLastErrorMsg();
 
-         m_nNetworkError = WSAECONNABORTED;
 
-         WSASetLastError(WSAECONNABORTED);
 
-         TriggerEvent(FD_CLOSE, 0, TRUE);
 
-         return SOCKET_ERROR;
 
-       }
 
-       else
 
-       {
 
-         if (SSL_get_shutdown(m_ssl))
 
-         {
 
-           if (ShutDown() || GetLastError() == WSAEWOULDBLOCK)
 
-           {
 
-             if (ShutDownComplete())
 
-             {
 
-               TriggerEvent(FD_CLOSE, 0, TRUE);
 
-               return 0;
 
-             }
 
-             else
 
-               WSASetLastError(WSAEWOULDBLOCK);
 
-           }
 
-           else
 
-           {
 
-             m_nNetworkError = WSAECONNABORTED;
 
-             WSASetLastError(WSAECONNABORTED);
 
-             TriggerEvent(FD_CLOSE, 0, TRUE);
 
-           }
 
-           return SOCKET_ERROR;
 
-         }
 
-         m_mayTriggerReadUp = true;
 
-         TriggerEvents();
 
-         ::SetLastError(WSAEWOULDBLOCK);
 
-         return SOCKET_ERROR;
 
-       }
 
-     }
 
-     m_mayTriggerReadUp = true;
 
-     TriggerEvents();
 
-     return numread;
 
-   }
 
-   else
 
-   {
 
-     return ReceiveNext(lpBuf, nBufLen, nFlags);
 
-   }
 
- }
 
- void CAsyncSslSocketLayer::Close()
 
- {
 
-   m_nShutDown = 0;
 
-   m_onCloseCalled = false;
 
-   ResetSslSession();
 
-   CloseNext();
 
- }
 
- BOOL CAsyncSslSocketLayer::Connect(const SOCKADDR *lpSockAddr, int nSockAddrLen)
 
- {
 
-   BOOL res = ConnectNext(lpSockAddr, nSockAddrLen);
 
-   if (!res)
 
-   {
 
-     if (GetLastError() != WSAEWOULDBLOCK)
 
-     {
 
-       ResetSslSession();
 
-     }
 
-   }
 
-   return res;
 
- }
 
- BOOL CAsyncSslSocketLayer::Connect(LPCTSTR lpszHostAddress, UINT nHostPort)
 
- {
 
-   BOOL res = ConnectNext(lpszHostAddress, nHostPort);
 
-   if (!res)
 
-   {
 
-     if (GetLastError()!=WSAEWOULDBLOCK)
 
-     {
 
-       ResetSslSession();
 
-     }
 
-   }
 
-   return res;
 
- }
 
- bool CAsyncSslSocketLayer::HandleSession(SSL_SESSION * Session)
 
- {
 
-   bool Result = false;
 
-   if (m_sessionreuse)
 
-   {
 
-     if (m_sessionid != Session)
 
-     {
 
-       if (m_sessionid == NULL)
 
-       {
 
-         if (SSL_session_reused(m_ssl))
 
-         {
 
-           LogSocketMessageRaw(FZ_LOG_PROGRESS, L"Session ID reused");
 
-         }
 
-         else
 
-         {
 
-           if ((m_Main != NULL) && !m_Main->m_sessionreuse_failed)
 
-           {
 
-             LogSocketMessageRaw(FZ_LOG_INFO, L"Main TLS session ID not reused, will not try again");
 
-             m_Main->m_sessionreuse_failed = true;
 
-           }
 
-         }
 
-         LogSocketMessageRaw(FZ_LOG_DEBUG, L"Saving session ID");
 
-       }
 
-       else
 
-       {
 
-         SSL_SESSION_free(m_sessionid);
 
-         LogSocketMessageRaw(FZ_LOG_INFO, L"Session ID changed");
 
-       }
 
-       m_sessionid = Session;
 
-       Result = true;
 
-     }
 
-   }
 
-   return Result;
 
- }
 
- int CAsyncSslSocketLayer::NewSessionCallback(struct ssl_st * Ssl, SSL_SESSION * Session)
 
- {
 
-   CAsyncSslSocketLayer * Layer = LookupLayer(Ssl);
 
-   int Result = 0;
 
-   // This is not called for TLS 1.2 and older when session is reused (so "Session ID reused" won't be logged).
 
-   // So for 1.2 and older, we call HandleSession from apps_ssl_info_callback as we always did.
 
-   if ((SSL_version(Ssl) >= TLS1_3_VERSION) && Layer->HandleSession(Session))
 
-   {
 
-     Result = 1;
 
-   }
 
-   return Result;
 
- }
 
- int CAsyncSslSocketLayer::InitSSLConnection(bool clientMode,
 
-   CAsyncSslSocketLayer* main, bool sessionreuse, const CString & host,
 
-   CFileZillaTools * tools,
 
-   void* pSslContext /*=0*/)
 
- {
 
-   if (m_bUseSSL)
 
-     return 0;
 
-   int res = InitSSL();
 
-   if (res)
 
-     return res;
 
-   m_sCriticalSection.Lock();
 
-   if ((SSL_CTX*)pSslContext)
 
-   {
 
-     if (m_ssl_ctx)
 
-     {
 
-       m_sCriticalSection.Unlock();
 
-       ResetSslSession();
 
-       return SSL_FAILURE_INITSSL;
 
-     }
 
-     std::map<SSL_CTX *, int>::iterator iter = m_contextRefCount.find((SSL_CTX*)pSslContext);
 
-     if (iter == m_contextRefCount.end() || iter->second < 1)
 
-     {
 
-       m_sCriticalSection.Unlock();
 
-       ResetSslSession();
 
-       return SSL_FAILURE_INITSSL;
 
-     }
 
-     m_ssl_ctx = (SSL_CTX*)pSslContext;
 
-     iter->second++;
 
-   }
 
-   else if (!m_ssl_ctx)
 
-   {
 
-     // Create new context if none given
 
-     if (!(m_ssl_ctx = SSL_CTX_new( SSLv23_method())))
 
-     {
 
-       m_sCriticalSection.Unlock();
 
-       ResetSslSession();
 
-       return SSL_FAILURE_INITSSL;
 
-     }
 
-     m_contextRefCount[m_ssl_ctx] = 1;
 
-     if (clientMode)
 
-     {
 
-       USES_CONVERSION;
 
-       SSL_CTX_set_verify(m_ssl_ctx, SSL_VERIFY_PEER, verify_callback);
 
-       SSL_CTX_set_client_cert_cb(m_ssl_ctx, ProvideClientCert);
 
-       // https://www.mail-archive.com/[email protected]/msg86186.html
 
-       SSL_CTX_set_session_cache_mode(m_ssl_ctx, SSL_SESS_CACHE_CLIENT | SSL_SESS_CACHE_NO_INTERNAL_STORE | SSL_SESS_CACHE_NO_AUTO_CLEAR);
 
-       SSL_CTX_sess_set_new_cb(m_ssl_ctx, NewSessionCallback);
 
-       CFileStatus Dummy;
 
-       if (CFile::GetStatus((LPCTSTR)m_CertStorage, Dummy))
 
-       {
 
-         SSL_CTX_load_verify_locations(m_ssl_ctx, T2CA(m_CertStorage), 0);
 
-       }
 
-     }
 
-   }
 
-   //Create new SSL session
 
-   if (!(m_ssl = SSL_new(m_ssl_ctx)))
 
-   {
 
-     m_sCriticalSection.Unlock();
 
-     ResetSslSession();
 
-     return SSL_FAILURE_INITSSL;
 
-   }
 
-   if (clientMode && (host.GetLength() > 0))
 
-   {
 
-     USES_CONVERSION;
 
-     SSL_set_tlsext_host_name(m_ssl, T2CA(host));
 
-   }
 
- #ifdef _DEBUG
 
-   if ((main == NULL) && LoggingSocketMessage(FZ_LOG_INFO))
 
-   {
 
-     USES_CONVERSION;
 
-     LogSocketMessageRaw(FZ_LOG_INFO, L"Supported ciphersuites:");
 
-     STACK_OF(SSL_CIPHER) * ciphers = SSL_get_ciphers(m_ssl);
 
-     for (int i = 0; i < sk_SSL_CIPHER_num(ciphers); i++)
 
-     {
 
-       const SSL_CIPHER * cipher = sk_SSL_CIPHER_value(ciphers, i);
 
-       LogSocketMessageRaw(FZ_LOG_INFO, A2CT(SSL_CIPHER_get_name(cipher)));
 
-     }
 
-   }
 
- #endif
 
-   //Add current instance to list of active instances
 
-   t_SslLayerList *tmp = m_pSslLayerList;
 
-   m_pSslLayerList = new t_SslLayerList;
 
-   m_pSslLayerList->pNext = tmp;
 
-   m_pSslLayerList->pLayer = this;
 
-   m_sCriticalSection.Unlock();
 
-   SSL_set_info_callback(m_ssl, apps_ssl_info_callback);
 
-   //Create bios
 
-   m_sslbio = BIO_new(BIO_f_ssl());
 
-   BIO_new_bio_pair(&m_ibio, 32768, &m_nbio, 32768);
 
-   if (!m_sslbio || !m_nbio || !m_ibio)
 
-   {
 
-     ResetSslSession();
 
-     return SSL_FAILURE_INITSSL;
 
-   }
 
-   tools->SetupSsl(m_ssl);
 
-   //Init SSL connection
 
-   void *ssl_sessionid = NULL;
 
-   m_Main = main;
 
-   m_sessionreuse = sessionreuse;
 
-   if ((m_Main != NULL) && m_sessionreuse)
 
-   {
 
-     if (m_Main->m_sessionid == NULL)
 
-     {
 
-       DebugFail();
 
-       SSL_set_session(m_ssl, NULL);
 
-     }
 
-     else if (!m_Main->m_sessionreuse_failed)
 
-     {
 
-       if (!SSL_set_session(m_ssl, m_Main->m_sessionid))
 
-       {
 
-         LogSocketMessageRaw(FZ_LOG_INFO, L"SSL_set_session failed");
 
-         return SSL_FAILURE_INITSSL;
 
-       }
 
-       LogSocketMessageRaw(FZ_LOG_INFO, L"Trying reuse main TLS session ID");
 
-     }
 
-     else
 
-     {
 
-       LogSocketMessageRaw(FZ_LOG_INFO, L"Main TLS session ID was not reused previously, not trying again");
 
-       SSL_set_session(m_ssl, NULL);
 
-     }
 
-   }
 
-   else
 
-   {
 
-     SSL_set_session(m_ssl, NULL);
 
-   }
 
-   if (clientMode)
 
-   {
 
-     SSL_set_connect_state(m_ssl);
 
-   }
 
-   else
 
-   {
 
-     SSL_set_accept_state(m_ssl);
 
-   }
 
-   SSL_set_bio(m_ssl, m_ibio, m_ibio);
 
-   BIO_ctrl(m_sslbio, BIO_C_SET_SSL, BIO_NOCLOSE, m_ssl);
 
-   BIO_read(m_sslbio, (void *)1, 0);
 
-   // Trigger FD_WRITE so that we can initialize SSL negotiation
 
-   if (GetLayerState() == connected || GetLayerState() == attached)
 
-   {
 
-     TriggerEvent(FD_READ, 0);
 
-     TriggerEvent(FD_WRITE, 0);
 
-     TriggerEvent(FD_READ, 0, TRUE);
 
-     TriggerEvent(FD_WRITE, 0, TRUE);
 
-   }
 
-   m_bUseSSL = true;
 
-   return 0;
 
- }
 
- void CAsyncSslSocketLayer::ResetSslSession()
 
- {
 
-   if (m_pRetrySendBuffer)
 
-   {
 
-     delete [] m_pRetrySendBuffer;
 
-     m_pRetrySendBuffer = 0;
 
-   }
 
-   m_bFailureSent = FALSE;
 
-   m_bBlocking = FALSE;
 
-   m_nSslAsyncNotifyId++;
 
-   m_nNetworkError = 0;
 
-   m_bUseSSL = FALSE;
 
-   m_nVerificationResult = 0;
 
-   m_nVerificationDepth = 0;
 
-   m_bSslEstablished = FALSE;
 
-   if (m_sslbio)
 
-   {
 
-     BIO_free(m_sslbio);
 
-   }
 
-   if (m_ssl)
 
-   {
 
-     SSL_set_session(m_ssl,NULL);
 
-   }
 
-   if (m_nbio)
 
-   {
 
-     BIO_free(m_nbio);
 
-   }
 
-   if (m_ibio)
 
-   {
 
-     BIO_free(m_ibio);
 
-   }
 
-   m_nNetworkSendBufferLen = 0;
 
-   m_nbio = 0;
 
-   m_ibio = 0;
 
-   m_sslbio = 0;
 
-   if (m_ssl)
 
-   {
 
-     SSL_free(m_ssl);
 
-   }
 
-   m_sCriticalSection.Lock();
 
-   if (m_ssl_ctx)
 
-   {
 
-     std::map<SSL_CTX *, int>::iterator iter = m_contextRefCount.find(m_ssl_ctx);
 
-     if (iter != m_contextRefCount.end())
 
-     {
 
-       if (iter->second <= 1)
 
-       {
 
-         SSL_CTX_free(m_ssl_ctx);
 
-         m_contextRefCount.erase(iter);
 
-       }
 
-       else
 
-         iter->second--;
 
-     }
 
-     m_ssl_ctx = 0;
 
-   }
 
-   m_ssl = 0;
 
-   t_SslLayerList *cur = m_pSslLayerList;
 
-   if (!cur)
 
-   {
 
-     m_sCriticalSection.Unlock();
 
-     return;
 
-   }
 
-   if (cur->pLayer == this)
 
-   {
 
-     m_pSslLayerList = cur->pNext;
 
-     delete cur;
 
-   }
 
-   else
 
-     while (cur->pNext)
 
-     {
 
-       if (cur->pNext->pLayer == this)
 
-       {
 
-         t_SslLayerList *tmp = cur->pNext;
 
-         cur->pNext = cur->pNext->pNext;
 
-         delete tmp;
 
-         m_sCriticalSection.Unlock();
 
-         return;
 
-       }
 
-       cur = cur->pNext;
 
-     }
 
-   if (m_sessionid != NULL)
 
-   {
 
-     SSL_SESSION_free(m_sessionid);
 
-     m_sessionid = NULL;
 
-   }
 
-   m_sessionreuse = true;
 
-   m_sessionreuse_failed = false;
 
-   m_sCriticalSection.Unlock();
 
- }
 
- bool CAsyncSslSocketLayer::IsUsingSSL()
 
- {
 
-   return m_bUseSSL;
 
- }
 
- BOOL CAsyncSslSocketLayer::ShutDown(int nHow /*=sends*/)
 
- {
 
-   if (m_bUseSSL)
 
-   {
 
-     if (m_pRetrySendBuffer)
 
-     {
 
-       if (!m_nShutDown)
 
-         m_nShutDown = 1;
 
-       WSASetLastError(WSAEWOULDBLOCK);
 
-       return false;
 
-     }
 
-     if (!m_bSslEstablished)
 
-     {
 
-       m_mayTriggerWriteUp = true;
 
-       ::SetLastError(WSAEWOULDBLOCK);
 
-       return false;
 
-     }
 
-     if (!m_nShutDown)
 
-       m_nShutDown = 1;
 
-     else
 
-     {
 
-       if (ShutDownComplete())
 
-         return ShutDownNext();
 
-       else
 
-       {
 
-         TriggerEvents();
 
-         WSASetLastError(WSAEWOULDBLOCK);
 
-         return false;
 
-       }
 
-     }
 
-     int res = SSL_shutdown(m_ssl);
 
-     if (res == 0)
 
-     {
 
-       res = SSL_shutdown(m_ssl);
 
-       // While this should not be necessary, with IIS we get timeout otherwise
 
-       if (SSL_version(m_ssl) <= TLS1_2_VERSION)
 
-       {
 
-         res = 0;
 
-       }
 
-     }
 
-     if (res >= 0)
 
-     {
 
-       if (ShutDownComplete())
 
-         return ShutDownNext();
 
-       else
 
-       {
 
-         TriggerEvents();
 
-         WSASetLastError(WSAEWOULDBLOCK);
 
-         return FALSE;
 
-       }
 
-     }
 
-     else
 
-     {
 
-       int error = SSL_get_error(m_ssl, -1);
 
-       if (error == SSL_ERROR_WANT_READ || error == SSL_ERROR_WANT_WRITE)
 
-       {
 
-         // retry shutdown later
 
-         m_nShutDown = 0;
 
-         TriggerEvents();
 
-         WSASetLastError(WSAEWOULDBLOCK);
 
-         return FALSE;
 
-       }
 
-       else if (ShutDownComplete())
 
-         return ShutDownNext();
 
-       else
 
-       {
 
-         TriggerEvents();
 
-         WSASetLastError(WSAEWOULDBLOCK);
 
-         return FALSE;
 
-       }
 
-     }
 
-   }
 
-   else
 
-   {
 
-     if (!m_nShutDown)
 
-       m_nShutDown = 1;
 
-     return ShutDownNext(nHow);
 
-   }
 
- }
 
- BOOL CAsyncSslSocketLayer::ShutDownComplete()
 
- {
 
-   //If a ShutDown was issued, has the connection already been shut down?
 
-   if (!m_nShutDown)
 
-     return FALSE;
 
-   else if (!m_bUseSSL)
 
-     return FALSE;
 
-   else if (m_nNetworkSendBufferLen)
 
-     return FALSE;
 
-   else if (m_pRetrySendBuffer)
 
-     return FALSE;
 
-   // Empty read buffer
 
-   char buffer[1000];
 
-   int numread;
 
-   do
 
-   {
 
-     numread = BIO_read(m_sslbio, buffer, 1000);
 
-   } while (numread > 0);
 
-   size_t pending = BIO_ctrl_pending(m_nbio);
 
-   if (pending)
 
-   {
 
-     return FALSE;
 
-   }
 
-   else
 
-   {
 
-     return TRUE;
 
-   }
 
- }
 
- void CAsyncSslSocketLayer::apps_ssl_info_callback(const SSL *s, int where, int ret)
 
- {
 
-   USES_CONVERSION;
 
-   CAsyncSslSocketLayer *pLayer = 0;
 
-   m_sCriticalSection.Lock();
 
-   t_SslLayerList *cur = m_pSslLayerList;
 
-   while (cur)
 
-   {
 
-     if (cur->pLayer->m_ssl == s)
 
-       break;
 
-     cur = cur->pNext;
 
-   }
 
-   if (!cur)
 
-   {
 
-     m_sCriticalSection.Unlock();
 
-     MessageBox(0, L"Can't lookup TLS session!", L"Critical error", MB_ICONEXCLAMATION);
 
-     return;
 
-   }
 
-   else
 
-     pLayer = cur->pLayer;
 
-   m_sCriticalSection.Unlock();
 
-   // Called while unloading?
 
-   if (!pLayer->m_bUseSSL && (where != SSL_CB_LOOP))
 
-     return;
 
-   char * str;
 
-   int w;
 
-   w = where& ~SSL_ST_MASK;
 
-   if (w & SSL_ST_CONNECT)
 
-   {
 
-     str = "TLS connect";
 
-   }
 
-   else if (w & SSL_ST_ACCEPT)
 
-     str = "TLS accept";
 
-   else
 
-     str = "Undefined";
 
-   if (where & SSL_CB_LOOP)
 
-   {
 
-     char* debug = NULL;
 
-     // exact SSL_CB_LOOP is abused for debugging
 
-     if (where == SSL_CB_LOOP)
 
-     {
 
-       debug = reinterpret_cast<char*>(ret);
 
-     }
 
-     char *buffer = new char[4096 + ((debug != NULL) ? strlen(debug) : 0)];
 
-     sprintf(buffer, "%s: %s",
 
-         str,
 
-         SSL_state_string_long(s));
 
-     if (debug != NULL)
 
-     {
 
-       sprintf(buffer + strlen(buffer), " [%s]", debug);
 
-       OPENSSL_free(debug);
 
-     }
 
-     USES_CONVERSION;
 
-     pLayer->LogSocketMessageRaw(FZ_LOG_INFO, A2T(buffer));
 
-     delete[] buffer;
 
-   }
 
-   else if (where & SSL_CB_ALERT)
 
-   {
 
-     str=(where & SSL_CB_READ)? "read" : "write";
 
-     const char* desc = SSL_alert_desc_string_long(ret);
 
-     // Don't send close notify warning
 
-     if (desc)
 
-     {
 
-       if (strcmp(desc, "close notify"))
 
-       {
 
-         char *buffer = new char[4096];
 
-         sprintf(buffer, "SSL3 alert %s: %s: %s",
 
-             str,
 
-             SSL_alert_type_string_long(ret),
 
-             desc);
 
-         pLayer->LogSocketMessageRaw(FZ_LOG_WARNING, A2T(buffer));
 
-         pLayer->PrintLastErrorMsg();
 
-         delete [] buffer;
 
-       }
 
-     }
 
-   }
 
-   else if (where & SSL_CB_EXIT)
 
-   {
 
-     if (ret == 0)
 
-     {
 
-       char *buffer = new char[4096];
 
-       sprintf(buffer, "%s: failed in %s",
 
-           str,
 
-           SSL_state_string_long(s));
 
-       pLayer->LogSocketMessageRaw(FZ_LOG_WARNING, A2T(buffer));
 
-       pLayer->PrintLastErrorMsg();
 
-       delete [] buffer;
 
-       if (!pLayer->m_bFailureSent)
 
-       {
 
-         pLayer->m_bFailureSent=TRUE;
 
-         pLayer->DoLayerCallback(LAYERCALLBACK_LAYERSPECIFIC, SSL_FAILURE, pLayer->m_bSslEstablished ? SSL_FAILURE_UNKNOWN : SSL_FAILURE_ESTABLISH);
 
-       }
 
-     }
 
-     else if (ret < 0)
 
-     {
 
-       int error = SSL_get_error(s,ret);
 
-       if (error != SSL_ERROR_WANT_READ && error != SSL_ERROR_WANT_WRITE)
 
-       {
 
-         char *buffer = new char[4096];
 
-         sprintf(buffer, "%s: error in %s",
 
-             str,
 
-             SSL_state_string_long(s));
 
-         pLayer->LogSocketMessageRaw(FZ_LOG_WARNING, A2T(buffer));
 
-         delete [] buffer;
 
-         if (!pLayer->m_bFailureSent)
 
-         {
 
-           pLayer->m_bFailureSent=TRUE;
 
-           pLayer->DoLayerCallback(LAYERCALLBACK_LAYERSPECIFIC, SSL_FAILURE, pLayer->m_bSslEstablished ? SSL_FAILURE_UNKNOWN : SSL_FAILURE_ESTABLISH);
 
-         }
 
-       }
 
-     }
 
-   }
 
-   if (where & SSL_CB_HANDSHAKE_DONE)
 
-   {
 
-     // For 1.2 and older, session is always established at this point.
 
-     // For 1.3, session can be restarted later, so this is handled in NewSessionCallback.
 
-     if (SSL_version(pLayer->m_ssl) < TLS1_3_VERSION)
 
-     {
 
-       SSL_SESSION * sessionid = SSL_get1_session(pLayer->m_ssl);
 
-       if (!pLayer->HandleSession(sessionid))
 
-       {
 
-         SSL_SESSION_free(sessionid);
 
-       }
 
-     }
 
-     int error = SSL_get_verify_result(pLayer->m_ssl);
 
-     pLayer->DoLayerCallback(LAYERCALLBACK_LAYERSPECIFIC, SSL_VERIFY_CERT, error);
 
-     pLayer->m_bBlocking = TRUE;
 
-   }
 
- }
 
- void CAsyncSslSocketLayer::UnloadSSL()
 
- {
 
-   if (!m_bSslInitialized)
 
-     return;
 
-   ResetSslSession();
 
-   m_bSslInitialized = false;
 
-   m_sCriticalSection.Lock();
 
-   m_nSslRefCount--;
 
-   if (m_nSslRefCount)
 
-   {
 
-     m_sCriticalSection.Unlock();
 
-     return;
 
-   }
 
-   m_sCriticalSection.Unlock();
 
- }
 
- bool AsnTimeToValidTime(ASN1_TIME * AsnTime, t_SslCertData::t_validTime & ValidTime)
 
- {
 
-   int i = AsnTime->length;
 
-   const char * v = (const char *)AsnTime->data;
 
-   if (i < 10)
 
-   {
 
-     return FALSE;
 
-   }
 
-   for (int i2 = 0; i2 < 10; i2++)
 
-   {
 
-     if ((v[i2] > '9') || (v[i2] < '0'))
 
-     {
 
-       return FALSE;
 
-     }
 
-   }
 
-   if (AsnTime->type == V_ASN1_UTCTIME)
 
-   {
 
-     ValidTime.y= (v[0]-'0')*10+(v[1]-'0');
 
-     if (ValidTime.y < 50) ValidTime.y+=100;
 
-     ValidTime.y += 1900;
 
-     v += 2;
 
-     i -= 2;
 
-   }
 
-   else if (AsnTime->type == V_ASN1_GENERALIZEDTIME)
 
-   {
 
-     if (i < 12)
 
-     {
 
-       return FALSE;
 
-     }
 
-     ValidTime.y = (v[0]-'0')*1000+(v[1]-'0')*100 + (v[2]-'0')*10+(v[3]-'0');
 
-     v += 4;
 
-     i -= 4;
 
-   }
 
-   else
 
-   {
 
-     return FALSE;
 
-   }
 
-   ValidTime.M = (v[0]-'0')*10+(v[1]-'0');
 
-   if ((ValidTime.M > 12) || (ValidTime.M < 1))
 
-   {
 
-     return FALSE;
 
-   }
 
-   ValidTime.d = (v[2]-'0')*10+(v[3]-'0');
 
-   ValidTime.h = (v[4]-'0')*10+(v[5]-'0');
 
-   ValidTime.m =  (v[6]-'0')*10+(v[7]-'0');
 
-   if ((i >= 10) &&
 
-       (v[8] >= '0') && (v[8] <= '9') &&
 
-       (v[9] >= '0') && (v[9] <= '9'))
 
-   {
 
-     ValidTime.s = (v[8]-'0')*10+(v[9]-'0');
 
-   }
 
-   else
 
-   {
 
-     ValidTime.s = 0;
 
-   }
 
-   return TRUE;
 
- }
 
- BOOL CAsyncSslSocketLayer::GetPeerCertificateData(t_SslCertData &SslCertData, LPCTSTR & Error)
 
- {
 
-   X509 *pX509=SSL_get_peer_certificate(m_ssl);
 
-   if (!pX509)
 
-   {
 
-     Error = L"Cannot get certificate";
 
-     return FALSE;
 
-   }
 
-   //Reset the contents of SslCertData
 
-   memset(&SslCertData, 0, sizeof(t_SslCertData));
 
-   //Set subject data fields
 
-   X509_NAME *pX509Name=X509_get_subject_name(pX509);
 
-   if (pX509Name)
 
-   {
 
-     int count=X509_NAME_entry_count(pX509Name);
 
-     for (int i=0;i<count;i++)
 
-     {
 
-       X509_NAME_ENTRY *pX509NameEntry=X509_NAME_get_entry(pX509Name,i);
 
-       if (!pX509NameEntry)
 
-         continue;
 
-       ASN1_OBJECT *pObject = X509_NAME_ENTRY_get_object(pX509NameEntry);
 
-       ASN1_STRING *pString = X509_NAME_ENTRY_get_data(pX509NameEntry);
 
-       CString str;
 
-       unsigned char *out;
 
-       int len = ASN1_STRING_to_UTF8(&out, pString);
 
-       if (len > 0)
 
-       {
 
-         // Keep it huge
 
-         LPWSTR unicode = new WCHAR[len * 10];
 
-         memset(unicode, 0, sizeof(WCHAR) * len * 10);
 
-         int unicodeLen = MultiByteToWideChar(CP_UTF8, 0, (const char *)out, len, unicode, len * 10);
 
-         if (unicodeLen > 0)
 
-         {
 
- #ifdef _UNICODE
 
-           str = unicode;
 
- #else
 
-           LPSTR ansi = new CHAR[len * 10];
 
-           memset(ansi, 0, sizeof(CHAR) * len * 10);
 
-           int ansiLen = WideCharToMultiByte(CP_ACP, 0, unicode, unicodeLen, ansi, len * 10, 0, 0);
 
-           if (ansiLen > 0)
 
-             str = ansi;
 
-           delete [] ansi;
 
- #endif
 
-         }
 
-         delete [] unicode;
 
-         OPENSSL_free(out);
 
-       }
 
-       switch(OBJ_obj2nid(pObject))
 
-       {
 
-       case NID_organizationName:
 
-         _tcsncpy(SslCertData.subject.Organization, str, 255);
 
-         SslCertData.subject.Organization[255] = 0;
 
-         break;
 
-       case NID_organizationalUnitName:
 
-         _tcsncpy(SslCertData.subject.Unit, str, 255);
 
-         SslCertData.subject.Unit[255] = 0;
 
-         break;
 
-       case NID_commonName:
 
-         _tcsncpy(SslCertData.subject.CommonName, str, 255);
 
-         SslCertData.subject.CommonName[255] = 0;
 
-         break;
 
-       case NID_pkcs9_emailAddress:
 
-         _tcsncpy(SslCertData.subject.Mail, str, 255);
 
-         SslCertData.subject.Mail[255] = 0;
 
-         break;
 
-       case NID_countryName:
 
-         _tcsncpy(SslCertData.subject.Country, str, 255);
 
-         SslCertData.subject.Country[255] = 0;
 
-         break;
 
-       case NID_stateOrProvinceName:
 
-         _tcsncpy(SslCertData.subject.StateProvince, str, 255);
 
-         SslCertData.subject.StateProvince[255] = 0;
 
-         break;
 
-       case NID_localityName:
 
-         _tcsncpy(SslCertData.subject.Town, str, 255);
 
-         SslCertData.subject.Town[255] = 0;
 
-         break;
 
-       default:
 
-         if ( !OBJ_nid2sn(OBJ_obj2nid(pObject)) )
 
-         {
 
-           TCHAR tmp[20];
 
-           _stprintf(tmp, L"%d", OBJ_obj2nid(pObject));
 
-           int maxlen = 1024 - _tcslen(SslCertData.subject.Other)-1;
 
-           _tcsncpy(SslCertData.subject.Other+_tcslen(SslCertData.subject.Other), tmp, maxlen);
 
-           maxlen = 1024 - _tcslen(SslCertData.subject.Other)-1;
 
-           _tcsncpy(SslCertData.subject.Other+_tcslen(SslCertData.subject.Other), L"=", maxlen);
 
-           maxlen = 1024 - _tcslen(SslCertData.subject.Other)-1;
 
-           _tcsncpy(SslCertData.subject.Other+_tcslen(SslCertData.subject.Other), str, maxlen);
 
-           maxlen = 1024 - _tcslen(SslCertData.subject.Other)-1;
 
-           _tcsncpy(SslCertData.subject.Other+_tcslen(SslCertData.subject.Other), L";", maxlen);
 
-         }
 
-         else
 
-         {
 
-           int maxlen = 1024 - _tcslen(SslCertData.subject.Other)-1;
 
-           USES_CONVERSION;
 
-           _tcsncpy(SslCertData.subject.Other+_tcslen(SslCertData.subject.Other), A2CT(OBJ_nid2sn(OBJ_obj2nid(pObject))), maxlen);
 
-           maxlen = 1024 - _tcslen(SslCertData.subject.Other)-1;
 
-           _tcsncpy(SslCertData.subject.Other+_tcslen(SslCertData.subject.Other), L"=", maxlen);
 
-           maxlen = 1024 - _tcslen(SslCertData.subject.Other)-1;
 
-           _tcsncpy(SslCertData.subject.Other+_tcslen(SslCertData.subject.Other), str, maxlen);
 
-           maxlen = 1024 - _tcslen(SslCertData.subject.Other)-1;
 
-           _tcsncpy(SslCertData.subject.Other+_tcslen(SslCertData.subject.Other), L";", maxlen);
 
-         }
 
-         break;
 
-       }
 
-     }
 
-   }
 
-   //Set issuer data fields
 
-   pX509Name=X509_get_issuer_name(pX509);
 
-   if (pX509Name)
 
-   {
 
-     int count=X509_NAME_entry_count(pX509Name);
 
-     for (int i=0;i<count;i++)
 
-     {
 
-       X509_NAME_ENTRY *pX509NameEntry=X509_NAME_get_entry(pX509Name,i);
 
-       if (!pX509NameEntry)
 
-         continue;
 
-       ASN1_STRING *pString=X509_NAME_ENTRY_get_data(pX509NameEntry);
 
-       ASN1_OBJECT *pObject=X509_NAME_ENTRY_get_object(pX509NameEntry);
 
-       CString str;
 
-       unsigned char *out;
 
-       int len = ASN1_STRING_to_UTF8(&out, pString);
 
-       if (len > 0)
 
-       {
 
-         // Keep it huge
 
-         LPWSTR unicode = new WCHAR[len * 10];
 
-         memset(unicode, 0, sizeof(WCHAR) * len * 10);
 
-         int unicodeLen = MultiByteToWideChar(CP_UTF8, 0, (const char *)out, len, unicode, len * 10);
 
-         if (unicodeLen > 0)
 
-         {
 
- #ifdef _UNICODE
 
-           str = unicode;
 
- #else
 
-           LPSTR ansi = new CHAR[len * 10];
 
-           memset(ansi, 0, sizeof(CHAR) * len * 10);
 
-           int ansiLen = WideCharToMultiByte(CP_ACP, 0, unicode, unicodeLen, ansi, len * 10, 0, 0);
 
-           if (ansiLen > 0)
 
-             str = ansi;
 
-           delete [] ansi;
 
- #endif
 
-         }
 
-         delete [] unicode;
 
-         OPENSSL_free(out);
 
-       }
 
-       switch(OBJ_obj2nid(pObject))
 
-       {
 
-       case NID_organizationName:
 
-         _tcsncpy(SslCertData.issuer.Organization, str, 255);
 
-         SslCertData.issuer.Organization[255] = 0;
 
-         break;
 
-       case NID_organizationalUnitName:
 
-         _tcsncpy(SslCertData.issuer.Unit, str, 255);
 
-         SslCertData.issuer.Unit[255] = 0;
 
-         break;
 
-       case NID_commonName:
 
-         _tcsncpy(SslCertData.issuer.CommonName, str, 255);
 
-         SslCertData.issuer.CommonName[255] = 0;
 
-         break;
 
-       case NID_pkcs9_emailAddress:
 
-         _tcsncpy(SslCertData.issuer.Mail, str, 255);
 
-         SslCertData.issuer.Mail[255] = 0;
 
-         break;
 
-       case NID_countryName:
 
-         _tcsncpy(SslCertData.issuer.Country, str, 255);
 
-         SslCertData.issuer.Country[255] = 0;
 
-         break;
 
-       case NID_stateOrProvinceName:
 
-         _tcsncpy(SslCertData.issuer.StateProvince, str, 255);
 
-         SslCertData.issuer.StateProvince[255] = 0;
 
-         break;
 
-       case NID_localityName:
 
-         _tcsncpy(SslCertData.issuer.Town, str, 255);
 
-         SslCertData.issuer.Town[255] = 0;
 
-         break;
 
-       default:
 
-         if ( !OBJ_nid2sn(OBJ_obj2nid(pObject)) )
 
-         {
 
-           TCHAR tmp[20];
 
-           _stprintf(tmp, L"%d", OBJ_obj2nid(pObject));
 
-           int maxlen = 1024 - _tcslen(SslCertData.issuer.Other)-1;
 
-           _tcsncpy(SslCertData.issuer.Other+_tcslen(SslCertData.issuer.Other), tmp, maxlen);
 
-           maxlen = 1024 - _tcslen(SslCertData.issuer.Other)-1;
 
-           _tcsncpy(SslCertData.issuer.Other+_tcslen(SslCertData.issuer.Other), L"=", maxlen);
 
-           maxlen = 1024 - _tcslen(SslCertData.issuer.Other)-1;
 
-           _tcsncpy(SslCertData.issuer.Other+_tcslen(SslCertData.issuer.Other), str, maxlen);
 
-           maxlen = 1024 - _tcslen(SslCertData.issuer.Other)-1;
 
-           _tcsncpy(SslCertData.issuer.Other+_tcslen(SslCertData.issuer.Other), L";", maxlen);
 
-         }
 
-         else
 
-         {
 
-           int maxlen = 1024 - _tcslen(SslCertData.issuer.Other)-1;
 
-           USES_CONVERSION;
 
-           _tcsncpy(SslCertData.issuer.Other+_tcslen(SslCertData.issuer.Other), A2CT(OBJ_nid2sn(OBJ_obj2nid(pObject))), maxlen);
 
-           maxlen = 1024 - _tcslen(SslCertData.issuer.Other)-1;
 
-           _tcsncpy(SslCertData.issuer.Other+_tcslen(SslCertData.issuer.Other), L"=", maxlen);
 
-           maxlen = 1024 - _tcslen(SslCertData.issuer.Other)-1;
 
-           _tcsncpy(SslCertData.issuer.Other+_tcslen(SslCertData.issuer.Other), str, maxlen);
 
-           maxlen = 1024 - _tcslen(SslCertData.issuer.Other)-1;
 
-           _tcsncpy(SslCertData.issuer.Other+_tcslen(SslCertData.issuer.Other), L";", maxlen);
 
-         }
 
-         break;
 
-       }
 
-     }
 
-   }
 
-   //Set date fields
 
-   //Valid from
 
-   ASN1_TIME *pTime=X509_getm_notBefore(pX509);
 
-   if (!pTime)
 
-   {
 
-     X509_free(pX509);
 
-     Error = L"Cannot get start time";
 
-     return FALSE;
 
-   }
 
-   if (!AsnTimeToValidTime(pTime, SslCertData.validFrom))
 
-   {
 
-     X509_free(pX509);
 
-     Error = L"Invalid start time";
 
-     return FALSE;
 
-   }
 
-   //Valid until
 
-   pTime = X509_getm_notAfter(pX509);
 
-   if (!pTime)
 
-   {
 
-     X509_free(pX509);
 
-     Error = L"Cannot get end time";
 
-     return FALSE;
 
-   }
 
-   if (!AsnTimeToValidTime(pTime, SslCertData.validUntil))
 
-   {
 
-     X509_free(pX509);
 
-     Error = L"Invalid end time";
 
-     return FALSE;
 
-   }
 
-   int subjectAltNamePos = X509_get_ext_by_NID(pX509, NID_subject_alt_name, -1);
 
-   if (subjectAltNamePos >= 0)
 
-   {
 
-     X509_EXTENSION * subjectAltNameExtension = X509_get_ext(pX509, subjectAltNamePos);
 
-     BIO * subjectAltNameBio = BIO_new(BIO_s_mem());
 
-     if (X509V3_EXT_print(subjectAltNameBio, subjectAltNameExtension, 0, 0) == 1)
 
-     {
 
-       USES_CONVERSION;
 
-       u_char *data;
 
-       int len = BIO_get_mem_data(subjectAltNameBio, &data);
 
-       char * buf = new char[len + 1];
 
-       memcpy(buf, data, len);
 
-       buf[len] = '\0';
 
-       _tcsncpy(SslCertData.subjectAltName, A2CT(buf), LENOF(SslCertData.subjectAltName));
 
-       SslCertData.subjectAltName[LENOF(SslCertData.subjectAltName) - 1] = '\0';
 
-       delete [] buf;
 
-     }
 
-     BIO_vfree(subjectAltNameBio);
 
-   }
 
-   unsigned int length;
 
-   length = sizeof(SslCertData.hashSha1);
 
-   X509_digest(pX509, EVP_sha1(), SslCertData.hashSha1, &length);
 
-   DebugAssert(length == sizeof(SslCertData.hashSha1));
 
-   length = sizeof(SslCertData.hashSha256);
 
-   X509_digest(pX509, EVP_sha256(), SslCertData.hashSha256, &length);
 
-   DebugAssert(length == sizeof(SslCertData.hashSha256));
 
-   // Inspired by ne_ssl_cert_export()
 
-   // Find the length of the DER encoding.
 
-   SslCertData.certificateLen = i2d_X509(pX509, NULL);
 
-   SslCertData.certificate = new unsigned char[SslCertData.certificateLen];
 
-   unsigned char * p = SslCertData.certificate;
 
-   i2d_X509(pX509, &p);
 
-   SslCertData.priv_data = m_nSslAsyncNotifyId;
 
-   X509_free(pX509);
 
-   SslCertData.verificationResult = m_nVerificationResult;
 
-   SslCertData.verificationDepth = m_nVerificationDepth;
 
-   return TRUE;
 
- }
 
- std::string CAsyncSslSocketLayer::GetTlsVersionStr()
 
- {
 
-   return m_TlsVersionStr;
 
- }
 
- std::string CAsyncSslSocketLayer::GetCipherName()
 
- {
 
-   return m_CipherName;
 
- }
 
- void CAsyncSslSocketLayer::SetNotifyReply(int nID, int nCode, int result)
 
- {
 
-   if (!m_bBlocking)
 
-     return;
 
-   if (nID != m_nSslAsyncNotifyId)
 
-     return;
 
-   if (nCode != SSL_VERIFY_CERT)
 
-     return;
 
-   m_bBlocking = FALSE;
 
-   if (!result)
 
-   {
 
-     m_nNetworkError = WSAECONNABORTED;
 
-     WSASetLastError(WSAECONNABORTED);
 
-     if (!m_bFailureSent)
 
-     {
 
-       m_bFailureSent = TRUE;
 
-       DoLayerCallback(LAYERCALLBACK_LAYERSPECIFIC, SSL_FAILURE, SSL_FAILURE_CERTREJECTED);
 
-     }
 
-     TriggerEvent(FD_CLOSE, 0, TRUE);
 
-     return;
 
-   }
 
-   m_bSslEstablished = TRUE;
 
-   PrintSessionInfo();
 
-   DoLayerCallback(LAYERCALLBACK_LAYERSPECIFIC, SSL_INFO, SSL_INFO_ESTABLISHED);
 
-   TriggerEvents();
 
- }
 
- void CAsyncSslSocketLayer::PrintSessionInfo()
 
- {
 
-   const SSL_CIPHER *ciph;
 
-   X509 *cert;
 
-   ciph = SSL_get_current_cipher(m_ssl);
 
-   char enc[4096] = {0};
 
-   cert=SSL_get_peer_certificate(m_ssl);
 
-   if (cert != NULL)
 
-   {
 
-     EVP_PKEY *pkey = X509_get_pubkey(cert);
 
-     if (pkey != NULL)
 
-     {
 
-       if (0)
 
-         ;
 
- #ifndef NO_RSA
 
-       else if (EVP_PKEY_id(pkey) == EVP_PKEY_RSA)
 
-         sprintf(enc,  "%d bit RSA", EVP_PKEY_bits(pkey));
 
- #endif
 
- #ifndef NO_DSA
 
-       else if (EVP_PKEY_id(pkey) == EVP_PKEY_DSA)
 
-         sprintf(enc,  "%d bit DSA", EVP_PKEY_bits(pkey));
 
- #endif
 
-       EVP_PKEY_free(pkey);
 
-     }
 
-     X509_free(cert);
 
-     /* The SSL API does not allow us to look at temporary RSA/DH keys,
 
-      * otherwise we should print their lengths too */
 
-   }
 
-   const int buffer_size = 4096;
 
-   char *buffer = new char[buffer_size];
 
-   char *buffer2 = new char[buffer_size];
 
-   // see also ne_ssl_get_version and ne_ssl_get_cipher
 
-   m_TlsVersionStr = SSL_get_version(m_ssl);
 
-   sprintf(buffer, "%s: %s, %s, %s",
 
-       SSL_CIPHER_get_version(ciph),
 
-       SSL_CIPHER_get_name(ciph),
 
-       enc,
 
-       SSL_CIPHER_description(ciph, buffer2, buffer_size));
 
-   m_CipherName = buffer;
 
-   // see TWebDAVFileSystem::CollectTLSSessionInfo()
 
-   sprintf(buffer, "Using %s, cipher %s",
 
-       m_TlsVersionStr.c_str(),
 
-       m_CipherName.c_str());
 
-   USES_CONVERSION;
 
-   LogSocketMessageRaw(FZ_LOG_PROGRESS, A2T(buffer));
 
-   delete [] buffer;
 
-   delete [] buffer2;
 
- }
 
- void CAsyncSslSocketLayer::OnConnect(int nErrorCode)
 
- {
 
-   if (m_bUseSSL && nErrorCode)
 
-     TriggerEvent(FD_WRITE, 0);
 
-   TriggerEvent(FD_CONNECT, nErrorCode, TRUE);
 
- }
 
- CAsyncSslSocketLayer * CAsyncSslSocketLayer::LookupLayer(SSL * Ssl)
 
- {
 
-   CAsyncSslSocketLayer * Result = NULL;
 
-   m_sCriticalSection.Lock();
 
-   t_SslLayerList * Cur = m_pSslLayerList;
 
-   while (Cur != NULL)
 
-   {
 
-     if (Cur->pLayer->m_ssl == Ssl)
 
-     {
 
-       break;
 
-     }
 
-     Cur = Cur->pNext;
 
-   }
 
-   m_sCriticalSection.Unlock();
 
-   if (Cur == NULL)
 
-   {
 
-     MessageBox(0, L"Can't lookup TLS session!", L"Critical error", MB_ICONEXCLAMATION);
 
-     Result = NULL;
 
-   }
 
-   else
 
-   {
 
-     Result = Cur->pLayer;
 
-   }
 
-   return Result;
 
- }
 
- int CAsyncSslSocketLayer::verify_callback(int preverify_ok, X509_STORE_CTX *ctx)
 
- {
 
-   X509   *err_cert;
 
-     int     err, depth;
 
-     SSL    *ssl;
 
-     err_cert = X509_STORE_CTX_get_current_cert(ctx);
 
-     err = X509_STORE_CTX_get_error(ctx);
 
-     depth = X509_STORE_CTX_get_error_depth(ctx);
 
-     /*
 
-      * Retrieve the pointer to the SSL of the connection currently treated
 
-      * and the application specific data stored into the SSL object.
 
-      */
 
-     ssl = (SSL *)X509_STORE_CTX_get_ex_data(ctx, SSL_get_ex_data_X509_STORE_CTX_idx());
 
-     CAsyncSslSocketLayer * pLayer = LookupLayer(ssl);
 
-     if (pLayer == NULL)
 
-     {
 
-       return 1;
 
-     }
 
-     /*
 
-      * Catch a too long certificate chain. The depth limit set using
 
-      * SSL_CTX_set_verify_depth() is by purpose set to "limit+1" so
 
-      * that whenever the "depth>verify_depth" condition is met, we
 
-      * have violated the limit and want to log this error condition.
 
-      * We must do it here, because the CHAIN_TOO_LONG error would not
 
-      * be found explicitly; only errors introduced by cutting off the
 
-      * additional certificates would be logged.
 
-      */
 
-     if (depth > 10) {//mydata->verify_depth) {
 
-         preverify_ok = 0;
 
-         err = X509_V_ERR_CERT_CHAIN_TOO_LONG;
 
-         X509_STORE_CTX_set_error(ctx, err);
 
-     }
 
-   if (!preverify_ok)
 
-   {
 
-     if (!pLayer->m_nVerificationResult)
 
-     {
 
-       pLayer->m_nVerificationDepth = depth;
 
-       pLayer->m_nVerificationResult = err;
 
-     }
 
-   }
 
-   return 1;
 
- }
 
- int CAsyncSslSocketLayer::ProvideClientCert(
 
-   SSL * Ssl, X509 ** Certificate, EVP_PKEY ** PrivateKey)
 
- {
 
-   CAsyncSslSocketLayer * Layer = LookupLayer(Ssl);
 
-   USES_CONVERSION;
 
-   CString Message;
 
-   Message.LoadString(NEED_CLIENT_CERTIFICATE);
 
-   char * Buffer = new char[Message.GetLength() + 1];
 
-   strcpy(Buffer, T2A(Message));
 
-   int Level;
 
-   int Result;
 
-   if ((Layer->FCertificate == NULL) || (Layer->FPrivateKey == NULL))
 
-   {
 
-     Level = FZ_LOG_WARNING;
 
-     Result = 0;
 
-   }
 
-   else
 
-   {
 
-     Level = FZ_LOG_PROGRESS;
 
-     *Certificate = X509_dup(Layer->FCertificate);
 
-     EVP_PKEY_up_ref(Layer->FPrivateKey);
 
-     *PrivateKey = Layer->FPrivateKey;
 
-     Result = 1;
 
-   }
 
-   Layer->LogSocketMessageRaw(Level, A2T(Buffer));
 
-   delete [] Buffer;
 
-   return Result;
 
- }
 
- void CAsyncSslSocketLayer::SetClientCertificate(X509 * Certificate, EVP_PKEY * PrivateKey)
 
- {
 
-   FCertificate = Certificate;
 
-   FPrivateKey = PrivateKey;
 
- }
 
- BOOL CAsyncSslSocketLayer::SetCertStorage(CString file)
 
- {
 
-   m_CertStorage = file;
 
-   return TRUE;
 
- }
 
- void CAsyncSslSocketLayer::OnClose(int nErrorCode)
 
- {
 
-   m_onCloseCalled = true;
 
-   if (m_bUseSSL && BIO_ctrl)
 
-   {
 
-     size_t pending = BIO_ctrl_pending(m_sslbio);
 
-     if (pending > 0)
 
-     {
 
-       TriggerEvents();
 
-     }
 
-     else TriggerEvent(FD_CLOSE, nErrorCode, TRUE);
 
-   }
 
-   else
 
-     TriggerEvent(FD_CLOSE, nErrorCode, TRUE);
 
- }
 
- void CAsyncSslSocketLayer::PrintLastErrorMsg()
 
- {
 
-   int err = ERR_get_error();
 
-   while (err)
 
-   {
 
-     char *buffer = new char[512];
 
-     const char *reason = ERR_reason_error_string(err);
 
-     ERR_error_string(err, buffer);
 
-     err = ERR_get_error();
 
-     USES_CONVERSION;
 
-     LogSocketMessageRaw(FZ_LOG_PROGRESS, A2T(buffer));
 
-     LogSocketMessageRaw(FZ_LOG_WARNING, A2T(reason));
 
-     delete [] buffer;
 
-   }
 
- }
 
- void CAsyncSslSocketLayer::TriggerEvents()
 
- {
 
-   size_t pending = BIO_ctrl_pending(m_nbio);
 
-   if (pending > 0)
 
-   {
 
-     if (m_mayTriggerWrite)
 
-     {
 
-       m_mayTriggerWrite = false;
 
-       TriggerEvent(FD_WRITE, 0);
 
-     }
 
-   }
 
-   else if (!m_nNetworkSendBufferLen && m_bSslEstablished && !m_pRetrySendBuffer)
 
-   {
 
-     if (BIO_ctrl_get_write_guarantee(m_sslbio) > 0 && m_mayTriggerWriteUp)
 
-     {
 
-       m_mayTriggerWriteUp = false;
 
-       TriggerEvent(FD_WRITE, 0, TRUE);
 
-     }
 
-   }
 
-   if (m_bSslEstablished && BIO_ctrl_pending(m_sslbio) > 0)
 
-   {
 
-     if (m_mayTriggerReadUp && !m_bBlocking)
 
-     {
 
-       m_mayTriggerReadUp = false;
 
-       TriggerEvent(FD_READ, 0, TRUE);
 
-     }
 
-   }
 
-   else
 
-   {
 
-     int len = BIO_ctrl_get_write_guarantee(m_nbio);
 
-     if (len > 0 && m_mayTriggerRead)
 
-     {
 
-       m_mayTriggerRead = false;
 
-       TriggerEvent(FD_READ, 0);
 
-     }
 
-   }
 
-   if (m_onCloseCalled && m_bSslEstablished)
 
-   {
 
-     if (BIO_ctrl_pending(m_sslbio) <= 0)
 
-     {
 
-       TriggerEvent(FD_CLOSE, 0, TRUE);
 
-     }
 
-   }
 
- }
 
- //---------------------------------------------------------------------------
 
 
  |