12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895 |
- // CAsyncSslSocketLayer by Tim Kosse ([email protected])
- // Version 2.0 (2005-02-27)
- //---------------------------------------------------------------------------
- // Feel free to use this class, as long as you don't claim that you wrote it
- // and this copyright notice stays intact in the source files.
- // If you use this class in commercial applications, please send a short message
- // to [email protected]
- //---------------------------------------------------------------------------
- #include "stdafx.h"
- #include "AsyncSslSocketLayer.h"
- #include "FilezillaTools.h"
- #include <openssl/x509v3.h>
- #include <openssl/err.h>
- /////////////////////////////////////////////////////////////////////////////
- // CAsyncSslSocketLayer
- CCriticalSectionWrapper CAsyncSslSocketLayer::m_sCriticalSection;
- CAsyncSslSocketLayer::t_SslLayerList* CAsyncSslSocketLayer::m_pSslLayerList = 0;
- int CAsyncSslSocketLayer::m_nSslRefCount = 0;
- std::map<SSL_CTX *, int> CAsyncSslSocketLayer::m_contextRefCount;
- CAsyncSslSocketLayer::CAsyncSslSocketLayer()
- {
- m_ssl = 0;
- m_sslbio = 0;
- m_ibio = 0;
- m_nbio = 0;
- m_ssl_ctx = 0;
- m_bUseSSL = false;
- m_bSslInitialized = FALSE;
- m_bSslEstablished = FALSE;
- m_nNetworkSendBufferLen = 0;
- m_nNetworkSendBufferMaxLen = 0;
- m_pNetworkSendBuffer = NULL;
- m_pRetrySendBuffer = 0;
- m_nRetrySendBufferLen = 0;
- m_nNetworkError = 0;
- m_nShutDown = 0;
- m_bBlocking = FALSE;
- m_nSslAsyncNotifyId = 0;
- m_bFailureSent = FALSE;
- m_nVerificationResult = 0;
- m_nVerificationDepth = 0;
- m_mayTriggerRead = true;
- m_mayTriggerWrite = true;
- m_mayTriggerReadUp = true;
- m_mayTriggerWriteUp = true;
- m_onCloseCalled = false;
- m_Main = NULL;
- m_sessionid = NULL;
- m_sessionreuse = true;
- m_sessionreuse_failed = false;
- FCertificate = NULL;
- FPrivateKey = NULL;
- }
- CAsyncSslSocketLayer::~CAsyncSslSocketLayer()
- {
- UnloadSSL();
- delete [] m_pNetworkSendBuffer;
- delete [] m_pRetrySendBuffer;
- }
- int CAsyncSslSocketLayer::InitSSL()
- {
- if (m_bSslInitialized)
- return 0;
- m_sCriticalSection.Lock();
- if (!m_nSslRefCount)
- {
- if (!OPENSSL_init_ssl(OPENSSL_INIT_LOAD_SSL_STRINGS | OPENSSL_INIT_LOAD_CRYPTO_STRINGS, NULL))
- {
- return SSL_FAILURE_INITSSL;
- }
- }
- m_nSslRefCount++;
- m_sCriticalSection.Unlock();
- m_bSslInitialized = true;
- return 0;
- }
- void CAsyncSslSocketLayer::OnReceive(int nErrorCode)
- {
- if (m_bUseSSL)
- {
- if (m_bBlocking)
- {
- m_mayTriggerRead = true;
- return;
- }
- if (m_nNetworkError)
- {
- return;
- }
- char buffer[16384];
- m_mayTriggerRead = false;
- //Get number of bytes we can receive and store in the network input bio
- int len = BIO_ctrl_get_write_guarantee(m_nbio);
- if (len > 16384)
- len = 16384;
- else if (!len)
- {
- m_mayTriggerRead = true;
- TriggerEvents();
- return;
- }
- int numread = 0;
- // Receive data
- numread = ReceiveNext(buffer, len);
- if (numread > 0)
- {
- //Store it in the network input bio and process data
- int numwritten = BIO_write(m_nbio, buffer, numread);
- BIO_ctrl(m_nbio, BIO_CTRL_FLUSH, 0, NULL);
- // I have no idea why this call is needed, but without it, connections
- // will stall. Perhaps it triggers some internal processing.
- // Also, ignore return value, don't do any error checking. This function
- // can report errors, even though a later call can succeed.
- char buffer;
- BIO_read(m_sslbio, &buffer, 0);
- }
- if (!numread)
- {
- if (GetLayerState() == connected)
- TriggerEvent(FD_CLOSE, nErrorCode, TRUE);
- }
- else if (numread == SOCKET_ERROR)
- {
- int nError = GetLastError();
- if (nError != WSAEWOULDBLOCK && nError != WSAENOTCONN)
- {
- m_nNetworkError = GetLastError();
- TriggerEvent(FD_CLOSE, 0, TRUE);
- return;
- }
- }
- if (m_pRetrySendBuffer)
- {
- int numwrite = BIO_write(m_sslbio, m_pRetrySendBuffer, m_nRetrySendBufferLen);
- if (numwrite >= 0)
- {
- BIO_ctrl(m_sslbio, BIO_CTRL_FLUSH, 0, NULL);
- delete [] m_pRetrySendBuffer;
- m_pRetrySendBuffer = 0;
- }
- else if (numwrite == -1)
- {
- if (!BIO_should_retry(m_sslbio))
- {
- delete [] m_pRetrySendBuffer;
- m_pRetrySendBuffer = 0;
- ::SetLastError(WSAECONNABORTED);
- TriggerEvent(FD_CLOSE, 0, TRUE);
- return;
- }
- }
- }
- if (!m_nShutDown && SSL_get_shutdown(m_ssl))
- {
- size_t pending = BIO_ctrl_pending(m_sslbio);
- if (pending <= 0)
- {
- if (ShutDown() || GetLastError() == WSAEWOULDBLOCK)
- {
- if (ShutDownComplete())
- TriggerEvent(FD_CLOSE, 0, TRUE);
- }
- else
- {
- m_nNetworkError = WSAECONNABORTED;
- WSASetLastError(WSAECONNABORTED);
- TriggerEvent(FD_CLOSE, WSAECONNABORTED, TRUE);
- }
- return;
- }
- }
- if (ShutDownComplete() && m_nShutDown == 1)
- {
- //Send shutdown notification if all pending data has been sent
- DoLayerCallback(LAYERCALLBACK_LAYERSPECIFIC, SSL_INFO, SSL_INFO_SHUTDOWNCOMPLETE);
- m_nShutDown++;
- }
- TriggerEvents();
- }
- else
- {
- TriggerEvent(FD_READ, nErrorCode, TRUE);
- }
- }
- void CAsyncSslSocketLayer::OnSend(int nErrorCode)
- {
- if (m_bUseSSL)
- {
- if (m_nNetworkError)
- {
- return;
- }
- m_mayTriggerWrite = false;
- //Send data in the send buffer
- while (m_nNetworkSendBufferLen)
- {
- int numsent = SendNext(m_pNetworkSendBuffer, m_nNetworkSendBufferLen);
- if (numsent == SOCKET_ERROR)
- {
- int nError = GetLastError();
- if (nError != WSAEWOULDBLOCK && nError != WSAENOTCONN)
- {
- m_nNetworkError = nError;
- TriggerEvent(FD_CLOSE, 0, TRUE);
- }
- return;
- }
- else if (!numsent)
- {
- if (GetLayerState() == connected)
- TriggerEvent(FD_CLOSE, nErrorCode, TRUE);
- }
- if (numsent == m_nNetworkSendBufferLen)
- {
- m_nNetworkSendBufferLen = 0;
- }
- else
- {
- memmove(m_pNetworkSendBuffer, m_pNetworkSendBuffer + numsent, m_nNetworkSendBufferLen - numsent);
- m_nNetworkSendBufferLen -= numsent;
- }
- }
- //Send the data waiting in the network bio
- char buffer[32 * 1024];
- size_t len = BIO_ctrl_pending(m_nbio);
- int numread = BIO_read(m_nbio, buffer, std::min(len, sizeof(buffer)));
- if (numread <= 0)
- m_mayTriggerWrite = true;
- while (numread > 0)
- {
- int numsent = SendNext(buffer, numread);
- if (!numsent)
- {
- if (GetLayerState() == connected)
- TriggerEvent(FD_CLOSE, nErrorCode, TRUE);
- }
- if (numsent == SOCKET_ERROR || numsent < numread)
- {
- if (numsent == SOCKET_ERROR)
- if (GetLastError() != WSAEWOULDBLOCK && GetLastError() != WSAENOTCONN)
- {
- m_nNetworkError = GetLastError();
- TriggerEvent(FD_CLOSE, 0, TRUE);
- return;
- }
- else
- numsent = 0;
- // Add all data that was retrieved from the network bio but could not be sent to the send buffer.
- if (m_nNetworkSendBufferMaxLen < (m_nNetworkSendBufferLen + numread - numsent))
- {
- char * tmp = m_pNetworkSendBuffer;
- m_nNetworkSendBufferMaxLen = static_cast<int>((m_nNetworkSendBufferLen + numread - numsent) * 1.5);
- m_pNetworkSendBuffer = new char[m_nNetworkSendBufferMaxLen];
- if (tmp)
- {
- memcpy(m_pNetworkSendBuffer, tmp, m_nNetworkSendBufferLen);
- delete [] tmp;
- }
- }
- DebugAssert(m_pNetworkSendBuffer);
- memcpy(m_pNetworkSendBuffer + m_nNetworkSendBufferLen, buffer, numread-numsent);
- m_nNetworkSendBufferLen += numread - numsent;
- }
- if (!numsent)
- {
- break;
- }
- len = BIO_ctrl_pending(m_nbio);
- if (!len)
- {
- m_mayTriggerWrite = true;
- break;
- }
- numread = BIO_read(m_nbio, buffer, len);
- if (numread <= 0)
- {
- m_mayTriggerWrite = true;
- }
- }
- if (m_pRetrySendBuffer)
- {
- int numwrite = BIO_write(m_sslbio, m_pRetrySendBuffer, m_nRetrySendBufferLen);
- if (numwrite >= 0)
- {
- BIO_ctrl(m_sslbio, BIO_CTRL_FLUSH, 0, NULL);
- delete [] m_pRetrySendBuffer;
- m_pRetrySendBuffer = 0;
- }
- else if (numwrite == -1)
- {
- if (!BIO_should_retry(m_sslbio))
- {
- delete [] m_pRetrySendBuffer;
- m_pRetrySendBuffer = 0;
- ::SetLastError(WSAECONNABORTED);
- TriggerEvent(FD_CLOSE, 0, TRUE);
- return;
- }
- }
- }
- // No more data available, ask for more.
- TriggerEvents();
- if (m_nShutDown == 1 && ShutDownComplete())
- {
- //Send shutdown notification if all pending data has been sent
- // FileZilla3 calls ShutDownNext() here
- DoLayerCallback(LAYERCALLBACK_LAYERSPECIFIC, SSL_INFO, SSL_INFO_SHUTDOWNCOMPLETE);
- m_nShutDown++;
- }
- }
- else
- {
- TriggerEvent(FD_WRITE, nErrorCode, TRUE);
- }
- }
- int CAsyncSslSocketLayer::Send(const void* lpBuf, int nBufLen, int nFlags)
- {
- if (m_bUseSSL)
- {
- if (!lpBuf)
- {
- return 0;
- }
- if (m_bBlocking || m_pRetrySendBuffer)
- {
- m_mayTriggerWriteUp = true;
- ::SetLastError(WSAEWOULDBLOCK);
- return SOCKET_ERROR;
- }
- if (m_nNetworkError)
- {
- SetLastError(m_nNetworkError);
- return SOCKET_ERROR;
- }
- if (m_nShutDown)
- {
- ::SetLastError(WSAESHUTDOWN);
- return SOCKET_ERROR;
- }
- if (!m_bSslEstablished)
- {
- m_mayTriggerWriteUp = true;
- ::SetLastError(WSAEWOULDBLOCK);
- return SOCKET_ERROR;
- }
- if (!nBufLen)
- {
- return 0;
- }
- if (m_onCloseCalled)
- {
- TriggerEvent(FD_CLOSE, 0, TRUE);
- return 0;
- }
- int len = BIO_ctrl_get_write_guarantee(m_sslbio);
- if (nBufLen > len)
- nBufLen = len;
- if (!len)
- {
- m_mayTriggerWriteUp = true;
- TriggerEvents();
- ::SetLastError(WSAEWOULDBLOCK);
- }
- m_pRetrySendBuffer = new char[nBufLen];
- m_nRetrySendBufferLen = nBufLen;
- memcpy(m_pRetrySendBuffer, lpBuf, nBufLen);
- int numwrite = BIO_write(m_sslbio, m_pRetrySendBuffer, m_nRetrySendBufferLen);
- if (numwrite >= 0)
- {
- BIO_ctrl(m_sslbio, BIO_CTRL_FLUSH, 0, NULL);
- delete [] m_pRetrySendBuffer;
- m_pRetrySendBuffer = 0;
- }
- else if (numwrite == -1)
- {
- if (BIO_should_retry(m_sslbio))
- {
- if (GetLayerState() == closed)
- {
- return 0;
- }
- else if (GetLayerState() != connected)
- {
- SetLastError(m_nNetworkError);
- return SOCKET_ERROR;
- }
- TriggerEvents();
- return nBufLen;
- }
- else
- {
- delete [] m_pRetrySendBuffer;
- m_pRetrySendBuffer = 0;
- ::SetLastError(WSAECONNABORTED);
- }
- return SOCKET_ERROR;
- }
- m_mayTriggerWriteUp = true;
- TriggerEvents();
- return numwrite;
- }
- else
- {
- return SendNext(lpBuf, nBufLen, nFlags);
- }
- }
- int CAsyncSslSocketLayer::Receive(void* lpBuf, int nBufLen, int nFlags)
- {
- if (m_bUseSSL)
- {
- if (m_bBlocking)
- {
- m_mayTriggerReadUp = true;
- ::SetLastError(WSAEWOULDBLOCK);
- return SOCKET_ERROR;
- }
- if (m_nNetworkError)
- {
- size_t pending = BIO_ctrl_pending(m_sslbio);
- if (pending && !m_nShutDown)
- {
- m_mayTriggerReadUp = true;
- TriggerEvents();
- return BIO_read(m_sslbio, lpBuf,nBufLen);
- }
- WSASetLastError(m_nNetworkError);
- return SOCKET_ERROR;
- }
- if (m_nShutDown)
- {
- ::SetLastError(WSAESHUTDOWN);
- return SOCKET_ERROR;
- }
- if (!nBufLen)
- {
- return 0;
- }
- size_t pending = BIO_ctrl_pending(m_sslbio);
- if (!pending)
- {
- if (GetLayerState() == closed)
- {
- return 0;
- }
- if (m_onCloseCalled)
- {
- TriggerEvent(FD_CLOSE, 0, TRUE);
- return 0;
- }
- else if (GetLayerState() != connected)
- {
- SetLastError(m_nNetworkError);
- return SOCKET_ERROR;
- }
- else
- {
- if (SSL_get_shutdown(m_ssl))
- {
- if (ShutDown() || GetLastError() == WSAEWOULDBLOCK)
- {
- if (ShutDownComplete())
- {
- TriggerEvent(FD_CLOSE, 0, TRUE);
- return 0;
- }
- else
- WSASetLastError(WSAEWOULDBLOCK);
- }
- else
- {
- m_nNetworkError = WSAECONNABORTED;
- WSASetLastError(WSAECONNABORTED);
- TriggerEvent(FD_CLOSE, WSAECONNABORTED, TRUE);
- }
- return SOCKET_ERROR;
- }
- }
- m_mayTriggerReadUp = true;
- TriggerEvents();
- ::SetLastError(WSAEWOULDBLOCK);
- return SOCKET_ERROR;
- }
- int numread = BIO_read(m_sslbio, lpBuf, nBufLen);
- if (!numread)
- {
- if (SSL_get_shutdown(m_ssl))
- {
- if (ShutDown() || GetLastError() == WSAEWOULDBLOCK)
- {
- if (ShutDownComplete())
- {
- TriggerEvent(FD_CLOSE, 0, TRUE);
- return 0;
- }
- else
- WSASetLastError(WSAEWOULDBLOCK);
- }
- else
- {
- m_nNetworkError = WSAECONNABORTED;
- WSASetLastError(WSAECONNABORTED);
- TriggerEvent(FD_CLOSE, WSAECONNABORTED, TRUE);
- }
- return SOCKET_ERROR;
- }
- m_mayTriggerReadUp = true;
- TriggerEvents();
- ::SetLastError(WSAEWOULDBLOCK);
- return SOCKET_ERROR;
- }
- if (numread < 0)
- {
- if (!BIO_should_retry(m_sslbio))
- {
- PrintLastErrorMsg();
- m_nNetworkError = WSAECONNABORTED;
- WSASetLastError(WSAECONNABORTED);
- TriggerEvent(FD_CLOSE, 0, TRUE);
- return SOCKET_ERROR;
- }
- else
- {
- if (SSL_get_shutdown(m_ssl))
- {
- if (ShutDown() || GetLastError() == WSAEWOULDBLOCK)
- {
- if (ShutDownComplete())
- {
- TriggerEvent(FD_CLOSE, 0, TRUE);
- return 0;
- }
- else
- WSASetLastError(WSAEWOULDBLOCK);
- }
- else
- {
- m_nNetworkError = WSAECONNABORTED;
- WSASetLastError(WSAECONNABORTED);
- TriggerEvent(FD_CLOSE, 0, TRUE);
- }
- return SOCKET_ERROR;
- }
- m_mayTriggerReadUp = true;
- TriggerEvents();
- ::SetLastError(WSAEWOULDBLOCK);
- return SOCKET_ERROR;
- }
- }
- m_mayTriggerReadUp = true;
- TriggerEvents();
- return numread;
- }
- else
- {
- return ReceiveNext(lpBuf, nBufLen, nFlags);
- }
- }
- void CAsyncSslSocketLayer::Close()
- {
- m_nShutDown = 0;
- m_onCloseCalled = false;
- ResetSslSession();
- CloseNext();
- }
- BOOL CAsyncSslSocketLayer::Connect(const SOCKADDR *lpSockAddr, int nSockAddrLen)
- {
- BOOL res = ConnectNext(lpSockAddr, nSockAddrLen);
- if (!res)
- {
- if (GetLastError() != WSAEWOULDBLOCK)
- {
- ResetSslSession();
- }
- }
- return res;
- }
- BOOL CAsyncSslSocketLayer::Connect(LPCTSTR lpszHostAddress, UINT nHostPort)
- {
- BOOL res = ConnectNext(lpszHostAddress, nHostPort);
- if (!res)
- {
- if (GetLastError()!=WSAEWOULDBLOCK)
- {
- ResetSslSession();
- }
- }
- return res;
- }
- bool CAsyncSslSocketLayer::HandleSession(SSL_SESSION * Session)
- {
- bool Result = false;
- if (m_sessionreuse)
- {
- if (m_sessionid != Session)
- {
- if (m_sessionid == NULL)
- {
- if (SSL_session_reused(m_ssl))
- {
- LogSocketMessageRaw(FZ_LOG_PROGRESS, L"Session ID reused");
- }
- else
- {
- if ((m_Main != NULL) && !m_Main->m_sessionreuse_failed)
- {
- LogSocketMessageRaw(FZ_LOG_INFO, L"Main TLS session ID not reused, will not try again");
- m_Main->m_sessionreuse_failed = true;
- }
- }
- LogSocketMessageRaw(FZ_LOG_DEBUG, L"Saving session ID");
- }
- else
- {
- SSL_SESSION_free(m_sessionid);
- LogSocketMessageRaw(FZ_LOG_INFO, L"Session ID changed");
- }
- m_sessionid = Session;
- Result = true;
- }
- }
- return Result;
- }
- int CAsyncSslSocketLayer::NewSessionCallback(struct ssl_st * Ssl, SSL_SESSION * Session)
- {
- CAsyncSslSocketLayer * Layer = LookupLayer(Ssl);
- int Result = 0;
- // This is not called for TLS 1.2 and older when session is reused (so "Session ID reused" won't be logged).
- // So for 1.2 and older, we call HandleSession from apps_ssl_info_callback as we always did.
- if ((SSL_version(Ssl) >= TLS1_3_VERSION) && Layer->HandleSession(Session))
- {
- Result = 1;
- }
- return Result;
- }
- int CAsyncSslSocketLayer::InitSSLConnection(bool clientMode,
- CAsyncSslSocketLayer* main, bool sessionreuse,
- CFileZillaTools * tools,
- void* pSslContext /*=0*/)
- {
- if (m_bUseSSL)
- return 0;
- int res = InitSSL();
- if (res)
- return res;
- m_sCriticalSection.Lock();
- if ((SSL_CTX*)pSslContext)
- {
- if (m_ssl_ctx)
- {
- m_sCriticalSection.Unlock();
- ResetSslSession();
- return SSL_FAILURE_INITSSL;
- }
- std::map<SSL_CTX *, int>::iterator iter = m_contextRefCount.find((SSL_CTX*)pSslContext);
- if (iter == m_contextRefCount.end() || iter->second < 1)
- {
- m_sCriticalSection.Unlock();
- ResetSslSession();
- return SSL_FAILURE_INITSSL;
- }
- m_ssl_ctx = (SSL_CTX*)pSslContext;
- iter->second++;
- }
- else if (!m_ssl_ctx)
- {
- // Create new context if none given
- if (!(m_ssl_ctx = SSL_CTX_new( SSLv23_method())))
- {
- m_sCriticalSection.Unlock();
- ResetSslSession();
- return SSL_FAILURE_INITSSL;
- }
- m_contextRefCount[m_ssl_ctx] = 1;
- if (clientMode)
- {
- USES_CONVERSION;
- SSL_CTX_set_verify(m_ssl_ctx, SSL_VERIFY_PEER, verify_callback);
- SSL_CTX_set_client_cert_cb(m_ssl_ctx, ProvideClientCert);
- // https://www.mail-archive.com/[email protected]/msg86186.html
- SSL_CTX_set_session_cache_mode(m_ssl_ctx, SSL_SESS_CACHE_CLIENT | SSL_SESS_CACHE_NO_INTERNAL_STORE | SSL_SESS_CACHE_NO_AUTO_CLEAR);
- SSL_CTX_sess_set_new_cb(m_ssl_ctx, NewSessionCallback);
- CFileStatus Dummy;
- if (CFile::GetStatus((LPCTSTR)m_CertStorage, Dummy))
- {
- SSL_CTX_load_verify_locations(m_ssl_ctx, T2CA(m_CertStorage), 0);
- }
- }
- }
- //Create new SSL session
- if (!(m_ssl = SSL_new(m_ssl_ctx)))
- {
- m_sCriticalSection.Unlock();
- ResetSslSession();
- return SSL_FAILURE_INITSSL;
- }
- #ifdef _DEBUG
- if ((main == NULL) && LoggingSocketMessage(FZ_LOG_INFO))
- {
- USES_CONVERSION;
- LogSocketMessageRaw(FZ_LOG_INFO, L"Supported ciphersuites:");
- STACK_OF(SSL_CIPHER) * ciphers = SSL_get_ciphers(m_ssl);
- for (int i = 0; i < sk_SSL_CIPHER_num(ciphers); i++)
- {
- const SSL_CIPHER * cipher = sk_SSL_CIPHER_value(ciphers, i);
- LogSocketMessageRaw(FZ_LOG_INFO, A2CT(SSL_CIPHER_get_name(cipher)));
- }
- }
- #endif
- //Add current instance to list of active instances
- t_SslLayerList *tmp = m_pSslLayerList;
- m_pSslLayerList = new t_SslLayerList;
- m_pSslLayerList->pNext = tmp;
- m_pSslLayerList->pLayer = this;
- m_sCriticalSection.Unlock();
- SSL_set_info_callback(m_ssl, apps_ssl_info_callback);
- //Create bios
- m_sslbio = BIO_new(BIO_f_ssl());
- BIO_new_bio_pair(&m_ibio, 32768, &m_nbio, 32768);
- if (!m_sslbio || !m_nbio || !m_ibio)
- {
- ResetSslSession();
- return SSL_FAILURE_INITSSL;
- }
- tools->SetupSsl(m_ssl);
- //Init SSL connection
- void *ssl_sessionid = NULL;
- m_Main = main;
- m_sessionreuse = sessionreuse;
- if ((m_Main != NULL) && m_sessionreuse)
- {
- if (m_Main->m_sessionid == NULL)
- {
- DebugFail();
- SSL_set_session(m_ssl, NULL);
- }
- else if (!m_Main->m_sessionreuse_failed)
- {
- if (!SSL_set_session(m_ssl, m_Main->m_sessionid))
- {
- LogSocketMessageRaw(FZ_LOG_INFO, L"SSL_set_session failed");
- return SSL_FAILURE_INITSSL;
- }
- LogSocketMessageRaw(FZ_LOG_INFO, L"Trying reuse main TLS session ID");
- }
- else
- {
- LogSocketMessageRaw(FZ_LOG_INFO, L"Main TLS session ID was not reused previously, not trying again");
- SSL_set_session(m_ssl, NULL);
- }
- }
- else
- {
- SSL_set_session(m_ssl, NULL);
- }
- if (clientMode)
- {
- SSL_set_connect_state(m_ssl);
- }
- else
- {
- SSL_set_accept_state(m_ssl);
- }
- SSL_set_bio(m_ssl, m_ibio, m_ibio);
- BIO_ctrl(m_sslbio, BIO_C_SET_SSL, BIO_NOCLOSE, m_ssl);
- BIO_read(m_sslbio, (void *)1, 0);
- // Trigger FD_WRITE so that we can initialize SSL negotiation
- if (GetLayerState() == connected || GetLayerState() == attached)
- {
- TriggerEvent(FD_READ, 0);
- TriggerEvent(FD_WRITE, 0);
- TriggerEvent(FD_READ, 0, TRUE);
- TriggerEvent(FD_WRITE, 0, TRUE);
- }
- m_bUseSSL = true;
- return 0;
- }
- void CAsyncSslSocketLayer::ResetSslSession()
- {
- if (m_pRetrySendBuffer)
- {
- delete [] m_pRetrySendBuffer;
- m_pRetrySendBuffer = 0;
- }
- m_bFailureSent = FALSE;
- m_bBlocking = FALSE;
- m_nSslAsyncNotifyId++;
- m_nNetworkError = 0;
- m_bUseSSL = FALSE;
- m_nVerificationResult = 0;
- m_nVerificationDepth = 0;
- m_bSslEstablished = FALSE;
- if (m_sslbio)
- {
- BIO_free(m_sslbio);
- }
- if (m_ssl)
- {
- SSL_set_session(m_ssl,NULL);
- }
- if (m_nbio)
- {
- BIO_free(m_nbio);
- }
- if (m_ibio)
- {
- BIO_free(m_ibio);
- }
- m_nNetworkSendBufferLen = 0;
- m_nbio = 0;
- m_ibio = 0;
- m_sslbio = 0;
- if (m_ssl)
- {
- SSL_free(m_ssl);
- }
- m_sCriticalSection.Lock();
- if (m_ssl_ctx)
- {
- std::map<SSL_CTX *, int>::iterator iter = m_contextRefCount.find(m_ssl_ctx);
- if (iter != m_contextRefCount.end())
- {
- if (iter->second <= 1)
- {
- SSL_CTX_free(m_ssl_ctx);
- m_contextRefCount.erase(iter);
- }
- else
- iter->second--;
- }
- m_ssl_ctx = 0;
- }
- m_ssl = 0;
- t_SslLayerList *cur = m_pSslLayerList;
- if (!cur)
- {
- m_sCriticalSection.Unlock();
- return;
- }
- if (cur->pLayer == this)
- {
- m_pSslLayerList = cur->pNext;
- delete cur;
- }
- else
- while (cur->pNext)
- {
- if (cur->pNext->pLayer == this)
- {
- t_SslLayerList *tmp = cur->pNext;
- cur->pNext = cur->pNext->pNext;
- delete tmp;
- m_sCriticalSection.Unlock();
- return;
- }
- cur = cur->pNext;
- }
- if (m_sessionid != NULL)
- {
- SSL_SESSION_free(m_sessionid);
- m_sessionid = NULL;
- }
- m_sessionreuse = true;
- m_sessionreuse_failed = false;
- m_sCriticalSection.Unlock();
- }
- bool CAsyncSslSocketLayer::IsUsingSSL()
- {
- return m_bUseSSL;
- }
- BOOL CAsyncSslSocketLayer::ShutDown(int nHow /*=sends*/)
- {
- if (m_bUseSSL)
- {
- if (m_pRetrySendBuffer)
- {
- if (!m_nShutDown)
- m_nShutDown = 1;
- WSASetLastError(WSAEWOULDBLOCK);
- return false;
- }
- if (!m_bSslEstablished)
- {
- m_mayTriggerWriteUp = true;
- ::SetLastError(WSAEWOULDBLOCK);
- return false;
- }
- if (!m_nShutDown)
- m_nShutDown = 1;
- else
- {
- if (ShutDownComplete())
- return ShutDownNext();
- else
- {
- TriggerEvents();
- WSASetLastError(WSAEWOULDBLOCK);
- return false;
- }
- }
- int res = SSL_shutdown(m_ssl);
- if (res != -1)
- {
- if (!res)
- {
- SSL_shutdown(m_ssl);
- }
- if (ShutDownComplete())
- return ShutDownNext();
- else
- {
- TriggerEvents();
- WSASetLastError(WSAEWOULDBLOCK);
- return FALSE;
- }
- }
- else
- {
- int error = SSL_get_error(m_ssl, -1);
- if (error == SSL_ERROR_WANT_READ || error == SSL_ERROR_WANT_WRITE)
- {
- // retry shutdown later
- m_nShutDown = 0;
- TriggerEvents();
- WSASetLastError(WSAEWOULDBLOCK);
- return FALSE;
- }
- else if (ShutDownComplete())
- return ShutDownNext();
- else
- {
- TriggerEvents();
- WSASetLastError(WSAEWOULDBLOCK);
- return FALSE;
- }
- }
- }
- else
- {
- if (!m_nShutDown)
- m_nShutDown = 1;
- return ShutDownNext(nHow);
- }
- }
- BOOL CAsyncSslSocketLayer::ShutDownComplete()
- {
- //If a ShutDown was issued, has the connection already been shut down?
- if (!m_nShutDown)
- return FALSE;
- else if (!m_bUseSSL)
- return FALSE;
- else if (m_nNetworkSendBufferLen)
- return FALSE;
- else if (m_pRetrySendBuffer)
- return FALSE;
- // Empty read buffer
- char buffer[1000];
- int numread;
- do
- {
- numread = BIO_read(m_sslbio, buffer, 1000);
- } while (numread > 0);
- size_t pending = BIO_ctrl_pending(m_nbio);
- if (pending)
- {
- return FALSE;
- }
- else
- {
- return TRUE;
- }
- }
- void CAsyncSslSocketLayer::apps_ssl_info_callback(const SSL *s, int where, int ret)
- {
- USES_CONVERSION;
- CAsyncSslSocketLayer *pLayer = 0;
- m_sCriticalSection.Lock();
- t_SslLayerList *cur = m_pSslLayerList;
- while (cur)
- {
- if (cur->pLayer->m_ssl == s)
- break;
- cur = cur->pNext;
- }
- if (!cur)
- {
- m_sCriticalSection.Unlock();
- MessageBox(0, L"Can't lookup TLS session!", L"Critical error", MB_ICONEXCLAMATION);
- return;
- }
- else
- pLayer = cur->pLayer;
- m_sCriticalSection.Unlock();
- // Called while unloading?
- if (!pLayer->m_bUseSSL && (where != SSL_CB_LOOP))
- return;
- char * str;
- int w;
- w = where& ~SSL_ST_MASK;
- if (w & SSL_ST_CONNECT)
- {
- str = "TLS connect";
- }
- else if (w & SSL_ST_ACCEPT)
- str = "TLS accept";
- else
- str = "Undefined";
- if (where & SSL_CB_LOOP)
- {
- char* debug = NULL;
- // exact SSL_CB_LOOP is abused for debugging
- if (where == SSL_CB_LOOP)
- {
- debug = reinterpret_cast<char*>(ret);
- }
- char *buffer = new char[4096 + ((debug != NULL) ? strlen(debug) : 0)];
- sprintf(buffer, "%s: %s",
- str,
- SSL_state_string_long(s));
- if (debug != NULL)
- {
- sprintf(buffer + strlen(buffer), " [%s]", debug);
- OPENSSL_free(debug);
- }
- USES_CONVERSION;
- pLayer->LogSocketMessageRaw(FZ_LOG_INFO, A2T(buffer));
- delete[] buffer;
- }
- else if (where & SSL_CB_ALERT)
- {
- str=(where & SSL_CB_READ)? "read" : "write";
- const char* desc = SSL_alert_desc_string_long(ret);
- // Don't send close notify warning
- if (desc)
- {
- if (strcmp(desc, "close notify"))
- {
- char *buffer = new char[4096];
- sprintf(buffer, "SSL3 alert %s: %s: %s",
- str,
- SSL_alert_type_string_long(ret),
- desc);
- pLayer->LogSocketMessageRaw(FZ_LOG_WARNING, A2T(buffer));
- pLayer->PrintLastErrorMsg();
- delete [] buffer;
- }
- }
- }
- else if (where & SSL_CB_EXIT)
- {
- if (ret == 0)
- {
- char *buffer = new char[4096];
- sprintf(buffer, "%s: failed in %s",
- str,
- SSL_state_string_long(s));
- pLayer->LogSocketMessageRaw(FZ_LOG_WARNING, A2T(buffer));
- pLayer->PrintLastErrorMsg();
- delete [] buffer;
- if (!pLayer->m_bFailureSent)
- {
- pLayer->m_bFailureSent=TRUE;
- pLayer->DoLayerCallback(LAYERCALLBACK_LAYERSPECIFIC, SSL_FAILURE, pLayer->m_bSslEstablished ? SSL_FAILURE_UNKNOWN : SSL_FAILURE_ESTABLISH);
- }
- }
- else if (ret < 0)
- {
- int error = SSL_get_error(s,ret);
- if (error != SSL_ERROR_WANT_READ && error != SSL_ERROR_WANT_WRITE)
- {
- char *buffer = new char[4096];
- sprintf(buffer, "%s: error in %s",
- str,
- SSL_state_string_long(s));
- pLayer->LogSocketMessageRaw(FZ_LOG_WARNING, A2T(buffer));
- delete [] buffer;
- if (!pLayer->m_bFailureSent)
- {
- pLayer->m_bFailureSent=TRUE;
- pLayer->DoLayerCallback(LAYERCALLBACK_LAYERSPECIFIC, SSL_FAILURE, pLayer->m_bSslEstablished ? SSL_FAILURE_UNKNOWN : SSL_FAILURE_ESTABLISH);
- }
- }
- }
- }
- if (where & SSL_CB_HANDSHAKE_DONE)
- {
- // For 1.2 and older, session is always established at this point.
- // For 1.3, session can be restarted later, so this is handled in NewSessionCallback.
- if (SSL_version(pLayer->m_ssl) < TLS1_3_VERSION)
- {
- SSL_SESSION * sessionid = SSL_get1_session(pLayer->m_ssl);
- if (!pLayer->HandleSession(sessionid))
- {
- SSL_SESSION_free(sessionid);
- }
- }
- int error = SSL_get_verify_result(pLayer->m_ssl);
- pLayer->DoLayerCallback(LAYERCALLBACK_LAYERSPECIFIC, SSL_VERIFY_CERT, error);
- pLayer->m_bBlocking = TRUE;
- }
- }
- void CAsyncSslSocketLayer::UnloadSSL()
- {
- if (!m_bSslInitialized)
- return;
- ResetSslSession();
- m_bSslInitialized = false;
- m_sCriticalSection.Lock();
- m_nSslRefCount--;
- if (m_nSslRefCount)
- {
- m_sCriticalSection.Unlock();
- return;
- }
- m_sCriticalSection.Unlock();
- }
- bool AsnTimeToValidTime(ASN1_TIME * AsnTime, t_SslCertData::t_validTime & ValidTime)
- {
- int i = AsnTime->length;
- const char * v = (const char *)AsnTime->data;
- if (i < 10)
- {
- return FALSE;
- }
- for (int i2 = 0; i2 < 10; i2++)
- {
- if ((v[i2] > '9') || (v[i2] < '0'))
- {
- return FALSE;
- }
- }
- if (AsnTime->type == V_ASN1_UTCTIME)
- {
- ValidTime.y= (v[0]-'0')*10+(v[1]-'0');
- if (ValidTime.y < 50) ValidTime.y+=100;
- ValidTime.y += 1900;
- v += 2;
- i -= 2;
- }
- else if (AsnTime->type == V_ASN1_GENERALIZEDTIME)
- {
- if (i < 12)
- {
- return FALSE;
- }
- ValidTime.y = (v[0]-'0')*1000+(v[1]-'0')*100 + (v[2]-'0')*10+(v[3]-'0');
- v += 4;
- i -= 4;
- }
- else
- {
- return FALSE;
- }
- ValidTime.M = (v[0]-'0')*10+(v[1]-'0');
- if ((ValidTime.M > 12) || (ValidTime.M < 1))
- {
- return FALSE;
- }
- ValidTime.d = (v[2]-'0')*10+(v[3]-'0');
- ValidTime.h = (v[4]-'0')*10+(v[5]-'0');
- ValidTime.m = (v[6]-'0')*10+(v[7]-'0');
- if ((i >= 10) &&
- (v[8] >= '0') && (v[8] <= '9') &&
- (v[9] >= '0') && (v[9] <= '9'))
- {
- ValidTime.s = (v[8]-'0')*10+(v[9]-'0');
- }
- else
- {
- ValidTime.s = 0;
- }
- return TRUE;
- }
- BOOL CAsyncSslSocketLayer::GetPeerCertificateData(t_SslCertData &SslCertData, LPCTSTR & Error)
- {
- X509 *pX509=SSL_get_peer_certificate(m_ssl);
- if (!pX509)
- {
- Error = L"Cannot get certificate";
- return FALSE;
- }
- //Reset the contents of SslCertData
- memset(&SslCertData, 0, sizeof(t_SslCertData));
- //Set subject data fields
- X509_NAME *pX509Name=X509_get_subject_name(pX509);
- if (pX509Name)
- {
- int count=X509_NAME_entry_count(pX509Name);
- for (int i=0;i<count;i++)
- {
- X509_NAME_ENTRY *pX509NameEntry=X509_NAME_get_entry(pX509Name,i);
- if (!pX509NameEntry)
- continue;
- ASN1_OBJECT *pObject = X509_NAME_ENTRY_get_object(pX509NameEntry);
- ASN1_STRING *pString = X509_NAME_ENTRY_get_data(pX509NameEntry);
- CString str;
- unsigned char *out;
- int len = ASN1_STRING_to_UTF8(&out, pString);
- if (len > 0)
- {
- // Keep it huge
- LPWSTR unicode = new WCHAR[len * 10];
- memset(unicode, 0, sizeof(WCHAR) * len * 10);
- int unicodeLen = MultiByteToWideChar(CP_UTF8, 0, (const char *)out, len, unicode, len * 10);
- if (unicodeLen > 0)
- {
- #ifdef _UNICODE
- str = unicode;
- #else
- LPSTR ansi = new CHAR[len * 10];
- memset(ansi, 0, sizeof(CHAR) * len * 10);
- int ansiLen = WideCharToMultiByte(CP_ACP, 0, unicode, unicodeLen, ansi, len * 10, 0, 0);
- if (ansiLen > 0)
- str = ansi;
- delete [] ansi;
- #endif
- }
- delete [] unicode;
- OPENSSL_free(out);
- }
- switch(OBJ_obj2nid(pObject))
- {
- case NID_organizationName:
- _tcsncpy(SslCertData.subject.Organization, str, 255);
- SslCertData.subject.Organization[255] = 0;
- break;
- case NID_organizationalUnitName:
- _tcsncpy(SslCertData.subject.Unit, str, 255);
- SslCertData.subject.Unit[255] = 0;
- break;
- case NID_commonName:
- _tcsncpy(SslCertData.subject.CommonName, str, 255);
- SslCertData.subject.CommonName[255] = 0;
- break;
- case NID_pkcs9_emailAddress:
- _tcsncpy(SslCertData.subject.Mail, str, 255);
- SslCertData.subject.Mail[255] = 0;
- break;
- case NID_countryName:
- _tcsncpy(SslCertData.subject.Country, str, 255);
- SslCertData.subject.Country[255] = 0;
- break;
- case NID_stateOrProvinceName:
- _tcsncpy(SslCertData.subject.StateProvince, str, 255);
- SslCertData.subject.StateProvince[255] = 0;
- break;
- case NID_localityName:
- _tcsncpy(SslCertData.subject.Town, str, 255);
- SslCertData.subject.Town[255] = 0;
- break;
- default:
- if ( !OBJ_nid2sn(OBJ_obj2nid(pObject)) )
- {
- TCHAR tmp[20];
- _stprintf(tmp, L"%d", OBJ_obj2nid(pObject));
- int maxlen = 1024 - _tcslen(SslCertData.subject.Other)-1;
- _tcsncpy(SslCertData.subject.Other+_tcslen(SslCertData.subject.Other), tmp, maxlen);
- maxlen = 1024 - _tcslen(SslCertData.subject.Other)-1;
- _tcsncpy(SslCertData.subject.Other+_tcslen(SslCertData.subject.Other), L"=", maxlen);
- maxlen = 1024 - _tcslen(SslCertData.subject.Other)-1;
- _tcsncpy(SslCertData.subject.Other+_tcslen(SslCertData.subject.Other), str, maxlen);
- maxlen = 1024 - _tcslen(SslCertData.subject.Other)-1;
- _tcsncpy(SslCertData.subject.Other+_tcslen(SslCertData.subject.Other), L";", maxlen);
- }
- else
- {
- int maxlen = 1024 - _tcslen(SslCertData.subject.Other)-1;
- USES_CONVERSION;
- _tcsncpy(SslCertData.subject.Other+_tcslen(SslCertData.subject.Other), A2CT(OBJ_nid2sn(OBJ_obj2nid(pObject))), maxlen);
- maxlen = 1024 - _tcslen(SslCertData.subject.Other)-1;
- _tcsncpy(SslCertData.subject.Other+_tcslen(SslCertData.subject.Other), L"=", maxlen);
- maxlen = 1024 - _tcslen(SslCertData.subject.Other)-1;
- _tcsncpy(SslCertData.subject.Other+_tcslen(SslCertData.subject.Other), str, maxlen);
- maxlen = 1024 - _tcslen(SslCertData.subject.Other)-1;
- _tcsncpy(SslCertData.subject.Other+_tcslen(SslCertData.subject.Other), L";", maxlen);
- }
- break;
- }
- }
- }
- //Set issuer data fields
- pX509Name=X509_get_issuer_name(pX509);
- if (pX509Name)
- {
- int count=X509_NAME_entry_count(pX509Name);
- for (int i=0;i<count;i++)
- {
- X509_NAME_ENTRY *pX509NameEntry=X509_NAME_get_entry(pX509Name,i);
- if (!pX509NameEntry)
- continue;
- ASN1_STRING *pString=X509_NAME_ENTRY_get_data(pX509NameEntry);
- ASN1_OBJECT *pObject=X509_NAME_ENTRY_get_object(pX509NameEntry);
- CString str;
- unsigned char *out;
- int len = ASN1_STRING_to_UTF8(&out, pString);
- if (len > 0)
- {
- // Keep it huge
- LPWSTR unicode = new WCHAR[len * 10];
- memset(unicode, 0, sizeof(WCHAR) * len * 10);
- int unicodeLen = MultiByteToWideChar(CP_UTF8, 0, (const char *)out, len, unicode, len * 10);
- if (unicodeLen > 0)
- {
- #ifdef _UNICODE
- str = unicode;
- #else
- LPSTR ansi = new CHAR[len * 10];
- memset(ansi, 0, sizeof(CHAR) * len * 10);
- int ansiLen = WideCharToMultiByte(CP_ACP, 0, unicode, unicodeLen, ansi, len * 10, 0, 0);
- if (ansiLen > 0)
- str = ansi;
- delete [] ansi;
- #endif
- }
- delete [] unicode;
- OPENSSL_free(out);
- }
- switch(OBJ_obj2nid(pObject))
- {
- case NID_organizationName:
- _tcsncpy(SslCertData.issuer.Organization, str, 255);
- SslCertData.issuer.Organization[255] = 0;
- break;
- case NID_organizationalUnitName:
- _tcsncpy(SslCertData.issuer.Unit, str, 255);
- SslCertData.issuer.Unit[255] = 0;
- break;
- case NID_commonName:
- _tcsncpy(SslCertData.issuer.CommonName, str, 255);
- SslCertData.issuer.CommonName[255] = 0;
- break;
- case NID_pkcs9_emailAddress:
- _tcsncpy(SslCertData.issuer.Mail, str, 255);
- SslCertData.issuer.Mail[255] = 0;
- break;
- case NID_countryName:
- _tcsncpy(SslCertData.issuer.Country, str, 255);
- SslCertData.issuer.Country[255] = 0;
- break;
- case NID_stateOrProvinceName:
- _tcsncpy(SslCertData.issuer.StateProvince, str, 255);
- SslCertData.issuer.StateProvince[255] = 0;
- break;
- case NID_localityName:
- _tcsncpy(SslCertData.issuer.Town, str, 255);
- SslCertData.issuer.Town[255] = 0;
- break;
- default:
- if ( !OBJ_nid2sn(OBJ_obj2nid(pObject)) )
- {
- TCHAR tmp[20];
- _stprintf(tmp, L"%d", OBJ_obj2nid(pObject));
- int maxlen = 1024 - _tcslen(SslCertData.issuer.Other)-1;
- _tcsncpy(SslCertData.issuer.Other+_tcslen(SslCertData.issuer.Other), tmp, maxlen);
- maxlen = 1024 - _tcslen(SslCertData.issuer.Other)-1;
- _tcsncpy(SslCertData.issuer.Other+_tcslen(SslCertData.issuer.Other), L"=", maxlen);
- maxlen = 1024 - _tcslen(SslCertData.issuer.Other)-1;
- _tcsncpy(SslCertData.issuer.Other+_tcslen(SslCertData.issuer.Other), str, maxlen);
- maxlen = 1024 - _tcslen(SslCertData.issuer.Other)-1;
- _tcsncpy(SslCertData.issuer.Other+_tcslen(SslCertData.issuer.Other), L";", maxlen);
- }
- else
- {
- int maxlen = 1024 - _tcslen(SslCertData.issuer.Other)-1;
- USES_CONVERSION;
- _tcsncpy(SslCertData.issuer.Other+_tcslen(SslCertData.issuer.Other), A2CT(OBJ_nid2sn(OBJ_obj2nid(pObject))), maxlen);
- maxlen = 1024 - _tcslen(SslCertData.issuer.Other)-1;
- _tcsncpy(SslCertData.issuer.Other+_tcslen(SslCertData.issuer.Other), L"=", maxlen);
- maxlen = 1024 - _tcslen(SslCertData.issuer.Other)-1;
- _tcsncpy(SslCertData.issuer.Other+_tcslen(SslCertData.issuer.Other), str, maxlen);
- maxlen = 1024 - _tcslen(SslCertData.issuer.Other)-1;
- _tcsncpy(SslCertData.issuer.Other+_tcslen(SslCertData.issuer.Other), L";", maxlen);
- }
- break;
- }
- }
- }
- //Set date fields
- //Valid from
- ASN1_TIME *pTime=X509_getm_notBefore(pX509);
- if (!pTime)
- {
- X509_free(pX509);
- Error = L"Cannot get start time";
- return FALSE;
- }
- if (!AsnTimeToValidTime(pTime, SslCertData.validFrom))
- {
- X509_free(pX509);
- Error = L"Invalid start time";
- return FALSE;
- }
- //Valid until
- pTime = X509_getm_notAfter(pX509);
- if (!pTime)
- {
- X509_free(pX509);
- Error = L"Cannot get end time";
- return FALSE;
- }
- if (!AsnTimeToValidTime(pTime, SslCertData.validUntil))
- {
- X509_free(pX509);
- Error = L"Invalid end time";
- return FALSE;
- }
- int subjectAltNamePos = X509_get_ext_by_NID(pX509, NID_subject_alt_name, -1);
- if (subjectAltNamePos >= 0)
- {
- X509_EXTENSION * subjectAltNameExtension = X509_get_ext(pX509, subjectAltNamePos);
- BIO * subjectAltNameBio = BIO_new(BIO_s_mem());
- if (X509V3_EXT_print(subjectAltNameBio, subjectAltNameExtension, 0, 0) == 1)
- {
- USES_CONVERSION;
- u_char *data;
- int len = BIO_get_mem_data(subjectAltNameBio, &data);
- char * buf = new char[len + 1];
- memcpy(buf, data, len);
- buf[len] = '\0';
- _tcsncpy(SslCertData.subjectAltName, A2CT(buf), LENOF(SslCertData.subjectAltName));
- SslCertData.subjectAltName[LENOF(SslCertData.subjectAltName) - 1] = '\0';
- delete [] buf;
- }
- BIO_vfree(subjectAltNameBio);
- }
- unsigned int length;
- length = sizeof(SslCertData.hashSha1);
- X509_digest(pX509, EVP_sha1(), SslCertData.hashSha1, &length);
- DebugAssert(length == sizeof(SslCertData.hashSha1));
- length = sizeof(SslCertData.hashSha256);
- X509_digest(pX509, EVP_sha256(), SslCertData.hashSha256, &length);
- DebugAssert(length == sizeof(SslCertData.hashSha256));
- // Inspired by ne_ssl_cert_export()
- // Find the length of the DER encoding.
- SslCertData.certificateLen = i2d_X509(pX509, NULL);
- SslCertData.certificate = new unsigned char[SslCertData.certificateLen];
- unsigned char * p = SslCertData.certificate;
- i2d_X509(pX509, &p);
- SslCertData.priv_data = m_nSslAsyncNotifyId;
- X509_free(pX509);
- SslCertData.verificationResult = m_nVerificationResult;
- SslCertData.verificationDepth = m_nVerificationDepth;
- return TRUE;
- }
- std::string CAsyncSslSocketLayer::GetTlsVersionStr()
- {
- return m_TlsVersionStr;
- }
- std::string CAsyncSslSocketLayer::GetCipherName()
- {
- return m_CipherName;
- }
- void CAsyncSslSocketLayer::SetNotifyReply(int nID, int nCode, int result)
- {
- if (!m_bBlocking)
- return;
- if (nID != m_nSslAsyncNotifyId)
- return;
- if (nCode != SSL_VERIFY_CERT)
- return;
- m_bBlocking = FALSE;
- if (!result)
- {
- m_nNetworkError = WSAECONNABORTED;
- WSASetLastError(WSAECONNABORTED);
- if (!m_bFailureSent)
- {
- m_bFailureSent = TRUE;
- DoLayerCallback(LAYERCALLBACK_LAYERSPECIFIC, SSL_FAILURE, SSL_FAILURE_CERTREJECTED);
- }
- TriggerEvent(FD_CLOSE, 0, TRUE);
- return;
- }
- m_bSslEstablished = TRUE;
- PrintSessionInfo();
- DoLayerCallback(LAYERCALLBACK_LAYERSPECIFIC, SSL_INFO, SSL_INFO_ESTABLISHED);
- TriggerEvents();
- }
- void CAsyncSslSocketLayer::PrintSessionInfo()
- {
- const SSL_CIPHER *ciph;
- X509 *cert;
- ciph = SSL_get_current_cipher(m_ssl);
- char enc[4096] = {0};
- cert=SSL_get_peer_certificate(m_ssl);
- if (cert != NULL)
- {
- EVP_PKEY *pkey = X509_get_pubkey(cert);
- if (pkey != NULL)
- {
- if (0)
- ;
- #ifndef NO_RSA
- else if (EVP_PKEY_id(pkey) == EVP_PKEY_RSA)
- sprintf(enc, "%d bit RSA", EVP_PKEY_bits(pkey));
- #endif
- #ifndef NO_DSA
- else if (EVP_PKEY_id(pkey) == EVP_PKEY_DSA)
- sprintf(enc, "%d bit DSA", EVP_PKEY_bits(pkey));
- #endif
- EVP_PKEY_free(pkey);
- }
- X509_free(cert);
- /* The SSL API does not allow us to look at temporary RSA/DH keys,
- * otherwise we should print their lengths too */
- }
- const int buffer_size = 4096;
- char *buffer = new char[buffer_size];
- char *buffer2 = new char[buffer_size];
- // see also ne_ssl_get_version and ne_ssl_get_cipher
- m_TlsVersionStr = SSL_get_version(m_ssl);
- sprintf(buffer, "%s: %s, %s, %s",
- SSL_CIPHER_get_version(ciph),
- SSL_CIPHER_get_name(ciph),
- enc,
- SSL_CIPHER_description(ciph, buffer2, buffer_size));
- m_CipherName = buffer;
- // see TWebDAVFileSystem::CollectTLSSessionInfo()
- sprintf(buffer, "Using %s, cipher %s",
- m_TlsVersionStr.c_str(),
- m_CipherName.c_str());
- USES_CONVERSION;
- LogSocketMessageRaw(FZ_LOG_PROGRESS, A2T(buffer));
- delete [] buffer;
- delete [] buffer2;
- }
- void CAsyncSslSocketLayer::OnConnect(int nErrorCode)
- {
- if (m_bUseSSL && nErrorCode)
- TriggerEvent(FD_WRITE, 0);
- TriggerEvent(FD_CONNECT, nErrorCode, TRUE);
- }
- CAsyncSslSocketLayer * CAsyncSslSocketLayer::LookupLayer(SSL * Ssl)
- {
- CAsyncSslSocketLayer * Result = NULL;
- m_sCriticalSection.Lock();
- t_SslLayerList * Cur = m_pSslLayerList;
- while (Cur != NULL)
- {
- if (Cur->pLayer->m_ssl == Ssl)
- {
- break;
- }
- Cur = Cur->pNext;
- }
- m_sCriticalSection.Unlock();
- if (Cur == NULL)
- {
- MessageBox(0, L"Can't lookup TLS session!", L"Critical error", MB_ICONEXCLAMATION);
- Result = NULL;
- }
- else
- {
- Result = Cur->pLayer;
- }
- return Result;
- }
- int CAsyncSslSocketLayer::verify_callback(int preverify_ok, X509_STORE_CTX *ctx)
- {
- X509 *err_cert;
- int err, depth;
- SSL *ssl;
- err_cert = X509_STORE_CTX_get_current_cert(ctx);
- err = X509_STORE_CTX_get_error(ctx);
- depth = X509_STORE_CTX_get_error_depth(ctx);
- /*
- * Retrieve the pointer to the SSL of the connection currently treated
- * and the application specific data stored into the SSL object.
- */
- ssl = (SSL *)X509_STORE_CTX_get_ex_data(ctx, SSL_get_ex_data_X509_STORE_CTX_idx());
- CAsyncSslSocketLayer * pLayer = LookupLayer(ssl);
- if (pLayer == NULL)
- {
- return 1;
- }
- /*
- * Catch a too long certificate chain. The depth limit set using
- * SSL_CTX_set_verify_depth() is by purpose set to "limit+1" so
- * that whenever the "depth>verify_depth" condition is met, we
- * have violated the limit and want to log this error condition.
- * We must do it here, because the CHAIN_TOO_LONG error would not
- * be found explicitly; only errors introduced by cutting off the
- * additional certificates would be logged.
- */
- if (depth > 10) {//mydata->verify_depth) {
- preverify_ok = 0;
- err = X509_V_ERR_CERT_CHAIN_TOO_LONG;
- X509_STORE_CTX_set_error(ctx, err);
- }
- if (!preverify_ok)
- {
- if (!pLayer->m_nVerificationResult)
- {
- pLayer->m_nVerificationDepth = depth;
- pLayer->m_nVerificationResult = err;
- }
- }
- return 1;
- }
- int CAsyncSslSocketLayer::ProvideClientCert(
- SSL * Ssl, X509 ** Certificate, EVP_PKEY ** PrivateKey)
- {
- CAsyncSslSocketLayer * Layer = LookupLayer(Ssl);
- USES_CONVERSION;
- CString Message;
- Message.LoadString(NEED_CLIENT_CERTIFICATE);
- char * Buffer = new char[Message.GetLength() + 1];
- strcpy(Buffer, T2A(Message));
- int Level;
- int Result;
- if ((Layer->FCertificate == NULL) || (Layer->FPrivateKey == NULL))
- {
- Level = FZ_LOG_WARNING;
- Result = 0;
- }
- else
- {
- Level = FZ_LOG_PROGRESS;
- *Certificate = X509_dup(Layer->FCertificate);
- EVP_PKEY_up_ref(Layer->FPrivateKey);
- *PrivateKey = Layer->FPrivateKey;
- Result = 1;
- }
- Layer->LogSocketMessageRaw(Level, A2T(Buffer));
- delete [] Buffer;
- return Result;
- }
- void CAsyncSslSocketLayer::SetClientCertificate(X509 * Certificate, EVP_PKEY * PrivateKey)
- {
- FCertificate = Certificate;
- FPrivateKey = PrivateKey;
- }
- BOOL CAsyncSslSocketLayer::SetCertStorage(CString file)
- {
- m_CertStorage = file;
- return TRUE;
- }
- void CAsyncSslSocketLayer::OnClose(int nErrorCode)
- {
- m_onCloseCalled = true;
- if (m_bUseSSL && BIO_ctrl)
- {
- size_t pending = BIO_ctrl_pending(m_sslbio);
- if (pending > 0)
- {
- TriggerEvents();
- }
- else TriggerEvent(FD_CLOSE, nErrorCode, TRUE);
- }
- else
- TriggerEvent(FD_CLOSE, nErrorCode, TRUE);
- }
- void CAsyncSslSocketLayer::PrintLastErrorMsg()
- {
- int err = ERR_get_error();
- while (err)
- {
- char *buffer = new char[512];
- const char *reason = ERR_reason_error_string(err);
- ERR_error_string(err, buffer);
- err = ERR_get_error();
- USES_CONVERSION;
- LogSocketMessageRaw(FZ_LOG_PROGRESS, A2T(buffer));
- LogSocketMessageRaw(FZ_LOG_WARNING, A2T(reason));
- delete [] buffer;
- }
- }
- void CAsyncSslSocketLayer::TriggerEvents()
- {
- size_t pending = BIO_ctrl_pending(m_nbio);
- if (pending > 0)
- {
- if (m_mayTriggerWrite)
- {
- m_mayTriggerWrite = false;
- TriggerEvent(FD_WRITE, 0);
- }
- }
- else if (!m_nNetworkSendBufferLen && m_bSslEstablished && !m_pRetrySendBuffer)
- {
- if (BIO_ctrl_get_write_guarantee(m_sslbio) > 0 && m_mayTriggerWriteUp)
- {
- m_mayTriggerWriteUp = false;
- TriggerEvent(FD_WRITE, 0, TRUE);
- }
- }
- if (m_bSslEstablished && BIO_ctrl_pending(m_sslbio) > 0)
- {
- if (m_mayTriggerReadUp && !m_bBlocking)
- {
- m_mayTriggerReadUp = false;
- TriggerEvent(FD_READ, 0, TRUE);
- }
- }
- else
- {
- int len = BIO_ctrl_get_write_guarantee(m_nbio);
- if (len > 0 && m_mayTriggerRead)
- {
- m_mayTriggerRead = false;
- TriggerEvent(FD_READ, 0);
- }
- }
- if (m_onCloseCalled && m_bSslEstablished)
- {
- if (BIO_ctrl_pending(m_sslbio) <= 0)
- {
- TriggerEvent(FD_CLOSE, 0, TRUE);
- }
- }
- }
- //---------------------------------------------------------------------------
|