1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915 |
- // CAsyncSslSocketLayer by Tim Kosse ([email protected])
- // Version 2.0 (2005-02-27)
- //---------------------------------------------------------------------------
- // Feel free to use this class, as long as you don't claim that you wrote it
- // and this copyright notice stays intact in the source files.
- // If you use this class in commercial applications, please send a short message
- // to [email protected]
- //---------------------------------------------------------------------------
- #include "FileZillaPCH.h"
- #include "AsyncSslSocketLayer.h"
- #include "FilezillaTools.h"
- #include <openssl/x509v3.h>
- #include <openssl/err.h>
- #include <openssl/tls1.h>
- #pragma hdrstop
- #include "Common.h"
- /////////////////////////////////////////////////////////////////////////////
- // CAsyncSslSocketLayer
- std::unique_ptr<TCriticalSection> CAsyncSslSocketLayer::m_sCriticalSection(TraceInitPtr(new TCriticalSection()));
- CAsyncSslSocketLayer::t_SslLayerList* CAsyncSslSocketLayer::m_pSslLayerList = 0;
- bool CAsyncSslSocketLayer::m_bSslInitialized = false;
- CAsyncSslSocketLayer::CAsyncSslSocketLayer()
- {
- m_ssl = 0;
- m_sslbio = 0;
- m_ibio = 0;
- m_nbio = 0;
- m_ssl_ctx = 0;
- m_bUseSSL = false;
- m_bSslInitialized = FALSE;
- m_bSslEstablished = FALSE;
- m_nNetworkSendBufferLen = 0;
- m_nNetworkSendBufferMaxLen = 0;
- m_pNetworkSendBuffer = NULL;
- m_pRetrySendBuffer = 0;
- m_nRetrySendBufferLen = 0;
- m_nNetworkError = 0;
- m_nShutDown = 0;
- m_bBlocking = FALSE;
- m_nSslAsyncNotifyId = 0;
- m_bFailureSent = FALSE;
- m_nVerificationResult = 0;
- m_nVerificationDepth = 0;
- m_mayTriggerRead = true;
- m_mayTriggerWrite = true;
- m_mayTriggerReadUp = true;
- m_mayTriggerWriteUp = true;
- m_onCloseCalled = false;
- m_Main = NULL;
- m_sessionid = NULL;
- m_sessionidSerialized = NULL;
- m_sessionreuse = true;
- m_sessionreuse_failed = false;
- FCertificate = NULL;
- FPrivateKey = NULL;
- m_CriticalSection.reset(new TCriticalSection());
- }
- CAsyncSslSocketLayer::~CAsyncSslSocketLayer()
- {
- ResetSslSession();
- delete [] m_pNetworkSendBuffer;
- delete [] m_pRetrySendBuffer;
- }
- int CAsyncSslSocketLayer::InitSSL()
- {
- TGuard Guard(m_sCriticalSection.get());
- if (!m_bSslInitialized)
- {
- if (!OPENSSL_init_ssl(OPENSSL_INIT_LOAD_SSL_STRINGS | OPENSSL_INIT_LOAD_CRYPTO_STRINGS, NULL))
- {
- return SSL_FAILURE_INITSSL;
- }
- m_bSslInitialized = true;
- }
- return 0;
- }
- void CAsyncSslSocketLayer::OnReceive(int nErrorCode)
- {
- if (m_bUseSSL)
- {
- if (m_bBlocking)
- {
- m_mayTriggerRead = true;
- return;
- }
- if (m_nNetworkError)
- {
- return;
- }
- char buffer[16384];
- m_mayTriggerRead = false;
- //Get number of bytes we can receive and store in the network input bio
- int len = BIO_ctrl_get_write_guarantee(m_nbio);
- if (len > 16384)
- len = 16384;
- else if (!len)
- {
- m_mayTriggerRead = true;
- TriggerEvents();
- return;
- }
- int numread = 0;
- // Receive data
- numread = ReceiveNext(buffer, len);
- if (numread > 0)
- {
- //Store it in the network input bio and process data
- int numwritten = BIO_write(m_nbio, buffer, numread);
- BIO_ctrl(m_nbio, BIO_CTRL_FLUSH, 0, NULL);
- // I have no idea why this call is needed, but without it, connections
- // will stall. Perhaps it triggers some internal processing.
- // Also, ignore return value, don't do any error checking. This function
- // can report errors, even though a later call can succeed.
- char buffer;
- BIO_read(m_sslbio, &buffer, 0);
- }
- if (!numread)
- {
- if (GetLayerState() == connected)
- TriggerEvent(FD_CLOSE, nErrorCode, TRUE);
- }
- else if (numread == SOCKET_ERROR)
- {
- int nError = GetLastError();
- if (nError != WSAEWOULDBLOCK && nError != WSAENOTCONN)
- {
- m_nNetworkError = GetLastError();
- TriggerEvent(FD_CLOSE, 0, TRUE);
- return;
- }
- }
- if (m_pRetrySendBuffer != NULL)
- {
- if (ProcessSendBuffer() == -2)
- {
- TriggerEvent(FD_CLOSE, 0, TRUE);
- return;
- }
- }
- if (!m_nShutDown && SSL_get_shutdown(m_ssl))
- {
- size_t pending = BIO_ctrl_pending(m_sslbio);
- if (pending <= 0)
- {
- if (ShutDown() || GetLastError() == WSAEWOULDBLOCK)
- {
- if (ShutDownComplete())
- TriggerEvent(FD_CLOSE, 0, TRUE);
- }
- else
- {
- m_nNetworkError = WSAECONNABORTED;
- WSASetLastError(WSAECONNABORTED);
- TriggerEvent(FD_CLOSE, WSAECONNABORTED, TRUE);
- }
- return;
- }
- }
- if (ShutDownComplete() && m_nShutDown == 1)
- {
- //Send shutdown notification if all pending data has been sent
- DoLayerCallback(LAYERCALLBACK_LAYERSPECIFIC, SSL_INFO, SSL_INFO_SHUTDOWNCOMPLETE);
- m_nShutDown++;
- }
- TriggerEvents();
- }
- else
- {
- TriggerEvent(FD_READ, nErrorCode, TRUE);
- }
- }
- int CAsyncSslSocketLayer::ProcessSendBuffer()
- {
- int numwrite = BIO_write(m_sslbio, m_pRetrySendBuffer, m_nRetrySendBufferLen);
- if (numwrite >= 0)
- {
- BIO_ctrl(m_sslbio, BIO_CTRL_FLUSH, 0, NULL);
- delete [] m_pRetrySendBuffer;
- m_pRetrySendBuffer = 0;
- return numwrite;
- }
- else
- {
- DebugAssert(numwrite == -1);
- if (!BIO_should_retry(m_sslbio))
- {
- delete [] m_pRetrySendBuffer;
- m_pRetrySendBuffer = 0;
- ::SetLastError(WSAECONNABORTED);
- return -2;
- }
- else
- {
- return -1;
- }
- }
- }
- void CAsyncSslSocketLayer::OnSend(int nErrorCode)
- {
- if (m_bUseSSL)
- {
- if (m_nNetworkError)
- {
- return;
- }
- m_mayTriggerWrite = false;
- //Send data in the send buffer
- while (m_nNetworkSendBufferLen)
- {
- int numsent = SendNext(m_pNetworkSendBuffer, m_nNetworkSendBufferLen);
- if (numsent == SOCKET_ERROR)
- {
- int nError = GetLastError();
- if (nError != WSAEWOULDBLOCK && nError != WSAENOTCONN)
- {
- m_nNetworkError = nError;
- TriggerEvent(FD_CLOSE, 0, TRUE);
- }
- return;
- }
- else if (!numsent)
- {
- if (GetLayerState() == connected)
- TriggerEvent(FD_CLOSE, nErrorCode, TRUE);
- }
- if (numsent == m_nNetworkSendBufferLen)
- {
- m_nNetworkSendBufferLen = 0;
- }
- else
- {
- memmove(m_pNetworkSendBuffer, m_pNetworkSendBuffer + numsent, m_nNetworkSendBufferLen - numsent);
- m_nNetworkSendBufferLen -= numsent;
- }
- }
- //Send the data waiting in the network bio
- char buffer[32 * 1024];
- size_t len = BIO_ctrl_pending(m_nbio);
- int numread = BIO_read(m_nbio, buffer, std::min(len, sizeof(buffer)));
- if (numread <= 0)
- m_mayTriggerWrite = true;
- while (numread > 0)
- {
- int numsent = SendNext(buffer, numread);
- if (!numsent)
- {
- if (GetLayerState() == connected)
- TriggerEvent(FD_CLOSE, nErrorCode, TRUE);
- }
- if (numsent == SOCKET_ERROR || numsent < numread)
- {
- if (numsent == SOCKET_ERROR)
- if (GetLastError() != WSAEWOULDBLOCK && GetLastError() != WSAENOTCONN)
- {
- m_nNetworkError = GetLastError();
- TriggerEvent(FD_CLOSE, 0, TRUE);
- return;
- }
- else
- numsent = 0;
- // Add all data that was retrieved from the network bio but could not be sent to the send buffer.
- if (m_nNetworkSendBufferMaxLen < (m_nNetworkSendBufferLen + numread - numsent))
- {
- char * tmp = m_pNetworkSendBuffer;
- m_nNetworkSendBufferMaxLen = static_cast<int>((m_nNetworkSendBufferLen + numread - numsent) * 1.5);
- m_pNetworkSendBuffer = new char[m_nNetworkSendBufferMaxLen];
- if (tmp)
- {
- memcpy(m_pNetworkSendBuffer, tmp, m_nNetworkSendBufferLen);
- delete [] tmp;
- }
- }
- DebugAssert(m_pNetworkSendBuffer);
- memcpy(m_pNetworkSendBuffer + m_nNetworkSendBufferLen, buffer, numread-numsent);
- m_nNetworkSendBufferLen += numread - numsent;
- }
- if (!numsent)
- {
- break;
- }
- len = BIO_ctrl_pending(m_nbio);
- if (!len)
- {
- m_mayTriggerWrite = true;
- break;
- }
- numread = BIO_read(m_nbio, buffer, len);
- if (numread <= 0)
- {
- m_mayTriggerWrite = true;
- }
- }
- if (m_pRetrySendBuffer != NULL)
- {
- if (ProcessSendBuffer() == -2)
- {
- TriggerEvent(FD_CLOSE, 0, TRUE);
- return;
- }
- }
- // No more data available, ask for more.
- TriggerEvents();
- if (m_nShutDown == 1 && ShutDownComplete())
- {
- //Send shutdown notification if all pending data has been sent
- // FileZilla3 calls ShutDownNext() here
- DoLayerCallback(LAYERCALLBACK_LAYERSPECIFIC, SSL_INFO, SSL_INFO_SHUTDOWNCOMPLETE);
- m_nShutDown++;
- }
- }
- else
- {
- TriggerEvent(FD_WRITE, nErrorCode, TRUE);
- }
- }
- int CAsyncSslSocketLayer::Send(const void* lpBuf, int nBufLen, int nFlags)
- {
- if (m_bUseSSL)
- {
- if (!lpBuf)
- {
- return 0;
- }
- if (m_bBlocking || m_pRetrySendBuffer)
- {
- m_mayTriggerWriteUp = true;
- ::SetLastError(WSAEWOULDBLOCK);
- return SOCKET_ERROR;
- }
- if (m_nNetworkError)
- {
- SetLastError(m_nNetworkError);
- return SOCKET_ERROR;
- }
- if (m_nShutDown)
- {
- ::SetLastError(WSAESHUTDOWN);
- return SOCKET_ERROR;
- }
- if (!m_bSslEstablished)
- {
- m_mayTriggerWriteUp = true;
- ::SetLastError(WSAEWOULDBLOCK);
- return SOCKET_ERROR;
- }
- if (!nBufLen)
- {
- return 0;
- }
- if (m_onCloseCalled)
- {
- TriggerEvent(FD_CLOSE, 0, TRUE);
- return 0;
- }
- int len = BIO_ctrl_get_write_guarantee(m_sslbio);
- if (nBufLen > len)
- nBufLen = len;
- if (!len)
- {
- m_mayTriggerWriteUp = true;
- TriggerEvents();
- ::SetLastError(WSAEWOULDBLOCK);
- }
- m_pRetrySendBuffer = new char[nBufLen];
- m_nRetrySendBufferLen = nBufLen;
- memcpy(m_pRetrySendBuffer, lpBuf, nBufLen);
- int ProcessResult = ProcessSendBuffer();
- if (ProcessResult == -2)
- {
- return SOCKET_ERROR;
- }
- else if (ProcessResult == -1)
- {
- if (GetLayerState() == closed)
- {
- return 0;
- }
- else if (GetLayerState() != connected)
- {
- SetLastError(m_nNetworkError);
- return SOCKET_ERROR;
- }
- TriggerEvents();
- return nBufLen;
- }
- m_mayTriggerWriteUp = true;
- TriggerEvents();
- return ProcessResult;
- }
- else
- {
- return SendNext(lpBuf, nBufLen, nFlags);
- }
- }
- int CAsyncSslSocketLayer::Receive(void* lpBuf, int nBufLen, int nFlags)
- {
- if (m_bUseSSL)
- {
- if (m_bBlocking)
- {
- m_mayTriggerReadUp = true;
- ::SetLastError(WSAEWOULDBLOCK);
- return SOCKET_ERROR;
- }
- if (m_nNetworkError)
- {
- size_t pending = BIO_ctrl_pending(m_sslbio);
- if (pending && !m_nShutDown)
- {
- m_mayTriggerReadUp = true;
- TriggerEvents();
- return BIO_read(m_sslbio, lpBuf,nBufLen);
- }
- WSASetLastError(m_nNetworkError);
- return SOCKET_ERROR;
- }
- if (m_nShutDown)
- {
- ::SetLastError(WSAESHUTDOWN);
- return SOCKET_ERROR;
- }
- if (!nBufLen)
- {
- return 0;
- }
- size_t pending = BIO_ctrl_pending(m_sslbio);
- if (!pending)
- {
- if (GetLayerState() == closed)
- {
- return 0;
- }
- if (m_onCloseCalled)
- {
- TriggerEvent(FD_CLOSE, 0, TRUE);
- return 0;
- }
- else if (GetLayerState() != connected)
- {
- SetLastError(m_nNetworkError);
- return SOCKET_ERROR;
- }
- else
- {
- if (SSL_get_shutdown(m_ssl))
- {
- if (ShutDown() || GetLastError() == WSAEWOULDBLOCK)
- {
- if (ShutDownComplete())
- {
- TriggerEvent(FD_CLOSE, 0, TRUE);
- return 0;
- }
- else
- WSASetLastError(WSAEWOULDBLOCK);
- }
- else
- {
- m_nNetworkError = WSAECONNABORTED;
- WSASetLastError(WSAECONNABORTED);
- TriggerEvent(FD_CLOSE, WSAECONNABORTED, TRUE);
- }
- return SOCKET_ERROR;
- }
- }
- m_mayTriggerReadUp = true;
- TriggerEvents();
- ::SetLastError(WSAEWOULDBLOCK);
- return SOCKET_ERROR;
- }
- int numread = BIO_read(m_sslbio, lpBuf, nBufLen);
- if (!numread)
- {
- if (SSL_get_shutdown(m_ssl))
- {
- if (ShutDown() || GetLastError() == WSAEWOULDBLOCK)
- {
- if (ShutDownComplete())
- {
- TriggerEvent(FD_CLOSE, 0, TRUE);
- return 0;
- }
- else
- WSASetLastError(WSAEWOULDBLOCK);
- }
- else
- {
- m_nNetworkError = WSAECONNABORTED;
- WSASetLastError(WSAECONNABORTED);
- TriggerEvent(FD_CLOSE, WSAECONNABORTED, TRUE);
- }
- return SOCKET_ERROR;
- }
- m_mayTriggerReadUp = true;
- TriggerEvents();
- ::SetLastError(WSAEWOULDBLOCK);
- return SOCKET_ERROR;
- }
- if (numread < 0)
- {
- if (!BIO_should_retry(m_sslbio))
- {
- PrintLastErrorMsg();
- m_nNetworkError = WSAECONNABORTED;
- WSASetLastError(WSAECONNABORTED);
- TriggerEvent(FD_CLOSE, 0, TRUE);
- return SOCKET_ERROR;
- }
- else
- {
- if (SSL_get_shutdown(m_ssl))
- {
- if (ShutDown() || GetLastError() == WSAEWOULDBLOCK)
- {
- if (ShutDownComplete())
- {
- TriggerEvent(FD_CLOSE, 0, TRUE);
- return 0;
- }
- else
- WSASetLastError(WSAEWOULDBLOCK);
- }
- else
- {
- m_nNetworkError = WSAECONNABORTED;
- WSASetLastError(WSAECONNABORTED);
- TriggerEvent(FD_CLOSE, 0, TRUE);
- }
- return SOCKET_ERROR;
- }
- m_mayTriggerReadUp = true;
- TriggerEvents();
- ::SetLastError(WSAEWOULDBLOCK);
- return SOCKET_ERROR;
- }
- }
- m_mayTriggerReadUp = true;
- TriggerEvents();
- return numread;
- }
- else
- {
- return ReceiveNext(lpBuf, nBufLen, nFlags);
- }
- }
- void CAsyncSslSocketLayer::Close()
- {
- if (!m_nShutDown && m_bSslEstablished && !m_nNetworkError && !m_nCriticalError)
- {
- ShutDown();
- while (!ShutDownComplete() && !m_nNetworkError && !m_nCriticalError &&
- ((m_nNetworkSendBufferLen > 0) || (BIO_ctrl_pending(m_nbio) > 0) || m_pRetrySendBuffer))
- {
- OnSend(0);
- }
- }
- m_nShutDown = 0;
- m_onCloseCalled = false;
- ResetSslSession();
- CloseNext();
- }
- BOOL CAsyncSslSocketLayer::Connect(const SOCKADDR *lpSockAddr, int nSockAddrLen)
- {
- BOOL res = ConnectNext(lpSockAddr, nSockAddrLen);
- if (!res)
- {
- if (GetLastError() != WSAEWOULDBLOCK)
- {
- ResetSslSession();
- }
- }
- return res;
- }
- BOOL CAsyncSslSocketLayer::Connect(LPCTSTR lpszHostAddress, UINT nHostPort)
- {
- BOOL res = ConnectNext(lpszHostAddress, nHostPort);
- if (!res)
- {
- if (GetLastError()!=WSAEWOULDBLOCK)
- {
- ResetSslSession();
- }
- }
- return res;
- }
- void CAsyncSslSocketLayer::SetSession(SSL_SESSION * Session)
- {
- TGuard Guard(m_CriticalSection.get());
- if (m_sessionid != NULL)
- {
- SSL_SESSION_free(m_sessionid);
- }
- bool Serialize = (m_Main == NULL);
- if ((m_sessionidSerialized != NULL) && DebugAlwaysTrue(Serialize))
- {
- delete[] m_sessionidSerialized;
- m_sessionidSerialized = NULL;
- }
- m_sessionid = Session;
- if ((m_sessionid != NULL) && Serialize)
- {
- LogSocketMessageRaw(FZ_LOG_INFO, L"Saving session ID");
- m_sessionidSerializedLen = i2d_SSL_SESSION(m_sessionid, NULL);
- m_sessionidSerialized = new unsigned char[m_sessionidSerializedLen];
- unsigned char * P = m_sessionidSerialized;
- i2d_SSL_SESSION(m_sessionid, &P);
- }
- }
- bool CAsyncSslSocketLayer::HandleSession(SSL_SESSION * Session)
- {
- bool Result = false;
- if (m_sessionreuse)
- {
- if (m_sessionid != Session)
- {
- if (m_sessionid == NULL)
- {
- if (SSL_session_reused(m_ssl))
- {
- LogSocketMessageRaw(FZ_LOG_PROGRESS, L"Session ID reused");
- }
- else
- {
- if ((m_Main != NULL) && !m_Main->m_sessionreuse_failed)
- {
- LogSocketMessageRaw(FZ_LOG_INFO, L"Main TLS session ID not reused, will not try again");
- m_Main->m_sessionreuse_failed = true;
- }
- }
- }
- else
- {
- LogSocketMessageRaw(FZ_LOG_INFO, L"Session ID changed");
- }
- SetSession(Session);
- Result = true;
- }
- }
- return Result;
- }
- int CAsyncSslSocketLayer::NewSessionCallback(struct ssl_st * Ssl, SSL_SESSION * Session)
- {
- CAsyncSslSocketLayer * Layer = LookupLayer(Ssl);
- int Result = 0;
- // This is not called for TLS 1.2 and older when session is reused (so "Session ID reused" won't be logged).
- // So for 1.2 and older, we call HandleSession from apps_ssl_info_callback as we always did.
- if ((SSL_version(Ssl) >= TLS1_3_VERSION) && Layer->HandleSession(Session))
- {
- Result = 1;
- }
- return Result;
- }
- int CAsyncSslSocketLayer::InitSSLConnection(bool clientMode,
- CAsyncSslSocketLayer* main, bool sessionreuse, const CString & host,
- CFileZillaTools * tools)
- {
- if (m_bUseSSL)
- return 0;
- int res = InitSSL();
- if (res)
- return res;
- {
- // What is the point of this guard?
- // Maybe the m_ssl_ctx was intended to be global. But as it is not, the guard is probably pointless.
- TGuard Guard(m_sCriticalSection.get());
- if (!m_ssl_ctx)
- {
- // Create new context if none given
- if (!(m_ssl_ctx = SSL_CTX_new( TLS_method())))
- {
- ResetSslSession();
- return SSL_FAILURE_INITSSL;
- }
- if (clientMode)
- {
- USES_CONVERSION;
- SSL_CTX_set_verify(m_ssl_ctx, SSL_VERIFY_PEER, verify_callback);
- SSL_CTX_set_client_cert_cb(m_ssl_ctx, ProvideClientCert);
- // https://www.mail-archive.com/[email protected]/msg86186.html
- SSL_CTX_set_session_cache_mode(m_ssl_ctx, SSL_SESS_CACHE_CLIENT | SSL_SESS_CACHE_NO_INTERNAL_STORE | SSL_SESS_CACHE_NO_AUTO_CLEAR);
- SSL_CTX_sess_set_new_cb(m_ssl_ctx, NewSessionCallback);
- if (!m_CertStorage.IsEmpty() &&
- CFile::IsValid((LPCTSTR)m_CertStorage))
- {
- SSL_CTX_load_verify_locations(m_ssl_ctx, T2CA(m_CertStorage), 0);
- }
- }
- }
- //Create new SSL session
- if (!(m_ssl = SSL_new(m_ssl_ctx)))
- {
- ResetSslSession();
- return SSL_FAILURE_INITSSL;
- }
- if (clientMode && (host.GetLength() > 0))
- {
- USES_CONVERSION;
- SSL_set_tlsext_host_name(m_ssl, T2CA(host));
- }
- #ifdef _DEBUG
- if ((main == NULL) && LoggingSocketMessage(FZ_LOG_INFO))
- {
- USES_CONVERSION;
- LogSocketMessageRaw(FZ_LOG_INFO, L"Supported ciphersuites:");
- STACK_OF(SSL_CIPHER) * ciphers = SSL_get_ciphers(m_ssl);
- for (int i = 0; i < sk_SSL_CIPHER_num(ciphers); i++)
- {
- const SSL_CIPHER * cipher = sk_SSL_CIPHER_value(ciphers, i);
- LogSocketMessageRaw(FZ_LOG_INFO, A2CT(SSL_CIPHER_get_name(cipher)));
- }
- }
- #endif
- //Add current instance to list of active instances
- t_SslLayerList *tmp = m_pSslLayerList;
- m_pSslLayerList = new t_SslLayerList;
- m_pSslLayerList->pNext = tmp;
- m_pSslLayerList->pLayer = this;
- }
- SSL_set_info_callback(m_ssl, apps_ssl_info_callback);
- //Create bios
- m_sslbio = BIO_new(BIO_f_ssl());
- // WORKAROUND: Upload over TLS 1.3 fails for specific sizes in relation to OpenSSL buffer size.
- // For 32768 buffer, the sizes are 32725-32746, 65471-65492, 98217-98238 (tested up to 1048576)
- // Do not know how to fix that, so as a workaround, using buffer size that does not result in the problem.
- unsigned long TransferSize = 0;
- if (main != NULL)
- {
- TransferSize = static_cast<unsigned long>(GetSocketOptionVal(OPTION_MPEXT_TRANSFER_SIZE));
- }
- unsigned BufferKBs = 32;
- unsigned long BufferSize;
- do
- {
- BufferSize = BufferKBs * 1024;
- int Remainder = TransferSize % BufferSize;
- int BufferCount = (TransferSize / BufferSize) + (Remainder > 0 ? 1 : 0);
- int ProblemHigh = BufferSize - (BufferCount * 22);
- int ProblemLow = ProblemHigh - 21;
- if ((ProblemLow <= Remainder) && (Remainder <= ProblemHigh))
- {
- BufferKBs++;
- }
- else
- {
- break;
- }
- }
- while (true);
- BIO_new_bio_pair(&m_ibio, BufferSize, &m_nbio, BufferSize);
- if (!m_sslbio || !m_nbio || !m_ibio)
- {
- ResetSslSession();
- return SSL_FAILURE_INITSSL;
- }
- m_Tools = tools;
- m_Tools->SetupSsl(m_ssl);
- //Init SSL connection
- void *ssl_sessionid = NULL;
- m_Main = main;
- m_sessionreuse = sessionreuse;
- if ((m_Main != NULL) && m_sessionreuse)
- {
- TGuard Guard(m_Main->m_CriticalSection.get());
- if (m_Main->m_sessionidSerialized == NULL)
- {
- DebugFail();
- SSL_set_session(m_ssl, NULL);
- }
- else if (!m_Main->m_sessionreuse_failed)
- {
- // This is what Python SSL module does, instead of directly using SSL_SESSION of the other session,
- // claiming a bug in OpenSSL 1.1.1 and newer. See PySSL_get_session/PySSL_set_session.
- // OpenSSL refutes this as a bug in Python session handling.
- // https://github.com/openssl/openssl/issues/1550
- // But it works for us too.
- // For alternative (better) API, see
- // https://github.com/notroj/neon/pull/203/commits/36c918a66691ed1a40ab512821aa8c278081818f
- const unsigned char * P = m_Main->m_sessionidSerialized;
- SSL_SESSION * Session = DebugNotNull(d2i_SSL_SESSION(NULL, &P, m_Main->m_sessionidSerializedLen));
- if (!SSL_set_session(m_ssl, Session))
- {
- LogSocketMessageRaw(FZ_LOG_INFO, L"SSL_set_session failed");
- return SSL_FAILURE_INITSSL;
- }
- LogSocketMessageRaw(FZ_LOG_INFO, L"Trying reuse main TLS session ID");
- }
- else
- {
- LogSocketMessageRaw(FZ_LOG_INFO, L"Main TLS session ID was not reused previously, not trying again");
- SSL_set_session(m_ssl, NULL);
- }
- }
- else
- {
- SSL_set_session(m_ssl, NULL);
- }
- if (clientMode)
- {
- SSL_set_connect_state(m_ssl);
- }
- else
- {
- SSL_set_accept_state(m_ssl);
- }
- SSL_set_bio(m_ssl, m_ibio, m_ibio);
- BIO_ctrl(m_sslbio, BIO_C_SET_SSL, BIO_NOCLOSE, m_ssl);
- BIO_read(m_sslbio, (void *)1, 0);
- // Trigger FD_WRITE so that we can initialize SSL negotiation
- if (GetLayerState() == connected || GetLayerState() == attached)
- {
- TriggerEvent(FD_READ, 0);
- TriggerEvent(FD_WRITE, 0);
- TriggerEvent(FD_READ, 0, TRUE);
- TriggerEvent(FD_WRITE, 0, TRUE);
- }
- m_bUseSSL = true;
- return 0;
- }
- void CAsyncSslSocketLayer::ResetSslSession()
- {
- if (m_pRetrySendBuffer)
- {
- delete [] m_pRetrySendBuffer;
- m_pRetrySendBuffer = 0;
- }
- m_bFailureSent = FALSE;
- m_bBlocking = FALSE;
- m_nSslAsyncNotifyId++;
- m_nNetworkError = 0;
- m_bUseSSL = FALSE;
- m_nVerificationResult = 0;
- m_nVerificationDepth = 0;
- m_bSslEstablished = FALSE;
- if (m_sslbio)
- {
- BIO_free(m_sslbio);
- }
- if (m_ssl)
- {
- SSL_set_session(m_ssl,NULL);
- }
- if (m_nbio)
- {
- BIO_free(m_nbio);
- }
- if (m_ibio)
- {
- BIO_free(m_ibio);
- }
- m_nNetworkSendBufferLen = 0;
- m_nbio = 0;
- m_ibio = 0;
- m_sslbio = 0;
- if (m_ssl)
- {
- SSL_free(m_ssl);
- }
- TGuard Guard(m_sCriticalSection.get());
- if (m_ssl_ctx)
- {
- SSL_CTX_free(m_ssl_ctx);
- m_ssl_ctx = 0;
- }
- m_ssl = 0;
- t_SslLayerList *cur = m_pSslLayerList;
- if (!cur)
- {
- return;
- }
- if (cur->pLayer == this)
- {
- m_pSslLayerList = cur->pNext;
- delete cur;
- }
- else
- while (cur->pNext)
- {
- if (cur->pNext->pLayer == this)
- {
- t_SslLayerList *tmp = cur->pNext;
- cur->pNext = cur->pNext->pNext;
- delete tmp;
- return;
- }
- cur = cur->pNext;
- }
- SetSession(NULL);
- m_sessionreuse = true;
- m_sessionreuse_failed = false;
- }
- bool CAsyncSslSocketLayer::IsUsingSSL()
- {
- return m_bUseSSL;
- }
- BOOL CAsyncSslSocketLayer::ShutDown(int nHow /*=sends*/)
- {
- if (m_bUseSSL)
- {
- if (m_pRetrySendBuffer)
- {
- if (!m_nShutDown)
- m_nShutDown = 1;
- WSASetLastError(WSAEWOULDBLOCK);
- return false;
- }
- if (!m_bSslEstablished)
- {
- m_mayTriggerWriteUp = true;
- ::SetLastError(WSAEWOULDBLOCK);
- return false;
- }
- if (!m_nShutDown)
- m_nShutDown = 1;
- else
- {
- if (ShutDownComplete())
- return ShutDownNext();
- else
- {
- TriggerEvents();
- WSASetLastError(WSAEWOULDBLOCK);
- return false;
- }
- }
- int res = SSL_shutdown(m_ssl);
- if (res == 0)
- {
- // Without bi-directional shutdown, file uploads are incomplete on some servers
- res = SSL_shutdown(m_ssl);
- int completeShutdown = GetSocketOptionVal(OPTION_MPEXT_COMPLETE_TLS_SHUTDOWN);
- if ((completeShutdown < 0) ||
- ((completeShutdown == 0) && (SSL_version(m_ssl) <= TLS1_2_VERSION)))
- {
- LogSocketMessageRaw(FZ_LOG_INFO, L"Not waiting for complete TLS shutdown");
- res = 0;
- }
- }
- if (res >= 0)
- {
- if (ShutDownComplete())
- return ShutDownNext();
- else
- {
- TriggerEvents();
- WSASetLastError(WSAEWOULDBLOCK);
- return FALSE;
- }
- }
- else
- {
- int error = SSL_get_error(m_ssl, -1);
- if (error == SSL_ERROR_WANT_READ || error == SSL_ERROR_WANT_WRITE)
- {
- // retry shutdown later
- m_nShutDown = 0;
- TriggerEvents();
- WSASetLastError(WSAEWOULDBLOCK);
- return FALSE;
- }
- else if (ShutDownComplete())
- return ShutDownNext();
- else
- {
- TriggerEvents();
- WSASetLastError(WSAEWOULDBLOCK);
- return FALSE;
- }
- }
- }
- else
- {
- if (!m_nShutDown)
- m_nShutDown = 1;
- return ShutDownNext(nHow);
- }
- }
- BOOL CAsyncSslSocketLayer::ShutDownComplete()
- {
- //If a ShutDown was issued, has the connection already been shut down?
- if (!m_nShutDown)
- return FALSE;
- else if (!m_bUseSSL)
- return FALSE;
- else if (m_nNetworkSendBufferLen)
- return FALSE;
- else if (m_pRetrySendBuffer)
- return FALSE;
- // Empty read buffer
- char buffer[1000];
- int numread;
- do
- {
- numread = BIO_read(m_sslbio, buffer, 1000);
- } while (numread > 0);
- size_t pending = BIO_ctrl_pending(m_nbio);
- if (pending)
- {
- return FALSE;
- }
- else
- {
- return TRUE;
- }
- }
- void CAsyncSslSocketLayer::LogSslError(const SSL *s, const char * str, const char * fmt, int nMessageType, char * debug)
- {
- USES_CONVERSION;
- const char * StateString = SSL_state_string_long(s);
- if ((strcmp(StateString, "error") != 0) || (debug != NULL))
- {
- char * buffer = new char[4096 + ((debug != NULL) ? strlen(debug) : 0)];
- sprintf(buffer, fmt, str, StateString);
- if (debug != NULL)
- {
- sprintf(buffer + strlen(buffer), " [%s]", debug);
- OPENSSL_free(debug);
- }
- LogSocketMessageRaw(nMessageType, A2T(buffer));
- delete[] buffer;
- }
- }
- void CAsyncSslSocketLayer::apps_ssl_info_callback(const SSL *s, int where, int ret)
- {
- USES_CONVERSION;
- CAsyncSslSocketLayer *pLayer = 0;
- {
- TGuard Guard(m_sCriticalSection.get());
- t_SslLayerList *cur = m_pSslLayerList;
- while (cur)
- {
- if (cur->pLayer->m_ssl == s)
- break;
- cur = cur->pNext;
- }
- if (!cur)
- {
- MessageBox(0, L"Can't lookup TLS session!", L"Critical error", MB_ICONEXCLAMATION);
- return;
- }
- else
- pLayer = cur->pLayer;
- }
- // Called while unloading?
- if (!pLayer->m_bUseSSL && (where != SSL_CB_LOOP))
- return;
- const char * str;
- int w;
- w = where& ~SSL_ST_MASK;
- if (w & SSL_ST_CONNECT)
- {
- str = "TLS connect";
- }
- else if (w & SSL_ST_ACCEPT)
- str = "TLS accept";
- else
- str = "Undefined";
- if (where & SSL_CB_LOOP)
- {
- char* debug = NULL;
- // exact SSL_CB_LOOP is abused for debugging
- if (where == SSL_CB_LOOP)
- {
- debug = reinterpret_cast<char*>(ret);
- }
- pLayer->LogSslError(s, str, "%s: %s", FZ_LOG_INFO, debug);
- }
- else if (where & SSL_CB_ALERT)
- {
- str=(where & SSL_CB_READ)? "read" : "write";
- const char* desc = SSL_alert_desc_string_long(ret);
- // Don't send close notify warning
- if (desc)
- {
- if (strcmp(desc, "close notify"))
- {
- char *buffer = new char[4096];
- sprintf(buffer, "SSL3 alert %s: %s: %s",
- str,
- SSL_alert_type_string_long(ret),
- desc);
- pLayer->LogSocketMessageRaw(FZ_LOG_WARNING, A2T(buffer));
- pLayer->PrintLastErrorMsg();
- delete [] buffer;
- }
- }
- }
- else if (where & SSL_CB_EXIT)
- {
- bool SendFailure = false;
- if (ret == 0)
- {
- pLayer->LogSslError(s, str, "%s: failed in %s", FZ_LOG_WARNING);
- pLayer->PrintLastErrorMsg();
- SendFailure = true;
- }
- else if (ret < 0)
- {
- int error = SSL_get_error(s,ret);
- if (error != SSL_ERROR_WANT_READ && error != SSL_ERROR_WANT_WRITE)
- {
- pLayer->LogSslError(s, str, "%s: error in %s", FZ_LOG_WARNING);
- pLayer->PrintLastErrorMsg();
- SendFailure = true;
- }
- }
- if (SendFailure && !pLayer->m_bFailureSent)
- {
- pLayer->m_bFailureSent = TRUE;
- pLayer->DoLayerCallback(LAYERCALLBACK_LAYERSPECIFIC, SSL_FAILURE, pLayer->m_bSslEstablished ? SSL_FAILURE_UNKNOWN : SSL_FAILURE_ESTABLISH);
- }
- }
- if (where & SSL_CB_HANDSHAKE_DONE)
- {
- // For 1.2 and older, session is always established at this point.
- // For 1.3, session can be restarted later, so this is handled in NewSessionCallback.
- // But at least with Cerberus server, it is not, so if we want to have "reuse" logged, we need to do it here.
- SSL_SESSION * sessionid = SSL_get1_session(pLayer->m_ssl);
- if (!pLayer->HandleSession(sessionid))
- {
- SSL_SESSION_free(sessionid);
- }
- int error = SSL_get_verify_result(pLayer->m_ssl);
- pLayer->DoLayerCallback(LAYERCALLBACK_LAYERSPECIFIC, SSL_VERIFY_CERT, error);
- pLayer->m_bBlocking = TRUE;
- }
- }
- bool AsnTimeToValidTime(ASN1_TIME * AsnTime, t_SslCertData::t_validTime & ValidTime)
- {
- int i = AsnTime->length;
- const char * v = (const char *)AsnTime->data;
- if (i < 10)
- {
- return FALSE;
- }
- for (int i2 = 0; i2 < 10; i2++)
- {
- if ((v[i2] > '9') || (v[i2] < '0'))
- {
- return FALSE;
- }
- }
- if (AsnTime->type == V_ASN1_UTCTIME)
- {
- ValidTime.y= (v[0]-'0')*10+(v[1]-'0');
- if (ValidTime.y < 50) ValidTime.y+=100;
- ValidTime.y += 1900;
- v += 2;
- i -= 2;
- }
- else if (AsnTime->type == V_ASN1_GENERALIZEDTIME)
- {
- if (i < 12)
- {
- return FALSE;
- }
- ValidTime.y = (v[0]-'0')*1000+(v[1]-'0')*100 + (v[2]-'0')*10+(v[3]-'0');
- v += 4;
- i -= 4;
- }
- else
- {
- return FALSE;
- }
- ValidTime.M = (v[0]-'0')*10+(v[1]-'0');
- if ((ValidTime.M > 12) || (ValidTime.M < 1))
- {
- return FALSE;
- }
- ValidTime.d = (v[2]-'0')*10+(v[3]-'0');
- ValidTime.h = (v[4]-'0')*10+(v[5]-'0');
- ValidTime.m = (v[6]-'0')*10+(v[7]-'0');
- if ((i >= 10) &&
- (v[8] >= '0') && (v[8] <= '9') &&
- (v[9] >= '0') && (v[9] <= '9'))
- {
- ValidTime.s = (v[8]-'0')*10+(v[9]-'0');
- }
- else
- {
- ValidTime.s = 0;
- }
- return TRUE;
- }
- BOOL CAsyncSslSocketLayer::GetPeerCertificateData(t_SslCertData &SslCertData, LPCTSTR & Error)
- {
- X509 *pX509=SSL_get_peer_certificate(m_ssl);
- if (!pX509)
- {
- Error = L"Cannot get certificate";
- return FALSE;
- }
- //Reset the contents of SslCertData
- memset(&SslCertData, 0, sizeof(t_SslCertData));
- //Set subject data fields
- X509_NAME *pX509Name=X509_get_subject_name(pX509);
- if (pX509Name)
- {
- int count=X509_NAME_entry_count(pX509Name);
- for (int i=0;i<count;i++)
- {
- X509_NAME_ENTRY *pX509NameEntry=X509_NAME_get_entry(pX509Name,i);
- if (!pX509NameEntry)
- continue;
- ASN1_OBJECT *pObject = X509_NAME_ENTRY_get_object(pX509NameEntry);
- ASN1_STRING *pString = X509_NAME_ENTRY_get_data(pX509NameEntry);
- CString str;
- unsigned char *out;
- int len = ASN1_STRING_to_UTF8(&out, pString);
- if (len > 0)
- {
- // Keep it huge
- LPWSTR unicode = new WCHAR[len * 10];
- memset(unicode, 0, sizeof(WCHAR) * len * 10);
- int unicodeLen = MultiByteToWideChar(CP_UTF8, 0, (const char *)out, len, unicode, len * 10);
- if (unicodeLen > 0)
- {
- #ifdef _UNICODE
- str = unicode;
- #else
- LPSTR ansi = new CHAR[len * 10];
- memset(ansi, 0, sizeof(CHAR) * len * 10);
- int ansiLen = WideCharToMultiByte(CP_ACP, 0, unicode, unicodeLen, ansi, len * 10, 0, 0);
- if (ansiLen > 0)
- str = ansi;
- delete [] ansi;
- #endif
- }
- delete [] unicode;
- OPENSSL_free(out);
- }
- switch(OBJ_obj2nid(pObject))
- {
- case NID_organizationName:
- _tcsncpy(SslCertData.subject.Organization, str, 255);
- SslCertData.subject.Organization[255] = 0;
- break;
- case NID_organizationalUnitName:
- _tcsncpy(SslCertData.subject.Unit, str, 255);
- SslCertData.subject.Unit[255] = 0;
- break;
- case NID_commonName:
- _tcsncpy(SslCertData.subject.CommonName, str, 255);
- SslCertData.subject.CommonName[255] = 0;
- break;
- case NID_pkcs9_emailAddress:
- _tcsncpy(SslCertData.subject.Mail, str, 255);
- SslCertData.subject.Mail[255] = 0;
- break;
- case NID_countryName:
- _tcsncpy(SslCertData.subject.Country, str, 255);
- SslCertData.subject.Country[255] = 0;
- break;
- case NID_stateOrProvinceName:
- _tcsncpy(SslCertData.subject.StateProvince, str, 255);
- SslCertData.subject.StateProvince[255] = 0;
- break;
- case NID_localityName:
- _tcsncpy(SslCertData.subject.Town, str, 255);
- SslCertData.subject.Town[255] = 0;
- break;
- default:
- if ( !OBJ_nid2sn(OBJ_obj2nid(pObject)) )
- {
- TCHAR tmp[20];
- _stprintf(tmp, L"%d", OBJ_obj2nid(pObject));
- int maxlen = 1024 - _tcslen(SslCertData.subject.Other)-1;
- _tcsncpy(SslCertData.subject.Other+_tcslen(SslCertData.subject.Other), tmp, maxlen);
- maxlen = 1024 - _tcslen(SslCertData.subject.Other)-1;
- _tcsncpy(SslCertData.subject.Other+_tcslen(SslCertData.subject.Other), L"=", maxlen);
- maxlen = 1024 - _tcslen(SslCertData.subject.Other)-1;
- _tcsncpy(SslCertData.subject.Other+_tcslen(SslCertData.subject.Other), str, maxlen);
- maxlen = 1024 - _tcslen(SslCertData.subject.Other)-1;
- _tcsncpy(SslCertData.subject.Other+_tcslen(SslCertData.subject.Other), L";", maxlen);
- }
- else
- {
- int maxlen = 1024 - _tcslen(SslCertData.subject.Other)-1;
- USES_CONVERSION;
- _tcsncpy(SslCertData.subject.Other+_tcslen(SslCertData.subject.Other), A2CT(OBJ_nid2sn(OBJ_obj2nid(pObject))), maxlen);
- maxlen = 1024 - _tcslen(SslCertData.subject.Other)-1;
- _tcsncpy(SslCertData.subject.Other+_tcslen(SslCertData.subject.Other), L"=", maxlen);
- maxlen = 1024 - _tcslen(SslCertData.subject.Other)-1;
- _tcsncpy(SslCertData.subject.Other+_tcslen(SslCertData.subject.Other), str, maxlen);
- maxlen = 1024 - _tcslen(SslCertData.subject.Other)-1;
- _tcsncpy(SslCertData.subject.Other+_tcslen(SslCertData.subject.Other), L";", maxlen);
- }
- break;
- }
- }
- }
- //Set issuer data fields
- pX509Name=X509_get_issuer_name(pX509);
- if (pX509Name)
- {
- int count=X509_NAME_entry_count(pX509Name);
- for (int i=0;i<count;i++)
- {
- X509_NAME_ENTRY *pX509NameEntry=X509_NAME_get_entry(pX509Name,i);
- if (!pX509NameEntry)
- continue;
- ASN1_STRING *pString=X509_NAME_ENTRY_get_data(pX509NameEntry);
- ASN1_OBJECT *pObject=X509_NAME_ENTRY_get_object(pX509NameEntry);
- CString str;
- unsigned char *out;
- int len = ASN1_STRING_to_UTF8(&out, pString);
- if (len > 0)
- {
- // Keep it huge
- LPWSTR unicode = new WCHAR[len * 10];
- memset(unicode, 0, sizeof(WCHAR) * len * 10);
- int unicodeLen = MultiByteToWideChar(CP_UTF8, 0, (const char *)out, len, unicode, len * 10);
- if (unicodeLen > 0)
- {
- #ifdef _UNICODE
- str = unicode;
- #else
- LPSTR ansi = new CHAR[len * 10];
- memset(ansi, 0, sizeof(CHAR) * len * 10);
- int ansiLen = WideCharToMultiByte(CP_ACP, 0, unicode, unicodeLen, ansi, len * 10, 0, 0);
- if (ansiLen > 0)
- str = ansi;
- delete [] ansi;
- #endif
- }
- delete [] unicode;
- OPENSSL_free(out);
- }
- switch(OBJ_obj2nid(pObject))
- {
- case NID_organizationName:
- _tcsncpy(SslCertData.issuer.Organization, str, 255);
- SslCertData.issuer.Organization[255] = 0;
- break;
- case NID_organizationalUnitName:
- _tcsncpy(SslCertData.issuer.Unit, str, 255);
- SslCertData.issuer.Unit[255] = 0;
- break;
- case NID_commonName:
- _tcsncpy(SslCertData.issuer.CommonName, str, 255);
- SslCertData.issuer.CommonName[255] = 0;
- break;
- case NID_pkcs9_emailAddress:
- _tcsncpy(SslCertData.issuer.Mail, str, 255);
- SslCertData.issuer.Mail[255] = 0;
- break;
- case NID_countryName:
- _tcsncpy(SslCertData.issuer.Country, str, 255);
- SslCertData.issuer.Country[255] = 0;
- break;
- case NID_stateOrProvinceName:
- _tcsncpy(SslCertData.issuer.StateProvince, str, 255);
- SslCertData.issuer.StateProvince[255] = 0;
- break;
- case NID_localityName:
- _tcsncpy(SslCertData.issuer.Town, str, 255);
- SslCertData.issuer.Town[255] = 0;
- break;
- default:
- if ( !OBJ_nid2sn(OBJ_obj2nid(pObject)) )
- {
- TCHAR tmp[20];
- _stprintf(tmp, L"%d", OBJ_obj2nid(pObject));
- int maxlen = 1024 - _tcslen(SslCertData.issuer.Other)-1;
- _tcsncpy(SslCertData.issuer.Other+_tcslen(SslCertData.issuer.Other), tmp, maxlen);
- maxlen = 1024 - _tcslen(SslCertData.issuer.Other)-1;
- _tcsncpy(SslCertData.issuer.Other+_tcslen(SslCertData.issuer.Other), L"=", maxlen);
- maxlen = 1024 - _tcslen(SslCertData.issuer.Other)-1;
- _tcsncpy(SslCertData.issuer.Other+_tcslen(SslCertData.issuer.Other), str, maxlen);
- maxlen = 1024 - _tcslen(SslCertData.issuer.Other)-1;
- _tcsncpy(SslCertData.issuer.Other+_tcslen(SslCertData.issuer.Other), L";", maxlen);
- }
- else
- {
- int maxlen = 1024 - _tcslen(SslCertData.issuer.Other)-1;
- USES_CONVERSION;
- _tcsncpy(SslCertData.issuer.Other+_tcslen(SslCertData.issuer.Other), A2CT(OBJ_nid2sn(OBJ_obj2nid(pObject))), maxlen);
- maxlen = 1024 - _tcslen(SslCertData.issuer.Other)-1;
- _tcsncpy(SslCertData.issuer.Other+_tcslen(SslCertData.issuer.Other), L"=", maxlen);
- maxlen = 1024 - _tcslen(SslCertData.issuer.Other)-1;
- _tcsncpy(SslCertData.issuer.Other+_tcslen(SslCertData.issuer.Other), str, maxlen);
- maxlen = 1024 - _tcslen(SslCertData.issuer.Other)-1;
- _tcsncpy(SslCertData.issuer.Other+_tcslen(SslCertData.issuer.Other), L";", maxlen);
- }
- break;
- }
- }
- }
- //Set date fields
- //Valid from
- ASN1_TIME *pTime=X509_getm_notBefore(pX509);
- if (!pTime)
- {
- X509_free(pX509);
- Error = L"Cannot get start time";
- return FALSE;
- }
- if (!AsnTimeToValidTime(pTime, SslCertData.validFrom))
- {
- X509_free(pX509);
- Error = L"Invalid start time";
- return FALSE;
- }
- //Valid until
- pTime = X509_getm_notAfter(pX509);
- if (!pTime)
- {
- X509_free(pX509);
- Error = L"Cannot get end time";
- return FALSE;
- }
- if (!AsnTimeToValidTime(pTime, SslCertData.validUntil))
- {
- X509_free(pX509);
- Error = L"Invalid end time";
- return FALSE;
- }
- int subjectAltNamePos = X509_get_ext_by_NID(pX509, NID_subject_alt_name, -1);
- if (subjectAltNamePos >= 0)
- {
- X509_EXTENSION * subjectAltNameExtension = X509_get_ext(pX509, subjectAltNamePos);
- BIO * subjectAltNameBio = BIO_new(BIO_s_mem());
- if (X509V3_EXT_print(subjectAltNameBio, subjectAltNameExtension, 0, 0) == 1)
- {
- USES_CONVERSION;
- u_char *data;
- int len = BIO_get_mem_data(subjectAltNameBio, &data);
- char * buf = new char[len + 1];
- memcpy(buf, data, len);
- buf[len] = '\0';
- _tcsncpy(SslCertData.subjectAltName, A2CT(buf), LENOF(SslCertData.subjectAltName));
- SslCertData.subjectAltName[LENOF(SslCertData.subjectAltName) - 1] = '\0';
- delete [] buf;
- }
- BIO_vfree(subjectAltNameBio);
- }
- unsigned int length;
- length = sizeof(SslCertData.hashSha1);
- X509_digest(pX509, EVP_sha1(), SslCertData.hashSha1, &length);
- DebugAssert(length == sizeof(SslCertData.hashSha1));
- length = sizeof(SslCertData.hashSha256);
- X509_digest(pX509, EVP_sha256(), SslCertData.hashSha256, &length);
- DebugAssert(length == sizeof(SslCertData.hashSha256));
- // Inspired by ne_ssl_cert_export()
- // Find the length of the DER encoding.
- SslCertData.certificateLen = i2d_X509(pX509, NULL);
- SslCertData.certificate = new unsigned char[SslCertData.certificateLen];
- unsigned char * p = SslCertData.certificate;
- i2d_X509(pX509, &p);
- SslCertData.priv_data = m_nSslAsyncNotifyId;
- X509_free(pX509);
- SslCertData.verificationResult = m_nVerificationResult;
- SslCertData.verificationDepth = m_nVerificationDepth;
- return TRUE;
- }
- std::string CAsyncSslSocketLayer::GetTlsVersionStr()
- {
- return m_TlsVersionStr;
- }
- std::string CAsyncSslSocketLayer::GetCipherName()
- {
- return m_CipherName;
- }
- void CAsyncSslSocketLayer::SetNotifyReply(int nID, int nCode, int result)
- {
- if (!m_bBlocking)
- return;
- if (nID != m_nSslAsyncNotifyId)
- return;
- if (nCode != SSL_VERIFY_CERT)
- return;
- m_bBlocking = FALSE;
- if (!result)
- {
- m_nNetworkError = WSAECONNABORTED;
- WSASetLastError(WSAECONNABORTED);
- if (!m_bFailureSent)
- {
- m_bFailureSent = TRUE;
- DoLayerCallback(LAYERCALLBACK_LAYERSPECIFIC, SSL_FAILURE, SSL_FAILURE_CERTREJECTED);
- }
- TriggerEvent(FD_CLOSE, 0, TRUE);
- return;
- }
- m_bSslEstablished = TRUE;
- PrintSessionInfo();
- DoLayerCallback(LAYERCALLBACK_LAYERSPECIFIC, SSL_INFO, SSL_INFO_ESTABLISHED);
- TriggerEvents();
- }
- void CAsyncSslSocketLayer::PrintSessionInfo()
- {
- const SSL_CIPHER *ciph;
- X509 *cert;
- ciph = SSL_get_current_cipher(m_ssl);
- char enc[4096] = {0};
- cert=SSL_get_peer_certificate(m_ssl);
- if (cert != NULL)
- {
- EVP_PKEY *pkey = X509_get_pubkey(cert);
- if (pkey != NULL)
- {
- if (0)
- ;
- #ifndef NO_RSA
- else if (EVP_PKEY_id(pkey) == EVP_PKEY_RSA)
- sprintf(enc, "%d bit RSA", EVP_PKEY_bits(pkey));
- #endif
- #ifndef NO_DSA
- else if (EVP_PKEY_id(pkey) == EVP_PKEY_DSA)
- sprintf(enc, "%d bit DSA", EVP_PKEY_bits(pkey));
- #endif
- EVP_PKEY_free(pkey);
- }
- X509_free(cert);
- /* The SSL API does not allow us to look at temporary RSA/DH keys,
- * otherwise we should print their lengths too */
- }
- const int buffer_size = 4096;
- char *buffer = new char[buffer_size];
- char *buffer2 = new char[buffer_size];
- // see also ne_ssl_get_version and ne_ssl_get_cipher
- m_TlsVersionStr = SSL_get_version(m_ssl);
- sprintf(buffer, "%s: %s, %s, %s",
- SSL_CIPHER_get_version(ciph),
- SSL_CIPHER_get_name(ciph),
- enc,
- SSL_CIPHER_description(ciph, buffer2, buffer_size));
- m_CipherName = buffer;
- // see TWebDAVFileSystem::CollectTLSSessionInfo()
- sprintf(buffer, "Using %s, cipher %s",
- m_TlsVersionStr.c_str(),
- m_CipherName.c_str());
- USES_CONVERSION;
- LogSocketMessageRaw(FZ_LOG_PROGRESS, A2T(buffer));
- delete [] buffer;
- delete [] buffer2;
- }
- void CAsyncSslSocketLayer::OnConnect(int nErrorCode)
- {
- if (m_bUseSSL && nErrorCode)
- TriggerEvent(FD_WRITE, 0);
- TriggerEvent(FD_CONNECT, nErrorCode, TRUE);
- }
- CAsyncSslSocketLayer * CAsyncSslSocketLayer::LookupLayer(SSL * Ssl)
- {
- CAsyncSslSocketLayer * Result = NULL;
- t_SslLayerList * Cur = NULL;
- {
- TGuard Guard(m_sCriticalSection.get());
- Cur = m_pSslLayerList;
- while (Cur != NULL)
- {
- if (Cur->pLayer->m_ssl == Ssl)
- {
- break;
- }
- Cur = Cur->pNext;
- }
- }
- if (Cur == NULL)
- {
- MessageBox(0, L"Can't lookup TLS session!", L"Critical error", MB_ICONEXCLAMATION);
- Result = NULL;
- }
- else
- {
- Result = Cur->pLayer;
- }
- return Result;
- }
- int CAsyncSslSocketLayer::verify_callback(int preverify_ok, X509_STORE_CTX *ctx)
- {
- X509 *err_cert;
- int err, depth;
- SSL *ssl;
- err_cert = X509_STORE_CTX_get_current_cert(ctx);
- err = X509_STORE_CTX_get_error(ctx);
- depth = X509_STORE_CTX_get_error_depth(ctx);
- /*
- * Retrieve the pointer to the SSL of the connection currently treated
- * and the application specific data stored into the SSL object.
- */
- ssl = (SSL *)X509_STORE_CTX_get_ex_data(ctx, SSL_get_ex_data_X509_STORE_CTX_idx());
- CAsyncSslSocketLayer * pLayer = LookupLayer(ssl);
- if (pLayer == NULL)
- {
- return 1;
- }
- /*
- * Catch a too long certificate chain. The depth limit set using
- * SSL_CTX_set_verify_depth() is by purpose set to "limit+1" so
- * that whenever the "depth>verify_depth" condition is met, we
- * have violated the limit and want to log this error condition.
- * We must do it here, because the CHAIN_TOO_LONG error would not
- * be found explicitly; only errors introduced by cutting off the
- * additional certificates would be logged.
- */
- if (depth > 10) {//mydata->verify_depth) {
- preverify_ok = 0;
- err = X509_V_ERR_CERT_CHAIN_TOO_LONG;
- X509_STORE_CTX_set_error(ctx, err);
- }
- if (!preverify_ok)
- {
- if (!pLayer->m_nVerificationResult)
- {
- pLayer->m_nVerificationDepth = depth;
- pLayer->m_nVerificationResult = err;
- }
- }
- return 1;
- }
- int CAsyncSslSocketLayer::ProvideClientCert(
- SSL * Ssl, X509 ** Certificate, EVP_PKEY ** PrivateKey)
- {
- CAsyncSslSocketLayer * Layer = LookupLayer(Ssl);
- CString Message;
- Message.LoadString(NEED_CLIENT_CERTIFICATE);
- int Level;
- int Result;
- if ((Layer->FCertificate == NULL) || (Layer->FPrivateKey == NULL))
- {
- Level = FZ_LOG_WARNING;
- Result = 0;
- }
- else
- {
- Level = FZ_LOG_PROGRESS;
- *Certificate = X509_dup(Layer->FCertificate);
- EVP_PKEY_up_ref(Layer->FPrivateKey);
- *PrivateKey = Layer->FPrivateKey;
- Result = 1;
- }
- Layer->LogSocketMessageRaw(Level, static_cast<LPCTSTR>(Message));
- return Result;
- }
- void CAsyncSslSocketLayer::SetClientCertificate(X509 * Certificate, EVP_PKEY * PrivateKey)
- {
- FCertificate = Certificate;
- FPrivateKey = PrivateKey;
- }
- BOOL CAsyncSslSocketLayer::SetCertStorage(CString file)
- {
- m_CertStorage = file;
- return TRUE;
- }
- void CAsyncSslSocketLayer::OnClose(int nErrorCode)
- {
- m_onCloseCalled = true;
- if (m_bUseSSL)
- {
- size_t pending = BIO_ctrl_pending(m_sslbio);
- if (pending > 0)
- {
- TriggerEvents();
- }
- else TriggerEvent(FD_CLOSE, nErrorCode, TRUE);
- }
- else
- TriggerEvent(FD_CLOSE, nErrorCode, TRUE);
- }
- void CAsyncSslSocketLayer::PrintLastErrorMsg()
- {
- unsigned long err = ERR_get_error();
- while (err)
- {
- USES_CONVERSION;
- unsigned long aerr = err;
- err = ERR_get_error();
- char *buffer = new char[512];
- ERR_error_string(aerr, buffer);
- LogSocketMessageRaw(FZ_LOG_PROGRESS, A2T(buffer));
- delete [] buffer;
- std::wstring CustomReason = m_Tools->CustomReason(aerr);
- if (!CustomReason.empty())
- {
- LogSocketMessageRaw(FZ_LOG_WARNING, CustomReason.c_str());
- }
- else
- {
- UnicodeString S = GetTlsErrorStr(aerr);
- LogSocketMessageRaw(FZ_LOG_WARNING, S.c_str());
- }
- }
- }
- void CAsyncSslSocketLayer::TriggerEvents()
- {
- size_t pending = BIO_ctrl_pending(m_nbio);
- if (pending > 0)
- {
- if (m_mayTriggerWrite)
- {
- m_mayTriggerWrite = false;
- TriggerEvent(FD_WRITE, 0);
- }
- }
- else if (!m_nNetworkSendBufferLen && m_bSslEstablished && !m_pRetrySendBuffer)
- {
- if (BIO_ctrl_get_write_guarantee(m_sslbio) > 0 && m_mayTriggerWriteUp)
- {
- m_mayTriggerWriteUp = false;
- TriggerEvent(FD_WRITE, 0, TRUE);
- }
- }
- if (m_bSslEstablished && BIO_ctrl_pending(m_sslbio) > 0)
- {
- if (m_mayTriggerReadUp && !m_bBlocking)
- {
- m_mayTriggerReadUp = false;
- TriggerEvent(FD_READ, 0, TRUE);
- }
- }
- else
- {
- int len = BIO_ctrl_get_write_guarantee(m_nbio);
- if (len > 0 && m_mayTriggerRead)
- {
- m_mayTriggerRead = false;
- TriggerEvent(FD_READ, 0);
- }
- }
- if (m_onCloseCalled && m_bSslEstablished)
- {
- if (BIO_ctrl_pending(m_sslbio) <= 0)
- {
- TriggerEvent(FD_CLOSE, 0, TRUE);
- }
- }
- }
- //---------------------------------------------------------------------------
|