1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332233323342335233623372338233923402341234223432344234523462347234823492350235123522353235423552356235723582359236023612362236323642365236623672368236923702371237223732374237523762377237823792380238123822383238423852386238723882389239023912392239323942395239623972398239924002401240224032404240524062407240824092410241124122413241424152416241724182419242024212422242324242425242624272428242924302431243224332434243524362437243824392440244124422443244424452446244724482449245024512452245324542455245624572458245924602461246224632464 |
- /* CAsyncSslSocketLayer by Tim Kosse
- mailto: [email protected])
- Version 2.0 (2005-02-27)
- -------------------------------------------------------------
- Introduction
- ------------
- CAsyncSslSocketLayer is a layer class for CAsyncSocketEx which allows you to establish SSL secured
- connections. Support for both client and server side is provided.
- How to use
- ----------
- Using this class is really simple. In the easiest case, just add an instance of
- CAsyncSslSocketLayer to your socket and call InitClientSsl after creation of the socket.
- This class only has a couple of public functions:
- - InitSSLConnection(bool clientMode);
- This functions establishes an SSL connection. The clientMode parameter specifies wether the SSL connection
- is in server or in client mode.
- Most likely you want to call this function right after calling Create for the socket.
- But sometimes, you'll need to call this function later. One example is for an FTP connection
- with explicit SSL: In this case you would have to call InitSSLConnection after receiving the reply
- to an 'AUTH SSL' command.
- - Is UsingSSL();
- Returns true if you've previously called InitClientSsl()
- - SetNotifyReply(SetNotifyReply(int nID, int nCode, int result);
- You can call this function only after receiving a layerspecific callback with the SSL_VERIFY_CERT
- id. Set result to 1 if you trust the certificate and 0 if you don't trust it.
- nID has to be the priv_data element of the t_SslCertData structure and nCode has to be SSL_VERIFY_CERT.
- - CreateSslCertificate(LPCTSTR filename, int bits, unsigned char* country, unsigned char* state,
- unsigned char* locality, unsigned char* organization, unsigned char* unit, unsigned char* cname,
- unsigned char *email, CString& err);
- Creates a new self-signed SSL certificate and stores it in the given file
- - SendRaw(const void* lpBuf, int nBufLen, int nFlags = 0)
- Sends a raw, unencrypted message. This may be useful after successful initialization to tell the other
- side that can use SSL.
- This layer sends some layerspecific notifications to your socket instance, you can handle them in
- OnLayerCallback of your socket class.
- Valid notification IDs are:
- - SSL_INFO 0
- There are two possible values for param2:
- SSL_INFO_ESTABLISHED 0 - You'll get this notification if the SSL negotiation was successful
- SSL_INFO_SHUTDOWNCOMPLETE 1 - You'll get this notification if the SSL connection has been shut
- down sucessfully. See below for details.
- - SSL_FAILURE 1
- This notification is sent if the SSL connection could not be established or if an existing
- connection failed. Valid values for param2 are:
- - SSL_FAILURE_UNKNOWN 0 - Details may have been sent with a SSL_VERBOSE_* notification.
- - SSL_FAILURE_ESTABLISH 1 - Problem during SSL negotiation
- - SSL_FAILURE_LOADDLLS 2
- - SSL_FAILURE_INITSSL 4
- - SSL_FAILURE_VERIFYCERT 8 - The remote SSL certificate was invalid
- - SSL_FAILURE_CERTREJECTED 16 - The remote SSL certificate was rejected by user
- - SSL_VERBOSE_WARNING 3
- SSL_VERBOSE_INFO 4
- This two notifications contain some additional information. The value given by param2 is a
- pointer to a null-terminated char string (char *) with some useful information.
- - SSL_VERIFY_CERT 2
- This notification is sent each time a remote certificate has to be verified.
- param2 is a pointer to a t_SslCertData structure which contains some information
- about the remote certificate.
- You have to set the reply to this message using the SetNotifyReply function.
-
- Be careful with closing the connection after sending data, not all data may have been sent already.
- Before closing the connection, you should call Shutdown() and wait for the SSL_INFO_SHUTDOWNCOMPLETE
- notification. This assures that all encrypted data really has been sent.
- License
- -------
- Feel free to use this class, as long as you don't claim that you wrote it
- and this copyright notice stays intact in the source files.
- If you want to use this class in a commercial application, a short message
- to [email protected] would be appreciated but is not required.
- This product includes software developed by the OpenSSL Project
- for use in the OpenSSL Toolkit. (http://www.openssl.org/)
- Version history
- ---------------
- Version 2.0:
- - Add server support
- - a lot of bug fixes
- */
- #include "stdafx.h"
- #include "AsyncSslSocketLayer.h"
- #if defined _DEBUG && defined _AFX
- #define new DEBUG_NEW
- #undef THIS_FILE
- static char THIS_FILE[] = __FILE__;
- #endif
- // Simple macro to declare function type and function pointer based on the
- // three given parametrs:
- // r - return type,
- // n - function name
- // a - argument list
- //
- // Example:
- // def(int, foo, (int x)) becomes the following:
- // typedef int (*tfoo)(int x);
- // static tfoo pfoo;
- #define def(r, n, a) \
- typedef r (*t##n) a; \
- static t##n p##n;
- // Macro to load the given macro from a dll:
- #ifdef MPEXT_NO_SSLDLL
- #include <openssl/err.h>
- #define load(dll, n) \
- p##n = n;
- #else
- #define load(dll, n) \
- p##n = (t##n) GetProcAddress(dll, #n); \
- if (!p##n) \
- bError = true;
- #endif
- //The following functions from the SSL libraries are used:
- def(int, SSL_state, (const SSL *s));
- def(const char*, SSL_state_string_long, (const SSL *s));
- def(void, SSL_set_info_callback, (SSL *ssl, void (*cb)(const SSL *ssl,int type,int val)));
- def(void, SSL_set_bio, (SSL *s, BIO *rbio, BIO *wbio));
- def(void, SSL_set_connect_state, (SSL *s));
- def(int, SSL_set_session, (SSL *to, SSL_SESSION *session));
- def(BIO_METHOD*, BIO_f_ssl, (void));
- def(SSL*, SSL_new, (SSL_CTX *ctx));
- #ifdef MPEXT
- def(SSL_CTX*, SSL_CTX_new, (const SSL_METHOD *meth));
- def(const SSL_METHOD*, SSLv23_method, (void));
- #else
- def(SSL_CTX*, SSL_CTX_new, (SSL_METHOD *meth));
- def(SSL_METHOD*, SSLv23_method, (void));
- #endif
- def(void, SSL_load_error_strings, (void));
- def(int, SSL_library_init, (void));
- def(void, SSL_CTX_free, (SSL_CTX *));
- def(void, SSL_free, (SSL *ssl));
- def(int, SSL_get_error, (const SSL *s, int retcode));
- def(int, SSL_shutdown, (SSL *s));
- def(int, SSL_get_shutdown, (const SSL *ssl));
- def(const char*, SSL_alert_type_string_long, (int value));
- def(const char*, SSL_alert_desc_string_long, (int value));
- def(void, SSL_CTX_set_verify, (SSL_CTX *ctx, int mode, int (*callback)(int, X509_STORE_CTX *)));
- def(X509_STORE*, SSL_CTX_get_cert_store, (const SSL_CTX *));
- def(long, SSL_get_verify_result, (const SSL *ssl));
- def(X509*, SSL_get_peer_certificate, (const SSL *s));
- def(const char*, SSL_get_version, (const SSL *ssl));
- #ifdef MPEXT
- def(const SSL_CIPHER*, SSL_get_current_cipher, (const SSL *ssl));
- #else
- def(SSL_CIPHER*, SSL_get_current_cipher, (const SSL *ssl));
- #endif
- def(const char*, SSL_CIPHER_get_name, (const SSL_CIPHER *cipher));
- def(char*, SSL_CIPHER_get_version, (const SSL_CIPHER *cipher));
- def(int, SSL_get_ex_data_X509_STORE_CTX_idx, (void));
- def(int, SSL_CTX_load_verify_locations, (SSL_CTX *ctx, const char *CAfile, const char *CApath));
- def(long, SSL_ctrl, (SSL *ssl, int cmd, long larg, void *parg));
- def(void, SSL_set_accept_state, (SSL *ssl));
- def(int, SSL_CTX_use_PrivateKey_file, (SSL_CTX *ctx, const char *file, int type));
- def(int, SSL_CTX_use_certificate_file, (SSL_CTX *ctx, const char *file, int type));
- def(int, SSL_CTX_check_private_key, (const SSL_CTX *ctx));
- def(void, SSL_CTX_set_default_passwd_cb, (SSL_CTX *ctx, pem_password_cb *cb));
- def(void, SSL_CTX_set_default_passwd_cb_userdata, (SSL_CTX *ctx, void *u));
- def(int, SSL_CTX_use_certificate_chain_file, (SSL_CTX *ctx, const char *file));
- def(size_t, BIO_ctrl_pending, (BIO *b));
- def(int, BIO_read, (BIO *b, void *data, int len));
- def(long, BIO_ctrl, (BIO *bp, int cmd, long larg, void *parg));
- def(int, BIO_write, (BIO *b, const void *data, int len));
- def(size_t, BIO_ctrl_get_write_guarantee, (BIO *b));
- def(int, BIO_new_bio_pair, (BIO **bio1, size_t writebuf1, BIO **bio2, size_t writebuf2));
- def(BIO*, BIO_new, (BIO_METHOD *type));
- def(int, BIO_free, (BIO *a));
- def(int, i2t_ASN1_OBJECT, (char *buf, int buf_len, ASN1_OBJECT *a));
- def(int, OBJ_obj2nid, (const ASN1_OBJECT *o));
- def(ASN1_OBJECT*, X509_NAME_ENTRY_get_object, (X509_NAME_ENTRY *ne));
- def(X509_NAME_ENTRY*, X509_NAME_get_entry, (X509_NAME *name, int loc));
- def(int, X509_NAME_entry_count, (X509_NAME *name));
- def(X509_NAME*, X509_get_subject_name, (X509 *a));
- def(X509_NAME*, X509_get_issuer_name, (X509 *a));
- def(const char*, OBJ_nid2sn, (int n));
- def(ASN1_STRING*, X509_NAME_ENTRY_get_data, (X509_NAME_ENTRY *ne));
- def(void, X509_STORE_CTX_set_error, (X509_STORE_CTX *ctx, int s));
- def(int, X509_digest, (const X509 *data, const EVP_MD *type, unsigned char *md, unsigned int *len));
- def(const EVP_MD*, EVP_sha1, (void));
- def(X509*, X509_STORE_CTX_get_current_cert, (X509_STORE_CTX *ctx));
- def(int, X509_STORE_CTX_get_error, (X509_STORE_CTX *ctx));
- def(void, X509_free, (X509 *a));
- def(EVP_PKEY*, X509_get_pubkey, (X509 *x));
- def(int, BN_num_bits, (const BIGNUM *a));
- def(void, EVP_PKEY_free, (EVP_PKEY *pkey));
- def(void*, X509_STORE_CTX_get_ex_data, (X509_STORE_CTX *ctx, int idx));
- def(char*, X509_NAME_oneline, (X509_NAME *a, char *buf, int size));
- def(const char*, X509_verify_cert_error_string, (long n));
- def(int, X509_STORE_CTX_get_error_depth, (X509_STORE_CTX *ctx));
- def(unsigned long, ERR_get_error, (void));
- #ifdef MPEXT
- def(char*, ERR_error_string, (unsigned long e, char *buf));
- #else
- def(const char*, ERR_error_string, (unsigned long e, char *buf));
- #endif
- def(int, ASN1_STRING_to_UTF8, (unsigned char **out, ASN1_STRING *in));
- def(void, CRYPTO_free, (void *p));
- def(RSA*, RSA_generate_key, (int bits, unsigned long e, void (*callback)(int,int,void *), void *cb_arg));
- def(int, X509_set_version, (X509 *x,long version));
- def(ASN1_TIME*, X509_gmtime_adj, (ASN1_TIME *s, long adj));
- def(int, X509_set_pubkey, (X509 *x, EVP_PKEY *pkey));
- def(int, X509_NAME_add_entry_by_txt, (X509_NAME *name, const char *field, int type, const unsigned char *bytes, int len, int loc, int set));
- def(int, X509_NAME_add_entry_by_NID, (X509_NAME *name, int nid, int type, unsigned char *bytes, int len, int loc, int set));
- def(int, X509_set_issuer_name, (X509 *x, X509_NAME *name));
- def(int, X509_sign, (X509 *x, EVP_PKEY *pkey, const EVP_MD *md));
- def(EVP_PKEY*, EVP_PKEY_new, (void));
- #ifdef MPEXT
- def(int, EVP_PKEY_assign, (EVP_PKEY *pkey, int type, void *key));
- #else
- def(int, EVP_PKEY_assign, (EVP_PKEY *pkey, int type, char *key));
- #endif
- def(X509*, X509_new, (void));
- def(int, ASN1_INTEGER_set, (ASN1_INTEGER *a, long v));
- def(ASN1_INTEGER*, X509_get_serialNumber, (X509 *x));
- #ifdef MPEXT
- def(int, PEM_ASN1_write_bio, (i2d_of_void *i2d,const char *name,BIO *bp,void *x, const EVP_CIPHER *enc,unsigned char *kstr,int klen, pem_password_cb *callback, void *u));
- #else
- def(int, PEM_ASN1_write_bio, (int (*i2d)(),const char *name,BIO *bp,char *x, const EVP_CIPHER *enc,unsigned char *kstr,int klen, pem_password_cb *callback, void *u));
- #endif
- def(int, i2d_X509, (X509 *x, unsigned char **out));
- def(BIO_METHOD *, BIO_s_mem, (void));
- def(int, i2d_PrivateKey, (EVP_PKEY *a, unsigned char **pp));
- // Critical section wrapper class
- #ifndef CCRITICALSECTIONWRAPPERINCLUDED
- class CCriticalSectionWrapper
- {
- public:
- CCriticalSectionWrapper()
- {
- m_bInitialized = TRUE;
- InitializeCriticalSection(&m_criticalSection);
- }
- ~CCriticalSectionWrapper()
- {
- if (m_bInitialized)
- DeleteCriticalSection(&m_criticalSection);
- m_bInitialized = FALSE;
- }
- void Lock()
- {
- if (m_bInitialized)
- EnterCriticalSection(&m_criticalSection);
- }
- void Unlock()
- {
- if (m_bInitialized)
- LeaveCriticalSection(&m_criticalSection);
- }
- protected:
- CRITICAL_SECTION m_criticalSection;
- BOOL m_bInitialized;
- };
- #define CCRITICALSECTIONWRAPPERINCLUDED
- #endif
- /////////////////////////////////////////////////////////////////////////////
- // CAsyncSslSocketLayer
- CCriticalSectionWrapper CAsyncSslSocketLayer::m_sCriticalSection;
- CAsyncSslSocketLayer::t_SslLayerList* CAsyncSslSocketLayer::m_pSslLayerList = 0;
- int CAsyncSslSocketLayer::m_nSslRefCount = 0;
- #ifndef MPEXT_NO_SSLDLL
- HMODULE CAsyncSslSocketLayer::m_hSslDll1 = 0;
- HMODULE CAsyncSslSocketLayer::m_hSslDll2 = 0;
- #endif
- std::map<SSL_CTX *, int> CAsyncSslSocketLayer::m_contextRefCount;
- CAsyncSslSocketLayer::CAsyncSslSocketLayer()
- {
- m_ssl = 0;
- m_sslbio = 0;
- m_ibio = 0;
- m_nbio = 0;
- m_ssl_ctx = 0;
- m_bUseSSL = false;
- m_bSslInitialized = FALSE;
- m_bSslEstablished = FALSE;
- m_nNetworkSendBufferLen = 0;
- m_nNetworkSendBufferMaxLen = 0;
- m_pNetworkSendBuffer = NULL;
- m_pRetrySendBuffer = 0;
- m_nRetrySendBufferLen = 0;
- m_nNetworkError = 0;
- m_nShutDown = 0;
- m_bBlocking = FALSE;
- m_nSslAsyncNotifyId = 0;
- m_bFailureSent = FALSE;
- m_nVerificationResult = 0;
- m_nVerificationDepth = 0;
- m_mayTriggerRead = true;
- m_mayTriggerWrite = true;
- m_mayTriggerReadUp = true;
- m_mayTriggerWriteUp = true;
- m_onCloseCalled = false;
- m_pKeyPassword = 0;
- m_Main = NULL;
- m_sessionid = NULL;
- m_sessionreuse = true;
- }
- CAsyncSslSocketLayer::~CAsyncSslSocketLayer()
- {
- UnloadSSL();
- delete [] m_pNetworkSendBuffer;
- delete [] m_pRetrySendBuffer;
- delete [] m_pKeyPassword;
- }
- int CAsyncSslSocketLayer::InitSSL()
- {
- if (m_bSslInitialized)
- return 0;
- m_sCriticalSection.Lock();
- if (!m_nSslRefCount)
- {
- #ifndef MPEXT_NO_SSLDLL
- m_hSslDll2=
- LoadLibrary(_T("libeay32.dll"));
- if (!m_hSslDll2)
- {
- if (m_hSslDll1)
- FreeLibrary(m_hSslDll1);
- m_hSslDll1=0;
- m_sCriticalSection.Unlock();
- return SSL_FAILURE_LOADDLLS;
- }
- bool bError = false;
- #endif
- load(m_hSslDll2, BIO_ctrl_pending);
- load(m_hSslDll2, BIO_ctrl_pending);
- load(m_hSslDll2, BIO_read);
- load(m_hSslDll2, BIO_ctrl);
- load(m_hSslDll2, BIO_write);
- load(m_hSslDll2, BIO_ctrl_get_write_guarantee);
- load(m_hSslDll2, BIO_new_bio_pair);
- load(m_hSslDll2, BIO_new);
- load(m_hSslDll2, BIO_free);
- load(m_hSslDll2, i2t_ASN1_OBJECT);
- load(m_hSslDll2, OBJ_obj2nid);
- load(m_hSslDll2, X509_NAME_ENTRY_get_object);
- load(m_hSslDll2, X509_NAME_get_entry);
- load(m_hSslDll2, X509_NAME_entry_count);
- load(m_hSslDll2, X509_get_subject_name);
- load(m_hSslDll2, X509_get_issuer_name);
- load(m_hSslDll2, OBJ_nid2sn);
- load(m_hSslDll2, X509_NAME_ENTRY_get_data);
- load(m_hSslDll2, X509_STORE_CTX_set_error);
- load(m_hSslDll2, X509_digest);
- load(m_hSslDll2, EVP_sha1);
- load(m_hSslDll2, X509_STORE_CTX_get_current_cert);
- load(m_hSslDll2, X509_STORE_CTX_get_error);
- load(m_hSslDll2, X509_free);
- load(m_hSslDll2, X509_get_pubkey);
- load(m_hSslDll2, BN_num_bits);
- load(m_hSslDll2, EVP_PKEY_free);
- load(m_hSslDll2, X509_STORE_CTX_get_ex_data);
- load(m_hSslDll2, X509_NAME_oneline);
- load(m_hSslDll2, X509_verify_cert_error_string);
- load(m_hSslDll2, X509_STORE_CTX_get_error_depth);
- load(m_hSslDll2, ERR_get_error);
- load(m_hSslDll2, ERR_error_string);
- load(m_hSslDll2, ASN1_STRING_to_UTF8);
- load(m_hSslDll2, CRYPTO_free);
- load(m_hSslDll2, RSA_generate_key);
- load(m_hSslDll2, X509_set_version);
- load(m_hSslDll2, X509_gmtime_adj);
- load(m_hSslDll2, X509_set_pubkey);
- load(m_hSslDll2, X509_NAME_add_entry_by_txt);
- load(m_hSslDll2, X509_NAME_add_entry_by_NID);
- load(m_hSslDll2, X509_set_issuer_name);
- load(m_hSslDll2, X509_sign);
- load(m_hSslDll2, EVP_PKEY_new);
- load(m_hSslDll2, EVP_PKEY_assign);
- load(m_hSslDll2, X509_new);
- load(m_hSslDll2, ASN1_INTEGER_set);
- load(m_hSslDll2, X509_get_serialNumber);
- load(m_hSslDll2, PEM_ASN1_write_bio);
- load(m_hSslDll2, i2d_X509);
- load(m_hSslDll2, BIO_s_mem);
- load(m_hSslDll2, i2d_PrivateKey);
- #ifndef MPEXT_NO_SSLDLL
- if (bError)
- {
- FreeLibrary(m_hSslDll1);
- m_hSslDll1 = 0;
- FreeLibrary(m_hSslDll2);
- m_hSslDll2 = 0;
- m_sCriticalSection.Unlock();
- return SSL_FAILURE_LOADDLLS;
- }
- m_hSslDll1 = LoadLibrary(_T("ssleay32.dll"));
- if (!m_hSslDll1)
- {
- if (m_hSslDll2)
- FreeLibrary(m_hSslDll2);
- m_hSslDll2 = NULL;
-
- m_sCriticalSection.Unlock();
- return SSL_FAILURE_LOADDLLS;
- }
- #endif
- load(m_hSslDll1, SSL_state_string_long);
- load(m_hSslDll1, SSL_state);
- load(m_hSslDll1, SSL_set_info_callback);
- load(m_hSslDll1, SSL_set_bio);
- load(m_hSslDll1, SSL_set_connect_state);
- load(m_hSslDll1, SSL_set_session);
- load(m_hSslDll1, BIO_f_ssl);
- load(m_hSslDll1, SSL_new);
- load(m_hSslDll1, SSL_CTX_new);
- load(m_hSslDll1, SSLv23_method);
- load(m_hSslDll1, SSL_load_error_strings);
- load(m_hSslDll1, SSL_library_init);
- load(m_hSslDll1, SSL_CTX_free);
- load(m_hSslDll1, SSL_free);
- load(m_hSslDll1, SSL_get_error);
- load(m_hSslDll1, SSL_shutdown);
- load(m_hSslDll1, SSL_get_shutdown);
- load(m_hSslDll1, SSL_alert_type_string_long);
- load(m_hSslDll1, SSL_alert_desc_string_long);
- load(m_hSslDll1, SSL_CTX_set_verify);
- load(m_hSslDll1, SSL_CTX_get_cert_store);
- load(m_hSslDll1, SSL_get_verify_result);
- load(m_hSslDll1, SSL_get_peer_certificate);
- load(m_hSslDll1, SSL_get_version);
- load(m_hSslDll1, SSL_get_current_cipher);
- load(m_hSslDll1, SSL_CIPHER_get_name);
- load(m_hSslDll1, SSL_CIPHER_get_version);
- load(m_hSslDll1, SSL_get_ex_data_X509_STORE_CTX_idx);
- load(m_hSslDll1, SSL_CTX_load_verify_locations);
- load(m_hSslDll1, SSL_ctrl);
- load(m_hSslDll1, SSL_set_accept_state);
- load(m_hSslDll1, SSL_CTX_use_PrivateKey_file);
- load(m_hSslDll1, SSL_CTX_use_certificate_file);
- load(m_hSslDll1, SSL_CTX_check_private_key);
- load(m_hSslDll1, SSL_CTX_set_default_passwd_cb_userdata);
- load(m_hSslDll1, SSL_CTX_set_default_passwd_cb);
- load(m_hSslDll1, SSL_CTX_use_certificate_chain_file);
- #ifndef MPEXT_NO_SSLDLL
- if (bError)
- {
- FreeLibrary(m_hSslDll1);
- m_hSslDll1=0;
- if (m_hSslDll2)
- FreeLibrary(m_hSslDll2);
- m_hSslDll2=0;
- m_sCriticalSection.Unlock();
- return SSL_FAILURE_LOADDLLS;
- }
- #endif
- pSSL_load_error_strings();
- if (!pSSL_library_init())
- {
- #ifndef MPEXT_NO_SSLDLL
- FreeLibrary(m_hSslDll1);
- m_hSslDll1=0;
- FreeLibrary(m_hSslDll2);
- m_hSslDll2=0;
- m_sCriticalSection.Unlock();
- #endif
- return SSL_FAILURE_INITSSL;
- }
- }
- m_nSslRefCount++;
- m_sCriticalSection.Unlock();
- m_bSslInitialized = true;
- return 0;
- }
- void CAsyncSslSocketLayer::OnReceive(int nErrorCode)
- {
- if (m_bUseSSL)
- {
- if (m_bBlocking)
- {
- m_mayTriggerRead = true;
- return;
- }
- if (m_nNetworkError)
- {
- return;
- }
- char buffer[16384];
- m_mayTriggerRead = false;
-
- //Get number of bytes we can receive and store in the network input bio
- int len = pBIO_ctrl_get_write_guarantee(m_nbio);
- if (len > 16384)
- len = 16384;
- else if (!len)
- {
- m_mayTriggerRead = true;
- TriggerEvents();
- return;
- }
-
- int numread = 0;
-
- // Receive data
- numread = ReceiveNext(buffer, len);
- if (numread > 0)
- {
- //Store it in the network input bio and process data
- int numwritten = pBIO_write(m_nbio, buffer, numread);
- pBIO_ctrl(m_nbio, BIO_CTRL_FLUSH, 0, NULL);
- // I have no idea why this call is needed, but without it, connections
- // will stall. Perhaps it triggers some internal processing.
- // Also, ignore return value, don't do any error checking. This function
- // can report errors, even though a later call can succeed.
- char buffer;
- pBIO_read(m_sslbio, &buffer, 0);
- }
- if (!numread)
- {
- if (GetLayerState() == connected)
- TriggerEvent(FD_CLOSE, nErrorCode, TRUE);
- }
- else if (numread == SOCKET_ERROR)
- {
- int nError = GetLastError();
- if (nError != WSAEWOULDBLOCK && nError != WSAENOTCONN)
- {
- m_nNetworkError = GetLastError();
- TriggerEvent(FD_CLOSE, 0, TRUE);
- return;
- }
- }
- if (m_pRetrySendBuffer)
- {
- int numwrite = pBIO_write(m_sslbio, m_pRetrySendBuffer, m_nRetrySendBufferLen);
- if (numwrite >= 0)
- {
- pBIO_ctrl(m_sslbio, BIO_CTRL_FLUSH, 0, NULL);
- delete [] m_pRetrySendBuffer;
- m_pRetrySendBuffer = 0;
- }
- else if (numwrite == -1)
- {
- if (!BIO_should_retry(m_sslbio))
- {
- delete [] m_pRetrySendBuffer;
- m_pRetrySendBuffer = 0;
- SetLastError(WSAECONNABORTED);
- TriggerEvent(FD_CLOSE, 0, TRUE);
- return;
- }
- }
- }
- if (!m_nShutDown && pSSL_get_shutdown(m_ssl))
- {
- size_t pending = pBIO_ctrl_pending(m_sslbio);
- if (pending <= 0)
- {
- if (ShutDown() || GetLastError() == WSAEWOULDBLOCK)
- {
- if (ShutDownComplete())
- TriggerEvent(FD_CLOSE, 0, TRUE);
- }
- else
- {
- m_nNetworkError = WSAECONNABORTED;
- WSASetLastError(WSAECONNABORTED);
- TriggerEvent(FD_CLOSE, WSAECONNABORTED, TRUE);
- }
- return;
- }
- }
- if (ShutDownComplete() && m_nShutDown == 1)
- {
- //Send shutdown notification if all pending data has been sent
- DoLayerCallback(LAYERCALLBACK_LAYERSPECIFIC, SSL_INFO, SSL_INFO_SHUTDOWNCOMPLETE);
- m_nShutDown++;
- }
- TriggerEvents();
- }
- else
- {
- TriggerEvent(FD_READ, nErrorCode, TRUE);
- }
- }
- void CAsyncSslSocketLayer::OnSend(int nErrorCode)
- {
- if (m_bUseSSL)
- {
- if (m_nNetworkError)
- {
- return;
- }
- m_mayTriggerWrite = false;
- //Send data in the send buffer
- while (m_nNetworkSendBufferLen)
- {
- int numsent = SendNext(m_pNetworkSendBuffer, m_nNetworkSendBufferLen);
- if (numsent == SOCKET_ERROR)
- {
- int nError = GetLastError();
- if (nError != WSAEWOULDBLOCK && nError != WSAENOTCONN)
- {
- m_nNetworkError = nError;
- TriggerEvent(FD_CLOSE, 0, TRUE);
- }
- return;
- }
- else if (!numsent)
- {
- if (GetLayerState() == connected)
- TriggerEvent(FD_CLOSE, nErrorCode, TRUE);
- }
- if (numsent == m_nNetworkSendBufferLen)
- m_nNetworkSendBufferLen = 0;
- else
- {
- memmove(m_pNetworkSendBuffer, m_pNetworkSendBuffer + numsent, m_nNetworkSendBufferLen - numsent);
- m_nNetworkSendBufferLen -= numsent;
- }
- }
- //Send the data waiting in the network bio
- char buffer[16384];
- size_t len = pBIO_ctrl_pending(m_nbio);
- int numread = pBIO_read(m_nbio, buffer, len);
- if (numread <= 0)
- m_mayTriggerWrite = true;
- while (numread > 0)
- {
- int numsent = SendNext(buffer, numread);
- if (!numsent)
- {
- if (GetLayerState() == connected)
- TriggerEvent(FD_CLOSE, nErrorCode, TRUE);
- }
- if (numsent == SOCKET_ERROR || numsent < numread)
- {
- if (numsent == SOCKET_ERROR)
- if (GetLastError() != WSAEWOULDBLOCK && GetLastError() != WSAENOTCONN)
- {
- m_nNetworkError = GetLastError();
- TriggerEvent(FD_CLOSE, 0, TRUE);
- return;
- }
- else
- numsent = 0;
- // Add all data that was retrieved from the network bio but could not be sent to the send buffer.
- if (m_nNetworkSendBufferMaxLen < (m_nNetworkSendBufferLen + numread - numsent))
- {
- char * tmp = m_pNetworkSendBuffer;
- m_nNetworkSendBufferMaxLen = static_cast<int>((m_nNetworkSendBufferLen + numread - numsent) * 1.5);
- m_pNetworkSendBuffer = new char[m_nNetworkSendBufferMaxLen];
- if (tmp)
- {
- memcpy(m_pNetworkSendBuffer, tmp, m_nNetworkSendBufferLen);
- delete [] tmp;
- }
- }
- ASSERT(m_pNetworkSendBuffer);
- memcpy(m_pNetworkSendBuffer + m_nNetworkSendBufferLen, buffer, numread-numsent);
- m_nNetworkSendBufferLen += numread - numsent;
- }
- if (!numsent)
- break;
- len = pBIO_ctrl_pending(m_nbio);
- if (!len)
- {
- m_mayTriggerWrite = true;
- break;
- }
- numread = pBIO_read(m_nbio, buffer, len);
- if (numread <= 0)
- m_mayTriggerWrite = true;
- }
- if (m_pRetrySendBuffer)
- {
- int numwrite = pBIO_write(m_sslbio, m_pRetrySendBuffer, m_nRetrySendBufferLen);
- if (numwrite >= 0)
- {
- pBIO_ctrl(m_sslbio, BIO_CTRL_FLUSH, 0, NULL);
- delete [] m_pRetrySendBuffer;
- m_pRetrySendBuffer = 0;
- }
- else if (numwrite == -1)
- {
- if (!BIO_should_retry(m_sslbio))
- {
- delete [] m_pRetrySendBuffer;
- m_pRetrySendBuffer = 0;
- SetLastError(WSAECONNABORTED);
- TriggerEvent(FD_CLOSE, 0, TRUE);
- return;
- }
- }
- }
- // No more data available, ask for more.
- TriggerEvents();
- if (m_nShutDown == 1 && ShutDownComplete())
- {
- //Send shutdown notification if all pending data has been sent
- DoLayerCallback(LAYERCALLBACK_LAYERSPECIFIC, SSL_INFO, SSL_INFO_SHUTDOWNCOMPLETE);
- m_nShutDown++;
- }
- }
- else
- TriggerEvent(FD_WRITE, nErrorCode, TRUE);
- }
- int CAsyncSslSocketLayer::Send(const void* lpBuf, int nBufLen, int nFlags)
- {
- if (m_bUseSSL)
- {
- if (!lpBuf)
- {
- return 0;
- }
- if (m_bBlocking || m_pRetrySendBuffer)
- {
- m_mayTriggerWriteUp = true;
- SetLastError(WSAEWOULDBLOCK);
- return SOCKET_ERROR;
- }
- if (m_nNetworkError)
- {
- SetLastError(m_nNetworkError);
- return SOCKET_ERROR;
- }
- if (m_nShutDown)
- {
- SetLastError(WSAESHUTDOWN);
- return SOCKET_ERROR;
- }
- if (!m_bSslEstablished)
- {
- m_mayTriggerWriteUp = true;
- SetLastError(WSAEWOULDBLOCK);
- return SOCKET_ERROR;
- }
- if (!nBufLen)
- {
- return 0;
- }
- if (m_onCloseCalled)
- {
- TriggerEvent(FD_CLOSE, 0, TRUE);
- return 0;
- }
- int len = pBIO_ctrl_get_write_guarantee(m_sslbio);
- if (nBufLen > len)
- nBufLen = len;
- if (!len)
- {
- m_mayTriggerWriteUp = true;
- TriggerEvents();
- SetLastError(WSAEWOULDBLOCK);
- }
- m_pRetrySendBuffer = new char[nBufLen];
- m_nRetrySendBufferLen = nBufLen;
- memcpy(m_pRetrySendBuffer, lpBuf, nBufLen);
- int numwrite = pBIO_write(m_sslbio, m_pRetrySendBuffer, m_nRetrySendBufferLen);
- if (numwrite >= 0)
- {
- pBIO_ctrl(m_sslbio, BIO_CTRL_FLUSH, 0, NULL);
- delete [] m_pRetrySendBuffer;
- m_pRetrySendBuffer = 0;
- }
- else if (numwrite == -1)
- {
- if (BIO_should_retry(m_sslbio))
- {
- if (GetLayerState() == closed)
- {
- return 0;
- }
- else if (GetLayerState() != connected)
- {
- SetLastError(m_nNetworkError);
- return SOCKET_ERROR;
- }
- TriggerEvents();
- return nBufLen;
- }
- else
- {
- delete [] m_pRetrySendBuffer;
- m_pRetrySendBuffer = 0;
- SetLastError(WSAECONNABORTED);
- }
- return SOCKET_ERROR;
- }
- m_mayTriggerWriteUp = true;
- TriggerEvents();
- return numwrite;
- }
- else
- {
- return SendNext(lpBuf, nBufLen, nFlags);
- }
- }
- int CAsyncSslSocketLayer::Receive(void* lpBuf, int nBufLen, int nFlags)
- {
- if (m_bUseSSL)
- {
- if (m_bBlocking)
- {
- m_mayTriggerReadUp = true;
- SetLastError(WSAEWOULDBLOCK);
- return SOCKET_ERROR;
- }
- if (m_nNetworkError)
- {
- size_t pending = pBIO_ctrl_pending(m_sslbio);
- if (pending && !m_nShutDown)
- {
- m_mayTriggerReadUp = true;
- TriggerEvents();
- return pBIO_read(m_sslbio, lpBuf,nBufLen);
- }
- WSASetLastError(m_nNetworkError);
- return SOCKET_ERROR;
- }
- if (m_nShutDown)
- {
- SetLastError(WSAESHUTDOWN);
- return SOCKET_ERROR;
- }
- if (!nBufLen)
- {
- return 0;
- }
- size_t pending = pBIO_ctrl_pending(m_sslbio);
- if (!pending)
- {
- if (GetLayerState() == closed)
- {
- return 0;
- }
- if (m_onCloseCalled)
- {
- TriggerEvent(FD_CLOSE, 0, TRUE);
- return 0;
- }
- else if (GetLayerState() != connected)
- {
- SetLastError(m_nNetworkError);
- return SOCKET_ERROR;
- }
- else
- {
- if (pSSL_get_shutdown(m_ssl))
- {
- if (ShutDown() || GetLastError() == WSAEWOULDBLOCK)
- {
- if (ShutDownComplete())
- {
- TriggerEvent(FD_CLOSE, 0, TRUE);
- return 0;
- }
- else
- WSASetLastError(WSAEWOULDBLOCK);
- }
- else
- {
- m_nNetworkError = WSAECONNABORTED;
- WSASetLastError(WSAECONNABORTED);
- TriggerEvent(FD_CLOSE, WSAECONNABORTED, TRUE);
- }
- return SOCKET_ERROR;
- }
- }
- m_mayTriggerReadUp = true;
- TriggerEvents();
- SetLastError(WSAEWOULDBLOCK);
- return SOCKET_ERROR;
- }
- int numread = pBIO_read(m_sslbio, lpBuf, nBufLen);
- if (!numread)
- {
- if (pSSL_get_shutdown(m_ssl))
- {
- if (ShutDown() || GetLastError() == WSAEWOULDBLOCK)
- {
- if (ShutDownComplete())
- {
- TriggerEvent(FD_CLOSE, 0, TRUE);
- return 0;
- }
- else
- WSASetLastError(WSAEWOULDBLOCK);
- }
- else
- {
- m_nNetworkError = WSAECONNABORTED;
- WSASetLastError(WSAECONNABORTED);
- TriggerEvent(FD_CLOSE, WSAECONNABORTED, TRUE);
- }
- return SOCKET_ERROR;
- }
- m_mayTriggerReadUp = true;
- TriggerEvents();
- SetLastError(WSAEWOULDBLOCK);
- return SOCKET_ERROR;
- }
- if (numread < 0)
- {
- if (!BIO_should_retry(m_sslbio))
- {
- PrintLastErrorMsg();
- m_nNetworkError = WSAECONNABORTED;
- WSASetLastError(WSAECONNABORTED);
- TriggerEvent(FD_CLOSE, 0, TRUE);
- return SOCKET_ERROR;
- }
- else
- {
- if (pSSL_get_shutdown(m_ssl))
- {
- if (ShutDown() || GetLastError() == WSAEWOULDBLOCK)
- {
- if (ShutDownComplete())
- {
- TriggerEvent(FD_CLOSE, 0, TRUE);
- return 0;
- }
- else
- WSASetLastError(WSAEWOULDBLOCK);
- }
- else
- {
- m_nNetworkError = WSAECONNABORTED;
- WSASetLastError(WSAECONNABORTED);
- TriggerEvent(FD_CLOSE, 0, TRUE);
- }
- return SOCKET_ERROR;
- }
- m_mayTriggerReadUp = true;
- TriggerEvents();
- SetLastError(WSAEWOULDBLOCK);
- return SOCKET_ERROR;
- }
- }
- m_mayTriggerReadUp = true;
- TriggerEvents();
- return numread;
- }
- else
- {
- return ReceiveNext(lpBuf, nBufLen, nFlags);
- }
- }
- void CAsyncSslSocketLayer::Close()
- {
- m_nShutDown = 0;
- m_onCloseCalled = false;
- ResetSslSession();
- CloseNext();
- }
- BOOL CAsyncSslSocketLayer::Connect(const SOCKADDR *lpSockAddr, int nSockAddrLen)
- {
- BOOL res = ConnectNext(lpSockAddr, nSockAddrLen);
- if (!res)
- if (GetLastError() != WSAEWOULDBLOCK)
- ResetSslSession();
- return res;
- }
- BOOL CAsyncSslSocketLayer::Connect(LPCTSTR lpszHostAddress, UINT nHostPort)
- {
- BOOL res = ConnectNext(lpszHostAddress, nHostPort);
- if (!res)
- if (GetLastError()!=WSAEWOULDBLOCK)
- ResetSslSession();
- return res;
- }
- int CAsyncSslSocketLayer::InitSSLConnection(bool clientMode,
- CAsyncSslSocketLayer* main, bool sessionreuse,
- int minTlsVersion, int maxTlsVersion,
- void* pSslContext /*=0*/)
- {
- if (m_bUseSSL)
- return 0;
- int res = InitSSL();
- if (res)
- return res;
- m_sCriticalSection.Lock();
- if ((SSL_CTX*)pSslContext)
- {
- if (m_ssl_ctx)
- {
- m_sCriticalSection.Unlock();
- ResetSslSession();
- return SSL_FAILURE_INITSSL;
- }
- #ifdef MPEXT
- std::map<SSL_CTX *, int>::iterator iter = m_contextRefCount.find((SSL_CTX*)pSslContext);
- #else
- std::map<SSL_CTX *, int>::iterator& iter = m_contextRefCount.find((SSL_CTX*)pSslContext);
- #endif
- if (iter == m_contextRefCount.end() || iter->second < 1)
- {
- m_sCriticalSection.Unlock();
- ResetSslSession();
- return SSL_FAILURE_INITSSL;
- }
- m_ssl_ctx = (SSL_CTX*)pSslContext;
- iter->second++;
- }
- else if (!m_ssl_ctx)
- {
- // Create new context if none given
- if (!(m_ssl_ctx = pSSL_CTX_new( pSSLv23_method())))
- {
- m_sCriticalSection.Unlock();
- ResetSslSession();
- return SSL_FAILURE_INITSSL;
- }
- m_contextRefCount[m_ssl_ctx] = 1;
- if (clientMode)
- {
- USES_CONVERSION;
- pSSL_CTX_set_verify(m_ssl_ctx, SSL_VERIFY_PEER, verify_callback);
- CFileStatus Dummy;
- if (CFile::GetStatus((LPCTSTR)m_CertStorage, Dummy))
- {
- pSSL_CTX_load_verify_locations(m_ssl_ctx, T2CA(m_CertStorage), 0);
- }
- }
- }
- //Create new SSL session
- if (!(m_ssl = pSSL_new(m_ssl_ctx)))
- {
- m_sCriticalSection.Unlock();
- ResetSslSession();
- return SSL_FAILURE_INITSSL;
- }
- //Add current instance to list of active instances
- t_SslLayerList *tmp = m_pSslLayerList;
- m_pSslLayerList = new t_SslLayerList;
- m_pSslLayerList->pNext = tmp;
- m_pSslLayerList->pLayer = this;
- m_sCriticalSection.Unlock();
- pSSL_set_info_callback(m_ssl, apps_ssl_info_callback);
- //Create bios
- m_sslbio = pBIO_new(pBIO_f_ssl());
- pBIO_new_bio_pair(&m_ibio, 4096, &m_nbio, 4096);
- if (!m_sslbio || !m_nbio || !m_ibio)
- {
- ResetSslSession();
- return SSL_FAILURE_INITSSL;
- }
- long options = pSSL_ctrl(m_ssl, SSL_CTRL_OPTIONS, 0, NULL);
- #define MASK_TLS_VERSION(VERSION, FLAG) ((minTlsVersion > VERSION) || (maxTlsVersion < VERSION) ? FLAG : 0)
- options |=
- SSL_OP_ALL |
- MASK_TLS_VERSION(SSL_VERSION_SSL2, SSL_OP_NO_SSLv2) |
- MASK_TLS_VERSION(SSL_VERSION_SSL3, SSL_OP_NO_SSLv3) |
- MASK_TLS_VERSION(SSL_VERSION_TLS10, SSL_OP_NO_TLSv1) |
- MASK_TLS_VERSION(SSL_VERSION_TLS11, SSL_OP_NO_TLSv1_1) |
- MASK_TLS_VERSION(SSL_VERSION_TLS12, SSL_OP_NO_TLSv1_2);
- pSSL_ctrl(m_ssl, SSL_CTRL_OPTIONS, options, NULL);
- LogSocketMessage(FZ_LOG_INFO, _T("Loading system certificates"));
- LoadSslWindowsSystemCertificateStore(m_ssl_ctx);
- //Init SSL connection
- void *ssl_sessionid = NULL;
- {
- USES_CONVERSION;
- m_Main = main;
- m_sessionreuse = sessionreuse;
- }
- if ((m_Main != NULL) && m_sessionreuse)
- {
- if (m_Main->m_sessionid != NULL)
- {
- if (!pSSL_set_session(m_ssl, m_Main->m_sessionid))
- {
- LogSocketMessage(FZ_LOG_INFO, _T("SSL_set_session failed"));
- return SSL_FAILURE_INITSSL;
- }
- LogSocketMessage(FZ_LOG_INFO, _T("Trying reuse main TLS session ID"));
- }
- else
- {
- LogSocketMessage(FZ_LOG_INFO, _T("Main TLS session ID was not reused previously, not trying again"));
- pSSL_set_session(m_ssl, NULL);
- }
- }
- else
- {
- pSSL_set_session(m_ssl, NULL);
- }
- if (clientMode)
- {
- pSSL_set_connect_state(m_ssl);
- }
- else
- {
- pSSL_set_accept_state(m_ssl);
- }
- pSSL_set_bio(m_ssl, m_ibio, m_ibio);
- pBIO_ctrl(m_sslbio, BIO_C_SET_SSL, BIO_NOCLOSE, m_ssl);
- pBIO_read(m_sslbio, (void *)1, 0);
- // Trigger FD_WRITE so that we can initialize SSL negotiation
- if (GetLayerState() == connected || GetLayerState() == attached)
- {
- TriggerEvent(FD_READ, 0);
- TriggerEvent(FD_WRITE, 0);
- TriggerEvent(FD_READ, 0, TRUE);
- TriggerEvent(FD_WRITE, 0, TRUE);
- }
- m_bUseSSL = true;
- return 0;
- }
- void CAsyncSslSocketLayer::ResetSslSession()
- {
- if (m_pRetrySendBuffer)
- {
- delete [] m_pRetrySendBuffer;
- m_pRetrySendBuffer = 0;
- }
- m_bFailureSent = FALSE;
- m_bBlocking = FALSE;
- m_nSslAsyncNotifyId++;
- m_nNetworkError = 0;
- m_bUseSSL = FALSE;
- m_nVerificationResult = 0;
- m_nVerificationDepth = 0;
- m_bSslEstablished = FALSE;
- if (m_sslbio)
- {
- pBIO_free(m_sslbio);
- }
- if (m_ssl)
- {
- pSSL_set_session(m_ssl,NULL);
- }
- if (m_nbio)
- {
- pBIO_free(m_nbio);
- }
- if (m_ibio)
- {
- pBIO_free(m_ibio);
- }
- m_nNetworkSendBufferLen = 0;
- m_nbio = 0;
- m_ibio = 0;
- m_sslbio = 0;
- if (m_ssl)
- {
- pSSL_free(m_ssl);
- }
- m_sCriticalSection.Lock();
- if (m_ssl_ctx)
- {
- #ifdef MPEXT
- std::map<SSL_CTX *, int>::iterator iter = m_contextRefCount.find(m_ssl_ctx);
- #else
- std::map<SSL_CTX *, int>::iterator& iter = m_contextRefCount.find(m_ssl_ctx);
- #endif
- if (iter != m_contextRefCount.end())
- {
- if (iter->second <= 1)
- {
- pSSL_CTX_free(m_ssl_ctx);
- m_contextRefCount.erase(iter);
- }
- else
- iter->second--;
- }
- m_ssl_ctx = 0;
- }
- delete [] m_pKeyPassword;
- m_pKeyPassword = 0;
- m_ssl = 0;
- t_SslLayerList *cur = m_pSslLayerList;
- if (!cur)
- {
- m_sCriticalSection.Unlock();
- return;
- }
- if (cur->pLayer == this)
- {
- m_pSslLayerList = cur->pNext;
- delete cur;
- }
- else
- while (cur->pNext)
- {
- if (cur->pNext->pLayer == this)
- {
- t_SslLayerList *tmp = cur->pNext;
- cur->pNext = cur->pNext->pNext;
- delete tmp;
- m_sCriticalSection.Unlock();
- return;
- }
- cur = cur->pNext;
- }
- if (m_sessionid != NULL)
- {
- SSL_SESSION_free(m_sessionid);
- m_sessionid = NULL;
- }
- m_sessionreuse = true;
- m_sCriticalSection.Unlock();
- }
- bool CAsyncSslSocketLayer::IsUsingSSL()
- {
- return m_bUseSSL;
- }
- BOOL CAsyncSslSocketLayer::ShutDown(int nHow /*=sends*/)
- {
- if (m_bUseSSL)
- {
- if (m_pRetrySendBuffer)
- {
- if (!m_nShutDown)
- m_nShutDown = 1;
- WSASetLastError(WSAEWOULDBLOCK);
- return false;
- }
- #ifdef MPEXT
- if (!m_bSslEstablished)
- {
- m_mayTriggerWriteUp = true;
- SetLastError(WSAEWOULDBLOCK);
- return false;
- }
- #endif
- if (!m_nShutDown)
- m_nShutDown = 1;
- else
- {
- if (ShutDownComplete())
- return ShutDownNext();
- else
- {
- TriggerEvents();
- WSASetLastError(WSAEWOULDBLOCK);
- return false;
- }
- }
-
- int res = pSSL_shutdown(m_ssl);
- if (res != -1)
- {
- if (!res)
- {
- pSSL_shutdown(m_ssl);
- }
- if (ShutDownComplete())
- return ShutDownNext();
- else
- {
- TriggerEvents();
- WSASetLastError(WSAEWOULDBLOCK);
- return FALSE;
- }
- }
- else
- {
- int error = pSSL_get_error(m_ssl, -1);
- if (error == SSL_ERROR_WANT_READ || error == SSL_ERROR_WANT_WRITE)
- {
- #ifdef MPEXT
- // retry shutdown later
- m_nShutDown = 0;
- #endif
- TriggerEvents();
- WSASetLastError(WSAEWOULDBLOCK);
- return FALSE;
- }
- else if (ShutDownComplete())
- return ShutDownNext();
- else
- {
- TriggerEvents();
- WSASetLastError(WSAEWOULDBLOCK);
- return FALSE;
- }
- }
- }
- else
- {
- if (!m_nShutDown)
- m_nShutDown = 1;
- return ShutDownNext(nHow);
- }
- }
- BOOL CAsyncSslSocketLayer::ShutDownComplete()
- {
- //If a ShutDown was issued, has the connection already been shut down?
- if (!m_nShutDown)
- return FALSE;
- else if (!m_bUseSSL)
- return FALSE;
- else if (m_nNetworkSendBufferLen)
- return FALSE;
- else if (m_pRetrySendBuffer)
- return FALSE;
-
- // Empty read buffer
- char buffer[1000];
- int numread;
- do
- {
- numread = pBIO_read(m_sslbio, buffer, 1000);
- } while (numread > 0);
- size_t pending = pBIO_ctrl_pending(m_nbio);
- if (pending)
- {
- return FALSE;
- }
- else
- {
- return TRUE;
- }
- }
- void CAsyncSslSocketLayer::apps_ssl_info_callback(const SSL *s, int where, int ret)
- {
- USES_CONVERSION;
- CAsyncSslSocketLayer *pLayer = 0;
- m_sCriticalSection.Lock();
- t_SslLayerList *cur = m_pSslLayerList;
- while (cur)
- {
- if (cur->pLayer->m_ssl == s)
- break;
- cur = cur->pNext;
- }
- if (!cur)
- {
- m_sCriticalSection.Unlock();
- MessageBox(0, _T("Can't lookup TLS session!"), _T("Critical error"), MB_ICONEXCLAMATION);
- return;
- }
- else
- pLayer = cur->pLayer;
- m_sCriticalSection.Unlock();
- // Called while unloading?
- if (!pLayer->m_bUseSSL && (where != SSL_CB_LOOP))
- return;
- char * str;
- int w;
- w = where& ~SSL_ST_MASK;
- if (w & SSL_ST_CONNECT)
- {
- str = "TLS connect";
- if (pLayer->m_sessionreuse)
- {
- SSL_SESSION * sessionid = SSL_get1_session(pLayer->m_ssl);
- if (pLayer->m_sessionid != sessionid)
- {
- if (pLayer->m_sessionid == NULL)
- {
- if (SSL_session_reused(pLayer->m_ssl))
- {
- pLayer->LogSocketMessage(FZ_LOG_INFO, _T("Session ID reused"));
- }
- else
- {
- if ((pLayer->m_Main != NULL) && (pLayer->m_Main->m_sessionid != NULL))
- {
- pLayer->LogSocketMessage(FZ_LOG_INFO, _T("Main TLS session ID not reused, will not try again"));
- SSL_SESSION_free(pLayer->m_Main->m_sessionid);
- pLayer->m_Main->m_sessionid = NULL;
- }
- }
- pLayer->LogSocketMessage(FZ_LOG_DEBUG, _T("Saving session ID"));
- }
- else
- {
- SSL_SESSION_free(pLayer->m_sessionid);
- pLayer->LogSocketMessage(FZ_LOG_INFO, _T("Session ID changed"));
- }
- pLayer->m_sessionid = sessionid;
- }
- else
- {
- SSL_SESSION_free(sessionid);
- }
- }
- }
- else if (w & SSL_ST_ACCEPT)
- str = "TLS accept";
- else
- str = "Undefined";
- if (where & SSL_CB_LOOP)
- {
- char* debug = NULL;
- // exact SSL_CB_LOOP is abused for debugging
- if (where == SSL_CB_LOOP)
- {
- debug = reinterpret_cast<char*>(ret);
- }
- char *buffer = new char[4096 + ((debug != NULL) ? strlen(debug) : 0)];
- sprintf(buffer, "%s: %s",
- str,
- pSSL_state_string_long(s));
- if (debug != NULL)
- {
- sprintf(buffer + strlen(buffer), " [%s]", debug);
- OPENSSL_free(debug);
- }
- pLayer->DoLayerCallback(LAYERCALLBACK_LAYERSPECIFIC, SSL_VERBOSE_INFO, 0, buffer);
- }
- else if (where & SSL_CB_ALERT)
- {
- str=(where & SSL_CB_READ)? "read" : "write";
- const char* desc = pSSL_alert_desc_string_long(ret);
- // Don't send close notify warning
- if (desc)
- {
- if (strcmp(desc, "close notify"))
- {
- char *buffer = new char[4096];
- sprintf(buffer, "SSL3 alert %s: %s: %s",
- str,
- pSSL_alert_type_string_long(ret),
- desc);
- pLayer->DoLayerCallback(LAYERCALLBACK_LAYERSPECIFIC, SSL_VERBOSE_WARNING, 0, buffer);
- }
- }
- }
- else if (where & SSL_CB_EXIT)
- {
- if (ret == 0)
- {
- char *buffer = new char[4096];
- sprintf(buffer, "%s: failed in %s",
- str,
- pSSL_state_string_long(s));
- pLayer->DoLayerCallback(LAYERCALLBACK_LAYERSPECIFIC, SSL_VERBOSE_WARNING, 0, buffer);
- if (!pLayer->m_bFailureSent)
- {
- pLayer->m_bFailureSent=TRUE;
- pLayer->DoLayerCallback(LAYERCALLBACK_LAYERSPECIFIC, SSL_FAILURE, pLayer->m_bSslEstablished ? SSL_FAILURE_UNKNOWN : SSL_FAILURE_ESTABLISH);
- }
- }
- else if (ret < 0)
- {
- int error = pSSL_get_error(s,ret);
- if (error != SSL_ERROR_WANT_READ && error != SSL_ERROR_WANT_WRITE)
- {
- char *buffer = new char[4096];
- sprintf(buffer, "%s: error in %s",
- str,
- pSSL_state_string_long(s));
- pLayer->DoLayerCallback(LAYERCALLBACK_LAYERSPECIFIC, SSL_VERBOSE_WARNING, 0, buffer);
- if (!pLayer->m_bFailureSent)
- {
- pLayer->m_bFailureSent=TRUE;
- pLayer->DoLayerCallback(LAYERCALLBACK_LAYERSPECIFIC, SSL_FAILURE, pLayer->m_bSslEstablished ? SSL_FAILURE_UNKNOWN : SSL_FAILURE_ESTABLISH);
- }
- }
- }
- }
- if (where & SSL_CB_HANDSHAKE_DONE)
- {
- int error = pSSL_get_verify_result(pLayer->m_ssl);
- if (error)
- {
- pLayer->DoLayerCallback(LAYERCALLBACK_LAYERSPECIFIC, SSL_VERIFY_CERT, error);
- pLayer->m_bBlocking = TRUE;
- return;
- }
- pLayer->m_bSslEstablished = TRUE;
- pLayer->PrintSessionInfo();
- pLayer->DoLayerCallback(LAYERCALLBACK_LAYERSPECIFIC, SSL_INFO, SSL_INFO_ESTABLISHED);
- pLayer->TriggerEvents();
- }
- }
- void CAsyncSslSocketLayer::UnloadSSL()
- {
- if (!m_bSslInitialized)
- return;
- ResetSslSession();
- m_bSslInitialized = false;
- m_sCriticalSection.Lock();
- m_nSslRefCount--;
- if (m_nSslRefCount)
- {
- m_sCriticalSection.Unlock();
- return;
- }
- #ifndef MPEXT_NO_SSLDLL
- if (m_hSslDll1)
- FreeLibrary(m_hSslDll1);
- if (m_hSslDll2)
- {
- FreeLibrary(m_hSslDll2);
- }
- m_hSslDll1 = NULL;
- m_hSslDll2 = NULL;
- #endif
- m_sCriticalSection.Unlock();
- }
- bool AsnTimeToValidTime(ASN1_TIME * AsnTime, t_SslCertData::t_validTime & ValidTime)
- {
- int i = AsnTime->length;
- const char * v = (const char *)AsnTime->data;
- if (i < 10)
- {
- return FALSE;
- }
- for (int i2 = 0; i2 < 10; i2++)
- {
- if ((v[i2] > '9') || (v[i2] < '0'))
- {
- return FALSE;
- }
- }
- if (AsnTime->type == V_ASN1_UTCTIME)
- {
- ValidTime.y= (v[0]-'0')*10+(v[1]-'0');
- if (ValidTime.y < 50) ValidTime.y+=100;
- ValidTime.y += 1900;
- v += 2;
- i -= 2;
- }
- else if (AsnTime->type == V_ASN1_GENERALIZEDTIME)
- {
- if (i < 12)
- {
- return FALSE;
- }
- ValidTime.y = (v[0]-'0')*1000+(v[1]-'0')*100 + (v[2]-'0')*10+(v[3]-'0');
- v += 4;
- i -= 4;
- }
- else
- {
- return FALSE;
- }
- ValidTime.M = (v[0]-'0')*10+(v[1]-'0');
- if ((ValidTime.M > 12) || (ValidTime.M < 1))
- {
- return FALSE;
- }
- ValidTime.d = (v[2]-'0')*10+(v[3]-'0');
- ValidTime.h = (v[4]-'0')*10+(v[5]-'0');
- ValidTime.m = (v[6]-'0')*10+(v[7]-'0');
- if ((i >= 10) &&
- (v[8] >= '0') && (v[8] <= '9') &&
- (v[9] >= '0') && (v[9] <= '9'))
- {
- ValidTime.s = (v[8]-'0')*10+(v[9]-'0');
- }
- else
- {
- ValidTime.s = 0;
- }
- return TRUE;
- }
- BOOL CAsyncSslSocketLayer::GetPeerCertificateData(t_SslCertData &SslCertData, LPCTSTR & Error)
- {
- X509 *pX509=pSSL_get_peer_certificate(m_ssl);
- if (!pX509)
- {
- Error = _T("Cannot get certificate");
- return FALSE;
- }
- //Reset the contents of SslCertData
- memset(&SslCertData, 0, sizeof(t_SslCertData));
- //Set subject data fields
- X509_NAME *pX509Name=pX509_get_subject_name(pX509);
- if (pX509Name)
- {
- int count=pX509_NAME_entry_count(pX509Name);
- for (int i=0;i<count;i++)
- {
- X509_NAME_ENTRY *pX509NameEntry=pX509_NAME_get_entry(pX509Name,i);
- if (!pX509NameEntry)
- continue;
- ASN1_OBJECT *pObject = pX509_NAME_ENTRY_get_object(pX509NameEntry);
- ASN1_STRING *pString = pX509_NAME_ENTRY_get_data(pX509NameEntry);
- CString str;
- unsigned char *out;
- int len = pASN1_STRING_to_UTF8(&out, pString);
- if (len > 0)
- {
- // Keep it huge
- LPWSTR unicode = new WCHAR[len * 10];
- memset(unicode, 0, sizeof(WCHAR) * len * 10);
- int unicodeLen = MultiByteToWideChar(CP_UTF8, 0, (const char *)out, len, unicode, len * 10);
- if (unicodeLen > 0)
- {
- #ifdef _UNICODE
- str = unicode;
- #else
- LPSTR ansi = new CHAR[len * 10];
- memset(ansi, 0, sizeof(CHAR) * len * 10);
- int ansiLen = WideCharToMultiByte(CP_ACP, 0, unicode, unicodeLen, ansi, len * 10, 0, 0);
- if (ansiLen > 0)
- str = ansi;
- delete [] ansi;
- #endif
- }
- delete [] unicode;
- pCRYPTO_free(out);
- }
- switch(pOBJ_obj2nid(pObject))
- {
- case NID_organizationName:
- _tcsncpy(SslCertData.subject.Organization, str, 255);
- SslCertData.subject.Organization[255] = 0;
- break;
- case NID_organizationalUnitName:
- _tcsncpy(SslCertData.subject.Unit, str, 255);
- SslCertData.subject.Unit[255] = 0;
- break;
- case NID_commonName:
- _tcsncpy(SslCertData.subject.CommonName, str, 255);
- SslCertData.subject.CommonName[255] = 0;
- break;
- case NID_pkcs9_emailAddress:
- _tcsncpy(SslCertData.subject.Mail, str, 255);
- SslCertData.subject.Mail[255] = 0;
- break;
- case NID_countryName:
- _tcsncpy(SslCertData.subject.Country, str, 255);
- SslCertData.subject.Country[255] = 0;
- break;
- case NID_stateOrProvinceName:
- _tcsncpy(SslCertData.subject.StateProvince, str, 255);
- SslCertData.subject.StateProvince[255] = 0;
- break;
- case NID_localityName:
- _tcsncpy(SslCertData.subject.Town, str, 255);
- SslCertData.subject.Town[255] = 0;
- break;
- default:
- if ( !pOBJ_nid2sn(pOBJ_obj2nid(pObject)) )
- {
- TCHAR tmp[20];
- _stprintf(tmp, _T("%d"), pOBJ_obj2nid(pObject));
- int maxlen = 1024 - _tcslen(SslCertData.subject.Other)-1;
- _tcsncpy(SslCertData.subject.Other+_tcslen(SslCertData.subject.Other), tmp, maxlen);
- maxlen = 1024 - _tcslen(SslCertData.subject.Other)-1;
- _tcsncpy(SslCertData.subject.Other+_tcslen(SslCertData.subject.Other), _T("="), maxlen);
- maxlen = 1024 - _tcslen(SslCertData.subject.Other)-1;
- _tcsncpy(SslCertData.subject.Other+_tcslen(SslCertData.subject.Other), str, maxlen);
- maxlen = 1024 - _tcslen(SslCertData.subject.Other)-1;
- _tcsncpy(SslCertData.subject.Other+_tcslen(SslCertData.subject.Other), _T(";"), maxlen);
- }
- else
- {
- int maxlen = 1024 - _tcslen(SslCertData.subject.Other)-1;
- USES_CONVERSION;
- _tcsncpy(SslCertData.subject.Other+_tcslen(SslCertData.subject.Other), A2CT(pOBJ_nid2sn(pOBJ_obj2nid(pObject))), maxlen);
- maxlen = 1024 - _tcslen(SslCertData.subject.Other)-1;
- _tcsncpy(SslCertData.subject.Other+_tcslen(SslCertData.subject.Other), _T("="), maxlen);
- maxlen = 1024 - _tcslen(SslCertData.subject.Other)-1;
- _tcsncpy(SslCertData.subject.Other+_tcslen(SslCertData.subject.Other), str, maxlen);
- maxlen = 1024 - _tcslen(SslCertData.subject.Other)-1;
- _tcsncpy(SslCertData.subject.Other+_tcslen(SslCertData.subject.Other), _T(";"), maxlen);
- }
- break;
- }
- }
- }
- //Set issuer data fields
- pX509Name=pX509_get_issuer_name(pX509);
- if (pX509Name)
- {
- int count=pX509_NAME_entry_count(pX509Name);
- for (int i=0;i<count;i++)
- {
- X509_NAME_ENTRY *pX509NameEntry=pX509_NAME_get_entry(pX509Name,i);
- if (!pX509NameEntry)
- continue;
- ASN1_STRING *pString=pX509_NAME_ENTRY_get_data(pX509NameEntry);
- ASN1_OBJECT *pObject=pX509_NAME_ENTRY_get_object(pX509NameEntry);
- CString str;
- unsigned char *out;
- int len = pASN1_STRING_to_UTF8(&out, pString);
- if (len > 0)
- {
- // Keep it huge
- LPWSTR unicode = new WCHAR[len * 10];
- memset(unicode, 0, sizeof(WCHAR) * len * 10);
- int unicodeLen = MultiByteToWideChar(CP_UTF8, 0, (const char *)out, len, unicode, len * 10);
- if (unicodeLen > 0)
- {
- #ifdef _UNICODE
- str = unicode;
- #else
- LPSTR ansi = new CHAR[len * 10];
- memset(ansi, 0, sizeof(CHAR) * len * 10);
- int ansiLen = WideCharToMultiByte(CP_ACP, 0, unicode, unicodeLen, ansi, len * 10, 0, 0);
- if (ansiLen > 0)
- str = ansi;
- delete [] ansi;
- #endif
- }
- delete [] unicode;
- pCRYPTO_free(out);
- }
- switch(pOBJ_obj2nid(pObject))
- {
- case NID_organizationName:
- _tcsncpy(SslCertData.issuer.Organization, str, 255);
- SslCertData.issuer.Organization[255] = 0;
- break;
- case NID_organizationalUnitName:
- _tcsncpy(SslCertData.issuer.Unit, str, 255);
- SslCertData.issuer.Unit[255] = 0;
- break;
- case NID_commonName:
- _tcsncpy(SslCertData.issuer.CommonName, str, 255);
- SslCertData.issuer.CommonName[255] = 0;
- break;
- case NID_pkcs9_emailAddress:
- _tcsncpy(SslCertData.issuer.Mail, str, 255);
- SslCertData.issuer.Mail[255] = 0;
- break;
- case NID_countryName:
- _tcsncpy(SslCertData.issuer.Country, str, 255);
- SslCertData.issuer.Country[255] = 0;
- break;
- case NID_stateOrProvinceName:
- _tcsncpy(SslCertData.issuer.StateProvince, str, 255);
- SslCertData.issuer.StateProvince[255] = 0;
- break;
- case NID_localityName:
- _tcsncpy(SslCertData.issuer.Town, str, 255);
- SslCertData.issuer.Town[255] = 0;
- break;
- default:
- if ( !pOBJ_nid2sn(pOBJ_obj2nid(pObject)) )
- {
- TCHAR tmp[20];
- _stprintf(tmp, _T("%d"), pOBJ_obj2nid(pObject));
- int maxlen = 1024 - _tcslen(SslCertData.issuer.Other)-1;
- _tcsncpy(SslCertData.issuer.Other+_tcslen(SslCertData.issuer.Other), tmp, maxlen);
- maxlen = 1024 - _tcslen(SslCertData.issuer.Other)-1;
- _tcsncpy(SslCertData.issuer.Other+_tcslen(SslCertData.issuer.Other), _T("="), maxlen);
- maxlen = 1024 - _tcslen(SslCertData.issuer.Other)-1;
- _tcsncpy(SslCertData.issuer.Other+_tcslen(SslCertData.issuer.Other), str, maxlen);
- maxlen = 1024 - _tcslen(SslCertData.issuer.Other)-1;
- _tcsncpy(SslCertData.issuer.Other+_tcslen(SslCertData.issuer.Other), _T(";"), maxlen);
- }
- else
- {
- int maxlen = 1024 - _tcslen(SslCertData.issuer.Other)-1;
- USES_CONVERSION;
- _tcsncpy(SslCertData.issuer.Other+_tcslen(SslCertData.issuer.Other), A2CT(pOBJ_nid2sn(pOBJ_obj2nid(pObject))), maxlen);
- maxlen = 1024 - _tcslen(SslCertData.issuer.Other)-1;
- _tcsncpy(SslCertData.issuer.Other+_tcslen(SslCertData.issuer.Other), _T("="), maxlen);
- maxlen = 1024 - _tcslen(SslCertData.issuer.Other)-1;
- _tcsncpy(SslCertData.issuer.Other+_tcslen(SslCertData.issuer.Other), str, maxlen);
- maxlen = 1024 - _tcslen(SslCertData.issuer.Other)-1;
- _tcsncpy(SslCertData.issuer.Other+_tcslen(SslCertData.issuer.Other), _T(";"), maxlen);
- }
- break;
- }
- }
- }
- //Set date fields
- //Valid from
- ASN1_TIME *pTime=X509_get_notBefore(pX509);
- if (!pTime)
- {
- pX509_free(pX509);
- Error = _T("Cannot get start time");
- return FALSE;
- }
- if (!AsnTimeToValidTime(pTime, SslCertData.validFrom))
- {
- pX509_free(pX509);
- Error = _T("Invalid start time");
- return FALSE;
- }
- //Valid until
- pTime = X509_get_notAfter(pX509);
- if (!pTime)
- {
- pX509_free(pX509);
- Error = _T("Cannot get end time");
- return FALSE;
- }
- if (!AsnTimeToValidTime(pTime, SslCertData.validUntil))
- {
- pX509_free(pX509);
- Error = _T("Invalid end time");
- return FALSE;
- }
- unsigned int length = 20;
- pX509_digest(pX509, pEVP_sha1(), SslCertData.hash, &length);
- SslCertData.priv_data = m_nSslAsyncNotifyId;
- pX509_free(pX509);
- SslCertData.verificationResult = m_nVerificationResult;
- SslCertData.verificationDepth = m_nVerificationDepth;
- return TRUE;
- }
- std::string CAsyncSslSocketLayer::GetTlsVersionStr()
- {
- return m_TlsVersionStr;
- }
- std::string CAsyncSslSocketLayer::GetCipherName()
- {
- return m_CipherName;
- }
- void CAsyncSslSocketLayer::SetNotifyReply(int nID, int nCode, int result)
- {
- if (!m_bBlocking)
- return;
- if (nID != m_nSslAsyncNotifyId)
- return;
- if (nCode != SSL_VERIFY_CERT)
- return;
- m_bBlocking = FALSE;
- if (!result)
- {
- m_nNetworkError = WSAECONNABORTED;
- WSASetLastError(WSAECONNABORTED);
- if (!m_bFailureSent)
- {
- m_bFailureSent = TRUE;
- DoLayerCallback(LAYERCALLBACK_LAYERSPECIFIC, SSL_FAILURE, SSL_FAILURE_CERTREJECTED);
- }
- TriggerEvent(FD_CLOSE, 0, TRUE);
- return;
- }
- m_bSslEstablished = TRUE;
- PrintSessionInfo();
- DoLayerCallback(LAYERCALLBACK_LAYERSPECIFIC, SSL_INFO, SSL_INFO_ESTABLISHED);
- TriggerEvents();
- }
- void CAsyncSslSocketLayer::PrintSessionInfo()
- {
- #ifdef MPEXT
- const
- #endif
- SSL_CIPHER *ciph;
- X509 *cert;
- ciph = pSSL_get_current_cipher(m_ssl);
- char enc[4096] = {0};
- cert=pSSL_get_peer_certificate(m_ssl);
- if (cert != NULL)
- {
- EVP_PKEY *pkey = pX509_get_pubkey(cert);
- if (pkey != NULL)
- {
- if (0)
- ;
- #ifndef NO_RSA
- else if (pkey->type == EVP_PKEY_RSA && pkey->pkey.rsa != NULL
- && pkey->pkey.rsa->n != NULL)
- sprintf(enc, "%d bit RSA", pBN_num_bits(pkey->pkey.rsa->n));
- #endif
- #ifndef NO_DSA
- else if (pkey->type == EVP_PKEY_DSA && pkey->pkey.dsa != NULL
- && pkey->pkey.dsa->p != NULL)
- sprintf(enc, "%d bit DSA", pBN_num_bits(pkey->pkey.dsa->p));
- #endif
- pEVP_PKEY_free(pkey);
- }
- pX509_free(cert);
- /* The SSL API does not allow us to look at temporary RSA/DH keys,
- * otherwise we should print their lengths too */
- }
- char *buffer = new char[4096];
- m_TlsVersionStr = pSSL_get_version(m_ssl);
- sprintf(buffer, "%s: %s, %s",
- pSSL_CIPHER_get_version(ciph),
- pSSL_CIPHER_get_name(ciph),
- enc);
- m_CipherName = buffer;
- sprintf(buffer, "Using %s, cipher %s",
- m_TlsVersionStr.c_str(),
- m_CipherName.c_str());
- DoLayerCallback(LAYERCALLBACK_LAYERSPECIFIC, SSL_VERBOSE_WARNING, 0, buffer);
- }
- void CAsyncSslSocketLayer::OnConnect(int nErrorCode)
- {
- if (m_bUseSSL && nErrorCode)
- TriggerEvent(FD_WRITE, 0);
- TriggerEvent(FD_CONNECT, nErrorCode, TRUE);
- }
- int CAsyncSslSocketLayer::verify_callback(int preverify_ok, X509_STORE_CTX *ctx)
- {
- X509 *err_cert;
- int err, depth;
- SSL *ssl;
- err_cert = pX509_STORE_CTX_get_current_cert(ctx);
- err = pX509_STORE_CTX_get_error(ctx);
- depth = pX509_STORE_CTX_get_error_depth(ctx);
- /*
- * Retrieve the pointer to the SSL of the connection currently treated
- * and the application specific data stored into the SSL object.
- */
- ssl = (SSL *)pX509_STORE_CTX_get_ex_data(ctx, pSSL_get_ex_data_X509_STORE_CTX_idx());
- // Lookup CAsyncSslSocketLayer instance
- CAsyncSslSocketLayer *pLayer = 0;
- m_sCriticalSection.Lock();
- t_SslLayerList *cur = m_pSslLayerList;
- while (cur)
- {
- if (cur->pLayer->m_ssl == ssl)
- break;
- cur = cur->pNext;
- }
- if (!cur)
- {
- m_sCriticalSection.Unlock();
- MessageBox(0, _T("Can't lookup TLS session!"), _T("Critical error"), MB_ICONEXCLAMATION);
- return 1;
- }
- else
- pLayer = cur->pLayer;
- m_sCriticalSection.Unlock();
- /*
- * Catch a too long certificate chain. The depth limit set using
- * SSL_CTX_set_verify_depth() is by purpose set to "limit+1" so
- * that whenever the "depth>verify_depth" condition is met, we
- * have violated the limit and want to log this error condition.
- * We must do it here, because the CHAIN_TOO_LONG error would not
- * be found explicitly; only errors introduced by cutting off the
- * additional certificates would be logged.
- */
- if (depth > 10) {//mydata->verify_depth) {
- preverify_ok = 0;
- err = X509_V_ERR_CERT_CHAIN_TOO_LONG;
- pX509_STORE_CTX_set_error(ctx, err);
- }
- if (!preverify_ok)
- {
- if (!pLayer->m_nVerificationResult)
- {
- pLayer->m_nVerificationDepth = depth;
- pLayer->m_nVerificationResult = err;
- }
- }
- return 1;
- }
- BOOL CAsyncSslSocketLayer::SetCertStorage(CString file)
- {
- m_CertStorage = file;
- return TRUE;
- }
- void CAsyncSslSocketLayer::OnClose(int nErrorCode)
- {
- m_onCloseCalled = true;
- if (m_bUseSSL && pBIO_ctrl)
- {
- size_t pending = pBIO_ctrl_pending(m_sslbio);
- if (pending > 0)
- {
- TriggerEvents();
- }
- else TriggerEvent(FD_CLOSE, nErrorCode, TRUE);
- }
- else
- TriggerEvent(FD_CLOSE, nErrorCode, TRUE);
- }
- void CAsyncSslSocketLayer::PrintLastErrorMsg()
- {
- int err = pERR_get_error();
- while (err)
- {
- char *buffer = new char[512];
- pERR_error_string(err, buffer);
- err = pERR_get_error();
- DoLayerCallback(LAYERCALLBACK_LAYERSPECIFIC, SSL_VERBOSE_WARNING, 0, buffer);
- }
- }
- bool CAsyncSslSocketLayer::CreateSslCertificate(LPCTSTR filename, int bits, unsigned char* country, unsigned char* state,
- unsigned char* locality, unsigned char* organization, unsigned char* unit, unsigned char* cname,
- unsigned char *email, CString& err)
- {
- // Certificate valid for a year
- int days = 365;
- CAsyncSslSocketLayer layer;
- if (layer.InitSSL())
- {
- err = _T("Failed to initialize TLS library");
- return false;
- }
- X509 *x;
- EVP_PKEY *pk;
- RSA *rsa;
- X509_NAME *name = NULL;
-
- if ((pk = pEVP_PKEY_new()) == NULL)
- {
- err = _T("Could not create key object");
- return false;
- }
- if ((x = pX509_new()) == NULL)
- {
- err = _T("Could not create certificate object");
- return false;
- }
- rsa = pRSA_generate_key(bits, RSA_F4, 0/*callback*/, NULL);
-
- if (!pEVP_PKEY_assign(pk, EVP_PKEY_RSA, (char *)(rsa)))
- {
- err = _T("Failed to assign rsa key to key object");
- return false;
- }
- rsa = NULL;
- pX509_set_version(x,2);
- pASN1_INTEGER_set(pX509_get_serialNumber(x), 0/*serial*/);
- pX509_gmtime_adj(X509_get_notBefore(x),0);
- pX509_gmtime_adj(X509_get_notAfter(x),(long)60*60*24*days);
- pX509_set_pubkey(x,pk);
- name = pX509_get_subject_name(x);
- /* This function creates and adds the entry, working out the
- * correct string type and performing checks on its length.
- * Normally we'd check the return value for errors...
- */
- pX509_NAME_add_entry_by_txt(name, "CN",
- MBSTRING_ASC, cname, -1, -1, 0);
- pX509_NAME_add_entry_by_txt(name, "C",
- MBSTRING_ASC, country, -1, -1, 0);
- pX509_NAME_add_entry_by_txt(name, "ST",
- MBSTRING_ASC, state, -1, -1, 0);
- pX509_NAME_add_entry_by_txt(name, "L",
- MBSTRING_ASC, locality, -1, -1, 0);
- pX509_NAME_add_entry_by_txt(name, "O",
- MBSTRING_ASC, organization, -1, -1, 0);
- pX509_NAME_add_entry_by_txt(name, "OU",
- MBSTRING_ASC, unit, -1, -1, 0);
- pX509_NAME_add_entry_by_NID(name, NID_pkcs9_emailAddress,
- MBSTRING_ASC, email, -1, -1, 0);
- /* Its self signed so set the issuer name to be the same as the
- * subject.
- */
- pX509_set_issuer_name(x,name);
- if (!pX509_sign(x, pk, pEVP_sha1()))
- {
- err = _T("Failed to sign certificate");
- return false;
- }
- // Write key and certificate to file
- // We use a memory bio, since the OpenSSL functions accepting a filepointer
- // do crash for no obvious reason.
- #ifndef _UNICODE
- FILE* file = fopen(filename, "w+");
- #else
- FILE* file = _wfopen(filename, _T("w+"));
- #endif
- if (!file)
- {
- err = _T("Failed to open output file");
- return false;
- }
- BIO* bio = pBIO_new(pBIO_s_mem());
- #ifdef MPEXT
- pPEM_ASN1_write_bio((i2d_of_void*)pi2d_PrivateKey, (((pk)->type == EVP_PKEY_DSA)?PEM_STRING_DSA:PEM_STRING_RSA), bio, (char *)pk, NULL, NULL, 0, NULL, NULL);
- pPEM_ASN1_write_bio((i2d_of_void*)pi2d_X509, PEM_STRING_X509, bio, (char *)x, NULL, NULL, 0, NULL, NULL);
- #else
- pPEM_ASN1_write_bio((int (*)())pi2d_PrivateKey, (((pk)->type == EVP_PKEY_DSA)?PEM_STRING_DSA:PEM_STRING_RSA), bio, (char *)pk, NULL, NULL, 0, NULL, NULL);
- pPEM_ASN1_write_bio((int (*)())pi2d_X509, PEM_STRING_X509, bio, (char *)x, NULL, NULL, 0, NULL, NULL);
- #endif
-
- char buffer[1001];
- int len;
- while ((len = pBIO_read(bio, buffer, 1000)) > 0)
- {
- buffer[len] = 0;
- fprintf(file, buffer);
- }
- fclose(file);
- pX509_free(x);
- pEVP_PKEY_free(pk);
- pBIO_free(bio);
- layer.UnloadSSL();
- return true;
- }
- int CAsyncSslSocketLayer::SetCertKeyFile(const char* cert, const char* key, const char* pass, CString* error /*=0*/)
- {
- int res = InitSSL();
- if (res)
- return res;
- m_sCriticalSection.Lock();
-
- if (!m_ssl_ctx)
- {
- // Create new context
- if (!(m_ssl_ctx = pSSL_CTX_new( pSSLv23_method())))
- {
- m_sCriticalSection.Unlock();
- return SSL_FAILURE_INITSSL;
- }
- m_contextRefCount[m_ssl_ctx] = 1;
- }
- pSSL_CTX_set_default_passwd_cb(m_ssl_ctx, pem_passwd_cb);
- pSSL_CTX_set_default_passwd_cb_userdata(m_ssl_ctx, this);
- if (pass)
- {
- size_t len = strlen(pass);
- m_pKeyPassword = new char[len + 1];
- strcpy(m_pKeyPassword, pass);
- }
- else
- {
- delete [] m_pKeyPassword;
- m_pKeyPassword = 0;
- }
- if (pSSL_CTX_use_certificate_chain_file(m_ssl_ctx, cert) <= 0)
- //if (pSSL_CTX_use_certificate_file(m_ssl_ctx, cert, SSL_FILETYPE_PEM) <= 0)
- {
- if (error)
- *error = _T("Could not load certificate file.");
- m_sCriticalSection.Unlock();
- return SSL_FAILURE_VERIFYCERT;
- }
- if (pSSL_CTX_use_PrivateKey_file(m_ssl_ctx, key, SSL_FILETYPE_PEM) <= 0)
- {
- if (error)
- *error = _T("Could not load key file.");
- m_sCriticalSection.Unlock();
- return SSL_FAILURE_VERIFYCERT;
- }
- if (!pSSL_CTX_check_private_key(m_ssl_ctx))
- {
- if (error)
- *error = _T("Private key does not match the certificate public key.");
- m_sCriticalSection.Unlock();
- return SSL_FAILURE_VERIFYCERT;
- }
- m_sCriticalSection.Unlock();
- return 0;
- }
- int CAsyncSslSocketLayer::SendRaw(const void* lpBuf, int nBufLen, int nFlags)
- {
- if (!m_bUseSSL)
- {
- SetLastError(WSANOTINITIALISED);
- return SOCKET_ERROR;
- }
- if (!lpBuf)
- return 0;
-
- if (m_nNetworkError)
- {
- SetLastError(m_nNetworkError);
- return SOCKET_ERROR;
- }
- if (m_nShutDown)
- {
- SetLastError(WSAESHUTDOWN);
- return SOCKET_ERROR;
- }
- if (m_nNetworkSendBufferLen)
- {
- SetLastError(WSAEINPROGRESS);
- return SOCKET_ERROR;
- }
- if (!nBufLen)
- return 0;
- if (m_nNetworkSendBufferMaxLen < nBufLen)
- m_nNetworkSendBufferMaxLen = nBufLen;
- delete [] m_pNetworkSendBuffer;
- m_pNetworkSendBuffer = new char[m_nNetworkSendBufferMaxLen];
- memcpy(m_pNetworkSendBuffer, lpBuf, nBufLen);
- m_nNetworkSendBufferLen = nBufLen;
- TriggerEvent(FD_WRITE, 0);
- return nBufLen;
- }
- void CAsyncSslSocketLayer::TriggerEvents()
- {
- size_t pending = pBIO_ctrl_pending(m_nbio);
- if (pending > 0)
- {
- if (m_mayTriggerWrite)
- {
- m_mayTriggerWrite = false;
- TriggerEvent(FD_WRITE, 0);
- }
- }
- else if (!m_nNetworkSendBufferLen && m_bSslEstablished && !m_pRetrySendBuffer)
- {
- if (pBIO_ctrl_get_write_guarantee(m_sslbio) > 0 && m_mayTriggerWriteUp)
- {
- m_mayTriggerWriteUp = false;
- TriggerEvent(FD_WRITE, 0, TRUE);
- }
- }
- if (m_bSslEstablished && pBIO_ctrl_pending(m_sslbio) > 0)
- {
- if (m_mayTriggerReadUp && !m_bBlocking)
- {
- m_mayTriggerReadUp = false;
- TriggerEvent(FD_READ, 0, TRUE);
- }
- }
- else
- {
- int len = pBIO_ctrl_get_write_guarantee(m_nbio);
- if (len > 0 && m_mayTriggerRead)
- {
- m_mayTriggerRead = false;
- TriggerEvent(FD_READ, 0);
- }
- }
- if (m_onCloseCalled && m_bSslEstablished)
- {
- if (pBIO_ctrl_pending(m_sslbio) <= 0)
- {
- TriggerEvent(FD_CLOSE, 0, TRUE);
- }
- }
- }
- int CAsyncSslSocketLayer::pem_passwd_cb(char *buf, int size, int rwflag, void *userdata)
- {
- CAsyncSslSocketLayer* pThis = (CAsyncSslSocketLayer*)userdata;
- if (!pThis || !pThis->m_pKeyPassword)
- return 0;
- int len = strlen(pThis->m_pKeyPassword);
- if (len >= size)
- len = size - 1;
- memcpy(buf, pThis->m_pKeyPassword, len);
- buf[len] = 0;
- return len;
- }
- //---------------------------------------------------------------------------
- #include <wincrypt.h>
- //---------------------------------------------------------------------------
- // Taken from
- // http://openssl.6102.n7.nabble.com/Get-root-certificates-from-System-Store-of-Windows-td40959.html
- void __fastcall LoadSslWindowsSystemCertificateStore(SSL_CTX * Ctx)
- {
- HCERTSTORE CertStore = CertStore = CertOpenSystemStore(0, L"ROOT");
- if (CertStore != NULL)
- {
- PCCERT_CONTEXT CertContext = NULL;
- while ((CertContext = CertEnumCertificatesInStore(CertStore, CertContext)) != NULL)
- {
- #ifdef _DEBUG
- wchar_t Buf[1024];
- CertNameToStr(X509_ASN_ENCODING, &CertContext->pCertInfo->Subject, CERT_X500_NAME_STR, Buf, LENOF(Buf));
- Buf[LENOF(Buf) - 1] = L'\0';
- CertNameToStr(X509_ASN_ENCODING, &CertContext->pCertInfo->Issuer, CERT_X500_NAME_STR, Buf, LENOF(Buf));
- Buf[LENOF(Buf) - 1] = L'\0';
- #endif
- X509 * x509 = d2i_X509(NULL, const_cast<const unsigned char **>(&CertContext->pbCertEncoded), CertContext->cbCertEncoded);
- if (x509 != NULL)
- {
- #ifdef _DEBUG
- int AddCertResult =
- #endif
- X509_STORE_add_cert(Ctx->cert_store, x509);
- X509_free(x509);
- }
- }
- CertFreeCertificateContext(CertContext);
- CertCloseStore(CertStore, 0);
- }
- }
|