123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914 |
- // CAsyncSslSocketLayer by Tim Kosse ([email protected])
- // Version 2.0 (2005-02-27)
- //---------------------------------------------------------------------------
- // Feel free to use this class, as long as you don't claim that you wrote it
- // and this copyright notice stays intact in the source files.
- // If you use this class in commercial applications, please send a short message
- // to [email protected]
- //---------------------------------------------------------------------------
- #include "stdafx.h"
- #include "AsyncSslSocketLayer.h"
- #include "FilezillaTools.h"
- #include <openssl/x509v3.h>
- #include <openssl/err.h>
- #include <openssl/tls1.h>
- #pragma hdrstop
- #include "Common.h"
- /////////////////////////////////////////////////////////////////////////////
- // CAsyncSslSocketLayer
- std::unique_ptr<TCriticalSection> CAsyncSslSocketLayer::m_sCriticalSection(TraceInitPtr(new TCriticalSection()));
- CAsyncSslSocketLayer::t_SslLayerList* CAsyncSslSocketLayer::m_pSslLayerList = 0;
- bool CAsyncSslSocketLayer::m_bSslInitialized = false;
- CAsyncSslSocketLayer::CAsyncSslSocketLayer()
- {
- m_ssl = 0;
- m_sslbio = 0;
- m_ibio = 0;
- m_nbio = 0;
- m_ssl_ctx = 0;
- m_bUseSSL = false;
- m_bSslInitialized = FALSE;
- m_bSslEstablished = FALSE;
- m_nNetworkSendBufferLen = 0;
- m_nNetworkSendBufferMaxLen = 0;
- m_pNetworkSendBuffer = NULL;
- m_pRetrySendBuffer = 0;
- m_nRetrySendBufferLen = 0;
- m_nNetworkError = 0;
- m_nShutDown = 0;
- m_bBlocking = FALSE;
- m_nSslAsyncNotifyId = 0;
- m_bFailureSent = FALSE;
- m_nVerificationResult = 0;
- m_nVerificationDepth = 0;
- m_mayTriggerRead = true;
- m_mayTriggerWrite = true;
- m_mayTriggerReadUp = true;
- m_mayTriggerWriteUp = true;
- m_onCloseCalled = false;
- m_Main = NULL;
- m_sessionid = NULL;
- m_sessionidSerialized = NULL;
- m_sessionreuse = true;
- m_sessionreuse_failed = false;
- FCertificate = NULL;
- FPrivateKey = NULL;
- m_CriticalSection.reset(new TCriticalSection());
- }
- CAsyncSslSocketLayer::~CAsyncSslSocketLayer()
- {
- ResetSslSession();
- delete [] m_pNetworkSendBuffer;
- delete [] m_pRetrySendBuffer;
- }
- int CAsyncSslSocketLayer::InitSSL()
- {
- TGuard Guard(m_sCriticalSection.get());
- if (!m_bSslInitialized)
- {
- if (!OPENSSL_init_ssl(OPENSSL_INIT_LOAD_SSL_STRINGS | OPENSSL_INIT_LOAD_CRYPTO_STRINGS, NULL))
- {
- return SSL_FAILURE_INITSSL;
- }
- m_bSslInitialized = true;
- }
- return 0;
- }
- void CAsyncSslSocketLayer::OnReceive(int nErrorCode)
- {
- if (m_bUseSSL)
- {
- if (m_bBlocking)
- {
- m_mayTriggerRead = true;
- return;
- }
- if (m_nNetworkError)
- {
- return;
- }
- char buffer[16384];
- m_mayTriggerRead = false;
- //Get number of bytes we can receive and store in the network input bio
- int len = BIO_ctrl_get_write_guarantee(m_nbio);
- if (len > 16384)
- len = 16384;
- else if (!len)
- {
- m_mayTriggerRead = true;
- TriggerEvents();
- return;
- }
- int numread = 0;
- // Receive data
- numread = ReceiveNext(buffer, len);
- if (numread > 0)
- {
- //Store it in the network input bio and process data
- int numwritten = BIO_write(m_nbio, buffer, numread);
- BIO_ctrl(m_nbio, BIO_CTRL_FLUSH, 0, NULL);
- // I have no idea why this call is needed, but without it, connections
- // will stall. Perhaps it triggers some internal processing.
- // Also, ignore return value, don't do any error checking. This function
- // can report errors, even though a later call can succeed.
- char buffer;
- BIO_read(m_sslbio, &buffer, 0);
- }
- if (!numread)
- {
- if (GetLayerState() == connected)
- TriggerEvent(FD_CLOSE, nErrorCode, TRUE);
- }
- else if (numread == SOCKET_ERROR)
- {
- int nError = GetLastError();
- if (nError != WSAEWOULDBLOCK && nError != WSAENOTCONN)
- {
- m_nNetworkError = GetLastError();
- TriggerEvent(FD_CLOSE, 0, TRUE);
- return;
- }
- }
- if (m_pRetrySendBuffer != NULL)
- {
- if (ProcessSendBuffer() == -2)
- {
- TriggerEvent(FD_CLOSE, 0, TRUE);
- return;
- }
- }
- if (!m_nShutDown && SSL_get_shutdown(m_ssl))
- {
- size_t pending = BIO_ctrl_pending(m_sslbio);
- if (pending <= 0)
- {
- if (ShutDown() || GetLastError() == WSAEWOULDBLOCK)
- {
- if (ShutDownComplete())
- TriggerEvent(FD_CLOSE, 0, TRUE);
- }
- else
- {
- m_nNetworkError = WSAECONNABORTED;
- WSASetLastError(WSAECONNABORTED);
- TriggerEvent(FD_CLOSE, WSAECONNABORTED, TRUE);
- }
- return;
- }
- }
- if (ShutDownComplete() && m_nShutDown == 1)
- {
- //Send shutdown notification if all pending data has been sent
- DoLayerCallback(LAYERCALLBACK_LAYERSPECIFIC, SSL_INFO, SSL_INFO_SHUTDOWNCOMPLETE);
- m_nShutDown++;
- }
- TriggerEvents();
- }
- else
- {
- TriggerEvent(FD_READ, nErrorCode, TRUE);
- }
- }
- int CAsyncSslSocketLayer::ProcessSendBuffer()
- {
- int numwrite = BIO_write(m_sslbio, m_pRetrySendBuffer, m_nRetrySendBufferLen);
- if (numwrite >= 0)
- {
- BIO_ctrl(m_sslbio, BIO_CTRL_FLUSH, 0, NULL);
- delete [] m_pRetrySendBuffer;
- m_pRetrySendBuffer = 0;
- return numwrite;
- }
- else
- {
- DebugAssert(numwrite == -1);
- if (!BIO_should_retry(m_sslbio))
- {
- delete [] m_pRetrySendBuffer;
- m_pRetrySendBuffer = 0;
- ::SetLastError(WSAECONNABORTED);
- return -2;
- }
- else
- {
- return -1;
- }
- }
- }
- void CAsyncSslSocketLayer::OnSend(int nErrorCode)
- {
- if (m_bUseSSL)
- {
- if (m_nNetworkError)
- {
- return;
- }
- m_mayTriggerWrite = false;
- //Send data in the send buffer
- while (m_nNetworkSendBufferLen)
- {
- int numsent = SendNext(m_pNetworkSendBuffer, m_nNetworkSendBufferLen);
- if (numsent == SOCKET_ERROR)
- {
- int nError = GetLastError();
- if (nError != WSAEWOULDBLOCK && nError != WSAENOTCONN)
- {
- m_nNetworkError = nError;
- TriggerEvent(FD_CLOSE, 0, TRUE);
- }
- return;
- }
- else if (!numsent)
- {
- if (GetLayerState() == connected)
- TriggerEvent(FD_CLOSE, nErrorCode, TRUE);
- }
- if (numsent == m_nNetworkSendBufferLen)
- {
- m_nNetworkSendBufferLen = 0;
- }
- else
- {
- memmove(m_pNetworkSendBuffer, m_pNetworkSendBuffer + numsent, m_nNetworkSendBufferLen - numsent);
- m_nNetworkSendBufferLen -= numsent;
- }
- }
- //Send the data waiting in the network bio
- char buffer[32 * 1024];
- size_t len = BIO_ctrl_pending(m_nbio);
- int numread = BIO_read(m_nbio, buffer, std::min(len, sizeof(buffer)));
- if (numread <= 0)
- m_mayTriggerWrite = true;
- while (numread > 0)
- {
- int numsent = SendNext(buffer, numread);
- if (!numsent)
- {
- if (GetLayerState() == connected)
- TriggerEvent(FD_CLOSE, nErrorCode, TRUE);
- }
- if (numsent == SOCKET_ERROR || numsent < numread)
- {
- if (numsent == SOCKET_ERROR)
- if (GetLastError() != WSAEWOULDBLOCK && GetLastError() != WSAENOTCONN)
- {
- m_nNetworkError = GetLastError();
- TriggerEvent(FD_CLOSE, 0, TRUE);
- return;
- }
- else
- numsent = 0;
- // Add all data that was retrieved from the network bio but could not be sent to the send buffer.
- if (m_nNetworkSendBufferMaxLen < (m_nNetworkSendBufferLen + numread - numsent))
- {
- char * tmp = m_pNetworkSendBuffer;
- m_nNetworkSendBufferMaxLen = static_cast<int>((m_nNetworkSendBufferLen + numread - numsent) * 1.5);
- m_pNetworkSendBuffer = new char[m_nNetworkSendBufferMaxLen];
- if (tmp)
- {
- memcpy(m_pNetworkSendBuffer, tmp, m_nNetworkSendBufferLen);
- delete [] tmp;
- }
- }
- DebugAssert(m_pNetworkSendBuffer);
- memcpy(m_pNetworkSendBuffer + m_nNetworkSendBufferLen, buffer, numread-numsent);
- m_nNetworkSendBufferLen += numread - numsent;
- }
- if (!numsent)
- {
- break;
- }
- len = BIO_ctrl_pending(m_nbio);
- if (!len)
- {
- m_mayTriggerWrite = true;
- break;
- }
- numread = BIO_read(m_nbio, buffer, len);
- if (numread <= 0)
- {
- m_mayTriggerWrite = true;
- }
- }
- if (m_pRetrySendBuffer != NULL)
- {
- if (ProcessSendBuffer() == -2)
- {
- TriggerEvent(FD_CLOSE, 0, TRUE);
- return;
- }
- }
- // No more data available, ask for more.
- TriggerEvents();
- if (m_nShutDown == 1 && ShutDownComplete())
- {
- //Send shutdown notification if all pending data has been sent
- // FileZilla3 calls ShutDownNext() here
- DoLayerCallback(LAYERCALLBACK_LAYERSPECIFIC, SSL_INFO, SSL_INFO_SHUTDOWNCOMPLETE);
- m_nShutDown++;
- }
- }
- else
- {
- TriggerEvent(FD_WRITE, nErrorCode, TRUE);
- }
- }
- int CAsyncSslSocketLayer::Send(const void* lpBuf, int nBufLen, int nFlags)
- {
- if (m_bUseSSL)
- {
- if (!lpBuf)
- {
- return 0;
- }
- if (m_bBlocking || m_pRetrySendBuffer)
- {
- m_mayTriggerWriteUp = true;
- ::SetLastError(WSAEWOULDBLOCK);
- return SOCKET_ERROR;
- }
- if (m_nNetworkError)
- {
- SetLastError(m_nNetworkError);
- return SOCKET_ERROR;
- }
- if (m_nShutDown)
- {
- ::SetLastError(WSAESHUTDOWN);
- return SOCKET_ERROR;
- }
- if (!m_bSslEstablished)
- {
- m_mayTriggerWriteUp = true;
- ::SetLastError(WSAEWOULDBLOCK);
- return SOCKET_ERROR;
- }
- if (!nBufLen)
- {
- return 0;
- }
- if (m_onCloseCalled)
- {
- TriggerEvent(FD_CLOSE, 0, TRUE);
- return 0;
- }
- int len = BIO_ctrl_get_write_guarantee(m_sslbio);
- if (nBufLen > len)
- nBufLen = len;
- if (!len)
- {
- m_mayTriggerWriteUp = true;
- TriggerEvents();
- ::SetLastError(WSAEWOULDBLOCK);
- }
- m_pRetrySendBuffer = new char[nBufLen];
- m_nRetrySendBufferLen = nBufLen;
- memcpy(m_pRetrySendBuffer, lpBuf, nBufLen);
- int ProcessResult = ProcessSendBuffer();
- if (ProcessResult == -2)
- {
- return SOCKET_ERROR;
- }
- else if (ProcessResult == -1)
- {
- if (GetLayerState() == closed)
- {
- return 0;
- }
- else if (GetLayerState() != connected)
- {
- SetLastError(m_nNetworkError);
- return SOCKET_ERROR;
- }
- TriggerEvents();
- return nBufLen;
- }
- m_mayTriggerWriteUp = true;
- TriggerEvents();
- return ProcessResult;
- }
- else
- {
- return SendNext(lpBuf, nBufLen, nFlags);
- }
- }
- int CAsyncSslSocketLayer::Receive(void* lpBuf, int nBufLen, int nFlags)
- {
- if (m_bUseSSL)
- {
- if (m_bBlocking)
- {
- m_mayTriggerReadUp = true;
- ::SetLastError(WSAEWOULDBLOCK);
- return SOCKET_ERROR;
- }
- if (m_nNetworkError)
- {
- size_t pending = BIO_ctrl_pending(m_sslbio);
- if (pending && !m_nShutDown)
- {
- m_mayTriggerReadUp = true;
- TriggerEvents();
- return BIO_read(m_sslbio, lpBuf,nBufLen);
- }
- WSASetLastError(m_nNetworkError);
- return SOCKET_ERROR;
- }
- if (m_nShutDown)
- {
- ::SetLastError(WSAESHUTDOWN);
- return SOCKET_ERROR;
- }
- if (!nBufLen)
- {
- return 0;
- }
- size_t pending = BIO_ctrl_pending(m_sslbio);
- if (!pending)
- {
- if (GetLayerState() == closed)
- {
- return 0;
- }
- if (m_onCloseCalled)
- {
- TriggerEvent(FD_CLOSE, 0, TRUE);
- return 0;
- }
- else if (GetLayerState() != connected)
- {
- SetLastError(m_nNetworkError);
- return SOCKET_ERROR;
- }
- else
- {
- if (SSL_get_shutdown(m_ssl))
- {
- if (ShutDown() || GetLastError() == WSAEWOULDBLOCK)
- {
- if (ShutDownComplete())
- {
- TriggerEvent(FD_CLOSE, 0, TRUE);
- return 0;
- }
- else
- WSASetLastError(WSAEWOULDBLOCK);
- }
- else
- {
- m_nNetworkError = WSAECONNABORTED;
- WSASetLastError(WSAECONNABORTED);
- TriggerEvent(FD_CLOSE, WSAECONNABORTED, TRUE);
- }
- return SOCKET_ERROR;
- }
- }
- m_mayTriggerReadUp = true;
- TriggerEvents();
- ::SetLastError(WSAEWOULDBLOCK);
- return SOCKET_ERROR;
- }
- int numread = BIO_read(m_sslbio, lpBuf, nBufLen);
- if (!numread)
- {
- if (SSL_get_shutdown(m_ssl))
- {
- if (ShutDown() || GetLastError() == WSAEWOULDBLOCK)
- {
- if (ShutDownComplete())
- {
- TriggerEvent(FD_CLOSE, 0, TRUE);
- return 0;
- }
- else
- WSASetLastError(WSAEWOULDBLOCK);
- }
- else
- {
- m_nNetworkError = WSAECONNABORTED;
- WSASetLastError(WSAECONNABORTED);
- TriggerEvent(FD_CLOSE, WSAECONNABORTED, TRUE);
- }
- return SOCKET_ERROR;
- }
- m_mayTriggerReadUp = true;
- TriggerEvents();
- ::SetLastError(WSAEWOULDBLOCK);
- return SOCKET_ERROR;
- }
- if (numread < 0)
- {
- if (!BIO_should_retry(m_sslbio))
- {
- PrintLastErrorMsg();
- m_nNetworkError = WSAECONNABORTED;
- WSASetLastError(WSAECONNABORTED);
- TriggerEvent(FD_CLOSE, 0, TRUE);
- return SOCKET_ERROR;
- }
- else
- {
- if (SSL_get_shutdown(m_ssl))
- {
- if (ShutDown() || GetLastError() == WSAEWOULDBLOCK)
- {
- if (ShutDownComplete())
- {
- TriggerEvent(FD_CLOSE, 0, TRUE);
- return 0;
- }
- else
- WSASetLastError(WSAEWOULDBLOCK);
- }
- else
- {
- m_nNetworkError = WSAECONNABORTED;
- WSASetLastError(WSAECONNABORTED);
- TriggerEvent(FD_CLOSE, 0, TRUE);
- }
- return SOCKET_ERROR;
- }
- m_mayTriggerReadUp = true;
- TriggerEvents();
- ::SetLastError(WSAEWOULDBLOCK);
- return SOCKET_ERROR;
- }
- }
- m_mayTriggerReadUp = true;
- TriggerEvents();
- return numread;
- }
- else
- {
- return ReceiveNext(lpBuf, nBufLen, nFlags);
- }
- }
- void CAsyncSslSocketLayer::Close()
- {
- if (!m_nShutDown && m_bSslEstablished && !m_nNetworkError && !m_nCriticalError)
- {
- ShutDown();
- while (!ShutDownComplete() && !m_nNetworkError && !m_nCriticalError &&
- ((m_nNetworkSendBufferLen > 0) || (BIO_ctrl_pending(m_nbio) > 0) || m_pRetrySendBuffer))
- {
- OnSend(0);
- }
- }
- m_nShutDown = 0;
- m_onCloseCalled = false;
- ResetSslSession();
- CloseNext();
- }
- BOOL CAsyncSslSocketLayer::Connect(const SOCKADDR *lpSockAddr, int nSockAddrLen)
- {
- BOOL res = ConnectNext(lpSockAddr, nSockAddrLen);
- if (!res)
- {
- if (GetLastError() != WSAEWOULDBLOCK)
- {
- ResetSslSession();
- }
- }
- return res;
- }
- BOOL CAsyncSslSocketLayer::Connect(LPCTSTR lpszHostAddress, UINT nHostPort)
- {
- BOOL res = ConnectNext(lpszHostAddress, nHostPort);
- if (!res)
- {
- if (GetLastError()!=WSAEWOULDBLOCK)
- {
- ResetSslSession();
- }
- }
- return res;
- }
- void CAsyncSslSocketLayer::SetSession(SSL_SESSION * Session)
- {
- TGuard Guard(m_CriticalSection.get());
- if (m_sessionid != NULL)
- {
- SSL_SESSION_free(m_sessionid);
- }
- bool Serialize = (m_Main == NULL);
- if ((m_sessionidSerialized != NULL) && DebugAlwaysTrue(Serialize))
- {
- delete[] m_sessionidSerialized;
- m_sessionidSerialized = NULL;
- }
- m_sessionid = Session;
- if ((m_sessionid != NULL) && Serialize)
- {
- LogSocketMessageRaw(FZ_LOG_INFO, L"Saving session ID");
- m_sessionidSerializedLen = i2d_SSL_SESSION(m_sessionid, NULL);
- m_sessionidSerialized = new unsigned char[m_sessionidSerializedLen];
- unsigned char * P = m_sessionidSerialized;
- i2d_SSL_SESSION(m_sessionid, &P);
- }
- }
- bool CAsyncSslSocketLayer::HandleSession(SSL_SESSION * Session)
- {
- bool Result = false;
- if (m_sessionreuse)
- {
- if (m_sessionid != Session)
- {
- if (m_sessionid == NULL)
- {
- if (SSL_session_reused(m_ssl))
- {
- LogSocketMessageRaw(FZ_LOG_PROGRESS, L"Session ID reused");
- }
- else
- {
- if ((m_Main != NULL) && !m_Main->m_sessionreuse_failed)
- {
- LogSocketMessageRaw(FZ_LOG_INFO, L"Main TLS session ID not reused, will not try again");
- m_Main->m_sessionreuse_failed = true;
- }
- }
- }
- else
- {
- LogSocketMessageRaw(FZ_LOG_INFO, L"Session ID changed");
- }
- SetSession(Session);
- Result = true;
- }
- }
- return Result;
- }
- int CAsyncSslSocketLayer::NewSessionCallback(struct ssl_st * Ssl, SSL_SESSION * Session)
- {
- CAsyncSslSocketLayer * Layer = LookupLayer(Ssl);
- int Result = 0;
- // This is not called for TLS 1.2 and older when session is reused (so "Session ID reused" won't be logged).
- // So for 1.2 and older, we call HandleSession from apps_ssl_info_callback as we always did.
- if ((SSL_version(Ssl) >= TLS1_3_VERSION) && Layer->HandleSession(Session))
- {
- Result = 1;
- }
- return Result;
- }
- int CAsyncSslSocketLayer::InitSSLConnection(bool clientMode,
- CAsyncSslSocketLayer* main, bool sessionreuse, const CString & host,
- CFileZillaTools * tools)
- {
- if (m_bUseSSL)
- return 0;
- int res = InitSSL();
- if (res)
- return res;
- {
- // What is the point of this guard?
- // Maybe the m_ssl_ctx was intended to be global. But as it is not, the guard is probably pointless.
- TGuard Guard(m_sCriticalSection.get());
- if (!m_ssl_ctx)
- {
- // Create new context if none given
- if (!(m_ssl_ctx = SSL_CTX_new( TLS_method())))
- {
- ResetSslSession();
- return SSL_FAILURE_INITSSL;
- }
- if (clientMode)
- {
- USES_CONVERSION;
- SSL_CTX_set_verify(m_ssl_ctx, SSL_VERIFY_PEER, verify_callback);
- SSL_CTX_set_client_cert_cb(m_ssl_ctx, ProvideClientCert);
- // https://www.mail-archive.com/[email protected]/msg86186.html
- SSL_CTX_set_session_cache_mode(m_ssl_ctx, SSL_SESS_CACHE_CLIENT | SSL_SESS_CACHE_NO_INTERNAL_STORE | SSL_SESS_CACHE_NO_AUTO_CLEAR);
- SSL_CTX_sess_set_new_cb(m_ssl_ctx, NewSessionCallback);
- CFileStatus Dummy;
- if (!m_CertStorage.IsEmpty() &&
- CFile::GetStatus((LPCTSTR)m_CertStorage, Dummy))
- {
- SSL_CTX_load_verify_locations(m_ssl_ctx, T2CA(m_CertStorage), 0);
- }
- }
- }
- //Create new SSL session
- if (!(m_ssl = SSL_new(m_ssl_ctx)))
- {
- ResetSslSession();
- return SSL_FAILURE_INITSSL;
- }
- if (clientMode && (host.GetLength() > 0))
- {
- USES_CONVERSION;
- SSL_set_tlsext_host_name(m_ssl, T2CA(host));
- }
- #ifdef _DEBUG
- if ((main == NULL) && LoggingSocketMessage(FZ_LOG_INFO))
- {
- USES_CONVERSION;
- LogSocketMessageRaw(FZ_LOG_INFO, L"Supported ciphersuites:");
- STACK_OF(SSL_CIPHER) * ciphers = SSL_get_ciphers(m_ssl);
- for (int i = 0; i < sk_SSL_CIPHER_num(ciphers); i++)
- {
- const SSL_CIPHER * cipher = sk_SSL_CIPHER_value(ciphers, i);
- LogSocketMessageRaw(FZ_LOG_INFO, A2CT(SSL_CIPHER_get_name(cipher)));
- }
- }
- #endif
- //Add current instance to list of active instances
- t_SslLayerList *tmp = m_pSslLayerList;
- m_pSslLayerList = new t_SslLayerList;
- m_pSslLayerList->pNext = tmp;
- m_pSslLayerList->pLayer = this;
- }
- SSL_set_info_callback(m_ssl, apps_ssl_info_callback);
- //Create bios
- m_sslbio = BIO_new(BIO_f_ssl());
- // WORKAROUND: Upload over TLS 1.3 fails for specific sizes in relation to OpenSSL buffer size.
- // For 32768 buffer, the sizes are 32725-32746, 65471-65492, 98217-98238 (tested up to 1048576)
- // Do not know how to fix that, so as a workaround, using buffer size that does not result in the problem.
- unsigned long TransferSize = 0;
- if (main != NULL)
- {
- TransferSize = static_cast<unsigned long>(GetSocketOptionVal(OPTION_MPEXT_TRANSFER_SIZE));
- }
- unsigned BufferKBs = 32;
- unsigned long BufferSize;
- do
- {
- BufferSize = BufferKBs * 1024;
- int Remainder = TransferSize % BufferSize;
- int BufferCount = (TransferSize / BufferSize) + (Remainder > 0 ? 1 : 0);
- int ProblemHigh = BufferSize - (BufferCount * 22);
- int ProblemLow = ProblemHigh - 21;
- if ((ProblemLow <= Remainder) && (Remainder <= ProblemHigh))
- {
- BufferKBs++;
- }
- else
- {
- break;
- }
- }
- while (true);
- BIO_new_bio_pair(&m_ibio, BufferSize, &m_nbio, BufferSize);
- if (!m_sslbio || !m_nbio || !m_ibio)
- {
- ResetSslSession();
- return SSL_FAILURE_INITSSL;
- }
- m_Tools = tools;
- m_Tools->SetupSsl(m_ssl);
- //Init SSL connection
- void *ssl_sessionid = NULL;
- m_Main = main;
- m_sessionreuse = sessionreuse;
- if ((m_Main != NULL) && m_sessionreuse)
- {
- TGuard Guard(m_Main->m_CriticalSection.get());
- if (m_Main->m_sessionidSerialized == NULL)
- {
- DebugFail();
- SSL_set_session(m_ssl, NULL);
- }
- else if (!m_Main->m_sessionreuse_failed)
- {
- // This is what Python SSL module does, instead of directly using SSL_SESSION of the other session,
- // claiming a bug in OpenSSL 1.1.1 and newer. See PySSL_get_session/PySSL_set_session.
- // OpenSSL refutes this as a bug in Python session handling.
- // https://github.com/openssl/openssl/issues/1550
- // But it works for us too.
- const unsigned char * P = m_Main->m_sessionidSerialized;
- SSL_SESSION * Session = DebugNotNull(d2i_SSL_SESSION(NULL, &P, m_Main->m_sessionidSerializedLen));
- if (!SSL_set_session(m_ssl, Session))
- {
- LogSocketMessageRaw(FZ_LOG_INFO, L"SSL_set_session failed");
- return SSL_FAILURE_INITSSL;
- }
- LogSocketMessageRaw(FZ_LOG_INFO, L"Trying reuse main TLS session ID");
- }
- else
- {
- LogSocketMessageRaw(FZ_LOG_INFO, L"Main TLS session ID was not reused previously, not trying again");
- SSL_set_session(m_ssl, NULL);
- }
- }
- else
- {
- SSL_set_session(m_ssl, NULL);
- }
- if (clientMode)
- {
- SSL_set_connect_state(m_ssl);
- }
- else
- {
- SSL_set_accept_state(m_ssl);
- }
- SSL_set_bio(m_ssl, m_ibio, m_ibio);
- BIO_ctrl(m_sslbio, BIO_C_SET_SSL, BIO_NOCLOSE, m_ssl);
- BIO_read(m_sslbio, (void *)1, 0);
- // Trigger FD_WRITE so that we can initialize SSL negotiation
- if (GetLayerState() == connected || GetLayerState() == attached)
- {
- TriggerEvent(FD_READ, 0);
- TriggerEvent(FD_WRITE, 0);
- TriggerEvent(FD_READ, 0, TRUE);
- TriggerEvent(FD_WRITE, 0, TRUE);
- }
- m_bUseSSL = true;
- return 0;
- }
- void CAsyncSslSocketLayer::ResetSslSession()
- {
- if (m_pRetrySendBuffer)
- {
- delete [] m_pRetrySendBuffer;
- m_pRetrySendBuffer = 0;
- }
- m_bFailureSent = FALSE;
- m_bBlocking = FALSE;
- m_nSslAsyncNotifyId++;
- m_nNetworkError = 0;
- m_bUseSSL = FALSE;
- m_nVerificationResult = 0;
- m_nVerificationDepth = 0;
- m_bSslEstablished = FALSE;
- if (m_sslbio)
- {
- BIO_free(m_sslbio);
- }
- if (m_ssl)
- {
- SSL_set_session(m_ssl,NULL);
- }
- if (m_nbio)
- {
- BIO_free(m_nbio);
- }
- if (m_ibio)
- {
- BIO_free(m_ibio);
- }
- m_nNetworkSendBufferLen = 0;
- m_nbio = 0;
- m_ibio = 0;
- m_sslbio = 0;
- if (m_ssl)
- {
- SSL_free(m_ssl);
- }
- TGuard Guard(m_sCriticalSection.get());
- if (m_ssl_ctx)
- {
- SSL_CTX_free(m_ssl_ctx);
- m_ssl_ctx = 0;
- }
- m_ssl = 0;
- t_SslLayerList *cur = m_pSslLayerList;
- if (!cur)
- {
- return;
- }
- if (cur->pLayer == this)
- {
- m_pSslLayerList = cur->pNext;
- delete cur;
- }
- else
- while (cur->pNext)
- {
- if (cur->pNext->pLayer == this)
- {
- t_SslLayerList *tmp = cur->pNext;
- cur->pNext = cur->pNext->pNext;
- delete tmp;
- return;
- }
- cur = cur->pNext;
- }
- SetSession(NULL);
- m_sessionreuse = true;
- m_sessionreuse_failed = false;
- }
- bool CAsyncSslSocketLayer::IsUsingSSL()
- {
- return m_bUseSSL;
- }
- BOOL CAsyncSslSocketLayer::ShutDown(int nHow /*=sends*/)
- {
- if (m_bUseSSL)
- {
- if (m_pRetrySendBuffer)
- {
- if (!m_nShutDown)
- m_nShutDown = 1;
- WSASetLastError(WSAEWOULDBLOCK);
- return false;
- }
- if (!m_bSslEstablished)
- {
- m_mayTriggerWriteUp = true;
- ::SetLastError(WSAEWOULDBLOCK);
- return false;
- }
- if (!m_nShutDown)
- m_nShutDown = 1;
- else
- {
- if (ShutDownComplete())
- return ShutDownNext();
- else
- {
- TriggerEvents();
- WSASetLastError(WSAEWOULDBLOCK);
- return false;
- }
- }
- int res = SSL_shutdown(m_ssl);
- if (res == 0)
- {
- // Without bi-directional shutdown, file uploads are incomplete on some servers
- res = SSL_shutdown(m_ssl);
- int completeShutdown = GetSocketOptionVal(OPTION_MPEXT_COMPLETE_TLS_SHUTDOWN);
- if ((completeShutdown < 0) ||
- ((completeShutdown == 0) && (SSL_version(m_ssl) <= TLS1_2_VERSION)))
- {
- LogSocketMessageRaw(FZ_LOG_INFO, L"Not waiting for complete TLS shutdown");
- res = 0;
- }
- }
- if (res >= 0)
- {
- if (ShutDownComplete())
- return ShutDownNext();
- else
- {
- TriggerEvents();
- WSASetLastError(WSAEWOULDBLOCK);
- return FALSE;
- }
- }
- else
- {
- int error = SSL_get_error(m_ssl, -1);
- if (error == SSL_ERROR_WANT_READ || error == SSL_ERROR_WANT_WRITE)
- {
- // retry shutdown later
- m_nShutDown = 0;
- TriggerEvents();
- WSASetLastError(WSAEWOULDBLOCK);
- return FALSE;
- }
- else if (ShutDownComplete())
- return ShutDownNext();
- else
- {
- TriggerEvents();
- WSASetLastError(WSAEWOULDBLOCK);
- return FALSE;
- }
- }
- }
- else
- {
- if (!m_nShutDown)
- m_nShutDown = 1;
- return ShutDownNext(nHow);
- }
- }
- BOOL CAsyncSslSocketLayer::ShutDownComplete()
- {
- //If a ShutDown was issued, has the connection already been shut down?
- if (!m_nShutDown)
- return FALSE;
- else if (!m_bUseSSL)
- return FALSE;
- else if (m_nNetworkSendBufferLen)
- return FALSE;
- else if (m_pRetrySendBuffer)
- return FALSE;
- // Empty read buffer
- char buffer[1000];
- int numread;
- do
- {
- numread = BIO_read(m_sslbio, buffer, 1000);
- } while (numread > 0);
- size_t pending = BIO_ctrl_pending(m_nbio);
- if (pending)
- {
- return FALSE;
- }
- else
- {
- return TRUE;
- }
- }
- void CAsyncSslSocketLayer::LogSslError(const SSL *s, const char * str, const char * fmt, int nMessageType, char * debug)
- {
- USES_CONVERSION;
- const char * StateString = SSL_state_string_long(s);
- if ((strcmp(StateString, "error") != 0) || (debug != NULL))
- {
- char * buffer = new char[4096 + ((debug != NULL) ? strlen(debug) : 0)];
- sprintf(buffer, fmt, str, StateString);
- if (debug != NULL)
- {
- sprintf(buffer + strlen(buffer), " [%s]", debug);
- OPENSSL_free(debug);
- }
- LogSocketMessageRaw(nMessageType, A2T(buffer));
- delete[] buffer;
- }
- }
- void CAsyncSslSocketLayer::apps_ssl_info_callback(const SSL *s, int where, int ret)
- {
- USES_CONVERSION;
- CAsyncSslSocketLayer *pLayer = 0;
- {
- TGuard Guard(m_sCriticalSection.get());
- t_SslLayerList *cur = m_pSslLayerList;
- while (cur)
- {
- if (cur->pLayer->m_ssl == s)
- break;
- cur = cur->pNext;
- }
- if (!cur)
- {
- MessageBox(0, L"Can't lookup TLS session!", L"Critical error", MB_ICONEXCLAMATION);
- return;
- }
- else
- pLayer = cur->pLayer;
- }
- // Called while unloading?
- if (!pLayer->m_bUseSSL && (where != SSL_CB_LOOP))
- return;
- const char * str;
- int w;
- w = where& ~SSL_ST_MASK;
- if (w & SSL_ST_CONNECT)
- {
- str = "TLS connect";
- }
- else if (w & SSL_ST_ACCEPT)
- str = "TLS accept";
- else
- str = "Undefined";
- if (where & SSL_CB_LOOP)
- {
- char* debug = NULL;
- // exact SSL_CB_LOOP is abused for debugging
- if (where == SSL_CB_LOOP)
- {
- debug = reinterpret_cast<char*>(ret);
- }
- pLayer->LogSslError(s, str, "%s: %s", FZ_LOG_INFO, debug);
- }
- else if (where & SSL_CB_ALERT)
- {
- str=(where & SSL_CB_READ)? "read" : "write";
- const char* desc = SSL_alert_desc_string_long(ret);
- // Don't send close notify warning
- if (desc)
- {
- if (strcmp(desc, "close notify"))
- {
- char *buffer = new char[4096];
- sprintf(buffer, "SSL3 alert %s: %s: %s",
- str,
- SSL_alert_type_string_long(ret),
- desc);
- pLayer->LogSocketMessageRaw(FZ_LOG_WARNING, A2T(buffer));
- pLayer->PrintLastErrorMsg();
- delete [] buffer;
- }
- }
- }
- else if (where & SSL_CB_EXIT)
- {
- bool SendFailure = false;
- if (ret == 0)
- {
- pLayer->LogSslError(s, str, "%s: failed in %s", FZ_LOG_WARNING);
- pLayer->PrintLastErrorMsg();
- SendFailure = true;
- }
- else if (ret < 0)
- {
- int error = SSL_get_error(s,ret);
- if (error != SSL_ERROR_WANT_READ && error != SSL_ERROR_WANT_WRITE)
- {
- pLayer->LogSslError(s, str, "%s: error in %s", FZ_LOG_WARNING);
- pLayer->PrintLastErrorMsg();
- SendFailure = true;
- }
- }
- if (SendFailure && !pLayer->m_bFailureSent)
- {
- pLayer->m_bFailureSent = TRUE;
- pLayer->DoLayerCallback(LAYERCALLBACK_LAYERSPECIFIC, SSL_FAILURE, pLayer->m_bSslEstablished ? SSL_FAILURE_UNKNOWN : SSL_FAILURE_ESTABLISH);
- }
- }
- if (where & SSL_CB_HANDSHAKE_DONE)
- {
- // For 1.2 and older, session is always established at this point.
- // For 1.3, session can be restarted later, so this is handled in NewSessionCallback.
- // But at least with Cerberus server, it is not, so if we want to have "reuse" logged, we need to do it here.
- SSL_SESSION * sessionid = SSL_get1_session(pLayer->m_ssl);
- if (!pLayer->HandleSession(sessionid))
- {
- SSL_SESSION_free(sessionid);
- }
- int error = SSL_get_verify_result(pLayer->m_ssl);
- pLayer->DoLayerCallback(LAYERCALLBACK_LAYERSPECIFIC, SSL_VERIFY_CERT, error);
- pLayer->m_bBlocking = TRUE;
- }
- }
- bool AsnTimeToValidTime(ASN1_TIME * AsnTime, t_SslCertData::t_validTime & ValidTime)
- {
- int i = AsnTime->length;
- const char * v = (const char *)AsnTime->data;
- if (i < 10)
- {
- return FALSE;
- }
- for (int i2 = 0; i2 < 10; i2++)
- {
- if ((v[i2] > '9') || (v[i2] < '0'))
- {
- return FALSE;
- }
- }
- if (AsnTime->type == V_ASN1_UTCTIME)
- {
- ValidTime.y= (v[0]-'0')*10+(v[1]-'0');
- if (ValidTime.y < 50) ValidTime.y+=100;
- ValidTime.y += 1900;
- v += 2;
- i -= 2;
- }
- else if (AsnTime->type == V_ASN1_GENERALIZEDTIME)
- {
- if (i < 12)
- {
- return FALSE;
- }
- ValidTime.y = (v[0]-'0')*1000+(v[1]-'0')*100 + (v[2]-'0')*10+(v[3]-'0');
- v += 4;
- i -= 4;
- }
- else
- {
- return FALSE;
- }
- ValidTime.M = (v[0]-'0')*10+(v[1]-'0');
- if ((ValidTime.M > 12) || (ValidTime.M < 1))
- {
- return FALSE;
- }
- ValidTime.d = (v[2]-'0')*10+(v[3]-'0');
- ValidTime.h = (v[4]-'0')*10+(v[5]-'0');
- ValidTime.m = (v[6]-'0')*10+(v[7]-'0');
- if ((i >= 10) &&
- (v[8] >= '0') && (v[8] <= '9') &&
- (v[9] >= '0') && (v[9] <= '9'))
- {
- ValidTime.s = (v[8]-'0')*10+(v[9]-'0');
- }
- else
- {
- ValidTime.s = 0;
- }
- return TRUE;
- }
- BOOL CAsyncSslSocketLayer::GetPeerCertificateData(t_SslCertData &SslCertData, LPCTSTR & Error)
- {
- X509 *pX509=SSL_get_peer_certificate(m_ssl);
- if (!pX509)
- {
- Error = L"Cannot get certificate";
- return FALSE;
- }
- //Reset the contents of SslCertData
- memset(&SslCertData, 0, sizeof(t_SslCertData));
- //Set subject data fields
- X509_NAME *pX509Name=X509_get_subject_name(pX509);
- if (pX509Name)
- {
- int count=X509_NAME_entry_count(pX509Name);
- for (int i=0;i<count;i++)
- {
- X509_NAME_ENTRY *pX509NameEntry=X509_NAME_get_entry(pX509Name,i);
- if (!pX509NameEntry)
- continue;
- ASN1_OBJECT *pObject = X509_NAME_ENTRY_get_object(pX509NameEntry);
- ASN1_STRING *pString = X509_NAME_ENTRY_get_data(pX509NameEntry);
- CString str;
- unsigned char *out;
- int len = ASN1_STRING_to_UTF8(&out, pString);
- if (len > 0)
- {
- // Keep it huge
- LPWSTR unicode = new WCHAR[len * 10];
- memset(unicode, 0, sizeof(WCHAR) * len * 10);
- int unicodeLen = MultiByteToWideChar(CP_UTF8, 0, (const char *)out, len, unicode, len * 10);
- if (unicodeLen > 0)
- {
- #ifdef _UNICODE
- str = unicode;
- #else
- LPSTR ansi = new CHAR[len * 10];
- memset(ansi, 0, sizeof(CHAR) * len * 10);
- int ansiLen = WideCharToMultiByte(CP_ACP, 0, unicode, unicodeLen, ansi, len * 10, 0, 0);
- if (ansiLen > 0)
- str = ansi;
- delete [] ansi;
- #endif
- }
- delete [] unicode;
- OPENSSL_free(out);
- }
- switch(OBJ_obj2nid(pObject))
- {
- case NID_organizationName:
- _tcsncpy(SslCertData.subject.Organization, str, 255);
- SslCertData.subject.Organization[255] = 0;
- break;
- case NID_organizationalUnitName:
- _tcsncpy(SslCertData.subject.Unit, str, 255);
- SslCertData.subject.Unit[255] = 0;
- break;
- case NID_commonName:
- _tcsncpy(SslCertData.subject.CommonName, str, 255);
- SslCertData.subject.CommonName[255] = 0;
- break;
- case NID_pkcs9_emailAddress:
- _tcsncpy(SslCertData.subject.Mail, str, 255);
- SslCertData.subject.Mail[255] = 0;
- break;
- case NID_countryName:
- _tcsncpy(SslCertData.subject.Country, str, 255);
- SslCertData.subject.Country[255] = 0;
- break;
- case NID_stateOrProvinceName:
- _tcsncpy(SslCertData.subject.StateProvince, str, 255);
- SslCertData.subject.StateProvince[255] = 0;
- break;
- case NID_localityName:
- _tcsncpy(SslCertData.subject.Town, str, 255);
- SslCertData.subject.Town[255] = 0;
- break;
- default:
- if ( !OBJ_nid2sn(OBJ_obj2nid(pObject)) )
- {
- TCHAR tmp[20];
- _stprintf(tmp, L"%d", OBJ_obj2nid(pObject));
- int maxlen = 1024 - _tcslen(SslCertData.subject.Other)-1;
- _tcsncpy(SslCertData.subject.Other+_tcslen(SslCertData.subject.Other), tmp, maxlen);
- maxlen = 1024 - _tcslen(SslCertData.subject.Other)-1;
- _tcsncpy(SslCertData.subject.Other+_tcslen(SslCertData.subject.Other), L"=", maxlen);
- maxlen = 1024 - _tcslen(SslCertData.subject.Other)-1;
- _tcsncpy(SslCertData.subject.Other+_tcslen(SslCertData.subject.Other), str, maxlen);
- maxlen = 1024 - _tcslen(SslCertData.subject.Other)-1;
- _tcsncpy(SslCertData.subject.Other+_tcslen(SslCertData.subject.Other), L";", maxlen);
- }
- else
- {
- int maxlen = 1024 - _tcslen(SslCertData.subject.Other)-1;
- USES_CONVERSION;
- _tcsncpy(SslCertData.subject.Other+_tcslen(SslCertData.subject.Other), A2CT(OBJ_nid2sn(OBJ_obj2nid(pObject))), maxlen);
- maxlen = 1024 - _tcslen(SslCertData.subject.Other)-1;
- _tcsncpy(SslCertData.subject.Other+_tcslen(SslCertData.subject.Other), L"=", maxlen);
- maxlen = 1024 - _tcslen(SslCertData.subject.Other)-1;
- _tcsncpy(SslCertData.subject.Other+_tcslen(SslCertData.subject.Other), str, maxlen);
- maxlen = 1024 - _tcslen(SslCertData.subject.Other)-1;
- _tcsncpy(SslCertData.subject.Other+_tcslen(SslCertData.subject.Other), L";", maxlen);
- }
- break;
- }
- }
- }
- //Set issuer data fields
- pX509Name=X509_get_issuer_name(pX509);
- if (pX509Name)
- {
- int count=X509_NAME_entry_count(pX509Name);
- for (int i=0;i<count;i++)
- {
- X509_NAME_ENTRY *pX509NameEntry=X509_NAME_get_entry(pX509Name,i);
- if (!pX509NameEntry)
- continue;
- ASN1_STRING *pString=X509_NAME_ENTRY_get_data(pX509NameEntry);
- ASN1_OBJECT *pObject=X509_NAME_ENTRY_get_object(pX509NameEntry);
- CString str;
- unsigned char *out;
- int len = ASN1_STRING_to_UTF8(&out, pString);
- if (len > 0)
- {
- // Keep it huge
- LPWSTR unicode = new WCHAR[len * 10];
- memset(unicode, 0, sizeof(WCHAR) * len * 10);
- int unicodeLen = MultiByteToWideChar(CP_UTF8, 0, (const char *)out, len, unicode, len * 10);
- if (unicodeLen > 0)
- {
- #ifdef _UNICODE
- str = unicode;
- #else
- LPSTR ansi = new CHAR[len * 10];
- memset(ansi, 0, sizeof(CHAR) * len * 10);
- int ansiLen = WideCharToMultiByte(CP_ACP, 0, unicode, unicodeLen, ansi, len * 10, 0, 0);
- if (ansiLen > 0)
- str = ansi;
- delete [] ansi;
- #endif
- }
- delete [] unicode;
- OPENSSL_free(out);
- }
- switch(OBJ_obj2nid(pObject))
- {
- case NID_organizationName:
- _tcsncpy(SslCertData.issuer.Organization, str, 255);
- SslCertData.issuer.Organization[255] = 0;
- break;
- case NID_organizationalUnitName:
- _tcsncpy(SslCertData.issuer.Unit, str, 255);
- SslCertData.issuer.Unit[255] = 0;
- break;
- case NID_commonName:
- _tcsncpy(SslCertData.issuer.CommonName, str, 255);
- SslCertData.issuer.CommonName[255] = 0;
- break;
- case NID_pkcs9_emailAddress:
- _tcsncpy(SslCertData.issuer.Mail, str, 255);
- SslCertData.issuer.Mail[255] = 0;
- break;
- case NID_countryName:
- _tcsncpy(SslCertData.issuer.Country, str, 255);
- SslCertData.issuer.Country[255] = 0;
- break;
- case NID_stateOrProvinceName:
- _tcsncpy(SslCertData.issuer.StateProvince, str, 255);
- SslCertData.issuer.StateProvince[255] = 0;
- break;
- case NID_localityName:
- _tcsncpy(SslCertData.issuer.Town, str, 255);
- SslCertData.issuer.Town[255] = 0;
- break;
- default:
- if ( !OBJ_nid2sn(OBJ_obj2nid(pObject)) )
- {
- TCHAR tmp[20];
- _stprintf(tmp, L"%d", OBJ_obj2nid(pObject));
- int maxlen = 1024 - _tcslen(SslCertData.issuer.Other)-1;
- _tcsncpy(SslCertData.issuer.Other+_tcslen(SslCertData.issuer.Other), tmp, maxlen);
- maxlen = 1024 - _tcslen(SslCertData.issuer.Other)-1;
- _tcsncpy(SslCertData.issuer.Other+_tcslen(SslCertData.issuer.Other), L"=", maxlen);
- maxlen = 1024 - _tcslen(SslCertData.issuer.Other)-1;
- _tcsncpy(SslCertData.issuer.Other+_tcslen(SslCertData.issuer.Other), str, maxlen);
- maxlen = 1024 - _tcslen(SslCertData.issuer.Other)-1;
- _tcsncpy(SslCertData.issuer.Other+_tcslen(SslCertData.issuer.Other), L";", maxlen);
- }
- else
- {
- int maxlen = 1024 - _tcslen(SslCertData.issuer.Other)-1;
- USES_CONVERSION;
- _tcsncpy(SslCertData.issuer.Other+_tcslen(SslCertData.issuer.Other), A2CT(OBJ_nid2sn(OBJ_obj2nid(pObject))), maxlen);
- maxlen = 1024 - _tcslen(SslCertData.issuer.Other)-1;
- _tcsncpy(SslCertData.issuer.Other+_tcslen(SslCertData.issuer.Other), L"=", maxlen);
- maxlen = 1024 - _tcslen(SslCertData.issuer.Other)-1;
- _tcsncpy(SslCertData.issuer.Other+_tcslen(SslCertData.issuer.Other), str, maxlen);
- maxlen = 1024 - _tcslen(SslCertData.issuer.Other)-1;
- _tcsncpy(SslCertData.issuer.Other+_tcslen(SslCertData.issuer.Other), L";", maxlen);
- }
- break;
- }
- }
- }
- //Set date fields
- //Valid from
- ASN1_TIME *pTime=X509_getm_notBefore(pX509);
- if (!pTime)
- {
- X509_free(pX509);
- Error = L"Cannot get start time";
- return FALSE;
- }
- if (!AsnTimeToValidTime(pTime, SslCertData.validFrom))
- {
- X509_free(pX509);
- Error = L"Invalid start time";
- return FALSE;
- }
- //Valid until
- pTime = X509_getm_notAfter(pX509);
- if (!pTime)
- {
- X509_free(pX509);
- Error = L"Cannot get end time";
- return FALSE;
- }
- if (!AsnTimeToValidTime(pTime, SslCertData.validUntil))
- {
- X509_free(pX509);
- Error = L"Invalid end time";
- return FALSE;
- }
- int subjectAltNamePos = X509_get_ext_by_NID(pX509, NID_subject_alt_name, -1);
- if (subjectAltNamePos >= 0)
- {
- X509_EXTENSION * subjectAltNameExtension = X509_get_ext(pX509, subjectAltNamePos);
- BIO * subjectAltNameBio = BIO_new(BIO_s_mem());
- if (X509V3_EXT_print(subjectAltNameBio, subjectAltNameExtension, 0, 0) == 1)
- {
- USES_CONVERSION;
- u_char *data;
- int len = BIO_get_mem_data(subjectAltNameBio, &data);
- char * buf = new char[len + 1];
- memcpy(buf, data, len);
- buf[len] = '\0';
- _tcsncpy(SslCertData.subjectAltName, A2CT(buf), LENOF(SslCertData.subjectAltName));
- SslCertData.subjectAltName[LENOF(SslCertData.subjectAltName) - 1] = '\0';
- delete [] buf;
- }
- BIO_vfree(subjectAltNameBio);
- }
- unsigned int length;
- length = sizeof(SslCertData.hashSha1);
- X509_digest(pX509, EVP_sha1(), SslCertData.hashSha1, &length);
- DebugAssert(length == sizeof(SslCertData.hashSha1));
- length = sizeof(SslCertData.hashSha256);
- X509_digest(pX509, EVP_sha256(), SslCertData.hashSha256, &length);
- DebugAssert(length == sizeof(SslCertData.hashSha256));
- // Inspired by ne_ssl_cert_export()
- // Find the length of the DER encoding.
- SslCertData.certificateLen = i2d_X509(pX509, NULL);
- SslCertData.certificate = new unsigned char[SslCertData.certificateLen];
- unsigned char * p = SslCertData.certificate;
- i2d_X509(pX509, &p);
- SslCertData.priv_data = m_nSslAsyncNotifyId;
- X509_free(pX509);
- SslCertData.verificationResult = m_nVerificationResult;
- SslCertData.verificationDepth = m_nVerificationDepth;
- return TRUE;
- }
- std::string CAsyncSslSocketLayer::GetTlsVersionStr()
- {
- return m_TlsVersionStr;
- }
- std::string CAsyncSslSocketLayer::GetCipherName()
- {
- return m_CipherName;
- }
- void CAsyncSslSocketLayer::SetNotifyReply(int nID, int nCode, int result)
- {
- if (!m_bBlocking)
- return;
- if (nID != m_nSslAsyncNotifyId)
- return;
- if (nCode != SSL_VERIFY_CERT)
- return;
- m_bBlocking = FALSE;
- if (!result)
- {
- m_nNetworkError = WSAECONNABORTED;
- WSASetLastError(WSAECONNABORTED);
- if (!m_bFailureSent)
- {
- m_bFailureSent = TRUE;
- DoLayerCallback(LAYERCALLBACK_LAYERSPECIFIC, SSL_FAILURE, SSL_FAILURE_CERTREJECTED);
- }
- TriggerEvent(FD_CLOSE, 0, TRUE);
- return;
- }
- m_bSslEstablished = TRUE;
- PrintSessionInfo();
- DoLayerCallback(LAYERCALLBACK_LAYERSPECIFIC, SSL_INFO, SSL_INFO_ESTABLISHED);
- TriggerEvents();
- }
- void CAsyncSslSocketLayer::PrintSessionInfo()
- {
- const SSL_CIPHER *ciph;
- X509 *cert;
- ciph = SSL_get_current_cipher(m_ssl);
- char enc[4096] = {0};
- cert=SSL_get_peer_certificate(m_ssl);
- if (cert != NULL)
- {
- EVP_PKEY *pkey = X509_get_pubkey(cert);
- if (pkey != NULL)
- {
- if (0)
- ;
- #ifndef NO_RSA
- else if (EVP_PKEY_id(pkey) == EVP_PKEY_RSA)
- sprintf(enc, "%d bit RSA", EVP_PKEY_bits(pkey));
- #endif
- #ifndef NO_DSA
- else if (EVP_PKEY_id(pkey) == EVP_PKEY_DSA)
- sprintf(enc, "%d bit DSA", EVP_PKEY_bits(pkey));
- #endif
- EVP_PKEY_free(pkey);
- }
- X509_free(cert);
- /* The SSL API does not allow us to look at temporary RSA/DH keys,
- * otherwise we should print their lengths too */
- }
- const int buffer_size = 4096;
- char *buffer = new char[buffer_size];
- char *buffer2 = new char[buffer_size];
- // see also ne_ssl_get_version and ne_ssl_get_cipher
- m_TlsVersionStr = SSL_get_version(m_ssl);
- sprintf(buffer, "%s: %s, %s, %s",
- SSL_CIPHER_get_version(ciph),
- SSL_CIPHER_get_name(ciph),
- enc,
- SSL_CIPHER_description(ciph, buffer2, buffer_size));
- m_CipherName = buffer;
- // see TWebDAVFileSystem::CollectTLSSessionInfo()
- sprintf(buffer, "Using %s, cipher %s",
- m_TlsVersionStr.c_str(),
- m_CipherName.c_str());
- USES_CONVERSION;
- LogSocketMessageRaw(FZ_LOG_PROGRESS, A2T(buffer));
- delete [] buffer;
- delete [] buffer2;
- }
- void CAsyncSslSocketLayer::OnConnect(int nErrorCode)
- {
- if (m_bUseSSL && nErrorCode)
- TriggerEvent(FD_WRITE, 0);
- TriggerEvent(FD_CONNECT, nErrorCode, TRUE);
- }
- CAsyncSslSocketLayer * CAsyncSslSocketLayer::LookupLayer(SSL * Ssl)
- {
- CAsyncSslSocketLayer * Result = NULL;
- t_SslLayerList * Cur = NULL;
- {
- TGuard Guard(m_sCriticalSection.get());
- Cur = m_pSslLayerList;
- while (Cur != NULL)
- {
- if (Cur->pLayer->m_ssl == Ssl)
- {
- break;
- }
- Cur = Cur->pNext;
- }
- }
- if (Cur == NULL)
- {
- MessageBox(0, L"Can't lookup TLS session!", L"Critical error", MB_ICONEXCLAMATION);
- Result = NULL;
- }
- else
- {
- Result = Cur->pLayer;
- }
- return Result;
- }
- int CAsyncSslSocketLayer::verify_callback(int preverify_ok, X509_STORE_CTX *ctx)
- {
- X509 *err_cert;
- int err, depth;
- SSL *ssl;
- err_cert = X509_STORE_CTX_get_current_cert(ctx);
- err = X509_STORE_CTX_get_error(ctx);
- depth = X509_STORE_CTX_get_error_depth(ctx);
- /*
- * Retrieve the pointer to the SSL of the connection currently treated
- * and the application specific data stored into the SSL object.
- */
- ssl = (SSL *)X509_STORE_CTX_get_ex_data(ctx, SSL_get_ex_data_X509_STORE_CTX_idx());
- CAsyncSslSocketLayer * pLayer = LookupLayer(ssl);
- if (pLayer == NULL)
- {
- return 1;
- }
- /*
- * Catch a too long certificate chain. The depth limit set using
- * SSL_CTX_set_verify_depth() is by purpose set to "limit+1" so
- * that whenever the "depth>verify_depth" condition is met, we
- * have violated the limit and want to log this error condition.
- * We must do it here, because the CHAIN_TOO_LONG error would not
- * be found explicitly; only errors introduced by cutting off the
- * additional certificates would be logged.
- */
- if (depth > 10) {//mydata->verify_depth) {
- preverify_ok = 0;
- err = X509_V_ERR_CERT_CHAIN_TOO_LONG;
- X509_STORE_CTX_set_error(ctx, err);
- }
- if (!preverify_ok)
- {
- if (!pLayer->m_nVerificationResult)
- {
- pLayer->m_nVerificationDepth = depth;
- pLayer->m_nVerificationResult = err;
- }
- }
- return 1;
- }
- int CAsyncSslSocketLayer::ProvideClientCert(
- SSL * Ssl, X509 ** Certificate, EVP_PKEY ** PrivateKey)
- {
- CAsyncSslSocketLayer * Layer = LookupLayer(Ssl);
- CString Message;
- Message.LoadString(NEED_CLIENT_CERTIFICATE);
- int Level;
- int Result;
- if ((Layer->FCertificate == NULL) || (Layer->FPrivateKey == NULL))
- {
- Level = FZ_LOG_WARNING;
- Result = 0;
- }
- else
- {
- Level = FZ_LOG_PROGRESS;
- *Certificate = X509_dup(Layer->FCertificate);
- EVP_PKEY_up_ref(Layer->FPrivateKey);
- *PrivateKey = Layer->FPrivateKey;
- Result = 1;
- }
- Layer->LogSocketMessageRaw(Level, static_cast<LPCTSTR>(Message));
- return Result;
- }
- void CAsyncSslSocketLayer::SetClientCertificate(X509 * Certificate, EVP_PKEY * PrivateKey)
- {
- FCertificate = Certificate;
- FPrivateKey = PrivateKey;
- }
- BOOL CAsyncSslSocketLayer::SetCertStorage(CString file)
- {
- m_CertStorage = file;
- return TRUE;
- }
- void CAsyncSslSocketLayer::OnClose(int nErrorCode)
- {
- m_onCloseCalled = true;
- if (m_bUseSSL)
- {
- size_t pending = BIO_ctrl_pending(m_sslbio);
- if (pending > 0)
- {
- TriggerEvents();
- }
- else TriggerEvent(FD_CLOSE, nErrorCode, TRUE);
- }
- else
- TriggerEvent(FD_CLOSE, nErrorCode, TRUE);
- }
- void CAsyncSslSocketLayer::PrintLastErrorMsg()
- {
- unsigned long err = ERR_get_error();
- while (err)
- {
- USES_CONVERSION;
- unsigned long aerr = err;
- err = ERR_get_error();
- char *buffer = new char[512];
- ERR_error_string(aerr, buffer);
- LogSocketMessageRaw(FZ_LOG_PROGRESS, A2T(buffer));
- delete [] buffer;
- std::wstring CustomReason = m_Tools->CustomReason(aerr);
- if (!CustomReason.empty())
- {
- LogSocketMessageRaw(FZ_LOG_WARNING, CustomReason.c_str());
- }
- else
- {
- UnicodeString S = GetTlsErrorStr(aerr);
- LogSocketMessageRaw(FZ_LOG_WARNING, S.c_str());
- }
- }
- }
- void CAsyncSslSocketLayer::TriggerEvents()
- {
- size_t pending = BIO_ctrl_pending(m_nbio);
- if (pending > 0)
- {
- if (m_mayTriggerWrite)
- {
- m_mayTriggerWrite = false;
- TriggerEvent(FD_WRITE, 0);
- }
- }
- else if (!m_nNetworkSendBufferLen && m_bSslEstablished && !m_pRetrySendBuffer)
- {
- if (BIO_ctrl_get_write_guarantee(m_sslbio) > 0 && m_mayTriggerWriteUp)
- {
- m_mayTriggerWriteUp = false;
- TriggerEvent(FD_WRITE, 0, TRUE);
- }
- }
- if (m_bSslEstablished && BIO_ctrl_pending(m_sslbio) > 0)
- {
- if (m_mayTriggerReadUp && !m_bBlocking)
- {
- m_mayTriggerReadUp = false;
- TriggerEvent(FD_READ, 0, TRUE);
- }
- }
- else
- {
- int len = BIO_ctrl_get_write_guarantee(m_nbio);
- if (len > 0 && m_mayTriggerRead)
- {
- m_mayTriggerRead = false;
- TriggerEvent(FD_READ, 0);
- }
- }
- if (m_onCloseCalled && m_bSslEstablished)
- {
- if (BIO_ctrl_pending(m_sslbio) <= 0)
- {
- TriggerEvent(FD_CLOSE, 0, TRUE);
- }
- }
- }
- //---------------------------------------------------------------------------
|