FFFTPのソースコードです。
Revision | 175c75a24be78d407364d9ecd0af478f743d4fd0 (tree) |
---|---|
Time | 2017-01-28 20:26:25 |
Author | s_kawamoto <s_kawamoto@user...> |
Commiter | s_kawamoto |
Update OpenSSL to 1.1.0d.
@@ -242,7 +242,7 @@ FONT 9, "MS Shell Dlg", 0, 0, 0x0 | ||
242 | 242 | BEGIN |
243 | 243 | DEFPUSHBUTTON "OK",IDOK,133,294,50,14 |
244 | 244 | ICON ffftp,-1,7,4,20,20 |
245 | - CTEXT "FFFTP Ver 1.99a-20170122",-1,113,11,90,8 | |
245 | + CTEXT "FFFTP Ver 1.99a-20170128",-1,113,11,90,8 | |
246 | 246 | CTEXT "FFFTPはfreewareです",-1,7,279,305,8 |
247 | 247 | CTEXT "Copyright(C) 1997-2010 Sota & ご協力いただいた方々\nCopyright (C) 2011-2017 FFFTP Project (Hiromichi Matsushima, Suguru Kawamoto, IWAMOTO Kouichi, vitamin0x, うなー, Asami, fortran90, tomo1192, Yuji Tanaka, Moriguchi Hirokazu, ふうせん)",-1,7,25,305,44,SS_NOPREFIX |
248 | 248 | CTEXT "",ABOUT_JRE,7,96,305,8 |
@@ -2213,8 +2213,8 @@ nodrop_csr CURSOR "nodrop_c.cur" | ||
2213 | 2213 | // |
2214 | 2214 | |
2215 | 2215 | VS_VERSION_INFO VERSIONINFO |
2216 | - FILEVERSION 1,99,1,9 | |
2217 | - PRODUCTVERSION 1,99,1,9 | |
2216 | + FILEVERSION 1,99,1,10 | |
2217 | + PRODUCTVERSION 1,99,1,10 | |
2218 | 2218 | FILEFLAGSMASK 0x3fL |
2219 | 2219 | #ifdef _DEBUG |
2220 | 2220 | FILEFLAGS 0x1L |
@@ -2232,12 +2232,12 @@ BEGIN | ||
2232 | 2232 | VALUE "Comments", "これはフリーソフトウエアです。" |
2233 | 2233 | VALUE "CompanyName", "Sota, FFFTP Project" |
2234 | 2234 | VALUE "FileDescription", "FFFTP" |
2235 | - VALUE "FileVersion", "1, 99, 1, 9" | |
2235 | + VALUE "FileVersion", "1, 99, 1, 10" | |
2236 | 2236 | VALUE "InternalName", "FFFTP" |
2237 | 2237 | VALUE "LegalCopyright", "Copyright (C) 1997-2010 Sota & ご協力いただいた方々\nCopyright (C) 2011-2017 FFFTP Project (Hiromichi Matsushima, Suguru Kawamoto, IWAMOTO Kouichi, vitamin0x, うなー, Asami, fortran90, tomo1192, Yuji Tanaka, Moriguchi Hirokazu, ふうせん)." |
2238 | 2238 | VALUE "OriginalFilename", "FFFTP.exe" |
2239 | 2239 | VALUE "ProductName", "FFFTP" |
2240 | - VALUE "ProductVersion", "1, 99, 1, 9" | |
2240 | + VALUE "ProductVersion", "1, 99, 1, 10" | |
2241 | 2241 | END |
2242 | 2242 | END |
2243 | 2243 | BLOCK "VarFileInfo" |
@@ -242,7 +242,7 @@ FONT 9, "MS Shell Dlg", 0, 0, 0x0 | ||
242 | 242 | BEGIN |
243 | 243 | DEFPUSHBUTTON "OK",IDOK,132,296,50,14 |
244 | 244 | ICON ffftp,-1,7,4,20,20 |
245 | - CTEXT "FFFTP Ver 1.99a-20170122",-1,110,11,90,8 | |
245 | + CTEXT "FFFTP Ver 1.99a-20170128",-1,110,11,90,8 | |
246 | 246 | CTEXT "FFFTP is freeware",-1,7,281,301,8 |
247 | 247 | CTEXT "Copyright(C) 1997-2010 Sota && cooperators\nCopyright (C) 2011-2017 FFFTP Project (Hiromichi Matsushima, Suguru Kawamoto, IWAMOTO Kouichi, vitamin0x, unarist, Asami, fortran90, tomo1192, Yuji Tanaka, Moriguchi Hirokazu, Fu-sen)",-1,7,25,301,44 |
248 | 248 | CTEXT "",ABOUT_JRE,7,93,301,8 |
@@ -2253,8 +2253,8 @@ nodrop_csr CURSOR "nodrop_c.cur" | ||
2253 | 2253 | // |
2254 | 2254 | |
2255 | 2255 | VS_VERSION_INFO VERSIONINFO |
2256 | - FILEVERSION 1,99,1,9 | |
2257 | - PRODUCTVERSION 1,99,1,9 | |
2256 | + FILEVERSION 1,99,1,10 | |
2257 | + PRODUCTVERSION 1,99,1,10 | |
2258 | 2258 | FILEFLAGSMASK 0x3fL |
2259 | 2259 | #ifdef _DEBUG |
2260 | 2260 | FILEFLAGS 0x1L |
@@ -2272,12 +2272,12 @@ BEGIN | ||
2272 | 2272 | VALUE "Comments", "This software is Free Software" |
2273 | 2273 | VALUE "CompanyName", "Sota, FFFTP Project" |
2274 | 2274 | VALUE "FileDescription", "FFFTP" |
2275 | - VALUE "FileVersion", "1, 99, 1, 9" | |
2275 | + VALUE "FileVersion", "1, 99, 1, 10" | |
2276 | 2276 | VALUE "InternalName", "FFFTP" |
2277 | 2277 | VALUE "LegalCopyright", "Copyright (C) 1997-2010 Sota & cooperators\nCopyright (C) 2011-2017 FFFTP Project (Hiromichi Matsushima, Suguru Kawamoto, IWAMOTO Kouichi, vitamin0x, unarist, Asami, fortran90, tomo1192, Yuji Tanaka, Moriguchi Hirokazu, Fu-sen)." |
2278 | 2278 | VALUE "OriginalFilename", "FFFTP.exe" |
2279 | 2279 | VALUE "ProductName", "FFFTP" |
2280 | - VALUE "ProductVersion", "1, 99, 1, 9" | |
2280 | + VALUE "ProductVersion", "1, 99, 1, 10" | |
2281 | 2281 | END |
2282 | 2282 | END |
2283 | 2283 | BLOCK "VarFileInfo" |
@@ -72,16 +72,16 @@ | ||
72 | 72 | //#define PROGRAM_VERSION_NUM 1972 /* バージョン */ |
73 | 73 | // 64ビット対応 |
74 | 74 | #ifdef _WIN64 |
75 | -#define VER_STR "1.99a-20170122 64bit" | |
75 | +#define VER_STR "1.99a-20170128 64bit" | |
76 | 76 | #else |
77 | -#define VER_STR "1.99a-20170122" | |
77 | +#define VER_STR "1.99a-20170128" | |
78 | 78 | #endif |
79 | 79 | #define VER_NUM 1990 /* 設定バージョン */ |
80 | 80 | #define PROGRAM_VERSION_NUM 1990 /* バージョン */ |
81 | 81 | // ソフトウェア自動更新 |
82 | 82 | // リリースバージョンはリリース予定年(10進数4桁)+月(2桁)+日(2桁)+通し番号(0スタート2桁)とする |
83 | 83 | // 2014年7月31日中の30個目のリリースは2014073129 |
84 | -#define RELEASE_VERSION_NUM 2017012200 /* リリースバージョン */ | |
84 | +#define RELEASE_VERSION_NUM 2017012800 /* リリースバージョン */ | |
85 | 85 | |
86 | 86 | |
87 | 87 | // SourceForge.JPによるフォーク |
@@ -2,6 +2,49 @@ | ||
2 | 2 | OpenSSL CHANGES |
3 | 3 | _______________ |
4 | 4 | |
5 | + Changes between 1.1.0c and 1.1.0d [26 Jan 2017] | |
6 | + | |
7 | + *) Truncated packet could crash via OOB read | |
8 | + | |
9 | + If one side of an SSL/TLS path is running on a 32-bit host and a specific | |
10 | + cipher is being used, then a truncated packet can cause that host to | |
11 | + perform an out-of-bounds read, usually resulting in a crash. | |
12 | + | |
13 | + This issue was reported to OpenSSL by Robert Święcki of Google. | |
14 | + (CVE-2017-3731) | |
15 | + [Andy Polyakov] | |
16 | + | |
17 | + *) Bad (EC)DHE parameters cause a client crash | |
18 | + | |
19 | + If a malicious server supplies bad parameters for a DHE or ECDHE key | |
20 | + exchange then this can result in the client attempting to dereference a | |
21 | + NULL pointer leading to a client crash. This could be exploited in a Denial | |
22 | + of Service attack. | |
23 | + | |
24 | + This issue was reported to OpenSSL by Guido Vranken. | |
25 | + (CVE-2017-3730) | |
26 | + [Matt Caswell] | |
27 | + | |
28 | + *) BN_mod_exp may produce incorrect results on x86_64 | |
29 | + | |
30 | + There is a carry propagating bug in the x86_64 Montgomery squaring | |
31 | + procedure. No EC algorithms are affected. Analysis suggests that attacks | |
32 | + against RSA and DSA as a result of this defect would be very difficult to | |
33 | + perform and are not believed likely. Attacks against DH are considered just | |
34 | + feasible (although very difficult) because most of the work necessary to | |
35 | + deduce information about a private key may be performed offline. The amount | |
36 | + of resources required for such an attack would be very significant and | |
37 | + likely only accessible to a limited number of attackers. An attacker would | |
38 | + additionally need online access to an unpatched system using the target | |
39 | + private key in a scenario with persistent DH parameters and a private | |
40 | + key that is shared between multiple clients. For example this can occur by | |
41 | + default in OpenSSL DHE based SSL/TLS ciphersuites. Note: This issue is very | |
42 | + similar to CVE-2015-3193 but must be treated as a separate problem. | |
43 | + | |
44 | + This issue was reported to OpenSSL by the OSS-Fuzz project. | |
45 | + (CVE-2017-3732) | |
46 | + [Andy Polyakov] | |
47 | + | |
5 | 48 | Changes between 1.1.0b and 1.1.0c [10 Nov 2016] |
6 | 49 | |
7 | 50 | *) ChaCha20/Poly1305 heap-buffer-overflow |
@@ -5,6 +5,12 @@ | ||
5 | 5 | This file gives a brief overview of the major changes between each OpenSSL |
6 | 6 | release. For more details please read the CHANGES file. |
7 | 7 | |
8 | + Major changes between OpenSSL 1.1.0c and OpenSSL 1.1.0d [26 Jan 2017] | |
9 | + | |
10 | + o Truncated packet could crash via OOB read (CVE-2017-3731) | |
11 | + o Bad (EC)DHE parameters cause a client crash (CVE-2017-3730) | |
12 | + o BN_mod_exp may produce incorrect results on x86_64 (CVE-2017-3732) | |
13 | + | |
8 | 14 | Major changes between OpenSSL 1.1.0b and OpenSSL 1.1.0c [10 Nov 2016] |
9 | 15 | |
10 | 16 | o ChaCha20/Poly1305 heap-buffer-overflow (CVE-2016-7054) |
@@ -1,5 +1,5 @@ | ||
1 | 1 | |
2 | - OpenSSL 1.1.0c 10 Nov 2016 | |
2 | + OpenSSL 1.1.0d 26 Jan 2017 | |
3 | 3 | |
4 | 4 | Copyright (c) 1998-2016 The OpenSSL Project |
5 | 5 | Copyright (c) 1995-1998 Eric A. Young, Tim J. Hudson |
@@ -98,6 +98,21 @@ const CTLOG_STORE *CT_POLICY_EVAL_CTX_get0_log_store(const CT_POLICY_EVAL_CTX *c | ||
98 | 98 | void CT_POLICY_EVAL_CTX_set_shared_CTLOG_STORE(CT_POLICY_EVAL_CTX *ctx, |
99 | 99 | CTLOG_STORE *log_store); |
100 | 100 | |
101 | +/* | |
102 | + * Gets the time, in milliseconds since the Unix epoch, that will be used as the | |
103 | + * current time when checking whether an SCT was issued in the future. | |
104 | + * Such SCTs will fail validation, as required by RFC6962. | |
105 | + */ | |
106 | +uint64_t CT_POLICY_EVAL_CTX_get_time(const CT_POLICY_EVAL_CTX *ctx); | |
107 | + | |
108 | +/* | |
109 | + * Sets the time to evaluate SCTs against, in milliseconds since the Unix epoch. | |
110 | + * If an SCT's timestamp is after this time, it will be interpreted as having | |
111 | + * been issued in the future. RFC6962 states that "TLS clients MUST reject SCTs | |
112 | + * whose timestamp is in the future", so an SCT will not validate in this case. | |
113 | + */ | |
114 | +void CT_POLICY_EVAL_CTX_set_time(CT_POLICY_EVAL_CTX *ctx, uint64_t time_in_ms); | |
115 | + | |
101 | 116 | /***************** |
102 | 117 | * SCT functions * |
103 | 118 | *****************/ |
@@ -467,7 +482,6 @@ int ERR_load_CT_strings(void); | ||
467 | 482 | # define CT_F_CTLOG_NEW 117 |
468 | 483 | # define CT_F_CTLOG_NEW_FROM_BASE64 118 |
469 | 484 | # define CT_F_CTLOG_NEW_FROM_CONF 119 |
470 | -# define CT_F_CTLOG_NEW_NULL 120 | |
471 | 485 | # define CT_F_CTLOG_STORE_LOAD_CTX_NEW 122 |
472 | 486 | # define CT_F_CTLOG_STORE_LOAD_FILE 123 |
473 | 487 | # define CT_F_CTLOG_STORE_LOAD_LOG 130 |
@@ -482,6 +496,7 @@ int ERR_load_CT_strings(void); | ||
482 | 496 | # define CT_F_O2I_SCT_LIST 111 |
483 | 497 | # define CT_F_O2I_SCT_SIGNATURE 112 |
484 | 498 | # define CT_F_SCT_CTX_NEW 126 |
499 | +# define CT_F_SCT_CTX_VERIFY 128 | |
485 | 500 | # define CT_F_SCT_NEW 100 |
486 | 501 | # define CT_F_SCT_NEW_FROM_BASE64 127 |
487 | 502 | # define CT_F_SCT_SET0_LOG_ID 101 |
@@ -491,7 +506,6 @@ int ERR_load_CT_strings(void); | ||
491 | 506 | # define CT_F_SCT_SET_LOG_ENTRY_TYPE 102 |
492 | 507 | # define CT_F_SCT_SET_SIGNATURE_NID 103 |
493 | 508 | # define CT_F_SCT_SET_VERSION 104 |
494 | -# define CT_F_SCT_CTX_VERIFY 128 | |
495 | 509 | |
496 | 510 | /* Reason codes. */ |
497 | 511 | # define CT_R_BASE64_DECODE_ERROR 108 |
@@ -501,6 +515,7 @@ int ERR_load_CT_strings(void); | ||
501 | 515 | # define CT_R_LOG_CONF_MISSING_DESCRIPTION 111 |
502 | 516 | # define CT_R_LOG_CONF_MISSING_KEY 112 |
503 | 517 | # define CT_R_LOG_KEY_INVALID 113 |
518 | +# define CT_R_SCT_FUTURE_TIMESTAMP 116 | |
504 | 519 | # define CT_R_SCT_INVALID 104 |
505 | 520 | # define CT_R_SCT_INVALID_SIGNATURE 107 |
506 | 521 | # define CT_R_SCT_LIST_INVALID 105 |
@@ -124,6 +124,7 @@ DEPRECATEDIN_0_9_8(DH *DH_generate_parameters(int prime_len, int generator, | ||
124 | 124 | int DH_generate_parameters_ex(DH *dh, int prime_len, int generator, |
125 | 125 | BN_GENCB *cb); |
126 | 126 | |
127 | +int DH_check_params(const DH *dh, int *ret); | |
127 | 128 | int DH_check(const DH *dh, int *codes); |
128 | 129 | int DH_check_pub_key(const DH *dh, const BIGNUM *pub_key, int *codes); |
129 | 130 | int DH_generate_key(DH *dh); |
@@ -274,6 +274,7 @@ int ERR_load_DSA_strings(void); | ||
274 | 274 | # define DSA_R_NO_PARAMETERS_SET 107 |
275 | 275 | # define DSA_R_PARAMETER_ENCODING_ERROR 105 |
276 | 276 | # define DSA_R_Q_NOT_PRIME 113 |
277 | +# define DSA_R_SEED_LEN_SMALL 110 | |
277 | 278 | |
278 | 279 | # ifdef __cplusplus |
279 | 280 | } |
@@ -334,8 +334,6 @@ ENGINE *ENGINE_by_id(const char *id); | ||
334 | 334 | OPENSSL_init_crypto(OPENSSL_INIT_ENGINE_PADLOCK, NULL) |
335 | 335 | # define ENGINE_load_capi() \ |
336 | 336 | OPENSSL_init_crypto(OPENSSL_INIT_ENGINE_CAPI, NULL) |
337 | -# define ENGINE_load_dasync() \ | |
338 | - OPENSSL_init_crypto(OPENSSL_INIT_ENGINE_DASYNC, NULL) | |
339 | 337 | # define ENGINE_load_afalg() \ |
340 | 338 | OPENSSL_init_crypto(OPENSSL_INIT_ENGINE_AFALG, NULL) |
341 | 339 | # endif |
@@ -89,7 +89,7 @@ typedef struct err_state_st { | ||
89 | 89 | # define ERR_LIB_CMS 46 |
90 | 90 | # define ERR_LIB_TS 47 |
91 | 91 | # define ERR_LIB_HMAC 48 |
92 | -# define ERR_LIB_JPAKE 49 | |
92 | +/* # define ERR_LIB_JPAKE 49 */ | |
93 | 93 | # define ERR_LIB_CT 50 |
94 | 94 | # define ERR_LIB_ASYNC 51 |
95 | 95 | # define ERR_LIB_KDF 52 |
@@ -128,7 +128,6 @@ typedef struct err_state_st { | ||
128 | 128 | # define CMSerr(f,r) ERR_PUT_error(ERR_LIB_CMS,(f),(r),OPENSSL_FILE,OPENSSL_LINE) |
129 | 129 | # define TSerr(f,r) ERR_PUT_error(ERR_LIB_TS,(f),(r),OPENSSL_FILE,OPENSSL_LINE) |
130 | 130 | # define HMACerr(f,r) ERR_PUT_error(ERR_LIB_HMAC,(f),(r),OPENSSL_FILE,OPENSSL_LINE) |
131 | -# define JPAKEerr(f,r) ERR_PUT_error(ERR_LIB_JPAKE,(f),(r),OPENSSL_FILE,OPENSSL_LINE) | |
132 | 131 | # define CTerr(f,r) ERR_PUT_error(ERR_LIB_CT,(f),(r),OPENSSL_FILE,OPENSSL_LINE) |
133 | 132 | # define ASYNCerr(f,r) ERR_PUT_error(ERR_LIB_ASYNC,(f),(r),OPENSSL_FILE,OPENSSL_LINE) |
134 | 133 | # define KDFerr(f,r) ERR_PUT_error(ERR_LIB_KDF,(f),(r),OPENSSL_FILE,OPENSSL_LINE) |
@@ -140,6 +139,7 @@ typedef struct err_state_st { | ||
140 | 139 | # define ERR_GET_LIB(l) (int)(((l) >> 24L) & 0x0FFL) |
141 | 140 | # define ERR_GET_FUNC(l) (int)(((l) >> 12L) & 0xFFFL) |
142 | 141 | # define ERR_GET_REASON(l) (int)( (l) & 0xFFFL) |
142 | +# define ERR_FATAL_ERROR(l) (int)( (l) & ERR_R_FATAL) | |
143 | 143 | |
144 | 144 | /* OS functions */ |
145 | 145 | # define SYS_F_FOPEN 1 |
@@ -1455,11 +1455,14 @@ int ERR_load_EVP_strings(void); | ||
1455 | 1455 | /* Function codes. */ |
1456 | 1456 | # define EVP_F_AESNI_INIT_KEY 165 |
1457 | 1457 | # define EVP_F_AES_INIT_KEY 133 |
1458 | +# define EVP_F_AES_OCB_CIPHER 169 | |
1458 | 1459 | # define EVP_F_AES_T4_INIT_KEY 178 |
1460 | +# define EVP_F_AES_WRAP_CIPHER 170 | |
1459 | 1461 | # define EVP_F_ALG_MODULE_INIT 177 |
1460 | 1462 | # define EVP_F_CAMELLIA_INIT_KEY 159 |
1461 | 1463 | # define EVP_F_CHACHA20_POLY1305_CTRL 182 |
1462 | 1464 | # define EVP_F_CMLL_T4_INIT_KEY 179 |
1465 | +# define EVP_F_DES_EDE3_WRAP_CIPHER 171 | |
1463 | 1466 | # define EVP_F_DO_SIGVER_INIT 161 |
1464 | 1467 | # define EVP_F_EVP_CIPHERINIT_EX 123 |
1465 | 1468 | # define EVP_F_EVP_CIPHER_CTX_COPY 163 |
@@ -1546,6 +1549,7 @@ int ERR_load_EVP_strings(void); | ||
1546 | 1549 | # define EVP_R_INPUT_NOT_INITIALIZED 111 |
1547 | 1550 | # define EVP_R_INVALID_DIGEST 152 |
1548 | 1551 | # define EVP_R_INVALID_FIPS_MODE 168 |
1552 | +# define EVP_R_INVALID_KEY 163 | |
1549 | 1553 | # define EVP_R_INVALID_KEY_LENGTH 130 |
1550 | 1554 | # define EVP_R_INVALID_OPERATION 148 |
1551 | 1555 | # define EVP_R_KEYGEN_FAILURE 120 |
@@ -1568,12 +1572,12 @@ int ERR_load_EVP_strings(void); | ||
1568 | 1572 | # define EVP_R_UNKNOWN_DIGEST 161 |
1569 | 1573 | # define EVP_R_UNKNOWN_OPTION 169 |
1570 | 1574 | # define EVP_R_UNKNOWN_PBE_ALGORITHM 121 |
1571 | -# define EVP_R_UNSUPPORTED_NUMBER_OF_ROUNDS 135 | |
1572 | 1575 | # define EVP_R_UNSUPPORTED_ALGORITHM 156 |
1573 | 1576 | # define EVP_R_UNSUPPORTED_CIPHER 107 |
1574 | 1577 | # define EVP_R_UNSUPPORTED_KEYLENGTH 123 |
1575 | 1578 | # define EVP_R_UNSUPPORTED_KEY_DERIVATION_FUNCTION 124 |
1576 | 1579 | # define EVP_R_UNSUPPORTED_KEY_SIZE 108 |
1580 | +# define EVP_R_UNSUPPORTED_NUMBER_OF_ROUNDS 135 | |
1577 | 1581 | # define EVP_R_UNSUPPORTED_PRF 125 |
1578 | 1582 | # define EVP_R_UNSUPPORTED_PRIVATE_KEY_ALGORITHM 118 |
1579 | 1583 | # define EVP_R_UNSUPPORTED_SALT_TYPE 126 |
@@ -39,11 +39,11 @@ extern "C" { | ||
39 | 39 | * (Prior to 0.9.5a beta1, a different scheme was used: MMNNFFRBB for |
40 | 40 | * major minor fix final patch/beta) |
41 | 41 | */ |
42 | -# define OPENSSL_VERSION_NUMBER 0x1010003fL | |
42 | +# define OPENSSL_VERSION_NUMBER 0x1010004fL | |
43 | 43 | # ifdef OPENSSL_FIPS |
44 | -# define OPENSSL_VERSION_TEXT "OpenSSL 1.1.0c-fips 10 Nov 2016" | |
44 | +# define OPENSSL_VERSION_TEXT "OpenSSL 1.1.0d-fips 26 Jan 2017" | |
45 | 45 | # else |
46 | -# define OPENSSL_VERSION_TEXT "OpenSSL 1.1.0c 10 Nov 2016" | |
46 | +# define OPENSSL_VERSION_TEXT "OpenSSL 1.1.0d 26 Jan 2017" | |
47 | 47 | # endif |
48 | 48 | |
49 | 49 | /*- |
@@ -468,6 +468,7 @@ int ERR_load_RSA_strings(void); | ||
468 | 468 | # define RSA_F_PKEY_RSA_CTRL 143 |
469 | 469 | # define RSA_F_PKEY_RSA_CTRL_STR 144 |
470 | 470 | # define RSA_F_PKEY_RSA_SIGN 142 |
471 | +# define RSA_F_PKEY_RSA_VERIFY 149 | |
471 | 472 | # define RSA_F_PKEY_RSA_VERIFYRECOVER 141 |
472 | 473 | # define RSA_F_RSA_ALGOR_TO_MD 156 |
473 | 474 | # define RSA_F_RSA_BUILTIN_KEYGEN 129 |
@@ -262,6 +262,9 @@ typedef int (*custom_ext_parse_cb) (SSL *s, unsigned int ext_type, | ||
262 | 262 | const unsigned char *in, |
263 | 263 | size_t inlen, int *al, void *parse_arg); |
264 | 264 | |
265 | +/* Typedef for verification callback */ | |
266 | +typedef int (*SSL_verify_cb)(int preverify_ok, X509_STORE_CTX *x509_ctx); | |
267 | + | |
265 | 268 | /* Allow initial connection to servers that don't support RI */ |
266 | 269 | # define SSL_OP_LEGACY_SERVER_CONNECT 0x00000004U |
267 | 270 | /* Removed from OpenSSL 0.9.8q and 1.0.0c */ |
@@ -1241,7 +1244,7 @@ DECLARE_PEM_rw(SSL_SESSION, SSL_SESSION) | ||
1241 | 1244 | # define SSL_CTX_set1_sigalgs_list(ctx, s) \ |
1242 | 1245 | SSL_CTX_ctrl(ctx,SSL_CTRL_SET_SIGALGS_LIST,0,(char *)s) |
1243 | 1246 | # define SSL_set1_sigalgs(ctx, slist, slistlen) \ |
1244 | - SSL_ctrl(ctx,SSL_CTRL_SET_SIGALGS,clistlen,(int *)slist) | |
1247 | + SSL_ctrl(ctx,SSL_CTRL_SET_SIGALGS,slistlen,(int *)slist) | |
1245 | 1248 | # define SSL_set1_sigalgs_list(ctx, s) \ |
1246 | 1249 | SSL_ctrl(ctx,SSL_CTRL_SET_SIGALGS_LIST,0,(char *)s) |
1247 | 1250 | # define SSL_CTX_set1_client_sigalgs(ctx, slist, slistlen) \ |
@@ -1342,9 +1345,8 @@ __owur int SSL_set_cipher_list(SSL *s, const char *str); | ||
1342 | 1345 | void SSL_set_read_ahead(SSL *s, int yes); |
1343 | 1346 | __owur int SSL_get_verify_mode(const SSL *s); |
1344 | 1347 | __owur int SSL_get_verify_depth(const SSL *s); |
1345 | -__owur int (*SSL_get_verify_callback(const SSL *s)) (int, X509_STORE_CTX *); | |
1346 | -void SSL_set_verify(SSL *s, int mode, | |
1347 | - int (*callback) (int ok, X509_STORE_CTX *ctx)); | |
1348 | +__owur SSL_verify_cb SSL_get_verify_callback(const SSL *s); | |
1349 | +void SSL_set_verify(SSL *s, int mode, SSL_verify_cb callback); | |
1348 | 1350 | void SSL_set_verify_depth(SSL *s, int depth); |
1349 | 1351 | void SSL_set_cert_cb(SSL *s, int (*cb) (SSL *ssl, void *arg), void *arg); |
1350 | 1352 | # ifndef OPENSSL_NO_RSA |
@@ -1443,10 +1445,8 @@ __owur STACK_OF(X509) *SSL_get_peer_cert_chain(const SSL *s); | ||
1443 | 1445 | |
1444 | 1446 | __owur int SSL_CTX_get_verify_mode(const SSL_CTX *ctx); |
1445 | 1447 | __owur int SSL_CTX_get_verify_depth(const SSL_CTX *ctx); |
1446 | -__owur int (*SSL_CTX_get_verify_callback(const SSL_CTX *ctx)) (int, | |
1447 | - X509_STORE_CTX *); | |
1448 | -void SSL_CTX_set_verify(SSL_CTX *ctx, int mode, | |
1449 | - int (*callback) (int, X509_STORE_CTX *)); | |
1448 | +__owur SSL_verify_cb SSL_CTX_get_verify_callback(const SSL_CTX *ctx); | |
1449 | +void SSL_CTX_set_verify(SSL_CTX *ctx, int mode, SSL_verify_cb callback); | |
1450 | 1450 | void SSL_CTX_set_verify_depth(SSL_CTX *ctx, int depth); |
1451 | 1451 | void SSL_CTX_set_cert_verify_callback(SSL_CTX *ctx, |
1452 | 1452 | int (*cb) (X509_STORE_CTX *, void *), |
@@ -1777,6 +1777,8 @@ void SSL_set_tmp_dh_callback(SSL *ssl, | ||
1777 | 1777 | __owur const COMP_METHOD *SSL_get_current_compression(SSL *s); |
1778 | 1778 | __owur const COMP_METHOD *SSL_get_current_expansion(SSL *s); |
1779 | 1779 | __owur const char *SSL_COMP_get_name(const COMP_METHOD *comp); |
1780 | +__owur const char *SSL_COMP_get0_name(const SSL_COMP *comp); | |
1781 | +__owur int SSL_COMP_get_id(const SSL_COMP *comp); | |
1780 | 1782 | STACK_OF(SSL_COMP) *SSL_COMP_get_compression_methods(void); |
1781 | 1783 | __owur STACK_OF(SSL_COMP) *SSL_COMP_set0_compression_methods(STACK_OF(SSL_COMP) |
1782 | 1784 | *meths); |
@@ -339,8 +339,12 @@ int ERR_load_UI_strings(void); | ||
339 | 339 | /* Error codes for the UI functions. */ |
340 | 340 | |
341 | 341 | /* Function codes. */ |
342 | +# define UI_F_CLOSE_CONSOLE 115 | |
343 | +# define UI_F_ECHO_CONSOLE 116 | |
342 | 344 | # define UI_F_GENERAL_ALLOCATE_BOOLEAN 108 |
343 | 345 | # define UI_F_GENERAL_ALLOCATE_PROMPT 109 |
346 | +# define UI_F_NOECHO_CONSOLE 117 | |
347 | +# define UI_F_OPEN_CONSOLE 114 | |
344 | 348 | # define UI_F_UI_CREATE_METHOD 112 |
345 | 349 | # define UI_F_UI_CTRL 111 |
346 | 350 | # define UI_F_UI_DUP_ERROR_STRING 101 |
@@ -350,6 +354,7 @@ int ERR_load_UI_strings(void); | ||
350 | 354 | # define UI_F_UI_DUP_VERIFY_STRING 106 |
351 | 355 | # define UI_F_UI_GET0_RESULT 107 |
352 | 356 | # define UI_F_UI_NEW_METHOD 104 |
357 | +# define UI_F_UI_PROCESS 113 | |
353 | 358 | # define UI_F_UI_SET_RESULT 105 |
354 | 359 | |
355 | 360 | /* Reason codes. */ |
@@ -357,9 +362,14 @@ int ERR_load_UI_strings(void); | ||
357 | 362 | # define UI_R_INDEX_TOO_LARGE 102 |
358 | 363 | # define UI_R_INDEX_TOO_SMALL 103 |
359 | 364 | # define UI_R_NO_RESULT_BUFFER 105 |
365 | +# define UI_R_PROCESSING_ERROR 107 | |
360 | 366 | # define UI_R_RESULT_TOO_LARGE 100 |
361 | 367 | # define UI_R_RESULT_TOO_SMALL 101 |
368 | +# define UI_R_SYSASSIGN_ERROR 109 | |
369 | +# define UI_R_SYSDASSGN_ERROR 110 | |
370 | +# define UI_R_SYSQIOW_ERROR 111 | |
362 | 371 | # define UI_R_UNKNOWN_CONTROL_COMMAND 106 |
372 | +# define UI_R_UNKNOWN_TTYGET_ERRNO_VALUE 108 | |
363 | 373 | |
364 | 374 | # ifdef __cplusplus |
365 | 375 | } |
@@ -272,6 +272,7 @@ int X509_STORE_set_purpose(X509_STORE *ctx, int purpose); | ||
272 | 272 | int X509_STORE_set_trust(X509_STORE *ctx, int trust); |
273 | 273 | int X509_STORE_set1_param(X509_STORE *ctx, X509_VERIFY_PARAM *pm); |
274 | 274 | X509_VERIFY_PARAM *X509_STORE_get0_param(X509_STORE *ctx); |
275 | +int X509_STORE_set_flags(X509_STORE *ctx, unsigned long flags); | |
275 | 276 | |
276 | 277 | void X509_STORE_set_verify(X509_STORE *ctx, X509_STORE_CTX_verify_fn verify); |
277 | 278 | #define X509_STORE_set_verify_func(ctx, func) \ |
@@ -458,12 +459,17 @@ int X509_VERIFY_PARAM_set_purpose(X509_VERIFY_PARAM *param, int purpose); | ||
458 | 459 | int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust); |
459 | 460 | void X509_VERIFY_PARAM_set_depth(X509_VERIFY_PARAM *param, int depth); |
460 | 461 | void X509_VERIFY_PARAM_set_auth_level(X509_VERIFY_PARAM *param, int auth_level); |
462 | +time_t X509_VERIFY_PARAM_get_time(const X509_VERIFY_PARAM *param); | |
461 | 463 | void X509_VERIFY_PARAM_set_time(X509_VERIFY_PARAM *param, time_t t); |
462 | 464 | int X509_VERIFY_PARAM_add0_policy(X509_VERIFY_PARAM *param, |
463 | 465 | ASN1_OBJECT *policy); |
464 | 466 | int X509_VERIFY_PARAM_set1_policies(X509_VERIFY_PARAM *param, |
465 | 467 | STACK_OF(ASN1_OBJECT) *policies); |
466 | 468 | |
469 | +int X509_VERIFY_PARAM_set_inh_flags(X509_VERIFY_PARAM *param, | |
470 | + uint32_t flags); | |
471 | +uint32_t X509_VERIFY_PARAM_get_inh_flags(const X509_VERIFY_PARAM *param); | |
472 | + | |
467 | 473 | int X509_VERIFY_PARAM_set1_host(X509_VERIFY_PARAM *param, |
468 | 474 | const char *name, size_t namelen); |
469 | 475 | int X509_VERIFY_PARAM_add1_host(X509_VERIFY_PARAM *param, |
@@ -5,13 +5,13 @@ | ||
5 | 5 | #define FILEHASH_SSL_PEM_SHA1 "\x66\xFC\xD7\x16\xFE\x1A\xBB\x86\x1B\xFD\x8B\x10\x86\x55\x16\x4B\x92\xD5\x74\x89" |
6 | 6 | #if defined(_M_IX86) |
7 | 7 | // libeay32.dll |
8 | -#define FILEHASH_LIBEAY32_DLL_SHA1 "\x53\xFA\xD4\x49\xA9\x0C\x9C\x7F\xF8\xE2\x5D\x0A\x76\x65\xE6\xA6\x95\x3A\x8B\x24" | |
8 | +#define FILEHASH_LIBEAY32_DLL_SHA1 "\xB7\xDF\x62\x64\x89\xB8\x9F\x72\x2E\x95\x14\xD8\xDC\xEB\x96\xED\x65\x91\x3A\x04" | |
9 | 9 | // ssleay32.dll |
10 | -#define FILEHASH_SSLEAY32_DLL_SHA1 "\x95\x72\x97\x6C\x58\x47\x65\xA5\x58\x26\xCB\xC9\xBF\x14\x1E\x74\xA8\x8B\x25\xCD" | |
10 | +#define FILEHASH_SSLEAY32_DLL_SHA1 "\x17\x8E\x4E\x55\x08\x11\xF4\x74\x5A\x75\xD0\x11\x69\x3A\x39\x81\x0D\x85\x9D\x06" | |
11 | 11 | #elif defined(_M_AMD64) |
12 | 12 | // libeay32.dll |
13 | -#define FILEHASH_LIBEAY32_DLL_SHA1 "\xE9\xD5\x06\xAD\x1F\xA1\x36\x54\xAB\xEB\x6F\x7D\xB8\x1A\xBD\xCB\x02\xB2\xAA\x62" | |
13 | +#define FILEHASH_LIBEAY32_DLL_SHA1 "\x1D\xE9\x3B\x1C\x1D\x36\x61\xF4\xE2\xC3\x11\xD7\xCF\xB1\x15\x34\x9C\xCC\xCE\xE6" | |
14 | 14 | // ssleay32.dll |
15 | -#define FILEHASH_SSLEAY32_DLL_SHA1 "\xCC\x62\xD5\x15\xAC\xAF\xFE\x85\x95\xD3\x68\x92\x04\x30\xBC\xF9\x4B\xE4\x48\xCB" | |
15 | +#define FILEHASH_SSLEAY32_DLL_SHA1 "\x81\x18\xFC\xB3\x6D\x06\x77\x86\x3D\xC2\x61\xFE\x6E\x03\x59\x07\xA4\xD2\xBD\xD8" | |
16 | 16 | #endif |
17 | 17 |
@@ -771,7 +771,7 @@ static int InitApp(LPSTR lpszCmdLine, int cmdShow) | ||
771 | 771 | DispWindowTitle(); |
772 | 772 | // SourceForge.JPによるフォーク |
773 | 773 | // SetTaskMsg("FFFTP Ver." VER_STR " Copyright(C) 1997-2010 Sota & cooperators."); |
774 | - SetTaskMsg("FFFTP Ver." VER_STR " Copyright(C) 1997-2010 Sota & cooperators.\r\nCopyright (C) 2011-2016 FFFTP Project (Hiromichi Matsushima, Suguru Kawamoto, IWAMOTO Kouichi, vitamin0x, unarist, Asami, fortran90, tomo1192, Yuji Tanaka, Moriguchi Hirokazu, Fu-sen)."); | |
774 | + SetTaskMsg("FFFTP Ver." VER_STR " Copyright(C) 1997-2010 Sota & cooperators.\r\nCopyright (C) 2011-2017 FFFTP Project (Hiromichi Matsushima, Suguru Kawamoto, IWAMOTO Kouichi, vitamin0x, unarist, Asami, fortran90, tomo1192, Yuji Tanaka, Moriguchi Hirokazu, Fu-sen)."); | |
775 | 775 | |
776 | 776 | if(ForceIni) |
777 | 777 | SetTaskMsg("%s%s", MSGJPN283, IniPath); |